FIPS Product: YES FIPS Kernel: NO FIPS Mode: NO NSS DB directory: sql:/etc/ipsec.d Initializing NSS Opening NSS database "sql:/etc/ipsec.d" read-only NSS initialized NSS crypto library initialized FIPS HMAC integrity support [enabled] FIPS mode disabled for pluto daemon FIPS HMAC integrity verification self-test FAILED libcap-ng support [enabled] Linux audit support [enabled] Linux audit activated Starting Pluto (Libreswan Version v3.28-827-gc9aa82b8a6-master-s2 XFRM(netkey) esp-hw-offload FORK PTHREAD_SETSCHEDPRIO NSS (IPsec profile) DNSSEC SYSTEMD_WATCHDOG FIPS_CHECK LABELED_IPSEC SECCOMP LIBCAP_NG LINUX_AUDIT XAUTH_PAM NETWORKMANAGER CURL(non-NSS)) pid:23158 core dump dir: /var/tmp secrets file: /etc/ipsec.secrets leak-detective disabled NSS crypto [enabled] XAUTH PAM support [enabled] | libevent is using pluto's memory allocator Initializing libevent in pthreads mode: headers: 2.1.8-stable (2010800); library: 2.1.8-stable (2010800) | libevent_malloc: new ptr-libevent@0x557d468df9c0 size 40 | libevent_malloc: new ptr-libevent@0x557d468df9f0 size 40 | libevent_malloc: new ptr-libevent@0x557d468e0f50 size 40 | creating event base | libevent_malloc: new ptr-libevent@0x557d468e11e0 size 56 | libevent_malloc: new ptr-libevent@0x557d468e1220 size 664 | libevent_malloc: new ptr-libevent@0x557d468e14c0 size 24 | libevent_malloc: new ptr-libevent@0x557d468b6ac0 size 384 | libevent_malloc: new ptr-libevent@0x557d468e14e0 size 16 | libevent_malloc: new ptr-libevent@0x557d468d8810 size 40 | libevent_malloc: new ptr-libevent@0x557d468e1500 size 48 | libevent_realloc: new ptr-libevent@0x557d468e1540 size 256 | libevent_malloc: new ptr-libevent@0x557d468e1650 size 16 | libevent_free: release ptr-libevent@0x557d468e11e0 | libevent initialized | libevent_realloc: new ptr-libevent@0x557d468e1670 size 64 | global periodic timer EVENT_RESET_LOG_RATE_LIMIT enabled with interval of 3600 seconds | init_nat_traversal() initialized with keep_alive=0s NAT-Traversal support [enabled] | global one-shot timer EVENT_NAT_T_KEEPALIVE initialized | global one-shot timer EVENT_FREE_ROOT_CERTS initialized | global periodic timer EVENT_REINIT_SECRET enabled with interval of 3600 seconds | global one-shot timer EVENT_REVIVE_CONNS initialized | global periodic timer EVENT_PENDING_DDNS enabled with interval of 60 seconds | global periodic timer EVENT_PENDING_PHASE2 enabled with interval of 120 seconds Encryption algorithms: AES_CCM_16 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm, aes_ccm_c AES_CCM_12 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_b AES_CCM_8 IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_ccm_a 3DES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS [*192] 3des CAMELLIA_CTR IKEv1: ESP IKEv2: ESP {256,192,*128} CAMELLIA_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} camellia AES_GCM_16 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm, aes_gcm_c AES_GCM_12 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_b AES_GCM_8 IKEv1: ESP IKEv2: IKE ESP FIPS {256,192,*128} aes_gcm_a AES_CTR IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aesctr AES_CBC IKEv1: IKE ESP IKEv2: IKE ESP FIPS {256,192,*128} aes SERPENT_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} serpent TWOFISH_CBC IKEv1: IKE ESP IKEv2: IKE ESP {256,192,*128} twofish TWOFISH_SSH IKEv1: IKE IKEv2: IKE ESP {256,192,*128} twofish_cbc_ssh NULL_AUTH_AES_GMAC IKEv1: ESP IKEv2: ESP FIPS {256,192,*128} aes_gmac NULL IKEv1: ESP IKEv2: ESP [] CHACHA20_POLY1305 IKEv1: IKEv2: IKE ESP [*256] chacha20poly1305 Hash algorithms: MD5 IKEv1: IKE IKEv2: SHA1 IKEv1: IKE IKEv2: FIPS sha SHA2_256 IKEv1: IKE IKEv2: FIPS sha2, sha256 SHA2_384 IKEv1: IKE IKEv2: FIPS sha384 SHA2_512 IKEv1: IKE IKEv2: FIPS sha512 PRF algorithms: HMAC_MD5 IKEv1: IKE IKEv2: IKE md5 HMAC_SHA1 IKEv1: IKE IKEv2: IKE FIPS sha, sha1 HMAC_SHA2_256 IKEv1: IKE IKEv2: IKE FIPS sha2, sha256, sha2_256 HMAC_SHA2_384 IKEv1: IKE IKEv2: IKE FIPS sha384, sha2_384 HMAC_SHA2_512 IKEv1: IKE IKEv2: IKE FIPS sha512, sha2_512 AES_XCBC IKEv1: IKEv2: IKE aes128_xcbc Integrity algorithms: HMAC_MD5_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH md5, hmac_md5 HMAC_SHA1_96 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha, sha1, sha1_96, hmac_sha1 HMAC_SHA2_512_256 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha512, sha2_512, sha2_512_256, hmac_sha2_512 HMAC_SHA2_384_192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha384, sha2_384, sha2_384_192, hmac_sha2_384 HMAC_SHA2_256_128 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS sha2, sha256, sha2_256, sha2_256_128, hmac_sha2_256 HMAC_SHA2_256_TRUNCBUG IKEv1: ESP AH IKEv2: AH AES_XCBC_96 IKEv1: ESP AH IKEv2: IKE ESP AH aes_xcbc, aes128_xcbc, aes128_xcbc_96 AES_CMAC_96 IKEv1: ESP AH IKEv2: ESP AH FIPS aes_cmac NONE IKEv1: ESP IKEv2: IKE ESP FIPS null DH algorithms: NONE IKEv1: IKEv2: IKE ESP AH FIPS null, dh0 MODP1536 IKEv1: IKE ESP AH IKEv2: IKE ESP AH dh5 MODP2048 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh14 MODP3072 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh15 MODP4096 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh16 MODP6144 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh17 MODP8192 IKEv1: IKE ESP AH IKEv2: IKE ESP AH FIPS dh18 DH19 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_256, ecp256 DH20 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_384, ecp384 DH21 IKEv1: IKE IKEv2: IKE ESP AH FIPS ecp_521, ecp521 DH31 IKEv1: IKE IKEv2: IKE ESP AH curve25519 testing CAMELLIA_CBC: Camellia: 16 bytes with 128-bit key Camellia: 16 bytes with 128-bit key Camellia: 16 bytes with 256-bit key Camellia: 16 bytes with 256-bit key testing AES_GCM_16: empty string one block two blocks two blocks with associated data testing AES_CTR: Encrypting 16 octets using AES-CTR with 128-bit key Encrypting 32 octets using AES-CTR with 128-bit key Encrypting 36 octets using AES-CTR with 128-bit key Encrypting 16 octets using AES-CTR with 192-bit key Encrypting 32 octets using AES-CTR with 192-bit key Encrypting 36 octets using AES-CTR with 192-bit key Encrypting 16 octets using AES-CTR with 256-bit key Encrypting 32 octets using AES-CTR with 256-bit key Encrypting 36 octets using AES-CTR with 256-bit key testing AES_CBC: Encrypting 16 bytes (1 block) using AES-CBC with 128-bit key Encrypting 32 bytes (2 blocks) using AES-CBC with 128-bit key Encrypting 48 bytes (3 blocks) using AES-CBC with 128-bit key Encrypting 64 bytes (4 blocks) using AES-CBC with 128-bit key testing AES_XCBC: RFC 3566 Test Case #1: AES-XCBC-MAC-96 with 0-byte input RFC 3566 Test Case #2: AES-XCBC-MAC-96 with 3-byte input RFC 3566 Test Case #3: AES-XCBC-MAC-96 with 16-byte input RFC 3566 Test Case #4: AES-XCBC-MAC-96 with 20-byte input RFC 3566 Test Case #5: AES-XCBC-MAC-96 with 32-byte input RFC 3566 Test Case #6: AES-XCBC-MAC-96 with 34-byte input RFC 3566 Test Case #7: AES-XCBC-MAC-96 with 1000-byte input RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 16) RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 10) RFC 4434 Test Case AES-XCBC-PRF-128 with 20-byte input (key length 18) testing HMAC_MD5: RFC 2104: MD5_HMAC test 1 RFC 2104: MD5_HMAC test 2 RFC 2104: MD5_HMAC test 3 starting up 20 crypto helpers started thread for crypto helper 0 started thread for crypto helper 1 started thread for crypto helper 2 | starting up helper thread 1 | status value returned by setting the priority of this thread (crypto helper 1) 22 | crypto helper 1 waiting (nothing to do) | starting up helper thread 0 started thread for crypto helper 3 started thread for crypto helper 4 started thread for crypto helper 5 started thread for crypto helper 6 started thread for crypto helper 7 started thread for crypto helper 8 started thread for crypto helper 9 started thread for crypto helper 10 started thread for crypto helper 11 started thread for crypto helper 12 started thread for crypto helper 13 started thread for crypto helper 14 started thread for crypto helper 15 started thread for crypto helper 16 started thread for crypto helper 17 started thread for crypto helper 18 started thread for crypto helper 19 | checking IKEv1 state table | MAIN_R0: category: half-open IKE SA flags: 0: | -> MAIN_R1 EVENT_SO_DISCARD | MAIN_I1: category: half-open IKE SA flags: 0: | -> MAIN_I2 EVENT_RETRANSMIT | MAIN_R1: category: open IKE SA flags: 200: | -> MAIN_R2 EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | MAIN_I2: category: open IKE SA flags: 0: | -> MAIN_I3 EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | -> UNDEFINED EVENT_RETRANSMIT | MAIN_R2: category: open IKE SA flags: 0: | -> MAIN_R3 EVENT_SA_REPLACE | -> MAIN_R3 EVENT_SA_REPLACE | -> UNDEFINED EVENT_SA_REPLACE | MAIN_I3: category: open IKE SA flags: 0: | -> MAIN_I4 EVENT_SA_REPLACE | -> MAIN_I4 EVENT_SA_REPLACE | -> UNDEFINED EVENT_SA_REPLACE | MAIN_R3: category: established IKE SA flags: 200: | -> UNDEFINED EVENT_NULL | MAIN_I4: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | AGGR_R0: category: half-open IKE SA flags: 0: | -> AGGR_R1 EVENT_SO_DISCARD | AGGR_I1: category: half-open IKE SA flags: 0: | -> AGGR_I2 EVENT_SA_REPLACE | -> AGGR_I2 EVENT_SA_REPLACE | AGGR_R1: category: open IKE SA flags: 200: | -> AGGR_R2 EVENT_SA_REPLACE | -> AGGR_R2 EVENT_SA_REPLACE | AGGR_I2: category: established IKE SA flags: 200: | -> UNDEFINED EVENT_NULL | AGGR_R2: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | QUICK_R0: category: established CHILD SA flags: 0: | -> QUICK_R1 EVENT_RETRANSMIT | QUICK_I1: category: established CHILD SA flags: 0: | -> QUICK_I2 EVENT_SA_REPLACE | QUICK_R1: category: established CHILD SA flags: 0: | -> QUICK_R2 EVENT_SA_REPLACE | QUICK_I2: category: established CHILD SA flags: 200: | -> UNDEFINED EVENT_NULL | QUICK_R2: category: established CHILD SA flags: 0: | -> UNDEFINED EVENT_NULL | INFO: category: informational flags: 0: | -> UNDEFINED EVENT_NULL | INFO_PROTECTED: category: informational flags: 0: | -> UNDEFINED EVENT_NULL | XAUTH_R0: category: established IKE SA flags: 0: | -> XAUTH_R1 EVENT_NULL | XAUTH_R1: category: established IKE SA flags: 0: | -> MAIN_R3 EVENT_SA_REPLACE | MODE_CFG_R0: category: informational flags: 0: | -> MODE_CFG_R1 EVENT_SA_REPLACE | MODE_CFG_R1: category: established IKE SA flags: 0: | -> MODE_CFG_R2 EVENT_SA_REPLACE | MODE_CFG_R2: category: established IKE SA flags: 0: | -> UNDEFINED EVENT_NULL | MODE_CFG_I1: category: established IKE SA flags: 0: | -> MAIN_I4 EVENT_SA_REPLACE | XAUTH_I0: category: established IKE SA flags: 0: | -> XAUTH_I1 EVENT_RETRANSMIT | XAUTH_I1: category: established IKE SA flags: 0: | -> MAIN_I4 EVENT_RETRANSMIT | checking IKEv2 state table | PARENT_I0: category: ignore flags: 0: | -> PARENT_I1 EVENT_RETRANSMIT send-request (initiate IKE_SA_INIT) | PARENT_I1: category: half-open IKE SA flags: 0: | -> PARENT_I1 EVENT_RETAIN send-request (Initiator: process SA_INIT reply notification) | -> PARENT_I2 EVENT_RETRANSMIT send-request (Initiator: process IKE_SA_INIT reply, initiate IKE_AUTH) | PARENT_I2: category: open IKE SA flags: 0: | -> PARENT_I2 EVENT_NULL (Initiator: process INVALID_SYNTAX AUTH notification) | -> PARENT_I2 EVENT_NULL (Initiator: process AUTHENTICATION_FAILED AUTH notification) | -> PARENT_I2 EVENT_NULL (Initiator: process UNSUPPORTED_CRITICAL_PAYLOAD AUTH notification) | -> V2_IPSEC_I EVENT_SA_REPLACE (Initiator: process IKE_AUTH response) | -> PARENT_I2 EVENT_NULL (IKE SA: process IKE_AUTH response containing unknown notification) | PARENT_I3: category: established IKE SA flags: 0: | -> PARENT_I3 EVENT_RETAIN (I3: Informational Request) | -> PARENT_I3 EVENT_RETAIN (I3: Informational Response) | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Request) | -> PARENT_I3 EVENT_RETAIN (I3: INFORMATIONAL Response) | PARENT_R0: category: half-open IKE SA flags: 0: | -> PARENT_R1 EVENT_SO_DISCARD send-request (Respond to IKE_SA_INIT) | PARENT_R1: category: half-open IKE SA flags: 0: | -> PARENT_R1 EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request (no SKEYSEED)) | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Responder: process IKE_AUTH request) | PARENT_R2: category: established IKE SA flags: 0: | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Request) | -> PARENT_R2 EVENT_RETAIN (R2: process Informational Response) | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Request) | -> PARENT_R2 EVENT_RETAIN (R2: process INFORMATIONAL Response) | V2_CREATE_I0: category: established IKE SA flags: 0: | -> V2_CREATE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec SA) | V2_CREATE_I: category: established IKE SA flags: 0: | -> V2_IPSEC_I EVENT_SA_REPLACE (Process CREATE_CHILD_SA IPsec SA Response) | V2_REKEY_IKE_I0: category: established IKE SA flags: 0: | -> V2_REKEY_IKE_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IKE Rekey) | V2_REKEY_IKE_I: category: established IKE SA flags: 0: | -> PARENT_I3 EVENT_SA_REPLACE (Process CREATE_CHILD_SA IKE Rekey Response) | V2_REKEY_CHILD_I0: category: established IKE SA flags: 0: | -> V2_REKEY_CHILD_I EVENT_RETRANSMIT send-request (Initiate CREATE_CHILD_SA IPsec Rekey SA) | V2_REKEY_CHILD_I: category: established IKE SA flags: 0: | V2_CREATE_R: category: established IKE SA flags: 0: | -> V2_IPSEC_R EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IPsec SA Request) | V2_REKEY_IKE_R: category: established IKE SA flags: 0: | -> PARENT_R2 EVENT_SA_REPLACE send-request (Respond to CREATE_CHILD_SA IKE Rekey) | V2_REKEY_CHILD_R: category: established IKE SA flags: 0: | V2_IPSEC_I: category: established CHILD SA flags: 0: | V2_IPSEC_R: category: established CHILD SA flags: 0: | IKESA_DEL: category: established IKE SA flags: 0: | -> IKESA_DEL EVENT_RETAIN (IKE_SA_DEL: process INFORMATIONAL) | CHILDSA_DEL: category: informational flags: 0: Using Linux XFRM/NETKEY IPsec interface code on 5.2.11+ | Hard-wiring algorithms | adding AES_CCM_16 to kernel algorithm db | adding AES_CCM_12 to kernel algorithm db | adding AES_CCM_8 to kernel algorithm db | adding 3DES_CBC to kernel algorithm db | adding CAMELLIA_CBC to kernel algorithm db | adding AES_GCM_16 to kernel algorithm db | adding AES_GCM_12 to kernel algorithm db | adding AES_GCM_8 to kernel algorithm db | adding AES_CTR to kernel algorithm db | adding AES_CBC to kernel algorithm db | adding SERPENT_CBC to kernel algorithm db | adding TWOFISH_CBC to kernel algorithm db | adding NULL_AUTH_AES_GMAC to kernel algorithm db | adding NULL to kernel algorithm db | adding CHACHA20_POLY1305 to kernel algorithm db | adding HMAC_MD5_96 to kernel algorithm db | adding HMAC_SHA1_96 to kernel algorithm db | adding HMAC_SHA2_512_256 to kernel algorithm db | adding HMAC_SHA2_384_192 to kernel algorithm db | adding HMAC_SHA2_256_128 to kernel algorithm db | adding HMAC_SHA2_256_TRUNCBUG to kernel algorithm db | adding AES_XCBC_96 to kernel algorithm db | adding AES_CMAC_96 to kernel algorithm db | adding NONE to kernel algorithm db | net.ipv6.conf.all.disable_ipv6=1 ignore ipv6 holes | global periodic timer EVENT_SHUNT_SCAN enabled with interval of 20 seconds | setup kernel fd callback | add_fd_read_event_handler: new KERNEL_XRM_FD-pe@0x557d468e7120 | libevent_malloc: new ptr-libevent@0x557d468f4670 size 128 | libevent_malloc: new ptr-libevent@0x557d468e1930 size 16 | add_fd_read_event_handler: new KERNEL_ROUTE_FD-pe@0x557d468e70e0 | libevent_malloc: new ptr-libevent@0x557d468f4700 size 128 | libevent_malloc: new ptr-libevent@0x557d468e60a0 size 16 | global one-shot timer EVENT_CHECK_CRLS initialized selinux support is enabled. systemd watchdog not enabled - not sending watchdog keepalives | unbound context created - setting debug level to 5 | /etc/hosts lookups activated | /etc/resolv.conf usage activated | outgoing-port-avoid set 0-65535 | outgoing-port-permit set 32768-60999 | Loading dnssec root key from:/var/lib/unbound/root.key | No additional dnssec trust anchors defined via dnssec-trusted= option | Setting up events, loop start | add_fd_read_event_handler: new PLUTO_CTL_FD-pe@0x557d468e11e0 | libevent_malloc: new ptr-libevent@0x557d468fec80 size 128 | libevent_malloc: new ptr-libevent@0x557d468fed10 size 16 | libevent_realloc: new ptr-libevent@0x557d468fed30 size 256 | libevent_malloc: new ptr-libevent@0x557d468fee40 size 8 | libevent_realloc: new ptr-libevent@0x557d468f2240 size 144 | libevent_malloc: new ptr-libevent@0x557d468fee60 size 152 | libevent_malloc: new ptr-libevent@0x557d468fef00 size 16 | signal event handler PLUTO_SIGCHLD installed | libevent_malloc: new ptr-libevent@0x557d468fef20 size 8 | libevent_malloc: new ptr-libevent@0x557d468fef40 size 152 | signal event handler PLUTO_SIGTERM installed | libevent_malloc: new ptr-libevent@0x557d468fefe0 size 8 | libevent_malloc: new ptr-libevent@0x557d468ff000 size 152 | signal event handler PLUTO_SIGHUP installed | libevent_malloc: new ptr-libevent@0x557d468ff0a0 size 8 | libevent_realloc: release ptr-libevent@0x557d468f2240 | libevent_realloc: new ptr-libevent@0x557d468ff0c0 size 256 | libevent_malloc: new ptr-libevent@0x557d468f2240 size 152 | signal event handler PLUTO_SIGSYS installed | created addconn helper (pid:23330) using fork+execve | forked child 23330 | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | pluto_sd: executing action action: reloading(4), status 0 listening for IKE messages | Inspecting interface lo | found lo with address 127.0.0.1 | Inspecting interface eth0 | found eth0 with address 192.1.3.209 | Inspecting interface eth0 | found eth0 with address 192.1.3.1 | Inspecting interface eth0 | found eth0 with address 192.1.3.2 | Inspecting interface eth0 | found eth0 with address 192.1.3.3 | Inspecting interface eth0 | found eth0 with address 192.1.3.4 | Inspecting interface eth0 | found eth0 with address 192.1.3.5 | Inspecting interface eth0 | found eth0 with address 192.1.3.6 | Inspecting interface eth0 | found eth0 with address 192.1.3.7 | Inspecting interface eth0 | found eth0 with address 192.1.3.8 | Inspecting interface eth0 | found eth0 with address 192.1.3.9 | Inspecting interface eth0 | found eth0 with address 192.1.3.10 | Inspecting interface eth0 | found eth0 with address 192.1.3.11 | Inspecting interface eth0 | found eth0 with address 192.1.3.12 | Inspecting interface eth0 | found eth0 with address 192.1.3.13 | Inspecting interface eth0 | found eth0 with address 192.1.3.14 | Inspecting interface eth0 | found eth0 with address 192.1.3.15 | Inspecting interface eth0 | found eth0 with address 192.1.3.16 | Inspecting interface eth0 | found eth0 with address 192.1.3.17 | Inspecting interface eth0 | found eth0 with address 192.1.3.18 | Inspecting interface eth0 | found eth0 with address 192.1.3.19 | Inspecting interface eth0 | found eth0 with address 192.1.3.20 | Inspecting interface eth0 | found eth0 with address 192.1.3.21 | Inspecting interface eth0 | found eth0 with address 192.1.3.22 | Inspecting interface eth0 | found eth0 with address 192.1.3.23 | Inspecting interface eth0 | found eth0 with address 192.1.3.24 | Inspecting interface eth0 | found eth0 with address 192.1.3.25 | Inspecting interface eth0 | found eth0 with address 192.1.3.26 | Inspecting interface eth0 | found eth0 with address 192.1.3.27 | Inspecting interface eth0 | found eth0 with address 192.1.3.28 | Inspecting interface eth0 | found eth0 with address 192.1.3.29 | Inspecting interface eth0 | found eth0 with address 192.1.3.30 | Inspecting interface eth0 | found eth0 with address 192.1.3.31 | Inspecting interface eth0 | found eth0 with address 192.1.3.32 | Inspecting interface eth0 | found eth0 with address 192.1.3.33 | Inspecting interface eth0 | found eth0 with address 192.1.3.34 | Inspecting interface eth0 | found eth0 with address 192.1.3.35 | Inspecting interface eth0 | found eth0 with address 192.1.3.36 | Inspecting interface eth0 | found eth0 with address 192.1.3.37 | Inspecting interface eth0 | found eth0 with address 192.1.3.38 | Inspecting interface eth0 | found eth0 with address 192.1.3.39 | Inspecting interface eth0 | found eth0 with address 192.1.3.40 | Inspecting interface eth0 | found eth0 with address 192.1.3.41 | Inspecting interface eth0 | found eth0 with address 192.1.3.42 | Inspecting interface eth0 | found eth0 with address 192.1.3.43 | Inspecting interface eth0 | found eth0 with address 192.1.3.44 | Inspecting interface eth0 | found eth0 with address 192.1.3.45 | Inspecting interface eth0 | found eth0 with address 192.1.3.46 | Inspecting interface eth0 | found eth0 with address 192.1.3.47 | Inspecting interface eth0 | found eth0 with address 192.1.3.48 | Inspecting interface eth0 | found eth0 with address 192.1.3.49 | Inspecting interface eth0 | found eth0 with address 192.1.3.50 | Inspecting interface eth0 | found eth0 with address 192.1.3.51 | Inspecting interface eth0 | found eth0 with address 192.1.3.52 | Inspecting interface eth0 | found eth0 with address 192.1.3.53 | Inspecting interface eth0 | found eth0 with address 192.1.3.54 | Inspecting interface eth0 | found eth0 with address 192.1.3.55 | Inspecting interface eth0 | found eth0 with address 192.1.3.56 | Inspecting interface eth0 | found eth0 with address 192.1.3.57 | Inspecting interface eth0 | found eth0 with address 192.1.3.58 | Inspecting interface eth0 | found eth0 with address 192.1.3.59 | Inspecting interface eth0 | found eth0 with address 192.1.3.60 | Inspecting interface eth0 | found eth0 with address 192.1.3.61 | Inspecting interface eth0 | found eth0 with address 192.1.3.62 | Inspecting interface eth0 | found eth0 with address 192.1.3.63 | Inspecting interface eth0 | found eth0 with address 192.1.3.64 | Inspecting interface eth0 | found eth0 with address 192.1.3.65 | Inspecting interface eth0 | found eth0 with address 192.1.3.66 | Inspecting interface eth0 | found eth0 with address 192.1.3.67 | Inspecting interface eth0 | found eth0 with address 192.1.3.68 | Inspecting interface eth0 | found eth0 with address 192.1.3.69 | Inspecting interface eth0 | found eth0 with address 192.1.3.70 | Inspecting interface eth0 | found eth0 with address 192.1.3.71 | Inspecting interface eth0 | found eth0 with address 192.1.3.72 | Inspecting interface eth0 | found eth0 with address 192.1.3.73 | Inspecting interface eth0 | found eth0 with address 192.1.3.74 | Inspecting interface eth0 | found eth0 with address 192.1.3.75 | Inspecting interface eth0 | found eth0 with address 192.1.3.76 | Inspecting interface eth0 | found eth0 with address 192.1.3.77 | Inspecting interface eth0 | found eth0 with address 192.1.3.78 | Inspecting interface eth0 | found eth0 with address 192.1.3.79 | Inspecting interface eth0 | found eth0 with address 192.1.3.80 | Inspecting interface eth0 | found eth0 with address 192.1.3.81 | Inspecting interface eth0 | found eth0 with address 192.1.3.82 | Inspecting interface eth0 | found eth0 with address 192.1.3.83 | Inspecting interface eth0 | found eth0 with address 192.1.3.84 | Inspecting interface eth0 | found eth0 with address 192.1.3.85 | Inspecting interface eth0 | found eth0 with address 192.1.3.86 | Inspecting interface eth0 | found eth0 with address 192.1.3.87 | Inspecting interface eth0 | found eth0 with address 192.1.3.88 | Inspecting interface eth0 | found eth0 with address 192.1.3.89 | Inspecting interface eth0 | found eth0 with address 192.1.3.90 | Inspecting interface eth0 | found eth0 with address 192.1.3.91 | Inspecting interface eth0 | found eth0 with address 192.1.3.92 | Inspecting interface eth0 | found eth0 with address 192.1.3.93 | Inspecting interface eth0 | found eth0 with address 192.1.3.94 | Inspecting interface eth0 | found eth0 with address 192.1.3.95 | Inspecting interface eth0 | found eth0 with address 192.1.3.96 | Inspecting interface eth0 | found eth0 with address 192.1.3.97 | Inspecting interface eth0 | found eth0 with address 192.1.3.98 | Inspecting interface eth0 | found eth0 with address 192.1.3.99 | Inspecting interface eth0 | found eth0 with address 192.1.3.100 | Inspecting interface eth0 | found eth0 with address 192.1.3.101 | Inspecting interface eth0 | found eth0 with address 192.1.3.102 | Inspecting interface eth0 | found eth0 with address 192.1.3.103 | Inspecting interface eth0 | found eth0 with address 192.1.3.104 | Inspecting interface eth0 | found eth0 with address 192.1.3.105 | Inspecting interface eth0 | found eth0 with address 192.1.3.106 | Inspecting interface eth0 | found eth0 with address 192.1.3.107 | Inspecting interface eth0 | found eth0 with address 192.1.3.108 | Inspecting interface eth0 | found eth0 with address 192.1.3.109 | Inspecting interface eth0 | found eth0 with address 192.1.3.110 | Inspecting interface eth0 | found eth0 with address 192.1.3.111 | Inspecting interface eth0 | found eth0 with address 192.1.3.112 | Inspecting interface eth0 | found eth0 with address 192.1.3.113 | Inspecting interface eth0 | found eth0 with address 192.1.3.114 | Inspecting interface eth0 | found eth0 with address 192.1.3.115 | Inspecting interface eth0 | found eth0 with address 192.1.3.116 | Inspecting interface eth0 | found eth0 with address 192.1.3.117 | Inspecting interface eth0 | found eth0 with address 192.1.3.118 | Inspecting interface eth0 | found eth0 with address 192.1.3.119 | Inspecting interface eth0 | found eth0 with address 192.1.3.120 | Inspecting interface eth0 | found eth0 with address 192.1.3.121 | Inspecting interface eth0 | found eth0 with address 192.1.3.122 | Inspecting interface eth0 | found eth0 with address 192.1.3.123 | Inspecting interface eth0 | found eth0 with address 192.1.3.124 | Inspecting interface eth0 | found eth0 with address 192.1.3.125 | Inspecting interface eth0 | found eth0 with address 192.1.3.126 | Inspecting interface eth0 | found eth0 with address 192.1.3.127 | Inspecting interface eth0 | found eth0 with address 192.1.3.128 | Inspecting interface eth0 | found eth0 with address 192.1.3.129 | Inspecting interface eth0 | found eth0 with address 192.1.3.130 | Inspecting interface eth0 | found eth0 with address 192.1.3.131 | Inspecting interface eth0 | found eth0 with address 192.1.3.132 | Inspecting interface eth0 | found eth0 with address 192.1.3.133 | Inspecting interface eth0 | found eth0 with address 192.1.3.134 | Inspecting interface eth0 | found eth0 with address 192.1.3.135 | Inspecting interface eth0 | found eth0 with address 192.1.3.136 | Inspecting interface eth0 | found eth0 with address 192.1.3.137 | Inspecting interface eth0 | found eth0 with address 192.1.3.138 | Inspecting interface eth0 | found eth0 with address 192.1.3.139 | Inspecting interface eth0 | found eth0 with address 192.1.3.140 | Inspecting interface eth0 | found eth0 with address 192.1.3.141 | Inspecting interface eth0 | found eth0 with address 192.1.3.142 | Inspecting interface eth0 | found eth0 with address 192.1.3.143 | Inspecting interface eth0 | found eth0 with address 192.1.3.144 | Inspecting interface eth0 | found eth0 with address 192.1.3.145 | Inspecting interface eth0 | found eth0 with address 192.1.3.146 | Inspecting interface eth0 | found eth0 with address 192.1.3.147 | Inspecting interface eth0 | found eth0 with address 192.1.3.148 | Inspecting interface eth0 | found eth0 with address 192.1.3.149 | Inspecting interface eth0 | found eth0 with address 192.1.3.150 | Inspecting interface eth0 | found eth0 with address 192.1.3.151 | Inspecting interface eth0 | found eth0 with address 192.1.3.152 | Inspecting interface eth0 | found eth0 with address 192.1.3.153 | Inspecting interface eth0 | found eth0 with address 192.1.3.154 | Inspecting interface eth0 | found eth0 with address 192.1.3.155 | Inspecting interface eth0 | found eth0 with address 192.1.3.156 | Inspecting interface eth0 | found eth0 with address 192.1.3.157 | Inspecting interface eth0 | found eth0 with address 192.1.3.158 | Inspecting interface eth0 | found eth0 with address 192.1.3.159 | Inspecting interface eth0 | found eth0 with address 192.1.3.160 | Inspecting interface eth0 | found eth0 with address 192.1.3.161 | Inspecting interface eth0 | found eth0 with address 192.1.3.162 | Inspecting interface eth0 | found eth0 with address 192.1.3.163 | Inspecting interface eth0 | found eth0 with address 192.1.3.164 | Inspecting interface eth0 | found eth0 with address 192.1.3.165 | Inspecting interface eth0 | found eth0 with address 192.1.3.166 | Inspecting interface eth0 | found eth0 with address 192.1.3.167 | Inspecting interface eth0 | found eth0 with address 192.1.3.168 | Inspecting interface eth0 | found eth0 with address 192.1.3.169 | Inspecting interface eth0 | found eth0 with address 192.1.3.170 | Inspecting interface eth0 | found eth0 with address 192.1.3.171 | Inspecting interface eth0 | found eth0 with address 192.1.3.172 | Inspecting interface eth0 | found eth0 with address 192.1.3.173 | Inspecting interface eth0 | found eth0 with address 192.1.3.174 | Inspecting interface eth0 | found eth0 with address 192.1.3.175 | Inspecting interface eth0 | found eth0 with address 192.1.3.176 | Inspecting interface eth0 | found eth0 with address 192.1.3.177 | Inspecting interface eth0 | found eth0 with address 192.1.3.178 | Inspecting interface eth0 | found eth0 with address 192.1.3.179 | Inspecting interface eth0 | found eth0 with address 192.1.3.180 | Inspecting interface eth0 | found eth0 with address 192.1.3.181 | Inspecting interface eth0 | found eth0 with address 192.1.3.182 | Inspecting interface eth0 | found eth0 with address 192.1.3.183 | Inspecting interface eth0 | found eth0 with address 192.1.3.184 | Inspecting interface eth0 | found eth0 with address 192.1.3.185 | Inspecting interface eth0 | found eth0 with address 192.1.3.186 | Inspecting interface eth0 | found eth0 with address 192.1.3.187 | Inspecting interface eth0 | found eth0 with address 192.1.3.188 | Inspecting interface eth0 | found eth0 with address 192.1.3.189 | Inspecting interface eth0 | found eth0 with address 192.1.3.190 | Inspecting interface eth0 | found eth0 with address 192.1.3.191 | Inspecting interface eth0 | found eth0 with address 192.1.3.192 | Inspecting interface eth0 | found eth0 with address 192.1.3.193 | Inspecting interface eth0 | found eth0 with address 192.1.3.194 | Inspecting interface eth0 | found eth0 with address 192.1.3.195 | Inspecting interface eth0 | found eth0 with address 192.1.3.196 | Inspecting interface eth0 | found eth0 with address 192.1.3.197 | Inspecting interface eth0 | found eth0 with address 192.1.3.198 | Inspecting interface eth0 | found eth0 with address 192.1.3.199 | Inspecting interface eth0 | found eth0 with address 192.1.3.200 | Inspecting interface eth0 | found eth0 with address 192.1.3.201 | Inspecting interface eth0 | found eth0 with address 192.1.3.202 | Inspecting interface eth0 | found eth0 with address 192.1.3.203 | Inspecting interface eth0 | found eth0 with address 192.1.3.204 | Inspecting interface eth0 | found eth0 with address 192.1.3.205 | Inspecting interface eth0 | found eth0 with address 192.1.3.206 | Inspecting interface eth0 | found eth0 with address 192.1.3.207 | Inspecting interface eth0 | found eth0 with address 192.1.3.208 | Inspecting interface eth0 | found eth0 with address 192.1.3.210 | Inspecting interface eth0 | found eth0 with address 192.1.3.211 | Inspecting interface eth0 | found eth0 with address 192.1.3.212 | Inspecting interface eth0 | found eth0 with address 192.1.3.213 | Inspecting interface eth0 | found eth0 with address 192.1.3.214 | Inspecting interface eth0 | found eth0 with address 192.1.3.215 | Inspecting interface eth0 | found eth0 with address 192.1.3.216 | Inspecting interface eth0 | found eth0 with address 192.1.3.217 | Inspecting interface eth0 | found eth0 with address 192.1.3.218 | Inspecting interface eth0 | found eth0 with address 192.1.3.219 | Inspecting interface eth0 | found eth0 with address 192.1.3.220 | Inspecting interface eth0 | found eth0 with address 192.1.3.221 | Inspecting interface eth0 | found eth0 with address 192.1.3.222 | Inspecting interface eth0 | found eth0 with address 192.1.3.223 | Inspecting interface eth0 | found eth0 with address 192.1.3.224 | Inspecting interface eth0 | found eth0 with address 192.1.3.225 | Inspecting interface eth0 | found eth0 with address 192.1.3.226 | Inspecting interface eth0 | starting up helper thread 2 | status value returned by setting the priority of this thread (crypto helper 2) 22 | status value returned by setting the priority of this thread (crypto helper 0) 22 | crypto helper 2 waiting (nothing to do) | found eth0 with address 192.1.3.227 | Inspecting interface eth0 | found eth0 with address 192.1.3.228 | starting up helper thread 9 | crypto helper 0 waiting (nothing to do) | status value returned by setting the priority of this thread (crypto helper 9) 22 | crypto helper 9 waiting (nothing to do) | Inspecting interface eth0 | found eth0 with address 192.1.3.229 | Inspecting interface eth0 | starting up helper thread 10 | status value returned by setting the priority of this thread (crypto helper 10) 22 | crypto helper 10 waiting (nothing to do) | found eth0 with address 192.1.3.230 | Inspecting interface eth0 | found eth0 with address 192.1.3.231 | Inspecting interface eth0 | starting up helper thread 14 | status value returned by setting the priority of this thread (crypto helper 14) 22 | crypto helper 14 waiting (nothing to do) | found eth0 with address 192.1.3.232 | Inspecting interface eth0 | found eth0 with address 192.1.3.233 | Inspecting interface eth0 | found eth0 with address 192.1.3.234 | starting up helper thread 15 | status value returned by setting the priority of this thread (crypto helper 15) 22 | starting up helper thread 16 | status value returned by setting the priority of this thread (crypto helper 16) 22 | starting up helper thread 6 | status value returned by setting the priority of this thread (crypto helper 6) 22 | crypto helper 15 waiting (nothing to do) | Inspecting interface eth0 | found eth0 with address 192.1.3.235 | Inspecting interface eth0 | starting up helper thread 19 | found eth0 with address 192.1.3.236 | status value returned by setting the priority of this thread (crypto helper 19) 22 | starting up helper thread 11 | status value returned by setting the priority of this thread (crypto helper 11) 22 | starting up helper thread 4 | status value returned by setting the priority of this thread (crypto helper 4) 22 | crypto helper 19 waiting (nothing to do) | Inspecting interface eth0 | crypto helper 6 waiting (nothing to do) | found eth0 with address 192.1.3.237 | starting up helper thread 5 | crypto helper 11 waiting (nothing to do) | Inspecting interface eth0 | found eth0 with address 192.1.3.238 | Inspecting interface eth0 | found eth0 with address 192.1.3.239 | Inspecting interface eth0 | found eth0 with address 192.1.3.240 | Inspecting interface eth0 | found eth0 with address 192.1.3.241 | Inspecting interface eth0 | found eth0 with address 192.1.3.242 | Inspecting interface eth0 | found eth0 with address 192.1.3.243 | Inspecting interface eth0 | found eth0 with address 192.1.3.244 | Inspecting interface eth0 | found eth0 with address 192.1.3.245 | Inspecting interface eth0 | found eth0 with address 192.1.3.246 | Inspecting interface eth0 | found eth0 with address 192.1.3.247 | Inspecting interface eth0 | found eth0 with address 192.1.3.248 | Inspecting interface eth0 | found eth0 with address 192.1.3.249 | Inspecting interface eth0 | found eth0 with address 192.1.3.250 | Inspecting interface eth0 | found eth0 with address 192.1.3.251 | Inspecting interface eth0 | found eth0 with address 192.1.3.252 Kernel supports NIC esp-hw-offload adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.252:500 | status value returned by setting the priority of this thread (crypto helper 5) 22 | starting up helper thread 3 | status value returned by setting the priority of this thread (crypto helper 3) 22 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.252:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.251:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.251:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.250:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.250:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.249:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.249:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.248:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.248:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.247:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.247:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.246:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.246:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.245:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.245:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.244:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.244:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.243:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.243:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.242:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.242:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.241:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.241:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.240:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.240:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.239:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.239:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.238:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.238:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.237:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.237:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.236:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.236:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.235:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.235:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.234:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.234:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.233:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.233:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.232:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.232:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.231:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.231:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.230:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.230:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.229:500 | crypto helper 16 waiting (nothing to do) | crypto helper 4 waiting (nothing to do) | starting up helper thread 13 | status value returned by setting the priority of this thread (crypto helper 13) 22 | crypto helper 13 waiting (nothing to do) | starting up helper thread 17 | status value returned by setting the priority of this thread (crypto helper 17) 22 | crypto helper 17 waiting (nothing to do) | starting up helper thread 18 | status value returned by setting the priority of this thread (crypto helper 18) 22 | crypto helper 18 waiting (nothing to do) | starting up helper thread 7 | status value returned by setting the priority of this thread (crypto helper 7) 22 | crypto helper 7 waiting (nothing to do) | starting up helper thread 8 | status value returned by setting the priority of this thread (crypto helper 8) 22 | crypto helper 8 waiting (nothing to do) | starting up helper thread 12 | status value returned by setting the priority of this thread (crypto helper 12) 22 | crypto helper 12 waiting (nothing to do) | crypto helper 5 waiting (nothing to do) | crypto helper 3 waiting (nothing to do) | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.229:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.228:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.228:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.227:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.227:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.226:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.226:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.225:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.225:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.224:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.224:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.223:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.223:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.222:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.222:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.221:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.221:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.220:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.220:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.219:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.219:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.218:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.218:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.217:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.217:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.216:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.216:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.215:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.215:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.214:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.214:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.213:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.213:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.212:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.212:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.211:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.211:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.210:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.210:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.208:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.208:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.207:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.207:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.206:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.206:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.205:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.205:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.204:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.204:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.203:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.203:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.202:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.202:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.201:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.201:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.200:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.200:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.199:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.199:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.198:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.198:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.197:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.197:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.196:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.196:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.195:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.195:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.194:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.194:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.193:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.193:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.192:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.192:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.191:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.191:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.190:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.190:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.189:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.189:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.188:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.188:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.187:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.187:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.186:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.186:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.185:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.185:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.184:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.184:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.183:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.183:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.182:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.182:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.181:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.181:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.180:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.180:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.179:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.179:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.178:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.178:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.177:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.177:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.176:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.176:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.175:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.175:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.174:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.174:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.173:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.173:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.172:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.172:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.171:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.171:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.170:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.170:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.169:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.169:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.168:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.168:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.167:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.167:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.166:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.166:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.165:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.165:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.164:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.164:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.163:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.163:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.162:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.162:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.161:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.161:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.160:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.160:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.159:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.159:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.158:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.158:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.157:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.157:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.156:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.156:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.155:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.155:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.154:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.154:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.153:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.153:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.152:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.152:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.151:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.151:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.150:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.150:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.149:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.149:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.148:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.148:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.147:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.147:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.146:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.146:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.145:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.145:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.144:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.144:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.143:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.143:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.142:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.142:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.141:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.141:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.140:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.140:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.139:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.139:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.138:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.138:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.137:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.137:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.136:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.136:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.135:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.135:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.134:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.134:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.133:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.133:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.132:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.132:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.131:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.131:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.130:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.130:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.129:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.129:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.128:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.128:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.127:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.127:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.126:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.126:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.125:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.125:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.124:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.124:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.123:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.123:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.122:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.122:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.121:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.121:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.120:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.120:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.119:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.119:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.118:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.118:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.117:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.117:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.116:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.116:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.115:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.115:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.114:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.114:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.113:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.113:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.112:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.112:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.111:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.111:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.110:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.110:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.109:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.109:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.108:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.108:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.107:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.107:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.106:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.106:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.105:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.105:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.104:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.104:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.103:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.103:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.102:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.102:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.101:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.101:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.100:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.100:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.99:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.99:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.98:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.98:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.97:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.97:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.96:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.96:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.95:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.95:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.94:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.94:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.93:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.93:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.92:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.92:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.91:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.91:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.90:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.90:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.89:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.89:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.88:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.88:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.87:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.87:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.86:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.86:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.85:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.85:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.84:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.84:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.83:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.83:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.82:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.82:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.81:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.81:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.80:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.80:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.79:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.79:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.78:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.78:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.77:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.77:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.76:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.76:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.75:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.75:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.74:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.74:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.73:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.73:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.72:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.72:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.71:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.71:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.70:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.70:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.69:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.69:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.68:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.68:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.67:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.67:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.66:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.66:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.65:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.65:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.64:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.64:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.63:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.63:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.62:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.62:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.61:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.61:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.60:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.60:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.59:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.59:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.58:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.58:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.57:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.57:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.56:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.56:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.55:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.55:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.54:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.54:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.53:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.53:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.52:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.52:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.51:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.51:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.50:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.50:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.49:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.49:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.48:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.48:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.47:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.47:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.46:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.46:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.45:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.45:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.44:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.44:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.43:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.43:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.42:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.42:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.41:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.41:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.40:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.40:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.39:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.39:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.38:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.38:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.37:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.37:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.36:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.36:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.35:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.35:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.34:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.34:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.33:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.33:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.32:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.32:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.31:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.31:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.30:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.30:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.29:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.29:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.28:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.28:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.27:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.27:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.26:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.26:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.25:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.25:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.24:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.24:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.23:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.23:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.22:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.22:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.21:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.21:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.20:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.20:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.19:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.19:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.18:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.18:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.17:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.17:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.16:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.16:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.15:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.15:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.14:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.14:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.13:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.13:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.12:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.12:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.11:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.11:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.10:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.10:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.9:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.9:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.8:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.8:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.7:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.7:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.6:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.6:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.5:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.5:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.4:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.4:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.3:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.3:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.2:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.2:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.1:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.1:4500 adding interface eth0/eth0 (esp-hw-offload not supported by kernel) 192.1.3.209:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface eth0/eth0 192.1.3.209:4500 adding interface lo/lo (esp-hw-offload not supported by kernel) 127.0.0.1:500 | NAT-Traversal: Trying sockopt style NAT-T | NAT-Traversal: ESPINUDP(2) setup succeeded for sockopt style NAT-T family IPv4 adding interface lo/lo 127.0.0.1:4500 | no interfaces to sort | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations | add_fd_read_event_handler: new ethX-pe@0x557d46916150 | libevent_malloc: new ptr-libevent@0x557d46916190 size 128 | libevent_realloc: release ptr-libevent@0x557d468e1540 | libevent_realloc: new ptr-libevent@0x557d469028b0 size 8192 | libevent_malloc: new ptr-libevent@0x557d468ff1d0 size 16 | setup callback for interface lo 127.0.0.1:4500 fd 522 | add_fd_read_event_handler: new ethX-pe@0x557d468ff1f0 | libevent_malloc: new ptr-libevent@0x557d468ff230 size 128 | libevent_malloc: new ptr-libevent@0x557d468ff2c0 size 16 | setup callback for interface lo 127.0.0.1:500 fd 521 | add_fd_read_event_handler: new ethX-pe@0x557d468ff2e0 | libevent_malloc: new ptr-libevent@0x557d468ff320 size 128 | libevent_malloc: new ptr-libevent@0x557d468ff3b0 size 16 | setup callback for interface eth0 192.1.3.209:4500 fd 520 | add_fd_read_event_handler: new ethX-pe@0x557d468ff3d0 | libevent_malloc: new ptr-libevent@0x557d468ff410 size 128 | libevent_malloc: new ptr-libevent@0x557d468ff4a0 size 16 | setup callback for interface eth0 192.1.3.209:500 fd 519 | add_fd_read_event_handler: new ethX-pe@0x557d468ff4c0 | libevent_malloc: new ptr-libevent@0x557d468ff500 size 128 | libevent_malloc: new ptr-libevent@0x557d468ff590 size 16 | setup callback for interface eth0 192.1.3.1:4500 fd 518 | add_fd_read_event_handler: new ethX-pe@0x557d468ff5b0 | libevent_malloc: new ptr-libevent@0x557d468ff5f0 size 128 | libevent_malloc: new ptr-libevent@0x557d468ff680 size 16 | setup callback for interface eth0 192.1.3.1:500 fd 517 | add_fd_read_event_handler: new ethX-pe@0x557d468ff6a0 | libevent_malloc: new ptr-libevent@0x557d468ff6e0 size 128 | libevent_malloc: new ptr-libevent@0x557d468ff770 size 16 | setup callback for interface eth0 192.1.3.2:4500 fd 516 | add_fd_read_event_handler: new ethX-pe@0x557d468ff790 | libevent_malloc: new ptr-libevent@0x557d468ff7d0 size 128 | libevent_malloc: new ptr-libevent@0x557d468ff860 size 16 | setup callback for interface eth0 192.1.3.2:500 fd 515 | add_fd_read_event_handler: new ethX-pe@0x557d468ff880 | libevent_malloc: new ptr-libevent@0x557d468ff8c0 size 128 | libevent_malloc: new ptr-libevent@0x557d468ff950 size 16 | setup callback for interface eth0 192.1.3.3:4500 fd 514 | add_fd_read_event_handler: new ethX-pe@0x557d468ff970 | libevent_malloc: new ptr-libevent@0x557d468ff9b0 size 128 | libevent_malloc: new ptr-libevent@0x557d468ffa40 size 16 | setup callback for interface eth0 192.1.3.3:500 fd 513 | add_fd_read_event_handler: new ethX-pe@0x557d468ffa60 | libevent_malloc: new ptr-libevent@0x557d468ffaa0 size 128 | libevent_malloc: new ptr-libevent@0x557d468ffb30 size 16 | setup callback for interface eth0 192.1.3.4:4500 fd 512 | add_fd_read_event_handler: new ethX-pe@0x557d468ffb50 | libevent_malloc: new ptr-libevent@0x557d468ffb90 size 128 | libevent_malloc: new ptr-libevent@0x557d469048c0 size 16 | setup callback for interface eth0 192.1.3.4:500 fd 511 | add_fd_read_event_handler: new ethX-pe@0x557d469048e0 | libevent_malloc: new ptr-libevent@0x557d46904920 size 128 | libevent_malloc: new ptr-libevent@0x557d469049b0 size 16 | setup callback for interface eth0 192.1.3.5:4500 fd 510 | add_fd_read_event_handler: new ethX-pe@0x557d469049d0 | libevent_malloc: new ptr-libevent@0x557d46904a10 size 128 | libevent_malloc: new ptr-libevent@0x557d46904aa0 size 16 | setup callback for interface eth0 192.1.3.5:500 fd 509 | add_fd_read_event_handler: new ethX-pe@0x557d46904ac0 | libevent_malloc: new ptr-libevent@0x557d46904b00 size 128 | libevent_malloc: new ptr-libevent@0x557d46904b90 size 16 | setup callback for interface eth0 192.1.3.6:4500 fd 508 | add_fd_read_event_handler: new ethX-pe@0x557d46904bb0 | libevent_malloc: new ptr-libevent@0x557d46904bf0 size 128 | libevent_malloc: new ptr-libevent@0x557d46904c80 size 16 | setup callback for interface eth0 192.1.3.6:500 fd 507 | add_fd_read_event_handler: new ethX-pe@0x557d46904ca0 | libevent_malloc: new ptr-libevent@0x557d46904ce0 size 128 | libevent_malloc: new ptr-libevent@0x557d46904d70 size 16 | setup callback for interface eth0 192.1.3.7:4500 fd 506 | add_fd_read_event_handler: new ethX-pe@0x557d46904d90 | libevent_malloc: new ptr-libevent@0x557d46904dd0 size 128 | libevent_malloc: new ptr-libevent@0x557d46904e60 size 16 | setup callback for interface eth0 192.1.3.7:500 fd 505 | add_fd_read_event_handler: new ethX-pe@0x557d46904e80 | libevent_malloc: new ptr-libevent@0x557d46904ec0 size 128 | libevent_malloc: new ptr-libevent@0x557d46904f50 size 16 | setup callback for interface eth0 192.1.3.8:4500 fd 504 | add_fd_read_event_handler: new ethX-pe@0x557d46904f70 | libevent_malloc: new ptr-libevent@0x557d46904fb0 size 128 | libevent_malloc: new ptr-libevent@0x557d46905040 size 16 | setup callback for interface eth0 192.1.3.8:500 fd 503 | add_fd_read_event_handler: new ethX-pe@0x557d46905060 | libevent_malloc: new ptr-libevent@0x557d469050a0 size 128 | libevent_malloc: new ptr-libevent@0x557d46905130 size 16 | setup callback for interface eth0 192.1.3.9:4500 fd 502 | add_fd_read_event_handler: new ethX-pe@0x557d46905150 | libevent_malloc: new ptr-libevent@0x557d46905190 size 128 | libevent_malloc: new ptr-libevent@0x557d46905220 size 16 | setup callback for interface eth0 192.1.3.9:500 fd 501 | add_fd_read_event_handler: new ethX-pe@0x557d46905240 | libevent_malloc: new ptr-libevent@0x557d46905280 size 128 | libevent_malloc: new ptr-libevent@0x557d46905310 size 16 | setup callback for interface eth0 192.1.3.10:4500 fd 500 | add_fd_read_event_handler: new ethX-pe@0x557d46905330 | libevent_malloc: new ptr-libevent@0x557d46905370 size 128 | libevent_malloc: new ptr-libevent@0x557d46905400 size 16 | setup callback for interface eth0 192.1.3.10:500 fd 499 | add_fd_read_event_handler: new ethX-pe@0x557d46905420 | libevent_malloc: new ptr-libevent@0x557d46905460 size 128 | libevent_malloc: new ptr-libevent@0x557d469054f0 size 16 | setup callback for interface eth0 192.1.3.11:4500 fd 498 | add_fd_read_event_handler: new ethX-pe@0x557d46905510 | libevent_malloc: new ptr-libevent@0x557d46905550 size 128 | libevent_malloc: new ptr-libevent@0x557d469055e0 size 16 | setup callback for interface eth0 192.1.3.11:500 fd 497 | add_fd_read_event_handler: new ethX-pe@0x557d46905600 | libevent_malloc: new ptr-libevent@0x557d46905640 size 128 | libevent_malloc: new ptr-libevent@0x557d469056d0 size 16 | setup callback for interface eth0 192.1.3.12:4500 fd 496 | add_fd_read_event_handler: new ethX-pe@0x557d469056f0 | libevent_malloc: new ptr-libevent@0x557d46905730 size 128 | libevent_malloc: new ptr-libevent@0x557d469057c0 size 16 | setup callback for interface eth0 192.1.3.12:500 fd 495 | add_fd_read_event_handler: new ethX-pe@0x557d469057e0 | libevent_malloc: new ptr-libevent@0x557d46905820 size 128 | libevent_malloc: new ptr-libevent@0x557d469058b0 size 16 | setup callback for interface eth0 192.1.3.13:4500 fd 494 | add_fd_read_event_handler: new ethX-pe@0x557d469058d0 | libevent_malloc: new ptr-libevent@0x557d46905910 size 128 | libevent_malloc: new ptr-libevent@0x557d469059a0 size 16 | setup callback for interface eth0 192.1.3.13:500 fd 493 | add_fd_read_event_handler: new ethX-pe@0x557d469059c0 | libevent_malloc: new ptr-libevent@0x557d46905a00 size 128 | libevent_malloc: new ptr-libevent@0x557d46905a90 size 16 | setup callback for interface eth0 192.1.3.14:4500 fd 492 | add_fd_read_event_handler: new ethX-pe@0x557d46905ab0 | libevent_malloc: new ptr-libevent@0x557d46905af0 size 128 | libevent_malloc: new ptr-libevent@0x557d46905b80 size 16 | setup callback for interface eth0 192.1.3.14:500 fd 491 | add_fd_read_event_handler: new ethX-pe@0x557d46905ba0 | libevent_malloc: new ptr-libevent@0x557d46905be0 size 128 | libevent_malloc: new ptr-libevent@0x557d46905c70 size 16 | setup callback for interface eth0 192.1.3.15:4500 fd 490 | add_fd_read_event_handler: new ethX-pe@0x557d46905c90 | libevent_malloc: new ptr-libevent@0x557d46905cd0 size 128 | libevent_malloc: new ptr-libevent@0x557d46905d60 size 16 | setup callback for interface eth0 192.1.3.15:500 fd 489 | add_fd_read_event_handler: new ethX-pe@0x557d46905d80 | libevent_malloc: new ptr-libevent@0x557d46905dc0 size 128 | libevent_malloc: new ptr-libevent@0x557d46905e50 size 16 | setup callback for interface eth0 192.1.3.16:4500 fd 488 | add_fd_read_event_handler: new ethX-pe@0x557d46905e70 | libevent_malloc: new ptr-libevent@0x557d46905eb0 size 128 | libevent_malloc: new ptr-libevent@0x557d46905f40 size 16 | setup callback for interface eth0 192.1.3.16:500 fd 487 | add_fd_read_event_handler: new ethX-pe@0x557d46905f60 | libevent_malloc: new ptr-libevent@0x557d46905fa0 size 128 | libevent_malloc: new ptr-libevent@0x557d46906030 size 16 | setup callback for interface eth0 192.1.3.17:4500 fd 486 | add_fd_read_event_handler: new ethX-pe@0x557d46906050 | libevent_malloc: new ptr-libevent@0x557d46906090 size 128 | libevent_malloc: new ptr-libevent@0x557d46906120 size 16 | setup callback for interface eth0 192.1.3.17:500 fd 485 | add_fd_read_event_handler: new ethX-pe@0x557d46906140 | libevent_malloc: new ptr-libevent@0x557d46906180 size 128 | libevent_malloc: new ptr-libevent@0x557d46906210 size 16 | setup callback for interface eth0 192.1.3.18:4500 fd 484 | add_fd_read_event_handler: new ethX-pe@0x557d46906230 | libevent_malloc: new ptr-libevent@0x557d46906270 size 128 | libevent_malloc: new ptr-libevent@0x557d46906300 size 16 | setup callback for interface eth0 192.1.3.18:500 fd 483 | add_fd_read_event_handler: new ethX-pe@0x557d46906320 | libevent_malloc: new ptr-libevent@0x557d46906360 size 128 | libevent_malloc: new ptr-libevent@0x557d469063f0 size 16 | setup callback for interface eth0 192.1.3.19:4500 fd 482 | add_fd_read_event_handler: new ethX-pe@0x557d46906410 | libevent_malloc: new ptr-libevent@0x557d46906450 size 128 | libevent_malloc: new ptr-libevent@0x557d469064e0 size 16 | setup callback for interface eth0 192.1.3.19:500 fd 481 | add_fd_read_event_handler: new ethX-pe@0x557d46906500 | libevent_malloc: new ptr-libevent@0x557d46906540 size 128 | libevent_malloc: new ptr-libevent@0x557d469065d0 size 16 | setup callback for interface eth0 192.1.3.20:4500 fd 480 | add_fd_read_event_handler: new ethX-pe@0x557d469065f0 | libevent_malloc: new ptr-libevent@0x557d46906630 size 128 | libevent_malloc: new ptr-libevent@0x557d469066c0 size 16 | setup callback for interface eth0 192.1.3.20:500 fd 479 | add_fd_read_event_handler: new ethX-pe@0x557d469066e0 | libevent_malloc: new ptr-libevent@0x557d46906720 size 128 | libevent_malloc: new ptr-libevent@0x557d469067b0 size 16 | setup callback for interface eth0 192.1.3.21:4500 fd 478 | add_fd_read_event_handler: new ethX-pe@0x557d469067d0 | libevent_malloc: new ptr-libevent@0x557d46906810 size 128 | libevent_malloc: new ptr-libevent@0x557d469068a0 size 16 | setup callback for interface eth0 192.1.3.21:500 fd 477 | add_fd_read_event_handler: new ethX-pe@0x557d469068c0 | libevent_malloc: new ptr-libevent@0x557d46906900 size 128 | libevent_malloc: new ptr-libevent@0x557d46906990 size 16 | setup callback for interface eth0 192.1.3.22:4500 fd 476 | add_fd_read_event_handler: new ethX-pe@0x557d469069b0 | libevent_malloc: new ptr-libevent@0x557d469069f0 size 128 | libevent_malloc: new ptr-libevent@0x557d46906a80 size 16 | setup callback for interface eth0 192.1.3.22:500 fd 475 | add_fd_read_event_handler: new ethX-pe@0x557d46906aa0 | libevent_malloc: new ptr-libevent@0x557d46916220 size 128 | libevent_malloc: new ptr-libevent@0x557d46906ae0 size 16 | setup callback for interface eth0 192.1.3.23:4500 fd 474 | add_fd_read_event_handler: new ethX-pe@0x557d46906b00 | libevent_malloc: new ptr-libevent@0x557d469162b0 size 128 | libevent_malloc: new ptr-libevent@0x557d46916340 size 16 | setup callback for interface eth0 192.1.3.23:500 fd 473 | add_fd_read_event_handler: new ethX-pe@0x557d46916360 | libevent_malloc: new ptr-libevent@0x557d469163a0 size 128 | libevent_malloc: new ptr-libevent@0x557d46916430 size 16 | setup callback for interface eth0 192.1.3.24:4500 fd 472 | add_fd_read_event_handler: new ethX-pe@0x557d46916450 | libevent_malloc: new ptr-libevent@0x557d46916490 size 128 | libevent_malloc: new ptr-libevent@0x557d46916520 size 16 | setup callback for interface eth0 192.1.3.24:500 fd 471 | add_fd_read_event_handler: new ethX-pe@0x557d46916540 | libevent_malloc: new ptr-libevent@0x557d46916580 size 128 | libevent_malloc: new ptr-libevent@0x557d46916610 size 16 | setup callback for interface eth0 192.1.3.25:4500 fd 470 | add_fd_read_event_handler: new ethX-pe@0x557d46916630 | libevent_malloc: new ptr-libevent@0x557d46916670 size 128 | libevent_malloc: new ptr-libevent@0x557d46916700 size 16 | setup callback for interface eth0 192.1.3.25:500 fd 469 | add_fd_read_event_handler: new ethX-pe@0x557d46916720 | libevent_malloc: new ptr-libevent@0x557d46916760 size 128 | libevent_malloc: new ptr-libevent@0x557d469167f0 size 16 | setup callback for interface eth0 192.1.3.26:4500 fd 468 | add_fd_read_event_handler: new ethX-pe@0x557d46916810 | libevent_malloc: new ptr-libevent@0x557d46916850 size 128 | libevent_malloc: new ptr-libevent@0x557d469168e0 size 16 | setup callback for interface eth0 192.1.3.26:500 fd 467 | add_fd_read_event_handler: new ethX-pe@0x557d46916900 | libevent_malloc: new ptr-libevent@0x557d46916940 size 128 | libevent_malloc: new ptr-libevent@0x557d469169d0 size 16 | setup callback for interface eth0 192.1.3.27:4500 fd 466 | add_fd_read_event_handler: new ethX-pe@0x557d469169f0 | libevent_malloc: new ptr-libevent@0x557d46916a30 size 128 | libevent_malloc: new ptr-libevent@0x557d46916ac0 size 16 | setup callback for interface eth0 192.1.3.27:500 fd 465 | add_fd_read_event_handler: new ethX-pe@0x557d46916ae0 | libevent_malloc: new ptr-libevent@0x557d46916b20 size 128 | libevent_malloc: new ptr-libevent@0x557d46916bb0 size 16 | setup callback for interface eth0 192.1.3.28:4500 fd 464 | add_fd_read_event_handler: new ethX-pe@0x557d46916bd0 | libevent_malloc: new ptr-libevent@0x557d46916c10 size 128 | libevent_malloc: new ptr-libevent@0x557d46916ca0 size 16 | setup callback for interface eth0 192.1.3.28:500 fd 463 | add_fd_read_event_handler: new ethX-pe@0x557d46916cc0 | libevent_malloc: new ptr-libevent@0x557d46916d00 size 128 | libevent_malloc: new ptr-libevent@0x557d46916d90 size 16 | setup callback for interface eth0 192.1.3.29:4500 fd 462 | add_fd_read_event_handler: new ethX-pe@0x557d46916db0 | libevent_malloc: new ptr-libevent@0x557d46916df0 size 128 | libevent_malloc: new ptr-libevent@0x557d46916e80 size 16 | setup callback for interface eth0 192.1.3.29:500 fd 461 | add_fd_read_event_handler: new ethX-pe@0x557d46916ea0 | libevent_malloc: new ptr-libevent@0x557d46916ee0 size 128 | libevent_malloc: new ptr-libevent@0x557d46916f70 size 16 | setup callback for interface eth0 192.1.3.30:4500 fd 460 | add_fd_read_event_handler: new ethX-pe@0x557d46916f90 | libevent_malloc: new ptr-libevent@0x557d46916fd0 size 128 | libevent_malloc: new ptr-libevent@0x557d46917060 size 16 | setup callback for interface eth0 192.1.3.30:500 fd 459 | add_fd_read_event_handler: new ethX-pe@0x557d46917080 | libevent_malloc: new ptr-libevent@0x557d469170c0 size 128 | libevent_malloc: new ptr-libevent@0x557d46917150 size 16 | setup callback for interface eth0 192.1.3.31:4500 fd 458 | add_fd_read_event_handler: new ethX-pe@0x557d46917170 | libevent_malloc: new ptr-libevent@0x557d469171b0 size 128 | libevent_malloc: new ptr-libevent@0x557d46917240 size 16 | setup callback for interface eth0 192.1.3.31:500 fd 457 | add_fd_read_event_handler: new ethX-pe@0x557d46917260 | libevent_malloc: new ptr-libevent@0x557d469172a0 size 128 | libevent_malloc: new ptr-libevent@0x557d46917330 size 16 | setup callback for interface eth0 192.1.3.32:4500 fd 456 | add_fd_read_event_handler: new ethX-pe@0x557d46917350 | libevent_malloc: new ptr-libevent@0x557d46917390 size 128 | libevent_malloc: new ptr-libevent@0x557d46917420 size 16 | setup callback for interface eth0 192.1.3.32:500 fd 455 | add_fd_read_event_handler: new ethX-pe@0x557d46917440 | libevent_malloc: new ptr-libevent@0x557d46917480 size 128 | libevent_malloc: new ptr-libevent@0x557d46917510 size 16 | setup callback for interface eth0 192.1.3.33:4500 fd 454 | add_fd_read_event_handler: new ethX-pe@0x557d46917530 | libevent_malloc: new ptr-libevent@0x557d46917570 size 128 | libevent_malloc: new ptr-libevent@0x557d46917600 size 16 | setup callback for interface eth0 192.1.3.33:500 fd 453 | add_fd_read_event_handler: new ethX-pe@0x557d46917620 | libevent_malloc: new ptr-libevent@0x557d46917660 size 128 | libevent_malloc: new ptr-libevent@0x557d469176f0 size 16 | setup callback for interface eth0 192.1.3.34:4500 fd 452 | add_fd_read_event_handler: new ethX-pe@0x557d46917710 | libevent_malloc: new ptr-libevent@0x557d46917750 size 128 | libevent_malloc: new ptr-libevent@0x557d469177e0 size 16 | setup callback for interface eth0 192.1.3.34:500 fd 451 | add_fd_read_event_handler: new ethX-pe@0x557d46917800 | libevent_malloc: new ptr-libevent@0x557d46917840 size 128 | libevent_malloc: new ptr-libevent@0x557d469178d0 size 16 | setup callback for interface eth0 192.1.3.35:4500 fd 450 | add_fd_read_event_handler: new ethX-pe@0x557d469178f0 | libevent_malloc: new ptr-libevent@0x557d46917930 size 128 | libevent_malloc: new ptr-libevent@0x557d469179c0 size 16 | setup callback for interface eth0 192.1.3.35:500 fd 449 | add_fd_read_event_handler: new ethX-pe@0x557d469179e0 | libevent_malloc: new ptr-libevent@0x557d46917a20 size 128 | libevent_malloc: new ptr-libevent@0x557d46917ab0 size 16 | setup callback for interface eth0 192.1.3.36:4500 fd 448 | add_fd_read_event_handler: new ethX-pe@0x557d46917ad0 | libevent_malloc: new ptr-libevent@0x557d46917b10 size 128 | libevent_malloc: new ptr-libevent@0x557d46917ba0 size 16 | setup callback for interface eth0 192.1.3.36:500 fd 447 | add_fd_read_event_handler: new ethX-pe@0x557d46917bc0 | libevent_malloc: new ptr-libevent@0x557d46917c00 size 128 | libevent_malloc: new ptr-libevent@0x557d46917c90 size 16 | setup callback for interface eth0 192.1.3.37:4500 fd 446 | add_fd_read_event_handler: new ethX-pe@0x557d46917cb0 | libevent_malloc: new ptr-libevent@0x557d46917cf0 size 128 | libevent_malloc: new ptr-libevent@0x557d46917d80 size 16 | setup callback for interface eth0 192.1.3.37:500 fd 445 | add_fd_read_event_handler: new ethX-pe@0x557d46917da0 | libevent_malloc: new ptr-libevent@0x557d46917de0 size 128 | libevent_malloc: new ptr-libevent@0x557d46917e70 size 16 | setup callback for interface eth0 192.1.3.38:4500 fd 444 | add_fd_read_event_handler: new ethX-pe@0x557d46917e90 | libevent_malloc: new ptr-libevent@0x557d46917ed0 size 128 | libevent_malloc: new ptr-libevent@0x557d46917f60 size 16 | setup callback for interface eth0 192.1.3.38:500 fd 443 | add_fd_read_event_handler: new ethX-pe@0x557d46917f80 | libevent_malloc: new ptr-libevent@0x557d46917fc0 size 128 | libevent_malloc: new ptr-libevent@0x557d46918050 size 16 | setup callback for interface eth0 192.1.3.39:4500 fd 442 | add_fd_read_event_handler: new ethX-pe@0x557d46918070 | libevent_malloc: new ptr-libevent@0x557d469180b0 size 128 | libevent_malloc: new ptr-libevent@0x557d46918140 size 16 | setup callback for interface eth0 192.1.3.39:500 fd 441 | add_fd_read_event_handler: new ethX-pe@0x557d46918160 | libevent_malloc: new ptr-libevent@0x557d469181a0 size 128 | libevent_malloc: new ptr-libevent@0x557d46918230 size 16 | setup callback for interface eth0 192.1.3.40:4500 fd 440 | add_fd_read_event_handler: new ethX-pe@0x557d46918250 | libevent_malloc: new ptr-libevent@0x557d46918290 size 128 | libevent_malloc: new ptr-libevent@0x557d46918320 size 16 | setup callback for interface eth0 192.1.3.40:500 fd 439 | add_fd_read_event_handler: new ethX-pe@0x557d46918340 | libevent_malloc: new ptr-libevent@0x557d46918380 size 128 | libevent_malloc: new ptr-libevent@0x557d46918410 size 16 | setup callback for interface eth0 192.1.3.41:4500 fd 438 | add_fd_read_event_handler: new ethX-pe@0x557d46918430 | libevent_malloc: new ptr-libevent@0x557d46918470 size 128 | libevent_malloc: new ptr-libevent@0x557d46918500 size 16 | setup callback for interface eth0 192.1.3.41:500 fd 437 | add_fd_read_event_handler: new ethX-pe@0x557d46918520 | libevent_malloc: new ptr-libevent@0x557d46918560 size 128 | libevent_malloc: new ptr-libevent@0x557d469185f0 size 16 | setup callback for interface eth0 192.1.3.42:4500 fd 436 | add_fd_read_event_handler: new ethX-pe@0x557d46918610 | libevent_malloc: new ptr-libevent@0x557d46918650 size 128 | libevent_malloc: new ptr-libevent@0x557d469186e0 size 16 | setup callback for interface eth0 192.1.3.42:500 fd 435 | add_fd_read_event_handler: new ethX-pe@0x557d46918700 | libevent_malloc: new ptr-libevent@0x557d46918740 size 128 | libevent_malloc: new ptr-libevent@0x557d469187d0 size 16 | setup callback for interface eth0 192.1.3.43:4500 fd 434 | add_fd_read_event_handler: new ethX-pe@0x557d469187f0 | libevent_malloc: new ptr-libevent@0x557d46918830 size 128 | libevent_malloc: new ptr-libevent@0x557d469188c0 size 16 | setup callback for interface eth0 192.1.3.43:500 fd 433 | add_fd_read_event_handler: new ethX-pe@0x557d469188e0 | libevent_malloc: new ptr-libevent@0x557d46918920 size 128 | libevent_malloc: new ptr-libevent@0x557d469189b0 size 16 | setup callback for interface eth0 192.1.3.44:4500 fd 432 | add_fd_read_event_handler: new ethX-pe@0x557d469189d0 | libevent_malloc: new ptr-libevent@0x557d46918a10 size 128 | libevent_malloc: new ptr-libevent@0x557d46918aa0 size 16 | setup callback for interface eth0 192.1.3.44:500 fd 431 | add_fd_read_event_handler: new ethX-pe@0x557d46918ac0 | libevent_malloc: new ptr-libevent@0x557d46918b00 size 128 | libevent_malloc: new ptr-libevent@0x557d46918b90 size 16 | setup callback for interface eth0 192.1.3.45:4500 fd 430 | add_fd_read_event_handler: new ethX-pe@0x557d46918bb0 | libevent_malloc: new ptr-libevent@0x557d46918bf0 size 128 | libevent_malloc: new ptr-libevent@0x557d46918c80 size 16 | setup callback for interface eth0 192.1.3.45:500 fd 429 | add_fd_read_event_handler: new ethX-pe@0x557d46918ca0 | libevent_malloc: new ptr-libevent@0x557d46918ce0 size 128 | libevent_malloc: new ptr-libevent@0x557d46918d70 size 16 | setup callback for interface eth0 192.1.3.46:4500 fd 428 | add_fd_read_event_handler: new ethX-pe@0x557d46918d90 | libevent_malloc: new ptr-libevent@0x557d46918dd0 size 128 | libevent_malloc: new ptr-libevent@0x557d46918e60 size 16 | setup callback for interface eth0 192.1.3.46:500 fd 427 | add_fd_read_event_handler: new ethX-pe@0x557d46918e80 | libevent_malloc: new ptr-libevent@0x557d46918ec0 size 128 | libevent_malloc: new ptr-libevent@0x557d46918f50 size 16 | setup callback for interface eth0 192.1.3.47:4500 fd 426 | add_fd_read_event_handler: new ethX-pe@0x557d46918f70 | libevent_malloc: new ptr-libevent@0x557d46918fb0 size 128 | libevent_malloc: new ptr-libevent@0x557d46919040 size 16 | setup callback for interface eth0 192.1.3.47:500 fd 425 | add_fd_read_event_handler: new ethX-pe@0x557d46919060 | libevent_malloc: new ptr-libevent@0x557d469190a0 size 128 | libevent_malloc: new ptr-libevent@0x557d46919130 size 16 | setup callback for interface eth0 192.1.3.48:4500 fd 424 | add_fd_read_event_handler: new ethX-pe@0x557d46919150 | libevent_malloc: new ptr-libevent@0x557d46919190 size 128 | libevent_malloc: new ptr-libevent@0x557d46919220 size 16 | setup callback for interface eth0 192.1.3.48:500 fd 423 | add_fd_read_event_handler: new ethX-pe@0x557d46919240 | libevent_malloc: new ptr-libevent@0x557d46919280 size 128 | libevent_malloc: new ptr-libevent@0x557d46919310 size 16 | setup callback for interface eth0 192.1.3.49:4500 fd 422 | add_fd_read_event_handler: new ethX-pe@0x557d46919330 | libevent_malloc: new ptr-libevent@0x557d46919370 size 128 | libevent_malloc: new ptr-libevent@0x557d46919400 size 16 | setup callback for interface eth0 192.1.3.49:500 fd 421 | add_fd_read_event_handler: new ethX-pe@0x557d46919420 | libevent_malloc: new ptr-libevent@0x557d46919460 size 128 | libevent_malloc: new ptr-libevent@0x557d469194f0 size 16 | setup callback for interface eth0 192.1.3.50:4500 fd 420 | add_fd_read_event_handler: new ethX-pe@0x557d46919510 | libevent_malloc: new ptr-libevent@0x557d46919550 size 128 | libevent_malloc: new ptr-libevent@0x557d469195e0 size 16 | setup callback for interface eth0 192.1.3.50:500 fd 419 | add_fd_read_event_handler: new ethX-pe@0x557d46919600 | libevent_malloc: new ptr-libevent@0x557d46919640 size 128 | libevent_malloc: new ptr-libevent@0x557d469196d0 size 16 | setup callback for interface eth0 192.1.3.51:4500 fd 418 | add_fd_read_event_handler: new ethX-pe@0x557d469196f0 | libevent_malloc: new ptr-libevent@0x557d46919730 size 128 | libevent_malloc: new ptr-libevent@0x557d469197c0 size 16 | setup callback for interface eth0 192.1.3.51:500 fd 417 | add_fd_read_event_handler: new ethX-pe@0x557d469197e0 | libevent_malloc: new ptr-libevent@0x557d46919820 size 128 | libevent_malloc: new ptr-libevent@0x557d469198b0 size 16 | setup callback for interface eth0 192.1.3.52:4500 fd 416 | add_fd_read_event_handler: new ethX-pe@0x557d469198d0 | libevent_malloc: new ptr-libevent@0x557d46919910 size 128 | libevent_malloc: new ptr-libevent@0x557d469199a0 size 16 | setup callback for interface eth0 192.1.3.52:500 fd 415 | add_fd_read_event_handler: new ethX-pe@0x557d469199c0 | libevent_malloc: new ptr-libevent@0x557d46919a00 size 128 | libevent_malloc: new ptr-libevent@0x557d46919a90 size 16 | setup callback for interface eth0 192.1.3.53:4500 fd 414 | add_fd_read_event_handler: new ethX-pe@0x557d46919ab0 | libevent_malloc: new ptr-libevent@0x557d46919af0 size 128 | libevent_malloc: new ptr-libevent@0x557d46919b80 size 16 | setup callback for interface eth0 192.1.3.53:500 fd 413 | add_fd_read_event_handler: new ethX-pe@0x557d46919ba0 | libevent_malloc: new ptr-libevent@0x557d46919be0 size 128 | libevent_malloc: new ptr-libevent@0x557d46919c70 size 16 | setup callback for interface eth0 192.1.3.54:4500 fd 412 | add_fd_read_event_handler: new ethX-pe@0x557d46919c90 | libevent_malloc: new ptr-libevent@0x557d46919cd0 size 128 | libevent_malloc: new ptr-libevent@0x557d46919d60 size 16 | setup callback for interface eth0 192.1.3.54:500 fd 411 | add_fd_read_event_handler: new ethX-pe@0x557d46919d80 | libevent_malloc: new ptr-libevent@0x557d46919dc0 size 128 | libevent_malloc: new ptr-libevent@0x557d46919e50 size 16 | setup callback for interface eth0 192.1.3.55:4500 fd 410 | add_fd_read_event_handler: new ethX-pe@0x557d46919e70 | libevent_malloc: new ptr-libevent@0x557d46919eb0 size 128 | libevent_malloc: new ptr-libevent@0x557d46919f40 size 16 | setup callback for interface eth0 192.1.3.55:500 fd 409 | add_fd_read_event_handler: new ethX-pe@0x557d46919f60 | libevent_malloc: new ptr-libevent@0x557d46919fa0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691a030 size 16 | setup callback for interface eth0 192.1.3.56:4500 fd 408 | add_fd_read_event_handler: new ethX-pe@0x557d4691a050 | libevent_malloc: new ptr-libevent@0x557d4691a090 size 128 | libevent_malloc: new ptr-libevent@0x557d4691a120 size 16 | setup callback for interface eth0 192.1.3.56:500 fd 407 | add_fd_read_event_handler: new ethX-pe@0x557d4691a140 | libevent_malloc: new ptr-libevent@0x557d4691a180 size 128 | libevent_malloc: new ptr-libevent@0x557d4691a210 size 16 | setup callback for interface eth0 192.1.3.57:4500 fd 406 | add_fd_read_event_handler: new ethX-pe@0x557d4691a230 | libevent_malloc: new ptr-libevent@0x557d4691a270 size 128 | libevent_malloc: new ptr-libevent@0x557d4691a300 size 16 | setup callback for interface eth0 192.1.3.57:500 fd 405 | add_fd_read_event_handler: new ethX-pe@0x557d4691a320 | libevent_malloc: new ptr-libevent@0x557d4691a360 size 128 | libevent_malloc: new ptr-libevent@0x557d4691a3f0 size 16 | setup callback for interface eth0 192.1.3.58:4500 fd 404 | add_fd_read_event_handler: new ethX-pe@0x557d4691a410 | libevent_malloc: new ptr-libevent@0x557d4691a450 size 128 | libevent_malloc: new ptr-libevent@0x557d4691a4e0 size 16 | setup callback for interface eth0 192.1.3.58:500 fd 403 | add_fd_read_event_handler: new ethX-pe@0x557d4691a500 | libevent_malloc: new ptr-libevent@0x557d4691a540 size 128 | libevent_malloc: new ptr-libevent@0x557d4691a5d0 size 16 | setup callback for interface eth0 192.1.3.59:4500 fd 402 | add_fd_read_event_handler: new ethX-pe@0x557d4691a5f0 | libevent_malloc: new ptr-libevent@0x557d4691a630 size 128 | libevent_malloc: new ptr-libevent@0x557d4691a6c0 size 16 | setup callback for interface eth0 192.1.3.59:500 fd 401 | add_fd_read_event_handler: new ethX-pe@0x557d4691a6e0 | libevent_malloc: new ptr-libevent@0x557d4691a720 size 128 | libevent_malloc: new ptr-libevent@0x557d4691a7b0 size 16 | setup callback for interface eth0 192.1.3.60:4500 fd 400 | add_fd_read_event_handler: new ethX-pe@0x557d4691a7d0 | libevent_malloc: new ptr-libevent@0x557d4691a810 size 128 | libevent_malloc: new ptr-libevent@0x557d4691a8a0 size 16 | setup callback for interface eth0 192.1.3.60:500 fd 399 | add_fd_read_event_handler: new ethX-pe@0x557d4691a8c0 | libevent_malloc: new ptr-libevent@0x557d4691a900 size 128 | libevent_malloc: new ptr-libevent@0x557d4691a990 size 16 | setup callback for interface eth0 192.1.3.61:4500 fd 398 | add_fd_read_event_handler: new ethX-pe@0x557d4691a9b0 | libevent_malloc: new ptr-libevent@0x557d4691a9f0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691aa80 size 16 | setup callback for interface eth0 192.1.3.61:500 fd 397 | add_fd_read_event_handler: new ethX-pe@0x557d4691aaa0 | libevent_malloc: new ptr-libevent@0x557d4691aae0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691ab70 size 16 | setup callback for interface eth0 192.1.3.62:4500 fd 396 | add_fd_read_event_handler: new ethX-pe@0x557d4691ab90 | libevent_malloc: new ptr-libevent@0x557d4691abd0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691ac60 size 16 | setup callback for interface eth0 192.1.3.62:500 fd 395 | add_fd_read_event_handler: new ethX-pe@0x557d4691ac80 | libevent_malloc: new ptr-libevent@0x557d4691acc0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691ad50 size 16 | setup callback for interface eth0 192.1.3.63:4500 fd 394 | add_fd_read_event_handler: new ethX-pe@0x557d4691ad70 | libevent_malloc: new ptr-libevent@0x557d4691adb0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691ae40 size 16 | setup callback for interface eth0 192.1.3.63:500 fd 393 | add_fd_read_event_handler: new ethX-pe@0x557d4691ae60 | libevent_malloc: new ptr-libevent@0x557d4691aea0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691af30 size 16 | setup callback for interface eth0 192.1.3.64:4500 fd 392 | add_fd_read_event_handler: new ethX-pe@0x557d4691af50 | libevent_malloc: new ptr-libevent@0x557d4691af90 size 128 | libevent_malloc: new ptr-libevent@0x557d4691b020 size 16 | setup callback for interface eth0 192.1.3.64:500 fd 391 | add_fd_read_event_handler: new ethX-pe@0x557d4691b040 | libevent_malloc: new ptr-libevent@0x557d4691b080 size 128 | libevent_malloc: new ptr-libevent@0x557d4691b110 size 16 | setup callback for interface eth0 192.1.3.65:4500 fd 390 | add_fd_read_event_handler: new ethX-pe@0x557d4691b130 | libevent_malloc: new ptr-libevent@0x557d4691b170 size 128 | libevent_malloc: new ptr-libevent@0x557d4691b200 size 16 | setup callback for interface eth0 192.1.3.65:500 fd 389 | add_fd_read_event_handler: new ethX-pe@0x557d4691b220 | libevent_malloc: new ptr-libevent@0x557d4691b260 size 128 | libevent_malloc: new ptr-libevent@0x557d4691b2f0 size 16 | setup callback for interface eth0 192.1.3.66:4500 fd 388 | add_fd_read_event_handler: new ethX-pe@0x557d4691b310 | libevent_malloc: new ptr-libevent@0x557d4691b350 size 128 | libevent_malloc: new ptr-libevent@0x557d4691b3e0 size 16 | setup callback for interface eth0 192.1.3.66:500 fd 387 | add_fd_read_event_handler: new ethX-pe@0x557d4691b400 | libevent_malloc: new ptr-libevent@0x557d4691b440 size 128 | libevent_malloc: new ptr-libevent@0x557d4691b4d0 size 16 | setup callback for interface eth0 192.1.3.67:4500 fd 386 | add_fd_read_event_handler: new ethX-pe@0x557d4691b4f0 | libevent_malloc: new ptr-libevent@0x557d4691b530 size 128 | libevent_malloc: new ptr-libevent@0x557d4691b5c0 size 16 | setup callback for interface eth0 192.1.3.67:500 fd 385 | add_fd_read_event_handler: new ethX-pe@0x557d4691b5e0 | libevent_malloc: new ptr-libevent@0x557d4691b620 size 128 | libevent_malloc: new ptr-libevent@0x557d4691b6b0 size 16 | setup callback for interface eth0 192.1.3.68:4500 fd 384 | add_fd_read_event_handler: new ethX-pe@0x557d4691b6d0 | libevent_malloc: new ptr-libevent@0x557d4691b710 size 128 | libevent_malloc: new ptr-libevent@0x557d4691b7a0 size 16 | setup callback for interface eth0 192.1.3.68:500 fd 383 | add_fd_read_event_handler: new ethX-pe@0x557d4691b7c0 | libevent_malloc: new ptr-libevent@0x557d4691b800 size 128 | libevent_malloc: new ptr-libevent@0x557d4691b890 size 16 | setup callback for interface eth0 192.1.3.69:4500 fd 382 | add_fd_read_event_handler: new ethX-pe@0x557d4691b8b0 | libevent_malloc: new ptr-libevent@0x557d4691b8f0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691b980 size 16 | setup callback for interface eth0 192.1.3.69:500 fd 381 | add_fd_read_event_handler: new ethX-pe@0x557d4691b9a0 | libevent_malloc: new ptr-libevent@0x557d4691b9e0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691ba70 size 16 | setup callback for interface eth0 192.1.3.70:4500 fd 380 | add_fd_read_event_handler: new ethX-pe@0x557d4691ba90 | libevent_malloc: new ptr-libevent@0x557d4691bad0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691bb60 size 16 | setup callback for interface eth0 192.1.3.70:500 fd 379 | add_fd_read_event_handler: new ethX-pe@0x557d4691bb80 | libevent_malloc: new ptr-libevent@0x557d4691bbc0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691bc50 size 16 | setup callback for interface eth0 192.1.3.71:4500 fd 378 | add_fd_read_event_handler: new ethX-pe@0x557d4691bc70 | libevent_malloc: new ptr-libevent@0x557d4691bcb0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691bd40 size 16 | setup callback for interface eth0 192.1.3.71:500 fd 377 | add_fd_read_event_handler: new ethX-pe@0x557d4691bd60 | libevent_malloc: new ptr-libevent@0x557d4691bda0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691be30 size 16 | setup callback for interface eth0 192.1.3.72:4500 fd 376 | add_fd_read_event_handler: new ethX-pe@0x557d4691be50 | libevent_malloc: new ptr-libevent@0x557d4691be90 size 128 | libevent_malloc: new ptr-libevent@0x557d4691bf20 size 16 | setup callback for interface eth0 192.1.3.72:500 fd 375 | add_fd_read_event_handler: new ethX-pe@0x557d4691bf40 | libevent_malloc: new ptr-libevent@0x557d4691bf80 size 128 | libevent_malloc: new ptr-libevent@0x557d4691c010 size 16 | setup callback for interface eth0 192.1.3.73:4500 fd 374 | add_fd_read_event_handler: new ethX-pe@0x557d4691c030 | libevent_malloc: new ptr-libevent@0x557d4691c070 size 128 | libevent_malloc: new ptr-libevent@0x557d4691c100 size 16 | setup callback for interface eth0 192.1.3.73:500 fd 373 | add_fd_read_event_handler: new ethX-pe@0x557d4691c120 | libevent_malloc: new ptr-libevent@0x557d4691c160 size 128 | libevent_malloc: new ptr-libevent@0x557d4691c1f0 size 16 | setup callback for interface eth0 192.1.3.74:4500 fd 372 | add_fd_read_event_handler: new ethX-pe@0x557d4691c210 | libevent_malloc: new ptr-libevent@0x557d4691c250 size 128 | libevent_malloc: new ptr-libevent@0x557d4691c2e0 size 16 | setup callback for interface eth0 192.1.3.74:500 fd 371 | add_fd_read_event_handler: new ethX-pe@0x557d4691c300 | libevent_malloc: new ptr-libevent@0x557d4691c340 size 128 | libevent_malloc: new ptr-libevent@0x557d4691c3d0 size 16 | setup callback for interface eth0 192.1.3.75:4500 fd 370 | add_fd_read_event_handler: new ethX-pe@0x557d4691c3f0 | libevent_malloc: new ptr-libevent@0x557d4691c430 size 128 | libevent_malloc: new ptr-libevent@0x557d4691c4c0 size 16 | setup callback for interface eth0 192.1.3.75:500 fd 369 | add_fd_read_event_handler: new ethX-pe@0x557d4691c4e0 | libevent_malloc: new ptr-libevent@0x557d4691c520 size 128 | libevent_malloc: new ptr-libevent@0x557d4691c5b0 size 16 | setup callback for interface eth0 192.1.3.76:4500 fd 368 | add_fd_read_event_handler: new ethX-pe@0x557d4691c5d0 | libevent_malloc: new ptr-libevent@0x557d4691c610 size 128 | libevent_malloc: new ptr-libevent@0x557d4691c6a0 size 16 | setup callback for interface eth0 192.1.3.76:500 fd 367 | add_fd_read_event_handler: new ethX-pe@0x557d4691c6c0 | libevent_malloc: new ptr-libevent@0x557d4691c700 size 128 | libevent_malloc: new ptr-libevent@0x557d4691c790 size 16 | setup callback for interface eth0 192.1.3.77:4500 fd 366 | add_fd_read_event_handler: new ethX-pe@0x557d4691c7b0 | libevent_malloc: new ptr-libevent@0x557d4691c7f0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691c880 size 16 | setup callback for interface eth0 192.1.3.77:500 fd 365 | add_fd_read_event_handler: new ethX-pe@0x557d4691c8a0 | libevent_malloc: new ptr-libevent@0x557d4691c8e0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691c970 size 16 | setup callback for interface eth0 192.1.3.78:4500 fd 364 | add_fd_read_event_handler: new ethX-pe@0x557d4691c990 | libevent_malloc: new ptr-libevent@0x557d4691c9d0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691ca60 size 16 | setup callback for interface eth0 192.1.3.78:500 fd 363 | add_fd_read_event_handler: new ethX-pe@0x557d4691ca80 | libevent_malloc: new ptr-libevent@0x557d4691cac0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691cb50 size 16 | setup callback for interface eth0 192.1.3.79:4500 fd 362 | add_fd_read_event_handler: new ethX-pe@0x557d4691cb70 | libevent_malloc: new ptr-libevent@0x557d4691cbb0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691cc40 size 16 | setup callback for interface eth0 192.1.3.79:500 fd 361 | add_fd_read_event_handler: new ethX-pe@0x557d4691cc60 | libevent_malloc: new ptr-libevent@0x557d4691cca0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691cd30 size 16 | setup callback for interface eth0 192.1.3.80:4500 fd 360 | add_fd_read_event_handler: new ethX-pe@0x557d4691cd50 | libevent_malloc: new ptr-libevent@0x557d4691cd90 size 128 | libevent_malloc: new ptr-libevent@0x557d4691ce20 size 16 | setup callback for interface eth0 192.1.3.80:500 fd 359 | add_fd_read_event_handler: new ethX-pe@0x557d4691ce40 | libevent_malloc: new ptr-libevent@0x557d4691ce80 size 128 | libevent_malloc: new ptr-libevent@0x557d4691cf10 size 16 | setup callback for interface eth0 192.1.3.81:4500 fd 358 | add_fd_read_event_handler: new ethX-pe@0x557d4691cf30 | libevent_malloc: new ptr-libevent@0x557d4691cf70 size 128 | libevent_malloc: new ptr-libevent@0x557d4691d000 size 16 | setup callback for interface eth0 192.1.3.81:500 fd 357 | add_fd_read_event_handler: new ethX-pe@0x557d4691d020 | libevent_malloc: new ptr-libevent@0x557d4691d060 size 128 | libevent_malloc: new ptr-libevent@0x557d4691d0f0 size 16 | setup callback for interface eth0 192.1.3.82:4500 fd 356 | add_fd_read_event_handler: new ethX-pe@0x557d4691d110 | libevent_malloc: new ptr-libevent@0x557d4691d150 size 128 | libevent_malloc: new ptr-libevent@0x557d4691d1e0 size 16 | setup callback for interface eth0 192.1.3.82:500 fd 355 | add_fd_read_event_handler: new ethX-pe@0x557d4691d200 | libevent_malloc: new ptr-libevent@0x557d4691d240 size 128 | libevent_malloc: new ptr-libevent@0x557d4691d2d0 size 16 | setup callback for interface eth0 192.1.3.83:4500 fd 354 | add_fd_read_event_handler: new ethX-pe@0x557d4691d2f0 | libevent_malloc: new ptr-libevent@0x557d4691d330 size 128 | libevent_malloc: new ptr-libevent@0x557d4691d3c0 size 16 | setup callback for interface eth0 192.1.3.83:500 fd 353 | add_fd_read_event_handler: new ethX-pe@0x557d4691d3e0 | libevent_malloc: new ptr-libevent@0x557d4691d420 size 128 | libevent_malloc: new ptr-libevent@0x557d4691d4b0 size 16 | setup callback for interface eth0 192.1.3.84:4500 fd 352 | add_fd_read_event_handler: new ethX-pe@0x557d4691d4d0 | libevent_malloc: new ptr-libevent@0x557d4691d510 size 128 | libevent_malloc: new ptr-libevent@0x557d4691d5a0 size 16 | setup callback for interface eth0 192.1.3.84:500 fd 351 | add_fd_read_event_handler: new ethX-pe@0x557d4691d5c0 | libevent_malloc: new ptr-libevent@0x557d4691d600 size 128 | libevent_malloc: new ptr-libevent@0x557d4691d690 size 16 | setup callback for interface eth0 192.1.3.85:4500 fd 350 | add_fd_read_event_handler: new ethX-pe@0x557d4691d6b0 | libevent_malloc: new ptr-libevent@0x557d4691d6f0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691d780 size 16 | setup callback for interface eth0 192.1.3.85:500 fd 349 | add_fd_read_event_handler: new ethX-pe@0x557d4691d7a0 | libevent_malloc: new ptr-libevent@0x557d4691d7e0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691d870 size 16 | setup callback for interface eth0 192.1.3.86:4500 fd 348 | add_fd_read_event_handler: new ethX-pe@0x557d4691d890 | libevent_malloc: new ptr-libevent@0x557d4691d8d0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691d960 size 16 | setup callback for interface eth0 192.1.3.86:500 fd 347 | add_fd_read_event_handler: new ethX-pe@0x557d4691d980 | libevent_malloc: new ptr-libevent@0x557d4691d9c0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691da50 size 16 | setup callback for interface eth0 192.1.3.87:4500 fd 346 | add_fd_read_event_handler: new ethX-pe@0x557d4691da70 | libevent_malloc: new ptr-libevent@0x557d4691dab0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691db40 size 16 | setup callback for interface eth0 192.1.3.87:500 fd 345 | add_fd_read_event_handler: new ethX-pe@0x557d4691db60 | libevent_malloc: new ptr-libevent@0x557d4691dba0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691dc30 size 16 | setup callback for interface eth0 192.1.3.88:4500 fd 344 | add_fd_read_event_handler: new ethX-pe@0x557d4691dc50 | libevent_malloc: new ptr-libevent@0x557d4691dc90 size 128 | libevent_malloc: new ptr-libevent@0x557d4691dd20 size 16 | setup callback for interface eth0 192.1.3.88:500 fd 343 | add_fd_read_event_handler: new ethX-pe@0x557d4691dd40 | libevent_malloc: new ptr-libevent@0x557d4691dd80 size 128 | libevent_malloc: new ptr-libevent@0x557d4691de10 size 16 | setup callback for interface eth0 192.1.3.89:4500 fd 342 | add_fd_read_event_handler: new ethX-pe@0x557d4691de30 | libevent_malloc: new ptr-libevent@0x557d4691de70 size 128 | libevent_malloc: new ptr-libevent@0x557d4691df00 size 16 | setup callback for interface eth0 192.1.3.89:500 fd 341 | add_fd_read_event_handler: new ethX-pe@0x557d4691df20 | libevent_malloc: new ptr-libevent@0x557d4691df60 size 128 | libevent_malloc: new ptr-libevent@0x557d4691dff0 size 16 | setup callback for interface eth0 192.1.3.90:4500 fd 340 | add_fd_read_event_handler: new ethX-pe@0x557d4691e010 | libevent_malloc: new ptr-libevent@0x557d4691e050 size 128 | libevent_malloc: new ptr-libevent@0x557d4691e0e0 size 16 | setup callback for interface eth0 192.1.3.90:500 fd 339 | add_fd_read_event_handler: new ethX-pe@0x557d4691e100 | libevent_malloc: new ptr-libevent@0x557d4691e140 size 128 | libevent_malloc: new ptr-libevent@0x557d4691e1d0 size 16 | setup callback for interface eth0 192.1.3.91:4500 fd 338 | add_fd_read_event_handler: new ethX-pe@0x557d4691e1f0 | libevent_malloc: new ptr-libevent@0x557d4691e230 size 128 | libevent_malloc: new ptr-libevent@0x557d4691e2c0 size 16 | setup callback for interface eth0 192.1.3.91:500 fd 337 | add_fd_read_event_handler: new ethX-pe@0x557d4691e2e0 | libevent_malloc: new ptr-libevent@0x557d4691e320 size 128 | libevent_malloc: new ptr-libevent@0x557d4691e3b0 size 16 | setup callback for interface eth0 192.1.3.92:4500 fd 336 | add_fd_read_event_handler: new ethX-pe@0x557d4691e3d0 | libevent_malloc: new ptr-libevent@0x557d4691e410 size 128 | libevent_malloc: new ptr-libevent@0x557d4691e4a0 size 16 | setup callback for interface eth0 192.1.3.92:500 fd 335 | add_fd_read_event_handler: new ethX-pe@0x557d4691e4c0 | libevent_malloc: new ptr-libevent@0x557d4691e500 size 128 | libevent_malloc: new ptr-libevent@0x557d4691e590 size 16 | setup callback for interface eth0 192.1.3.93:4500 fd 334 | add_fd_read_event_handler: new ethX-pe@0x557d4691e5b0 | libevent_malloc: new ptr-libevent@0x557d4691e5f0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691e680 size 16 | setup callback for interface eth0 192.1.3.93:500 fd 333 | add_fd_read_event_handler: new ethX-pe@0x557d4691e6a0 | libevent_malloc: new ptr-libevent@0x557d4691e6e0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691e770 size 16 | setup callback for interface eth0 192.1.3.94:4500 fd 332 | add_fd_read_event_handler: new ethX-pe@0x557d4691e790 | libevent_malloc: new ptr-libevent@0x557d4691e7d0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691e860 size 16 | setup callback for interface eth0 192.1.3.94:500 fd 331 | add_fd_read_event_handler: new ethX-pe@0x557d4691e880 | libevent_malloc: new ptr-libevent@0x557d4691e8c0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691e950 size 16 | setup callback for interface eth0 192.1.3.95:4500 fd 330 | add_fd_read_event_handler: new ethX-pe@0x557d4691e970 | libevent_malloc: new ptr-libevent@0x557d4691e9b0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691ea40 size 16 | setup callback for interface eth0 192.1.3.95:500 fd 329 | add_fd_read_event_handler: new ethX-pe@0x557d4691ea60 | libevent_malloc: new ptr-libevent@0x557d4691eaa0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691eb30 size 16 | setup callback for interface eth0 192.1.3.96:4500 fd 328 | add_fd_read_event_handler: new ethX-pe@0x557d4691eb50 | libevent_malloc: new ptr-libevent@0x557d4691eb90 size 128 | libevent_malloc: new ptr-libevent@0x557d4691ec20 size 16 | setup callback for interface eth0 192.1.3.96:500 fd 327 | add_fd_read_event_handler: new ethX-pe@0x557d4691ec40 | libevent_malloc: new ptr-libevent@0x557d4691ec80 size 128 | libevent_malloc: new ptr-libevent@0x557d4691ed10 size 16 | setup callback for interface eth0 192.1.3.97:4500 fd 326 | add_fd_read_event_handler: new ethX-pe@0x557d4691ed30 | libevent_malloc: new ptr-libevent@0x557d4691ed70 size 128 | libevent_malloc: new ptr-libevent@0x557d4691ee00 size 16 | setup callback for interface eth0 192.1.3.97:500 fd 325 | add_fd_read_event_handler: new ethX-pe@0x557d4691ee20 | libevent_malloc: new ptr-libevent@0x557d4691ee60 size 128 | libevent_malloc: new ptr-libevent@0x557d4691eef0 size 16 | setup callback for interface eth0 192.1.3.98:4500 fd 324 | add_fd_read_event_handler: new ethX-pe@0x557d4691ef10 | libevent_malloc: new ptr-libevent@0x557d4691ef50 size 128 | libevent_malloc: new ptr-libevent@0x557d4691efe0 size 16 | setup callback for interface eth0 192.1.3.98:500 fd 323 | add_fd_read_event_handler: new ethX-pe@0x557d4691f000 | libevent_malloc: new ptr-libevent@0x557d4691f040 size 128 | libevent_malloc: new ptr-libevent@0x557d4691f0d0 size 16 | setup callback for interface eth0 192.1.3.99:4500 fd 322 | add_fd_read_event_handler: new ethX-pe@0x557d4691f0f0 | libevent_malloc: new ptr-libevent@0x557d4691f130 size 128 | libevent_malloc: new ptr-libevent@0x557d4691f1c0 size 16 | setup callback for interface eth0 192.1.3.99:500 fd 321 | add_fd_read_event_handler: new ethX-pe@0x557d4691f1e0 | libevent_malloc: new ptr-libevent@0x557d4691f220 size 128 | libevent_malloc: new ptr-libevent@0x557d4691f2b0 size 16 | setup callback for interface eth0 192.1.3.100:4500 fd 320 | add_fd_read_event_handler: new ethX-pe@0x557d4691f2d0 | libevent_malloc: new ptr-libevent@0x557d4691f310 size 128 | libevent_malloc: new ptr-libevent@0x557d4691f3a0 size 16 | setup callback for interface eth0 192.1.3.100:500 fd 319 | add_fd_read_event_handler: new ethX-pe@0x557d4691f3c0 | libevent_malloc: new ptr-libevent@0x557d4691f400 size 128 | libevent_malloc: new ptr-libevent@0x557d4691f490 size 16 | setup callback for interface eth0 192.1.3.101:4500 fd 318 | add_fd_read_event_handler: new ethX-pe@0x557d4691f4b0 | libevent_malloc: new ptr-libevent@0x557d4691f4f0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691f580 size 16 | setup callback for interface eth0 192.1.3.101:500 fd 317 | add_fd_read_event_handler: new ethX-pe@0x557d4691f5a0 | libevent_malloc: new ptr-libevent@0x557d4691f5e0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691f670 size 16 | setup callback for interface eth0 192.1.3.102:4500 fd 316 | add_fd_read_event_handler: new ethX-pe@0x557d4691f690 | libevent_malloc: new ptr-libevent@0x557d4691f6d0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691f760 size 16 | setup callback for interface eth0 192.1.3.102:500 fd 315 | add_fd_read_event_handler: new ethX-pe@0x557d4691f780 | libevent_malloc: new ptr-libevent@0x557d4691f7c0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691f850 size 16 | setup callback for interface eth0 192.1.3.103:4500 fd 314 | add_fd_read_event_handler: new ethX-pe@0x557d4691f870 | libevent_malloc: new ptr-libevent@0x557d4691f8b0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691f940 size 16 | setup callback for interface eth0 192.1.3.103:500 fd 313 | add_fd_read_event_handler: new ethX-pe@0x557d4691f960 | libevent_malloc: new ptr-libevent@0x557d4691f9a0 size 128 | libevent_malloc: new ptr-libevent@0x557d4691fa30 size 16 | setup callback for interface eth0 192.1.3.104:4500 fd 312 | add_fd_read_event_handler: new ethX-pe@0x557d4691fa50 | libevent_malloc: new ptr-libevent@0x557d4691fa90 size 128 | libevent_malloc: new ptr-libevent@0x557d4691fb20 size 16 | setup callback for interface eth0 192.1.3.104:500 fd 311 | add_fd_read_event_handler: new ethX-pe@0x557d4691fb40 | libevent_malloc: new ptr-libevent@0x557d4691fb80 size 128 | libevent_malloc: new ptr-libevent@0x557d4691fc10 size 16 | setup callback for interface eth0 192.1.3.105:4500 fd 310 | add_fd_read_event_handler: new ethX-pe@0x557d4691fc30 | libevent_malloc: new ptr-libevent@0x557d4691fc70 size 128 | libevent_malloc: new ptr-libevent@0x557d4691fd00 size 16 | setup callback for interface eth0 192.1.3.105:500 fd 309 | add_fd_read_event_handler: new ethX-pe@0x557d4691fd20 | libevent_malloc: new ptr-libevent@0x557d4691fd60 size 128 | libevent_malloc: new ptr-libevent@0x557d4691fdf0 size 16 | setup callback for interface eth0 192.1.3.106:4500 fd 308 | add_fd_read_event_handler: new ethX-pe@0x557d4691fe10 | libevent_malloc: new ptr-libevent@0x557d4691fe50 size 128 | libevent_malloc: new ptr-libevent@0x557d4691fee0 size 16 | setup callback for interface eth0 192.1.3.106:500 fd 307 | add_fd_read_event_handler: new ethX-pe@0x557d4691ff00 | libevent_malloc: new ptr-libevent@0x557d4691ff40 size 128 | libevent_malloc: new ptr-libevent@0x557d4691ffd0 size 16 | setup callback for interface eth0 192.1.3.107:4500 fd 306 | add_fd_read_event_handler: new ethX-pe@0x557d4691fff0 | libevent_malloc: new ptr-libevent@0x557d46920030 size 128 | libevent_malloc: new ptr-libevent@0x557d469200c0 size 16 | setup callback for interface eth0 192.1.3.107:500 fd 305 | add_fd_read_event_handler: new ethX-pe@0x557d469200e0 | libevent_malloc: new ptr-libevent@0x557d46920120 size 128 | libevent_malloc: new ptr-libevent@0x557d469201b0 size 16 | setup callback for interface eth0 192.1.3.108:4500 fd 304 | add_fd_read_event_handler: new ethX-pe@0x557d469201d0 | libevent_malloc: new ptr-libevent@0x557d46920210 size 128 | libevent_malloc: new ptr-libevent@0x557d469202a0 size 16 | setup callback for interface eth0 192.1.3.108:500 fd 303 | add_fd_read_event_handler: new ethX-pe@0x557d469202c0 | libevent_malloc: new ptr-libevent@0x557d46920300 size 128 | libevent_malloc: new ptr-libevent@0x557d46920390 size 16 | setup callback for interface eth0 192.1.3.109:4500 fd 302 | add_fd_read_event_handler: new ethX-pe@0x557d469203b0 | libevent_malloc: new ptr-libevent@0x557d469203f0 size 128 | libevent_malloc: new ptr-libevent@0x557d46920480 size 16 | setup callback for interface eth0 192.1.3.109:500 fd 301 | add_fd_read_event_handler: new ethX-pe@0x557d469204a0 | libevent_malloc: new ptr-libevent@0x557d469204e0 size 128 | libevent_malloc: new ptr-libevent@0x557d46920570 size 16 | setup callback for interface eth0 192.1.3.110:4500 fd 300 | add_fd_read_event_handler: new ethX-pe@0x557d46920590 | libevent_malloc: new ptr-libevent@0x557d469205d0 size 128 | libevent_malloc: new ptr-libevent@0x557d46920660 size 16 | setup callback for interface eth0 192.1.3.110:500 fd 299 | add_fd_read_event_handler: new ethX-pe@0x557d46920680 | libevent_malloc: new ptr-libevent@0x557d469206c0 size 128 | libevent_malloc: new ptr-libevent@0x557d46920750 size 16 | setup callback for interface eth0 192.1.3.111:4500 fd 298 | add_fd_read_event_handler: new ethX-pe@0x557d46920770 | libevent_malloc: new ptr-libevent@0x557d469207b0 size 128 | libevent_malloc: new ptr-libevent@0x557d46920840 size 16 | setup callback for interface eth0 192.1.3.111:500 fd 297 | add_fd_read_event_handler: new ethX-pe@0x557d46920860 | libevent_malloc: new ptr-libevent@0x557d469208a0 size 128 | libevent_malloc: new ptr-libevent@0x557d46920930 size 16 | setup callback for interface eth0 192.1.3.112:4500 fd 296 | add_fd_read_event_handler: new ethX-pe@0x557d46920950 | libevent_malloc: new ptr-libevent@0x557d46920990 size 128 | libevent_malloc: new ptr-libevent@0x557d46920a20 size 16 | setup callback for interface eth0 192.1.3.112:500 fd 295 | add_fd_read_event_handler: new ethX-pe@0x557d46920a40 | libevent_malloc: new ptr-libevent@0x557d46920a80 size 128 | libevent_malloc: new ptr-libevent@0x557d46920b10 size 16 | setup callback for interface eth0 192.1.3.113:4500 fd 294 | add_fd_read_event_handler: new ethX-pe@0x557d46920b30 | libevent_malloc: new ptr-libevent@0x557d46920b70 size 128 | libevent_malloc: new ptr-libevent@0x557d46920c00 size 16 | setup callback for interface eth0 192.1.3.113:500 fd 293 | add_fd_read_event_handler: new ethX-pe@0x557d46920c20 | libevent_malloc: new ptr-libevent@0x557d46920c60 size 128 | libevent_malloc: new ptr-libevent@0x557d46920cf0 size 16 | setup callback for interface eth0 192.1.3.114:4500 fd 292 | add_fd_read_event_handler: new ethX-pe@0x557d46920d10 | libevent_malloc: new ptr-libevent@0x557d46920d50 size 128 | libevent_malloc: new ptr-libevent@0x557d46920de0 size 16 | setup callback for interface eth0 192.1.3.114:500 fd 291 | add_fd_read_event_handler: new ethX-pe@0x557d46920e00 | libevent_malloc: new ptr-libevent@0x557d46920e40 size 128 | libevent_malloc: new ptr-libevent@0x557d46920ed0 size 16 | setup callback for interface eth0 192.1.3.115:4500 fd 290 | add_fd_read_event_handler: new ethX-pe@0x557d46920ef0 | libevent_malloc: new ptr-libevent@0x557d46920f30 size 128 | libevent_malloc: new ptr-libevent@0x557d46920fc0 size 16 | setup callback for interface eth0 192.1.3.115:500 fd 289 | add_fd_read_event_handler: new ethX-pe@0x557d46920fe0 | libevent_malloc: new ptr-libevent@0x557d46921020 size 128 | libevent_malloc: new ptr-libevent@0x557d469210b0 size 16 | setup callback for interface eth0 192.1.3.116:4500 fd 288 | add_fd_read_event_handler: new ethX-pe@0x557d469210d0 | libevent_malloc: new ptr-libevent@0x557d46921110 size 128 | libevent_malloc: new ptr-libevent@0x557d469211a0 size 16 | setup callback for interface eth0 192.1.3.116:500 fd 287 | add_fd_read_event_handler: new ethX-pe@0x557d469211c0 | libevent_malloc: new ptr-libevent@0x557d46921200 size 128 | libevent_malloc: new ptr-libevent@0x557d46921290 size 16 | setup callback for interface eth0 192.1.3.117:4500 fd 286 | add_fd_read_event_handler: new ethX-pe@0x557d469212b0 | libevent_malloc: new ptr-libevent@0x557d469212f0 size 128 | libevent_malloc: new ptr-libevent@0x557d46921380 size 16 | setup callback for interface eth0 192.1.3.117:500 fd 285 | add_fd_read_event_handler: new ethX-pe@0x557d469213a0 | libevent_malloc: new ptr-libevent@0x557d469213e0 size 128 | libevent_malloc: new ptr-libevent@0x557d46921470 size 16 | setup callback for interface eth0 192.1.3.118:4500 fd 284 | add_fd_read_event_handler: new ethX-pe@0x557d46921490 | libevent_malloc: new ptr-libevent@0x557d469214d0 size 128 | libevent_malloc: new ptr-libevent@0x557d46921560 size 16 | setup callback for interface eth0 192.1.3.118:500 fd 283 | add_fd_read_event_handler: new ethX-pe@0x557d46921580 | libevent_malloc: new ptr-libevent@0x557d469215c0 size 128 | libevent_malloc: new ptr-libevent@0x557d46921650 size 16 | setup callback for interface eth0 192.1.3.119:4500 fd 282 | add_fd_read_event_handler: new ethX-pe@0x557d46921670 | libevent_malloc: new ptr-libevent@0x557d469216b0 size 128 | libevent_malloc: new ptr-libevent@0x557d46921740 size 16 | setup callback for interface eth0 192.1.3.119:500 fd 281 | add_fd_read_event_handler: new ethX-pe@0x557d46921760 | libevent_malloc: new ptr-libevent@0x557d469217a0 size 128 | libevent_malloc: new ptr-libevent@0x557d46921830 size 16 | setup callback for interface eth0 192.1.3.120:4500 fd 280 | add_fd_read_event_handler: new ethX-pe@0x557d46921850 | libevent_malloc: new ptr-libevent@0x557d46921890 size 128 | libevent_malloc: new ptr-libevent@0x557d46921920 size 16 | setup callback for interface eth0 192.1.3.120:500 fd 279 | add_fd_read_event_handler: new ethX-pe@0x557d46921940 | libevent_malloc: new ptr-libevent@0x557d46921980 size 128 | libevent_malloc: new ptr-libevent@0x557d46921a10 size 16 | setup callback for interface eth0 192.1.3.121:4500 fd 278 | add_fd_read_event_handler: new ethX-pe@0x557d46921a30 | libevent_malloc: new ptr-libevent@0x557d46921a70 size 128 | libevent_malloc: new ptr-libevent@0x557d46921b00 size 16 | setup callback for interface eth0 192.1.3.121:500 fd 277 | add_fd_read_event_handler: new ethX-pe@0x557d46921b20 | libevent_malloc: new ptr-libevent@0x557d46921b60 size 128 | libevent_malloc: new ptr-libevent@0x557d46921bf0 size 16 | setup callback for interface eth0 192.1.3.122:4500 fd 276 | add_fd_read_event_handler: new ethX-pe@0x557d46921c10 | libevent_malloc: new ptr-libevent@0x557d46921c50 size 128 | libevent_malloc: new ptr-libevent@0x557d46921ce0 size 16 | setup callback for interface eth0 192.1.3.122:500 fd 275 | add_fd_read_event_handler: new ethX-pe@0x557d46921d00 | libevent_malloc: new ptr-libevent@0x557d46921d40 size 128 | libevent_malloc: new ptr-libevent@0x557d46921dd0 size 16 | setup callback for interface eth0 192.1.3.123:4500 fd 274 | add_fd_read_event_handler: new ethX-pe@0x557d46921df0 | libevent_malloc: new ptr-libevent@0x557d46921e30 size 128 | libevent_malloc: new ptr-libevent@0x557d46921ec0 size 16 | setup callback for interface eth0 192.1.3.123:500 fd 273 | add_fd_read_event_handler: new ethX-pe@0x557d46921ee0 | libevent_malloc: new ptr-libevent@0x557d46921f20 size 128 | libevent_malloc: new ptr-libevent@0x557d46921fb0 size 16 | setup callback for interface eth0 192.1.3.124:4500 fd 272 | add_fd_read_event_handler: new ethX-pe@0x557d46921fd0 | libevent_malloc: new ptr-libevent@0x557d46922010 size 128 | libevent_malloc: new ptr-libevent@0x557d469220a0 size 16 | setup callback for interface eth0 192.1.3.124:500 fd 271 | add_fd_read_event_handler: new ethX-pe@0x557d469220c0 | libevent_malloc: new ptr-libevent@0x557d46922100 size 128 | libevent_malloc: new ptr-libevent@0x557d46922190 size 16 | setup callback for interface eth0 192.1.3.125:4500 fd 270 | add_fd_read_event_handler: new ethX-pe@0x557d469221b0 | libevent_malloc: new ptr-libevent@0x557d469221f0 size 128 | libevent_malloc: new ptr-libevent@0x557d46922280 size 16 | setup callback for interface eth0 192.1.3.125:500 fd 269 | add_fd_read_event_handler: new ethX-pe@0x557d469222a0 | libevent_malloc: new ptr-libevent@0x557d469222e0 size 128 | libevent_malloc: new ptr-libevent@0x557d46922370 size 16 | setup callback for interface eth0 192.1.3.126:4500 fd 268 | add_fd_read_event_handler: new ethX-pe@0x557d46922390 | libevent_malloc: new ptr-libevent@0x557d469223d0 size 128 | libevent_malloc: new ptr-libevent@0x557d46922460 size 16 | setup callback for interface eth0 192.1.3.126:500 fd 267 | add_fd_read_event_handler: new ethX-pe@0x557d46922480 | libevent_malloc: new ptr-libevent@0x557d469224c0 size 128 | libevent_malloc: new ptr-libevent@0x557d46922550 size 16 | setup callback for interface eth0 192.1.3.127:4500 fd 266 | add_fd_read_event_handler: new ethX-pe@0x557d46922570 | libevent_malloc: new ptr-libevent@0x557d469225b0 size 128 | libevent_malloc: new ptr-libevent@0x557d46922640 size 16 | setup callback for interface eth0 192.1.3.127:500 fd 265 | add_fd_read_event_handler: new ethX-pe@0x557d46922660 | libevent_malloc: new ptr-libevent@0x557d469226a0 size 128 | libevent_malloc: new ptr-libevent@0x557d46922730 size 16 | setup callback for interface eth0 192.1.3.128:4500 fd 264 | add_fd_read_event_handler: new ethX-pe@0x557d46922750 | libevent_malloc: new ptr-libevent@0x557d46922790 size 128 | libevent_malloc: new ptr-libevent@0x557d46922820 size 16 | setup callback for interface eth0 192.1.3.128:500 fd 263 | add_fd_read_event_handler: new ethX-pe@0x557d46922840 | libevent_malloc: new ptr-libevent@0x557d46922880 size 128 | libevent_malloc: new ptr-libevent@0x557d46922910 size 16 | setup callback for interface eth0 192.1.3.129:4500 fd 262 | add_fd_read_event_handler: new ethX-pe@0x557d46922930 | libevent_malloc: new ptr-libevent@0x557d46922970 size 128 | libevent_malloc: new ptr-libevent@0x557d46922a00 size 16 | setup callback for interface eth0 192.1.3.129:500 fd 261 | add_fd_read_event_handler: new ethX-pe@0x557d46922a20 | libevent_malloc: new ptr-libevent@0x557d46922a60 size 128 | libevent_malloc: new ptr-libevent@0x557d46922af0 size 16 | setup callback for interface eth0 192.1.3.130:4500 fd 260 | add_fd_read_event_handler: new ethX-pe@0x557d46922b10 | libevent_malloc: new ptr-libevent@0x557d46922b50 size 128 | libevent_malloc: new ptr-libevent@0x557d46922be0 size 16 | setup callback for interface eth0 192.1.3.130:500 fd 259 | add_fd_read_event_handler: new ethX-pe@0x557d46922c00 | libevent_malloc: new ptr-libevent@0x557d46922c40 size 128 | libevent_malloc: new ptr-libevent@0x557d46922cd0 size 16 | setup callback for interface eth0 192.1.3.131:4500 fd 258 | add_fd_read_event_handler: new ethX-pe@0x557d46922cf0 | libevent_malloc: new ptr-libevent@0x557d46922d30 size 128 | libevent_malloc: new ptr-libevent@0x557d46922dc0 size 16 | setup callback for interface eth0 192.1.3.131:500 fd 257 | add_fd_read_event_handler: new ethX-pe@0x557d46922de0 | libevent_malloc: new ptr-libevent@0x557d46922e20 size 128 | libevent_malloc: new ptr-libevent@0x557d46922eb0 size 16 | setup callback for interface eth0 192.1.3.132:4500 fd 256 | add_fd_read_event_handler: new ethX-pe@0x557d46922ed0 | libevent_malloc: new ptr-libevent@0x557d46922f10 size 128 | libevent_malloc: new ptr-libevent@0x557d46922fa0 size 16 | setup callback for interface eth0 192.1.3.132:500 fd 255 | add_fd_read_event_handler: new ethX-pe@0x557d46922fc0 | libevent_malloc: new ptr-libevent@0x557d46923000 size 128 | libevent_malloc: new ptr-libevent@0x557d46923090 size 16 | setup callback for interface eth0 192.1.3.133:4500 fd 254 | add_fd_read_event_handler: new ethX-pe@0x557d469230b0 | libevent_malloc: new ptr-libevent@0x557d469230f0 size 128 | libevent_malloc: new ptr-libevent@0x557d46923180 size 16 | setup callback for interface eth0 192.1.3.133:500 fd 253 | add_fd_read_event_handler: new ethX-pe@0x557d469231a0 | libevent_malloc: new ptr-libevent@0x557d469231e0 size 128 | libevent_malloc: new ptr-libevent@0x557d46923270 size 16 | setup callback for interface eth0 192.1.3.134:4500 fd 252 | add_fd_read_event_handler: new ethX-pe@0x557d46923290 | libevent_malloc: new ptr-libevent@0x557d469232d0 size 128 | libevent_malloc: new ptr-libevent@0x557d46923360 size 16 | setup callback for interface eth0 192.1.3.134:500 fd 251 | add_fd_read_event_handler: new ethX-pe@0x557d46923380 | libevent_malloc: new ptr-libevent@0x557d469233c0 size 128 | libevent_malloc: new ptr-libevent@0x557d46923450 size 16 | setup callback for interface eth0 192.1.3.135:4500 fd 250 | add_fd_read_event_handler: new ethX-pe@0x557d46923470 | libevent_malloc: new ptr-libevent@0x557d469234b0 size 128 | libevent_malloc: new ptr-libevent@0x557d46923540 size 16 | setup callback for interface eth0 192.1.3.135:500 fd 249 | add_fd_read_event_handler: new ethX-pe@0x557d46923560 | libevent_malloc: new ptr-libevent@0x557d469235a0 size 128 | libevent_malloc: new ptr-libevent@0x557d46923630 size 16 | setup callback for interface eth0 192.1.3.136:4500 fd 248 | add_fd_read_event_handler: new ethX-pe@0x557d46923650 | libevent_malloc: new ptr-libevent@0x557d46923690 size 128 | libevent_malloc: new ptr-libevent@0x557d46923720 size 16 | setup callback for interface eth0 192.1.3.136:500 fd 247 | add_fd_read_event_handler: new ethX-pe@0x557d46923740 | libevent_malloc: new ptr-libevent@0x557d46923780 size 128 | libevent_malloc: new ptr-libevent@0x557d46923810 size 16 | setup callback for interface eth0 192.1.3.137:4500 fd 246 | add_fd_read_event_handler: new ethX-pe@0x557d46923830 | libevent_malloc: new ptr-libevent@0x557d46923870 size 128 | libevent_malloc: new ptr-libevent@0x557d46923900 size 16 | setup callback for interface eth0 192.1.3.137:500 fd 245 | add_fd_read_event_handler: new ethX-pe@0x557d46923920 | libevent_malloc: new ptr-libevent@0x557d46923960 size 128 | libevent_malloc: new ptr-libevent@0x557d469239f0 size 16 | setup callback for interface eth0 192.1.3.138:4500 fd 244 | add_fd_read_event_handler: new ethX-pe@0x557d46923a10 | libevent_malloc: new ptr-libevent@0x557d46923a50 size 128 | libevent_malloc: new ptr-libevent@0x557d46923ae0 size 16 | setup callback for interface eth0 192.1.3.138:500 fd 243 | add_fd_read_event_handler: new ethX-pe@0x557d46923b00 | libevent_malloc: new ptr-libevent@0x557d46923b40 size 128 | libevent_malloc: new ptr-libevent@0x557d46923bd0 size 16 | setup callback for interface eth0 192.1.3.139:4500 fd 242 | add_fd_read_event_handler: new ethX-pe@0x557d46923bf0 | libevent_malloc: new ptr-libevent@0x557d46923c30 size 128 | libevent_malloc: new ptr-libevent@0x557d46923cc0 size 16 | setup callback for interface eth0 192.1.3.139:500 fd 241 | add_fd_read_event_handler: new ethX-pe@0x557d46923ce0 | libevent_malloc: new ptr-libevent@0x557d46923d20 size 128 | libevent_malloc: new ptr-libevent@0x557d46923db0 size 16 | setup callback for interface eth0 192.1.3.140:4500 fd 240 | add_fd_read_event_handler: new ethX-pe@0x557d46923dd0 | libevent_malloc: new ptr-libevent@0x557d46923e10 size 128 | libevent_malloc: new ptr-libevent@0x557d46923ea0 size 16 | setup callback for interface eth0 192.1.3.140:500 fd 239 | add_fd_read_event_handler: new ethX-pe@0x557d46923ec0 | libevent_malloc: new ptr-libevent@0x557d46923f00 size 128 | libevent_malloc: new ptr-libevent@0x557d46923f90 size 16 | setup callback for interface eth0 192.1.3.141:4500 fd 238 | add_fd_read_event_handler: new ethX-pe@0x557d46923fb0 | libevent_malloc: new ptr-libevent@0x557d46923ff0 size 128 | libevent_malloc: new ptr-libevent@0x557d46924080 size 16 | setup callback for interface eth0 192.1.3.141:500 fd 237 | add_fd_read_event_handler: new ethX-pe@0x557d469240a0 | libevent_malloc: new ptr-libevent@0x557d469240e0 size 128 | libevent_malloc: new ptr-libevent@0x557d46924170 size 16 | setup callback for interface eth0 192.1.3.142:4500 fd 236 | add_fd_read_event_handler: new ethX-pe@0x557d46924190 | libevent_malloc: new ptr-libevent@0x557d469241d0 size 128 | libevent_malloc: new ptr-libevent@0x557d46924260 size 16 | setup callback for interface eth0 192.1.3.142:500 fd 235 | add_fd_read_event_handler: new ethX-pe@0x557d46924280 | libevent_malloc: new ptr-libevent@0x557d469242c0 size 128 | libevent_malloc: new ptr-libevent@0x557d46924350 size 16 | setup callback for interface eth0 192.1.3.143:4500 fd 234 | add_fd_read_event_handler: new ethX-pe@0x557d46924370 | libevent_malloc: new ptr-libevent@0x557d469243b0 size 128 | libevent_malloc: new ptr-libevent@0x557d46924440 size 16 | setup callback for interface eth0 192.1.3.143:500 fd 233 | add_fd_read_event_handler: new ethX-pe@0x557d46924460 | libevent_malloc: new ptr-libevent@0x557d469244a0 size 128 | libevent_malloc: new ptr-libevent@0x557d46924530 size 16 | setup callback for interface eth0 192.1.3.144:4500 fd 232 | add_fd_read_event_handler: new ethX-pe@0x557d46924550 | libevent_malloc: new ptr-libevent@0x557d46924590 size 128 | libevent_malloc: new ptr-libevent@0x557d46924620 size 16 | setup callback for interface eth0 192.1.3.144:500 fd 231 | add_fd_read_event_handler: new ethX-pe@0x557d46924640 | libevent_malloc: new ptr-libevent@0x557d46924680 size 128 | libevent_malloc: new ptr-libevent@0x557d46924710 size 16 | setup callback for interface eth0 192.1.3.145:4500 fd 230 | add_fd_read_event_handler: new ethX-pe@0x557d46924730 | libevent_malloc: new ptr-libevent@0x557d46924770 size 128 | libevent_malloc: new ptr-libevent@0x557d46924800 size 16 | setup callback for interface eth0 192.1.3.145:500 fd 229 | add_fd_read_event_handler: new ethX-pe@0x557d46924820 | libevent_malloc: new ptr-libevent@0x557d46924860 size 128 | libevent_malloc: new ptr-libevent@0x557d469248f0 size 16 | setup callback for interface eth0 192.1.3.146:4500 fd 228 | add_fd_read_event_handler: new ethX-pe@0x557d46924910 | libevent_malloc: new ptr-libevent@0x557d46924950 size 128 | libevent_malloc: new ptr-libevent@0x557d469249e0 size 16 | setup callback for interface eth0 192.1.3.146:500 fd 227 | add_fd_read_event_handler: new ethX-pe@0x557d46924a00 | libevent_malloc: new ptr-libevent@0x557d46924a40 size 128 | libevent_malloc: new ptr-libevent@0x557d46924ad0 size 16 | setup callback for interface eth0 192.1.3.147:4500 fd 226 | add_fd_read_event_handler: new ethX-pe@0x557d46924af0 | libevent_malloc: new ptr-libevent@0x557d46924b30 size 128 | libevent_malloc: new ptr-libevent@0x557d46924bc0 size 16 | setup callback for interface eth0 192.1.3.147:500 fd 225 | add_fd_read_event_handler: new ethX-pe@0x557d46924be0 | libevent_malloc: new ptr-libevent@0x557d46924c20 size 128 | libevent_malloc: new ptr-libevent@0x557d46924cb0 size 16 | setup callback for interface eth0 192.1.3.148:4500 fd 224 | add_fd_read_event_handler: new ethX-pe@0x557d46924cd0 | libevent_malloc: new ptr-libevent@0x557d46924d10 size 128 | libevent_malloc: new ptr-libevent@0x557d46924da0 size 16 | setup callback for interface eth0 192.1.3.148:500 fd 223 | add_fd_read_event_handler: new ethX-pe@0x557d46924dc0 | libevent_malloc: new ptr-libevent@0x557d46924e00 size 128 | libevent_malloc: new ptr-libevent@0x557d46924e90 size 16 | setup callback for interface eth0 192.1.3.149:4500 fd 222 | add_fd_read_event_handler: new ethX-pe@0x557d46924eb0 | libevent_malloc: new ptr-libevent@0x557d46924ef0 size 128 | libevent_malloc: new ptr-libevent@0x557d46924f80 size 16 | setup callback for interface eth0 192.1.3.149:500 fd 221 | add_fd_read_event_handler: new ethX-pe@0x557d46924fa0 | libevent_malloc: new ptr-libevent@0x557d46924fe0 size 128 | libevent_malloc: new ptr-libevent@0x557d46925070 size 16 | setup callback for interface eth0 192.1.3.150:4500 fd 220 | add_fd_read_event_handler: new ethX-pe@0x557d46925090 | libevent_malloc: new ptr-libevent@0x557d469250d0 size 128 | libevent_malloc: new ptr-libevent@0x557d46925160 size 16 | setup callback for interface eth0 192.1.3.150:500 fd 219 | add_fd_read_event_handler: new ethX-pe@0x557d46925180 | libevent_malloc: new ptr-libevent@0x557d469251c0 size 128 | libevent_malloc: new ptr-libevent@0x557d46925250 size 16 | setup callback for interface eth0 192.1.3.151:4500 fd 218 | add_fd_read_event_handler: new ethX-pe@0x557d46925270 | libevent_malloc: new ptr-libevent@0x557d469252b0 size 128 | libevent_malloc: new ptr-libevent@0x557d46925340 size 16 | setup callback for interface eth0 192.1.3.151:500 fd 217 | add_fd_read_event_handler: new ethX-pe@0x557d46925360 | libevent_malloc: new ptr-libevent@0x557d469253a0 size 128 | libevent_malloc: new ptr-libevent@0x557d46925430 size 16 | setup callback for interface eth0 192.1.3.152:4500 fd 216 | add_fd_read_event_handler: new ethX-pe@0x557d46925450 | libevent_malloc: new ptr-libevent@0x557d46925490 size 128 | libevent_malloc: new ptr-libevent@0x557d46925520 size 16 | setup callback for interface eth0 192.1.3.152:500 fd 215 | add_fd_read_event_handler: new ethX-pe@0x557d46925540 | libevent_malloc: new ptr-libevent@0x557d46925580 size 128 | libevent_malloc: new ptr-libevent@0x557d46925610 size 16 | setup callback for interface eth0 192.1.3.153:4500 fd 214 | add_fd_read_event_handler: new ethX-pe@0x557d46925630 | libevent_malloc: new ptr-libevent@0x557d46925670 size 128 | libevent_malloc: new ptr-libevent@0x557d46925700 size 16 | setup callback for interface eth0 192.1.3.153:500 fd 213 | add_fd_read_event_handler: new ethX-pe@0x557d46925720 | libevent_malloc: new ptr-libevent@0x557d46925760 size 128 | libevent_malloc: new ptr-libevent@0x557d469257f0 size 16 | setup callback for interface eth0 192.1.3.154:4500 fd 212 | add_fd_read_event_handler: new ethX-pe@0x557d46925810 | libevent_malloc: new ptr-libevent@0x557d46925850 size 128 | libevent_malloc: new ptr-libevent@0x557d469258e0 size 16 | setup callback for interface eth0 192.1.3.154:500 fd 211 | add_fd_read_event_handler: new ethX-pe@0x557d46925900 | libevent_malloc: new ptr-libevent@0x557d46925940 size 128 | libevent_malloc: new ptr-libevent@0x557d469259d0 size 16 | setup callback for interface eth0 192.1.3.155:4500 fd 210 | add_fd_read_event_handler: new ethX-pe@0x557d469259f0 | libevent_malloc: new ptr-libevent@0x557d46925a30 size 128 | libevent_malloc: new ptr-libevent@0x557d46925ac0 size 16 | setup callback for interface eth0 192.1.3.155:500 fd 209 | add_fd_read_event_handler: new ethX-pe@0x557d46925ae0 | libevent_malloc: new ptr-libevent@0x557d46925b20 size 128 | libevent_malloc: new ptr-libevent@0x557d46925bb0 size 16 | setup callback for interface eth0 192.1.3.156:4500 fd 208 | add_fd_read_event_handler: new ethX-pe@0x557d46925bd0 | libevent_malloc: new ptr-libevent@0x557d46925c10 size 128 | libevent_malloc: new ptr-libevent@0x557d46925ca0 size 16 | setup callback for interface eth0 192.1.3.156:500 fd 207 | add_fd_read_event_handler: new ethX-pe@0x557d46925cc0 | libevent_malloc: new ptr-libevent@0x557d46925d00 size 128 | libevent_malloc: new ptr-libevent@0x557d46925d90 size 16 | setup callback for interface eth0 192.1.3.157:4500 fd 206 | add_fd_read_event_handler: new ethX-pe@0x557d46925db0 | libevent_malloc: new ptr-libevent@0x557d46925df0 size 128 | libevent_malloc: new ptr-libevent@0x557d46925e80 size 16 | setup callback for interface eth0 192.1.3.157:500 fd 205 | add_fd_read_event_handler: new ethX-pe@0x557d46925ea0 | libevent_malloc: new ptr-libevent@0x557d46925ee0 size 128 | libevent_malloc: new ptr-libevent@0x557d46925f70 size 16 | setup callback for interface eth0 192.1.3.158:4500 fd 204 | add_fd_read_event_handler: new ethX-pe@0x557d46925f90 | libevent_malloc: new ptr-libevent@0x557d46925fd0 size 128 | libevent_malloc: new ptr-libevent@0x557d46926060 size 16 | setup callback for interface eth0 192.1.3.158:500 fd 203 | add_fd_read_event_handler: new ethX-pe@0x557d46926080 | libevent_malloc: new ptr-libevent@0x557d469260c0 size 128 | libevent_malloc: new ptr-libevent@0x557d46926150 size 16 | setup callback for interface eth0 192.1.3.159:4500 fd 202 | add_fd_read_event_handler: new ethX-pe@0x557d46926170 | libevent_malloc: new ptr-libevent@0x557d469261b0 size 128 | libevent_malloc: new ptr-libevent@0x557d46926240 size 16 | setup callback for interface eth0 192.1.3.159:500 fd 201 | add_fd_read_event_handler: new ethX-pe@0x557d46926260 | libevent_malloc: new ptr-libevent@0x557d469262a0 size 128 | libevent_malloc: new ptr-libevent@0x557d46926330 size 16 | setup callback for interface eth0 192.1.3.160:4500 fd 200 | add_fd_read_event_handler: new ethX-pe@0x557d46926350 | libevent_malloc: new ptr-libevent@0x557d46926390 size 128 | libevent_malloc: new ptr-libevent@0x557d46926420 size 16 | setup callback for interface eth0 192.1.3.160:500 fd 199 | add_fd_read_event_handler: new ethX-pe@0x557d46926440 | libevent_malloc: new ptr-libevent@0x557d46926480 size 128 | libevent_malloc: new ptr-libevent@0x557d46926510 size 16 | setup callback for interface eth0 192.1.3.161:4500 fd 198 | add_fd_read_event_handler: new ethX-pe@0x557d46926530 | libevent_malloc: new ptr-libevent@0x557d46926570 size 128 | libevent_malloc: new ptr-libevent@0x557d46926600 size 16 | setup callback for interface eth0 192.1.3.161:500 fd 197 | add_fd_read_event_handler: new ethX-pe@0x557d46926620 | libevent_malloc: new ptr-libevent@0x557d46926660 size 128 | libevent_malloc: new ptr-libevent@0x557d469266f0 size 16 | setup callback for interface eth0 192.1.3.162:4500 fd 196 | add_fd_read_event_handler: new ethX-pe@0x557d46926710 | libevent_malloc: new ptr-libevent@0x557d46926750 size 128 | libevent_malloc: new ptr-libevent@0x557d469267e0 size 16 | setup callback for interface eth0 192.1.3.162:500 fd 195 | add_fd_read_event_handler: new ethX-pe@0x557d46926800 | libevent_malloc: new ptr-libevent@0x557d46926840 size 128 | libevent_malloc: new ptr-libevent@0x557d469268d0 size 16 | setup callback for interface eth0 192.1.3.163:4500 fd 194 | add_fd_read_event_handler: new ethX-pe@0x557d469268f0 | libevent_malloc: new ptr-libevent@0x557d46926930 size 128 | libevent_malloc: new ptr-libevent@0x557d469269c0 size 16 | setup callback for interface eth0 192.1.3.163:500 fd 193 | add_fd_read_event_handler: new ethX-pe@0x557d469269e0 | libevent_malloc: new ptr-libevent@0x557d46926a20 size 128 | libevent_malloc: new ptr-libevent@0x557d46926ab0 size 16 | setup callback for interface eth0 192.1.3.164:4500 fd 192 | add_fd_read_event_handler: new ethX-pe@0x557d46926ad0 | libevent_malloc: new ptr-libevent@0x557d46926b10 size 128 | libevent_malloc: new ptr-libevent@0x557d46926ba0 size 16 | setup callback for interface eth0 192.1.3.164:500 fd 191 | add_fd_read_event_handler: new ethX-pe@0x557d46926bc0 | libevent_malloc: new ptr-libevent@0x557d46926c00 size 128 | libevent_malloc: new ptr-libevent@0x557d46926c90 size 16 | setup callback for interface eth0 192.1.3.165:4500 fd 190 | add_fd_read_event_handler: new ethX-pe@0x557d46926cb0 | libevent_malloc: new ptr-libevent@0x557d46926cf0 size 128 | libevent_malloc: new ptr-libevent@0x557d46926d80 size 16 | setup callback for interface eth0 192.1.3.165:500 fd 189 | add_fd_read_event_handler: new ethX-pe@0x557d46926da0 | libevent_malloc: new ptr-libevent@0x557d46926de0 size 128 | libevent_malloc: new ptr-libevent@0x557d46926e70 size 16 | setup callback for interface eth0 192.1.3.166:4500 fd 188 | add_fd_read_event_handler: new ethX-pe@0x557d46926e90 | libevent_malloc: new ptr-libevent@0x557d46926ed0 size 128 | libevent_malloc: new ptr-libevent@0x557d46926f60 size 16 | setup callback for interface eth0 192.1.3.166:500 fd 187 | add_fd_read_event_handler: new ethX-pe@0x557d46926f80 | libevent_malloc: new ptr-libevent@0x557d46926fc0 size 128 | libevent_malloc: new ptr-libevent@0x557d46927050 size 16 | setup callback for interface eth0 192.1.3.167:4500 fd 186 | add_fd_read_event_handler: new ethX-pe@0x557d46927070 | libevent_malloc: new ptr-libevent@0x557d469270b0 size 128 | libevent_malloc: new ptr-libevent@0x557d46927140 size 16 | setup callback for interface eth0 192.1.3.167:500 fd 185 | add_fd_read_event_handler: new ethX-pe@0x557d46927160 | libevent_malloc: new ptr-libevent@0x557d469271a0 size 128 | libevent_malloc: new ptr-libevent@0x557d46927230 size 16 | setup callback for interface eth0 192.1.3.168:4500 fd 184 | add_fd_read_event_handler: new ethX-pe@0x557d46927250 | libevent_malloc: new ptr-libevent@0x557d46927290 size 128 | libevent_malloc: new ptr-libevent@0x557d46927320 size 16 | setup callback for interface eth0 192.1.3.168:500 fd 183 | add_fd_read_event_handler: new ethX-pe@0x557d46927340 | libevent_malloc: new ptr-libevent@0x557d46927380 size 128 | libevent_malloc: new ptr-libevent@0x557d46927410 size 16 | setup callback for interface eth0 192.1.3.169:4500 fd 182 | add_fd_read_event_handler: new ethX-pe@0x557d46927430 | libevent_malloc: new ptr-libevent@0x557d46927470 size 128 | libevent_malloc: new ptr-libevent@0x557d46927500 size 16 | setup callback for interface eth0 192.1.3.169:500 fd 181 | add_fd_read_event_handler: new ethX-pe@0x557d46927520 | libevent_malloc: new ptr-libevent@0x557d46927560 size 128 | libevent_malloc: new ptr-libevent@0x557d469275f0 size 16 | setup callback for interface eth0 192.1.3.170:4500 fd 180 | add_fd_read_event_handler: new ethX-pe@0x557d46927610 | libevent_malloc: new ptr-libevent@0x557d46927650 size 128 | libevent_malloc: new ptr-libevent@0x557d469276e0 size 16 | setup callback for interface eth0 192.1.3.170:500 fd 179 | add_fd_read_event_handler: new ethX-pe@0x557d46927700 | libevent_malloc: new ptr-libevent@0x557d46927740 size 128 | libevent_malloc: new ptr-libevent@0x557d469277d0 size 16 | setup callback for interface eth0 192.1.3.171:4500 fd 178 | add_fd_read_event_handler: new ethX-pe@0x557d469277f0 | libevent_malloc: new ptr-libevent@0x557d46927830 size 128 | libevent_malloc: new ptr-libevent@0x557d469278c0 size 16 | setup callback for interface eth0 192.1.3.171:500 fd 177 | add_fd_read_event_handler: new ethX-pe@0x557d469278e0 | libevent_malloc: new ptr-libevent@0x557d46927920 size 128 | libevent_malloc: new ptr-libevent@0x557d469279b0 size 16 | setup callback for interface eth0 192.1.3.172:4500 fd 176 | add_fd_read_event_handler: new ethX-pe@0x557d469279d0 | libevent_malloc: new ptr-libevent@0x557d46927a10 size 128 | libevent_malloc: new ptr-libevent@0x557d46927aa0 size 16 | setup callback for interface eth0 192.1.3.172:500 fd 175 | add_fd_read_event_handler: new ethX-pe@0x557d46927ac0 | libevent_malloc: new ptr-libevent@0x557d46927b00 size 128 | libevent_malloc: new ptr-libevent@0x557d46927b90 size 16 | setup callback for interface eth0 192.1.3.173:4500 fd 174 | add_fd_read_event_handler: new ethX-pe@0x557d46927bb0 | libevent_malloc: new ptr-libevent@0x557d46927bf0 size 128 | libevent_malloc: new ptr-libevent@0x557d46927c80 size 16 | setup callback for interface eth0 192.1.3.173:500 fd 173 | add_fd_read_event_handler: new ethX-pe@0x557d46927ca0 | libevent_malloc: new ptr-libevent@0x557d46927ce0 size 128 | libevent_malloc: new ptr-libevent@0x557d46927d70 size 16 | setup callback for interface eth0 192.1.3.174:4500 fd 172 | add_fd_read_event_handler: new ethX-pe@0x557d46927d90 | libevent_malloc: new ptr-libevent@0x557d46927dd0 size 128 | libevent_malloc: new ptr-libevent@0x557d46927e60 size 16 | setup callback for interface eth0 192.1.3.174:500 fd 171 | add_fd_read_event_handler: new ethX-pe@0x557d46927e80 | libevent_malloc: new ptr-libevent@0x557d46927ec0 size 128 | libevent_malloc: new ptr-libevent@0x557d46927f50 size 16 | setup callback for interface eth0 192.1.3.175:4500 fd 170 | add_fd_read_event_handler: new ethX-pe@0x557d46927f70 | libevent_malloc: new ptr-libevent@0x557d46927fb0 size 128 | libevent_malloc: new ptr-libevent@0x557d46928040 size 16 | setup callback for interface eth0 192.1.3.175:500 fd 169 | add_fd_read_event_handler: new ethX-pe@0x557d46928060 | libevent_malloc: new ptr-libevent@0x557d469280a0 size 128 | libevent_malloc: new ptr-libevent@0x557d46928130 size 16 | setup callback for interface eth0 192.1.3.176:4500 fd 168 | add_fd_read_event_handler: new ethX-pe@0x557d46928150 | libevent_malloc: new ptr-libevent@0x557d46928190 size 128 | libevent_malloc: new ptr-libevent@0x557d46928220 size 16 | setup callback for interface eth0 192.1.3.176:500 fd 167 | add_fd_read_event_handler: new ethX-pe@0x557d46928240 | libevent_malloc: new ptr-libevent@0x557d46928280 size 128 | libevent_malloc: new ptr-libevent@0x557d46928310 size 16 | setup callback for interface eth0 192.1.3.177:4500 fd 166 | add_fd_read_event_handler: new ethX-pe@0x557d46928330 | libevent_malloc: new ptr-libevent@0x557d46928370 size 128 | libevent_malloc: new ptr-libevent@0x557d46928400 size 16 | setup callback for interface eth0 192.1.3.177:500 fd 165 | add_fd_read_event_handler: new ethX-pe@0x557d46928420 | libevent_malloc: new ptr-libevent@0x557d46928460 size 128 | libevent_malloc: new ptr-libevent@0x557d469284f0 size 16 | setup callback for interface eth0 192.1.3.178:4500 fd 164 | add_fd_read_event_handler: new ethX-pe@0x557d46928510 | libevent_malloc: new ptr-libevent@0x557d46928550 size 128 | libevent_malloc: new ptr-libevent@0x557d469285e0 size 16 | setup callback for interface eth0 192.1.3.178:500 fd 163 | add_fd_read_event_handler: new ethX-pe@0x557d46928600 | libevent_malloc: new ptr-libevent@0x557d46928640 size 128 | libevent_malloc: new ptr-libevent@0x557d469286d0 size 16 | setup callback for interface eth0 192.1.3.179:4500 fd 162 | add_fd_read_event_handler: new ethX-pe@0x557d469286f0 | libevent_malloc: new ptr-libevent@0x557d46928730 size 128 | libevent_malloc: new ptr-libevent@0x557d469287c0 size 16 | setup callback for interface eth0 192.1.3.179:500 fd 161 | add_fd_read_event_handler: new ethX-pe@0x557d469287e0 | libevent_malloc: new ptr-libevent@0x557d46928820 size 128 | libevent_malloc: new ptr-libevent@0x557d469288b0 size 16 | setup callback for interface eth0 192.1.3.180:4500 fd 160 | add_fd_read_event_handler: new ethX-pe@0x557d469288d0 | libevent_malloc: new ptr-libevent@0x557d46928910 size 128 | libevent_malloc: new ptr-libevent@0x557d469289a0 size 16 | setup callback for interface eth0 192.1.3.180:500 fd 159 | add_fd_read_event_handler: new ethX-pe@0x557d469289c0 | libevent_malloc: new ptr-libevent@0x557d46928a00 size 128 | libevent_malloc: new ptr-libevent@0x557d46928a90 size 16 | setup callback for interface eth0 192.1.3.181:4500 fd 158 | add_fd_read_event_handler: new ethX-pe@0x557d46928ab0 | libevent_malloc: new ptr-libevent@0x557d46928af0 size 128 | libevent_malloc: new ptr-libevent@0x557d46928b80 size 16 | setup callback for interface eth0 192.1.3.181:500 fd 157 | add_fd_read_event_handler: new ethX-pe@0x557d46928ba0 | libevent_malloc: new ptr-libevent@0x557d46928be0 size 128 | libevent_malloc: new ptr-libevent@0x557d46928c70 size 16 | setup callback for interface eth0 192.1.3.182:4500 fd 156 | add_fd_read_event_handler: new ethX-pe@0x557d46928c90 | libevent_malloc: new ptr-libevent@0x557d46928cd0 size 128 | libevent_malloc: new ptr-libevent@0x557d46928d60 size 16 | setup callback for interface eth0 192.1.3.182:500 fd 155 | add_fd_read_event_handler: new ethX-pe@0x557d46928d80 | libevent_malloc: new ptr-libevent@0x557d46928dc0 size 128 | libevent_malloc: new ptr-libevent@0x557d46928e50 size 16 | setup callback for interface eth0 192.1.3.183:4500 fd 154 | add_fd_read_event_handler: new ethX-pe@0x557d46928e70 | libevent_malloc: new ptr-libevent@0x557d46928eb0 size 128 | libevent_malloc: new ptr-libevent@0x557d46928f40 size 16 | setup callback for interface eth0 192.1.3.183:500 fd 153 | add_fd_read_event_handler: new ethX-pe@0x557d46928f60 | libevent_malloc: new ptr-libevent@0x557d46928fa0 size 128 | libevent_malloc: new ptr-libevent@0x557d46929030 size 16 | setup callback for interface eth0 192.1.3.184:4500 fd 152 | add_fd_read_event_handler: new ethX-pe@0x557d46929050 | libevent_malloc: new ptr-libevent@0x557d46929090 size 128 | libevent_malloc: new ptr-libevent@0x557d46929120 size 16 | setup callback for interface eth0 192.1.3.184:500 fd 151 | add_fd_read_event_handler: new ethX-pe@0x557d46929140 | libevent_malloc: new ptr-libevent@0x557d46929180 size 128 | libevent_malloc: new ptr-libevent@0x557d46929210 size 16 | setup callback for interface eth0 192.1.3.185:4500 fd 150 | add_fd_read_event_handler: new ethX-pe@0x557d46929230 | libevent_malloc: new ptr-libevent@0x557d46929270 size 128 | libevent_malloc: new ptr-libevent@0x557d46929300 size 16 | setup callback for interface eth0 192.1.3.185:500 fd 149 | add_fd_read_event_handler: new ethX-pe@0x557d46929320 | libevent_malloc: new ptr-libevent@0x557d46929360 size 128 | libevent_malloc: new ptr-libevent@0x557d469293f0 size 16 | setup callback for interface eth0 192.1.3.186:4500 fd 148 | add_fd_read_event_handler: new ethX-pe@0x557d46929410 | libevent_malloc: new ptr-libevent@0x557d46929450 size 128 | libevent_malloc: new ptr-libevent@0x557d469294e0 size 16 | setup callback for interface eth0 192.1.3.186:500 fd 147 | add_fd_read_event_handler: new ethX-pe@0x557d46929500 | libevent_malloc: new ptr-libevent@0x557d46929540 size 128 | libevent_malloc: new ptr-libevent@0x557d469295d0 size 16 | setup callback for interface eth0 192.1.3.187:4500 fd 146 | add_fd_read_event_handler: new ethX-pe@0x557d469295f0 | libevent_malloc: new ptr-libevent@0x557d46929630 size 128 | libevent_malloc: new ptr-libevent@0x557d469296c0 size 16 | setup callback for interface eth0 192.1.3.187:500 fd 145 | add_fd_read_event_handler: new ethX-pe@0x557d469296e0 | libevent_malloc: new ptr-libevent@0x557d46929720 size 128 | libevent_malloc: new ptr-libevent@0x557d469297b0 size 16 | setup callback for interface eth0 192.1.3.188:4500 fd 144 | add_fd_read_event_handler: new ethX-pe@0x557d469297d0 | libevent_malloc: new ptr-libevent@0x557d46929810 size 128 | libevent_malloc: new ptr-libevent@0x557d469298a0 size 16 | setup callback for interface eth0 192.1.3.188:500 fd 143 | add_fd_read_event_handler: new ethX-pe@0x557d469298c0 | libevent_malloc: new ptr-libevent@0x557d46929900 size 128 | libevent_malloc: new ptr-libevent@0x557d46929990 size 16 | setup callback for interface eth0 192.1.3.189:4500 fd 142 | add_fd_read_event_handler: new ethX-pe@0x557d469299b0 | libevent_malloc: new ptr-libevent@0x557d469299f0 size 128 | libevent_malloc: new ptr-libevent@0x557d46929a80 size 16 | setup callback for interface eth0 192.1.3.189:500 fd 141 | add_fd_read_event_handler: new ethX-pe@0x557d46929aa0 | libevent_malloc: new ptr-libevent@0x557d46929ae0 size 128 | libevent_malloc: new ptr-libevent@0x557d46929b70 size 16 | setup callback for interface eth0 192.1.3.190:4500 fd 140 | add_fd_read_event_handler: new ethX-pe@0x557d46929b90 | libevent_malloc: new ptr-libevent@0x557d46929bd0 size 128 | libevent_malloc: new ptr-libevent@0x557d46929c60 size 16 | setup callback for interface eth0 192.1.3.190:500 fd 139 | add_fd_read_event_handler: new ethX-pe@0x557d46929c80 | libevent_malloc: new ptr-libevent@0x557d46929cc0 size 128 | libevent_malloc: new ptr-libevent@0x557d46929d50 size 16 | setup callback for interface eth0 192.1.3.191:4500 fd 138 | add_fd_read_event_handler: new ethX-pe@0x557d46929d70 | libevent_malloc: new ptr-libevent@0x557d46929db0 size 128 | libevent_malloc: new ptr-libevent@0x557d46929e40 size 16 | setup callback for interface eth0 192.1.3.191:500 fd 137 | add_fd_read_event_handler: new ethX-pe@0x557d46929e60 | libevent_malloc: new ptr-libevent@0x557d46929ea0 size 128 | libevent_malloc: new ptr-libevent@0x557d46929f30 size 16 | setup callback for interface eth0 192.1.3.192:4500 fd 136 | add_fd_read_event_handler: new ethX-pe@0x557d46929f50 | libevent_malloc: new ptr-libevent@0x557d46929f90 size 128 | libevent_malloc: new ptr-libevent@0x557d4692a020 size 16 | setup callback for interface eth0 192.1.3.192:500 fd 135 | add_fd_read_event_handler: new ethX-pe@0x557d4692a040 | libevent_malloc: new ptr-libevent@0x557d4692a080 size 128 | libevent_malloc: new ptr-libevent@0x557d4692a110 size 16 | setup callback for interface eth0 192.1.3.193:4500 fd 134 | add_fd_read_event_handler: new ethX-pe@0x557d4692a130 | libevent_malloc: new ptr-libevent@0x557d4692a170 size 128 | libevent_malloc: new ptr-libevent@0x557d4692a200 size 16 | setup callback for interface eth0 192.1.3.193:500 fd 133 | add_fd_read_event_handler: new ethX-pe@0x557d4692a220 | libevent_malloc: new ptr-libevent@0x557d4692a260 size 128 | libevent_malloc: new ptr-libevent@0x557d4692a2f0 size 16 | setup callback for interface eth0 192.1.3.194:4500 fd 132 | add_fd_read_event_handler: new ethX-pe@0x557d4692a310 | libevent_malloc: new ptr-libevent@0x557d4692a350 size 128 | libevent_malloc: new ptr-libevent@0x557d4692a3e0 size 16 | setup callback for interface eth0 192.1.3.194:500 fd 131 | add_fd_read_event_handler: new ethX-pe@0x557d4692a400 | libevent_malloc: new ptr-libevent@0x557d4692a440 size 128 | libevent_malloc: new ptr-libevent@0x557d4692a4d0 size 16 | setup callback for interface eth0 192.1.3.195:4500 fd 130 | add_fd_read_event_handler: new ethX-pe@0x557d4692a4f0 | libevent_malloc: new ptr-libevent@0x557d4692a530 size 128 | libevent_malloc: new ptr-libevent@0x557d4692a5c0 size 16 | setup callback for interface eth0 192.1.3.195:500 fd 129 | add_fd_read_event_handler: new ethX-pe@0x557d4692a5e0 | libevent_malloc: new ptr-libevent@0x557d4692a620 size 128 | libevent_malloc: new ptr-libevent@0x557d4692a6b0 size 16 | setup callback for interface eth0 192.1.3.196:4500 fd 128 | add_fd_read_event_handler: new ethX-pe@0x557d4692a6d0 | libevent_malloc: new ptr-libevent@0x557d4692a710 size 128 | libevent_malloc: new ptr-libevent@0x557d4692a7a0 size 16 | setup callback for interface eth0 192.1.3.196:500 fd 127 | add_fd_read_event_handler: new ethX-pe@0x557d4692a7c0 | libevent_malloc: new ptr-libevent@0x557d4692a800 size 128 | libevent_malloc: new ptr-libevent@0x557d4692a890 size 16 | setup callback for interface eth0 192.1.3.197:4500 fd 126 | add_fd_read_event_handler: new ethX-pe@0x557d4692a8b0 | libevent_malloc: new ptr-libevent@0x557d4692a8f0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692a980 size 16 | setup callback for interface eth0 192.1.3.197:500 fd 125 | add_fd_read_event_handler: new ethX-pe@0x557d4692a9a0 | libevent_malloc: new ptr-libevent@0x557d4692a9e0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692aa70 size 16 | setup callback for interface eth0 192.1.3.198:4500 fd 124 | add_fd_read_event_handler: new ethX-pe@0x557d4692aa90 | libevent_malloc: new ptr-libevent@0x557d4692aad0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692ab60 size 16 | setup callback for interface eth0 192.1.3.198:500 fd 123 | add_fd_read_event_handler: new ethX-pe@0x557d4692ab80 | libevent_malloc: new ptr-libevent@0x557d4692abc0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692ac50 size 16 | setup callback for interface eth0 192.1.3.199:4500 fd 122 | add_fd_read_event_handler: new ethX-pe@0x557d4692ac70 | libevent_malloc: new ptr-libevent@0x557d4692acb0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692ad40 size 16 | setup callback for interface eth0 192.1.3.199:500 fd 121 | add_fd_read_event_handler: new ethX-pe@0x557d4692ad60 | libevent_malloc: new ptr-libevent@0x557d4692ada0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692ae30 size 16 | setup callback for interface eth0 192.1.3.200:4500 fd 120 | add_fd_read_event_handler: new ethX-pe@0x557d4692ae50 | libevent_malloc: new ptr-libevent@0x557d4692ae90 size 128 | libevent_malloc: new ptr-libevent@0x557d4692af20 size 16 | setup callback for interface eth0 192.1.3.200:500 fd 119 | add_fd_read_event_handler: new ethX-pe@0x557d4692af40 | libevent_malloc: new ptr-libevent@0x557d4692af80 size 128 | libevent_malloc: new ptr-libevent@0x557d4692b010 size 16 | setup callback for interface eth0 192.1.3.201:4500 fd 118 | add_fd_read_event_handler: new ethX-pe@0x557d4692b030 | libevent_malloc: new ptr-libevent@0x557d4692b070 size 128 | libevent_malloc: new ptr-libevent@0x557d4692b100 size 16 | setup callback for interface eth0 192.1.3.201:500 fd 117 | add_fd_read_event_handler: new ethX-pe@0x557d4692b120 | libevent_malloc: new ptr-libevent@0x557d4692b160 size 128 | libevent_malloc: new ptr-libevent@0x557d4692b1f0 size 16 | setup callback for interface eth0 192.1.3.202:4500 fd 116 | add_fd_read_event_handler: new ethX-pe@0x557d4692b210 | libevent_malloc: new ptr-libevent@0x557d4692b250 size 128 | libevent_malloc: new ptr-libevent@0x557d4692b2e0 size 16 | setup callback for interface eth0 192.1.3.202:500 fd 115 | add_fd_read_event_handler: new ethX-pe@0x557d4692b300 | libevent_malloc: new ptr-libevent@0x557d4692b340 size 128 | libevent_malloc: new ptr-libevent@0x557d4692b3d0 size 16 | setup callback for interface eth0 192.1.3.203:4500 fd 114 | add_fd_read_event_handler: new ethX-pe@0x557d4692b3f0 | libevent_malloc: new ptr-libevent@0x557d4692b430 size 128 | libevent_malloc: new ptr-libevent@0x557d4692b4c0 size 16 | setup callback for interface eth0 192.1.3.203:500 fd 113 | add_fd_read_event_handler: new ethX-pe@0x557d4692b4e0 | libevent_malloc: new ptr-libevent@0x557d4692b520 size 128 | libevent_malloc: new ptr-libevent@0x557d4692b5b0 size 16 | setup callback for interface eth0 192.1.3.204:4500 fd 112 | add_fd_read_event_handler: new ethX-pe@0x557d4692b5d0 | libevent_malloc: new ptr-libevent@0x557d4692b610 size 128 | libevent_malloc: new ptr-libevent@0x557d4692b6a0 size 16 | setup callback for interface eth0 192.1.3.204:500 fd 111 | add_fd_read_event_handler: new ethX-pe@0x557d4692b6c0 | libevent_malloc: new ptr-libevent@0x557d4692b700 size 128 | libevent_malloc: new ptr-libevent@0x557d4692b790 size 16 | setup callback for interface eth0 192.1.3.205:4500 fd 110 | add_fd_read_event_handler: new ethX-pe@0x557d4692b7b0 | libevent_malloc: new ptr-libevent@0x557d4692b7f0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692b880 size 16 | setup callback for interface eth0 192.1.3.205:500 fd 109 | add_fd_read_event_handler: new ethX-pe@0x557d4692b8a0 | libevent_malloc: new ptr-libevent@0x557d4692b8e0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692b970 size 16 | setup callback for interface eth0 192.1.3.206:4500 fd 108 | add_fd_read_event_handler: new ethX-pe@0x557d4692b990 | libevent_malloc: new ptr-libevent@0x557d4692b9d0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692ba60 size 16 | setup callback for interface eth0 192.1.3.206:500 fd 107 | add_fd_read_event_handler: new ethX-pe@0x557d4692ba80 | libevent_malloc: new ptr-libevent@0x557d4692bac0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692bb50 size 16 | setup callback for interface eth0 192.1.3.207:4500 fd 106 | add_fd_read_event_handler: new ethX-pe@0x557d4692bb70 | libevent_malloc: new ptr-libevent@0x557d4692bbb0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692bc40 size 16 | setup callback for interface eth0 192.1.3.207:500 fd 105 | add_fd_read_event_handler: new ethX-pe@0x557d4692bc60 | libevent_malloc: new ptr-libevent@0x557d4692bca0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692bd30 size 16 | setup callback for interface eth0 192.1.3.208:4500 fd 104 | add_fd_read_event_handler: new ethX-pe@0x557d4692bd50 | libevent_malloc: new ptr-libevent@0x557d4692bd90 size 128 | libevent_malloc: new ptr-libevent@0x557d4692be20 size 16 | setup callback for interface eth0 192.1.3.208:500 fd 103 | add_fd_read_event_handler: new ethX-pe@0x557d4692be40 | libevent_malloc: new ptr-libevent@0x557d4692be80 size 128 | libevent_malloc: new ptr-libevent@0x557d4692bf10 size 16 | setup callback for interface eth0 192.1.3.210:4500 fd 102 | add_fd_read_event_handler: new ethX-pe@0x557d4692bf30 | libevent_malloc: new ptr-libevent@0x557d4692bf70 size 128 | libevent_malloc: new ptr-libevent@0x557d4692c000 size 16 | setup callback for interface eth0 192.1.3.210:500 fd 101 | add_fd_read_event_handler: new ethX-pe@0x557d4692c020 | libevent_malloc: new ptr-libevent@0x557d4692c060 size 128 | libevent_malloc: new ptr-libevent@0x557d4692c0f0 size 16 | setup callback for interface eth0 192.1.3.211:4500 fd 100 | add_fd_read_event_handler: new ethX-pe@0x557d4692c110 | libevent_malloc: new ptr-libevent@0x557d4692c150 size 128 | libevent_malloc: new ptr-libevent@0x557d4692c1e0 size 16 | setup callback for interface eth0 192.1.3.211:500 fd 99 | add_fd_read_event_handler: new ethX-pe@0x557d4692c200 | libevent_malloc: new ptr-libevent@0x557d4692c240 size 128 | libevent_malloc: new ptr-libevent@0x557d4692c2d0 size 16 | setup callback for interface eth0 192.1.3.212:4500 fd 98 | add_fd_read_event_handler: new ethX-pe@0x557d4692c2f0 | libevent_malloc: new ptr-libevent@0x557d4692c330 size 128 | libevent_malloc: new ptr-libevent@0x557d4692c3c0 size 16 | setup callback for interface eth0 192.1.3.212:500 fd 97 | add_fd_read_event_handler: new ethX-pe@0x557d4692c3e0 | libevent_malloc: new ptr-libevent@0x557d4692c420 size 128 | libevent_malloc: new ptr-libevent@0x557d4692c4b0 size 16 | setup callback for interface eth0 192.1.3.213:4500 fd 96 | add_fd_read_event_handler: new ethX-pe@0x557d4692c4d0 | libevent_malloc: new ptr-libevent@0x557d4692c510 size 128 | libevent_malloc: new ptr-libevent@0x557d4692c5a0 size 16 | setup callback for interface eth0 192.1.3.213:500 fd 95 | add_fd_read_event_handler: new ethX-pe@0x557d4692c5c0 | libevent_malloc: new ptr-libevent@0x557d4692c600 size 128 | libevent_malloc: new ptr-libevent@0x557d4692c690 size 16 | setup callback for interface eth0 192.1.3.214:4500 fd 94 | add_fd_read_event_handler: new ethX-pe@0x557d4692c6b0 | libevent_malloc: new ptr-libevent@0x557d4692c6f0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692c780 size 16 | setup callback for interface eth0 192.1.3.214:500 fd 93 | add_fd_read_event_handler: new ethX-pe@0x557d4692c7a0 | libevent_malloc: new ptr-libevent@0x557d4692c7e0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692c870 size 16 | setup callback for interface eth0 192.1.3.215:4500 fd 92 | add_fd_read_event_handler: new ethX-pe@0x557d4692c890 | libevent_malloc: new ptr-libevent@0x557d4692c8d0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692c960 size 16 | setup callback for interface eth0 192.1.3.215:500 fd 91 | add_fd_read_event_handler: new ethX-pe@0x557d4692c980 | libevent_malloc: new ptr-libevent@0x557d4692c9c0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692ca50 size 16 | setup callback for interface eth0 192.1.3.216:4500 fd 90 | add_fd_read_event_handler: new ethX-pe@0x557d4692ca70 | libevent_malloc: new ptr-libevent@0x557d4692cab0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692cb40 size 16 | setup callback for interface eth0 192.1.3.216:500 fd 89 | add_fd_read_event_handler: new ethX-pe@0x557d4692cb60 | libevent_malloc: new ptr-libevent@0x557d4692cba0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692cc30 size 16 | setup callback for interface eth0 192.1.3.217:4500 fd 88 | add_fd_read_event_handler: new ethX-pe@0x557d4692cc50 | libevent_malloc: new ptr-libevent@0x557d4692cc90 size 128 | libevent_malloc: new ptr-libevent@0x557d4692cd20 size 16 | setup callback for interface eth0 192.1.3.217:500 fd 87 | add_fd_read_event_handler: new ethX-pe@0x557d4692cd40 | libevent_malloc: new ptr-libevent@0x557d4692cd80 size 128 | libevent_malloc: new ptr-libevent@0x557d4692ce10 size 16 | setup callback for interface eth0 192.1.3.218:4500 fd 86 | add_fd_read_event_handler: new ethX-pe@0x557d4692ce30 | libevent_malloc: new ptr-libevent@0x557d4692ce70 size 128 | libevent_malloc: new ptr-libevent@0x557d4692cf00 size 16 | setup callback for interface eth0 192.1.3.218:500 fd 85 | add_fd_read_event_handler: new ethX-pe@0x557d4692cf20 | libevent_malloc: new ptr-libevent@0x557d4692cf60 size 128 | libevent_malloc: new ptr-libevent@0x557d4692cff0 size 16 | setup callback for interface eth0 192.1.3.219:4500 fd 84 | add_fd_read_event_handler: new ethX-pe@0x557d4692d010 | libevent_malloc: new ptr-libevent@0x557d4692d050 size 128 | libevent_malloc: new ptr-libevent@0x557d4692d0e0 size 16 | setup callback for interface eth0 192.1.3.219:500 fd 83 | add_fd_read_event_handler: new ethX-pe@0x557d4692d100 | libevent_malloc: new ptr-libevent@0x557d4692d140 size 128 | libevent_malloc: new ptr-libevent@0x557d4692d1d0 size 16 | setup callback for interface eth0 192.1.3.220:4500 fd 82 | add_fd_read_event_handler: new ethX-pe@0x557d4692d1f0 | libevent_malloc: new ptr-libevent@0x557d4692d230 size 128 | libevent_malloc: new ptr-libevent@0x557d4692d2c0 size 16 | setup callback for interface eth0 192.1.3.220:500 fd 81 | add_fd_read_event_handler: new ethX-pe@0x557d4692d2e0 | libevent_malloc: new ptr-libevent@0x557d4692d320 size 128 | libevent_malloc: new ptr-libevent@0x557d4692d3b0 size 16 | setup callback for interface eth0 192.1.3.221:4500 fd 80 | add_fd_read_event_handler: new ethX-pe@0x557d4692d3d0 | libevent_malloc: new ptr-libevent@0x557d4692d410 size 128 | libevent_malloc: new ptr-libevent@0x557d4692d4a0 size 16 | setup callback for interface eth0 192.1.3.221:500 fd 79 | add_fd_read_event_handler: new ethX-pe@0x557d4692d4c0 | libevent_malloc: new ptr-libevent@0x557d4692d500 size 128 | libevent_malloc: new ptr-libevent@0x557d4692d590 size 16 | setup callback for interface eth0 192.1.3.222:4500 fd 78 | add_fd_read_event_handler: new ethX-pe@0x557d4692d5b0 | libevent_malloc: new ptr-libevent@0x557d4692d5f0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692d680 size 16 | setup callback for interface eth0 192.1.3.222:500 fd 77 | add_fd_read_event_handler: new ethX-pe@0x557d4692d6a0 | libevent_malloc: new ptr-libevent@0x557d4692d6e0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692d770 size 16 | setup callback for interface eth0 192.1.3.223:4500 fd 76 | add_fd_read_event_handler: new ethX-pe@0x557d4692d790 | libevent_malloc: new ptr-libevent@0x557d4692d7d0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692d860 size 16 | setup callback for interface eth0 192.1.3.223:500 fd 75 | add_fd_read_event_handler: new ethX-pe@0x557d4692d880 | libevent_malloc: new ptr-libevent@0x557d4692d8c0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692d950 size 16 | setup callback for interface eth0 192.1.3.224:4500 fd 74 | add_fd_read_event_handler: new ethX-pe@0x557d4692d970 | libevent_malloc: new ptr-libevent@0x557d4692d9b0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692da40 size 16 | setup callback for interface eth0 192.1.3.224:500 fd 73 | add_fd_read_event_handler: new ethX-pe@0x557d4692da60 | libevent_malloc: new ptr-libevent@0x557d4692daa0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692db30 size 16 | setup callback for interface eth0 192.1.3.225:4500 fd 72 | add_fd_read_event_handler: new ethX-pe@0x557d4692db50 | libevent_malloc: new ptr-libevent@0x557d4692db90 size 128 | libevent_malloc: new ptr-libevent@0x557d4692dc20 size 16 | setup callback for interface eth0 192.1.3.225:500 fd 71 | add_fd_read_event_handler: new ethX-pe@0x557d4692dc40 | libevent_malloc: new ptr-libevent@0x557d4692dc80 size 128 | libevent_malloc: new ptr-libevent@0x557d4692dd10 size 16 | setup callback for interface eth0 192.1.3.226:4500 fd 70 | add_fd_read_event_handler: new ethX-pe@0x557d4692dd30 | libevent_malloc: new ptr-libevent@0x557d4692dd70 size 128 | libevent_malloc: new ptr-libevent@0x557d4692de00 size 16 | setup callback for interface eth0 192.1.3.226:500 fd 69 | add_fd_read_event_handler: new ethX-pe@0x557d4692de20 | libevent_malloc: new ptr-libevent@0x557d4692de60 size 128 | libevent_malloc: new ptr-libevent@0x557d4692def0 size 16 | setup callback for interface eth0 192.1.3.227:4500 fd 68 | add_fd_read_event_handler: new ethX-pe@0x557d4692df10 | libevent_malloc: new ptr-libevent@0x557d4692df50 size 128 | libevent_malloc: new ptr-libevent@0x557d4692dfe0 size 16 | setup callback for interface eth0 192.1.3.227:500 fd 67 | add_fd_read_event_handler: new ethX-pe@0x557d4692e000 | libevent_malloc: new ptr-libevent@0x557d4692e040 size 128 | libevent_malloc: new ptr-libevent@0x557d4692e0d0 size 16 | setup callback for interface eth0 192.1.3.228:4500 fd 66 | add_fd_read_event_handler: new ethX-pe@0x557d4692e0f0 | libevent_malloc: new ptr-libevent@0x557d4692e130 size 128 | libevent_malloc: new ptr-libevent@0x557d4692e1c0 size 16 | setup callback for interface eth0 192.1.3.228:500 fd 65 | add_fd_read_event_handler: new ethX-pe@0x557d4692e1e0 | libevent_malloc: new ptr-libevent@0x557d4692e220 size 128 | libevent_malloc: new ptr-libevent@0x557d4692e2b0 size 16 | setup callback for interface eth0 192.1.3.229:4500 fd 64 | add_fd_read_event_handler: new ethX-pe@0x557d4692e2d0 | libevent_malloc: new ptr-libevent@0x557d4692e310 size 128 | libevent_malloc: new ptr-libevent@0x557d4692e3a0 size 16 | setup callback for interface eth0 192.1.3.229:500 fd 63 | add_fd_read_event_handler: new ethX-pe@0x557d4692e3c0 | libevent_malloc: new ptr-libevent@0x557d4692e400 size 128 | libevent_malloc: new ptr-libevent@0x557d4692e490 size 16 | setup callback for interface eth0 192.1.3.230:4500 fd 62 | add_fd_read_event_handler: new ethX-pe@0x557d4692e4b0 | libevent_malloc: new ptr-libevent@0x557d4692e4f0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692e580 size 16 | setup callback for interface eth0 192.1.3.230:500 fd 61 | add_fd_read_event_handler: new ethX-pe@0x557d4692e5a0 | libevent_malloc: new ptr-libevent@0x557d4692e5e0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692e670 size 16 | setup callback for interface eth0 192.1.3.231:4500 fd 60 | add_fd_read_event_handler: new ethX-pe@0x557d4692e690 | libevent_malloc: new ptr-libevent@0x557d4692e6d0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692e760 size 16 | setup callback for interface eth0 192.1.3.231:500 fd 59 | add_fd_read_event_handler: new ethX-pe@0x557d4692e780 | libevent_malloc: new ptr-libevent@0x557d4692e7c0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692e850 size 16 | setup callback for interface eth0 192.1.3.232:4500 fd 58 | add_fd_read_event_handler: new ethX-pe@0x557d4692e870 | libevent_malloc: new ptr-libevent@0x557d4692e8b0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692e940 size 16 | setup callback for interface eth0 192.1.3.232:500 fd 57 | add_fd_read_event_handler: new ethX-pe@0x557d4692e960 | libevent_malloc: new ptr-libevent@0x557d4692e9a0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692ea30 size 16 | setup callback for interface eth0 192.1.3.233:4500 fd 56 | add_fd_read_event_handler: new ethX-pe@0x557d4692ea50 | libevent_malloc: new ptr-libevent@0x557d4692ea90 size 128 | libevent_malloc: new ptr-libevent@0x557d4692eb20 size 16 | setup callback for interface eth0 192.1.3.233:500 fd 55 | add_fd_read_event_handler: new ethX-pe@0x557d4692eb40 | libevent_malloc: new ptr-libevent@0x557d4692eb80 size 128 | libevent_malloc: new ptr-libevent@0x557d4692ec10 size 16 | setup callback for interface eth0 192.1.3.234:4500 fd 54 | add_fd_read_event_handler: new ethX-pe@0x557d4692ec30 | libevent_malloc: new ptr-libevent@0x557d4692ec70 size 128 | libevent_malloc: new ptr-libevent@0x557d4692ed00 size 16 | setup callback for interface eth0 192.1.3.234:500 fd 53 | add_fd_read_event_handler: new ethX-pe@0x557d4692ed20 | libevent_malloc: new ptr-libevent@0x557d4692ed60 size 128 | libevent_malloc: new ptr-libevent@0x557d4692edf0 size 16 | setup callback for interface eth0 192.1.3.235:4500 fd 52 | add_fd_read_event_handler: new ethX-pe@0x557d4692ee10 | libevent_malloc: new ptr-libevent@0x557d4692ee50 size 128 | libevent_malloc: new ptr-libevent@0x557d4692eee0 size 16 | setup callback for interface eth0 192.1.3.235:500 fd 51 | add_fd_read_event_handler: new ethX-pe@0x557d4692ef00 | libevent_malloc: new ptr-libevent@0x557d4692ef40 size 128 | libevent_malloc: new ptr-libevent@0x557d4692efd0 size 16 | setup callback for interface eth0 192.1.3.236:4500 fd 50 | add_fd_read_event_handler: new ethX-pe@0x557d4692eff0 | libevent_malloc: new ptr-libevent@0x557d4692f030 size 128 | libevent_malloc: new ptr-libevent@0x557d4692f0c0 size 16 | setup callback for interface eth0 192.1.3.236:500 fd 49 | add_fd_read_event_handler: new ethX-pe@0x557d4692f0e0 | libevent_malloc: new ptr-libevent@0x557d4692f120 size 128 | libevent_malloc: new ptr-libevent@0x557d4692f1b0 size 16 | setup callback for interface eth0 192.1.3.237:4500 fd 48 | add_fd_read_event_handler: new ethX-pe@0x557d4692f1d0 | libevent_malloc: new ptr-libevent@0x557d4692f210 size 128 | libevent_malloc: new ptr-libevent@0x557d4692f2a0 size 16 | setup callback for interface eth0 192.1.3.237:500 fd 47 | add_fd_read_event_handler: new ethX-pe@0x557d4692f2c0 | libevent_malloc: new ptr-libevent@0x557d4692f300 size 128 | libevent_malloc: new ptr-libevent@0x557d4692f390 size 16 | setup callback for interface eth0 192.1.3.238:4500 fd 46 | add_fd_read_event_handler: new ethX-pe@0x557d4692f3b0 | libevent_malloc: new ptr-libevent@0x557d4692f3f0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692f480 size 16 | setup callback for interface eth0 192.1.3.238:500 fd 45 | add_fd_read_event_handler: new ethX-pe@0x557d4692f4a0 | libevent_malloc: new ptr-libevent@0x557d4692f4e0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692f570 size 16 | setup callback for interface eth0 192.1.3.239:4500 fd 44 | add_fd_read_event_handler: new ethX-pe@0x557d4692f590 | libevent_malloc: new ptr-libevent@0x557d4692f5d0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692f660 size 16 | setup callback for interface eth0 192.1.3.239:500 fd 43 | add_fd_read_event_handler: new ethX-pe@0x557d4692f680 | libevent_malloc: new ptr-libevent@0x557d4692f6c0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692f750 size 16 | setup callback for interface eth0 192.1.3.240:4500 fd 42 | add_fd_read_event_handler: new ethX-pe@0x557d4692f770 | libevent_malloc: new ptr-libevent@0x557d4692f7b0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692f840 size 16 | setup callback for interface eth0 192.1.3.240:500 fd 41 | add_fd_read_event_handler: new ethX-pe@0x557d4692f860 | libevent_malloc: new ptr-libevent@0x557d4692f8a0 size 128 | libevent_malloc: new ptr-libevent@0x557d4692f930 size 16 | setup callback for interface eth0 192.1.3.241:4500 fd 40 | add_fd_read_event_handler: new ethX-pe@0x557d4692f950 | libevent_malloc: new ptr-libevent@0x557d4692f990 size 128 | libevent_malloc: new ptr-libevent@0x557d4692fa20 size 16 | setup callback for interface eth0 192.1.3.241:500 fd 39 | add_fd_read_event_handler: new ethX-pe@0x557d4692fa40 | libevent_malloc: new ptr-libevent@0x557d4692fa80 size 128 | libevent_malloc: new ptr-libevent@0x557d4692fb10 size 16 | setup callback for interface eth0 192.1.3.242:4500 fd 38 | add_fd_read_event_handler: new ethX-pe@0x557d4692fb30 | libevent_malloc: new ptr-libevent@0x557d4692fb70 size 128 | libevent_malloc: new ptr-libevent@0x557d4692fc00 size 16 | setup callback for interface eth0 192.1.3.242:500 fd 37 | add_fd_read_event_handler: new ethX-pe@0x557d4692fc20 | libevent_malloc: new ptr-libevent@0x557d4692fc60 size 128 | libevent_malloc: new ptr-libevent@0x557d4692fcf0 size 16 | setup callback for interface eth0 192.1.3.243:4500 fd 36 | add_fd_read_event_handler: new ethX-pe@0x557d4692fd10 | libevent_malloc: new ptr-libevent@0x557d4692fd50 size 128 | libevent_malloc: new ptr-libevent@0x557d4692fde0 size 16 | setup callback for interface eth0 192.1.3.243:500 fd 35 | add_fd_read_event_handler: new ethX-pe@0x557d4692fe00 | libevent_malloc: new ptr-libevent@0x557d4692fe40 size 128 | libevent_malloc: new ptr-libevent@0x557d4692fed0 size 16 | setup callback for interface eth0 192.1.3.244:4500 fd 34 | add_fd_read_event_handler: new ethX-pe@0x557d4692fef0 | libevent_malloc: new ptr-libevent@0x557d4692ff30 size 128 | libevent_malloc: new ptr-libevent@0x557d4692ffc0 size 16 | setup callback for interface eth0 192.1.3.244:500 fd 33 | add_fd_read_event_handler: new ethX-pe@0x557d4692ffe0 | libevent_malloc: new ptr-libevent@0x557d46930020 size 128 | libevent_malloc: new ptr-libevent@0x557d469300b0 size 16 | setup callback for interface eth0 192.1.3.245:4500 fd 32 | add_fd_read_event_handler: new ethX-pe@0x557d469300d0 | libevent_malloc: new ptr-libevent@0x557d46930110 size 128 | libevent_malloc: new ptr-libevent@0x557d469301a0 size 16 | setup callback for interface eth0 192.1.3.245:500 fd 31 | add_fd_read_event_handler: new ethX-pe@0x557d469301c0 | libevent_malloc: new ptr-libevent@0x557d46930200 size 128 | libevent_malloc: new ptr-libevent@0x557d46930290 size 16 | setup callback for interface eth0 192.1.3.246:4500 fd 30 | add_fd_read_event_handler: new ethX-pe@0x557d469302b0 | libevent_malloc: new ptr-libevent@0x557d469302f0 size 128 | libevent_malloc: new ptr-libevent@0x557d46930380 size 16 | setup callback for interface eth0 192.1.3.246:500 fd 29 | add_fd_read_event_handler: new ethX-pe@0x557d469303a0 | libevent_malloc: new ptr-libevent@0x557d469303e0 size 128 | libevent_malloc: new ptr-libevent@0x557d46930470 size 16 | setup callback for interface eth0 192.1.3.247:4500 fd 28 | add_fd_read_event_handler: new ethX-pe@0x557d46930490 | libevent_malloc: new ptr-libevent@0x557d469304d0 size 128 | libevent_malloc: new ptr-libevent@0x557d46930560 size 16 | setup callback for interface eth0 192.1.3.247:500 fd 27 | add_fd_read_event_handler: new ethX-pe@0x557d46930580 | libevent_malloc: new ptr-libevent@0x557d469305c0 size 128 | libevent_malloc: new ptr-libevent@0x557d46930650 size 16 | setup callback for interface eth0 192.1.3.248:4500 fd 26 | add_fd_read_event_handler: new ethX-pe@0x557d46930670 | libevent_malloc: new ptr-libevent@0x557d469306b0 size 128 | libevent_malloc: new ptr-libevent@0x557d46930740 size 16 | setup callback for interface eth0 192.1.3.248:500 fd 25 | add_fd_read_event_handler: new ethX-pe@0x557d46930760 | libevent_malloc: new ptr-libevent@0x557d469307a0 size 128 | libevent_malloc: new ptr-libevent@0x557d46930830 size 16 | setup callback for interface eth0 192.1.3.249:4500 fd 24 | add_fd_read_event_handler: new ethX-pe@0x557d46930850 | libevent_malloc: new ptr-libevent@0x557d46930890 size 128 | libevent_malloc: new ptr-libevent@0x557d46930920 size 16 | setup callback for interface eth0 192.1.3.249:500 fd 23 | add_fd_read_event_handler: new ethX-pe@0x557d46930940 | libevent_malloc: new ptr-libevent@0x557d46930980 size 128 | libevent_malloc: new ptr-libevent@0x557d46930a10 size 16 | setup callback for interface eth0 192.1.3.250:4500 fd 22 | add_fd_read_event_handler: new ethX-pe@0x557d46930a30 | libevent_malloc: new ptr-libevent@0x557d46930a70 size 128 | libevent_malloc: new ptr-libevent@0x557d46930b00 size 16 | setup callback for interface eth0 192.1.3.250:500 fd 21 | add_fd_read_event_handler: new ethX-pe@0x557d46930b20 | libevent_malloc: new ptr-libevent@0x557d46930b60 size 128 | libevent_malloc: new ptr-libevent@0x557d46930bf0 size 16 | setup callback for interface eth0 192.1.3.251:4500 fd 20 | add_fd_read_event_handler: new ethX-pe@0x557d46930c10 | libevent_malloc: new ptr-libevent@0x557d46930c50 size 128 | libevent_malloc: new ptr-libevent@0x557d46930ce0 size 16 | setup callback for interface eth0 192.1.3.251:500 fd 19 | add_fd_read_event_handler: new ethX-pe@0x557d46930d00 | libevent_malloc: new ptr-libevent@0x557d46930d40 size 128 | libevent_malloc: new ptr-libevent@0x557d46930dd0 size 16 | setup callback for interface eth0 192.1.3.252:4500 fd 18 | add_fd_read_event_handler: new ethX-pe@0x557d46930df0 | libevent_malloc: new ptr-libevent@0x557d46930e30 size 128 | libevent_malloc: new ptr-libevent@0x557d46930ec0 size 16 | setup callback for interface eth0 192.1.3.252:500 fd 17 | certs and keys locked by 'free_preshared_secrets' | certs and keys unlocked by 'free_preshared_secrets' loading secrets from "/etc/ipsec.secrets" | Processing PSK at line 1: passed | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | pluto_sd: executing action action: ready(5), status 0 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 25.7 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-base with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for (none) is 15 | counting wild cards for @east is 0 | based upon policy, the connection is a template. added connection description "road-eastnet-nonat-base" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.2.23<192.1.2.23>[@east]...0.0.0.0---%any | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.149 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-1 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.1 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.1:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d468df910 added connection description "road-eastnet-nonat-1" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.1<192.1.3.1>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.121 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-2 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.2 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.2:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d468b4f30 added connection description "road-eastnet-nonat-2" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.2<192.1.3.2>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.114 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-3 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.3 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.3:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d468b4fe0 added connection description "road-eastnet-nonat-3" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.3<192.1.3.3>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.11 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-4 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.4 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.4:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d468b44e0 added connection description "road-eastnet-nonat-4" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.4<192.1.3.4>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.109 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-5 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.5 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.5:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d468b3110 added connection description "road-eastnet-nonat-5" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.5<192.1.3.5>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.111 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-6 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.6 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.6:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d468b3210 added connection description "road-eastnet-nonat-6" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.6<192.1.3.6>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.106 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-7 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.7 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.7:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d468b3310 added connection description "road-eastnet-nonat-7" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.7<192.1.3.7>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.106 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-8 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.8 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.8:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46936680 added connection description "road-eastnet-nonat-8" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.8<192.1.3.8>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.108 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-9 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.9 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.9:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469370e0 added connection description "road-eastnet-nonat-9" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.9<192.1.3.9>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.115 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-10 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.10 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.10:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46937b40 added connection description "road-eastnet-nonat-10" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.10<192.1.3.10>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.105 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-11 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.11 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.11:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469385a0 added connection description "road-eastnet-nonat-11" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.11<192.1.3.11>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.113 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-12 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.12 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.12:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46939000 added connection description "road-eastnet-nonat-12" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.12<192.1.3.12>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.109 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-13 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.13 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.13:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46939a60 added connection description "road-eastnet-nonat-13" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.13<192.1.3.13>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.105 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-14 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.14 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.14:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4693a4c0 added connection description "road-eastnet-nonat-14" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.14<192.1.3.14>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.107 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-15 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.15 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.15:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4693af20 added connection description "road-eastnet-nonat-15" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.15<192.1.3.15>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.106 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-16 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.16 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.16:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4693b980 added connection description "road-eastnet-nonat-16" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.16<192.1.3.16>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.107 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-17 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.17 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.17:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4693c3e0 added connection description "road-eastnet-nonat-17" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.17<192.1.3.17>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.106 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-18 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.18 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.18:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4693ce40 added connection description "road-eastnet-nonat-18" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.18<192.1.3.18>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.11 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-19 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.19 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.19:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4693d8a0 added connection description "road-eastnet-nonat-19" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.19<192.1.3.19>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.107 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-20 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.20 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.20:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4693e300 added connection description "road-eastnet-nonat-20" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.20<192.1.3.20>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.107 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-21 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.21 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.21:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4693ed60 added connection description "road-eastnet-nonat-21" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.21<192.1.3.21>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.107 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-22 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.22 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.22:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4693f7c0 added connection description "road-eastnet-nonat-22" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.22<192.1.3.22>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.107 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-23 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.23 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.23:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46940220 added connection description "road-eastnet-nonat-23" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.23<192.1.3.23>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.107 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-24 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.24 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.24:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46940c80 added connection description "road-eastnet-nonat-24" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.24<192.1.3.24>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.107 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-25 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.25 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.25:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469416e0 added connection description "road-eastnet-nonat-25" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.25<192.1.3.25>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.112 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-26 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.26 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.26:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46942140 added connection description "road-eastnet-nonat-26" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.26<192.1.3.26>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.108 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-27 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.27 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.27:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46942ba0 added connection description "road-eastnet-nonat-27" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.27<192.1.3.27>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.105 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-28 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.28 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.28:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46943600 added connection description "road-eastnet-nonat-28" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.28<192.1.3.28>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.11 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-29 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.29 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.29:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46944060 added connection description "road-eastnet-nonat-29" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.29<192.1.3.29>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.108 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-30 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.30 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.30:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46944ac0 added connection description "road-eastnet-nonat-30" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.30<192.1.3.30>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.14 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-31 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.31 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.31:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46945520 added connection description "road-eastnet-nonat-31" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.31<192.1.3.31>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.121 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-32 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.32 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.32:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46945f80 added connection description "road-eastnet-nonat-32" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.32<192.1.3.32>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.117 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-33 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.33 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.33:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469469e0 added connection description "road-eastnet-nonat-33" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.33<192.1.3.33>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.109 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-34 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.34 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.34:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46947440 added connection description "road-eastnet-nonat-34" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.34<192.1.3.34>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.111 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-35 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.35 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.35:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46947ea0 added connection description "road-eastnet-nonat-35" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.35<192.1.3.35>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.107 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-36 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.36 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.36:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46948900 added connection description "road-eastnet-nonat-36" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.36<192.1.3.36>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.108 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-37 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.37 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.37:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46949360 added connection description "road-eastnet-nonat-37" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.37<192.1.3.37>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.112 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-38 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.38 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.38:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46949dc0 added connection description "road-eastnet-nonat-38" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.38<192.1.3.38>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.106 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-39 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.39 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.39:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4694a820 added connection description "road-eastnet-nonat-39" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.39<192.1.3.39>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.11 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-40 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.40 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.40:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4694b280 added connection description "road-eastnet-nonat-40" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.40<192.1.3.40>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.111 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-41 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.41 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.41:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4694bce0 added connection description "road-eastnet-nonat-41" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.41<192.1.3.41>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.107 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-42 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.42 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.42:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4694c740 added connection description "road-eastnet-nonat-42" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.42<192.1.3.42>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.108 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-43 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.43 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.43:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4694d1a0 added connection description "road-eastnet-nonat-43" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.43<192.1.3.43>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.11 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-44 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.44 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.44:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4694dc00 added connection description "road-eastnet-nonat-44" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.44<192.1.3.44>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.107 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-45 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.45 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.45:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4694e660 added connection description "road-eastnet-nonat-45" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.45<192.1.3.45>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.109 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-46 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.46 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.46:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4694f0c0 added connection description "road-eastnet-nonat-46" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.46<192.1.3.46>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.112 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-47 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.47 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.47:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4694fb20 added connection description "road-eastnet-nonat-47" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.47<192.1.3.47>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.108 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-48 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.48 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.48:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46950580 added connection description "road-eastnet-nonat-48" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.48<192.1.3.48>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.109 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-49 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.49 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.49:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46950fe0 added connection description "road-eastnet-nonat-49" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.49<192.1.3.49>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.109 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-50 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.50 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.50:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46951a40 added connection description "road-eastnet-nonat-50" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.50<192.1.3.50>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.111 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-51 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.51 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.51:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469524a0 added connection description "road-eastnet-nonat-51" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.51<192.1.3.51>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.124 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-52 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.52 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.52:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46952f00 added connection description "road-eastnet-nonat-52" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.52<192.1.3.52>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.113 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-53 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.53 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.53:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46953960 added connection description "road-eastnet-nonat-53" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.53<192.1.3.53>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.113 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-54 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.54 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.54:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469543c0 added connection description "road-eastnet-nonat-54" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.54<192.1.3.54>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.13 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-55 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.55 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.55:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46954e20 added connection description "road-eastnet-nonat-55" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.55<192.1.3.55>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.153 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-56 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.56 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.56:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46955880 added connection description "road-eastnet-nonat-56" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.56<192.1.3.56>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.127 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-57 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.57 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.57:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469562e0 added connection description "road-eastnet-nonat-57" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.57<192.1.3.57>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.123 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-58 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.58 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.58:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46956d40 added connection description "road-eastnet-nonat-58" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.58<192.1.3.58>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.116 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-59 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.59 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.59:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469577a0 added connection description "road-eastnet-nonat-59" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.59<192.1.3.59>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-60 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.60 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.60:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46958200 added connection description "road-eastnet-nonat-60" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.60<192.1.3.60>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-61 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.61 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.61:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46958c60 added connection description "road-eastnet-nonat-61" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.61<192.1.3.61>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.112 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-62 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.62 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.62:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469596c0 added connection description "road-eastnet-nonat-62" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.62<192.1.3.62>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-63 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.63 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.63:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4695a120 added connection description "road-eastnet-nonat-63" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.63<192.1.3.63>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.126 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-64 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.64 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.64:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4695ab80 added connection description "road-eastnet-nonat-64" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.64<192.1.3.64>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.131 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-65 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.65 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.65:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4695b5e0 added connection description "road-eastnet-nonat-65" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.65<192.1.3.65>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-66 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.66 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.66:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4695c040 added connection description "road-eastnet-nonat-66" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.66<192.1.3.66>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.116 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-67 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.67 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.67:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4695caa0 added connection description "road-eastnet-nonat-67" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.67<192.1.3.67>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.126 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-68 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.68 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.68:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4695d500 added connection description "road-eastnet-nonat-68" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.68<192.1.3.68>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.121 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-69 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.69 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.69:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4695df60 added connection description "road-eastnet-nonat-69" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.69<192.1.3.69>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.129 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-70 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.70 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.70:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4695e9c0 added connection description "road-eastnet-nonat-70" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.70<192.1.3.70>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.115 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-71 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.71 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.71:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4695f420 added connection description "road-eastnet-nonat-71" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.71<192.1.3.71>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-72 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.72 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.72:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4695fe80 added connection description "road-eastnet-nonat-72" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.72<192.1.3.72>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.125 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-73 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.73 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.73:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469608e0 added connection description "road-eastnet-nonat-73" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.73<192.1.3.73>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.132 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-74 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.74 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.74:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46961340 added connection description "road-eastnet-nonat-74" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.74<192.1.3.74>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.123 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-75 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.75 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.75:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46961da0 added connection description "road-eastnet-nonat-75" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.75<192.1.3.75>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.124 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-76 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.76 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.76:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46962800 added connection description "road-eastnet-nonat-76" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.76<192.1.3.76>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.132 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-77 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.77 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.77:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46963260 added connection description "road-eastnet-nonat-77" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.77<192.1.3.77>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.13 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-78 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.78 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.78:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46963cc0 added connection description "road-eastnet-nonat-78" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.78<192.1.3.78>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.126 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-79 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.79 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.79:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46964720 added connection description "road-eastnet-nonat-79" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.79<192.1.3.79>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.13 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-80 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.80 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.80:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46965180 added connection description "road-eastnet-nonat-80" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.80<192.1.3.80>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.124 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-81 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.81 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.81:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46965be0 added connection description "road-eastnet-nonat-81" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.81<192.1.3.81>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.123 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-82 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.82 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.82:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46966640 added connection description "road-eastnet-nonat-82" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.82<192.1.3.82>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-83 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.83 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.83:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469670a0 added connection description "road-eastnet-nonat-83" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.83<192.1.3.83>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-84 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.84 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.84:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46967b00 added connection description "road-eastnet-nonat-84" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.84<192.1.3.84>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-85 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.85 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.85:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46968560 added connection description "road-eastnet-nonat-85" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.85<192.1.3.85>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.136 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-86 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.86 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.86:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46968fc0 added connection description "road-eastnet-nonat-86" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.86<192.1.3.86>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.117 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-87 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.87 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.87:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46969a20 added connection description "road-eastnet-nonat-87" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.87<192.1.3.87>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.115 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-88 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.88 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.88:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4696a480 added connection description "road-eastnet-nonat-88" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.88<192.1.3.88>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-89 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.89 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.89:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4696aee0 added connection description "road-eastnet-nonat-89" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.89<192.1.3.89>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.112 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-90 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.90 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.90:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4696b940 added connection description "road-eastnet-nonat-90" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.90<192.1.3.90>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.115 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-91 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.91 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.91:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4696c3a0 added connection description "road-eastnet-nonat-91" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.91<192.1.3.91>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-92 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.92 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.92:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4696ce00 added connection description "road-eastnet-nonat-92" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.92<192.1.3.92>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.113 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-93 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.93 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.93:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4696d860 added connection description "road-eastnet-nonat-93" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.93<192.1.3.93>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.116 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-94 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.94 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.94:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4696e2c0 added connection description "road-eastnet-nonat-94" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.94<192.1.3.94>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-95 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.95 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.95:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4696ed20 added connection description "road-eastnet-nonat-95" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.95<192.1.3.95>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.112 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-96 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.96 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.96:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4696f780 added connection description "road-eastnet-nonat-96" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.96<192.1.3.96>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.115 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-97 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.97 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.97:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469701e0 added connection description "road-eastnet-nonat-97" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.97<192.1.3.97>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.116 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-98 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.98 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.98:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46970c40 added connection description "road-eastnet-nonat-98" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.98<192.1.3.98>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-99 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.99 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.99:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469716a0 added connection description "road-eastnet-nonat-99" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.99<192.1.3.99>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.116 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-100 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.100 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.100:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46972100 added connection description "road-eastnet-nonat-100" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.100<192.1.3.100>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-101 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.101 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.101:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46972b60 added connection description "road-eastnet-nonat-101" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.101<192.1.3.101>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.113 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-102 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.102 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.102:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469735c0 added connection description "road-eastnet-nonat-102" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.102<192.1.3.102>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.116 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-103 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.103 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.103:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46974020 added connection description "road-eastnet-nonat-103" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.103<192.1.3.103>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-104 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.104 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.104:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46974a80 added connection description "road-eastnet-nonat-104" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.104<192.1.3.104>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.114 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-105 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.105 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.105:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469754e0 added connection description "road-eastnet-nonat-105" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.105<192.1.3.105>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.138 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-106 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.106 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.106:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46975f40 added connection description "road-eastnet-nonat-106" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.106<192.1.3.106>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.142 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-107 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.107 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.107:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469769a0 added connection description "road-eastnet-nonat-107" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.107<192.1.3.107>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.127 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-108 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.108 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.108:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46977400 added connection description "road-eastnet-nonat-108" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.108<192.1.3.108>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.123 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-109 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.109 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.109:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46977e60 added connection description "road-eastnet-nonat-109" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.109<192.1.3.109>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.132 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-110 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.110 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.110:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469788c0 added connection description "road-eastnet-nonat-110" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.110<192.1.3.110>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.135 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-111 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.111 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.111:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46979320 added connection description "road-eastnet-nonat-111" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.111<192.1.3.111>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.129 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-112 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.112 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.112:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46979d80 added connection description "road-eastnet-nonat-112" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.112<192.1.3.112>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.117 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-113 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.113 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.113:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4697a7e0 added connection description "road-eastnet-nonat-113" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.113<192.1.3.113>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.125 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-114 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.114 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.114:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4697b240 added connection description "road-eastnet-nonat-114" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.114<192.1.3.114>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.115 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-115 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.115 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.115:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4697bca0 added connection description "road-eastnet-nonat-115" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.115<192.1.3.115>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.115 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-116 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.116 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.116:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4697c700 added connection description "road-eastnet-nonat-116" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.116<192.1.3.116>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-117 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.117 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.117:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4697d160 added connection description "road-eastnet-nonat-117" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.117<192.1.3.117>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.116 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-118 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.118 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.118:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4697dbc0 added connection description "road-eastnet-nonat-118" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.118<192.1.3.118>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.116 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-119 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.119 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.119:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4697e620 added connection description "road-eastnet-nonat-119" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.119<192.1.3.119>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.125 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-120 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.120 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.120:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4697f080 added connection description "road-eastnet-nonat-120" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.120<192.1.3.120>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.126 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-121 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.121 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.121:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4697fae0 added connection description "road-eastnet-nonat-121" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.121<192.1.3.121>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-122 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.122 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.122:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46980540 added connection description "road-eastnet-nonat-122" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.122<192.1.3.122>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-123 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.123 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.123:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46980fa0 added connection description "road-eastnet-nonat-123" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.123<192.1.3.123>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-124 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.124 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.124:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46981a00 added connection description "road-eastnet-nonat-124" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.124<192.1.3.124>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.114 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-125 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.125 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.125:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46982460 added connection description "road-eastnet-nonat-125" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.125<192.1.3.125>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-126 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.126 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.126:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46982ec0 added connection description "road-eastnet-nonat-126" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.126<192.1.3.126>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-127 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.127 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.127:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46983920 added connection description "road-eastnet-nonat-127" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.127<192.1.3.127>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.117 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-128 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.128 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.128:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46984380 added connection description "road-eastnet-nonat-128" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.128<192.1.3.128>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.127 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-129 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.129 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.129:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46984de0 added connection description "road-eastnet-nonat-129" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.129<192.1.3.129>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.168 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-130 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.130 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.130:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46985840 added connection description "road-eastnet-nonat-130" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.130<192.1.3.130>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.133 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-131 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.131 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.131:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469862a0 added connection description "road-eastnet-nonat-131" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.131<192.1.3.131>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-132 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.132 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.132:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46986d00 added connection description "road-eastnet-nonat-132" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.132<192.1.3.132>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-133 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.133 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.133:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46987760 added connection description "road-eastnet-nonat-133" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.133<192.1.3.133>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-134 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.134 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.134:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469881c0 added connection description "road-eastnet-nonat-134" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.134<192.1.3.134>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.117 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-135 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.135 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.135:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46988c20 added connection description "road-eastnet-nonat-135" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.135<192.1.3.135>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-136 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.136 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.136:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46989680 added connection description "road-eastnet-nonat-136" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.136<192.1.3.136>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-137 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.137 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.137:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4698a0e0 added connection description "road-eastnet-nonat-137" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.137<192.1.3.137>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.134 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-138 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.138 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.138:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4698ab40 added connection description "road-eastnet-nonat-138" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.138<192.1.3.138>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.117 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-139 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.139 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.139:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4698b5a0 added connection description "road-eastnet-nonat-139" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.139<192.1.3.139>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-140 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.140 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.140:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4698c000 added connection description "road-eastnet-nonat-140" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.140<192.1.3.140>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.116 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-141 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.141 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.141:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4698ca60 added connection description "road-eastnet-nonat-141" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.141<192.1.3.141>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.117 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-142 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.142 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.142:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4698d4c0 added connection description "road-eastnet-nonat-142" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.142<192.1.3.142>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.117 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-143 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.143 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.143:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4698df20 added connection description "road-eastnet-nonat-143" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.143<192.1.3.143>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.117 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-144 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.144 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.144:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4698e980 added connection description "road-eastnet-nonat-144" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.144<192.1.3.144>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-145 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.145 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.145:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4698f3e0 added connection description "road-eastnet-nonat-145" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.145<192.1.3.145>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.116 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-146 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.146 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.146:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4698fe40 added connection description "road-eastnet-nonat-146" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.146<192.1.3.146>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.115 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-147 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.147 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.147:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469908a0 added connection description "road-eastnet-nonat-147" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.147<192.1.3.147>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-148 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.148 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.148:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46991300 added connection description "road-eastnet-nonat-148" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.148<192.1.3.148>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-149 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.149 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.149:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46991d60 added connection description "road-eastnet-nonat-149" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.149<192.1.3.149>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.116 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-150 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.150 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.150:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469927c0 added connection description "road-eastnet-nonat-150" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.150<192.1.3.150>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.124 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-151 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.151 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.151:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46993220 added connection description "road-eastnet-nonat-151" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.151<192.1.3.151>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-152 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.152 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.152:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46993c80 added connection description "road-eastnet-nonat-152" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.152<192.1.3.152>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.115 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-153 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.153 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.153:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469946e0 added connection description "road-eastnet-nonat-153" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.153<192.1.3.153>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.117 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-154 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.154 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.154:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46995140 added connection description "road-eastnet-nonat-154" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.154<192.1.3.154>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-155 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.155 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.155:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46995ba0 added connection description "road-eastnet-nonat-155" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.155<192.1.3.155>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.116 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-156 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.156 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.156:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46996600 added connection description "road-eastnet-nonat-156" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.156<192.1.3.156>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-157 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.157 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.157:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46997060 added connection description "road-eastnet-nonat-157" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.157<192.1.3.157>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-158 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.158 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.158:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46997ac0 added connection description "road-eastnet-nonat-158" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.158<192.1.3.158>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.116 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-159 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.159 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.159:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46998520 added connection description "road-eastnet-nonat-159" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.159<192.1.3.159>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-160 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.160 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.160:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d46998f80 added connection description "road-eastnet-nonat-160" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.160<192.1.3.160>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-161 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.161 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.161:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469999e0 added connection description "road-eastnet-nonat-161" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.161<192.1.3.161>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.115 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-162 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.162 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.162:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4699a440 added connection description "road-eastnet-nonat-162" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.162<192.1.3.162>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.123 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-163 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.163 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.163:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4699aea0 added connection description "road-eastnet-nonat-163" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.163<192.1.3.163>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-164 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.164 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.164:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4699b900 added connection description "road-eastnet-nonat-164" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.164<192.1.3.164>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-165 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.165 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.165:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4699c360 added connection description "road-eastnet-nonat-165" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.165<192.1.3.165>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-166 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.166 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.166:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4699cdc0 added connection description "road-eastnet-nonat-166" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.166<192.1.3.166>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-167 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.167 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.167:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4699d820 added connection description "road-eastnet-nonat-167" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.167<192.1.3.167>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-168 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.168 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.168:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4699e280 added connection description "road-eastnet-nonat-168" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.168<192.1.3.168>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-169 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.169 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.169:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4699ece0 added connection description "road-eastnet-nonat-169" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.169<192.1.3.169>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-170 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.170 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.170:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d4699f740 added connection description "road-eastnet-nonat-170" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.170<192.1.3.170>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.136 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-171 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.171 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.171:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469a01a0 added connection description "road-eastnet-nonat-171" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.171<192.1.3.171>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-172 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.172 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.172:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469a0c00 added connection description "road-eastnet-nonat-172" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.172<192.1.3.172>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-173 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.173 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.173:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469a1660 added connection description "road-eastnet-nonat-173" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.173<192.1.3.173>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-174 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.174 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.174:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469a20c0 added connection description "road-eastnet-nonat-174" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.174<192.1.3.174>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-175 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.175 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.175:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469a2b20 added connection description "road-eastnet-nonat-175" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.175<192.1.3.175>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.117 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-176 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.176 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.176:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469a3580 added connection description "road-eastnet-nonat-176" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.176<192.1.3.176>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.125 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-177 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.177 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.177:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469a3fe0 added connection description "road-eastnet-nonat-177" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.177<192.1.3.177>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-178 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.178 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.178:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469a4a40 added connection description "road-eastnet-nonat-178" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.178<192.1.3.178>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.117 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-179 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.179 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.179:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469a54a0 added connection description "road-eastnet-nonat-179" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.179<192.1.3.179>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.121 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-180 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.180 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.180:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469a5f00 added connection description "road-eastnet-nonat-180" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.180<192.1.3.180>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.116 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-181 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.181 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.181:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469a6960 added connection description "road-eastnet-nonat-181" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.181<192.1.3.181>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-182 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.182 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.182:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469a73c0 added connection description "road-eastnet-nonat-182" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.182<192.1.3.182>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.125 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-183 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.183 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.183:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469a7e20 added connection description "road-eastnet-nonat-183" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.183<192.1.3.183>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-184 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.184 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.184:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469a8880 added connection description "road-eastnet-nonat-184" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.184<192.1.3.184>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-185 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.185 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.185:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469a92e0 added connection description "road-eastnet-nonat-185" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.185<192.1.3.185>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.121 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-186 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.186 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.186:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469a9d40 added connection description "road-eastnet-nonat-186" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.186<192.1.3.186>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.117 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-187 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.187 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.187:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469aa7a0 added connection description "road-eastnet-nonat-187" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.187<192.1.3.187>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-188 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.188 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.188:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469ab200 added connection description "road-eastnet-nonat-188" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.188<192.1.3.188>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-189 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.189 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.189:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469abc60 added connection description "road-eastnet-nonat-189" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.189<192.1.3.189>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-190 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.190 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.190:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469ac6c0 added connection description "road-eastnet-nonat-190" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.190<192.1.3.190>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-191 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.191 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.191:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469ad120 added connection description "road-eastnet-nonat-191" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.191<192.1.3.191>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.123 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-192 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.192 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.192:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469adb80 added connection description "road-eastnet-nonat-192" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.192<192.1.3.192>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.117 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-193 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.193 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.193:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469ae5e0 added connection description "road-eastnet-nonat-193" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.193<192.1.3.193>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-194 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.194 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.194:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469af040 added connection description "road-eastnet-nonat-194" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.194<192.1.3.194>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-195 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.195 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.195:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469afaa0 added connection description "road-eastnet-nonat-195" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.195<192.1.3.195>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.117 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-196 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.196 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.196:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469b0500 added connection description "road-eastnet-nonat-196" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.196<192.1.3.196>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.124 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-197 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.197 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.197:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469b0f60 added connection description "road-eastnet-nonat-197" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.197<192.1.3.197>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.119 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-198 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.198 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.198:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469b19c0 added connection description "road-eastnet-nonat-198" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.198<192.1.3.198>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.121 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-199 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.199 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.199:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469b2420 added connection description "road-eastnet-nonat-199" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.199<192.1.3.199>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.121 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-200 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.200 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.200:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469b2e80 added connection description "road-eastnet-nonat-200" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.200<192.1.3.200>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.118 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-201 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.201 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.201:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469b38e0 added connection description "road-eastnet-nonat-201" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.201<192.1.3.201>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-202 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.202 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.202:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469b4340 added connection description "road-eastnet-nonat-202" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.202<192.1.3.202>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.221 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-203 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.203 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.203:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469b4da0 added connection description "road-eastnet-nonat-203" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.203<192.1.3.203>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.144 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-204 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.204 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.204:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469b5800 added connection description "road-eastnet-nonat-204" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.204<192.1.3.204>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.143 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-205 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.205 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.205:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469b6260 added connection description "road-eastnet-nonat-205" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.205<192.1.3.205>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-206 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.206 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.206:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469b6cc0 added connection description "road-eastnet-nonat-206" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.206<192.1.3.206>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.124 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-207 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.207 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.207:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469b7720 added connection description "road-eastnet-nonat-207" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.207<192.1.3.207>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.138 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-208 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.208 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.208:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469b8180 added connection description "road-eastnet-nonat-208" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.208<192.1.3.208>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.14 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-209 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.209 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.209:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469b8be0 added connection description "road-eastnet-nonat-209" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.209<192.1.3.209>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.131 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-210 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.210 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.210:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469b9640 added connection description "road-eastnet-nonat-210" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.210<192.1.3.210>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.161 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-211 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.211 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.211:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469ba0a0 added connection description "road-eastnet-nonat-211" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.211<192.1.3.211>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.144 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-212 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.212 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.212:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469bab00 added connection description "road-eastnet-nonat-212" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.212<192.1.3.212>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.126 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-213 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.213 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.213:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469bb560 added connection description "road-eastnet-nonat-213" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.213<192.1.3.213>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.133 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-214 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.214 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.214:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469bbfc0 added connection description "road-eastnet-nonat-214" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.214<192.1.3.214>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.128 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-215 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.215 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.215:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469bca20 added connection description "road-eastnet-nonat-215" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.215<192.1.3.215>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-216 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.216 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.216:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469bd480 added connection description "road-eastnet-nonat-216" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.216<192.1.3.216>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.124 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-217 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.217 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.217:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469bdee0 added connection description "road-eastnet-nonat-217" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.217<192.1.3.217>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-218 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.218 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.218:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469be940 added connection description "road-eastnet-nonat-218" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.218<192.1.3.218>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.145 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-219 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.219 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.219:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469bf3a0 added connection description "road-eastnet-nonat-219" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.219<192.1.3.219>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.14 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-220 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.220 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.220:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469bfe00 added connection description "road-eastnet-nonat-220" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.220<192.1.3.220>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.129 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-221 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.221 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.221:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469c0860 added connection description "road-eastnet-nonat-221" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.221<192.1.3.221>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.125 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-222 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.222 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.222:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469c12c0 added connection description "road-eastnet-nonat-222" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.222<192.1.3.222>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.123 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-223 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.223 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.223:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469c1d20 added connection description "road-eastnet-nonat-223" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.223<192.1.3.223>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.131 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-224 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.224 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.224:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469c2780 added connection description "road-eastnet-nonat-224" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.224<192.1.3.224>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.123 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-225 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.225 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.225:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469c31e0 added connection description "road-eastnet-nonat-225" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.225<192.1.3.225>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-226 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.226 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.226:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469c3c40 added connection description "road-eastnet-nonat-226" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.226<192.1.3.226>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.125 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-227 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.227 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.227:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469c46a0 added connection description "road-eastnet-nonat-227" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.227<192.1.3.227>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.121 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-228 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.228 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.228:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469c5100 added connection description "road-eastnet-nonat-228" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.228<192.1.3.228>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-229 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.229 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.229:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469c5b60 added connection description "road-eastnet-nonat-229" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.229<192.1.3.229>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.126 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-230 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.230 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.230:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469c65c0 added connection description "road-eastnet-nonat-230" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.230<192.1.3.230>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.128 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-231 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.231 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.231:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469c7020 added connection description "road-eastnet-nonat-231" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.231<192.1.3.231>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.128 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-232 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.232 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.232:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469c7a80 added connection description "road-eastnet-nonat-232" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.232<192.1.3.232>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.128 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-233 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.233 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.233:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469c84e0 added connection description "road-eastnet-nonat-233" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.233<192.1.3.233>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.131 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-234 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.234 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.234:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469c8f40 added connection description "road-eastnet-nonat-234" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.234<192.1.3.234>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.139 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-235 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.235 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.235:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469c99a0 added connection description "road-eastnet-nonat-235" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.235<192.1.3.235>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.128 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-236 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.236 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.236:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469ca400 added connection description "road-eastnet-nonat-236" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.236<192.1.3.236>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.124 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-237 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.237 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.237:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469cae60 added connection description "road-eastnet-nonat-237" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.237<192.1.3.237>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.124 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-238 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.238 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.238:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469cb8c0 added connection description "road-eastnet-nonat-238" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.238<192.1.3.238>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.126 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-239 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.239 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.239:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469cc320 added connection description "road-eastnet-nonat-239" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.239<192.1.3.239>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-240 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.240 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.240:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469ccd80 added connection description "road-eastnet-nonat-240" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.240<192.1.3.240>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.124 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-241 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.241 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.241:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469cd7e0 added connection description "road-eastnet-nonat-241" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.241<192.1.3.241>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.123 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-242 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.242 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.242:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469ce240 added connection description "road-eastnet-nonat-242" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.242<192.1.3.242>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.125 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-243 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.243 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.243:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469ceca0 added connection description "road-eastnet-nonat-243" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.243<192.1.3.243>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.122 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-244 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.244 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.244:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469cf700 added connection description "road-eastnet-nonat-244" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.244<192.1.3.244>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.128 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-245 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.245 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.245:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469d0160 added connection description "road-eastnet-nonat-245" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.245<192.1.3.245>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.129 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-246 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.246 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.246:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469d0bc0 added connection description "road-eastnet-nonat-246" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.246<192.1.3.246>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.128 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-247 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.247 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.247:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469d1620 added connection description "road-eastnet-nonat-247" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.247<192.1.3.247>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.127 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-248 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.248 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.248:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469d2080 added connection description "road-eastnet-nonat-248" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.248<192.1.3.248>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.127 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-249 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.249 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.249:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469d2ae0 added connection description "road-eastnet-nonat-249" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.249<192.1.3.249>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.121 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-250 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.250 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.250:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469d3540 added connection description "road-eastnet-nonat-250" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.250<192.1.3.250>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.123 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-251 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.251 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.251:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469d3fa0 added connection description "road-eastnet-nonat-251" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.251<192.1.3.251>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.126 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | FOR_EACH_CONNECTION_... in conn_by_name | Added new connection road-eastnet-nonat-252 with policy PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | ike (phase1) algorithm values: AES_CBC-HMAC_SHA1-MODP2048 | from whack: got --esp= | ESP/AH string values: AES_GCM_16_256-NONE, AES_GCM_16_128-NONE, AES_CBC_256-HMAC_SHA2_512_256+HMAC_SHA2_256_128, AES_CBC_128-HMAC_SHA2_512_256+HMAC_SHA2_256_128 | counting wild cards for 192.1.3.252 is 0 | counting wild cards for @east is 0 | connect_to_host_pair: 192.1.3.252:500 192.1.2.23:500 -> hp@(nil): none | new hp@0x557d469d4a00 added connection description "road-eastnet-nonat-252" | ike_life: 3600s; ipsec_life: 28800s; rekey_margin: 540s; rekey_fuzz: 100%; keyingtries: 0; replay_window: 32; policy: PSK+ENCRYPT+TUNNEL+PFS+IKEV2_ALLOW+SAREF_TRACK+IKE_FRAG_ALLOW+ESN_NO | 192.1.3.252<192.1.3.252>...192.1.2.23<192.1.2.23>[@east] | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.12 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | pluto_sd: executing action action: reloading(4), status 0 listening for IKE messages | Inspecting interface lo | found lo with address 127.0.0.1 | Inspecting interface eth0 | found eth0 with address 192.1.3.209 | Inspecting interface eth0 | found eth0 with address 192.1.3.1 | Inspecting interface eth0 | found eth0 with address 192.1.3.2 | Inspecting interface eth0 | found eth0 with address 192.1.3.3 | Inspecting interface eth0 | found eth0 with address 192.1.3.4 | Inspecting interface eth0 | found eth0 with address 192.1.3.5 | Inspecting interface eth0 | found eth0 with address 192.1.3.6 | Inspecting interface eth0 | found eth0 with address 192.1.3.7 | Inspecting interface eth0 | found eth0 with address 192.1.3.8 | Inspecting interface eth0 | found eth0 with address 192.1.3.9 | Inspecting interface eth0 | found eth0 with address 192.1.3.10 | Inspecting interface eth0 | found eth0 with address 192.1.3.11 | Inspecting interface eth0 | found eth0 with address 192.1.3.12 | Inspecting interface eth0 | found eth0 with address 192.1.3.13 | Inspecting interface eth0 | found eth0 with address 192.1.3.14 | Inspecting interface eth0 | found eth0 with address 192.1.3.15 | Inspecting interface eth0 | found eth0 with address 192.1.3.16 | Inspecting interface eth0 | found eth0 with address 192.1.3.17 | Inspecting interface eth0 | found eth0 with address 192.1.3.18 | Inspecting interface eth0 | found eth0 with address 192.1.3.19 | Inspecting interface eth0 | found eth0 with address 192.1.3.20 | Inspecting interface eth0 | found eth0 with address 192.1.3.21 | Inspecting interface eth0 | found eth0 with address 192.1.3.22 | Inspecting interface eth0 | found eth0 with address 192.1.3.23 | Inspecting interface eth0 | found eth0 with address 192.1.3.24 | Inspecting interface eth0 | found eth0 with address 192.1.3.25 | Inspecting interface eth0 | found eth0 with address 192.1.3.26 | Inspecting interface eth0 | found eth0 with address 192.1.3.27 | Inspecting interface eth0 | found eth0 with address 192.1.3.28 | Inspecting interface eth0 | found eth0 with address 192.1.3.29 | Inspecting interface eth0 | found eth0 with address 192.1.3.30 | Inspecting interface eth0 | found eth0 with address 192.1.3.31 | Inspecting interface eth0 | found eth0 with address 192.1.3.32 | Inspecting interface eth0 | found eth0 with address 192.1.3.33 | Inspecting interface eth0 | found eth0 with address 192.1.3.34 | Inspecting interface eth0 | found eth0 with address 192.1.3.35 | Inspecting interface eth0 | found eth0 with address 192.1.3.36 | Inspecting interface eth0 | found eth0 with address 192.1.3.37 | Inspecting interface eth0 | found eth0 with address 192.1.3.38 | Inspecting interface eth0 | found eth0 with address 192.1.3.39 | Inspecting interface eth0 | found eth0 with address 192.1.3.40 | Inspecting interface eth0 | found eth0 with address 192.1.3.41 | Inspecting interface eth0 | found eth0 with address 192.1.3.42 | Inspecting interface eth0 | found eth0 with address 192.1.3.43 | Inspecting interface eth0 | found eth0 with address 192.1.3.44 | Inspecting interface eth0 | found eth0 with address 192.1.3.45 | Inspecting interface eth0 | found eth0 with address 192.1.3.46 | Inspecting interface eth0 | found eth0 with address 192.1.3.47 | Inspecting interface eth0 | found eth0 with address 192.1.3.48 | Inspecting interface eth0 | found eth0 with address 192.1.3.49 | Inspecting interface eth0 | found eth0 with address 192.1.3.50 | Inspecting interface eth0 | found eth0 with address 192.1.3.51 | Inspecting interface eth0 | found eth0 with address 192.1.3.52 | Inspecting interface eth0 | found eth0 with address 192.1.3.53 | Inspecting interface eth0 | found eth0 with address 192.1.3.54 | Inspecting interface eth0 | found eth0 with address 192.1.3.55 | Inspecting interface eth0 | found eth0 with address 192.1.3.56 | Inspecting interface eth0 | found eth0 with address 192.1.3.57 | Inspecting interface eth0 | found eth0 with address 192.1.3.58 | Inspecting interface eth0 | found eth0 with address 192.1.3.59 | Inspecting interface eth0 | found eth0 with address 192.1.3.60 | Inspecting interface eth0 | found eth0 with address 192.1.3.61 | Inspecting interface eth0 | found eth0 with address 192.1.3.62 | Inspecting interface eth0 | found eth0 with address 192.1.3.63 | Inspecting interface eth0 | found eth0 with address 192.1.3.64 | Inspecting interface eth0 | found eth0 with address 192.1.3.65 | Inspecting interface eth0 | found eth0 with address 192.1.3.66 | Inspecting interface eth0 | found eth0 with address 192.1.3.67 | Inspecting interface eth0 | found eth0 with address 192.1.3.68 | Inspecting interface eth0 | found eth0 with address 192.1.3.69 | Inspecting interface eth0 | found eth0 with address 192.1.3.70 | Inspecting interface eth0 | found eth0 with address 192.1.3.71 | Inspecting interface eth0 | found eth0 with address 192.1.3.72 | Inspecting interface eth0 | found eth0 with address 192.1.3.73 | Inspecting interface eth0 | found eth0 with address 192.1.3.74 | Inspecting interface eth0 | found eth0 with address 192.1.3.75 | Inspecting interface eth0 | found eth0 with address 192.1.3.76 | Inspecting interface eth0 | found eth0 with address 192.1.3.77 | Inspecting interface eth0 | found eth0 with address 192.1.3.78 | Inspecting interface eth0 | found eth0 with address 192.1.3.79 | Inspecting interface eth0 | found eth0 with address 192.1.3.80 | Inspecting interface eth0 | found eth0 with address 192.1.3.81 | Inspecting interface eth0 | found eth0 with address 192.1.3.82 | Inspecting interface eth0 | found eth0 with address 192.1.3.83 | Inspecting interface eth0 | found eth0 with address 192.1.3.84 | Inspecting interface eth0 | found eth0 with address 192.1.3.85 | Inspecting interface eth0 | found eth0 with address 192.1.3.86 | Inspecting interface eth0 | found eth0 with address 192.1.3.87 | Inspecting interface eth0 | found eth0 with address 192.1.3.88 | Inspecting interface eth0 | found eth0 with address 192.1.3.89 | Inspecting interface eth0 | found eth0 with address 192.1.3.90 | Inspecting interface eth0 | found eth0 with address 192.1.3.91 | Inspecting interface eth0 | found eth0 with address 192.1.3.92 | Inspecting interface eth0 | found eth0 with address 192.1.3.93 | Inspecting interface eth0 | found eth0 with address 192.1.3.94 | Inspecting interface eth0 | found eth0 with address 192.1.3.95 | Inspecting interface eth0 | found eth0 with address 192.1.3.96 | Inspecting interface eth0 | found eth0 with address 192.1.3.97 | Inspecting interface eth0 | found eth0 with address 192.1.3.98 | Inspecting interface eth0 | found eth0 with address 192.1.3.99 | Inspecting interface eth0 | found eth0 with address 192.1.3.100 | Inspecting interface eth0 | found eth0 with address 192.1.3.101 | Inspecting interface eth0 | found eth0 with address 192.1.3.102 | Inspecting interface eth0 | found eth0 with address 192.1.3.103 | Inspecting interface eth0 | found eth0 with address 192.1.3.104 | Inspecting interface eth0 | found eth0 with address 192.1.3.105 | Inspecting interface eth0 | found eth0 with address 192.1.3.106 | Inspecting interface eth0 | found eth0 with address 192.1.3.107 | Inspecting interface eth0 | found eth0 with address 192.1.3.108 | Inspecting interface eth0 | found eth0 with address 192.1.3.109 | Inspecting interface eth0 | found eth0 with address 192.1.3.110 | Inspecting interface eth0 | found eth0 with address 192.1.3.111 | Inspecting interface eth0 | found eth0 with address 192.1.3.112 | Inspecting interface eth0 | found eth0 with address 192.1.3.113 | Inspecting interface eth0 | found eth0 with address 192.1.3.114 | Inspecting interface eth0 | found eth0 with address 192.1.3.115 | Inspecting interface eth0 | found eth0 with address 192.1.3.116 | Inspecting interface eth0 | found eth0 with address 192.1.3.117 | Inspecting interface eth0 | found eth0 with address 192.1.3.118 | Inspecting interface eth0 | found eth0 with address 192.1.3.119 | Inspecting interface eth0 | found eth0 with address 192.1.3.120 | Inspecting interface eth0 | found eth0 with address 192.1.3.121 | Inspecting interface eth0 | found eth0 with address 192.1.3.122 | Inspecting interface eth0 | found eth0 with address 192.1.3.123 | Inspecting interface eth0 | found eth0 with address 192.1.3.124 | Inspecting interface eth0 | found eth0 with address 192.1.3.125 | Inspecting interface eth0 | found eth0 with address 192.1.3.126 | Inspecting interface eth0 | found eth0 with address 192.1.3.127 | Inspecting interface eth0 | found eth0 with address 192.1.3.128 | Inspecting interface eth0 | found eth0 with address 192.1.3.129 | Inspecting interface eth0 | found eth0 with address 192.1.3.130 | Inspecting interface eth0 | found eth0 with address 192.1.3.131 | Inspecting interface eth0 | found eth0 with address 192.1.3.132 | Inspecting interface eth0 | found eth0 with address 192.1.3.133 | Inspecting interface eth0 | found eth0 with address 192.1.3.134 | Inspecting interface eth0 | found eth0 with address 192.1.3.135 | Inspecting interface eth0 | found eth0 with address 192.1.3.136 | Inspecting interface eth0 | found eth0 with address 192.1.3.137 | Inspecting interface eth0 | found eth0 with address 192.1.3.138 | Inspecting interface eth0 | found eth0 with address 192.1.3.139 | Inspecting interface eth0 | found eth0 with address 192.1.3.140 | Inspecting interface eth0 | found eth0 with address 192.1.3.141 | Inspecting interface eth0 | found eth0 with address 192.1.3.142 | Inspecting interface eth0 | found eth0 with address 192.1.3.143 | Inspecting interface eth0 | found eth0 with address 192.1.3.144 | Inspecting interface eth0 | found eth0 with address 192.1.3.145 | Inspecting interface eth0 | found eth0 with address 192.1.3.146 | Inspecting interface eth0 | found eth0 with address 192.1.3.147 | Inspecting interface eth0 | found eth0 with address 192.1.3.148 | Inspecting interface eth0 | found eth0 with address 192.1.3.149 | Inspecting interface eth0 | found eth0 with address 192.1.3.150 | Inspecting interface eth0 | found eth0 with address 192.1.3.151 | Inspecting interface eth0 | found eth0 with address 192.1.3.152 | Inspecting interface eth0 | found eth0 with address 192.1.3.153 | Inspecting interface eth0 | found eth0 with address 192.1.3.154 | Inspecting interface eth0 | found eth0 with address 192.1.3.155 | Inspecting interface eth0 | found eth0 with address 192.1.3.156 | Inspecting interface eth0 | found eth0 with address 192.1.3.157 | Inspecting interface eth0 | found eth0 with address 192.1.3.158 | Inspecting interface eth0 | found eth0 with address 192.1.3.159 | Inspecting interface eth0 | found eth0 with address 192.1.3.160 | Inspecting interface eth0 | found eth0 with address 192.1.3.161 | Inspecting interface eth0 | found eth0 with address 192.1.3.162 | Inspecting interface eth0 | found eth0 with address 192.1.3.163 | Inspecting interface eth0 | found eth0 with address 192.1.3.164 | Inspecting interface eth0 | found eth0 with address 192.1.3.165 | Inspecting interface eth0 | found eth0 with address 192.1.3.166 | Inspecting interface eth0 | found eth0 with address 192.1.3.167 | Inspecting interface eth0 | found eth0 with address 192.1.3.168 | Inspecting interface eth0 | found eth0 with address 192.1.3.169 | Inspecting interface eth0 | found eth0 with address 192.1.3.170 | Inspecting interface eth0 | found eth0 with address 192.1.3.171 | Inspecting interface eth0 | found eth0 with address 192.1.3.172 | Inspecting interface eth0 | found eth0 with address 192.1.3.173 | Inspecting interface eth0 | found eth0 with address 192.1.3.174 | Inspecting interface eth0 | found eth0 with address 192.1.3.175 | Inspecting interface eth0 | found eth0 with address 192.1.3.176 | Inspecting interface eth0 | found eth0 with address 192.1.3.177 | Inspecting interface eth0 | found eth0 with address 192.1.3.178 | Inspecting interface eth0 | found eth0 with address 192.1.3.179 | Inspecting interface eth0 | found eth0 with address 192.1.3.180 | Inspecting interface eth0 | found eth0 with address 192.1.3.181 | Inspecting interface eth0 | found eth0 with address 192.1.3.182 | Inspecting interface eth0 | found eth0 with address 192.1.3.183 | Inspecting interface eth0 | found eth0 with address 192.1.3.184 | Inspecting interface eth0 | found eth0 with address 192.1.3.185 | Inspecting interface eth0 | found eth0 with address 192.1.3.186 | Inspecting interface eth0 | found eth0 with address 192.1.3.187 | Inspecting interface eth0 | found eth0 with address 192.1.3.188 | Inspecting interface eth0 | found eth0 with address 192.1.3.189 | Inspecting interface eth0 | found eth0 with address 192.1.3.190 | Inspecting interface eth0 | found eth0 with address 192.1.3.191 | Inspecting interface eth0 | found eth0 with address 192.1.3.192 | Inspecting interface eth0 | found eth0 with address 192.1.3.193 | Inspecting interface eth0 | found eth0 with address 192.1.3.194 | Inspecting interface eth0 | found eth0 with address 192.1.3.195 | Inspecting interface eth0 | found eth0 with address 192.1.3.196 | Inspecting interface eth0 | found eth0 with address 192.1.3.197 | Inspecting interface eth0 | found eth0 with address 192.1.3.198 | Inspecting interface eth0 | found eth0 with address 192.1.3.199 | Inspecting interface eth0 | found eth0 with address 192.1.3.200 | Inspecting interface eth0 | found eth0 with address 192.1.3.201 | Inspecting interface eth0 | found eth0 with address 192.1.3.202 | Inspecting interface eth0 | found eth0 with address 192.1.3.203 | Inspecting interface eth0 | found eth0 with address 192.1.3.204 | Inspecting interface eth0 | found eth0 with address 192.1.3.205 | Inspecting interface eth0 | found eth0 with address 192.1.3.206 | Inspecting interface eth0 | found eth0 with address 192.1.3.207 | Inspecting interface eth0 | found eth0 with address 192.1.3.208 | Inspecting interface eth0 | found eth0 with address 192.1.3.210 | Inspecting interface eth0 | found eth0 with address 192.1.3.211 | Inspecting interface eth0 | found eth0 with address 192.1.3.212 | Inspecting interface eth0 | found eth0 with address 192.1.3.213 | Inspecting interface eth0 | found eth0 with address 192.1.3.214 | Inspecting interface eth0 | found eth0 with address 192.1.3.215 | Inspecting interface eth0 | found eth0 with address 192.1.3.216 | Inspecting interface eth0 | found eth0 with address 192.1.3.217 | Inspecting interface eth0 | found eth0 with address 192.1.3.218 | Inspecting interface eth0 | found eth0 with address 192.1.3.219 | Inspecting interface eth0 | found eth0 with address 192.1.3.220 | Inspecting interface eth0 | found eth0 with address 192.1.3.221 | Inspecting interface eth0 | found eth0 with address 192.1.3.222 | Inspecting interface eth0 | found eth0 with address 192.1.3.223 | Inspecting interface eth0 | found eth0 with address 192.1.3.224 | Inspecting interface eth0 | found eth0 with address 192.1.3.225 | Inspecting interface eth0 | found eth0 with address 192.1.3.226 | Inspecting interface eth0 | found eth0 with address 192.1.3.227 | Inspecting interface eth0 | found eth0 with address 192.1.3.228 | Inspecting interface eth0 | found eth0 with address 192.1.3.229 | Inspecting interface eth0 | found eth0 with address 192.1.3.230 | Inspecting interface eth0 | found eth0 with address 192.1.3.231 | Inspecting interface eth0 | found eth0 with address 192.1.3.232 | Inspecting interface eth0 | found eth0 with address 192.1.3.233 | Inspecting interface eth0 | found eth0 with address 192.1.3.234 | Inspecting interface eth0 | found eth0 with address 192.1.3.235 | Inspecting interface eth0 | found eth0 with address 192.1.3.236 | Inspecting interface eth0 | found eth0 with address 192.1.3.237 | Inspecting interface eth0 | found eth0 with address 192.1.3.238 | Inspecting interface eth0 | found eth0 with address 192.1.3.239 | Inspecting interface eth0 | found eth0 with address 192.1.3.240 | Inspecting interface eth0 | found eth0 with address 192.1.3.241 | Inspecting interface eth0 | found eth0 with address 192.1.3.242 | Inspecting interface eth0 | found eth0 with address 192.1.3.243 | Inspecting interface eth0 | found eth0 with address 192.1.3.244 | Inspecting interface eth0 | found eth0 with address 192.1.3.245 | Inspecting interface eth0 | found eth0 with address 192.1.3.246 | Inspecting interface eth0 | found eth0 with address 192.1.3.247 | Inspecting interface eth0 | found eth0 with address 192.1.3.248 | Inspecting interface eth0 | found eth0 with address 192.1.3.249 | Inspecting interface eth0 | found eth0 with address 192.1.3.250 | Inspecting interface eth0 | found eth0 with address 192.1.3.251 | Inspecting interface eth0 | found eth0 with address 192.1.3.252 | no interfaces to sort | libevent_free: release ptr-libevent@0x557d46916190 | free_event_entry: release EVENT_NULL-pe@0x557d46916150 | add_fd_read_event_handler: new ethX-pe@0x557d46916150 | libevent_malloc: new ptr-libevent@0x557d46916190 size 128 | setup callback for interface lo 127.0.0.1:4500 fd 522 | libevent_free: release ptr-libevent@0x557d468ff230 | free_event_entry: release EVENT_NULL-pe@0x557d468ff1f0 | add_fd_read_event_handler: new ethX-pe@0x557d468ff1f0 | libevent_malloc: new ptr-libevent@0x557d468ff230 size 128 | setup callback for interface lo 127.0.0.1:500 fd 521 | libevent_free: release ptr-libevent@0x557d468ff320 | free_event_entry: release EVENT_NULL-pe@0x557d468ff2e0 | add_fd_read_event_handler: new ethX-pe@0x557d468ff2e0 | libevent_malloc: new ptr-libevent@0x557d468ff320 size 128 | setup callback for interface eth0 192.1.3.209:4500 fd 520 | libevent_free: release ptr-libevent@0x557d468ff410 | free_event_entry: release EVENT_NULL-pe@0x557d468ff3d0 | add_fd_read_event_handler: new ethX-pe@0x557d468ff3d0 | libevent_malloc: new ptr-libevent@0x557d468ff410 size 128 | setup callback for interface eth0 192.1.3.209:500 fd 519 | libevent_free: release ptr-libevent@0x557d468ff500 | free_event_entry: release EVENT_NULL-pe@0x557d468ff4c0 | add_fd_read_event_handler: new ethX-pe@0x557d468ff4c0 | libevent_malloc: new ptr-libevent@0x557d468ff500 size 128 | setup callback for interface eth0 192.1.3.1:4500 fd 518 | libevent_free: release ptr-libevent@0x557d468ff5f0 | free_event_entry: release EVENT_NULL-pe@0x557d468ff5b0 | add_fd_read_event_handler: new ethX-pe@0x557d468ff5b0 | libevent_malloc: new ptr-libevent@0x557d468ff5f0 size 128 | setup callback for interface eth0 192.1.3.1:500 fd 517 | libevent_free: release ptr-libevent@0x557d468ff6e0 | free_event_entry: release EVENT_NULL-pe@0x557d468ff6a0 | add_fd_read_event_handler: new ethX-pe@0x557d468ff6a0 | libevent_malloc: new ptr-libevent@0x557d468ff6e0 size 128 | setup callback for interface eth0 192.1.3.2:4500 fd 516 | libevent_free: release ptr-libevent@0x557d468ff7d0 | free_event_entry: release EVENT_NULL-pe@0x557d468ff790 | add_fd_read_event_handler: new ethX-pe@0x557d468ff790 | libevent_malloc: new ptr-libevent@0x557d468ff7d0 size 128 | setup callback for interface eth0 192.1.3.2:500 fd 515 | libevent_free: release ptr-libevent@0x557d468ff8c0 | free_event_entry: release EVENT_NULL-pe@0x557d468ff880 | add_fd_read_event_handler: new ethX-pe@0x557d468ff880 | libevent_malloc: new ptr-libevent@0x557d468ff8c0 size 128 | setup callback for interface eth0 192.1.3.3:4500 fd 514 | libevent_free: release ptr-libevent@0x557d468ff9b0 | free_event_entry: release EVENT_NULL-pe@0x557d468ff970 | add_fd_read_event_handler: new ethX-pe@0x557d468ff970 | libevent_malloc: new ptr-libevent@0x557d468ff9b0 size 128 | setup callback for interface eth0 192.1.3.3:500 fd 513 | libevent_free: release ptr-libevent@0x557d468ffaa0 | free_event_entry: release EVENT_NULL-pe@0x557d468ffa60 | add_fd_read_event_handler: new ethX-pe@0x557d468ffa60 | libevent_malloc: new ptr-libevent@0x557d468ffaa0 size 128 | setup callback for interface eth0 192.1.3.4:4500 fd 512 | libevent_free: release ptr-libevent@0x557d468ffb90 | free_event_entry: release EVENT_NULL-pe@0x557d468ffb50 | add_fd_read_event_handler: new ethX-pe@0x557d468ffb50 | libevent_malloc: new ptr-libevent@0x557d468ffb90 size 128 | setup callback for interface eth0 192.1.3.4:500 fd 511 | libevent_free: release ptr-libevent@0x557d46904920 | free_event_entry: release EVENT_NULL-pe@0x557d469048e0 | add_fd_read_event_handler: new ethX-pe@0x557d469048e0 | libevent_malloc: new ptr-libevent@0x557d46904920 size 128 | setup callback for interface eth0 192.1.3.5:4500 fd 510 | libevent_free: release ptr-libevent@0x557d46904a10 | free_event_entry: release EVENT_NULL-pe@0x557d469049d0 | add_fd_read_event_handler: new ethX-pe@0x557d469049d0 | libevent_malloc: new ptr-libevent@0x557d46904a10 size 128 | setup callback for interface eth0 192.1.3.5:500 fd 509 | libevent_free: release ptr-libevent@0x557d46904b00 | free_event_entry: release EVENT_NULL-pe@0x557d46904ac0 | add_fd_read_event_handler: new ethX-pe@0x557d46904ac0 | libevent_malloc: new ptr-libevent@0x557d46904b00 size 128 | setup callback for interface eth0 192.1.3.6:4500 fd 508 | libevent_free: release ptr-libevent@0x557d46904bf0 | free_event_entry: release EVENT_NULL-pe@0x557d46904bb0 | add_fd_read_event_handler: new ethX-pe@0x557d46904bb0 | libevent_malloc: new ptr-libevent@0x557d46904bf0 size 128 | setup callback for interface eth0 192.1.3.6:500 fd 507 | libevent_free: release ptr-libevent@0x557d46904ce0 | free_event_entry: release EVENT_NULL-pe@0x557d46904ca0 | add_fd_read_event_handler: new ethX-pe@0x557d46904ca0 | libevent_malloc: new ptr-libevent@0x557d46904ce0 size 128 | setup callback for interface eth0 192.1.3.7:4500 fd 506 | libevent_free: release ptr-libevent@0x557d46904dd0 | free_event_entry: release EVENT_NULL-pe@0x557d46904d90 | add_fd_read_event_handler: new ethX-pe@0x557d46904d90 | libevent_malloc: new ptr-libevent@0x557d46904dd0 size 128 | setup callback for interface eth0 192.1.3.7:500 fd 505 | libevent_free: release ptr-libevent@0x557d46904ec0 | free_event_entry: release EVENT_NULL-pe@0x557d46904e80 | add_fd_read_event_handler: new ethX-pe@0x557d46904e80 | libevent_malloc: new ptr-libevent@0x557d46904ec0 size 128 | setup callback for interface eth0 192.1.3.8:4500 fd 504 | libevent_free: release ptr-libevent@0x557d46904fb0 | free_event_entry: release EVENT_NULL-pe@0x557d46904f70 | add_fd_read_event_handler: new ethX-pe@0x557d46904f70 | libevent_malloc: new ptr-libevent@0x557d46904fb0 size 128 | setup callback for interface eth0 192.1.3.8:500 fd 503 | libevent_free: release ptr-libevent@0x557d469050a0 | free_event_entry: release EVENT_NULL-pe@0x557d46905060 | add_fd_read_event_handler: new ethX-pe@0x557d46905060 | libevent_malloc: new ptr-libevent@0x557d469050a0 size 128 | setup callback for interface eth0 192.1.3.9:4500 fd 502 | libevent_free: release ptr-libevent@0x557d46905190 | free_event_entry: release EVENT_NULL-pe@0x557d46905150 | add_fd_read_event_handler: new ethX-pe@0x557d46905150 | libevent_malloc: new ptr-libevent@0x557d46905190 size 128 | setup callback for interface eth0 192.1.3.9:500 fd 501 | libevent_free: release ptr-libevent@0x557d46905280 | free_event_entry: release EVENT_NULL-pe@0x557d46905240 | add_fd_read_event_handler: new ethX-pe@0x557d46905240 | libevent_malloc: new ptr-libevent@0x557d46905280 size 128 | setup callback for interface eth0 192.1.3.10:4500 fd 500 | libevent_free: release ptr-libevent@0x557d46905370 | free_event_entry: release EVENT_NULL-pe@0x557d46905330 | add_fd_read_event_handler: new ethX-pe@0x557d46905330 | libevent_malloc: new ptr-libevent@0x557d46905370 size 128 | setup callback for interface eth0 192.1.3.10:500 fd 499 | libevent_free: release ptr-libevent@0x557d46905460 | free_event_entry: release EVENT_NULL-pe@0x557d46905420 | add_fd_read_event_handler: new ethX-pe@0x557d46905420 | libevent_malloc: new ptr-libevent@0x557d46905460 size 128 | setup callback for interface eth0 192.1.3.11:4500 fd 498 | libevent_free: release ptr-libevent@0x557d46905550 | free_event_entry: release EVENT_NULL-pe@0x557d46905510 | add_fd_read_event_handler: new ethX-pe@0x557d46905510 | libevent_malloc: new ptr-libevent@0x557d46905550 size 128 | setup callback for interface eth0 192.1.3.11:500 fd 497 | libevent_free: release ptr-libevent@0x557d46905640 | free_event_entry: release EVENT_NULL-pe@0x557d46905600 | add_fd_read_event_handler: new ethX-pe@0x557d46905600 | libevent_malloc: new ptr-libevent@0x557d46905640 size 128 | setup callback for interface eth0 192.1.3.12:4500 fd 496 | libevent_free: release ptr-libevent@0x557d46905730 | free_event_entry: release EVENT_NULL-pe@0x557d469056f0 | add_fd_read_event_handler: new ethX-pe@0x557d469056f0 | libevent_malloc: new ptr-libevent@0x557d46905730 size 128 | setup callback for interface eth0 192.1.3.12:500 fd 495 | libevent_free: release ptr-libevent@0x557d46905820 | free_event_entry: release EVENT_NULL-pe@0x557d469057e0 | add_fd_read_event_handler: new ethX-pe@0x557d469057e0 | libevent_malloc: new ptr-libevent@0x557d46905820 size 128 | setup callback for interface eth0 192.1.3.13:4500 fd 494 | libevent_free: release ptr-libevent@0x557d46905910 | free_event_entry: release EVENT_NULL-pe@0x557d469058d0 | add_fd_read_event_handler: new ethX-pe@0x557d469058d0 | libevent_malloc: new ptr-libevent@0x557d46905910 size 128 | setup callback for interface eth0 192.1.3.13:500 fd 493 | libevent_free: release ptr-libevent@0x557d46905a00 | free_event_entry: release EVENT_NULL-pe@0x557d469059c0 | add_fd_read_event_handler: new ethX-pe@0x557d469059c0 | libevent_malloc: new ptr-libevent@0x557d46905a00 size 128 | setup callback for interface eth0 192.1.3.14:4500 fd 492 | libevent_free: release ptr-libevent@0x557d46905af0 | free_event_entry: release EVENT_NULL-pe@0x557d46905ab0 | add_fd_read_event_handler: new ethX-pe@0x557d46905ab0 | libevent_malloc: new ptr-libevent@0x557d46905af0 size 128 | setup callback for interface eth0 192.1.3.14:500 fd 491 | libevent_free: release ptr-libevent@0x557d46905be0 | free_event_entry: release EVENT_NULL-pe@0x557d46905ba0 | add_fd_read_event_handler: new ethX-pe@0x557d46905ba0 | libevent_malloc: new ptr-libevent@0x557d46905be0 size 128 | setup callback for interface eth0 192.1.3.15:4500 fd 490 | libevent_free: release ptr-libevent@0x557d46905cd0 | free_event_entry: release EVENT_NULL-pe@0x557d46905c90 | add_fd_read_event_handler: new ethX-pe@0x557d46905c90 | libevent_malloc: new ptr-libevent@0x557d46905cd0 size 128 | setup callback for interface eth0 192.1.3.15:500 fd 489 | libevent_free: release ptr-libevent@0x557d46905dc0 | free_event_entry: release EVENT_NULL-pe@0x557d46905d80 | add_fd_read_event_handler: new ethX-pe@0x557d46905d80 | libevent_malloc: new ptr-libevent@0x557d46905dc0 size 128 | setup callback for interface eth0 192.1.3.16:4500 fd 488 | libevent_free: release ptr-libevent@0x557d46905eb0 | free_event_entry: release EVENT_NULL-pe@0x557d46905e70 | add_fd_read_event_handler: new ethX-pe@0x557d46905e70 | libevent_malloc: new ptr-libevent@0x557d46905eb0 size 128 | setup callback for interface eth0 192.1.3.16:500 fd 487 | libevent_free: release ptr-libevent@0x557d46905fa0 | free_event_entry: release EVENT_NULL-pe@0x557d46905f60 | add_fd_read_event_handler: new ethX-pe@0x557d46905f60 | libevent_malloc: new ptr-libevent@0x557d46905fa0 size 128 | setup callback for interface eth0 192.1.3.17:4500 fd 486 | libevent_free: release ptr-libevent@0x557d46906090 | free_event_entry: release EVENT_NULL-pe@0x557d46906050 | add_fd_read_event_handler: new ethX-pe@0x557d46906050 | libevent_malloc: new ptr-libevent@0x557d46906090 size 128 | setup callback for interface eth0 192.1.3.17:500 fd 485 | libevent_free: release ptr-libevent@0x557d46906180 | free_event_entry: release EVENT_NULL-pe@0x557d46906140 | add_fd_read_event_handler: new ethX-pe@0x557d46906140 | libevent_malloc: new ptr-libevent@0x557d46906180 size 128 | setup callback for interface eth0 192.1.3.18:4500 fd 484 | libevent_free: release ptr-libevent@0x557d46906270 | free_event_entry: release EVENT_NULL-pe@0x557d46906230 | add_fd_read_event_handler: new ethX-pe@0x557d46906230 | libevent_malloc: new ptr-libevent@0x557d46906270 size 128 | setup callback for interface eth0 192.1.3.18:500 fd 483 | libevent_free: release ptr-libevent@0x557d46906360 | free_event_entry: release EVENT_NULL-pe@0x557d46906320 | add_fd_read_event_handler: new ethX-pe@0x557d46906320 | libevent_malloc: new ptr-libevent@0x557d46906360 size 128 | setup callback for interface eth0 192.1.3.19:4500 fd 482 | libevent_free: release ptr-libevent@0x557d46906450 | free_event_entry: release EVENT_NULL-pe@0x557d46906410 | add_fd_read_event_handler: new ethX-pe@0x557d46906410 | libevent_malloc: new ptr-libevent@0x557d46906450 size 128 | setup callback for interface eth0 192.1.3.19:500 fd 481 | libevent_free: release ptr-libevent@0x557d46906540 | free_event_entry: release EVENT_NULL-pe@0x557d46906500 | add_fd_read_event_handler: new ethX-pe@0x557d46906500 | libevent_malloc: new ptr-libevent@0x557d46906540 size 128 | setup callback for interface eth0 192.1.3.20:4500 fd 480 | libevent_free: release ptr-libevent@0x557d46906630 | free_event_entry: release EVENT_NULL-pe@0x557d469065f0 | add_fd_read_event_handler: new ethX-pe@0x557d469065f0 | libevent_malloc: new ptr-libevent@0x557d46906630 size 128 | setup callback for interface eth0 192.1.3.20:500 fd 479 | libevent_free: release ptr-libevent@0x557d46906720 | free_event_entry: release EVENT_NULL-pe@0x557d469066e0 | add_fd_read_event_handler: new ethX-pe@0x557d469066e0 | libevent_malloc: new ptr-libevent@0x557d46906720 size 128 | setup callback for interface eth0 192.1.3.21:4500 fd 478 | libevent_free: release ptr-libevent@0x557d46906810 | free_event_entry: release EVENT_NULL-pe@0x557d469067d0 | add_fd_read_event_handler: new ethX-pe@0x557d469067d0 | libevent_malloc: new ptr-libevent@0x557d46906810 size 128 | setup callback for interface eth0 192.1.3.21:500 fd 477 | libevent_free: release ptr-libevent@0x557d46906900 | free_event_entry: release EVENT_NULL-pe@0x557d469068c0 | add_fd_read_event_handler: new ethX-pe@0x557d469068c0 | libevent_malloc: new ptr-libevent@0x557d46906900 size 128 | setup callback for interface eth0 192.1.3.22:4500 fd 476 | libevent_free: release ptr-libevent@0x557d469069f0 | free_event_entry: release EVENT_NULL-pe@0x557d469069b0 | add_fd_read_event_handler: new ethX-pe@0x557d469069b0 | libevent_malloc: new ptr-libevent@0x557d469069f0 size 128 | setup callback for interface eth0 192.1.3.22:500 fd 475 | libevent_free: release ptr-libevent@0x557d46916220 | free_event_entry: release EVENT_NULL-pe@0x557d46906aa0 | add_fd_read_event_handler: new ethX-pe@0x557d46906aa0 | libevent_malloc: new ptr-libevent@0x557d46916220 size 128 | setup callback for interface eth0 192.1.3.23:4500 fd 474 | libevent_free: release ptr-libevent@0x557d469162b0 | free_event_entry: release EVENT_NULL-pe@0x557d46906b00 | add_fd_read_event_handler: new ethX-pe@0x557d46906b00 | libevent_malloc: new ptr-libevent@0x557d469162b0 size 128 | setup callback for interface eth0 192.1.3.23:500 fd 473 | libevent_free: release ptr-libevent@0x557d469163a0 | free_event_entry: release EVENT_NULL-pe@0x557d46916360 | add_fd_read_event_handler: new ethX-pe@0x557d46916360 | libevent_malloc: new ptr-libevent@0x557d469163a0 size 128 | setup callback for interface eth0 192.1.3.24:4500 fd 472 | libevent_free: release ptr-libevent@0x557d46916490 | free_event_entry: release EVENT_NULL-pe@0x557d46916450 | add_fd_read_event_handler: new ethX-pe@0x557d46916450 | libevent_malloc: new ptr-libevent@0x557d46916490 size 128 | setup callback for interface eth0 192.1.3.24:500 fd 471 | libevent_free: release ptr-libevent@0x557d46916580 | free_event_entry: release EVENT_NULL-pe@0x557d46916540 | add_fd_read_event_handler: new ethX-pe@0x557d46916540 | libevent_malloc: new ptr-libevent@0x557d46916580 size 128 | setup callback for interface eth0 192.1.3.25:4500 fd 470 | libevent_free: release ptr-libevent@0x557d46916670 | free_event_entry: release EVENT_NULL-pe@0x557d46916630 | add_fd_read_event_handler: new ethX-pe@0x557d46916630 | libevent_malloc: new ptr-libevent@0x557d46916670 size 128 | setup callback for interface eth0 192.1.3.25:500 fd 469 | libevent_free: release ptr-libevent@0x557d46916760 | free_event_entry: release EVENT_NULL-pe@0x557d46916720 | add_fd_read_event_handler: new ethX-pe@0x557d46916720 | libevent_malloc: new ptr-libevent@0x557d46916760 size 128 | setup callback for interface eth0 192.1.3.26:4500 fd 468 | libevent_free: release ptr-libevent@0x557d46916850 | free_event_entry: release EVENT_NULL-pe@0x557d46916810 | add_fd_read_event_handler: new ethX-pe@0x557d46916810 | libevent_malloc: new ptr-libevent@0x557d46916850 size 128 | setup callback for interface eth0 192.1.3.26:500 fd 467 | libevent_free: release ptr-libevent@0x557d46916940 | free_event_entry: release EVENT_NULL-pe@0x557d46916900 | add_fd_read_event_handler: new ethX-pe@0x557d46916900 | libevent_malloc: new ptr-libevent@0x557d46916940 size 128 | setup callback for interface eth0 192.1.3.27:4500 fd 466 | libevent_free: release ptr-libevent@0x557d46916a30 | free_event_entry: release EVENT_NULL-pe@0x557d469169f0 | add_fd_read_event_handler: new ethX-pe@0x557d469169f0 | libevent_malloc: new ptr-libevent@0x557d46916a30 size 128 | setup callback for interface eth0 192.1.3.27:500 fd 465 | libevent_free: release ptr-libevent@0x557d46916b20 | free_event_entry: release EVENT_NULL-pe@0x557d46916ae0 | add_fd_read_event_handler: new ethX-pe@0x557d46916ae0 | libevent_malloc: new ptr-libevent@0x557d46916b20 size 128 | setup callback for interface eth0 192.1.3.28:4500 fd 464 | libevent_free: release ptr-libevent@0x557d46916c10 | free_event_entry: release EVENT_NULL-pe@0x557d46916bd0 | add_fd_read_event_handler: new ethX-pe@0x557d46916bd0 | libevent_malloc: new ptr-libevent@0x557d46916c10 size 128 | setup callback for interface eth0 192.1.3.28:500 fd 463 | libevent_free: release ptr-libevent@0x557d46916d00 | free_event_entry: release EVENT_NULL-pe@0x557d46916cc0 | add_fd_read_event_handler: new ethX-pe@0x557d46916cc0 | libevent_malloc: new ptr-libevent@0x557d46916d00 size 128 | setup callback for interface eth0 192.1.3.29:4500 fd 462 | libevent_free: release ptr-libevent@0x557d46916df0 | free_event_entry: release EVENT_NULL-pe@0x557d46916db0 | add_fd_read_event_handler: new ethX-pe@0x557d46916db0 | libevent_malloc: new ptr-libevent@0x557d46916df0 size 128 | setup callback for interface eth0 192.1.3.29:500 fd 461 | libevent_free: release ptr-libevent@0x557d46916ee0 | free_event_entry: release EVENT_NULL-pe@0x557d46916ea0 | add_fd_read_event_handler: new ethX-pe@0x557d46916ea0 | libevent_malloc: new ptr-libevent@0x557d46916ee0 size 128 | setup callback for interface eth0 192.1.3.30:4500 fd 460 | libevent_free: release ptr-libevent@0x557d46916fd0 | free_event_entry: release EVENT_NULL-pe@0x557d46916f90 | add_fd_read_event_handler: new ethX-pe@0x557d46916f90 | libevent_malloc: new ptr-libevent@0x557d46916fd0 size 128 | setup callback for interface eth0 192.1.3.30:500 fd 459 | libevent_free: release ptr-libevent@0x557d469170c0 | free_event_entry: release EVENT_NULL-pe@0x557d46917080 | add_fd_read_event_handler: new ethX-pe@0x557d46917080 | libevent_malloc: new ptr-libevent@0x557d469170c0 size 128 | setup callback for interface eth0 192.1.3.31:4500 fd 458 | libevent_free: release ptr-libevent@0x557d469171b0 | free_event_entry: release EVENT_NULL-pe@0x557d46917170 | add_fd_read_event_handler: new ethX-pe@0x557d46917170 | libevent_malloc: new ptr-libevent@0x557d469171b0 size 128 | setup callback for interface eth0 192.1.3.31:500 fd 457 | libevent_free: release ptr-libevent@0x557d469172a0 | free_event_entry: release EVENT_NULL-pe@0x557d46917260 | add_fd_read_event_handler: new ethX-pe@0x557d46917260 | libevent_malloc: new ptr-libevent@0x557d469172a0 size 128 | setup callback for interface eth0 192.1.3.32:4500 fd 456 | libevent_free: release ptr-libevent@0x557d46917390 | free_event_entry: release EVENT_NULL-pe@0x557d46917350 | add_fd_read_event_handler: new ethX-pe@0x557d46917350 | libevent_malloc: new ptr-libevent@0x557d46917390 size 128 | setup callback for interface eth0 192.1.3.32:500 fd 455 | libevent_free: release ptr-libevent@0x557d46917480 | free_event_entry: release EVENT_NULL-pe@0x557d46917440 | add_fd_read_event_handler: new ethX-pe@0x557d46917440 | libevent_malloc: new ptr-libevent@0x557d46917480 size 128 | setup callback for interface eth0 192.1.3.33:4500 fd 454 | libevent_free: release ptr-libevent@0x557d46917570 | free_event_entry: release EVENT_NULL-pe@0x557d46917530 | add_fd_read_event_handler: new ethX-pe@0x557d46917530 | libevent_malloc: new ptr-libevent@0x557d46917570 size 128 | setup callback for interface eth0 192.1.3.33:500 fd 453 | libevent_free: release ptr-libevent@0x557d46917660 | free_event_entry: release EVENT_NULL-pe@0x557d46917620 | add_fd_read_event_handler: new ethX-pe@0x557d46917620 | libevent_malloc: new ptr-libevent@0x557d46917660 size 128 | setup callback for interface eth0 192.1.3.34:4500 fd 452 | libevent_free: release ptr-libevent@0x557d46917750 | free_event_entry: release EVENT_NULL-pe@0x557d46917710 | add_fd_read_event_handler: new ethX-pe@0x557d46917710 | libevent_malloc: new ptr-libevent@0x557d46917750 size 128 | setup callback for interface eth0 192.1.3.34:500 fd 451 | libevent_free: release ptr-libevent@0x557d46917840 | free_event_entry: release EVENT_NULL-pe@0x557d46917800 | add_fd_read_event_handler: new ethX-pe@0x557d46917800 | libevent_malloc: new ptr-libevent@0x557d46917840 size 128 | setup callback for interface eth0 192.1.3.35:4500 fd 450 | libevent_free: release ptr-libevent@0x557d46917930 | free_event_entry: release EVENT_NULL-pe@0x557d469178f0 | add_fd_read_event_handler: new ethX-pe@0x557d469178f0 | libevent_malloc: new ptr-libevent@0x557d46917930 size 128 | setup callback for interface eth0 192.1.3.35:500 fd 449 | libevent_free: release ptr-libevent@0x557d46917a20 | free_event_entry: release EVENT_NULL-pe@0x557d469179e0 | add_fd_read_event_handler: new ethX-pe@0x557d469179e0 | libevent_malloc: new ptr-libevent@0x557d46917a20 size 128 | setup callback for interface eth0 192.1.3.36:4500 fd 448 | libevent_free: release ptr-libevent@0x557d46917b10 | free_event_entry: release EVENT_NULL-pe@0x557d46917ad0 | add_fd_read_event_handler: new ethX-pe@0x557d46917ad0 | libevent_malloc: new ptr-libevent@0x557d46917b10 size 128 | setup callback for interface eth0 192.1.3.36:500 fd 447 | libevent_free: release ptr-libevent@0x557d46917c00 | free_event_entry: release EVENT_NULL-pe@0x557d46917bc0 | add_fd_read_event_handler: new ethX-pe@0x557d46917bc0 | libevent_malloc: new ptr-libevent@0x557d46917c00 size 128 | setup callback for interface eth0 192.1.3.37:4500 fd 446 | libevent_free: release ptr-libevent@0x557d46917cf0 | free_event_entry: release EVENT_NULL-pe@0x557d46917cb0 | add_fd_read_event_handler: new ethX-pe@0x557d46917cb0 | libevent_malloc: new ptr-libevent@0x557d46917cf0 size 128 | setup callback for interface eth0 192.1.3.37:500 fd 445 | libevent_free: release ptr-libevent@0x557d46917de0 | free_event_entry: release EVENT_NULL-pe@0x557d46917da0 | add_fd_read_event_handler: new ethX-pe@0x557d46917da0 | libevent_malloc: new ptr-libevent@0x557d46917de0 size 128 | setup callback for interface eth0 192.1.3.38:4500 fd 444 | libevent_free: release ptr-libevent@0x557d46917ed0 | free_event_entry: release EVENT_NULL-pe@0x557d46917e90 | add_fd_read_event_handler: new ethX-pe@0x557d46917e90 | libevent_malloc: new ptr-libevent@0x557d46917ed0 size 128 | setup callback for interface eth0 192.1.3.38:500 fd 443 | libevent_free: release ptr-libevent@0x557d46917fc0 | free_event_entry: release EVENT_NULL-pe@0x557d46917f80 | add_fd_read_event_handler: new ethX-pe@0x557d46917f80 | libevent_malloc: new ptr-libevent@0x557d46917fc0 size 128 | setup callback for interface eth0 192.1.3.39:4500 fd 442 | libevent_free: release ptr-libevent@0x557d469180b0 | free_event_entry: release EVENT_NULL-pe@0x557d46918070 | add_fd_read_event_handler: new ethX-pe@0x557d46918070 | libevent_malloc: new ptr-libevent@0x557d469180b0 size 128 | setup callback for interface eth0 192.1.3.39:500 fd 441 | libevent_free: release ptr-libevent@0x557d469181a0 | free_event_entry: release EVENT_NULL-pe@0x557d46918160 | add_fd_read_event_handler: new ethX-pe@0x557d46918160 | libevent_malloc: new ptr-libevent@0x557d469181a0 size 128 | setup callback for interface eth0 192.1.3.40:4500 fd 440 | libevent_free: release ptr-libevent@0x557d46918290 | free_event_entry: release EVENT_NULL-pe@0x557d46918250 | add_fd_read_event_handler: new ethX-pe@0x557d46918250 | libevent_malloc: new ptr-libevent@0x557d46918290 size 128 | setup callback for interface eth0 192.1.3.40:500 fd 439 | libevent_free: release ptr-libevent@0x557d46918380 | free_event_entry: release EVENT_NULL-pe@0x557d46918340 | add_fd_read_event_handler: new ethX-pe@0x557d46918340 | libevent_malloc: new ptr-libevent@0x557d46918380 size 128 | setup callback for interface eth0 192.1.3.41:4500 fd 438 | libevent_free: release ptr-libevent@0x557d46918470 | free_event_entry: release EVENT_NULL-pe@0x557d46918430 | add_fd_read_event_handler: new ethX-pe@0x557d46918430 | libevent_malloc: new ptr-libevent@0x557d46918470 size 128 | setup callback for interface eth0 192.1.3.41:500 fd 437 | libevent_free: release ptr-libevent@0x557d46918560 | free_event_entry: release EVENT_NULL-pe@0x557d46918520 | add_fd_read_event_handler: new ethX-pe@0x557d46918520 | libevent_malloc: new ptr-libevent@0x557d46918560 size 128 | setup callback for interface eth0 192.1.3.42:4500 fd 436 | libevent_free: release ptr-libevent@0x557d46918650 | free_event_entry: release EVENT_NULL-pe@0x557d46918610 | add_fd_read_event_handler: new ethX-pe@0x557d46918610 | libevent_malloc: new ptr-libevent@0x557d46918650 size 128 | setup callback for interface eth0 192.1.3.42:500 fd 435 | libevent_free: release ptr-libevent@0x557d46918740 | free_event_entry: release EVENT_NULL-pe@0x557d46918700 | add_fd_read_event_handler: new ethX-pe@0x557d46918700 | libevent_malloc: new ptr-libevent@0x557d46918740 size 128 | setup callback for interface eth0 192.1.3.43:4500 fd 434 | libevent_free: release ptr-libevent@0x557d46918830 | free_event_entry: release EVENT_NULL-pe@0x557d469187f0 | add_fd_read_event_handler: new ethX-pe@0x557d469187f0 | libevent_malloc: new ptr-libevent@0x557d46918830 size 128 | setup callback for interface eth0 192.1.3.43:500 fd 433 | libevent_free: release ptr-libevent@0x557d46918920 | free_event_entry: release EVENT_NULL-pe@0x557d469188e0 | add_fd_read_event_handler: new ethX-pe@0x557d469188e0 | libevent_malloc: new ptr-libevent@0x557d46918920 size 128 | setup callback for interface eth0 192.1.3.44:4500 fd 432 | libevent_free: release ptr-libevent@0x557d46918a10 | free_event_entry: release EVENT_NULL-pe@0x557d469189d0 | add_fd_read_event_handler: new ethX-pe@0x557d469189d0 | libevent_malloc: new ptr-libevent@0x557d46918a10 size 128 | setup callback for interface eth0 192.1.3.44:500 fd 431 | libevent_free: release ptr-libevent@0x557d46918b00 | free_event_entry: release EVENT_NULL-pe@0x557d46918ac0 | add_fd_read_event_handler: new ethX-pe@0x557d46918ac0 | libevent_malloc: new ptr-libevent@0x557d46918b00 size 128 | setup callback for interface eth0 192.1.3.45:4500 fd 430 | libevent_free: release ptr-libevent@0x557d46918bf0 | free_event_entry: release EVENT_NULL-pe@0x557d46918bb0 | add_fd_read_event_handler: new ethX-pe@0x557d46918bb0 | libevent_malloc: new ptr-libevent@0x557d46918bf0 size 128 | setup callback for interface eth0 192.1.3.45:500 fd 429 | libevent_free: release ptr-libevent@0x557d46918ce0 | free_event_entry: release EVENT_NULL-pe@0x557d46918ca0 | add_fd_read_event_handler: new ethX-pe@0x557d46918ca0 | libevent_malloc: new ptr-libevent@0x557d46918ce0 size 128 | setup callback for interface eth0 192.1.3.46:4500 fd 428 | libevent_free: release ptr-libevent@0x557d46918dd0 | free_event_entry: release EVENT_NULL-pe@0x557d46918d90 | add_fd_read_event_handler: new ethX-pe@0x557d46918d90 | libevent_malloc: new ptr-libevent@0x557d46918dd0 size 128 | setup callback for interface eth0 192.1.3.46:500 fd 427 | libevent_free: release ptr-libevent@0x557d46918ec0 | free_event_entry: release EVENT_NULL-pe@0x557d46918e80 | add_fd_read_event_handler: new ethX-pe@0x557d46918e80 | libevent_malloc: new ptr-libevent@0x557d46918ec0 size 128 | setup callback for interface eth0 192.1.3.47:4500 fd 426 | libevent_free: release ptr-libevent@0x557d46918fb0 | free_event_entry: release EVENT_NULL-pe@0x557d46918f70 | add_fd_read_event_handler: new ethX-pe@0x557d46918f70 | libevent_malloc: new ptr-libevent@0x557d46918fb0 size 128 | setup callback for interface eth0 192.1.3.47:500 fd 425 | libevent_free: release ptr-libevent@0x557d469190a0 | free_event_entry: release EVENT_NULL-pe@0x557d46919060 | add_fd_read_event_handler: new ethX-pe@0x557d46919060 | libevent_malloc: new ptr-libevent@0x557d469190a0 size 128 | setup callback for interface eth0 192.1.3.48:4500 fd 424 | libevent_free: release ptr-libevent@0x557d46919190 | free_event_entry: release EVENT_NULL-pe@0x557d46919150 | add_fd_read_event_handler: new ethX-pe@0x557d46919150 | libevent_malloc: new ptr-libevent@0x557d46919190 size 128 | setup callback for interface eth0 192.1.3.48:500 fd 423 | libevent_free: release ptr-libevent@0x557d46919280 | free_event_entry: release EVENT_NULL-pe@0x557d46919240 | add_fd_read_event_handler: new ethX-pe@0x557d46919240 | libevent_malloc: new ptr-libevent@0x557d46919280 size 128 | setup callback for interface eth0 192.1.3.49:4500 fd 422 | libevent_free: release ptr-libevent@0x557d46919370 | free_event_entry: release EVENT_NULL-pe@0x557d46919330 | add_fd_read_event_handler: new ethX-pe@0x557d46919330 | libevent_malloc: new ptr-libevent@0x557d46919370 size 128 | setup callback for interface eth0 192.1.3.49:500 fd 421 | libevent_free: release ptr-libevent@0x557d46919460 | free_event_entry: release EVENT_NULL-pe@0x557d46919420 | add_fd_read_event_handler: new ethX-pe@0x557d46919420 | libevent_malloc: new ptr-libevent@0x557d46919460 size 128 | setup callback for interface eth0 192.1.3.50:4500 fd 420 | libevent_free: release ptr-libevent@0x557d46919550 | free_event_entry: release EVENT_NULL-pe@0x557d46919510 | add_fd_read_event_handler: new ethX-pe@0x557d46919510 | libevent_malloc: new ptr-libevent@0x557d46919550 size 128 | setup callback for interface eth0 192.1.3.50:500 fd 419 | libevent_free: release ptr-libevent@0x557d46919640 | free_event_entry: release EVENT_NULL-pe@0x557d46919600 | add_fd_read_event_handler: new ethX-pe@0x557d46919600 | libevent_malloc: new ptr-libevent@0x557d46919640 size 128 | setup callback for interface eth0 192.1.3.51:4500 fd 418 | libevent_free: release ptr-libevent@0x557d46919730 | free_event_entry: release EVENT_NULL-pe@0x557d469196f0 | add_fd_read_event_handler: new ethX-pe@0x557d469196f0 | libevent_malloc: new ptr-libevent@0x557d46919730 size 128 | setup callback for interface eth0 192.1.3.51:500 fd 417 | libevent_free: release ptr-libevent@0x557d46919820 | free_event_entry: release EVENT_NULL-pe@0x557d469197e0 | add_fd_read_event_handler: new ethX-pe@0x557d469197e0 | libevent_malloc: new ptr-libevent@0x557d46919820 size 128 | setup callback for interface eth0 192.1.3.52:4500 fd 416 | libevent_free: release ptr-libevent@0x557d46919910 | free_event_entry: release EVENT_NULL-pe@0x557d469198d0 | add_fd_read_event_handler: new ethX-pe@0x557d469198d0 | libevent_malloc: new ptr-libevent@0x557d46919910 size 128 | setup callback for interface eth0 192.1.3.52:500 fd 415 | libevent_free: release ptr-libevent@0x557d46919a00 | free_event_entry: release EVENT_NULL-pe@0x557d469199c0 | add_fd_read_event_handler: new ethX-pe@0x557d469199c0 | libevent_malloc: new ptr-libevent@0x557d46919a00 size 128 | setup callback for interface eth0 192.1.3.53:4500 fd 414 | libevent_free: release ptr-libevent@0x557d46919af0 | free_event_entry: release EVENT_NULL-pe@0x557d46919ab0 | add_fd_read_event_handler: new ethX-pe@0x557d46919ab0 | libevent_malloc: new ptr-libevent@0x557d46919af0 size 128 | setup callback for interface eth0 192.1.3.53:500 fd 413 | libevent_free: release ptr-libevent@0x557d46919be0 | free_event_entry: release EVENT_NULL-pe@0x557d46919ba0 | add_fd_read_event_handler: new ethX-pe@0x557d46919ba0 | libevent_malloc: new ptr-libevent@0x557d46919be0 size 128 | setup callback for interface eth0 192.1.3.54:4500 fd 412 | libevent_free: release ptr-libevent@0x557d46919cd0 | free_event_entry: release EVENT_NULL-pe@0x557d46919c90 | add_fd_read_event_handler: new ethX-pe@0x557d46919c90 | libevent_malloc: new ptr-libevent@0x557d46919cd0 size 128 | setup callback for interface eth0 192.1.3.54:500 fd 411 | libevent_free: release ptr-libevent@0x557d46919dc0 | free_event_entry: release EVENT_NULL-pe@0x557d46919d80 | add_fd_read_event_handler: new ethX-pe@0x557d46919d80 | libevent_malloc: new ptr-libevent@0x557d46919dc0 size 128 | setup callback for interface eth0 192.1.3.55:4500 fd 410 | libevent_free: release ptr-libevent@0x557d46919eb0 | free_event_entry: release EVENT_NULL-pe@0x557d46919e70 | add_fd_read_event_handler: new ethX-pe@0x557d46919e70 | libevent_malloc: new ptr-libevent@0x557d46919eb0 size 128 | setup callback for interface eth0 192.1.3.55:500 fd 409 | libevent_free: release ptr-libevent@0x557d46919fa0 | free_event_entry: release EVENT_NULL-pe@0x557d46919f60 | add_fd_read_event_handler: new ethX-pe@0x557d46919f60 | libevent_malloc: new ptr-libevent@0x557d46919fa0 size 128 | setup callback for interface eth0 192.1.3.56:4500 fd 408 | libevent_free: release ptr-libevent@0x557d4691a090 | free_event_entry: release EVENT_NULL-pe@0x557d4691a050 | add_fd_read_event_handler: new ethX-pe@0x557d4691a050 | libevent_malloc: new ptr-libevent@0x557d4691a090 size 128 | setup callback for interface eth0 192.1.3.56:500 fd 407 | libevent_free: release ptr-libevent@0x557d4691a180 | free_event_entry: release EVENT_NULL-pe@0x557d4691a140 | add_fd_read_event_handler: new ethX-pe@0x557d4691a140 | libevent_malloc: new ptr-libevent@0x557d4691a180 size 128 | setup callback for interface eth0 192.1.3.57:4500 fd 406 | libevent_free: release ptr-libevent@0x557d4691a270 | free_event_entry: release EVENT_NULL-pe@0x557d4691a230 | add_fd_read_event_handler: new ethX-pe@0x557d4691a230 | libevent_malloc: new ptr-libevent@0x557d4691a270 size 128 | setup callback for interface eth0 192.1.3.57:500 fd 405 | libevent_free: release ptr-libevent@0x557d4691a360 | free_event_entry: release EVENT_NULL-pe@0x557d4691a320 | add_fd_read_event_handler: new ethX-pe@0x557d4691a320 | libevent_malloc: new ptr-libevent@0x557d4691a360 size 128 | setup callback for interface eth0 192.1.3.58:4500 fd 404 | libevent_free: release ptr-libevent@0x557d4691a450 | free_event_entry: release EVENT_NULL-pe@0x557d4691a410 | add_fd_read_event_handler: new ethX-pe@0x557d4691a410 | libevent_malloc: new ptr-libevent@0x557d4691a450 size 128 | setup callback for interface eth0 192.1.3.58:500 fd 403 | libevent_free: release ptr-libevent@0x557d4691a540 | free_event_entry: release EVENT_NULL-pe@0x557d4691a500 | add_fd_read_event_handler: new ethX-pe@0x557d4691a500 | libevent_malloc: new ptr-libevent@0x557d4691a540 size 128 | setup callback for interface eth0 192.1.3.59:4500 fd 402 | libevent_free: release ptr-libevent@0x557d4691a630 | free_event_entry: release EVENT_NULL-pe@0x557d4691a5f0 | add_fd_read_event_handler: new ethX-pe@0x557d4691a5f0 | libevent_malloc: new ptr-libevent@0x557d4691a630 size 128 | setup callback for interface eth0 192.1.3.59:500 fd 401 | libevent_free: release ptr-libevent@0x557d4691a720 | free_event_entry: release EVENT_NULL-pe@0x557d4691a6e0 | add_fd_read_event_handler: new ethX-pe@0x557d4691a6e0 | libevent_malloc: new ptr-libevent@0x557d4691a720 size 128 | setup callback for interface eth0 192.1.3.60:4500 fd 400 | libevent_free: release ptr-libevent@0x557d4691a810 | free_event_entry: release EVENT_NULL-pe@0x557d4691a7d0 | add_fd_read_event_handler: new ethX-pe@0x557d4691a7d0 | libevent_malloc: new ptr-libevent@0x557d4691a810 size 128 | setup callback for interface eth0 192.1.3.60:500 fd 399 | libevent_free: release ptr-libevent@0x557d4691a900 | free_event_entry: release EVENT_NULL-pe@0x557d4691a8c0 | add_fd_read_event_handler: new ethX-pe@0x557d4691a8c0 | libevent_malloc: new ptr-libevent@0x557d4691a900 size 128 | setup callback for interface eth0 192.1.3.61:4500 fd 398 | libevent_free: release ptr-libevent@0x557d4691a9f0 | free_event_entry: release EVENT_NULL-pe@0x557d4691a9b0 | add_fd_read_event_handler: new ethX-pe@0x557d4691a9b0 | libevent_malloc: new ptr-libevent@0x557d4691a9f0 size 128 | setup callback for interface eth0 192.1.3.61:500 fd 397 | libevent_free: release ptr-libevent@0x557d4691aae0 | free_event_entry: release EVENT_NULL-pe@0x557d4691aaa0 | add_fd_read_event_handler: new ethX-pe@0x557d4691aaa0 | libevent_malloc: new ptr-libevent@0x557d4691aae0 size 128 | setup callback for interface eth0 192.1.3.62:4500 fd 396 | libevent_free: release ptr-libevent@0x557d4691abd0 | free_event_entry: release EVENT_NULL-pe@0x557d4691ab90 | add_fd_read_event_handler: new ethX-pe@0x557d4691ab90 | libevent_malloc: new ptr-libevent@0x557d4691abd0 size 128 | setup callback for interface eth0 192.1.3.62:500 fd 395 | libevent_free: release ptr-libevent@0x557d4691acc0 | free_event_entry: release EVENT_NULL-pe@0x557d4691ac80 | add_fd_read_event_handler: new ethX-pe@0x557d4691ac80 | libevent_malloc: new ptr-libevent@0x557d4691acc0 size 128 | setup callback for interface eth0 192.1.3.63:4500 fd 394 | libevent_free: release ptr-libevent@0x557d4691adb0 | free_event_entry: release EVENT_NULL-pe@0x557d4691ad70 | add_fd_read_event_handler: new ethX-pe@0x557d4691ad70 | libevent_malloc: new ptr-libevent@0x557d4691adb0 size 128 | setup callback for interface eth0 192.1.3.63:500 fd 393 | libevent_free: release ptr-libevent@0x557d4691aea0 | free_event_entry: release EVENT_NULL-pe@0x557d4691ae60 | add_fd_read_event_handler: new ethX-pe@0x557d4691ae60 | libevent_malloc: new ptr-libevent@0x557d4691aea0 size 128 | setup callback for interface eth0 192.1.3.64:4500 fd 392 | libevent_free: release ptr-libevent@0x557d4691af90 | free_event_entry: release EVENT_NULL-pe@0x557d4691af50 | add_fd_read_event_handler: new ethX-pe@0x557d4691af50 | libevent_malloc: new ptr-libevent@0x557d4691af90 size 128 | setup callback for interface eth0 192.1.3.64:500 fd 391 | libevent_free: release ptr-libevent@0x557d4691b080 | free_event_entry: release EVENT_NULL-pe@0x557d4691b040 | add_fd_read_event_handler: new ethX-pe@0x557d4691b040 | libevent_malloc: new ptr-libevent@0x557d4691b080 size 128 | setup callback for interface eth0 192.1.3.65:4500 fd 390 | libevent_free: release ptr-libevent@0x557d4691b170 | free_event_entry: release EVENT_NULL-pe@0x557d4691b130 | add_fd_read_event_handler: new ethX-pe@0x557d4691b130 | libevent_malloc: new ptr-libevent@0x557d4691b170 size 128 | setup callback for interface eth0 192.1.3.65:500 fd 389 | libevent_free: release ptr-libevent@0x557d4691b260 | free_event_entry: release EVENT_NULL-pe@0x557d4691b220 | add_fd_read_event_handler: new ethX-pe@0x557d4691b220 | libevent_malloc: new ptr-libevent@0x557d4691b260 size 128 | setup callback for interface eth0 192.1.3.66:4500 fd 388 | libevent_free: release ptr-libevent@0x557d4691b350 | free_event_entry: release EVENT_NULL-pe@0x557d4691b310 | add_fd_read_event_handler: new ethX-pe@0x557d4691b310 | libevent_malloc: new ptr-libevent@0x557d4691b350 size 128 | setup callback for interface eth0 192.1.3.66:500 fd 387 | libevent_free: release ptr-libevent@0x557d4691b440 | free_event_entry: release EVENT_NULL-pe@0x557d4691b400 | add_fd_read_event_handler: new ethX-pe@0x557d4691b400 | libevent_malloc: new ptr-libevent@0x557d4691b440 size 128 | setup callback for interface eth0 192.1.3.67:4500 fd 386 | libevent_free: release ptr-libevent@0x557d4691b530 | free_event_entry: release EVENT_NULL-pe@0x557d4691b4f0 | add_fd_read_event_handler: new ethX-pe@0x557d4691b4f0 | libevent_malloc: new ptr-libevent@0x557d4691b530 size 128 | setup callback for interface eth0 192.1.3.67:500 fd 385 | libevent_free: release ptr-libevent@0x557d4691b620 | free_event_entry: release EVENT_NULL-pe@0x557d4691b5e0 | add_fd_read_event_handler: new ethX-pe@0x557d4691b5e0 | libevent_malloc: new ptr-libevent@0x557d4691b620 size 128 | setup callback for interface eth0 192.1.3.68:4500 fd 384 | libevent_free: release ptr-libevent@0x557d4691b710 | free_event_entry: release EVENT_NULL-pe@0x557d4691b6d0 | add_fd_read_event_handler: new ethX-pe@0x557d4691b6d0 | libevent_malloc: new ptr-libevent@0x557d4691b710 size 128 | setup callback for interface eth0 192.1.3.68:500 fd 383 | libevent_free: release ptr-libevent@0x557d4691b800 | free_event_entry: release EVENT_NULL-pe@0x557d4691b7c0 | add_fd_read_event_handler: new ethX-pe@0x557d4691b7c0 | libevent_malloc: new ptr-libevent@0x557d4691b800 size 128 | setup callback for interface eth0 192.1.3.69:4500 fd 382 | libevent_free: release ptr-libevent@0x557d4691b8f0 | free_event_entry: release EVENT_NULL-pe@0x557d4691b8b0 | add_fd_read_event_handler: new ethX-pe@0x557d4691b8b0 | libevent_malloc: new ptr-libevent@0x557d4691b8f0 size 128 | setup callback for interface eth0 192.1.3.69:500 fd 381 | libevent_free: release ptr-libevent@0x557d4691b9e0 | free_event_entry: release EVENT_NULL-pe@0x557d4691b9a0 | add_fd_read_event_handler: new ethX-pe@0x557d4691b9a0 | libevent_malloc: new ptr-libevent@0x557d4691b9e0 size 128 | setup callback for interface eth0 192.1.3.70:4500 fd 380 | libevent_free: release ptr-libevent@0x557d4691bad0 | free_event_entry: release EVENT_NULL-pe@0x557d4691ba90 | add_fd_read_event_handler: new ethX-pe@0x557d4691ba90 | libevent_malloc: new ptr-libevent@0x557d4691bad0 size 128 | setup callback for interface eth0 192.1.3.70:500 fd 379 | libevent_free: release ptr-libevent@0x557d4691bbc0 | free_event_entry: release EVENT_NULL-pe@0x557d4691bb80 | add_fd_read_event_handler: new ethX-pe@0x557d4691bb80 | libevent_malloc: new ptr-libevent@0x557d4691bbc0 size 128 | setup callback for interface eth0 192.1.3.71:4500 fd 378 | libevent_free: release ptr-libevent@0x557d4691bcb0 | free_event_entry: release EVENT_NULL-pe@0x557d4691bc70 | add_fd_read_event_handler: new ethX-pe@0x557d4691bc70 | libevent_malloc: new ptr-libevent@0x557d4691bcb0 size 128 | setup callback for interface eth0 192.1.3.71:500 fd 377 | libevent_free: release ptr-libevent@0x557d4691bda0 | free_event_entry: release EVENT_NULL-pe@0x557d4691bd60 | add_fd_read_event_handler: new ethX-pe@0x557d4691bd60 | libevent_malloc: new ptr-libevent@0x557d4691bda0 size 128 | setup callback for interface eth0 192.1.3.72:4500 fd 376 | libevent_free: release ptr-libevent@0x557d4691be90 | free_event_entry: release EVENT_NULL-pe@0x557d4691be50 | add_fd_read_event_handler: new ethX-pe@0x557d4691be50 | libevent_malloc: new ptr-libevent@0x557d4691be90 size 128 | setup callback for interface eth0 192.1.3.72:500 fd 375 | libevent_free: release ptr-libevent@0x557d4691bf80 | free_event_entry: release EVENT_NULL-pe@0x557d4691bf40 | add_fd_read_event_handler: new ethX-pe@0x557d4691bf40 | libevent_malloc: new ptr-libevent@0x557d4691bf80 size 128 | setup callback for interface eth0 192.1.3.73:4500 fd 374 | libevent_free: release ptr-libevent@0x557d4691c070 | free_event_entry: release EVENT_NULL-pe@0x557d4691c030 | add_fd_read_event_handler: new ethX-pe@0x557d4691c030 | libevent_malloc: new ptr-libevent@0x557d4691c070 size 128 | setup callback for interface eth0 192.1.3.73:500 fd 373 | libevent_free: release ptr-libevent@0x557d4691c160 | free_event_entry: release EVENT_NULL-pe@0x557d4691c120 | add_fd_read_event_handler: new ethX-pe@0x557d4691c120 | libevent_malloc: new ptr-libevent@0x557d4691c160 size 128 | setup callback for interface eth0 192.1.3.74:4500 fd 372 | libevent_free: release ptr-libevent@0x557d4691c250 | free_event_entry: release EVENT_NULL-pe@0x557d4691c210 | add_fd_read_event_handler: new ethX-pe@0x557d4691c210 | libevent_malloc: new ptr-libevent@0x557d4691c250 size 128 | setup callback for interface eth0 192.1.3.74:500 fd 371 | libevent_free: release ptr-libevent@0x557d4691c340 | free_event_entry: release EVENT_NULL-pe@0x557d4691c300 | add_fd_read_event_handler: new ethX-pe@0x557d4691c300 | libevent_malloc: new ptr-libevent@0x557d4691c340 size 128 | setup callback for interface eth0 192.1.3.75:4500 fd 370 | libevent_free: release ptr-libevent@0x557d4691c430 | free_event_entry: release EVENT_NULL-pe@0x557d4691c3f0 | add_fd_read_event_handler: new ethX-pe@0x557d4691c3f0 | libevent_malloc: new ptr-libevent@0x557d4691c430 size 128 | setup callback for interface eth0 192.1.3.75:500 fd 369 | libevent_free: release ptr-libevent@0x557d4691c520 | free_event_entry: release EVENT_NULL-pe@0x557d4691c4e0 | add_fd_read_event_handler: new ethX-pe@0x557d4691c4e0 | libevent_malloc: new ptr-libevent@0x557d4691c520 size 128 | setup callback for interface eth0 192.1.3.76:4500 fd 368 | libevent_free: release ptr-libevent@0x557d4691c610 | free_event_entry: release EVENT_NULL-pe@0x557d4691c5d0 | add_fd_read_event_handler: new ethX-pe@0x557d4691c5d0 | libevent_malloc: new ptr-libevent@0x557d4691c610 size 128 | setup callback for interface eth0 192.1.3.76:500 fd 367 | libevent_free: release ptr-libevent@0x557d4691c700 | free_event_entry: release EVENT_NULL-pe@0x557d4691c6c0 | add_fd_read_event_handler: new ethX-pe@0x557d4691c6c0 | libevent_malloc: new ptr-libevent@0x557d4691c700 size 128 | setup callback for interface eth0 192.1.3.77:4500 fd 366 | libevent_free: release ptr-libevent@0x557d4691c7f0 | free_event_entry: release EVENT_NULL-pe@0x557d4691c7b0 | add_fd_read_event_handler: new ethX-pe@0x557d4691c7b0 | libevent_malloc: new ptr-libevent@0x557d4691c7f0 size 128 | setup callback for interface eth0 192.1.3.77:500 fd 365 | libevent_free: release ptr-libevent@0x557d4691c8e0 | free_event_entry: release EVENT_NULL-pe@0x557d4691c8a0 | add_fd_read_event_handler: new ethX-pe@0x557d4691c8a0 | libevent_malloc: new ptr-libevent@0x557d4691c8e0 size 128 | setup callback for interface eth0 192.1.3.78:4500 fd 364 | libevent_free: release ptr-libevent@0x557d4691c9d0 | free_event_entry: release EVENT_NULL-pe@0x557d4691c990 | add_fd_read_event_handler: new ethX-pe@0x557d4691c990 | libevent_malloc: new ptr-libevent@0x557d4691c9d0 size 128 | setup callback for interface eth0 192.1.3.78:500 fd 363 | libevent_free: release ptr-libevent@0x557d4691cac0 | free_event_entry: release EVENT_NULL-pe@0x557d4691ca80 | add_fd_read_event_handler: new ethX-pe@0x557d4691ca80 | libevent_malloc: new ptr-libevent@0x557d4691cac0 size 128 | setup callback for interface eth0 192.1.3.79:4500 fd 362 | libevent_free: release ptr-libevent@0x557d4691cbb0 | free_event_entry: release EVENT_NULL-pe@0x557d4691cb70 | add_fd_read_event_handler: new ethX-pe@0x557d4691cb70 | libevent_malloc: new ptr-libevent@0x557d4691cbb0 size 128 | setup callback for interface eth0 192.1.3.79:500 fd 361 | libevent_free: release ptr-libevent@0x557d4691cca0 | free_event_entry: release EVENT_NULL-pe@0x557d4691cc60 | add_fd_read_event_handler: new ethX-pe@0x557d4691cc60 | libevent_malloc: new ptr-libevent@0x557d4691cca0 size 128 | setup callback for interface eth0 192.1.3.80:4500 fd 360 | libevent_free: release ptr-libevent@0x557d4691cd90 | free_event_entry: release EVENT_NULL-pe@0x557d4691cd50 | add_fd_read_event_handler: new ethX-pe@0x557d4691cd50 | libevent_malloc: new ptr-libevent@0x557d4691cd90 size 128 | setup callback for interface eth0 192.1.3.80:500 fd 359 | libevent_free: release ptr-libevent@0x557d4691ce80 | free_event_entry: release EVENT_NULL-pe@0x557d4691ce40 | add_fd_read_event_handler: new ethX-pe@0x557d4691ce40 | libevent_malloc: new ptr-libevent@0x557d4691ce80 size 128 | setup callback for interface eth0 192.1.3.81:4500 fd 358 | libevent_free: release ptr-libevent@0x557d4691cf70 | free_event_entry: release EVENT_NULL-pe@0x557d4691cf30 | add_fd_read_event_handler: new ethX-pe@0x557d4691cf30 | libevent_malloc: new ptr-libevent@0x557d4691cf70 size 128 | setup callback for interface eth0 192.1.3.81:500 fd 357 | libevent_free: release ptr-libevent@0x557d4691d060 | free_event_entry: release EVENT_NULL-pe@0x557d4691d020 | add_fd_read_event_handler: new ethX-pe@0x557d4691d020 | libevent_malloc: new ptr-libevent@0x557d4691d060 size 128 | setup callback for interface eth0 192.1.3.82:4500 fd 356 | libevent_free: release ptr-libevent@0x557d4691d150 | free_event_entry: release EVENT_NULL-pe@0x557d4691d110 | add_fd_read_event_handler: new ethX-pe@0x557d4691d110 | libevent_malloc: new ptr-libevent@0x557d4691d150 size 128 | setup callback for interface eth0 192.1.3.82:500 fd 355 | libevent_free: release ptr-libevent@0x557d4691d240 | free_event_entry: release EVENT_NULL-pe@0x557d4691d200 | add_fd_read_event_handler: new ethX-pe@0x557d4691d200 | libevent_malloc: new ptr-libevent@0x557d4691d240 size 128 | setup callback for interface eth0 192.1.3.83:4500 fd 354 | libevent_free: release ptr-libevent@0x557d4691d330 | free_event_entry: release EVENT_NULL-pe@0x557d4691d2f0 | add_fd_read_event_handler: new ethX-pe@0x557d4691d2f0 | libevent_malloc: new ptr-libevent@0x557d4691d330 size 128 | setup callback for interface eth0 192.1.3.83:500 fd 353 | libevent_free: release ptr-libevent@0x557d4691d420 | free_event_entry: release EVENT_NULL-pe@0x557d4691d3e0 | add_fd_read_event_handler: new ethX-pe@0x557d4691d3e0 | libevent_malloc: new ptr-libevent@0x557d4691d420 size 128 | setup callback for interface eth0 192.1.3.84:4500 fd 352 | libevent_free: release ptr-libevent@0x557d4691d510 | free_event_entry: release EVENT_NULL-pe@0x557d4691d4d0 | add_fd_read_event_handler: new ethX-pe@0x557d4691d4d0 | libevent_malloc: new ptr-libevent@0x557d4691d510 size 128 | setup callback for interface eth0 192.1.3.84:500 fd 351 | libevent_free: release ptr-libevent@0x557d4691d600 | free_event_entry: release EVENT_NULL-pe@0x557d4691d5c0 | add_fd_read_event_handler: new ethX-pe@0x557d4691d5c0 | libevent_malloc: new ptr-libevent@0x557d4691d600 size 128 | setup callback for interface eth0 192.1.3.85:4500 fd 350 | libevent_free: release ptr-libevent@0x557d4691d6f0 | free_event_entry: release EVENT_NULL-pe@0x557d4691d6b0 | add_fd_read_event_handler: new ethX-pe@0x557d4691d6b0 | libevent_malloc: new ptr-libevent@0x557d4691d6f0 size 128 | setup callback for interface eth0 192.1.3.85:500 fd 349 | libevent_free: release ptr-libevent@0x557d4691d7e0 | free_event_entry: release EVENT_NULL-pe@0x557d4691d7a0 | add_fd_read_event_handler: new ethX-pe@0x557d4691d7a0 | libevent_malloc: new ptr-libevent@0x557d4691d7e0 size 128 | setup callback for interface eth0 192.1.3.86:4500 fd 348 | libevent_free: release ptr-libevent@0x557d4691d8d0 | free_event_entry: release EVENT_NULL-pe@0x557d4691d890 | add_fd_read_event_handler: new ethX-pe@0x557d4691d890 | libevent_malloc: new ptr-libevent@0x557d4691d8d0 size 128 | setup callback for interface eth0 192.1.3.86:500 fd 347 | libevent_free: release ptr-libevent@0x557d4691d9c0 | free_event_entry: release EVENT_NULL-pe@0x557d4691d980 | add_fd_read_event_handler: new ethX-pe@0x557d4691d980 | libevent_malloc: new ptr-libevent@0x557d4691d9c0 size 128 | setup callback for interface eth0 192.1.3.87:4500 fd 346 | libevent_free: release ptr-libevent@0x557d4691dab0 | free_event_entry: release EVENT_NULL-pe@0x557d4691da70 | add_fd_read_event_handler: new ethX-pe@0x557d4691da70 | libevent_malloc: new ptr-libevent@0x557d4691dab0 size 128 | setup callback for interface eth0 192.1.3.87:500 fd 345 | libevent_free: release ptr-libevent@0x557d4691dba0 | free_event_entry: release EVENT_NULL-pe@0x557d4691db60 | add_fd_read_event_handler: new ethX-pe@0x557d4691db60 | libevent_malloc: new ptr-libevent@0x557d4691dba0 size 128 | setup callback for interface eth0 192.1.3.88:4500 fd 344 | libevent_free: release ptr-libevent@0x557d4691dc90 | free_event_entry: release EVENT_NULL-pe@0x557d4691dc50 | add_fd_read_event_handler: new ethX-pe@0x557d4691dc50 | libevent_malloc: new ptr-libevent@0x557d4691dc90 size 128 | setup callback for interface eth0 192.1.3.88:500 fd 343 | libevent_free: release ptr-libevent@0x557d4691dd80 | free_event_entry: release EVENT_NULL-pe@0x557d4691dd40 | add_fd_read_event_handler: new ethX-pe@0x557d4691dd40 | libevent_malloc: new ptr-libevent@0x557d4691dd80 size 128 | setup callback for interface eth0 192.1.3.89:4500 fd 342 | libevent_free: release ptr-libevent@0x557d4691de70 | free_event_entry: release EVENT_NULL-pe@0x557d4691de30 | add_fd_read_event_handler: new ethX-pe@0x557d4691de30 | libevent_malloc: new ptr-libevent@0x557d4691de70 size 128 | setup callback for interface eth0 192.1.3.89:500 fd 341 | libevent_free: release ptr-libevent@0x557d4691df60 | free_event_entry: release EVENT_NULL-pe@0x557d4691df20 | add_fd_read_event_handler: new ethX-pe@0x557d4691df20 | libevent_malloc: new ptr-libevent@0x557d4691df60 size 128 | setup callback for interface eth0 192.1.3.90:4500 fd 340 | libevent_free: release ptr-libevent@0x557d4691e050 | free_event_entry: release EVENT_NULL-pe@0x557d4691e010 | add_fd_read_event_handler: new ethX-pe@0x557d4691e010 | libevent_malloc: new ptr-libevent@0x557d4691e050 size 128 | setup callback for interface eth0 192.1.3.90:500 fd 339 | libevent_free: release ptr-libevent@0x557d4691e140 | free_event_entry: release EVENT_NULL-pe@0x557d4691e100 | add_fd_read_event_handler: new ethX-pe@0x557d4691e100 | libevent_malloc: new ptr-libevent@0x557d4691e140 size 128 | setup callback for interface eth0 192.1.3.91:4500 fd 338 | libevent_free: release ptr-libevent@0x557d4691e230 | free_event_entry: release EVENT_NULL-pe@0x557d4691e1f0 | add_fd_read_event_handler: new ethX-pe@0x557d4691e1f0 | libevent_malloc: new ptr-libevent@0x557d4691e230 size 128 | setup callback for interface eth0 192.1.3.91:500 fd 337 | libevent_free: release ptr-libevent@0x557d4691e320 | free_event_entry: release EVENT_NULL-pe@0x557d4691e2e0 | add_fd_read_event_handler: new ethX-pe@0x557d4691e2e0 | libevent_malloc: new ptr-libevent@0x557d4691e320 size 128 | setup callback for interface eth0 192.1.3.92:4500 fd 336 | libevent_free: release ptr-libevent@0x557d4691e410 | free_event_entry: release EVENT_NULL-pe@0x557d4691e3d0 | add_fd_read_event_handler: new ethX-pe@0x557d4691e3d0 | libevent_malloc: new ptr-libevent@0x557d4691e410 size 128 | setup callback for interface eth0 192.1.3.92:500 fd 335 | libevent_free: release ptr-libevent@0x557d4691e500 | free_event_entry: release EVENT_NULL-pe@0x557d4691e4c0 | add_fd_read_event_handler: new ethX-pe@0x557d4691e4c0 | libevent_malloc: new ptr-libevent@0x557d4691e500 size 128 | setup callback for interface eth0 192.1.3.93:4500 fd 334 | libevent_free: release ptr-libevent@0x557d4691e5f0 | free_event_entry: release EVENT_NULL-pe@0x557d4691e5b0 | add_fd_read_event_handler: new ethX-pe@0x557d4691e5b0 | libevent_malloc: new ptr-libevent@0x557d4691e5f0 size 128 | setup callback for interface eth0 192.1.3.93:500 fd 333 | libevent_free: release ptr-libevent@0x557d4691e6e0 | free_event_entry: release EVENT_NULL-pe@0x557d4691e6a0 | add_fd_read_event_handler: new ethX-pe@0x557d4691e6a0 | libevent_malloc: new ptr-libevent@0x557d4691e6e0 size 128 | setup callback for interface eth0 192.1.3.94:4500 fd 332 | libevent_free: release ptr-libevent@0x557d4691e7d0 | free_event_entry: release EVENT_NULL-pe@0x557d4691e790 | add_fd_read_event_handler: new ethX-pe@0x557d4691e790 | libevent_malloc: new ptr-libevent@0x557d4691e7d0 size 128 | setup callback for interface eth0 192.1.3.94:500 fd 331 | libevent_free: release ptr-libevent@0x557d4691e8c0 | free_event_entry: release EVENT_NULL-pe@0x557d4691e880 | add_fd_read_event_handler: new ethX-pe@0x557d4691e880 | libevent_malloc: new ptr-libevent@0x557d4691e8c0 size 128 | setup callback for interface eth0 192.1.3.95:4500 fd 330 | libevent_free: release ptr-libevent@0x557d4691e9b0 | free_event_entry: release EVENT_NULL-pe@0x557d4691e970 | add_fd_read_event_handler: new ethX-pe@0x557d4691e970 | libevent_malloc: new ptr-libevent@0x557d4691e9b0 size 128 | setup callback for interface eth0 192.1.3.95:500 fd 329 | libevent_free: release ptr-libevent@0x557d4691eaa0 | free_event_entry: release EVENT_NULL-pe@0x557d4691ea60 | add_fd_read_event_handler: new ethX-pe@0x557d4691ea60 | libevent_malloc: new ptr-libevent@0x557d4691eaa0 size 128 | setup callback for interface eth0 192.1.3.96:4500 fd 328 | libevent_free: release ptr-libevent@0x557d4691eb90 | free_event_entry: release EVENT_NULL-pe@0x557d4691eb50 | add_fd_read_event_handler: new ethX-pe@0x557d4691eb50 | libevent_malloc: new ptr-libevent@0x557d4691eb90 size 128 | setup callback for interface eth0 192.1.3.96:500 fd 327 | libevent_free: release ptr-libevent@0x557d4691ec80 | free_event_entry: release EVENT_NULL-pe@0x557d4691ec40 | add_fd_read_event_handler: new ethX-pe@0x557d4691ec40 | libevent_malloc: new ptr-libevent@0x557d4691ec80 size 128 | setup callback for interface eth0 192.1.3.97:4500 fd 326 | libevent_free: release ptr-libevent@0x557d4691ed70 | free_event_entry: release EVENT_NULL-pe@0x557d4691ed30 | add_fd_read_event_handler: new ethX-pe@0x557d4691ed30 | libevent_malloc: new ptr-libevent@0x557d4691ed70 size 128 | setup callback for interface eth0 192.1.3.97:500 fd 325 | libevent_free: release ptr-libevent@0x557d4691ee60 | free_event_entry: release EVENT_NULL-pe@0x557d4691ee20 | add_fd_read_event_handler: new ethX-pe@0x557d4691ee20 | libevent_malloc: new ptr-libevent@0x557d4691ee60 size 128 | setup callback for interface eth0 192.1.3.98:4500 fd 324 | libevent_free: release ptr-libevent@0x557d4691ef50 | free_event_entry: release EVENT_NULL-pe@0x557d4691ef10 | add_fd_read_event_handler: new ethX-pe@0x557d4691ef10 | libevent_malloc: new ptr-libevent@0x557d4691ef50 size 128 | setup callback for interface eth0 192.1.3.98:500 fd 323 | libevent_free: release ptr-libevent@0x557d4691f040 | free_event_entry: release EVENT_NULL-pe@0x557d4691f000 | add_fd_read_event_handler: new ethX-pe@0x557d4691f000 | libevent_malloc: new ptr-libevent@0x557d4691f040 size 128 | setup callback for interface eth0 192.1.3.99:4500 fd 322 | libevent_free: release ptr-libevent@0x557d4691f130 | free_event_entry: release EVENT_NULL-pe@0x557d4691f0f0 | add_fd_read_event_handler: new ethX-pe@0x557d4691f0f0 | libevent_malloc: new ptr-libevent@0x557d4691f130 size 128 | setup callback for interface eth0 192.1.3.99:500 fd 321 | libevent_free: release ptr-libevent@0x557d4691f220 | free_event_entry: release EVENT_NULL-pe@0x557d4691f1e0 | add_fd_read_event_handler: new ethX-pe@0x557d4691f1e0 | libevent_malloc: new ptr-libevent@0x557d4691f220 size 128 | setup callback for interface eth0 192.1.3.100:4500 fd 320 | libevent_free: release ptr-libevent@0x557d4691f310 | free_event_entry: release EVENT_NULL-pe@0x557d4691f2d0 | add_fd_read_event_handler: new ethX-pe@0x557d4691f2d0 | libevent_malloc: new ptr-libevent@0x557d4691f310 size 128 | setup callback for interface eth0 192.1.3.100:500 fd 319 | libevent_free: release ptr-libevent@0x557d4691f400 | free_event_entry: release EVENT_NULL-pe@0x557d4691f3c0 | add_fd_read_event_handler: new ethX-pe@0x557d4691f3c0 | libevent_malloc: new ptr-libevent@0x557d4691f400 size 128 | setup callback for interface eth0 192.1.3.101:4500 fd 318 | libevent_free: release ptr-libevent@0x557d4691f4f0 | free_event_entry: release EVENT_NULL-pe@0x557d4691f4b0 | add_fd_read_event_handler: new ethX-pe@0x557d4691f4b0 | libevent_malloc: new ptr-libevent@0x557d4691f4f0 size 128 | setup callback for interface eth0 192.1.3.101:500 fd 317 | libevent_free: release ptr-libevent@0x557d4691f5e0 | free_event_entry: release EVENT_NULL-pe@0x557d4691f5a0 | add_fd_read_event_handler: new ethX-pe@0x557d4691f5a0 | libevent_malloc: new ptr-libevent@0x557d4691f5e0 size 128 | setup callback for interface eth0 192.1.3.102:4500 fd 316 | libevent_free: release ptr-libevent@0x557d4691f6d0 | free_event_entry: release EVENT_NULL-pe@0x557d4691f690 | add_fd_read_event_handler: new ethX-pe@0x557d4691f690 | libevent_malloc: new ptr-libevent@0x557d4691f6d0 size 128 | setup callback for interface eth0 192.1.3.102:500 fd 315 | libevent_free: release ptr-libevent@0x557d4691f7c0 | free_event_entry: release EVENT_NULL-pe@0x557d4691f780 | add_fd_read_event_handler: new ethX-pe@0x557d4691f780 | libevent_malloc: new ptr-libevent@0x557d4691f7c0 size 128 | setup callback for interface eth0 192.1.3.103:4500 fd 314 | libevent_free: release ptr-libevent@0x557d4691f8b0 | free_event_entry: release EVENT_NULL-pe@0x557d4691f870 | add_fd_read_event_handler: new ethX-pe@0x557d4691f870 | libevent_malloc: new ptr-libevent@0x557d4691f8b0 size 128 | setup callback for interface eth0 192.1.3.103:500 fd 313 | libevent_free: release ptr-libevent@0x557d4691f9a0 | free_event_entry: release EVENT_NULL-pe@0x557d4691f960 | add_fd_read_event_handler: new ethX-pe@0x557d4691f960 | libevent_malloc: new ptr-libevent@0x557d4691f9a0 size 128 | setup callback for interface eth0 192.1.3.104:4500 fd 312 | libevent_free: release ptr-libevent@0x557d4691fa90 | free_event_entry: release EVENT_NULL-pe@0x557d4691fa50 | add_fd_read_event_handler: new ethX-pe@0x557d4691fa50 | libevent_malloc: new ptr-libevent@0x557d4691fa90 size 128 | setup callback for interface eth0 192.1.3.104:500 fd 311 | libevent_free: release ptr-libevent@0x557d4691fb80 | free_event_entry: release EVENT_NULL-pe@0x557d4691fb40 | add_fd_read_event_handler: new ethX-pe@0x557d4691fb40 | libevent_malloc: new ptr-libevent@0x557d4691fb80 size 128 | setup callback for interface eth0 192.1.3.105:4500 fd 310 | libevent_free: release ptr-libevent@0x557d4691fc70 | free_event_entry: release EVENT_NULL-pe@0x557d4691fc30 | add_fd_read_event_handler: new ethX-pe@0x557d4691fc30 | libevent_malloc: new ptr-libevent@0x557d4691fc70 size 128 | setup callback for interface eth0 192.1.3.105:500 fd 309 | libevent_free: release ptr-libevent@0x557d4691fd60 | free_event_entry: release EVENT_NULL-pe@0x557d4691fd20 | add_fd_read_event_handler: new ethX-pe@0x557d4691fd20 | libevent_malloc: new ptr-libevent@0x557d4691fd60 size 128 | setup callback for interface eth0 192.1.3.106:4500 fd 308 | libevent_free: release ptr-libevent@0x557d4691fe50 | free_event_entry: release EVENT_NULL-pe@0x557d4691fe10 | add_fd_read_event_handler: new ethX-pe@0x557d4691fe10 | libevent_malloc: new ptr-libevent@0x557d4691fe50 size 128 | setup callback for interface eth0 192.1.3.106:500 fd 307 | libevent_free: release ptr-libevent@0x557d4691ff40 | free_event_entry: release EVENT_NULL-pe@0x557d4691ff00 | add_fd_read_event_handler: new ethX-pe@0x557d4691ff00 | libevent_malloc: new ptr-libevent@0x557d4691ff40 size 128 | setup callback for interface eth0 192.1.3.107:4500 fd 306 | libevent_free: release ptr-libevent@0x557d46920030 | free_event_entry: release EVENT_NULL-pe@0x557d4691fff0 | add_fd_read_event_handler: new ethX-pe@0x557d4691fff0 | libevent_malloc: new ptr-libevent@0x557d46920030 size 128 | setup callback for interface eth0 192.1.3.107:500 fd 305 | libevent_free: release ptr-libevent@0x557d46920120 | free_event_entry: release EVENT_NULL-pe@0x557d469200e0 | add_fd_read_event_handler: new ethX-pe@0x557d469200e0 | libevent_malloc: new ptr-libevent@0x557d46920120 size 128 | setup callback for interface eth0 192.1.3.108:4500 fd 304 | libevent_free: release ptr-libevent@0x557d46920210 | free_event_entry: release EVENT_NULL-pe@0x557d469201d0 | add_fd_read_event_handler: new ethX-pe@0x557d469201d0 | libevent_malloc: new ptr-libevent@0x557d46920210 size 128 | setup callback for interface eth0 192.1.3.108:500 fd 303 | libevent_free: release ptr-libevent@0x557d46920300 | free_event_entry: release EVENT_NULL-pe@0x557d469202c0 | add_fd_read_event_handler: new ethX-pe@0x557d469202c0 | libevent_malloc: new ptr-libevent@0x557d46920300 size 128 | setup callback for interface eth0 192.1.3.109:4500 fd 302 | libevent_free: release ptr-libevent@0x557d469203f0 | free_event_entry: release EVENT_NULL-pe@0x557d469203b0 | add_fd_read_event_handler: new ethX-pe@0x557d469203b0 | libevent_malloc: new ptr-libevent@0x557d469203f0 size 128 | setup callback for interface eth0 192.1.3.109:500 fd 301 | libevent_free: release ptr-libevent@0x557d469204e0 | free_event_entry: release EVENT_NULL-pe@0x557d469204a0 | add_fd_read_event_handler: new ethX-pe@0x557d469204a0 | libevent_malloc: new ptr-libevent@0x557d469204e0 size 128 | setup callback for interface eth0 192.1.3.110:4500 fd 300 | libevent_free: release ptr-libevent@0x557d469205d0 | free_event_entry: release EVENT_NULL-pe@0x557d46920590 | add_fd_read_event_handler: new ethX-pe@0x557d46920590 | libevent_malloc: new ptr-libevent@0x557d469205d0 size 128 | setup callback for interface eth0 192.1.3.110:500 fd 299 | libevent_free: release ptr-libevent@0x557d469206c0 | free_event_entry: release EVENT_NULL-pe@0x557d46920680 | add_fd_read_event_handler: new ethX-pe@0x557d46920680 | libevent_malloc: new ptr-libevent@0x557d469206c0 size 128 | setup callback for interface eth0 192.1.3.111:4500 fd 298 | libevent_free: release ptr-libevent@0x557d469207b0 | free_event_entry: release EVENT_NULL-pe@0x557d46920770 | add_fd_read_event_handler: new ethX-pe@0x557d46920770 | libevent_malloc: new ptr-libevent@0x557d469207b0 size 128 | setup callback for interface eth0 192.1.3.111:500 fd 297 | libevent_free: release ptr-libevent@0x557d469208a0 | free_event_entry: release EVENT_NULL-pe@0x557d46920860 | add_fd_read_event_handler: new ethX-pe@0x557d46920860 | libevent_malloc: new ptr-libevent@0x557d469208a0 size 128 | setup callback for interface eth0 192.1.3.112:4500 fd 296 | libevent_free: release ptr-libevent@0x557d46920990 | free_event_entry: release EVENT_NULL-pe@0x557d46920950 | add_fd_read_event_handler: new ethX-pe@0x557d46920950 | libevent_malloc: new ptr-libevent@0x557d46920990 size 128 | setup callback for interface eth0 192.1.3.112:500 fd 295 | libevent_free: release ptr-libevent@0x557d46920a80 | free_event_entry: release EVENT_NULL-pe@0x557d46920a40 | add_fd_read_event_handler: new ethX-pe@0x557d46920a40 | libevent_malloc: new ptr-libevent@0x557d46920a80 size 128 | setup callback for interface eth0 192.1.3.113:4500 fd 294 | libevent_free: release ptr-libevent@0x557d46920b70 | free_event_entry: release EVENT_NULL-pe@0x557d46920b30 | add_fd_read_event_handler: new ethX-pe@0x557d46920b30 | libevent_malloc: new ptr-libevent@0x557d46920b70 size 128 | setup callback for interface eth0 192.1.3.113:500 fd 293 | libevent_free: release ptr-libevent@0x557d46920c60 | free_event_entry: release EVENT_NULL-pe@0x557d46920c20 | add_fd_read_event_handler: new ethX-pe@0x557d46920c20 | libevent_malloc: new ptr-libevent@0x557d46920c60 size 128 | setup callback for interface eth0 192.1.3.114:4500 fd 292 | libevent_free: release ptr-libevent@0x557d46920d50 | free_event_entry: release EVENT_NULL-pe@0x557d46920d10 | add_fd_read_event_handler: new ethX-pe@0x557d46920d10 | libevent_malloc: new ptr-libevent@0x557d46920d50 size 128 | setup callback for interface eth0 192.1.3.114:500 fd 291 | libevent_free: release ptr-libevent@0x557d46920e40 | free_event_entry: release EVENT_NULL-pe@0x557d46920e00 | add_fd_read_event_handler: new ethX-pe@0x557d46920e00 | libevent_malloc: new ptr-libevent@0x557d46920e40 size 128 | setup callback for interface eth0 192.1.3.115:4500 fd 290 | libevent_free: release ptr-libevent@0x557d46920f30 | free_event_entry: release EVENT_NULL-pe@0x557d46920ef0 | add_fd_read_event_handler: new ethX-pe@0x557d46920ef0 | libevent_malloc: new ptr-libevent@0x557d46920f30 size 128 | setup callback for interface eth0 192.1.3.115:500 fd 289 | libevent_free: release ptr-libevent@0x557d46921020 | free_event_entry: release EVENT_NULL-pe@0x557d46920fe0 | add_fd_read_event_handler: new ethX-pe@0x557d46920fe0 | libevent_malloc: new ptr-libevent@0x557d46921020 size 128 | setup callback for interface eth0 192.1.3.116:4500 fd 288 | libevent_free: release ptr-libevent@0x557d46921110 | free_event_entry: release EVENT_NULL-pe@0x557d469210d0 | add_fd_read_event_handler: new ethX-pe@0x557d469210d0 | libevent_malloc: new ptr-libevent@0x557d46921110 size 128 | setup callback for interface eth0 192.1.3.116:500 fd 287 | libevent_free: release ptr-libevent@0x557d46921200 | free_event_entry: release EVENT_NULL-pe@0x557d469211c0 | add_fd_read_event_handler: new ethX-pe@0x557d469211c0 | libevent_malloc: new ptr-libevent@0x557d46921200 size 128 | setup callback for interface eth0 192.1.3.117:4500 fd 286 | libevent_free: release ptr-libevent@0x557d469212f0 | free_event_entry: release EVENT_NULL-pe@0x557d469212b0 | add_fd_read_event_handler: new ethX-pe@0x557d469212b0 | libevent_malloc: new ptr-libevent@0x557d469212f0 size 128 | setup callback for interface eth0 192.1.3.117:500 fd 285 | libevent_free: release ptr-libevent@0x557d469213e0 | free_event_entry: release EVENT_NULL-pe@0x557d469213a0 | add_fd_read_event_handler: new ethX-pe@0x557d469213a0 | libevent_malloc: new ptr-libevent@0x557d469213e0 size 128 | setup callback for interface eth0 192.1.3.118:4500 fd 284 | libevent_free: release ptr-libevent@0x557d469214d0 | free_event_entry: release EVENT_NULL-pe@0x557d46921490 | add_fd_read_event_handler: new ethX-pe@0x557d46921490 | libevent_malloc: new ptr-libevent@0x557d469214d0 size 128 | setup callback for interface eth0 192.1.3.118:500 fd 283 | libevent_free: release ptr-libevent@0x557d469215c0 | free_event_entry: release EVENT_NULL-pe@0x557d46921580 | add_fd_read_event_handler: new ethX-pe@0x557d46921580 | libevent_malloc: new ptr-libevent@0x557d469215c0 size 128 | setup callback for interface eth0 192.1.3.119:4500 fd 282 | libevent_free: release ptr-libevent@0x557d469216b0 | free_event_entry: release EVENT_NULL-pe@0x557d46921670 | add_fd_read_event_handler: new ethX-pe@0x557d46921670 | libevent_malloc: new ptr-libevent@0x557d469216b0 size 128 | setup callback for interface eth0 192.1.3.119:500 fd 281 | libevent_free: release ptr-libevent@0x557d469217a0 | free_event_entry: release EVENT_NULL-pe@0x557d46921760 | add_fd_read_event_handler: new ethX-pe@0x557d46921760 | libevent_malloc: new ptr-libevent@0x557d469217a0 size 128 | setup callback for interface eth0 192.1.3.120:4500 fd 280 | libevent_free: release ptr-libevent@0x557d46921890 | free_event_entry: release EVENT_NULL-pe@0x557d46921850 | add_fd_read_event_handler: new ethX-pe@0x557d46921850 | libevent_malloc: new ptr-libevent@0x557d46921890 size 128 | setup callback for interface eth0 192.1.3.120:500 fd 279 | libevent_free: release ptr-libevent@0x557d46921980 | free_event_entry: release EVENT_NULL-pe@0x557d46921940 | add_fd_read_event_handler: new ethX-pe@0x557d46921940 | libevent_malloc: new ptr-libevent@0x557d46921980 size 128 | setup callback for interface eth0 192.1.3.121:4500 fd 278 | libevent_free: release ptr-libevent@0x557d46921a70 | free_event_entry: release EVENT_NULL-pe@0x557d46921a30 | add_fd_read_event_handler: new ethX-pe@0x557d46921a30 | libevent_malloc: new ptr-libevent@0x557d46921a70 size 128 | setup callback for interface eth0 192.1.3.121:500 fd 277 | libevent_free: release ptr-libevent@0x557d46921b60 | free_event_entry: release EVENT_NULL-pe@0x557d46921b20 | add_fd_read_event_handler: new ethX-pe@0x557d46921b20 | libevent_malloc: new ptr-libevent@0x557d46921b60 size 128 | setup callback for interface eth0 192.1.3.122:4500 fd 276 | libevent_free: release ptr-libevent@0x557d46921c50 | free_event_entry: release EVENT_NULL-pe@0x557d46921c10 | add_fd_read_event_handler: new ethX-pe@0x557d46921c10 | libevent_malloc: new ptr-libevent@0x557d46921c50 size 128 | setup callback for interface eth0 192.1.3.122:500 fd 275 | libevent_free: release ptr-libevent@0x557d46921d40 | free_event_entry: release EVENT_NULL-pe@0x557d46921d00 | add_fd_read_event_handler: new ethX-pe@0x557d46921d00 | libevent_malloc: new ptr-libevent@0x557d46921d40 size 128 | setup callback for interface eth0 192.1.3.123:4500 fd 274 | libevent_free: release ptr-libevent@0x557d46921e30 | free_event_entry: release EVENT_NULL-pe@0x557d46921df0 | add_fd_read_event_handler: new ethX-pe@0x557d46921df0 | libevent_malloc: new ptr-libevent@0x557d46921e30 size 128 | setup callback for interface eth0 192.1.3.123:500 fd 273 | libevent_free: release ptr-libevent@0x557d46921f20 | free_event_entry: release EVENT_NULL-pe@0x557d46921ee0 | add_fd_read_event_handler: new ethX-pe@0x557d46921ee0 | libevent_malloc: new ptr-libevent@0x557d46921f20 size 128 | setup callback for interface eth0 192.1.3.124:4500 fd 272 | libevent_free: release ptr-libevent@0x557d46922010 | free_event_entry: release EVENT_NULL-pe@0x557d46921fd0 | add_fd_read_event_handler: new ethX-pe@0x557d46921fd0 | libevent_malloc: new ptr-libevent@0x557d46922010 size 128 | setup callback for interface eth0 192.1.3.124:500 fd 271 | libevent_free: release ptr-libevent@0x557d46922100 | free_event_entry: release EVENT_NULL-pe@0x557d469220c0 | add_fd_read_event_handler: new ethX-pe@0x557d469220c0 | libevent_malloc: new ptr-libevent@0x557d46922100 size 128 | setup callback for interface eth0 192.1.3.125:4500 fd 270 | libevent_free: release ptr-libevent@0x557d469221f0 | free_event_entry: release EVENT_NULL-pe@0x557d469221b0 | add_fd_read_event_handler: new ethX-pe@0x557d469221b0 | libevent_malloc: new ptr-libevent@0x557d469221f0 size 128 | setup callback for interface eth0 192.1.3.125:500 fd 269 | libevent_free: release ptr-libevent@0x557d469222e0 | free_event_entry: release EVENT_NULL-pe@0x557d469222a0 | add_fd_read_event_handler: new ethX-pe@0x557d469222a0 | libevent_malloc: new ptr-libevent@0x557d469222e0 size 128 | setup callback for interface eth0 192.1.3.126:4500 fd 268 | libevent_free: release ptr-libevent@0x557d469223d0 | free_event_entry: release EVENT_NULL-pe@0x557d46922390 | add_fd_read_event_handler: new ethX-pe@0x557d46922390 | libevent_malloc: new ptr-libevent@0x557d469223d0 size 128 | setup callback for interface eth0 192.1.3.126:500 fd 267 | libevent_free: release ptr-libevent@0x557d469224c0 | free_event_entry: release EVENT_NULL-pe@0x557d46922480 | add_fd_read_event_handler: new ethX-pe@0x557d46922480 | libevent_malloc: new ptr-libevent@0x557d469224c0 size 128 | setup callback for interface eth0 192.1.3.127:4500 fd 266 | libevent_free: release ptr-libevent@0x557d469225b0 | free_event_entry: release EVENT_NULL-pe@0x557d46922570 | add_fd_read_event_handler: new ethX-pe@0x557d46922570 | libevent_malloc: new ptr-libevent@0x557d469225b0 size 128 | setup callback for interface eth0 192.1.3.127:500 fd 265 | libevent_free: release ptr-libevent@0x557d469226a0 | free_event_entry: release EVENT_NULL-pe@0x557d46922660 | add_fd_read_event_handler: new ethX-pe@0x557d46922660 | libevent_malloc: new ptr-libevent@0x557d469226a0 size 128 | setup callback for interface eth0 192.1.3.128:4500 fd 264 | libevent_free: release ptr-libevent@0x557d46922790 | free_event_entry: release EVENT_NULL-pe@0x557d46922750 | add_fd_read_event_handler: new ethX-pe@0x557d46922750 | libevent_malloc: new ptr-libevent@0x557d46922790 size 128 | setup callback for interface eth0 192.1.3.128:500 fd 263 | libevent_free: release ptr-libevent@0x557d46922880 | free_event_entry: release EVENT_NULL-pe@0x557d46922840 | add_fd_read_event_handler: new ethX-pe@0x557d46922840 | libevent_malloc: new ptr-libevent@0x557d46922880 size 128 | setup callback for interface eth0 192.1.3.129:4500 fd 262 | libevent_free: release ptr-libevent@0x557d46922970 | free_event_entry: release EVENT_NULL-pe@0x557d46922930 | add_fd_read_event_handler: new ethX-pe@0x557d46922930 | libevent_malloc: new ptr-libevent@0x557d46922970 size 128 | setup callback for interface eth0 192.1.3.129:500 fd 261 | libevent_free: release ptr-libevent@0x557d46922a60 | free_event_entry: release EVENT_NULL-pe@0x557d46922a20 | add_fd_read_event_handler: new ethX-pe@0x557d46922a20 | libevent_malloc: new ptr-libevent@0x557d46922a60 size 128 | setup callback for interface eth0 192.1.3.130:4500 fd 260 | libevent_free: release ptr-libevent@0x557d46922b50 | free_event_entry: release EVENT_NULL-pe@0x557d46922b10 | add_fd_read_event_handler: new ethX-pe@0x557d46922b10 | libevent_malloc: new ptr-libevent@0x557d46922b50 size 128 | setup callback for interface eth0 192.1.3.130:500 fd 259 | libevent_free: release ptr-libevent@0x557d46922c40 | free_event_entry: release EVENT_NULL-pe@0x557d46922c00 | add_fd_read_event_handler: new ethX-pe@0x557d46922c00 | libevent_malloc: new ptr-libevent@0x557d46922c40 size 128 | setup callback for interface eth0 192.1.3.131:4500 fd 258 | libevent_free: release ptr-libevent@0x557d46922d30 | free_event_entry: release EVENT_NULL-pe@0x557d46922cf0 | add_fd_read_event_handler: new ethX-pe@0x557d46922cf0 | libevent_malloc: new ptr-libevent@0x557d46922d30 size 128 | setup callback for interface eth0 192.1.3.131:500 fd 257 | libevent_free: release ptr-libevent@0x557d46922e20 | free_event_entry: release EVENT_NULL-pe@0x557d46922de0 | add_fd_read_event_handler: new ethX-pe@0x557d46922de0 | libevent_malloc: new ptr-libevent@0x557d46922e20 size 128 | setup callback for interface eth0 192.1.3.132:4500 fd 256 | libevent_free: release ptr-libevent@0x557d46922f10 | free_event_entry: release EVENT_NULL-pe@0x557d46922ed0 | add_fd_read_event_handler: new ethX-pe@0x557d46922ed0 | libevent_malloc: new ptr-libevent@0x557d46922f10 size 128 | setup callback for interface eth0 192.1.3.132:500 fd 255 | libevent_free: release ptr-libevent@0x557d46923000 | free_event_entry: release EVENT_NULL-pe@0x557d46922fc0 | add_fd_read_event_handler: new ethX-pe@0x557d46922fc0 | libevent_malloc: new ptr-libevent@0x557d46923000 size 128 | setup callback for interface eth0 192.1.3.133:4500 fd 254 | libevent_free: release ptr-libevent@0x557d469230f0 | free_event_entry: release EVENT_NULL-pe@0x557d469230b0 | add_fd_read_event_handler: new ethX-pe@0x557d469230b0 | libevent_malloc: new ptr-libevent@0x557d469230f0 size 128 | setup callback for interface eth0 192.1.3.133:500 fd 253 | libevent_free: release ptr-libevent@0x557d469231e0 | free_event_entry: release EVENT_NULL-pe@0x557d469231a0 | add_fd_read_event_handler: new ethX-pe@0x557d469231a0 | libevent_malloc: new ptr-libevent@0x557d469231e0 size 128 | setup callback for interface eth0 192.1.3.134:4500 fd 252 | libevent_free: release ptr-libevent@0x557d469232d0 | free_event_entry: release EVENT_NULL-pe@0x557d46923290 | add_fd_read_event_handler: new ethX-pe@0x557d46923290 | libevent_malloc: new ptr-libevent@0x557d469232d0 size 128 | setup callback for interface eth0 192.1.3.134:500 fd 251 | libevent_free: release ptr-libevent@0x557d469233c0 | free_event_entry: release EVENT_NULL-pe@0x557d46923380 | add_fd_read_event_handler: new ethX-pe@0x557d46923380 | libevent_malloc: new ptr-libevent@0x557d469233c0 size 128 | setup callback for interface eth0 192.1.3.135:4500 fd 250 | libevent_free: release ptr-libevent@0x557d469234b0 | free_event_entry: release EVENT_NULL-pe@0x557d46923470 | add_fd_read_event_handler: new ethX-pe@0x557d46923470 | libevent_malloc: new ptr-libevent@0x557d469234b0 size 128 | setup callback for interface eth0 192.1.3.135:500 fd 249 | libevent_free: release ptr-libevent@0x557d469235a0 | free_event_entry: release EVENT_NULL-pe@0x557d46923560 | add_fd_read_event_handler: new ethX-pe@0x557d46923560 | libevent_malloc: new ptr-libevent@0x557d469235a0 size 128 | setup callback for interface eth0 192.1.3.136:4500 fd 248 | libevent_free: release ptr-libevent@0x557d46923690 | free_event_entry: release EVENT_NULL-pe@0x557d46923650 | add_fd_read_event_handler: new ethX-pe@0x557d46923650 | libevent_malloc: new ptr-libevent@0x557d46923690 size 128 | setup callback for interface eth0 192.1.3.136:500 fd 247 | libevent_free: release ptr-libevent@0x557d46923780 | free_event_entry: release EVENT_NULL-pe@0x557d46923740 | add_fd_read_event_handler: new ethX-pe@0x557d46923740 | libevent_malloc: new ptr-libevent@0x557d46923780 size 128 | setup callback for interface eth0 192.1.3.137:4500 fd 246 | libevent_free: release ptr-libevent@0x557d46923870 | free_event_entry: release EVENT_NULL-pe@0x557d46923830 | add_fd_read_event_handler: new ethX-pe@0x557d46923830 | libevent_malloc: new ptr-libevent@0x557d46923870 size 128 | setup callback for interface eth0 192.1.3.137:500 fd 245 | libevent_free: release ptr-libevent@0x557d46923960 | free_event_entry: release EVENT_NULL-pe@0x557d46923920 | add_fd_read_event_handler: new ethX-pe@0x557d46923920 | libevent_malloc: new ptr-libevent@0x557d46923960 size 128 | setup callback for interface eth0 192.1.3.138:4500 fd 244 | libevent_free: release ptr-libevent@0x557d46923a50 | free_event_entry: release EVENT_NULL-pe@0x557d46923a10 | add_fd_read_event_handler: new ethX-pe@0x557d46923a10 | libevent_malloc: new ptr-libevent@0x557d46923a50 size 128 | setup callback for interface eth0 192.1.3.138:500 fd 243 | libevent_free: release ptr-libevent@0x557d46923b40 | free_event_entry: release EVENT_NULL-pe@0x557d46923b00 | add_fd_read_event_handler: new ethX-pe@0x557d46923b00 | libevent_malloc: new ptr-libevent@0x557d46923b40 size 128 | setup callback for interface eth0 192.1.3.139:4500 fd 242 | libevent_free: release ptr-libevent@0x557d46923c30 | free_event_entry: release EVENT_NULL-pe@0x557d46923bf0 | add_fd_read_event_handler: new ethX-pe@0x557d46923bf0 | libevent_malloc: new ptr-libevent@0x557d46923c30 size 128 | setup callback for interface eth0 192.1.3.139:500 fd 241 | libevent_free: release ptr-libevent@0x557d46923d20 | free_event_entry: release EVENT_NULL-pe@0x557d46923ce0 | add_fd_read_event_handler: new ethX-pe@0x557d46923ce0 | libevent_malloc: new ptr-libevent@0x557d46923d20 size 128 | setup callback for interface eth0 192.1.3.140:4500 fd 240 | libevent_free: release ptr-libevent@0x557d46923e10 | free_event_entry: release EVENT_NULL-pe@0x557d46923dd0 | add_fd_read_event_handler: new ethX-pe@0x557d46923dd0 | libevent_malloc: new ptr-libevent@0x557d46923e10 size 128 | setup callback for interface eth0 192.1.3.140:500 fd 239 | libevent_free: release ptr-libevent@0x557d46923f00 | free_event_entry: release EVENT_NULL-pe@0x557d46923ec0 | add_fd_read_event_handler: new ethX-pe@0x557d46923ec0 | libevent_malloc: new ptr-libevent@0x557d46923f00 size 128 | setup callback for interface eth0 192.1.3.141:4500 fd 238 | libevent_free: release ptr-libevent@0x557d46923ff0 | free_event_entry: release EVENT_NULL-pe@0x557d46923fb0 | add_fd_read_event_handler: new ethX-pe@0x557d46923fb0 | libevent_malloc: new ptr-libevent@0x557d46923ff0 size 128 | setup callback for interface eth0 192.1.3.141:500 fd 237 | libevent_free: release ptr-libevent@0x557d469240e0 | free_event_entry: release EVENT_NULL-pe@0x557d469240a0 | add_fd_read_event_handler: new ethX-pe@0x557d469240a0 | libevent_malloc: new ptr-libevent@0x557d469240e0 size 128 | setup callback for interface eth0 192.1.3.142:4500 fd 236 | libevent_free: release ptr-libevent@0x557d469241d0 | free_event_entry: release EVENT_NULL-pe@0x557d46924190 | add_fd_read_event_handler: new ethX-pe@0x557d46924190 | libevent_malloc: new ptr-libevent@0x557d469241d0 size 128 | setup callback for interface eth0 192.1.3.142:500 fd 235 | libevent_free: release ptr-libevent@0x557d469242c0 | free_event_entry: release EVENT_NULL-pe@0x557d46924280 | add_fd_read_event_handler: new ethX-pe@0x557d46924280 | libevent_malloc: new ptr-libevent@0x557d469242c0 size 128 | setup callback for interface eth0 192.1.3.143:4500 fd 234 | libevent_free: release ptr-libevent@0x557d469243b0 | free_event_entry: release EVENT_NULL-pe@0x557d46924370 | add_fd_read_event_handler: new ethX-pe@0x557d46924370 | libevent_malloc: new ptr-libevent@0x557d469243b0 size 128 | setup callback for interface eth0 192.1.3.143:500 fd 233 | libevent_free: release ptr-libevent@0x557d469244a0 | free_event_entry: release EVENT_NULL-pe@0x557d46924460 | add_fd_read_event_handler: new ethX-pe@0x557d46924460 | libevent_malloc: new ptr-libevent@0x557d469244a0 size 128 | setup callback for interface eth0 192.1.3.144:4500 fd 232 | libevent_free: release ptr-libevent@0x557d46924590 | free_event_entry: release EVENT_NULL-pe@0x557d46924550 | add_fd_read_event_handler: new ethX-pe@0x557d46924550 | libevent_malloc: new ptr-libevent@0x557d46924590 size 128 | setup callback for interface eth0 192.1.3.144:500 fd 231 | libevent_free: release ptr-libevent@0x557d46924680 | free_event_entry: release EVENT_NULL-pe@0x557d46924640 | add_fd_read_event_handler: new ethX-pe@0x557d46924640 | libevent_malloc: new ptr-libevent@0x557d46924680 size 128 | setup callback for interface eth0 192.1.3.145:4500 fd 230 | libevent_free: release ptr-libevent@0x557d46924770 | free_event_entry: release EVENT_NULL-pe@0x557d46924730 | add_fd_read_event_handler: new ethX-pe@0x557d46924730 | libevent_malloc: new ptr-libevent@0x557d46924770 size 128 | setup callback for interface eth0 192.1.3.145:500 fd 229 | libevent_free: release ptr-libevent@0x557d46924860 | free_event_entry: release EVENT_NULL-pe@0x557d46924820 | add_fd_read_event_handler: new ethX-pe@0x557d46924820 | libevent_malloc: new ptr-libevent@0x557d46924860 size 128 | setup callback for interface eth0 192.1.3.146:4500 fd 228 | libevent_free: release ptr-libevent@0x557d46924950 | free_event_entry: release EVENT_NULL-pe@0x557d46924910 | add_fd_read_event_handler: new ethX-pe@0x557d46924910 | libevent_malloc: new ptr-libevent@0x557d46924950 size 128 | setup callback for interface eth0 192.1.3.146:500 fd 227 | libevent_free: release ptr-libevent@0x557d46924a40 | free_event_entry: release EVENT_NULL-pe@0x557d46924a00 | add_fd_read_event_handler: new ethX-pe@0x557d46924a00 | libevent_malloc: new ptr-libevent@0x557d46924a40 size 128 | setup callback for interface eth0 192.1.3.147:4500 fd 226 | libevent_free: release ptr-libevent@0x557d46924b30 | free_event_entry: release EVENT_NULL-pe@0x557d46924af0 | add_fd_read_event_handler: new ethX-pe@0x557d46924af0 | libevent_malloc: new ptr-libevent@0x557d46924b30 size 128 | setup callback for interface eth0 192.1.3.147:500 fd 225 | libevent_free: release ptr-libevent@0x557d46924c20 | free_event_entry: release EVENT_NULL-pe@0x557d46924be0 | add_fd_read_event_handler: new ethX-pe@0x557d46924be0 | libevent_malloc: new ptr-libevent@0x557d46924c20 size 128 | setup callback for interface eth0 192.1.3.148:4500 fd 224 | libevent_free: release ptr-libevent@0x557d46924d10 | free_event_entry: release EVENT_NULL-pe@0x557d46924cd0 | add_fd_read_event_handler: new ethX-pe@0x557d46924cd0 | libevent_malloc: new ptr-libevent@0x557d46924d10 size 128 | setup callback for interface eth0 192.1.3.148:500 fd 223 | libevent_free: release ptr-libevent@0x557d46924e00 | free_event_entry: release EVENT_NULL-pe@0x557d46924dc0 | add_fd_read_event_handler: new ethX-pe@0x557d46924dc0 | libevent_malloc: new ptr-libevent@0x557d46924e00 size 128 | setup callback for interface eth0 192.1.3.149:4500 fd 222 | libevent_free: release ptr-libevent@0x557d46924ef0 | free_event_entry: release EVENT_NULL-pe@0x557d46924eb0 | add_fd_read_event_handler: new ethX-pe@0x557d46924eb0 | libevent_malloc: new ptr-libevent@0x557d46924ef0 size 128 | setup callback for interface eth0 192.1.3.149:500 fd 221 | libevent_free: release ptr-libevent@0x557d46924fe0 | free_event_entry: release EVENT_NULL-pe@0x557d46924fa0 | add_fd_read_event_handler: new ethX-pe@0x557d46924fa0 | libevent_malloc: new ptr-libevent@0x557d46924fe0 size 128 | setup callback for interface eth0 192.1.3.150:4500 fd 220 | libevent_free: release ptr-libevent@0x557d469250d0 | free_event_entry: release EVENT_NULL-pe@0x557d46925090 | add_fd_read_event_handler: new ethX-pe@0x557d46925090 | libevent_malloc: new ptr-libevent@0x557d469250d0 size 128 | setup callback for interface eth0 192.1.3.150:500 fd 219 | libevent_free: release ptr-libevent@0x557d469251c0 | free_event_entry: release EVENT_NULL-pe@0x557d46925180 | add_fd_read_event_handler: new ethX-pe@0x557d46925180 | libevent_malloc: new ptr-libevent@0x557d469251c0 size 128 | setup callback for interface eth0 192.1.3.151:4500 fd 218 | libevent_free: release ptr-libevent@0x557d469252b0 | free_event_entry: release EVENT_NULL-pe@0x557d46925270 | add_fd_read_event_handler: new ethX-pe@0x557d46925270 | libevent_malloc: new ptr-libevent@0x557d469252b0 size 128 | setup callback for interface eth0 192.1.3.151:500 fd 217 | libevent_free: release ptr-libevent@0x557d469253a0 | free_event_entry: release EVENT_NULL-pe@0x557d46925360 | add_fd_read_event_handler: new ethX-pe@0x557d46925360 | libevent_malloc: new ptr-libevent@0x557d469253a0 size 128 | setup callback for interface eth0 192.1.3.152:4500 fd 216 | libevent_free: release ptr-libevent@0x557d46925490 | free_event_entry: release EVENT_NULL-pe@0x557d46925450 | add_fd_read_event_handler: new ethX-pe@0x557d46925450 | libevent_malloc: new ptr-libevent@0x557d46925490 size 128 | setup callback for interface eth0 192.1.3.152:500 fd 215 | libevent_free: release ptr-libevent@0x557d46925580 | free_event_entry: release EVENT_NULL-pe@0x557d46925540 | add_fd_read_event_handler: new ethX-pe@0x557d46925540 | libevent_malloc: new ptr-libevent@0x557d46925580 size 128 | setup callback for interface eth0 192.1.3.153:4500 fd 214 | libevent_free: release ptr-libevent@0x557d46925670 | free_event_entry: release EVENT_NULL-pe@0x557d46925630 | add_fd_read_event_handler: new ethX-pe@0x557d46925630 | libevent_malloc: new ptr-libevent@0x557d46925670 size 128 | setup callback for interface eth0 192.1.3.153:500 fd 213 | libevent_free: release ptr-libevent@0x557d46925760 | free_event_entry: release EVENT_NULL-pe@0x557d46925720 | add_fd_read_event_handler: new ethX-pe@0x557d46925720 | libevent_malloc: new ptr-libevent@0x557d46925760 size 128 | setup callback for interface eth0 192.1.3.154:4500 fd 212 | libevent_free: release ptr-libevent@0x557d46925850 | free_event_entry: release EVENT_NULL-pe@0x557d46925810 | add_fd_read_event_handler: new ethX-pe@0x557d46925810 | libevent_malloc: new ptr-libevent@0x557d46925850 size 128 | setup callback for interface eth0 192.1.3.154:500 fd 211 | libevent_free: release ptr-libevent@0x557d46925940 | free_event_entry: release EVENT_NULL-pe@0x557d46925900 | add_fd_read_event_handler: new ethX-pe@0x557d46925900 | libevent_malloc: new ptr-libevent@0x557d46925940 size 128 | setup callback for interface eth0 192.1.3.155:4500 fd 210 | libevent_free: release ptr-libevent@0x557d46925a30 | free_event_entry: release EVENT_NULL-pe@0x557d469259f0 | add_fd_read_event_handler: new ethX-pe@0x557d469259f0 | libevent_malloc: new ptr-libevent@0x557d46925a30 size 128 | setup callback for interface eth0 192.1.3.155:500 fd 209 | libevent_free: release ptr-libevent@0x557d46925b20 | free_event_entry: release EVENT_NULL-pe@0x557d46925ae0 | add_fd_read_event_handler: new ethX-pe@0x557d46925ae0 | libevent_malloc: new ptr-libevent@0x557d46925b20 size 128 | setup callback for interface eth0 192.1.3.156:4500 fd 208 | libevent_free: release ptr-libevent@0x557d46925c10 | free_event_entry: release EVENT_NULL-pe@0x557d46925bd0 | add_fd_read_event_handler: new ethX-pe@0x557d46925bd0 | libevent_malloc: new ptr-libevent@0x557d46925c10 size 128 | setup callback for interface eth0 192.1.3.156:500 fd 207 | libevent_free: release ptr-libevent@0x557d46925d00 | free_event_entry: release EVENT_NULL-pe@0x557d46925cc0 | add_fd_read_event_handler: new ethX-pe@0x557d46925cc0 | libevent_malloc: new ptr-libevent@0x557d46925d00 size 128 | setup callback for interface eth0 192.1.3.157:4500 fd 206 | libevent_free: release ptr-libevent@0x557d46925df0 | free_event_entry: release EVENT_NULL-pe@0x557d46925db0 | add_fd_read_event_handler: new ethX-pe@0x557d46925db0 | libevent_malloc: new ptr-libevent@0x557d46925df0 size 128 | setup callback for interface eth0 192.1.3.157:500 fd 205 | libevent_free: release ptr-libevent@0x557d46925ee0 | free_event_entry: release EVENT_NULL-pe@0x557d46925ea0 | add_fd_read_event_handler: new ethX-pe@0x557d46925ea0 | libevent_malloc: new ptr-libevent@0x557d46925ee0 size 128 | setup callback for interface eth0 192.1.3.158:4500 fd 204 | libevent_free: release ptr-libevent@0x557d46925fd0 | free_event_entry: release EVENT_NULL-pe@0x557d46925f90 | add_fd_read_event_handler: new ethX-pe@0x557d46925f90 | libevent_malloc: new ptr-libevent@0x557d46925fd0 size 128 | setup callback for interface eth0 192.1.3.158:500 fd 203 | libevent_free: release ptr-libevent@0x557d469260c0 | free_event_entry: release EVENT_NULL-pe@0x557d46926080 | add_fd_read_event_handler: new ethX-pe@0x557d46926080 | libevent_malloc: new ptr-libevent@0x557d469260c0 size 128 | setup callback for interface eth0 192.1.3.159:4500 fd 202 | libevent_free: release ptr-libevent@0x557d469261b0 | free_event_entry: release EVENT_NULL-pe@0x557d46926170 | add_fd_read_event_handler: new ethX-pe@0x557d46926170 | libevent_malloc: new ptr-libevent@0x557d469261b0 size 128 | setup callback for interface eth0 192.1.3.159:500 fd 201 | libevent_free: release ptr-libevent@0x557d469262a0 | free_event_entry: release EVENT_NULL-pe@0x557d46926260 | add_fd_read_event_handler: new ethX-pe@0x557d46926260 | libevent_malloc: new ptr-libevent@0x557d469262a0 size 128 | setup callback for interface eth0 192.1.3.160:4500 fd 200 | libevent_free: release ptr-libevent@0x557d46926390 | free_event_entry: release EVENT_NULL-pe@0x557d46926350 | add_fd_read_event_handler: new ethX-pe@0x557d46926350 | libevent_malloc: new ptr-libevent@0x557d46926390 size 128 | setup callback for interface eth0 192.1.3.160:500 fd 199 | libevent_free: release ptr-libevent@0x557d46926480 | free_event_entry: release EVENT_NULL-pe@0x557d46926440 | add_fd_read_event_handler: new ethX-pe@0x557d46926440 | libevent_malloc: new ptr-libevent@0x557d46926480 size 128 | setup callback for interface eth0 192.1.3.161:4500 fd 198 | libevent_free: release ptr-libevent@0x557d46926570 | free_event_entry: release EVENT_NULL-pe@0x557d46926530 | add_fd_read_event_handler: new ethX-pe@0x557d46926530 | libevent_malloc: new ptr-libevent@0x557d46926570 size 128 | setup callback for interface eth0 192.1.3.161:500 fd 197 | libevent_free: release ptr-libevent@0x557d46926660 | free_event_entry: release EVENT_NULL-pe@0x557d46926620 | add_fd_read_event_handler: new ethX-pe@0x557d46926620 | libevent_malloc: new ptr-libevent@0x557d46926660 size 128 | setup callback for interface eth0 192.1.3.162:4500 fd 196 | libevent_free: release ptr-libevent@0x557d46926750 | free_event_entry: release EVENT_NULL-pe@0x557d46926710 | add_fd_read_event_handler: new ethX-pe@0x557d46926710 | libevent_malloc: new ptr-libevent@0x557d46926750 size 128 | setup callback for interface eth0 192.1.3.162:500 fd 195 | libevent_free: release ptr-libevent@0x557d46926840 | free_event_entry: release EVENT_NULL-pe@0x557d46926800 | add_fd_read_event_handler: new ethX-pe@0x557d46926800 | libevent_malloc: new ptr-libevent@0x557d46926840 size 128 | setup callback for interface eth0 192.1.3.163:4500 fd 194 | libevent_free: release ptr-libevent@0x557d46926930 | free_event_entry: release EVENT_NULL-pe@0x557d469268f0 | add_fd_read_event_handler: new ethX-pe@0x557d469268f0 | libevent_malloc: new ptr-libevent@0x557d46926930 size 128 | setup callback for interface eth0 192.1.3.163:500 fd 193 | libevent_free: release ptr-libevent@0x557d46926a20 | free_event_entry: release EVENT_NULL-pe@0x557d469269e0 | add_fd_read_event_handler: new ethX-pe@0x557d469269e0 | libevent_malloc: new ptr-libevent@0x557d46926a20 size 128 | setup callback for interface eth0 192.1.3.164:4500 fd 192 | libevent_free: release ptr-libevent@0x557d46926b10 | free_event_entry: release EVENT_NULL-pe@0x557d46926ad0 | add_fd_read_event_handler: new ethX-pe@0x557d46926ad0 | libevent_malloc: new ptr-libevent@0x557d46926b10 size 128 | setup callback for interface eth0 192.1.3.164:500 fd 191 | libevent_free: release ptr-libevent@0x557d46926c00 | free_event_entry: release EVENT_NULL-pe@0x557d46926bc0 | add_fd_read_event_handler: new ethX-pe@0x557d46926bc0 | libevent_malloc: new ptr-libevent@0x557d46926c00 size 128 | setup callback for interface eth0 192.1.3.165:4500 fd 190 | libevent_free: release ptr-libevent@0x557d46926cf0 | free_event_entry: release EVENT_NULL-pe@0x557d46926cb0 | add_fd_read_event_handler: new ethX-pe@0x557d46926cb0 | libevent_malloc: new ptr-libevent@0x557d46926cf0 size 128 | setup callback for interface eth0 192.1.3.165:500 fd 189 | libevent_free: release ptr-libevent@0x557d46926de0 | free_event_entry: release EVENT_NULL-pe@0x557d46926da0 | add_fd_read_event_handler: new ethX-pe@0x557d46926da0 | libevent_malloc: new ptr-libevent@0x557d46926de0 size 128 | setup callback for interface eth0 192.1.3.166:4500 fd 188 | libevent_free: release ptr-libevent@0x557d46926ed0 | free_event_entry: release EVENT_NULL-pe@0x557d46926e90 | add_fd_read_event_handler: new ethX-pe@0x557d46926e90 | libevent_malloc: new ptr-libevent@0x557d46926ed0 size 128 | setup callback for interface eth0 192.1.3.166:500 fd 187 | libevent_free: release ptr-libevent@0x557d46926fc0 | free_event_entry: release EVENT_NULL-pe@0x557d46926f80 | add_fd_read_event_handler: new ethX-pe@0x557d46926f80 | libevent_malloc: new ptr-libevent@0x557d46926fc0 size 128 | setup callback for interface eth0 192.1.3.167:4500 fd 186 | libevent_free: release ptr-libevent@0x557d469270b0 | free_event_entry: release EVENT_NULL-pe@0x557d46927070 | add_fd_read_event_handler: new ethX-pe@0x557d46927070 | libevent_malloc: new ptr-libevent@0x557d469270b0 size 128 | setup callback for interface eth0 192.1.3.167:500 fd 185 | libevent_free: release ptr-libevent@0x557d469271a0 | free_event_entry: release EVENT_NULL-pe@0x557d46927160 | add_fd_read_event_handler: new ethX-pe@0x557d46927160 | libevent_malloc: new ptr-libevent@0x557d469271a0 size 128 | setup callback for interface eth0 192.1.3.168:4500 fd 184 | libevent_free: release ptr-libevent@0x557d46927290 | free_event_entry: release EVENT_NULL-pe@0x557d46927250 | add_fd_read_event_handler: new ethX-pe@0x557d46927250 | libevent_malloc: new ptr-libevent@0x557d46927290 size 128 | setup callback for interface eth0 192.1.3.168:500 fd 183 | libevent_free: release ptr-libevent@0x557d46927380 | free_event_entry: release EVENT_NULL-pe@0x557d46927340 | add_fd_read_event_handler: new ethX-pe@0x557d46927340 | libevent_malloc: new ptr-libevent@0x557d46927380 size 128 | setup callback for interface eth0 192.1.3.169:4500 fd 182 | libevent_free: release ptr-libevent@0x557d46927470 | free_event_entry: release EVENT_NULL-pe@0x557d46927430 | add_fd_read_event_handler: new ethX-pe@0x557d46927430 | libevent_malloc: new ptr-libevent@0x557d46927470 size 128 | setup callback for interface eth0 192.1.3.169:500 fd 181 | libevent_free: release ptr-libevent@0x557d46927560 | free_event_entry: release EVENT_NULL-pe@0x557d46927520 | add_fd_read_event_handler: new ethX-pe@0x557d46927520 | libevent_malloc: new ptr-libevent@0x557d46927560 size 128 | setup callback for interface eth0 192.1.3.170:4500 fd 180 | libevent_free: release ptr-libevent@0x557d46927650 | free_event_entry: release EVENT_NULL-pe@0x557d46927610 | add_fd_read_event_handler: new ethX-pe@0x557d46927610 | libevent_malloc: new ptr-libevent@0x557d46927650 size 128 | setup callback for interface eth0 192.1.3.170:500 fd 179 | libevent_free: release ptr-libevent@0x557d46927740 | free_event_entry: release EVENT_NULL-pe@0x557d46927700 | add_fd_read_event_handler: new ethX-pe@0x557d46927700 | libevent_malloc: new ptr-libevent@0x557d46927740 size 128 | setup callback for interface eth0 192.1.3.171:4500 fd 178 | libevent_free: release ptr-libevent@0x557d46927830 | free_event_entry: release EVENT_NULL-pe@0x557d469277f0 | add_fd_read_event_handler: new ethX-pe@0x557d469277f0 | libevent_malloc: new ptr-libevent@0x557d46927830 size 128 | setup callback for interface eth0 192.1.3.171:500 fd 177 | libevent_free: release ptr-libevent@0x557d46927920 | free_event_entry: release EVENT_NULL-pe@0x557d469278e0 | add_fd_read_event_handler: new ethX-pe@0x557d469278e0 | libevent_malloc: new ptr-libevent@0x557d46927920 size 128 | setup callback for interface eth0 192.1.3.172:4500 fd 176 | libevent_free: release ptr-libevent@0x557d46927a10 | free_event_entry: release EVENT_NULL-pe@0x557d469279d0 | add_fd_read_event_handler: new ethX-pe@0x557d469279d0 | libevent_malloc: new ptr-libevent@0x557d46927a10 size 128 | setup callback for interface eth0 192.1.3.172:500 fd 175 | libevent_free: release ptr-libevent@0x557d46927b00 | free_event_entry: release EVENT_NULL-pe@0x557d46927ac0 | add_fd_read_event_handler: new ethX-pe@0x557d46927ac0 | libevent_malloc: new ptr-libevent@0x557d46927b00 size 128 | setup callback for interface eth0 192.1.3.173:4500 fd 174 | libevent_free: release ptr-libevent@0x557d46927bf0 | free_event_entry: release EVENT_NULL-pe@0x557d46927bb0 | add_fd_read_event_handler: new ethX-pe@0x557d46927bb0 | libevent_malloc: new ptr-libevent@0x557d46927bf0 size 128 | setup callback for interface eth0 192.1.3.173:500 fd 173 | libevent_free: release ptr-libevent@0x557d46927ce0 | free_event_entry: release EVENT_NULL-pe@0x557d46927ca0 | add_fd_read_event_handler: new ethX-pe@0x557d46927ca0 | libevent_malloc: new ptr-libevent@0x557d46927ce0 size 128 | setup callback for interface eth0 192.1.3.174:4500 fd 172 | libevent_free: release ptr-libevent@0x557d46927dd0 | free_event_entry: release EVENT_NULL-pe@0x557d46927d90 | add_fd_read_event_handler: new ethX-pe@0x557d46927d90 | libevent_malloc: new ptr-libevent@0x557d46927dd0 size 128 | setup callback for interface eth0 192.1.3.174:500 fd 171 | libevent_free: release ptr-libevent@0x557d46927ec0 | free_event_entry: release EVENT_NULL-pe@0x557d46927e80 | add_fd_read_event_handler: new ethX-pe@0x557d46927e80 | libevent_malloc: new ptr-libevent@0x557d46927ec0 size 128 | setup callback for interface eth0 192.1.3.175:4500 fd 170 | libevent_free: release ptr-libevent@0x557d46927fb0 | free_event_entry: release EVENT_NULL-pe@0x557d46927f70 | add_fd_read_event_handler: new ethX-pe@0x557d46927f70 | libevent_malloc: new ptr-libevent@0x557d46927fb0 size 128 | setup callback for interface eth0 192.1.3.175:500 fd 169 | libevent_free: release ptr-libevent@0x557d469280a0 | free_event_entry: release EVENT_NULL-pe@0x557d46928060 | add_fd_read_event_handler: new ethX-pe@0x557d46928060 | libevent_malloc: new ptr-libevent@0x557d469280a0 size 128 | setup callback for interface eth0 192.1.3.176:4500 fd 168 | libevent_free: release ptr-libevent@0x557d46928190 | free_event_entry: release EVENT_NULL-pe@0x557d46928150 | add_fd_read_event_handler: new ethX-pe@0x557d46928150 | libevent_malloc: new ptr-libevent@0x557d46928190 size 128 | setup callback for interface eth0 192.1.3.176:500 fd 167 | libevent_free: release ptr-libevent@0x557d46928280 | free_event_entry: release EVENT_NULL-pe@0x557d46928240 | add_fd_read_event_handler: new ethX-pe@0x557d46928240 | libevent_malloc: new ptr-libevent@0x557d46928280 size 128 | setup callback for interface eth0 192.1.3.177:4500 fd 166 | libevent_free: release ptr-libevent@0x557d46928370 | free_event_entry: release EVENT_NULL-pe@0x557d46928330 | add_fd_read_event_handler: new ethX-pe@0x557d46928330 | libevent_malloc: new ptr-libevent@0x557d46928370 size 128 | setup callback for interface eth0 192.1.3.177:500 fd 165 | libevent_free: release ptr-libevent@0x557d46928460 | free_event_entry: release EVENT_NULL-pe@0x557d46928420 | add_fd_read_event_handler: new ethX-pe@0x557d46928420 | libevent_malloc: new ptr-libevent@0x557d46928460 size 128 | setup callback for interface eth0 192.1.3.178:4500 fd 164 | libevent_free: release ptr-libevent@0x557d46928550 | free_event_entry: release EVENT_NULL-pe@0x557d46928510 | add_fd_read_event_handler: new ethX-pe@0x557d46928510 | libevent_malloc: new ptr-libevent@0x557d46928550 size 128 | setup callback for interface eth0 192.1.3.178:500 fd 163 | libevent_free: release ptr-libevent@0x557d46928640 | free_event_entry: release EVENT_NULL-pe@0x557d46928600 | add_fd_read_event_handler: new ethX-pe@0x557d46928600 | libevent_malloc: new ptr-libevent@0x557d46928640 size 128 | setup callback for interface eth0 192.1.3.179:4500 fd 162 | libevent_free: release ptr-libevent@0x557d46928730 | free_event_entry: release EVENT_NULL-pe@0x557d469286f0 | add_fd_read_event_handler: new ethX-pe@0x557d469286f0 | libevent_malloc: new ptr-libevent@0x557d46928730 size 128 | setup callback for interface eth0 192.1.3.179:500 fd 161 | libevent_free: release ptr-libevent@0x557d46928820 | free_event_entry: release EVENT_NULL-pe@0x557d469287e0 | add_fd_read_event_handler: new ethX-pe@0x557d469287e0 | libevent_malloc: new ptr-libevent@0x557d46928820 size 128 | setup callback for interface eth0 192.1.3.180:4500 fd 160 | libevent_free: release ptr-libevent@0x557d46928910 | free_event_entry: release EVENT_NULL-pe@0x557d469288d0 | add_fd_read_event_handler: new ethX-pe@0x557d469288d0 | libevent_malloc: new ptr-libevent@0x557d46928910 size 128 | setup callback for interface eth0 192.1.3.180:500 fd 159 | libevent_free: release ptr-libevent@0x557d46928a00 | free_event_entry: release EVENT_NULL-pe@0x557d469289c0 | add_fd_read_event_handler: new ethX-pe@0x557d469289c0 | libevent_malloc: new ptr-libevent@0x557d46928a00 size 128 | setup callback for interface eth0 192.1.3.181:4500 fd 158 | libevent_free: release ptr-libevent@0x557d46928af0 | free_event_entry: release EVENT_NULL-pe@0x557d46928ab0 | add_fd_read_event_handler: new ethX-pe@0x557d46928ab0 | libevent_malloc: new ptr-libevent@0x557d46928af0 size 128 | setup callback for interface eth0 192.1.3.181:500 fd 157 | libevent_free: release ptr-libevent@0x557d46928be0 | free_event_entry: release EVENT_NULL-pe@0x557d46928ba0 | add_fd_read_event_handler: new ethX-pe@0x557d46928ba0 | libevent_malloc: new ptr-libevent@0x557d46928be0 size 128 | setup callback for interface eth0 192.1.3.182:4500 fd 156 | libevent_free: release ptr-libevent@0x557d46928cd0 | free_event_entry: release EVENT_NULL-pe@0x557d46928c90 | add_fd_read_event_handler: new ethX-pe@0x557d46928c90 | libevent_malloc: new ptr-libevent@0x557d46928cd0 size 128 | setup callback for interface eth0 192.1.3.182:500 fd 155 | libevent_free: release ptr-libevent@0x557d46928dc0 | free_event_entry: release EVENT_NULL-pe@0x557d46928d80 | add_fd_read_event_handler: new ethX-pe@0x557d46928d80 | libevent_malloc: new ptr-libevent@0x557d46928dc0 size 128 | setup callback for interface eth0 192.1.3.183:4500 fd 154 | libevent_free: release ptr-libevent@0x557d46928eb0 | free_event_entry: release EVENT_NULL-pe@0x557d46928e70 | add_fd_read_event_handler: new ethX-pe@0x557d46928e70 | libevent_malloc: new ptr-libevent@0x557d46928eb0 size 128 | setup callback for interface eth0 192.1.3.183:500 fd 153 | libevent_free: release ptr-libevent@0x557d46928fa0 | free_event_entry: release EVENT_NULL-pe@0x557d46928f60 | add_fd_read_event_handler: new ethX-pe@0x557d46928f60 | libevent_malloc: new ptr-libevent@0x557d46928fa0 size 128 | setup callback for interface eth0 192.1.3.184:4500 fd 152 | libevent_free: release ptr-libevent@0x557d46929090 | free_event_entry: release EVENT_NULL-pe@0x557d46929050 | add_fd_read_event_handler: new ethX-pe@0x557d46929050 | libevent_malloc: new ptr-libevent@0x557d46929090 size 128 | setup callback for interface eth0 192.1.3.184:500 fd 151 | libevent_free: release ptr-libevent@0x557d46929180 | free_event_entry: release EVENT_NULL-pe@0x557d46929140 | add_fd_read_event_handler: new ethX-pe@0x557d46929140 | libevent_malloc: new ptr-libevent@0x557d46929180 size 128 | setup callback for interface eth0 192.1.3.185:4500 fd 150 | libevent_free: release ptr-libevent@0x557d46929270 | free_event_entry: release EVENT_NULL-pe@0x557d46929230 | add_fd_read_event_handler: new ethX-pe@0x557d46929230 | libevent_malloc: new ptr-libevent@0x557d46929270 size 128 | setup callback for interface eth0 192.1.3.185:500 fd 149 | libevent_free: release ptr-libevent@0x557d46929360 | free_event_entry: release EVENT_NULL-pe@0x557d46929320 | add_fd_read_event_handler: new ethX-pe@0x557d46929320 | libevent_malloc: new ptr-libevent@0x557d46929360 size 128 | setup callback for interface eth0 192.1.3.186:4500 fd 148 | libevent_free: release ptr-libevent@0x557d46929450 | free_event_entry: release EVENT_NULL-pe@0x557d46929410 | add_fd_read_event_handler: new ethX-pe@0x557d46929410 | libevent_malloc: new ptr-libevent@0x557d46929450 size 128 | setup callback for interface eth0 192.1.3.186:500 fd 147 | libevent_free: release ptr-libevent@0x557d46929540 | free_event_entry: release EVENT_NULL-pe@0x557d46929500 | add_fd_read_event_handler: new ethX-pe@0x557d46929500 | libevent_malloc: new ptr-libevent@0x557d46929540 size 128 | setup callback for interface eth0 192.1.3.187:4500 fd 146 | libevent_free: release ptr-libevent@0x557d46929630 | free_event_entry: release EVENT_NULL-pe@0x557d469295f0 | add_fd_read_event_handler: new ethX-pe@0x557d469295f0 | libevent_malloc: new ptr-libevent@0x557d46929630 size 128 | setup callback for interface eth0 192.1.3.187:500 fd 145 | libevent_free: release ptr-libevent@0x557d46929720 | free_event_entry: release EVENT_NULL-pe@0x557d469296e0 | add_fd_read_event_handler: new ethX-pe@0x557d469296e0 | libevent_malloc: new ptr-libevent@0x557d46929720 size 128 | setup callback for interface eth0 192.1.3.188:4500 fd 144 | libevent_free: release ptr-libevent@0x557d46929810 | free_event_entry: release EVENT_NULL-pe@0x557d469297d0 | add_fd_read_event_handler: new ethX-pe@0x557d469297d0 | libevent_malloc: new ptr-libevent@0x557d46929810 size 128 | setup callback for interface eth0 192.1.3.188:500 fd 143 | libevent_free: release ptr-libevent@0x557d46929900 | free_event_entry: release EVENT_NULL-pe@0x557d469298c0 | add_fd_read_event_handler: new ethX-pe@0x557d469298c0 | libevent_malloc: new ptr-libevent@0x557d46929900 size 128 | setup callback for interface eth0 192.1.3.189:4500 fd 142 | libevent_free: release ptr-libevent@0x557d469299f0 | free_event_entry: release EVENT_NULL-pe@0x557d469299b0 | add_fd_read_event_handler: new ethX-pe@0x557d469299b0 | libevent_malloc: new ptr-libevent@0x557d469299f0 size 128 | setup callback for interface eth0 192.1.3.189:500 fd 141 | libevent_free: release ptr-libevent@0x557d46929ae0 | free_event_entry: release EVENT_NULL-pe@0x557d46929aa0 | add_fd_read_event_handler: new ethX-pe@0x557d46929aa0 | libevent_malloc: new ptr-libevent@0x557d46929ae0 size 128 | setup callback for interface eth0 192.1.3.190:4500 fd 140 | libevent_free: release ptr-libevent@0x557d46929bd0 | free_event_entry: release EVENT_NULL-pe@0x557d46929b90 | add_fd_read_event_handler: new ethX-pe@0x557d46929b90 | libevent_malloc: new ptr-libevent@0x557d46929bd0 size 128 | setup callback for interface eth0 192.1.3.190:500 fd 139 | libevent_free: release ptr-libevent@0x557d46929cc0 | free_event_entry: release EVENT_NULL-pe@0x557d46929c80 | add_fd_read_event_handler: new ethX-pe@0x557d46929c80 | libevent_malloc: new ptr-libevent@0x557d46929cc0 size 128 | setup callback for interface eth0 192.1.3.191:4500 fd 138 | libevent_free: release ptr-libevent@0x557d46929db0 | free_event_entry: release EVENT_NULL-pe@0x557d46929d70 | add_fd_read_event_handler: new ethX-pe@0x557d46929d70 | libevent_malloc: new ptr-libevent@0x557d46929db0 size 128 | setup callback for interface eth0 192.1.3.191:500 fd 137 | libevent_free: release ptr-libevent@0x557d46929ea0 | free_event_entry: release EVENT_NULL-pe@0x557d46929e60 | add_fd_read_event_handler: new ethX-pe@0x557d46929e60 | libevent_malloc: new ptr-libevent@0x557d46929ea0 size 128 | setup callback for interface eth0 192.1.3.192:4500 fd 136 | libevent_free: release ptr-libevent@0x557d46929f90 | free_event_entry: release EVENT_NULL-pe@0x557d46929f50 | add_fd_read_event_handler: new ethX-pe@0x557d46929f50 | libevent_malloc: new ptr-libevent@0x557d46929f90 size 128 | setup callback for interface eth0 192.1.3.192:500 fd 135 | libevent_free: release ptr-libevent@0x557d4692a080 | free_event_entry: release EVENT_NULL-pe@0x557d4692a040 | add_fd_read_event_handler: new ethX-pe@0x557d4692a040 | libevent_malloc: new ptr-libevent@0x557d4692a080 size 128 | setup callback for interface eth0 192.1.3.193:4500 fd 134 | libevent_free: release ptr-libevent@0x557d4692a170 | free_event_entry: release EVENT_NULL-pe@0x557d4692a130 | add_fd_read_event_handler: new ethX-pe@0x557d4692a130 | libevent_malloc: new ptr-libevent@0x557d4692a170 size 128 | setup callback for interface eth0 192.1.3.193:500 fd 133 | libevent_free: release ptr-libevent@0x557d4692a260 | free_event_entry: release EVENT_NULL-pe@0x557d4692a220 | add_fd_read_event_handler: new ethX-pe@0x557d4692a220 | libevent_malloc: new ptr-libevent@0x557d4692a260 size 128 | setup callback for interface eth0 192.1.3.194:4500 fd 132 | libevent_free: release ptr-libevent@0x557d4692a350 | free_event_entry: release EVENT_NULL-pe@0x557d4692a310 | add_fd_read_event_handler: new ethX-pe@0x557d4692a310 | libevent_malloc: new ptr-libevent@0x557d4692a350 size 128 | setup callback for interface eth0 192.1.3.194:500 fd 131 | libevent_free: release ptr-libevent@0x557d4692a440 | free_event_entry: release EVENT_NULL-pe@0x557d4692a400 | add_fd_read_event_handler: new ethX-pe@0x557d4692a400 | libevent_malloc: new ptr-libevent@0x557d4692a440 size 128 | setup callback for interface eth0 192.1.3.195:4500 fd 130 | libevent_free: release ptr-libevent@0x557d4692a530 | free_event_entry: release EVENT_NULL-pe@0x557d4692a4f0 | add_fd_read_event_handler: new ethX-pe@0x557d4692a4f0 | libevent_malloc: new ptr-libevent@0x557d4692a530 size 128 | setup callback for interface eth0 192.1.3.195:500 fd 129 | libevent_free: release ptr-libevent@0x557d4692a620 | free_event_entry: release EVENT_NULL-pe@0x557d4692a5e0 | add_fd_read_event_handler: new ethX-pe@0x557d4692a5e0 | libevent_malloc: new ptr-libevent@0x557d4692a620 size 128 | setup callback for interface eth0 192.1.3.196:4500 fd 128 | libevent_free: release ptr-libevent@0x557d4692a710 | free_event_entry: release EVENT_NULL-pe@0x557d4692a6d0 | add_fd_read_event_handler: new ethX-pe@0x557d4692a6d0 | libevent_malloc: new ptr-libevent@0x557d4692a710 size 128 | setup callback for interface eth0 192.1.3.196:500 fd 127 | libevent_free: release ptr-libevent@0x557d4692a800 | free_event_entry: release EVENT_NULL-pe@0x557d4692a7c0 | add_fd_read_event_handler: new ethX-pe@0x557d4692a7c0 | libevent_malloc: new ptr-libevent@0x557d4692a800 size 128 | setup callback for interface eth0 192.1.3.197:4500 fd 126 | libevent_free: release ptr-libevent@0x557d4692a8f0 | free_event_entry: release EVENT_NULL-pe@0x557d4692a8b0 | add_fd_read_event_handler: new ethX-pe@0x557d4692a8b0 | libevent_malloc: new ptr-libevent@0x557d4692a8f0 size 128 | setup callback for interface eth0 192.1.3.197:500 fd 125 | libevent_free: release ptr-libevent@0x557d4692a9e0 | free_event_entry: release EVENT_NULL-pe@0x557d4692a9a0 | add_fd_read_event_handler: new ethX-pe@0x557d4692a9a0 | libevent_malloc: new ptr-libevent@0x557d4692a9e0 size 128 | setup callback for interface eth0 192.1.3.198:4500 fd 124 | libevent_free: release ptr-libevent@0x557d4692aad0 | free_event_entry: release EVENT_NULL-pe@0x557d4692aa90 | add_fd_read_event_handler: new ethX-pe@0x557d4692aa90 | libevent_malloc: new ptr-libevent@0x557d4692aad0 size 128 | setup callback for interface eth0 192.1.3.198:500 fd 123 | libevent_free: release ptr-libevent@0x557d4692abc0 | free_event_entry: release EVENT_NULL-pe@0x557d4692ab80 | add_fd_read_event_handler: new ethX-pe@0x557d4692ab80 | libevent_malloc: new ptr-libevent@0x557d4692abc0 size 128 | setup callback for interface eth0 192.1.3.199:4500 fd 122 | libevent_free: release ptr-libevent@0x557d4692acb0 | free_event_entry: release EVENT_NULL-pe@0x557d4692ac70 | add_fd_read_event_handler: new ethX-pe@0x557d4692ac70 | libevent_malloc: new ptr-libevent@0x557d4692acb0 size 128 | setup callback for interface eth0 192.1.3.199:500 fd 121 | libevent_free: release ptr-libevent@0x557d4692ada0 | free_event_entry: release EVENT_NULL-pe@0x557d4692ad60 | add_fd_read_event_handler: new ethX-pe@0x557d4692ad60 | libevent_malloc: new ptr-libevent@0x557d4692ada0 size 128 | setup callback for interface eth0 192.1.3.200:4500 fd 120 | libevent_free: release ptr-libevent@0x557d4692ae90 | free_event_entry: release EVENT_NULL-pe@0x557d4692ae50 | add_fd_read_event_handler: new ethX-pe@0x557d4692ae50 | libevent_malloc: new ptr-libevent@0x557d4692ae90 size 128 | setup callback for interface eth0 192.1.3.200:500 fd 119 | libevent_free: release ptr-libevent@0x557d4692af80 | free_event_entry: release EVENT_NULL-pe@0x557d4692af40 | add_fd_read_event_handler: new ethX-pe@0x557d4692af40 | libevent_malloc: new ptr-libevent@0x557d4692af80 size 128 | setup callback for interface eth0 192.1.3.201:4500 fd 118 | libevent_free: release ptr-libevent@0x557d4692b070 | free_event_entry: release EVENT_NULL-pe@0x557d4692b030 | add_fd_read_event_handler: new ethX-pe@0x557d4692b030 | libevent_malloc: new ptr-libevent@0x557d4692b070 size 128 | setup callback for interface eth0 192.1.3.201:500 fd 117 | libevent_free: release ptr-libevent@0x557d4692b160 | free_event_entry: release EVENT_NULL-pe@0x557d4692b120 | add_fd_read_event_handler: new ethX-pe@0x557d4692b120 | libevent_malloc: new ptr-libevent@0x557d4692b160 size 128 | setup callback for interface eth0 192.1.3.202:4500 fd 116 | libevent_free: release ptr-libevent@0x557d4692b250 | free_event_entry: release EVENT_NULL-pe@0x557d4692b210 | add_fd_read_event_handler: new ethX-pe@0x557d4692b210 | libevent_malloc: new ptr-libevent@0x557d4692b250 size 128 | setup callback for interface eth0 192.1.3.202:500 fd 115 | libevent_free: release ptr-libevent@0x557d4692b340 | free_event_entry: release EVENT_NULL-pe@0x557d4692b300 | add_fd_read_event_handler: new ethX-pe@0x557d4692b300 | libevent_malloc: new ptr-libevent@0x557d4692b340 size 128 | setup callback for interface eth0 192.1.3.203:4500 fd 114 | libevent_free: release ptr-libevent@0x557d4692b430 | free_event_entry: release EVENT_NULL-pe@0x557d4692b3f0 | add_fd_read_event_handler: new ethX-pe@0x557d4692b3f0 | libevent_malloc: new ptr-libevent@0x557d4692b430 size 128 | setup callback for interface eth0 192.1.3.203:500 fd 113 | libevent_free: release ptr-libevent@0x557d4692b520 | free_event_entry: release EVENT_NULL-pe@0x557d4692b4e0 | add_fd_read_event_handler: new ethX-pe@0x557d4692b4e0 | libevent_malloc: new ptr-libevent@0x557d4692b520 size 128 | setup callback for interface eth0 192.1.3.204:4500 fd 112 | libevent_free: release ptr-libevent@0x557d4692b610 | free_event_entry: release EVENT_NULL-pe@0x557d4692b5d0 | add_fd_read_event_handler: new ethX-pe@0x557d4692b5d0 | libevent_malloc: new ptr-libevent@0x557d4692b610 size 128 | setup callback for interface eth0 192.1.3.204:500 fd 111 | libevent_free: release ptr-libevent@0x557d4692b700 | free_event_entry: release EVENT_NULL-pe@0x557d4692b6c0 | add_fd_read_event_handler: new ethX-pe@0x557d4692b6c0 | libevent_malloc: new ptr-libevent@0x557d4692b700 size 128 | setup callback for interface eth0 192.1.3.205:4500 fd 110 | libevent_free: release ptr-libevent@0x557d4692b7f0 | free_event_entry: release EVENT_NULL-pe@0x557d4692b7b0 | add_fd_read_event_handler: new ethX-pe@0x557d4692b7b0 | libevent_malloc: new ptr-libevent@0x557d4692b7f0 size 128 | setup callback for interface eth0 192.1.3.205:500 fd 109 | libevent_free: release ptr-libevent@0x557d4692b8e0 | free_event_entry: release EVENT_NULL-pe@0x557d4692b8a0 | add_fd_read_event_handler: new ethX-pe@0x557d4692b8a0 | libevent_malloc: new ptr-libevent@0x557d4692b8e0 size 128 | setup callback for interface eth0 192.1.3.206:4500 fd 108 | libevent_free: release ptr-libevent@0x557d4692b9d0 | free_event_entry: release EVENT_NULL-pe@0x557d4692b990 | add_fd_read_event_handler: new ethX-pe@0x557d4692b990 | libevent_malloc: new ptr-libevent@0x557d4692b9d0 size 128 | setup callback for interface eth0 192.1.3.206:500 fd 107 | libevent_free: release ptr-libevent@0x557d4692bac0 | free_event_entry: release EVENT_NULL-pe@0x557d4692ba80 | add_fd_read_event_handler: new ethX-pe@0x557d4692ba80 | libevent_malloc: new ptr-libevent@0x557d4692bac0 size 128 | setup callback for interface eth0 192.1.3.207:4500 fd 106 | libevent_free: release ptr-libevent@0x557d4692bbb0 | free_event_entry: release EVENT_NULL-pe@0x557d4692bb70 | add_fd_read_event_handler: new ethX-pe@0x557d4692bb70 | libevent_malloc: new ptr-libevent@0x557d4692bbb0 size 128 | setup callback for interface eth0 192.1.3.207:500 fd 105 | libevent_free: release ptr-libevent@0x557d4692bca0 | free_event_entry: release EVENT_NULL-pe@0x557d4692bc60 | add_fd_read_event_handler: new ethX-pe@0x557d4692bc60 | libevent_malloc: new ptr-libevent@0x557d4692bca0 size 128 | setup callback for interface eth0 192.1.3.208:4500 fd 104 | libevent_free: release ptr-libevent@0x557d4692bd90 | free_event_entry: release EVENT_NULL-pe@0x557d4692bd50 | add_fd_read_event_handler: new ethX-pe@0x557d4692bd50 | libevent_malloc: new ptr-libevent@0x557d4692bd90 size 128 | setup callback for interface eth0 192.1.3.208:500 fd 103 | libevent_free: release ptr-libevent@0x557d4692be80 | free_event_entry: release EVENT_NULL-pe@0x557d4692be40 | add_fd_read_event_handler: new ethX-pe@0x557d4692be40 | libevent_malloc: new ptr-libevent@0x557d4692be80 size 128 | setup callback for interface eth0 192.1.3.210:4500 fd 102 | libevent_free: release ptr-libevent@0x557d4692bf70 | free_event_entry: release EVENT_NULL-pe@0x557d4692bf30 | add_fd_read_event_handler: new ethX-pe@0x557d4692bf30 | libevent_malloc: new ptr-libevent@0x557d4692bf70 size 128 | setup callback for interface eth0 192.1.3.210:500 fd 101 | libevent_free: release ptr-libevent@0x557d4692c060 | free_event_entry: release EVENT_NULL-pe@0x557d4692c020 | add_fd_read_event_handler: new ethX-pe@0x557d4692c020 | libevent_malloc: new ptr-libevent@0x557d4692c060 size 128 | setup callback for interface eth0 192.1.3.211:4500 fd 100 | libevent_free: release ptr-libevent@0x557d4692c150 | free_event_entry: release EVENT_NULL-pe@0x557d4692c110 | add_fd_read_event_handler: new ethX-pe@0x557d4692c110 | libevent_malloc: new ptr-libevent@0x557d4692c150 size 128 | setup callback for interface eth0 192.1.3.211:500 fd 99 | libevent_free: release ptr-libevent@0x557d4692c240 | free_event_entry: release EVENT_NULL-pe@0x557d4692c200 | add_fd_read_event_handler: new ethX-pe@0x557d4692c200 | libevent_malloc: new ptr-libevent@0x557d4692c240 size 128 | setup callback for interface eth0 192.1.3.212:4500 fd 98 | libevent_free: release ptr-libevent@0x557d4692c330 | free_event_entry: release EVENT_NULL-pe@0x557d4692c2f0 | add_fd_read_event_handler: new ethX-pe@0x557d4692c2f0 | libevent_malloc: new ptr-libevent@0x557d4692c330 size 128 | setup callback for interface eth0 192.1.3.212:500 fd 97 | libevent_free: release ptr-libevent@0x557d4692c420 | free_event_entry: release EVENT_NULL-pe@0x557d4692c3e0 | add_fd_read_event_handler: new ethX-pe@0x557d4692c3e0 | libevent_malloc: new ptr-libevent@0x557d4692c420 size 128 | setup callback for interface eth0 192.1.3.213:4500 fd 96 | libevent_free: release ptr-libevent@0x557d4692c510 | free_event_entry: release EVENT_NULL-pe@0x557d4692c4d0 | add_fd_read_event_handler: new ethX-pe@0x557d4692c4d0 | libevent_malloc: new ptr-libevent@0x557d4692c510 size 128 | setup callback for interface eth0 192.1.3.213:500 fd 95 | libevent_free: release ptr-libevent@0x557d4692c600 | free_event_entry: release EVENT_NULL-pe@0x557d4692c5c0 | add_fd_read_event_handler: new ethX-pe@0x557d4692c5c0 | libevent_malloc: new ptr-libevent@0x557d4692c600 size 128 | setup callback for interface eth0 192.1.3.214:4500 fd 94 | libevent_free: release ptr-libevent@0x557d4692c6f0 | free_event_entry: release EVENT_NULL-pe@0x557d4692c6b0 | add_fd_read_event_handler: new ethX-pe@0x557d4692c6b0 | libevent_malloc: new ptr-libevent@0x557d4692c6f0 size 128 | setup callback for interface eth0 192.1.3.214:500 fd 93 | libevent_free: release ptr-libevent@0x557d4692c7e0 | free_event_entry: release EVENT_NULL-pe@0x557d4692c7a0 | add_fd_read_event_handler: new ethX-pe@0x557d4692c7a0 | libevent_malloc: new ptr-libevent@0x557d4692c7e0 size 128 | setup callback for interface eth0 192.1.3.215:4500 fd 92 | libevent_free: release ptr-libevent@0x557d4692c8d0 | free_event_entry: release EVENT_NULL-pe@0x557d4692c890 | add_fd_read_event_handler: new ethX-pe@0x557d4692c890 | libevent_malloc: new ptr-libevent@0x557d4692c8d0 size 128 | setup callback for interface eth0 192.1.3.215:500 fd 91 | libevent_free: release ptr-libevent@0x557d4692c9c0 | free_event_entry: release EVENT_NULL-pe@0x557d4692c980 | add_fd_read_event_handler: new ethX-pe@0x557d4692c980 | libevent_malloc: new ptr-libevent@0x557d4692c9c0 size 128 | setup callback for interface eth0 192.1.3.216:4500 fd 90 | libevent_free: release ptr-libevent@0x557d4692cab0 | free_event_entry: release EVENT_NULL-pe@0x557d4692ca70 | add_fd_read_event_handler: new ethX-pe@0x557d4692ca70 | libevent_malloc: new ptr-libevent@0x557d4692cab0 size 128 | setup callback for interface eth0 192.1.3.216:500 fd 89 | libevent_free: release ptr-libevent@0x557d4692cba0 | free_event_entry: release EVENT_NULL-pe@0x557d4692cb60 | add_fd_read_event_handler: new ethX-pe@0x557d4692cb60 | libevent_malloc: new ptr-libevent@0x557d4692cba0 size 128 | setup callback for interface eth0 192.1.3.217:4500 fd 88 | libevent_free: release ptr-libevent@0x557d4692cc90 | free_event_entry: release EVENT_NULL-pe@0x557d4692cc50 | add_fd_read_event_handler: new ethX-pe@0x557d4692cc50 | libevent_malloc: new ptr-libevent@0x557d4692cc90 size 128 | setup callback for interface eth0 192.1.3.217:500 fd 87 | libevent_free: release ptr-libevent@0x557d4692cd80 | free_event_entry: release EVENT_NULL-pe@0x557d4692cd40 | add_fd_read_event_handler: new ethX-pe@0x557d4692cd40 | libevent_malloc: new ptr-libevent@0x557d4692cd80 size 128 | setup callback for interface eth0 192.1.3.218:4500 fd 86 | libevent_free: release ptr-libevent@0x557d4692ce70 | free_event_entry: release EVENT_NULL-pe@0x557d4692ce30 | add_fd_read_event_handler: new ethX-pe@0x557d4692ce30 | libevent_malloc: new ptr-libevent@0x557d4692ce70 size 128 | setup callback for interface eth0 192.1.3.218:500 fd 85 | libevent_free: release ptr-libevent@0x557d4692cf60 | free_event_entry: release EVENT_NULL-pe@0x557d4692cf20 | add_fd_read_event_handler: new ethX-pe@0x557d4692cf20 | libevent_malloc: new ptr-libevent@0x557d4692cf60 size 128 | setup callback for interface eth0 192.1.3.219:4500 fd 84 | libevent_free: release ptr-libevent@0x557d4692d050 | free_event_entry: release EVENT_NULL-pe@0x557d4692d010 | add_fd_read_event_handler: new ethX-pe@0x557d4692d010 | libevent_malloc: new ptr-libevent@0x557d4692d050 size 128 | setup callback for interface eth0 192.1.3.219:500 fd 83 | libevent_free: release ptr-libevent@0x557d4692d140 | free_event_entry: release EVENT_NULL-pe@0x557d4692d100 | add_fd_read_event_handler: new ethX-pe@0x557d4692d100 | libevent_malloc: new ptr-libevent@0x557d4692d140 size 128 | setup callback for interface eth0 192.1.3.220:4500 fd 82 | libevent_free: release ptr-libevent@0x557d4692d230 | free_event_entry: release EVENT_NULL-pe@0x557d4692d1f0 | add_fd_read_event_handler: new ethX-pe@0x557d4692d1f0 | libevent_malloc: new ptr-libevent@0x557d4692d230 size 128 | setup callback for interface eth0 192.1.3.220:500 fd 81 | libevent_free: release ptr-libevent@0x557d4692d320 | free_event_entry: release EVENT_NULL-pe@0x557d4692d2e0 | add_fd_read_event_handler: new ethX-pe@0x557d4692d2e0 | libevent_malloc: new ptr-libevent@0x557d4692d320 size 128 | setup callback for interface eth0 192.1.3.221:4500 fd 80 | libevent_free: release ptr-libevent@0x557d4692d410 | free_event_entry: release EVENT_NULL-pe@0x557d4692d3d0 | add_fd_read_event_handler: new ethX-pe@0x557d4692d3d0 | libevent_malloc: new ptr-libevent@0x557d4692d410 size 128 | setup callback for interface eth0 192.1.3.221:500 fd 79 | libevent_free: release ptr-libevent@0x557d4692d500 | free_event_entry: release EVENT_NULL-pe@0x557d4692d4c0 | add_fd_read_event_handler: new ethX-pe@0x557d4692d4c0 | libevent_malloc: new ptr-libevent@0x557d4692d500 size 128 | setup callback for interface eth0 192.1.3.222:4500 fd 78 | libevent_free: release ptr-libevent@0x557d4692d5f0 | free_event_entry: release EVENT_NULL-pe@0x557d4692d5b0 | add_fd_read_event_handler: new ethX-pe@0x557d4692d5b0 | libevent_malloc: new ptr-libevent@0x557d4692d5f0 size 128 | setup callback for interface eth0 192.1.3.222:500 fd 77 | libevent_free: release ptr-libevent@0x557d4692d6e0 | free_event_entry: release EVENT_NULL-pe@0x557d4692d6a0 | add_fd_read_event_handler: new ethX-pe@0x557d4692d6a0 | libevent_malloc: new ptr-libevent@0x557d4692d6e0 size 128 | setup callback for interface eth0 192.1.3.223:4500 fd 76 | libevent_free: release ptr-libevent@0x557d4692d7d0 | free_event_entry: release EVENT_NULL-pe@0x557d4692d790 | add_fd_read_event_handler: new ethX-pe@0x557d4692d790 | libevent_malloc: new ptr-libevent@0x557d4692d7d0 size 128 | setup callback for interface eth0 192.1.3.223:500 fd 75 | libevent_free: release ptr-libevent@0x557d4692d8c0 | free_event_entry: release EVENT_NULL-pe@0x557d4692d880 | add_fd_read_event_handler: new ethX-pe@0x557d4692d880 | libevent_malloc: new ptr-libevent@0x557d4692d8c0 size 128 | setup callback for interface eth0 192.1.3.224:4500 fd 74 | libevent_free: release ptr-libevent@0x557d4692d9b0 | free_event_entry: release EVENT_NULL-pe@0x557d4692d970 | add_fd_read_event_handler: new ethX-pe@0x557d4692d970 | libevent_malloc: new ptr-libevent@0x557d4692d9b0 size 128 | setup callback for interface eth0 192.1.3.224:500 fd 73 | libevent_free: release ptr-libevent@0x557d4692daa0 | free_event_entry: release EVENT_NULL-pe@0x557d4692da60 | add_fd_read_event_handler: new ethX-pe@0x557d4692da60 | libevent_malloc: new ptr-libevent@0x557d4692daa0 size 128 | setup callback for interface eth0 192.1.3.225:4500 fd 72 | libevent_free: release ptr-libevent@0x557d4692db90 | free_event_entry: release EVENT_NULL-pe@0x557d4692db50 | add_fd_read_event_handler: new ethX-pe@0x557d4692db50 | libevent_malloc: new ptr-libevent@0x557d4692db90 size 128 | setup callback for interface eth0 192.1.3.225:500 fd 71 | libevent_free: release ptr-libevent@0x557d4692dc80 | free_event_entry: release EVENT_NULL-pe@0x557d4692dc40 | add_fd_read_event_handler: new ethX-pe@0x557d4692dc40 | libevent_malloc: new ptr-libevent@0x557d4692dc80 size 128 | setup callback for interface eth0 192.1.3.226:4500 fd 70 | libevent_free: release ptr-libevent@0x557d4692dd70 | free_event_entry: release EVENT_NULL-pe@0x557d4692dd30 | add_fd_read_event_handler: new ethX-pe@0x557d4692dd30 | libevent_malloc: new ptr-libevent@0x557d4692dd70 size 128 | setup callback for interface eth0 192.1.3.226:500 fd 69 | libevent_free: release ptr-libevent@0x557d4692de60 | free_event_entry: release EVENT_NULL-pe@0x557d4692de20 | add_fd_read_event_handler: new ethX-pe@0x557d4692de20 | libevent_malloc: new ptr-libevent@0x557d4692de60 size 128 | setup callback for interface eth0 192.1.3.227:4500 fd 68 | libevent_free: release ptr-libevent@0x557d4692df50 | free_event_entry: release EVENT_NULL-pe@0x557d4692df10 | add_fd_read_event_handler: new ethX-pe@0x557d4692df10 | libevent_malloc: new ptr-libevent@0x557d4692df50 size 128 | setup callback for interface eth0 192.1.3.227:500 fd 67 | libevent_free: release ptr-libevent@0x557d4692e040 | free_event_entry: release EVENT_NULL-pe@0x557d4692e000 | add_fd_read_event_handler: new ethX-pe@0x557d4692e000 | libevent_malloc: new ptr-libevent@0x557d4692e040 size 128 | setup callback for interface eth0 192.1.3.228:4500 fd 66 | libevent_free: release ptr-libevent@0x557d4692e130 | free_event_entry: release EVENT_NULL-pe@0x557d4692e0f0 | add_fd_read_event_handler: new ethX-pe@0x557d4692e0f0 | libevent_malloc: new ptr-libevent@0x557d4692e130 size 128 | setup callback for interface eth0 192.1.3.228:500 fd 65 | libevent_free: release ptr-libevent@0x557d4692e220 | free_event_entry: release EVENT_NULL-pe@0x557d4692e1e0 | add_fd_read_event_handler: new ethX-pe@0x557d4692e1e0 | libevent_malloc: new ptr-libevent@0x557d4692e220 size 128 | setup callback for interface eth0 192.1.3.229:4500 fd 64 | libevent_free: release ptr-libevent@0x557d4692e310 | free_event_entry: release EVENT_NULL-pe@0x557d4692e2d0 | add_fd_read_event_handler: new ethX-pe@0x557d4692e2d0 | libevent_malloc: new ptr-libevent@0x557d4692e310 size 128 | setup callback for interface eth0 192.1.3.229:500 fd 63 | libevent_free: release ptr-libevent@0x557d4692e400 | free_event_entry: release EVENT_NULL-pe@0x557d4692e3c0 | add_fd_read_event_handler: new ethX-pe@0x557d4692e3c0 | libevent_malloc: new ptr-libevent@0x557d4692e400 size 128 | setup callback for interface eth0 192.1.3.230:4500 fd 62 | libevent_free: release ptr-libevent@0x557d4692e4f0 | free_event_entry: release EVENT_NULL-pe@0x557d4692e4b0 | add_fd_read_event_handler: new ethX-pe@0x557d4692e4b0 | libevent_malloc: new ptr-libevent@0x557d4692e4f0 size 128 | setup callback for interface eth0 192.1.3.230:500 fd 61 | libevent_free: release ptr-libevent@0x557d4692e5e0 | free_event_entry: release EVENT_NULL-pe@0x557d4692e5a0 | add_fd_read_event_handler: new ethX-pe@0x557d4692e5a0 | libevent_malloc: new ptr-libevent@0x557d4692e5e0 size 128 | setup callback for interface eth0 192.1.3.231:4500 fd 60 | libevent_free: release ptr-libevent@0x557d4692e6d0 | free_event_entry: release EVENT_NULL-pe@0x557d4692e690 | add_fd_read_event_handler: new ethX-pe@0x557d4692e690 | libevent_malloc: new ptr-libevent@0x557d4692e6d0 size 128 | setup callback for interface eth0 192.1.3.231:500 fd 59 | libevent_free: release ptr-libevent@0x557d4692e7c0 | free_event_entry: release EVENT_NULL-pe@0x557d4692e780 | add_fd_read_event_handler: new ethX-pe@0x557d4692e780 | libevent_malloc: new ptr-libevent@0x557d4692e7c0 size 128 | setup callback for interface eth0 192.1.3.232:4500 fd 58 | libevent_free: release ptr-libevent@0x557d4692e8b0 | free_event_entry: release EVENT_NULL-pe@0x557d4692e870 | add_fd_read_event_handler: new ethX-pe@0x557d4692e870 | libevent_malloc: new ptr-libevent@0x557d4692e8b0 size 128 | setup callback for interface eth0 192.1.3.232:500 fd 57 | libevent_free: release ptr-libevent@0x557d4692e9a0 | free_event_entry: release EVENT_NULL-pe@0x557d4692e960 | add_fd_read_event_handler: new ethX-pe@0x557d4692e960 | libevent_malloc: new ptr-libevent@0x557d4692e9a0 size 128 | setup callback for interface eth0 192.1.3.233:4500 fd 56 | libevent_free: release ptr-libevent@0x557d4692ea90 | free_event_entry: release EVENT_NULL-pe@0x557d4692ea50 | add_fd_read_event_handler: new ethX-pe@0x557d4692ea50 | libevent_malloc: new ptr-libevent@0x557d4692ea90 size 128 | setup callback for interface eth0 192.1.3.233:500 fd 55 | libevent_free: release ptr-libevent@0x557d4692eb80 | free_event_entry: release EVENT_NULL-pe@0x557d4692eb40 | add_fd_read_event_handler: new ethX-pe@0x557d4692eb40 | libevent_malloc: new ptr-libevent@0x557d4692eb80 size 128 | setup callback for interface eth0 192.1.3.234:4500 fd 54 | libevent_free: release ptr-libevent@0x557d4692ec70 | free_event_entry: release EVENT_NULL-pe@0x557d4692ec30 | add_fd_read_event_handler: new ethX-pe@0x557d4692ec30 | libevent_malloc: new ptr-libevent@0x557d4692ec70 size 128 | setup callback for interface eth0 192.1.3.234:500 fd 53 | libevent_free: release ptr-libevent@0x557d4692ed60 | free_event_entry: release EVENT_NULL-pe@0x557d4692ed20 | add_fd_read_event_handler: new ethX-pe@0x557d4692ed20 | libevent_malloc: new ptr-libevent@0x557d4692ed60 size 128 | setup callback for interface eth0 192.1.3.235:4500 fd 52 | libevent_free: release ptr-libevent@0x557d4692ee50 | free_event_entry: release EVENT_NULL-pe@0x557d4692ee10 | add_fd_read_event_handler: new ethX-pe@0x557d4692ee10 | libevent_malloc: new ptr-libevent@0x557d4692ee50 size 128 | setup callback for interface eth0 192.1.3.235:500 fd 51 | libevent_free: release ptr-libevent@0x557d4692ef40 | free_event_entry: release EVENT_NULL-pe@0x557d4692ef00 | add_fd_read_event_handler: new ethX-pe@0x557d4692ef00 | libevent_malloc: new ptr-libevent@0x557d4692ef40 size 128 | setup callback for interface eth0 192.1.3.236:4500 fd 50 | libevent_free: release ptr-libevent@0x557d4692f030 | free_event_entry: release EVENT_NULL-pe@0x557d4692eff0 | add_fd_read_event_handler: new ethX-pe@0x557d4692eff0 | libevent_malloc: new ptr-libevent@0x557d4692f030 size 128 | setup callback for interface eth0 192.1.3.236:500 fd 49 | libevent_free: release ptr-libevent@0x557d4692f120 | free_event_entry: release EVENT_NULL-pe@0x557d4692f0e0 | add_fd_read_event_handler: new ethX-pe@0x557d4692f0e0 | libevent_malloc: new ptr-libevent@0x557d4692f120 size 128 | setup callback for interface eth0 192.1.3.237:4500 fd 48 | libevent_free: release ptr-libevent@0x557d4692f210 | free_event_entry: release EVENT_NULL-pe@0x557d4692f1d0 | add_fd_read_event_handler: new ethX-pe@0x557d4692f1d0 | libevent_malloc: new ptr-libevent@0x557d4692f210 size 128 | setup callback for interface eth0 192.1.3.237:500 fd 47 | libevent_free: release ptr-libevent@0x557d4692f300 | free_event_entry: release EVENT_NULL-pe@0x557d4692f2c0 | add_fd_read_event_handler: new ethX-pe@0x557d4692f2c0 | libevent_malloc: new ptr-libevent@0x557d4692f300 size 128 | setup callback for interface eth0 192.1.3.238:4500 fd 46 | libevent_free: release ptr-libevent@0x557d4692f3f0 | free_event_entry: release EVENT_NULL-pe@0x557d4692f3b0 | add_fd_read_event_handler: new ethX-pe@0x557d4692f3b0 | libevent_malloc: new ptr-libevent@0x557d4692f3f0 size 128 | setup callback for interface eth0 192.1.3.238:500 fd 45 | libevent_free: release ptr-libevent@0x557d4692f4e0 | free_event_entry: release EVENT_NULL-pe@0x557d4692f4a0 | add_fd_read_event_handler: new ethX-pe@0x557d4692f4a0 | libevent_malloc: new ptr-libevent@0x557d4692f4e0 size 128 | setup callback for interface eth0 192.1.3.239:4500 fd 44 | libevent_free: release ptr-libevent@0x557d4692f5d0 | free_event_entry: release EVENT_NULL-pe@0x557d4692f590 | add_fd_read_event_handler: new ethX-pe@0x557d4692f590 | libevent_malloc: new ptr-libevent@0x557d4692f5d0 size 128 | setup callback for interface eth0 192.1.3.239:500 fd 43 | libevent_free: release ptr-libevent@0x557d4692f6c0 | free_event_entry: release EVENT_NULL-pe@0x557d4692f680 | add_fd_read_event_handler: new ethX-pe@0x557d4692f680 | libevent_malloc: new ptr-libevent@0x557d4692f6c0 size 128 | setup callback for interface eth0 192.1.3.240:4500 fd 42 | libevent_free: release ptr-libevent@0x557d4692f7b0 | free_event_entry: release EVENT_NULL-pe@0x557d4692f770 | add_fd_read_event_handler: new ethX-pe@0x557d4692f770 | libevent_malloc: new ptr-libevent@0x557d4692f7b0 size 128 | setup callback for interface eth0 192.1.3.240:500 fd 41 | libevent_free: release ptr-libevent@0x557d4692f8a0 | free_event_entry: release EVENT_NULL-pe@0x557d4692f860 | add_fd_read_event_handler: new ethX-pe@0x557d4692f860 | libevent_malloc: new ptr-libevent@0x557d4692f8a0 size 128 | setup callback for interface eth0 192.1.3.241:4500 fd 40 | libevent_free: release ptr-libevent@0x557d4692f990 | free_event_entry: release EVENT_NULL-pe@0x557d4692f950 | add_fd_read_event_handler: new ethX-pe@0x557d4692f950 | libevent_malloc: new ptr-libevent@0x557d4692f990 size 128 | setup callback for interface eth0 192.1.3.241:500 fd 39 | libevent_free: release ptr-libevent@0x557d4692fa80 | free_event_entry: release EVENT_NULL-pe@0x557d4692fa40 | add_fd_read_event_handler: new ethX-pe@0x557d4692fa40 | libevent_malloc: new ptr-libevent@0x557d4692fa80 size 128 | setup callback for interface eth0 192.1.3.242:4500 fd 38 | libevent_free: release ptr-libevent@0x557d4692fb70 | free_event_entry: release EVENT_NULL-pe@0x557d4692fb30 | add_fd_read_event_handler: new ethX-pe@0x557d4692fb30 | libevent_malloc: new ptr-libevent@0x557d4692fb70 size 128 | setup callback for interface eth0 192.1.3.242:500 fd 37 | libevent_free: release ptr-libevent@0x557d4692fc60 | free_event_entry: release EVENT_NULL-pe@0x557d4692fc20 | add_fd_read_event_handler: new ethX-pe@0x557d4692fc20 | libevent_malloc: new ptr-libevent@0x557d4692fc60 size 128 | setup callback for interface eth0 192.1.3.243:4500 fd 36 | libevent_free: release ptr-libevent@0x557d4692fd50 | free_event_entry: release EVENT_NULL-pe@0x557d4692fd10 | add_fd_read_event_handler: new ethX-pe@0x557d4692fd10 | libevent_malloc: new ptr-libevent@0x557d4692fd50 size 128 | setup callback for interface eth0 192.1.3.243:500 fd 35 | libevent_free: release ptr-libevent@0x557d4692fe40 | free_event_entry: release EVENT_NULL-pe@0x557d4692fe00 | add_fd_read_event_handler: new ethX-pe@0x557d4692fe00 | libevent_malloc: new ptr-libevent@0x557d4692fe40 size 128 | setup callback for interface eth0 192.1.3.244:4500 fd 34 | libevent_free: release ptr-libevent@0x557d4692ff30 | free_event_entry: release EVENT_NULL-pe@0x557d4692fef0 | add_fd_read_event_handler: new ethX-pe@0x557d4692fef0 | libevent_malloc: new ptr-libevent@0x557d4692ff30 size 128 | setup callback for interface eth0 192.1.3.244:500 fd 33 | libevent_free: release ptr-libevent@0x557d46930020 | free_event_entry: release EVENT_NULL-pe@0x557d4692ffe0 | add_fd_read_event_handler: new ethX-pe@0x557d4692ffe0 | libevent_malloc: new ptr-libevent@0x557d46930020 size 128 | setup callback for interface eth0 192.1.3.245:4500 fd 32 | libevent_free: release ptr-libevent@0x557d46930110 | free_event_entry: release EVENT_NULL-pe@0x557d469300d0 | add_fd_read_event_handler: new ethX-pe@0x557d469300d0 | libevent_malloc: new ptr-libevent@0x557d46930110 size 128 | setup callback for interface eth0 192.1.3.245:500 fd 31 | libevent_free: release ptr-libevent@0x557d46930200 | free_event_entry: release EVENT_NULL-pe@0x557d469301c0 | add_fd_read_event_handler: new ethX-pe@0x557d469301c0 | libevent_malloc: new ptr-libevent@0x557d46930200 size 128 | setup callback for interface eth0 192.1.3.246:4500 fd 30 | libevent_free: release ptr-libevent@0x557d469302f0 | free_event_entry: release EVENT_NULL-pe@0x557d469302b0 | add_fd_read_event_handler: new ethX-pe@0x557d469302b0 | libevent_malloc: new ptr-libevent@0x557d469302f0 size 128 | setup callback for interface eth0 192.1.3.246:500 fd 29 | libevent_free: release ptr-libevent@0x557d469303e0 | free_event_entry: release EVENT_NULL-pe@0x557d469303a0 | add_fd_read_event_handler: new ethX-pe@0x557d469303a0 | libevent_malloc: new ptr-libevent@0x557d469303e0 size 128 | setup callback for interface eth0 192.1.3.247:4500 fd 28 | libevent_free: release ptr-libevent@0x557d469304d0 | free_event_entry: release EVENT_NULL-pe@0x557d46930490 | add_fd_read_event_handler: new ethX-pe@0x557d46930490 | libevent_malloc: new ptr-libevent@0x557d469304d0 size 128 | setup callback for interface eth0 192.1.3.247:500 fd 27 | libevent_free: release ptr-libevent@0x557d469305c0 | free_event_entry: release EVENT_NULL-pe@0x557d46930580 | add_fd_read_event_handler: new ethX-pe@0x557d46930580 | libevent_malloc: new ptr-libevent@0x557d469305c0 size 128 | setup callback for interface eth0 192.1.3.248:4500 fd 26 | libevent_free: release ptr-libevent@0x557d469306b0 | free_event_entry: release EVENT_NULL-pe@0x557d46930670 | add_fd_read_event_handler: new ethX-pe@0x557d46930670 | libevent_malloc: new ptr-libevent@0x557d469306b0 size 128 | setup callback for interface eth0 192.1.3.248:500 fd 25 | libevent_free: release ptr-libevent@0x557d469307a0 | free_event_entry: release EVENT_NULL-pe@0x557d46930760 | add_fd_read_event_handler: new ethX-pe@0x557d46930760 | libevent_malloc: new ptr-libevent@0x557d469307a0 size 128 | setup callback for interface eth0 192.1.3.249:4500 fd 24 | libevent_free: release ptr-libevent@0x557d46930890 | free_event_entry: release EVENT_NULL-pe@0x557d46930850 | add_fd_read_event_handler: new ethX-pe@0x557d46930850 | libevent_malloc: new ptr-libevent@0x557d46930890 size 128 | setup callback for interface eth0 192.1.3.249:500 fd 23 | libevent_free: release ptr-libevent@0x557d46930980 | free_event_entry: release EVENT_NULL-pe@0x557d46930940 | add_fd_read_event_handler: new ethX-pe@0x557d46930940 | libevent_malloc: new ptr-libevent@0x557d46930980 size 128 | setup callback for interface eth0 192.1.3.250:4500 fd 22 | libevent_free: release ptr-libevent@0x557d46930a70 | free_event_entry: release EVENT_NULL-pe@0x557d46930a30 | add_fd_read_event_handler: new ethX-pe@0x557d46930a30 | libevent_malloc: new ptr-libevent@0x557d46930a70 size 128 | setup callback for interface eth0 192.1.3.250:500 fd 21 | libevent_free: release ptr-libevent@0x557d46930b60 | free_event_entry: release EVENT_NULL-pe@0x557d46930b20 | add_fd_read_event_handler: new ethX-pe@0x557d46930b20 | libevent_malloc: new ptr-libevent@0x557d46930b60 size 128 | setup callback for interface eth0 192.1.3.251:4500 fd 20 | libevent_free: release ptr-libevent@0x557d46930c50 | free_event_entry: release EVENT_NULL-pe@0x557d46930c10 | add_fd_read_event_handler: new ethX-pe@0x557d46930c10 | libevent_malloc: new ptr-libevent@0x557d46930c50 size 128 | setup callback for interface eth0 192.1.3.251:500 fd 19 | libevent_free: release ptr-libevent@0x557d46930d40 | free_event_entry: release EVENT_NULL-pe@0x557d46930d00 | add_fd_read_event_handler: new ethX-pe@0x557d46930d00 | libevent_malloc: new ptr-libevent@0x557d46930d40 size 128 | setup callback for interface eth0 192.1.3.252:4500 fd 18 | libevent_free: release ptr-libevent@0x557d46930e30 | free_event_entry: release EVENT_NULL-pe@0x557d46930df0 | add_fd_read_event_handler: new ethX-pe@0x557d46930df0 | libevent_malloc: new ptr-libevent@0x557d46930e30 size 128 | setup callback for interface eth0 192.1.3.252:500 fd 17 | certs and keys locked by 'free_preshared_secrets' forgetting secrets | certs and keys unlocked by 'free_preshared_secrets' loading secrets from "/etc/ipsec.secrets" | Processing PSK at line 1: passed | certs and keys locked by 'process_secret' | certs and keys unlocked by 'process_secret' | pluto_sd: executing action action: ready(5), status 0 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 16 milliseconds in whack | processing signal PLUTO_SIGCHLD | waitpid returned pid 23330 (exited with status 0) | reaped addconn helper child (status 0) | waitpid returned ECHILD (no child processes left) | spent 0.0206 milliseconds in signal handler PLUTO_SIGCHLD | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-1" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-1' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #1 at 0x557d469d4b10 | State DB: adding IKEv2 state #1 in UNDEFINED | pstats #1 ikev2.ike started | Message ID: init #1: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #1: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #1; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-1" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-1" IKE SA #1 "road-eastnet-nonat-1" "road-eastnet-nonat-1" #1: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-1 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-1": constructed local IKE proposals for road-eastnet-nonat-1 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 1 for state #1 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46906b40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #1 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 | #1 spent 0.152 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-1" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.237 milliseconds in whack | crypto helper 1 resuming | crypto helper 1 starting work-order 1 for state #1 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 1 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 1 time elapsed 0.001072 seconds | (#1) spent 1.07 milliseconds in crypto helper computing work-order 1: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 1 for state #1 to event queue | scheduling resume sending helper answer for #1 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #1 | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 1 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #1 | **emit ISAKMP Message: | initiator cookie: | 6c 47 a0 1e 4e 7a e8 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-1 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b6 72 0a 33 22 17 06 fc fa 28 91 b3 4f 57 56 e3 | ikev2 g^x ee 34 d7 20 66 52 7a 35 d8 92 bd 3b 01 15 87 45 | ikev2 g^x 58 9b 73 12 6d c9 2d 63 ff 30 68 a3 01 b0 11 62 | ikev2 g^x 0d 6a c8 7a 26 90 7a 07 0b 27 d1 49 b8 5c b5 22 | ikev2 g^x a1 78 8f 5c ca 62 0b 66 89 cf a4 d3 28 f3 60 65 | ikev2 g^x c4 0b 09 ab 6c 65 0c 24 ce 5f 6b 9e 2d 74 21 c1 | ikev2 g^x cc dd a3 d2 b1 b2 d7 b0 e3 c8 e7 e0 b1 08 40 98 | ikev2 g^x ea 60 7f cb f6 03 0b de 16 74 c6 45 5a 5d fd 06 | ikev2 g^x 19 e0 e9 1d 81 07 89 02 31 28 9a 67 2f ad 6e 4a | ikev2 g^x 5d d5 b0 90 bd e1 d1 0c 6f c0 ca db 12 8a 57 f5 | ikev2 g^x 47 c8 09 2a 1b de 2b dc d0 ab ee bf fc be 4f ae | ikev2 g^x f0 8e 4b a7 a7 58 e9 98 9f 49 09 09 2b 4d 67 80 | ikev2 g^x 28 41 88 84 93 b4 f0 c4 d7 78 27 c0 fe b8 4a 13 | ikev2 g^x 52 ab 44 91 d1 9f f2 59 6f dd 35 3c 1e 70 9c d8 | ikev2 g^x 9d ab 34 6f 48 48 c0 46 69 91 44 bd 80 07 2d e1 | ikev2 g^x 42 55 8f bd 8c 53 47 7c 85 94 0c 8c ae 5e 19 a4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e7 5a 07 18 3f 34 30 d2 f0 5d 94 65 65 0d d9 4a | IKEv2 nonce 64 02 60 6e 32 ba 95 35 8b ff 59 40 3a 8b 9e 68 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6c 47 a0 1e 4e 7a e8 3f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 01 | natd_hash: port= 01 f4 | natd_hash: hash= 69 00 78 5c 8b 16 a5 c0 7d 51 c3 29 54 44 32 39 | natd_hash: hash= 1b 8f 23 e8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 69 00 78 5c 8b 16 a5 c0 7d 51 c3 29 54 44 32 39 | Notify data 1b 8f 23 e8 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6c 47 a0 1e 4e 7a e8 3f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 68 e9 c0 40 f1 97 39 51 93 0a 30 e5 6a bd eb d1 | natd_hash: hash= f4 d9 bb 8c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 68 e9 c0 40 f1 97 39 51 93 0a 30 e5 6a bd eb d1 | Notify data f4 d9 bb 8c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #1 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #1: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #1 to 4294967295 after switching state | Message ID: IKE #1 skipping update_recv as MD is fake | Message ID: sent #1 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-1" #1: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.1:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #1) | 6c 47 a0 1e 4e 7a e8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 72 0a 33 22 17 06 fc fa 28 91 b3 4f 57 56 e3 | ee 34 d7 20 66 52 7a 35 d8 92 bd 3b 01 15 87 45 | 58 9b 73 12 6d c9 2d 63 ff 30 68 a3 01 b0 11 62 | 0d 6a c8 7a 26 90 7a 07 0b 27 d1 49 b8 5c b5 22 | a1 78 8f 5c ca 62 0b 66 89 cf a4 d3 28 f3 60 65 | c4 0b 09 ab 6c 65 0c 24 ce 5f 6b 9e 2d 74 21 c1 | cc dd a3 d2 b1 b2 d7 b0 e3 c8 e7 e0 b1 08 40 98 | ea 60 7f cb f6 03 0b de 16 74 c6 45 5a 5d fd 06 | 19 e0 e9 1d 81 07 89 02 31 28 9a 67 2f ad 6e 4a | 5d d5 b0 90 bd e1 d1 0c 6f c0 ca db 12 8a 57 f5 | 47 c8 09 2a 1b de 2b dc d0 ab ee bf fc be 4f ae | f0 8e 4b a7 a7 58 e9 98 9f 49 09 09 2b 4d 67 80 | 28 41 88 84 93 b4 f0 c4 d7 78 27 c0 fe b8 4a 13 | 52 ab 44 91 d1 9f f2 59 6f dd 35 3c 1e 70 9c d8 | 9d ab 34 6f 48 48 c0 46 69 91 44 bd 80 07 2d e1 | 42 55 8f bd 8c 53 47 7c 85 94 0c 8c ae 5e 19 a4 | 29 00 00 24 e7 5a 07 18 3f 34 30 d2 f0 5d 94 65 | 65 0d d9 4a 64 02 60 6e 32 ba 95 35 8b ff 59 40 | 3a 8b 9e 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 00 78 5c 8b 16 a5 c0 7d 51 c3 29 | 54 44 32 39 1b 8f 23 e8 00 00 00 1c 00 00 40 05 | 68 e9 c0 40 f1 97 39 51 93 0a 30 e5 6a bd eb d1 | f4 d9 bb 8c | state #1 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46906b40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46906b40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 | #1 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49600.262718 | resume sending helper answer for #1 suppresed complete_v2_state_transition() and stole MD | #1 spent 0.506 milliseconds in resume sending helper answer | stop processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388006900 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 47 a0 1e 4e 7a e8 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #1 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #1 | rejected packet: | 6c 47 a0 1e 4e 7a e8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #1: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-1" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-1' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-1" | stop processing: connection "road-eastnet-nonat-1" (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.0616 milliseconds in whack | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-2" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-2' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #2 at 0x557d469d5c40 | State DB: adding IKEv2 state #2 in UNDEFINED | pstats #2 ikev2.ike started | Message ID: init #2: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #2: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #2; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-2" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-2" IKE SA #2 "road-eastnet-nonat-2" "road-eastnet-nonat-2" #2: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-2 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-2": constructed local IKE proposals for road-eastnet-nonat-2 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 2 for state #2 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb388002b20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #2 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 | #2 spent 0.144 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-2" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.229 milliseconds in whack | crypto helper 2 resuming | crypto helper 2 starting work-order 2 for state #2 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 2 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 2 time elapsed 0.008436 seconds | (#2) spent 1.02 milliseconds in crypto helper computing work-order 2: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 2 for state #2 to event queue | scheduling resume sending helper answer for #2 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #2 | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 2 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #2 | **emit ISAKMP Message: | initiator cookie: | 1a 6c de c8 74 c5 fb 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-2 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7e e6 40 8d 01 9a df ee a1 21 ef 7c 27 51 b1 50 | ikev2 g^x 11 ab 49 b8 aa be 06 6f 98 06 4f a8 49 fc 42 fd | ikev2 g^x ea ae 86 e5 22 2c b5 91 3d 9f 17 1f 02 b9 b9 8d | ikev2 g^x 62 48 db a9 bf 68 b6 2a 81 1e f5 ea 96 5e fc 90 | ikev2 g^x a8 90 23 f2 fa 81 8e 8c d6 45 a8 56 67 da 61 6d | ikev2 g^x ec 8f 6b 5d aa 73 41 20 29 44 b2 20 1c ab 68 57 | ikev2 g^x 66 6f ca 43 df ea 03 70 f7 0e 47 cb 21 da 37 fa | ikev2 g^x b6 1e 94 d5 b1 5e b7 96 a4 f5 5a 22 ff b7 b7 1e | ikev2 g^x 62 65 38 93 8b 8d 44 bd 9f ea 0f 68 70 be 74 db | ikev2 g^x b6 35 f8 53 58 61 01 df be e6 bf 45 b0 94 55 ae | ikev2 g^x 5d 6b 51 98 47 dd 93 18 5c 30 93 96 42 3e 47 91 | ikev2 g^x 90 01 1e 32 64 de ec ce 38 b5 ab f8 4a 4f 0c ed | ikev2 g^x d8 fd 0a f1 53 ed ad 6b 9e c5 db 7f 6d 9f 1b e5 | ikev2 g^x 0c 7b f2 2f 6f ec 10 d1 5b 4b 71 ee 47 5f b6 1f | ikev2 g^x b0 01 08 5f 12 c2 5d 47 67 6d 8f ee c4 bf 47 5b | ikev2 g^x 6c 71 d5 40 dd 10 ef f5 69 2a fd 09 2a aa 47 a4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 31 10 28 eb fd d1 21 19 30 13 d3 a7 cd be e5 7b | IKEv2 nonce ca b3 e1 fc 00 55 31 87 01 f1 62 07 15 72 f6 55 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1a 6c de c8 74 c5 fb 40 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 02 | natd_hash: port= 01 f4 | natd_hash: hash= 24 6d fc d3 8f 25 27 03 1f 7a b6 de f8 04 ad d3 | natd_hash: hash= 88 d5 17 aa | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 24 6d fc d3 8f 25 27 03 1f 7a b6 de f8 04 ad d3 | Notify data 88 d5 17 aa | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1a 6c de c8 74 c5 fb 40 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 09 59 07 05 b4 e1 f1 0d 32 74 62 04 62 1e 48 d0 | natd_hash: hash= 7d 5b 7f 5e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 09 59 07 05 b4 e1 f1 0d 32 74 62 04 62 1e 48 d0 | Notify data 7d 5b 7f 5e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #2 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #2: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #2 to 4294967295 after switching state | Message ID: IKE #2 skipping update_recv as MD is fake | Message ID: sent #2 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-2" #2: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.2:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #2) | 1a 6c de c8 74 c5 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e e6 40 8d 01 9a df ee a1 21 ef 7c 27 51 b1 50 | 11 ab 49 b8 aa be 06 6f 98 06 4f a8 49 fc 42 fd | ea ae 86 e5 22 2c b5 91 3d 9f 17 1f 02 b9 b9 8d | 62 48 db a9 bf 68 b6 2a 81 1e f5 ea 96 5e fc 90 | a8 90 23 f2 fa 81 8e 8c d6 45 a8 56 67 da 61 6d | ec 8f 6b 5d aa 73 41 20 29 44 b2 20 1c ab 68 57 | 66 6f ca 43 df ea 03 70 f7 0e 47 cb 21 da 37 fa | b6 1e 94 d5 b1 5e b7 96 a4 f5 5a 22 ff b7 b7 1e | 62 65 38 93 8b 8d 44 bd 9f ea 0f 68 70 be 74 db | b6 35 f8 53 58 61 01 df be e6 bf 45 b0 94 55 ae | 5d 6b 51 98 47 dd 93 18 5c 30 93 96 42 3e 47 91 | 90 01 1e 32 64 de ec ce 38 b5 ab f8 4a 4f 0c ed | d8 fd 0a f1 53 ed ad 6b 9e c5 db 7f 6d 9f 1b e5 | 0c 7b f2 2f 6f ec 10 d1 5b 4b 71 ee 47 5f b6 1f | b0 01 08 5f 12 c2 5d 47 67 6d 8f ee c4 bf 47 5b | 6c 71 d5 40 dd 10 ef f5 69 2a fd 09 2a aa 47 a4 | 29 00 00 24 31 10 28 eb fd d1 21 19 30 13 d3 a7 | cd be e5 7b ca b3 e1 fc 00 55 31 87 01 f1 62 07 | 15 72 f6 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 6d fc d3 8f 25 27 03 1f 7a b6 de | f8 04 ad d3 88 d5 17 aa 00 00 00 1c 00 00 40 05 | 09 59 07 05 b4 e1 f1 0d 32 74 62 04 62 1e 48 d0 | 7d 5b 7f 5e | state #2 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb388002b20 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #2 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 | #2 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49600.521158 | resume sending helper answer for #2 suppresed complete_v2_state_transition() and stole MD | #2 spent 0.488 milliseconds in resume sending helper answer | stop processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb380006900 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 6c de c8 74 c5 fb 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #2 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #2 | rejected packet: | 1a 6c de c8 74 c5 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #2: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0641 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-3" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-3' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #3 at 0x557d469d8810 | State DB: adding IKEv2 state #3 in UNDEFINED | pstats #3 ikev2.ike started | Message ID: init #3: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #3: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #3; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-3" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-3" IKE SA #3 "road-eastnet-nonat-3" "road-eastnet-nonat-3" #3: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-3 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-3": constructed local IKE proposals for road-eastnet-nonat-3 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 3 for state #3 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb380002b20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #3 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 | #3 spent 0.141 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-3" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.231 milliseconds in whack | crypto helper 0 resuming | crypto helper 0 starting work-order 3 for state #3 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 3 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 3 time elapsed 0.000985 seconds | (#3) spent 0.992 milliseconds in crypto helper computing work-order 3: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 3 for state #3 to event queue | scheduling resume sending helper answer for #3 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 | libevent_realloc: release ptr-libevent@0x557d468e1670 | libevent_realloc: new ptr-libevent@0x557d469d92d0 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #3 | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 3 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #3 | **emit ISAKMP Message: | initiator cookie: | 81 44 b6 c8 2a 40 ce 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-3 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f9 54 15 6a 8c 9d d0 48 d6 59 e5 e2 2e a9 83 c3 | ikev2 g^x a8 ba 16 88 07 d6 11 91 3a 48 ca 9a fe dc 40 cc | ikev2 g^x 29 63 c0 dc 38 80 92 c8 fd f6 81 d3 d8 66 94 3d | ikev2 g^x c5 2d e7 b1 2b da e7 bc 78 d1 e4 dc 9a 41 8c 14 | ikev2 g^x c6 fb cd 2a 97 af ef ad 23 32 6d 6d f8 fa b5 27 | ikev2 g^x 9e 41 35 14 10 3b f6 98 c8 8f d3 aa de fa 55 91 | ikev2 g^x cb c5 c0 43 8b 3e 66 29 8a ce 63 ed 04 d9 5e 36 | ikev2 g^x d1 ee b2 55 32 92 26 8a 60 a1 e6 8a c1 81 34 3b | ikev2 g^x fe bb 92 45 5e 07 2a fa 53 4e 52 04 9a fe 49 14 | ikev2 g^x 7b 7a a1 34 68 ab 79 c6 b1 5b 9e 7d ee f2 e3 2b | ikev2 g^x b4 f7 cd 72 14 0a 7e 40 88 1b b7 27 4f cc 0e 08 | ikev2 g^x a7 a7 14 77 d4 62 20 1a 96 bd a4 9c 9c c7 ed e3 | ikev2 g^x be 59 87 38 e7 1a a8 83 a8 52 47 62 89 d6 f0 d1 | ikev2 g^x ce 49 83 2a 83 87 c7 c7 2e 90 40 05 a6 4e c5 26 | ikev2 g^x bd c4 1e e7 34 ac 09 b9 70 d9 7f 32 91 1c d9 7b | ikev2 g^x 01 ed eb 14 c7 ff 07 8b 68 87 79 fe ab f8 54 a7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce af 67 2a 08 9a 9a ad ff 86 6c 03 06 6f 2f 6b af | IKEv2 nonce d5 26 d4 77 40 17 03 25 58 a0 84 c4 14 b9 e1 2b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 81 44 b6 c8 2a 40 ce 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 03 | natd_hash: port= 01 f4 | natd_hash: hash= c8 4b 9f 22 64 ba ce 64 1d b6 f5 ba 24 33 ca 6e | natd_hash: hash= b0 87 4a 02 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c8 4b 9f 22 64 ba ce 64 1d b6 f5 ba 24 33 ca 6e | Notify data b0 87 4a 02 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 81 44 b6 c8 2a 40 ce 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 8e b1 42 d9 c7 63 9c 7b 3d 57 a7 c1 0c 5d 8c 4c | natd_hash: hash= 33 59 3d db | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8e b1 42 d9 c7 63 9c 7b 3d 57 a7 c1 0c 5d 8c 4c | Notify data 33 59 3d db | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #3 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #3: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #3 to 4294967295 after switching state | Message ID: IKE #3 skipping update_recv as MD is fake | Message ID: sent #3 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-3" #3: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.3:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #3) | 81 44 b6 c8 2a 40 ce 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 54 15 6a 8c 9d d0 48 d6 59 e5 e2 2e a9 83 c3 | a8 ba 16 88 07 d6 11 91 3a 48 ca 9a fe dc 40 cc | 29 63 c0 dc 38 80 92 c8 fd f6 81 d3 d8 66 94 3d | c5 2d e7 b1 2b da e7 bc 78 d1 e4 dc 9a 41 8c 14 | c6 fb cd 2a 97 af ef ad 23 32 6d 6d f8 fa b5 27 | 9e 41 35 14 10 3b f6 98 c8 8f d3 aa de fa 55 91 | cb c5 c0 43 8b 3e 66 29 8a ce 63 ed 04 d9 5e 36 | d1 ee b2 55 32 92 26 8a 60 a1 e6 8a c1 81 34 3b | fe bb 92 45 5e 07 2a fa 53 4e 52 04 9a fe 49 14 | 7b 7a a1 34 68 ab 79 c6 b1 5b 9e 7d ee f2 e3 2b | b4 f7 cd 72 14 0a 7e 40 88 1b b7 27 4f cc 0e 08 | a7 a7 14 77 d4 62 20 1a 96 bd a4 9c 9c c7 ed e3 | be 59 87 38 e7 1a a8 83 a8 52 47 62 89 d6 f0 d1 | ce 49 83 2a 83 87 c7 c7 2e 90 40 05 a6 4e c5 26 | bd c4 1e e7 34 ac 09 b9 70 d9 7f 32 91 1c d9 7b | 01 ed eb 14 c7 ff 07 8b 68 87 79 fe ab f8 54 a7 | 29 00 00 24 af 67 2a 08 9a 9a ad ff 86 6c 03 06 | 6f 2f 6b af d5 26 d4 77 40 17 03 25 58 a0 84 c4 | 14 b9 e1 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 4b 9f 22 64 ba ce 64 1d b6 f5 ba | 24 33 ca 6e b0 87 4a 02 00 00 00 1c 00 00 40 05 | 8e b1 42 d9 c7 63 9c 7b 3d 57 a7 c1 0c 5d 8c 4c | 33 59 3d db | state #3 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb380002b20 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #3 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 | #3 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49600.668943 | resume sending helper answer for #3 suppresed complete_v2_state_transition() and stole MD | #3 spent 0.467 milliseconds in resume sending helper answer | stop processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb384006900 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 44 b6 c8 2a 40 ce 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #3 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #3 | rejected packet: | 81 44 b6 c8 2a 40 ce 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #3: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46906b40 | handling event EVENT_RETRANSMIT for parent state #1 | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #1 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #1 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49600.764108; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50139 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #1 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-1" #1: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #1) | 6c 47 a0 1e 4e 7a e8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 72 0a 33 22 17 06 fc fa 28 91 b3 4f 57 56 e3 | ee 34 d7 20 66 52 7a 35 d8 92 bd 3b 01 15 87 45 | 58 9b 73 12 6d c9 2d 63 ff 30 68 a3 01 b0 11 62 | 0d 6a c8 7a 26 90 7a 07 0b 27 d1 49 b8 5c b5 22 | a1 78 8f 5c ca 62 0b 66 89 cf a4 d3 28 f3 60 65 | c4 0b 09 ab 6c 65 0c 24 ce 5f 6b 9e 2d 74 21 c1 | cc dd a3 d2 b1 b2 d7 b0 e3 c8 e7 e0 b1 08 40 98 | ea 60 7f cb f6 03 0b de 16 74 c6 45 5a 5d fd 06 | 19 e0 e9 1d 81 07 89 02 31 28 9a 67 2f ad 6e 4a | 5d d5 b0 90 bd e1 d1 0c 6f c0 ca db 12 8a 57 f5 | 47 c8 09 2a 1b de 2b dc d0 ab ee bf fc be 4f ae | f0 8e 4b a7 a7 58 e9 98 9f 49 09 09 2b 4d 67 80 | 28 41 88 84 93 b4 f0 c4 d7 78 27 c0 fe b8 4a 13 | 52 ab 44 91 d1 9f f2 59 6f dd 35 3c 1e 70 9c d8 | 9d ab 34 6f 48 48 c0 46 69 91 44 bd 80 07 2d e1 | 42 55 8f bd 8c 53 47 7c 85 94 0c 8c ae 5e 19 a4 | 29 00 00 24 e7 5a 07 18 3f 34 30 d2 f0 5d 94 65 | 65 0d d9 4a 64 02 60 6e 32 ba 95 35 8b ff 59 40 | 3a 8b 9e 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 00 78 5c 8b 16 a5 c0 7d 51 c3 29 | 54 44 32 39 1b 8f 23 e8 00 00 00 1c 00 00 40 05 | 68 e9 c0 40 f1 97 39 51 93 0a 30 e5 6a bd eb d1 | f4 d9 bb 8c | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46906b40 | #1 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 47 a0 1e 4e 7a e8 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #1 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #1 | rejected packet: | 6c 47 a0 1e 4e 7a e8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #1: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0701 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-4" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-4' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #4 at 0x557d469db0d0 | State DB: adding IKEv2 state #4 in UNDEFINED | pstats #4 ikev2.ike started | Message ID: init #4: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #4: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #4; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-4" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-4" IKE SA #4 "road-eastnet-nonat-4" "road-eastnet-nonat-4" #4: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-4 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-4": constructed local IKE proposals for road-eastnet-nonat-4 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 4 for state #4 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46906b40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #4 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 | #4 spent 0.144 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-4" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.239 milliseconds in whack | crypto helper 9 resuming | crypto helper 9 starting work-order 4 for state #4 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 4 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 4 time elapsed 0.001011 seconds | (#4) spent 1.02 milliseconds in crypto helper computing work-order 4: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 4 for state #4 to event queue | scheduling resume sending helper answer for #4 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #4 | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 4 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #4 | **emit ISAKMP Message: | initiator cookie: | 9f e3 9d 02 77 44 b7 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-4 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 99 12 be 82 37 05 d2 52 25 54 17 1c 7e a4 e7 a1 | ikev2 g^x 7e a3 9e 01 f0 c9 5e f6 79 14 37 d9 ec ef 3e 7b | ikev2 g^x d6 12 38 d8 73 16 9f 73 2c 17 04 25 c3 08 1e 06 | ikev2 g^x d4 99 19 15 32 45 9a a7 b4 d5 ad 96 4d 41 dc 91 | ikev2 g^x 4d c8 05 99 28 4b a0 e8 08 9f f7 76 6e 87 6e f0 | ikev2 g^x e8 58 e3 c1 70 13 6f 8d cd 7f 4b 91 ab b0 98 2b | ikev2 g^x 80 11 c8 ef d5 8f f3 5b b1 1f e0 43 de 0c 0e b1 | ikev2 g^x 13 32 29 e5 dd ca fb b5 e8 02 d1 3b 1d 9e 4d 95 | ikev2 g^x 8d f8 b1 fd 7f db 1b 37 33 cf 99 72 de f0 e3 79 | ikev2 g^x 73 e7 61 a0 9f 73 96 2a c8 d9 3f f2 5e 93 fa f5 | ikev2 g^x 10 3a 62 6a 38 cd 93 3a 9f a8 56 7d f2 c3 ee 21 | ikev2 g^x b5 e7 1b 68 51 3a 6c 80 5b ad 50 8d 16 63 1e 8c | ikev2 g^x 65 d8 ef 12 42 db b7 45 7e c0 09 e7 f6 56 5d da | ikev2 g^x d8 52 c7 89 46 5c ed c7 24 ca 60 5c ff 30 28 b2 | ikev2 g^x a1 94 8c ec d2 08 2c a4 8a 1d a2 db fd 97 89 ac | ikev2 g^x cf d6 3b e3 0f 35 26 7e 4f b9 c8 b0 82 f2 80 6e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ff 8a 31 04 ed 0e 73 16 f9 33 92 87 63 96 e9 90 | IKEv2 nonce 5e 3a 90 66 d0 c2 86 27 40 23 58 23 51 d5 8c f2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9f e3 9d 02 77 44 b7 66 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 04 | natd_hash: port= 01 f4 | natd_hash: hash= 8e 57 40 bb 9d 01 b2 e8 79 26 d3 b2 9e 9a c3 98 | natd_hash: hash= 03 95 6b f7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8e 57 40 bb 9d 01 b2 e8 79 26 d3 b2 9e 9a c3 98 | Notify data 03 95 6b f7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9f e3 9d 02 77 44 b7 66 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 19 68 23 54 27 85 e7 5a 70 ec 13 67 75 7a 20 68 | natd_hash: hash= 80 f1 f5 99 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 19 68 23 54 27 85 e7 5a 70 ec 13 67 75 7a 20 68 | Notify data 80 f1 f5 99 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #4 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #4: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #4 to 4294967295 after switching state | Message ID: IKE #4 skipping update_recv as MD is fake | Message ID: sent #4 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-4" #4: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.4:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #4) | 9f e3 9d 02 77 44 b7 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 12 be 82 37 05 d2 52 25 54 17 1c 7e a4 e7 a1 | 7e a3 9e 01 f0 c9 5e f6 79 14 37 d9 ec ef 3e 7b | d6 12 38 d8 73 16 9f 73 2c 17 04 25 c3 08 1e 06 | d4 99 19 15 32 45 9a a7 b4 d5 ad 96 4d 41 dc 91 | 4d c8 05 99 28 4b a0 e8 08 9f f7 76 6e 87 6e f0 | e8 58 e3 c1 70 13 6f 8d cd 7f 4b 91 ab b0 98 2b | 80 11 c8 ef d5 8f f3 5b b1 1f e0 43 de 0c 0e b1 | 13 32 29 e5 dd ca fb b5 e8 02 d1 3b 1d 9e 4d 95 | 8d f8 b1 fd 7f db 1b 37 33 cf 99 72 de f0 e3 79 | 73 e7 61 a0 9f 73 96 2a c8 d9 3f f2 5e 93 fa f5 | 10 3a 62 6a 38 cd 93 3a 9f a8 56 7d f2 c3 ee 21 | b5 e7 1b 68 51 3a 6c 80 5b ad 50 8d 16 63 1e 8c | 65 d8 ef 12 42 db b7 45 7e c0 09 e7 f6 56 5d da | d8 52 c7 89 46 5c ed c7 24 ca 60 5c ff 30 28 b2 | a1 94 8c ec d2 08 2c a4 8a 1d a2 db fd 97 89 ac | cf d6 3b e3 0f 35 26 7e 4f b9 c8 b0 82 f2 80 6e | 29 00 00 24 ff 8a 31 04 ed 0e 73 16 f9 33 92 87 | 63 96 e9 90 5e 3a 90 66 d0 c2 86 27 40 23 58 23 | 51 d5 8c f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 57 40 bb 9d 01 b2 e8 79 26 d3 b2 | 9e 9a c3 98 03 95 6b f7 00 00 00 1c 00 00 40 05 | 19 68 23 54 27 85 e7 5a 70 ec 13 67 75 7a 20 68 | 80 f1 f5 99 | state #4 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46906b40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46906b40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #4 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 | #4 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49600.813508 | resume sending helper answer for #4 suppresed complete_v2_state_transition() and stole MD | #4 spent 0.482 milliseconds in resume sending helper answer | stop processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb378009640 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f e3 9d 02 77 44 b7 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #4 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #4 | rejected packet: | 9f e3 9d 02 77 44 b7 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #4: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-5" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-5' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #5 at 0x557d469dbfa0 | State DB: adding IKEv2 state #5 in UNDEFINED | pstats #5 ikev2.ike started | Message ID: init #5: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #5: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #5; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-5" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-5" IKE SA #5 "road-eastnet-nonat-5" "road-eastnet-nonat-5" #5: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-5 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-5": constructed local IKE proposals for road-eastnet-nonat-5 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 5 for state #5 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb378005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #5 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 | #5 spent 0.136 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-5" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.217 milliseconds in whack | crypto helper 10 resuming | crypto helper 10 starting work-order 5 for state #5 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 5 | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 5 time elapsed 0.001483 seconds | (#5) spent 1.02 milliseconds in crypto helper computing work-order 5: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 5 for state #5 to event queue | scheduling resume sending helper answer for #5 | libevent_malloc: new ptr-libevent@0x7fb37c009640 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #5 | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 5 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #5 | **emit ISAKMP Message: | initiator cookie: | 83 a8 82 4c 6a b9 9b 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-5 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 48 f2 6a ba 4d 4c f4 ca d6 76 c6 37 a4 fc c6 08 | ikev2 g^x 03 3e 5e e8 b3 56 67 2c ed e0 33 33 68 d8 a5 17 | ikev2 g^x c5 ad 89 58 8b 66 c2 c6 28 95 15 86 95 42 17 c5 | ikev2 g^x 43 6b d6 1b 90 e3 ce 5a 73 0f aa 25 80 ef 21 ed | ikev2 g^x 95 16 dc 62 db 9c 9c f1 05 8d 7b ad 88 fd 8e 82 | ikev2 g^x 62 66 a4 5c 00 db 53 d1 2c ac b4 13 62 a5 17 eb | ikev2 g^x 3f 3a 4e bc 42 77 a1 e8 e1 8a 0f 63 81 66 10 64 | ikev2 g^x 10 0d 86 9e 89 34 85 5c 5f 55 4a cb 5a 29 86 16 | ikev2 g^x 42 90 ac 93 0b a7 fb e8 a5 4a 23 43 d7 02 e6 fe | ikev2 g^x c6 7b a9 b3 68 72 59 2e 24 fd 0c 7f 98 b0 6f 9f | ikev2 g^x bb aa 48 ce f6 ec 36 99 c2 bc 70 c4 81 9e 1c 55 | ikev2 g^x 65 47 9c 55 e0 d5 f3 7e 77 c4 a5 f3 6e 82 b5 1c | ikev2 g^x 5c 56 a1 3a b8 57 69 f9 25 e2 ae ed 66 c5 c1 3d | ikev2 g^x f8 ca 2e 2b 1c 6e 27 f2 e3 ed 73 79 be b7 90 0f | ikev2 g^x cb 45 38 5f bb 3a e3 c2 44 15 72 9c 24 d0 bd 4e | ikev2 g^x fa c4 ea 53 31 95 57 c9 dc a4 ff 15 7a 28 e4 1a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 13 3d aa 25 dd 95 48 ab fd a8 d2 56 6c 28 74 71 | IKEv2 nonce 5d 45 11 19 10 09 0a f3 46 e9 c4 b3 56 85 8c 76 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 83 a8 82 4c 6a b9 9b 96 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 05 | natd_hash: port= 01 f4 | natd_hash: hash= bb 69 2e cb ee d3 68 5b 1c f0 7d a0 26 ce 80 e4 | natd_hash: hash= bd 02 f5 15 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bb 69 2e cb ee d3 68 5b 1c f0 7d a0 26 ce 80 e4 | Notify data bd 02 f5 15 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 83 a8 82 4c 6a b9 9b 96 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1b de 40 93 48 c5 33 61 5d a6 1a 99 ad 20 57 85 | natd_hash: hash= b1 bf 8b 0c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b de 40 93 48 c5 33 61 5d a6 1a 99 ad 20 57 85 | Notify data b1 bf 8b 0c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #5 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #5: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #5 to 4294967295 after switching state | Message ID: IKE #5 skipping update_recv as MD is fake | Message ID: sent #5 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-5" #5: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.5:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #5) | 83 a8 82 4c 6a b9 9b 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 f2 6a ba 4d 4c f4 ca d6 76 c6 37 a4 fc c6 08 | 03 3e 5e e8 b3 56 67 2c ed e0 33 33 68 d8 a5 17 | c5 ad 89 58 8b 66 c2 c6 28 95 15 86 95 42 17 c5 | 43 6b d6 1b 90 e3 ce 5a 73 0f aa 25 80 ef 21 ed | 95 16 dc 62 db 9c 9c f1 05 8d 7b ad 88 fd 8e 82 | 62 66 a4 5c 00 db 53 d1 2c ac b4 13 62 a5 17 eb | 3f 3a 4e bc 42 77 a1 e8 e1 8a 0f 63 81 66 10 64 | 10 0d 86 9e 89 34 85 5c 5f 55 4a cb 5a 29 86 16 | 42 90 ac 93 0b a7 fb e8 a5 4a 23 43 d7 02 e6 fe | c6 7b a9 b3 68 72 59 2e 24 fd 0c 7f 98 b0 6f 9f | bb aa 48 ce f6 ec 36 99 c2 bc 70 c4 81 9e 1c 55 | 65 47 9c 55 e0 d5 f3 7e 77 c4 a5 f3 6e 82 b5 1c | 5c 56 a1 3a b8 57 69 f9 25 e2 ae ed 66 c5 c1 3d | f8 ca 2e 2b 1c 6e 27 f2 e3 ed 73 79 be b7 90 0f | cb 45 38 5f bb 3a e3 c2 44 15 72 9c 24 d0 bd 4e | fa c4 ea 53 31 95 57 c9 dc a4 ff 15 7a 28 e4 1a | 29 00 00 24 13 3d aa 25 dd 95 48 ab fd a8 d2 56 | 6c 28 74 71 5d 45 11 19 10 09 0a f3 46 e9 c4 b3 | 56 85 8c 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bb 69 2e cb ee d3 68 5b 1c f0 7d a0 | 26 ce 80 e4 bd 02 f5 15 00 00 00 1c 00 00 40 05 | 1b de 40 93 48 c5 33 61 5d a6 1a 99 ad 20 57 85 | b1 bf 8b 0c | state #5 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb378005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #5 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 | #5 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49600.930371 | resume sending helper answer for #5 suppresed complete_v2_state_transition() and stole MD | #5 spent 0.48 milliseconds in resume sending helper answer | stop processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c009640 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 a8 82 4c 6a b9 9b 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #5 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #5 | rejected packet: | 83 a8 82 4c 6a b9 9b 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #5: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0603 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-6" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-6' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #6 at 0x557d469dd0d0 | State DB: adding IKEv2 state #6 in UNDEFINED | pstats #6 ikev2.ike started | Message ID: init #6: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #6: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #6; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-6" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-6" IKE SA #6 "road-eastnet-nonat-6" "road-eastnet-nonat-6" #6: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-6 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-6": constructed local IKE proposals for road-eastnet-nonat-6 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 6 for state #6 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #6 | libevent_malloc: new ptr-libevent@0x7fb37c009640 size 128 | crypto helper 14 resuming | #6 spent 0.139 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-6" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.245 milliseconds in whack | crypto helper 14 starting work-order 6 for state #6 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 6 | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 6 time elapsed 0.001003 seconds | (#6) spent 1.01 milliseconds in crypto helper computing work-order 6: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 6 for state #6 to event queue | scheduling resume sending helper answer for #6 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #6 | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 6 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #6 | **emit ISAKMP Message: | initiator cookie: | 2c 27 82 3a c6 31 e5 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-6 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5f e3 1c 46 2f 61 c1 a4 57 04 b2 32 f2 da 47 30 | ikev2 g^x c5 f1 b2 8c 52 8c bd 20 1e 07 9a 1f 74 e3 50 fd | ikev2 g^x 03 ad cd d6 6e b2 e0 ed 18 de c6 cf db 53 d8 91 | ikev2 g^x 57 59 05 93 13 39 ca c4 cd bf 1d c1 99 f1 ea ab | ikev2 g^x d7 0d 4d 84 1a b9 23 c8 19 a7 00 fc 45 cd 28 de | ikev2 g^x 1b 23 11 46 b2 a5 20 88 7d a8 2e 93 69 c4 77 be | ikev2 g^x 7d 08 db 5c 91 33 d0 aa e2 d7 27 ba c6 03 59 3c | ikev2 g^x 8a b9 c7 4b aa b0 c2 31 f9 3d af 03 a0 d0 38 f5 | ikev2 g^x 81 cf 2e 3b 37 ea b5 50 38 0b b5 3b be c1 ac 52 | ikev2 g^x d4 bd 41 74 e3 b0 cc da 00 70 a4 c8 a9 ae 2b 0c | ikev2 g^x 84 70 b9 c2 c8 dd e4 ca c8 d6 7a 14 75 f2 9f ca | ikev2 g^x f3 8a 9e fb 56 2f 7b 5f 34 ab 29 a4 eb 5d 7a 01 | ikev2 g^x af 1d 55 9d 0e 4d 00 2f f9 2a c8 90 cf 50 fe a3 | ikev2 g^x 20 3f bc dc b3 d6 01 f7 dd dc c1 b1 72 f5 58 73 | ikev2 g^x b8 72 e4 a9 88 17 39 c5 a4 43 c8 df b5 2f 8d cd | ikev2 g^x 75 f3 2c cf e2 85 8e ce 7f c9 07 83 41 8f 33 7b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce aa 55 22 5c 95 3a 98 8a 23 4e 55 f5 f2 5b 2d e6 | IKEv2 nonce 0f d6 a3 fc b7 39 7f a3 84 04 6c 99 b3 1f 01 c8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 2c 27 82 3a c6 31 e5 a1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 06 | natd_hash: port= 01 f4 | natd_hash: hash= dd d8 7d b0 3b ed a4 77 8e 72 bc 87 11 c3 4a b5 | natd_hash: hash= 09 51 99 2e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dd d8 7d b0 3b ed a4 77 8e 72 bc 87 11 c3 4a b5 | Notify data 09 51 99 2e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 2c 27 82 3a c6 31 e5 a1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 3b ee 43 00 bb c4 11 7e a6 6d 91 83 5e ff b0 fd | natd_hash: hash= ab 20 73 91 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3b ee 43 00 bb c4 11 7e a6 6d 91 83 5e ff b0 fd | Notify data ab 20 73 91 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #6 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #6: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #6 to 4294967295 after switching state | Message ID: IKE #6 skipping update_recv as MD is fake | Message ID: sent #6 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-6" #6: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.6:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #6) | 2c 27 82 3a c6 31 e5 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f e3 1c 46 2f 61 c1 a4 57 04 b2 32 f2 da 47 30 | c5 f1 b2 8c 52 8c bd 20 1e 07 9a 1f 74 e3 50 fd | 03 ad cd d6 6e b2 e0 ed 18 de c6 cf db 53 d8 91 | 57 59 05 93 13 39 ca c4 cd bf 1d c1 99 f1 ea ab | d7 0d 4d 84 1a b9 23 c8 19 a7 00 fc 45 cd 28 de | 1b 23 11 46 b2 a5 20 88 7d a8 2e 93 69 c4 77 be | 7d 08 db 5c 91 33 d0 aa e2 d7 27 ba c6 03 59 3c | 8a b9 c7 4b aa b0 c2 31 f9 3d af 03 a0 d0 38 f5 | 81 cf 2e 3b 37 ea b5 50 38 0b b5 3b be c1 ac 52 | d4 bd 41 74 e3 b0 cc da 00 70 a4 c8 a9 ae 2b 0c | 84 70 b9 c2 c8 dd e4 ca c8 d6 7a 14 75 f2 9f ca | f3 8a 9e fb 56 2f 7b 5f 34 ab 29 a4 eb 5d 7a 01 | af 1d 55 9d 0e 4d 00 2f f9 2a c8 90 cf 50 fe a3 | 20 3f bc dc b3 d6 01 f7 dd dc c1 b1 72 f5 58 73 | b8 72 e4 a9 88 17 39 c5 a4 43 c8 df b5 2f 8d cd | 75 f3 2c cf e2 85 8e ce 7f c9 07 83 41 8f 33 7b | 29 00 00 24 aa 55 22 5c 95 3a 98 8a 23 4e 55 f5 | f2 5b 2d e6 0f d6 a3 fc b7 39 7f a3 84 04 6c 99 | b3 1f 01 c8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd d8 7d b0 3b ed a4 77 8e 72 bc 87 | 11 c3 4a b5 09 51 99 2e 00 00 00 1c 00 00 40 05 | 3b ee 43 00 bb c4 11 7e a6 6d 91 83 5e ff b0 fd | ab 20 73 91 | state #6 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #6 | libevent_malloc: new ptr-libevent@0x7fb37c009640 size 128 | #6 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49601.010967 | resume sending helper answer for #6 suppresed complete_v2_state_transition() and stole MD | #6 spent 0.499 milliseconds in resume sending helper answer | stop processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb370009640 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c 27 82 3a c6 31 e5 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #6 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #6 | rejected packet: | 2c 27 82 3a c6 31 e5 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #6: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.069 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #2 | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #2 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #2 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49601.023487; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.502329 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #2 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 "road-eastnet-nonat-2" #2: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #2) | 1a 6c de c8 74 c5 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e e6 40 8d 01 9a df ee a1 21 ef 7c 27 51 b1 50 | 11 ab 49 b8 aa be 06 6f 98 06 4f a8 49 fc 42 fd | ea ae 86 e5 22 2c b5 91 3d 9f 17 1f 02 b9 b9 8d | 62 48 db a9 bf 68 b6 2a 81 1e f5 ea 96 5e fc 90 | a8 90 23 f2 fa 81 8e 8c d6 45 a8 56 67 da 61 6d | ec 8f 6b 5d aa 73 41 20 29 44 b2 20 1c ab 68 57 | 66 6f ca 43 df ea 03 70 f7 0e 47 cb 21 da 37 fa | b6 1e 94 d5 b1 5e b7 96 a4 f5 5a 22 ff b7 b7 1e | 62 65 38 93 8b 8d 44 bd 9f ea 0f 68 70 be 74 db | b6 35 f8 53 58 61 01 df be e6 bf 45 b0 94 55 ae | 5d 6b 51 98 47 dd 93 18 5c 30 93 96 42 3e 47 91 | 90 01 1e 32 64 de ec ce 38 b5 ab f8 4a 4f 0c ed | d8 fd 0a f1 53 ed ad 6b 9e c5 db 7f 6d 9f 1b e5 | 0c 7b f2 2f 6f ec 10 d1 5b 4b 71 ee 47 5f b6 1f | b0 01 08 5f 12 c2 5d 47 67 6d 8f ee c4 bf 47 5b | 6c 71 d5 40 dd 10 ef f5 69 2a fd 09 2a aa 47 a4 | 29 00 00 24 31 10 28 eb fd d1 21 19 30 13 d3 a7 | cd be e5 7b ca b3 e1 fc 00 55 31 87 01 f1 62 07 | 15 72 f6 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 6d fc d3 8f 25 27 03 1f 7a b6 de | f8 04 ad d3 88 d5 17 aa 00 00 00 1c 00 00 40 05 | 09 59 07 05 b4 e1 f1 0d 32 74 62 04 62 1e 48 d0 | 7d 5b 7f 5e | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #2 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 6c de c8 74 c5 fb 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #2 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #2 | rejected packet: | 1a 6c de c8 74 c5 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #2: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0732 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-7" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-7' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #7 at 0x557d469de4c0 | State DB: adding IKEv2 state #7 in UNDEFINED | pstats #7 ikev2.ike started | Message ID: init #7: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #7: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #7; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-7" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-7" IKE SA #7 "road-eastnet-nonat-7" "road-eastnet-nonat-7" #7: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-7 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-7": constructed local IKE proposals for road-eastnet-nonat-7 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 7 for state #7 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb388002b20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #7 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 | #7 spent 0.145 milliseconds in ikev2_parent_outI1() | crypto helper 15 resuming | crypto helper 15 starting work-order 7 for state #7 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 7 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-7" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.242 milliseconds in whack | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 7 time elapsed 0.000994 seconds | (#7) spent 0.999 milliseconds in crypto helper computing work-order 7: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 7 for state #7 to event queue | scheduling resume sending helper answer for #7 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #7 | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 7 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #7 | **emit ISAKMP Message: | initiator cookie: | df 0f 9a c7 72 fc c7 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-7 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5b 16 59 37 af 9b 5a d1 22 e5 b7 89 f5 29 0b b4 | ikev2 g^x f8 e5 4b 2e 70 7a c8 bc f1 ab 2a 61 eb 02 ca fa | ikev2 g^x a3 75 2e 7e 2d d5 25 c9 fa fb 53 11 81 f8 e7 7c | ikev2 g^x 35 1a 09 cf c2 a1 7a e6 ba 83 f5 ea 71 c2 29 ca | ikev2 g^x 29 da 7e bf 99 10 95 66 d2 23 d8 4f 49 2f bd 63 | ikev2 g^x 11 b8 e1 71 39 92 a3 a7 60 6b 7a e8 94 6f c6 09 | ikev2 g^x 3e 44 50 a7 14 dd 81 7d 4c 7f 80 8c 35 65 97 9c | ikev2 g^x b1 11 76 e7 2a ca 44 b5 84 ae 8b 5a 9b fd ff 0d | ikev2 g^x 19 d8 e9 75 5a 70 67 71 dc 0e 22 08 1b 97 e2 25 | ikev2 g^x ad 6c 4c 80 de ff 3e 29 34 2a 32 fa 3b 41 ab 38 | ikev2 g^x c8 2c a4 db 1f 4a 62 fb 24 ff ed 13 44 3e 4c cb | ikev2 g^x a1 99 52 bb 30 b7 29 d8 9d 52 b8 4d 90 9d ab aa | ikev2 g^x c0 57 68 4e 57 cb d7 d7 cc 96 2c bc 75 0c 87 f5 | ikev2 g^x 9c 71 0b 3a 29 74 b7 e2 7f 5e 8b 9f 17 4e 89 84 | ikev2 g^x da f8 88 1c 69 02 1c 1f 41 83 de df 0e 7e 58 56 | ikev2 g^x 61 84 83 da 8c c8 98 f6 a7 9f db ce b7 aa a6 bc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9d 55 08 62 c0 73 1e 47 79 75 2c 10 4a ab 88 17 | IKEv2 nonce 80 18 91 8e 0d 3b 8f 21 a0 4a c9 52 dc 93 16 cf | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= df 0f 9a c7 72 fc c7 38 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 07 | natd_hash: port= 01 f4 | natd_hash: hash= 2e cd 5f ad 94 80 bb 48 49 e9 a2 c8 76 8b 7e e8 | natd_hash: hash= 6f 59 19 d9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2e cd 5f ad 94 80 bb 48 49 e9 a2 c8 76 8b 7e e8 | Notify data 6f 59 19 d9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= df 0f 9a c7 72 fc c7 38 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2f 3e df 6a 16 4a bb 95 81 15 e0 c0 73 52 29 fa | natd_hash: hash= 60 85 d2 fd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2f 3e df 6a 16 4a bb 95 81 15 e0 c0 73 52 29 fa | Notify data 60 85 d2 fd | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #7 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #7: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #7 to 4294967295 after switching state | Message ID: IKE #7 skipping update_recv as MD is fake | Message ID: sent #7 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-7" #7: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.7:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #7) | df 0f 9a c7 72 fc c7 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 16 59 37 af 9b 5a d1 22 e5 b7 89 f5 29 0b b4 | f8 e5 4b 2e 70 7a c8 bc f1 ab 2a 61 eb 02 ca fa | a3 75 2e 7e 2d d5 25 c9 fa fb 53 11 81 f8 e7 7c | 35 1a 09 cf c2 a1 7a e6 ba 83 f5 ea 71 c2 29 ca | 29 da 7e bf 99 10 95 66 d2 23 d8 4f 49 2f bd 63 | 11 b8 e1 71 39 92 a3 a7 60 6b 7a e8 94 6f c6 09 | 3e 44 50 a7 14 dd 81 7d 4c 7f 80 8c 35 65 97 9c | b1 11 76 e7 2a ca 44 b5 84 ae 8b 5a 9b fd ff 0d | 19 d8 e9 75 5a 70 67 71 dc 0e 22 08 1b 97 e2 25 | ad 6c 4c 80 de ff 3e 29 34 2a 32 fa 3b 41 ab 38 | c8 2c a4 db 1f 4a 62 fb 24 ff ed 13 44 3e 4c cb | a1 99 52 bb 30 b7 29 d8 9d 52 b8 4d 90 9d ab aa | c0 57 68 4e 57 cb d7 d7 cc 96 2c bc 75 0c 87 f5 | 9c 71 0b 3a 29 74 b7 e2 7f 5e 8b 9f 17 4e 89 84 | da f8 88 1c 69 02 1c 1f 41 83 de df 0e 7e 58 56 | 61 84 83 da 8c c8 98 f6 a7 9f db ce b7 aa a6 bc | 29 00 00 24 9d 55 08 62 c0 73 1e 47 79 75 2c 10 | 4a ab 88 17 80 18 91 8e 0d 3b 8f 21 a0 4a c9 52 | dc 93 16 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e cd 5f ad 94 80 bb 48 49 e9 a2 c8 | 76 8b 7e e8 6f 59 19 d9 00 00 00 1c 00 00 40 05 | 2f 3e df 6a 16 4a bb 95 81 15 e0 c0 73 52 29 fa | 60 85 d2 fd | state #7 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb388002b20 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #7 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 | #7 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49601.116703 | resume sending helper answer for #7 suppresed complete_v2_state_transition() and stole MD | #7 spent 0.437 milliseconds in resume sending helper answer | stop processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb374009640 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 0f 9a c7 72 fc c7 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #7 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #7 | rejected packet: | df 0f 9a c7 72 fc c7 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #7: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0566 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #3 | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #3 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #3 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49601.17413; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.505187 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #3 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 "road-eastnet-nonat-3" #3: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #3) | 81 44 b6 c8 2a 40 ce 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 54 15 6a 8c 9d d0 48 d6 59 e5 e2 2e a9 83 c3 | a8 ba 16 88 07 d6 11 91 3a 48 ca 9a fe dc 40 cc | 29 63 c0 dc 38 80 92 c8 fd f6 81 d3 d8 66 94 3d | c5 2d e7 b1 2b da e7 bc 78 d1 e4 dc 9a 41 8c 14 | c6 fb cd 2a 97 af ef ad 23 32 6d 6d f8 fa b5 27 | 9e 41 35 14 10 3b f6 98 c8 8f d3 aa de fa 55 91 | cb c5 c0 43 8b 3e 66 29 8a ce 63 ed 04 d9 5e 36 | d1 ee b2 55 32 92 26 8a 60 a1 e6 8a c1 81 34 3b | fe bb 92 45 5e 07 2a fa 53 4e 52 04 9a fe 49 14 | 7b 7a a1 34 68 ab 79 c6 b1 5b 9e 7d ee f2 e3 2b | b4 f7 cd 72 14 0a 7e 40 88 1b b7 27 4f cc 0e 08 | a7 a7 14 77 d4 62 20 1a 96 bd a4 9c 9c c7 ed e3 | be 59 87 38 e7 1a a8 83 a8 52 47 62 89 d6 f0 d1 | ce 49 83 2a 83 87 c7 c7 2e 90 40 05 a6 4e c5 26 | bd c4 1e e7 34 ac 09 b9 70 d9 7f 32 91 1c d9 7b | 01 ed eb 14 c7 ff 07 8b 68 87 79 fe ab f8 54 a7 | 29 00 00 24 af 67 2a 08 9a 9a ad ff 86 6c 03 06 | 6f 2f 6b af d5 26 d4 77 40 17 03 25 58 a0 84 c4 | 14 b9 e1 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 4b 9f 22 64 ba ce 64 1d b6 f5 ba | 24 33 ca 6e b0 87 4a 02 00 00 00 1c 00 00 40 05 | 8e b1 42 d9 c7 63 9c 7b 3d 57 a7 c1 0c 5d 8c 4c | 33 59 3d db | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #3 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 44 b6 c8 2a 40 ce 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #3 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #3 | rejected packet: | 81 44 b6 c8 2a 40 ce 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #3: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0707 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-8" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-8' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #8 at 0x557d469dfa80 | State DB: adding IKEv2 state #8 in UNDEFINED | pstats #8 ikev2.ike started | Message ID: init #8: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #8: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #8; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-8" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-8" IKE SA #8 "road-eastnet-nonat-8" "road-eastnet-nonat-8" #8: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-8 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-8": constructed local IKE proposals for road-eastnet-nonat-8 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 8 for state #8 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb380002b20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #8 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 | #8 spent 0.162 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-8" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.262 milliseconds in whack | crypto helper 19 resuming | crypto helper 19 starting work-order 8 for state #8 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 8 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 8 time elapsed 0.000881 seconds | (#8) spent 0.891 milliseconds in crypto helper computing work-order 8: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 8 for state #8 to event queue | scheduling resume sending helper answer for #8 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #8 | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 8 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #8 | **emit ISAKMP Message: | initiator cookie: | fc e4 b0 97 be 19 e9 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-8 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fb d7 b3 51 4b 56 31 da 19 b8 5b 11 80 3b 41 1d | ikev2 g^x db f2 28 3e 72 37 5d 51 ba b2 d1 db 84 a6 bb ce | ikev2 g^x 1e df 68 85 ad 45 d9 42 b6 3f f1 bf ca c0 f5 c2 | ikev2 g^x 41 11 18 ed 51 a4 a9 fb cb 5c 4b aa 1e 3a 47 5b | ikev2 g^x 44 a6 6a b6 94 62 27 08 46 1d 7b c4 ed 7e 13 6a | ikev2 g^x ca 75 f3 53 1a b4 5c e1 d0 26 6f 40 15 2a cf 5a | ikev2 g^x f0 64 c4 e8 99 40 1c 70 04 b2 00 e7 d0 a3 f5 96 | ikev2 g^x 6f ea 9b 0f 3f 68 a1 38 bf d5 ee 9b d4 28 95 59 | ikev2 g^x 43 fb 48 c8 ce 17 ed f6 a6 07 54 e9 76 3f ee 31 | ikev2 g^x e6 e0 4a 4a d9 1d 0e e2 d0 7f ee 9c f3 8f a5 65 | ikev2 g^x 31 c9 6f 45 ef 29 7c e4 98 48 e7 74 36 9b 60 48 | ikev2 g^x d3 f3 57 f0 4c b4 e7 0c b5 86 17 23 2a 25 88 1a | ikev2 g^x fd 48 0b e6 cd dd cd 71 67 f2 f0 ef a5 6a 24 ce | ikev2 g^x 8d d1 03 48 9c cf 4e e9 3a a8 3d 43 bb 43 cc 87 | ikev2 g^x 8b c7 29 54 b9 be 7f 2d 59 4b b6 ed 8e 48 bd b3 | ikev2 g^x 3d c6 30 ad ce 82 73 65 33 71 0d 41 0a f1 8b 76 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ca f3 cf 9b f4 48 aa 70 c1 ee a6 ea 0d e2 1f 7c | IKEv2 nonce 7a 99 db 08 31 a2 ad 99 ee 01 2c 76 68 be 3a 32 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fc e4 b0 97 be 19 e9 5c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 08 | natd_hash: port= 01 f4 | natd_hash: hash= 7d b5 e6 39 e3 40 62 d7 8a aa fc 72 51 01 50 53 | natd_hash: hash= 91 71 a4 51 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7d b5 e6 39 e3 40 62 d7 8a aa fc 72 51 01 50 53 | Notify data 91 71 a4 51 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fc e4 b0 97 be 19 e9 5c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 09 30 f5 72 c0 48 d1 9e 95 11 78 b6 cb 80 4b c0 | natd_hash: hash= 24 25 44 07 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 09 30 f5 72 c0 48 d1 9e 95 11 78 b6 cb 80 4b c0 | Notify data 24 25 44 07 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #8 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #8: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #8 to 4294967295 after switching state | Message ID: IKE #8 skipping update_recv as MD is fake | Message ID: sent #8 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-8" #8: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.8:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #8) | fc e4 b0 97 be 19 e9 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb d7 b3 51 4b 56 31 da 19 b8 5b 11 80 3b 41 1d | db f2 28 3e 72 37 5d 51 ba b2 d1 db 84 a6 bb ce | 1e df 68 85 ad 45 d9 42 b6 3f f1 bf ca c0 f5 c2 | 41 11 18 ed 51 a4 a9 fb cb 5c 4b aa 1e 3a 47 5b | 44 a6 6a b6 94 62 27 08 46 1d 7b c4 ed 7e 13 6a | ca 75 f3 53 1a b4 5c e1 d0 26 6f 40 15 2a cf 5a | f0 64 c4 e8 99 40 1c 70 04 b2 00 e7 d0 a3 f5 96 | 6f ea 9b 0f 3f 68 a1 38 bf d5 ee 9b d4 28 95 59 | 43 fb 48 c8 ce 17 ed f6 a6 07 54 e9 76 3f ee 31 | e6 e0 4a 4a d9 1d 0e e2 d0 7f ee 9c f3 8f a5 65 | 31 c9 6f 45 ef 29 7c e4 98 48 e7 74 36 9b 60 48 | d3 f3 57 f0 4c b4 e7 0c b5 86 17 23 2a 25 88 1a | fd 48 0b e6 cd dd cd 71 67 f2 f0 ef a5 6a 24 ce | 8d d1 03 48 9c cf 4e e9 3a a8 3d 43 bb 43 cc 87 | 8b c7 29 54 b9 be 7f 2d 59 4b b6 ed 8e 48 bd b3 | 3d c6 30 ad ce 82 73 65 33 71 0d 41 0a f1 8b 76 | 29 00 00 24 ca f3 cf 9b f4 48 aa 70 c1 ee a6 ea | 0d e2 1f 7c 7a 99 db 08 31 a2 ad 99 ee 01 2c 76 | 68 be 3a 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d b5 e6 39 e3 40 62 d7 8a aa fc 72 | 51 01 50 53 91 71 a4 51 00 00 00 1c 00 00 40 05 | 09 30 f5 72 c0 48 d1 9e 95 11 78 b6 cb 80 4b c0 | 24 25 44 07 | state #8 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb380002b20 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #8 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 | #8 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49601.215451 | resume sending helper answer for #8 suppresed complete_v2_state_transition() and stole MD | #8 spent 0.485 milliseconds in resume sending helper answer | stop processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb368009640 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc e4 b0 97 be 19 e9 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #8 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #8 | rejected packet: | fc e4 b0 97 be 19 e9 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #8: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0678 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #1 | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #1 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #1 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49601.265663; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002945 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #1 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 "road-eastnet-nonat-1" #1: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #1) | 6c 47 a0 1e 4e 7a e8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 72 0a 33 22 17 06 fc fa 28 91 b3 4f 57 56 e3 | ee 34 d7 20 66 52 7a 35 d8 92 bd 3b 01 15 87 45 | 58 9b 73 12 6d c9 2d 63 ff 30 68 a3 01 b0 11 62 | 0d 6a c8 7a 26 90 7a 07 0b 27 d1 49 b8 5c b5 22 | a1 78 8f 5c ca 62 0b 66 89 cf a4 d3 28 f3 60 65 | c4 0b 09 ab 6c 65 0c 24 ce 5f 6b 9e 2d 74 21 c1 | cc dd a3 d2 b1 b2 d7 b0 e3 c8 e7 e0 b1 08 40 98 | ea 60 7f cb f6 03 0b de 16 74 c6 45 5a 5d fd 06 | 19 e0 e9 1d 81 07 89 02 31 28 9a 67 2f ad 6e 4a | 5d d5 b0 90 bd e1 d1 0c 6f c0 ca db 12 8a 57 f5 | 47 c8 09 2a 1b de 2b dc d0 ab ee bf fc be 4f ae | f0 8e 4b a7 a7 58 e9 98 9f 49 09 09 2b 4d 67 80 | 28 41 88 84 93 b4 f0 c4 d7 78 27 c0 fe b8 4a 13 | 52 ab 44 91 d1 9f f2 59 6f dd 35 3c 1e 70 9c d8 | 9d ab 34 6f 48 48 c0 46 69 91 44 bd 80 07 2d e1 | 42 55 8f bd 8c 53 47 7c 85 94 0c 8c ae 5e 19 a4 | 29 00 00 24 e7 5a 07 18 3f 34 30 d2 f0 5d 94 65 | 65 0d d9 4a 64 02 60 6e 32 ba 95 35 8b ff 59 40 | 3a 8b 9e 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 00 78 5c 8b 16 a5 c0 7d 51 c3 29 | 54 44 32 39 1b 8f 23 e8 00 00 00 1c 00 00 40 05 | 68 e9 c0 40 f1 97 39 51 93 0a 30 e5 6a bd eb d1 | f4 d9 bb 8c | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #1 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 47 a0 1e 4e 7a e8 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #1 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #1 | rejected packet: | 6c 47 a0 1e 4e 7a e8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #1: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0666 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46906b40 | handling event EVENT_RETRANSMIT for parent state #4 | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #4 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #4 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49601.313992; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500484 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #4 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-4" #4: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #4) | 9f e3 9d 02 77 44 b7 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 12 be 82 37 05 d2 52 25 54 17 1c 7e a4 e7 a1 | 7e a3 9e 01 f0 c9 5e f6 79 14 37 d9 ec ef 3e 7b | d6 12 38 d8 73 16 9f 73 2c 17 04 25 c3 08 1e 06 | d4 99 19 15 32 45 9a a7 b4 d5 ad 96 4d 41 dc 91 | 4d c8 05 99 28 4b a0 e8 08 9f f7 76 6e 87 6e f0 | e8 58 e3 c1 70 13 6f 8d cd 7f 4b 91 ab b0 98 2b | 80 11 c8 ef d5 8f f3 5b b1 1f e0 43 de 0c 0e b1 | 13 32 29 e5 dd ca fb b5 e8 02 d1 3b 1d 9e 4d 95 | 8d f8 b1 fd 7f db 1b 37 33 cf 99 72 de f0 e3 79 | 73 e7 61 a0 9f 73 96 2a c8 d9 3f f2 5e 93 fa f5 | 10 3a 62 6a 38 cd 93 3a 9f a8 56 7d f2 c3 ee 21 | b5 e7 1b 68 51 3a 6c 80 5b ad 50 8d 16 63 1e 8c | 65 d8 ef 12 42 db b7 45 7e c0 09 e7 f6 56 5d da | d8 52 c7 89 46 5c ed c7 24 ca 60 5c ff 30 28 b2 | a1 94 8c ec d2 08 2c a4 8a 1d a2 db fd 97 89 ac | cf d6 3b e3 0f 35 26 7e 4f b9 c8 b0 82 f2 80 6e | 29 00 00 24 ff 8a 31 04 ed 0e 73 16 f9 33 92 87 | 63 96 e9 90 5e 3a 90 66 d0 c2 86 27 40 23 58 23 | 51 d5 8c f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 57 40 bb 9d 01 b2 e8 79 26 d3 b2 | 9e 9a c3 98 03 95 6b f7 00 00 00 1c 00 00 40 05 | 19 68 23 54 27 85 e7 5a 70 ec 13 67 75 7a 20 68 | 80 f1 f5 99 | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46906b40 | #4 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f e3 9d 02 77 44 b7 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #4 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #4 | rejected packet: | 9f e3 9d 02 77 44 b7 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #4: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-9" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-9' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #9 at 0x557d469e1040 | State DB: adding IKEv2 state #9 in UNDEFINED | pstats #9 ikev2.ike started | Message ID: init #9: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #9: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #9; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-9" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-9" IKE SA #9 "road-eastnet-nonat-9" "road-eastnet-nonat-9" #9: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-9 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-9": constructed local IKE proposals for road-eastnet-nonat-9 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 9 for state #9 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46906b40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #9 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 | #9 spent 0.137 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-9" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.215 milliseconds in whack | crypto helper 6 resuming | crypto helper 6 starting work-order 9 for state #9 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 9 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 9 time elapsed 0.000946 seconds | (#9) spent 0.953 milliseconds in crypto helper computing work-order 9: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 9 for state #9 to event queue | scheduling resume sending helper answer for #9 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #9 | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 9 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #9 | **emit ISAKMP Message: | initiator cookie: | 42 d4 37 7c 6c a2 32 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-9 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3b e7 ee 8b 3f 67 fc 59 f9 cf cd 11 31 95 6f 6f | ikev2 g^x 1a 68 46 c3 76 29 7e 71 e4 25 40 18 dc 88 c2 53 | ikev2 g^x ee 88 a1 08 66 15 f3 28 c2 cb 4a e2 b5 75 33 59 | ikev2 g^x 55 79 a1 88 5f 78 4f 18 38 8e ae 5c 13 15 13 df | ikev2 g^x ba 4a 47 c9 50 41 88 b6 f1 7a 74 8c 60 ff 93 b2 | ikev2 g^x 20 68 e4 46 db 20 8c 30 74 ea 04 10 5a 30 ea 94 | ikev2 g^x 23 ad e3 f6 b8 fd ef 4b 90 8b 27 14 bc c0 83 ef | ikev2 g^x 74 2c ab 49 65 76 af 73 fb 43 7c f1 ae d1 dd 3f | ikev2 g^x cd c7 7b 68 fb f4 41 39 5c 57 ef 8f 92 ea 9a 47 | ikev2 g^x 45 2a 1a ac 29 88 a1 89 ea a8 1a 7b a4 32 e3 9e | ikev2 g^x 8d f2 ad cb d1 f4 4e b8 a3 dd 79 49 05 1f 03 30 | ikev2 g^x 8a 93 8b ac 8f aa 22 b8 9b 89 24 78 34 56 75 f6 | ikev2 g^x e9 af c1 e4 36 df ba ca 6c 64 ef d5 97 79 d5 33 | ikev2 g^x 78 61 be 8d 16 b6 42 4a 4c 79 ee 04 84 ce 68 09 | ikev2 g^x e7 e6 62 4d 5a 49 5e d0 0c 5b 80 69 ff fd 56 0f | ikev2 g^x 18 1b 5a c8 54 c8 76 c4 ef 5e 74 08 bd 6d 13 c8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 56 5b 42 39 e6 4b 00 04 2e 83 3d 83 1e c8 b4 ab | IKEv2 nonce 97 9b 33 06 82 c0 a9 36 06 ea b4 2d 23 5d c5 5d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 42 d4 37 7c 6c a2 32 d3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 09 | natd_hash: port= 01 f4 | natd_hash: hash= f8 a8 01 3e 09 4e 61 7c 63 45 b6 fc 6b 13 a6 83 | natd_hash: hash= ef 8b fa 92 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f8 a8 01 3e 09 4e 61 7c 63 45 b6 fc 6b 13 a6 83 | Notify data ef 8b fa 92 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 42 d4 37 7c 6c a2 32 d3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4f 50 e4 89 50 50 84 2d e7 09 2b 9f ac 1d 9b 91 | natd_hash: hash= c6 7c af 4c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4f 50 e4 89 50 50 84 2d e7 09 2b 9f ac 1d 9b 91 | Notify data c6 7c af 4c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #9 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #9: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #9 to 4294967295 after switching state | Message ID: IKE #9 skipping update_recv as MD is fake | Message ID: sent #9 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-9" #9: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.9:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #9) | 42 d4 37 7c 6c a2 32 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b e7 ee 8b 3f 67 fc 59 f9 cf cd 11 31 95 6f 6f | 1a 68 46 c3 76 29 7e 71 e4 25 40 18 dc 88 c2 53 | ee 88 a1 08 66 15 f3 28 c2 cb 4a e2 b5 75 33 59 | 55 79 a1 88 5f 78 4f 18 38 8e ae 5c 13 15 13 df | ba 4a 47 c9 50 41 88 b6 f1 7a 74 8c 60 ff 93 b2 | 20 68 e4 46 db 20 8c 30 74 ea 04 10 5a 30 ea 94 | 23 ad e3 f6 b8 fd ef 4b 90 8b 27 14 bc c0 83 ef | 74 2c ab 49 65 76 af 73 fb 43 7c f1 ae d1 dd 3f | cd c7 7b 68 fb f4 41 39 5c 57 ef 8f 92 ea 9a 47 | 45 2a 1a ac 29 88 a1 89 ea a8 1a 7b a4 32 e3 9e | 8d f2 ad cb d1 f4 4e b8 a3 dd 79 49 05 1f 03 30 | 8a 93 8b ac 8f aa 22 b8 9b 89 24 78 34 56 75 f6 | e9 af c1 e4 36 df ba ca 6c 64 ef d5 97 79 d5 33 | 78 61 be 8d 16 b6 42 4a 4c 79 ee 04 84 ce 68 09 | e7 e6 62 4d 5a 49 5e d0 0c 5b 80 69 ff fd 56 0f | 18 1b 5a c8 54 c8 76 c4 ef 5e 74 08 bd 6d 13 c8 | 29 00 00 24 56 5b 42 39 e6 4b 00 04 2e 83 3d 83 | 1e c8 b4 ab 97 9b 33 06 82 c0 a9 36 06 ea b4 2d | 23 5d c5 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 a8 01 3e 09 4e 61 7c 63 45 b6 fc | 6b 13 a6 83 ef 8b fa 92 00 00 00 1c 00 00 40 05 | 4f 50 e4 89 50 50 84 2d e7 09 2b 9f ac 1d 9b 91 | c6 7c af 4c | state #9 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46906b40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46906b40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #9 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 | #9 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49601.317302 | resume sending helper answer for #9 suppresed complete_v2_state_transition() and stole MD | #9 spent 0.474 milliseconds in resume sending helper answer | stop processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c009640 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 d4 37 7c 6c a2 32 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #9 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #9 | rejected packet: | 42 d4 37 7c 6c a2 32 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #9: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-10" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-10' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #10 at 0x557d469e2600 | State DB: adding IKEv2 state #10 in UNDEFINED | pstats #10 ikev2.ike started | Message ID: init #10: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #10: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #10; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-10" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-10" IKE SA #10 "road-eastnet-nonat-10" "road-eastnet-nonat-10" #10: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-10 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-10": constructed local IKE proposals for road-eastnet-nonat-10 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 10 for state #10 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #10 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 | #10 spent 0.186 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-10" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.288 milliseconds in whack | crypto helper 11 resuming | crypto helper 11 starting work-order 10 for state #10 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 10 | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 10 time elapsed 0.00109 seconds | (#10) spent 1.04 milliseconds in crypto helper computing work-order 10: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 10 for state #10 to event queue | scheduling resume sending helper answer for #10 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #10 | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 10 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #10 | **emit ISAKMP Message: | initiator cookie: | 6b e4 01 c3 ed 3e ed 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-10 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2b 6a 85 96 38 f3 d3 4e 55 03 ae f3 d4 0f ad 38 | ikev2 g^x 83 2b 8b 92 04 a5 95 20 97 dc f8 34 30 38 91 0d | ikev2 g^x b9 c4 11 ab e9 a9 94 d4 16 5b f1 c4 91 68 3e fa | ikev2 g^x fb b4 36 73 13 7d c7 d0 75 c4 f9 ef fd 92 5b cc | ikev2 g^x aa e4 77 57 96 44 12 f0 38 b5 1d ad 33 4d 65 c3 | ikev2 g^x 93 63 ce 14 d7 d8 25 ef f8 0d ae dd 78 dc 8e b7 | ikev2 g^x 7e c2 3d a5 d5 d3 09 2b ad 9d bd a9 6f 55 df a1 | ikev2 g^x 6f b4 2e cf 9f fe 7e ae 25 58 a2 81 78 bb f7 29 | ikev2 g^x dd 53 e8 91 13 65 1e 1e 60 9c d0 15 9f bb 76 ed | ikev2 g^x ab 75 ce 2a 44 05 fa b1 a3 a7 39 d0 53 b7 7f 4f | ikev2 g^x e0 b7 8f a6 98 8c 07 ab a8 32 37 42 0c 8c 3d a7 | ikev2 g^x fc 6c 53 ac 60 2a 04 67 31 66 47 13 4f bc 34 8c | ikev2 g^x 30 51 26 7c 6a 36 76 70 15 29 7e 23 fc ac 0e 32 | ikev2 g^x 57 5c bb d9 b8 c0 27 61 5e fd 8f bc 73 83 16 ba | ikev2 g^x bf 42 32 51 56 3e 21 8b 6d 4a af 80 6d 52 1f d5 | ikev2 g^x 84 cd 2e ff dc c3 b8 a0 b2 26 7e 0c b7 e0 d0 d6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 23 a8 6c e8 37 a1 47 09 f8 10 83 5c 3f e5 80 de | IKEv2 nonce e6 d0 ee 9e 1f f2 6d 6a 1a c1 8c be 9a 4a a5 a0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6b e4 01 c3 ed 3e ed 8b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0a | natd_hash: port= 01 f4 | natd_hash: hash= c2 14 ac ca 29 d0 75 c4 40 2c aa 37 f4 15 d0 3b | natd_hash: hash= ed 2d a9 e1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c2 14 ac ca 29 d0 75 c4 40 2c aa 37 f4 15 d0 3b | Notify data ed 2d a9 e1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6b e4 01 c3 ed 3e ed 8b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 85 e0 a4 b5 9f 75 13 0f 6d a9 52 94 7d fa 0b 2d | natd_hash: hash= 65 f2 06 03 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 85 e0 a4 b5 9f 75 13 0f 6d a9 52 94 7d fa 0b 2d | Notify data 65 f2 06 03 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #10 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #10: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #10 to 4294967295 after switching state | Message ID: IKE #10 skipping update_recv as MD is fake | Message ID: sent #10 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-10" #10: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.10:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #10) | 6b e4 01 c3 ed 3e ed 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2b 6a 85 96 38 f3 d3 4e 55 03 ae f3 d4 0f ad 38 | 83 2b 8b 92 04 a5 95 20 97 dc f8 34 30 38 91 0d | b9 c4 11 ab e9 a9 94 d4 16 5b f1 c4 91 68 3e fa | fb b4 36 73 13 7d c7 d0 75 c4 f9 ef fd 92 5b cc | aa e4 77 57 96 44 12 f0 38 b5 1d ad 33 4d 65 c3 | 93 63 ce 14 d7 d8 25 ef f8 0d ae dd 78 dc 8e b7 | 7e c2 3d a5 d5 d3 09 2b ad 9d bd a9 6f 55 df a1 | 6f b4 2e cf 9f fe 7e ae 25 58 a2 81 78 bb f7 29 | dd 53 e8 91 13 65 1e 1e 60 9c d0 15 9f bb 76 ed | ab 75 ce 2a 44 05 fa b1 a3 a7 39 d0 53 b7 7f 4f | e0 b7 8f a6 98 8c 07 ab a8 32 37 42 0c 8c 3d a7 | fc 6c 53 ac 60 2a 04 67 31 66 47 13 4f bc 34 8c | 30 51 26 7c 6a 36 76 70 15 29 7e 23 fc ac 0e 32 | 57 5c bb d9 b8 c0 27 61 5e fd 8f bc 73 83 16 ba | bf 42 32 51 56 3e 21 8b 6d 4a af 80 6d 52 1f d5 | 84 cd 2e ff dc c3 b8 a0 b2 26 7e 0c b7 e0 d0 d6 | 29 00 00 24 23 a8 6c e8 37 a1 47 09 f8 10 83 5c | 3f e5 80 de e6 d0 ee 9e 1f f2 6d 6a 1a c1 8c be | 9a 4a a5 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 14 ac ca 29 d0 75 c4 40 2c aa 37 | f4 15 d0 3b ed 2d a9 e1 00 00 00 1c 00 00 40 05 | 85 e0 a4 b5 9f 75 13 0f 6d a9 52 94 7d fa 0b 2d | 65 f2 06 03 | state #10 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #10 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 | #10 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49601.416823 | resume sending helper answer for #10 suppresed complete_v2_state_transition() and stole MD | #10 spent 0.541 milliseconds in resume sending helper answer | stop processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb360009640 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b e4 01 c3 ed 3e ed 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #10 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #10 | rejected packet: | 6b e4 01 c3 ed 3e ed 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #10: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.071 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #5 | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #5 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #5 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49601.438435; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.508064 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #5 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 "road-eastnet-nonat-5" #5: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #5) | 83 a8 82 4c 6a b9 9b 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 f2 6a ba 4d 4c f4 ca d6 76 c6 37 a4 fc c6 08 | 03 3e 5e e8 b3 56 67 2c ed e0 33 33 68 d8 a5 17 | c5 ad 89 58 8b 66 c2 c6 28 95 15 86 95 42 17 c5 | 43 6b d6 1b 90 e3 ce 5a 73 0f aa 25 80 ef 21 ed | 95 16 dc 62 db 9c 9c f1 05 8d 7b ad 88 fd 8e 82 | 62 66 a4 5c 00 db 53 d1 2c ac b4 13 62 a5 17 eb | 3f 3a 4e bc 42 77 a1 e8 e1 8a 0f 63 81 66 10 64 | 10 0d 86 9e 89 34 85 5c 5f 55 4a cb 5a 29 86 16 | 42 90 ac 93 0b a7 fb e8 a5 4a 23 43 d7 02 e6 fe | c6 7b a9 b3 68 72 59 2e 24 fd 0c 7f 98 b0 6f 9f | bb aa 48 ce f6 ec 36 99 c2 bc 70 c4 81 9e 1c 55 | 65 47 9c 55 e0 d5 f3 7e 77 c4 a5 f3 6e 82 b5 1c | 5c 56 a1 3a b8 57 69 f9 25 e2 ae ed 66 c5 c1 3d | f8 ca 2e 2b 1c 6e 27 f2 e3 ed 73 79 be b7 90 0f | cb 45 38 5f bb 3a e3 c2 44 15 72 9c 24 d0 bd 4e | fa c4 ea 53 31 95 57 c9 dc a4 ff 15 7a 28 e4 1a | 29 00 00 24 13 3d aa 25 dd 95 48 ab fd a8 d2 56 | 6c 28 74 71 5d 45 11 19 10 09 0a f3 46 e9 c4 b3 | 56 85 8c 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bb 69 2e cb ee d3 68 5b 1c f0 7d a0 | 26 ce 80 e4 bd 02 f5 15 00 00 00 1c 00 00 40 05 | 1b de 40 93 48 c5 33 61 5d a6 1a 99 ad 20 57 85 | b1 bf 8b 0c | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #5 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 a8 82 4c 6a b9 9b 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #5 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #5 | rejected packet: | 83 a8 82 4c 6a b9 9b 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #5: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #6 | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #6 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #6 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49601.517438; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.506471 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #6 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 "road-eastnet-nonat-6" #6: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #6) | 2c 27 82 3a c6 31 e5 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f e3 1c 46 2f 61 c1 a4 57 04 b2 32 f2 da 47 30 | c5 f1 b2 8c 52 8c bd 20 1e 07 9a 1f 74 e3 50 fd | 03 ad cd d6 6e b2 e0 ed 18 de c6 cf db 53 d8 91 | 57 59 05 93 13 39 ca c4 cd bf 1d c1 99 f1 ea ab | d7 0d 4d 84 1a b9 23 c8 19 a7 00 fc 45 cd 28 de | 1b 23 11 46 b2 a5 20 88 7d a8 2e 93 69 c4 77 be | 7d 08 db 5c 91 33 d0 aa e2 d7 27 ba c6 03 59 3c | 8a b9 c7 4b aa b0 c2 31 f9 3d af 03 a0 d0 38 f5 | 81 cf 2e 3b 37 ea b5 50 38 0b b5 3b be c1 ac 52 | d4 bd 41 74 e3 b0 cc da 00 70 a4 c8 a9 ae 2b 0c | 84 70 b9 c2 c8 dd e4 ca c8 d6 7a 14 75 f2 9f ca | f3 8a 9e fb 56 2f 7b 5f 34 ab 29 a4 eb 5d 7a 01 | af 1d 55 9d 0e 4d 00 2f f9 2a c8 90 cf 50 fe a3 | 20 3f bc dc b3 d6 01 f7 dd dc c1 b1 72 f5 58 73 | b8 72 e4 a9 88 17 39 c5 a4 43 c8 df b5 2f 8d cd | 75 f3 2c cf e2 85 8e ce 7f c9 07 83 41 8f 33 7b | 29 00 00 24 aa 55 22 5c 95 3a 98 8a 23 4e 55 f5 | f2 5b 2d e6 0f d6 a3 fc b7 39 7f a3 84 04 6c 99 | b3 1f 01 c8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd d8 7d b0 3b ed a4 77 8e 72 bc 87 | 11 c3 4a b5 09 51 99 2e 00 00 00 1c 00 00 40 05 | 3b ee 43 00 bb c4 11 7e a6 6d 91 83 5e ff b0 fd | ab 20 73 91 | libevent_free: release ptr-libevent@0x7fb37c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #6 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c 27 82 3a c6 31 e5 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #6 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #6 | rejected packet: | 2c 27 82 3a c6 31 e5 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #6: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #2 | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #2 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #2 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49601.529189; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.008031 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #2 | libevent_malloc: new ptr-libevent@0x7fb37c009640 size 128 "road-eastnet-nonat-2" #2: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #2) | 1a 6c de c8 74 c5 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e e6 40 8d 01 9a df ee a1 21 ef 7c 27 51 b1 50 | 11 ab 49 b8 aa be 06 6f 98 06 4f a8 49 fc 42 fd | ea ae 86 e5 22 2c b5 91 3d 9f 17 1f 02 b9 b9 8d | 62 48 db a9 bf 68 b6 2a 81 1e f5 ea 96 5e fc 90 | a8 90 23 f2 fa 81 8e 8c d6 45 a8 56 67 da 61 6d | ec 8f 6b 5d aa 73 41 20 29 44 b2 20 1c ab 68 57 | 66 6f ca 43 df ea 03 70 f7 0e 47 cb 21 da 37 fa | b6 1e 94 d5 b1 5e b7 96 a4 f5 5a 22 ff b7 b7 1e | 62 65 38 93 8b 8d 44 bd 9f ea 0f 68 70 be 74 db | b6 35 f8 53 58 61 01 df be e6 bf 45 b0 94 55 ae | 5d 6b 51 98 47 dd 93 18 5c 30 93 96 42 3e 47 91 | 90 01 1e 32 64 de ec ce 38 b5 ab f8 4a 4f 0c ed | d8 fd 0a f1 53 ed ad 6b 9e c5 db 7f 6d 9f 1b e5 | 0c 7b f2 2f 6f ec 10 d1 5b 4b 71 ee 47 5f b6 1f | b0 01 08 5f 12 c2 5d 47 67 6d 8f ee c4 bf 47 5b | 6c 71 d5 40 dd 10 ef f5 69 2a fd 09 2a aa 47 a4 | 29 00 00 24 31 10 28 eb fd d1 21 19 30 13 d3 a7 | cd be e5 7b ca b3 e1 fc 00 55 31 87 01 f1 62 07 | 15 72 f6 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 6d fc d3 8f 25 27 03 1f 7a b6 de | f8 04 ad d3 88 d5 17 aa 00 00 00 1c 00 00 40 05 | 09 59 07 05 b4 e1 f1 0d 32 74 62 04 62 1e 48 d0 | 7d 5b 7f 5e | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #2 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 6c de c8 74 c5 fb 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #2 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #2 | rejected packet: | 1a 6c de c8 74 c5 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #2: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-11" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-11' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #11 at 0x557d469e3bc0 | State DB: adding IKEv2 state #11 in UNDEFINED | pstats #11 ikev2.ike started | Message ID: init #11: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #11: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #11; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-11" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-11" IKE SA #11 "road-eastnet-nonat-11" "road-eastnet-nonat-11" #11: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-11 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-11": constructed local IKE proposals for road-eastnet-nonat-11 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 11 for state #11 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb370005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #11 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 | #11 spent 0.13 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-11" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.216 milliseconds in whack | crypto helper 16 resuming | crypto helper 16 starting work-order 11 for state #11 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 11 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 11 time elapsed 0.000988 seconds | (#11) spent 0.994 milliseconds in crypto helper computing work-order 11: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 11 for state #11 to event queue | scheduling resume sending helper answer for #11 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 | libevent_realloc: release ptr-libevent@0x557d469d92d0 | libevent_realloc: new ptr-libevent@0x557d469dabe0 size 256 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #11 | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 11 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #11 | **emit ISAKMP Message: | initiator cookie: | c8 da f8 5c 6a b5 39 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-11 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 62 9a 4c 70 8e 88 d1 64 8d ca 55 b5 43 ac 3e 50 | ikev2 g^x 7f 03 c2 7c 99 61 59 48 6a 23 b9 2d d3 3a 08 ba | ikev2 g^x 31 66 90 b0 52 32 93 73 23 bd 35 f2 7d dc a9 8f | ikev2 g^x 88 4e 43 5d 55 55 8f 7b a2 ea ce 35 e9 07 bb 71 | ikev2 g^x 1f 5d f0 9c c9 20 a4 7c c9 a5 33 c5 b0 c5 fd 99 | ikev2 g^x f9 36 f9 d6 da 33 fa e1 2d e1 b8 55 01 35 5b d0 | ikev2 g^x b9 e1 af af a6 38 ef b1 36 65 8c 44 00 8a 8f f0 | ikev2 g^x cb 31 ec d5 89 23 22 d8 6f 57 3d 9d af 74 08 ea | ikev2 g^x 86 b5 7c 8c 76 9b 8d 04 5b 27 f9 7a 8d ed d8 36 | ikev2 g^x 77 1c 37 9a 9e c6 40 9c bb 1e 24 77 dc 4c b2 dc | ikev2 g^x 76 0c 2f 2d 23 9c f1 63 a5 64 8f c0 7e 6e 08 97 | ikev2 g^x 35 1b 8e 35 d5 a9 e6 fc d1 af 35 f0 b0 21 d4 42 | ikev2 g^x 5d 1b 4e c6 75 04 f0 3a f4 cc 11 09 3f ff 2d c6 | ikev2 g^x bf fa 44 99 e7 46 de 13 f5 47 98 02 47 dd 33 15 | ikev2 g^x 52 36 1a 46 d4 d8 ce dd 1a ad eb 4f 6b 1d 9e 82 | ikev2 g^x 8f b0 52 7f b0 b6 aa 8b 85 c1 d8 ed 73 6b 09 85 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 71 b3 70 95 41 f1 8a 3d 3f e8 5d 7c 6b 52 d9 59 | IKEv2 nonce 47 90 bd 2c 17 95 9e 28 b0 5d 83 17 df a2 84 23 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c8 da f8 5c 6a b5 39 c8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0b | natd_hash: port= 01 f4 | natd_hash: hash= 53 c8 ac c9 12 67 90 a0 d8 a9 94 84 cc d4 e1 68 | natd_hash: hash= d0 49 e5 0f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 53 c8 ac c9 12 67 90 a0 d8 a9 94 84 cc d4 e1 68 | Notify data d0 49 e5 0f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c8 da f8 5c 6a b5 39 c8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a0 0d 8b f9 78 72 8b b9 69 a6 ab 0f 8f 46 28 db | natd_hash: hash= d3 de 3a b5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a0 0d 8b f9 78 72 8b b9 69 a6 ab 0f 8f 46 28 db | Notify data d3 de 3a b5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #11 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #11: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #11 to 4294967295 after switching state | Message ID: IKE #11 skipping update_recv as MD is fake | Message ID: sent #11 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-11" #11: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.11:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #11) | c8 da f8 5c 6a b5 39 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 9a 4c 70 8e 88 d1 64 8d ca 55 b5 43 ac 3e 50 | 7f 03 c2 7c 99 61 59 48 6a 23 b9 2d d3 3a 08 ba | 31 66 90 b0 52 32 93 73 23 bd 35 f2 7d dc a9 8f | 88 4e 43 5d 55 55 8f 7b a2 ea ce 35 e9 07 bb 71 | 1f 5d f0 9c c9 20 a4 7c c9 a5 33 c5 b0 c5 fd 99 | f9 36 f9 d6 da 33 fa e1 2d e1 b8 55 01 35 5b d0 | b9 e1 af af a6 38 ef b1 36 65 8c 44 00 8a 8f f0 | cb 31 ec d5 89 23 22 d8 6f 57 3d 9d af 74 08 ea | 86 b5 7c 8c 76 9b 8d 04 5b 27 f9 7a 8d ed d8 36 | 77 1c 37 9a 9e c6 40 9c bb 1e 24 77 dc 4c b2 dc | 76 0c 2f 2d 23 9c f1 63 a5 64 8f c0 7e 6e 08 97 | 35 1b 8e 35 d5 a9 e6 fc d1 af 35 f0 b0 21 d4 42 | 5d 1b 4e c6 75 04 f0 3a f4 cc 11 09 3f ff 2d c6 | bf fa 44 99 e7 46 de 13 f5 47 98 02 47 dd 33 15 | 52 36 1a 46 d4 d8 ce dd 1a ad eb 4f 6b 1d 9e 82 | 8f b0 52 7f b0 b6 aa 8b 85 c1 d8 ed 73 6b 09 85 | 29 00 00 24 71 b3 70 95 41 f1 8a 3d 3f e8 5d 7c | 6b 52 d9 59 47 90 bd 2c 17 95 9e 28 b0 5d 83 17 | df a2 84 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 c8 ac c9 12 67 90 a0 d8 a9 94 84 | cc d4 e1 68 d0 49 e5 0f 00 00 00 1c 00 00 40 05 | a0 0d 8b f9 78 72 8b b9 69 a6 ab 0f 8f 46 28 db | d3 de 3a b5 | state #11 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb370005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #11 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 | #11 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49601.540539 | resume sending helper answer for #11 suppresed complete_v2_state_transition() and stole MD | #11 spent 0.473 milliseconds in resume sending helper answer | stop processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb364009640 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 da f8 5c 6a b5 39 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #11 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #11 | rejected packet: | c8 da f8 5c 6a b5 39 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #11: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #7 | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #7 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #7 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49601.617771; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501068 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #7 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 "road-eastnet-nonat-7" #7: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #7) | df 0f 9a c7 72 fc c7 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 16 59 37 af 9b 5a d1 22 e5 b7 89 f5 29 0b b4 | f8 e5 4b 2e 70 7a c8 bc f1 ab 2a 61 eb 02 ca fa | a3 75 2e 7e 2d d5 25 c9 fa fb 53 11 81 f8 e7 7c | 35 1a 09 cf c2 a1 7a e6 ba 83 f5 ea 71 c2 29 ca | 29 da 7e bf 99 10 95 66 d2 23 d8 4f 49 2f bd 63 | 11 b8 e1 71 39 92 a3 a7 60 6b 7a e8 94 6f c6 09 | 3e 44 50 a7 14 dd 81 7d 4c 7f 80 8c 35 65 97 9c | b1 11 76 e7 2a ca 44 b5 84 ae 8b 5a 9b fd ff 0d | 19 d8 e9 75 5a 70 67 71 dc 0e 22 08 1b 97 e2 25 | ad 6c 4c 80 de ff 3e 29 34 2a 32 fa 3b 41 ab 38 | c8 2c a4 db 1f 4a 62 fb 24 ff ed 13 44 3e 4c cb | a1 99 52 bb 30 b7 29 d8 9d 52 b8 4d 90 9d ab aa | c0 57 68 4e 57 cb d7 d7 cc 96 2c bc 75 0c 87 f5 | 9c 71 0b 3a 29 74 b7 e2 7f 5e 8b 9f 17 4e 89 84 | da f8 88 1c 69 02 1c 1f 41 83 de df 0e 7e 58 56 | 61 84 83 da 8c c8 98 f6 a7 9f db ce b7 aa a6 bc | 29 00 00 24 9d 55 08 62 c0 73 1e 47 79 75 2c 10 | 4a ab 88 17 80 18 91 8e 0d 3b 8f 21 a0 4a c9 52 | dc 93 16 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e cd 5f ad 94 80 bb 48 49 e9 a2 c8 | 76 8b 7e e8 6f 59 19 d9 00 00 00 1c 00 00 40 05 | 2f 3e df 6a 16 4a bb 95 81 15 e0 c0 73 52 29 fa | 60 85 d2 fd | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #7 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 0f 9a c7 72 fc c7 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #7 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #7 | rejected packet: | df 0f 9a c7 72 fc c7 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #7: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-12" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-12' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #12 at 0x557d469e5180 | State DB: adding IKEv2 state #12 in UNDEFINED | pstats #12 ikev2.ike started | Message ID: init #12: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #12: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #12; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-12" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-12" IKE SA #12 "road-eastnet-nonat-12" "road-eastnet-nonat-12" #12: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-12 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-12": constructed local IKE proposals for road-eastnet-nonat-12 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 12 for state #12 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb388002b20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #12 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 | #12 spent 0.143 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-12" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.229 milliseconds in whack | crypto helper 4 resuming | crypto helper 4 starting work-order 12 for state #12 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 12 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 12 time elapsed 0.001075 seconds | (#12) spent 1.08 milliseconds in crypto helper computing work-order 12: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 12 for state #12 to event queue | scheduling resume sending helper answer for #12 | libevent_malloc: new ptr-libevent@0x7fb358009640 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #12 | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 12 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #12 | **emit ISAKMP Message: | initiator cookie: | e6 90 0f 5b 12 9e fb 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-12 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 13 8d ca d0 bf fc d0 53 2f c8 94 c7 75 f0 b7 3b | ikev2 g^x 06 8d af 15 08 3d 4d 43 8a f2 0e 43 03 74 47 ab | ikev2 g^x c5 f6 5e c6 9d af 64 6c 5f 50 aa bb 63 91 17 7c | ikev2 g^x de 19 d6 a8 3d b9 0e 6f 98 77 91 78 cd c6 0f f1 | ikev2 g^x 83 bd 49 b7 4d 19 90 e6 2f f7 8d c2 99 5e 0c 41 | ikev2 g^x a4 92 59 8c f3 bc 56 51 55 c4 fc 8d 06 b4 b2 46 | ikev2 g^x fe 62 b5 0f 4e f1 c7 d9 31 4c e1 f7 06 2d 45 f5 | ikev2 g^x a0 d5 f5 94 55 0e 2f 00 35 d8 fb d6 3c 6a b6 b5 | ikev2 g^x 4d 93 6e 6b 9b 52 5b 1c 59 3e d0 a9 2b 70 a2 ec | ikev2 g^x b5 2f 18 f2 51 cd 4a e5 eb b3 21 70 eb 17 7e fb | ikev2 g^x 54 5e a1 de 02 46 1e 7f ed c7 44 7e dc 6d 9e 84 | ikev2 g^x 08 46 48 8f 2c 45 f3 c2 00 ca b5 46 fd 56 d4 bf | ikev2 g^x b0 41 68 33 e0 2a 67 86 f6 4d 18 8b 90 8d 3e 6b | ikev2 g^x c2 91 48 4f de cb 41 cd 2e 17 3b f1 b9 af ca 73 | ikev2 g^x 4b 2f d1 11 2b 7a 96 60 de b9 66 93 28 70 95 94 | ikev2 g^x 75 11 24 ea 0b a4 9a 4f 1b d9 88 31 b6 8a fe 22 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 52 e1 94 79 21 2a ea cc 69 4a af 5a 5d ef 62 83 | IKEv2 nonce 14 35 3b dc 33 a8 4c d8 5d ab 20 41 8b a5 be 78 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e6 90 0f 5b 12 9e fb 66 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0c | natd_hash: port= 01 f4 | natd_hash: hash= a6 aa 63 73 f1 76 ab f8 1b 79 46 f7 09 75 6d 3c | natd_hash: hash= 97 fc 7d df | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a6 aa 63 73 f1 76 ab f8 1b 79 46 f7 09 75 6d 3c | Notify data 97 fc 7d df | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e6 90 0f 5b 12 9e fb 66 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= db 6d 58 42 c9 d1 b0 49 17 a0 1e 30 4f f9 7e 58 | natd_hash: hash= 72 29 56 37 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data db 6d 58 42 c9 d1 b0 49 17 a0 1e 30 4f f9 7e 58 | Notify data 72 29 56 37 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #12 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #12: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #12 to 4294967295 after switching state | Message ID: IKE #12 skipping update_recv as MD is fake | Message ID: sent #12 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-12" #12: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.12:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #12) | e6 90 0f 5b 12 9e fb 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 8d ca d0 bf fc d0 53 2f c8 94 c7 75 f0 b7 3b | 06 8d af 15 08 3d 4d 43 8a f2 0e 43 03 74 47 ab | c5 f6 5e c6 9d af 64 6c 5f 50 aa bb 63 91 17 7c | de 19 d6 a8 3d b9 0e 6f 98 77 91 78 cd c6 0f f1 | 83 bd 49 b7 4d 19 90 e6 2f f7 8d c2 99 5e 0c 41 | a4 92 59 8c f3 bc 56 51 55 c4 fc 8d 06 b4 b2 46 | fe 62 b5 0f 4e f1 c7 d9 31 4c e1 f7 06 2d 45 f5 | a0 d5 f5 94 55 0e 2f 00 35 d8 fb d6 3c 6a b6 b5 | 4d 93 6e 6b 9b 52 5b 1c 59 3e d0 a9 2b 70 a2 ec | b5 2f 18 f2 51 cd 4a e5 eb b3 21 70 eb 17 7e fb | 54 5e a1 de 02 46 1e 7f ed c7 44 7e dc 6d 9e 84 | 08 46 48 8f 2c 45 f3 c2 00 ca b5 46 fd 56 d4 bf | b0 41 68 33 e0 2a 67 86 f6 4d 18 8b 90 8d 3e 6b | c2 91 48 4f de cb 41 cd 2e 17 3b f1 b9 af ca 73 | 4b 2f d1 11 2b 7a 96 60 de b9 66 93 28 70 95 94 | 75 11 24 ea 0b a4 9a 4f 1b d9 88 31 b6 8a fe 22 | 29 00 00 24 52 e1 94 79 21 2a ea cc 69 4a af 5a | 5d ef 62 83 14 35 3b dc 33 a8 4c d8 5d ab 20 41 | 8b a5 be 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 aa 63 73 f1 76 ab f8 1b 79 46 f7 | 09 75 6d 3c 97 fc 7d df 00 00 00 1c 00 00 40 05 | db 6d 58 42 c9 d1 b0 49 17 a0 1e 30 4f f9 7e 58 | 72 29 56 37 | state #12 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb388002b20 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #12 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 | #12 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49601.653203 | resume sending helper answer for #12 suppresed complete_v2_state_transition() and stole MD | #12 spent 0.524 milliseconds in resume sending helper answer | stop processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb358009640 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 90 0f 5b 12 9e fb 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #12 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #12 | rejected packet: | e6 90 0f 5b 12 9e fb 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #12: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #3 | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #3 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #3 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49601.675412; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.006469 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #3 | libevent_malloc: new ptr-libevent@0x7fb358009640 size 128 "road-eastnet-nonat-3" #3: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #3) | 81 44 b6 c8 2a 40 ce 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 54 15 6a 8c 9d d0 48 d6 59 e5 e2 2e a9 83 c3 | a8 ba 16 88 07 d6 11 91 3a 48 ca 9a fe dc 40 cc | 29 63 c0 dc 38 80 92 c8 fd f6 81 d3 d8 66 94 3d | c5 2d e7 b1 2b da e7 bc 78 d1 e4 dc 9a 41 8c 14 | c6 fb cd 2a 97 af ef ad 23 32 6d 6d f8 fa b5 27 | 9e 41 35 14 10 3b f6 98 c8 8f d3 aa de fa 55 91 | cb c5 c0 43 8b 3e 66 29 8a ce 63 ed 04 d9 5e 36 | d1 ee b2 55 32 92 26 8a 60 a1 e6 8a c1 81 34 3b | fe bb 92 45 5e 07 2a fa 53 4e 52 04 9a fe 49 14 | 7b 7a a1 34 68 ab 79 c6 b1 5b 9e 7d ee f2 e3 2b | b4 f7 cd 72 14 0a 7e 40 88 1b b7 27 4f cc 0e 08 | a7 a7 14 77 d4 62 20 1a 96 bd a4 9c 9c c7 ed e3 | be 59 87 38 e7 1a a8 83 a8 52 47 62 89 d6 f0 d1 | ce 49 83 2a 83 87 c7 c7 2e 90 40 05 a6 4e c5 26 | bd c4 1e e7 34 ac 09 b9 70 d9 7f 32 91 1c d9 7b | 01 ed eb 14 c7 ff 07 8b 68 87 79 fe ab f8 54 a7 | 29 00 00 24 af 67 2a 08 9a 9a ad ff 86 6c 03 06 | 6f 2f 6b af d5 26 d4 77 40 17 03 25 58 a0 84 c4 | 14 b9 e1 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 4b 9f 22 64 ba ce 64 1d b6 f5 ba | 24 33 ca 6e b0 87 4a 02 00 00 00 1c 00 00 40 05 | 8e b1 42 d9 c7 63 9c 7b 3d 57 a7 c1 0c 5d 8c 4c | 33 59 3d db | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #3 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 44 b6 c8 2a 40 ce 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #3 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #3 | rejected packet: | 81 44 b6 c8 2a 40 ce 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #3: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #8 | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #8 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #8 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49601.715756; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500305 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #8 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 "road-eastnet-nonat-8" #8: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #8) | fc e4 b0 97 be 19 e9 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb d7 b3 51 4b 56 31 da 19 b8 5b 11 80 3b 41 1d | db f2 28 3e 72 37 5d 51 ba b2 d1 db 84 a6 bb ce | 1e df 68 85 ad 45 d9 42 b6 3f f1 bf ca c0 f5 c2 | 41 11 18 ed 51 a4 a9 fb cb 5c 4b aa 1e 3a 47 5b | 44 a6 6a b6 94 62 27 08 46 1d 7b c4 ed 7e 13 6a | ca 75 f3 53 1a b4 5c e1 d0 26 6f 40 15 2a cf 5a | f0 64 c4 e8 99 40 1c 70 04 b2 00 e7 d0 a3 f5 96 | 6f ea 9b 0f 3f 68 a1 38 bf d5 ee 9b d4 28 95 59 | 43 fb 48 c8 ce 17 ed f6 a6 07 54 e9 76 3f ee 31 | e6 e0 4a 4a d9 1d 0e e2 d0 7f ee 9c f3 8f a5 65 | 31 c9 6f 45 ef 29 7c e4 98 48 e7 74 36 9b 60 48 | d3 f3 57 f0 4c b4 e7 0c b5 86 17 23 2a 25 88 1a | fd 48 0b e6 cd dd cd 71 67 f2 f0 ef a5 6a 24 ce | 8d d1 03 48 9c cf 4e e9 3a a8 3d 43 bb 43 cc 87 | 8b c7 29 54 b9 be 7f 2d 59 4b b6 ed 8e 48 bd b3 | 3d c6 30 ad ce 82 73 65 33 71 0d 41 0a f1 8b 76 | 29 00 00 24 ca f3 cf 9b f4 48 aa 70 c1 ee a6 ea | 0d e2 1f 7c 7a 99 db 08 31 a2 ad 99 ee 01 2c 76 | 68 be 3a 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d b5 e6 39 e3 40 62 d7 8a aa fc 72 | 51 01 50 53 91 71 a4 51 00 00 00 1c 00 00 40 05 | 09 30 f5 72 c0 48 d1 9e 95 11 78 b6 cb 80 4b c0 | 24 25 44 07 | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #8 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc e4 b0 97 be 19 e9 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #8 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #8 | rejected packet: | fc e4 b0 97 be 19 e9 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #8: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-13" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-13' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #13 at 0x557d469e6740 | State DB: adding IKEv2 state #13 in UNDEFINED | pstats #13 ikev2.ike started | Message ID: init #13: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #13: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #13; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-13" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-13" IKE SA #13 "road-eastnet-nonat-13" "road-eastnet-nonat-13" #13: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-13 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-13": constructed local IKE proposals for road-eastnet-nonat-13 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 13 for state #13 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb380002b20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #13 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 | #13 spent 0.15 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-13" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.233 milliseconds in whack | crypto helper 13 resuming | crypto helper 13 starting work-order 13 for state #13 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 13 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 13 time elapsed 0.001191 seconds | (#13) spent 1.01 milliseconds in crypto helper computing work-order 13: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 13 for state #13 to event queue | scheduling resume sending helper answer for #13 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #13 | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 13 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #13 | **emit ISAKMP Message: | initiator cookie: | 49 f7 1e 6a 42 26 33 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-13 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 09 71 af 86 f4 71 f9 bb e4 0d 2b 45 d7 29 39 05 | ikev2 g^x b7 87 ba 66 cb fb 2a f9 a1 bd 3d 61 b3 93 ac e4 | ikev2 g^x c3 99 b0 f5 02 62 ee dd 97 cd f6 04 fc 6c e4 91 | ikev2 g^x fc 5c 11 ba 5a 79 b1 78 a2 d0 e7 22 4a 47 b5 e0 | ikev2 g^x 1b 08 7f a6 c3 8e ce 71 40 0d 06 f3 62 f6 df f1 | ikev2 g^x 5d 7c 5b e2 d5 cd 0f 4d e6 c6 f8 d8 22 4f 95 11 | ikev2 g^x 69 b0 4c 7b c2 82 8e f9 ea f5 33 82 00 b3 c7 cc | ikev2 g^x c1 9e 50 02 8e 45 ef af 1a f9 8b 37 72 41 32 b8 | ikev2 g^x 47 f2 be df 3f 94 e4 a3 17 d5 55 32 fb 1f 2d d2 | ikev2 g^x 75 88 9c 98 42 60 51 41 31 79 19 3b ff ef b8 2a | ikev2 g^x 8e 39 2b ea 32 11 93 14 1c d3 9c 70 36 49 9b d1 | ikev2 g^x ea 38 9f 9a 6a 33 49 23 7d e2 c2 d5 b0 8d 83 b6 | ikev2 g^x ef a7 10 c8 a2 18 a7 4e 8b 07 bd 67 b5 96 c1 6a | ikev2 g^x d6 9d 73 c7 60 9d 60 25 5d 63 21 25 68 0e 24 b3 | ikev2 g^x 8f 19 40 42 2e 27 e9 30 d9 f9 1b 80 8f 2d ab dd | ikev2 g^x 1e f0 98 f5 b2 55 9b 6b 06 84 0f fe 26 32 f1 f7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce dd b6 a9 bb fd 56 26 b2 23 d7 97 2f 99 f7 92 2e | IKEv2 nonce ca d6 19 06 93 b1 8e 77 8d b7 a4 a3 73 9b 88 f0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 49 f7 1e 6a 42 26 33 db | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0d | natd_hash: port= 01 f4 | natd_hash: hash= ae 83 1c 22 e0 45 23 6f 5f d0 4f 89 cf 59 8e 77 | natd_hash: hash= 1e 0a 0b d7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ae 83 1c 22 e0 45 23 6f 5f d0 4f 89 cf 59 8e 77 | Notify data 1e 0a 0b d7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 49 f7 1e 6a 42 26 33 db | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e8 12 13 20 8d f1 d3 89 00 ae 66 0d fd eb 92 63 | natd_hash: hash= f1 cf 85 56 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e8 12 13 20 8d f1 d3 89 00 ae 66 0d fd eb 92 63 | Notify data f1 cf 85 56 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #13 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #13: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #13 to 4294967295 after switching state | Message ID: IKE #13 skipping update_recv as MD is fake | Message ID: sent #13 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-13" #13: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.13:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #13) | 49 f7 1e 6a 42 26 33 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 71 af 86 f4 71 f9 bb e4 0d 2b 45 d7 29 39 05 | b7 87 ba 66 cb fb 2a f9 a1 bd 3d 61 b3 93 ac e4 | c3 99 b0 f5 02 62 ee dd 97 cd f6 04 fc 6c e4 91 | fc 5c 11 ba 5a 79 b1 78 a2 d0 e7 22 4a 47 b5 e0 | 1b 08 7f a6 c3 8e ce 71 40 0d 06 f3 62 f6 df f1 | 5d 7c 5b e2 d5 cd 0f 4d e6 c6 f8 d8 22 4f 95 11 | 69 b0 4c 7b c2 82 8e f9 ea f5 33 82 00 b3 c7 cc | c1 9e 50 02 8e 45 ef af 1a f9 8b 37 72 41 32 b8 | 47 f2 be df 3f 94 e4 a3 17 d5 55 32 fb 1f 2d d2 | 75 88 9c 98 42 60 51 41 31 79 19 3b ff ef b8 2a | 8e 39 2b ea 32 11 93 14 1c d3 9c 70 36 49 9b d1 | ea 38 9f 9a 6a 33 49 23 7d e2 c2 d5 b0 8d 83 b6 | ef a7 10 c8 a2 18 a7 4e 8b 07 bd 67 b5 96 c1 6a | d6 9d 73 c7 60 9d 60 25 5d 63 21 25 68 0e 24 b3 | 8f 19 40 42 2e 27 e9 30 d9 f9 1b 80 8f 2d ab dd | 1e f0 98 f5 b2 55 9b 6b 06 84 0f fe 26 32 f1 f7 | 29 00 00 24 dd b6 a9 bb fd 56 26 b2 23 d7 97 2f | 99 f7 92 2e ca d6 19 06 93 b1 8e 77 8d b7 a4 a3 | 73 9b 88 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 83 1c 22 e0 45 23 6f 5f d0 4f 89 | cf 59 8e 77 1e 0a 0b d7 00 00 00 1c 00 00 40 05 | e8 12 13 20 8d f1 d3 89 00 ae 66 0d fd eb 92 63 | f1 cf 85 56 | state #13 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb380002b20 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #13 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 | #13 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49601.762678 | resume sending helper answer for #13 suppresed complete_v2_state_transition() and stole MD | #13 spent 0.469 milliseconds in resume sending helper answer | stop processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c009640 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 f7 1e 6a 42 26 33 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #13 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #13 | rejected packet: | 49 f7 1e 6a 42 26 33 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #13: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0802 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #4 | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #4 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #4 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49601.814958; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00145 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #4 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 "road-eastnet-nonat-4" #4: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #4) | 9f e3 9d 02 77 44 b7 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 12 be 82 37 05 d2 52 25 54 17 1c 7e a4 e7 a1 | 7e a3 9e 01 f0 c9 5e f6 79 14 37 d9 ec ef 3e 7b | d6 12 38 d8 73 16 9f 73 2c 17 04 25 c3 08 1e 06 | d4 99 19 15 32 45 9a a7 b4 d5 ad 96 4d 41 dc 91 | 4d c8 05 99 28 4b a0 e8 08 9f f7 76 6e 87 6e f0 | e8 58 e3 c1 70 13 6f 8d cd 7f 4b 91 ab b0 98 2b | 80 11 c8 ef d5 8f f3 5b b1 1f e0 43 de 0c 0e b1 | 13 32 29 e5 dd ca fb b5 e8 02 d1 3b 1d 9e 4d 95 | 8d f8 b1 fd 7f db 1b 37 33 cf 99 72 de f0 e3 79 | 73 e7 61 a0 9f 73 96 2a c8 d9 3f f2 5e 93 fa f5 | 10 3a 62 6a 38 cd 93 3a 9f a8 56 7d f2 c3 ee 21 | b5 e7 1b 68 51 3a 6c 80 5b ad 50 8d 16 63 1e 8c | 65 d8 ef 12 42 db b7 45 7e c0 09 e7 f6 56 5d da | d8 52 c7 89 46 5c ed c7 24 ca 60 5c ff 30 28 b2 | a1 94 8c ec d2 08 2c a4 8a 1d a2 db fd 97 89 ac | cf d6 3b e3 0f 35 26 7e 4f b9 c8 b0 82 f2 80 6e | 29 00 00 24 ff 8a 31 04 ed 0e 73 16 f9 33 92 87 | 63 96 e9 90 5e 3a 90 66 d0 c2 86 27 40 23 58 23 | 51 d5 8c f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 57 40 bb 9d 01 b2 e8 79 26 d3 b2 | 9e 9a c3 98 03 95 6b f7 00 00 00 1c 00 00 40 05 | 19 68 23 54 27 85 e7 5a 70 ec 13 67 75 7a 20 68 | 80 f1 f5 99 | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #4 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f e3 9d 02 77 44 b7 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #4 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #4 | rejected packet: | 9f e3 9d 02 77 44 b7 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #4: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46906b40 | handling event EVENT_RETRANSMIT for parent state #9 | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #9 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #9 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49601.817235; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499933 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #9 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-9" #9: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #9) | 42 d4 37 7c 6c a2 32 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b e7 ee 8b 3f 67 fc 59 f9 cf cd 11 31 95 6f 6f | 1a 68 46 c3 76 29 7e 71 e4 25 40 18 dc 88 c2 53 | ee 88 a1 08 66 15 f3 28 c2 cb 4a e2 b5 75 33 59 | 55 79 a1 88 5f 78 4f 18 38 8e ae 5c 13 15 13 df | ba 4a 47 c9 50 41 88 b6 f1 7a 74 8c 60 ff 93 b2 | 20 68 e4 46 db 20 8c 30 74 ea 04 10 5a 30 ea 94 | 23 ad e3 f6 b8 fd ef 4b 90 8b 27 14 bc c0 83 ef | 74 2c ab 49 65 76 af 73 fb 43 7c f1 ae d1 dd 3f | cd c7 7b 68 fb f4 41 39 5c 57 ef 8f 92 ea 9a 47 | 45 2a 1a ac 29 88 a1 89 ea a8 1a 7b a4 32 e3 9e | 8d f2 ad cb d1 f4 4e b8 a3 dd 79 49 05 1f 03 30 | 8a 93 8b ac 8f aa 22 b8 9b 89 24 78 34 56 75 f6 | e9 af c1 e4 36 df ba ca 6c 64 ef d5 97 79 d5 33 | 78 61 be 8d 16 b6 42 4a 4c 79 ee 04 84 ce 68 09 | e7 e6 62 4d 5a 49 5e d0 0c 5b 80 69 ff fd 56 0f | 18 1b 5a c8 54 c8 76 c4 ef 5e 74 08 bd 6d 13 c8 | 29 00 00 24 56 5b 42 39 e6 4b 00 04 2e 83 3d 83 | 1e c8 b4 ab 97 9b 33 06 82 c0 a9 36 06 ea b4 2d | 23 5d c5 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 a8 01 3e 09 4e 61 7c 63 45 b6 fc | 6b 13 a6 83 ef 8b fa 92 00 00 00 1c 00 00 40 05 | 4f 50 e4 89 50 50 84 2d e7 09 2b 9f ac 1d 9b 91 | c6 7c af 4c | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46906b40 | #9 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 d4 37 7c 6c a2 32 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #9 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #9 | rejected packet: | 42 d4 37 7c 6c a2 32 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #9: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-14" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-14' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #14 at 0x557d469e7d00 | State DB: adding IKEv2 state #14 in UNDEFINED | pstats #14 ikev2.ike started | Message ID: init #14: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #14: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #14; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-14" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-14" IKE SA #14 "road-eastnet-nonat-14" "road-eastnet-nonat-14" #14: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-14 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-14": constructed local IKE proposals for road-eastnet-nonat-14 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 14 for state #14 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46906b40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #14 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 | #14 spent 0.17 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-14" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.263 milliseconds in whack | crypto helper 17 resuming | crypto helper 17 starting work-order 14 for state #14 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 14 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 14 time elapsed 0.001003 seconds | (#14) spent 1.01 milliseconds in crypto helper computing work-order 14: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 14 for state #14 to event queue | scheduling resume sending helper answer for #14 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #14 | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 14 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #14 | **emit ISAKMP Message: | initiator cookie: | c3 13 eb 28 05 44 3c c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-14 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4f 9d 4b 57 65 9b 44 ef 02 5a 55 12 34 bd 3e fa | ikev2 g^x 1d 1d 02 b8 47 b4 07 d2 1c 40 a7 d2 b5 27 54 0d | ikev2 g^x 81 c5 8d d2 b0 f1 46 e6 2b f6 3a de 28 5d 98 ae | ikev2 g^x 72 2f 81 53 d7 e7 b2 d9 8d 92 9d 09 f6 b7 ce cc | ikev2 g^x 3e 71 cd 6b bc 9b 98 ad b9 25 11 78 67 a8 99 c6 | ikev2 g^x d0 09 70 45 b3 4c 5d bb c4 08 3e 65 01 7c 91 1b | ikev2 g^x 71 62 4d 8f 21 92 6e 0d cc 31 2a e5 1d 4d 2c 13 | ikev2 g^x a8 c8 3c 02 8d 36 79 d7 6c 16 bc 07 ba a2 3a 87 | ikev2 g^x 13 5a 36 f7 58 04 34 60 a3 2f 3a 9f 7c 23 64 3e | ikev2 g^x 35 e2 e2 a2 79 4c 9f fc 94 b5 56 35 03 c7 fc 3a | ikev2 g^x cf 61 0a a2 ca 12 f9 93 6a 8b f6 7c 71 75 e0 48 | ikev2 g^x 38 16 70 bd 8e 4a bd d6 cf f6 8e 6b de fc 4a f7 | ikev2 g^x 37 83 73 dd be 05 96 b0 07 8a ee 94 33 ed 86 17 | ikev2 g^x 8e 84 02 b1 3c 02 91 6e df 44 9a 23 83 12 9c 66 | ikev2 g^x e4 27 4d ff 2c b0 4c 89 bc bc 90 88 ea ad 2f 69 | ikev2 g^x 0e ca 37 3b 42 e0 ad 13 24 ad bb e5 a5 03 12 10 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce cb 20 8c 9f 6a 8c dd ed 7f 5a c1 49 4c ab 23 eb | IKEv2 nonce 51 b5 51 02 d0 17 95 d7 22 4b 61 df 15 62 c3 64 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c3 13 eb 28 05 44 3c c3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0e | natd_hash: port= 01 f4 | natd_hash: hash= 9e 81 d0 17 a6 30 05 4d 92 15 c2 f3 f4 8b 67 24 | natd_hash: hash= b4 9e ba 2d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9e 81 d0 17 a6 30 05 4d 92 15 c2 f3 f4 8b 67 24 | Notify data b4 9e ba 2d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c3 13 eb 28 05 44 3c c3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 8a 85 97 fb 20 dc 58 d7 a0 fe fa ad 9b 31 ea 8a | natd_hash: hash= c5 2b 9c 59 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8a 85 97 fb 20 dc 58 d7 a0 fe fa ad 9b 31 ea 8a | Notify data c5 2b 9c 59 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #14 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #14: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #14 to 4294967295 after switching state | Message ID: IKE #14 skipping update_recv as MD is fake | Message ID: sent #14 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-14" #14: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.14:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #14) | c3 13 eb 28 05 44 3c c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 9d 4b 57 65 9b 44 ef 02 5a 55 12 34 bd 3e fa | 1d 1d 02 b8 47 b4 07 d2 1c 40 a7 d2 b5 27 54 0d | 81 c5 8d d2 b0 f1 46 e6 2b f6 3a de 28 5d 98 ae | 72 2f 81 53 d7 e7 b2 d9 8d 92 9d 09 f6 b7 ce cc | 3e 71 cd 6b bc 9b 98 ad b9 25 11 78 67 a8 99 c6 | d0 09 70 45 b3 4c 5d bb c4 08 3e 65 01 7c 91 1b | 71 62 4d 8f 21 92 6e 0d cc 31 2a e5 1d 4d 2c 13 | a8 c8 3c 02 8d 36 79 d7 6c 16 bc 07 ba a2 3a 87 | 13 5a 36 f7 58 04 34 60 a3 2f 3a 9f 7c 23 64 3e | 35 e2 e2 a2 79 4c 9f fc 94 b5 56 35 03 c7 fc 3a | cf 61 0a a2 ca 12 f9 93 6a 8b f6 7c 71 75 e0 48 | 38 16 70 bd 8e 4a bd d6 cf f6 8e 6b de fc 4a f7 | 37 83 73 dd be 05 96 b0 07 8a ee 94 33 ed 86 17 | 8e 84 02 b1 3c 02 91 6e df 44 9a 23 83 12 9c 66 | e4 27 4d ff 2c b0 4c 89 bc bc 90 88 ea ad 2f 69 | 0e ca 37 3b 42 e0 ad 13 24 ad bb e5 a5 03 12 10 | 29 00 00 24 cb 20 8c 9f 6a 8c dd ed 7f 5a c1 49 | 4c ab 23 eb 51 b5 51 02 d0 17 95 d7 22 4b 61 df | 15 62 c3 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e 81 d0 17 a6 30 05 4d 92 15 c2 f3 | f4 8b 67 24 b4 9e ba 2d 00 00 00 1c 00 00 40 05 | 8a 85 97 fb 20 dc 58 d7 a0 fe fa ad 9b 31 ea 8a | c5 2b 9c 59 | state #14 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46906b40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46906b40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #14 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 | #14 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49601.852888 | resume sending helper answer for #14 suppresed complete_v2_state_transition() and stole MD | #14 spent 0.576 milliseconds in resume sending helper answer | stop processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb350009640 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c3 13 eb 28 05 44 3c c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #14 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #14 | rejected packet: | c3 13 eb 28 05 44 3c c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #14: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0698 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #10 | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #10 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #10 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49601.918115; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501292 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #10 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 "road-eastnet-nonat-10" #10: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #10) | 6b e4 01 c3 ed 3e ed 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2b 6a 85 96 38 f3 d3 4e 55 03 ae f3 d4 0f ad 38 | 83 2b 8b 92 04 a5 95 20 97 dc f8 34 30 38 91 0d | b9 c4 11 ab e9 a9 94 d4 16 5b f1 c4 91 68 3e fa | fb b4 36 73 13 7d c7 d0 75 c4 f9 ef fd 92 5b cc | aa e4 77 57 96 44 12 f0 38 b5 1d ad 33 4d 65 c3 | 93 63 ce 14 d7 d8 25 ef f8 0d ae dd 78 dc 8e b7 | 7e c2 3d a5 d5 d3 09 2b ad 9d bd a9 6f 55 df a1 | 6f b4 2e cf 9f fe 7e ae 25 58 a2 81 78 bb f7 29 | dd 53 e8 91 13 65 1e 1e 60 9c d0 15 9f bb 76 ed | ab 75 ce 2a 44 05 fa b1 a3 a7 39 d0 53 b7 7f 4f | e0 b7 8f a6 98 8c 07 ab a8 32 37 42 0c 8c 3d a7 | fc 6c 53 ac 60 2a 04 67 31 66 47 13 4f bc 34 8c | 30 51 26 7c 6a 36 76 70 15 29 7e 23 fc ac 0e 32 | 57 5c bb d9 b8 c0 27 61 5e fd 8f bc 73 83 16 ba | bf 42 32 51 56 3e 21 8b 6d 4a af 80 6d 52 1f d5 | 84 cd 2e ff dc c3 b8 a0 b2 26 7e 0c b7 e0 d0 d6 | 29 00 00 24 23 a8 6c e8 37 a1 47 09 f8 10 83 5c | 3f e5 80 de e6 d0 ee 9e 1f f2 6d 6a 1a c1 8c be | 9a 4a a5 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 14 ac ca 29 d0 75 c4 40 2c aa 37 | f4 15 d0 3b ed 2d a9 e1 00 00 00 1c 00 00 40 05 | 85 e0 a4 b5 9f 75 13 0f 6d a9 52 94 7d fa 0b 2d | 65 f2 06 03 | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #10 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b e4 01 c3 ed 3e ed 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #10 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #10 | rejected packet: | 6b e4 01 c3 ed 3e ed 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #10: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #5 | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #5 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #5 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49601.939468; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.009097 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #5 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 "road-eastnet-nonat-5" #5: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #5) | 83 a8 82 4c 6a b9 9b 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 f2 6a ba 4d 4c f4 ca d6 76 c6 37 a4 fc c6 08 | 03 3e 5e e8 b3 56 67 2c ed e0 33 33 68 d8 a5 17 | c5 ad 89 58 8b 66 c2 c6 28 95 15 86 95 42 17 c5 | 43 6b d6 1b 90 e3 ce 5a 73 0f aa 25 80 ef 21 ed | 95 16 dc 62 db 9c 9c f1 05 8d 7b ad 88 fd 8e 82 | 62 66 a4 5c 00 db 53 d1 2c ac b4 13 62 a5 17 eb | 3f 3a 4e bc 42 77 a1 e8 e1 8a 0f 63 81 66 10 64 | 10 0d 86 9e 89 34 85 5c 5f 55 4a cb 5a 29 86 16 | 42 90 ac 93 0b a7 fb e8 a5 4a 23 43 d7 02 e6 fe | c6 7b a9 b3 68 72 59 2e 24 fd 0c 7f 98 b0 6f 9f | bb aa 48 ce f6 ec 36 99 c2 bc 70 c4 81 9e 1c 55 | 65 47 9c 55 e0 d5 f3 7e 77 c4 a5 f3 6e 82 b5 1c | 5c 56 a1 3a b8 57 69 f9 25 e2 ae ed 66 c5 c1 3d | f8 ca 2e 2b 1c 6e 27 f2 e3 ed 73 79 be b7 90 0f | cb 45 38 5f bb 3a e3 c2 44 15 72 9c 24 d0 bd 4e | fa c4 ea 53 31 95 57 c9 dc a4 ff 15 7a 28 e4 1a | 29 00 00 24 13 3d aa 25 dd 95 48 ab fd a8 d2 56 | 6c 28 74 71 5d 45 11 19 10 09 0a f3 46 e9 c4 b3 | 56 85 8c 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bb 69 2e cb ee d3 68 5b 1c f0 7d a0 | 26 ce 80 e4 bd 02 f5 15 00 00 00 1c 00 00 40 05 | 1b de 40 93 48 c5 33 61 5d a6 1a 99 ad 20 57 85 | b1 bf 8b 0c | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #5 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 a8 82 4c 6a b9 9b 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #5 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #5 | rejected packet: | 83 a8 82 4c 6a b9 9b 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #5: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-15" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-15' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #15 at 0x557d469e92c0 | State DB: adding IKEv2 state #15 in UNDEFINED | pstats #15 ikev2.ike started | Message ID: init #15: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #15: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #15; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-15" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-15" IKE SA #15 "road-eastnet-nonat-15" "road-eastnet-nonat-15" #15: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-15 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-15": constructed local IKE proposals for road-eastnet-nonat-15 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 15 for state #15 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb360005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #15 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 | #15 spent 0.151 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-15" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.239 milliseconds in whack | crypto helper 18 resuming | crypto helper 18 starting work-order 15 for state #15 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 15 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 15 time elapsed 0.000775 seconds | (#15) spent 0.782 milliseconds in crypto helper computing work-order 15: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 15 for state #15 to event queue | scheduling resume sending helper answer for #15 | libevent_malloc: new ptr-libevent@0x7fb354009640 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #15 | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 15 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #15 | **emit ISAKMP Message: | initiator cookie: | 26 a2 6e 3b 12 a8 59 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-15 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b5 6b 03 2b 64 b1 a2 70 7f 8d ca f2 6f 54 de 1b | ikev2 g^x 11 e2 1d 10 c1 2b 3c 5f 6d e7 ca 6d ea a7 28 53 | ikev2 g^x d6 4f 75 27 52 bc 43 63 3a ab 63 49 ff c4 e6 b2 | ikev2 g^x 78 96 18 25 61 28 7f 9b 98 22 5e da 00 8c e8 eb | ikev2 g^x 6c 4d 9e 76 25 8b 7a 47 ab 33 22 55 42 23 3f c1 | ikev2 g^x 32 ba e7 e4 c9 4a 5f 0d 8b 0d 29 12 b2 18 5b ef | ikev2 g^x 5f af 09 c8 a4 7c fe 53 bc 8e 96 c3 8e be 32 ff | ikev2 g^x 43 00 6d 58 cd 42 72 b2 1b fc 90 55 08 bf 9d 89 | ikev2 g^x 5e b3 d9 d7 ab 1d c3 3d 09 0d c3 a0 b4 39 9a 0c | ikev2 g^x ea 26 37 38 25 17 00 86 5a bc 7b e6 34 6a b8 82 | ikev2 g^x f3 f9 2d 18 8b 60 8a e1 44 59 97 9d 3d 8f e9 c5 | ikev2 g^x f8 41 9b cd 41 cb 5c 6e 45 99 77 f2 5a 87 7b f0 | ikev2 g^x 1d 7f 22 98 41 7d c2 e4 77 82 d2 02 ca 3f 14 b4 | ikev2 g^x ed 6e 31 66 40 7e 40 f0 ba 85 c9 d3 8f 47 3c 65 | ikev2 g^x b9 d2 a6 cf 54 28 00 31 9f 56 44 5d 75 4a b4 99 | ikev2 g^x 1b dd 03 d3 13 f1 55 d7 db 2e bc 45 cf 65 35 32 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 67 e3 6e 73 a7 21 14 7b f9 65 b0 3b c5 ad 46 44 | IKEv2 nonce e6 80 5b 79 23 9d d2 69 99 df e6 8a c8 33 da 5b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 26 a2 6e 3b 12 a8 59 38 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0f | natd_hash: port= 01 f4 | natd_hash: hash= 5f 9d 30 3b 19 a7 57 ef 03 62 55 06 80 94 c0 4d | natd_hash: hash= a8 e2 a5 61 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5f 9d 30 3b 19 a7 57 ef 03 62 55 06 80 94 c0 4d | Notify data a8 e2 a5 61 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 26 a2 6e 3b 12 a8 59 38 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d9 d1 f1 c9 94 93 28 e9 a6 95 bd a3 15 8f 8e 30 | natd_hash: hash= 15 95 ff 3f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d9 d1 f1 c9 94 93 28 e9 a6 95 bd a3 15 8f 8e 30 | Notify data 15 95 ff 3f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #15 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #15: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #15 to 4294967295 after switching state | Message ID: IKE #15 skipping update_recv as MD is fake | Message ID: sent #15 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-15" #15: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.15:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #15) | 26 a2 6e 3b 12 a8 59 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 6b 03 2b 64 b1 a2 70 7f 8d ca f2 6f 54 de 1b | 11 e2 1d 10 c1 2b 3c 5f 6d e7 ca 6d ea a7 28 53 | d6 4f 75 27 52 bc 43 63 3a ab 63 49 ff c4 e6 b2 | 78 96 18 25 61 28 7f 9b 98 22 5e da 00 8c e8 eb | 6c 4d 9e 76 25 8b 7a 47 ab 33 22 55 42 23 3f c1 | 32 ba e7 e4 c9 4a 5f 0d 8b 0d 29 12 b2 18 5b ef | 5f af 09 c8 a4 7c fe 53 bc 8e 96 c3 8e be 32 ff | 43 00 6d 58 cd 42 72 b2 1b fc 90 55 08 bf 9d 89 | 5e b3 d9 d7 ab 1d c3 3d 09 0d c3 a0 b4 39 9a 0c | ea 26 37 38 25 17 00 86 5a bc 7b e6 34 6a b8 82 | f3 f9 2d 18 8b 60 8a e1 44 59 97 9d 3d 8f e9 c5 | f8 41 9b cd 41 cb 5c 6e 45 99 77 f2 5a 87 7b f0 | 1d 7f 22 98 41 7d c2 e4 77 82 d2 02 ca 3f 14 b4 | ed 6e 31 66 40 7e 40 f0 ba 85 c9 d3 8f 47 3c 65 | b9 d2 a6 cf 54 28 00 31 9f 56 44 5d 75 4a b4 99 | 1b dd 03 d3 13 f1 55 d7 db 2e bc 45 cf 65 35 32 | 29 00 00 24 67 e3 6e 73 a7 21 14 7b f9 65 b0 3b | c5 ad 46 44 e6 80 5b 79 23 9d d2 69 99 df e6 8a | c8 33 da 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 9d 30 3b 19 a7 57 ef 03 62 55 06 | 80 94 c0 4d a8 e2 a5 61 00 00 00 1c 00 00 40 05 | d9 d1 f1 c9 94 93 28 e9 a6 95 bd a3 15 8f 8e 30 | 15 95 ff 3f | state #15 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb360005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #15 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 | #15 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49601.949193 | resume sending helper answer for #15 suppresed complete_v2_state_transition() and stole MD | #15 spent 0.456 milliseconds in resume sending helper answer | stop processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb354009640 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 a2 6e 3b 12 a8 59 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #15 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #15 | rejected packet: | 26 a2 6e 3b 12 a8 59 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #15: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #6 | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #6 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #6 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49602.018989; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.008022 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #6 | libevent_malloc: new ptr-libevent@0x7fb354009640 size 128 "road-eastnet-nonat-6" #6: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #6) | 2c 27 82 3a c6 31 e5 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f e3 1c 46 2f 61 c1 a4 57 04 b2 32 f2 da 47 30 | c5 f1 b2 8c 52 8c bd 20 1e 07 9a 1f 74 e3 50 fd | 03 ad cd d6 6e b2 e0 ed 18 de c6 cf db 53 d8 91 | 57 59 05 93 13 39 ca c4 cd bf 1d c1 99 f1 ea ab | d7 0d 4d 84 1a b9 23 c8 19 a7 00 fc 45 cd 28 de | 1b 23 11 46 b2 a5 20 88 7d a8 2e 93 69 c4 77 be | 7d 08 db 5c 91 33 d0 aa e2 d7 27 ba c6 03 59 3c | 8a b9 c7 4b aa b0 c2 31 f9 3d af 03 a0 d0 38 f5 | 81 cf 2e 3b 37 ea b5 50 38 0b b5 3b be c1 ac 52 | d4 bd 41 74 e3 b0 cc da 00 70 a4 c8 a9 ae 2b 0c | 84 70 b9 c2 c8 dd e4 ca c8 d6 7a 14 75 f2 9f ca | f3 8a 9e fb 56 2f 7b 5f 34 ab 29 a4 eb 5d 7a 01 | af 1d 55 9d 0e 4d 00 2f f9 2a c8 90 cf 50 fe a3 | 20 3f bc dc b3 d6 01 f7 dd dc c1 b1 72 f5 58 73 | b8 72 e4 a9 88 17 39 c5 a4 43 c8 df b5 2f 8d cd | 75 f3 2c cf e2 85 8e ce 7f c9 07 83 41 8f 33 7b | 29 00 00 24 aa 55 22 5c 95 3a 98 8a 23 4e 55 f5 | f2 5b 2d e6 0f d6 a3 fc b7 39 7f a3 84 04 6c 99 | b3 1f 01 c8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd d8 7d b0 3b ed a4 77 8e 72 bc 87 | 11 c3 4a b5 09 51 99 2e 00 00 00 1c 00 00 40 05 | 3b ee 43 00 bb c4 11 7e a6 6d 91 83 5e ff b0 fd | ab 20 73 91 | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #6 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c 27 82 3a c6 31 e5 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #6 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #6 | rejected packet: | 2c 27 82 3a c6 31 e5 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #6: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #11 | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #11 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #11 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49602.055102; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.514563 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #11 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 "road-eastnet-nonat-11" #11: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #11) | c8 da f8 5c 6a b5 39 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 9a 4c 70 8e 88 d1 64 8d ca 55 b5 43 ac 3e 50 | 7f 03 c2 7c 99 61 59 48 6a 23 b9 2d d3 3a 08 ba | 31 66 90 b0 52 32 93 73 23 bd 35 f2 7d dc a9 8f | 88 4e 43 5d 55 55 8f 7b a2 ea ce 35 e9 07 bb 71 | 1f 5d f0 9c c9 20 a4 7c c9 a5 33 c5 b0 c5 fd 99 | f9 36 f9 d6 da 33 fa e1 2d e1 b8 55 01 35 5b d0 | b9 e1 af af a6 38 ef b1 36 65 8c 44 00 8a 8f f0 | cb 31 ec d5 89 23 22 d8 6f 57 3d 9d af 74 08 ea | 86 b5 7c 8c 76 9b 8d 04 5b 27 f9 7a 8d ed d8 36 | 77 1c 37 9a 9e c6 40 9c bb 1e 24 77 dc 4c b2 dc | 76 0c 2f 2d 23 9c f1 63 a5 64 8f c0 7e 6e 08 97 | 35 1b 8e 35 d5 a9 e6 fc d1 af 35 f0 b0 21 d4 42 | 5d 1b 4e c6 75 04 f0 3a f4 cc 11 09 3f ff 2d c6 | bf fa 44 99 e7 46 de 13 f5 47 98 02 47 dd 33 15 | 52 36 1a 46 d4 d8 ce dd 1a ad eb 4f 6b 1d 9e 82 | 8f b0 52 7f b0 b6 aa 8b 85 c1 d8 ed 73 6b 09 85 | 29 00 00 24 71 b3 70 95 41 f1 8a 3d 3f e8 5d 7c | 6b 52 d9 59 47 90 bd 2c 17 95 9e 28 b0 5d 83 17 | df a2 84 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 c8 ac c9 12 67 90 a0 d8 a9 94 84 | cc d4 e1 68 d0 49 e5 0f 00 00 00 1c 00 00 40 05 | a0 0d 8b f9 78 72 8b b9 69 a6 ab 0f 8f 46 28 db | d3 de 3a b5 | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #11 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 da f8 5c 6a b5 39 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #11 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #11 | rejected packet: | c8 da f8 5c 6a b5 39 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #11: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-16" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-16' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #16 at 0x557d469ea880 | State DB: adding IKEv2 state #16 in UNDEFINED | pstats #16 ikev2.ike started | Message ID: init #16: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #16: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #16; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-16" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-16" IKE SA #16 "road-eastnet-nonat-16" "road-eastnet-nonat-16" #16: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-16 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-16": constructed local IKE proposals for road-eastnet-nonat-16 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 16 for state #16 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb370005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #16 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 | #16 spent 0.132 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 resuming | crypto helper 7 starting work-order 16 for state #16 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 16 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 16 time elapsed 0.001004 seconds | (#16) spent 0.999 milliseconds in crypto helper computing work-order 16: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 16 for state #16 to event queue | scheduling resume sending helper answer for #16 | libevent_malloc: new ptr-libevent@0x7fb348009640 size 128 | crypto helper 7 waiting (nothing to do) | RESET processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-16" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.23 milliseconds in whack | processing resume sending helper answer for #16 | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 16 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #16 | **emit ISAKMP Message: | initiator cookie: | 6b 57 6c f9 94 8d 37 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-16 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c2 79 95 56 0f 3a d5 d4 38 4f 8b a1 27 c3 02 1b | ikev2 g^x 5e 3a 85 e1 08 09 e6 fc a8 62 0f 43 42 55 29 b8 | ikev2 g^x e4 f9 04 77 e0 10 6e f0 87 0e 34 48 79 7d 7a e8 | ikev2 g^x ca f4 cc cc 99 09 3c b6 c2 35 0f bc 7b 2d 41 d5 | ikev2 g^x dd f7 e4 e1 a4 f1 02 00 be 44 4b 47 7e b4 a8 a2 | ikev2 g^x 62 b7 14 ca 2d 3c f6 2d ca f0 71 35 95 46 55 c7 | ikev2 g^x 1c ba 8e 83 ee 6a 95 4e 0b 06 27 00 95 fd 56 5f | ikev2 g^x a2 f2 d6 ed a0 30 96 bf 3e 03 94 41 ed 51 4c 15 | ikev2 g^x 54 db 62 3c 9c 56 76 98 56 78 f9 0d a3 f4 ac 74 | ikev2 g^x a4 8d 21 e9 c2 d6 c6 f2 bf cc ab 95 d5 b5 69 db | ikev2 g^x 99 07 4a 4f 0a fb b6 0d 07 d8 b8 7a ef c0 3c c0 | ikev2 g^x fa 7f 1c 08 05 55 7f 42 6a 4f 4e 4e 1f 35 3a 92 | ikev2 g^x 3a 9a 25 4f 7a 92 43 f1 5a 60 e4 7c d0 47 d1 12 | ikev2 g^x 01 ce a1 b9 b7 b6 c9 00 28 c2 19 89 84 44 e5 78 | ikev2 g^x 95 8c db 08 69 6a 49 44 32 07 7d 96 fb 06 00 43 | ikev2 g^x c3 4e a1 ee cd 85 94 29 a6 9f 2d d7 39 41 3b c9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 85 0d a1 fb 37 74 4a 69 68 3b 97 74 ca a6 8b 60 | IKEv2 nonce be e5 4d eb 21 82 d1 c7 17 0f 24 83 fe 05 13 89 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6b 57 6c f9 94 8d 37 ce | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 10 | natd_hash: port= 01 f4 | natd_hash: hash= 20 42 5d 5a fd 9e 39 f4 1d d5 d8 fc 51 9a 83 f2 | natd_hash: hash= 5f a0 b0 5a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 20 42 5d 5a fd 9e 39 f4 1d d5 d8 fc 51 9a 83 f2 | Notify data 5f a0 b0 5a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6b 57 6c f9 94 8d 37 ce | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 36 95 c1 ea ee d0 12 21 b4 68 71 46 60 49 f3 80 | natd_hash: hash= 34 92 b4 f4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 36 95 c1 ea ee d0 12 21 b4 68 71 46 60 49 f3 80 | Notify data 34 92 b4 f4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #16 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #16: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #16 to 4294967295 after switching state | Message ID: IKE #16 skipping update_recv as MD is fake | Message ID: sent #16 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-16" #16: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.16:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #16) | 6b 57 6c f9 94 8d 37 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 79 95 56 0f 3a d5 d4 38 4f 8b a1 27 c3 02 1b | 5e 3a 85 e1 08 09 e6 fc a8 62 0f 43 42 55 29 b8 | e4 f9 04 77 e0 10 6e f0 87 0e 34 48 79 7d 7a e8 | ca f4 cc cc 99 09 3c b6 c2 35 0f bc 7b 2d 41 d5 | dd f7 e4 e1 a4 f1 02 00 be 44 4b 47 7e b4 a8 a2 | 62 b7 14 ca 2d 3c f6 2d ca f0 71 35 95 46 55 c7 | 1c ba 8e 83 ee 6a 95 4e 0b 06 27 00 95 fd 56 5f | a2 f2 d6 ed a0 30 96 bf 3e 03 94 41 ed 51 4c 15 | 54 db 62 3c 9c 56 76 98 56 78 f9 0d a3 f4 ac 74 | a4 8d 21 e9 c2 d6 c6 f2 bf cc ab 95 d5 b5 69 db | 99 07 4a 4f 0a fb b6 0d 07 d8 b8 7a ef c0 3c c0 | fa 7f 1c 08 05 55 7f 42 6a 4f 4e 4e 1f 35 3a 92 | 3a 9a 25 4f 7a 92 43 f1 5a 60 e4 7c d0 47 d1 12 | 01 ce a1 b9 b7 b6 c9 00 28 c2 19 89 84 44 e5 78 | 95 8c db 08 69 6a 49 44 32 07 7d 96 fb 06 00 43 | c3 4e a1 ee cd 85 94 29 a6 9f 2d d7 39 41 3b c9 | 29 00 00 24 85 0d a1 fb 37 74 4a 69 68 3b 97 74 | ca a6 8b 60 be e5 4d eb 21 82 d1 c7 17 0f 24 83 | fe 05 13 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 42 5d 5a fd 9e 39 f4 1d d5 d8 fc | 51 9a 83 f2 5f a0 b0 5a 00 00 00 1c 00 00 40 05 | 36 95 c1 ea ee d0 12 21 b4 68 71 46 60 49 f3 80 | 34 92 b4 f4 | state #16 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb370005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #16 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 | #16 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49602.102434 | resume sending helper answer for #16 suppresed complete_v2_state_transition() and stole MD | #16 spent 0.474 milliseconds in resume sending helper answer | stop processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb348009640 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b 57 6c f9 94 8d 37 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #16 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #16 | rejected packet: | 6b 57 6c f9 94 8d 37 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #16: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #7 | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #7 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #7 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49602.119249; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002546 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #7 | libevent_malloc: new ptr-libevent@0x7fb348009640 size 128 "road-eastnet-nonat-7" #7: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #7) | df 0f 9a c7 72 fc c7 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 16 59 37 af 9b 5a d1 22 e5 b7 89 f5 29 0b b4 | f8 e5 4b 2e 70 7a c8 bc f1 ab 2a 61 eb 02 ca fa | a3 75 2e 7e 2d d5 25 c9 fa fb 53 11 81 f8 e7 7c | 35 1a 09 cf c2 a1 7a e6 ba 83 f5 ea 71 c2 29 ca | 29 da 7e bf 99 10 95 66 d2 23 d8 4f 49 2f bd 63 | 11 b8 e1 71 39 92 a3 a7 60 6b 7a e8 94 6f c6 09 | 3e 44 50 a7 14 dd 81 7d 4c 7f 80 8c 35 65 97 9c | b1 11 76 e7 2a ca 44 b5 84 ae 8b 5a 9b fd ff 0d | 19 d8 e9 75 5a 70 67 71 dc 0e 22 08 1b 97 e2 25 | ad 6c 4c 80 de ff 3e 29 34 2a 32 fa 3b 41 ab 38 | c8 2c a4 db 1f 4a 62 fb 24 ff ed 13 44 3e 4c cb | a1 99 52 bb 30 b7 29 d8 9d 52 b8 4d 90 9d ab aa | c0 57 68 4e 57 cb d7 d7 cc 96 2c bc 75 0c 87 f5 | 9c 71 0b 3a 29 74 b7 e2 7f 5e 8b 9f 17 4e 89 84 | da f8 88 1c 69 02 1c 1f 41 83 de df 0e 7e 58 56 | 61 84 83 da 8c c8 98 f6 a7 9f db ce b7 aa a6 bc | 29 00 00 24 9d 55 08 62 c0 73 1e 47 79 75 2c 10 | 4a ab 88 17 80 18 91 8e 0d 3b 8f 21 a0 4a c9 52 | dc 93 16 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e cd 5f ad 94 80 bb 48 49 e9 a2 c8 | 76 8b 7e e8 6f 59 19 d9 00 00 00 1c 00 00 40 05 | 2f 3e df 6a 16 4a bb 95 81 15 e0 c0 73 52 29 fa | 60 85 d2 fd | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #7 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 0f 9a c7 72 fc c7 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #7 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #7 | rejected packet: | df 0f 9a c7 72 fc c7 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #7: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #12 | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #12 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #12 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49602.159405; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.506202 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #12 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 "road-eastnet-nonat-12" #12: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #12) | e6 90 0f 5b 12 9e fb 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 8d ca d0 bf fc d0 53 2f c8 94 c7 75 f0 b7 3b | 06 8d af 15 08 3d 4d 43 8a f2 0e 43 03 74 47 ab | c5 f6 5e c6 9d af 64 6c 5f 50 aa bb 63 91 17 7c | de 19 d6 a8 3d b9 0e 6f 98 77 91 78 cd c6 0f f1 | 83 bd 49 b7 4d 19 90 e6 2f f7 8d c2 99 5e 0c 41 | a4 92 59 8c f3 bc 56 51 55 c4 fc 8d 06 b4 b2 46 | fe 62 b5 0f 4e f1 c7 d9 31 4c e1 f7 06 2d 45 f5 | a0 d5 f5 94 55 0e 2f 00 35 d8 fb d6 3c 6a b6 b5 | 4d 93 6e 6b 9b 52 5b 1c 59 3e d0 a9 2b 70 a2 ec | b5 2f 18 f2 51 cd 4a e5 eb b3 21 70 eb 17 7e fb | 54 5e a1 de 02 46 1e 7f ed c7 44 7e dc 6d 9e 84 | 08 46 48 8f 2c 45 f3 c2 00 ca b5 46 fd 56 d4 bf | b0 41 68 33 e0 2a 67 86 f6 4d 18 8b 90 8d 3e 6b | c2 91 48 4f de cb 41 cd 2e 17 3b f1 b9 af ca 73 | 4b 2f d1 11 2b 7a 96 60 de b9 66 93 28 70 95 94 | 75 11 24 ea 0b a4 9a 4f 1b d9 88 31 b6 8a fe 22 | 29 00 00 24 52 e1 94 79 21 2a ea cc 69 4a af 5a | 5d ef 62 83 14 35 3b dc 33 a8 4c d8 5d ab 20 41 | 8b a5 be 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 aa 63 73 f1 76 ab f8 1b 79 46 f7 | 09 75 6d 3c 97 fc 7d df 00 00 00 1c 00 00 40 05 | db 6d 58 42 c9 d1 b0 49 17 a0 1e 30 4f f9 7e 58 | 72 29 56 37 | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #12 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 90 0f 5b 12 9e fb 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #12 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #12 | rejected packet: | e6 90 0f 5b 12 9e fb 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #12: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #8 | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #8 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #8 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49602.225113; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.009662 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #8 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 "road-eastnet-nonat-8" #8: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #8) | fc e4 b0 97 be 19 e9 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb d7 b3 51 4b 56 31 da 19 b8 5b 11 80 3b 41 1d | db f2 28 3e 72 37 5d 51 ba b2 d1 db 84 a6 bb ce | 1e df 68 85 ad 45 d9 42 b6 3f f1 bf ca c0 f5 c2 | 41 11 18 ed 51 a4 a9 fb cb 5c 4b aa 1e 3a 47 5b | 44 a6 6a b6 94 62 27 08 46 1d 7b c4 ed 7e 13 6a | ca 75 f3 53 1a b4 5c e1 d0 26 6f 40 15 2a cf 5a | f0 64 c4 e8 99 40 1c 70 04 b2 00 e7 d0 a3 f5 96 | 6f ea 9b 0f 3f 68 a1 38 bf d5 ee 9b d4 28 95 59 | 43 fb 48 c8 ce 17 ed f6 a6 07 54 e9 76 3f ee 31 | e6 e0 4a 4a d9 1d 0e e2 d0 7f ee 9c f3 8f a5 65 | 31 c9 6f 45 ef 29 7c e4 98 48 e7 74 36 9b 60 48 | d3 f3 57 f0 4c b4 e7 0c b5 86 17 23 2a 25 88 1a | fd 48 0b e6 cd dd cd 71 67 f2 f0 ef a5 6a 24 ce | 8d d1 03 48 9c cf 4e e9 3a a8 3d 43 bb 43 cc 87 | 8b c7 29 54 b9 be 7f 2d 59 4b b6 ed 8e 48 bd b3 | 3d c6 30 ad ce 82 73 65 33 71 0d 41 0a f1 8b 76 | 29 00 00 24 ca f3 cf 9b f4 48 aa 70 c1 ee a6 ea | 0d e2 1f 7c 7a 99 db 08 31 a2 ad 99 ee 01 2c 76 | 68 be 3a 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d b5 e6 39 e3 40 62 d7 8a aa fc 72 | 51 01 50 53 91 71 a4 51 00 00 00 1c 00 00 40 05 | 09 30 f5 72 c0 48 d1 9e 95 11 78 b6 cb 80 4b c0 | 24 25 44 07 | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #8 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc e4 b0 97 be 19 e9 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #8 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #8 | rejected packet: | fc e4 b0 97 be 19 e9 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #8: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0725 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-17" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-17' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #17 at 0x557d469ebe40 | State DB: adding IKEv2 state #17 in UNDEFINED | pstats #17 ikev2.ike started | Message ID: init #17: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #17: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #17; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-17" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-17" IKE SA #17 "road-eastnet-nonat-17" "road-eastnet-nonat-17" #17: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-17 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-17": constructed local IKE proposals for road-eastnet-nonat-17 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 17 for state #17 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb374005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #17 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 | #17 spent 0.156 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-17" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.242 milliseconds in whack | crypto helper 8 resuming | crypto helper 8 starting work-order 17 for state #17 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 17 | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 17 time elapsed 0.000992 seconds | (#17) spent 0.997 milliseconds in crypto helper computing work-order 17: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 17 for state #17 to event queue | scheduling resume sending helper answer for #17 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #17 | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 17 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #17 | **emit ISAKMP Message: | initiator cookie: | 95 d9 df c6 2f 4d 0c 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-17 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c4 5e 55 de a7 df 8c 8d ec f1 a6 b3 e1 a3 c9 2d | ikev2 g^x 5c 34 98 9a bf 18 3c 5f 5f 84 6f cc 00 89 2f b6 | ikev2 g^x 2e 0d 8a f0 e8 8a 33 b9 9f e3 4d bb 6f 5d 7f 7f | ikev2 g^x 55 e8 00 b1 58 6d 0f 17 37 b6 dc aa e5 63 e1 98 | ikev2 g^x c3 81 a6 04 b7 5c e1 a6 b2 29 9c 5a 0a 92 22 a4 | ikev2 g^x dd 4c 33 c2 4e 6f 90 29 c5 be 39 30 e7 2e 62 6c | ikev2 g^x 05 d7 89 8e 0f da b5 53 da 3f 31 31 12 b0 4c a7 | ikev2 g^x e6 a2 e9 57 ae d6 ea 04 d8 8b 73 ef 0e 9c 95 4e | ikev2 g^x 4b da 65 9c ef 6c 55 46 7d 0a 54 0c 93 37 db 94 | ikev2 g^x 63 8b a7 e9 ec 58 ed b4 f2 15 0c b0 9d 7b 2c 0d | ikev2 g^x 1e e8 20 04 e7 f0 90 d5 81 ce 8a 1d d9 30 60 b1 | ikev2 g^x c6 44 b1 01 fa 02 ef 06 8d 26 a1 09 a3 ce f8 2b | ikev2 g^x cd fc 0a 07 b0 8e b6 9d e8 6f 0c f0 b6 d6 40 9f | ikev2 g^x 58 4b a3 1f 87 35 a9 b2 45 93 43 35 38 68 86 6f | ikev2 g^x ea 62 4d 90 7e b9 e7 0c 07 f5 2a d5 71 68 12 96 | ikev2 g^x 09 17 2e 55 3e a1 6c 35 b5 20 1e 2a bf 27 6e 02 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce bf 2e 79 82 7e c6 1a 66 e2 b9 4b 2e f8 c7 dc 78 | IKEv2 nonce b4 81 b9 5d 2e e5 4c 2c 27 2c b6 31 c3 63 bf d9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 95 d9 df c6 2f 4d 0c 0f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 11 | natd_hash: port= 01 f4 | natd_hash: hash= 32 f5 2d 98 10 e8 c0 4d c4 df 42 b6 b0 c6 0b 95 | natd_hash: hash= 91 b6 b4 67 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 32 f5 2d 98 10 e8 c0 4d c4 df 42 b6 b0 c6 0b 95 | Notify data 91 b6 b4 67 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 95 d9 df c6 2f 4d 0c 0f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6f dc f7 24 ac 26 1a a6 48 cc ee 5d 39 06 66 40 | natd_hash: hash= 4c d6 6b fc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6f dc f7 24 ac 26 1a a6 48 cc ee 5d 39 06 66 40 | Notify data 4c d6 6b fc | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #17 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #17: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #17 to 4294967295 after switching state | Message ID: IKE #17 skipping update_recv as MD is fake | Message ID: sent #17 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-17" #17: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.17:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #17) | 95 d9 df c6 2f 4d 0c 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 5e 55 de a7 df 8c 8d ec f1 a6 b3 e1 a3 c9 2d | 5c 34 98 9a bf 18 3c 5f 5f 84 6f cc 00 89 2f b6 | 2e 0d 8a f0 e8 8a 33 b9 9f e3 4d bb 6f 5d 7f 7f | 55 e8 00 b1 58 6d 0f 17 37 b6 dc aa e5 63 e1 98 | c3 81 a6 04 b7 5c e1 a6 b2 29 9c 5a 0a 92 22 a4 | dd 4c 33 c2 4e 6f 90 29 c5 be 39 30 e7 2e 62 6c | 05 d7 89 8e 0f da b5 53 da 3f 31 31 12 b0 4c a7 | e6 a2 e9 57 ae d6 ea 04 d8 8b 73 ef 0e 9c 95 4e | 4b da 65 9c ef 6c 55 46 7d 0a 54 0c 93 37 db 94 | 63 8b a7 e9 ec 58 ed b4 f2 15 0c b0 9d 7b 2c 0d | 1e e8 20 04 e7 f0 90 d5 81 ce 8a 1d d9 30 60 b1 | c6 44 b1 01 fa 02 ef 06 8d 26 a1 09 a3 ce f8 2b | cd fc 0a 07 b0 8e b6 9d e8 6f 0c f0 b6 d6 40 9f | 58 4b a3 1f 87 35 a9 b2 45 93 43 35 38 68 86 6f | ea 62 4d 90 7e b9 e7 0c 07 f5 2a d5 71 68 12 96 | 09 17 2e 55 3e a1 6c 35 b5 20 1e 2a bf 27 6e 02 | 29 00 00 24 bf 2e 79 82 7e c6 1a 66 e2 b9 4b 2e | f8 c7 dc 78 b4 81 b9 5d 2e e5 4c 2c 27 2c b6 31 | c3 63 bf d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 f5 2d 98 10 e8 c0 4d c4 df 42 b6 | b0 c6 0b 95 91 b6 b4 67 00 00 00 1c 00 00 40 05 | 6f dc f7 24 ac 26 1a a6 48 cc ee 5d 39 06 66 40 | 4c d6 6b fc | state #17 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb374005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #17 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 | #17 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49602.239644 | resume sending helper answer for #17 suppresed complete_v2_state_transition() and stole MD | #17 spent 0.571 milliseconds in resume sending helper answer | stop processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c009640 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 d9 df c6 2f 4d 0c 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #17 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #17 | rejected packet: | 95 d9 df c6 2f 4d 0c 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #17: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0689 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #13 | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #13 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #13 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49602.273336; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.510658 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #13 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 "road-eastnet-nonat-13" #13: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #13) | 49 f7 1e 6a 42 26 33 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 71 af 86 f4 71 f9 bb e4 0d 2b 45 d7 29 39 05 | b7 87 ba 66 cb fb 2a f9 a1 bd 3d 61 b3 93 ac e4 | c3 99 b0 f5 02 62 ee dd 97 cd f6 04 fc 6c e4 91 | fc 5c 11 ba 5a 79 b1 78 a2 d0 e7 22 4a 47 b5 e0 | 1b 08 7f a6 c3 8e ce 71 40 0d 06 f3 62 f6 df f1 | 5d 7c 5b e2 d5 cd 0f 4d e6 c6 f8 d8 22 4f 95 11 | 69 b0 4c 7b c2 82 8e f9 ea f5 33 82 00 b3 c7 cc | c1 9e 50 02 8e 45 ef af 1a f9 8b 37 72 41 32 b8 | 47 f2 be df 3f 94 e4 a3 17 d5 55 32 fb 1f 2d d2 | 75 88 9c 98 42 60 51 41 31 79 19 3b ff ef b8 2a | 8e 39 2b ea 32 11 93 14 1c d3 9c 70 36 49 9b d1 | ea 38 9f 9a 6a 33 49 23 7d e2 c2 d5 b0 8d 83 b6 | ef a7 10 c8 a2 18 a7 4e 8b 07 bd 67 b5 96 c1 6a | d6 9d 73 c7 60 9d 60 25 5d 63 21 25 68 0e 24 b3 | 8f 19 40 42 2e 27 e9 30 d9 f9 1b 80 8f 2d ab dd | 1e f0 98 f5 b2 55 9b 6b 06 84 0f fe 26 32 f1 f7 | 29 00 00 24 dd b6 a9 bb fd 56 26 b2 23 d7 97 2f | 99 f7 92 2e ca d6 19 06 93 b1 8e 77 8d b7 a4 a3 | 73 9b 88 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 83 1c 22 e0 45 23 6f 5f d0 4f 89 | cf 59 8e 77 1e 0a 0b d7 00 00 00 1c 00 00 40 05 | e8 12 13 20 8d f1 d3 89 00 ae 66 0d fd eb 92 63 | f1 cf 85 56 | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #13 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #1 | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #1 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #1 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49602.273529; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.010811 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #1 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 "road-eastnet-nonat-1" #1: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #1) | 6c 47 a0 1e 4e 7a e8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 72 0a 33 22 17 06 fc fa 28 91 b3 4f 57 56 e3 | ee 34 d7 20 66 52 7a 35 d8 92 bd 3b 01 15 87 45 | 58 9b 73 12 6d c9 2d 63 ff 30 68 a3 01 b0 11 62 | 0d 6a c8 7a 26 90 7a 07 0b 27 d1 49 b8 5c b5 22 | a1 78 8f 5c ca 62 0b 66 89 cf a4 d3 28 f3 60 65 | c4 0b 09 ab 6c 65 0c 24 ce 5f 6b 9e 2d 74 21 c1 | cc dd a3 d2 b1 b2 d7 b0 e3 c8 e7 e0 b1 08 40 98 | ea 60 7f cb f6 03 0b de 16 74 c6 45 5a 5d fd 06 | 19 e0 e9 1d 81 07 89 02 31 28 9a 67 2f ad 6e 4a | 5d d5 b0 90 bd e1 d1 0c 6f c0 ca db 12 8a 57 f5 | 47 c8 09 2a 1b de 2b dc d0 ab ee bf fc be 4f ae | f0 8e 4b a7 a7 58 e9 98 9f 49 09 09 2b 4d 67 80 | 28 41 88 84 93 b4 f0 c4 d7 78 27 c0 fe b8 4a 13 | 52 ab 44 91 d1 9f f2 59 6f dd 35 3c 1e 70 9c d8 | 9d ab 34 6f 48 48 c0 46 69 91 44 bd 80 07 2d e1 | 42 55 8f bd 8c 53 47 7c 85 94 0c 8c ae 5e 19 a4 | 29 00 00 24 e7 5a 07 18 3f 34 30 d2 f0 5d 94 65 | 65 0d d9 4a 64 02 60 6e 32 ba 95 35 8b ff 59 40 | 3a 8b 9e 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 00 78 5c 8b 16 a5 c0 7d 51 c3 29 | 54 44 32 39 1b 8f 23 e8 00 00 00 1c 00 00 40 05 | 68 e9 c0 40 f1 97 39 51 93 0a 30 e5 6a bd eb d1 | f4 d9 bb 8c | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #1 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 f7 1e 6a 42 26 33 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #13 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #13 | rejected packet: | 49 f7 1e 6a 42 26 33 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #13: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 47 a0 1e 4e 7a e8 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #1 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #1 | rejected packet: | 6c 47 a0 1e 4e 7a e8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #1: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0575 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #9 | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #9 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #9 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49602.326577; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.009275 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #9 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 "road-eastnet-nonat-9" #9: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #9) | 42 d4 37 7c 6c a2 32 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b e7 ee 8b 3f 67 fc 59 f9 cf cd 11 31 95 6f 6f | 1a 68 46 c3 76 29 7e 71 e4 25 40 18 dc 88 c2 53 | ee 88 a1 08 66 15 f3 28 c2 cb 4a e2 b5 75 33 59 | 55 79 a1 88 5f 78 4f 18 38 8e ae 5c 13 15 13 df | ba 4a 47 c9 50 41 88 b6 f1 7a 74 8c 60 ff 93 b2 | 20 68 e4 46 db 20 8c 30 74 ea 04 10 5a 30 ea 94 | 23 ad e3 f6 b8 fd ef 4b 90 8b 27 14 bc c0 83 ef | 74 2c ab 49 65 76 af 73 fb 43 7c f1 ae d1 dd 3f | cd c7 7b 68 fb f4 41 39 5c 57 ef 8f 92 ea 9a 47 | 45 2a 1a ac 29 88 a1 89 ea a8 1a 7b a4 32 e3 9e | 8d f2 ad cb d1 f4 4e b8 a3 dd 79 49 05 1f 03 30 | 8a 93 8b ac 8f aa 22 b8 9b 89 24 78 34 56 75 f6 | e9 af c1 e4 36 df ba ca 6c 64 ef d5 97 79 d5 33 | 78 61 be 8d 16 b6 42 4a 4c 79 ee 04 84 ce 68 09 | e7 e6 62 4d 5a 49 5e d0 0c 5b 80 69 ff fd 56 0f | 18 1b 5a c8 54 c8 76 c4 ef 5e 74 08 bd 6d 13 c8 | 29 00 00 24 56 5b 42 39 e6 4b 00 04 2e 83 3d 83 | 1e c8 b4 ab 97 9b 33 06 82 c0 a9 36 06 ea b4 2d | 23 5d c5 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 a8 01 3e 09 4e 61 7c 63 45 b6 fc | 6b 13 a6 83 ef 8b fa 92 00 00 00 1c 00 00 40 05 | 4f 50 e4 89 50 50 84 2d e7 09 2b 9f ac 1d 9b 91 | c6 7c af 4c | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #9 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-18" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-18' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #18 at 0x557d469ed400 | State DB: adding IKEv2 state #18 in UNDEFINED | pstats #18 ikev2.ike started | Message ID: init #18: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #18: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #18; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-18" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-18" IKE SA #18 "road-eastnet-nonat-18" "road-eastnet-nonat-18" #18: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-18 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-18": constructed local IKE proposals for road-eastnet-nonat-18 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 18 for state #18 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb384002b20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #18 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 | #18 spent 0.125 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-18" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.195 milliseconds in whack recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 d4 37 7c 6c a2 32 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #9 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #9 | rejected packet: | 42 d4 37 7c 6c a2 32 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #9: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 12 resuming | crypto helper 12 starting work-order 18 for state #18 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 18 | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 18 time elapsed 0.000938 seconds | (#18) spent 0.944 milliseconds in crypto helper computing work-order 18: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 18 for state #18 to event queue | scheduling resume sending helper answer for #18 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #18 | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 18 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #18 | **emit ISAKMP Message: | initiator cookie: | fb 32 f3 fa 98 61 11 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-18 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d1 1b 0e e3 36 19 71 f2 00 c4 a6 18 1e bb 4a b9 | ikev2 g^x 3f d0 79 e4 4c 35 e5 1e 56 1e d1 56 df b2 32 fa | ikev2 g^x cb c3 c2 d3 4a 94 0b 28 4c 8e ed f1 14 00 ce ed | ikev2 g^x b6 d4 73 ac db 94 04 97 4d da 90 7f 61 f0 d2 4f | ikev2 g^x 60 04 42 6d 98 5c e4 05 d2 7d 05 4f 2d 99 94 a5 | ikev2 g^x 24 07 67 86 b6 21 b9 09 3a ea 16 cd cc b4 37 10 | ikev2 g^x 72 43 f6 be 6d 76 63 9b 24 f5 23 e6 b1 48 bc f9 | ikev2 g^x f2 cf d4 72 32 75 ee 93 a2 3d a2 fc 4d 35 5b 06 | ikev2 g^x 2a 31 6e 66 38 b7 b9 5b ce 6b 7a 5c 24 6c c6 91 | ikev2 g^x 21 f8 32 cc e1 e9 56 aa 56 2c 50 74 9d 0e c3 9c | ikev2 g^x b6 78 ee 5d a7 11 af c5 d5 50 6d b5 f0 a5 9d 4e | ikev2 g^x 3f d5 dc b9 6a 00 2b e1 dd 5f 8a e9 31 c5 30 8b | ikev2 g^x ee 43 f2 79 32 71 d6 e9 6e 27 23 22 2e 49 e0 0f | ikev2 g^x a1 32 43 40 65 d3 35 9f 97 aa f2 5c 61 69 29 93 | ikev2 g^x 3e f9 84 1e 9a f8 ea a4 2a 81 be 45 2f 6a 95 39 | ikev2 g^x a8 bb 2b 71 c2 45 83 fa e9 8d 63 1f 25 98 d1 4c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 64 09 7d 4a c3 95 64 a7 f6 f8 ca 35 d6 3a 22 ea | IKEv2 nonce 52 84 43 22 db d2 95 2f 1d 96 44 f9 61 f7 89 78 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fb 32 f3 fa 98 61 11 03 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 12 | natd_hash: port= 01 f4 | natd_hash: hash= 14 f9 c7 a2 f7 e0 10 e9 b6 c5 14 f2 0e d4 f3 ff | natd_hash: hash= 41 9a 2e 34 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 14 f9 c7 a2 f7 e0 10 e9 b6 c5 14 f2 0e d4 f3 ff | Notify data 41 9a 2e 34 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fb 32 f3 fa 98 61 11 03 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= be 8c d9 50 c4 e0 70 2a 58 15 0e 32 3f df db 0d | natd_hash: hash= 01 81 6c d8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data be 8c d9 50 c4 e0 70 2a 58 15 0e 32 3f df db 0d | Notify data 01 81 6c d8 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #18 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #18: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #18 to 4294967295 after switching state | Message ID: IKE #18 skipping update_recv as MD is fake | Message ID: sent #18 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-18" #18: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.18:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #18) | fb 32 f3 fa 98 61 11 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 1b 0e e3 36 19 71 f2 00 c4 a6 18 1e bb 4a b9 | 3f d0 79 e4 4c 35 e5 1e 56 1e d1 56 df b2 32 fa | cb c3 c2 d3 4a 94 0b 28 4c 8e ed f1 14 00 ce ed | b6 d4 73 ac db 94 04 97 4d da 90 7f 61 f0 d2 4f | 60 04 42 6d 98 5c e4 05 d2 7d 05 4f 2d 99 94 a5 | 24 07 67 86 b6 21 b9 09 3a ea 16 cd cc b4 37 10 | 72 43 f6 be 6d 76 63 9b 24 f5 23 e6 b1 48 bc f9 | f2 cf d4 72 32 75 ee 93 a2 3d a2 fc 4d 35 5b 06 | 2a 31 6e 66 38 b7 b9 5b ce 6b 7a 5c 24 6c c6 91 | 21 f8 32 cc e1 e9 56 aa 56 2c 50 74 9d 0e c3 9c | b6 78 ee 5d a7 11 af c5 d5 50 6d b5 f0 a5 9d 4e | 3f d5 dc b9 6a 00 2b e1 dd 5f 8a e9 31 c5 30 8b | ee 43 f2 79 32 71 d6 e9 6e 27 23 22 2e 49 e0 0f | a1 32 43 40 65 d3 35 9f 97 aa f2 5c 61 69 29 93 | 3e f9 84 1e 9a f8 ea a4 2a 81 be 45 2f 6a 95 39 | a8 bb 2b 71 c2 45 83 fa e9 8d 63 1f 25 98 d1 4c | 29 00 00 24 64 09 7d 4a c3 95 64 a7 f6 f8 ca 35 | d6 3a 22 ea 52 84 43 22 db d2 95 2f 1d 96 44 f9 | 61 f7 89 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 f9 c7 a2 f7 e0 10 e9 b6 c5 14 f2 | 0e d4 f3 ff 41 9a 2e 34 00 00 00 1c 00 00 40 05 | be 8c d9 50 c4 e0 70 2a 58 15 0e 32 3f df db 0d | 01 81 6c d8 | state #18 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb384002b20 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #18 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 | #18 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49602.329167 | resume sending helper answer for #18 suppresed complete_v2_state_transition() and stole MD | #18 spent 0.474 milliseconds in resume sending helper answer | stop processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb340009640 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 32 f3 fa 98 61 11 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #18 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #18 | rejected packet: | fb 32 f3 fa 98 61 11 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #18: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46906b40 | handling event EVENT_RETRANSMIT for parent state #14 | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #14 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #14 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49602.356118; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50323 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #14 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 "road-eastnet-nonat-14" #14: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #14) | c3 13 eb 28 05 44 3c c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 9d 4b 57 65 9b 44 ef 02 5a 55 12 34 bd 3e fa | 1d 1d 02 b8 47 b4 07 d2 1c 40 a7 d2 b5 27 54 0d | 81 c5 8d d2 b0 f1 46 e6 2b f6 3a de 28 5d 98 ae | 72 2f 81 53 d7 e7 b2 d9 8d 92 9d 09 f6 b7 ce cc | 3e 71 cd 6b bc 9b 98 ad b9 25 11 78 67 a8 99 c6 | d0 09 70 45 b3 4c 5d bb c4 08 3e 65 01 7c 91 1b | 71 62 4d 8f 21 92 6e 0d cc 31 2a e5 1d 4d 2c 13 | a8 c8 3c 02 8d 36 79 d7 6c 16 bc 07 ba a2 3a 87 | 13 5a 36 f7 58 04 34 60 a3 2f 3a 9f 7c 23 64 3e | 35 e2 e2 a2 79 4c 9f fc 94 b5 56 35 03 c7 fc 3a | cf 61 0a a2 ca 12 f9 93 6a 8b f6 7c 71 75 e0 48 | 38 16 70 bd 8e 4a bd d6 cf f6 8e 6b de fc 4a f7 | 37 83 73 dd be 05 96 b0 07 8a ee 94 33 ed 86 17 | 8e 84 02 b1 3c 02 91 6e df 44 9a 23 83 12 9c 66 | e4 27 4d ff 2c b0 4c 89 bc bc 90 88 ea ad 2f 69 | 0e ca 37 3b 42 e0 ad 13 24 ad bb e5 a5 03 12 10 | 29 00 00 24 cb 20 8c 9f 6a 8c dd ed 7f 5a c1 49 | 4c ab 23 eb 51 b5 51 02 d0 17 95 d7 22 4b 61 df | 15 62 c3 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e 81 d0 17 a6 30 05 4d 92 15 c2 f3 | f4 8b 67 24 b4 9e ba 2d 00 00 00 1c 00 00 40 05 | 8a 85 97 fb 20 dc 58 d7 a0 fe fa ad 9b 31 ea 8a | c5 2b 9c 59 | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46906b40 | #14 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c3 13 eb 28 05 44 3c c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #14 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #14 | rejected packet: | c3 13 eb 28 05 44 3c c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #14: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350005860 | handling event EVENT_RETRANSMIT for parent state #10 | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #10 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #10 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49602.422856; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.006033 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46906b40 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #10 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 "road-eastnet-nonat-10" #10: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #10) | 6b e4 01 c3 ed 3e ed 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2b 6a 85 96 38 f3 d3 4e 55 03 ae f3 d4 0f ad 38 | 83 2b 8b 92 04 a5 95 20 97 dc f8 34 30 38 91 0d | b9 c4 11 ab e9 a9 94 d4 16 5b f1 c4 91 68 3e fa | fb b4 36 73 13 7d c7 d0 75 c4 f9 ef fd 92 5b cc | aa e4 77 57 96 44 12 f0 38 b5 1d ad 33 4d 65 c3 | 93 63 ce 14 d7 d8 25 ef f8 0d ae dd 78 dc 8e b7 | 7e c2 3d a5 d5 d3 09 2b ad 9d bd a9 6f 55 df a1 | 6f b4 2e cf 9f fe 7e ae 25 58 a2 81 78 bb f7 29 | dd 53 e8 91 13 65 1e 1e 60 9c d0 15 9f bb 76 ed | ab 75 ce 2a 44 05 fa b1 a3 a7 39 d0 53 b7 7f 4f | e0 b7 8f a6 98 8c 07 ab a8 32 37 42 0c 8c 3d a7 | fc 6c 53 ac 60 2a 04 67 31 66 47 13 4f bc 34 8c | 30 51 26 7c 6a 36 76 70 15 29 7e 23 fc ac 0e 32 | 57 5c bb d9 b8 c0 27 61 5e fd 8f bc 73 83 16 ba | bf 42 32 51 56 3e 21 8b 6d 4a af 80 6d 52 1f d5 | 84 cd 2e ff dc c3 b8 a0 b2 26 7e 0c b7 e0 d0 d6 | 29 00 00 24 23 a8 6c e8 37 a1 47 09 f8 10 83 5c | 3f e5 80 de e6 d0 ee 9e 1f f2 6d 6a 1a c1 8c be | 9a 4a a5 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 14 ac ca 29 d0 75 c4 40 2c aa 37 | f4 15 d0 3b ed 2d a9 e1 00 00 00 1c 00 00 40 05 | 85 e0 a4 b5 9f 75 13 0f 6d a9 52 94 7d fa 0b 2d | 65 f2 06 03 | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350005860 | #10 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b e4 01 c3 ed 3e ed 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #10 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #10 | rejected packet: | 6b e4 01 c3 ed 3e ed 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #10: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-19" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-19' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #19 at 0x557d469ee9c0 | State DB: adding IKEv2 state #19 in UNDEFINED | pstats #19 ikev2.ike started | Message ID: init #19: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #19: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #19; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-19" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-19" IKE SA #19 "road-eastnet-nonat-19" "road-eastnet-nonat-19" #19: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-19 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-19": constructed local IKE proposals for road-eastnet-nonat-19 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 19 for state #19 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb350005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #19 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 | #19 spent 0.144 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-19" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.23 milliseconds in whack | crypto helper 5 resuming | crypto helper 5 starting work-order 19 for state #19 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 19 | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 19 time elapsed 0.000999 seconds | (#19) spent 1 milliseconds in crypto helper computing work-order 19: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 19 for state #19 to event queue | scheduling resume sending helper answer for #19 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #19 | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 19 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #19 | **emit ISAKMP Message: | initiator cookie: | 71 b7 8f 2a c9 ab 65 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-19 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d0 3e b3 71 5b 2a 7e 67 38 d7 ab 7a d2 03 90 2c | ikev2 g^x 27 b7 e6 d5 a7 20 27 79 5e 88 db 2d 02 14 e6 05 | ikev2 g^x 6f 07 f4 c1 2b 42 e9 2b 16 c7 24 00 68 97 23 09 | ikev2 g^x 9b 28 53 ba dc 36 46 57 40 1e 29 01 4a b7 49 a8 | ikev2 g^x 4d 9b c0 f6 6d 6c 59 7a d3 fe f7 05 02 d7 dc 3f | ikev2 g^x 33 37 fa 6e 66 82 3b 0b fc 41 01 e0 cf 12 33 b2 | ikev2 g^x a1 18 77 fd c8 36 dd ad 0b 8f 44 4a dc 2c 38 79 | ikev2 g^x 30 fa d4 bf 2a 29 27 db 37 30 a3 c6 e5 0f b5 2b | ikev2 g^x 3c 20 72 b8 f7 83 6c 1c 84 55 8f f3 1f 64 ae 19 | ikev2 g^x e5 47 9f 5e eb 0a e5 2c 75 55 6a e2 43 09 5c e9 | ikev2 g^x 24 9c 73 ae e6 a6 e7 07 f6 fe ad 11 3d af ab 94 | ikev2 g^x 47 55 a2 0e c7 5d 4b 0e 42 8f 1e 08 35 c6 12 3b | ikev2 g^x 76 58 3a e5 1d 69 62 62 bc c4 a4 b5 cb 6c d9 c9 | ikev2 g^x 2b 81 e2 3b e9 c6 13 78 c3 3f f3 38 91 f3 11 a1 | ikev2 g^x 04 e8 fa 3f 9f e8 f9 3d 60 98 07 62 99 3c 36 86 | ikev2 g^x 40 55 c7 f1 5a 42 4d 99 21 5e 58 f5 e4 8a cb d6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d1 01 c3 e5 0a d4 10 8b f6 20 25 e6 de b5 f4 be | IKEv2 nonce cf de 7f f4 c1 d3 ec a5 70 52 4e 33 0b 30 f5 af | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 71 b7 8f 2a c9 ab 65 8a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 13 | natd_hash: port= 01 f4 | natd_hash: hash= b5 74 af f0 20 10 33 a5 14 d9 51 67 36 d9 37 b0 | natd_hash: hash= 71 8d 2c dc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b5 74 af f0 20 10 33 a5 14 d9 51 67 36 d9 37 b0 | Notify data 71 8d 2c dc | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 71 b7 8f 2a c9 ab 65 8a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 0e 08 6a ae a9 27 97 90 41 13 4d a4 49 51 01 50 | natd_hash: hash= a2 07 2e 34 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0e 08 6a ae a9 27 97 90 41 13 4d a4 49 51 01 50 | Notify data a2 07 2e 34 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #19 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #19: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #19 to 4294967295 after switching state | Message ID: IKE #19 skipping update_recv as MD is fake | Message ID: sent #19 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-19" #19: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.19:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #19) | 71 b7 8f 2a c9 ab 65 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 3e b3 71 5b 2a 7e 67 38 d7 ab 7a d2 03 90 2c | 27 b7 e6 d5 a7 20 27 79 5e 88 db 2d 02 14 e6 05 | 6f 07 f4 c1 2b 42 e9 2b 16 c7 24 00 68 97 23 09 | 9b 28 53 ba dc 36 46 57 40 1e 29 01 4a b7 49 a8 | 4d 9b c0 f6 6d 6c 59 7a d3 fe f7 05 02 d7 dc 3f | 33 37 fa 6e 66 82 3b 0b fc 41 01 e0 cf 12 33 b2 | a1 18 77 fd c8 36 dd ad 0b 8f 44 4a dc 2c 38 79 | 30 fa d4 bf 2a 29 27 db 37 30 a3 c6 e5 0f b5 2b | 3c 20 72 b8 f7 83 6c 1c 84 55 8f f3 1f 64 ae 19 | e5 47 9f 5e eb 0a e5 2c 75 55 6a e2 43 09 5c e9 | 24 9c 73 ae e6 a6 e7 07 f6 fe ad 11 3d af ab 94 | 47 55 a2 0e c7 5d 4b 0e 42 8f 1e 08 35 c6 12 3b | 76 58 3a e5 1d 69 62 62 bc c4 a4 b5 cb 6c d9 c9 | 2b 81 e2 3b e9 c6 13 78 c3 3f f3 38 91 f3 11 a1 | 04 e8 fa 3f 9f e8 f9 3d 60 98 07 62 99 3c 36 86 | 40 55 c7 f1 5a 42 4d 99 21 5e 58 f5 e4 8a cb d6 | 29 00 00 24 d1 01 c3 e5 0a d4 10 8b f6 20 25 e6 | de b5 f4 be cf de 7f f4 c1 d3 ec a5 70 52 4e 33 | 0b 30 f5 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 74 af f0 20 10 33 a5 14 d9 51 67 | 36 d9 37 b0 71 8d 2c dc 00 00 00 1c 00 00 40 05 | 0e 08 6a ae a9 27 97 90 41 13 4d a4 49 51 01 50 | a2 07 2e 34 | state #19 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb350005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #19 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 | #19 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49602.447639 | resume sending helper answer for #19 suppresed complete_v2_state_transition() and stole MD | #19 spent 0.506 milliseconds in resume sending helper answer | stop processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb344009640 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 b7 8f 2a c9 ab 65 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #19 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #19 | rejected packet: | 71 b7 8f 2a c9 ab 65 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #19: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0673 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #15 | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #15 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #15 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49602.450855; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501662 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #15 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 "road-eastnet-nonat-15" #15: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #15) | 26 a2 6e 3b 12 a8 59 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 6b 03 2b 64 b1 a2 70 7f 8d ca f2 6f 54 de 1b | 11 e2 1d 10 c1 2b 3c 5f 6d e7 ca 6d ea a7 28 53 | d6 4f 75 27 52 bc 43 63 3a ab 63 49 ff c4 e6 b2 | 78 96 18 25 61 28 7f 9b 98 22 5e da 00 8c e8 eb | 6c 4d 9e 76 25 8b 7a 47 ab 33 22 55 42 23 3f c1 | 32 ba e7 e4 c9 4a 5f 0d 8b 0d 29 12 b2 18 5b ef | 5f af 09 c8 a4 7c fe 53 bc 8e 96 c3 8e be 32 ff | 43 00 6d 58 cd 42 72 b2 1b fc 90 55 08 bf 9d 89 | 5e b3 d9 d7 ab 1d c3 3d 09 0d c3 a0 b4 39 9a 0c | ea 26 37 38 25 17 00 86 5a bc 7b e6 34 6a b8 82 | f3 f9 2d 18 8b 60 8a e1 44 59 97 9d 3d 8f e9 c5 | f8 41 9b cd 41 cb 5c 6e 45 99 77 f2 5a 87 7b f0 | 1d 7f 22 98 41 7d c2 e4 77 82 d2 02 ca 3f 14 b4 | ed 6e 31 66 40 7e 40 f0 ba 85 c9 d3 8f 47 3c 65 | b9 d2 a6 cf 54 28 00 31 9f 56 44 5d 75 4a b4 99 | 1b dd 03 d3 13 f1 55 d7 db 2e bc 45 cf 65 35 32 | 29 00 00 24 67 e3 6e 73 a7 21 14 7b f9 65 b0 3b | c5 ad 46 44 e6 80 5b 79 23 9d d2 69 99 df e6 8a | c8 33 da 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 9d 30 3b 19 a7 57 ef 03 62 55 06 | 80 94 c0 4d a8 e2 a5 61 00 00 00 1c 00 00 40 05 | d9 d1 f1 c9 94 93 28 e9 a6 95 bd a3 15 8f 8e 30 | 15 95 ff 3f | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #15 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 a2 6e 3b 12 a8 59 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #15 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #15 | rejected packet: | 26 a2 6e 3b 12 a8 59 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #15: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-20" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-20' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #20 at 0x557d469eff80 | State DB: adding IKEv2 state #20 in UNDEFINED | pstats #20 ikev2.ike started | Message ID: init #20: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #20: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #20; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-20" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-20" IKE SA #20 "road-eastnet-nonat-20" "road-eastnet-nonat-20" #20: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-20 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-20": constructed local IKE proposals for road-eastnet-nonat-20 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 20 for state #20 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb360005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #20 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 | #20 spent 0.148 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-20" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.237 milliseconds in whack | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #2 | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #2 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #2 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49602.530829; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.009671 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ddbf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #2 | libevent_malloc: new ptr-libevent@0x557d469e1b60 size 128 "road-eastnet-nonat-2" #2: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #2) | 1a 6c de c8 74 c5 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e e6 40 8d 01 9a df ee a1 21 ef 7c 27 51 b1 50 | 11 ab 49 b8 aa be 06 6f 98 06 4f a8 49 fc 42 fd | ea ae 86 e5 22 2c b5 91 3d 9f 17 1f 02 b9 b9 8d | 62 48 db a9 bf 68 b6 2a 81 1e f5 ea 96 5e fc 90 | a8 90 23 f2 fa 81 8e 8c d6 45 a8 56 67 da 61 6d | ec 8f 6b 5d aa 73 41 20 29 44 b2 20 1c ab 68 57 | 66 6f ca 43 df ea 03 70 f7 0e 47 cb 21 da 37 fa | b6 1e 94 d5 b1 5e b7 96 a4 f5 5a 22 ff b7 b7 1e | 62 65 38 93 8b 8d 44 bd 9f ea 0f 68 70 be 74 db | b6 35 f8 53 58 61 01 df be e6 bf 45 b0 94 55 ae | 5d 6b 51 98 47 dd 93 18 5c 30 93 96 42 3e 47 91 | 90 01 1e 32 64 de ec ce 38 b5 ab f8 4a 4f 0c ed | d8 fd 0a f1 53 ed ad 6b 9e c5 db 7f 6d 9f 1b e5 | 0c 7b f2 2f 6f ec 10 d1 5b 4b 71 ee 47 5f b6 1f | b0 01 08 5f 12 c2 5d 47 67 6d 8f ee c4 bf 47 5b | 6c 71 d5 40 dd 10 ef f5 69 2a fd 09 2a aa 47 a4 | 29 00 00 24 31 10 28 eb fd d1 21 19 30 13 d3 a7 | cd be e5 7b ca b3 e1 fc 00 55 31 87 01 f1 62 07 | 15 72 f6 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 6d fc d3 8f 25 27 03 1f 7a b6 de | f8 04 ad d3 88 d5 17 aa 00 00 00 1c 00 00 40 05 | 09 59 07 05 b4 e1 f1 0d 32 74 62 04 62 1e 48 d0 | 7d 5b 7f 5e | libevent_free: release ptr-libevent@0x7fb37c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #2 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 6c de c8 74 c5 fb 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #2 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #2 | rejected packet: | 1a 6c de c8 74 c5 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #2: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 3 resuming | crypto helper 3 starting work-order 20 for state #20 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 20 | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 20 time elapsed 0.001002 seconds | (#20) spent 1.01 milliseconds in crypto helper computing work-order 20: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 20 for state #20 to event queue | scheduling resume sending helper answer for #20 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #20 | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 20 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #20 | **emit ISAKMP Message: | initiator cookie: | 2a d8 6a 5c 08 dc 68 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-20 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ad 76 8b c3 8a cd 7e 81 09 43 af dc 84 86 57 86 | ikev2 g^x ac 01 81 74 96 d6 08 70 58 d2 f7 10 2a f2 1e 9d | ikev2 g^x b0 95 95 b3 32 1e e8 01 5c d2 e7 39 14 67 2f fd | ikev2 g^x 6f cc fb 0b 1d bd c7 ac 37 fb c6 6d e0 84 f8 c8 | ikev2 g^x 00 c1 d6 0f 3b e2 a7 4b 51 a3 13 bb 3d f4 c2 99 | ikev2 g^x 9b 84 74 df c2 bf fa 13 e4 2a f9 e8 2d 4c 6c c5 | ikev2 g^x 8d e3 52 85 e9 f8 18 fc 4b 38 b9 82 e0 ab 65 b7 | ikev2 g^x ae a5 89 3c 88 ee 05 34 a9 d7 52 0c 03 2e a9 7e | ikev2 g^x e2 c7 7b c9 35 8f e6 9e 0b 55 49 71 ce bd 37 1f | ikev2 g^x 22 8f 48 76 19 75 9b c0 7a 62 4e 51 77 02 d7 bf | ikev2 g^x e0 ea 0a 67 41 41 2e 98 4f f3 cf 32 f2 ae 82 83 | ikev2 g^x 1f 56 7c 33 17 50 fa 76 01 41 f1 ba 05 90 db bd | ikev2 g^x 83 b9 cd 1b b8 6e f3 33 72 7e 47 f3 20 71 8f e7 | ikev2 g^x ec 91 f3 37 6a 94 11 a2 55 f0 09 1c 76 98 cd 56 | ikev2 g^x 66 be 33 43 a6 1c f5 8b 31 c4 e3 0a 7b 29 cc 17 | ikev2 g^x 3f 13 b8 73 4c 86 e0 b0 2a 03 32 6a 19 82 cb a2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 47 97 3a 6f 12 05 22 fe fb dc 3c 25 ff 91 0d 7a | IKEv2 nonce c8 4c ac f8 1f 7e d1 5f 41 39 e3 39 e8 aa 43 e2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 2a d8 6a 5c 08 dc 68 cc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 14 | natd_hash: port= 01 f4 | natd_hash: hash= 1f 67 98 f7 05 c6 ee 5e 5b 5f e2 fa ee a5 ba af | natd_hash: hash= 57 96 46 d2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1f 67 98 f7 05 c6 ee 5e 5b 5f e2 fa ee a5 ba af | Notify data 57 96 46 d2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 2a d8 6a 5c 08 dc 68 cc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 3e ef c3 bb 3d a5 88 fb 9f 3c 53 fd 3b c9 ea 45 | natd_hash: hash= 6f 53 bd 02 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3e ef c3 bb 3d a5 88 fb 9f 3c 53 fd 3b c9 ea 45 | Notify data 6f 53 bd 02 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #20 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #20: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #20 to 4294967295 after switching state | Message ID: IKE #20 skipping update_recv as MD is fake | Message ID: sent #20 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-20" #20: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.20:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #20) | 2a d8 6a 5c 08 dc 68 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad 76 8b c3 8a cd 7e 81 09 43 af dc 84 86 57 86 | ac 01 81 74 96 d6 08 70 58 d2 f7 10 2a f2 1e 9d | b0 95 95 b3 32 1e e8 01 5c d2 e7 39 14 67 2f fd | 6f cc fb 0b 1d bd c7 ac 37 fb c6 6d e0 84 f8 c8 | 00 c1 d6 0f 3b e2 a7 4b 51 a3 13 bb 3d f4 c2 99 | 9b 84 74 df c2 bf fa 13 e4 2a f9 e8 2d 4c 6c c5 | 8d e3 52 85 e9 f8 18 fc 4b 38 b9 82 e0 ab 65 b7 | ae a5 89 3c 88 ee 05 34 a9 d7 52 0c 03 2e a9 7e | e2 c7 7b c9 35 8f e6 9e 0b 55 49 71 ce bd 37 1f | 22 8f 48 76 19 75 9b c0 7a 62 4e 51 77 02 d7 bf | e0 ea 0a 67 41 41 2e 98 4f f3 cf 32 f2 ae 82 83 | 1f 56 7c 33 17 50 fa 76 01 41 f1 ba 05 90 db bd | 83 b9 cd 1b b8 6e f3 33 72 7e 47 f3 20 71 8f e7 | ec 91 f3 37 6a 94 11 a2 55 f0 09 1c 76 98 cd 56 | 66 be 33 43 a6 1c f5 8b 31 c4 e3 0a 7b 29 cc 17 | 3f 13 b8 73 4c 86 e0 b0 2a 03 32 6a 19 82 cb a2 | 29 00 00 24 47 97 3a 6f 12 05 22 fe fb dc 3c 25 | ff 91 0d 7a c8 4c ac f8 1f 7e d1 5f 41 39 e3 39 | e8 aa 43 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f 67 98 f7 05 c6 ee 5e 5b 5f e2 fa | ee a5 ba af 57 96 46 d2 00 00 00 1c 00 00 40 05 | 3e ef c3 bb 3d a5 88 fb 9f 3c 53 fd 3b c9 ea 45 | 6f 53 bd 02 | state #20 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb360005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #20 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 | #20 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49602.532857 | resume sending helper answer for #20 suppresed complete_v2_state_transition() and stole MD | #20 spent 0.515 milliseconds in resume sending helper answer | stop processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb338009640 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a d8 6a 5c 08 dc 68 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #20 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #20 | rejected packet: | 2a d8 6a 5c 08 dc 68 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #20: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0454 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #11 | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #11 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #11 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49602.557082; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.016543 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #11 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-11" #11: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #11) | c8 da f8 5c 6a b5 39 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 9a 4c 70 8e 88 d1 64 8d ca 55 b5 43 ac 3e 50 | 7f 03 c2 7c 99 61 59 48 6a 23 b9 2d d3 3a 08 ba | 31 66 90 b0 52 32 93 73 23 bd 35 f2 7d dc a9 8f | 88 4e 43 5d 55 55 8f 7b a2 ea ce 35 e9 07 bb 71 | 1f 5d f0 9c c9 20 a4 7c c9 a5 33 c5 b0 c5 fd 99 | f9 36 f9 d6 da 33 fa e1 2d e1 b8 55 01 35 5b d0 | b9 e1 af af a6 38 ef b1 36 65 8c 44 00 8a 8f f0 | cb 31 ec d5 89 23 22 d8 6f 57 3d 9d af 74 08 ea | 86 b5 7c 8c 76 9b 8d 04 5b 27 f9 7a 8d ed d8 36 | 77 1c 37 9a 9e c6 40 9c bb 1e 24 77 dc 4c b2 dc | 76 0c 2f 2d 23 9c f1 63 a5 64 8f c0 7e 6e 08 97 | 35 1b 8e 35 d5 a9 e6 fc d1 af 35 f0 b0 21 d4 42 | 5d 1b 4e c6 75 04 f0 3a f4 cc 11 09 3f ff 2d c6 | bf fa 44 99 e7 46 de 13 f5 47 98 02 47 dd 33 15 | 52 36 1a 46 d4 d8 ce dd 1a ad eb 4f 6b 1d 9e 82 | 8f b0 52 7f b0 b6 aa 8b 85 c1 d8 ed 73 6b 09 85 | 29 00 00 24 71 b3 70 95 41 f1 8a 3d 3f e8 5d 7c | 6b 52 d9 59 47 90 bd 2c 17 95 9e 28 b0 5d 83 17 | df a2 84 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 c8 ac c9 12 67 90 a0 d8 a9 94 84 | cc d4 e1 68 d0 49 e5 0f 00 00 00 1c 00 00 40 05 | a0 0d 8b f9 78 72 8b b9 69 a6 ab 0f 8f 46 28 db | d3 de 3a b5 | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #11 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 da f8 5c 6a b5 39 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #11 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #11 | rejected packet: | c8 da f8 5c 6a b5 39 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #11: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #16 | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #16 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #16 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49602.606026; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.503592 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #16 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 "road-eastnet-nonat-16" #16: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #16) | 6b 57 6c f9 94 8d 37 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 79 95 56 0f 3a d5 d4 38 4f 8b a1 27 c3 02 1b | 5e 3a 85 e1 08 09 e6 fc a8 62 0f 43 42 55 29 b8 | e4 f9 04 77 e0 10 6e f0 87 0e 34 48 79 7d 7a e8 | ca f4 cc cc 99 09 3c b6 c2 35 0f bc 7b 2d 41 d5 | dd f7 e4 e1 a4 f1 02 00 be 44 4b 47 7e b4 a8 a2 | 62 b7 14 ca 2d 3c f6 2d ca f0 71 35 95 46 55 c7 | 1c ba 8e 83 ee 6a 95 4e 0b 06 27 00 95 fd 56 5f | a2 f2 d6 ed a0 30 96 bf 3e 03 94 41 ed 51 4c 15 | 54 db 62 3c 9c 56 76 98 56 78 f9 0d a3 f4 ac 74 | a4 8d 21 e9 c2 d6 c6 f2 bf cc ab 95 d5 b5 69 db | 99 07 4a 4f 0a fb b6 0d 07 d8 b8 7a ef c0 3c c0 | fa 7f 1c 08 05 55 7f 42 6a 4f 4e 4e 1f 35 3a 92 | 3a 9a 25 4f 7a 92 43 f1 5a 60 e4 7c d0 47 d1 12 | 01 ce a1 b9 b7 b6 c9 00 28 c2 19 89 84 44 e5 78 | 95 8c db 08 69 6a 49 44 32 07 7d 96 fb 06 00 43 | c3 4e a1 ee cd 85 94 29 a6 9f 2d d7 39 41 3b c9 | 29 00 00 24 85 0d a1 fb 37 74 4a 69 68 3b 97 74 | ca a6 8b 60 be e5 4d eb 21 82 d1 c7 17 0f 24 83 | fe 05 13 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 42 5d 5a fd 9e 39 f4 1d d5 d8 fc | 51 9a 83 f2 5f a0 b0 5a 00 00 00 1c 00 00 40 05 | 36 95 c1 ea ee d0 12 21 b4 68 71 46 60 49 f3 80 | 34 92 b4 f4 | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #16 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b 57 6c f9 94 8d 37 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #16 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #16 | rejected packet: | 6b 57 6c f9 94 8d 37 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #16: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-21" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-21' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #21 at 0x557d469f1540 | State DB: adding IKEv2 state #21 in UNDEFINED | pstats #21 ikev2.ike started | Message ID: init #21: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #21: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #21; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-21" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-21" IKE SA #21 "road-eastnet-nonat-21" "road-eastnet-nonat-21" #21: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-21 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-21": constructed local IKE proposals for road-eastnet-nonat-21 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 21 for state #21 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb370005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #21 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 | #21 spent 0.158 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-21" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.247 milliseconds in whack | crypto helper 1 resuming | crypto helper 1 starting work-order 21 for state #21 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 21 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 21 time elapsed 0.000982 seconds | (#21) spent 0.989 milliseconds in crypto helper computing work-order 21: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 21 for state #21 to event queue | scheduling resume sending helper answer for #21 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #21 | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 21 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #21 | **emit ISAKMP Message: | initiator cookie: | c1 e2 95 19 0d 6d aa c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-21 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e4 62 b7 cc 73 d3 9f c3 8b a1 e4 26 f8 ce 22 33 | ikev2 g^x 92 13 78 50 86 db 45 6a 88 c0 09 ba 4c 3a ed 8d | ikev2 g^x 07 a9 f3 c5 90 2e 12 14 58 94 56 71 46 c0 41 ae | ikev2 g^x 27 c0 08 e3 c4 02 5d ee 64 22 79 77 74 67 02 97 | ikev2 g^x 15 c4 99 75 53 da b8 d8 73 7b 03 dd 0e 63 e5 c8 | ikev2 g^x 2f a1 74 7d 1c 73 5d e6 89 77 c2 84 53 e8 81 35 | ikev2 g^x 14 8c 80 35 a3 ae 1e 09 89 8b c1 64 7d fd 4f 89 | ikev2 g^x 8f b7 6b da 51 0c c4 21 04 59 18 7c 8d 33 1a 85 | ikev2 g^x 98 29 76 e4 22 ac 91 00 31 d3 90 f1 d2 f4 f2 9a | ikev2 g^x 20 a3 6d 51 7b 67 e4 d8 4d 7c 9a fb 7c 63 7f d7 | ikev2 g^x c7 25 20 29 d5 e0 63 b5 f2 a7 5f d2 ec 98 84 3a | ikev2 g^x cb 95 85 f5 af 28 8d c4 5a 27 b6 9c 15 cc dd ed | ikev2 g^x f7 9f 6c d0 d0 af 5b 13 f0 d8 0f 7e 40 99 08 7d | ikev2 g^x 42 b3 e6 b5 93 1f 1e e1 85 38 e6 f0 e2 af 01 7d | ikev2 g^x 4f a1 b9 ef 5c 3f 42 c4 c2 ef e5 bc 70 ba 8e 68 | ikev2 g^x 71 82 c2 53 b9 56 35 3d c9 38 89 b6 a0 89 2b f3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b6 59 e5 4e ee 3f fd 49 7f 16 f6 82 11 23 a0 41 | IKEv2 nonce 4a 5a b9 59 7b 13 06 de 98 79 ac e0 67 18 f7 dc | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c1 e2 95 19 0d 6d aa c0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 15 | natd_hash: port= 01 f4 | natd_hash: hash= c3 70 4a 79 4b fb 19 31 c0 36 bc 71 8e f3 57 13 | natd_hash: hash= 5a bf 33 aa | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c3 70 4a 79 4b fb 19 31 c0 36 bc 71 8e f3 57 13 | Notify data 5a bf 33 aa | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c1 e2 95 19 0d 6d aa c0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 04 fc 29 44 06 78 d7 26 30 ef ba 81 66 98 ec 1d | natd_hash: hash= 35 84 86 e1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 04 fc 29 44 06 78 d7 26 30 ef ba 81 66 98 ec 1d | Notify data 35 84 86 e1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #21 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #21: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #21 to 4294967295 after switching state | Message ID: IKE #21 skipping update_recv as MD is fake | Message ID: sent #21 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-21" #21: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.21:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #21) | c1 e2 95 19 0d 6d aa c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 62 b7 cc 73 d3 9f c3 8b a1 e4 26 f8 ce 22 33 | 92 13 78 50 86 db 45 6a 88 c0 09 ba 4c 3a ed 8d | 07 a9 f3 c5 90 2e 12 14 58 94 56 71 46 c0 41 ae | 27 c0 08 e3 c4 02 5d ee 64 22 79 77 74 67 02 97 | 15 c4 99 75 53 da b8 d8 73 7b 03 dd 0e 63 e5 c8 | 2f a1 74 7d 1c 73 5d e6 89 77 c2 84 53 e8 81 35 | 14 8c 80 35 a3 ae 1e 09 89 8b c1 64 7d fd 4f 89 | 8f b7 6b da 51 0c c4 21 04 59 18 7c 8d 33 1a 85 | 98 29 76 e4 22 ac 91 00 31 d3 90 f1 d2 f4 f2 9a | 20 a3 6d 51 7b 67 e4 d8 4d 7c 9a fb 7c 63 7f d7 | c7 25 20 29 d5 e0 63 b5 f2 a7 5f d2 ec 98 84 3a | cb 95 85 f5 af 28 8d c4 5a 27 b6 9c 15 cc dd ed | f7 9f 6c d0 d0 af 5b 13 f0 d8 0f 7e 40 99 08 7d | 42 b3 e6 b5 93 1f 1e e1 85 38 e6 f0 e2 af 01 7d | 4f a1 b9 ef 5c 3f 42 c4 c2 ef e5 bc 70 ba 8e 68 | 71 82 c2 53 b9 56 35 3d c9 38 89 b6 a0 89 2b f3 | 29 00 00 24 b6 59 e5 4e ee 3f fd 49 7f 16 f6 82 | 11 23 a0 41 4a 5a b9 59 7b 13 06 de 98 79 ac e0 | 67 18 f7 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 70 4a 79 4b fb 19 31 c0 36 bc 71 | 8e f3 57 13 5a bf 33 aa 00 00 00 1c 00 00 40 05 | 04 fc 29 44 06 78 d7 26 30 ef ba 81 66 98 ec 1d | 35 84 86 e1 | state #21 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb370005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #21 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 | #21 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49602.644201 | resume sending helper answer for #21 suppresed complete_v2_state_transition() and stole MD | #21 spent 0.486 milliseconds in resume sending helper answer | stop processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38800a240 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c1 e2 95 19 0d 6d aa c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #21 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #21 | rejected packet: | c1 e2 95 19 0d 6d aa c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #21: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #12 | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #12 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #12 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49602.660406; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.007203 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #12 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 "road-eastnet-nonat-12" #12: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #12) | e6 90 0f 5b 12 9e fb 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 8d ca d0 bf fc d0 53 2f c8 94 c7 75 f0 b7 3b | 06 8d af 15 08 3d 4d 43 8a f2 0e 43 03 74 47 ab | c5 f6 5e c6 9d af 64 6c 5f 50 aa bb 63 91 17 7c | de 19 d6 a8 3d b9 0e 6f 98 77 91 78 cd c6 0f f1 | 83 bd 49 b7 4d 19 90 e6 2f f7 8d c2 99 5e 0c 41 | a4 92 59 8c f3 bc 56 51 55 c4 fc 8d 06 b4 b2 46 | fe 62 b5 0f 4e f1 c7 d9 31 4c e1 f7 06 2d 45 f5 | a0 d5 f5 94 55 0e 2f 00 35 d8 fb d6 3c 6a b6 b5 | 4d 93 6e 6b 9b 52 5b 1c 59 3e d0 a9 2b 70 a2 ec | b5 2f 18 f2 51 cd 4a e5 eb b3 21 70 eb 17 7e fb | 54 5e a1 de 02 46 1e 7f ed c7 44 7e dc 6d 9e 84 | 08 46 48 8f 2c 45 f3 c2 00 ca b5 46 fd 56 d4 bf | b0 41 68 33 e0 2a 67 86 f6 4d 18 8b 90 8d 3e 6b | c2 91 48 4f de cb 41 cd 2e 17 3b f1 b9 af ca 73 | 4b 2f d1 11 2b 7a 96 60 de b9 66 93 28 70 95 94 | 75 11 24 ea 0b a4 9a 4f 1b d9 88 31 b6 8a fe 22 | 29 00 00 24 52 e1 94 79 21 2a ea cc 69 4a af 5a | 5d ef 62 83 14 35 3b dc 33 a8 4c d8 5d ab 20 41 | 8b a5 be 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 aa 63 73 f1 76 ab f8 1b 79 46 f7 | 09 75 6d 3c 97 fc 7d df 00 00 00 1c 00 00 40 05 | db 6d 58 42 c9 d1 b0 49 17 a0 1e 30 4f f9 7e 58 | 72 29 56 37 | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #12 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 90 0f 5b 12 9e fb 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #12 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #12 | rejected packet: | e6 90 0f 5b 12 9e fb 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #12: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0692 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #3 | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #3 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #3 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49602.676756; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.007813 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #3 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 "road-eastnet-nonat-3" #3: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #3) | 81 44 b6 c8 2a 40 ce 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 54 15 6a 8c 9d d0 48 d6 59 e5 e2 2e a9 83 c3 | a8 ba 16 88 07 d6 11 91 3a 48 ca 9a fe dc 40 cc | 29 63 c0 dc 38 80 92 c8 fd f6 81 d3 d8 66 94 3d | c5 2d e7 b1 2b da e7 bc 78 d1 e4 dc 9a 41 8c 14 | c6 fb cd 2a 97 af ef ad 23 32 6d 6d f8 fa b5 27 | 9e 41 35 14 10 3b f6 98 c8 8f d3 aa de fa 55 91 | cb c5 c0 43 8b 3e 66 29 8a ce 63 ed 04 d9 5e 36 | d1 ee b2 55 32 92 26 8a 60 a1 e6 8a c1 81 34 3b | fe bb 92 45 5e 07 2a fa 53 4e 52 04 9a fe 49 14 | 7b 7a a1 34 68 ab 79 c6 b1 5b 9e 7d ee f2 e3 2b | b4 f7 cd 72 14 0a 7e 40 88 1b b7 27 4f cc 0e 08 | a7 a7 14 77 d4 62 20 1a 96 bd a4 9c 9c c7 ed e3 | be 59 87 38 e7 1a a8 83 a8 52 47 62 89 d6 f0 d1 | ce 49 83 2a 83 87 c7 c7 2e 90 40 05 a6 4e c5 26 | bd c4 1e e7 34 ac 09 b9 70 d9 7f 32 91 1c d9 7b | 01 ed eb 14 c7 ff 07 8b 68 87 79 fe ab f8 54 a7 | 29 00 00 24 af 67 2a 08 9a 9a ad ff 86 6c 03 06 | 6f 2f 6b af d5 26 d4 77 40 17 03 25 58 a0 84 c4 | 14 b9 e1 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 4b 9f 22 64 ba ce 64 1d b6 f5 ba | 24 33 ca 6e b0 87 4a 02 00 00 00 1c 00 00 40 05 | 8e b1 42 d9 c7 63 9c 7b 3d 57 a7 c1 0c 5d 8c 4c | 33 59 3d db | libevent_free: release ptr-libevent@0x7fb358009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | #3 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 44 b6 c8 2a 40 ce 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #3 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #3 | rejected packet: | 81 44 b6 c8 2a 40 ce 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #3: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0735 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-22" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-22' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #22 at 0x557d469f2b00 | State DB: adding IKEv2 state #22 in UNDEFINED | pstats #22 ikev2.ike started | Message ID: init #22: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #22: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #22; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-22" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-22" IKE SA #22 "road-eastnet-nonat-22" "road-eastnet-nonat-22" #22: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-22 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-22": constructed local IKE proposals for road-eastnet-nonat-22 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 22 for state #22 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb358005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #22 | libevent_malloc: new ptr-libevent@0x7fb358009640 size 128 | #22 spent 0.144 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-22" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.226 milliseconds in whack | crypto helper 2 resuming | crypto helper 2 starting work-order 22 for state #22 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 22 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 22 time elapsed 0.000894 seconds | (#22) spent 0.901 milliseconds in crypto helper computing work-order 22: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 22 for state #22 to event queue | scheduling resume sending helper answer for #22 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #22 | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 22 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #22 | **emit ISAKMP Message: | initiator cookie: | fb 94 21 58 38 c3 f9 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-22 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 30 fa b9 d7 68 fd 72 8f 42 0c d5 a2 f7 f4 9b 8a | ikev2 g^x d7 23 52 ca 6c 52 76 c9 13 29 10 22 e6 ec 59 2c | ikev2 g^x a8 f2 aa 73 f8 3e 6b 2a a1 80 14 ff a7 56 48 4f | ikev2 g^x 3e 9b c4 33 e8 9f 3f e1 00 d1 2f db 56 9e da 18 | ikev2 g^x 67 a2 e0 d7 98 13 63 9f 28 d8 20 03 fc d6 f3 6a | ikev2 g^x 0b 8c 23 20 ba 26 3e 63 f5 df a1 d6 76 bf 7c f8 | ikev2 g^x 52 9b 7b e3 ba 8b f9 13 50 1b 61 13 1c 98 cb 7a | ikev2 g^x 18 f4 0d 9c 45 e0 10 ca 68 77 fa c0 54 76 19 a8 | ikev2 g^x f4 83 b0 e9 4d 71 3e a8 7b e6 82 90 01 66 8f f4 | ikev2 g^x 47 f6 ec 2f 3d 48 64 9c f2 b5 21 50 b5 a6 c1 a0 | ikev2 g^x 91 f5 21 c6 ec 6a bd 95 39 08 03 b0 29 f0 d4 a1 | ikev2 g^x f0 7d 39 2b f5 47 de 25 f6 c5 56 6c a0 9c af 3d | ikev2 g^x e0 4f 7d d8 1e 86 d7 ac 96 7e 36 e6 1e 20 3d 6a | ikev2 g^x 91 0f b8 c5 68 62 9b 7a 5c 1e b4 57 88 ac 53 77 | ikev2 g^x e1 de dd ef 41 8c d3 d4 57 c9 16 9b e4 e9 05 4c | ikev2 g^x 74 12 06 2b a5 93 e5 02 33 46 72 d8 88 42 05 bd | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 90 c9 d4 3c 5f 0b 25 0f f1 bc 52 9a c3 5c 4d d3 | IKEv2 nonce 31 89 58 99 a1 8a 08 b0 ed 9a e3 4f 90 7f 17 22 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fb 94 21 58 38 c3 f9 d4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 16 | natd_hash: port= 01 f4 | natd_hash: hash= d9 cd b6 d8 9c a0 ac 4f 4b ba 38 63 e9 a9 a0 ba | natd_hash: hash= 13 a5 50 1a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d9 cd b6 d8 9c a0 ac 4f 4b ba 38 63 e9 a9 a0 ba | Notify data 13 a5 50 1a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fb 94 21 58 38 c3 f9 d4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2f e0 72 4a 02 ff fa 8e 97 a9 39 d6 93 d4 2c 35 | natd_hash: hash= dd 9e 83 2a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2f e0 72 4a 02 ff fa 8e 97 a9 39 d6 93 d4 2c 35 | Notify data dd 9e 83 2a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #22 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #22: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #22 to 4294967295 after switching state | Message ID: IKE #22 skipping update_recv as MD is fake | Message ID: sent #22 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-22" #22: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.22:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #22) | fb 94 21 58 38 c3 f9 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 fa b9 d7 68 fd 72 8f 42 0c d5 a2 f7 f4 9b 8a | d7 23 52 ca 6c 52 76 c9 13 29 10 22 e6 ec 59 2c | a8 f2 aa 73 f8 3e 6b 2a a1 80 14 ff a7 56 48 4f | 3e 9b c4 33 e8 9f 3f e1 00 d1 2f db 56 9e da 18 | 67 a2 e0 d7 98 13 63 9f 28 d8 20 03 fc d6 f3 6a | 0b 8c 23 20 ba 26 3e 63 f5 df a1 d6 76 bf 7c f8 | 52 9b 7b e3 ba 8b f9 13 50 1b 61 13 1c 98 cb 7a | 18 f4 0d 9c 45 e0 10 ca 68 77 fa c0 54 76 19 a8 | f4 83 b0 e9 4d 71 3e a8 7b e6 82 90 01 66 8f f4 | 47 f6 ec 2f 3d 48 64 9c f2 b5 21 50 b5 a6 c1 a0 | 91 f5 21 c6 ec 6a bd 95 39 08 03 b0 29 f0 d4 a1 | f0 7d 39 2b f5 47 de 25 f6 c5 56 6c a0 9c af 3d | e0 4f 7d d8 1e 86 d7 ac 96 7e 36 e6 1e 20 3d 6a | 91 0f b8 c5 68 62 9b 7a 5c 1e b4 57 88 ac 53 77 | e1 de dd ef 41 8c d3 d4 57 c9 16 9b e4 e9 05 4c | 74 12 06 2b a5 93 e5 02 33 46 72 d8 88 42 05 bd | 29 00 00 24 90 c9 d4 3c 5f 0b 25 0f f1 bc 52 9a | c3 5c 4d d3 31 89 58 99 a1 8a 08 b0 ed 9a e3 4f | 90 7f 17 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 cd b6 d8 9c a0 ac 4f 4b ba 38 63 | e9 a9 a0 ba 13 a5 50 1a 00 00 00 1c 00 00 40 05 | 2f e0 72 4a 02 ff fa 8e 97 a9 39 d6 93 d4 2c 35 | dd 9e 83 2a | state #22 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb358009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb358005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #22 | libevent_malloc: new ptr-libevent@0x7fb358009640 size 128 | #22 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49602.727952 | resume sending helper answer for #22 suppresed complete_v2_state_transition() and stole MD | #22 spent 0.49 milliseconds in resume sending helper answer | stop processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38000a240 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 94 21 58 38 c3 f9 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #22 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #22 | rejected packet: | fb 94 21 58 38 c3 f9 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #22: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #17 | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #17 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #17 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49602.740167; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500523 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469defe0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #17 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 "road-eastnet-nonat-17" #17: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #17) | 95 d9 df c6 2f 4d 0c 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 5e 55 de a7 df 8c 8d ec f1 a6 b3 e1 a3 c9 2d | 5c 34 98 9a bf 18 3c 5f 5f 84 6f cc 00 89 2f b6 | 2e 0d 8a f0 e8 8a 33 b9 9f e3 4d bb 6f 5d 7f 7f | 55 e8 00 b1 58 6d 0f 17 37 b6 dc aa e5 63 e1 98 | c3 81 a6 04 b7 5c e1 a6 b2 29 9c 5a 0a 92 22 a4 | dd 4c 33 c2 4e 6f 90 29 c5 be 39 30 e7 2e 62 6c | 05 d7 89 8e 0f da b5 53 da 3f 31 31 12 b0 4c a7 | e6 a2 e9 57 ae d6 ea 04 d8 8b 73 ef 0e 9c 95 4e | 4b da 65 9c ef 6c 55 46 7d 0a 54 0c 93 37 db 94 | 63 8b a7 e9 ec 58 ed b4 f2 15 0c b0 9d 7b 2c 0d | 1e e8 20 04 e7 f0 90 d5 81 ce 8a 1d d9 30 60 b1 | c6 44 b1 01 fa 02 ef 06 8d 26 a1 09 a3 ce f8 2b | cd fc 0a 07 b0 8e b6 9d e8 6f 0c f0 b6 d6 40 9f | 58 4b a3 1f 87 35 a9 b2 45 93 43 35 38 68 86 6f | ea 62 4d 90 7e b9 e7 0c 07 f5 2a d5 71 68 12 96 | 09 17 2e 55 3e a1 6c 35 b5 20 1e 2a bf 27 6e 02 | 29 00 00 24 bf 2e 79 82 7e c6 1a 66 e2 b9 4b 2e | f8 c7 dc 78 b4 81 b9 5d 2e e5 4c 2c 27 2c b6 31 | c3 63 bf d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 f5 2d 98 10 e8 c0 4d c4 df 42 b6 | b0 c6 0b 95 91 b6 b4 67 00 00 00 1c 00 00 40 05 | 6f dc f7 24 ac 26 1a a6 48 cc ee 5d 39 06 66 40 | 4c d6 6b fc | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #17 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 d9 df c6 2f 4d 0c 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #17 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #17 | rejected packet: | 95 d9 df c6 2f 4d 0c 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #17: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.066 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #13 | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #13 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #13 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49602.774535; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.011857 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #13 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 "road-eastnet-nonat-13" #13: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #13) | 49 f7 1e 6a 42 26 33 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 71 af 86 f4 71 f9 bb e4 0d 2b 45 d7 29 39 05 | b7 87 ba 66 cb fb 2a f9 a1 bd 3d 61 b3 93 ac e4 | c3 99 b0 f5 02 62 ee dd 97 cd f6 04 fc 6c e4 91 | fc 5c 11 ba 5a 79 b1 78 a2 d0 e7 22 4a 47 b5 e0 | 1b 08 7f a6 c3 8e ce 71 40 0d 06 f3 62 f6 df f1 | 5d 7c 5b e2 d5 cd 0f 4d e6 c6 f8 d8 22 4f 95 11 | 69 b0 4c 7b c2 82 8e f9 ea f5 33 82 00 b3 c7 cc | c1 9e 50 02 8e 45 ef af 1a f9 8b 37 72 41 32 b8 | 47 f2 be df 3f 94 e4 a3 17 d5 55 32 fb 1f 2d d2 | 75 88 9c 98 42 60 51 41 31 79 19 3b ff ef b8 2a | 8e 39 2b ea 32 11 93 14 1c d3 9c 70 36 49 9b d1 | ea 38 9f 9a 6a 33 49 23 7d e2 c2 d5 b0 8d 83 b6 | ef a7 10 c8 a2 18 a7 4e 8b 07 bd 67 b5 96 c1 6a | d6 9d 73 c7 60 9d 60 25 5d 63 21 25 68 0e 24 b3 | 8f 19 40 42 2e 27 e9 30 d9 f9 1b 80 8f 2d ab dd | 1e f0 98 f5 b2 55 9b 6b 06 84 0f fe 26 32 f1 f7 | 29 00 00 24 dd b6 a9 bb fd 56 26 b2 23 d7 97 2f | 99 f7 92 2e ca d6 19 06 93 b1 8e 77 8d b7 a4 a3 | 73 9b 88 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 83 1c 22 e0 45 23 6f 5f d0 4f 89 | cf 59 8e 77 1e 0a 0b d7 00 00 00 1c 00 00 40 05 | e8 12 13 20 8d f1 d3 89 00 ae 66 0d fd eb 92 63 | f1 cf 85 56 | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #13 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 f7 1e 6a 42 26 33 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #13 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #13 | rejected packet: | 49 f7 1e 6a 42 26 33 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #13: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.09 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #4 | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #4 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #4 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49602.815999; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002491 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #4 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 "road-eastnet-nonat-4" #4: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #4) | 9f e3 9d 02 77 44 b7 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 12 be 82 37 05 d2 52 25 54 17 1c 7e a4 e7 a1 | 7e a3 9e 01 f0 c9 5e f6 79 14 37 d9 ec ef 3e 7b | d6 12 38 d8 73 16 9f 73 2c 17 04 25 c3 08 1e 06 | d4 99 19 15 32 45 9a a7 b4 d5 ad 96 4d 41 dc 91 | 4d c8 05 99 28 4b a0 e8 08 9f f7 76 6e 87 6e f0 | e8 58 e3 c1 70 13 6f 8d cd 7f 4b 91 ab b0 98 2b | 80 11 c8 ef d5 8f f3 5b b1 1f e0 43 de 0c 0e b1 | 13 32 29 e5 dd ca fb b5 e8 02 d1 3b 1d 9e 4d 95 | 8d f8 b1 fd 7f db 1b 37 33 cf 99 72 de f0 e3 79 | 73 e7 61 a0 9f 73 96 2a c8 d9 3f f2 5e 93 fa f5 | 10 3a 62 6a 38 cd 93 3a 9f a8 56 7d f2 c3 ee 21 | b5 e7 1b 68 51 3a 6c 80 5b ad 50 8d 16 63 1e 8c | 65 d8 ef 12 42 db b7 45 7e c0 09 e7 f6 56 5d da | d8 52 c7 89 46 5c ed c7 24 ca 60 5c ff 30 28 b2 | a1 94 8c ec d2 08 2c a4 8a 1d a2 db fd 97 89 ac | cf d6 3b e3 0f 35 26 7e 4f b9 c8 b0 82 f2 80 6e | 29 00 00 24 ff 8a 31 04 ed 0e 73 16 f9 33 92 87 | 63 96 e9 90 5e 3a 90 66 d0 c2 86 27 40 23 58 23 | 51 d5 8c f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 57 40 bb 9d 01 b2 e8 79 26 d3 b2 | 9e 9a c3 98 03 95 6b f7 00 00 00 1c 00 00 40 05 | 19 68 23 54 27 85 e7 5a 70 ec 13 67 75 7a 20 68 | 80 f1 f5 99 | libevent_free: release ptr-libevent@0x7fb35c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #4 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f e3 9d 02 77 44 b7 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #4 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #4 | rejected packet: | 9f e3 9d 02 77 44 b7 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #4: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-23" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-23' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #23 at 0x557d469f40c0 | State DB: adding IKEv2 state #23 in UNDEFINED | pstats #23 ikev2.ike started | Message ID: init #23: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #23: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #23; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-23" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-23" IKE SA #23 "road-eastnet-nonat-23" "road-eastnet-nonat-23" #23: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-23 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-23": constructed local IKE proposals for road-eastnet-nonat-23 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 23 for state #23 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #23 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 | #23 spent 0.146 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-23" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.222 milliseconds in whack | crypto helper 0 resuming | crypto helper 0 starting work-order 23 for state #23 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 23 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 23 time elapsed 0.000799 seconds | (#23) spent 0.807 milliseconds in crypto helper computing work-order 23: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 23 for state #23 to event queue | scheduling resume sending helper answer for #23 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #23 | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 23 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #23 | **emit ISAKMP Message: | initiator cookie: | 11 64 2b cc 79 62 5e 8e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-23 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 82 73 2b eb f6 ef a5 89 1a 84 5f 77 86 97 95 f5 | ikev2 g^x 41 68 46 e7 c2 3a 4b 96 08 d9 dc ac 0c dd 5f 9b | ikev2 g^x 9c 2f fb 55 35 f0 7e cd 72 e1 cc 2d 6a fa 78 20 | ikev2 g^x 87 1a 7a 27 9f 9e c1 5d d5 9e 2c a0 07 0d 68 be | ikev2 g^x 9e e9 e9 2b 00 f9 05 41 09 d8 c4 31 fa 61 72 87 | ikev2 g^x 90 51 a0 68 b9 49 7c 1e 75 38 ea 5f 98 5e c2 d2 | ikev2 g^x 66 ca 13 be 66 2b cf da 9f 87 38 b0 7e a9 5b 2c | ikev2 g^x b6 4d 89 7d 77 c1 b9 97 25 e9 f9 03 6e 50 c9 f0 | ikev2 g^x 4a 7a ea 26 c5 82 77 fd 51 df 29 99 2b 7c 16 40 | ikev2 g^x 15 23 9e b1 86 5f 7e 14 de 76 c4 15 a3 9d c9 b4 | ikev2 g^x 9c 1b 90 c7 1e 57 7f 74 e2 ad 9a 3c 48 8f 70 44 | ikev2 g^x 85 18 d4 03 39 40 d0 15 5b 33 89 0a c2 cc bd 37 | ikev2 g^x e0 4e e5 f2 46 4f 47 44 cf d8 ce b3 b6 34 38 c5 | ikev2 g^x 35 57 26 ef 2d db be d0 db df 2a 42 e2 e1 8f 1d | ikev2 g^x 48 dc 28 b8 9a 19 2e b1 d2 17 f5 9d a6 50 4d 1a | ikev2 g^x 18 88 cf 51 7a 98 9f 7a 85 1b 6d 6e b4 28 52 31 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7b 3d c1 32 8e 45 e7 94 6a 53 a8 c9 d4 42 3b 62 | IKEv2 nonce 4a d5 d1 ca c0 9b 8b 0f 34 82 fe 78 98 28 d2 99 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 11 64 2b cc 79 62 5e 8e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 17 | natd_hash: port= 01 f4 | natd_hash: hash= 90 87 c3 2a f9 31 e3 ce f5 bd a0 4a 02 f7 6c fe | natd_hash: hash= 1a b5 f1 41 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 90 87 c3 2a f9 31 e3 ce f5 bd a0 4a 02 f7 6c fe | Notify data 1a b5 f1 41 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 11 64 2b cc 79 62 5e 8e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a7 5c 60 43 7b 55 16 31 7f 2f 25 27 9c df 44 42 | natd_hash: hash= dd 9f 1f 73 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a7 5c 60 43 7b 55 16 31 7f 2f 25 27 9c df 44 42 | Notify data dd 9f 1f 73 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #23 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #23: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #23 to 4294967295 after switching state | Message ID: IKE #23 skipping update_recv as MD is fake | Message ID: sent #23 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-23" #23: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.23:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #23) | 11 64 2b cc 79 62 5e 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 73 2b eb f6 ef a5 89 1a 84 5f 77 86 97 95 f5 | 41 68 46 e7 c2 3a 4b 96 08 d9 dc ac 0c dd 5f 9b | 9c 2f fb 55 35 f0 7e cd 72 e1 cc 2d 6a fa 78 20 | 87 1a 7a 27 9f 9e c1 5d d5 9e 2c a0 07 0d 68 be | 9e e9 e9 2b 00 f9 05 41 09 d8 c4 31 fa 61 72 87 | 90 51 a0 68 b9 49 7c 1e 75 38 ea 5f 98 5e c2 d2 | 66 ca 13 be 66 2b cf da 9f 87 38 b0 7e a9 5b 2c | b6 4d 89 7d 77 c1 b9 97 25 e9 f9 03 6e 50 c9 f0 | 4a 7a ea 26 c5 82 77 fd 51 df 29 99 2b 7c 16 40 | 15 23 9e b1 86 5f 7e 14 de 76 c4 15 a3 9d c9 b4 | 9c 1b 90 c7 1e 57 7f 74 e2 ad 9a 3c 48 8f 70 44 | 85 18 d4 03 39 40 d0 15 5b 33 89 0a c2 cc bd 37 | e0 4e e5 f2 46 4f 47 44 cf d8 ce b3 b6 34 38 c5 | 35 57 26 ef 2d db be d0 db df 2a 42 e2 e1 8f 1d | 48 dc 28 b8 9a 19 2e b1 d2 17 f5 9d a6 50 4d 1a | 18 88 cf 51 7a 98 9f 7a 85 1b 6d 6e b4 28 52 31 | 29 00 00 24 7b 3d c1 32 8e 45 e7 94 6a 53 a8 c9 | d4 42 3b 62 4a d5 d1 ca c0 9b 8b 0f 34 82 fe 78 | 98 28 d2 99 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 90 87 c3 2a f9 31 e3 ce f5 bd a0 4a | 02 f7 6c fe 1a b5 f1 41 00 00 00 1c 00 00 40 05 | a7 5c 60 43 7b 55 16 31 7f 2f 25 27 9c df 44 42 | dd 9f 1f 73 | state #23 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #23 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 | #23 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49602.818204 | resume sending helper answer for #23 suppresed complete_v2_state_transition() and stole MD | #23 spent 0.455 milliseconds in resume sending helper answer | stop processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38400a240 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 64 2b cc 79 62 5e 8e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #23 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #23 | rejected packet: | 11 64 2b cc 79 62 5e 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #23: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #18 | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #18 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #18 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49602.829407; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50024 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e05a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #18 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 "road-eastnet-nonat-18" #18: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #18) | fb 32 f3 fa 98 61 11 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 1b 0e e3 36 19 71 f2 00 c4 a6 18 1e bb 4a b9 | 3f d0 79 e4 4c 35 e5 1e 56 1e d1 56 df b2 32 fa | cb c3 c2 d3 4a 94 0b 28 4c 8e ed f1 14 00 ce ed | b6 d4 73 ac db 94 04 97 4d da 90 7f 61 f0 d2 4f | 60 04 42 6d 98 5c e4 05 d2 7d 05 4f 2d 99 94 a5 | 24 07 67 86 b6 21 b9 09 3a ea 16 cd cc b4 37 10 | 72 43 f6 be 6d 76 63 9b 24 f5 23 e6 b1 48 bc f9 | f2 cf d4 72 32 75 ee 93 a2 3d a2 fc 4d 35 5b 06 | 2a 31 6e 66 38 b7 b9 5b ce 6b 7a 5c 24 6c c6 91 | 21 f8 32 cc e1 e9 56 aa 56 2c 50 74 9d 0e c3 9c | b6 78 ee 5d a7 11 af c5 d5 50 6d b5 f0 a5 9d 4e | 3f d5 dc b9 6a 00 2b e1 dd 5f 8a e9 31 c5 30 8b | ee 43 f2 79 32 71 d6 e9 6e 27 23 22 2e 49 e0 0f | a1 32 43 40 65 d3 35 9f 97 aa f2 5c 61 69 29 93 | 3e f9 84 1e 9a f8 ea a4 2a 81 be 45 2f 6a 95 39 | a8 bb 2b 71 c2 45 83 fa e9 8d 63 1f 25 98 d1 4c | 29 00 00 24 64 09 7d 4a c3 95 64 a7 f6 f8 ca 35 | d6 3a 22 ea 52 84 43 22 db d2 95 2f 1d 96 44 f9 | 61 f7 89 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 f9 c7 a2 f7 e0 10 e9 b6 c5 14 f2 | 0e d4 f3 ff 41 9a 2e 34 00 00 00 1c 00 00 40 05 | be 8c d9 50 c4 e0 70 2a 58 15 0e 32 3f df db 0d | 01 81 6c d8 | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #18 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 32 f3 fa 98 61 11 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #18 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #18 | rejected packet: | fb 32 f3 fa 98 61 11 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #18: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0682 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #14 | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #14 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #14 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49602.857757; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.004869 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #14 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-14" #14: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #14) | c3 13 eb 28 05 44 3c c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 9d 4b 57 65 9b 44 ef 02 5a 55 12 34 bd 3e fa | 1d 1d 02 b8 47 b4 07 d2 1c 40 a7 d2 b5 27 54 0d | 81 c5 8d d2 b0 f1 46 e6 2b f6 3a de 28 5d 98 ae | 72 2f 81 53 d7 e7 b2 d9 8d 92 9d 09 f6 b7 ce cc | 3e 71 cd 6b bc 9b 98 ad b9 25 11 78 67 a8 99 c6 | d0 09 70 45 b3 4c 5d bb c4 08 3e 65 01 7c 91 1b | 71 62 4d 8f 21 92 6e 0d cc 31 2a e5 1d 4d 2c 13 | a8 c8 3c 02 8d 36 79 d7 6c 16 bc 07 ba a2 3a 87 | 13 5a 36 f7 58 04 34 60 a3 2f 3a 9f 7c 23 64 3e | 35 e2 e2 a2 79 4c 9f fc 94 b5 56 35 03 c7 fc 3a | cf 61 0a a2 ca 12 f9 93 6a 8b f6 7c 71 75 e0 48 | 38 16 70 bd 8e 4a bd d6 cf f6 8e 6b de fc 4a f7 | 37 83 73 dd be 05 96 b0 07 8a ee 94 33 ed 86 17 | 8e 84 02 b1 3c 02 91 6e df 44 9a 23 83 12 9c 66 | e4 27 4d ff 2c b0 4c 89 bc bc 90 88 ea ad 2f 69 | 0e ca 37 3b 42 e0 ad 13 24 ad bb e5 a5 03 12 10 | 29 00 00 24 cb 20 8c 9f 6a 8c dd ed 7f 5a c1 49 | 4c ab 23 eb 51 b5 51 02 d0 17 95 d7 22 4b 61 df | 15 62 c3 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e 81 d0 17 a6 30 05 4d 92 15 c2 f3 | f4 8b 67 24 b4 9e ba 2d 00 00 00 1c 00 00 40 05 | 8a 85 97 fb 20 dc 58 d7 a0 fe fa ad 9b 31 ea 8a | c5 2b 9c 59 | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #14 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c3 13 eb 28 05 44 3c c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #14 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #14 | rejected packet: | c3 13 eb 28 05 44 3c c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #14: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-24" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-24' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #24 at 0x557d469f5680 | State DB: adding IKEv2 state #24 in UNDEFINED | pstats #24 ikev2.ike started | Message ID: init #24: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #24: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #24; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-24" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-24" IKE SA #24 "road-eastnet-nonat-24" "road-eastnet-nonat-24" #24: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-24 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-24": constructed local IKE proposals for road-eastnet-nonat-24 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 24 for state #24 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb340005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #24 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 | #24 spent 0.134 milliseconds in ikev2_parent_outI1() | crypto helper 9 resuming | crypto helper 9 starting work-order 24 for state #24 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 24 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-24" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.22 milliseconds in whack | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 24 time elapsed 0.000984 seconds | (#24) spent 0.99 milliseconds in crypto helper computing work-order 24: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 24 for state #24 to event queue | scheduling resume sending helper answer for #24 | libevent_malloc: new ptr-libevent@0x7fb37800cf80 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #24 | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 24 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #24 | **emit ISAKMP Message: | initiator cookie: | a6 6a cf 12 4f 5d 80 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-24 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fe 64 6b 6f 54 02 19 88 ba 7c 08 ae f0 e8 ac 9d | ikev2 g^x c2 ca d4 17 41 fd 62 15 e6 80 a2 22 8c 15 09 a2 | ikev2 g^x e7 a1 72 ea 0a df 45 b3 25 d6 2f ad 4b 53 6c aa | ikev2 g^x 40 78 bc 47 40 56 b3 31 58 04 4d 38 c6 d0 b5 d8 | ikev2 g^x 7f 6f a2 f1 93 94 05 6c d0 31 6f f5 91 da 3d ba | ikev2 g^x e0 df 58 d8 a7 5c 43 d6 dc 3f 84 1b 95 82 7b 74 | ikev2 g^x 0c 41 0a 55 c5 c4 26 cf be bc a7 fe 25 56 32 c1 | ikev2 g^x 74 4d 01 af d9 1d ba 5f df c3 24 6e 66 7d 9c 22 | ikev2 g^x 84 1a 96 19 75 ab 7b e5 8d 21 ff f9 0c c5 57 de | ikev2 g^x 08 b9 a5 25 49 54 61 98 e2 43 6f b1 cb e2 3e 2a | ikev2 g^x f8 2c b2 cc ec bc 5e 41 c3 a9 95 de 3e ae 27 18 | ikev2 g^x 0c 51 55 28 d4 52 b5 1c e5 35 a1 75 a4 31 5a 74 | ikev2 g^x 09 2d 83 0a f9 22 55 04 79 c9 7a 03 c4 3f b9 27 | ikev2 g^x 7d 94 7e 25 32 de fa 8a ba c3 f8 47 1a 89 e0 04 | ikev2 g^x 1c 2a 74 59 3a 33 c6 78 c9 39 62 b5 5b 83 e0 ec | ikev2 g^x 74 d5 64 ba c0 ee 33 ea 4f ca fc f0 da aa dc 97 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 86 65 98 51 47 8e f6 4b 35 71 6a af 55 7d 2d 69 | IKEv2 nonce 5a 9e 6d 36 94 f6 45 50 b1 44 a3 6d d2 78 d3 6c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a6 6a cf 12 4f 5d 80 07 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 18 | natd_hash: port= 01 f4 | natd_hash: hash= 69 db bf 4d aa d7 35 0a 3b ec 97 e0 4c d5 57 e3 | natd_hash: hash= dd 13 4a e5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 69 db bf 4d aa d7 35 0a 3b ec 97 e0 4c d5 57 e3 | Notify data dd 13 4a e5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a6 6a cf 12 4f 5d 80 07 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c7 67 96 20 f6 5f 6f 16 76 12 96 1c 43 e0 40 0f | natd_hash: hash= 0e 23 33 02 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c7 67 96 20 f6 5f 6f 16 76 12 96 1c 43 e0 40 0f | Notify data 0e 23 33 02 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #24 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #24: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #24 to 4294967295 after switching state | Message ID: IKE #24 skipping update_recv as MD is fake | Message ID: sent #24 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-24" #24: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.24:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #24) | a6 6a cf 12 4f 5d 80 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 64 6b 6f 54 02 19 88 ba 7c 08 ae f0 e8 ac 9d | c2 ca d4 17 41 fd 62 15 e6 80 a2 22 8c 15 09 a2 | e7 a1 72 ea 0a df 45 b3 25 d6 2f ad 4b 53 6c aa | 40 78 bc 47 40 56 b3 31 58 04 4d 38 c6 d0 b5 d8 | 7f 6f a2 f1 93 94 05 6c d0 31 6f f5 91 da 3d ba | e0 df 58 d8 a7 5c 43 d6 dc 3f 84 1b 95 82 7b 74 | 0c 41 0a 55 c5 c4 26 cf be bc a7 fe 25 56 32 c1 | 74 4d 01 af d9 1d ba 5f df c3 24 6e 66 7d 9c 22 | 84 1a 96 19 75 ab 7b e5 8d 21 ff f9 0c c5 57 de | 08 b9 a5 25 49 54 61 98 e2 43 6f b1 cb e2 3e 2a | f8 2c b2 cc ec bc 5e 41 c3 a9 95 de 3e ae 27 18 | 0c 51 55 28 d4 52 b5 1c e5 35 a1 75 a4 31 5a 74 | 09 2d 83 0a f9 22 55 04 79 c9 7a 03 c4 3f b9 27 | 7d 94 7e 25 32 de fa 8a ba c3 f8 47 1a 89 e0 04 | 1c 2a 74 59 3a 33 c6 78 c9 39 62 b5 5b 83 e0 ec | 74 d5 64 ba c0 ee 33 ea 4f ca fc f0 da aa dc 97 | 29 00 00 24 86 65 98 51 47 8e f6 4b 35 71 6a af | 55 7d 2d 69 5a 9e 6d 36 94 f6 45 50 b1 44 a3 6d | d2 78 d3 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 db bf 4d aa d7 35 0a 3b ec 97 e0 | 4c d5 57 e3 dd 13 4a e5 00 00 00 1c 00 00 40 05 | c7 67 96 20 f6 5f 6f 16 76 12 96 1c 43 e0 40 0f | 0e 23 33 02 | state #24 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb340005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #24 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 | #24 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49602.924659 | resume sending helper answer for #24 suppresed complete_v2_state_transition() and stole MD | #24 spent 0.473 milliseconds in resume sending helper answer | stop processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37800cf80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 6a cf 12 4f 5d 80 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #24 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #24 | rejected packet: | a6 6a cf 12 4f 5d 80 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #24: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #5 | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #5 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #5 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49602.942854; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.012483 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e5ca0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #5 | libevent_malloc: new ptr-libevent@0x7fb37800cf80 size 128 "road-eastnet-nonat-5" #5: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #5) | 83 a8 82 4c 6a b9 9b 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 f2 6a ba 4d 4c f4 ca d6 76 c6 37 a4 fc c6 08 | 03 3e 5e e8 b3 56 67 2c ed e0 33 33 68 d8 a5 17 | c5 ad 89 58 8b 66 c2 c6 28 95 15 86 95 42 17 c5 | 43 6b d6 1b 90 e3 ce 5a 73 0f aa 25 80 ef 21 ed | 95 16 dc 62 db 9c 9c f1 05 8d 7b ad 88 fd 8e 82 | 62 66 a4 5c 00 db 53 d1 2c ac b4 13 62 a5 17 eb | 3f 3a 4e bc 42 77 a1 e8 e1 8a 0f 63 81 66 10 64 | 10 0d 86 9e 89 34 85 5c 5f 55 4a cb 5a 29 86 16 | 42 90 ac 93 0b a7 fb e8 a5 4a 23 43 d7 02 e6 fe | c6 7b a9 b3 68 72 59 2e 24 fd 0c 7f 98 b0 6f 9f | bb aa 48 ce f6 ec 36 99 c2 bc 70 c4 81 9e 1c 55 | 65 47 9c 55 e0 d5 f3 7e 77 c4 a5 f3 6e 82 b5 1c | 5c 56 a1 3a b8 57 69 f9 25 e2 ae ed 66 c5 c1 3d | f8 ca 2e 2b 1c 6e 27 f2 e3 ed 73 79 be b7 90 0f | cb 45 38 5f bb 3a e3 c2 44 15 72 9c 24 d0 bd 4e | fa c4 ea 53 31 95 57 c9 dc a4 ff 15 7a 28 e4 1a | 29 00 00 24 13 3d aa 25 dd 95 48 ab fd a8 d2 56 | 6c 28 74 71 5d 45 11 19 10 09 0a f3 46 e9 c4 b3 | 56 85 8c 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bb 69 2e cb ee d3 68 5b 1c f0 7d a0 | 26 ce 80 e4 bd 02 f5 15 00 00 00 1c 00 00 40 05 | 1b de 40 93 48 c5 33 61 5d a6 1a 99 ad 20 57 85 | b1 bf 8b 0c | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #5 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 a8 82 4c 6a b9 9b 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #5 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #5 | rejected packet: | 83 a8 82 4c 6a b9 9b 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #5: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350005860 | handling event EVENT_RETRANSMIT for parent state #19 | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #19 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #19 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49602.949198; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501559 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #19 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 "road-eastnet-nonat-19" #19: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #19) | 71 b7 8f 2a c9 ab 65 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 3e b3 71 5b 2a 7e 67 38 d7 ab 7a d2 03 90 2c | 27 b7 e6 d5 a7 20 27 79 5e 88 db 2d 02 14 e6 05 | 6f 07 f4 c1 2b 42 e9 2b 16 c7 24 00 68 97 23 09 | 9b 28 53 ba dc 36 46 57 40 1e 29 01 4a b7 49 a8 | 4d 9b c0 f6 6d 6c 59 7a d3 fe f7 05 02 d7 dc 3f | 33 37 fa 6e 66 82 3b 0b fc 41 01 e0 cf 12 33 b2 | a1 18 77 fd c8 36 dd ad 0b 8f 44 4a dc 2c 38 79 | 30 fa d4 bf 2a 29 27 db 37 30 a3 c6 e5 0f b5 2b | 3c 20 72 b8 f7 83 6c 1c 84 55 8f f3 1f 64 ae 19 | e5 47 9f 5e eb 0a e5 2c 75 55 6a e2 43 09 5c e9 | 24 9c 73 ae e6 a6 e7 07 f6 fe ad 11 3d af ab 94 | 47 55 a2 0e c7 5d 4b 0e 42 8f 1e 08 35 c6 12 3b | 76 58 3a e5 1d 69 62 62 bc c4 a4 b5 cb 6c d9 c9 | 2b 81 e2 3b e9 c6 13 78 c3 3f f3 38 91 f3 11 a1 | 04 e8 fa 3f 9f e8 f9 3d 60 98 07 62 99 3c 36 86 | 40 55 c7 f1 5a 42 4d 99 21 5e 58 f5 e4 8a cb d6 | 29 00 00 24 d1 01 c3 e5 0a d4 10 8b f6 20 25 e6 | de b5 f4 be cf de 7f f4 c1 d3 ec a5 70 52 4e 33 | 0b 30 f5 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 74 af f0 20 10 33 a5 14 d9 51 67 | 36 d9 37 b0 71 8d 2c dc 00 00 00 1c 00 00 40 05 | 0e 08 6a ae a9 27 97 90 41 13 4d a4 49 51 01 50 | a2 07 2e 34 | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350005860 | #19 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 b7 8f 2a c9 ab 65 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #19 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #19 | rejected packet: | 71 b7 8f 2a c9 ab 65 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #19: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #15 | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #15 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #15 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49602.951525; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002332 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #15 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 "road-eastnet-nonat-15" #15: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #15) | 26 a2 6e 3b 12 a8 59 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 6b 03 2b 64 b1 a2 70 7f 8d ca f2 6f 54 de 1b | 11 e2 1d 10 c1 2b 3c 5f 6d e7 ca 6d ea a7 28 53 | d6 4f 75 27 52 bc 43 63 3a ab 63 49 ff c4 e6 b2 | 78 96 18 25 61 28 7f 9b 98 22 5e da 00 8c e8 eb | 6c 4d 9e 76 25 8b 7a 47 ab 33 22 55 42 23 3f c1 | 32 ba e7 e4 c9 4a 5f 0d 8b 0d 29 12 b2 18 5b ef | 5f af 09 c8 a4 7c fe 53 bc 8e 96 c3 8e be 32 ff | 43 00 6d 58 cd 42 72 b2 1b fc 90 55 08 bf 9d 89 | 5e b3 d9 d7 ab 1d c3 3d 09 0d c3 a0 b4 39 9a 0c | ea 26 37 38 25 17 00 86 5a bc 7b e6 34 6a b8 82 | f3 f9 2d 18 8b 60 8a e1 44 59 97 9d 3d 8f e9 c5 | f8 41 9b cd 41 cb 5c 6e 45 99 77 f2 5a 87 7b f0 | 1d 7f 22 98 41 7d c2 e4 77 82 d2 02 ca 3f 14 b4 | ed 6e 31 66 40 7e 40 f0 ba 85 c9 d3 8f 47 3c 65 | b9 d2 a6 cf 54 28 00 31 9f 56 44 5d 75 4a b4 99 | 1b dd 03 d3 13 f1 55 d7 db 2e bc 45 cf 65 35 32 | 29 00 00 24 67 e3 6e 73 a7 21 14 7b f9 65 b0 3b | c5 ad 46 44 e6 80 5b 79 23 9d d2 69 99 df e6 8a | c8 33 da 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 9d 30 3b 19 a7 57 ef 03 62 55 06 | 80 94 c0 4d a8 e2 a5 61 00 00 00 1c 00 00 40 05 | d9 d1 f1 c9 94 93 28 e9 a6 95 bd a3 15 8f 8e 30 | 15 95 ff 3f | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #15 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 a2 6e 3b 12 a8 59 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #15 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #15 | rejected packet: | 26 a2 6e 3b 12 a8 59 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #15: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0591 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-25" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-25' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #25 at 0x557d469f6c40 | State DB: adding IKEv2 state #25 in UNDEFINED | pstats #25 ikev2.ike started | Message ID: init #25: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #25: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #25; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-25" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-25" IKE SA #25 "road-eastnet-nonat-25" "road-eastnet-nonat-25" #25: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-25 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-25": constructed local IKE proposals for road-eastnet-nonat-25 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 25 for state #25 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #25 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #25 spent 0.133 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-25" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.214 milliseconds in whack | crypto helper 10 resuming | crypto helper 10 starting work-order 25 for state #25 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 25 | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 25 time elapsed 0.001652 seconds | (#25) spent 1.04 milliseconds in crypto helper computing work-order 25: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 25 for state #25 to event queue | scheduling resume sending helper answer for #25 | libevent_malloc: new ptr-libevent@0x7fb37c00cf80 size 128 | crypto helper 10 waiting (nothing to do) | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #6 | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #6 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #6 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49603.02012; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.009153 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e8820 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #6 | libevent_malloc: new ptr-libevent@0x7fb37c009640 size 128 "road-eastnet-nonat-6" #6: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #6) | 2c 27 82 3a c6 31 e5 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f e3 1c 46 2f 61 c1 a4 57 04 b2 32 f2 da 47 30 | c5 f1 b2 8c 52 8c bd 20 1e 07 9a 1f 74 e3 50 fd | 03 ad cd d6 6e b2 e0 ed 18 de c6 cf db 53 d8 91 | 57 59 05 93 13 39 ca c4 cd bf 1d c1 99 f1 ea ab | d7 0d 4d 84 1a b9 23 c8 19 a7 00 fc 45 cd 28 de | 1b 23 11 46 b2 a5 20 88 7d a8 2e 93 69 c4 77 be | 7d 08 db 5c 91 33 d0 aa e2 d7 27 ba c6 03 59 3c | 8a b9 c7 4b aa b0 c2 31 f9 3d af 03 a0 d0 38 f5 | 81 cf 2e 3b 37 ea b5 50 38 0b b5 3b be c1 ac 52 | d4 bd 41 74 e3 b0 cc da 00 70 a4 c8 a9 ae 2b 0c | 84 70 b9 c2 c8 dd e4 ca c8 d6 7a 14 75 f2 9f ca | f3 8a 9e fb 56 2f 7b 5f 34 ab 29 a4 eb 5d 7a 01 | af 1d 55 9d 0e 4d 00 2f f9 2a c8 90 cf 50 fe a3 | 20 3f bc dc b3 d6 01 f7 dd dc c1 b1 72 f5 58 73 | b8 72 e4 a9 88 17 39 c5 a4 43 c8 df b5 2f 8d cd | 75 f3 2c cf e2 85 8e ce 7f c9 07 83 41 8f 33 7b | 29 00 00 24 aa 55 22 5c 95 3a 98 8a 23 4e 55 f5 | f2 5b 2d e6 0f d6 a3 fc b7 39 7f a3 84 04 6c 99 | b3 1f 01 c8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd d8 7d b0 3b ed a4 77 8e 72 bc 87 | 11 c3 4a b5 09 51 99 2e 00 00 00 1c 00 00 40 05 | 3b ee 43 00 bb c4 11 7e a6 6d 91 83 5e ff b0 fd | ab 20 73 91 | libevent_free: release ptr-libevent@0x7fb354009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | #6 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c 27 82 3a c6 31 e5 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #6 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #6 | rejected packet: | 2c 27 82 3a c6 31 e5 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #6: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0675 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #25 | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 25 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #25 | **emit ISAKMP Message: | initiator cookie: | 78 5e ec 19 c3 e9 2e 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-25 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fa 3a 20 04 5c a3 28 e0 27 26 70 8b 2f d3 d3 dd | ikev2 g^x 4a ad b8 1e 2e 37 87 d2 d3 a8 c4 9d c6 ee 0f a0 | ikev2 g^x 73 84 05 06 74 d6 4d 07 19 2b 12 8b 69 7a 83 b9 | ikev2 g^x 89 8c 88 b4 63 15 c8 b2 2d cc 49 7a 79 d1 07 bf | ikev2 g^x ee 4e b7 0b 0d 2d 3d 97 a7 24 aa 10 a0 e9 fc 77 | ikev2 g^x 06 e9 cd 21 f9 64 fc 4a 83 9d 5e f3 a2 9b 32 c3 | ikev2 g^x d3 50 6b 09 58 29 c8 67 c4 22 3b 38 ef 52 9f dd | ikev2 g^x 6e 41 e8 16 88 89 59 a6 9f 8d 30 13 4e 6f 06 5b | ikev2 g^x 1b 0e 62 f8 90 29 6e c8 e5 89 28 a2 ea ec 59 64 | ikev2 g^x 67 71 02 aa 61 49 46 0f fe 0a d1 4d 62 20 44 13 | ikev2 g^x 22 6b 41 1e 83 c0 52 5c 04 b5 86 ac e3 c4 87 52 | ikev2 g^x 79 53 63 6b c1 fd a7 16 e1 a2 b6 27 78 fe 10 69 | ikev2 g^x 79 cb f1 75 47 7f aa 61 41 c8 00 01 b4 6e 89 cf | ikev2 g^x 41 c5 e9 e7 92 08 38 fd 15 78 0a 2b 93 44 c9 ca | ikev2 g^x b1 70 2a 2b ec 91 fe 70 63 59 89 8e 57 c3 33 c3 | ikev2 g^x 54 24 a1 21 c8 2a c0 85 b2 60 de 71 38 dc 7c 22 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e1 d5 1d 82 b2 16 85 fd 33 85 77 2b fc 68 12 4a | IKEv2 nonce cf f8 6e 1b 7e ab 43 df ab 9a a1 84 be 92 7e 5d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 78 5e ec 19 c3 e9 2e 1c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 19 | natd_hash: port= 01 f4 | natd_hash: hash= 8a 8e 47 d6 ba 1e 42 85 a7 7b 2f db 65 2a 1e ef | natd_hash: hash= d5 42 ee 43 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8a 8e 47 d6 ba 1e 42 85 a7 7b 2f db 65 2a 1e ef | Notify data d5 42 ee 43 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 78 5e ec 19 c3 e9 2e 1c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 5d 12 0d 5e 92 91 ee 2b 6d 12 02 e9 64 25 a1 22 | natd_hash: hash= eb b7 d7 ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5d 12 0d 5e 92 91 ee 2b 6d 12 02 e9 64 25 a1 22 | Notify data eb b7 d7 ed | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #25 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #25: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #25 to 4294967295 after switching state | Message ID: IKE #25 skipping update_recv as MD is fake | Message ID: sent #25 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-25" #25: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.25:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #25) | 78 5e ec 19 c3 e9 2e 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 3a 20 04 5c a3 28 e0 27 26 70 8b 2f d3 d3 dd | 4a ad b8 1e 2e 37 87 d2 d3 a8 c4 9d c6 ee 0f a0 | 73 84 05 06 74 d6 4d 07 19 2b 12 8b 69 7a 83 b9 | 89 8c 88 b4 63 15 c8 b2 2d cc 49 7a 79 d1 07 bf | ee 4e b7 0b 0d 2d 3d 97 a7 24 aa 10 a0 e9 fc 77 | 06 e9 cd 21 f9 64 fc 4a 83 9d 5e f3 a2 9b 32 c3 | d3 50 6b 09 58 29 c8 67 c4 22 3b 38 ef 52 9f dd | 6e 41 e8 16 88 89 59 a6 9f 8d 30 13 4e 6f 06 5b | 1b 0e 62 f8 90 29 6e c8 e5 89 28 a2 ea ec 59 64 | 67 71 02 aa 61 49 46 0f fe 0a d1 4d 62 20 44 13 | 22 6b 41 1e 83 c0 52 5c 04 b5 86 ac e3 c4 87 52 | 79 53 63 6b c1 fd a7 16 e1 a2 b6 27 78 fe 10 69 | 79 cb f1 75 47 7f aa 61 41 c8 00 01 b4 6e 89 cf | 41 c5 e9 e7 92 08 38 fd 15 78 0a 2b 93 44 c9 ca | b1 70 2a 2b ec 91 fe 70 63 59 89 8e 57 c3 33 c3 | 54 24 a1 21 c8 2a c0 85 b2 60 de 71 38 dc 7c 22 | 29 00 00 24 e1 d5 1d 82 b2 16 85 fd 33 85 77 2b | fc 68 12 4a cf f8 6e 1b 7e ab 43 df ab 9a a1 84 | be 92 7e 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a 8e 47 d6 ba 1e 42 85 a7 7b 2f db | 65 2a 1e ef d5 42 ee 43 00 00 00 1c 00 00 40 05 | 5d 12 0d 5e 92 91 ee 2b 6d 12 02 e9 64 25 a1 22 | eb b7 d7 ed | state #25 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #25 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #25 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49603.020879 | resume sending helper answer for #25 suppresed complete_v2_state_transition() and stole MD | #25 spent 0.491 milliseconds in resume sending helper answer | stop processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c00cf80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 5e ec 19 c3 e9 2e 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #25 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #25 | rejected packet: | 78 5e ec 19 c3 e9 2e 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #25: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #20 | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #20 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #20 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49603.034099; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501242 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #20 | libevent_malloc: new ptr-libevent@0x7fb37c00cf80 size 128 "road-eastnet-nonat-20" #20: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #20) | 2a d8 6a 5c 08 dc 68 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad 76 8b c3 8a cd 7e 81 09 43 af dc 84 86 57 86 | ac 01 81 74 96 d6 08 70 58 d2 f7 10 2a f2 1e 9d | b0 95 95 b3 32 1e e8 01 5c d2 e7 39 14 67 2f fd | 6f cc fb 0b 1d bd c7 ac 37 fb c6 6d e0 84 f8 c8 | 00 c1 d6 0f 3b e2 a7 4b 51 a3 13 bb 3d f4 c2 99 | 9b 84 74 df c2 bf fa 13 e4 2a f9 e8 2d 4c 6c c5 | 8d e3 52 85 e9 f8 18 fc 4b 38 b9 82 e0 ab 65 b7 | ae a5 89 3c 88 ee 05 34 a9 d7 52 0c 03 2e a9 7e | e2 c7 7b c9 35 8f e6 9e 0b 55 49 71 ce bd 37 1f | 22 8f 48 76 19 75 9b c0 7a 62 4e 51 77 02 d7 bf | e0 ea 0a 67 41 41 2e 98 4f f3 cf 32 f2 ae 82 83 | 1f 56 7c 33 17 50 fa 76 01 41 f1 ba 05 90 db bd | 83 b9 cd 1b b8 6e f3 33 72 7e 47 f3 20 71 8f e7 | ec 91 f3 37 6a 94 11 a2 55 f0 09 1c 76 98 cd 56 | 66 be 33 43 a6 1c f5 8b 31 c4 e3 0a 7b 29 cc 17 | 3f 13 b8 73 4c 86 e0 b0 2a 03 32 6a 19 82 cb a2 | 29 00 00 24 47 97 3a 6f 12 05 22 fe fb dc 3c 25 | ff 91 0d 7a c8 4c ac f8 1f 7e d1 5f 41 39 e3 39 | e8 aa 43 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f 67 98 f7 05 c6 ee 5e 5b 5f e2 fa | ee a5 ba af 57 96 46 d2 00 00 00 1c 00 00 40 05 | 3e ef c3 bb 3d a5 88 fb 9f 3c 53 fd 3b c9 ea 45 | 6f 53 bd 02 | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #20 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a d8 6a 5c 08 dc 68 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #20 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #20 | rejected packet: | 2a d8 6a 5c 08 dc 68 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #20: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-26" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-26' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #26 at 0x557d469f8200 | State DB: adding IKEv2 state #26 in UNDEFINED | pstats #26 ikev2.ike started | Message ID: init #26: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #26: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #26; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-26" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-26" IKE SA #26 "road-eastnet-nonat-26" "road-eastnet-nonat-26" #26: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-26 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-26": constructed local IKE proposals for road-eastnet-nonat-26 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 26 for state #26 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb360005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #26 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 | crypto helper 14 resuming | crypto helper 14 starting work-order 26 for state #26 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 26 | #26 spent 0.113 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-26" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.218 milliseconds in whack | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 26 time elapsed 0.00096 seconds | (#26) spent 0.939 milliseconds in crypto helper computing work-order 26: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 26 for state #26 to event queue | scheduling resume sending helper answer for #26 | libevent_malloc: new ptr-libevent@0x7fb37000cf80 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #26 | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 26 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #26 | **emit ISAKMP Message: | initiator cookie: | f4 88 08 87 51 21 ca bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-26 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x af d0 7b 56 fd 83 24 e2 7f 6d 07 5b 14 cf 37 08 | ikev2 g^x c2 df a1 e8 d0 3d d9 70 11 a2 f7 87 78 ef 74 57 | ikev2 g^x 42 80 b9 d0 66 00 01 7b 09 5e 7e 2a 26 27 6c f8 | ikev2 g^x 72 db 2f 73 3f 38 89 07 c7 29 09 0b 07 35 1d d7 | ikev2 g^x 5c 45 0c 9e 1b e1 95 53 4a ee ac 68 bd 09 aa 3d | ikev2 g^x 27 0f 50 02 03 b3 ad ea c4 c7 28 b1 bc b2 70 07 | ikev2 g^x fc b6 58 d4 ed 1b fe 1b 64 8b 86 a1 fe fc 72 d9 | ikev2 g^x f1 ba a9 eb 7d ce cd 2c b8 6e 00 33 4c be dd dd | ikev2 g^x 3d 98 b2 2e 58 56 f2 f2 80 02 eb 21 ee 6b bd 96 | ikev2 g^x 40 1f 33 62 77 0f c1 a2 eb f8 19 6e 1a 5e 18 e2 | ikev2 g^x c2 89 f7 17 30 91 11 29 f1 9d 22 c7 c8 11 a1 d6 | ikev2 g^x b3 ae 73 01 db d3 1a d2 95 3f af b3 66 e8 e4 3f | ikev2 g^x 7f 26 bd b3 f0 37 10 0c fa cc 87 cc 8d 67 d1 69 | ikev2 g^x 87 60 66 13 b3 cf ae b5 94 11 93 f7 71 af 4a e8 | ikev2 g^x 96 fa e6 46 bb bb 17 b4 9c 44 80 04 e3 4c ce 52 | ikev2 g^x 44 6c a3 c2 a0 6e 82 a5 21 5c cc c5 65 7c 81 dc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8a 04 a2 be b1 ba fb 75 a9 90 e3 4a e4 71 c4 43 | IKEv2 nonce 1c fe 30 e6 85 0e 15 7e 50 52 02 a7 d2 a1 ae dc | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f4 88 08 87 51 21 ca bb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1a | natd_hash: port= 01 f4 | natd_hash: hash= 98 32 7f b1 02 26 47 ea b2 9e 1c ce 0f f8 7e 1c | natd_hash: hash= 87 59 f3 12 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 98 32 7f b1 02 26 47 ea b2 9e 1c ce 0f f8 7e 1c | Notify data 87 59 f3 12 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f4 88 08 87 51 21 ca bb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f0 af 8c 45 09 60 6e 14 7f 54 da 7f 84 35 07 83 | natd_hash: hash= 60 40 27 0a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f0 af 8c 45 09 60 6e 14 7f 54 da 7f 84 35 07 83 | Notify data 60 40 27 0a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #26 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #26: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #26 to 4294967295 after switching state | Message ID: IKE #26 skipping update_recv as MD is fake | Message ID: sent #26 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-26" #26: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.26:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #26) | f4 88 08 87 51 21 ca bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af d0 7b 56 fd 83 24 e2 7f 6d 07 5b 14 cf 37 08 | c2 df a1 e8 d0 3d d9 70 11 a2 f7 87 78 ef 74 57 | 42 80 b9 d0 66 00 01 7b 09 5e 7e 2a 26 27 6c f8 | 72 db 2f 73 3f 38 89 07 c7 29 09 0b 07 35 1d d7 | 5c 45 0c 9e 1b e1 95 53 4a ee ac 68 bd 09 aa 3d | 27 0f 50 02 03 b3 ad ea c4 c7 28 b1 bc b2 70 07 | fc b6 58 d4 ed 1b fe 1b 64 8b 86 a1 fe fc 72 d9 | f1 ba a9 eb 7d ce cd 2c b8 6e 00 33 4c be dd dd | 3d 98 b2 2e 58 56 f2 f2 80 02 eb 21 ee 6b bd 96 | 40 1f 33 62 77 0f c1 a2 eb f8 19 6e 1a 5e 18 e2 | c2 89 f7 17 30 91 11 29 f1 9d 22 c7 c8 11 a1 d6 | b3 ae 73 01 db d3 1a d2 95 3f af b3 66 e8 e4 3f | 7f 26 bd b3 f0 37 10 0c fa cc 87 cc 8d 67 d1 69 | 87 60 66 13 b3 cf ae b5 94 11 93 f7 71 af 4a e8 | 96 fa e6 46 bb bb 17 b4 9c 44 80 04 e3 4c ce 52 | 44 6c a3 c2 a0 6e 82 a5 21 5c cc c5 65 7c 81 dc | 29 00 00 24 8a 04 a2 be b1 ba fb 75 a9 90 e3 4a | e4 71 c4 43 1c fe 30 e6 85 0e 15 7e 50 52 02 a7 | d2 a1 ae dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 32 7f b1 02 26 47 ea b2 9e 1c ce | 0f f8 7e 1c 87 59 f3 12 00 00 00 1c 00 00 40 05 | f0 af 8c 45 09 60 6e 14 7f 54 da 7f 84 35 07 83 | 60 40 27 0a | state #26 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb360005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #26 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 | #26 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49603.099152 | resume sending helper answer for #26 suppresed complete_v2_state_transition() and stole MD | #26 spent 0.479 milliseconds in resume sending helper answer | stop processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37000cf80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 88 08 87 51 21 ca bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #26 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #26 | rejected packet: | f4 88 08 87 51 21 ca bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #26: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #16 | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #16 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #16 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49603.106357; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003923 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ec960 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #16 | libevent_malloc: new ptr-libevent@0x7fb37000cf80 size 128 "road-eastnet-nonat-16" #16: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #16) | 6b 57 6c f9 94 8d 37 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 79 95 56 0f 3a d5 d4 38 4f 8b a1 27 c3 02 1b | 5e 3a 85 e1 08 09 e6 fc a8 62 0f 43 42 55 29 b8 | e4 f9 04 77 e0 10 6e f0 87 0e 34 48 79 7d 7a e8 | ca f4 cc cc 99 09 3c b6 c2 35 0f bc 7b 2d 41 d5 | dd f7 e4 e1 a4 f1 02 00 be 44 4b 47 7e b4 a8 a2 | 62 b7 14 ca 2d 3c f6 2d ca f0 71 35 95 46 55 c7 | 1c ba 8e 83 ee 6a 95 4e 0b 06 27 00 95 fd 56 5f | a2 f2 d6 ed a0 30 96 bf 3e 03 94 41 ed 51 4c 15 | 54 db 62 3c 9c 56 76 98 56 78 f9 0d a3 f4 ac 74 | a4 8d 21 e9 c2 d6 c6 f2 bf cc ab 95 d5 b5 69 db | 99 07 4a 4f 0a fb b6 0d 07 d8 b8 7a ef c0 3c c0 | fa 7f 1c 08 05 55 7f 42 6a 4f 4e 4e 1f 35 3a 92 | 3a 9a 25 4f 7a 92 43 f1 5a 60 e4 7c d0 47 d1 12 | 01 ce a1 b9 b7 b6 c9 00 28 c2 19 89 84 44 e5 78 | 95 8c db 08 69 6a 49 44 32 07 7d 96 fb 06 00 43 | c3 4e a1 ee cd 85 94 29 a6 9f 2d d7 39 41 3b c9 | 29 00 00 24 85 0d a1 fb 37 74 4a 69 68 3b 97 74 | ca a6 8b 60 be e5 4d eb 21 82 d1 c7 17 0f 24 83 | fe 05 13 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 42 5d 5a fd 9e 39 f4 1d d5 d8 fc | 51 9a 83 f2 5f a0 b0 5a 00 00 00 1c 00 00 40 05 | 36 95 c1 ea ee d0 12 21 b4 68 71 46 60 49 f3 80 | 34 92 b4 f4 | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #16 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b 57 6c f9 94 8d 37 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #16 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #16 | rejected packet: | 6b 57 6c f9 94 8d 37 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #16: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0685 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #7 | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #7 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #7 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49603.120724; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004021 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #7 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 "road-eastnet-nonat-7" #7: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #7) | df 0f 9a c7 72 fc c7 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 16 59 37 af 9b 5a d1 22 e5 b7 89 f5 29 0b b4 | f8 e5 4b 2e 70 7a c8 bc f1 ab 2a 61 eb 02 ca fa | a3 75 2e 7e 2d d5 25 c9 fa fb 53 11 81 f8 e7 7c | 35 1a 09 cf c2 a1 7a e6 ba 83 f5 ea 71 c2 29 ca | 29 da 7e bf 99 10 95 66 d2 23 d8 4f 49 2f bd 63 | 11 b8 e1 71 39 92 a3 a7 60 6b 7a e8 94 6f c6 09 | 3e 44 50 a7 14 dd 81 7d 4c 7f 80 8c 35 65 97 9c | b1 11 76 e7 2a ca 44 b5 84 ae 8b 5a 9b fd ff 0d | 19 d8 e9 75 5a 70 67 71 dc 0e 22 08 1b 97 e2 25 | ad 6c 4c 80 de ff 3e 29 34 2a 32 fa 3b 41 ab 38 | c8 2c a4 db 1f 4a 62 fb 24 ff ed 13 44 3e 4c cb | a1 99 52 bb 30 b7 29 d8 9d 52 b8 4d 90 9d ab aa | c0 57 68 4e 57 cb d7 d7 cc 96 2c bc 75 0c 87 f5 | 9c 71 0b 3a 29 74 b7 e2 7f 5e 8b 9f 17 4e 89 84 | da f8 88 1c 69 02 1c 1f 41 83 de df 0e 7e 58 56 | 61 84 83 da 8c c8 98 f6 a7 9f db ce b7 aa a6 bc | 29 00 00 24 9d 55 08 62 c0 73 1e 47 79 75 2c 10 | 4a ab 88 17 80 18 91 8e 0d 3b 8f 21 a0 4a c9 52 | dc 93 16 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e cd 5f ad 94 80 bb 48 49 e9 a2 c8 | 76 8b 7e e8 6f 59 19 d9 00 00 00 1c 00 00 40 05 | 2f 3e df 6a 16 4a bb 95 81 15 e0 c0 73 52 29 fa | 60 85 d2 fd | libevent_free: release ptr-libevent@0x7fb348009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #7 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 0f 9a c7 72 fc c7 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #7 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #7 | rejected packet: | df 0f 9a c7 72 fc c7 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #7: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.067 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #21 | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #21 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #21 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49603.145103; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500902 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #21 | libevent_malloc: new ptr-libevent@0x7fb348009640 size 128 "road-eastnet-nonat-21" #21: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #21) | c1 e2 95 19 0d 6d aa c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 62 b7 cc 73 d3 9f c3 8b a1 e4 26 f8 ce 22 33 | 92 13 78 50 86 db 45 6a 88 c0 09 ba 4c 3a ed 8d | 07 a9 f3 c5 90 2e 12 14 58 94 56 71 46 c0 41 ae | 27 c0 08 e3 c4 02 5d ee 64 22 79 77 74 67 02 97 | 15 c4 99 75 53 da b8 d8 73 7b 03 dd 0e 63 e5 c8 | 2f a1 74 7d 1c 73 5d e6 89 77 c2 84 53 e8 81 35 | 14 8c 80 35 a3 ae 1e 09 89 8b c1 64 7d fd 4f 89 | 8f b7 6b da 51 0c c4 21 04 59 18 7c 8d 33 1a 85 | 98 29 76 e4 22 ac 91 00 31 d3 90 f1 d2 f4 f2 9a | 20 a3 6d 51 7b 67 e4 d8 4d 7c 9a fb 7c 63 7f d7 | c7 25 20 29 d5 e0 63 b5 f2 a7 5f d2 ec 98 84 3a | cb 95 85 f5 af 28 8d c4 5a 27 b6 9c 15 cc dd ed | f7 9f 6c d0 d0 af 5b 13 f0 d8 0f 7e 40 99 08 7d | 42 b3 e6 b5 93 1f 1e e1 85 38 e6 f0 e2 af 01 7d | 4f a1 b9 ef 5c 3f 42 c4 c2 ef e5 bc 70 ba 8e 68 | 71 82 c2 53 b9 56 35 3d c9 38 89 b6 a0 89 2b f3 | 29 00 00 24 b6 59 e5 4e ee 3f fd 49 7f 16 f6 82 | 11 23 a0 41 4a 5a b9 59 7b 13 06 de 98 79 ac e0 | 67 18 f7 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 70 4a 79 4b fb 19 31 c0 36 bc 71 | 8e f3 57 13 5a bf 33 aa 00 00 00 1c 00 00 40 05 | 04 fc 29 44 06 78 d7 26 30 ef ba 81 66 98 ec 1d | 35 84 86 e1 | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #21 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c1 e2 95 19 0d 6d aa c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #21 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #21 | rejected packet: | c1 e2 95 19 0d 6d aa c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #21: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0585 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-27" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-27' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #27 at 0x557d469f97c0 | State DB: adding IKEv2 state #27 in UNDEFINED | pstats #27 ikev2.ike started | Message ID: init #27: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #27: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #27; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-27" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-27" IKE SA #27 "road-eastnet-nonat-27" "road-eastnet-nonat-27" #27: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-27 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-27": constructed local IKE proposals for road-eastnet-nonat-27 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 27 for state #27 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb370005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #27 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 | #27 spent 0.146 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-27" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.237 milliseconds in whack | crypto helper 15 resuming | crypto helper 15 starting work-order 27 for state #27 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 27 | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 27 time elapsed 0.000875 seconds | (#27) spent 0.877 milliseconds in crypto helper computing work-order 27: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 27 for state #27 to event queue | scheduling resume sending helper answer for #27 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 | libevent_realloc: release ptr-libevent@0x557d469dabe0 | libevent_realloc: new ptr-libevent@0x557d469fb930 size 512 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #27 | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 27 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #27 | **emit ISAKMP Message: | initiator cookie: | dd bb 9e aa 71 2c a8 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-27 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fa f5 f3 8a 2e ca 64 13 4e ef 73 e4 1f 3e 67 ad | ikev2 g^x a1 5c bf b8 82 2d 98 4b ba 2f 4b 9c 4a 49 f6 7b | ikev2 g^x 11 53 66 d7 f2 df c6 4d 6c e8 fe ca eb 65 f7 23 | ikev2 g^x 79 97 e3 ea 55 ca fa 7d 0e 42 d8 5c 14 c7 91 72 | ikev2 g^x a4 fc cd 45 56 42 b0 30 e3 75 4e 16 78 7d 09 4f | ikev2 g^x c2 b4 68 6b 47 a2 0e 20 da b0 6a 41 7f ac 79 d0 | ikev2 g^x d4 2d 42 99 fd 0a 3a e2 6d 7f 90 e8 4d 1a 00 b2 | ikev2 g^x e9 9e 2f 5f 8c ef b1 f3 83 5d 30 13 95 c4 ca 84 | ikev2 g^x fc 5b f8 fd 99 e0 ef 1a ad a3 e3 11 fc de 8e cc | ikev2 g^x 62 ac 46 25 e8 4f ae 15 57 eb 6c c5 d8 d5 81 b9 | ikev2 g^x c0 5f a7 29 95 52 01 a8 27 41 88 9f 21 51 57 97 | ikev2 g^x 0e c0 5b 72 b9 1f 72 3e c5 18 84 95 8f 3a f7 5b | ikev2 g^x 8e ab cb da 5c d8 78 8b 6b d1 3d 62 f9 12 53 ba | ikev2 g^x 86 1f 8f 29 ce 9f 76 76 1e 5f 01 99 06 da 91 72 | ikev2 g^x f3 a9 41 c1 f1 95 87 95 cf 5a fe 09 57 13 44 9d | ikev2 g^x 62 a4 a9 60 fa 79 cc f9 5d bf f3 2b 5c 5b b4 99 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 55 62 09 8a 44 b4 a9 1d d9 35 9c 9a 78 93 87 c8 | IKEv2 nonce d6 2b f2 b0 a8 b2 26 80 5e 03 70 47 73 8a 49 c5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= dd bb 9e aa 71 2c a8 bd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1b | natd_hash: port= 01 f4 | natd_hash: hash= ef ee 96 1f 62 1c cd f0 a1 f5 67 ee 76 d8 b6 28 | natd_hash: hash= a5 c0 9f 1d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ef ee 96 1f 62 1c cd f0 a1 f5 67 ee 76 d8 b6 28 | Notify data a5 c0 9f 1d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= dd bb 9e aa 71 2c a8 bd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 69 41 25 fb 01 9f 0c 01 9b e6 f4 5d 86 8e 8e d0 | natd_hash: hash= 2b 2d f0 b6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 69 41 25 fb 01 9f 0c 01 9b e6 f4 5d 86 8e 8e d0 | Notify data 2b 2d f0 b6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #27 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #27: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #27 to 4294967295 after switching state | Message ID: IKE #27 skipping update_recv as MD is fake | Message ID: sent #27 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-27" #27: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.27:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #27) | dd bb 9e aa 71 2c a8 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa f5 f3 8a 2e ca 64 13 4e ef 73 e4 1f 3e 67 ad | a1 5c bf b8 82 2d 98 4b ba 2f 4b 9c 4a 49 f6 7b | 11 53 66 d7 f2 df c6 4d 6c e8 fe ca eb 65 f7 23 | 79 97 e3 ea 55 ca fa 7d 0e 42 d8 5c 14 c7 91 72 | a4 fc cd 45 56 42 b0 30 e3 75 4e 16 78 7d 09 4f | c2 b4 68 6b 47 a2 0e 20 da b0 6a 41 7f ac 79 d0 | d4 2d 42 99 fd 0a 3a e2 6d 7f 90 e8 4d 1a 00 b2 | e9 9e 2f 5f 8c ef b1 f3 83 5d 30 13 95 c4 ca 84 | fc 5b f8 fd 99 e0 ef 1a ad a3 e3 11 fc de 8e cc | 62 ac 46 25 e8 4f ae 15 57 eb 6c c5 d8 d5 81 b9 | c0 5f a7 29 95 52 01 a8 27 41 88 9f 21 51 57 97 | 0e c0 5b 72 b9 1f 72 3e c5 18 84 95 8f 3a f7 5b | 8e ab cb da 5c d8 78 8b 6b d1 3d 62 f9 12 53 ba | 86 1f 8f 29 ce 9f 76 76 1e 5f 01 99 06 da 91 72 | f3 a9 41 c1 f1 95 87 95 cf 5a fe 09 57 13 44 9d | 62 a4 a9 60 fa 79 cc f9 5d bf f3 2b 5c 5b b4 99 | 29 00 00 24 55 62 09 8a 44 b4 a9 1d d9 35 9c 9a | 78 93 87 c8 d6 2b f2 b0 a8 b2 26 80 5e 03 70 47 | 73 8a 49 c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ef ee 96 1f 62 1c cd f0 a1 f5 67 ee | 76 d8 b6 28 a5 c0 9f 1d 00 00 00 1c 00 00 40 05 | 69 41 25 fb 01 9f 0c 01 9b e6 f4 5d 86 8e 8e d0 | 2b 2d f0 b6 | state #27 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb370005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #27 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 | #27 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49603.164248 | resume sending helper answer for #27 suppresed complete_v2_state_transition() and stole MD | #27 spent 0.448 milliseconds in resume sending helper answer | stop processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37400cf80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd bb 9e aa 71 2c a8 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #27 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #27 | rejected packet: | dd bb 9e aa 71 2c a8 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #27: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-28" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-28' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #28 at 0x557d469fad80 | State DB: adding IKEv2 state #28 in UNDEFINED | pstats #28 ikev2.ike started | Message ID: init #28: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #28: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #28; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-28" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-28" IKE SA #28 "road-eastnet-nonat-28" "road-eastnet-nonat-28" #28: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-28 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-28": constructed local IKE proposals for road-eastnet-nonat-28 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 28 for state #28 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469ef4e0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #28 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 | #28 spent 0.125 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 19 resuming | crypto helper 19 starting work-order 28 for state #28 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 28 | RESET processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-28" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.207 milliseconds in whack | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 28 time elapsed 0.000698 seconds | (#28) spent 0.702 milliseconds in crypto helper computing work-order 28: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 28 for state #28 to event queue | scheduling resume sending helper answer for #28 | libevent_malloc: new ptr-libevent@0x7fb36800cf80 size 128 | crypto helper 19 waiting (nothing to do) | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #8 | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #8 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #8 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49603.226316; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.010865 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f2060 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #8 | libevent_malloc: new ptr-libevent@0x7fb354009640 size 128 "road-eastnet-nonat-8" #8: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #8) | fc e4 b0 97 be 19 e9 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb d7 b3 51 4b 56 31 da 19 b8 5b 11 80 3b 41 1d | db f2 28 3e 72 37 5d 51 ba b2 d1 db 84 a6 bb ce | 1e df 68 85 ad 45 d9 42 b6 3f f1 bf ca c0 f5 c2 | 41 11 18 ed 51 a4 a9 fb cb 5c 4b aa 1e 3a 47 5b | 44 a6 6a b6 94 62 27 08 46 1d 7b c4 ed 7e 13 6a | ca 75 f3 53 1a b4 5c e1 d0 26 6f 40 15 2a cf 5a | f0 64 c4 e8 99 40 1c 70 04 b2 00 e7 d0 a3 f5 96 | 6f ea 9b 0f 3f 68 a1 38 bf d5 ee 9b d4 28 95 59 | 43 fb 48 c8 ce 17 ed f6 a6 07 54 e9 76 3f ee 31 | e6 e0 4a 4a d9 1d 0e e2 d0 7f ee 9c f3 8f a5 65 | 31 c9 6f 45 ef 29 7c e4 98 48 e7 74 36 9b 60 48 | d3 f3 57 f0 4c b4 e7 0c b5 86 17 23 2a 25 88 1a | fd 48 0b e6 cd dd cd 71 67 f2 f0 ef a5 6a 24 ce | 8d d1 03 48 9c cf 4e e9 3a a8 3d 43 bb 43 cc 87 | 8b c7 29 54 b9 be 7f 2d 59 4b b6 ed 8e 48 bd b3 | 3d c6 30 ad ce 82 73 65 33 71 0d 41 0a f1 8b 76 | 29 00 00 24 ca f3 cf 9b f4 48 aa 70 c1 ee a6 ea | 0d e2 1f 7c 7a 99 db 08 31 a2 ad 99 ee 01 2c 76 | 68 be 3a 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d b5 e6 39 e3 40 62 d7 8a aa fc 72 | 51 01 50 53 91 71 a4 51 00 00 00 1c 00 00 40 05 | 09 30 f5 72 c0 48 d1 9e 95 11 78 b6 cb 80 4b c0 | 24 25 44 07 | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #8 spent 0.0962 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #28 | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 28 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #28 | **emit ISAKMP Message: | initiator cookie: | 8a 4b 73 21 31 f2 6a 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-28 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 57 df aa e5 83 52 1a b7 2d d0 6a 7e dc d8 a5 d6 | ikev2 g^x 60 61 e0 83 0f 2b 6a 2b b8 0c 87 3f 14 f7 2a a4 | ikev2 g^x 98 70 c5 3a a2 0f 1f 46 6a b1 86 1e e5 5c 59 31 | ikev2 g^x 32 22 91 5d a2 6a 04 29 2b 10 13 47 0d 40 ca 72 | ikev2 g^x cd e0 cf f3 84 ed 4f bf 99 02 d6 fe 28 30 e6 6c | ikev2 g^x 0e 7e ca 11 f9 11 9f a6 4c d1 42 ed 4a 0f de 1b | ikev2 g^x d1 6c 18 cd c5 6b d0 23 4a e0 04 a7 c5 ef 74 ac | ikev2 g^x 27 c8 ec 0e 1f 0d 3c 8b a9 02 76 2a 67 8e fc de | ikev2 g^x 50 4d 80 13 28 3f 33 79 17 2e 6d b4 b5 19 8a 07 | ikev2 g^x 87 4a ec 6e c5 3c fb 34 d8 bf 04 77 90 53 b4 91 | ikev2 g^x 82 d0 d4 cb ca fc 05 22 43 e7 d4 8d 52 a6 ff 42 | ikev2 g^x 3e 8b bc 55 2d a6 ee 39 af 98 64 0e 18 a4 e9 08 | ikev2 g^x 5d d9 7e 8e 5f 00 df 4b 1b cc 49 d9 d0 64 64 c8 | ikev2 g^x 91 98 82 46 10 8e 0a 7c d6 f9 65 30 9e a6 47 1d | ikev2 g^x b8 47 35 3b c7 13 08 d5 39 45 15 b2 10 ce ee 48 | ikev2 g^x 7d d8 33 00 3c 55 6c 41 f3 1e 7b 0e 34 03 4f b7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ad 13 98 57 a2 9c 4e ec e1 0a 80 5c a0 80 42 e1 | IKEv2 nonce ab 4f 47 32 a1 1d 36 58 8b 1c 71 8b 25 4d b5 89 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8a 4b 73 21 31 f2 6a 80 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1c | natd_hash: port= 01 f4 | natd_hash: hash= ff 83 6c 60 48 f0 55 9f 8d d1 7e b1 fd da e6 ac | natd_hash: hash= 8a a5 fd 2f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ff 83 6c 60 48 f0 55 9f 8d d1 7e b1 fd da e6 ac | Notify data 8a a5 fd 2f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8a 4b 73 21 31 f2 6a 80 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4a 9c 1d b6 db 3c dd 9b 4a da 5d 6f ea e8 da 4e | natd_hash: hash= 08 2e ae f5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4a 9c 1d b6 db 3c dd 9b 4a da 5d 6f ea e8 da 4e | Notify data 08 2e ae f5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #28 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #28: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #28 to 4294967295 after switching state | Message ID: IKE #28 skipping update_recv as MD is fake | Message ID: sent #28 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-28" #28: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.28:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #28) | 8a 4b 73 21 31 f2 6a 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 df aa e5 83 52 1a b7 2d d0 6a 7e dc d8 a5 d6 | 60 61 e0 83 0f 2b 6a 2b b8 0c 87 3f 14 f7 2a a4 | 98 70 c5 3a a2 0f 1f 46 6a b1 86 1e e5 5c 59 31 | 32 22 91 5d a2 6a 04 29 2b 10 13 47 0d 40 ca 72 | cd e0 cf f3 84 ed 4f bf 99 02 d6 fe 28 30 e6 6c | 0e 7e ca 11 f9 11 9f a6 4c d1 42 ed 4a 0f de 1b | d1 6c 18 cd c5 6b d0 23 4a e0 04 a7 c5 ef 74 ac | 27 c8 ec 0e 1f 0d 3c 8b a9 02 76 2a 67 8e fc de | 50 4d 80 13 28 3f 33 79 17 2e 6d b4 b5 19 8a 07 | 87 4a ec 6e c5 3c fb 34 d8 bf 04 77 90 53 b4 91 | 82 d0 d4 cb ca fc 05 22 43 e7 d4 8d 52 a6 ff 42 | 3e 8b bc 55 2d a6 ee 39 af 98 64 0e 18 a4 e9 08 | 5d d9 7e 8e 5f 00 df 4b 1b cc 49 d9 d0 64 64 c8 | 91 98 82 46 10 8e 0a 7c d6 f9 65 30 9e a6 47 1d | b8 47 35 3b c7 13 08 d5 39 45 15 b2 10 ce ee 48 | 7d d8 33 00 3c 55 6c 41 f3 1e 7b 0e 34 03 4f b7 | 29 00 00 24 ad 13 98 57 a2 9c 4e ec e1 0a 80 5c | a0 80 42 e1 ab 4f 47 32 a1 1d 36 58 8b 1c 71 8b | 25 4d b5 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 83 6c 60 48 f0 55 9f 8d d1 7e b1 | fd da e6 ac 8a a5 fd 2f 00 00 00 1c 00 00 40 05 | 4a 9c 1d b6 db 3c dd 9b 4a da 5d 6f ea e8 da 4e | 08 2e ae f5 | state #28 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469ef4e0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #28 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 | #28 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49603.226876 | resume sending helper answer for #28 suppresed complete_v2_state_transition() and stole MD | #28 spent 0.413 milliseconds in resume sending helper answer | stop processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36800cf80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc e4 b0 97 be 19 e9 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #8 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #8 | rejected packet: | fc e4 b0 97 be 19 e9 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #8: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 4b 73 21 31 f2 6a 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #28 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #28 | rejected packet: | 8a 4b 73 21 31 f2 6a 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #28: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0362 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #22 | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #22 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #22 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49603.229138; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501186 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e7260 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #22 | libevent_malloc: new ptr-libevent@0x7fb36800cf80 size 128 "road-eastnet-nonat-22" #22: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #22) | fb 94 21 58 38 c3 f9 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 fa b9 d7 68 fd 72 8f 42 0c d5 a2 f7 f4 9b 8a | d7 23 52 ca 6c 52 76 c9 13 29 10 22 e6 ec 59 2c | a8 f2 aa 73 f8 3e 6b 2a a1 80 14 ff a7 56 48 4f | 3e 9b c4 33 e8 9f 3f e1 00 d1 2f db 56 9e da 18 | 67 a2 e0 d7 98 13 63 9f 28 d8 20 03 fc d6 f3 6a | 0b 8c 23 20 ba 26 3e 63 f5 df a1 d6 76 bf 7c f8 | 52 9b 7b e3 ba 8b f9 13 50 1b 61 13 1c 98 cb 7a | 18 f4 0d 9c 45 e0 10 ca 68 77 fa c0 54 76 19 a8 | f4 83 b0 e9 4d 71 3e a8 7b e6 82 90 01 66 8f f4 | 47 f6 ec 2f 3d 48 64 9c f2 b5 21 50 b5 a6 c1 a0 | 91 f5 21 c6 ec 6a bd 95 39 08 03 b0 29 f0 d4 a1 | f0 7d 39 2b f5 47 de 25 f6 c5 56 6c a0 9c af 3d | e0 4f 7d d8 1e 86 d7 ac 96 7e 36 e6 1e 20 3d 6a | 91 0f b8 c5 68 62 9b 7a 5c 1e b4 57 88 ac 53 77 | e1 de dd ef 41 8c d3 d4 57 c9 16 9b e4 e9 05 4c | 74 12 06 2b a5 93 e5 02 33 46 72 d8 88 42 05 bd | 29 00 00 24 90 c9 d4 3c 5f 0b 25 0f f1 bc 52 9a | c3 5c 4d d3 31 89 58 99 a1 8a 08 b0 ed 9a e3 4f | 90 7f 17 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 cd b6 d8 9c a0 ac 4f 4b ba 38 63 | e9 a9 a0 ba 13 a5 50 1a 00 00 00 1c 00 00 40 05 | 2f e0 72 4a 02 ff fa 8e 97 a9 39 d6 93 d4 2c 35 | dd 9e 83 2a | libevent_free: release ptr-libevent@0x7fb358009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | #22 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 94 21 58 38 c3 f9 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #22 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #22 | rejected packet: | fb 94 21 58 38 c3 f9 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #22: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0829 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469defe0 | handling event EVENT_RETRANSMIT for parent state #17 | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #17 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #17 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49603.241494; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00185 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #17 | libevent_malloc: new ptr-libevent@0x7fb358009640 size 128 "road-eastnet-nonat-17" #17: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #17) | 95 d9 df c6 2f 4d 0c 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 5e 55 de a7 df 8c 8d ec f1 a6 b3 e1 a3 c9 2d | 5c 34 98 9a bf 18 3c 5f 5f 84 6f cc 00 89 2f b6 | 2e 0d 8a f0 e8 8a 33 b9 9f e3 4d bb 6f 5d 7f 7f | 55 e8 00 b1 58 6d 0f 17 37 b6 dc aa e5 63 e1 98 | c3 81 a6 04 b7 5c e1 a6 b2 29 9c 5a 0a 92 22 a4 | dd 4c 33 c2 4e 6f 90 29 c5 be 39 30 e7 2e 62 6c | 05 d7 89 8e 0f da b5 53 da 3f 31 31 12 b0 4c a7 | e6 a2 e9 57 ae d6 ea 04 d8 8b 73 ef 0e 9c 95 4e | 4b da 65 9c ef 6c 55 46 7d 0a 54 0c 93 37 db 94 | 63 8b a7 e9 ec 58 ed b4 f2 15 0c b0 9d 7b 2c 0d | 1e e8 20 04 e7 f0 90 d5 81 ce 8a 1d d9 30 60 b1 | c6 44 b1 01 fa 02 ef 06 8d 26 a1 09 a3 ce f8 2b | cd fc 0a 07 b0 8e b6 9d e8 6f 0c f0 b6 d6 40 9f | 58 4b a3 1f 87 35 a9 b2 45 93 43 35 38 68 86 6f | ea 62 4d 90 7e b9 e7 0c 07 f5 2a d5 71 68 12 96 | 09 17 2e 55 3e a1 6c 35 b5 20 1e 2a bf 27 6e 02 | 29 00 00 24 bf 2e 79 82 7e c6 1a 66 e2 b9 4b 2e | f8 c7 dc 78 b4 81 b9 5d 2e e5 4c 2c 27 2c b6 31 | c3 63 bf d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 f5 2d 98 10 e8 c0 4d c4 df 42 b6 | b0 c6 0b 95 91 b6 b4 67 00 00 00 1c 00 00 40 05 | 6f dc f7 24 ac 26 1a a6 48 cc ee 5d 39 06 66 40 | 4c d6 6b fc | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469defe0 | #17 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 d9 df c6 2f 4d 0c 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #17 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #17 | rejected packet: | 95 d9 df c6 2f 4d 0c 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #17: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-29" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-29' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #29 at 0x557d469fc550 | State DB: adding IKEv2 state #29 in UNDEFINED | pstats #29 ikev2.ike started | Message ID: init #29: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #29: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #29; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-29" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-29" IKE SA #29 "road-eastnet-nonat-29" "road-eastnet-nonat-29" #29: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-29 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-29": constructed local IKE proposals for road-eastnet-nonat-29 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 29 for state #29 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469f4be0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #29 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 | #29 spent 0.14 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-29" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.225 milliseconds in whack | crypto helper 6 resuming | crypto helper 6 starting work-order 29 for state #29 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 29 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 29 time elapsed 0.000982 seconds | (#29) spent 0.979 milliseconds in crypto helper computing work-order 29: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 29 for state #29 to event queue | scheduling resume sending helper answer for #29 | libevent_malloc: new ptr-libevent@0x7fb36c00cf80 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #29 | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 29 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #29 | **emit ISAKMP Message: | initiator cookie: | 76 94 35 7f f9 86 66 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-29 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d4 c8 26 94 c9 ea 16 54 c7 a0 a7 ee 80 e9 d2 eb | ikev2 g^x c7 74 3d 70 a6 ce 1b 7f 47 b8 a9 22 6c e9 de 3e | ikev2 g^x 5e 1a da 80 d6 29 b5 60 85 8e c7 9a 07 14 0f 2e | ikev2 g^x 5e 85 13 8e 17 81 27 ae b9 44 36 2c 21 79 b7 4c | ikev2 g^x 9f fe 6e 8f 50 03 81 71 96 dc 7d 13 e0 2d e5 55 | ikev2 g^x 9d 35 cf 6e 26 2f 6c 88 8f fc 20 a1 7f b4 44 e0 | ikev2 g^x 98 88 95 7e ed 39 2c 67 fe ec 38 89 03 76 30 8b | ikev2 g^x 31 e8 7f 06 73 93 d0 0a 0d a2 5e e7 17 d8 ae 0f | ikev2 g^x 27 a8 77 dc e5 16 a6 b2 26 c7 b0 e5 80 71 68 10 | ikev2 g^x 38 5e 32 59 c0 68 b7 75 a8 13 99 bb ca 95 f9 78 | ikev2 g^x 1f 9b 7b 46 65 6b 90 b3 9b cd ca 91 c9 75 7e 4d | ikev2 g^x 2e 06 ee 10 f0 8c c2 89 1e c3 a8 05 28 9a e8 eb | ikev2 g^x 20 63 32 0f f1 3f 82 9c 83 27 56 48 7d 7c a9 e7 | ikev2 g^x f5 1b db 86 e5 b7 2b 70 8a da ea 00 2d 06 e8 11 | ikev2 g^x 3c 90 f7 22 75 39 1f c5 87 f2 55 24 18 21 90 81 | ikev2 g^x 04 ec 8f 65 74 d4 59 92 bb 69 88 b7 6d 42 21 28 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 36 a8 1f b0 73 93 1f c8 b8 98 90 7a af 61 a7 3e | IKEv2 nonce 69 e8 46 34 d6 9e 89 22 1f 07 54 41 cf b8 14 4d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 76 94 35 7f f9 86 66 ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1d | natd_hash: port= 01 f4 | natd_hash: hash= eb 3a eb 7a 38 98 4c b3 ed b5 e4 e8 5b 3d 4d 17 | natd_hash: hash= 15 a4 85 ff | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data eb 3a eb 7a 38 98 4c b3 ed b5 e4 e8 5b 3d 4d 17 | Notify data 15 a4 85 ff | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 76 94 35 7f f9 86 66 ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c1 f9 34 11 26 e0 6f d6 1d 57 cb be 7c d0 71 cf | natd_hash: hash= 3a bd fc a1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c1 f9 34 11 26 e0 6f d6 1d 57 cb be 7c d0 71 cf | Notify data 3a bd fc a1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #29 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #29: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #29 to 4294967295 after switching state | Message ID: IKE #29 skipping update_recv as MD is fake | Message ID: sent #29 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-29" #29: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.29:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #29) | 76 94 35 7f f9 86 66 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 c8 26 94 c9 ea 16 54 c7 a0 a7 ee 80 e9 d2 eb | c7 74 3d 70 a6 ce 1b 7f 47 b8 a9 22 6c e9 de 3e | 5e 1a da 80 d6 29 b5 60 85 8e c7 9a 07 14 0f 2e | 5e 85 13 8e 17 81 27 ae b9 44 36 2c 21 79 b7 4c | 9f fe 6e 8f 50 03 81 71 96 dc 7d 13 e0 2d e5 55 | 9d 35 cf 6e 26 2f 6c 88 8f fc 20 a1 7f b4 44 e0 | 98 88 95 7e ed 39 2c 67 fe ec 38 89 03 76 30 8b | 31 e8 7f 06 73 93 d0 0a 0d a2 5e e7 17 d8 ae 0f | 27 a8 77 dc e5 16 a6 b2 26 c7 b0 e5 80 71 68 10 | 38 5e 32 59 c0 68 b7 75 a8 13 99 bb ca 95 f9 78 | 1f 9b 7b 46 65 6b 90 b3 9b cd ca 91 c9 75 7e 4d | 2e 06 ee 10 f0 8c c2 89 1e c3 a8 05 28 9a e8 eb | 20 63 32 0f f1 3f 82 9c 83 27 56 48 7d 7c a9 e7 | f5 1b db 86 e5 b7 2b 70 8a da ea 00 2d 06 e8 11 | 3c 90 f7 22 75 39 1f c5 87 f2 55 24 18 21 90 81 | 04 ec 8f 65 74 d4 59 92 bb 69 88 b7 6d 42 21 28 | 29 00 00 24 36 a8 1f b0 73 93 1f c8 b8 98 90 7a | af 61 a7 3e 69 e8 46 34 d6 9e 89 22 1f 07 54 41 | cf b8 14 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 3a eb 7a 38 98 4c b3 ed b5 e4 e8 | 5b 3d 4d 17 15 a4 85 ff 00 00 00 1c 00 00 40 05 | c1 f9 34 11 26 e0 6f d6 1d 57 cb be 7c d0 71 cf | 3a bd fc a1 | state #29 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469f4be0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469defe0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #29 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 | #29 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49603.293136 | resume sending helper answer for #29 suppresed complete_v2_state_transition() and stole MD | #29 spent 0.594 milliseconds in resume sending helper answer | stop processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c00cf80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 94 35 7f f9 86 66 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #29 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #29 | rejected packet: | 76 94 35 7f f9 86 66 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #29: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0543 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #23 | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #23 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #23 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49603.318343; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500139 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ef4e0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #23 | libevent_malloc: new ptr-libevent@0x7fb36c00cf80 size 128 "road-eastnet-nonat-23" #23: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #23) | 11 64 2b cc 79 62 5e 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 73 2b eb f6 ef a5 89 1a 84 5f 77 86 97 95 f5 | 41 68 46 e7 c2 3a 4b 96 08 d9 dc ac 0c dd 5f 9b | 9c 2f fb 55 35 f0 7e cd 72 e1 cc 2d 6a fa 78 20 | 87 1a 7a 27 9f 9e c1 5d d5 9e 2c a0 07 0d 68 be | 9e e9 e9 2b 00 f9 05 41 09 d8 c4 31 fa 61 72 87 | 90 51 a0 68 b9 49 7c 1e 75 38 ea 5f 98 5e c2 d2 | 66 ca 13 be 66 2b cf da 9f 87 38 b0 7e a9 5b 2c | b6 4d 89 7d 77 c1 b9 97 25 e9 f9 03 6e 50 c9 f0 | 4a 7a ea 26 c5 82 77 fd 51 df 29 99 2b 7c 16 40 | 15 23 9e b1 86 5f 7e 14 de 76 c4 15 a3 9d c9 b4 | 9c 1b 90 c7 1e 57 7f 74 e2 ad 9a 3c 48 8f 70 44 | 85 18 d4 03 39 40 d0 15 5b 33 89 0a c2 cc bd 37 | e0 4e e5 f2 46 4f 47 44 cf d8 ce b3 b6 34 38 c5 | 35 57 26 ef 2d db be d0 db df 2a 42 e2 e1 8f 1d | 48 dc 28 b8 9a 19 2e b1 d2 17 f5 9d a6 50 4d 1a | 18 88 cf 51 7a 98 9f 7a 85 1b 6d 6e b4 28 52 31 | 29 00 00 24 7b 3d c1 32 8e 45 e7 94 6a 53 a8 c9 | d4 42 3b 62 4a d5 d1 ca c0 9b 8b 0f 34 82 fe 78 | 98 28 d2 99 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 90 87 c3 2a f9 31 e3 ce f5 bd a0 4a | 02 f7 6c fe 1a b5 f1 41 00 00 00 1c 00 00 40 05 | a7 5c 60 43 7b 55 16 31 7f 2f 25 27 9c df 44 42 | dd 9f 1f 73 | libevent_free: release ptr-libevent@0x7fb35c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #23 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 64 2b cc 79 62 5e 8e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #23 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #23 | rejected packet: | 11 64 2b cc 79 62 5e 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #23: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #9 | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #9 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #9 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49603.327676; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.010374 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #9 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 "road-eastnet-nonat-9" #9: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #9) | 42 d4 37 7c 6c a2 32 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b e7 ee 8b 3f 67 fc 59 f9 cf cd 11 31 95 6f 6f | 1a 68 46 c3 76 29 7e 71 e4 25 40 18 dc 88 c2 53 | ee 88 a1 08 66 15 f3 28 c2 cb 4a e2 b5 75 33 59 | 55 79 a1 88 5f 78 4f 18 38 8e ae 5c 13 15 13 df | ba 4a 47 c9 50 41 88 b6 f1 7a 74 8c 60 ff 93 b2 | 20 68 e4 46 db 20 8c 30 74 ea 04 10 5a 30 ea 94 | 23 ad e3 f6 b8 fd ef 4b 90 8b 27 14 bc c0 83 ef | 74 2c ab 49 65 76 af 73 fb 43 7c f1 ae d1 dd 3f | cd c7 7b 68 fb f4 41 39 5c 57 ef 8f 92 ea 9a 47 | 45 2a 1a ac 29 88 a1 89 ea a8 1a 7b a4 32 e3 9e | 8d f2 ad cb d1 f4 4e b8 a3 dd 79 49 05 1f 03 30 | 8a 93 8b ac 8f aa 22 b8 9b 89 24 78 34 56 75 f6 | e9 af c1 e4 36 df ba ca 6c 64 ef d5 97 79 d5 33 | 78 61 be 8d 16 b6 42 4a 4c 79 ee 04 84 ce 68 09 | e7 e6 62 4d 5a 49 5e d0 0c 5b 80 69 ff fd 56 0f | 18 1b 5a c8 54 c8 76 c4 ef 5e 74 08 bd 6d 13 c8 | 29 00 00 24 56 5b 42 39 e6 4b 00 04 2e 83 3d 83 | 1e c8 b4 ab 97 9b 33 06 82 c0 a9 36 06 ea b4 2d | 23 5d c5 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 a8 01 3e 09 4e 61 7c 63 45 b6 fc | 6b 13 a6 83 ef 8b fa 92 00 00 00 1c 00 00 40 05 | 4f 50 e4 89 50 50 84 2d e7 09 2b 9f ac 1d 9b 91 | c6 7c af 4c | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #9 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 d4 37 7c 6c a2 32 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #9 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #9 | rejected packet: | 42 d4 37 7c 6c a2 32 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #9: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0669 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e05a0 | handling event EVENT_RETRANSMIT for parent state #18 | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #18 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #18 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49603.331039; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001872 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #18 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 "road-eastnet-nonat-18" #18: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #18) | fb 32 f3 fa 98 61 11 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 1b 0e e3 36 19 71 f2 00 c4 a6 18 1e bb 4a b9 | 3f d0 79 e4 4c 35 e5 1e 56 1e d1 56 df b2 32 fa | cb c3 c2 d3 4a 94 0b 28 4c 8e ed f1 14 00 ce ed | b6 d4 73 ac db 94 04 97 4d da 90 7f 61 f0 d2 4f | 60 04 42 6d 98 5c e4 05 d2 7d 05 4f 2d 99 94 a5 | 24 07 67 86 b6 21 b9 09 3a ea 16 cd cc b4 37 10 | 72 43 f6 be 6d 76 63 9b 24 f5 23 e6 b1 48 bc f9 | f2 cf d4 72 32 75 ee 93 a2 3d a2 fc 4d 35 5b 06 | 2a 31 6e 66 38 b7 b9 5b ce 6b 7a 5c 24 6c c6 91 | 21 f8 32 cc e1 e9 56 aa 56 2c 50 74 9d 0e c3 9c | b6 78 ee 5d a7 11 af c5 d5 50 6d b5 f0 a5 9d 4e | 3f d5 dc b9 6a 00 2b e1 dd 5f 8a e9 31 c5 30 8b | ee 43 f2 79 32 71 d6 e9 6e 27 23 22 2e 49 e0 0f | a1 32 43 40 65 d3 35 9f 97 aa f2 5c 61 69 29 93 | 3e f9 84 1e 9a f8 ea a4 2a 81 be 45 2f 6a 95 39 | a8 bb 2b 71 c2 45 83 fa e9 8d 63 1f 25 98 d1 4c | 29 00 00 24 64 09 7d 4a c3 95 64 a7 f6 f8 ca 35 | d6 3a 22 ea 52 84 43 22 db d2 95 2f 1d 96 44 f9 | 61 f7 89 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 f9 c7 a2 f7 e0 10 e9 b6 c5 14 f2 | 0e d4 f3 ff 41 9a 2e 34 00 00 00 1c 00 00 40 05 | be 8c d9 50 c4 e0 70 2a 58 15 0e 32 3f df db 0d | 01 81 6c d8 | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e05a0 | #18 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 32 f3 fa 98 61 11 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #18 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #18 | rejected packet: | fb 32 f3 fa 98 61 11 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #18: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-30" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-30' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #30 at 0x557d469fdb10 | State DB: adding IKEv2 state #30 in UNDEFINED | pstats #30 ikev2.ike started | Message ID: init #30: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #30: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #30; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-30" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-30" IKE SA #30 "road-eastnet-nonat-30" "road-eastnet-nonat-30" #30: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-30 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-30": constructed local IKE proposals for road-eastnet-nonat-30 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 30 for state #30 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469f7760 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #30 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 | #30 spent 0.115 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-30" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.191 milliseconds in whack | crypto helper 11 resuming | crypto helper 11 starting work-order 30 for state #30 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 30 | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 30 time elapsed 0.000724 seconds | (#30) spent 0.732 milliseconds in crypto helper computing work-order 30: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 30 for state #30 to event queue | scheduling resume sending helper answer for #30 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #30 | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 30 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #30 | **emit ISAKMP Message: | initiator cookie: | eb 37 b2 e3 45 e6 a7 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-30 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 14 f4 3b 23 14 59 57 11 85 13 a2 12 2b b5 a3 ff | ikev2 g^x 27 d1 a6 d6 83 ba ed 6e 70 90 a1 d6 22 c0 f4 dc | ikev2 g^x 88 16 36 cb d1 72 72 bc de f4 41 0b 1b 89 09 42 | ikev2 g^x b9 3c f8 7c e9 f8 b9 9e 79 49 a8 2b 7f 1d 06 99 | ikev2 g^x c2 4a dd e8 2d e9 b4 cd ab 59 b3 cd 90 a2 ae 3c | ikev2 g^x dc 2b a8 89 42 be 2f 72 3b d2 e2 27 b4 65 50 d4 | ikev2 g^x 35 50 bc 83 c6 85 ec 49 08 26 e7 a9 0e b6 5e a5 | ikev2 g^x 85 8b 68 21 3e 90 ff 7d 8a b3 a3 ab 4e 47 64 32 | ikev2 g^x 27 11 da 90 e5 4b bc e9 16 11 6a bf 15 7e 85 08 | ikev2 g^x 28 9b e3 ef 08 8b 63 b8 f5 43 71 2f 4c 67 78 41 | ikev2 g^x b8 23 b8 9c 92 66 99 57 0d 3e 91 c2 06 23 98 e8 | ikev2 g^x 6d 98 00 38 76 9f e2 83 8a e1 b7 3f 0f fe 0a 46 | ikev2 g^x d4 29 95 ea ed 7c f2 88 a6 07 6b 92 26 ac 08 4f | ikev2 g^x 2f b2 56 84 37 68 ea c9 79 62 e3 b0 e5 14 a4 c8 | ikev2 g^x 94 04 78 6c 13 14 ae b3 aa ac 60 8d 12 46 30 65 | ikev2 g^x 4d f6 8a 38 3e 83 8d 9b ed 94 87 9f 15 c1 ab 90 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3c c6 27 c6 e1 5b ef ef 28 05 b6 9a 73 ea 46 41 | IKEv2 nonce c6 a4 e3 b1 86 51 d2 31 50 73 0b 09 13 5f 9d 62 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= eb 37 b2 e3 45 e6 a7 e7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1e | natd_hash: port= 01 f4 | natd_hash: hash= 15 2d bd fb cd 00 1b 4b be 47 ff 4c 9b 30 9e df | natd_hash: hash= 04 ed 35 e5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 15 2d bd fb cd 00 1b 4b be 47 ff 4c 9b 30 9e df | Notify data 04 ed 35 e5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= eb 37 b2 e3 45 e6 a7 e7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f4 eb 1d 0f f6 3b e7 d6 54 0e 88 15 bd 63 45 57 | natd_hash: hash= 71 e8 c0 52 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f4 eb 1d 0f f6 3b e7 d6 54 0e 88 15 bd 63 45 57 | Notify data 71 e8 c0 52 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #30 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #30: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #30 to 4294967295 after switching state | Message ID: IKE #30 skipping update_recv as MD is fake | Message ID: sent #30 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-30" #30: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.30:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #30) | eb 37 b2 e3 45 e6 a7 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 14 f4 3b 23 14 59 57 11 85 13 a2 12 2b b5 a3 ff | 27 d1 a6 d6 83 ba ed 6e 70 90 a1 d6 22 c0 f4 dc | 88 16 36 cb d1 72 72 bc de f4 41 0b 1b 89 09 42 | b9 3c f8 7c e9 f8 b9 9e 79 49 a8 2b 7f 1d 06 99 | c2 4a dd e8 2d e9 b4 cd ab 59 b3 cd 90 a2 ae 3c | dc 2b a8 89 42 be 2f 72 3b d2 e2 27 b4 65 50 d4 | 35 50 bc 83 c6 85 ec 49 08 26 e7 a9 0e b6 5e a5 | 85 8b 68 21 3e 90 ff 7d 8a b3 a3 ab 4e 47 64 32 | 27 11 da 90 e5 4b bc e9 16 11 6a bf 15 7e 85 08 | 28 9b e3 ef 08 8b 63 b8 f5 43 71 2f 4c 67 78 41 | b8 23 b8 9c 92 66 99 57 0d 3e 91 c2 06 23 98 e8 | 6d 98 00 38 76 9f e2 83 8a e1 b7 3f 0f fe 0a 46 | d4 29 95 ea ed 7c f2 88 a6 07 6b 92 26 ac 08 4f | 2f b2 56 84 37 68 ea c9 79 62 e3 b0 e5 14 a4 c8 | 94 04 78 6c 13 14 ae b3 aa ac 60 8d 12 46 30 65 | 4d f6 8a 38 3e 83 8d 9b ed 94 87 9f 15 c1 ab 90 | 29 00 00 24 3c c6 27 c6 e1 5b ef ef 28 05 b6 9a | 73 ea 46 41 c6 a4 e3 b1 86 51 d2 31 50 73 0b 09 | 13 5f 9d 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 2d bd fb cd 00 1b 4b be 47 ff 4c | 9b 30 9e df 04 ed 35 e5 00 00 00 1c 00 00 40 05 | f4 eb 1d 0f f6 3b e7 d6 54 0e 88 15 bd 63 45 57 | 71 e8 c0 52 | state #30 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469f7760 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e05a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #30 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 | #30 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49603.376369 | resume sending helper answer for #30 suppresed complete_v2_state_transition() and stole MD | #30 spent 0.481 milliseconds in resume sending helper answer | stop processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36000cf80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 37 b2 e3 45 e6 a7 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #30 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #30 | rejected packet: | eb 37 b2 e3 45 e6 a7 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #30: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0594 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46906b40 | handling event EVENT_RETRANSMIT for parent state #10 | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #10 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #10 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49603.431831; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.015008 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f4be0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #10 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 "road-eastnet-nonat-10" #10: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #10) | 6b e4 01 c3 ed 3e ed 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2b 6a 85 96 38 f3 d3 4e 55 03 ae f3 d4 0f ad 38 | 83 2b 8b 92 04 a5 95 20 97 dc f8 34 30 38 91 0d | b9 c4 11 ab e9 a9 94 d4 16 5b f1 c4 91 68 3e fa | fb b4 36 73 13 7d c7 d0 75 c4 f9 ef fd 92 5b cc | aa e4 77 57 96 44 12 f0 38 b5 1d ad 33 4d 65 c3 | 93 63 ce 14 d7 d8 25 ef f8 0d ae dd 78 dc 8e b7 | 7e c2 3d a5 d5 d3 09 2b ad 9d bd a9 6f 55 df a1 | 6f b4 2e cf 9f fe 7e ae 25 58 a2 81 78 bb f7 29 | dd 53 e8 91 13 65 1e 1e 60 9c d0 15 9f bb 76 ed | ab 75 ce 2a 44 05 fa b1 a3 a7 39 d0 53 b7 7f 4f | e0 b7 8f a6 98 8c 07 ab a8 32 37 42 0c 8c 3d a7 | fc 6c 53 ac 60 2a 04 67 31 66 47 13 4f bc 34 8c | 30 51 26 7c 6a 36 76 70 15 29 7e 23 fc ac 0e 32 | 57 5c bb d9 b8 c0 27 61 5e fd 8f bc 73 83 16 ba | bf 42 32 51 56 3e 21 8b 6d 4a af 80 6d 52 1f d5 | 84 cd 2e ff dc c3 b8 a0 b2 26 7e 0c b7 e0 d0 d6 | 29 00 00 24 23 a8 6c e8 37 a1 47 09 f8 10 83 5c | 3f e5 80 de e6 d0 ee 9e 1f f2 6d 6a 1a c1 8c be | 9a 4a a5 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 14 ac ca 29 d0 75 c4 40 2c aa 37 | f4 15 d0 3b ed 2d a9 e1 00 00 00 1c 00 00 40 05 | 85 e0 a4 b5 9f 75 13 0f 6d a9 52 94 7d fa 0b 2d | 65 f2 06 03 | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46906b40 | #10 spent 0.18 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #24 | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #24 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #24 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49603.432062; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.507403 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46906b40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #24 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 "road-eastnet-nonat-24" #24: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #24) | a6 6a cf 12 4f 5d 80 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 64 6b 6f 54 02 19 88 ba 7c 08 ae f0 e8 ac 9d | c2 ca d4 17 41 fd 62 15 e6 80 a2 22 8c 15 09 a2 | e7 a1 72 ea 0a df 45 b3 25 d6 2f ad 4b 53 6c aa | 40 78 bc 47 40 56 b3 31 58 04 4d 38 c6 d0 b5 d8 | 7f 6f a2 f1 93 94 05 6c d0 31 6f f5 91 da 3d ba | e0 df 58 d8 a7 5c 43 d6 dc 3f 84 1b 95 82 7b 74 | 0c 41 0a 55 c5 c4 26 cf be bc a7 fe 25 56 32 c1 | 74 4d 01 af d9 1d ba 5f df c3 24 6e 66 7d 9c 22 | 84 1a 96 19 75 ab 7b e5 8d 21 ff f9 0c c5 57 de | 08 b9 a5 25 49 54 61 98 e2 43 6f b1 cb e2 3e 2a | f8 2c b2 cc ec bc 5e 41 c3 a9 95 de 3e ae 27 18 | 0c 51 55 28 d4 52 b5 1c e5 35 a1 75 a4 31 5a 74 | 09 2d 83 0a f9 22 55 04 79 c9 7a 03 c4 3f b9 27 | 7d 94 7e 25 32 de fa 8a ba c3 f8 47 1a 89 e0 04 | 1c 2a 74 59 3a 33 c6 78 c9 39 62 b5 5b 83 e0 ec | 74 d5 64 ba c0 ee 33 ea 4f ca fc f0 da aa dc 97 | 29 00 00 24 86 65 98 51 47 8e f6 4b 35 71 6a af | 55 7d 2d 69 5a 9e 6d 36 94 f6 45 50 b1 44 a3 6d | d2 78 d3 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 db bf 4d aa d7 35 0a 3b ec 97 e0 | 4c d5 57 e3 dd 13 4a e5 00 00 00 1c 00 00 40 05 | c7 67 96 20 f6 5f 6f 16 76 12 96 1c 43 e0 40 0f | 0e 23 33 02 | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #24 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b e4 01 c3 ed 3e ed 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #10 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #10 | rejected packet: | 6b e4 01 c3 ed 3e ed 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #10: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0745 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 6a cf 12 4f 5d 80 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #24 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #24 | rejected packet: | a6 6a cf 12 4f 5d 80 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #24: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #19 | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #19 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #19 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49603.450446; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002807 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #19 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 "road-eastnet-nonat-19" #19: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #19) | 71 b7 8f 2a c9 ab 65 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 3e b3 71 5b 2a 7e 67 38 d7 ab 7a d2 03 90 2c | 27 b7 e6 d5 a7 20 27 79 5e 88 db 2d 02 14 e6 05 | 6f 07 f4 c1 2b 42 e9 2b 16 c7 24 00 68 97 23 09 | 9b 28 53 ba dc 36 46 57 40 1e 29 01 4a b7 49 a8 | 4d 9b c0 f6 6d 6c 59 7a d3 fe f7 05 02 d7 dc 3f | 33 37 fa 6e 66 82 3b 0b fc 41 01 e0 cf 12 33 b2 | a1 18 77 fd c8 36 dd ad 0b 8f 44 4a dc 2c 38 79 | 30 fa d4 bf 2a 29 27 db 37 30 a3 c6 e5 0f b5 2b | 3c 20 72 b8 f7 83 6c 1c 84 55 8f f3 1f 64 ae 19 | e5 47 9f 5e eb 0a e5 2c 75 55 6a e2 43 09 5c e9 | 24 9c 73 ae e6 a6 e7 07 f6 fe ad 11 3d af ab 94 | 47 55 a2 0e c7 5d 4b 0e 42 8f 1e 08 35 c6 12 3b | 76 58 3a e5 1d 69 62 62 bc c4 a4 b5 cb 6c d9 c9 | 2b 81 e2 3b e9 c6 13 78 c3 3f f3 38 91 f3 11 a1 | 04 e8 fa 3f 9f e8 f9 3d 60 98 07 62 99 3c 36 86 | 40 55 c7 f1 5a 42 4d 99 21 5e 58 f5 e4 8a cb d6 | 29 00 00 24 d1 01 c3 e5 0a d4 10 8b f6 20 25 e6 | de b5 f4 be cf de 7f f4 c1 d3 ec a5 70 52 4e 33 | 0b 30 f5 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 74 af f0 20 10 33 a5 14 d9 51 67 | 36 d9 37 b0 71 8d 2c dc 00 00 00 1c 00 00 40 05 | 0e 08 6a ae a9 27 97 90 41 13 4d a4 49 51 01 50 | a2 07 2e 34 | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #19 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 b7 8f 2a c9 ab 65 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #19 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #19 | rejected packet: | 71 b7 8f 2a c9 ab 65 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #19: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-31" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-31' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #31 at 0x557d469ff0d0 | State DB: adding IKEv2 state #31 in UNDEFINED | pstats #31 ikev2.ike started | Message ID: init #31: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #31: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #31; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-31" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-31" IKE SA #31 "road-eastnet-nonat-31" "road-eastnet-nonat-31" #31: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-31 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-31": constructed local IKE proposals for road-eastnet-nonat-31 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 31 for state #31 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #31 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 | #31 spent 0.143 milliseconds in ikev2_parent_outI1() | crypto helper 16 resuming | crypto helper 16 starting work-order 31 for state #31 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 31 | RESET processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-31" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.239 milliseconds in whack | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 31 time elapsed 0.000903 seconds | (#31) spent 0.909 milliseconds in crypto helper computing work-order 31: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 31 for state #31 to event queue | scheduling resume sending helper answer for #31 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #31 | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 31 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #31 | **emit ISAKMP Message: | initiator cookie: | d5 d5 f7 7f 23 0d 4b 11 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-31 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a5 d8 4b a5 f9 d4 3a a9 51 97 2e 27 d1 cc 90 15 | ikev2 g^x e2 e2 8d 96 07 4d fd 40 9f 4f 7f 6f 35 0e 23 bc | ikev2 g^x 4a 6a 76 f9 9f 83 b0 54 30 ee b6 fc 0a 45 0c 73 | ikev2 g^x 2d e9 2a b2 ca 81 a2 ff 50 db 13 29 75 7d e9 7e | ikev2 g^x a9 33 06 c4 32 68 94 61 41 2b 8d f1 ff df 69 cc | ikev2 g^x e8 c4 b4 6d ef bc 3d c5 49 cc a7 2a fc 4c 98 e2 | ikev2 g^x 30 43 57 19 e1 0a 22 00 d7 07 6f aa ba 35 b2 14 | ikev2 g^x 36 27 5e 66 b6 08 a0 40 46 47 86 94 6d 23 bf ed | ikev2 g^x 9b 86 94 95 7d 7c df ed 26 58 08 d9 19 18 cf 17 | ikev2 g^x d2 31 cb 23 b8 00 65 a0 2d c7 80 be d9 c6 2d 9b | ikev2 g^x 2d 24 dd 1f 09 8c cb bd 5d a9 d7 7b 30 d7 87 68 | ikev2 g^x f3 c0 0e 20 8d c3 3f 32 80 d9 ab 29 26 00 09 ea | ikev2 g^x b0 b4 2f 7d 8f fc 22 1d 7c 39 80 08 04 22 2a 49 | ikev2 g^x f4 26 0e 59 4e ac 0e 0e 46 93 3b ba 87 01 a8 59 | ikev2 g^x ea 18 2f 09 70 d0 fb 69 f1 4a 19 c7 fd d5 be f0 | ikev2 g^x ff bb d7 7c ef dd e5 ed c9 a4 0a b6 e1 11 1b ed | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6a 1e b5 3b 00 37 08 50 6d 81 0e e2 cf 1b 46 47 | IKEv2 nonce 4b 2b 09 3d 6e 9a 95 9d 52 78 61 ae d4 0d 66 80 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d5 d5 f7 7f 23 0d 4b 11 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1f | natd_hash: port= 01 f4 | natd_hash: hash= 15 91 23 cd ed e8 35 56 6f f7 85 4c 49 64 a9 75 | natd_hash: hash= 0a 07 1b 5f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 15 91 23 cd ed e8 35 56 6f f7 85 4c 49 64 a9 75 | Notify data 0a 07 1b 5f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d5 d5 f7 7f 23 0d 4b 11 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a3 62 6c f7 52 92 b8 35 33 98 a9 6b 00 6d db 28 | natd_hash: hash= 96 bc 0a b6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a3 62 6c f7 52 92 b8 35 33 98 a9 6b 00 6d db 28 | Notify data 96 bc 0a b6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #31 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #31: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #31 to 4294967295 after switching state | Message ID: IKE #31 skipping update_recv as MD is fake | Message ID: sent #31 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-31" #31: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.31:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #31) | d5 d5 f7 7f 23 0d 4b 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 d8 4b a5 f9 d4 3a a9 51 97 2e 27 d1 cc 90 15 | e2 e2 8d 96 07 4d fd 40 9f 4f 7f 6f 35 0e 23 bc | 4a 6a 76 f9 9f 83 b0 54 30 ee b6 fc 0a 45 0c 73 | 2d e9 2a b2 ca 81 a2 ff 50 db 13 29 75 7d e9 7e | a9 33 06 c4 32 68 94 61 41 2b 8d f1 ff df 69 cc | e8 c4 b4 6d ef bc 3d c5 49 cc a7 2a fc 4c 98 e2 | 30 43 57 19 e1 0a 22 00 d7 07 6f aa ba 35 b2 14 | 36 27 5e 66 b6 08 a0 40 46 47 86 94 6d 23 bf ed | 9b 86 94 95 7d 7c df ed 26 58 08 d9 19 18 cf 17 | d2 31 cb 23 b8 00 65 a0 2d c7 80 be d9 c6 2d 9b | 2d 24 dd 1f 09 8c cb bd 5d a9 d7 7b 30 d7 87 68 | f3 c0 0e 20 8d c3 3f 32 80 d9 ab 29 26 00 09 ea | b0 b4 2f 7d 8f fc 22 1d 7c 39 80 08 04 22 2a 49 | f4 26 0e 59 4e ac 0e 0e 46 93 3b ba 87 01 a8 59 | ea 18 2f 09 70 d0 fb 69 f1 4a 19 c7 fd d5 be f0 | ff bb d7 7c ef dd e5 ed c9 a4 0a b6 e1 11 1b ed | 29 00 00 24 6a 1e b5 3b 00 37 08 50 6d 81 0e e2 | cf 1b 46 47 4b 2b 09 3d 6e 9a 95 9d 52 78 61 ae | d4 0d 66 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 91 23 cd ed e8 35 56 6f f7 85 4c | 49 64 a9 75 0a 07 1b 5f 00 00 00 1c 00 00 40 05 | a3 62 6c f7 52 92 b8 35 33 98 a9 6b 00 6d db 28 | 96 bc 0a b6 | state #31 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #31 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 | #31 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49603.469234 | resume sending helper answer for #31 suppresed complete_v2_state_transition() and stole MD | #31 spent 0.505 milliseconds in resume sending helper answer | stop processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x557d469d92d0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 d5 f7 7f 23 0d 4b 11 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #31 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #31 | rejected packet: | d5 d5 f7 7f 23 0d 4b 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #31: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0713 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #25 | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #25 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #25 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49603.521462; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500583 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f7760 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #25 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 "road-eastnet-nonat-25" #25: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #25) | 78 5e ec 19 c3 e9 2e 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 3a 20 04 5c a3 28 e0 27 26 70 8b 2f d3 d3 dd | 4a ad b8 1e 2e 37 87 d2 d3 a8 c4 9d c6 ee 0f a0 | 73 84 05 06 74 d6 4d 07 19 2b 12 8b 69 7a 83 b9 | 89 8c 88 b4 63 15 c8 b2 2d cc 49 7a 79 d1 07 bf | ee 4e b7 0b 0d 2d 3d 97 a7 24 aa 10 a0 e9 fc 77 | 06 e9 cd 21 f9 64 fc 4a 83 9d 5e f3 a2 9b 32 c3 | d3 50 6b 09 58 29 c8 67 c4 22 3b 38 ef 52 9f dd | 6e 41 e8 16 88 89 59 a6 9f 8d 30 13 4e 6f 06 5b | 1b 0e 62 f8 90 29 6e c8 e5 89 28 a2 ea ec 59 64 | 67 71 02 aa 61 49 46 0f fe 0a d1 4d 62 20 44 13 | 22 6b 41 1e 83 c0 52 5c 04 b5 86 ac e3 c4 87 52 | 79 53 63 6b c1 fd a7 16 e1 a2 b6 27 78 fe 10 69 | 79 cb f1 75 47 7f aa 61 41 c8 00 01 b4 6e 89 cf | 41 c5 e9 e7 92 08 38 fd 15 78 0a 2b 93 44 c9 ca | b1 70 2a 2b ec 91 fe 70 63 59 89 8e 57 c3 33 c3 | 54 24 a1 21 c8 2a c0 85 b2 60 de 71 38 dc 7c 22 | 29 00 00 24 e1 d5 1d 82 b2 16 85 fd 33 85 77 2b | fc 68 12 4a cf f8 6e 1b 7e ab 43 df ab 9a a1 84 | be 92 7e 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a 8e 47 d6 ba 1e 42 85 a7 7b 2f db | 65 2a 1e ef d5 42 ee 43 00 00 00 1c 00 00 40 05 | 5d 12 0d 5e 92 91 ee 2b 6d 12 02 e9 64 25 a1 22 | eb b7 d7 ed | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #25 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 5e ec 19 c3 e9 2e 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #25 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #25 | rejected packet: | 78 5e ec 19 c3 e9 2e 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #25: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0647 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #20 | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #20 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #20 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49603.534811; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001954 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #20 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 "road-eastnet-nonat-20" #20: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #20) | 2a d8 6a 5c 08 dc 68 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad 76 8b c3 8a cd 7e 81 09 43 af dc 84 86 57 86 | ac 01 81 74 96 d6 08 70 58 d2 f7 10 2a f2 1e 9d | b0 95 95 b3 32 1e e8 01 5c d2 e7 39 14 67 2f fd | 6f cc fb 0b 1d bd c7 ac 37 fb c6 6d e0 84 f8 c8 | 00 c1 d6 0f 3b e2 a7 4b 51 a3 13 bb 3d f4 c2 99 | 9b 84 74 df c2 bf fa 13 e4 2a f9 e8 2d 4c 6c c5 | 8d e3 52 85 e9 f8 18 fc 4b 38 b9 82 e0 ab 65 b7 | ae a5 89 3c 88 ee 05 34 a9 d7 52 0c 03 2e a9 7e | e2 c7 7b c9 35 8f e6 9e 0b 55 49 71 ce bd 37 1f | 22 8f 48 76 19 75 9b c0 7a 62 4e 51 77 02 d7 bf | e0 ea 0a 67 41 41 2e 98 4f f3 cf 32 f2 ae 82 83 | 1f 56 7c 33 17 50 fa 76 01 41 f1 ba 05 90 db bd | 83 b9 cd 1b b8 6e f3 33 72 7e 47 f3 20 71 8f e7 | ec 91 f3 37 6a 94 11 a2 55 f0 09 1c 76 98 cd 56 | 66 be 33 43 a6 1c f5 8b 31 c4 e3 0a 7b 29 cc 17 | 3f 13 b8 73 4c 86 e0 b0 2a 03 32 6a 19 82 cb a2 | 29 00 00 24 47 97 3a 6f 12 05 22 fe fb dc 3c 25 | ff 91 0d 7a c8 4c ac f8 1f 7e d1 5f 41 39 e3 39 | e8 aa 43 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f 67 98 f7 05 c6 ee 5e 5b 5f e2 fa | ee a5 ba af 57 96 46 d2 00 00 00 1c 00 00 40 05 | 3e ef c3 bb 3d a5 88 fb 9f 3c 53 fd 3b c9 ea 45 | 6f 53 bd 02 | libevent_free: release ptr-libevent@0x7fb37c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | #20 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a d8 6a 5c 08 dc 68 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #20 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #20 | rejected packet: | 2a d8 6a 5c 08 dc 68 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #20: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0741 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-32" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-32' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #32 at 0x557d46a00690 | State DB: adding IKEv2 state #32 in UNDEFINED | pstats #32 ikev2.ike started | Message ID: init #32: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #32: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #32; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-32" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-32" IKE SA #32 "road-eastnet-nonat-32" "road-eastnet-nonat-32" #32: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-32 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-32": constructed local IKE proposals for road-eastnet-nonat-32 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 32 for state #32 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb354005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #32 | libevent_malloc: new ptr-libevent@0x7fb37c00cf80 size 128 | #32 spent 0.154 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-32" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.249 milliseconds in whack | crypto helper 4 resuming | crypto helper 4 starting work-order 32 for state #32 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 32 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 32 time elapsed 0.001357 seconds | (#32) spent 0.988 milliseconds in crypto helper computing work-order 32: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 32 for state #32 to event queue | scheduling resume sending helper answer for #32 | libevent_malloc: new ptr-libevent@0x7fb35800cf80 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #32 | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 32 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #32 | **emit ISAKMP Message: | initiator cookie: | 91 2f 9d 69 76 5d 8a 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-32 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4a 54 17 4f f3 31 b1 0f c2 14 96 a0 49 f3 c5 20 | ikev2 g^x 38 78 7d e5 0a d8 95 bc 7a a9 a2 f1 ff ab 0d 66 | ikev2 g^x a2 fe 53 90 8e fe 51 43 04 57 01 9c e7 22 ca 9e | ikev2 g^x 98 aa 3b 0d 0d 5f ee 9d 1e 59 e6 04 c4 7f 07 84 | ikev2 g^x f1 a5 dc 31 6f fa b4 db 4a d9 1c 93 5d b0 7e 5d | ikev2 g^x 37 79 07 ab 3e 5c a3 de d6 8b a4 ac df 4b a7 7c | ikev2 g^x af 6f 03 fd 31 bd 7d c1 34 31 76 57 00 e4 23 e1 | ikev2 g^x 82 cb b8 38 12 59 cd 21 e3 0e 67 54 27 e1 6e 8f | ikev2 g^x 1e a1 dd 84 f8 ca 82 2a 39 9d 17 56 58 46 a3 3b | ikev2 g^x 7b 5d 3a 21 a2 b3 03 79 c6 bd 25 cc df a0 12 67 | ikev2 g^x b3 f4 5a c2 b0 73 2d 33 df 1c dc fa 26 25 56 72 | ikev2 g^x 59 7b 3c f0 d8 e2 d9 b0 57 2e 4a 8e ec 96 92 09 | ikev2 g^x 75 70 f6 57 59 ce 54 70 90 14 41 34 b1 57 0f 5d | ikev2 g^x 19 dd 8a a1 77 43 7e cf 1c ef 3e 0b 72 1e cc f4 | ikev2 g^x 78 66 2f 15 74 e8 33 6b d3 89 bb a9 fb bc fa 46 | ikev2 g^x 95 b5 88 f8 a3 91 1f 3a b1 92 bc 1e 84 a5 5b 07 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2d 29 95 26 bc 23 fe d9 76 bb c2 d5 43 41 98 03 | IKEv2 nonce bf c6 eb 4a b9 6e a6 4e f6 f7 82 f1 09 94 9d 31 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 91 2f 9d 69 76 5d 8a 45 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 20 | natd_hash: port= 01 f4 | natd_hash: hash= f4 13 8b 5d 25 b5 3b 06 af a0 3f ac be 9b 92 09 | natd_hash: hash= 9d c4 50 7f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f4 13 8b 5d 25 b5 3b 06 af a0 3f ac be 9b 92 09 | Notify data 9d c4 50 7f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 91 2f 9d 69 76 5d 8a 45 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ef 32 45 23 d7 6a b0 96 66 7f 58 39 f6 19 a5 1f | natd_hash: hash= 4b 49 56 02 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ef 32 45 23 d7 6a b0 96 66 7f 58 39 f6 19 a5 1f | Notify data 4b 49 56 02 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #32 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #32: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #32 to 4294967295 after switching state | Message ID: IKE #32 skipping update_recv as MD is fake | Message ID: sent #32 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-32" #32: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.32:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #32) | 91 2f 9d 69 76 5d 8a 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 54 17 4f f3 31 b1 0f c2 14 96 a0 49 f3 c5 20 | 38 78 7d e5 0a d8 95 bc 7a a9 a2 f1 ff ab 0d 66 | a2 fe 53 90 8e fe 51 43 04 57 01 9c e7 22 ca 9e | 98 aa 3b 0d 0d 5f ee 9d 1e 59 e6 04 c4 7f 07 84 | f1 a5 dc 31 6f fa b4 db 4a d9 1c 93 5d b0 7e 5d | 37 79 07 ab 3e 5c a3 de d6 8b a4 ac df 4b a7 7c | af 6f 03 fd 31 bd 7d c1 34 31 76 57 00 e4 23 e1 | 82 cb b8 38 12 59 cd 21 e3 0e 67 54 27 e1 6e 8f | 1e a1 dd 84 f8 ca 82 2a 39 9d 17 56 58 46 a3 3b | 7b 5d 3a 21 a2 b3 03 79 c6 bd 25 cc df a0 12 67 | b3 f4 5a c2 b0 73 2d 33 df 1c dc fa 26 25 56 72 | 59 7b 3c f0 d8 e2 d9 b0 57 2e 4a 8e ec 96 92 09 | 75 70 f6 57 59 ce 54 70 90 14 41 34 b1 57 0f 5d | 19 dd 8a a1 77 43 7e cf 1c ef 3e 0b 72 1e cc f4 | 78 66 2f 15 74 e8 33 6b d3 89 bb a9 fb bc fa 46 | 95 b5 88 f8 a3 91 1f 3a b1 92 bc 1e 84 a5 5b 07 | 29 00 00 24 2d 29 95 26 bc 23 fe d9 76 bb c2 d5 | 43 41 98 03 bf c6 eb 4a b9 6e a6 4e f6 f7 82 f1 | 09 94 9d 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 13 8b 5d 25 b5 3b 06 af a0 3f ac | be 9b 92 09 9d c4 50 7f 00 00 00 1c 00 00 40 05 | ef 32 45 23 d7 6a b0 96 66 7f 58 39 f6 19 a5 1f | 4b 49 56 02 | state #32 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c00cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb354005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #32 | libevent_malloc: new ptr-libevent@0x7fb37c00cf80 size 128 | #32 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49603.543816 | resume sending helper answer for #32 suppresed complete_v2_state_transition() and stole MD | #32 spent 0.486 milliseconds in resume sending helper answer | stop processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35800cf80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 2f 9d 69 76 5d 8a 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #32 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #32 | rejected packet: | 91 2f 9d 69 76 5d 8a 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #32: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338005860 | handling event EVENT_RETRANSMIT for parent state #11 | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #11 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #11 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49603.558023; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.017484 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fd070 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #11 | libevent_malloc: new ptr-libevent@0x7fb35800cf80 size 128 "road-eastnet-nonat-11" #11: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #11) | c8 da f8 5c 6a b5 39 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 9a 4c 70 8e 88 d1 64 8d ca 55 b5 43 ac 3e 50 | 7f 03 c2 7c 99 61 59 48 6a 23 b9 2d d3 3a 08 ba | 31 66 90 b0 52 32 93 73 23 bd 35 f2 7d dc a9 8f | 88 4e 43 5d 55 55 8f 7b a2 ea ce 35 e9 07 bb 71 | 1f 5d f0 9c c9 20 a4 7c c9 a5 33 c5 b0 c5 fd 99 | f9 36 f9 d6 da 33 fa e1 2d e1 b8 55 01 35 5b d0 | b9 e1 af af a6 38 ef b1 36 65 8c 44 00 8a 8f f0 | cb 31 ec d5 89 23 22 d8 6f 57 3d 9d af 74 08 ea | 86 b5 7c 8c 76 9b 8d 04 5b 27 f9 7a 8d ed d8 36 | 77 1c 37 9a 9e c6 40 9c bb 1e 24 77 dc 4c b2 dc | 76 0c 2f 2d 23 9c f1 63 a5 64 8f c0 7e 6e 08 97 | 35 1b 8e 35 d5 a9 e6 fc d1 af 35 f0 b0 21 d4 42 | 5d 1b 4e c6 75 04 f0 3a f4 cc 11 09 3f ff 2d c6 | bf fa 44 99 e7 46 de 13 f5 47 98 02 47 dd 33 15 | 52 36 1a 46 d4 d8 ce dd 1a ad eb 4f 6b 1d 9e 82 | 8f b0 52 7f b0 b6 aa 8b 85 c1 d8 ed 73 6b 09 85 | 29 00 00 24 71 b3 70 95 41 f1 8a 3d 3f e8 5d 7c | 6b 52 d9 59 47 90 bd 2c 17 95 9e 28 b0 5d 83 17 | df a2 84 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 c8 ac c9 12 67 90 a0 d8 a9 94 84 | cc d4 e1 68 d0 49 e5 0f 00 00 00 1c 00 00 40 05 | a0 0d 8b f9 78 72 8b b9 69 a6 ab 0f 8f 46 28 db | d3 de 3a b5 | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338005860 | #11 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 da f8 5c 6a b5 39 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #11 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #11 | rejected packet: | c8 da f8 5c 6a b5 39 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #11: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #26 | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #26 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #26 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49603.599398; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500246 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #26 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-26" #26: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #26) | f4 88 08 87 51 21 ca bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af d0 7b 56 fd 83 24 e2 7f 6d 07 5b 14 cf 37 08 | c2 df a1 e8 d0 3d d9 70 11 a2 f7 87 78 ef 74 57 | 42 80 b9 d0 66 00 01 7b 09 5e 7e 2a 26 27 6c f8 | 72 db 2f 73 3f 38 89 07 c7 29 09 0b 07 35 1d d7 | 5c 45 0c 9e 1b e1 95 53 4a ee ac 68 bd 09 aa 3d | 27 0f 50 02 03 b3 ad ea c4 c7 28 b1 bc b2 70 07 | fc b6 58 d4 ed 1b fe 1b 64 8b 86 a1 fe fc 72 d9 | f1 ba a9 eb 7d ce cd 2c b8 6e 00 33 4c be dd dd | 3d 98 b2 2e 58 56 f2 f2 80 02 eb 21 ee 6b bd 96 | 40 1f 33 62 77 0f c1 a2 eb f8 19 6e 1a 5e 18 e2 | c2 89 f7 17 30 91 11 29 f1 9d 22 c7 c8 11 a1 d6 | b3 ae 73 01 db d3 1a d2 95 3f af b3 66 e8 e4 3f | 7f 26 bd b3 f0 37 10 0c fa cc 87 cc 8d 67 d1 69 | 87 60 66 13 b3 cf ae b5 94 11 93 f7 71 af 4a e8 | 96 fa e6 46 bb bb 17 b4 9c 44 80 04 e3 4c ce 52 | 44 6c a3 c2 a0 6e 82 a5 21 5c cc c5 65 7c 81 dc | 29 00 00 24 8a 04 a2 be b1 ba fb 75 a9 90 e3 4a | e4 71 c4 43 1c fe 30 e6 85 0e 15 7e 50 52 02 a7 | d2 a1 ae dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 32 7f b1 02 26 47 ea b2 9e 1c ce | 0f f8 7e 1c 87 59 f3 12 00 00 00 1c 00 00 40 05 | f0 af 8c 45 09 60 6e 14 7f 54 da 7f 84 35 07 83 | 60 40 27 0a | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #26 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 88 08 87 51 21 ca bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #26 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #26 | rejected packet: | f4 88 08 87 51 21 ca bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #26: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-33" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-33' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #33 at 0x557d46a01c50 | State DB: adding IKEv2 state #33 in UNDEFINED | pstats #33 ikev2.ike started | Message ID: init #33: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #33: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #33; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-33" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-33" IKE SA #33 "road-eastnet-nonat-33" "road-eastnet-nonat-33" #33: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-33 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-33": constructed local IKE proposals for road-eastnet-nonat-33 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 33 for state #33 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb360005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #33 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 | crypto helper 13 resuming | #33 spent 0.159 milliseconds in ikev2_parent_outI1() | crypto helper 13 starting work-order 33 for state #33 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 33 | RESET processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-33" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.26 milliseconds in whack | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 33 time elapsed 0.001 seconds | (#33) spent 0.998 milliseconds in crypto helper computing work-order 33: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 33 for state #33 to event queue | scheduling resume sending helper answer for #33 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #33 | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 33 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #33 | **emit ISAKMP Message: | initiator cookie: | c7 46 be 2e 5d 25 78 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-33 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c3 fb 56 35 bc 7c 07 73 43 c0 53 96 f8 9b 69 93 | ikev2 g^x 49 fe be 57 af 79 18 68 5a 92 2b 2b a6 ed e4 23 | ikev2 g^x 35 6b 49 80 b0 8c 38 3d c5 a9 f4 61 c1 8b 08 4d | ikev2 g^x 96 53 f0 d9 1b 6c 56 bc 0d ea 97 5b b0 d7 0d 16 | ikev2 g^x 49 88 40 6d 71 9e 2d 30 fe 42 42 37 20 10 14 5c | ikev2 g^x 75 38 c4 da 71 b3 b1 3b a6 23 58 dc a3 9a e0 40 | ikev2 g^x ae dc 8e cf de 76 e6 55 4e 33 19 fe 18 08 f5 70 | ikev2 g^x 8e 50 6f 64 32 2f d6 7a 45 39 d0 ba 32 a4 1e ab | ikev2 g^x 2d 4d 83 e7 1f d4 28 47 30 da f7 2e a0 79 9c 09 | ikev2 g^x 2b 6b 46 2e c8 c1 e5 37 84 54 0b 0c 97 40 ae db | ikev2 g^x 52 08 f5 e5 d5 a9 49 2a c9 b8 1f f6 14 c7 78 d5 | ikev2 g^x 70 93 cb 5e 8c 96 b6 ac 74 c2 85 cf 89 ad 75 5d | ikev2 g^x fe 0b 68 86 21 96 4e 79 63 5a 81 98 b3 45 c5 f0 | ikev2 g^x b2 fd 49 e2 ff b2 a3 2c 96 3c ba 10 d8 3f 86 56 | ikev2 g^x e0 c6 d2 d5 d7 7d 5f 52 2a 95 0f 65 04 12 82 60 | ikev2 g^x e3 5b 42 b7 a8 9e 92 b0 fa 34 79 45 e1 34 ab c5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b8 c6 4b 62 72 20 c9 09 07 72 44 d0 79 00 e2 dc | IKEv2 nonce 8f 6b 83 e9 3d 67 2f d3 a6 5d 27 77 58 61 12 c6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c7 46 be 2e 5d 25 78 37 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 21 | natd_hash: port= 01 f4 | natd_hash: hash= 35 b6 d4 e5 76 6f b7 90 e8 c3 ad b3 49 49 44 7a | natd_hash: hash= b5 13 9b a6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 35 b6 d4 e5 76 6f b7 90 e8 c3 ad b3 49 49 44 7a | Notify data b5 13 9b a6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c7 46 be 2e 5d 25 78 37 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 15 0a 54 d9 c3 ee ba ab b9 96 60 bb a3 40 4e fb | natd_hash: hash= d5 1b 34 be | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 15 0a 54 d9 c3 ee ba ab b9 96 60 bb a3 40 4e fb | Notify data d5 1b 34 be | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #33 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #33: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #33 to 4294967295 after switching state | Message ID: IKE #33 skipping update_recv as MD is fake | Message ID: sent #33 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-33" #33: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.33:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #33) | c7 46 be 2e 5d 25 78 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 fb 56 35 bc 7c 07 73 43 c0 53 96 f8 9b 69 93 | 49 fe be 57 af 79 18 68 5a 92 2b 2b a6 ed e4 23 | 35 6b 49 80 b0 8c 38 3d c5 a9 f4 61 c1 8b 08 4d | 96 53 f0 d9 1b 6c 56 bc 0d ea 97 5b b0 d7 0d 16 | 49 88 40 6d 71 9e 2d 30 fe 42 42 37 20 10 14 5c | 75 38 c4 da 71 b3 b1 3b a6 23 58 dc a3 9a e0 40 | ae dc 8e cf de 76 e6 55 4e 33 19 fe 18 08 f5 70 | 8e 50 6f 64 32 2f d6 7a 45 39 d0 ba 32 a4 1e ab | 2d 4d 83 e7 1f d4 28 47 30 da f7 2e a0 79 9c 09 | 2b 6b 46 2e c8 c1 e5 37 84 54 0b 0c 97 40 ae db | 52 08 f5 e5 d5 a9 49 2a c9 b8 1f f6 14 c7 78 d5 | 70 93 cb 5e 8c 96 b6 ac 74 c2 85 cf 89 ad 75 5d | fe 0b 68 86 21 96 4e 79 63 5a 81 98 b3 45 c5 f0 | b2 fd 49 e2 ff b2 a3 2c 96 3c ba 10 d8 3f 86 56 | e0 c6 d2 d5 d7 7d 5f 52 2a 95 0f 65 04 12 82 60 | e3 5b 42 b7 a8 9e 92 b0 fa 34 79 45 e1 34 ab c5 | 29 00 00 24 b8 c6 4b 62 72 20 c9 09 07 72 44 d0 | 79 00 e2 dc 8f 6b 83 e9 3d 67 2f d3 a6 5d 27 77 | 58 61 12 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 b6 d4 e5 76 6f b7 90 e8 c3 ad b3 | 49 49 44 7a b5 13 9b a6 00 00 00 1c 00 00 40 05 | 15 0a 54 d9 c3 ee ba ab b9 96 60 bb a3 40 4e fb | d5 1b 34 be | state #33 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb360005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #33 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 | #33 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49603.611441 | resume sending helper answer for #33 suppresed complete_v2_state_transition() and stole MD | #33 spent 0.347 milliseconds in resume sending helper answer | stop processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c00cf80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 46 be 2e 5d 25 78 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #33 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #33 | rejected packet: | c7 46 be 2e 5d 25 78 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #33: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #21 | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #21 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #21 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49603.646628; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002427 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fa300 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #21 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 "road-eastnet-nonat-21" #21: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #21) | c1 e2 95 19 0d 6d aa c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 62 b7 cc 73 d3 9f c3 8b a1 e4 26 f8 ce 22 33 | 92 13 78 50 86 db 45 6a 88 c0 09 ba 4c 3a ed 8d | 07 a9 f3 c5 90 2e 12 14 58 94 56 71 46 c0 41 ae | 27 c0 08 e3 c4 02 5d ee 64 22 79 77 74 67 02 97 | 15 c4 99 75 53 da b8 d8 73 7b 03 dd 0e 63 e5 c8 | 2f a1 74 7d 1c 73 5d e6 89 77 c2 84 53 e8 81 35 | 14 8c 80 35 a3 ae 1e 09 89 8b c1 64 7d fd 4f 89 | 8f b7 6b da 51 0c c4 21 04 59 18 7c 8d 33 1a 85 | 98 29 76 e4 22 ac 91 00 31 d3 90 f1 d2 f4 f2 9a | 20 a3 6d 51 7b 67 e4 d8 4d 7c 9a fb 7c 63 7f d7 | c7 25 20 29 d5 e0 63 b5 f2 a7 5f d2 ec 98 84 3a | cb 95 85 f5 af 28 8d c4 5a 27 b6 9c 15 cc dd ed | f7 9f 6c d0 d0 af 5b 13 f0 d8 0f 7e 40 99 08 7d | 42 b3 e6 b5 93 1f 1e e1 85 38 e6 f0 e2 af 01 7d | 4f a1 b9 ef 5c 3f 42 c4 c2 ef e5 bc 70 ba 8e 68 | 71 82 c2 53 b9 56 35 3d c9 38 89 b6 a0 89 2b f3 | 29 00 00 24 b6 59 e5 4e ee 3f fd 49 7f 16 f6 82 | 11 23 a0 41 4a 5a b9 59 7b 13 06 de 98 79 ac e0 | 67 18 f7 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 70 4a 79 4b fb 19 31 c0 36 bc 71 | 8e f3 57 13 5a bf 33 aa 00 00 00 1c 00 00 40 05 | 04 fc 29 44 06 78 d7 26 30 ef ba 81 66 98 ec 1d | 35 84 86 e1 | libevent_free: release ptr-libevent@0x7fb348009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #21 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c1 e2 95 19 0d 6d aa c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #21 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #21 | rejected packet: | c1 e2 95 19 0d 6d aa c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #21: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0591 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #12 | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #12 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #12 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49603.661929; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.008726 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #12 | libevent_malloc: new ptr-libevent@0x7fb348009640 size 128 "road-eastnet-nonat-12" #12: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #12) | e6 90 0f 5b 12 9e fb 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 8d ca d0 bf fc d0 53 2f c8 94 c7 75 f0 b7 3b | 06 8d af 15 08 3d 4d 43 8a f2 0e 43 03 74 47 ab | c5 f6 5e c6 9d af 64 6c 5f 50 aa bb 63 91 17 7c | de 19 d6 a8 3d b9 0e 6f 98 77 91 78 cd c6 0f f1 | 83 bd 49 b7 4d 19 90 e6 2f f7 8d c2 99 5e 0c 41 | a4 92 59 8c f3 bc 56 51 55 c4 fc 8d 06 b4 b2 46 | fe 62 b5 0f 4e f1 c7 d9 31 4c e1 f7 06 2d 45 f5 | a0 d5 f5 94 55 0e 2f 00 35 d8 fb d6 3c 6a b6 b5 | 4d 93 6e 6b 9b 52 5b 1c 59 3e d0 a9 2b 70 a2 ec | b5 2f 18 f2 51 cd 4a e5 eb b3 21 70 eb 17 7e fb | 54 5e a1 de 02 46 1e 7f ed c7 44 7e dc 6d 9e 84 | 08 46 48 8f 2c 45 f3 c2 00 ca b5 46 fd 56 d4 bf | b0 41 68 33 e0 2a 67 86 f6 4d 18 8b 90 8d 3e 6b | c2 91 48 4f de cb 41 cd 2e 17 3b f1 b9 af ca 73 | 4b 2f d1 11 2b 7a 96 60 de b9 66 93 28 70 95 94 | 75 11 24 ea 0b a4 9a 4f 1b d9 88 31 b6 8a fe 22 | 29 00 00 24 52 e1 94 79 21 2a ea cc 69 4a af 5a | 5d ef 62 83 14 35 3b dc 33 a8 4c d8 5d ab 20 41 | 8b a5 be 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 aa 63 73 f1 76 ab f8 1b 79 46 f7 | 09 75 6d 3c 97 fc 7d df 00 00 00 1c 00 00 40 05 | db 6d 58 42 c9 d1 b0 49 17 a0 1e 30 4f f9 7e 58 | 72 29 56 37 | libevent_free: release ptr-libevent@0x7fb38800a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #12 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 90 0f 5b 12 9e fb 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #12 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #12 | rejected packet: | e6 90 0f 5b 12 9e fb 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #12: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0656 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #27 | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #27 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #27 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49603.664287; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500039 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #27 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 "road-eastnet-nonat-27" #27: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #27) | dd bb 9e aa 71 2c a8 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa f5 f3 8a 2e ca 64 13 4e ef 73 e4 1f 3e 67 ad | a1 5c bf b8 82 2d 98 4b ba 2f 4b 9c 4a 49 f6 7b | 11 53 66 d7 f2 df c6 4d 6c e8 fe ca eb 65 f7 23 | 79 97 e3 ea 55 ca fa 7d 0e 42 d8 5c 14 c7 91 72 | a4 fc cd 45 56 42 b0 30 e3 75 4e 16 78 7d 09 4f | c2 b4 68 6b 47 a2 0e 20 da b0 6a 41 7f ac 79 d0 | d4 2d 42 99 fd 0a 3a e2 6d 7f 90 e8 4d 1a 00 b2 | e9 9e 2f 5f 8c ef b1 f3 83 5d 30 13 95 c4 ca 84 | fc 5b f8 fd 99 e0 ef 1a ad a3 e3 11 fc de 8e cc | 62 ac 46 25 e8 4f ae 15 57 eb 6c c5 d8 d5 81 b9 | c0 5f a7 29 95 52 01 a8 27 41 88 9f 21 51 57 97 | 0e c0 5b 72 b9 1f 72 3e c5 18 84 95 8f 3a f7 5b | 8e ab cb da 5c d8 78 8b 6b d1 3d 62 f9 12 53 ba | 86 1f 8f 29 ce 9f 76 76 1e 5f 01 99 06 da 91 72 | f3 a9 41 c1 f1 95 87 95 cf 5a fe 09 57 13 44 9d | 62 a4 a9 60 fa 79 cc f9 5d bf f3 2b 5c 5b b4 99 | 29 00 00 24 55 62 09 8a 44 b4 a9 1d d9 35 9c 9a | 78 93 87 c8 d6 2b f2 b0 a8 b2 26 80 5e 03 70 47 | 73 8a 49 c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ef ee 96 1f 62 1c cd f0 a1 f5 67 ee | 76 d8 b6 28 a5 c0 9f 1d 00 00 00 1c 00 00 40 05 | 69 41 25 fb 01 9f 0c 01 9b e6 f4 5d 86 8e 8e d0 | 2b 2d f0 b6 | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #27 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd bb 9e aa 71 2c a8 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #27 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #27 | rejected packet: | dd bb 9e aa 71 2c a8 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #27: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-34" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-34' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #34 at 0x557d46a03210 | State DB: adding IKEv2 state #34 in UNDEFINED | pstats #34 ikev2.ike started | Message ID: init #34: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #34: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #34; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-34" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-34" IKE SA #34 "road-eastnet-nonat-34" "road-eastnet-nonat-34" #34: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-34 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-34": constructed local IKE proposals for road-eastnet-nonat-34 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 34 for state #34 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb370005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #34 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 | crypto helper 17 resuming | #34 spent 0.145 milliseconds in ikev2_parent_outI1() | crypto helper 17 starting work-order 34 for state #34 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 34 | RESET processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-34" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.252 milliseconds in whack | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 34 time elapsed 0.000982 seconds | (#34) spent 0.989 milliseconds in crypto helper computing work-order 34: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 34 for state #34 to event queue | scheduling resume sending helper answer for #34 | libevent_malloc: new ptr-libevent@0x7fb35000cf80 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #34 | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 34 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #34 | **emit ISAKMP Message: | initiator cookie: | 6d a4 8e 40 25 ac 37 c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-34 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b6 f2 a8 cc bb ec 52 8f ff d3 4f 1e 29 f8 d2 55 | ikev2 g^x ab 15 48 e3 86 d2 3c 7c c1 31 02 4c e6 92 88 7e | ikev2 g^x 1c 57 68 2c 31 6d 99 d6 04 b4 80 d9 9e 5d d6 2f | ikev2 g^x 5a 7c 33 74 f6 a2 f4 af 71 14 01 00 45 ac 02 2c | ikev2 g^x ae fd dc f0 fb 16 b1 b8 bb b1 c9 b6 79 4a 45 9c | ikev2 g^x f4 6e 30 a0 38 dd b1 84 0e 3d b2 47 58 b0 ed c1 | ikev2 g^x 2c 5c e6 69 11 9f 94 94 7a 6d 4e 80 2c 22 d1 2d | ikev2 g^x b1 3c 47 06 4d 81 ee b9 c9 ba 0f 94 7b ed d2 71 | ikev2 g^x 8c 4b 77 a2 43 7f 68 8c 2b 66 69 53 94 cf 5a 27 | ikev2 g^x 05 7e 88 ec 42 d8 31 27 ae 04 92 bf 4a 26 5e 51 | ikev2 g^x 58 d6 5c 7a 0b 0b 73 c1 d6 39 9b da c3 56 61 4e | ikev2 g^x 3f 7e 4e 21 30 a1 53 bd c0 b7 f9 c7 e1 cc 61 3a | ikev2 g^x e9 b4 0e 5d 6b 1a 6c d3 c1 42 80 a0 b9 ee e4 20 | ikev2 g^x 50 5f 0b 18 55 d4 17 9c be 51 af c3 be 4e 5f 48 | ikev2 g^x b1 02 bd 4d 0a 84 45 32 17 0f c9 bf 50 68 f3 a6 | ikev2 g^x 11 69 ef 13 ba a2 fb dd c4 95 c8 b3 71 8c 02 9e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 20 3c 42 13 ea f1 47 8b ab 88 6c 38 29 a2 e3 60 | IKEv2 nonce 5f 2e e8 36 7d 92 76 6d 48 1c fe a8 8c f2 3e 4d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6d a4 8e 40 25 ac 37 c3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 22 | natd_hash: port= 01 f4 | natd_hash: hash= 93 92 97 87 98 41 7a 2f 24 03 5c de 5f 9b fc ff | natd_hash: hash= 10 46 f5 79 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 93 92 97 87 98 41 7a 2f 24 03 5c de 5f 9b fc ff | Notify data 10 46 f5 79 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6d a4 8e 40 25 ac 37 c3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 10 63 6f 88 71 aa 1b 8a ba b8 d4 ac c9 e8 55 07 | natd_hash: hash= 6b c5 63 c0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 10 63 6f 88 71 aa 1b 8a ba b8 d4 ac c9 e8 55 07 | Notify data 6b c5 63 c0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #34 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #34: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #34 to 4294967295 after switching state | Message ID: IKE #34 skipping update_recv as MD is fake | Message ID: sent #34 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-34" #34: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.34:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #34) | 6d a4 8e 40 25 ac 37 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 f2 a8 cc bb ec 52 8f ff d3 4f 1e 29 f8 d2 55 | ab 15 48 e3 86 d2 3c 7c c1 31 02 4c e6 92 88 7e | 1c 57 68 2c 31 6d 99 d6 04 b4 80 d9 9e 5d d6 2f | 5a 7c 33 74 f6 a2 f4 af 71 14 01 00 45 ac 02 2c | ae fd dc f0 fb 16 b1 b8 bb b1 c9 b6 79 4a 45 9c | f4 6e 30 a0 38 dd b1 84 0e 3d b2 47 58 b0 ed c1 | 2c 5c e6 69 11 9f 94 94 7a 6d 4e 80 2c 22 d1 2d | b1 3c 47 06 4d 81 ee b9 c9 ba 0f 94 7b ed d2 71 | 8c 4b 77 a2 43 7f 68 8c 2b 66 69 53 94 cf 5a 27 | 05 7e 88 ec 42 d8 31 27 ae 04 92 bf 4a 26 5e 51 | 58 d6 5c 7a 0b 0b 73 c1 d6 39 9b da c3 56 61 4e | 3f 7e 4e 21 30 a1 53 bd c0 b7 f9 c7 e1 cc 61 3a | e9 b4 0e 5d 6b 1a 6c d3 c1 42 80 a0 b9 ee e4 20 | 50 5f 0b 18 55 d4 17 9c be 51 af c3 be 4e 5f 48 | b1 02 bd 4d 0a 84 45 32 17 0f c9 bf 50 68 f3 a6 | 11 69 ef 13 ba a2 fb dd c4 95 c8 b3 71 8c 02 9e | 29 00 00 24 20 3c 42 13 ea f1 47 8b ab 88 6c 38 | 29 a2 e3 60 5f 2e e8 36 7d 92 76 6d 48 1c fe a8 | 8c f2 3e 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 92 97 87 98 41 7a 2f 24 03 5c de | 5f 9b fc ff 10 46 f5 79 00 00 00 1c 00 00 40 05 | 10 63 6f 88 71 aa 1b 8a ba b8 d4 ac c9 e8 55 07 | 6b c5 63 c0 | state #34 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb370005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #34 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 | #34 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49603.674259 | resume sending helper answer for #34 suppresed complete_v2_state_transition() and stole MD | #34 spent 0.502 milliseconds in resume sending helper answer | stop processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35000cf80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d a4 8e 40 25 ac 37 c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #34 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #34 | rejected packet: | 6d a4 8e 40 25 ac 37 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #34: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #28 | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #28 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #28 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49603.728016; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50114 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f61a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #28 | libevent_malloc: new ptr-libevent@0x7fb35000cf80 size 128 "road-eastnet-nonat-28" #28: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #28) | 8a 4b 73 21 31 f2 6a 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 df aa e5 83 52 1a b7 2d d0 6a 7e dc d8 a5 d6 | 60 61 e0 83 0f 2b 6a 2b b8 0c 87 3f 14 f7 2a a4 | 98 70 c5 3a a2 0f 1f 46 6a b1 86 1e e5 5c 59 31 | 32 22 91 5d a2 6a 04 29 2b 10 13 47 0d 40 ca 72 | cd e0 cf f3 84 ed 4f bf 99 02 d6 fe 28 30 e6 6c | 0e 7e ca 11 f9 11 9f a6 4c d1 42 ed 4a 0f de 1b | d1 6c 18 cd c5 6b d0 23 4a e0 04 a7 c5 ef 74 ac | 27 c8 ec 0e 1f 0d 3c 8b a9 02 76 2a 67 8e fc de | 50 4d 80 13 28 3f 33 79 17 2e 6d b4 b5 19 8a 07 | 87 4a ec 6e c5 3c fb 34 d8 bf 04 77 90 53 b4 91 | 82 d0 d4 cb ca fc 05 22 43 e7 d4 8d 52 a6 ff 42 | 3e 8b bc 55 2d a6 ee 39 af 98 64 0e 18 a4 e9 08 | 5d d9 7e 8e 5f 00 df 4b 1b cc 49 d9 d0 64 64 c8 | 91 98 82 46 10 8e 0a 7c d6 f9 65 30 9e a6 47 1d | b8 47 35 3b c7 13 08 d5 39 45 15 b2 10 ce ee 48 | 7d d8 33 00 3c 55 6c 41 f3 1e 7b 0e 34 03 4f b7 | 29 00 00 24 ad 13 98 57 a2 9c 4e ec e1 0a 80 5c | a0 80 42 e1 ab 4f 47 32 a1 1d 36 58 8b 1c 71 8b | 25 4d b5 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 83 6c 60 48 f0 55 9f 8d d1 7e b1 | fd da e6 ac 8a a5 fd 2f 00 00 00 1c 00 00 40 05 | 4a 9c 1d b6 db 3c dd 9b 4a da 5d 6f ea e8 da 4e | 08 2e ae f5 | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #28 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 4b 73 21 31 f2 6a 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #28 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #28 | rejected packet: | 8a 4b 73 21 31 f2 6a 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #28: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0603 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e7260 | handling event EVENT_RETRANSMIT for parent state #22 | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #22 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #22 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49603.730355; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002403 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #22 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 "road-eastnet-nonat-22" #22: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #22) | fb 94 21 58 38 c3 f9 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 fa b9 d7 68 fd 72 8f 42 0c d5 a2 f7 f4 9b 8a | d7 23 52 ca 6c 52 76 c9 13 29 10 22 e6 ec 59 2c | a8 f2 aa 73 f8 3e 6b 2a a1 80 14 ff a7 56 48 4f | 3e 9b c4 33 e8 9f 3f e1 00 d1 2f db 56 9e da 18 | 67 a2 e0 d7 98 13 63 9f 28 d8 20 03 fc d6 f3 6a | 0b 8c 23 20 ba 26 3e 63 f5 df a1 d6 76 bf 7c f8 | 52 9b 7b e3 ba 8b f9 13 50 1b 61 13 1c 98 cb 7a | 18 f4 0d 9c 45 e0 10 ca 68 77 fa c0 54 76 19 a8 | f4 83 b0 e9 4d 71 3e a8 7b e6 82 90 01 66 8f f4 | 47 f6 ec 2f 3d 48 64 9c f2 b5 21 50 b5 a6 c1 a0 | 91 f5 21 c6 ec 6a bd 95 39 08 03 b0 29 f0 d4 a1 | f0 7d 39 2b f5 47 de 25 f6 c5 56 6c a0 9c af 3d | e0 4f 7d d8 1e 86 d7 ac 96 7e 36 e6 1e 20 3d 6a | 91 0f b8 c5 68 62 9b 7a 5c 1e b4 57 88 ac 53 77 | e1 de dd ef 41 8c d3 d4 57 c9 16 9b e4 e9 05 4c | 74 12 06 2b a5 93 e5 02 33 46 72 d8 88 42 05 bd | 29 00 00 24 90 c9 d4 3c 5f 0b 25 0f f1 bc 52 9a | c3 5c 4d d3 31 89 58 99 a1 8a 08 b0 ed 9a e3 4f | 90 7f 17 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 cd b6 d8 9c a0 ac 4f 4b ba 38 63 | e9 a9 a0 ba 13 a5 50 1a 00 00 00 1c 00 00 40 05 | 2f e0 72 4a 02 ff fa 8e 97 a9 39 d6 93 d4 2c 35 | dd 9e 83 2a | libevent_free: release ptr-libevent@0x7fb36800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e7260 | #22 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 94 21 58 38 c3 f9 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #22 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #22 | rejected packet: | fb 94 21 58 38 c3 f9 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #22: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-35" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-35' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #35 at 0x557d46a047d0 | State DB: adding IKEv2 state #35 in UNDEFINED | pstats #35 ikev2.ike started | Message ID: init #35: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #35: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #35; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-35" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-35" IKE SA #35 "road-eastnet-nonat-35" "road-eastnet-nonat-35" #35: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-35 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-35": constructed local IKE proposals for road-eastnet-nonat-35 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 35 for state #35 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469e7260 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #35 | libevent_malloc: new ptr-libevent@0x7fb36800cf80 size 128 | #35 spent 0.137 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 resuming | RESET processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-35" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 18 starting work-order 35 for state #35 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 35 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.244 milliseconds in whack | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 35 time elapsed 0.000971 seconds | (#35) spent 0.976 milliseconds in crypto helper computing work-order 35: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 35 for state #35 to event queue | scheduling resume sending helper answer for #35 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #35 | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 35 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #35 | **emit ISAKMP Message: | initiator cookie: | ef 15 ea 36 a5 a5 5c 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-35 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 52 96 b3 aa c0 4d d9 88 e5 ac e1 94 c5 3f 96 d9 | ikev2 g^x b4 11 6c 13 85 3c 47 49 a4 e7 6c bf 49 2c f7 e6 | ikev2 g^x 82 c1 3a 00 a1 f9 46 f7 54 13 9f 65 48 18 8b 9f | ikev2 g^x e6 da f8 f3 07 a0 ac 41 d5 a9 3b e6 a7 7c a3 81 | ikev2 g^x db 32 9e 99 47 70 04 b0 f4 2d a4 b0 a4 3b e1 28 | ikev2 g^x 9f 63 a2 94 b7 1f 9e 68 18 47 6f ef 05 c0 65 15 | ikev2 g^x cc 6b 7e 6d 5e e8 2a 06 87 47 6c aa e2 89 a2 b1 | ikev2 g^x 87 d5 9a c7 5c f6 c5 c9 ef 9a f5 1e 14 44 ed f6 | ikev2 g^x 21 c2 10 91 92 32 f4 48 3d 48 76 7f da 54 41 70 | ikev2 g^x 3a 27 f3 0e a6 36 ab ef 51 4a ee 27 f3 fa b5 4a | ikev2 g^x 81 80 97 f8 12 4a 6b 6e 11 f7 41 fe d5 56 ec af | ikev2 g^x 7e dc 33 c0 77 e2 37 b5 3f fc b0 40 58 cb 92 b6 | ikev2 g^x 44 3d 99 0d 17 ae 15 bb a7 c0 2c 1d dc 42 f0 67 | ikev2 g^x d6 5a 17 88 ce 32 f6 da 90 65 b7 17 83 70 da 67 | ikev2 g^x c5 33 42 42 d7 1a 6c 70 ed 40 df e9 ee 39 2a 8f | ikev2 g^x f5 b4 db 3f e7 42 51 2e 4d a9 fe 76 ba 09 20 58 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f0 8c e1 d2 ee 2f 9e 4d 17 8a 20 ca cf 55 95 6a | IKEv2 nonce 83 c3 98 8f db 61 db bb f1 69 5e b0 e6 61 e7 00 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ef 15 ea 36 a5 a5 5c 41 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 23 | natd_hash: port= 01 f4 | natd_hash: hash= e8 5c ea 28 17 8f c3 f5 57 90 ad 1e 3a ae c2 e5 | natd_hash: hash= e1 92 7b 3c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e8 5c ea 28 17 8f c3 f5 57 90 ad 1e 3a ae c2 e5 | Notify data e1 92 7b 3c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ef 15 ea 36 a5 a5 5c 41 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= cb 88 24 12 73 0e 41 cb fe 6b 7e d6 a5 c0 bb a2 | natd_hash: hash= e1 60 1e c0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cb 88 24 12 73 0e 41 cb fe 6b 7e d6 a5 c0 bb a2 | Notify data e1 60 1e c0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #35 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #35: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #35 to 4294967295 after switching state | Message ID: IKE #35 skipping update_recv as MD is fake | Message ID: sent #35 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-35" #35: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.35:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #35) | ef 15 ea 36 a5 a5 5c 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 96 b3 aa c0 4d d9 88 e5 ac e1 94 c5 3f 96 d9 | b4 11 6c 13 85 3c 47 49 a4 e7 6c bf 49 2c f7 e6 | 82 c1 3a 00 a1 f9 46 f7 54 13 9f 65 48 18 8b 9f | e6 da f8 f3 07 a0 ac 41 d5 a9 3b e6 a7 7c a3 81 | db 32 9e 99 47 70 04 b0 f4 2d a4 b0 a4 3b e1 28 | 9f 63 a2 94 b7 1f 9e 68 18 47 6f ef 05 c0 65 15 | cc 6b 7e 6d 5e e8 2a 06 87 47 6c aa e2 89 a2 b1 | 87 d5 9a c7 5c f6 c5 c9 ef 9a f5 1e 14 44 ed f6 | 21 c2 10 91 92 32 f4 48 3d 48 76 7f da 54 41 70 | 3a 27 f3 0e a6 36 ab ef 51 4a ee 27 f3 fa b5 4a | 81 80 97 f8 12 4a 6b 6e 11 f7 41 fe d5 56 ec af | 7e dc 33 c0 77 e2 37 b5 3f fc b0 40 58 cb 92 b6 | 44 3d 99 0d 17 ae 15 bb a7 c0 2c 1d dc 42 f0 67 | d6 5a 17 88 ce 32 f6 da 90 65 b7 17 83 70 da 67 | c5 33 42 42 d7 1a 6c 70 ed 40 df e9 ee 39 2a 8f | f5 b4 db 3f e7 42 51 2e 4d a9 fe 76 ba 09 20 58 | 29 00 00 24 f0 8c e1 d2 ee 2f 9e 4d 17 8a 20 ca | cf 55 95 6a 83 c3 98 8f db 61 db bb f1 69 5e b0 | e6 61 e7 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 5c ea 28 17 8f c3 f5 57 90 ad 1e | 3a ae c2 e5 e1 92 7b 3c 00 00 00 1c 00 00 40 05 | cb 88 24 12 73 0e 41 cb fe 6b 7e d6 a5 c0 bb a2 | e1 60 1e c0 | state #35 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36800cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469e7260 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #35 | libevent_malloc: new ptr-libevent@0x7fb36800cf80 size 128 | #35 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49603.739925 | resume sending helper answer for #35 suppresed complete_v2_state_transition() and stole MD | #35 spent 0.471 milliseconds in resume sending helper answer | stop processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35400cf80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 15 ea 36 a5 a5 5c 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #35 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #35 | rejected packet: | ef 15 ea 36 a5 a5 5c 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #35: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #13 | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #13 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #13 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49603.776114; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.013436 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a027b0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #13 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 "road-eastnet-nonat-13" #13: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #13) | 49 f7 1e 6a 42 26 33 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 71 af 86 f4 71 f9 bb e4 0d 2b 45 d7 29 39 05 | b7 87 ba 66 cb fb 2a f9 a1 bd 3d 61 b3 93 ac e4 | c3 99 b0 f5 02 62 ee dd 97 cd f6 04 fc 6c e4 91 | fc 5c 11 ba 5a 79 b1 78 a2 d0 e7 22 4a 47 b5 e0 | 1b 08 7f a6 c3 8e ce 71 40 0d 06 f3 62 f6 df f1 | 5d 7c 5b e2 d5 cd 0f 4d e6 c6 f8 d8 22 4f 95 11 | 69 b0 4c 7b c2 82 8e f9 ea f5 33 82 00 b3 c7 cc | c1 9e 50 02 8e 45 ef af 1a f9 8b 37 72 41 32 b8 | 47 f2 be df 3f 94 e4 a3 17 d5 55 32 fb 1f 2d d2 | 75 88 9c 98 42 60 51 41 31 79 19 3b ff ef b8 2a | 8e 39 2b ea 32 11 93 14 1c d3 9c 70 36 49 9b d1 | ea 38 9f 9a 6a 33 49 23 7d e2 c2 d5 b0 8d 83 b6 | ef a7 10 c8 a2 18 a7 4e 8b 07 bd 67 b5 96 c1 6a | d6 9d 73 c7 60 9d 60 25 5d 63 21 25 68 0e 24 b3 | 8f 19 40 42 2e 27 e9 30 d9 f9 1b 80 8f 2d ab dd | 1e f0 98 f5 b2 55 9b 6b 06 84 0f fe 26 32 f1 f7 | 29 00 00 24 dd b6 a9 bb fd 56 26 b2 23 d7 97 2f | 99 f7 92 2e ca d6 19 06 93 b1 8e 77 8d b7 a4 a3 | 73 9b 88 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 83 1c 22 e0 45 23 6f 5f d0 4f 89 | cf 59 8e 77 1e 0a 0b d7 00 00 00 1c 00 00 40 05 | e8 12 13 20 8d f1 d3 89 00 ae 66 0d fd eb 92 63 | f1 cf 85 56 | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #13 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 f7 1e 6a 42 26 33 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #13 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #13 | rejected packet: | 49 f7 1e 6a 42 26 33 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #13: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469defe0 | handling event EVENT_RETRANSMIT for parent state #29 | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #29 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #29 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49603.793418; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500282 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #29 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 "road-eastnet-nonat-29" #29: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #29) | 76 94 35 7f f9 86 66 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 c8 26 94 c9 ea 16 54 c7 a0 a7 ee 80 e9 d2 eb | c7 74 3d 70 a6 ce 1b 7f 47 b8 a9 22 6c e9 de 3e | 5e 1a da 80 d6 29 b5 60 85 8e c7 9a 07 14 0f 2e | 5e 85 13 8e 17 81 27 ae b9 44 36 2c 21 79 b7 4c | 9f fe 6e 8f 50 03 81 71 96 dc 7d 13 e0 2d e5 55 | 9d 35 cf 6e 26 2f 6c 88 8f fc 20 a1 7f b4 44 e0 | 98 88 95 7e ed 39 2c 67 fe ec 38 89 03 76 30 8b | 31 e8 7f 06 73 93 d0 0a 0d a2 5e e7 17 d8 ae 0f | 27 a8 77 dc e5 16 a6 b2 26 c7 b0 e5 80 71 68 10 | 38 5e 32 59 c0 68 b7 75 a8 13 99 bb ca 95 f9 78 | 1f 9b 7b 46 65 6b 90 b3 9b cd ca 91 c9 75 7e 4d | 2e 06 ee 10 f0 8c c2 89 1e c3 a8 05 28 9a e8 eb | 20 63 32 0f f1 3f 82 9c 83 27 56 48 7d 7c a9 e7 | f5 1b db 86 e5 b7 2b 70 8a da ea 00 2d 06 e8 11 | 3c 90 f7 22 75 39 1f c5 87 f2 55 24 18 21 90 81 | 04 ec 8f 65 74 d4 59 92 bb 69 88 b7 6d 42 21 28 | 29 00 00 24 36 a8 1f b0 73 93 1f c8 b8 98 90 7a | af 61 a7 3e 69 e8 46 34 d6 9e 89 22 1f 07 54 41 | cf b8 14 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 3a eb 7a 38 98 4c b3 ed b5 e4 e8 | 5b 3d 4d 17 15 a4 85 ff 00 00 00 1c 00 00 40 05 | c1 f9 34 11 26 e0 6f d6 1d 57 cb be 7c d0 71 cf | 3a bd fc a1 | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469defe0 | #29 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 94 35 7f f9 86 66 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #29 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #29 | rejected packet: | 76 94 35 7f f9 86 66 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #29: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-36" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-36' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #36 at 0x557d46a05d90 | State DB: adding IKEv2 state #36 in UNDEFINED | pstats #36 ikev2.ike started | Message ID: init #36: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #36: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #36; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-36" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-36" IKE SA #36 "road-eastnet-nonat-36" "road-eastnet-nonat-36" #36: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-36 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-36": constructed local IKE proposals for road-eastnet-nonat-36 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 36 for state #36 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469defe0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #36 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 | #36 spent 0.15 milliseconds in ikev2_parent_outI1() | crypto helper 7 resuming | crypto helper 7 starting work-order 36 for state #36 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 36 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-36" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.255 milliseconds in whack | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 36 time elapsed 0.000947 seconds | (#36) spent 0.906 milliseconds in crypto helper computing work-order 36: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 36 for state #36 to event queue | scheduling resume sending helper answer for #36 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #36 | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 36 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #36 | **emit ISAKMP Message: | initiator cookie: | c4 93 27 79 3b f0 36 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-36 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c4 44 1e 02 70 5f fd 14 41 57 b4 33 c5 4d c1 bf | ikev2 g^x 56 a3 d0 f5 4b 1b 15 73 5b 56 52 91 f2 4c 9d dc | ikev2 g^x 3f 2d 5a 36 27 be 97 1b 2d 43 21 16 b5 25 60 73 | ikev2 g^x 31 d7 04 cb ac b3 fd 19 61 2f 36 91 05 d7 55 8c | ikev2 g^x 92 5d 99 4b ae f6 cf a1 6e 2e de fa cb a4 7e 7e | ikev2 g^x b4 08 08 4f 90 51 13 b7 5b cb 7e 2c db 61 c5 d9 | ikev2 g^x d2 2f 86 cb df 97 d1 5e d4 95 3b c2 71 e2 2b bf | ikev2 g^x 7b e5 e9 8b bd 5c de 24 ac 5a 8b 4a 5d 3b ff 1e | ikev2 g^x f8 f4 2b 7b 96 0c 02 8f ac d9 62 f7 21 fb 07 5e | ikev2 g^x 9d 3f 41 15 d1 79 65 31 2a 68 5a 1a 56 fc 9c 2a | ikev2 g^x 20 90 63 93 fd d9 59 08 0d 3a 51 cc ee 1b ca 83 | ikev2 g^x 3c 5f 8f 03 9c cf 6f 04 52 23 a8 cb 50 43 72 18 | ikev2 g^x 78 cb 0f 8d bf 67 75 81 61 d9 91 a3 5f f5 1e ad | ikev2 g^x 09 8c 98 32 17 11 19 f3 54 f2 c6 36 e6 24 63 e2 | ikev2 g^x 41 b5 39 5c af a7 57 20 af 37 ac c1 12 94 ec 3a | ikev2 g^x e0 ac a7 07 42 78 d2 32 96 5c a0 ed 7e 90 04 46 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e4 05 e8 ad 6f 35 18 e8 9c ba 2a d7 ba f9 eb 8c | IKEv2 nonce c3 7b 43 88 9a 23 1f e0 cb de a0 8e 76 67 65 17 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c4 93 27 79 3b f0 36 cf | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 24 | natd_hash: port= 01 f4 | natd_hash: hash= ab a4 b2 11 db 45 90 fb 99 ab 4d 81 85 c6 e5 03 | natd_hash: hash= d5 18 31 7d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ab a4 b2 11 db 45 90 fb 99 ab 4d 81 85 c6 e5 03 | Notify data d5 18 31 7d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c4 93 27 79 3b f0 36 cf | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9e c9 75 d2 3b 5d 13 cd bd fe b5 96 1f 79 bf 21 | natd_hash: hash= fa a0 06 d7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9e c9 75 d2 3b 5d 13 cd bd fe b5 96 1f 79 bf 21 | Notify data fa a0 06 d7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #36 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #36: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #36 to 4294967295 after switching state | Message ID: IKE #36 skipping update_recv as MD is fake | Message ID: sent #36 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-36" #36: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.36:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #36) | c4 93 27 79 3b f0 36 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 44 1e 02 70 5f fd 14 41 57 b4 33 c5 4d c1 bf | 56 a3 d0 f5 4b 1b 15 73 5b 56 52 91 f2 4c 9d dc | 3f 2d 5a 36 27 be 97 1b 2d 43 21 16 b5 25 60 73 | 31 d7 04 cb ac b3 fd 19 61 2f 36 91 05 d7 55 8c | 92 5d 99 4b ae f6 cf a1 6e 2e de fa cb a4 7e 7e | b4 08 08 4f 90 51 13 b7 5b cb 7e 2c db 61 c5 d9 | d2 2f 86 cb df 97 d1 5e d4 95 3b c2 71 e2 2b bf | 7b e5 e9 8b bd 5c de 24 ac 5a 8b 4a 5d 3b ff 1e | f8 f4 2b 7b 96 0c 02 8f ac d9 62 f7 21 fb 07 5e | 9d 3f 41 15 d1 79 65 31 2a 68 5a 1a 56 fc 9c 2a | 20 90 63 93 fd d9 59 08 0d 3a 51 cc ee 1b ca 83 | 3c 5f 8f 03 9c cf 6f 04 52 23 a8 cb 50 43 72 18 | 78 cb 0f 8d bf 67 75 81 61 d9 91 a3 5f f5 1e ad | 09 8c 98 32 17 11 19 f3 54 f2 c6 36 e6 24 63 e2 | 41 b5 39 5c af a7 57 20 af 37 ac c1 12 94 ec 3a | e0 ac a7 07 42 78 d2 32 96 5c a0 ed 7e 90 04 46 | 29 00 00 24 e4 05 e8 ad 6f 35 18 e8 9c ba 2a d7 | ba f9 eb 8c c3 7b 43 88 9a 23 1f e0 cb de a0 8e | 76 67 65 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab a4 b2 11 db 45 90 fb 99 ab 4d 81 | 85 c6 e5 03 d5 18 31 7d 00 00 00 1c 00 00 40 05 | 9e c9 75 d2 3b 5d 13 cd bd fe b5 96 1f 79 bf 21 | fa a0 06 d7 | state #36 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469defe0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e7260 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #36 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 | #36 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49603.8112 | resume sending helper answer for #36 suppresed complete_v2_state_transition() and stole MD | #36 spent 0.541 milliseconds in resume sending helper answer | stop processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34800cf80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 93 27 79 3b f0 36 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #36 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #36 | rejected packet: | c4 93 27 79 3b f0 36 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #36: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0656 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ef4e0 | handling event EVENT_RETRANSMIT for parent state #23 | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #23 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #23 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49603.819418; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001214 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #23 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 "road-eastnet-nonat-23" #23: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #23) | 11 64 2b cc 79 62 5e 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 73 2b eb f6 ef a5 89 1a 84 5f 77 86 97 95 f5 | 41 68 46 e7 c2 3a 4b 96 08 d9 dc ac 0c dd 5f 9b | 9c 2f fb 55 35 f0 7e cd 72 e1 cc 2d 6a fa 78 20 | 87 1a 7a 27 9f 9e c1 5d d5 9e 2c a0 07 0d 68 be | 9e e9 e9 2b 00 f9 05 41 09 d8 c4 31 fa 61 72 87 | 90 51 a0 68 b9 49 7c 1e 75 38 ea 5f 98 5e c2 d2 | 66 ca 13 be 66 2b cf da 9f 87 38 b0 7e a9 5b 2c | b6 4d 89 7d 77 c1 b9 97 25 e9 f9 03 6e 50 c9 f0 | 4a 7a ea 26 c5 82 77 fd 51 df 29 99 2b 7c 16 40 | 15 23 9e b1 86 5f 7e 14 de 76 c4 15 a3 9d c9 b4 | 9c 1b 90 c7 1e 57 7f 74 e2 ad 9a 3c 48 8f 70 44 | 85 18 d4 03 39 40 d0 15 5b 33 89 0a c2 cc bd 37 | e0 4e e5 f2 46 4f 47 44 cf d8 ce b3 b6 34 38 c5 | 35 57 26 ef 2d db be d0 db df 2a 42 e2 e1 8f 1d | 48 dc 28 b8 9a 19 2e b1 d2 17 f5 9d a6 50 4d 1a | 18 88 cf 51 7a 98 9f 7a 85 1b 6d 6e b4 28 52 31 | 29 00 00 24 7b 3d c1 32 8e 45 e7 94 6a 53 a8 c9 | d4 42 3b 62 4a d5 d1 ca c0 9b 8b 0f 34 82 fe 78 | 98 28 d2 99 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 90 87 c3 2a f9 31 e3 ce f5 bd a0 4a | 02 f7 6c fe 1a b5 f1 41 00 00 00 1c 00 00 40 05 | a7 5c 60 43 7b 55 16 31 7f 2f 25 27 9c df 44 42 | dd 9f 1f 73 | libevent_free: release ptr-libevent@0x7fb36c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ef4e0 | #23 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 64 2b cc 79 62 5e 8e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #23 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #23 | rejected packet: | 11 64 2b cc 79 62 5e 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #23: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0688 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #14 | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #14 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #14 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49603.858819; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.005931 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8e0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #14 | libevent_malloc: new ptr-libevent@0x7fb36c00cf80 size 128 "road-eastnet-nonat-14" #14: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #14) | c3 13 eb 28 05 44 3c c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 9d 4b 57 65 9b 44 ef 02 5a 55 12 34 bd 3e fa | 1d 1d 02 b8 47 b4 07 d2 1c 40 a7 d2 b5 27 54 0d | 81 c5 8d d2 b0 f1 46 e6 2b f6 3a de 28 5d 98 ae | 72 2f 81 53 d7 e7 b2 d9 8d 92 9d 09 f6 b7 ce cc | 3e 71 cd 6b bc 9b 98 ad b9 25 11 78 67 a8 99 c6 | d0 09 70 45 b3 4c 5d bb c4 08 3e 65 01 7c 91 1b | 71 62 4d 8f 21 92 6e 0d cc 31 2a e5 1d 4d 2c 13 | a8 c8 3c 02 8d 36 79 d7 6c 16 bc 07 ba a2 3a 87 | 13 5a 36 f7 58 04 34 60 a3 2f 3a 9f 7c 23 64 3e | 35 e2 e2 a2 79 4c 9f fc 94 b5 56 35 03 c7 fc 3a | cf 61 0a a2 ca 12 f9 93 6a 8b f6 7c 71 75 e0 48 | 38 16 70 bd 8e 4a bd d6 cf f6 8e 6b de fc 4a f7 | 37 83 73 dd be 05 96 b0 07 8a ee 94 33 ed 86 17 | 8e 84 02 b1 3c 02 91 6e df 44 9a 23 83 12 9c 66 | e4 27 4d ff 2c b0 4c 89 bc bc 90 88 ea ad 2f 69 | 0e ca 37 3b 42 e0 ad 13 24 ad bb e5 a5 03 12 10 | 29 00 00 24 cb 20 8c 9f 6a 8c dd ed 7f 5a c1 49 | 4c ab 23 eb 51 b5 51 02 d0 17 95 d7 22 4b 61 df | 15 62 c3 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e 81 d0 17 a6 30 05 4d 92 15 c2 f3 | f4 8b 67 24 b4 9e ba 2d 00 00 00 1c 00 00 40 05 | 8a 85 97 fb 20 dc 58 d7 a0 fe fa ad 9b 31 ea 8a | c5 2b 9c 59 | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #14 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c3 13 eb 28 05 44 3c c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #14 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #14 | rejected packet: | c3 13 eb 28 05 44 3c c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #14: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e05a0 | handling event EVENT_RETRANSMIT for parent state #30 | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #30 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #30 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49603.878131; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501762 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #30 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-30" #30: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #30) | eb 37 b2 e3 45 e6 a7 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 14 f4 3b 23 14 59 57 11 85 13 a2 12 2b b5 a3 ff | 27 d1 a6 d6 83 ba ed 6e 70 90 a1 d6 22 c0 f4 dc | 88 16 36 cb d1 72 72 bc de f4 41 0b 1b 89 09 42 | b9 3c f8 7c e9 f8 b9 9e 79 49 a8 2b 7f 1d 06 99 | c2 4a dd e8 2d e9 b4 cd ab 59 b3 cd 90 a2 ae 3c | dc 2b a8 89 42 be 2f 72 3b d2 e2 27 b4 65 50 d4 | 35 50 bc 83 c6 85 ec 49 08 26 e7 a9 0e b6 5e a5 | 85 8b 68 21 3e 90 ff 7d 8a b3 a3 ab 4e 47 64 32 | 27 11 da 90 e5 4b bc e9 16 11 6a bf 15 7e 85 08 | 28 9b e3 ef 08 8b 63 b8 f5 43 71 2f 4c 67 78 41 | b8 23 b8 9c 92 66 99 57 0d 3e 91 c2 06 23 98 e8 | 6d 98 00 38 76 9f e2 83 8a e1 b7 3f 0f fe 0a 46 | d4 29 95 ea ed 7c f2 88 a6 07 6b 92 26 ac 08 4f | 2f b2 56 84 37 68 ea c9 79 62 e3 b0 e5 14 a4 c8 | 94 04 78 6c 13 14 ae b3 aa ac 60 8d 12 46 30 65 | 4d f6 8a 38 3e 83 8d 9b ed 94 87 9f 15 c1 ab 90 | 29 00 00 24 3c c6 27 c6 e1 5b ef ef 28 05 b6 9a | 73 ea 46 41 c6 a4 e3 b1 86 51 d2 31 50 73 0b 09 | 13 5f 9d 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 2d bd fb cd 00 1b 4b be 47 ff 4c | 9b 30 9e df 04 ed 35 e5 00 00 00 1c 00 00 40 05 | f4 eb 1d 0f f6 3b e7 d6 54 0e 88 15 bd 63 45 57 | 71 e8 c0 52 | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e05a0 | #30 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 37 b2 e3 45 e6 a7 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #30 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #30 | rejected packet: | eb 37 b2 e3 45 e6 a7 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #30: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0581 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-37" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-37' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #37 at 0x557d46a07350 | State DB: adding IKEv2 state #37 in UNDEFINED | pstats #37 ikev2.ike started | Message ID: init #37: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #37: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #37; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-37" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-37" IKE SA #37 "road-eastnet-nonat-37" "road-eastnet-nonat-37" #37: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-37 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-37": constructed local IKE proposals for road-eastnet-nonat-37 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 37 for state #37 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469e05a0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #37 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 | #37 spent 0.137 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-37" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.22 milliseconds in whack | crypto helper 8 resuming | crypto helper 8 starting work-order 37 for state #37 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 37 | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 37 time elapsed 0.001061 seconds | (#37) spent 1 milliseconds in crypto helper computing work-order 37: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 37 for state #37 to event queue | scheduling resume sending helper answer for #37 | libevent_malloc: new ptr-libevent@0x7fb34c00cf80 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #37 | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 37 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #37 | **emit ISAKMP Message: | initiator cookie: | 17 02 22 e9 ab 5b 91 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-37 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7f f0 24 04 15 84 3f 8d a0 47 69 89 53 1c 67 b8 | ikev2 g^x 33 2a a4 f5 84 95 fd 12 c4 95 3c eb 03 f8 76 46 | ikev2 g^x 15 20 9b c5 17 a5 48 da 05 b3 14 87 45 a5 03 ce | ikev2 g^x 15 45 04 84 4f ce c5 7f 7f d9 f6 69 e6 fa 2a ce | ikev2 g^x 98 6a 3f d1 cc fe 7f e2 41 fd 61 7b af af 30 7e | ikev2 g^x 0a 75 d2 92 05 56 ed e9 09 bd bc db cd 80 58 20 | ikev2 g^x 86 cc 39 bd f2 1c dd 9d 77 bb 28 c3 7e a4 97 11 | ikev2 g^x 86 79 5d 68 34 e4 33 4c b3 b1 ed 26 ab a1 c5 7d | ikev2 g^x dd f5 b8 0e 55 cd f4 1f ea 00 32 c8 4b fd 8f a5 | ikev2 g^x 71 8b 05 79 0a 34 41 68 bd c7 7d 96 51 77 5e 6b | ikev2 g^x d9 65 0d cf f7 34 f5 5b 4b bf 3e ae f6 63 25 2e | ikev2 g^x ea 9e 2a 3f 64 43 4d 0c 4a de f8 57 38 d7 5a c8 | ikev2 g^x 89 09 d3 81 3b 61 a8 5e 87 ab 34 9f c0 a6 2e 8e | ikev2 g^x a4 55 d9 e8 61 49 db 19 2f a0 89 a1 e6 24 e6 14 | ikev2 g^x 77 4b 63 b1 94 0b fe b9 37 07 5d a5 3f f4 4e 97 | ikev2 g^x 2a 98 e3 ca 6e 7f 3f a3 88 c3 da 3a c0 a1 79 c5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 75 33 7f 61 eb 0d 1b f9 84 ec ca bb af cf f0 96 | IKEv2 nonce 3c 65 2f 09 ef 72 4a c4 05 f7 86 9b fc 7f 3c 33 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 17 02 22 e9 ab 5b 91 fa | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 25 | natd_hash: port= 01 f4 | natd_hash: hash= 9b 5d ed 76 d7 41 0c 3c 88 ec 15 de 69 08 6f 06 | natd_hash: hash= 52 19 de 0f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9b 5d ed 76 d7 41 0c 3c 88 ec 15 de 69 08 6f 06 | Notify data 52 19 de 0f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 17 02 22 e9 ab 5b 91 fa | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 52 bb 9d ab bf 18 49 c2 17 f2 d0 27 18 10 66 1c | natd_hash: hash= c7 07 9d fe | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 52 bb 9d ab bf 18 49 c2 17 f2 d0 27 18 10 66 1c | Notify data c7 07 9d fe | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #37 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #37: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #37 to 4294967295 after switching state | Message ID: IKE #37 skipping update_recv as MD is fake | Message ID: sent #37 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-37" #37: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.37:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #37) | 17 02 22 e9 ab 5b 91 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f f0 24 04 15 84 3f 8d a0 47 69 89 53 1c 67 b8 | 33 2a a4 f5 84 95 fd 12 c4 95 3c eb 03 f8 76 46 | 15 20 9b c5 17 a5 48 da 05 b3 14 87 45 a5 03 ce | 15 45 04 84 4f ce c5 7f 7f d9 f6 69 e6 fa 2a ce | 98 6a 3f d1 cc fe 7f e2 41 fd 61 7b af af 30 7e | 0a 75 d2 92 05 56 ed e9 09 bd bc db cd 80 58 20 | 86 cc 39 bd f2 1c dd 9d 77 bb 28 c3 7e a4 97 11 | 86 79 5d 68 34 e4 33 4c b3 b1 ed 26 ab a1 c5 7d | dd f5 b8 0e 55 cd f4 1f ea 00 32 c8 4b fd 8f a5 | 71 8b 05 79 0a 34 41 68 bd c7 7d 96 51 77 5e 6b | d9 65 0d cf f7 34 f5 5b 4b bf 3e ae f6 63 25 2e | ea 9e 2a 3f 64 43 4d 0c 4a de f8 57 38 d7 5a c8 | 89 09 d3 81 3b 61 a8 5e 87 ab 34 9f c0 a6 2e 8e | a4 55 d9 e8 61 49 db 19 2f a0 89 a1 e6 24 e6 14 | 77 4b 63 b1 94 0b fe b9 37 07 5d a5 3f f4 4e 97 | 2a 98 e3 ca 6e 7f 3f a3 88 c3 da 3a c0 a1 79 c5 | 29 00 00 24 75 33 7f 61 eb 0d 1b f9 84 ec ca bb | af cf f0 96 3c 65 2f 09 ef 72 4a c4 05 f7 86 9b | fc 7f 3c 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 5d ed 76 d7 41 0c 3c 88 ec 15 de | 69 08 6f 06 52 19 de 0f 00 00 00 1c 00 00 40 05 | 52 bb 9d ab bf 18 49 c2 17 f2 d0 27 18 10 66 1c | c7 07 9d fe | state #37 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469e05a0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ef4e0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #37 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 | #37 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49603.883828 | resume sending helper answer for #37 suppresed complete_v2_state_transition() and stole MD | #37 spent 0.461 milliseconds in resume sending helper answer | stop processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c00cf80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 02 22 e9 ab 5b 91 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #37 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #37 | rejected packet: | 17 02 22 e9 ab 5b 91 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #37: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46906b40 | handling event EVENT_RETRANSMIT for parent state #24 | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #24 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #24 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49603.933037; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.008378 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469defe0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #24 | libevent_malloc: new ptr-libevent@0x7fb34c00cf80 size 128 "road-eastnet-nonat-24" #24: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #24) | a6 6a cf 12 4f 5d 80 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 64 6b 6f 54 02 19 88 ba 7c 08 ae f0 e8 ac 9d | c2 ca d4 17 41 fd 62 15 e6 80 a2 22 8c 15 09 a2 | e7 a1 72 ea 0a df 45 b3 25 d6 2f ad 4b 53 6c aa | 40 78 bc 47 40 56 b3 31 58 04 4d 38 c6 d0 b5 d8 | 7f 6f a2 f1 93 94 05 6c d0 31 6f f5 91 da 3d ba | e0 df 58 d8 a7 5c 43 d6 dc 3f 84 1b 95 82 7b 74 | 0c 41 0a 55 c5 c4 26 cf be bc a7 fe 25 56 32 c1 | 74 4d 01 af d9 1d ba 5f df c3 24 6e 66 7d 9c 22 | 84 1a 96 19 75 ab 7b e5 8d 21 ff f9 0c c5 57 de | 08 b9 a5 25 49 54 61 98 e2 43 6f b1 cb e2 3e 2a | f8 2c b2 cc ec bc 5e 41 c3 a9 95 de 3e ae 27 18 | 0c 51 55 28 d4 52 b5 1c e5 35 a1 75 a4 31 5a 74 | 09 2d 83 0a f9 22 55 04 79 c9 7a 03 c4 3f b9 27 | 7d 94 7e 25 32 de fa 8a ba c3 f8 47 1a 89 e0 04 | 1c 2a 74 59 3a 33 c6 78 c9 39 62 b5 5b 83 e0 ec | 74 d5 64 ba c0 ee 33 ea 4f ca fc f0 da aa dc 97 | 29 00 00 24 86 65 98 51 47 8e f6 4b 35 71 6a af | 55 7d 2d 69 5a 9e 6d 36 94 f6 45 50 b1 44 a3 6d | d2 78 d3 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 db bf 4d aa d7 35 0a 3b ec 97 e0 | 4c d5 57 e3 dd 13 4a e5 00 00 00 1c 00 00 40 05 | c7 67 96 20 f6 5f 6f 16 76 12 96 1c 43 e0 40 0f | 0e 23 33 02 | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46906b40 | #24 spent 0.198 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 6a cf 12 4f 5d 80 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #24 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #24 | rejected packet: | a6 6a cf 12 4f 5d 80 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #24: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0886 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350005860 | handling event EVENT_RETRANSMIT for parent state #15 | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #15 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #15 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49603.952489; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003296 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46906b40 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #15 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 "road-eastnet-nonat-15" #15: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #15) | 26 a2 6e 3b 12 a8 59 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 6b 03 2b 64 b1 a2 70 7f 8d ca f2 6f 54 de 1b | 11 e2 1d 10 c1 2b 3c 5f 6d e7 ca 6d ea a7 28 53 | d6 4f 75 27 52 bc 43 63 3a ab 63 49 ff c4 e6 b2 | 78 96 18 25 61 28 7f 9b 98 22 5e da 00 8c e8 eb | 6c 4d 9e 76 25 8b 7a 47 ab 33 22 55 42 23 3f c1 | 32 ba e7 e4 c9 4a 5f 0d 8b 0d 29 12 b2 18 5b ef | 5f af 09 c8 a4 7c fe 53 bc 8e 96 c3 8e be 32 ff | 43 00 6d 58 cd 42 72 b2 1b fc 90 55 08 bf 9d 89 | 5e b3 d9 d7 ab 1d c3 3d 09 0d c3 a0 b4 39 9a 0c | ea 26 37 38 25 17 00 86 5a bc 7b e6 34 6a b8 82 | f3 f9 2d 18 8b 60 8a e1 44 59 97 9d 3d 8f e9 c5 | f8 41 9b cd 41 cb 5c 6e 45 99 77 f2 5a 87 7b f0 | 1d 7f 22 98 41 7d c2 e4 77 82 d2 02 ca 3f 14 b4 | ed 6e 31 66 40 7e 40 f0 ba 85 c9 d3 8f 47 3c 65 | b9 d2 a6 cf 54 28 00 31 9f 56 44 5d 75 4a b4 99 | 1b dd 03 d3 13 f1 55 d7 db 2e bc 45 cf 65 35 32 | 29 00 00 24 67 e3 6e 73 a7 21 14 7b f9 65 b0 3b | c5 ad 46 44 e6 80 5b 79 23 9d d2 69 99 df e6 8a | c8 33 da 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 9d 30 3b 19 a7 57 ef 03 62 55 06 | 80 94 c0 4d a8 e2 a5 61 00 00 00 1c 00 00 40 05 | d9 d1 f1 c9 94 93 28 e9 a6 95 bd a3 15 8f 8e 30 | 15 95 ff 3f | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350005860 | #15 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 a2 6e 3b 12 a8 59 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #15 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #15 | rejected packet: | 26 a2 6e 3b 12 a8 59 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #15: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0682 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-38" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-38' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #38 at 0x557d46a08910 | State DB: adding IKEv2 state #38 in UNDEFINED | pstats #38 ikev2.ike started | Message ID: init #38: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #38: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #38; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-38" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-38" IKE SA #38 "road-eastnet-nonat-38" "road-eastnet-nonat-38" #38: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-38 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-38": constructed local IKE proposals for road-eastnet-nonat-38 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 38 for state #38 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb350005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #38 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 | #38 spent 0.167 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-38" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.26 milliseconds in whack | crypto helper 12 resuming | crypto helper 12 starting work-order 38 for state #38 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 38 | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 38 time elapsed 0.001036 seconds | (#38) spent 0.841 milliseconds in crypto helper computing work-order 38: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 38 for state #38 to event queue | scheduling resume sending helper answer for #38 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 | crypto helper 12 waiting (nothing to do) | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #31 | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #31 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #31 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49603.963359; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.494125 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f0aa0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #31 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 "road-eastnet-nonat-31" #31: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #31) | d5 d5 f7 7f 23 0d 4b 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 d8 4b a5 f9 d4 3a a9 51 97 2e 27 d1 cc 90 15 | e2 e2 8d 96 07 4d fd 40 9f 4f 7f 6f 35 0e 23 bc | 4a 6a 76 f9 9f 83 b0 54 30 ee b6 fc 0a 45 0c 73 | 2d e9 2a b2 ca 81 a2 ff 50 db 13 29 75 7d e9 7e | a9 33 06 c4 32 68 94 61 41 2b 8d f1 ff df 69 cc | e8 c4 b4 6d ef bc 3d c5 49 cc a7 2a fc 4c 98 e2 | 30 43 57 19 e1 0a 22 00 d7 07 6f aa ba 35 b2 14 | 36 27 5e 66 b6 08 a0 40 46 47 86 94 6d 23 bf ed | 9b 86 94 95 7d 7c df ed 26 58 08 d9 19 18 cf 17 | d2 31 cb 23 b8 00 65 a0 2d c7 80 be d9 c6 2d 9b | 2d 24 dd 1f 09 8c cb bd 5d a9 d7 7b 30 d7 87 68 | f3 c0 0e 20 8d c3 3f 32 80 d9 ab 29 26 00 09 ea | b0 b4 2f 7d 8f fc 22 1d 7c 39 80 08 04 22 2a 49 | f4 26 0e 59 4e ac 0e 0e 46 93 3b ba 87 01 a8 59 | ea 18 2f 09 70 d0 fb 69 f1 4a 19 c7 fd d5 be f0 | ff bb d7 7c ef dd e5 ed c9 a4 0a b6 e1 11 1b ed | 29 00 00 24 6a 1e b5 3b 00 37 08 50 6d 81 0e e2 | cf 1b 46 47 4b 2b 09 3d 6e 9a 95 9d 52 78 61 ae | d4 0d 66 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 91 23 cd ed e8 35 56 6f f7 85 4c | 49 64 a9 75 0a 07 1b 5f 00 00 00 1c 00 00 40 05 | a3 62 6c f7 52 92 b8 35 33 98 a9 6b 00 6d db 28 | 96 bc 0a b6 | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #31 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #38 | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 38 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #38 | **emit ISAKMP Message: | initiator cookie: | 63 6f 4b 9c a2 38 4b f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-38 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e5 c6 a0 5e 80 62 3e 9a 9c 42 e1 05 80 df 04 bf | ikev2 g^x 1e b5 eb a5 bb ef bc 82 8b e6 75 a7 2e 01 28 64 | ikev2 g^x e4 76 b9 2e 24 4c bf de dc 13 dd 2b 71 c5 93 43 | ikev2 g^x 1b 46 d4 7e b2 da 9a 48 5b 59 35 a7 05 07 a3 e4 | ikev2 g^x 2d c6 06 3d 04 99 06 6d e6 f3 82 a2 e0 b0 3d 7e | ikev2 g^x 06 24 2a d6 83 0e 98 7d 98 49 2f 5f ab 8e 6a a0 | ikev2 g^x d8 9e 97 9f 3a b5 0b 41 09 f4 3d 1d 01 c6 79 69 | ikev2 g^x 84 a4 53 1f bd 4e 48 87 76 0d 6e 5e db cc c6 9f | ikev2 g^x 32 ff 46 70 0d 72 cf 06 98 99 df 58 29 5b 2c 8c | ikev2 g^x fb 98 a9 76 0f 25 88 9a f5 19 cc e3 5c 2b 68 1d | ikev2 g^x 01 4d 25 7a f1 7a 21 df b2 8f 9c 28 7d d1 ec da | ikev2 g^x 1d aa a1 0e 2a 91 6c fc cd c9 76 e7 51 08 7a ff | ikev2 g^x e5 ff f8 19 fa 3a 8e cc 1e 84 49 b9 c5 19 d0 a9 | ikev2 g^x d3 37 e2 20 31 e7 32 dd 71 90 7c 76 34 4e 29 57 | ikev2 g^x 1e 56 51 56 0c 5f 17 75 67 40 80 dc 44 27 6b 9a | ikev2 g^x c7 16 b2 3b 68 69 4b 25 42 5f 6c bd 14 34 a0 fd | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 11 36 0f 5e a0 00 74 be 57 cf e9 ad 0b 41 64 75 | IKEv2 nonce 76 be 45 9c 57 4a dd ea fc 94 1e c3 3b 87 2f 30 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 63 6f 4b 9c a2 38 4b f5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 26 | natd_hash: port= 01 f4 | natd_hash: hash= 0b 5e 04 97 03 6e 1a 6a 1c 69 28 d2 a2 f5 94 bd | natd_hash: hash= 95 4c fa 5e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0b 5e 04 97 03 6e 1a 6a 1c 69 28 d2 a2 f5 94 bd | Notify data 95 4c fa 5e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 63 6f 4b 9c a2 38 4b f5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= aa 31 5d 54 cf 5a 81 b9 1b cd fe 19 22 77 54 6d | natd_hash: hash= f5 50 1b 4f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data aa 31 5d 54 cf 5a 81 b9 1b cd fe 19 22 77 54 6d | Notify data f5 50 1b 4f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #38 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #38: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #38 to 4294967295 after switching state | Message ID: IKE #38 skipping update_recv as MD is fake | Message ID: sent #38 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-38" #38: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.38:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #38) | 63 6f 4b 9c a2 38 4b f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 c6 a0 5e 80 62 3e 9a 9c 42 e1 05 80 df 04 bf | 1e b5 eb a5 bb ef bc 82 8b e6 75 a7 2e 01 28 64 | e4 76 b9 2e 24 4c bf de dc 13 dd 2b 71 c5 93 43 | 1b 46 d4 7e b2 da 9a 48 5b 59 35 a7 05 07 a3 e4 | 2d c6 06 3d 04 99 06 6d e6 f3 82 a2 e0 b0 3d 7e | 06 24 2a d6 83 0e 98 7d 98 49 2f 5f ab 8e 6a a0 | d8 9e 97 9f 3a b5 0b 41 09 f4 3d 1d 01 c6 79 69 | 84 a4 53 1f bd 4e 48 87 76 0d 6e 5e db cc c6 9f | 32 ff 46 70 0d 72 cf 06 98 99 df 58 29 5b 2c 8c | fb 98 a9 76 0f 25 88 9a f5 19 cc e3 5c 2b 68 1d | 01 4d 25 7a f1 7a 21 df b2 8f 9c 28 7d d1 ec da | 1d aa a1 0e 2a 91 6c fc cd c9 76 e7 51 08 7a ff | e5 ff f8 19 fa 3a 8e cc 1e 84 49 b9 c5 19 d0 a9 | d3 37 e2 20 31 e7 32 dd 71 90 7c 76 34 4e 29 57 | 1e 56 51 56 0c 5f 17 75 67 40 80 dc 44 27 6b 9a | c7 16 b2 3b 68 69 4b 25 42 5f 6c bd 14 34 a0 fd | 29 00 00 24 11 36 0f 5e a0 00 74 be 57 cf e9 ad | 0b 41 64 75 76 be 45 9c 57 4a dd ea fc 94 1e c3 | 3b 87 2f 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b 5e 04 97 03 6e 1a 6a 1c 69 28 d2 | a2 f5 94 bd 95 4c fa 5e 00 00 00 1c 00 00 40 05 | aa 31 5d 54 cf 5a 81 b9 1b cd fe 19 22 77 54 6d | f5 50 1b 4f | state #38 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb350005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #38 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 | #38 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49603.964032 | resume sending helper answer for #38 suppresed complete_v2_state_transition() and stole MD | #38 spent 0.478 milliseconds in resume sending helper answer | stop processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34000cf80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 d5 f7 7f 23 0d 4b 11 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #31 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #31 | rejected packet: | d5 d5 f7 7f 23 0d 4b 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #31: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0582 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 6f 4b 9c a2 38 4b f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #38 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #38 | rejected packet: | 63 6f 4b 9c a2 38 4b f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #38: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0535 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f7760 | handling event EVENT_RETRANSMIT for parent state #25 | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #25 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #25 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49604.022877; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001998 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #25 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 "road-eastnet-nonat-25" #25: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #25) | 78 5e ec 19 c3 e9 2e 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 3a 20 04 5c a3 28 e0 27 26 70 8b 2f d3 d3 dd | 4a ad b8 1e 2e 37 87 d2 d3 a8 c4 9d c6 ee 0f a0 | 73 84 05 06 74 d6 4d 07 19 2b 12 8b 69 7a 83 b9 | 89 8c 88 b4 63 15 c8 b2 2d cc 49 7a 79 d1 07 bf | ee 4e b7 0b 0d 2d 3d 97 a7 24 aa 10 a0 e9 fc 77 | 06 e9 cd 21 f9 64 fc 4a 83 9d 5e f3 a2 9b 32 c3 | d3 50 6b 09 58 29 c8 67 c4 22 3b 38 ef 52 9f dd | 6e 41 e8 16 88 89 59 a6 9f 8d 30 13 4e 6f 06 5b | 1b 0e 62 f8 90 29 6e c8 e5 89 28 a2 ea ec 59 64 | 67 71 02 aa 61 49 46 0f fe 0a d1 4d 62 20 44 13 | 22 6b 41 1e 83 c0 52 5c 04 b5 86 ac e3 c4 87 52 | 79 53 63 6b c1 fd a7 16 e1 a2 b6 27 78 fe 10 69 | 79 cb f1 75 47 7f aa 61 41 c8 00 01 b4 6e 89 cf | 41 c5 e9 e7 92 08 38 fd 15 78 0a 2b 93 44 c9 ca | b1 70 2a 2b ec 91 fe 70 63 59 89 8e 57 c3 33 c3 | 54 24 a1 21 c8 2a c0 85 b2 60 de 71 38 dc 7c 22 | 29 00 00 24 e1 d5 1d 82 b2 16 85 fd 33 85 77 2b | fc 68 12 4a cf f8 6e 1b 7e ab 43 df ab 9a a1 84 | be 92 7e 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a 8e 47 d6 ba 1e 42 85 a7 7b 2f db | 65 2a 1e ef d5 42 ee 43 00 00 00 1c 00 00 40 05 | 5d 12 0d 5e 92 91 ee 2b 6d 12 02 e9 64 25 a1 22 | eb b7 d7 ed | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f7760 | #25 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 5e ec 19 c3 e9 2e 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #25 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #25 | rejected packet: | 78 5e ec 19 c3 e9 2e 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #25: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-39" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-39' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #39 at 0x557d46a09ed0 | State DB: adding IKEv2 state #39 in UNDEFINED | pstats #39 ikev2.ike started | Message ID: init #39: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #39: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #39; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-39" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-39" IKE SA #39 "road-eastnet-nonat-39" "road-eastnet-nonat-39" #39: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-39 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-39": constructed local IKE proposals for road-eastnet-nonat-39 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 39 for state #39 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469e05a0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #39 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 | #39 spent 0.163 milliseconds in ikev2_parent_outI1() | crypto helper 5 resuming | crypto helper 5 starting work-order 39 for state #39 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 39 | RESET processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-39" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.264 milliseconds in whack | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 39 time elapsed 0.000902 seconds | (#39) spent 0.909 milliseconds in crypto helper computing work-order 39: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 39 for state #39 to event queue | scheduling resume sending helper answer for #39 | libevent_malloc: new ptr-libevent@0x7fb34400cf80 size 128 | crypto helper 5 waiting (nothing to do) | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #32 | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #32 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #32 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49604.044586; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50077 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f7760 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #32 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 "road-eastnet-nonat-32" #32: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #32) | 91 2f 9d 69 76 5d 8a 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 54 17 4f f3 31 b1 0f c2 14 96 a0 49 f3 c5 20 | 38 78 7d e5 0a d8 95 bc 7a a9 a2 f1 ff ab 0d 66 | a2 fe 53 90 8e fe 51 43 04 57 01 9c e7 22 ca 9e | 98 aa 3b 0d 0d 5f ee 9d 1e 59 e6 04 c4 7f 07 84 | f1 a5 dc 31 6f fa b4 db 4a d9 1c 93 5d b0 7e 5d | 37 79 07 ab 3e 5c a3 de d6 8b a4 ac df 4b a7 7c | af 6f 03 fd 31 bd 7d c1 34 31 76 57 00 e4 23 e1 | 82 cb b8 38 12 59 cd 21 e3 0e 67 54 27 e1 6e 8f | 1e a1 dd 84 f8 ca 82 2a 39 9d 17 56 58 46 a3 3b | 7b 5d 3a 21 a2 b3 03 79 c6 bd 25 cc df a0 12 67 | b3 f4 5a c2 b0 73 2d 33 df 1c dc fa 26 25 56 72 | 59 7b 3c f0 d8 e2 d9 b0 57 2e 4a 8e ec 96 92 09 | 75 70 f6 57 59 ce 54 70 90 14 41 34 b1 57 0f 5d | 19 dd 8a a1 77 43 7e cf 1c ef 3e 0b 72 1e cc f4 | 78 66 2f 15 74 e8 33 6b d3 89 bb a9 fb bc fa 46 | 95 b5 88 f8 a3 91 1f 3a b1 92 bc 1e 84 a5 5b 07 | 29 00 00 24 2d 29 95 26 bc 23 fe d9 76 bb c2 d5 | 43 41 98 03 bf c6 eb 4a b9 6e a6 4e f6 f7 82 f1 | 09 94 9d 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 13 8b 5d 25 b5 3b 06 af a0 3f ac | be 9b 92 09 9d c4 50 7f 00 00 00 1c 00 00 40 05 | ef 32 45 23 d7 6a b0 96 66 7f 58 39 f6 19 a5 1f | 4b 49 56 02 | libevent_free: release ptr-libevent@0x7fb37c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | #32 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #39 | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 39 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #39 | **emit ISAKMP Message: | initiator cookie: | 19 fb 2f c4 ac 44 fb 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-39 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0e b1 09 86 9c 45 db 95 7b d2 00 66 c6 50 ec 38 | ikev2 g^x 85 24 bf d9 80 0e ac 2e 4c 6c 22 df ca 10 97 2e | ikev2 g^x 3e b3 c6 bc af 43 d2 f1 96 a9 4b 69 aa cd 6c e0 | ikev2 g^x 9b a6 4b b2 87 0e 1c ca 32 4c 46 ee 52 f9 70 fd | ikev2 g^x fe 31 27 8d 61 a4 9c 97 7a a3 30 46 a8 d5 6f 83 | ikev2 g^x a7 6a c3 e9 ff 23 17 48 fe 4f dd cf 4e a9 a1 5e | ikev2 g^x d7 78 c0 fe 7d d7 62 84 4a b2 9d ae 37 bc ab ed | ikev2 g^x d5 8c 32 96 61 41 3f 21 7c ca ab 28 b6 ad 04 a3 | ikev2 g^x c6 dc bc c3 e1 13 16 74 7a 42 5b e7 e2 a2 c1 8c | ikev2 g^x b7 73 45 24 dc 37 dd 6b f2 55 c7 4f 97 81 79 6f | ikev2 g^x 14 cb 11 1e b4 40 01 19 cd a9 dd 29 3f 6f e4 ee | ikev2 g^x 95 68 2f 56 df 0a 08 86 e6 cd 7f a3 7b 00 61 f4 | ikev2 g^x c5 7c bb 03 05 36 7a 30 d5 36 53 38 4c f8 39 18 | ikev2 g^x 08 9c f5 06 b6 85 f9 e9 1b ab 6e 6e 92 66 b2 2b | ikev2 g^x 43 5a 44 5b 6f f1 98 dd 01 3a 01 23 5e f7 bc 7d | ikev2 g^x 6e f5 05 b9 ec 45 1c 8c 77 33 f8 a3 1c 1e 8c 99 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2f 9c d8 9a 10 ed a2 18 bd 6a 97 cb 42 26 f8 54 | IKEv2 nonce 76 a0 4d 6e 60 6c fb c1 ce 0f 53 f0 1f 6b 99 9c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 19 fb 2f c4 ac 44 fb 2d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 27 | natd_hash: port= 01 f4 | natd_hash: hash= f0 74 e0 c5 89 b2 32 b1 7d 7b 02 d3 e0 e6 47 82 | natd_hash: hash= 80 6f 9f 55 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f0 74 e0 c5 89 b2 32 b1 7d 7b 02 d3 e0 e6 47 82 | Notify data 80 6f 9f 55 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 19 fb 2f c4 ac 44 fb 2d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2e a2 7a f5 ee f4 77 35 9e db 48 5d 65 9b e7 f5 | natd_hash: hash= e4 1e af e9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2e a2 7a f5 ee f4 77 35 9e db 48 5d 65 9b e7 f5 | Notify data e4 1e af e9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #39 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #39: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #39 to 4294967295 after switching state | Message ID: IKE #39 skipping update_recv as MD is fake | Message ID: sent #39 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-39" #39: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.39:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #39) | 19 fb 2f c4 ac 44 fb 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e b1 09 86 9c 45 db 95 7b d2 00 66 c6 50 ec 38 | 85 24 bf d9 80 0e ac 2e 4c 6c 22 df ca 10 97 2e | 3e b3 c6 bc af 43 d2 f1 96 a9 4b 69 aa cd 6c e0 | 9b a6 4b b2 87 0e 1c ca 32 4c 46 ee 52 f9 70 fd | fe 31 27 8d 61 a4 9c 97 7a a3 30 46 a8 d5 6f 83 | a7 6a c3 e9 ff 23 17 48 fe 4f dd cf 4e a9 a1 5e | d7 78 c0 fe 7d d7 62 84 4a b2 9d ae 37 bc ab ed | d5 8c 32 96 61 41 3f 21 7c ca ab 28 b6 ad 04 a3 | c6 dc bc c3 e1 13 16 74 7a 42 5b e7 e2 a2 c1 8c | b7 73 45 24 dc 37 dd 6b f2 55 c7 4f 97 81 79 6f | 14 cb 11 1e b4 40 01 19 cd a9 dd 29 3f 6f e4 ee | 95 68 2f 56 df 0a 08 86 e6 cd 7f a3 7b 00 61 f4 | c5 7c bb 03 05 36 7a 30 d5 36 53 38 4c f8 39 18 | 08 9c f5 06 b6 85 f9 e9 1b ab 6e 6e 92 66 b2 2b | 43 5a 44 5b 6f f1 98 dd 01 3a 01 23 5e f7 bc 7d | 6e f5 05 b9 ec 45 1c 8c 77 33 f8 a3 1c 1e 8c 99 | 29 00 00 24 2f 9c d8 9a 10 ed a2 18 bd 6a 97 cb | 42 26 f8 54 76 a0 4d 6e 60 6c fb c1 ce 0f 53 f0 | 1f 6b 99 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 74 e0 c5 89 b2 32 b1 7d 7b 02 d3 | e0 e6 47 82 80 6f 9f 55 00 00 00 1c 00 00 40 05 | 2e a2 7a f5 ee f4 77 35 9e db 48 5d 65 9b e7 f5 | e4 1e af e9 | state #39 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469e05a0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #39 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 | #39 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49604.045291 | resume sending helper answer for #39 suppresed complete_v2_state_transition() and stole MD | #39 spent 0.468 milliseconds in resume sending helper answer | stop processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34400cf80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 2f 9d 69 76 5d 8a 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #32 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #32 | rejected packet: | 91 2f 9d 69 76 5d 8a 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #32: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 19 fb 2f c4 ac 44 fb 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #39 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #39 | rejected packet: | 19 fb 2f c4 ac 44 fb 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #39: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0539 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338005860 | handling event EVENT_RETRANSMIT for parent state #26 | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #26 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #26 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49604.100545; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001393 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #26 | libevent_malloc: new ptr-libevent@0x7fb34400cf80 size 128 "road-eastnet-nonat-26" #26: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #26) | f4 88 08 87 51 21 ca bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af d0 7b 56 fd 83 24 e2 7f 6d 07 5b 14 cf 37 08 | c2 df a1 e8 d0 3d d9 70 11 a2 f7 87 78 ef 74 57 | 42 80 b9 d0 66 00 01 7b 09 5e 7e 2a 26 27 6c f8 | 72 db 2f 73 3f 38 89 07 c7 29 09 0b 07 35 1d d7 | 5c 45 0c 9e 1b e1 95 53 4a ee ac 68 bd 09 aa 3d | 27 0f 50 02 03 b3 ad ea c4 c7 28 b1 bc b2 70 07 | fc b6 58 d4 ed 1b fe 1b 64 8b 86 a1 fe fc 72 d9 | f1 ba a9 eb 7d ce cd 2c b8 6e 00 33 4c be dd dd | 3d 98 b2 2e 58 56 f2 f2 80 02 eb 21 ee 6b bd 96 | 40 1f 33 62 77 0f c1 a2 eb f8 19 6e 1a 5e 18 e2 | c2 89 f7 17 30 91 11 29 f1 9d 22 c7 c8 11 a1 d6 | b3 ae 73 01 db d3 1a d2 95 3f af b3 66 e8 e4 3f | 7f 26 bd b3 f0 37 10 0c fa cc 87 cc 8d 67 d1 69 | 87 60 66 13 b3 cf ae b5 94 11 93 f7 71 af 4a e8 | 96 fa e6 46 bb bb 17 b4 9c 44 80 04 e3 4c ce 52 | 44 6c a3 c2 a0 6e 82 a5 21 5c cc c5 65 7c 81 dc | 29 00 00 24 8a 04 a2 be b1 ba fb 75 a9 90 e3 4a | e4 71 c4 43 1c fe 30 e6 85 0e 15 7e 50 52 02 a7 | d2 a1 ae dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 32 7f b1 02 26 47 ea b2 9e 1c ce | 0f f8 7e 1c 87 59 f3 12 00 00 00 1c 00 00 40 05 | f0 af 8c 45 09 60 6e 14 7f 54 da 7f 84 35 07 83 | 60 40 27 0a | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338005860 | #26 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 88 08 87 51 21 ca bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #26 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #26 | rejected packet: | f4 88 08 87 51 21 ca bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #26: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ec960 | handling event EVENT_RETRANSMIT for parent state #16 | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #16 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #16 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49604.10782; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.005386 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #16 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-16" #16: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #16) | 6b 57 6c f9 94 8d 37 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 79 95 56 0f 3a d5 d4 38 4f 8b a1 27 c3 02 1b | 5e 3a 85 e1 08 09 e6 fc a8 62 0f 43 42 55 29 b8 | e4 f9 04 77 e0 10 6e f0 87 0e 34 48 79 7d 7a e8 | ca f4 cc cc 99 09 3c b6 c2 35 0f bc 7b 2d 41 d5 | dd f7 e4 e1 a4 f1 02 00 be 44 4b 47 7e b4 a8 a2 | 62 b7 14 ca 2d 3c f6 2d ca f0 71 35 95 46 55 c7 | 1c ba 8e 83 ee 6a 95 4e 0b 06 27 00 95 fd 56 5f | a2 f2 d6 ed a0 30 96 bf 3e 03 94 41 ed 51 4c 15 | 54 db 62 3c 9c 56 76 98 56 78 f9 0d a3 f4 ac 74 | a4 8d 21 e9 c2 d6 c6 f2 bf cc ab 95 d5 b5 69 db | 99 07 4a 4f 0a fb b6 0d 07 d8 b8 7a ef c0 3c c0 | fa 7f 1c 08 05 55 7f 42 6a 4f 4e 4e 1f 35 3a 92 | 3a 9a 25 4f 7a 92 43 f1 5a 60 e4 7c d0 47 d1 12 | 01 ce a1 b9 b7 b6 c9 00 28 c2 19 89 84 44 e5 78 | 95 8c db 08 69 6a 49 44 32 07 7d 96 fb 06 00 43 | c3 4e a1 ee cd 85 94 29 a6 9f 2d d7 39 41 3b c9 | 29 00 00 24 85 0d a1 fb 37 74 4a 69 68 3b 97 74 | ca a6 8b 60 be e5 4d eb 21 82 d1 c7 17 0f 24 83 | fe 05 13 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 42 5d 5a fd 9e 39 f4 1d d5 d8 fc | 51 9a 83 f2 5f a0 b0 5a 00 00 00 1c 00 00 40 05 | 36 95 c1 ea ee d0 12 21 b4 68 71 46 60 49 f3 80 | 34 92 b4 f4 | libevent_free: release ptr-libevent@0x7fb37000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ec960 | #16 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b 57 6c f9 94 8d 37 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #16 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #16 | rejected packet: | 6b 57 6c f9 94 8d 37 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #16: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0524 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-40" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-40' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #40 at 0x557d46a0b490 | State DB: adding IKEv2 state #40 in UNDEFINED | pstats #40 ikev2.ike started | Message ID: init #40: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #40: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #40; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-40" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-40" IKE SA #40 "road-eastnet-nonat-40" "road-eastnet-nonat-40" #40: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-40 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-40": constructed local IKE proposals for road-eastnet-nonat-40 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 40 for state #40 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469ec960 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #40 | libevent_malloc: new ptr-libevent@0x7fb37000cf80 size 128 | #40 spent 0.139 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 resuming | RESET processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 starting work-order 40 for state #40 | RESET processing: connection "road-eastnet-nonat-40" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 40 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.236 milliseconds in whack | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 40 time elapsed 0.000956 seconds | (#40) spent 0.958 milliseconds in crypto helper computing work-order 40: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 40 for state #40 to event queue | scheduling resume sending helper answer for #40 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #40 | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 40 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #40 | **emit ISAKMP Message: | initiator cookie: | f4 2d ea 23 2d fd 9f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-40 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 73 1a 9e 5c fb fb e3 3a 12 40 55 ea 02 66 64 cb | ikev2 g^x 69 42 9f 9e 73 38 34 f9 9b 29 99 d0 1f 2f 62 b0 | ikev2 g^x ff 78 90 10 b8 86 3f 49 a8 32 be f6 08 0d 11 29 | ikev2 g^x 94 2b 8b de b8 63 2c 35 79 92 00 39 68 56 d7 ad | ikev2 g^x 7e 9a a2 59 50 2b c4 f8 63 a3 0c 5d 5e 44 62 5b | ikev2 g^x fc 42 68 dd ca 56 4c 44 63 17 39 39 e0 00 1c 8f | ikev2 g^x c5 28 a6 4f 80 e9 f0 8c 5a ea 63 37 5f d7 0a a3 | ikev2 g^x b8 dc 6a fd 41 02 14 01 fa 2f 62 ae cb f1 1e 40 | ikev2 g^x 2f 20 1d 4c b4 7d c9 2c fa 60 f5 5e 61 26 a0 89 | ikev2 g^x b5 80 ba fe 31 f9 79 3e 12 33 cf 6c 99 9f 52 55 | ikev2 g^x 62 d6 02 f9 0e 35 e1 e7 8d 67 93 09 10 77 15 30 | ikev2 g^x 4a e9 d6 a0 31 50 fb be 13 05 50 dc f4 46 03 08 | ikev2 g^x 2f 95 1b 33 25 b1 ea 42 27 b1 8d 6c a6 26 e8 12 | ikev2 g^x 28 ee 49 16 a3 ec 76 ad 9e 1b cb d5 8a 26 5b 22 | ikev2 g^x 55 46 26 40 fb a4 30 9e 31 e9 07 5c 3b f7 53 4f | ikev2 g^x 4f ec 0e ee ad 7e 3f fc 05 9c b5 15 17 a2 62 3f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 28 3a b9 16 f5 d3 fa 3e 82 0e 6c a5 b6 e0 32 27 | IKEv2 nonce f5 86 22 6d 8d 85 0f 17 f1 b4 a5 df eb 51 66 0d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f4 2d ea 23 2d fd 9f 1c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 28 | natd_hash: port= 01 f4 | natd_hash: hash= 78 e9 4b 4d 06 92 e2 ba cc 1d e9 b2 45 c8 92 47 | natd_hash: hash= 34 22 29 80 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 78 e9 4b 4d 06 92 e2 ba cc 1d e9 b2 45 c8 92 47 | Notify data 34 22 29 80 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f4 2d ea 23 2d fd 9f 1c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 84 da 3f 80 5c a8 47 c1 08 aa 1f 48 69 9f 8f ac | natd_hash: hash= 3e 3c 6c 93 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 84 da 3f 80 5c a8 47 c1 08 aa 1f 48 69 9f 8f ac | Notify data 3e 3c 6c 93 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #40 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #40: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #40 to 4294967295 after switching state | Message ID: IKE #40 skipping update_recv as MD is fake | Message ID: sent #40 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-40" #40: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.40:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #40) | f4 2d ea 23 2d fd 9f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 1a 9e 5c fb fb e3 3a 12 40 55 ea 02 66 64 cb | 69 42 9f 9e 73 38 34 f9 9b 29 99 d0 1f 2f 62 b0 | ff 78 90 10 b8 86 3f 49 a8 32 be f6 08 0d 11 29 | 94 2b 8b de b8 63 2c 35 79 92 00 39 68 56 d7 ad | 7e 9a a2 59 50 2b c4 f8 63 a3 0c 5d 5e 44 62 5b | fc 42 68 dd ca 56 4c 44 63 17 39 39 e0 00 1c 8f | c5 28 a6 4f 80 e9 f0 8c 5a ea 63 37 5f d7 0a a3 | b8 dc 6a fd 41 02 14 01 fa 2f 62 ae cb f1 1e 40 | 2f 20 1d 4c b4 7d c9 2c fa 60 f5 5e 61 26 a0 89 | b5 80 ba fe 31 f9 79 3e 12 33 cf 6c 99 9f 52 55 | 62 d6 02 f9 0e 35 e1 e7 8d 67 93 09 10 77 15 30 | 4a e9 d6 a0 31 50 fb be 13 05 50 dc f4 46 03 08 | 2f 95 1b 33 25 b1 ea 42 27 b1 8d 6c a6 26 e8 12 | 28 ee 49 16 a3 ec 76 ad 9e 1b cb d5 8a 26 5b 22 | 55 46 26 40 fb a4 30 9e 31 e9 07 5c 3b f7 53 4f | 4f ec 0e ee ad 7e 3f fc 05 9c b5 15 17 a2 62 3f | 29 00 00 24 28 3a b9 16 f5 d3 fa 3e 82 0e 6c a5 | b6 e0 32 27 f5 86 22 6d 8d 85 0f 17 f1 b4 a5 df | eb 51 66 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 e9 4b 4d 06 92 e2 ba cc 1d e9 b2 | 45 c8 92 47 34 22 29 80 00 00 00 1c 00 00 40 05 | 84 da 3f 80 5c a8 47 c1 08 aa 1f 48 69 9f 8f ac | 3e 3c 6c 93 | state #40 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37000cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469ec960 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e05a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #40 | libevent_malloc: new ptr-libevent@0x7fb37000cf80 size 128 | #40 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49604.110276 | resume sending helper answer for #40 suppresed complete_v2_state_transition() and stole MD | #40 spent 0.5 milliseconds in resume sending helper answer | stop processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb33800cf80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 2d ea 23 2d fd 9f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #40 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #40 | rejected packet: | f4 2d ea 23 2d fd 9f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #40: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #33 | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #33 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #33 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49604.111464; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500023 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8cc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #33 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 "road-eastnet-nonat-33" #33: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #33) | c7 46 be 2e 5d 25 78 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 fb 56 35 bc 7c 07 73 43 c0 53 96 f8 9b 69 93 | 49 fe be 57 af 79 18 68 5a 92 2b 2b a6 ed e4 23 | 35 6b 49 80 b0 8c 38 3d c5 a9 f4 61 c1 8b 08 4d | 96 53 f0 d9 1b 6c 56 bc 0d ea 97 5b b0 d7 0d 16 | 49 88 40 6d 71 9e 2d 30 fe 42 42 37 20 10 14 5c | 75 38 c4 da 71 b3 b1 3b a6 23 58 dc a3 9a e0 40 | ae dc 8e cf de 76 e6 55 4e 33 19 fe 18 08 f5 70 | 8e 50 6f 64 32 2f d6 7a 45 39 d0 ba 32 a4 1e ab | 2d 4d 83 e7 1f d4 28 47 30 da f7 2e a0 79 9c 09 | 2b 6b 46 2e c8 c1 e5 37 84 54 0b 0c 97 40 ae db | 52 08 f5 e5 d5 a9 49 2a c9 b8 1f f6 14 c7 78 d5 | 70 93 cb 5e 8c 96 b6 ac 74 c2 85 cf 89 ad 75 5d | fe 0b 68 86 21 96 4e 79 63 5a 81 98 b3 45 c5 f0 | b2 fd 49 e2 ff b2 a3 2c 96 3c ba 10 d8 3f 86 56 | e0 c6 d2 d5 d7 7d 5f 52 2a 95 0f 65 04 12 82 60 | e3 5b 42 b7 a8 9e 92 b0 fa 34 79 45 e1 34 ab c5 | 29 00 00 24 b8 c6 4b 62 72 20 c9 09 07 72 44 d0 | 79 00 e2 dc 8f 6b 83 e9 3d 67 2f d3 a6 5d 27 77 | 58 61 12 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 b6 d4 e5 76 6f b7 90 e8 c3 ad b3 | 49 49 44 7a b5 13 9b a6 00 00 00 1c 00 00 40 05 | 15 0a 54 d9 c3 ee ba ab b9 96 60 bb a3 40 4e fb | d5 1b 34 be | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #33 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 46 be 2e 5d 25 78 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #33 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #33 | rejected packet: | c7 46 be 2e 5d 25 78 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #33: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0656 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #27 | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #27 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #27 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49604.165781; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001533 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #27 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 "road-eastnet-nonat-27" #27: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #27) | dd bb 9e aa 71 2c a8 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa f5 f3 8a 2e ca 64 13 4e ef 73 e4 1f 3e 67 ad | a1 5c bf b8 82 2d 98 4b ba 2f 4b 9c 4a 49 f6 7b | 11 53 66 d7 f2 df c6 4d 6c e8 fe ca eb 65 f7 23 | 79 97 e3 ea 55 ca fa 7d 0e 42 d8 5c 14 c7 91 72 | a4 fc cd 45 56 42 b0 30 e3 75 4e 16 78 7d 09 4f | c2 b4 68 6b 47 a2 0e 20 da b0 6a 41 7f ac 79 d0 | d4 2d 42 99 fd 0a 3a e2 6d 7f 90 e8 4d 1a 00 b2 | e9 9e 2f 5f 8c ef b1 f3 83 5d 30 13 95 c4 ca 84 | fc 5b f8 fd 99 e0 ef 1a ad a3 e3 11 fc de 8e cc | 62 ac 46 25 e8 4f ae 15 57 eb 6c c5 d8 d5 81 b9 | c0 5f a7 29 95 52 01 a8 27 41 88 9f 21 51 57 97 | 0e c0 5b 72 b9 1f 72 3e c5 18 84 95 8f 3a f7 5b | 8e ab cb da 5c d8 78 8b 6b d1 3d 62 f9 12 53 ba | 86 1f 8f 29 ce 9f 76 76 1e 5f 01 99 06 da 91 72 | f3 a9 41 c1 f1 95 87 95 cf 5a fe 09 57 13 44 9d | 62 a4 a9 60 fa 79 cc f9 5d bf f3 2b 5c 5b b4 99 | 29 00 00 24 55 62 09 8a 44 b4 a9 1d d9 35 9c 9a | 78 93 87 c8 d6 2b f2 b0 a8 b2 26 80 5e 03 70 47 | 73 8a 49 c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ef ee 96 1f 62 1c cd f0 a1 f5 67 ee | 76 d8 b6 28 a5 c0 9f 1d 00 00 00 1c 00 00 40 05 | 69 41 25 fb 01 9f 0c 01 9b e6 f4 5d 86 8e 8e d0 | 2b 2d f0 b6 | libevent_free: release ptr-libevent@0x7fb38800a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #27 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd bb 9e aa 71 2c a8 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #27 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #27 | rejected packet: | dd bb 9e aa 71 2c a8 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #27: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0752 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #34 | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #34 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #34 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49604.175108; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500849 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #34 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 "road-eastnet-nonat-34" #34: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #34) | 6d a4 8e 40 25 ac 37 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 f2 a8 cc bb ec 52 8f ff d3 4f 1e 29 f8 d2 55 | ab 15 48 e3 86 d2 3c 7c c1 31 02 4c e6 92 88 7e | 1c 57 68 2c 31 6d 99 d6 04 b4 80 d9 9e 5d d6 2f | 5a 7c 33 74 f6 a2 f4 af 71 14 01 00 45 ac 02 2c | ae fd dc f0 fb 16 b1 b8 bb b1 c9 b6 79 4a 45 9c | f4 6e 30 a0 38 dd b1 84 0e 3d b2 47 58 b0 ed c1 | 2c 5c e6 69 11 9f 94 94 7a 6d 4e 80 2c 22 d1 2d | b1 3c 47 06 4d 81 ee b9 c9 ba 0f 94 7b ed d2 71 | 8c 4b 77 a2 43 7f 68 8c 2b 66 69 53 94 cf 5a 27 | 05 7e 88 ec 42 d8 31 27 ae 04 92 bf 4a 26 5e 51 | 58 d6 5c 7a 0b 0b 73 c1 d6 39 9b da c3 56 61 4e | 3f 7e 4e 21 30 a1 53 bd c0 b7 f9 c7 e1 cc 61 3a | e9 b4 0e 5d 6b 1a 6c d3 c1 42 80 a0 b9 ee e4 20 | 50 5f 0b 18 55 d4 17 9c be 51 af c3 be 4e 5f 48 | b1 02 bd 4d 0a 84 45 32 17 0f c9 bf 50 68 f3 a6 | 11 69 ef 13 ba a2 fb dd c4 95 c8 b3 71 8c 02 9e | 29 00 00 24 20 3c 42 13 ea f1 47 8b ab 88 6c 38 | 29 a2 e3 60 5f 2e e8 36 7d 92 76 6d 48 1c fe a8 | 8c f2 3e 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 92 97 87 98 41 7a 2f 24 03 5c de | 5f 9b fc ff 10 46 f5 79 00 00 00 1c 00 00 40 05 | 10 63 6f 88 71 aa 1b 8a ba b8 d4 ac c9 e8 55 07 | 6b c5 63 c0 | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #34 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d a4 8e 40 25 ac 37 c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #34 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #34 | rejected packet: | 6d a4 8e 40 25 ac 37 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #34: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0711 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-41" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-41' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #41 at 0x557d46a0ca50 | State DB: adding IKEv2 state #41 in UNDEFINED | pstats #41 ikev2.ike started | Message ID: init #41: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #41: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #41; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-41" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-41" IKE SA #41 "road-eastnet-nonat-41" "road-eastnet-nonat-41" #41: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-41 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-41": constructed local IKE proposals for road-eastnet-nonat-41 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 41 for state #41 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb370005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #41 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 | #41 spent 0.144 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-41" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.234 milliseconds in whack | crypto helper 1 resuming | crypto helper 1 starting work-order 41 for state #41 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 41 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 41 time elapsed 0.000972 seconds | (#41) spent 0.967 milliseconds in crypto helper computing work-order 41: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 41 for state #41 to event queue | scheduling resume sending helper answer for #41 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #41 | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 41 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #41 | **emit ISAKMP Message: | initiator cookie: | 8c ff 26 ec fd d0 54 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-41 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ed 6e ec 95 3c 3a 16 99 41 58 58 6d 01 e2 00 52 | ikev2 g^x 61 4b c1 ec e1 3d d8 4e 54 c1 3f 99 6b 75 66 7c | ikev2 g^x 92 13 65 ae e7 70 46 75 9c c5 22 7e 39 16 2c 7c | ikev2 g^x ed 79 f7 7b 1e 03 31 32 5f 32 c2 43 74 2e 80 66 | ikev2 g^x 05 70 11 cc 43 ce 1e db 54 28 24 d1 42 b1 78 ad | ikev2 g^x e4 d1 e6 87 87 84 0f b3 11 50 a6 79 e1 08 7c 97 | ikev2 g^x 7e bd ba 46 ef f8 51 ce 68 86 83 2a 2c 29 00 29 | ikev2 g^x a5 58 88 f4 ed 2a f4 20 30 da 5d b1 69 45 2e 86 | ikev2 g^x 07 5f aa 0a 89 4a 6e 50 df 32 c3 37 59 a0 ba ad | ikev2 g^x 86 bd 19 1f 9a e2 19 57 1e fc 59 a2 20 ba a6 61 | ikev2 g^x df 8c b1 78 f4 73 20 28 d7 5d 27 a9 6d f4 51 05 | ikev2 g^x 00 85 1f 11 24 82 a0 ad b8 70 fc 6e 4d 99 a5 50 | ikev2 g^x dd 2e 79 4a 4c a1 78 07 7c f4 48 8d c5 cd ae 3d | ikev2 g^x 60 f1 3e 46 13 92 0c ad 34 dc 62 b8 45 01 1d 0e | ikev2 g^x 54 aa 15 f0 b8 36 03 5c 9a b5 ba b5 7c 77 32 6f | ikev2 g^x a5 95 b6 eb ec c2 d3 a2 c8 7a f9 23 04 ed b5 3b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d2 1e ab ae e7 c2 8c f2 ef 74 c1 f0 3d f2 d7 f9 | IKEv2 nonce 46 a9 e4 e0 b6 87 92 c1 10 9a fa bd 74 9b e3 b3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8c ff 26 ec fd d0 54 cf | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 29 | natd_hash: port= 01 f4 | natd_hash: hash= 5c 98 3f 00 de 9d 4b 8f 8e e4 88 e6 cb 33 f8 3a | natd_hash: hash= c9 9d db 23 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5c 98 3f 00 de 9d 4b 8f 8e e4 88 e6 cb 33 f8 3a | Notify data c9 9d db 23 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8c ff 26 ec fd d0 54 cf | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7d 19 19 07 bb fc 4c f4 5b 43 3f 70 14 2d 10 a5 | natd_hash: hash= 77 03 39 4f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7d 19 19 07 bb fc 4c f4 5b 43 3f 70 14 2d 10 a5 | Notify data 77 03 39 4f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #41 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #41: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #41 to 4294967295 after switching state | Message ID: IKE #41 skipping update_recv as MD is fake | Message ID: sent #41 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-41" #41: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.41:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #41) | 8c ff 26 ec fd d0 54 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 6e ec 95 3c 3a 16 99 41 58 58 6d 01 e2 00 52 | 61 4b c1 ec e1 3d d8 4e 54 c1 3f 99 6b 75 66 7c | 92 13 65 ae e7 70 46 75 9c c5 22 7e 39 16 2c 7c | ed 79 f7 7b 1e 03 31 32 5f 32 c2 43 74 2e 80 66 | 05 70 11 cc 43 ce 1e db 54 28 24 d1 42 b1 78 ad | e4 d1 e6 87 87 84 0f b3 11 50 a6 79 e1 08 7c 97 | 7e bd ba 46 ef f8 51 ce 68 86 83 2a 2c 29 00 29 | a5 58 88 f4 ed 2a f4 20 30 da 5d b1 69 45 2e 86 | 07 5f aa 0a 89 4a 6e 50 df 32 c3 37 59 a0 ba ad | 86 bd 19 1f 9a e2 19 57 1e fc 59 a2 20 ba a6 61 | df 8c b1 78 f4 73 20 28 d7 5d 27 a9 6d f4 51 05 | 00 85 1f 11 24 82 a0 ad b8 70 fc 6e 4d 99 a5 50 | dd 2e 79 4a 4c a1 78 07 7c f4 48 8d c5 cd ae 3d | 60 f1 3e 46 13 92 0c ad 34 dc 62 b8 45 01 1d 0e | 54 aa 15 f0 b8 36 03 5c 9a b5 ba b5 7c 77 32 6f | a5 95 b6 eb ec c2 d3 a2 c8 7a f9 23 04 ed b5 3b | 29 00 00 24 d2 1e ab ae e7 c2 8c f2 ef 74 c1 f0 | 3d f2 d7 f9 46 a9 e4 e0 b6 87 92 c1 10 9a fa bd | 74 9b e3 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 98 3f 00 de 9d 4b 8f 8e e4 88 e6 | cb 33 f8 3a c9 9d db 23 00 00 00 1c 00 00 40 05 | 7d 19 19 07 bb fc 4c f4 5b 43 3f 70 14 2d 10 a5 | 77 03 39 4f | state #41 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb370005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #41 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 | #41 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49604.204545 | resume sending helper answer for #41 suppresed complete_v2_state_transition() and stole MD | #41 spent 0.479 milliseconds in resume sending helper answer | stop processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38800fb00 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c ff 26 ec fd d0 54 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #41 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #41 | rejected packet: | 8c ff 26 ec fd d0 54 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #41: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f61a0 | handling event EVENT_RETRANSMIT for parent state #28 | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #28 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #28 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49604.228747; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001871 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ec960 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #28 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 "road-eastnet-nonat-28" #28: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #28) | 8a 4b 73 21 31 f2 6a 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 df aa e5 83 52 1a b7 2d d0 6a 7e dc d8 a5 d6 | 60 61 e0 83 0f 2b 6a 2b b8 0c 87 3f 14 f7 2a a4 | 98 70 c5 3a a2 0f 1f 46 6a b1 86 1e e5 5c 59 31 | 32 22 91 5d a2 6a 04 29 2b 10 13 47 0d 40 ca 72 | cd e0 cf f3 84 ed 4f bf 99 02 d6 fe 28 30 e6 6c | 0e 7e ca 11 f9 11 9f a6 4c d1 42 ed 4a 0f de 1b | d1 6c 18 cd c5 6b d0 23 4a e0 04 a7 c5 ef 74 ac | 27 c8 ec 0e 1f 0d 3c 8b a9 02 76 2a 67 8e fc de | 50 4d 80 13 28 3f 33 79 17 2e 6d b4 b5 19 8a 07 | 87 4a ec 6e c5 3c fb 34 d8 bf 04 77 90 53 b4 91 | 82 d0 d4 cb ca fc 05 22 43 e7 d4 8d 52 a6 ff 42 | 3e 8b bc 55 2d a6 ee 39 af 98 64 0e 18 a4 e9 08 | 5d d9 7e 8e 5f 00 df 4b 1b cc 49 d9 d0 64 64 c8 | 91 98 82 46 10 8e 0a 7c d6 f9 65 30 9e a6 47 1d | b8 47 35 3b c7 13 08 d5 39 45 15 b2 10 ce ee 48 | 7d d8 33 00 3c 55 6c 41 f3 1e 7b 0e 34 03 4f b7 | 29 00 00 24 ad 13 98 57 a2 9c 4e ec e1 0a 80 5c | a0 80 42 e1 ab 4f 47 32 a1 1d 36 58 8b 1c 71 8b | 25 4d b5 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 83 6c 60 48 f0 55 9f 8d d1 7e b1 | fd da e6 ac 8a a5 fd 2f 00 00 00 1c 00 00 40 05 | 4a 9c 1d b6 db 3c dd 9b 4a da 5d 6f ea e8 da 4e | 08 2e ae f5 | libevent_free: release ptr-libevent@0x7fb35000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f61a0 | #28 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 4b 73 21 31 f2 6a 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #28 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #28 | rejected packet: | 8a 4b 73 21 31 f2 6a 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #28: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #35 | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #35 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #35 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49604.24117; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501245 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8d60 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #35 | libevent_malloc: new ptr-libevent@0x7fb35000cf80 size 128 "road-eastnet-nonat-35" #35: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #35) | ef 15 ea 36 a5 a5 5c 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 96 b3 aa c0 4d d9 88 e5 ac e1 94 c5 3f 96 d9 | b4 11 6c 13 85 3c 47 49 a4 e7 6c bf 49 2c f7 e6 | 82 c1 3a 00 a1 f9 46 f7 54 13 9f 65 48 18 8b 9f | e6 da f8 f3 07 a0 ac 41 d5 a9 3b e6 a7 7c a3 81 | db 32 9e 99 47 70 04 b0 f4 2d a4 b0 a4 3b e1 28 | 9f 63 a2 94 b7 1f 9e 68 18 47 6f ef 05 c0 65 15 | cc 6b 7e 6d 5e e8 2a 06 87 47 6c aa e2 89 a2 b1 | 87 d5 9a c7 5c f6 c5 c9 ef 9a f5 1e 14 44 ed f6 | 21 c2 10 91 92 32 f4 48 3d 48 76 7f da 54 41 70 | 3a 27 f3 0e a6 36 ab ef 51 4a ee 27 f3 fa b5 4a | 81 80 97 f8 12 4a 6b 6e 11 f7 41 fe d5 56 ec af | 7e dc 33 c0 77 e2 37 b5 3f fc b0 40 58 cb 92 b6 | 44 3d 99 0d 17 ae 15 bb a7 c0 2c 1d dc 42 f0 67 | d6 5a 17 88 ce 32 f6 da 90 65 b7 17 83 70 da 67 | c5 33 42 42 d7 1a 6c 70 ed 40 df e9 ee 39 2a 8f | f5 b4 db 3f e7 42 51 2e 4d a9 fe 76 ba 09 20 58 | 29 00 00 24 f0 8c e1 d2 ee 2f 9e 4d 17 8a 20 ca | cf 55 95 6a 83 c3 98 8f db 61 db bb f1 69 5e b0 | e6 61 e7 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 5c ea 28 17 8f c3 f5 57 90 ad 1e | 3a ae c2 e5 e1 92 7b 3c 00 00 00 1c 00 00 40 05 | cb 88 24 12 73 0e 41 cb fe 6b 7e d6 a5 c0 bb a2 | e1 60 1e c0 | libevent_free: release ptr-libevent@0x7fb36800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #35 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 15 ea 36 a5 a5 5c 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #35 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #35 | rejected packet: | ef 15 ea 36 a5 a5 5c 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #35: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #17 | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #17 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #17 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49604.246084; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00644 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #17 | libevent_malloc: new ptr-libevent@0x7fb36800cf80 size 128 "road-eastnet-nonat-17" #17: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #17) | 95 d9 df c6 2f 4d 0c 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 5e 55 de a7 df 8c 8d ec f1 a6 b3 e1 a3 c9 2d | 5c 34 98 9a bf 18 3c 5f 5f 84 6f cc 00 89 2f b6 | 2e 0d 8a f0 e8 8a 33 b9 9f e3 4d bb 6f 5d 7f 7f | 55 e8 00 b1 58 6d 0f 17 37 b6 dc aa e5 63 e1 98 | c3 81 a6 04 b7 5c e1 a6 b2 29 9c 5a 0a 92 22 a4 | dd 4c 33 c2 4e 6f 90 29 c5 be 39 30 e7 2e 62 6c | 05 d7 89 8e 0f da b5 53 da 3f 31 31 12 b0 4c a7 | e6 a2 e9 57 ae d6 ea 04 d8 8b 73 ef 0e 9c 95 4e | 4b da 65 9c ef 6c 55 46 7d 0a 54 0c 93 37 db 94 | 63 8b a7 e9 ec 58 ed b4 f2 15 0c b0 9d 7b 2c 0d | 1e e8 20 04 e7 f0 90 d5 81 ce 8a 1d d9 30 60 b1 | c6 44 b1 01 fa 02 ef 06 8d 26 a1 09 a3 ce f8 2b | cd fc 0a 07 b0 8e b6 9d e8 6f 0c f0 b6 d6 40 9f | 58 4b a3 1f 87 35 a9 b2 45 93 43 35 38 68 86 6f | ea 62 4d 90 7e b9 e7 0c 07 f5 2a d5 71 68 12 96 | 09 17 2e 55 3e a1 6c 35 b5 20 1e 2a bf 27 6e 02 | 29 00 00 24 bf 2e 79 82 7e c6 1a 66 e2 b9 4b 2e | f8 c7 dc 78 b4 81 b9 5d 2e e5 4c 2c 27 2c b6 31 | c3 63 bf d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 f5 2d 98 10 e8 c0 4d c4 df 42 b6 | b0 c6 0b 95 91 b6 b4 67 00 00 00 1c 00 00 40 05 | 6f dc f7 24 ac 26 1a a6 48 cc ee 5d 39 06 66 40 | 4c d6 6b fc | libevent_free: release ptr-libevent@0x7fb358009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | #17 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 d9 df c6 2f 4d 0c 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #17 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #17 | rejected packet: | 95 d9 df c6 2f 4d 0c 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #17: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0731 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #1 | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #1 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #1 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49604.276114; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.013396 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #1 | libevent_malloc: new ptr-libevent@0x7fb358009640 size 128 "road-eastnet-nonat-1" #1: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #1) | 6c 47 a0 1e 4e 7a e8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 72 0a 33 22 17 06 fc fa 28 91 b3 4f 57 56 e3 | ee 34 d7 20 66 52 7a 35 d8 92 bd 3b 01 15 87 45 | 58 9b 73 12 6d c9 2d 63 ff 30 68 a3 01 b0 11 62 | 0d 6a c8 7a 26 90 7a 07 0b 27 d1 49 b8 5c b5 22 | a1 78 8f 5c ca 62 0b 66 89 cf a4 d3 28 f3 60 65 | c4 0b 09 ab 6c 65 0c 24 ce 5f 6b 9e 2d 74 21 c1 | cc dd a3 d2 b1 b2 d7 b0 e3 c8 e7 e0 b1 08 40 98 | ea 60 7f cb f6 03 0b de 16 74 c6 45 5a 5d fd 06 | 19 e0 e9 1d 81 07 89 02 31 28 9a 67 2f ad 6e 4a | 5d d5 b0 90 bd e1 d1 0c 6f c0 ca db 12 8a 57 f5 | 47 c8 09 2a 1b de 2b dc d0 ab ee bf fc be 4f ae | f0 8e 4b a7 a7 58 e9 98 9f 49 09 09 2b 4d 67 80 | 28 41 88 84 93 b4 f0 c4 d7 78 27 c0 fe b8 4a 13 | 52 ab 44 91 d1 9f f2 59 6f dd 35 3c 1e 70 9c d8 | 9d ab 34 6f 48 48 c0 46 69 91 44 bd 80 07 2d e1 | 42 55 8f bd 8c 53 47 7c 85 94 0c 8c ae 5e 19 a4 | 29 00 00 24 e7 5a 07 18 3f 34 30 d2 f0 5d 94 65 | 65 0d d9 4a 64 02 60 6e 32 ba 95 35 8b ff 59 40 | 3a 8b 9e 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 00 78 5c 8b 16 a5 c0 7d 51 c3 29 | 54 44 32 39 1b 8f 23 e8 00 00 00 1c 00 00 40 05 | 68 e9 c0 40 f1 97 39 51 93 0a 30 e5 6a bd eb d1 | f4 d9 bb 8c | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #1 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 47 a0 1e 4e 7a e8 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #1 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #1 | rejected packet: | 6c 47 a0 1e 4e 7a e8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #1: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0711 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-42" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-42' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #42 at 0x557d46a0e010 | State DB: adding IKEv2 state #42 in UNDEFINED | pstats #42 ikev2.ike started | Message ID: init #42: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #42: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #42; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-42" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-42" IKE SA #42 "road-eastnet-nonat-42" "road-eastnet-nonat-42" #42: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-42 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-42": constructed local IKE proposals for road-eastnet-nonat-42 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 42 for state #42 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb380002b20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #42 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 | #42 spent 0.151 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-42" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.233 milliseconds in whack | crypto helper 2 resuming | crypto helper 2 starting work-order 42 for state #42 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 42 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 42 time elapsed 0.000985 seconds | (#42) spent 0.991 milliseconds in crypto helper computing work-order 42: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 42 for state #42 to event queue | scheduling resume sending helper answer for #42 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #42 | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 42 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #42 | **emit ISAKMP Message: | initiator cookie: | 6d 45 59 82 ce 2c 77 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-42 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 19 87 21 99 aa 5a cb db ce 0f 02 f2 50 c9 ac 92 | ikev2 g^x 89 7c 70 85 a8 a7 33 4a c2 44 36 a5 03 8e 1f 50 | ikev2 g^x c8 86 2e d1 a1 d8 14 17 9c 7c a1 44 65 ba 61 77 | ikev2 g^x f0 62 19 6f f9 72 cc 36 22 03 c3 7d e3 8c 01 7c | ikev2 g^x 58 c0 91 2e 4f 24 ac cd af f7 da 61 3e 4b 43 c9 | ikev2 g^x b4 5d 67 e2 f1 65 be 23 88 f7 f4 e6 25 50 c9 e3 | ikev2 g^x 21 af 1c 45 62 8a 73 3a 98 47 b9 78 6f ee 87 26 | ikev2 g^x 3b 63 01 1e 58 61 99 0e 7a 91 7d 30 e0 59 53 0b | ikev2 g^x 92 57 66 fd a7 1f 2b 11 d7 59 95 9a 31 fc 95 b7 | ikev2 g^x 6b 6d 54 d3 d2 0f 8f 6e 22 a6 95 24 ad 69 c7 e4 | ikev2 g^x 30 99 2e f3 f9 ce 36 7f 2b 10 24 3b 8a de bf 7e | ikev2 g^x cb e6 f5 71 51 3c fe 08 40 b7 0a aa 06 06 b7 d2 | ikev2 g^x 69 fa d5 d4 16 ea b0 b1 e6 af 20 69 3c 12 1e 86 | ikev2 g^x 3a 05 a1 45 01 d3 59 e6 49 c9 c2 6a 69 6b a1 a1 | ikev2 g^x b0 18 e7 68 dc 1f 70 e8 33 59 8d 8e 1f 6a e1 13 | ikev2 g^x 5e 04 b2 02 62 fb f4 16 44 cd 9d 1e 33 84 73 83 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 98 90 54 f6 26 53 aa 96 7a 47 ff f3 5b dc e1 95 | IKEv2 nonce 5c f0 6d 5d ed 6d 00 c6 1d e8 59 f1 2a 1c 8a 37 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6d 45 59 82 ce 2c 77 92 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2a | natd_hash: port= 01 f4 | natd_hash: hash= f6 cb 92 0c 07 24 d9 90 48 22 d8 76 e5 5b bc c8 | natd_hash: hash= 39 99 d2 4d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f6 cb 92 0c 07 24 d9 90 48 22 d8 76 e5 5b bc c8 | Notify data 39 99 d2 4d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6d 45 59 82 ce 2c 77 92 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= cb e3 e2 5e 9a 09 f4 90 ee 73 df 07 77 16 6b 37 | natd_hash: hash= da 99 3b e3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cb e3 e2 5e 9a 09 f4 90 ee 73 df 07 77 16 6b 37 | Notify data da 99 3b e3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #42 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #42: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #42 to 4294967295 after switching state | Message ID: IKE #42 skipping update_recv as MD is fake | Message ID: sent #42 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-42" #42: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.42:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #42) | 6d 45 59 82 ce 2c 77 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 19 87 21 99 aa 5a cb db ce 0f 02 f2 50 c9 ac 92 | 89 7c 70 85 a8 a7 33 4a c2 44 36 a5 03 8e 1f 50 | c8 86 2e d1 a1 d8 14 17 9c 7c a1 44 65 ba 61 77 | f0 62 19 6f f9 72 cc 36 22 03 c3 7d e3 8c 01 7c | 58 c0 91 2e 4f 24 ac cd af f7 da 61 3e 4b 43 c9 | b4 5d 67 e2 f1 65 be 23 88 f7 f4 e6 25 50 c9 e3 | 21 af 1c 45 62 8a 73 3a 98 47 b9 78 6f ee 87 26 | 3b 63 01 1e 58 61 99 0e 7a 91 7d 30 e0 59 53 0b | 92 57 66 fd a7 1f 2b 11 d7 59 95 9a 31 fc 95 b7 | 6b 6d 54 d3 d2 0f 8f 6e 22 a6 95 24 ad 69 c7 e4 | 30 99 2e f3 f9 ce 36 7f 2b 10 24 3b 8a de bf 7e | cb e6 f5 71 51 3c fe 08 40 b7 0a aa 06 06 b7 d2 | 69 fa d5 d4 16 ea b0 b1 e6 af 20 69 3c 12 1e 86 | 3a 05 a1 45 01 d3 59 e6 49 c9 c2 6a 69 6b a1 a1 | b0 18 e7 68 dc 1f 70 e8 33 59 8d 8e 1f 6a e1 13 | 5e 04 b2 02 62 fb f4 16 44 cd 9d 1e 33 84 73 83 | 29 00 00 24 98 90 54 f6 26 53 aa 96 7a 47 ff f3 | 5b dc e1 95 5c f0 6d 5d ed 6d 00 c6 1d e8 59 f1 | 2a 1c 8a 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 cb 92 0c 07 24 d9 90 48 22 d8 76 | e5 5b bc c8 39 99 d2 4d 00 00 00 1c 00 00 40 05 | cb e3 e2 5e 9a 09 f4 90 ee 73 df 07 77 16 6b 37 | da 99 3b e3 | state #42 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb380002b20 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #42 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 | #42 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49604.288352 | resume sending helper answer for #42 suppresed complete_v2_state_transition() and stole MD | #42 spent 0.467 milliseconds in resume sending helper answer | stop processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38000fb00 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 45 59 82 ce 2c 77 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #42 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #42 | rejected packet: | 6d 45 59 82 ce 2c 77 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #42: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #29 | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #29 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #29 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49604.295288; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002152 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f61a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #29 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 "road-eastnet-nonat-29" #29: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #29) | 76 94 35 7f f9 86 66 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 c8 26 94 c9 ea 16 54 c7 a0 a7 ee 80 e9 d2 eb | c7 74 3d 70 a6 ce 1b 7f 47 b8 a9 22 6c e9 de 3e | 5e 1a da 80 d6 29 b5 60 85 8e c7 9a 07 14 0f 2e | 5e 85 13 8e 17 81 27 ae b9 44 36 2c 21 79 b7 4c | 9f fe 6e 8f 50 03 81 71 96 dc 7d 13 e0 2d e5 55 | 9d 35 cf 6e 26 2f 6c 88 8f fc 20 a1 7f b4 44 e0 | 98 88 95 7e ed 39 2c 67 fe ec 38 89 03 76 30 8b | 31 e8 7f 06 73 93 d0 0a 0d a2 5e e7 17 d8 ae 0f | 27 a8 77 dc e5 16 a6 b2 26 c7 b0 e5 80 71 68 10 | 38 5e 32 59 c0 68 b7 75 a8 13 99 bb ca 95 f9 78 | 1f 9b 7b 46 65 6b 90 b3 9b cd ca 91 c9 75 7e 4d | 2e 06 ee 10 f0 8c c2 89 1e c3 a8 05 28 9a e8 eb | 20 63 32 0f f1 3f 82 9c 83 27 56 48 7d 7c a9 e7 | f5 1b db 86 e5 b7 2b 70 8a da ea 00 2d 06 e8 11 | 3c 90 f7 22 75 39 1f c5 87 f2 55 24 18 21 90 81 | 04 ec 8f 65 74 d4 59 92 bb 69 88 b7 6d 42 21 28 | 29 00 00 24 36 a8 1f b0 73 93 1f c8 b8 98 90 7a | af 61 a7 3e 69 e8 46 34 d6 9e 89 22 1f 07 54 41 | cf b8 14 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 3a eb 7a 38 98 4c b3 ed b5 e4 e8 | 5b 3d 4d 17 15 a4 85 ff 00 00 00 1c 00 00 40 05 | c1 f9 34 11 26 e0 6f d6 1d 57 cb be 7c d0 71 cf | 3a bd fc a1 | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #29 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 94 35 7f f9 86 66 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #29 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #29 | rejected packet: | 76 94 35 7f f9 86 66 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #29: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0706 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e7260 | handling event EVENT_RETRANSMIT for parent state #36 | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #36 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #36 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49604.310644; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499444 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #36 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 "road-eastnet-nonat-36" #36: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #36) | c4 93 27 79 3b f0 36 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 44 1e 02 70 5f fd 14 41 57 b4 33 c5 4d c1 bf | 56 a3 d0 f5 4b 1b 15 73 5b 56 52 91 f2 4c 9d dc | 3f 2d 5a 36 27 be 97 1b 2d 43 21 16 b5 25 60 73 | 31 d7 04 cb ac b3 fd 19 61 2f 36 91 05 d7 55 8c | 92 5d 99 4b ae f6 cf a1 6e 2e de fa cb a4 7e 7e | b4 08 08 4f 90 51 13 b7 5b cb 7e 2c db 61 c5 d9 | d2 2f 86 cb df 97 d1 5e d4 95 3b c2 71 e2 2b bf | 7b e5 e9 8b bd 5c de 24 ac 5a 8b 4a 5d 3b ff 1e | f8 f4 2b 7b 96 0c 02 8f ac d9 62 f7 21 fb 07 5e | 9d 3f 41 15 d1 79 65 31 2a 68 5a 1a 56 fc 9c 2a | 20 90 63 93 fd d9 59 08 0d 3a 51 cc ee 1b ca 83 | 3c 5f 8f 03 9c cf 6f 04 52 23 a8 cb 50 43 72 18 | 78 cb 0f 8d bf 67 75 81 61 d9 91 a3 5f f5 1e ad | 09 8c 98 32 17 11 19 f3 54 f2 c6 36 e6 24 63 e2 | 41 b5 39 5c af a7 57 20 af 37 ac c1 12 94 ec 3a | e0 ac a7 07 42 78 d2 32 96 5c a0 ed 7e 90 04 46 | 29 00 00 24 e4 05 e8 ad 6f 35 18 e8 9c ba 2a d7 | ba f9 eb 8c c3 7b 43 88 9a 23 1f e0 cb de a0 8e | 76 67 65 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab a4 b2 11 db 45 90 fb 99 ab 4d 81 | 85 c6 e5 03 d5 18 31 7d 00 00 00 1c 00 00 40 05 | 9e c9 75 d2 3b 5d 13 cd bd fe b5 96 1f 79 bf 21 | fa a0 06 d7 | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e7260 | #36 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 93 27 79 3b f0 36 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #36 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #36 | rejected packet: | c4 93 27 79 3b f0 36 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #36: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #18 | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #18 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #18 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49604.331989; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002822 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ffbf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #18 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 "road-eastnet-nonat-18" #18: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #18) | fb 32 f3 fa 98 61 11 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 1b 0e e3 36 19 71 f2 00 c4 a6 18 1e bb 4a b9 | 3f d0 79 e4 4c 35 e5 1e 56 1e d1 56 df b2 32 fa | cb c3 c2 d3 4a 94 0b 28 4c 8e ed f1 14 00 ce ed | b6 d4 73 ac db 94 04 97 4d da 90 7f 61 f0 d2 4f | 60 04 42 6d 98 5c e4 05 d2 7d 05 4f 2d 99 94 a5 | 24 07 67 86 b6 21 b9 09 3a ea 16 cd cc b4 37 10 | 72 43 f6 be 6d 76 63 9b 24 f5 23 e6 b1 48 bc f9 | f2 cf d4 72 32 75 ee 93 a2 3d a2 fc 4d 35 5b 06 | 2a 31 6e 66 38 b7 b9 5b ce 6b 7a 5c 24 6c c6 91 | 21 f8 32 cc e1 e9 56 aa 56 2c 50 74 9d 0e c3 9c | b6 78 ee 5d a7 11 af c5 d5 50 6d b5 f0 a5 9d 4e | 3f d5 dc b9 6a 00 2b e1 dd 5f 8a e9 31 c5 30 8b | ee 43 f2 79 32 71 d6 e9 6e 27 23 22 2e 49 e0 0f | a1 32 43 40 65 d3 35 9f 97 aa f2 5c 61 69 29 93 | 3e f9 84 1e 9a f8 ea a4 2a 81 be 45 2f 6a 95 39 | a8 bb 2b 71 c2 45 83 fa e9 8d 63 1f 25 98 d1 4c | 29 00 00 24 64 09 7d 4a c3 95 64 a7 f6 f8 ca 35 | d6 3a 22 ea 52 84 43 22 db d2 95 2f 1d 96 44 f9 | 61 f7 89 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 f9 c7 a2 f7 e0 10 e9 b6 c5 14 f2 | 0e d4 f3 ff 41 9a 2e 34 00 00 00 1c 00 00 40 05 | be 8c d9 50 c4 e0 70 2a 58 15 0e 32 3f df db 0d | 01 81 6c d8 | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #18 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 32 f3 fa 98 61 11 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #18 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #18 | rejected packet: | fb 32 f3 fa 98 61 11 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #18: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-43" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-43' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #43 at 0x557d46a0f5d0 | State DB: adding IKEv2 state #43 in UNDEFINED | pstats #43 ikev2.ike started | Message ID: init #43: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #43: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #43; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-43" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-43" IKE SA #43 "road-eastnet-nonat-43" "road-eastnet-nonat-43" #43: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-43 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-43": constructed local IKE proposals for road-eastnet-nonat-43 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 43 for state #43 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb368005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #43 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 | #43 spent 0.143 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-43" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.229 milliseconds in whack | crypto helper 0 resuming | crypto helper 0 starting work-order 43 for state #43 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 43 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 43 time elapsed 0.001006 seconds | (#43) spent 0.981 milliseconds in crypto helper computing work-order 43: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 43 for state #43 to event queue | scheduling resume sending helper answer for #43 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #43 | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 43 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #43 | **emit ISAKMP Message: | initiator cookie: | cc ee 6c 19 e2 66 91 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-43 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e5 b3 dc 74 af 8b 5f 17 f2 a2 67 e8 55 b6 7f 2f | ikev2 g^x d6 4e 7a 73 eb 13 7d 78 44 82 5e 9f c0 c9 a7 ce | ikev2 g^x 19 55 10 32 8b 27 a5 29 28 74 fd 00 e6 f7 6a 74 | ikev2 g^x 56 7d 4b 3f aa d7 b5 46 cb 2d 3c a3 dc 3f bf 05 | ikev2 g^x 8d ef fa 60 0a d7 e7 b4 43 44 81 a1 10 dd db 69 | ikev2 g^x 30 53 16 90 a0 49 c9 94 16 9b 8e 16 05 cc a3 b0 | ikev2 g^x bb c8 6f 12 2c 69 ac ba c2 57 c1 0e 1d 24 c4 b7 | ikev2 g^x c5 6e 9f 50 e2 e4 26 8c 25 36 d7 6d d8 cd 2c bd | ikev2 g^x d4 0a 33 47 c9 6e 1d c8 6c 02 27 85 0b ac 4e d8 | ikev2 g^x 84 b3 28 76 fc c6 2f a9 af 4b b0 f5 08 9e 56 b5 | ikev2 g^x 24 d4 f4 cb 0a 9c 0d ce 12 fa 25 29 9d 95 d6 4a | ikev2 g^x 9a e8 aa eb d1 08 9a 51 c5 21 4d b3 dd e9 4f d9 | ikev2 g^x a6 74 14 2d 42 fa 5e 68 63 d0 8e 8d 34 39 23 04 | ikev2 g^x 84 91 4d 1d 1d 39 77 e7 bb f1 e3 79 e8 0b 4e 9f | ikev2 g^x 52 2d 52 8d 33 23 04 37 3b 2c 9b 0f 37 da 18 16 | ikev2 g^x 07 6b 4f 80 6f e8 48 15 68 23 83 ca b6 b1 12 eb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d5 f8 b0 cb f4 3b d7 c6 a9 5b 1f ef 6f 5a 34 02 | IKEv2 nonce 07 02 b5 92 c9 43 df 42 45 9e 46 a4 f2 42 44 23 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cc ee 6c 19 e2 66 91 8b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2b | natd_hash: port= 01 f4 | natd_hash: hash= b0 70 b3 40 c0 d2 23 ad 4c 6d 70 f1 0b c9 5a 99 | natd_hash: hash= fd 55 fa c5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b0 70 b3 40 c0 d2 23 ad 4c 6d 70 f1 0b c9 5a 99 | Notify data fd 55 fa c5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cc ee 6c 19 e2 66 91 8b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= fc 9d 2b d9 20 f9 c1 0e d3 88 83 de d6 d0 5e 66 | natd_hash: hash= 9c 2c 6f e5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fc 9d 2b d9 20 f9 c1 0e d3 88 83 de d6 d0 5e 66 | Notify data 9c 2c 6f e5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #43 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #43: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #43 to 4294967295 after switching state | Message ID: IKE #43 skipping update_recv as MD is fake | Message ID: sent #43 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-43" #43: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.43:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #43) | cc ee 6c 19 e2 66 91 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 b3 dc 74 af 8b 5f 17 f2 a2 67 e8 55 b6 7f 2f | d6 4e 7a 73 eb 13 7d 78 44 82 5e 9f c0 c9 a7 ce | 19 55 10 32 8b 27 a5 29 28 74 fd 00 e6 f7 6a 74 | 56 7d 4b 3f aa d7 b5 46 cb 2d 3c a3 dc 3f bf 05 | 8d ef fa 60 0a d7 e7 b4 43 44 81 a1 10 dd db 69 | 30 53 16 90 a0 49 c9 94 16 9b 8e 16 05 cc a3 b0 | bb c8 6f 12 2c 69 ac ba c2 57 c1 0e 1d 24 c4 b7 | c5 6e 9f 50 e2 e4 26 8c 25 36 d7 6d d8 cd 2c bd | d4 0a 33 47 c9 6e 1d c8 6c 02 27 85 0b ac 4e d8 | 84 b3 28 76 fc c6 2f a9 af 4b b0 f5 08 9e 56 b5 | 24 d4 f4 cb 0a 9c 0d ce 12 fa 25 29 9d 95 d6 4a | 9a e8 aa eb d1 08 9a 51 c5 21 4d b3 dd e9 4f d9 | a6 74 14 2d 42 fa 5e 68 63 d0 8e 8d 34 39 23 04 | 84 91 4d 1d 1d 39 77 e7 bb f1 e3 79 e8 0b 4e 9f | 52 2d 52 8d 33 23 04 37 3b 2c 9b 0f 37 da 18 16 | 07 6b 4f 80 6f e8 48 15 68 23 83 ca b6 b1 12 eb | 29 00 00 24 d5 f8 b0 cb f4 3b d7 c6 a9 5b 1f ef | 6f 5a 34 02 07 02 b5 92 c9 43 df 42 45 9e 46 a4 | f2 42 44 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 70 b3 40 c0 d2 23 ad 4c 6d 70 f1 | 0b c9 5a 99 fd 55 fa c5 00 00 00 1c 00 00 40 05 | fc 9d 2b d9 20 f9 c1 0e d3 88 83 de d6 d0 5e 66 | 9c 2c 6f e5 | state #43 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb368005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #43 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 | #43 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49604.363956 | resume sending helper answer for #43 suppresed complete_v2_state_transition() and stole MD | #43 spent 0.484 milliseconds in resume sending helper answer | stop processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38400fb00 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc ee 6c 19 e2 66 91 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #43 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #43 | rejected packet: | cc ee 6c 19 e2 66 91 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #43: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0706 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #30 | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #30 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #30 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49604.380175; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003806 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e7260 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #30 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 "road-eastnet-nonat-30" #30: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #30) | eb 37 b2 e3 45 e6 a7 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 14 f4 3b 23 14 59 57 11 85 13 a2 12 2b b5 a3 ff | 27 d1 a6 d6 83 ba ed 6e 70 90 a1 d6 22 c0 f4 dc | 88 16 36 cb d1 72 72 bc de f4 41 0b 1b 89 09 42 | b9 3c f8 7c e9 f8 b9 9e 79 49 a8 2b 7f 1d 06 99 | c2 4a dd e8 2d e9 b4 cd ab 59 b3 cd 90 a2 ae 3c | dc 2b a8 89 42 be 2f 72 3b d2 e2 27 b4 65 50 d4 | 35 50 bc 83 c6 85 ec 49 08 26 e7 a9 0e b6 5e a5 | 85 8b 68 21 3e 90 ff 7d 8a b3 a3 ab 4e 47 64 32 | 27 11 da 90 e5 4b bc e9 16 11 6a bf 15 7e 85 08 | 28 9b e3 ef 08 8b 63 b8 f5 43 71 2f 4c 67 78 41 | b8 23 b8 9c 92 66 99 57 0d 3e 91 c2 06 23 98 e8 | 6d 98 00 38 76 9f e2 83 8a e1 b7 3f 0f fe 0a 46 | d4 29 95 ea ed 7c f2 88 a6 07 6b 92 26 ac 08 4f | 2f b2 56 84 37 68 ea c9 79 62 e3 b0 e5 14 a4 c8 | 94 04 78 6c 13 14 ae b3 aa ac 60 8d 12 46 30 65 | 4d f6 8a 38 3e 83 8d 9b ed 94 87 9f 15 c1 ab 90 | 29 00 00 24 3c c6 27 c6 e1 5b ef ef 28 05 b6 9a | 73 ea 46 41 c6 a4 e3 b1 86 51 d2 31 50 73 0b 09 | 13 5f 9d 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 2d bd fb cd 00 1b 4b be 47 ff 4c | 9b 30 9e df 04 ed 35 e5 00 00 00 1c 00 00 40 05 | f4 eb 1d 0f f6 3b e7 d6 54 0e 88 15 bd 63 45 57 | 71 e8 c0 52 | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #30 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 37 b2 e3 45 e6 a7 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #30 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #30 | rejected packet: | eb 37 b2 e3 45 e6 a7 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #30: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ef4e0 | handling event EVENT_RETRANSMIT for parent state #37 | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #37 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #37 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49604.384508; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50068 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #37 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-37" #37: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #37) | 17 02 22 e9 ab 5b 91 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f f0 24 04 15 84 3f 8d a0 47 69 89 53 1c 67 b8 | 33 2a a4 f5 84 95 fd 12 c4 95 3c eb 03 f8 76 46 | 15 20 9b c5 17 a5 48 da 05 b3 14 87 45 a5 03 ce | 15 45 04 84 4f ce c5 7f 7f d9 f6 69 e6 fa 2a ce | 98 6a 3f d1 cc fe 7f e2 41 fd 61 7b af af 30 7e | 0a 75 d2 92 05 56 ed e9 09 bd bc db cd 80 58 20 | 86 cc 39 bd f2 1c dd 9d 77 bb 28 c3 7e a4 97 11 | 86 79 5d 68 34 e4 33 4c b3 b1 ed 26 ab a1 c5 7d | dd f5 b8 0e 55 cd f4 1f ea 00 32 c8 4b fd 8f a5 | 71 8b 05 79 0a 34 41 68 bd c7 7d 96 51 77 5e 6b | d9 65 0d cf f7 34 f5 5b 4b bf 3e ae f6 63 25 2e | ea 9e 2a 3f 64 43 4d 0c 4a de f8 57 38 d7 5a c8 | 89 09 d3 81 3b 61 a8 5e 87 ab 34 9f c0 a6 2e 8e | a4 55 d9 e8 61 49 db 19 2f a0 89 a1 e6 24 e6 14 | 77 4b 63 b1 94 0b fe b9 37 07 5d a5 3f f4 4e 97 | 2a 98 e3 ca 6e 7f 3f a3 88 c3 da 3a c0 a1 79 c5 | 29 00 00 24 75 33 7f 61 eb 0d 1b f9 84 ec ca bb | af cf f0 96 3c 65 2f 09 ef 72 4a c4 05 f7 86 9b | fc 7f 3c 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 5d ed 76 d7 41 0c 3c 88 ec 15 de | 69 08 6f 06 52 19 de 0f 00 00 00 1c 00 00 40 05 | 52 bb 9d ab bf 18 49 c2 17 f2 d0 27 18 10 66 1c | c7 07 9d fe | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ef4e0 | #37 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 02 22 e9 ab 5b 91 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #37 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #37 | rejected packet: | 17 02 22 e9 ab 5b 91 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #37: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-44" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-44' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #44 at 0x557d46a10b90 | State DB: adding IKEv2 state #44 in UNDEFINED | pstats #44 ikev2.ike started | Message ID: init #44: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #44: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #44; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-44" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-44" IKE SA #44 "road-eastnet-nonat-44" "road-eastnet-nonat-44" #44: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-44 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-44": constructed local IKE proposals for road-eastnet-nonat-44 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 44 for state #44 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469ef4e0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #44 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 | #44 spent 0.16 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-44" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.248 milliseconds in whack | crypto helper 9 resuming | crypto helper 9 starting work-order 44 for state #44 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 44 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 44 time elapsed 0.000978 seconds | (#44) spent 0.985 milliseconds in crypto helper computing work-order 44: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 44 for state #44 to event queue | scheduling resume sending helper answer for #44 | libevent_malloc: new ptr-libevent@0x7fb378012840 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #44 | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 44 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #44 | **emit ISAKMP Message: | initiator cookie: | 2c a5 57 82 94 bb 0c bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-44 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2f f1 d9 3a 5c ec da ab 46 a0 1a 50 8e c5 b2 4a | ikev2 g^x 63 93 0d d6 bb 0b cb a2 7b 64 4c d6 0d 5d 75 c0 | ikev2 g^x a4 fb 12 20 36 86 d2 5a 85 de 9f 1a 56 dd 51 88 | ikev2 g^x 1f dd 14 6d 54 37 65 2c 39 00 b9 0b d0 9a b8 93 | ikev2 g^x dd 72 9a 78 33 2f fe d8 37 67 48 08 b2 16 1f 29 | ikev2 g^x 2a f2 be 3c 42 f3 72 0d 31 7d f4 16 71 3f 2a 28 | ikev2 g^x a2 72 a2 07 56 93 05 b3 01 4f f8 0a 3d 17 c2 61 | ikev2 g^x 36 84 95 ef b4 4f 95 5b 93 28 0b 0c 46 73 8a 49 | ikev2 g^x 11 16 41 b2 73 0b 44 cf a4 af 2f d7 2a 7a 6d 3e | ikev2 g^x 45 30 bc f5 de 74 14 4c f1 52 50 35 c7 29 67 5d | ikev2 g^x 02 d9 88 3e 6a e4 83 d6 7c b8 69 a3 7c 7f 9b 8b | ikev2 g^x 37 21 48 68 00 9a 01 a3 9a d7 3b 02 8c 67 ac 11 | ikev2 g^x 42 36 9e 84 ad 85 da a3 35 c1 ee c3 6a 24 37 55 | ikev2 g^x cc 67 9a 57 48 6e 0b 5c b6 9c 4d 16 ed 25 57 02 | ikev2 g^x 16 2f e6 f6 ce 2a b1 ca e6 1e 1f f9 44 d1 46 60 | ikev2 g^x 1f 00 3a 24 c7 f4 7b 04 f3 08 7e 6f de 0b 6c 0f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c3 85 c7 9f 53 c2 4b 6d 4a b2 71 6f 5f 3f 70 d0 | IKEv2 nonce bf 0d 26 13 04 46 9b 8c 51 07 8b 19 bb fc 96 4a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 2c a5 57 82 94 bb 0c bd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2c | natd_hash: port= 01 f4 | natd_hash: hash= 2f 56 cd 95 dd 34 fe 03 70 04 69 b5 7b 30 2c 80 | natd_hash: hash= a8 67 5b f1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2f 56 cd 95 dd 34 fe 03 70 04 69 b5 7b 30 2c 80 | Notify data a8 67 5b f1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 2c a5 57 82 94 bb 0c bd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 20 cd 88 b3 c4 29 91 b7 4b 43 e6 f4 9f a3 71 4b | natd_hash: hash= c5 83 8c 17 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 20 cd 88 b3 c4 29 91 b7 4b 43 e6 f4 9f a3 71 4b | Notify data c5 83 8c 17 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #44 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #44: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #44 to 4294967295 after switching state | Message ID: IKE #44 skipping update_recv as MD is fake | Message ID: sent #44 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-44" #44: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.44:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #44) | 2c a5 57 82 94 bb 0c bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f f1 d9 3a 5c ec da ab 46 a0 1a 50 8e c5 b2 4a | 63 93 0d d6 bb 0b cb a2 7b 64 4c d6 0d 5d 75 c0 | a4 fb 12 20 36 86 d2 5a 85 de 9f 1a 56 dd 51 88 | 1f dd 14 6d 54 37 65 2c 39 00 b9 0b d0 9a b8 93 | dd 72 9a 78 33 2f fe d8 37 67 48 08 b2 16 1f 29 | 2a f2 be 3c 42 f3 72 0d 31 7d f4 16 71 3f 2a 28 | a2 72 a2 07 56 93 05 b3 01 4f f8 0a 3d 17 c2 61 | 36 84 95 ef b4 4f 95 5b 93 28 0b 0c 46 73 8a 49 | 11 16 41 b2 73 0b 44 cf a4 af 2f d7 2a 7a 6d 3e | 45 30 bc f5 de 74 14 4c f1 52 50 35 c7 29 67 5d | 02 d9 88 3e 6a e4 83 d6 7c b8 69 a3 7c 7f 9b 8b | 37 21 48 68 00 9a 01 a3 9a d7 3b 02 8c 67 ac 11 | 42 36 9e 84 ad 85 da a3 35 c1 ee c3 6a 24 37 55 | cc 67 9a 57 48 6e 0b 5c b6 9c 4d 16 ed 25 57 02 | 16 2f e6 f6 ce 2a b1 ca e6 1e 1f f9 44 d1 46 60 | 1f 00 3a 24 c7 f4 7b 04 f3 08 7e 6f de 0b 6c 0f | 29 00 00 24 c3 85 c7 9f 53 c2 4b 6d 4a b2 71 6f | 5f 3f 70 d0 bf 0d 26 13 04 46 9b 8c 51 07 8b 19 | bb fc 96 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f 56 cd 95 dd 34 fe 03 70 04 69 b5 | 7b 30 2c 80 a8 67 5b f1 00 00 00 1c 00 00 40 05 | 20 cd 88 b3 c4 29 91 b7 4b 43 e6 f4 9f a3 71 4b | c5 83 8c 17 | state #44 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469ef4e0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #44 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 | #44 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49604.43216 | resume sending helper answer for #44 suppresed complete_v2_state_transition() and stole MD | #44 spent 0.549 milliseconds in resume sending helper answer | stop processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb378012840 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c a5 57 82 94 bb 0c bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #44 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #44 | rejected packet: | 2c a5 57 82 94 bb 0c bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #44: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.068 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #19 | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #19 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #19 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49604.451354; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003715 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #19 | libevent_malloc: new ptr-libevent@0x7fb378012840 size 128 "road-eastnet-nonat-19" #19: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #19) | 71 b7 8f 2a c9 ab 65 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 3e b3 71 5b 2a 7e 67 38 d7 ab 7a d2 03 90 2c | 27 b7 e6 d5 a7 20 27 79 5e 88 db 2d 02 14 e6 05 | 6f 07 f4 c1 2b 42 e9 2b 16 c7 24 00 68 97 23 09 | 9b 28 53 ba dc 36 46 57 40 1e 29 01 4a b7 49 a8 | 4d 9b c0 f6 6d 6c 59 7a d3 fe f7 05 02 d7 dc 3f | 33 37 fa 6e 66 82 3b 0b fc 41 01 e0 cf 12 33 b2 | a1 18 77 fd c8 36 dd ad 0b 8f 44 4a dc 2c 38 79 | 30 fa d4 bf 2a 29 27 db 37 30 a3 c6 e5 0f b5 2b | 3c 20 72 b8 f7 83 6c 1c 84 55 8f f3 1f 64 ae 19 | e5 47 9f 5e eb 0a e5 2c 75 55 6a e2 43 09 5c e9 | 24 9c 73 ae e6 a6 e7 07 f6 fe ad 11 3d af ab 94 | 47 55 a2 0e c7 5d 4b 0e 42 8f 1e 08 35 c6 12 3b | 76 58 3a e5 1d 69 62 62 bc c4 a4 b5 cb 6c d9 c9 | 2b 81 e2 3b e9 c6 13 78 c3 3f f3 38 91 f3 11 a1 | 04 e8 fa 3f 9f e8 f9 3d 60 98 07 62 99 3c 36 86 | 40 55 c7 f1 5a 42 4d 99 21 5e 58 f5 e4 8a cb d6 | 29 00 00 24 d1 01 c3 e5 0a d4 10 8b f6 20 25 e6 | de b5 f4 be cf de 7f f4 c1 d3 ec a5 70 52 4e 33 | 0b 30 f5 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 74 af f0 20 10 33 a5 14 d9 51 67 | 36 d9 37 b0 71 8d 2c dc 00 00 00 1c 00 00 40 05 | 0e 08 6a ae a9 27 97 90 41 13 4d a4 49 51 01 50 | a2 07 2e 34 | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #19 spent 0.094 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 b7 8f 2a c9 ab 65 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #19 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #19 | rejected packet: | 71 b7 8f 2a c9 ab 65 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #19: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f0aa0 | handling event EVENT_RETRANSMIT for parent state #31 | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #31 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #31 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49604.464604; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.99537 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #31 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 "road-eastnet-nonat-31" #31: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #31) | d5 d5 f7 7f 23 0d 4b 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 d8 4b a5 f9 d4 3a a9 51 97 2e 27 d1 cc 90 15 | e2 e2 8d 96 07 4d fd 40 9f 4f 7f 6f 35 0e 23 bc | 4a 6a 76 f9 9f 83 b0 54 30 ee b6 fc 0a 45 0c 73 | 2d e9 2a b2 ca 81 a2 ff 50 db 13 29 75 7d e9 7e | a9 33 06 c4 32 68 94 61 41 2b 8d f1 ff df 69 cc | e8 c4 b4 6d ef bc 3d c5 49 cc a7 2a fc 4c 98 e2 | 30 43 57 19 e1 0a 22 00 d7 07 6f aa ba 35 b2 14 | 36 27 5e 66 b6 08 a0 40 46 47 86 94 6d 23 bf ed | 9b 86 94 95 7d 7c df ed 26 58 08 d9 19 18 cf 17 | d2 31 cb 23 b8 00 65 a0 2d c7 80 be d9 c6 2d 9b | 2d 24 dd 1f 09 8c cb bd 5d a9 d7 7b 30 d7 87 68 | f3 c0 0e 20 8d c3 3f 32 80 d9 ab 29 26 00 09 ea | b0 b4 2f 7d 8f fc 22 1d 7c 39 80 08 04 22 2a 49 | f4 26 0e 59 4e ac 0e 0e 46 93 3b ba 87 01 a8 59 | ea 18 2f 09 70 d0 fb 69 f1 4a 19 c7 fd d5 be f0 | ff bb d7 7c ef dd e5 ed c9 a4 0a b6 e1 11 1b ed | 29 00 00 24 6a 1e b5 3b 00 37 08 50 6d 81 0e e2 | cf 1b 46 47 4b 2b 09 3d 6e 9a 95 9d 52 78 61 ae | d4 0d 66 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 91 23 cd ed e8 35 56 6f f7 85 4c | 49 64 a9 75 0a 07 1b 5f 00 00 00 1c 00 00 40 05 | a3 62 6c f7 52 92 b8 35 33 98 a9 6b 00 6d db 28 | 96 bc 0a b6 | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f0aa0 | #31 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350005860 | handling event EVENT_RETRANSMIT for parent state #38 | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #38 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #38 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49604.464744; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500712 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #38 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 "road-eastnet-nonat-38" #38: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #38) | 63 6f 4b 9c a2 38 4b f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 c6 a0 5e 80 62 3e 9a 9c 42 e1 05 80 df 04 bf | 1e b5 eb a5 bb ef bc 82 8b e6 75 a7 2e 01 28 64 | e4 76 b9 2e 24 4c bf de dc 13 dd 2b 71 c5 93 43 | 1b 46 d4 7e b2 da 9a 48 5b 59 35 a7 05 07 a3 e4 | 2d c6 06 3d 04 99 06 6d e6 f3 82 a2 e0 b0 3d 7e | 06 24 2a d6 83 0e 98 7d 98 49 2f 5f ab 8e 6a a0 | d8 9e 97 9f 3a b5 0b 41 09 f4 3d 1d 01 c6 79 69 | 84 a4 53 1f bd 4e 48 87 76 0d 6e 5e db cc c6 9f | 32 ff 46 70 0d 72 cf 06 98 99 df 58 29 5b 2c 8c | fb 98 a9 76 0f 25 88 9a f5 19 cc e3 5c 2b 68 1d | 01 4d 25 7a f1 7a 21 df b2 8f 9c 28 7d d1 ec da | 1d aa a1 0e 2a 91 6c fc cd c9 76 e7 51 08 7a ff | e5 ff f8 19 fa 3a 8e cc 1e 84 49 b9 c5 19 d0 a9 | d3 37 e2 20 31 e7 32 dd 71 90 7c 76 34 4e 29 57 | 1e 56 51 56 0c 5f 17 75 67 40 80 dc 44 27 6b 9a | c7 16 b2 3b 68 69 4b 25 42 5f 6c bd 14 34 a0 fd | 29 00 00 24 11 36 0f 5e a0 00 74 be 57 cf e9 ad | 0b 41 64 75 76 be 45 9c 57 4a dd ea fc 94 1e c3 | 3b 87 2f 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b 5e 04 97 03 6e 1a 6a 1c 69 28 d2 | a2 f5 94 bd 95 4c fa 5e 00 00 00 1c 00 00 40 05 | aa 31 5d 54 cf 5a 81 b9 1b cd fe 19 22 77 54 6d | f5 50 1b 4f | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350005860 | #38 spent 0.0701 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 d5 f7 7f 23 0d 4b 11 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #31 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #31 | rejected packet: | d5 d5 f7 7f 23 0d 4b 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #31: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0507 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 6f 4b 9c a2 38 4b f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #38 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #38 | rejected packet: | 63 6f 4b 9c a2 38 4b f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #38: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-45" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-45' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #45 at 0x557d46a12150 | State DB: adding IKEv2 state #45 in UNDEFINED | pstats #45 ikev2.ike started | Message ID: init #45: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #45: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #45; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-45" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-45" IKE SA #45 "road-eastnet-nonat-45" "road-eastnet-nonat-45" #45: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-45 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-45": constructed local IKE proposals for road-eastnet-nonat-45 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 45 for state #45 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb350005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #45 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 | #45 spent 0.11 milliseconds in ikev2_parent_outI1() | crypto helper 10 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 starting work-order 45 for state #45 | RESET processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 45 | RESET processing: connection "road-eastnet-nonat-45" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.203 milliseconds in whack | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 45 time elapsed 0.000622 seconds | (#45) spent 0.624 milliseconds in crypto helper computing work-order 45: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 45 for state #45 to event queue | scheduling resume sending helper answer for #45 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #45 | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 45 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #45 | **emit ISAKMP Message: | initiator cookie: | a3 bb a6 38 bf 16 36 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-45 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 15 bf 7f b3 da cb 24 f0 9d 9b d3 fd dc cf db 07 | ikev2 g^x e6 5b 40 74 f8 99 0f 8a 69 5b 21 df 39 e1 ee 66 | ikev2 g^x 6e d2 eb aa da ff dd cd ef 30 5f f7 58 03 e1 db | ikev2 g^x 0d 74 f6 29 93 ca f1 42 fd ad b9 96 9c 2f 50 32 | ikev2 g^x 58 c3 21 d3 aa 48 12 01 4c e3 13 6e 9b ee 2d 74 | ikev2 g^x 42 be dc c8 fd 3f 8a d7 32 bc c2 52 53 8d f7 2a | ikev2 g^x 84 67 44 c8 2e dc 1a b1 bb 7e 48 68 aa 07 71 d2 | ikev2 g^x ed bb 6e e8 36 32 f2 a5 31 45 4d 85 68 10 11 40 | ikev2 g^x f6 85 5c 6f 85 60 44 96 50 66 ff a4 e4 4d 79 e9 | ikev2 g^x 3c a7 0e 91 f7 05 c3 d3 85 48 8e e8 a2 59 53 66 | ikev2 g^x 1c c3 08 ca 90 69 7f b0 5f 9c 5b ec cd 7e 11 67 | ikev2 g^x 1a 0f 4b b0 b3 89 8c 73 6f 1c d6 27 19 18 73 72 | ikev2 g^x 31 f5 6c a7 f0 f8 1b 36 35 8a f6 30 2e d1 b7 af | ikev2 g^x a6 2e 5d 9a f5 83 05 7a b2 73 c7 24 06 c8 92 6b | ikev2 g^x 85 fe 7f 79 f1 ba 3f d3 86 28 f4 16 3a 94 56 af | ikev2 g^x 55 d5 d6 bc 89 52 4c e8 34 d8 86 d5 fe 13 15 fe | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a8 f8 bf 2a 70 d8 0d e9 bf c1 0f 00 25 da 1d db | IKEv2 nonce 8f ac 61 b5 e1 f0 75 9a 00 6d 79 0f ff f5 3b 52 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a3 bb a6 38 bf 16 36 0d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2d | natd_hash: port= 01 f4 | natd_hash: hash= 35 ff e8 4e 79 94 20 d9 00 0d 87 37 ed 16 46 76 | natd_hash: hash= d8 43 be 32 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 35 ff e8 4e 79 94 20 d9 00 0d 87 37 ed 16 46 76 | Notify data d8 43 be 32 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a3 bb a6 38 bf 16 36 0d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2d 67 24 20 12 0e 18 8c 34 32 0f 7c 4f 51 94 df | natd_hash: hash= fd 23 b8 c6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2d 67 24 20 12 0e 18 8c 34 32 0f 7c 4f 51 94 df | Notify data fd 23 b8 c6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #45 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #45: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #45 to 4294967295 after switching state | Message ID: IKE #45 skipping update_recv as MD is fake | Message ID: sent #45 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-45" #45: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.45:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #45) | a3 bb a6 38 bf 16 36 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 bf 7f b3 da cb 24 f0 9d 9b d3 fd dc cf db 07 | e6 5b 40 74 f8 99 0f 8a 69 5b 21 df 39 e1 ee 66 | 6e d2 eb aa da ff dd cd ef 30 5f f7 58 03 e1 db | 0d 74 f6 29 93 ca f1 42 fd ad b9 96 9c 2f 50 32 | 58 c3 21 d3 aa 48 12 01 4c e3 13 6e 9b ee 2d 74 | 42 be dc c8 fd 3f 8a d7 32 bc c2 52 53 8d f7 2a | 84 67 44 c8 2e dc 1a b1 bb 7e 48 68 aa 07 71 d2 | ed bb 6e e8 36 32 f2 a5 31 45 4d 85 68 10 11 40 | f6 85 5c 6f 85 60 44 96 50 66 ff a4 e4 4d 79 e9 | 3c a7 0e 91 f7 05 c3 d3 85 48 8e e8 a2 59 53 66 | 1c c3 08 ca 90 69 7f b0 5f 9c 5b ec cd 7e 11 67 | 1a 0f 4b b0 b3 89 8c 73 6f 1c d6 27 19 18 73 72 | 31 f5 6c a7 f0 f8 1b 36 35 8a f6 30 2e d1 b7 af | a6 2e 5d 9a f5 83 05 7a b2 73 c7 24 06 c8 92 6b | 85 fe 7f 79 f1 ba 3f d3 86 28 f4 16 3a 94 56 af | 55 d5 d6 bc 89 52 4c e8 34 d8 86 d5 fe 13 15 fe | 29 00 00 24 a8 f8 bf 2a 70 d8 0d e9 bf c1 0f 00 | 25 da 1d db 8f ac 61 b5 e1 f0 75 9a 00 6d 79 0f | ff f5 3b 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 ff e8 4e 79 94 20 d9 00 0d 87 37 | ed 16 46 76 d8 43 be 32 00 00 00 1c 00 00 40 05 | 2d 67 24 20 12 0e 18 8c 34 32 0f 7c 4f 51 94 df | fd 23 b8 c6 | state #45 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb350005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #45 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 | #45 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49604.495718 | resume sending helper answer for #45 suppresed complete_v2_state_transition() and stole MD | #45 spent 0.407 milliseconds in resume sending helper answer | stop processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c012840 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 bb a6 38 bf 16 36 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #45 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #45 | rejected packet: | a3 bb a6 38 bf 16 36 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #45: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0523 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ddbf0 | handling event EVENT_RETRANSMIT for parent state #2 | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #2 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #2 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49604.531909; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.010751 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #2 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 "road-eastnet-nonat-2" #2: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #2) | 1a 6c de c8 74 c5 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e e6 40 8d 01 9a df ee a1 21 ef 7c 27 51 b1 50 | 11 ab 49 b8 aa be 06 6f 98 06 4f a8 49 fc 42 fd | ea ae 86 e5 22 2c b5 91 3d 9f 17 1f 02 b9 b9 8d | 62 48 db a9 bf 68 b6 2a 81 1e f5 ea 96 5e fc 90 | a8 90 23 f2 fa 81 8e 8c d6 45 a8 56 67 da 61 6d | ec 8f 6b 5d aa 73 41 20 29 44 b2 20 1c ab 68 57 | 66 6f ca 43 df ea 03 70 f7 0e 47 cb 21 da 37 fa | b6 1e 94 d5 b1 5e b7 96 a4 f5 5a 22 ff b7 b7 1e | 62 65 38 93 8b 8d 44 bd 9f ea 0f 68 70 be 74 db | b6 35 f8 53 58 61 01 df be e6 bf 45 b0 94 55 ae | 5d 6b 51 98 47 dd 93 18 5c 30 93 96 42 3e 47 91 | 90 01 1e 32 64 de ec ce 38 b5 ab f8 4a 4f 0c ed | d8 fd 0a f1 53 ed ad 6b 9e c5 db 7f 6d 9f 1b e5 | 0c 7b f2 2f 6f ec 10 d1 5b 4b 71 ee 47 5f b6 1f | b0 01 08 5f 12 c2 5d 47 67 6d 8f ee c4 bf 47 5b | 6c 71 d5 40 dd 10 ef f5 69 2a fd 09 2a aa 47 a4 | 29 00 00 24 31 10 28 eb fd d1 21 19 30 13 d3 a7 | cd be e5 7b ca b3 e1 fc 00 55 31 87 01 f1 62 07 | 15 72 f6 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 6d fc d3 8f 25 27 03 1f 7a b6 de | f8 04 ad d3 88 d5 17 aa 00 00 00 1c 00 00 40 05 | 09 59 07 05 b4 e1 f1 0d 32 74 62 04 62 1e 48 d0 | 7d 5b 7f 5e | libevent_free: release ptr-libevent@0x557d469e1b60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ddbf0 | #2 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 6c de c8 74 c5 fb 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #2 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #2 | rejected packet: | 1a 6c de c8 74 c5 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #2: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #20 | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #20 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #20 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49604.535241; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002384 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f0aa0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #20 | libevent_malloc: new ptr-libevent@0x557d469e1b60 size 128 "road-eastnet-nonat-20" #20: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #20) | 2a d8 6a 5c 08 dc 68 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad 76 8b c3 8a cd 7e 81 09 43 af dc 84 86 57 86 | ac 01 81 74 96 d6 08 70 58 d2 f7 10 2a f2 1e 9d | b0 95 95 b3 32 1e e8 01 5c d2 e7 39 14 67 2f fd | 6f cc fb 0b 1d bd c7 ac 37 fb c6 6d e0 84 f8 c8 | 00 c1 d6 0f 3b e2 a7 4b 51 a3 13 bb 3d f4 c2 99 | 9b 84 74 df c2 bf fa 13 e4 2a f9 e8 2d 4c 6c c5 | 8d e3 52 85 e9 f8 18 fc 4b 38 b9 82 e0 ab 65 b7 | ae a5 89 3c 88 ee 05 34 a9 d7 52 0c 03 2e a9 7e | e2 c7 7b c9 35 8f e6 9e 0b 55 49 71 ce bd 37 1f | 22 8f 48 76 19 75 9b c0 7a 62 4e 51 77 02 d7 bf | e0 ea 0a 67 41 41 2e 98 4f f3 cf 32 f2 ae 82 83 | 1f 56 7c 33 17 50 fa 76 01 41 f1 ba 05 90 db bd | 83 b9 cd 1b b8 6e f3 33 72 7e 47 f3 20 71 8f e7 | ec 91 f3 37 6a 94 11 a2 55 f0 09 1c 76 98 cd 56 | 66 be 33 43 a6 1c f5 8b 31 c4 e3 0a 7b 29 cc 17 | 3f 13 b8 73 4c 86 e0 b0 2a 03 32 6a 19 82 cb a2 | 29 00 00 24 47 97 3a 6f 12 05 22 fe fb dc 3c 25 | ff 91 0d 7a c8 4c ac f8 1f 7e d1 5f 41 39 e3 39 | e8 aa 43 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f 67 98 f7 05 c6 ee 5e 5b 5f e2 fa | ee a5 ba af 57 96 46 d2 00 00 00 1c 00 00 40 05 | 3e ef c3 bb 3d a5 88 fb 9f 3c 53 fd 3b c9 ea 45 | 6f 53 bd 02 | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #20 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a d8 6a 5c 08 dc 68 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #20 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #20 | rejected packet: | 2a d8 6a 5c 08 dc 68 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #20: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #39 | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #39 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #39 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49604.545544; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500253 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #39 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 "road-eastnet-nonat-39" #39: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #39) | 19 fb 2f c4 ac 44 fb 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e b1 09 86 9c 45 db 95 7b d2 00 66 c6 50 ec 38 | 85 24 bf d9 80 0e ac 2e 4c 6c 22 df ca 10 97 2e | 3e b3 c6 bc af 43 d2 f1 96 a9 4b 69 aa cd 6c e0 | 9b a6 4b b2 87 0e 1c ca 32 4c 46 ee 52 f9 70 fd | fe 31 27 8d 61 a4 9c 97 7a a3 30 46 a8 d5 6f 83 | a7 6a c3 e9 ff 23 17 48 fe 4f dd cf 4e a9 a1 5e | d7 78 c0 fe 7d d7 62 84 4a b2 9d ae 37 bc ab ed | d5 8c 32 96 61 41 3f 21 7c ca ab 28 b6 ad 04 a3 | c6 dc bc c3 e1 13 16 74 7a 42 5b e7 e2 a2 c1 8c | b7 73 45 24 dc 37 dd 6b f2 55 c7 4f 97 81 79 6f | 14 cb 11 1e b4 40 01 19 cd a9 dd 29 3f 6f e4 ee | 95 68 2f 56 df 0a 08 86 e6 cd 7f a3 7b 00 61 f4 | c5 7c bb 03 05 36 7a 30 d5 36 53 38 4c f8 39 18 | 08 9c f5 06 b6 85 f9 e9 1b ab 6e 6e 92 66 b2 2b | 43 5a 44 5b 6f f1 98 dd 01 3a 01 23 5e f7 bc 7d | 6e f5 05 b9 ec 45 1c 8c 77 33 f8 a3 1c 1e 8c 99 | 29 00 00 24 2f 9c d8 9a 10 ed a2 18 bd 6a 97 cb | 42 26 f8 54 76 a0 4d 6e 60 6c fb c1 ce 0f 53 f0 | 1f 6b 99 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 74 e0 c5 89 b2 32 b1 7d 7b 02 d3 | e0 e6 47 82 80 6f 9f 55 00 00 00 1c 00 00 40 05 | 2e a2 7a f5 ee f4 77 35 9e db 48 5d 65 9b e7 f5 | e4 1e af e9 | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | #39 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469f7760 | handling event EVENT_RETRANSMIT for parent state #32 | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #32 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #32 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49604.54572; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001904 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #32 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 "road-eastnet-nonat-32" #32: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #32) | 91 2f 9d 69 76 5d 8a 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 54 17 4f f3 31 b1 0f c2 14 96 a0 49 f3 c5 20 | 38 78 7d e5 0a d8 95 bc 7a a9 a2 f1 ff ab 0d 66 | a2 fe 53 90 8e fe 51 43 04 57 01 9c e7 22 ca 9e | 98 aa 3b 0d 0d 5f ee 9d 1e 59 e6 04 c4 7f 07 84 | f1 a5 dc 31 6f fa b4 db 4a d9 1c 93 5d b0 7e 5d | 37 79 07 ab 3e 5c a3 de d6 8b a4 ac df 4b a7 7c | af 6f 03 fd 31 bd 7d c1 34 31 76 57 00 e4 23 e1 | 82 cb b8 38 12 59 cd 21 e3 0e 67 54 27 e1 6e 8f | 1e a1 dd 84 f8 ca 82 2a 39 9d 17 56 58 46 a3 3b | 7b 5d 3a 21 a2 b3 03 79 c6 bd 25 cc df a0 12 67 | b3 f4 5a c2 b0 73 2d 33 df 1c dc fa 26 25 56 72 | 59 7b 3c f0 d8 e2 d9 b0 57 2e 4a 8e ec 96 92 09 | 75 70 f6 57 59 ce 54 70 90 14 41 34 b1 57 0f 5d | 19 dd 8a a1 77 43 7e cf 1c ef 3e 0b 72 1e cc f4 | 78 66 2f 15 74 e8 33 6b d3 89 bb a9 fb bc fa 46 | 95 b5 88 f8 a3 91 1f 3a b1 92 bc 1e 84 a5 5b 07 | 29 00 00 24 2d 29 95 26 bc 23 fe d9 76 bb c2 d5 | 43 41 98 03 bf c6 eb 4a b9 6e a6 4e f6 f7 82 f1 | 09 94 9d 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 13 8b 5d 25 b5 3b 06 af a0 3f ac | be 9b 92 09 9d c4 50 7f 00 00 00 1c 00 00 40 05 | ef 32 45 23 d7 6a b0 96 66 7f 58 39 f6 19 a5 1f | 4b 49 56 02 | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f7760 | #32 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 19 fb 2f c4 ac 44 fb 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #39 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #39 | rejected packet: | 19 fb 2f c4 ac 44 fb 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #39: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0587 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 2f 9d 69 76 5d 8a 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #32 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #32 | rejected packet: | 91 2f 9d 69 76 5d 8a 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #32: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0557 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-46" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-46' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #46 at 0x557d46a13710 | State DB: adding IKEv2 state #46 in UNDEFINED | pstats #46 ikev2.ike started | Message ID: init #46: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #46: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #46; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-46" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-46" IKE SA #46 "road-eastnet-nonat-46" "road-eastnet-nonat-46" #46: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-46 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-46": constructed local IKE proposals for road-eastnet-nonat-46 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 46 for state #46 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469ef4e0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #46 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 | #46 spent 0.146 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-46" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.229 milliseconds in whack | crypto helper 14 resuming | crypto helper 14 starting work-order 46 for state #46 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 46 | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 46 time elapsed 0.000957 seconds | (#46) spent 0.962 milliseconds in crypto helper computing work-order 46: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 46 for state #46 to event queue | scheduling resume sending helper answer for #46 | libevent_malloc: new ptr-libevent@0x7fb370012840 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #46 | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 46 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #46 | **emit ISAKMP Message: | initiator cookie: | b8 02 bd ab b2 01 5a b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-46 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4d 02 34 ab 29 73 17 93 9c d3 ac d4 2d a7 40 8f | ikev2 g^x 6c ab ce c1 cf 26 d8 e1 c0 a5 2f a8 7c e6 62 97 | ikev2 g^x 14 ae ce 27 9d 48 da 55 bb 1a 50 83 cd 98 7c 7e | ikev2 g^x 93 0d ef 6b a4 36 24 54 0e e8 77 76 0a 46 5c 28 | ikev2 g^x c7 d2 ff f1 d4 08 43 1a 21 66 26 cc ac 89 a4 fa | ikev2 g^x 9e 6f e1 5a 6f bb 4b ea 22 4d 9a 3d 2a 1c 97 d5 | ikev2 g^x e7 d2 d1 ac 8d d0 32 2d 42 98 eb fc 7f 55 28 65 | ikev2 g^x e5 b7 88 e1 ec b5 ba 0a 74 06 aa 48 51 b1 11 3b | ikev2 g^x 2f 1d 4c c7 49 ef 3c d0 65 a2 df 8e 59 96 65 b4 | ikev2 g^x 5b 67 18 f6 c6 dd c1 ba 8c 98 60 72 7f 9b 34 f1 | ikev2 g^x f4 df 07 a6 02 25 08 e0 ca 45 1c 4e 5a 84 92 f8 | ikev2 g^x 41 4b e2 11 63 dd 97 cd e2 1c a6 92 32 6d 9f 66 | ikev2 g^x 47 ba 05 95 3f 93 67 80 97 77 56 16 84 bf 6b d6 | ikev2 g^x e6 b0 76 58 be 43 b2 86 c2 1e 75 44 04 7d 93 a8 | ikev2 g^x 8c b0 a8 b8 83 ce 3c 1a d2 a1 85 f4 c7 9a 35 d1 | ikev2 g^x a2 ff 32 1f de 4b 99 be 80 8a 49 9b 41 45 2e a7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 59 91 d6 77 3b 12 ba 32 8c e3 4b 3b 93 6d 1e 3b | IKEv2 nonce 04 96 db ec 7e 0e 16 50 f1 18 04 aa e6 1e e5 ae | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b8 02 bd ab b2 01 5a b3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2e | natd_hash: port= 01 f4 | natd_hash: hash= 2c a5 da 82 02 27 22 be 3c d8 f4 7e 26 be f7 a0 | natd_hash: hash= 40 5a a0 f6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2c a5 da 82 02 27 22 be 3c d8 f4 7e 26 be f7 a0 | Notify data 40 5a a0 f6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b8 02 bd ab b2 01 5a b3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 90 e6 40 68 17 4b f9 af 42 5a 03 6b 4d 68 d7 fb | natd_hash: hash= 1b b9 9d a8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 90 e6 40 68 17 4b f9 af 42 5a 03 6b 4d 68 d7 fb | Notify data 1b b9 9d a8 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #46 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #46: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #46 to 4294967295 after switching state | Message ID: IKE #46 skipping update_recv as MD is fake | Message ID: sent #46 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-46" #46: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.46:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #46) | b8 02 bd ab b2 01 5a b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 02 34 ab 29 73 17 93 9c d3 ac d4 2d a7 40 8f | 6c ab ce c1 cf 26 d8 e1 c0 a5 2f a8 7c e6 62 97 | 14 ae ce 27 9d 48 da 55 bb 1a 50 83 cd 98 7c 7e | 93 0d ef 6b a4 36 24 54 0e e8 77 76 0a 46 5c 28 | c7 d2 ff f1 d4 08 43 1a 21 66 26 cc ac 89 a4 fa | 9e 6f e1 5a 6f bb 4b ea 22 4d 9a 3d 2a 1c 97 d5 | e7 d2 d1 ac 8d d0 32 2d 42 98 eb fc 7f 55 28 65 | e5 b7 88 e1 ec b5 ba 0a 74 06 aa 48 51 b1 11 3b | 2f 1d 4c c7 49 ef 3c d0 65 a2 df 8e 59 96 65 b4 | 5b 67 18 f6 c6 dd c1 ba 8c 98 60 72 7f 9b 34 f1 | f4 df 07 a6 02 25 08 e0 ca 45 1c 4e 5a 84 92 f8 | 41 4b e2 11 63 dd 97 cd e2 1c a6 92 32 6d 9f 66 | 47 ba 05 95 3f 93 67 80 97 77 56 16 84 bf 6b d6 | e6 b0 76 58 be 43 b2 86 c2 1e 75 44 04 7d 93 a8 | 8c b0 a8 b8 83 ce 3c 1a d2 a1 85 f4 c7 9a 35 d1 | a2 ff 32 1f de 4b 99 be 80 8a 49 9b 41 45 2e a7 | 29 00 00 24 59 91 d6 77 3b 12 ba 32 8c e3 4b 3b | 93 6d 1e 3b 04 96 db ec 7e 0e 16 50 f1 18 04 aa | e6 1e e5 ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c a5 da 82 02 27 22 be 3c d8 f4 7e | 26 be f7 a0 40 5a a0 f6 00 00 00 1c 00 00 40 05 | 90 e6 40 68 17 4b f9 af 42 5a 03 6b 4d 68 d7 fb | 1b b9 9d a8 | state #46 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469ef4e0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a011f0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #46 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 | #46 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49604.587816 | resume sending helper answer for #46 suppresed complete_v2_state_transition() and stole MD | #46 spent 0.47 milliseconds in resume sending helper answer | stop processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb370012840 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 02 bd ab b2 01 5a b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #46 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #46 | rejected packet: | b8 02 bd ab b2 01 5a b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #46: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e05a0 | handling event EVENT_RETRANSMIT for parent state #40 | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #40 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #40 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49604.611018; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500742 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37000d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #40 | libevent_malloc: new ptr-libevent@0x7fb370012840 size 128 "road-eastnet-nonat-40" #40: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #40) | f4 2d ea 23 2d fd 9f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 1a 9e 5c fb fb e3 3a 12 40 55 ea 02 66 64 cb | 69 42 9f 9e 73 38 34 f9 9b 29 99 d0 1f 2f 62 b0 | ff 78 90 10 b8 86 3f 49 a8 32 be f6 08 0d 11 29 | 94 2b 8b de b8 63 2c 35 79 92 00 39 68 56 d7 ad | 7e 9a a2 59 50 2b c4 f8 63 a3 0c 5d 5e 44 62 5b | fc 42 68 dd ca 56 4c 44 63 17 39 39 e0 00 1c 8f | c5 28 a6 4f 80 e9 f0 8c 5a ea 63 37 5f d7 0a a3 | b8 dc 6a fd 41 02 14 01 fa 2f 62 ae cb f1 1e 40 | 2f 20 1d 4c b4 7d c9 2c fa 60 f5 5e 61 26 a0 89 | b5 80 ba fe 31 f9 79 3e 12 33 cf 6c 99 9f 52 55 | 62 d6 02 f9 0e 35 e1 e7 8d 67 93 09 10 77 15 30 | 4a e9 d6 a0 31 50 fb be 13 05 50 dc f4 46 03 08 | 2f 95 1b 33 25 b1 ea 42 27 b1 8d 6c a6 26 e8 12 | 28 ee 49 16 a3 ec 76 ad 9e 1b cb d5 8a 26 5b 22 | 55 46 26 40 fb a4 30 9e 31 e9 07 5c 3b f7 53 4f | 4f ec 0e ee ad 7e 3f fc 05 9c b5 15 17 a2 62 3f | 29 00 00 24 28 3a b9 16 f5 d3 fa 3e 82 0e 6c a5 | b6 e0 32 27 f5 86 22 6d 8d 85 0f 17 f1 b4 a5 df | eb 51 66 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 e9 4b 4d 06 92 e2 ba cc 1d e9 b2 | 45 c8 92 47 34 22 29 80 00 00 00 1c 00 00 40 05 | 84 da 3f 80 5c a8 47 c1 08 aa 1f 48 69 9f 8f ac | 3e 3c 6c 93 | libevent_free: release ptr-libevent@0x7fb37000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e05a0 | #40 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 2d ea 23 2d fd 9f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #40 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #40 | rejected packet: | f4 2d ea 23 2d fd 9f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #40: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8cc0 | handling event EVENT_RETRANSMIT for parent state #33 | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #33 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #33 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49604.612386; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000945 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f7760 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #33 | libevent_malloc: new ptr-libevent@0x7fb37000cf80 size 128 "road-eastnet-nonat-33" #33: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #33) | c7 46 be 2e 5d 25 78 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 fb 56 35 bc 7c 07 73 43 c0 53 96 f8 9b 69 93 | 49 fe be 57 af 79 18 68 5a 92 2b 2b a6 ed e4 23 | 35 6b 49 80 b0 8c 38 3d c5 a9 f4 61 c1 8b 08 4d | 96 53 f0 d9 1b 6c 56 bc 0d ea 97 5b b0 d7 0d 16 | 49 88 40 6d 71 9e 2d 30 fe 42 42 37 20 10 14 5c | 75 38 c4 da 71 b3 b1 3b a6 23 58 dc a3 9a e0 40 | ae dc 8e cf de 76 e6 55 4e 33 19 fe 18 08 f5 70 | 8e 50 6f 64 32 2f d6 7a 45 39 d0 ba 32 a4 1e ab | 2d 4d 83 e7 1f d4 28 47 30 da f7 2e a0 79 9c 09 | 2b 6b 46 2e c8 c1 e5 37 84 54 0b 0c 97 40 ae db | 52 08 f5 e5 d5 a9 49 2a c9 b8 1f f6 14 c7 78 d5 | 70 93 cb 5e 8c 96 b6 ac 74 c2 85 cf 89 ad 75 5d | fe 0b 68 86 21 96 4e 79 63 5a 81 98 b3 45 c5 f0 | b2 fd 49 e2 ff b2 a3 2c 96 3c ba 10 d8 3f 86 56 | e0 c6 d2 d5 d7 7d 5f 52 2a 95 0f 65 04 12 82 60 | e3 5b 42 b7 a8 9e 92 b0 fa 34 79 45 e1 34 ab c5 | 29 00 00 24 b8 c6 4b 62 72 20 c9 09 07 72 44 d0 | 79 00 e2 dc 8f 6b 83 e9 3d 67 2f d3 a6 5d 27 77 | 58 61 12 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 b6 d4 e5 76 6f b7 90 e8 c3 ad b3 | 49 49 44 7a b5 13 9b a6 00 00 00 1c 00 00 40 05 | 15 0a 54 d9 c3 ee ba ab b9 96 60 bb a3 40 4e fb | d5 1b 34 be | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8cc0 | #33 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 46 be 2e 5d 25 78 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #33 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #33 | rejected packet: | c7 46 be 2e 5d 25 78 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #33: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fa300 | handling event EVENT_RETRANSMIT for parent state #21 | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #21 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #21 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49604.647703; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003502 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8cc0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #21 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 "road-eastnet-nonat-21" #21: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #21) | c1 e2 95 19 0d 6d aa c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 62 b7 cc 73 d3 9f c3 8b a1 e4 26 f8 ce 22 33 | 92 13 78 50 86 db 45 6a 88 c0 09 ba 4c 3a ed 8d | 07 a9 f3 c5 90 2e 12 14 58 94 56 71 46 c0 41 ae | 27 c0 08 e3 c4 02 5d ee 64 22 79 77 74 67 02 97 | 15 c4 99 75 53 da b8 d8 73 7b 03 dd 0e 63 e5 c8 | 2f a1 74 7d 1c 73 5d e6 89 77 c2 84 53 e8 81 35 | 14 8c 80 35 a3 ae 1e 09 89 8b c1 64 7d fd 4f 89 | 8f b7 6b da 51 0c c4 21 04 59 18 7c 8d 33 1a 85 | 98 29 76 e4 22 ac 91 00 31 d3 90 f1 d2 f4 f2 9a | 20 a3 6d 51 7b 67 e4 d8 4d 7c 9a fb 7c 63 7f d7 | c7 25 20 29 d5 e0 63 b5 f2 a7 5f d2 ec 98 84 3a | cb 95 85 f5 af 28 8d c4 5a 27 b6 9c 15 cc dd ed | f7 9f 6c d0 d0 af 5b 13 f0 d8 0f 7e 40 99 08 7d | 42 b3 e6 b5 93 1f 1e e1 85 38 e6 f0 e2 af 01 7d | 4f a1 b9 ef 5c 3f 42 c4 c2 ef e5 bc 70 ba 8e 68 | 71 82 c2 53 b9 56 35 3d c9 38 89 b6 a0 89 2b f3 | 29 00 00 24 b6 59 e5 4e ee 3f fd 49 7f 16 f6 82 | 11 23 a0 41 4a 5a b9 59 7b 13 06 de 98 79 ac e0 | 67 18 f7 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 70 4a 79 4b fb 19 31 c0 36 bc 71 | 8e f3 57 13 5a bf 33 aa 00 00 00 1c 00 00 40 05 | 04 fc 29 44 06 78 d7 26 30 ef ba 81 66 98 ec 1d | 35 84 86 e1 | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fa300 | #21 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c1 e2 95 19 0d 6d aa c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #21 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #21 | rejected packet: | c1 e2 95 19 0d 6d aa c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #21: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-47" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-47' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #47 at 0x557d46a14cd0 | State DB: adding IKEv2 state #47 in UNDEFINED | pstats #47 ikev2.ike started | Message ID: init #47: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #47: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #47; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-47" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-47" IKE SA #47 "road-eastnet-nonat-47" "road-eastnet-nonat-47" #47: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-47 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-47": constructed local IKE proposals for road-eastnet-nonat-47 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 47 for state #47 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469fa300 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #47 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 | crypto helper 15 resuming | #47 spent 0.117 milliseconds in ikev2_parent_outI1() | crypto helper 15 starting work-order 47 for state #47 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 47 | RESET processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-47" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.203 milliseconds in whack | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 47 time elapsed 0.000561 seconds | (#47) spent 0.564 milliseconds in crypto helper computing work-order 47: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 47 for state #47 to event queue | scheduling resume sending helper answer for #47 | libevent_malloc: new ptr-libevent@0x7fb374014820 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #47 | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 47 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #47 | **emit ISAKMP Message: | initiator cookie: | d1 80 96 dc 70 12 fd 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-47 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6c 89 48 be 2f 23 20 1a aa c0 f9 41 f1 9f b5 dc | ikev2 g^x 61 3b 4e 1d f2 94 aa 61 39 fa ff 9e ad da aa 8b | ikev2 g^x 79 a4 b0 75 86 17 be 8d f9 64 cd 5f 2c a3 74 02 | ikev2 g^x 5c d2 0b c0 e1 bc 40 a4 41 01 24 b6 16 65 80 b1 | ikev2 g^x 8d 5b f4 3e d9 78 1c 78 5b d0 4f 36 20 49 cf f5 | ikev2 g^x e6 39 8f 45 c4 05 3e 9a 58 8d 26 dc 13 63 31 38 | ikev2 g^x f0 e2 e6 6e a9 06 79 15 81 1d f5 b1 3e c3 40 32 | ikev2 g^x 5c c3 ef 40 73 34 78 3f 9f 9d fe 1e 7a 64 15 bd | ikev2 g^x f5 c1 66 e8 e7 57 72 db 6e e7 07 6d fc c3 84 15 | ikev2 g^x a7 9e a5 ae 49 06 60 b0 66 25 b2 60 5b c9 52 7b | ikev2 g^x 84 da 9e 07 cb 22 63 3f f7 e3 75 51 cd b7 f5 a9 | ikev2 g^x 00 8e ee 37 13 40 c4 a0 04 91 8b 4e b2 90 26 27 | ikev2 g^x 78 4c 50 15 9b df e6 81 a0 a4 86 f0 9c 4a d6 4e | ikev2 g^x 71 20 bc ef 14 af bb ba f8 7a 84 f5 e8 b4 d8 08 | ikev2 g^x bb e0 cf f0 c2 7a 1a fb 6d c0 80 83 cb fe 9c fe | ikev2 g^x 4d f9 6c 4a 79 4d c9 ec 6b b4 1f c4 42 35 86 05 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 45 2a 73 9c 59 88 24 30 1b 4c d7 76 91 c3 f5 9d | IKEv2 nonce 27 d4 d8 42 63 2d 46 4d bb 79 5b 50 bd 3d d6 ba | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d1 80 96 dc 70 12 fd 40 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2f | natd_hash: port= 01 f4 | natd_hash: hash= 5f 44 84 40 30 da 67 e5 a7 75 a7 f1 b3 01 a1 ea | natd_hash: hash= ef 36 29 e3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5f 44 84 40 30 da 67 e5 a7 75 a7 f1 b3 01 a1 ea | Notify data ef 36 29 e3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d1 80 96 dc 70 12 fd 40 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 02 24 d1 73 8e ed 3e 54 49 25 16 88 bd 9a 48 c6 | natd_hash: hash= 35 3e 63 7f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 02 24 d1 73 8e ed 3e 54 49 25 16 88 bd 9a 48 c6 | Notify data 35 3e 63 7f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #47 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #47: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #47 to 4294967295 after switching state | Message ID: IKE #47 skipping update_recv as MD is fake | Message ID: sent #47 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-47" #47: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.47:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #47) | d1 80 96 dc 70 12 fd 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 89 48 be 2f 23 20 1a aa c0 f9 41 f1 9f b5 dc | 61 3b 4e 1d f2 94 aa 61 39 fa ff 9e ad da aa 8b | 79 a4 b0 75 86 17 be 8d f9 64 cd 5f 2c a3 74 02 | 5c d2 0b c0 e1 bc 40 a4 41 01 24 b6 16 65 80 b1 | 8d 5b f4 3e d9 78 1c 78 5b d0 4f 36 20 49 cf f5 | e6 39 8f 45 c4 05 3e 9a 58 8d 26 dc 13 63 31 38 | f0 e2 e6 6e a9 06 79 15 81 1d f5 b1 3e c3 40 32 | 5c c3 ef 40 73 34 78 3f 9f 9d fe 1e 7a 64 15 bd | f5 c1 66 e8 e7 57 72 db 6e e7 07 6d fc c3 84 15 | a7 9e a5 ae 49 06 60 b0 66 25 b2 60 5b c9 52 7b | 84 da 9e 07 cb 22 63 3f f7 e3 75 51 cd b7 f5 a9 | 00 8e ee 37 13 40 c4 a0 04 91 8b 4e b2 90 26 27 | 78 4c 50 15 9b df e6 81 a0 a4 86 f0 9c 4a d6 4e | 71 20 bc ef 14 af bb ba f8 7a 84 f5 e8 b4 d8 08 | bb e0 cf f0 c2 7a 1a fb 6d c0 80 83 cb fe 9c fe | 4d f9 6c 4a 79 4d c9 ec 6b b4 1f c4 42 35 86 05 | 29 00 00 24 45 2a 73 9c 59 88 24 30 1b 4c d7 76 | 91 c3 f5 9d 27 d4 d8 42 63 2d 46 4d bb 79 5b 50 | bd 3d d6 ba 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 44 84 40 30 da 67 e5 a7 75 a7 f1 | b3 01 a1 ea ef 36 29 e3 00 00 00 1c 00 00 40 05 | 02 24 d1 73 8e ed 3e 54 49 25 16 88 bd 9a 48 c6 | 35 3e 63 7f | state #47 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469fa300 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fa300 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #47 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 | #47 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49604.653935 | resume sending helper answer for #47 suppresed complete_v2_state_transition() and stole MD | #47 spent 0.439 milliseconds in resume sending helper answer | stop processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb374014820 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d1 80 96 dc 70 12 fd 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #47 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #47 | rejected packet: | d1 80 96 dc 70 12 fd 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #47: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #34 | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #34 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #34 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49604.678106; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003847 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ddbf0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #34 | libevent_malloc: new ptr-libevent@0x7fb374014820 size 128 "road-eastnet-nonat-34" #34: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #34) | 6d a4 8e 40 25 ac 37 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 f2 a8 cc bb ec 52 8f ff d3 4f 1e 29 f8 d2 55 | ab 15 48 e3 86 d2 3c 7c c1 31 02 4c e6 92 88 7e | 1c 57 68 2c 31 6d 99 d6 04 b4 80 d9 9e 5d d6 2f | 5a 7c 33 74 f6 a2 f4 af 71 14 01 00 45 ac 02 2c | ae fd dc f0 fb 16 b1 b8 bb b1 c9 b6 79 4a 45 9c | f4 6e 30 a0 38 dd b1 84 0e 3d b2 47 58 b0 ed c1 | 2c 5c e6 69 11 9f 94 94 7a 6d 4e 80 2c 22 d1 2d | b1 3c 47 06 4d 81 ee b9 c9 ba 0f 94 7b ed d2 71 | 8c 4b 77 a2 43 7f 68 8c 2b 66 69 53 94 cf 5a 27 | 05 7e 88 ec 42 d8 31 27 ae 04 92 bf 4a 26 5e 51 | 58 d6 5c 7a 0b 0b 73 c1 d6 39 9b da c3 56 61 4e | 3f 7e 4e 21 30 a1 53 bd c0 b7 f9 c7 e1 cc 61 3a | e9 b4 0e 5d 6b 1a 6c d3 c1 42 80 a0 b9 ee e4 20 | 50 5f 0b 18 55 d4 17 9c be 51 af c3 be 4e 5f 48 | b1 02 bd 4d 0a 84 45 32 17 0f c9 bf 50 68 f3 a6 | 11 69 ef 13 ba a2 fb dd c4 95 c8 b3 71 8c 02 9e | 29 00 00 24 20 3c 42 13 ea f1 47 8b ab 88 6c 38 | 29 a2 e3 60 5f 2e e8 36 7d 92 76 6d 48 1c fe a8 | 8c f2 3e 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 92 97 87 98 41 7a 2f 24 03 5c de | 5f 9b fc ff 10 46 f5 79 00 00 00 1c 00 00 40 05 | 10 63 6f 88 71 aa 1b 8a ba b8 d4 ac c9 e8 55 07 | 6b c5 63 c0 | libevent_free: release ptr-libevent@0x7fb38800a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #34 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #3 | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #3 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #3 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49604.678286; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.009343 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #3 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 "road-eastnet-nonat-3" #3: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #3) | 81 44 b6 c8 2a 40 ce 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 54 15 6a 8c 9d d0 48 d6 59 e5 e2 2e a9 83 c3 | a8 ba 16 88 07 d6 11 91 3a 48 ca 9a fe dc 40 cc | 29 63 c0 dc 38 80 92 c8 fd f6 81 d3 d8 66 94 3d | c5 2d e7 b1 2b da e7 bc 78 d1 e4 dc 9a 41 8c 14 | c6 fb cd 2a 97 af ef ad 23 32 6d 6d f8 fa b5 27 | 9e 41 35 14 10 3b f6 98 c8 8f d3 aa de fa 55 91 | cb c5 c0 43 8b 3e 66 29 8a ce 63 ed 04 d9 5e 36 | d1 ee b2 55 32 92 26 8a 60 a1 e6 8a c1 81 34 3b | fe bb 92 45 5e 07 2a fa 53 4e 52 04 9a fe 49 14 | 7b 7a a1 34 68 ab 79 c6 b1 5b 9e 7d ee f2 e3 2b | b4 f7 cd 72 14 0a 7e 40 88 1b b7 27 4f cc 0e 08 | a7 a7 14 77 d4 62 20 1a 96 bd a4 9c 9c c7 ed e3 | be 59 87 38 e7 1a a8 83 a8 52 47 62 89 d6 f0 d1 | ce 49 83 2a 83 87 c7 c7 2e 90 40 05 a6 4e c5 26 | bd c4 1e e7 34 ac 09 b9 70 d9 7f 32 91 1c d9 7b | 01 ed eb 14 c7 ff 07 8b 68 87 79 fe ab f8 54 a7 | 29 00 00 24 af 67 2a 08 9a 9a ad ff 86 6c 03 06 | 6f 2f 6b af d5 26 d4 77 40 17 03 25 58 a0 84 c4 | 14 b9 e1 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 4b 9f 22 64 ba ce 64 1d b6 f5 ba | 24 33 ca 6e b0 87 4a 02 00 00 00 1c 00 00 40 05 | 8e b1 42 d9 c7 63 9c 7b 3d 57 a7 c1 0c 5d 8c 4c | 33 59 3d db | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #3 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d a4 8e 40 25 ac 37 c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #34 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #34 | rejected packet: | 6d a4 8e 40 25 ac 37 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #34: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 44 b6 c8 2a 40 ce 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #3 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #3 | rejected packet: | 81 44 b6 c8 2a 40 ce 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #3: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0542 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #41 | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #41 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #41 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49604.704623; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500078 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #41 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 "road-eastnet-nonat-41" #41: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #41) | 8c ff 26 ec fd d0 54 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 6e ec 95 3c 3a 16 99 41 58 58 6d 01 e2 00 52 | 61 4b c1 ec e1 3d d8 4e 54 c1 3f 99 6b 75 66 7c | 92 13 65 ae e7 70 46 75 9c c5 22 7e 39 16 2c 7c | ed 79 f7 7b 1e 03 31 32 5f 32 c2 43 74 2e 80 66 | 05 70 11 cc 43 ce 1e db 54 28 24 d1 42 b1 78 ad | e4 d1 e6 87 87 84 0f b3 11 50 a6 79 e1 08 7c 97 | 7e bd ba 46 ef f8 51 ce 68 86 83 2a 2c 29 00 29 | a5 58 88 f4 ed 2a f4 20 30 da 5d b1 69 45 2e 86 | 07 5f aa 0a 89 4a 6e 50 df 32 c3 37 59 a0 ba ad | 86 bd 19 1f 9a e2 19 57 1e fc 59 a2 20 ba a6 61 | df 8c b1 78 f4 73 20 28 d7 5d 27 a9 6d f4 51 05 | 00 85 1f 11 24 82 a0 ad b8 70 fc 6e 4d 99 a5 50 | dd 2e 79 4a 4c a1 78 07 7c f4 48 8d c5 cd ae 3d | 60 f1 3e 46 13 92 0c ad 34 dc 62 b8 45 01 1d 0e | 54 aa 15 f0 b8 36 03 5c 9a b5 ba b5 7c 77 32 6f | a5 95 b6 eb ec c2 d3 a2 c8 7a f9 23 04 ed b5 3b | 29 00 00 24 d2 1e ab ae e7 c2 8c f2 ef 74 c1 f0 | 3d f2 d7 f9 46 a9 e4 e0 b6 87 92 c1 10 9a fa bd | 74 9b e3 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 98 3f 00 de 9d 4b 8f 8e e4 88 e6 | cb 33 f8 3a c9 9d db 23 00 00 00 1c 00 00 40 05 | 7d 19 19 07 bb fc 4c f4 5b 43 3f 70 14 2d 10 a5 | 77 03 39 4f | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #41 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c ff 26 ec fd d0 54 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #41 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #41 | rejected packet: | 8c ff 26 ec fd d0 54 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #41: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-48" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-48' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #48 at 0x557d46a16290 | State DB: adding IKEv2 state #48 in UNDEFINED | pstats #48 ikev2.ike started | Message ID: init #48: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #48: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #48; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-48" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-48" IKE SA #48 "road-eastnet-nonat-48" "road-eastnet-nonat-48" #48: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-48 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-48": constructed local IKE proposals for road-eastnet-nonat-48 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 48 for state #48 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb370005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #48 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 | #48 spent 0.141 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-48" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.227 milliseconds in whack | crypto helper 19 resuming | crypto helper 19 starting work-order 48 for state #48 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 48 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 48 time elapsed 0.000989 seconds | (#48) spent 0.995 milliseconds in crypto helper computing work-order 48: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 48 for state #48 to event queue | scheduling resume sending helper answer for #48 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #48 | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 48 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #48 | **emit ISAKMP Message: | initiator cookie: | 92 07 42 48 2a e6 dd 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-48 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2f 27 70 ee fe 7b a5 6b c0 91 72 76 bf b9 26 41 | ikev2 g^x 8a c5 01 3c cd 8b 21 f3 23 df 5c 81 f1 ed a2 12 | ikev2 g^x a1 c4 5e 2f a7 b1 21 02 24 b9 30 c4 f5 c4 2d c4 | ikev2 g^x 90 7e 3e f0 c9 0b f2 18 3c 2b b9 91 3a da c1 6c | ikev2 g^x 57 28 75 1b 3a 0e e8 9b fc 4b ee 5c 39 98 fa 15 | ikev2 g^x be 81 4e e4 0c 6c a4 75 1b 83 45 74 98 dd 81 5b | ikev2 g^x 06 80 95 32 c0 f4 a2 4b 9d f4 17 33 73 16 94 48 | ikev2 g^x 16 60 93 ae 3d ce 3e d6 a3 61 16 51 cb 19 ec 02 | ikev2 g^x 00 f8 5a 99 f9 c4 14 2b 6a 99 61 a3 6a e4 c5 97 | ikev2 g^x ad 75 bb 6b 78 38 5a b9 44 bc 5c a3 2d 23 20 4c | ikev2 g^x 99 1b 88 95 1f b4 34 15 92 91 16 2b 1d 90 a8 32 | ikev2 g^x bd a4 79 83 a7 b0 92 15 f0 e3 c2 79 58 67 56 eb | ikev2 g^x 4d 0c 97 c3 3f ae 15 49 f9 9c d2 3e ec c3 17 b9 | ikev2 g^x bd 62 c7 73 21 fe 81 8b e3 b9 eb a9 ce c7 0f d3 | ikev2 g^x 3f 5d 5a 44 c2 b4 29 b6 b5 67 52 29 de ca c6 15 | ikev2 g^x 31 6c 15 9d 56 b1 be 81 9a 0d b9 07 79 05 6e c9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 56 48 d0 40 29 5d 70 09 47 7a f3 f6 53 84 44 57 | IKEv2 nonce f6 31 5c 3b e1 9a 2b 92 5f 13 77 b9 29 81 06 a9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 92 07 42 48 2a e6 dd 70 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 30 | natd_hash: port= 01 f4 | natd_hash: hash= ee 92 e0 aa 95 98 e7 44 d2 2d 1e d8 d0 35 7f 77 | natd_hash: hash= 52 84 b9 c1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ee 92 e0 aa 95 98 e7 44 d2 2d 1e d8 d0 35 7f 77 | Notify data 52 84 b9 c1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 92 07 42 48 2a e6 dd 70 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a2 97 dc 1e 35 5d 8b 7e f0 05 d9 9d 5b 9e 9f 7f | natd_hash: hash= 26 7a 4a c3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a2 97 dc 1e 35 5d 8b 7e f0 05 d9 9d 5b 9e 9f 7f | Notify data 26 7a 4a c3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #48 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #48: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #48 to 4294967295 after switching state | Message ID: IKE #48 skipping update_recv as MD is fake | Message ID: sent #48 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-48" #48: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.48:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #48) | 92 07 42 48 2a e6 dd 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 27 70 ee fe 7b a5 6b c0 91 72 76 bf b9 26 41 | 8a c5 01 3c cd 8b 21 f3 23 df 5c 81 f1 ed a2 12 | a1 c4 5e 2f a7 b1 21 02 24 b9 30 c4 f5 c4 2d c4 | 90 7e 3e f0 c9 0b f2 18 3c 2b b9 91 3a da c1 6c | 57 28 75 1b 3a 0e e8 9b fc 4b ee 5c 39 98 fa 15 | be 81 4e e4 0c 6c a4 75 1b 83 45 74 98 dd 81 5b | 06 80 95 32 c0 f4 a2 4b 9d f4 17 33 73 16 94 48 | 16 60 93 ae 3d ce 3e d6 a3 61 16 51 cb 19 ec 02 | 00 f8 5a 99 f9 c4 14 2b 6a 99 61 a3 6a e4 c5 97 | ad 75 bb 6b 78 38 5a b9 44 bc 5c a3 2d 23 20 4c | 99 1b 88 95 1f b4 34 15 92 91 16 2b 1d 90 a8 32 | bd a4 79 83 a7 b0 92 15 f0 e3 c2 79 58 67 56 eb | 4d 0c 97 c3 3f ae 15 49 f9 9c d2 3e ec c3 17 b9 | bd 62 c7 73 21 fe 81 8b e3 b9 eb a9 ce c7 0f d3 | 3f 5d 5a 44 c2 b4 29 b6 b5 67 52 29 de ca c6 15 | 31 6c 15 9d 56 b1 be 81 9a 0d b9 07 79 05 6e c9 | 29 00 00 24 56 48 d0 40 29 5d 70 09 47 7a f3 f6 | 53 84 44 57 f6 31 5c 3b e1 9a 2b 92 5f 13 77 b9 | 29 81 06 a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 92 e0 aa 95 98 e7 44 d2 2d 1e d8 | d0 35 7f 77 52 84 b9 c1 00 00 00 1c 00 00 40 05 | a2 97 dc 1e 35 5d 8b 7e f0 05 d9 9d 5b 9e 9f 7f | 26 7a 4a c3 | state #48 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb370005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #48 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 | #48 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49604.722763 | resume sending helper answer for #48 suppresed complete_v2_state_transition() and stole MD | #48 spent 0.46 milliseconds in resume sending helper answer | stop processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb368012840 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 07 42 48 2a e6 dd 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #48 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #48 | rejected packet: | 92 07 42 48 2a e6 dd 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #48: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0603 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #22 | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #22 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #22 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49604.731967; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004015 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #22 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 "road-eastnet-nonat-22" #22: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #22) | fb 94 21 58 38 c3 f9 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 fa b9 d7 68 fd 72 8f 42 0c d5 a2 f7 f4 9b 8a | d7 23 52 ca 6c 52 76 c9 13 29 10 22 e6 ec 59 2c | a8 f2 aa 73 f8 3e 6b 2a a1 80 14 ff a7 56 48 4f | 3e 9b c4 33 e8 9f 3f e1 00 d1 2f db 56 9e da 18 | 67 a2 e0 d7 98 13 63 9f 28 d8 20 03 fc d6 f3 6a | 0b 8c 23 20 ba 26 3e 63 f5 df a1 d6 76 bf 7c f8 | 52 9b 7b e3 ba 8b f9 13 50 1b 61 13 1c 98 cb 7a | 18 f4 0d 9c 45 e0 10 ca 68 77 fa c0 54 76 19 a8 | f4 83 b0 e9 4d 71 3e a8 7b e6 82 90 01 66 8f f4 | 47 f6 ec 2f 3d 48 64 9c f2 b5 21 50 b5 a6 c1 a0 | 91 f5 21 c6 ec 6a bd 95 39 08 03 b0 29 f0 d4 a1 | f0 7d 39 2b f5 47 de 25 f6 c5 56 6c a0 9c af 3d | e0 4f 7d d8 1e 86 d7 ac 96 7e 36 e6 1e 20 3d 6a | 91 0f b8 c5 68 62 9b 7a 5c 1e b4 57 88 ac 53 77 | e1 de dd ef 41 8c d3 d4 57 c9 16 9b e4 e9 05 4c | 74 12 06 2b a5 93 e5 02 33 46 72 d8 88 42 05 bd | 29 00 00 24 90 c9 d4 3c 5f 0b 25 0f f1 bc 52 9a | c3 5c 4d d3 31 89 58 99 a1 8a 08 b0 ed 9a e3 4f | 90 7f 17 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 cd b6 d8 9c a0 ac 4f 4b ba 38 63 | e9 a9 a0 ba 13 a5 50 1a 00 00 00 1c 00 00 40 05 | 2f e0 72 4a 02 ff fa 8e 97 a9 39 d6 93 d4 2c 35 | dd 9e 83 2a | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #22 spent 0.178 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 94 21 58 38 c3 f9 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #22 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #22 | rejected packet: | fb 94 21 58 38 c3 f9 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #22: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8d60 | handling event EVENT_RETRANSMIT for parent state #35 | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #35 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #35 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49604.742517; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002592 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #35 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 "road-eastnet-nonat-35" #35: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #35) | ef 15 ea 36 a5 a5 5c 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 96 b3 aa c0 4d d9 88 e5 ac e1 94 c5 3f 96 d9 | b4 11 6c 13 85 3c 47 49 a4 e7 6c bf 49 2c f7 e6 | 82 c1 3a 00 a1 f9 46 f7 54 13 9f 65 48 18 8b 9f | e6 da f8 f3 07 a0 ac 41 d5 a9 3b e6 a7 7c a3 81 | db 32 9e 99 47 70 04 b0 f4 2d a4 b0 a4 3b e1 28 | 9f 63 a2 94 b7 1f 9e 68 18 47 6f ef 05 c0 65 15 | cc 6b 7e 6d 5e e8 2a 06 87 47 6c aa e2 89 a2 b1 | 87 d5 9a c7 5c f6 c5 c9 ef 9a f5 1e 14 44 ed f6 | 21 c2 10 91 92 32 f4 48 3d 48 76 7f da 54 41 70 | 3a 27 f3 0e a6 36 ab ef 51 4a ee 27 f3 fa b5 4a | 81 80 97 f8 12 4a 6b 6e 11 f7 41 fe d5 56 ec af | 7e dc 33 c0 77 e2 37 b5 3f fc b0 40 58 cb 92 b6 | 44 3d 99 0d 17 ae 15 bb a7 c0 2c 1d dc 42 f0 67 | d6 5a 17 88 ce 32 f6 da 90 65 b7 17 83 70 da 67 | c5 33 42 42 d7 1a 6c 70 ed 40 df e9 ee 39 2a 8f | f5 b4 db 3f e7 42 51 2e 4d a9 fe 76 ba 09 20 58 | 29 00 00 24 f0 8c e1 d2 ee 2f 9e 4d 17 8a 20 ca | cf 55 95 6a 83 c3 98 8f db 61 db bb f1 69 5e b0 | e6 61 e7 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 5c ea 28 17 8f c3 f5 57 90 ad 1e | 3a ae c2 e5 e1 92 7b 3c 00 00 00 1c 00 00 40 05 | cb 88 24 12 73 0e 41 cb fe 6b 7e d6 a5 c0 bb a2 | e1 60 1e c0 | libevent_free: release ptr-libevent@0x7fb35000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8d60 | #35 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 15 ea 36 a5 a5 5c 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #35 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #35 | rejected packet: | ef 15 ea 36 a5 a5 5c 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #35: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-49" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-49' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #49 at 0x557d46a17850 | State DB: adding IKEv2 state #49 in UNDEFINED | pstats #49 ikev2.ike started | Message ID: init #49: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #49: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #49; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-49" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-49" IKE SA #49 "road-eastnet-nonat-49" "road-eastnet-nonat-49" #49: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-49 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-49": constructed local IKE proposals for road-eastnet-nonat-49 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 49 for state #49 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469e05a0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #49 | libevent_malloc: new ptr-libevent@0x7fb35000cf80 size 128 | #49 spent 0.182 milliseconds in ikev2_parent_outI1() | crypto helper 6 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 starting work-order 49 for state #49 | RESET processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 49 | RESET processing: connection "road-eastnet-nonat-49" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.315 milliseconds in whack | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 49 time elapsed 0.000687 seconds | (#49) spent 0.694 milliseconds in crypto helper computing work-order 49: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 49 for state #49 to event queue | scheduling resume sending helper answer for #49 | libevent_malloc: new ptr-libevent@0x7fb36c012840 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #49 | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 49 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #49 | **emit ISAKMP Message: | initiator cookie: | 8b 45 5c f0 af 2f 9d ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-49 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 20 38 13 81 3a b9 33 6e f2 a1 41 ed b7 e9 17 cf | ikev2 g^x 38 df bd f2 c5 3d 78 1c 98 5b e5 97 39 7c 00 0a | ikev2 g^x 9b b9 2b 4e ee 4e 90 b7 3f 17 93 3b 49 e6 73 ac | ikev2 g^x f3 36 ea c0 f6 08 78 26 b2 58 4a a1 8f ff 26 a9 | ikev2 g^x a2 29 62 4b f6 47 e2 5d a0 f3 e8 a3 da 86 cc 66 | ikev2 g^x 5a 6a 1d 0c 47 30 d7 e6 6e 32 62 71 d7 d3 1b 25 | ikev2 g^x 92 10 eb e7 f4 a1 c6 b8 cf 48 2b c2 a1 ae c9 5f | ikev2 g^x 55 56 6d 5d 77 a7 5f aa 02 cf a8 ea bb 62 18 44 | ikev2 g^x 0f aa 1d 7d 23 c7 37 6d 72 2b 4a da 38 22 af af | ikev2 g^x 35 47 8a 4d fb f1 2e 0f fa 54 54 48 f4 2f 1b 4b | ikev2 g^x 5a 9a c8 ab f4 0a 9c 36 8e 9a 37 b6 3a a4 36 09 | ikev2 g^x f9 cb 85 a0 d5 4e 66 72 2d dc a7 8d 87 52 32 39 | ikev2 g^x 0d 6e ce 73 51 c4 9b ee a5 7a c3 e9 dd 43 0b 8d | ikev2 g^x c9 c7 df e3 c7 9a fc aa 8b 37 41 93 d2 be 3c 27 | ikev2 g^x 15 30 62 da 6c d3 07 29 68 48 b5 55 56 c4 17 4f | ikev2 g^x b5 8f 29 d1 f2 fb 9e ea 13 d1 f0 21 44 a0 36 ca | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0e e2 a8 92 f0 b5 63 29 61 a0 ee 39 b4 45 f6 bb | IKEv2 nonce e0 ab b1 76 a4 84 16 9e da d2 be 94 e8 6d f8 9c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8b 45 5c f0 af 2f 9d ea | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 31 | natd_hash: port= 01 f4 | natd_hash: hash= b0 12 9b 83 c2 c3 d2 71 a5 38 21 6e a0 97 8f 66 | natd_hash: hash= c6 b8 71 3b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b0 12 9b 83 c2 c3 d2 71 a5 38 21 6e a0 97 8f 66 | Notify data c6 b8 71 3b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8b 45 5c f0 af 2f 9d ea | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d2 ce 05 69 62 ac 37 a7 c1 ab 75 f3 75 7a c1 3e | natd_hash: hash= 4a 93 d7 88 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d2 ce 05 69 62 ac 37 a7 c1 ab 75 f3 75 7a c1 3e | Notify data 4a 93 d7 88 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #49 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #49: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #49 to 4294967295 after switching state | Message ID: IKE #49 skipping update_recv as MD is fake | Message ID: sent #49 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-49" #49: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.49:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #49) | 8b 45 5c f0 af 2f 9d ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 38 13 81 3a b9 33 6e f2 a1 41 ed b7 e9 17 cf | 38 df bd f2 c5 3d 78 1c 98 5b e5 97 39 7c 00 0a | 9b b9 2b 4e ee 4e 90 b7 3f 17 93 3b 49 e6 73 ac | f3 36 ea c0 f6 08 78 26 b2 58 4a a1 8f ff 26 a9 | a2 29 62 4b f6 47 e2 5d a0 f3 e8 a3 da 86 cc 66 | 5a 6a 1d 0c 47 30 d7 e6 6e 32 62 71 d7 d3 1b 25 | 92 10 eb e7 f4 a1 c6 b8 cf 48 2b c2 a1 ae c9 5f | 55 56 6d 5d 77 a7 5f aa 02 cf a8 ea bb 62 18 44 | 0f aa 1d 7d 23 c7 37 6d 72 2b 4a da 38 22 af af | 35 47 8a 4d fb f1 2e 0f fa 54 54 48 f4 2f 1b 4b | 5a 9a c8 ab f4 0a 9c 36 8e 9a 37 b6 3a a4 36 09 | f9 cb 85 a0 d5 4e 66 72 2d dc a7 8d 87 52 32 39 | 0d 6e ce 73 51 c4 9b ee a5 7a c3 e9 dd 43 0b 8d | c9 c7 df e3 c7 9a fc aa 8b 37 41 93 d2 be 3c 27 | 15 30 62 da 6c d3 07 29 68 48 b5 55 56 c4 17 4f | b5 8f 29 d1 f2 fb 9e ea 13 d1 f0 21 44 a0 36 ca | 29 00 00 24 0e e2 a8 92 f0 b5 63 29 61 a0 ee 39 | b4 45 f6 bb e0 ab b1 76 a4 84 16 9e da d2 be 94 | e8 6d f8 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 12 9b 83 c2 c3 d2 71 a5 38 21 6e | a0 97 8f 66 c6 b8 71 3b 00 00 00 1c 00 00 40 05 | d2 ce 05 69 62 ac 37 a7 c1 ab 75 f3 75 7a c1 3e | 4a 93 d7 88 | state #49 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35000cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469e05a0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ef4e0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #49 | libevent_malloc: new ptr-libevent@0x7fb35000cf80 size 128 | #49 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49604.785182 | resume sending helper answer for #49 suppresed complete_v2_state_transition() and stole MD | #49 spent 0.489 milliseconds in resume sending helper answer | stop processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c012840 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 45 5c f0 af 2f 9d ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #49 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #49 | rejected packet: | 8b 45 5c f0 af 2f 9d ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #49: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #42 | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #42 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #42 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49604.788385; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500033 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #42 | libevent_malloc: new ptr-libevent@0x7fb36c012840 size 128 "road-eastnet-nonat-42" #42: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #42) | 6d 45 59 82 ce 2c 77 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 19 87 21 99 aa 5a cb db ce 0f 02 f2 50 c9 ac 92 | 89 7c 70 85 a8 a7 33 4a c2 44 36 a5 03 8e 1f 50 | c8 86 2e d1 a1 d8 14 17 9c 7c a1 44 65 ba 61 77 | f0 62 19 6f f9 72 cc 36 22 03 c3 7d e3 8c 01 7c | 58 c0 91 2e 4f 24 ac cd af f7 da 61 3e 4b 43 c9 | b4 5d 67 e2 f1 65 be 23 88 f7 f4 e6 25 50 c9 e3 | 21 af 1c 45 62 8a 73 3a 98 47 b9 78 6f ee 87 26 | 3b 63 01 1e 58 61 99 0e 7a 91 7d 30 e0 59 53 0b | 92 57 66 fd a7 1f 2b 11 d7 59 95 9a 31 fc 95 b7 | 6b 6d 54 d3 d2 0f 8f 6e 22 a6 95 24 ad 69 c7 e4 | 30 99 2e f3 f9 ce 36 7f 2b 10 24 3b 8a de bf 7e | cb e6 f5 71 51 3c fe 08 40 b7 0a aa 06 06 b7 d2 | 69 fa d5 d4 16 ea b0 b1 e6 af 20 69 3c 12 1e 86 | 3a 05 a1 45 01 d3 59 e6 49 c9 c2 6a 69 6b a1 a1 | b0 18 e7 68 dc 1f 70 e8 33 59 8d 8e 1f 6a e1 13 | 5e 04 b2 02 62 fb f4 16 44 cd 9d 1e 33 84 73 83 | 29 00 00 24 98 90 54 f6 26 53 aa 96 7a 47 ff f3 | 5b dc e1 95 5c f0 6d 5d ed 6d 00 c6 1d e8 59 f1 | 2a 1c 8a 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 cb 92 0c 07 24 d9 90 48 22 d8 76 | e5 5b bc c8 39 99 d2 4d 00 00 00 1c 00 00 40 05 | cb e3 e2 5e 9a 09 f4 90 ee 73 df 07 77 16 6b 37 | da 99 3b e3 | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #42 spent 0.091 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 45 59 82 ce 2c 77 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #42 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #42 | rejected packet: | 6d 45 59 82 ce 2c 77 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #42: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #36 | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #36 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #36 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49604.811642; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000442 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #36 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 "road-eastnet-nonat-36" #36: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #36) | c4 93 27 79 3b f0 36 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 44 1e 02 70 5f fd 14 41 57 b4 33 c5 4d c1 bf | 56 a3 d0 f5 4b 1b 15 73 5b 56 52 91 f2 4c 9d dc | 3f 2d 5a 36 27 be 97 1b 2d 43 21 16 b5 25 60 73 | 31 d7 04 cb ac b3 fd 19 61 2f 36 91 05 d7 55 8c | 92 5d 99 4b ae f6 cf a1 6e 2e de fa cb a4 7e 7e | b4 08 08 4f 90 51 13 b7 5b cb 7e 2c db 61 c5 d9 | d2 2f 86 cb df 97 d1 5e d4 95 3b c2 71 e2 2b bf | 7b e5 e9 8b bd 5c de 24 ac 5a 8b 4a 5d 3b ff 1e | f8 f4 2b 7b 96 0c 02 8f ac d9 62 f7 21 fb 07 5e | 9d 3f 41 15 d1 79 65 31 2a 68 5a 1a 56 fc 9c 2a | 20 90 63 93 fd d9 59 08 0d 3a 51 cc ee 1b ca 83 | 3c 5f 8f 03 9c cf 6f 04 52 23 a8 cb 50 43 72 18 | 78 cb 0f 8d bf 67 75 81 61 d9 91 a3 5f f5 1e ad | 09 8c 98 32 17 11 19 f3 54 f2 c6 36 e6 24 63 e2 | 41 b5 39 5c af a7 57 20 af 37 ac c1 12 94 ec 3a | e0 ac a7 07 42 78 d2 32 96 5c a0 ed 7e 90 04 46 | 29 00 00 24 e4 05 e8 ad 6f 35 18 e8 9c ba 2a d7 | ba f9 eb 8c c3 7b 43 88 9a 23 1f e0 cb de a0 8e | 76 67 65 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab a4 b2 11 db 45 90 fb 99 ab 4d 81 | 85 c6 e5 03 d5 18 31 7d 00 00 00 1c 00 00 40 05 | 9e c9 75 d2 3b 5d 13 cd bd fe b5 96 1f 79 bf 21 | fa a0 06 d7 | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #36 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 93 27 79 3b f0 36 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #36 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #36 | rejected packet: | c4 93 27 79 3b f0 36 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #36: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #4 | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #4 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #4 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49604.816984; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003476 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #4 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 "road-eastnet-nonat-4" #4: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #4) | 9f e3 9d 02 77 44 b7 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 12 be 82 37 05 d2 52 25 54 17 1c 7e a4 e7 a1 | 7e a3 9e 01 f0 c9 5e f6 79 14 37 d9 ec ef 3e 7b | d6 12 38 d8 73 16 9f 73 2c 17 04 25 c3 08 1e 06 | d4 99 19 15 32 45 9a a7 b4 d5 ad 96 4d 41 dc 91 | 4d c8 05 99 28 4b a0 e8 08 9f f7 76 6e 87 6e f0 | e8 58 e3 c1 70 13 6f 8d cd 7f 4b 91 ab b0 98 2b | 80 11 c8 ef d5 8f f3 5b b1 1f e0 43 de 0c 0e b1 | 13 32 29 e5 dd ca fb b5 e8 02 d1 3b 1d 9e 4d 95 | 8d f8 b1 fd 7f db 1b 37 33 cf 99 72 de f0 e3 79 | 73 e7 61 a0 9f 73 96 2a c8 d9 3f f2 5e 93 fa f5 | 10 3a 62 6a 38 cd 93 3a 9f a8 56 7d f2 c3 ee 21 | b5 e7 1b 68 51 3a 6c 80 5b ad 50 8d 16 63 1e 8c | 65 d8 ef 12 42 db b7 45 7e c0 09 e7 f6 56 5d da | d8 52 c7 89 46 5c ed c7 24 ca 60 5c ff 30 28 b2 | a1 94 8c ec d2 08 2c a4 8a 1d a2 db fd 97 89 ac | cf d6 3b e3 0f 35 26 7e 4f b9 c8 b0 82 f2 80 6e | 29 00 00 24 ff 8a 31 04 ed 0e 73 16 f9 33 92 87 | 63 96 e9 90 5e 3a 90 66 d0 c2 86 27 40 23 58 23 | 51 d5 8c f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 57 40 bb 9d 01 b2 e8 79 26 d3 b2 | 9e 9a c3 98 03 95 6b f7 00 00 00 1c 00 00 40 05 | 19 68 23 54 27 85 e7 5a 70 ec 13 67 75 7a 20 68 | 80 f1 f5 99 | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #4 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f e3 9d 02 77 44 b7 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #4 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #4 | rejected packet: | 9f e3 9d 02 77 44 b7 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #4: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_RETRANSMIT for parent state #23 | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #23 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #23 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49604.820295; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002091 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #23 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 "road-eastnet-nonat-23" #23: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #23) | 11 64 2b cc 79 62 5e 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 73 2b eb f6 ef a5 89 1a 84 5f 77 86 97 95 f5 | 41 68 46 e7 c2 3a 4b 96 08 d9 dc ac 0c dd 5f 9b | 9c 2f fb 55 35 f0 7e cd 72 e1 cc 2d 6a fa 78 20 | 87 1a 7a 27 9f 9e c1 5d d5 9e 2c a0 07 0d 68 be | 9e e9 e9 2b 00 f9 05 41 09 d8 c4 31 fa 61 72 87 | 90 51 a0 68 b9 49 7c 1e 75 38 ea 5f 98 5e c2 d2 | 66 ca 13 be 66 2b cf da 9f 87 38 b0 7e a9 5b 2c | b6 4d 89 7d 77 c1 b9 97 25 e9 f9 03 6e 50 c9 f0 | 4a 7a ea 26 c5 82 77 fd 51 df 29 99 2b 7c 16 40 | 15 23 9e b1 86 5f 7e 14 de 76 c4 15 a3 9d c9 b4 | 9c 1b 90 c7 1e 57 7f 74 e2 ad 9a 3c 48 8f 70 44 | 85 18 d4 03 39 40 d0 15 5b 33 89 0a c2 cc bd 37 | e0 4e e5 f2 46 4f 47 44 cf d8 ce b3 b6 34 38 c5 | 35 57 26 ef 2d db be d0 db df 2a 42 e2 e1 8f 1d | 48 dc 28 b8 9a 19 2e b1 d2 17 f5 9d a6 50 4d 1a | 18 88 cf 51 7a 98 9f 7a 85 1b 6d 6e b4 28 52 31 | 29 00 00 24 7b 3d c1 32 8e 45 e7 94 6a 53 a8 c9 | d4 42 3b 62 4a d5 d1 ca c0 9b 8b 0f 34 82 fe 78 | 98 28 d2 99 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 90 87 c3 2a f9 31 e3 ce f5 bd a0 4a | 02 f7 6c fe 1a b5 f1 41 00 00 00 1c 00 00 40 05 | a7 5c 60 43 7b 55 16 31 7f 2f 25 27 9c df 44 42 | dd 9f 1f 73 | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | #23 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 64 2b cc 79 62 5e 8e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #23 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #23 | rejected packet: | 11 64 2b cc 79 62 5e 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #23: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0557 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-50" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-50' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #50 at 0x557d46a18e10 | State DB: adding IKEv2 state #50 in UNDEFINED | pstats #50 ikev2.ike started | Message ID: init #50: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #50: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #50; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-50" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-50" IKE SA #50 "road-eastnet-nonat-50" "road-eastnet-nonat-50" #50: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-50 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-50": constructed local IKE proposals for road-eastnet-nonat-50 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 50 for state #50 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469fb8a0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #50 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 | #50 spent 0.138 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-50" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.223 milliseconds in whack | crypto helper 11 resuming | crypto helper 11 starting work-order 50 for state #50 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 50 | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 50 time elapsed 0.001012 seconds | (#50) spent 0.988 milliseconds in crypto helper computing work-order 50: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 50 for state #50 to event queue | scheduling resume sending helper answer for #50 | libevent_malloc: new ptr-libevent@0x7fb360012840 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #50 | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 50 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #50 | **emit ISAKMP Message: | initiator cookie: | 96 fd fa e4 3e 0e 84 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-50 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 72 85 b8 19 de 5c 0b b8 2d cb 54 cd 4a 1a dc 75 | ikev2 g^x 29 fd ca 47 94 14 29 17 31 bc e5 6f 6c f8 34 07 | ikev2 g^x 54 0a 45 19 2c 2a 6f 1c b9 dd 1e a6 5c 18 fd 5f | ikev2 g^x 81 44 c7 97 e9 8f a1 20 0b 20 67 50 dc 17 2d 25 | ikev2 g^x 1e 18 a7 76 43 da 58 3d a0 3c 42 3d 77 42 d1 eb | ikev2 g^x ed 35 62 7a 01 62 e1 32 87 10 6c d5 80 f8 d5 7a | ikev2 g^x e6 0d bc 8d d6 42 76 b9 2d fe 0d c3 eb e6 a9 0d | ikev2 g^x 0e 9f 06 5b af 9e 49 ff c0 94 83 2a d0 2d 71 88 | ikev2 g^x 4e 9a 35 ec c3 f5 8a a6 c6 22 6e 7e 16 d4 d9 e4 | ikev2 g^x d9 14 a9 a0 89 f2 18 8e be cf da c0 b4 27 62 b2 | ikev2 g^x 69 81 38 d5 cf 1b 18 ef 28 a2 d6 ab 45 93 46 f0 | ikev2 g^x b0 cf a6 b1 57 a8 1a d7 72 93 ec cd 51 ba 98 80 | ikev2 g^x 63 05 e1 50 59 41 cf a5 af 5d 7f 76 36 8e 63 f7 | ikev2 g^x e7 a8 78 3d b4 e5 4b 57 33 d8 0b ca bb 46 3b d1 | ikev2 g^x 5c 60 2c ab 89 51 2a 58 57 80 21 7f 56 14 26 65 | ikev2 g^x bd a7 02 e1 81 1f b6 ff ab b3 3c 36 3a 4d e7 be | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 62 85 07 c7 f7 76 d5 f9 35 e6 84 85 cf ff 39 b7 | IKEv2 nonce d3 8a fe b9 27 ad b1 ed 4e 28 c4 d4 73 2f 0f ef | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 96 fd fa e4 3e 0e 84 2d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 32 | natd_hash: port= 01 f4 | natd_hash: hash= 62 6a 14 0a 8a ea 03 bd 41 dc ab fe 15 04 7a 2b | natd_hash: hash= 71 ea 6d 09 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 62 6a 14 0a 8a ea 03 bd 41 dc ab fe 15 04 7a 2b | Notify data 71 ea 6d 09 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 96 fd fa e4 3e 0e 84 2d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 24 23 f0 d4 3c 33 30 25 f8 fc 46 79 64 b6 7b 59 | natd_hash: hash= 6c 35 21 7f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 24 23 f0 d4 3c 33 30 25 f8 fc 46 79 64 b6 7b 59 | Notify data 6c 35 21 7f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #50 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #50: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #50 to 4294967295 after switching state | Message ID: IKE #50 skipping update_recv as MD is fake | Message ID: sent #50 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-50" #50: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.50:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #50) | 96 fd fa e4 3e 0e 84 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 85 b8 19 de 5c 0b b8 2d cb 54 cd 4a 1a dc 75 | 29 fd ca 47 94 14 29 17 31 bc e5 6f 6c f8 34 07 | 54 0a 45 19 2c 2a 6f 1c b9 dd 1e a6 5c 18 fd 5f | 81 44 c7 97 e9 8f a1 20 0b 20 67 50 dc 17 2d 25 | 1e 18 a7 76 43 da 58 3d a0 3c 42 3d 77 42 d1 eb | ed 35 62 7a 01 62 e1 32 87 10 6c d5 80 f8 d5 7a | e6 0d bc 8d d6 42 76 b9 2d fe 0d c3 eb e6 a9 0d | 0e 9f 06 5b af 9e 49 ff c0 94 83 2a d0 2d 71 88 | 4e 9a 35 ec c3 f5 8a a6 c6 22 6e 7e 16 d4 d9 e4 | d9 14 a9 a0 89 f2 18 8e be cf da c0 b4 27 62 b2 | 69 81 38 d5 cf 1b 18 ef 28 a2 d6 ab 45 93 46 f0 | b0 cf a6 b1 57 a8 1a d7 72 93 ec cd 51 ba 98 80 | 63 05 e1 50 59 41 cf a5 af 5d 7f 76 36 8e 63 f7 | e7 a8 78 3d b4 e5 4b 57 33 d8 0b ca bb 46 3b d1 | 5c 60 2c ab 89 51 2a 58 57 80 21 7f 56 14 26 65 | bd a7 02 e1 81 1f b6 ff ab b3 3c 36 3a 4d e7 be | 29 00 00 24 62 85 07 c7 f7 76 d5 f9 35 e6 84 85 | cf ff 39 b7 d3 8a fe b9 27 ad b1 ed 4e 28 c4 d4 | 73 2f 0f ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 6a 14 0a 8a ea 03 bd 41 dc ab fe | 15 04 7a 2b 71 ea 6d 09 00 00 00 1c 00 00 40 05 | 24 23 f0 d4 3c 33 30 25 f8 fc 46 79 64 b6 7b 59 | 6c 35 21 7f | state #50 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469fb8a0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #50 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 | #50 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49604.851899 | resume sending helper answer for #50 suppresed complete_v2_state_transition() and stole MD | #50 spent 0.477 milliseconds in resume sending helper answer | stop processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb360012840 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 fd fa e4 3e 0e 84 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #50 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #50 | rejected packet: | 96 fd fa e4 3e 0e 84 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #50: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #43 | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #43 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #43 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49604.865136; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50118 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #43 | libevent_malloc: new ptr-libevent@0x7fb360012840 size 128 "road-eastnet-nonat-43" #43: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #43) | cc ee 6c 19 e2 66 91 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 b3 dc 74 af 8b 5f 17 f2 a2 67 e8 55 b6 7f 2f | d6 4e 7a 73 eb 13 7d 78 44 82 5e 9f c0 c9 a7 ce | 19 55 10 32 8b 27 a5 29 28 74 fd 00 e6 f7 6a 74 | 56 7d 4b 3f aa d7 b5 46 cb 2d 3c a3 dc 3f bf 05 | 8d ef fa 60 0a d7 e7 b4 43 44 81 a1 10 dd db 69 | 30 53 16 90 a0 49 c9 94 16 9b 8e 16 05 cc a3 b0 | bb c8 6f 12 2c 69 ac ba c2 57 c1 0e 1d 24 c4 b7 | c5 6e 9f 50 e2 e4 26 8c 25 36 d7 6d d8 cd 2c bd | d4 0a 33 47 c9 6e 1d c8 6c 02 27 85 0b ac 4e d8 | 84 b3 28 76 fc c6 2f a9 af 4b b0 f5 08 9e 56 b5 | 24 d4 f4 cb 0a 9c 0d ce 12 fa 25 29 9d 95 d6 4a | 9a e8 aa eb d1 08 9a 51 c5 21 4d b3 dd e9 4f d9 | a6 74 14 2d 42 fa 5e 68 63 d0 8e 8d 34 39 23 04 | 84 91 4d 1d 1d 39 77 e7 bb f1 e3 79 e8 0b 4e 9f | 52 2d 52 8d 33 23 04 37 3b 2c 9b 0f 37 da 18 16 | 07 6b 4f 80 6f e8 48 15 68 23 83 ca b6 b1 12 eb | 29 00 00 24 d5 f8 b0 cb f4 3b d7 c6 a9 5b 1f ef | 6f 5a 34 02 07 02 b5 92 c9 43 df 42 45 9e 46 a4 | f2 42 44 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 70 b3 40 c0 d2 23 ad 4c 6d 70 f1 | 0b c9 5a 99 fd 55 fa c5 00 00 00 1c 00 00 40 05 | fc 9d 2b d9 20 f9 c1 0e d3 88 83 de d6 d0 5e 66 | 9c 2c 6f e5 | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #43 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc ee 6c 19 e2 66 91 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #43 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #43 | rejected packet: | cc ee 6c 19 e2 66 91 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #43: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #37 | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #37 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #37 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49604.885461; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001633 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #37 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 "road-eastnet-nonat-37" #37: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #37) | 17 02 22 e9 ab 5b 91 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f f0 24 04 15 84 3f 8d a0 47 69 89 53 1c 67 b8 | 33 2a a4 f5 84 95 fd 12 c4 95 3c eb 03 f8 76 46 | 15 20 9b c5 17 a5 48 da 05 b3 14 87 45 a5 03 ce | 15 45 04 84 4f ce c5 7f 7f d9 f6 69 e6 fa 2a ce | 98 6a 3f d1 cc fe 7f e2 41 fd 61 7b af af 30 7e | 0a 75 d2 92 05 56 ed e9 09 bd bc db cd 80 58 20 | 86 cc 39 bd f2 1c dd 9d 77 bb 28 c3 7e a4 97 11 | 86 79 5d 68 34 e4 33 4c b3 b1 ed 26 ab a1 c5 7d | dd f5 b8 0e 55 cd f4 1f ea 00 32 c8 4b fd 8f a5 | 71 8b 05 79 0a 34 41 68 bd c7 7d 96 51 77 5e 6b | d9 65 0d cf f7 34 f5 5b 4b bf 3e ae f6 63 25 2e | ea 9e 2a 3f 64 43 4d 0c 4a de f8 57 38 d7 5a c8 | 89 09 d3 81 3b 61 a8 5e 87 ab 34 9f c0 a6 2e 8e | a4 55 d9 e8 61 49 db 19 2f a0 89 a1 e6 24 e6 14 | 77 4b 63 b1 94 0b fe b9 37 07 5d a5 3f f4 4e 97 | 2a 98 e3 ca 6e 7f 3f a3 88 c3 da 3a c0 a1 79 c5 | 29 00 00 24 75 33 7f 61 eb 0d 1b f9 84 ec ca bb | af cf f0 96 3c 65 2f 09 ef 72 4a c4 05 f7 86 9b | fc 7f 3c 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 5d ed 76 d7 41 0c 3c 88 ec 15 de | 69 08 6f 06 52 19 de 0f 00 00 00 1c 00 00 40 05 | 52 bb 9d ab bf 18 49 c2 17 f2 d0 27 18 10 66 1c | c7 07 9d fe | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #37 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 02 22 e9 ab 5b 91 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #37 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #37 | rejected packet: | 17 02 22 e9 ab 5b 91 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #37: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-51" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-51' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #51 at 0x557d46a1a3d0 | State DB: adding IKEv2 state #51 in UNDEFINED | pstats #51 ikev2.ike started | Message ID: init #51: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #51: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #51; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-51" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-51" IKE SA #51 "road-eastnet-nonat-51" "road-eastnet-nonat-51" #51: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-51 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-51": constructed local IKE proposals for road-eastnet-nonat-51 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 51 for state #51 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb384002b20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #51 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 | crypto helper 16 resuming | crypto helper 16 starting work-order 51 for state #51 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 51 | #51 spent 0.156 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-51" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.257 milliseconds in whack | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 51 time elapsed 0.000997 seconds | (#51) spent 1 milliseconds in crypto helper computing work-order 51: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 51 for state #51 to event queue | scheduling resume sending helper answer for #51 | libevent_malloc: new ptr-libevent@0x7fb364012740 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #51 | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 51 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #51 | **emit ISAKMP Message: | initiator cookie: | 4e ec 23 15 b1 7b 72 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-51 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fb ca ad 90 d3 c3 42 ab 02 0a 3a 99 99 08 46 41 | ikev2 g^x e3 20 e2 b5 e7 92 8d 56 c0 f6 81 f6 d7 1f 61 ae | ikev2 g^x fb 7c 4e 49 1a 90 7d af 41 51 b1 4f a9 1c af 26 | ikev2 g^x 43 e3 44 1a 2b 54 c2 29 d3 73 8c a6 e2 ba 3d 02 | ikev2 g^x 79 ed 80 dd 4b 1e 56 a7 0d 93 2b 80 2d fa ef a7 | ikev2 g^x a5 07 28 e5 1d 36 9e 70 e3 83 04 4a 00 cd 83 0a | ikev2 g^x dd f1 6f 7b 41 89 16 39 86 45 b3 89 6b 38 63 99 | ikev2 g^x 64 d2 3b 37 57 db 5b aa 3c 09 dd b1 e9 2a 36 7d | ikev2 g^x 07 9a 1b 84 49 cb 9b 53 1f e3 16 45 5a 7e 7d 6a | ikev2 g^x b6 b2 5f ad 65 38 70 73 69 63 43 b9 48 24 d6 aa | ikev2 g^x 84 39 4e 67 2a d2 39 99 70 07 69 a7 7e 3b f3 d0 | ikev2 g^x 5d 4d 0d 43 76 2c 16 f2 ef 43 c1 03 3c a0 15 fa | ikev2 g^x 7b dd 0d 24 8d 60 85 f6 a5 c6 c1 eb e0 9b 23 f3 | ikev2 g^x 77 0d cd ab 79 52 59 61 60 d0 e6 6a b2 5f 84 3c | ikev2 g^x bc fe a3 56 10 78 f4 57 b0 c9 73 a2 9c 16 ae e5 | ikev2 g^x 21 a9 af 1c 86 05 49 d7 79 de ea 6f 42 c1 58 6c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8a 81 ff 83 11 9d 7f 95 f4 0f 60 37 ee c1 de 9d | IKEv2 nonce 9d 4a 24 6c a2 0d 2e aa 53 c1 6d 4e 8c ed 61 8e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4e ec 23 15 b1 7b 72 41 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 33 | natd_hash: port= 01 f4 | natd_hash: hash= 66 84 7c cd 2e 5d e1 e4 b9 3d 91 59 8e 0e df bf | natd_hash: hash= 1a 34 00 37 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 66 84 7c cd 2e 5d e1 e4 b9 3d 91 59 8e 0e df bf | Notify data 1a 34 00 37 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4e ec 23 15 b1 7b 72 41 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4f e7 ab 4c a7 2a fc d1 46 25 a0 98 d8 53 89 a8 | natd_hash: hash= 24 a4 22 8e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4f e7 ab 4c a7 2a fc d1 46 25 a0 98 d8 53 89 a8 | Notify data 24 a4 22 8e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #51 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #51: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #51 to 4294967295 after switching state | Message ID: IKE #51 skipping update_recv as MD is fake | Message ID: sent #51 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-51" #51: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.51:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #51) | 4e ec 23 15 b1 7b 72 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb ca ad 90 d3 c3 42 ab 02 0a 3a 99 99 08 46 41 | e3 20 e2 b5 e7 92 8d 56 c0 f6 81 f6 d7 1f 61 ae | fb 7c 4e 49 1a 90 7d af 41 51 b1 4f a9 1c af 26 | 43 e3 44 1a 2b 54 c2 29 d3 73 8c a6 e2 ba 3d 02 | 79 ed 80 dd 4b 1e 56 a7 0d 93 2b 80 2d fa ef a7 | a5 07 28 e5 1d 36 9e 70 e3 83 04 4a 00 cd 83 0a | dd f1 6f 7b 41 89 16 39 86 45 b3 89 6b 38 63 99 | 64 d2 3b 37 57 db 5b aa 3c 09 dd b1 e9 2a 36 7d | 07 9a 1b 84 49 cb 9b 53 1f e3 16 45 5a 7e 7d 6a | b6 b2 5f ad 65 38 70 73 69 63 43 b9 48 24 d6 aa | 84 39 4e 67 2a d2 39 99 70 07 69 a7 7e 3b f3 d0 | 5d 4d 0d 43 76 2c 16 f2 ef 43 c1 03 3c a0 15 fa | 7b dd 0d 24 8d 60 85 f6 a5 c6 c1 eb e0 9b 23 f3 | 77 0d cd ab 79 52 59 61 60 d0 e6 6a b2 5f 84 3c | bc fe a3 56 10 78 f4 57 b0 c9 73 a2 9c 16 ae e5 | 21 a9 af 1c 86 05 49 d7 79 de ea 6f 42 c1 58 6c | 29 00 00 24 8a 81 ff 83 11 9d 7f 95 f4 0f 60 37 | ee c1 de 9d 9d 4a 24 6c a2 0d 2e aa 53 c1 6d 4e | 8c ed 61 8e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 84 7c cd 2e 5d e1 e4 b9 3d 91 59 | 8e 0e df bf 1a 34 00 37 00 00 00 1c 00 00 40 05 | 4f e7 ab 4c a7 2a fc d1 46 25 a0 98 d8 53 89 a8 | 24 a4 22 8e | state #51 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb384002b20 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #51 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 | #51 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49604.928607 | resume sending helper answer for #51 suppresed complete_v2_state_transition() and stole MD | #51 spent 0.465 milliseconds in resume sending helper answer | stop processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb364012740 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e ec 23 15 b1 7b 72 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #51 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #51 | rejected packet: | 4e ec 23 15 b1 7b 72 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #51: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #44 | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #44 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #44 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49604.932902; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500742 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8d60 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #44 | libevent_malloc: new ptr-libevent@0x7fb364012740 size 128 "road-eastnet-nonat-44" #44: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #44) | 2c a5 57 82 94 bb 0c bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f f1 d9 3a 5c ec da ab 46 a0 1a 50 8e c5 b2 4a | 63 93 0d d6 bb 0b cb a2 7b 64 4c d6 0d 5d 75 c0 | a4 fb 12 20 36 86 d2 5a 85 de 9f 1a 56 dd 51 88 | 1f dd 14 6d 54 37 65 2c 39 00 b9 0b d0 9a b8 93 | dd 72 9a 78 33 2f fe d8 37 67 48 08 b2 16 1f 29 | 2a f2 be 3c 42 f3 72 0d 31 7d f4 16 71 3f 2a 28 | a2 72 a2 07 56 93 05 b3 01 4f f8 0a 3d 17 c2 61 | 36 84 95 ef b4 4f 95 5b 93 28 0b 0c 46 73 8a 49 | 11 16 41 b2 73 0b 44 cf a4 af 2f d7 2a 7a 6d 3e | 45 30 bc f5 de 74 14 4c f1 52 50 35 c7 29 67 5d | 02 d9 88 3e 6a e4 83 d6 7c b8 69 a3 7c 7f 9b 8b | 37 21 48 68 00 9a 01 a3 9a d7 3b 02 8c 67 ac 11 | 42 36 9e 84 ad 85 da a3 35 c1 ee c3 6a 24 37 55 | cc 67 9a 57 48 6e 0b 5c b6 9c 4d 16 ed 25 57 02 | 16 2f e6 f6 ce 2a b1 ca e6 1e 1f f9 44 d1 46 60 | 1f 00 3a 24 c7 f4 7b 04 f3 08 7e 6f de 0b 6c 0f | 29 00 00 24 c3 85 c7 9f 53 c2 4b 6d 4a b2 71 6f | 5f 3f 70 d0 bf 0d 26 13 04 46 9b 8c 51 07 8b 19 | bb fc 96 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f 56 cd 95 dd 34 fe 03 70 04 69 b5 | 7b 30 2c 80 a8 67 5b f1 00 00 00 1c 00 00 40 05 | 20 cd 88 b3 c4 29 91 b7 4b 43 e6 f4 9f a3 71 4b | c5 83 8c 17 | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | #44 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c a5 57 82 94 bb 0c bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #44 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #44 | rejected packet: | 2c a5 57 82 94 bb 0c bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #44: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469defe0 | handling event EVENT_RETRANSMIT for parent state #24 | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #24 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #24 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49604.933144; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.008485 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #24 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 "road-eastnet-nonat-24" #24: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #24) | a6 6a cf 12 4f 5d 80 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 64 6b 6f 54 02 19 88 ba 7c 08 ae f0 e8 ac 9d | c2 ca d4 17 41 fd 62 15 e6 80 a2 22 8c 15 09 a2 | e7 a1 72 ea 0a df 45 b3 25 d6 2f ad 4b 53 6c aa | 40 78 bc 47 40 56 b3 31 58 04 4d 38 c6 d0 b5 d8 | 7f 6f a2 f1 93 94 05 6c d0 31 6f f5 91 da 3d ba | e0 df 58 d8 a7 5c 43 d6 dc 3f 84 1b 95 82 7b 74 | 0c 41 0a 55 c5 c4 26 cf be bc a7 fe 25 56 32 c1 | 74 4d 01 af d9 1d ba 5f df c3 24 6e 66 7d 9c 22 | 84 1a 96 19 75 ab 7b e5 8d 21 ff f9 0c c5 57 de | 08 b9 a5 25 49 54 61 98 e2 43 6f b1 cb e2 3e 2a | f8 2c b2 cc ec bc 5e 41 c3 a9 95 de 3e ae 27 18 | 0c 51 55 28 d4 52 b5 1c e5 35 a1 75 a4 31 5a 74 | 09 2d 83 0a f9 22 55 04 79 c9 7a 03 c4 3f b9 27 | 7d 94 7e 25 32 de fa 8a ba c3 f8 47 1a 89 e0 04 | 1c 2a 74 59 3a 33 c6 78 c9 39 62 b5 5b 83 e0 ec | 74 d5 64 ba c0 ee 33 ea 4f ca fc f0 da aa dc 97 | 29 00 00 24 86 65 98 51 47 8e f6 4b 35 71 6a af | 55 7d 2d 69 5a 9e 6d 36 94 f6 45 50 b1 44 a3 6d | d2 78 d3 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 db bf 4d aa d7 35 0a 3b ec 97 e0 | 4c d5 57 e3 dd 13 4a e5 00 00 00 1c 00 00 40 05 | c7 67 96 20 f6 5f 6f 16 76 12 96 1c 43 e0 40 0f | 0e 23 33 02 | libevent_free: release ptr-libevent@0x7fb34c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469defe0 | #24 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 6a cf 12 4f 5d 80 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #24 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #24 | rejected packet: | a6 6a cf 12 4f 5d 80 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #24: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0547 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e5ca0 | handling event EVENT_RETRANSMIT for parent state #5 | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #5 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #5 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49604.946662; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.016291 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e05a0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #5 | libevent_malloc: new ptr-libevent@0x7fb34c00cf80 size 128 "road-eastnet-nonat-5" #5: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #5) | 83 a8 82 4c 6a b9 9b 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 f2 6a ba 4d 4c f4 ca d6 76 c6 37 a4 fc c6 08 | 03 3e 5e e8 b3 56 67 2c ed e0 33 33 68 d8 a5 17 | c5 ad 89 58 8b 66 c2 c6 28 95 15 86 95 42 17 c5 | 43 6b d6 1b 90 e3 ce 5a 73 0f aa 25 80 ef 21 ed | 95 16 dc 62 db 9c 9c f1 05 8d 7b ad 88 fd 8e 82 | 62 66 a4 5c 00 db 53 d1 2c ac b4 13 62 a5 17 eb | 3f 3a 4e bc 42 77 a1 e8 e1 8a 0f 63 81 66 10 64 | 10 0d 86 9e 89 34 85 5c 5f 55 4a cb 5a 29 86 16 | 42 90 ac 93 0b a7 fb e8 a5 4a 23 43 d7 02 e6 fe | c6 7b a9 b3 68 72 59 2e 24 fd 0c 7f 98 b0 6f 9f | bb aa 48 ce f6 ec 36 99 c2 bc 70 c4 81 9e 1c 55 | 65 47 9c 55 e0 d5 f3 7e 77 c4 a5 f3 6e 82 b5 1c | 5c 56 a1 3a b8 57 69 f9 25 e2 ae ed 66 c5 c1 3d | f8 ca 2e 2b 1c 6e 27 f2 e3 ed 73 79 be b7 90 0f | cb 45 38 5f bb 3a e3 c2 44 15 72 9c 24 d0 bd 4e | fa c4 ea 53 31 95 57 c9 dc a4 ff 15 7a 28 e4 1a | 29 00 00 24 13 3d aa 25 dd 95 48 ab fd a8 d2 56 | 6c 28 74 71 5d 45 11 19 10 09 0a f3 46 e9 c4 b3 | 56 85 8c 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bb 69 2e cb ee d3 68 5b 1c f0 7d a0 | 26 ce 80 e4 bd 02 f5 15 00 00 00 1c 00 00 40 05 | 1b de 40 93 48 c5 33 61 5d a6 1a 99 ad 20 57 85 | b1 bf 8b 0c | libevent_free: release ptr-libevent@0x7fb37800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e5ca0 | #5 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 a8 82 4c 6a b9 9b 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #5 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #5 | rejected packet: | 83 a8 82 4c 6a b9 9b 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #5: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #38 | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #38 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #38 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49604.965994; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001962 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a12c70 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #38 | libevent_malloc: new ptr-libevent@0x7fb37800cf80 size 128 "road-eastnet-nonat-38" #38: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #38) | 63 6f 4b 9c a2 38 4b f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 c6 a0 5e 80 62 3e 9a 9c 42 e1 05 80 df 04 bf | 1e b5 eb a5 bb ef bc 82 8b e6 75 a7 2e 01 28 64 | e4 76 b9 2e 24 4c bf de dc 13 dd 2b 71 c5 93 43 | 1b 46 d4 7e b2 da 9a 48 5b 59 35 a7 05 07 a3 e4 | 2d c6 06 3d 04 99 06 6d e6 f3 82 a2 e0 b0 3d 7e | 06 24 2a d6 83 0e 98 7d 98 49 2f 5f ab 8e 6a a0 | d8 9e 97 9f 3a b5 0b 41 09 f4 3d 1d 01 c6 79 69 | 84 a4 53 1f bd 4e 48 87 76 0d 6e 5e db cc c6 9f | 32 ff 46 70 0d 72 cf 06 98 99 df 58 29 5b 2c 8c | fb 98 a9 76 0f 25 88 9a f5 19 cc e3 5c 2b 68 1d | 01 4d 25 7a f1 7a 21 df b2 8f 9c 28 7d d1 ec da | 1d aa a1 0e 2a 91 6c fc cd c9 76 e7 51 08 7a ff | e5 ff f8 19 fa 3a 8e cc 1e 84 49 b9 c5 19 d0 a9 | d3 37 e2 20 31 e7 32 dd 71 90 7c 76 34 4e 29 57 | 1e 56 51 56 0c 5f 17 75 67 40 80 dc 44 27 6b 9a | c7 16 b2 3b 68 69 4b 25 42 5f 6c bd 14 34 a0 fd | 29 00 00 24 11 36 0f 5e a0 00 74 be 57 cf e9 ad | 0b 41 64 75 76 be 45 9c 57 4a dd ea fc 94 1e c3 | 3b 87 2f 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b 5e 04 97 03 6e 1a 6a 1c 69 28 d2 | a2 f5 94 bd 95 4c fa 5e 00 00 00 1c 00 00 40 05 | aa 31 5d 54 cf 5a 81 b9 1b cd fe 19 22 77 54 6d | f5 50 1b 4f | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | #38 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 6f 4b 9c a2 38 4b f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #38 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #38 | rejected packet: | 63 6f 4b 9c a2 38 4b f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #38: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350005860 | handling event EVENT_RETRANSMIT for parent state #45 | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #45 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #45 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49604.996332; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500614 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #45 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 "road-eastnet-nonat-45" #45: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #45) | a3 bb a6 38 bf 16 36 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 bf 7f b3 da cb 24 f0 9d 9b d3 fd dc cf db 07 | e6 5b 40 74 f8 99 0f 8a 69 5b 21 df 39 e1 ee 66 | 6e d2 eb aa da ff dd cd ef 30 5f f7 58 03 e1 db | 0d 74 f6 29 93 ca f1 42 fd ad b9 96 9c 2f 50 32 | 58 c3 21 d3 aa 48 12 01 4c e3 13 6e 9b ee 2d 74 | 42 be dc c8 fd 3f 8a d7 32 bc c2 52 53 8d f7 2a | 84 67 44 c8 2e dc 1a b1 bb 7e 48 68 aa 07 71 d2 | ed bb 6e e8 36 32 f2 a5 31 45 4d 85 68 10 11 40 | f6 85 5c 6f 85 60 44 96 50 66 ff a4 e4 4d 79 e9 | 3c a7 0e 91 f7 05 c3 d3 85 48 8e e8 a2 59 53 66 | 1c c3 08 ca 90 69 7f b0 5f 9c 5b ec cd 7e 11 67 | 1a 0f 4b b0 b3 89 8c 73 6f 1c d6 27 19 18 73 72 | 31 f5 6c a7 f0 f8 1b 36 35 8a f6 30 2e d1 b7 af | a6 2e 5d 9a f5 83 05 7a b2 73 c7 24 06 c8 92 6b | 85 fe 7f 79 f1 ba 3f d3 86 28 f4 16 3a 94 56 af | 55 d5 d6 bc 89 52 4c e8 34 d8 86 d5 fe 13 15 fe | 29 00 00 24 a8 f8 bf 2a 70 d8 0d e9 bf c1 0f 00 | 25 da 1d db 8f ac 61 b5 e1 f0 75 9a 00 6d 79 0f | ff f5 3b 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 ff e8 4e 79 94 20 d9 00 0d 87 37 | ed 16 46 76 d8 43 be 32 00 00 00 1c 00 00 40 05 | 2d 67 24 20 12 0e 18 8c 34 32 0f 7c 4f 51 94 df | fd 23 b8 c6 | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350005860 | #45 spent 0.201 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 bb a6 38 bf 16 36 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #45 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #45 | rejected packet: | a3 bb a6 38 bf 16 36 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #45: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.059 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-52" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-52' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #52 at 0x557d46a1b990 | State DB: adding IKEv2 state #52 in UNDEFINED | pstats #52 ikev2.ike started | Message ID: init #52: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #52: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #52; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-52" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-52" IKE SA #52 "road-eastnet-nonat-52" "road-eastnet-nonat-52" #52: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-52 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-52": constructed local IKE proposals for road-eastnet-nonat-52 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 52 for state #52 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb350005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #52 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 | #52 spent 0.136 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-52" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.208 milliseconds in whack | crypto helper 4 resuming | crypto helper 4 starting work-order 52 for state #52 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 52 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 52 time elapsed 0.000982 seconds | (#52) spent 0.987 milliseconds in crypto helper computing work-order 52: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 52 for state #52 to event queue | scheduling resume sending helper answer for #52 | libevent_malloc: new ptr-libevent@0x7fb358012840 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #52 | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 52 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #52 | **emit ISAKMP Message: | initiator cookie: | 3f 70 d8 3e f5 22 c6 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-52 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a4 a5 a2 fa 37 05 a0 83 be fb 7c 66 e8 09 2d 85 | ikev2 g^x 01 d0 84 ba 7e 80 ad 7e ed 7e 94 4b 5a d1 13 c1 | ikev2 g^x b1 3f 59 cf ac e4 bd 6c 95 59 bf de 9d 80 55 dd | ikev2 g^x 6c d4 7d e3 9f 38 7c 31 e7 3a f4 3d 5f ba 5a 68 | ikev2 g^x 83 7f 56 b6 a6 97 f9 9a 87 45 7b ad 59 c8 c8 c2 | ikev2 g^x 85 24 f6 8d 4c 54 59 44 37 96 77 29 ac 68 3f 6e | ikev2 g^x df da 66 fc fd e2 52 7f c0 d8 5a 6e 87 c7 d0 ea | ikev2 g^x dd 74 ac b4 2a 5c 26 2d 8f 9d 33 80 5d 13 86 23 | ikev2 g^x e5 74 ae 2d f0 58 19 74 bb 0c 9a fe 02 e9 ea 18 | ikev2 g^x 9b e9 68 5d 7c 72 e9 79 59 15 c2 74 d4 16 6f 97 | ikev2 g^x c0 92 81 74 a6 70 c8 c9 0a 8b 1e 5b 97 dd a0 5d | ikev2 g^x 10 4a 89 98 ee 3e 73 f8 ad 8e 0b 84 2b bb 87 07 | ikev2 g^x d3 19 10 ac f4 31 29 ae a0 fb 57 db 57 8e e8 3d | ikev2 g^x 7b 1c bf f9 0f c4 88 43 de 6a ac 3c e2 0b 51 3c | ikev2 g^x 47 b2 1e 04 99 56 29 39 94 ab 53 44 ad 54 e0 54 | ikev2 g^x 9d 52 e0 9a 6d 24 de d9 e3 52 91 a1 b5 19 19 fc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce bc 06 52 3b 0a a9 d6 55 15 a3 be 4e de 77 6e 83 | IKEv2 nonce 33 60 ab 6d e9 76 1e 6c cb ab 4d 19 f5 ca 65 a4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3f 70 d8 3e f5 22 c6 c2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 34 | natd_hash: port= 01 f4 | natd_hash: hash= d0 c4 b5 bf ec 75 31 9e 5d c6 9c 0c 53 7b fb 92 | natd_hash: hash= b5 6c 20 70 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d0 c4 b5 bf ec 75 31 9e 5d c6 9c 0c 53 7b fb 92 | Notify data b5 6c 20 70 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3f 70 d8 3e f5 22 c6 c2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2a 93 28 00 9d ed cf 28 c2 1f ba 32 c1 4a e1 a2 | natd_hash: hash= d1 c6 7c 44 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2a 93 28 00 9d ed cf 28 c2 1f ba 32 c1 4a e1 a2 | Notify data d1 c6 7c 44 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #52 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #52: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #52 to 4294967295 after switching state | Message ID: IKE #52 skipping update_recv as MD is fake | Message ID: sent #52 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-52" #52: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.52:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #52) | 3f 70 d8 3e f5 22 c6 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 a5 a2 fa 37 05 a0 83 be fb 7c 66 e8 09 2d 85 | 01 d0 84 ba 7e 80 ad 7e ed 7e 94 4b 5a d1 13 c1 | b1 3f 59 cf ac e4 bd 6c 95 59 bf de 9d 80 55 dd | 6c d4 7d e3 9f 38 7c 31 e7 3a f4 3d 5f ba 5a 68 | 83 7f 56 b6 a6 97 f9 9a 87 45 7b ad 59 c8 c8 c2 | 85 24 f6 8d 4c 54 59 44 37 96 77 29 ac 68 3f 6e | df da 66 fc fd e2 52 7f c0 d8 5a 6e 87 c7 d0 ea | dd 74 ac b4 2a 5c 26 2d 8f 9d 33 80 5d 13 86 23 | e5 74 ae 2d f0 58 19 74 bb 0c 9a fe 02 e9 ea 18 | 9b e9 68 5d 7c 72 e9 79 59 15 c2 74 d4 16 6f 97 | c0 92 81 74 a6 70 c8 c9 0a 8b 1e 5b 97 dd a0 5d | 10 4a 89 98 ee 3e 73 f8 ad 8e 0b 84 2b bb 87 07 | d3 19 10 ac f4 31 29 ae a0 fb 57 db 57 8e e8 3d | 7b 1c bf f9 0f c4 88 43 de 6a ac 3c e2 0b 51 3c | 47 b2 1e 04 99 56 29 39 94 ab 53 44 ad 54 e0 54 | 9d 52 e0 9a 6d 24 de d9 e3 52 91 a1 b5 19 19 fc | 29 00 00 24 bc 06 52 3b 0a a9 d6 55 15 a3 be 4e | de 77 6e 83 33 60 ab 6d e9 76 1e 6c cb ab 4d 19 | f5 ca 65 a4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 c4 b5 bf ec 75 31 9e 5d c6 9c 0c | 53 7b fb 92 b5 6c 20 70 00 00 00 1c 00 00 40 05 | 2a 93 28 00 9d ed cf 28 c2 1f ba 32 c1 4a e1 a2 | d1 c6 7c 44 | state #52 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb350005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #52 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 | #52 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49604.999145 | resume sending helper answer for #52 suppresed complete_v2_state_transition() and stole MD | #52 spent 0.609 milliseconds in resume sending helper answer | stop processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb358012840 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f 70 d8 3e f5 22 c6 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #52 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #52 | rejected packet: | 3f 70 d8 3e f5 22 c6 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #52: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0699 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e8820 | handling event EVENT_RETRANSMIT for parent state #6 | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #6 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #6 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49605.021365; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.010398 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #6 | libevent_malloc: new ptr-libevent@0x7fb358012840 size 128 "road-eastnet-nonat-6" #6: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #6) | 2c 27 82 3a c6 31 e5 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f e3 1c 46 2f 61 c1 a4 57 04 b2 32 f2 da 47 30 | c5 f1 b2 8c 52 8c bd 20 1e 07 9a 1f 74 e3 50 fd | 03 ad cd d6 6e b2 e0 ed 18 de c6 cf db 53 d8 91 | 57 59 05 93 13 39 ca c4 cd bf 1d c1 99 f1 ea ab | d7 0d 4d 84 1a b9 23 c8 19 a7 00 fc 45 cd 28 de | 1b 23 11 46 b2 a5 20 88 7d a8 2e 93 69 c4 77 be | 7d 08 db 5c 91 33 d0 aa e2 d7 27 ba c6 03 59 3c | 8a b9 c7 4b aa b0 c2 31 f9 3d af 03 a0 d0 38 f5 | 81 cf 2e 3b 37 ea b5 50 38 0b b5 3b be c1 ac 52 | d4 bd 41 74 e3 b0 cc da 00 70 a4 c8 a9 ae 2b 0c | 84 70 b9 c2 c8 dd e4 ca c8 d6 7a 14 75 f2 9f ca | f3 8a 9e fb 56 2f 7b 5f 34 ab 29 a4 eb 5d 7a 01 | af 1d 55 9d 0e 4d 00 2f f9 2a c8 90 cf 50 fe a3 | 20 3f bc dc b3 d6 01 f7 dd dc c1 b1 72 f5 58 73 | b8 72 e4 a9 88 17 39 c5 a4 43 c8 df b5 2f 8d cd | 75 f3 2c cf e2 85 8e ce 7f c9 07 83 41 8f 33 7b | 29 00 00 24 aa 55 22 5c 95 3a 98 8a 23 4e 55 f5 | f2 5b 2d e6 0f d6 a3 fc b7 39 7f a3 84 04 6c 99 | b3 1f 01 c8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd d8 7d b0 3b ed a4 77 8e 72 bc 87 | 11 c3 4a b5 09 51 99 2e 00 00 00 1c 00 00 40 05 | 3b ee 43 00 bb c4 11 7e a6 6d 91 83 5e ff b0 fd | ab 20 73 91 | libevent_free: release ptr-libevent@0x7fb37c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e8820 | #6 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c 27 82 3a c6 31 e5 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #6 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #6 | rejected packet: | 2c 27 82 3a c6 31 e5 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #6: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #25 | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #25 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #25 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49605.023698; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002819 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e5ca0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #25 | libevent_malloc: new ptr-libevent@0x7fb37c009640 size 128 "road-eastnet-nonat-25" #25: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #25) | 78 5e ec 19 c3 e9 2e 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 3a 20 04 5c a3 28 e0 27 26 70 8b 2f d3 d3 dd | 4a ad b8 1e 2e 37 87 d2 d3 a8 c4 9d c6 ee 0f a0 | 73 84 05 06 74 d6 4d 07 19 2b 12 8b 69 7a 83 b9 | 89 8c 88 b4 63 15 c8 b2 2d cc 49 7a 79 d1 07 bf | ee 4e b7 0b 0d 2d 3d 97 a7 24 aa 10 a0 e9 fc 77 | 06 e9 cd 21 f9 64 fc 4a 83 9d 5e f3 a2 9b 32 c3 | d3 50 6b 09 58 29 c8 67 c4 22 3b 38 ef 52 9f dd | 6e 41 e8 16 88 89 59 a6 9f 8d 30 13 4e 6f 06 5b | 1b 0e 62 f8 90 29 6e c8 e5 89 28 a2 ea ec 59 64 | 67 71 02 aa 61 49 46 0f fe 0a d1 4d 62 20 44 13 | 22 6b 41 1e 83 c0 52 5c 04 b5 86 ac e3 c4 87 52 | 79 53 63 6b c1 fd a7 16 e1 a2 b6 27 78 fe 10 69 | 79 cb f1 75 47 7f aa 61 41 c8 00 01 b4 6e 89 cf | 41 c5 e9 e7 92 08 38 fd 15 78 0a 2b 93 44 c9 ca | b1 70 2a 2b ec 91 fe 70 63 59 89 8e 57 c3 33 c3 | 54 24 a1 21 c8 2a c0 85 b2 60 de 71 38 dc 7c 22 | 29 00 00 24 e1 d5 1d 82 b2 16 85 fd 33 85 77 2b | fc 68 12 4a cf f8 6e 1b 7e ab 43 df ab 9a a1 84 | be 92 7e 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a 8e 47 d6 ba 1e 42 85 a7 7b 2f db | 65 2a 1e ef d5 42 ee 43 00 00 00 1c 00 00 40 05 | 5d 12 0d 5e 92 91 ee 2b 6d 12 02 e9 64 25 a1 22 | eb b7 d7 ed | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #25 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 5e ec 19 c3 e9 2e 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #25 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #25 | rejected packet: | 78 5e ec 19 c3 e9 2e 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #25: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #39 | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #39 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #39 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49605.047011; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00172 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #39 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 "road-eastnet-nonat-39" #39: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #39) | 19 fb 2f c4 ac 44 fb 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e b1 09 86 9c 45 db 95 7b d2 00 66 c6 50 ec 38 | 85 24 bf d9 80 0e ac 2e 4c 6c 22 df ca 10 97 2e | 3e b3 c6 bc af 43 d2 f1 96 a9 4b 69 aa cd 6c e0 | 9b a6 4b b2 87 0e 1c ca 32 4c 46 ee 52 f9 70 fd | fe 31 27 8d 61 a4 9c 97 7a a3 30 46 a8 d5 6f 83 | a7 6a c3 e9 ff 23 17 48 fe 4f dd cf 4e a9 a1 5e | d7 78 c0 fe 7d d7 62 84 4a b2 9d ae 37 bc ab ed | d5 8c 32 96 61 41 3f 21 7c ca ab 28 b6 ad 04 a3 | c6 dc bc c3 e1 13 16 74 7a 42 5b e7 e2 a2 c1 8c | b7 73 45 24 dc 37 dd 6b f2 55 c7 4f 97 81 79 6f | 14 cb 11 1e b4 40 01 19 cd a9 dd 29 3f 6f e4 ee | 95 68 2f 56 df 0a 08 86 e6 cd 7f a3 7b 00 61 f4 | c5 7c bb 03 05 36 7a 30 d5 36 53 38 4c f8 39 18 | 08 9c f5 06 b6 85 f9 e9 1b ab 6e 6e 92 66 b2 2b | 43 5a 44 5b 6f f1 98 dd 01 3a 01 23 5e f7 bc 7d | 6e f5 05 b9 ec 45 1c 8c 77 33 f8 a3 1c 1e 8c 99 | 29 00 00 24 2f 9c d8 9a 10 ed a2 18 bd 6a 97 cb | 42 26 f8 54 76 a0 4d 6e 60 6c fb c1 ce 0f 53 f0 | 1f 6b 99 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 74 e0 c5 89 b2 32 b1 7d 7b 02 d3 | e0 e6 47 82 80 6f 9f 55 00 00 00 1c 00 00 40 05 | 2e a2 7a f5 ee f4 77 35 9e db 48 5d 65 9b e7 f5 | e4 1e af e9 | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #39 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 19 fb 2f c4 ac 44 fb 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #39 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #39 | rejected packet: | 19 fb 2f c4 ac 44 fb 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #39: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-53" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-53' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #53 at 0x557d46a1cf50 | State DB: adding IKEv2 state #53 in UNDEFINED | pstats #53 ikev2.ike started | Message ID: init #53: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #53: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #53; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-53" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-53" IKE SA #53 "road-eastnet-nonat-53" "road-eastnet-nonat-53" #53: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-53 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-53": constructed local IKE proposals for road-eastnet-nonat-53 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 53 for state #53 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #53 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #53 spent 0.173 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-53" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.268 milliseconds in whack | crypto helper 13 resuming | crypto helper 13 starting work-order 53 for state #53 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 53 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 53 time elapsed 0.005522 seconds | (#53) spent 1.03 milliseconds in crypto helper computing work-order 53: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 53 for state #53 to event queue | scheduling resume sending helper answer for #53 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #53 | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 53 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #53 | **emit ISAKMP Message: | initiator cookie: | 22 bd 87 7d 85 b9 18 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-53 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c8 30 f1 21 57 e7 a6 a0 b1 5a 51 b3 c9 69 4a 15 | ikev2 g^x 0c ef ee d8 55 97 13 32 e2 cf 8d c8 f3 74 4c 97 | ikev2 g^x 22 ad ca ab 81 a4 a0 26 9d e6 3b e7 1c 2b d2 a1 | ikev2 g^x d6 72 47 dd ab 72 ec c1 cc d7 d9 8f d8 66 bc e6 | ikev2 g^x 53 77 a5 12 d5 84 8f 13 60 d3 99 01 c2 30 50 56 | ikev2 g^x 18 a7 45 bc dd f7 11 3f 14 e8 e1 27 67 4e d9 50 | ikev2 g^x bb c0 6c 1a d8 e9 1e 81 c4 fa a9 14 22 9d 32 b4 | ikev2 g^x e1 11 67 1b f4 56 6f d3 5b 27 83 19 34 08 ee 9b | ikev2 g^x f3 6b 24 bb c8 a8 09 ee 97 89 49 a0 fb 47 38 93 | ikev2 g^x ca a8 21 f6 da 4a ff ce b8 5a 83 17 3c fa b5 a4 | ikev2 g^x 1d 50 f4 b9 26 78 5e a6 78 30 f6 80 a4 cd 3e ae | ikev2 g^x ea 19 26 25 27 2f a8 b0 bc e9 8e dc 47 51 61 79 | ikev2 g^x 07 e7 6e 1f 82 d0 fe 19 b0 44 4b f8 92 c9 fb 82 | ikev2 g^x 83 56 b0 37 a7 92 bf 23 17 cb fb 8b 75 11 c5 e0 | ikev2 g^x 1d 95 a6 1f 6a 1b 78 a9 5c 16 4e 89 74 ff c7 5a | ikev2 g^x 43 0f 1f 26 45 20 46 36 e0 37 07 46 11 e2 7c fd | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1d d0 6e d2 14 3b 95 3d 7a f3 16 f0 13 a4 5c 97 | IKEv2 nonce 24 08 af 2b 29 b2 1a e1 3b dc 59 4d 62 47 73 db | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 22 bd 87 7d 85 b9 18 70 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 35 | natd_hash: port= 01 f4 | natd_hash: hash= e3 de d2 d7 2b e1 3c 0c 4b a2 6a 97 5e 9e de 30 | natd_hash: hash= 79 3d d7 e0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e3 de d2 d7 2b e1 3c 0c 4b a2 6a 97 5e 9e de 30 | Notify data 79 3d d7 e0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 22 bd 87 7d 85 b9 18 70 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= de 44 b7 78 c2 27 43 2d 86 e9 13 34 57 72 8f 74 | natd_hash: hash= 48 51 21 6e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data de 44 b7 78 c2 27 43 2d 86 e9 13 34 57 72 8f 74 | Notify data 48 51 21 6e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #53 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #53: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #53 to 4294967295 after switching state | Message ID: IKE #53 skipping update_recv as MD is fake | Message ID: sent #53 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-53" #53: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.53:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #53) | 22 bd 87 7d 85 b9 18 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 30 f1 21 57 e7 a6 a0 b1 5a 51 b3 c9 69 4a 15 | 0c ef ee d8 55 97 13 32 e2 cf 8d c8 f3 74 4c 97 | 22 ad ca ab 81 a4 a0 26 9d e6 3b e7 1c 2b d2 a1 | d6 72 47 dd ab 72 ec c1 cc d7 d9 8f d8 66 bc e6 | 53 77 a5 12 d5 84 8f 13 60 d3 99 01 c2 30 50 56 | 18 a7 45 bc dd f7 11 3f 14 e8 e1 27 67 4e d9 50 | bb c0 6c 1a d8 e9 1e 81 c4 fa a9 14 22 9d 32 b4 | e1 11 67 1b f4 56 6f d3 5b 27 83 19 34 08 ee 9b | f3 6b 24 bb c8 a8 09 ee 97 89 49 a0 fb 47 38 93 | ca a8 21 f6 da 4a ff ce b8 5a 83 17 3c fa b5 a4 | 1d 50 f4 b9 26 78 5e a6 78 30 f6 80 a4 cd 3e ae | ea 19 26 25 27 2f a8 b0 bc e9 8e dc 47 51 61 79 | 07 e7 6e 1f 82 d0 fe 19 b0 44 4b f8 92 c9 fb 82 | 83 56 b0 37 a7 92 bf 23 17 cb fb 8b 75 11 c5 e0 | 1d 95 a6 1f 6a 1b 78 a9 5c 16 4e 89 74 ff c7 5a | 43 0f 1f 26 45 20 46 36 e0 37 07 46 11 e2 7c fd | 29 00 00 24 1d d0 6e d2 14 3b 95 3d 7a f3 16 f0 | 13 a4 5c 97 24 08 af 2b 29 b2 1a e1 3b dc 59 4d | 62 47 73 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 de d2 d7 2b e1 3c 0c 4b a2 6a 97 | 5e 9e de 30 79 3d d7 e0 00 00 00 1c 00 00 40 05 | de 44 b7 78 c2 27 43 2d 86 e9 13 34 57 72 8f 74 | 48 51 21 6e | state #53 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #53 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #53 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49605.075064 | resume sending helper answer for #53 suppresed complete_v2_state_transition() and stole MD | #53 spent 0.501 milliseconds in resume sending helper answer | stop processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c012840 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 22 bd 87 7d 85 b9 18 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #53 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #53 | rejected packet: | 22 bd 87 7d 85 b9 18 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #53: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a011f0 | handling event EVENT_RETRANSMIT for parent state #46 | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #46 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #46 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49605.089119; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501303 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #46 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 "road-eastnet-nonat-46" #46: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #46) | b8 02 bd ab b2 01 5a b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 02 34 ab 29 73 17 93 9c d3 ac d4 2d a7 40 8f | 6c ab ce c1 cf 26 d8 e1 c0 a5 2f a8 7c e6 62 97 | 14 ae ce 27 9d 48 da 55 bb 1a 50 83 cd 98 7c 7e | 93 0d ef 6b a4 36 24 54 0e e8 77 76 0a 46 5c 28 | c7 d2 ff f1 d4 08 43 1a 21 66 26 cc ac 89 a4 fa | 9e 6f e1 5a 6f bb 4b ea 22 4d 9a 3d 2a 1c 97 d5 | e7 d2 d1 ac 8d d0 32 2d 42 98 eb fc 7f 55 28 65 | e5 b7 88 e1 ec b5 ba 0a 74 06 aa 48 51 b1 11 3b | 2f 1d 4c c7 49 ef 3c d0 65 a2 df 8e 59 96 65 b4 | 5b 67 18 f6 c6 dd c1 ba 8c 98 60 72 7f 9b 34 f1 | f4 df 07 a6 02 25 08 e0 ca 45 1c 4e 5a 84 92 f8 | 41 4b e2 11 63 dd 97 cd e2 1c a6 92 32 6d 9f 66 | 47 ba 05 95 3f 93 67 80 97 77 56 16 84 bf 6b d6 | e6 b0 76 58 be 43 b2 86 c2 1e 75 44 04 7d 93 a8 | 8c b0 a8 b8 83 ce 3c 1a d2 a1 85 f4 c7 9a 35 d1 | a2 ff 32 1f de 4b 99 be 80 8a 49 9b 41 45 2e a7 | 29 00 00 24 59 91 d6 77 3b 12 ba 32 8c e3 4b 3b | 93 6d 1e 3b 04 96 db ec 7e 0e 16 50 f1 18 04 aa | e6 1e e5 ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c a5 da 82 02 27 22 be 3c d8 f4 7e | 26 be f7 a0 40 5a a0 f6 00 00 00 1c 00 00 40 05 | 90 e6 40 68 17 4b f9 af 42 5a 03 6b 4d 68 d7 fb | 1b b9 9d a8 | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a011f0 | #46 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 02 bd ab b2 01 5a b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #46 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #46 | rejected packet: | b8 02 bd ab b2 01 5a b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #46: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_RETRANSMIT for parent state #26 | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #26 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #26 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49605.101459; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002307 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469defe0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #26 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 "road-eastnet-nonat-26" #26: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #26) | f4 88 08 87 51 21 ca bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af d0 7b 56 fd 83 24 e2 7f 6d 07 5b 14 cf 37 08 | c2 df a1 e8 d0 3d d9 70 11 a2 f7 87 78 ef 74 57 | 42 80 b9 d0 66 00 01 7b 09 5e 7e 2a 26 27 6c f8 | 72 db 2f 73 3f 38 89 07 c7 29 09 0b 07 35 1d d7 | 5c 45 0c 9e 1b e1 95 53 4a ee ac 68 bd 09 aa 3d | 27 0f 50 02 03 b3 ad ea c4 c7 28 b1 bc b2 70 07 | fc b6 58 d4 ed 1b fe 1b 64 8b 86 a1 fe fc 72 d9 | f1 ba a9 eb 7d ce cd 2c b8 6e 00 33 4c be dd dd | 3d 98 b2 2e 58 56 f2 f2 80 02 eb 21 ee 6b bd 96 | 40 1f 33 62 77 0f c1 a2 eb f8 19 6e 1a 5e 18 e2 | c2 89 f7 17 30 91 11 29 f1 9d 22 c7 c8 11 a1 d6 | b3 ae 73 01 db d3 1a d2 95 3f af b3 66 e8 e4 3f | 7f 26 bd b3 f0 37 10 0c fa cc 87 cc 8d 67 d1 69 | 87 60 66 13 b3 cf ae b5 94 11 93 f7 71 af 4a e8 | 96 fa e6 46 bb bb 17 b4 9c 44 80 04 e3 4c ce 52 | 44 6c a3 c2 a0 6e 82 a5 21 5c cc c5 65 7c 81 dc | 29 00 00 24 8a 04 a2 be b1 ba fb 75 a9 90 e3 4a | e4 71 c4 43 1c fe 30 e6 85 0e 15 7e 50 52 02 a7 | d2 a1 ae dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 32 7f b1 02 26 47 ea b2 9e 1c ce | 0f f8 7e 1c 87 59 f3 12 00 00 00 1c 00 00 40 05 | f0 af 8c 45 09 60 6e 14 7f 54 da 7f 84 35 07 83 | 60 40 27 0a | libevent_free: release ptr-libevent@0x7fb34400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | #26 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 88 08 87 51 21 ca bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #26 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #26 | rejected packet: | f4 88 08 87 51 21 ca bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #26: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37000d120 | handling event EVENT_RETRANSMIT for parent state #40 | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #40 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #40 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49605.111974; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001698 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #40 | libevent_malloc: new ptr-libevent@0x7fb34400cf80 size 128 "road-eastnet-nonat-40" #40: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #40) | f4 2d ea 23 2d fd 9f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 1a 9e 5c fb fb e3 3a 12 40 55 ea 02 66 64 cb | 69 42 9f 9e 73 38 34 f9 9b 29 99 d0 1f 2f 62 b0 | ff 78 90 10 b8 86 3f 49 a8 32 be f6 08 0d 11 29 | 94 2b 8b de b8 63 2c 35 79 92 00 39 68 56 d7 ad | 7e 9a a2 59 50 2b c4 f8 63 a3 0c 5d 5e 44 62 5b | fc 42 68 dd ca 56 4c 44 63 17 39 39 e0 00 1c 8f | c5 28 a6 4f 80 e9 f0 8c 5a ea 63 37 5f d7 0a a3 | b8 dc 6a fd 41 02 14 01 fa 2f 62 ae cb f1 1e 40 | 2f 20 1d 4c b4 7d c9 2c fa 60 f5 5e 61 26 a0 89 | b5 80 ba fe 31 f9 79 3e 12 33 cf 6c 99 9f 52 55 | 62 d6 02 f9 0e 35 e1 e7 8d 67 93 09 10 77 15 30 | 4a e9 d6 a0 31 50 fb be 13 05 50 dc f4 46 03 08 | 2f 95 1b 33 25 b1 ea 42 27 b1 8d 6c a6 26 e8 12 | 28 ee 49 16 a3 ec 76 ad 9e 1b cb d5 8a 26 5b 22 | 55 46 26 40 fb a4 30 9e 31 e9 07 5c 3b f7 53 4f | 4f ec 0e ee ad 7e 3f fc 05 9c b5 15 17 a2 62 3f | 29 00 00 24 28 3a b9 16 f5 d3 fa 3e 82 0e 6c a5 | b6 e0 32 27 f5 86 22 6d 8d 85 0f 17 f1 b4 a5 df | eb 51 66 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 e9 4b 4d 06 92 e2 ba cc 1d e9 b2 | 45 c8 92 47 34 22 29 80 00 00 00 1c 00 00 40 05 | 84 da 3f 80 5c a8 47 c1 08 aa 1f 48 69 9f 8f ac | 3e 3c 6c 93 | libevent_free: release ptr-libevent@0x7fb370012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37000d120 | #40 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 2d ea 23 2d fd 9f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #40 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #40 | rejected packet: | f4 2d ea 23 2d fd 9f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #40: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #7 | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #7 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #7 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49605.121634; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004931 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37000d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #7 | libevent_malloc: new ptr-libevent@0x7fb370012840 size 128 "road-eastnet-nonat-7" #7: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #7) | df 0f 9a c7 72 fc c7 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 16 59 37 af 9b 5a d1 22 e5 b7 89 f5 29 0b b4 | f8 e5 4b 2e 70 7a c8 bc f1 ab 2a 61 eb 02 ca fa | a3 75 2e 7e 2d d5 25 c9 fa fb 53 11 81 f8 e7 7c | 35 1a 09 cf c2 a1 7a e6 ba 83 f5 ea 71 c2 29 ca | 29 da 7e bf 99 10 95 66 d2 23 d8 4f 49 2f bd 63 | 11 b8 e1 71 39 92 a3 a7 60 6b 7a e8 94 6f c6 09 | 3e 44 50 a7 14 dd 81 7d 4c 7f 80 8c 35 65 97 9c | b1 11 76 e7 2a ca 44 b5 84 ae 8b 5a 9b fd ff 0d | 19 d8 e9 75 5a 70 67 71 dc 0e 22 08 1b 97 e2 25 | ad 6c 4c 80 de ff 3e 29 34 2a 32 fa 3b 41 ab 38 | c8 2c a4 db 1f 4a 62 fb 24 ff ed 13 44 3e 4c cb | a1 99 52 bb 30 b7 29 d8 9d 52 b8 4d 90 9d ab aa | c0 57 68 4e 57 cb d7 d7 cc 96 2c bc 75 0c 87 f5 | 9c 71 0b 3a 29 74 b7 e2 7f 5e 8b 9f 17 4e 89 84 | da f8 88 1c 69 02 1c 1f 41 83 de df 0e 7e 58 56 | 61 84 83 da 8c c8 98 f6 a7 9f db ce b7 aa a6 bc | 29 00 00 24 9d 55 08 62 c0 73 1e 47 79 75 2c 10 | 4a ab 88 17 80 18 91 8e 0d 3b 8f 21 a0 4a c9 52 | dc 93 16 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e cd 5f ad 94 80 bb 48 49 e9 a2 c8 | 76 8b 7e e8 6f 59 19 d9 00 00 00 1c 00 00 40 05 | 2f 3e df 6a 16 4a bb 95 81 15 e0 c0 73 52 29 fa | 60 85 d2 fd | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #7 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 0f 9a c7 72 fc c7 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #7 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #7 | rejected packet: | df 0f 9a c7 72 fc c7 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #7: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0672 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-54" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-54' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #54 at 0x557d46a1e510 | State DB: adding IKEv2 state #54 in UNDEFINED | pstats #54 ikev2.ike started | Message ID: init #54: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #54: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #54; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-54" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-54" IKE SA #54 "road-eastnet-nonat-54" "road-eastnet-nonat-54" #54: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-54 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-54": constructed local IKE proposals for road-eastnet-nonat-54 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 54 for state #54 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb378005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #54 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 | #54 spent 0.143 milliseconds in ikev2_parent_outI1() | crypto helper 17 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 starting work-order 54 for state #54 | RESET processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 54 | RESET processing: connection "road-eastnet-nonat-54" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.233 milliseconds in whack | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 54 time elapsed 0.000967 seconds | (#54) spent 0.972 milliseconds in crypto helper computing work-order 54: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 54 for state #54 to event queue | scheduling resume sending helper answer for #54 | libevent_malloc: new ptr-libevent@0x7fb350012840 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #54 | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 54 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #54 | **emit ISAKMP Message: | initiator cookie: | 4e 45 bc 88 5c 41 98 f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-54 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c8 f4 91 14 5c ab 2e e9 80 6d af 62 f3 7d f3 c8 | ikev2 g^x 41 66 e7 43 38 9a c7 1b 1e f8 8c 7d f7 db 12 65 | ikev2 g^x 59 fd 3d ea 2d 58 b5 eb bc 29 cf 89 c5 08 e0 32 | ikev2 g^x af 71 20 82 0f be ca 31 6c 17 02 ca 88 1d 08 2b | ikev2 g^x 41 de be 4f db b6 e0 c9 ce b8 f5 78 72 16 5b d3 | ikev2 g^x af b2 62 71 28 3f 0e a5 9b 79 4c c6 6b 64 ea 6c | ikev2 g^x 30 86 90 45 62 e9 86 e5 b2 f0 de b0 25 c7 2c 5e | ikev2 g^x 72 55 be b3 8f b3 05 2b 3b 6d 68 2a 44 c2 cc ec | ikev2 g^x 6b 1d 92 df 89 1a 9d f7 c1 18 8f 4d 34 ce b2 72 | ikev2 g^x dc 24 61 bd 37 65 28 f1 26 42 c6 a1 48 90 50 40 | ikev2 g^x 60 3f 78 ce 04 9c 3d ba 18 4e dd 4c d6 82 6e 51 | ikev2 g^x 67 48 49 62 37 f2 ed 52 4d b8 26 ec b0 85 3e 94 | ikev2 g^x ba a6 36 bb c9 80 6e e3 33 72 02 87 28 51 f7 0e | ikev2 g^x b2 b1 8f 9a df 7c ac 13 32 02 9e b4 45 75 85 e3 | ikev2 g^x 86 3b 1f 81 8b 2b 4d 2b b9 af 80 14 c8 c0 37 3b | ikev2 g^x 75 10 32 13 c6 74 a7 41 62 92 b3 87 9f e2 ed 2a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f9 a0 5c 35 4a 9e bd 0e 0d 94 7a f9 8f b8 01 dd | IKEv2 nonce 15 88 70 42 78 10 83 16 a2 ba 62 6b bf 0e 5b 2a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4e 45 bc 88 5c 41 98 f7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 36 | natd_hash: port= 01 f4 | natd_hash: hash= 2b f1 3a 2c 8b e8 c9 68 86 e1 0f be 41 4d 1c 16 | natd_hash: hash= cf d5 b6 01 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2b f1 3a 2c 8b e8 c9 68 86 e1 0f be 41 4d 1c 16 | Notify data cf d5 b6 01 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4e 45 bc 88 5c 41 98 f7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 84 fa 3c 0d 93 21 b5 34 8e ca ca 4a 93 ec 16 d0 | natd_hash: hash= 28 a4 5e 28 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 84 fa 3c 0d 93 21 b5 34 8e ca ca 4a 93 ec 16 d0 | Notify data 28 a4 5e 28 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #54 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #54: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #54 to 4294967295 after switching state | Message ID: IKE #54 skipping update_recv as MD is fake | Message ID: sent #54 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-54" #54: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.54:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #54) | 4e 45 bc 88 5c 41 98 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 f4 91 14 5c ab 2e e9 80 6d af 62 f3 7d f3 c8 | 41 66 e7 43 38 9a c7 1b 1e f8 8c 7d f7 db 12 65 | 59 fd 3d ea 2d 58 b5 eb bc 29 cf 89 c5 08 e0 32 | af 71 20 82 0f be ca 31 6c 17 02 ca 88 1d 08 2b | 41 de be 4f db b6 e0 c9 ce b8 f5 78 72 16 5b d3 | af b2 62 71 28 3f 0e a5 9b 79 4c c6 6b 64 ea 6c | 30 86 90 45 62 e9 86 e5 b2 f0 de b0 25 c7 2c 5e | 72 55 be b3 8f b3 05 2b 3b 6d 68 2a 44 c2 cc ec | 6b 1d 92 df 89 1a 9d f7 c1 18 8f 4d 34 ce b2 72 | dc 24 61 bd 37 65 28 f1 26 42 c6 a1 48 90 50 40 | 60 3f 78 ce 04 9c 3d ba 18 4e dd 4c d6 82 6e 51 | 67 48 49 62 37 f2 ed 52 4d b8 26 ec b0 85 3e 94 | ba a6 36 bb c9 80 6e e3 33 72 02 87 28 51 f7 0e | b2 b1 8f 9a df 7c ac 13 32 02 9e b4 45 75 85 e3 | 86 3b 1f 81 8b 2b 4d 2b b9 af 80 14 c8 c0 37 3b | 75 10 32 13 c6 74 a7 41 62 92 b3 87 9f e2 ed 2a | 29 00 00 24 f9 a0 5c 35 4a 9e bd 0e 0d 94 7a f9 | 8f b8 01 dd 15 88 70 42 78 10 83 16 a2 ba 62 6b | bf 0e 5b 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b f1 3a 2c 8b e8 c9 68 86 e1 0f be | 41 4d 1c 16 cf d5 b6 01 00 00 00 1c 00 00 40 05 | 84 fa 3c 0d 93 21 b5 34 8e ca ca 4a 93 ec 16 d0 | 28 a4 5e 28 | state #54 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb378005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #54 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 | #54 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49605.154132 | resume sending helper answer for #54 suppresed complete_v2_state_transition() and stole MD | #54 spent 0.475 milliseconds in resume sending helper answer | stop processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb350012840 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e 45 bc 88 5c 41 98 f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #54 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #54 | rejected packet: | 4e 45 bc 88 5c 41 98 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #54: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fa300 | handling event EVENT_RETRANSMIT for parent state #47 | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #47 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #47 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49605.154254; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500319 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35000d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #47 | libevent_malloc: new ptr-libevent@0x7fb350012840 size 128 "road-eastnet-nonat-47" #47: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #47) | d1 80 96 dc 70 12 fd 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 89 48 be 2f 23 20 1a aa c0 f9 41 f1 9f b5 dc | 61 3b 4e 1d f2 94 aa 61 39 fa ff 9e ad da aa 8b | 79 a4 b0 75 86 17 be 8d f9 64 cd 5f 2c a3 74 02 | 5c d2 0b c0 e1 bc 40 a4 41 01 24 b6 16 65 80 b1 | 8d 5b f4 3e d9 78 1c 78 5b d0 4f 36 20 49 cf f5 | e6 39 8f 45 c4 05 3e 9a 58 8d 26 dc 13 63 31 38 | f0 e2 e6 6e a9 06 79 15 81 1d f5 b1 3e c3 40 32 | 5c c3 ef 40 73 34 78 3f 9f 9d fe 1e 7a 64 15 bd | f5 c1 66 e8 e7 57 72 db 6e e7 07 6d fc c3 84 15 | a7 9e a5 ae 49 06 60 b0 66 25 b2 60 5b c9 52 7b | 84 da 9e 07 cb 22 63 3f f7 e3 75 51 cd b7 f5 a9 | 00 8e ee 37 13 40 c4 a0 04 91 8b 4e b2 90 26 27 | 78 4c 50 15 9b df e6 81 a0 a4 86 f0 9c 4a d6 4e | 71 20 bc ef 14 af bb ba f8 7a 84 f5 e8 b4 d8 08 | bb e0 cf f0 c2 7a 1a fb 6d c0 80 83 cb fe 9c fe | 4d f9 6c 4a 79 4d c9 ec 6b b4 1f c4 42 35 86 05 | 29 00 00 24 45 2a 73 9c 59 88 24 30 1b 4c d7 76 | 91 c3 f5 9d 27 d4 d8 42 63 2d 46 4d bb 79 5b 50 | bd 3d d6 ba 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 44 84 40 30 da 67 e5 a7 75 a7 f1 | b3 01 a1 ea ef 36 29 e3 00 00 00 1c 00 00 40 05 | 02 24 d1 73 8e ed 3e 54 49 25 16 88 bd 9a 48 c6 | 35 3e 63 7f | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fa300 | #47 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d1 80 96 dc 70 12 fd 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #47 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #47 | rejected packet: | d1 80 96 dc 70 12 fd 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #47: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0552 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #27 | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #27 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #27 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49605.175709; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.011461 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fa300 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #27 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 "road-eastnet-nonat-27" #27: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #27) | dd bb 9e aa 71 2c a8 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa f5 f3 8a 2e ca 64 13 4e ef 73 e4 1f 3e 67 ad | a1 5c bf b8 82 2d 98 4b ba 2f 4b 9c 4a 49 f6 7b | 11 53 66 d7 f2 df c6 4d 6c e8 fe ca eb 65 f7 23 | 79 97 e3 ea 55 ca fa 7d 0e 42 d8 5c 14 c7 91 72 | a4 fc cd 45 56 42 b0 30 e3 75 4e 16 78 7d 09 4f | c2 b4 68 6b 47 a2 0e 20 da b0 6a 41 7f ac 79 d0 | d4 2d 42 99 fd 0a 3a e2 6d 7f 90 e8 4d 1a 00 b2 | e9 9e 2f 5f 8c ef b1 f3 83 5d 30 13 95 c4 ca 84 | fc 5b f8 fd 99 e0 ef 1a ad a3 e3 11 fc de 8e cc | 62 ac 46 25 e8 4f ae 15 57 eb 6c c5 d8 d5 81 b9 | c0 5f a7 29 95 52 01 a8 27 41 88 9f 21 51 57 97 | 0e c0 5b 72 b9 1f 72 3e c5 18 84 95 8f 3a f7 5b | 8e ab cb da 5c d8 78 8b 6b d1 3d 62 f9 12 53 ba | 86 1f 8f 29 ce 9f 76 76 1e 5f 01 99 06 da 91 72 | f3 a9 41 c1 f1 95 87 95 cf 5a fe 09 57 13 44 9d | 62 a4 a9 60 fa 79 cc f9 5d bf f3 2b 5c 5b b4 99 | 29 00 00 24 55 62 09 8a 44 b4 a9 1d d9 35 9c 9a | 78 93 87 c8 d6 2b f2 b0 a8 b2 26 80 5e 03 70 47 | 73 8a 49 c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ef ee 96 1f 62 1c cd f0 a1 f5 67 ee | 76 d8 b6 28 a5 c0 9f 1d 00 00 00 1c 00 00 40 05 | 69 41 25 fb 01 9f 0c 01 9b e6 f4 5d 86 8e 8e d0 | 2b 2d f0 b6 | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #27 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd bb 9e aa 71 2c a8 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #27 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #27 | rejected packet: | dd bb 9e aa 71 2c a8 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #27: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #41 | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #41 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #41 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49605.206072; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001527 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #41 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 "road-eastnet-nonat-41" #41: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #41) | 8c ff 26 ec fd d0 54 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 6e ec 95 3c 3a 16 99 41 58 58 6d 01 e2 00 52 | 61 4b c1 ec e1 3d d8 4e 54 c1 3f 99 6b 75 66 7c | 92 13 65 ae e7 70 46 75 9c c5 22 7e 39 16 2c 7c | ed 79 f7 7b 1e 03 31 32 5f 32 c2 43 74 2e 80 66 | 05 70 11 cc 43 ce 1e db 54 28 24 d1 42 b1 78 ad | e4 d1 e6 87 87 84 0f b3 11 50 a6 79 e1 08 7c 97 | 7e bd ba 46 ef f8 51 ce 68 86 83 2a 2c 29 00 29 | a5 58 88 f4 ed 2a f4 20 30 da 5d b1 69 45 2e 86 | 07 5f aa 0a 89 4a 6e 50 df 32 c3 37 59 a0 ba ad | 86 bd 19 1f 9a e2 19 57 1e fc 59 a2 20 ba a6 61 | df 8c b1 78 f4 73 20 28 d7 5d 27 a9 6d f4 51 05 | 00 85 1f 11 24 82 a0 ad b8 70 fc 6e 4d 99 a5 50 | dd 2e 79 4a 4c a1 78 07 7c f4 48 8d c5 cd ae 3d | 60 f1 3e 46 13 92 0c ad 34 dc 62 b8 45 01 1d 0e | 54 aa 15 f0 b8 36 03 5c 9a b5 ba b5 7c 77 32 6f | a5 95 b6 eb ec c2 d3 a2 c8 7a f9 23 04 ed b5 3b | 29 00 00 24 d2 1e ab ae e7 c2 8c f2 ef 74 c1 f0 | 3d f2 d7 f9 46 a9 e4 e0 b6 87 92 c1 10 9a fa bd | 74 9b e3 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 98 3f 00 de 9d 4b 8f 8e e4 88 e6 | cb 33 f8 3a c9 9d db 23 00 00 00 1c 00 00 40 05 | 7d 19 19 07 bb fc 4c f4 5b 43 3f 70 14 2d 10 a5 | 77 03 39 4f | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #41 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c ff 26 ec fd d0 54 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #41 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #41 | rejected packet: | 8c ff 26 ec fd d0 54 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #41: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #48 | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #48 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #48 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49605.223428; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500665 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #48 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 "road-eastnet-nonat-48" #48: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #48) | 92 07 42 48 2a e6 dd 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 27 70 ee fe 7b a5 6b c0 91 72 76 bf b9 26 41 | 8a c5 01 3c cd 8b 21 f3 23 df 5c 81 f1 ed a2 12 | a1 c4 5e 2f a7 b1 21 02 24 b9 30 c4 f5 c4 2d c4 | 90 7e 3e f0 c9 0b f2 18 3c 2b b9 91 3a da c1 6c | 57 28 75 1b 3a 0e e8 9b fc 4b ee 5c 39 98 fa 15 | be 81 4e e4 0c 6c a4 75 1b 83 45 74 98 dd 81 5b | 06 80 95 32 c0 f4 a2 4b 9d f4 17 33 73 16 94 48 | 16 60 93 ae 3d ce 3e d6 a3 61 16 51 cb 19 ec 02 | 00 f8 5a 99 f9 c4 14 2b 6a 99 61 a3 6a e4 c5 97 | ad 75 bb 6b 78 38 5a b9 44 bc 5c a3 2d 23 20 4c | 99 1b 88 95 1f b4 34 15 92 91 16 2b 1d 90 a8 32 | bd a4 79 83 a7 b0 92 15 f0 e3 c2 79 58 67 56 eb | 4d 0c 97 c3 3f ae 15 49 f9 9c d2 3e ec c3 17 b9 | bd 62 c7 73 21 fe 81 8b e3 b9 eb a9 ce c7 0f d3 | 3f 5d 5a 44 c2 b4 29 b6 b5 67 52 29 de ca c6 15 | 31 6c 15 9d 56 b1 be 81 9a 0d b9 07 79 05 6e c9 | 29 00 00 24 56 48 d0 40 29 5d 70 09 47 7a f3 f6 | 53 84 44 57 f6 31 5c 3b e1 9a 2b 92 5f 13 77 b9 | 29 81 06 a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 92 e0 aa 95 98 e7 44 d2 2d 1e d8 | d0 35 7f 77 52 84 b9 c1 00 00 00 1c 00 00 40 05 | a2 97 dc 1e 35 5d 8b 7e f0 05 d9 9d 5b 9e 9f 7f | 26 7a 4a c3 | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #48 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 07 42 48 2a e6 dd 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #48 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #48 | rejected packet: | 92 07 42 48 2a e6 dd 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #48: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f2060 | handling event EVENT_RETRANSMIT for parent state #8 | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #8 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #8 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49605.227754; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.012303 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #8 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 "road-eastnet-nonat-8" #8: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #8) | fc e4 b0 97 be 19 e9 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb d7 b3 51 4b 56 31 da 19 b8 5b 11 80 3b 41 1d | db f2 28 3e 72 37 5d 51 ba b2 d1 db 84 a6 bb ce | 1e df 68 85 ad 45 d9 42 b6 3f f1 bf ca c0 f5 c2 | 41 11 18 ed 51 a4 a9 fb cb 5c 4b aa 1e 3a 47 5b | 44 a6 6a b6 94 62 27 08 46 1d 7b c4 ed 7e 13 6a | ca 75 f3 53 1a b4 5c e1 d0 26 6f 40 15 2a cf 5a | f0 64 c4 e8 99 40 1c 70 04 b2 00 e7 d0 a3 f5 96 | 6f ea 9b 0f 3f 68 a1 38 bf d5 ee 9b d4 28 95 59 | 43 fb 48 c8 ce 17 ed f6 a6 07 54 e9 76 3f ee 31 | e6 e0 4a 4a d9 1d 0e e2 d0 7f ee 9c f3 8f a5 65 | 31 c9 6f 45 ef 29 7c e4 98 48 e7 74 36 9b 60 48 | d3 f3 57 f0 4c b4 e7 0c b5 86 17 23 2a 25 88 1a | fd 48 0b e6 cd dd cd 71 67 f2 f0 ef a5 6a 24 ce | 8d d1 03 48 9c cf 4e e9 3a a8 3d 43 bb 43 cc 87 | 8b c7 29 54 b9 be 7f 2d 59 4b b6 ed 8e 48 bd b3 | 3d c6 30 ad ce 82 73 65 33 71 0d 41 0a f1 8b 76 | 29 00 00 24 ca f3 cf 9b f4 48 aa 70 c1 ee a6 ea | 0d e2 1f 7c 7a 99 db 08 31 a2 ad 99 ee 01 2c 76 | 68 be 3a 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d b5 e6 39 e3 40 62 d7 8a aa fc 72 | 51 01 50 53 91 71 a4 51 00 00 00 1c 00 00 40 05 | 09 30 f5 72 c0 48 d1 9e 95 11 78 b6 cb 80 4b c0 | 24 25 44 07 | libevent_free: release ptr-libevent@0x7fb354009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f2060 | #8 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc e4 b0 97 be 19 e9 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #8 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #8 | rejected packet: | fc e4 b0 97 be 19 e9 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #8: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ec960 | handling event EVENT_RETRANSMIT for parent state #28 | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #28 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #28 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49605.230093; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003217 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e8820 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #28 | libevent_malloc: new ptr-libevent@0x7fb354009640 size 128 "road-eastnet-nonat-28" #28: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #28) | 8a 4b 73 21 31 f2 6a 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 df aa e5 83 52 1a b7 2d d0 6a 7e dc d8 a5 d6 | 60 61 e0 83 0f 2b 6a 2b b8 0c 87 3f 14 f7 2a a4 | 98 70 c5 3a a2 0f 1f 46 6a b1 86 1e e5 5c 59 31 | 32 22 91 5d a2 6a 04 29 2b 10 13 47 0d 40 ca 72 | cd e0 cf f3 84 ed 4f bf 99 02 d6 fe 28 30 e6 6c | 0e 7e ca 11 f9 11 9f a6 4c d1 42 ed 4a 0f de 1b | d1 6c 18 cd c5 6b d0 23 4a e0 04 a7 c5 ef 74 ac | 27 c8 ec 0e 1f 0d 3c 8b a9 02 76 2a 67 8e fc de | 50 4d 80 13 28 3f 33 79 17 2e 6d b4 b5 19 8a 07 | 87 4a ec 6e c5 3c fb 34 d8 bf 04 77 90 53 b4 91 | 82 d0 d4 cb ca fc 05 22 43 e7 d4 8d 52 a6 ff 42 | 3e 8b bc 55 2d a6 ee 39 af 98 64 0e 18 a4 e9 08 | 5d d9 7e 8e 5f 00 df 4b 1b cc 49 d9 d0 64 64 c8 | 91 98 82 46 10 8e 0a 7c d6 f9 65 30 9e a6 47 1d | b8 47 35 3b c7 13 08 d5 39 45 15 b2 10 ce ee 48 | 7d d8 33 00 3c 55 6c 41 f3 1e 7b 0e 34 03 4f b7 | 29 00 00 24 ad 13 98 57 a2 9c 4e ec e1 0a 80 5c | a0 80 42 e1 ab 4f 47 32 a1 1d 36 58 8b 1c 71 8b | 25 4d b5 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 83 6c 60 48 f0 55 9f 8d d1 7e b1 | fd da e6 ac 8a a5 fd 2f 00 00 00 1c 00 00 40 05 | 4a 9c 1d b6 db 3c dd 9b 4a da 5d 6f ea e8 da 4e | 08 2e ae f5 | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ec960 | #28 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 4b 73 21 31 f2 6a 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #28 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #28 | rejected packet: | 8a 4b 73 21 31 f2 6a 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #28: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ef4e0 | handling event EVENT_RETRANSMIT for parent state #49 | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #49 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #49 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49605.28545; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500268 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a18370 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #49 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 "road-eastnet-nonat-49" #49: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #49) | 8b 45 5c f0 af 2f 9d ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 38 13 81 3a b9 33 6e f2 a1 41 ed b7 e9 17 cf | 38 df bd f2 c5 3d 78 1c 98 5b e5 97 39 7c 00 0a | 9b b9 2b 4e ee 4e 90 b7 3f 17 93 3b 49 e6 73 ac | f3 36 ea c0 f6 08 78 26 b2 58 4a a1 8f ff 26 a9 | a2 29 62 4b f6 47 e2 5d a0 f3 e8 a3 da 86 cc 66 | 5a 6a 1d 0c 47 30 d7 e6 6e 32 62 71 d7 d3 1b 25 | 92 10 eb e7 f4 a1 c6 b8 cf 48 2b c2 a1 ae c9 5f | 55 56 6d 5d 77 a7 5f aa 02 cf a8 ea bb 62 18 44 | 0f aa 1d 7d 23 c7 37 6d 72 2b 4a da 38 22 af af | 35 47 8a 4d fb f1 2e 0f fa 54 54 48 f4 2f 1b 4b | 5a 9a c8 ab f4 0a 9c 36 8e 9a 37 b6 3a a4 36 09 | f9 cb 85 a0 d5 4e 66 72 2d dc a7 8d 87 52 32 39 | 0d 6e ce 73 51 c4 9b ee a5 7a c3 e9 dd 43 0b 8d | c9 c7 df e3 c7 9a fc aa 8b 37 41 93 d2 be 3c 27 | 15 30 62 da 6c d3 07 29 68 48 b5 55 56 c4 17 4f | b5 8f 29 d1 f2 fb 9e ea 13 d1 f0 21 44 a0 36 ca | 29 00 00 24 0e e2 a8 92 f0 b5 63 29 61 a0 ee 39 | b4 45 f6 bb e0 ab b1 76 a4 84 16 9e da d2 be 94 | e8 6d f8 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 12 9b 83 c2 c3 d2 71 a5 38 21 6e | a0 97 8f 66 c6 b8 71 3b 00 00 00 1c 00 00 40 05 | d2 ce 05 69 62 ac 37 a7 c1 ab 75 f3 75 7a c1 3e | 4a 93 d7 88 | libevent_free: release ptr-libevent@0x7fb35000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ef4e0 | #49 spent 0.218 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 45 5c f0 af 2f 9d ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #49 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #49 | rejected packet: | 8b 45 5c f0 af 2f 9d ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #49: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0888 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c00d120 | handling event EVENT_RETRANSMIT for parent state #42 | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #42 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #42 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49605.289908; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001556 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a011f0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #42 | libevent_malloc: new ptr-libevent@0x7fb35000cf80 size 128 "road-eastnet-nonat-42" #42: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #42) | 6d 45 59 82 ce 2c 77 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 19 87 21 99 aa 5a cb db ce 0f 02 f2 50 c9 ac 92 | 89 7c 70 85 a8 a7 33 4a c2 44 36 a5 03 8e 1f 50 | c8 86 2e d1 a1 d8 14 17 9c 7c a1 44 65 ba 61 77 | f0 62 19 6f f9 72 cc 36 22 03 c3 7d e3 8c 01 7c | 58 c0 91 2e 4f 24 ac cd af f7 da 61 3e 4b 43 c9 | b4 5d 67 e2 f1 65 be 23 88 f7 f4 e6 25 50 c9 e3 | 21 af 1c 45 62 8a 73 3a 98 47 b9 78 6f ee 87 26 | 3b 63 01 1e 58 61 99 0e 7a 91 7d 30 e0 59 53 0b | 92 57 66 fd a7 1f 2b 11 d7 59 95 9a 31 fc 95 b7 | 6b 6d 54 d3 d2 0f 8f 6e 22 a6 95 24 ad 69 c7 e4 | 30 99 2e f3 f9 ce 36 7f 2b 10 24 3b 8a de bf 7e | cb e6 f5 71 51 3c fe 08 40 b7 0a aa 06 06 b7 d2 | 69 fa d5 d4 16 ea b0 b1 e6 af 20 69 3c 12 1e 86 | 3a 05 a1 45 01 d3 59 e6 49 c9 c2 6a 69 6b a1 a1 | b0 18 e7 68 dc 1f 70 e8 33 59 8d 8e 1f 6a e1 13 | 5e 04 b2 02 62 fb f4 16 44 cd 9d 1e 33 84 73 83 | 29 00 00 24 98 90 54 f6 26 53 aa 96 7a 47 ff f3 | 5b dc e1 95 5c f0 6d 5d ed 6d 00 c6 1d e8 59 f1 | 2a 1c 8a 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 cb 92 0c 07 24 d9 90 48 22 d8 76 | e5 5b bc c8 39 99 d2 4d 00 00 00 1c 00 00 40 05 | cb e3 e2 5e 9a 09 f4 90 ee 73 df 07 77 16 6b 37 | da 99 3b e3 | libevent_free: release ptr-libevent@0x7fb36c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00d120 | #42 spent 0.198 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 45 59 82 ce 2c 77 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #42 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #42 | rejected packet: | 6d 45 59 82 ce 2c 77 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #42: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0901 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f61a0 | handling event EVENT_RETRANSMIT for parent state #29 | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #29 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #29 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49605.299995; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.006859 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #29 | libevent_malloc: new ptr-libevent@0x7fb36c012840 size 128 "road-eastnet-nonat-29" #29: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #29) | 76 94 35 7f f9 86 66 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 c8 26 94 c9 ea 16 54 c7 a0 a7 ee 80 e9 d2 eb | c7 74 3d 70 a6 ce 1b 7f 47 b8 a9 22 6c e9 de 3e | 5e 1a da 80 d6 29 b5 60 85 8e c7 9a 07 14 0f 2e | 5e 85 13 8e 17 81 27 ae b9 44 36 2c 21 79 b7 4c | 9f fe 6e 8f 50 03 81 71 96 dc 7d 13 e0 2d e5 55 | 9d 35 cf 6e 26 2f 6c 88 8f fc 20 a1 7f b4 44 e0 | 98 88 95 7e ed 39 2c 67 fe ec 38 89 03 76 30 8b | 31 e8 7f 06 73 93 d0 0a 0d a2 5e e7 17 d8 ae 0f | 27 a8 77 dc e5 16 a6 b2 26 c7 b0 e5 80 71 68 10 | 38 5e 32 59 c0 68 b7 75 a8 13 99 bb ca 95 f9 78 | 1f 9b 7b 46 65 6b 90 b3 9b cd ca 91 c9 75 7e 4d | 2e 06 ee 10 f0 8c c2 89 1e c3 a8 05 28 9a e8 eb | 20 63 32 0f f1 3f 82 9c 83 27 56 48 7d 7c a9 e7 | f5 1b db 86 e5 b7 2b 70 8a da ea 00 2d 06 e8 11 | 3c 90 f7 22 75 39 1f c5 87 f2 55 24 18 21 90 81 | 04 ec 8f 65 74 d4 59 92 bb 69 88 b7 6d 42 21 28 | 29 00 00 24 36 a8 1f b0 73 93 1f c8 b8 98 90 7a | af 61 a7 3e 69 e8 46 34 d6 9e 89 22 1f 07 54 41 | cf b8 14 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 3a eb 7a 38 98 4c b3 ed b5 e4 e8 | 5b 3d 4d 17 15 a4 85 ff 00 00 00 1c 00 00 40 05 | c1 f9 34 11 26 e0 6f d6 1d 57 cb be 7c d0 71 cf | 3a bd fc a1 | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f61a0 | #29 spent 0.215 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 94 35 7f f9 86 66 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #29 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #29 | rejected packet: | 76 94 35 7f f9 86 66 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #29: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-55" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-55' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #55 at 0x557d46a1fad0 | State DB: adding IKEv2 state #55 in UNDEFINED | pstats #55 ikev2.ike started | Message ID: init #55: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #55: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #55; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-55" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-55" IKE SA #55 "road-eastnet-nonat-55" "road-eastnet-nonat-55" #55: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-55 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-55": constructed local IKE proposals for road-eastnet-nonat-55 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 55 for state #55 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469f61a0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #55 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 | #55 spent 0.166 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-55" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.26 milliseconds in whack | crypto helper 18 resuming | crypto helper 18 starting work-order 55 for state #55 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 55 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 55 time elapsed 0.000946 seconds | (#55) spent 0.949 milliseconds in crypto helper computing work-order 55: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 55 for state #55 to event queue | scheduling resume sending helper answer for #55 | libevent_malloc: new ptr-libevent@0x7fb354012840 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #55 | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 55 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #55 | **emit ISAKMP Message: | initiator cookie: | 3d db 2e dd 07 aa ba 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-55 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5e 71 91 32 93 9e d9 77 ef 53 94 b9 d3 5b 34 5a | ikev2 g^x fe 84 a7 6b 7a 00 f9 5d 90 9e 95 ec 98 7e 50 90 | ikev2 g^x 6f 0f ae d2 9f 29 ef dd 60 22 99 95 c1 b0 c0 54 | ikev2 g^x a7 26 de ae fa 13 60 60 4e 33 18 74 d6 1f 83 02 | ikev2 g^x 06 b2 59 fa 7c 17 46 c9 2a 0a 3f 67 46 5b 6e d7 | ikev2 g^x 09 8c 97 98 d9 8f c1 fc 1c ec 49 28 fb cb 2a 4f | ikev2 g^x 78 96 26 a0 14 e4 f8 b2 87 ff f8 94 08 22 94 74 | ikev2 g^x 80 62 7b 3c 7f 07 b1 d4 49 9b 9c af da 12 43 95 | ikev2 g^x 22 ed c4 32 82 8f fd 22 2e 14 7f a3 9e 9a 0a 95 | ikev2 g^x 1c ac 99 95 6e eb ff 73 9e fa c4 9b c2 7f 18 d1 | ikev2 g^x a6 f5 7d a7 31 3b 50 d9 03 2b 9b 6a 48 7d 39 5a | ikev2 g^x 55 2b 5f c8 64 07 45 ea 51 98 d9 85 73 51 e2 22 | ikev2 g^x 6a fe cb 2c f3 b0 0b 08 b0 e7 70 07 6e 79 7c 1c | ikev2 g^x 6c d7 90 19 69 d2 44 49 0a 0f 6a 33 f1 60 ee 72 | ikev2 g^x 89 92 e0 5a 96 45 5d c4 8c 2b 42 de 01 b6 de 4f | ikev2 g^x b8 41 dc e7 4d 6a e5 69 01 12 96 be b3 ca 0c ef | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 34 26 bc 6d 2a b2 15 83 73 e7 09 34 40 d7 8e 8c | IKEv2 nonce 63 fe fd 1b d2 38 8c 24 da 45 67 bf a5 9b 8a 21 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3d db 2e dd 07 aa ba 13 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 37 | natd_hash: port= 01 f4 | natd_hash: hash= 05 45 13 d7 91 8d b2 95 9c 7e b4 17 75 e1 5c f2 | natd_hash: hash= 7c 3c ca 26 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 05 45 13 d7 91 8d b2 95 9c 7e b4 17 75 e1 5c f2 | Notify data 7c 3c ca 26 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3d db 2e dd 07 aa ba 13 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d0 0d a6 5e 1b c4 3a dd c0 34 b3 e5 87 cb 47 3a | natd_hash: hash= 73 94 3b 44 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d0 0d a6 5e 1b c4 3a dd c0 34 b3 e5 87 cb 47 3a | Notify data 73 94 3b 44 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #55 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #55: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #55 to 4294967295 after switching state | Message ID: IKE #55 skipping update_recv as MD is fake | Message ID: sent #55 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-55" #55: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.55:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #55) | 3d db 2e dd 07 aa ba 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e 71 91 32 93 9e d9 77 ef 53 94 b9 d3 5b 34 5a | fe 84 a7 6b 7a 00 f9 5d 90 9e 95 ec 98 7e 50 90 | 6f 0f ae d2 9f 29 ef dd 60 22 99 95 c1 b0 c0 54 | a7 26 de ae fa 13 60 60 4e 33 18 74 d6 1f 83 02 | 06 b2 59 fa 7c 17 46 c9 2a 0a 3f 67 46 5b 6e d7 | 09 8c 97 98 d9 8f c1 fc 1c ec 49 28 fb cb 2a 4f | 78 96 26 a0 14 e4 f8 b2 87 ff f8 94 08 22 94 74 | 80 62 7b 3c 7f 07 b1 d4 49 9b 9c af da 12 43 95 | 22 ed c4 32 82 8f fd 22 2e 14 7f a3 9e 9a 0a 95 | 1c ac 99 95 6e eb ff 73 9e fa c4 9b c2 7f 18 d1 | a6 f5 7d a7 31 3b 50 d9 03 2b 9b 6a 48 7d 39 5a | 55 2b 5f c8 64 07 45 ea 51 98 d9 85 73 51 e2 22 | 6a fe cb 2c f3 b0 0b 08 b0 e7 70 07 6e 79 7c 1c | 6c d7 90 19 69 d2 44 49 0a 0f 6a 33 f1 60 ee 72 | 89 92 e0 5a 96 45 5d c4 8c 2b 42 de 01 b6 de 4f | b8 41 dc e7 4d 6a e5 69 01 12 96 be b3 ca 0c ef | 29 00 00 24 34 26 bc 6d 2a b2 15 83 73 e7 09 34 | 40 d7 8e 8c 63 fe fd 1b d2 38 8c 24 da 45 67 bf | a5 9b 8a 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 45 13 d7 91 8d b2 95 9c 7e b4 17 | 75 e1 5c f2 7c 3c ca 26 00 00 00 1c 00 00 40 05 | d0 0d a6 5e 1b c4 3a dd c0 34 b3 e5 87 cb 47 3a | 73 94 3b 44 | state #55 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469f61a0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ef4e0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #55 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 | #55 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49605.314744 | resume sending helper answer for #55 suppresed complete_v2_state_transition() and stole MD | #55 spent 0.531 milliseconds in resume sending helper answer | stop processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb354012840 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d db 2e dd 07 aa ba 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #55 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #55 | rejected packet: | 3d db 2e dd 07 aa ba 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #55: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0672 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #9 | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #9 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #9 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49605.329104; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.011802 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #9 | libevent_malloc: new ptr-libevent@0x7fb354012840 size 128 "road-eastnet-nonat-9" #9: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #9) | 42 d4 37 7c 6c a2 32 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b e7 ee 8b 3f 67 fc 59 f9 cf cd 11 31 95 6f 6f | 1a 68 46 c3 76 29 7e 71 e4 25 40 18 dc 88 c2 53 | ee 88 a1 08 66 15 f3 28 c2 cb 4a e2 b5 75 33 59 | 55 79 a1 88 5f 78 4f 18 38 8e ae 5c 13 15 13 df | ba 4a 47 c9 50 41 88 b6 f1 7a 74 8c 60 ff 93 b2 | 20 68 e4 46 db 20 8c 30 74 ea 04 10 5a 30 ea 94 | 23 ad e3 f6 b8 fd ef 4b 90 8b 27 14 bc c0 83 ef | 74 2c ab 49 65 76 af 73 fb 43 7c f1 ae d1 dd 3f | cd c7 7b 68 fb f4 41 39 5c 57 ef 8f 92 ea 9a 47 | 45 2a 1a ac 29 88 a1 89 ea a8 1a 7b a4 32 e3 9e | 8d f2 ad cb d1 f4 4e b8 a3 dd 79 49 05 1f 03 30 | 8a 93 8b ac 8f aa 22 b8 9b 89 24 78 34 56 75 f6 | e9 af c1 e4 36 df ba ca 6c 64 ef d5 97 79 d5 33 | 78 61 be 8d 16 b6 42 4a 4c 79 ee 04 84 ce 68 09 | e7 e6 62 4d 5a 49 5e d0 0c 5b 80 69 ff fd 56 0f | 18 1b 5a c8 54 c8 76 c4 ef 5e 74 08 bd 6d 13 c8 | 29 00 00 24 56 5b 42 39 e6 4b 00 04 2e 83 3d 83 | 1e c8 b4 ab 97 9b 33 06 82 c0 a9 36 06 ea b4 2d | 23 5d c5 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 a8 01 3e 09 4e 61 7c 63 45 b6 fc | 6b 13 a6 83 ef 8b fa 92 00 00 00 1c 00 00 40 05 | 4f 50 e4 89 50 50 84 2d e7 09 2b 9f ac 1d 9b 91 | c6 7c af 4c | libevent_free: release ptr-libevent@0x7fb35c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #9 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 d4 37 7c 6c a2 32 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #9 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #9 | rejected packet: | 42 d4 37 7c 6c a2 32 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #9: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_RETRANSMIT for parent state #50 | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #50 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #50 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49605.354036; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.502137 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #50 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 "road-eastnet-nonat-50" #50: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #50) | 96 fd fa e4 3e 0e 84 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 85 b8 19 de 5c 0b b8 2d cb 54 cd 4a 1a dc 75 | 29 fd ca 47 94 14 29 17 31 bc e5 6f 6c f8 34 07 | 54 0a 45 19 2c 2a 6f 1c b9 dd 1e a6 5c 18 fd 5f | 81 44 c7 97 e9 8f a1 20 0b 20 67 50 dc 17 2d 25 | 1e 18 a7 76 43 da 58 3d a0 3c 42 3d 77 42 d1 eb | ed 35 62 7a 01 62 e1 32 87 10 6c d5 80 f8 d5 7a | e6 0d bc 8d d6 42 76 b9 2d fe 0d c3 eb e6 a9 0d | 0e 9f 06 5b af 9e 49 ff c0 94 83 2a d0 2d 71 88 | 4e 9a 35 ec c3 f5 8a a6 c6 22 6e 7e 16 d4 d9 e4 | d9 14 a9 a0 89 f2 18 8e be cf da c0 b4 27 62 b2 | 69 81 38 d5 cf 1b 18 ef 28 a2 d6 ab 45 93 46 f0 | b0 cf a6 b1 57 a8 1a d7 72 93 ec cd 51 ba 98 80 | 63 05 e1 50 59 41 cf a5 af 5d 7f 76 36 8e 63 f7 | e7 a8 78 3d b4 e5 4b 57 33 d8 0b ca bb 46 3b d1 | 5c 60 2c ab 89 51 2a 58 57 80 21 7f 56 14 26 65 | bd a7 02 e1 81 1f b6 ff ab b3 3c 36 3a 4d e7 be | 29 00 00 24 62 85 07 c7 f7 76 d5 f9 35 e6 84 85 | cf ff 39 b7 d3 8a fe b9 27 ad b1 ed 4e 28 c4 d4 | 73 2f 0f ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 6a 14 0a 8a ea 03 bd 41 dc ab fe | 15 04 7a 2b 71 ea 6d 09 00 00 00 1c 00 00 40 05 | 24 23 f0 d4 3c 33 30 25 f8 fc 46 79 64 b6 7b 59 | 6c 35 21 7f | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | #50 spent 0.178 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 fd fa e4 3e 0e 84 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #50 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #50 | rejected packet: | 96 fd fa e4 3e 0e 84 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #50: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000d120 | handling event EVENT_RETRANSMIT for parent state #43 | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #43 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #43 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49605.371065; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.007109 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #43 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 "road-eastnet-nonat-43" #43: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #43) | cc ee 6c 19 e2 66 91 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 b3 dc 74 af 8b 5f 17 f2 a2 67 e8 55 b6 7f 2f | d6 4e 7a 73 eb 13 7d 78 44 82 5e 9f c0 c9 a7 ce | 19 55 10 32 8b 27 a5 29 28 74 fd 00 e6 f7 6a 74 | 56 7d 4b 3f aa d7 b5 46 cb 2d 3c a3 dc 3f bf 05 | 8d ef fa 60 0a d7 e7 b4 43 44 81 a1 10 dd db 69 | 30 53 16 90 a0 49 c9 94 16 9b 8e 16 05 cc a3 b0 | bb c8 6f 12 2c 69 ac ba c2 57 c1 0e 1d 24 c4 b7 | c5 6e 9f 50 e2 e4 26 8c 25 36 d7 6d d8 cd 2c bd | d4 0a 33 47 c9 6e 1d c8 6c 02 27 85 0b ac 4e d8 | 84 b3 28 76 fc c6 2f a9 af 4b b0 f5 08 9e 56 b5 | 24 d4 f4 cb 0a 9c 0d ce 12 fa 25 29 9d 95 d6 4a | 9a e8 aa eb d1 08 9a 51 c5 21 4d b3 dd e9 4f d9 | a6 74 14 2d 42 fa 5e 68 63 d0 8e 8d 34 39 23 04 | 84 91 4d 1d 1d 39 77 e7 bb f1 e3 79 e8 0b 4e 9f | 52 2d 52 8d 33 23 04 37 3b 2c 9b 0f 37 da 18 16 | 07 6b 4f 80 6f e8 48 15 68 23 83 ca b6 b1 12 eb | 29 00 00 24 d5 f8 b0 cb f4 3b d7 c6 a9 5b 1f ef | 6f 5a 34 02 07 02 b5 92 c9 43 df 42 45 9e 46 a4 | f2 42 44 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 70 b3 40 c0 d2 23 ad 4c 6d 70 f1 | 0b c9 5a 99 fd 55 fa c5 00 00 00 1c 00 00 40 05 | fc 9d 2b d9 20 f9 c1 0e d3 88 83 de d6 d0 5e 66 | 9c 2c 6f e5 | libevent_free: release ptr-libevent@0x7fb360012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000d120 | #43 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc ee 6c 19 e2 66 91 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #43 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #43 | rejected packet: | cc ee 6c 19 e2 66 91 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #43: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e7260 | handling event EVENT_RETRANSMIT for parent state #30 | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #30 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #30 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49605.384193; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.007824 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #30 | libevent_malloc: new ptr-libevent@0x7fb360012840 size 128 "road-eastnet-nonat-30" #30: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #30) | eb 37 b2 e3 45 e6 a7 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 14 f4 3b 23 14 59 57 11 85 13 a2 12 2b b5 a3 ff | 27 d1 a6 d6 83 ba ed 6e 70 90 a1 d6 22 c0 f4 dc | 88 16 36 cb d1 72 72 bc de f4 41 0b 1b 89 09 42 | b9 3c f8 7c e9 f8 b9 9e 79 49 a8 2b 7f 1d 06 99 | c2 4a dd e8 2d e9 b4 cd ab 59 b3 cd 90 a2 ae 3c | dc 2b a8 89 42 be 2f 72 3b d2 e2 27 b4 65 50 d4 | 35 50 bc 83 c6 85 ec 49 08 26 e7 a9 0e b6 5e a5 | 85 8b 68 21 3e 90 ff 7d 8a b3 a3 ab 4e 47 64 32 | 27 11 da 90 e5 4b bc e9 16 11 6a bf 15 7e 85 08 | 28 9b e3 ef 08 8b 63 b8 f5 43 71 2f 4c 67 78 41 | b8 23 b8 9c 92 66 99 57 0d 3e 91 c2 06 23 98 e8 | 6d 98 00 38 76 9f e2 83 8a e1 b7 3f 0f fe 0a 46 | d4 29 95 ea ed 7c f2 88 a6 07 6b 92 26 ac 08 4f | 2f b2 56 84 37 68 ea c9 79 62 e3 b0 e5 14 a4 c8 | 94 04 78 6c 13 14 ae b3 aa ac 60 8d 12 46 30 65 | 4d f6 8a 38 3e 83 8d 9b ed 94 87 9f 15 c1 ab 90 | 29 00 00 24 3c c6 27 c6 e1 5b ef ef 28 05 b6 9a | 73 ea 46 41 c6 a4 e3 b1 86 51 d2 31 50 73 0b 09 | 13 5f 9d 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 2d bd fb cd 00 1b 4b be 47 ff 4c | 9b 30 9e df 04 ed 35 e5 00 00 00 1c 00 00 40 05 | f4 eb 1d 0f f6 3b e7 d6 54 0e 88 15 bd 63 45 57 | 71 e8 c0 52 | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e7260 | #30 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 37 b2 e3 45 e6 a7 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #30 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #30 | rejected packet: | eb 37 b2 e3 45 e6 a7 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #30: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-56" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-56' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #56 at 0x557d46a21090 | State DB: adding IKEv2 state #56 in UNDEFINED | pstats #56 ikev2.ike started | Message ID: init #56: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #56: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #56; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-56" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-56" IKE SA #56 "road-eastnet-nonat-56" "road-eastnet-nonat-56" #56: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-56 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-56": constructed local IKE proposals for road-eastnet-nonat-56 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 56 for state #56 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469ec960 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #56 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 | #56 spent 0.14 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-56" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.22 milliseconds in whack | crypto helper 7 resuming | crypto helper 7 starting work-order 56 for state #56 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 56 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 56 time elapsed 0.000977 seconds | (#56) spent 0.983 milliseconds in crypto helper computing work-order 56: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 56 for state #56 to event queue | scheduling resume sending helper answer for #56 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #56 | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 56 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #56 | **emit ISAKMP Message: | initiator cookie: | a2 38 96 b9 83 17 2c 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-56 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4c 86 44 cb cd d5 e6 ca 09 de cc 09 a4 86 65 dc | ikev2 g^x 8e 5e 46 71 c3 c7 a8 ed be 75 06 f3 62 76 ba da | ikev2 g^x ce e9 f2 5f 5c 9e e4 0c 00 41 ba fd 53 1c 48 95 | ikev2 g^x 4a ae 4f cc 78 85 9f f0 fa 4c 13 7a c5 dc 96 cf | ikev2 g^x 8c 8f e9 26 db 93 6d c0 e4 2b 06 79 49 8a 1c 86 | ikev2 g^x 23 8a 00 51 5e 48 57 fe 2b c6 2d 2e cc 90 37 77 | ikev2 g^x 16 54 2d 1c 52 6e 88 f9 06 69 91 14 40 a3 3e 1f | ikev2 g^x 64 d7 73 f6 42 da 0d 73 5f 6b eb 89 ee 97 cd 6c | ikev2 g^x fd 1d 89 b8 17 39 77 3f b0 8b a8 13 2f f9 45 f4 | ikev2 g^x e3 ec 7f a4 35 be 17 3d c6 80 db be df d2 e9 bc | ikev2 g^x 39 46 6a e1 d0 06 ce 65 d8 13 18 bc e7 ef 70 ba | ikev2 g^x 17 09 9b 7f c9 d6 90 ff cb 53 6a 15 26 bc 84 d0 | ikev2 g^x 3c 63 f9 85 08 c0 bf 6b 92 00 26 8e 7e 39 47 fa | ikev2 g^x 15 93 5e ae af a3 95 34 bf f7 9a 05 60 79 f9 78 | ikev2 g^x fe 1c 09 6f 2a d7 a8 e6 dd 20 f6 bd f3 b0 a8 de | ikev2 g^x 56 b0 c1 b0 a8 8e c2 c9 51 e8 12 8c 23 35 5a 34 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d3 9d 92 33 15 50 42 07 cb e2 93 fb fa f0 4d 62 | IKEv2 nonce ce 86 f8 78 f6 e4 5a c4 46 ff 05 fd 2d fe b5 e4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a2 38 96 b9 83 17 2c 9d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 38 | natd_hash: port= 01 f4 | natd_hash: hash= 20 f6 95 c7 6a 67 27 fa d2 0e 4e 26 b1 fb ce d1 | natd_hash: hash= 96 08 1b d4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 20 f6 95 c7 6a 67 27 fa d2 0e 4e 26 b1 fb ce d1 | Notify data 96 08 1b d4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a2 38 96 b9 83 17 2c 9d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 86 3b a6 fc 26 15 66 79 c8 2d 3b 9c 75 89 43 54 | natd_hash: hash= 51 cf ae 75 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 86 3b a6 fc 26 15 66 79 c8 2d 3b 9c 75 89 43 54 | Notify data 51 cf ae 75 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #56 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #56: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #56 to 4294967295 after switching state | Message ID: IKE #56 skipping update_recv as MD is fake | Message ID: sent #56 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-56" #56: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.56:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #56) | a2 38 96 b9 83 17 2c 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c 86 44 cb cd d5 e6 ca 09 de cc 09 a4 86 65 dc | 8e 5e 46 71 c3 c7 a8 ed be 75 06 f3 62 76 ba da | ce e9 f2 5f 5c 9e e4 0c 00 41 ba fd 53 1c 48 95 | 4a ae 4f cc 78 85 9f f0 fa 4c 13 7a c5 dc 96 cf | 8c 8f e9 26 db 93 6d c0 e4 2b 06 79 49 8a 1c 86 | 23 8a 00 51 5e 48 57 fe 2b c6 2d 2e cc 90 37 77 | 16 54 2d 1c 52 6e 88 f9 06 69 91 14 40 a3 3e 1f | 64 d7 73 f6 42 da 0d 73 5f 6b eb 89 ee 97 cd 6c | fd 1d 89 b8 17 39 77 3f b0 8b a8 13 2f f9 45 f4 | e3 ec 7f a4 35 be 17 3d c6 80 db be df d2 e9 bc | 39 46 6a e1 d0 06 ce 65 d8 13 18 bc e7 ef 70 ba | 17 09 9b 7f c9 d6 90 ff cb 53 6a 15 26 bc 84 d0 | 3c 63 f9 85 08 c0 bf 6b 92 00 26 8e 7e 39 47 fa | 15 93 5e ae af a3 95 34 bf f7 9a 05 60 79 f9 78 | fe 1c 09 6f 2a d7 a8 e6 dd 20 f6 bd f3 b0 a8 de | 56 b0 c1 b0 a8 8e c2 c9 51 e8 12 8c 23 35 5a 34 | 29 00 00 24 d3 9d 92 33 15 50 42 07 cb e2 93 fb | fa f0 4d 62 ce 86 f8 78 f6 e4 5a c4 46 ff 05 fd | 2d fe b5 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 f6 95 c7 6a 67 27 fa d2 0e 4e 26 | b1 fb ce d1 96 08 1b d4 00 00 00 1c 00 00 40 05 | 86 3b a6 fc 26 15 66 79 c8 2d 3b 9c 75 89 43 54 | 51 cf ae 75 | state #56 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469ec960 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f2060 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #56 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 | #56 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49605.406461 | resume sending helper answer for #56 suppresed complete_v2_state_transition() and stole MD | #56 spent 0.463 milliseconds in resume sending helper answer | stop processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb348012840 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 38 96 b9 83 17 2c 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #56 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #56 | rejected packet: | a2 38 96 b9 83 17 2c 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #56: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0596 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #51 | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #51 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #51 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49605.430897; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50229 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #51 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 "road-eastnet-nonat-51" #51: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #51) | 4e ec 23 15 b1 7b 72 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb ca ad 90 d3 c3 42 ab 02 0a 3a 99 99 08 46 41 | e3 20 e2 b5 e7 92 8d 56 c0 f6 81 f6 d7 1f 61 ae | fb 7c 4e 49 1a 90 7d af 41 51 b1 4f a9 1c af 26 | 43 e3 44 1a 2b 54 c2 29 d3 73 8c a6 e2 ba 3d 02 | 79 ed 80 dd 4b 1e 56 a7 0d 93 2b 80 2d fa ef a7 | a5 07 28 e5 1d 36 9e 70 e3 83 04 4a 00 cd 83 0a | dd f1 6f 7b 41 89 16 39 86 45 b3 89 6b 38 63 99 | 64 d2 3b 37 57 db 5b aa 3c 09 dd b1 e9 2a 36 7d | 07 9a 1b 84 49 cb 9b 53 1f e3 16 45 5a 7e 7d 6a | b6 b2 5f ad 65 38 70 73 69 63 43 b9 48 24 d6 aa | 84 39 4e 67 2a d2 39 99 70 07 69 a7 7e 3b f3 d0 | 5d 4d 0d 43 76 2c 16 f2 ef 43 c1 03 3c a0 15 fa | 7b dd 0d 24 8d 60 85 f6 a5 c6 c1 eb e0 9b 23 f3 | 77 0d cd ab 79 52 59 61 60 d0 e6 6a b2 5f 84 3c | bc fe a3 56 10 78 f4 57 b0 c9 73 a2 9c 16 ae e5 | 21 a9 af 1c 86 05 49 d7 79 de ea 6f 42 c1 58 6c | 29 00 00 24 8a 81 ff 83 11 9d 7f 95 f4 0f 60 37 | ee c1 de 9d 9d 4a 24 6c a2 0d 2e aa 53 c1 6d 4e | 8c ed 61 8e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 84 7c cd 2e 5d e1 e4 b9 3d 91 59 | 8e 0e df bf 1a 34 00 37 00 00 00 1c 00 00 40 05 | 4f e7 ab 4c a7 2a fc d1 46 25 a0 98 d8 53 89 a8 | 24 a4 22 8e | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #51 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e ec 23 15 b1 7b 72 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #51 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #51 | rejected packet: | 4e ec 23 15 b1 7b 72 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #51: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f4be0 | handling event EVENT_RETRANSMIT for parent state #10 | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #10 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #10 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49605.432866; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.016043 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #10 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-10" #10: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #10) | 6b e4 01 c3 ed 3e ed 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2b 6a 85 96 38 f3 d3 4e 55 03 ae f3 d4 0f ad 38 | 83 2b 8b 92 04 a5 95 20 97 dc f8 34 30 38 91 0d | b9 c4 11 ab e9 a9 94 d4 16 5b f1 c4 91 68 3e fa | fb b4 36 73 13 7d c7 d0 75 c4 f9 ef fd 92 5b cc | aa e4 77 57 96 44 12 f0 38 b5 1d ad 33 4d 65 c3 | 93 63 ce 14 d7 d8 25 ef f8 0d ae dd 78 dc 8e b7 | 7e c2 3d a5 d5 d3 09 2b ad 9d bd a9 6f 55 df a1 | 6f b4 2e cf 9f fe 7e ae 25 58 a2 81 78 bb f7 29 | dd 53 e8 91 13 65 1e 1e 60 9c d0 15 9f bb 76 ed | ab 75 ce 2a 44 05 fa b1 a3 a7 39 d0 53 b7 7f 4f | e0 b7 8f a6 98 8c 07 ab a8 32 37 42 0c 8c 3d a7 | fc 6c 53 ac 60 2a 04 67 31 66 47 13 4f bc 34 8c | 30 51 26 7c 6a 36 76 70 15 29 7e 23 fc ac 0e 32 | 57 5c bb d9 b8 c0 27 61 5e fd 8f bc 73 83 16 ba | bf 42 32 51 56 3e 21 8b 6d 4a af 80 6d 52 1f d5 | 84 cd 2e ff dc c3 b8 a0 b2 26 7e 0c b7 e0 d0 d6 | 29 00 00 24 23 a8 6c e8 37 a1 47 09 f8 10 83 5c | 3f e5 80 de e6 d0 ee 9e 1f f2 6d 6a 1a c1 8c be | 9a 4a a5 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 14 ac ca 29 d0 75 c4 40 2c aa 37 | f4 15 d0 3b ed 2d a9 e1 00 00 00 1c 00 00 40 05 | 85 e0 a4 b5 9f 75 13 0f 6d a9 52 94 7d fa 0b 2d | 65 f2 06 03 | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f4be0 | #10 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b e4 01 c3 ed 3e ed 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #10 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #10 | rejected packet: | 6b e4 01 c3 ed 3e ed 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #10: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0757 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8d60 | handling event EVENT_RETRANSMIT for parent state #44 | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #44 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #44 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49605.433166; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001006 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e7260 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #44 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 "road-eastnet-nonat-44" #44: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #44) | 2c a5 57 82 94 bb 0c bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f f1 d9 3a 5c ec da ab 46 a0 1a 50 8e c5 b2 4a | 63 93 0d d6 bb 0b cb a2 7b 64 4c d6 0d 5d 75 c0 | a4 fb 12 20 36 86 d2 5a 85 de 9f 1a 56 dd 51 88 | 1f dd 14 6d 54 37 65 2c 39 00 b9 0b d0 9a b8 93 | dd 72 9a 78 33 2f fe d8 37 67 48 08 b2 16 1f 29 | 2a f2 be 3c 42 f3 72 0d 31 7d f4 16 71 3f 2a 28 | a2 72 a2 07 56 93 05 b3 01 4f f8 0a 3d 17 c2 61 | 36 84 95 ef b4 4f 95 5b 93 28 0b 0c 46 73 8a 49 | 11 16 41 b2 73 0b 44 cf a4 af 2f d7 2a 7a 6d 3e | 45 30 bc f5 de 74 14 4c f1 52 50 35 c7 29 67 5d | 02 d9 88 3e 6a e4 83 d6 7c b8 69 a3 7c 7f 9b 8b | 37 21 48 68 00 9a 01 a3 9a d7 3b 02 8c 67 ac 11 | 42 36 9e 84 ad 85 da a3 35 c1 ee c3 6a 24 37 55 | cc 67 9a 57 48 6e 0b 5c b6 9c 4d 16 ed 25 57 02 | 16 2f e6 f6 ce 2a b1 ca e6 1e 1f f9 44 d1 46 60 | 1f 00 3a 24 c7 f4 7b 04 f3 08 7e 6f de 0b 6c 0f | 29 00 00 24 c3 85 c7 9f 53 c2 4b 6d 4a b2 71 6f | 5f 3f 70 d0 bf 0d 26 13 04 46 9b 8c 51 07 8b 19 | bb fc 96 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f 56 cd 95 dd 34 fe 03 70 04 69 b5 | 7b 30 2c 80 a8 67 5b f1 00 00 00 1c 00 00 40 05 | 20 cd 88 b3 c4 29 91 b7 4b 43 e6 f4 9f a3 71 4b | c5 83 8c 17 | libevent_free: release ptr-libevent@0x7fb364012740 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8d60 | #44 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c a5 57 82 94 bb 0c bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #44 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #44 | rejected packet: | 2c a5 57 82 94 bb 0c bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #44: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #31 | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #31 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #31 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49605.46811; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.998876 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f61a0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #31 | libevent_malloc: new ptr-libevent@0x7fb364012740 size 128 "road-eastnet-nonat-31" #31: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #31) | d5 d5 f7 7f 23 0d 4b 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 d8 4b a5 f9 d4 3a a9 51 97 2e 27 d1 cc 90 15 | e2 e2 8d 96 07 4d fd 40 9f 4f 7f 6f 35 0e 23 bc | 4a 6a 76 f9 9f 83 b0 54 30 ee b6 fc 0a 45 0c 73 | 2d e9 2a b2 ca 81 a2 ff 50 db 13 29 75 7d e9 7e | a9 33 06 c4 32 68 94 61 41 2b 8d f1 ff df 69 cc | e8 c4 b4 6d ef bc 3d c5 49 cc a7 2a fc 4c 98 e2 | 30 43 57 19 e1 0a 22 00 d7 07 6f aa ba 35 b2 14 | 36 27 5e 66 b6 08 a0 40 46 47 86 94 6d 23 bf ed | 9b 86 94 95 7d 7c df ed 26 58 08 d9 19 18 cf 17 | d2 31 cb 23 b8 00 65 a0 2d c7 80 be d9 c6 2d 9b | 2d 24 dd 1f 09 8c cb bd 5d a9 d7 7b 30 d7 87 68 | f3 c0 0e 20 8d c3 3f 32 80 d9 ab 29 26 00 09 ea | b0 b4 2f 7d 8f fc 22 1d 7c 39 80 08 04 22 2a 49 | f4 26 0e 59 4e ac 0e 0e 46 93 3b ba 87 01 a8 59 | ea 18 2f 09 70 d0 fb 69 f1 4a 19 c7 fd d5 be f0 | ff bb d7 7c ef dd e5 ed c9 a4 0a b6 e1 11 1b ed | 29 00 00 24 6a 1e b5 3b 00 37 08 50 6d 81 0e e2 | cf 1b 46 47 4b 2b 09 3d 6e 9a 95 9d 52 78 61 ae | d4 0d 66 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 91 23 cd ed e8 35 56 6f f7 85 4c | 49 64 a9 75 0a 07 1b 5f 00 00 00 1c 00 00 40 05 | a3 62 6c f7 52 92 b8 35 33 98 a9 6b 00 6d db 28 | 96 bc 0a b6 | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #31 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 d5 f7 7f 23 0d 4b 11 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #31 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #31 | rejected packet: | d5 d5 f7 7f 23 0d 4b 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #31: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0709 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #45 | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #45 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #45 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49605.498118; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.0024 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #45 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 "road-eastnet-nonat-45" #45: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #45) | a3 bb a6 38 bf 16 36 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 bf 7f b3 da cb 24 f0 9d 9b d3 fd dc cf db 07 | e6 5b 40 74 f8 99 0f 8a 69 5b 21 df 39 e1 ee 66 | 6e d2 eb aa da ff dd cd ef 30 5f f7 58 03 e1 db | 0d 74 f6 29 93 ca f1 42 fd ad b9 96 9c 2f 50 32 | 58 c3 21 d3 aa 48 12 01 4c e3 13 6e 9b ee 2d 74 | 42 be dc c8 fd 3f 8a d7 32 bc c2 52 53 8d f7 2a | 84 67 44 c8 2e dc 1a b1 bb 7e 48 68 aa 07 71 d2 | ed bb 6e e8 36 32 f2 a5 31 45 4d 85 68 10 11 40 | f6 85 5c 6f 85 60 44 96 50 66 ff a4 e4 4d 79 e9 | 3c a7 0e 91 f7 05 c3 d3 85 48 8e e8 a2 59 53 66 | 1c c3 08 ca 90 69 7f b0 5f 9c 5b ec cd 7e 11 67 | 1a 0f 4b b0 b3 89 8c 73 6f 1c d6 27 19 18 73 72 | 31 f5 6c a7 f0 f8 1b 36 35 8a f6 30 2e d1 b7 af | a6 2e 5d 9a f5 83 05 7a b2 73 c7 24 06 c8 92 6b | 85 fe 7f 79 f1 ba 3f d3 86 28 f4 16 3a 94 56 af | 55 d5 d6 bc 89 52 4c e8 34 d8 86 d5 fe 13 15 fe | 29 00 00 24 a8 f8 bf 2a 70 d8 0d e9 bf c1 0f 00 | 25 da 1d db 8f ac 61 b5 e1 f0 75 9a 00 6d 79 0f | ff f5 3b 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 ff e8 4e 79 94 20 d9 00 0d 87 37 | ed 16 46 76 d8 43 be 32 00 00 00 1c 00 00 40 05 | 2d 67 24 20 12 0e 18 8c 34 32 0f 7c 4f 51 94 df | fd 23 b8 c6 | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | #45 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 bb a6 38 bf 16 36 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #45 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #45 | rejected packet: | a3 bb a6 38 bf 16 36 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #45: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0694 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350005860 | handling event EVENT_RETRANSMIT for parent state #52 | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #52 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #52 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49605.501965; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50282 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #52 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 "road-eastnet-nonat-52" #52: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #52) | 3f 70 d8 3e f5 22 c6 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 a5 a2 fa 37 05 a0 83 be fb 7c 66 e8 09 2d 85 | 01 d0 84 ba 7e 80 ad 7e ed 7e 94 4b 5a d1 13 c1 | b1 3f 59 cf ac e4 bd 6c 95 59 bf de 9d 80 55 dd | 6c d4 7d e3 9f 38 7c 31 e7 3a f4 3d 5f ba 5a 68 | 83 7f 56 b6 a6 97 f9 9a 87 45 7b ad 59 c8 c8 c2 | 85 24 f6 8d 4c 54 59 44 37 96 77 29 ac 68 3f 6e | df da 66 fc fd e2 52 7f c0 d8 5a 6e 87 c7 d0 ea | dd 74 ac b4 2a 5c 26 2d 8f 9d 33 80 5d 13 86 23 | e5 74 ae 2d f0 58 19 74 bb 0c 9a fe 02 e9 ea 18 | 9b e9 68 5d 7c 72 e9 79 59 15 c2 74 d4 16 6f 97 | c0 92 81 74 a6 70 c8 c9 0a 8b 1e 5b 97 dd a0 5d | 10 4a 89 98 ee 3e 73 f8 ad 8e 0b 84 2b bb 87 07 | d3 19 10 ac f4 31 29 ae a0 fb 57 db 57 8e e8 3d | 7b 1c bf f9 0f c4 88 43 de 6a ac 3c e2 0b 51 3c | 47 b2 1e 04 99 56 29 39 94 ab 53 44 ad 54 e0 54 | 9d 52 e0 9a 6d 24 de d9 e3 52 91 a1 b5 19 19 fc | 29 00 00 24 bc 06 52 3b 0a a9 d6 55 15 a3 be 4e | de 77 6e 83 33 60 ab 6d e9 76 1e 6c cb ab 4d 19 | f5 ca 65 a4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 c4 b5 bf ec 75 31 9e 5d c6 9c 0c | 53 7b fb 92 b5 6c 20 70 00 00 00 1c 00 00 40 05 | 2a 93 28 00 9d ed cf 28 c2 1f ba 32 c1 4a e1 a2 | d1 c6 7c 44 | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350005860 | #52 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f 70 d8 3e f5 22 c6 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #52 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #52 | rejected packet: | 3f 70 d8 3e f5 22 c6 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #52: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-57" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-57' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #57 at 0x557d46a22650 | State DB: adding IKEv2 state #57 in UNDEFINED | pstats #57 ikev2.ike started | Message ID: init #57: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #57: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #57; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-57" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-57" IKE SA #57 "road-eastnet-nonat-57" "road-eastnet-nonat-57" #57: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-57 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-57": constructed local IKE proposals for road-eastnet-nonat-57 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 57 for state #57 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb350005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #57 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 | #57 spent 0.142 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-57" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.225 milliseconds in whack | crypto helper 8 resuming | crypto helper 8 starting work-order 57 for state #57 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 57 | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 57 time elapsed 0.000943 seconds | (#57) spent 0.948 milliseconds in crypto helper computing work-order 57: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 57 for state #57 to event queue | scheduling resume sending helper answer for #57 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #57 | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 57 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #57 | **emit ISAKMP Message: | initiator cookie: | dc 73 20 b1 64 22 3b 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-57 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b1 2f 93 7c 8a da 22 fa 03 a0 fd 43 de d5 8f 84 | ikev2 g^x 5a 41 29 20 95 01 7c 7c 28 a1 27 22 f2 08 de cf | ikev2 g^x e0 98 16 08 1c e5 25 a6 bd bd 17 32 15 8e 0a 84 | ikev2 g^x f3 a2 7e 8a 0b 23 85 bf 7a b1 94 6d 13 0e bc 89 | ikev2 g^x 00 57 96 19 37 39 1b 02 a4 75 0f 94 90 d1 10 4b | ikev2 g^x e3 d2 66 0a 4f b7 c6 79 75 d4 b5 7d e4 36 1f c8 | ikev2 g^x 04 58 22 28 f1 96 40 a5 11 63 03 12 07 da 6e c4 | ikev2 g^x d6 87 58 17 eb bc 28 31 1f 88 9d a5 0c ef e1 d5 | ikev2 g^x b2 c3 d0 ee 08 43 a9 fb b1 8f de 78 3c c7 ae 7f | ikev2 g^x e9 04 ce d2 ab ca 37 0c f1 2a 72 1c 60 e7 51 7f | ikev2 g^x f2 49 54 44 b1 5f 43 7b 10 10 64 5c c3 44 75 d6 | ikev2 g^x 07 11 18 89 6c 1c 54 ef 0a c3 7f 69 cd 21 c7 ca | ikev2 g^x 32 33 4c f8 00 03 d2 d4 0f 41 96 9b 82 7d 76 81 | ikev2 g^x 10 2f 53 dd cd 91 0b 3d ff 38 8f 40 80 5c 77 b7 | ikev2 g^x 3d 66 a7 7b a1 8f 9e 2d 33 51 5c 72 92 e6 a3 7a | ikev2 g^x 40 cc ae 39 5f df 20 2b 13 8b bd 4c 81 23 66 a3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ad 63 ea 8e 7a 7b c2 d1 15 38 47 f0 b3 a0 1a e0 | IKEv2 nonce 85 11 f2 24 75 cc 3c d8 47 12 da f1 4a 24 d2 1d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= dc 73 20 b1 64 22 3b 0f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 39 | natd_hash: port= 01 f4 | natd_hash: hash= 1c 1b 4d 24 72 19 56 63 62 33 64 a7 66 22 df c0 | natd_hash: hash= bd 29 cc 1c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1c 1b 4d 24 72 19 56 63 62 33 64 a7 66 22 df c0 | Notify data bd 29 cc 1c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= dc 73 20 b1 64 22 3b 0f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7a aa 57 0f 26 4b 8b c1 eb 1a a3 08 c1 cf b1 49 | natd_hash: hash= 59 b9 d4 8a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7a aa 57 0f 26 4b 8b c1 eb 1a a3 08 c1 cf b1 49 | Notify data 59 b9 d4 8a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #57 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #57: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #57 to 4294967295 after switching state | Message ID: IKE #57 skipping update_recv as MD is fake | Message ID: sent #57 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-57" #57: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.57:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #57) | dc 73 20 b1 64 22 3b 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 2f 93 7c 8a da 22 fa 03 a0 fd 43 de d5 8f 84 | 5a 41 29 20 95 01 7c 7c 28 a1 27 22 f2 08 de cf | e0 98 16 08 1c e5 25 a6 bd bd 17 32 15 8e 0a 84 | f3 a2 7e 8a 0b 23 85 bf 7a b1 94 6d 13 0e bc 89 | 00 57 96 19 37 39 1b 02 a4 75 0f 94 90 d1 10 4b | e3 d2 66 0a 4f b7 c6 79 75 d4 b5 7d e4 36 1f c8 | 04 58 22 28 f1 96 40 a5 11 63 03 12 07 da 6e c4 | d6 87 58 17 eb bc 28 31 1f 88 9d a5 0c ef e1 d5 | b2 c3 d0 ee 08 43 a9 fb b1 8f de 78 3c c7 ae 7f | e9 04 ce d2 ab ca 37 0c f1 2a 72 1c 60 e7 51 7f | f2 49 54 44 b1 5f 43 7b 10 10 64 5c c3 44 75 d6 | 07 11 18 89 6c 1c 54 ef 0a c3 7f 69 cd 21 c7 ca | 32 33 4c f8 00 03 d2 d4 0f 41 96 9b 82 7d 76 81 | 10 2f 53 dd cd 91 0b 3d ff 38 8f 40 80 5c 77 b7 | 3d 66 a7 7b a1 8f 9e 2d 33 51 5c 72 92 e6 a3 7a | 40 cc ae 39 5f df 20 2b 13 8b bd 4c 81 23 66 a3 | 29 00 00 24 ad 63 ea 8e 7a 7b c2 d1 15 38 47 f0 | b3 a0 1a e0 85 11 f2 24 75 cc 3c d8 47 12 da f1 | 4a 24 d2 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 1b 4d 24 72 19 56 63 62 33 64 a7 | 66 22 df c0 bd 29 cc 1c 00 00 00 1c 00 00 40 05 | 7a aa 57 0f 26 4b 8b c1 eb 1a a3 08 c1 cf b1 49 | 59 b9 d4 8a | state #57 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb350005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #57 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 | #57 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49605.50784 | resume sending helper answer for #57 suppresed complete_v2_state_transition() and stole MD | #57 spent 0.559 milliseconds in resume sending helper answer | stop processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c012840 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 73 20 b1 64 22 3b 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #57 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #57 | rejected packet: | dc 73 20 b1 64 22 3b 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #57: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #32 | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #32 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #32 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49605.547061; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003245 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #32 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 "road-eastnet-nonat-32" #32: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #32) | 91 2f 9d 69 76 5d 8a 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 54 17 4f f3 31 b1 0f c2 14 96 a0 49 f3 c5 20 | 38 78 7d e5 0a d8 95 bc 7a a9 a2 f1 ff ab 0d 66 | a2 fe 53 90 8e fe 51 43 04 57 01 9c e7 22 ca 9e | 98 aa 3b 0d 0d 5f ee 9d 1e 59 e6 04 c4 7f 07 84 | f1 a5 dc 31 6f fa b4 db 4a d9 1c 93 5d b0 7e 5d | 37 79 07 ab 3e 5c a3 de d6 8b a4 ac df 4b a7 7c | af 6f 03 fd 31 bd 7d c1 34 31 76 57 00 e4 23 e1 | 82 cb b8 38 12 59 cd 21 e3 0e 67 54 27 e1 6e 8f | 1e a1 dd 84 f8 ca 82 2a 39 9d 17 56 58 46 a3 3b | 7b 5d 3a 21 a2 b3 03 79 c6 bd 25 cc df a0 12 67 | b3 f4 5a c2 b0 73 2d 33 df 1c dc fa 26 25 56 72 | 59 7b 3c f0 d8 e2 d9 b0 57 2e 4a 8e ec 96 92 09 | 75 70 f6 57 59 ce 54 70 90 14 41 34 b1 57 0f 5d | 19 dd 8a a1 77 43 7e cf 1c ef 3e 0b 72 1e cc f4 | 78 66 2f 15 74 e8 33 6b d3 89 bb a9 fb bc fa 46 | 95 b5 88 f8 a3 91 1f 3a b1 92 bc 1e 84 a5 5b 07 | 29 00 00 24 2d 29 95 26 bc 23 fe d9 76 bb c2 d5 | 43 41 98 03 bf c6 eb 4a b9 6e a6 4e f6 f7 82 f1 | 09 94 9d 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 13 8b 5d 25 b5 3b 06 af a0 3f ac | be 9b 92 09 9d c4 50 7f 00 00 00 1c 00 00 40 05 | ef 32 45 23 d7 6a b0 96 66 7f 58 39 f6 19 a5 1f | 4b 49 56 02 | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | #32 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 2f 9d 69 76 5d 8a 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #32 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #32 | rejected packet: | 91 2f 9d 69 76 5d 8a 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #32: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fd070 | handling event EVENT_RETRANSMIT for parent state #11 | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #11 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #11 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49605.558414; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.017875 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #11 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 "road-eastnet-nonat-11" #11: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #11) | c8 da f8 5c 6a b5 39 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 9a 4c 70 8e 88 d1 64 8d ca 55 b5 43 ac 3e 50 | 7f 03 c2 7c 99 61 59 48 6a 23 b9 2d d3 3a 08 ba | 31 66 90 b0 52 32 93 73 23 bd 35 f2 7d dc a9 8f | 88 4e 43 5d 55 55 8f 7b a2 ea ce 35 e9 07 bb 71 | 1f 5d f0 9c c9 20 a4 7c c9 a5 33 c5 b0 c5 fd 99 | f9 36 f9 d6 da 33 fa e1 2d e1 b8 55 01 35 5b d0 | b9 e1 af af a6 38 ef b1 36 65 8c 44 00 8a 8f f0 | cb 31 ec d5 89 23 22 d8 6f 57 3d 9d af 74 08 ea | 86 b5 7c 8c 76 9b 8d 04 5b 27 f9 7a 8d ed d8 36 | 77 1c 37 9a 9e c6 40 9c bb 1e 24 77 dc 4c b2 dc | 76 0c 2f 2d 23 9c f1 63 a5 64 8f c0 7e 6e 08 97 | 35 1b 8e 35 d5 a9 e6 fc d1 af 35 f0 b0 21 d4 42 | 5d 1b 4e c6 75 04 f0 3a f4 cc 11 09 3f ff 2d c6 | bf fa 44 99 e7 46 de 13 f5 47 98 02 47 dd 33 15 | 52 36 1a 46 d4 d8 ce dd 1a ad eb 4f 6b 1d 9e 82 | 8f b0 52 7f b0 b6 aa 8b 85 c1 d8 ed 73 6b 09 85 | 29 00 00 24 71 b3 70 95 41 f1 8a 3d 3f e8 5d 7c | 6b 52 d9 59 47 90 bd 2c 17 95 9e 28 b0 5d 83 17 | df a2 84 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 c8 ac c9 12 67 90 a0 d8 a9 94 84 | cc d4 e1 68 d0 49 e5 0f 00 00 00 1c 00 00 40 05 | a0 0d 8b f9 78 72 8b b9 69 a6 ab 0f 8f 46 28 db | d3 de 3a b5 | libevent_free: release ptr-libevent@0x7fb35800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fd070 | #11 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 da f8 5c 6a b5 39 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #11 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #11 | rejected packet: | c8 da f8 5c 6a b5 39 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #11: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #53 | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #53 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #53 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49605.575771; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500707 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a03d30 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #53 | libevent_malloc: new ptr-libevent@0x7fb35800cf80 size 128 "road-eastnet-nonat-53" #53: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #53) | 22 bd 87 7d 85 b9 18 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 30 f1 21 57 e7 a6 a0 b1 5a 51 b3 c9 69 4a 15 | 0c ef ee d8 55 97 13 32 e2 cf 8d c8 f3 74 4c 97 | 22 ad ca ab 81 a4 a0 26 9d e6 3b e7 1c 2b d2 a1 | d6 72 47 dd ab 72 ec c1 cc d7 d9 8f d8 66 bc e6 | 53 77 a5 12 d5 84 8f 13 60 d3 99 01 c2 30 50 56 | 18 a7 45 bc dd f7 11 3f 14 e8 e1 27 67 4e d9 50 | bb c0 6c 1a d8 e9 1e 81 c4 fa a9 14 22 9d 32 b4 | e1 11 67 1b f4 56 6f d3 5b 27 83 19 34 08 ee 9b | f3 6b 24 bb c8 a8 09 ee 97 89 49 a0 fb 47 38 93 | ca a8 21 f6 da 4a ff ce b8 5a 83 17 3c fa b5 a4 | 1d 50 f4 b9 26 78 5e a6 78 30 f6 80 a4 cd 3e ae | ea 19 26 25 27 2f a8 b0 bc e9 8e dc 47 51 61 79 | 07 e7 6e 1f 82 d0 fe 19 b0 44 4b f8 92 c9 fb 82 | 83 56 b0 37 a7 92 bf 23 17 cb fb 8b 75 11 c5 e0 | 1d 95 a6 1f 6a 1b 78 a9 5c 16 4e 89 74 ff c7 5a | 43 0f 1f 26 45 20 46 36 e0 37 07 46 11 e2 7c fd | 29 00 00 24 1d d0 6e d2 14 3b 95 3d 7a f3 16 f0 | 13 a4 5c 97 24 08 af 2b 29 b2 1a e1 3b dc 59 4d | 62 47 73 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 de d2 d7 2b e1 3c 0c 4b a2 6a 97 | 5e 9e de 30 79 3d d7 e0 00 00 00 1c 00 00 40 05 | de 44 b7 78 c2 27 43 2d 86 e9 13 34 57 72 8f 74 | 48 51 21 6e | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #53 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 22 bd 87 7d 85 b9 18 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #53 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #53 | rejected packet: | 22 bd 87 7d 85 b9 18 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #53: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-58" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-58' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #58 at 0x557d46a23c10 | State DB: adding IKEv2 state #58 in UNDEFINED | pstats #58 ikev2.ike started | Message ID: init #58: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #58: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #58; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-58" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-58" IKE SA #58 "road-eastnet-nonat-58" "road-eastnet-nonat-58" #58: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-58 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-58": constructed local IKE proposals for road-eastnet-nonat-58 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 58 for state #58 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #58 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #58 spent 0.151 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-58" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.244 milliseconds in whack | crypto helper 12 resuming | crypto helper 12 starting work-order 58 for state #58 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 58 | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 58 time elapsed 0.002125 seconds | (#58) spent 1.96 milliseconds in crypto helper computing work-order 58: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 58 for state #58 to event queue | scheduling resume sending helper answer for #58 | libevent_malloc: new ptr-libevent@0x7fb340012840 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #58 | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 58 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #58 | **emit ISAKMP Message: | initiator cookie: | 0b a9 81 95 1f 0d 8e 78 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-58 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8f b0 e3 df ce d1 d0 b9 30 6e 16 b3 e7 cf 92 e5 | ikev2 g^x a6 70 0e 23 5e 02 05 19 f5 b5 1a 04 6c 5e 7d a2 | ikev2 g^x 79 25 aa 0e 70 2a 25 1f 1c 02 b5 fc b9 3e 75 ad | ikev2 g^x e7 1e f1 8c 9c 7f 92 92 1d dc b1 ca 6d cf 53 ac | ikev2 g^x b8 0b 70 9b 2c 6a e7 8d 07 95 ae e1 37 ab ac 14 | ikev2 g^x 91 d8 79 4c ef 08 d0 d9 b0 55 82 09 5f 15 d9 df | ikev2 g^x e8 2c 4e cb ea a0 59 1c 81 c7 f6 39 0a 52 62 8e | ikev2 g^x 4b 57 28 22 1f d7 52 eb ec 16 d8 46 16 0a 27 88 | ikev2 g^x c7 c5 f7 e2 87 71 a1 2d 5e 9c 25 83 70 f1 a8 0c | ikev2 g^x df 63 58 3a 6f ba 9a fc 71 ac 13 82 0c ff 96 f7 | ikev2 g^x b2 3e 0f af a2 df f1 69 8f db ce 47 13 89 8f fd | ikev2 g^x ce 0a 15 3f 64 ea 8f f4 c7 b7 5e 3b b0 17 0a 90 | ikev2 g^x ef 23 ff a9 81 27 7d 7c ee 7a 36 7f 56 c1 b8 52 | ikev2 g^x 77 69 e0 69 4b 05 7c e7 a7 d2 48 f2 eb ac 08 c4 | ikev2 g^x 5f 9f b5 9e fc d5 98 d0 41 7f 9b ec 07 64 d8 f7 | ikev2 g^x 80 37 a2 97 6c ab e1 aa b4 48 78 11 a3 f3 d8 0a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce dd 82 37 0e 6e 7f fd 43 0e f6 0a 6a 68 bc 25 88 | IKEv2 nonce 0a 9e 3e 74 64 09 ae e7 87 f2 db fe 06 d2 df 03 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0b a9 81 95 1f 0d 8e 78 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3a | natd_hash: port= 01 f4 | natd_hash: hash= 02 02 ef 4d 47 45 3b d6 d5 d7 fa ad b5 dd 5d f9 | natd_hash: hash= 98 95 75 30 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 02 02 ef 4d 47 45 3b d6 d5 d7 fa ad b5 dd 5d f9 | Notify data 98 95 75 30 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0b a9 81 95 1f 0d 8e 78 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 0c 06 c0 09 b1 a9 53 e2 00 18 ae 12 95 c7 71 d4 | natd_hash: hash= 78 09 4b e3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0c 06 c0 09 b1 a9 53 e2 00 18 ae 12 95 c7 71 d4 | Notify data 78 09 4b e3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #58 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #58: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #58 to 4294967295 after switching state | Message ID: IKE #58 skipping update_recv as MD is fake | Message ID: sent #58 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-58" #58: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.58:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #58) | 0b a9 81 95 1f 0d 8e 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f b0 e3 df ce d1 d0 b9 30 6e 16 b3 e7 cf 92 e5 | a6 70 0e 23 5e 02 05 19 f5 b5 1a 04 6c 5e 7d a2 | 79 25 aa 0e 70 2a 25 1f 1c 02 b5 fc b9 3e 75 ad | e7 1e f1 8c 9c 7f 92 92 1d dc b1 ca 6d cf 53 ac | b8 0b 70 9b 2c 6a e7 8d 07 95 ae e1 37 ab ac 14 | 91 d8 79 4c ef 08 d0 d9 b0 55 82 09 5f 15 d9 df | e8 2c 4e cb ea a0 59 1c 81 c7 f6 39 0a 52 62 8e | 4b 57 28 22 1f d7 52 eb ec 16 d8 46 16 0a 27 88 | c7 c5 f7 e2 87 71 a1 2d 5e 9c 25 83 70 f1 a8 0c | df 63 58 3a 6f ba 9a fc 71 ac 13 82 0c ff 96 f7 | b2 3e 0f af a2 df f1 69 8f db ce 47 13 89 8f fd | ce 0a 15 3f 64 ea 8f f4 c7 b7 5e 3b b0 17 0a 90 | ef 23 ff a9 81 27 7d 7c ee 7a 36 7f 56 c1 b8 52 | 77 69 e0 69 4b 05 7c e7 a7 d2 48 f2 eb ac 08 c4 | 5f 9f b5 9e fc d5 98 d0 41 7f 9b ec 07 64 d8 f7 | 80 37 a2 97 6c ab e1 aa b4 48 78 11 a3 f3 d8 0a | 29 00 00 24 dd 82 37 0e 6e 7f fd 43 0e f6 0a 6a | 68 bc 25 88 0a 9e 3e 74 64 09 ae e7 87 f2 db fe | 06 d2 df 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 02 ef 4d 47 45 3b d6 d5 d7 fa ad | b5 dd 5d f9 98 95 75 30 00 00 00 1c 00 00 40 05 | 0c 06 c0 09 b1 a9 53 e2 00 18 ae 12 95 c7 71 d4 | 78 09 4b e3 | state #58 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #58 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #58 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49605.591062 | resume sending helper answer for #58 suppresed complete_v2_state_transition() and stole MD | #58 spent 0.524 milliseconds in resume sending helper answer | stop processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb340012840 | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #46 | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #46 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #46 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49605.591118; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003302 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #46 | libevent_malloc: new ptr-libevent@0x7fb340012840 size 128 "road-eastnet-nonat-46" #46: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #46) | b8 02 bd ab b2 01 5a b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 02 34 ab 29 73 17 93 9c d3 ac d4 2d a7 40 8f | 6c ab ce c1 cf 26 d8 e1 c0 a5 2f a8 7c e6 62 97 | 14 ae ce 27 9d 48 da 55 bb 1a 50 83 cd 98 7c 7e | 93 0d ef 6b a4 36 24 54 0e e8 77 76 0a 46 5c 28 | c7 d2 ff f1 d4 08 43 1a 21 66 26 cc ac 89 a4 fa | 9e 6f e1 5a 6f bb 4b ea 22 4d 9a 3d 2a 1c 97 d5 | e7 d2 d1 ac 8d d0 32 2d 42 98 eb fc 7f 55 28 65 | e5 b7 88 e1 ec b5 ba 0a 74 06 aa 48 51 b1 11 3b | 2f 1d 4c c7 49 ef 3c d0 65 a2 df 8e 59 96 65 b4 | 5b 67 18 f6 c6 dd c1 ba 8c 98 60 72 7f 9b 34 f1 | f4 df 07 a6 02 25 08 e0 ca 45 1c 4e 5a 84 92 f8 | 41 4b e2 11 63 dd 97 cd e2 1c a6 92 32 6d 9f 66 | 47 ba 05 95 3f 93 67 80 97 77 56 16 84 bf 6b d6 | e6 b0 76 58 be 43 b2 86 c2 1e 75 44 04 7d 93 a8 | 8c b0 a8 b8 83 ce 3c 1a d2 a1 85 f4 c7 9a 35 d1 | a2 ff 32 1f de 4b 99 be 80 8a 49 9b 41 45 2e a7 | 29 00 00 24 59 91 d6 77 3b 12 ba 32 8c e3 4b 3b | 93 6d 1e 3b 04 96 db ec 7e 0e 16 50 f1 18 04 aa | e6 1e e5 ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c a5 da 82 02 27 22 be 3c d8 f4 7e | 26 be f7 a0 40 5a a0 f6 00 00 00 1c 00 00 40 05 | 90 e6 40 68 17 4b f9 af 42 5a 03 6b 4d 68 d7 fb | 1b b9 9d a8 | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | #46 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b a9 81 95 1f 0d 8e 78 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #58 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #58 | rejected packet: | 0b a9 81 95 1f 0d 8e 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #58: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 02 bd ab b2 01 5a b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #46 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #46 | rejected packet: | b8 02 bd ab b2 01 5a b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #46: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0585 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f7760 | handling event EVENT_RETRANSMIT for parent state #33 | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #33 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #33 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49605.613484; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002043 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #33 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 "road-eastnet-nonat-33" #33: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #33) | c7 46 be 2e 5d 25 78 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 fb 56 35 bc 7c 07 73 43 c0 53 96 f8 9b 69 93 | 49 fe be 57 af 79 18 68 5a 92 2b 2b a6 ed e4 23 | 35 6b 49 80 b0 8c 38 3d c5 a9 f4 61 c1 8b 08 4d | 96 53 f0 d9 1b 6c 56 bc 0d ea 97 5b b0 d7 0d 16 | 49 88 40 6d 71 9e 2d 30 fe 42 42 37 20 10 14 5c | 75 38 c4 da 71 b3 b1 3b a6 23 58 dc a3 9a e0 40 | ae dc 8e cf de 76 e6 55 4e 33 19 fe 18 08 f5 70 | 8e 50 6f 64 32 2f d6 7a 45 39 d0 ba 32 a4 1e ab | 2d 4d 83 e7 1f d4 28 47 30 da f7 2e a0 79 9c 09 | 2b 6b 46 2e c8 c1 e5 37 84 54 0b 0c 97 40 ae db | 52 08 f5 e5 d5 a9 49 2a c9 b8 1f f6 14 c7 78 d5 | 70 93 cb 5e 8c 96 b6 ac 74 c2 85 cf 89 ad 75 5d | fe 0b 68 86 21 96 4e 79 63 5a 81 98 b3 45 c5 f0 | b2 fd 49 e2 ff b2 a3 2c 96 3c ba 10 d8 3f 86 56 | e0 c6 d2 d5 d7 7d 5f 52 2a 95 0f 65 04 12 82 60 | e3 5b 42 b7 a8 9e 92 b0 fa 34 79 45 e1 34 ab c5 | 29 00 00 24 b8 c6 4b 62 72 20 c9 09 07 72 44 d0 | 79 00 e2 dc 8f 6b 83 e9 3d 67 2f d3 a6 5d 27 77 | 58 61 12 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 b6 d4 e5 76 6f b7 90 e8 c3 ad b3 | 49 49 44 7a b5 13 9b a6 00 00 00 1c 00 00 40 05 | 15 0a 54 d9 c3 ee ba ab b9 96 60 bb a3 40 4e fb | d5 1b 34 be | libevent_free: release ptr-libevent@0x7fb37000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f7760 | #33 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 46 be 2e 5d 25 78 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #33 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #33 | rejected packet: | c7 46 be 2e 5d 25 78 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #33: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0696 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-59" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-59' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #59 at 0x557d46a251d0 | State DB: adding IKEv2 state #59 in UNDEFINED | pstats #59 ikev2.ike started | Message ID: init #59: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #59: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #59; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-59" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-59" IKE SA #59 "road-eastnet-nonat-59" "road-eastnet-nonat-59" #59: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-59 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-59": constructed local IKE proposals for road-eastnet-nonat-59 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 59 for state #59 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469f8d60 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #59 | libevent_malloc: new ptr-libevent@0x7fb37000cf80 size 128 | #59 spent 0.14 milliseconds in ikev2_parent_outI1() | crypto helper 5 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 starting work-order 59 for state #59 | RESET processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 59 | RESET processing: connection "road-eastnet-nonat-59" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.233 milliseconds in whack | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 59 time elapsed 0.000942 seconds | (#59) spent 0.947 milliseconds in crypto helper computing work-order 59: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 59 for state #59 to event queue | scheduling resume sending helper answer for #59 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 | libevent_realloc: release ptr-libevent@0x557d469fb930 | libevent_realloc: new ptr-libevent@0x557d46a27340 size 1024 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #59 | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 59 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #59 | **emit ISAKMP Message: | initiator cookie: | 97 6c 3a 75 a9 04 c6 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-59 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c2 c8 5b 92 1f 75 89 eb 0e 2e 34 19 de c9 7d 34 | ikev2 g^x 18 5b 4b 86 10 db bf e2 6c 1e 94 2d 7a 7d c9 7a | ikev2 g^x a0 2b b5 06 7b 90 f1 d3 cd af 0e 61 7b ec c3 64 | ikev2 g^x de a5 53 e3 bf 5e 51 d1 84 95 1f 6e cb 81 61 93 | ikev2 g^x ad 42 3a 9f 1e 3a 65 25 36 02 e8 9c 31 54 18 98 | ikev2 g^x 6f 55 90 5b bf 33 e8 09 e2 db 7f a5 0d 28 2f b0 | ikev2 g^x 76 e2 e4 a4 df b5 68 69 d1 19 fe bd 73 f2 f2 54 | ikev2 g^x 46 48 bd 1c fd b1 5e e2 cc c0 6c c9 e5 04 1c 0c | ikev2 g^x 40 92 81 c8 73 67 1a af d8 5e 9b 4f 61 bb 61 8c | ikev2 g^x a9 de 42 09 33 14 9f 91 4f 50 01 94 4d 87 81 f8 | ikev2 g^x a7 b9 37 9b 88 d2 60 21 55 19 56 c4 fc 7d e4 11 | ikev2 g^x 28 74 cf ae 93 f1 51 10 2e 23 31 34 07 b8 e7 37 | ikev2 g^x a3 5e 4c 95 61 50 f9 d4 96 86 63 2e 49 88 c6 44 | ikev2 g^x 13 5e 5b c4 2d 0c 65 06 af 27 76 b6 3c bb 87 1b | ikev2 g^x d8 ae 43 ad 30 39 b0 94 f9 53 b3 ee d3 35 1d 60 | ikev2 g^x 44 54 ef 8a f8 7d 13 88 d2 f8 8c df 8f 77 8c e4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b8 98 0c 82 63 7c e1 4a 6e 4e 96 76 c9 de 50 23 | IKEv2 nonce 14 2c 80 d9 d0 99 72 c2 8b e9 f8 32 80 1a 11 89 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 97 6c 3a 75 a9 04 c6 2b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3b | natd_hash: port= 01 f4 | natd_hash: hash= ff 09 60 c9 a8 1a 7b a4 38 cc f7 74 87 5e fa dc | natd_hash: hash= 42 53 d3 c5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ff 09 60 c9 a8 1a 7b a4 38 cc f7 74 87 5e fa dc | Notify data 42 53 d3 c5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 97 6c 3a 75 a9 04 c6 2b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a9 7a 6a af 06 6a 57 69 21 03 39 50 4a 98 de 11 | natd_hash: hash= 5d 3e 78 2b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a9 7a 6a af 06 6a 57 69 21 03 39 50 4a 98 de 11 | Notify data 5d 3e 78 2b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #59 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #59: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #59 to 4294967295 after switching state | Message ID: IKE #59 skipping update_recv as MD is fake | Message ID: sent #59 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-59" #59: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.59:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #59) | 97 6c 3a 75 a9 04 c6 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 c8 5b 92 1f 75 89 eb 0e 2e 34 19 de c9 7d 34 | 18 5b 4b 86 10 db bf e2 6c 1e 94 2d 7a 7d c9 7a | a0 2b b5 06 7b 90 f1 d3 cd af 0e 61 7b ec c3 64 | de a5 53 e3 bf 5e 51 d1 84 95 1f 6e cb 81 61 93 | ad 42 3a 9f 1e 3a 65 25 36 02 e8 9c 31 54 18 98 | 6f 55 90 5b bf 33 e8 09 e2 db 7f a5 0d 28 2f b0 | 76 e2 e4 a4 df b5 68 69 d1 19 fe bd 73 f2 f2 54 | 46 48 bd 1c fd b1 5e e2 cc c0 6c c9 e5 04 1c 0c | 40 92 81 c8 73 67 1a af d8 5e 9b 4f 61 bb 61 8c | a9 de 42 09 33 14 9f 91 4f 50 01 94 4d 87 81 f8 | a7 b9 37 9b 88 d2 60 21 55 19 56 c4 fc 7d e4 11 | 28 74 cf ae 93 f1 51 10 2e 23 31 34 07 b8 e7 37 | a3 5e 4c 95 61 50 f9 d4 96 86 63 2e 49 88 c6 44 | 13 5e 5b c4 2d 0c 65 06 af 27 76 b6 3c bb 87 1b | d8 ae 43 ad 30 39 b0 94 f9 53 b3 ee d3 35 1d 60 | 44 54 ef 8a f8 7d 13 88 d2 f8 8c df 8f 77 8c e4 | 29 00 00 24 b8 98 0c 82 63 7c e1 4a 6e 4e 96 76 | c9 de 50 23 14 2c 80 d9 d0 99 72 c2 8b e9 f8 32 | 80 1a 11 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 09 60 c9 a8 1a 7b a4 38 cc f7 74 | 87 5e fa dc 42 53 d3 c5 00 00 00 1c 00 00 40 05 | a9 7a 6a af 06 6a 57 69 21 03 39 50 4a 98 de 11 | 5d 3e 78 2b | state #59 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37000cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469f8d60 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fbb00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #59 | libevent_malloc: new ptr-libevent@0x7fb37000cf80 size 128 | #59 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49605.653471 | resume sending helper answer for #59 suppresed complete_v2_state_transition() and stole MD | #59 spent 0.479 milliseconds in resume sending helper answer | stop processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb344012840 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 6c 3a 75 a9 04 c6 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #59 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #59 | rejected packet: | 97 6c 3a 75 a9 04 c6 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #59: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0578 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #54 | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #54 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #54 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49605.654658; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500526 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #54 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-54" #54: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #54) | 4e 45 bc 88 5c 41 98 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 f4 91 14 5c ab 2e e9 80 6d af 62 f3 7d f3 c8 | 41 66 e7 43 38 9a c7 1b 1e f8 8c 7d f7 db 12 65 | 59 fd 3d ea 2d 58 b5 eb bc 29 cf 89 c5 08 e0 32 | af 71 20 82 0f be ca 31 6c 17 02 ca 88 1d 08 2b | 41 de be 4f db b6 e0 c9 ce b8 f5 78 72 16 5b d3 | af b2 62 71 28 3f 0e a5 9b 79 4c c6 6b 64 ea 6c | 30 86 90 45 62 e9 86 e5 b2 f0 de b0 25 c7 2c 5e | 72 55 be b3 8f b3 05 2b 3b 6d 68 2a 44 c2 cc ec | 6b 1d 92 df 89 1a 9d f7 c1 18 8f 4d 34 ce b2 72 | dc 24 61 bd 37 65 28 f1 26 42 c6 a1 48 90 50 40 | 60 3f 78 ce 04 9c 3d ba 18 4e dd 4c d6 82 6e 51 | 67 48 49 62 37 f2 ed 52 4d b8 26 ec b0 85 3e 94 | ba a6 36 bb c9 80 6e e3 33 72 02 87 28 51 f7 0e | b2 b1 8f 9a df 7c ac 13 32 02 9e b4 45 75 85 e3 | 86 3b 1f 81 8b 2b 4d 2b b9 af 80 14 c8 c0 37 3b | 75 10 32 13 c6 74 a7 41 62 92 b3 87 9f e2 ed 2a | 29 00 00 24 f9 a0 5c 35 4a 9e bd 0e 0d 94 7a f9 | 8f b8 01 dd 15 88 70 42 78 10 83 16 a2 ba 62 6b | bf 0e 5b 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b f1 3a 2c 8b e8 c9 68 86 e1 0f be | 41 4d 1c 16 cf d5 b6 01 00 00 00 1c 00 00 40 05 | 84 fa 3c 0d 93 21 b5 34 8e ca ca 4a 93 ec 16 d0 | 28 a4 5e 28 | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #54 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e 45 bc 88 5c 41 98 f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #54 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #54 | rejected packet: | 4e 45 bc 88 5c 41 98 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #54: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35000d120 | handling event EVENT_RETRANSMIT for parent state #47 | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #47 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #47 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49605.655919; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001984 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #47 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 "road-eastnet-nonat-47" #47: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #47) | d1 80 96 dc 70 12 fd 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 89 48 be 2f 23 20 1a aa c0 f9 41 f1 9f b5 dc | 61 3b 4e 1d f2 94 aa 61 39 fa ff 9e ad da aa 8b | 79 a4 b0 75 86 17 be 8d f9 64 cd 5f 2c a3 74 02 | 5c d2 0b c0 e1 bc 40 a4 41 01 24 b6 16 65 80 b1 | 8d 5b f4 3e d9 78 1c 78 5b d0 4f 36 20 49 cf f5 | e6 39 8f 45 c4 05 3e 9a 58 8d 26 dc 13 63 31 38 | f0 e2 e6 6e a9 06 79 15 81 1d f5 b1 3e c3 40 32 | 5c c3 ef 40 73 34 78 3f 9f 9d fe 1e 7a 64 15 bd | f5 c1 66 e8 e7 57 72 db 6e e7 07 6d fc c3 84 15 | a7 9e a5 ae 49 06 60 b0 66 25 b2 60 5b c9 52 7b | 84 da 9e 07 cb 22 63 3f f7 e3 75 51 cd b7 f5 a9 | 00 8e ee 37 13 40 c4 a0 04 91 8b 4e b2 90 26 27 | 78 4c 50 15 9b df e6 81 a0 a4 86 f0 9c 4a d6 4e | 71 20 bc ef 14 af bb ba f8 7a 84 f5 e8 b4 d8 08 | bb e0 cf f0 c2 7a 1a fb 6d c0 80 83 cb fe 9c fe | 4d f9 6c 4a 79 4d c9 ec 6b b4 1f c4 42 35 86 05 | 29 00 00 24 45 2a 73 9c 59 88 24 30 1b 4c d7 76 | 91 c3 f5 9d 27 d4 d8 42 63 2d 46 4d bb 79 5b 50 | bd 3d d6 ba 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 44 84 40 30 da 67 e5 a7 75 a7 f1 | b3 01 a1 ea ef 36 29 e3 00 00 00 1c 00 00 40 05 | 02 24 d1 73 8e ed 3e 54 49 25 16 88 bd 9a 48 c6 | 35 3e 63 7f | libevent_free: release ptr-libevent@0x7fb350012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35000d120 | #47 spent 0.0951 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d1 80 96 dc 70 12 fd 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #47 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #47 | rejected packet: | d1 80 96 dc 70 12 fd 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #47: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0458 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #12 | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #12 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #12 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49605.663218; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.010015 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35000d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #12 | libevent_malloc: new ptr-libevent@0x7fb350012840 size 128 "road-eastnet-nonat-12" #12: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #12) | e6 90 0f 5b 12 9e fb 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 8d ca d0 bf fc d0 53 2f c8 94 c7 75 f0 b7 3b | 06 8d af 15 08 3d 4d 43 8a f2 0e 43 03 74 47 ab | c5 f6 5e c6 9d af 64 6c 5f 50 aa bb 63 91 17 7c | de 19 d6 a8 3d b9 0e 6f 98 77 91 78 cd c6 0f f1 | 83 bd 49 b7 4d 19 90 e6 2f f7 8d c2 99 5e 0c 41 | a4 92 59 8c f3 bc 56 51 55 c4 fc 8d 06 b4 b2 46 | fe 62 b5 0f 4e f1 c7 d9 31 4c e1 f7 06 2d 45 f5 | a0 d5 f5 94 55 0e 2f 00 35 d8 fb d6 3c 6a b6 b5 | 4d 93 6e 6b 9b 52 5b 1c 59 3e d0 a9 2b 70 a2 ec | b5 2f 18 f2 51 cd 4a e5 eb b3 21 70 eb 17 7e fb | 54 5e a1 de 02 46 1e 7f ed c7 44 7e dc 6d 9e 84 | 08 46 48 8f 2c 45 f3 c2 00 ca b5 46 fd 56 d4 bf | b0 41 68 33 e0 2a 67 86 f6 4d 18 8b 90 8d 3e 6b | c2 91 48 4f de cb 41 cd 2e 17 3b f1 b9 af ca 73 | 4b 2f d1 11 2b 7a 96 60 de b9 66 93 28 70 95 94 | 75 11 24 ea 0b a4 9a 4f 1b d9 88 31 b6 8a fe 22 | 29 00 00 24 52 e1 94 79 21 2a ea cc 69 4a af 5a | 5d ef 62 83 14 35 3b dc 33 a8 4c d8 5d ab 20 41 | 8b a5 be 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 aa 63 73 f1 76 ab f8 1b 79 46 f7 | 09 75 6d 3c 97 fc 7d df 00 00 00 1c 00 00 40 05 | db 6d 58 42 c9 d1 b0 49 17 a0 1e 30 4f f9 7e 58 | 72 29 56 37 | libevent_free: release ptr-libevent@0x7fb348009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #12 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 90 0f 5b 12 9e fb 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #12 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #12 | rejected packet: | e6 90 0f 5b 12 9e fb 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #12: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.038 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ddbf0 | handling event EVENT_RETRANSMIT for parent state #34 | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #34 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #34 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49605.679517; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.005258 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #34 | libevent_malloc: new ptr-libevent@0x7fb348009640 size 128 "road-eastnet-nonat-34" #34: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #34) | 6d a4 8e 40 25 ac 37 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 f2 a8 cc bb ec 52 8f ff d3 4f 1e 29 f8 d2 55 | ab 15 48 e3 86 d2 3c 7c c1 31 02 4c e6 92 88 7e | 1c 57 68 2c 31 6d 99 d6 04 b4 80 d9 9e 5d d6 2f | 5a 7c 33 74 f6 a2 f4 af 71 14 01 00 45 ac 02 2c | ae fd dc f0 fb 16 b1 b8 bb b1 c9 b6 79 4a 45 9c | f4 6e 30 a0 38 dd b1 84 0e 3d b2 47 58 b0 ed c1 | 2c 5c e6 69 11 9f 94 94 7a 6d 4e 80 2c 22 d1 2d | b1 3c 47 06 4d 81 ee b9 c9 ba 0f 94 7b ed d2 71 | 8c 4b 77 a2 43 7f 68 8c 2b 66 69 53 94 cf 5a 27 | 05 7e 88 ec 42 d8 31 27 ae 04 92 bf 4a 26 5e 51 | 58 d6 5c 7a 0b 0b 73 c1 d6 39 9b da c3 56 61 4e | 3f 7e 4e 21 30 a1 53 bd c0 b7 f9 c7 e1 cc 61 3a | e9 b4 0e 5d 6b 1a 6c d3 c1 42 80 a0 b9 ee e4 20 | 50 5f 0b 18 55 d4 17 9c be 51 af c3 be 4e 5f 48 | b1 02 bd 4d 0a 84 45 32 17 0f c9 bf 50 68 f3 a6 | 11 69 ef 13 ba a2 fb dd c4 95 c8 b3 71 8c 02 9e | 29 00 00 24 20 3c 42 13 ea f1 47 8b ab 88 6c 38 | 29 a2 e3 60 5f 2e e8 36 7d 92 76 6d 48 1c fe a8 | 8c f2 3e 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 92 97 87 98 41 7a 2f 24 03 5c de | 5f 9b fc ff 10 46 f5 79 00 00 00 1c 00 00 40 05 | 10 63 6f 88 71 aa 1b 8a ba b8 d4 ac c9 e8 55 07 | 6b c5 63 c0 | libevent_free: release ptr-libevent@0x7fb374014820 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ddbf0 | #34 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d a4 8e 40 25 ac 37 c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #34 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #34 | rejected packet: | 6d a4 8e 40 25 ac 37 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #34: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-60" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-60' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #60 at 0x557d46a26790 | State DB: adding IKEv2 state #60 in UNDEFINED | pstats #60 ikev2.ike started | Message ID: init #60: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #60: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #60; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-60" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-60" IKE SA #60 "road-eastnet-nonat-60" "road-eastnet-nonat-60" #60: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-60 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-60": constructed local IKE proposals for road-eastnet-nonat-60 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 60 for state #60 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469f4be0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #60 | libevent_malloc: new ptr-libevent@0x7fb374014820 size 128 | crypto helper 3 resuming | #60 spent 0.153 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 starting work-order 60 for state #60 | RESET processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 60 | RESET processing: connection "road-eastnet-nonat-60" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.25 milliseconds in whack | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 60 time elapsed 0.001015 seconds | (#60) spent 1.01 milliseconds in crypto helper computing work-order 60: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 60 for state #60 to event queue | scheduling resume sending helper answer for #60 | libevent_malloc: new ptr-libevent@0x7fb338012840 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #60 | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 60 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #60 | **emit ISAKMP Message: | initiator cookie: | 25 9c c0 c5 c2 ae 29 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-60 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 86 2c 75 39 d4 fe e8 bb 01 36 72 a5 b5 e5 a5 81 | ikev2 g^x c7 38 4b e5 4a ae c6 e0 64 23 ae a4 00 42 bd c1 | ikev2 g^x 2e 59 84 56 2c d7 14 24 66 d8 ee 01 96 14 85 e4 | ikev2 g^x 4a 5d 41 c9 bd f2 52 f7 81 ad 7f d6 d0 a1 27 d2 | ikev2 g^x 97 41 8d b3 c0 bc 77 ec 23 18 fe 60 e2 a8 0c 93 | ikev2 g^x 13 c8 08 44 38 cf 40 53 40 99 23 6d f6 02 db 2a | ikev2 g^x 6e 32 b0 2c 67 33 6c a2 f1 af da 97 e3 24 99 d0 | ikev2 g^x 08 b1 cf 27 91 4b c8 a0 67 76 74 84 3e e8 94 b8 | ikev2 g^x 9c 46 bf ee d2 a1 d1 93 0c c9 20 9b fb 9c cc 69 | ikev2 g^x d2 c3 9f 9f 32 ce e3 cd 1e a4 06 0c ce ad 3b b5 | ikev2 g^x 3d 52 01 2e 64 72 a4 a5 0d 13 96 53 80 55 c3 af | ikev2 g^x c7 4a a9 17 ce 71 79 67 8d 48 4c a9 b8 00 02 38 | ikev2 g^x 2d 7c a0 0b 36 f5 68 34 0f dd 83 6f 1d d1 e9 b9 | ikev2 g^x 9a 43 52 12 d9 b1 6e ac 6a 5e ac d3 3c 20 66 93 | ikev2 g^x 6b 7e 85 4c aa e5 92 08 98 a1 8b 28 75 13 39 85 | ikev2 g^x b8 6c 05 ff ad 0d f2 e7 73 79 5c 18 65 6b dd 7e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a0 1d b4 bd 19 70 24 f8 23 e6 87 dc 50 af bd f2 | IKEv2 nonce 95 21 f1 1c 7f 4c 51 8f f3 4c 1a 81 a9 6f fb c9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 25 9c c0 c5 c2 ae 29 fb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3c | natd_hash: port= 01 f4 | natd_hash: hash= d6 a7 42 56 6b af 55 7e 9e 1f c2 40 ba 0d 74 ad | natd_hash: hash= 6e b0 b4 2e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d6 a7 42 56 6b af 55 7e 9e 1f c2 40 ba 0d 74 ad | Notify data 6e b0 b4 2e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 25 9c c0 c5 c2 ae 29 fb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 49 f8 c3 9d b1 df 49 97 21 c8 2e 46 27 7c d9 25 | natd_hash: hash= e7 f0 a2 de | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 49 f8 c3 9d b1 df 49 97 21 c8 2e 46 27 7c d9 25 | Notify data e7 f0 a2 de | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #60 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #60: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #60 to 4294967295 after switching state | Message ID: IKE #60 skipping update_recv as MD is fake | Message ID: sent #60 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-60" #60: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.60:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #60) | 25 9c c0 c5 c2 ae 29 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 2c 75 39 d4 fe e8 bb 01 36 72 a5 b5 e5 a5 81 | c7 38 4b e5 4a ae c6 e0 64 23 ae a4 00 42 bd c1 | 2e 59 84 56 2c d7 14 24 66 d8 ee 01 96 14 85 e4 | 4a 5d 41 c9 bd f2 52 f7 81 ad 7f d6 d0 a1 27 d2 | 97 41 8d b3 c0 bc 77 ec 23 18 fe 60 e2 a8 0c 93 | 13 c8 08 44 38 cf 40 53 40 99 23 6d f6 02 db 2a | 6e 32 b0 2c 67 33 6c a2 f1 af da 97 e3 24 99 d0 | 08 b1 cf 27 91 4b c8 a0 67 76 74 84 3e e8 94 b8 | 9c 46 bf ee d2 a1 d1 93 0c c9 20 9b fb 9c cc 69 | d2 c3 9f 9f 32 ce e3 cd 1e a4 06 0c ce ad 3b b5 | 3d 52 01 2e 64 72 a4 a5 0d 13 96 53 80 55 c3 af | c7 4a a9 17 ce 71 79 67 8d 48 4c a9 b8 00 02 38 | 2d 7c a0 0b 36 f5 68 34 0f dd 83 6f 1d d1 e9 b9 | 9a 43 52 12 d9 b1 6e ac 6a 5e ac d3 3c 20 66 93 | 6b 7e 85 4c aa e5 92 08 98 a1 8b 28 75 13 39 85 | b8 6c 05 ff ad 0d f2 e7 73 79 5c 18 65 6b dd 7e | 29 00 00 24 a0 1d b4 bd 19 70 24 f8 23 e6 87 dc | 50 af bd f2 95 21 f1 1c 7f 4c 51 8f f3 4c 1a 81 | a9 6f fb c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d6 a7 42 56 6b af 55 7e 9e 1f c2 40 | ba 0d 74 ad 6e b0 b4 2e 00 00 00 1c 00 00 40 05 | 49 f8 c3 9d b1 df 49 97 21 c8 2e 46 27 7c d9 25 | e7 f0 a2 de | state #60 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374014820 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469f4be0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ec960 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #60 | libevent_malloc: new ptr-libevent@0x7fb374014820 size 128 | #60 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49605.716039 | resume sending helper answer for #60 suppresed complete_v2_state_transition() and stole MD | #60 spent 0.514 milliseconds in resume sending helper answer | stop processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb338012840 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 9c c0 c5 c2 ae 29 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #60 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #60 | rejected packet: | 25 9c c0 c5 c2 ae 29 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #60: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0758 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #48 | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #48 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #48 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49605.724263; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.0015 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #48 | libevent_malloc: new ptr-libevent@0x7fb338012840 size 128 "road-eastnet-nonat-48" #48: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #48) | 92 07 42 48 2a e6 dd 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 27 70 ee fe 7b a5 6b c0 91 72 76 bf b9 26 41 | 8a c5 01 3c cd 8b 21 f3 23 df 5c 81 f1 ed a2 12 | a1 c4 5e 2f a7 b1 21 02 24 b9 30 c4 f5 c4 2d c4 | 90 7e 3e f0 c9 0b f2 18 3c 2b b9 91 3a da c1 6c | 57 28 75 1b 3a 0e e8 9b fc 4b ee 5c 39 98 fa 15 | be 81 4e e4 0c 6c a4 75 1b 83 45 74 98 dd 81 5b | 06 80 95 32 c0 f4 a2 4b 9d f4 17 33 73 16 94 48 | 16 60 93 ae 3d ce 3e d6 a3 61 16 51 cb 19 ec 02 | 00 f8 5a 99 f9 c4 14 2b 6a 99 61 a3 6a e4 c5 97 | ad 75 bb 6b 78 38 5a b9 44 bc 5c a3 2d 23 20 4c | 99 1b 88 95 1f b4 34 15 92 91 16 2b 1d 90 a8 32 | bd a4 79 83 a7 b0 92 15 f0 e3 c2 79 58 67 56 eb | 4d 0c 97 c3 3f ae 15 49 f9 9c d2 3e ec c3 17 b9 | bd 62 c7 73 21 fe 81 8b e3 b9 eb a9 ce c7 0f d3 | 3f 5d 5a 44 c2 b4 29 b6 b5 67 52 29 de ca c6 15 | 31 6c 15 9d 56 b1 be 81 9a 0d b9 07 79 05 6e c9 | 29 00 00 24 56 48 d0 40 29 5d 70 09 47 7a f3 f6 | 53 84 44 57 f6 31 5c 3b e1 9a 2b 92 5f 13 77 b9 | 29 81 06 a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 92 e0 aa 95 98 e7 44 d2 2d 1e d8 | d0 35 7f 77 52 84 b9 c1 00 00 00 1c 00 00 40 05 | a2 97 dc 1e 35 5d 8b 7e f0 05 d9 9d 5b 9e 9f 7f | 26 7a 4a c3 | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #48 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 07 42 48 2a e6 dd 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #48 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #48 | rejected packet: | 92 07 42 48 2a e6 dd 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #48: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0471 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #35 | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #35 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #35 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49605.743558; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003633 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #35 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 "road-eastnet-nonat-35" #35: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #35) | ef 15 ea 36 a5 a5 5c 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 96 b3 aa c0 4d d9 88 e5 ac e1 94 c5 3f 96 d9 | b4 11 6c 13 85 3c 47 49 a4 e7 6c bf 49 2c f7 e6 | 82 c1 3a 00 a1 f9 46 f7 54 13 9f 65 48 18 8b 9f | e6 da f8 f3 07 a0 ac 41 d5 a9 3b e6 a7 7c a3 81 | db 32 9e 99 47 70 04 b0 f4 2d a4 b0 a4 3b e1 28 | 9f 63 a2 94 b7 1f 9e 68 18 47 6f ef 05 c0 65 15 | cc 6b 7e 6d 5e e8 2a 06 87 47 6c aa e2 89 a2 b1 | 87 d5 9a c7 5c f6 c5 c9 ef 9a f5 1e 14 44 ed f6 | 21 c2 10 91 92 32 f4 48 3d 48 76 7f da 54 41 70 | 3a 27 f3 0e a6 36 ab ef 51 4a ee 27 f3 fa b5 4a | 81 80 97 f8 12 4a 6b 6e 11 f7 41 fe d5 56 ec af | 7e dc 33 c0 77 e2 37 b5 3f fc b0 40 58 cb 92 b6 | 44 3d 99 0d 17 ae 15 bb a7 c0 2c 1d dc 42 f0 67 | d6 5a 17 88 ce 32 f6 da 90 65 b7 17 83 70 da 67 | c5 33 42 42 d7 1a 6c 70 ed 40 df e9 ee 39 2a 8f | f5 b4 db 3f e7 42 51 2e 4d a9 fe 76 ba 09 20 58 | 29 00 00 24 f0 8c e1 d2 ee 2f 9e 4d 17 8a 20 ca | cf 55 95 6a 83 c3 98 8f db 61 db bb f1 69 5e b0 | e6 61 e7 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 5c ea 28 17 8f c3 f5 57 90 ad 1e | 3a ae c2 e5 e1 92 7b 3c 00 00 00 1c 00 00 40 05 | cb 88 24 12 73 0e 41 cb fe 6b 7e d6 a5 c0 bb a2 | e1 60 1e c0 | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #35 spent 0.203 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 15 ea 36 a5 a5 5c 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #35 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #35 | rejected packet: | ef 15 ea 36 a5 a5 5c 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #35: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0939 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-61" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-61' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #61 at 0x557d46a27f90 | State DB: adding IKEv2 state #61 in UNDEFINED | pstats #61 ikev2.ike started | Message ID: init #61: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #61: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #61; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-61" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-61" IKE SA #61 "road-eastnet-nonat-61" "road-eastnet-nonat-61" #61: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-61 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-61": constructed local IKE proposals for road-eastnet-nonat-61 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 61 for state #61 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb388002b20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #61 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 | crypto helper 1 resuming | crypto helper 1 starting work-order 61 for state #61 | #61 spent 0.161 milliseconds in ikev2_parent_outI1() | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 61 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-61" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.262 milliseconds in whack | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 61 time elapsed 0.000981 seconds | (#61) spent 0.977 milliseconds in crypto helper computing work-order 61: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 61 for state #61 to event queue | scheduling resume sending helper answer for #61 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #61 | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 61 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #61 | **emit ISAKMP Message: | initiator cookie: | f7 bc 52 c3 08 41 7d fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-61 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 68 a3 fc 88 6c c9 17 99 e8 c8 f4 84 4b dd e6 d6 | ikev2 g^x a2 3c cb b6 7d b8 4b 73 4d d1 4a 52 0a 17 63 b0 | ikev2 g^x ce a1 f6 5b 22 20 08 31 0e da ec fd b8 c2 13 f9 | ikev2 g^x b7 0d 78 21 3f 05 bc f7 2c 5a 0e b5 1a 70 bf 53 | ikev2 g^x b0 72 5e 64 9f c9 e5 f6 6b aa f3 db 8b b8 b8 b3 | ikev2 g^x f6 f8 ae 22 20 f7 35 9c 39 6d 5a ba 98 af 4b 1d | ikev2 g^x 6d d4 8e 29 87 bb 7a 2b 6b 4a b8 79 51 26 39 b0 | ikev2 g^x 6a 6c be 49 5f 57 bf 03 7a 6e 7f ac 45 f9 af fb | ikev2 g^x a3 06 52 bf 07 ef a5 db 3d b8 9b 73 f0 8e b1 76 | ikev2 g^x 2b 5d b7 93 de 9f 59 44 c1 67 8a 9a a5 50 66 6c | ikev2 g^x 27 3e 5e 44 b1 e9 13 dc 81 57 82 47 20 a2 32 79 | ikev2 g^x d4 b0 d6 87 f1 f1 20 bf e9 93 fc 11 dd 5e 42 b0 | ikev2 g^x a4 4f 0e f8 93 a1 1c a5 59 56 db 69 8d ca d0 53 | ikev2 g^x 78 b2 af e6 28 15 c5 c9 00 fd bf f0 33 a6 bf 2d | ikev2 g^x 7e 87 d7 d1 a0 82 65 91 eb 3c cf d0 6f fb 0e 4b | ikev2 g^x 57 a1 5c 8a 3f 3c 13 19 f1 bc 6c 89 96 42 e0 e9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 30 62 04 12 b8 d1 41 8a 1d 82 4c c7 f3 e8 92 81 | IKEv2 nonce d6 0e cc 31 5a f2 7c 04 56 a0 26 04 e6 c5 8a 3f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f7 bc 52 c3 08 41 7d fa | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3d | natd_hash: port= 01 f4 | natd_hash: hash= d8 04 89 46 c0 2a 68 09 d3 b8 a6 1e 7d d4 48 56 | natd_hash: hash= 88 7a 56 d6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d8 04 89 46 c0 2a 68 09 d3 b8 a6 1e 7d d4 48 56 | Notify data 88 7a 56 d6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f7 bc 52 c3 08 41 7d fa | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= bb 1e 0b f8 57 9c 2b 42 0a de e4 96 f3 8b 61 81 | natd_hash: hash= fa a3 7d bc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bb 1e 0b f8 57 9c 2b 42 0a de e4 96 f3 8b 61 81 | Notify data fa a3 7d bc | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #61 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #61: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #61 to 4294967295 after switching state | Message ID: IKE #61 skipping update_recv as MD is fake | Message ID: sent #61 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-61" #61: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.61:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #61) | f7 bc 52 c3 08 41 7d fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 a3 fc 88 6c c9 17 99 e8 c8 f4 84 4b dd e6 d6 | a2 3c cb b6 7d b8 4b 73 4d d1 4a 52 0a 17 63 b0 | ce a1 f6 5b 22 20 08 31 0e da ec fd b8 c2 13 f9 | b7 0d 78 21 3f 05 bc f7 2c 5a 0e b5 1a 70 bf 53 | b0 72 5e 64 9f c9 e5 f6 6b aa f3 db 8b b8 b8 b3 | f6 f8 ae 22 20 f7 35 9c 39 6d 5a ba 98 af 4b 1d | 6d d4 8e 29 87 bb 7a 2b 6b 4a b8 79 51 26 39 b0 | 6a 6c be 49 5f 57 bf 03 7a 6e 7f ac 45 f9 af fb | a3 06 52 bf 07 ef a5 db 3d b8 9b 73 f0 8e b1 76 | 2b 5d b7 93 de 9f 59 44 c1 67 8a 9a a5 50 66 6c | 27 3e 5e 44 b1 e9 13 dc 81 57 82 47 20 a2 32 79 | d4 b0 d6 87 f1 f1 20 bf e9 93 fc 11 dd 5e 42 b0 | a4 4f 0e f8 93 a1 1c a5 59 56 db 69 8d ca d0 53 | 78 b2 af e6 28 15 c5 c9 00 fd bf f0 33 a6 bf 2d | 7e 87 d7 d1 a0 82 65 91 eb 3c cf d0 6f fb 0e 4b | 57 a1 5c 8a 3f 3c 13 19 f1 bc 6c 89 96 42 e0 e9 | 29 00 00 24 30 62 04 12 b8 d1 41 8a 1d 82 4c c7 | f3 e8 92 81 d6 0e cc 31 5a f2 7c 04 56 a0 26 04 | e6 c5 8a 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 04 89 46 c0 2a 68 09 d3 b8 a6 1e | 7d d4 48 56 88 7a 56 d6 00 00 00 1c 00 00 40 05 | bb 1e 0b f8 57 9c 2b 42 0a de e4 96 f3 8b 61 81 | fa a3 7d bc | state #61 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb388002b20 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #61 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 | #61 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49605.776201 | resume sending helper answer for #61 suppresed complete_v2_state_transition() and stole MD | #61 spent 0.599 milliseconds in resume sending helper answer | stop processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388015370 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 bc 52 c3 08 41 7d fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #61 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #61 | rejected packet: | f7 bc 52 c3 08 41 7d fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #61: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.068 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a027b0 | handling event EVENT_RETRANSMIT for parent state #13 | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #13 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #13 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49605.777417; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.014739 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fd070 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #13 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 "road-eastnet-nonat-13" #13: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #13) | 49 f7 1e 6a 42 26 33 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 71 af 86 f4 71 f9 bb e4 0d 2b 45 d7 29 39 05 | b7 87 ba 66 cb fb 2a f9 a1 bd 3d 61 b3 93 ac e4 | c3 99 b0 f5 02 62 ee dd 97 cd f6 04 fc 6c e4 91 | fc 5c 11 ba 5a 79 b1 78 a2 d0 e7 22 4a 47 b5 e0 | 1b 08 7f a6 c3 8e ce 71 40 0d 06 f3 62 f6 df f1 | 5d 7c 5b e2 d5 cd 0f 4d e6 c6 f8 d8 22 4f 95 11 | 69 b0 4c 7b c2 82 8e f9 ea f5 33 82 00 b3 c7 cc | c1 9e 50 02 8e 45 ef af 1a f9 8b 37 72 41 32 b8 | 47 f2 be df 3f 94 e4 a3 17 d5 55 32 fb 1f 2d d2 | 75 88 9c 98 42 60 51 41 31 79 19 3b ff ef b8 2a | 8e 39 2b ea 32 11 93 14 1c d3 9c 70 36 49 9b d1 | ea 38 9f 9a 6a 33 49 23 7d e2 c2 d5 b0 8d 83 b6 | ef a7 10 c8 a2 18 a7 4e 8b 07 bd 67 b5 96 c1 6a | d6 9d 73 c7 60 9d 60 25 5d 63 21 25 68 0e 24 b3 | 8f 19 40 42 2e 27 e9 30 d9 f9 1b 80 8f 2d ab dd | 1e f0 98 f5 b2 55 9b 6b 06 84 0f fe 26 32 f1 f7 | 29 00 00 24 dd b6 a9 bb fd 56 26 b2 23 d7 97 2f | 99 f7 92 2e ca d6 19 06 93 b1 8e 77 8d b7 a4 a3 | 73 9b 88 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 83 1c 22 e0 45 23 6f 5f d0 4f 89 | cf 59 8e 77 1e 0a 0b d7 00 00 00 1c 00 00 40 05 | e8 12 13 20 8d f1 d3 89 00 ae 66 0d fd eb 92 63 | f1 cf 85 56 | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a027b0 | #13 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 f7 1e 6a 42 26 33 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #13 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #13 | rejected packet: | 49 f7 1e 6a 42 26 33 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #13: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a18370 | handling event EVENT_RETRANSMIT for parent state #49 | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #49 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #49 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49605.786726; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001544 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f7760 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #49 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 "road-eastnet-nonat-49" #49: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #49) | 8b 45 5c f0 af 2f 9d ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 38 13 81 3a b9 33 6e f2 a1 41 ed b7 e9 17 cf | 38 df bd f2 c5 3d 78 1c 98 5b e5 97 39 7c 00 0a | 9b b9 2b 4e ee 4e 90 b7 3f 17 93 3b 49 e6 73 ac | f3 36 ea c0 f6 08 78 26 b2 58 4a a1 8f ff 26 a9 | a2 29 62 4b f6 47 e2 5d a0 f3 e8 a3 da 86 cc 66 | 5a 6a 1d 0c 47 30 d7 e6 6e 32 62 71 d7 d3 1b 25 | 92 10 eb e7 f4 a1 c6 b8 cf 48 2b c2 a1 ae c9 5f | 55 56 6d 5d 77 a7 5f aa 02 cf a8 ea bb 62 18 44 | 0f aa 1d 7d 23 c7 37 6d 72 2b 4a da 38 22 af af | 35 47 8a 4d fb f1 2e 0f fa 54 54 48 f4 2f 1b 4b | 5a 9a c8 ab f4 0a 9c 36 8e 9a 37 b6 3a a4 36 09 | f9 cb 85 a0 d5 4e 66 72 2d dc a7 8d 87 52 32 39 | 0d 6e ce 73 51 c4 9b ee a5 7a c3 e9 dd 43 0b 8d | c9 c7 df e3 c7 9a fc aa 8b 37 41 93 d2 be 3c 27 | 15 30 62 da 6c d3 07 29 68 48 b5 55 56 c4 17 4f | b5 8f 29 d1 f2 fb 9e ea 13 d1 f0 21 44 a0 36 ca | 29 00 00 24 0e e2 a8 92 f0 b5 63 29 61 a0 ee 39 | b4 45 f6 bb e0 ab b1 76 a4 84 16 9e da d2 be 94 | e8 6d f8 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 12 9b 83 c2 c3 d2 71 a5 38 21 6e | a0 97 8f 66 c6 b8 71 3b 00 00 00 1c 00 00 40 05 | d2 ce 05 69 62 ac 37 a7 c1 ab 75 f3 75 7a c1 3e | 4a 93 d7 88 | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a18370 | #49 spent 0.193 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 45 5c f0 af 2f 9d ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #49 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #49 | rejected packet: | 8b 45 5c f0 af 2f 9d ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #49: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0686 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #36 | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #36 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #36 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49605.81311; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00191 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0eb30 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #36 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 "road-eastnet-nonat-36" #36: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #36) | c4 93 27 79 3b f0 36 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 44 1e 02 70 5f fd 14 41 57 b4 33 c5 4d c1 bf | 56 a3 d0 f5 4b 1b 15 73 5b 56 52 91 f2 4c 9d dc | 3f 2d 5a 36 27 be 97 1b 2d 43 21 16 b5 25 60 73 | 31 d7 04 cb ac b3 fd 19 61 2f 36 91 05 d7 55 8c | 92 5d 99 4b ae f6 cf a1 6e 2e de fa cb a4 7e 7e | b4 08 08 4f 90 51 13 b7 5b cb 7e 2c db 61 c5 d9 | d2 2f 86 cb df 97 d1 5e d4 95 3b c2 71 e2 2b bf | 7b e5 e9 8b bd 5c de 24 ac 5a 8b 4a 5d 3b ff 1e | f8 f4 2b 7b 96 0c 02 8f ac d9 62 f7 21 fb 07 5e | 9d 3f 41 15 d1 79 65 31 2a 68 5a 1a 56 fc 9c 2a | 20 90 63 93 fd d9 59 08 0d 3a 51 cc ee 1b ca 83 | 3c 5f 8f 03 9c cf 6f 04 52 23 a8 cb 50 43 72 18 | 78 cb 0f 8d bf 67 75 81 61 d9 91 a3 5f f5 1e ad | 09 8c 98 32 17 11 19 f3 54 f2 c6 36 e6 24 63 e2 | 41 b5 39 5c af a7 57 20 af 37 ac c1 12 94 ec 3a | e0 ac a7 07 42 78 d2 32 96 5c a0 ed 7e 90 04 46 | 29 00 00 24 e4 05 e8 ad 6f 35 18 e8 9c ba 2a d7 | ba f9 eb 8c c3 7b 43 88 9a 23 1f e0 cb de a0 8e | 76 67 65 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab a4 b2 11 db 45 90 fb 99 ab 4d 81 | 85 c6 e5 03 d5 18 31 7d 00 00 00 1c 00 00 40 05 | 9e c9 75 d2 3b 5d 13 cd bd fe b5 96 1f 79 bf 21 | fa a0 06 d7 | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #36 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 93 27 79 3b f0 36 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #36 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #36 | rejected packet: | c4 93 27 79 3b f0 36 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #36: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ef4e0 | handling event EVENT_RETRANSMIT for parent state #55 | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #55 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #55 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49605.81445; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499706 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #55 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 "road-eastnet-nonat-55" #55: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #55) | 3d db 2e dd 07 aa ba 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e 71 91 32 93 9e d9 77 ef 53 94 b9 d3 5b 34 5a | fe 84 a7 6b 7a 00 f9 5d 90 9e 95 ec 98 7e 50 90 | 6f 0f ae d2 9f 29 ef dd 60 22 99 95 c1 b0 c0 54 | a7 26 de ae fa 13 60 60 4e 33 18 74 d6 1f 83 02 | 06 b2 59 fa 7c 17 46 c9 2a 0a 3f 67 46 5b 6e d7 | 09 8c 97 98 d9 8f c1 fc 1c ec 49 28 fb cb 2a 4f | 78 96 26 a0 14 e4 f8 b2 87 ff f8 94 08 22 94 74 | 80 62 7b 3c 7f 07 b1 d4 49 9b 9c af da 12 43 95 | 22 ed c4 32 82 8f fd 22 2e 14 7f a3 9e 9a 0a 95 | 1c ac 99 95 6e eb ff 73 9e fa c4 9b c2 7f 18 d1 | a6 f5 7d a7 31 3b 50 d9 03 2b 9b 6a 48 7d 39 5a | 55 2b 5f c8 64 07 45 ea 51 98 d9 85 73 51 e2 22 | 6a fe cb 2c f3 b0 0b 08 b0 e7 70 07 6e 79 7c 1c | 6c d7 90 19 69 d2 44 49 0a 0f 6a 33 f1 60 ee 72 | 89 92 e0 5a 96 45 5d c4 8c 2b 42 de 01 b6 de 4f | b8 41 dc e7 4d 6a e5 69 01 12 96 be b3 ca 0c ef | 29 00 00 24 34 26 bc 6d 2a b2 15 83 73 e7 09 34 | 40 d7 8e 8c 63 fe fd 1b d2 38 8c 24 da 45 67 bf | a5 9b 8a 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 45 13 d7 91 8d b2 95 9c 7e b4 17 | 75 e1 5c f2 7c 3c ca 26 00 00 00 1c 00 00 40 05 | d0 0d a6 5e 1b c4 3a dd c0 34 b3 e5 87 cb 47 3a | 73 94 3b 44 | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ef4e0 | #55 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d db 2e dd 07 aa ba 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #55 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #55 | rejected packet: | 3d db 2e dd 07 aa ba 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #55: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0734 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-62" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-62' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #62 at 0x557d46a29550 | State DB: adding IKEv2 state #62 in UNDEFINED | pstats #62 ikev2.ike started | Message ID: init #62: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #62: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #62; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-62" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-62" IKE SA #62 "road-eastnet-nonat-62" "road-eastnet-nonat-62" #62: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-62 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-62": constructed local IKE proposals for road-eastnet-nonat-62 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 62 for state #62 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469ddbf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #62 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 | #62 spent 0.15 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 resuming | crypto helper 2 starting work-order 62 for state #62 | RESET processing: connection "road-eastnet-nonat-62" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 62 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.252 milliseconds in whack | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 62 time elapsed 0.000916 seconds | (#62) spent 0.91 milliseconds in crypto helper computing work-order 62: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 62 for state #62 to event queue | scheduling resume sending helper answer for #62 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #62 | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 62 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #62 | **emit ISAKMP Message: | initiator cookie: | a4 88 8e 77 b1 f4 8c bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-62 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 69 16 5e 67 aa cb b3 98 fe b6 e6 44 1a 07 e2 be | ikev2 g^x 44 c7 a0 47 e1 e7 ec b4 60 c9 7d b0 5b 56 2d 1b | ikev2 g^x e4 9a 0e 63 18 22 7a fa a9 c7 63 82 b0 af 0b 0d | ikev2 g^x 77 29 15 f5 8e 1b 69 90 f4 7c 19 86 79 0a 5f e8 | ikev2 g^x f6 12 ff 9f 31 22 5c e3 f7 e6 5c 40 a8 f4 37 ed | ikev2 g^x 38 af f3 38 7f df 64 d9 95 08 2b d7 e3 b5 1f 60 | ikev2 g^x 26 37 fe 9a 98 33 04 94 0b 0e 07 08 c5 5e 7d f8 | ikev2 g^x c0 0f 76 eb 24 9a 96 24 01 c7 9b fd dc 2c ed 1c | ikev2 g^x 7f 8c f6 fb 9d b0 c1 a4 53 e2 53 da 53 65 1f 9e | ikev2 g^x 4e d5 a4 5d a2 34 99 86 95 17 7b b9 d0 eb c5 9a | ikev2 g^x 7a c4 fd c2 ec 45 e1 8d 1b 55 bb 91 5f 61 39 83 | ikev2 g^x ed 3e fd ec 0b 7f cf a5 d0 34 4d 78 f0 19 f9 dd | ikev2 g^x 25 c0 20 38 67 61 04 4f 0d 51 42 43 cb 7c 44 01 | ikev2 g^x 6b 99 d1 a6 d3 b1 5e 29 d8 c7 53 4a 9e 9d fe 70 | ikev2 g^x 66 03 05 bd 1d 96 be 53 72 9a fa 30 50 08 24 ae | ikev2 g^x eb 69 31 f0 f7 2f d9 1c ab 9d 37 cd ad 7a ed 6a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0c 26 e7 cd 38 ca 58 e6 02 58 43 30 ae e2 2c 6c | IKEv2 nonce 6d 36 d5 ae 9b 11 96 a7 26 d9 7a c2 05 18 d0 fb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a4 88 8e 77 b1 f4 8c bb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3e | natd_hash: port= 01 f4 | natd_hash: hash= 99 28 4f 82 49 71 8c 73 8e 61 ba dd 8f a7 28 9b | natd_hash: hash= 76 c2 13 ce | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 99 28 4f 82 49 71 8c 73 8e 61 ba dd 8f a7 28 9b | Notify data 76 c2 13 ce | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a4 88 8e 77 b1 f4 8c bb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 01 46 1c d3 66 df 29 38 51 83 6e 7c d6 51 6d 46 | natd_hash: hash= 6c 4e be 2f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 01 46 1c d3 66 df 29 38 51 83 6e 7c d6 51 6d 46 | Notify data 6c 4e be 2f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #62 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #62: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #62 to 4294967295 after switching state | Message ID: IKE #62 skipping update_recv as MD is fake | Message ID: sent #62 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-62" #62: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.62:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #62) | a4 88 8e 77 b1 f4 8c bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 16 5e 67 aa cb b3 98 fe b6 e6 44 1a 07 e2 be | 44 c7 a0 47 e1 e7 ec b4 60 c9 7d b0 5b 56 2d 1b | e4 9a 0e 63 18 22 7a fa a9 c7 63 82 b0 af 0b 0d | 77 29 15 f5 8e 1b 69 90 f4 7c 19 86 79 0a 5f e8 | f6 12 ff 9f 31 22 5c e3 f7 e6 5c 40 a8 f4 37 ed | 38 af f3 38 7f df 64 d9 95 08 2b d7 e3 b5 1f 60 | 26 37 fe 9a 98 33 04 94 0b 0e 07 08 c5 5e 7d f8 | c0 0f 76 eb 24 9a 96 24 01 c7 9b fd dc 2c ed 1c | 7f 8c f6 fb 9d b0 c1 a4 53 e2 53 da 53 65 1f 9e | 4e d5 a4 5d a2 34 99 86 95 17 7b b9 d0 eb c5 9a | 7a c4 fd c2 ec 45 e1 8d 1b 55 bb 91 5f 61 39 83 | ed 3e fd ec 0b 7f cf a5 d0 34 4d 78 f0 19 f9 dd | 25 c0 20 38 67 61 04 4f 0d 51 42 43 cb 7c 44 01 | 6b 99 d1 a6 d3 b1 5e 29 d8 c7 53 4a 9e 9d fe 70 | 66 03 05 bd 1d 96 be 53 72 9a fa 30 50 08 24 ae | eb 69 31 f0 f7 2f d9 1c ab 9d 37 cd ad 7a ed 6a | 29 00 00 24 0c 26 e7 cd 38 ca 58 e6 02 58 43 30 | ae e2 2c 6c 6d 36 d5 ae 9b 11 96 a7 26 d9 7a c2 | 05 18 d0 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 28 4f 82 49 71 8c 73 8e 61 ba dd | 8f a7 28 9b 76 c2 13 ce 00 00 00 1c 00 00 40 05 | 01 46 1c d3 66 df 29 38 51 83 6e 7c d6 51 6d 46 | 6c 4e be 2f | state #62 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469ddbf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8d60 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #62 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 | #62 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49605.84163 | resume sending helper answer for #62 suppresed complete_v2_state_transition() and stole MD | #62 spent 0.331 milliseconds in resume sending helper answer | stop processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb380015370 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 88 8e 77 b1 f4 8c bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #62 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #62 | rejected packet: | a4 88 8e 77 b1 f4 8c bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #62: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #50 | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #50 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #50 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49605.854854; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002955 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f4be0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #50 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 "road-eastnet-nonat-50" #50: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #50) | 96 fd fa e4 3e 0e 84 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 85 b8 19 de 5c 0b b8 2d cb 54 cd 4a 1a dc 75 | 29 fd ca 47 94 14 29 17 31 bc e5 6f 6c f8 34 07 | 54 0a 45 19 2c 2a 6f 1c b9 dd 1e a6 5c 18 fd 5f | 81 44 c7 97 e9 8f a1 20 0b 20 67 50 dc 17 2d 25 | 1e 18 a7 76 43 da 58 3d a0 3c 42 3d 77 42 d1 eb | ed 35 62 7a 01 62 e1 32 87 10 6c d5 80 f8 d5 7a | e6 0d bc 8d d6 42 76 b9 2d fe 0d c3 eb e6 a9 0d | 0e 9f 06 5b af 9e 49 ff c0 94 83 2a d0 2d 71 88 | 4e 9a 35 ec c3 f5 8a a6 c6 22 6e 7e 16 d4 d9 e4 | d9 14 a9 a0 89 f2 18 8e be cf da c0 b4 27 62 b2 | 69 81 38 d5 cf 1b 18 ef 28 a2 d6 ab 45 93 46 f0 | b0 cf a6 b1 57 a8 1a d7 72 93 ec cd 51 ba 98 80 | 63 05 e1 50 59 41 cf a5 af 5d 7f 76 36 8e 63 f7 | e7 a8 78 3d b4 e5 4b 57 33 d8 0b ca bb 46 3b d1 | 5c 60 2c ab 89 51 2a 58 57 80 21 7f 56 14 26 65 | bd a7 02 e1 81 1f b6 ff ab b3 3c 36 3a 4d e7 be | 29 00 00 24 62 85 07 c7 f7 76 d5 f9 35 e6 84 85 | cf ff 39 b7 d3 8a fe b9 27 ad b1 ed 4e 28 c4 d4 | 73 2f 0f ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 6a 14 0a 8a ea 03 bd 41 dc ab fe | 15 04 7a 2b 71 ea 6d 09 00 00 00 1c 00 00 40 05 | 24 23 f0 d4 3c 33 30 25 f8 fc 46 79 64 b6 7b 59 | 6c 35 21 7f | libevent_free: release ptr-libevent@0x7fb35c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #50 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 fd fa e4 3e 0e 84 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #50 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #50 | rejected packet: | 96 fd fa e4 3e 0e 84 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #50: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0715 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8e0 | handling event EVENT_RETRANSMIT for parent state #14 | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #14 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #14 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49605.86114; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.008252 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #14 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 "road-eastnet-nonat-14" #14: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #14) | c3 13 eb 28 05 44 3c c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 9d 4b 57 65 9b 44 ef 02 5a 55 12 34 bd 3e fa | 1d 1d 02 b8 47 b4 07 d2 1c 40 a7 d2 b5 27 54 0d | 81 c5 8d d2 b0 f1 46 e6 2b f6 3a de 28 5d 98 ae | 72 2f 81 53 d7 e7 b2 d9 8d 92 9d 09 f6 b7 ce cc | 3e 71 cd 6b bc 9b 98 ad b9 25 11 78 67 a8 99 c6 | d0 09 70 45 b3 4c 5d bb c4 08 3e 65 01 7c 91 1b | 71 62 4d 8f 21 92 6e 0d cc 31 2a e5 1d 4d 2c 13 | a8 c8 3c 02 8d 36 79 d7 6c 16 bc 07 ba a2 3a 87 | 13 5a 36 f7 58 04 34 60 a3 2f 3a 9f 7c 23 64 3e | 35 e2 e2 a2 79 4c 9f fc 94 b5 56 35 03 c7 fc 3a | cf 61 0a a2 ca 12 f9 93 6a 8b f6 7c 71 75 e0 48 | 38 16 70 bd 8e 4a bd d6 cf f6 8e 6b de fc 4a f7 | 37 83 73 dd be 05 96 b0 07 8a ee 94 33 ed 86 17 | 8e 84 02 b1 3c 02 91 6e df 44 9a 23 83 12 9c 66 | e4 27 4d ff 2c b0 4c 89 bc bc 90 88 ea ad 2f 69 | 0e ca 37 3b 42 e0 ad 13 24 ad bb e5 a5 03 12 10 | 29 00 00 24 cb 20 8c 9f 6a 8c dd ed 7f 5a c1 49 | 4c ab 23 eb 51 b5 51 02 d0 17 95 d7 22 4b 61 df | 15 62 c3 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e 81 d0 17 a6 30 05 4d 92 15 c2 f3 | f4 8b 67 24 b4 9e ba 2d 00 00 00 1c 00 00 40 05 | 8a 85 97 fb 20 dc 58 d7 a0 fe fa ad 9b 31 ea 8a | c5 2b 9c 59 | libevent_free: release ptr-libevent@0x7fb36c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8e0 | #14 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c3 13 eb 28 05 44 3c c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #14 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #14 | rejected packet: | c3 13 eb 28 05 44 3c c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #14: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0677 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #37 | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #37 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #37 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49605.886496; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002668 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ef4e0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #37 | libevent_malloc: new ptr-libevent@0x7fb36c00cf80 size 128 "road-eastnet-nonat-37" #37: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #37) | 17 02 22 e9 ab 5b 91 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f f0 24 04 15 84 3f 8d a0 47 69 89 53 1c 67 b8 | 33 2a a4 f5 84 95 fd 12 c4 95 3c eb 03 f8 76 46 | 15 20 9b c5 17 a5 48 da 05 b3 14 87 45 a5 03 ce | 15 45 04 84 4f ce c5 7f 7f d9 f6 69 e6 fa 2a ce | 98 6a 3f d1 cc fe 7f e2 41 fd 61 7b af af 30 7e | 0a 75 d2 92 05 56 ed e9 09 bd bc db cd 80 58 20 | 86 cc 39 bd f2 1c dd 9d 77 bb 28 c3 7e a4 97 11 | 86 79 5d 68 34 e4 33 4c b3 b1 ed 26 ab a1 c5 7d | dd f5 b8 0e 55 cd f4 1f ea 00 32 c8 4b fd 8f a5 | 71 8b 05 79 0a 34 41 68 bd c7 7d 96 51 77 5e 6b | d9 65 0d cf f7 34 f5 5b 4b bf 3e ae f6 63 25 2e | ea 9e 2a 3f 64 43 4d 0c 4a de f8 57 38 d7 5a c8 | 89 09 d3 81 3b 61 a8 5e 87 ab 34 9f c0 a6 2e 8e | a4 55 d9 e8 61 49 db 19 2f a0 89 a1 e6 24 e6 14 | 77 4b 63 b1 94 0b fe b9 37 07 5d a5 3f f4 4e 97 | 2a 98 e3 ca 6e 7f 3f a3 88 c3 da 3a c0 a1 79 c5 | 29 00 00 24 75 33 7f 61 eb 0d 1b f9 84 ec ca bb | af cf f0 96 3c 65 2f 09 ef 72 4a c4 05 f7 86 9b | fc 7f 3c 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 5d ed 76 d7 41 0c 3c 88 ec 15 de | 69 08 6f 06 52 19 de 0f 00 00 00 1c 00 00 40 05 | 52 bb 9d ab bf 18 49 c2 17 f2 d0 27 18 10 66 1c | c7 07 9d fe | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #37 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 02 22 e9 ab 5b 91 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #37 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #37 | rejected packet: | 17 02 22 e9 ab 5b 91 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #37: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0792 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-63" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-63' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #63 at 0x557d46a2ab10 | State DB: adding IKEv2 state #63 in UNDEFINED | pstats #63 ikev2.ike started | Message ID: init #63: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #63: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #63; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-63" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-63" IKE SA #63 "road-eastnet-nonat-63" "road-eastnet-nonat-63" #63: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-63 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-63": constructed local IKE proposals for road-eastnet-nonat-63 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 63 for state #63 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb368005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #63 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 | #63 spent 0.142 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-63" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.226 milliseconds in whack | crypto helper 0 resuming | crypto helper 0 starting work-order 63 for state #63 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 63 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 63 time elapsed 0.000989 seconds | (#63) spent 0.995 milliseconds in crypto helper computing work-order 63: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 63 for state #63 to event queue | scheduling resume sending helper answer for #63 | libevent_malloc: new ptr-libevent@0x7fb384015370 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #63 | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 63 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #63 | **emit ISAKMP Message: | initiator cookie: | 43 a8 4d 01 ec 36 de 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-63 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fa e2 93 e3 30 a1 06 ee b4 85 58 c9 2f 9d d0 1a | ikev2 g^x ad 38 32 dc 30 89 d1 a0 98 57 8d 01 77 84 b3 55 | ikev2 g^x 47 fd ae cc e0 a9 2a 35 58 f1 6a 27 c8 b7 88 d3 | ikev2 g^x c3 78 1e 95 37 0b 81 ee cb 00 02 38 fb 0c bc ff | ikev2 g^x 55 19 c6 c0 be 69 d1 78 c8 9a ae e0 96 6c 3f 9b | ikev2 g^x 54 61 8c 4b 6b 45 ac 74 a1 6d f1 1d de 9e c2 52 | ikev2 g^x 40 62 38 7c 4d c1 06 5c f5 e4 71 d5 c6 8f eb 8d | ikev2 g^x a1 58 7d a8 05 d7 f2 d1 12 1f d4 be 60 08 06 1f | ikev2 g^x 2a 4d 28 f0 ba 0e 77 13 d0 8f 4c 08 fc 37 3f 98 | ikev2 g^x 37 6b f8 7a b1 44 d3 8b 12 01 3a e0 ab 1c 6f 72 | ikev2 g^x d8 5a cc 1f f0 ef fd b0 38 cb c0 2b 70 72 dd 77 | ikev2 g^x 20 94 89 cc 24 42 7c 89 06 09 17 e9 b7 42 85 43 | ikev2 g^x b5 81 b7 cc a1 a3 3a 6b b1 18 c1 ec 8a 13 0d f9 | ikev2 g^x 71 43 3d 9a 1f 64 16 b7 2b bd 29 ea 9f 4f 17 43 | ikev2 g^x a8 18 9f fc 5b 56 59 fa 46 4c 5d 82 89 28 f2 04 | ikev2 g^x 51 6c b3 97 3a a5 95 f1 fd 87 8b 14 08 ce a0 6b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 42 95 7e 08 3c e5 ab b4 d2 f9 ef 7f d8 0c 96 cd | IKEv2 nonce c4 ca c3 e4 35 0f 70 37 5f 05 86 60 4b 19 91 ea | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 43 a8 4d 01 ec 36 de 28 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3f | natd_hash: port= 01 f4 | natd_hash: hash= f7 ed eb 0b 29 2b d1 a0 42 dd cd 92 88 75 fb d1 | natd_hash: hash= 70 51 78 cf | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f7 ed eb 0b 29 2b d1 a0 42 dd cd 92 88 75 fb d1 | Notify data 70 51 78 cf | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 43 a8 4d 01 ec 36 de 28 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a8 06 2d d1 ac 32 5a b6 7e b8 ae d6 ec a9 34 27 | natd_hash: hash= 7d 9e 90 d0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a8 06 2d d1 ac 32 5a b6 7e b8 ae d6 ec a9 34 27 | Notify data 7d 9e 90 d0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #63 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #63: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #63 to 4294967295 after switching state | Message ID: IKE #63 skipping update_recv as MD is fake | Message ID: sent #63 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-63" #63: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.63:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #63) | 43 a8 4d 01 ec 36 de 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa e2 93 e3 30 a1 06 ee b4 85 58 c9 2f 9d d0 1a | ad 38 32 dc 30 89 d1 a0 98 57 8d 01 77 84 b3 55 | 47 fd ae cc e0 a9 2a 35 58 f1 6a 27 c8 b7 88 d3 | c3 78 1e 95 37 0b 81 ee cb 00 02 38 fb 0c bc ff | 55 19 c6 c0 be 69 d1 78 c8 9a ae e0 96 6c 3f 9b | 54 61 8c 4b 6b 45 ac 74 a1 6d f1 1d de 9e c2 52 | 40 62 38 7c 4d c1 06 5c f5 e4 71 d5 c6 8f eb 8d | a1 58 7d a8 05 d7 f2 d1 12 1f d4 be 60 08 06 1f | 2a 4d 28 f0 ba 0e 77 13 d0 8f 4c 08 fc 37 3f 98 | 37 6b f8 7a b1 44 d3 8b 12 01 3a e0 ab 1c 6f 72 | d8 5a cc 1f f0 ef fd b0 38 cb c0 2b 70 72 dd 77 | 20 94 89 cc 24 42 7c 89 06 09 17 e9 b7 42 85 43 | b5 81 b7 cc a1 a3 3a 6b b1 18 c1 ec 8a 13 0d f9 | 71 43 3d 9a 1f 64 16 b7 2b bd 29 ea 9f 4f 17 43 | a8 18 9f fc 5b 56 59 fa 46 4c 5d 82 89 28 f2 04 | 51 6c b3 97 3a a5 95 f1 fd 87 8b 14 08 ce a0 6b | 29 00 00 24 42 95 7e 08 3c e5 ab b4 d2 f9 ef 7f | d8 0c 96 cd c4 ca c3 e4 35 0f 70 37 5f 05 86 60 | 4b 19 91 ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 ed eb 0b 29 2b d1 a0 42 dd cd 92 | 88 75 fb d1 70 51 78 cf 00 00 00 1c 00 00 40 05 | a8 06 2d d1 ac 32 5a b6 7e b8 ae d6 ec a9 34 27 | 7d 9e 90 d0 | state #63 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb368005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #63 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 | #63 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49605.904407 | resume sending helper answer for #63 suppresed complete_v2_state_transition() and stole MD | #63 spent 0.47 milliseconds in resume sending helper answer | stop processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb384015370 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 a8 4d 01 ec 36 de 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #63 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #63 | rejected packet: | 43 a8 4d 01 ec 36 de 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #63: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f2060 | handling event EVENT_RETRANSMIT for parent state #56 | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #56 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #56 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49605.90661; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500149 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a18370 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #56 | libevent_malloc: new ptr-libevent@0x7fb384015370 size 128 "road-eastnet-nonat-56" #56: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #56) | a2 38 96 b9 83 17 2c 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c 86 44 cb cd d5 e6 ca 09 de cc 09 a4 86 65 dc | 8e 5e 46 71 c3 c7 a8 ed be 75 06 f3 62 76 ba da | ce e9 f2 5f 5c 9e e4 0c 00 41 ba fd 53 1c 48 95 | 4a ae 4f cc 78 85 9f f0 fa 4c 13 7a c5 dc 96 cf | 8c 8f e9 26 db 93 6d c0 e4 2b 06 79 49 8a 1c 86 | 23 8a 00 51 5e 48 57 fe 2b c6 2d 2e cc 90 37 77 | 16 54 2d 1c 52 6e 88 f9 06 69 91 14 40 a3 3e 1f | 64 d7 73 f6 42 da 0d 73 5f 6b eb 89 ee 97 cd 6c | fd 1d 89 b8 17 39 77 3f b0 8b a8 13 2f f9 45 f4 | e3 ec 7f a4 35 be 17 3d c6 80 db be df d2 e9 bc | 39 46 6a e1 d0 06 ce 65 d8 13 18 bc e7 ef 70 ba | 17 09 9b 7f c9 d6 90 ff cb 53 6a 15 26 bc 84 d0 | 3c 63 f9 85 08 c0 bf 6b 92 00 26 8e 7e 39 47 fa | 15 93 5e ae af a3 95 34 bf f7 9a 05 60 79 f9 78 | fe 1c 09 6f 2a d7 a8 e6 dd 20 f6 bd f3 b0 a8 de | 56 b0 c1 b0 a8 8e c2 c9 51 e8 12 8c 23 35 5a 34 | 29 00 00 24 d3 9d 92 33 15 50 42 07 cb e2 93 fb | fa f0 4d 62 ce 86 f8 78 f6 e4 5a c4 46 ff 05 fd | 2d fe b5 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 f6 95 c7 6a 67 27 fa d2 0e 4e 26 | b1 fb ce d1 96 08 1b d4 00 00 00 1c 00 00 40 05 | 86 3b a6 fc 26 15 66 79 c8 2d 3b 9c 75 89 43 54 | 51 cf ae 75 | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f2060 | #56 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 38 96 b9 83 17 2c 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #56 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #56 | rejected packet: | a2 38 96 b9 83 17 2c 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #56: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34800d120 | handling event EVENT_RETRANSMIT for parent state #51 | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #51 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #51 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49605.93195; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003343 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a027b0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #51 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 "road-eastnet-nonat-51" #51: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #51) | 4e ec 23 15 b1 7b 72 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb ca ad 90 d3 c3 42 ab 02 0a 3a 99 99 08 46 41 | e3 20 e2 b5 e7 92 8d 56 c0 f6 81 f6 d7 1f 61 ae | fb 7c 4e 49 1a 90 7d af 41 51 b1 4f a9 1c af 26 | 43 e3 44 1a 2b 54 c2 29 d3 73 8c a6 e2 ba 3d 02 | 79 ed 80 dd 4b 1e 56 a7 0d 93 2b 80 2d fa ef a7 | a5 07 28 e5 1d 36 9e 70 e3 83 04 4a 00 cd 83 0a | dd f1 6f 7b 41 89 16 39 86 45 b3 89 6b 38 63 99 | 64 d2 3b 37 57 db 5b aa 3c 09 dd b1 e9 2a 36 7d | 07 9a 1b 84 49 cb 9b 53 1f e3 16 45 5a 7e 7d 6a | b6 b2 5f ad 65 38 70 73 69 63 43 b9 48 24 d6 aa | 84 39 4e 67 2a d2 39 99 70 07 69 a7 7e 3b f3 d0 | 5d 4d 0d 43 76 2c 16 f2 ef 43 c1 03 3c a0 15 fa | 7b dd 0d 24 8d 60 85 f6 a5 c6 c1 eb e0 9b 23 f3 | 77 0d cd ab 79 52 59 61 60 d0 e6 6a b2 5f 84 3c | bc fe a3 56 10 78 f4 57 b0 c9 73 a2 9c 16 ae e5 | 21 a9 af 1c 86 05 49 d7 79 de ea 6f 42 c1 58 6c | 29 00 00 24 8a 81 ff 83 11 9d 7f 95 f4 0f 60 37 | ee c1 de 9d 9d 4a 24 6c a2 0d 2e aa 53 c1 6d 4e | 8c ed 61 8e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 84 7c cd 2e 5d e1 e4 b9 3d 91 59 | 8e 0e df bf 1a 34 00 37 00 00 00 1c 00 00 40 05 | 4f e7 ab 4c a7 2a fc d1 46 25 a0 98 d8 53 89 a8 | 24 a4 22 8e | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800d120 | #51 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e ec 23 15 b1 7b 72 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #51 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #51 | rejected packet: | 4e ec 23 15 b1 7b 72 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #51: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46906b40 | handling event EVENT_RETRANSMIT for parent state #15 | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #15 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #15 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49605.953391; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004198 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #15 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 "road-eastnet-nonat-15" #15: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #15) | 26 a2 6e 3b 12 a8 59 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 6b 03 2b 64 b1 a2 70 7f 8d ca f2 6f 54 de 1b | 11 e2 1d 10 c1 2b 3c 5f 6d e7 ca 6d ea a7 28 53 | d6 4f 75 27 52 bc 43 63 3a ab 63 49 ff c4 e6 b2 | 78 96 18 25 61 28 7f 9b 98 22 5e da 00 8c e8 eb | 6c 4d 9e 76 25 8b 7a 47 ab 33 22 55 42 23 3f c1 | 32 ba e7 e4 c9 4a 5f 0d 8b 0d 29 12 b2 18 5b ef | 5f af 09 c8 a4 7c fe 53 bc 8e 96 c3 8e be 32 ff | 43 00 6d 58 cd 42 72 b2 1b fc 90 55 08 bf 9d 89 | 5e b3 d9 d7 ab 1d c3 3d 09 0d c3 a0 b4 39 9a 0c | ea 26 37 38 25 17 00 86 5a bc 7b e6 34 6a b8 82 | f3 f9 2d 18 8b 60 8a e1 44 59 97 9d 3d 8f e9 c5 | f8 41 9b cd 41 cb 5c 6e 45 99 77 f2 5a 87 7b f0 | 1d 7f 22 98 41 7d c2 e4 77 82 d2 02 ca 3f 14 b4 | ed 6e 31 66 40 7e 40 f0 ba 85 c9 d3 8f 47 3c 65 | b9 d2 a6 cf 54 28 00 31 9f 56 44 5d 75 4a b4 99 | 1b dd 03 d3 13 f1 55 d7 db 2e bc 45 cf 65 35 32 | 29 00 00 24 67 e3 6e 73 a7 21 14 7b f9 65 b0 3b | c5 ad 46 44 e6 80 5b 79 23 9d d2 69 99 df e6 8a | c8 33 da 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 9d 30 3b 19 a7 57 ef 03 62 55 06 | 80 94 c0 4d a8 e2 a5 61 00 00 00 1c 00 00 40 05 | d9 d1 f1 c9 94 93 28 e9 a6 95 bd a3 15 8f 8e 30 | 15 95 ff 3f | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46906b40 | #15 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 a2 6e 3b 12 a8 59 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #15 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #15 | rejected packet: | 26 a2 6e 3b 12 a8 59 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #15: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a12c70 | handling event EVENT_RETRANSMIT for parent state #38 | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #38 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #38 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49605.967125; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003093 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46906b40 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #38 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 "road-eastnet-nonat-38" #38: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #38) | 63 6f 4b 9c a2 38 4b f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 c6 a0 5e 80 62 3e 9a 9c 42 e1 05 80 df 04 bf | 1e b5 eb a5 bb ef bc 82 8b e6 75 a7 2e 01 28 64 | e4 76 b9 2e 24 4c bf de dc 13 dd 2b 71 c5 93 43 | 1b 46 d4 7e b2 da 9a 48 5b 59 35 a7 05 07 a3 e4 | 2d c6 06 3d 04 99 06 6d e6 f3 82 a2 e0 b0 3d 7e | 06 24 2a d6 83 0e 98 7d 98 49 2f 5f ab 8e 6a a0 | d8 9e 97 9f 3a b5 0b 41 09 f4 3d 1d 01 c6 79 69 | 84 a4 53 1f bd 4e 48 87 76 0d 6e 5e db cc c6 9f | 32 ff 46 70 0d 72 cf 06 98 99 df 58 29 5b 2c 8c | fb 98 a9 76 0f 25 88 9a f5 19 cc e3 5c 2b 68 1d | 01 4d 25 7a f1 7a 21 df b2 8f 9c 28 7d d1 ec da | 1d aa a1 0e 2a 91 6c fc cd c9 76 e7 51 08 7a ff | e5 ff f8 19 fa 3a 8e cc 1e 84 49 b9 c5 19 d0 a9 | d3 37 e2 20 31 e7 32 dd 71 90 7c 76 34 4e 29 57 | 1e 56 51 56 0c 5f 17 75 67 40 80 dc 44 27 6b 9a | c7 16 b2 3b 68 69 4b 25 42 5f 6c bd 14 34 a0 fd | 29 00 00 24 11 36 0f 5e a0 00 74 be 57 cf e9 ad | 0b 41 64 75 76 be 45 9c 57 4a dd ea fc 94 1e c3 | 3b 87 2f 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b 5e 04 97 03 6e 1a 6a 1c 69 28 d2 | a2 f5 94 bd 95 4c fa 5e 00 00 00 1c 00 00 40 05 | aa 31 5d 54 cf 5a 81 b9 1b cd fe 19 22 77 54 6d | f5 50 1b 4f | libevent_free: release ptr-libevent@0x7fb37800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a12c70 | #38 spent 0.175 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 6f 4b 9c a2 38 4b f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #38 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #38 | rejected packet: | 63 6f 4b 9c a2 38 4b f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #38: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-64" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-64' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #64 at 0x557d46a2c0d0 | State DB: adding IKEv2 state #64 in UNDEFINED | pstats #64 ikev2.ike started | Message ID: init #64: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #64: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #64; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-64" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-64" IKE SA #64 "road-eastnet-nonat-64" "road-eastnet-nonat-64" #64: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-64 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-64": constructed local IKE proposals for road-eastnet-nonat-64 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 64 for state #64 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a24730 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #64 | libevent_malloc: new ptr-libevent@0x7fb37800cf80 size 128 | #64 spent 0.129 milliseconds in ikev2_parent_outI1() | crypto helper 9 resuming | crypto helper 9 starting work-order 64 for state #64 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 64 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-64" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.222 milliseconds in whack | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 64 time elapsed 0.000815 seconds | (#64) spent 0.786 milliseconds in crypto helper computing work-order 64: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 64 for state #64 to event queue | scheduling resume sending helper answer for #64 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #64 | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 64 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #64 | **emit ISAKMP Message: | initiator cookie: | 28 7e be 04 bb c7 3c e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-64 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 90 7e 43 6c c6 61 f7 8d 74 52 44 4a 1c ca e7 9e | ikev2 g^x ac 14 d9 31 6d 60 9d f4 ba 6e c2 e0 7b d5 53 a3 | ikev2 g^x 16 85 f9 c3 ce f8 f1 6f bf 00 c2 bc 5a d4 f5 80 | ikev2 g^x d8 8f 02 50 d5 75 7e 2e dc 8c e1 ab a9 5d a2 cc | ikev2 g^x da fa 4e bf fb 7e 0d a9 06 25 1f 41 e3 0d cd 1b | ikev2 g^x 1a a7 53 a9 ce 79 cd b5 77 9b b8 2e 89 66 fa cb | ikev2 g^x ad fc 1f a1 86 e2 14 75 9e d9 ee bd ba f9 9f 7c | ikev2 g^x e4 64 68 99 18 9c 70 2b 82 20 55 55 75 56 88 5d | ikev2 g^x d8 d5 c7 f6 4d e5 dc 25 37 08 b7 1b d0 a6 99 40 | ikev2 g^x 0a 49 58 f6 83 1c 88 a0 08 dc b3 c1 aa ed 91 6f | ikev2 g^x c6 a5 be 4d 6b b9 bb 18 cf 12 ba 0d 71 89 70 ef | ikev2 g^x 66 fa c4 5b 33 09 3f ff 55 ca 19 24 9a 74 4d 4c | ikev2 g^x d1 a6 e0 57 41 7a 44 3f b8 12 3a 3f 06 a7 52 cd | ikev2 g^x 97 1c e0 a8 3c be fa 81 97 1d d6 2b 3f 0b c8 9f | ikev2 g^x b8 ad e1 63 a0 10 8f f1 ce 62 64 83 9e 28 1c 57 | ikev2 g^x ba 8c 77 7e 6f fe 44 22 ea fc fc 43 05 9a a7 9f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d6 fa 6f 28 11 8e 89 70 36 5a 3b d2 30 2c 96 5f | IKEv2 nonce 7f e3 aa dc e7 9f 74 e4 9d 9a 67 37 a5 4e 3a 23 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 28 7e be 04 bb c7 3c e9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 40 | natd_hash: port= 01 f4 | natd_hash: hash= 78 34 45 e6 51 f4 83 8b a3 3b 13 c9 fe 48 d2 4a | natd_hash: hash= 75 21 a9 ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 78 34 45 e6 51 f4 83 8b a3 3b 13 c9 fe 48 d2 4a | Notify data 75 21 a9 ed | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 28 7e be 04 bb c7 3c e9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1b 38 c5 d0 41 1e ff f1 67 34 2b 17 6a 69 bf 2e | natd_hash: hash= 0c d6 b9 4f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b 38 c5 d0 41 1e ff f1 67 34 2b 17 6a 69 bf 2e | Notify data 0c d6 b9 4f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #64 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #64: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #64 to 4294967295 after switching state | Message ID: IKE #64 skipping update_recv as MD is fake | Message ID: sent #64 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-64" #64: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.64:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #64) | 28 7e be 04 bb c7 3c e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 7e 43 6c c6 61 f7 8d 74 52 44 4a 1c ca e7 9e | ac 14 d9 31 6d 60 9d f4 ba 6e c2 e0 7b d5 53 a3 | 16 85 f9 c3 ce f8 f1 6f bf 00 c2 bc 5a d4 f5 80 | d8 8f 02 50 d5 75 7e 2e dc 8c e1 ab a9 5d a2 cc | da fa 4e bf fb 7e 0d a9 06 25 1f 41 e3 0d cd 1b | 1a a7 53 a9 ce 79 cd b5 77 9b b8 2e 89 66 fa cb | ad fc 1f a1 86 e2 14 75 9e d9 ee bd ba f9 9f 7c | e4 64 68 99 18 9c 70 2b 82 20 55 55 75 56 88 5d | d8 d5 c7 f6 4d e5 dc 25 37 08 b7 1b d0 a6 99 40 | 0a 49 58 f6 83 1c 88 a0 08 dc b3 c1 aa ed 91 6f | c6 a5 be 4d 6b b9 bb 18 cf 12 ba 0d 71 89 70 ef | 66 fa c4 5b 33 09 3f ff 55 ca 19 24 9a 74 4d 4c | d1 a6 e0 57 41 7a 44 3f b8 12 3a 3f 06 a7 52 cd | 97 1c e0 a8 3c be fa 81 97 1d d6 2b 3f 0b c8 9f | b8 ad e1 63 a0 10 8f f1 ce 62 64 83 9e 28 1c 57 | ba 8c 77 7e 6f fe 44 22 ea fc fc 43 05 9a a7 9f | 29 00 00 24 d6 fa 6f 28 11 8e 89 70 36 5a 3b d2 | 30 2c 96 5f 7f e3 aa dc e7 9f 74 e4 9d 9a 67 37 | a5 4e 3a 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 34 45 e6 51 f4 83 8b a3 3b 13 c9 | fe 48 d2 4a 75 21 a9 ed 00 00 00 1c 00 00 40 05 | 1b 38 c5 d0 41 1e ff f1 67 34 2b 17 6a 69 bf 2e | 0c d6 b9 4f | state #64 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37800cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a24730 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8e0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #64 | libevent_malloc: new ptr-libevent@0x7fb37800cf80 size 128 | #64 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49605.969775 | resume sending helper answer for #64 suppresed complete_v2_state_transition() and stole MD | #64 spent 0.463 milliseconds in resume sending helper answer | stop processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3780180b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 7e be 04 bb c7 3c e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #64 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #64 | rejected packet: | 28 7e be 04 bb c7 3c e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #64: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #52 | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #52 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #52 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49606.002982; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003837 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ddbf0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #52 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 "road-eastnet-nonat-52" #52: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #52) | 3f 70 d8 3e f5 22 c6 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 a5 a2 fa 37 05 a0 83 be fb 7c 66 e8 09 2d 85 | 01 d0 84 ba 7e 80 ad 7e ed 7e 94 4b 5a d1 13 c1 | b1 3f 59 cf ac e4 bd 6c 95 59 bf de 9d 80 55 dd | 6c d4 7d e3 9f 38 7c 31 e7 3a f4 3d 5f ba 5a 68 | 83 7f 56 b6 a6 97 f9 9a 87 45 7b ad 59 c8 c8 c2 | 85 24 f6 8d 4c 54 59 44 37 96 77 29 ac 68 3f 6e | df da 66 fc fd e2 52 7f c0 d8 5a 6e 87 c7 d0 ea | dd 74 ac b4 2a 5c 26 2d 8f 9d 33 80 5d 13 86 23 | e5 74 ae 2d f0 58 19 74 bb 0c 9a fe 02 e9 ea 18 | 9b e9 68 5d 7c 72 e9 79 59 15 c2 74 d4 16 6f 97 | c0 92 81 74 a6 70 c8 c9 0a 8b 1e 5b 97 dd a0 5d | 10 4a 89 98 ee 3e 73 f8 ad 8e 0b 84 2b bb 87 07 | d3 19 10 ac f4 31 29 ae a0 fb 57 db 57 8e e8 3d | 7b 1c bf f9 0f c4 88 43 de 6a ac 3c e2 0b 51 3c | 47 b2 1e 04 99 56 29 39 94 ab 53 44 ad 54 e0 54 | 9d 52 e0 9a 6d 24 de d9 e3 52 91 a1 b5 19 19 fc | 29 00 00 24 bc 06 52 3b 0a a9 d6 55 15 a3 be 4e | de 77 6e 83 33 60 ab 6d e9 76 1e 6c cb ab 4d 19 | f5 ca 65 a4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 c4 b5 bf ec 75 31 9e 5d c6 9c 0c | 53 7b fb 92 b5 6c 20 70 00 00 00 1c 00 00 40 05 | 2a 93 28 00 9d ed cf 28 c2 1f ba 32 c1 4a e1 a2 | d1 c6 7c 44 | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | #52 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f 70 d8 3e f5 22 c6 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #52 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #52 | rejected packet: | 3f 70 d8 3e f5 22 c6 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #52: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0477 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350005860 | handling event EVENT_RETRANSMIT for parent state #57 | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #57 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #57 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49606.005277; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.497437 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #57 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 "road-eastnet-nonat-57" #57: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #57) | dc 73 20 b1 64 22 3b 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 2f 93 7c 8a da 22 fa 03 a0 fd 43 de d5 8f 84 | 5a 41 29 20 95 01 7c 7c 28 a1 27 22 f2 08 de cf | e0 98 16 08 1c e5 25 a6 bd bd 17 32 15 8e 0a 84 | f3 a2 7e 8a 0b 23 85 bf 7a b1 94 6d 13 0e bc 89 | 00 57 96 19 37 39 1b 02 a4 75 0f 94 90 d1 10 4b | e3 d2 66 0a 4f b7 c6 79 75 d4 b5 7d e4 36 1f c8 | 04 58 22 28 f1 96 40 a5 11 63 03 12 07 da 6e c4 | d6 87 58 17 eb bc 28 31 1f 88 9d a5 0c ef e1 d5 | b2 c3 d0 ee 08 43 a9 fb b1 8f de 78 3c c7 ae 7f | e9 04 ce d2 ab ca 37 0c f1 2a 72 1c 60 e7 51 7f | f2 49 54 44 b1 5f 43 7b 10 10 64 5c c3 44 75 d6 | 07 11 18 89 6c 1c 54 ef 0a c3 7f 69 cd 21 c7 ca | 32 33 4c f8 00 03 d2 d4 0f 41 96 9b 82 7d 76 81 | 10 2f 53 dd cd 91 0b 3d ff 38 8f 40 80 5c 77 b7 | 3d 66 a7 7b a1 8f 9e 2d 33 51 5c 72 92 e6 a3 7a | 40 cc ae 39 5f df 20 2b 13 8b bd 4c 81 23 66 a3 | 29 00 00 24 ad 63 ea 8e 7a 7b c2 d1 15 38 47 f0 | b3 a0 1a e0 85 11 f2 24 75 cc 3c d8 47 12 da f1 | 4a 24 d2 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 1b 4d 24 72 19 56 63 62 33 64 a7 | 66 22 df c0 bd 29 cc 1c 00 00 00 1c 00 00 40 05 | 7a aa 57 0f 26 4b 8b c1 eb 1a a3 08 c1 cf b1 49 | 59 b9 d4 8a | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350005860 | #57 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 73 20 b1 64 22 3b 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #57 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #57 | rejected packet: | dc 73 20 b1 64 22 3b 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #57: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0566 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-65" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-65' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #65 at 0x557d46a2d690 | State DB: adding IKEv2 state #65 in UNDEFINED | pstats #65 ikev2.ike started | Message ID: init #65: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #65: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #65; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-65" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-65" IKE SA #65 "road-eastnet-nonat-65" "road-eastnet-nonat-65" #65: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-65 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-65": constructed local IKE proposals for road-eastnet-nonat-65 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 65 for state #65 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb350005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #65 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 | #65 spent 0.139 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 resuming | crypto helper 10 starting work-order 65 for state #65 | RESET processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 65 | RESET processing: connection "road-eastnet-nonat-65" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.269 milliseconds in whack | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 65 time elapsed 0.001179 seconds | (#65) spent 0.981 milliseconds in crypto helper computing work-order 65: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 65 for state #65 to event queue | scheduling resume sending helper answer for #65 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #65 | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 65 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #65 | **emit ISAKMP Message: | initiator cookie: | ef 12 90 5c 48 7d 35 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-65 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 50 1d 09 25 1e 78 f1 ab 15 10 4e 97 1c df 6e dc | ikev2 g^x ea a4 f2 51 40 2c fc 70 83 3b d1 14 8e 0e 9b f0 | ikev2 g^x ed 07 86 8f 8c 86 61 7e ec 48 49 64 93 36 5d 3e | ikev2 g^x 17 1f e8 61 4f 64 88 6f dc 05 20 78 89 b7 e5 6b | ikev2 g^x 2c bb be 5b d1 73 00 a1 4f 26 6a 56 a9 d6 41 92 | ikev2 g^x 2d 76 96 98 ed 1d 08 e4 99 fe 2c 5e 06 f5 6b bd | ikev2 g^x 7e 5c 39 22 bf ae a8 e1 92 1c 13 3f 1d 70 c4 80 | ikev2 g^x 07 a5 77 ff 91 5d 4b 48 ee 7b fd 40 d0 32 19 b5 | ikev2 g^x 09 de 90 f8 5a 03 1b 2a 6a c3 ef 64 b2 ec 44 55 | ikev2 g^x 99 02 c6 b9 5e db b2 cd f2 ce d4 a6 86 55 55 7c | ikev2 g^x 29 4f 4b ce 6a 0b b1 f7 34 a8 01 90 c9 f9 c3 1c | ikev2 g^x 81 d7 a5 bb 19 5a 7d e2 de 08 df 1d b2 6d 5a f1 | ikev2 g^x 1e a2 87 2c 96 1b c7 cb 00 ed 5b 85 f3 b5 ad fb | ikev2 g^x 85 9e 29 58 fd ca dd fe cc ef 21 ce b6 4c a2 4d | ikev2 g^x d7 d2 d7 9a 36 aa ca e6 4f 15 82 d8 a4 cd 14 4f | ikev2 g^x 08 9f 68 62 be 95 a7 c1 d4 3f 0f 63 b9 f6 80 56 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 56 09 76 96 73 f6 7a d5 b4 ac d9 d3 f5 d3 52 17 | IKEv2 nonce 38 15 85 8c 5c 9b 9d d9 ed a7 ee 26 3a e8 6f 86 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ef 12 90 5c 48 7d 35 a0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 41 | natd_hash: port= 01 f4 | natd_hash: hash= f7 23 18 fa b0 e0 93 30 87 95 e8 a3 79 bf 51 a0 | natd_hash: hash= e1 20 e5 2d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f7 23 18 fa b0 e0 93 30 87 95 e8 a3 79 bf 51 a0 | Notify data e1 20 e5 2d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ef 12 90 5c 48 7d 35 a0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 26 a2 95 ca b7 c9 12 03 be 34 1f 1e 21 7b 79 10 | natd_hash: hash= 86 6d e0 e7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 26 a2 95 ca b7 c9 12 03 be 34 1f 1e 21 7b 79 10 | Notify data 86 6d e0 e7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #65 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #65: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #65 to 4294967295 after switching state | Message ID: IKE #65 skipping update_recv as MD is fake | Message ID: sent #65 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-65" #65: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.65:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #65) | ef 12 90 5c 48 7d 35 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 1d 09 25 1e 78 f1 ab 15 10 4e 97 1c df 6e dc | ea a4 f2 51 40 2c fc 70 83 3b d1 14 8e 0e 9b f0 | ed 07 86 8f 8c 86 61 7e ec 48 49 64 93 36 5d 3e | 17 1f e8 61 4f 64 88 6f dc 05 20 78 89 b7 e5 6b | 2c bb be 5b d1 73 00 a1 4f 26 6a 56 a9 d6 41 92 | 2d 76 96 98 ed 1d 08 e4 99 fe 2c 5e 06 f5 6b bd | 7e 5c 39 22 bf ae a8 e1 92 1c 13 3f 1d 70 c4 80 | 07 a5 77 ff 91 5d 4b 48 ee 7b fd 40 d0 32 19 b5 | 09 de 90 f8 5a 03 1b 2a 6a c3 ef 64 b2 ec 44 55 | 99 02 c6 b9 5e db b2 cd f2 ce d4 a6 86 55 55 7c | 29 4f 4b ce 6a 0b b1 f7 34 a8 01 90 c9 f9 c3 1c | 81 d7 a5 bb 19 5a 7d e2 de 08 df 1d b2 6d 5a f1 | 1e a2 87 2c 96 1b c7 cb 00 ed 5b 85 f3 b5 ad fb | 85 9e 29 58 fd ca dd fe cc ef 21 ce b6 4c a2 4d | d7 d2 d7 9a 36 aa ca e6 4f 15 82 d8 a4 cd 14 4f | 08 9f 68 62 be 95 a7 c1 d4 3f 0f 63 b9 f6 80 56 | 29 00 00 24 56 09 76 96 73 f6 7a d5 b4 ac d9 d3 | f5 d3 52 17 38 15 85 8c 5c 9b 9d d9 ed a7 ee 26 | 3a e8 6f 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 23 18 fa b0 e0 93 30 87 95 e8 a3 | 79 bf 51 a0 e1 20 e5 2d 00 00 00 1c 00 00 40 05 | 26 a2 95 ca b7 c9 12 03 be 34 1f 1e 21 7b 79 10 | 86 6d e0 e7 | state #65 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb350005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #65 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 | #65 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49606.034512 | resume sending helper answer for #65 suppresed complete_v2_state_transition() and stole MD | #65 spent 0.438 milliseconds in resume sending helper answer | stop processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c0180b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 12 90 5c 48 7d 35 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #65 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #65 | rejected packet: | ef 12 90 5c 48 7d 35 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #65: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0575 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #39 | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #39 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #39 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49606.047744; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002453 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a12c70 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #39 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 "road-eastnet-nonat-39" #39: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #39) | 19 fb 2f c4 ac 44 fb 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e b1 09 86 9c 45 db 95 7b d2 00 66 c6 50 ec 38 | 85 24 bf d9 80 0e ac 2e 4c 6c 22 df ca 10 97 2e | 3e b3 c6 bc af 43 d2 f1 96 a9 4b 69 aa cd 6c e0 | 9b a6 4b b2 87 0e 1c ca 32 4c 46 ee 52 f9 70 fd | fe 31 27 8d 61 a4 9c 97 7a a3 30 46 a8 d5 6f 83 | a7 6a c3 e9 ff 23 17 48 fe 4f dd cf 4e a9 a1 5e | d7 78 c0 fe 7d d7 62 84 4a b2 9d ae 37 bc ab ed | d5 8c 32 96 61 41 3f 21 7c ca ab 28 b6 ad 04 a3 | c6 dc bc c3 e1 13 16 74 7a 42 5b e7 e2 a2 c1 8c | b7 73 45 24 dc 37 dd 6b f2 55 c7 4f 97 81 79 6f | 14 cb 11 1e b4 40 01 19 cd a9 dd 29 3f 6f e4 ee | 95 68 2f 56 df 0a 08 86 e6 cd 7f a3 7b 00 61 f4 | c5 7c bb 03 05 36 7a 30 d5 36 53 38 4c f8 39 18 | 08 9c f5 06 b6 85 f9 e9 1b ab 6e 6e 92 66 b2 2b | 43 5a 44 5b 6f f1 98 dd 01 3a 01 23 5e f7 bc 7d | 6e f5 05 b9 ec 45 1c 8c 77 33 f8 a3 1c 1e 8c 99 | 29 00 00 24 2f 9c d8 9a 10 ed a2 18 bd 6a 97 cb | 42 26 f8 54 76 a0 4d 6e 60 6c fb c1 ce 0f 53 f0 | 1f 6b 99 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 74 e0 c5 89 b2 32 b1 7d 7b 02 d3 | e0 e6 47 82 80 6f 9f 55 00 00 00 1c 00 00 40 05 | 2e a2 7a f5 ee f4 77 35 9e db 48 5d 65 9b e7 f5 | e4 1e af e9 | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #39 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 19 fb 2f c4 ac 44 fb 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #39 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #39 | rejected packet: | 19 fb 2f c4 ac 44 fb 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #39: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a03d30 | handling event EVENT_RETRANSMIT for parent state #53 | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #53 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #53 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49606.077092; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002028 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #53 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 "road-eastnet-nonat-53" #53: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #53) | 22 bd 87 7d 85 b9 18 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 30 f1 21 57 e7 a6 a0 b1 5a 51 b3 c9 69 4a 15 | 0c ef ee d8 55 97 13 32 e2 cf 8d c8 f3 74 4c 97 | 22 ad ca ab 81 a4 a0 26 9d e6 3b e7 1c 2b d2 a1 | d6 72 47 dd ab 72 ec c1 cc d7 d9 8f d8 66 bc e6 | 53 77 a5 12 d5 84 8f 13 60 d3 99 01 c2 30 50 56 | 18 a7 45 bc dd f7 11 3f 14 e8 e1 27 67 4e d9 50 | bb c0 6c 1a d8 e9 1e 81 c4 fa a9 14 22 9d 32 b4 | e1 11 67 1b f4 56 6f d3 5b 27 83 19 34 08 ee 9b | f3 6b 24 bb c8 a8 09 ee 97 89 49 a0 fb 47 38 93 | ca a8 21 f6 da 4a ff ce b8 5a 83 17 3c fa b5 a4 | 1d 50 f4 b9 26 78 5e a6 78 30 f6 80 a4 cd 3e ae | ea 19 26 25 27 2f a8 b0 bc e9 8e dc 47 51 61 79 | 07 e7 6e 1f 82 d0 fe 19 b0 44 4b f8 92 c9 fb 82 | 83 56 b0 37 a7 92 bf 23 17 cb fb 8b 75 11 c5 e0 | 1d 95 a6 1f 6a 1b 78 a9 5c 16 4e 89 74 ff c7 5a | 43 0f 1f 26 45 20 46 36 e0 37 07 46 11 e2 7c fd | 29 00 00 24 1d d0 6e d2 14 3b 95 3d 7a f3 16 f0 | 13 a4 5c 97 24 08 af 2b 29 b2 1a e1 3b dc 59 4d | 62 47 73 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 de d2 d7 2b e1 3c 0c 4b a2 6a 97 | 5e 9e de 30 79 3d d7 e0 00 00 00 1c 00 00 40 05 | de 44 b7 78 c2 27 43 2d 86 e9 13 34 57 72 8f 74 | 48 51 21 6e | libevent_free: release ptr-libevent@0x7fb35800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a03d30 | #53 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 22 bd 87 7d 85 b9 18 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #53 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #53 | rejected packet: | 22 bd 87 7d 85 b9 18 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #53: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0552 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #58 | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #58 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #58 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49606.091421; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500359 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f2060 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #58 | libevent_malloc: new ptr-libevent@0x7fb35800cf80 size 128 "road-eastnet-nonat-58" #58: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #58) | 0b a9 81 95 1f 0d 8e 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f b0 e3 df ce d1 d0 b9 30 6e 16 b3 e7 cf 92 e5 | a6 70 0e 23 5e 02 05 19 f5 b5 1a 04 6c 5e 7d a2 | 79 25 aa 0e 70 2a 25 1f 1c 02 b5 fc b9 3e 75 ad | e7 1e f1 8c 9c 7f 92 92 1d dc b1 ca 6d cf 53 ac | b8 0b 70 9b 2c 6a e7 8d 07 95 ae e1 37 ab ac 14 | 91 d8 79 4c ef 08 d0 d9 b0 55 82 09 5f 15 d9 df | e8 2c 4e cb ea a0 59 1c 81 c7 f6 39 0a 52 62 8e | 4b 57 28 22 1f d7 52 eb ec 16 d8 46 16 0a 27 88 | c7 c5 f7 e2 87 71 a1 2d 5e 9c 25 83 70 f1 a8 0c | df 63 58 3a 6f ba 9a fc 71 ac 13 82 0c ff 96 f7 | b2 3e 0f af a2 df f1 69 8f db ce 47 13 89 8f fd | ce 0a 15 3f 64 ea 8f f4 c7 b7 5e 3b b0 17 0a 90 | ef 23 ff a9 81 27 7d 7c ee 7a 36 7f 56 c1 b8 52 | 77 69 e0 69 4b 05 7c e7 a7 d2 48 f2 eb ac 08 c4 | 5f 9f b5 9e fc d5 98 d0 41 7f 9b ec 07 64 d8 f7 | 80 37 a2 97 6c ab e1 aa b4 48 78 11 a3 f3 d8 0a | 29 00 00 24 dd 82 37 0e 6e 7f fd 43 0e f6 0a 6a | 68 bc 25 88 0a 9e 3e 74 64 09 ae e7 87 f2 db fe | 06 d2 df 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 02 ef 4d 47 45 3b d6 d5 d7 fa ad | b5 dd 5d f9 98 95 75 30 00 00 00 1c 00 00 40 05 | 0c 06 c0 09 b1 a9 53 e2 00 18 ae 12 95 c7 71 d4 | 78 09 4b e3 | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #58 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b a9 81 95 1f 0d 8e 78 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #58 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #58 | rejected packet: | 0b a9 81 95 1f 0d 8e 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #58: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-66" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-66' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #66 at 0x557d46a2ec50 | State DB: adding IKEv2 state #66 in UNDEFINED | pstats #66 ikev2.ike started | Message ID: init #66: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #66: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #66; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-66" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-66" IKE SA #66 "road-eastnet-nonat-66" "road-eastnet-nonat-66" #66: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-66 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-66": constructed local IKE proposals for road-eastnet-nonat-66 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 66 for state #66 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #66 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #66 spent 0.154 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-66" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.245 milliseconds in whack | crypto helper 14 resuming | crypto helper 14 starting work-order 66 for state #66 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 66 | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 66 time elapsed 0.000956 seconds | (#66) spent 0.96 milliseconds in crypto helper computing work-order 66: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 66 for state #66 to event queue | scheduling resume sending helper answer for #66 | libevent_malloc: new ptr-libevent@0x7fb3700180b0 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #66 | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 66 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #66 | **emit ISAKMP Message: | initiator cookie: | 64 fc 26 82 c6 65 9b e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-66 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 48 5c 42 12 a8 cf 54 30 35 41 88 3e 73 38 e5 58 | ikev2 g^x 88 e1 84 4c b4 74 fd b0 fa c4 88 6f 83 90 67 ee | ikev2 g^x ea 08 5d 03 f5 21 c1 48 f4 fa d9 68 de f8 02 e9 | ikev2 g^x 20 8c 8f 00 bb e0 27 04 09 fe 8d f2 a1 9c cf 02 | ikev2 g^x 35 98 ce 70 23 87 ee fc 94 cd 0c 7b 9f 06 08 77 | ikev2 g^x f2 7f c2 13 7f e1 04 f8 2f 23 ef 1d fb 54 4c 0d | ikev2 g^x ac 20 e0 c8 bd 84 3e ce b6 49 37 85 56 01 f1 9b | ikev2 g^x ac 54 85 9c fd 7d 5d 63 30 bd f9 4d d5 7a c1 a0 | ikev2 g^x 6c 64 e9 25 18 ed 7b 3f 1a a2 52 c0 47 b8 c4 ff | ikev2 g^x 46 70 76 9b eb db 63 e5 d9 0f fb e2 44 f2 65 5e | ikev2 g^x ab 82 c1 e9 45 5a aa 38 88 06 f2 1d 2e 7b 75 16 | ikev2 g^x bf 94 df 07 bd 89 cd 9e ba b0 6c 38 fc 80 69 75 | ikev2 g^x 55 88 bd 23 1e bc ab 76 6d 9e ce 05 ea ee d0 f1 | ikev2 g^x 1a bd 0c b1 86 63 56 69 8c 5f 2e 8a f5 e2 c1 97 | ikev2 g^x 10 bc e7 eb 71 fb 81 cd 25 de 9b 6d 12 04 dd ce | ikev2 g^x 36 90 99 3b a3 2d 73 4a 99 7b f0 18 dc 83 2b 7d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 64 f2 bd 07 f3 b0 6e 75 d4 40 2c d9 f4 e5 3f 9a | IKEv2 nonce 4d aa 41 b2 3f a1 6e 03 4f 7d 3f ec 58 37 55 7d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 64 fc 26 82 c6 65 9b e6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 42 | natd_hash: port= 01 f4 | natd_hash: hash= 9d dc 62 51 f8 7c c3 1c 6d 46 26 31 c0 6e bd 6d | natd_hash: hash= 19 0c cf 42 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9d dc 62 51 f8 7c c3 1c 6d 46 26 31 c0 6e bd 6d | Notify data 19 0c cf 42 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 64 fc 26 82 c6 65 9b e6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 76 be 2b c3 74 ff 88 3d a8 f9 74 84 97 f5 dc 48 | natd_hash: hash= 6c 56 c4 9c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 76 be 2b c3 74 ff 88 3d a8 f9 74 84 97 f5 dc 48 | Notify data 6c 56 c4 9c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #66 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #66: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #66 to 4294967295 after switching state | Message ID: IKE #66 skipping update_recv as MD is fake | Message ID: sent #66 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-66" #66: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.66:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #66) | 64 fc 26 82 c6 65 9b e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 5c 42 12 a8 cf 54 30 35 41 88 3e 73 38 e5 58 | 88 e1 84 4c b4 74 fd b0 fa c4 88 6f 83 90 67 ee | ea 08 5d 03 f5 21 c1 48 f4 fa d9 68 de f8 02 e9 | 20 8c 8f 00 bb e0 27 04 09 fe 8d f2 a1 9c cf 02 | 35 98 ce 70 23 87 ee fc 94 cd 0c 7b 9f 06 08 77 | f2 7f c2 13 7f e1 04 f8 2f 23 ef 1d fb 54 4c 0d | ac 20 e0 c8 bd 84 3e ce b6 49 37 85 56 01 f1 9b | ac 54 85 9c fd 7d 5d 63 30 bd f9 4d d5 7a c1 a0 | 6c 64 e9 25 18 ed 7b 3f 1a a2 52 c0 47 b8 c4 ff | 46 70 76 9b eb db 63 e5 d9 0f fb e2 44 f2 65 5e | ab 82 c1 e9 45 5a aa 38 88 06 f2 1d 2e 7b 75 16 | bf 94 df 07 bd 89 cd 9e ba b0 6c 38 fc 80 69 75 | 55 88 bd 23 1e bc ab 76 6d 9e ce 05 ea ee d0 f1 | 1a bd 0c b1 86 63 56 69 8c 5f 2e 8a f5 e2 c1 97 | 10 bc e7 eb 71 fb 81 cd 25 de 9b 6d 12 04 dd ce | 36 90 99 3b a3 2d 73 4a 99 7b f0 18 dc 83 2b 7d | 29 00 00 24 64 f2 bd 07 f3 b0 6e 75 d4 40 2c d9 | f4 e5 3f 9a 4d aa 41 b2 3f a1 6e 03 4f 7d 3f ec | 58 37 55 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d dc 62 51 f8 7c c3 1c 6d 46 26 31 | c0 6e bd 6d 19 0c cf 42 00 00 00 1c 00 00 40 05 | 76 be 2b c3 74 ff 88 3d a8 f9 74 84 97 f5 dc 48 | 6c 56 c4 9c | state #66 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #66 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #66 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49606.096474 | resume sending helper answer for #66 suppresed complete_v2_state_transition() and stole MD | #66 spent 0.375 milliseconds in resume sending helper answer | stop processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3700180b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 fc 26 82 c6 65 9b e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #66 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #66 | rejected packet: | 64 fc 26 82 c6 65 9b e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #66: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338005860 | handling event EVENT_RETRANSMIT for parent state #16 | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #16 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #16 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49606.10864; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006206 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a24730 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #16 | libevent_malloc: new ptr-libevent@0x7fb3700180b0 size 128 "road-eastnet-nonat-16" #16: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #16) | 6b 57 6c f9 94 8d 37 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 79 95 56 0f 3a d5 d4 38 4f 8b a1 27 c3 02 1b | 5e 3a 85 e1 08 09 e6 fc a8 62 0f 43 42 55 29 b8 | e4 f9 04 77 e0 10 6e f0 87 0e 34 48 79 7d 7a e8 | ca f4 cc cc 99 09 3c b6 c2 35 0f bc 7b 2d 41 d5 | dd f7 e4 e1 a4 f1 02 00 be 44 4b 47 7e b4 a8 a2 | 62 b7 14 ca 2d 3c f6 2d ca f0 71 35 95 46 55 c7 | 1c ba 8e 83 ee 6a 95 4e 0b 06 27 00 95 fd 56 5f | a2 f2 d6 ed a0 30 96 bf 3e 03 94 41 ed 51 4c 15 | 54 db 62 3c 9c 56 76 98 56 78 f9 0d a3 f4 ac 74 | a4 8d 21 e9 c2 d6 c6 f2 bf cc ab 95 d5 b5 69 db | 99 07 4a 4f 0a fb b6 0d 07 d8 b8 7a ef c0 3c c0 | fa 7f 1c 08 05 55 7f 42 6a 4f 4e 4e 1f 35 3a 92 | 3a 9a 25 4f 7a 92 43 f1 5a 60 e4 7c d0 47 d1 12 | 01 ce a1 b9 b7 b6 c9 00 28 c2 19 89 84 44 e5 78 | 95 8c db 08 69 6a 49 44 32 07 7d 96 fb 06 00 43 | c3 4e a1 ee cd 85 94 29 a6 9f 2d d7 39 41 3b c9 | 29 00 00 24 85 0d a1 fb 37 74 4a 69 68 3b 97 74 | ca a6 8b 60 be e5 4d eb 21 82 d1 c7 17 0f 24 83 | fe 05 13 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 42 5d 5a fd 9e 39 f4 1d d5 d8 fc | 51 9a 83 f2 5f a0 b0 5a 00 00 00 1c 00 00 40 05 | 36 95 c1 ea ee d0 12 21 b4 68 71 46 60 49 f3 80 | 34 92 b4 f4 | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338005860 | #16 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b 57 6c f9 94 8d 37 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #16 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #16 | rejected packet: | 6b 57 6c f9 94 8d 37 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #16: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.049 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_RETRANSMIT for parent state #40 | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #40 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #40 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49606.112935; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002659 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #40 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-40" #40: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #40) | f4 2d ea 23 2d fd 9f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 1a 9e 5c fb fb e3 3a 12 40 55 ea 02 66 64 cb | 69 42 9f 9e 73 38 34 f9 9b 29 99 d0 1f 2f 62 b0 | ff 78 90 10 b8 86 3f 49 a8 32 be f6 08 0d 11 29 | 94 2b 8b de b8 63 2c 35 79 92 00 39 68 56 d7 ad | 7e 9a a2 59 50 2b c4 f8 63 a3 0c 5d 5e 44 62 5b | fc 42 68 dd ca 56 4c 44 63 17 39 39 e0 00 1c 8f | c5 28 a6 4f 80 e9 f0 8c 5a ea 63 37 5f d7 0a a3 | b8 dc 6a fd 41 02 14 01 fa 2f 62 ae cb f1 1e 40 | 2f 20 1d 4c b4 7d c9 2c fa 60 f5 5e 61 26 a0 89 | b5 80 ba fe 31 f9 79 3e 12 33 cf 6c 99 9f 52 55 | 62 d6 02 f9 0e 35 e1 e7 8d 67 93 09 10 77 15 30 | 4a e9 d6 a0 31 50 fb be 13 05 50 dc f4 46 03 08 | 2f 95 1b 33 25 b1 ea 42 27 b1 8d 6c a6 26 e8 12 | 28 ee 49 16 a3 ec 76 ad 9e 1b cb d5 8a 26 5b 22 | 55 46 26 40 fb a4 30 9e 31 e9 07 5c 3b f7 53 4f | 4f ec 0e ee ad 7e 3f fc 05 9c b5 15 17 a2 62 3f | 29 00 00 24 28 3a b9 16 f5 d3 fa 3e 82 0e 6c a5 | b6 e0 32 27 f5 86 22 6d 8d 85 0f 17 f1 b4 a5 df | eb 51 66 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 e9 4b 4d 06 92 e2 ba cc 1d e9 b2 | 45 c8 92 47 34 22 29 80 00 00 00 1c 00 00 40 05 | 84 da 3f 80 5c a8 47 c1 08 aa 1f 48 69 9f 8f ac | 3e 3c 6c 93 | libevent_free: release ptr-libevent@0x7fb34400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | #40 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 2d ea 23 2d fd 9f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #40 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #40 | rejected packet: | f4 2d ea 23 2d fd 9f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #40: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0498 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fbb00 | handling event EVENT_RETRANSMIT for parent state #59 | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #59 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #59 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49606.153237; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499766 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #59 | libevent_malloc: new ptr-libevent@0x7fb34400cf80 size 128 "road-eastnet-nonat-59" #59: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #59) | 97 6c 3a 75 a9 04 c6 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 c8 5b 92 1f 75 89 eb 0e 2e 34 19 de c9 7d 34 | 18 5b 4b 86 10 db bf e2 6c 1e 94 2d 7a 7d c9 7a | a0 2b b5 06 7b 90 f1 d3 cd af 0e 61 7b ec c3 64 | de a5 53 e3 bf 5e 51 d1 84 95 1f 6e cb 81 61 93 | ad 42 3a 9f 1e 3a 65 25 36 02 e8 9c 31 54 18 98 | 6f 55 90 5b bf 33 e8 09 e2 db 7f a5 0d 28 2f b0 | 76 e2 e4 a4 df b5 68 69 d1 19 fe bd 73 f2 f2 54 | 46 48 bd 1c fd b1 5e e2 cc c0 6c c9 e5 04 1c 0c | 40 92 81 c8 73 67 1a af d8 5e 9b 4f 61 bb 61 8c | a9 de 42 09 33 14 9f 91 4f 50 01 94 4d 87 81 f8 | a7 b9 37 9b 88 d2 60 21 55 19 56 c4 fc 7d e4 11 | 28 74 cf ae 93 f1 51 10 2e 23 31 34 07 b8 e7 37 | a3 5e 4c 95 61 50 f9 d4 96 86 63 2e 49 88 c6 44 | 13 5e 5b c4 2d 0c 65 06 af 27 76 b6 3c bb 87 1b | d8 ae 43 ad 30 39 b0 94 f9 53 b3 ee d3 35 1d 60 | 44 54 ef 8a f8 7d 13 88 d2 f8 8c df 8f 77 8c e4 | 29 00 00 24 b8 98 0c 82 63 7c e1 4a 6e 4e 96 76 | c9 de 50 23 14 2c 80 d9 d0 99 72 c2 8b e9 f8 32 | 80 1a 11 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 09 60 c9 a8 1a 7b a4 38 cc f7 74 | 87 5e fa dc 42 53 d3 c5 00 00 00 1c 00 00 40 05 | a9 7a 6a af 06 6a 57 69 21 03 39 50 4a 98 de 11 | 5d 3e 78 2b | libevent_free: release ptr-libevent@0x7fb37000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fbb00 | #59 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 6c 3a 75 a9 04 c6 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #59 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #59 | rejected packet: | 97 6c 3a 75 a9 04 c6 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #59: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0656 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #54 | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #54 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #54 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49606.155565; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001433 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fbb00 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #54 | libevent_malloc: new ptr-libevent@0x7fb37000cf80 size 128 "road-eastnet-nonat-54" #54: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #54) | 4e 45 bc 88 5c 41 98 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 f4 91 14 5c ab 2e e9 80 6d af 62 f3 7d f3 c8 | 41 66 e7 43 38 9a c7 1b 1e f8 8c 7d f7 db 12 65 | 59 fd 3d ea 2d 58 b5 eb bc 29 cf 89 c5 08 e0 32 | af 71 20 82 0f be ca 31 6c 17 02 ca 88 1d 08 2b | 41 de be 4f db b6 e0 c9 ce b8 f5 78 72 16 5b d3 | af b2 62 71 28 3f 0e a5 9b 79 4c c6 6b 64 ea 6c | 30 86 90 45 62 e9 86 e5 b2 f0 de b0 25 c7 2c 5e | 72 55 be b3 8f b3 05 2b 3b 6d 68 2a 44 c2 cc ec | 6b 1d 92 df 89 1a 9d f7 c1 18 8f 4d 34 ce b2 72 | dc 24 61 bd 37 65 28 f1 26 42 c6 a1 48 90 50 40 | 60 3f 78 ce 04 9c 3d ba 18 4e dd 4c d6 82 6e 51 | 67 48 49 62 37 f2 ed 52 4d b8 26 ec b0 85 3e 94 | ba a6 36 bb c9 80 6e e3 33 72 02 87 28 51 f7 0e | b2 b1 8f 9a df 7c ac 13 32 02 9e b4 45 75 85 e3 | 86 3b 1f 81 8b 2b 4d 2b b9 af 80 14 c8 c0 37 3b | 75 10 32 13 c6 74 a7 41 62 92 b3 87 9f e2 ed 2a | 29 00 00 24 f9 a0 5c 35 4a 9e bd 0e 0d 94 7a f9 | 8f b8 01 dd 15 88 70 42 78 10 83 16 a2 ba 62 6b | bf 0e 5b 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b f1 3a 2c 8b e8 c9 68 86 e1 0f be | 41 4d 1c 16 cf d5 b6 01 00 00 00 1c 00 00 40 05 | 84 fa 3c 0d 93 21 b5 34 8e ca ca 4a 93 ec 16 d0 | 28 a4 5e 28 | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #54 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e 45 bc 88 5c 41 98 f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #54 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #54 | rejected packet: | 4e 45 bc 88 5c 41 98 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #54: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-67" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-67' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #67 at 0x557d46a30210 | State DB: adding IKEv2 state #67 in UNDEFINED | pstats #67 ikev2.ike started | Message ID: init #67: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #67: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #67; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-67" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-67" IKE SA #67 "road-eastnet-nonat-67" "road-eastnet-nonat-67" #67: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-67 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-67": constructed local IKE proposals for road-eastnet-nonat-67 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 67 for state #67 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34400d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #67 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 | #67 spent 0.14 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-67" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.218 milliseconds in whack | crypto helper 15 resuming | crypto helper 15 starting work-order 67 for state #67 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 67 | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 67 time elapsed 0.00099 seconds | (#67) spent 0.989 milliseconds in crypto helper computing work-order 67: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 67 for state #67 to event queue | scheduling resume sending helper answer for #67 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #67 | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 67 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #67 | **emit ISAKMP Message: | initiator cookie: | d5 dc 19 08 bd ef 9f dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-67 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8a 15 d2 0d 8c 5c 68 38 3d 2d 2f ab 03 65 12 47 | ikev2 g^x 3e b1 d3 f9 3a 86 7c eb 4f 39 8c ad 4d 38 70 41 | ikev2 g^x d1 7d 9c 72 4f 83 e4 6c 89 f6 b0 17 b5 42 16 02 | ikev2 g^x 98 46 bb 9b ed 5c 3f ac 09 0d be a1 fd 38 36 65 | ikev2 g^x 29 1c 76 c9 62 fc be 23 07 ff 11 92 31 9b 27 f0 | ikev2 g^x d5 89 d4 07 37 e6 d9 c5 11 e2 68 cc f6 fa 8f ad | ikev2 g^x d4 d7 3d 81 a6 50 a2 3b 0c 6d a4 dc e7 02 2c 0e | ikev2 g^x b0 92 5d 4d d1 8c bc b1 d3 8b 8b 57 d6 a3 1b fb | ikev2 g^x 45 de 41 0c 4c 00 09 3b b7 02 6a 18 be d3 e2 bf | ikev2 g^x 60 42 87 71 10 49 5d 99 2a 98 69 45 a3 b9 8a 57 | ikev2 g^x c3 e1 71 dc 21 28 e6 7b 37 29 eb da 68 00 eb 12 | ikev2 g^x 52 79 13 c3 54 c6 f4 5a 0f 77 f8 92 a7 c4 70 9c | ikev2 g^x 42 51 17 18 c9 d7 b0 85 26 54 bb 62 a6 c6 48 68 | ikev2 g^x 6f 63 77 09 be 06 39 71 28 8e 68 84 3f f2 9b 78 | ikev2 g^x 53 a2 0d 5b a4 87 76 9f e3 e1 57 84 7f 83 44 ad | ikev2 g^x 59 6d db cc b7 ca a2 5b d9 9b 67 9f f8 59 1b 8c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ea 05 1a 8b a3 08 e1 05 bd ec 39 06 dc 75 19 c7 | IKEv2 nonce 61 25 8f 0d bb ee a8 4f 1e a0 d7 a0 e4 5f a7 b7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d5 dc 19 08 bd ef 9f dc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 43 | natd_hash: port= 01 f4 | natd_hash: hash= 4c a1 13 b6 f8 7a c8 5e ab 0d 26 ff 9e 2c 49 6a | natd_hash: hash= b7 74 41 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4c a1 13 b6 f8 7a c8 5e ab 0d 26 ff 9e 2c 49 6a | Notify data b7 74 41 36 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d5 dc 19 08 bd ef 9f dc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1e 6d d9 18 71 66 9b 77 ce ef 92 9d c1 b1 8d 12 | natd_hash: hash= ab 9b 0c 2a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1e 6d d9 18 71 66 9b 77 ce ef 92 9d c1 b1 8d 12 | Notify data ab 9b 0c 2a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #67 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #67: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #67 to 4294967295 after switching state | Message ID: IKE #67 skipping update_recv as MD is fake | Message ID: sent #67 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-67" #67: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.67:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #67) | d5 dc 19 08 bd ef 9f dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 15 d2 0d 8c 5c 68 38 3d 2d 2f ab 03 65 12 47 | 3e b1 d3 f9 3a 86 7c eb 4f 39 8c ad 4d 38 70 41 | d1 7d 9c 72 4f 83 e4 6c 89 f6 b0 17 b5 42 16 02 | 98 46 bb 9b ed 5c 3f ac 09 0d be a1 fd 38 36 65 | 29 1c 76 c9 62 fc be 23 07 ff 11 92 31 9b 27 f0 | d5 89 d4 07 37 e6 d9 c5 11 e2 68 cc f6 fa 8f ad | d4 d7 3d 81 a6 50 a2 3b 0c 6d a4 dc e7 02 2c 0e | b0 92 5d 4d d1 8c bc b1 d3 8b 8b 57 d6 a3 1b fb | 45 de 41 0c 4c 00 09 3b b7 02 6a 18 be d3 e2 bf | 60 42 87 71 10 49 5d 99 2a 98 69 45 a3 b9 8a 57 | c3 e1 71 dc 21 28 e6 7b 37 29 eb da 68 00 eb 12 | 52 79 13 c3 54 c6 f4 5a 0f 77 f8 92 a7 c4 70 9c | 42 51 17 18 c9 d7 b0 85 26 54 bb 62 a6 c6 48 68 | 6f 63 77 09 be 06 39 71 28 8e 68 84 3f f2 9b 78 | 53 a2 0d 5b a4 87 76 9f e3 e1 57 84 7f 83 44 ad | 59 6d db cc b7 ca a2 5b d9 9b 67 9f f8 59 1b 8c | 29 00 00 24 ea 05 1a 8b a3 08 e1 05 bd ec 39 06 | dc 75 19 c7 61 25 8f 0d bb ee a8 4f 1e a0 d7 a0 | e4 5f a7 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c a1 13 b6 f8 7a c8 5e ab 0d 26 ff | 9e 2c 49 6a b7 74 41 36 00 00 00 1c 00 00 40 05 | 1e 6d d9 18 71 66 9b 77 ce ef 92 9d c1 b1 8d 12 | ab 9b 0c 2a | state #67 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34400d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #67 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 | #67 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49606.159847 | resume sending helper answer for #67 suppresed complete_v2_state_transition() and stole MD | #67 spent 0.463 milliseconds in resume sending helper answer | stop processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb374017f50 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 dc 19 08 bd ef 9f dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #67 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #67 | rejected packet: | d5 dc 19 08 bd ef 9f dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #67: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0599 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #41 | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #41 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #41 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49606.207306; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002761 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a100f0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #41 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 "road-eastnet-nonat-41" #41: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #41) | 8c ff 26 ec fd d0 54 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 6e ec 95 3c 3a 16 99 41 58 58 6d 01 e2 00 52 | 61 4b c1 ec e1 3d d8 4e 54 c1 3f 99 6b 75 66 7c | 92 13 65 ae e7 70 46 75 9c c5 22 7e 39 16 2c 7c | ed 79 f7 7b 1e 03 31 32 5f 32 c2 43 74 2e 80 66 | 05 70 11 cc 43 ce 1e db 54 28 24 d1 42 b1 78 ad | e4 d1 e6 87 87 84 0f b3 11 50 a6 79 e1 08 7c 97 | 7e bd ba 46 ef f8 51 ce 68 86 83 2a 2c 29 00 29 | a5 58 88 f4 ed 2a f4 20 30 da 5d b1 69 45 2e 86 | 07 5f aa 0a 89 4a 6e 50 df 32 c3 37 59 a0 ba ad | 86 bd 19 1f 9a e2 19 57 1e fc 59 a2 20 ba a6 61 | df 8c b1 78 f4 73 20 28 d7 5d 27 a9 6d f4 51 05 | 00 85 1f 11 24 82 a0 ad b8 70 fc 6e 4d 99 a5 50 | dd 2e 79 4a 4c a1 78 07 7c f4 48 8d c5 cd ae 3d | 60 f1 3e 46 13 92 0c ad 34 dc 62 b8 45 01 1d 0e | 54 aa 15 f0 b8 36 03 5c 9a b5 ba b5 7c 77 32 6f | a5 95 b6 eb ec c2 d3 a2 c8 7a f9 23 04 ed b5 3b | 29 00 00 24 d2 1e ab ae e7 c2 8c f2 ef 74 c1 f0 | 3d f2 d7 f9 46 a9 e4 e0 b6 87 92 c1 10 9a fa bd | 74 9b e3 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 98 3f 00 de 9d 4b 8f 8e e4 88 e6 | cb 33 f8 3a c9 9d db 23 00 00 00 1c 00 00 40 05 | 7d 19 19 07 bb fc 4c f4 5b 43 3f 70 14 2d 10 a5 | 77 03 39 4f | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #41 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c ff 26 ec fd d0 54 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #41 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #41 | rejected packet: | 8c ff 26 ec fd d0 54 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #41: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0714 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ec960 | handling event EVENT_RETRANSMIT for parent state #60 | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #60 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #60 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49606.217108; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501069 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #60 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 "road-eastnet-nonat-60" #60: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #60) | 25 9c c0 c5 c2 ae 29 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 2c 75 39 d4 fe e8 bb 01 36 72 a5 b5 e5 a5 81 | c7 38 4b e5 4a ae c6 e0 64 23 ae a4 00 42 bd c1 | 2e 59 84 56 2c d7 14 24 66 d8 ee 01 96 14 85 e4 | 4a 5d 41 c9 bd f2 52 f7 81 ad 7f d6 d0 a1 27 d2 | 97 41 8d b3 c0 bc 77 ec 23 18 fe 60 e2 a8 0c 93 | 13 c8 08 44 38 cf 40 53 40 99 23 6d f6 02 db 2a | 6e 32 b0 2c 67 33 6c a2 f1 af da 97 e3 24 99 d0 | 08 b1 cf 27 91 4b c8 a0 67 76 74 84 3e e8 94 b8 | 9c 46 bf ee d2 a1 d1 93 0c c9 20 9b fb 9c cc 69 | d2 c3 9f 9f 32 ce e3 cd 1e a4 06 0c ce ad 3b b5 | 3d 52 01 2e 64 72 a4 a5 0d 13 96 53 80 55 c3 af | c7 4a a9 17 ce 71 79 67 8d 48 4c a9 b8 00 02 38 | 2d 7c a0 0b 36 f5 68 34 0f dd 83 6f 1d d1 e9 b9 | 9a 43 52 12 d9 b1 6e ac 6a 5e ac d3 3c 20 66 93 | 6b 7e 85 4c aa e5 92 08 98 a1 8b 28 75 13 39 85 | b8 6c 05 ff ad 0d f2 e7 73 79 5c 18 65 6b dd 7e | 29 00 00 24 a0 1d b4 bd 19 70 24 f8 23 e6 87 dc | 50 af bd f2 95 21 f1 1c 7f 4c 51 8f f3 4c 1a 81 | a9 6f fb c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d6 a7 42 56 6b af 55 7e 9e 1f c2 40 | ba 0d 74 ad 6e b0 b4 2e 00 00 00 1c 00 00 40 05 | 49 f8 c3 9d b1 df 49 97 21 c8 2e 46 27 7c d9 25 | e7 f0 a2 de | libevent_free: release ptr-libevent@0x7fb374014820 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ec960 | #60 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 9c c0 c5 c2 ae 29 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #60 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #60 | rejected packet: | 25 9c c0 c5 c2 ae 29 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #60: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0719 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #17 | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #17 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #17 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49606.24648; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006836 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a03d30 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #17 | libevent_malloc: new ptr-libevent@0x7fb374014820 size 128 "road-eastnet-nonat-17" #17: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #17) | 95 d9 df c6 2f 4d 0c 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 5e 55 de a7 df 8c 8d ec f1 a6 b3 e1 a3 c9 2d | 5c 34 98 9a bf 18 3c 5f 5f 84 6f cc 00 89 2f b6 | 2e 0d 8a f0 e8 8a 33 b9 9f e3 4d bb 6f 5d 7f 7f | 55 e8 00 b1 58 6d 0f 17 37 b6 dc aa e5 63 e1 98 | c3 81 a6 04 b7 5c e1 a6 b2 29 9c 5a 0a 92 22 a4 | dd 4c 33 c2 4e 6f 90 29 c5 be 39 30 e7 2e 62 6c | 05 d7 89 8e 0f da b5 53 da 3f 31 31 12 b0 4c a7 | e6 a2 e9 57 ae d6 ea 04 d8 8b 73 ef 0e 9c 95 4e | 4b da 65 9c ef 6c 55 46 7d 0a 54 0c 93 37 db 94 | 63 8b a7 e9 ec 58 ed b4 f2 15 0c b0 9d 7b 2c 0d | 1e e8 20 04 e7 f0 90 d5 81 ce 8a 1d d9 30 60 b1 | c6 44 b1 01 fa 02 ef 06 8d 26 a1 09 a3 ce f8 2b | cd fc 0a 07 b0 8e b6 9d e8 6f 0c f0 b6 d6 40 9f | 58 4b a3 1f 87 35 a9 b2 45 93 43 35 38 68 86 6f | ea 62 4d 90 7e b9 e7 0c 07 f5 2a d5 71 68 12 96 | 09 17 2e 55 3e a1 6c 35 b5 20 1e 2a bf 27 6e 02 | 29 00 00 24 bf 2e 79 82 7e c6 1a 66 e2 b9 4b 2e | f8 c7 dc 78 b4 81 b9 5d 2e e5 4c 2c 27 2c b6 31 | c3 63 bf d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 f5 2d 98 10 e8 c0 4d c4 df 42 b6 | b0 c6 0b 95 91 b6 b4 67 00 00 00 1c 00 00 40 05 | 6f dc f7 24 ac 26 1a a6 48 cc ee 5d 39 06 66 40 | 4c d6 6b fc | libevent_free: release ptr-libevent@0x7fb36800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #17 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 d9 df c6 2f 4d 0c 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #17 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #17 | rejected packet: | 95 d9 df c6 2f 4d 0c 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #17: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0682 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-68" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-68' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #68 at 0x557d46a317d0 | State DB: adding IKEv2 state #68 in UNDEFINED | pstats #68 ikev2.ike started | Message ID: init #68: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #68: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #68; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-68" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-68" IKE SA #68 "road-eastnet-nonat-68" "road-eastnet-nonat-68" #68: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-68 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-68": constructed local IKE proposals for road-eastnet-nonat-68 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 68 for state #68 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a02770 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #68 | libevent_malloc: new ptr-libevent@0x7fb36800cf80 size 128 | #68 spent 0.142 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-68" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.223 milliseconds in whack | crypto helper 19 resuming | crypto helper 19 starting work-order 68 for state #68 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 68 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 68 time elapsed 0.000991 seconds | (#68) spent 0.993 milliseconds in crypto helper computing work-order 68: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 68 for state #68 to event queue | scheduling resume sending helper answer for #68 | libevent_malloc: new ptr-libevent@0x7fb3680180b0 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #68 | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 68 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #68 | **emit ISAKMP Message: | initiator cookie: | 70 75 31 66 aa 5c 9c e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-68 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3b 5d b8 31 5b 51 c7 81 22 c3 12 8e cd 03 2f 05 | ikev2 g^x f3 e7 e9 e0 56 07 0e 19 4f f3 59 f8 5f 92 30 b5 | ikev2 g^x 72 b6 ae 5a 15 67 03 c0 c9 25 86 6f b6 cd 52 32 | ikev2 g^x 93 89 9d 85 44 28 f4 e9 22 34 65 fb b6 28 63 5f | ikev2 g^x 80 98 37 5a 06 27 0e fb ee f6 cc 60 03 1e c8 99 | ikev2 g^x 96 20 20 2b e8 6a b0 1d 57 83 e1 9f d1 09 80 29 | ikev2 g^x 2a 2a 69 37 ce 92 30 79 1a 45 aa a3 bd 30 cd 8b | ikev2 g^x 23 97 c9 73 f8 32 ee fe d7 1e 67 73 bd 11 db 26 | ikev2 g^x 12 e8 63 a6 c5 a1 37 4f 2f 5c 98 66 44 92 9a da | ikev2 g^x 46 ed 57 a3 46 50 a7 e5 d9 ec 61 b3 fb 59 43 1f | ikev2 g^x 96 83 9a 55 36 c4 68 5f a7 ee f4 08 c7 30 31 52 | ikev2 g^x b8 7e 06 a5 b1 e2 2e 1a 2b de 01 96 c6 3e f1 89 | ikev2 g^x d8 1f b9 ac 77 f1 c6 91 93 f5 70 bc 2f 41 d6 e3 | ikev2 g^x ff da e8 8a 1d 5f de 22 6f 38 d0 51 a3 b4 49 ef | ikev2 g^x d5 06 ff ea 4d f6 71 eb 33 f8 fd c7 e6 95 54 de | ikev2 g^x 64 89 15 37 cd bd bf d2 74 6c 8e f3 c4 d1 b1 ad | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8c 8f d0 a2 59 9b be 88 0a db 9c c0 a3 eb 04 0d | IKEv2 nonce aa d5 13 33 65 39 12 37 76 6e 7e e3 e3 60 8c 98 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 70 75 31 66 aa 5c 9c e4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 44 | natd_hash: port= 01 f4 | natd_hash: hash= 35 a4 28 dd c4 89 9a c5 51 2a d8 15 55 6e c2 5e | natd_hash: hash= f1 52 b9 d0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 35 a4 28 dd c4 89 9a c5 51 2a d8 15 55 6e c2 5e | Notify data f1 52 b9 d0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 70 75 31 66 aa 5c 9c e4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ac d9 33 90 76 69 a3 40 a6 e4 ee bb 11 92 b7 71 | natd_hash: hash= 1e 90 c3 02 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ac d9 33 90 76 69 a3 40 a6 e4 ee bb 11 92 b7 71 | Notify data 1e 90 c3 02 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #68 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #68: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #68 to 4294967295 after switching state | Message ID: IKE #68 skipping update_recv as MD is fake | Message ID: sent #68 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-68" #68: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.68:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #68) | 70 75 31 66 aa 5c 9c e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 5d b8 31 5b 51 c7 81 22 c3 12 8e cd 03 2f 05 | f3 e7 e9 e0 56 07 0e 19 4f f3 59 f8 5f 92 30 b5 | 72 b6 ae 5a 15 67 03 c0 c9 25 86 6f b6 cd 52 32 | 93 89 9d 85 44 28 f4 e9 22 34 65 fb b6 28 63 5f | 80 98 37 5a 06 27 0e fb ee f6 cc 60 03 1e c8 99 | 96 20 20 2b e8 6a b0 1d 57 83 e1 9f d1 09 80 29 | 2a 2a 69 37 ce 92 30 79 1a 45 aa a3 bd 30 cd 8b | 23 97 c9 73 f8 32 ee fe d7 1e 67 73 bd 11 db 26 | 12 e8 63 a6 c5 a1 37 4f 2f 5c 98 66 44 92 9a da | 46 ed 57 a3 46 50 a7 e5 d9 ec 61 b3 fb 59 43 1f | 96 83 9a 55 36 c4 68 5f a7 ee f4 08 c7 30 31 52 | b8 7e 06 a5 b1 e2 2e 1a 2b de 01 96 c6 3e f1 89 | d8 1f b9 ac 77 f1 c6 91 93 f5 70 bc 2f 41 d6 e3 | ff da e8 8a 1d 5f de 22 6f 38 d0 51 a3 b4 49 ef | d5 06 ff ea 4d f6 71 eb 33 f8 fd c7 e6 95 54 de | 64 89 15 37 cd bd bf d2 74 6c 8e f3 c4 d1 b1 ad | 29 00 00 24 8c 8f d0 a2 59 9b be 88 0a db 9c c0 | a3 eb 04 0d aa d5 13 33 65 39 12 37 76 6e 7e e3 | e3 60 8c 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 a4 28 dd c4 89 9a c5 51 2a d8 15 | 55 6e c2 5e f1 52 b9 d0 00 00 00 1c 00 00 40 05 | ac d9 33 90 76 69 a3 40 a6 e4 ee bb 11 92 b7 71 | 1e 90 c3 02 | state #68 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36800cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a02770 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #68 | libevent_malloc: new ptr-libevent@0x7fb36800cf80 size 128 | #68 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49606.254018 | resume sending helper answer for #68 suppresed complete_v2_state_transition() and stole MD | #68 spent 0.465 milliseconds in resume sending helper answer | stop processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3680180b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 75 31 66 aa 5c 9c e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #68 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #68 | rejected packet: | 70 75 31 66 aa 5c 9c e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #68: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #61 | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #61 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #61 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49606.276242; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500041 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ec960 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #61 | libevent_malloc: new ptr-libevent@0x7fb3680180b0 size 128 "road-eastnet-nonat-61" #61: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #61) | f7 bc 52 c3 08 41 7d fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 a3 fc 88 6c c9 17 99 e8 c8 f4 84 4b dd e6 d6 | a2 3c cb b6 7d b8 4b 73 4d d1 4a 52 0a 17 63 b0 | ce a1 f6 5b 22 20 08 31 0e da ec fd b8 c2 13 f9 | b7 0d 78 21 3f 05 bc f7 2c 5a 0e b5 1a 70 bf 53 | b0 72 5e 64 9f c9 e5 f6 6b aa f3 db 8b b8 b8 b3 | f6 f8 ae 22 20 f7 35 9c 39 6d 5a ba 98 af 4b 1d | 6d d4 8e 29 87 bb 7a 2b 6b 4a b8 79 51 26 39 b0 | 6a 6c be 49 5f 57 bf 03 7a 6e 7f ac 45 f9 af fb | a3 06 52 bf 07 ef a5 db 3d b8 9b 73 f0 8e b1 76 | 2b 5d b7 93 de 9f 59 44 c1 67 8a 9a a5 50 66 6c | 27 3e 5e 44 b1 e9 13 dc 81 57 82 47 20 a2 32 79 | d4 b0 d6 87 f1 f1 20 bf e9 93 fc 11 dd 5e 42 b0 | a4 4f 0e f8 93 a1 1c a5 59 56 db 69 8d ca d0 53 | 78 b2 af e6 28 15 c5 c9 00 fd bf f0 33 a6 bf 2d | 7e 87 d7 d1 a0 82 65 91 eb 3c cf d0 6f fb 0e 4b | 57 a1 5c 8a 3f 3c 13 19 f1 bc 6c 89 96 42 e0 e9 | 29 00 00 24 30 62 04 12 b8 d1 41 8a 1d 82 4c c7 | f3 e8 92 81 d6 0e cc 31 5a f2 7c 04 56 a0 26 04 | e6 c5 8a 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 04 89 46 c0 2a 68 09 d3 b8 a6 1e | 7d d4 48 56 88 7a 56 d6 00 00 00 1c 00 00 40 05 | bb 1e 0b f8 57 9c 2b 42 0a de e4 96 f3 8b 61 81 | fa a3 7d bc | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #61 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 bc 52 c3 08 41 7d fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #61 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #61 | rejected packet: | f7 bc 52 c3 08 41 7d fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #61: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a011f0 | handling event EVENT_RETRANSMIT for parent state #42 | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #42 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #42 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49606.290568; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002216 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #42 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 "road-eastnet-nonat-42" #42: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #42) | 6d 45 59 82 ce 2c 77 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 19 87 21 99 aa 5a cb db ce 0f 02 f2 50 c9 ac 92 | 89 7c 70 85 a8 a7 33 4a c2 44 36 a5 03 8e 1f 50 | c8 86 2e d1 a1 d8 14 17 9c 7c a1 44 65 ba 61 77 | f0 62 19 6f f9 72 cc 36 22 03 c3 7d e3 8c 01 7c | 58 c0 91 2e 4f 24 ac cd af f7 da 61 3e 4b 43 c9 | b4 5d 67 e2 f1 65 be 23 88 f7 f4 e6 25 50 c9 e3 | 21 af 1c 45 62 8a 73 3a 98 47 b9 78 6f ee 87 26 | 3b 63 01 1e 58 61 99 0e 7a 91 7d 30 e0 59 53 0b | 92 57 66 fd a7 1f 2b 11 d7 59 95 9a 31 fc 95 b7 | 6b 6d 54 d3 d2 0f 8f 6e 22 a6 95 24 ad 69 c7 e4 | 30 99 2e f3 f9 ce 36 7f 2b 10 24 3b 8a de bf 7e | cb e6 f5 71 51 3c fe 08 40 b7 0a aa 06 06 b7 d2 | 69 fa d5 d4 16 ea b0 b1 e6 af 20 69 3c 12 1e 86 | 3a 05 a1 45 01 d3 59 e6 49 c9 c2 6a 69 6b a1 a1 | b0 18 e7 68 dc 1f 70 e8 33 59 8d 8e 1f 6a e1 13 | 5e 04 b2 02 62 fb f4 16 44 cd 9d 1e 33 84 73 83 | 29 00 00 24 98 90 54 f6 26 53 aa 96 7a 47 ff f3 | 5b dc e1 95 5c f0 6d 5d ed 6d 00 c6 1d e8 59 f1 | 2a 1c 8a 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 cb 92 0c 07 24 d9 90 48 22 d8 76 | e5 5b bc c8 39 99 d2 4d 00 00 00 1c 00 00 40 05 | cb e3 e2 5e 9a 09 f4 90 ee 73 df 07 77 16 6b 37 | da 99 3b e3 | libevent_free: release ptr-libevent@0x7fb35000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a011f0 | #42 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 45 59 82 ce 2c 77 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #42 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #42 | rejected packet: | 6d 45 59 82 ce 2c 77 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #42: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #55 | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #55 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #55 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49606.315901; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001157 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a272b0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #55 | libevent_malloc: new ptr-libevent@0x7fb35000cf80 size 128 "road-eastnet-nonat-55" #55: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #55) | 3d db 2e dd 07 aa ba 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e 71 91 32 93 9e d9 77 ef 53 94 b9 d3 5b 34 5a | fe 84 a7 6b 7a 00 f9 5d 90 9e 95 ec 98 7e 50 90 | 6f 0f ae d2 9f 29 ef dd 60 22 99 95 c1 b0 c0 54 | a7 26 de ae fa 13 60 60 4e 33 18 74 d6 1f 83 02 | 06 b2 59 fa 7c 17 46 c9 2a 0a 3f 67 46 5b 6e d7 | 09 8c 97 98 d9 8f c1 fc 1c ec 49 28 fb cb 2a 4f | 78 96 26 a0 14 e4 f8 b2 87 ff f8 94 08 22 94 74 | 80 62 7b 3c 7f 07 b1 d4 49 9b 9c af da 12 43 95 | 22 ed c4 32 82 8f fd 22 2e 14 7f a3 9e 9a 0a 95 | 1c ac 99 95 6e eb ff 73 9e fa c4 9b c2 7f 18 d1 | a6 f5 7d a7 31 3b 50 d9 03 2b 9b 6a 48 7d 39 5a | 55 2b 5f c8 64 07 45 ea 51 98 d9 85 73 51 e2 22 | 6a fe cb 2c f3 b0 0b 08 b0 e7 70 07 6e 79 7c 1c | 6c d7 90 19 69 d2 44 49 0a 0f 6a 33 f1 60 ee 72 | 89 92 e0 5a 96 45 5d c4 8c 2b 42 de 01 b6 de 4f | b8 41 dc e7 4d 6a e5 69 01 12 96 be b3 ca 0c ef | 29 00 00 24 34 26 bc 6d 2a b2 15 83 73 e7 09 34 | 40 d7 8e 8c 63 fe fd 1b d2 38 8c 24 da 45 67 bf | a5 9b 8a 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 45 13 d7 91 8d b2 95 9c 7e b4 17 | 75 e1 5c f2 7c 3c ca 26 00 00 00 1c 00 00 40 05 | d0 0d a6 5e 1b c4 3a dd c0 34 b3 e5 87 cb 47 3a | 73 94 3b 44 | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #55 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d db 2e dd 07 aa ba 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #55 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #55 | rejected packet: | 3d db 2e dd 07 aa ba 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #55: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0729 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-69" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-69' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #69 at 0x557d46a32d90 | State DB: adding IKEv2 state #69 in UNDEFINED | pstats #69 ikev2.ike started | Message ID: init #69: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #69: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #69; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-69" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-69" IKE SA #69 "road-eastnet-nonat-69" "road-eastnet-nonat-69" #69: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-69 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-69": constructed local IKE proposals for road-eastnet-nonat-69 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 69 for state #69 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb380002b20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #69 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 | #69 spent 0.168 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-69" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.249 milliseconds in whack | crypto helper 6 resuming | crypto helper 6 starting work-order 69 for state #69 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 69 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 69 time elapsed 0.000746 seconds | (#69) spent 0.755 milliseconds in crypto helper computing work-order 69: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 69 for state #69 to event queue | scheduling resume sending helper answer for #69 | libevent_malloc: new ptr-libevent@0x7fb36c0180b0 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #69 | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 69 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #69 | **emit ISAKMP Message: | initiator cookie: | f2 a5 7f fe 4a 34 bb 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-69 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b3 e4 3b 13 88 fe 14 57 37 ea f2 64 67 d0 00 fc | ikev2 g^x 08 06 ee d2 9e 18 57 6d 24 e0 9d ec 05 43 cc ba | ikev2 g^x 46 84 14 09 e9 e2 59 69 78 ab 8d 44 b4 c5 40 3a | ikev2 g^x a2 89 7d 06 7b bd cc e4 70 62 31 9f 43 8b b5 bc | ikev2 g^x 3c 9f 69 fb 1f f5 22 54 18 e5 72 15 5a 48 ee 5c | ikev2 g^x c3 f3 42 0b 25 4e 7f 00 ca 3e e9 db 4e ab 7a 2a | ikev2 g^x 5e 8e 14 a5 6c b8 fa ac c8 1b f3 01 fc 2e 88 fc | ikev2 g^x de 9d 1f b4 30 64 da 79 40 14 b9 cb 57 7b 44 a9 | ikev2 g^x 8b 4d e2 fe 10 ef 78 5b 95 32 a7 75 3e 68 a2 02 | ikev2 g^x 50 a9 63 99 4c de c2 a2 55 8e e7 c1 4c 9d ba d5 | ikev2 g^x 23 4b 1b 11 eb 5b d1 0e 0a 69 30 ae 96 7b a4 e6 | ikev2 g^x d5 07 c0 08 e9 6f 21 3e f5 fc eb 69 b8 6d f7 0c | ikev2 g^x e4 6a a2 62 87 f1 46 98 bb 82 fd ef c3 b7 37 d9 | ikev2 g^x 4f 4d 06 a6 46 29 3d cf 6d 59 1a 7a 7d 4c 43 d4 | ikev2 g^x 05 3e e7 70 e1 23 3b 86 eb 4e 8f 26 e0 cf 97 cf | ikev2 g^x 6f 21 b0 32 5e 71 a6 25 0b f1 15 b5 06 82 51 60 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ca 10 ed 53 1e ff c5 43 38 73 0a 51 c6 98 7c 29 | IKEv2 nonce 17 9d 86 f8 04 d8 2e 0c fa 41 a7 af 38 8b 0b 84 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f2 a5 7f fe 4a 34 bb 73 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 45 | natd_hash: port= 01 f4 | natd_hash: hash= 51 9a cb 7f 17 aa e7 97 ca 43 a3 43 c3 e4 41 43 | natd_hash: hash= e3 4b 2a 3e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 51 9a cb 7f 17 aa e7 97 ca 43 a3 43 c3 e4 41 43 | Notify data e3 4b 2a 3e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f2 a5 7f fe 4a 34 bb 73 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 50 72 12 31 6b fb 9c 33 88 e7 6f 1a 9e 5d 70 fe | natd_hash: hash= 3b 28 e9 92 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 50 72 12 31 6b fb 9c 33 88 e7 6f 1a 9e 5d 70 fe | Notify data 3b 28 e9 92 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #69 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #69: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #69 to 4294967295 after switching state | Message ID: IKE #69 skipping update_recv as MD is fake | Message ID: sent #69 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-69" #69: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.69:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #69) | f2 a5 7f fe 4a 34 bb 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 e4 3b 13 88 fe 14 57 37 ea f2 64 67 d0 00 fc | 08 06 ee d2 9e 18 57 6d 24 e0 9d ec 05 43 cc ba | 46 84 14 09 e9 e2 59 69 78 ab 8d 44 b4 c5 40 3a | a2 89 7d 06 7b bd cc e4 70 62 31 9f 43 8b b5 bc | 3c 9f 69 fb 1f f5 22 54 18 e5 72 15 5a 48 ee 5c | c3 f3 42 0b 25 4e 7f 00 ca 3e e9 db 4e ab 7a 2a | 5e 8e 14 a5 6c b8 fa ac c8 1b f3 01 fc 2e 88 fc | de 9d 1f b4 30 64 da 79 40 14 b9 cb 57 7b 44 a9 | 8b 4d e2 fe 10 ef 78 5b 95 32 a7 75 3e 68 a2 02 | 50 a9 63 99 4c de c2 a2 55 8e e7 c1 4c 9d ba d5 | 23 4b 1b 11 eb 5b d1 0e 0a 69 30 ae 96 7b a4 e6 | d5 07 c0 08 e9 6f 21 3e f5 fc eb 69 b8 6d f7 0c | e4 6a a2 62 87 f1 46 98 bb 82 fd ef c3 b7 37 d9 | 4f 4d 06 a6 46 29 3d cf 6d 59 1a 7a 7d 4c 43 d4 | 05 3e e7 70 e1 23 3b 86 eb 4e 8f 26 e0 cf 97 cf | 6f 21 b0 32 5e 71 a6 25 0b f1 15 b5 06 82 51 60 | 29 00 00 24 ca 10 ed 53 1e ff c5 43 38 73 0a 51 | c6 98 7c 29 17 9d 86 f8 04 d8 2e 0c fa 41 a7 af | 38 8b 0b 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 9a cb 7f 17 aa e7 97 ca 43 a3 43 | c3 e4 41 43 e3 4b 2a 3e 00 00 00 1c 00 00 40 05 | 50 72 12 31 6b fb 9c 33 88 e7 6f 1a 9e 5d 70 fe | 3b 28 e9 92 | state #69 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb380002b20 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #69 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 | #69 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49606.318574 | resume sending helper answer for #69 suppresed complete_v2_state_transition() and stole MD | #69 spent 0.5 milliseconds in resume sending helper answer | stop processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c0180b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 a5 7f fe 4a 34 bb 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #69 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #69 | rejected packet: | f2 a5 7f fe 4a 34 bb 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #69: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ffbf0 | handling event EVENT_RETRANSMIT for parent state #18 | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #18 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #18 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49606.332782; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003615 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a011f0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #18 | libevent_malloc: new ptr-libevent@0x7fb36c0180b0 size 128 "road-eastnet-nonat-18" #18: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #18) | fb 32 f3 fa 98 61 11 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 1b 0e e3 36 19 71 f2 00 c4 a6 18 1e bb 4a b9 | 3f d0 79 e4 4c 35 e5 1e 56 1e d1 56 df b2 32 fa | cb c3 c2 d3 4a 94 0b 28 4c 8e ed f1 14 00 ce ed | b6 d4 73 ac db 94 04 97 4d da 90 7f 61 f0 d2 4f | 60 04 42 6d 98 5c e4 05 d2 7d 05 4f 2d 99 94 a5 | 24 07 67 86 b6 21 b9 09 3a ea 16 cd cc b4 37 10 | 72 43 f6 be 6d 76 63 9b 24 f5 23 e6 b1 48 bc f9 | f2 cf d4 72 32 75 ee 93 a2 3d a2 fc 4d 35 5b 06 | 2a 31 6e 66 38 b7 b9 5b ce 6b 7a 5c 24 6c c6 91 | 21 f8 32 cc e1 e9 56 aa 56 2c 50 74 9d 0e c3 9c | b6 78 ee 5d a7 11 af c5 d5 50 6d b5 f0 a5 9d 4e | 3f d5 dc b9 6a 00 2b e1 dd 5f 8a e9 31 c5 30 8b | ee 43 f2 79 32 71 d6 e9 6e 27 23 22 2e 49 e0 0f | a1 32 43 40 65 d3 35 9f 97 aa f2 5c 61 69 29 93 | 3e f9 84 1e 9a f8 ea a4 2a 81 be 45 2f 6a 95 39 | a8 bb 2b 71 c2 45 83 fa e9 8d 63 1f 25 98 d1 4c | 29 00 00 24 64 09 7d 4a c3 95 64 a7 f6 f8 ca 35 | d6 3a 22 ea 52 84 43 22 db d2 95 2f 1d 96 44 f9 | 61 f7 89 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 f9 c7 a2 f7 e0 10 e9 b6 c5 14 f2 | 0e d4 f3 ff 41 9a 2e 34 00 00 00 1c 00 00 40 05 | be 8c d9 50 c4 e0 70 2a 58 15 0e 32 3f df db 0d | 01 81 6c d8 | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ffbf0 | #18 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 32 f3 fa 98 61 11 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #18 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #18 | rejected packet: | fb 32 f3 fa 98 61 11 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #18: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8d60 | handling event EVENT_RETRANSMIT for parent state #62 | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #62 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #62 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49606.343102; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501472 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28ab0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #62 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 "road-eastnet-nonat-62" #62: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #62) | a4 88 8e 77 b1 f4 8c bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 16 5e 67 aa cb b3 98 fe b6 e6 44 1a 07 e2 be | 44 c7 a0 47 e1 e7 ec b4 60 c9 7d b0 5b 56 2d 1b | e4 9a 0e 63 18 22 7a fa a9 c7 63 82 b0 af 0b 0d | 77 29 15 f5 8e 1b 69 90 f4 7c 19 86 79 0a 5f e8 | f6 12 ff 9f 31 22 5c e3 f7 e6 5c 40 a8 f4 37 ed | 38 af f3 38 7f df 64 d9 95 08 2b d7 e3 b5 1f 60 | 26 37 fe 9a 98 33 04 94 0b 0e 07 08 c5 5e 7d f8 | c0 0f 76 eb 24 9a 96 24 01 c7 9b fd dc 2c ed 1c | 7f 8c f6 fb 9d b0 c1 a4 53 e2 53 da 53 65 1f 9e | 4e d5 a4 5d a2 34 99 86 95 17 7b b9 d0 eb c5 9a | 7a c4 fd c2 ec 45 e1 8d 1b 55 bb 91 5f 61 39 83 | ed 3e fd ec 0b 7f cf a5 d0 34 4d 78 f0 19 f9 dd | 25 c0 20 38 67 61 04 4f 0d 51 42 43 cb 7c 44 01 | 6b 99 d1 a6 d3 b1 5e 29 d8 c7 53 4a 9e 9d fe 70 | 66 03 05 bd 1d 96 be 53 72 9a fa 30 50 08 24 ae | eb 69 31 f0 f7 2f d9 1c ab 9d 37 cd ad 7a ed 6a | 29 00 00 24 0c 26 e7 cd 38 ca 58 e6 02 58 43 30 | ae e2 2c 6c 6d 36 d5 ae 9b 11 96 a7 26 d9 7a c2 | 05 18 d0 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 28 4f 82 49 71 8c 73 8e 61 ba dd | 8f a7 28 9b 76 c2 13 ce 00 00 00 1c 00 00 40 05 | 01 46 1c d3 66 df 29 38 51 83 6e 7c d6 51 6d 46 | 6c 4e be 2f | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8d60 | #62 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 88 8e 77 b1 f4 8c bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #62 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #62 | rejected packet: | a4 88 8e 77 b1 f4 8c bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #62: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_RETRANSMIT for parent state #43 | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #43 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #43 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49606.371458; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.007502 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28af0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #43 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 "road-eastnet-nonat-43" #43: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #43) | cc ee 6c 19 e2 66 91 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 b3 dc 74 af 8b 5f 17 f2 a2 67 e8 55 b6 7f 2f | d6 4e 7a 73 eb 13 7d 78 44 82 5e 9f c0 c9 a7 ce | 19 55 10 32 8b 27 a5 29 28 74 fd 00 e6 f7 6a 74 | 56 7d 4b 3f aa d7 b5 46 cb 2d 3c a3 dc 3f bf 05 | 8d ef fa 60 0a d7 e7 b4 43 44 81 a1 10 dd db 69 | 30 53 16 90 a0 49 c9 94 16 9b 8e 16 05 cc a3 b0 | bb c8 6f 12 2c 69 ac ba c2 57 c1 0e 1d 24 c4 b7 | c5 6e 9f 50 e2 e4 26 8c 25 36 d7 6d d8 cd 2c bd | d4 0a 33 47 c9 6e 1d c8 6c 02 27 85 0b ac 4e d8 | 84 b3 28 76 fc c6 2f a9 af 4b b0 f5 08 9e 56 b5 | 24 d4 f4 cb 0a 9c 0d ce 12 fa 25 29 9d 95 d6 4a | 9a e8 aa eb d1 08 9a 51 c5 21 4d b3 dd e9 4f d9 | a6 74 14 2d 42 fa 5e 68 63 d0 8e 8d 34 39 23 04 | 84 91 4d 1d 1d 39 77 e7 bb f1 e3 79 e8 0b 4e 9f | 52 2d 52 8d 33 23 04 37 3b 2c 9b 0f 37 da 18 16 | 07 6b 4f 80 6f e8 48 15 68 23 83 ca b6 b1 12 eb | 29 00 00 24 d5 f8 b0 cb f4 3b d7 c6 a9 5b 1f ef | 6f 5a 34 02 07 02 b5 92 c9 43 df 42 45 9e 46 a4 | f2 42 44 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 70 b3 40 c0 d2 23 ad 4c 6d 70 f1 | 0b c9 5a 99 fd 55 fa c5 00 00 00 1c 00 00 40 05 | fc 9d 2b d9 20 f9 c1 0e d3 88 83 de d6 d0 5e 66 | 9c 2c 6f e5 | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | #43 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc ee 6c 19 e2 66 91 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #43 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #43 | rejected packet: | cc ee 6c 19 e2 66 91 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #43: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-70" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-70' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #70 at 0x557d46a34350 | State DB: adding IKEv2 state #70 in UNDEFINED | pstats #70 ikev2.ike started | Message ID: init #70: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #70: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #70; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-70" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-70" IKE SA #70 "road-eastnet-nonat-70" "road-eastnet-nonat-70" #70: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-70 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-70": constructed local IKE proposals for road-eastnet-nonat-70 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 70 for state #70 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469fb8a0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #70 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 | #70 spent 0.108 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-70" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 11 resuming | crypto helper 11 starting work-order 70 for state #70 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 70 | spent 0.2 milliseconds in whack | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 70 time elapsed 0.000675 seconds | (#70) spent 0.675 milliseconds in crypto helper computing work-order 70: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 70 for state #70 to event queue | scheduling resume sending helper answer for #70 | libevent_malloc: new ptr-libevent@0x7fb3600180b0 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #70 | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 70 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #70 | **emit ISAKMP Message: | initiator cookie: | 80 24 74 22 d5 0f 52 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-70 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 73 68 71 3c 0e 60 a8 bb a5 bd cc ef ef 0c eb f4 | ikev2 g^x 82 28 4b 5e 34 f6 13 aa c3 d7 89 31 ad 91 46 ac | ikev2 g^x 15 dc aa e6 7a e7 0b 3f 82 69 6e e1 56 f0 c8 52 | ikev2 g^x de 05 0d fd 08 00 ee cd cc b6 87 fe a0 b0 ff e6 | ikev2 g^x 05 55 e6 b7 5e 20 53 79 90 12 ce ff 82 cf ad 41 | ikev2 g^x 3f a9 51 ad f1 8c d6 57 77 1c ef 27 f0 57 e1 8c | ikev2 g^x 97 cb b6 ce ff c0 f1 f4 a5 49 d9 74 1f 1d 74 75 | ikev2 g^x 54 be f3 af 4b 6b 43 9d 43 d4 e5 05 71 04 36 2c | ikev2 g^x c7 7c 5d f8 30 fc 44 25 48 9e 9e 82 91 e8 e4 34 | ikev2 g^x 70 26 3e 95 67 c5 a4 cb 36 d4 25 b1 2b 4a 77 2f | ikev2 g^x ae 15 52 3f 18 49 f9 47 bb a7 d2 0a ef 99 db 3d | ikev2 g^x 39 af f3 91 da 08 e3 b3 1f e4 ed 82 f5 26 e3 03 | ikev2 g^x 98 c1 58 ff ba 18 2d c8 81 ea 83 51 70 26 1e 19 | ikev2 g^x 23 60 13 98 08 43 34 78 7d 3c 93 d1 af b4 fb fe | ikev2 g^x d5 41 09 8b c9 2b 05 f4 1c a3 62 cd 21 e3 82 7b | ikev2 g^x 55 52 fe 90 11 4a 62 6c 99 8c d7 30 a6 21 f0 d1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e3 da 6d 7f a1 8b eb f9 61 52 ce 97 54 be ad 07 | IKEv2 nonce 4c e8 1e 18 ff 49 38 58 56 77 f6 8a c3 33 cb 6a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 80 24 74 22 d5 0f 52 be | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 46 | natd_hash: port= 01 f4 | natd_hash: hash= 99 9f 21 cd 26 5d 21 04 f0 de c9 2f 2e 65 dc 8c | natd_hash: hash= 6b f1 6c dd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 99 9f 21 cd 26 5d 21 04 f0 de c9 2f 2e 65 dc 8c | Notify data 6b f1 6c dd | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 80 24 74 22 d5 0f 52 be | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7b 41 25 4c 4c ca db 2b 78 bf 1e 87 08 ff 47 0c | natd_hash: hash= c4 b0 37 95 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7b 41 25 4c 4c ca db 2b 78 bf 1e 87 08 ff 47 0c | Notify data c4 b0 37 95 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #70 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #70: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #70 to 4294967295 after switching state | Message ID: IKE #70 skipping update_recv as MD is fake | Message ID: sent #70 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-70" #70: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.70:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #70) | 80 24 74 22 d5 0f 52 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 68 71 3c 0e 60 a8 bb a5 bd cc ef ef 0c eb f4 | 82 28 4b 5e 34 f6 13 aa c3 d7 89 31 ad 91 46 ac | 15 dc aa e6 7a e7 0b 3f 82 69 6e e1 56 f0 c8 52 | de 05 0d fd 08 00 ee cd cc b6 87 fe a0 b0 ff e6 | 05 55 e6 b7 5e 20 53 79 90 12 ce ff 82 cf ad 41 | 3f a9 51 ad f1 8c d6 57 77 1c ef 27 f0 57 e1 8c | 97 cb b6 ce ff c0 f1 f4 a5 49 d9 74 1f 1d 74 75 | 54 be f3 af 4b 6b 43 9d 43 d4 e5 05 71 04 36 2c | c7 7c 5d f8 30 fc 44 25 48 9e 9e 82 91 e8 e4 34 | 70 26 3e 95 67 c5 a4 cb 36 d4 25 b1 2b 4a 77 2f | ae 15 52 3f 18 49 f9 47 bb a7 d2 0a ef 99 db 3d | 39 af f3 91 da 08 e3 b3 1f e4 ed 82 f5 26 e3 03 | 98 c1 58 ff ba 18 2d c8 81 ea 83 51 70 26 1e 19 | 23 60 13 98 08 43 34 78 7d 3c 93 d1 af b4 fb fe | d5 41 09 8b c9 2b 05 f4 1c a3 62 cd 21 e3 82 7b | 55 52 fe 90 11 4a 62 6c 99 8c d7 30 a6 21 f0 d1 | 29 00 00 24 e3 da 6d 7f a1 8b eb f9 61 52 ce 97 | 54 be ad 07 4c e8 1e 18 ff 49 38 58 56 77 f6 8a | c3 33 cb 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 9f 21 cd 26 5d 21 04 f0 de c9 2f | 2e 65 dc 8c 6b f1 6c dd 00 00 00 1c 00 00 40 05 | 7b 41 25 4c 4c ca db 2b 78 bf 1e 87 08 ff 47 0c | c4 b0 37 95 | state #70 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469fb8a0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #70 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 | #70 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49606.378424 | resume sending helper answer for #70 suppresed complete_v2_state_transition() and stole MD | #70 spent 0.378 milliseconds in resume sending helper answer | stop processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3600180b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 24 74 22 d5 0f 52 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #70 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #70 | rejected packet: | 80 24 74 22 d5 0f 52 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #70: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #63 | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #63 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #63 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49606.40465; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500243 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8d60 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #63 | libevent_malloc: new ptr-libevent@0x7fb3600180b0 size 128 "road-eastnet-nonat-63" #63: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #63) | 43 a8 4d 01 ec 36 de 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa e2 93 e3 30 a1 06 ee b4 85 58 c9 2f 9d d0 1a | ad 38 32 dc 30 89 d1 a0 98 57 8d 01 77 84 b3 55 | 47 fd ae cc e0 a9 2a 35 58 f1 6a 27 c8 b7 88 d3 | c3 78 1e 95 37 0b 81 ee cb 00 02 38 fb 0c bc ff | 55 19 c6 c0 be 69 d1 78 c8 9a ae e0 96 6c 3f 9b | 54 61 8c 4b 6b 45 ac 74 a1 6d f1 1d de 9e c2 52 | 40 62 38 7c 4d c1 06 5c f5 e4 71 d5 c6 8f eb 8d | a1 58 7d a8 05 d7 f2 d1 12 1f d4 be 60 08 06 1f | 2a 4d 28 f0 ba 0e 77 13 d0 8f 4c 08 fc 37 3f 98 | 37 6b f8 7a b1 44 d3 8b 12 01 3a e0 ab 1c 6f 72 | d8 5a cc 1f f0 ef fd b0 38 cb c0 2b 70 72 dd 77 | 20 94 89 cc 24 42 7c 89 06 09 17 e9 b7 42 85 43 | b5 81 b7 cc a1 a3 3a 6b b1 18 c1 ec 8a 13 0d f9 | 71 43 3d 9a 1f 64 16 b7 2b bd 29 ea 9f 4f 17 43 | a8 18 9f fc 5b 56 59 fa 46 4c 5d 82 89 28 f2 04 | 51 6c b3 97 3a a5 95 f1 fd 87 8b 14 08 ce a0 6b | 29 00 00 24 42 95 7e 08 3c e5 ab b4 d2 f9 ef 7f | d8 0c 96 cd c4 ca c3 e4 35 0f 70 37 5f 05 86 60 | 4b 19 91 ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 ed eb 0b 29 2b d1 a0 42 dd cd 92 | 88 75 fb d1 70 51 78 cf 00 00 00 1c 00 00 40 05 | a8 06 2d d1 ac 32 5a b6 7e b8 ae d6 ec a9 34 27 | 7d 9e 90 d0 | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #63 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 a8 4d 01 ec 36 de 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #63 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #63 | rejected packet: | 43 a8 4d 01 ec 36 de 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #63: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a18370 | handling event EVENT_RETRANSMIT for parent state #56 | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #56 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #56 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49606.407942; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001481 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #56 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 "road-eastnet-nonat-56" #56: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #56) | a2 38 96 b9 83 17 2c 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c 86 44 cb cd d5 e6 ca 09 de cc 09 a4 86 65 dc | 8e 5e 46 71 c3 c7 a8 ed be 75 06 f3 62 76 ba da | ce e9 f2 5f 5c 9e e4 0c 00 41 ba fd 53 1c 48 95 | 4a ae 4f cc 78 85 9f f0 fa 4c 13 7a c5 dc 96 cf | 8c 8f e9 26 db 93 6d c0 e4 2b 06 79 49 8a 1c 86 | 23 8a 00 51 5e 48 57 fe 2b c6 2d 2e cc 90 37 77 | 16 54 2d 1c 52 6e 88 f9 06 69 91 14 40 a3 3e 1f | 64 d7 73 f6 42 da 0d 73 5f 6b eb 89 ee 97 cd 6c | fd 1d 89 b8 17 39 77 3f b0 8b a8 13 2f f9 45 f4 | e3 ec 7f a4 35 be 17 3d c6 80 db be df d2 e9 bc | 39 46 6a e1 d0 06 ce 65 d8 13 18 bc e7 ef 70 ba | 17 09 9b 7f c9 d6 90 ff cb 53 6a 15 26 bc 84 d0 | 3c 63 f9 85 08 c0 bf 6b 92 00 26 8e 7e 39 47 fa | 15 93 5e ae af a3 95 34 bf f7 9a 05 60 79 f9 78 | fe 1c 09 6f 2a d7 a8 e6 dd 20 f6 bd f3 b0 a8 de | 56 b0 c1 b0 a8 8e c2 c9 51 e8 12 8c 23 35 5a 34 | 29 00 00 24 d3 9d 92 33 15 50 42 07 cb e2 93 fb | fa f0 4d 62 ce 86 f8 78 f6 e4 5a c4 46 ff 05 fd | 2d fe b5 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 f6 95 c7 6a 67 27 fa d2 0e 4e 26 | b1 fb ce d1 96 08 1b d4 00 00 00 1c 00 00 40 05 | 86 3b a6 fc 26 15 66 79 c8 2d 3b 9c 75 89 43 54 | 51 cf ae 75 | libevent_free: release ptr-libevent@0x7fb384015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a18370 | #56 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 38 96 b9 83 17 2c 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #56 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #56 | rejected packet: | a2 38 96 b9 83 17 2c 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #56: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0568 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e7260 | handling event EVENT_RETRANSMIT for parent state #44 | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #44 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #44 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49606.434229; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002069 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ffbf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #44 | libevent_malloc: new ptr-libevent@0x7fb384015370 size 128 "road-eastnet-nonat-44" #44: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #44) | 2c a5 57 82 94 bb 0c bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f f1 d9 3a 5c ec da ab 46 a0 1a 50 8e c5 b2 4a | 63 93 0d d6 bb 0b cb a2 7b 64 4c d6 0d 5d 75 c0 | a4 fb 12 20 36 86 d2 5a 85 de 9f 1a 56 dd 51 88 | 1f dd 14 6d 54 37 65 2c 39 00 b9 0b d0 9a b8 93 | dd 72 9a 78 33 2f fe d8 37 67 48 08 b2 16 1f 29 | 2a f2 be 3c 42 f3 72 0d 31 7d f4 16 71 3f 2a 28 | a2 72 a2 07 56 93 05 b3 01 4f f8 0a 3d 17 c2 61 | 36 84 95 ef b4 4f 95 5b 93 28 0b 0c 46 73 8a 49 | 11 16 41 b2 73 0b 44 cf a4 af 2f d7 2a 7a 6d 3e | 45 30 bc f5 de 74 14 4c f1 52 50 35 c7 29 67 5d | 02 d9 88 3e 6a e4 83 d6 7c b8 69 a3 7c 7f 9b 8b | 37 21 48 68 00 9a 01 a3 9a d7 3b 02 8c 67 ac 11 | 42 36 9e 84 ad 85 da a3 35 c1 ee c3 6a 24 37 55 | cc 67 9a 57 48 6e 0b 5c b6 9c 4d 16 ed 25 57 02 | 16 2f e6 f6 ce 2a b1 ca e6 1e 1f f9 44 d1 46 60 | 1f 00 3a 24 c7 f4 7b 04 f3 08 7e 6f de 0b 6c 0f | 29 00 00 24 c3 85 c7 9f 53 c2 4b 6d 4a b2 71 6f | 5f 3f 70 d0 bf 0d 26 13 04 46 9b 8c 51 07 8b 19 | bb fc 96 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f 56 cd 95 dd 34 fe 03 70 04 69 b5 | 7b 30 2c 80 a8 67 5b f1 00 00 00 1c 00 00 40 05 | 20 cd 88 b3 c4 29 91 b7 4b 43 e6 f4 9f a3 71 4b | c5 83 8c 17 | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e7260 | #44 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c a5 57 82 94 bb 0c bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #44 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #44 | rejected packet: | 2c a5 57 82 94 bb 0c bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #44: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-71" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-71' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #71 at 0x557d46a35910 | State DB: adding IKEv2 state #71 in UNDEFINED | pstats #71 ikev2.ike started | Message ID: init #71: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #71: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #71; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-71" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-71" IKE SA #71 "road-eastnet-nonat-71" "road-eastnet-nonat-71" #71: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-71 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-71": constructed local IKE proposals for road-eastnet-nonat-71 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 71 for state #71 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a205f0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #71 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 | crypto helper 16 resuming | crypto helper 16 starting work-order 71 for state #71 | #71 spent 0.176 milliseconds in ikev2_parent_outI1() | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 71 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-71" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.282 milliseconds in whack | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 71 time elapsed 0.000848 seconds | (#71) spent 0.852 milliseconds in crypto helper computing work-order 71: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 71 for state #71 to event queue | scheduling resume sending helper answer for #71 | libevent_malloc: new ptr-libevent@0x7fb364017f20 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #71 | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 71 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #71 | **emit ISAKMP Message: | initiator cookie: | 95 1a 0e bc b8 89 e9 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-71 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 29 b7 52 d3 88 4c 72 94 29 6d 07 48 59 53 9a 94 | ikev2 g^x c0 d8 40 dd 8b 33 cc b5 e7 5f 10 c4 f9 b5 b0 62 | ikev2 g^x 0e 7e dc 7c c0 5d c2 c0 b8 2a 1e ee d8 c7 67 c5 | ikev2 g^x 6e 7a 2e c8 c8 78 d1 01 66 2d d2 7e a8 80 78 39 | ikev2 g^x ed 64 bc 65 47 6b 53 20 db f8 49 7d 75 df ac 21 | ikev2 g^x 43 37 22 43 cf 85 a4 b5 c6 f2 cc 18 4e ff c1 67 | ikev2 g^x d6 fb 3b b4 2a 72 36 3e af 12 4f 93 13 35 59 a3 | ikev2 g^x 8d fd 4c ac bd 7c e1 d6 8a 63 b4 aa 9a 01 66 5d | ikev2 g^x 44 4d c8 c6 a5 27 c2 50 76 c4 0f 7a ea 30 2c 2e | ikev2 g^x c8 fd c2 09 eb 13 95 a3 62 05 52 05 99 27 2d 5d | ikev2 g^x 04 8a cb d5 bd f0 da af b1 fd a8 57 4b 25 12 cd | ikev2 g^x 81 31 3f 97 9d 49 d1 70 50 67 35 65 ba 2d c4 ae | ikev2 g^x a9 91 18 06 72 21 47 2c 8e e0 a3 db 1b a2 3f 13 | ikev2 g^x 0f a8 f6 3e 94 d7 36 d8 17 22 ad cd f5 cd f3 43 | ikev2 g^x 86 8f ec 5e a8 71 d9 dd 87 6e d8 e4 58 cb 3c 76 | ikev2 g^x ee 77 2a 83 0c e5 de 50 b0 fc 77 61 13 ac a0 07 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 12 6c 20 e2 d1 b6 94 1d 42 66 63 a9 4b 6f 5d 9a | IKEv2 nonce 24 6f cd 6b 53 ff a3 87 80 0a b8 8b a0 96 5f 5a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 95 1a 0e bc b8 89 e9 dd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 47 | natd_hash: port= 01 f4 | natd_hash: hash= 2d bc a1 51 aa 8f 7f ab dc e5 06 f0 38 bb 8c 63 | natd_hash: hash= 92 8e b2 f3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2d bc a1 51 aa 8f 7f ab dc e5 06 f0 38 bb 8c 63 | Notify data 92 8e b2 f3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 95 1a 0e bc b8 89 e9 dd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c9 d4 4d 25 1c 7e db b6 b8 a8 68 63 26 d6 45 14 | natd_hash: hash= b5 8e ec 75 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c9 d4 4d 25 1c 7e db b6 b8 a8 68 63 26 d6 45 14 | Notify data b5 8e ec 75 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #71 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #71: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #71 to 4294967295 after switching state | Message ID: IKE #71 skipping update_recv as MD is fake | Message ID: sent #71 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-71" #71: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.71:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #71) | 95 1a 0e bc b8 89 e9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 b7 52 d3 88 4c 72 94 29 6d 07 48 59 53 9a 94 | c0 d8 40 dd 8b 33 cc b5 e7 5f 10 c4 f9 b5 b0 62 | 0e 7e dc 7c c0 5d c2 c0 b8 2a 1e ee d8 c7 67 c5 | 6e 7a 2e c8 c8 78 d1 01 66 2d d2 7e a8 80 78 39 | ed 64 bc 65 47 6b 53 20 db f8 49 7d 75 df ac 21 | 43 37 22 43 cf 85 a4 b5 c6 f2 cc 18 4e ff c1 67 | d6 fb 3b b4 2a 72 36 3e af 12 4f 93 13 35 59 a3 | 8d fd 4c ac bd 7c e1 d6 8a 63 b4 aa 9a 01 66 5d | 44 4d c8 c6 a5 27 c2 50 76 c4 0f 7a ea 30 2c 2e | c8 fd c2 09 eb 13 95 a3 62 05 52 05 99 27 2d 5d | 04 8a cb d5 bd f0 da af b1 fd a8 57 4b 25 12 cd | 81 31 3f 97 9d 49 d1 70 50 67 35 65 ba 2d c4 ae | a9 91 18 06 72 21 47 2c 8e e0 a3 db 1b a2 3f 13 | 0f a8 f6 3e 94 d7 36 d8 17 22 ad cd f5 cd f3 43 | 86 8f ec 5e a8 71 d9 dd 87 6e d8 e4 58 cb 3c 76 | ee 77 2a 83 0c e5 de 50 b0 fc 77 61 13 ac a0 07 | 29 00 00 24 12 6c 20 e2 d1 b6 94 1d 42 66 63 a9 | 4b 6f 5d 9a 24 6f cd 6b 53 ff a3 87 80 0a b8 8b | a0 96 5f 5a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d bc a1 51 aa 8f 7f ab dc e5 06 f0 | 38 bb 8c 63 92 8e b2 f3 00 00 00 1c 00 00 40 05 | c9 d4 4d 25 1c 7e db b6 b8 a8 68 63 26 d6 45 14 | b5 8e ec 75 | state #71 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a205f0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e7260 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #71 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 | #71 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49606.438506 | resume sending helper answer for #71 suppresed complete_v2_state_transition() and stole MD | #71 spent 0.525 milliseconds in resume sending helper answer | stop processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb364017f20 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 1a 0e bc b8 89 e9 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #71 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #71 | rejected packet: | 95 1a 0e bc b8 89 e9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #71: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #19 | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #19 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #19 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49606.452727; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005088 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a18370 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #19 | libevent_malloc: new ptr-libevent@0x7fb364017f20 size 128 "road-eastnet-nonat-19" #19: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #19) | 71 b7 8f 2a c9 ab 65 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 3e b3 71 5b 2a 7e 67 38 d7 ab 7a d2 03 90 2c | 27 b7 e6 d5 a7 20 27 79 5e 88 db 2d 02 14 e6 05 | 6f 07 f4 c1 2b 42 e9 2b 16 c7 24 00 68 97 23 09 | 9b 28 53 ba dc 36 46 57 40 1e 29 01 4a b7 49 a8 | 4d 9b c0 f6 6d 6c 59 7a d3 fe f7 05 02 d7 dc 3f | 33 37 fa 6e 66 82 3b 0b fc 41 01 e0 cf 12 33 b2 | a1 18 77 fd c8 36 dd ad 0b 8f 44 4a dc 2c 38 79 | 30 fa d4 bf 2a 29 27 db 37 30 a3 c6 e5 0f b5 2b | 3c 20 72 b8 f7 83 6c 1c 84 55 8f f3 1f 64 ae 19 | e5 47 9f 5e eb 0a e5 2c 75 55 6a e2 43 09 5c e9 | 24 9c 73 ae e6 a6 e7 07 f6 fe ad 11 3d af ab 94 | 47 55 a2 0e c7 5d 4b 0e 42 8f 1e 08 35 c6 12 3b | 76 58 3a e5 1d 69 62 62 bc c4 a4 b5 cb 6c d9 c9 | 2b 81 e2 3b e9 c6 13 78 c3 3f f3 38 91 f3 11 a1 | 04 e8 fa 3f 9f e8 f9 3d 60 98 07 62 99 3c 36 86 | 40 55 c7 f1 5a 42 4d 99 21 5e 58 f5 e4 8a cb d6 | 29 00 00 24 d1 01 c3 e5 0a d4 10 8b f6 20 25 e6 | de b5 f4 be cf de 7f f4 c1 d3 ec a5 70 52 4e 33 | 0b 30 f5 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 74 af f0 20 10 33 a5 14 d9 51 67 | 36 d9 37 b0 71 8d 2c dc 00 00 00 1c 00 00 40 05 | 0e 08 6a ae a9 27 97 90 41 13 4d a4 49 51 01 50 | a2 07 2e 34 | libevent_free: release ptr-libevent@0x7fb378012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #19 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 b7 8f 2a c9 ab 65 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #19 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #19 | rejected packet: | 71 b7 8f 2a c9 ab 65 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #19: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8e0 | handling event EVENT_RETRANSMIT for parent state #64 | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #64 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #64 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49606.471091; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501316 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #64 | libevent_malloc: new ptr-libevent@0x7fb378012840 size 128 "road-eastnet-nonat-64" #64: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #64) | 28 7e be 04 bb c7 3c e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 7e 43 6c c6 61 f7 8d 74 52 44 4a 1c ca e7 9e | ac 14 d9 31 6d 60 9d f4 ba 6e c2 e0 7b d5 53 a3 | 16 85 f9 c3 ce f8 f1 6f bf 00 c2 bc 5a d4 f5 80 | d8 8f 02 50 d5 75 7e 2e dc 8c e1 ab a9 5d a2 cc | da fa 4e bf fb 7e 0d a9 06 25 1f 41 e3 0d cd 1b | 1a a7 53 a9 ce 79 cd b5 77 9b b8 2e 89 66 fa cb | ad fc 1f a1 86 e2 14 75 9e d9 ee bd ba f9 9f 7c | e4 64 68 99 18 9c 70 2b 82 20 55 55 75 56 88 5d | d8 d5 c7 f6 4d e5 dc 25 37 08 b7 1b d0 a6 99 40 | 0a 49 58 f6 83 1c 88 a0 08 dc b3 c1 aa ed 91 6f | c6 a5 be 4d 6b b9 bb 18 cf 12 ba 0d 71 89 70 ef | 66 fa c4 5b 33 09 3f ff 55 ca 19 24 9a 74 4d 4c | d1 a6 e0 57 41 7a 44 3f b8 12 3a 3f 06 a7 52 cd | 97 1c e0 a8 3c be fa 81 97 1d d6 2b 3f 0b c8 9f | b8 ad e1 63 a0 10 8f f1 ce 62 64 83 9e 28 1c 57 | ba 8c 77 7e 6f fe 44 22 ea fc fc 43 05 9a a7 9f | 29 00 00 24 d6 fa 6f 28 11 8e 89 70 36 5a 3b d2 | 30 2c 96 5f 7f e3 aa dc e7 9f 74 e4 9d 9a 67 37 | a5 4e 3a 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 34 45 e6 51 f4 83 8b a3 3b 13 c9 | fe 48 d2 4a 75 21 a9 ed 00 00 00 1c 00 00 40 05 | 1b 38 c5 d0 41 1e ff f1 67 34 2b 17 6a 69 bf 2e | 0c d6 b9 4f | libevent_free: release ptr-libevent@0x7fb37800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8e0 | #64 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 7e be 04 bb c7 3c e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #64 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #64 | rejected packet: | 28 7e be 04 bb c7 3c e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #64: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #45 | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #45 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #45 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49606.500378; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00466 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a30d30 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #45 | libevent_malloc: new ptr-libevent@0x7fb37800cf80 size 128 "road-eastnet-nonat-45" #45: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #45) | a3 bb a6 38 bf 16 36 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 bf 7f b3 da cb 24 f0 9d 9b d3 fd dc cf db 07 | e6 5b 40 74 f8 99 0f 8a 69 5b 21 df 39 e1 ee 66 | 6e d2 eb aa da ff dd cd ef 30 5f f7 58 03 e1 db | 0d 74 f6 29 93 ca f1 42 fd ad b9 96 9c 2f 50 32 | 58 c3 21 d3 aa 48 12 01 4c e3 13 6e 9b ee 2d 74 | 42 be dc c8 fd 3f 8a d7 32 bc c2 52 53 8d f7 2a | 84 67 44 c8 2e dc 1a b1 bb 7e 48 68 aa 07 71 d2 | ed bb 6e e8 36 32 f2 a5 31 45 4d 85 68 10 11 40 | f6 85 5c 6f 85 60 44 96 50 66 ff a4 e4 4d 79 e9 | 3c a7 0e 91 f7 05 c3 d3 85 48 8e e8 a2 59 53 66 | 1c c3 08 ca 90 69 7f b0 5f 9c 5b ec cd 7e 11 67 | 1a 0f 4b b0 b3 89 8c 73 6f 1c d6 27 19 18 73 72 | 31 f5 6c a7 f0 f8 1b 36 35 8a f6 30 2e d1 b7 af | a6 2e 5d 9a f5 83 05 7a b2 73 c7 24 06 c8 92 6b | 85 fe 7f 79 f1 ba 3f d3 86 28 f4 16 3a 94 56 af | 55 d5 d6 bc 89 52 4c e8 34 d8 86 d5 fe 13 15 fe | 29 00 00 24 a8 f8 bf 2a 70 d8 0d e9 bf c1 0f 00 | 25 da 1d db 8f ac 61 b5 e1 f0 75 9a 00 6d 79 0f | ff f5 3b 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 ff e8 4e 79 94 20 d9 00 0d 87 37 | ed 16 46 76 d8 43 be 32 00 00 00 1c 00 00 40 05 | 2d 67 24 20 12 0e 18 8c 34 32 0f 7c 4f 51 94 df | fd 23 b8 c6 | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #45 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-72" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-72' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #72 at 0x557d46a36ed0 | State DB: adding IKEv2 state #72 in UNDEFINED | pstats #72 ikev2.ike started | Message ID: init #72: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #72: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #72; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-72" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-72" IKE SA #72 "road-eastnet-nonat-72" "road-eastnet-nonat-72" #72: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-72 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-72": constructed local IKE proposals for road-eastnet-nonat-72 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 72 for state #72 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb340005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #72 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 | #72 spent 0.157 milliseconds in ikev2_parent_outI1() | crypto helper 4 resuming | crypto helper 4 starting work-order 72 for state #72 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-72" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.243 milliseconds in whack recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 bb a6 38 bf 16 36 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #45 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #45 | rejected packet: | a3 bb a6 38 bf 16 36 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #45: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0741 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 72 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 72 time elapsed 0.001735 seconds | (#72) spent 1.02 milliseconds in crypto helper computing work-order 72: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 72 for state #72 to event queue | scheduling resume sending helper answer for #72 | libevent_malloc: new ptr-libevent@0x7fb3580180b0 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #72 | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 72 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #72 | **emit ISAKMP Message: | initiator cookie: | 66 13 43 d6 1b b9 0c ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-72 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c8 b1 4f d1 eb 26 94 0a e8 d2 78 fe d2 e8 05 7d | ikev2 g^x 72 29 9f e5 e1 94 c3 7f a9 6a ca 75 12 4e 13 6e | ikev2 g^x e4 11 a5 e1 89 1e 08 5a 0d 5f 6b 49 0c e7 ba a3 | ikev2 g^x db 19 75 da a7 48 e8 e9 64 d4 80 8e 45 f5 82 09 | ikev2 g^x 04 17 24 14 78 b4 6e bb 71 57 6f 3e 18 4c d6 76 | ikev2 g^x a4 ec 50 14 2c c8 4e c9 04 89 23 f1 0a 7f 62 28 | ikev2 g^x 45 8e 70 27 19 66 b0 68 5f c8 be 34 a7 7e 02 24 | ikev2 g^x 87 3b ee fe 4b 57 85 64 69 04 b9 42 92 f3 d5 c0 | ikev2 g^x fe 76 05 b0 05 50 57 66 f6 f8 0b 76 74 c3 53 a1 | ikev2 g^x 05 f6 81 e4 08 d7 39 f0 53 40 e0 f4 aa 4c ff a6 | ikev2 g^x 90 72 89 fb 79 82 71 5c b3 e4 6d 43 97 e8 51 8b | ikev2 g^x ba 0a c8 eb e3 46 09 21 84 b9 ea ef 0d 8d d4 64 | ikev2 g^x 4c bf f8 b1 9c cd 8a 27 78 9c ef 52 df a6 5e b4 | ikev2 g^x 15 f4 af e2 3a 17 55 a8 8a cb 58 8c 66 bc a1 fb | ikev2 g^x 21 eb f8 38 a5 f6 b0 fd 47 53 aa ad 2e e9 17 ad | ikev2 g^x 29 40 34 3f b5 2c 48 93 29 5b c3 81 a9 9a f6 f7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d2 7d 93 13 5f e4 cd 1b 68 e9 96 b6 73 3d 25 76 | IKEv2 nonce 63 d4 92 1a 4f 51 ac b1 63 90 04 8e 34 c5 00 f0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 66 13 43 d6 1b b9 0c ba | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 48 | natd_hash: port= 01 f4 | natd_hash: hash= c4 6c df 39 39 e8 cd 3f 26 eb f0 86 8a 8d 3e 3d | natd_hash: hash= 91 1f 2d ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c4 6c df 39 39 e8 cd 3f 26 eb f0 86 8a 8d 3e 3d | Notify data 91 1f 2d ed | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 66 13 43 d6 1b b9 0c ba | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4c 1b 62 1c 4c 06 92 d2 01 38 c8 0e 4f 7e fd bc | natd_hash: hash= 86 e6 84 ff | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4c 1b 62 1c 4c 06 92 d2 01 38 c8 0e 4f 7e fd bc | Notify data 86 e6 84 ff | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #72 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #72: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #72 to 4294967295 after switching state | Message ID: IKE #72 skipping update_recv as MD is fake | Message ID: sent #72 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-72" #72: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.72:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #72) | 66 13 43 d6 1b b9 0c ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 b1 4f d1 eb 26 94 0a e8 d2 78 fe d2 e8 05 7d | 72 29 9f e5 e1 94 c3 7f a9 6a ca 75 12 4e 13 6e | e4 11 a5 e1 89 1e 08 5a 0d 5f 6b 49 0c e7 ba a3 | db 19 75 da a7 48 e8 e9 64 d4 80 8e 45 f5 82 09 | 04 17 24 14 78 b4 6e bb 71 57 6f 3e 18 4c d6 76 | a4 ec 50 14 2c c8 4e c9 04 89 23 f1 0a 7f 62 28 | 45 8e 70 27 19 66 b0 68 5f c8 be 34 a7 7e 02 24 | 87 3b ee fe 4b 57 85 64 69 04 b9 42 92 f3 d5 c0 | fe 76 05 b0 05 50 57 66 f6 f8 0b 76 74 c3 53 a1 | 05 f6 81 e4 08 d7 39 f0 53 40 e0 f4 aa 4c ff a6 | 90 72 89 fb 79 82 71 5c b3 e4 6d 43 97 e8 51 8b | ba 0a c8 eb e3 46 09 21 84 b9 ea ef 0d 8d d4 64 | 4c bf f8 b1 9c cd 8a 27 78 9c ef 52 df a6 5e b4 | 15 f4 af e2 3a 17 55 a8 8a cb 58 8c 66 bc a1 fb | 21 eb f8 38 a5 f6 b0 fd 47 53 aa ad 2e e9 17 ad | 29 40 34 3f b5 2c 48 93 29 5b c3 81 a9 9a f6 f7 | 29 00 00 24 d2 7d 93 13 5f e4 cd 1b 68 e9 96 b6 | 73 3d 25 76 63 d4 92 1a 4f 51 ac b1 63 90 04 8e | 34 c5 00 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c4 6c df 39 39 e8 cd 3f 26 eb f0 86 | 8a 8d 3e 3d 91 1f 2d ed 00 00 00 1c 00 00 40 05 | 4c 1b 62 1c 4c 06 92 d2 01 38 c8 0e 4f 7e fd bc | 86 e6 84 ff | state #72 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb340005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #72 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 | #72 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49606.503176 | resume sending helper answer for #72 suppresed complete_v2_state_transition() and stole MD | #72 spent 0.551 milliseconds in resume sending helper answer | stop processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3580180b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 13 43 d6 1b b9 0c ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #72 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #72 | rejected packet: | 66 13 43 d6 1b b9 0c ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #72: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0725 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #57 | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #57 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #57 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49606.506385; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.998545 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a30d70 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #57 | libevent_malloc: new ptr-libevent@0x7fb3580180b0 size 128 "road-eastnet-nonat-57" #57: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #57) | dc 73 20 b1 64 22 3b 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 2f 93 7c 8a da 22 fa 03 a0 fd 43 de d5 8f 84 | 5a 41 29 20 95 01 7c 7c 28 a1 27 22 f2 08 de cf | e0 98 16 08 1c e5 25 a6 bd bd 17 32 15 8e 0a 84 | f3 a2 7e 8a 0b 23 85 bf 7a b1 94 6d 13 0e bc 89 | 00 57 96 19 37 39 1b 02 a4 75 0f 94 90 d1 10 4b | e3 d2 66 0a 4f b7 c6 79 75 d4 b5 7d e4 36 1f c8 | 04 58 22 28 f1 96 40 a5 11 63 03 12 07 da 6e c4 | d6 87 58 17 eb bc 28 31 1f 88 9d a5 0c ef e1 d5 | b2 c3 d0 ee 08 43 a9 fb b1 8f de 78 3c c7 ae 7f | e9 04 ce d2 ab ca 37 0c f1 2a 72 1c 60 e7 51 7f | f2 49 54 44 b1 5f 43 7b 10 10 64 5c c3 44 75 d6 | 07 11 18 89 6c 1c 54 ef 0a c3 7f 69 cd 21 c7 ca | 32 33 4c f8 00 03 d2 d4 0f 41 96 9b 82 7d 76 81 | 10 2f 53 dd cd 91 0b 3d ff 38 8f 40 80 5c 77 b7 | 3d 66 a7 7b a1 8f 9e 2d 33 51 5c 72 92 e6 a3 7a | 40 cc ae 39 5f df 20 2b 13 8b bd 4c 81 23 66 a3 | 29 00 00 24 ad 63 ea 8e 7a 7b c2 d1 15 38 47 f0 | b3 a0 1a e0 85 11 f2 24 75 cc 3c d8 47 12 da f1 | 4a 24 d2 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 1b 4d 24 72 19 56 63 62 33 64 a7 | 66 22 df c0 bd 29 cc 1c 00 00 00 1c 00 00 40 05 | 7a aa 57 0f 26 4b 8b c1 eb 1a a3 08 c1 cf b1 49 | 59 b9 d4 8a | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | #57 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 73 20 b1 64 22 3b 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #57 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #57 | rejected packet: | dc 73 20 b1 64 22 3b 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #57: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0508 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350005860 | handling event EVENT_RETRANSMIT for parent state #65 | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #65 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #65 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49606.534672; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50016 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #65 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 "road-eastnet-nonat-65" #65: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #65) | ef 12 90 5c 48 7d 35 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 1d 09 25 1e 78 f1 ab 15 10 4e 97 1c df 6e dc | ea a4 f2 51 40 2c fc 70 83 3b d1 14 8e 0e 9b f0 | ed 07 86 8f 8c 86 61 7e ec 48 49 64 93 36 5d 3e | 17 1f e8 61 4f 64 88 6f dc 05 20 78 89 b7 e5 6b | 2c bb be 5b d1 73 00 a1 4f 26 6a 56 a9 d6 41 92 | 2d 76 96 98 ed 1d 08 e4 99 fe 2c 5e 06 f5 6b bd | 7e 5c 39 22 bf ae a8 e1 92 1c 13 3f 1d 70 c4 80 | 07 a5 77 ff 91 5d 4b 48 ee 7b fd 40 d0 32 19 b5 | 09 de 90 f8 5a 03 1b 2a 6a c3 ef 64 b2 ec 44 55 | 99 02 c6 b9 5e db b2 cd f2 ce d4 a6 86 55 55 7c | 29 4f 4b ce 6a 0b b1 f7 34 a8 01 90 c9 f9 c3 1c | 81 d7 a5 bb 19 5a 7d e2 de 08 df 1d b2 6d 5a f1 | 1e a2 87 2c 96 1b c7 cb 00 ed 5b 85 f3 b5 ad fb | 85 9e 29 58 fd ca dd fe cc ef 21 ce b6 4c a2 4d | d7 d2 d7 9a 36 aa ca e6 4f 15 82 d8 a4 cd 14 4f | 08 9f 68 62 be 95 a7 c1 d4 3f 0f 63 b9 f6 80 56 | 29 00 00 24 56 09 76 96 73 f6 7a d5 b4 ac d9 d3 | f5 d3 52 17 38 15 85 8c 5c 9b 9d d9 ed a7 ee 26 | 3a e8 6f 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 23 18 fa b0 e0 93 30 87 95 e8 a3 | 79 bf 51 a0 e1 20 e5 2d 00 00 00 1c 00 00 40 05 | 26 a2 95 ca b7 c9 12 03 be 34 1f 1e 21 7b 79 10 | 86 6d e0 e7 | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350005860 | #65 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 12 90 5c 48 7d 35 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #65 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #65 | rejected packet: | ef 12 90 5c 48 7d 35 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #65: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f0aa0 | handling event EVENT_RETRANSMIT for parent state #20 | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #20 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #20 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49606.537093; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004236 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #20 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 "road-eastnet-nonat-20" #20: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #20) | 2a d8 6a 5c 08 dc 68 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad 76 8b c3 8a cd 7e 81 09 43 af dc 84 86 57 86 | ac 01 81 74 96 d6 08 70 58 d2 f7 10 2a f2 1e 9d | b0 95 95 b3 32 1e e8 01 5c d2 e7 39 14 67 2f fd | 6f cc fb 0b 1d bd c7 ac 37 fb c6 6d e0 84 f8 c8 | 00 c1 d6 0f 3b e2 a7 4b 51 a3 13 bb 3d f4 c2 99 | 9b 84 74 df c2 bf fa 13 e4 2a f9 e8 2d 4c 6c c5 | 8d e3 52 85 e9 f8 18 fc 4b 38 b9 82 e0 ab 65 b7 | ae a5 89 3c 88 ee 05 34 a9 d7 52 0c 03 2e a9 7e | e2 c7 7b c9 35 8f e6 9e 0b 55 49 71 ce bd 37 1f | 22 8f 48 76 19 75 9b c0 7a 62 4e 51 77 02 d7 bf | e0 ea 0a 67 41 41 2e 98 4f f3 cf 32 f2 ae 82 83 | 1f 56 7c 33 17 50 fa 76 01 41 f1 ba 05 90 db bd | 83 b9 cd 1b b8 6e f3 33 72 7e 47 f3 20 71 8f e7 | ec 91 f3 37 6a 94 11 a2 55 f0 09 1c 76 98 cd 56 | 66 be 33 43 a6 1c f5 8b 31 c4 e3 0a 7b 29 cc 17 | 3f 13 b8 73 4c 86 e0 b0 2a 03 32 6a 19 82 cb a2 | 29 00 00 24 47 97 3a 6f 12 05 22 fe fb dc 3c 25 | ff 91 0d 7a c8 4c ac f8 1f 7e d1 5f 41 39 e3 39 | e8 aa 43 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f 67 98 f7 05 c6 ee 5e 5b 5f e2 fa | ee a5 ba af 57 96 46 d2 00 00 00 1c 00 00 40 05 | 3e ef c3 bb 3d a5 88 fb 9f 3c 53 fd 3b c9 ea 45 | 6f 53 bd 02 | libevent_free: release ptr-libevent@0x557d469e1b60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f0aa0 | #20 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a d8 6a 5c 08 dc 68 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #20 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #20 | rejected packet: | 2a d8 6a 5c 08 dc 68 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #20: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0524 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-73" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-73' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #73 at 0x557d46a38490 | State DB: adding IKEv2 state #73 in UNDEFINED | pstats #73 ikev2.ike started | Message ID: init #73: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #73: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #73; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-73" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-73" IKE SA #73 "road-eastnet-nonat-73" "road-eastnet-nonat-73" #73: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-73 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-73": constructed local IKE proposals for road-eastnet-nonat-73 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 73 for state #73 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469fb8e0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #73 | libevent_malloc: new ptr-libevent@0x557d469e1b60 size 128 | #73 spent 0.146 milliseconds in ikev2_parent_outI1() | crypto helper 13 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 starting work-order 73 for state #73 | RESET processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-73" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 73 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.253 milliseconds in whack | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 73 time elapsed 0.00087 seconds | (#73) spent 0.863 milliseconds in crypto helper computing work-order 73: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 73 for state #73 to event queue | scheduling resume sending helper answer for #73 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #73 | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 73 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #73 | **emit ISAKMP Message: | initiator cookie: | 1b d1 f7 22 4f 1d be c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-73 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b0 17 af cb 15 dc ab b1 a5 7f 34 62 4e 0f 28 9a | ikev2 g^x 18 48 48 5b 8a 7c 0e f9 96 fe 06 d5 63 de 59 f8 | ikev2 g^x 49 35 b4 79 b1 9f 27 0d e0 5d f1 56 f3 be 3d 0b | ikev2 g^x 2c 98 27 ba b0 9f 63 a4 e7 98 a1 c0 ce b7 fa 57 | ikev2 g^x bc af 56 22 b4 0b 08 17 91 1f 28 fd 21 7d b9 47 | ikev2 g^x be 94 09 11 9d 2a ae 62 55 90 ec cd fb 6d 33 53 | ikev2 g^x dc 6e 16 d9 31 7b 9a c8 fd c1 75 61 52 f6 98 91 | ikev2 g^x 94 9a f3 05 36 de 11 ce 66 87 ce 7a d3 f8 fd 04 | ikev2 g^x 0b ba 01 fd 05 22 ef 85 db 52 65 4a 74 05 92 71 | ikev2 g^x be df ba dc 65 01 21 6c d5 86 65 2b 9a e5 83 35 | ikev2 g^x a5 c8 2d 49 2e 69 13 a9 18 d4 42 31 7e 26 5b 88 | ikev2 g^x 7c 6f cd 46 42 cb fc 6c 40 14 2b 57 0e e7 97 72 | ikev2 g^x 5b db 5d 77 72 cd 54 3e 63 fa 42 39 c6 a7 84 0d | ikev2 g^x 90 25 f3 6f 23 cf 8e 04 75 0a 41 85 e3 ef 88 28 | ikev2 g^x 25 3f 56 c1 9a ec 95 fb a0 fa ac 95 ac 16 97 71 | ikev2 g^x 2e b2 fb 1e 8b 8f a8 12 b2 0a 1f 31 5e c4 d7 fa | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 93 de fa 16 34 ae c4 6f 1c b0 6f ba 95 0e 80 10 | IKEv2 nonce 81 5f 54 52 00 a9 bf 63 44 18 a5 30 6d af 4e 5e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1b d1 f7 22 4f 1d be c3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 49 | natd_hash: port= 01 f4 | natd_hash: hash= 05 5e 43 5b b5 69 a0 f9 16 98 c0 46 f4 de 55 67 | natd_hash: hash= f2 0c 20 b2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 05 5e 43 5b b5 69 a0 f9 16 98 c0 46 f4 de 55 67 | Notify data f2 0c 20 b2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1b d1 f7 22 4f 1d be c3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 50 cf 48 cc c9 4e 77 06 66 f1 57 3b 42 c0 94 82 | natd_hash: hash= a3 eb c2 6e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 50 cf 48 cc c9 4e 77 06 66 f1 57 3b 42 c0 94 82 | Notify data a3 eb c2 6e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #73 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #73: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #73 to 4294967295 after switching state | Message ID: IKE #73 skipping update_recv as MD is fake | Message ID: sent #73 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-73" #73: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.73:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #73) | 1b d1 f7 22 4f 1d be c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 17 af cb 15 dc ab b1 a5 7f 34 62 4e 0f 28 9a | 18 48 48 5b 8a 7c 0e f9 96 fe 06 d5 63 de 59 f8 | 49 35 b4 79 b1 9f 27 0d e0 5d f1 56 f3 be 3d 0b | 2c 98 27 ba b0 9f 63 a4 e7 98 a1 c0 ce b7 fa 57 | bc af 56 22 b4 0b 08 17 91 1f 28 fd 21 7d b9 47 | be 94 09 11 9d 2a ae 62 55 90 ec cd fb 6d 33 53 | dc 6e 16 d9 31 7b 9a c8 fd c1 75 61 52 f6 98 91 | 94 9a f3 05 36 de 11 ce 66 87 ce 7a d3 f8 fd 04 | 0b ba 01 fd 05 22 ef 85 db 52 65 4a 74 05 92 71 | be df ba dc 65 01 21 6c d5 86 65 2b 9a e5 83 35 | a5 c8 2d 49 2e 69 13 a9 18 d4 42 31 7e 26 5b 88 | 7c 6f cd 46 42 cb fc 6c 40 14 2b 57 0e e7 97 72 | 5b db 5d 77 72 cd 54 3e 63 fa 42 39 c6 a7 84 0d | 90 25 f3 6f 23 cf 8e 04 75 0a 41 85 e3 ef 88 28 | 25 3f 56 c1 9a ec 95 fb a0 fa ac 95 ac 16 97 71 | 2e b2 fb 1e 8b 8f a8 12 b2 0a 1f 31 5e c4 d7 fa | 29 00 00 24 93 de fa 16 34 ae c4 6f 1c b0 6f ba | 95 0e 80 10 81 5f 54 52 00 a9 bf 63 44 18 a5 30 | 6d af 4e 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 5e 43 5b b5 69 a0 f9 16 98 c0 46 | f4 de 55 67 f2 0c 20 b2 00 00 00 1c 00 00 40 05 | 50 cf 48 cc c9 4e 77 06 66 f1 57 3b 42 c0 94 82 | a3 eb c2 6e | state #73 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x557d469e1b60 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469fb8e0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a205f0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #73 | libevent_malloc: new ptr-libevent@0x557d469e1b60 size 128 | #73 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49606.573156 | resume sending helper answer for #73 suppresed complete_v2_state_transition() and stole MD | #73 spent 0.513 milliseconds in resume sending helper answer | stop processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c0180b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b d1 f7 22 4f 1d be c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #73 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #73 | rejected packet: | 1b d1 f7 22 4f 1d be c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #73: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34000d120 | handling event EVENT_RETRANSMIT for parent state #46 | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #46 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #46 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49606.591438; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003622 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a16db0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #46 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 "road-eastnet-nonat-46" #46: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #46) | b8 02 bd ab b2 01 5a b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 02 34 ab 29 73 17 93 9c d3 ac d4 2d a7 40 8f | 6c ab ce c1 cf 26 d8 e1 c0 a5 2f a8 7c e6 62 97 | 14 ae ce 27 9d 48 da 55 bb 1a 50 83 cd 98 7c 7e | 93 0d ef 6b a4 36 24 54 0e e8 77 76 0a 46 5c 28 | c7 d2 ff f1 d4 08 43 1a 21 66 26 cc ac 89 a4 fa | 9e 6f e1 5a 6f bb 4b ea 22 4d 9a 3d 2a 1c 97 d5 | e7 d2 d1 ac 8d d0 32 2d 42 98 eb fc 7f 55 28 65 | e5 b7 88 e1 ec b5 ba 0a 74 06 aa 48 51 b1 11 3b | 2f 1d 4c c7 49 ef 3c d0 65 a2 df 8e 59 96 65 b4 | 5b 67 18 f6 c6 dd c1 ba 8c 98 60 72 7f 9b 34 f1 | f4 df 07 a6 02 25 08 e0 ca 45 1c 4e 5a 84 92 f8 | 41 4b e2 11 63 dd 97 cd e2 1c a6 92 32 6d 9f 66 | 47 ba 05 95 3f 93 67 80 97 77 56 16 84 bf 6b d6 | e6 b0 76 58 be 43 b2 86 c2 1e 75 44 04 7d 93 a8 | 8c b0 a8 b8 83 ce 3c 1a d2 a1 85 f4 c7 9a 35 d1 | a2 ff 32 1f de 4b 99 be 80 8a 49 9b 41 45 2e a7 | 29 00 00 24 59 91 d6 77 3b 12 ba 32 8c e3 4b 3b | 93 6d 1e 3b 04 96 db ec 7e 0e 16 50 f1 18 04 aa | e6 1e e5 ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c a5 da 82 02 27 22 be 3c d8 f4 7e | 26 be f7 a0 40 5a a0 f6 00 00 00 1c 00 00 40 05 | 90 e6 40 68 17 4b f9 af 42 5a 03 6b 4d 68 d7 fb | 1b b9 9d a8 | libevent_free: release ptr-libevent@0x7fb340012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000d120 | #46 spent 0.178 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 02 bd ab b2 01 5a b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #46 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #46 | rejected packet: | b8 02 bd ab b2 01 5a b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #46: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0713 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f2060 | handling event EVENT_RETRANSMIT for parent state #58 | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #58 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #58 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49606.592799; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001737 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #58 | libevent_malloc: new ptr-libevent@0x7fb340012840 size 128 "road-eastnet-nonat-58" #58: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #58) | 0b a9 81 95 1f 0d 8e 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f b0 e3 df ce d1 d0 b9 30 6e 16 b3 e7 cf 92 e5 | a6 70 0e 23 5e 02 05 19 f5 b5 1a 04 6c 5e 7d a2 | 79 25 aa 0e 70 2a 25 1f 1c 02 b5 fc b9 3e 75 ad | e7 1e f1 8c 9c 7f 92 92 1d dc b1 ca 6d cf 53 ac | b8 0b 70 9b 2c 6a e7 8d 07 95 ae e1 37 ab ac 14 | 91 d8 79 4c ef 08 d0 d9 b0 55 82 09 5f 15 d9 df | e8 2c 4e cb ea a0 59 1c 81 c7 f6 39 0a 52 62 8e | 4b 57 28 22 1f d7 52 eb ec 16 d8 46 16 0a 27 88 | c7 c5 f7 e2 87 71 a1 2d 5e 9c 25 83 70 f1 a8 0c | df 63 58 3a 6f ba 9a fc 71 ac 13 82 0c ff 96 f7 | b2 3e 0f af a2 df f1 69 8f db ce 47 13 89 8f fd | ce 0a 15 3f 64 ea 8f f4 c7 b7 5e 3b b0 17 0a 90 | ef 23 ff a9 81 27 7d 7c ee 7a 36 7f 56 c1 b8 52 | 77 69 e0 69 4b 05 7c e7 a7 d2 48 f2 eb ac 08 c4 | 5f 9f b5 9e fc d5 98 d0 41 7f 9b ec 07 64 d8 f7 | 80 37 a2 97 6c ab e1 aa b4 48 78 11 a3 f3 d8 0a | 29 00 00 24 dd 82 37 0e 6e 7f fd 43 0e f6 0a 6a | 68 bc 25 88 0a 9e 3e 74 64 09 ae e7 87 f2 db fe | 06 d2 df 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 02 ef 4d 47 45 3b d6 d5 d7 fa ad | b5 dd 5d f9 98 95 75 30 00 00 00 1c 00 00 40 05 | 0c 06 c0 09 b1 a9 53 e2 00 18 ae 12 95 c7 71 d4 | 78 09 4b e3 | libevent_free: release ptr-libevent@0x7fb35800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f2060 | #58 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b a9 81 95 1f 0d 8e 78 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #58 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #58 | rejected packet: | 0b a9 81 95 1f 0d 8e 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #58: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.068 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #66 | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #66 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #66 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49606.597135; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500661 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f0aa0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #66 | libevent_malloc: new ptr-libevent@0x7fb35800cf80 size 128 "road-eastnet-nonat-66" #66: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #66) | 64 fc 26 82 c6 65 9b e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 5c 42 12 a8 cf 54 30 35 41 88 3e 73 38 e5 58 | 88 e1 84 4c b4 74 fd b0 fa c4 88 6f 83 90 67 ee | ea 08 5d 03 f5 21 c1 48 f4 fa d9 68 de f8 02 e9 | 20 8c 8f 00 bb e0 27 04 09 fe 8d f2 a1 9c cf 02 | 35 98 ce 70 23 87 ee fc 94 cd 0c 7b 9f 06 08 77 | f2 7f c2 13 7f e1 04 f8 2f 23 ef 1d fb 54 4c 0d | ac 20 e0 c8 bd 84 3e ce b6 49 37 85 56 01 f1 9b | ac 54 85 9c fd 7d 5d 63 30 bd f9 4d d5 7a c1 a0 | 6c 64 e9 25 18 ed 7b 3f 1a a2 52 c0 47 b8 c4 ff | 46 70 76 9b eb db 63 e5 d9 0f fb e2 44 f2 65 5e | ab 82 c1 e9 45 5a aa 38 88 06 f2 1d 2e 7b 75 16 | bf 94 df 07 bd 89 cd 9e ba b0 6c 38 fc 80 69 75 | 55 88 bd 23 1e bc ab 76 6d 9e ce 05 ea ee d0 f1 | 1a bd 0c b1 86 63 56 69 8c 5f 2e 8a f5 e2 c1 97 | 10 bc e7 eb 71 fb 81 cd 25 de 9b 6d 12 04 dd ce | 36 90 99 3b a3 2d 73 4a 99 7b f0 18 dc 83 2b 7d | 29 00 00 24 64 f2 bd 07 f3 b0 6e 75 d4 40 2c d9 | f4 e5 3f 9a 4d aa 41 b2 3f a1 6e 03 4f 7d 3f ec | 58 37 55 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d dc 62 51 f8 7c c3 1c 6d 46 26 31 | c0 6e bd 6d 19 0c cf 42 00 00 00 1c 00 00 40 05 | 76 be 2b c3 74 ff 88 3d a8 f9 74 84 97 f5 dc 48 | 6c 56 c4 9c | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #66 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 fc 26 82 c6 65 9b e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #66 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #66 | rejected packet: | 64 fc 26 82 c6 65 9b e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #66: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0677 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-74" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-74' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #74 at 0x557d46a39a50 | State DB: adding IKEv2 state #74 in UNDEFINED | pstats #74 ikev2.ike started | Message ID: init #74: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #74: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #74; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-74" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-74" IKE SA #74 "road-eastnet-nonat-74" "road-eastnet-nonat-74" #74: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-74 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-74": constructed local IKE proposals for road-eastnet-nonat-74 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 74 for state #74 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #74 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | crypto helper 17 resuming | #74 spent 0.151 milliseconds in ikev2_parent_outI1() | crypto helper 17 starting work-order 74 for state #74 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 74 | RESET processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-74" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.249 milliseconds in whack | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 74 time elapsed 0.00081 seconds | (#74) spent 0.809 milliseconds in crypto helper computing work-order 74: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 74 for state #74 to event queue | scheduling resume sending helper answer for #74 | libevent_malloc: new ptr-libevent@0x7fb3500180b0 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #74 | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 74 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #74 | **emit ISAKMP Message: | initiator cookie: | 74 9c fc 4a 6a e3 e3 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-74 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b0 4c a1 32 c0 37 d8 5b 48 9c e5 d1 93 92 0c 53 | ikev2 g^x 2d 7a c8 b1 df 24 d3 9a 3f 8c d4 c5 68 47 a3 a6 | ikev2 g^x 97 97 ce bb 01 47 69 1c 80 a7 65 98 e9 23 03 f4 | ikev2 g^x d4 b7 9b 7e d3 4c aa b4 56 9e 09 14 71 47 28 7f | ikev2 g^x c7 55 55 ab d5 8e 75 f5 9a f4 57 8c 05 da 66 0a | ikev2 g^x 40 9c be 25 a4 ef c7 bf 8b 81 b2 07 d2 0a 7d 79 | ikev2 g^x a8 74 67 c4 01 41 ba 6b 27 91 81 d4 a9 3f 71 a7 | ikev2 g^x d8 a9 d4 20 88 c0 67 ed 9a eb cb 95 5d 27 cd ae | ikev2 g^x 65 ee b7 22 c0 dd 63 86 9c 71 c8 d0 62 02 64 6a | ikev2 g^x 57 b2 8d 13 05 28 bc e0 52 39 21 a1 da 4e f2 d4 | ikev2 g^x b5 8a d4 4a 90 a1 15 ec 76 63 23 1b 27 bd 31 af | ikev2 g^x 95 a2 f3 5b 2d 4e d4 42 7c 32 a2 bf 50 28 83 76 | ikev2 g^x 27 c1 4e 56 b2 c9 33 07 a5 ee bf 65 36 77 b7 43 | ikev2 g^x c5 de f7 7c c7 52 fc 27 15 dc 50 6e c0 2f d7 72 | ikev2 g^x 5a 3b a4 4a 5b f6 13 1e 38 47 4d 77 c3 69 47 89 | ikev2 g^x 95 21 ff 50 2d c1 83 a3 1a 90 31 a7 2f c0 c1 a5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5c 46 aa ed 6c 5c 2a de e4 4c 0f 0d ff be a8 c1 | IKEv2 nonce d6 16 7f 78 81 97 e2 33 fc 98 55 93 9e 14 cc 5e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 74 9c fc 4a 6a e3 e3 7d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4a | natd_hash: port= 01 f4 | natd_hash: hash= 70 26 fa 02 ef ac 51 67 96 4e b3 ca 7c 6c ba e3 | natd_hash: hash= fb 9a 52 77 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 70 26 fa 02 ef ac 51 67 96 4e b3 ca 7c 6c ba e3 | Notify data fb 9a 52 77 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 74 9c fc 4a 6a e3 e3 7d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 65 ee a5 86 f4 0e 73 b1 a9 eb cb 64 18 5a 0c a9 | natd_hash: hash= fd 3d e5 eb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 65 ee a5 86 f4 0e 73 b1 a9 eb cb 64 18 5a 0c a9 | Notify data fd 3d e5 eb | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #74 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #74: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #74 to 4294967295 after switching state | Message ID: IKE #74 skipping update_recv as MD is fake | Message ID: sent #74 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-74" #74: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.74:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #74) | 74 9c fc 4a 6a e3 e3 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 4c a1 32 c0 37 d8 5b 48 9c e5 d1 93 92 0c 53 | 2d 7a c8 b1 df 24 d3 9a 3f 8c d4 c5 68 47 a3 a6 | 97 97 ce bb 01 47 69 1c 80 a7 65 98 e9 23 03 f4 | d4 b7 9b 7e d3 4c aa b4 56 9e 09 14 71 47 28 7f | c7 55 55 ab d5 8e 75 f5 9a f4 57 8c 05 da 66 0a | 40 9c be 25 a4 ef c7 bf 8b 81 b2 07 d2 0a 7d 79 | a8 74 67 c4 01 41 ba 6b 27 91 81 d4 a9 3f 71 a7 | d8 a9 d4 20 88 c0 67 ed 9a eb cb 95 5d 27 cd ae | 65 ee b7 22 c0 dd 63 86 9c 71 c8 d0 62 02 64 6a | 57 b2 8d 13 05 28 bc e0 52 39 21 a1 da 4e f2 d4 | b5 8a d4 4a 90 a1 15 ec 76 63 23 1b 27 bd 31 af | 95 a2 f3 5b 2d 4e d4 42 7c 32 a2 bf 50 28 83 76 | 27 c1 4e 56 b2 c9 33 07 a5 ee bf 65 36 77 b7 43 | c5 de f7 7c c7 52 fc 27 15 dc 50 6e c0 2f d7 72 | 5a 3b a4 4a 5b f6 13 1e 38 47 4d 77 c3 69 47 89 | 95 21 ff 50 2d c1 83 a3 1a 90 31 a7 2f c0 c1 a5 | 29 00 00 24 5c 46 aa ed 6c 5c 2a de e4 4c 0f 0d | ff be a8 c1 d6 16 7f 78 81 97 e2 33 fc 98 55 93 | 9e 14 cc 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 26 fa 02 ef ac 51 67 96 4e b3 ca | 7c 6c ba e3 fb 9a 52 77 00 00 00 1c 00 00 40 05 | 65 ee a5 86 f4 0e 73 b1 a9 eb cb 64 18 5a 0c a9 | fd 3d e5 eb | state #74 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #74 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #74 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49606.641316 | resume sending helper answer for #74 suppresed complete_v2_state_transition() and stole MD | #74 spent 0.477 milliseconds in resume sending helper answer | stop processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3500180b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 9c fc 4a 6a e3 e3 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #74 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #74 | rejected packet: | 74 9c fc 4a 6a e3 e3 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #74: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0683 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8cc0 | handling event EVENT_RETRANSMIT for parent state #21 | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #21 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #21 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49606.648525; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004324 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f2060 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #21 | libevent_malloc: new ptr-libevent@0x7fb3500180b0 size 128 "road-eastnet-nonat-21" #21: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #21) | c1 e2 95 19 0d 6d aa c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 62 b7 cc 73 d3 9f c3 8b a1 e4 26 f8 ce 22 33 | 92 13 78 50 86 db 45 6a 88 c0 09 ba 4c 3a ed 8d | 07 a9 f3 c5 90 2e 12 14 58 94 56 71 46 c0 41 ae | 27 c0 08 e3 c4 02 5d ee 64 22 79 77 74 67 02 97 | 15 c4 99 75 53 da b8 d8 73 7b 03 dd 0e 63 e5 c8 | 2f a1 74 7d 1c 73 5d e6 89 77 c2 84 53 e8 81 35 | 14 8c 80 35 a3 ae 1e 09 89 8b c1 64 7d fd 4f 89 | 8f b7 6b da 51 0c c4 21 04 59 18 7c 8d 33 1a 85 | 98 29 76 e4 22 ac 91 00 31 d3 90 f1 d2 f4 f2 9a | 20 a3 6d 51 7b 67 e4 d8 4d 7c 9a fb 7c 63 7f d7 | c7 25 20 29 d5 e0 63 b5 f2 a7 5f d2 ec 98 84 3a | cb 95 85 f5 af 28 8d c4 5a 27 b6 9c 15 cc dd ed | f7 9f 6c d0 d0 af 5b 13 f0 d8 0f 7e 40 99 08 7d | 42 b3 e6 b5 93 1f 1e e1 85 38 e6 f0 e2 af 01 7d | 4f a1 b9 ef 5c 3f 42 c4 c2 ef e5 bc 70 ba 8e 68 | 71 82 c2 53 b9 56 35 3d c9 38 89 b6 a0 89 2b f3 | 29 00 00 24 b6 59 e5 4e ee 3f fd 49 7f 16 f6 82 | 11 23 a0 41 4a 5a b9 59 7b 13 06 de 98 79 ac e0 | 67 18 f7 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 70 4a 79 4b fb 19 31 c0 36 bc 71 | 8e f3 57 13 5a bf 33 aa 00 00 00 1c 00 00 40 05 | 04 fc 29 44 06 78 d7 26 30 ef ba 81 66 98 ec 1d | 35 84 86 e1 | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8cc0 | #21 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c1 e2 95 19 0d 6d aa c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #21 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #21 | rejected packet: | c1 e2 95 19 0d 6d aa c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #21: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0599 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_RETRANSMIT for parent state #59 | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #59 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #59 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49606.654866; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001395 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8cc0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #59 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 "road-eastnet-nonat-59" #59: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #59) | 97 6c 3a 75 a9 04 c6 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 c8 5b 92 1f 75 89 eb 0e 2e 34 19 de c9 7d 34 | 18 5b 4b 86 10 db bf e2 6c 1e 94 2d 7a 7d c9 7a | a0 2b b5 06 7b 90 f1 d3 cd af 0e 61 7b ec c3 64 | de a5 53 e3 bf 5e 51 d1 84 95 1f 6e cb 81 61 93 | ad 42 3a 9f 1e 3a 65 25 36 02 e8 9c 31 54 18 98 | 6f 55 90 5b bf 33 e8 09 e2 db 7f a5 0d 28 2f b0 | 76 e2 e4 a4 df b5 68 69 d1 19 fe bd 73 f2 f2 54 | 46 48 bd 1c fd b1 5e e2 cc c0 6c c9 e5 04 1c 0c | 40 92 81 c8 73 67 1a af d8 5e 9b 4f 61 bb 61 8c | a9 de 42 09 33 14 9f 91 4f 50 01 94 4d 87 81 f8 | a7 b9 37 9b 88 d2 60 21 55 19 56 c4 fc 7d e4 11 | 28 74 cf ae 93 f1 51 10 2e 23 31 34 07 b8 e7 37 | a3 5e 4c 95 61 50 f9 d4 96 86 63 2e 49 88 c6 44 | 13 5e 5b c4 2d 0c 65 06 af 27 76 b6 3c bb 87 1b | d8 ae 43 ad 30 39 b0 94 f9 53 b3 ee d3 35 1d 60 | 44 54 ef 8a f8 7d 13 88 d2 f8 8c df 8f 77 8c e4 | 29 00 00 24 b8 98 0c 82 63 7c e1 4a 6e 4e 96 76 | c9 de 50 23 14 2c 80 d9 d0 99 72 c2 8b e9 f8 32 | 80 1a 11 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 09 60 c9 a8 1a 7b a4 38 cc f7 74 | 87 5e fa dc 42 53 d3 c5 00 00 00 1c 00 00 40 05 | a9 7a 6a af 06 6a 57 69 21 03 39 50 4a 98 de 11 | 5d 3e 78 2b | libevent_free: release ptr-libevent@0x7fb34400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | #59 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 6c 3a 75 a9 04 c6 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #59 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #59 | rejected packet: | 97 6c 3a 75 a9 04 c6 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #59: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0771 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #47 | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #47 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #47 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49606.657204; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003269 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #47 | libevent_malloc: new ptr-libevent@0x7fb34400cf80 size 128 "road-eastnet-nonat-47" #47: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #47) | d1 80 96 dc 70 12 fd 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 89 48 be 2f 23 20 1a aa c0 f9 41 f1 9f b5 dc | 61 3b 4e 1d f2 94 aa 61 39 fa ff 9e ad da aa 8b | 79 a4 b0 75 86 17 be 8d f9 64 cd 5f 2c a3 74 02 | 5c d2 0b c0 e1 bc 40 a4 41 01 24 b6 16 65 80 b1 | 8d 5b f4 3e d9 78 1c 78 5b d0 4f 36 20 49 cf f5 | e6 39 8f 45 c4 05 3e 9a 58 8d 26 dc 13 63 31 38 | f0 e2 e6 6e a9 06 79 15 81 1d f5 b1 3e c3 40 32 | 5c c3 ef 40 73 34 78 3f 9f 9d fe 1e 7a 64 15 bd | f5 c1 66 e8 e7 57 72 db 6e e7 07 6d fc c3 84 15 | a7 9e a5 ae 49 06 60 b0 66 25 b2 60 5b c9 52 7b | 84 da 9e 07 cb 22 63 3f f7 e3 75 51 cd b7 f5 a9 | 00 8e ee 37 13 40 c4 a0 04 91 8b 4e b2 90 26 27 | 78 4c 50 15 9b df e6 81 a0 a4 86 f0 9c 4a d6 4e | 71 20 bc ef 14 af bb ba f8 7a 84 f5 e8 b4 d8 08 | bb e0 cf f0 c2 7a 1a fb 6d c0 80 83 cb fe 9c fe | 4d f9 6c 4a 79 4d c9 ec 6b b4 1f c4 42 35 86 05 | 29 00 00 24 45 2a 73 9c 59 88 24 30 1b 4c d7 76 | 91 c3 f5 9d 27 d4 d8 42 63 2d 46 4d bb 79 5b 50 | bd 3d d6 ba 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 44 84 40 30 da 67 e5 a7 75 a7 f1 | b3 01 a1 ea ef 36 29 e3 00 00 00 1c 00 00 40 05 | 02 24 d1 73 8e ed 3e 54 49 25 16 88 bd 9a 48 c6 | 35 3e 63 7f | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #47 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d1 80 96 dc 70 12 fd 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #47 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #47 | rejected packet: | d1 80 96 dc 70 12 fd 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #47: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0589 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #67 | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #67 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #67 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49606.660504; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500657 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #67 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 "road-eastnet-nonat-67" #67: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #67) | d5 dc 19 08 bd ef 9f dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 15 d2 0d 8c 5c 68 38 3d 2d 2f ab 03 65 12 47 | 3e b1 d3 f9 3a 86 7c eb 4f 39 8c ad 4d 38 70 41 | d1 7d 9c 72 4f 83 e4 6c 89 f6 b0 17 b5 42 16 02 | 98 46 bb 9b ed 5c 3f ac 09 0d be a1 fd 38 36 65 | 29 1c 76 c9 62 fc be 23 07 ff 11 92 31 9b 27 f0 | d5 89 d4 07 37 e6 d9 c5 11 e2 68 cc f6 fa 8f ad | d4 d7 3d 81 a6 50 a2 3b 0c 6d a4 dc e7 02 2c 0e | b0 92 5d 4d d1 8c bc b1 d3 8b 8b 57 d6 a3 1b fb | 45 de 41 0c 4c 00 09 3b b7 02 6a 18 be d3 e2 bf | 60 42 87 71 10 49 5d 99 2a 98 69 45 a3 b9 8a 57 | c3 e1 71 dc 21 28 e6 7b 37 29 eb da 68 00 eb 12 | 52 79 13 c3 54 c6 f4 5a 0f 77 f8 92 a7 c4 70 9c | 42 51 17 18 c9 d7 b0 85 26 54 bb 62 a6 c6 48 68 | 6f 63 77 09 be 06 39 71 28 8e 68 84 3f f2 9b 78 | 53 a2 0d 5b a4 87 76 9f e3 e1 57 84 7f 83 44 ad | 59 6d db cc b7 ca a2 5b d9 9b 67 9f f8 59 1b 8c | 29 00 00 24 ea 05 1a 8b a3 08 e1 05 bd ec 39 06 | dc 75 19 c7 61 25 8f 0d bb ee a8 4f 1e a0 d7 a0 | e4 5f a7 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c a1 13 b6 f8 7a c8 5e ab 0d 26 ff | 9e 2c 49 6a b7 74 41 36 00 00 00 1c 00 00 40 05 | 1e 6d d9 18 71 66 9b 77 ce ef 92 9d c1 b1 8d 12 | ab 9b 0c 2a | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #67 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 dc 19 08 bd ef 9f dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #67 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #67 | rejected packet: | d5 dc 19 08 bd ef 9f dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #67: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #60 | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #60 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #60 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49606.718891; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002852 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #60 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-60" #60: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #60) | 25 9c c0 c5 c2 ae 29 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 2c 75 39 d4 fe e8 bb 01 36 72 a5 b5 e5 a5 81 | c7 38 4b e5 4a ae c6 e0 64 23 ae a4 00 42 bd c1 | 2e 59 84 56 2c d7 14 24 66 d8 ee 01 96 14 85 e4 | 4a 5d 41 c9 bd f2 52 f7 81 ad 7f d6 d0 a1 27 d2 | 97 41 8d b3 c0 bc 77 ec 23 18 fe 60 e2 a8 0c 93 | 13 c8 08 44 38 cf 40 53 40 99 23 6d f6 02 db 2a | 6e 32 b0 2c 67 33 6c a2 f1 af da 97 e3 24 99 d0 | 08 b1 cf 27 91 4b c8 a0 67 76 74 84 3e e8 94 b8 | 9c 46 bf ee d2 a1 d1 93 0c c9 20 9b fb 9c cc 69 | d2 c3 9f 9f 32 ce e3 cd 1e a4 06 0c ce ad 3b b5 | 3d 52 01 2e 64 72 a4 a5 0d 13 96 53 80 55 c3 af | c7 4a a9 17 ce 71 79 67 8d 48 4c a9 b8 00 02 38 | 2d 7c a0 0b 36 f5 68 34 0f dd 83 6f 1d d1 e9 b9 | 9a 43 52 12 d9 b1 6e ac 6a 5e ac d3 3c 20 66 93 | 6b 7e 85 4c aa e5 92 08 98 a1 8b 28 75 13 39 85 | b8 6c 05 ff ad 0d f2 e7 73 79 5c 18 65 6b dd 7e | 29 00 00 24 a0 1d b4 bd 19 70 24 f8 23 e6 87 dc | 50 af bd f2 95 21 f1 1c 7f 4c 51 8f f3 4c 1a 81 | a9 6f fb c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d6 a7 42 56 6b af 55 7e 9e 1f c2 40 | ba 0d 74 ad 6e b0 b4 2e 00 00 00 1c 00 00 40 05 | 49 f8 c3 9d b1 df 49 97 21 c8 2e 46 27 7c d9 25 | e7 f0 a2 de | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #60 spent 0.234 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 9c c0 c5 c2 ae 29 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #60 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #60 | rejected packet: | 25 9c c0 c5 c2 ae 29 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #60: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #48 | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #48 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #48 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49606.725517; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002754 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #48 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 "road-eastnet-nonat-48" #48: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #48) | 92 07 42 48 2a e6 dd 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 27 70 ee fe 7b a5 6b c0 91 72 76 bf b9 26 41 | 8a c5 01 3c cd 8b 21 f3 23 df 5c 81 f1 ed a2 12 | a1 c4 5e 2f a7 b1 21 02 24 b9 30 c4 f5 c4 2d c4 | 90 7e 3e f0 c9 0b f2 18 3c 2b b9 91 3a da c1 6c | 57 28 75 1b 3a 0e e8 9b fc 4b ee 5c 39 98 fa 15 | be 81 4e e4 0c 6c a4 75 1b 83 45 74 98 dd 81 5b | 06 80 95 32 c0 f4 a2 4b 9d f4 17 33 73 16 94 48 | 16 60 93 ae 3d ce 3e d6 a3 61 16 51 cb 19 ec 02 | 00 f8 5a 99 f9 c4 14 2b 6a 99 61 a3 6a e4 c5 97 | ad 75 bb 6b 78 38 5a b9 44 bc 5c a3 2d 23 20 4c | 99 1b 88 95 1f b4 34 15 92 91 16 2b 1d 90 a8 32 | bd a4 79 83 a7 b0 92 15 f0 e3 c2 79 58 67 56 eb | 4d 0c 97 c3 3f ae 15 49 f9 9c d2 3e ec c3 17 b9 | bd 62 c7 73 21 fe 81 8b e3 b9 eb a9 ce c7 0f d3 | 3f 5d 5a 44 c2 b4 29 b6 b5 67 52 29 de ca c6 15 | 31 6c 15 9d 56 b1 be 81 9a 0d b9 07 79 05 6e c9 | 29 00 00 24 56 48 d0 40 29 5d 70 09 47 7a f3 f6 | 53 84 44 57 f6 31 5c 3b e1 9a 2b 92 5f 13 77 b9 | 29 81 06 a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 92 e0 aa 95 98 e7 44 d2 2d 1e d8 | d0 35 7f 77 52 84 b9 c1 00 00 00 1c 00 00 40 05 | a2 97 dc 1e 35 5d 8b 7e f0 05 d9 9d 5b 9e 9f 7f | 26 7a 4a c3 | libevent_free: release ptr-libevent@0x7fb338012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #48 spent 0.185 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 07 42 48 2a e6 dd 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #48 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #48 | rejected packet: | 92 07 42 48 2a e6 dd 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #48: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0802 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #22 | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #22 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #22 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49606.734879; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006927 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #22 | libevent_malloc: new ptr-libevent@0x7fb338012840 size 128 "road-eastnet-nonat-22" #22: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #22) | fb 94 21 58 38 c3 f9 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 fa b9 d7 68 fd 72 8f 42 0c d5 a2 f7 f4 9b 8a | d7 23 52 ca 6c 52 76 c9 13 29 10 22 e6 ec 59 2c | a8 f2 aa 73 f8 3e 6b 2a a1 80 14 ff a7 56 48 4f | 3e 9b c4 33 e8 9f 3f e1 00 d1 2f db 56 9e da 18 | 67 a2 e0 d7 98 13 63 9f 28 d8 20 03 fc d6 f3 6a | 0b 8c 23 20 ba 26 3e 63 f5 df a1 d6 76 bf 7c f8 | 52 9b 7b e3 ba 8b f9 13 50 1b 61 13 1c 98 cb 7a | 18 f4 0d 9c 45 e0 10 ca 68 77 fa c0 54 76 19 a8 | f4 83 b0 e9 4d 71 3e a8 7b e6 82 90 01 66 8f f4 | 47 f6 ec 2f 3d 48 64 9c f2 b5 21 50 b5 a6 c1 a0 | 91 f5 21 c6 ec 6a bd 95 39 08 03 b0 29 f0 d4 a1 | f0 7d 39 2b f5 47 de 25 f6 c5 56 6c a0 9c af 3d | e0 4f 7d d8 1e 86 d7 ac 96 7e 36 e6 1e 20 3d 6a | 91 0f b8 c5 68 62 9b 7a 5c 1e b4 57 88 ac 53 77 | e1 de dd ef 41 8c d3 d4 57 c9 16 9b e4 e9 05 4c | 74 12 06 2b a5 93 e5 02 33 46 72 d8 88 42 05 bd | 29 00 00 24 90 c9 d4 3c 5f 0b 25 0f f1 bc 52 9a | c3 5c 4d d3 31 89 58 99 a1 8a 08 b0 ed 9a e3 4f | 90 7f 17 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 cd b6 d8 9c a0 ac 4f 4b ba 38 63 | e9 a9 a0 ba 13 a5 50 1a 00 00 00 1c 00 00 40 05 | 2f e0 72 4a 02 ff fa 8e 97 a9 39 d6 93 d4 2c 35 | dd 9e 83 2a | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #22 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 94 21 58 38 c3 f9 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #22 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #22 | rejected packet: | fb 94 21 58 38 c3 f9 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #22: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-75" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-75' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #75 at 0x557d46a3b010 | State DB: adding IKEv2 state #75 in UNDEFINED | pstats #75 ikev2.ike started | Message ID: init #75: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #75: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #75; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-75" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-75" IKE SA #75 "road-eastnet-nonat-75" "road-eastnet-nonat-75" #75: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-75 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-75": constructed local IKE proposals for road-eastnet-nonat-75 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 75 for state #75 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36800d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #75 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 | #75 spent 0.148 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-75" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.232 milliseconds in whack | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #68 | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #68 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #68 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49606.755407; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501389 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8e0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #68 | libevent_malloc: new ptr-libevent@0x7fb37c00cf80 size 128 "road-eastnet-nonat-68" #68: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #68) | 70 75 31 66 aa 5c 9c e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 5d b8 31 5b 51 c7 81 22 c3 12 8e cd 03 2f 05 | f3 e7 e9 e0 56 07 0e 19 4f f3 59 f8 5f 92 30 b5 | 72 b6 ae 5a 15 67 03 c0 c9 25 86 6f b6 cd 52 32 | 93 89 9d 85 44 28 f4 e9 22 34 65 fb b6 28 63 5f | 80 98 37 5a 06 27 0e fb ee f6 cc 60 03 1e c8 99 | 96 20 20 2b e8 6a b0 1d 57 83 e1 9f d1 09 80 29 | 2a 2a 69 37 ce 92 30 79 1a 45 aa a3 bd 30 cd 8b | 23 97 c9 73 f8 32 ee fe d7 1e 67 73 bd 11 db 26 | 12 e8 63 a6 c5 a1 37 4f 2f 5c 98 66 44 92 9a da | 46 ed 57 a3 46 50 a7 e5 d9 ec 61 b3 fb 59 43 1f | 96 83 9a 55 36 c4 68 5f a7 ee f4 08 c7 30 31 52 | b8 7e 06 a5 b1 e2 2e 1a 2b de 01 96 c6 3e f1 89 | d8 1f b9 ac 77 f1 c6 91 93 f5 70 bc 2f 41 d6 e3 | ff da e8 8a 1d 5f de 22 6f 38 d0 51 a3 b4 49 ef | d5 06 ff ea 4d f6 71 eb 33 f8 fd c7 e6 95 54 de | 64 89 15 37 cd bd bf d2 74 6c 8e f3 c4 d1 b1 ad | 29 00 00 24 8c 8f d0 a2 59 9b be 88 0a db 9c c0 | a3 eb 04 0d aa d5 13 33 65 39 12 37 76 6e 7e e3 | e3 60 8c 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 a4 28 dd c4 89 9a c5 51 2a d8 15 | 55 6e c2 5e f1 52 b9 d0 00 00 00 1c 00 00 40 05 | ac d9 33 90 76 69 a3 40 a6 e4 ee bb 11 92 b7 71 | 1e 90 c3 02 | libevent_free: release ptr-libevent@0x7fb36800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #68 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 75 31 66 aa 5c 9c e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #68 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #68 | rejected packet: | 70 75 31 66 aa 5c 9c e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #68: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 18 resuming | crypto helper 18 starting work-order 75 for state #75 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 75 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 75 time elapsed 0.001045 seconds | (#75) spent 0.977 milliseconds in crypto helper computing work-order 75: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 75 for state #75 to event queue | scheduling resume sending helper answer for #75 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #75 | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 75 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #75 | **emit ISAKMP Message: | initiator cookie: | d6 96 43 68 6a ec ab 11 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-75 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4b e7 f0 1b 8c 0a 12 dd d6 e5 bf 02 28 26 dd ac | ikev2 g^x 6b 5a 27 84 cc 5b e1 51 a5 48 25 1e 64 a9 f9 15 | ikev2 g^x a7 cf bd df a0 ad 76 b9 f4 06 07 4e 82 21 11 6b | ikev2 g^x 26 3f e9 d5 c8 28 2c a1 f2 de e8 cf 1b 66 10 aa | ikev2 g^x 48 33 36 9a e1 15 5a 5f 6d a7 50 58 f0 d8 c9 11 | ikev2 g^x b2 31 61 66 dc 13 e3 c7 ff 39 58 4c c1 88 d6 62 | ikev2 g^x 58 b9 1d ad d3 89 b6 21 d6 53 4e 88 4f 41 13 08 | ikev2 g^x 17 e6 d6 6a c0 94 05 0a ca 81 fd 84 5a f1 98 1e | ikev2 g^x b0 e9 8c 00 0a 4a 9c 8f 68 9e 7b 0d 09 60 4d 06 | ikev2 g^x b0 a8 a6 4f 85 49 38 bb ac 0a 4e 89 c8 a9 1a ef | ikev2 g^x 21 bd 3e 11 8d 34 77 94 db 0a 8d 1b 25 93 bc 6d | ikev2 g^x 26 8e 7b 5a 1c a6 da 04 b8 b9 68 16 5d 98 25 e7 | ikev2 g^x 4f 1c fe b2 4a 85 cb fd 7d 24 86 89 1b f6 19 0f | ikev2 g^x c0 e3 71 1b 57 41 f6 79 be 0c 81 b2 d6 8d b1 21 | ikev2 g^x 0e f7 f7 b1 1e d7 c5 ff e7 e6 4b 6a 5e 29 e6 f5 | ikev2 g^x 33 d7 87 e4 a6 ee a9 a9 4b 11 cd 2e d2 b6 0a d2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 80 4b a3 25 3b 73 08 25 20 19 cd 1b 6b 4a 3a cd | IKEv2 nonce 29 5e ac 55 94 fe 42 a8 a3 13 30 97 0f 50 65 db | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d6 96 43 68 6a ec ab 11 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4b | natd_hash: port= 01 f4 | natd_hash: hash= 92 04 fe 2e 3e a3 d6 9c 0e cd 5a 49 b4 f8 ac 71 | natd_hash: hash= 05 8a 92 ef | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 92 04 fe 2e 3e a3 d6 9c 0e cd 5a 49 b4 f8 ac 71 | Notify data 05 8a 92 ef | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d6 96 43 68 6a ec ab 11 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 56 54 de 54 0a a0 dc 64 96 23 cc 19 a1 e6 37 21 | natd_hash: hash= c0 78 fa 6f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 56 54 de 54 0a a0 dc 64 96 23 cc 19 a1 e6 37 21 | Notify data c0 78 fa 6f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #75 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #75: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #75 to 4294967295 after switching state | Message ID: IKE #75 skipping update_recv as MD is fake | Message ID: sent #75 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-75" #75: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.75:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #75) | d6 96 43 68 6a ec ab 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b e7 f0 1b 8c 0a 12 dd d6 e5 bf 02 28 26 dd ac | 6b 5a 27 84 cc 5b e1 51 a5 48 25 1e 64 a9 f9 15 | a7 cf bd df a0 ad 76 b9 f4 06 07 4e 82 21 11 6b | 26 3f e9 d5 c8 28 2c a1 f2 de e8 cf 1b 66 10 aa | 48 33 36 9a e1 15 5a 5f 6d a7 50 58 f0 d8 c9 11 | b2 31 61 66 dc 13 e3 c7 ff 39 58 4c c1 88 d6 62 | 58 b9 1d ad d3 89 b6 21 d6 53 4e 88 4f 41 13 08 | 17 e6 d6 6a c0 94 05 0a ca 81 fd 84 5a f1 98 1e | b0 e9 8c 00 0a 4a 9c 8f 68 9e 7b 0d 09 60 4d 06 | b0 a8 a6 4f 85 49 38 bb ac 0a 4e 89 c8 a9 1a ef | 21 bd 3e 11 8d 34 77 94 db 0a 8d 1b 25 93 bc 6d | 26 8e 7b 5a 1c a6 da 04 b8 b9 68 16 5d 98 25 e7 | 4f 1c fe b2 4a 85 cb fd 7d 24 86 89 1b f6 19 0f | c0 e3 71 1b 57 41 f6 79 be 0c 81 b2 d6 8d b1 21 | 0e f7 f7 b1 1e d7 c5 ff e7 e6 4b 6a 5e 29 e6 f5 | 33 d7 87 e4 a6 ee a9 a9 4b 11 cd 2e d2 b6 0a d2 | 29 00 00 24 80 4b a3 25 3b 73 08 25 20 19 cd 1b | 6b 4a 3a cd 29 5e ac 55 94 fe 42 a8 a3 13 30 97 | 0f 50 65 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 04 fe 2e 3e a3 d6 9c 0e cd 5a 49 | b4 f8 ac 71 05 8a 92 ef 00 00 00 1c 00 00 40 05 | 56 54 de 54 0a a0 dc 64 96 23 cc 19 a1 e6 37 21 | c0 78 fa 6f | state #75 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36800d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #75 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 | #75 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49606.757226 | resume sending helper answer for #75 suppresed complete_v2_state_transition() and stole MD | #75 spent 0.462 milliseconds in resume sending helper answer | stop processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3540180b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 96 43 68 6a ec ab 11 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #75 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #75 | rejected packet: | d6 96 43 68 6a ec ab 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #75: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0563 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ec960 | handling event EVENT_RETRANSMIT for parent state #61 | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #61 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #61 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49606.777423; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001222 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #61 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 "road-eastnet-nonat-61" #61: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #61) | f7 bc 52 c3 08 41 7d fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 a3 fc 88 6c c9 17 99 e8 c8 f4 84 4b dd e6 d6 | a2 3c cb b6 7d b8 4b 73 4d d1 4a 52 0a 17 63 b0 | ce a1 f6 5b 22 20 08 31 0e da ec fd b8 c2 13 f9 | b7 0d 78 21 3f 05 bc f7 2c 5a 0e b5 1a 70 bf 53 | b0 72 5e 64 9f c9 e5 f6 6b aa f3 db 8b b8 b8 b3 | f6 f8 ae 22 20 f7 35 9c 39 6d 5a ba 98 af 4b 1d | 6d d4 8e 29 87 bb 7a 2b 6b 4a b8 79 51 26 39 b0 | 6a 6c be 49 5f 57 bf 03 7a 6e 7f ac 45 f9 af fb | a3 06 52 bf 07 ef a5 db 3d b8 9b 73 f0 8e b1 76 | 2b 5d b7 93 de 9f 59 44 c1 67 8a 9a a5 50 66 6c | 27 3e 5e 44 b1 e9 13 dc 81 57 82 47 20 a2 32 79 | d4 b0 d6 87 f1 f1 20 bf e9 93 fc 11 dd 5e 42 b0 | a4 4f 0e f8 93 a1 1c a5 59 56 db 69 8d ca d0 53 | 78 b2 af e6 28 15 c5 c9 00 fd bf f0 33 a6 bf 2d | 7e 87 d7 d1 a0 82 65 91 eb 3c cf d0 6f fb 0e 4b | 57 a1 5c 8a 3f 3c 13 19 f1 bc 6c 89 96 42 e0 e9 | 29 00 00 24 30 62 04 12 b8 d1 41 8a 1d 82 4c c7 | f3 e8 92 81 d6 0e cc 31 5a f2 7c 04 56 a0 26 04 | e6 c5 8a 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 04 89 46 c0 2a 68 09 d3 b8 a6 1e | 7d d4 48 56 88 7a 56 d6 00 00 00 1c 00 00 40 05 | bb 1e 0b f8 57 9c 2b 42 0a de e4 96 f3 8b 61 81 | fa a3 7d bc | libevent_free: release ptr-libevent@0x7fb3680180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ec960 | #61 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 bc 52 c3 08 41 7d fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #61 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #61 | rejected packet: | f7 bc 52 c3 08 41 7d fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #61: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0696 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f7760 | handling event EVENT_RETRANSMIT for parent state #49 | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #49 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #49 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49606.787761; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002579 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2f770 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #49 | libevent_malloc: new ptr-libevent@0x7fb3680180b0 size 128 "road-eastnet-nonat-49" #49: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #49) | 8b 45 5c f0 af 2f 9d ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 38 13 81 3a b9 33 6e f2 a1 41 ed b7 e9 17 cf | 38 df bd f2 c5 3d 78 1c 98 5b e5 97 39 7c 00 0a | 9b b9 2b 4e ee 4e 90 b7 3f 17 93 3b 49 e6 73 ac | f3 36 ea c0 f6 08 78 26 b2 58 4a a1 8f ff 26 a9 | a2 29 62 4b f6 47 e2 5d a0 f3 e8 a3 da 86 cc 66 | 5a 6a 1d 0c 47 30 d7 e6 6e 32 62 71 d7 d3 1b 25 | 92 10 eb e7 f4 a1 c6 b8 cf 48 2b c2 a1 ae c9 5f | 55 56 6d 5d 77 a7 5f aa 02 cf a8 ea bb 62 18 44 | 0f aa 1d 7d 23 c7 37 6d 72 2b 4a da 38 22 af af | 35 47 8a 4d fb f1 2e 0f fa 54 54 48 f4 2f 1b 4b | 5a 9a c8 ab f4 0a 9c 36 8e 9a 37 b6 3a a4 36 09 | f9 cb 85 a0 d5 4e 66 72 2d dc a7 8d 87 52 32 39 | 0d 6e ce 73 51 c4 9b ee a5 7a c3 e9 dd 43 0b 8d | c9 c7 df e3 c7 9a fc aa 8b 37 41 93 d2 be 3c 27 | 15 30 62 da 6c d3 07 29 68 48 b5 55 56 c4 17 4f | b5 8f 29 d1 f2 fb 9e ea 13 d1 f0 21 44 a0 36 ca | 29 00 00 24 0e e2 a8 92 f0 b5 63 29 61 a0 ee 39 | b4 45 f6 bb e0 ab b1 76 a4 84 16 9e da d2 be 94 | e8 6d f8 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 12 9b 83 c2 c3 d2 71 a5 38 21 6e | a0 97 8f 66 c6 b8 71 3b 00 00 00 1c 00 00 40 05 | d2 ce 05 69 62 ac 37 a7 c1 ab 75 f3 75 7a c1 3e | 4a 93 d7 88 | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f7760 | #49 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 45 5c f0 af 2f 9d ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #49 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #49 | rejected packet: | 8b 45 5c f0 af 2f 9d ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #49: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #69 | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #69 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #69 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49606.819026; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500452 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #69 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 "road-eastnet-nonat-69" #69: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #69) | f2 a5 7f fe 4a 34 bb 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 e4 3b 13 88 fe 14 57 37 ea f2 64 67 d0 00 fc | 08 06 ee d2 9e 18 57 6d 24 e0 9d ec 05 43 cc ba | 46 84 14 09 e9 e2 59 69 78 ab 8d 44 b4 c5 40 3a | a2 89 7d 06 7b bd cc e4 70 62 31 9f 43 8b b5 bc | 3c 9f 69 fb 1f f5 22 54 18 e5 72 15 5a 48 ee 5c | c3 f3 42 0b 25 4e 7f 00 ca 3e e9 db 4e ab 7a 2a | 5e 8e 14 a5 6c b8 fa ac c8 1b f3 01 fc 2e 88 fc | de 9d 1f b4 30 64 da 79 40 14 b9 cb 57 7b 44 a9 | 8b 4d e2 fe 10 ef 78 5b 95 32 a7 75 3e 68 a2 02 | 50 a9 63 99 4c de c2 a2 55 8e e7 c1 4c 9d ba d5 | 23 4b 1b 11 eb 5b d1 0e 0a 69 30 ae 96 7b a4 e6 | d5 07 c0 08 e9 6f 21 3e f5 fc eb 69 b8 6d f7 0c | e4 6a a2 62 87 f1 46 98 bb 82 fd ef c3 b7 37 d9 | 4f 4d 06 a6 46 29 3d cf 6d 59 1a 7a 7d 4c 43 d4 | 05 3e e7 70 e1 23 3b 86 eb 4e 8f 26 e0 cf 97 cf | 6f 21 b0 32 5e 71 a6 25 0b f1 15 b5 06 82 51 60 | 29 00 00 24 ca 10 ed 53 1e ff c5 43 38 73 0a 51 | c6 98 7c 29 17 9d 86 f8 04 d8 2e 0c fa 41 a7 af | 38 8b 0b 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 9a cb 7f 17 aa e7 97 ca 43 a3 43 | c3 e4 41 43 e3 4b 2a 3e 00 00 00 1c 00 00 40 05 | 50 72 12 31 6b fb 9c 33 88 e7 6f 1a 9e 5d 70 fe | 3b 28 e9 92 | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #69 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 a5 7f fe 4a 34 bb 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #69 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #69 | rejected packet: | f2 a5 7f fe 4a 34 bb 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #69: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0662 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #23 | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #23 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #23 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49606.821394; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00319 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #23 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 "road-eastnet-nonat-23" #23: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #23) | 11 64 2b cc 79 62 5e 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 73 2b eb f6 ef a5 89 1a 84 5f 77 86 97 95 f5 | 41 68 46 e7 c2 3a 4b 96 08 d9 dc ac 0c dd 5f 9b | 9c 2f fb 55 35 f0 7e cd 72 e1 cc 2d 6a fa 78 20 | 87 1a 7a 27 9f 9e c1 5d d5 9e 2c a0 07 0d 68 be | 9e e9 e9 2b 00 f9 05 41 09 d8 c4 31 fa 61 72 87 | 90 51 a0 68 b9 49 7c 1e 75 38 ea 5f 98 5e c2 d2 | 66 ca 13 be 66 2b cf da 9f 87 38 b0 7e a9 5b 2c | b6 4d 89 7d 77 c1 b9 97 25 e9 f9 03 6e 50 c9 f0 | 4a 7a ea 26 c5 82 77 fd 51 df 29 99 2b 7c 16 40 | 15 23 9e b1 86 5f 7e 14 de 76 c4 15 a3 9d c9 b4 | 9c 1b 90 c7 1e 57 7f 74 e2 ad 9a 3c 48 8f 70 44 | 85 18 d4 03 39 40 d0 15 5b 33 89 0a c2 cc bd 37 | e0 4e e5 f2 46 4f 47 44 cf d8 ce b3 b6 34 38 c5 | 35 57 26 ef 2d db be d0 db df 2a 42 e2 e1 8f 1d | 48 dc 28 b8 9a 19 2e b1 d2 17 f5 9d a6 50 4d 1a | 18 88 cf 51 7a 98 9f 7a 85 1b 6d 6e b4 28 52 31 | 29 00 00 24 7b 3d c1 32 8e 45 e7 94 6a 53 a8 c9 | d4 42 3b 62 4a d5 d1 ca c0 9b 8b 0f 34 82 fe 78 | 98 28 d2 99 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 90 87 c3 2a f9 31 e3 ce f5 bd a0 4a | 02 f7 6c fe 1a b5 f1 41 00 00 00 1c 00 00 40 05 | a7 5c 60 43 7b 55 16 31 7f 2f 25 27 9c df 44 42 | dd 9f 1f 73 | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #23 spent 0.0883 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 64 2b cc 79 62 5e 8e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #23 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #23 | rejected packet: | 11 64 2b cc 79 62 5e 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #23: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-76" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-76' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #76 at 0x557d46a3c5d0 | State DB: adding IKEv2 state #76 in UNDEFINED | pstats #76 ikev2.ike started | Message ID: init #76: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #76: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #76; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-76" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-76" IKE SA #76 "road-eastnet-nonat-76" "road-eastnet-nonat-76" #76: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-76 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-76": constructed local IKE proposals for road-eastnet-nonat-76 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 76 for state #76 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34c005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #76 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 | #76 spent 0.119 milliseconds in ikev2_parent_outI1() | crypto helper 7 resuming | crypto helper 7 starting work-order 76 for state #76 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 76 | RESET processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-76" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.205 milliseconds in whack | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 76 time elapsed 0.000725 seconds | (#76) spent 0.699 milliseconds in crypto helper computing work-order 76: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 76 for state #76 to event queue | scheduling resume sending helper answer for #76 | libevent_malloc: new ptr-libevent@0x7fb3480180b0 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #76 | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 76 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #76 | **emit ISAKMP Message: | initiator cookie: | 08 23 b8 f6 73 09 18 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-76 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 44 b3 88 98 c3 00 3b ee 78 d3 a9 62 79 c8 5e 50 | ikev2 g^x ca be d3 60 b9 ac ef b3 70 f2 72 51 6e d0 6f e7 | ikev2 g^x 76 2f 02 45 ea 0c 3e b7 a1 fa 9a de 13 7f 48 f6 | ikev2 g^x 9a 0d 43 96 53 05 8a 3f 59 81 18 a2 54 08 83 e6 | ikev2 g^x b2 23 5b f0 fb 8a 5c 92 dc 0e cf 01 e1 94 34 22 | ikev2 g^x c2 e0 dc ae e5 0d ab a5 e1 89 bb 62 bf 90 17 bf | ikev2 g^x 34 96 56 44 a4 0c 23 a8 83 ef d0 4c 0b 33 57 7c | ikev2 g^x 55 bb 56 dc a3 43 8f 68 ba 01 38 40 7f c5 c5 3f | ikev2 g^x 05 89 dc 6e 0f 54 d6 e4 1f 39 ed af 78 c0 40 5e | ikev2 g^x de 96 c5 64 7e 4a 03 ee be b0 cb 81 ef de ed 18 | ikev2 g^x d9 e4 a5 05 6d 9a 00 f2 6a ea 28 7f 9c 2d 97 a0 | ikev2 g^x 10 8c cf d6 69 56 ba cb c7 fa 65 c6 5b b9 83 ba | ikev2 g^x f4 70 1e a9 02 08 4b 23 06 c6 59 e2 2c c1 32 a4 | ikev2 g^x 3b f4 b6 34 0c f2 27 38 ff 60 3f ff db da aa 0d | ikev2 g^x 54 69 d6 85 b5 50 9d 06 87 5b 28 9b f1 40 e5 16 | ikev2 g^x 60 3a e9 e8 52 ec 8a 8f b6 c8 a1 d2 cd ff f5 a1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 15 3e 8d 58 5c 16 4e 6b 9c 08 25 92 8d ef 80 f2 | IKEv2 nonce 25 ea cd 1e ba c6 95 f9 1b a7 f2 dd 45 1d 12 7e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 08 23 b8 f6 73 09 18 72 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4c | natd_hash: port= 01 f4 | natd_hash: hash= 59 8b 52 aa 3c 87 b6 df df 8c 81 fe ec 85 60 df | natd_hash: hash= 06 8e 81 b3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 59 8b 52 aa 3c 87 b6 df df 8c 81 fe ec 85 60 df | Notify data 06 8e 81 b3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 08 23 b8 f6 73 09 18 72 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 54 01 aa b8 56 eb 7a 7b 30 98 73 ed 67 e2 36 06 | natd_hash: hash= bd 7f 30 ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 54 01 aa b8 56 eb 7a 7b 30 98 73 ed 67 e2 36 06 | Notify data bd 7f 30 ed | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #76 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #76: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #76 to 4294967295 after switching state | Message ID: IKE #76 skipping update_recv as MD is fake | Message ID: sent #76 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-76" #76: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.76:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #76) | 08 23 b8 f6 73 09 18 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 b3 88 98 c3 00 3b ee 78 d3 a9 62 79 c8 5e 50 | ca be d3 60 b9 ac ef b3 70 f2 72 51 6e d0 6f e7 | 76 2f 02 45 ea 0c 3e b7 a1 fa 9a de 13 7f 48 f6 | 9a 0d 43 96 53 05 8a 3f 59 81 18 a2 54 08 83 e6 | b2 23 5b f0 fb 8a 5c 92 dc 0e cf 01 e1 94 34 22 | c2 e0 dc ae e5 0d ab a5 e1 89 bb 62 bf 90 17 bf | 34 96 56 44 a4 0c 23 a8 83 ef d0 4c 0b 33 57 7c | 55 bb 56 dc a3 43 8f 68 ba 01 38 40 7f c5 c5 3f | 05 89 dc 6e 0f 54 d6 e4 1f 39 ed af 78 c0 40 5e | de 96 c5 64 7e 4a 03 ee be b0 cb 81 ef de ed 18 | d9 e4 a5 05 6d 9a 00 f2 6a ea 28 7f 9c 2d 97 a0 | 10 8c cf d6 69 56 ba cb c7 fa 65 c6 5b b9 83 ba | f4 70 1e a9 02 08 4b 23 06 c6 59 e2 2c c1 32 a4 | 3b f4 b6 34 0c f2 27 38 ff 60 3f ff db da aa 0d | 54 69 d6 85 b5 50 9d 06 87 5b 28 9b f1 40 e5 16 | 60 3a e9 e8 52 ec 8a 8f b6 c8 a1 d2 cd ff f5 a1 | 29 00 00 24 15 3e 8d 58 5c 16 4e 6b 9c 08 25 92 | 8d ef 80 f2 25 ea cd 1e ba c6 95 f9 1b a7 f2 dd | 45 1d 12 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 8b 52 aa 3c 87 b6 df df 8c 81 fe | ec 85 60 df 06 8e 81 b3 00 00 00 1c 00 00 40 05 | 54 01 aa b8 56 eb 7a 7b 30 98 73 ed 67 e2 36 06 | bd 7f 30 ed | state #76 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34c005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #76 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 | #76 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49606.827024 | resume sending helper answer for #76 suppresed complete_v2_state_transition() and stole MD | #76 spent 0.379 milliseconds in resume sending helper answer | stop processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3480180b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 23 b8 f6 73 09 18 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #76 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #76 | rejected packet: | 08 23 b8 f6 73 09 18 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #76: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28ab0 | handling event EVENT_RETRANSMIT for parent state #62 | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #62 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #62 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49606.844283; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002653 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f7760 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #62 | libevent_malloc: new ptr-libevent@0x7fb3480180b0 size 128 "road-eastnet-nonat-62" #62: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #62) | a4 88 8e 77 b1 f4 8c bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 16 5e 67 aa cb b3 98 fe b6 e6 44 1a 07 e2 be | 44 c7 a0 47 e1 e7 ec b4 60 c9 7d b0 5b 56 2d 1b | e4 9a 0e 63 18 22 7a fa a9 c7 63 82 b0 af 0b 0d | 77 29 15 f5 8e 1b 69 90 f4 7c 19 86 79 0a 5f e8 | f6 12 ff 9f 31 22 5c e3 f7 e6 5c 40 a8 f4 37 ed | 38 af f3 38 7f df 64 d9 95 08 2b d7 e3 b5 1f 60 | 26 37 fe 9a 98 33 04 94 0b 0e 07 08 c5 5e 7d f8 | c0 0f 76 eb 24 9a 96 24 01 c7 9b fd dc 2c ed 1c | 7f 8c f6 fb 9d b0 c1 a4 53 e2 53 da 53 65 1f 9e | 4e d5 a4 5d a2 34 99 86 95 17 7b b9 d0 eb c5 9a | 7a c4 fd c2 ec 45 e1 8d 1b 55 bb 91 5f 61 39 83 | ed 3e fd ec 0b 7f cf a5 d0 34 4d 78 f0 19 f9 dd | 25 c0 20 38 67 61 04 4f 0d 51 42 43 cb 7c 44 01 | 6b 99 d1 a6 d3 b1 5e 29 d8 c7 53 4a 9e 9d fe 70 | 66 03 05 bd 1d 96 be 53 72 9a fa 30 50 08 24 ae | eb 69 31 f0 f7 2f d9 1c ab 9d 37 cd ad 7a ed 6a | 29 00 00 24 0c 26 e7 cd 38 ca 58 e6 02 58 43 30 | ae e2 2c 6c 6d 36 d5 ae 9b 11 96 a7 26 d9 7a c2 | 05 18 d0 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 28 4f 82 49 71 8c 73 8e 61 ba dd | 8f a7 28 9b 76 c2 13 ce 00 00 00 1c 00 00 40 05 | 01 46 1c d3 66 df 29 38 51 83 6e 7c d6 51 6d 46 | 6c 4e be 2f | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28ab0 | #62 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 88 8e 77 b1 f4 8c bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #62 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #62 | rejected packet: | a4 88 8e 77 b1 f4 8c bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #62: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f4be0 | handling event EVENT_RETRANSMIT for parent state #50 | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #50 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #50 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49606.855576; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003677 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28ab0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #50 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 "road-eastnet-nonat-50" #50: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #50) | 96 fd fa e4 3e 0e 84 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 85 b8 19 de 5c 0b b8 2d cb 54 cd 4a 1a dc 75 | 29 fd ca 47 94 14 29 17 31 bc e5 6f 6c f8 34 07 | 54 0a 45 19 2c 2a 6f 1c b9 dd 1e a6 5c 18 fd 5f | 81 44 c7 97 e9 8f a1 20 0b 20 67 50 dc 17 2d 25 | 1e 18 a7 76 43 da 58 3d a0 3c 42 3d 77 42 d1 eb | ed 35 62 7a 01 62 e1 32 87 10 6c d5 80 f8 d5 7a | e6 0d bc 8d d6 42 76 b9 2d fe 0d c3 eb e6 a9 0d | 0e 9f 06 5b af 9e 49 ff c0 94 83 2a d0 2d 71 88 | 4e 9a 35 ec c3 f5 8a a6 c6 22 6e 7e 16 d4 d9 e4 | d9 14 a9 a0 89 f2 18 8e be cf da c0 b4 27 62 b2 | 69 81 38 d5 cf 1b 18 ef 28 a2 d6 ab 45 93 46 f0 | b0 cf a6 b1 57 a8 1a d7 72 93 ec cd 51 ba 98 80 | 63 05 e1 50 59 41 cf a5 af 5d 7f 76 36 8e 63 f7 | e7 a8 78 3d b4 e5 4b 57 33 d8 0b ca bb 46 3b d1 | 5c 60 2c ab 89 51 2a 58 57 80 21 7f 56 14 26 65 | bd a7 02 e1 81 1f b6 ff ab b3 3c 36 3a 4d e7 be | 29 00 00 24 62 85 07 c7 f7 76 d5 f9 35 e6 84 85 | cf ff 39 b7 d3 8a fe b9 27 ad b1 ed 4e 28 c4 d4 | 73 2f 0f ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 6a 14 0a 8a ea 03 bd 41 dc ab fe | 15 04 7a 2b 71 ea 6d 09 00 00 00 1c 00 00 40 05 | 24 23 f0 d4 3c 33 30 25 f8 fc 46 79 64 b6 7b 59 | 6c 35 21 7f | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f4be0 | #50 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 fd fa e4 3e 0e 84 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #50 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #50 | rejected packet: | 96 fd fa e4 3e 0e 84 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #50: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_RETRANSMIT for parent state #70 | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #70 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #70 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49606.878849; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500425 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ec960 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #70 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 "road-eastnet-nonat-70" #70: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #70) | 80 24 74 22 d5 0f 52 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 68 71 3c 0e 60 a8 bb a5 bd cc ef ef 0c eb f4 | 82 28 4b 5e 34 f6 13 aa c3 d7 89 31 ad 91 46 ac | 15 dc aa e6 7a e7 0b 3f 82 69 6e e1 56 f0 c8 52 | de 05 0d fd 08 00 ee cd cc b6 87 fe a0 b0 ff e6 | 05 55 e6 b7 5e 20 53 79 90 12 ce ff 82 cf ad 41 | 3f a9 51 ad f1 8c d6 57 77 1c ef 27 f0 57 e1 8c | 97 cb b6 ce ff c0 f1 f4 a5 49 d9 74 1f 1d 74 75 | 54 be f3 af 4b 6b 43 9d 43 d4 e5 05 71 04 36 2c | c7 7c 5d f8 30 fc 44 25 48 9e 9e 82 91 e8 e4 34 | 70 26 3e 95 67 c5 a4 cb 36 d4 25 b1 2b 4a 77 2f | ae 15 52 3f 18 49 f9 47 bb a7 d2 0a ef 99 db 3d | 39 af f3 91 da 08 e3 b3 1f e4 ed 82 f5 26 e3 03 | 98 c1 58 ff ba 18 2d c8 81 ea 83 51 70 26 1e 19 | 23 60 13 98 08 43 34 78 7d 3c 93 d1 af b4 fb fe | d5 41 09 8b c9 2b 05 f4 1c a3 62 cd 21 e3 82 7b | 55 52 fe 90 11 4a 62 6c 99 8c d7 30 a6 21 f0 d1 | 29 00 00 24 e3 da 6d 7f a1 8b eb f9 61 52 ce 97 | 54 be ad 07 4c e8 1e 18 ff 49 38 58 56 77 f6 8a | c3 33 cb 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 9f 21 cd 26 5d 21 04 f0 de c9 2f | 2e 65 dc 8c 6b f1 6c dd 00 00 00 1c 00 00 40 05 | 7b 41 25 4c 4c ca db 2b 78 bf 1e 87 08 ff 47 0c | c4 b0 37 95 | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | #70 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 24 74 22 d5 0f 52 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #70 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #70 | rejected packet: | 80 24 74 22 d5 0f 52 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #70: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.067 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-77" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-77' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #77 at 0x557d46a3db90 | State DB: adding IKEv2 state #77 in UNDEFINED | pstats #77 ikev2.ike started | Message ID: init #77: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #77: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #77; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-77" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-77" IKE SA #77 "road-eastnet-nonat-77" "road-eastnet-nonat-77" #77: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-77 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-77": constructed local IKE proposals for road-eastnet-nonat-77 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 77 for state #77 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469fb8a0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #77 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 | #77 spent 0.142 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-77" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.276 milliseconds in whack | crypto helper 8 resuming | crypto helper 8 starting work-order 77 for state #77 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 77 | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 77 time elapsed 0.000642 seconds | (#77) spent 0.646 milliseconds in crypto helper computing work-order 77: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 77 for state #77 to event queue | scheduling resume sending helper answer for #77 | libevent_malloc: new ptr-libevent@0x7fb34c0180b0 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #77 | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 77 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #77 | **emit ISAKMP Message: | initiator cookie: | 4f f7 57 30 7e 30 db a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-77 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 64 14 f0 66 5e 0a 53 d9 86 47 70 5a 8a 73 bc cb | ikev2 g^x 52 bc 3f 13 31 b6 9a 6b ff ca f8 2e b7 f0 48 d4 | ikev2 g^x 77 e7 4c 8e 73 e9 11 6d 0b d9 88 30 75 88 11 48 | ikev2 g^x 3e 3b 98 fa 3c 66 3a 0b 64 a6 08 cb b7 12 5b 20 | ikev2 g^x d5 1b 40 67 18 3f 33 02 0f 4c 76 b1 96 fb 38 53 | ikev2 g^x 46 2f 32 4f 32 aa f2 f1 c1 7e 1b a3 93 84 38 d3 | ikev2 g^x 1e e6 5e 44 4e 6a 52 d2 5d 7c 9d 39 17 98 69 cc | ikev2 g^x ec 36 94 6b e8 33 1d ce 1b 8f 5c 7f dd d4 89 82 | ikev2 g^x 85 a6 1d ff 6c 9b 05 f9 47 a5 19 cd c4 fd 29 1a | ikev2 g^x 81 51 1f 14 ac 62 dd 33 b1 29 91 3b e8 1b 12 6e | ikev2 g^x ed 37 99 ae 6f 7a c8 95 71 30 61 a1 ef a5 33 55 | ikev2 g^x ef 40 50 d8 41 20 80 d2 32 15 fe 53 0a 4d 72 3e | ikev2 g^x a0 4f 5d 9d 14 7f 1b d9 8a 58 bc 3b 06 b1 c0 d6 | ikev2 g^x 7a 44 d2 2e f1 5d e3 62 b2 7b f9 e3 44 aa 80 9c | ikev2 g^x 12 99 76 f5 03 a4 33 27 55 fb 36 b5 80 18 d9 30 | ikev2 g^x de 03 51 b8 74 0a cb fb 17 be 0d a8 1c 8a af f0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 70 06 ac 37 52 b8 ec 28 7d 6d 81 11 1b 1b 6d ce | IKEv2 nonce ed 39 8f ce a3 eb 17 d2 32 09 4a 8f f1 a8 0e 4f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4f f7 57 30 7e 30 db a6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4d | natd_hash: port= 01 f4 | natd_hash: hash= 4e 42 86 64 cb f7 df d8 ee 6f 6b 28 69 76 6e 6d | natd_hash: hash= 07 28 e7 b4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4e 42 86 64 cb f7 df d8 ee 6f 6b 28 69 76 6e 6d | Notify data 07 28 e7 b4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4f f7 57 30 7e 30 db a6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= cd 8e d4 a4 9f b1 74 d8 7d 8d 61 97 d8 57 39 f7 | natd_hash: hash= 36 5a 1d 66 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cd 8e d4 a4 9f b1 74 d8 7d 8d 61 97 d8 57 39 f7 | Notify data 36 5a 1d 66 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #77 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #77: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #77 to 4294967295 after switching state | Message ID: IKE #77 skipping update_recv as MD is fake | Message ID: sent #77 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-77" #77: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.77:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #77) | 4f f7 57 30 7e 30 db a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 14 f0 66 5e 0a 53 d9 86 47 70 5a 8a 73 bc cb | 52 bc 3f 13 31 b6 9a 6b ff ca f8 2e b7 f0 48 d4 | 77 e7 4c 8e 73 e9 11 6d 0b d9 88 30 75 88 11 48 | 3e 3b 98 fa 3c 66 3a 0b 64 a6 08 cb b7 12 5b 20 | d5 1b 40 67 18 3f 33 02 0f 4c 76 b1 96 fb 38 53 | 46 2f 32 4f 32 aa f2 f1 c1 7e 1b a3 93 84 38 d3 | 1e e6 5e 44 4e 6a 52 d2 5d 7c 9d 39 17 98 69 cc | ec 36 94 6b e8 33 1d ce 1b 8f 5c 7f dd d4 89 82 | 85 a6 1d ff 6c 9b 05 f9 47 a5 19 cd c4 fd 29 1a | 81 51 1f 14 ac 62 dd 33 b1 29 91 3b e8 1b 12 6e | ed 37 99 ae 6f 7a c8 95 71 30 61 a1 ef a5 33 55 | ef 40 50 d8 41 20 80 d2 32 15 fe 53 0a 4d 72 3e | a0 4f 5d 9d 14 7f 1b d9 8a 58 bc 3b 06 b1 c0 d6 | 7a 44 d2 2e f1 5d e3 62 b2 7b f9 e3 44 aa 80 9c | 12 99 76 f5 03 a4 33 27 55 fb 36 b5 80 18 d9 30 | de 03 51 b8 74 0a cb fb 17 be 0d a8 1c 8a af f0 | 29 00 00 24 70 06 ac 37 52 b8 ec 28 7d 6d 81 11 | 1b 1b 6d ce ed 39 8f ce a3 eb 17 d2 32 09 4a 8f | f1 a8 0e 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 42 86 64 cb f7 df d8 ee 6f 6b 28 | 69 76 6e 6d 07 28 e7 b4 00 00 00 1c 00 00 40 05 | cd 8e d4 a4 9f b1 74 d8 7d 8d 61 97 d8 57 39 f7 | 36 5a 1d 66 | state #77 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469fb8a0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #77 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 | #77 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49606.888449 | resume sending helper answer for #77 suppresed complete_v2_state_transition() and stole MD | #77 spent 0.335 milliseconds in resume sending helper answer | stop processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c0180b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f f7 57 30 7e 30 db a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #77 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #77 | rejected packet: | 4f f7 57 30 7e 30 db a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #77: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8d60 | handling event EVENT_RETRANSMIT for parent state #63 | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #63 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #63 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49606.905611; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001204 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f4be0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #63 | libevent_malloc: new ptr-libevent@0x7fb34c0180b0 size 128 "road-eastnet-nonat-63" #63: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #63) | 43 a8 4d 01 ec 36 de 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa e2 93 e3 30 a1 06 ee b4 85 58 c9 2f 9d d0 1a | ad 38 32 dc 30 89 d1 a0 98 57 8d 01 77 84 b3 55 | 47 fd ae cc e0 a9 2a 35 58 f1 6a 27 c8 b7 88 d3 | c3 78 1e 95 37 0b 81 ee cb 00 02 38 fb 0c bc ff | 55 19 c6 c0 be 69 d1 78 c8 9a ae e0 96 6c 3f 9b | 54 61 8c 4b 6b 45 ac 74 a1 6d f1 1d de 9e c2 52 | 40 62 38 7c 4d c1 06 5c f5 e4 71 d5 c6 8f eb 8d | a1 58 7d a8 05 d7 f2 d1 12 1f d4 be 60 08 06 1f | 2a 4d 28 f0 ba 0e 77 13 d0 8f 4c 08 fc 37 3f 98 | 37 6b f8 7a b1 44 d3 8b 12 01 3a e0 ab 1c 6f 72 | d8 5a cc 1f f0 ef fd b0 38 cb c0 2b 70 72 dd 77 | 20 94 89 cc 24 42 7c 89 06 09 17 e9 b7 42 85 43 | b5 81 b7 cc a1 a3 3a 6b b1 18 c1 ec 8a 13 0d f9 | 71 43 3d 9a 1f 64 16 b7 2b bd 29 ea 9f 4f 17 43 | a8 18 9f fc 5b 56 59 fa 46 4c 5d 82 89 28 f2 04 | 51 6c b3 97 3a a5 95 f1 fd 87 8b 14 08 ce a0 6b | 29 00 00 24 42 95 7e 08 3c e5 ab b4 d2 f9 ef 7f | d8 0c 96 cd c4 ca c3 e4 35 0f 70 37 5f 05 86 60 | 4b 19 91 ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 ed eb 0b 29 2b d1 a0 42 dd cd 92 | 88 75 fb d1 70 51 78 cf 00 00 00 1c 00 00 40 05 | a8 06 2d d1 ac 32 5a b6 7e b8 ae d6 ec a9 34 27 | 7d 9e 90 d0 | libevent_free: release ptr-libevent@0x7fb3600180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8d60 | #63 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 a8 4d 01 ec 36 de 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #63 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #63 | rejected packet: | 43 a8 4d 01 ec 36 de 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #63: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a027b0 | handling event EVENT_RETRANSMIT for parent state #51 | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #51 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #51 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49606.932904; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004297 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1af10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #51 | libevent_malloc: new ptr-libevent@0x7fb3600180b0 size 128 "road-eastnet-nonat-51" #51: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #51) | 4e ec 23 15 b1 7b 72 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb ca ad 90 d3 c3 42 ab 02 0a 3a 99 99 08 46 41 | e3 20 e2 b5 e7 92 8d 56 c0 f6 81 f6 d7 1f 61 ae | fb 7c 4e 49 1a 90 7d af 41 51 b1 4f a9 1c af 26 | 43 e3 44 1a 2b 54 c2 29 d3 73 8c a6 e2 ba 3d 02 | 79 ed 80 dd 4b 1e 56 a7 0d 93 2b 80 2d fa ef a7 | a5 07 28 e5 1d 36 9e 70 e3 83 04 4a 00 cd 83 0a | dd f1 6f 7b 41 89 16 39 86 45 b3 89 6b 38 63 99 | 64 d2 3b 37 57 db 5b aa 3c 09 dd b1 e9 2a 36 7d | 07 9a 1b 84 49 cb 9b 53 1f e3 16 45 5a 7e 7d 6a | b6 b2 5f ad 65 38 70 73 69 63 43 b9 48 24 d6 aa | 84 39 4e 67 2a d2 39 99 70 07 69 a7 7e 3b f3 d0 | 5d 4d 0d 43 76 2c 16 f2 ef 43 c1 03 3c a0 15 fa | 7b dd 0d 24 8d 60 85 f6 a5 c6 c1 eb e0 9b 23 f3 | 77 0d cd ab 79 52 59 61 60 d0 e6 6a b2 5f 84 3c | bc fe a3 56 10 78 f4 57 b0 c9 73 a2 9c 16 ae e5 | 21 a9 af 1c 86 05 49 d7 79 de ea 6f 42 c1 58 6c | 29 00 00 24 8a 81 ff 83 11 9d 7f 95 f4 0f 60 37 | ee c1 de 9d 9d 4a 24 6c a2 0d 2e aa 53 c1 6d 4e | 8c ed 61 8e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 84 7c cd 2e 5d e1 e4 b9 3d 91 59 | 8e 0e df bf 1a 34 00 37 00 00 00 1c 00 00 40 05 | 4f e7 ab 4c a7 2a fc d1 46 25 a0 98 d8 53 89 a8 | 24 a4 22 8e | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a027b0 | #51 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e ec 23 15 b1 7b 72 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #51 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #51 | rejected packet: | 4e ec 23 15 b1 7b 72 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #51: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0488 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #24 | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #24 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #24 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49606.935208; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.010549 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a34e10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #24 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 "road-eastnet-nonat-24" #24: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #24) | a6 6a cf 12 4f 5d 80 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 64 6b 6f 54 02 19 88 ba 7c 08 ae f0 e8 ac 9d | c2 ca d4 17 41 fd 62 15 e6 80 a2 22 8c 15 09 a2 | e7 a1 72 ea 0a df 45 b3 25 d6 2f ad 4b 53 6c aa | 40 78 bc 47 40 56 b3 31 58 04 4d 38 c6 d0 b5 d8 | 7f 6f a2 f1 93 94 05 6c d0 31 6f f5 91 da 3d ba | e0 df 58 d8 a7 5c 43 d6 dc 3f 84 1b 95 82 7b 74 | 0c 41 0a 55 c5 c4 26 cf be bc a7 fe 25 56 32 c1 | 74 4d 01 af d9 1d ba 5f df c3 24 6e 66 7d 9c 22 | 84 1a 96 19 75 ab 7b e5 8d 21 ff f9 0c c5 57 de | 08 b9 a5 25 49 54 61 98 e2 43 6f b1 cb e2 3e 2a | f8 2c b2 cc ec bc 5e 41 c3 a9 95 de 3e ae 27 18 | 0c 51 55 28 d4 52 b5 1c e5 35 a1 75 a4 31 5a 74 | 09 2d 83 0a f9 22 55 04 79 c9 7a 03 c4 3f b9 27 | 7d 94 7e 25 32 de fa 8a ba c3 f8 47 1a 89 e0 04 | 1c 2a 74 59 3a 33 c6 78 c9 39 62 b5 5b 83 e0 ec | 74 d5 64 ba c0 ee 33 ea 4f ca fc f0 da aa dc 97 | 29 00 00 24 86 65 98 51 47 8e f6 4b 35 71 6a af | 55 7d 2d 69 5a 9e 6d 36 94 f6 45 50 b1 44 a3 6d | d2 78 d3 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 db bf 4d aa d7 35 0a 3b ec 97 e0 | 4c d5 57 e3 dd 13 4a e5 00 00 00 1c 00 00 40 05 | c7 67 96 20 f6 5f 6f 16 76 12 96 1c 43 e0 40 0f | 0e 23 33 02 | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | #24 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 6a cf 12 4f 5d 80 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #24 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #24 | rejected packet: | a6 6a cf 12 4f 5d 80 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #24: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0796 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e7260 | handling event EVENT_RETRANSMIT for parent state #71 | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #71 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #71 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49606.938584; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500078 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #71 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 "road-eastnet-nonat-71" #71: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #71) | 95 1a 0e bc b8 89 e9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 b7 52 d3 88 4c 72 94 29 6d 07 48 59 53 9a 94 | c0 d8 40 dd 8b 33 cc b5 e7 5f 10 c4 f9 b5 b0 62 | 0e 7e dc 7c c0 5d c2 c0 b8 2a 1e ee d8 c7 67 c5 | 6e 7a 2e c8 c8 78 d1 01 66 2d d2 7e a8 80 78 39 | ed 64 bc 65 47 6b 53 20 db f8 49 7d 75 df ac 21 | 43 37 22 43 cf 85 a4 b5 c6 f2 cc 18 4e ff c1 67 | d6 fb 3b b4 2a 72 36 3e af 12 4f 93 13 35 59 a3 | 8d fd 4c ac bd 7c e1 d6 8a 63 b4 aa 9a 01 66 5d | 44 4d c8 c6 a5 27 c2 50 76 c4 0f 7a ea 30 2c 2e | c8 fd c2 09 eb 13 95 a3 62 05 52 05 99 27 2d 5d | 04 8a cb d5 bd f0 da af b1 fd a8 57 4b 25 12 cd | 81 31 3f 97 9d 49 d1 70 50 67 35 65 ba 2d c4 ae | a9 91 18 06 72 21 47 2c 8e e0 a3 db 1b a2 3f 13 | 0f a8 f6 3e 94 d7 36 d8 17 22 ad cd f5 cd f3 43 | 86 8f ec 5e a8 71 d9 dd 87 6e d8 e4 58 cb 3c 76 | ee 77 2a 83 0c e5 de 50 b0 fc 77 61 13 ac a0 07 | 29 00 00 24 12 6c 20 e2 d1 b6 94 1d 42 66 63 a9 | 4b 6f 5d 9a 24 6f cd 6b 53 ff a3 87 80 0a b8 8b | a0 96 5f 5a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d bc a1 51 aa 8f 7f ab dc e5 06 f0 | 38 bb 8c 63 92 8e b2 f3 00 00 00 1c 00 00 40 05 | c9 d4 4d 25 1c 7e db b6 b8 a8 68 63 26 d6 45 14 | b5 8e ec 75 | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e7260 | #71 spent 0.0997 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 1a 0e bc b8 89 e9 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #71 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #71 | rejected packet: | 95 1a 0e bc b8 89 e9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #71: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-78" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-78' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #78 at 0x557d46a3f150 | State DB: adding IKEv2 state #78 in UNDEFINED | pstats #78 ikev2.ike started | Message ID: init #78: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #78: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #78; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-78" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-78" IKE SA #78 "road-eastnet-nonat-78" "road-eastnet-nonat-78" #78: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-78 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-78": constructed local IKE proposals for road-eastnet-nonat-78 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 78 for state #78 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469e7260 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #78 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 | crypto helper 12 resuming | #78 spent 0.114 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 starting work-order 78 for state #78 | RESET processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 78 | RESET processing: connection "road-eastnet-nonat-78" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.206 milliseconds in whack | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 78 time elapsed 0.000674 seconds | (#78) spent 0.67 milliseconds in crypto helper computing work-order 78: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 78 for state #78 to event queue | scheduling resume sending helper answer for #78 | libevent_malloc: new ptr-libevent@0x7fb34001a190 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #78 | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 78 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #78 | **emit ISAKMP Message: | initiator cookie: | a4 c9 07 ac 54 d6 e0 33 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-78 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a3 5b 1c ec 96 24 e8 86 d8 c5 db 68 a4 e8 84 cc | ikev2 g^x f4 a2 ed 99 bf 5e 8a c5 ce b3 9d 08 41 58 29 f0 | ikev2 g^x dd 3a 5a 77 6f 59 d0 63 db 3e 63 03 3b 94 a8 82 | ikev2 g^x ea c5 b5 55 dc 2c ec 77 5f 63 ff ce 1a d3 98 5f | ikev2 g^x ea ba 50 e4 20 9b 1b 0b de 70 1d 72 5e 41 20 22 | ikev2 g^x dd 96 8b a8 2c 90 f1 b3 79 70 7b 0b d2 f5 29 64 | ikev2 g^x 24 96 41 c0 b2 23 eb 70 92 6c 66 1d 59 a6 82 09 | ikev2 g^x 57 e0 df 9e 1d 1d 55 b5 06 9b 7f 66 07 cc cc ff | ikev2 g^x f3 52 44 fb 3d f1 4f 79 5c 0c 51 85 cc cb 4f 32 | ikev2 g^x 4d 99 ed e1 7c 32 81 a7 49 c4 5e 9c f7 c7 98 e6 | ikev2 g^x 2c 03 b7 c8 ab bf 01 d1 70 a5 d7 0f 97 f6 d8 06 | ikev2 g^x e8 43 56 25 d8 da 9c 66 8b 84 9d ed 34 99 f3 6a | ikev2 g^x ab 13 48 0a 68 c6 9c 38 c0 da 1e ec 9d bd 23 04 | ikev2 g^x 56 2e b0 d9 0e 5f 21 85 8d b7 b7 e4 3f 8c e4 76 | ikev2 g^x 68 1b d3 cc a6 1f 24 7c 46 61 29 b6 47 f3 ad 62 | ikev2 g^x ed ad e7 10 a5 af 19 f0 76 6b ea 90 57 9b 3b 13 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e3 1c 8b 3a ff 4e 05 3e c1 af db 58 7b 8f 74 6d | IKEv2 nonce 20 c2 73 1e 04 d3 ec 5f 05 cc 9d e9 4b 1e 83 58 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a4 c9 07 ac 54 d6 e0 33 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4e | natd_hash: port= 01 f4 | natd_hash: hash= 8f c3 34 65 1f ff 78 b6 0e ee cd 35 94 8b f4 3a | natd_hash: hash= 81 46 94 12 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8f c3 34 65 1f ff 78 b6 0e ee cd 35 94 8b f4 3a | Notify data 81 46 94 12 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a4 c9 07 ac 54 d6 e0 33 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f3 90 ab 75 b4 45 e0 98 82 06 c5 91 b7 b5 12 83 | natd_hash: hash= 38 ae 55 ca | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f3 90 ab 75 b4 45 e0 98 82 06 c5 91 b7 b5 12 83 | Notify data 38 ae 55 ca | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #78 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #78: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #78 to 4294967295 after switching state | Message ID: IKE #78 skipping update_recv as MD is fake | Message ID: sent #78 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-78" #78: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.78:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #78) | a4 c9 07 ac 54 d6 e0 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 5b 1c ec 96 24 e8 86 d8 c5 db 68 a4 e8 84 cc | f4 a2 ed 99 bf 5e 8a c5 ce b3 9d 08 41 58 29 f0 | dd 3a 5a 77 6f 59 d0 63 db 3e 63 03 3b 94 a8 82 | ea c5 b5 55 dc 2c ec 77 5f 63 ff ce 1a d3 98 5f | ea ba 50 e4 20 9b 1b 0b de 70 1d 72 5e 41 20 22 | dd 96 8b a8 2c 90 f1 b3 79 70 7b 0b d2 f5 29 64 | 24 96 41 c0 b2 23 eb 70 92 6c 66 1d 59 a6 82 09 | 57 e0 df 9e 1d 1d 55 b5 06 9b 7f 66 07 cc cc ff | f3 52 44 fb 3d f1 4f 79 5c 0c 51 85 cc cb 4f 32 | 4d 99 ed e1 7c 32 81 a7 49 c4 5e 9c f7 c7 98 e6 | 2c 03 b7 c8 ab bf 01 d1 70 a5 d7 0f 97 f6 d8 06 | e8 43 56 25 d8 da 9c 66 8b 84 9d ed 34 99 f3 6a | ab 13 48 0a 68 c6 9c 38 c0 da 1e ec 9d bd 23 04 | 56 2e b0 d9 0e 5f 21 85 8d b7 b7 e4 3f 8c e4 76 | 68 1b d3 cc a6 1f 24 7c 46 61 29 b6 47 f3 ad 62 | ed ad e7 10 a5 af 19 f0 76 6b ea 90 57 9b 3b 13 | 29 00 00 24 e3 1c 8b 3a ff 4e 05 3e c1 af db 58 | 7b 8f 74 6d 20 c2 73 1e 04 d3 ec 5f 05 cc 9d e9 | 4b 1e 83 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f c3 34 65 1f ff 78 b6 0e ee cd 35 | 94 8b f4 3a 81 46 94 12 00 00 00 1c 00 00 40 05 | f3 90 ab 75 b4 45 e0 98 82 06 c5 91 b7 b5 12 83 | 38 ae 55 ca | state #78 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469e7260 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a027b0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #78 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 | #78 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49606.948904 | resume sending helper answer for #78 suppresed complete_v2_state_transition() and stole MD | #78 spent 0.393 milliseconds in resume sending helper answer | stop processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34001a190 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 c9 07 ac 54 d6 e0 33 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #78 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #78 | rejected packet: | a4 c9 07 ac 54 d6 e0 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #78: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #64 | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #64 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #64 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49606.972087; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002312 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8d60 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #64 | libevent_malloc: new ptr-libevent@0x7fb34001a190 size 128 "road-eastnet-nonat-64" #64: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #64) | 28 7e be 04 bb c7 3c e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 7e 43 6c c6 61 f7 8d 74 52 44 4a 1c ca e7 9e | ac 14 d9 31 6d 60 9d f4 ba 6e c2 e0 7b d5 53 a3 | 16 85 f9 c3 ce f8 f1 6f bf 00 c2 bc 5a d4 f5 80 | d8 8f 02 50 d5 75 7e 2e dc 8c e1 ab a9 5d a2 cc | da fa 4e bf fb 7e 0d a9 06 25 1f 41 e3 0d cd 1b | 1a a7 53 a9 ce 79 cd b5 77 9b b8 2e 89 66 fa cb | ad fc 1f a1 86 e2 14 75 9e d9 ee bd ba f9 9f 7c | e4 64 68 99 18 9c 70 2b 82 20 55 55 75 56 88 5d | d8 d5 c7 f6 4d e5 dc 25 37 08 b7 1b d0 a6 99 40 | 0a 49 58 f6 83 1c 88 a0 08 dc b3 c1 aa ed 91 6f | c6 a5 be 4d 6b b9 bb 18 cf 12 ba 0d 71 89 70 ef | 66 fa c4 5b 33 09 3f ff 55 ca 19 24 9a 74 4d 4c | d1 a6 e0 57 41 7a 44 3f b8 12 3a 3f 06 a7 52 cd | 97 1c e0 a8 3c be fa 81 97 1d d6 2b 3f 0b c8 9f | b8 ad e1 63 a0 10 8f f1 ce 62 64 83 9e 28 1c 57 | ba 8c 77 7e 6f fe 44 22 ea fc fc 43 05 9a a7 9f | 29 00 00 24 d6 fa 6f 28 11 8e 89 70 36 5a 3b d2 | 30 2c 96 5f 7f e3 aa dc e7 9f 74 e4 9d 9a 67 37 | a5 4e 3a 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 34 45 e6 51 f4 83 8b a3 3b 13 c9 | fe 48 d2 4a 75 21 a9 ed 00 00 00 1c 00 00 40 05 | 1b 38 c5 d0 41 1e ff f1 67 34 2b 17 6a 69 bf 2e | 0c d6 b9 4f | libevent_free: release ptr-libevent@0x7fb378012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #64 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 7e be 04 bb c7 3c e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #64 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #64 | rejected packet: | 28 7e be 04 bb c7 3c e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #64: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.071 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #72 | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #72 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #72 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49607.003448; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500272 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #72 | libevent_malloc: new ptr-libevent@0x7fb378012840 size 128 "road-eastnet-nonat-72" #72: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #72) | 66 13 43 d6 1b b9 0c ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 b1 4f d1 eb 26 94 0a e8 d2 78 fe d2 e8 05 7d | 72 29 9f e5 e1 94 c3 7f a9 6a ca 75 12 4e 13 6e | e4 11 a5 e1 89 1e 08 5a 0d 5f 6b 49 0c e7 ba a3 | db 19 75 da a7 48 e8 e9 64 d4 80 8e 45 f5 82 09 | 04 17 24 14 78 b4 6e bb 71 57 6f 3e 18 4c d6 76 | a4 ec 50 14 2c c8 4e c9 04 89 23 f1 0a 7f 62 28 | 45 8e 70 27 19 66 b0 68 5f c8 be 34 a7 7e 02 24 | 87 3b ee fe 4b 57 85 64 69 04 b9 42 92 f3 d5 c0 | fe 76 05 b0 05 50 57 66 f6 f8 0b 76 74 c3 53 a1 | 05 f6 81 e4 08 d7 39 f0 53 40 e0 f4 aa 4c ff a6 | 90 72 89 fb 79 82 71 5c b3 e4 6d 43 97 e8 51 8b | ba 0a c8 eb e3 46 09 21 84 b9 ea ef 0d 8d d4 64 | 4c bf f8 b1 9c cd 8a 27 78 9c ef 52 df a6 5e b4 | 15 f4 af e2 3a 17 55 a8 8a cb 58 8c 66 bc a1 fb | 21 eb f8 38 a5 f6 b0 fd 47 53 aa ad 2e e9 17 ad | 29 40 34 3f b5 2c 48 93 29 5b c3 81 a9 9a f6 f7 | 29 00 00 24 d2 7d 93 13 5f e4 cd 1b 68 e9 96 b6 | 73 3d 25 76 63 d4 92 1a 4f 51 ac b1 63 90 04 8e | 34 c5 00 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c4 6c df 39 39 e8 cd 3f 26 eb f0 86 | 8a 8d 3e 3d 91 1f 2d ed 00 00 00 1c 00 00 40 05 | 4c 1b 62 1c 4c 06 92 d2 01 38 c8 0e 4f 7e fd bc | 86 e6 84 ff | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #72 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469ddbf0 | handling event EVENT_RETRANSMIT for parent state #52 | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #52 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #52 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49607.003581; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004436 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #52 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 "road-eastnet-nonat-52" #52: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #52) | 3f 70 d8 3e f5 22 c6 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 a5 a2 fa 37 05 a0 83 be fb 7c 66 e8 09 2d 85 | 01 d0 84 ba 7e 80 ad 7e ed 7e 94 4b 5a d1 13 c1 | b1 3f 59 cf ac e4 bd 6c 95 59 bf de 9d 80 55 dd | 6c d4 7d e3 9f 38 7c 31 e7 3a f4 3d 5f ba 5a 68 | 83 7f 56 b6 a6 97 f9 9a 87 45 7b ad 59 c8 c8 c2 | 85 24 f6 8d 4c 54 59 44 37 96 77 29 ac 68 3f 6e | df da 66 fc fd e2 52 7f c0 d8 5a 6e 87 c7 d0 ea | dd 74 ac b4 2a 5c 26 2d 8f 9d 33 80 5d 13 86 23 | e5 74 ae 2d f0 58 19 74 bb 0c 9a fe 02 e9 ea 18 | 9b e9 68 5d 7c 72 e9 79 59 15 c2 74 d4 16 6f 97 | c0 92 81 74 a6 70 c8 c9 0a 8b 1e 5b 97 dd a0 5d | 10 4a 89 98 ee 3e 73 f8 ad 8e 0b 84 2b bb 87 07 | d3 19 10 ac f4 31 29 ae a0 fb 57 db 57 8e e8 3d | 7b 1c bf f9 0f c4 88 43 de 6a ac 3c e2 0b 51 3c | 47 b2 1e 04 99 56 29 39 94 ab 53 44 ad 54 e0 54 | 9d 52 e0 9a 6d 24 de d9 e3 52 91 a1 b5 19 19 fc | 29 00 00 24 bc 06 52 3b 0a a9 d6 55 15 a3 be 4e | de 77 6e 83 33 60 ab 6d e9 76 1e 6c cb ab 4d 19 | f5 ca 65 a4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 c4 b5 bf ec 75 31 9e 5d c6 9c 0c | 53 7b fb 92 b5 6c 20 70 00 00 00 1c 00 00 40 05 | 2a 93 28 00 9d ed cf 28 c2 1f ba 32 c1 4a e1 a2 | d1 c6 7c 44 | libevent_free: release ptr-libevent@0x7fb3780180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ddbf0 | #52 spent 0.07 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 13 43 d6 1b b9 0c ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #72 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #72 | rejected packet: | 66 13 43 d6 1b b9 0c ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #72: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f 70 d8 3e f5 22 c6 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #52 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #52 | rejected packet: | 3f 70 d8 3e f5 22 c6 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #52: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0364 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-79" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-79' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #79 at 0x557d46a40710 | State DB: adding IKEv2 state #79 in UNDEFINED | pstats #79 ikev2.ike started | Message ID: init #79: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #79: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #79; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-79" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-79" IKE SA #79 "road-eastnet-nonat-79" "road-eastnet-nonat-79" #79: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-79 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-79": constructed local IKE proposals for road-eastnet-nonat-79 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 79 for state #79 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469ddbf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #79 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 | crypto helper 5 resuming | crypto helper 5 starting work-order 79 for state #79 | #79 spent 0.174 milliseconds in ikev2_parent_outI1() | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 79 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-79" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.287 milliseconds in whack | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 79 time elapsed 0.000685 seconds | (#79) spent 0.689 milliseconds in crypto helper computing work-order 79: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 79 for state #79 to event queue | scheduling resume sending helper answer for #79 | libevent_malloc: new ptr-libevent@0x7fb3440180b0 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #79 | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 79 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #79 | **emit ISAKMP Message: | initiator cookie: | cb 0e 87 22 6d 04 19 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-79 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 47 8d fa 75 ee f5 0c 34 b3 09 04 c3 a6 70 35 18 | ikev2 g^x 8c e8 6b 6c 5c 5b 2d 90 26 5a 5e f9 d4 07 05 c2 | ikev2 g^x f5 73 64 12 f5 c2 51 38 6d 89 1a 0c 01 ef 01 94 | ikev2 g^x 08 08 2e cb 41 34 b4 4a 2f f7 ed 3c c1 7e 04 ba | ikev2 g^x 4c cb 90 52 00 84 c7 1d 71 85 6e 14 f7 d6 ba c6 | ikev2 g^x 6a 98 c9 b3 82 dd 58 3d c8 6f 45 92 9b e7 64 4a | ikev2 g^x 6e c9 47 ec bd a8 a4 79 ac 0e 9c ec e9 38 db 99 | ikev2 g^x d6 25 d7 25 8b 64 97 e5 d5 6a 07 ae 6b 9a 25 6c | ikev2 g^x ea 70 9f 4a 9e ba a1 e7 d8 d9 69 c1 2c a9 28 e5 | ikev2 g^x 2c 51 5f 2a f8 17 0e 3b 43 9f 77 5e 3a 59 4f 18 | ikev2 g^x 6f 20 ad 6e aa 63 b5 82 47 75 97 d0 4a 75 bf 68 | ikev2 g^x 0b ac a2 f9 6c 9d b8 21 cd c5 79 8b 66 f4 0e 4b | ikev2 g^x 32 8b f9 5e de 93 2f 2f 11 cf e9 f6 3a 2b 4b 7a | ikev2 g^x bd 3c a3 27 78 6d f5 6c 33 13 d9 14 f8 0e 44 d7 | ikev2 g^x 3e 91 89 43 f4 2f 9b b6 ab 6d 76 71 13 52 45 fd | ikev2 g^x 0e 5e 7c 72 38 35 d5 eb 86 2e 14 37 c5 c9 56 83 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5a 77 8f b1 9a 0e 27 f5 13 b5 b3 3b 54 a7 64 e6 | IKEv2 nonce f0 cd 7e 6d c0 5a 2d 35 86 f1 cb 9d 32 23 be bb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cb 0e 87 22 6d 04 19 e5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4f | natd_hash: port= 01 f4 | natd_hash: hash= 18 31 42 b5 5a b6 78 6b 4f 08 f8 04 13 cc 8c 45 | natd_hash: hash= a7 cd ab bc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 18 31 42 b5 5a b6 78 6b 4f 08 f8 04 13 cc 8c 45 | Notify data a7 cd ab bc | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cb 0e 87 22 6d 04 19 e5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2d 9f b7 7e f4 d4 af ae b0 e9 56 0d ae 10 83 85 | natd_hash: hash= d2 ea 45 54 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2d 9f b7 7e f4 d4 af ae b0 e9 56 0d ae 10 83 85 | Notify data d2 ea 45 54 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #79 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #79: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #79 to 4294967295 after switching state | Message ID: IKE #79 skipping update_recv as MD is fake | Message ID: sent #79 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-79" #79: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.79:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #79) | cb 0e 87 22 6d 04 19 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 8d fa 75 ee f5 0c 34 b3 09 04 c3 a6 70 35 18 | 8c e8 6b 6c 5c 5b 2d 90 26 5a 5e f9 d4 07 05 c2 | f5 73 64 12 f5 c2 51 38 6d 89 1a 0c 01 ef 01 94 | 08 08 2e cb 41 34 b4 4a 2f f7 ed 3c c1 7e 04 ba | 4c cb 90 52 00 84 c7 1d 71 85 6e 14 f7 d6 ba c6 | 6a 98 c9 b3 82 dd 58 3d c8 6f 45 92 9b e7 64 4a | 6e c9 47 ec bd a8 a4 79 ac 0e 9c ec e9 38 db 99 | d6 25 d7 25 8b 64 97 e5 d5 6a 07 ae 6b 9a 25 6c | ea 70 9f 4a 9e ba a1 e7 d8 d9 69 c1 2c a9 28 e5 | 2c 51 5f 2a f8 17 0e 3b 43 9f 77 5e 3a 59 4f 18 | 6f 20 ad 6e aa 63 b5 82 47 75 97 d0 4a 75 bf 68 | 0b ac a2 f9 6c 9d b8 21 cd c5 79 8b 66 f4 0e 4b | 32 8b f9 5e de 93 2f 2f 11 cf e9 f6 3a 2b 4b 7a | bd 3c a3 27 78 6d f5 6c 33 13 d9 14 f8 0e 44 d7 | 3e 91 89 43 f4 2f 9b b6 ab 6d 76 71 13 52 45 fd | 0e 5e 7c 72 38 35 d5 eb 86 2e 14 37 c5 c9 56 83 | 29 00 00 24 5a 77 8f b1 9a 0e 27 f5 13 b5 b3 3b | 54 a7 64 e6 f0 cd 7e 6d c0 5a 2d 35 86 f1 cb 9d | 32 23 be bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 31 42 b5 5a b6 78 6b 4f 08 f8 04 | 13 cc 8c 45 a7 cd ab bc 00 00 00 1c 00 00 40 05 | 2d 9f b7 7e f4 d4 af ae b0 e9 56 0d ae 10 83 85 | d2 ea 45 54 | state #79 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3780180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469ddbf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e7260 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #79 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 | #79 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49607.013478 | resume sending helper answer for #79 suppresed complete_v2_state_transition() and stole MD | #79 spent 0.542 milliseconds in resume sending helper answer | stop processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3440180b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cb 0e 87 22 6d 04 19 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #79 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #79 | rejected packet: | cb 0e 87 22 6d 04 19 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #79: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0859 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e5ca0 | handling event EVENT_RETRANSMIT for parent state #25 | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #25 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #25 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49607.024703; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003824 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a15810 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #25 | libevent_malloc: new ptr-libevent@0x7fb3440180b0 size 128 "road-eastnet-nonat-25" #25: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #25) | 78 5e ec 19 c3 e9 2e 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 3a 20 04 5c a3 28 e0 27 26 70 8b 2f d3 d3 dd | 4a ad b8 1e 2e 37 87 d2 d3 a8 c4 9d c6 ee 0f a0 | 73 84 05 06 74 d6 4d 07 19 2b 12 8b 69 7a 83 b9 | 89 8c 88 b4 63 15 c8 b2 2d cc 49 7a 79 d1 07 bf | ee 4e b7 0b 0d 2d 3d 97 a7 24 aa 10 a0 e9 fc 77 | 06 e9 cd 21 f9 64 fc 4a 83 9d 5e f3 a2 9b 32 c3 | d3 50 6b 09 58 29 c8 67 c4 22 3b 38 ef 52 9f dd | 6e 41 e8 16 88 89 59 a6 9f 8d 30 13 4e 6f 06 5b | 1b 0e 62 f8 90 29 6e c8 e5 89 28 a2 ea ec 59 64 | 67 71 02 aa 61 49 46 0f fe 0a d1 4d 62 20 44 13 | 22 6b 41 1e 83 c0 52 5c 04 b5 86 ac e3 c4 87 52 | 79 53 63 6b c1 fd a7 16 e1 a2 b6 27 78 fe 10 69 | 79 cb f1 75 47 7f aa 61 41 c8 00 01 b4 6e 89 cf | 41 c5 e9 e7 92 08 38 fd 15 78 0a 2b 93 44 c9 ca | b1 70 2a 2b ec 91 fe 70 63 59 89 8e 57 c3 33 c3 | 54 24 a1 21 c8 2a c0 85 b2 60 de 71 38 dc 7c 22 | 29 00 00 24 e1 d5 1d 82 b2 16 85 fd 33 85 77 2b | fc 68 12 4a cf f8 6e 1b 7e ab 43 df ab 9a a1 84 | be 92 7e 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a 8e 47 d6 ba 1e 42 85 a7 7b 2f db | 65 2a 1e ef d5 42 ee 43 00 00 00 1c 00 00 40 05 | 5d 12 0d 5e 92 91 ee 2b 6d 12 02 e9 64 25 a1 22 | eb b7 d7 ed | libevent_free: release ptr-libevent@0x7fb37c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e5ca0 | #25 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 5e ec 19 c3 e9 2e 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #25 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #25 | rejected packet: | 78 5e ec 19 c3 e9 2e 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #25: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #65 | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #65 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #65 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49607.036035; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001523 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a32290 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #65 | libevent_malloc: new ptr-libevent@0x7fb37c009640 size 128 "road-eastnet-nonat-65" #65: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #65) | ef 12 90 5c 48 7d 35 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 1d 09 25 1e 78 f1 ab 15 10 4e 97 1c df 6e dc | ea a4 f2 51 40 2c fc 70 83 3b d1 14 8e 0e 9b f0 | ed 07 86 8f 8c 86 61 7e ec 48 49 64 93 36 5d 3e | 17 1f e8 61 4f 64 88 6f dc 05 20 78 89 b7 e5 6b | 2c bb be 5b d1 73 00 a1 4f 26 6a 56 a9 d6 41 92 | 2d 76 96 98 ed 1d 08 e4 99 fe 2c 5e 06 f5 6b bd | 7e 5c 39 22 bf ae a8 e1 92 1c 13 3f 1d 70 c4 80 | 07 a5 77 ff 91 5d 4b 48 ee 7b fd 40 d0 32 19 b5 | 09 de 90 f8 5a 03 1b 2a 6a c3 ef 64 b2 ec 44 55 | 99 02 c6 b9 5e db b2 cd f2 ce d4 a6 86 55 55 7c | 29 4f 4b ce 6a 0b b1 f7 34 a8 01 90 c9 f9 c3 1c | 81 d7 a5 bb 19 5a 7d e2 de 08 df 1d b2 6d 5a f1 | 1e a2 87 2c 96 1b c7 cb 00 ed 5b 85 f3 b5 ad fb | 85 9e 29 58 fd ca dd fe cc ef 21 ce b6 4c a2 4d | d7 d2 d7 9a 36 aa ca e6 4f 15 82 d8 a4 cd 14 4f | 08 9f 68 62 be 95 a7 c1 d4 3f 0f 63 b9 f6 80 56 | 29 00 00 24 56 09 76 96 73 f6 7a d5 b4 ac d9 d3 | f5 d3 52 17 38 15 85 8c 5c 9b 9d d9 ed a7 ee 26 | 3a e8 6f 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 23 18 fa b0 e0 93 30 87 95 e8 a3 | 79 bf 51 a0 e1 20 e5 2d 00 00 00 1c 00 00 40 05 | 26 a2 95 ca b7 c9 12 03 be 34 1f 1e 21 7b 79 10 | 86 6d e0 e7 | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | #65 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 12 90 5c 48 7d 35 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #65 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #65 | rejected packet: | ef 12 90 5c 48 7d 35 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #65: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.075 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a205f0 | handling event EVENT_RETRANSMIT for parent state #73 | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #73 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #73 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49607.073411; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500255 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #73 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 "road-eastnet-nonat-73" #73: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #73) | 1b d1 f7 22 4f 1d be c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 17 af cb 15 dc ab b1 a5 7f 34 62 4e 0f 28 9a | 18 48 48 5b 8a 7c 0e f9 96 fe 06 d5 63 de 59 f8 | 49 35 b4 79 b1 9f 27 0d e0 5d f1 56 f3 be 3d 0b | 2c 98 27 ba b0 9f 63 a4 e7 98 a1 c0 ce b7 fa 57 | bc af 56 22 b4 0b 08 17 91 1f 28 fd 21 7d b9 47 | be 94 09 11 9d 2a ae 62 55 90 ec cd fb 6d 33 53 | dc 6e 16 d9 31 7b 9a c8 fd c1 75 61 52 f6 98 91 | 94 9a f3 05 36 de 11 ce 66 87 ce 7a d3 f8 fd 04 | 0b ba 01 fd 05 22 ef 85 db 52 65 4a 74 05 92 71 | be df ba dc 65 01 21 6c d5 86 65 2b 9a e5 83 35 | a5 c8 2d 49 2e 69 13 a9 18 d4 42 31 7e 26 5b 88 | 7c 6f cd 46 42 cb fc 6c 40 14 2b 57 0e e7 97 72 | 5b db 5d 77 72 cd 54 3e 63 fa 42 39 c6 a7 84 0d | 90 25 f3 6f 23 cf 8e 04 75 0a 41 85 e3 ef 88 28 | 25 3f 56 c1 9a ec 95 fb a0 fa ac 95 ac 16 97 71 | 2e b2 fb 1e 8b 8f a8 12 b2 0a 1f 31 5e c4 d7 fa | 29 00 00 24 93 de fa 16 34 ae c4 6f 1c b0 6f ba | 95 0e 80 10 81 5f 54 52 00 a9 bf 63 44 18 a5 30 | 6d af 4e 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 5e 43 5b b5 69 a0 f9 16 98 c0 46 | f4 de 55 67 f2 0c 20 b2 00 00 00 1c 00 00 40 05 | 50 cf 48 cc c9 4e 77 06 66 f1 57 3b 42 c0 94 82 | a3 eb c2 6e | libevent_free: release ptr-libevent@0x557d469e1b60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a205f0 | #73 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b d1 f7 22 4f 1d be c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #73 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #73 | rejected packet: | 1b d1 f7 22 4f 1d be c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #73: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-80" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-80' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #80 at 0x557d46a41cd0 | State DB: adding IKEv2 state #80 in UNDEFINED | pstats #80 ikev2.ike started | Message ID: init #80: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #80: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #80; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-80" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-80" IKE SA #80 "road-eastnet-nonat-80" "road-eastnet-nonat-80" #80: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-80 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-80": constructed local IKE proposals for road-eastnet-nonat-80 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 80 for state #80 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a205f0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #80 | libevent_malloc: new ptr-libevent@0x557d469e1b60 size 128 | #80 spent 0.125 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 resuming | RESET processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-80" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 3 starting work-order 80 for state #80 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 80 | spent 0.203 milliseconds in whack | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 80 time elapsed 0.000767 seconds | (#80) spent 0.775 milliseconds in crypto helper computing work-order 80: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 80 for state #80 to event queue | scheduling resume sending helper answer for #80 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #80 | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 80 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #80 | **emit ISAKMP Message: | initiator cookie: | aa bd f3 45 40 fd 66 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-80 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5a f9 52 fe 2c 07 55 9a 9f 75 be 2d bb 6b aa b0 | ikev2 g^x 07 01 f4 20 39 c9 c6 12 04 59 16 f7 53 ca 23 cf | ikev2 g^x b2 a3 d6 d7 cd d3 78 95 1e ae 2c b7 17 84 30 6c | ikev2 g^x 9a 6e 0d 1b ef 48 24 1d f1 c9 12 65 61 88 44 c9 | ikev2 g^x 4b 27 23 9a 65 49 0a 11 49 89 68 1f 69 8b cd 8d | ikev2 g^x e9 1c 22 5e 52 f0 a3 c1 f7 8e 10 9b 8e 27 61 b3 | ikev2 g^x aa d7 5b 30 40 8f 25 2e 0d 7c bd dc 0e 4d aa 95 | ikev2 g^x b6 5a 44 77 7b 33 24 ed 5e bf f2 78 c5 d8 1e 5c | ikev2 g^x 38 0e af a8 70 85 81 7a 43 7a de 45 73 d1 23 0a | ikev2 g^x 21 50 82 2c fb 48 a9 b6 ed 4a 3a 01 52 3d 91 cf | ikev2 g^x 62 7a 95 ef ff 5d 9f b3 85 63 dc f5 46 12 fc e4 | ikev2 g^x ac 22 23 7e 8e 79 eb cb 39 31 bb de 91 1f fd 9c | ikev2 g^x 95 3c fe ca 99 40 e4 17 71 ad 8e 05 ed f6 14 9e | ikev2 g^x 6b 26 3c 1c 13 2f 5a 94 9d 9c cd 71 11 6d bb c9 | ikev2 g^x 9a 84 65 ba e1 3d ae 2e 2c 88 f5 b9 e4 60 97 3a | ikev2 g^x ad 9a 6f f8 77 43 67 40 a8 7b be e5 9d 13 c4 6d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 53 2a 2d 72 a4 0b ac f1 46 3b 88 60 a1 1f 05 e7 | IKEv2 nonce 3a 9a 78 ce 7e 03 67 44 f4 b3 91 7b 4e 29 6b 71 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= aa bd f3 45 40 fd 66 6a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 50 | natd_hash: port= 01 f4 | natd_hash: hash= 29 ed 0c 1a de d8 39 29 7d 81 95 16 89 64 a4 1b | natd_hash: hash= c6 93 47 b1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 29 ed 0c 1a de d8 39 29 7d 81 95 16 89 64 a4 1b | Notify data c6 93 47 b1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= aa bd f3 45 40 fd 66 6a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 41 2d b0 0c 88 62 05 80 34 d7 2b cd 52 bc d2 c8 | natd_hash: hash= ff 29 c4 37 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 41 2d b0 0c 88 62 05 80 34 d7 2b cd 52 bc d2 c8 | Notify data ff 29 c4 37 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #80 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #80: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #80 to 4294967295 after switching state | Message ID: IKE #80 skipping update_recv as MD is fake | Message ID: sent #80 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-80" #80: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.80:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #80) | aa bd f3 45 40 fd 66 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a f9 52 fe 2c 07 55 9a 9f 75 be 2d bb 6b aa b0 | 07 01 f4 20 39 c9 c6 12 04 59 16 f7 53 ca 23 cf | b2 a3 d6 d7 cd d3 78 95 1e ae 2c b7 17 84 30 6c | 9a 6e 0d 1b ef 48 24 1d f1 c9 12 65 61 88 44 c9 | 4b 27 23 9a 65 49 0a 11 49 89 68 1f 69 8b cd 8d | e9 1c 22 5e 52 f0 a3 c1 f7 8e 10 9b 8e 27 61 b3 | aa d7 5b 30 40 8f 25 2e 0d 7c bd dc 0e 4d aa 95 | b6 5a 44 77 7b 33 24 ed 5e bf f2 78 c5 d8 1e 5c | 38 0e af a8 70 85 81 7a 43 7a de 45 73 d1 23 0a | 21 50 82 2c fb 48 a9 b6 ed 4a 3a 01 52 3d 91 cf | 62 7a 95 ef ff 5d 9f b3 85 63 dc f5 46 12 fc e4 | ac 22 23 7e 8e 79 eb cb 39 31 bb de 91 1f fd 9c | 95 3c fe ca 99 40 e4 17 71 ad 8e 05 ed f6 14 9e | 6b 26 3c 1c 13 2f 5a 94 9d 9c cd 71 11 6d bb c9 | 9a 84 65 ba e1 3d ae 2e 2c 88 f5 b9 e4 60 97 3a | ad 9a 6f f8 77 43 67 40 a8 7b be e5 9d 13 c4 6d | 29 00 00 24 53 2a 2d 72 a4 0b ac f1 46 3b 88 60 | a1 1f 05 e7 3a 9a 78 ce 7e 03 67 44 f4 b3 91 7b | 4e 29 6b 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 ed 0c 1a de d8 39 29 7d 81 95 16 | 89 64 a4 1b c6 93 47 b1 00 00 00 1c 00 00 40 05 | 41 2d b0 0c 88 62 05 80 34 d7 2b cd 52 bc d2 c8 | ff 29 c4 37 | state #80 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x557d469e1b60 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a205f0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e5ca0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #80 | libevent_malloc: new ptr-libevent@0x557d469e1b60 size 128 | #80 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49607.075404 | resume sending helper answer for #80 suppresed complete_v2_state_transition() and stole MD | #80 spent 0.45 milliseconds in resume sending helper answer | stop processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3380180b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | aa bd f3 45 40 fd 66 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #80 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #80 | rejected packet: | aa bd f3 45 40 fd 66 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #80: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0656 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #53 | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #53 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #53 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49607.077622; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002558 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ddbf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #53 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 "road-eastnet-nonat-53" #53: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #53) | 22 bd 87 7d 85 b9 18 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 30 f1 21 57 e7 a6 a0 b1 5a 51 b3 c9 69 4a 15 | 0c ef ee d8 55 97 13 32 e2 cf 8d c8 f3 74 4c 97 | 22 ad ca ab 81 a4 a0 26 9d e6 3b e7 1c 2b d2 a1 | d6 72 47 dd ab 72 ec c1 cc d7 d9 8f d8 66 bc e6 | 53 77 a5 12 d5 84 8f 13 60 d3 99 01 c2 30 50 56 | 18 a7 45 bc dd f7 11 3f 14 e8 e1 27 67 4e d9 50 | bb c0 6c 1a d8 e9 1e 81 c4 fa a9 14 22 9d 32 b4 | e1 11 67 1b f4 56 6f d3 5b 27 83 19 34 08 ee 9b | f3 6b 24 bb c8 a8 09 ee 97 89 49 a0 fb 47 38 93 | ca a8 21 f6 da 4a ff ce b8 5a 83 17 3c fa b5 a4 | 1d 50 f4 b9 26 78 5e a6 78 30 f6 80 a4 cd 3e ae | ea 19 26 25 27 2f a8 b0 bc e9 8e dc 47 51 61 79 | 07 e7 6e 1f 82 d0 fe 19 b0 44 4b f8 92 c9 fb 82 | 83 56 b0 37 a7 92 bf 23 17 cb fb 8b 75 11 c5 e0 | 1d 95 a6 1f 6a 1b 78 a9 5c 16 4e 89 74 ff c7 5a | 43 0f 1f 26 45 20 46 36 e0 37 07 46 11 e2 7c fd | 29 00 00 24 1d d0 6e d2 14 3b 95 3d 7a f3 16 f0 | 13 a4 5c 97 24 08 af 2b 29 b2 1a e1 3b dc 59 4d | 62 47 73 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 de d2 d7 2b e1 3c 0c 4b a2 6a 97 | 5e 9e de 30 79 3d d7 e0 00 00 00 1c 00 00 40 05 | de 44 b7 78 c2 27 43 2d 86 e9 13 34 57 72 8f 74 | 48 51 21 6e | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #53 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 22 bd 87 7d 85 b9 18 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #53 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #53 | rejected packet: | 22 bd 87 7d 85 b9 18 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #53: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0588 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f0aa0 | handling event EVENT_RETRANSMIT for parent state #66 | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #66 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #66 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49607.098949; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002475 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #66 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 "road-eastnet-nonat-66" #66: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #66) | 64 fc 26 82 c6 65 9b e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 5c 42 12 a8 cf 54 30 35 41 88 3e 73 38 e5 58 | 88 e1 84 4c b4 74 fd b0 fa c4 88 6f 83 90 67 ee | ea 08 5d 03 f5 21 c1 48 f4 fa d9 68 de f8 02 e9 | 20 8c 8f 00 bb e0 27 04 09 fe 8d f2 a1 9c cf 02 | 35 98 ce 70 23 87 ee fc 94 cd 0c 7b 9f 06 08 77 | f2 7f c2 13 7f e1 04 f8 2f 23 ef 1d fb 54 4c 0d | ac 20 e0 c8 bd 84 3e ce b6 49 37 85 56 01 f1 9b | ac 54 85 9c fd 7d 5d 63 30 bd f9 4d d5 7a c1 a0 | 6c 64 e9 25 18 ed 7b 3f 1a a2 52 c0 47 b8 c4 ff | 46 70 76 9b eb db 63 e5 d9 0f fb e2 44 f2 65 5e | ab 82 c1 e9 45 5a aa 38 88 06 f2 1d 2e 7b 75 16 | bf 94 df 07 bd 89 cd 9e ba b0 6c 38 fc 80 69 75 | 55 88 bd 23 1e bc ab 76 6d 9e ce 05 ea ee d0 f1 | 1a bd 0c b1 86 63 56 69 8c 5f 2e 8a f5 e2 c1 97 | 10 bc e7 eb 71 fb 81 cd 25 de 9b 6d 12 04 dd ce | 36 90 99 3b a3 2d 73 4a 99 7b f0 18 dc 83 2b 7d | 29 00 00 24 64 f2 bd 07 f3 b0 6e 75 d4 40 2c d9 | f4 e5 3f 9a 4d aa 41 b2 3f a1 6e 03 4f 7d 3f ec | 58 37 55 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d dc 62 51 f8 7c c3 1c 6d 46 26 31 | c0 6e bd 6d 19 0c cf 42 00 00 00 1c 00 00 40 05 | 76 be 2b c3 74 ff 88 3d a8 f9 74 84 97 f5 dc 48 | 6c 56 c4 9c | libevent_free: release ptr-libevent@0x7fb35800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f0aa0 | #66 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 fc 26 82 c6 65 9b e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #66 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #66 | rejected packet: | 64 fc 26 82 c6 65 9b e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #66: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0709 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469defe0 | handling event EVENT_RETRANSMIT for parent state #26 | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #26 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #26 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49607.102326; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003174 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2e150 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #26 | libevent_malloc: new ptr-libevent@0x7fb35800cf80 size 128 "road-eastnet-nonat-26" #26: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #26) | f4 88 08 87 51 21 ca bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af d0 7b 56 fd 83 24 e2 7f 6d 07 5b 14 cf 37 08 | c2 df a1 e8 d0 3d d9 70 11 a2 f7 87 78 ef 74 57 | 42 80 b9 d0 66 00 01 7b 09 5e 7e 2a 26 27 6c f8 | 72 db 2f 73 3f 38 89 07 c7 29 09 0b 07 35 1d d7 | 5c 45 0c 9e 1b e1 95 53 4a ee ac 68 bd 09 aa 3d | 27 0f 50 02 03 b3 ad ea c4 c7 28 b1 bc b2 70 07 | fc b6 58 d4 ed 1b fe 1b 64 8b 86 a1 fe fc 72 d9 | f1 ba a9 eb 7d ce cd 2c b8 6e 00 33 4c be dd dd | 3d 98 b2 2e 58 56 f2 f2 80 02 eb 21 ee 6b bd 96 | 40 1f 33 62 77 0f c1 a2 eb f8 19 6e 1a 5e 18 e2 | c2 89 f7 17 30 91 11 29 f1 9d 22 c7 c8 11 a1 d6 | b3 ae 73 01 db d3 1a d2 95 3f af b3 66 e8 e4 3f | 7f 26 bd b3 f0 37 10 0c fa cc 87 cc 8d 67 d1 69 | 87 60 66 13 b3 cf ae b5 94 11 93 f7 71 af 4a e8 | 96 fa e6 46 bb bb 17 b4 9c 44 80 04 e3 4c ce 52 | 44 6c a3 c2 a0 6e 82 a5 21 5c cc c5 65 7c 81 dc | 29 00 00 24 8a 04 a2 be b1 ba fb 75 a9 90 e3 4a | e4 71 c4 43 1c fe 30 e6 85 0e 15 7e 50 52 02 a7 | d2 a1 ae dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 32 7f b1 02 26 47 ea b2 9e 1c ce | 0f f8 7e 1c 87 59 f3 12 00 00 00 1c 00 00 40 05 | f0 af 8c 45 09 60 6e 14 7f 54 da 7f 84 35 07 83 | 60 40 27 0a | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469defe0 | #26 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 88 08 87 51 21 ca bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #26 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #26 | rejected packet: | f4 88 08 87 51 21 ca bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #26: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0716 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-81" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-81' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #81 at 0x557d46a43290 | State DB: adding IKEv2 state #81 in UNDEFINED | pstats #81 ikev2.ike started | Message ID: init #81: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #81: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #81; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-81" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-81" IKE SA #81 "road-eastnet-nonat-81" "road-eastnet-nonat-81" #81: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-81 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-81": constructed local IKE proposals for road-eastnet-nonat-81 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 81 for state #81 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469defe0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #81 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 | #81 spent 0.153 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 resuming | crypto helper 1 starting work-order 81 for state #81 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 81 | RESET processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-81" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.289 milliseconds in whack | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 81 time elapsed 0.000847 seconds | (#81) spent 0.849 milliseconds in crypto helper computing work-order 81: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 81 for state #81 to event queue | scheduling resume sending helper answer for #81 | libevent_malloc: new ptr-libevent@0x7fb38801abe0 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #81 | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 81 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #81 | **emit ISAKMP Message: | initiator cookie: | 66 17 84 1d 01 f5 89 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-81 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 92 79 cf 2e c9 58 5a cf 22 0f e4 95 f3 b3 ec e3 | ikev2 g^x d7 ab 2d 5f 01 54 3c c5 38 6c 9c d3 40 e3 80 92 | ikev2 g^x e9 89 68 26 a0 e4 bb a0 7a eb 4c f1 e4 9f 20 12 | ikev2 g^x 58 2a 4c f1 f2 df 9a 6d 19 39 bd 12 58 10 e1 11 | ikev2 g^x 60 c9 9d ed 18 33 de 94 c1 bb 5d 21 df 07 9b 4e | ikev2 g^x 1e ae ec 4e 5f 9a 7f b4 b3 f8 3c 10 c2 09 ea 68 | ikev2 g^x 5d bc a9 fd 8a bb 40 95 8d 3b d1 39 da 16 f8 a8 | ikev2 g^x 93 df 32 68 37 e0 b9 31 f0 a7 f2 55 d6 2d bc ef | ikev2 g^x ef 45 3f e8 34 12 fc 98 2a dc 19 03 8b dc 1f 09 | ikev2 g^x cd 02 40 97 95 a7 39 71 09 ba 54 e3 53 28 2c b9 | ikev2 g^x 98 bb af 3a 25 6b e9 e7 4c 76 46 d1 aa 9d 3b 59 | ikev2 g^x 03 52 8a 61 f9 f7 83 33 a1 6c a0 29 48 f7 36 48 | ikev2 g^x 3a 5a f9 b5 72 5e fe 9f e0 84 df 16 32 28 ce ca | ikev2 g^x c6 27 c5 b5 d7 f3 93 db 10 54 fb f4 c3 70 76 d4 | ikev2 g^x 5f 00 b9 4c 0d 91 91 e7 a8 18 4b 2b 7f cf a5 4e | ikev2 g^x 76 2e 5b 38 e2 0b 32 aa 89 74 93 4b e3 81 6f 21 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 78 b9 6f 78 8b 1e bb 84 c4 a1 7c 02 08 74 d8 82 | IKEv2 nonce 11 75 a1 52 cd 59 45 9e 38 4d d2 1d 56 1f 81 89 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 66 17 84 1d 01 f5 89 db | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 51 | natd_hash: port= 01 f4 | natd_hash: hash= ae 31 12 3e 08 55 9e 26 f3 2f be 08 b5 7f 7c 7d | natd_hash: hash= c5 5f 44 c0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ae 31 12 3e 08 55 9e 26 f3 2f be 08 b5 7f 7c 7d | Notify data c5 5f 44 c0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 66 17 84 1d 01 f5 89 db | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 16 fd af 38 8b 2a c1 77 ea 51 ea 68 dc 9b f5 3d | natd_hash: hash= 6a 08 67 b3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 16 fd af 38 8b 2a c1 77 ea 51 ea 68 dc 9b f5 3d | Notify data 6a 08 67 b3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #81 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #81: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #81 to 4294967295 after switching state | Message ID: IKE #81 skipping update_recv as MD is fake | Message ID: sent #81 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-81" #81: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.81:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #81) | 66 17 84 1d 01 f5 89 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 79 cf 2e c9 58 5a cf 22 0f e4 95 f3 b3 ec e3 | d7 ab 2d 5f 01 54 3c c5 38 6c 9c d3 40 e3 80 92 | e9 89 68 26 a0 e4 bb a0 7a eb 4c f1 e4 9f 20 12 | 58 2a 4c f1 f2 df 9a 6d 19 39 bd 12 58 10 e1 11 | 60 c9 9d ed 18 33 de 94 c1 bb 5d 21 df 07 9b 4e | 1e ae ec 4e 5f 9a 7f b4 b3 f8 3c 10 c2 09 ea 68 | 5d bc a9 fd 8a bb 40 95 8d 3b d1 39 da 16 f8 a8 | 93 df 32 68 37 e0 b9 31 f0 a7 f2 55 d6 2d bc ef | ef 45 3f e8 34 12 fc 98 2a dc 19 03 8b dc 1f 09 | cd 02 40 97 95 a7 39 71 09 ba 54 e3 53 28 2c b9 | 98 bb af 3a 25 6b e9 e7 4c 76 46 d1 aa 9d 3b 59 | 03 52 8a 61 f9 f7 83 33 a1 6c a0 29 48 f7 36 48 | 3a 5a f9 b5 72 5e fe 9f e0 84 df 16 32 28 ce ca | c6 27 c5 b5 d7 f3 93 db 10 54 fb f4 c3 70 76 d4 | 5f 00 b9 4c 0d 91 91 e7 a8 18 4b 2b 7f cf a5 4e | 76 2e 5b 38 e2 0b 32 aa 89 74 93 4b e3 81 6f 21 | 29 00 00 24 78 b9 6f 78 8b 1e bb 84 c4 a1 7c 02 | 08 74 d8 82 11 75 a1 52 cd 59 45 9e 38 4d d2 1d | 56 1f 81 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 31 12 3e 08 55 9e 26 f3 2f be 08 | b5 7f 7c 7d c5 5f 44 c0 00 00 00 1c 00 00 40 05 | 16 fd af 38 8b 2a c1 77 ea 51 ea 68 dc 9b f5 3d | 6a 08 67 b3 | state #81 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469defe0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f0aa0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #81 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 | #81 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49607.13895 | resume sending helper answer for #81 suppresed complete_v2_state_transition() and stole MD | #81 spent 0.351 milliseconds in resume sending helper answer | stop processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38801abe0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 17 84 1d 01 f5 89 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #81 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #81 | rejected packet: | 66 17 84 1d 01 f5 89 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #81: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #74 | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #74 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #74 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49607.142134; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500818 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a205f0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #74 | libevent_malloc: new ptr-libevent@0x7fb38801abe0 size 128 "road-eastnet-nonat-74" #74: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #74) | 74 9c fc 4a 6a e3 e3 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 4c a1 32 c0 37 d8 5b 48 9c e5 d1 93 92 0c 53 | 2d 7a c8 b1 df 24 d3 9a 3f 8c d4 c5 68 47 a3 a6 | 97 97 ce bb 01 47 69 1c 80 a7 65 98 e9 23 03 f4 | d4 b7 9b 7e d3 4c aa b4 56 9e 09 14 71 47 28 7f | c7 55 55 ab d5 8e 75 f5 9a f4 57 8c 05 da 66 0a | 40 9c be 25 a4 ef c7 bf 8b 81 b2 07 d2 0a 7d 79 | a8 74 67 c4 01 41 ba 6b 27 91 81 d4 a9 3f 71 a7 | d8 a9 d4 20 88 c0 67 ed 9a eb cb 95 5d 27 cd ae | 65 ee b7 22 c0 dd 63 86 9c 71 c8 d0 62 02 64 6a | 57 b2 8d 13 05 28 bc e0 52 39 21 a1 da 4e f2 d4 | b5 8a d4 4a 90 a1 15 ec 76 63 23 1b 27 bd 31 af | 95 a2 f3 5b 2d 4e d4 42 7c 32 a2 bf 50 28 83 76 | 27 c1 4e 56 b2 c9 33 07 a5 ee bf 65 36 77 b7 43 | c5 de f7 7c c7 52 fc 27 15 dc 50 6e c0 2f d7 72 | 5a 3b a4 4a 5b f6 13 1e 38 47 4d 77 c3 69 47 89 | 95 21 ff 50 2d c1 83 a3 1a 90 31 a7 2f c0 c1 a5 | 29 00 00 24 5c 46 aa ed 6c 5c 2a de e4 4c 0f 0d | ff be a8 c1 d6 16 7f 78 81 97 e2 33 fc 98 55 93 | 9e 14 cc 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 26 fa 02 ef ac 51 67 96 4e b3 ca | 7c 6c ba e3 fb 9a 52 77 00 00 00 1c 00 00 40 05 | 65 ee a5 86 f4 0e 73 b1 a9 eb cb 64 18 5a 0c a9 | fd 3d e5 eb | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #74 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 9c fc 4a 6a e3 e3 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #74 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #74 | rejected packet: | 74 9c fc 4a 6a e3 e3 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #74: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fbb00 | handling event EVENT_RETRANSMIT for parent state #54 | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #54 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #54 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49607.156431; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002299 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #54 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 "road-eastnet-nonat-54" #54: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #54) | 4e 45 bc 88 5c 41 98 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 f4 91 14 5c ab 2e e9 80 6d af 62 f3 7d f3 c8 | 41 66 e7 43 38 9a c7 1b 1e f8 8c 7d f7 db 12 65 | 59 fd 3d ea 2d 58 b5 eb bc 29 cf 89 c5 08 e0 32 | af 71 20 82 0f be ca 31 6c 17 02 ca 88 1d 08 2b | 41 de be 4f db b6 e0 c9 ce b8 f5 78 72 16 5b d3 | af b2 62 71 28 3f 0e a5 9b 79 4c c6 6b 64 ea 6c | 30 86 90 45 62 e9 86 e5 b2 f0 de b0 25 c7 2c 5e | 72 55 be b3 8f b3 05 2b 3b 6d 68 2a 44 c2 cc ec | 6b 1d 92 df 89 1a 9d f7 c1 18 8f 4d 34 ce b2 72 | dc 24 61 bd 37 65 28 f1 26 42 c6 a1 48 90 50 40 | 60 3f 78 ce 04 9c 3d ba 18 4e dd 4c d6 82 6e 51 | 67 48 49 62 37 f2 ed 52 4d b8 26 ec b0 85 3e 94 | ba a6 36 bb c9 80 6e e3 33 72 02 87 28 51 f7 0e | b2 b1 8f 9a df 7c ac 13 32 02 9e b4 45 75 85 e3 | 86 3b 1f 81 8b 2b 4d 2b b9 af 80 14 c8 c0 37 3b | 75 10 32 13 c6 74 a7 41 62 92 b3 87 9f e2 ed 2a | 29 00 00 24 f9 a0 5c 35 4a 9e bd 0e 0d 94 7a f9 | 8f b8 01 dd 15 88 70 42 78 10 83 16 a2 ba 62 6b | bf 0e 5b 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b f1 3a 2c 8b e8 c9 68 86 e1 0f be | 41 4d 1c 16 cf d5 b6 01 00 00 00 1c 00 00 40 05 | 84 fa 3c 0d 93 21 b5 34 8e ca ca 4a 93 ec 16 d0 | 28 a4 5e 28 | libevent_free: release ptr-libevent@0x7fb37000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fbb00 | #54 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e 45 bc 88 5c 41 98 f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #54 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #54 | rejected packet: | 4e 45 bc 88 5c 41 98 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #54: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #67 | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #67 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #67 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49607.161711; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001864 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fbb00 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #67 | libevent_malloc: new ptr-libevent@0x7fb37000cf80 size 128 "road-eastnet-nonat-67" #67: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #67) | d5 dc 19 08 bd ef 9f dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 15 d2 0d 8c 5c 68 38 3d 2d 2f ab 03 65 12 47 | 3e b1 d3 f9 3a 86 7c eb 4f 39 8c ad 4d 38 70 41 | d1 7d 9c 72 4f 83 e4 6c 89 f6 b0 17 b5 42 16 02 | 98 46 bb 9b ed 5c 3f ac 09 0d be a1 fd 38 36 65 | 29 1c 76 c9 62 fc be 23 07 ff 11 92 31 9b 27 f0 | d5 89 d4 07 37 e6 d9 c5 11 e2 68 cc f6 fa 8f ad | d4 d7 3d 81 a6 50 a2 3b 0c 6d a4 dc e7 02 2c 0e | b0 92 5d 4d d1 8c bc b1 d3 8b 8b 57 d6 a3 1b fb | 45 de 41 0c 4c 00 09 3b b7 02 6a 18 be d3 e2 bf | 60 42 87 71 10 49 5d 99 2a 98 69 45 a3 b9 8a 57 | c3 e1 71 dc 21 28 e6 7b 37 29 eb da 68 00 eb 12 | 52 79 13 c3 54 c6 f4 5a 0f 77 f8 92 a7 c4 70 9c | 42 51 17 18 c9 d7 b0 85 26 54 bb 62 a6 c6 48 68 | 6f 63 77 09 be 06 39 71 28 8e 68 84 3f f2 9b 78 | 53 a2 0d 5b a4 87 76 9f e3 e1 57 84 7f 83 44 ad | 59 6d db cc b7 ca a2 5b d9 9b 67 9f f8 59 1b 8c | 29 00 00 24 ea 05 1a 8b a3 08 e1 05 bd ec 39 06 | dc 75 19 c7 61 25 8f 0d bb ee a8 4f 1e a0 d7 a0 | e4 5f a7 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c a1 13 b6 f8 7a c8 5e ab 0d 26 ff | 9e 2c 49 6a b7 74 41 36 00 00 00 1c 00 00 40 05 | 1e 6d d9 18 71 66 9b 77 ce ef 92 9d c1 b1 8d 12 | ab 9b 0c 2a | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #67 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 dc 19 08 bd ef 9f dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #67 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #67 | rejected packet: | d5 dc 19 08 bd ef 9f dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #67: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fa300 | handling event EVENT_RETRANSMIT for parent state #27 | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #27 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #27 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49607.177055; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.012807 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #27 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 "road-eastnet-nonat-27" #27: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #27) | dd bb 9e aa 71 2c a8 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa f5 f3 8a 2e ca 64 13 4e ef 73 e4 1f 3e 67 ad | a1 5c bf b8 82 2d 98 4b ba 2f 4b 9c 4a 49 f6 7b | 11 53 66 d7 f2 df c6 4d 6c e8 fe ca eb 65 f7 23 | 79 97 e3 ea 55 ca fa 7d 0e 42 d8 5c 14 c7 91 72 | a4 fc cd 45 56 42 b0 30 e3 75 4e 16 78 7d 09 4f | c2 b4 68 6b 47 a2 0e 20 da b0 6a 41 7f ac 79 d0 | d4 2d 42 99 fd 0a 3a e2 6d 7f 90 e8 4d 1a 00 b2 | e9 9e 2f 5f 8c ef b1 f3 83 5d 30 13 95 c4 ca 84 | fc 5b f8 fd 99 e0 ef 1a ad a3 e3 11 fc de 8e cc | 62 ac 46 25 e8 4f ae 15 57 eb 6c c5 d8 d5 81 b9 | c0 5f a7 29 95 52 01 a8 27 41 88 9f 21 51 57 97 | 0e c0 5b 72 b9 1f 72 3e c5 18 84 95 8f 3a f7 5b | 8e ab cb da 5c d8 78 8b 6b d1 3d 62 f9 12 53 ba | 86 1f 8f 29 ce 9f 76 76 1e 5f 01 99 06 da 91 72 | f3 a9 41 c1 f1 95 87 95 cf 5a fe 09 57 13 44 9d | 62 a4 a9 60 fa 79 cc f9 5d bf f3 2b 5c 5b b4 99 | 29 00 00 24 55 62 09 8a 44 b4 a9 1d d9 35 9c 9a | 78 93 87 c8 d6 2b f2 b0 a8 b2 26 80 5e 03 70 47 | 73 8a 49 c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ef ee 96 1f 62 1c cd f0 a1 f5 67 ee | 76 d8 b6 28 a5 c0 9f 1d 00 00 00 1c 00 00 40 05 | 69 41 25 fb 01 9f 0c 01 9b e6 f4 5d 86 8e 8e d0 | 2b 2d f0 b6 | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fa300 | #27 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd bb 9e aa 71 2c a8 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #27 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #27 | rejected packet: | dd bb 9e aa 71 2c a8 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #27: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-82" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-82' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #82 at 0x557d46a44850 | State DB: adding IKEv2 state #82 in UNDEFINED | pstats #82 ikev2.ike started | Message ID: init #82: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #82: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #82; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-82" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-82" IKE SA #82 "road-eastnet-nonat-82" "road-eastnet-nonat-82" #82: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-82 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-82": constructed local IKE proposals for road-eastnet-nonat-82 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 82 for state #82 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469fa300 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #82 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 | #82 spent 0.117 milliseconds in ikev2_parent_outI1() | crypto helper 2 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 starting work-order 82 for state #82 | RESET processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-82" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 82 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.225 milliseconds in whack | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 82 time elapsed 0.000977 seconds | (#82) spent 0.989 milliseconds in crypto helper computing work-order 82: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 82 for state #82 to event queue | scheduling resume sending helper answer for #82 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #82 | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 82 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #82 | **emit ISAKMP Message: | initiator cookie: | 0d 59 4a 91 cd 0d a8 c9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-82 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2d de 62 a5 d0 5e bf 56 63 0e 91 36 97 7a 1e b1 | ikev2 g^x b4 16 cc 30 41 76 2c 4d 4b 72 e2 c2 b2 a1 f9 60 | ikev2 g^x dd 93 5e 0e 34 f7 25 c7 9f 53 30 68 3a c2 8d 97 | ikev2 g^x 4c 9d fc 02 66 0b d5 60 41 52 07 34 69 fd 84 a5 | ikev2 g^x ec 72 09 87 c6 8f 05 fb 8f 4e 6b ba 77 83 dc 16 | ikev2 g^x 60 81 0d a8 71 f3 cf c7 95 36 23 35 f7 97 ca 50 | ikev2 g^x b2 db d3 48 30 34 aa be 9a a2 37 9b 39 19 60 98 | ikev2 g^x ac 8b 67 73 12 da 16 80 58 c0 2a 80 56 eb 21 9f | ikev2 g^x 3c 3d 73 57 e9 89 d6 8c 3d 04 dc a8 2c a0 35 72 | ikev2 g^x 3a b3 ec 9f 41 04 d4 7f d9 68 36 d5 13 cd 39 04 | ikev2 g^x 57 48 05 ca 9e f9 64 20 0d 91 1f 4e 5d ee 28 d1 | ikev2 g^x 38 36 5d 35 10 47 60 e0 25 2a b4 90 4f 2b 22 f8 | ikev2 g^x 94 db c6 d0 bc a1 a8 ee 23 9e 12 7c 06 be 13 c9 | ikev2 g^x e4 f8 bb 10 03 1f 37 ab 38 d2 32 58 2a 26 f3 33 | ikev2 g^x 1c 60 32 46 6c a1 0e 88 78 61 ec 6b c9 dd e6 45 | ikev2 g^x 58 22 90 cf 6d f9 2b cd d5 02 5b 51 ea 18 fb dc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 61 df db a2 1d df 12 0c 5e ab 31 16 03 92 3a 6f | IKEv2 nonce 24 ce 35 05 3e f5 da 2f 7c 0d 1e 54 bb d5 49 7f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0d 59 4a 91 cd 0d a8 c9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 52 | natd_hash: port= 01 f4 | natd_hash: hash= 38 70 c6 55 5e 2d 9d b0 0a d9 87 23 4b f7 4f fa | natd_hash: hash= 28 d8 1e 81 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 38 70 c6 55 5e 2d 9d b0 0a d9 87 23 4b f7 4f fa | Notify data 28 d8 1e 81 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0d 59 4a 91 cd 0d a8 c9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 40 ed 3d f8 bd 8d 40 9e 57 65 9a d5 21 53 67 44 | natd_hash: hash= eb 0f 4b 38 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 40 ed 3d f8 bd 8d 40 9e 57 65 9a d5 21 53 67 44 | Notify data eb 0f 4b 38 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #82 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #82: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #82 to 4294967295 after switching state | Message ID: IKE #82 skipping update_recv as MD is fake | Message ID: sent #82 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-82" #82: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.82:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #82) | 0d 59 4a 91 cd 0d a8 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d de 62 a5 d0 5e bf 56 63 0e 91 36 97 7a 1e b1 | b4 16 cc 30 41 76 2c 4d 4b 72 e2 c2 b2 a1 f9 60 | dd 93 5e 0e 34 f7 25 c7 9f 53 30 68 3a c2 8d 97 | 4c 9d fc 02 66 0b d5 60 41 52 07 34 69 fd 84 a5 | ec 72 09 87 c6 8f 05 fb 8f 4e 6b ba 77 83 dc 16 | 60 81 0d a8 71 f3 cf c7 95 36 23 35 f7 97 ca 50 | b2 db d3 48 30 34 aa be 9a a2 37 9b 39 19 60 98 | ac 8b 67 73 12 da 16 80 58 c0 2a 80 56 eb 21 9f | 3c 3d 73 57 e9 89 d6 8c 3d 04 dc a8 2c a0 35 72 | 3a b3 ec 9f 41 04 d4 7f d9 68 36 d5 13 cd 39 04 | 57 48 05 ca 9e f9 64 20 0d 91 1f 4e 5d ee 28 d1 | 38 36 5d 35 10 47 60 e0 25 2a b4 90 4f 2b 22 f8 | 94 db c6 d0 bc a1 a8 ee 23 9e 12 7c 06 be 13 c9 | e4 f8 bb 10 03 1f 37 ab 38 d2 32 58 2a 26 f3 33 | 1c 60 32 46 6c a1 0e 88 78 61 ec 6b c9 dd e6 45 | 58 22 90 cf 6d f9 2b cd d5 02 5b 51 ea 18 fb dc | 29 00 00 24 61 df db a2 1d df 12 0c 5e ab 31 16 | 03 92 3a 6f 24 ce 35 05 3e f5 da 2f 7c 0d 1e 54 | bb d5 49 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 70 c6 55 5e 2d 9d b0 0a d9 87 23 | 4b f7 4f fa 28 d8 1e 81 00 00 00 1c 00 00 40 05 | 40 ed 3d f8 bd 8d 40 9e 57 65 9a d5 21 53 67 44 | eb 0f 4b 38 | state #82 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469fa300 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fa300 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #82 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 | #82 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49607.204789 | resume sending helper answer for #82 suppresed complete_v2_state_transition() and stole MD | #82 spent 0.373 milliseconds in resume sending helper answer | stop processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38001abe0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 59 4a 91 cd 0d a8 c9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #82 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #82 | rejected packet: | 0d 59 4a 91 cd 0d a8 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #82: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e8820 | handling event EVENT_RETRANSMIT for parent state #28 | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #28 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #28 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49607.231961; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005085 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469defe0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #28 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 "road-eastnet-nonat-28" #28: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #28) | 8a 4b 73 21 31 f2 6a 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 df aa e5 83 52 1a b7 2d d0 6a 7e dc d8 a5 d6 | 60 61 e0 83 0f 2b 6a 2b b8 0c 87 3f 14 f7 2a a4 | 98 70 c5 3a a2 0f 1f 46 6a b1 86 1e e5 5c 59 31 | 32 22 91 5d a2 6a 04 29 2b 10 13 47 0d 40 ca 72 | cd e0 cf f3 84 ed 4f bf 99 02 d6 fe 28 30 e6 6c | 0e 7e ca 11 f9 11 9f a6 4c d1 42 ed 4a 0f de 1b | d1 6c 18 cd c5 6b d0 23 4a e0 04 a7 c5 ef 74 ac | 27 c8 ec 0e 1f 0d 3c 8b a9 02 76 2a 67 8e fc de | 50 4d 80 13 28 3f 33 79 17 2e 6d b4 b5 19 8a 07 | 87 4a ec 6e c5 3c fb 34 d8 bf 04 77 90 53 b4 91 | 82 d0 d4 cb ca fc 05 22 43 e7 d4 8d 52 a6 ff 42 | 3e 8b bc 55 2d a6 ee 39 af 98 64 0e 18 a4 e9 08 | 5d d9 7e 8e 5f 00 df 4b 1b cc 49 d9 d0 64 64 c8 | 91 98 82 46 10 8e 0a 7c d6 f9 65 30 9e a6 47 1d | b8 47 35 3b c7 13 08 d5 39 45 15 b2 10 ce ee 48 | 7d d8 33 00 3c 55 6c 41 f3 1e 7b 0e 34 03 4f b7 | 29 00 00 24 ad 13 98 57 a2 9c 4e ec e1 0a 80 5c | a0 80 42 e1 ab 4f 47 32 a1 1d 36 58 8b 1c 71 8b | 25 4d b5 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 83 6c 60 48 f0 55 9f 8d d1 7e b1 | fd da e6 ac 8a a5 fd 2f 00 00 00 1c 00 00 40 05 | 4a 9c 1d b6 db 3c dd 9b 4a da 5d 6f ea e8 da 4e | 08 2e ae f5 | libevent_free: release ptr-libevent@0x7fb354009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e8820 | #28 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 4b 73 21 31 f2 6a 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #28 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #28 | rejected packet: | 8a 4b 73 21 31 f2 6a 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #28: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8e0 | handling event EVENT_RETRANSMIT for parent state #68 | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #68 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #68 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49607.256309; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002291 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #68 | libevent_malloc: new ptr-libevent@0x7fb354009640 size 128 "road-eastnet-nonat-68" #68: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #68) | 70 75 31 66 aa 5c 9c e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 5d b8 31 5b 51 c7 81 22 c3 12 8e cd 03 2f 05 | f3 e7 e9 e0 56 07 0e 19 4f f3 59 f8 5f 92 30 b5 | 72 b6 ae 5a 15 67 03 c0 c9 25 86 6f b6 cd 52 32 | 93 89 9d 85 44 28 f4 e9 22 34 65 fb b6 28 63 5f | 80 98 37 5a 06 27 0e fb ee f6 cc 60 03 1e c8 99 | 96 20 20 2b e8 6a b0 1d 57 83 e1 9f d1 09 80 29 | 2a 2a 69 37 ce 92 30 79 1a 45 aa a3 bd 30 cd 8b | 23 97 c9 73 f8 32 ee fe d7 1e 67 73 bd 11 db 26 | 12 e8 63 a6 c5 a1 37 4f 2f 5c 98 66 44 92 9a da | 46 ed 57 a3 46 50 a7 e5 d9 ec 61 b3 fb 59 43 1f | 96 83 9a 55 36 c4 68 5f a7 ee f4 08 c7 30 31 52 | b8 7e 06 a5 b1 e2 2e 1a 2b de 01 96 c6 3e f1 89 | d8 1f b9 ac 77 f1 c6 91 93 f5 70 bc 2f 41 d6 e3 | ff da e8 8a 1d 5f de 22 6f 38 d0 51 a3 b4 49 ef | d5 06 ff ea 4d f6 71 eb 33 f8 fd c7 e6 95 54 de | 64 89 15 37 cd bd bf d2 74 6c 8e f3 c4 d1 b1 ad | 29 00 00 24 8c 8f d0 a2 59 9b be 88 0a db 9c c0 | a3 eb 04 0d aa d5 13 33 65 39 12 37 76 6e 7e e3 | e3 60 8c 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 a4 28 dd c4 89 9a c5 51 2a d8 15 | 55 6e c2 5e f1 52 b9 d0 00 00 00 1c 00 00 40 05 | ac d9 33 90 76 69 a3 40 a6 e4 ee bb 11 92 b7 71 | 1e 90 c3 02 | libevent_free: release ptr-libevent@0x7fb37c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8e0 | #68 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 75 31 66 aa 5c 9c e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #68 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #68 | rejected packet: | 70 75 31 66 aa 5c 9c e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #68: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #75 | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #75 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #75 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49607.257578; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500352 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1da10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #75 | libevent_malloc: new ptr-libevent@0x7fb37c00cf80 size 128 "road-eastnet-nonat-75" #75: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #75) | d6 96 43 68 6a ec ab 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b e7 f0 1b 8c 0a 12 dd d6 e5 bf 02 28 26 dd ac | 6b 5a 27 84 cc 5b e1 51 a5 48 25 1e 64 a9 f9 15 | a7 cf bd df a0 ad 76 b9 f4 06 07 4e 82 21 11 6b | 26 3f e9 d5 c8 28 2c a1 f2 de e8 cf 1b 66 10 aa | 48 33 36 9a e1 15 5a 5f 6d a7 50 58 f0 d8 c9 11 | b2 31 61 66 dc 13 e3 c7 ff 39 58 4c c1 88 d6 62 | 58 b9 1d ad d3 89 b6 21 d6 53 4e 88 4f 41 13 08 | 17 e6 d6 6a c0 94 05 0a ca 81 fd 84 5a f1 98 1e | b0 e9 8c 00 0a 4a 9c 8f 68 9e 7b 0d 09 60 4d 06 | b0 a8 a6 4f 85 49 38 bb ac 0a 4e 89 c8 a9 1a ef | 21 bd 3e 11 8d 34 77 94 db 0a 8d 1b 25 93 bc 6d | 26 8e 7b 5a 1c a6 da 04 b8 b9 68 16 5d 98 25 e7 | 4f 1c fe b2 4a 85 cb fd 7d 24 86 89 1b f6 19 0f | c0 e3 71 1b 57 41 f6 79 be 0c 81 b2 d6 8d b1 21 | 0e f7 f7 b1 1e d7 c5 ff e7 e6 4b 6a 5e 29 e6 f5 | 33 d7 87 e4 a6 ee a9 a9 4b 11 cd 2e d2 b6 0a d2 | 29 00 00 24 80 4b a3 25 3b 73 08 25 20 19 cd 1b | 6b 4a 3a cd 29 5e ac 55 94 fe 42 a8 a3 13 30 97 | 0f 50 65 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 04 fe 2e 3e a3 d6 9c 0e cd 5a 49 | b4 f8 ac 71 05 8a 92 ef 00 00 00 1c 00 00 40 05 | 56 54 de 54 0a a0 dc 64 96 23 cc 19 a1 e6 37 21 | c0 78 fa 6f | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #75 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 96 43 68 6a ec ab 11 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #75 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #75 | rejected packet: | d6 96 43 68 6a ec ab 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #75: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0575 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-83" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-83' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #83 at 0x557d46a45e10 | State DB: adding IKEv2 state #83 in UNDEFINED | pstats #83 ikev2.ike started | Message ID: init #83: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #83: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #83; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-83" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-83" IKE SA #83 "road-eastnet-nonat-83" "road-eastnet-nonat-83" #83: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-83 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-83": constructed local IKE proposals for road-eastnet-nonat-83 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 83 for state #83 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36800d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #83 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 | #83 spent 0.116 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-83" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.184 milliseconds in whack | crypto helper 0 resuming | crypto helper 0 starting work-order 83 for state #83 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 83 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 83 time elapsed 0.000659 seconds | (#83) spent 0.665 milliseconds in crypto helper computing work-order 83: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 83 for state #83 to event queue | scheduling resume sending helper answer for #83 | libevent_malloc: new ptr-libevent@0x7fb38401cc10 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #83 | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 83 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #83 | **emit ISAKMP Message: | initiator cookie: | e6 2b 97 c6 d1 4c 13 c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-83 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 03 e0 14 c2 4a 13 d8 77 12 b1 93 fe 09 ee 1d 88 | ikev2 g^x 31 85 5e 91 48 ad b1 20 71 3f cb af eb 92 c7 d3 | ikev2 g^x e3 3b dc e2 9e c2 45 29 c9 59 6d 7a 62 12 34 26 | ikev2 g^x 8c eb c3 61 ed 07 95 b3 f8 74 eb 61 63 eb 1c b2 | ikev2 g^x 60 84 c3 e0 69 12 37 aa 40 a9 ee 46 d3 1a 26 fd | ikev2 g^x 77 29 43 bd fd b4 e3 3b c7 a8 7e e9 e3 51 f4 e6 | ikev2 g^x b9 4a 57 59 1d 18 ef df e9 5a be 77 08 df e7 55 | ikev2 g^x 46 7f 6c 4f 13 29 e4 bb ef bd 6c fb 60 8b fc 62 | ikev2 g^x e9 ba c0 54 d3 2b 44 c6 2f 29 d7 34 b4 6b 61 c0 | ikev2 g^x c9 cb 1e cb a6 25 28 61 95 9e 2c f5 86 69 f9 7c | ikev2 g^x b8 7c 34 c0 e0 ed f4 f7 82 f9 b3 c4 8e 1a 55 fb | ikev2 g^x d8 ed 0f e9 ed ff da 76 3e bb 0b ca e5 d5 7e 00 | ikev2 g^x 28 52 cc 3e d7 7f e9 d9 c5 bd e9 a7 17 e5 95 51 | ikev2 g^x 9f 9f 95 b4 65 d9 e7 b3 d2 a5 c2 fe 86 92 6e 23 | ikev2 g^x 5c 06 60 94 75 50 49 bf 5b 48 f5 bd b4 b4 de 5e | ikev2 g^x dd 11 02 11 73 fd f3 0f cb 43 d1 ff 6c 2f 1d fa | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d9 ea 5f 5d e7 8b 27 ca 82 31 28 fd 7a 4f 51 83 | IKEv2 nonce 32 9a 18 8a 6e 2a 8b d4 95 e6 d6 b1 0f 0b a2 3e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e6 2b 97 c6 d1 4c 13 c0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 53 | natd_hash: port= 01 f4 | natd_hash: hash= cf 83 ee f4 b4 fb 0f 43 eb c7 c4 87 aa a0 5e 5c | natd_hash: hash= f1 0e 63 f4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cf 83 ee f4 b4 fb 0f 43 eb c7 c4 87 aa a0 5e 5c | Notify data f1 0e 63 f4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e6 2b 97 c6 d1 4c 13 c0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 05 b9 81 d9 1f fe b2 68 6c 59 f2 c5 07 41 cc 9a | natd_hash: hash= 8a 8b 10 9b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 05 b9 81 d9 1f fe b2 68 6c 59 f2 c5 07 41 cc 9a | Notify data 8a 8b 10 9b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #83 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #83: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #83 to 4294967295 after switching state | Message ID: IKE #83 skipping update_recv as MD is fake | Message ID: sent #83 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-83" #83: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.83:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #83) | e6 2b 97 c6 d1 4c 13 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 e0 14 c2 4a 13 d8 77 12 b1 93 fe 09 ee 1d 88 | 31 85 5e 91 48 ad b1 20 71 3f cb af eb 92 c7 d3 | e3 3b dc e2 9e c2 45 29 c9 59 6d 7a 62 12 34 26 | 8c eb c3 61 ed 07 95 b3 f8 74 eb 61 63 eb 1c b2 | 60 84 c3 e0 69 12 37 aa 40 a9 ee 46 d3 1a 26 fd | 77 29 43 bd fd b4 e3 3b c7 a8 7e e9 e3 51 f4 e6 | b9 4a 57 59 1d 18 ef df e9 5a be 77 08 df e7 55 | 46 7f 6c 4f 13 29 e4 bb ef bd 6c fb 60 8b fc 62 | e9 ba c0 54 d3 2b 44 c6 2f 29 d7 34 b4 6b 61 c0 | c9 cb 1e cb a6 25 28 61 95 9e 2c f5 86 69 f9 7c | b8 7c 34 c0 e0 ed f4 f7 82 f9 b3 c4 8e 1a 55 fb | d8 ed 0f e9 ed ff da 76 3e bb 0b ca e5 d5 7e 00 | 28 52 cc 3e d7 7f e9 d9 c5 bd e9 a7 17 e5 95 51 | 9f 9f 95 b4 65 d9 e7 b3 d2 a5 c2 fe 86 92 6e 23 | 5c 06 60 94 75 50 49 bf 5b 48 f5 bd b4 b4 de 5e | dd 11 02 11 73 fd f3 0f cb 43 d1 ff 6c 2f 1d fa | 29 00 00 24 d9 ea 5f 5d e7 8b 27 ca 82 31 28 fd | 7a 4f 51 83 32 9a 18 8a 6e 2a 8b d4 95 e6 d6 b1 | 0f 0b a2 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf 83 ee f4 b4 fb 0f 43 eb c7 c4 87 | aa a0 5e 5c f1 0e 63 f4 00 00 00 1c 00 00 40 05 | 05 b9 81 d9 1f fe b2 68 6c 59 f2 c5 07 41 cc 9a | 8a 8b 10 9b | state #83 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36800d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #83 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 | #83 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49607.264266 | resume sending helper answer for #83 suppresed complete_v2_state_transition() and stole MD | #83 spent 0.437 milliseconds in resume sending helper answer | stop processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38401cc10 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 2b 97 c6 d1 4c 13 c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #83 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #83 | rejected packet: | e6 2b 97 c6 d1 4c 13 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #83: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c00d120 | handling event EVENT_RETRANSMIT for parent state #29 | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #29 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #29 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49607.300427; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.007291 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8e0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #29 | libevent_malloc: new ptr-libevent@0x7fb38401cc10 size 128 "road-eastnet-nonat-29" #29: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #29) | 76 94 35 7f f9 86 66 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 c8 26 94 c9 ea 16 54 c7 a0 a7 ee 80 e9 d2 eb | c7 74 3d 70 a6 ce 1b 7f 47 b8 a9 22 6c e9 de 3e | 5e 1a da 80 d6 29 b5 60 85 8e c7 9a 07 14 0f 2e | 5e 85 13 8e 17 81 27 ae b9 44 36 2c 21 79 b7 4c | 9f fe 6e 8f 50 03 81 71 96 dc 7d 13 e0 2d e5 55 | 9d 35 cf 6e 26 2f 6c 88 8f fc 20 a1 7f b4 44 e0 | 98 88 95 7e ed 39 2c 67 fe ec 38 89 03 76 30 8b | 31 e8 7f 06 73 93 d0 0a 0d a2 5e e7 17 d8 ae 0f | 27 a8 77 dc e5 16 a6 b2 26 c7 b0 e5 80 71 68 10 | 38 5e 32 59 c0 68 b7 75 a8 13 99 bb ca 95 f9 78 | 1f 9b 7b 46 65 6b 90 b3 9b cd ca 91 c9 75 7e 4d | 2e 06 ee 10 f0 8c c2 89 1e c3 a8 05 28 9a e8 eb | 20 63 32 0f f1 3f 82 9c 83 27 56 48 7d 7c a9 e7 | f5 1b db 86 e5 b7 2b 70 8a da ea 00 2d 06 e8 11 | 3c 90 f7 22 75 39 1f c5 87 f2 55 24 18 21 90 81 | 04 ec 8f 65 74 d4 59 92 bb 69 88 b7 6d 42 21 28 | 29 00 00 24 36 a8 1f b0 73 93 1f c8 b8 98 90 7a | af 61 a7 3e 69 e8 46 34 d6 9e 89 22 1f 07 54 41 | cf b8 14 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 3a eb 7a 38 98 4c b3 ed b5 e4 e8 | 5b 3d 4d 17 15 a4 85 ff 00 00 00 1c 00 00 40 05 | c1 f9 34 11 26 e0 6f d6 1d 57 cb be 7c d0 71 cf | 3a bd fc a1 | libevent_free: release ptr-libevent@0x7fb36c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00d120 | #29 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 94 35 7f f9 86 66 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #29 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #29 | rejected packet: | 76 94 35 7f f9 86 66 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #29: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a272b0 | handling event EVENT_RETRANSMIT for parent state #55 | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #55 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #55 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49607.316727; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001983 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #55 | libevent_malloc: new ptr-libevent@0x7fb36c012840 size 128 "road-eastnet-nonat-55" #55: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #55) | 3d db 2e dd 07 aa ba 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e 71 91 32 93 9e d9 77 ef 53 94 b9 d3 5b 34 5a | fe 84 a7 6b 7a 00 f9 5d 90 9e 95 ec 98 7e 50 90 | 6f 0f ae d2 9f 29 ef dd 60 22 99 95 c1 b0 c0 54 | a7 26 de ae fa 13 60 60 4e 33 18 74 d6 1f 83 02 | 06 b2 59 fa 7c 17 46 c9 2a 0a 3f 67 46 5b 6e d7 | 09 8c 97 98 d9 8f c1 fc 1c ec 49 28 fb cb 2a 4f | 78 96 26 a0 14 e4 f8 b2 87 ff f8 94 08 22 94 74 | 80 62 7b 3c 7f 07 b1 d4 49 9b 9c af da 12 43 95 | 22 ed c4 32 82 8f fd 22 2e 14 7f a3 9e 9a 0a 95 | 1c ac 99 95 6e eb ff 73 9e fa c4 9b c2 7f 18 d1 | a6 f5 7d a7 31 3b 50 d9 03 2b 9b 6a 48 7d 39 5a | 55 2b 5f c8 64 07 45 ea 51 98 d9 85 73 51 e2 22 | 6a fe cb 2c f3 b0 0b 08 b0 e7 70 07 6e 79 7c 1c | 6c d7 90 19 69 d2 44 49 0a 0f 6a 33 f1 60 ee 72 | 89 92 e0 5a 96 45 5d c4 8c 2b 42 de 01 b6 de 4f | b8 41 dc e7 4d 6a e5 69 01 12 96 be b3 ca 0c ef | 29 00 00 24 34 26 bc 6d 2a b2 15 83 73 e7 09 34 | 40 d7 8e 8c 63 fe fd 1b d2 38 8c 24 da 45 67 bf | a5 9b 8a 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 45 13 d7 91 8d b2 95 9c 7e b4 17 | 75 e1 5c f2 7c 3c ca 26 00 00 00 1c 00 00 40 05 | d0 0d a6 5e 1b c4 3a dd c0 34 b3 e5 87 cb 47 3a | 73 94 3b 44 | libevent_free: release ptr-libevent@0x7fb35000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a272b0 | #55 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d db 2e dd 07 aa ba 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #55 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #55 | rejected packet: | 3d db 2e dd 07 aa ba 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #55: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #69 | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #69 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #69 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49607.320058; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001484 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e8820 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #69 | libevent_malloc: new ptr-libevent@0x7fb35000cf80 size 128 "road-eastnet-nonat-69" #69: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #69) | f2 a5 7f fe 4a 34 bb 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 e4 3b 13 88 fe 14 57 37 ea f2 64 67 d0 00 fc | 08 06 ee d2 9e 18 57 6d 24 e0 9d ec 05 43 cc ba | 46 84 14 09 e9 e2 59 69 78 ab 8d 44 b4 c5 40 3a | a2 89 7d 06 7b bd cc e4 70 62 31 9f 43 8b b5 bc | 3c 9f 69 fb 1f f5 22 54 18 e5 72 15 5a 48 ee 5c | c3 f3 42 0b 25 4e 7f 00 ca 3e e9 db 4e ab 7a 2a | 5e 8e 14 a5 6c b8 fa ac c8 1b f3 01 fc 2e 88 fc | de 9d 1f b4 30 64 da 79 40 14 b9 cb 57 7b 44 a9 | 8b 4d e2 fe 10 ef 78 5b 95 32 a7 75 3e 68 a2 02 | 50 a9 63 99 4c de c2 a2 55 8e e7 c1 4c 9d ba d5 | 23 4b 1b 11 eb 5b d1 0e 0a 69 30 ae 96 7b a4 e6 | d5 07 c0 08 e9 6f 21 3e f5 fc eb 69 b8 6d f7 0c | e4 6a a2 62 87 f1 46 98 bb 82 fd ef c3 b7 37 d9 | 4f 4d 06 a6 46 29 3d cf 6d 59 1a 7a 7d 4c 43 d4 | 05 3e e7 70 e1 23 3b 86 eb 4e 8f 26 e0 cf 97 cf | 6f 21 b0 32 5e 71 a6 25 0b f1 15 b5 06 82 51 60 | 29 00 00 24 ca 10 ed 53 1e ff c5 43 38 73 0a 51 | c6 98 7c 29 17 9d 86 f8 04 d8 2e 0c fa 41 a7 af | 38 8b 0b 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 9a cb 7f 17 aa e7 97 ca 43 a3 43 | c3 e4 41 43 e3 4b 2a 3e 00 00 00 1c 00 00 40 05 | 50 72 12 31 6b fb 9c 33 88 e7 6f 1a 9e 5d 70 fe | 3b 28 e9 92 | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #69 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 a5 7f fe 4a 34 bb 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #69 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #69 | rejected packet: | f2 a5 7f fe 4a 34 bb 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #69: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0737 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-84" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-84' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #84 at 0x557d46a473d0 | State DB: adding IKEv2 state #84 in UNDEFINED | pstats #84 ikev2.ike started | Message ID: init #84: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #84: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #84; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-84" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-84" IKE SA #84 "road-eastnet-nonat-84" "road-eastnet-nonat-84" #84: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-84 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-84": constructed local IKE proposals for road-eastnet-nonat-84 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 84 for state #84 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a198d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #84 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 | #84 spent 0.143 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 resuming | RESET processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 starting work-order 84 for state #84 | RESET processing: connection "road-eastnet-nonat-84" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 84 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.237 milliseconds in whack | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 84 time elapsed 0.000751 seconds | (#84) spent 0.737 milliseconds in crypto helper computing work-order 84: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 84 for state #84 to event queue | scheduling resume sending helper answer for #84 | libevent_malloc: new ptr-libevent@0x7fb37801d920 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #84 | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 84 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #84 | **emit ISAKMP Message: | initiator cookie: | 1f 2f b6 8b 51 48 06 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-84 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 62 1f 67 e9 76 20 6a 2b f7 ad 13 77 97 e1 68 87 | ikev2 g^x e9 75 71 19 c9 83 f3 73 fb 25 68 00 8c ff f8 c9 | ikev2 g^x 1d 39 8c aa 48 91 67 ae d7 68 2a 58 40 8a 8f c7 | ikev2 g^x 80 6c 8a 0d 2c 34 0e dd 31 f9 0d 20 54 ae b8 ad | ikev2 g^x f3 e5 66 87 27 c1 b9 3b f7 7e 5f 91 9e 13 72 c4 | ikev2 g^x fb 1c ec 84 d9 28 50 4e 83 04 2b 64 28 38 b2 c3 | ikev2 g^x 26 3d 3f fe b0 3a 31 93 a2 da 74 58 0f e3 c4 e7 | ikev2 g^x 1b d4 4a 7b 98 e4 bf 2d 17 77 1c c7 60 c6 cd f4 | ikev2 g^x a4 b3 3e 33 44 58 50 ab 79 af 8a 67 8e c3 a4 76 | ikev2 g^x 74 f4 47 b0 6e 53 b7 1d 0a 98 f8 36 13 56 c4 89 | ikev2 g^x c8 ca cc fb f1 a4 98 cd 59 ff 4a e3 78 5d 3c 67 | ikev2 g^x 86 c4 70 68 e1 a0 3e 7b 7f c1 2f 3d a4 0d c2 c5 | ikev2 g^x bd ed 93 ba 2d ff bd 57 2f b9 ac d7 dc 77 9f ae | ikev2 g^x 61 e7 8a 25 fb 95 fa b6 ae 27 5d f2 7d 25 5c 37 | ikev2 g^x cd dc a1 e7 01 66 ba 0c 28 2e 4b 30 85 a4 73 58 | ikev2 g^x f5 b4 a3 77 ea dd 82 87 c2 5d 3f 72 7d 74 36 cc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 76 ac e1 c3 58 b8 41 7b 54 b2 2a 6d c8 c8 51 a4 | IKEv2 nonce ca 16 83 ce 76 9e a1 e9 43 b8 d3 34 c3 53 e0 e7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1f 2f b6 8b 51 48 06 70 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 54 | natd_hash: port= 01 f4 | natd_hash: hash= 1f 3a 1a f8 04 5d 3c b5 2b e1 4e ab 33 49 9d 7d | natd_hash: hash= 4f 74 a2 8f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1f 3a 1a f8 04 5d 3c b5 2b e1 4e ab 33 49 9d 7d | Notify data 4f 74 a2 8f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1f 2f b6 8b 51 48 06 70 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1b c4 6f 3a e9 14 b6 7b 2a e7 ad b0 65 58 df 39 | natd_hash: hash= fd 38 92 37 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b c4 6f 3a e9 14 b6 7b 2a e7 ad b0 65 58 df 39 | Notify data fd 38 92 37 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #84 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #84: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #84 to 4294967295 after switching state | Message ID: IKE #84 skipping update_recv as MD is fake | Message ID: sent #84 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-84" #84: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.84:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #84) | 1f 2f b6 8b 51 48 06 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 1f 67 e9 76 20 6a 2b f7 ad 13 77 97 e1 68 87 | e9 75 71 19 c9 83 f3 73 fb 25 68 00 8c ff f8 c9 | 1d 39 8c aa 48 91 67 ae d7 68 2a 58 40 8a 8f c7 | 80 6c 8a 0d 2c 34 0e dd 31 f9 0d 20 54 ae b8 ad | f3 e5 66 87 27 c1 b9 3b f7 7e 5f 91 9e 13 72 c4 | fb 1c ec 84 d9 28 50 4e 83 04 2b 64 28 38 b2 c3 | 26 3d 3f fe b0 3a 31 93 a2 da 74 58 0f e3 c4 e7 | 1b d4 4a 7b 98 e4 bf 2d 17 77 1c c7 60 c6 cd f4 | a4 b3 3e 33 44 58 50 ab 79 af 8a 67 8e c3 a4 76 | 74 f4 47 b0 6e 53 b7 1d 0a 98 f8 36 13 56 c4 89 | c8 ca cc fb f1 a4 98 cd 59 ff 4a e3 78 5d 3c 67 | 86 c4 70 68 e1 a0 3e 7b 7f c1 2f 3d a4 0d c2 c5 | bd ed 93 ba 2d ff bd 57 2f b9 ac d7 dc 77 9f ae | 61 e7 8a 25 fb 95 fa b6 ae 27 5d f2 7d 25 5c 37 | cd dc a1 e7 01 66 ba 0c 28 2e 4b 30 85 a4 73 58 | f5 b4 a3 77 ea dd 82 87 c2 5d 3f 72 7d 74 36 cc | 29 00 00 24 76 ac e1 c3 58 b8 41 7b 54 b2 2a 6d | c8 c8 51 a4 ca 16 83 ce 76 9e a1 e9 43 b8 d3 34 | c3 53 e0 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f 3a 1a f8 04 5d 3c b5 2b e1 4e ab | 33 49 9d 7d 4f 74 a2 8f 00 00 00 1c 00 00 40 05 | 1b c4 6f 3a e9 14 b6 7b 2a e7 ad b0 65 58 df 39 | fd 38 92 37 | state #84 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a198d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #84 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 | #84 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49607.324957 | resume sending helper answer for #84 suppresed complete_v2_state_transition() and stole MD | #84 spent 0.474 milliseconds in resume sending helper answer | stop processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37801d920 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 2f b6 8b 51 48 06 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #84 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #84 | rejected packet: | 1f 2f b6 8b 51 48 06 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #84: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #76 | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #76 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #76 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49607.32816; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501136 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a272b0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #76 | libevent_malloc: new ptr-libevent@0x7fb37801d920 size 128 "road-eastnet-nonat-76" #76: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #76) | 08 23 b8 f6 73 09 18 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 b3 88 98 c3 00 3b ee 78 d3 a9 62 79 c8 5e 50 | ca be d3 60 b9 ac ef b3 70 f2 72 51 6e d0 6f e7 | 76 2f 02 45 ea 0c 3e b7 a1 fa 9a de 13 7f 48 f6 | 9a 0d 43 96 53 05 8a 3f 59 81 18 a2 54 08 83 e6 | b2 23 5b f0 fb 8a 5c 92 dc 0e cf 01 e1 94 34 22 | c2 e0 dc ae e5 0d ab a5 e1 89 bb 62 bf 90 17 bf | 34 96 56 44 a4 0c 23 a8 83 ef d0 4c 0b 33 57 7c | 55 bb 56 dc a3 43 8f 68 ba 01 38 40 7f c5 c5 3f | 05 89 dc 6e 0f 54 d6 e4 1f 39 ed af 78 c0 40 5e | de 96 c5 64 7e 4a 03 ee be b0 cb 81 ef de ed 18 | d9 e4 a5 05 6d 9a 00 f2 6a ea 28 7f 9c 2d 97 a0 | 10 8c cf d6 69 56 ba cb c7 fa 65 c6 5b b9 83 ba | f4 70 1e a9 02 08 4b 23 06 c6 59 e2 2c c1 32 a4 | 3b f4 b6 34 0c f2 27 38 ff 60 3f ff db da aa 0d | 54 69 d6 85 b5 50 9d 06 87 5b 28 9b f1 40 e5 16 | 60 3a e9 e8 52 ec 8a 8f b6 c8 a1 d2 cd ff f5 a1 | 29 00 00 24 15 3e 8d 58 5c 16 4e 6b 9c 08 25 92 | 8d ef 80 f2 25 ea cd 1e ba c6 95 f9 1b a7 f2 dd | 45 1d 12 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 8b 52 aa 3c 87 b6 df df 8c 81 fe | ec 85 60 df 06 8e 81 b3 00 00 00 1c 00 00 40 05 | 54 01 aa b8 56 eb 7a 7b 30 98 73 ed 67 e2 36 06 | bd 7f 30 ed | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #76 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 23 b8 f6 73 09 18 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #76 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #76 | rejected packet: | 08 23 b8 f6 73 09 18 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #76: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0587 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ec960 | handling event EVENT_RETRANSMIT for parent state #70 | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #70 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #70 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49607.379456; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001032 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #70 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 "road-eastnet-nonat-70" #70: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #70) | 80 24 74 22 d5 0f 52 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 68 71 3c 0e 60 a8 bb a5 bd cc ef ef 0c eb f4 | 82 28 4b 5e 34 f6 13 aa c3 d7 89 31 ad 91 46 ac | 15 dc aa e6 7a e7 0b 3f 82 69 6e e1 56 f0 c8 52 | de 05 0d fd 08 00 ee cd cc b6 87 fe a0 b0 ff e6 | 05 55 e6 b7 5e 20 53 79 90 12 ce ff 82 cf ad 41 | 3f a9 51 ad f1 8c d6 57 77 1c ef 27 f0 57 e1 8c | 97 cb b6 ce ff c0 f1 f4 a5 49 d9 74 1f 1d 74 75 | 54 be f3 af 4b 6b 43 9d 43 d4 e5 05 71 04 36 2c | c7 7c 5d f8 30 fc 44 25 48 9e 9e 82 91 e8 e4 34 | 70 26 3e 95 67 c5 a4 cb 36 d4 25 b1 2b 4a 77 2f | ae 15 52 3f 18 49 f9 47 bb a7 d2 0a ef 99 db 3d | 39 af f3 91 da 08 e3 b3 1f e4 ed 82 f5 26 e3 03 | 98 c1 58 ff ba 18 2d c8 81 ea 83 51 70 26 1e 19 | 23 60 13 98 08 43 34 78 7d 3c 93 d1 af b4 fb fe | d5 41 09 8b c9 2b 05 f4 1c a3 62 cd 21 e3 82 7b | 55 52 fe 90 11 4a 62 6c 99 8c d7 30 a6 21 f0 d1 | 29 00 00 24 e3 da 6d 7f a1 8b eb f9 61 52 ce 97 | 54 be ad 07 4c e8 1e 18 ff 49 38 58 56 77 f6 8a | c3 33 cb 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 9f 21 cd 26 5d 21 04 f0 de c9 2f | 2e 65 dc 8c 6b f1 6c dd 00 00 00 1c 00 00 40 05 | 7b 41 25 4c 4c ca db 2b 78 bf 1e 87 08 ff 47 0c | c4 b0 37 95 | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ec960 | #70 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 24 74 22 d5 0f 52 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #70 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #70 | rejected packet: | 80 24 74 22 d5 0f 52 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #70: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0582 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-85" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-85' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #85 at 0x557d46a48990 | State DB: adding IKEv2 state #85 in UNDEFINED | pstats #85 ikev2.ike started | Message ID: init #85: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #85: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #85; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-85" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-85" IKE SA #85 "road-eastnet-nonat-85" "road-eastnet-nonat-85" #85: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-85 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-85": constructed local IKE proposals for road-eastnet-nonat-85 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 85 for state #85 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469ec960 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #85 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 | #85 spent 0.12 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-85" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 resuming | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 10 starting work-order 85 for state #85 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 85 | spent 0.202 milliseconds in whack | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 85 time elapsed 0.000995 seconds | (#85) spent 0.999 milliseconds in crypto helper computing work-order 85: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 85 for state #85 to event queue | scheduling resume sending helper answer for #85 | libevent_malloc: new ptr-libevent@0x7fb37c01d920 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #85 | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 85 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #85 | **emit ISAKMP Message: | initiator cookie: | b7 4f d7 db a6 e2 bd 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-85 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a6 c8 89 a4 0b 04 f2 b9 62 f8 58 f1 1c 0c 91 1a | ikev2 g^x aa 25 df 1a e7 a5 32 9d 0b b5 9b 93 ab d7 64 b6 | ikev2 g^x 7e 0d ee f0 b5 83 e8 90 d8 94 b7 d1 ea 05 1c 4f | ikev2 g^x 85 63 ef bf 80 da 59 c5 18 c9 fd 82 f7 cd 12 c7 | ikev2 g^x ec b4 9e 35 b0 0c 13 ac 89 c3 d8 6c 14 b9 3b f7 | ikev2 g^x 41 eb 65 45 c9 66 0a f2 c7 e9 1b 09 a2 d5 ad 2e | ikev2 g^x 24 aa 0a a8 48 81 8f bc 8d df 3f 90 a2 d2 26 b2 | ikev2 g^x 84 b7 2d b6 67 ac 5a fa 85 04 e2 96 e3 0b 1d f3 | ikev2 g^x b9 b5 0f f0 5b d4 c6 d3 b2 9b d4 ad e6 94 18 68 | ikev2 g^x bf f6 64 ed 26 d4 b7 68 7f a4 94 0e af 4c 0c b4 | ikev2 g^x 64 91 32 f4 da 5b 38 c2 84 b3 fe 0e e5 1b 3f a5 | ikev2 g^x 6b 83 a5 f2 b9 7d 21 72 89 70 28 f2 d4 86 bb fd | ikev2 g^x 03 43 fe f4 4e 6c 9c 49 29 03 b2 15 2f 72 ba 73 | ikev2 g^x 18 d4 39 82 08 55 da c3 e4 86 cb d0 04 31 94 6a | ikev2 g^x f5 7b 4a de 4d 49 5a 6d 51 3e 71 b4 0d e8 2e 33 | ikev2 g^x 9f 26 4a 91 c4 9b 06 1a 88 4b 6e 77 93 8a 7d ed | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce af e3 01 7b 71 cd 34 07 4b 0a a0 9b 85 75 4e ed | IKEv2 nonce b9 b3 c5 7d 83 a1 ee 6b 3c aa 39 e2 0b 8b fa b4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b7 4f d7 db a6 e2 bd 6b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 55 | natd_hash: port= 01 f4 | natd_hash: hash= 7e 41 7b 44 0a d6 6d 6a b0 b1 8e ad b0 c3 33 77 | natd_hash: hash= 45 ba 39 18 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7e 41 7b 44 0a d6 6d 6a b0 b1 8e ad b0 c3 33 77 | Notify data 45 ba 39 18 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b7 4f d7 db a6 e2 bd 6b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 63 0f 1e f2 8f 76 1d 60 09 1e 0d 94 28 78 d8 b0 | natd_hash: hash= 16 5a de 8a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 63 0f 1e f2 8f 76 1d 60 09 1e 0d 94 28 78 d8 b0 | Notify data 16 5a de 8a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #85 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #85: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #85 to 4294967295 after switching state | Message ID: IKE #85 skipping update_recv as MD is fake | Message ID: sent #85 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-85" #85: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.85:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #85) | b7 4f d7 db a6 e2 bd 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 c8 89 a4 0b 04 f2 b9 62 f8 58 f1 1c 0c 91 1a | aa 25 df 1a e7 a5 32 9d 0b b5 9b 93 ab d7 64 b6 | 7e 0d ee f0 b5 83 e8 90 d8 94 b7 d1 ea 05 1c 4f | 85 63 ef bf 80 da 59 c5 18 c9 fd 82 f7 cd 12 c7 | ec b4 9e 35 b0 0c 13 ac 89 c3 d8 6c 14 b9 3b f7 | 41 eb 65 45 c9 66 0a f2 c7 e9 1b 09 a2 d5 ad 2e | 24 aa 0a a8 48 81 8f bc 8d df 3f 90 a2 d2 26 b2 | 84 b7 2d b6 67 ac 5a fa 85 04 e2 96 e3 0b 1d f3 | b9 b5 0f f0 5b d4 c6 d3 b2 9b d4 ad e6 94 18 68 | bf f6 64 ed 26 d4 b7 68 7f a4 94 0e af 4c 0c b4 | 64 91 32 f4 da 5b 38 c2 84 b3 fe 0e e5 1b 3f a5 | 6b 83 a5 f2 b9 7d 21 72 89 70 28 f2 d4 86 bb fd | 03 43 fe f4 4e 6c 9c 49 29 03 b2 15 2f 72 ba 73 | 18 d4 39 82 08 55 da c3 e4 86 cb d0 04 31 94 6a | f5 7b 4a de 4d 49 5a 6d 51 3e 71 b4 0d e8 2e 33 | 9f 26 4a 91 c4 9b 06 1a 88 4b 6e 77 93 8a 7d ed | 29 00 00 24 af e3 01 7b 71 cd 34 07 4b 0a a0 9b | 85 75 4e ed b9 b3 c5 7d 83 a1 ee 6b 3c aa 39 e2 | 0b 8b fa b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 41 7b 44 0a d6 6d 6a b0 b1 8e ad | b0 c3 33 77 45 ba 39 18 00 00 00 1c 00 00 40 05 | 63 0f 1e f2 8f 76 1d 60 09 1e 0d 94 28 78 d8 b0 | 16 5a de 8a | state #85 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469ec960 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45310 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #85 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 | #85 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49607.385454 | resume sending helper answer for #85 suppresed complete_v2_state_transition() and stole MD | #85 spent 0.37 milliseconds in resume sending helper answer | stop processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c01d920 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 4f d7 db a6 e2 bd 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #85 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #85 | rejected packet: | b7 4f d7 db a6 e2 bd 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #85: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000d120 | handling event EVENT_RETRANSMIT for parent state #30 | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #30 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #30 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49607.385581; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.009212 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45350 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #30 | libevent_malloc: new ptr-libevent@0x7fb37c01d920 size 128 "road-eastnet-nonat-30" #30: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #30) | eb 37 b2 e3 45 e6 a7 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 14 f4 3b 23 14 59 57 11 85 13 a2 12 2b b5 a3 ff | 27 d1 a6 d6 83 ba ed 6e 70 90 a1 d6 22 c0 f4 dc | 88 16 36 cb d1 72 72 bc de f4 41 0b 1b 89 09 42 | b9 3c f8 7c e9 f8 b9 9e 79 49 a8 2b 7f 1d 06 99 | c2 4a dd e8 2d e9 b4 cd ab 59 b3 cd 90 a2 ae 3c | dc 2b a8 89 42 be 2f 72 3b d2 e2 27 b4 65 50 d4 | 35 50 bc 83 c6 85 ec 49 08 26 e7 a9 0e b6 5e a5 | 85 8b 68 21 3e 90 ff 7d 8a b3 a3 ab 4e 47 64 32 | 27 11 da 90 e5 4b bc e9 16 11 6a bf 15 7e 85 08 | 28 9b e3 ef 08 8b 63 b8 f5 43 71 2f 4c 67 78 41 | b8 23 b8 9c 92 66 99 57 0d 3e 91 c2 06 23 98 e8 | 6d 98 00 38 76 9f e2 83 8a e1 b7 3f 0f fe 0a 46 | d4 29 95 ea ed 7c f2 88 a6 07 6b 92 26 ac 08 4f | 2f b2 56 84 37 68 ea c9 79 62 e3 b0 e5 14 a4 c8 | 94 04 78 6c 13 14 ae b3 aa ac 60 8d 12 46 30 65 | 4d f6 8a 38 3e 83 8d 9b ed 94 87 9f 15 c1 ab 90 | 29 00 00 24 3c c6 27 c6 e1 5b ef ef 28 05 b6 9a | 73 ea 46 41 c6 a4 e3 b1 86 51 d2 31 50 73 0b 09 | 13 5f 9d 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 2d bd fb cd 00 1b 4b be 47 ff 4c | 9b 30 9e df 04 ed 35 e5 00 00 00 1c 00 00 40 05 | f4 eb 1d 0f f6 3b e7 d6 54 0e 88 15 bd 63 45 57 | 71 e8 c0 52 | libevent_free: release ptr-libevent@0x7fb360012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000d120 | #30 spent 0.0898 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 37 b2 e3 45 e6 a7 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #30 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #30 | rejected packet: | eb 37 b2 e3 45 e6 a7 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #30: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0411 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_RETRANSMIT for parent state #77 | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #77 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #77 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49607.388806; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500357 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #77 | libevent_malloc: new ptr-libevent@0x7fb360012840 size 128 "road-eastnet-nonat-77" #77: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #77) | 4f f7 57 30 7e 30 db a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 14 f0 66 5e 0a 53 d9 86 47 70 5a 8a 73 bc cb | 52 bc 3f 13 31 b6 9a 6b ff ca f8 2e b7 f0 48 d4 | 77 e7 4c 8e 73 e9 11 6d 0b d9 88 30 75 88 11 48 | 3e 3b 98 fa 3c 66 3a 0b 64 a6 08 cb b7 12 5b 20 | d5 1b 40 67 18 3f 33 02 0f 4c 76 b1 96 fb 38 53 | 46 2f 32 4f 32 aa f2 f1 c1 7e 1b a3 93 84 38 d3 | 1e e6 5e 44 4e 6a 52 d2 5d 7c 9d 39 17 98 69 cc | ec 36 94 6b e8 33 1d ce 1b 8f 5c 7f dd d4 89 82 | 85 a6 1d ff 6c 9b 05 f9 47 a5 19 cd c4 fd 29 1a | 81 51 1f 14 ac 62 dd 33 b1 29 91 3b e8 1b 12 6e | ed 37 99 ae 6f 7a c8 95 71 30 61 a1 ef a5 33 55 | ef 40 50 d8 41 20 80 d2 32 15 fe 53 0a 4d 72 3e | a0 4f 5d 9d 14 7f 1b d9 8a 58 bc 3b 06 b1 c0 d6 | 7a 44 d2 2e f1 5d e3 62 b2 7b f9 e3 44 aa 80 9c | 12 99 76 f5 03 a4 33 27 55 fb 36 b5 80 18 d9 30 | de 03 51 b8 74 0a cb fb 17 be 0d a8 1c 8a af f0 | 29 00 00 24 70 06 ac 37 52 b8 ec 28 7d 6d 81 11 | 1b 1b 6d ce ed 39 8f ce a3 eb 17 d2 32 09 4a 8f | f1 a8 0e 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 42 86 64 cb f7 df d8 ee 6f 6b 28 | 69 76 6e 6d 07 28 e7 b4 00 00 00 1c 00 00 40 05 | cd 8e d4 a4 9f b1 74 d8 7d 8d 61 97 d8 57 39 f7 | 36 5a 1d 66 | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | #77 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f f7 57 30 7e 30 db a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #77 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #77 | rejected packet: | 4f f7 57 30 7e 30 db a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #77: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0587 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #56 | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #56 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #56 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49607.409103; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002642 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #56 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 "road-eastnet-nonat-56" #56: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #56) | a2 38 96 b9 83 17 2c 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c 86 44 cb cd d5 e6 ca 09 de cc 09 a4 86 65 dc | 8e 5e 46 71 c3 c7 a8 ed be 75 06 f3 62 76 ba da | ce e9 f2 5f 5c 9e e4 0c 00 41 ba fd 53 1c 48 95 | 4a ae 4f cc 78 85 9f f0 fa 4c 13 7a c5 dc 96 cf | 8c 8f e9 26 db 93 6d c0 e4 2b 06 79 49 8a 1c 86 | 23 8a 00 51 5e 48 57 fe 2b c6 2d 2e cc 90 37 77 | 16 54 2d 1c 52 6e 88 f9 06 69 91 14 40 a3 3e 1f | 64 d7 73 f6 42 da 0d 73 5f 6b eb 89 ee 97 cd 6c | fd 1d 89 b8 17 39 77 3f b0 8b a8 13 2f f9 45 f4 | e3 ec 7f a4 35 be 17 3d c6 80 db be df d2 e9 bc | 39 46 6a e1 d0 06 ce 65 d8 13 18 bc e7 ef 70 ba | 17 09 9b 7f c9 d6 90 ff cb 53 6a 15 26 bc 84 d0 | 3c 63 f9 85 08 c0 bf 6b 92 00 26 8e 7e 39 47 fa | 15 93 5e ae af a3 95 34 bf f7 9a 05 60 79 f9 78 | fe 1c 09 6f 2a d7 a8 e6 dd 20 f6 bd f3 b0 a8 de | 56 b0 c1 b0 a8 8e c2 c9 51 e8 12 8c 23 35 5a 34 | 29 00 00 24 d3 9d 92 33 15 50 42 07 cb e2 93 fb | fa f0 4d 62 ce 86 f8 78 f6 e4 5a c4 46 ff 05 fd | 2d fe b5 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 f6 95 c7 6a 67 27 fa d2 0e 4e 26 | b1 fb ce d1 96 08 1b d4 00 00 00 1c 00 00 40 05 | 86 3b a6 fc 26 15 66 79 c8 2d 3b 9c 75 89 43 54 | 51 cf ae 75 | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #56 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 38 96 b9 83 17 2c 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #56 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #56 | rejected packet: | a2 38 96 b9 83 17 2c 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #56: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #71 | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #71 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #71 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49607.439444; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000938 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #71 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 "road-eastnet-nonat-71" #71: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #71) | 95 1a 0e bc b8 89 e9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 b7 52 d3 88 4c 72 94 29 6d 07 48 59 53 9a 94 | c0 d8 40 dd 8b 33 cc b5 e7 5f 10 c4 f9 b5 b0 62 | 0e 7e dc 7c c0 5d c2 c0 b8 2a 1e ee d8 c7 67 c5 | 6e 7a 2e c8 c8 78 d1 01 66 2d d2 7e a8 80 78 39 | ed 64 bc 65 47 6b 53 20 db f8 49 7d 75 df ac 21 | 43 37 22 43 cf 85 a4 b5 c6 f2 cc 18 4e ff c1 67 | d6 fb 3b b4 2a 72 36 3e af 12 4f 93 13 35 59 a3 | 8d fd 4c ac bd 7c e1 d6 8a 63 b4 aa 9a 01 66 5d | 44 4d c8 c6 a5 27 c2 50 76 c4 0f 7a ea 30 2c 2e | c8 fd c2 09 eb 13 95 a3 62 05 52 05 99 27 2d 5d | 04 8a cb d5 bd f0 da af b1 fd a8 57 4b 25 12 cd | 81 31 3f 97 9d 49 d1 70 50 67 35 65 ba 2d c4 ae | a9 91 18 06 72 21 47 2c 8e e0 a3 db 1b a2 3f 13 | 0f a8 f6 3e 94 d7 36 d8 17 22 ad cd f5 cd f3 43 | 86 8f ec 5e a8 71 d9 dd 87 6e d8 e4 58 cb 3c 76 | ee 77 2a 83 0c e5 de 50 b0 fc 77 61 13 ac a0 07 | 29 00 00 24 12 6c 20 e2 d1 b6 94 1d 42 66 63 a9 | 4b 6f 5d 9a 24 6f cd 6b 53 ff a3 87 80 0a b8 8b | a0 96 5f 5a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d bc a1 51 aa 8f 7f ab dc e5 06 f0 | 38 bb 8c 63 92 8e b2 f3 00 00 00 1c 00 00 40 05 | c9 d4 4d 25 1c 7e db b6 b8 a8 68 63 26 d6 45 14 | b5 8e ec 75 | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | #71 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 1a 0e bc b8 89 e9 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #71 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #71 | rejected packet: | 95 1a 0e bc b8 89 e9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #71: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a027b0 | handling event EVENT_RETRANSMIT for parent state #78 | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #78 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #78 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49607.449795; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500891 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #78 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 "road-eastnet-nonat-78" #78: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #78) | a4 c9 07 ac 54 d6 e0 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 5b 1c ec 96 24 e8 86 d8 c5 db 68 a4 e8 84 cc | f4 a2 ed 99 bf 5e 8a c5 ce b3 9d 08 41 58 29 f0 | dd 3a 5a 77 6f 59 d0 63 db 3e 63 03 3b 94 a8 82 | ea c5 b5 55 dc 2c ec 77 5f 63 ff ce 1a d3 98 5f | ea ba 50 e4 20 9b 1b 0b de 70 1d 72 5e 41 20 22 | dd 96 8b a8 2c 90 f1 b3 79 70 7b 0b d2 f5 29 64 | 24 96 41 c0 b2 23 eb 70 92 6c 66 1d 59 a6 82 09 | 57 e0 df 9e 1d 1d 55 b5 06 9b 7f 66 07 cc cc ff | f3 52 44 fb 3d f1 4f 79 5c 0c 51 85 cc cb 4f 32 | 4d 99 ed e1 7c 32 81 a7 49 c4 5e 9c f7 c7 98 e6 | 2c 03 b7 c8 ab bf 01 d1 70 a5 d7 0f 97 f6 d8 06 | e8 43 56 25 d8 da 9c 66 8b 84 9d ed 34 99 f3 6a | ab 13 48 0a 68 c6 9c 38 c0 da 1e ec 9d bd 23 04 | 56 2e b0 d9 0e 5f 21 85 8d b7 b7 e4 3f 8c e4 76 | 68 1b d3 cc a6 1f 24 7c 46 61 29 b6 47 f3 ad 62 | ed ad e7 10 a5 af 19 f0 76 6b ea 90 57 9b 3b 13 | 29 00 00 24 e3 1c 8b 3a ff 4e 05 3e c1 af db 58 | 7b 8f 74 6d 20 c2 73 1e 04 d3 ec 5f 05 cc 9d e9 | 4b 1e 83 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f c3 34 65 1f ff 78 b6 0e ee cd 35 | 94 8b f4 3a 81 46 94 12 00 00 00 1c 00 00 40 05 | f3 90 ab 75 b4 45 e0 98 82 06 c5 91 b7 b5 12 83 | 38 ae 55 ca | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a027b0 | #78 spent 0.176 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 c9 07 ac 54 d6 e0 33 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #78 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #78 | rejected packet: | a4 c9 07 ac 54 d6 e0 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #78: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.075 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-86" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-86' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #86 at 0x557d46a49f50 | State DB: adding IKEv2 state #86 in UNDEFINED | pstats #86 ikev2.ike started | Message ID: init #86: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #86: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #86; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-86" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-86" IKE SA #86 "road-eastnet-nonat-86" "road-eastnet-nonat-86" #86: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-86 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-86": constructed local IKE proposals for road-eastnet-nonat-86 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 86 for state #86 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a027b0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #86 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 | #86 spent 0.164 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 14 resuming | RESET processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-86" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.266 milliseconds in whack | crypto helper 14 starting work-order 86 for state #86 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 86 | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 86 time elapsed 0.000981 seconds | (#86) spent 0.988 milliseconds in crypto helper computing work-order 86: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 86 for state #86 to event queue | scheduling resume sending helper answer for #86 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #86 | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 86 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #86 | **emit ISAKMP Message: | initiator cookie: | bc cc 1d a8 6f 14 2f d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-86 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b9 02 f4 30 81 01 a2 84 c7 c8 75 14 73 a0 b4 f1 | ikev2 g^x ce 00 5c 2a 70 74 58 bb 3e a0 6e e2 4f 0a 9f 83 | ikev2 g^x 08 76 97 6b fa 62 74 7d db ae df 90 de 69 8c b2 | ikev2 g^x 0e 6c a5 3a 87 61 1a 3a 8f 5d a0 5a ba ab 91 5a | ikev2 g^x 1c 85 49 b3 c5 25 e7 4c 6e 03 2b ac 66 42 56 f1 | ikev2 g^x d7 31 b5 bb 5b 45 b9 dd 90 6d ee 07 cc 7c f5 62 | ikev2 g^x 74 01 c5 67 95 ba 42 bf 74 f6 d2 a1 03 af 1b fd | ikev2 g^x e4 7f bc c7 c5 75 0a a8 6e 5c 9e 6c 4f 5b c1 73 | ikev2 g^x df 6f 2d 86 ef d9 7b 7f 50 00 74 9f 02 e6 99 af | ikev2 g^x 69 db f9 f3 80 3c 99 58 33 58 03 46 c0 6e d1 8c | ikev2 g^x d1 aa bb ba e8 f4 a9 85 5b aa 0d 22 6e e9 62 24 | ikev2 g^x 0d 2c d4 54 19 e8 97 d8 e7 d3 1e 75 fe 1d 11 bb | ikev2 g^x 8a ef b3 15 49 d2 bd 11 ce 93 3c 78 52 c8 0e 77 | ikev2 g^x 1d b3 5a f2 76 6d 63 9a e0 92 62 06 a0 bc 29 93 | ikev2 g^x a6 78 17 fe 37 4a 17 27 33 46 cd 3f 1c 77 4a d6 | ikev2 g^x df 68 38 cd 2b 58 7b 28 94 f9 86 34 46 7d e4 ec | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3f 6f 33 90 58 31 9c 9e c4 12 e4 33 9b 9e 11 d9 | IKEv2 nonce fa de 80 3a 9a 7c 3d 2b 3e 4c e8 aa 92 49 b7 60 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= bc cc 1d a8 6f 14 2f d3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 56 | natd_hash: port= 01 f4 | natd_hash: hash= 6c 27 7b 26 e6 59 48 3b 7c 9f 7a cf bb 52 6d 94 | natd_hash: hash= e2 1f 43 00 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6c 27 7b 26 e6 59 48 3b 7c 9f 7a cf bb 52 6d 94 | Notify data e2 1f 43 00 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= bc cc 1d a8 6f 14 2f d3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 49 8d b2 ff d2 6f bf 71 ec 03 78 4c 49 00 83 b0 | natd_hash: hash= 23 90 3a 8b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 49 8d b2 ff d2 6f bf 71 ec 03 78 4c 49 00 83 b0 | Notify data 23 90 3a 8b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #86 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #86: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #86 to 4294967295 after switching state | Message ID: IKE #86 skipping update_recv as MD is fake | Message ID: sent #86 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-86" #86: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.86:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #86) | bc cc 1d a8 6f 14 2f d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 02 f4 30 81 01 a2 84 c7 c8 75 14 73 a0 b4 f1 | ce 00 5c 2a 70 74 58 bb 3e a0 6e e2 4f 0a 9f 83 | 08 76 97 6b fa 62 74 7d db ae df 90 de 69 8c b2 | 0e 6c a5 3a 87 61 1a 3a 8f 5d a0 5a ba ab 91 5a | 1c 85 49 b3 c5 25 e7 4c 6e 03 2b ac 66 42 56 f1 | d7 31 b5 bb 5b 45 b9 dd 90 6d ee 07 cc 7c f5 62 | 74 01 c5 67 95 ba 42 bf 74 f6 d2 a1 03 af 1b fd | e4 7f bc c7 c5 75 0a a8 6e 5c 9e 6c 4f 5b c1 73 | df 6f 2d 86 ef d9 7b 7f 50 00 74 9f 02 e6 99 af | 69 db f9 f3 80 3c 99 58 33 58 03 46 c0 6e d1 8c | d1 aa bb ba e8 f4 a9 85 5b aa 0d 22 6e e9 62 24 | 0d 2c d4 54 19 e8 97 d8 e7 d3 1e 75 fe 1d 11 bb | 8a ef b3 15 49 d2 bd 11 ce 93 3c 78 52 c8 0e 77 | 1d b3 5a f2 76 6d 63 9a e0 92 62 06 a0 bc 29 93 | a6 78 17 fe 37 4a 17 27 33 46 cd 3f 1c 77 4a d6 | df 68 38 cd 2b 58 7b 28 94 f9 86 34 46 7d e4 ec | 29 00 00 24 3f 6f 33 90 58 31 9c 9e c4 12 e4 33 | 9b 9e 11 d9 fa de 80 3a 9a 7c 3d 2b 3e 4c e8 aa | 92 49 b7 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 27 7b 26 e6 59 48 3b 7c 9f 7a cf | bb 52 6d 94 e2 1f 43 00 00 00 00 1c 00 00 40 05 | 49 8d b2 ff d2 6f bf 71 ec 03 78 4c 49 00 83 b0 | 23 90 3a 8b | state #86 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a027b0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ec960 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #86 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 | #86 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49607.454372 | resume sending helper answer for #86 suppresed complete_v2_state_transition() and stole MD | #86 spent 0.576 milliseconds in resume sending helper answer | stop processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37001d920 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc cc 1d a8 6f 14 2f d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #86 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #86 | rejected packet: | bc cc 1d a8 6f 14 2f d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #86: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0687 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f61a0 | handling event EVENT_RETRANSMIT for parent state #31 | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #31 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #31 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49607.469606; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.000372 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #31 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 "road-eastnet-nonat-31" #31: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #31) | d5 d5 f7 7f 23 0d 4b 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 d8 4b a5 f9 d4 3a a9 51 97 2e 27 d1 cc 90 15 | e2 e2 8d 96 07 4d fd 40 9f 4f 7f 6f 35 0e 23 bc | 4a 6a 76 f9 9f 83 b0 54 30 ee b6 fc 0a 45 0c 73 | 2d e9 2a b2 ca 81 a2 ff 50 db 13 29 75 7d e9 7e | a9 33 06 c4 32 68 94 61 41 2b 8d f1 ff df 69 cc | e8 c4 b4 6d ef bc 3d c5 49 cc a7 2a fc 4c 98 e2 | 30 43 57 19 e1 0a 22 00 d7 07 6f aa ba 35 b2 14 | 36 27 5e 66 b6 08 a0 40 46 47 86 94 6d 23 bf ed | 9b 86 94 95 7d 7c df ed 26 58 08 d9 19 18 cf 17 | d2 31 cb 23 b8 00 65 a0 2d c7 80 be d9 c6 2d 9b | 2d 24 dd 1f 09 8c cb bd 5d a9 d7 7b 30 d7 87 68 | f3 c0 0e 20 8d c3 3f 32 80 d9 ab 29 26 00 09 ea | b0 b4 2f 7d 8f fc 22 1d 7c 39 80 08 04 22 2a 49 | f4 26 0e 59 4e ac 0e 0e 46 93 3b ba 87 01 a8 59 | ea 18 2f 09 70 d0 fb 69 f1 4a 19 c7 fd d5 be f0 | ff bb d7 7c ef dd e5 ed c9 a4 0a b6 e1 11 1b ed | 29 00 00 24 6a 1e b5 3b 00 37 08 50 6d 81 0e e2 | cf 1b 46 47 4b 2b 09 3d 6e 9a 95 9d 52 78 61 ae | d4 0d 66 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 91 23 cd ed e8 35 56 6f f7 85 4c | 49 64 a9 75 0a 07 1b 5f 00 00 00 1c 00 00 40 05 | a3 62 6c f7 52 92 b8 35 33 98 a9 6b 00 6d db 28 | 96 bc 0a b6 | libevent_free: release ptr-libevent@0x7fb364012740 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f61a0 | #31 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 d5 f7 7f 23 0d 4b 11 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #31 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #31 | rejected packet: | d5 d5 f7 7f 23 0d 4b 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #31: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0715 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #72 | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #72 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #72 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49607.504997; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001821 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46910 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #72 | libevent_malloc: new ptr-libevent@0x7fb364012740 size 128 "road-eastnet-nonat-72" #72: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #72) | 66 13 43 d6 1b b9 0c ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 b1 4f d1 eb 26 94 0a e8 d2 78 fe d2 e8 05 7d | 72 29 9f e5 e1 94 c3 7f a9 6a ca 75 12 4e 13 6e | e4 11 a5 e1 89 1e 08 5a 0d 5f 6b 49 0c e7 ba a3 | db 19 75 da a7 48 e8 e9 64 d4 80 8e 45 f5 82 09 | 04 17 24 14 78 b4 6e bb 71 57 6f 3e 18 4c d6 76 | a4 ec 50 14 2c c8 4e c9 04 89 23 f1 0a 7f 62 28 | 45 8e 70 27 19 66 b0 68 5f c8 be 34 a7 7e 02 24 | 87 3b ee fe 4b 57 85 64 69 04 b9 42 92 f3 d5 c0 | fe 76 05 b0 05 50 57 66 f6 f8 0b 76 74 c3 53 a1 | 05 f6 81 e4 08 d7 39 f0 53 40 e0 f4 aa 4c ff a6 | 90 72 89 fb 79 82 71 5c b3 e4 6d 43 97 e8 51 8b | ba 0a c8 eb e3 46 09 21 84 b9 ea ef 0d 8d d4 64 | 4c bf f8 b1 9c cd 8a 27 78 9c ef 52 df a6 5e b4 | 15 f4 af e2 3a 17 55 a8 8a cb 58 8c 66 bc a1 fb | 21 eb f8 38 a5 f6 b0 fd 47 53 aa ad 2e e9 17 ad | 29 40 34 3f b5 2c 48 93 29 5b c3 81 a9 9a f6 f7 | 29 00 00 24 d2 7d 93 13 5f e4 cd 1b 68 e9 96 b6 | 73 3d 25 76 63 d4 92 1a 4f 51 ac b1 63 90 04 8e | 34 c5 00 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c4 6c df 39 39 e8 cd 3f 26 eb f0 86 | 8a 8d 3e 3d 91 1f 2d ed 00 00 00 1c 00 00 40 05 | 4c 1b 62 1c 4c 06 92 d2 01 38 c8 0e 4f 7e fd bc | 86 e6 84 ff | libevent_free: release ptr-libevent@0x7fb378012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #72 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 13 43 d6 1b b9 0c ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #72 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #72 | rejected packet: | 66 13 43 d6 1b b9 0c ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #72: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a30d70 | handling event EVENT_RETRANSMIT for parent state #57 | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #57 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #57 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49607.507283; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.999443 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #57 | libevent_malloc: new ptr-libevent@0x7fb378012840 size 128 "road-eastnet-nonat-57" #57: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #57) | dc 73 20 b1 64 22 3b 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 2f 93 7c 8a da 22 fa 03 a0 fd 43 de d5 8f 84 | 5a 41 29 20 95 01 7c 7c 28 a1 27 22 f2 08 de cf | e0 98 16 08 1c e5 25 a6 bd bd 17 32 15 8e 0a 84 | f3 a2 7e 8a 0b 23 85 bf 7a b1 94 6d 13 0e bc 89 | 00 57 96 19 37 39 1b 02 a4 75 0f 94 90 d1 10 4b | e3 d2 66 0a 4f b7 c6 79 75 d4 b5 7d e4 36 1f c8 | 04 58 22 28 f1 96 40 a5 11 63 03 12 07 da 6e c4 | d6 87 58 17 eb bc 28 31 1f 88 9d a5 0c ef e1 d5 | b2 c3 d0 ee 08 43 a9 fb b1 8f de 78 3c c7 ae 7f | e9 04 ce d2 ab ca 37 0c f1 2a 72 1c 60 e7 51 7f | f2 49 54 44 b1 5f 43 7b 10 10 64 5c c3 44 75 d6 | 07 11 18 89 6c 1c 54 ef 0a c3 7f 69 cd 21 c7 ca | 32 33 4c f8 00 03 d2 d4 0f 41 96 9b 82 7d 76 81 | 10 2f 53 dd cd 91 0b 3d ff 38 8f 40 80 5c 77 b7 | 3d 66 a7 7b a1 8f 9e 2d 33 51 5c 72 92 e6 a3 7a | 40 cc ae 39 5f df 20 2b 13 8b bd 4c 81 23 66 a3 | 29 00 00 24 ad 63 ea 8e 7a 7b c2 d1 15 38 47 f0 | b3 a0 1a e0 85 11 f2 24 75 cc 3c d8 47 12 da f1 | 4a 24 d2 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 1b 4d 24 72 19 56 63 62 33 64 a7 | 66 22 df c0 bd 29 cc 1c 00 00 00 1c 00 00 40 05 | 7a aa 57 0f 26 4b 8b c1 eb 1a a3 08 c1 cf b1 49 | 59 b9 d4 8a | libevent_free: release ptr-libevent@0x7fb3580180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a30d70 | #57 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 73 20 b1 64 22 3b 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #57 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #57 | rejected packet: | dc 73 20 b1 64 22 3b 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #57: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e7260 | handling event EVENT_RETRANSMIT for parent state #79 | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #79 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #79 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49607.513609; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500131 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46950 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #79 | libevent_malloc: new ptr-libevent@0x7fb3580180b0 size 128 "road-eastnet-nonat-79" #79: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #79) | cb 0e 87 22 6d 04 19 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 8d fa 75 ee f5 0c 34 b3 09 04 c3 a6 70 35 18 | 8c e8 6b 6c 5c 5b 2d 90 26 5a 5e f9 d4 07 05 c2 | f5 73 64 12 f5 c2 51 38 6d 89 1a 0c 01 ef 01 94 | 08 08 2e cb 41 34 b4 4a 2f f7 ed 3c c1 7e 04 ba | 4c cb 90 52 00 84 c7 1d 71 85 6e 14 f7 d6 ba c6 | 6a 98 c9 b3 82 dd 58 3d c8 6f 45 92 9b e7 64 4a | 6e c9 47 ec bd a8 a4 79 ac 0e 9c ec e9 38 db 99 | d6 25 d7 25 8b 64 97 e5 d5 6a 07 ae 6b 9a 25 6c | ea 70 9f 4a 9e ba a1 e7 d8 d9 69 c1 2c a9 28 e5 | 2c 51 5f 2a f8 17 0e 3b 43 9f 77 5e 3a 59 4f 18 | 6f 20 ad 6e aa 63 b5 82 47 75 97 d0 4a 75 bf 68 | 0b ac a2 f9 6c 9d b8 21 cd c5 79 8b 66 f4 0e 4b | 32 8b f9 5e de 93 2f 2f 11 cf e9 f6 3a 2b 4b 7a | bd 3c a3 27 78 6d f5 6c 33 13 d9 14 f8 0e 44 d7 | 3e 91 89 43 f4 2f 9b b6 ab 6d 76 71 13 52 45 fd | 0e 5e 7c 72 38 35 d5 eb 86 2e 14 37 c5 c9 56 83 | 29 00 00 24 5a 77 8f b1 9a 0e 27 f5 13 b5 b3 3b | 54 a7 64 e6 f0 cd 7e 6d c0 5a 2d 35 86 f1 cb 9d | 32 23 be bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 31 42 b5 5a b6 78 6b 4f 08 f8 04 | 13 cc 8c 45 a7 cd ab bc 00 00 00 1c 00 00 40 05 | 2d 9f b7 7e f4 d4 af ae b0 e9 56 0d ae 10 83 85 | d2 ea 45 54 | libevent_free: release ptr-libevent@0x7fb3780180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e7260 | #79 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cb 0e 87 22 6d 04 19 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #79 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #79 | rejected packet: | cb 0e 87 22 6d 04 19 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #79: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0504 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-87" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-87' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #87 at 0x557d46a4b510 | State DB: adding IKEv2 state #87 in UNDEFINED | pstats #87 ikev2.ike started | Message ID: init #87: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #87: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #87; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-87" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-87" IKE SA #87 "road-eastnet-nonat-87" "road-eastnet-nonat-87" #87: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-87 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-87": constructed local IKE proposals for road-eastnet-nonat-87 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 87 for state #87 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469e7260 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #87 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 | #87 spent 0.122 milliseconds in ikev2_parent_outI1() | crypto helper 15 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 starting work-order 87 for state #87 | RESET processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-87" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 87 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.222 milliseconds in whack | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 87 time elapsed 0.001013 seconds | (#87) spent 1.01 milliseconds in crypto helper computing work-order 87: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 87 for state #87 to event queue | scheduling resume sending helper answer for #87 | libevent_malloc: new ptr-libevent@0x7fb37401f7f0 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #87 | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 87 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #87 | **emit ISAKMP Message: | initiator cookie: | a2 df 19 46 98 d4 bb 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-87 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x de ac a7 56 a2 bc 95 5a 6c 57 c8 2b e0 20 68 16 | ikev2 g^x a2 ff 5a bd 83 94 6a 4d 58 8c b2 a4 d4 76 ed fc | ikev2 g^x 0f 4a 9b b9 df 7c 6c 34 8f 70 fd e9 a0 17 cd ff | ikev2 g^x 42 ae c6 35 53 50 df 4f 92 fb b8 ae 34 b4 21 4a | ikev2 g^x 96 f4 d2 6a f3 c3 2c b1 14 ce 42 da 82 6b e3 0d | ikev2 g^x db 7a 9e a9 08 f5 73 b2 1d 45 e9 bc fe 79 e6 2d | ikev2 g^x 2f 0a 64 4b ee 86 b7 4b 3f 77 d9 fd c5 b0 bd d9 | ikev2 g^x f0 f9 4a 67 c3 b1 50 bb ba e6 76 27 0e 9b 80 ac | ikev2 g^x ac a5 3d ed e4 7f 3e ce 9b 7e 70 ae 76 56 31 41 | ikev2 g^x 17 98 86 1f 1f 85 2b 2b b2 36 28 19 25 14 37 3e | ikev2 g^x bb a6 a5 e3 f0 64 b9 9c 0b af e9 c8 fc dd 9d 10 | ikev2 g^x 05 4f 6e 73 4c 08 a1 b5 54 a0 ae e0 d5 30 bc af | ikev2 g^x af 63 ef 9e e4 70 09 3a 1e 60 6f c5 bb 77 c5 0b | ikev2 g^x 60 c8 18 55 dd 77 cc 86 3f 7c 34 56 80 93 c4 30 | ikev2 g^x 61 51 d7 11 b2 4d 6f 17 c0 8c 7f d5 08 fa 5f 63 | ikev2 g^x d7 b3 cd 14 9f 3a 9d 07 13 ee 34 e9 84 52 68 1b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8b f5 b9 e8 72 8a d8 5e 1a d6 70 1a a6 5f 3d 02 | IKEv2 nonce 9f 40 bc e8 9c c3 88 16 89 ec af ca b1 90 6f 2f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a2 df 19 46 98 d4 bb 86 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 57 | natd_hash: port= 01 f4 | natd_hash: hash= 85 83 d5 c2 93 bc 76 7b c0 f5 6a f5 c6 03 a7 0c | natd_hash: hash= 52 da b8 7c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 85 83 d5 c2 93 bc 76 7b c0 f5 6a f5 c6 03 a7 0c | Notify data 52 da b8 7c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a2 df 19 46 98 d4 bb 86 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9f 00 07 ca 6e 64 62 64 56 d5 c5 aa 95 9f c8 6b | natd_hash: hash= 83 2b 36 93 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9f 00 07 ca 6e 64 62 64 56 d5 c5 aa 95 9f c8 6b | Notify data 83 2b 36 93 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #87 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #87: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #87 to 4294967295 after switching state | Message ID: IKE #87 skipping update_recv as MD is fake | Message ID: sent #87 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-87" #87: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.87:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #87) | a2 df 19 46 98 d4 bb 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de ac a7 56 a2 bc 95 5a 6c 57 c8 2b e0 20 68 16 | a2 ff 5a bd 83 94 6a 4d 58 8c b2 a4 d4 76 ed fc | 0f 4a 9b b9 df 7c 6c 34 8f 70 fd e9 a0 17 cd ff | 42 ae c6 35 53 50 df 4f 92 fb b8 ae 34 b4 21 4a | 96 f4 d2 6a f3 c3 2c b1 14 ce 42 da 82 6b e3 0d | db 7a 9e a9 08 f5 73 b2 1d 45 e9 bc fe 79 e6 2d | 2f 0a 64 4b ee 86 b7 4b 3f 77 d9 fd c5 b0 bd d9 | f0 f9 4a 67 c3 b1 50 bb ba e6 76 27 0e 9b 80 ac | ac a5 3d ed e4 7f 3e ce 9b 7e 70 ae 76 56 31 41 | 17 98 86 1f 1f 85 2b 2b b2 36 28 19 25 14 37 3e | bb a6 a5 e3 f0 64 b9 9c 0b af e9 c8 fc dd 9d 10 | 05 4f 6e 73 4c 08 a1 b5 54 a0 ae e0 d5 30 bc af | af 63 ef 9e e4 70 09 3a 1e 60 6f c5 bb 77 c5 0b | 60 c8 18 55 dd 77 cc 86 3f 7c 34 56 80 93 c4 30 | 61 51 d7 11 b2 4d 6f 17 c0 8c 7f d5 08 fa 5f 63 | d7 b3 cd 14 9f 3a 9d 07 13 ee 34 e9 84 52 68 1b | 29 00 00 24 8b f5 b9 e8 72 8a d8 5e 1a d6 70 1a | a6 5f 3d 02 9f 40 bc e8 9c c3 88 16 89 ec af ca | b1 90 6f 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 83 d5 c2 93 bc 76 7b c0 f5 6a f5 | c6 03 a7 0c 52 da b8 7c 00 00 00 1c 00 00 40 05 | 9f 00 07 ca 6e 64 62 64 56 d5 c5 aa 95 9f c8 6b | 83 2b 36 93 | state #87 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3780180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469e7260 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a30d70 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #87 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 | #87 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49607.516116 | resume sending helper answer for #87 suppresed complete_v2_state_transition() and stole MD | #87 spent 0.415 milliseconds in resume sending helper answer | stop processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37401f7f0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 df 19 46 98 d4 bb 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #87 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #87 | rejected packet: | a2 df 19 46 98 d4 bb 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #87: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.056 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #32 | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #32 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #32 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49607.547322; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003506 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f61a0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #32 | libevent_malloc: new ptr-libevent@0x7fb37401f7f0 size 128 "road-eastnet-nonat-32" #32: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #32) | 91 2f 9d 69 76 5d 8a 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 54 17 4f f3 31 b1 0f c2 14 96 a0 49 f3 c5 20 | 38 78 7d e5 0a d8 95 bc 7a a9 a2 f1 ff ab 0d 66 | a2 fe 53 90 8e fe 51 43 04 57 01 9c e7 22 ca 9e | 98 aa 3b 0d 0d 5f ee 9d 1e 59 e6 04 c4 7f 07 84 | f1 a5 dc 31 6f fa b4 db 4a d9 1c 93 5d b0 7e 5d | 37 79 07 ab 3e 5c a3 de d6 8b a4 ac df 4b a7 7c | af 6f 03 fd 31 bd 7d c1 34 31 76 57 00 e4 23 e1 | 82 cb b8 38 12 59 cd 21 e3 0e 67 54 27 e1 6e 8f | 1e a1 dd 84 f8 ca 82 2a 39 9d 17 56 58 46 a3 3b | 7b 5d 3a 21 a2 b3 03 79 c6 bd 25 cc df a0 12 67 | b3 f4 5a c2 b0 73 2d 33 df 1c dc fa 26 25 56 72 | 59 7b 3c f0 d8 e2 d9 b0 57 2e 4a 8e ec 96 92 09 | 75 70 f6 57 59 ce 54 70 90 14 41 34 b1 57 0f 5d | 19 dd 8a a1 77 43 7e cf 1c ef 3e 0b 72 1e cc f4 | 78 66 2f 15 74 e8 33 6b d3 89 bb a9 fb bc fa 46 | 95 b5 88 f8 a3 91 1f 3a b1 92 bc 1e 84 a5 5b 07 | 29 00 00 24 2d 29 95 26 bc 23 fe d9 76 bb c2 d5 | 43 41 98 03 bf c6 eb 4a b9 6e a6 4e f6 f7 82 f1 | 09 94 9d 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 13 8b 5d 25 b5 3b 06 af a0 3f ac | be 9b 92 09 9d c4 50 7f 00 00 00 1c 00 00 40 05 | ef 32 45 23 d7 6a b0 96 66 7f 58 39 f6 19 a5 1f | 4b 49 56 02 | libevent_free: release ptr-libevent@0x7fb34c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | #32 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 2f 9d 69 76 5d 8a 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #32 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #32 | rejected packet: | 91 2f 9d 69 76 5d 8a 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #32: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #73 | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #73 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #73 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49607.575146; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00199 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #73 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 "road-eastnet-nonat-73" #73: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #73) | 1b d1 f7 22 4f 1d be c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 17 af cb 15 dc ab b1 a5 7f 34 62 4e 0f 28 9a | 18 48 48 5b 8a 7c 0e f9 96 fe 06 d5 63 de 59 f8 | 49 35 b4 79 b1 9f 27 0d e0 5d f1 56 f3 be 3d 0b | 2c 98 27 ba b0 9f 63 a4 e7 98 a1 c0 ce b7 fa 57 | bc af 56 22 b4 0b 08 17 91 1f 28 fd 21 7d b9 47 | be 94 09 11 9d 2a ae 62 55 90 ec cd fb 6d 33 53 | dc 6e 16 d9 31 7b 9a c8 fd c1 75 61 52 f6 98 91 | 94 9a f3 05 36 de 11 ce 66 87 ce 7a d3 f8 fd 04 | 0b ba 01 fd 05 22 ef 85 db 52 65 4a 74 05 92 71 | be df ba dc 65 01 21 6c d5 86 65 2b 9a e5 83 35 | a5 c8 2d 49 2e 69 13 a9 18 d4 42 31 7e 26 5b 88 | 7c 6f cd 46 42 cb fc 6c 40 14 2b 57 0e e7 97 72 | 5b db 5d 77 72 cd 54 3e 63 fa 42 39 c6 a7 84 0d | 90 25 f3 6f 23 cf 8e 04 75 0a 41 85 e3 ef 88 28 | 25 3f 56 c1 9a ec 95 fb a0 fa ac 95 ac 16 97 71 | 2e b2 fb 1e 8b 8f a8 12 b2 0a 1f 31 5e c4 d7 fa | 29 00 00 24 93 de fa 16 34 ae c4 6f 1c b0 6f ba | 95 0e 80 10 81 5f 54 52 00 a9 bf 63 44 18 a5 30 | 6d af 4e 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 5e 43 5b b5 69 a0 f9 16 98 c0 46 | f4 de 55 67 f2 0c 20 b2 00 00 00 1c 00 00 40 05 | 50 cf 48 cc c9 4e 77 06 66 f1 57 3b 42 c0 94 82 | a3 eb c2 6e | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | #73 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469e5ca0 | handling event EVENT_RETRANSMIT for parent state #80 | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #80 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #80 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49607.575309; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499905 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #80 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 "road-eastnet-nonat-80" #80: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #80) | aa bd f3 45 40 fd 66 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a f9 52 fe 2c 07 55 9a 9f 75 be 2d bb 6b aa b0 | 07 01 f4 20 39 c9 c6 12 04 59 16 f7 53 ca 23 cf | b2 a3 d6 d7 cd d3 78 95 1e ae 2c b7 17 84 30 6c | 9a 6e 0d 1b ef 48 24 1d f1 c9 12 65 61 88 44 c9 | 4b 27 23 9a 65 49 0a 11 49 89 68 1f 69 8b cd 8d | e9 1c 22 5e 52 f0 a3 c1 f7 8e 10 9b 8e 27 61 b3 | aa d7 5b 30 40 8f 25 2e 0d 7c bd dc 0e 4d aa 95 | b6 5a 44 77 7b 33 24 ed 5e bf f2 78 c5 d8 1e 5c | 38 0e af a8 70 85 81 7a 43 7a de 45 73 d1 23 0a | 21 50 82 2c fb 48 a9 b6 ed 4a 3a 01 52 3d 91 cf | 62 7a 95 ef ff 5d 9f b3 85 63 dc f5 46 12 fc e4 | ac 22 23 7e 8e 79 eb cb 39 31 bb de 91 1f fd 9c | 95 3c fe ca 99 40 e4 17 71 ad 8e 05 ed f6 14 9e | 6b 26 3c 1c 13 2f 5a 94 9d 9c cd 71 11 6d bb c9 | 9a 84 65 ba e1 3d ae 2e 2c 88 f5 b9 e4 60 97 3a | ad 9a 6f f8 77 43 67 40 a8 7b be e5 9d 13 c4 6d | 29 00 00 24 53 2a 2d 72 a4 0b ac f1 46 3b 88 60 | a1 1f 05 e7 3a 9a 78 ce 7e 03 67 44 f4 b3 91 7b | 4e 29 6b 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 ed 0c 1a de d8 39 29 7d 81 95 16 | 89 64 a4 1b c6 93 47 b1 00 00 00 1c 00 00 40 05 | 41 2d b0 0c 88 62 05 80 34 d7 2b cd 52 bc d2 c8 | ff 29 c4 37 | libevent_free: release ptr-libevent@0x557d469e1b60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e5ca0 | #80 spent 0.0694 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b d1 f7 22 4f 1d be c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #73 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #73 | rejected packet: | 1b d1 f7 22 4f 1d be c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #73: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | aa bd f3 45 40 fd 66 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #80 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #80 | rejected packet: | aa bd f3 45 40 fd 66 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #80: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.036 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-88" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-88' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #88 at 0x557d46a4cad0 | State DB: adding IKEv2 state #88 in UNDEFINED | pstats #88 ikev2.ike started | Message ID: init #88: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #88: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #88; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-88" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-88" IKE SA #88 "road-eastnet-nonat-88" "road-eastnet-nonat-88" #88: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-88 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-88": constructed local IKE proposals for road-eastnet-nonat-88 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 88 for state #88 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a027b0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #88 | libevent_malloc: new ptr-libevent@0x557d469e1b60 size 128 | crypto helper 19 resuming | #88 spent 0.118 milliseconds in ikev2_parent_outI1() | crypto helper 19 starting work-order 88 for state #88 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 88 | RESET processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-88" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.204 milliseconds in whack | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 88 time elapsed 0.000995 seconds | (#88) spent 1 milliseconds in crypto helper computing work-order 88: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 88 for state #88 to event queue | scheduling resume sending helper answer for #88 | libevent_malloc: new ptr-libevent@0x7fb36801d920 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #88 | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 88 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #88 | **emit ISAKMP Message: | initiator cookie: | 4f b4 b9 96 90 ac 87 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-88 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8f 55 7d 2b ef 81 b7 ac 80 5f 94 f2 45 3d 30 4f | ikev2 g^x 1d db a2 af 47 67 b7 7c be e3 bc 36 9a 72 1e e6 | ikev2 g^x 4f 47 07 85 4a dc c2 8c 23 63 be 8e ef c5 79 8f | ikev2 g^x 9f 5c 4f 9d 4f 85 09 c3 d7 cd 09 d7 9c 93 a4 d2 | ikev2 g^x cb 1f 73 cb f5 4a 96 ce 2b f9 75 2e 3c f9 67 24 | ikev2 g^x b7 40 01 a2 9a 5a 3a b5 1b 81 51 3d 6c dd 22 93 | ikev2 g^x a7 84 80 70 90 68 0a 70 88 ae 95 b6 8d ea e4 d4 | ikev2 g^x 54 cf 85 55 04 a4 94 5d cc ba 3d e2 31 46 75 ff | ikev2 g^x 7c 75 77 1a 1b 6c e0 fd b6 75 6b 40 9a b7 ac 36 | ikev2 g^x 39 45 a5 48 a8 96 90 52 cb 62 b2 ca a6 08 23 37 | ikev2 g^x d2 f9 be 02 8c 54 29 91 80 43 1c 2d 5f 25 44 25 | ikev2 g^x ff e7 b9 7d 14 3d 11 4a a3 ab 8e 4f b9 9b a1 4d | ikev2 g^x 91 68 13 50 1e 3b 88 4e ac 27 30 6a c7 2b ef cb | ikev2 g^x 81 87 56 8d dd bd 93 b9 d2 77 ea ab 8e f7 84 26 | ikev2 g^x 38 de 93 6d 11 fc f2 e4 c4 b3 df 42 49 8c 39 27 | ikev2 g^x 12 40 d4 6f db 31 51 71 3a c5 b3 bf 78 b4 72 ae | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d0 42 a3 31 c3 ed 67 67 3c 0c 74 87 e1 18 ba c3 | IKEv2 nonce 96 b7 23 3a c3 28 fa 83 32 6a f8 22 c5 3d ce 47 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4f b4 b9 96 90 ac 87 92 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 58 | natd_hash: port= 01 f4 | natd_hash: hash= c6 13 5d 9d 57 2e de f0 16 54 40 11 ce e4 63 b7 | natd_hash: hash= 5f de e1 17 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c6 13 5d 9d 57 2e de f0 16 54 40 11 ce e4 63 b7 | Notify data 5f de e1 17 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4f b4 b9 96 90 ac 87 92 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 73 d1 3a 60 f3 dc 99 f7 0c 4b 4c 3e d1 f1 65 ae | natd_hash: hash= 8d f5 93 01 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 73 d1 3a 60 f3 dc 99 f7 0c 4b 4c 3e d1 f1 65 ae | Notify data 8d f5 93 01 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #88 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #88: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #88 to 4294967295 after switching state | Message ID: IKE #88 skipping update_recv as MD is fake | Message ID: sent #88 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-88" #88: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.88:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #88) | 4f b4 b9 96 90 ac 87 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 55 7d 2b ef 81 b7 ac 80 5f 94 f2 45 3d 30 4f | 1d db a2 af 47 67 b7 7c be e3 bc 36 9a 72 1e e6 | 4f 47 07 85 4a dc c2 8c 23 63 be 8e ef c5 79 8f | 9f 5c 4f 9d 4f 85 09 c3 d7 cd 09 d7 9c 93 a4 d2 | cb 1f 73 cb f5 4a 96 ce 2b f9 75 2e 3c f9 67 24 | b7 40 01 a2 9a 5a 3a b5 1b 81 51 3d 6c dd 22 93 | a7 84 80 70 90 68 0a 70 88 ae 95 b6 8d ea e4 d4 | 54 cf 85 55 04 a4 94 5d cc ba 3d e2 31 46 75 ff | 7c 75 77 1a 1b 6c e0 fd b6 75 6b 40 9a b7 ac 36 | 39 45 a5 48 a8 96 90 52 cb 62 b2 ca a6 08 23 37 | d2 f9 be 02 8c 54 29 91 80 43 1c 2d 5f 25 44 25 | ff e7 b9 7d 14 3d 11 4a a3 ab 8e 4f b9 9b a1 4d | 91 68 13 50 1e 3b 88 4e ac 27 30 6a c7 2b ef cb | 81 87 56 8d dd bd 93 b9 d2 77 ea ab 8e f7 84 26 | 38 de 93 6d 11 fc f2 e4 c4 b3 df 42 49 8c 39 27 | 12 40 d4 6f db 31 51 71 3a c5 b3 bf 78 b4 72 ae | 29 00 00 24 d0 42 a3 31 c3 ed 67 67 3c 0c 74 87 | e1 18 ba c3 96 b7 23 3a c3 28 fa 83 32 6a f8 22 | c5 3d ce 47 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 13 5d 9d 57 2e de f0 16 54 40 11 | ce e4 63 b7 5f de e1 17 00 00 00 1c 00 00 40 05 | 73 d1 3a 60 f3 dc 99 f7 0c 4b 4c 3e d1 f1 65 ae | 8d f5 93 01 | state #88 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x557d469e1b60 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a027b0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e5ca0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #88 | libevent_malloc: new ptr-libevent@0x557d469e1b60 size 128 | #88 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49607.583381 | resume sending helper answer for #88 suppresed complete_v2_state_transition() and stole MD | #88 spent 0.478 milliseconds in resume sending helper answer | stop processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36801d920 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f b4 b9 96 90 ac 87 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #88 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #88 | rejected packet: | 4f b4 b9 96 90 ac 87 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #88: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34000d120 | handling event EVENT_RETRANSMIT for parent state #58 | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #58 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #58 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49607.593589; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002527 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e7260 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #58 | libevent_malloc: new ptr-libevent@0x7fb36801d920 size 128 "road-eastnet-nonat-58" #58: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #58) | 0b a9 81 95 1f 0d 8e 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f b0 e3 df ce d1 d0 b9 30 6e 16 b3 e7 cf 92 e5 | a6 70 0e 23 5e 02 05 19 f5 b5 1a 04 6c 5e 7d a2 | 79 25 aa 0e 70 2a 25 1f 1c 02 b5 fc b9 3e 75 ad | e7 1e f1 8c 9c 7f 92 92 1d dc b1 ca 6d cf 53 ac | b8 0b 70 9b 2c 6a e7 8d 07 95 ae e1 37 ab ac 14 | 91 d8 79 4c ef 08 d0 d9 b0 55 82 09 5f 15 d9 df | e8 2c 4e cb ea a0 59 1c 81 c7 f6 39 0a 52 62 8e | 4b 57 28 22 1f d7 52 eb ec 16 d8 46 16 0a 27 88 | c7 c5 f7 e2 87 71 a1 2d 5e 9c 25 83 70 f1 a8 0c | df 63 58 3a 6f ba 9a fc 71 ac 13 82 0c ff 96 f7 | b2 3e 0f af a2 df f1 69 8f db ce 47 13 89 8f fd | ce 0a 15 3f 64 ea 8f f4 c7 b7 5e 3b b0 17 0a 90 | ef 23 ff a9 81 27 7d 7c ee 7a 36 7f 56 c1 b8 52 | 77 69 e0 69 4b 05 7c e7 a7 d2 48 f2 eb ac 08 c4 | 5f 9f b5 9e fc d5 98 d0 41 7f 9b ec 07 64 d8 f7 | 80 37 a2 97 6c ab e1 aa b4 48 78 11 a3 f3 d8 0a | 29 00 00 24 dd 82 37 0e 6e 7f fd 43 0e f6 0a 6a | 68 bc 25 88 0a 9e 3e 74 64 09 ae e7 87 f2 db fe | 06 d2 df 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 02 ef 4d 47 45 3b d6 d5 d7 fa ad | b5 dd 5d f9 98 95 75 30 00 00 00 1c 00 00 40 05 | 0c 06 c0 09 b1 a9 53 e2 00 18 ae 12 95 c7 71 d4 | 78 09 4b e3 | libevent_free: release ptr-libevent@0x7fb340012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000d120 | #58 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b a9 81 95 1f 0d 8e 78 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #58 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #58 | rejected packet: | 0b a9 81 95 1f 0d 8e 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #58: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0544 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #33 | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #33 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #33 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49607.614934; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003493 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #33 | libevent_malloc: new ptr-libevent@0x7fb340012840 size 128 "road-eastnet-nonat-33" #33: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #33) | c7 46 be 2e 5d 25 78 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 fb 56 35 bc 7c 07 73 43 c0 53 96 f8 9b 69 93 | 49 fe be 57 af 79 18 68 5a 92 2b 2b a6 ed e4 23 | 35 6b 49 80 b0 8c 38 3d c5 a9 f4 61 c1 8b 08 4d | 96 53 f0 d9 1b 6c 56 bc 0d ea 97 5b b0 d7 0d 16 | 49 88 40 6d 71 9e 2d 30 fe 42 42 37 20 10 14 5c | 75 38 c4 da 71 b3 b1 3b a6 23 58 dc a3 9a e0 40 | ae dc 8e cf de 76 e6 55 4e 33 19 fe 18 08 f5 70 | 8e 50 6f 64 32 2f d6 7a 45 39 d0 ba 32 a4 1e ab | 2d 4d 83 e7 1f d4 28 47 30 da f7 2e a0 79 9c 09 | 2b 6b 46 2e c8 c1 e5 37 84 54 0b 0c 97 40 ae db | 52 08 f5 e5 d5 a9 49 2a c9 b8 1f f6 14 c7 78 d5 | 70 93 cb 5e 8c 96 b6 ac 74 c2 85 cf 89 ad 75 5d | fe 0b 68 86 21 96 4e 79 63 5a 81 98 b3 45 c5 f0 | b2 fd 49 e2 ff b2 a3 2c 96 3c ba 10 d8 3f 86 56 | e0 c6 d2 d5 d7 7d 5f 52 2a 95 0f 65 04 12 82 60 | e3 5b 42 b7 a8 9e 92 b0 fa 34 79 45 e1 34 ab c5 | 29 00 00 24 b8 c6 4b 62 72 20 c9 09 07 72 44 d0 | 79 00 e2 dc 8f 6b 83 e9 3d 67 2f d3 a6 5d 27 77 | 58 61 12 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 b6 d4 e5 76 6f b7 90 e8 c3 ad b3 | 49 49 44 7a b5 13 9b a6 00 00 00 1c 00 00 40 05 | 15 0a 54 d9 c3 ee ba ab b9 96 60 bb a3 40 4e fb | d5 1b 34 be | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | #33 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 46 be 2e 5d 25 78 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #33 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #33 | rejected packet: | c7 46 be 2e 5d 25 78 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #33: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f0aa0 | handling event EVENT_RETRANSMIT for parent state #81 | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #81 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #81 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49607.639296; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500346 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #81 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 "road-eastnet-nonat-81" #81: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #81) | 66 17 84 1d 01 f5 89 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 79 cf 2e c9 58 5a cf 22 0f e4 95 f3 b3 ec e3 | d7 ab 2d 5f 01 54 3c c5 38 6c 9c d3 40 e3 80 92 | e9 89 68 26 a0 e4 bb a0 7a eb 4c f1 e4 9f 20 12 | 58 2a 4c f1 f2 df 9a 6d 19 39 bd 12 58 10 e1 11 | 60 c9 9d ed 18 33 de 94 c1 bb 5d 21 df 07 9b 4e | 1e ae ec 4e 5f 9a 7f b4 b3 f8 3c 10 c2 09 ea 68 | 5d bc a9 fd 8a bb 40 95 8d 3b d1 39 da 16 f8 a8 | 93 df 32 68 37 e0 b9 31 f0 a7 f2 55 d6 2d bc ef | ef 45 3f e8 34 12 fc 98 2a dc 19 03 8b dc 1f 09 | cd 02 40 97 95 a7 39 71 09 ba 54 e3 53 28 2c b9 | 98 bb af 3a 25 6b e9 e7 4c 76 46 d1 aa 9d 3b 59 | 03 52 8a 61 f9 f7 83 33 a1 6c a0 29 48 f7 36 48 | 3a 5a f9 b5 72 5e fe 9f e0 84 df 16 32 28 ce ca | c6 27 c5 b5 d7 f3 93 db 10 54 fb f4 c3 70 76 d4 | 5f 00 b9 4c 0d 91 91 e7 a8 18 4b 2b 7f cf a5 4e | 76 2e 5b 38 e2 0b 32 aa 89 74 93 4b e3 81 6f 21 | 29 00 00 24 78 b9 6f 78 8b 1e bb 84 c4 a1 7c 02 | 08 74 d8 82 11 75 a1 52 cd 59 45 9e 38 4d d2 1d | 56 1f 81 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 31 12 3e 08 55 9e 26 f3 2f be 08 | b5 7f 7c 7d c5 5f 44 c0 00 00 00 1c 00 00 40 05 | 16 fd af 38 8b 2a c1 77 ea 51 ea 68 dc 9b f5 3d | 6a 08 67 b3 | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f0aa0 | #81 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 17 84 1d 01 f5 89 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #81 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #81 | rejected packet: | 66 17 84 1d 01 f5 89 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #81: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0489 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a205f0 | handling event EVENT_RETRANSMIT for parent state #74 | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #74 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #74 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49607.643582; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002266 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a49450 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #74 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 "road-eastnet-nonat-74" #74: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #74) | 74 9c fc 4a 6a e3 e3 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 4c a1 32 c0 37 d8 5b 48 9c e5 d1 93 92 0c 53 | 2d 7a c8 b1 df 24 d3 9a 3f 8c d4 c5 68 47 a3 a6 | 97 97 ce bb 01 47 69 1c 80 a7 65 98 e9 23 03 f4 | d4 b7 9b 7e d3 4c aa b4 56 9e 09 14 71 47 28 7f | c7 55 55 ab d5 8e 75 f5 9a f4 57 8c 05 da 66 0a | 40 9c be 25 a4 ef c7 bf 8b 81 b2 07 d2 0a 7d 79 | a8 74 67 c4 01 41 ba 6b 27 91 81 d4 a9 3f 71 a7 | d8 a9 d4 20 88 c0 67 ed 9a eb cb 95 5d 27 cd ae | 65 ee b7 22 c0 dd 63 86 9c 71 c8 d0 62 02 64 6a | 57 b2 8d 13 05 28 bc e0 52 39 21 a1 da 4e f2 d4 | b5 8a d4 4a 90 a1 15 ec 76 63 23 1b 27 bd 31 af | 95 a2 f3 5b 2d 4e d4 42 7c 32 a2 bf 50 28 83 76 | 27 c1 4e 56 b2 c9 33 07 a5 ee bf 65 36 77 b7 43 | c5 de f7 7c c7 52 fc 27 15 dc 50 6e c0 2f d7 72 | 5a 3b a4 4a 5b f6 13 1e 38 47 4d 77 c3 69 47 89 | 95 21 ff 50 2d c1 83 a3 1a 90 31 a7 2f c0 c1 a5 | 29 00 00 24 5c 46 aa ed 6c 5c 2a de e4 4c 0f 0d | ff be a8 c1 d6 16 7f 78 81 97 e2 33 fc 98 55 93 | 9e 14 cc 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 26 fa 02 ef ac 51 67 96 4e b3 ca | 7c 6c ba e3 fb 9a 52 77 00 00 00 1c 00 00 40 05 | 65 ee a5 86 f4 0e 73 b1 a9 eb cb 64 18 5a 0c a9 | fd 3d e5 eb | libevent_free: release ptr-libevent@0x7fb38801abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a205f0 | #74 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 9c fc 4a 6a e3 e3 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #74 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #74 | rejected packet: | 74 9c fc 4a 6a e3 e3 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #74: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0481 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-89" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-89' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #89 at 0x557d46a4e090 | State DB: adding IKEv2 state #89 in UNDEFINED | pstats #89 ikev2.ike started | Message ID: init #89: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #89: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #89; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-89" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-89" IKE SA #89 "road-eastnet-nonat-89" "road-eastnet-nonat-89" #89: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-89 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-89": constructed local IKE proposals for road-eastnet-nonat-89 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 89 for state #89 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a205f0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #89 | libevent_malloc: new ptr-libevent@0x7fb38801abe0 size 128 | #89 spent 0.128 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-89" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.204 milliseconds in whack | crypto helper 6 resuming | crypto helper 6 starting work-order 89 for state #89 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 89 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 89 time elapsed 0.000746 seconds | (#89) spent 0.754 milliseconds in crypto helper computing work-order 89: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 89 for state #89 to event queue | scheduling resume sending helper answer for #89 | libevent_malloc: new ptr-libevent@0x7fb36c01d920 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #89 | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 89 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #89 | **emit ISAKMP Message: | initiator cookie: | 9d 5f d8 02 80 b8 e7 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-89 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 96 e3 b9 05 71 34 7d 24 1f b0 78 15 60 77 1c 08 | ikev2 g^x 9e 6a 97 b0 4c 89 e3 5a dc c3 13 ad 84 6a 5e aa | ikev2 g^x fd ca 45 35 ba 35 de 44 be ce 11 ea 86 29 6c 73 | ikev2 g^x 0b 7f 74 63 63 d2 81 70 21 25 9e 55 c0 3c 14 62 | ikev2 g^x da 13 e5 79 f3 ac 65 c2 4c 57 6a e3 37 8f 5c 04 | ikev2 g^x 8a 01 65 69 49 a9 46 40 f2 f3 a8 b3 1a af d6 79 | ikev2 g^x f9 34 6f 04 49 9e f3 10 ca 6b d5 6f d3 e5 36 7a | ikev2 g^x c9 32 cd 69 df 91 08 6d 35 ec 78 52 d9 57 09 e3 | ikev2 g^x f5 63 af 57 d7 93 38 af ff 2c e8 36 87 e0 92 43 | ikev2 g^x f0 f6 97 f6 50 a5 d2 4c 16 d1 d2 d2 96 90 50 82 | ikev2 g^x 09 99 3b fa 59 66 b4 48 e1 b1 0d 01 76 3d b4 c2 | ikev2 g^x b2 4d a5 5c 8a c7 cb a9 bb 09 56 bf 65 e9 da 28 | ikev2 g^x 24 dc 22 59 97 49 92 d0 c5 d3 9b 2b da 0b d5 26 | ikev2 g^x df 68 b6 c9 f1 0d 58 08 b0 7e 26 ce 7d 24 b1 d2 | ikev2 g^x a7 c4 2d 42 0c 8d 57 57 7b 42 5d d8 f7 b9 c8 ba | ikev2 g^x e6 b0 9d 60 5a 01 d8 33 e3 a6 9f f1 3b 81 e4 a8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 50 a5 b1 4c 6d 18 8a 79 34 52 af 57 9c b8 99 4d | IKEv2 nonce b9 e7 5c 74 bb 7f a4 8c e5 f5 2c a5 8d 6b 1d 1f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9d 5f d8 02 80 b8 e7 e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 59 | natd_hash: port= 01 f4 | natd_hash: hash= 59 41 ee 04 aa 3d b0 21 0a d0 67 73 50 8d e2 01 | natd_hash: hash= ce 26 f9 77 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 59 41 ee 04 aa 3d b0 21 0a d0 67 73 50 8d e2 01 | Notify data ce 26 f9 77 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9d 5f d8 02 80 b8 e7 e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7b 60 8a 47 58 c7 18 57 64 ec a9 8e 15 07 49 b1 | natd_hash: hash= ed 9e c4 1b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7b 60 8a 47 58 c7 18 57 64 ec a9 8e 15 07 49 b1 | Notify data ed 9e c4 1b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #89 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #89: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #89 to 4294967295 after switching state | Message ID: IKE #89 skipping update_recv as MD is fake | Message ID: sent #89 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-89" #89: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.89:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #89) | 9d 5f d8 02 80 b8 e7 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 e3 b9 05 71 34 7d 24 1f b0 78 15 60 77 1c 08 | 9e 6a 97 b0 4c 89 e3 5a dc c3 13 ad 84 6a 5e aa | fd ca 45 35 ba 35 de 44 be ce 11 ea 86 29 6c 73 | 0b 7f 74 63 63 d2 81 70 21 25 9e 55 c0 3c 14 62 | da 13 e5 79 f3 ac 65 c2 4c 57 6a e3 37 8f 5c 04 | 8a 01 65 69 49 a9 46 40 f2 f3 a8 b3 1a af d6 79 | f9 34 6f 04 49 9e f3 10 ca 6b d5 6f d3 e5 36 7a | c9 32 cd 69 df 91 08 6d 35 ec 78 52 d9 57 09 e3 | f5 63 af 57 d7 93 38 af ff 2c e8 36 87 e0 92 43 | f0 f6 97 f6 50 a5 d2 4c 16 d1 d2 d2 96 90 50 82 | 09 99 3b fa 59 66 b4 48 e1 b1 0d 01 76 3d b4 c2 | b2 4d a5 5c 8a c7 cb a9 bb 09 56 bf 65 e9 da 28 | 24 dc 22 59 97 49 92 d0 c5 d3 9b 2b da 0b d5 26 | df 68 b6 c9 f1 0d 58 08 b0 7e 26 ce 7d 24 b1 d2 | a7 c4 2d 42 0c 8d 57 57 7b 42 5d d8 f7 b9 c8 ba | e6 b0 9d 60 5a 01 d8 33 e3 a6 9f f1 3b 81 e4 a8 | 29 00 00 24 50 a5 b1 4c 6d 18 8a 79 34 52 af 57 | 9c b8 99 4d b9 e7 5c 74 bb 7f a4 8c e5 f5 2c a5 | 8d 6b 1d 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 41 ee 04 aa 3d b0 21 0a d0 67 73 | 50 8d e2 01 ce 26 f9 77 00 00 00 1c 00 00 40 05 | 7b 60 8a 47 58 c7 18 57 64 ec a9 8e 15 07 49 b1 | ed 9e c4 1b | state #89 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38801abe0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a205f0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f0aa0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #89 | libevent_malloc: new ptr-libevent@0x7fb38801abe0 size 128 | #89 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49607.649313 | resume sending helper answer for #89 suppresed complete_v2_state_transition() and stole MD | #89 spent 0.352 milliseconds in resume sending helper answer | stop processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c01d920 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d 5f d8 02 80 b8 e7 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #89 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #89 | rejected packet: | 9d 5f d8 02 80 b8 e7 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #89: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8cc0 | handling event EVENT_RETRANSMIT for parent state #59 | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #59 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #59 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49607.656592; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003121 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a027b0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #59 | libevent_malloc: new ptr-libevent@0x7fb36c01d920 size 128 "road-eastnet-nonat-59" #59: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #59) | 97 6c 3a 75 a9 04 c6 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 c8 5b 92 1f 75 89 eb 0e 2e 34 19 de c9 7d 34 | 18 5b 4b 86 10 db bf e2 6c 1e 94 2d 7a 7d c9 7a | a0 2b b5 06 7b 90 f1 d3 cd af 0e 61 7b ec c3 64 | de a5 53 e3 bf 5e 51 d1 84 95 1f 6e cb 81 61 93 | ad 42 3a 9f 1e 3a 65 25 36 02 e8 9c 31 54 18 98 | 6f 55 90 5b bf 33 e8 09 e2 db 7f a5 0d 28 2f b0 | 76 e2 e4 a4 df b5 68 69 d1 19 fe bd 73 f2 f2 54 | 46 48 bd 1c fd b1 5e e2 cc c0 6c c9 e5 04 1c 0c | 40 92 81 c8 73 67 1a af d8 5e 9b 4f 61 bb 61 8c | a9 de 42 09 33 14 9f 91 4f 50 01 94 4d 87 81 f8 | a7 b9 37 9b 88 d2 60 21 55 19 56 c4 fc 7d e4 11 | 28 74 cf ae 93 f1 51 10 2e 23 31 34 07 b8 e7 37 | a3 5e 4c 95 61 50 f9 d4 96 86 63 2e 49 88 c6 44 | 13 5e 5b c4 2d 0c 65 06 af 27 76 b6 3c bb 87 1b | d8 ae 43 ad 30 39 b0 94 f9 53 b3 ee d3 35 1d 60 | 44 54 ef 8a f8 7d 13 88 d2 f8 8c df 8f 77 8c e4 | 29 00 00 24 b8 98 0c 82 63 7c e1 4a 6e 4e 96 76 | c9 de 50 23 14 2c 80 d9 d0 99 72 c2 8b e9 f8 32 | 80 1a 11 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 09 60 c9 a8 1a 7b a4 38 cc f7 74 | 87 5e fa dc 42 53 d3 c5 00 00 00 1c 00 00 40 05 | a9 7a 6a af 06 6a 57 69 21 03 39 50 4a 98 de 11 | 5d 3e 78 2b | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8cc0 | #59 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 6c 3a 75 a9 04 c6 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #59 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #59 | rejected packet: | 97 6c 3a 75 a9 04 c6 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #59: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #34 | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #34 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #34 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49607.682648; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.008389 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8cc0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #34 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 "road-eastnet-nonat-34" #34: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #34) | 6d a4 8e 40 25 ac 37 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 f2 a8 cc bb ec 52 8f ff d3 4f 1e 29 f8 d2 55 | ab 15 48 e3 86 d2 3c 7c c1 31 02 4c e6 92 88 7e | 1c 57 68 2c 31 6d 99 d6 04 b4 80 d9 9e 5d d6 2f | 5a 7c 33 74 f6 a2 f4 af 71 14 01 00 45 ac 02 2c | ae fd dc f0 fb 16 b1 b8 bb b1 c9 b6 79 4a 45 9c | f4 6e 30 a0 38 dd b1 84 0e 3d b2 47 58 b0 ed c1 | 2c 5c e6 69 11 9f 94 94 7a 6d 4e 80 2c 22 d1 2d | b1 3c 47 06 4d 81 ee b9 c9 ba 0f 94 7b ed d2 71 | 8c 4b 77 a2 43 7f 68 8c 2b 66 69 53 94 cf 5a 27 | 05 7e 88 ec 42 d8 31 27 ae 04 92 bf 4a 26 5e 51 | 58 d6 5c 7a 0b 0b 73 c1 d6 39 9b da c3 56 61 4e | 3f 7e 4e 21 30 a1 53 bd c0 b7 f9 c7 e1 cc 61 3a | e9 b4 0e 5d 6b 1a 6c d3 c1 42 80 a0 b9 ee e4 20 | 50 5f 0b 18 55 d4 17 9c be 51 af c3 be 4e 5f 48 | b1 02 bd 4d 0a 84 45 32 17 0f c9 bf 50 68 f3 a6 | 11 69 ef 13 ba a2 fb dd c4 95 c8 b3 71 8c 02 9e | 29 00 00 24 20 3c 42 13 ea f1 47 8b ab 88 6c 38 | 29 a2 e3 60 5f 2e e8 36 7d 92 76 6d 48 1c fe a8 | 8c f2 3e 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 92 97 87 98 41 7a 2f 24 03 5c de | 5f 9b fc ff 10 46 f5 79 00 00 00 1c 00 00 40 05 | 10 63 6f 88 71 aa 1b 8a ba b8 d4 ac c9 e8 55 07 | 6b c5 63 c0 | libevent_free: release ptr-libevent@0x7fb348009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #34 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d a4 8e 40 25 ac 37 c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #34 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #34 | rejected packet: | 6d a4 8e 40 25 ac 37 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #34: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0735 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fa300 | handling event EVENT_RETRANSMIT for parent state #82 | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #82 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #82 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49607.707111; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.502322 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #82 | libevent_malloc: new ptr-libevent@0x7fb348009640 size 128 "road-eastnet-nonat-82" #82: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #82) | 0d 59 4a 91 cd 0d a8 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d de 62 a5 d0 5e bf 56 63 0e 91 36 97 7a 1e b1 | b4 16 cc 30 41 76 2c 4d 4b 72 e2 c2 b2 a1 f9 60 | dd 93 5e 0e 34 f7 25 c7 9f 53 30 68 3a c2 8d 97 | 4c 9d fc 02 66 0b d5 60 41 52 07 34 69 fd 84 a5 | ec 72 09 87 c6 8f 05 fb 8f 4e 6b ba 77 83 dc 16 | 60 81 0d a8 71 f3 cf c7 95 36 23 35 f7 97 ca 50 | b2 db d3 48 30 34 aa be 9a a2 37 9b 39 19 60 98 | ac 8b 67 73 12 da 16 80 58 c0 2a 80 56 eb 21 9f | 3c 3d 73 57 e9 89 d6 8c 3d 04 dc a8 2c a0 35 72 | 3a b3 ec 9f 41 04 d4 7f d9 68 36 d5 13 cd 39 04 | 57 48 05 ca 9e f9 64 20 0d 91 1f 4e 5d ee 28 d1 | 38 36 5d 35 10 47 60 e0 25 2a b4 90 4f 2b 22 f8 | 94 db c6 d0 bc a1 a8 ee 23 9e 12 7c 06 be 13 c9 | e4 f8 bb 10 03 1f 37 ab 38 d2 32 58 2a 26 f3 33 | 1c 60 32 46 6c a1 0e 88 78 61 ec 6b c9 dd e6 45 | 58 22 90 cf 6d f9 2b cd d5 02 5b 51 ea 18 fb dc | 29 00 00 24 61 df db a2 1d df 12 0c 5e ab 31 16 | 03 92 3a 6f 24 ce 35 05 3e f5 da 2f 7c 0d 1e 54 | bb d5 49 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 70 c6 55 5e 2d 9d b0 0a d9 87 23 | 4b f7 4f fa 28 d8 1e 81 00 00 00 1c 00 00 40 05 | 40 ed 3d f8 bd 8d 40 9e 57 65 9a d5 21 53 67 44 | eb 0f 4b 38 | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fa300 | #82 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 59 4a 91 cd 0d a8 c9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #82 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #82 | rejected packet: | 0d 59 4a 91 cd 0d a8 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #82: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #60 | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #60 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #60 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49607.720573; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004534 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fa300 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #60 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 "road-eastnet-nonat-60" #60: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #60) | 25 9c c0 c5 c2 ae 29 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 2c 75 39 d4 fe e8 bb 01 36 72 a5 b5 e5 a5 81 | c7 38 4b e5 4a ae c6 e0 64 23 ae a4 00 42 bd c1 | 2e 59 84 56 2c d7 14 24 66 d8 ee 01 96 14 85 e4 | 4a 5d 41 c9 bd f2 52 f7 81 ad 7f d6 d0 a1 27 d2 | 97 41 8d b3 c0 bc 77 ec 23 18 fe 60 e2 a8 0c 93 | 13 c8 08 44 38 cf 40 53 40 99 23 6d f6 02 db 2a | 6e 32 b0 2c 67 33 6c a2 f1 af da 97 e3 24 99 d0 | 08 b1 cf 27 91 4b c8 a0 67 76 74 84 3e e8 94 b8 | 9c 46 bf ee d2 a1 d1 93 0c c9 20 9b fb 9c cc 69 | d2 c3 9f 9f 32 ce e3 cd 1e a4 06 0c ce ad 3b b5 | 3d 52 01 2e 64 72 a4 a5 0d 13 96 53 80 55 c3 af | c7 4a a9 17 ce 71 79 67 8d 48 4c a9 b8 00 02 38 | 2d 7c a0 0b 36 f5 68 34 0f dd 83 6f 1d d1 e9 b9 | 9a 43 52 12 d9 b1 6e ac 6a 5e ac d3 3c 20 66 93 | 6b 7e 85 4c aa e5 92 08 98 a1 8b 28 75 13 39 85 | b8 6c 05 ff ad 0d f2 e7 73 79 5c 18 65 6b dd 7e | 29 00 00 24 a0 1d b4 bd 19 70 24 f8 23 e6 87 dc | 50 af bd f2 95 21 f1 1c 7f 4c 51 8f f3 4c 1a 81 | a9 6f fb c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d6 a7 42 56 6b af 55 7e 9e 1f c2 40 | ba 0d 74 ad 6e b0 b4 2e 00 00 00 1c 00 00 40 05 | 49 f8 c3 9d b1 df 49 97 21 c8 2e 46 27 7c d9 25 | e7 f0 a2 de | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #60 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 9c c0 c5 c2 ae 29 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #60 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #60 | rejected packet: | 25 9c c0 c5 c2 ae 29 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #60: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-90" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-90' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #90 at 0x557d46a4f650 | State DB: adding IKEv2 state #90 in UNDEFINED | pstats #90 ikev2.ike started | Message ID: init #90: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #90: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #90; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-90" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-90" IKE SA #90 "road-eastnet-nonat-90" "road-eastnet-nonat-90" #90: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-90 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-90": constructed local IKE proposals for road-eastnet-nonat-90 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 90 for state #90 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34400d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #90 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 | #90 spent 0.177 milliseconds in ikev2_parent_outI1() | crypto helper 11 resuming | crypto helper 11 starting work-order 90 for state #90 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 90 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-90" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.283 milliseconds in whack | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 90 time elapsed 0.00099 seconds | (#90) spent 0.995 milliseconds in crypto helper computing work-order 90: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 90 for state #90 to event queue | scheduling resume sending helper answer for #90 | libevent_malloc: new ptr-libevent@0x7fb36001d920 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #90 | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 90 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #90 | **emit ISAKMP Message: | initiator cookie: | 26 95 92 02 0c 74 14 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-90 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 96 ed e3 a8 eb 0c e2 00 1e b8 30 77 f5 0e ad ce | ikev2 g^x 65 c1 45 a9 f8 d6 59 16 4d 14 6e d4 77 5e 81 5d | ikev2 g^x e4 5a fa df cb d1 e9 b4 fb 7a 1b 94 96 f5 cd a1 | ikev2 g^x 92 48 08 b0 94 02 60 49 2d a3 e6 bd 87 20 3a b6 | ikev2 g^x b3 a4 42 54 6e e3 59 4f 33 f7 d9 14 23 f3 be 46 | ikev2 g^x 0e 6a b0 16 f3 25 4c 11 1c 90 dd a1 d3 04 dc 69 | ikev2 g^x 8d 39 0c 51 5f 83 72 cb 93 87 70 c9 f5 3d e0 2a | ikev2 g^x c5 11 3c 75 bc 46 e8 c6 f5 45 c5 bc bb 53 d8 9c | ikev2 g^x 7a ab 11 6e 8b 56 f1 6e cd 93 8a 23 e4 3d ba 8e | ikev2 g^x f3 e8 36 9d 53 65 3b 19 f4 e3 cc f3 54 92 3e af | ikev2 g^x 1e ea f7 7a 71 af d2 c7 14 e2 2f f0 39 fe 17 bf | ikev2 g^x 5f 5e bd 3d 44 b3 a2 13 36 c4 88 da f8 e8 06 a9 | ikev2 g^x 63 d0 49 96 b9 8b b5 05 47 2d f0 7c f0 b7 4b a3 | ikev2 g^x d9 0f 59 ad 42 e6 a2 62 85 25 36 ae 56 68 a9 08 | ikev2 g^x 18 48 13 b3 3d 8c 24 fd 03 b0 13 b0 fc 3c f6 fc | ikev2 g^x 7b 2f 36 dc 82 d7 51 c4 8b bc 56 3e 48 7c ce 7f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7b f2 d7 97 09 c8 65 d1 69 47 34 b1 55 8b 56 a2 | IKEv2 nonce 4a 71 ee 64 d5 6c 65 05 c4 2c 51 b4 b0 ab 0f 32 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 26 95 92 02 0c 74 14 ce | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5a | natd_hash: port= 01 f4 | natd_hash: hash= bf 4b f3 32 75 d7 ef f4 06 67 91 40 71 93 9a 6d | natd_hash: hash= f5 fe b0 cc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bf 4b f3 32 75 d7 ef f4 06 67 91 40 71 93 9a 6d | Notify data f5 fe b0 cc | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 26 95 92 02 0c 74 14 ce | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 99 8e 72 1b 4f e3 a6 e8 23 e7 c4 0e ce 5c a4 3c | natd_hash: hash= cd e1 15 1b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 99 8e 72 1b 4f e3 a6 e8 23 e7 c4 0e ce 5c a4 3c | Notify data cd e1 15 1b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #90 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #90: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #90 to 4294967295 after switching state | Message ID: IKE #90 skipping update_recv as MD is fake | Message ID: sent #90 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-90" #90: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.90:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #90) | 26 95 92 02 0c 74 14 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 ed e3 a8 eb 0c e2 00 1e b8 30 77 f5 0e ad ce | 65 c1 45 a9 f8 d6 59 16 4d 14 6e d4 77 5e 81 5d | e4 5a fa df cb d1 e9 b4 fb 7a 1b 94 96 f5 cd a1 | 92 48 08 b0 94 02 60 49 2d a3 e6 bd 87 20 3a b6 | b3 a4 42 54 6e e3 59 4f 33 f7 d9 14 23 f3 be 46 | 0e 6a b0 16 f3 25 4c 11 1c 90 dd a1 d3 04 dc 69 | 8d 39 0c 51 5f 83 72 cb 93 87 70 c9 f5 3d e0 2a | c5 11 3c 75 bc 46 e8 c6 f5 45 c5 bc bb 53 d8 9c | 7a ab 11 6e 8b 56 f1 6e cd 93 8a 23 e4 3d ba 8e | f3 e8 36 9d 53 65 3b 19 f4 e3 cc f3 54 92 3e af | 1e ea f7 7a 71 af d2 c7 14 e2 2f f0 39 fe 17 bf | 5f 5e bd 3d 44 b3 a2 13 36 c4 88 da f8 e8 06 a9 | 63 d0 49 96 b9 8b b5 05 47 2d f0 7c f0 b7 4b a3 | d9 0f 59 ad 42 e6 a2 62 85 25 36 ae 56 68 a9 08 | 18 48 13 b3 3d 8c 24 fd 03 b0 13 b0 fc 3c f6 fc | 7b 2f 36 dc 82 d7 51 c4 8b bc 56 3e 48 7c ce 7f | 29 00 00 24 7b f2 d7 97 09 c8 65 d1 69 47 34 b1 | 55 8b 56 a2 4a 71 ee 64 d5 6c 65 05 c4 2c 51 b4 | b0 ab 0f 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 4b f3 32 75 d7 ef f4 06 67 91 40 | 71 93 9a 6d f5 fe b0 cc 00 00 00 1c 00 00 40 05 | 99 8e 72 1b 4f e3 a6 e8 23 e7 c4 0e ce 5c a4 3c | cd e1 15 1b | state #90 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34400d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #90 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 | #90 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49607.735652 | resume sending helper answer for #90 suppresed complete_v2_state_transition() and stole MD | #90 spent 0.464 milliseconds in resume sending helper answer | stop processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36001d920 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 95 92 02 0c 74 14 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #90 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #90 | rejected packet: | 26 95 92 02 0c 74 14 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #90: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #35 | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #35 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #35 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49607.744861; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004936 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a205f0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #35 | libevent_malloc: new ptr-libevent@0x7fb36001d920 size 128 "road-eastnet-nonat-35" #35: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #35) | ef 15 ea 36 a5 a5 5c 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 96 b3 aa c0 4d d9 88 e5 ac e1 94 c5 3f 96 d9 | b4 11 6c 13 85 3c 47 49 a4 e7 6c bf 49 2c f7 e6 | 82 c1 3a 00 a1 f9 46 f7 54 13 9f 65 48 18 8b 9f | e6 da f8 f3 07 a0 ac 41 d5 a9 3b e6 a7 7c a3 81 | db 32 9e 99 47 70 04 b0 f4 2d a4 b0 a4 3b e1 28 | 9f 63 a2 94 b7 1f 9e 68 18 47 6f ef 05 c0 65 15 | cc 6b 7e 6d 5e e8 2a 06 87 47 6c aa e2 89 a2 b1 | 87 d5 9a c7 5c f6 c5 c9 ef 9a f5 1e 14 44 ed f6 | 21 c2 10 91 92 32 f4 48 3d 48 76 7f da 54 41 70 | 3a 27 f3 0e a6 36 ab ef 51 4a ee 27 f3 fa b5 4a | 81 80 97 f8 12 4a 6b 6e 11 f7 41 fe d5 56 ec af | 7e dc 33 c0 77 e2 37 b5 3f fc b0 40 58 cb 92 b6 | 44 3d 99 0d 17 ae 15 bb a7 c0 2c 1d dc 42 f0 67 | d6 5a 17 88 ce 32 f6 da 90 65 b7 17 83 70 da 67 | c5 33 42 42 d7 1a 6c 70 ed 40 df e9 ee 39 2a 8f | f5 b4 db 3f e7 42 51 2e 4d a9 fe 76 ba 09 20 58 | 29 00 00 24 f0 8c e1 d2 ee 2f 9e 4d 17 8a 20 ca | cf 55 95 6a 83 c3 98 8f db 61 db bb f1 69 5e b0 | e6 61 e7 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 5c ea 28 17 8f c3 f5 57 90 ad 1e | 3a ae c2 e5 e1 92 7b 3c 00 00 00 1c 00 00 40 05 | cb 88 24 12 73 0e 41 cb fe 6b 7e d6 a5 c0 bb a2 | e1 60 1e c0 | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #35 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 15 ea 36 a5 a5 5c 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #35 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #35 | rejected packet: | ef 15 ea 36 a5 a5 5c 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #35: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0798 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1da10 | handling event EVENT_RETRANSMIT for parent state #75 | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #75 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #75 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49607.759244; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002018 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #75 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 "road-eastnet-nonat-75" #75: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #75) | d6 96 43 68 6a ec ab 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b e7 f0 1b 8c 0a 12 dd d6 e5 bf 02 28 26 dd ac | 6b 5a 27 84 cc 5b e1 51 a5 48 25 1e 64 a9 f9 15 | a7 cf bd df a0 ad 76 b9 f4 06 07 4e 82 21 11 6b | 26 3f e9 d5 c8 28 2c a1 f2 de e8 cf 1b 66 10 aa | 48 33 36 9a e1 15 5a 5f 6d a7 50 58 f0 d8 c9 11 | b2 31 61 66 dc 13 e3 c7 ff 39 58 4c c1 88 d6 62 | 58 b9 1d ad d3 89 b6 21 d6 53 4e 88 4f 41 13 08 | 17 e6 d6 6a c0 94 05 0a ca 81 fd 84 5a f1 98 1e | b0 e9 8c 00 0a 4a 9c 8f 68 9e 7b 0d 09 60 4d 06 | b0 a8 a6 4f 85 49 38 bb ac 0a 4e 89 c8 a9 1a ef | 21 bd 3e 11 8d 34 77 94 db 0a 8d 1b 25 93 bc 6d | 26 8e 7b 5a 1c a6 da 04 b8 b9 68 16 5d 98 25 e7 | 4f 1c fe b2 4a 85 cb fd 7d 24 86 89 1b f6 19 0f | c0 e3 71 1b 57 41 f6 79 be 0c 81 b2 d6 8d b1 21 | 0e f7 f7 b1 1e d7 c5 ff e7 e6 4b 6a 5e 29 e6 f5 | 33 d7 87 e4 a6 ee a9 a9 4b 11 cd 2e d2 b6 0a d2 | 29 00 00 24 80 4b a3 25 3b 73 08 25 20 19 cd 1b | 6b 4a 3a cd 29 5e ac 55 94 fe 42 a8 a3 13 30 97 | 0f 50 65 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 04 fe 2e 3e a3 d6 9c 0e cd 5a 49 | b4 f8 ac 71 05 8a 92 ef 00 00 00 1c 00 00 40 05 | 56 54 de 54 0a a0 dc 64 96 23 cc 19 a1 e6 37 21 | c0 78 fa 6f | libevent_free: release ptr-libevent@0x7fb37c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1da10 | #75 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 96 43 68 6a ec ab 11 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #75 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #75 | rejected packet: | d6 96 43 68 6a ec ab 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #75: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0739 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #83 | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #83 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #83 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49607.764611; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500345 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1da10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #83 | libevent_malloc: new ptr-libevent@0x7fb37c00cf80 size 128 "road-eastnet-nonat-83" #83: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #83) | e6 2b 97 c6 d1 4c 13 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 e0 14 c2 4a 13 d8 77 12 b1 93 fe 09 ee 1d 88 | 31 85 5e 91 48 ad b1 20 71 3f cb af eb 92 c7 d3 | e3 3b dc e2 9e c2 45 29 c9 59 6d 7a 62 12 34 26 | 8c eb c3 61 ed 07 95 b3 f8 74 eb 61 63 eb 1c b2 | 60 84 c3 e0 69 12 37 aa 40 a9 ee 46 d3 1a 26 fd | 77 29 43 bd fd b4 e3 3b c7 a8 7e e9 e3 51 f4 e6 | b9 4a 57 59 1d 18 ef df e9 5a be 77 08 df e7 55 | 46 7f 6c 4f 13 29 e4 bb ef bd 6c fb 60 8b fc 62 | e9 ba c0 54 d3 2b 44 c6 2f 29 d7 34 b4 6b 61 c0 | c9 cb 1e cb a6 25 28 61 95 9e 2c f5 86 69 f9 7c | b8 7c 34 c0 e0 ed f4 f7 82 f9 b3 c4 8e 1a 55 fb | d8 ed 0f e9 ed ff da 76 3e bb 0b ca e5 d5 7e 00 | 28 52 cc 3e d7 7f e9 d9 c5 bd e9 a7 17 e5 95 51 | 9f 9f 95 b4 65 d9 e7 b3 d2 a5 c2 fe 86 92 6e 23 | 5c 06 60 94 75 50 49 bf 5b 48 f5 bd b4 b4 de 5e | dd 11 02 11 73 fd f3 0f cb 43 d1 ff 6c 2f 1d fa | 29 00 00 24 d9 ea 5f 5d e7 8b 27 ca 82 31 28 fd | 7a 4f 51 83 32 9a 18 8a 6e 2a 8b d4 95 e6 d6 b1 | 0f 0b a2 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf 83 ee f4 b4 fb 0f 43 eb c7 c4 87 | aa a0 5e 5c f1 0e 63 f4 00 00 00 1c 00 00 40 05 | 05 b9 81 d9 1f fe b2 68 6c 59 f2 c5 07 41 cc 9a | 8a 8b 10 9b | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #83 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 2b 97 c6 d1 4c 13 c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #83 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #83 | rejected packet: | e6 2b 97 c6 d1 4c 13 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #83: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0715 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #61 | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #61 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #61 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49607.778972; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002771 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #61 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 "road-eastnet-nonat-61" #61: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #61) | f7 bc 52 c3 08 41 7d fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 a3 fc 88 6c c9 17 99 e8 c8 f4 84 4b dd e6 d6 | a2 3c cb b6 7d b8 4b 73 4d d1 4a 52 0a 17 63 b0 | ce a1 f6 5b 22 20 08 31 0e da ec fd b8 c2 13 f9 | b7 0d 78 21 3f 05 bc f7 2c 5a 0e b5 1a 70 bf 53 | b0 72 5e 64 9f c9 e5 f6 6b aa f3 db 8b b8 b8 b3 | f6 f8 ae 22 20 f7 35 9c 39 6d 5a ba 98 af 4b 1d | 6d d4 8e 29 87 bb 7a 2b 6b 4a b8 79 51 26 39 b0 | 6a 6c be 49 5f 57 bf 03 7a 6e 7f ac 45 f9 af fb | a3 06 52 bf 07 ef a5 db 3d b8 9b 73 f0 8e b1 76 | 2b 5d b7 93 de 9f 59 44 c1 67 8a 9a a5 50 66 6c | 27 3e 5e 44 b1 e9 13 dc 81 57 82 47 20 a2 32 79 | d4 b0 d6 87 f1 f1 20 bf e9 93 fc 11 dd 5e 42 b0 | a4 4f 0e f8 93 a1 1c a5 59 56 db 69 8d ca d0 53 | 78 b2 af e6 28 15 c5 c9 00 fd bf f0 33 a6 bf 2d | 7e 87 d7 d1 a0 82 65 91 eb 3c cf d0 6f fb 0e 4b | 57 a1 5c 8a 3f 3c 13 19 f1 bc 6c 89 96 42 e0 e9 | 29 00 00 24 30 62 04 12 b8 d1 41 8a 1d 82 4c c7 | f3 e8 92 81 d6 0e cc 31 5a f2 7c 04 56 a0 26 04 | e6 c5 8a 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 04 89 46 c0 2a 68 09 d3 b8 a6 1e | 7d d4 48 56 88 7a 56 d6 00 00 00 1c 00 00 40 05 | bb 1e 0b f8 57 9c 2b 42 0a de e4 96 f3 8b 61 81 | fa a3 7d bc | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #61 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 bc 52 c3 08 41 7d fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #61 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #61 | rejected packet: | f7 bc 52 c3 08 41 7d fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #61: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-91" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-91' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #91 at 0x557d46a50c10 | State DB: adding IKEv2 state #91 in UNDEFINED | pstats #91 ikev2.ike started | Message ID: init #91: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #91: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #91; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-91" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-91" IKE SA #91 "road-eastnet-nonat-91" "road-eastnet-nonat-91" #91: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-91 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-91": constructed local IKE proposals for road-eastnet-nonat-91 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 91 for state #91 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a02770 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #91 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 | #91 spent 0.14 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-91" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.215 milliseconds in whack | crypto helper 16 resuming | crypto helper 16 starting work-order 91 for state #91 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 91 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 91 time elapsed 0.000982 seconds | (#91) spent 0.987 milliseconds in crypto helper computing work-order 91: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 91 for state #91 to event queue | scheduling resume sending helper answer for #91 | libevent_malloc: new ptr-libevent@0x7fb36401f860 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #91 | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 91 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #91 | **emit ISAKMP Message: | initiator cookie: | a6 f1 37 27 17 86 c6 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-91 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8e 6a 94 73 f6 c2 01 42 8c 6e f6 05 6f 1c e2 ee | ikev2 g^x 38 45 16 e5 f6 17 c9 fc 07 cc bc 0b 02 da 35 c8 | ikev2 g^x 5a ca 9d 87 29 53 47 69 49 7f 31 f0 fb ce e2 59 | ikev2 g^x 00 57 9b 32 9e 1f da 4b f7 41 b5 05 14 af c4 d7 | ikev2 g^x 09 7f 69 01 a0 cd 93 57 e5 a7 fd 93 a9 9e c3 fc | ikev2 g^x b0 af f5 37 11 6f 2b 38 a8 2a 8b 37 b3 e6 bc bf | ikev2 g^x 0c 06 37 86 ca f2 b6 b0 ed 1e 3f d6 8a f0 0b f9 | ikev2 g^x e8 80 df 35 d6 a2 36 c0 a2 dc a4 1a ca 7d d9 0b | ikev2 g^x 6f fc 29 fc 92 12 f8 05 c1 88 8e 81 27 4a 61 62 | ikev2 g^x c3 16 fc 6e 5e a6 59 bf d1 b1 ad d5 92 05 c4 60 | ikev2 g^x 2f 54 a3 71 e0 ec ca 5d 37 16 ec 5f ec 37 29 2d | ikev2 g^x 46 5a 04 10 84 ad 36 aa 07 ca f2 60 8b 7c ac f8 | ikev2 g^x ac e2 8b a3 69 23 74 f2 d2 2d c5 0d 51 9b 2c 7f | ikev2 g^x 42 45 54 c3 ec 3d 44 63 f0 0a ec ff b3 69 48 ee | ikev2 g^x 22 28 aa af 72 8c cd ca 9e 3c dd f6 ac 2b 6f b7 | ikev2 g^x a1 90 21 32 ae b8 23 39 1e cc fe 3e d6 b6 21 70 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 29 05 58 2b f0 ba fb 18 77 b3 53 8d 8b 05 bb 0a | IKEv2 nonce 8a c5 e8 dc 24 17 58 d9 a6 60 c9 1d bc c9 21 d8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a6 f1 37 27 17 86 c6 13 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5b | natd_hash: port= 01 f4 | natd_hash: hash= f2 d0 cc 50 f7 83 7e b1 80 37 a7 4b da df 68 8f | natd_hash: hash= 62 b7 e5 89 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f2 d0 cc 50 f7 83 7e b1 80 37 a7 4b da df 68 8f | Notify data 62 b7 e5 89 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a6 f1 37 27 17 86 c6 13 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 8a 41 f9 2e 73 42 40 08 8e 79 f6 3e 7a 3f 48 7e | natd_hash: hash= 67 86 16 af | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8a 41 f9 2e 73 42 40 08 8e 79 f6 3e 7a 3f 48 7e | Notify data 67 86 16 af | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #91 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #91: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #91 to 4294967295 after switching state | Message ID: IKE #91 skipping update_recv as MD is fake | Message ID: sent #91 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-91" #91: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.91:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #91) | a6 f1 37 27 17 86 c6 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 6a 94 73 f6 c2 01 42 8c 6e f6 05 6f 1c e2 ee | 38 45 16 e5 f6 17 c9 fc 07 cc bc 0b 02 da 35 c8 | 5a ca 9d 87 29 53 47 69 49 7f 31 f0 fb ce e2 59 | 00 57 9b 32 9e 1f da 4b f7 41 b5 05 14 af c4 d7 | 09 7f 69 01 a0 cd 93 57 e5 a7 fd 93 a9 9e c3 fc | b0 af f5 37 11 6f 2b 38 a8 2a 8b 37 b3 e6 bc bf | 0c 06 37 86 ca f2 b6 b0 ed 1e 3f d6 8a f0 0b f9 | e8 80 df 35 d6 a2 36 c0 a2 dc a4 1a ca 7d d9 0b | 6f fc 29 fc 92 12 f8 05 c1 88 8e 81 27 4a 61 62 | c3 16 fc 6e 5e a6 59 bf d1 b1 ad d5 92 05 c4 60 | 2f 54 a3 71 e0 ec ca 5d 37 16 ec 5f ec 37 29 2d | 46 5a 04 10 84 ad 36 aa 07 ca f2 60 8b 7c ac f8 | ac e2 8b a3 69 23 74 f2 d2 2d c5 0d 51 9b 2c 7f | 42 45 54 c3 ec 3d 44 63 f0 0a ec ff b3 69 48 ee | 22 28 aa af 72 8c cd ca 9e 3c dd f6 ac 2b 6f b7 | a1 90 21 32 ae b8 23 39 1e cc fe 3e d6 b6 21 70 | 29 00 00 24 29 05 58 2b f0 ba fb 18 77 b3 53 8d | 8b 05 bb 0a 8a c5 e8 dc 24 17 58 d9 a6 60 c9 1d | bc c9 21 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 d0 cc 50 f7 83 7e b1 80 37 a7 4b | da df 68 8f 62 b7 e5 89 00 00 00 1c 00 00 40 05 | 8a 41 f9 2e 73 42 40 08 8e 79 f6 3e 7a 3f 48 7e | 67 86 16 af | state #91 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a02770 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #91 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 | #91 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49607.81437 | resume sending helper answer for #91 suppresed complete_v2_state_transition() and stole MD | #91 spent 0.467 milliseconds in resume sending helper answer | stop processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36401f860 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 f1 37 27 17 86 c6 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #91 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #91 | rejected packet: | a6 f1 37 27 17 86 c6 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #91: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0eb30 | handling event EVENT_RETRANSMIT for parent state #36 | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #36 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #36 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49607.814487; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003287 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47e90 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #36 | libevent_malloc: new ptr-libevent@0x7fb36401f860 size 128 "road-eastnet-nonat-36" #36: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #36) | c4 93 27 79 3b f0 36 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 44 1e 02 70 5f fd 14 41 57 b4 33 c5 4d c1 bf | 56 a3 d0 f5 4b 1b 15 73 5b 56 52 91 f2 4c 9d dc | 3f 2d 5a 36 27 be 97 1b 2d 43 21 16 b5 25 60 73 | 31 d7 04 cb ac b3 fd 19 61 2f 36 91 05 d7 55 8c | 92 5d 99 4b ae f6 cf a1 6e 2e de fa cb a4 7e 7e | b4 08 08 4f 90 51 13 b7 5b cb 7e 2c db 61 c5 d9 | d2 2f 86 cb df 97 d1 5e d4 95 3b c2 71 e2 2b bf | 7b e5 e9 8b bd 5c de 24 ac 5a 8b 4a 5d 3b ff 1e | f8 f4 2b 7b 96 0c 02 8f ac d9 62 f7 21 fb 07 5e | 9d 3f 41 15 d1 79 65 31 2a 68 5a 1a 56 fc 9c 2a | 20 90 63 93 fd d9 59 08 0d 3a 51 cc ee 1b ca 83 | 3c 5f 8f 03 9c cf 6f 04 52 23 a8 cb 50 43 72 18 | 78 cb 0f 8d bf 67 75 81 61 d9 91 a3 5f f5 1e ad | 09 8c 98 32 17 11 19 f3 54 f2 c6 36 e6 24 63 e2 | 41 b5 39 5c af a7 57 20 af 37 ac c1 12 94 ec 3a | e0 ac a7 07 42 78 d2 32 96 5c a0 ed 7e 90 04 46 | 29 00 00 24 e4 05 e8 ad 6f 35 18 e8 9c ba 2a d7 | ba f9 eb 8c c3 7b 43 88 9a 23 1f e0 cb de a0 8e | 76 67 65 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab a4 b2 11 db 45 90 fb 99 ab 4d 81 | 85 c6 e5 03 d5 18 31 7d 00 00 00 1c 00 00 40 05 | 9e c9 75 d2 3b 5d 13 cd bd fe b5 96 1f 79 bf 21 | fa a0 06 d7 | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0eb30 | #36 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 93 27 79 3b f0 36 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #36 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #36 | rejected packet: | c4 93 27 79 3b f0 36 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #36: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0551 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #84 | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #84 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #84 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49607.825756; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500799 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47ed0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #84 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 "road-eastnet-nonat-84" #84: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #84) | 1f 2f b6 8b 51 48 06 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 1f 67 e9 76 20 6a 2b f7 ad 13 77 97 e1 68 87 | e9 75 71 19 c9 83 f3 73 fb 25 68 00 8c ff f8 c9 | 1d 39 8c aa 48 91 67 ae d7 68 2a 58 40 8a 8f c7 | 80 6c 8a 0d 2c 34 0e dd 31 f9 0d 20 54 ae b8 ad | f3 e5 66 87 27 c1 b9 3b f7 7e 5f 91 9e 13 72 c4 | fb 1c ec 84 d9 28 50 4e 83 04 2b 64 28 38 b2 c3 | 26 3d 3f fe b0 3a 31 93 a2 da 74 58 0f e3 c4 e7 | 1b d4 4a 7b 98 e4 bf 2d 17 77 1c c7 60 c6 cd f4 | a4 b3 3e 33 44 58 50 ab 79 af 8a 67 8e c3 a4 76 | 74 f4 47 b0 6e 53 b7 1d 0a 98 f8 36 13 56 c4 89 | c8 ca cc fb f1 a4 98 cd 59 ff 4a e3 78 5d 3c 67 | 86 c4 70 68 e1 a0 3e 7b 7f c1 2f 3d a4 0d c2 c5 | bd ed 93 ba 2d ff bd 57 2f b9 ac d7 dc 77 9f ae | 61 e7 8a 25 fb 95 fa b6 ae 27 5d f2 7d 25 5c 37 | cd dc a1 e7 01 66 ba 0c 28 2e 4b 30 85 a4 73 58 | f5 b4 a3 77 ea dd 82 87 c2 5d 3f 72 7d 74 36 cc | 29 00 00 24 76 ac e1 c3 58 b8 41 7b 54 b2 2a 6d | c8 c8 51 a4 ca 16 83 ce 76 9e a1 e9 43 b8 d3 34 | c3 53 e0 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f 3a 1a f8 04 5d 3c b5 2b e1 4e ab | 33 49 9d 7d 4f 74 a2 8f 00 00 00 1c 00 00 40 05 | 1b c4 6f 3a e9 14 b6 7b 2a e7 ad b0 65 58 df 39 | fd 38 92 37 | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #84 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 2f b6 8b 51 48 06 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #84 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #84 | rejected packet: | 1f 2f b6 8b 51 48 06 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #84: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0564 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a272b0 | handling event EVENT_RETRANSMIT for parent state #76 | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #76 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #76 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49607.830111; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003087 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #76 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 "road-eastnet-nonat-76" #76: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #76) | 08 23 b8 f6 73 09 18 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 b3 88 98 c3 00 3b ee 78 d3 a9 62 79 c8 5e 50 | ca be d3 60 b9 ac ef b3 70 f2 72 51 6e d0 6f e7 | 76 2f 02 45 ea 0c 3e b7 a1 fa 9a de 13 7f 48 f6 | 9a 0d 43 96 53 05 8a 3f 59 81 18 a2 54 08 83 e6 | b2 23 5b f0 fb 8a 5c 92 dc 0e cf 01 e1 94 34 22 | c2 e0 dc ae e5 0d ab a5 e1 89 bb 62 bf 90 17 bf | 34 96 56 44 a4 0c 23 a8 83 ef d0 4c 0b 33 57 7c | 55 bb 56 dc a3 43 8f 68 ba 01 38 40 7f c5 c5 3f | 05 89 dc 6e 0f 54 d6 e4 1f 39 ed af 78 c0 40 5e | de 96 c5 64 7e 4a 03 ee be b0 cb 81 ef de ed 18 | d9 e4 a5 05 6d 9a 00 f2 6a ea 28 7f 9c 2d 97 a0 | 10 8c cf d6 69 56 ba cb c7 fa 65 c6 5b b9 83 ba | f4 70 1e a9 02 08 4b 23 06 c6 59 e2 2c c1 32 a4 | 3b f4 b6 34 0c f2 27 38 ff 60 3f ff db da aa 0d | 54 69 d6 85 b5 50 9d 06 87 5b 28 9b f1 40 e5 16 | 60 3a e9 e8 52 ec 8a 8f b6 c8 a1 d2 cd ff f5 a1 | 29 00 00 24 15 3e 8d 58 5c 16 4e 6b 9c 08 25 92 | 8d ef 80 f2 25 ea cd 1e ba c6 95 f9 1b a7 f2 dd | 45 1d 12 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 8b 52 aa 3c 87 b6 df df 8c 81 fe | ec 85 60 df 06 8e 81 b3 00 00 00 1c 00 00 40 05 | 54 01 aa b8 56 eb 7a 7b 30 98 73 ed 67 e2 36 06 | bd 7f 30 ed | libevent_free: release ptr-libevent@0x7fb37801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a272b0 | #76 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 23 b8 f6 73 09 18 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #76 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #76 | rejected packet: | 08 23 b8 f6 73 09 18 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #76: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0572 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f7760 | handling event EVENT_RETRANSMIT for parent state #62 | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #62 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #62 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49607.845436; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003806 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #62 | libevent_malloc: new ptr-libevent@0x7fb37801d920 size 128 "road-eastnet-nonat-62" #62: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #62) | a4 88 8e 77 b1 f4 8c bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 16 5e 67 aa cb b3 98 fe b6 e6 44 1a 07 e2 be | 44 c7 a0 47 e1 e7 ec b4 60 c9 7d b0 5b 56 2d 1b | e4 9a 0e 63 18 22 7a fa a9 c7 63 82 b0 af 0b 0d | 77 29 15 f5 8e 1b 69 90 f4 7c 19 86 79 0a 5f e8 | f6 12 ff 9f 31 22 5c e3 f7 e6 5c 40 a8 f4 37 ed | 38 af f3 38 7f df 64 d9 95 08 2b d7 e3 b5 1f 60 | 26 37 fe 9a 98 33 04 94 0b 0e 07 08 c5 5e 7d f8 | c0 0f 76 eb 24 9a 96 24 01 c7 9b fd dc 2c ed 1c | 7f 8c f6 fb 9d b0 c1 a4 53 e2 53 da 53 65 1f 9e | 4e d5 a4 5d a2 34 99 86 95 17 7b b9 d0 eb c5 9a | 7a c4 fd c2 ec 45 e1 8d 1b 55 bb 91 5f 61 39 83 | ed 3e fd ec 0b 7f cf a5 d0 34 4d 78 f0 19 f9 dd | 25 c0 20 38 67 61 04 4f 0d 51 42 43 cb 7c 44 01 | 6b 99 d1 a6 d3 b1 5e 29 d8 c7 53 4a 9e 9d fe 70 | 66 03 05 bd 1d 96 be 53 72 9a fa 30 50 08 24 ae | eb 69 31 f0 f7 2f d9 1c ab 9d 37 cd ad 7a ed 6a | 29 00 00 24 0c 26 e7 cd 38 ca 58 e6 02 58 43 30 | ae e2 2c 6c 6d 36 d5 ae 9b 11 96 a7 26 d9 7a c2 | 05 18 d0 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 28 4f 82 49 71 8c 73 8e 61 ba dd | 8f a7 28 9b 76 c2 13 ce 00 00 00 1c 00 00 40 05 | 01 46 1c d3 66 df 29 38 51 83 6e 7c d6 51 6d 46 | 6c 4e be 2f | libevent_free: release ptr-libevent@0x7fb3480180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f7760 | #62 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 88 8e 77 b1 f4 8c bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #62 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #62 | rejected packet: | a4 88 8e 77 b1 f4 8c bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #62: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45310 | handling event EVENT_RETRANSMIT for parent state #85 | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #85 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #85 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49607.886837; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501383 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d590 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #85 | libevent_malloc: new ptr-libevent@0x7fb3480180b0 size 128 "road-eastnet-nonat-85" #85: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #85) | b7 4f d7 db a6 e2 bd 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 c8 89 a4 0b 04 f2 b9 62 f8 58 f1 1c 0c 91 1a | aa 25 df 1a e7 a5 32 9d 0b b5 9b 93 ab d7 64 b6 | 7e 0d ee f0 b5 83 e8 90 d8 94 b7 d1 ea 05 1c 4f | 85 63 ef bf 80 da 59 c5 18 c9 fd 82 f7 cd 12 c7 | ec b4 9e 35 b0 0c 13 ac 89 c3 d8 6c 14 b9 3b f7 | 41 eb 65 45 c9 66 0a f2 c7 e9 1b 09 a2 d5 ad 2e | 24 aa 0a a8 48 81 8f bc 8d df 3f 90 a2 d2 26 b2 | 84 b7 2d b6 67 ac 5a fa 85 04 e2 96 e3 0b 1d f3 | b9 b5 0f f0 5b d4 c6 d3 b2 9b d4 ad e6 94 18 68 | bf f6 64 ed 26 d4 b7 68 7f a4 94 0e af 4c 0c b4 | 64 91 32 f4 da 5b 38 c2 84 b3 fe 0e e5 1b 3f a5 | 6b 83 a5 f2 b9 7d 21 72 89 70 28 f2 d4 86 bb fd | 03 43 fe f4 4e 6c 9c 49 29 03 b2 15 2f 72 ba 73 | 18 d4 39 82 08 55 da c3 e4 86 cb d0 04 31 94 6a | f5 7b 4a de 4d 49 5a 6d 51 3e 71 b4 0d e8 2e 33 | 9f 26 4a 91 c4 9b 06 1a 88 4b 6e 77 93 8a 7d ed | 29 00 00 24 af e3 01 7b 71 cd 34 07 4b 0a a0 9b | 85 75 4e ed b9 b3 c5 7d 83 a1 ee 6b 3c aa 39 e2 | 0b 8b fa b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 41 7b 44 0a d6 6d 6a b0 b1 8e ad | b0 c3 33 77 45 ba 39 18 00 00 00 1c 00 00 40 05 | 63 0f 1e f2 8f 76 1d 60 09 1e 0d 94 28 78 d8 b0 | 16 5a de 8a | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45310 | #85 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 4f d7 db a6 e2 bd 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #85 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #85 | rejected packet: | b7 4f d7 db a6 e2 bd 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #85: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0656 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ef4e0 | handling event EVENT_RETRANSMIT for parent state #37 | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #37 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #37 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49607.888169; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004341 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45310 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #37 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 "road-eastnet-nonat-37" #37: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #37) | 17 02 22 e9 ab 5b 91 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f f0 24 04 15 84 3f 8d a0 47 69 89 53 1c 67 b8 | 33 2a a4 f5 84 95 fd 12 c4 95 3c eb 03 f8 76 46 | 15 20 9b c5 17 a5 48 da 05 b3 14 87 45 a5 03 ce | 15 45 04 84 4f ce c5 7f 7f d9 f6 69 e6 fa 2a ce | 98 6a 3f d1 cc fe 7f e2 41 fd 61 7b af af 30 7e | 0a 75 d2 92 05 56 ed e9 09 bd bc db cd 80 58 20 | 86 cc 39 bd f2 1c dd 9d 77 bb 28 c3 7e a4 97 11 | 86 79 5d 68 34 e4 33 4c b3 b1 ed 26 ab a1 c5 7d | dd f5 b8 0e 55 cd f4 1f ea 00 32 c8 4b fd 8f a5 | 71 8b 05 79 0a 34 41 68 bd c7 7d 96 51 77 5e 6b | d9 65 0d cf f7 34 f5 5b 4b bf 3e ae f6 63 25 2e | ea 9e 2a 3f 64 43 4d 0c 4a de f8 57 38 d7 5a c8 | 89 09 d3 81 3b 61 a8 5e 87 ab 34 9f c0 a6 2e 8e | a4 55 d9 e8 61 49 db 19 2f a0 89 a1 e6 24 e6 14 | 77 4b 63 b1 94 0b fe b9 37 07 5d a5 3f f4 4e 97 | 2a 98 e3 ca 6e 7f 3f a3 88 c3 da 3a c0 a1 79 c5 | 29 00 00 24 75 33 7f 61 eb 0d 1b f9 84 ec ca bb | af cf f0 96 3c 65 2f 09 ef 72 4a c4 05 f7 86 9b | fc 7f 3c 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 5d ed 76 d7 41 0c 3c 88 ec 15 de | 69 08 6f 06 52 19 de 0f 00 00 00 1c 00 00 40 05 | 52 bb 9d ab bf 18 49 c2 17 f2 d0 27 18 10 66 1c | c7 07 9d fe | libevent_free: release ptr-libevent@0x7fb36c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ef4e0 | #37 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 02 22 e9 ab 5b 91 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #37 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #37 | rejected packet: | 17 02 22 e9 ab 5b 91 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #37: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000d120 | handling event EVENT_RETRANSMIT for parent state #77 | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #77 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #77 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49607.889441; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000992 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #77 | libevent_malloc: new ptr-libevent@0x7fb36c00cf80 size 128 "road-eastnet-nonat-77" #77: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #77) | 4f f7 57 30 7e 30 db a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 14 f0 66 5e 0a 53 d9 86 47 70 5a 8a 73 bc cb | 52 bc 3f 13 31 b6 9a 6b ff ca f8 2e b7 f0 48 d4 | 77 e7 4c 8e 73 e9 11 6d 0b d9 88 30 75 88 11 48 | 3e 3b 98 fa 3c 66 3a 0b 64 a6 08 cb b7 12 5b 20 | d5 1b 40 67 18 3f 33 02 0f 4c 76 b1 96 fb 38 53 | 46 2f 32 4f 32 aa f2 f1 c1 7e 1b a3 93 84 38 d3 | 1e e6 5e 44 4e 6a 52 d2 5d 7c 9d 39 17 98 69 cc | ec 36 94 6b e8 33 1d ce 1b 8f 5c 7f dd d4 89 82 | 85 a6 1d ff 6c 9b 05 f9 47 a5 19 cd c4 fd 29 1a | 81 51 1f 14 ac 62 dd 33 b1 29 91 3b e8 1b 12 6e | ed 37 99 ae 6f 7a c8 95 71 30 61 a1 ef a5 33 55 | ef 40 50 d8 41 20 80 d2 32 15 fe 53 0a 4d 72 3e | a0 4f 5d 9d 14 7f 1b d9 8a 58 bc 3b 06 b1 c0 d6 | 7a 44 d2 2e f1 5d e3 62 b2 7b f9 e3 44 aa 80 9c | 12 99 76 f5 03 a4 33 27 55 fb 36 b5 80 18 d9 30 | de 03 51 b8 74 0a cb fb 17 be 0d a8 1c 8a af f0 | 29 00 00 24 70 06 ac 37 52 b8 ec 28 7d 6d 81 11 | 1b 1b 6d ce ed 39 8f ce a3 eb 17 d2 32 09 4a 8f | f1 a8 0e 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 42 86 64 cb f7 df d8 ee 6f 6b 28 | 69 76 6e 6d 07 28 e7 b4 00 00 00 1c 00 00 40 05 | cd 8e d4 a4 9f b1 74 d8 7d 8d 61 97 d8 57 39 f7 | 36 5a 1d 66 | libevent_free: release ptr-libevent@0x7fb360012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000d120 | #77 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f f7 57 30 7e 30 db a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #77 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #77 | rejected packet: | 4f f7 57 30 7e 30 db a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #77: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0578 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-92" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-92' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #92 at 0x557d46a521d0 | State DB: adding IKEv2 state #92 in UNDEFINED | pstats #92 ikev2.ike started | Message ID: init #92: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #92: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #92; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-92" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-92" IKE SA #92 "road-eastnet-nonat-92" "road-eastnet-nonat-92" #92: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-92 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-92": constructed local IKE proposals for road-eastnet-nonat-92 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 92 for state #92 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36000d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #92 | libevent_malloc: new ptr-libevent@0x7fb360012840 size 128 | crypto helper 4 resuming | #92 spent 0.145 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 starting work-order 92 for state #92 | RESET processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 92 | RESET processing: connection "road-eastnet-nonat-92" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.242 milliseconds in whack | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 92 time elapsed 0.000951 seconds | (#92) spent 0.956 milliseconds in crypto helper computing work-order 92: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 92 for state #92 to event queue | scheduling resume sending helper answer for #92 | libevent_malloc: new ptr-libevent@0x7fb35801d920 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #92 | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 92 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #92 | **emit ISAKMP Message: | initiator cookie: | 07 61 83 69 17 8d a7 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-92 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 66 13 06 9b 22 b9 09 02 07 4e 56 e2 9a 05 b7 70 | ikev2 g^x b7 25 ba 3c e0 d7 4b 41 68 60 e2 84 fa 7d 2e 53 | ikev2 g^x 6d 05 81 6c 1d a6 11 6c f3 c1 91 94 93 3c 04 e1 | ikev2 g^x 47 48 3f a6 f9 c1 bd d3 55 1c 44 87 99 6c 2b ee | ikev2 g^x 1a fc ef da ca ee 71 5f 90 30 42 cf 28 4f 89 1f | ikev2 g^x 86 f8 61 c0 95 c8 84 9c 1c 5f 1c 12 41 c6 05 de | ikev2 g^x 97 e9 89 32 6b 06 59 ff 06 2b 2f 06 a3 7f d2 ee | ikev2 g^x 73 0b 6d 38 c1 ed f4 4b b5 20 b3 c7 2c 91 97 4e | ikev2 g^x e0 5f 39 be 43 66 47 ab c5 cc 93 72 f7 60 85 3f | ikev2 g^x db 39 5c a4 81 f1 02 ef e4 62 a4 fe 72 6e 67 a1 | ikev2 g^x 96 94 e2 5d 70 64 80 e3 dc 1a 37 fd 9b e4 85 ab | ikev2 g^x 94 44 5e 2f e2 eb 91 bf ec 37 e1 84 2a 65 44 ca | ikev2 g^x 1a 08 22 fa 52 cb 8e 26 f3 0a e0 f3 e8 ed d0 ab | ikev2 g^x dc 5c 23 93 37 b0 3f ec 3e d7 3b 37 ac 5f 12 98 | ikev2 g^x 95 79 c8 ae bc 21 83 a1 90 e1 8c a5 2a 7f b7 ff | ikev2 g^x e0 96 4f 2b 8d 89 b3 7b 60 e0 d7 14 33 e7 9c 37 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0e 70 86 57 dd 9d d2 8d 77 a4 03 8e d4 ef 6c f9 | IKEv2 nonce 5f 5e da 54 db 62 42 7e 49 f6 2b 1b b6 ad f3 03 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 07 61 83 69 17 8d a7 21 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5c | natd_hash: port= 01 f4 | natd_hash: hash= 23 b0 5c 2e fc f8 56 4b e1 e9 3b 08 c9 71 30 03 | natd_hash: hash= 41 fd 60 2e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 23 b0 5c 2e fc f8 56 4b e1 e9 3b 08 c9 71 30 03 | Notify data 41 fd 60 2e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 07 61 83 69 17 8d a7 21 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f0 af c3 ce dd eb 90 e8 cb ac 91 a5 38 a0 f8 72 | natd_hash: hash= 06 9d 9d 60 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f0 af c3 ce dd eb 90 e8 cb ac 91 a5 38 a0 f8 72 | Notify data 06 9d 9d 60 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #92 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #92: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #92 to 4294967295 after switching state | Message ID: IKE #92 skipping update_recv as MD is fake | Message ID: sent #92 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-92" #92: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.92:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #92) | 07 61 83 69 17 8d a7 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 13 06 9b 22 b9 09 02 07 4e 56 e2 9a 05 b7 70 | b7 25 ba 3c e0 d7 4b 41 68 60 e2 84 fa 7d 2e 53 | 6d 05 81 6c 1d a6 11 6c f3 c1 91 94 93 3c 04 e1 | 47 48 3f a6 f9 c1 bd d3 55 1c 44 87 99 6c 2b ee | 1a fc ef da ca ee 71 5f 90 30 42 cf 28 4f 89 1f | 86 f8 61 c0 95 c8 84 9c 1c 5f 1c 12 41 c6 05 de | 97 e9 89 32 6b 06 59 ff 06 2b 2f 06 a3 7f d2 ee | 73 0b 6d 38 c1 ed f4 4b b5 20 b3 c7 2c 91 97 4e | e0 5f 39 be 43 66 47 ab c5 cc 93 72 f7 60 85 3f | db 39 5c a4 81 f1 02 ef e4 62 a4 fe 72 6e 67 a1 | 96 94 e2 5d 70 64 80 e3 dc 1a 37 fd 9b e4 85 ab | 94 44 5e 2f e2 eb 91 bf ec 37 e1 84 2a 65 44 ca | 1a 08 22 fa 52 cb 8e 26 f3 0a e0 f3 e8 ed d0 ab | dc 5c 23 93 37 b0 3f ec 3e d7 3b 37 ac 5f 12 98 | 95 79 c8 ae bc 21 83 a1 90 e1 8c a5 2a 7f b7 ff | e0 96 4f 2b 8d 89 b3 7b 60 e0 d7 14 33 e7 9c 37 | 29 00 00 24 0e 70 86 57 dd 9d d2 8d 77 a4 03 8e | d4 ef 6c f9 5f 5e da 54 db 62 42 7e 49 f6 2b 1b | b6 ad f3 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 b0 5c 2e fc f8 56 4b e1 e9 3b 08 | c9 71 30 03 41 fd 60 2e 00 00 00 1c 00 00 40 05 | f0 af c3 ce dd eb 90 e8 cb ac 91 a5 38 a0 f8 72 | 06 9d 9d 60 | state #92 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb360012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36000d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #92 | libevent_malloc: new ptr-libevent@0x7fb360012840 size 128 | #92 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49607.894456 | resume sending helper answer for #92 suppresed complete_v2_state_transition() and stole MD | #92 spent 0.471 milliseconds in resume sending helper answer | stop processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35801d920 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 61 83 69 17 8d a7 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #92 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #92 | rejected packet: | 07 61 83 69 17 8d a7 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #92: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0647 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f4be0 | handling event EVENT_RETRANSMIT for parent state #63 | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #63 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #63 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49607.906667; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00226 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ef4e0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #63 | libevent_malloc: new ptr-libevent@0x7fb35801d920 size 128 "road-eastnet-nonat-63" #63: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #63) | 43 a8 4d 01 ec 36 de 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa e2 93 e3 30 a1 06 ee b4 85 58 c9 2f 9d d0 1a | ad 38 32 dc 30 89 d1 a0 98 57 8d 01 77 84 b3 55 | 47 fd ae cc e0 a9 2a 35 58 f1 6a 27 c8 b7 88 d3 | c3 78 1e 95 37 0b 81 ee cb 00 02 38 fb 0c bc ff | 55 19 c6 c0 be 69 d1 78 c8 9a ae e0 96 6c 3f 9b | 54 61 8c 4b 6b 45 ac 74 a1 6d f1 1d de 9e c2 52 | 40 62 38 7c 4d c1 06 5c f5 e4 71 d5 c6 8f eb 8d | a1 58 7d a8 05 d7 f2 d1 12 1f d4 be 60 08 06 1f | 2a 4d 28 f0 ba 0e 77 13 d0 8f 4c 08 fc 37 3f 98 | 37 6b f8 7a b1 44 d3 8b 12 01 3a e0 ab 1c 6f 72 | d8 5a cc 1f f0 ef fd b0 38 cb c0 2b 70 72 dd 77 | 20 94 89 cc 24 42 7c 89 06 09 17 e9 b7 42 85 43 | b5 81 b7 cc a1 a3 3a 6b b1 18 c1 ec 8a 13 0d f9 | 71 43 3d 9a 1f 64 16 b7 2b bd 29 ea 9f 4f 17 43 | a8 18 9f fc 5b 56 59 fa 46 4c 5d 82 89 28 f2 04 | 51 6c b3 97 3a a5 95 f1 fd 87 8b 14 08 ce a0 6b | 29 00 00 24 42 95 7e 08 3c e5 ab b4 d2 f9 ef 7f | d8 0c 96 cd c4 ca c3 e4 35 0f 70 37 5f 05 86 60 | 4b 19 91 ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 ed eb 0b 29 2b d1 a0 42 dd cd 92 | 88 75 fb d1 70 51 78 cf 00 00 00 1c 00 00 40 05 | a8 06 2d d1 ac 32 5a b6 7e b8 ae d6 ec a9 34 27 | 7d 9e 90 d0 | libevent_free: release ptr-libevent@0x7fb34c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f4be0 | #63 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 a8 4d 01 ec 36 de 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #63 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #63 | rejected packet: | 43 a8 4d 01 ec 36 de 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #63: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #78 | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #78 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #78 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49607.951063; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002159 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f7760 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #78 | libevent_malloc: new ptr-libevent@0x7fb34c0180b0 size 128 "road-eastnet-nonat-78" #78: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #78) | a4 c9 07 ac 54 d6 e0 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 5b 1c ec 96 24 e8 86 d8 c5 db 68 a4 e8 84 cc | f4 a2 ed 99 bf 5e 8a c5 ce b3 9d 08 41 58 29 f0 | dd 3a 5a 77 6f 59 d0 63 db 3e 63 03 3b 94 a8 82 | ea c5 b5 55 dc 2c ec 77 5f 63 ff ce 1a d3 98 5f | ea ba 50 e4 20 9b 1b 0b de 70 1d 72 5e 41 20 22 | dd 96 8b a8 2c 90 f1 b3 79 70 7b 0b d2 f5 29 64 | 24 96 41 c0 b2 23 eb 70 92 6c 66 1d 59 a6 82 09 | 57 e0 df 9e 1d 1d 55 b5 06 9b 7f 66 07 cc cc ff | f3 52 44 fb 3d f1 4f 79 5c 0c 51 85 cc cb 4f 32 | 4d 99 ed e1 7c 32 81 a7 49 c4 5e 9c f7 c7 98 e6 | 2c 03 b7 c8 ab bf 01 d1 70 a5 d7 0f 97 f6 d8 06 | e8 43 56 25 d8 da 9c 66 8b 84 9d ed 34 99 f3 6a | ab 13 48 0a 68 c6 9c 38 c0 da 1e ec 9d bd 23 04 | 56 2e b0 d9 0e 5f 21 85 8d b7 b7 e4 3f 8c e4 76 | 68 1b d3 cc a6 1f 24 7c 46 61 29 b6 47 f3 ad 62 | ed ad e7 10 a5 af 19 f0 76 6b ea 90 57 9b 3b 13 | 29 00 00 24 e3 1c 8b 3a ff 4e 05 3e c1 af db 58 | 7b 8f 74 6d 20 c2 73 1e 04 d3 ec 5f 05 cc 9d e9 | 4b 1e 83 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f c3 34 65 1f ff 78 b6 0e ee cd 35 | 94 8b f4 3a 81 46 94 12 00 00 00 1c 00 00 40 05 | f3 90 ab 75 b4 45 e0 98 82 06 c5 91 b7 b5 12 83 | 38 ae 55 ca | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | #78 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 c9 07 ac 54 d6 e0 33 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #78 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #78 | rejected packet: | a4 c9 07 ac 54 d6 e0 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #78: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ec960 | handling event EVENT_RETRANSMIT for parent state #86 | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #86 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #86 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49607.954432; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50006 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #86 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 "road-eastnet-nonat-86" #86: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #86) | bc cc 1d a8 6f 14 2f d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 02 f4 30 81 01 a2 84 c7 c8 75 14 73 a0 b4 f1 | ce 00 5c 2a 70 74 58 bb 3e a0 6e e2 4f 0a 9f 83 | 08 76 97 6b fa 62 74 7d db ae df 90 de 69 8c b2 | 0e 6c a5 3a 87 61 1a 3a 8f 5d a0 5a ba ab 91 5a | 1c 85 49 b3 c5 25 e7 4c 6e 03 2b ac 66 42 56 f1 | d7 31 b5 bb 5b 45 b9 dd 90 6d ee 07 cc 7c f5 62 | 74 01 c5 67 95 ba 42 bf 74 f6 d2 a1 03 af 1b fd | e4 7f bc c7 c5 75 0a a8 6e 5c 9e 6c 4f 5b c1 73 | df 6f 2d 86 ef d9 7b 7f 50 00 74 9f 02 e6 99 af | 69 db f9 f3 80 3c 99 58 33 58 03 46 c0 6e d1 8c | d1 aa bb ba e8 f4 a9 85 5b aa 0d 22 6e e9 62 24 | 0d 2c d4 54 19 e8 97 d8 e7 d3 1e 75 fe 1d 11 bb | 8a ef b3 15 49 d2 bd 11 ce 93 3c 78 52 c8 0e 77 | 1d b3 5a f2 76 6d 63 9a e0 92 62 06 a0 bc 29 93 | a6 78 17 fe 37 4a 17 27 33 46 cd 3f 1c 77 4a d6 | df 68 38 cd 2b 58 7b 28 94 f9 86 34 46 7d e4 ec | 29 00 00 24 3f 6f 33 90 58 31 9c 9e c4 12 e4 33 | 9b 9e 11 d9 fa de 80 3a 9a 7c 3d 2b 3e 4c e8 aa | 92 49 b7 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 27 7b 26 e6 59 48 3b 7c 9f 7a cf | bb 52 6d 94 e2 1f 43 00 00 00 00 1c 00 00 40 05 | 49 8d b2 ff d2 6f bf 71 ec 03 78 4c 49 00 83 b0 | 23 90 3a 8b | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ec960 | #86 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc cc 1d a8 6f 14 2f d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #86 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #86 | rejected packet: | bc cc 1d a8 6f 14 2f d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #86: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0591 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46906b40 | handling event EVENT_RETRANSMIT for parent state #38 | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #38 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #38 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49607.968742; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00471 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a272b0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #38 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 "road-eastnet-nonat-38" #38: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #38) | 63 6f 4b 9c a2 38 4b f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 c6 a0 5e 80 62 3e 9a 9c 42 e1 05 80 df 04 bf | 1e b5 eb a5 bb ef bc 82 8b e6 75 a7 2e 01 28 64 | e4 76 b9 2e 24 4c bf de dc 13 dd 2b 71 c5 93 43 | 1b 46 d4 7e b2 da 9a 48 5b 59 35 a7 05 07 a3 e4 | 2d c6 06 3d 04 99 06 6d e6 f3 82 a2 e0 b0 3d 7e | 06 24 2a d6 83 0e 98 7d 98 49 2f 5f ab 8e 6a a0 | d8 9e 97 9f 3a b5 0b 41 09 f4 3d 1d 01 c6 79 69 | 84 a4 53 1f bd 4e 48 87 76 0d 6e 5e db cc c6 9f | 32 ff 46 70 0d 72 cf 06 98 99 df 58 29 5b 2c 8c | fb 98 a9 76 0f 25 88 9a f5 19 cc e3 5c 2b 68 1d | 01 4d 25 7a f1 7a 21 df b2 8f 9c 28 7d d1 ec da | 1d aa a1 0e 2a 91 6c fc cd c9 76 e7 51 08 7a ff | e5 ff f8 19 fa 3a 8e cc 1e 84 49 b9 c5 19 d0 a9 | d3 37 e2 20 31 e7 32 dd 71 90 7c 76 34 4e 29 57 | 1e 56 51 56 0c 5f 17 75 67 40 80 dc 44 27 6b 9a | c7 16 b2 3b 68 69 4b 25 42 5f 6c bd 14 34 a0 fd | 29 00 00 24 11 36 0f 5e a0 00 74 be 57 cf e9 ad | 0b 41 64 75 76 be 45 9c 57 4a dd ea fc 94 1e c3 | 3b 87 2f 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b 5e 04 97 03 6e 1a 6a 1c 69 28 d2 | a2 f5 94 bd 95 4c fa 5e 00 00 00 1c 00 00 40 05 | aa 31 5d 54 cf 5a 81 b9 1b cd fe 19 22 77 54 6d | f5 50 1b 4f | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46906b40 | #38 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 6f 4b 9c a2 38 4b f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #38 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #38 | rejected packet: | 63 6f 4b 9c a2 38 4b f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #38: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8d60 | handling event EVENT_RETRANSMIT for parent state #64 | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #64 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #64 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49607.973071; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003296 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46906b40 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #64 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 "road-eastnet-nonat-64" #64: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #64) | 28 7e be 04 bb c7 3c e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 7e 43 6c c6 61 f7 8d 74 52 44 4a 1c ca e7 9e | ac 14 d9 31 6d 60 9d f4 ba 6e c2 e0 7b d5 53 a3 | 16 85 f9 c3 ce f8 f1 6f bf 00 c2 bc 5a d4 f5 80 | d8 8f 02 50 d5 75 7e 2e dc 8c e1 ab a9 5d a2 cc | da fa 4e bf fb 7e 0d a9 06 25 1f 41 e3 0d cd 1b | 1a a7 53 a9 ce 79 cd b5 77 9b b8 2e 89 66 fa cb | ad fc 1f a1 86 e2 14 75 9e d9 ee bd ba f9 9f 7c | e4 64 68 99 18 9c 70 2b 82 20 55 55 75 56 88 5d | d8 d5 c7 f6 4d e5 dc 25 37 08 b7 1b d0 a6 99 40 | 0a 49 58 f6 83 1c 88 a0 08 dc b3 c1 aa ed 91 6f | c6 a5 be 4d 6b b9 bb 18 cf 12 ba 0d 71 89 70 ef | 66 fa c4 5b 33 09 3f ff 55 ca 19 24 9a 74 4d 4c | d1 a6 e0 57 41 7a 44 3f b8 12 3a 3f 06 a7 52 cd | 97 1c e0 a8 3c be fa 81 97 1d d6 2b 3f 0b c8 9f | b8 ad e1 63 a0 10 8f f1 ce 62 64 83 9e 28 1c 57 | ba 8c 77 7e 6f fe 44 22 ea fc fc 43 05 9a a7 9f | 29 00 00 24 d6 fa 6f 28 11 8e 89 70 36 5a 3b d2 | 30 2c 96 5f 7f e3 aa dc e7 9f 74 e4 9d 9a 67 37 | a5 4e 3a 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 34 45 e6 51 f4 83 8b a3 3b 13 c9 | fe 48 d2 4a 75 21 a9 ed 00 00 00 1c 00 00 40 05 | 1b 38 c5 d0 41 1e ff f1 67 34 2b 17 6a 69 bf 2e | 0c d6 b9 4f | libevent_free: release ptr-libevent@0x7fb34001a190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8d60 | #64 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 7e be 04 bb c7 3c e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #64 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #64 | rejected packet: | 28 7e be 04 bb c7 3c e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #64: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0591 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-93" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-93' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #93 at 0x557d46a53790 | State DB: adding IKEv2 state #93 in UNDEFINED | pstats #93 ikev2.ike started | Message ID: init #93: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #93: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #93; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-93" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-93" IKE SA #93 "road-eastnet-nonat-93" "road-eastnet-nonat-93" #93: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-93 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-93": constructed local IKE proposals for road-eastnet-nonat-93 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 93 for state #93 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a0eb30 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #93 | libevent_malloc: new ptr-libevent@0x7fb34001a190 size 128 | #93 spent 0.151 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-93" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.237 milliseconds in whack | crypto helper 13 resuming | crypto helper 13 starting work-order 93 for state #93 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 93 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 93 time elapsed 0.000959 seconds | (#93) spent 0.964 milliseconds in crypto helper computing work-order 93: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 93 for state #93 to event queue | scheduling resume sending helper answer for #93 | libevent_malloc: new ptr-libevent@0x7fb35c01d920 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #93 | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 93 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #93 | **emit ISAKMP Message: | initiator cookie: | 8f 2b 82 41 be 50 7f e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-93 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x cd 43 20 82 ea 0d 92 4d b7 6f 10 e5 73 62 a1 74 | ikev2 g^x 5f 8b b1 bd e8 48 72 86 0f fc f7 f4 6d aa 74 9c | ikev2 g^x c6 32 cc 9c 2e 89 27 81 1a 44 1a e2 a0 dc ee ce | ikev2 g^x 11 9a 86 db b2 0d 84 8c a7 35 4b a3 54 44 ff a5 | ikev2 g^x 46 90 60 08 6b 0b b2 6e 30 fe 4a 71 80 d7 a0 82 | ikev2 g^x 42 f8 84 b3 d1 ca 25 4a c6 d4 78 a8 df 7e e5 c9 | ikev2 g^x 03 e0 84 12 8e f0 91 14 81 e1 1e 7d 14 d0 21 c6 | ikev2 g^x 0b a7 bd a5 91 4d 74 5f a5 49 fb 47 92 a4 f6 f2 | ikev2 g^x 46 b5 1e 26 6d f1 8f 2b 0f f1 aa b1 98 3a 25 3a | ikev2 g^x b5 d3 2a 4c bc bb 1d f8 fd dc 58 f3 d0 d8 1b 32 | ikev2 g^x 38 77 9b c8 3c 93 48 af 2e 17 ec f8 87 96 76 0f | ikev2 g^x 85 58 80 2d fe e0 ad 94 9a 85 9c 5e 26 2b ed 2c | ikev2 g^x f6 a6 2f 18 05 50 d7 9c 67 0d fc 1d 16 0d 73 cf | ikev2 g^x e1 da cd 32 28 a8 c7 82 3a 82 36 71 d2 89 fb 29 | ikev2 g^x 72 68 23 fe 3a 1e 23 55 bf ae 58 43 08 3b 0f b5 | ikev2 g^x 11 45 c9 10 6a 4c 49 3d 66 da 53 be f8 72 a4 ba | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 38 5c 7f a9 1f f6 b2 d3 ed 46 5d a7 91 ec df cb | IKEv2 nonce c1 74 f9 14 df e8 fc 11 90 67 a3 a7 1e 7f 11 82 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8f 2b 82 41 be 50 7f e6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5d | natd_hash: port= 01 f4 | natd_hash: hash= 3c cc 1f b2 cd 2b 6c 7e 5b 50 dd 93 55 b1 e2 f6 | natd_hash: hash= 27 0b bd 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3c cc 1f b2 cd 2b 6c 7e 5b 50 dd 93 55 b1 e2 f6 | Notify data 27 0b bd 36 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8f 2b 82 41 be 50 7f e6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= b6 37 a4 32 e9 5e 9f 19 d6 7a 97 0a 5b 76 69 49 | natd_hash: hash= 01 0d 5c 45 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b6 37 a4 32 e9 5e 9f 19 d6 7a 97 0a 5b 76 69 49 | Notify data 01 0d 5c 45 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #93 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #93: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #93 to 4294967295 after switching state | Message ID: IKE #93 skipping update_recv as MD is fake | Message ID: sent #93 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-93" #93: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.93:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #93) | 8f 2b 82 41 be 50 7f e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cd 43 20 82 ea 0d 92 4d b7 6f 10 e5 73 62 a1 74 | 5f 8b b1 bd e8 48 72 86 0f fc f7 f4 6d aa 74 9c | c6 32 cc 9c 2e 89 27 81 1a 44 1a e2 a0 dc ee ce | 11 9a 86 db b2 0d 84 8c a7 35 4b a3 54 44 ff a5 | 46 90 60 08 6b 0b b2 6e 30 fe 4a 71 80 d7 a0 82 | 42 f8 84 b3 d1 ca 25 4a c6 d4 78 a8 df 7e e5 c9 | 03 e0 84 12 8e f0 91 14 81 e1 1e 7d 14 d0 21 c6 | 0b a7 bd a5 91 4d 74 5f a5 49 fb 47 92 a4 f6 f2 | 46 b5 1e 26 6d f1 8f 2b 0f f1 aa b1 98 3a 25 3a | b5 d3 2a 4c bc bb 1d f8 fd dc 58 f3 d0 d8 1b 32 | 38 77 9b c8 3c 93 48 af 2e 17 ec f8 87 96 76 0f | 85 58 80 2d fe e0 ad 94 9a 85 9c 5e 26 2b ed 2c | f6 a6 2f 18 05 50 d7 9c 67 0d fc 1d 16 0d 73 cf | e1 da cd 32 28 a8 c7 82 3a 82 36 71 d2 89 fb 29 | 72 68 23 fe 3a 1e 23 55 bf ae 58 43 08 3b 0f b5 | 11 45 c9 10 6a 4c 49 3d 66 da 53 be f8 72 a4 ba | 29 00 00 24 38 5c 7f a9 1f f6 b2 d3 ed 46 5d a7 | 91 ec df cb c1 74 f9 14 df e8 fc 11 90 67 a3 a7 | 1e 7f 11 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c cc 1f b2 cd 2b 6c 7e 5b 50 dd 93 | 55 b1 e2 f6 27 0b bd 36 00 00 00 1c 00 00 40 05 | b6 37 a4 32 e9 5e 9f 19 d6 7a 97 0a 5b 76 69 49 | 01 0d 5c 45 | state #93 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34001a190 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a0eb30 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8d60 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #93 | libevent_malloc: new ptr-libevent@0x7fb34001a190 size 128 | #93 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49608.016357 | resume sending helper answer for #93 suppresed complete_v2_state_transition() and stole MD | #93 spent 0.503 milliseconds in resume sending helper answer | stop processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c01d920 | timer_event_cb: processing event@0x557d46a46950 | handling event EVENT_RETRANSMIT for parent state #79 | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #79 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #79 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49608.016413; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002935 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ec960 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #79 | libevent_malloc: new ptr-libevent@0x7fb35c01d920 size 128 "road-eastnet-nonat-79" #79: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #79) | cb 0e 87 22 6d 04 19 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 8d fa 75 ee f5 0c 34 b3 09 04 c3 a6 70 35 18 | 8c e8 6b 6c 5c 5b 2d 90 26 5a 5e f9 d4 07 05 c2 | f5 73 64 12 f5 c2 51 38 6d 89 1a 0c 01 ef 01 94 | 08 08 2e cb 41 34 b4 4a 2f f7 ed 3c c1 7e 04 ba | 4c cb 90 52 00 84 c7 1d 71 85 6e 14 f7 d6 ba c6 | 6a 98 c9 b3 82 dd 58 3d c8 6f 45 92 9b e7 64 4a | 6e c9 47 ec bd a8 a4 79 ac 0e 9c ec e9 38 db 99 | d6 25 d7 25 8b 64 97 e5 d5 6a 07 ae 6b 9a 25 6c | ea 70 9f 4a 9e ba a1 e7 d8 d9 69 c1 2c a9 28 e5 | 2c 51 5f 2a f8 17 0e 3b 43 9f 77 5e 3a 59 4f 18 | 6f 20 ad 6e aa 63 b5 82 47 75 97 d0 4a 75 bf 68 | 0b ac a2 f9 6c 9d b8 21 cd c5 79 8b 66 f4 0e 4b | 32 8b f9 5e de 93 2f 2f 11 cf e9 f6 3a 2b 4b 7a | bd 3c a3 27 78 6d f5 6c 33 13 d9 14 f8 0e 44 d7 | 3e 91 89 43 f4 2f 9b b6 ab 6d 76 71 13 52 45 fd | 0e 5e 7c 72 38 35 d5 eb 86 2e 14 37 c5 c9 56 83 | 29 00 00 24 5a 77 8f b1 9a 0e 27 f5 13 b5 b3 3b | 54 a7 64 e6 f0 cd 7e 6d c0 5a 2d 35 86 f1 cb 9d | 32 23 be bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 31 42 b5 5a b6 78 6b 4f 08 f8 04 | 13 cc 8c 45 a7 cd ab bc 00 00 00 1c 00 00 40 05 | 2d 9f b7 7e f4 d4 af ae b0 e9 56 0d ae 10 83 85 | d2 ea 45 54 | libevent_free: release ptr-libevent@0x7fb3580180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46950 | #79 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 2b 82 41 be 50 7f e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #93 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #93 | rejected packet: | 8f 2b 82 41 be 50 7f e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #93: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cb 0e 87 22 6d 04 19 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #79 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #79 | rejected packet: | cb 0e 87 22 6d 04 19 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #79: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.055 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a30d70 | handling event EVENT_RETRANSMIT for parent state #87 | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #87 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #87 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49608.016679; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500563 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46950 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #87 | libevent_malloc: new ptr-libevent@0x7fb3580180b0 size 128 "road-eastnet-nonat-87" #87: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #87) | a2 df 19 46 98 d4 bb 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de ac a7 56 a2 bc 95 5a 6c 57 c8 2b e0 20 68 16 | a2 ff 5a bd 83 94 6a 4d 58 8c b2 a4 d4 76 ed fc | 0f 4a 9b b9 df 7c 6c 34 8f 70 fd e9 a0 17 cd ff | 42 ae c6 35 53 50 df 4f 92 fb b8 ae 34 b4 21 4a | 96 f4 d2 6a f3 c3 2c b1 14 ce 42 da 82 6b e3 0d | db 7a 9e a9 08 f5 73 b2 1d 45 e9 bc fe 79 e6 2d | 2f 0a 64 4b ee 86 b7 4b 3f 77 d9 fd c5 b0 bd d9 | f0 f9 4a 67 c3 b1 50 bb ba e6 76 27 0e 9b 80 ac | ac a5 3d ed e4 7f 3e ce 9b 7e 70 ae 76 56 31 41 | 17 98 86 1f 1f 85 2b 2b b2 36 28 19 25 14 37 3e | bb a6 a5 e3 f0 64 b9 9c 0b af e9 c8 fc dd 9d 10 | 05 4f 6e 73 4c 08 a1 b5 54 a0 ae e0 d5 30 bc af | af 63 ef 9e e4 70 09 3a 1e 60 6f c5 bb 77 c5 0b | 60 c8 18 55 dd 77 cc 86 3f 7c 34 56 80 93 c4 30 | 61 51 d7 11 b2 4d 6f 17 c0 8c 7f d5 08 fa 5f 63 | d7 b3 cd 14 9f 3a 9d 07 13 ee 34 e9 84 52 68 1b | 29 00 00 24 8b f5 b9 e8 72 8a d8 5e 1a d6 70 1a | a6 5f 3d 02 9f 40 bc e8 9c c3 88 16 89 ec af ca | b1 90 6f 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 83 d5 c2 93 bc 76 7b c0 f5 6a f5 | c6 03 a7 0c 52 da b8 7c 00 00 00 1c 00 00 40 05 | 9f 00 07 ca 6e 64 62 64 56 d5 c5 aa 95 9f c8 6b | 83 2b 36 93 | libevent_free: release ptr-libevent@0x7fb3780180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a30d70 | #87 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 df 19 46 98 d4 bb 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #87 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #87 | rejected packet: | a2 df 19 46 98 d4 bb 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #87: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0582 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a32290 | handling event EVENT_RETRANSMIT for parent state #65 | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #65 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #65 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49608.036954; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002442 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f4be0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #65 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 "road-eastnet-nonat-65" #65: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #65) | ef 12 90 5c 48 7d 35 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 1d 09 25 1e 78 f1 ab 15 10 4e 97 1c df 6e dc | ea a4 f2 51 40 2c fc 70 83 3b d1 14 8e 0e 9b f0 | ed 07 86 8f 8c 86 61 7e ec 48 49 64 93 36 5d 3e | 17 1f e8 61 4f 64 88 6f dc 05 20 78 89 b7 e5 6b | 2c bb be 5b d1 73 00 a1 4f 26 6a 56 a9 d6 41 92 | 2d 76 96 98 ed 1d 08 e4 99 fe 2c 5e 06 f5 6b bd | 7e 5c 39 22 bf ae a8 e1 92 1c 13 3f 1d 70 c4 80 | 07 a5 77 ff 91 5d 4b 48 ee 7b fd 40 d0 32 19 b5 | 09 de 90 f8 5a 03 1b 2a 6a c3 ef 64 b2 ec 44 55 | 99 02 c6 b9 5e db b2 cd f2 ce d4 a6 86 55 55 7c | 29 4f 4b ce 6a 0b b1 f7 34 a8 01 90 c9 f9 c3 1c | 81 d7 a5 bb 19 5a 7d e2 de 08 df 1d b2 6d 5a f1 | 1e a2 87 2c 96 1b c7 cb 00 ed 5b 85 f3 b5 ad fb | 85 9e 29 58 fd ca dd fe cc ef 21 ce b6 4c a2 4d | d7 d2 d7 9a 36 aa ca e6 4f 15 82 d8 a4 cd 14 4f | 08 9f 68 62 be 95 a7 c1 d4 3f 0f 63 b9 f6 80 56 | 29 00 00 24 56 09 76 96 73 f6 7a d5 b4 ac d9 d3 | f5 d3 52 17 38 15 85 8c 5c 9b 9d d9 ed a7 ee 26 | 3a e8 6f 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 23 18 fa b0 e0 93 30 87 95 e8 a3 | 79 bf 51 a0 e1 20 e5 2d 00 00 00 1c 00 00 40 05 | 26 a2 95 ca b7 c9 12 03 be 34 1f 1e 21 7b 79 10 | 86 6d e0 e7 | libevent_free: release ptr-libevent@0x7fb37c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a32290 | #65 spent 0.209 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 12 90 5c 48 7d 35 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #65 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #65 | rejected packet: | ef 12 90 5c 48 7d 35 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #65: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0494 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a12c70 | handling event EVENT_RETRANSMIT for parent state #39 | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #39 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #39 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49608.048523; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003232 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a32290 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #39 | libevent_malloc: new ptr-libevent@0x7fb37c009640 size 128 "road-eastnet-nonat-39" #39: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #39) | 19 fb 2f c4 ac 44 fb 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e b1 09 86 9c 45 db 95 7b d2 00 66 c6 50 ec 38 | 85 24 bf d9 80 0e ac 2e 4c 6c 22 df ca 10 97 2e | 3e b3 c6 bc af 43 d2 f1 96 a9 4b 69 aa cd 6c e0 | 9b a6 4b b2 87 0e 1c ca 32 4c 46 ee 52 f9 70 fd | fe 31 27 8d 61 a4 9c 97 7a a3 30 46 a8 d5 6f 83 | a7 6a c3 e9 ff 23 17 48 fe 4f dd cf 4e a9 a1 5e | d7 78 c0 fe 7d d7 62 84 4a b2 9d ae 37 bc ab ed | d5 8c 32 96 61 41 3f 21 7c ca ab 28 b6 ad 04 a3 | c6 dc bc c3 e1 13 16 74 7a 42 5b e7 e2 a2 c1 8c | b7 73 45 24 dc 37 dd 6b f2 55 c7 4f 97 81 79 6f | 14 cb 11 1e b4 40 01 19 cd a9 dd 29 3f 6f e4 ee | 95 68 2f 56 df 0a 08 86 e6 cd 7f a3 7b 00 61 f4 | c5 7c bb 03 05 36 7a 30 d5 36 53 38 4c f8 39 18 | 08 9c f5 06 b6 85 f9 e9 1b ab 6e 6e 92 66 b2 2b | 43 5a 44 5b 6f f1 98 dd 01 3a 01 23 5e f7 bc 7d | 6e f5 05 b9 ec 45 1c 8c 77 33 f8 a3 1c 1e 8c 99 | 29 00 00 24 2f 9c d8 9a 10 ed a2 18 bd 6a 97 cb | 42 26 f8 54 76 a0 4d 6e 60 6c fb c1 ce 0f 53 f0 | 1f 6b 99 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 74 e0 c5 89 b2 32 b1 7d 7b 02 d3 | e0 e6 47 82 80 6f 9f 55 00 00 00 1c 00 00 40 05 | 2e a2 7a f5 ee f4 77 35 9e db 48 5d 65 9b e7 f5 | e4 1e af e9 | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a12c70 | #39 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 19 fb 2f c4 ac 44 fb 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #39 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #39 | rejected packet: | 19 fb 2f c4 ac 44 fb 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #39: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0678 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #80 | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #80 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #80 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49608.076868; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001464 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #80 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 "road-eastnet-nonat-80" #80: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #80) | aa bd f3 45 40 fd 66 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a f9 52 fe 2c 07 55 9a 9f 75 be 2d bb 6b aa b0 | 07 01 f4 20 39 c9 c6 12 04 59 16 f7 53 ca 23 cf | b2 a3 d6 d7 cd d3 78 95 1e ae 2c b7 17 84 30 6c | 9a 6e 0d 1b ef 48 24 1d f1 c9 12 65 61 88 44 c9 | 4b 27 23 9a 65 49 0a 11 49 89 68 1f 69 8b cd 8d | e9 1c 22 5e 52 f0 a3 c1 f7 8e 10 9b 8e 27 61 b3 | aa d7 5b 30 40 8f 25 2e 0d 7c bd dc 0e 4d aa 95 | b6 5a 44 77 7b 33 24 ed 5e bf f2 78 c5 d8 1e 5c | 38 0e af a8 70 85 81 7a 43 7a de 45 73 d1 23 0a | 21 50 82 2c fb 48 a9 b6 ed 4a 3a 01 52 3d 91 cf | 62 7a 95 ef ff 5d 9f b3 85 63 dc f5 46 12 fc e4 | ac 22 23 7e 8e 79 eb cb 39 31 bb de 91 1f fd 9c | 95 3c fe ca 99 40 e4 17 71 ad 8e 05 ed f6 14 9e | 6b 26 3c 1c 13 2f 5a 94 9d 9c cd 71 11 6d bb c9 | 9a 84 65 ba e1 3d ae 2e 2c 88 f5 b9 e4 60 97 3a | ad 9a 6f f8 77 43 67 40 a8 7b be e5 9d 13 c4 6d | 29 00 00 24 53 2a 2d 72 a4 0b ac f1 46 3b 88 60 | a1 1f 05 e7 3a 9a 78 ce 7e 03 67 44 f4 b3 91 7b | 4e 29 6b 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 ed 0c 1a de d8 39 29 7d 81 95 16 | 89 64 a4 1b c6 93 47 b1 00 00 00 1c 00 00 40 05 | 41 2d b0 0c 88 62 05 80 34 d7 2b cd 52 bc d2 c8 | ff 29 c4 37 | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | #80 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | aa bd f3 45 40 fd 66 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #80 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #80 | rejected packet: | aa bd f3 45 40 fd 66 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #80: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0694 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e5ca0 | handling event EVENT_RETRANSMIT for parent state #88 | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #88 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #88 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49608.084229; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500848 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #88 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 "road-eastnet-nonat-88" #88: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #88) | 4f b4 b9 96 90 ac 87 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 55 7d 2b ef 81 b7 ac 80 5f 94 f2 45 3d 30 4f | 1d db a2 af 47 67 b7 7c be e3 bc 36 9a 72 1e e6 | 4f 47 07 85 4a dc c2 8c 23 63 be 8e ef c5 79 8f | 9f 5c 4f 9d 4f 85 09 c3 d7 cd 09 d7 9c 93 a4 d2 | cb 1f 73 cb f5 4a 96 ce 2b f9 75 2e 3c f9 67 24 | b7 40 01 a2 9a 5a 3a b5 1b 81 51 3d 6c dd 22 93 | a7 84 80 70 90 68 0a 70 88 ae 95 b6 8d ea e4 d4 | 54 cf 85 55 04 a4 94 5d cc ba 3d e2 31 46 75 ff | 7c 75 77 1a 1b 6c e0 fd b6 75 6b 40 9a b7 ac 36 | 39 45 a5 48 a8 96 90 52 cb 62 b2 ca a6 08 23 37 | d2 f9 be 02 8c 54 29 91 80 43 1c 2d 5f 25 44 25 | ff e7 b9 7d 14 3d 11 4a a3 ab 8e 4f b9 9b a1 4d | 91 68 13 50 1e 3b 88 4e ac 27 30 6a c7 2b ef cb | 81 87 56 8d dd bd 93 b9 d2 77 ea ab 8e f7 84 26 | 38 de 93 6d 11 fc f2 e4 c4 b3 df 42 49 8c 39 27 | 12 40 d4 6f db 31 51 71 3a c5 b3 bf 78 b4 72 ae | 29 00 00 24 d0 42 a3 31 c3 ed 67 67 3c 0c 74 87 | e1 18 ba c3 96 b7 23 3a c3 28 fa 83 32 6a f8 22 | c5 3d ce 47 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 13 5d 9d 57 2e de f0 16 54 40 11 | ce e4 63 b7 5f de e1 17 00 00 00 1c 00 00 40 05 | 73 d1 3a 60 f3 dc 99 f7 0c 4b 4c 3e d1 f1 65 ae | 8d f5 93 01 | libevent_free: release ptr-libevent@0x557d469e1b60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e5ca0 | #88 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f b4 b9 96 90 ac 87 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #88 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #88 | rejected packet: | 4f b4 b9 96 90 ac 87 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #88: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #66 | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #66 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #66 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49608.102873; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.006399 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a50110 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #66 | libevent_malloc: new ptr-libevent@0x557d469e1b60 size 128 "road-eastnet-nonat-66" #66: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #66) | 64 fc 26 82 c6 65 9b e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 5c 42 12 a8 cf 54 30 35 41 88 3e 73 38 e5 58 | 88 e1 84 4c b4 74 fd b0 fa c4 88 6f 83 90 67 ee | ea 08 5d 03 f5 21 c1 48 f4 fa d9 68 de f8 02 e9 | 20 8c 8f 00 bb e0 27 04 09 fe 8d f2 a1 9c cf 02 | 35 98 ce 70 23 87 ee fc 94 cd 0c 7b 9f 06 08 77 | f2 7f c2 13 7f e1 04 f8 2f 23 ef 1d fb 54 4c 0d | ac 20 e0 c8 bd 84 3e ce b6 49 37 85 56 01 f1 9b | ac 54 85 9c fd 7d 5d 63 30 bd f9 4d d5 7a c1 a0 | 6c 64 e9 25 18 ed 7b 3f 1a a2 52 c0 47 b8 c4 ff | 46 70 76 9b eb db 63 e5 d9 0f fb e2 44 f2 65 5e | ab 82 c1 e9 45 5a aa 38 88 06 f2 1d 2e 7b 75 16 | bf 94 df 07 bd 89 cd 9e ba b0 6c 38 fc 80 69 75 | 55 88 bd 23 1e bc ab 76 6d 9e ce 05 ea ee d0 f1 | 1a bd 0c b1 86 63 56 69 8c 5f 2e 8a f5 e2 c1 97 | 10 bc e7 eb 71 fb 81 cd 25 de 9b 6d 12 04 dd ce | 36 90 99 3b a3 2d 73 4a 99 7b f0 18 dc 83 2b 7d | 29 00 00 24 64 f2 bd 07 f3 b0 6e 75 d4 40 2c d9 | f4 e5 3f 9a 4d aa 41 b2 3f a1 6e 03 4f 7d 3f ec | 58 37 55 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d dc 62 51 f8 7c c3 1c 6d 46 26 31 | c0 6e bd 6d 19 0c cf 42 00 00 00 1c 00 00 40 05 | 76 be 2b c3 74 ff 88 3d a8 f9 74 84 97 f5 dc 48 | 6c 56 c4 9c | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #66 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 fc 26 82 c6 65 9b e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #66 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #66 | rejected packet: | 64 fc 26 82 c6 65 9b e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #66: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0726 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-94" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-94' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #94 at 0x557d46a54d50 | State DB: adding IKEv2 state #94 in UNDEFINED | pstats #94 ikev2.ike started | Message ID: init #94: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #94: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #94; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-94" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-94" IKE SA #94 "road-eastnet-nonat-94" "road-eastnet-nonat-94" #94: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-94 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-94": constructed local IKE proposals for road-eastnet-nonat-94 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 94 for state #94 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #94 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 | #94 spent 0.153 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-94" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.245 milliseconds in whack | crypto helper 17 resuming | crypto helper 17 starting work-order 94 for state #94 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 94 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 94 time elapsed 0.001165 seconds | (#94) spent 0.902 milliseconds in crypto helper computing work-order 94: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 94 for state #94 to event queue | scheduling resume sending helper answer for #94 | libevent_malloc: new ptr-libevent@0x7fb35001d920 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #94 | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 94 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #94 | **emit ISAKMP Message: | initiator cookie: | c4 af dc f4 22 ca 1a 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-94 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b8 0d 8e 0d 24 fa 48 9f 6f 70 45 44 af 29 03 81 | ikev2 g^x fb 75 7f 29 b1 65 5b 6b f3 dc dc e0 d1 ea 65 d0 | ikev2 g^x 45 a3 5f 01 d6 e7 51 37 b4 25 82 eb 71 98 d8 b2 | ikev2 g^x 75 57 7a 0e db af 40 2b 1a 10 c2 e4 b7 7e 18 39 | ikev2 g^x 54 3c 4a ec 4d d5 3a 2e ab bd e0 80 1e 0f e2 b5 | ikev2 g^x e4 a9 bf ef 3b ba fe af b1 7b cb 8a 16 e9 8c 65 | ikev2 g^x 20 92 b8 a2 66 75 85 84 5a e4 4c c5 4e 4c dd 10 | ikev2 g^x 51 c2 7a 85 78 58 a1 10 d6 cf c5 6b e8 22 f2 d1 | ikev2 g^x 41 df 6b 5c 73 f6 87 2e 17 45 1b 75 b8 bd 3d 9e | ikev2 g^x d2 3e d8 cd d1 d8 9e 58 23 f3 68 0b e1 b8 89 69 | ikev2 g^x 76 b7 7e 92 6a 4a 5b 2c 36 99 61 9d bb 09 19 68 | ikev2 g^x e0 83 4b 97 a3 48 26 96 74 a7 da 5f 7d b7 55 9e | ikev2 g^x e3 e8 68 32 6b 6e 35 3d 26 d7 4f 19 6d d6 44 17 | ikev2 g^x 3d 23 4c ff 1c ff e3 77 85 72 fa 85 64 76 2e ac | ikev2 g^x 5a 7b 31 bf 7b 44 eb 9a f4 5c 9d 72 ec 95 e5 4e | ikev2 g^x fc 10 63 57 5f 09 74 f6 c6 17 bc 05 7d ea 5c 13 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c5 77 30 ba 9e 22 45 4a 1a af ea 19 02 b6 fb 3a | IKEv2 nonce f7 c7 ff 86 e4 75 07 62 09 1a 17 15 a7 99 2d 27 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c4 af dc f4 22 ca 1a 62 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5e | natd_hash: port= 01 f4 | natd_hash: hash= 6d bd d3 d9 55 1d 16 4d 34 06 fd 91 92 b6 52 35 | natd_hash: hash= 3e d3 c6 4f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6d bd d3 d9 55 1d 16 4d 34 06 fd 91 92 b6 52 35 | Notify data 3e d3 c6 4f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c4 af dc f4 22 ca 1a 62 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 83 77 03 33 97 20 84 34 b1 e3 aa 6c 05 af 74 6e | natd_hash: hash= f0 8d d0 a3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 83 77 03 33 97 20 84 34 b1 e3 aa 6c 05 af 74 6e | Notify data f0 8d d0 a3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #94 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #94: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #94 to 4294967295 after switching state | Message ID: IKE #94 skipping update_recv as MD is fake | Message ID: sent #94 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-94" #94: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.94:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #94) | c4 af dc f4 22 ca 1a 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b8 0d 8e 0d 24 fa 48 9f 6f 70 45 44 af 29 03 81 | fb 75 7f 29 b1 65 5b 6b f3 dc dc e0 d1 ea 65 d0 | 45 a3 5f 01 d6 e7 51 37 b4 25 82 eb 71 98 d8 b2 | 75 57 7a 0e db af 40 2b 1a 10 c2 e4 b7 7e 18 39 | 54 3c 4a ec 4d d5 3a 2e ab bd e0 80 1e 0f e2 b5 | e4 a9 bf ef 3b ba fe af b1 7b cb 8a 16 e9 8c 65 | 20 92 b8 a2 66 75 85 84 5a e4 4c c5 4e 4c dd 10 | 51 c2 7a 85 78 58 a1 10 d6 cf c5 6b e8 22 f2 d1 | 41 df 6b 5c 73 f6 87 2e 17 45 1b 75 b8 bd 3d 9e | d2 3e d8 cd d1 d8 9e 58 23 f3 68 0b e1 b8 89 69 | 76 b7 7e 92 6a 4a 5b 2c 36 99 61 9d bb 09 19 68 | e0 83 4b 97 a3 48 26 96 74 a7 da 5f 7d b7 55 9e | e3 e8 68 32 6b 6e 35 3d 26 d7 4f 19 6d d6 44 17 | 3d 23 4c ff 1c ff e3 77 85 72 fa 85 64 76 2e ac | 5a 7b 31 bf 7b 44 eb 9a f4 5c 9d 72 ec 95 e5 4e | fc 10 63 57 5f 09 74 f6 c6 17 bc 05 7d ea 5c 13 | 29 00 00 24 c5 77 30 ba 9e 22 45 4a 1a af ea 19 | 02 b6 fb 3a f7 c7 ff 86 e4 75 07 62 09 1a 17 15 | a7 99 2d 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d bd d3 d9 55 1d 16 4d 34 06 fd 91 | 92 b6 52 35 3e d3 c6 4f 00 00 00 1c 00 00 40 05 | 83 77 03 33 97 20 84 34 b1 e3 aa 6c 05 af 74 6e | f0 8d d0 a3 | state #94 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #94 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 | #94 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49608.110646 | resume sending helper answer for #94 suppresed complete_v2_state_transition() and stole MD | #94 spent 0.487 milliseconds in resume sending helper answer | stop processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35001d920 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 af dc f4 22 ca 1a 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #94 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #94 | rejected packet: | c4 af dc f4 22 ca 1a 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #94: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0596 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338005860 | handling event EVENT_RETRANSMIT for parent state #40 | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #40 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #40 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49608.113862; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003586 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e5ca0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #40 | libevent_malloc: new ptr-libevent@0x7fb35001d920 size 128 "road-eastnet-nonat-40" #40: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #40) | f4 2d ea 23 2d fd 9f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 1a 9e 5c fb fb e3 3a 12 40 55 ea 02 66 64 cb | 69 42 9f 9e 73 38 34 f9 9b 29 99 d0 1f 2f 62 b0 | ff 78 90 10 b8 86 3f 49 a8 32 be f6 08 0d 11 29 | 94 2b 8b de b8 63 2c 35 79 92 00 39 68 56 d7 ad | 7e 9a a2 59 50 2b c4 f8 63 a3 0c 5d 5e 44 62 5b | fc 42 68 dd ca 56 4c 44 63 17 39 39 e0 00 1c 8f | c5 28 a6 4f 80 e9 f0 8c 5a ea 63 37 5f d7 0a a3 | b8 dc 6a fd 41 02 14 01 fa 2f 62 ae cb f1 1e 40 | 2f 20 1d 4c b4 7d c9 2c fa 60 f5 5e 61 26 a0 89 | b5 80 ba fe 31 f9 79 3e 12 33 cf 6c 99 9f 52 55 | 62 d6 02 f9 0e 35 e1 e7 8d 67 93 09 10 77 15 30 | 4a e9 d6 a0 31 50 fb be 13 05 50 dc f4 46 03 08 | 2f 95 1b 33 25 b1 ea 42 27 b1 8d 6c a6 26 e8 12 | 28 ee 49 16 a3 ec 76 ad 9e 1b cb d5 8a 26 5b 22 | 55 46 26 40 fb a4 30 9e 31 e9 07 5c 3b f7 53 4f | 4f ec 0e ee ad 7e 3f fc 05 9c b5 15 17 a2 62 3f | 29 00 00 24 28 3a b9 16 f5 d3 fa 3e 82 0e 6c a5 | b6 e0 32 27 f5 86 22 6d 8d 85 0f 17 f1 b4 a5 df | eb 51 66 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 e9 4b 4d 06 92 e2 ba cc 1d e9 b2 | 45 c8 92 47 34 22 29 80 00 00 00 1c 00 00 40 05 | 84 da 3f 80 5c a8 47 c1 08 aa 1f 48 69 9f 8f ac | 3e 3c 6c 93 | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338005860 | #40 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 2d ea 23 2d fd 9f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #40 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #40 | rejected packet: | f4 2d ea 23 2d fd 9f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #40: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #81 | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #81 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #81 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49608.14121; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00226 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #81 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-81" #81: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #81) | 66 17 84 1d 01 f5 89 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 79 cf 2e c9 58 5a cf 22 0f e4 95 f3 b3 ec e3 | d7 ab 2d 5f 01 54 3c c5 38 6c 9c d3 40 e3 80 92 | e9 89 68 26 a0 e4 bb a0 7a eb 4c f1 e4 9f 20 12 | 58 2a 4c f1 f2 df 9a 6d 19 39 bd 12 58 10 e1 11 | 60 c9 9d ed 18 33 de 94 c1 bb 5d 21 df 07 9b 4e | 1e ae ec 4e 5f 9a 7f b4 b3 f8 3c 10 c2 09 ea 68 | 5d bc a9 fd 8a bb 40 95 8d 3b d1 39 da 16 f8 a8 | 93 df 32 68 37 e0 b9 31 f0 a7 f2 55 d6 2d bc ef | ef 45 3f e8 34 12 fc 98 2a dc 19 03 8b dc 1f 09 | cd 02 40 97 95 a7 39 71 09 ba 54 e3 53 28 2c b9 | 98 bb af 3a 25 6b e9 e7 4c 76 46 d1 aa 9d 3b 59 | 03 52 8a 61 f9 f7 83 33 a1 6c a0 29 48 f7 36 48 | 3a 5a f9 b5 72 5e fe 9f e0 84 df 16 32 28 ce ca | c6 27 c5 b5 d7 f3 93 db 10 54 fb f4 c3 70 76 d4 | 5f 00 b9 4c 0d 91 91 e7 a8 18 4b 2b 7f cf a5 4e | 76 2e 5b 38 e2 0b 32 aa 89 74 93 4b e3 81 6f 21 | 29 00 00 24 78 b9 6f 78 8b 1e bb 84 c4 a1 7c 02 | 08 74 d8 82 11 75 a1 52 cd 59 45 9e 38 4d d2 1d | 56 1f 81 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 31 12 3e 08 55 9e 26 f3 2f be 08 | b5 7f 7c 7d c5 5f 44 c0 00 00 00 1c 00 00 40 05 | 16 fd af 38 8b 2a c1 77 ea 51 ea 68 dc 9b f5 3d | 6a 08 67 b3 | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | #81 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 17 84 1d 01 f5 89 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #81 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #81 | rejected packet: | 66 17 84 1d 01 f5 89 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #81: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f0aa0 | handling event EVENT_RETRANSMIT for parent state #89 | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #89 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #89 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49608.149544; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500231 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #89 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 "road-eastnet-nonat-89" #89: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #89) | 9d 5f d8 02 80 b8 e7 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 e3 b9 05 71 34 7d 24 1f b0 78 15 60 77 1c 08 | 9e 6a 97 b0 4c 89 e3 5a dc c3 13 ad 84 6a 5e aa | fd ca 45 35 ba 35 de 44 be ce 11 ea 86 29 6c 73 | 0b 7f 74 63 63 d2 81 70 21 25 9e 55 c0 3c 14 62 | da 13 e5 79 f3 ac 65 c2 4c 57 6a e3 37 8f 5c 04 | 8a 01 65 69 49 a9 46 40 f2 f3 a8 b3 1a af d6 79 | f9 34 6f 04 49 9e f3 10 ca 6b d5 6f d3 e5 36 7a | c9 32 cd 69 df 91 08 6d 35 ec 78 52 d9 57 09 e3 | f5 63 af 57 d7 93 38 af ff 2c e8 36 87 e0 92 43 | f0 f6 97 f6 50 a5 d2 4c 16 d1 d2 d2 96 90 50 82 | 09 99 3b fa 59 66 b4 48 e1 b1 0d 01 76 3d b4 c2 | b2 4d a5 5c 8a c7 cb a9 bb 09 56 bf 65 e9 da 28 | 24 dc 22 59 97 49 92 d0 c5 d3 9b 2b da 0b d5 26 | df 68 b6 c9 f1 0d 58 08 b0 7e 26 ce 7d 24 b1 d2 | a7 c4 2d 42 0c 8d 57 57 7b 42 5d d8 f7 b9 c8 ba | e6 b0 9d 60 5a 01 d8 33 e3 a6 9f f1 3b 81 e4 a8 | 29 00 00 24 50 a5 b1 4c 6d 18 8a 79 34 52 af 57 | 9c b8 99 4d b9 e7 5c 74 bb 7f a4 8c e5 f5 2c a5 | 8d 6b 1d 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 41 ee 04 aa 3d b0 21 0a d0 67 73 | 50 8d e2 01 ce 26 f9 77 00 00 00 1c 00 00 40 05 | 7b 60 8a 47 58 c7 18 57 64 ec a9 8e 15 07 49 b1 | ed 9e c4 1b | libevent_free: release ptr-libevent@0x7fb38801abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f0aa0 | #89 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d 5f d8 02 80 b8 e7 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #89 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #89 | rejected packet: | 9d 5f d8 02 80 b8 e7 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #89: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fbb00 | handling event EVENT_RETRANSMIT for parent state #67 | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #67 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #67 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49608.163054; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003207 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a12c70 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #67 | libevent_malloc: new ptr-libevent@0x7fb38801abe0 size 128 "road-eastnet-nonat-67" #67: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #67) | d5 dc 19 08 bd ef 9f dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 15 d2 0d 8c 5c 68 38 3d 2d 2f ab 03 65 12 47 | 3e b1 d3 f9 3a 86 7c eb 4f 39 8c ad 4d 38 70 41 | d1 7d 9c 72 4f 83 e4 6c 89 f6 b0 17 b5 42 16 02 | 98 46 bb 9b ed 5c 3f ac 09 0d be a1 fd 38 36 65 | 29 1c 76 c9 62 fc be 23 07 ff 11 92 31 9b 27 f0 | d5 89 d4 07 37 e6 d9 c5 11 e2 68 cc f6 fa 8f ad | d4 d7 3d 81 a6 50 a2 3b 0c 6d a4 dc e7 02 2c 0e | b0 92 5d 4d d1 8c bc b1 d3 8b 8b 57 d6 a3 1b fb | 45 de 41 0c 4c 00 09 3b b7 02 6a 18 be d3 e2 bf | 60 42 87 71 10 49 5d 99 2a 98 69 45 a3 b9 8a 57 | c3 e1 71 dc 21 28 e6 7b 37 29 eb da 68 00 eb 12 | 52 79 13 c3 54 c6 f4 5a 0f 77 f8 92 a7 c4 70 9c | 42 51 17 18 c9 d7 b0 85 26 54 bb 62 a6 c6 48 68 | 6f 63 77 09 be 06 39 71 28 8e 68 84 3f f2 9b 78 | 53 a2 0d 5b a4 87 76 9f e3 e1 57 84 7f 83 44 ad | 59 6d db cc b7 ca a2 5b d9 9b 67 9f f8 59 1b 8c | 29 00 00 24 ea 05 1a 8b a3 08 e1 05 bd ec 39 06 | dc 75 19 c7 61 25 8f 0d bb ee a8 4f 1e a0 d7 a0 | e4 5f a7 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c a1 13 b6 f8 7a c8 5e ab 0d 26 ff | 9e 2c 49 6a b7 74 41 36 00 00 00 1c 00 00 40 05 | 1e 6d d9 18 71 66 9b 77 ce ef 92 9d c1 b1 8d 12 | ab 9b 0c 2a | libevent_free: release ptr-libevent@0x7fb37000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fbb00 | #67 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 dc 19 08 bd ef 9f dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #67 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #67 | rejected packet: | d5 dc 19 08 bd ef 9f dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #67: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #82 | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #82 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #82 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49608.208444; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003655 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fbb00 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #82 | libevent_malloc: new ptr-libevent@0x7fb37000cf80 size 128 "road-eastnet-nonat-82" #82: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #82) | 0d 59 4a 91 cd 0d a8 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d de 62 a5 d0 5e bf 56 63 0e 91 36 97 7a 1e b1 | b4 16 cc 30 41 76 2c 4d 4b 72 e2 c2 b2 a1 f9 60 | dd 93 5e 0e 34 f7 25 c7 9f 53 30 68 3a c2 8d 97 | 4c 9d fc 02 66 0b d5 60 41 52 07 34 69 fd 84 a5 | ec 72 09 87 c6 8f 05 fb 8f 4e 6b ba 77 83 dc 16 | 60 81 0d a8 71 f3 cf c7 95 36 23 35 f7 97 ca 50 | b2 db d3 48 30 34 aa be 9a a2 37 9b 39 19 60 98 | ac 8b 67 73 12 da 16 80 58 c0 2a 80 56 eb 21 9f | 3c 3d 73 57 e9 89 d6 8c 3d 04 dc a8 2c a0 35 72 | 3a b3 ec 9f 41 04 d4 7f d9 68 36 d5 13 cd 39 04 | 57 48 05 ca 9e f9 64 20 0d 91 1f 4e 5d ee 28 d1 | 38 36 5d 35 10 47 60 e0 25 2a b4 90 4f 2b 22 f8 | 94 db c6 d0 bc a1 a8 ee 23 9e 12 7c 06 be 13 c9 | e4 f8 bb 10 03 1f 37 ab 38 d2 32 58 2a 26 f3 33 | 1c 60 32 46 6c a1 0e 88 78 61 ec 6b c9 dd e6 45 | 58 22 90 cf 6d f9 2b cd d5 02 5b 51 ea 18 fb dc | 29 00 00 24 61 df db a2 1d df 12 0c 5e ab 31 16 | 03 92 3a 6f 24 ce 35 05 3e f5 da 2f 7c 0d 1e 54 | bb d5 49 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 70 c6 55 5e 2d 9d b0 0a d9 87 23 | 4b f7 4f fa 28 d8 1e 81 00 00 00 1c 00 00 40 05 | 40 ed 3d f8 bd 8d 40 9e 57 65 9a d5 21 53 67 44 | eb 0f 4b 38 | libevent_free: release ptr-libevent@0x7fb348009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #82 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a100f0 | handling event EVENT_RETRANSMIT for parent state #41 | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #41 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #41 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49608.208627; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004082 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #41 | libevent_malloc: new ptr-libevent@0x7fb348009640 size 128 "road-eastnet-nonat-41" #41: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #41) | 8c ff 26 ec fd d0 54 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 6e ec 95 3c 3a 16 99 41 58 58 6d 01 e2 00 52 | 61 4b c1 ec e1 3d d8 4e 54 c1 3f 99 6b 75 66 7c | 92 13 65 ae e7 70 46 75 9c c5 22 7e 39 16 2c 7c | ed 79 f7 7b 1e 03 31 32 5f 32 c2 43 74 2e 80 66 | 05 70 11 cc 43 ce 1e db 54 28 24 d1 42 b1 78 ad | e4 d1 e6 87 87 84 0f b3 11 50 a6 79 e1 08 7c 97 | 7e bd ba 46 ef f8 51 ce 68 86 83 2a 2c 29 00 29 | a5 58 88 f4 ed 2a f4 20 30 da 5d b1 69 45 2e 86 | 07 5f aa 0a 89 4a 6e 50 df 32 c3 37 59 a0 ba ad | 86 bd 19 1f 9a e2 19 57 1e fc 59 a2 20 ba a6 61 | df 8c b1 78 f4 73 20 28 d7 5d 27 a9 6d f4 51 05 | 00 85 1f 11 24 82 a0 ad b8 70 fc 6e 4d 99 a5 50 | dd 2e 79 4a 4c a1 78 07 7c f4 48 8d c5 cd ae 3d | 60 f1 3e 46 13 92 0c ad 34 dc 62 b8 45 01 1d 0e | 54 aa 15 f0 b8 36 03 5c 9a b5 ba b5 7c 77 32 6f | a5 95 b6 eb ec c2 d3 a2 c8 7a f9 23 04 ed b5 3b | 29 00 00 24 d2 1e ab ae e7 c2 8c f2 ef 74 c1 f0 | 3d f2 d7 f9 46 a9 e4 e0 b6 87 92 c1 10 9a fa bd | 74 9b e3 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 98 3f 00 de 9d 4b 8f 8e e4 88 e6 | cb 33 f8 3a c9 9d db 23 00 00 00 1c 00 00 40 05 | 7d 19 19 07 bb fc 4c f4 5b 43 3f 70 14 2d 10 a5 | 77 03 39 4f | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a100f0 | #41 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 59 4a 91 cd 0d a8 c9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #82 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #82 | rejected packet: | 0d 59 4a 91 cd 0d a8 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #82: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c ff 26 ec fd d0 54 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #41 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #41 | rejected packet: | 8c ff 26 ec fd d0 54 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #41: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0535 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-95" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-95' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #95 at 0x557d46a56310 | State DB: adding IKEv2 state #95 in UNDEFINED | pstats #95 ikev2.ike started | Message ID: init #95: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #95: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #95; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-95" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-95" IKE SA #95 "road-eastnet-nonat-95" "road-eastnet-nonat-95" #95: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-95 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-95": constructed local IKE proposals for road-eastnet-nonat-95 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 95 for state #95 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a30d70 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #95 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 | crypto helper 18 resuming | crypto helper 18 starting work-order 95 for state #95 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 95 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 95 time elapsed 0.000889 seconds | (#95) spent 0.897 milliseconds in crypto helper computing work-order 95: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 95 for state #95 to event queue | scheduling resume sending helper answer for #95 | libevent_malloc: new ptr-libevent@0x7fb35401d920 size 128 | crypto helper 18 waiting (nothing to do) | #95 spent 0.147 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-95" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.245 milliseconds in whack | processing resume sending helper answer for #95 | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 95 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #95 | **emit ISAKMP Message: | initiator cookie: | 04 bb 1c 2b 41 e0 8a 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-95 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 25 79 b0 02 7c 1a 3a 07 ca 11 d1 03 7a 77 85 cb | ikev2 g^x ae ba 70 1b ee 9d e4 3c fb 83 b0 cf 85 ea f6 b1 | ikev2 g^x 44 27 5d 05 92 dc 5f 4f 10 d0 a1 c9 ef dd c6 ab | ikev2 g^x ac a1 db c0 15 56 b1 c8 1f 3b 2a 1e 0e 90 2f d7 | ikev2 g^x 1a 17 b9 f7 eb 61 37 1e 43 cf 9e 15 29 73 84 5a | ikev2 g^x a5 ef e1 fb 94 7f 43 bb 78 59 95 64 2c 87 b9 4b | ikev2 g^x 2e 15 ae fc 6c ec ab 40 45 3d 2f f3 c8 00 44 83 | ikev2 g^x 12 a7 e2 b8 59 bb 92 ce 59 8c ba f6 68 47 32 55 | ikev2 g^x e8 20 37 e3 3d d3 1b 3c 4e 84 f3 ae 58 53 16 45 | ikev2 g^x 58 97 74 47 9d a2 44 2f 81 9e ee 5c e8 ce 37 e9 | ikev2 g^x 5c 14 3e 89 c4 f1 89 ca 70 e0 1d 7a a9 38 f6 40 | ikev2 g^x 66 fb 41 8c 9b be 2c ea fc cd 2c ca 26 30 dd f0 | ikev2 g^x b1 29 6c c0 a6 b8 e6 ad e2 7b ae 2b 83 8b e5 9d | ikev2 g^x 01 26 d8 0c 5a 11 5f 25 a6 3e 25 b6 0f 26 26 34 | ikev2 g^x 01 b9 a7 4b b7 42 77 99 87 64 20 bd 67 77 cc 7e | ikev2 g^x b2 79 54 9b 12 25 7f ea ef 16 57 4a f6 24 75 7e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce fc b1 a7 58 88 f4 1b 4f aa 0e 2d d3 a4 65 ca 66 | IKEv2 nonce dc 36 b5 47 7f 16 51 11 a3 c3 71 08 58 80 43 49 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 04 bb 1c 2b 41 e0 8a 6f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5f | natd_hash: port= 01 f4 | natd_hash: hash= ca 3c bb 33 78 12 9a 1b 10 5c d5 8f d8 1f d4 ad | natd_hash: hash= ee 67 79 04 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ca 3c bb 33 78 12 9a 1b 10 5c d5 8f d8 1f d4 ad | Notify data ee 67 79 04 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 04 bb 1c 2b 41 e0 8a 6f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 61 56 68 61 76 b1 38 9f d6 2b 7a dd 4f cb 90 80 | natd_hash: hash= 12 f2 80 83 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 61 56 68 61 76 b1 38 9f d6 2b 7a dd 4f cb 90 80 | Notify data 12 f2 80 83 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #95 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #95: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #95 to 4294967295 after switching state | Message ID: IKE #95 skipping update_recv as MD is fake | Message ID: sent #95 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-95" #95: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.95:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #95) | 04 bb 1c 2b 41 e0 8a 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 79 b0 02 7c 1a 3a 07 ca 11 d1 03 7a 77 85 cb | ae ba 70 1b ee 9d e4 3c fb 83 b0 cf 85 ea f6 b1 | 44 27 5d 05 92 dc 5f 4f 10 d0 a1 c9 ef dd c6 ab | ac a1 db c0 15 56 b1 c8 1f 3b 2a 1e 0e 90 2f d7 | 1a 17 b9 f7 eb 61 37 1e 43 cf 9e 15 29 73 84 5a | a5 ef e1 fb 94 7f 43 bb 78 59 95 64 2c 87 b9 4b | 2e 15 ae fc 6c ec ab 40 45 3d 2f f3 c8 00 44 83 | 12 a7 e2 b8 59 bb 92 ce 59 8c ba f6 68 47 32 55 | e8 20 37 e3 3d d3 1b 3c 4e 84 f3 ae 58 53 16 45 | 58 97 74 47 9d a2 44 2f 81 9e ee 5c e8 ce 37 e9 | 5c 14 3e 89 c4 f1 89 ca 70 e0 1d 7a a9 38 f6 40 | 66 fb 41 8c 9b be 2c ea fc cd 2c ca 26 30 dd f0 | b1 29 6c c0 a6 b8 e6 ad e2 7b ae 2b 83 8b e5 9d | 01 26 d8 0c 5a 11 5f 25 a6 3e 25 b6 0f 26 26 34 | 01 b9 a7 4b b7 42 77 99 87 64 20 bd 67 77 cc 7e | b2 79 54 9b 12 25 7f ea ef 16 57 4a f6 24 75 7e | 29 00 00 24 fc b1 a7 58 88 f4 1b 4f aa 0e 2d d3 | a4 65 ca 66 dc 36 b5 47 7f 16 51 11 a3 c3 71 08 | 58 80 43 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ca 3c bb 33 78 12 9a 1b 10 5c d5 8f | d8 1f d4 ad ee 67 79 04 00 00 00 1c 00 00 40 05 | 61 56 68 61 76 b1 38 9f d6 2b 7a dd 4f cb 90 80 | 12 f2 80 83 | state #95 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a30d70 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0eb30 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #95 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 | #95 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49608.231457 | resume sending helper answer for #95 suppresed complete_v2_state_transition() and stole MD | #95 spent 0.483 milliseconds in resume sending helper answer | stop processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35401d920 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 bb 1c 2b 41 e0 8a 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #95 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #95 | rejected packet: | 04 bb 1c 2b 41 e0 8a 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #95: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #90 | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #90 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #90 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49608.236705; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501053 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a100f0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #90 | libevent_malloc: new ptr-libevent@0x7fb35401d920 size 128 "road-eastnet-nonat-90" #90: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #90) | 26 95 92 02 0c 74 14 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 ed e3 a8 eb 0c e2 00 1e b8 30 77 f5 0e ad ce | 65 c1 45 a9 f8 d6 59 16 4d 14 6e d4 77 5e 81 5d | e4 5a fa df cb d1 e9 b4 fb 7a 1b 94 96 f5 cd a1 | 92 48 08 b0 94 02 60 49 2d a3 e6 bd 87 20 3a b6 | b3 a4 42 54 6e e3 59 4f 33 f7 d9 14 23 f3 be 46 | 0e 6a b0 16 f3 25 4c 11 1c 90 dd a1 d3 04 dc 69 | 8d 39 0c 51 5f 83 72 cb 93 87 70 c9 f5 3d e0 2a | c5 11 3c 75 bc 46 e8 c6 f5 45 c5 bc bb 53 d8 9c | 7a ab 11 6e 8b 56 f1 6e cd 93 8a 23 e4 3d ba 8e | f3 e8 36 9d 53 65 3b 19 f4 e3 cc f3 54 92 3e af | 1e ea f7 7a 71 af d2 c7 14 e2 2f f0 39 fe 17 bf | 5f 5e bd 3d 44 b3 a2 13 36 c4 88 da f8 e8 06 a9 | 63 d0 49 96 b9 8b b5 05 47 2d f0 7c f0 b7 4b a3 | d9 0f 59 ad 42 e6 a2 62 85 25 36 ae 56 68 a9 08 | 18 48 13 b3 3d 8c 24 fd 03 b0 13 b0 fc 3c f6 fc | 7b 2f 36 dc 82 d7 51 c4 8b bc 56 3e 48 7c ce 7f | 29 00 00 24 7b f2 d7 97 09 c8 65 d1 69 47 34 b1 | 55 8b 56 a2 4a 71 ee 64 d5 6c 65 05 c4 2c 51 b4 | b0 ab 0f 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 4b f3 32 75 d7 ef f4 06 67 91 40 | 71 93 9a 6d f5 fe b0 cc 00 00 00 1c 00 00 40 05 | 99 8e 72 1b 4f e3 a6 e8 23 e7 c4 0e ce 5c a4 3c | cd e1 15 1b | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #90 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 95 92 02 0c 74 14 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #90 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #90 | rejected packet: | 26 95 92 02 0c 74 14 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #90: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3a590 | handling event EVENT_RETRANSMIT for parent state #68 | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #68 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #68 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49608.258077; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004059 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #68 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-68" #68: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #68) | 70 75 31 66 aa 5c 9c e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 5d b8 31 5b 51 c7 81 22 c3 12 8e cd 03 2f 05 | f3 e7 e9 e0 56 07 0e 19 4f f3 59 f8 5f 92 30 b5 | 72 b6 ae 5a 15 67 03 c0 c9 25 86 6f b6 cd 52 32 | 93 89 9d 85 44 28 f4 e9 22 34 65 fb b6 28 63 5f | 80 98 37 5a 06 27 0e fb ee f6 cc 60 03 1e c8 99 | 96 20 20 2b e8 6a b0 1d 57 83 e1 9f d1 09 80 29 | 2a 2a 69 37 ce 92 30 79 1a 45 aa a3 bd 30 cd 8b | 23 97 c9 73 f8 32 ee fe d7 1e 67 73 bd 11 db 26 | 12 e8 63 a6 c5 a1 37 4f 2f 5c 98 66 44 92 9a da | 46 ed 57 a3 46 50 a7 e5 d9 ec 61 b3 fb 59 43 1f | 96 83 9a 55 36 c4 68 5f a7 ee f4 08 c7 30 31 52 | b8 7e 06 a5 b1 e2 2e 1a 2b de 01 96 c6 3e f1 89 | d8 1f b9 ac 77 f1 c6 91 93 f5 70 bc 2f 41 d6 e3 | ff da e8 8a 1d 5f de 22 6f 38 d0 51 a3 b4 49 ef | d5 06 ff ea 4d f6 71 eb 33 f8 fd c7 e6 95 54 de | 64 89 15 37 cd bd bf d2 74 6c 8e f3 c4 d1 b1 ad | 29 00 00 24 8c 8f d0 a2 59 9b be 88 0a db 9c c0 | a3 eb 04 0d aa d5 13 33 65 39 12 37 76 6e 7e e3 | e3 60 8c 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 a4 28 dd c4 89 9a c5 51 2a d8 15 | 55 6e c2 5e f1 52 b9 d0 00 00 00 1c 00 00 40 05 | ac d9 33 90 76 69 a3 40 a6 e4 ee bb 11 92 b7 71 | 1e 90 c3 02 | libevent_free: release ptr-libevent@0x7fb354009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3a590 | #68 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 75 31 66 aa 5c 9c e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #68 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #68 | rejected packet: | 70 75 31 66 aa 5c 9c e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #68: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1da10 | handling event EVENT_RETRANSMIT for parent state #83 | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #83 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #83 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49608.265408; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001142 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #83 | libevent_malloc: new ptr-libevent@0x7fb354009640 size 128 "road-eastnet-nonat-83" #83: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #83) | e6 2b 97 c6 d1 4c 13 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 e0 14 c2 4a 13 d8 77 12 b1 93 fe 09 ee 1d 88 | 31 85 5e 91 48 ad b1 20 71 3f cb af eb 92 c7 d3 | e3 3b dc e2 9e c2 45 29 c9 59 6d 7a 62 12 34 26 | 8c eb c3 61 ed 07 95 b3 f8 74 eb 61 63 eb 1c b2 | 60 84 c3 e0 69 12 37 aa 40 a9 ee 46 d3 1a 26 fd | 77 29 43 bd fd b4 e3 3b c7 a8 7e e9 e3 51 f4 e6 | b9 4a 57 59 1d 18 ef df e9 5a be 77 08 df e7 55 | 46 7f 6c 4f 13 29 e4 bb ef bd 6c fb 60 8b fc 62 | e9 ba c0 54 d3 2b 44 c6 2f 29 d7 34 b4 6b 61 c0 | c9 cb 1e cb a6 25 28 61 95 9e 2c f5 86 69 f9 7c | b8 7c 34 c0 e0 ed f4 f7 82 f9 b3 c4 8e 1a 55 fb | d8 ed 0f e9 ed ff da 76 3e bb 0b ca e5 d5 7e 00 | 28 52 cc 3e d7 7f e9 d9 c5 bd e9 a7 17 e5 95 51 | 9f 9f 95 b4 65 d9 e7 b3 d2 a5 c2 fe 86 92 6e 23 | 5c 06 60 94 75 50 49 bf 5b 48 f5 bd b4 b4 de 5e | dd 11 02 11 73 fd f3 0f cb 43 d1 ff 6c 2f 1d fa | 29 00 00 24 d9 ea 5f 5d e7 8b 27 ca 82 31 28 fd | 7a 4f 51 83 32 9a 18 8a 6e 2a 8b d4 95 e6 d6 b1 | 0f 0b a2 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf 83 ee f4 b4 fb 0f 43 eb c7 c4 87 | aa a0 5e 5c f1 0e 63 f4 00 00 00 1c 00 00 40 05 | 05 b9 81 d9 1f fe b2 68 6c 59 f2 c5 07 41 cc 9a | 8a 8b 10 9b | libevent_free: release ptr-libevent@0x7fb37c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1da10 | #83 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 2b 97 c6 d1 4c 13 c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #83 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #83 | rejected packet: | e6 2b 97 c6 d1 4c 13 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #83: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #1 | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #1 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #1 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49608.277748; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.01503 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1da10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #1 | libevent_malloc: new ptr-libevent@0x7fb37c00cf80 size 128 "road-eastnet-nonat-1" #1: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #1) | 6c 47 a0 1e 4e 7a e8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 72 0a 33 22 17 06 fc fa 28 91 b3 4f 57 56 e3 | ee 34 d7 20 66 52 7a 35 d8 92 bd 3b 01 15 87 45 | 58 9b 73 12 6d c9 2d 63 ff 30 68 a3 01 b0 11 62 | 0d 6a c8 7a 26 90 7a 07 0b 27 d1 49 b8 5c b5 22 | a1 78 8f 5c ca 62 0b 66 89 cf a4 d3 28 f3 60 65 | c4 0b 09 ab 6c 65 0c 24 ce 5f 6b 9e 2d 74 21 c1 | cc dd a3 d2 b1 b2 d7 b0 e3 c8 e7 e0 b1 08 40 98 | ea 60 7f cb f6 03 0b de 16 74 c6 45 5a 5d fd 06 | 19 e0 e9 1d 81 07 89 02 31 28 9a 67 2f ad 6e 4a | 5d d5 b0 90 bd e1 d1 0c 6f c0 ca db 12 8a 57 f5 | 47 c8 09 2a 1b de 2b dc d0 ab ee bf fc be 4f ae | f0 8e 4b a7 a7 58 e9 98 9f 49 09 09 2b 4d 67 80 | 28 41 88 84 93 b4 f0 c4 d7 78 27 c0 fe b8 4a 13 | 52 ab 44 91 d1 9f f2 59 6f dd 35 3c 1e 70 9c d8 | 9d ab 34 6f 48 48 c0 46 69 91 44 bd 80 07 2d e1 | 42 55 8f bd 8c 53 47 7c 85 94 0c 8c ae 5e 19 a4 | 29 00 00 24 e7 5a 07 18 3f 34 30 d2 f0 5d 94 65 | 65 0d d9 4a 64 02 60 6e 32 ba 95 35 8b ff 59 40 | 3a 8b 9e 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 00 78 5c 8b 16 a5 c0 7d 51 c3 29 | 54 44 32 39 1b 8f 23 e8 00 00 00 1c 00 00 40 05 | 68 e9 c0 40 f1 97 39 51 93 0a 30 e5 6a bd eb d1 | f4 d9 bb 8c | libevent_free: release ptr-libevent@0x7fb358009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | #1 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 47 a0 1e 4e 7a e8 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #1 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #1 | rejected packet: | 6c 47 a0 1e 4e 7a e8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #1: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #42 | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #42 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #42 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49608.292089; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003737 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #42 | libevent_malloc: new ptr-libevent@0x7fb358009640 size 128 "road-eastnet-nonat-42" #42: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #42) | 6d 45 59 82 ce 2c 77 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 19 87 21 99 aa 5a cb db ce 0f 02 f2 50 c9 ac 92 | 89 7c 70 85 a8 a7 33 4a c2 44 36 a5 03 8e 1f 50 | c8 86 2e d1 a1 d8 14 17 9c 7c a1 44 65 ba 61 77 | f0 62 19 6f f9 72 cc 36 22 03 c3 7d e3 8c 01 7c | 58 c0 91 2e 4f 24 ac cd af f7 da 61 3e 4b 43 c9 | b4 5d 67 e2 f1 65 be 23 88 f7 f4 e6 25 50 c9 e3 | 21 af 1c 45 62 8a 73 3a 98 47 b9 78 6f ee 87 26 | 3b 63 01 1e 58 61 99 0e 7a 91 7d 30 e0 59 53 0b | 92 57 66 fd a7 1f 2b 11 d7 59 95 9a 31 fc 95 b7 | 6b 6d 54 d3 d2 0f 8f 6e 22 a6 95 24 ad 69 c7 e4 | 30 99 2e f3 f9 ce 36 7f 2b 10 24 3b 8a de bf 7e | cb e6 f5 71 51 3c fe 08 40 b7 0a aa 06 06 b7 d2 | 69 fa d5 d4 16 ea b0 b1 e6 af 20 69 3c 12 1e 86 | 3a 05 a1 45 01 d3 59 e6 49 c9 c2 6a 69 6b a1 a1 | b0 18 e7 68 dc 1f 70 e8 33 59 8d 8e 1f 6a e1 13 | 5e 04 b2 02 62 fb f4 16 44 cd 9d 1e 33 84 73 83 | 29 00 00 24 98 90 54 f6 26 53 aa 96 7a 47 ff f3 | 5b dc e1 95 5c f0 6d 5d ed 6d 00 c6 1d e8 59 f1 | 2a 1c 8a 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 cb 92 0c 07 24 d9 90 48 22 d8 76 | e5 5b bc c8 39 99 d2 4d 00 00 00 1c 00 00 40 05 | cb e3 e2 5e 9a 09 f4 90 ee 73 df 07 77 16 6b 37 | da 99 3b e3 | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #42 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 45 59 82 ce 2c 77 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #42 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #42 | rejected packet: | 6d 45 59 82 ce 2c 77 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #42: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #91 | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #91 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #91 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49608.314518; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500148 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #91 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 "road-eastnet-nonat-91" #91: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #91) | a6 f1 37 27 17 86 c6 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 6a 94 73 f6 c2 01 42 8c 6e f6 05 6f 1c e2 ee | 38 45 16 e5 f6 17 c9 fc 07 cc bc 0b 02 da 35 c8 | 5a ca 9d 87 29 53 47 69 49 7f 31 f0 fb ce e2 59 | 00 57 9b 32 9e 1f da 4b f7 41 b5 05 14 af c4 d7 | 09 7f 69 01 a0 cd 93 57 e5 a7 fd 93 a9 9e c3 fc | b0 af f5 37 11 6f 2b 38 a8 2a 8b 37 b3 e6 bc bf | 0c 06 37 86 ca f2 b6 b0 ed 1e 3f d6 8a f0 0b f9 | e8 80 df 35 d6 a2 36 c0 a2 dc a4 1a ca 7d d9 0b | 6f fc 29 fc 92 12 f8 05 c1 88 8e 81 27 4a 61 62 | c3 16 fc 6e 5e a6 59 bf d1 b1 ad d5 92 05 c4 60 | 2f 54 a3 71 e0 ec ca 5d 37 16 ec 5f ec 37 29 2d | 46 5a 04 10 84 ad 36 aa 07 ca f2 60 8b 7c ac f8 | ac e2 8b a3 69 23 74 f2 d2 2d c5 0d 51 9b 2c 7f | 42 45 54 c3 ec 3d 44 63 f0 0a ec ff b3 69 48 ee | 22 28 aa af 72 8c cd ca 9e 3c dd f6 ac 2b 6f b7 | a1 90 21 32 ae b8 23 39 1e cc fe 3e d6 b6 21 70 | 29 00 00 24 29 05 58 2b f0 ba fb 18 77 b3 53 8d | 8b 05 bb 0a 8a c5 e8 dc 24 17 58 d9 a6 60 c9 1d | bc c9 21 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 d0 cc 50 f7 83 7e b1 80 37 a7 4b | da df 68 8f 62 b7 e5 89 00 00 00 1c 00 00 40 05 | 8a 41 f9 2e 73 42 40 08 8e 79 f6 3e 7a 3f 48 7e | 67 86 16 af | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #91 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 f1 37 27 17 86 c6 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #91 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #91 | rejected packet: | a6 f1 37 27 17 86 c6 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #91: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e8820 | handling event EVENT_RETRANSMIT for parent state #69 | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #69 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #69 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49608.320854; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00228 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #69 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 "road-eastnet-nonat-69" #69: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #69) | f2 a5 7f fe 4a 34 bb 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 e4 3b 13 88 fe 14 57 37 ea f2 64 67 d0 00 fc | 08 06 ee d2 9e 18 57 6d 24 e0 9d ec 05 43 cc ba | 46 84 14 09 e9 e2 59 69 78 ab 8d 44 b4 c5 40 3a | a2 89 7d 06 7b bd cc e4 70 62 31 9f 43 8b b5 bc | 3c 9f 69 fb 1f f5 22 54 18 e5 72 15 5a 48 ee 5c | c3 f3 42 0b 25 4e 7f 00 ca 3e e9 db 4e ab 7a 2a | 5e 8e 14 a5 6c b8 fa ac c8 1b f3 01 fc 2e 88 fc | de 9d 1f b4 30 64 da 79 40 14 b9 cb 57 7b 44 a9 | 8b 4d e2 fe 10 ef 78 5b 95 32 a7 75 3e 68 a2 02 | 50 a9 63 99 4c de c2 a2 55 8e e7 c1 4c 9d ba d5 | 23 4b 1b 11 eb 5b d1 0e 0a 69 30 ae 96 7b a4 e6 | d5 07 c0 08 e9 6f 21 3e f5 fc eb 69 b8 6d f7 0c | e4 6a a2 62 87 f1 46 98 bb 82 fd ef c3 b7 37 d9 | 4f 4d 06 a6 46 29 3d cf 6d 59 1a 7a 7d 4c 43 d4 | 05 3e e7 70 e1 23 3b 86 eb 4e 8f 26 e0 cf 97 cf | 6f 21 b0 32 5e 71 a6 25 0b f1 15 b5 06 82 51 60 | 29 00 00 24 ca 10 ed 53 1e ff c5 43 38 73 0a 51 | c6 98 7c 29 17 9d 86 f8 04 d8 2e 0c fa 41 a7 af | 38 8b 0b 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 9a cb 7f 17 aa e7 97 ca 43 a3 43 | c3 e4 41 43 e3 4b 2a 3e 00 00 00 1c 00 00 40 05 | 50 72 12 31 6b fb 9c 33 88 e7 6f 1a 9e 5d 70 fe | 3b 28 e9 92 | libevent_free: release ptr-libevent@0x7fb35000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e8820 | #69 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 a5 7f fe 4a 34 bb 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #69 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #69 | rejected packet: | f2 a5 7f fe 4a 34 bb 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #69: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0826 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47ed0 | handling event EVENT_RETRANSMIT for parent state #84 | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #84 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #84 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49608.328257; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.0033 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f0aa0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #84 | libevent_malloc: new ptr-libevent@0x7fb35000cf80 size 128 "road-eastnet-nonat-84" #84: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #84) | 1f 2f b6 8b 51 48 06 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 1f 67 e9 76 20 6a 2b f7 ad 13 77 97 e1 68 87 | e9 75 71 19 c9 83 f3 73 fb 25 68 00 8c ff f8 c9 | 1d 39 8c aa 48 91 67 ae d7 68 2a 58 40 8a 8f c7 | 80 6c 8a 0d 2c 34 0e dd 31 f9 0d 20 54 ae b8 ad | f3 e5 66 87 27 c1 b9 3b f7 7e 5f 91 9e 13 72 c4 | fb 1c ec 84 d9 28 50 4e 83 04 2b 64 28 38 b2 c3 | 26 3d 3f fe b0 3a 31 93 a2 da 74 58 0f e3 c4 e7 | 1b d4 4a 7b 98 e4 bf 2d 17 77 1c c7 60 c6 cd f4 | a4 b3 3e 33 44 58 50 ab 79 af 8a 67 8e c3 a4 76 | 74 f4 47 b0 6e 53 b7 1d 0a 98 f8 36 13 56 c4 89 | c8 ca cc fb f1 a4 98 cd 59 ff 4a e3 78 5d 3c 67 | 86 c4 70 68 e1 a0 3e 7b 7f c1 2f 3d a4 0d c2 c5 | bd ed 93 ba 2d ff bd 57 2f b9 ac d7 dc 77 9f ae | 61 e7 8a 25 fb 95 fa b6 ae 27 5d f2 7d 25 5c 37 | cd dc a1 e7 01 66 ba 0c 28 2e 4b 30 85 a4 73 58 | f5 b4 a3 77 ea dd 82 87 c2 5d 3f 72 7d 74 36 cc | 29 00 00 24 76 ac e1 c3 58 b8 41 7b 54 b2 2a 6d | c8 c8 51 a4 ca 16 83 ce 76 9e a1 e9 43 b8 d3 34 | c3 53 e0 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f 3a 1a f8 04 5d 3c b5 2b e1 4e ab | 33 49 9d 7d 4f 74 a2 8f 00 00 00 1c 00 00 40 05 | 1b c4 6f 3a e9 14 b6 7b 2a e7 ad b0 65 58 df 39 | fd 38 92 37 | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47ed0 | #84 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 2f b6 8b 51 48 06 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #84 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #84 | rejected packet: | 1f 2f b6 8b 51 48 06 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #84: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-96" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-96' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #96 at 0x557d46a578d0 | State DB: adding IKEv2 state #96 in UNDEFINED | pstats #96 ikev2.ike started | Message ID: init #96: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #96: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #96; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-96" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-96" IKE SA #96 "road-eastnet-nonat-96" "road-eastnet-nonat-96" #96: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-96 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-96": constructed local IKE proposals for road-eastnet-nonat-96 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 96 for state #96 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47ed0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #96 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 | #96 spent 0.146 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-96" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.235 milliseconds in whack | crypto helper 7 resuming | crypto helper 7 starting work-order 96 for state #96 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 96 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 96 time elapsed 0.00095 seconds | (#96) spent 0.957 milliseconds in crypto helper computing work-order 96: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 96 for state #96 to event queue | scheduling resume sending helper answer for #96 | libevent_malloc: new ptr-libevent@0x7fb34801d920 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #96 | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 96 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #96 | **emit ISAKMP Message: | initiator cookie: | 4d 94 02 39 3c 71 1f ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-96 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x bf 27 e8 d9 3b fa 4a fd 06 7e 6c e7 d4 28 0e 9b | ikev2 g^x df ea 6a b2 fc 9c 70 c8 54 bf db 6f b0 0a 35 03 | ikev2 g^x f4 08 a8 1f a5 9d 3d d9 36 ba b8 d7 c7 a5 02 b2 | ikev2 g^x bf b0 56 c5 e8 85 3a 3f 3e 64 27 86 e6 32 36 9e | ikev2 g^x e3 cb 8f 61 07 7c f1 f7 b9 98 01 dc 75 bf ec 8e | ikev2 g^x e7 f3 67 03 e1 e0 44 02 7f 11 18 67 70 37 2d 5e | ikev2 g^x 1b 6f 89 19 20 17 f1 e7 a8 e9 33 cb ea 00 46 56 | ikev2 g^x 49 ba cc 5d 15 50 da 98 ff 9c 3f 56 7f 50 23 17 | ikev2 g^x 4f 39 25 c0 2c 24 4b 31 aa 08 bf c3 fa 73 75 f8 | ikev2 g^x 66 d4 df a2 81 2f b6 b1 85 b3 e1 b9 2c ba cc f0 | ikev2 g^x 05 a5 8e 76 4a d0 1e 4a 24 c4 b4 b6 c2 9f 5a c8 | ikev2 g^x d7 f7 62 5f e5 ae 58 69 f5 08 1a e6 3f f8 45 99 | ikev2 g^x 93 41 5e 16 d1 fa c4 dc dc 43 aa 67 19 5f 0d 6b | ikev2 g^x d0 93 a7 d0 e0 42 60 37 df bb b8 67 3d be 3f 73 | ikev2 g^x 01 ab df b7 44 63 b3 2e 2f eb b6 11 c7 6c 12 e1 | ikev2 g^x 09 64 f6 e9 82 4b 4a d1 f8 5c 86 44 cf 9c 7b 84 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce fb b6 a6 14 5d d4 9f d4 3b de f1 45 f6 4a ea e3 | IKEv2 nonce bf d0 33 9e b1 50 af 7d ca 56 7c e5 77 5f 83 b3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4d 94 02 39 3c 71 1f ed | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 60 | natd_hash: port= 01 f4 | natd_hash: hash= fb 32 ad 1c 75 03 32 df 0c 2b d0 a0 cb f7 34 b2 | natd_hash: hash= 23 e4 90 14 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fb 32 ad 1c 75 03 32 df 0c 2b d0 a0 cb f7 34 b2 | Notify data 23 e4 90 14 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4d 94 02 39 3c 71 1f ed | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 3d 4e a8 fd 45 70 26 15 be c0 96 dc 33 de 8f ea | natd_hash: hash= e2 1a 12 a7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3d 4e a8 fd 45 70 26 15 be c0 96 dc 33 de 8f ea | Notify data e2 1a 12 a7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #96 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #96: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #96 to 4294967295 after switching state | Message ID: IKE #96 skipping update_recv as MD is fake | Message ID: sent #96 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-96" #96: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.96:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #96) | 4d 94 02 39 3c 71 1f ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 27 e8 d9 3b fa 4a fd 06 7e 6c e7 d4 28 0e 9b | df ea 6a b2 fc 9c 70 c8 54 bf db 6f b0 0a 35 03 | f4 08 a8 1f a5 9d 3d d9 36 ba b8 d7 c7 a5 02 b2 | bf b0 56 c5 e8 85 3a 3f 3e 64 27 86 e6 32 36 9e | e3 cb 8f 61 07 7c f1 f7 b9 98 01 dc 75 bf ec 8e | e7 f3 67 03 e1 e0 44 02 7f 11 18 67 70 37 2d 5e | 1b 6f 89 19 20 17 f1 e7 a8 e9 33 cb ea 00 46 56 | 49 ba cc 5d 15 50 da 98 ff 9c 3f 56 7f 50 23 17 | 4f 39 25 c0 2c 24 4b 31 aa 08 bf c3 fa 73 75 f8 | 66 d4 df a2 81 2f b6 b1 85 b3 e1 b9 2c ba cc f0 | 05 a5 8e 76 4a d0 1e 4a 24 c4 b4 b6 c2 9f 5a c8 | d7 f7 62 5f e5 ae 58 69 f5 08 1a e6 3f f8 45 99 | 93 41 5e 16 d1 fa c4 dc dc 43 aa 67 19 5f 0d 6b | d0 93 a7 d0 e0 42 60 37 df bb b8 67 3d be 3f 73 | 01 ab df b7 44 63 b3 2e 2f eb b6 11 c7 6c 12 e1 | 09 64 f6 e9 82 4b 4a d1 f8 5c 86 44 cf 9c 7b 84 | 29 00 00 24 fb b6 a6 14 5d d4 9f d4 3b de f1 45 | f6 4a ea e3 bf d0 33 9e b1 50 af 7d ca 56 7c e5 | 77 5f 83 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 32 ad 1c 75 03 32 df 0c 2b d0 a0 | cb f7 34 b2 23 e4 90 14 00 00 00 1c 00 00 40 05 | 3d 4e a8 fd 45 70 26 15 be c0 96 dc 33 de 8f ea | e2 1a 12 a7 | state #96 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47ed0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47ed0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #96 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 | #96 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49608.3366 | resume sending helper answer for #96 suppresed complete_v2_state_transition() and stole MD | #96 spent 0.472 milliseconds in resume sending helper answer | stop processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34801d920 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d 94 02 39 3c 71 1f ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #96 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #96 | rejected packet: | 4d 94 02 39 3c 71 1f ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #96: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28af0 | handling event EVENT_RETRANSMIT for parent state #43 | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #43 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #43 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49608.373101; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.009145 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e8820 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #43 | libevent_malloc: new ptr-libevent@0x7fb34801d920 size 128 "road-eastnet-nonat-43" #43: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #43) | cc ee 6c 19 e2 66 91 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 b3 dc 74 af 8b 5f 17 f2 a2 67 e8 55 b6 7f 2f | d6 4e 7a 73 eb 13 7d 78 44 82 5e 9f c0 c9 a7 ce | 19 55 10 32 8b 27 a5 29 28 74 fd 00 e6 f7 6a 74 | 56 7d 4b 3f aa d7 b5 46 cb 2d 3c a3 dc 3f bf 05 | 8d ef fa 60 0a d7 e7 b4 43 44 81 a1 10 dd db 69 | 30 53 16 90 a0 49 c9 94 16 9b 8e 16 05 cc a3 b0 | bb c8 6f 12 2c 69 ac ba c2 57 c1 0e 1d 24 c4 b7 | c5 6e 9f 50 e2 e4 26 8c 25 36 d7 6d d8 cd 2c bd | d4 0a 33 47 c9 6e 1d c8 6c 02 27 85 0b ac 4e d8 | 84 b3 28 76 fc c6 2f a9 af 4b b0 f5 08 9e 56 b5 | 24 d4 f4 cb 0a 9c 0d ce 12 fa 25 29 9d 95 d6 4a | 9a e8 aa eb d1 08 9a 51 c5 21 4d b3 dd e9 4f d9 | a6 74 14 2d 42 fa 5e 68 63 d0 8e 8d 34 39 23 04 | 84 91 4d 1d 1d 39 77 e7 bb f1 e3 79 e8 0b 4e 9f | 52 2d 52 8d 33 23 04 37 3b 2c 9b 0f 37 da 18 16 | 07 6b 4f 80 6f e8 48 15 68 23 83 ca b6 b1 12 eb | 29 00 00 24 d5 f8 b0 cb f4 3b d7 c6 a9 5b 1f ef | 6f 5a 34 02 07 02 b5 92 c9 43 df 42 45 9e 46 a4 | f2 42 44 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 70 b3 40 c0 d2 23 ad 4c 6d 70 f1 | 0b c9 5a 99 fd 55 fa c5 00 00 00 1c 00 00 40 05 | fc 9d 2b d9 20 f9 c1 0e d3 88 83 de d6 d0 5e 66 | 9c 2c 6f e5 | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28af0 | #43 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc ee 6c 19 e2 66 91 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #43 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #43 | rejected packet: | cc ee 6c 19 e2 66 91 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #43: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #70 | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #70 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #70 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49608.380439; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002015 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a30d70 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #70 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 "road-eastnet-nonat-70" #70: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #70) | 80 24 74 22 d5 0f 52 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 68 71 3c 0e 60 a8 bb a5 bd cc ef ef 0c eb f4 | 82 28 4b 5e 34 f6 13 aa c3 d7 89 31 ad 91 46 ac | 15 dc aa e6 7a e7 0b 3f 82 69 6e e1 56 f0 c8 52 | de 05 0d fd 08 00 ee cd cc b6 87 fe a0 b0 ff e6 | 05 55 e6 b7 5e 20 53 79 90 12 ce ff 82 cf ad 41 | 3f a9 51 ad f1 8c d6 57 77 1c ef 27 f0 57 e1 8c | 97 cb b6 ce ff c0 f1 f4 a5 49 d9 74 1f 1d 74 75 | 54 be f3 af 4b 6b 43 9d 43 d4 e5 05 71 04 36 2c | c7 7c 5d f8 30 fc 44 25 48 9e 9e 82 91 e8 e4 34 | 70 26 3e 95 67 c5 a4 cb 36 d4 25 b1 2b 4a 77 2f | ae 15 52 3f 18 49 f9 47 bb a7 d2 0a ef 99 db 3d | 39 af f3 91 da 08 e3 b3 1f e4 ed 82 f5 26 e3 03 | 98 c1 58 ff ba 18 2d c8 81 ea 83 51 70 26 1e 19 | 23 60 13 98 08 43 34 78 7d 3c 93 d1 af b4 fb fe | d5 41 09 8b c9 2b 05 f4 1c a3 62 cd 21 e3 82 7b | 55 52 fe 90 11 4a 62 6c 99 8c d7 30 a6 21 f0 d1 | 29 00 00 24 e3 da 6d 7f a1 8b eb f9 61 52 ce 97 | 54 be ad 07 4c e8 1e 18 ff 49 38 58 56 77 f6 8a | c3 33 cb 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 9f 21 cd 26 5d 21 04 f0 de c9 2f | 2e 65 dc 8c 6b f1 6c dd 00 00 00 1c 00 00 40 05 | 7b 41 25 4c 4c ca db 2b 78 bf 1e 87 08 ff 47 0c | c4 b0 37 95 | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #70 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 24 74 22 d5 0f 52 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #70 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #70 | rejected packet: | 80 24 74 22 d5 0f 52 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #70: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0665 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d590 | handling event EVENT_RETRANSMIT for parent state #85 | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #85 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #85 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49608.3878; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002346 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #85 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 "road-eastnet-nonat-85" #85: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #85) | b7 4f d7 db a6 e2 bd 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 c8 89 a4 0b 04 f2 b9 62 f8 58 f1 1c 0c 91 1a | aa 25 df 1a e7 a5 32 9d 0b b5 9b 93 ab d7 64 b6 | 7e 0d ee f0 b5 83 e8 90 d8 94 b7 d1 ea 05 1c 4f | 85 63 ef bf 80 da 59 c5 18 c9 fd 82 f7 cd 12 c7 | ec b4 9e 35 b0 0c 13 ac 89 c3 d8 6c 14 b9 3b f7 | 41 eb 65 45 c9 66 0a f2 c7 e9 1b 09 a2 d5 ad 2e | 24 aa 0a a8 48 81 8f bc 8d df 3f 90 a2 d2 26 b2 | 84 b7 2d b6 67 ac 5a fa 85 04 e2 96 e3 0b 1d f3 | b9 b5 0f f0 5b d4 c6 d3 b2 9b d4 ad e6 94 18 68 | bf f6 64 ed 26 d4 b7 68 7f a4 94 0e af 4c 0c b4 | 64 91 32 f4 da 5b 38 c2 84 b3 fe 0e e5 1b 3f a5 | 6b 83 a5 f2 b9 7d 21 72 89 70 28 f2 d4 86 bb fd | 03 43 fe f4 4e 6c 9c 49 29 03 b2 15 2f 72 ba 73 | 18 d4 39 82 08 55 da c3 e4 86 cb d0 04 31 94 6a | f5 7b 4a de 4d 49 5a 6d 51 3e 71 b4 0d e8 2e 33 | 9f 26 4a 91 c4 9b 06 1a 88 4b 6e 77 93 8a 7d ed | 29 00 00 24 af e3 01 7b 71 cd 34 07 4b 0a a0 9b | 85 75 4e ed b9 b3 c5 7d 83 a1 ee 6b 3c aa 39 e2 | 0b 8b fa b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 41 7b 44 0a d6 6d 6a b0 b1 8e ad | b0 c3 33 77 45 ba 39 18 00 00 00 1c 00 00 40 05 | 63 0f 1e f2 8f 76 1d 60 09 1e 0d 94 28 78 d8 b0 | 16 5a de 8a | libevent_free: release ptr-libevent@0x7fb3480180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d590 | #85 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 4f d7 db a6 e2 bd 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #85 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #85 | rejected packet: | b7 4f d7 db a6 e2 bd 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #85: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000d120 | handling event EVENT_RETRANSMIT for parent state #92 | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #92 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #92 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49608.395107; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500651 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d590 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #92 | libevent_malloc: new ptr-libevent@0x7fb3480180b0 size 128 "road-eastnet-nonat-92" #92: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #92) | 07 61 83 69 17 8d a7 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 13 06 9b 22 b9 09 02 07 4e 56 e2 9a 05 b7 70 | b7 25 ba 3c e0 d7 4b 41 68 60 e2 84 fa 7d 2e 53 | 6d 05 81 6c 1d a6 11 6c f3 c1 91 94 93 3c 04 e1 | 47 48 3f a6 f9 c1 bd d3 55 1c 44 87 99 6c 2b ee | 1a fc ef da ca ee 71 5f 90 30 42 cf 28 4f 89 1f | 86 f8 61 c0 95 c8 84 9c 1c 5f 1c 12 41 c6 05 de | 97 e9 89 32 6b 06 59 ff 06 2b 2f 06 a3 7f d2 ee | 73 0b 6d 38 c1 ed f4 4b b5 20 b3 c7 2c 91 97 4e | e0 5f 39 be 43 66 47 ab c5 cc 93 72 f7 60 85 3f | db 39 5c a4 81 f1 02 ef e4 62 a4 fe 72 6e 67 a1 | 96 94 e2 5d 70 64 80 e3 dc 1a 37 fd 9b e4 85 ab | 94 44 5e 2f e2 eb 91 bf ec 37 e1 84 2a 65 44 ca | 1a 08 22 fa 52 cb 8e 26 f3 0a e0 f3 e8 ed d0 ab | dc 5c 23 93 37 b0 3f ec 3e d7 3b 37 ac 5f 12 98 | 95 79 c8 ae bc 21 83 a1 90 e1 8c a5 2a 7f b7 ff | e0 96 4f 2b 8d 89 b3 7b 60 e0 d7 14 33 e7 9c 37 | 29 00 00 24 0e 70 86 57 dd 9d d2 8d 77 a4 03 8e | d4 ef 6c f9 5f 5e da 54 db 62 42 7e 49 f6 2b 1b | b6 ad f3 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 b0 5c 2e fc f8 56 4b e1 e9 3b 08 | c9 71 30 03 41 fd 60 2e 00 00 00 1c 00 00 40 05 | f0 af c3 ce dd eb 90 e8 cb ac 91 a5 38 a0 f8 72 | 06 9d 9d 60 | libevent_free: release ptr-libevent@0x7fb360012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000d120 | #92 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 61 83 69 17 8d a7 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #92 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #92 | rejected packet: | 07 61 83 69 17 8d a7 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #92: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0655 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ffbf0 | handling event EVENT_RETRANSMIT for parent state #44 | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #44 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #44 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49608.435451; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003291 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #44 | libevent_malloc: new ptr-libevent@0x7fb360012840 size 128 "road-eastnet-nonat-44" #44: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #44) | 2c a5 57 82 94 bb 0c bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f f1 d9 3a 5c ec da ab 46 a0 1a 50 8e c5 b2 4a | 63 93 0d d6 bb 0b cb a2 7b 64 4c d6 0d 5d 75 c0 | a4 fb 12 20 36 86 d2 5a 85 de 9f 1a 56 dd 51 88 | 1f dd 14 6d 54 37 65 2c 39 00 b9 0b d0 9a b8 93 | dd 72 9a 78 33 2f fe d8 37 67 48 08 b2 16 1f 29 | 2a f2 be 3c 42 f3 72 0d 31 7d f4 16 71 3f 2a 28 | a2 72 a2 07 56 93 05 b3 01 4f f8 0a 3d 17 c2 61 | 36 84 95 ef b4 4f 95 5b 93 28 0b 0c 46 73 8a 49 | 11 16 41 b2 73 0b 44 cf a4 af 2f d7 2a 7a 6d 3e | 45 30 bc f5 de 74 14 4c f1 52 50 35 c7 29 67 5d | 02 d9 88 3e 6a e4 83 d6 7c b8 69 a3 7c 7f 9b 8b | 37 21 48 68 00 9a 01 a3 9a d7 3b 02 8c 67 ac 11 | 42 36 9e 84 ad 85 da a3 35 c1 ee c3 6a 24 37 55 | cc 67 9a 57 48 6e 0b 5c b6 9c 4d 16 ed 25 57 02 | 16 2f e6 f6 ce 2a b1 ca e6 1e 1f f9 44 d1 46 60 | 1f 00 3a 24 c7 f4 7b 04 f3 08 7e 6f de 0b 6c 0f | 29 00 00 24 c3 85 c7 9f 53 c2 4b 6d 4a b2 71 6f | 5f 3f 70 d0 bf 0d 26 13 04 46 9b 8c 51 07 8b 19 | bb fc 96 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f 56 cd 95 dd 34 fe 03 70 04 69 b5 | 7b 30 2c 80 a8 67 5b f1 00 00 00 1c 00 00 40 05 | 20 cd 88 b3 c4 29 91 b7 4b 43 e6 f4 9f a3 71 4b | c5 83 8c 17 | libevent_free: release ptr-libevent@0x7fb384015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ffbf0 | #44 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c a5 57 82 94 bb 0c bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #44 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #44 | rejected packet: | 2c a5 57 82 94 bb 0c bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #44: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0671 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-97" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-97' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #97 at 0x557d46a58e90 | State DB: adding IKEv2 state #97 in UNDEFINED | pstats #97 ikev2.ike started | Message ID: init #97: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #97: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #97; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-97" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-97" IKE SA #97 "road-eastnet-nonat-97" "road-eastnet-nonat-97" #97: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-97 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-97": constructed local IKE proposals for road-eastnet-nonat-97 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 97 for state #97 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469ffbf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #97 | libevent_malloc: new ptr-libevent@0x7fb384015370 size 128 | #97 spent 0.156 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-97" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.247 milliseconds in whack | crypto helper 8 resuming | crypto helper 8 starting work-order 97 for state #97 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 97 | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 97 time elapsed 0.00173 seconds | (#97) spent 0.949 milliseconds in crypto helper computing work-order 97: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 97 for state #97 to event queue | scheduling resume sending helper answer for #97 | libevent_malloc: new ptr-libevent@0x7fb34c01d920 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #97 | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 97 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #97 | **emit ISAKMP Message: | initiator cookie: | 7c 9c 8d d2 c5 3c 3b 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-97 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f2 98 e5 dd bd 5b c0 22 fb 24 a8 9d 4b ca 6c 72 | ikev2 g^x 78 61 7f 8f 02 15 b8 56 b3 c2 d4 89 90 42 e9 ae | ikev2 g^x b3 56 28 83 de be c5 dc f3 99 87 bf 7c 20 cf 1e | ikev2 g^x 80 26 a3 f6 7f d4 66 5c a2 37 d4 2d 88 37 5b ee | ikev2 g^x 37 eb f6 f3 73 47 4e f2 3e 1b de e1 36 54 bd 6f | ikev2 g^x 97 78 ce cb 16 0a da 34 fa 11 bc e7 e5 27 11 6b | ikev2 g^x 72 0d 9c de de 06 66 d8 74 64 a9 64 0b 12 b1 e7 | ikev2 g^x 15 84 3a 8c d9 6a d5 46 6c 00 4b f9 69 74 47 d1 | ikev2 g^x f3 79 bc d4 c9 0f 58 86 00 a5 0b 46 4c d7 20 78 | ikev2 g^x 99 ce 0d 0d cd 99 98 27 cc ce 50 e5 63 fc 25 ec | ikev2 g^x 4a 78 c1 76 a6 35 df cd 30 8a 57 10 1a b9 c6 85 | ikev2 g^x f5 05 46 77 76 2a ba 40 b5 da 98 c0 91 e5 03 c9 | ikev2 g^x 47 7d 79 56 d6 82 48 c6 a2 b4 f6 fc f6 16 30 98 | ikev2 g^x d9 b0 79 c5 33 a4 80 eb bb 99 51 9a 3b 3b ae a3 | ikev2 g^x 9b a3 5f 5f ce 23 78 fd 36 29 21 9b 24 8f 30 93 | ikev2 g^x 1f 0b 71 91 41 28 b6 d5 e2 dd ce 67 83 67 83 41 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4a 40 88 f3 3a ca ff 58 9b 48 04 9a a8 d0 f5 15 | IKEv2 nonce e8 12 b6 3b 4a 95 b2 73 79 da d4 a0 df 94 6f b0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7c 9c 8d d2 c5 3c 3b 69 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 61 | natd_hash: port= 01 f4 | natd_hash: hash= b5 5b 76 c7 df cc 29 e7 8f 6d d6 7a e3 d4 c1 e2 | natd_hash: hash= a2 33 fe 59 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b5 5b 76 c7 df cc 29 e7 8f 6d d6 7a e3 d4 c1 e2 | Notify data a2 33 fe 59 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7c 9c 8d d2 c5 3c 3b 69 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 63 90 91 6f c8 44 50 2a ff 12 5c 17 cd fa e6 2d | natd_hash: hash= 07 cd 17 d6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 63 90 91 6f c8 44 50 2a ff 12 5c 17 cd fa e6 2d | Notify data 07 cd 17 d6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #97 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #97: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #97 to 4294967295 after switching state | Message ID: IKE #97 skipping update_recv as MD is fake | Message ID: sent #97 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-97" #97: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.97:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #97) | 7c 9c 8d d2 c5 3c 3b 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 98 e5 dd bd 5b c0 22 fb 24 a8 9d 4b ca 6c 72 | 78 61 7f 8f 02 15 b8 56 b3 c2 d4 89 90 42 e9 ae | b3 56 28 83 de be c5 dc f3 99 87 bf 7c 20 cf 1e | 80 26 a3 f6 7f d4 66 5c a2 37 d4 2d 88 37 5b ee | 37 eb f6 f3 73 47 4e f2 3e 1b de e1 36 54 bd 6f | 97 78 ce cb 16 0a da 34 fa 11 bc e7 e5 27 11 6b | 72 0d 9c de de 06 66 d8 74 64 a9 64 0b 12 b1 e7 | 15 84 3a 8c d9 6a d5 46 6c 00 4b f9 69 74 47 d1 | f3 79 bc d4 c9 0f 58 86 00 a5 0b 46 4c d7 20 78 | 99 ce 0d 0d cd 99 98 27 cc ce 50 e5 63 fc 25 ec | 4a 78 c1 76 a6 35 df cd 30 8a 57 10 1a b9 c6 85 | f5 05 46 77 76 2a ba 40 b5 da 98 c0 91 e5 03 c9 | 47 7d 79 56 d6 82 48 c6 a2 b4 f6 fc f6 16 30 98 | d9 b0 79 c5 33 a4 80 eb bb 99 51 9a 3b 3b ae a3 | 9b a3 5f 5f ce 23 78 fd 36 29 21 9b 24 8f 30 93 | 1f 0b 71 91 41 28 b6 d5 e2 dd ce 67 83 67 83 41 | 29 00 00 24 4a 40 88 f3 3a ca ff 58 9b 48 04 9a | a8 d0 f5 15 e8 12 b6 3b 4a 95 b2 73 79 da d4 a0 | df 94 6f b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 5b 76 c7 df cc 29 e7 8f 6d d6 7a | e3 d4 c1 e2 a2 33 fe 59 00 00 00 1c 00 00 40 05 | 63 90 91 6f c8 44 50 2a ff 12 5c 17 cd fa e6 2d | 07 cd 17 d6 | state #97 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb384015370 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469ffbf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28af0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #97 | libevent_malloc: new ptr-libevent@0x7fb384015370 size 128 | #97 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49608.440225 | resume sending helper answer for #97 suppresed complete_v2_state_transition() and stole MD | #97 spent 0.486 milliseconds in resume sending helper answer | stop processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c01d920 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 9c 8d d2 c5 3c 3b 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #97 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #97 | rejected packet: | 7c 9c 8d d2 c5 3c 3b 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #97: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #71 | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #71 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #71 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49608.440352; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001846 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a43dd0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #71 | libevent_malloc: new ptr-libevent@0x7fb34c01d920 size 128 "road-eastnet-nonat-71" #71: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #71) | 95 1a 0e bc b8 89 e9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 b7 52 d3 88 4c 72 94 29 6d 07 48 59 53 9a 94 | c0 d8 40 dd 8b 33 cc b5 e7 5f 10 c4 f9 b5 b0 62 | 0e 7e dc 7c c0 5d c2 c0 b8 2a 1e ee d8 c7 67 c5 | 6e 7a 2e c8 c8 78 d1 01 66 2d d2 7e a8 80 78 39 | ed 64 bc 65 47 6b 53 20 db f8 49 7d 75 df ac 21 | 43 37 22 43 cf 85 a4 b5 c6 f2 cc 18 4e ff c1 67 | d6 fb 3b b4 2a 72 36 3e af 12 4f 93 13 35 59 a3 | 8d fd 4c ac bd 7c e1 d6 8a 63 b4 aa 9a 01 66 5d | 44 4d c8 c6 a5 27 c2 50 76 c4 0f 7a ea 30 2c 2e | c8 fd c2 09 eb 13 95 a3 62 05 52 05 99 27 2d 5d | 04 8a cb d5 bd f0 da af b1 fd a8 57 4b 25 12 cd | 81 31 3f 97 9d 49 d1 70 50 67 35 65 ba 2d c4 ae | a9 91 18 06 72 21 47 2c 8e e0 a3 db 1b a2 3f 13 | 0f a8 f6 3e 94 d7 36 d8 17 22 ad cd f5 cd f3 43 | 86 8f ec 5e a8 71 d9 dd 87 6e d8 e4 58 cb 3c 76 | ee 77 2a 83 0c e5 de 50 b0 fc 77 61 13 ac a0 07 | 29 00 00 24 12 6c 20 e2 d1 b6 94 1d 42 66 63 a9 | 4b 6f 5d 9a 24 6f cd 6b 53 ff a3 87 80 0a b8 8b | a0 96 5f 5a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d bc a1 51 aa 8f 7f ab dc e5 06 f0 | 38 bb 8c 63 92 8e b2 f3 00 00 00 1c 00 00 40 05 | c9 d4 4d 25 1c 7e db b6 b8 a8 68 63 26 d6 45 14 | b5 8e ec 75 | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #71 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 1a 0e bc b8 89 e9 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #71 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #71 | rejected packet: | 95 1a 0e bc b8 89 e9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #71: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #86 | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #86 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #86 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49608.455639; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001267 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #86 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 "road-eastnet-nonat-86" #86: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #86) | bc cc 1d a8 6f 14 2f d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 02 f4 30 81 01 a2 84 c7 c8 75 14 73 a0 b4 f1 | ce 00 5c 2a 70 74 58 bb 3e a0 6e e2 4f 0a 9f 83 | 08 76 97 6b fa 62 74 7d db ae df 90 de 69 8c b2 | 0e 6c a5 3a 87 61 1a 3a 8f 5d a0 5a ba ab 91 5a | 1c 85 49 b3 c5 25 e7 4c 6e 03 2b ac 66 42 56 f1 | d7 31 b5 bb 5b 45 b9 dd 90 6d ee 07 cc 7c f5 62 | 74 01 c5 67 95 ba 42 bf 74 f6 d2 a1 03 af 1b fd | e4 7f bc c7 c5 75 0a a8 6e 5c 9e 6c 4f 5b c1 73 | df 6f 2d 86 ef d9 7b 7f 50 00 74 9f 02 e6 99 af | 69 db f9 f3 80 3c 99 58 33 58 03 46 c0 6e d1 8c | d1 aa bb ba e8 f4 a9 85 5b aa 0d 22 6e e9 62 24 | 0d 2c d4 54 19 e8 97 d8 e7 d3 1e 75 fe 1d 11 bb | 8a ef b3 15 49 d2 bd 11 ce 93 3c 78 52 c8 0e 77 | 1d b3 5a f2 76 6d 63 9a e0 92 62 06 a0 bc 29 93 | a6 78 17 fe 37 4a 17 27 33 46 cd 3f 1c 77 4a d6 | df 68 38 cd 2b 58 7b 28 94 f9 86 34 46 7d e4 ec | 29 00 00 24 3f 6f 33 90 58 31 9c 9e c4 12 e4 33 | 9b 9e 11 d9 fa de 80 3a 9a 7c 3d 2b 3e 4c e8 aa | 92 49 b7 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 27 7b 26 e6 59 48 3b 7c 9f 7a cf | bb 52 6d 94 e2 1f 43 00 00 00 00 1c 00 00 40 05 | 49 8d b2 ff d2 6f bf 71 ec 03 78 4c 49 00 83 b0 | 23 90 3a 8b | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | #86 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc cc 1d a8 6f 14 2f d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #86 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #86 | rejected packet: | bc cc 1d a8 6f 14 2f d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #86: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a30d30 | handling event EVENT_RETRANSMIT for parent state #45 | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #45 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #45 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49608.501974; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006256 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #45 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 "road-eastnet-nonat-45" #45: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #45) | a3 bb a6 38 bf 16 36 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 bf 7f b3 da cb 24 f0 9d 9b d3 fd dc cf db 07 | e6 5b 40 74 f8 99 0f 8a 69 5b 21 df 39 e1 ee 66 | 6e d2 eb aa da ff dd cd ef 30 5f f7 58 03 e1 db | 0d 74 f6 29 93 ca f1 42 fd ad b9 96 9c 2f 50 32 | 58 c3 21 d3 aa 48 12 01 4c e3 13 6e 9b ee 2d 74 | 42 be dc c8 fd 3f 8a d7 32 bc c2 52 53 8d f7 2a | 84 67 44 c8 2e dc 1a b1 bb 7e 48 68 aa 07 71 d2 | ed bb 6e e8 36 32 f2 a5 31 45 4d 85 68 10 11 40 | f6 85 5c 6f 85 60 44 96 50 66 ff a4 e4 4d 79 e9 | 3c a7 0e 91 f7 05 c3 d3 85 48 8e e8 a2 59 53 66 | 1c c3 08 ca 90 69 7f b0 5f 9c 5b ec cd 7e 11 67 | 1a 0f 4b b0 b3 89 8c 73 6f 1c d6 27 19 18 73 72 | 31 f5 6c a7 f0 f8 1b 36 35 8a f6 30 2e d1 b7 af | a6 2e 5d 9a f5 83 05 7a b2 73 c7 24 06 c8 92 6b | 85 fe 7f 79 f1 ba 3f d3 86 28 f4 16 3a 94 56 af | 55 d5 d6 bc 89 52 4c e8 34 d8 86 d5 fe 13 15 fe | 29 00 00 24 a8 f8 bf 2a 70 d8 0d e9 bf c1 0f 00 | 25 da 1d db 8f ac 61 b5 e1 f0 75 9a 00 6d 79 0f | ff f5 3b 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 ff e8 4e 79 94 20 d9 00 0d 87 37 | ed 16 46 76 d8 43 be 32 00 00 00 1c 00 00 40 05 | 2d 67 24 20 12 0e 18 8c 34 32 0f 7c 4f 51 94 df | fd 23 b8 c6 | libevent_free: release ptr-libevent@0x7fb37800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a30d30 | #45 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 bb a6 38 bf 16 36 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #45 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #45 | rejected packet: | a3 bb a6 38 bf 16 36 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #45: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46910 | handling event EVENT_RETRANSMIT for parent state #72 | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #72 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #72 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49608.505315; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002139 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a30d30 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #72 | libevent_malloc: new ptr-libevent@0x7fb37800cf80 size 128 "road-eastnet-nonat-72" #72: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #72) | 66 13 43 d6 1b b9 0c ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 b1 4f d1 eb 26 94 0a e8 d2 78 fe d2 e8 05 7d | 72 29 9f e5 e1 94 c3 7f a9 6a ca 75 12 4e 13 6e | e4 11 a5 e1 89 1e 08 5a 0d 5f 6b 49 0c e7 ba a3 | db 19 75 da a7 48 e8 e9 64 d4 80 8e 45 f5 82 09 | 04 17 24 14 78 b4 6e bb 71 57 6f 3e 18 4c d6 76 | a4 ec 50 14 2c c8 4e c9 04 89 23 f1 0a 7f 62 28 | 45 8e 70 27 19 66 b0 68 5f c8 be 34 a7 7e 02 24 | 87 3b ee fe 4b 57 85 64 69 04 b9 42 92 f3 d5 c0 | fe 76 05 b0 05 50 57 66 f6 f8 0b 76 74 c3 53 a1 | 05 f6 81 e4 08 d7 39 f0 53 40 e0 f4 aa 4c ff a6 | 90 72 89 fb 79 82 71 5c b3 e4 6d 43 97 e8 51 8b | ba 0a c8 eb e3 46 09 21 84 b9 ea ef 0d 8d d4 64 | 4c bf f8 b1 9c cd 8a 27 78 9c ef 52 df a6 5e b4 | 15 f4 af e2 3a 17 55 a8 8a cb 58 8c 66 bc a1 fb | 21 eb f8 38 a5 f6 b0 fd 47 53 aa ad 2e e9 17 ad | 29 40 34 3f b5 2c 48 93 29 5b c3 81 a9 9a f6 f7 | 29 00 00 24 d2 7d 93 13 5f e4 cd 1b 68 e9 96 b6 | 73 3d 25 76 63 d4 92 1a 4f 51 ac b1 63 90 04 8e | 34 c5 00 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c4 6c df 39 39 e8 cd 3f 26 eb f0 86 | 8a 8d 3e 3d 91 1f 2d ed 00 00 00 1c 00 00 40 05 | 4c 1b 62 1c 4c 06 92 d2 01 38 c8 0e 4f 7e fd bc | 86 e6 84 ff | libevent_free: release ptr-libevent@0x7fb364012740 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46910 | #72 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 13 43 d6 1b b9 0c ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #72 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #72 | rejected packet: | 66 13 43 d6 1b b9 0c ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #72: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8d60 | handling event EVENT_RETRANSMIT for parent state #93 | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #93 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #93 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49608.518882; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.502525 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46910 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #93 | libevent_malloc: new ptr-libevent@0x7fb364012740 size 128 "road-eastnet-nonat-93" #93: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #93) | 8f 2b 82 41 be 50 7f e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cd 43 20 82 ea 0d 92 4d b7 6f 10 e5 73 62 a1 74 | 5f 8b b1 bd e8 48 72 86 0f fc f7 f4 6d aa 74 9c | c6 32 cc 9c 2e 89 27 81 1a 44 1a e2 a0 dc ee ce | 11 9a 86 db b2 0d 84 8c a7 35 4b a3 54 44 ff a5 | 46 90 60 08 6b 0b b2 6e 30 fe 4a 71 80 d7 a0 82 | 42 f8 84 b3 d1 ca 25 4a c6 d4 78 a8 df 7e e5 c9 | 03 e0 84 12 8e f0 91 14 81 e1 1e 7d 14 d0 21 c6 | 0b a7 bd a5 91 4d 74 5f a5 49 fb 47 92 a4 f6 f2 | 46 b5 1e 26 6d f1 8f 2b 0f f1 aa b1 98 3a 25 3a | b5 d3 2a 4c bc bb 1d f8 fd dc 58 f3 d0 d8 1b 32 | 38 77 9b c8 3c 93 48 af 2e 17 ec f8 87 96 76 0f | 85 58 80 2d fe e0 ad 94 9a 85 9c 5e 26 2b ed 2c | f6 a6 2f 18 05 50 d7 9c 67 0d fc 1d 16 0d 73 cf | e1 da cd 32 28 a8 c7 82 3a 82 36 71 d2 89 fb 29 | 72 68 23 fe 3a 1e 23 55 bf ae 58 43 08 3b 0f b5 | 11 45 c9 10 6a 4c 49 3d 66 da 53 be f8 72 a4 ba | 29 00 00 24 38 5c 7f a9 1f f6 b2 d3 ed 46 5d a7 | 91 ec df cb c1 74 f9 14 df e8 fc 11 90 67 a3 a7 | 1e 7f 11 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c cc 1f b2 cd 2b 6c 7e 5b 50 dd 93 | 55 b1 e2 f6 27 0b bd 36 00 00 00 1c 00 00 40 05 | b6 37 a4 32 e9 5e 9f 19 d6 7a 97 0a 5b 76 69 49 | 01 0d 5c 45 | libevent_free: release ptr-libevent@0x7fb34001a190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8d60 | #93 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a46950 | handling event EVENT_RETRANSMIT for parent state #87 | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #87 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #87 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49608.51908; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002964 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3fc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #87 | libevent_malloc: new ptr-libevent@0x7fb34001a190 size 128 "road-eastnet-nonat-87" #87: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #87) | a2 df 19 46 98 d4 bb 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de ac a7 56 a2 bc 95 5a 6c 57 c8 2b e0 20 68 16 | a2 ff 5a bd 83 94 6a 4d 58 8c b2 a4 d4 76 ed fc | 0f 4a 9b b9 df 7c 6c 34 8f 70 fd e9 a0 17 cd ff | 42 ae c6 35 53 50 df 4f 92 fb b8 ae 34 b4 21 4a | 96 f4 d2 6a f3 c3 2c b1 14 ce 42 da 82 6b e3 0d | db 7a 9e a9 08 f5 73 b2 1d 45 e9 bc fe 79 e6 2d | 2f 0a 64 4b ee 86 b7 4b 3f 77 d9 fd c5 b0 bd d9 | f0 f9 4a 67 c3 b1 50 bb ba e6 76 27 0e 9b 80 ac | ac a5 3d ed e4 7f 3e ce 9b 7e 70 ae 76 56 31 41 | 17 98 86 1f 1f 85 2b 2b b2 36 28 19 25 14 37 3e | bb a6 a5 e3 f0 64 b9 9c 0b af e9 c8 fc dd 9d 10 | 05 4f 6e 73 4c 08 a1 b5 54 a0 ae e0 d5 30 bc af | af 63 ef 9e e4 70 09 3a 1e 60 6f c5 bb 77 c5 0b | 60 c8 18 55 dd 77 cc 86 3f 7c 34 56 80 93 c4 30 | 61 51 d7 11 b2 4d 6f 17 c0 8c 7f d5 08 fa 5f 63 | d7 b3 cd 14 9f 3a 9d 07 13 ee 34 e9 84 52 68 1b | 29 00 00 24 8b f5 b9 e8 72 8a d8 5e 1a d6 70 1a | a6 5f 3d 02 9f 40 bc e8 9c c3 88 16 89 ec af ca | b1 90 6f 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 83 d5 c2 93 bc 76 7b c0 f5 6a f5 | c6 03 a7 0c 52 da b8 7c 00 00 00 1c 00 00 40 05 | 9f 00 07 ca 6e 64 62 64 56 d5 c5 aa 95 9f c8 6b | 83 2b 36 93 | libevent_free: release ptr-libevent@0x7fb3580180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46950 | #87 spent 0.0989 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 2b 82 41 be 50 7f e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #93 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #93 | rejected packet: | 8f 2b 82 41 be 50 7f e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #93: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 df 19 46 98 d4 bb 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #87 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #87 | rejected packet: | a2 df 19 46 98 d4 bb 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #87: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0548 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-98" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-98' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #98 at 0x557d46a5a450 | State DB: adding IKEv2 state #98 in UNDEFINED | pstats #98 ikev2.ike started | Message ID: init #98: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #98: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #98; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-98" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-98" IKE SA #98 "road-eastnet-nonat-98" "road-eastnet-nonat-98" #98: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-98 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-98": constructed local IKE proposals for road-eastnet-nonat-98 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 98 for state #98 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a46950 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #98 | libevent_malloc: new ptr-libevent@0x7fb3580180b0 size 128 | #98 spent 0.155 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-98" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.249 milliseconds in whack | crypto helper 12 resuming | crypto helper 12 starting work-order 98 for state #98 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 98 | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 98 time elapsed 0.001036 seconds | (#98) spent 0.89 milliseconds in crypto helper computing work-order 98: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 98 for state #98 to event queue | scheduling resume sending helper answer for #98 | libevent_malloc: new ptr-libevent@0x7fb34001f920 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #98 | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 98 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #98 | **emit ISAKMP Message: | initiator cookie: | 36 f6 17 30 89 34 87 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-98 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0e de 22 15 b8 37 99 8a 19 60 74 d9 cc fb 93 74 | ikev2 g^x 46 52 5b 4c b2 15 42 20 b8 92 87 ba 2d f3 d7 43 | ikev2 g^x b5 37 b0 ea 4d f5 7a 45 62 c7 3f 47 fb 44 64 d3 | ikev2 g^x e1 f9 e0 4b e7 fb 3e 3d b1 04 53 7b 67 35 99 55 | ikev2 g^x 77 f9 c2 de 1c 5e 4e 46 02 3b e5 0c e9 31 90 64 | ikev2 g^x 6e cb e0 dd 1a 59 99 ef 3d a7 c1 9b 74 f9 45 3f | ikev2 g^x 99 cd de c7 d0 13 5f 2b 11 ac cd ff c9 47 2e 86 | ikev2 g^x 69 0d e8 ec 31 64 37 7f 01 74 30 f7 db 0e d0 fb | ikev2 g^x 8b 6d 9d cc 98 7f 1a b4 87 7d bf 2e 19 53 89 24 | ikev2 g^x 00 4f 0a 93 5d 06 c9 01 d3 dd 9f 4d 48 ee ba 48 | ikev2 g^x 79 5c 5f f3 cb 01 ba a7 ec 71 ed fd 64 af 41 a6 | ikev2 g^x ff 80 dd aa 0c ae 06 5c 0b a3 1c 56 84 5b 6c 26 | ikev2 g^x fd ff b3 07 94 15 1d 68 35 03 8e 60 07 84 12 f9 | ikev2 g^x ee d9 d1 91 a2 f4 75 f6 9e 29 11 0a 54 bc 2f 41 | ikev2 g^x 2c ea 22 ab ab 32 6a 0c 62 23 b1 4a 4b 29 bb 22 | ikev2 g^x de a9 03 f4 17 e0 39 72 79 31 e0 0a 30 fa 14 a0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce dc e2 b9 cb c5 4c 15 ab 06 6c 97 a6 72 6b 55 8f | IKEv2 nonce 7d 14 aa 13 19 ae 9e 9d 27 a3 3a 17 86 0f 7c a9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 36 f6 17 30 89 34 87 ff | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 62 | natd_hash: port= 01 f4 | natd_hash: hash= 57 94 a8 82 2a 1f 7d 1b 29 07 9f 80 75 97 d7 a2 | natd_hash: hash= ab 24 e8 8d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 57 94 a8 82 2a 1f 7d 1b 29 07 9f 80 75 97 d7 a2 | Notify data ab 24 e8 8d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 36 f6 17 30 89 34 87 ff | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= b8 4f 85 79 77 db f6 74 dd c9 e6 fd e8 91 c3 41 | natd_hash: hash= 66 c0 f7 3b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b8 4f 85 79 77 db f6 74 dd c9 e6 fd e8 91 c3 41 | Notify data 66 c0 f7 3b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #98 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #98: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #98 to 4294967295 after switching state | Message ID: IKE #98 skipping update_recv as MD is fake | Message ID: sent #98 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-98" #98: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.98:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #98) | 36 f6 17 30 89 34 87 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e de 22 15 b8 37 99 8a 19 60 74 d9 cc fb 93 74 | 46 52 5b 4c b2 15 42 20 b8 92 87 ba 2d f3 d7 43 | b5 37 b0 ea 4d f5 7a 45 62 c7 3f 47 fb 44 64 d3 | e1 f9 e0 4b e7 fb 3e 3d b1 04 53 7b 67 35 99 55 | 77 f9 c2 de 1c 5e 4e 46 02 3b e5 0c e9 31 90 64 | 6e cb e0 dd 1a 59 99 ef 3d a7 c1 9b 74 f9 45 3f | 99 cd de c7 d0 13 5f 2b 11 ac cd ff c9 47 2e 86 | 69 0d e8 ec 31 64 37 7f 01 74 30 f7 db 0e d0 fb | 8b 6d 9d cc 98 7f 1a b4 87 7d bf 2e 19 53 89 24 | 00 4f 0a 93 5d 06 c9 01 d3 dd 9f 4d 48 ee ba 48 | 79 5c 5f f3 cb 01 ba a7 ec 71 ed fd 64 af 41 a6 | ff 80 dd aa 0c ae 06 5c 0b a3 1c 56 84 5b 6c 26 | fd ff b3 07 94 15 1d 68 35 03 8e 60 07 84 12 f9 | ee d9 d1 91 a2 f4 75 f6 9e 29 11 0a 54 bc 2f 41 | 2c ea 22 ab ab 32 6a 0c 62 23 b1 4a 4b 29 bb 22 | de a9 03 f4 17 e0 39 72 79 31 e0 0a 30 fa 14 a0 | 29 00 00 24 dc e2 b9 cb c5 4c 15 ab 06 6c 97 a6 | 72 6b 55 8f 7d 14 aa 13 19 ae 9e 9d 27 a3 3a 17 | 86 0f 7c a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 94 a8 82 2a 1f 7d 1b 29 07 9f 80 | 75 97 d7 a2 ab 24 e8 8d 00 00 00 1c 00 00 40 05 | b8 4f 85 79 77 db f6 74 dd c9 e6 fd e8 91 c3 41 | 66 c0 f7 3b | state #98 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3580180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a46950 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46950 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #98 | libevent_malloc: new ptr-libevent@0x7fb3580180b0 size 128 | #98 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49608.524117 | resume sending helper answer for #98 suppresed complete_v2_state_transition() and stole MD | #98 spent 0.497 milliseconds in resume sending helper answer | stop processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34001f920 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 f6 17 30 89 34 87 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #98 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #98 | rejected packet: | 36 f6 17 30 89 34 87 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #98: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c00d120 | handling event EVENT_RETRANSMIT for parent state #2 | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #2 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #2 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49608.532327; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.011169 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8d60 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #2 | libevent_malloc: new ptr-libevent@0x7fb34001f920 size 128 "road-eastnet-nonat-2" #2: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #2) | 1a 6c de c8 74 c5 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e e6 40 8d 01 9a df ee a1 21 ef 7c 27 51 b1 50 | 11 ab 49 b8 aa be 06 6f 98 06 4f a8 49 fc 42 fd | ea ae 86 e5 22 2c b5 91 3d 9f 17 1f 02 b9 b9 8d | 62 48 db a9 bf 68 b6 2a 81 1e f5 ea 96 5e fc 90 | a8 90 23 f2 fa 81 8e 8c d6 45 a8 56 67 da 61 6d | ec 8f 6b 5d aa 73 41 20 29 44 b2 20 1c ab 68 57 | 66 6f ca 43 df ea 03 70 f7 0e 47 cb 21 da 37 fa | b6 1e 94 d5 b1 5e b7 96 a4 f5 5a 22 ff b7 b7 1e | 62 65 38 93 8b 8d 44 bd 9f ea 0f 68 70 be 74 db | b6 35 f8 53 58 61 01 df be e6 bf 45 b0 94 55 ae | 5d 6b 51 98 47 dd 93 18 5c 30 93 96 42 3e 47 91 | 90 01 1e 32 64 de ec ce 38 b5 ab f8 4a 4f 0c ed | d8 fd 0a f1 53 ed ad 6b 9e c5 db 7f 6d 9f 1b e5 | 0c 7b f2 2f 6f ec 10 d1 5b 4b 71 ee 47 5f b6 1f | b0 01 08 5f 12 c2 5d 47 67 6d 8f ee c4 bf 47 5b | 6c 71 d5 40 dd 10 ef f5 69 2a fd 09 2a aa 47 a4 | 29 00 00 24 31 10 28 eb fd d1 21 19 30 13 d3 a7 | cd be e5 7b ca b3 e1 fc 00 55 31 87 01 f1 62 07 | 15 72 f6 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 6d fc d3 8f 25 27 03 1f 7a b6 de | f8 04 ad d3 88 d5 17 aa 00 00 00 1c 00 00 40 05 | 09 59 07 05 b4 e1 f1 0d 32 74 62 04 62 1e 48 d0 | 7d 5b 7f 5e | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c00d120 | #2 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 6c de c8 74 c5 fb 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #2 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #2 | rejected packet: | 1a 6c de c8 74 c5 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #2: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #73 | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #73 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #73 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49608.576674; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003518 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #73 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 "road-eastnet-nonat-73" #73: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #73) | 1b d1 f7 22 4f 1d be c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 17 af cb 15 dc ab b1 a5 7f 34 62 4e 0f 28 9a | 18 48 48 5b 8a 7c 0e f9 96 fe 06 d5 63 de 59 f8 | 49 35 b4 79 b1 9f 27 0d e0 5d f1 56 f3 be 3d 0b | 2c 98 27 ba b0 9f 63 a4 e7 98 a1 c0 ce b7 fa 57 | bc af 56 22 b4 0b 08 17 91 1f 28 fd 21 7d b9 47 | be 94 09 11 9d 2a ae 62 55 90 ec cd fb 6d 33 53 | dc 6e 16 d9 31 7b 9a c8 fd c1 75 61 52 f6 98 91 | 94 9a f3 05 36 de 11 ce 66 87 ce 7a d3 f8 fd 04 | 0b ba 01 fd 05 22 ef 85 db 52 65 4a 74 05 92 71 | be df ba dc 65 01 21 6c d5 86 65 2b 9a e5 83 35 | a5 c8 2d 49 2e 69 13 a9 18 d4 42 31 7e 26 5b 88 | 7c 6f cd 46 42 cb fc 6c 40 14 2b 57 0e e7 97 72 | 5b db 5d 77 72 cd 54 3e 63 fa 42 39 c6 a7 84 0d | 90 25 f3 6f 23 cf 8e 04 75 0a 41 85 e3 ef 88 28 | 25 3f 56 c1 9a ec 95 fb a0 fa ac 95 ac 16 97 71 | 2e b2 fb 1e 8b 8f a8 12 b2 0a 1f 31 5e c4 d7 fa | 29 00 00 24 93 de fa 16 34 ae c4 6f 1c b0 6f ba | 95 0e 80 10 81 5f 54 52 00 a9 bf 63 44 18 a5 30 | 6d af 4e 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 5e 43 5b b5 69 a0 f9 16 98 c0 46 | f4 de 55 67 f2 0c 20 b2 00 00 00 1c 00 00 40 05 | 50 cf 48 cc c9 4e 77 06 66 f1 57 3b 42 c0 94 82 | a3 eb c2 6e | libevent_free: release ptr-libevent@0x7fb34c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | #73 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b d1 f7 22 4f 1d be c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #73 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #73 | rejected packet: | 1b d1 f7 22 4f 1d be c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #73: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #88 | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #88 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #88 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49608.586012; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002631 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #88 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 "road-eastnet-nonat-88" #88: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #88) | 4f b4 b9 96 90 ac 87 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 55 7d 2b ef 81 b7 ac 80 5f 94 f2 45 3d 30 4f | 1d db a2 af 47 67 b7 7c be e3 bc 36 9a 72 1e e6 | 4f 47 07 85 4a dc c2 8c 23 63 be 8e ef c5 79 8f | 9f 5c 4f 9d 4f 85 09 c3 d7 cd 09 d7 9c 93 a4 d2 | cb 1f 73 cb f5 4a 96 ce 2b f9 75 2e 3c f9 67 24 | b7 40 01 a2 9a 5a 3a b5 1b 81 51 3d 6c dd 22 93 | a7 84 80 70 90 68 0a 70 88 ae 95 b6 8d ea e4 d4 | 54 cf 85 55 04 a4 94 5d cc ba 3d e2 31 46 75 ff | 7c 75 77 1a 1b 6c e0 fd b6 75 6b 40 9a b7 ac 36 | 39 45 a5 48 a8 96 90 52 cb 62 b2 ca a6 08 23 37 | d2 f9 be 02 8c 54 29 91 80 43 1c 2d 5f 25 44 25 | ff e7 b9 7d 14 3d 11 4a a3 ab 8e 4f b9 9b a1 4d | 91 68 13 50 1e 3b 88 4e ac 27 30 6a c7 2b ef cb | 81 87 56 8d dd bd 93 b9 d2 77 ea ab 8e f7 84 26 | 38 de 93 6d 11 fc f2 e4 c4 b3 df 42 49 8c 39 27 | 12 40 d4 6f db 31 51 71 3a c5 b3 bf 78 b4 72 ae | 29 00 00 24 d0 42 a3 31 c3 ed 67 67 3c 0c 74 87 | e1 18 ba c3 96 b7 23 3a c3 28 fa 83 32 6a f8 22 | c5 3d ce 47 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 13 5d 9d 57 2e de f0 16 54 40 11 | ce e4 63 b7 5f de e1 17 00 00 00 1c 00 00 40 05 | 73 d1 3a 60 f3 dc 99 f7 0c 4b 4c 3e d1 f1 65 ae | 8d f5 93 01 | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | #88 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f b4 b9 96 90 ac 87 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #88 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #88 | rejected packet: | 4f b4 b9 96 90 ac 87 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #88: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a16db0 | handling event EVENT_RETRANSMIT for parent state #46 | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #46 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #46 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49608.592365; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004549 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #46 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 "road-eastnet-nonat-46" #46: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #46) | b8 02 bd ab b2 01 5a b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 02 34 ab 29 73 17 93 9c d3 ac d4 2d a7 40 8f | 6c ab ce c1 cf 26 d8 e1 c0 a5 2f a8 7c e6 62 97 | 14 ae ce 27 9d 48 da 55 bb 1a 50 83 cd 98 7c 7e | 93 0d ef 6b a4 36 24 54 0e e8 77 76 0a 46 5c 28 | c7 d2 ff f1 d4 08 43 1a 21 66 26 cc ac 89 a4 fa | 9e 6f e1 5a 6f bb 4b ea 22 4d 9a 3d 2a 1c 97 d5 | e7 d2 d1 ac 8d d0 32 2d 42 98 eb fc 7f 55 28 65 | e5 b7 88 e1 ec b5 ba 0a 74 06 aa 48 51 b1 11 3b | 2f 1d 4c c7 49 ef 3c d0 65 a2 df 8e 59 96 65 b4 | 5b 67 18 f6 c6 dd c1 ba 8c 98 60 72 7f 9b 34 f1 | f4 df 07 a6 02 25 08 e0 ca 45 1c 4e 5a 84 92 f8 | 41 4b e2 11 63 dd 97 cd e2 1c a6 92 32 6d 9f 66 | 47 ba 05 95 3f 93 67 80 97 77 56 16 84 bf 6b d6 | e6 b0 76 58 be 43 b2 86 c2 1e 75 44 04 7d 93 a8 | 8c b0 a8 b8 83 ce 3c 1a d2 a1 85 f4 c7 9a 35 d1 | a2 ff 32 1f de 4b 99 be 80 8a 49 9b 41 45 2e a7 | 29 00 00 24 59 91 d6 77 3b 12 ba 32 8c e3 4b 3b | 93 6d 1e 3b 04 96 db ec 7e 0e 16 50 f1 18 04 aa | e6 1e e5 ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c a5 da 82 02 27 22 be 3c d8 f4 7e | 26 be f7 a0 40 5a a0 f6 00 00 00 1c 00 00 40 05 | 90 e6 40 68 17 4b f9 af 42 5a 03 6b 4d 68 d7 fb | 1b b9 9d a8 | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a16db0 | #46 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 02 bd ab b2 01 5a b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #46 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #46 | rejected packet: | b8 02 bd ab b2 01 5a b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #46: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #94 | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #94 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #94 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49608.611703; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501057 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ffbf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #94 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 "road-eastnet-nonat-94" #94: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #94) | c4 af dc f4 22 ca 1a 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b8 0d 8e 0d 24 fa 48 9f 6f 70 45 44 af 29 03 81 | fb 75 7f 29 b1 65 5b 6b f3 dc dc e0 d1 ea 65 d0 | 45 a3 5f 01 d6 e7 51 37 b4 25 82 eb 71 98 d8 b2 | 75 57 7a 0e db af 40 2b 1a 10 c2 e4 b7 7e 18 39 | 54 3c 4a ec 4d d5 3a 2e ab bd e0 80 1e 0f e2 b5 | e4 a9 bf ef 3b ba fe af b1 7b cb 8a 16 e9 8c 65 | 20 92 b8 a2 66 75 85 84 5a e4 4c c5 4e 4c dd 10 | 51 c2 7a 85 78 58 a1 10 d6 cf c5 6b e8 22 f2 d1 | 41 df 6b 5c 73 f6 87 2e 17 45 1b 75 b8 bd 3d 9e | d2 3e d8 cd d1 d8 9e 58 23 f3 68 0b e1 b8 89 69 | 76 b7 7e 92 6a 4a 5b 2c 36 99 61 9d bb 09 19 68 | e0 83 4b 97 a3 48 26 96 74 a7 da 5f 7d b7 55 9e | e3 e8 68 32 6b 6e 35 3d 26 d7 4f 19 6d d6 44 17 | 3d 23 4c ff 1c ff e3 77 85 72 fa 85 64 76 2e ac | 5a 7b 31 bf 7b 44 eb 9a f4 5c 9d 72 ec 95 e5 4e | fc 10 63 57 5f 09 74 f6 c6 17 bc 05 7d ea 5c 13 | 29 00 00 24 c5 77 30 ba 9e 22 45 4a 1a af ea 19 | 02 b6 fb 3a f7 c7 ff 86 e4 75 07 62 09 1a 17 15 | a7 99 2d 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d bd d3 d9 55 1d 16 4d 34 06 fd 91 | 92 b6 52 35 3e d3 c6 4f 00 00 00 1c 00 00 40 05 | 83 77 03 33 97 20 84 34 b1 e3 aa 6c 05 af 74 6e | f0 8d d0 a3 | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #94 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 af dc f4 22 ca 1a 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #94 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #94 | rejected packet: | c4 af dc f4 22 ca 1a 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #94: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-99" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-99' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #99 at 0x557d46a5ba10 | State DB: adding IKEv2 state #99 in UNDEFINED | pstats #99 ikev2.ike started | Message ID: init #99: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #99: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #99; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-99" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-99" IKE SA #99 "road-eastnet-nonat-99" "road-eastnet-nonat-99" #99: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-99 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-99": constructed local IKE proposals for road-eastnet-nonat-99 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 99 for state #99 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #99 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 | #99 spent 0.143 milliseconds in ikev2_parent_outI1() | crypto helper 5 resuming | crypto helper 5 starting work-order 99 for state #99 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 99 | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 99 time elapsed 0.000981 seconds | (#99) spent 0.987 milliseconds in crypto helper computing work-order 99: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 99 for state #99 to event queue | scheduling resume sending helper answer for #99 | libevent_malloc: new ptr-libevent@0x7fb34401d920 size 128 | crypto helper 5 waiting (nothing to do) | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-99" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.237 milliseconds in whack | processing resume sending helper answer for #99 | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 99 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #99 | **emit ISAKMP Message: | initiator cookie: | 20 f2 8d 71 65 ac 47 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-99 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a5 55 64 d8 ad 81 88 80 21 0e 25 1a b1 6c d3 13 | ikev2 g^x 60 47 54 9f 37 b3 3b e4 ef 17 20 61 85 67 62 f1 | ikev2 g^x 02 df 28 57 14 6d e3 be a6 7d d0 60 0f d8 35 56 | ikev2 g^x 23 d8 87 e9 4a f8 7b 29 e9 15 5f 82 0d 90 dd 56 | ikev2 g^x 5d 5a 2c 1a fd 14 77 42 8f 36 df a6 c7 9c d4 1a | ikev2 g^x 4f 67 c2 2e a6 a1 f6 1c 58 4b f8 cb b3 cd ce 08 | ikev2 g^x 48 62 dd 58 41 3a 14 29 9a 8c dd db 6a 06 47 a4 | ikev2 g^x 6c b7 ae b7 e4 5d db e5 9d e5 08 8e 17 5b 65 be | ikev2 g^x 17 aa 8e 73 be 9c 01 fb 31 11 79 f8 7d b5 ee ca | ikev2 g^x 7b e0 59 52 95 92 4d d8 40 43 34 f1 14 b9 84 18 | ikev2 g^x 60 68 b3 da 39 48 0e 5b 21 3c 0f 30 5d 85 b9 b8 | ikev2 g^x 1e e9 36 ff 36 9e aa 51 52 b1 5e 1d 27 fe 89 5d | ikev2 g^x cd 1e 0d 8d d6 a1 c3 a1 84 3f ea 32 11 45 0d 67 | ikev2 g^x 3f e2 4b 56 64 56 35 98 b6 f3 83 f0 90 30 0e 75 | ikev2 g^x b7 c7 9b 32 1d 5c 5f 2d d9 a9 92 93 d5 c6 6e 2b | ikev2 g^x ba f3 5c d6 20 4b dd 47 18 da e4 05 c0 7c 3e d8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0e 55 53 da 51 ef 9c 5f c5 b0 f0 9b 78 63 11 53 | IKEv2 nonce 43 43 64 d7 34 99 64 b7 14 ad 81 b4 bb 55 f4 da | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 20 f2 8d 71 65 ac 47 0e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 63 | natd_hash: port= 01 f4 | natd_hash: hash= 23 cf c4 07 93 b6 10 89 13 8b 25 5a 5c dd 08 90 | natd_hash: hash= 5b 56 28 b0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 23 cf c4 07 93 b6 10 89 13 8b 25 5a 5c dd 08 90 | Notify data 5b 56 28 b0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 20 f2 8d 71 65 ac 47 0e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9d 1e cf 39 e1 37 a4 6a 40 83 a9 41 54 1a 0d 5f | natd_hash: hash= 91 61 32 ea | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9d 1e cf 39 e1 37 a4 6a 40 83 a9 41 54 1a 0d 5f | Notify data 91 61 32 ea | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #99 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #99: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #99 to 4294967295 after switching state | Message ID: IKE #99 skipping update_recv as MD is fake | Message ID: sent #99 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-99" #99: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.99:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #99) | 20 f2 8d 71 65 ac 47 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 55 64 d8 ad 81 88 80 21 0e 25 1a b1 6c d3 13 | 60 47 54 9f 37 b3 3b e4 ef 17 20 61 85 67 62 f1 | 02 df 28 57 14 6d e3 be a6 7d d0 60 0f d8 35 56 | 23 d8 87 e9 4a f8 7b 29 e9 15 5f 82 0d 90 dd 56 | 5d 5a 2c 1a fd 14 77 42 8f 36 df a6 c7 9c d4 1a | 4f 67 c2 2e a6 a1 f6 1c 58 4b f8 cb b3 cd ce 08 | 48 62 dd 58 41 3a 14 29 9a 8c dd db 6a 06 47 a4 | 6c b7 ae b7 e4 5d db e5 9d e5 08 8e 17 5b 65 be | 17 aa 8e 73 be 9c 01 fb 31 11 79 f8 7d b5 ee ca | 7b e0 59 52 95 92 4d d8 40 43 34 f1 14 b9 84 18 | 60 68 b3 da 39 48 0e 5b 21 3c 0f 30 5d 85 b9 b8 | 1e e9 36 ff 36 9e aa 51 52 b1 5e 1d 27 fe 89 5d | cd 1e 0d 8d d6 a1 c3 a1 84 3f ea 32 11 45 0d 67 | 3f e2 4b 56 64 56 35 98 b6 f3 83 f0 90 30 0e 75 | b7 c7 9b 32 1d 5c 5f 2d d9 a9 92 93 d5 c6 6e 2b | ba f3 5c d6 20 4b dd 47 18 da e4 05 c0 7c 3e d8 | 29 00 00 24 0e 55 53 da 51 ef 9c 5f c5 b0 f0 9b | 78 63 11 53 43 43 64 d7 34 99 64 b7 14 ad 81 b4 | bb 55 f4 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 cf c4 07 93 b6 10 89 13 8b 25 5a | 5c dd 08 90 5b 56 28 b0 00 00 00 1c 00 00 40 05 | 9d 1e cf 39 e1 37 a4 6a 40 83 a9 41 54 1a 0d 5f | 91 61 32 ea | state #99 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #99 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 | #99 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49608.619829 | resume sending helper answer for #99 suppresed complete_v2_state_transition() and stole MD | #99 spent 0.455 milliseconds in resume sending helper answer | stop processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34401d920 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 f2 8d 71 65 ac 47 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #99 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #99 | rejected packet: | 20 f2 8d 71 65 ac 47 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #99: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a49450 | handling event EVENT_RETRANSMIT for parent state #74 | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #74 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #74 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49608.645037; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003721 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a16db0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #74 | libevent_malloc: new ptr-libevent@0x7fb34401d920 size 128 "road-eastnet-nonat-74" #74: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #74) | 74 9c fc 4a 6a e3 e3 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 4c a1 32 c0 37 d8 5b 48 9c e5 d1 93 92 0c 53 | 2d 7a c8 b1 df 24 d3 9a 3f 8c d4 c5 68 47 a3 a6 | 97 97 ce bb 01 47 69 1c 80 a7 65 98 e9 23 03 f4 | d4 b7 9b 7e d3 4c aa b4 56 9e 09 14 71 47 28 7f | c7 55 55 ab d5 8e 75 f5 9a f4 57 8c 05 da 66 0a | 40 9c be 25 a4 ef c7 bf 8b 81 b2 07 d2 0a 7d 79 | a8 74 67 c4 01 41 ba 6b 27 91 81 d4 a9 3f 71 a7 | d8 a9 d4 20 88 c0 67 ed 9a eb cb 95 5d 27 cd ae | 65 ee b7 22 c0 dd 63 86 9c 71 c8 d0 62 02 64 6a | 57 b2 8d 13 05 28 bc e0 52 39 21 a1 da 4e f2 d4 | b5 8a d4 4a 90 a1 15 ec 76 63 23 1b 27 bd 31 af | 95 a2 f3 5b 2d 4e d4 42 7c 32 a2 bf 50 28 83 76 | 27 c1 4e 56 b2 c9 33 07 a5 ee bf 65 36 77 b7 43 | c5 de f7 7c c7 52 fc 27 15 dc 50 6e c0 2f d7 72 | 5a 3b a4 4a 5b f6 13 1e 38 47 4d 77 c3 69 47 89 | 95 21 ff 50 2d c1 83 a3 1a 90 31 a7 2f c0 c1 a5 | 29 00 00 24 5c 46 aa ed 6c 5c 2a de e4 4c 0f 0d | ff be a8 c1 d6 16 7f 78 81 97 e2 33 fc 98 55 93 | 9e 14 cc 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 26 fa 02 ef ac 51 67 96 4e b3 ca | 7c 6c ba e3 fb 9a 52 77 00 00 00 1c 00 00 40 05 | 65 ee a5 86 f4 0e 73 b1 a9 eb cb 64 18 5a 0c a9 | fd 3d e5 eb | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a49450 | #74 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 9c fc 4a 6a e3 e3 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #74 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #74 | rejected packet: | 74 9c fc 4a 6a e3 e3 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #74: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #89 | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #89 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #89 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49608.650376; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001063 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a49450 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #89 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 "road-eastnet-nonat-89" #89: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #89) | 9d 5f d8 02 80 b8 e7 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 e3 b9 05 71 34 7d 24 1f b0 78 15 60 77 1c 08 | 9e 6a 97 b0 4c 89 e3 5a dc c3 13 ad 84 6a 5e aa | fd ca 45 35 ba 35 de 44 be ce 11 ea 86 29 6c 73 | 0b 7f 74 63 63 d2 81 70 21 25 9e 55 c0 3c 14 62 | da 13 e5 79 f3 ac 65 c2 4c 57 6a e3 37 8f 5c 04 | 8a 01 65 69 49 a9 46 40 f2 f3 a8 b3 1a af d6 79 | f9 34 6f 04 49 9e f3 10 ca 6b d5 6f d3 e5 36 7a | c9 32 cd 69 df 91 08 6d 35 ec 78 52 d9 57 09 e3 | f5 63 af 57 d7 93 38 af ff 2c e8 36 87 e0 92 43 | f0 f6 97 f6 50 a5 d2 4c 16 d1 d2 d2 96 90 50 82 | 09 99 3b fa 59 66 b4 48 e1 b1 0d 01 76 3d b4 c2 | b2 4d a5 5c 8a c7 cb a9 bb 09 56 bf 65 e9 da 28 | 24 dc 22 59 97 49 92 d0 c5 d3 9b 2b da 0b d5 26 | df 68 b6 c9 f1 0d 58 08 b0 7e 26 ce 7d 24 b1 d2 | a7 c4 2d 42 0c 8d 57 57 7b 42 5d d8 f7 b9 c8 ba | e6 b0 9d 60 5a 01 d8 33 e3 a6 9f f1 3b 81 e4 a8 | 29 00 00 24 50 a5 b1 4c 6d 18 8a 79 34 52 af 57 | 9c b8 99 4d b9 e7 5c 74 bb 7f a4 8c e5 f5 2c a5 | 8d 6b 1d 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 41 ee 04 aa 3d b0 21 0a d0 67 73 | 50 8d e2 01 ce 26 f9 77 00 00 00 1c 00 00 40 05 | 7b 60 8a 47 58 c7 18 57 64 ec a9 8e 15 07 49 b1 | ed 9e c4 1b | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | #89 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d 5f d8 02 80 b8 e7 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #89 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #89 | rejected packet: | 9d 5f d8 02 80 b8 e7 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #89: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_RETRANSMIT for parent state #47 | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #47 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #47 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49608.658709; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004774 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #47 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 "road-eastnet-nonat-47" #47: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #47) | d1 80 96 dc 70 12 fd 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 89 48 be 2f 23 20 1a aa c0 f9 41 f1 9f b5 dc | 61 3b 4e 1d f2 94 aa 61 39 fa ff 9e ad da aa 8b | 79 a4 b0 75 86 17 be 8d f9 64 cd 5f 2c a3 74 02 | 5c d2 0b c0 e1 bc 40 a4 41 01 24 b6 16 65 80 b1 | 8d 5b f4 3e d9 78 1c 78 5b d0 4f 36 20 49 cf f5 | e6 39 8f 45 c4 05 3e 9a 58 8d 26 dc 13 63 31 38 | f0 e2 e6 6e a9 06 79 15 81 1d f5 b1 3e c3 40 32 | 5c c3 ef 40 73 34 78 3f 9f 9d fe 1e 7a 64 15 bd | f5 c1 66 e8 e7 57 72 db 6e e7 07 6d fc c3 84 15 | a7 9e a5 ae 49 06 60 b0 66 25 b2 60 5b c9 52 7b | 84 da 9e 07 cb 22 63 3f f7 e3 75 51 cd b7 f5 a9 | 00 8e ee 37 13 40 c4 a0 04 91 8b 4e b2 90 26 27 | 78 4c 50 15 9b df e6 81 a0 a4 86 f0 9c 4a d6 4e | 71 20 bc ef 14 af bb ba f8 7a 84 f5 e8 b4 d8 08 | bb e0 cf f0 c2 7a 1a fb 6d c0 80 83 cb fe 9c fe | 4d f9 6c 4a 79 4d c9 ec 6b b4 1f c4 42 35 86 05 | 29 00 00 24 45 2a 73 9c 59 88 24 30 1b 4c d7 76 | 91 c3 f5 9d 27 d4 d8 42 63 2d 46 4d bb 79 5b 50 | bd 3d d6 ba 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 44 84 40 30 da 67 e5 a7 75 a7 f1 | b3 01 a1 ea ef 36 29 e3 00 00 00 1c 00 00 40 05 | 02 24 d1 73 8e ed 3e 54 49 25 16 88 bd 9a 48 c6 | 35 3e 63 7f | libevent_free: release ptr-libevent@0x7fb34400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | #47 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d1 80 96 dc 70 12 fd 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #47 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #47 | rejected packet: | d1 80 96 dc 70 12 fd 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #47: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0655 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #3 | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #3 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #3 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49608.680048; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.011105 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #3 | libevent_malloc: new ptr-libevent@0x7fb34400cf80 size 128 "road-eastnet-nonat-3" #3: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #3) | 81 44 b6 c8 2a 40 ce 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 54 15 6a 8c 9d d0 48 d6 59 e5 e2 2e a9 83 c3 | a8 ba 16 88 07 d6 11 91 3a 48 ca 9a fe dc 40 cc | 29 63 c0 dc 38 80 92 c8 fd f6 81 d3 d8 66 94 3d | c5 2d e7 b1 2b da e7 bc 78 d1 e4 dc 9a 41 8c 14 | c6 fb cd 2a 97 af ef ad 23 32 6d 6d f8 fa b5 27 | 9e 41 35 14 10 3b f6 98 c8 8f d3 aa de fa 55 91 | cb c5 c0 43 8b 3e 66 29 8a ce 63 ed 04 d9 5e 36 | d1 ee b2 55 32 92 26 8a 60 a1 e6 8a c1 81 34 3b | fe bb 92 45 5e 07 2a fa 53 4e 52 04 9a fe 49 14 | 7b 7a a1 34 68 ab 79 c6 b1 5b 9e 7d ee f2 e3 2b | b4 f7 cd 72 14 0a 7e 40 88 1b b7 27 4f cc 0e 08 | a7 a7 14 77 d4 62 20 1a 96 bd a4 9c 9c c7 ed e3 | be 59 87 38 e7 1a a8 83 a8 52 47 62 89 d6 f0 d1 | ce 49 83 2a 83 87 c7 c7 2e 90 40 05 a6 4e c5 26 | bd c4 1e e7 34 ac 09 b9 70 d9 7f 32 91 1c d9 7b | 01 ed eb 14 c7 ff 07 8b 68 87 79 fe ab f8 54 a7 | 29 00 00 24 af 67 2a 08 9a 9a ad ff 86 6c 03 06 | 6f 2f 6b af d5 26 d4 77 40 17 03 25 58 a0 84 c4 | 14 b9 e1 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 4b 9f 22 64 ba ce 64 1d b6 f5 ba | 24 33 ca 6e b0 87 4a 02 00 00 00 1c 00 00 40 05 | 8e b1 42 d9 c7 63 9c 7b 3d 57 a7 c1 0c 5d 8c 4c | 33 59 3d db | libevent_free: release ptr-libevent@0x7fb38800a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #3 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 44 b6 c8 2a 40 ce 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #3 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #3 | rejected packet: | 81 44 b6 c8 2a 40 ce 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #3: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-100" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-100' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #100 at 0x557d46a5cfd0 | State DB: adding IKEv2 state #100 in UNDEFINED | pstats #100 ikev2.ike started | Message ID: init #100: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #100: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #100; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-100" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-100" IKE SA #100 "road-eastnet-nonat-100" "road-eastnet-nonat-100" #100: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-100 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-100": constructed local IKE proposals for road-eastnet-nonat-100 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 100 for state #100 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #100 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 | #100 spent 0.168 milliseconds in ikev2_parent_outI1() | crypto helper 3 resuming | crypto helper 3 starting work-order 100 for state #100 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 100 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-100" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.267 milliseconds in whack | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 100 time elapsed 0.000827 seconds | (#100) spent 0.835 milliseconds in crypto helper computing work-order 100: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 100 for state #100 to event queue | scheduling resume sending helper answer for #100 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #100 | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 100 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #100 | **emit ISAKMP Message: | initiator cookie: | e4 31 72 ce cb 4c 2e da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-100 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0a 02 70 26 8b f7 4c 10 d5 54 2d e1 56 87 42 60 | ikev2 g^x 52 43 18 58 d2 c6 63 79 e0 4c 7b 4a 2f b9 0e c8 | ikev2 g^x b1 65 1d 3e 6c a0 42 98 0c 60 fd b3 4d 30 f1 76 | ikev2 g^x 5e b7 85 03 42 2b d9 76 75 50 2e c4 69 94 03 7a | ikev2 g^x 6e c6 23 13 83 28 87 89 db 36 67 01 a4 44 23 73 | ikev2 g^x e4 b0 04 73 26 bb b0 01 8a 59 be 71 cf 90 5c 3a | ikev2 g^x 4f 3e 50 e0 98 79 eb 2c 62 ed 3b ff 05 2e f6 81 | ikev2 g^x 65 38 8c a4 51 39 05 8b 85 23 c5 f6 84 98 62 7d | ikev2 g^x 1d 2f 44 0d 73 e0 13 c3 51 be 3b 56 26 36 4c 79 | ikev2 g^x eb bc 2b 5e 2c 37 b2 d5 29 fa 64 f9 de 60 b9 ba | ikev2 g^x 73 c4 a9 28 1e 62 38 24 9d a3 96 c5 53 73 2c 7d | ikev2 g^x 0d 39 e6 12 54 ca 75 11 6f 12 17 8e e1 13 5d 45 | ikev2 g^x 12 9e c5 b7 6a ce 49 b5 ef 7b 55 be 70 ce 3a 18 | ikev2 g^x d9 f0 2c b9 2c 8a 17 6a 09 a2 d9 96 28 14 14 67 | ikev2 g^x 3e 3b 41 a6 c6 44 44 f5 69 48 d1 0a 41 9c 30 d6 | ikev2 g^x 74 2c 38 9d d2 1f 0a f9 85 a8 83 ce dd 7d a1 17 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9b 63 67 5a a5 90 71 08 bf 01 2e 0d 7a 17 c3 85 | IKEv2 nonce da c2 c9 b2 79 84 88 d1 44 e9 43 2f de e8 87 75 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e4 31 72 ce cb 4c 2e da | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 64 | natd_hash: port= 01 f4 | natd_hash: hash= cb bf 15 80 9f fe 69 e3 a2 7b 53 a0 71 05 30 05 | natd_hash: hash= 2a 8e cb 5a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cb bf 15 80 9f fe 69 e3 a2 7b 53 a0 71 05 30 05 | Notify data 2a 8e cb 5a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e4 31 72 ce cb 4c 2e da | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e0 55 02 95 04 d8 fc 5b b5 ab 42 28 79 3c 3e 17 | natd_hash: hash= 70 aa 5d 58 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e0 55 02 95 04 d8 fc 5b b5 ab 42 28 79 3c 3e 17 | Notify data 70 aa 5d 58 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #100 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #100: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #100 to 4294967295 after switching state | Message ID: IKE #100 skipping update_recv as MD is fake | Message ID: sent #100 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-100" #100: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.100:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #100) | e4 31 72 ce cb 4c 2e da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 02 70 26 8b f7 4c 10 d5 54 2d e1 56 87 42 60 | 52 43 18 58 d2 c6 63 79 e0 4c 7b 4a 2f b9 0e c8 | b1 65 1d 3e 6c a0 42 98 0c 60 fd b3 4d 30 f1 76 | 5e b7 85 03 42 2b d9 76 75 50 2e c4 69 94 03 7a | 6e c6 23 13 83 28 87 89 db 36 67 01 a4 44 23 73 | e4 b0 04 73 26 bb b0 01 8a 59 be 71 cf 90 5c 3a | 4f 3e 50 e0 98 79 eb 2c 62 ed 3b ff 05 2e f6 81 | 65 38 8c a4 51 39 05 8b 85 23 c5 f6 84 98 62 7d | 1d 2f 44 0d 73 e0 13 c3 51 be 3b 56 26 36 4c 79 | eb bc 2b 5e 2c 37 b2 d5 29 fa 64 f9 de 60 b9 ba | 73 c4 a9 28 1e 62 38 24 9d a3 96 c5 53 73 2c 7d | 0d 39 e6 12 54 ca 75 11 6f 12 17 8e e1 13 5d 45 | 12 9e c5 b7 6a ce 49 b5 ef 7b 55 be 70 ce 3a 18 | d9 f0 2c b9 2c 8a 17 6a 09 a2 d9 96 28 14 14 67 | 3e 3b 41 a6 c6 44 44 f5 69 48 d1 0a 41 9c 30 d6 | 74 2c 38 9d d2 1f 0a f9 85 a8 83 ce dd 7d a1 17 | 29 00 00 24 9b 63 67 5a a5 90 71 08 bf 01 2e 0d | 7a 17 c3 85 da c2 c9 b2 79 84 88 d1 44 e9 43 2f | de e8 87 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb bf 15 80 9f fe 69 e3 a2 7b 53 a0 | 71 05 30 05 2a 8e cb 5a 00 00 00 1c 00 00 40 05 | e0 55 02 95 04 d8 fc 5b b5 ab 42 28 79 3c 3e 17 | 70 aa 5d 58 | state #100 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38800a240 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #100 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 | #100 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49608.705575 | resume sending helper answer for #100 suppresed complete_v2_state_transition() and stole MD | #100 spent 0.473 milliseconds in resume sending helper answer | stop processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb33801d920 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 31 72 ce cb 4c 2e da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #100 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #100 | rejected packet: | e4 31 72 ce cb 4c 2e da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #100: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #48 | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #48 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #48 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49608.726789; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004026 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23110 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #48 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 "road-eastnet-nonat-48" #48: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #48) | 92 07 42 48 2a e6 dd 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 27 70 ee fe 7b a5 6b c0 91 72 76 bf b9 26 41 | 8a c5 01 3c cd 8b 21 f3 23 df 5c 81 f1 ed a2 12 | a1 c4 5e 2f a7 b1 21 02 24 b9 30 c4 f5 c4 2d c4 | 90 7e 3e f0 c9 0b f2 18 3c 2b b9 91 3a da c1 6c | 57 28 75 1b 3a 0e e8 9b fc 4b ee 5c 39 98 fa 15 | be 81 4e e4 0c 6c a4 75 1b 83 45 74 98 dd 81 5b | 06 80 95 32 c0 f4 a2 4b 9d f4 17 33 73 16 94 48 | 16 60 93 ae 3d ce 3e d6 a3 61 16 51 cb 19 ec 02 | 00 f8 5a 99 f9 c4 14 2b 6a 99 61 a3 6a e4 c5 97 | ad 75 bb 6b 78 38 5a b9 44 bc 5c a3 2d 23 20 4c | 99 1b 88 95 1f b4 34 15 92 91 16 2b 1d 90 a8 32 | bd a4 79 83 a7 b0 92 15 f0 e3 c2 79 58 67 56 eb | 4d 0c 97 c3 3f ae 15 49 f9 9c d2 3e ec c3 17 b9 | bd 62 c7 73 21 fe 81 8b e3 b9 eb a9 ce c7 0f d3 | 3f 5d 5a 44 c2 b4 29 b6 b5 67 52 29 de ca c6 15 | 31 6c 15 9d 56 b1 be 81 9a 0d b9 07 79 05 6e c9 | 29 00 00 24 56 48 d0 40 29 5d 70 09 47 7a f3 f6 | 53 84 44 57 f6 31 5c 3b e1 9a 2b 92 5f 13 77 b9 | 29 81 06 a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 92 e0 aa 95 98 e7 44 d2 2d 1e d8 | d0 35 7f 77 52 84 b9 c1 00 00 00 1c 00 00 40 05 | a2 97 dc 1e 35 5d 8b 7e f0 05 d9 9d 5b 9e 9f 7f | 26 7a 4a c3 | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #48 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 07 42 48 2a e6 dd 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #48 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #48 | rejected packet: | 92 07 42 48 2a e6 dd 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #48: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0eb30 | handling event EVENT_RETRANSMIT for parent state #95 | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #95 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #95 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49608.732106; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500649 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #95 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 "road-eastnet-nonat-95" #95: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #95) | 04 bb 1c 2b 41 e0 8a 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 79 b0 02 7c 1a 3a 07 ca 11 d1 03 7a 77 85 cb | ae ba 70 1b ee 9d e4 3c fb 83 b0 cf 85 ea f6 b1 | 44 27 5d 05 92 dc 5f 4f 10 d0 a1 c9 ef dd c6 ab | ac a1 db c0 15 56 b1 c8 1f 3b 2a 1e 0e 90 2f d7 | 1a 17 b9 f7 eb 61 37 1e 43 cf 9e 15 29 73 84 5a | a5 ef e1 fb 94 7f 43 bb 78 59 95 64 2c 87 b9 4b | 2e 15 ae fc 6c ec ab 40 45 3d 2f f3 c8 00 44 83 | 12 a7 e2 b8 59 bb 92 ce 59 8c ba f6 68 47 32 55 | e8 20 37 e3 3d d3 1b 3c 4e 84 f3 ae 58 53 16 45 | 58 97 74 47 9d a2 44 2f 81 9e ee 5c e8 ce 37 e9 | 5c 14 3e 89 c4 f1 89 ca 70 e0 1d 7a a9 38 f6 40 | 66 fb 41 8c 9b be 2c ea fc cd 2c ca 26 30 dd f0 | b1 29 6c c0 a6 b8 e6 ad e2 7b ae 2b 83 8b e5 9d | 01 26 d8 0c 5a 11 5f 25 a6 3e 25 b6 0f 26 26 34 | 01 b9 a7 4b b7 42 77 99 87 64 20 bd 67 77 cc 7e | b2 79 54 9b 12 25 7f ea ef 16 57 4a f6 24 75 7e | 29 00 00 24 fc b1 a7 58 88 f4 1b 4f aa 0e 2d d3 | a4 65 ca 66 dc 36 b5 47 7f 16 51 11 a3 c3 71 08 | 58 80 43 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ca 3c bb 33 78 12 9a 1b 10 5c d5 8f | d8 1f d4 ad ee 67 79 04 00 00 00 1c 00 00 40 05 | 61 56 68 61 76 b1 38 9f d6 2b 7a dd 4f cb 90 80 | 12 f2 80 83 | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0eb30 | #95 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 bb 1c 2b 41 e0 8a 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #95 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #95 | rejected packet: | 04 bb 1c 2b 41 e0 8a 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #95: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a100f0 | handling event EVENT_RETRANSMIT for parent state #90 | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #90 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #90 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49608.737444; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001792 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23150 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #90 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 "road-eastnet-nonat-90" #90: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #90) | 26 95 92 02 0c 74 14 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 ed e3 a8 eb 0c e2 00 1e b8 30 77 f5 0e ad ce | 65 c1 45 a9 f8 d6 59 16 4d 14 6e d4 77 5e 81 5d | e4 5a fa df cb d1 e9 b4 fb 7a 1b 94 96 f5 cd a1 | 92 48 08 b0 94 02 60 49 2d a3 e6 bd 87 20 3a b6 | b3 a4 42 54 6e e3 59 4f 33 f7 d9 14 23 f3 be 46 | 0e 6a b0 16 f3 25 4c 11 1c 90 dd a1 d3 04 dc 69 | 8d 39 0c 51 5f 83 72 cb 93 87 70 c9 f5 3d e0 2a | c5 11 3c 75 bc 46 e8 c6 f5 45 c5 bc bb 53 d8 9c | 7a ab 11 6e 8b 56 f1 6e cd 93 8a 23 e4 3d ba 8e | f3 e8 36 9d 53 65 3b 19 f4 e3 cc f3 54 92 3e af | 1e ea f7 7a 71 af d2 c7 14 e2 2f f0 39 fe 17 bf | 5f 5e bd 3d 44 b3 a2 13 36 c4 88 da f8 e8 06 a9 | 63 d0 49 96 b9 8b b5 05 47 2d f0 7c f0 b7 4b a3 | d9 0f 59 ad 42 e6 a2 62 85 25 36 ae 56 68 a9 08 | 18 48 13 b3 3d 8c 24 fd 03 b0 13 b0 fc 3c f6 fc | 7b 2f 36 dc 82 d7 51 c4 8b bc 56 3e 48 7c ce 7f | 29 00 00 24 7b f2 d7 97 09 c8 65 d1 69 47 34 b1 | 55 8b 56 a2 4a 71 ee 64 d5 6c 65 05 c4 2c 51 b4 | b0 ab 0f 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 4b f3 32 75 d7 ef f4 06 67 91 40 | 71 93 9a 6d f5 fe b0 cc 00 00 00 1c 00 00 40 05 | 99 8e 72 1b 4f e3 a6 e8 23 e7 c4 0e ce 5c a4 3c | cd e1 15 1b | libevent_free: release ptr-libevent@0x7fb35401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a100f0 | #90 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 95 92 02 0c 74 14 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #90 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #90 | rejected packet: | 26 95 92 02 0c 74 14 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #90: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #75 | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #75 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #75 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49608.765445; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.008219 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #75 | libevent_malloc: new ptr-libevent@0x7fb35401d920 size 128 "road-eastnet-nonat-75" #75: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #75) | d6 96 43 68 6a ec ab 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b e7 f0 1b 8c 0a 12 dd d6 e5 bf 02 28 26 dd ac | 6b 5a 27 84 cc 5b e1 51 a5 48 25 1e 64 a9 f9 15 | a7 cf bd df a0 ad 76 b9 f4 06 07 4e 82 21 11 6b | 26 3f e9 d5 c8 28 2c a1 f2 de e8 cf 1b 66 10 aa | 48 33 36 9a e1 15 5a 5f 6d a7 50 58 f0 d8 c9 11 | b2 31 61 66 dc 13 e3 c7 ff 39 58 4c c1 88 d6 62 | 58 b9 1d ad d3 89 b6 21 d6 53 4e 88 4f 41 13 08 | 17 e6 d6 6a c0 94 05 0a ca 81 fd 84 5a f1 98 1e | b0 e9 8c 00 0a 4a 9c 8f 68 9e 7b 0d 09 60 4d 06 | b0 a8 a6 4f 85 49 38 bb ac 0a 4e 89 c8 a9 1a ef | 21 bd 3e 11 8d 34 77 94 db 0a 8d 1b 25 93 bc 6d | 26 8e 7b 5a 1c a6 da 04 b8 b9 68 16 5d 98 25 e7 | 4f 1c fe b2 4a 85 cb fd 7d 24 86 89 1b f6 19 0f | c0 e3 71 1b 57 41 f6 79 be 0c 81 b2 d6 8d b1 21 | 0e f7 f7 b1 1e d7 c5 ff e7 e6 4b 6a 5e 29 e6 f5 | 33 d7 87 e4 a6 ee a9 a9 4b 11 cd 2e d2 b6 0a d2 | 29 00 00 24 80 4b a3 25 3b 73 08 25 20 19 cd 1b | 6b 4a 3a cd 29 5e ac 55 94 fe 42 a8 a3 13 30 97 | 0f 50 65 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 04 fe 2e 3e a3 d6 9c 0e cd 5a 49 | b4 f8 ac 71 05 8a 92 ef 00 00 00 1c 00 00 40 05 | 56 54 de 54 0a a0 dc 64 96 23 cc 19 a1 e6 37 21 | c0 78 fa 6f | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #75 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 96 43 68 6a ec ab 11 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #75 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #75 | rejected packet: | d6 96 43 68 6a ec ab 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #75: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-101" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-101' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #101 at 0x557d46a5e590 | State DB: adding IKEv2 state #101 in UNDEFINED | pstats #101 ikev2.ike started | Message ID: init #101: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #101: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #101; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-101" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-101" IKE SA #101 "road-eastnet-nonat-101" "road-eastnet-nonat-101" #101: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-101 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-101": constructed local IKE proposals for road-eastnet-nonat-101 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 101 for state #101 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb364005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #101 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 | #101 spent 0.14 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-101" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.224 milliseconds in whack | crypto helper 1 resuming | crypto helper 1 starting work-order 101 for state #101 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 101 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 101 time elapsed 0.000956 seconds | (#101) spent 0.963 milliseconds in crypto helper computing work-order 101: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 101 for state #101 to event queue | scheduling resume sending helper answer for #101 | libevent_malloc: new ptr-libevent@0x7fb388022480 size 128 | crypto helper 1 waiting (nothing to do) | timer_event_cb: processing event@0x557d46a2f770 | handling event EVENT_RETRANSMIT for parent state #49 | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #49 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #49 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49608.789033; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003851 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a100f0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #49 | libevent_malloc: new ptr-libevent@0x7fb36800cf80 size 128 "road-eastnet-nonat-49" #49: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #49) | 8b 45 5c f0 af 2f 9d ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 38 13 81 3a b9 33 6e f2 a1 41 ed b7 e9 17 cf | 38 df bd f2 c5 3d 78 1c 98 5b e5 97 39 7c 00 0a | 9b b9 2b 4e ee 4e 90 b7 3f 17 93 3b 49 e6 73 ac | f3 36 ea c0 f6 08 78 26 b2 58 4a a1 8f ff 26 a9 | a2 29 62 4b f6 47 e2 5d a0 f3 e8 a3 da 86 cc 66 | 5a 6a 1d 0c 47 30 d7 e6 6e 32 62 71 d7 d3 1b 25 | 92 10 eb e7 f4 a1 c6 b8 cf 48 2b c2 a1 ae c9 5f | 55 56 6d 5d 77 a7 5f aa 02 cf a8 ea bb 62 18 44 | 0f aa 1d 7d 23 c7 37 6d 72 2b 4a da 38 22 af af | 35 47 8a 4d fb f1 2e 0f fa 54 54 48 f4 2f 1b 4b | 5a 9a c8 ab f4 0a 9c 36 8e 9a 37 b6 3a a4 36 09 | f9 cb 85 a0 d5 4e 66 72 2d dc a7 8d 87 52 32 39 | 0d 6e ce 73 51 c4 9b ee a5 7a c3 e9 dd 43 0b 8d | c9 c7 df e3 c7 9a fc aa 8b 37 41 93 d2 be 3c 27 | 15 30 62 da 6c d3 07 29 68 48 b5 55 56 c4 17 4f | b5 8f 29 d1 f2 fb 9e ea 13 d1 f0 21 44 a0 36 ca | 29 00 00 24 0e e2 a8 92 f0 b5 63 29 61 a0 ee 39 | b4 45 f6 bb e0 ab b1 76 a4 84 16 9e da d2 be 94 | e8 6d f8 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 12 9b 83 c2 c3 d2 71 a5 38 21 6e | a0 97 8f 66 c6 b8 71 3b 00 00 00 1c 00 00 40 05 | d2 ce 05 69 62 ac 37 a7 c1 ab 75 f3 75 7a c1 3e | 4a 93 d7 88 | libevent_free: release ptr-libevent@0x7fb3680180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2f770 | #49 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #101 | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 101 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #101 | **emit ISAKMP Message: | initiator cookie: | a4 e5 70 36 3e 53 78 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-101 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ed 47 67 da db 52 1d 6f 38 4e a0 14 fb a3 22 ee | ikev2 g^x a5 bd 87 bb f4 50 cd e1 5f f4 bb 7f 5e 01 20 78 | ikev2 g^x 03 d2 5e e5 f5 4c 45 4d 90 0b ab 1e a9 68 0d a2 | ikev2 g^x 63 8b 82 0b 63 5a be b1 7a 7f 0a d0 8f 73 00 89 | ikev2 g^x 01 d6 0d 8e e0 01 de 09 aa b1 2b c9 2a 85 99 3e | ikev2 g^x e4 12 33 b6 ff a4 02 5b a4 0f a9 0e 49 92 c4 c4 | ikev2 g^x 91 bb bd cc bc 4e ec 81 b6 b6 b8 9c 4a 4e 40 d2 | ikev2 g^x 5e b4 c5 bc f7 4c 25 7f b5 8f df 4b 29 de 24 b5 | ikev2 g^x 99 9e 0e bd 10 eb 77 c5 31 71 d3 38 c7 ae 1b 45 | ikev2 g^x a1 15 8f 53 f2 46 e1 e0 f3 7d cd 3a fa d7 ce cc | ikev2 g^x 71 fa 98 05 20 5e 2b 57 e0 1e 93 66 04 94 47 68 | ikev2 g^x b5 fc da d4 67 d1 27 06 e7 0b 81 26 9b 06 3d 8a | ikev2 g^x 68 ab 7d 23 5f b3 75 b4 20 05 d5 0a d7 9f 47 f8 | ikev2 g^x cc 49 2f 28 05 85 5c 22 76 a9 df c7 57 38 c2 59 | ikev2 g^x 85 34 bf b9 39 30 70 bd fe 4d 41 14 30 36 f4 a7 | ikev2 g^x a4 75 83 53 e7 c0 5a e0 b5 e5 07 a1 66 16 4d c3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 08 f8 1e 60 51 22 a7 7a 61 74 80 8a 8a 13 29 1d | IKEv2 nonce 07 8a 7f 81 27 3b e2 db 98 17 8f 37 46 82 14 fa | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a4 e5 70 36 3e 53 78 7f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 65 | natd_hash: port= 01 f4 | natd_hash: hash= 9f 37 fb 68 83 f3 3a 11 a5 17 fb 1f 7d e8 ab 39 | natd_hash: hash= 06 f5 fb 7f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9f 37 fb 68 83 f3 3a 11 a5 17 fb 1f 7d e8 ab 39 | Notify data 06 f5 fb 7f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a4 e5 70 36 3e 53 78 7f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 98 33 35 18 bc 62 08 ee 27 45 3b 5b 93 d4 b0 de | natd_hash: hash= 01 b6 d3 96 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 98 33 35 18 bc 62 08 ee 27 45 3b 5b 93 d4 b0 de | Notify data 01 b6 d3 96 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #101 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #101: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #101 to 4294967295 after switching state | Message ID: IKE #101 skipping update_recv as MD is fake | Message ID: sent #101 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-101" #101: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.101:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #101) | a4 e5 70 36 3e 53 78 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 47 67 da db 52 1d 6f 38 4e a0 14 fb a3 22 ee | a5 bd 87 bb f4 50 cd e1 5f f4 bb 7f 5e 01 20 78 | 03 d2 5e e5 f5 4c 45 4d 90 0b ab 1e a9 68 0d a2 | 63 8b 82 0b 63 5a be b1 7a 7f 0a d0 8f 73 00 89 | 01 d6 0d 8e e0 01 de 09 aa b1 2b c9 2a 85 99 3e | e4 12 33 b6 ff a4 02 5b a4 0f a9 0e 49 92 c4 c4 | 91 bb bd cc bc 4e ec 81 b6 b6 b8 9c 4a 4e 40 d2 | 5e b4 c5 bc f7 4c 25 7f b5 8f df 4b 29 de 24 b5 | 99 9e 0e bd 10 eb 77 c5 31 71 d3 38 c7 ae 1b 45 | a1 15 8f 53 f2 46 e1 e0 f3 7d cd 3a fa d7 ce cc | 71 fa 98 05 20 5e 2b 57 e0 1e 93 66 04 94 47 68 | b5 fc da d4 67 d1 27 06 e7 0b 81 26 9b 06 3d 8a | 68 ab 7d 23 5f b3 75 b4 20 05 d5 0a d7 9f 47 f8 | cc 49 2f 28 05 85 5c 22 76 a9 df c7 57 38 c2 59 | 85 34 bf b9 39 30 70 bd fe 4d 41 14 30 36 f4 a7 | a4 75 83 53 e7 c0 5a e0 b5 e5 07 a1 66 16 4d c3 | 29 00 00 24 08 f8 1e 60 51 22 a7 7a 61 74 80 8a | 8a 13 29 1d 07 8a 7f 81 27 3b e2 db 98 17 8f 37 | 46 82 14 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 37 fb 68 83 f3 3a 11 a5 17 fb 1f | 7d e8 ab 39 06 f5 fb 7f 00 00 00 1c 00 00 40 05 | 98 33 35 18 bc 62 08 ee 27 45 3b 5b 93 d4 b0 de | 01 b6 d3 96 | state #101 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb364005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #101 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 | #101 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49608.789729 | resume sending helper answer for #101 suppresed complete_v2_state_transition() and stole MD | #101 spent 0.467 milliseconds in resume sending helper answer | stop processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388022480 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 45 5c f0 af 2f 9d ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #49 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #49 | rejected packet: | 8b 45 5c f0 af 2f 9d ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #49: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 e5 70 36 3e 53 78 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #101 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #101 | rejected packet: | a4 e5 70 36 3e 53 78 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #101: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0556 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #91 | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #91 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #91 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49608.815995; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001625 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0eb30 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #91 | libevent_malloc: new ptr-libevent@0x7fb388022480 size 128 "road-eastnet-nonat-91" #91: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #91) | a6 f1 37 27 17 86 c6 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 6a 94 73 f6 c2 01 42 8c 6e f6 05 6f 1c e2 ee | 38 45 16 e5 f6 17 c9 fc 07 cc bc 0b 02 da 35 c8 | 5a ca 9d 87 29 53 47 69 49 7f 31 f0 fb ce e2 59 | 00 57 9b 32 9e 1f da 4b f7 41 b5 05 14 af c4 d7 | 09 7f 69 01 a0 cd 93 57 e5 a7 fd 93 a9 9e c3 fc | b0 af f5 37 11 6f 2b 38 a8 2a 8b 37 b3 e6 bc bf | 0c 06 37 86 ca f2 b6 b0 ed 1e 3f d6 8a f0 0b f9 | e8 80 df 35 d6 a2 36 c0 a2 dc a4 1a ca 7d d9 0b | 6f fc 29 fc 92 12 f8 05 c1 88 8e 81 27 4a 61 62 | c3 16 fc 6e 5e a6 59 bf d1 b1 ad d5 92 05 c4 60 | 2f 54 a3 71 e0 ec ca 5d 37 16 ec 5f ec 37 29 2d | 46 5a 04 10 84 ad 36 aa 07 ca f2 60 8b 7c ac f8 | ac e2 8b a3 69 23 74 f2 d2 2d c5 0d 51 9b 2c 7f | 42 45 54 c3 ec 3d 44 63 f0 0a ec ff b3 69 48 ee | 22 28 aa af 72 8c cd ca 9e 3c dd f6 ac 2b 6f b7 | a1 90 21 32 ae b8 23 39 1e cc fe 3e d6 b6 21 70 | 29 00 00 24 29 05 58 2b f0 ba fb 18 77 b3 53 8d | 8b 05 bb 0a 8a c5 e8 dc 24 17 58 d9 a6 60 c9 1d | bc c9 21 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 d0 cc 50 f7 83 7e b1 80 37 a7 4b | da df 68 8f 62 b7 e5 89 00 00 00 1c 00 00 40 05 | 8a 41 f9 2e 73 42 40 08 8e 79 f6 3e 7a 3f 48 7e | 67 86 16 af | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #91 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 f1 37 27 17 86 c6 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #91 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #91 | rejected packet: | a6 f1 37 27 17 86 c6 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #91: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0696 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #4 | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #4 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #4 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49608.817439; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003931 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #4 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 "road-eastnet-nonat-4" #4: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #4) | 9f e3 9d 02 77 44 b7 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 12 be 82 37 05 d2 52 25 54 17 1c 7e a4 e7 a1 | 7e a3 9e 01 f0 c9 5e f6 79 14 37 d9 ec ef 3e 7b | d6 12 38 d8 73 16 9f 73 2c 17 04 25 c3 08 1e 06 | d4 99 19 15 32 45 9a a7 b4 d5 ad 96 4d 41 dc 91 | 4d c8 05 99 28 4b a0 e8 08 9f f7 76 6e 87 6e f0 | e8 58 e3 c1 70 13 6f 8d cd 7f 4b 91 ab b0 98 2b | 80 11 c8 ef d5 8f f3 5b b1 1f e0 43 de 0c 0e b1 | 13 32 29 e5 dd ca fb b5 e8 02 d1 3b 1d 9e 4d 95 | 8d f8 b1 fd 7f db 1b 37 33 cf 99 72 de f0 e3 79 | 73 e7 61 a0 9f 73 96 2a c8 d9 3f f2 5e 93 fa f5 | 10 3a 62 6a 38 cd 93 3a 9f a8 56 7d f2 c3 ee 21 | b5 e7 1b 68 51 3a 6c 80 5b ad 50 8d 16 63 1e 8c | 65 d8 ef 12 42 db b7 45 7e c0 09 e7 f6 56 5d da | d8 52 c7 89 46 5c ed c7 24 ca 60 5c ff 30 28 b2 | a1 94 8c ec d2 08 2c a4 8a 1d a2 db fd 97 89 ac | cf d6 3b e3 0f 35 26 7e 4f b9 c8 b0 82 f2 80 6e | 29 00 00 24 ff 8a 31 04 ed 0e 73 16 f9 33 92 87 | 63 96 e9 90 5e 3a 90 66 d0 c2 86 27 40 23 58 23 | 51 d5 8c f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 57 40 bb 9d 01 b2 e8 79 26 d3 b2 | 9e 9a c3 98 03 95 6b f7 00 00 00 1c 00 00 40 05 | 19 68 23 54 27 85 e7 5a 70 ec 13 67 75 7a 20 68 | 80 f1 f5 99 | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #4 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f e3 9d 02 77 44 b7 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #4 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #4 | rejected packet: | 9f e3 9d 02 77 44 b7 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #4: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #76 | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #76 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #76 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49608.830746; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003722 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #76 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 "road-eastnet-nonat-76" #76: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #76) | 08 23 b8 f6 73 09 18 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 b3 88 98 c3 00 3b ee 78 d3 a9 62 79 c8 5e 50 | ca be d3 60 b9 ac ef b3 70 f2 72 51 6e d0 6f e7 | 76 2f 02 45 ea 0c 3e b7 a1 fa 9a de 13 7f 48 f6 | 9a 0d 43 96 53 05 8a 3f 59 81 18 a2 54 08 83 e6 | b2 23 5b f0 fb 8a 5c 92 dc 0e cf 01 e1 94 34 22 | c2 e0 dc ae e5 0d ab a5 e1 89 bb 62 bf 90 17 bf | 34 96 56 44 a4 0c 23 a8 83 ef d0 4c 0b 33 57 7c | 55 bb 56 dc a3 43 8f 68 ba 01 38 40 7f c5 c5 3f | 05 89 dc 6e 0f 54 d6 e4 1f 39 ed af 78 c0 40 5e | de 96 c5 64 7e 4a 03 ee be b0 cb 81 ef de ed 18 | d9 e4 a5 05 6d 9a 00 f2 6a ea 28 7f 9c 2d 97 a0 | 10 8c cf d6 69 56 ba cb c7 fa 65 c6 5b b9 83 ba | f4 70 1e a9 02 08 4b 23 06 c6 59 e2 2c c1 32 a4 | 3b f4 b6 34 0c f2 27 38 ff 60 3f ff db da aa 0d | 54 69 d6 85 b5 50 9d 06 87 5b 28 9b f1 40 e5 16 | 60 3a e9 e8 52 ec 8a 8f b6 c8 a1 d2 cd ff f5 a1 | 29 00 00 24 15 3e 8d 58 5c 16 4e 6b 9c 08 25 92 | 8d ef 80 f2 25 ea cd 1e ba c6 95 f9 1b a7 f2 dd | 45 1d 12 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 8b 52 aa 3c 87 b6 df df 8c 81 fe | ec 85 60 df 06 8e 81 b3 00 00 00 1c 00 00 40 05 | 54 01 aa b8 56 eb 7a 7b 30 98 73 ed 67 e2 36 06 | bd 7f 30 ed | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #76 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 23 b8 f6 73 09 18 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #76 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #76 | rejected packet: | 08 23 b8 f6 73 09 18 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #76: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.047 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47ed0 | handling event EVENT_RETRANSMIT for parent state #96 | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #96 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #96 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49608.838081; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501481 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #96 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 "road-eastnet-nonat-96" #96: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #96) | 4d 94 02 39 3c 71 1f ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 27 e8 d9 3b fa 4a fd 06 7e 6c e7 d4 28 0e 9b | df ea 6a b2 fc 9c 70 c8 54 bf db 6f b0 0a 35 03 | f4 08 a8 1f a5 9d 3d d9 36 ba b8 d7 c7 a5 02 b2 | bf b0 56 c5 e8 85 3a 3f 3e 64 27 86 e6 32 36 9e | e3 cb 8f 61 07 7c f1 f7 b9 98 01 dc 75 bf ec 8e | e7 f3 67 03 e1 e0 44 02 7f 11 18 67 70 37 2d 5e | 1b 6f 89 19 20 17 f1 e7 a8 e9 33 cb ea 00 46 56 | 49 ba cc 5d 15 50 da 98 ff 9c 3f 56 7f 50 23 17 | 4f 39 25 c0 2c 24 4b 31 aa 08 bf c3 fa 73 75 f8 | 66 d4 df a2 81 2f b6 b1 85 b3 e1 b9 2c ba cc f0 | 05 a5 8e 76 4a d0 1e 4a 24 c4 b4 b6 c2 9f 5a c8 | d7 f7 62 5f e5 ae 58 69 f5 08 1a e6 3f f8 45 99 | 93 41 5e 16 d1 fa c4 dc dc 43 aa 67 19 5f 0d 6b | d0 93 a7 d0 e0 42 60 37 df bb b8 67 3d be 3f 73 | 01 ab df b7 44 63 b3 2e 2f eb b6 11 c7 6c 12 e1 | 09 64 f6 e9 82 4b 4a d1 f8 5c 86 44 cf 9c 7b 84 | 29 00 00 24 fb b6 a6 14 5d d4 9f d4 3b de f1 45 | f6 4a ea e3 bf d0 33 9e b1 50 af 7d ca 56 7c e5 | 77 5f 83 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 32 ad 1c 75 03 32 df 0c 2b d0 a0 | cb f7 34 b2 23 e4 90 14 00 00 00 1c 00 00 40 05 | 3d 4e a8 fd 45 70 26 15 be c0 96 dc 33 de 8f ea | e2 1a 12 a7 | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47ed0 | #96 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d 94 02 39 3c 71 1f ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #96 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #96 | rejected packet: | 4d 94 02 39 3c 71 1f ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #96: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-102" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-102' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #102 at 0x557d46a5fb50 | State DB: adding IKEv2 state #102 in UNDEFINED | pstats #102 ikev2.ike started | Message ID: init #102: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #102: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #102; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-102" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-102" IKE SA #102 "road-eastnet-nonat-102" "road-eastnet-nonat-102" #102: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-102 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-102": constructed local IKE proposals for road-eastnet-nonat-102 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 102 for state #102 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47ed0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #102 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 | #102 spent 0.178 milliseconds in ikev2_parent_outI1() | crypto helper 2 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 starting work-order 102 for state #102 | RESET processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 102 | RESET processing: connection "road-eastnet-nonat-102" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.288 milliseconds in whack | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 102 time elapsed 0.000751 seconds | (#102) spent 0.756 milliseconds in crypto helper computing work-order 102: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 102 for state #102 to event queue | scheduling resume sending helper answer for #102 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #102 | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 102 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #102 | **emit ISAKMP Message: | initiator cookie: | 27 a9 08 a7 62 f6 e2 d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-102 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e6 3c 29 a0 c9 87 b4 80 a8 37 0b 02 31 7e 05 06 | ikev2 g^x 02 b7 61 4c 60 0e af ef 4b 5c b9 dc 19 0b 5d d9 | ikev2 g^x 85 a8 a5 ba 16 2d 92 a5 e8 44 5d 48 48 06 cf a5 | ikev2 g^x c8 1d 53 0f c9 1c 2d 7b a3 b3 51 75 2d 98 e2 85 | ikev2 g^x e1 14 fe ce 69 6e ee 85 ba cc ab 6a ed ac 29 a6 | ikev2 g^x 04 6d ec cb be 61 e5 98 b4 1e dc 38 dc 20 70 bb | ikev2 g^x 52 99 a2 ac 6c 5b d5 dd f6 c6 54 38 29 d3 1c 88 | ikev2 g^x 10 77 53 7e af 0b 17 62 42 90 de ab 20 33 28 bc | ikev2 g^x 91 f7 eb 8f 86 fb 2e 6b 0f 94 c5 1b d9 40 a4 9e | ikev2 g^x 85 bd 8a 30 d0 a6 6c 09 f4 53 70 9d 11 c9 76 49 | ikev2 g^x 32 46 6a 4a 93 73 a4 59 28 e7 d5 c6 a2 40 d9 fe | ikev2 g^x c5 0c 7c 9f 70 ed 22 06 0b e5 2d 6e 16 d1 d2 84 | ikev2 g^x dd d9 af a3 b3 06 49 42 9f 97 37 00 03 72 48 b5 | ikev2 g^x 2c 38 f9 d2 b0 86 d6 8d ff f1 cb a6 a2 01 50 8e | ikev2 g^x d5 f2 44 23 56 23 e0 80 83 60 74 3c 92 0d 5e fb | ikev2 g^x ab 02 db 75 25 b6 fb 54 b8 2c cc 93 7e 04 7e 47 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 02 3b 00 99 07 4d 65 f7 7a c6 71 3b f3 f6 94 93 | IKEv2 nonce e2 10 88 59 58 b9 a5 ba 96 a3 b3 bb 2e a4 a0 7e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 27 a9 08 a7 62 f6 e2 d5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 66 | natd_hash: port= 01 f4 | natd_hash: hash= e9 f0 3d eb e8 fa 43 c6 b4 69 3b f8 f6 b0 ac 09 | natd_hash: hash= 3e c3 01 6c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e9 f0 3d eb e8 fa 43 c6 b4 69 3b f8 f6 b0 ac 09 | Notify data 3e c3 01 6c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 27 a9 08 a7 62 f6 e2 d5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 27 e7 8a b1 d1 bb a4 87 76 d6 0f f9 d8 03 fa 51 | natd_hash: hash= 25 22 7e d6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 27 e7 8a b1 d1 bb a4 87 76 d6 0f f9 d8 03 fa 51 | Notify data 25 22 7e d6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #102 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #102: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #102 to 4294967295 after switching state | Message ID: IKE #102 skipping update_recv as MD is fake | Message ID: sent #102 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-102" #102: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.102:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #102) | 27 a9 08 a7 62 f6 e2 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 3c 29 a0 c9 87 b4 80 a8 37 0b 02 31 7e 05 06 | 02 b7 61 4c 60 0e af ef 4b 5c b9 dc 19 0b 5d d9 | 85 a8 a5 ba 16 2d 92 a5 e8 44 5d 48 48 06 cf a5 | c8 1d 53 0f c9 1c 2d 7b a3 b3 51 75 2d 98 e2 85 | e1 14 fe ce 69 6e ee 85 ba cc ab 6a ed ac 29 a6 | 04 6d ec cb be 61 e5 98 b4 1e dc 38 dc 20 70 bb | 52 99 a2 ac 6c 5b d5 dd f6 c6 54 38 29 d3 1c 88 | 10 77 53 7e af 0b 17 62 42 90 de ab 20 33 28 bc | 91 f7 eb 8f 86 fb 2e 6b 0f 94 c5 1b d9 40 a4 9e | 85 bd 8a 30 d0 a6 6c 09 f4 53 70 9d 11 c9 76 49 | 32 46 6a 4a 93 73 a4 59 28 e7 d5 c6 a2 40 d9 fe | c5 0c 7c 9f 70 ed 22 06 0b e5 2d 6e 16 d1 d2 84 | dd d9 af a3 b3 06 49 42 9f 97 37 00 03 72 48 b5 | 2c 38 f9 d2 b0 86 d6 8d ff f1 cb a6 a2 01 50 8e | d5 f2 44 23 56 23 e0 80 83 60 74 3c 92 0d 5e fb | ab 02 db 75 25 b6 fb 54 b8 2c cc 93 7e 04 7e 47 | 29 00 00 24 02 3b 00 99 07 4d 65 f7 7a c6 71 3b | f3 f6 94 93 e2 10 88 59 58 b9 a5 ba 96 a3 b3 bb | 2e a4 a0 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f0 3d eb e8 fa 43 c6 b4 69 3b f8 | f6 b0 ac 09 3e c3 01 6c 00 00 00 1c 00 00 40 05 | 27 e7 8a b1 d1 bb a4 87 76 d6 0f f9 d8 03 fa 51 | 25 22 7e d6 | state #102 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47ed0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47ed0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #102 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 | #102 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49608.853568 | resume sending helper answer for #102 suppresed complete_v2_state_transition() and stole MD | #102 spent 0.477 milliseconds in resume sending helper answer | stop processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb380022480 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 a9 08 a7 62 f6 e2 d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #102 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #102 | rejected packet: | 27 a9 08 a7 62 f6 e2 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #102: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.057 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28ab0 | handling event EVENT_RETRANSMIT for parent state #50 | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #50 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #50 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49608.85677; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004871 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2f770 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #50 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 "road-eastnet-nonat-50" #50: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #50) | 96 fd fa e4 3e 0e 84 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 85 b8 19 de 5c 0b b8 2d cb 54 cd 4a 1a dc 75 | 29 fd ca 47 94 14 29 17 31 bc e5 6f 6c f8 34 07 | 54 0a 45 19 2c 2a 6f 1c b9 dd 1e a6 5c 18 fd 5f | 81 44 c7 97 e9 8f a1 20 0b 20 67 50 dc 17 2d 25 | 1e 18 a7 76 43 da 58 3d a0 3c 42 3d 77 42 d1 eb | ed 35 62 7a 01 62 e1 32 87 10 6c d5 80 f8 d5 7a | e6 0d bc 8d d6 42 76 b9 2d fe 0d c3 eb e6 a9 0d | 0e 9f 06 5b af 9e 49 ff c0 94 83 2a d0 2d 71 88 | 4e 9a 35 ec c3 f5 8a a6 c6 22 6e 7e 16 d4 d9 e4 | d9 14 a9 a0 89 f2 18 8e be cf da c0 b4 27 62 b2 | 69 81 38 d5 cf 1b 18 ef 28 a2 d6 ab 45 93 46 f0 | b0 cf a6 b1 57 a8 1a d7 72 93 ec cd 51 ba 98 80 | 63 05 e1 50 59 41 cf a5 af 5d 7f 76 36 8e 63 f7 | e7 a8 78 3d b4 e5 4b 57 33 d8 0b ca bb 46 3b d1 | 5c 60 2c ab 89 51 2a 58 57 80 21 7f 56 14 26 65 | bd a7 02 e1 81 1f b6 ff ab b3 3c 36 3a 4d e7 be | 29 00 00 24 62 85 07 c7 f7 76 d5 f9 35 e6 84 85 | cf ff 39 b7 d3 8a fe b9 27 ad b1 ed 4e 28 c4 d4 | 73 2f 0f ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 6a 14 0a 8a ea 03 bd 41 dc ab fe | 15 04 7a 2b 71 ea 6d 09 00 00 00 1c 00 00 40 05 | 24 23 f0 d4 3c 33 30 25 f8 fc 46 79 64 b6 7b 59 | 6c 35 21 7f | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28ab0 | #50 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 fd fa e4 3e 0e 84 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #50 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #50 | rejected packet: | 96 fd fa e4 3e 0e 84 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #50: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #77 | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #77 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #77 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49608.891128; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002679 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28ab0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #77 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 "road-eastnet-nonat-77" #77: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #77) | 4f f7 57 30 7e 30 db a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 14 f0 66 5e 0a 53 d9 86 47 70 5a 8a 73 bc cb | 52 bc 3f 13 31 b6 9a 6b ff ca f8 2e b7 f0 48 d4 | 77 e7 4c 8e 73 e9 11 6d 0b d9 88 30 75 88 11 48 | 3e 3b 98 fa 3c 66 3a 0b 64 a6 08 cb b7 12 5b 20 | d5 1b 40 67 18 3f 33 02 0f 4c 76 b1 96 fb 38 53 | 46 2f 32 4f 32 aa f2 f1 c1 7e 1b a3 93 84 38 d3 | 1e e6 5e 44 4e 6a 52 d2 5d 7c 9d 39 17 98 69 cc | ec 36 94 6b e8 33 1d ce 1b 8f 5c 7f dd d4 89 82 | 85 a6 1d ff 6c 9b 05 f9 47 a5 19 cd c4 fd 29 1a | 81 51 1f 14 ac 62 dd 33 b1 29 91 3b e8 1b 12 6e | ed 37 99 ae 6f 7a c8 95 71 30 61 a1 ef a5 33 55 | ef 40 50 d8 41 20 80 d2 32 15 fe 53 0a 4d 72 3e | a0 4f 5d 9d 14 7f 1b d9 8a 58 bc 3b 06 b1 c0 d6 | 7a 44 d2 2e f1 5d e3 62 b2 7b f9 e3 44 aa 80 9c | 12 99 76 f5 03 a4 33 27 55 fb 36 b5 80 18 d9 30 | de 03 51 b8 74 0a cb fb 17 be 0d a8 1c 8a af f0 | 29 00 00 24 70 06 ac 37 52 b8 ec 28 7d 6d 81 11 | 1b 1b 6d ce ed 39 8f ce a3 eb 17 d2 32 09 4a 8f | f1 a8 0e 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 42 86 64 cb f7 df d8 ee 6f 6b 28 | 69 76 6e 6d 07 28 e7 b4 00 00 00 1c 00 00 40 05 | cd 8e d4 a4 9f b1 74 d8 7d 8d 61 97 d8 57 39 f7 | 36 5a 1d 66 | libevent_free: release ptr-libevent@0x7fb36c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #77 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f f7 57 30 7e 30 db a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #77 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #77 | rejected packet: | 4f f7 57 30 7e 30 db a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #77: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d590 | handling event EVENT_RETRANSMIT for parent state #92 | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #92 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #92 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49608.896444; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001988 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #92 | libevent_malloc: new ptr-libevent@0x7fb36c00cf80 size 128 "road-eastnet-nonat-92" #92: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #92) | 07 61 83 69 17 8d a7 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 13 06 9b 22 b9 09 02 07 4e 56 e2 9a 05 b7 70 | b7 25 ba 3c e0 d7 4b 41 68 60 e2 84 fa 7d 2e 53 | 6d 05 81 6c 1d a6 11 6c f3 c1 91 94 93 3c 04 e1 | 47 48 3f a6 f9 c1 bd d3 55 1c 44 87 99 6c 2b ee | 1a fc ef da ca ee 71 5f 90 30 42 cf 28 4f 89 1f | 86 f8 61 c0 95 c8 84 9c 1c 5f 1c 12 41 c6 05 de | 97 e9 89 32 6b 06 59 ff 06 2b 2f 06 a3 7f d2 ee | 73 0b 6d 38 c1 ed f4 4b b5 20 b3 c7 2c 91 97 4e | e0 5f 39 be 43 66 47 ab c5 cc 93 72 f7 60 85 3f | db 39 5c a4 81 f1 02 ef e4 62 a4 fe 72 6e 67 a1 | 96 94 e2 5d 70 64 80 e3 dc 1a 37 fd 9b e4 85 ab | 94 44 5e 2f e2 eb 91 bf ec 37 e1 84 2a 65 44 ca | 1a 08 22 fa 52 cb 8e 26 f3 0a e0 f3 e8 ed d0 ab | dc 5c 23 93 37 b0 3f ec 3e d7 3b 37 ac 5f 12 98 | 95 79 c8 ae bc 21 83 a1 90 e1 8c a5 2a 7f b7 ff | e0 96 4f 2b 8d 89 b3 7b 60 e0 d7 14 33 e7 9c 37 | 29 00 00 24 0e 70 86 57 dd 9d d2 8d 77 a4 03 8e | d4 ef 6c f9 5f 5e da 54 db 62 42 7e 49 f6 2b 1b | b6 ad f3 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 b0 5c 2e fc f8 56 4b e1 e9 3b 08 | c9 71 30 03 41 fd 60 2e 00 00 00 1c 00 00 40 05 | f0 af c3 ce dd eb 90 e8 cb ac 91 a5 38 a0 f8 72 | 06 9d 9d 60 | libevent_free: release ptr-libevent@0x7fb3480180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d590 | #92 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 61 83 69 17 8d a7 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #92 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #92 | rejected packet: | 07 61 83 69 17 8d a7 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #92: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-103" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-103' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #103 at 0x557d46a61110 | State DB: adding IKEv2 state #103 in UNDEFINED | pstats #103 ikev2.ike started | Message ID: init #103: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #103: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #103; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-103" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-103" IKE SA #103 "road-eastnet-nonat-103" "road-eastnet-nonat-103" #103: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-103 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-103": constructed local IKE proposals for road-eastnet-nonat-103 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 103 for state #103 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4d590 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #103 | libevent_malloc: new ptr-libevent@0x7fb3480180b0 size 128 | crypto helper 0 resuming | crypto helper 0 starting work-order 103 for state #103 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 103 | #103 spent 0.157 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-103" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.258 milliseconds in whack | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 103 time elapsed 0.000637 seconds | (#103) spent 0.643 milliseconds in crypto helper computing work-order 103: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 103 for state #103 to event queue | scheduling resume sending helper answer for #103 | libevent_malloc: new ptr-libevent@0x7fb3840223a0 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #103 | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 103 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #103 | **emit ISAKMP Message: | initiator cookie: | 20 80 ad df 5a 9a 13 26 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-103 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3d a9 30 94 a8 d4 ad b7 ab 41 10 cf dd 34 d7 45 | ikev2 g^x db 9e 99 58 0d 72 d8 74 bd 3c 1d 4a 98 9b ff 38 | ikev2 g^x 08 61 4e c7 a6 75 c7 cd ff 21 41 e1 5d c2 9d c6 | ikev2 g^x 7c 47 d1 97 8a 16 0e 0e 3c 96 7a d8 10 82 5b 8a | ikev2 g^x 00 b3 29 44 ad 13 12 a6 fb af 01 2d 66 5c e1 02 | ikev2 g^x 4b 01 af e5 ba 61 e3 fe 71 46 2a af 0d 0d 2a 26 | ikev2 g^x f8 12 e9 10 f0 8f ca f1 fd 82 c7 ea fa 46 02 26 | ikev2 g^x b6 95 72 2c b1 d7 c7 46 5a e6 4a 07 87 39 fe e7 | ikev2 g^x c6 a1 7d 2d 52 a4 c7 a2 b5 e7 2f 2b 1d 48 eb d9 | ikev2 g^x 7c e8 c4 cb da 19 e0 04 20 53 7b 3c 73 86 a7 70 | ikev2 g^x c7 09 d6 f9 52 be 12 99 31 58 c4 f8 6c 8b 22 3a | ikev2 g^x c5 da 0c e1 bd 65 73 c3 27 14 e7 0f ae a0 e8 45 | ikev2 g^x 58 e0 c3 02 1b 48 ee 20 03 b9 0c ec ad e0 21 05 | ikev2 g^x 1b 38 52 4b dd 92 f0 58 d2 29 eb 4e be 57 49 4d | ikev2 g^x 5d 0f a4 01 4b 76 95 2b 60 de d3 82 01 e6 15 d8 | ikev2 g^x 32 f5 60 60 88 d1 83 bc a6 c2 db 62 29 b3 d7 5e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce fb ef 9e 44 e4 82 6e 41 3f 46 3a c8 d1 69 b9 34 | IKEv2 nonce c6 14 27 a3 23 52 4c 58 0c 66 b4 10 6a d0 69 ee | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 20 80 ad df 5a 9a 13 26 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 67 | natd_hash: port= 01 f4 | natd_hash: hash= c5 a3 d6 8d 6e 26 8b a3 26 28 d5 ff 4a 28 a8 bb | natd_hash: hash= 6f af 66 22 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c5 a3 d6 8d 6e 26 8b a3 26 28 d5 ff 4a 28 a8 bb | Notify data 6f af 66 22 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 20 80 ad df 5a 9a 13 26 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e5 6e de 91 25 32 b5 3b 38 9d 70 ef 64 14 11 f9 | natd_hash: hash= c0 c1 79 e6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e5 6e de 91 25 32 b5 3b 38 9d 70 ef 64 14 11 f9 | Notify data c0 c1 79 e6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #103 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #103: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #103 to 4294967295 after switching state | Message ID: IKE #103 skipping update_recv as MD is fake | Message ID: sent #103 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-103" #103: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.103:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #103) | 20 80 ad df 5a 9a 13 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d a9 30 94 a8 d4 ad b7 ab 41 10 cf dd 34 d7 45 | db 9e 99 58 0d 72 d8 74 bd 3c 1d 4a 98 9b ff 38 | 08 61 4e c7 a6 75 c7 cd ff 21 41 e1 5d c2 9d c6 | 7c 47 d1 97 8a 16 0e 0e 3c 96 7a d8 10 82 5b 8a | 00 b3 29 44 ad 13 12 a6 fb af 01 2d 66 5c e1 02 | 4b 01 af e5 ba 61 e3 fe 71 46 2a af 0d 0d 2a 26 | f8 12 e9 10 f0 8f ca f1 fd 82 c7 ea fa 46 02 26 | b6 95 72 2c b1 d7 c7 46 5a e6 4a 07 87 39 fe e7 | c6 a1 7d 2d 52 a4 c7 a2 b5 e7 2f 2b 1d 48 eb d9 | 7c e8 c4 cb da 19 e0 04 20 53 7b 3c 73 86 a7 70 | c7 09 d6 f9 52 be 12 99 31 58 c4 f8 6c 8b 22 3a | c5 da 0c e1 bd 65 73 c3 27 14 e7 0f ae a0 e8 45 | 58 e0 c3 02 1b 48 ee 20 03 b9 0c ec ad e0 21 05 | 1b 38 52 4b dd 92 f0 58 d2 29 eb 4e be 57 49 4d | 5d 0f a4 01 4b 76 95 2b 60 de d3 82 01 e6 15 d8 | 32 f5 60 60 88 d1 83 bc a6 c2 db 62 29 b3 d7 5e | 29 00 00 24 fb ef 9e 44 e4 82 6e 41 3f 46 3a c8 | d1 69 b9 34 c6 14 27 a3 23 52 4c 58 0c 66 b4 10 | 6a d0 69 ee 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 a3 d6 8d 6e 26 8b a3 26 28 d5 ff | 4a 28 a8 bb 6f af 66 22 00 00 00 1c 00 00 40 05 | e5 6e de 91 25 32 b5 3b 38 9d 70 ef 64 14 11 f9 | c0 c1 79 e6 | state #103 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3480180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4d590 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d590 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #103 | libevent_malloc: new ptr-libevent@0x7fb3480180b0 size 128 | #103 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49608.927845 | resume sending helper answer for #103 suppresed complete_v2_state_transition() and stole MD | #103 spent 0.477 milliseconds in resume sending helper answer | stop processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3840223a0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 80 ad df 5a 9a 13 26 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #103 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #103 | rejected packet: | 20 80 ad df 5a 9a 13 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #103: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1af10 | handling event EVENT_RETRANSMIT for parent state #51 | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #51 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #51 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49608.934062; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005455 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a25d10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #51 | libevent_malloc: new ptr-libevent@0x7fb3840223a0 size 128 "road-eastnet-nonat-51" #51: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #51) | 4e ec 23 15 b1 7b 72 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb ca ad 90 d3 c3 42 ab 02 0a 3a 99 99 08 46 41 | e3 20 e2 b5 e7 92 8d 56 c0 f6 81 f6 d7 1f 61 ae | fb 7c 4e 49 1a 90 7d af 41 51 b1 4f a9 1c af 26 | 43 e3 44 1a 2b 54 c2 29 d3 73 8c a6 e2 ba 3d 02 | 79 ed 80 dd 4b 1e 56 a7 0d 93 2b 80 2d fa ef a7 | a5 07 28 e5 1d 36 9e 70 e3 83 04 4a 00 cd 83 0a | dd f1 6f 7b 41 89 16 39 86 45 b3 89 6b 38 63 99 | 64 d2 3b 37 57 db 5b aa 3c 09 dd b1 e9 2a 36 7d | 07 9a 1b 84 49 cb 9b 53 1f e3 16 45 5a 7e 7d 6a | b6 b2 5f ad 65 38 70 73 69 63 43 b9 48 24 d6 aa | 84 39 4e 67 2a d2 39 99 70 07 69 a7 7e 3b f3 d0 | 5d 4d 0d 43 76 2c 16 f2 ef 43 c1 03 3c a0 15 fa | 7b dd 0d 24 8d 60 85 f6 a5 c6 c1 eb e0 9b 23 f3 | 77 0d cd ab 79 52 59 61 60 d0 e6 6a b2 5f 84 3c | bc fe a3 56 10 78 f4 57 b0 c9 73 a2 9c 16 ae e5 | 21 a9 af 1c 86 05 49 d7 79 de ea 6f 42 c1 58 6c | 29 00 00 24 8a 81 ff 83 11 9d 7f 95 f4 0f 60 37 | ee c1 de 9d 9d 4a 24 6c a2 0d 2e aa 53 c1 6d 4e | 8c ed 61 8e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 84 7c cd 2e 5d e1 e4 b9 3d 91 59 | 8e 0e df bf 1a 34 00 37 00 00 00 1c 00 00 40 05 | 4f e7 ab 4c a7 2a fc d1 46 25 a0 98 d8 53 89 a8 | 24 a4 22 8e | libevent_free: release ptr-libevent@0x7fb3600180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1af10 | #51 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e ec 23 15 b1 7b 72 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #51 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #51 | rejected packet: | 4e ec 23 15 b1 7b 72 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #51: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28af0 | handling event EVENT_RETRANSMIT for parent state #97 | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #97 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #97 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49608.940408; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500183 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1af10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #97 | libevent_malloc: new ptr-libevent@0x7fb3600180b0 size 128 "road-eastnet-nonat-97" #97: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #97) | 7c 9c 8d d2 c5 3c 3b 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 98 e5 dd bd 5b c0 22 fb 24 a8 9d 4b ca 6c 72 | 78 61 7f 8f 02 15 b8 56 b3 c2 d4 89 90 42 e9 ae | b3 56 28 83 de be c5 dc f3 99 87 bf 7c 20 cf 1e | 80 26 a3 f6 7f d4 66 5c a2 37 d4 2d 88 37 5b ee | 37 eb f6 f3 73 47 4e f2 3e 1b de e1 36 54 bd 6f | 97 78 ce cb 16 0a da 34 fa 11 bc e7 e5 27 11 6b | 72 0d 9c de de 06 66 d8 74 64 a9 64 0b 12 b1 e7 | 15 84 3a 8c d9 6a d5 46 6c 00 4b f9 69 74 47 d1 | f3 79 bc d4 c9 0f 58 86 00 a5 0b 46 4c d7 20 78 | 99 ce 0d 0d cd 99 98 27 cc ce 50 e5 63 fc 25 ec | 4a 78 c1 76 a6 35 df cd 30 8a 57 10 1a b9 c6 85 | f5 05 46 77 76 2a ba 40 b5 da 98 c0 91 e5 03 c9 | 47 7d 79 56 d6 82 48 c6 a2 b4 f6 fc f6 16 30 98 | d9 b0 79 c5 33 a4 80 eb bb 99 51 9a 3b 3b ae a3 | 9b a3 5f 5f ce 23 78 fd 36 29 21 9b 24 8f 30 93 | 1f 0b 71 91 41 28 b6 d5 e2 dd ce 67 83 67 83 41 | 29 00 00 24 4a 40 88 f3 3a ca ff 58 9b 48 04 9a | a8 d0 f5 15 e8 12 b6 3b 4a 95 b2 73 79 da d4 a0 | df 94 6f b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 5b 76 c7 df cc 29 e7 8f 6d d6 7a | e3 d4 c1 e2 a2 33 fe 59 00 00 00 1c 00 00 40 05 | 63 90 91 6f c8 44 50 2a ff 12 5c 17 cd fa e6 2d | 07 cd 17 d6 | libevent_free: release ptr-libevent@0x7fb384015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28af0 | #97 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 9c 8d d2 c5 3c 3b 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #97 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #97 | rejected packet: | 7c 9c 8d d2 c5 3c 3b 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #97: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e05a0 | handling event EVENT_RETRANSMIT for parent state #5 | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #5 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #5 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49608.947758; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.017387 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b5d0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #5 | libevent_malloc: new ptr-libevent@0x7fb384015370 size 128 "road-eastnet-nonat-5" #5: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #5) | 83 a8 82 4c 6a b9 9b 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 f2 6a ba 4d 4c f4 ca d6 76 c6 37 a4 fc c6 08 | 03 3e 5e e8 b3 56 67 2c ed e0 33 33 68 d8 a5 17 | c5 ad 89 58 8b 66 c2 c6 28 95 15 86 95 42 17 c5 | 43 6b d6 1b 90 e3 ce 5a 73 0f aa 25 80 ef 21 ed | 95 16 dc 62 db 9c 9c f1 05 8d 7b ad 88 fd 8e 82 | 62 66 a4 5c 00 db 53 d1 2c ac b4 13 62 a5 17 eb | 3f 3a 4e bc 42 77 a1 e8 e1 8a 0f 63 81 66 10 64 | 10 0d 86 9e 89 34 85 5c 5f 55 4a cb 5a 29 86 16 | 42 90 ac 93 0b a7 fb e8 a5 4a 23 43 d7 02 e6 fe | c6 7b a9 b3 68 72 59 2e 24 fd 0c 7f 98 b0 6f 9f | bb aa 48 ce f6 ec 36 99 c2 bc 70 c4 81 9e 1c 55 | 65 47 9c 55 e0 d5 f3 7e 77 c4 a5 f3 6e 82 b5 1c | 5c 56 a1 3a b8 57 69 f9 25 e2 ae ed 66 c5 c1 3d | f8 ca 2e 2b 1c 6e 27 f2 e3 ed 73 79 be b7 90 0f | cb 45 38 5f bb 3a e3 c2 44 15 72 9c 24 d0 bd 4e | fa c4 ea 53 31 95 57 c9 dc a4 ff 15 7a 28 e4 1a | 29 00 00 24 13 3d aa 25 dd 95 48 ab fd a8 d2 56 | 6c 28 74 71 5d 45 11 19 10 09 0a f3 46 e9 c4 b3 | 56 85 8c 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bb 69 2e cb ee d3 68 5b 1c f0 7d a0 | 26 ce 80 e4 bd 02 f5 15 00 00 00 1c 00 00 40 05 | 1b de 40 93 48 c5 33 61 5d a6 1a 99 ad 20 57 85 | b1 bf 8b 0c | libevent_free: release ptr-libevent@0x7fb34c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e05a0 | #5 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 a8 82 4c 6a b9 9b 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #5 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #5 | rejected packet: | 83 a8 82 4c 6a b9 9b 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #5: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f7760 | handling event EVENT_RETRANSMIT for parent state #78 | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #78 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #78 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49608.952113; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003209 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b610 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #78 | libevent_malloc: new ptr-libevent@0x7fb34c00cf80 size 128 "road-eastnet-nonat-78" #78: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #78) | a4 c9 07 ac 54 d6 e0 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 5b 1c ec 96 24 e8 86 d8 c5 db 68 a4 e8 84 cc | f4 a2 ed 99 bf 5e 8a c5 ce b3 9d 08 41 58 29 f0 | dd 3a 5a 77 6f 59 d0 63 db 3e 63 03 3b 94 a8 82 | ea c5 b5 55 dc 2c ec 77 5f 63 ff ce 1a d3 98 5f | ea ba 50 e4 20 9b 1b 0b de 70 1d 72 5e 41 20 22 | dd 96 8b a8 2c 90 f1 b3 79 70 7b 0b d2 f5 29 64 | 24 96 41 c0 b2 23 eb 70 92 6c 66 1d 59 a6 82 09 | 57 e0 df 9e 1d 1d 55 b5 06 9b 7f 66 07 cc cc ff | f3 52 44 fb 3d f1 4f 79 5c 0c 51 85 cc cb 4f 32 | 4d 99 ed e1 7c 32 81 a7 49 c4 5e 9c f7 c7 98 e6 | 2c 03 b7 c8 ab bf 01 d1 70 a5 d7 0f 97 f6 d8 06 | e8 43 56 25 d8 da 9c 66 8b 84 9d ed 34 99 f3 6a | ab 13 48 0a 68 c6 9c 38 c0 da 1e ec 9d bd 23 04 | 56 2e b0 d9 0e 5f 21 85 8d b7 b7 e4 3f 8c e4 76 | 68 1b d3 cc a6 1f 24 7c 46 61 29 b6 47 f3 ad 62 | ed ad e7 10 a5 af 19 f0 76 6b ea 90 57 9b 3b 13 | 29 00 00 24 e3 1c 8b 3a ff 4e 05 3e c1 af db 58 | 7b 8f 74 6d 20 c2 73 1e 04 d3 ec 5f 05 cc 9d e9 | 4b 1e 83 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f c3 34 65 1f ff 78 b6 0e ee cd 35 | 94 8b f4 3a 81 46 94 12 00 00 00 1c 00 00 40 05 | f3 90 ab 75 b4 45 e0 98 82 06 c5 91 b7 b5 12 83 | 38 ae 55 ca | libevent_free: release ptr-libevent@0x7fb34c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f7760 | #78 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 c9 07 ac 54 d6 e0 33 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #78 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #78 | rejected packet: | a4 c9 07 ac 54 d6 e0 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #78: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #52 | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #52 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #52 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49609.004451; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005306 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b650 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #52 | libevent_malloc: new ptr-libevent@0x7fb34c0180b0 size 128 "road-eastnet-nonat-52" #52: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #52) | 3f 70 d8 3e f5 22 c6 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 a5 a2 fa 37 05 a0 83 be fb 7c 66 e8 09 2d 85 | 01 d0 84 ba 7e 80 ad 7e ed 7e 94 4b 5a d1 13 c1 | b1 3f 59 cf ac e4 bd 6c 95 59 bf de 9d 80 55 dd | 6c d4 7d e3 9f 38 7c 31 e7 3a f4 3d 5f ba 5a 68 | 83 7f 56 b6 a6 97 f9 9a 87 45 7b ad 59 c8 c8 c2 | 85 24 f6 8d 4c 54 59 44 37 96 77 29 ac 68 3f 6e | df da 66 fc fd e2 52 7f c0 d8 5a 6e 87 c7 d0 ea | dd 74 ac b4 2a 5c 26 2d 8f 9d 33 80 5d 13 86 23 | e5 74 ae 2d f0 58 19 74 bb 0c 9a fe 02 e9 ea 18 | 9b e9 68 5d 7c 72 e9 79 59 15 c2 74 d4 16 6f 97 | c0 92 81 74 a6 70 c8 c9 0a 8b 1e 5b 97 dd a0 5d | 10 4a 89 98 ee 3e 73 f8 ad 8e 0b 84 2b bb 87 07 | d3 19 10 ac f4 31 29 ae a0 fb 57 db 57 8e e8 3d | 7b 1c bf f9 0f c4 88 43 de 6a ac 3c e2 0b 51 3c | 47 b2 1e 04 99 56 29 39 94 ab 53 44 ad 54 e0 54 | 9d 52 e0 9a 6d 24 de d9 e3 52 91 a1 b5 19 19 fc | 29 00 00 24 bc 06 52 3b 0a a9 d6 55 15 a3 be 4e | de 77 6e 83 33 60 ab 6d e9 76 1e 6c cb ab 4d 19 | f5 ca 65 a4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 c4 b5 bf ec 75 31 9e 5d c6 9c 0c | 53 7b fb 92 b5 6c 20 70 00 00 00 1c 00 00 40 05 | 2a 93 28 00 9d ed cf 28 c2 1f ba 32 c1 4a e1 a2 | d1 c6 7c 44 | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #52 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f 70 d8 3e f5 22 c6 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #52 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #52 | rejected packet: | 3f 70 d8 3e f5 22 c6 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #52: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-104" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-104' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #104 at 0x557d46a626d0 | State DB: adding IKEv2 state #104 in UNDEFINED | pstats #104 ikev2.ike started | Message ID: init #104: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #104: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #104; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-104" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-104" IKE SA #104 "road-eastnet-nonat-104" "road-eastnet-nonat-104" #104: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-104 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-104": constructed local IKE proposals for road-eastnet-nonat-104 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 104 for state #104 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb340005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #104 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 | #104 spent 0.144 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-104" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.221 milliseconds in whack | crypto helper 9 resuming | crypto helper 9 starting work-order 104 for state #104 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 104 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 104 time elapsed 0.000992 seconds | (#104) spent 0.992 milliseconds in crypto helper computing work-order 104: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 104 for state #104 to event queue | scheduling resume sending helper answer for #104 | libevent_malloc: new ptr-libevent@0x7fb3780251c0 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #104 | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 104 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #104 | **emit ISAKMP Message: | initiator cookie: | c8 97 67 f1 1b 46 da 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-104 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 93 e4 3d 30 95 de e5 8c 73 da 01 a0 e2 a0 c0 5e | ikev2 g^x ab 07 43 87 84 24 88 49 ca d1 13 72 cc 7b 38 93 | ikev2 g^x 5a ab ff 3c 3d d2 b7 a9 16 19 a5 56 5c 01 9f 05 | ikev2 g^x 2f 70 be 2d 9d 04 2c f7 80 b3 5f 24 70 c4 0d 58 | ikev2 g^x b9 f4 31 d3 bd 25 62 64 07 37 4c 59 6f a0 74 90 | ikev2 g^x e2 15 77 64 4c 06 2d 41 bc 70 c3 30 0a 01 9b df | ikev2 g^x a0 88 42 69 26 57 a1 25 9a c0 ee 4c ee 57 50 5f | ikev2 g^x 0c 95 2a a5 72 cb d8 81 34 25 75 ee 4d 04 23 27 | ikev2 g^x e9 da 7c 36 60 32 11 97 39 d8 f4 3f 96 13 6c 72 | ikev2 g^x 19 1d 43 e4 f0 4a 92 88 29 4c 84 63 63 7d 3a aa | ikev2 g^x 3f 23 85 5a 73 71 01 2f 63 e6 b3 a0 2d 7f 75 e1 | ikev2 g^x e9 d4 1c 1a 83 67 2e 29 49 85 8a a1 31 04 a5 31 | ikev2 g^x 1b e6 35 a4 14 80 ac 17 6c 11 db 3d c3 88 57 d2 | ikev2 g^x 55 c5 b6 4e 2c 2b 58 d9 50 1f f2 54 b6 50 63 00 | ikev2 g^x d4 ad 6c 3c 60 cd 52 3b 9b 0f 69 cc f2 8f 29 dc | ikev2 g^x 29 5e 75 22 60 a0 c9 59 5b 00 1a 98 02 fb 23 0f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 16 fd b9 d2 33 64 36 d1 f0 bb fa 0d d8 4a 7e 7c | IKEv2 nonce 2a 2e d1 92 40 9f bf f6 34 ac 7a 15 2b 49 c7 18 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c8 97 67 f1 1b 46 da 5c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 68 | natd_hash: port= 01 f4 | natd_hash: hash= 9d 28 db 0c 20 22 dd ba ac 9b fa 10 b6 bd 27 81 | natd_hash: hash= bf 6a a0 a8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9d 28 db 0c 20 22 dd ba ac 9b fa 10 b6 bd 27 81 | Notify data bf 6a a0 a8 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c8 97 67 f1 1b 46 da 5c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 90 9a 71 02 e5 61 58 ec fb 0f 5f 95 cd f2 2e 99 | natd_hash: hash= e5 4b 54 60 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 90 9a 71 02 e5 61 58 ec fb 0f 5f 95 cd f2 2e 99 | Notify data e5 4b 54 60 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #104 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #104: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #104 to 4294967295 after switching state | Message ID: IKE #104 skipping update_recv as MD is fake | Message ID: sent #104 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-104" #104: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.104:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #104) | c8 97 67 f1 1b 46 da 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 e4 3d 30 95 de e5 8c 73 da 01 a0 e2 a0 c0 5e | ab 07 43 87 84 24 88 49 ca d1 13 72 cc 7b 38 93 | 5a ab ff 3c 3d d2 b7 a9 16 19 a5 56 5c 01 9f 05 | 2f 70 be 2d 9d 04 2c f7 80 b3 5f 24 70 c4 0d 58 | b9 f4 31 d3 bd 25 62 64 07 37 4c 59 6f a0 74 90 | e2 15 77 64 4c 06 2d 41 bc 70 c3 30 0a 01 9b df | a0 88 42 69 26 57 a1 25 9a c0 ee 4c ee 57 50 5f | 0c 95 2a a5 72 cb d8 81 34 25 75 ee 4d 04 23 27 | e9 da 7c 36 60 32 11 97 39 d8 f4 3f 96 13 6c 72 | 19 1d 43 e4 f0 4a 92 88 29 4c 84 63 63 7d 3a aa | 3f 23 85 5a 73 71 01 2f 63 e6 b3 a0 2d 7f 75 e1 | e9 d4 1c 1a 83 67 2e 29 49 85 8a a1 31 04 a5 31 | 1b e6 35 a4 14 80 ac 17 6c 11 db 3d c3 88 57 d2 | 55 c5 b6 4e 2c 2b 58 d9 50 1f f2 54 b6 50 63 00 | d4 ad 6c 3c 60 cd 52 3b 9b 0f 69 cc f2 8f 29 dc | 29 5e 75 22 60 a0 c9 59 5b 00 1a 98 02 fb 23 0f | 29 00 00 24 16 fd b9 d2 33 64 36 d1 f0 bb fa 0d | d8 4a 7e 7c 2a 2e d1 92 40 9f bf f6 34 ac 7a 15 | 2b 49 c7 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 28 db 0c 20 22 dd ba ac 9b fa 10 | b6 bd 27 81 bf 6a a0 a8 00 00 00 1c 00 00 40 05 | 90 9a 71 02 e5 61 58 ec fb 0f 5f 95 cd f2 2e 99 | e5 4b 54 60 | state #104 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb340005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #104 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 | #104 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49609.010235 | resume sending helper answer for #104 suppresed complete_v2_state_transition() and stole MD | #104 spent 0.47 milliseconds in resume sending helper answer | stop processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3780251c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 97 67 f1 1b 46 da 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #104 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #104 | rejected packet: | c8 97 67 f1 1b 46 da 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #104: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ec960 | handling event EVENT_RETRANSMIT for parent state #79 | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #79 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #79 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49609.016434; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002956 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f7760 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #79 | libevent_malloc: new ptr-libevent@0x7fb3780251c0 size 128 "road-eastnet-nonat-79" #79: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #79) | cb 0e 87 22 6d 04 19 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 8d fa 75 ee f5 0c 34 b3 09 04 c3 a6 70 35 18 | 8c e8 6b 6c 5c 5b 2d 90 26 5a 5e f9 d4 07 05 c2 | f5 73 64 12 f5 c2 51 38 6d 89 1a 0c 01 ef 01 94 | 08 08 2e cb 41 34 b4 4a 2f f7 ed 3c c1 7e 04 ba | 4c cb 90 52 00 84 c7 1d 71 85 6e 14 f7 d6 ba c6 | 6a 98 c9 b3 82 dd 58 3d c8 6f 45 92 9b e7 64 4a | 6e c9 47 ec bd a8 a4 79 ac 0e 9c ec e9 38 db 99 | d6 25 d7 25 8b 64 97 e5 d5 6a 07 ae 6b 9a 25 6c | ea 70 9f 4a 9e ba a1 e7 d8 d9 69 c1 2c a9 28 e5 | 2c 51 5f 2a f8 17 0e 3b 43 9f 77 5e 3a 59 4f 18 | 6f 20 ad 6e aa 63 b5 82 47 75 97 d0 4a 75 bf 68 | 0b ac a2 f9 6c 9d b8 21 cd c5 79 8b 66 f4 0e 4b | 32 8b f9 5e de 93 2f 2f 11 cf e9 f6 3a 2b 4b 7a | bd 3c a3 27 78 6d f5 6c 33 13 d9 14 f8 0e 44 d7 | 3e 91 89 43 f4 2f 9b b6 ab 6d 76 71 13 52 45 fd | 0e 5e 7c 72 38 35 d5 eb 86 2e 14 37 c5 c9 56 83 | 29 00 00 24 5a 77 8f b1 9a 0e 27 f5 13 b5 b3 3b | 54 a7 64 e6 f0 cd 7e 6d c0 5a 2d 35 86 f1 cb 9d | 32 23 be bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 31 42 b5 5a b6 78 6b 4f 08 f8 04 | 13 cc 8c 45 a7 cd ab bc 00 00 00 1c 00 00 40 05 | 2d 9f b7 7e f4 d4 af ae b0 e9 56 0d ae 10 83 85 | d2 ea 45 54 | libevent_free: release ptr-libevent@0x7fb35c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ec960 | #79 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cb 0e 87 22 6d 04 19 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #79 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #79 | rejected packet: | cb 0e 87 22 6d 04 19 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #79: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46910 | handling event EVENT_RETRANSMIT for parent state #93 | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #93 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #93 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49609.019761; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003404 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e05a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #93 | libevent_malloc: new ptr-libevent@0x7fb35c01d920 size 128 "road-eastnet-nonat-93" #93: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #93) | 8f 2b 82 41 be 50 7f e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cd 43 20 82 ea 0d 92 4d b7 6f 10 e5 73 62 a1 74 | 5f 8b b1 bd e8 48 72 86 0f fc f7 f4 6d aa 74 9c | c6 32 cc 9c 2e 89 27 81 1a 44 1a e2 a0 dc ee ce | 11 9a 86 db b2 0d 84 8c a7 35 4b a3 54 44 ff a5 | 46 90 60 08 6b 0b b2 6e 30 fe 4a 71 80 d7 a0 82 | 42 f8 84 b3 d1 ca 25 4a c6 d4 78 a8 df 7e e5 c9 | 03 e0 84 12 8e f0 91 14 81 e1 1e 7d 14 d0 21 c6 | 0b a7 bd a5 91 4d 74 5f a5 49 fb 47 92 a4 f6 f2 | 46 b5 1e 26 6d f1 8f 2b 0f f1 aa b1 98 3a 25 3a | b5 d3 2a 4c bc bb 1d f8 fd dc 58 f3 d0 d8 1b 32 | 38 77 9b c8 3c 93 48 af 2e 17 ec f8 87 96 76 0f | 85 58 80 2d fe e0 ad 94 9a 85 9c 5e 26 2b ed 2c | f6 a6 2f 18 05 50 d7 9c 67 0d fc 1d 16 0d 73 cf | e1 da cd 32 28 a8 c7 82 3a 82 36 71 d2 89 fb 29 | 72 68 23 fe 3a 1e 23 55 bf ae 58 43 08 3b 0f b5 | 11 45 c9 10 6a 4c 49 3d 66 da 53 be f8 72 a4 ba | 29 00 00 24 38 5c 7f a9 1f f6 b2 d3 ed 46 5d a7 | 91 ec df cb c1 74 f9 14 df e8 fc 11 90 67 a3 a7 | 1e 7f 11 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c cc 1f b2 cd 2b 6c 7e 5b 50 dd 93 | 55 b1 e2 f6 27 0b bd 36 00 00 00 1c 00 00 40 05 | b6 37 a4 32 e9 5e 9f 19 d6 7a 97 0a 5b 76 69 49 | 01 0d 5c 45 | libevent_free: release ptr-libevent@0x7fb364012740 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46910 | #93 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 2b 82 41 be 50 7f e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #93 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #93 | rejected packet: | 8f 2b 82 41 be 50 7f e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #93: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35800d120 | handling event EVENT_RETRANSMIT for parent state #6 | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #6 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #6 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49609.023098; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.012131 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46910 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #6 | libevent_malloc: new ptr-libevent@0x7fb364012740 size 128 "road-eastnet-nonat-6" #6: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #6) | 2c 27 82 3a c6 31 e5 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f e3 1c 46 2f 61 c1 a4 57 04 b2 32 f2 da 47 30 | c5 f1 b2 8c 52 8c bd 20 1e 07 9a 1f 74 e3 50 fd | 03 ad cd d6 6e b2 e0 ed 18 de c6 cf db 53 d8 91 | 57 59 05 93 13 39 ca c4 cd bf 1d c1 99 f1 ea ab | d7 0d 4d 84 1a b9 23 c8 19 a7 00 fc 45 cd 28 de | 1b 23 11 46 b2 a5 20 88 7d a8 2e 93 69 c4 77 be | 7d 08 db 5c 91 33 d0 aa e2 d7 27 ba c6 03 59 3c | 8a b9 c7 4b aa b0 c2 31 f9 3d af 03 a0 d0 38 f5 | 81 cf 2e 3b 37 ea b5 50 38 0b b5 3b be c1 ac 52 | d4 bd 41 74 e3 b0 cc da 00 70 a4 c8 a9 ae 2b 0c | 84 70 b9 c2 c8 dd e4 ca c8 d6 7a 14 75 f2 9f ca | f3 8a 9e fb 56 2f 7b 5f 34 ab 29 a4 eb 5d 7a 01 | af 1d 55 9d 0e 4d 00 2f f9 2a c8 90 cf 50 fe a3 | 20 3f bc dc b3 d6 01 f7 dd dc c1 b1 72 f5 58 73 | b8 72 e4 a9 88 17 39 c5 a4 43 c8 df b5 2f 8d cd | 75 f3 2c cf e2 85 8e ce 7f c9 07 83 41 8f 33 7b | 29 00 00 24 aa 55 22 5c 95 3a 98 8a 23 4e 55 f5 | f2 5b 2d e6 0f d6 a3 fc b7 39 7f a3 84 04 6c 99 | b3 1f 01 c8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd d8 7d b0 3b ed a4 77 8e 72 bc 87 | 11 c3 4a b5 09 51 99 2e 00 00 00 1c 00 00 40 05 | 3b ee 43 00 bb c4 11 7e a6 6d 91 83 5e ff b0 fd | ab 20 73 91 | libevent_free: release ptr-libevent@0x7fb358012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800d120 | #6 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c 27 82 3a c6 31 e5 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #6 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #6 | rejected packet: | 2c 27 82 3a c6 31 e5 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #6: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46950 | handling event EVENT_RETRANSMIT for parent state #98 | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #98 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #98 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49609.024403; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500286 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #98 | libevent_malloc: new ptr-libevent@0x7fb358012840 size 128 "road-eastnet-nonat-98" #98: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #98) | 36 f6 17 30 89 34 87 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e de 22 15 b8 37 99 8a 19 60 74 d9 cc fb 93 74 | 46 52 5b 4c b2 15 42 20 b8 92 87 ba 2d f3 d7 43 | b5 37 b0 ea 4d f5 7a 45 62 c7 3f 47 fb 44 64 d3 | e1 f9 e0 4b e7 fb 3e 3d b1 04 53 7b 67 35 99 55 | 77 f9 c2 de 1c 5e 4e 46 02 3b e5 0c e9 31 90 64 | 6e cb e0 dd 1a 59 99 ef 3d a7 c1 9b 74 f9 45 3f | 99 cd de c7 d0 13 5f 2b 11 ac cd ff c9 47 2e 86 | 69 0d e8 ec 31 64 37 7f 01 74 30 f7 db 0e d0 fb | 8b 6d 9d cc 98 7f 1a b4 87 7d bf 2e 19 53 89 24 | 00 4f 0a 93 5d 06 c9 01 d3 dd 9f 4d 48 ee ba 48 | 79 5c 5f f3 cb 01 ba a7 ec 71 ed fd 64 af 41 a6 | ff 80 dd aa 0c ae 06 5c 0b a3 1c 56 84 5b 6c 26 | fd ff b3 07 94 15 1d 68 35 03 8e 60 07 84 12 f9 | ee d9 d1 91 a2 f4 75 f6 9e 29 11 0a 54 bc 2f 41 | 2c ea 22 ab ab 32 6a 0c 62 23 b1 4a 4b 29 bb 22 | de a9 03 f4 17 e0 39 72 79 31 e0 0a 30 fa 14 a0 | 29 00 00 24 dc e2 b9 cb c5 4c 15 ab 06 6c 97 a6 | 72 6b 55 8f 7d 14 aa 13 19 ae 9e 9d 27 a3 3a 17 | 86 0f 7c a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 94 a8 82 2a 1f 7d 1b 29 07 9f 80 | 75 97 d7 a2 ab 24 e8 8d 00 00 00 1c 00 00 40 05 | b8 4f 85 79 77 db f6 74 dd c9 e6 fd e8 91 c3 41 | 66 c0 f7 3b | libevent_free: release ptr-libevent@0x7fb3580180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46950 | #98 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 f6 17 30 89 34 87 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #98 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #98 | rejected packet: | 36 f6 17 30 89 34 87 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #98: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4ebd0 | handling event EVENT_RETRANSMIT for parent state #80 | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #80 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #80 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49609.077704; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.0023 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46950 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #80 | libevent_malloc: new ptr-libevent@0x7fb3580180b0 size 128 "road-eastnet-nonat-80" #80: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #80) | aa bd f3 45 40 fd 66 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a f9 52 fe 2c 07 55 9a 9f 75 be 2d bb 6b aa b0 | 07 01 f4 20 39 c9 c6 12 04 59 16 f7 53 ca 23 cf | b2 a3 d6 d7 cd d3 78 95 1e ae 2c b7 17 84 30 6c | 9a 6e 0d 1b ef 48 24 1d f1 c9 12 65 61 88 44 c9 | 4b 27 23 9a 65 49 0a 11 49 89 68 1f 69 8b cd 8d | e9 1c 22 5e 52 f0 a3 c1 f7 8e 10 9b 8e 27 61 b3 | aa d7 5b 30 40 8f 25 2e 0d 7c bd dc 0e 4d aa 95 | b6 5a 44 77 7b 33 24 ed 5e bf f2 78 c5 d8 1e 5c | 38 0e af a8 70 85 81 7a 43 7a de 45 73 d1 23 0a | 21 50 82 2c fb 48 a9 b6 ed 4a 3a 01 52 3d 91 cf | 62 7a 95 ef ff 5d 9f b3 85 63 dc f5 46 12 fc e4 | ac 22 23 7e 8e 79 eb cb 39 31 bb de 91 1f fd 9c | 95 3c fe ca 99 40 e4 17 71 ad 8e 05 ed f6 14 9e | 6b 26 3c 1c 13 2f 5a 94 9d 9c cd 71 11 6d bb c9 | 9a 84 65 ba e1 3d ae 2e 2c 88 f5 b9 e4 60 97 3a | ad 9a 6f f8 77 43 67 40 a8 7b be e5 9d 13 c4 6d | 29 00 00 24 53 2a 2d 72 a4 0b ac f1 46 3b 88 60 | a1 1f 05 e7 3a 9a 78 ce 7e 03 67 44 f4 b3 91 7b | 4e 29 6b 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 ed 0c 1a de d8 39 29 7d 81 95 16 | 89 64 a4 1b c6 93 47 b1 00 00 00 1c 00 00 40 05 | 41 2d b0 0c 88 62 05 80 34 d7 2b cd 52 bc d2 c8 | ff 29 c4 37 | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | #80 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | aa bd f3 45 40 fd 66 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #80 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #80 | rejected packet: | aa bd f3 45 40 fd 66 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #80: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0669 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ddbf0 | handling event EVENT_RETRANSMIT for parent state #53 | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #53 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #53 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49609.079044; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00398 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #53 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 "road-eastnet-nonat-53" #53: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #53) | 22 bd 87 7d 85 b9 18 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 30 f1 21 57 e7 a6 a0 b1 5a 51 b3 c9 69 4a 15 | 0c ef ee d8 55 97 13 32 e2 cf 8d c8 f3 74 4c 97 | 22 ad ca ab 81 a4 a0 26 9d e6 3b e7 1c 2b d2 a1 | d6 72 47 dd ab 72 ec c1 cc d7 d9 8f d8 66 bc e6 | 53 77 a5 12 d5 84 8f 13 60 d3 99 01 c2 30 50 56 | 18 a7 45 bc dd f7 11 3f 14 e8 e1 27 67 4e d9 50 | bb c0 6c 1a d8 e9 1e 81 c4 fa a9 14 22 9d 32 b4 | e1 11 67 1b f4 56 6f d3 5b 27 83 19 34 08 ee 9b | f3 6b 24 bb c8 a8 09 ee 97 89 49 a0 fb 47 38 93 | ca a8 21 f6 da 4a ff ce b8 5a 83 17 3c fa b5 a4 | 1d 50 f4 b9 26 78 5e a6 78 30 f6 80 a4 cd 3e ae | ea 19 26 25 27 2f a8 b0 bc e9 8e dc 47 51 61 79 | 07 e7 6e 1f 82 d0 fe 19 b0 44 4b f8 92 c9 fb 82 | 83 56 b0 37 a7 92 bf 23 17 cb fb 8b 75 11 c5 e0 | 1d 95 a6 1f 6a 1b 78 a9 5c 16 4e 89 74 ff c7 5a | 43 0f 1f 26 45 20 46 36 e0 37 07 46 11 e2 7c fd | 29 00 00 24 1d d0 6e d2 14 3b 95 3d 7a f3 16 f0 | 13 a4 5c 97 24 08 af 2b 29 b2 1a e1 3b dc 59 4d | 62 47 73 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 de d2 d7 2b e1 3c 0c 4b a2 6a 97 | 5e 9e de 30 79 3d d7 e0 00 00 00 1c 00 00 40 05 | de 44 b7 78 c2 27 43 2d 86 e9 13 34 57 72 8f 74 | 48 51 21 6e | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ddbf0 | #53 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 22 bd 87 7d 85 b9 18 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #53 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #53 | rejected packet: | 22 bd 87 7d 85 b9 18 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #53: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0666 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-105" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-105' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #105 at 0x557d46a63c90 | State DB: adding IKEv2 state #105 in UNDEFINED | pstats #105 ikev2.ike started | Message ID: init #105: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #105: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #105; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-105" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-105" IKE SA #105 "road-eastnet-nonat-105" "road-eastnet-nonat-105" #105: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-105 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-105": constructed local IKE proposals for road-eastnet-nonat-105 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 105 for state #105 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a28af0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #105 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 | #105 spent 0.145 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-105" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.226 milliseconds in whack | crypto helper 10 resuming | crypto helper 10 starting work-order 105 for state #105 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 105 | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 105 time elapsed 0.000897 seconds | (#105) spent 0.904 milliseconds in crypto helper computing work-order 105: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 105 for state #105 to event queue | scheduling resume sending helper answer for #105 | libevent_malloc: new ptr-libevent@0x7fb37c0251c0 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #105 | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 105 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #105 | **emit ISAKMP Message: | initiator cookie: | f1 44 62 e8 b2 96 b0 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-105 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x da 2c 0f 43 7a b6 95 d2 da 02 c7 c3 b7 c1 84 3a | ikev2 g^x 45 85 a1 11 41 47 db 34 2a fb b4 18 d1 bf ea 06 | ikev2 g^x 1a 10 f5 e2 f0 2e 22 4f eb 14 58 fa 5c 28 c5 97 | ikev2 g^x e2 ae 87 b0 f4 b2 19 f2 c0 72 df 2a 2b df 2e 30 | ikev2 g^x f5 e9 e3 d6 5a 85 fc e6 1c 1c 2d 36 25 55 ff d7 | ikev2 g^x e9 f8 4f e9 95 2f bf 23 70 c4 27 2f 59 aa 5a d4 | ikev2 g^x 00 1b f9 ac 9d 1b 73 43 66 d9 a7 24 55 56 33 f4 | ikev2 g^x df 70 86 46 09 22 db 6f ad cb 9a 9a bd 6e 03 ac | ikev2 g^x ab d8 ee 40 d0 e9 4f 4e ad 4c 58 0f 93 e2 e1 c8 | ikev2 g^x a2 ad 19 24 8d ca 10 9a 44 cb e8 b8 40 12 de e1 | ikev2 g^x 29 64 1e 40 f8 bf aa 87 bb 84 b2 5f 6f 0d 9d b9 | ikev2 g^x 12 51 1b 65 f4 ee e0 55 a1 dc 96 99 27 5b 4c a9 | ikev2 g^x 9a e4 cf 90 e8 fa 83 39 ff df 24 19 f2 75 1e b2 | ikev2 g^x 3a c5 5a ee 20 09 c9 38 60 08 ab 53 42 3f a9 0e | ikev2 g^x 51 ea 72 b2 25 2b b8 e3 e2 f5 9e 45 c1 0c 4c 33 | ikev2 g^x 68 83 d9 f1 9b 1b 60 f3 f4 29 c3 90 eb 9c dd 59 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b7 9a f1 29 40 44 aa 07 d6 8e b0 7b 73 1b 3f b3 | IKEv2 nonce 0a e3 ed 21 f1 bb 89 35 39 a9 d4 99 a7 53 6e 65 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f1 44 62 e8 b2 96 b0 c2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 69 | natd_hash: port= 01 f4 | natd_hash: hash= ea 95 3e 47 a9 bf e3 9c 92 80 50 73 b0 a9 03 26 | natd_hash: hash= 40 9a 45 50 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ea 95 3e 47 a9 bf e3 9c 92 80 50 73 b0 a9 03 26 | Notify data 40 9a 45 50 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f1 44 62 e8 b2 96 b0 c2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c6 93 aa 3b 5e af 6b 75 f9 54 eb f4 c6 61 f4 b6 | natd_hash: hash= b4 32 51 f3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c6 93 aa 3b 5e af 6b 75 f9 54 eb f4 c6 61 f4 b6 | Notify data b4 32 51 f3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #105 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #105: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #105 to 4294967295 after switching state | Message ID: IKE #105 skipping update_recv as MD is fake | Message ID: sent #105 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-105" #105: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.105:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #105) | f1 44 62 e8 b2 96 b0 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 2c 0f 43 7a b6 95 d2 da 02 c7 c3 b7 c1 84 3a | 45 85 a1 11 41 47 db 34 2a fb b4 18 d1 bf ea 06 | 1a 10 f5 e2 f0 2e 22 4f eb 14 58 fa 5c 28 c5 97 | e2 ae 87 b0 f4 b2 19 f2 c0 72 df 2a 2b df 2e 30 | f5 e9 e3 d6 5a 85 fc e6 1c 1c 2d 36 25 55 ff d7 | e9 f8 4f e9 95 2f bf 23 70 c4 27 2f 59 aa 5a d4 | 00 1b f9 ac 9d 1b 73 43 66 d9 a7 24 55 56 33 f4 | df 70 86 46 09 22 db 6f ad cb 9a 9a bd 6e 03 ac | ab d8 ee 40 d0 e9 4f 4e ad 4c 58 0f 93 e2 e1 c8 | a2 ad 19 24 8d ca 10 9a 44 cb e8 b8 40 12 de e1 | 29 64 1e 40 f8 bf aa 87 bb 84 b2 5f 6f 0d 9d b9 | 12 51 1b 65 f4 ee e0 55 a1 dc 96 99 27 5b 4c a9 | 9a e4 cf 90 e8 fa 83 39 ff df 24 19 f2 75 1e b2 | 3a c5 5a ee 20 09 c9 38 60 08 ab 53 42 3f a9 0e | 51 ea 72 b2 25 2b b8 e3 e2 f5 9e 45 c1 0c 4c 33 | 68 83 d9 f1 9b 1b 60 f3 f4 29 c3 90 eb 9c dd 59 | 29 00 00 24 b7 9a f1 29 40 44 aa 07 d6 8e b0 7b | 73 1b 3f b3 0a e3 ed 21 f1 bb 89 35 39 a9 d4 99 | a7 53 6e 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 95 3e 47 a9 bf e3 9c 92 80 50 73 | b0 a9 03 26 40 9a 45 50 00 00 00 1c 00 00 40 05 | c6 93 aa 3b 5e af 6b 75 f9 54 eb f4 c6 61 f4 b6 | b4 32 51 f3 | state #105 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a28af0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ddbf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #105 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 | #105 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49609.092375 | resume sending helper answer for #105 suppresed complete_v2_state_transition() and stole MD | #105 spent 0.476 milliseconds in resume sending helper answer | stop processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c0251c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f1 44 62 e8 b2 96 b0 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #105 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #105 | rejected packet: | f1 44 62 e8 b2 96 b0 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #105: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0573 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ffbf0 | handling event EVENT_RETRANSMIT for parent state #94 | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #94 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #94 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49609.11257; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001924 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ec960 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #94 | libevent_malloc: new ptr-libevent@0x7fb37c0251c0 size 128 "road-eastnet-nonat-94" #94: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #94) | c4 af dc f4 22 ca 1a 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b8 0d 8e 0d 24 fa 48 9f 6f 70 45 44 af 29 03 81 | fb 75 7f 29 b1 65 5b 6b f3 dc dc e0 d1 ea 65 d0 | 45 a3 5f 01 d6 e7 51 37 b4 25 82 eb 71 98 d8 b2 | 75 57 7a 0e db af 40 2b 1a 10 c2 e4 b7 7e 18 39 | 54 3c 4a ec 4d d5 3a 2e ab bd e0 80 1e 0f e2 b5 | e4 a9 bf ef 3b ba fe af b1 7b cb 8a 16 e9 8c 65 | 20 92 b8 a2 66 75 85 84 5a e4 4c c5 4e 4c dd 10 | 51 c2 7a 85 78 58 a1 10 d6 cf c5 6b e8 22 f2 d1 | 41 df 6b 5c 73 f6 87 2e 17 45 1b 75 b8 bd 3d 9e | d2 3e d8 cd d1 d8 9e 58 23 f3 68 0b e1 b8 89 69 | 76 b7 7e 92 6a 4a 5b 2c 36 99 61 9d bb 09 19 68 | e0 83 4b 97 a3 48 26 96 74 a7 da 5f 7d b7 55 9e | e3 e8 68 32 6b 6e 35 3d 26 d7 4f 19 6d d6 44 17 | 3d 23 4c ff 1c ff e3 77 85 72 fa 85 64 76 2e ac | 5a 7b 31 bf 7b 44 eb 9a f4 5c 9d 72 ec 95 e5 4e | fc 10 63 57 5f 09 74 f6 c6 17 bc 05 7d ea 5c 13 | 29 00 00 24 c5 77 30 ba 9e 22 45 4a 1a af ea 19 | 02 b6 fb 3a f7 c7 ff 86 e4 75 07 62 09 1a 17 15 | a7 99 2d 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d bd d3 d9 55 1d 16 4d 34 06 fd 91 | 92 b6 52 35 3e d3 c6 4f 00 00 00 1c 00 00 40 05 | 83 77 03 33 97 20 84 34 b1 e3 aa 6c 05 af 74 6e | f0 8d d0 a3 | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ffbf0 | #94 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 af dc f4 22 ca 1a 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #94 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #94 | rejected packet: | c4 af dc f4 22 ca 1a 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #94: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #99 | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #99 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #99 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49609.120908; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501079 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #99 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 "road-eastnet-nonat-99" #99: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #99) | 20 f2 8d 71 65 ac 47 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 55 64 d8 ad 81 88 80 21 0e 25 1a b1 6c d3 13 | 60 47 54 9f 37 b3 3b e4 ef 17 20 61 85 67 62 f1 | 02 df 28 57 14 6d e3 be a6 7d d0 60 0f d8 35 56 | 23 d8 87 e9 4a f8 7b 29 e9 15 5f 82 0d 90 dd 56 | 5d 5a 2c 1a fd 14 77 42 8f 36 df a6 c7 9c d4 1a | 4f 67 c2 2e a6 a1 f6 1c 58 4b f8 cb b3 cd ce 08 | 48 62 dd 58 41 3a 14 29 9a 8c dd db 6a 06 47 a4 | 6c b7 ae b7 e4 5d db e5 9d e5 08 8e 17 5b 65 be | 17 aa 8e 73 be 9c 01 fb 31 11 79 f8 7d b5 ee ca | 7b e0 59 52 95 92 4d d8 40 43 34 f1 14 b9 84 18 | 60 68 b3 da 39 48 0e 5b 21 3c 0f 30 5d 85 b9 b8 | 1e e9 36 ff 36 9e aa 51 52 b1 5e 1d 27 fe 89 5d | cd 1e 0d 8d d6 a1 c3 a1 84 3f ea 32 11 45 0d 67 | 3f e2 4b 56 64 56 35 98 b6 f3 83 f0 90 30 0e 75 | b7 c7 9b 32 1d 5c 5f 2d d9 a9 92 93 d5 c6 6e 2b | ba f3 5c d6 20 4b dd 47 18 da e4 05 c0 7c 3e d8 | 29 00 00 24 0e 55 53 da 51 ef 9c 5f c5 b0 f0 9b | 78 63 11 53 43 43 64 d7 34 99 64 b7 14 ad 81 b4 | bb 55 f4 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 cf c4 07 93 b6 10 89 13 8b 25 5a | 5c dd 08 90 5b 56 28 b0 00 00 00 1c 00 00 40 05 | 9d 1e cf 39 e1 37 a4 6a 40 83 a9 41 54 1a 0d 5f | 91 61 32 ea | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #99 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 f2 8d 71 65 ac 47 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #99 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #99 | rejected packet: | 20 f2 8d 71 65 ac 47 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #99: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37000d120 | handling event EVENT_RETRANSMIT for parent state #7 | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #7 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #7 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49609.122309; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005606 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #7 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 "road-eastnet-nonat-7" #7: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #7) | df 0f 9a c7 72 fc c7 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 16 59 37 af 9b 5a d1 22 e5 b7 89 f5 29 0b b4 | f8 e5 4b 2e 70 7a c8 bc f1 ab 2a 61 eb 02 ca fa | a3 75 2e 7e 2d d5 25 c9 fa fb 53 11 81 f8 e7 7c | 35 1a 09 cf c2 a1 7a e6 ba 83 f5 ea 71 c2 29 ca | 29 da 7e bf 99 10 95 66 d2 23 d8 4f 49 2f bd 63 | 11 b8 e1 71 39 92 a3 a7 60 6b 7a e8 94 6f c6 09 | 3e 44 50 a7 14 dd 81 7d 4c 7f 80 8c 35 65 97 9c | b1 11 76 e7 2a ca 44 b5 84 ae 8b 5a 9b fd ff 0d | 19 d8 e9 75 5a 70 67 71 dc 0e 22 08 1b 97 e2 25 | ad 6c 4c 80 de ff 3e 29 34 2a 32 fa 3b 41 ab 38 | c8 2c a4 db 1f 4a 62 fb 24 ff ed 13 44 3e 4c cb | a1 99 52 bb 30 b7 29 d8 9d 52 b8 4d 90 9d ab aa | c0 57 68 4e 57 cb d7 d7 cc 96 2c bc 75 0c 87 f5 | 9c 71 0b 3a 29 74 b7 e2 7f 5e 8b 9f 17 4e 89 84 | da f8 88 1c 69 02 1c 1f 41 83 de df 0e 7e 58 56 | 61 84 83 da 8c c8 98 f6 a7 9f db ce b7 aa a6 bc | 29 00 00 24 9d 55 08 62 c0 73 1e 47 79 75 2c 10 | 4a ab 88 17 80 18 91 8e 0d 3b 8f 21 a0 4a c9 52 | dc 93 16 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e cd 5f ad 94 80 bb 48 49 e9 a2 c8 | 76 8b 7e e8 6f 59 19 d9 00 00 00 1c 00 00 40 05 | 2f 3e df 6a 16 4a bb 95 81 15 e0 c0 73 52 29 fa | 60 85 d2 fd | libevent_free: release ptr-libevent@0x7fb370012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37000d120 | #7 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 0f 9a c7 72 fc c7 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #7 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #7 | rejected packet: | df 0f 9a c7 72 fc c7 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #7: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338005860 | handling event EVENT_RETRANSMIT for parent state #81 | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #81 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #81 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49609.142606; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003656 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37000d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #81 | libevent_malloc: new ptr-libevent@0x7fb370012840 size 128 "road-eastnet-nonat-81" #81: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #81) | 66 17 84 1d 01 f5 89 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 79 cf 2e c9 58 5a cf 22 0f e4 95 f3 b3 ec e3 | d7 ab 2d 5f 01 54 3c c5 38 6c 9c d3 40 e3 80 92 | e9 89 68 26 a0 e4 bb a0 7a eb 4c f1 e4 9f 20 12 | 58 2a 4c f1 f2 df 9a 6d 19 39 bd 12 58 10 e1 11 | 60 c9 9d ed 18 33 de 94 c1 bb 5d 21 df 07 9b 4e | 1e ae ec 4e 5f 9a 7f b4 b3 f8 3c 10 c2 09 ea 68 | 5d bc a9 fd 8a bb 40 95 8d 3b d1 39 da 16 f8 a8 | 93 df 32 68 37 e0 b9 31 f0 a7 f2 55 d6 2d bc ef | ef 45 3f e8 34 12 fc 98 2a dc 19 03 8b dc 1f 09 | cd 02 40 97 95 a7 39 71 09 ba 54 e3 53 28 2c b9 | 98 bb af 3a 25 6b e9 e7 4c 76 46 d1 aa 9d 3b 59 | 03 52 8a 61 f9 f7 83 33 a1 6c a0 29 48 f7 36 48 | 3a 5a f9 b5 72 5e fe 9f e0 84 df 16 32 28 ce ca | c6 27 c5 b5 d7 f3 93 db 10 54 fb f4 c3 70 76 d4 | 5f 00 b9 4c 0d 91 91 e7 a8 18 4b 2b 7f cf a5 4e | 76 2e 5b 38 e2 0b 32 aa 89 74 93 4b e3 81 6f 21 | 29 00 00 24 78 b9 6f 78 8b 1e bb 84 c4 a1 7c 02 | 08 74 d8 82 11 75 a1 52 cd 59 45 9e 38 4d d2 1d | 56 1f 81 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 31 12 3e 08 55 9e 26 f3 2f be 08 | b5 7f 7c 7d c5 5f 44 c0 00 00 00 1c 00 00 40 05 | 16 fd af 38 8b 2a c1 77 ea 51 ea 68 dc 9b f5 3d | 6a 08 67 b3 | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338005860 | #81 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 17 84 1d 01 f5 89 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #81 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #81 | rejected packet: | 66 17 84 1d 01 f5 89 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #81: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0668 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #54 | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #54 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #54 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49609.158024; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003892 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #54 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-54" #54: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #54) | 4e 45 bc 88 5c 41 98 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 f4 91 14 5c ab 2e e9 80 6d af 62 f3 7d f3 c8 | 41 66 e7 43 38 9a c7 1b 1e f8 8c 7d f7 db 12 65 | 59 fd 3d ea 2d 58 b5 eb bc 29 cf 89 c5 08 e0 32 | af 71 20 82 0f be ca 31 6c 17 02 ca 88 1d 08 2b | 41 de be 4f db b6 e0 c9 ce b8 f5 78 72 16 5b d3 | af b2 62 71 28 3f 0e a5 9b 79 4c c6 6b 64 ea 6c | 30 86 90 45 62 e9 86 e5 b2 f0 de b0 25 c7 2c 5e | 72 55 be b3 8f b3 05 2b 3b 6d 68 2a 44 c2 cc ec | 6b 1d 92 df 89 1a 9d f7 c1 18 8f 4d 34 ce b2 72 | dc 24 61 bd 37 65 28 f1 26 42 c6 a1 48 90 50 40 | 60 3f 78 ce 04 9c 3d ba 18 4e dd 4c d6 82 6e 51 | 67 48 49 62 37 f2 ed 52 4d b8 26 ec b0 85 3e 94 | ba a6 36 bb c9 80 6e e3 33 72 02 87 28 51 f7 0e | b2 b1 8f 9a df 7c ac 13 32 02 9e b4 45 75 85 e3 | 86 3b 1f 81 8b 2b 4d 2b b9 af 80 14 c8 c0 37 3b | 75 10 32 13 c6 74 a7 41 62 92 b3 87 9f e2 ed 2a | 29 00 00 24 f9 a0 5c 35 4a 9e bd 0e 0d 94 7a f9 | 8f b8 01 dd 15 88 70 42 78 10 83 16 a2 ba 62 6b | bf 0e 5b 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b f1 3a 2c 8b e8 c9 68 86 e1 0f be | 41 4d 1c 16 cf d5 b6 01 00 00 00 1c 00 00 40 05 | 84 fa 3c 0d 93 21 b5 34 8e ca ca 4a 93 ec 16 d0 | 28 a4 5e 28 | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #54 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e 45 bc 88 5c 41 98 f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #54 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #54 | rejected packet: | 4e 45 bc 88 5c 41 98 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #54: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-106" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-106' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #106 at 0x557d46a65250 | State DB: adding IKEv2 state #106 in UNDEFINED | pstats #106 ikev2.ike started | Message ID: init #106: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #106: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #106; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-106" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-106" IKE SA #106 "road-eastnet-nonat-106" "road-eastnet-nonat-106" #106: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-106 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-106": constructed local IKE proposals for road-eastnet-nonat-106 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 106 for state #106 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #106 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #106 spent 0.148 milliseconds in ikev2_parent_outI1() | crypto helper 14 resuming | crypto helper 14 starting work-order 106 for state #106 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 106 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-106" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.237 milliseconds in whack | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 106 time elapsed 0.001001 seconds | (#106) spent 1.01 milliseconds in crypto helper computing work-order 106: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 106 for state #106 to event queue | scheduling resume sending helper answer for #106 | libevent_malloc: new ptr-libevent@0x7fb3700251c0 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #106 | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 106 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #106 | **emit ISAKMP Message: | initiator cookie: | fe df 65 eb e2 ca b1 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-106 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ad da 7e a9 45 cb 20 7d e8 1c 81 82 05 64 57 6e | ikev2 g^x 75 d8 44 d1 29 49 80 30 70 57 33 94 8e d0 1f 14 | ikev2 g^x bc ae 59 d5 21 a0 94 8f 2c d7 0e ae 64 85 ee 4d | ikev2 g^x 50 69 c0 d8 4e 47 ef 8f 3a 2d ef b1 7b 6b a7 c8 | ikev2 g^x 8d 12 00 9d cb 02 d1 fa 1a e5 8c 51 be 6d 05 c8 | ikev2 g^x be 42 ed 64 5d 5d eb 43 74 14 7b 2e df 96 fd f0 | ikev2 g^x be d2 f5 e5 50 93 03 3d e5 7a 2c d8 01 5a 9b de | ikev2 g^x a0 3b d7 ce 9a ef 2b 39 02 de 74 61 50 3b eb 81 | ikev2 g^x 05 67 4f 23 be 3a 8e 5c be 32 5b 04 eb 4a 0a 52 | ikev2 g^x c4 c5 a5 9b 90 ef 60 8e e0 0b c4 2e df 2e 03 08 | ikev2 g^x 7d 0d 7d 77 85 98 9e 4b 28 0a fe 25 1d a7 29 db | ikev2 g^x 4e a8 1b 4a ee 35 1d 2c ba 8d 50 15 cc 00 fd b8 | ikev2 g^x 76 4c 44 ae c6 c8 10 0a ab 0a 64 76 0a 4d ee 2e | ikev2 g^x 50 89 e6 58 b8 26 b4 69 a0 66 8e 81 ad 9d da 80 | ikev2 g^x f3 00 a8 93 0e 88 6f 79 09 79 fc 16 36 77 35 c1 | ikev2 g^x 3d 72 2e 00 31 12 9c f8 70 79 c2 64 a5 05 9a 24 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a4 51 db a3 25 2a 8b 08 e6 f6 81 86 04 5c da 12 | IKEv2 nonce 5e 8f 68 4a 8c ec ef 5b e1 08 6f b7 57 a9 96 c5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fe df 65 eb e2 ca b1 96 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6a | natd_hash: port= 01 f4 | natd_hash: hash= 72 f9 ad bd d7 95 65 27 17 8c 87 a1 c4 9b a8 f7 | natd_hash: hash= 4c 6b d7 13 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 72 f9 ad bd d7 95 65 27 17 8c 87 a1 c4 9b a8 f7 | Notify data 4c 6b d7 13 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fe df 65 eb e2 ca b1 96 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1a ac 1c ef 71 2b dc a9 6f 07 a5 2c d5 55 fb 6b | natd_hash: hash= d6 5b 32 77 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1a ac 1c ef 71 2b dc a9 6f 07 a5 2c d5 55 fb 6b | Notify data d6 5b 32 77 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #106 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #106: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #106 to 4294967295 after switching state | Message ID: IKE #106 skipping update_recv as MD is fake | Message ID: sent #106 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-106" #106: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.106:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #106) | fe df 65 eb e2 ca b1 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad da 7e a9 45 cb 20 7d e8 1c 81 82 05 64 57 6e | 75 d8 44 d1 29 49 80 30 70 57 33 94 8e d0 1f 14 | bc ae 59 d5 21 a0 94 8f 2c d7 0e ae 64 85 ee 4d | 50 69 c0 d8 4e 47 ef 8f 3a 2d ef b1 7b 6b a7 c8 | 8d 12 00 9d cb 02 d1 fa 1a e5 8c 51 be 6d 05 c8 | be 42 ed 64 5d 5d eb 43 74 14 7b 2e df 96 fd f0 | be d2 f5 e5 50 93 03 3d e5 7a 2c d8 01 5a 9b de | a0 3b d7 ce 9a ef 2b 39 02 de 74 61 50 3b eb 81 | 05 67 4f 23 be 3a 8e 5c be 32 5b 04 eb 4a 0a 52 | c4 c5 a5 9b 90 ef 60 8e e0 0b c4 2e df 2e 03 08 | 7d 0d 7d 77 85 98 9e 4b 28 0a fe 25 1d a7 29 db | 4e a8 1b 4a ee 35 1d 2c ba 8d 50 15 cc 00 fd b8 | 76 4c 44 ae c6 c8 10 0a ab 0a 64 76 0a 4d ee 2e | 50 89 e6 58 b8 26 b4 69 a0 66 8e 81 ad 9d da 80 | f3 00 a8 93 0e 88 6f 79 09 79 fc 16 36 77 35 c1 | 3d 72 2e 00 31 12 9c f8 70 79 c2 64 a5 05 9a 24 | 29 00 00 24 a4 51 db a3 25 2a 8b 08 e6 f6 81 86 | 04 5c da 12 5e 8f 68 4a 8c ec ef 5b e1 08 6f b7 | 57 a9 96 c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 f9 ad bd d7 95 65 27 17 8c 87 a1 | c4 9b a8 f7 4c 6b d7 13 00 00 00 1c 00 00 40 05 | 1a ac 1c ef 71 2b dc a9 6f 07 a5 2c d5 55 fb 6b | d6 5b 32 77 | state #106 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #106 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #106 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49609.174645 | resume sending helper answer for #106 suppresed complete_v2_state_transition() and stole MD | #106 spent 0.476 milliseconds in resume sending helper answer | stop processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3700251c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe df 65 eb e2 ca b1 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #106 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #106 | rejected packet: | fe df 65 eb e2 ca b1 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #106: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #100 | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #100 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #100 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49609.205849; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500274 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ffbf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #100 | libevent_malloc: new ptr-libevent@0x7fb3700251c0 size 128 "road-eastnet-nonat-100" #100: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #100) | e4 31 72 ce cb 4c 2e da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 02 70 26 8b f7 4c 10 d5 54 2d e1 56 87 42 60 | 52 43 18 58 d2 c6 63 79 e0 4c 7b 4a 2f b9 0e c8 | b1 65 1d 3e 6c a0 42 98 0c 60 fd b3 4d 30 f1 76 | 5e b7 85 03 42 2b d9 76 75 50 2e c4 69 94 03 7a | 6e c6 23 13 83 28 87 89 db 36 67 01 a4 44 23 73 | e4 b0 04 73 26 bb b0 01 8a 59 be 71 cf 90 5c 3a | 4f 3e 50 e0 98 79 eb 2c 62 ed 3b ff 05 2e f6 81 | 65 38 8c a4 51 39 05 8b 85 23 c5 f6 84 98 62 7d | 1d 2f 44 0d 73 e0 13 c3 51 be 3b 56 26 36 4c 79 | eb bc 2b 5e 2c 37 b2 d5 29 fa 64 f9 de 60 b9 ba | 73 c4 a9 28 1e 62 38 24 9d a3 96 c5 53 73 2c 7d | 0d 39 e6 12 54 ca 75 11 6f 12 17 8e e1 13 5d 45 | 12 9e c5 b7 6a ce 49 b5 ef 7b 55 be 70 ce 3a 18 | d9 f0 2c b9 2c 8a 17 6a 09 a2 d9 96 28 14 14 67 | 3e 3b 41 a6 c6 44 44 f5 69 48 d1 0a 41 9c 30 d6 | 74 2c 38 9d d2 1f 0a f9 85 a8 83 ce dd 7d a1 17 | 29 00 00 24 9b 63 67 5a a5 90 71 08 bf 01 2e 0d | 7a 17 c3 85 da c2 c9 b2 79 84 88 d1 44 e9 43 2f | de e8 87 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb bf 15 80 9f fe 69 e3 a2 7b 53 a0 | 71 05 30 05 2a 8e cb 5a 00 00 00 1c 00 00 40 05 | e0 55 02 95 04 d8 fc 5b b5 ab 42 28 79 3c 3e 17 | 70 aa 5d 58 | libevent_free: release ptr-libevent@0x7fb38800a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #100 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 31 72 ce cb 4c 2e da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #100 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #100 | rejected packet: | e4 31 72 ce cb 4c 2e da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #100: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0688 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fbb00 | handling event EVENT_RETRANSMIT for parent state #82 | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #82 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #82 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49609.210189; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.0054 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #82 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 "road-eastnet-nonat-82" #82: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #82) | 0d 59 4a 91 cd 0d a8 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d de 62 a5 d0 5e bf 56 63 0e 91 36 97 7a 1e b1 | b4 16 cc 30 41 76 2c 4d 4b 72 e2 c2 b2 a1 f9 60 | dd 93 5e 0e 34 f7 25 c7 9f 53 30 68 3a c2 8d 97 | 4c 9d fc 02 66 0b d5 60 41 52 07 34 69 fd 84 a5 | ec 72 09 87 c6 8f 05 fb 8f 4e 6b ba 77 83 dc 16 | 60 81 0d a8 71 f3 cf c7 95 36 23 35 f7 97 ca 50 | b2 db d3 48 30 34 aa be 9a a2 37 9b 39 19 60 98 | ac 8b 67 73 12 da 16 80 58 c0 2a 80 56 eb 21 9f | 3c 3d 73 57 e9 89 d6 8c 3d 04 dc a8 2c a0 35 72 | 3a b3 ec 9f 41 04 d4 7f d9 68 36 d5 13 cd 39 04 | 57 48 05 ca 9e f9 64 20 0d 91 1f 4e 5d ee 28 d1 | 38 36 5d 35 10 47 60 e0 25 2a b4 90 4f 2b 22 f8 | 94 db c6 d0 bc a1 a8 ee 23 9e 12 7c 06 be 13 c9 | e4 f8 bb 10 03 1f 37 ab 38 d2 32 58 2a 26 f3 33 | 1c 60 32 46 6c a1 0e 88 78 61 ec 6b c9 dd e6 45 | 58 22 90 cf 6d f9 2b cd d5 02 5b 51 ea 18 fb dc | 29 00 00 24 61 df db a2 1d df 12 0c 5e ab 31 16 | 03 92 3a 6f 24 ce 35 05 3e f5 da 2f 7c 0d 1e 54 | bb d5 49 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 70 c6 55 5e 2d 9d b0 0a d9 87 23 | 4b f7 4f fa 28 d8 1e 81 00 00 00 1c 00 00 40 05 | 40 ed 3d f8 bd 8d 40 9e 57 65 9a d5 21 53 67 44 | eb 0f 4b 38 | libevent_free: release ptr-libevent@0x7fb37000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fbb00 | #82 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 59 4a 91 cd 0d a8 c9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #82 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #82 | rejected packet: | 0d 59 4a 91 cd 0d a8 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #82: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #8 | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #8 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #8 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49609.228498; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.013047 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fbb00 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #8 | libevent_malloc: new ptr-libevent@0x7fb37000cf80 size 128 "road-eastnet-nonat-8" #8: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #8) | fc e4 b0 97 be 19 e9 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb d7 b3 51 4b 56 31 da 19 b8 5b 11 80 3b 41 1d | db f2 28 3e 72 37 5d 51 ba b2 d1 db 84 a6 bb ce | 1e df 68 85 ad 45 d9 42 b6 3f f1 bf ca c0 f5 c2 | 41 11 18 ed 51 a4 a9 fb cb 5c 4b aa 1e 3a 47 5b | 44 a6 6a b6 94 62 27 08 46 1d 7b c4 ed 7e 13 6a | ca 75 f3 53 1a b4 5c e1 d0 26 6f 40 15 2a cf 5a | f0 64 c4 e8 99 40 1c 70 04 b2 00 e7 d0 a3 f5 96 | 6f ea 9b 0f 3f 68 a1 38 bf d5 ee 9b d4 28 95 59 | 43 fb 48 c8 ce 17 ed f6 a6 07 54 e9 76 3f ee 31 | e6 e0 4a 4a d9 1d 0e e2 d0 7f ee 9c f3 8f a5 65 | 31 c9 6f 45 ef 29 7c e4 98 48 e7 74 36 9b 60 48 | d3 f3 57 f0 4c b4 e7 0c b5 86 17 23 2a 25 88 1a | fd 48 0b e6 cd dd cd 71 67 f2 f0 ef a5 6a 24 ce | 8d d1 03 48 9c cf 4e e9 3a a8 3d 43 bb 43 cc 87 | 8b c7 29 54 b9 be 7f 2d 59 4b b6 ed 8e 48 bd b3 | 3d c6 30 ad ce 82 73 65 33 71 0d 41 0a f1 8b 76 | 29 00 00 24 ca f3 cf 9b f4 48 aa 70 c1 ee a6 ea | 0d e2 1f 7c 7a 99 db 08 31 a2 ad 99 ee 01 2c 76 | 68 be 3a 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d b5 e6 39 e3 40 62 d7 8a aa fc 72 | 51 01 50 53 91 71 a4 51 00 00 00 1c 00 00 40 05 | 09 30 f5 72 c0 48 d1 9e 95 11 78 b6 cb 80 4b c0 | 24 25 44 07 | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #8 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc e4 b0 97 be 19 e9 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #8 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #8 | rejected packet: | fc e4 b0 97 be 19 e9 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #8: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #95 | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #95 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #95 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49609.233948; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002491 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #95 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 "road-eastnet-nonat-95" #95: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #95) | 04 bb 1c 2b 41 e0 8a 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 79 b0 02 7c 1a 3a 07 ca 11 d1 03 7a 77 85 cb | ae ba 70 1b ee 9d e4 3c fb 83 b0 cf 85 ea f6 b1 | 44 27 5d 05 92 dc 5f 4f 10 d0 a1 c9 ef dd c6 ab | ac a1 db c0 15 56 b1 c8 1f 3b 2a 1e 0e 90 2f d7 | 1a 17 b9 f7 eb 61 37 1e 43 cf 9e 15 29 73 84 5a | a5 ef e1 fb 94 7f 43 bb 78 59 95 64 2c 87 b9 4b | 2e 15 ae fc 6c ec ab 40 45 3d 2f f3 c8 00 44 83 | 12 a7 e2 b8 59 bb 92 ce 59 8c ba f6 68 47 32 55 | e8 20 37 e3 3d d3 1b 3c 4e 84 f3 ae 58 53 16 45 | 58 97 74 47 9d a2 44 2f 81 9e ee 5c e8 ce 37 e9 | 5c 14 3e 89 c4 f1 89 ca 70 e0 1d 7a a9 38 f6 40 | 66 fb 41 8c 9b be 2c ea fc cd 2c ca 26 30 dd f0 | b1 29 6c c0 a6 b8 e6 ad e2 7b ae 2b 83 8b e5 9d | 01 26 d8 0c 5a 11 5f 25 a6 3e 25 b6 0f 26 26 34 | 01 b9 a7 4b b7 42 77 99 87 64 20 bd 67 77 cc 7e | b2 79 54 9b 12 25 7f ea ef 16 57 4a f6 24 75 7e | 29 00 00 24 fc b1 a7 58 88 f4 1b 4f aa 0e 2d d3 | a4 65 ca 66 dc 36 b5 47 7f 16 51 11 a3 c3 71 08 | 58 80 43 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ca 3c bb 33 78 12 9a 1b 10 5c d5 8f | d8 1f d4 ad ee 67 79 04 00 00 00 1c 00 00 40 05 | 61 56 68 61 76 b1 38 9f d6 2b 7a dd 4f cb 90 80 | 12 f2 80 83 | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #95 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 bb 1c 2b 41 e0 8a 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #95 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #95 | rejected packet: | 04 bb 1c 2b 41 e0 8a 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #95: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-107" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-107' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #107 at 0x557d46a66810 | State DB: adding IKEv2 state #107 in UNDEFINED | pstats #107 ikev2.ike started | Message ID: init #107: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #107: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #107; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-107" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-107" IKE SA #107 "road-eastnet-nonat-107" "road-eastnet-nonat-107" #107: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-107 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-107": constructed local IKE proposals for road-eastnet-nonat-107 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 107 for state #107 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb360005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #107 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 | #107 spent 0.154 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-107" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.245 milliseconds in whack | crypto helper 15 resuming | crypto helper 15 starting work-order 107 for state #107 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 107 | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 107 time elapsed 0.000926 seconds | (#107) spent 0.931 milliseconds in crypto helper computing work-order 107: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 107 for state #107 to event queue | scheduling resume sending helper answer for #107 | libevent_malloc: new ptr-libevent@0x7fb374024f80 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #107 | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 107 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #107 | **emit ISAKMP Message: | initiator cookie: | ac 4e b3 f4 ed 6e 1b 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-107 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9e 73 84 90 b0 a1 c9 25 a6 16 5e 4b 67 ce 07 6b | ikev2 g^x 92 04 d0 37 9e 07 4b 09 02 c2 78 f5 a4 a2 15 3a | ikev2 g^x 81 d0 8e e8 00 40 7b 2f 93 05 4b f1 72 7f 82 62 | ikev2 g^x 11 07 a0 1f 82 07 75 ea 96 ea 88 0b 0d 07 25 f0 | ikev2 g^x 53 bc 84 a7 a4 75 94 5f 48 4e 4a 60 2b e3 6f 76 | ikev2 g^x 92 f7 9d 74 6e 3f f1 39 f4 ea a5 df f6 6b e2 19 | ikev2 g^x 19 b6 60 26 c6 fe d4 1c bc ad 80 f2 46 47 46 93 | ikev2 g^x 4a da 3f 4a 2e 08 aa d8 dd f9 58 37 f0 1b 68 77 | ikev2 g^x ce 96 bc c9 19 65 a5 66 67 6f a9 fc 8b f9 e5 15 | ikev2 g^x 20 ed ca 26 5a cf 00 8e 65 d8 10 df c9 2f 55 c3 | ikev2 g^x 64 dc 1d 41 fa 8c 1a 44 06 90 c6 59 bf c3 6e 3f | ikev2 g^x fb f3 89 2e c3 0c 98 20 fe c3 39 08 86 b8 6d 84 | ikev2 g^x 72 50 7b 56 51 ac 06 e0 20 77 cc 21 04 85 51 fd | ikev2 g^x 65 1e 59 7f 79 5a a9 9c 4e fa 78 0d d8 f6 cf 3c | ikev2 g^x cd 73 f9 1e 3d 38 88 98 9e 60 ec bd 06 0d 2d 0c | ikev2 g^x 39 4f f8 8a 60 2e a2 ac 6c bc 30 73 f0 bc 87 4c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2b ab 2f 68 f7 5a dc 67 d2 bf 24 50 1d 74 5b c9 | IKEv2 nonce 72 db b8 cd 99 25 80 eb 1e bb 50 81 94 b2 ae 95 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ac 4e b3 f4 ed 6e 1b 8f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6b | natd_hash: port= 01 f4 | natd_hash: hash= 92 39 55 8e 98 9a a9 9a 86 88 c5 10 1f 60 cd 0e | natd_hash: hash= 59 85 0d 5e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 92 39 55 8e 98 9a a9 9a 86 88 c5 10 1f 60 cd 0e | Notify data 59 85 0d 5e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ac 4e b3 f4 ed 6e 1b 8f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 18 34 33 25 63 a4 39 e3 ca 5d cd 23 8f 87 c0 51 | natd_hash: hash= 02 99 ff a0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 18 34 33 25 63 a4 39 e3 ca 5d cd 23 8f 87 c0 51 | Notify data 02 99 ff a0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #107 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #107: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #107 to 4294967295 after switching state | Message ID: IKE #107 skipping update_recv as MD is fake | Message ID: sent #107 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-107" #107: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.107:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #107) | ac 4e b3 f4 ed 6e 1b 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 73 84 90 b0 a1 c9 25 a6 16 5e 4b 67 ce 07 6b | 92 04 d0 37 9e 07 4b 09 02 c2 78 f5 a4 a2 15 3a | 81 d0 8e e8 00 40 7b 2f 93 05 4b f1 72 7f 82 62 | 11 07 a0 1f 82 07 75 ea 96 ea 88 0b 0d 07 25 f0 | 53 bc 84 a7 a4 75 94 5f 48 4e 4a 60 2b e3 6f 76 | 92 f7 9d 74 6e 3f f1 39 f4 ea a5 df f6 6b e2 19 | 19 b6 60 26 c6 fe d4 1c bc ad 80 f2 46 47 46 93 | 4a da 3f 4a 2e 08 aa d8 dd f9 58 37 f0 1b 68 77 | ce 96 bc c9 19 65 a5 66 67 6f a9 fc 8b f9 e5 15 | 20 ed ca 26 5a cf 00 8e 65 d8 10 df c9 2f 55 c3 | 64 dc 1d 41 fa 8c 1a 44 06 90 c6 59 bf c3 6e 3f | fb f3 89 2e c3 0c 98 20 fe c3 39 08 86 b8 6d 84 | 72 50 7b 56 51 ac 06 e0 20 77 cc 21 04 85 51 fd | 65 1e 59 7f 79 5a a9 9c 4e fa 78 0d d8 f6 cf 3c | cd 73 f9 1e 3d 38 88 98 9e 60 ec bd 06 0d 2d 0c | 39 4f f8 8a 60 2e a2 ac 6c bc 30 73 f0 bc 87 4c | 29 00 00 24 2b ab 2f 68 f7 5a dc 67 d2 bf 24 50 | 1d 74 5b c9 72 db b8 cd 99 25 80 eb 1e bb 50 81 | 94 b2 ae 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 39 55 8e 98 9a a9 9a 86 88 c5 10 | 1f 60 cd 0e 59 85 0d 5e 00 00 00 1c 00 00 40 05 | 18 34 33 25 63 a4 39 e3 ca 5d cd 23 8f 87 c0 51 | 02 99 ff a0 | state #107 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb360005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #107 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 | #107 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49609.246288 | resume sending helper answer for #107 suppresed complete_v2_state_transition() and stole MD | #107 spent 0.408 milliseconds in resume sending helper answer | stop processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb374024f80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac 4e b3 f4 ed 6e 1b 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #107 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #107 | rejected packet: | ac 4e b3 f4 ed 6e 1b 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #107: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0336 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3a590 | handling event EVENT_RETRANSMIT for parent state #83 | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #83 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #83 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49609.266494; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002228 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28af0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #83 | libevent_malloc: new ptr-libevent@0x7fb374024f80 size 128 "road-eastnet-nonat-83" #83: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #83) | e6 2b 97 c6 d1 4c 13 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 e0 14 c2 4a 13 d8 77 12 b1 93 fe 09 ee 1d 88 | 31 85 5e 91 48 ad b1 20 71 3f cb af eb 92 c7 d3 | e3 3b dc e2 9e c2 45 29 c9 59 6d 7a 62 12 34 26 | 8c eb c3 61 ed 07 95 b3 f8 74 eb 61 63 eb 1c b2 | 60 84 c3 e0 69 12 37 aa 40 a9 ee 46 d3 1a 26 fd | 77 29 43 bd fd b4 e3 3b c7 a8 7e e9 e3 51 f4 e6 | b9 4a 57 59 1d 18 ef df e9 5a be 77 08 df e7 55 | 46 7f 6c 4f 13 29 e4 bb ef bd 6c fb 60 8b fc 62 | e9 ba c0 54 d3 2b 44 c6 2f 29 d7 34 b4 6b 61 c0 | c9 cb 1e cb a6 25 28 61 95 9e 2c f5 86 69 f9 7c | b8 7c 34 c0 e0 ed f4 f7 82 f9 b3 c4 8e 1a 55 fb | d8 ed 0f e9 ed ff da 76 3e bb 0b ca e5 d5 7e 00 | 28 52 cc 3e d7 7f e9 d9 c5 bd e9 a7 17 e5 95 51 | 9f 9f 95 b4 65 d9 e7 b3 d2 a5 c2 fe 86 92 6e 23 | 5c 06 60 94 75 50 49 bf 5b 48 f5 bd b4 b4 de 5e | dd 11 02 11 73 fd f3 0f cb 43 d1 ff 6c 2f 1d fa | 29 00 00 24 d9 ea 5f 5d e7 8b 27 ca 82 31 28 fd | 7a 4f 51 83 32 9a 18 8a 6e 2a 8b d4 95 e6 d6 b1 | 0f 0b a2 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf 83 ee f4 b4 fb 0f 43 eb c7 c4 87 | aa a0 5e 5c f1 0e 63 f4 00 00 00 1c 00 00 40 05 | 05 b9 81 d9 1f fe b2 68 6c 59 f2 c5 07 41 cc 9a | 8a 8b 10 9b | libevent_free: release ptr-libevent@0x7fb354009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3a590 | #83 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 2b 97 c6 d1 4c 13 c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #83 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #83 | rejected packet: | e6 2b 97 c6 d1 4c 13 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #83: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #101 | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #101 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #101 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49609.28983; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500101 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #101 | libevent_malloc: new ptr-libevent@0x7fb354009640 size 128 "road-eastnet-nonat-101" #101: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #101) | a4 e5 70 36 3e 53 78 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 47 67 da db 52 1d 6f 38 4e a0 14 fb a3 22 ee | a5 bd 87 bb f4 50 cd e1 5f f4 bb 7f 5e 01 20 78 | 03 d2 5e e5 f5 4c 45 4d 90 0b ab 1e a9 68 0d a2 | 63 8b 82 0b 63 5a be b1 7a 7f 0a d0 8f 73 00 89 | 01 d6 0d 8e e0 01 de 09 aa b1 2b c9 2a 85 99 3e | e4 12 33 b6 ff a4 02 5b a4 0f a9 0e 49 92 c4 c4 | 91 bb bd cc bc 4e ec 81 b6 b6 b8 9c 4a 4e 40 d2 | 5e b4 c5 bc f7 4c 25 7f b5 8f df 4b 29 de 24 b5 | 99 9e 0e bd 10 eb 77 c5 31 71 d3 38 c7 ae 1b 45 | a1 15 8f 53 f2 46 e1 e0 f3 7d cd 3a fa d7 ce cc | 71 fa 98 05 20 5e 2b 57 e0 1e 93 66 04 94 47 68 | b5 fc da d4 67 d1 27 06 e7 0b 81 26 9b 06 3d 8a | 68 ab 7d 23 5f b3 75 b4 20 05 d5 0a d7 9f 47 f8 | cc 49 2f 28 05 85 5c 22 76 a9 df c7 57 38 c2 59 | 85 34 bf b9 39 30 70 bd fe 4d 41 14 30 36 f4 a7 | a4 75 83 53 e7 c0 5a e0 b5 e5 07 a1 66 16 4d c3 | 29 00 00 24 08 f8 1e 60 51 22 a7 7a 61 74 80 8a | 8a 13 29 1d 07 8a 7f 81 27 3b e2 db 98 17 8f 37 | 46 82 14 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 37 fb 68 83 f3 3a 11 a5 17 fb 1f | 7d e8 ab 39 06 f5 fb 7f 00 00 00 1c 00 00 40 05 | 98 33 35 18 bc 62 08 ee 27 45 3b 5b 93 d4 b0 de | 01 b6 d3 96 | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #101 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 e5 70 36 3e 53 78 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #101 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #101 | rejected packet: | a4 e5 70 36 3e 53 78 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #101: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c00d120 | handling event EVENT_RETRANSMIT for parent state #55 | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #55 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #55 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49609.318168; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003424 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #55 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 "road-eastnet-nonat-55" #55: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #55) | 3d db 2e dd 07 aa ba 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e 71 91 32 93 9e d9 77 ef 53 94 b9 d3 5b 34 5a | fe 84 a7 6b 7a 00 f9 5d 90 9e 95 ec 98 7e 50 90 | 6f 0f ae d2 9f 29 ef dd 60 22 99 95 c1 b0 c0 54 | a7 26 de ae fa 13 60 60 4e 33 18 74 d6 1f 83 02 | 06 b2 59 fa 7c 17 46 c9 2a 0a 3f 67 46 5b 6e d7 | 09 8c 97 98 d9 8f c1 fc 1c ec 49 28 fb cb 2a 4f | 78 96 26 a0 14 e4 f8 b2 87 ff f8 94 08 22 94 74 | 80 62 7b 3c 7f 07 b1 d4 49 9b 9c af da 12 43 95 | 22 ed c4 32 82 8f fd 22 2e 14 7f a3 9e 9a 0a 95 | 1c ac 99 95 6e eb ff 73 9e fa c4 9b c2 7f 18 d1 | a6 f5 7d a7 31 3b 50 d9 03 2b 9b 6a 48 7d 39 5a | 55 2b 5f c8 64 07 45 ea 51 98 d9 85 73 51 e2 22 | 6a fe cb 2c f3 b0 0b 08 b0 e7 70 07 6e 79 7c 1c | 6c d7 90 19 69 d2 44 49 0a 0f 6a 33 f1 60 ee 72 | 89 92 e0 5a 96 45 5d c4 8c 2b 42 de 01 b6 de 4f | b8 41 dc e7 4d 6a e5 69 01 12 96 be b3 ca 0c ef | 29 00 00 24 34 26 bc 6d 2a b2 15 83 73 e7 09 34 | 40 d7 8e 8c 63 fe fd 1b d2 38 8c 24 da 45 67 bf | a5 9b 8a 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 45 13 d7 91 8d b2 95 9c 7e b4 17 | 75 e1 5c f2 7c 3c ca 26 00 00 00 1c 00 00 40 05 | d0 0d a6 5e 1b c4 3a dd c0 34 b3 e5 87 cb 47 3a | 73 94 3b 44 | libevent_free: release ptr-libevent@0x7fb36c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00d120 | #55 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d db 2e dd 07 aa ba 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #55 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #55 | rejected packet: | 3d db 2e dd 07 aa ba 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #55: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0689 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-108" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-108' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #108 at 0x557d46a67dd0 | State DB: adding IKEv2 state #108 in UNDEFINED | pstats #108 ikev2.ike started | Message ID: init #108: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #108: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #108; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-108" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-108" IKE SA #108 "road-eastnet-nonat-108" "road-eastnet-nonat-108" #108: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-108 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-108": constructed local IKE proposals for road-eastnet-nonat-108 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 108 for state #108 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c00d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #108 | libevent_malloc: new ptr-libevent@0x7fb36c012840 size 128 | #108 spent 0.144 milliseconds in ikev2_parent_outI1() | crypto helper 19 resuming | crypto helper 19 starting work-order 108 for state #108 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 108 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 108 time elapsed 0.000947 seconds | (#108) spent 0.954 milliseconds in crypto helper computing work-order 108: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 108 for state #108 to event queue | scheduling resume sending helper answer for #108 | libevent_malloc: new ptr-libevent@0x7fb3680251c0 size 128 | crypto helper 19 waiting (nothing to do) | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-108" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.234 milliseconds in whack | timer_event_cb: processing event@0x557d469f0aa0 | handling event EVENT_RETRANSMIT for parent state #84 | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #84 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #84 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49609.330417; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00546 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56dd0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #84 | libevent_malloc: new ptr-libevent@0x7fb3680180b0 size 128 "road-eastnet-nonat-84" #84: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #84) | 1f 2f b6 8b 51 48 06 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 1f 67 e9 76 20 6a 2b f7 ad 13 77 97 e1 68 87 | e9 75 71 19 c9 83 f3 73 fb 25 68 00 8c ff f8 c9 | 1d 39 8c aa 48 91 67 ae d7 68 2a 58 40 8a 8f c7 | 80 6c 8a 0d 2c 34 0e dd 31 f9 0d 20 54 ae b8 ad | f3 e5 66 87 27 c1 b9 3b f7 7e 5f 91 9e 13 72 c4 | fb 1c ec 84 d9 28 50 4e 83 04 2b 64 28 38 b2 c3 | 26 3d 3f fe b0 3a 31 93 a2 da 74 58 0f e3 c4 e7 | 1b d4 4a 7b 98 e4 bf 2d 17 77 1c c7 60 c6 cd f4 | a4 b3 3e 33 44 58 50 ab 79 af 8a 67 8e c3 a4 76 | 74 f4 47 b0 6e 53 b7 1d 0a 98 f8 36 13 56 c4 89 | c8 ca cc fb f1 a4 98 cd 59 ff 4a e3 78 5d 3c 67 | 86 c4 70 68 e1 a0 3e 7b 7f c1 2f 3d a4 0d c2 c5 | bd ed 93 ba 2d ff bd 57 2f b9 ac d7 dc 77 9f ae | 61 e7 8a 25 fb 95 fa b6 ae 27 5d f2 7d 25 5c 37 | cd dc a1 e7 01 66 ba 0c 28 2e 4b 30 85 a4 73 58 | f5 b4 a3 77 ea dd 82 87 c2 5d 3f 72 7d 74 36 cc | 29 00 00 24 76 ac e1 c3 58 b8 41 7b 54 b2 2a 6d | c8 c8 51 a4 ca 16 83 ce 76 9e a1 e9 43 b8 d3 34 | c3 53 e0 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f 3a 1a f8 04 5d 3c b5 2b e1 4e ab | 33 49 9d 7d 4f 74 a2 8f 00 00 00 1c 00 00 40 05 | 1b c4 6f 3a e9 14 b6 7b 2a e7 ad b0 65 58 df 39 | fd 38 92 37 | libevent_free: release ptr-libevent@0x7fb35000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f0aa0 | #84 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 2f b6 8b 51 48 06 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #84 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #84 | rejected packet: | 1f 2f b6 8b 51 48 06 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #84: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #108 | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 108 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #108 | **emit ISAKMP Message: | initiator cookie: | b6 36 fb 7e 9b 39 08 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-108 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 86 8f 7e 30 55 17 55 d0 7b cc 1e 1e d2 0b 4a cb | ikev2 g^x f4 10 86 26 73 3d 12 d5 07 43 0f 11 e4 f8 f6 27 | ikev2 g^x 0b a5 f1 36 07 fc f3 05 3c 23 da bb fc 30 83 87 | ikev2 g^x 4d 41 58 5e 99 3a a9 ce 46 15 98 87 9b 24 d7 8f | ikev2 g^x 4b 59 7f b7 31 2a 48 e9 80 ab 05 c8 c6 49 95 79 | ikev2 g^x 0d 98 4a 2c 3d fe d3 d5 57 7f be e0 6f 80 49 7e | ikev2 g^x 12 83 14 1f 0d 26 16 aa cd e1 d8 a5 e8 e4 d2 0b | ikev2 g^x 8c a3 fb db 9a 33 4c 54 d3 db d0 4d 8d 8e a8 6d | ikev2 g^x 02 98 c7 65 a7 c6 72 0c be 01 bc 52 89 54 3a 59 | ikev2 g^x 6c 0b 5d c0 31 d7 63 e7 46 02 b3 0a b3 c7 5c de | ikev2 g^x 0f 7c c0 40 9f a9 b4 60 e4 65 87 1b d1 de 9c 27 | ikev2 g^x 3d df 5c 7f 27 8d e9 84 86 44 ce 9d 88 43 1a 58 | ikev2 g^x 28 56 bd 9e df a0 81 8f 79 ba 7e dd 69 15 d8 10 | ikev2 g^x e7 15 0f da 12 84 35 19 8e 2f 46 d3 83 f4 76 51 | ikev2 g^x 58 93 90 90 80 38 02 b8 02 db 96 cc e8 5b bf 28 | ikev2 g^x 0c 19 e8 c4 f6 ae 03 e7 2c 85 d1 50 dc 63 a6 cc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6f 78 95 93 53 4c be 35 be d7 12 7f aa e5 be 16 | IKEv2 nonce ad 5c 36 ac 46 40 9b c8 37 9c 91 65 00 a5 4b a8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b6 36 fb 7e 9b 39 08 e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6c | natd_hash: port= 01 f4 | natd_hash: hash= 4d 98 20 9c 05 26 c6 0c 16 0d f3 71 8e b0 d2 f3 | natd_hash: hash= 4f 39 a2 61 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4d 98 20 9c 05 26 c6 0c 16 0d f3 71 8e b0 d2 f3 | Notify data 4f 39 a2 61 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b6 36 fb 7e 9b 39 08 e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 96 4b e6 dc 37 23 61 90 08 5b 41 4a ab 35 e9 fe | natd_hash: hash= 61 65 2c 1d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 96 4b e6 dc 37 23 61 90 08 5b 41 4a ab 35 e9 fe | Notify data 61 65 2c 1d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #108 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #108: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #108 to 4294967295 after switching state | Message ID: IKE #108 skipping update_recv as MD is fake | Message ID: sent #108 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-108" #108: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.108:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #108) | b6 36 fb 7e 9b 39 08 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 8f 7e 30 55 17 55 d0 7b cc 1e 1e d2 0b 4a cb | f4 10 86 26 73 3d 12 d5 07 43 0f 11 e4 f8 f6 27 | 0b a5 f1 36 07 fc f3 05 3c 23 da bb fc 30 83 87 | 4d 41 58 5e 99 3a a9 ce 46 15 98 87 9b 24 d7 8f | 4b 59 7f b7 31 2a 48 e9 80 ab 05 c8 c6 49 95 79 | 0d 98 4a 2c 3d fe d3 d5 57 7f be e0 6f 80 49 7e | 12 83 14 1f 0d 26 16 aa cd e1 d8 a5 e8 e4 d2 0b | 8c a3 fb db 9a 33 4c 54 d3 db d0 4d 8d 8e a8 6d | 02 98 c7 65 a7 c6 72 0c be 01 bc 52 89 54 3a 59 | 6c 0b 5d c0 31 d7 63 e7 46 02 b3 0a b3 c7 5c de | 0f 7c c0 40 9f a9 b4 60 e4 65 87 1b d1 de 9c 27 | 3d df 5c 7f 27 8d e9 84 86 44 ce 9d 88 43 1a 58 | 28 56 bd 9e df a0 81 8f 79 ba 7e dd 69 15 d8 10 | e7 15 0f da 12 84 35 19 8e 2f 46 d3 83 f4 76 51 | 58 93 90 90 80 38 02 b8 02 db 96 cc e8 5b bf 28 | 0c 19 e8 c4 f6 ae 03 e7 2c 85 d1 50 dc 63 a6 cc | 29 00 00 24 6f 78 95 93 53 4c be 35 be d7 12 7f | aa e5 be 16 ad 5c 36 ac 46 40 9b c8 37 9c 91 65 | 00 a5 4b a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 98 20 9c 05 26 c6 0c 16 0d f3 71 | 8e b0 d2 f3 4f 39 a2 61 00 00 00 1c 00 00 40 05 | 96 4b e6 dc 37 23 61 90 08 5b 41 4a ab 35 e9 fe | 61 65 2c 1d | state #108 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c00d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #108 | libevent_malloc: new ptr-libevent@0x7fb36c012840 size 128 | #108 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49609.331145 | resume sending helper answer for #108 suppresed complete_v2_state_transition() and stole MD | #108 spent 0.461 milliseconds in resume sending helper answer | stop processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3680251c0 | timer_event_cb: processing event@0x7fb35400d120 | handling event EVENT_RETRANSMIT for parent state #9 | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #9 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #9 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49609.331196; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.013894 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56e30 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #9 | libevent_malloc: new ptr-libevent@0x7fb3680251c0 size 128 "road-eastnet-nonat-9" #9: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #9) | 42 d4 37 7c 6c a2 32 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b e7 ee 8b 3f 67 fc 59 f9 cf cd 11 31 95 6f 6f | 1a 68 46 c3 76 29 7e 71 e4 25 40 18 dc 88 c2 53 | ee 88 a1 08 66 15 f3 28 c2 cb 4a e2 b5 75 33 59 | 55 79 a1 88 5f 78 4f 18 38 8e ae 5c 13 15 13 df | ba 4a 47 c9 50 41 88 b6 f1 7a 74 8c 60 ff 93 b2 | 20 68 e4 46 db 20 8c 30 74 ea 04 10 5a 30 ea 94 | 23 ad e3 f6 b8 fd ef 4b 90 8b 27 14 bc c0 83 ef | 74 2c ab 49 65 76 af 73 fb 43 7c f1 ae d1 dd 3f | cd c7 7b 68 fb f4 41 39 5c 57 ef 8f 92 ea 9a 47 | 45 2a 1a ac 29 88 a1 89 ea a8 1a 7b a4 32 e3 9e | 8d f2 ad cb d1 f4 4e b8 a3 dd 79 49 05 1f 03 30 | 8a 93 8b ac 8f aa 22 b8 9b 89 24 78 34 56 75 f6 | e9 af c1 e4 36 df ba ca 6c 64 ef d5 97 79 d5 33 | 78 61 be 8d 16 b6 42 4a 4c 79 ee 04 84 ce 68 09 | e7 e6 62 4d 5a 49 5e d0 0c 5b 80 69 ff fd 56 0f | 18 1b 5a c8 54 c8 76 c4 ef 5e 74 08 bd 6d 13 c8 | 29 00 00 24 56 5b 42 39 e6 4b 00 04 2e 83 3d 83 | 1e c8 b4 ab 97 9b 33 06 82 c0 a9 36 06 ea b4 2d | 23 5d c5 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 a8 01 3e 09 4e 61 7c 63 45 b6 fc | 6b 13 a6 83 ef 8b fa 92 00 00 00 1c 00 00 40 05 | 4f 50 e4 89 50 50 84 2d e7 09 2b 9f ac 1d 9b 91 | c6 7c af 4c | libevent_free: release ptr-libevent@0x7fb354012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400d120 | #9 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b6 36 fb 7e 9b 39 08 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #108 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #108 | rejected packet: | b6 36 fb 7e 9b 39 08 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #108: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0596 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 d4 37 7c 6c a2 32 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #9 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #9 | rejected packet: | 42 d4 37 7c 6c a2 32 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #9: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0535 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #96 | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #96 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #96 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49609.338527; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001927 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #96 | libevent_malloc: new ptr-libevent@0x7fb354012840 size 128 "road-eastnet-nonat-96" #96: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #96) | 4d 94 02 39 3c 71 1f ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 27 e8 d9 3b fa 4a fd 06 7e 6c e7 d4 28 0e 9b | df ea 6a b2 fc 9c 70 c8 54 bf db 6f b0 0a 35 03 | f4 08 a8 1f a5 9d 3d d9 36 ba b8 d7 c7 a5 02 b2 | bf b0 56 c5 e8 85 3a 3f 3e 64 27 86 e6 32 36 9e | e3 cb 8f 61 07 7c f1 f7 b9 98 01 dc 75 bf ec 8e | e7 f3 67 03 e1 e0 44 02 7f 11 18 67 70 37 2d 5e | 1b 6f 89 19 20 17 f1 e7 a8 e9 33 cb ea 00 46 56 | 49 ba cc 5d 15 50 da 98 ff 9c 3f 56 7f 50 23 17 | 4f 39 25 c0 2c 24 4b 31 aa 08 bf c3 fa 73 75 f8 | 66 d4 df a2 81 2f b6 b1 85 b3 e1 b9 2c ba cc f0 | 05 a5 8e 76 4a d0 1e 4a 24 c4 b4 b6 c2 9f 5a c8 | d7 f7 62 5f e5 ae 58 69 f5 08 1a e6 3f f8 45 99 | 93 41 5e 16 d1 fa c4 dc dc 43 aa 67 19 5f 0d 6b | d0 93 a7 d0 e0 42 60 37 df bb b8 67 3d be 3f 73 | 01 ab df b7 44 63 b3 2e 2f eb b6 11 c7 6c 12 e1 | 09 64 f6 e9 82 4b 4a d1 f8 5c 86 44 cf 9c 7b 84 | 29 00 00 24 fb b6 a6 14 5d d4 9f d4 3b de f1 45 | f6 4a ea e3 bf d0 33 9e b1 50 af 7d ca 56 7c e5 | 77 5f 83 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 32 ad 1c 75 03 32 df 0c 2b d0 a0 | cb f7 34 b2 23 e4 90 14 00 00 00 1c 00 00 40 05 | 3d 4e a8 fd 45 70 26 15 be c0 96 dc 33 de 8f ea | e2 1a 12 a7 | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #96 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d 94 02 39 3c 71 1f ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #96 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #96 | rejected packet: | 4d 94 02 39 3c 71 1f ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #96: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47ed0 | handling event EVENT_RETRANSMIT for parent state #102 | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #102 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #102 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49609.353875; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500307 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #102 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 "road-eastnet-nonat-102" #102: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #102) | 27 a9 08 a7 62 f6 e2 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 3c 29 a0 c9 87 b4 80 a8 37 0b 02 31 7e 05 06 | 02 b7 61 4c 60 0e af ef 4b 5c b9 dc 19 0b 5d d9 | 85 a8 a5 ba 16 2d 92 a5 e8 44 5d 48 48 06 cf a5 | c8 1d 53 0f c9 1c 2d 7b a3 b3 51 75 2d 98 e2 85 | e1 14 fe ce 69 6e ee 85 ba cc ab 6a ed ac 29 a6 | 04 6d ec cb be 61 e5 98 b4 1e dc 38 dc 20 70 bb | 52 99 a2 ac 6c 5b d5 dd f6 c6 54 38 29 d3 1c 88 | 10 77 53 7e af 0b 17 62 42 90 de ab 20 33 28 bc | 91 f7 eb 8f 86 fb 2e 6b 0f 94 c5 1b d9 40 a4 9e | 85 bd 8a 30 d0 a6 6c 09 f4 53 70 9d 11 c9 76 49 | 32 46 6a 4a 93 73 a4 59 28 e7 d5 c6 a2 40 d9 fe | c5 0c 7c 9f 70 ed 22 06 0b e5 2d 6e 16 d1 d2 84 | dd d9 af a3 b3 06 49 42 9f 97 37 00 03 72 48 b5 | 2c 38 f9 d2 b0 86 d6 8d ff f1 cb a6 a2 01 50 8e | d5 f2 44 23 56 23 e0 80 83 60 74 3c 92 0d 5e fb | ab 02 db 75 25 b6 fb 54 b8 2c cc 93 7e 04 7e 47 | 29 00 00 24 02 3b 00 99 07 4d 65 f7 7a c6 71 3b | f3 f6 94 93 e2 10 88 59 58 b9 a5 ba 96 a3 b3 bb | 2e a4 a0 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f0 3d eb e8 fa 43 c6 b4 69 3b f8 | f6 b0 ac 09 3e c3 01 6c 00 00 00 1c 00 00 40 05 | 27 e7 8a b1 d1 bb a4 87 76 d6 0f f9 d8 03 fa 51 | 25 22 7e d6 | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47ed0 | #102 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 a9 08 a7 62 f6 e2 d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #102 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #102 | rejected packet: | 27 a9 08 a7 62 f6 e2 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #102: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0656 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #85 | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #85 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #85 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49609.388275; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002821 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47ed0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #85 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 "road-eastnet-nonat-85" #85: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #85) | b7 4f d7 db a6 e2 bd 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 c8 89 a4 0b 04 f2 b9 62 f8 58 f1 1c 0c 91 1a | aa 25 df 1a e7 a5 32 9d 0b b5 9b 93 ab d7 64 b6 | 7e 0d ee f0 b5 83 e8 90 d8 94 b7 d1 ea 05 1c 4f | 85 63 ef bf 80 da 59 c5 18 c9 fd 82 f7 cd 12 c7 | ec b4 9e 35 b0 0c 13 ac 89 c3 d8 6c 14 b9 3b f7 | 41 eb 65 45 c9 66 0a f2 c7 e9 1b 09 a2 d5 ad 2e | 24 aa 0a a8 48 81 8f bc 8d df 3f 90 a2 d2 26 b2 | 84 b7 2d b6 67 ac 5a fa 85 04 e2 96 e3 0b 1d f3 | b9 b5 0f f0 5b d4 c6 d3 b2 9b d4 ad e6 94 18 68 | bf f6 64 ed 26 d4 b7 68 7f a4 94 0e af 4c 0c b4 | 64 91 32 f4 da 5b 38 c2 84 b3 fe 0e e5 1b 3f a5 | 6b 83 a5 f2 b9 7d 21 72 89 70 28 f2 d4 86 bb fd | 03 43 fe f4 4e 6c 9c 49 29 03 b2 15 2f 72 ba 73 | 18 d4 39 82 08 55 da c3 e4 86 cb d0 04 31 94 6a | f5 7b 4a de 4d 49 5a 6d 51 3e 71 b4 0d e8 2e 33 | 9f 26 4a 91 c4 9b 06 1a 88 4b 6e 77 93 8a 7d ed | 29 00 00 24 af e3 01 7b 71 cd 34 07 4b 0a a0 9b | 85 75 4e ed b9 b3 c5 7d 83 a1 ee 6b 3c aa 39 e2 | 0b 8b fa b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 41 7b 44 0a d6 6d 6a b0 b1 8e ad | b0 c3 33 77 45 ba 39 18 00 00 00 1c 00 00 40 05 | 63 0f 1e f2 8f 76 1d 60 09 1e 0d 94 28 78 d8 b0 | 16 5a de 8a | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #85 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 4f d7 db a6 e2 bd 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #85 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #85 | rejected packet: | b7 4f d7 db a6 e2 bd 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #85: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-109" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-109' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #109 at 0x557d46a69390 | State DB: adding IKEv2 state #109 in UNDEFINED | pstats #109 ikev2.ike started | Message ID: init #109: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #109: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #109; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-109" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-109" IKE SA #109 "road-eastnet-nonat-109" "road-eastnet-nonat-109" #109: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-109 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-109": constructed local IKE proposals for road-eastnet-nonat-109 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 109 for state #109 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34c005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #109 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 | #109 spent 0.165 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 resuming | RESET processing: connection "road-eastnet-nonat-109" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 starting work-order 109 for state #109 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 109 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.274 milliseconds in whack | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 109 time elapsed 0.00082 seconds | (#109) spent 0.827 milliseconds in crypto helper computing work-order 109: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 109 for state #109 to event queue | scheduling resume sending helper answer for #109 | libevent_malloc: new ptr-libevent@0x7fb36c0251c0 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #109 | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 109 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #109 | **emit ISAKMP Message: | initiator cookie: | 53 c2 aa ad 50 91 d9 00 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-109 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f3 1a 23 bb a3 ce 6a 0d 92 7a aa 8d 69 c7 99 27 | ikev2 g^x db f2 23 5c cd 5e 2d f6 c4 13 c1 c7 87 46 ed 75 | ikev2 g^x d8 b9 55 72 40 32 53 f1 21 db f3 6d 45 6a d9 b4 | ikev2 g^x 9c 06 b1 28 c5 00 1e e2 70 2c 2a 1a f0 fa 65 1b | ikev2 g^x a8 db b9 2c 83 95 23 c4 4d 60 4b a3 fc 58 c6 c8 | ikev2 g^x a8 b0 c1 e8 32 2c d3 70 a2 4d cb c8 7c 80 17 90 | ikev2 g^x c1 c1 fd 82 03 1f 32 d8 5e cd ad 60 ce c1 24 ab | ikev2 g^x 82 68 88 db 79 b3 aa 37 ff 36 d4 a3 82 06 b7 59 | ikev2 g^x 0c 4c 61 6f 22 1c 48 b3 94 8b 71 14 8f 57 c8 03 | ikev2 g^x 31 41 b9 e3 a9 ea 8f 4d 51 15 4a 4c 5f 30 c2 c4 | ikev2 g^x 40 3e 6a 9e 7d 33 6d fb 91 1c b2 be 1e 33 35 f6 | ikev2 g^x 1a db ff 1e 8c 4e e8 12 71 d7 94 88 49 d8 37 d9 | ikev2 g^x cb 52 5b 22 87 0a c9 2f a4 1d 52 36 85 74 38 7e | ikev2 g^x de e2 44 79 f2 36 18 5e 82 cf d4 fb db 3f c9 35 | ikev2 g^x 36 d8 7b 5d 04 fb fa a4 fe b5 87 c5 e7 4e 90 d6 | ikev2 g^x 9f 17 87 48 32 5d ec 5c f7 e6 e2 39 17 1c 9c 2a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8f bd ba cb 6b fc de c1 80 b9 fe c3 b3 e0 ad b2 | IKEv2 nonce e9 fa 37 77 43 04 c6 81 1a 91 41 eb 20 40 b9 e3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 53 c2 aa ad 50 91 d9 00 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6d | natd_hash: port= 01 f4 | natd_hash: hash= 8f d2 7c ae 7e 39 2b fb 54 2c 44 94 2e c2 37 67 | natd_hash: hash= 8d e5 fe 8b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8f d2 7c ae 7e 39 2b fb 54 2c 44 94 2e c2 37 67 | Notify data 8d e5 fe 8b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 53 c2 aa ad 50 91 d9 00 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 12 b6 58 87 f0 a8 b9 d4 aa ae 6f 5a ed df 76 d7 | natd_hash: hash= 1d 86 02 2c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 12 b6 58 87 f0 a8 b9 d4 aa ae 6f 5a ed df 76 d7 | Notify data 1d 86 02 2c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #109 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #109: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #109 to 4294967295 after switching state | Message ID: IKE #109 skipping update_recv as MD is fake | Message ID: sent #109 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-109" #109: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.109:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #109) | 53 c2 aa ad 50 91 d9 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 1a 23 bb a3 ce 6a 0d 92 7a aa 8d 69 c7 99 27 | db f2 23 5c cd 5e 2d f6 c4 13 c1 c7 87 46 ed 75 | d8 b9 55 72 40 32 53 f1 21 db f3 6d 45 6a d9 b4 | 9c 06 b1 28 c5 00 1e e2 70 2c 2a 1a f0 fa 65 1b | a8 db b9 2c 83 95 23 c4 4d 60 4b a3 fc 58 c6 c8 | a8 b0 c1 e8 32 2c d3 70 a2 4d cb c8 7c 80 17 90 | c1 c1 fd 82 03 1f 32 d8 5e cd ad 60 ce c1 24 ab | 82 68 88 db 79 b3 aa 37 ff 36 d4 a3 82 06 b7 59 | 0c 4c 61 6f 22 1c 48 b3 94 8b 71 14 8f 57 c8 03 | 31 41 b9 e3 a9 ea 8f 4d 51 15 4a 4c 5f 30 c2 c4 | 40 3e 6a 9e 7d 33 6d fb 91 1c b2 be 1e 33 35 f6 | 1a db ff 1e 8c 4e e8 12 71 d7 94 88 49 d8 37 d9 | cb 52 5b 22 87 0a c9 2f a4 1d 52 36 85 74 38 7e | de e2 44 79 f2 36 18 5e 82 cf d4 fb db 3f c9 35 | 36 d8 7b 5d 04 fb fa a4 fe b5 87 c5 e7 4e 90 d6 | 9f 17 87 48 32 5d ec 5c f7 e6 e2 39 17 1c 9c 2a | 29 00 00 24 8f bd ba cb 6b fc de c1 80 b9 fe c3 | b3 e0 ad b2 e9 fa 37 77 43 04 c6 81 1a 91 41 eb | 20 40 b9 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f d2 7c ae 7e 39 2b fb 54 2c 44 94 | 2e c2 37 67 8d e5 fe 8b 00 00 00 1c 00 00 40 05 | 12 b6 58 87 f0 a8 b9 d4 aa ae 6f 5a ed df 76 d7 | 1d 86 02 2c | state #109 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34c005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #109 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 | #109 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49609.406713 | resume sending helper answer for #109 suppresed complete_v2_state_transition() and stole MD | #109 spent 0.929 milliseconds in resume sending helper answer | stop processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c0251c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 c2 aa ad 50 91 d9 00 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #109 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #109 | rejected packet: | 53 c2 aa ad 50 91 d9 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #109: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0738 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_RETRANSMIT for parent state #56 | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #56 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #56 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49609.410889; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004428 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56e70 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #56 | libevent_malloc: new ptr-libevent@0x7fb36c0251c0 size 128 "road-eastnet-nonat-56" #56: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #56) | a2 38 96 b9 83 17 2c 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c 86 44 cb cd d5 e6 ca 09 de cc 09 a4 86 65 dc | 8e 5e 46 71 c3 c7 a8 ed be 75 06 f3 62 76 ba da | ce e9 f2 5f 5c 9e e4 0c 00 41 ba fd 53 1c 48 95 | 4a ae 4f cc 78 85 9f f0 fa 4c 13 7a c5 dc 96 cf | 8c 8f e9 26 db 93 6d c0 e4 2b 06 79 49 8a 1c 86 | 23 8a 00 51 5e 48 57 fe 2b c6 2d 2e cc 90 37 77 | 16 54 2d 1c 52 6e 88 f9 06 69 91 14 40 a3 3e 1f | 64 d7 73 f6 42 da 0d 73 5f 6b eb 89 ee 97 cd 6c | fd 1d 89 b8 17 39 77 3f b0 8b a8 13 2f f9 45 f4 | e3 ec 7f a4 35 be 17 3d c6 80 db be df d2 e9 bc | 39 46 6a e1 d0 06 ce 65 d8 13 18 bc e7 ef 70 ba | 17 09 9b 7f c9 d6 90 ff cb 53 6a 15 26 bc 84 d0 | 3c 63 f9 85 08 c0 bf 6b 92 00 26 8e 7e 39 47 fa | 15 93 5e ae af a3 95 34 bf f7 9a 05 60 79 f9 78 | fe 1c 09 6f 2a d7 a8 e6 dd 20 f6 bd f3 b0 a8 de | 56 b0 c1 b0 a8 8e c2 c9 51 e8 12 8c 23 35 5a 34 | 29 00 00 24 d3 9d 92 33 15 50 42 07 cb e2 93 fb | fa f0 4d 62 ce 86 f8 78 f6 e4 5a c4 46 ff 05 fd | 2d fe b5 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 f6 95 c7 6a 67 27 fa d2 0e 4e 26 | b1 fb ce d1 96 08 1b d4 00 00 00 1c 00 00 40 05 | 86 3b a6 fc 26 15 66 79 c8 2d 3b 9c 75 89 43 54 | 51 cf ae 75 | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | #56 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 38 96 b9 83 17 2c 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #56 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #56 | rejected packet: | a2 38 96 b9 83 17 2c 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #56: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d590 | handling event EVENT_RETRANSMIT for parent state #103 | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #103 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #103 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49609.428376; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500531 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #103 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 "road-eastnet-nonat-103" #103: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #103) | 20 80 ad df 5a 9a 13 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d a9 30 94 a8 d4 ad b7 ab 41 10 cf dd 34 d7 45 | db 9e 99 58 0d 72 d8 74 bd 3c 1d 4a 98 9b ff 38 | 08 61 4e c7 a6 75 c7 cd ff 21 41 e1 5d c2 9d c6 | 7c 47 d1 97 8a 16 0e 0e 3c 96 7a d8 10 82 5b 8a | 00 b3 29 44 ad 13 12 a6 fb af 01 2d 66 5c e1 02 | 4b 01 af e5 ba 61 e3 fe 71 46 2a af 0d 0d 2a 26 | f8 12 e9 10 f0 8f ca f1 fd 82 c7 ea fa 46 02 26 | b6 95 72 2c b1 d7 c7 46 5a e6 4a 07 87 39 fe e7 | c6 a1 7d 2d 52 a4 c7 a2 b5 e7 2f 2b 1d 48 eb d9 | 7c e8 c4 cb da 19 e0 04 20 53 7b 3c 73 86 a7 70 | c7 09 d6 f9 52 be 12 99 31 58 c4 f8 6c 8b 22 3a | c5 da 0c e1 bd 65 73 c3 27 14 e7 0f ae a0 e8 45 | 58 e0 c3 02 1b 48 ee 20 03 b9 0c ec ad e0 21 05 | 1b 38 52 4b dd 92 f0 58 d2 29 eb 4e be 57 49 4d | 5d 0f a4 01 4b 76 95 2b 60 de d3 82 01 e6 15 d8 | 32 f5 60 60 88 d1 83 bc a6 c2 db 62 29 b3 d7 5e | 29 00 00 24 fb ef 9e 44 e4 82 6e 41 3f 46 3a c8 | d1 69 b9 34 c6 14 27 a3 23 52 4c 58 0c 66 b4 10 | 6a d0 69 ee 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 a3 d6 8d 6e 26 8b a3 26 28 d5 ff | 4a 28 a8 bb 6f af 66 22 00 00 00 1c 00 00 40 05 | e5 6e de 91 25 32 b5 3b 38 9d 70 ef 64 14 11 f9 | c0 c1 79 e6 | libevent_free: release ptr-libevent@0x7fb3480180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d590 | #103 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 80 ad df 5a 9a 13 26 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #103 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #103 | rejected packet: | 20 80 ad df 5a 9a 13 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #103: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #10 | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #10 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #10 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49609.433699; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.016876 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d590 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #10 | libevent_malloc: new ptr-libevent@0x7fb3480180b0 size 128 "road-eastnet-nonat-10" #10: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #10) | 6b e4 01 c3 ed 3e ed 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2b 6a 85 96 38 f3 d3 4e 55 03 ae f3 d4 0f ad 38 | 83 2b 8b 92 04 a5 95 20 97 dc f8 34 30 38 91 0d | b9 c4 11 ab e9 a9 94 d4 16 5b f1 c4 91 68 3e fa | fb b4 36 73 13 7d c7 d0 75 c4 f9 ef fd 92 5b cc | aa e4 77 57 96 44 12 f0 38 b5 1d ad 33 4d 65 c3 | 93 63 ce 14 d7 d8 25 ef f8 0d ae dd 78 dc 8e b7 | 7e c2 3d a5 d5 d3 09 2b ad 9d bd a9 6f 55 df a1 | 6f b4 2e cf 9f fe 7e ae 25 58 a2 81 78 bb f7 29 | dd 53 e8 91 13 65 1e 1e 60 9c d0 15 9f bb 76 ed | ab 75 ce 2a 44 05 fa b1 a3 a7 39 d0 53 b7 7f 4f | e0 b7 8f a6 98 8c 07 ab a8 32 37 42 0c 8c 3d a7 | fc 6c 53 ac 60 2a 04 67 31 66 47 13 4f bc 34 8c | 30 51 26 7c 6a 36 76 70 15 29 7e 23 fc ac 0e 32 | 57 5c bb d9 b8 c0 27 61 5e fd 8f bc 73 83 16 ba | bf 42 32 51 56 3e 21 8b 6d 4a af 80 6d 52 1f d5 | 84 cd 2e ff dc c3 b8 a0 b2 26 7e 0c b7 e0 d0 d6 | 29 00 00 24 23 a8 6c e8 37 a1 47 09 f8 10 83 5c | 3f e5 80 de e6 d0 ee 9e 1f f2 6d 6a 1a c1 8c be | 9a 4a a5 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 14 ac ca 29 d0 75 c4 40 2c aa 37 | f4 15 d0 3b ed 2d a9 e1 00 00 00 1c 00 00 40 05 | 85 e0 a4 b5 9f 75 13 0f 6d a9 52 94 7d fa 0b 2d | 65 f2 06 03 | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #10 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b e4 01 c3 ed 3e ed 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #10 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #10 | rejected packet: | 6b e4 01 c3 ed 3e ed 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #10: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1af10 | handling event EVENT_RETRANSMIT for parent state #97 | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #97 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #97 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49609.442031; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001806 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #97 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-97" #97: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #97) | 7c 9c 8d d2 c5 3c 3b 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 98 e5 dd bd 5b c0 22 fb 24 a8 9d 4b ca 6c 72 | 78 61 7f 8f 02 15 b8 56 b3 c2 d4 89 90 42 e9 ae | b3 56 28 83 de be c5 dc f3 99 87 bf 7c 20 cf 1e | 80 26 a3 f6 7f d4 66 5c a2 37 d4 2d 88 37 5b ee | 37 eb f6 f3 73 47 4e f2 3e 1b de e1 36 54 bd 6f | 97 78 ce cb 16 0a da 34 fa 11 bc e7 e5 27 11 6b | 72 0d 9c de de 06 66 d8 74 64 a9 64 0b 12 b1 e7 | 15 84 3a 8c d9 6a d5 46 6c 00 4b f9 69 74 47 d1 | f3 79 bc d4 c9 0f 58 86 00 a5 0b 46 4c d7 20 78 | 99 ce 0d 0d cd 99 98 27 cc ce 50 e5 63 fc 25 ec | 4a 78 c1 76 a6 35 df cd 30 8a 57 10 1a b9 c6 85 | f5 05 46 77 76 2a ba 40 b5 da 98 c0 91 e5 03 c9 | 47 7d 79 56 d6 82 48 c6 a2 b4 f6 fc f6 16 30 98 | d9 b0 79 c5 33 a4 80 eb bb 99 51 9a 3b 3b ae a3 | 9b a3 5f 5f ce 23 78 fd 36 29 21 9b 24 8f 30 93 | 1f 0b 71 91 41 28 b6 d5 e2 dd ce 67 83 67 83 41 | 29 00 00 24 4a 40 88 f3 3a ca ff 58 9b 48 04 9a | a8 d0 f5 15 e8 12 b6 3b 4a 95 b2 73 79 da d4 a0 | df 94 6f b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 5b 76 c7 df cc 29 e7 8f 6d d6 7a | e3 d4 c1 e2 a2 33 fe 59 00 00 00 1c 00 00 40 05 | 63 90 91 6f c8 44 50 2a ff 12 5c 17 cd fa e6 2d | 07 cd 17 d6 | libevent_free: release ptr-libevent@0x7fb3600180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1af10 | #97 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 9c 8d d2 c5 3c 3b 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #97 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #97 | rejected packet: | 7c 9c 8d d2 c5 3c 3b 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #97: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #86 | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #86 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #86 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49609.456375; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002003 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1af10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #86 | libevent_malloc: new ptr-libevent@0x7fb3600180b0 size 128 "road-eastnet-nonat-86" #86: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #86) | bc cc 1d a8 6f 14 2f d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 02 f4 30 81 01 a2 84 c7 c8 75 14 73 a0 b4 f1 | ce 00 5c 2a 70 74 58 bb 3e a0 6e e2 4f 0a 9f 83 | 08 76 97 6b fa 62 74 7d db ae df 90 de 69 8c b2 | 0e 6c a5 3a 87 61 1a 3a 8f 5d a0 5a ba ab 91 5a | 1c 85 49 b3 c5 25 e7 4c 6e 03 2b ac 66 42 56 f1 | d7 31 b5 bb 5b 45 b9 dd 90 6d ee 07 cc 7c f5 62 | 74 01 c5 67 95 ba 42 bf 74 f6 d2 a1 03 af 1b fd | e4 7f bc c7 c5 75 0a a8 6e 5c 9e 6c 4f 5b c1 73 | df 6f 2d 86 ef d9 7b 7f 50 00 74 9f 02 e6 99 af | 69 db f9 f3 80 3c 99 58 33 58 03 46 c0 6e d1 8c | d1 aa bb ba e8 f4 a9 85 5b aa 0d 22 6e e9 62 24 | 0d 2c d4 54 19 e8 97 d8 e7 d3 1e 75 fe 1d 11 bb | 8a ef b3 15 49 d2 bd 11 ce 93 3c 78 52 c8 0e 77 | 1d b3 5a f2 76 6d 63 9a e0 92 62 06 a0 bc 29 93 | a6 78 17 fe 37 4a 17 27 33 46 cd 3f 1c 77 4a d6 | df 68 38 cd 2b 58 7b 28 94 f9 86 34 46 7d e4 ec | 29 00 00 24 3f 6f 33 90 58 31 9c 9e c4 12 e4 33 | 9b 9e 11 d9 fa de 80 3a 9a 7c 3d 2b 3e 4c e8 aa | 92 49 b7 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 27 7b 26 e6 59 48 3b 7c 9f 7a cf | bb 52 6d 94 e2 1f 43 00 00 00 00 1c 00 00 40 05 | 49 8d b2 ff d2 6f bf 71 ec 03 78 4c 49 00 83 b0 | 23 90 3a 8b | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #86 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc cc 1d a8 6f 14 2f d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #86 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #86 | rejected packet: | bc cc 1d a8 6f 14 2f d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #86: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0669 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-110" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-110' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #110 at 0x557d46a6a950 | State DB: adding IKEv2 state #110 in UNDEFINED | pstats #110 ikev2.ike started | Message ID: init #110: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #110: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #110; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-110" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-110" IKE SA #110 "road-eastnet-nonat-110" "road-eastnet-nonat-110" #110: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-110 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-110": constructed local IKE proposals for road-eastnet-nonat-110 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 110 for state #110 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb368005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #110 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 | #110 spent 0.216 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-110" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.338 milliseconds in whack | crypto helper 11 resuming | crypto helper 11 starting work-order 110 for state #110 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 110 | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 110 time elapsed 0.001275 seconds | (#110) spent 1.28 milliseconds in crypto helper computing work-order 110: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 110 for state #110 to event queue | scheduling resume sending helper answer for #110 | libevent_malloc: new ptr-libevent@0x7fb3600251c0 size 128 | crypto helper 11 waiting (nothing to do) | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #57 | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #57 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #57 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49609.508798; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.000958 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f0aa0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #57 | libevent_malloc: new ptr-libevent@0x7fb35000cf80 size 128 "road-eastnet-nonat-57" #57: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #57) | dc 73 20 b1 64 22 3b 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 2f 93 7c 8a da 22 fa 03 a0 fd 43 de d5 8f 84 | 5a 41 29 20 95 01 7c 7c 28 a1 27 22 f2 08 de cf | e0 98 16 08 1c e5 25 a6 bd bd 17 32 15 8e 0a 84 | f3 a2 7e 8a 0b 23 85 bf 7a b1 94 6d 13 0e bc 89 | 00 57 96 19 37 39 1b 02 a4 75 0f 94 90 d1 10 4b | e3 d2 66 0a 4f b7 c6 79 75 d4 b5 7d e4 36 1f c8 | 04 58 22 28 f1 96 40 a5 11 63 03 12 07 da 6e c4 | d6 87 58 17 eb bc 28 31 1f 88 9d a5 0c ef e1 d5 | b2 c3 d0 ee 08 43 a9 fb b1 8f de 78 3c c7 ae 7f | e9 04 ce d2 ab ca 37 0c f1 2a 72 1c 60 e7 51 7f | f2 49 54 44 b1 5f 43 7b 10 10 64 5c c3 44 75 d6 | 07 11 18 89 6c 1c 54 ef 0a c3 7f 69 cd 21 c7 ca | 32 33 4c f8 00 03 d2 d4 0f 41 96 9b 82 7d 76 81 | 10 2f 53 dd cd 91 0b 3d ff 38 8f 40 80 5c 77 b7 | 3d 66 a7 7b a1 8f 9e 2d 33 51 5c 72 92 e6 a3 7a | 40 cc ae 39 5f df 20 2b 13 8b bd 4c 81 23 66 a3 | 29 00 00 24 ad 63 ea 8e 7a 7b c2 d1 15 38 47 f0 | b3 a0 1a e0 85 11 f2 24 75 cc 3c d8 47 12 da f1 | 4a 24 d2 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 1b 4d 24 72 19 56 63 62 33 64 a7 | 66 22 df c0 bd 29 cc 1c 00 00 00 1c 00 00 40 05 | 7a aa 57 0f 26 4b 8b c1 eb 1a a3 08 c1 cf b1 49 | 59 b9 d4 8a | libevent_free: release ptr-libevent@0x7fb378012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #57 spent 0.18 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #110 | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 110 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #110 | **emit ISAKMP Message: | initiator cookie: | 3a df d4 0d 3f 72 b9 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-110 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9c 51 e2 9f 86 58 b1 8c 95 ac 68 08 4c 4a f6 70 | ikev2 g^x ad a1 89 82 51 9f 97 f7 49 8c 33 6b 14 6a e8 d8 | ikev2 g^x 5d 56 92 c8 3c 2c 40 17 32 2d 8f e8 79 30 ee 40 | ikev2 g^x f9 ba 9e a6 39 a8 9f 6a 60 30 36 fa 91 73 4e bf | ikev2 g^x e6 d5 bf ce 9d 89 72 4d e1 c3 4f 68 a3 0e 2d 22 | ikev2 g^x 55 9f 70 0b d2 5a 8e 49 bb 26 55 db 7b 06 39 59 | ikev2 g^x 26 09 73 11 d4 24 0c 12 fd 4f 4c 65 6c 3c af 90 | ikev2 g^x 8b 17 1f a8 52 96 38 96 91 03 13 81 89 15 d8 cf | ikev2 g^x 89 39 0b 98 8d cb b9 22 57 8d d7 cd 73 bd 42 b5 | ikev2 g^x c1 8a b1 55 88 ee 90 bf 86 98 c5 68 56 01 34 02 | ikev2 g^x ea ea cd ee 0d 3a 71 7c d0 06 82 a7 ca 34 05 ec | ikev2 g^x e1 16 4c 22 f3 b3 ca 01 1c d1 2d c9 10 65 0e d7 | ikev2 g^x 83 4d bc 53 a1 a2 68 8a 44 da c7 16 6f 1e 28 70 | ikev2 g^x e8 f3 08 87 27 18 70 75 bc 4e bd 4f 1d 1a 9f 84 | ikev2 g^x ef 78 e6 04 c6 13 ce e5 f8 3c cb 1e ba 12 8a 0a | ikev2 g^x 59 36 fd 3c 70 1f 1b ce d5 b3 7d ea 00 09 cd 9d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 58 d9 16 9f 6f 84 74 3f e6 2f bd ae 97 8a 68 2c | IKEv2 nonce 39 11 78 2c 3d 3c 5e 7b f6 a4 c9 df f7 87 68 92 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3a df d4 0d 3f 72 b9 6f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6e | natd_hash: port= 01 f4 | natd_hash: hash= e9 f6 22 5f bf 4c e5 cb 6e 52 c3 e8 bb 73 1b e3 | natd_hash: hash= 52 cd b5 da | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e9 f6 22 5f bf 4c e5 cb 6e 52 c3 e8 bb 73 1b e3 | Notify data 52 cd b5 da | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3a df d4 0d 3f 72 b9 6f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 55 f2 83 9d d0 ff 8f 70 ef 45 0c 6f 49 6d a9 68 | natd_hash: hash= 5e 51 a7 34 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 55 f2 83 9d d0 ff 8f 70 ef 45 0c 6f 49 6d a9 68 | Notify data 5e 51 a7 34 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #110 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #110: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #110 to 4294967295 after switching state | Message ID: IKE #110 skipping update_recv as MD is fake | Message ID: sent #110 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-110" #110: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.110:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #110) | 3a df d4 0d 3f 72 b9 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 51 e2 9f 86 58 b1 8c 95 ac 68 08 4c 4a f6 70 | ad a1 89 82 51 9f 97 f7 49 8c 33 6b 14 6a e8 d8 | 5d 56 92 c8 3c 2c 40 17 32 2d 8f e8 79 30 ee 40 | f9 ba 9e a6 39 a8 9f 6a 60 30 36 fa 91 73 4e bf | e6 d5 bf ce 9d 89 72 4d e1 c3 4f 68 a3 0e 2d 22 | 55 9f 70 0b d2 5a 8e 49 bb 26 55 db 7b 06 39 59 | 26 09 73 11 d4 24 0c 12 fd 4f 4c 65 6c 3c af 90 | 8b 17 1f a8 52 96 38 96 91 03 13 81 89 15 d8 cf | 89 39 0b 98 8d cb b9 22 57 8d d7 cd 73 bd 42 b5 | c1 8a b1 55 88 ee 90 bf 86 98 c5 68 56 01 34 02 | ea ea cd ee 0d 3a 71 7c d0 06 82 a7 ca 34 05 ec | e1 16 4c 22 f3 b3 ca 01 1c d1 2d c9 10 65 0e d7 | 83 4d bc 53 a1 a2 68 8a 44 da c7 16 6f 1e 28 70 | e8 f3 08 87 27 18 70 75 bc 4e bd 4f 1d 1a 9f 84 | ef 78 e6 04 c6 13 ce e5 f8 3c cb 1e ba 12 8a 0a | 59 36 fd 3c 70 1f 1b ce d5 b3 7d ea 00 09 cd 9d | 29 00 00 24 58 d9 16 9f 6f 84 74 3f e6 2f bd ae | 97 8a 68 2c 39 11 78 2c 3d 3c 5e 7b f6 a4 c9 df | f7 87 68 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f6 22 5f bf 4c e5 cb 6e 52 c3 e8 | bb 73 1b e3 52 cd b5 da 00 00 00 1c 00 00 40 05 | 55 f2 83 9d d0 ff 8f 70 ef 45 0c 6f 49 6d a9 68 | 5e 51 a7 34 | state #110 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb368005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #110 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 | #110 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49609.509774 | resume sending helper answer for #110 suppresed complete_v2_state_transition() and stole MD | #110 spent 0.667 milliseconds in resume sending helper answer | stop processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3600251c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 73 20 b1 64 22 3b 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #57 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #57 | rejected packet: | dc 73 20 b1 64 22 3b 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #57: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0913 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a df d4 0d 3f 72 b9 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #110 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #110 | rejected packet: | 3a df d4 0d 3f 72 b9 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #110: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0758 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #104 | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #104 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #104 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49609.512426; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.502191 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #104 | libevent_malloc: new ptr-libevent@0x7fb3600251c0 size 128 "road-eastnet-nonat-104" #104: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #104) | c8 97 67 f1 1b 46 da 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 e4 3d 30 95 de e5 8c 73 da 01 a0 e2 a0 c0 5e | ab 07 43 87 84 24 88 49 ca d1 13 72 cc 7b 38 93 | 5a ab ff 3c 3d d2 b7 a9 16 19 a5 56 5c 01 9f 05 | 2f 70 be 2d 9d 04 2c f7 80 b3 5f 24 70 c4 0d 58 | b9 f4 31 d3 bd 25 62 64 07 37 4c 59 6f a0 74 90 | e2 15 77 64 4c 06 2d 41 bc 70 c3 30 0a 01 9b df | a0 88 42 69 26 57 a1 25 9a c0 ee 4c ee 57 50 5f | 0c 95 2a a5 72 cb d8 81 34 25 75 ee 4d 04 23 27 | e9 da 7c 36 60 32 11 97 39 d8 f4 3f 96 13 6c 72 | 19 1d 43 e4 f0 4a 92 88 29 4c 84 63 63 7d 3a aa | 3f 23 85 5a 73 71 01 2f 63 e6 b3 a0 2d 7f 75 e1 | e9 d4 1c 1a 83 67 2e 29 49 85 8a a1 31 04 a5 31 | 1b e6 35 a4 14 80 ac 17 6c 11 db 3d c3 88 57 d2 | 55 c5 b6 4e 2c 2b 58 d9 50 1f f2 54 b6 50 63 00 | d4 ad 6c 3c 60 cd 52 3b 9b 0f 69 cc f2 8f 29 dc | 29 5e 75 22 60 a0 c9 59 5b 00 1a 98 02 fb 23 0f | 29 00 00 24 16 fd b9 d2 33 64 36 d1 f0 bb fa 0d | d8 4a 7e 7c 2a 2e d1 92 40 9f bf f6 34 ac 7a 15 | 2b 49 c7 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 28 db 0c 20 22 dd ba ac 9b fa 10 | b6 bd 27 81 bf 6a a0 a8 00 00 00 1c 00 00 40 05 | 90 9a 71 02 e5 61 58 ec fb 0f 5f 95 cd f2 2e 99 | e5 4b 54 60 | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #104 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 97 67 f1 1b 46 da 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #104 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #104 | rejected packet: | c8 97 67 f1 1b 46 da 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #104: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3fc10 | handling event EVENT_RETRANSMIT for parent state #87 | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #87 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #87 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49609.519762; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003646 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #87 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 "road-eastnet-nonat-87" #87: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #87) | a2 df 19 46 98 d4 bb 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de ac a7 56 a2 bc 95 5a 6c 57 c8 2b e0 20 68 16 | a2 ff 5a bd 83 94 6a 4d 58 8c b2 a4 d4 76 ed fc | 0f 4a 9b b9 df 7c 6c 34 8f 70 fd e9 a0 17 cd ff | 42 ae c6 35 53 50 df 4f 92 fb b8 ae 34 b4 21 4a | 96 f4 d2 6a f3 c3 2c b1 14 ce 42 da 82 6b e3 0d | db 7a 9e a9 08 f5 73 b2 1d 45 e9 bc fe 79 e6 2d | 2f 0a 64 4b ee 86 b7 4b 3f 77 d9 fd c5 b0 bd d9 | f0 f9 4a 67 c3 b1 50 bb ba e6 76 27 0e 9b 80 ac | ac a5 3d ed e4 7f 3e ce 9b 7e 70 ae 76 56 31 41 | 17 98 86 1f 1f 85 2b 2b b2 36 28 19 25 14 37 3e | bb a6 a5 e3 f0 64 b9 9c 0b af e9 c8 fc dd 9d 10 | 05 4f 6e 73 4c 08 a1 b5 54 a0 ae e0 d5 30 bc af | af 63 ef 9e e4 70 09 3a 1e 60 6f c5 bb 77 c5 0b | 60 c8 18 55 dd 77 cc 86 3f 7c 34 56 80 93 c4 30 | 61 51 d7 11 b2 4d 6f 17 c0 8c 7f d5 08 fa 5f 63 | d7 b3 cd 14 9f 3a 9d 07 13 ee 34 e9 84 52 68 1b | 29 00 00 24 8b f5 b9 e8 72 8a d8 5e 1a d6 70 1a | a6 5f 3d 02 9f 40 bc e8 9c c3 88 16 89 ec af ca | b1 90 6f 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 83 d5 c2 93 bc 76 7b c0 f5 6a f5 | c6 03 a7 0c 52 da b8 7c 00 00 00 1c 00 00 40 05 | 9f 00 07 ca 6e 64 62 64 56 d5 c5 aa 95 9f c8 6b | 83 2b 36 93 | libevent_free: release ptr-libevent@0x7fb34001a190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3fc10 | #87 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 df 19 46 98 d4 bb 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #87 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #87 | rejected packet: | a2 df 19 46 98 d4 bb 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #87: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0649 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35800d120 | handling event EVENT_RETRANSMIT for parent state #98 | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #98 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #98 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49609.526109; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001992 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3fc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #98 | libevent_malloc: new ptr-libevent@0x7fb34001a190 size 128 "road-eastnet-nonat-98" #98: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #98) | 36 f6 17 30 89 34 87 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e de 22 15 b8 37 99 8a 19 60 74 d9 cc fb 93 74 | 46 52 5b 4c b2 15 42 20 b8 92 87 ba 2d f3 d7 43 | b5 37 b0 ea 4d f5 7a 45 62 c7 3f 47 fb 44 64 d3 | e1 f9 e0 4b e7 fb 3e 3d b1 04 53 7b 67 35 99 55 | 77 f9 c2 de 1c 5e 4e 46 02 3b e5 0c e9 31 90 64 | 6e cb e0 dd 1a 59 99 ef 3d a7 c1 9b 74 f9 45 3f | 99 cd de c7 d0 13 5f 2b 11 ac cd ff c9 47 2e 86 | 69 0d e8 ec 31 64 37 7f 01 74 30 f7 db 0e d0 fb | 8b 6d 9d cc 98 7f 1a b4 87 7d bf 2e 19 53 89 24 | 00 4f 0a 93 5d 06 c9 01 d3 dd 9f 4d 48 ee ba 48 | 79 5c 5f f3 cb 01 ba a7 ec 71 ed fd 64 af 41 a6 | ff 80 dd aa 0c ae 06 5c 0b a3 1c 56 84 5b 6c 26 | fd ff b3 07 94 15 1d 68 35 03 8e 60 07 84 12 f9 | ee d9 d1 91 a2 f4 75 f6 9e 29 11 0a 54 bc 2f 41 | 2c ea 22 ab ab 32 6a 0c 62 23 b1 4a 4b 29 bb 22 | de a9 03 f4 17 e0 39 72 79 31 e0 0a 30 fa 14 a0 | 29 00 00 24 dc e2 b9 cb c5 4c 15 ab 06 6c 97 a6 | 72 6b 55 8f 7d 14 aa 13 19 ae 9e 9d 27 a3 3a 17 | 86 0f 7c a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 94 a8 82 2a 1f 7d 1b 29 07 9f 80 | 75 97 d7 a2 ab 24 e8 8d 00 00 00 1c 00 00 40 05 | b8 4f 85 79 77 db f6 74 dd c9 e6 fd e8 91 c3 41 | 66 c0 f7 3b | libevent_free: release ptr-libevent@0x7fb358012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800d120 | #98 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 f6 17 30 89 34 87 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #98 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #98 | rejected packet: | 36 f6 17 30 89 34 87 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #98: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #11 | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #11 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #11 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49609.559471; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.018932 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #11 | libevent_malloc: new ptr-libevent@0x7fb358012840 size 128 "road-eastnet-nonat-11" #11: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #11) | c8 da f8 5c 6a b5 39 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 9a 4c 70 8e 88 d1 64 8d ca 55 b5 43 ac 3e 50 | 7f 03 c2 7c 99 61 59 48 6a 23 b9 2d d3 3a 08 ba | 31 66 90 b0 52 32 93 73 23 bd 35 f2 7d dc a9 8f | 88 4e 43 5d 55 55 8f 7b a2 ea ce 35 e9 07 bb 71 | 1f 5d f0 9c c9 20 a4 7c c9 a5 33 c5 b0 c5 fd 99 | f9 36 f9 d6 da 33 fa e1 2d e1 b8 55 01 35 5b d0 | b9 e1 af af a6 38 ef b1 36 65 8c 44 00 8a 8f f0 | cb 31 ec d5 89 23 22 d8 6f 57 3d 9d af 74 08 ea | 86 b5 7c 8c 76 9b 8d 04 5b 27 f9 7a 8d ed d8 36 | 77 1c 37 9a 9e c6 40 9c bb 1e 24 77 dc 4c b2 dc | 76 0c 2f 2d 23 9c f1 63 a5 64 8f c0 7e 6e 08 97 | 35 1b 8e 35 d5 a9 e6 fc d1 af 35 f0 b0 21 d4 42 | 5d 1b 4e c6 75 04 f0 3a f4 cc 11 09 3f ff 2d c6 | bf fa 44 99 e7 46 de 13 f5 47 98 02 47 dd 33 15 | 52 36 1a 46 d4 d8 ce dd 1a ad eb 4f 6b 1d 9e 82 | 8f b0 52 7f b0 b6 aa 8b 85 c1 d8 ed 73 6b 09 85 | 29 00 00 24 71 b3 70 95 41 f1 8a 3d 3f e8 5d 7c | 6b 52 d9 59 47 90 bd 2c 17 95 9e 28 b0 5d 83 17 | df a2 84 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 c8 ac c9 12 67 90 a0 d8 a9 94 84 | cc d4 e1 68 d0 49 e5 0f 00 00 00 1c 00 00 40 05 | a0 0d 8b f9 78 72 8b b9 69 a6 ab 0f 8f 46 28 db | d3 de 3a b5 | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | #11 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 da f8 5c 6a b5 39 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #11 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #11 | rejected packet: | c8 da f8 5c 6a b5 39 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #11: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-111" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-111' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #111 at 0x557d46a6bf10 | State DB: adding IKEv2 state #111 in UNDEFINED | pstats #111 ikev2.ike started | Message ID: init #111: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #111: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #111; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-111" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-111" IKE SA #111 "road-eastnet-nonat-111" "road-eastnet-nonat-111" #111: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-111 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-111": constructed local IKE proposals for road-eastnet-nonat-111 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 111 for state #111 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb354005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #111 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 | crypto helper 16 resuming | #111 spent 0.129 milliseconds in ikev2_parent_outI1() | crypto helper 16 starting work-order 111 for state #111 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 111 | RESET processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-111" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.231 milliseconds in whack | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 111 time elapsed 0.000965 seconds | (#111) spent 0.968 milliseconds in crypto helper computing work-order 111: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 111 for state #111 to event queue | scheduling resume sending helper answer for #111 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #111 | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 111 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #111 | **emit ISAKMP Message: | initiator cookie: | db b9 51 1a 0a cf 53 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-111 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 03 96 48 dc 9a 43 6a d5 ae 03 52 b4 84 8e 3e 89 | ikev2 g^x 00 f6 64 fe 26 5b b6 db 11 e1 9c 06 8a 4f 1d 0d | ikev2 g^x cd 6f a7 c8 64 23 7a a7 23 6f 45 51 c6 b1 a2 cd | ikev2 g^x 04 59 b4 88 b4 33 b7 f5 29 c7 d8 52 6d 1c cb a8 | ikev2 g^x 42 75 af 22 25 ca 35 12 a4 f6 ac 0c 2b 80 3f 01 | ikev2 g^x bd fa ce f1 3e 58 78 41 9a d7 72 cc 7c 4c b5 a2 | ikev2 g^x 56 ce 00 40 9d 2a 87 6a d3 b8 b7 fb 45 19 d9 27 | ikev2 g^x 33 38 86 30 4d 76 55 5a 60 ea 7e 6f 94 b2 e8 37 | ikev2 g^x d0 79 a6 3c 48 bb 9f d4 de 11 46 70 8b ed 34 0e | ikev2 g^x 15 56 a1 c3 7c 1c f5 7b 9a 67 eb 7c ed e1 17 20 | ikev2 g^x 66 f5 ab 00 0b 09 22 9e 86 9e ea d1 22 bb 69 09 | ikev2 g^x 19 11 1b ae 5d 6f a7 6f aa f4 bc 2d bf a0 df 13 | ikev2 g^x 3d bb c4 b2 54 23 e0 47 22 8c a9 37 14 2d 77 13 | ikev2 g^x 46 7b e2 07 7c 12 26 7e 27 76 b7 f9 5b 81 4d b4 | ikev2 g^x 81 97 8e fa 60 cb 4d fd c3 c9 15 c0 dd 03 c9 a5 | ikev2 g^x 4e ed a7 b5 aa a5 47 31 bc c5 72 e4 a7 3b 8a 6d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce dd ff c8 1b e8 28 de a6 83 fb aa 57 7e 6e 8e c5 | IKEv2 nonce 12 ea 53 ce c6 ab e5 e4 50 89 14 5a d7 45 05 cf | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= db b9 51 1a 0a cf 53 ee | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6f | natd_hash: port= 01 f4 | natd_hash: hash= 76 7b fa 07 36 ff 6e 35 97 9c d7 f0 58 a3 9d ce | natd_hash: hash= 15 df 78 68 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 76 7b fa 07 36 ff 6e 35 97 9c d7 f0 58 a3 9d ce | Notify data 15 df 78 68 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= db b9 51 1a 0a cf 53 ee | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 32 ea 3f b0 b0 6d 1e bd 58 89 67 45 00 2c 5a 38 | natd_hash: hash= ea f9 ac 8b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 32 ea 3f b0 b0 6d 1e bd 58 89 67 45 00 2c 5a 38 | Notify data ea f9 ac 8b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #111 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #111: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #111 to 4294967295 after switching state | Message ID: IKE #111 skipping update_recv as MD is fake | Message ID: sent #111 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-111" #111: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.111:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #111) | db b9 51 1a 0a cf 53 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 96 48 dc 9a 43 6a d5 ae 03 52 b4 84 8e 3e 89 | 00 f6 64 fe 26 5b b6 db 11 e1 9c 06 8a 4f 1d 0d | cd 6f a7 c8 64 23 7a a7 23 6f 45 51 c6 b1 a2 cd | 04 59 b4 88 b4 33 b7 f5 29 c7 d8 52 6d 1c cb a8 | 42 75 af 22 25 ca 35 12 a4 f6 ac 0c 2b 80 3f 01 | bd fa ce f1 3e 58 78 41 9a d7 72 cc 7c 4c b5 a2 | 56 ce 00 40 9d 2a 87 6a d3 b8 b7 fb 45 19 d9 27 | 33 38 86 30 4d 76 55 5a 60 ea 7e 6f 94 b2 e8 37 | d0 79 a6 3c 48 bb 9f d4 de 11 46 70 8b ed 34 0e | 15 56 a1 c3 7c 1c f5 7b 9a 67 eb 7c ed e1 17 20 | 66 f5 ab 00 0b 09 22 9e 86 9e ea d1 22 bb 69 09 | 19 11 1b ae 5d 6f a7 6f aa f4 bc 2d bf a0 df 13 | 3d bb c4 b2 54 23 e0 47 22 8c a9 37 14 2d 77 13 | 46 7b e2 07 7c 12 26 7e 27 76 b7 f9 5b 81 4d b4 | 81 97 8e fa 60 cb 4d fd c3 c9 15 c0 dd 03 c9 a5 | 4e ed a7 b5 aa a5 47 31 bc c5 72 e4 a7 3b 8a 6d | 29 00 00 24 dd ff c8 1b e8 28 de a6 83 fb aa 57 | 7e 6e 8e c5 12 ea 53 ce c6 ab e5 e4 50 89 14 5a | d7 45 05 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 7b fa 07 36 ff 6e 35 97 9c d7 f0 | 58 a3 9d ce 15 df 78 68 00 00 00 1c 00 00 40 05 | 32 ea 3f b0 b0 6d 1e bd 58 89 67 45 00 2c 5a 38 | ea f9 ac 8b | state #111 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb354005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #111 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 | #111 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49609.579404 | resume sending helper answer for #111 suppresed complete_v2_state_transition() and stole MD | #111 spent 0.563 milliseconds in resume sending helper answer | stop processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb364024ff0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db b9 51 1a 0a cf 53 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #111 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #111 | rejected packet: | db b9 51 1a 0a cf 53 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #111: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0676 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #88 | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #88 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #88 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49609.58661; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003229 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a60690 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #88 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 "road-eastnet-nonat-88" #88: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #88) | 4f b4 b9 96 90 ac 87 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 55 7d 2b ef 81 b7 ac 80 5f 94 f2 45 3d 30 4f | 1d db a2 af 47 67 b7 7c be e3 bc 36 9a 72 1e e6 | 4f 47 07 85 4a dc c2 8c 23 63 be 8e ef c5 79 8f | 9f 5c 4f 9d 4f 85 09 c3 d7 cd 09 d7 9c 93 a4 d2 | cb 1f 73 cb f5 4a 96 ce 2b f9 75 2e 3c f9 67 24 | b7 40 01 a2 9a 5a 3a b5 1b 81 51 3d 6c dd 22 93 | a7 84 80 70 90 68 0a 70 88 ae 95 b6 8d ea e4 d4 | 54 cf 85 55 04 a4 94 5d cc ba 3d e2 31 46 75 ff | 7c 75 77 1a 1b 6c e0 fd b6 75 6b 40 9a b7 ac 36 | 39 45 a5 48 a8 96 90 52 cb 62 b2 ca a6 08 23 37 | d2 f9 be 02 8c 54 29 91 80 43 1c 2d 5f 25 44 25 | ff e7 b9 7d 14 3d 11 4a a3 ab 8e 4f b9 9b a1 4d | 91 68 13 50 1e 3b 88 4e ac 27 30 6a c7 2b ef cb | 81 87 56 8d dd bd 93 b9 d2 77 ea ab 8e f7 84 26 | 38 de 93 6d 11 fc f2 e4 c4 b3 df 42 49 8c 39 27 | 12 40 d4 6f db 31 51 71 3a c5 b3 bf 78 b4 72 ae | 29 00 00 24 d0 42 a3 31 c3 ed 67 67 3c 0c 74 87 | e1 18 ba c3 96 b7 23 3a c3 28 fa 83 32 6a f8 22 | c5 3d ce 47 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 13 5d 9d 57 2e de f0 16 54 40 11 | ce e4 63 b7 5f de e1 17 00 00 00 1c 00 00 40 05 | 73 d1 3a 60 f3 dc 99 f7 0c 4b 4c 3e d1 f1 65 ae | 8d f5 93 01 | libevent_free: release ptr-libevent@0x7fb34c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | #88 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f b4 b9 96 90 ac 87 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #88 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #88 | rejected packet: | 4f b4 b9 96 90 ac 87 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #88: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0793 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ddbf0 | handling event EVENT_RETRANSMIT for parent state #105 | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #105 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #105 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49609.592944; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500569 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #105 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 "road-eastnet-nonat-105" #105: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #105) | f1 44 62 e8 b2 96 b0 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 2c 0f 43 7a b6 95 d2 da 02 c7 c3 b7 c1 84 3a | 45 85 a1 11 41 47 db 34 2a fb b4 18 d1 bf ea 06 | 1a 10 f5 e2 f0 2e 22 4f eb 14 58 fa 5c 28 c5 97 | e2 ae 87 b0 f4 b2 19 f2 c0 72 df 2a 2b df 2e 30 | f5 e9 e3 d6 5a 85 fc e6 1c 1c 2d 36 25 55 ff d7 | e9 f8 4f e9 95 2f bf 23 70 c4 27 2f 59 aa 5a d4 | 00 1b f9 ac 9d 1b 73 43 66 d9 a7 24 55 56 33 f4 | df 70 86 46 09 22 db 6f ad cb 9a 9a bd 6e 03 ac | ab d8 ee 40 d0 e9 4f 4e ad 4c 58 0f 93 e2 e1 c8 | a2 ad 19 24 8d ca 10 9a 44 cb e8 b8 40 12 de e1 | 29 64 1e 40 f8 bf aa 87 bb 84 b2 5f 6f 0d 9d b9 | 12 51 1b 65 f4 ee e0 55 a1 dc 96 99 27 5b 4c a9 | 9a e4 cf 90 e8 fa 83 39 ff df 24 19 f2 75 1e b2 | 3a c5 5a ee 20 09 c9 38 60 08 ab 53 42 3f a9 0e | 51 ea 72 b2 25 2b b8 e3 e2 f5 9e 45 c1 0c 4c 33 | 68 83 d9 f1 9b 1b 60 f3 f4 29 c3 90 eb 9c dd 59 | 29 00 00 24 b7 9a f1 29 40 44 aa 07 d6 8e b0 7b | 73 1b 3f b3 0a e3 ed 21 f1 bb 89 35 39 a9 d4 99 | a7 53 6e 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 95 3e 47 a9 bf e3 9c 92 80 50 73 | b0 a9 03 26 40 9a 45 50 00 00 00 1c 00 00 40 05 | c6 93 aa 3b 5e af 6b 75 f9 54 eb f4 c6 61 f4 b6 | b4 32 51 f3 | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ddbf0 | #105 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f1 44 62 e8 b2 96 b0 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #105 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #105 | rejected packet: | f1 44 62 e8 b2 96 b0 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #105: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0487 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e7260 | handling event EVENT_RETRANSMIT for parent state #58 | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #58 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #58 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49609.594297; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003235 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #58 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 "road-eastnet-nonat-58" #58: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #58) | 0b a9 81 95 1f 0d 8e 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f b0 e3 df ce d1 d0 b9 30 6e 16 b3 e7 cf 92 e5 | a6 70 0e 23 5e 02 05 19 f5 b5 1a 04 6c 5e 7d a2 | 79 25 aa 0e 70 2a 25 1f 1c 02 b5 fc b9 3e 75 ad | e7 1e f1 8c 9c 7f 92 92 1d dc b1 ca 6d cf 53 ac | b8 0b 70 9b 2c 6a e7 8d 07 95 ae e1 37 ab ac 14 | 91 d8 79 4c ef 08 d0 d9 b0 55 82 09 5f 15 d9 df | e8 2c 4e cb ea a0 59 1c 81 c7 f6 39 0a 52 62 8e | 4b 57 28 22 1f d7 52 eb ec 16 d8 46 16 0a 27 88 | c7 c5 f7 e2 87 71 a1 2d 5e 9c 25 83 70 f1 a8 0c | df 63 58 3a 6f ba 9a fc 71 ac 13 82 0c ff 96 f7 | b2 3e 0f af a2 df f1 69 8f db ce 47 13 89 8f fd | ce 0a 15 3f 64 ea 8f f4 c7 b7 5e 3b b0 17 0a 90 | ef 23 ff a9 81 27 7d 7c ee 7a 36 7f 56 c1 b8 52 | 77 69 e0 69 4b 05 7c e7 a7 d2 48 f2 eb ac 08 c4 | 5f 9f b5 9e fc d5 98 d0 41 7f 9b ec 07 64 d8 f7 | 80 37 a2 97 6c ab e1 aa b4 48 78 11 a3 f3 d8 0a | 29 00 00 24 dd 82 37 0e 6e 7f fd 43 0e f6 0a 6a | 68 bc 25 88 0a 9e 3e 74 64 09 ae e7 87 f2 db fe | 06 d2 df 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 02 ef 4d 47 45 3b d6 d5 d7 fa ad | b5 dd 5d f9 98 95 75 30 00 00 00 1c 00 00 40 05 | 0c 06 c0 09 b1 a9 53 e2 00 18 ae 12 95 c7 71 d4 | 78 09 4b e3 | libevent_free: release ptr-libevent@0x7fb36801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e7260 | #58 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b a9 81 95 1f 0d 8e 78 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #58 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #58 | rejected packet: | 0b a9 81 95 1f 0d 8e 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #58: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #99 | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #99 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #99 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49609.621614; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001785 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61c10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #99 | libevent_malloc: new ptr-libevent@0x7fb36801d920 size 128 "road-eastnet-nonat-99" #99: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #99) | 20 f2 8d 71 65 ac 47 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 55 64 d8 ad 81 88 80 21 0e 25 1a b1 6c d3 13 | 60 47 54 9f 37 b3 3b e4 ef 17 20 61 85 67 62 f1 | 02 df 28 57 14 6d e3 be a6 7d d0 60 0f d8 35 56 | 23 d8 87 e9 4a f8 7b 29 e9 15 5f 82 0d 90 dd 56 | 5d 5a 2c 1a fd 14 77 42 8f 36 df a6 c7 9c d4 1a | 4f 67 c2 2e a6 a1 f6 1c 58 4b f8 cb b3 cd ce 08 | 48 62 dd 58 41 3a 14 29 9a 8c dd db 6a 06 47 a4 | 6c b7 ae b7 e4 5d db e5 9d e5 08 8e 17 5b 65 be | 17 aa 8e 73 be 9c 01 fb 31 11 79 f8 7d b5 ee ca | 7b e0 59 52 95 92 4d d8 40 43 34 f1 14 b9 84 18 | 60 68 b3 da 39 48 0e 5b 21 3c 0f 30 5d 85 b9 b8 | 1e e9 36 ff 36 9e aa 51 52 b1 5e 1d 27 fe 89 5d | cd 1e 0d 8d d6 a1 c3 a1 84 3f ea 32 11 45 0d 67 | 3f e2 4b 56 64 56 35 98 b6 f3 83 f0 90 30 0e 75 | b7 c7 9b 32 1d 5c 5f 2d d9 a9 92 93 d5 c6 6e 2b | ba f3 5c d6 20 4b dd 47 18 da e4 05 c0 7c 3e d8 | 29 00 00 24 0e 55 53 da 51 ef 9c 5f c5 b0 f0 9b | 78 63 11 53 43 43 64 d7 34 99 64 b7 14 ad 81 b4 | bb 55 f4 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 cf c4 07 93 b6 10 89 13 8b 25 5a | 5c dd 08 90 5b 56 28 b0 00 00 00 1c 00 00 40 05 | 9d 1e cf 39 e1 37 a4 6a 40 83 a9 41 54 1a 0d 5f | 91 61 32 ea | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #99 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 f2 8d 71 65 ac 47 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #99 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #99 | rejected packet: | 20 f2 8d 71 65 ac 47 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #99: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0765 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-112" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-112' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #112 at 0x557d46a6d4d0 | State DB: adding IKEv2 state #112 in UNDEFINED | pstats #112 ikev2.ike started | Message ID: init #112: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #112: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #112; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-112" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-112" IKE SA #112 "road-eastnet-nonat-112" "road-eastnet-nonat-112" #112: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-112 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-112": constructed local IKE proposals for road-eastnet-nonat-112 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 112 for state #112 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a38f50 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #112 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 | #112 spent 0.175 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 resuming | crypto helper 4 starting work-order 112 for state #112 | RESET processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-112" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 112 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.263 milliseconds in whack | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 112 time elapsed 0.000755 seconds | (#112) spent 0.757 milliseconds in crypto helper computing work-order 112: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 112 for state #112 to event queue | scheduling resume sending helper answer for #112 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #112 | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 112 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #112 | **emit ISAKMP Message: | initiator cookie: | 47 d5 03 db 13 27 2f b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-112 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 21 0e 6c 25 08 df e6 da 49 14 54 03 50 04 cf 48 | ikev2 g^x 95 75 ae 2d bc 03 6f 48 b8 d7 01 38 b0 30 90 fc | ikev2 g^x ff e3 c7 81 96 6b 61 34 0c 60 d4 12 f5 e2 2d fc | ikev2 g^x 51 c2 f0 8d 66 50 fb 99 8e e7 b2 7a 6c 96 47 68 | ikev2 g^x b2 95 cc 13 0e 51 31 7d 67 b6 95 35 7a 36 fb 65 | ikev2 g^x 99 b0 0f 89 29 13 5d 90 12 37 2d 11 35 2d b1 44 | ikev2 g^x 94 62 9d e9 25 b3 9d a0 a4 a6 21 f1 2f 1e cd 7c | ikev2 g^x e1 45 a8 9a 87 d2 53 e3 a2 32 e1 24 cf d4 84 b6 | ikev2 g^x d5 f2 14 94 09 c7 86 4b f6 5c 13 c3 cd 16 8e 96 | ikev2 g^x 09 f6 db 84 7c 68 6c 48 a7 94 92 3a 1f dd 75 5e | ikev2 g^x 2c 36 f1 6f 81 03 42 93 73 6d a8 a1 de b3 ee 78 | ikev2 g^x 53 dc 84 4e 49 9c c8 3c d2 8e 9e 10 6c e7 28 b0 | ikev2 g^x 11 a3 fb e6 6e 4d e5 e0 87 56 00 b9 8b bd 7a 34 | ikev2 g^x c7 01 93 2c df ea 24 e3 c0 b7 3c 4f 9c fd 99 11 | ikev2 g^x 44 90 bc 5c 8f 0c c6 10 b3 66 24 ea 61 81 fc 7a | ikev2 g^x 33 5f 5b b7 cd 2f 8e 95 d1 b4 0b d4 4c f2 ce 45 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e0 34 a3 40 45 a9 39 5f c9 a9 a0 f5 90 bc 5f 96 | IKEv2 nonce 21 2e 5a ab 31 ef 27 59 8c 9d b8 53 c4 51 4a f7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 47 d5 03 db 13 27 2f b9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 70 | natd_hash: port= 01 f4 | natd_hash: hash= 48 19 b7 b4 22 31 1f 00 af ac cd cc 10 5d a8 e7 | natd_hash: hash= 0a 7e 75 3d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 48 19 b7 b4 22 31 1f 00 af ac cd cc 10 5d a8 e7 | Notify data 0a 7e 75 3d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 47 d5 03 db 13 27 2f b9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 93 2a 52 65 d2 92 1c 7e fa c3 8c df bd 81 85 07 | natd_hash: hash= 8f 9c 4c 85 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 93 2a 52 65 d2 92 1c 7e fa c3 8c df bd 81 85 07 | Notify data 8f 9c 4c 85 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #112 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #112: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #112 to 4294967295 after switching state | Message ID: IKE #112 skipping update_recv as MD is fake | Message ID: sent #112 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-112" #112: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.112:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #112) | 47 d5 03 db 13 27 2f b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 0e 6c 25 08 df e6 da 49 14 54 03 50 04 cf 48 | 95 75 ae 2d bc 03 6f 48 b8 d7 01 38 b0 30 90 fc | ff e3 c7 81 96 6b 61 34 0c 60 d4 12 f5 e2 2d fc | 51 c2 f0 8d 66 50 fb 99 8e e7 b2 7a 6c 96 47 68 | b2 95 cc 13 0e 51 31 7d 67 b6 95 35 7a 36 fb 65 | 99 b0 0f 89 29 13 5d 90 12 37 2d 11 35 2d b1 44 | 94 62 9d e9 25 b3 9d a0 a4 a6 21 f1 2f 1e cd 7c | e1 45 a8 9a 87 d2 53 e3 a2 32 e1 24 cf d4 84 b6 | d5 f2 14 94 09 c7 86 4b f6 5c 13 c3 cd 16 8e 96 | 09 f6 db 84 7c 68 6c 48 a7 94 92 3a 1f dd 75 5e | 2c 36 f1 6f 81 03 42 93 73 6d a8 a1 de b3 ee 78 | 53 dc 84 4e 49 9c c8 3c d2 8e 9e 10 6c e7 28 b0 | 11 a3 fb e6 6e 4d e5 e0 87 56 00 b9 8b bd 7a 34 | c7 01 93 2c df ea 24 e3 c0 b7 3c 4f 9c fd 99 11 | 44 90 bc 5c 8f 0c c6 10 b3 66 24 ea 61 81 fc 7a | 33 5f 5b b7 cd 2f 8e 95 d1 b4 0b d4 4c f2 ce 45 | 29 00 00 24 e0 34 a3 40 45 a9 39 5f c9 a9 a0 f5 | 90 bc 5f 96 21 2e 5a ab 31 ef 27 59 8c 9d b8 53 | c4 51 4a f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 19 b7 b4 22 31 1f 00 af ac cd cc | 10 5d a8 e7 0a 7e 75 3d 00 00 00 1c 00 00 40 05 | 93 2a 52 65 d2 92 1c 7e fa c3 8c df bd 81 85 07 | 8f 9c 4c 85 | state #112 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a38f50 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #112 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 | #112 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49609.639806 | resume sending helper answer for #112 suppresed complete_v2_state_transition() and stole MD | #112 spent 0.331 milliseconds in resume sending helper answer | stop processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3580251c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 d5 03 db 13 27 2f b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #112 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #112 | rejected packet: | 47 d5 03 db 13 27 2f b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #112: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a49450 | handling event EVENT_RETRANSMIT for parent state #89 | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #89 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #89 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49609.651985; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002672 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e7260 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #89 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 "road-eastnet-nonat-89" #89: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #89) | 9d 5f d8 02 80 b8 e7 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 e3 b9 05 71 34 7d 24 1f b0 78 15 60 77 1c 08 | 9e 6a 97 b0 4c 89 e3 5a dc c3 13 ad 84 6a 5e aa | fd ca 45 35 ba 35 de 44 be ce 11 ea 86 29 6c 73 | 0b 7f 74 63 63 d2 81 70 21 25 9e 55 c0 3c 14 62 | da 13 e5 79 f3 ac 65 c2 4c 57 6a e3 37 8f 5c 04 | 8a 01 65 69 49 a9 46 40 f2 f3 a8 b3 1a af d6 79 | f9 34 6f 04 49 9e f3 10 ca 6b d5 6f d3 e5 36 7a | c9 32 cd 69 df 91 08 6d 35 ec 78 52 d9 57 09 e3 | f5 63 af 57 d7 93 38 af ff 2c e8 36 87 e0 92 43 | f0 f6 97 f6 50 a5 d2 4c 16 d1 d2 d2 96 90 50 82 | 09 99 3b fa 59 66 b4 48 e1 b1 0d 01 76 3d b4 c2 | b2 4d a5 5c 8a c7 cb a9 bb 09 56 bf 65 e9 da 28 | 24 dc 22 59 97 49 92 d0 c5 d3 9b 2b da 0b d5 26 | df 68 b6 c9 f1 0d 58 08 b0 7e 26 ce 7d 24 b1 d2 | a7 c4 2d 42 0c 8d 57 57 7b 42 5d d8 f7 b9 c8 ba | e6 b0 9d 60 5a 01 d8 33 e3 a6 9f f1 3b 81 e4 a8 | 29 00 00 24 50 a5 b1 4c 6d 18 8a 79 34 52 af 57 | 9c b8 99 4d b9 e7 5c 74 bb 7f a4 8c e5 f5 2c a5 | 8d 6b 1d 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 41 ee 04 aa 3d b0 21 0a d0 67 73 | 50 8d e2 01 ce 26 f9 77 00 00 00 1c 00 00 40 05 | 7b 60 8a 47 58 c7 18 57 64 ec a9 8e 15 07 49 b1 | ed 9e c4 1b | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a49450 | #89 spent 0.183 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d 5f d8 02 80 b8 e7 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #89 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #89 | rejected packet: | 9d 5f d8 02 80 b8 e7 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #89: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0575 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a027b0 | handling event EVENT_RETRANSMIT for parent state #59 | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #59 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #59 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49609.65734; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003869 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a49450 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #59 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 "road-eastnet-nonat-59" #59: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #59) | 97 6c 3a 75 a9 04 c6 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 c8 5b 92 1f 75 89 eb 0e 2e 34 19 de c9 7d 34 | 18 5b 4b 86 10 db bf e2 6c 1e 94 2d 7a 7d c9 7a | a0 2b b5 06 7b 90 f1 d3 cd af 0e 61 7b ec c3 64 | de a5 53 e3 bf 5e 51 d1 84 95 1f 6e cb 81 61 93 | ad 42 3a 9f 1e 3a 65 25 36 02 e8 9c 31 54 18 98 | 6f 55 90 5b bf 33 e8 09 e2 db 7f a5 0d 28 2f b0 | 76 e2 e4 a4 df b5 68 69 d1 19 fe bd 73 f2 f2 54 | 46 48 bd 1c fd b1 5e e2 cc c0 6c c9 e5 04 1c 0c | 40 92 81 c8 73 67 1a af d8 5e 9b 4f 61 bb 61 8c | a9 de 42 09 33 14 9f 91 4f 50 01 94 4d 87 81 f8 | a7 b9 37 9b 88 d2 60 21 55 19 56 c4 fc 7d e4 11 | 28 74 cf ae 93 f1 51 10 2e 23 31 34 07 b8 e7 37 | a3 5e 4c 95 61 50 f9 d4 96 86 63 2e 49 88 c6 44 | 13 5e 5b c4 2d 0c 65 06 af 27 76 b6 3c bb 87 1b | d8 ae 43 ad 30 39 b0 94 f9 53 b3 ee d3 35 1d 60 | 44 54 ef 8a f8 7d 13 88 d2 f8 8c df 8f 77 8c e4 | 29 00 00 24 b8 98 0c 82 63 7c e1 4a 6e 4e 96 76 | c9 de 50 23 14 2c 80 d9 d0 99 72 c2 8b e9 f8 32 | 80 1a 11 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 09 60 c9 a8 1a 7b a4 38 cc f7 74 | 87 5e fa dc 42 53 d3 c5 00 00 00 1c 00 00 40 05 | a9 7a 6a af 06 6a 57 69 21 03 39 50 4a 98 de 11 | 5d 3e 78 2b | libevent_free: release ptr-libevent@0x7fb36c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a027b0 | #59 spent 0.097 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 6c 3a 75 a9 04 c6 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #59 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #59 | rejected packet: | 97 6c 3a 75 a9 04 c6 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #59: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35000d120 | handling event EVENT_RETRANSMIT for parent state #12 | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #12 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #12 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49609.66459; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.011387 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ddbf0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #12 | libevent_malloc: new ptr-libevent@0x7fb36c01d920 size 128 "road-eastnet-nonat-12" #12: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #12) | e6 90 0f 5b 12 9e fb 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 8d ca d0 bf fc d0 53 2f c8 94 c7 75 f0 b7 3b | 06 8d af 15 08 3d 4d 43 8a f2 0e 43 03 74 47 ab | c5 f6 5e c6 9d af 64 6c 5f 50 aa bb 63 91 17 7c | de 19 d6 a8 3d b9 0e 6f 98 77 91 78 cd c6 0f f1 | 83 bd 49 b7 4d 19 90 e6 2f f7 8d c2 99 5e 0c 41 | a4 92 59 8c f3 bc 56 51 55 c4 fc 8d 06 b4 b2 46 | fe 62 b5 0f 4e f1 c7 d9 31 4c e1 f7 06 2d 45 f5 | a0 d5 f5 94 55 0e 2f 00 35 d8 fb d6 3c 6a b6 b5 | 4d 93 6e 6b 9b 52 5b 1c 59 3e d0 a9 2b 70 a2 ec | b5 2f 18 f2 51 cd 4a e5 eb b3 21 70 eb 17 7e fb | 54 5e a1 de 02 46 1e 7f ed c7 44 7e dc 6d 9e 84 | 08 46 48 8f 2c 45 f3 c2 00 ca b5 46 fd 56 d4 bf | b0 41 68 33 e0 2a 67 86 f6 4d 18 8b 90 8d 3e 6b | c2 91 48 4f de cb 41 cd 2e 17 3b f1 b9 af ca 73 | 4b 2f d1 11 2b 7a 96 60 de b9 66 93 28 70 95 94 | 75 11 24 ea 0b a4 9a 4f 1b d9 88 31 b6 8a fe 22 | 29 00 00 24 52 e1 94 79 21 2a ea cc 69 4a af 5a | 5d ef 62 83 14 35 3b dc 33 a8 4c d8 5d ab 20 41 | 8b a5 be 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 aa 63 73 f1 76 ab f8 1b 79 46 f7 | 09 75 6d 3c 97 fc 7d df 00 00 00 1c 00 00 40 05 | db 6d 58 42 c9 d1 b0 49 17 a0 1e 30 4f f9 7e 58 | 72 29 56 37 | libevent_free: release ptr-libevent@0x7fb350012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35000d120 | #12 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 90 0f 5b 12 9e fb 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #12 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #12 | rejected packet: | e6 90 0f 5b 12 9e fb 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #12: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #106 | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #106 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #106 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49609.675889; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501244 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35000d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #106 | libevent_malloc: new ptr-libevent@0x7fb350012840 size 128 "road-eastnet-nonat-106" #106: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #106) | fe df 65 eb e2 ca b1 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad da 7e a9 45 cb 20 7d e8 1c 81 82 05 64 57 6e | 75 d8 44 d1 29 49 80 30 70 57 33 94 8e d0 1f 14 | bc ae 59 d5 21 a0 94 8f 2c d7 0e ae 64 85 ee 4d | 50 69 c0 d8 4e 47 ef 8f 3a 2d ef b1 7b 6b a7 c8 | 8d 12 00 9d cb 02 d1 fa 1a e5 8c 51 be 6d 05 c8 | be 42 ed 64 5d 5d eb 43 74 14 7b 2e df 96 fd f0 | be d2 f5 e5 50 93 03 3d e5 7a 2c d8 01 5a 9b de | a0 3b d7 ce 9a ef 2b 39 02 de 74 61 50 3b eb 81 | 05 67 4f 23 be 3a 8e 5c be 32 5b 04 eb 4a 0a 52 | c4 c5 a5 9b 90 ef 60 8e e0 0b c4 2e df 2e 03 08 | 7d 0d 7d 77 85 98 9e 4b 28 0a fe 25 1d a7 29 db | 4e a8 1b 4a ee 35 1d 2c ba 8d 50 15 cc 00 fd b8 | 76 4c 44 ae c6 c8 10 0a ab 0a 64 76 0a 4d ee 2e | 50 89 e6 58 b8 26 b4 69 a0 66 8e 81 ad 9d da 80 | f3 00 a8 93 0e 88 6f 79 09 79 fc 16 36 77 35 c1 | 3d 72 2e 00 31 12 9c f8 70 79 c2 64 a5 05 9a 24 | 29 00 00 24 a4 51 db a3 25 2a 8b 08 e6 f6 81 86 | 04 5c da 12 5e 8f 68 4a 8c ec ef 5b e1 08 6f b7 | 57 a9 96 c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 f9 ad bd d7 95 65 27 17 8c 87 a1 | c4 9b a8 f7 4c 6b d7 13 00 00 00 1c 00 00 40 05 | 1a ac 1c ef 71 2b dc a9 6f 07 a5 2c d5 55 fb 6b | d6 5b 32 77 | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #106 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe df 65 eb e2 ca b1 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #106 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #106 | rejected packet: | fe df 65 eb e2 ca b1 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #106: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0495 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-113" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-113' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #113 at 0x557d46a6ea90 | State DB: adding IKEv2 state #113 in UNDEFINED | pstats #113 ikev2.ike started | Message ID: init #113: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #113: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #113; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-113" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-113" IKE SA #113 "road-eastnet-nonat-113" "road-eastnet-nonat-113" #113: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-113 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-113": constructed local IKE proposals for road-eastnet-nonat-113 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 113 for state #113 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #113 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #113 spent 0.157 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-113" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.242 milliseconds in whack | timer_event_cb: processing event@0x557d469ffbf0 | handling event EVENT_RETRANSMIT for parent state #100 | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #100 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #100 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49609.706942; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001367 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a027b0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #100 | libevent_malloc: new ptr-libevent@0x7fb378012840 size 128 "road-eastnet-nonat-100" #100: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #100) | e4 31 72 ce cb 4c 2e da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 02 70 26 8b f7 4c 10 d5 54 2d e1 56 87 42 60 | 52 43 18 58 d2 c6 63 79 e0 4c 7b 4a 2f b9 0e c8 | b1 65 1d 3e 6c a0 42 98 0c 60 fd b3 4d 30 f1 76 | 5e b7 85 03 42 2b d9 76 75 50 2e c4 69 94 03 7a | 6e c6 23 13 83 28 87 89 db 36 67 01 a4 44 23 73 | e4 b0 04 73 26 bb b0 01 8a 59 be 71 cf 90 5c 3a | 4f 3e 50 e0 98 79 eb 2c 62 ed 3b ff 05 2e f6 81 | 65 38 8c a4 51 39 05 8b 85 23 c5 f6 84 98 62 7d | 1d 2f 44 0d 73 e0 13 c3 51 be 3b 56 26 36 4c 79 | eb bc 2b 5e 2c 37 b2 d5 29 fa 64 f9 de 60 b9 ba | 73 c4 a9 28 1e 62 38 24 9d a3 96 c5 53 73 2c 7d | 0d 39 e6 12 54 ca 75 11 6f 12 17 8e e1 13 5d 45 | 12 9e c5 b7 6a ce 49 b5 ef 7b 55 be 70 ce 3a 18 | d9 f0 2c b9 2c 8a 17 6a 09 a2 d9 96 28 14 14 67 | 3e 3b 41 a6 c6 44 44 f5 69 48 d1 0a 41 9c 30 d6 | 74 2c 38 9d d2 1f 0a f9 85 a8 83 ce dd 7d a1 17 | 29 00 00 24 9b 63 67 5a a5 90 71 08 bf 01 2e 0d | 7a 17 c3 85 da c2 c9 b2 79 84 88 d1 44 e9 43 2f | de e8 87 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb bf 15 80 9f fe 69 e3 a2 7b 53 a0 | 71 05 30 05 2a 8e cb 5a 00 00 00 1c 00 00 40 05 | e0 55 02 95 04 d8 fc 5b b5 ab 42 28 79 3c 3e 17 | 70 aa 5d 58 | libevent_free: release ptr-libevent@0x7fb3700251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ffbf0 | #100 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 31 72 ce cb 4c 2e da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #100 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #100 | rejected packet: | e4 31 72 ce cb 4c 2e da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #100: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0532 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 13 resuming | crypto helper 13 starting work-order 113 for state #113 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 113 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 113 time elapsed 0.000983 seconds | (#113) spent 0.988 milliseconds in crypto helper computing work-order 113: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 113 for state #113 to event queue | scheduling resume sending helper answer for #113 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #113 | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 113 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #113 | **emit ISAKMP Message: | initiator cookie: | 65 aa 2d d8 a6 29 20 d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-113 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x df aa fe 5d 18 fa cf 0f ff 28 95 2b df 41 5e e5 | ikev2 g^x 93 b1 5d 05 b9 f8 45 e3 a0 1d 39 ec fc 7d ae 4b | ikev2 g^x 05 3f bf 03 bf 80 a9 6e 8e fd 3b e8 32 58 c8 f7 | ikev2 g^x c6 df 30 b6 09 5f 2a 57 25 11 cb 3c da a5 01 9d | ikev2 g^x ba 5a dd a7 bc 6b 95 4a 6d df f0 56 fa 5d b6 d5 | ikev2 g^x 32 bd cc 28 5e b5 ff 1a d9 af f1 6d a9 3a c6 a5 | ikev2 g^x ab a2 21 23 63 1f 7a d5 a9 f2 d8 6e 34 2c c0 14 | ikev2 g^x b5 44 80 cc 01 b8 bc 1d 88 15 f0 56 5b 9e 16 11 | ikev2 g^x 53 49 7c 46 a4 d6 df 15 cc 76 08 99 30 8d bd 16 | ikev2 g^x fc 22 5e e2 91 1e 29 90 27 cb 4a a1 bb fb df c0 | ikev2 g^x e1 57 58 ac 38 1b 6a 91 9c 4e c8 14 95 91 e6 23 | ikev2 g^x a6 57 8f 86 03 7d ff ac 75 e9 09 5f f5 40 29 9b | ikev2 g^x 12 ab c4 82 96 27 04 ff 62 2b 29 96 91 b3 9d b0 | ikev2 g^x 86 8f c7 9d 9e d4 5c a2 76 cf a2 55 cf 18 d5 47 | ikev2 g^x 6a bc c0 f7 de 25 72 ff 89 ad a0 ee b6 9c 33 78 | ikev2 g^x 04 18 e5 3b 76 6f 93 07 22 6f ad 6a 13 43 4b d1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 24 d3 7a 96 b8 4b b9 c8 77 6f a9 e8 8c 18 33 84 | IKEv2 nonce b7 52 88 cd 9d a3 3f f7 dd 42 d5 3a e4 24 11 88 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 65 aa 2d d8 a6 29 20 d8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 71 | natd_hash: port= 01 f4 | natd_hash: hash= 55 39 d7 c2 57 ac 0e 5c ea ab f6 c3 2b 95 40 5a | natd_hash: hash= 3d 34 d1 e0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 55 39 d7 c2 57 ac 0e 5c ea ab f6 c3 2b 95 40 5a | Notify data 3d 34 d1 e0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 65 aa 2d d8 a6 29 20 d8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e1 b8 84 36 a4 5f d1 6d 3f 9f 07 dc 0f 94 99 b2 | natd_hash: hash= ea cc 3a 90 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e1 b8 84 36 a4 5f d1 6d 3f 9f 07 dc 0f 94 99 b2 | Notify data ea cc 3a 90 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #113 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #113: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #113 to 4294967295 after switching state | Message ID: IKE #113 skipping update_recv as MD is fake | Message ID: sent #113 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-113" #113: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.113:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #113) | 65 aa 2d d8 a6 29 20 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df aa fe 5d 18 fa cf 0f ff 28 95 2b df 41 5e e5 | 93 b1 5d 05 b9 f8 45 e3 a0 1d 39 ec fc 7d ae 4b | 05 3f bf 03 bf 80 a9 6e 8e fd 3b e8 32 58 c8 f7 | c6 df 30 b6 09 5f 2a 57 25 11 cb 3c da a5 01 9d | ba 5a dd a7 bc 6b 95 4a 6d df f0 56 fa 5d b6 d5 | 32 bd cc 28 5e b5 ff 1a d9 af f1 6d a9 3a c6 a5 | ab a2 21 23 63 1f 7a d5 a9 f2 d8 6e 34 2c c0 14 | b5 44 80 cc 01 b8 bc 1d 88 15 f0 56 5b 9e 16 11 | 53 49 7c 46 a4 d6 df 15 cc 76 08 99 30 8d bd 16 | fc 22 5e e2 91 1e 29 90 27 cb 4a a1 bb fb df c0 | e1 57 58 ac 38 1b 6a 91 9c 4e c8 14 95 91 e6 23 | a6 57 8f 86 03 7d ff ac 75 e9 09 5f f5 40 29 9b | 12 ab c4 82 96 27 04 ff 62 2b 29 96 91 b3 9d b0 | 86 8f c7 9d 9e d4 5c a2 76 cf a2 55 cf 18 d5 47 | 6a bc c0 f7 de 25 72 ff 89 ad a0 ee b6 9c 33 78 | 04 18 e5 3b 76 6f 93 07 22 6f ad 6a 13 43 4b d1 | 29 00 00 24 24 d3 7a 96 b8 4b b9 c8 77 6f a9 e8 | 8c 18 33 84 b7 52 88 cd 9d a3 3f f7 dd 42 d5 3a | e4 24 11 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 39 d7 c2 57 ac 0e 5c ea ab f6 c3 | 2b 95 40 5a 3d 34 d1 e0 00 00 00 1c 00 00 40 05 | e1 b8 84 36 a4 5f d1 6d 3f 9f 07 dc 0f 94 99 b2 | ea cc 3a 90 | state #113 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #113 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #113 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49609.708708 | resume sending helper answer for #113 suppresed complete_v2_state_transition() and stole MD | #113 spent 0.471 milliseconds in resume sending helper answer | stop processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c0251c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 aa 2d d8 a6 29 20 d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #113 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #113 | rejected packet: | 65 aa 2d d8 a6 29 20 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #113: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0581 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fa300 | handling event EVENT_RETRANSMIT for parent state #60 | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #60 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #60 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49609.721921; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005882 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a63210 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #60 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 "road-eastnet-nonat-60" #60: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #60) | 25 9c c0 c5 c2 ae 29 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 2c 75 39 d4 fe e8 bb 01 36 72 a5 b5 e5 a5 81 | c7 38 4b e5 4a ae c6 e0 64 23 ae a4 00 42 bd c1 | 2e 59 84 56 2c d7 14 24 66 d8 ee 01 96 14 85 e4 | 4a 5d 41 c9 bd f2 52 f7 81 ad 7f d6 d0 a1 27 d2 | 97 41 8d b3 c0 bc 77 ec 23 18 fe 60 e2 a8 0c 93 | 13 c8 08 44 38 cf 40 53 40 99 23 6d f6 02 db 2a | 6e 32 b0 2c 67 33 6c a2 f1 af da 97 e3 24 99 d0 | 08 b1 cf 27 91 4b c8 a0 67 76 74 84 3e e8 94 b8 | 9c 46 bf ee d2 a1 d1 93 0c c9 20 9b fb 9c cc 69 | d2 c3 9f 9f 32 ce e3 cd 1e a4 06 0c ce ad 3b b5 | 3d 52 01 2e 64 72 a4 a5 0d 13 96 53 80 55 c3 af | c7 4a a9 17 ce 71 79 67 8d 48 4c a9 b8 00 02 38 | 2d 7c a0 0b 36 f5 68 34 0f dd 83 6f 1d d1 e9 b9 | 9a 43 52 12 d9 b1 6e ac 6a 5e ac d3 3c 20 66 93 | 6b 7e 85 4c aa e5 92 08 98 a1 8b 28 75 13 39 85 | b8 6c 05 ff ad 0d f2 e7 73 79 5c 18 65 6b dd 7e | 29 00 00 24 a0 1d b4 bd 19 70 24 f8 23 e6 87 dc | 50 af bd f2 95 21 f1 1c 7f 4c 51 8f f3 4c 1a 81 | a9 6f fb c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d6 a7 42 56 6b af 55 7e 9e 1f c2 40 | ba 0d 74 ad 6e b0 b4 2e 00 00 00 1c 00 00 40 05 | 49 f8 c3 9d b1 df 49 97 21 c8 2e 46 27 7c d9 25 | e7 f0 a2 de | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fa300 | #60 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 9c c0 c5 c2 ae 29 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #60 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #60 | rejected packet: | 25 9c c0 c5 c2 ae 29 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #60: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23150 | handling event EVENT_RETRANSMIT for parent state #90 | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #90 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #90 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49609.738273; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002621 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fa300 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #90 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 "road-eastnet-nonat-90" #90: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #90) | 26 95 92 02 0c 74 14 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 ed e3 a8 eb 0c e2 00 1e b8 30 77 f5 0e ad ce | 65 c1 45 a9 f8 d6 59 16 4d 14 6e d4 77 5e 81 5d | e4 5a fa df cb d1 e9 b4 fb 7a 1b 94 96 f5 cd a1 | 92 48 08 b0 94 02 60 49 2d a3 e6 bd 87 20 3a b6 | b3 a4 42 54 6e e3 59 4f 33 f7 d9 14 23 f3 be 46 | 0e 6a b0 16 f3 25 4c 11 1c 90 dd a1 d3 04 dc 69 | 8d 39 0c 51 5f 83 72 cb 93 87 70 c9 f5 3d e0 2a | c5 11 3c 75 bc 46 e8 c6 f5 45 c5 bc bb 53 d8 9c | 7a ab 11 6e 8b 56 f1 6e cd 93 8a 23 e4 3d ba 8e | f3 e8 36 9d 53 65 3b 19 f4 e3 cc f3 54 92 3e af | 1e ea f7 7a 71 af d2 c7 14 e2 2f f0 39 fe 17 bf | 5f 5e bd 3d 44 b3 a2 13 36 c4 88 da f8 e8 06 a9 | 63 d0 49 96 b9 8b b5 05 47 2d f0 7c f0 b7 4b a3 | d9 0f 59 ad 42 e6 a2 62 85 25 36 ae 56 68 a9 08 | 18 48 13 b3 3d 8c 24 fd 03 b0 13 b0 fc 3c f6 fc | 7b 2f 36 dc 82 d7 51 c4 8b bc 56 3e 48 7c ce 7f | 29 00 00 24 7b f2 d7 97 09 c8 65 d1 69 47 34 b1 | 55 8b 56 a2 4a 71 ee 64 d5 6c 65 05 c4 2c 51 b4 | b0 ab 0f 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 4b f3 32 75 d7 ef f4 06 67 91 40 | 71 93 9a 6d f5 fe b0 cc 00 00 00 1c 00 00 40 05 | 99 8e 72 1b 4f e3 a6 e8 23 e7 c4 0e ce 5c a4 3c | cd e1 15 1b | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23150 | #90 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 95 92 02 0c 74 14 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #90 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #90 | rejected packet: | 26 95 92 02 0c 74 14 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #90: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #107 | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #107 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #107 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49609.746597; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500309 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #107 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 "road-eastnet-nonat-107" #107: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #107) | ac 4e b3 f4 ed 6e 1b 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 73 84 90 b0 a1 c9 25 a6 16 5e 4b 67 ce 07 6b | 92 04 d0 37 9e 07 4b 09 02 c2 78 f5 a4 a2 15 3a | 81 d0 8e e8 00 40 7b 2f 93 05 4b f1 72 7f 82 62 | 11 07 a0 1f 82 07 75 ea 96 ea 88 0b 0d 07 25 f0 | 53 bc 84 a7 a4 75 94 5f 48 4e 4a 60 2b e3 6f 76 | 92 f7 9d 74 6e 3f f1 39 f4 ea a5 df f6 6b e2 19 | 19 b6 60 26 c6 fe d4 1c bc ad 80 f2 46 47 46 93 | 4a da 3f 4a 2e 08 aa d8 dd f9 58 37 f0 1b 68 77 | ce 96 bc c9 19 65 a5 66 67 6f a9 fc 8b f9 e5 15 | 20 ed ca 26 5a cf 00 8e 65 d8 10 df c9 2f 55 c3 | 64 dc 1d 41 fa 8c 1a 44 06 90 c6 59 bf c3 6e 3f | fb f3 89 2e c3 0c 98 20 fe c3 39 08 86 b8 6d 84 | 72 50 7b 56 51 ac 06 e0 20 77 cc 21 04 85 51 fd | 65 1e 59 7f 79 5a a9 9c 4e fa 78 0d d8 f6 cf 3c | cd 73 f9 1e 3d 38 88 98 9e 60 ec bd 06 0d 2d 0c | 39 4f f8 8a 60 2e a2 ac 6c bc 30 73 f0 bc 87 4c | 29 00 00 24 2b ab 2f 68 f7 5a dc 67 d2 bf 24 50 | 1d 74 5b c9 72 db b8 cd 99 25 80 eb 1e bb 50 81 | 94 b2 ae 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 39 55 8e 98 9a a9 9a 86 88 c5 10 | 1f 60 cd 0e 59 85 0d 5e 00 00 00 1c 00 00 40 05 | 18 34 33 25 63 a4 39 e3 ca 5d cd 23 8f 87 c0 51 | 02 99 ff a0 | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #107 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac 4e b3 f4 ed 6e 1b 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #107 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #107 | rejected packet: | ac 4e b3 f4 ed 6e 1b 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #107: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0818 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-114" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-114' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #114 at 0x557d46a70050 | State DB: adding IKEv2 state #114 in UNDEFINED | pstats #114 ikev2.ike started | Message ID: init #114: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #114: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #114; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-114" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-114" IKE SA #114 "road-eastnet-nonat-114" "road-eastnet-nonat-114" #114: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-114 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-114": constructed local IKE proposals for road-eastnet-nonat-114 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 114 for state #114 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb360005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #114 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 | #114 spent 0.15 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 resuming | RESET processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 starting work-order 114 for state #114 | RESET processing: connection "road-eastnet-nonat-114" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 114 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.25 milliseconds in whack | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 114 time elapsed 0.000622 seconds | (#114) spent 0.628 milliseconds in crypto helper computing work-order 114: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 114 for state #114 to event queue | scheduling resume sending helper answer for #114 | libevent_malloc: new ptr-libevent@0x7fb3500251c0 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #114 | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 114 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #114 | **emit ISAKMP Message: | initiator cookie: | d6 76 3e 2a df 8d 49 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-114 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 32 89 bc e4 ca cf 42 9f 8c 3e 0c bd bc ae 4f 3b | ikev2 g^x d3 c7 ce d3 ca 55 eb 39 04 eb 76 8e a9 75 7d e3 | ikev2 g^x b6 18 fe 44 5f 1c ef b7 b7 41 cc 4d 34 22 30 65 | ikev2 g^x 06 59 1e ef 39 63 eb fe 02 26 56 aa 64 57 8d 53 | ikev2 g^x 7a 80 31 9c 0a f7 30 cf 50 cb a2 17 9f 63 45 27 | ikev2 g^x 3c d2 e0 b9 54 07 a2 b1 46 40 09 3b 94 40 bf f1 | ikev2 g^x 40 f9 b6 13 93 c3 4e d6 d8 b1 db 99 2b ea b1 51 | ikev2 g^x cb eb aa 9a ed ac 6d b8 6b 55 e2 2f 64 52 21 e2 | ikev2 g^x 9d 13 28 a8 e7 03 1f ba 1a 35 29 e1 bf bc 71 81 | ikev2 g^x 00 b3 30 d7 67 e8 0d 4c f0 57 7f 78 f9 6a af a6 | ikev2 g^x f5 69 67 2d 44 65 18 2d d8 cb 15 95 95 67 b6 a2 | ikev2 g^x 53 6a 9c 3b 84 13 f8 02 23 28 ee d8 85 45 e3 f6 | ikev2 g^x 5a a4 85 e6 1c 98 88 9c 1f 95 20 64 13 9f 49 1c | ikev2 g^x 78 c0 c0 ca f6 15 03 7c ad a7 9e 6d 64 5a 3a 90 | ikev2 g^x 22 4b eb 71 cf 24 e9 b9 6a 4d d7 77 ec 73 7e 9d | ikev2 g^x b2 6f c8 a4 49 bf 18 63 90 cf af e1 1e da 29 bc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 73 ab 08 be 9c 8c 4d 6d 6c 17 9d b7 72 a8 6d 05 | IKEv2 nonce 77 58 95 9d b6 49 34 83 b7 04 21 62 34 da 48 0e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d6 76 3e 2a df 8d 49 30 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 72 | natd_hash: port= 01 f4 | natd_hash: hash= 9b 91 b3 8b e1 5d a7 b1 99 b7 4d e6 18 7a 40 70 | natd_hash: hash= 0a cf e4 42 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9b 91 b3 8b e1 5d a7 b1 99 b7 4d e6 18 7a 40 70 | Notify data 0a cf e4 42 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d6 76 3e 2a df 8d 49 30 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2c bf 9c 44 68 90 73 42 ea f8 95 cd ea 90 69 66 | natd_hash: hash= 03 01 a9 72 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2c bf 9c 44 68 90 73 42 ea f8 95 cd ea 90 69 66 | Notify data 03 01 a9 72 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #114 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #114: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #114 to 4294967295 after switching state | Message ID: IKE #114 skipping update_recv as MD is fake | Message ID: sent #114 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-114" #114: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.114:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #114) | d6 76 3e 2a df 8d 49 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 89 bc e4 ca cf 42 9f 8c 3e 0c bd bc ae 4f 3b | d3 c7 ce d3 ca 55 eb 39 04 eb 76 8e a9 75 7d e3 | b6 18 fe 44 5f 1c ef b7 b7 41 cc 4d 34 22 30 65 | 06 59 1e ef 39 63 eb fe 02 26 56 aa 64 57 8d 53 | 7a 80 31 9c 0a f7 30 cf 50 cb a2 17 9f 63 45 27 | 3c d2 e0 b9 54 07 a2 b1 46 40 09 3b 94 40 bf f1 | 40 f9 b6 13 93 c3 4e d6 d8 b1 db 99 2b ea b1 51 | cb eb aa 9a ed ac 6d b8 6b 55 e2 2f 64 52 21 e2 | 9d 13 28 a8 e7 03 1f ba 1a 35 29 e1 bf bc 71 81 | 00 b3 30 d7 67 e8 0d 4c f0 57 7f 78 f9 6a af a6 | f5 69 67 2d 44 65 18 2d d8 cb 15 95 95 67 b6 a2 | 53 6a 9c 3b 84 13 f8 02 23 28 ee d8 85 45 e3 f6 | 5a a4 85 e6 1c 98 88 9c 1f 95 20 64 13 9f 49 1c | 78 c0 c0 ca f6 15 03 7c ad a7 9e 6d 64 5a 3a 90 | 22 4b eb 71 cf 24 e9 b9 6a 4d d7 77 ec 73 7e 9d | b2 6f c8 a4 49 bf 18 63 90 cf af e1 1e da 29 bc | 29 00 00 24 73 ab 08 be 9c 8c 4d 6d 6c 17 9d b7 | 72 a8 6d 05 77 58 95 9d b6 49 34 83 b7 04 21 62 | 34 da 48 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 91 b3 8b e1 5d a7 b1 99 b7 4d e6 | 18 7a 40 70 0a cf e4 42 00 00 00 1c 00 00 40 05 | 2c bf 9c 44 68 90 73 42 ea f8 95 cd ea 90 69 66 | 03 01 a9 72 | state #114 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb360005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #114 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 | #114 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49609.772434 | resume sending helper answer for #114 suppresed complete_v2_state_transition() and stole MD | #114 spent 0.471 milliseconds in resume sending helper answer | stop processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3500251c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 76 3e 2a df 8d 49 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #114 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #114 | rejected packet: | d6 76 3e 2a df 8d 49 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #114: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0596 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fd070 | handling event EVENT_RETRANSMIT for parent state #13 | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #13 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #13 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49609.77863; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.015952 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ffbf0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #13 | libevent_malloc: new ptr-libevent@0x7fb3500251c0 size 128 "road-eastnet-nonat-13" #13: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #13) | 49 f7 1e 6a 42 26 33 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 71 af 86 f4 71 f9 bb e4 0d 2b 45 d7 29 39 05 | b7 87 ba 66 cb fb 2a f9 a1 bd 3d 61 b3 93 ac e4 | c3 99 b0 f5 02 62 ee dd 97 cd f6 04 fc 6c e4 91 | fc 5c 11 ba 5a 79 b1 78 a2 d0 e7 22 4a 47 b5 e0 | 1b 08 7f a6 c3 8e ce 71 40 0d 06 f3 62 f6 df f1 | 5d 7c 5b e2 d5 cd 0f 4d e6 c6 f8 d8 22 4f 95 11 | 69 b0 4c 7b c2 82 8e f9 ea f5 33 82 00 b3 c7 cc | c1 9e 50 02 8e 45 ef af 1a f9 8b 37 72 41 32 b8 | 47 f2 be df 3f 94 e4 a3 17 d5 55 32 fb 1f 2d d2 | 75 88 9c 98 42 60 51 41 31 79 19 3b ff ef b8 2a | 8e 39 2b ea 32 11 93 14 1c d3 9c 70 36 49 9b d1 | ea 38 9f 9a 6a 33 49 23 7d e2 c2 d5 b0 8d 83 b6 | ef a7 10 c8 a2 18 a7 4e 8b 07 bd 67 b5 96 c1 6a | d6 9d 73 c7 60 9d 60 25 5d 63 21 25 68 0e 24 b3 | 8f 19 40 42 2e 27 e9 30 d9 f9 1b 80 8f 2d ab dd | 1e f0 98 f5 b2 55 9b 6b 06 84 0f fe 26 32 f1 f7 | 29 00 00 24 dd b6 a9 bb fd 56 26 b2 23 d7 97 2f | 99 f7 92 2e ca d6 19 06 93 b1 8e 77 8d b7 a4 a3 | 73 9b 88 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 83 1c 22 e0 45 23 6f 5f d0 4f 89 | cf 59 8e 77 1e 0a 0b d7 00 00 00 1c 00 00 40 05 | e8 12 13 20 8d f1 d3 89 00 ae 66 0d fd eb 92 63 | f1 cf 85 56 | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fd070 | #13 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 f7 1e 6a 42 26 33 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #13 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #13 | rejected packet: | 49 f7 1e 6a 42 26 33 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #13: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #61 | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #61 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #61 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49609.779982; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003781 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a647d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #61 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 "road-eastnet-nonat-61" #61: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #61) | f7 bc 52 c3 08 41 7d fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 a3 fc 88 6c c9 17 99 e8 c8 f4 84 4b dd e6 d6 | a2 3c cb b6 7d b8 4b 73 4d d1 4a 52 0a 17 63 b0 | ce a1 f6 5b 22 20 08 31 0e da ec fd b8 c2 13 f9 | b7 0d 78 21 3f 05 bc f7 2c 5a 0e b5 1a 70 bf 53 | b0 72 5e 64 9f c9 e5 f6 6b aa f3 db 8b b8 b8 b3 | f6 f8 ae 22 20 f7 35 9c 39 6d 5a ba 98 af 4b 1d | 6d d4 8e 29 87 bb 7a 2b 6b 4a b8 79 51 26 39 b0 | 6a 6c be 49 5f 57 bf 03 7a 6e 7f ac 45 f9 af fb | a3 06 52 bf 07 ef a5 db 3d b8 9b 73 f0 8e b1 76 | 2b 5d b7 93 de 9f 59 44 c1 67 8a 9a a5 50 66 6c | 27 3e 5e 44 b1 e9 13 dc 81 57 82 47 20 a2 32 79 | d4 b0 d6 87 f1 f1 20 bf e9 93 fc 11 dd 5e 42 b0 | a4 4f 0e f8 93 a1 1c a5 59 56 db 69 8d ca d0 53 | 78 b2 af e6 28 15 c5 c9 00 fd bf f0 33 a6 bf 2d | 7e 87 d7 d1 a0 82 65 91 eb 3c cf d0 6f fb 0e 4b | 57 a1 5c 8a 3f 3c 13 19 f1 bc 6c 89 96 42 e0 e9 | 29 00 00 24 30 62 04 12 b8 d1 41 8a 1d 82 4c c7 | f3 e8 92 81 d6 0e cc 31 5a f2 7c 04 56 a0 26 04 | e6 c5 8a 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 04 89 46 c0 2a 68 09 d3 b8 a6 1e | 7d d4 48 56 88 7a 56 d6 00 00 00 1c 00 00 40 05 | bb 1e 0b f8 57 9c 2b 42 0a de e4 96 f3 8b 61 81 | fa a3 7d bc | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #61 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 bc 52 c3 08 41 7d fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #61 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #61 | rejected packet: | f7 bc 52 c3 08 41 7d fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #61: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0561 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3a590 | handling event EVENT_RETRANSMIT for parent state #101 | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #101 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #101 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49609.790289; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00056 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #101 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 "road-eastnet-nonat-101" #101: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #101) | a4 e5 70 36 3e 53 78 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 47 67 da db 52 1d 6f 38 4e a0 14 fb a3 22 ee | a5 bd 87 bb f4 50 cd e1 5f f4 bb 7f 5e 01 20 78 | 03 d2 5e e5 f5 4c 45 4d 90 0b ab 1e a9 68 0d a2 | 63 8b 82 0b 63 5a be b1 7a 7f 0a d0 8f 73 00 89 | 01 d6 0d 8e e0 01 de 09 aa b1 2b c9 2a 85 99 3e | e4 12 33 b6 ff a4 02 5b a4 0f a9 0e 49 92 c4 c4 | 91 bb bd cc bc 4e ec 81 b6 b6 b8 9c 4a 4e 40 d2 | 5e b4 c5 bc f7 4c 25 7f b5 8f df 4b 29 de 24 b5 | 99 9e 0e bd 10 eb 77 c5 31 71 d3 38 c7 ae 1b 45 | a1 15 8f 53 f2 46 e1 e0 f3 7d cd 3a fa d7 ce cc | 71 fa 98 05 20 5e 2b 57 e0 1e 93 66 04 94 47 68 | b5 fc da d4 67 d1 27 06 e7 0b 81 26 9b 06 3d 8a | 68 ab 7d 23 5f b3 75 b4 20 05 d5 0a d7 9f 47 f8 | cc 49 2f 28 05 85 5c 22 76 a9 df c7 57 38 c2 59 | 85 34 bf b9 39 30 70 bd fe 4d 41 14 30 36 f4 a7 | a4 75 83 53 e7 c0 5a e0 b5 e5 07 a1 66 16 4d c3 | 29 00 00 24 08 f8 1e 60 51 22 a7 7a 61 74 80 8a | 8a 13 29 1d 07 8a 7f 81 27 3b e2 db 98 17 8f 37 | 46 82 14 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 37 fb 68 83 f3 3a 11 a5 17 fb 1f | 7d e8 ab 39 06 f5 fb 7f 00 00 00 1c 00 00 40 05 | 98 33 35 18 bc 62 08 ee 27 45 3b 5b 93 d4 b0 de | 01 b6 d3 96 | libevent_free: release ptr-libevent@0x7fb354009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3a590 | #101 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 e5 70 36 3e 53 78 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #101 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #101 | rejected packet: | a4 e5 70 36 3e 53 78 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #101: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0eb30 | handling event EVENT_RETRANSMIT for parent state #91 | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #91 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #91 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49609.816579; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002209 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #91 | libevent_malloc: new ptr-libevent@0x7fb354009640 size 128 "road-eastnet-nonat-91" #91: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #91) | a6 f1 37 27 17 86 c6 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 6a 94 73 f6 c2 01 42 8c 6e f6 05 6f 1c e2 ee | 38 45 16 e5 f6 17 c9 fc 07 cc bc 0b 02 da 35 c8 | 5a ca 9d 87 29 53 47 69 49 7f 31 f0 fb ce e2 59 | 00 57 9b 32 9e 1f da 4b f7 41 b5 05 14 af c4 d7 | 09 7f 69 01 a0 cd 93 57 e5 a7 fd 93 a9 9e c3 fc | b0 af f5 37 11 6f 2b 38 a8 2a 8b 37 b3 e6 bc bf | 0c 06 37 86 ca f2 b6 b0 ed 1e 3f d6 8a f0 0b f9 | e8 80 df 35 d6 a2 36 c0 a2 dc a4 1a ca 7d d9 0b | 6f fc 29 fc 92 12 f8 05 c1 88 8e 81 27 4a 61 62 | c3 16 fc 6e 5e a6 59 bf d1 b1 ad d5 92 05 c4 60 | 2f 54 a3 71 e0 ec ca 5d 37 16 ec 5f ec 37 29 2d | 46 5a 04 10 84 ad 36 aa 07 ca f2 60 8b 7c ac f8 | ac e2 8b a3 69 23 74 f2 d2 2d c5 0d 51 9b 2c 7f | 42 45 54 c3 ec 3d 44 63 f0 0a ec ff b3 69 48 ee | 22 28 aa af 72 8c cd ca 9e 3c dd f6 ac 2b 6f b7 | a1 90 21 32 ae b8 23 39 1e cc fe 3e d6 b6 21 70 | 29 00 00 24 29 05 58 2b f0 ba fb 18 77 b3 53 8d | 8b 05 bb 0a 8a c5 e8 dc 24 17 58 d9 a6 60 c9 1d | bc c9 21 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 d0 cc 50 f7 83 7e b1 80 37 a7 4b | da df 68 8f 62 b7 e5 89 00 00 00 1c 00 00 40 05 | 8a 41 f9 2e 73 42 40 08 8e 79 f6 3e 7a 3f 48 7e | 67 86 16 af | libevent_free: release ptr-libevent@0x7fb388022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0eb30 | #91 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 f1 37 27 17 86 c6 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #91 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #91 | rejected packet: | a6 f1 37 27 17 86 c6 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #91: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0689 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c00d120 | handling event EVENT_RETRANSMIT for parent state #108 | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #108 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #108 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49609.831942; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500797 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a54250 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #108 | libevent_malloc: new ptr-libevent@0x7fb388022480 size 128 "road-eastnet-nonat-108" #108: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #108) | b6 36 fb 7e 9b 39 08 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 8f 7e 30 55 17 55 d0 7b cc 1e 1e d2 0b 4a cb | f4 10 86 26 73 3d 12 d5 07 43 0f 11 e4 f8 f6 27 | 0b a5 f1 36 07 fc f3 05 3c 23 da bb fc 30 83 87 | 4d 41 58 5e 99 3a a9 ce 46 15 98 87 9b 24 d7 8f | 4b 59 7f b7 31 2a 48 e9 80 ab 05 c8 c6 49 95 79 | 0d 98 4a 2c 3d fe d3 d5 57 7f be e0 6f 80 49 7e | 12 83 14 1f 0d 26 16 aa cd e1 d8 a5 e8 e4 d2 0b | 8c a3 fb db 9a 33 4c 54 d3 db d0 4d 8d 8e a8 6d | 02 98 c7 65 a7 c6 72 0c be 01 bc 52 89 54 3a 59 | 6c 0b 5d c0 31 d7 63 e7 46 02 b3 0a b3 c7 5c de | 0f 7c c0 40 9f a9 b4 60 e4 65 87 1b d1 de 9c 27 | 3d df 5c 7f 27 8d e9 84 86 44 ce 9d 88 43 1a 58 | 28 56 bd 9e df a0 81 8f 79 ba 7e dd 69 15 d8 10 | e7 15 0f da 12 84 35 19 8e 2f 46 d3 83 f4 76 51 | 58 93 90 90 80 38 02 b8 02 db 96 cc e8 5b bf 28 | 0c 19 e8 c4 f6 ae 03 e7 2c 85 d1 50 dc 63 a6 cc | 29 00 00 24 6f 78 95 93 53 4c be 35 be d7 12 7f | aa e5 be 16 ad 5c 36 ac 46 40 9b c8 37 9c 91 65 | 00 a5 4b a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 98 20 9c 05 26 c6 0c 16 0d f3 71 | 8e b0 d2 f3 4f 39 a2 61 00 00 00 1c 00 00 40 05 | 96 4b e6 dc 37 23 61 90 08 5b 41 4a ab 35 e9 fe | 61 65 2c 1d | libevent_free: release ptr-libevent@0x7fb36c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00d120 | #108 spent 0.18 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b6 36 fb 7e 9b 39 08 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #108 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #108 | rejected packet: | b6 36 fb 7e 9b 39 08 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #108: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0575 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-115" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-115' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #115 at 0x557d46a71610 | State DB: adding IKEv2 state #115 in UNDEFINED | pstats #115 ikev2.ike started | Message ID: init #115: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #115: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #115; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-115" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-115" IKE SA #115 "road-eastnet-nonat-115" "road-eastnet-nonat-115" #115: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-115 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-115": constructed local IKE proposals for road-eastnet-nonat-115 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 115 for state #115 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c00d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #115 | libevent_malloc: new ptr-libevent@0x7fb36c012840 size 128 | #115 spent 0.153 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 resuming | RESET processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 starting work-order 115 for state #115 | RESET processing: connection "road-eastnet-nonat-115" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 115 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.252 milliseconds in whack | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 115 time elapsed 0.000693 seconds | (#115) spent 0.698 milliseconds in crypto helper computing work-order 115: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 115 for state #115 to event queue | scheduling resume sending helper answer for #115 | libevent_malloc: new ptr-libevent@0x7fb3540251c0 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #115 | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 115 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #115 | **emit ISAKMP Message: | initiator cookie: | c4 57 de ea ab 7c 97 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-115 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8d 60 64 b4 6d 6b ab d1 46 47 bf d9 bb b3 15 d9 | ikev2 g^x 76 6a d8 89 d3 b0 5a 81 28 ba 1d 93 76 a5 80 bb | ikev2 g^x 38 99 6f de 11 f7 c8 2c 23 bb 14 6a 9f 0d a9 47 | ikev2 g^x 32 e4 6d d5 c4 32 60 81 49 22 36 5b 90 09 c7 0c | ikev2 g^x 27 45 32 0f 98 73 ed a3 58 24 f6 91 48 ba e7 1f | ikev2 g^x da 48 cc 0b e5 09 56 9d bd e9 fe a4 8f 0e 2b 69 | ikev2 g^x 4d 35 1f 28 bf 51 97 13 c0 2e 28 0e de c2 67 89 | ikev2 g^x 74 f0 15 44 d8 28 5b 7f f9 a9 ff b2 03 37 cf 2c | ikev2 g^x 3b 6e e1 4e 7e c7 1c 07 07 33 f5 e7 ff 50 1f 8d | ikev2 g^x 31 38 08 fc a1 18 db f4 32 10 6d f3 26 bd 9e d9 | ikev2 g^x db 50 5b 6d 6b 19 89 41 88 e3 7e 3b 01 55 72 67 | ikev2 g^x 91 73 3c 48 31 9d dd 55 e1 1b 9a a9 f9 5f 58 30 | ikev2 g^x 2e b7 6d 0e 83 a7 65 f9 86 ec 70 47 1e 65 85 e1 | ikev2 g^x e6 c5 21 98 7e 5c d4 94 dd 2a 93 5a 70 ed 80 a7 | ikev2 g^x 59 4c 40 1d 45 f5 3b 9b ad 67 94 6a 65 cc 62 c5 | ikev2 g^x 57 fb 85 e6 12 1e d8 43 f4 ef fe f0 cc a4 02 e0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 34 89 d0 cd bb 68 33 bb 66 4c 49 99 21 34 57 e7 | IKEv2 nonce 67 32 62 7f b0 e9 7c 89 a8 87 a7 1b 14 49 2b 5f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c4 57 de ea ab 7c 97 93 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 73 | natd_hash: port= 01 f4 | natd_hash: hash= 42 7a 1e c7 ed 14 54 ea ac f9 9a 4e af 78 6e 32 | natd_hash: hash= 16 f1 84 2f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 42 7a 1e c7 ed 14 54 ea ac f9 9a 4e af 78 6e 32 | Notify data 16 f1 84 2f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c4 57 de ea ab 7c 97 93 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1a 60 d9 ab c3 38 58 4e 6c 49 b7 eb b4 e1 91 a6 | natd_hash: hash= 90 ea 24 0f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1a 60 d9 ab c3 38 58 4e 6c 49 b7 eb b4 e1 91 a6 | Notify data 90 ea 24 0f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #115 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #115: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #115 to 4294967295 after switching state | Message ID: IKE #115 skipping update_recv as MD is fake | Message ID: sent #115 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-115" #115: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.115:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #115) | c4 57 de ea ab 7c 97 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d 60 64 b4 6d 6b ab d1 46 47 bf d9 bb b3 15 d9 | 76 6a d8 89 d3 b0 5a 81 28 ba 1d 93 76 a5 80 bb | 38 99 6f de 11 f7 c8 2c 23 bb 14 6a 9f 0d a9 47 | 32 e4 6d d5 c4 32 60 81 49 22 36 5b 90 09 c7 0c | 27 45 32 0f 98 73 ed a3 58 24 f6 91 48 ba e7 1f | da 48 cc 0b e5 09 56 9d bd e9 fe a4 8f 0e 2b 69 | 4d 35 1f 28 bf 51 97 13 c0 2e 28 0e de c2 67 89 | 74 f0 15 44 d8 28 5b 7f f9 a9 ff b2 03 37 cf 2c | 3b 6e e1 4e 7e c7 1c 07 07 33 f5 e7 ff 50 1f 8d | 31 38 08 fc a1 18 db f4 32 10 6d f3 26 bd 9e d9 | db 50 5b 6d 6b 19 89 41 88 e3 7e 3b 01 55 72 67 | 91 73 3c 48 31 9d dd 55 e1 1b 9a a9 f9 5f 58 30 | 2e b7 6d 0e 83 a7 65 f9 86 ec 70 47 1e 65 85 e1 | e6 c5 21 98 7e 5c d4 94 dd 2a 93 5a 70 ed 80 a7 | 59 4c 40 1d 45 f5 3b 9b ad 67 94 6a 65 cc 62 c5 | 57 fb 85 e6 12 1e d8 43 f4 ef fe f0 cc a4 02 e0 | 29 00 00 24 34 89 d0 cd bb 68 33 bb 66 4c 49 99 | 21 34 57 e7 67 32 62 7f b0 e9 7c 89 a8 87 a7 1b | 14 49 2b 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 7a 1e c7 ed 14 54 ea ac f9 9a 4e | af 78 6e 32 16 f1 84 2f 00 00 00 1c 00 00 40 05 | 1a 60 d9 ab c3 38 58 4e 6c 49 b7 eb b4 e1 91 a6 | 90 ea 24 0f | state #115 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c00d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #115 | libevent_malloc: new ptr-libevent@0x7fb36c012840 size 128 | #115 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49609.836749 | resume sending helper answer for #115 suppresed complete_v2_state_transition() and stole MD | #115 spent 0.397 milliseconds in resume sending helper answer | stop processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3540251c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 57 de ea ab 7c 97 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #115 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #115 | rejected packet: | c4 57 de ea ab 7c 97 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #115: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0514 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47f10 | handling event EVENT_RETRANSMIT for parent state #62 | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #62 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #62 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49609.846923; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005293 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0eb30 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #62 | libevent_malloc: new ptr-libevent@0x7fb3540251c0 size 128 "road-eastnet-nonat-62" #62: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #62) | a4 88 8e 77 b1 f4 8c bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 16 5e 67 aa cb b3 98 fe b6 e6 44 1a 07 e2 be | 44 c7 a0 47 e1 e7 ec b4 60 c9 7d b0 5b 56 2d 1b | e4 9a 0e 63 18 22 7a fa a9 c7 63 82 b0 af 0b 0d | 77 29 15 f5 8e 1b 69 90 f4 7c 19 86 79 0a 5f e8 | f6 12 ff 9f 31 22 5c e3 f7 e6 5c 40 a8 f4 37 ed | 38 af f3 38 7f df 64 d9 95 08 2b d7 e3 b5 1f 60 | 26 37 fe 9a 98 33 04 94 0b 0e 07 08 c5 5e 7d f8 | c0 0f 76 eb 24 9a 96 24 01 c7 9b fd dc 2c ed 1c | 7f 8c f6 fb 9d b0 c1 a4 53 e2 53 da 53 65 1f 9e | 4e d5 a4 5d a2 34 99 86 95 17 7b b9 d0 eb c5 9a | 7a c4 fd c2 ec 45 e1 8d 1b 55 bb 91 5f 61 39 83 | ed 3e fd ec 0b 7f cf a5 d0 34 4d 78 f0 19 f9 dd | 25 c0 20 38 67 61 04 4f 0d 51 42 43 cb 7c 44 01 | 6b 99 d1 a6 d3 b1 5e 29 d8 c7 53 4a 9e 9d fe 70 | 66 03 05 bd 1d 96 be 53 72 9a fa 30 50 08 24 ae | eb 69 31 f0 f7 2f d9 1c ab 9d 37 cd ad 7a ed 6a | 29 00 00 24 0c 26 e7 cd 38 ca 58 e6 02 58 43 30 | ae e2 2c 6c 6d 36 d5 ae 9b 11 96 a7 26 d9 7a c2 | 05 18 d0 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 28 4f 82 49 71 8c 73 8e 61 ba dd | 8f a7 28 9b 76 c2 13 ce 00 00 00 1c 00 00 40 05 | 01 46 1c d3 66 df 29 38 51 83 6e 7c d6 51 6d 46 | 6c 4e be 2f | libevent_free: release ptr-libevent@0x7fb37801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47f10 | #62 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 88 8e 77 b1 f4 8c bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #62 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #62 | rejected packet: | a4 88 8e 77 b1 f4 8c bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #62: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.047 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #102 | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #102 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #102 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49609.85421; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000642 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #102 | libevent_malloc: new ptr-libevent@0x7fb37801d920 size 128 "road-eastnet-nonat-102" #102: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #102) | 27 a9 08 a7 62 f6 e2 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 3c 29 a0 c9 87 b4 80 a8 37 0b 02 31 7e 05 06 | 02 b7 61 4c 60 0e af ef 4b 5c b9 dc 19 0b 5d d9 | 85 a8 a5 ba 16 2d 92 a5 e8 44 5d 48 48 06 cf a5 | c8 1d 53 0f c9 1c 2d 7b a3 b3 51 75 2d 98 e2 85 | e1 14 fe ce 69 6e ee 85 ba cc ab 6a ed ac 29 a6 | 04 6d ec cb be 61 e5 98 b4 1e dc 38 dc 20 70 bb | 52 99 a2 ac 6c 5b d5 dd f6 c6 54 38 29 d3 1c 88 | 10 77 53 7e af 0b 17 62 42 90 de ab 20 33 28 bc | 91 f7 eb 8f 86 fb 2e 6b 0f 94 c5 1b d9 40 a4 9e | 85 bd 8a 30 d0 a6 6c 09 f4 53 70 9d 11 c9 76 49 | 32 46 6a 4a 93 73 a4 59 28 e7 d5 c6 a2 40 d9 fe | c5 0c 7c 9f 70 ed 22 06 0b e5 2d 6e 16 d1 d2 84 | dd d9 af a3 b3 06 49 42 9f 97 37 00 03 72 48 b5 | 2c 38 f9 d2 b0 86 d6 8d ff f1 cb a6 a2 01 50 8e | d5 f2 44 23 56 23 e0 80 83 60 74 3c 92 0d 5e fb | ab 02 db 75 25 b6 fb 54 b8 2c cc 93 7e 04 7e 47 | 29 00 00 24 02 3b 00 99 07 4d 65 f7 7a c6 71 3b | f3 f6 94 93 e2 10 88 59 58 b9 a5 ba 96 a3 b3 bb | 2e a4 a0 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f0 3d eb e8 fa 43 c6 b4 69 3b f8 | f6 b0 ac 09 3e c3 01 6c 00 00 00 1c 00 00 40 05 | 27 e7 8a b1 d1 bb a4 87 76 d6 0f f9 d8 03 fa 51 | 25 22 7e d6 | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #102 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 a9 08 a7 62 f6 e2 d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #102 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #102 | rejected packet: | 27 a9 08 a7 62 f6 e2 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #102: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #14 | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #14 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #14 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49609.862548; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00966 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #14 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 "road-eastnet-nonat-14" #14: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #14) | c3 13 eb 28 05 44 3c c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 9d 4b 57 65 9b 44 ef 02 5a 55 12 34 bd 3e fa | 1d 1d 02 b8 47 b4 07 d2 1c 40 a7 d2 b5 27 54 0d | 81 c5 8d d2 b0 f1 46 e6 2b f6 3a de 28 5d 98 ae | 72 2f 81 53 d7 e7 b2 d9 8d 92 9d 09 f6 b7 ce cc | 3e 71 cd 6b bc 9b 98 ad b9 25 11 78 67 a8 99 c6 | d0 09 70 45 b3 4c 5d bb c4 08 3e 65 01 7c 91 1b | 71 62 4d 8f 21 92 6e 0d cc 31 2a e5 1d 4d 2c 13 | a8 c8 3c 02 8d 36 79 d7 6c 16 bc 07 ba a2 3a 87 | 13 5a 36 f7 58 04 34 60 a3 2f 3a 9f 7c 23 64 3e | 35 e2 e2 a2 79 4c 9f fc 94 b5 56 35 03 c7 fc 3a | cf 61 0a a2 ca 12 f9 93 6a 8b f6 7c 71 75 e0 48 | 38 16 70 bd 8e 4a bd d6 cf f6 8e 6b de fc 4a f7 | 37 83 73 dd be 05 96 b0 07 8a ee 94 33 ed 86 17 | 8e 84 02 b1 3c 02 91 6e df 44 9a 23 83 12 9c 66 | e4 27 4d ff 2c b0 4c 89 bc bc 90 88 ea ad 2f 69 | 0e ca 37 3b 42 e0 ad 13 24 ad bb e5 a5 03 12 10 | 29 00 00 24 cb 20 8c 9f 6a 8c dd ed 7f 5a c1 49 | 4c ab 23 eb 51 b5 51 02 d0 17 95 d7 22 4b 61 df | 15 62 c3 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e 81 d0 17 a6 30 05 4d 92 15 c2 f3 | f4 8b 67 24 b4 9e ba 2d 00 00 00 1c 00 00 40 05 | 8a 85 97 fb 20 dc 58 d7 a0 fe fa ad 9b 31 ea 8a | c5 2b 9c 59 | libevent_free: release ptr-libevent@0x7fb35c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #14 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c3 13 eb 28 05 44 3c c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #14 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #14 | rejected packet: | c3 13 eb 28 05 44 3c c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #14: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #92 | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #92 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #92 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49609.897877; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003421 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #92 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 "road-eastnet-nonat-92" #92: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #92) | 07 61 83 69 17 8d a7 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 13 06 9b 22 b9 09 02 07 4e 56 e2 9a 05 b7 70 | b7 25 ba 3c e0 d7 4b 41 68 60 e2 84 fa 7d 2e 53 | 6d 05 81 6c 1d a6 11 6c f3 c1 91 94 93 3c 04 e1 | 47 48 3f a6 f9 c1 bd d3 55 1c 44 87 99 6c 2b ee | 1a fc ef da ca ee 71 5f 90 30 42 cf 28 4f 89 1f | 86 f8 61 c0 95 c8 84 9c 1c 5f 1c 12 41 c6 05 de | 97 e9 89 32 6b 06 59 ff 06 2b 2f 06 a3 7f d2 ee | 73 0b 6d 38 c1 ed f4 4b b5 20 b3 c7 2c 91 97 4e | e0 5f 39 be 43 66 47 ab c5 cc 93 72 f7 60 85 3f | db 39 5c a4 81 f1 02 ef e4 62 a4 fe 72 6e 67 a1 | 96 94 e2 5d 70 64 80 e3 dc 1a 37 fd 9b e4 85 ab | 94 44 5e 2f e2 eb 91 bf ec 37 e1 84 2a 65 44 ca | 1a 08 22 fa 52 cb 8e 26 f3 0a e0 f3 e8 ed d0 ab | dc 5c 23 93 37 b0 3f ec 3e d7 3b 37 ac 5f 12 98 | 95 79 c8 ae bc 21 83 a1 90 e1 8c a5 2a 7f b7 ff | e0 96 4f 2b 8d 89 b3 7b 60 e0 d7 14 33 e7 9c 37 | 29 00 00 24 0e 70 86 57 dd 9d d2 8d 77 a4 03 8e | d4 ef 6c f9 5f 5e da 54 db 62 42 7e 49 f6 2b 1b | b6 ad f3 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 b0 5c 2e fc f8 56 4b e1 e9 3b 08 | c9 71 30 03 41 fd 60 2e 00 00 00 1c 00 00 40 05 | f0 af c3 ce dd eb 90 e8 cb ac 91 a5 38 a0 f8 72 | 06 9d 9d 60 | libevent_free: release ptr-libevent@0x7fb36c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #92 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 61 83 69 17 8d a7 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #92 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #92 | rejected packet: | 07 61 83 69 17 8d a7 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #92: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-116" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-116' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #116 at 0x557d46a72bd0 | State DB: adding IKEv2 state #116 in UNDEFINED | pstats #116 ikev2.ike started | Message ID: init #116: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #116: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #116; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-116" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-116" IKE SA #116 "road-eastnet-nonat-116" "road-eastnet-nonat-116" #116: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-116 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-116": constructed local IKE proposals for road-eastnet-nonat-116 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 116 for state #116 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4d5d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #116 | libevent_malloc: new ptr-libevent@0x7fb36c00cf80 size 128 | #116 spent 0.155 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-116" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.24 milliseconds in whack | crypto helper 7 resuming | crypto helper 7 starting work-order 116 for state #116 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 116 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 116 time elapsed 0.000956 seconds | (#116) spent 0.965 milliseconds in crypto helper computing work-order 116: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 116 for state #116 to event queue | scheduling resume sending helper answer for #116 | libevent_malloc: new ptr-libevent@0x7fb3480251c0 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #116 | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 116 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #116 | **emit ISAKMP Message: | initiator cookie: | b2 c1 8f cb f7 6a 1e a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-116 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b0 10 14 ae 52 93 c7 02 e8 52 e1 37 d5 de 46 8c | ikev2 g^x fd 60 c1 85 87 df bb 73 86 74 dd ca 8d 28 84 e8 | ikev2 g^x ae a4 cc 28 e4 8d 32 74 8d 1a ce d7 d3 d2 af b0 | ikev2 g^x 17 d9 f0 1f a3 6b 80 67 ac 90 16 e8 bd 63 76 cd | ikev2 g^x 29 1d 99 79 32 0a f9 72 a3 b1 6c a3 80 e8 98 c7 | ikev2 g^x 50 db 8b a2 a3 d2 f5 f7 af ea cb e0 92 9e 24 f1 | ikev2 g^x ee d0 e5 d9 31 06 c1 bd 2c 7e d3 0a 21 44 11 df | ikev2 g^x a4 42 5a ee bb 8a 79 72 e4 f3 c9 99 7b df 25 70 | ikev2 g^x 3c 49 19 99 e1 b4 65 cb cf 1f dc af da 2b bd 09 | ikev2 g^x 11 55 b0 c8 e4 15 8c 50 3c c0 c3 00 8c 8c 4c ab | ikev2 g^x 69 1b ad 8f b8 1a e0 31 01 be 05 d6 f9 1d 43 66 | ikev2 g^x f1 fd 89 96 83 b0 fe 81 90 88 96 0a aa b0 30 a0 | ikev2 g^x 85 c7 97 d5 26 67 92 b8 99 15 c1 d7 75 f8 4b 96 | ikev2 g^x 28 a4 71 fb e3 bc ab 36 e6 56 13 b6 1e 48 b3 3d | ikev2 g^x 9c e0 fd 0d 74 f8 ef 54 b8 1f 40 6b e3 af 77 76 | ikev2 g^x c8 a0 52 42 e3 01 29 91 49 f3 39 82 3e 75 b6 74 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f8 40 4d b3 f4 26 54 f3 cf b0 a0 c8 54 6e 9f a9 | IKEv2 nonce 95 bb 15 87 06 e3 63 86 66 7d 8a 82 ee 67 c6 52 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b2 c1 8f cb f7 6a 1e a7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 74 | natd_hash: port= 01 f4 | natd_hash: hash= b2 63 f6 16 ae 7e d5 6c 46 12 68 8c 69 38 5c 9a | natd_hash: hash= 54 a3 19 f3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b2 63 f6 16 ae 7e d5 6c 46 12 68 8c 69 38 5c 9a | Notify data 54 a3 19 f3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b2 c1 8f cb f7 6a 1e a7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9e 9c 34 46 1f 45 a3 36 da 24 a6 33 3a 00 62 20 | natd_hash: hash= 5b e0 e0 ea | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9e 9c 34 46 1f 45 a3 36 da 24 a6 33 3a 00 62 20 | Notify data 5b e0 e0 ea | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #116 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #116: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #116 to 4294967295 after switching state | Message ID: IKE #116 skipping update_recv as MD is fake | Message ID: sent #116 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-116" #116: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.116:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #116) | b2 c1 8f cb f7 6a 1e a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 10 14 ae 52 93 c7 02 e8 52 e1 37 d5 de 46 8c | fd 60 c1 85 87 df bb 73 86 74 dd ca 8d 28 84 e8 | ae a4 cc 28 e4 8d 32 74 8d 1a ce d7 d3 d2 af b0 | 17 d9 f0 1f a3 6b 80 67 ac 90 16 e8 bd 63 76 cd | 29 1d 99 79 32 0a f9 72 a3 b1 6c a3 80 e8 98 c7 | 50 db 8b a2 a3 d2 f5 f7 af ea cb e0 92 9e 24 f1 | ee d0 e5 d9 31 06 c1 bd 2c 7e d3 0a 21 44 11 df | a4 42 5a ee bb 8a 79 72 e4 f3 c9 99 7b df 25 70 | 3c 49 19 99 e1 b4 65 cb cf 1f dc af da 2b bd 09 | 11 55 b0 c8 e4 15 8c 50 3c c0 c3 00 8c 8c 4c ab | 69 1b ad 8f b8 1a e0 31 01 be 05 d6 f9 1d 43 66 | f1 fd 89 96 83 b0 fe 81 90 88 96 0a aa b0 30 a0 | 85 c7 97 d5 26 67 92 b8 99 15 c1 d7 75 f8 4b 96 | 28 a4 71 fb e3 bc ab 36 e6 56 13 b6 1e 48 b3 3d | 9c e0 fd 0d 74 f8 ef 54 b8 1f 40 6b e3 af 77 76 | c8 a0 52 42 e3 01 29 91 49 f3 39 82 3e 75 b6 74 | 29 00 00 24 f8 40 4d b3 f4 26 54 f3 cf b0 a0 c8 | 54 6e 9f a9 95 bb 15 87 06 e3 63 86 66 7d 8a 82 | ee 67 c6 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 63 f6 16 ae 7e d5 6c 46 12 68 8c | 69 38 5c 9a 54 a3 19 f3 00 00 00 1c 00 00 40 05 | 9e 9c 34 46 1f 45 a3 36 da 24 a6 33 3a 00 62 20 | 5b e0 e0 ea | state #116 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c00cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4d5d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #116 | libevent_malloc: new ptr-libevent@0x7fb36c00cf80 size 128 | #116 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49609.902652 | resume sending helper answer for #116 suppresed complete_v2_state_transition() and stole MD | #116 spent 0.503 milliseconds in resume sending helper answer | stop processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3480251c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 c1 8f cb f7 6a 1e a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #116 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #116 | rejected packet: | b2 c1 8f cb f7 6a 1e a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #116: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0821 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #109 | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #109 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #109 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49609.906915; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500202 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fd070 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #109 | libevent_malloc: new ptr-libevent@0x7fb3480251c0 size 128 "road-eastnet-nonat-109" #109: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #109) | 53 c2 aa ad 50 91 d9 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 1a 23 bb a3 ce 6a 0d 92 7a aa 8d 69 c7 99 27 | db f2 23 5c cd 5e 2d f6 c4 13 c1 c7 87 46 ed 75 | d8 b9 55 72 40 32 53 f1 21 db f3 6d 45 6a d9 b4 | 9c 06 b1 28 c5 00 1e e2 70 2c 2a 1a f0 fa 65 1b | a8 db b9 2c 83 95 23 c4 4d 60 4b a3 fc 58 c6 c8 | a8 b0 c1 e8 32 2c d3 70 a2 4d cb c8 7c 80 17 90 | c1 c1 fd 82 03 1f 32 d8 5e cd ad 60 ce c1 24 ab | 82 68 88 db 79 b3 aa 37 ff 36 d4 a3 82 06 b7 59 | 0c 4c 61 6f 22 1c 48 b3 94 8b 71 14 8f 57 c8 03 | 31 41 b9 e3 a9 ea 8f 4d 51 15 4a 4c 5f 30 c2 c4 | 40 3e 6a 9e 7d 33 6d fb 91 1c b2 be 1e 33 35 f6 | 1a db ff 1e 8c 4e e8 12 71 d7 94 88 49 d8 37 d9 | cb 52 5b 22 87 0a c9 2f a4 1d 52 36 85 74 38 7e | de e2 44 79 f2 36 18 5e 82 cf d4 fb db 3f c9 35 | 36 d8 7b 5d 04 fb fa a4 fe b5 87 c5 e7 4e 90 d6 | 9f 17 87 48 32 5d ec 5c f7 e6 e2 39 17 1c 9c 2a | 29 00 00 24 8f bd ba cb 6b fc de c1 80 b9 fe c3 | b3 e0 ad b2 e9 fa 37 77 43 04 c6 81 1a 91 41 eb | 20 40 b9 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f d2 7c ae 7e 39 2b fb 54 2c 44 94 | 2e c2 37 67 8d e5 fe 8b 00 00 00 1c 00 00 40 05 | 12 b6 58 87 f0 a8 b9 d4 aa ae 6f 5a ed df 76 d7 | 1d 86 02 2c | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #109 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 c2 aa ad 50 91 d9 00 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #109 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #109 | rejected packet: | 53 c2 aa ad 50 91 d9 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #109: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ef4e0 | handling event EVENT_RETRANSMIT for parent state #63 | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #63 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #63 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49609.907178; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002771 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #63 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 "road-eastnet-nonat-63" #63: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #63) | 43 a8 4d 01 ec 36 de 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa e2 93 e3 30 a1 06 ee b4 85 58 c9 2f 9d d0 1a | ad 38 32 dc 30 89 d1 a0 98 57 8d 01 77 84 b3 55 | 47 fd ae cc e0 a9 2a 35 58 f1 6a 27 c8 b7 88 d3 | c3 78 1e 95 37 0b 81 ee cb 00 02 38 fb 0c bc ff | 55 19 c6 c0 be 69 d1 78 c8 9a ae e0 96 6c 3f 9b | 54 61 8c 4b 6b 45 ac 74 a1 6d f1 1d de 9e c2 52 | 40 62 38 7c 4d c1 06 5c f5 e4 71 d5 c6 8f eb 8d | a1 58 7d a8 05 d7 f2 d1 12 1f d4 be 60 08 06 1f | 2a 4d 28 f0 ba 0e 77 13 d0 8f 4c 08 fc 37 3f 98 | 37 6b f8 7a b1 44 d3 8b 12 01 3a e0 ab 1c 6f 72 | d8 5a cc 1f f0 ef fd b0 38 cb c0 2b 70 72 dd 77 | 20 94 89 cc 24 42 7c 89 06 09 17 e9 b7 42 85 43 | b5 81 b7 cc a1 a3 3a 6b b1 18 c1 ec 8a 13 0d f9 | 71 43 3d 9a 1f 64 16 b7 2b bd 29 ea 9f 4f 17 43 | a8 18 9f fc 5b 56 59 fa 46 4c 5d 82 89 28 f2 04 | 51 6c b3 97 3a a5 95 f1 fd 87 8b 14 08 ce a0 6b | 29 00 00 24 42 95 7e 08 3c e5 ab b4 d2 f9 ef 7f | d8 0c 96 cd c4 ca c3 e4 35 0f 70 37 5f 05 86 60 | 4b 19 91 ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 ed eb 0b 29 2b d1 a0 42 dd cd 92 | 88 75 fb d1 70 51 78 cf 00 00 00 1c 00 00 40 05 | a8 06 2d d1 ac 32 5a b6 7e b8 ae d6 ec a9 34 27 | 7d 9e 90 d0 | libevent_free: release ptr-libevent@0x7fb35801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ef4e0 | #63 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 a8 4d 01 ec 36 de 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #63 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #63 | rejected packet: | 43 a8 4d 01 ec 36 de 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #63: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0572 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_RETRANSMIT for parent state #103 | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #103 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #103 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49609.929441; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001596 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5af90 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #103 | libevent_malloc: new ptr-libevent@0x7fb35801d920 size 128 "road-eastnet-nonat-103" #103: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #103) | 20 80 ad df 5a 9a 13 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d a9 30 94 a8 d4 ad b7 ab 41 10 cf dd 34 d7 45 | db 9e 99 58 0d 72 d8 74 bd 3c 1d 4a 98 9b ff 38 | 08 61 4e c7 a6 75 c7 cd ff 21 41 e1 5d c2 9d c6 | 7c 47 d1 97 8a 16 0e 0e 3c 96 7a d8 10 82 5b 8a | 00 b3 29 44 ad 13 12 a6 fb af 01 2d 66 5c e1 02 | 4b 01 af e5 ba 61 e3 fe 71 46 2a af 0d 0d 2a 26 | f8 12 e9 10 f0 8f ca f1 fd 82 c7 ea fa 46 02 26 | b6 95 72 2c b1 d7 c7 46 5a e6 4a 07 87 39 fe e7 | c6 a1 7d 2d 52 a4 c7 a2 b5 e7 2f 2b 1d 48 eb d9 | 7c e8 c4 cb da 19 e0 04 20 53 7b 3c 73 86 a7 70 | c7 09 d6 f9 52 be 12 99 31 58 c4 f8 6c 8b 22 3a | c5 da 0c e1 bd 65 73 c3 27 14 e7 0f ae a0 e8 45 | 58 e0 c3 02 1b 48 ee 20 03 b9 0c ec ad e0 21 05 | 1b 38 52 4b dd 92 f0 58 d2 29 eb 4e be 57 49 4d | 5d 0f a4 01 4b 76 95 2b 60 de d3 82 01 e6 15 d8 | 32 f5 60 60 88 d1 83 bc a6 c2 db 62 29 b3 d7 5e | 29 00 00 24 fb ef 9e 44 e4 82 6e 41 3f 46 3a c8 | d1 69 b9 34 c6 14 27 a3 23 52 4c 58 0c 66 b4 10 | 6a d0 69 ee 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 a3 d6 8d 6e 26 8b a3 26 28 d5 ff | 4a 28 a8 bb 6f af 66 22 00 00 00 1c 00 00 40 05 | e5 6e de 91 25 32 b5 3b 38 9d 70 ef 64 14 11 f9 | c0 c1 79 e6 | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | #103 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 80 ad df 5a 9a 13 26 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #103 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #103 | rejected packet: | 20 80 ad df 5a 9a 13 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #103: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34800d120 | handling event EVENT_RETRANSMIT for parent state #15 | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #15 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #15 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49609.954726; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005533 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #15 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 "road-eastnet-nonat-15" #15: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #15) | 26 a2 6e 3b 12 a8 59 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 6b 03 2b 64 b1 a2 70 7f 8d ca f2 6f 54 de 1b | 11 e2 1d 10 c1 2b 3c 5f 6d e7 ca 6d ea a7 28 53 | d6 4f 75 27 52 bc 43 63 3a ab 63 49 ff c4 e6 b2 | 78 96 18 25 61 28 7f 9b 98 22 5e da 00 8c e8 eb | 6c 4d 9e 76 25 8b 7a 47 ab 33 22 55 42 23 3f c1 | 32 ba e7 e4 c9 4a 5f 0d 8b 0d 29 12 b2 18 5b ef | 5f af 09 c8 a4 7c fe 53 bc 8e 96 c3 8e be 32 ff | 43 00 6d 58 cd 42 72 b2 1b fc 90 55 08 bf 9d 89 | 5e b3 d9 d7 ab 1d c3 3d 09 0d c3 a0 b4 39 9a 0c | ea 26 37 38 25 17 00 86 5a bc 7b e6 34 6a b8 82 | f3 f9 2d 18 8b 60 8a e1 44 59 97 9d 3d 8f e9 c5 | f8 41 9b cd 41 cb 5c 6e 45 99 77 f2 5a 87 7b f0 | 1d 7f 22 98 41 7d c2 e4 77 82 d2 02 ca 3f 14 b4 | ed 6e 31 66 40 7e 40 f0 ba 85 c9 d3 8f 47 3c 65 | b9 d2 a6 cf 54 28 00 31 9f 56 44 5d 75 4a b4 99 | 1b dd 03 d3 13 f1 55 d7 db 2e bc 45 cf 65 35 32 | 29 00 00 24 67 e3 6e 73 a7 21 14 7b f9 65 b0 3b | c5 ad 46 44 e6 80 5b 79 23 9d d2 69 99 df e6 8a | c8 33 da 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 9d 30 3b 19 a7 57 ef 03 62 55 06 | 80 94 c0 4d a8 e2 a5 61 00 00 00 1c 00 00 40 05 | d9 d1 f1 c9 94 93 28 e9 a6 95 bd a3 15 8f 8e 30 | 15 95 ff 3f | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800d120 | #15 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 a2 6e 3b 12 a8 59 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #15 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #15 | rejected packet: | 26 a2 6e 3b 12 a8 59 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #15: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-117" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-117' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #117 at 0x557d46a74190 | State DB: adding IKEv2 state #117 in UNDEFINED | pstats #117 ikev2.ike started | Message ID: init #117: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #117: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #117; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-117" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-117" IKE SA #117 "road-eastnet-nonat-117" "road-eastnet-nonat-117" #117: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-117 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-117": constructed local IKE proposals for road-eastnet-nonat-117 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 117 for state #117 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34800d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #117 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 | #117 spent 0.123 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 resuming | RESET processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-117" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 8 starting work-order 117 for state #117 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.218 milliseconds in whack | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 117 | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 117 time elapsed 0.000707 seconds | (#117) spent 0.698 milliseconds in crypto helper computing work-order 117: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 117 for state #117 to event queue | scheduling resume sending helper answer for #117 | libevent_malloc: new ptr-libevent@0x7fb34c0251c0 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #117 | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 117 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #117 | **emit ISAKMP Message: | initiator cookie: | 4a b5 59 cb ed d6 a3 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-117 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4a 62 d1 99 4b 20 24 18 5d d2 31 2a 1c e6 82 aa | ikev2 g^x d2 1a 74 70 f8 1e f2 71 00 48 0a 80 0d 91 e6 e0 | ikev2 g^x e0 7b 66 1e 0f a2 c5 f3 2e cc 8d 72 40 de 7d 14 | ikev2 g^x e0 b7 d4 a2 80 96 97 77 ac ba 2b fb 1f 79 f2 32 | ikev2 g^x 8b a5 84 65 3d e1 3e 2e 60 82 26 3f 6d cf 4b 43 | ikev2 g^x 84 0b 96 d0 d5 70 61 64 4c 71 e0 b1 63 e8 0c 82 | ikev2 g^x 17 82 85 c0 c3 eb d9 cf 4e b8 f4 b1 87 57 e5 c1 | ikev2 g^x 06 2a d8 41 87 ab aa ec 3f f6 5e ac 9b 45 ab a8 | ikev2 g^x 0b e4 13 8d 76 0c 8c 2b 1f d4 61 19 ad 16 37 d8 | ikev2 g^x d0 65 3e 14 53 34 26 1a a6 5e 31 57 79 20 50 43 | ikev2 g^x 71 29 f3 4a 86 68 0e 08 74 59 1e 0f 6e 37 0c 10 | ikev2 g^x b2 e1 5f 52 67 c2 35 e3 ff 31 9d c5 bb 7f 45 96 | ikev2 g^x 61 58 38 40 0e b5 86 40 8f 24 ab 5a 52 cc 83 a1 | ikev2 g^x 23 61 7d 29 78 a8 96 57 13 15 75 48 5f 5a 5b 21 | ikev2 g^x 7b dd 4e 50 1d 23 67 01 84 5f f8 e7 69 4f 16 1a | ikev2 g^x 7e b5 9f 38 da 45 67 22 75 50 ab b6 62 cc cb 76 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c3 7a 28 6c 12 59 4b e7 9f 08 e5 89 61 e9 dd c1 | IKEv2 nonce 64 c5 cd 33 70 a1 b8 fb a5 4b b4 8c 0b 78 ad a3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4a b5 59 cb ed d6 a3 10 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 75 | natd_hash: port= 01 f4 | natd_hash: hash= 94 90 26 e7 b8 63 3c dc 5c 03 43 0c 57 b3 5f a9 | natd_hash: hash= 02 48 0a b5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 94 90 26 e7 b8 63 3c dc 5c 03 43 0c 57 b3 5f a9 | Notify data 02 48 0a b5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4a b5 59 cb ed d6 a3 10 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 75 50 aa 52 d7 4b 1d bd 0c f6 2a 37 d5 af e8 8d | natd_hash: hash= 12 a0 66 45 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 75 50 aa 52 d7 4b 1d bd 0c f6 2a 37 d5 af e8 8d | Notify data 12 a0 66 45 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #117 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #117: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #117 to 4294967295 after switching state | Message ID: IKE #117 skipping update_recv as MD is fake | Message ID: sent #117 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-117" #117: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.117:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #117) | 4a b5 59 cb ed d6 a3 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 62 d1 99 4b 20 24 18 5d d2 31 2a 1c e6 82 aa | d2 1a 74 70 f8 1e f2 71 00 48 0a 80 0d 91 e6 e0 | e0 7b 66 1e 0f a2 c5 f3 2e cc 8d 72 40 de 7d 14 | e0 b7 d4 a2 80 96 97 77 ac ba 2b fb 1f 79 f2 32 | 8b a5 84 65 3d e1 3e 2e 60 82 26 3f 6d cf 4b 43 | 84 0b 96 d0 d5 70 61 64 4c 71 e0 b1 63 e8 0c 82 | 17 82 85 c0 c3 eb d9 cf 4e b8 f4 b1 87 57 e5 c1 | 06 2a d8 41 87 ab aa ec 3f f6 5e ac 9b 45 ab a8 | 0b e4 13 8d 76 0c 8c 2b 1f d4 61 19 ad 16 37 d8 | d0 65 3e 14 53 34 26 1a a6 5e 31 57 79 20 50 43 | 71 29 f3 4a 86 68 0e 08 74 59 1e 0f 6e 37 0c 10 | b2 e1 5f 52 67 c2 35 e3 ff 31 9d c5 bb 7f 45 96 | 61 58 38 40 0e b5 86 40 8f 24 ab 5a 52 cc 83 a1 | 23 61 7d 29 78 a8 96 57 13 15 75 48 5f 5a 5b 21 | 7b dd 4e 50 1d 23 67 01 84 5f f8 e7 69 4f 16 1a | 7e b5 9f 38 da 45 67 22 75 50 ab b6 62 cc cb 76 | 29 00 00 24 c3 7a 28 6c 12 59 4b e7 9f 08 e5 89 | 61 e9 dd c1 64 c5 cd 33 70 a1 b8 fb a5 4b b4 8c | 0b 78 ad a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 90 26 e7 b8 63 3c dc 5c 03 43 0c | 57 b3 5f a9 02 48 0a b5 00 00 00 1c 00 00 40 05 | 75 50 aa 52 d7 4b 1d bd 0c f6 2a 37 d5 af e8 8d | 12 a0 66 45 | state #117 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34800d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #117 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 | #117 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49609.962722 | resume sending helper answer for #117 suppresed complete_v2_state_transition() and stole MD | #117 spent 0.448 milliseconds in resume sending helper answer | stop processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c0251c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a b5 59 cb ed d6 a3 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #117 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #117 | rejected packet: | 4a b5 59 cb ed d6 a3 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #117: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0732 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46906b40 | handling event EVENT_RETRANSMIT for parent state #64 | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #64 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #64 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49609.973919; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004144 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ef4e0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #64 | libevent_malloc: new ptr-libevent@0x7fb34c0251c0 size 128 "road-eastnet-nonat-64" #64: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #64) | 28 7e be 04 bb c7 3c e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 7e 43 6c c6 61 f7 8d 74 52 44 4a 1c ca e7 9e | ac 14 d9 31 6d 60 9d f4 ba 6e c2 e0 7b d5 53 a3 | 16 85 f9 c3 ce f8 f1 6f bf 00 c2 bc 5a d4 f5 80 | d8 8f 02 50 d5 75 7e 2e dc 8c e1 ab a9 5d a2 cc | da fa 4e bf fb 7e 0d a9 06 25 1f 41 e3 0d cd 1b | 1a a7 53 a9 ce 79 cd b5 77 9b b8 2e 89 66 fa cb | ad fc 1f a1 86 e2 14 75 9e d9 ee bd ba f9 9f 7c | e4 64 68 99 18 9c 70 2b 82 20 55 55 75 56 88 5d | d8 d5 c7 f6 4d e5 dc 25 37 08 b7 1b d0 a6 99 40 | 0a 49 58 f6 83 1c 88 a0 08 dc b3 c1 aa ed 91 6f | c6 a5 be 4d 6b b9 bb 18 cf 12 ba 0d 71 89 70 ef | 66 fa c4 5b 33 09 3f ff 55 ca 19 24 9a 74 4d 4c | d1 a6 e0 57 41 7a 44 3f b8 12 3a 3f 06 a7 52 cd | 97 1c e0 a8 3c be fa 81 97 1d d6 2b 3f 0b c8 9f | b8 ad e1 63 a0 10 8f f1 ce 62 64 83 9e 28 1c 57 | ba 8c 77 7e 6f fe 44 22 ea fc fc 43 05 9a a7 9f | 29 00 00 24 d6 fa 6f 28 11 8e 89 70 36 5a 3b d2 | 30 2c 96 5f 7f e3 aa dc e7 9f 74 e4 9d 9a 67 37 | a5 4e 3a 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 34 45 e6 51 f4 83 8b a3 3b 13 c9 | fe 48 d2 4a 75 21 a9 ed 00 00 00 1c 00 00 40 05 | 1b 38 c5 d0 41 1e ff f1 67 34 2b 17 6a 69 bf 2e | 0c d6 b9 4f | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46906b40 | #64 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 7e be 04 bb c7 3c e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #64 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #64 | rejected packet: | 28 7e be 04 bb c7 3c e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #64: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0603 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #110 | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #110 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #110 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49610.010212; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500438 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46906b40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #110 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 "road-eastnet-nonat-110" #110: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #110) | 3a df d4 0d 3f 72 b9 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 51 e2 9f 86 58 b1 8c 95 ac 68 08 4c 4a f6 70 | ad a1 89 82 51 9f 97 f7 49 8c 33 6b 14 6a e8 d8 | 5d 56 92 c8 3c 2c 40 17 32 2d 8f e8 79 30 ee 40 | f9 ba 9e a6 39 a8 9f 6a 60 30 36 fa 91 73 4e bf | e6 d5 bf ce 9d 89 72 4d e1 c3 4f 68 a3 0e 2d 22 | 55 9f 70 0b d2 5a 8e 49 bb 26 55 db 7b 06 39 59 | 26 09 73 11 d4 24 0c 12 fd 4f 4c 65 6c 3c af 90 | 8b 17 1f a8 52 96 38 96 91 03 13 81 89 15 d8 cf | 89 39 0b 98 8d cb b9 22 57 8d d7 cd 73 bd 42 b5 | c1 8a b1 55 88 ee 90 bf 86 98 c5 68 56 01 34 02 | ea ea cd ee 0d 3a 71 7c d0 06 82 a7 ca 34 05 ec | e1 16 4c 22 f3 b3 ca 01 1c d1 2d c9 10 65 0e d7 | 83 4d bc 53 a1 a2 68 8a 44 da c7 16 6f 1e 28 70 | e8 f3 08 87 27 18 70 75 bc 4e bd 4f 1d 1a 9f 84 | ef 78 e6 04 c6 13 ce e5 f8 3c cb 1e ba 12 8a 0a | 59 36 fd 3c 70 1f 1b ce d5 b3 7d ea 00 09 cd 9d | 29 00 00 24 58 d9 16 9f 6f 84 74 3f e6 2f bd ae | 97 8a 68 2c 39 11 78 2c 3d 3c 5e 7b f6 a4 c9 df | f7 87 68 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f6 22 5f bf 4c e5 cb 6e 52 c3 e8 | bb 73 1b e3 52 cd b5 da 00 00 00 1c 00 00 40 05 | 55 f2 83 9d d0 ff 8f 70 ef 45 0c 6f 49 6d a9 68 | 5e 51 a7 34 | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #110 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a df d4 0d 3f 72 b9 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #110 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #110 | rejected packet: | 3a df d4 0d 3f 72 b9 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #110: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #104 | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #104 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #104 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49610.013496; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003261 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #104 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 "road-eastnet-nonat-104" #104: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #104) | c8 97 67 f1 1b 46 da 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 e4 3d 30 95 de e5 8c 73 da 01 a0 e2 a0 c0 5e | ab 07 43 87 84 24 88 49 ca d1 13 72 cc 7b 38 93 | 5a ab ff 3c 3d d2 b7 a9 16 19 a5 56 5c 01 9f 05 | 2f 70 be 2d 9d 04 2c f7 80 b3 5f 24 70 c4 0d 58 | b9 f4 31 d3 bd 25 62 64 07 37 4c 59 6f a0 74 90 | e2 15 77 64 4c 06 2d 41 bc 70 c3 30 0a 01 9b df | a0 88 42 69 26 57 a1 25 9a c0 ee 4c ee 57 50 5f | 0c 95 2a a5 72 cb d8 81 34 25 75 ee 4d 04 23 27 | e9 da 7c 36 60 32 11 97 39 d8 f4 3f 96 13 6c 72 | 19 1d 43 e4 f0 4a 92 88 29 4c 84 63 63 7d 3a aa | 3f 23 85 5a 73 71 01 2f 63 e6 b3 a0 2d 7f 75 e1 | e9 d4 1c 1a 83 67 2e 29 49 85 8a a1 31 04 a5 31 | 1b e6 35 a4 14 80 ac 17 6c 11 db 3d c3 88 57 d2 | 55 c5 b6 4e 2c 2b 58 d9 50 1f f2 54 b6 50 63 00 | d4 ad 6c 3c 60 cd 52 3b 9b 0f 69 cc f2 8f 29 dc | 29 5e 75 22 60 a0 c9 59 5b 00 1a 98 02 fb 23 0f | 29 00 00 24 16 fd b9 d2 33 64 36 d1 f0 bb fa 0d | d8 4a 7e 7c 2a 2e d1 92 40 9f bf f6 34 ac 7a 15 | 2b 49 c7 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 28 db 0c 20 22 dd ba ac 9b fa 10 | b6 bd 27 81 bf 6a a0 a8 00 00 00 1c 00 00 40 05 | 90 9a 71 02 e5 61 58 ec fb 0f 5f 95 cd f2 2e 99 | e5 4b 54 60 | libevent_free: release ptr-libevent@0x7fb3600251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #104 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 97 67 f1 1b 46 da 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #104 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #104 | rejected packet: | c8 97 67 f1 1b 46 da 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #104: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0687 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e05a0 | handling event EVENT_RETRANSMIT for parent state #93 | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #93 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #93 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49610.020895; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004538 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #93 | libevent_malloc: new ptr-libevent@0x7fb3600251c0 size 128 "road-eastnet-nonat-93" #93: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #93) | 8f 2b 82 41 be 50 7f e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cd 43 20 82 ea 0d 92 4d b7 6f 10 e5 73 62 a1 74 | 5f 8b b1 bd e8 48 72 86 0f fc f7 f4 6d aa 74 9c | c6 32 cc 9c 2e 89 27 81 1a 44 1a e2 a0 dc ee ce | 11 9a 86 db b2 0d 84 8c a7 35 4b a3 54 44 ff a5 | 46 90 60 08 6b 0b b2 6e 30 fe 4a 71 80 d7 a0 82 | 42 f8 84 b3 d1 ca 25 4a c6 d4 78 a8 df 7e e5 c9 | 03 e0 84 12 8e f0 91 14 81 e1 1e 7d 14 d0 21 c6 | 0b a7 bd a5 91 4d 74 5f a5 49 fb 47 92 a4 f6 f2 | 46 b5 1e 26 6d f1 8f 2b 0f f1 aa b1 98 3a 25 3a | b5 d3 2a 4c bc bb 1d f8 fd dc 58 f3 d0 d8 1b 32 | 38 77 9b c8 3c 93 48 af 2e 17 ec f8 87 96 76 0f | 85 58 80 2d fe e0 ad 94 9a 85 9c 5e 26 2b ed 2c | f6 a6 2f 18 05 50 d7 9c 67 0d fc 1d 16 0d 73 cf | e1 da cd 32 28 a8 c7 82 3a 82 36 71 d2 89 fb 29 | 72 68 23 fe 3a 1e 23 55 bf ae 58 43 08 3b 0f b5 | 11 45 c9 10 6a 4c 49 3d 66 da 53 be f8 72 a4 ba | 29 00 00 24 38 5c 7f a9 1f f6 b2 d3 ed 46 5d a7 | 91 ec df cb c1 74 f9 14 df e8 fc 11 90 67 a3 a7 | 1e 7f 11 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c cc 1f b2 cd 2b 6c 7e 5b 50 dd 93 | 55 b1 e2 f6 27 0b bd 36 00 00 00 1c 00 00 40 05 | b6 37 a4 32 e9 5e 9f 19 d6 7a 97 0a 5b 76 69 49 | 01 0d 5c 45 | libevent_free: release ptr-libevent@0x7fb35c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e05a0 | #93 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 2b 82 41 be 50 7f e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #93 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #93 | rejected packet: | 8f 2b 82 41 be 50 7f e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #93: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-118" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-118' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #118 at 0x557d46a75750 | State DB: adding IKEv2 state #118 in UNDEFINED | pstats #118 ikev2.ike started | Message ID: init #118: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #118: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #118; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-118" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-118" IKE SA #118 "road-eastnet-nonat-118" "road-eastnet-nonat-118" #118: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-118 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-118": constructed local IKE proposals for road-eastnet-nonat-118 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 118 for state #118 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469e05a0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #118 | libevent_malloc: new ptr-libevent@0x7fb35c01d920 size 128 | #118 spent 0.136 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-118" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 12 resuming | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 12 starting work-order 118 for state #118 | spent 0.222 milliseconds in whack | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 118 | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 118 time elapsed 0.000788 seconds | (#118) spent 0.789 milliseconds in crypto helper computing work-order 118: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 118 for state #118 to event queue | scheduling resume sending helper answer for #118 | libevent_malloc: new ptr-libevent@0x7fb3400250b0 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #118 | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 118 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #118 | **emit ISAKMP Message: | initiator cookie: | 8e a7 a4 7e e9 0a bc a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-118 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9a ec c5 01 c5 e9 b5 94 ac 43 67 db 08 47 bd 0c | ikev2 g^x 54 49 81 74 3a 3b f9 51 2c 6b 48 98 c1 d5 7c ee | ikev2 g^x 4b 95 1c 5e 71 e6 0b 08 a0 85 de c0 1d ef b9 d0 | ikev2 g^x 5c f8 32 2b 5d f8 44 47 b6 dc c5 4b 50 10 f9 77 | ikev2 g^x 99 80 83 bc 5c bf 6a 79 a5 41 39 97 c6 b0 17 4c | ikev2 g^x 84 d1 fa 16 7a 7a 3e e5 51 2d fc 5d b0 66 e1 6f | ikev2 g^x 66 c6 ed f3 a4 54 56 06 ac 5d ee b2 4b 4a 38 5f | ikev2 g^x aa 09 29 91 e5 8c 9b 64 60 8e 7c f6 86 7a 07 43 | ikev2 g^x f1 93 d1 26 4a 28 da b7 0c a1 1a 0c 4c d6 c5 1f | ikev2 g^x ee f5 92 b2 e4 15 93 35 4c 07 88 be ec 21 4e 23 | ikev2 g^x f9 ed 56 db b0 43 b1 c7 7d 57 a1 20 bb 88 d2 9a | ikev2 g^x 23 9e be ef e2 0d b6 dc 67 12 32 69 0b ef 17 5f | ikev2 g^x 45 8b bf 08 ff c1 84 fb d6 41 58 81 ba c4 68 e8 | ikev2 g^x 6d 5c 50 c4 fa 14 2d 1e b6 d3 3f da 53 ee 59 40 | ikev2 g^x e0 c2 e3 5e 46 f4 96 f5 35 c7 87 50 c6 81 32 4e | ikev2 g^x 30 f8 e6 fa a0 f5 a3 88 f0 51 68 02 71 eb f4 fa | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce fc fa 6f 0b ed d7 fd 9b f1 eb 70 56 1f a0 0f 98 | IKEv2 nonce c6 28 ab da a8 c2 09 53 33 ea a7 33 5c 74 50 4f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8e a7 a4 7e e9 0a bc a4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 76 | natd_hash: port= 01 f4 | natd_hash: hash= 2e 87 94 32 ac f3 4e 0f e0 49 b5 2d ec 68 6c 45 | natd_hash: hash= 41 83 dc 40 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2e 87 94 32 ac f3 4e 0f e0 49 b5 2d ec 68 6c 45 | Notify data 41 83 dc 40 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8e a7 a4 7e e9 0a bc a4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e8 e9 7b b7 56 9d 8b dd 59 77 e6 95 c2 ea 88 7c | natd_hash: hash= d5 64 a3 dc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e8 e9 7b b7 56 9d 8b dd 59 77 e6 95 c2 ea 88 7c | Notify data d5 64 a3 dc | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #118 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #118: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #118 to 4294967295 after switching state | Message ID: IKE #118 skipping update_recv as MD is fake | Message ID: sent #118 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-118" #118: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.118:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #118) | 8e a7 a4 7e e9 0a bc a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a ec c5 01 c5 e9 b5 94 ac 43 67 db 08 47 bd 0c | 54 49 81 74 3a 3b f9 51 2c 6b 48 98 c1 d5 7c ee | 4b 95 1c 5e 71 e6 0b 08 a0 85 de c0 1d ef b9 d0 | 5c f8 32 2b 5d f8 44 47 b6 dc c5 4b 50 10 f9 77 | 99 80 83 bc 5c bf 6a 79 a5 41 39 97 c6 b0 17 4c | 84 d1 fa 16 7a 7a 3e e5 51 2d fc 5d b0 66 e1 6f | 66 c6 ed f3 a4 54 56 06 ac 5d ee b2 4b 4a 38 5f | aa 09 29 91 e5 8c 9b 64 60 8e 7c f6 86 7a 07 43 | f1 93 d1 26 4a 28 da b7 0c a1 1a 0c 4c d6 c5 1f | ee f5 92 b2 e4 15 93 35 4c 07 88 be ec 21 4e 23 | f9 ed 56 db b0 43 b1 c7 7d 57 a1 20 bb 88 d2 9a | 23 9e be ef e2 0d b6 dc 67 12 32 69 0b ef 17 5f | 45 8b bf 08 ff c1 84 fb d6 41 58 81 ba c4 68 e8 | 6d 5c 50 c4 fa 14 2d 1e b6 d3 3f da 53 ee 59 40 | e0 c2 e3 5e 46 f4 96 f5 35 c7 87 50 c6 81 32 4e | 30 f8 e6 fa a0 f5 a3 88 f0 51 68 02 71 eb f4 fa | 29 00 00 24 fc fa 6f 0b ed d7 fd 9b f1 eb 70 56 | 1f a0 0f 98 c6 28 ab da a8 c2 09 53 33 ea a7 33 | 5c 74 50 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e 87 94 32 ac f3 4e 0f e0 49 b5 2d | ec 68 6c 45 41 83 dc 40 00 00 00 1c 00 00 40 05 | e8 e9 7b b7 56 9d 8b dd 59 77 e6 95 c2 ea 88 7c | d5 64 a3 dc | state #118 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c01d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469e05a0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #118 | libevent_malloc: new ptr-libevent@0x7fb35c01d920 size 128 | #118 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49610.023745 | resume sending helper answer for #118 suppresed complete_v2_state_transition() and stole MD | #118 spent 0.402 milliseconds in resume sending helper answer | stop processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3400250b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e a7 a4 7e e9 0a bc a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #118 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #118 | rejected packet: | 8e a7 a4 7e e9 0a bc a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #118: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f4be0 | handling event EVENT_RETRANSMIT for parent state #65 | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #65 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #65 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49610.037921; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003409 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cbd0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #65 | libevent_malloc: new ptr-libevent@0x7fb3400250b0 size 128 "road-eastnet-nonat-65" #65: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #65) | ef 12 90 5c 48 7d 35 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 1d 09 25 1e 78 f1 ab 15 10 4e 97 1c df 6e dc | ea a4 f2 51 40 2c fc 70 83 3b d1 14 8e 0e 9b f0 | ed 07 86 8f 8c 86 61 7e ec 48 49 64 93 36 5d 3e | 17 1f e8 61 4f 64 88 6f dc 05 20 78 89 b7 e5 6b | 2c bb be 5b d1 73 00 a1 4f 26 6a 56 a9 d6 41 92 | 2d 76 96 98 ed 1d 08 e4 99 fe 2c 5e 06 f5 6b bd | 7e 5c 39 22 bf ae a8 e1 92 1c 13 3f 1d 70 c4 80 | 07 a5 77 ff 91 5d 4b 48 ee 7b fd 40 d0 32 19 b5 | 09 de 90 f8 5a 03 1b 2a 6a c3 ef 64 b2 ec 44 55 | 99 02 c6 b9 5e db b2 cd f2 ce d4 a6 86 55 55 7c | 29 4f 4b ce 6a 0b b1 f7 34 a8 01 90 c9 f9 c3 1c | 81 d7 a5 bb 19 5a 7d e2 de 08 df 1d b2 6d 5a f1 | 1e a2 87 2c 96 1b c7 cb 00 ed 5b 85 f3 b5 ad fb | 85 9e 29 58 fd ca dd fe cc ef 21 ce b6 4c a2 4d | d7 d2 d7 9a 36 aa ca e6 4f 15 82 d8 a4 cd 14 4f | 08 9f 68 62 be 95 a7 c1 d4 3f 0f 63 b9 f6 80 56 | 29 00 00 24 56 09 76 96 73 f6 7a d5 b4 ac d9 d3 | f5 d3 52 17 38 15 85 8c 5c 9b 9d d9 ed a7 ee 26 | 3a e8 6f 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 23 18 fa b0 e0 93 30 87 95 e8 a3 | 79 bf 51 a0 e1 20 e5 2d 00 00 00 1c 00 00 40 05 | 26 a2 95 ca b7 c9 12 03 be 34 1f 1e 21 7b 79 10 | 86 6d e0 e7 | libevent_free: release ptr-libevent@0x7fb3780180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f4be0 | #65 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 12 90 5c 48 7d 35 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #65 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #65 | rejected packet: | ef 12 90 5c 48 7d 35 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #65: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #111 | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #111 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #111 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49610.079242; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499838 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #111 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 "road-eastnet-nonat-111" #111: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #111) | db b9 51 1a 0a cf 53 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 96 48 dc 9a 43 6a d5 ae 03 52 b4 84 8e 3e 89 | 00 f6 64 fe 26 5b b6 db 11 e1 9c 06 8a 4f 1d 0d | cd 6f a7 c8 64 23 7a a7 23 6f 45 51 c6 b1 a2 cd | 04 59 b4 88 b4 33 b7 f5 29 c7 d8 52 6d 1c cb a8 | 42 75 af 22 25 ca 35 12 a4 f6 ac 0c 2b 80 3f 01 | bd fa ce f1 3e 58 78 41 9a d7 72 cc 7c 4c b5 a2 | 56 ce 00 40 9d 2a 87 6a d3 b8 b7 fb 45 19 d9 27 | 33 38 86 30 4d 76 55 5a 60 ea 7e 6f 94 b2 e8 37 | d0 79 a6 3c 48 bb 9f d4 de 11 46 70 8b ed 34 0e | 15 56 a1 c3 7c 1c f5 7b 9a 67 eb 7c ed e1 17 20 | 66 f5 ab 00 0b 09 22 9e 86 9e ea d1 22 bb 69 09 | 19 11 1b ae 5d 6f a7 6f aa f4 bc 2d bf a0 df 13 | 3d bb c4 b2 54 23 e0 47 22 8c a9 37 14 2d 77 13 | 46 7b e2 07 7c 12 26 7e 27 76 b7 f9 5b 81 4d b4 | 81 97 8e fa 60 cb 4d fd c3 c9 15 c0 dd 03 c9 a5 | 4e ed a7 b5 aa a5 47 31 bc c5 72 e4 a7 3b 8a 6d | 29 00 00 24 dd ff c8 1b e8 28 de a6 83 fb aa 57 | 7e 6e 8e c5 12 ea 53 ce c6 ab e5 e4 50 89 14 5a | d7 45 05 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 7b fa 07 36 ff 6e 35 97 9c d7 f0 | 58 a3 9d ce 15 df 78 68 00 00 00 1c 00 00 40 05 | 32 ea 3f b0 b0 6d 1e bd 58 89 67 45 00 2c 5a 38 | ea f9 ac 8b | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | #111 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db b9 51 1a 0a cf 53 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #111 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #111 | rejected packet: | db b9 51 1a 0a cf 53 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #111: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0669 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-119" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-119' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #119 at 0x557d46a76d10 | State DB: adding IKEv2 state #119 in UNDEFINED | pstats #119 ikev2.ike started | Message ID: init #119: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #119: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #119; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-119" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-119" IKE SA #119 "road-eastnet-nonat-119" "road-eastnet-nonat-119" #119: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-119 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-119": constructed local IKE proposals for road-eastnet-nonat-119 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 119 for state #119 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb354005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #119 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 | #119 spent 0.126 milliseconds in ikev2_parent_outI1() | crypto helper 5 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 starting work-order 119 for state #119 | RESET processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 119 | RESET processing: connection "road-eastnet-nonat-119" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.214 milliseconds in whack | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 119 time elapsed 0.000951 seconds | (#119) spent 0.957 milliseconds in crypto helper computing work-order 119: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 119 for state #119 to event queue | scheduling resume sending helper answer for #119 | libevent_malloc: new ptr-libevent@0x7fb3440251c0 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #119 | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 119 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #119 | **emit ISAKMP Message: | initiator cookie: | ec af 1e 58 4f bc 16 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-119 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ee 25 46 13 3c ef fe 01 ba 63 b1 50 ca a7 dd f5 | ikev2 g^x 7a b0 49 43 35 e3 74 57 d0 52 bc 3a b2 ee 6b 2d | ikev2 g^x 57 80 2f df 71 ea 94 b3 0a 0c 7b 41 50 c2 f6 7a | ikev2 g^x 6e 96 5b 3d 0d 51 9a 0b a0 fa d0 8d d8 98 f0 45 | ikev2 g^x d5 fa eb 0a f5 ea 33 8d ee 1d 3f cb 09 35 dc f7 | ikev2 g^x 0d a7 89 25 f9 a6 f9 a3 0f 9a 3d b0 bb 98 db 2a | ikev2 g^x 8f f4 ad 7f 6a ae b3 bd df 23 e8 8d 52 72 79 9f | ikev2 g^x 3d 34 85 f2 e2 b4 d7 cc 39 ee a0 dc 64 4f fa 2a | ikev2 g^x a9 30 c6 c2 7a 7a 1d cd 26 c0 0f 55 58 ed 9d 22 | ikev2 g^x c6 a1 9c 81 01 bd 16 3d 36 47 70 a1 46 0d 07 ca | ikev2 g^x 5c 2f 9d 3c 24 d8 e7 19 57 44 18 a0 58 ed b0 c8 | ikev2 g^x 65 f2 98 6e 64 04 01 87 4d c3 6e 78 76 c5 fa ee | ikev2 g^x ff 60 94 9e 6a fc 5b 5e 1a 15 3a a6 4d fe ba 28 | ikev2 g^x 39 70 2d 49 9e b7 11 89 3d 89 a8 26 59 f3 51 ef | ikev2 g^x 05 36 27 99 84 62 16 13 24 49 d2 7d b9 18 a2 21 | ikev2 g^x 0f 0d 2a 9a 79 02 d0 e1 a1 af ee 7c 84 e5 76 9a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 93 ff 34 01 41 de 6e 58 b7 82 d5 c2 8a 60 ef 17 | IKEv2 nonce fc 48 d2 4e 23 80 6e 54 cf 7a 62 03 64 73 a8 c1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ec af 1e 58 4f bc 16 a2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 77 | natd_hash: port= 01 f4 | natd_hash: hash= 3b 43 1b c4 4b b2 17 2e 38 4e 57 6d 6b 77 1d 82 | natd_hash: hash= 1a c2 9c 87 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3b 43 1b c4 4b b2 17 2e 38 4e 57 6d 6b 77 1d 82 | Notify data 1a c2 9c 87 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ec af 1e 58 4f bc 16 a2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f7 09 55 f2 00 b0 ce 9f d1 9c 54 d7 51 50 ae 6b | natd_hash: hash= e8 b4 0e d9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f7 09 55 f2 00 b0 ce 9f d1 9c 54 d7 51 50 ae 6b | Notify data e8 b4 0e d9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #119 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #119: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #119 to 4294967295 after switching state | Message ID: IKE #119 skipping update_recv as MD is fake | Message ID: sent #119 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-119" #119: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.119:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #119) | ec af 1e 58 4f bc 16 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee 25 46 13 3c ef fe 01 ba 63 b1 50 ca a7 dd f5 | 7a b0 49 43 35 e3 74 57 d0 52 bc 3a b2 ee 6b 2d | 57 80 2f df 71 ea 94 b3 0a 0c 7b 41 50 c2 f6 7a | 6e 96 5b 3d 0d 51 9a 0b a0 fa d0 8d d8 98 f0 45 | d5 fa eb 0a f5 ea 33 8d ee 1d 3f cb 09 35 dc f7 | 0d a7 89 25 f9 a6 f9 a3 0f 9a 3d b0 bb 98 db 2a | 8f f4 ad 7f 6a ae b3 bd df 23 e8 8d 52 72 79 9f | 3d 34 85 f2 e2 b4 d7 cc 39 ee a0 dc 64 4f fa 2a | a9 30 c6 c2 7a 7a 1d cd 26 c0 0f 55 58 ed 9d 22 | c6 a1 9c 81 01 bd 16 3d 36 47 70 a1 46 0d 07 ca | 5c 2f 9d 3c 24 d8 e7 19 57 44 18 a0 58 ed b0 c8 | 65 f2 98 6e 64 04 01 87 4d c3 6e 78 76 c5 fa ee | ff 60 94 9e 6a fc 5b 5e 1a 15 3a a6 4d fe ba 28 | 39 70 2d 49 9e b7 11 89 3d 89 a8 26 59 f3 51 ef | 05 36 27 99 84 62 16 13 24 49 d2 7d b9 18 a2 21 | 0f 0d 2a 9a 79 02 d0 e1 a1 af ee 7c 84 e5 76 9a | 29 00 00 24 93 ff 34 01 41 de 6e 58 b7 82 d5 c2 | 8a 60 ef 17 fc 48 d2 4e 23 80 6e 54 cf 7a 62 03 | 64 73 a8 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 43 1b c4 4b b2 17 2e 38 4e 57 6d | 6b 77 1d 82 1a c2 9c 87 00 00 00 1c 00 00 40 05 | f7 09 55 f2 00 b0 ce 9f d1 9c 54 d7 51 50 ae 6b | e8 b4 0e d9 | state #119 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb354005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #119 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 | #119 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49610.084327 | resume sending helper answer for #119 suppresed complete_v2_state_transition() and stole MD | #119 spent 0.334 milliseconds in resume sending helper answer | stop processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3440251c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec af 1e 58 4f bc 16 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #119 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #119 | rejected packet: | ec af 1e 58 4f bc 16 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #119: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #105 | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #105 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #105 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49610.093512; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001137 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f4be0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #105 | libevent_malloc: new ptr-libevent@0x7fb3440251c0 size 128 "road-eastnet-nonat-105" #105: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #105) | f1 44 62 e8 b2 96 b0 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 2c 0f 43 7a b6 95 d2 da 02 c7 c3 b7 c1 84 3a | 45 85 a1 11 41 47 db 34 2a fb b4 18 d1 bf ea 06 | 1a 10 f5 e2 f0 2e 22 4f eb 14 58 fa 5c 28 c5 97 | e2 ae 87 b0 f4 b2 19 f2 c0 72 df 2a 2b df 2e 30 | f5 e9 e3 d6 5a 85 fc e6 1c 1c 2d 36 25 55 ff d7 | e9 f8 4f e9 95 2f bf 23 70 c4 27 2f 59 aa 5a d4 | 00 1b f9 ac 9d 1b 73 43 66 d9 a7 24 55 56 33 f4 | df 70 86 46 09 22 db 6f ad cb 9a 9a bd 6e 03 ac | ab d8 ee 40 d0 e9 4f 4e ad 4c 58 0f 93 e2 e1 c8 | a2 ad 19 24 8d ca 10 9a 44 cb e8 b8 40 12 de e1 | 29 64 1e 40 f8 bf aa 87 bb 84 b2 5f 6f 0d 9d b9 | 12 51 1b 65 f4 ee e0 55 a1 dc 96 99 27 5b 4c a9 | 9a e4 cf 90 e8 fa 83 39 ff df 24 19 f2 75 1e b2 | 3a c5 5a ee 20 09 c9 38 60 08 ab 53 42 3f a9 0e | 51 ea 72 b2 25 2b b8 e3 e2 f5 9e 45 c1 0c 4c 33 | 68 83 d9 f1 9b 1b 60 f3 f4 29 c3 90 eb 9c dd 59 | 29 00 00 24 b7 9a f1 29 40 44 aa 07 d6 8e b0 7b | 73 1b 3f b3 0a e3 ed 21 f1 bb 89 35 39 a9 d4 99 | a7 53 6e 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 95 3e 47 a9 bf e3 9c 92 80 50 73 | b0 a9 03 26 40 9a 45 50 00 00 00 1c 00 00 40 05 | c6 93 aa 3b 5e af 6b 75 f9 54 eb f4 c6 61 f4 b6 | b4 32 51 f3 | libevent_free: release ptr-libevent@0x7fb34c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | #105 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f1 44 62 e8 b2 96 b0 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #105 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #105 | rejected packet: | f1 44 62 e8 b2 96 b0 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #105: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a50110 | handling event EVENT_RETRANSMIT for parent state #66 | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #66 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #66 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49610.103793; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.007319 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #66 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 "road-eastnet-nonat-66" #66: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #66) | 64 fc 26 82 c6 65 9b e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 5c 42 12 a8 cf 54 30 35 41 88 3e 73 38 e5 58 | 88 e1 84 4c b4 74 fd b0 fa c4 88 6f 83 90 67 ee | ea 08 5d 03 f5 21 c1 48 f4 fa d9 68 de f8 02 e9 | 20 8c 8f 00 bb e0 27 04 09 fe 8d f2 a1 9c cf 02 | 35 98 ce 70 23 87 ee fc 94 cd 0c 7b 9f 06 08 77 | f2 7f c2 13 7f e1 04 f8 2f 23 ef 1d fb 54 4c 0d | ac 20 e0 c8 bd 84 3e ce b6 49 37 85 56 01 f1 9b | ac 54 85 9c fd 7d 5d 63 30 bd f9 4d d5 7a c1 a0 | 6c 64 e9 25 18 ed 7b 3f 1a a2 52 c0 47 b8 c4 ff | 46 70 76 9b eb db 63 e5 d9 0f fb e2 44 f2 65 5e | ab 82 c1 e9 45 5a aa 38 88 06 f2 1d 2e 7b 75 16 | bf 94 df 07 bd 89 cd 9e ba b0 6c 38 fc 80 69 75 | 55 88 bd 23 1e bc ab 76 6d 9e ce 05 ea ee d0 f1 | 1a bd 0c b1 86 63 56 69 8c 5f 2e 8a f5 e2 c1 97 | 10 bc e7 eb 71 fb 81 cd 25 de 9b 6d 12 04 dd ce | 36 90 99 3b a3 2d 73 4a 99 7b f0 18 dc 83 2b 7d | 29 00 00 24 64 f2 bd 07 f3 b0 6e 75 d4 40 2c d9 | f4 e5 3f 9a 4d aa 41 b2 3f a1 6e 03 4f 7d 3f ec | 58 37 55 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d dc 62 51 f8 7c c3 1c 6d 46 26 31 | c0 6e bd 6d 19 0c cf 42 00 00 00 1c 00 00 40 05 | 76 be 2b c3 74 ff 88 3d a8 f9 74 84 97 f5 dc 48 | 6c 56 c4 9c | libevent_free: release ptr-libevent@0x557d469e1b60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a50110 | #66 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 fc 26 82 c6 65 9b e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #66 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #66 | rejected packet: | 64 fc 26 82 c6 65 9b e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #66: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a24730 | handling event EVENT_RETRANSMIT for parent state #16 | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #16 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #16 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49610.110117; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007683 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a50110 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #16 | libevent_malloc: new ptr-libevent@0x557d469e1b60 size 128 "road-eastnet-nonat-16" #16: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #16) | 6b 57 6c f9 94 8d 37 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 79 95 56 0f 3a d5 d4 38 4f 8b a1 27 c3 02 1b | 5e 3a 85 e1 08 09 e6 fc a8 62 0f 43 42 55 29 b8 | e4 f9 04 77 e0 10 6e f0 87 0e 34 48 79 7d 7a e8 | ca f4 cc cc 99 09 3c b6 c2 35 0f bc 7b 2d 41 d5 | dd f7 e4 e1 a4 f1 02 00 be 44 4b 47 7e b4 a8 a2 | 62 b7 14 ca 2d 3c f6 2d ca f0 71 35 95 46 55 c7 | 1c ba 8e 83 ee 6a 95 4e 0b 06 27 00 95 fd 56 5f | a2 f2 d6 ed a0 30 96 bf 3e 03 94 41 ed 51 4c 15 | 54 db 62 3c 9c 56 76 98 56 78 f9 0d a3 f4 ac 74 | a4 8d 21 e9 c2 d6 c6 f2 bf cc ab 95 d5 b5 69 db | 99 07 4a 4f 0a fb b6 0d 07 d8 b8 7a ef c0 3c c0 | fa 7f 1c 08 05 55 7f 42 6a 4f 4e 4e 1f 35 3a 92 | 3a 9a 25 4f 7a 92 43 f1 5a 60 e4 7c d0 47 d1 12 | 01 ce a1 b9 b7 b6 c9 00 28 c2 19 89 84 44 e5 78 | 95 8c db 08 69 6a 49 44 32 07 7d 96 fb 06 00 43 | c3 4e a1 ee cd 85 94 29 a6 9f 2d d7 39 41 3b c9 | 29 00 00 24 85 0d a1 fb 37 74 4a 69 68 3b 97 74 | ca a6 8b 60 be e5 4d eb 21 82 d1 c7 17 0f 24 83 | fe 05 13 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 42 5d 5a fd 9e 39 f4 1d d5 d8 fc | 51 9a 83 f2 5f a0 b0 5a 00 00 00 1c 00 00 40 05 | 36 95 c1 ea ee d0 12 21 b4 68 71 46 60 49 f3 80 | 34 92 b4 f4 | libevent_free: release ptr-libevent@0x7fb3700180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a24730 | #16 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b 57 6c f9 94 8d 37 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #16 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #16 | rejected packet: | 6b 57 6c f9 94 8d 37 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #16: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ec960 | handling event EVENT_RETRANSMIT for parent state #94 | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #94 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #94 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49610.113393; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002747 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e05a0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #94 | libevent_malloc: new ptr-libevent@0x7fb3700180b0 size 128 "road-eastnet-nonat-94" #94: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #94) | c4 af dc f4 22 ca 1a 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b8 0d 8e 0d 24 fa 48 9f 6f 70 45 44 af 29 03 81 | fb 75 7f 29 b1 65 5b 6b f3 dc dc e0 d1 ea 65 d0 | 45 a3 5f 01 d6 e7 51 37 b4 25 82 eb 71 98 d8 b2 | 75 57 7a 0e db af 40 2b 1a 10 c2 e4 b7 7e 18 39 | 54 3c 4a ec 4d d5 3a 2e ab bd e0 80 1e 0f e2 b5 | e4 a9 bf ef 3b ba fe af b1 7b cb 8a 16 e9 8c 65 | 20 92 b8 a2 66 75 85 84 5a e4 4c c5 4e 4c dd 10 | 51 c2 7a 85 78 58 a1 10 d6 cf c5 6b e8 22 f2 d1 | 41 df 6b 5c 73 f6 87 2e 17 45 1b 75 b8 bd 3d 9e | d2 3e d8 cd d1 d8 9e 58 23 f3 68 0b e1 b8 89 69 | 76 b7 7e 92 6a 4a 5b 2c 36 99 61 9d bb 09 19 68 | e0 83 4b 97 a3 48 26 96 74 a7 da 5f 7d b7 55 9e | e3 e8 68 32 6b 6e 35 3d 26 d7 4f 19 6d d6 44 17 | 3d 23 4c ff 1c ff e3 77 85 72 fa 85 64 76 2e ac | 5a 7b 31 bf 7b 44 eb 9a f4 5c 9d 72 ec 95 e5 4e | fc 10 63 57 5f 09 74 f6 c6 17 bc 05 7d ea 5c 13 | 29 00 00 24 c5 77 30 ba 9e 22 45 4a 1a af ea 19 | 02 b6 fb 3a f7 c7 ff 86 e4 75 07 62 09 1a 17 15 | a7 99 2d 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d bd d3 d9 55 1d 16 4d 34 06 fd 91 | 92 b6 52 35 3e d3 c6 4f 00 00 00 1c 00 00 40 05 | 83 77 03 33 97 20 84 34 b1 e3 aa 6c 05 af 74 6e | f0 8d d0 a3 | libevent_free: release ptr-libevent@0x7fb37c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ec960 | #94 spent 0.0887 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 af dc f4 22 ca 1a 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #94 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #94 | rejected packet: | c4 af dc f4 22 ca 1a 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #94: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #112 | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #112 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #112 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49610.140653; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500847 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5f0d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #112 | libevent_malloc: new ptr-libevent@0x7fb37c0251c0 size 128 "road-eastnet-nonat-112" #112: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #112) | 47 d5 03 db 13 27 2f b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 0e 6c 25 08 df e6 da 49 14 54 03 50 04 cf 48 | 95 75 ae 2d bc 03 6f 48 b8 d7 01 38 b0 30 90 fc | ff e3 c7 81 96 6b 61 34 0c 60 d4 12 f5 e2 2d fc | 51 c2 f0 8d 66 50 fb 99 8e e7 b2 7a 6c 96 47 68 | b2 95 cc 13 0e 51 31 7d 67 b6 95 35 7a 36 fb 65 | 99 b0 0f 89 29 13 5d 90 12 37 2d 11 35 2d b1 44 | 94 62 9d e9 25 b3 9d a0 a4 a6 21 f1 2f 1e cd 7c | e1 45 a8 9a 87 d2 53 e3 a2 32 e1 24 cf d4 84 b6 | d5 f2 14 94 09 c7 86 4b f6 5c 13 c3 cd 16 8e 96 | 09 f6 db 84 7c 68 6c 48 a7 94 92 3a 1f dd 75 5e | 2c 36 f1 6f 81 03 42 93 73 6d a8 a1 de b3 ee 78 | 53 dc 84 4e 49 9c c8 3c d2 8e 9e 10 6c e7 28 b0 | 11 a3 fb e6 6e 4d e5 e0 87 56 00 b9 8b bd 7a 34 | c7 01 93 2c df ea 24 e3 c0 b7 3c 4f 9c fd 99 11 | 44 90 bc 5c 8f 0c c6 10 b3 66 24 ea 61 81 fc 7a | 33 5f 5b b7 cd 2f 8e 95 d1 b4 0b d4 4c f2 ce 45 | 29 00 00 24 e0 34 a3 40 45 a9 39 5f c9 a9 a0 f5 | 90 bc 5f 96 21 2e 5a ab 31 ef 27 59 8c 9d b8 53 | c4 51 4a f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 19 b7 b4 22 31 1f 00 af ac cd cc | 10 5d a8 e7 0a 7e 75 3d 00 00 00 1c 00 00 40 05 | 93 2a 52 65 d2 92 1c 7e fa c3 8c df bd 81 85 07 | 8f 9c 4c 85 | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #112 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 d5 03 db 13 27 2f b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #112 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #112 | rejected packet: | 47 d5 03 db 13 27 2f b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #112: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-120" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-120' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #120 at 0x557d46a782d0 | State DB: adding IKEv2 state #120 in UNDEFINED | pstats #120 ikev2.ike started | Message ID: init #120: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #120: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #120; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-120" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-120" IKE SA #120 "road-eastnet-nonat-120" "road-eastnet-nonat-120" #120: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-120 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-120": constructed local IKE proposals for road-eastnet-nonat-120 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 120 for state #120 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a38f50 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #120 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 | #120 spent 0.143 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-120" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.221 milliseconds in whack | crypto helper 3 resuming | crypto helper 3 starting work-order 120 for state #120 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 120 | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 120 time elapsed 0.00099 seconds | (#120) spent 0.992 milliseconds in crypto helper computing work-order 120: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 120 for state #120 to event queue | scheduling resume sending helper answer for #120 | libevent_malloc: new ptr-libevent@0x7fb3380251c0 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #120 | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 120 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #120 | **emit ISAKMP Message: | initiator cookie: | 87 fa a7 32 05 23 14 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-120 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ec 6c 11 66 a6 95 d9 e6 e2 88 b9 98 2a 60 c1 38 | ikev2 g^x c4 e7 6d c7 8d 08 5f c7 b2 af 28 df 28 55 74 6b | ikev2 g^x 75 22 9e ab 67 eb 95 72 f6 3e 95 b3 15 85 4f d6 | ikev2 g^x c1 c3 2d 9e 07 29 16 41 13 5e bb cf c0 e6 4f 24 | ikev2 g^x 10 cc 57 fd 9c ba 63 ce ec 86 10 c7 d4 7c 34 a8 | ikev2 g^x a5 5b fd 1f 33 3b a2 f8 03 46 9a 66 74 53 5d 27 | ikev2 g^x bd d8 93 4e 14 8b 45 9a 6d ce b3 cb 29 f0 cc 6c | ikev2 g^x 0a 42 f4 3b 31 46 fc ae db a9 72 48 29 6a 06 1a | ikev2 g^x 3f 35 fb 97 be 23 c9 c4 df 59 9b d7 24 09 d8 73 | ikev2 g^x f7 9d 98 e5 b5 21 68 b6 e2 c9 13 2b 11 7a 73 1b | ikev2 g^x e9 35 93 72 82 45 b9 27 a7 9d a4 9d 09 5e 20 78 | ikev2 g^x 29 0e a5 bd 44 31 dd 75 00 a1 c2 9f 09 4f 24 eb | ikev2 g^x 16 42 da bf 3a 12 d4 84 33 67 7f 85 66 00 36 74 | ikev2 g^x 79 21 73 94 9b df b2 a9 01 30 1b db 75 7a 3d 46 | ikev2 g^x 6c 6c eb ca 16 ae 1a 85 9f eb e5 ef 46 e7 91 51 | ikev2 g^x ee 18 48 f1 20 6b 2b c6 77 fb 41 ba bd 6b 56 4e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6f c3 ef a5 ff 17 51 3e dd e4 5e c3 e4 15 2b 4d | IKEv2 nonce c5 b5 58 85 08 f4 21 f4 d7 43 b1 43 4c 64 51 02 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 87 fa a7 32 05 23 14 f8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 78 | natd_hash: port= 01 f4 | natd_hash: hash= 94 47 24 d0 22 75 93 6e dd 7d f7 25 7b 0d 80 0a | natd_hash: hash= 15 3a a3 09 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 94 47 24 d0 22 75 93 6e dd 7d f7 25 7b 0d 80 0a | Notify data 15 3a a3 09 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 87 fa a7 32 05 23 14 f8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 8f c4 23 24 1b 0a 54 8e c8 2f b2 b8 ec 80 e9 f3 | natd_hash: hash= ca 99 ed fd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8f c4 23 24 1b 0a 54 8e c8 2f b2 b8 ec 80 e9 f3 | Notify data ca 99 ed fd | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #120 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #120: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #120 to 4294967295 after switching state | Message ID: IKE #120 skipping update_recv as MD is fake | Message ID: sent #120 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-120" #120: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.120:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #120) | 87 fa a7 32 05 23 14 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec 6c 11 66 a6 95 d9 e6 e2 88 b9 98 2a 60 c1 38 | c4 e7 6d c7 8d 08 5f c7 b2 af 28 df 28 55 74 6b | 75 22 9e ab 67 eb 95 72 f6 3e 95 b3 15 85 4f d6 | c1 c3 2d 9e 07 29 16 41 13 5e bb cf c0 e6 4f 24 | 10 cc 57 fd 9c ba 63 ce ec 86 10 c7 d4 7c 34 a8 | a5 5b fd 1f 33 3b a2 f8 03 46 9a 66 74 53 5d 27 | bd d8 93 4e 14 8b 45 9a 6d ce b3 cb 29 f0 cc 6c | 0a 42 f4 3b 31 46 fc ae db a9 72 48 29 6a 06 1a | 3f 35 fb 97 be 23 c9 c4 df 59 9b d7 24 09 d8 73 | f7 9d 98 e5 b5 21 68 b6 e2 c9 13 2b 11 7a 73 1b | e9 35 93 72 82 45 b9 27 a7 9d a4 9d 09 5e 20 78 | 29 0e a5 bd 44 31 dd 75 00 a1 c2 9f 09 4f 24 eb | 16 42 da bf 3a 12 d4 84 33 67 7f 85 66 00 36 74 | 79 21 73 94 9b df b2 a9 01 30 1b db 75 7a 3d 46 | 6c 6c eb ca 16 ae 1a 85 9f eb e5 ef 46 e7 91 51 | ee 18 48 f1 20 6b 2b c6 77 fb 41 ba bd 6b 56 4e | 29 00 00 24 6f c3 ef a5 ff 17 51 3e dd e4 5e c3 | e4 15 2b 4d c5 b5 58 85 08 f4 21 f4 d7 43 b1 43 | 4c 64 51 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 47 24 d0 22 75 93 6e dd 7d f7 25 | 7b 0d 80 0a 15 3a a3 09 00 00 00 1c 00 00 40 05 | 8f c4 23 24 1b 0a 54 8e c8 2f b2 b8 ec 80 e9 f3 | ca 99 ed fd | state #120 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a38f50 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #120 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 | #120 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49610.151438 | resume sending helper answer for #120 suppresed complete_v2_state_transition() and stole MD | #120 spent 0.416 milliseconds in resume sending helper answer | stop processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3380251c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 fa a7 32 05 23 14 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #120 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #120 | rejected packet: | 87 fa a7 32 05 23 14 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #120: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0492 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a12c70 | handling event EVENT_RETRANSMIT for parent state #67 | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #67 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #67 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49610.163627; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00378 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ec960 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #67 | libevent_malloc: new ptr-libevent@0x7fb3380251c0 size 128 "road-eastnet-nonat-67" #67: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #67) | d5 dc 19 08 bd ef 9f dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 15 d2 0d 8c 5c 68 38 3d 2d 2f ab 03 65 12 47 | 3e b1 d3 f9 3a 86 7c eb 4f 39 8c ad 4d 38 70 41 | d1 7d 9c 72 4f 83 e4 6c 89 f6 b0 17 b5 42 16 02 | 98 46 bb 9b ed 5c 3f ac 09 0d be a1 fd 38 36 65 | 29 1c 76 c9 62 fc be 23 07 ff 11 92 31 9b 27 f0 | d5 89 d4 07 37 e6 d9 c5 11 e2 68 cc f6 fa 8f ad | d4 d7 3d 81 a6 50 a2 3b 0c 6d a4 dc e7 02 2c 0e | b0 92 5d 4d d1 8c bc b1 d3 8b 8b 57 d6 a3 1b fb | 45 de 41 0c 4c 00 09 3b b7 02 6a 18 be d3 e2 bf | 60 42 87 71 10 49 5d 99 2a 98 69 45 a3 b9 8a 57 | c3 e1 71 dc 21 28 e6 7b 37 29 eb da 68 00 eb 12 | 52 79 13 c3 54 c6 f4 5a 0f 77 f8 92 a7 c4 70 9c | 42 51 17 18 c9 d7 b0 85 26 54 bb 62 a6 c6 48 68 | 6f 63 77 09 be 06 39 71 28 8e 68 84 3f f2 9b 78 | 53 a2 0d 5b a4 87 76 9f e3 e1 57 84 7f 83 44 ad | 59 6d db cc b7 ca a2 5b d9 9b 67 9f f8 59 1b 8c | 29 00 00 24 ea 05 1a 8b a3 08 e1 05 bd ec 39 06 | dc 75 19 c7 61 25 8f 0d bb ee a8 4f 1e a0 d7 a0 | e4 5f a7 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c a1 13 b6 f8 7a c8 5e ab 0d 26 ff | 9e 2c 49 6a b7 74 41 36 00 00 00 1c 00 00 40 05 | 1e 6d d9 18 71 66 9b 77 ce ef 92 9d c1 b1 8d 12 | ab 9b 0c 2a | libevent_free: release ptr-libevent@0x7fb38801abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a12c70 | #67 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 dc 19 08 bd ef 9f dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #67 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #67 | rejected packet: | d5 dc 19 08 bd ef 9f dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #67: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35000d120 | handling event EVENT_RETRANSMIT for parent state #106 | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #106 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #106 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49610.176927; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002282 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a24730 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #106 | libevent_malloc: new ptr-libevent@0x7fb38801abe0 size 128 "road-eastnet-nonat-106" #106: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #106) | fe df 65 eb e2 ca b1 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad da 7e a9 45 cb 20 7d e8 1c 81 82 05 64 57 6e | 75 d8 44 d1 29 49 80 30 70 57 33 94 8e d0 1f 14 | bc ae 59 d5 21 a0 94 8f 2c d7 0e ae 64 85 ee 4d | 50 69 c0 d8 4e 47 ef 8f 3a 2d ef b1 7b 6b a7 c8 | 8d 12 00 9d cb 02 d1 fa 1a e5 8c 51 be 6d 05 c8 | be 42 ed 64 5d 5d eb 43 74 14 7b 2e df 96 fd f0 | be d2 f5 e5 50 93 03 3d e5 7a 2c d8 01 5a 9b de | a0 3b d7 ce 9a ef 2b 39 02 de 74 61 50 3b eb 81 | 05 67 4f 23 be 3a 8e 5c be 32 5b 04 eb 4a 0a 52 | c4 c5 a5 9b 90 ef 60 8e e0 0b c4 2e df 2e 03 08 | 7d 0d 7d 77 85 98 9e 4b 28 0a fe 25 1d a7 29 db | 4e a8 1b 4a ee 35 1d 2c ba 8d 50 15 cc 00 fd b8 | 76 4c 44 ae c6 c8 10 0a ab 0a 64 76 0a 4d ee 2e | 50 89 e6 58 b8 26 b4 69 a0 66 8e 81 ad 9d da 80 | f3 00 a8 93 0e 88 6f 79 09 79 fc 16 36 77 35 c1 | 3d 72 2e 00 31 12 9c f8 70 79 c2 64 a5 05 9a 24 | 29 00 00 24 a4 51 db a3 25 2a 8b 08 e6 f6 81 86 | 04 5c da 12 5e 8f 68 4a 8c ec ef 5b e1 08 6f b7 | 57 a9 96 c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 f9 ad bd d7 95 65 27 17 8c 87 a1 | c4 9b a8 f7 4c 6b d7 13 00 00 00 1c 00 00 40 05 | 1a ac 1c ef 71 2b dc a9 6f 07 a5 2c d5 55 fb 6b | d6 5b 32 77 | libevent_free: release ptr-libevent@0x7fb350012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35000d120 | #106 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe df 65 eb e2 ca b1 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #106 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #106 | rejected packet: | fe df 65 eb e2 ca b1 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #106: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #113 | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #113 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #113 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49610.212233; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.503525 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35000d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #113 | libevent_malloc: new ptr-libevent@0x7fb350012840 size 128 "road-eastnet-nonat-113" #113: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #113) | 65 aa 2d d8 a6 29 20 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df aa fe 5d 18 fa cf 0f ff 28 95 2b df 41 5e e5 | 93 b1 5d 05 b9 f8 45 e3 a0 1d 39 ec fc 7d ae 4b | 05 3f bf 03 bf 80 a9 6e 8e fd 3b e8 32 58 c8 f7 | c6 df 30 b6 09 5f 2a 57 25 11 cb 3c da a5 01 9d | ba 5a dd a7 bc 6b 95 4a 6d df f0 56 fa 5d b6 d5 | 32 bd cc 28 5e b5 ff 1a d9 af f1 6d a9 3a c6 a5 | ab a2 21 23 63 1f 7a d5 a9 f2 d8 6e 34 2c c0 14 | b5 44 80 cc 01 b8 bc 1d 88 15 f0 56 5b 9e 16 11 | 53 49 7c 46 a4 d6 df 15 cc 76 08 99 30 8d bd 16 | fc 22 5e e2 91 1e 29 90 27 cb 4a a1 bb fb df c0 | e1 57 58 ac 38 1b 6a 91 9c 4e c8 14 95 91 e6 23 | a6 57 8f 86 03 7d ff ac 75 e9 09 5f f5 40 29 9b | 12 ab c4 82 96 27 04 ff 62 2b 29 96 91 b3 9d b0 | 86 8f c7 9d 9e d4 5c a2 76 cf a2 55 cf 18 d5 47 | 6a bc c0 f7 de 25 72 ff 89 ad a0 ee b6 9c 33 78 | 04 18 e5 3b 76 6f 93 07 22 6f ad 6a 13 43 4b d1 | 29 00 00 24 24 d3 7a 96 b8 4b b9 c8 77 6f a9 e8 | 8c 18 33 84 b7 52 88 cd 9d a3 3f f7 dd 42 d5 3a | e4 24 11 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 39 d7 c2 57 ac 0e 5c ea ab f6 c3 | 2b 95 40 5a 3d 34 d1 e0 00 00 00 1c 00 00 40 05 | e1 b8 84 36 a4 5f d1 6d 3f 9f 07 dc 0f 94 99 b2 | ea cc 3a 90 | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #113 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 aa 2d d8 a6 29 20 d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #113 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #113 | rejected packet: | 65 aa 2d d8 a6 29 20 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #113: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-121" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-121' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #121 at 0x557d46a79890 | State DB: adding IKEv2 state #121 in UNDEFINED | pstats #121 ikev2.ike started | Message ID: init #121: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #121: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #121; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-121" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-121" IKE SA #121 "road-eastnet-nonat-121" "road-eastnet-nonat-121" #121: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-121 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-121": constructed local IKE proposals for road-eastnet-nonat-121 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 121 for state #121 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #121 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #121 spent 0.125 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 resuming | crypto helper 1 starting work-order 121 for state #121 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 121 | RESET processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-121" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.208 milliseconds in whack | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 121 time elapsed 0.000959 seconds | (#121) spent 0.966 milliseconds in crypto helper computing work-order 121: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 121 for state #121 to event queue | scheduling resume sending helper answer for #121 | libevent_malloc: new ptr-libevent@0x7fb388027c10 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #121 | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 121 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #121 | **emit ISAKMP Message: | initiator cookie: | 1a c4 23 3a 2f fb 8d 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-121 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 68 72 b0 fb 70 4e c0 8d 7d 37 18 c1 ce 4c 8b 63 | ikev2 g^x 3b ed bd b3 7c e2 68 d0 e4 78 d3 ff 67 2f 87 6b | ikev2 g^x 58 6e aa 28 e2 71 48 9f 9e 55 8d d7 f0 fa a8 2d | ikev2 g^x cf d6 ae d1 2d 00 58 7f 1d 28 13 c8 1c b2 dd 2d | ikev2 g^x 0b 8c e4 ed 5c aa b6 84 75 0e 0c f4 87 20 ea a7 | ikev2 g^x 6f 81 08 6f ca 1d ea a5 cc 8b 1d 07 3a 98 ee 34 | ikev2 g^x 92 f7 0d 60 c7 27 69 9a 54 db 7b c6 0a ed 9e 6e | ikev2 g^x 48 c9 2d 78 78 eb 23 a8 d4 08 fd 81 af 22 ee 61 | ikev2 g^x 94 de e2 4a 3e 31 5e 98 b3 8e 80 72 e5 9a 23 e5 | ikev2 g^x 36 5f 19 09 16 90 75 46 fe 81 ca 01 97 f5 9d b9 | ikev2 g^x ee 86 b8 f1 4d 40 49 77 bf ea d6 8d cf e1 3f ed | ikev2 g^x ea d1 6f a1 94 f1 b6 1e ce cf 58 8f 34 28 d9 e9 | ikev2 g^x 91 30 27 07 3d a8 1a 9e 1f 56 eb 39 c7 99 10 18 | ikev2 g^x f7 a0 93 02 25 a4 35 d3 3b 85 c6 a5 d4 ee 05 5a | ikev2 g^x 0a 2e cd 8b 56 c3 43 2f ad b6 de d6 76 50 8d 8d | ikev2 g^x 31 49 b6 ba ff a2 3a 1a 19 8e 58 36 38 db d0 39 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ce 58 3c f3 71 03 62 3b f7 b4 bf 47 86 b0 47 20 | IKEv2 nonce d2 a4 5f 23 42 6a 81 bd c0 a6 20 e9 9a 46 27 06 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1a c4 23 3a 2f fb 8d 49 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 79 | natd_hash: port= 01 f4 | natd_hash: hash= 14 ab b4 fc 6a e4 2a a5 95 ca 3f ba 4a 7b 1d be | natd_hash: hash= 72 ff 8c 93 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 14 ab b4 fc 6a e4 2a a5 95 ca 3f ba 4a 7b 1d be | Notify data 72 ff 8c 93 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1a c4 23 3a 2f fb 8d 49 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7e 13 e9 d3 7d bc 8a 17 e1 3e 93 a5 d0 ee 9b cd | natd_hash: hash= 6e 9a 4b 6b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7e 13 e9 d3 7d bc 8a 17 e1 3e 93 a5 d0 ee 9b cd | Notify data 6e 9a 4b 6b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #121 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #121: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #121 to 4294967295 after switching state | Message ID: IKE #121 skipping update_recv as MD is fake | Message ID: sent #121 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-121" #121: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.121:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #121) | 1a c4 23 3a 2f fb 8d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 72 b0 fb 70 4e c0 8d 7d 37 18 c1 ce 4c 8b 63 | 3b ed bd b3 7c e2 68 d0 e4 78 d3 ff 67 2f 87 6b | 58 6e aa 28 e2 71 48 9f 9e 55 8d d7 f0 fa a8 2d | cf d6 ae d1 2d 00 58 7f 1d 28 13 c8 1c b2 dd 2d | 0b 8c e4 ed 5c aa b6 84 75 0e 0c f4 87 20 ea a7 | 6f 81 08 6f ca 1d ea a5 cc 8b 1d 07 3a 98 ee 34 | 92 f7 0d 60 c7 27 69 9a 54 db 7b c6 0a ed 9e 6e | 48 c9 2d 78 78 eb 23 a8 d4 08 fd 81 af 22 ee 61 | 94 de e2 4a 3e 31 5e 98 b3 8e 80 72 e5 9a 23 e5 | 36 5f 19 09 16 90 75 46 fe 81 ca 01 97 f5 9d b9 | ee 86 b8 f1 4d 40 49 77 bf ea d6 8d cf e1 3f ed | ea d1 6f a1 94 f1 b6 1e ce cf 58 8f 34 28 d9 e9 | 91 30 27 07 3d a8 1a 9e 1f 56 eb 39 c7 99 10 18 | f7 a0 93 02 25 a4 35 d3 3b 85 c6 a5 d4 ee 05 5a | 0a 2e cd 8b 56 c3 43 2f ad b6 de d6 76 50 8d 8d | 31 49 b6 ba ff a2 3a 1a 19 8e 58 36 38 db d0 39 | 29 00 00 24 ce 58 3c f3 71 03 62 3b f7 b4 bf 47 | 86 b0 47 20 d2 a4 5f 23 42 6a 81 bd c0 a6 20 e9 | 9a 46 27 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 ab b4 fc 6a e4 2a a5 95 ca 3f ba | 4a 7b 1d be 72 ff 8c 93 00 00 00 1c 00 00 40 05 | 7e 13 e9 d3 7d bc 8a 17 e1 3e 93 a5 d0 ee 9b cd | 6e 9a 4b 6b | state #121 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #121 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #121 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49610.218801 | resume sending helper answer for #121 suppresed complete_v2_state_transition() and stole MD | #121 spent 0.409 milliseconds in resume sending helper answer | stop processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388027c10 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a c4 23 3a 2f fb 8d 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #121 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #121 | rejected packet: | 1a c4 23 3a 2f fb 8d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #121: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #95 | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #95 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #95 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49610.235021; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003564 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a12c70 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #95 | libevent_malloc: new ptr-libevent@0x7fb388027c10 size 128 "road-eastnet-nonat-95" #95: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #95) | 04 bb 1c 2b 41 e0 8a 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 79 b0 02 7c 1a 3a 07 ca 11 d1 03 7a 77 85 cb | ae ba 70 1b ee 9d e4 3c fb 83 b0 cf 85 ea f6 b1 | 44 27 5d 05 92 dc 5f 4f 10 d0 a1 c9 ef dd c6 ab | ac a1 db c0 15 56 b1 c8 1f 3b 2a 1e 0e 90 2f d7 | 1a 17 b9 f7 eb 61 37 1e 43 cf 9e 15 29 73 84 5a | a5 ef e1 fb 94 7f 43 bb 78 59 95 64 2c 87 b9 4b | 2e 15 ae fc 6c ec ab 40 45 3d 2f f3 c8 00 44 83 | 12 a7 e2 b8 59 bb 92 ce 59 8c ba f6 68 47 32 55 | e8 20 37 e3 3d d3 1b 3c 4e 84 f3 ae 58 53 16 45 | 58 97 74 47 9d a2 44 2f 81 9e ee 5c e8 ce 37 e9 | 5c 14 3e 89 c4 f1 89 ca 70 e0 1d 7a a9 38 f6 40 | 66 fb 41 8c 9b be 2c ea fc cd 2c ca 26 30 dd f0 | b1 29 6c c0 a6 b8 e6 ad e2 7b ae 2b 83 8b e5 9d | 01 26 d8 0c 5a 11 5f 25 a6 3e 25 b6 0f 26 26 34 | 01 b9 a7 4b b7 42 77 99 87 64 20 bd 67 77 cc 7e | b2 79 54 9b 12 25 7f ea ef 16 57 4a f6 24 75 7e | 29 00 00 24 fc b1 a7 58 88 f4 1b 4f aa 0e 2d d3 | a4 65 ca 66 dc 36 b5 47 7f 16 51 11 a3 c3 71 08 | 58 80 43 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ca 3c bb 33 78 12 9a 1b 10 5c d5 8f | d8 1f d4 ad ee 67 79 04 00 00 00 1c 00 00 40 05 | 61 56 68 61 76 b1 38 9f d6 2b 7a dd 4f cb 90 80 | 12 f2 80 83 | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #95 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 bb 1c 2b 41 e0 8a 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #95 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #95 | rejected packet: | 04 bb 1c 2b 41 e0 8a 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #95: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0758 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23150 | handling event EVENT_RETRANSMIT for parent state #107 | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #107 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #107 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49610.247396; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001108 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #107 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 "road-eastnet-nonat-107" #107: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #107) | ac 4e b3 f4 ed 6e 1b 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 73 84 90 b0 a1 c9 25 a6 16 5e 4b 67 ce 07 6b | 92 04 d0 37 9e 07 4b 09 02 c2 78 f5 a4 a2 15 3a | 81 d0 8e e8 00 40 7b 2f 93 05 4b f1 72 7f 82 62 | 11 07 a0 1f 82 07 75 ea 96 ea 88 0b 0d 07 25 f0 | 53 bc 84 a7 a4 75 94 5f 48 4e 4a 60 2b e3 6f 76 | 92 f7 9d 74 6e 3f f1 39 f4 ea a5 df f6 6b e2 19 | 19 b6 60 26 c6 fe d4 1c bc ad 80 f2 46 47 46 93 | 4a da 3f 4a 2e 08 aa d8 dd f9 58 37 f0 1b 68 77 | ce 96 bc c9 19 65 a5 66 67 6f a9 fc 8b f9 e5 15 | 20 ed ca 26 5a cf 00 8e 65 d8 10 df c9 2f 55 c3 | 64 dc 1d 41 fa 8c 1a 44 06 90 c6 59 bf c3 6e 3f | fb f3 89 2e c3 0c 98 20 fe c3 39 08 86 b8 6d 84 | 72 50 7b 56 51 ac 06 e0 20 77 cc 21 04 85 51 fd | 65 1e 59 7f 79 5a a9 9c 4e fa 78 0d d8 f6 cf 3c | cd 73 f9 1e 3d 38 88 98 9e 60 ec bd 06 0d 2d 0c | 39 4f f8 8a 60 2e a2 ac 6c bc 30 73 f0 bc 87 4c | 29 00 00 24 2b ab 2f 68 f7 5a dc 67 d2 bf 24 50 | 1d 74 5b c9 72 db b8 cd 99 25 80 eb 1e bb 50 81 | 94 b2 ae 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 39 55 8e 98 9a a9 9a 86 88 c5 10 | 1f 60 cd 0e 59 85 0d 5e 00 00 00 1c 00 00 40 05 | 18 34 33 25 63 a4 39 e3 ca 5d cd 23 8f 87 c0 51 | 02 99 ff a0 | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23150 | #107 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a03d30 | handling event EVENT_RETRANSMIT for parent state #17 | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #17 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #17 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49610.247583; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007939 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23150 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #17 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 "road-eastnet-nonat-17" #17: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #17) | 95 d9 df c6 2f 4d 0c 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 5e 55 de a7 df 8c 8d ec f1 a6 b3 e1 a3 c9 2d | 5c 34 98 9a bf 18 3c 5f 5f 84 6f cc 00 89 2f b6 | 2e 0d 8a f0 e8 8a 33 b9 9f e3 4d bb 6f 5d 7f 7f | 55 e8 00 b1 58 6d 0f 17 37 b6 dc aa e5 63 e1 98 | c3 81 a6 04 b7 5c e1 a6 b2 29 9c 5a 0a 92 22 a4 | dd 4c 33 c2 4e 6f 90 29 c5 be 39 30 e7 2e 62 6c | 05 d7 89 8e 0f da b5 53 da 3f 31 31 12 b0 4c a7 | e6 a2 e9 57 ae d6 ea 04 d8 8b 73 ef 0e 9c 95 4e | 4b da 65 9c ef 6c 55 46 7d 0a 54 0c 93 37 db 94 | 63 8b a7 e9 ec 58 ed b4 f2 15 0c b0 9d 7b 2c 0d | 1e e8 20 04 e7 f0 90 d5 81 ce 8a 1d d9 30 60 b1 | c6 44 b1 01 fa 02 ef 06 8d 26 a1 09 a3 ce f8 2b | cd fc 0a 07 b0 8e b6 9d e8 6f 0c f0 b6 d6 40 9f | 58 4b a3 1f 87 35 a9 b2 45 93 43 35 38 68 86 6f | ea 62 4d 90 7e b9 e7 0c 07 f5 2a d5 71 68 12 96 | 09 17 2e 55 3e a1 6c 35 b5 20 1e 2a bf 27 6e 02 | 29 00 00 24 bf 2e 79 82 7e c6 1a 66 e2 b9 4b 2e | f8 c7 dc 78 b4 81 b9 5d 2e e5 4c 2c 27 2c b6 31 | c3 63 bf d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 f5 2d 98 10 e8 c0 4d c4 df 42 b6 | b0 c6 0b 95 91 b6 b4 67 00 00 00 1c 00 00 40 05 | 6f dc f7 24 ac 26 1a a6 48 cc ee 5d 39 06 66 40 | 4c d6 6b fc | libevent_free: release ptr-libevent@0x7fb374014820 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a03d30 | #17 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac 4e b3 f4 ed 6e 1b 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #107 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #107 | rejected packet: | ac 4e b3 f4 ed 6e 1b 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #107: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0708 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 d9 df c6 2f 4d 0c 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #17 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #17 | rejected packet: | 95 d9 df c6 2f 4d 0c 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #17: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0675 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #68 | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #68 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #68 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49610.25898; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004962 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a68890 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #68 | libevent_malloc: new ptr-libevent@0x7fb374014820 size 128 "road-eastnet-nonat-68" #68: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #68) | 70 75 31 66 aa 5c 9c e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 5d b8 31 5b 51 c7 81 22 c3 12 8e cd 03 2f 05 | f3 e7 e9 e0 56 07 0e 19 4f f3 59 f8 5f 92 30 b5 | 72 b6 ae 5a 15 67 03 c0 c9 25 86 6f b6 cd 52 32 | 93 89 9d 85 44 28 f4 e9 22 34 65 fb b6 28 63 5f | 80 98 37 5a 06 27 0e fb ee f6 cc 60 03 1e c8 99 | 96 20 20 2b e8 6a b0 1d 57 83 e1 9f d1 09 80 29 | 2a 2a 69 37 ce 92 30 79 1a 45 aa a3 bd 30 cd 8b | 23 97 c9 73 f8 32 ee fe d7 1e 67 73 bd 11 db 26 | 12 e8 63 a6 c5 a1 37 4f 2f 5c 98 66 44 92 9a da | 46 ed 57 a3 46 50 a7 e5 d9 ec 61 b3 fb 59 43 1f | 96 83 9a 55 36 c4 68 5f a7 ee f4 08 c7 30 31 52 | b8 7e 06 a5 b1 e2 2e 1a 2b de 01 96 c6 3e f1 89 | d8 1f b9 ac 77 f1 c6 91 93 f5 70 bc 2f 41 d6 e3 | ff da e8 8a 1d 5f de 22 6f 38 d0 51 a3 b4 49 ef | d5 06 ff ea 4d f6 71 eb 33 f8 fd c7 e6 95 54 de | 64 89 15 37 cd bd bf d2 74 6c 8e f3 c4 d1 b1 ad | 29 00 00 24 8c 8f d0 a2 59 9b be 88 0a db 9c c0 | a3 eb 04 0d aa d5 13 33 65 39 12 37 76 6e 7e e3 | e3 60 8c 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 a4 28 dd c4 89 9a c5 51 2a d8 15 | 55 6e c2 5e f1 52 b9 d0 00 00 00 1c 00 00 40 05 | ac d9 33 90 76 69 a3 40 a6 e4 ee bb 11 92 b7 71 | 1e 90 c3 02 | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #68 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 75 31 66 aa 5c 9c e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #68 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #68 | rejected packet: | 70 75 31 66 aa 5c 9c e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #68: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #114 | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #114 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #114 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49610.272355; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499921 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #114 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-114" #114: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #114) | d6 76 3e 2a df 8d 49 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 89 bc e4 ca cf 42 9f 8c 3e 0c bd bc ae 4f 3b | d3 c7 ce d3 ca 55 eb 39 04 eb 76 8e a9 75 7d e3 | b6 18 fe 44 5f 1c ef b7 b7 41 cc 4d 34 22 30 65 | 06 59 1e ef 39 63 eb fe 02 26 56 aa 64 57 8d 53 | 7a 80 31 9c 0a f7 30 cf 50 cb a2 17 9f 63 45 27 | 3c d2 e0 b9 54 07 a2 b1 46 40 09 3b 94 40 bf f1 | 40 f9 b6 13 93 c3 4e d6 d8 b1 db 99 2b ea b1 51 | cb eb aa 9a ed ac 6d b8 6b 55 e2 2f 64 52 21 e2 | 9d 13 28 a8 e7 03 1f ba 1a 35 29 e1 bf bc 71 81 | 00 b3 30 d7 67 e8 0d 4c f0 57 7f 78 f9 6a af a6 | f5 69 67 2d 44 65 18 2d d8 cb 15 95 95 67 b6 a2 | 53 6a 9c 3b 84 13 f8 02 23 28 ee d8 85 45 e3 f6 | 5a a4 85 e6 1c 98 88 9c 1f 95 20 64 13 9f 49 1c | 78 c0 c0 ca f6 15 03 7c ad a7 9e 6d 64 5a 3a 90 | 22 4b eb 71 cf 24 e9 b9 6a 4d d7 77 ec 73 7e 9d | b2 6f c8 a4 49 bf 18 63 90 cf af e1 1e da 29 bc | 29 00 00 24 73 ab 08 be 9c 8c 4d 6d 6c 17 9d b7 | 72 a8 6d 05 77 58 95 9d b6 49 34 83 b7 04 21 62 | 34 da 48 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 91 b3 8b e1 5d a7 b1 99 b7 4d e6 | 18 7a 40 70 0a cf e4 42 00 00 00 1c 00 00 40 05 | 2c bf 9c 44 68 90 73 42 ea f8 95 cd ea 90 69 66 | 03 01 a9 72 | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #114 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 76 3e 2a df 8d 49 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #114 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #114 | rejected packet: | d6 76 3e 2a df 8d 49 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #114: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-122" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-122' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #122 at 0x557d46a7ae50 | State DB: adding IKEv2 state #122 in UNDEFINED | pstats #122 ikev2.ike started | Message ID: init #122: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #122: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #122; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-122" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-122" IKE SA #122 "road-eastnet-nonat-122" "road-eastnet-nonat-122" #122: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-122 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-122": constructed local IKE proposals for road-eastnet-nonat-122 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 122 for state #122 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb360005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #122 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 | #122 spent 0.118 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 resuming | crypto helper 2 starting work-order 122 for state #122 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 122 | RESET processing: connection "road-eastnet-nonat-122" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.255 milliseconds in whack | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 122 time elapsed 0.001063 seconds | (#122) spent 1.07 milliseconds in crypto helper computing work-order 122: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 122 for state #122 to event queue | scheduling resume sending helper answer for #122 | libevent_malloc: new ptr-libevent@0x7fb380027c10 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #122 | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 122 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #122 | **emit ISAKMP Message: | initiator cookie: | 14 66 d6 bd ae 2b be a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-122 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b5 a1 e9 e4 be 1e 51 8a 55 59 79 73 21 36 56 e2 | ikev2 g^x 77 7a 08 bd 06 ab d4 92 e5 dc ae f7 64 76 23 ff | ikev2 g^x f4 fc 6d 61 73 31 e1 d2 4f df c1 6b b7 79 5a 65 | ikev2 g^x a0 cc f6 e0 aa a2 1e 56 c9 61 f0 64 10 6e 71 e4 | ikev2 g^x de d3 38 6f 01 f0 ef d1 f6 56 f5 aa fb d5 dc 96 | ikev2 g^x f9 0b be 72 ef 23 60 6a 39 4c 10 fa 40 46 a5 4f | ikev2 g^x 9d 4e 1b 63 94 dd bb 2e 79 61 b0 23 01 f5 74 e7 | ikev2 g^x c5 3f 64 7f 13 8b 72 4d bd da 91 fc 61 61 ef f0 | ikev2 g^x e7 bf ad 46 59 ed ad 05 2c f7 04 21 03 71 4c c7 | ikev2 g^x 7f 1d ad ca ef 53 b4 42 e8 7b 9b 3d 7a 70 68 63 | ikev2 g^x f6 3b fc 00 63 e2 d1 50 20 42 35 cc 18 3b ef e3 | ikev2 g^x 5c 49 2e b5 43 b5 11 94 a2 42 32 89 ab 4a 75 44 | ikev2 g^x 28 03 13 02 78 a8 b9 d4 86 df f7 69 0e 5b f1 03 | ikev2 g^x 59 e8 3f 87 be c1 4f 01 d7 b7 0b 01 72 03 2c 0c | ikev2 g^x c5 51 b7 34 27 69 20 c2 1e 3c 1a 82 2c 40 e7 31 | ikev2 g^x 94 67 b7 79 04 1c c9 e0 fd 58 15 b5 e2 95 d3 0d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7c 10 f9 fd 3b aa 03 0a 4e 70 88 76 8d 21 8d 7a | IKEv2 nonce 77 a3 25 87 bf 2c 07 91 c2 03 c6 70 6f 0a b2 e3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 14 66 d6 bd ae 2b be a1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7a | natd_hash: port= 01 f4 | natd_hash: hash= 27 62 3b d9 22 f1 42 3b 85 55 78 b5 c8 14 63 8d | natd_hash: hash= 0b 44 d6 d6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 27 62 3b d9 22 f1 42 3b 85 55 78 b5 c8 14 63 8d | Notify data 0b 44 d6 d6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 14 66 d6 bd ae 2b be a1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1b ba f6 9b c4 53 50 8e 11 46 cb 49 4f 65 db eb | natd_hash: hash= 69 7d d4 7c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b ba f6 9b c4 53 50 8e 11 46 cb 49 4f 65 db eb | Notify data 69 7d d4 7c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #122 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #122: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #122 to 4294967295 after switching state | Message ID: IKE #122 skipping update_recv as MD is fake | Message ID: sent #122 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-122" #122: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.122:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #122) | 14 66 d6 bd ae 2b be a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 a1 e9 e4 be 1e 51 8a 55 59 79 73 21 36 56 e2 | 77 7a 08 bd 06 ab d4 92 e5 dc ae f7 64 76 23 ff | f4 fc 6d 61 73 31 e1 d2 4f df c1 6b b7 79 5a 65 | a0 cc f6 e0 aa a2 1e 56 c9 61 f0 64 10 6e 71 e4 | de d3 38 6f 01 f0 ef d1 f6 56 f5 aa fb d5 dc 96 | f9 0b be 72 ef 23 60 6a 39 4c 10 fa 40 46 a5 4f | 9d 4e 1b 63 94 dd bb 2e 79 61 b0 23 01 f5 74 e7 | c5 3f 64 7f 13 8b 72 4d bd da 91 fc 61 61 ef f0 | e7 bf ad 46 59 ed ad 05 2c f7 04 21 03 71 4c c7 | 7f 1d ad ca ef 53 b4 42 e8 7b 9b 3d 7a 70 68 63 | f6 3b fc 00 63 e2 d1 50 20 42 35 cc 18 3b ef e3 | 5c 49 2e b5 43 b5 11 94 a2 42 32 89 ab 4a 75 44 | 28 03 13 02 78 a8 b9 d4 86 df f7 69 0e 5b f1 03 | 59 e8 3f 87 be c1 4f 01 d7 b7 0b 01 72 03 2c 0c | c5 51 b7 34 27 69 20 c2 1e 3c 1a 82 2c 40 e7 31 | 94 67 b7 79 04 1c c9 e0 fd 58 15 b5 e2 95 d3 0d | 29 00 00 24 7c 10 f9 fd 3b aa 03 0a 4e 70 88 76 | 8d 21 8d 7a 77 a3 25 87 bf 2c 07 91 c2 03 c6 70 | 6f 0a b2 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 62 3b d9 22 f1 42 3b 85 55 78 b5 | c8 14 63 8d 0b 44 d6 d6 00 00 00 1c 00 00 40 05 | 1b ba f6 9b c4 53 50 8e 11 46 cb 49 4f 65 db eb | 69 7d d4 7c | state #122 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb360005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #122 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 | #122 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49610.281128 | resume sending helper answer for #122 suppresed complete_v2_state_transition() and stole MD | #122 spent 0.483 milliseconds in resume sending helper answer | stop processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb380027c10 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 66 d6 bd ae 2b be a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #122 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #122 | rejected packet: | 14 66 d6 bd ae 2b be a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #122: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0866 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #69 | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #69 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #69 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49610.321367; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002793 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a03d30 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #69 | libevent_malloc: new ptr-libevent@0x7fb380027c10 size 128 "road-eastnet-nonat-69" #69: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #69) | f2 a5 7f fe 4a 34 bb 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 e4 3b 13 88 fe 14 57 37 ea f2 64 67 d0 00 fc | 08 06 ee d2 9e 18 57 6d 24 e0 9d ec 05 43 cc ba | 46 84 14 09 e9 e2 59 69 78 ab 8d 44 b4 c5 40 3a | a2 89 7d 06 7b bd cc e4 70 62 31 9f 43 8b b5 bc | 3c 9f 69 fb 1f f5 22 54 18 e5 72 15 5a 48 ee 5c | c3 f3 42 0b 25 4e 7f 00 ca 3e e9 db 4e ab 7a 2a | 5e 8e 14 a5 6c b8 fa ac c8 1b f3 01 fc 2e 88 fc | de 9d 1f b4 30 64 da 79 40 14 b9 cb 57 7b 44 a9 | 8b 4d e2 fe 10 ef 78 5b 95 32 a7 75 3e 68 a2 02 | 50 a9 63 99 4c de c2 a2 55 8e e7 c1 4c 9d ba d5 | 23 4b 1b 11 eb 5b d1 0e 0a 69 30 ae 96 7b a4 e6 | d5 07 c0 08 e9 6f 21 3e f5 fc eb 69 b8 6d f7 0c | e4 6a a2 62 87 f1 46 98 bb 82 fd ef c3 b7 37 d9 | 4f 4d 06 a6 46 29 3d cf 6d 59 1a 7a 7d 4c 43 d4 | 05 3e e7 70 e1 23 3b 86 eb 4e 8f 26 e0 cf 97 cf | 6f 21 b0 32 5e 71 a6 25 0b f1 15 b5 06 82 51 60 | 29 00 00 24 ca 10 ed 53 1e ff c5 43 38 73 0a 51 | c6 98 7c 29 17 9d 86 f8 04 d8 2e 0c fa 41 a7 af | 38 8b 0b 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 9a cb 7f 17 aa e7 97 ca 43 a3 43 | c3 e4 41 43 e3 4b 2a 3e 00 00 00 1c 00 00 40 05 | 50 72 12 31 6b fb 9c 33 88 e7 6f 1a 9e 5d 70 fe | 3b 28 e9 92 | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #69 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 a5 7f fe 4a 34 bb 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #69 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #69 | rejected packet: | f2 a5 7f fe 4a 34 bb 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #69: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a54250 | handling event EVENT_RETRANSMIT for parent state #108 | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #108 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #108 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49610.332708; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001563 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #108 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 "road-eastnet-nonat-108" #108: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #108) | b6 36 fb 7e 9b 39 08 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 8f 7e 30 55 17 55 d0 7b cc 1e 1e d2 0b 4a cb | f4 10 86 26 73 3d 12 d5 07 43 0f 11 e4 f8 f6 27 | 0b a5 f1 36 07 fc f3 05 3c 23 da bb fc 30 83 87 | 4d 41 58 5e 99 3a a9 ce 46 15 98 87 9b 24 d7 8f | 4b 59 7f b7 31 2a 48 e9 80 ab 05 c8 c6 49 95 79 | 0d 98 4a 2c 3d fe d3 d5 57 7f be e0 6f 80 49 7e | 12 83 14 1f 0d 26 16 aa cd e1 d8 a5 e8 e4 d2 0b | 8c a3 fb db 9a 33 4c 54 d3 db d0 4d 8d 8e a8 6d | 02 98 c7 65 a7 c6 72 0c be 01 bc 52 89 54 3a 59 | 6c 0b 5d c0 31 d7 63 e7 46 02 b3 0a b3 c7 5c de | 0f 7c c0 40 9f a9 b4 60 e4 65 87 1b d1 de 9c 27 | 3d df 5c 7f 27 8d e9 84 86 44 ce 9d 88 43 1a 58 | 28 56 bd 9e df a0 81 8f 79 ba 7e dd 69 15 d8 10 | e7 15 0f da 12 84 35 19 8e 2f 46 d3 83 f4 76 51 | 58 93 90 90 80 38 02 b8 02 db 96 cc e8 5b bf 28 | 0c 19 e8 c4 f6 ae 03 e7 2c 85 d1 50 dc 63 a6 cc | 29 00 00 24 6f 78 95 93 53 4c be 35 be d7 12 7f | aa e5 be 16 ad 5c 36 ac 46 40 9b c8 37 9c 91 65 | 00 a5 4b a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 98 20 9c 05 26 c6 0c 16 0d f3 71 | 8e b0 d2 f3 4f 39 a2 61 00 00 00 1c 00 00 40 05 | 96 4b e6 dc 37 23 61 90 08 5b 41 4a ab 35 e9 fe | 61 65 2c 1d | libevent_free: release ptr-libevent@0x7fb388022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a54250 | #108 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b6 36 fb 7e 9b 39 08 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #108 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #108 | rejected packet: | b6 36 fb 7e 9b 39 08 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #108: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0599 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a011f0 | handling event EVENT_RETRANSMIT for parent state #18 | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #18 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #18 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49610.334037; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00487 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a54250 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #18 | libevent_malloc: new ptr-libevent@0x7fb388022480 size 128 "road-eastnet-nonat-18" #18: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #18) | fb 32 f3 fa 98 61 11 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 1b 0e e3 36 19 71 f2 00 c4 a6 18 1e bb 4a b9 | 3f d0 79 e4 4c 35 e5 1e 56 1e d1 56 df b2 32 fa | cb c3 c2 d3 4a 94 0b 28 4c 8e ed f1 14 00 ce ed | b6 d4 73 ac db 94 04 97 4d da 90 7f 61 f0 d2 4f | 60 04 42 6d 98 5c e4 05 d2 7d 05 4f 2d 99 94 a5 | 24 07 67 86 b6 21 b9 09 3a ea 16 cd cc b4 37 10 | 72 43 f6 be 6d 76 63 9b 24 f5 23 e6 b1 48 bc f9 | f2 cf d4 72 32 75 ee 93 a2 3d a2 fc 4d 35 5b 06 | 2a 31 6e 66 38 b7 b9 5b ce 6b 7a 5c 24 6c c6 91 | 21 f8 32 cc e1 e9 56 aa 56 2c 50 74 9d 0e c3 9c | b6 78 ee 5d a7 11 af c5 d5 50 6d b5 f0 a5 9d 4e | 3f d5 dc b9 6a 00 2b e1 dd 5f 8a e9 31 c5 30 8b | ee 43 f2 79 32 71 d6 e9 6e 27 23 22 2e 49 e0 0f | a1 32 43 40 65 d3 35 9f 97 aa f2 5c 61 69 29 93 | 3e f9 84 1e 9a f8 ea a4 2a 81 be 45 2f 6a 95 39 | a8 bb 2b 71 c2 45 83 fa e9 8d 63 1f 25 98 d1 4c | 29 00 00 24 64 09 7d 4a c3 95 64 a7 f6 f8 ca 35 | d6 3a 22 ea 52 84 43 22 db d2 95 2f 1d 96 44 f9 | 61 f7 89 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 f9 c7 a2 f7 e0 10 e9 b6 c5 14 f2 | 0e d4 f3 ff 41 9a 2e 34 00 00 00 1c 00 00 40 05 | be 8c d9 50 c4 e0 70 2a 58 15 0e 32 3f df db 0d | 01 81 6c d8 | libevent_free: release ptr-libevent@0x7fb36c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a011f0 | #18 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 32 f3 fa 98 61 11 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #18 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #18 | rejected packet: | fb 32 f3 fa 98 61 11 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #18: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0575 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c00d120 | handling event EVENT_RETRANSMIT for parent state #115 | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #115 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #115 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49610.337325; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500576 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a42790 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #115 | libevent_malloc: new ptr-libevent@0x7fb36c0180b0 size 128 "road-eastnet-nonat-115" #115: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #115) | c4 57 de ea ab 7c 97 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d 60 64 b4 6d 6b ab d1 46 47 bf d9 bb b3 15 d9 | 76 6a d8 89 d3 b0 5a 81 28 ba 1d 93 76 a5 80 bb | 38 99 6f de 11 f7 c8 2c 23 bb 14 6a 9f 0d a9 47 | 32 e4 6d d5 c4 32 60 81 49 22 36 5b 90 09 c7 0c | 27 45 32 0f 98 73 ed a3 58 24 f6 91 48 ba e7 1f | da 48 cc 0b e5 09 56 9d bd e9 fe a4 8f 0e 2b 69 | 4d 35 1f 28 bf 51 97 13 c0 2e 28 0e de c2 67 89 | 74 f0 15 44 d8 28 5b 7f f9 a9 ff b2 03 37 cf 2c | 3b 6e e1 4e 7e c7 1c 07 07 33 f5 e7 ff 50 1f 8d | 31 38 08 fc a1 18 db f4 32 10 6d f3 26 bd 9e d9 | db 50 5b 6d 6b 19 89 41 88 e3 7e 3b 01 55 72 67 | 91 73 3c 48 31 9d dd 55 e1 1b 9a a9 f9 5f 58 30 | 2e b7 6d 0e 83 a7 65 f9 86 ec 70 47 1e 65 85 e1 | e6 c5 21 98 7e 5c d4 94 dd 2a 93 5a 70 ed 80 a7 | 59 4c 40 1d 45 f5 3b 9b ad 67 94 6a 65 cc 62 c5 | 57 fb 85 e6 12 1e d8 43 f4 ef fe f0 cc a4 02 e0 | 29 00 00 24 34 89 d0 cd bb 68 33 bb 66 4c 49 99 | 21 34 57 e7 67 32 62 7f b0 e9 7c 89 a8 87 a7 1b | 14 49 2b 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 7a 1e c7 ed 14 54 ea ac f9 9a 4e | af 78 6e 32 16 f1 84 2f 00 00 00 1c 00 00 40 05 | 1a 60 d9 ab c3 38 58 4e 6c 49 b7 eb b4 e1 91 a6 | 90 ea 24 0f | libevent_free: release ptr-libevent@0x7fb36c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00d120 | #115 spent 0.0939 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 57 de ea ab 7c 97 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #115 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #115 | rejected packet: | c4 57 de ea ab 7c 97 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #115: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35400d120 | handling event EVENT_RETRANSMIT for parent state #96 | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #96 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #96 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49610.339574; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002974 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #96 | libevent_malloc: new ptr-libevent@0x7fb36c012840 size 128 "road-eastnet-nonat-96" #96: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #96) | 4d 94 02 39 3c 71 1f ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 27 e8 d9 3b fa 4a fd 06 7e 6c e7 d4 28 0e 9b | df ea 6a b2 fc 9c 70 c8 54 bf db 6f b0 0a 35 03 | f4 08 a8 1f a5 9d 3d d9 36 ba b8 d7 c7 a5 02 b2 | bf b0 56 c5 e8 85 3a 3f 3e 64 27 86 e6 32 36 9e | e3 cb 8f 61 07 7c f1 f7 b9 98 01 dc 75 bf ec 8e | e7 f3 67 03 e1 e0 44 02 7f 11 18 67 70 37 2d 5e | 1b 6f 89 19 20 17 f1 e7 a8 e9 33 cb ea 00 46 56 | 49 ba cc 5d 15 50 da 98 ff 9c 3f 56 7f 50 23 17 | 4f 39 25 c0 2c 24 4b 31 aa 08 bf c3 fa 73 75 f8 | 66 d4 df a2 81 2f b6 b1 85 b3 e1 b9 2c ba cc f0 | 05 a5 8e 76 4a d0 1e 4a 24 c4 b4 b6 c2 9f 5a c8 | d7 f7 62 5f e5 ae 58 69 f5 08 1a e6 3f f8 45 99 | 93 41 5e 16 d1 fa c4 dc dc 43 aa 67 19 5f 0d 6b | d0 93 a7 d0 e0 42 60 37 df bb b8 67 3d be 3f 73 | 01 ab df b7 44 63 b3 2e 2f eb b6 11 c7 6c 12 e1 | 09 64 f6 e9 82 4b 4a d1 f8 5c 86 44 cf 9c 7b 84 | 29 00 00 24 fb b6 a6 14 5d d4 9f d4 3b de f1 45 | f6 4a ea e3 bf d0 33 9e b1 50 af 7d ca 56 7c e5 | 77 5f 83 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 32 ad 1c 75 03 32 df 0c 2b d0 a0 | cb f7 34 b2 23 e4 90 14 00 00 00 1c 00 00 40 05 | 3d 4e a8 fd 45 70 26 15 be c0 96 dc 33 de 8f ea | e2 1a 12 a7 | libevent_free: release ptr-libevent@0x7fb354012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400d120 | #96 spent 0.0869 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d 94 02 39 3c 71 1f ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #96 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #96 | rejected packet: | 4d 94 02 39 3c 71 1f ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #96: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0403 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-123" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-123' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #123 at 0x557d46a7c410 | State DB: adding IKEv2 state #123 in UNDEFINED | pstats #123 ikev2.ike started | Message ID: init #123: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #123: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #123; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-123" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-123" IKE SA #123 "road-eastnet-nonat-123" "road-eastnet-nonat-123" #123: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-123 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-123": constructed local IKE proposals for road-eastnet-nonat-123 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 123 for state #123 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35400d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #123 | libevent_malloc: new ptr-libevent@0x7fb354012840 size 128 | #123 spent 0.118 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 resuming | crypto helper 0 starting work-order 123 for state #123 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 123 | RESET processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-123" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.199 milliseconds in whack | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 123 time elapsed 0.001054 seconds | (#123) spent 1.06 milliseconds in crypto helper computing work-order 123: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 123 for state #123 to event queue | scheduling resume sending helper answer for #123 | libevent_malloc: new ptr-libevent@0x7fb384027b30 size 128 | libevent_realloc: release ptr-libevent@0x557d46a27340 | libevent_realloc: new ptr-libevent@0x557d46a7e580 size 2048 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #123 | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 123 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #123 | **emit ISAKMP Message: | initiator cookie: | 6c 7d b3 a1 76 62 7d ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-123 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f9 56 4f 8e 37 33 e9 f0 f8 7f b8 e1 b3 f9 a8 fa | ikev2 g^x b7 62 0a da df 31 2b 33 3e c3 84 d4 70 c9 16 31 | ikev2 g^x 80 ac 1c 22 4c fb 0e d9 48 14 9a 6c 58 8b b2 b1 | ikev2 g^x ab d6 de 52 1b e7 85 36 94 02 66 e4 ea 4b 3e bb | ikev2 g^x cb 9a 60 cd b2 64 9c 54 4c 58 05 94 9a 41 90 e5 | ikev2 g^x 3d f7 e6 13 47 7c 5c ae 9e ed 2f 47 46 7c b6 ec | ikev2 g^x 64 99 4c 90 1f 2b 27 83 ee 7d 0c 95 53 61 78 0e | ikev2 g^x fc 0d ee f9 69 83 ad f2 29 e6 77 fd 16 29 ec c4 | ikev2 g^x 55 89 e7 07 dc 10 66 d5 0f fd 31 a1 54 12 3e c7 | ikev2 g^x b1 16 f6 98 63 b4 d5 90 8d e3 ff 44 b5 31 8e 32 | ikev2 g^x c1 26 fd ff 42 9b c5 01 50 0b be e0 4e 8b d1 4e | ikev2 g^x 1e cc 49 12 14 c5 7d a4 df 96 fd 82 a1 fa 2c 84 | ikev2 g^x 20 3e 8f a2 9b 0b 00 ca 45 cd 8b a5 8a 1e 6a fa | ikev2 g^x 02 7f 67 67 3a 15 da 2b 32 2d 18 bd 05 df 1f 49 | ikev2 g^x 13 dc cd f2 4e 24 ac 3e c3 6e b4 5b 9b c7 3e 7b | ikev2 g^x f3 b3 b6 54 f0 4f 36 43 d8 39 48 ea ae 56 03 eb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9d 71 0d 4c e1 28 99 bb a1 c2 a8 97 82 df 6e a7 | IKEv2 nonce 59 50 e5 e7 83 d9 52 2c 3a b5 f8 0a ab 34 6b 04 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6c 7d b3 a1 76 62 7d ef | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7b | natd_hash: port= 01 f4 | natd_hash: hash= dd f0 b7 a5 ab c1 1e 9f 00 5e 1f f4 01 11 d6 41 | natd_hash: hash= 8c c8 44 db | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dd f0 b7 a5 ab c1 1e 9f 00 5e 1f f4 01 11 d6 41 | Notify data 8c c8 44 db | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6c 7d b3 a1 76 62 7d ef | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 74 ad b7 af a3 7a 6a 08 ff e9 f2 f1 74 4e c9 b2 | natd_hash: hash= f6 ce db 1e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 74 ad b7 af a3 7a 6a 08 ff e9 f2 f1 74 4e c9 b2 | Notify data f6 ce db 1e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #123 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #123: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #123 to 4294967295 after switching state | Message ID: IKE #123 skipping update_recv as MD is fake | Message ID: sent #123 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-123" #123: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.123:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #123) | 6c 7d b3 a1 76 62 7d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 56 4f 8e 37 33 e9 f0 f8 7f b8 e1 b3 f9 a8 fa | b7 62 0a da df 31 2b 33 3e c3 84 d4 70 c9 16 31 | 80 ac 1c 22 4c fb 0e d9 48 14 9a 6c 58 8b b2 b1 | ab d6 de 52 1b e7 85 36 94 02 66 e4 ea 4b 3e bb | cb 9a 60 cd b2 64 9c 54 4c 58 05 94 9a 41 90 e5 | 3d f7 e6 13 47 7c 5c ae 9e ed 2f 47 46 7c b6 ec | 64 99 4c 90 1f 2b 27 83 ee 7d 0c 95 53 61 78 0e | fc 0d ee f9 69 83 ad f2 29 e6 77 fd 16 29 ec c4 | 55 89 e7 07 dc 10 66 d5 0f fd 31 a1 54 12 3e c7 | b1 16 f6 98 63 b4 d5 90 8d e3 ff 44 b5 31 8e 32 | c1 26 fd ff 42 9b c5 01 50 0b be e0 4e 8b d1 4e | 1e cc 49 12 14 c5 7d a4 df 96 fd 82 a1 fa 2c 84 | 20 3e 8f a2 9b 0b 00 ca 45 cd 8b a5 8a 1e 6a fa | 02 7f 67 67 3a 15 da 2b 32 2d 18 bd 05 df 1f 49 | 13 dc cd f2 4e 24 ac 3e c3 6e b4 5b 9b c7 3e 7b | f3 b3 b6 54 f0 4f 36 43 d8 39 48 ea ae 56 03 eb | 29 00 00 24 9d 71 0d 4c e1 28 99 bb a1 c2 a8 97 | 82 df 6e a7 59 50 e5 e7 83 d9 52 2c 3a b5 f8 0a | ab 34 6b 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd f0 b7 a5 ab c1 1e 9f 00 5e 1f f4 | 01 11 d6 41 8c c8 44 db 00 00 00 1c 00 00 40 05 | 74 ad b7 af a3 7a 6a 08 ff e9 f2 f1 74 4e c9 b2 | f6 ce db 1e | state #123 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb354012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35400d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #123 | libevent_malloc: new ptr-libevent@0x7fb354012840 size 128 | #123 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49610.343718 | resume sending helper answer for #123 suppresed complete_v2_state_transition() and stole MD | #123 spent 0.396 milliseconds in resume sending helper answer | stop processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb384027b30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 7d b3 a1 76 62 7d ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #123 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #123 | rejected packet: | 6c 7d b3 a1 76 62 7d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #123: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a30d70 | handling event EVENT_RETRANSMIT for parent state #70 | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #70 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #70 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49610.381912; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003488 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a011f0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #70 | libevent_malloc: new ptr-libevent@0x7fb384027b30 size 128 "road-eastnet-nonat-70" #70: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #70) | 80 24 74 22 d5 0f 52 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 68 71 3c 0e 60 a8 bb a5 bd cc ef ef 0c eb f4 | 82 28 4b 5e 34 f6 13 aa c3 d7 89 31 ad 91 46 ac | 15 dc aa e6 7a e7 0b 3f 82 69 6e e1 56 f0 c8 52 | de 05 0d fd 08 00 ee cd cc b6 87 fe a0 b0 ff e6 | 05 55 e6 b7 5e 20 53 79 90 12 ce ff 82 cf ad 41 | 3f a9 51 ad f1 8c d6 57 77 1c ef 27 f0 57 e1 8c | 97 cb b6 ce ff c0 f1 f4 a5 49 d9 74 1f 1d 74 75 | 54 be f3 af 4b 6b 43 9d 43 d4 e5 05 71 04 36 2c | c7 7c 5d f8 30 fc 44 25 48 9e 9e 82 91 e8 e4 34 | 70 26 3e 95 67 c5 a4 cb 36 d4 25 b1 2b 4a 77 2f | ae 15 52 3f 18 49 f9 47 bb a7 d2 0a ef 99 db 3d | 39 af f3 91 da 08 e3 b3 1f e4 ed 82 f5 26 e3 03 | 98 c1 58 ff ba 18 2d c8 81 ea 83 51 70 26 1e 19 | 23 60 13 98 08 43 34 78 7d 3c 93 d1 af b4 fb fe | d5 41 09 8b c9 2b 05 f4 1c a3 62 cd 21 e3 82 7b | 55 52 fe 90 11 4a 62 6c 99 8c d7 30 a6 21 f0 d1 | 29 00 00 24 e3 da 6d 7f a1 8b eb f9 61 52 ce 97 | 54 be ad 07 4c e8 1e 18 ff 49 38 58 56 77 f6 8a | c3 33 cb 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 9f 21 cd 26 5d 21 04 f0 de c9 2f | 2e 65 dc 8c 6b f1 6c dd 00 00 00 1c 00 00 40 05 | 7b 41 25 4c 4c ca db 2b 78 bf 1e 87 08 ff 47 0c | c4 b0 37 95 | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a30d70 | #70 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 24 74 22 d5 0f 52 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #70 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #70 | rejected packet: | 80 24 74 22 d5 0f 52 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #70: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #116 | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #116 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #116 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49610.404193; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501541 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a276e0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #116 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 "road-eastnet-nonat-116" #116: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #116) | b2 c1 8f cb f7 6a 1e a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 10 14 ae 52 93 c7 02 e8 52 e1 37 d5 de 46 8c | fd 60 c1 85 87 df bb 73 86 74 dd ca 8d 28 84 e8 | ae a4 cc 28 e4 8d 32 74 8d 1a ce d7 d3 d2 af b0 | 17 d9 f0 1f a3 6b 80 67 ac 90 16 e8 bd 63 76 cd | 29 1d 99 79 32 0a f9 72 a3 b1 6c a3 80 e8 98 c7 | 50 db 8b a2 a3 d2 f5 f7 af ea cb e0 92 9e 24 f1 | ee d0 e5 d9 31 06 c1 bd 2c 7e d3 0a 21 44 11 df | a4 42 5a ee bb 8a 79 72 e4 f3 c9 99 7b df 25 70 | 3c 49 19 99 e1 b4 65 cb cf 1f dc af da 2b bd 09 | 11 55 b0 c8 e4 15 8c 50 3c c0 c3 00 8c 8c 4c ab | 69 1b ad 8f b8 1a e0 31 01 be 05 d6 f9 1d 43 66 | f1 fd 89 96 83 b0 fe 81 90 88 96 0a aa b0 30 a0 | 85 c7 97 d5 26 67 92 b8 99 15 c1 d7 75 f8 4b 96 | 28 a4 71 fb e3 bc ab 36 e6 56 13 b6 1e 48 b3 3d | 9c e0 fd 0d 74 f8 ef 54 b8 1f 40 6b e3 af 77 76 | c8 a0 52 42 e3 01 29 91 49 f3 39 82 3e 75 b6 74 | 29 00 00 24 f8 40 4d b3 f4 26 54 f3 cf b0 a0 c8 | 54 6e 9f a9 95 bb 15 87 06 e3 63 86 66 7d 8a 82 | ee 67 c6 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 63 f6 16 ae 7e d5 6c 46 12 68 8c | 69 38 5c 9a 54 a3 19 f3 00 00 00 1c 00 00 40 05 | 9e 9c 34 46 1f 45 a3 36 da 24 a6 33 3a 00 62 20 | 5b e0 e0 ea | libevent_free: release ptr-libevent@0x7fb36c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #116 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 c1 8f cb f7 6a 1e a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #116 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #116 | rejected packet: | b2 c1 8f cb f7 6a 1e a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #116: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-124" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-124' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #124 at 0x557d46a7d9d0 | State DB: adding IKEv2 state #124 in UNDEFINED | pstats #124 ikev2.ike started | Message ID: init #124: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #124: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #124; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-124" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-124" IKE SA #124 "road-eastnet-nonat-124" "road-eastnet-nonat-124" #124: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-124 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-124": constructed local IKE proposals for road-eastnet-nonat-124 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 124 for state #124 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4d5d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #124 | libevent_malloc: new ptr-libevent@0x7fb36c00cf80 size 128 | #124 spent 0.15 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-124" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.233 milliseconds in whack | timer_event_cb: processing event@0x557d469fd070 | handling event EVENT_RETRANSMIT for parent state #109 | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #109 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #109 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49610.407688; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000975 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a30d70 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #109 | libevent_malloc: new ptr-libevent@0x7fb3700251c0 size 128 "road-eastnet-nonat-109" #109: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #109) | 53 c2 aa ad 50 91 d9 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 1a 23 bb a3 ce 6a 0d 92 7a aa 8d 69 c7 99 27 | db f2 23 5c cd 5e 2d f6 c4 13 c1 c7 87 46 ed 75 | d8 b9 55 72 40 32 53 f1 21 db f3 6d 45 6a d9 b4 | 9c 06 b1 28 c5 00 1e e2 70 2c 2a 1a f0 fa 65 1b | a8 db b9 2c 83 95 23 c4 4d 60 4b a3 fc 58 c6 c8 | a8 b0 c1 e8 32 2c d3 70 a2 4d cb c8 7c 80 17 90 | c1 c1 fd 82 03 1f 32 d8 5e cd ad 60 ce c1 24 ab | 82 68 88 db 79 b3 aa 37 ff 36 d4 a3 82 06 b7 59 | 0c 4c 61 6f 22 1c 48 b3 94 8b 71 14 8f 57 c8 03 | 31 41 b9 e3 a9 ea 8f 4d 51 15 4a 4c 5f 30 c2 c4 | 40 3e 6a 9e 7d 33 6d fb 91 1c b2 be 1e 33 35 f6 | 1a db ff 1e 8c 4e e8 12 71 d7 94 88 49 d8 37 d9 | cb 52 5b 22 87 0a c9 2f a4 1d 52 36 85 74 38 7e | de e2 44 79 f2 36 18 5e 82 cf d4 fb db 3f c9 35 | 36 d8 7b 5d 04 fb fa a4 fe b5 87 c5 e7 4e 90 d6 | 9f 17 87 48 32 5d ec 5c f7 e6 e2 39 17 1c 9c 2a | 29 00 00 24 8f bd ba cb 6b fc de c1 80 b9 fe c3 | b3 e0 ad b2 e9 fa 37 77 43 04 c6 81 1a 91 41 eb | 20 40 b9 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f d2 7c ae 7e 39 2b fb 54 2c 44 94 | 2e c2 37 67 8d e5 fe 8b 00 00 00 1c 00 00 40 05 | 12 b6 58 87 f0 a8 b9 d4 aa ae 6f 5a ed df 76 d7 | 1d 86 02 2c | libevent_free: release ptr-libevent@0x7fb3480251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fd070 | #109 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 c2 aa ad 50 91 d9 00 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #109 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #109 | rejected packet: | 53 c2 aa ad 50 91 d9 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #109: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 9 resuming | crypto helper 9 starting work-order 124 for state #124 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 124 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 124 time elapsed 0.000998 seconds | (#124) spent 0.999 milliseconds in crypto helper computing work-order 124: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 124 for state #124 to event queue | scheduling resume sending helper answer for #124 | libevent_malloc: new ptr-libevent@0x7fb37802a950 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #124 | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 124 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #124 | **emit ISAKMP Message: | initiator cookie: | 8e 52 ee 7a 33 75 3f 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-124 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 08 57 9a 04 43 62 52 e5 fc b5 c2 fe cc ad 34 2f | ikev2 g^x 82 f3 00 f6 ee 21 08 77 c9 b1 bb 69 fe 78 0f 21 | ikev2 g^x bf 36 0c 3c d2 28 d9 56 83 ae 1a 8d 60 fc ba 85 | ikev2 g^x 54 56 0c 31 1b 34 8f 99 3a cf de 75 87 a0 b6 a4 | ikev2 g^x d8 62 39 46 a5 f4 50 6b 49 13 47 6a b8 07 fd 9b | ikev2 g^x a0 24 9b 8e 36 86 71 8d 3a 86 06 ec 43 9f d0 fa | ikev2 g^x fb 5f d7 26 3c ad 44 31 62 f2 eb 50 ab 84 4b c8 | ikev2 g^x 92 d2 94 d1 cf 28 72 53 f0 98 5e 24 79 26 3e b6 | ikev2 g^x 8a 49 4d a1 69 34 ff 0b 63 f0 6a 98 fb 9b 9e fc | ikev2 g^x 07 2e cd bb 5b c5 49 f8 a9 bd 52 eb e2 d4 29 6f | ikev2 g^x e4 1e 81 a0 d3 65 f5 f3 07 20 20 0d 39 fe 60 11 | ikev2 g^x 31 d5 df 57 2f d9 ac 24 3b 95 8a 93 3c 37 3c fe | ikev2 g^x 00 f5 ae e3 8b 73 07 19 bf 7a 74 b9 19 54 31 a8 | ikev2 g^x c6 05 b4 3c c9 b4 f2 d1 4f 8d c4 e7 6c 6b d7 8c | ikev2 g^x a7 72 14 8c da 9f 42 94 91 f0 27 3c ef a5 63 c0 | ikev2 g^x 4b e5 9c 5d a2 4a 47 0f 02 ed 81 c6 7a 36 ca c0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 35 37 ad 9e 25 61 50 57 d7 60 4e 9e 7c 24 2e 8d | IKEv2 nonce b9 f6 52 07 e6 cf b3 cb 88 5a c5 03 c4 c6 aa c2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8e 52 ee 7a 33 75 3f 69 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7c | natd_hash: port= 01 f4 | natd_hash: hash= a7 73 0e 7d 3a 1d a8 f9 ef 84 7c a6 0b 05 4a f4 | natd_hash: hash= 88 18 b0 42 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a7 73 0e 7d 3a 1d a8 f9 ef 84 7c a6 0b 05 4a f4 | Notify data 88 18 b0 42 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8e 52 ee 7a 33 75 3f 69 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 95 90 15 33 51 5d ad 36 64 2a 62 55 cb ba 4d 6f | natd_hash: hash= 9b 17 ee 8d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 95 90 15 33 51 5d ad 36 64 2a 62 55 cb ba 4d 6f | Notify data 9b 17 ee 8d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #124 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #124: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #124 to 4294967295 after switching state | Message ID: IKE #124 skipping update_recv as MD is fake | Message ID: sent #124 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-124" #124: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.124:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #124) | 8e 52 ee 7a 33 75 3f 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 57 9a 04 43 62 52 e5 fc b5 c2 fe cc ad 34 2f | 82 f3 00 f6 ee 21 08 77 c9 b1 bb 69 fe 78 0f 21 | bf 36 0c 3c d2 28 d9 56 83 ae 1a 8d 60 fc ba 85 | 54 56 0c 31 1b 34 8f 99 3a cf de 75 87 a0 b6 a4 | d8 62 39 46 a5 f4 50 6b 49 13 47 6a b8 07 fd 9b | a0 24 9b 8e 36 86 71 8d 3a 86 06 ec 43 9f d0 fa | fb 5f d7 26 3c ad 44 31 62 f2 eb 50 ab 84 4b c8 | 92 d2 94 d1 cf 28 72 53 f0 98 5e 24 79 26 3e b6 | 8a 49 4d a1 69 34 ff 0b 63 f0 6a 98 fb 9b 9e fc | 07 2e cd bb 5b c5 49 f8 a9 bd 52 eb e2 d4 29 6f | e4 1e 81 a0 d3 65 f5 f3 07 20 20 0d 39 fe 60 11 | 31 d5 df 57 2f d9 ac 24 3b 95 8a 93 3c 37 3c fe | 00 f5 ae e3 8b 73 07 19 bf 7a 74 b9 19 54 31 a8 | c6 05 b4 3c c9 b4 f2 d1 4f 8d c4 e7 6c 6b d7 8c | a7 72 14 8c da 9f 42 94 91 f0 27 3c ef a5 63 c0 | 4b e5 9c 5d a2 4a 47 0f 02 ed 81 c6 7a 36 ca c0 | 29 00 00 24 35 37 ad 9e 25 61 50 57 d7 60 4e 9e | 7c 24 2e 8d b9 f6 52 07 e6 cf b3 cb 88 5a c5 03 | c4 c6 aa c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 73 0e 7d 3a 1d a8 f9 ef 84 7c a6 | 0b 05 4a f4 88 18 b0 42 00 00 00 1c 00 00 40 05 | 95 90 15 33 51 5d ad 36 64 2a 62 55 cb ba 4d 6f | 9b 17 ee 8d | state #124 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c00cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4d5d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #124 | libevent_malloc: new ptr-libevent@0x7fb36c00cf80 size 128 | #124 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49610.409644 | resume sending helper answer for #124 suppresed complete_v2_state_transition() and stole MD | #124 spent 0.477 milliseconds in resume sending helper answer | stop processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37802a950 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 52 ee 7a 33 75 3f 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #124 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #124 | rejected packet: | 8e 52 ee 7a 33 75 3f 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #124: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a43dd0 | handling event EVENT_RETRANSMIT for parent state #71 | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #71 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #71 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49610.441851; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003345 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fd070 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #71 | libevent_malloc: new ptr-libevent@0x7fb37802a950 size 128 "road-eastnet-nonat-71" #71: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #71) | 95 1a 0e bc b8 89 e9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 b7 52 d3 88 4c 72 94 29 6d 07 48 59 53 9a 94 | c0 d8 40 dd 8b 33 cc b5 e7 5f 10 c4 f9 b5 b0 62 | 0e 7e dc 7c c0 5d c2 c0 b8 2a 1e ee d8 c7 67 c5 | 6e 7a 2e c8 c8 78 d1 01 66 2d d2 7e a8 80 78 39 | ed 64 bc 65 47 6b 53 20 db f8 49 7d 75 df ac 21 | 43 37 22 43 cf 85 a4 b5 c6 f2 cc 18 4e ff c1 67 | d6 fb 3b b4 2a 72 36 3e af 12 4f 93 13 35 59 a3 | 8d fd 4c ac bd 7c e1 d6 8a 63 b4 aa 9a 01 66 5d | 44 4d c8 c6 a5 27 c2 50 76 c4 0f 7a ea 30 2c 2e | c8 fd c2 09 eb 13 95 a3 62 05 52 05 99 27 2d 5d | 04 8a cb d5 bd f0 da af b1 fd a8 57 4b 25 12 cd | 81 31 3f 97 9d 49 d1 70 50 67 35 65 ba 2d c4 ae | a9 91 18 06 72 21 47 2c 8e e0 a3 db 1b a2 3f 13 | 0f a8 f6 3e 94 d7 36 d8 17 22 ad cd f5 cd f3 43 | 86 8f ec 5e a8 71 d9 dd 87 6e d8 e4 58 cb 3c 76 | ee 77 2a 83 0c e5 de 50 b0 fc 77 61 13 ac a0 07 | 29 00 00 24 12 6c 20 e2 d1 b6 94 1d 42 66 63 a9 | 4b 6f 5d 9a 24 6f cd 6b 53 ff a3 87 80 0a b8 8b | a0 96 5f 5a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d bc a1 51 aa 8f 7f ab dc e5 06 f0 | 38 bb 8c 63 92 8e b2 f3 00 00 00 1c 00 00 40 05 | c9 d4 4d 25 1c 7e db b6 b8 a8 68 63 26 d6 45 14 | b5 8e ec 75 | libevent_free: release ptr-libevent@0x7fb34c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a43dd0 | #71 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 1a 0e bc b8 89 e9 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #71 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #71 | rejected packet: | 95 1a 0e bc b8 89 e9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #71: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.066 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #97 | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #97 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #97 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49610.443193; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002968 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a43dd0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #97 | libevent_malloc: new ptr-libevent@0x7fb34c01d920 size 128 "road-eastnet-nonat-97" #97: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #97) | 7c 9c 8d d2 c5 3c 3b 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 98 e5 dd bd 5b c0 22 fb 24 a8 9d 4b ca 6c 72 | 78 61 7f 8f 02 15 b8 56 b3 c2 d4 89 90 42 e9 ae | b3 56 28 83 de be c5 dc f3 99 87 bf 7c 20 cf 1e | 80 26 a3 f6 7f d4 66 5c a2 37 d4 2d 88 37 5b ee | 37 eb f6 f3 73 47 4e f2 3e 1b de e1 36 54 bd 6f | 97 78 ce cb 16 0a da 34 fa 11 bc e7 e5 27 11 6b | 72 0d 9c de de 06 66 d8 74 64 a9 64 0b 12 b1 e7 | 15 84 3a 8c d9 6a d5 46 6c 00 4b f9 69 74 47 d1 | f3 79 bc d4 c9 0f 58 86 00 a5 0b 46 4c d7 20 78 | 99 ce 0d 0d cd 99 98 27 cc ce 50 e5 63 fc 25 ec | 4a 78 c1 76 a6 35 df cd 30 8a 57 10 1a b9 c6 85 | f5 05 46 77 76 2a ba 40 b5 da 98 c0 91 e5 03 c9 | 47 7d 79 56 d6 82 48 c6 a2 b4 f6 fc f6 16 30 98 | d9 b0 79 c5 33 a4 80 eb bb 99 51 9a 3b 3b ae a3 | 9b a3 5f 5f ce 23 78 fd 36 29 21 9b 24 8f 30 93 | 1f 0b 71 91 41 28 b6 d5 e2 dd ce 67 83 67 83 41 | 29 00 00 24 4a 40 88 f3 3a ca ff 58 9b 48 04 9a | a8 d0 f5 15 e8 12 b6 3b 4a 95 b2 73 79 da d4 a0 | df 94 6f b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 5b 76 c7 df cc 29 e7 8f 6d d6 7a | e3 d4 c1 e2 a2 33 fe 59 00 00 00 1c 00 00 40 05 | 63 90 91 6f c8 44 50 2a ff 12 5c 17 cd fa e6 2d | 07 cd 17 d6 | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #97 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 9c 8d d2 c5 3c 3b 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #97 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #97 | rejected packet: | 7c 9c 8d d2 c5 3c 3b 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #97: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0596 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a18370 | handling event EVENT_RETRANSMIT for parent state #19 | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #19 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #19 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49610.45351; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005871 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #19 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-19" #19: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #19) | 71 b7 8f 2a c9 ab 65 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 3e b3 71 5b 2a 7e 67 38 d7 ab 7a d2 03 90 2c | 27 b7 e6 d5 a7 20 27 79 5e 88 db 2d 02 14 e6 05 | 6f 07 f4 c1 2b 42 e9 2b 16 c7 24 00 68 97 23 09 | 9b 28 53 ba dc 36 46 57 40 1e 29 01 4a b7 49 a8 | 4d 9b c0 f6 6d 6c 59 7a d3 fe f7 05 02 d7 dc 3f | 33 37 fa 6e 66 82 3b 0b fc 41 01 e0 cf 12 33 b2 | a1 18 77 fd c8 36 dd ad 0b 8f 44 4a dc 2c 38 79 | 30 fa d4 bf 2a 29 27 db 37 30 a3 c6 e5 0f b5 2b | 3c 20 72 b8 f7 83 6c 1c 84 55 8f f3 1f 64 ae 19 | e5 47 9f 5e eb 0a e5 2c 75 55 6a e2 43 09 5c e9 | 24 9c 73 ae e6 a6 e7 07 f6 fe ad 11 3d af ab 94 | 47 55 a2 0e c7 5d 4b 0e 42 8f 1e 08 35 c6 12 3b | 76 58 3a e5 1d 69 62 62 bc c4 a4 b5 cb 6c d9 c9 | 2b 81 e2 3b e9 c6 13 78 c3 3f f3 38 91 f3 11 a1 | 04 e8 fa 3f 9f e8 f9 3d 60 98 07 62 99 3c 36 86 | 40 55 c7 f1 5a 42 4d 99 21 5e 58 f5 e4 8a cb d6 | 29 00 00 24 d1 01 c3 e5 0a d4 10 8b f6 20 25 e6 | de b5 f4 be cf de 7f f4 c1 d3 ec a5 70 52 4e 33 | 0b 30 f5 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 74 af f0 20 10 33 a5 14 d9 51 67 | 36 d9 37 b0 71 8d 2c dc 00 00 00 1c 00 00 40 05 | 0e 08 6a ae a9 27 97 90 41 13 4d a4 49 51 01 50 | a2 07 2e 34 | libevent_free: release ptr-libevent@0x7fb364017f20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a18370 | #19 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 b7 8f 2a c9 ab 65 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #19 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #19 | rejected packet: | 71 b7 8f 2a c9 ab 65 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #19: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34800d120 | handling event EVENT_RETRANSMIT for parent state #117 | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #117 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #117 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49610.463848; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501126 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #117 | libevent_malloc: new ptr-libevent@0x7fb364017f20 size 128 "road-eastnet-nonat-117" #117: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #117) | 4a b5 59 cb ed d6 a3 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 62 d1 99 4b 20 24 18 5d d2 31 2a 1c e6 82 aa | d2 1a 74 70 f8 1e f2 71 00 48 0a 80 0d 91 e6 e0 | e0 7b 66 1e 0f a2 c5 f3 2e cc 8d 72 40 de 7d 14 | e0 b7 d4 a2 80 96 97 77 ac ba 2b fb 1f 79 f2 32 | 8b a5 84 65 3d e1 3e 2e 60 82 26 3f 6d cf 4b 43 | 84 0b 96 d0 d5 70 61 64 4c 71 e0 b1 63 e8 0c 82 | 17 82 85 c0 c3 eb d9 cf 4e b8 f4 b1 87 57 e5 c1 | 06 2a d8 41 87 ab aa ec 3f f6 5e ac 9b 45 ab a8 | 0b e4 13 8d 76 0c 8c 2b 1f d4 61 19 ad 16 37 d8 | d0 65 3e 14 53 34 26 1a a6 5e 31 57 79 20 50 43 | 71 29 f3 4a 86 68 0e 08 74 59 1e 0f 6e 37 0c 10 | b2 e1 5f 52 67 c2 35 e3 ff 31 9d c5 bb 7f 45 96 | 61 58 38 40 0e b5 86 40 8f 24 ab 5a 52 cc 83 a1 | 23 61 7d 29 78 a8 96 57 13 15 75 48 5f 5a 5b 21 | 7b dd 4e 50 1d 23 67 01 84 5f f8 e7 69 4f 16 1a | 7e b5 9f 38 da 45 67 22 75 50 ab b6 62 cc cb 76 | 29 00 00 24 c3 7a 28 6c 12 59 4b e7 9f 08 e5 89 | 61 e9 dd c1 64 c5 cd 33 70 a1 b8 fb a5 4b b4 8c | 0b 78 ad a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 90 26 e7 b8 63 3c dc 5c 03 43 0c | 57 b3 5f a9 02 48 0a b5 00 00 00 1c 00 00 40 05 | 75 50 aa 52 d7 4b 1d bd 0c f6 2a 37 d5 af e8 8d | 12 a0 66 45 | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800d120 | #117 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a b5 59 cb ed d6 a3 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #117 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #117 | rejected packet: | 4a b5 59 cb ed d6 a3 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #117: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.07 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-125" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-125' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #125 at 0x557d46a7f400 | State DB: adding IKEv2 state #125 in UNDEFINED | pstats #125 ikev2.ike started | Message ID: init #125: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #125: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #125; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-125" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-125" IKE SA #125 "road-eastnet-nonat-125" "road-eastnet-nonat-125" #125: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-125 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-125": constructed local IKE proposals for road-eastnet-nonat-125 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 125 for state #125 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34800d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #125 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 | crypto helper 10 resuming | #125 spent 0.152 milliseconds in ikev2_parent_outI1() | crypto helper 10 starting work-order 125 for state #125 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 125 | RESET processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-125" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.252 milliseconds in whack | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 125 time elapsed 0.000754 seconds | (#125) spent 0.729 milliseconds in crypto helper computing work-order 125: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 125 for state #125 to event queue | scheduling resume sending helper answer for #125 | libevent_malloc: new ptr-libevent@0x7fb37c02a950 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #125 | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 125 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #125 | **emit ISAKMP Message: | initiator cookie: | f8 42 71 02 91 3f e5 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-125 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9f 9e 73 35 93 13 e2 cc 9b bb 37 d3 75 99 15 b9 | ikev2 g^x c8 4a ce 55 d3 69 e2 90 ce b4 49 6a 8b 41 15 d7 | ikev2 g^x f2 46 e0 27 62 0c f2 50 c4 fb 7a 1e 5f c1 57 37 | ikev2 g^x ab d6 7e 39 28 cf 50 b1 15 3d a6 21 69 94 78 9b | ikev2 g^x 54 78 01 d1 17 2e a1 fd 93 52 02 9b 3c fa 9a 7e | ikev2 g^x f8 6f 1b 35 4d b8 9a ab 6d e7 64 f6 f2 1a 64 ed | ikev2 g^x d4 92 58 2f 44 f7 44 27 44 49 1f 1e 22 3d 31 b1 | ikev2 g^x 50 2c 4d bf f2 3d 61 05 62 ba 25 68 46 81 35 68 | ikev2 g^x ee 83 cc 8e 2f 04 b6 7e f4 22 67 88 a2 a7 7a f7 | ikev2 g^x d0 39 1f 83 7d bc f9 79 5c 9d a8 05 2d 41 b5 ef | ikev2 g^x cc 86 a3 2b c2 79 2a 6d ea bc cb e6 b2 db 61 3a | ikev2 g^x 30 32 b0 ff 93 a0 20 c1 58 b9 6f 0c 98 fb c0 64 | ikev2 g^x d2 03 d7 d7 ac 87 bc 66 28 b7 cc 94 87 ea 24 29 | ikev2 g^x 58 cf 8f 26 39 81 cd e2 dc 0f e9 13 b2 ad b9 3b | ikev2 g^x 9a e1 c6 4a a2 fb 0d d5 e3 d1 b9 df 52 b9 c6 69 | ikev2 g^x 37 c0 e4 dc a2 a0 32 29 a3 ce 29 ec cc 5f 70 82 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 10 12 73 da 9a 48 c8 49 81 7a 15 0b 6c a0 98 5f | IKEv2 nonce 53 25 0d 7d 05 70 86 c7 7b b0 fa 34 5d 40 8d 1e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f8 42 71 02 91 3f e5 05 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7d | natd_hash: port= 01 f4 | natd_hash: hash= b4 88 74 d5 c4 71 1e 67 79 c5 82 86 3b ab 9f 01 | natd_hash: hash= a1 7f ec b6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b4 88 74 d5 c4 71 1e 67 79 c5 82 86 3b ab 9f 01 | Notify data a1 7f ec b6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f8 42 71 02 91 3f e5 05 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= cc 1e cf e5 ba 96 b4 e9 50 32 59 97 59 23 89 39 | natd_hash: hash= 4f 1c 94 28 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cc 1e cf e5 ba 96 b4 e9 50 32 59 97 59 23 89 39 | Notify data 4f 1c 94 28 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #125 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #125: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #125 to 4294967295 after switching state | Message ID: IKE #125 skipping update_recv as MD is fake | Message ID: sent #125 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-125" #125: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.125:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #125) | f8 42 71 02 91 3f e5 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 9e 73 35 93 13 e2 cc 9b bb 37 d3 75 99 15 b9 | c8 4a ce 55 d3 69 e2 90 ce b4 49 6a 8b 41 15 d7 | f2 46 e0 27 62 0c f2 50 c4 fb 7a 1e 5f c1 57 37 | ab d6 7e 39 28 cf 50 b1 15 3d a6 21 69 94 78 9b | 54 78 01 d1 17 2e a1 fd 93 52 02 9b 3c fa 9a 7e | f8 6f 1b 35 4d b8 9a ab 6d e7 64 f6 f2 1a 64 ed | d4 92 58 2f 44 f7 44 27 44 49 1f 1e 22 3d 31 b1 | 50 2c 4d bf f2 3d 61 05 62 ba 25 68 46 81 35 68 | ee 83 cc 8e 2f 04 b6 7e f4 22 67 88 a2 a7 7a f7 | d0 39 1f 83 7d bc f9 79 5c 9d a8 05 2d 41 b5 ef | cc 86 a3 2b c2 79 2a 6d ea bc cb e6 b2 db 61 3a | 30 32 b0 ff 93 a0 20 c1 58 b9 6f 0c 98 fb c0 64 | d2 03 d7 d7 ac 87 bc 66 28 b7 cc 94 87 ea 24 29 | 58 cf 8f 26 39 81 cd e2 dc 0f e9 13 b2 ad b9 3b | 9a e1 c6 4a a2 fb 0d d5 e3 d1 b9 df 52 b9 c6 69 | 37 c0 e4 dc a2 a0 32 29 a3 ce 29 ec cc 5f 70 82 | 29 00 00 24 10 12 73 da 9a 48 c8 49 81 7a 15 0b | 6c a0 98 5f 53 25 0d 7d 05 70 86 c7 7b b0 fa 34 | 5d 40 8d 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 88 74 d5 c4 71 1e 67 79 c5 82 86 | 3b ab 9f 01 a1 7f ec b6 00 00 00 1c 00 00 40 05 | cc 1e cf e5 ba 96 b4 e9 50 32 59 97 59 23 89 39 | 4f 1c 94 28 | state #125 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34800d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #125 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 | #125 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49610.476058 | resume sending helper answer for #125 suppresed complete_v2_state_transition() and stole MD | #125 spent 0.522 milliseconds in resume sending helper answer | stop processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c02a950 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 42 71 02 91 3f e5 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #125 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #125 | rejected packet: | f8 42 71 02 91 3f e5 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #125: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0668 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a30d30 | handling event EVENT_RETRANSMIT for parent state #72 | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #72 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #72 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49610.506264; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003088 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a18370 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #72 | libevent_malloc: new ptr-libevent@0x7fb37c02a950 size 128 "road-eastnet-nonat-72" #72: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #72) | 66 13 43 d6 1b b9 0c ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 b1 4f d1 eb 26 94 0a e8 d2 78 fe d2 e8 05 7d | 72 29 9f e5 e1 94 c3 7f a9 6a ca 75 12 4e 13 6e | e4 11 a5 e1 89 1e 08 5a 0d 5f 6b 49 0c e7 ba a3 | db 19 75 da a7 48 e8 e9 64 d4 80 8e 45 f5 82 09 | 04 17 24 14 78 b4 6e bb 71 57 6f 3e 18 4c d6 76 | a4 ec 50 14 2c c8 4e c9 04 89 23 f1 0a 7f 62 28 | 45 8e 70 27 19 66 b0 68 5f c8 be 34 a7 7e 02 24 | 87 3b ee fe 4b 57 85 64 69 04 b9 42 92 f3 d5 c0 | fe 76 05 b0 05 50 57 66 f6 f8 0b 76 74 c3 53 a1 | 05 f6 81 e4 08 d7 39 f0 53 40 e0 f4 aa 4c ff a6 | 90 72 89 fb 79 82 71 5c b3 e4 6d 43 97 e8 51 8b | ba 0a c8 eb e3 46 09 21 84 b9 ea ef 0d 8d d4 64 | 4c bf f8 b1 9c cd 8a 27 78 9c ef 52 df a6 5e b4 | 15 f4 af e2 3a 17 55 a8 8a cb 58 8c 66 bc a1 fb | 21 eb f8 38 a5 f6 b0 fd 47 53 aa ad 2e e9 17 ad | 29 40 34 3f b5 2c 48 93 29 5b c3 81 a9 9a f6 f7 | 29 00 00 24 d2 7d 93 13 5f e4 cd 1b 68 e9 96 b6 | 73 3d 25 76 63 d4 92 1a 4f 51 ac b1 63 90 04 8e | 34 c5 00 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c4 6c df 39 39 e8 cd 3f 26 eb f0 86 | 8a 8d 3e 3d 91 1f 2d ed 00 00 00 1c 00 00 40 05 | 4c 1b 62 1c 4c 06 92 d2 01 38 c8 0e 4f 7e fd bc | 86 e6 84 ff | libevent_free: release ptr-libevent@0x7fb37800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a30d30 | #72 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 13 43 d6 1b b9 0c ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #72 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #72 | rejected packet: | 66 13 43 d6 1b b9 0c ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #72: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46906b40 | handling event EVENT_RETRANSMIT for parent state #110 | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #110 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #110 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49610.511565; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001791 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a30d30 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #110 | libevent_malloc: new ptr-libevent@0x7fb37800cf80 size 128 "road-eastnet-nonat-110" #110: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #110) | 3a df d4 0d 3f 72 b9 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 51 e2 9f 86 58 b1 8c 95 ac 68 08 4c 4a f6 70 | ad a1 89 82 51 9f 97 f7 49 8c 33 6b 14 6a e8 d8 | 5d 56 92 c8 3c 2c 40 17 32 2d 8f e8 79 30 ee 40 | f9 ba 9e a6 39 a8 9f 6a 60 30 36 fa 91 73 4e bf | e6 d5 bf ce 9d 89 72 4d e1 c3 4f 68 a3 0e 2d 22 | 55 9f 70 0b d2 5a 8e 49 bb 26 55 db 7b 06 39 59 | 26 09 73 11 d4 24 0c 12 fd 4f 4c 65 6c 3c af 90 | 8b 17 1f a8 52 96 38 96 91 03 13 81 89 15 d8 cf | 89 39 0b 98 8d cb b9 22 57 8d d7 cd 73 bd 42 b5 | c1 8a b1 55 88 ee 90 bf 86 98 c5 68 56 01 34 02 | ea ea cd ee 0d 3a 71 7c d0 06 82 a7 ca 34 05 ec | e1 16 4c 22 f3 b3 ca 01 1c d1 2d c9 10 65 0e d7 | 83 4d bc 53 a1 a2 68 8a 44 da c7 16 6f 1e 28 70 | e8 f3 08 87 27 18 70 75 bc 4e bd 4f 1d 1a 9f 84 | ef 78 e6 04 c6 13 ce e5 f8 3c cb 1e ba 12 8a 0a | 59 36 fd 3c 70 1f 1b ce d5 b3 7d ea 00 09 cd 9d | 29 00 00 24 58 d9 16 9f 6f 84 74 3f e6 2f bd ae | 97 8a 68 2c 39 11 78 2c 3d 3c 5e 7b f6 a4 c9 df | f7 87 68 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f6 22 5f bf 4c e5 cb 6e 52 c3 e8 | bb 73 1b e3 52 cd b5 da 00 00 00 1c 00 00 40 05 | 55 f2 83 9d d0 ff 8f 70 ef 45 0c 6f 49 6d a9 68 | 5e 51 a7 34 | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46906b40 | #110 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a df d4 0d 3f 72 b9 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #110 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #110 | rejected packet: | 3a df d4 0d 3f 72 b9 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #110: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #118 | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #118 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #118 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49610.52484; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501095 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46906b40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #118 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 "road-eastnet-nonat-118" #118: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #118) | 8e a7 a4 7e e9 0a bc a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a ec c5 01 c5 e9 b5 94 ac 43 67 db 08 47 bd 0c | 54 49 81 74 3a 3b f9 51 2c 6b 48 98 c1 d5 7c ee | 4b 95 1c 5e 71 e6 0b 08 a0 85 de c0 1d ef b9 d0 | 5c f8 32 2b 5d f8 44 47 b6 dc c5 4b 50 10 f9 77 | 99 80 83 bc 5c bf 6a 79 a5 41 39 97 c6 b0 17 4c | 84 d1 fa 16 7a 7a 3e e5 51 2d fc 5d b0 66 e1 6f | 66 c6 ed f3 a4 54 56 06 ac 5d ee b2 4b 4a 38 5f | aa 09 29 91 e5 8c 9b 64 60 8e 7c f6 86 7a 07 43 | f1 93 d1 26 4a 28 da b7 0c a1 1a 0c 4c d6 c5 1f | ee f5 92 b2 e4 15 93 35 4c 07 88 be ec 21 4e 23 | f9 ed 56 db b0 43 b1 c7 7d 57 a1 20 bb 88 d2 9a | 23 9e be ef e2 0d b6 dc 67 12 32 69 0b ef 17 5f | 45 8b bf 08 ff c1 84 fb d6 41 58 81 ba c4 68 e8 | 6d 5c 50 c4 fa 14 2d 1e b6 d3 3f da 53 ee 59 40 | e0 c2 e3 5e 46 f4 96 f5 35 c7 87 50 c6 81 32 4e | 30 f8 e6 fa a0 f5 a3 88 f0 51 68 02 71 eb f4 fa | 29 00 00 24 fc fa 6f 0b ed d7 fd 9b f1 eb 70 56 | 1f a0 0f 98 c6 28 ab da a8 c2 09 53 33 ea a7 33 | 5c 74 50 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e 87 94 32 ac f3 4e 0f e0 49 b5 2d | ec 68 6c 45 41 83 dc 40 00 00 00 1c 00 00 40 05 | e8 e9 7b b7 56 9d 8b dd 59 77 e6 95 c2 ea 88 7c | d5 64 a3 dc | libevent_free: release ptr-libevent@0x7fb35c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #118 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e a7 a4 7e e9 0a bc a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #118 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #118 | rejected packet: | 8e a7 a4 7e e9 0a bc a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #118: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0774 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3fc10 | handling event EVENT_RETRANSMIT for parent state #98 | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #98 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #98 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49610.528222; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004105 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #98 | libevent_malloc: new ptr-libevent@0x7fb35c01d920 size 128 "road-eastnet-nonat-98" #98: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #98) | 36 f6 17 30 89 34 87 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e de 22 15 b8 37 99 8a 19 60 74 d9 cc fb 93 74 | 46 52 5b 4c b2 15 42 20 b8 92 87 ba 2d f3 d7 43 | b5 37 b0 ea 4d f5 7a 45 62 c7 3f 47 fb 44 64 d3 | e1 f9 e0 4b e7 fb 3e 3d b1 04 53 7b 67 35 99 55 | 77 f9 c2 de 1c 5e 4e 46 02 3b e5 0c e9 31 90 64 | 6e cb e0 dd 1a 59 99 ef 3d a7 c1 9b 74 f9 45 3f | 99 cd de c7 d0 13 5f 2b 11 ac cd ff c9 47 2e 86 | 69 0d e8 ec 31 64 37 7f 01 74 30 f7 db 0e d0 fb | 8b 6d 9d cc 98 7f 1a b4 87 7d bf 2e 19 53 89 24 | 00 4f 0a 93 5d 06 c9 01 d3 dd 9f 4d 48 ee ba 48 | 79 5c 5f f3 cb 01 ba a7 ec 71 ed fd 64 af 41 a6 | ff 80 dd aa 0c ae 06 5c 0b a3 1c 56 84 5b 6c 26 | fd ff b3 07 94 15 1d 68 35 03 8e 60 07 84 12 f9 | ee d9 d1 91 a2 f4 75 f6 9e 29 11 0a 54 bc 2f 41 | 2c ea 22 ab ab 32 6a 0c 62 23 b1 4a 4b 29 bb 22 | de a9 03 f4 17 e0 39 72 79 31 e0 0a 30 fa 14 a0 | 29 00 00 24 dc e2 b9 cb c5 4c 15 ab 06 6c 97 a6 | 72 6b 55 8f 7d 14 aa 13 19 ae 9e 9d 27 a3 3a 17 | 86 0f 7c a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 94 a8 82 2a 1f 7d 1b 29 07 9f 80 | 75 97 d7 a2 ab 24 e8 8d 00 00 00 1c 00 00 40 05 | b8 4f 85 79 77 db f6 74 dd c9 e6 fd e8 91 c3 41 | 66 c0 f7 3b | libevent_free: release ptr-libevent@0x7fb34001a190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3fc10 | #98 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 f6 17 30 89 34 87 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #98 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #98 | rejected packet: | 36 f6 17 30 89 34 87 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #98: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350005860 | handling event EVENT_RETRANSMIT for parent state #20 | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #20 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #20 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49610.538904; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006047 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3fc10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #20 | libevent_malloc: new ptr-libevent@0x7fb34001a190 size 128 "road-eastnet-nonat-20" #20: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #20) | 2a d8 6a 5c 08 dc 68 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad 76 8b c3 8a cd 7e 81 09 43 af dc 84 86 57 86 | ac 01 81 74 96 d6 08 70 58 d2 f7 10 2a f2 1e 9d | b0 95 95 b3 32 1e e8 01 5c d2 e7 39 14 67 2f fd | 6f cc fb 0b 1d bd c7 ac 37 fb c6 6d e0 84 f8 c8 | 00 c1 d6 0f 3b e2 a7 4b 51 a3 13 bb 3d f4 c2 99 | 9b 84 74 df c2 bf fa 13 e4 2a f9 e8 2d 4c 6c c5 | 8d e3 52 85 e9 f8 18 fc 4b 38 b9 82 e0 ab 65 b7 | ae a5 89 3c 88 ee 05 34 a9 d7 52 0c 03 2e a9 7e | e2 c7 7b c9 35 8f e6 9e 0b 55 49 71 ce bd 37 1f | 22 8f 48 76 19 75 9b c0 7a 62 4e 51 77 02 d7 bf | e0 ea 0a 67 41 41 2e 98 4f f3 cf 32 f2 ae 82 83 | 1f 56 7c 33 17 50 fa 76 01 41 f1 ba 05 90 db bd | 83 b9 cd 1b b8 6e f3 33 72 7e 47 f3 20 71 8f e7 | ec 91 f3 37 6a 94 11 a2 55 f0 09 1c 76 98 cd 56 | 66 be 33 43 a6 1c f5 8b 31 c4 e3 0a 7b 29 cc 17 | 3f 13 b8 73 4c 86 e0 b0 2a 03 32 6a 19 82 cb a2 | 29 00 00 24 47 97 3a 6f 12 05 22 fe fb dc 3c 25 | ff 91 0d 7a c8 4c ac f8 1f 7e d1 5f 41 39 e3 39 | e8 aa 43 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f 67 98 f7 05 c6 ee 5e 5b 5f e2 fa | ee a5 ba af 57 96 46 d2 00 00 00 1c 00 00 40 05 | 3e ef c3 bb 3d a5 88 fb 9f 3c 53 fd 3b c9 ea 45 | 6f 53 bd 02 | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350005860 | #20 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a d8 6a 5c 08 dc 68 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #20 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #20 | rejected packet: | 2a d8 6a 5c 08 dc 68 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #20: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-126" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-126' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #126 at 0x557d46a809c0 | State DB: adding IKEv2 state #126 in UNDEFINED | pstats #126 ikev2.ike started | Message ID: init #126: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #126: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #126; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-126" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-126" IKE SA #126 "road-eastnet-nonat-126" "road-eastnet-nonat-126" #126: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-126 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-126": constructed local IKE proposals for road-eastnet-nonat-126 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 126 for state #126 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb350005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #126 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 | crypto helper 14 resuming | crypto helper 14 starting work-order 126 for state #126 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 126 | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 126 time elapsed 0.000951 seconds | (#126) spent 0.959 milliseconds in crypto helper computing work-order 126: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 126 for state #126 to event queue | scheduling resume sending helper answer for #126 | libevent_malloc: new ptr-libevent@0x7fb37002a950 size 128 | crypto helper 14 waiting (nothing to do) | #126 spent 0.156 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-126" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.255 milliseconds in whack | processing resume sending helper answer for #126 | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 126 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #126 | **emit ISAKMP Message: | initiator cookie: | e8 37 9e 74 e5 40 14 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-126 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9f 2e 1b 05 80 5b 31 08 d1 66 2e 5c f6 e3 82 b6 | ikev2 g^x cf 5f b9 6a dd 55 f8 75 d5 3d b8 5c bd 4f c2 50 | ikev2 g^x 0a c1 a5 ba ac d3 ed a9 a2 26 e9 cf 5d c3 e4 66 | ikev2 g^x fe 0f 85 c2 a3 49 2f d8 4a 79 55 9a fa 0f f5 79 | ikev2 g^x a1 74 22 f0 7e 0f 09 7b 62 ab a2 9e b4 ea 39 68 | ikev2 g^x 42 b2 f9 25 9e 6d 73 5b 0f 09 1e ea 93 29 57 3e | ikev2 g^x 0b 28 34 22 62 d9 38 bd 99 bc 2b d5 1f 39 74 2e | ikev2 g^x a0 e4 e1 6b 64 87 fc 4f 05 cf 11 87 31 49 19 0e | ikev2 g^x 81 e6 fe 59 5e 93 b2 b8 96 16 02 eb 5c 73 68 d5 | ikev2 g^x 8f 57 c4 c3 f1 4b 35 e7 45 9d 6f ab 95 16 38 da | ikev2 g^x 48 f9 98 9a 6a b3 e3 05 7e d3 b1 16 a3 ba 0c e1 | ikev2 g^x 94 2d b8 d2 c3 17 d4 a2 cf ba 7e e1 17 95 db f9 | ikev2 g^x 30 a3 18 b6 15 c5 b0 4b 3c 79 61 0d 1e 89 51 db | ikev2 g^x 9f 34 0b 87 9c ce 8f 37 05 a4 88 d5 17 64 46 6f | ikev2 g^x 94 21 dd 40 17 99 04 39 5f 44 53 61 87 2c 68 27 | ikev2 g^x 48 25 14 cc 6b a9 f6 c2 49 c7 4e ae 4c 5d 8d 5b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d1 b1 6b 78 78 5e 9b dd d4 c3 b9 87 6c a1 e5 10 | IKEv2 nonce d6 78 32 5b 72 67 12 c8 56 ea b2 20 83 0f e6 67 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e8 37 9e 74 e5 40 14 03 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7e | natd_hash: port= 01 f4 | natd_hash: hash= 02 48 05 b5 88 11 05 1e fc 96 b7 8b c4 84 87 55 | natd_hash: hash= 48 6d 71 7e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 02 48 05 b5 88 11 05 1e fc 96 b7 8b c4 84 87 55 | Notify data 48 6d 71 7e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e8 37 9e 74 e5 40 14 03 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a7 78 89 b5 72 dc 59 97 b9 1b 86 02 9b 2c 28 d0 | natd_hash: hash= 8e b7 7c 05 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a7 78 89 b5 72 dc 59 97 b9 1b 86 02 9b 2c 28 d0 | Notify data 8e b7 7c 05 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #126 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #126: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #126 to 4294967295 after switching state | Message ID: IKE #126 skipping update_recv as MD is fake | Message ID: sent #126 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-126" #126: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.126:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #126) | e8 37 9e 74 e5 40 14 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 2e 1b 05 80 5b 31 08 d1 66 2e 5c f6 e3 82 b6 | cf 5f b9 6a dd 55 f8 75 d5 3d b8 5c bd 4f c2 50 | 0a c1 a5 ba ac d3 ed a9 a2 26 e9 cf 5d c3 e4 66 | fe 0f 85 c2 a3 49 2f d8 4a 79 55 9a fa 0f f5 79 | a1 74 22 f0 7e 0f 09 7b 62 ab a2 9e b4 ea 39 68 | 42 b2 f9 25 9e 6d 73 5b 0f 09 1e ea 93 29 57 3e | 0b 28 34 22 62 d9 38 bd 99 bc 2b d5 1f 39 74 2e | a0 e4 e1 6b 64 87 fc 4f 05 cf 11 87 31 49 19 0e | 81 e6 fe 59 5e 93 b2 b8 96 16 02 eb 5c 73 68 d5 | 8f 57 c4 c3 f1 4b 35 e7 45 9d 6f ab 95 16 38 da | 48 f9 98 9a 6a b3 e3 05 7e d3 b1 16 a3 ba 0c e1 | 94 2d b8 d2 c3 17 d4 a2 cf ba 7e e1 17 95 db f9 | 30 a3 18 b6 15 c5 b0 4b 3c 79 61 0d 1e 89 51 db | 9f 34 0b 87 9c ce 8f 37 05 a4 88 d5 17 64 46 6f | 94 21 dd 40 17 99 04 39 5f 44 53 61 87 2c 68 27 | 48 25 14 cc 6b a9 f6 c2 49 c7 4e ae 4c 5d 8d 5b | 29 00 00 24 d1 b1 6b 78 78 5e 9b dd d4 c3 b9 87 | 6c a1 e5 10 d6 78 32 5b 72 67 12 c8 56 ea b2 20 | 83 0f e6 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 48 05 b5 88 11 05 1e fc 96 b7 8b | c4 84 87 55 48 6d 71 7e 00 00 00 1c 00 00 40 05 | a7 78 89 b5 72 dc 59 97 b9 1b 86 02 9b 2c 28 d0 | 8e b7 7c 05 | state #126 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb350005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #126 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 | #126 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49610.552334 | resume sending helper answer for #126 suppresed complete_v2_state_transition() and stole MD | #126 spent 0.471 milliseconds in resume sending helper answer | stop processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37002a950 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 37 9e 74 e5 40 14 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #126 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #126 | rejected packet: | e8 37 9e 74 e5 40 14 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #126: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c00d120 | handling event EVENT_RETRANSMIT for parent state #73 | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #73 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #73 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49610.57754; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004384 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7b910 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #73 | libevent_malloc: new ptr-libevent@0x7fb37002a950 size 128 "road-eastnet-nonat-73" #73: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #73) | 1b d1 f7 22 4f 1d be c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 17 af cb 15 dc ab b1 a5 7f 34 62 4e 0f 28 9a | 18 48 48 5b 8a 7c 0e f9 96 fe 06 d5 63 de 59 f8 | 49 35 b4 79 b1 9f 27 0d e0 5d f1 56 f3 be 3d 0b | 2c 98 27 ba b0 9f 63 a4 e7 98 a1 c0 ce b7 fa 57 | bc af 56 22 b4 0b 08 17 91 1f 28 fd 21 7d b9 47 | be 94 09 11 9d 2a ae 62 55 90 ec cd fb 6d 33 53 | dc 6e 16 d9 31 7b 9a c8 fd c1 75 61 52 f6 98 91 | 94 9a f3 05 36 de 11 ce 66 87 ce 7a d3 f8 fd 04 | 0b ba 01 fd 05 22 ef 85 db 52 65 4a 74 05 92 71 | be df ba dc 65 01 21 6c d5 86 65 2b 9a e5 83 35 | a5 c8 2d 49 2e 69 13 a9 18 d4 42 31 7e 26 5b 88 | 7c 6f cd 46 42 cb fc 6c 40 14 2b 57 0e e7 97 72 | 5b db 5d 77 72 cd 54 3e 63 fa 42 39 c6 a7 84 0d | 90 25 f3 6f 23 cf 8e 04 75 0a 41 85 e3 ef 88 28 | 25 3f 56 c1 9a ec 95 fb a0 fa ac 95 ac 16 97 71 | 2e b2 fb 1e 8b 8f a8 12 b2 0a 1f 31 5e c4 d7 fa | 29 00 00 24 93 de fa 16 34 ae c4 6f 1c b0 6f ba | 95 0e 80 10 81 5f 54 52 00 a9 bf 63 44 18 a5 30 | 6d af 4e 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 5e 43 5b b5 69 a0 f9 16 98 c0 46 | f4 de 55 67 f2 0c 20 b2 00 00 00 1c 00 00 40 05 | 50 cf 48 cc c9 4e 77 06 66 f1 57 3b 42 c0 94 82 | a3 eb c2 6e | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c00d120 | #73 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b d1 f7 22 4f 1d be c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #73 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #73 | rejected packet: | 1b d1 f7 22 4f 1d be c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #73: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0676 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cc10 | handling event EVENT_RETRANSMIT for parent state #111 | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #111 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #111 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49610.580891; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001487 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #111 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 "road-eastnet-nonat-111" #111: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #111) | db b9 51 1a 0a cf 53 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 96 48 dc 9a 43 6a d5 ae 03 52 b4 84 8e 3e 89 | 00 f6 64 fe 26 5b b6 db 11 e1 9c 06 8a 4f 1d 0d | cd 6f a7 c8 64 23 7a a7 23 6f 45 51 c6 b1 a2 cd | 04 59 b4 88 b4 33 b7 f5 29 c7 d8 52 6d 1c cb a8 | 42 75 af 22 25 ca 35 12 a4 f6 ac 0c 2b 80 3f 01 | bd fa ce f1 3e 58 78 41 9a d7 72 cc 7c 4c b5 a2 | 56 ce 00 40 9d 2a 87 6a d3 b8 b7 fb 45 19 d9 27 | 33 38 86 30 4d 76 55 5a 60 ea 7e 6f 94 b2 e8 37 | d0 79 a6 3c 48 bb 9f d4 de 11 46 70 8b ed 34 0e | 15 56 a1 c3 7c 1c f5 7b 9a 67 eb 7c ed e1 17 20 | 66 f5 ab 00 0b 09 22 9e 86 9e ea d1 22 bb 69 09 | 19 11 1b ae 5d 6f a7 6f aa f4 bc 2d bf a0 df 13 | 3d bb c4 b2 54 23 e0 47 22 8c a9 37 14 2d 77 13 | 46 7b e2 07 7c 12 26 7e 27 76 b7 f9 5b 81 4d b4 | 81 97 8e fa 60 cb 4d fd c3 c9 15 c0 dd 03 c9 a5 | 4e ed a7 b5 aa a5 47 31 bc c5 72 e4 a7 3b 8a 6d | 29 00 00 24 dd ff c8 1b e8 28 de a6 83 fb aa 57 | 7e 6e 8e c5 12 ea 53 ce c6 ab e5 e4 50 89 14 5a | d7 45 05 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 7b fa 07 36 ff 6e 35 97 9c d7 f0 | 58 a3 9d ce 15 df 78 68 00 00 00 1c 00 00 40 05 | 32 ea 3f b0 b0 6d 1e bd 58 89 67 45 00 2c 5a 38 | ea f9 ac 8b | libevent_free: release ptr-libevent@0x7fb3780180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cc10 | #111 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db b9 51 1a 0a cf 53 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #111 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #111 | rejected packet: | db b9 51 1a 0a cf 53 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #111: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0675 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #119 | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #119 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #119 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49610.584703; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500376 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #119 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 "road-eastnet-nonat-119" #119: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #119) | ec af 1e 58 4f bc 16 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee 25 46 13 3c ef fe 01 ba 63 b1 50 ca a7 dd f5 | 7a b0 49 43 35 e3 74 57 d0 52 bc 3a b2 ee 6b 2d | 57 80 2f df 71 ea 94 b3 0a 0c 7b 41 50 c2 f6 7a | 6e 96 5b 3d 0d 51 9a 0b a0 fa d0 8d d8 98 f0 45 | d5 fa eb 0a f5 ea 33 8d ee 1d 3f cb 09 35 dc f7 | 0d a7 89 25 f9 a6 f9 a3 0f 9a 3d b0 bb 98 db 2a | 8f f4 ad 7f 6a ae b3 bd df 23 e8 8d 52 72 79 9f | 3d 34 85 f2 e2 b4 d7 cc 39 ee a0 dc 64 4f fa 2a | a9 30 c6 c2 7a 7a 1d cd 26 c0 0f 55 58 ed 9d 22 | c6 a1 9c 81 01 bd 16 3d 36 47 70 a1 46 0d 07 ca | 5c 2f 9d 3c 24 d8 e7 19 57 44 18 a0 58 ed b0 c8 | 65 f2 98 6e 64 04 01 87 4d c3 6e 78 76 c5 fa ee | ff 60 94 9e 6a fc 5b 5e 1a 15 3a a6 4d fe ba 28 | 39 70 2d 49 9e b7 11 89 3d 89 a8 26 59 f3 51 ef | 05 36 27 99 84 62 16 13 24 49 d2 7d b9 18 a2 21 | 0f 0d 2a 9a 79 02 d0 e1 a1 af ee 7c 84 e5 76 9a | 29 00 00 24 93 ff 34 01 41 de 6e 58 b7 82 d5 c2 | 8a 60 ef 17 fc 48 d2 4e 23 80 6e 54 cf 7a 62 03 | 64 73 a8 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 43 1b c4 4b b2 17 2e 38 4e 57 6d | 6b 77 1d 82 1a c2 9c 87 00 00 00 1c 00 00 40 05 | f7 09 55 f2 00 b0 ce 9f d1 9c 54 d7 51 50 ae 6b | e8 b4 0e d9 | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | #119 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec af 1e 58 4f bc 16 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #119 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #119 | rejected packet: | ec af 1e 58 4f bc 16 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #119: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61c10 | handling event EVENT_RETRANSMIT for parent state #99 | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #99 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #99 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49610.623065; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003236 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #99 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 "road-eastnet-nonat-99" #99: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #99) | 20 f2 8d 71 65 ac 47 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 55 64 d8 ad 81 88 80 21 0e 25 1a b1 6c d3 13 | 60 47 54 9f 37 b3 3b e4 ef 17 20 61 85 67 62 f1 | 02 df 28 57 14 6d e3 be a6 7d d0 60 0f d8 35 56 | 23 d8 87 e9 4a f8 7b 29 e9 15 5f 82 0d 90 dd 56 | 5d 5a 2c 1a fd 14 77 42 8f 36 df a6 c7 9c d4 1a | 4f 67 c2 2e a6 a1 f6 1c 58 4b f8 cb b3 cd ce 08 | 48 62 dd 58 41 3a 14 29 9a 8c dd db 6a 06 47 a4 | 6c b7 ae b7 e4 5d db e5 9d e5 08 8e 17 5b 65 be | 17 aa 8e 73 be 9c 01 fb 31 11 79 f8 7d b5 ee ca | 7b e0 59 52 95 92 4d d8 40 43 34 f1 14 b9 84 18 | 60 68 b3 da 39 48 0e 5b 21 3c 0f 30 5d 85 b9 b8 | 1e e9 36 ff 36 9e aa 51 52 b1 5e 1d 27 fe 89 5d | cd 1e 0d 8d d6 a1 c3 a1 84 3f ea 32 11 45 0d 67 | 3f e2 4b 56 64 56 35 98 b6 f3 83 f0 90 30 0e 75 | b7 c7 9b 32 1d 5c 5f 2d d9 a9 92 93 d5 c6 6e 2b | ba f3 5c d6 20 4b dd 47 18 da e4 05 c0 7c 3e d8 | 29 00 00 24 0e 55 53 da 51 ef 9c 5f c5 b0 f0 9b | 78 63 11 53 43 43 64 d7 34 99 64 b7 14 ad 81 b4 | bb 55 f4 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 cf c4 07 93 b6 10 89 13 8b 25 5a | 5c dd 08 90 5b 56 28 b0 00 00 00 1c 00 00 40 05 | 9d 1e cf 39 e1 37 a4 6a 40 83 a9 41 54 1a 0d 5f | 91 61 32 ea | libevent_free: release ptr-libevent@0x7fb36801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61c10 | #99 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 f2 8d 71 65 ac 47 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #99 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #99 | rejected packet: | 20 f2 8d 71 65 ac 47 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #99: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.066 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5f0d0 | handling event EVENT_RETRANSMIT for parent state #112 | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #112 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #112 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49610.641398; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001592 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61c10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #112 | libevent_malloc: new ptr-libevent@0x7fb36801d920 size 128 "road-eastnet-nonat-112" #112: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #112) | 47 d5 03 db 13 27 2f b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 0e 6c 25 08 df e6 da 49 14 54 03 50 04 cf 48 | 95 75 ae 2d bc 03 6f 48 b8 d7 01 38 b0 30 90 fc | ff e3 c7 81 96 6b 61 34 0c 60 d4 12 f5 e2 2d fc | 51 c2 f0 8d 66 50 fb 99 8e e7 b2 7a 6c 96 47 68 | b2 95 cc 13 0e 51 31 7d 67 b6 95 35 7a 36 fb 65 | 99 b0 0f 89 29 13 5d 90 12 37 2d 11 35 2d b1 44 | 94 62 9d e9 25 b3 9d a0 a4 a6 21 f1 2f 1e cd 7c | e1 45 a8 9a 87 d2 53 e3 a2 32 e1 24 cf d4 84 b6 | d5 f2 14 94 09 c7 86 4b f6 5c 13 c3 cd 16 8e 96 | 09 f6 db 84 7c 68 6c 48 a7 94 92 3a 1f dd 75 5e | 2c 36 f1 6f 81 03 42 93 73 6d a8 a1 de b3 ee 78 | 53 dc 84 4e 49 9c c8 3c d2 8e 9e 10 6c e7 28 b0 | 11 a3 fb e6 6e 4d e5 e0 87 56 00 b9 8b bd 7a 34 | c7 01 93 2c df ea 24 e3 c0 b7 3c 4f 9c fd 99 11 | 44 90 bc 5c 8f 0c c6 10 b3 66 24 ea 61 81 fc 7a | 33 5f 5b b7 cd 2f 8e 95 d1 b4 0b d4 4c f2 ce 45 | 29 00 00 24 e0 34 a3 40 45 a9 39 5f c9 a9 a0 f5 | 90 bc 5f 96 21 2e 5a ab 31 ef 27 59 8c 9d b8 53 | c4 51 4a f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 19 b7 b4 22 31 1f 00 af ac cd cc | 10 5d a8 e7 0a 7e 75 3d 00 00 00 1c 00 00 40 05 | 93 2a 52 65 d2 92 1c 7e fa c3 8c df bd 81 85 07 | 8f 9c 4c 85 | libevent_free: release ptr-libevent@0x7fb37c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5f0d0 | #112 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 d5 03 db 13 27 2f b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #112 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #112 | rejected packet: | 47 d5 03 db 13 27 2f b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #112: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-127" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-127' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #127 at 0x557d46a81f80 | State DB: adding IKEv2 state #127 in UNDEFINED | pstats #127 ikev2.ike started | Message ID: init #127: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #127: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #127; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-127" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-127" IKE SA #127 "road-eastnet-nonat-127" "road-eastnet-nonat-127" #127: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-127 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-127": constructed local IKE proposals for road-eastnet-nonat-127 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 127 for state #127 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a5f0d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #127 | libevent_malloc: new ptr-libevent@0x7fb37c0251c0 size 128 | #127 spent 0.147 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 resuming | RESET processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-127" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 15 starting work-order 127 for state #127 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 127 | spent 0.235 milliseconds in whack | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 127 time elapsed 0.000827 seconds | (#127) spent 0.834 milliseconds in crypto helper computing work-order 127: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 127 for state #127 to event queue | scheduling resume sending helper answer for #127 | libevent_malloc: new ptr-libevent@0x7fb37402a710 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #127 | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 127 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #127 | **emit ISAKMP Message: | initiator cookie: | 63 d9 7e 94 07 33 4b 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-127 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 29 5b 4a 46 df 60 33 0f 95 de e0 db c8 23 3c 72 | ikev2 g^x 78 4a 11 2d af 6a 95 71 57 bb 1d b2 0d c1 6e 56 | ikev2 g^x 18 59 e0 13 b5 5d 90 db b2 9a 12 87 33 39 67 e9 | ikev2 g^x 2a 2f bf ff 22 ca 7b ca ba cd 4e 56 00 bb 9c b4 | ikev2 g^x 81 b8 dd 6f 82 ec c7 49 d2 fc 91 38 84 1c a6 e9 | ikev2 g^x d6 e7 21 dd e8 11 d8 38 94 4d 8d 43 29 97 aa c4 | ikev2 g^x 81 24 9f fc d5 c9 48 0f a7 fe 34 f9 6d 30 3e 1f | ikev2 g^x 7a 4f f5 5e d9 cc da 01 80 42 b1 dc 13 04 fb 2f | ikev2 g^x cb ae 40 53 b9 7a ac 75 1a e1 0f 4b 6c 39 b0 ff | ikev2 g^x 2b d7 8e 64 87 22 57 2b a9 3e db 52 7f 0f 13 61 | ikev2 g^x 69 1f 61 e7 d0 1e 23 3d f6 9d 28 2b 3f e5 f0 23 | ikev2 g^x 95 70 12 d6 55 37 d1 5b 40 5e db 9b 46 bb 6c 24 | ikev2 g^x 88 d7 92 17 91 7b 88 03 03 b9 b9 93 f8 4d f8 75 | ikev2 g^x f3 71 3b 2a a2 b6 bc ae e3 8d ee 63 ed ee d1 97 | ikev2 g^x a9 a0 39 37 70 8d 13 eb 74 48 45 78 0b 87 f6 b1 | ikev2 g^x 15 7d 71 1f 58 45 48 e4 7a 5a b6 44 5f 0b 02 01 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 18 52 6f 35 05 34 eb 05 2a 3b d4 f4 de e8 63 2a | IKEv2 nonce a6 7a 78 01 4b 37 13 8c b7 e1 00 ae 6b 38 e3 25 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 63 d9 7e 94 07 33 4b 41 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7f | natd_hash: port= 01 f4 | natd_hash: hash= 41 57 41 80 41 67 da fb a0 6b fa cf 8b d9 9a b2 | natd_hash: hash= 68 5d 7b 8a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 41 57 41 80 41 67 da fb a0 6b fa cf 8b d9 9a b2 | Notify data 68 5d 7b 8a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 63 d9 7e 94 07 33 4b 41 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f9 e3 24 ce 79 a6 67 62 c8 57 cc ee 7e 1e 81 c5 | natd_hash: hash= 41 7c 30 2d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f9 e3 24 ce 79 a6 67 62 c8 57 cc ee 7e 1e 81 c5 | Notify data 41 7c 30 2d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #127 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #127: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #127 to 4294967295 after switching state | Message ID: IKE #127 skipping update_recv as MD is fake | Message ID: sent #127 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-127" #127: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.127:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #127) | 63 d9 7e 94 07 33 4b 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 5b 4a 46 df 60 33 0f 95 de e0 db c8 23 3c 72 | 78 4a 11 2d af 6a 95 71 57 bb 1d b2 0d c1 6e 56 | 18 59 e0 13 b5 5d 90 db b2 9a 12 87 33 39 67 e9 | 2a 2f bf ff 22 ca 7b ca ba cd 4e 56 00 bb 9c b4 | 81 b8 dd 6f 82 ec c7 49 d2 fc 91 38 84 1c a6 e9 | d6 e7 21 dd e8 11 d8 38 94 4d 8d 43 29 97 aa c4 | 81 24 9f fc d5 c9 48 0f a7 fe 34 f9 6d 30 3e 1f | 7a 4f f5 5e d9 cc da 01 80 42 b1 dc 13 04 fb 2f | cb ae 40 53 b9 7a ac 75 1a e1 0f 4b 6c 39 b0 ff | 2b d7 8e 64 87 22 57 2b a9 3e db 52 7f 0f 13 61 | 69 1f 61 e7 d0 1e 23 3d f6 9d 28 2b 3f e5 f0 23 | 95 70 12 d6 55 37 d1 5b 40 5e db 9b 46 bb 6c 24 | 88 d7 92 17 91 7b 88 03 03 b9 b9 93 f8 4d f8 75 | f3 71 3b 2a a2 b6 bc ae e3 8d ee 63 ed ee d1 97 | a9 a0 39 37 70 8d 13 eb 74 48 45 78 0b 87 f6 b1 | 15 7d 71 1f 58 45 48 e4 7a 5a b6 44 5f 0b 02 01 | 29 00 00 24 18 52 6f 35 05 34 eb 05 2a 3b d4 f4 | de e8 63 2a a6 7a 78 01 4b 37 13 8c b7 e1 00 ae | 6b 38 e3 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 57 41 80 41 67 da fb a0 6b fa cf | 8b d9 9a b2 68 5d 7b 8a 00 00 00 1c 00 00 40 05 | f9 e3 24 ce 79 a6 67 62 c8 57 cc ee 7e 1e 81 c5 | 41 7c 30 2d | state #127 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c0251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a5f0d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5f0d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #127 | libevent_malloc: new ptr-libevent@0x7fb37c0251c0 size 128 | #127 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49610.644563 | resume sending helper answer for #127 suppresed complete_v2_state_transition() and stole MD | #127 spent 0.468 milliseconds in resume sending helper answer | stop processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37402a710 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 d9 7e 94 07 33 4b 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #127 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #127 | rejected packet: | 63 d9 7e 94 07 33 4b 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #127: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a16db0 | handling event EVENT_RETRANSMIT for parent state #74 | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #74 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #74 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49610.645747; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004431 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ced0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #74 | libevent_malloc: new ptr-libevent@0x7fb37402a710 size 128 "road-eastnet-nonat-74" #74: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #74) | 74 9c fc 4a 6a e3 e3 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 4c a1 32 c0 37 d8 5b 48 9c e5 d1 93 92 0c 53 | 2d 7a c8 b1 df 24 d3 9a 3f 8c d4 c5 68 47 a3 a6 | 97 97 ce bb 01 47 69 1c 80 a7 65 98 e9 23 03 f4 | d4 b7 9b 7e d3 4c aa b4 56 9e 09 14 71 47 28 7f | c7 55 55 ab d5 8e 75 f5 9a f4 57 8c 05 da 66 0a | 40 9c be 25 a4 ef c7 bf 8b 81 b2 07 d2 0a 7d 79 | a8 74 67 c4 01 41 ba 6b 27 91 81 d4 a9 3f 71 a7 | d8 a9 d4 20 88 c0 67 ed 9a eb cb 95 5d 27 cd ae | 65 ee b7 22 c0 dd 63 86 9c 71 c8 d0 62 02 64 6a | 57 b2 8d 13 05 28 bc e0 52 39 21 a1 da 4e f2 d4 | b5 8a d4 4a 90 a1 15 ec 76 63 23 1b 27 bd 31 af | 95 a2 f3 5b 2d 4e d4 42 7c 32 a2 bf 50 28 83 76 | 27 c1 4e 56 b2 c9 33 07 a5 ee bf 65 36 77 b7 43 | c5 de f7 7c c7 52 fc 27 15 dc 50 6e c0 2f d7 72 | 5a 3b a4 4a 5b f6 13 1e 38 47 4d 77 c3 69 47 89 | 95 21 ff 50 2d c1 83 a3 1a 90 31 a7 2f c0 c1 a5 | 29 00 00 24 5c 46 aa ed 6c 5c 2a de e4 4c 0f 0d | ff be a8 c1 d6 16 7f 78 81 97 e2 33 fc 98 55 93 | 9e 14 cc 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 26 fa 02 ef ac 51 67 96 4e b3 ca | 7c 6c ba e3 fb 9a 52 77 00 00 00 1c 00 00 40 05 | 65 ee a5 86 f4 0e 73 b1 a9 eb cb 64 18 5a 0c a9 | fd 3d e5 eb | libevent_free: release ptr-libevent@0x7fb34401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a16db0 | #74 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 9c fc 4a 6a e3 e3 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #74 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #74 | rejected packet: | 74 9c fc 4a 6a e3 e3 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #74: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0591 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f2060 | handling event EVENT_RETRANSMIT for parent state #21 | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #21 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #21 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49610.650091; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00589 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #21 | libevent_malloc: new ptr-libevent@0x7fb34401d920 size 128 "road-eastnet-nonat-21" #21: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #21) | c1 e2 95 19 0d 6d aa c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 62 b7 cc 73 d3 9f c3 8b a1 e4 26 f8 ce 22 33 | 92 13 78 50 86 db 45 6a 88 c0 09 ba 4c 3a ed 8d | 07 a9 f3 c5 90 2e 12 14 58 94 56 71 46 c0 41 ae | 27 c0 08 e3 c4 02 5d ee 64 22 79 77 74 67 02 97 | 15 c4 99 75 53 da b8 d8 73 7b 03 dd 0e 63 e5 c8 | 2f a1 74 7d 1c 73 5d e6 89 77 c2 84 53 e8 81 35 | 14 8c 80 35 a3 ae 1e 09 89 8b c1 64 7d fd 4f 89 | 8f b7 6b da 51 0c c4 21 04 59 18 7c 8d 33 1a 85 | 98 29 76 e4 22 ac 91 00 31 d3 90 f1 d2 f4 f2 9a | 20 a3 6d 51 7b 67 e4 d8 4d 7c 9a fb 7c 63 7f d7 | c7 25 20 29 d5 e0 63 b5 f2 a7 5f d2 ec 98 84 3a | cb 95 85 f5 af 28 8d c4 5a 27 b6 9c 15 cc dd ed | f7 9f 6c d0 d0 af 5b 13 f0 d8 0f 7e 40 99 08 7d | 42 b3 e6 b5 93 1f 1e e1 85 38 e6 f0 e2 af 01 7d | 4f a1 b9 ef 5c 3f 42 c4 c2 ef e5 bc 70 ba 8e 68 | 71 82 c2 53 b9 56 35 3d c9 38 89 b6 a0 89 2b f3 | 29 00 00 24 b6 59 e5 4e ee 3f fd 49 7f 16 f6 82 | 11 23 a0 41 4a 5a b9 59 7b 13 06 de 98 79 ac e0 | 67 18 f7 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 70 4a 79 4b fb 19 31 c0 36 bc 71 | 8e f3 57 13 5a bf 33 aa 00 00 00 1c 00 00 40 05 | 04 fc 29 44 06 78 d7 26 30 ef ba 81 66 98 ec 1d | 35 84 86 e1 | libevent_free: release ptr-libevent@0x7fb3500180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f2060 | #21 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c1 e2 95 19 0d 6d aa c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #21 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #21 | rejected packet: | c1 e2 95 19 0d 6d aa c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #21: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #120 | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #120 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #120 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49610.651518; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50008 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #120 | libevent_malloc: new ptr-libevent@0x7fb3500180b0 size 128 "road-eastnet-nonat-120" #120: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #120) | 87 fa a7 32 05 23 14 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec 6c 11 66 a6 95 d9 e6 e2 88 b9 98 2a 60 c1 38 | c4 e7 6d c7 8d 08 5f c7 b2 af 28 df 28 55 74 6b | 75 22 9e ab 67 eb 95 72 f6 3e 95 b3 15 85 4f d6 | c1 c3 2d 9e 07 29 16 41 13 5e bb cf c0 e6 4f 24 | 10 cc 57 fd 9c ba 63 ce ec 86 10 c7 d4 7c 34 a8 | a5 5b fd 1f 33 3b a2 f8 03 46 9a 66 74 53 5d 27 | bd d8 93 4e 14 8b 45 9a 6d ce b3 cb 29 f0 cc 6c | 0a 42 f4 3b 31 46 fc ae db a9 72 48 29 6a 06 1a | 3f 35 fb 97 be 23 c9 c4 df 59 9b d7 24 09 d8 73 | f7 9d 98 e5 b5 21 68 b6 e2 c9 13 2b 11 7a 73 1b | e9 35 93 72 82 45 b9 27 a7 9d a4 9d 09 5e 20 78 | 29 0e a5 bd 44 31 dd 75 00 a1 c2 9f 09 4f 24 eb | 16 42 da bf 3a 12 d4 84 33 67 7f 85 66 00 36 74 | 79 21 73 94 9b df b2 a9 01 30 1b db 75 7a 3d 46 | 6c 6c eb ca 16 ae 1a 85 9f eb e5 ef 46 e7 91 51 | ee 18 48 f1 20 6b 2b c6 77 fb 41 ba bd 6b 56 4e | 29 00 00 24 6f c3 ef a5 ff 17 51 3e dd e4 5e c3 | e4 15 2b 4d c5 b5 58 85 08 f4 21 f4 d7 43 b1 43 | 4c 64 51 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 47 24 d0 22 75 93 6e dd 7d f7 25 | 7b 0d 80 0a 15 3a a3 09 00 00 00 1c 00 00 40 05 | 8f c4 23 24 1b 0a 54 8e c8 2f b2 b8 ec 80 e9 f3 | ca 99 ed fd | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #120 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 fa a7 32 05 23 14 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #120 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #120 | rejected packet: | 87 fa a7 32 05 23 14 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #120: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a027b0 | handling event EVENT_RETRANSMIT for parent state #100 | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #100 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #100 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49610.707817; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002242 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #100 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 "road-eastnet-nonat-100" #100: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #100) | e4 31 72 ce cb 4c 2e da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 02 70 26 8b f7 4c 10 d5 54 2d e1 56 87 42 60 | 52 43 18 58 d2 c6 63 79 e0 4c 7b 4a 2f b9 0e c8 | b1 65 1d 3e 6c a0 42 98 0c 60 fd b3 4d 30 f1 76 | 5e b7 85 03 42 2b d9 76 75 50 2e c4 69 94 03 7a | 6e c6 23 13 83 28 87 89 db 36 67 01 a4 44 23 73 | e4 b0 04 73 26 bb b0 01 8a 59 be 71 cf 90 5c 3a | 4f 3e 50 e0 98 79 eb 2c 62 ed 3b ff 05 2e f6 81 | 65 38 8c a4 51 39 05 8b 85 23 c5 f6 84 98 62 7d | 1d 2f 44 0d 73 e0 13 c3 51 be 3b 56 26 36 4c 79 | eb bc 2b 5e 2c 37 b2 d5 29 fa 64 f9 de 60 b9 ba | 73 c4 a9 28 1e 62 38 24 9d a3 96 c5 53 73 2c 7d | 0d 39 e6 12 54 ca 75 11 6f 12 17 8e e1 13 5d 45 | 12 9e c5 b7 6a ce 49 b5 ef 7b 55 be 70 ce 3a 18 | d9 f0 2c b9 2c 8a 17 6a 09 a2 d9 96 28 14 14 67 | 3e 3b 41 a6 c6 44 44 f5 69 48 d1 0a 41 9c 30 d6 | 74 2c 38 9d d2 1f 0a f9 85 a8 83 ce dd 7d a1 17 | 29 00 00 24 9b 63 67 5a a5 90 71 08 bf 01 2e 0d | 7a 17 c3 85 da c2 c9 b2 79 84 88 d1 44 e9 43 2f | de e8 87 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb bf 15 80 9f fe 69 e3 a2 7b 53 a0 | 71 05 30 05 2a 8e cb 5a 00 00 00 1c 00 00 40 05 | e0 55 02 95 04 d8 fc 5b b5 ab 42 28 79 3c 3e 17 | 70 aa 5d 58 | libevent_free: release ptr-libevent@0x7fb378012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a027b0 | #100 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 31 72 ce cb 4c 2e da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #100 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #100 | rejected packet: | e4 31 72 ce cb 4c 2e da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #100: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0575 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35000d120 | handling event EVENT_RETRANSMIT for parent state #113 | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #113 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #113 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49610.714104; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.005396 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a69e50 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #113 | libevent_malloc: new ptr-libevent@0x7fb378012840 size 128 "road-eastnet-nonat-113" #113: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #113) | 65 aa 2d d8 a6 29 20 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df aa fe 5d 18 fa cf 0f ff 28 95 2b df 41 5e e5 | 93 b1 5d 05 b9 f8 45 e3 a0 1d 39 ec fc 7d ae 4b | 05 3f bf 03 bf 80 a9 6e 8e fd 3b e8 32 58 c8 f7 | c6 df 30 b6 09 5f 2a 57 25 11 cb 3c da a5 01 9d | ba 5a dd a7 bc 6b 95 4a 6d df f0 56 fa 5d b6 d5 | 32 bd cc 28 5e b5 ff 1a d9 af f1 6d a9 3a c6 a5 | ab a2 21 23 63 1f 7a d5 a9 f2 d8 6e 34 2c c0 14 | b5 44 80 cc 01 b8 bc 1d 88 15 f0 56 5b 9e 16 11 | 53 49 7c 46 a4 d6 df 15 cc 76 08 99 30 8d bd 16 | fc 22 5e e2 91 1e 29 90 27 cb 4a a1 bb fb df c0 | e1 57 58 ac 38 1b 6a 91 9c 4e c8 14 95 91 e6 23 | a6 57 8f 86 03 7d ff ac 75 e9 09 5f f5 40 29 9b | 12 ab c4 82 96 27 04 ff 62 2b 29 96 91 b3 9d b0 | 86 8f c7 9d 9e d4 5c a2 76 cf a2 55 cf 18 d5 47 | 6a bc c0 f7 de 25 72 ff 89 ad a0 ee b6 9c 33 78 | 04 18 e5 3b 76 6f 93 07 22 6f ad 6a 13 43 4b d1 | 29 00 00 24 24 d3 7a 96 b8 4b b9 c8 77 6f a9 e8 | 8c 18 33 84 b7 52 88 cd 9d a3 3f f7 dd 42 d5 3a | e4 24 11 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 39 d7 c2 57 ac 0e 5c ea ab f6 c3 | 2b 95 40 5a 3d 34 d1 e0 00 00 00 1c 00 00 40 05 | e1 b8 84 36 a4 5f d1 6d 3f 9f 07 dc 0f 94 99 b2 | ea cc 3a 90 | libevent_free: release ptr-libevent@0x7fb350012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35000d120 | #113 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 aa 2d d8 a6 29 20 d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #113 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #113 | rejected packet: | 65 aa 2d d8 a6 29 20 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #113: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.057 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #121 | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #121 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #121 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49610.719422; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500621 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35000d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #121 | libevent_malloc: new ptr-libevent@0x7fb350012840 size 128 "road-eastnet-nonat-121" #121: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #121) | 1a c4 23 3a 2f fb 8d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 72 b0 fb 70 4e c0 8d 7d 37 18 c1 ce 4c 8b 63 | 3b ed bd b3 7c e2 68 d0 e4 78 d3 ff 67 2f 87 6b | 58 6e aa 28 e2 71 48 9f 9e 55 8d d7 f0 fa a8 2d | cf d6 ae d1 2d 00 58 7f 1d 28 13 c8 1c b2 dd 2d | 0b 8c e4 ed 5c aa b6 84 75 0e 0c f4 87 20 ea a7 | 6f 81 08 6f ca 1d ea a5 cc 8b 1d 07 3a 98 ee 34 | 92 f7 0d 60 c7 27 69 9a 54 db 7b c6 0a ed 9e 6e | 48 c9 2d 78 78 eb 23 a8 d4 08 fd 81 af 22 ee 61 | 94 de e2 4a 3e 31 5e 98 b3 8e 80 72 e5 9a 23 e5 | 36 5f 19 09 16 90 75 46 fe 81 ca 01 97 f5 9d b9 | ee 86 b8 f1 4d 40 49 77 bf ea d6 8d cf e1 3f ed | ea d1 6f a1 94 f1 b6 1e ce cf 58 8f 34 28 d9 e9 | 91 30 27 07 3d a8 1a 9e 1f 56 eb 39 c7 99 10 18 | f7 a0 93 02 25 a4 35 d3 3b 85 c6 a5 d4 ee 05 5a | 0a 2e cd 8b 56 c3 43 2f ad b6 de d6 76 50 8d 8d | 31 49 b6 ba ff a2 3a 1a 19 8e 58 36 38 db d0 39 | 29 00 00 24 ce 58 3c f3 71 03 62 3b f7 b4 bf 47 | 86 b0 47 20 d2 a4 5f 23 42 6a 81 bd c0 a6 20 e9 | 9a 46 27 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 ab b4 fc 6a e4 2a a5 95 ca 3f ba | 4a 7b 1d be 72 ff 8c 93 00 00 00 1c 00 00 40 05 | 7e 13 e9 d3 7d bc 8a 17 e1 3e 93 a5 d0 ee 9b cd | 6e 9a 4b 6b | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #121 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a c4 23 3a 2f fb 8d 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #121 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #121 | rejected packet: | 1a c4 23 3a 2f fb 8d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #121: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-128" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-128' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #128 at 0x557d46a83540 | State DB: adding IKEv2 state #128 in UNDEFINED | pstats #128 ikev2.ike started | Message ID: init #128: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #128: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #128; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-128" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-128" IKE SA #128 "road-eastnet-nonat-128" "road-eastnet-nonat-128" #128: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-128 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-128": constructed local IKE proposals for road-eastnet-nonat-128 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 128 for state #128 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #128 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #128 spent 0.146 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-128" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.231 milliseconds in whack | crypto helper 19 resuming | crypto helper 19 starting work-order 128 for state #128 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 128 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 128 time elapsed 0.001 seconds | (#128) spent 1 milliseconds in crypto helper computing work-order 128: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 128 for state #128 to event queue | scheduling resume sending helper answer for #128 | libevent_malloc: new ptr-libevent@0x7fb36802a950 size 128 | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #22 | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #22 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #22 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49610.736114; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.008162 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a027b0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #22 | libevent_malloc: new ptr-libevent@0x7fb3480251c0 size 128 "road-eastnet-nonat-22" #22: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #22) | fb 94 21 58 38 c3 f9 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 fa b9 d7 68 fd 72 8f 42 0c d5 a2 f7 f4 9b 8a | d7 23 52 ca 6c 52 76 c9 13 29 10 22 e6 ec 59 2c | a8 f2 aa 73 f8 3e 6b 2a a1 80 14 ff a7 56 48 4f | 3e 9b c4 33 e8 9f 3f e1 00 d1 2f db 56 9e da 18 | 67 a2 e0 d7 98 13 63 9f 28 d8 20 03 fc d6 f3 6a | 0b 8c 23 20 ba 26 3e 63 f5 df a1 d6 76 bf 7c f8 | 52 9b 7b e3 ba 8b f9 13 50 1b 61 13 1c 98 cb 7a | 18 f4 0d 9c 45 e0 10 ca 68 77 fa c0 54 76 19 a8 | f4 83 b0 e9 4d 71 3e a8 7b e6 82 90 01 66 8f f4 | 47 f6 ec 2f 3d 48 64 9c f2 b5 21 50 b5 a6 c1 a0 | 91 f5 21 c6 ec 6a bd 95 39 08 03 b0 29 f0 d4 a1 | f0 7d 39 2b f5 47 de 25 f6 c5 56 6c a0 9c af 3d | e0 4f 7d d8 1e 86 d7 ac 96 7e 36 e6 1e 20 3d 6a | 91 0f b8 c5 68 62 9b 7a 5c 1e b4 57 88 ac 53 77 | e1 de dd ef 41 8c d3 d4 57 c9 16 9b e4 e9 05 4c | 74 12 06 2b a5 93 e5 02 33 46 72 d8 88 42 05 bd | 29 00 00 24 90 c9 d4 3c 5f 0b 25 0f f1 bc 52 9a | c3 5c 4d d3 31 89 58 99 a1 8a 08 b0 ed 9a e3 4f | 90 7f 17 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 cd b6 d8 9c a0 ac 4f 4b ba 38 63 | e9 a9 a0 ba 13 a5 50 1a 00 00 00 1c 00 00 40 05 | 2f e0 72 4a 02 ff fa 8e 97 a9 39 d6 93 d4 2c 35 | dd 9e 83 2a | libevent_free: release ptr-libevent@0x7fb338012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #22 spent 0.128 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 94 21 58 38 c3 f9 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #22 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #22 | rejected packet: | fb 94 21 58 38 c3 f9 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #22: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #128 | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 128 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #128 | **emit ISAKMP Message: | initiator cookie: | 77 d1 59 6d 55 cb 18 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-128 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f5 01 e0 bd 82 fe e0 91 d9 ed 2a 7b 41 58 aa d2 | ikev2 g^x c1 83 b5 d4 08 da f3 c7 61 8a cf 68 fe 9a 21 e3 | ikev2 g^x 57 03 c4 31 d0 d0 ec 56 cc 27 d9 52 cc f2 63 0f | ikev2 g^x a0 ad 50 12 a9 19 98 c4 cb 8f 93 9b 57 4e ae 53 | ikev2 g^x 05 9f f7 4f 18 99 38 38 06 c2 82 4a ed ef 9d cc | ikev2 g^x 7b 44 9f 1c 19 10 74 71 d4 89 98 82 e7 d0 72 33 | ikev2 g^x aa 5f 8b bd da a0 8b 0a 73 9d 51 cb d2 a3 14 69 | ikev2 g^x d1 4b 0c 71 9d 71 26 5d bf 23 7a 67 5d 15 2b a2 | ikev2 g^x ce b7 8c 37 a6 d1 63 b0 6b dc f1 b5 b5 72 45 86 | ikev2 g^x c8 59 1a 35 a1 54 36 81 14 ea b5 34 cc 86 95 36 | ikev2 g^x de 73 da 51 28 93 ec 98 2d 7a d9 01 e1 1c 11 2d | ikev2 g^x 35 8e 59 23 0d de 42 1b 00 c8 28 40 ea c4 bc 1a | ikev2 g^x 0b 22 97 22 23 59 28 f2 30 da 60 85 07 fb be 9a | ikev2 g^x 26 22 87 03 aa 66 5a 47 26 21 89 bb a9 0e 6a fe | ikev2 g^x 60 1c 6c 90 e2 96 28 ae 41 e9 23 65 8c f4 23 57 | ikev2 g^x 72 00 10 88 06 ca 67 04 cf 4b c7 04 50 60 fe 2f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3b ae 04 a3 29 53 44 16 26 36 89 01 ad 8c c7 bd | IKEv2 nonce 38 5d c9 f9 a5 cd 29 aa 82 21 0f 5e 4f 91 67 49 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 77 d1 59 6d 55 cb 18 9a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 80 | natd_hash: port= 01 f4 | natd_hash: hash= de 73 cd 7c c3 ca 92 54 ff 7d 3a 5c 01 84 d2 b8 | natd_hash: hash= f1 a4 c9 bd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data de 73 cd 7c c3 ca 92 54 ff 7d 3a 5c 01 84 d2 b8 | Notify data f1 a4 c9 bd | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 77 d1 59 6d 55 cb 18 9a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ec 18 dc 66 2d cf 71 2e 85 c0 4a 75 63 a1 b7 19 | natd_hash: hash= b3 41 97 a0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ec 18 dc 66 2d cf 71 2e 85 c0 4a 75 63 a1 b7 19 | Notify data b3 41 97 a0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #128 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #128: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #128 to 4294967295 after switching state | Message ID: IKE #128 skipping update_recv as MD is fake | Message ID: sent #128 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-128" #128: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.128:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #128) | 77 d1 59 6d 55 cb 18 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 01 e0 bd 82 fe e0 91 d9 ed 2a 7b 41 58 aa d2 | c1 83 b5 d4 08 da f3 c7 61 8a cf 68 fe 9a 21 e3 | 57 03 c4 31 d0 d0 ec 56 cc 27 d9 52 cc f2 63 0f | a0 ad 50 12 a9 19 98 c4 cb 8f 93 9b 57 4e ae 53 | 05 9f f7 4f 18 99 38 38 06 c2 82 4a ed ef 9d cc | 7b 44 9f 1c 19 10 74 71 d4 89 98 82 e7 d0 72 33 | aa 5f 8b bd da a0 8b 0a 73 9d 51 cb d2 a3 14 69 | d1 4b 0c 71 9d 71 26 5d bf 23 7a 67 5d 15 2b a2 | ce b7 8c 37 a6 d1 63 b0 6b dc f1 b5 b5 72 45 86 | c8 59 1a 35 a1 54 36 81 14 ea b5 34 cc 86 95 36 | de 73 da 51 28 93 ec 98 2d 7a d9 01 e1 1c 11 2d | 35 8e 59 23 0d de 42 1b 00 c8 28 40 ea c4 bc 1a | 0b 22 97 22 23 59 28 f2 30 da 60 85 07 fb be 9a | 26 22 87 03 aa 66 5a 47 26 21 89 bb a9 0e 6a fe | 60 1c 6c 90 e2 96 28 ae 41 e9 23 65 8c f4 23 57 | 72 00 10 88 06 ca 67 04 cf 4b c7 04 50 60 fe 2f | 29 00 00 24 3b ae 04 a3 29 53 44 16 26 36 89 01 | ad 8c c7 bd 38 5d c9 f9 a5 cd 29 aa 82 21 0f 5e | 4f 91 67 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 73 cd 7c c3 ca 92 54 ff 7d 3a 5c | 01 84 d2 b8 f1 a4 c9 bd 00 00 00 1c 00 00 40 05 | ec 18 dc 66 2d cf 71 2e 85 c0 4a 75 63 a1 b7 19 | b3 41 97 a0 | state #128 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #128 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #128 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49610.736838 | resume sending helper answer for #128 suppresed complete_v2_state_transition() and stole MD | #128 spent 0.459 milliseconds in resume sending helper answer | stop processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36802a950 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 d1 59 6d 55 cb 18 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #128 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #128 | rejected packet: | 77 d1 59 6d 55 cb 18 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #128: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0574 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 19 waiting (nothing to do) | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_RETRANSMIT for parent state #75 | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #75 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #75 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49610.767041; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.009815 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #75 | libevent_malloc: new ptr-libevent@0x7fb36802a950 size 128 "road-eastnet-nonat-75" #75: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #75) | d6 96 43 68 6a ec ab 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b e7 f0 1b 8c 0a 12 dd d6 e5 bf 02 28 26 dd ac | 6b 5a 27 84 cc 5b e1 51 a5 48 25 1e 64 a9 f9 15 | a7 cf bd df a0 ad 76 b9 f4 06 07 4e 82 21 11 6b | 26 3f e9 d5 c8 28 2c a1 f2 de e8 cf 1b 66 10 aa | 48 33 36 9a e1 15 5a 5f 6d a7 50 58 f0 d8 c9 11 | b2 31 61 66 dc 13 e3 c7 ff 39 58 4c c1 88 d6 62 | 58 b9 1d ad d3 89 b6 21 d6 53 4e 88 4f 41 13 08 | 17 e6 d6 6a c0 94 05 0a ca 81 fd 84 5a f1 98 1e | b0 e9 8c 00 0a 4a 9c 8f 68 9e 7b 0d 09 60 4d 06 | b0 a8 a6 4f 85 49 38 bb ac 0a 4e 89 c8 a9 1a ef | 21 bd 3e 11 8d 34 77 94 db 0a 8d 1b 25 93 bc 6d | 26 8e 7b 5a 1c a6 da 04 b8 b9 68 16 5d 98 25 e7 | 4f 1c fe b2 4a 85 cb fd 7d 24 86 89 1b f6 19 0f | c0 e3 71 1b 57 41 f6 79 be 0c 81 b2 d6 8d b1 21 | 0e f7 f7 b1 1e d7 c5 ff e7 e6 4b 6a 5e 29 e6 f5 | 33 d7 87 e4 a6 ee a9 a9 4b 11 cd 2e d2 b6 0a d2 | 29 00 00 24 80 4b a3 25 3b 73 08 25 20 19 cd 1b | 6b 4a 3a cd 29 5e ac 55 94 fe 42 a8 a3 13 30 97 | 0f 50 65 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 04 fe 2e 3e a3 d6 9c 0e cd 5a 49 | b4 f8 ac 71 05 8a 92 ef 00 00 00 1c 00 00 40 05 | 56 54 de 54 0a a0 dc 64 96 23 cc 19 a1 e6 37 21 | c0 78 fa 6f | libevent_free: release ptr-libevent@0x7fb35401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | #75 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 96 43 68 6a ec ab 11 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #75 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #75 | rejected packet: | d6 96 43 68 6a ec ab 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #75: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0707 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #114 | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #114 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #114 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49610.773389; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000955 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #114 | libevent_malloc: new ptr-libevent@0x7fb35401d920 size 128 "road-eastnet-nonat-114" #114: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #114) | d6 76 3e 2a df 8d 49 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 89 bc e4 ca cf 42 9f 8c 3e 0c bd bc ae 4f 3b | d3 c7 ce d3 ca 55 eb 39 04 eb 76 8e a9 75 7d e3 | b6 18 fe 44 5f 1c ef b7 b7 41 cc 4d 34 22 30 65 | 06 59 1e ef 39 63 eb fe 02 26 56 aa 64 57 8d 53 | 7a 80 31 9c 0a f7 30 cf 50 cb a2 17 9f 63 45 27 | 3c d2 e0 b9 54 07 a2 b1 46 40 09 3b 94 40 bf f1 | 40 f9 b6 13 93 c3 4e d6 d8 b1 db 99 2b ea b1 51 | cb eb aa 9a ed ac 6d b8 6b 55 e2 2f 64 52 21 e2 | 9d 13 28 a8 e7 03 1f ba 1a 35 29 e1 bf bc 71 81 | 00 b3 30 d7 67 e8 0d 4c f0 57 7f 78 f9 6a af a6 | f5 69 67 2d 44 65 18 2d d8 cb 15 95 95 67 b6 a2 | 53 6a 9c 3b 84 13 f8 02 23 28 ee d8 85 45 e3 f6 | 5a a4 85 e6 1c 98 88 9c 1f 95 20 64 13 9f 49 1c | 78 c0 c0 ca f6 15 03 7c ad a7 9e 6d 64 5a 3a 90 | 22 4b eb 71 cf 24 e9 b9 6a 4d d7 77 ec 73 7e 9d | b2 6f c8 a4 49 bf 18 63 90 cf af e1 1e da 29 bc | 29 00 00 24 73 ab 08 be 9c 8c 4d 6d 6c 17 9d b7 | 72 a8 6d 05 77 58 95 9d b6 49 34 83 b7 04 21 62 | 34 da 48 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 91 b3 8b e1 5d a7 b1 99 b7 4d e6 | 18 7a 40 70 0a cf e4 42 00 00 00 1c 00 00 40 05 | 2c bf 9c 44 68 90 73 42 ea f8 95 cd ea 90 69 66 | 03 01 a9 72 | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #114 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 76 3e 2a df 8d 49 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #114 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #114 | rejected packet: | d6 76 3e 2a df 8d 49 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #114: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #122 | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #122 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #122 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49610.781998; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50087 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #122 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-122" #122: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #122) | 14 66 d6 bd ae 2b be a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 a1 e9 e4 be 1e 51 8a 55 59 79 73 21 36 56 e2 | 77 7a 08 bd 06 ab d4 92 e5 dc ae f7 64 76 23 ff | f4 fc 6d 61 73 31 e1 d2 4f df c1 6b b7 79 5a 65 | a0 cc f6 e0 aa a2 1e 56 c9 61 f0 64 10 6e 71 e4 | de d3 38 6f 01 f0 ef d1 f6 56 f5 aa fb d5 dc 96 | f9 0b be 72 ef 23 60 6a 39 4c 10 fa 40 46 a5 4f | 9d 4e 1b 63 94 dd bb 2e 79 61 b0 23 01 f5 74 e7 | c5 3f 64 7f 13 8b 72 4d bd da 91 fc 61 61 ef f0 | e7 bf ad 46 59 ed ad 05 2c f7 04 21 03 71 4c c7 | 7f 1d ad ca ef 53 b4 42 e8 7b 9b 3d 7a 70 68 63 | f6 3b fc 00 63 e2 d1 50 20 42 35 cc 18 3b ef e3 | 5c 49 2e b5 43 b5 11 94 a2 42 32 89 ab 4a 75 44 | 28 03 13 02 78 a8 b9 d4 86 df f7 69 0e 5b f1 03 | 59 e8 3f 87 be c1 4f 01 d7 b7 0b 01 72 03 2c 0c | c5 51 b7 34 27 69 20 c2 1e 3c 1a 82 2c 40 e7 31 | 94 67 b7 79 04 1c c9 e0 fd 58 15 b5 e2 95 d3 0d | 29 00 00 24 7c 10 f9 fd 3b aa 03 0a 4e 70 88 76 | 8d 21 8d 7a 77 a3 25 87 bf 2c 07 91 c2 03 c6 70 | 6f 0a b2 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 62 3b d9 22 f1 42 3b 85 55 78 b5 | c8 14 63 8d 0b 44 d6 d6 00 00 00 1c 00 00 40 05 | 1b ba f6 9b c4 53 50 8e 11 46 cb 49 4f 65 db eb | 69 7d d4 7c | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #122 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 66 d6 bd ae 2b be a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #122 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #122 | rejected packet: | 14 66 d6 bd ae 2b be a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #122: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #101 | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #101 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #101 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49610.793711; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003982 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #101 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 "road-eastnet-nonat-101" #101: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #101) | a4 e5 70 36 3e 53 78 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 47 67 da db 52 1d 6f 38 4e a0 14 fb a3 22 ee | a5 bd 87 bb f4 50 cd e1 5f f4 bb 7f 5e 01 20 78 | 03 d2 5e e5 f5 4c 45 4d 90 0b ab 1e a9 68 0d a2 | 63 8b 82 0b 63 5a be b1 7a 7f 0a d0 8f 73 00 89 | 01 d6 0d 8e e0 01 de 09 aa b1 2b c9 2a 85 99 3e | e4 12 33 b6 ff a4 02 5b a4 0f a9 0e 49 92 c4 c4 | 91 bb bd cc bc 4e ec 81 b6 b6 b8 9c 4a 4e 40 d2 | 5e b4 c5 bc f7 4c 25 7f b5 8f df 4b 29 de 24 b5 | 99 9e 0e bd 10 eb 77 c5 31 71 d3 38 c7 ae 1b 45 | a1 15 8f 53 f2 46 e1 e0 f3 7d cd 3a fa d7 ce cc | 71 fa 98 05 20 5e 2b 57 e0 1e 93 66 04 94 47 68 | b5 fc da d4 67 d1 27 06 e7 0b 81 26 9b 06 3d 8a | 68 ab 7d 23 5f b3 75 b4 20 05 d5 0a d7 9f 47 f8 | cc 49 2f 28 05 85 5c 22 76 a9 df c7 57 38 c2 59 | 85 34 bf b9 39 30 70 bd fe 4d 41 14 30 36 f4 a7 | a4 75 83 53 e7 c0 5a e0 b5 e5 07 a1 66 16 4d c3 | 29 00 00 24 08 f8 1e 60 51 22 a7 7a 61 74 80 8a | 8a 13 29 1d 07 8a 7f 81 27 3b e2 db 98 17 8f 37 | 46 82 14 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 37 fb 68 83 f3 3a 11 a5 17 fb 1f | 7d e8 ab 39 06 f5 fb 7f 00 00 00 1c 00 00 40 05 | 98 33 35 18 bc 62 08 ee 27 45 3b 5b 93 d4 b0 de | 01 b6 d3 96 | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #101 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 e5 70 36 3e 53 78 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #101 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #101 | rejected packet: | a4 e5 70 36 3e 53 78 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #101: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0655 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-129" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-129' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #129 at 0x557d46a84b00 | State DB: adding IKEv2 state #129 in UNDEFINED | pstats #129 ikev2.ike started | Message ID: init #129: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #129: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #129; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-129" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-129" IKE SA #129 "road-eastnet-nonat-129" "road-eastnet-nonat-129" #129: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-129 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-129": constructed local IKE proposals for road-eastnet-nonat-129 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 129 for state #129 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36800d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #129 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 | crypto helper 6 resuming | crypto helper 6 starting work-order 129 for state #129 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 129 | #129 spent 0.143 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-129" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.227 milliseconds in whack | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 129 time elapsed 0.000782 seconds | (#129) spent 0.789 milliseconds in crypto helper computing work-order 129: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 129 for state #129 to event queue | scheduling resume sending helper answer for #129 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #129 | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 129 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #129 | **emit ISAKMP Message: | initiator cookie: | 72 fb d4 3a 3d 31 ef 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-129 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 96 72 cd 05 8b 1a e1 a8 66 68 a3 88 d4 37 ab 29 | ikev2 g^x 8d ca b6 b0 86 38 49 65 ce de c8 b0 39 b5 e5 f9 | ikev2 g^x 49 66 a0 ac 83 68 f5 08 38 44 61 fc b4 c4 e3 93 | ikev2 g^x 86 b2 c8 75 e1 f1 8d 43 35 de 04 cc bd e4 ef a7 | ikev2 g^x 8b 7d df 6d 22 63 24 bb ce 8f 77 d1 43 ca 6b c6 | ikev2 g^x 70 cf 4e 81 02 44 0d 39 85 28 ca ae 69 3d 8b 1d | ikev2 g^x 8e 2a f9 28 37 54 47 1b 7f 1e 6c c3 e7 ca 7d c5 | ikev2 g^x 5d eb 2d b5 ee 04 65 71 a3 9b 69 bf 7f 5f e0 e8 | ikev2 g^x b1 ac e6 e0 77 7c 27 c0 f7 96 26 05 ab 95 ca fd | ikev2 g^x fa ef 5c 22 dc 42 3f 47 3c 21 7c b3 45 c2 0f 2d | ikev2 g^x 47 18 59 0f e9 05 83 ad b3 18 86 6e 4c 0f 6a 6f | ikev2 g^x a2 bf 54 51 83 2a 64 42 06 32 16 00 c7 cc 1b e9 | ikev2 g^x 3e b9 e5 cf 6c 0f 2e 6b fd eb c0 0a 44 95 18 9e | ikev2 g^x 2c d3 00 4b bf 67 5f 7a f5 b4 f7 f7 d7 fd a9 64 | ikev2 g^x 98 77 b8 cc 18 a8 1d 3e 8f 95 27 46 f6 67 44 7b | ikev2 g^x 96 ba b1 ae ad ee 56 93 ac c5 ad 91 dc 2a d2 ba | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 64 51 a8 77 1e c3 b2 0e 1e 7b 14 6a 5f 64 3b ca | IKEv2 nonce 18 8a 91 d8 b8 bf ce 82 b9 6f e1 5d aa 66 20 12 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 72 fb d4 3a 3d 31 ef 8a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 81 | natd_hash: port= 01 f4 | natd_hash: hash= 3f cd a9 5a 90 93 b1 13 f3 88 1c ea 0f f5 0f 31 | natd_hash: hash= 39 58 6f be | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3f cd a9 5a 90 93 b1 13 f3 88 1c ea 0f f5 0f 31 | Notify data 39 58 6f be | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 72 fb d4 3a 3d 31 ef 8a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 0e bb c8 26 22 69 20 e6 e2 bf a8 b0 a2 3b 98 e4 | natd_hash: hash= e2 fb 7b 71 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0e bb c8 26 22 69 20 e6 e2 bf a8 b0 a2 3b 98 e4 | Notify data e2 fb 7b 71 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #129 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #129: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #129 to 4294967295 after switching state | Message ID: IKE #129 skipping update_recv as MD is fake | Message ID: sent #129 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-129" #129: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.129:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #129) | 72 fb d4 3a 3d 31 ef 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 72 cd 05 8b 1a e1 a8 66 68 a3 88 d4 37 ab 29 | 8d ca b6 b0 86 38 49 65 ce de c8 b0 39 b5 e5 f9 | 49 66 a0 ac 83 68 f5 08 38 44 61 fc b4 c4 e3 93 | 86 b2 c8 75 e1 f1 8d 43 35 de 04 cc bd e4 ef a7 | 8b 7d df 6d 22 63 24 bb ce 8f 77 d1 43 ca 6b c6 | 70 cf 4e 81 02 44 0d 39 85 28 ca ae 69 3d 8b 1d | 8e 2a f9 28 37 54 47 1b 7f 1e 6c c3 e7 ca 7d c5 | 5d eb 2d b5 ee 04 65 71 a3 9b 69 bf 7f 5f e0 e8 | b1 ac e6 e0 77 7c 27 c0 f7 96 26 05 ab 95 ca fd | fa ef 5c 22 dc 42 3f 47 3c 21 7c b3 45 c2 0f 2d | 47 18 59 0f e9 05 83 ad b3 18 86 6e 4c 0f 6a 6f | a2 bf 54 51 83 2a 64 42 06 32 16 00 c7 cc 1b e9 | 3e b9 e5 cf 6c 0f 2e 6b fd eb c0 0a 44 95 18 9e | 2c d3 00 4b bf 67 5f 7a f5 b4 f7 f7 d7 fd a9 64 | 98 77 b8 cc 18 a8 1d 3e 8f 95 27 46 f6 67 44 7b | 96 ba b1 ae ad ee 56 93 ac c5 ad 91 dc 2a d2 ba | 29 00 00 24 64 51 a8 77 1e c3 b2 0e 1e 7b 14 6a | 5f 64 3b ca 18 8a 91 d8 b8 bf ce 82 b9 6f e1 5d | aa 66 20 12 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f cd a9 5a 90 93 b1 13 f3 88 1c ea | 0f f5 0f 31 39 58 6f be 00 00 00 1c 00 00 40 05 | 0e bb c8 26 22 69 20 e6 e2 bf a8 b0 a2 3b 98 e4 | e2 fb 7b 71 | state #129 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36800d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #129 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 | #129 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49610.8199 | resume sending helper answer for #129 suppresed complete_v2_state_transition() and stole MD | #129 spent 0.462 milliseconds in resume sending helper answer | stop processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c02a950 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 fb d4 3a 3d 31 ef 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #129 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #129 | rejected packet: | 72 fb d4 3a 3d 31 ef 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #129: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #23 | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #23 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #23 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49610.823099; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004895 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f2060 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #23 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 "road-eastnet-nonat-23" #23: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #23) | 11 64 2b cc 79 62 5e 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 73 2b eb f6 ef a5 89 1a 84 5f 77 86 97 95 f5 | 41 68 46 e7 c2 3a 4b 96 08 d9 dc ac 0c dd 5f 9b | 9c 2f fb 55 35 f0 7e cd 72 e1 cc 2d 6a fa 78 20 | 87 1a 7a 27 9f 9e c1 5d d5 9e 2c a0 07 0d 68 be | 9e e9 e9 2b 00 f9 05 41 09 d8 c4 31 fa 61 72 87 | 90 51 a0 68 b9 49 7c 1e 75 38 ea 5f 98 5e c2 d2 | 66 ca 13 be 66 2b cf da 9f 87 38 b0 7e a9 5b 2c | b6 4d 89 7d 77 c1 b9 97 25 e9 f9 03 6e 50 c9 f0 | 4a 7a ea 26 c5 82 77 fd 51 df 29 99 2b 7c 16 40 | 15 23 9e b1 86 5f 7e 14 de 76 c4 15 a3 9d c9 b4 | 9c 1b 90 c7 1e 57 7f 74 e2 ad 9a 3c 48 8f 70 44 | 85 18 d4 03 39 40 d0 15 5b 33 89 0a c2 cc bd 37 | e0 4e e5 f2 46 4f 47 44 cf d8 ce b3 b6 34 38 c5 | 35 57 26 ef 2d db be d0 db df 2a 42 e2 e1 8f 1d | 48 dc 28 b8 9a 19 2e b1 d2 17 f5 9d a6 50 4d 1a | 18 88 cf 51 7a 98 9f 7a 85 1b 6d 6e b4 28 52 31 | 29 00 00 24 7b 3d c1 32 8e 45 e7 94 6a 53 a8 c9 | d4 42 3b 62 4a d5 d1 ca c0 9b 8b 0f 34 82 fe 78 | 98 28 d2 99 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 90 87 c3 2a f9 31 e3 ce f5 bd a0 4a | 02 f7 6c fe 1a b5 f1 41 00 00 00 1c 00 00 40 05 | a7 5c 60 43 7b 55 16 31 7f 2f 25 27 9c df 44 42 | dd 9f 1f 73 | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #23 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 64 2b cc 79 62 5e 8e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #23 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #23 | rejected packet: | 11 64 2b cc 79 62 5e 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #23: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #76 | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #76 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #76 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49610.831432; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004408 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #76 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 "road-eastnet-nonat-76" #76: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #76) | 08 23 b8 f6 73 09 18 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 b3 88 98 c3 00 3b ee 78 d3 a9 62 79 c8 5e 50 | ca be d3 60 b9 ac ef b3 70 f2 72 51 6e d0 6f e7 | 76 2f 02 45 ea 0c 3e b7 a1 fa 9a de 13 7f 48 f6 | 9a 0d 43 96 53 05 8a 3f 59 81 18 a2 54 08 83 e6 | b2 23 5b f0 fb 8a 5c 92 dc 0e cf 01 e1 94 34 22 | c2 e0 dc ae e5 0d ab a5 e1 89 bb 62 bf 90 17 bf | 34 96 56 44 a4 0c 23 a8 83 ef d0 4c 0b 33 57 7c | 55 bb 56 dc a3 43 8f 68 ba 01 38 40 7f c5 c5 3f | 05 89 dc 6e 0f 54 d6 e4 1f 39 ed af 78 c0 40 5e | de 96 c5 64 7e 4a 03 ee be b0 cb 81 ef de ed 18 | d9 e4 a5 05 6d 9a 00 f2 6a ea 28 7f 9c 2d 97 a0 | 10 8c cf d6 69 56 ba cb c7 fa 65 c6 5b b9 83 ba | f4 70 1e a9 02 08 4b 23 06 c6 59 e2 2c c1 32 a4 | 3b f4 b6 34 0c f2 27 38 ff 60 3f ff db da aa 0d | 54 69 d6 85 b5 50 9d 06 87 5b 28 9b f1 40 e5 16 | 60 3a e9 e8 52 ec 8a 8f b6 c8 a1 d2 cd ff f5 a1 | 29 00 00 24 15 3e 8d 58 5c 16 4e 6b 9c 08 25 92 | 8d ef 80 f2 25 ea cd 1e ba c6 95 f9 1b a7 f2 dd | 45 1d 12 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 8b 52 aa 3c 87 b6 df df 8c 81 fe | ec 85 60 df 06 8e 81 b3 00 00 00 1c 00 00 40 05 | 54 01 aa b8 56 eb 7a 7b 30 98 73 ed 67 e2 36 06 | bd 7f 30 ed | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #76 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 23 b8 f6 73 09 18 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #76 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #76 | rejected packet: | 08 23 b8 f6 73 09 18 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #76: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0682 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a42790 | handling event EVENT_RETRANSMIT for parent state #115 | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #115 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #115 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49610.838827; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002078 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #115 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 "road-eastnet-nonat-115" #115: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #115) | c4 57 de ea ab 7c 97 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d 60 64 b4 6d 6b ab d1 46 47 bf d9 bb b3 15 d9 | 76 6a d8 89 d3 b0 5a 81 28 ba 1d 93 76 a5 80 bb | 38 99 6f de 11 f7 c8 2c 23 bb 14 6a 9f 0d a9 47 | 32 e4 6d d5 c4 32 60 81 49 22 36 5b 90 09 c7 0c | 27 45 32 0f 98 73 ed a3 58 24 f6 91 48 ba e7 1f | da 48 cc 0b e5 09 56 9d bd e9 fe a4 8f 0e 2b 69 | 4d 35 1f 28 bf 51 97 13 c0 2e 28 0e de c2 67 89 | 74 f0 15 44 d8 28 5b 7f f9 a9 ff b2 03 37 cf 2c | 3b 6e e1 4e 7e c7 1c 07 07 33 f5 e7 ff 50 1f 8d | 31 38 08 fc a1 18 db f4 32 10 6d f3 26 bd 9e d9 | db 50 5b 6d 6b 19 89 41 88 e3 7e 3b 01 55 72 67 | 91 73 3c 48 31 9d dd 55 e1 1b 9a a9 f9 5f 58 30 | 2e b7 6d 0e 83 a7 65 f9 86 ec 70 47 1e 65 85 e1 | e6 c5 21 98 7e 5c d4 94 dd 2a 93 5a 70 ed 80 a7 | 59 4c 40 1d 45 f5 3b 9b ad 67 94 6a 65 cc 62 c5 | 57 fb 85 e6 12 1e d8 43 f4 ef fe f0 cc a4 02 e0 | 29 00 00 24 34 89 d0 cd bb 68 33 bb 66 4c 49 99 | 21 34 57 e7 67 32 62 7f b0 e9 7c 89 a8 87 a7 1b | 14 49 2b 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 7a 1e c7 ed 14 54 ea ac f9 9a 4e | af 78 6e 32 16 f1 84 2f 00 00 00 1c 00 00 40 05 | 1a 60 d9 ab c3 38 58 4e 6c 49 b7 eb b4 e1 91 a6 | 90 ea 24 0f | libevent_free: release ptr-libevent@0x7fb36c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a42790 | #115 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 57 de ea ab 7c 97 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #115 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #115 | rejected packet: | c4 57 de ea ab 7c 97 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #115: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0711 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35400d120 | handling event EVENT_RETRANSMIT for parent state #123 | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #123 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #123 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49610.845183; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501465 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a42790 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #123 | libevent_malloc: new ptr-libevent@0x7fb36c0180b0 size 128 "road-eastnet-nonat-123" #123: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #123) | 6c 7d b3 a1 76 62 7d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 56 4f 8e 37 33 e9 f0 f8 7f b8 e1 b3 f9 a8 fa | b7 62 0a da df 31 2b 33 3e c3 84 d4 70 c9 16 31 | 80 ac 1c 22 4c fb 0e d9 48 14 9a 6c 58 8b b2 b1 | ab d6 de 52 1b e7 85 36 94 02 66 e4 ea 4b 3e bb | cb 9a 60 cd b2 64 9c 54 4c 58 05 94 9a 41 90 e5 | 3d f7 e6 13 47 7c 5c ae 9e ed 2f 47 46 7c b6 ec | 64 99 4c 90 1f 2b 27 83 ee 7d 0c 95 53 61 78 0e | fc 0d ee f9 69 83 ad f2 29 e6 77 fd 16 29 ec c4 | 55 89 e7 07 dc 10 66 d5 0f fd 31 a1 54 12 3e c7 | b1 16 f6 98 63 b4 d5 90 8d e3 ff 44 b5 31 8e 32 | c1 26 fd ff 42 9b c5 01 50 0b be e0 4e 8b d1 4e | 1e cc 49 12 14 c5 7d a4 df 96 fd 82 a1 fa 2c 84 | 20 3e 8f a2 9b 0b 00 ca 45 cd 8b a5 8a 1e 6a fa | 02 7f 67 67 3a 15 da 2b 32 2d 18 bd 05 df 1f 49 | 13 dc cd f2 4e 24 ac 3e c3 6e b4 5b 9b c7 3e 7b | f3 b3 b6 54 f0 4f 36 43 d8 39 48 ea ae 56 03 eb | 29 00 00 24 9d 71 0d 4c e1 28 99 bb a1 c2 a8 97 | 82 df 6e a7 59 50 e5 e7 83 d9 52 2c 3a b5 f8 0a | ab 34 6b 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd f0 b7 a5 ab c1 1e 9f 00 5e 1f f4 | 01 11 d6 41 8c c8 44 db 00 00 00 1c 00 00 40 05 | 74 ad b7 af a3 7a 6a 08 ff e9 f2 f1 74 4e c9 b2 | f6 ce db 1e | libevent_free: release ptr-libevent@0x7fb354012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400d120 | #123 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 7d b3 a1 76 62 7d ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #123 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #123 | rejected packet: | 6c 7d b3 a1 76 62 7d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #123: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47f10 | handling event EVENT_RETRANSMIT for parent state #102 | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #102 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #102 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49610.855512; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001944 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #102 | libevent_malloc: new ptr-libevent@0x7fb354012840 size 128 "road-eastnet-nonat-102" #102: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #102) | 27 a9 08 a7 62 f6 e2 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 3c 29 a0 c9 87 b4 80 a8 37 0b 02 31 7e 05 06 | 02 b7 61 4c 60 0e af ef 4b 5c b9 dc 19 0b 5d d9 | 85 a8 a5 ba 16 2d 92 a5 e8 44 5d 48 48 06 cf a5 | c8 1d 53 0f c9 1c 2d 7b a3 b3 51 75 2d 98 e2 85 | e1 14 fe ce 69 6e ee 85 ba cc ab 6a ed ac 29 a6 | 04 6d ec cb be 61 e5 98 b4 1e dc 38 dc 20 70 bb | 52 99 a2 ac 6c 5b d5 dd f6 c6 54 38 29 d3 1c 88 | 10 77 53 7e af 0b 17 62 42 90 de ab 20 33 28 bc | 91 f7 eb 8f 86 fb 2e 6b 0f 94 c5 1b d9 40 a4 9e | 85 bd 8a 30 d0 a6 6c 09 f4 53 70 9d 11 c9 76 49 | 32 46 6a 4a 93 73 a4 59 28 e7 d5 c6 a2 40 d9 fe | c5 0c 7c 9f 70 ed 22 06 0b e5 2d 6e 16 d1 d2 84 | dd d9 af a3 b3 06 49 42 9f 97 37 00 03 72 48 b5 | 2c 38 f9 d2 b0 86 d6 8d ff f1 cb a6 a2 01 50 8e | d5 f2 44 23 56 23 e0 80 83 60 74 3c 92 0d 5e fb | ab 02 db 75 25 b6 fb 54 b8 2c cc 93 7e 04 7e 47 | 29 00 00 24 02 3b 00 99 07 4d 65 f7 7a c6 71 3b | f3 f6 94 93 e2 10 88 59 58 b9 a5 ba 96 a3 b3 bb | 2e a4 a0 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f0 3d eb e8 fa 43 c6 b4 69 3b f8 | f6 b0 ac 09 3e c3 01 6c 00 00 00 1c 00 00 40 05 | 27 e7 8a b1 d1 bb a4 87 76 d6 0f f9 d8 03 fa 51 | 25 22 7e d6 | libevent_free: release ptr-libevent@0x7fb37801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47f10 | #102 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 a9 08 a7 62 f6 e2 d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #102 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #102 | rejected packet: | 27 a9 08 a7 62 f6 e2 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #102: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-130" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-130' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #130 at 0x557d46a860c0 | State DB: adding IKEv2 state #130 in UNDEFINED | pstats #130 ikev2.ike started | Message ID: init #130: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #130: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #130; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-130" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-130" IKE SA #130 "road-eastnet-nonat-130" "road-eastnet-nonat-130" #130: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-130 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-130": constructed local IKE proposals for road-eastnet-nonat-130 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 130 for state #130 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47f10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #130 | libevent_malloc: new ptr-libevent@0x7fb37801d920 size 128 | crypto helper 11 resuming | #130 spent 0.121 milliseconds in ikev2_parent_outI1() | crypto helper 11 starting work-order 130 for state #130 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 130 | RESET processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-130" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.207 milliseconds in whack | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 130 time elapsed 0.000962 seconds | (#130) spent 0.966 milliseconds in crypto helper computing work-order 130: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 130 for state #130 to event queue | scheduling resume sending helper answer for #130 | libevent_malloc: new ptr-libevent@0x7fb36002a950 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #130 | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 130 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #130 | **emit ISAKMP Message: | initiator cookie: | 85 43 6a ad 59 7d ce ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-130 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d8 ae b5 ed fb fd 70 00 13 8d 64 ee 46 d1 86 03 | ikev2 g^x 85 09 b4 b0 21 e1 75 08 18 f5 01 a5 ce d9 28 32 | ikev2 g^x 42 84 d9 a2 5d 29 4b 02 ec 24 a8 1c 76 d6 11 b3 | ikev2 g^x b7 ca cc 7d bb 8a 73 62 20 57 c8 ee 7d 78 9e 1d | ikev2 g^x 7a d7 f6 f5 3d b0 f3 26 b5 f8 7e 6c 34 29 9d e1 | ikev2 g^x 66 87 a7 94 04 46 39 e6 b7 02 1f 92 b6 19 a4 2b | ikev2 g^x 93 1f ea 2c 8d 99 b7 50 6f cd f0 d6 4b e1 d1 c9 | ikev2 g^x 7e 98 1d 25 8f 0a 2c a3 9a 8f 46 07 29 ef b1 91 | ikev2 g^x 6c b5 e6 a3 11 c5 c9 c8 5f a8 7f 93 e8 c3 28 29 | ikev2 g^x 1d 87 06 30 a9 b3 18 af 13 99 e2 ea 6d ca d3 37 | ikev2 g^x f0 97 8e c5 32 05 cc 70 9c 35 a3 ab 7d bb 03 4c | ikev2 g^x 6f 27 f2 98 7e 64 26 7d a4 db 20 0f 0c 9d fa ef | ikev2 g^x 62 00 52 b0 8e 30 a4 8a e8 bb 41 07 76 b9 71 f2 | ikev2 g^x 63 f8 6e da 4f 74 79 ae c9 5c 70 e4 82 06 94 fd | ikev2 g^x 62 5b ee db c2 84 ae ea bf 8a 91 a6 ef 57 d0 e7 | ikev2 g^x d1 ef 3e 19 e8 2e 02 37 b6 05 eb 7c 5d f3 b5 d0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6c 1f 45 88 1e 42 31 9a b9 27 19 26 95 8c 4f c4 | IKEv2 nonce 41 99 09 32 1c bf f6 27 de 6a fb 55 00 73 7a e2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 85 43 6a ad 59 7d ce ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 82 | natd_hash: port= 01 f4 | natd_hash: hash= b0 41 0f ce 80 1a 0e 57 d0 34 7b d4 5a 51 a5 89 | natd_hash: hash= 80 d3 8f c9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b0 41 0f ce 80 1a 0e 57 d0 34 7b d4 5a 51 a5 89 | Notify data 80 d3 8f c9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 85 43 6a ad 59 7d ce ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7f 09 ba 77 a9 79 98 e7 5b 47 dc 5e 0f 55 ef 6e | natd_hash: hash= 76 2d 29 18 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7f 09 ba 77 a9 79 98 e7 5b 47 dc 5e 0f 55 ef 6e | Notify data 76 2d 29 18 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #130 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #130: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #130 to 4294967295 after switching state | Message ID: IKE #130 skipping update_recv as MD is fake | Message ID: sent #130 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-130" #130: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.130:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #130) | 85 43 6a ad 59 7d ce ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 ae b5 ed fb fd 70 00 13 8d 64 ee 46 d1 86 03 | 85 09 b4 b0 21 e1 75 08 18 f5 01 a5 ce d9 28 32 | 42 84 d9 a2 5d 29 4b 02 ec 24 a8 1c 76 d6 11 b3 | b7 ca cc 7d bb 8a 73 62 20 57 c8 ee 7d 78 9e 1d | 7a d7 f6 f5 3d b0 f3 26 b5 f8 7e 6c 34 29 9d e1 | 66 87 a7 94 04 46 39 e6 b7 02 1f 92 b6 19 a4 2b | 93 1f ea 2c 8d 99 b7 50 6f cd f0 d6 4b e1 d1 c9 | 7e 98 1d 25 8f 0a 2c a3 9a 8f 46 07 29 ef b1 91 | 6c b5 e6 a3 11 c5 c9 c8 5f a8 7f 93 e8 c3 28 29 | 1d 87 06 30 a9 b3 18 af 13 99 e2 ea 6d ca d3 37 | f0 97 8e c5 32 05 cc 70 9c 35 a3 ab 7d bb 03 4c | 6f 27 f2 98 7e 64 26 7d a4 db 20 0f 0c 9d fa ef | 62 00 52 b0 8e 30 a4 8a e8 bb 41 07 76 b9 71 f2 | 63 f8 6e da 4f 74 79 ae c9 5c 70 e4 82 06 94 fd | 62 5b ee db c2 84 ae ea bf 8a 91 a6 ef 57 d0 e7 | d1 ef 3e 19 e8 2e 02 37 b6 05 eb 7c 5d f3 b5 d0 | 29 00 00 24 6c 1f 45 88 1e 42 31 9a b9 27 19 26 | 95 8c 4f c4 41 99 09 32 1c bf f6 27 de 6a fb 55 | 00 73 7a e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 41 0f ce 80 1a 0e 57 d0 34 7b d4 | 5a 51 a5 89 80 d3 8f c9 00 00 00 1c 00 00 40 05 | 7f 09 ba 77 a9 79 98 e7 5b 47 dc 5e 0f 55 ef 6e | 76 2d 29 18 | state #130 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37801d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47f10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #130 | libevent_malloc: new ptr-libevent@0x7fb37801d920 size 128 | #130 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49610.891654 | resume sending helper answer for #130 suppresed complete_v2_state_transition() and stole MD | #130 spent 0.488 milliseconds in resume sending helper answer | stop processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36002a950 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 43 6a ad 59 7d ce ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #130 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #130 | rejected packet: | 85 43 6a ad 59 7d ce ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #130: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28ab0 | handling event EVENT_RETRANSMIT for parent state #77 | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #77 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #77 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49610.892844; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004395 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a16db0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #77 | libevent_malloc: new ptr-libevent@0x7fb36002a950 size 128 "road-eastnet-nonat-77" #77: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #77) | 4f f7 57 30 7e 30 db a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 14 f0 66 5e 0a 53 d9 86 47 70 5a 8a 73 bc cb | 52 bc 3f 13 31 b6 9a 6b ff ca f8 2e b7 f0 48 d4 | 77 e7 4c 8e 73 e9 11 6d 0b d9 88 30 75 88 11 48 | 3e 3b 98 fa 3c 66 3a 0b 64 a6 08 cb b7 12 5b 20 | d5 1b 40 67 18 3f 33 02 0f 4c 76 b1 96 fb 38 53 | 46 2f 32 4f 32 aa f2 f1 c1 7e 1b a3 93 84 38 d3 | 1e e6 5e 44 4e 6a 52 d2 5d 7c 9d 39 17 98 69 cc | ec 36 94 6b e8 33 1d ce 1b 8f 5c 7f dd d4 89 82 | 85 a6 1d ff 6c 9b 05 f9 47 a5 19 cd c4 fd 29 1a | 81 51 1f 14 ac 62 dd 33 b1 29 91 3b e8 1b 12 6e | ed 37 99 ae 6f 7a c8 95 71 30 61 a1 ef a5 33 55 | ef 40 50 d8 41 20 80 d2 32 15 fe 53 0a 4d 72 3e | a0 4f 5d 9d 14 7f 1b d9 8a 58 bc 3b 06 b1 c0 d6 | 7a 44 d2 2e f1 5d e3 62 b2 7b f9 e3 44 aa 80 9c | 12 99 76 f5 03 a4 33 27 55 fb 36 b5 80 18 d9 30 | de 03 51 b8 74 0a cb fb 17 be 0d a8 1c 8a af f0 | 29 00 00 24 70 06 ac 37 52 b8 ec 28 7d 6d 81 11 | 1b 1b 6d ce ed 39 8f ce a3 eb 17 d2 32 09 4a 8f | f1 a8 0e 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 42 86 64 cb f7 df d8 ee 6f 6b 28 | 69 76 6e 6d 07 28 e7 b4 00 00 00 1c 00 00 40 05 | cd 8e d4 a4 9f b1 74 d8 7d 8d 61 97 d8 57 39 f7 | 36 5a 1d 66 | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28ab0 | #77 spent 0.0917 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f f7 57 30 7e 30 db a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #77 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #77 | rejected packet: | 4f f7 57 30 7e 30 db a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #77: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a276e0 | handling event EVENT_RETRANSMIT for parent state #116 | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #116 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #116 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49610.906106; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003454 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28ab0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #116 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 "road-eastnet-nonat-116" #116: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #116) | b2 c1 8f cb f7 6a 1e a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 10 14 ae 52 93 c7 02 e8 52 e1 37 d5 de 46 8c | fd 60 c1 85 87 df bb 73 86 74 dd ca 8d 28 84 e8 | ae a4 cc 28 e4 8d 32 74 8d 1a ce d7 d3 d2 af b0 | 17 d9 f0 1f a3 6b 80 67 ac 90 16 e8 bd 63 76 cd | 29 1d 99 79 32 0a f9 72 a3 b1 6c a3 80 e8 98 c7 | 50 db 8b a2 a3 d2 f5 f7 af ea cb e0 92 9e 24 f1 | ee d0 e5 d9 31 06 c1 bd 2c 7e d3 0a 21 44 11 df | a4 42 5a ee bb 8a 79 72 e4 f3 c9 99 7b df 25 70 | 3c 49 19 99 e1 b4 65 cb cf 1f dc af da 2b bd 09 | 11 55 b0 c8 e4 15 8c 50 3c c0 c3 00 8c 8c 4c ab | 69 1b ad 8f b8 1a e0 31 01 be 05 d6 f9 1d 43 66 | f1 fd 89 96 83 b0 fe 81 90 88 96 0a aa b0 30 a0 | 85 c7 97 d5 26 67 92 b8 99 15 c1 d7 75 f8 4b 96 | 28 a4 71 fb e3 bc ab 36 e6 56 13 b6 1e 48 b3 3d | 9c e0 fd 0d 74 f8 ef 54 b8 1f 40 6b e3 af 77 76 | c8 a0 52 42 e3 01 29 91 49 f3 39 82 3e 75 b6 74 | 29 00 00 24 f8 40 4d b3 f4 26 54 f3 cf b0 a0 c8 | 54 6e 9f a9 95 bb 15 87 06 e3 63 86 66 7d 8a 82 | ee 67 c6 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 63 f6 16 ae 7e d5 6c 46 12 68 8c | 69 38 5c 9a 54 a3 19 f3 00 00 00 1c 00 00 40 05 | 9e 9c 34 46 1f 45 a3 36 da 24 a6 33 3a 00 62 20 | 5b e0 e0 ea | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a276e0 | #116 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 c1 8f cb f7 6a 1e a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #116 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #116 | rejected packet: | b2 c1 8f cb f7 6a 1e a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #116: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #124 | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #124 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #124 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49610.909425; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499781 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a276e0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #124 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 "road-eastnet-nonat-124" #124: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #124) | 8e 52 ee 7a 33 75 3f 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 57 9a 04 43 62 52 e5 fc b5 c2 fe cc ad 34 2f | 82 f3 00 f6 ee 21 08 77 c9 b1 bb 69 fe 78 0f 21 | bf 36 0c 3c d2 28 d9 56 83 ae 1a 8d 60 fc ba 85 | 54 56 0c 31 1b 34 8f 99 3a cf de 75 87 a0 b6 a4 | d8 62 39 46 a5 f4 50 6b 49 13 47 6a b8 07 fd 9b | a0 24 9b 8e 36 86 71 8d 3a 86 06 ec 43 9f d0 fa | fb 5f d7 26 3c ad 44 31 62 f2 eb 50 ab 84 4b c8 | 92 d2 94 d1 cf 28 72 53 f0 98 5e 24 79 26 3e b6 | 8a 49 4d a1 69 34 ff 0b 63 f0 6a 98 fb 9b 9e fc | 07 2e cd bb 5b c5 49 f8 a9 bd 52 eb e2 d4 29 6f | e4 1e 81 a0 d3 65 f5 f3 07 20 20 0d 39 fe 60 11 | 31 d5 df 57 2f d9 ac 24 3b 95 8a 93 3c 37 3c fe | 00 f5 ae e3 8b 73 07 19 bf 7a 74 b9 19 54 31 a8 | c6 05 b4 3c c9 b4 f2 d1 4f 8d c4 e7 6c 6b d7 8c | a7 72 14 8c da 9f 42 94 91 f0 27 3c ef a5 63 c0 | 4b e5 9c 5d a2 4a 47 0f 02 ed 81 c6 7a 36 ca c0 | 29 00 00 24 35 37 ad 9e 25 61 50 57 d7 60 4e 9e | 7c 24 2e 8d b9 f6 52 07 e6 cf b3 cb 88 5a c5 03 | c4 c6 aa c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 73 0e 7d 3a 1d a8 f9 ef 84 7c a6 | 0b 05 4a f4 88 18 b0 42 00 00 00 1c 00 00 40 05 | 95 90 15 33 51 5d ad 36 64 2a 62 55 cb ba 4d 6f | 9b 17 ee 8d | libevent_free: release ptr-libevent@0x7fb36c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #124 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 52 ee 7a 33 75 3f 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #124 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #124 | rejected packet: | 8e 52 ee 7a 33 75 3f 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #124: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5af90 | handling event EVENT_RETRANSMIT for parent state #103 | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #103 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #103 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49610.930703; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002858 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #103 | libevent_malloc: new ptr-libevent@0x7fb36c00cf80 size 128 "road-eastnet-nonat-103" #103: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #103) | 20 80 ad df 5a 9a 13 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d a9 30 94 a8 d4 ad b7 ab 41 10 cf dd 34 d7 45 | db 9e 99 58 0d 72 d8 74 bd 3c 1d 4a 98 9b ff 38 | 08 61 4e c7 a6 75 c7 cd ff 21 41 e1 5d c2 9d c6 | 7c 47 d1 97 8a 16 0e 0e 3c 96 7a d8 10 82 5b 8a | 00 b3 29 44 ad 13 12 a6 fb af 01 2d 66 5c e1 02 | 4b 01 af e5 ba 61 e3 fe 71 46 2a af 0d 0d 2a 26 | f8 12 e9 10 f0 8f ca f1 fd 82 c7 ea fa 46 02 26 | b6 95 72 2c b1 d7 c7 46 5a e6 4a 07 87 39 fe e7 | c6 a1 7d 2d 52 a4 c7 a2 b5 e7 2f 2b 1d 48 eb d9 | 7c e8 c4 cb da 19 e0 04 20 53 7b 3c 73 86 a7 70 | c7 09 d6 f9 52 be 12 99 31 58 c4 f8 6c 8b 22 3a | c5 da 0c e1 bd 65 73 c3 27 14 e7 0f ae a0 e8 45 | 58 e0 c3 02 1b 48 ee 20 03 b9 0c ec ad e0 21 05 | 1b 38 52 4b dd 92 f0 58 d2 29 eb 4e be 57 49 4d | 5d 0f a4 01 4b 76 95 2b 60 de d3 82 01 e6 15 d8 | 32 f5 60 60 88 d1 83 bc a6 c2 db 62 29 b3 d7 5e | 29 00 00 24 fb ef 9e 44 e4 82 6e 41 3f 46 3a c8 | d1 69 b9 34 c6 14 27 a3 23 52 4c 58 0c 66 b4 10 | 6a d0 69 ee 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 a3 d6 8d 6e 26 8b a3 26 28 d5 ff | 4a 28 a8 bb 6f af 66 22 00 00 00 1c 00 00 40 05 | e5 6e de 91 25 32 b5 3b 38 9d 70 ef 64 14 11 f9 | c0 c1 79 e6 | libevent_free: release ptr-libevent@0x7fb35801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5af90 | #103 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 80 ad df 5a 9a 13 26 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #103 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #103 | rejected packet: | 20 80 ad df 5a 9a 13 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #103: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a34e10 | handling event EVENT_RETRANSMIT for parent state #24 | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #24 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #24 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49610.937063; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.012404 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5af90 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #24 | libevent_malloc: new ptr-libevent@0x7fb35801d920 size 128 "road-eastnet-nonat-24" #24: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #24) | a6 6a cf 12 4f 5d 80 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 64 6b 6f 54 02 19 88 ba 7c 08 ae f0 e8 ac 9d | c2 ca d4 17 41 fd 62 15 e6 80 a2 22 8c 15 09 a2 | e7 a1 72 ea 0a df 45 b3 25 d6 2f ad 4b 53 6c aa | 40 78 bc 47 40 56 b3 31 58 04 4d 38 c6 d0 b5 d8 | 7f 6f a2 f1 93 94 05 6c d0 31 6f f5 91 da 3d ba | e0 df 58 d8 a7 5c 43 d6 dc 3f 84 1b 95 82 7b 74 | 0c 41 0a 55 c5 c4 26 cf be bc a7 fe 25 56 32 c1 | 74 4d 01 af d9 1d ba 5f df c3 24 6e 66 7d 9c 22 | 84 1a 96 19 75 ab 7b e5 8d 21 ff f9 0c c5 57 de | 08 b9 a5 25 49 54 61 98 e2 43 6f b1 cb e2 3e 2a | f8 2c b2 cc ec bc 5e 41 c3 a9 95 de 3e ae 27 18 | 0c 51 55 28 d4 52 b5 1c e5 35 a1 75 a4 31 5a 74 | 09 2d 83 0a f9 22 55 04 79 c9 7a 03 c4 3f b9 27 | 7d 94 7e 25 32 de fa 8a ba c3 f8 47 1a 89 e0 04 | 1c 2a 74 59 3a 33 c6 78 c9 39 62 b5 5b 83 e0 ec | 74 d5 64 ba c0 ee 33 ea 4f ca fc f0 da aa dc 97 | 29 00 00 24 86 65 98 51 47 8e f6 4b 35 71 6a af | 55 7d 2d 69 5a 9e 6d 36 94 f6 45 50 b1 44 a3 6d | d2 78 d3 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 db bf 4d aa d7 35 0a 3b ec 97 e0 | 4c d5 57 e3 dd 13 4a e5 00 00 00 1c 00 00 40 05 | c7 67 96 20 f6 5f 6f 16 76 12 96 1c 43 e0 40 0f | 0e 23 33 02 | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a34e10 | #24 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 6a cf 12 4f 5d 80 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #24 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #24 | rejected packet: | a6 6a cf 12 4f 5d 80 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #24: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0679 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b610 | handling event EVENT_RETRANSMIT for parent state #78 | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #78 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #78 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49610.953419; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004515 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a34e10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #78 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 "road-eastnet-nonat-78" #78: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #78) | a4 c9 07 ac 54 d6 e0 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 5b 1c ec 96 24 e8 86 d8 c5 db 68 a4 e8 84 cc | f4 a2 ed 99 bf 5e 8a c5 ce b3 9d 08 41 58 29 f0 | dd 3a 5a 77 6f 59 d0 63 db 3e 63 03 3b 94 a8 82 | ea c5 b5 55 dc 2c ec 77 5f 63 ff ce 1a d3 98 5f | ea ba 50 e4 20 9b 1b 0b de 70 1d 72 5e 41 20 22 | dd 96 8b a8 2c 90 f1 b3 79 70 7b 0b d2 f5 29 64 | 24 96 41 c0 b2 23 eb 70 92 6c 66 1d 59 a6 82 09 | 57 e0 df 9e 1d 1d 55 b5 06 9b 7f 66 07 cc cc ff | f3 52 44 fb 3d f1 4f 79 5c 0c 51 85 cc cb 4f 32 | 4d 99 ed e1 7c 32 81 a7 49 c4 5e 9c f7 c7 98 e6 | 2c 03 b7 c8 ab bf 01 d1 70 a5 d7 0f 97 f6 d8 06 | e8 43 56 25 d8 da 9c 66 8b 84 9d ed 34 99 f3 6a | ab 13 48 0a 68 c6 9c 38 c0 da 1e ec 9d bd 23 04 | 56 2e b0 d9 0e 5f 21 85 8d b7 b7 e4 3f 8c e4 76 | 68 1b d3 cc a6 1f 24 7c 46 61 29 b6 47 f3 ad 62 | ed ad e7 10 a5 af 19 f0 76 6b ea 90 57 9b 3b 13 | 29 00 00 24 e3 1c 8b 3a ff 4e 05 3e c1 af db 58 | 7b 8f 74 6d 20 c2 73 1e 04 d3 ec 5f 05 cc 9d e9 | 4b 1e 83 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f c3 34 65 1f ff 78 b6 0e ee cd 35 | 94 8b f4 3a 81 46 94 12 00 00 00 1c 00 00 40 05 | f3 90 ab 75 b4 45 e0 98 82 06 c5 91 b7 b5 12 83 | 38 ae 55 ca | libevent_free: release ptr-libevent@0x7fb34c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b610 | #78 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 c9 07 ac 54 d6 e0 33 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #78 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #78 | rejected packet: | a4 c9 07 ac 54 d6 e0 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #78: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-131" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-131' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #131 at 0x557d46a87680 | State DB: adding IKEv2 state #131 in UNDEFINED | pstats #131 ikev2.ike started | Message ID: init #131: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #131: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #131; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-131" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-131" IKE SA #131 "road-eastnet-nonat-131" "road-eastnet-nonat-131" #131: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-131 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-131": constructed local IKE proposals for road-eastnet-nonat-131 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 131 for state #131 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2b610 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #131 | libevent_malloc: new ptr-libevent@0x7fb34c00cf80 size 128 | #131 spent 0.145 milliseconds in ikev2_parent_outI1() | crypto helper 16 resuming | crypto helper 16 starting work-order 131 for state #131 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 131 | RESET processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-131" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.241 milliseconds in whack | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 131 time elapsed 0.000992 seconds | (#131) spent 0.997 milliseconds in crypto helper computing work-order 131: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 131 for state #131 to event queue | scheduling resume sending helper answer for #131 | libevent_malloc: new ptr-libevent@0x7fb36402a780 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #131 | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 131 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #131 | **emit ISAKMP Message: | initiator cookie: | ad 34 7c 82 56 8e 42 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-131 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x db 46 e3 f8 a7 ca 79 f1 93 d8 0a 34 f9 91 ea 90 | ikev2 g^x 77 1f 83 03 4d 56 b1 a2 80 fd 5f 11 9a a9 0e 07 | ikev2 g^x 36 d2 ed 03 17 79 a3 f7 12 9f 05 ea 25 52 aa 39 | ikev2 g^x 69 97 15 3f 13 ff 62 78 88 a8 12 45 6d 5a 25 bd | ikev2 g^x 48 89 e9 ef 1f ad 28 87 00 42 ce a4 5f 7b 92 dc | ikev2 g^x 5d 1c f0 bb 25 31 dd e0 95 17 e2 9c e6 0b 50 26 | ikev2 g^x d7 14 f3 fe 1e d8 81 cc 32 fc 47 d4 65 1e 3b 75 | ikev2 g^x 32 54 1f 31 95 11 57 b2 4c 02 a6 33 ce 14 e9 e2 | ikev2 g^x e8 05 1b 1c cb 66 89 aa 6f 57 54 90 f2 c1 cf bd | ikev2 g^x a5 b3 7a c8 ef 67 d8 5e 26 3c 19 61 97 89 69 83 | ikev2 g^x 4b df 7e 44 0f 87 25 bc 6c 4f d8 49 5f 35 7f 1f | ikev2 g^x 6e 25 45 69 17 ee 43 65 f2 ee f7 63 5d 98 79 9e | ikev2 g^x fc c9 a2 e1 68 04 58 49 4b 9f c5 76 64 08 49 29 | ikev2 g^x 17 3a 17 1d 87 31 e4 d7 77 de 85 c2 0a d4 26 0f | ikev2 g^x 9f f4 0b fc 3f 26 bf f9 03 95 99 d3 57 10 6f ed | ikev2 g^x 92 8e 36 88 87 df d0 52 c8 ab 1d e3 6f cc ae 49 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3c 10 ae 50 61 d8 53 b3 d3 e2 21 42 85 3a 07 db | IKEv2 nonce 01 3a f5 3e 94 0e a7 09 dd b2 ae 2b e1 07 91 2f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ad 34 7c 82 56 8e 42 3c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 83 | natd_hash: port= 01 f4 | natd_hash: hash= c3 36 c8 4a f5 a5 90 83 e4 ec b2 3e 44 38 46 9b | natd_hash: hash= 6e 4b f9 11 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c3 36 c8 4a f5 a5 90 83 e4 ec b2 3e 44 38 46 9b | Notify data 6e 4b f9 11 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ad 34 7c 82 56 8e 42 3c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1e 37 ad 88 e1 0a 42 8f 3f c7 b2 8c f4 b1 3f 27 | natd_hash: hash= c4 6f 80 e6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1e 37 ad 88 e1 0a 42 8f 3f c7 b2 8c f4 b1 3f 27 | Notify data c4 6f 80 e6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #131 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #131: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #131 to 4294967295 after switching state | Message ID: IKE #131 skipping update_recv as MD is fake | Message ID: sent #131 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-131" #131: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.131:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #131) | ad 34 7c 82 56 8e 42 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 46 e3 f8 a7 ca 79 f1 93 d8 0a 34 f9 91 ea 90 | 77 1f 83 03 4d 56 b1 a2 80 fd 5f 11 9a a9 0e 07 | 36 d2 ed 03 17 79 a3 f7 12 9f 05 ea 25 52 aa 39 | 69 97 15 3f 13 ff 62 78 88 a8 12 45 6d 5a 25 bd | 48 89 e9 ef 1f ad 28 87 00 42 ce a4 5f 7b 92 dc | 5d 1c f0 bb 25 31 dd e0 95 17 e2 9c e6 0b 50 26 | d7 14 f3 fe 1e d8 81 cc 32 fc 47 d4 65 1e 3b 75 | 32 54 1f 31 95 11 57 b2 4c 02 a6 33 ce 14 e9 e2 | e8 05 1b 1c cb 66 89 aa 6f 57 54 90 f2 c1 cf bd | a5 b3 7a c8 ef 67 d8 5e 26 3c 19 61 97 89 69 83 | 4b df 7e 44 0f 87 25 bc 6c 4f d8 49 5f 35 7f 1f | 6e 25 45 69 17 ee 43 65 f2 ee f7 63 5d 98 79 9e | fc c9 a2 e1 68 04 58 49 4b 9f c5 76 64 08 49 29 | 17 3a 17 1d 87 31 e4 d7 77 de 85 c2 0a d4 26 0f | 9f f4 0b fc 3f 26 bf f9 03 95 99 d3 57 10 6f ed | 92 8e 36 88 87 df d0 52 c8 ab 1d e3 6f cc ae 49 | 29 00 00 24 3c 10 ae 50 61 d8 53 b3 d3 e2 21 42 | 85 3a 07 db 01 3a f5 3e 94 0e a7 09 dd b2 ae 2b | e1 07 91 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 36 c8 4a f5 a5 90 83 e4 ec b2 3e | 44 38 46 9b 6e 4b f9 11 00 00 00 1c 00 00 40 05 | 1e 37 ad 88 e1 0a 42 8f 3f c7 b2 8c f4 b1 3f 27 | c4 6f 80 e6 | state #131 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c00cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2b610 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b610 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #131 | libevent_malloc: new ptr-libevent@0x7fb34c00cf80 size 128 | #131 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49610.961416 | resume sending helper answer for #131 suppresed complete_v2_state_transition() and stole MD | #131 spent 0.477 milliseconds in resume sending helper answer | stop processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36402a780 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 34 7c 82 56 8e 42 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #131 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #131 | rejected packet: | ad 34 7c 82 56 8e 42 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #131: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #117 | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #117 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #117 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49610.964612; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00189 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #117 | libevent_malloc: new ptr-libevent@0x7fb36402a780 size 128 "road-eastnet-nonat-117" #117: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #117) | 4a b5 59 cb ed d6 a3 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 62 d1 99 4b 20 24 18 5d d2 31 2a 1c e6 82 aa | d2 1a 74 70 f8 1e f2 71 00 48 0a 80 0d 91 e6 e0 | e0 7b 66 1e 0f a2 c5 f3 2e cc 8d 72 40 de 7d 14 | e0 b7 d4 a2 80 96 97 77 ac ba 2b fb 1f 79 f2 32 | 8b a5 84 65 3d e1 3e 2e 60 82 26 3f 6d cf 4b 43 | 84 0b 96 d0 d5 70 61 64 4c 71 e0 b1 63 e8 0c 82 | 17 82 85 c0 c3 eb d9 cf 4e b8 f4 b1 87 57 e5 c1 | 06 2a d8 41 87 ab aa ec 3f f6 5e ac 9b 45 ab a8 | 0b e4 13 8d 76 0c 8c 2b 1f d4 61 19 ad 16 37 d8 | d0 65 3e 14 53 34 26 1a a6 5e 31 57 79 20 50 43 | 71 29 f3 4a 86 68 0e 08 74 59 1e 0f 6e 37 0c 10 | b2 e1 5f 52 67 c2 35 e3 ff 31 9d c5 bb 7f 45 96 | 61 58 38 40 0e b5 86 40 8f 24 ab 5a 52 cc 83 a1 | 23 61 7d 29 78 a8 96 57 13 15 75 48 5f 5a 5b 21 | 7b dd 4e 50 1d 23 67 01 84 5f f8 e7 69 4f 16 1a | 7e b5 9f 38 da 45 67 22 75 50 ab b6 62 cc cb 76 | 29 00 00 24 c3 7a 28 6c 12 59 4b e7 9f 08 e5 89 | 61 e9 dd c1 64 c5 cd 33 70 a1 b8 fb a5 4b b4 8c | 0b 78 ad a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 90 26 e7 b8 63 3c dc 5c 03 43 0c | 57 b3 5f a9 02 48 0a b5 00 00 00 1c 00 00 40 05 | 75 50 aa 52 d7 4b 1d bd 0c f6 2a 37 d5 af e8 8d | 12 a0 66 45 | libevent_free: release ptr-libevent@0x7fb364017f20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #117 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a b5 59 cb ed d6 a3 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #117 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #117 | rejected packet: | 4a b5 59 cb ed d6 a3 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #117: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34800d120 | handling event EVENT_RETRANSMIT for parent state #125 | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #125 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #125 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49610.976955; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500897 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #125 | libevent_malloc: new ptr-libevent@0x7fb364017f20 size 128 "road-eastnet-nonat-125" #125: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #125) | f8 42 71 02 91 3f e5 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 9e 73 35 93 13 e2 cc 9b bb 37 d3 75 99 15 b9 | c8 4a ce 55 d3 69 e2 90 ce b4 49 6a 8b 41 15 d7 | f2 46 e0 27 62 0c f2 50 c4 fb 7a 1e 5f c1 57 37 | ab d6 7e 39 28 cf 50 b1 15 3d a6 21 69 94 78 9b | 54 78 01 d1 17 2e a1 fd 93 52 02 9b 3c fa 9a 7e | f8 6f 1b 35 4d b8 9a ab 6d e7 64 f6 f2 1a 64 ed | d4 92 58 2f 44 f7 44 27 44 49 1f 1e 22 3d 31 b1 | 50 2c 4d bf f2 3d 61 05 62 ba 25 68 46 81 35 68 | ee 83 cc 8e 2f 04 b6 7e f4 22 67 88 a2 a7 7a f7 | d0 39 1f 83 7d bc f9 79 5c 9d a8 05 2d 41 b5 ef | cc 86 a3 2b c2 79 2a 6d ea bc cb e6 b2 db 61 3a | 30 32 b0 ff 93 a0 20 c1 58 b9 6f 0c 98 fb c0 64 | d2 03 d7 d7 ac 87 bc 66 28 b7 cc 94 87 ea 24 29 | 58 cf 8f 26 39 81 cd e2 dc 0f e9 13 b2 ad b9 3b | 9a e1 c6 4a a2 fb 0d d5 e3 d1 b9 df 52 b9 c6 69 | 37 c0 e4 dc a2 a0 32 29 a3 ce 29 ec cc 5f 70 82 | 29 00 00 24 10 12 73 da 9a 48 c8 49 81 7a 15 0b | 6c a0 98 5f 53 25 0d 7d 05 70 86 c7 7b b0 fa 34 | 5d 40 8d 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 88 74 d5 c4 71 1e 67 79 c5 82 86 | 3b ab 9f 01 a1 7f ec b6 00 00 00 1c 00 00 40 05 | cc 1e cf e5 ba 96 b4 e9 50 32 59 97 59 23 89 39 | 4f 1c 94 28 | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800d120 | #125 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 42 71 02 91 3f e5 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #125 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #125 | rejected packet: | f8 42 71 02 91 3f e5 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #125: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #104 | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #104 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #104 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49611.014246; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004011 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #104 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 "road-eastnet-nonat-104" #104: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #104) | c8 97 67 f1 1b 46 da 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 e4 3d 30 95 de e5 8c 73 da 01 a0 e2 a0 c0 5e | ab 07 43 87 84 24 88 49 ca d1 13 72 cc 7b 38 93 | 5a ab ff 3c 3d d2 b7 a9 16 19 a5 56 5c 01 9f 05 | 2f 70 be 2d 9d 04 2c f7 80 b3 5f 24 70 c4 0d 58 | b9 f4 31 d3 bd 25 62 64 07 37 4c 59 6f a0 74 90 | e2 15 77 64 4c 06 2d 41 bc 70 c3 30 0a 01 9b df | a0 88 42 69 26 57 a1 25 9a c0 ee 4c ee 57 50 5f | 0c 95 2a a5 72 cb d8 81 34 25 75 ee 4d 04 23 27 | e9 da 7c 36 60 32 11 97 39 d8 f4 3f 96 13 6c 72 | 19 1d 43 e4 f0 4a 92 88 29 4c 84 63 63 7d 3a aa | 3f 23 85 5a 73 71 01 2f 63 e6 b3 a0 2d 7f 75 e1 | e9 d4 1c 1a 83 67 2e 29 49 85 8a a1 31 04 a5 31 | 1b e6 35 a4 14 80 ac 17 6c 11 db 3d c3 88 57 d2 | 55 c5 b6 4e 2c 2b 58 d9 50 1f f2 54 b6 50 63 00 | d4 ad 6c 3c 60 cd 52 3b 9b 0f 69 cc f2 8f 29 dc | 29 5e 75 22 60 a0 c9 59 5b 00 1a 98 02 fb 23 0f | 29 00 00 24 16 fd b9 d2 33 64 36 d1 f0 bb fa 0d | d8 4a 7e 7c 2a 2e d1 92 40 9f bf f6 34 ac 7a 15 | 2b 49 c7 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 28 db 0c 20 22 dd ba ac 9b fa 10 | b6 bd 27 81 bf 6a a0 a8 00 00 00 1c 00 00 40 05 | 90 9a 71 02 e5 61 58 ec fb 0f 5f 95 cd f2 2e 99 | e5 4b 54 60 | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #104 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 97 67 f1 1b 46 da 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #104 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #104 | rejected packet: | c8 97 67 f1 1b 46 da 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #104: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f7760 | handling event EVENT_RETRANSMIT for parent state #79 | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #79 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #79 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49611.017513; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004035 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #79 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 "road-eastnet-nonat-79" #79: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #79) | cb 0e 87 22 6d 04 19 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 8d fa 75 ee f5 0c 34 b3 09 04 c3 a6 70 35 18 | 8c e8 6b 6c 5c 5b 2d 90 26 5a 5e f9 d4 07 05 c2 | f5 73 64 12 f5 c2 51 38 6d 89 1a 0c 01 ef 01 94 | 08 08 2e cb 41 34 b4 4a 2f f7 ed 3c c1 7e 04 ba | 4c cb 90 52 00 84 c7 1d 71 85 6e 14 f7 d6 ba c6 | 6a 98 c9 b3 82 dd 58 3d c8 6f 45 92 9b e7 64 4a | 6e c9 47 ec bd a8 a4 79 ac 0e 9c ec e9 38 db 99 | d6 25 d7 25 8b 64 97 e5 d5 6a 07 ae 6b 9a 25 6c | ea 70 9f 4a 9e ba a1 e7 d8 d9 69 c1 2c a9 28 e5 | 2c 51 5f 2a f8 17 0e 3b 43 9f 77 5e 3a 59 4f 18 | 6f 20 ad 6e aa 63 b5 82 47 75 97 d0 4a 75 bf 68 | 0b ac a2 f9 6c 9d b8 21 cd c5 79 8b 66 f4 0e 4b | 32 8b f9 5e de 93 2f 2f 11 cf e9 f6 3a 2b 4b 7a | bd 3c a3 27 78 6d f5 6c 33 13 d9 14 f8 0e 44 d7 | 3e 91 89 43 f4 2f 9b b6 ab 6d 76 71 13 52 45 fd | 0e 5e 7c 72 38 35 d5 eb 86 2e 14 37 c5 c9 56 83 | 29 00 00 24 5a 77 8f b1 9a 0e 27 f5 13 b5 b3 3b | 54 a7 64 e6 f0 cd 7e 6d c0 5a 2d 35 86 f1 cb 9d | 32 23 be bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 31 42 b5 5a b6 78 6b 4f 08 f8 04 | 13 cc 8c 45 a7 cd ab bc 00 00 00 1c 00 00 40 05 | 2d 9f b7 7e f4 d4 af ae b0 e9 56 0d ae 10 83 85 | d2 ea 45 54 | libevent_free: release ptr-libevent@0x7fb3780251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f7760 | #79 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cb 0e 87 22 6d 04 19 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #79 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #79 | rejected packet: | cb 0e 87 22 6d 04 19 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #79: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-132" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-132' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #132 at 0x557d46a88c40 | State DB: adding IKEv2 state #132 in UNDEFINED | pstats #132 ikev2.ike started | Message ID: init #132: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #132: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #132; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-132" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-132" IKE SA #132 "road-eastnet-nonat-132" "road-eastnet-nonat-132" #132: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-132 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-132": constructed local IKE proposals for road-eastnet-nonat-132 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 132 for state #132 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469f7760 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #132 | libevent_malloc: new ptr-libevent@0x7fb3780251c0 size 128 | #132 spent 0.15 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 resuming | RESET processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 starting work-order 132 for state #132 | RESET processing: connection "road-eastnet-nonat-132" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 132 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.253 milliseconds in whack | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 132 time elapsed 0.000956 seconds | (#132) spent 0.961 milliseconds in crypto helper computing work-order 132: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 132 for state #132 to event queue | scheduling resume sending helper answer for #132 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #132 | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 132 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #132 | **emit ISAKMP Message: | initiator cookie: | 8f fb fe 61 19 e1 9c b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-132 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 35 1f 4f d1 68 44 b0 da 10 cc a3 65 0b 05 29 46 | ikev2 g^x a5 ef 62 34 d2 17 30 f6 7e b7 1c 3d c0 61 fd c8 | ikev2 g^x 25 96 8a e1 67 57 19 a7 8f 6a aa 6e 4c 1e 1c bb | ikev2 g^x 2a 10 04 d7 17 65 58 ce 83 ac 91 4f 48 71 e3 8d | ikev2 g^x af 3f 22 d8 df 00 4a d4 1b df 76 a7 ad 26 ba ba | ikev2 g^x 91 be fb 08 a9 70 66 2f 99 bf ef e8 c6 21 cc c0 | ikev2 g^x ed 1d fb 20 f6 60 07 53 22 da 88 1b 1d 11 4a 37 | ikev2 g^x e6 c8 75 11 02 89 b4 55 ec 0c 8b 31 52 06 0f 18 | ikev2 g^x 81 e2 42 d3 fe 87 7f dc c5 02 18 bb 87 cb 91 7a | ikev2 g^x 01 aa 5e f6 49 fd e3 ed df 8b 65 4a 5d 0c dc 05 | ikev2 g^x 45 9e f7 6f 6c 11 d8 bd 19 75 3d 5b 55 32 77 3d | ikev2 g^x 44 4c 11 8d 32 50 da 6e 0a 86 ef 69 5f 2a bb 9d | ikev2 g^x b7 76 10 6b da 52 00 cf e9 de 40 71 fd 9c 21 a3 | ikev2 g^x 2a ac 7a 1a 3b 67 9b 88 e6 1e 25 7c 3a 6e 9c 54 | ikev2 g^x 4b 96 e9 1a 08 38 3b 3b 27 21 e9 0c 79 a6 d9 1c | ikev2 g^x 14 07 fc c1 42 9e 29 79 0d 68 f7 e2 3d 93 ce 38 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 92 fc 82 18 58 23 4b 06 62 ee b8 b2 f1 d5 54 0c | IKEv2 nonce 3d b0 88 33 58 36 a6 39 d7 5f 04 ee ca 34 01 ca | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8f fb fe 61 19 e1 9c b7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 84 | natd_hash: port= 01 f4 | natd_hash: hash= 38 e7 04 0b 0d 59 5a cd 8a 54 e3 8a 4e 81 3b 76 | natd_hash: hash= de 25 c1 57 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 38 e7 04 0b 0d 59 5a cd 8a 54 e3 8a 4e 81 3b 76 | Notify data de 25 c1 57 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8f fb fe 61 19 e1 9c b7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c3 b5 61 af 5d 2d 46 0f c8 2c 48 99 41 b8 6c e0 | natd_hash: hash= 5b 12 cb e3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c3 b5 61 af 5d 2d 46 0f c8 2c 48 99 41 b8 6c e0 | Notify data 5b 12 cb e3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #132 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #132: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #132 to 4294967295 after switching state | Message ID: IKE #132 skipping update_recv as MD is fake | Message ID: sent #132 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-132" #132: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.132:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #132) | 8f fb fe 61 19 e1 9c b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 1f 4f d1 68 44 b0 da 10 cc a3 65 0b 05 29 46 | a5 ef 62 34 d2 17 30 f6 7e b7 1c 3d c0 61 fd c8 | 25 96 8a e1 67 57 19 a7 8f 6a aa 6e 4c 1e 1c bb | 2a 10 04 d7 17 65 58 ce 83 ac 91 4f 48 71 e3 8d | af 3f 22 d8 df 00 4a d4 1b df 76 a7 ad 26 ba ba | 91 be fb 08 a9 70 66 2f 99 bf ef e8 c6 21 cc c0 | ed 1d fb 20 f6 60 07 53 22 da 88 1b 1d 11 4a 37 | e6 c8 75 11 02 89 b4 55 ec 0c 8b 31 52 06 0f 18 | 81 e2 42 d3 fe 87 7f dc c5 02 18 bb 87 cb 91 7a | 01 aa 5e f6 49 fd e3 ed df 8b 65 4a 5d 0c dc 05 | 45 9e f7 6f 6c 11 d8 bd 19 75 3d 5b 55 32 77 3d | 44 4c 11 8d 32 50 da 6e 0a 86 ef 69 5f 2a bb 9d | b7 76 10 6b da 52 00 cf e9 de 40 71 fd 9c 21 a3 | 2a ac 7a 1a 3b 67 9b 88 e6 1e 25 7c 3a 6e 9c 54 | 4b 96 e9 1a 08 38 3b 3b 27 21 e9 0c 79 a6 d9 1c | 14 07 fc c1 42 9e 29 79 0d 68 f7 e2 3d 93 ce 38 | 29 00 00 24 92 fc 82 18 58 23 4b 06 62 ee b8 b2 | f1 d5 54 0c 3d b0 88 33 58 36 a6 39 d7 5f 04 ee | ca 34 01 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 e7 04 0b 0d 59 5a cd 8a 54 e3 8a | 4e 81 3b 76 de 25 c1 57 00 00 00 1c 00 00 40 05 | c3 b5 61 af 5d 2d 46 0f c8 2c 48 99 41 b8 6c e0 | 5b 12 cb e3 | state #132 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3780251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469f7760 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a82ac0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #132 | libevent_malloc: new ptr-libevent@0x7fb3780251c0 size 128 | #132 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49611.02421 | resume sending helper answer for #132 suppresed complete_v2_state_transition() and stole MD | #132 spent 0.335 milliseconds in resume sending helper answer | stop processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35802a950 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f fb fe 61 19 e1 9c b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #132 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #132 | rejected packet: | 8f fb fe 61 19 e1 9c b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #132: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46906b40 | handling event EVENT_RETRANSMIT for parent state #118 | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #118 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #118 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49611.02536; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001615 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #118 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 "road-eastnet-nonat-118" #118: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #118) | 8e a7 a4 7e e9 0a bc a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a ec c5 01 c5 e9 b5 94 ac 43 67 db 08 47 bd 0c | 54 49 81 74 3a 3b f9 51 2c 6b 48 98 c1 d5 7c ee | 4b 95 1c 5e 71 e6 0b 08 a0 85 de c0 1d ef b9 d0 | 5c f8 32 2b 5d f8 44 47 b6 dc c5 4b 50 10 f9 77 | 99 80 83 bc 5c bf 6a 79 a5 41 39 97 c6 b0 17 4c | 84 d1 fa 16 7a 7a 3e e5 51 2d fc 5d b0 66 e1 6f | 66 c6 ed f3 a4 54 56 06 ac 5d ee b2 4b 4a 38 5f | aa 09 29 91 e5 8c 9b 64 60 8e 7c f6 86 7a 07 43 | f1 93 d1 26 4a 28 da b7 0c a1 1a 0c 4c d6 c5 1f | ee f5 92 b2 e4 15 93 35 4c 07 88 be ec 21 4e 23 | f9 ed 56 db b0 43 b1 c7 7d 57 a1 20 bb 88 d2 9a | 23 9e be ef e2 0d b6 dc 67 12 32 69 0b ef 17 5f | 45 8b bf 08 ff c1 84 fb d6 41 58 81 ba c4 68 e8 | 6d 5c 50 c4 fa 14 2d 1e b6 d3 3f da 53 ee 59 40 | e0 c2 e3 5e 46 f4 96 f5 35 c7 87 50 c6 81 32 4e | 30 f8 e6 fa a0 f5 a3 88 f0 51 68 02 71 eb f4 fa | 29 00 00 24 fc fa 6f 0b ed d7 fd 9b f1 eb 70 56 | 1f a0 0f 98 c6 28 ab da a8 c2 09 53 33 ea a7 33 | 5c 74 50 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e 87 94 32 ac f3 4e 0f e0 49 b5 2d | ec 68 6c 45 41 83 dc 40 00 00 00 1c 00 00 40 05 | e8 e9 7b b7 56 9d 8b dd 59 77 e6 95 c2 ea 88 7c | d5 64 a3 dc | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46906b40 | #118 spent 0.0919 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a15810 | handling event EVENT_RETRANSMIT for parent state #25 | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #25 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #25 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49611.025463; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004584 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46906b40 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #25 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 "road-eastnet-nonat-25" #25: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #25) | 78 5e ec 19 c3 e9 2e 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 3a 20 04 5c a3 28 e0 27 26 70 8b 2f d3 d3 dd | 4a ad b8 1e 2e 37 87 d2 d3 a8 c4 9d c6 ee 0f a0 | 73 84 05 06 74 d6 4d 07 19 2b 12 8b 69 7a 83 b9 | 89 8c 88 b4 63 15 c8 b2 2d cc 49 7a 79 d1 07 bf | ee 4e b7 0b 0d 2d 3d 97 a7 24 aa 10 a0 e9 fc 77 | 06 e9 cd 21 f9 64 fc 4a 83 9d 5e f3 a2 9b 32 c3 | d3 50 6b 09 58 29 c8 67 c4 22 3b 38 ef 52 9f dd | 6e 41 e8 16 88 89 59 a6 9f 8d 30 13 4e 6f 06 5b | 1b 0e 62 f8 90 29 6e c8 e5 89 28 a2 ea ec 59 64 | 67 71 02 aa 61 49 46 0f fe 0a d1 4d 62 20 44 13 | 22 6b 41 1e 83 c0 52 5c 04 b5 86 ac e3 c4 87 52 | 79 53 63 6b c1 fd a7 16 e1 a2 b6 27 78 fe 10 69 | 79 cb f1 75 47 7f aa 61 41 c8 00 01 b4 6e 89 cf | 41 c5 e9 e7 92 08 38 fd 15 78 0a 2b 93 44 c9 ca | b1 70 2a 2b ec 91 fe 70 63 59 89 8e 57 c3 33 c3 | 54 24 a1 21 c8 2a c0 85 b2 60 de 71 38 dc 7c 22 | 29 00 00 24 e1 d5 1d 82 b2 16 85 fd 33 85 77 2b | fc 68 12 4a cf f8 6e 1b 7e ab 43 df ab 9a a1 84 | be 92 7e 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a 8e 47 d6 ba 1e 42 85 a7 7b 2f db | 65 2a 1e ef d5 42 ee 43 00 00 00 1c 00 00 40 05 | 5d 12 0d 5e 92 91 ee 2b 6d 12 02 e9 64 25 a1 22 | eb b7 d7 ed | libevent_free: release ptr-libevent@0x7fb3440180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a15810 | #25 spent 0.0699 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e a7 a4 7e e9 0a bc a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #118 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #118 | rejected packet: | 8e a7 a4 7e e9 0a bc a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #118: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 5e ec 19 c3 e9 2e 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #25 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #25 | rejected packet: | 78 5e ec 19 c3 e9 2e 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #25: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0379 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350005860 | handling event EVENT_RETRANSMIT for parent state #126 | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #126 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #126 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49611.052713; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500379 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a15810 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #126 | libevent_malloc: new ptr-libevent@0x7fb3440180b0 size 128 "road-eastnet-nonat-126" #126: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #126) | e8 37 9e 74 e5 40 14 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 2e 1b 05 80 5b 31 08 d1 66 2e 5c f6 e3 82 b6 | cf 5f b9 6a dd 55 f8 75 d5 3d b8 5c bd 4f c2 50 | 0a c1 a5 ba ac d3 ed a9 a2 26 e9 cf 5d c3 e4 66 | fe 0f 85 c2 a3 49 2f d8 4a 79 55 9a fa 0f f5 79 | a1 74 22 f0 7e 0f 09 7b 62 ab a2 9e b4 ea 39 68 | 42 b2 f9 25 9e 6d 73 5b 0f 09 1e ea 93 29 57 3e | 0b 28 34 22 62 d9 38 bd 99 bc 2b d5 1f 39 74 2e | a0 e4 e1 6b 64 87 fc 4f 05 cf 11 87 31 49 19 0e | 81 e6 fe 59 5e 93 b2 b8 96 16 02 eb 5c 73 68 d5 | 8f 57 c4 c3 f1 4b 35 e7 45 9d 6f ab 95 16 38 da | 48 f9 98 9a 6a b3 e3 05 7e d3 b1 16 a3 ba 0c e1 | 94 2d b8 d2 c3 17 d4 a2 cf ba 7e e1 17 95 db f9 | 30 a3 18 b6 15 c5 b0 4b 3c 79 61 0d 1e 89 51 db | 9f 34 0b 87 9c ce 8f 37 05 a4 88 d5 17 64 46 6f | 94 21 dd 40 17 99 04 39 5f 44 53 61 87 2c 68 27 | 48 25 14 cc 6b a9 f6 c2 49 c7 4e ae 4c 5d 8d 5b | 29 00 00 24 d1 b1 6b 78 78 5e 9b dd d4 c3 b9 87 | 6c a1 e5 10 d6 78 32 5b 72 67 12 c8 56 ea b2 20 | 83 0f e6 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 48 05 b5 88 11 05 1e fc 96 b7 8b | c4 84 87 55 48 6d 71 7e 00 00 00 1c 00 00 40 05 | a7 78 89 b5 72 dc 59 97 b9 1b 86 02 9b 2c 28 d0 | 8e b7 7c 05 | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350005860 | #126 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 37 9e 74 e5 40 14 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #126 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #126 | rejected packet: | e8 37 9e 74 e5 40 14 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #126: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.047 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46950 | handling event EVENT_RETRANSMIT for parent state #80 | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #80 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #80 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49611.078974; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00357 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #80 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 "road-eastnet-nonat-80" #80: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #80) | aa bd f3 45 40 fd 66 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a f9 52 fe 2c 07 55 9a 9f 75 be 2d bb 6b aa b0 | 07 01 f4 20 39 c9 c6 12 04 59 16 f7 53 ca 23 cf | b2 a3 d6 d7 cd d3 78 95 1e ae 2c b7 17 84 30 6c | 9a 6e 0d 1b ef 48 24 1d f1 c9 12 65 61 88 44 c9 | 4b 27 23 9a 65 49 0a 11 49 89 68 1f 69 8b cd 8d | e9 1c 22 5e 52 f0 a3 c1 f7 8e 10 9b 8e 27 61 b3 | aa d7 5b 30 40 8f 25 2e 0d 7c bd dc 0e 4d aa 95 | b6 5a 44 77 7b 33 24 ed 5e bf f2 78 c5 d8 1e 5c | 38 0e af a8 70 85 81 7a 43 7a de 45 73 d1 23 0a | 21 50 82 2c fb 48 a9 b6 ed 4a 3a 01 52 3d 91 cf | 62 7a 95 ef ff 5d 9f b3 85 63 dc f5 46 12 fc e4 | ac 22 23 7e 8e 79 eb cb 39 31 bb de 91 1f fd 9c | 95 3c fe ca 99 40 e4 17 71 ad 8e 05 ed f6 14 9e | 6b 26 3c 1c 13 2f 5a 94 9d 9c cd 71 11 6d bb c9 | 9a 84 65 ba e1 3d ae 2e 2c 88 f5 b9 e4 60 97 3a | ad 9a 6f f8 77 43 67 40 a8 7b be e5 9d 13 c4 6d | 29 00 00 24 53 2a 2d 72 a4 0b ac f1 46 3b 88 60 | a1 1f 05 e7 3a 9a 78 ce 7e 03 67 44 f4 b3 91 7b | 4e 29 6b 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 ed 0c 1a de d8 39 29 7d 81 95 16 | 89 64 a4 1b c6 93 47 b1 00 00 00 1c 00 00 40 05 | 41 2d b0 0c 88 62 05 80 34 d7 2b cd 52 bc d2 c8 | ff 29 c4 37 | libevent_free: release ptr-libevent@0x7fb3580180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46950 | #80 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | aa bd f3 45 40 fd 66 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #80 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #80 | rejected packet: | aa bd f3 45 40 fd 66 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #80: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cc10 | handling event EVENT_RETRANSMIT for parent state #119 | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #119 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #119 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49611.085243; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000916 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46950 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #119 | libevent_malloc: new ptr-libevent@0x7fb3580180b0 size 128 "road-eastnet-nonat-119" #119: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #119) | ec af 1e 58 4f bc 16 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee 25 46 13 3c ef fe 01 ba 63 b1 50 ca a7 dd f5 | 7a b0 49 43 35 e3 74 57 d0 52 bc 3a b2 ee 6b 2d | 57 80 2f df 71 ea 94 b3 0a 0c 7b 41 50 c2 f6 7a | 6e 96 5b 3d 0d 51 9a 0b a0 fa d0 8d d8 98 f0 45 | d5 fa eb 0a f5 ea 33 8d ee 1d 3f cb 09 35 dc f7 | 0d a7 89 25 f9 a6 f9 a3 0f 9a 3d b0 bb 98 db 2a | 8f f4 ad 7f 6a ae b3 bd df 23 e8 8d 52 72 79 9f | 3d 34 85 f2 e2 b4 d7 cc 39 ee a0 dc 64 4f fa 2a | a9 30 c6 c2 7a 7a 1d cd 26 c0 0f 55 58 ed 9d 22 | c6 a1 9c 81 01 bd 16 3d 36 47 70 a1 46 0d 07 ca | 5c 2f 9d 3c 24 d8 e7 19 57 44 18 a0 58 ed b0 c8 | 65 f2 98 6e 64 04 01 87 4d c3 6e 78 76 c5 fa ee | ff 60 94 9e 6a fc 5b 5e 1a 15 3a a6 4d fe ba 28 | 39 70 2d 49 9e b7 11 89 3d 89 a8 26 59 f3 51 ef | 05 36 27 99 84 62 16 13 24 49 d2 7d b9 18 a2 21 | 0f 0d 2a 9a 79 02 d0 e1 a1 af ee 7c 84 e5 76 9a | 29 00 00 24 93 ff 34 01 41 de 6e 58 b7 82 d5 c2 | 8a 60 ef 17 fc 48 d2 4e 23 80 6e 54 cf 7a 62 03 | 64 73 a8 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 43 1b c4 4b b2 17 2e 38 4e 57 6d | 6b 77 1d 82 1a c2 9c 87 00 00 00 1c 00 00 40 05 | f7 09 55 f2 00 b0 ce 9f d1 9c 54 d7 51 50 ae 6b | e8 b4 0e d9 | libevent_free: release ptr-libevent@0x7fb3780180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cc10 | #119 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec af 1e 58 4f bc 16 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #119 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #119 | rejected packet: | ec af 1e 58 4f bc 16 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #119: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0599 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-133" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-133' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #133 at 0x557d46a8a200 | State DB: adding IKEv2 state #133 in UNDEFINED | pstats #133 ikev2.ike started | Message ID: init #133: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #133: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #133; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-133" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-133" IKE SA #133 "road-eastnet-nonat-133" "road-eastnet-nonat-133" #133: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-133 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-133": constructed local IKE proposals for road-eastnet-nonat-133 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 133 for state #133 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2cc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #133 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 | #133 spent 0.148 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-133" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 resuming | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 13 starting work-order 133 for state #133 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 133 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.235 milliseconds in whack | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 133 time elapsed 0.001058 seconds | (#133) spent 1.02 milliseconds in crypto helper computing work-order 133: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 133 for state #133 to event queue | scheduling resume sending helper answer for #133 | libevent_malloc: new ptr-libevent@0x7fb35c02a950 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #133 | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 133 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #133 | **emit ISAKMP Message: | initiator cookie: | 93 2c 91 72 20 8c aa 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-133 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9c d8 f9 2c 2b a0 b1 31 57 35 e0 04 75 fa ff 27 | ikev2 g^x 53 64 2e 54 ea 38 e0 ef 52 11 3d 36 64 b6 af 29 | ikev2 g^x 51 f7 3a cb 03 fb a8 9c 8c 4c bb 74 63 76 7d d1 | ikev2 g^x a9 88 c4 5e 87 dd 7f 20 3b 30 84 84 16 86 c9 65 | ikev2 g^x d1 47 a8 28 8d 73 90 06 c4 7f 57 27 02 dd dc 34 | ikev2 g^x 3e 36 07 bc f4 b2 13 c9 ca 56 ee e3 b6 fc 0e 46 | ikev2 g^x 17 c4 47 02 3c 22 35 e8 99 a1 3a f2 88 57 e2 b2 | ikev2 g^x 76 46 aa bb c5 86 a7 a3 5d df 02 48 a4 96 00 22 | ikev2 g^x 34 1a 70 44 11 10 cb ff f2 1d 21 21 00 41 5a a7 | ikev2 g^x a1 5f 54 12 46 7f 51 02 26 94 4f 54 f8 0e be ce | ikev2 g^x 2f 5a 2b 9b 25 dc a0 31 41 2a dd d5 76 31 f7 83 | ikev2 g^x c2 70 58 eb 31 ba 5b 36 57 70 32 a0 20 3d ec e9 | ikev2 g^x 48 52 21 d4 39 1a 79 f6 31 e1 9a c8 d2 b3 fd 12 | ikev2 g^x 8c 10 74 fe 54 6f eb b1 c3 58 8e 49 2a 38 98 47 | ikev2 g^x 38 39 a8 64 1a 71 f1 c2 47 f8 d0 db da e6 75 10 | ikev2 g^x 1b a2 b7 e4 c4 eb b7 43 ca b9 9e 23 21 75 e9 b6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2f d1 c4 74 6b fd 49 84 52 1d 9d 1d ec af 19 02 | IKEv2 nonce 47 e5 8f b7 c6 73 48 d2 a9 91 58 b2 b6 74 d3 00 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 93 2c 91 72 20 8c aa 76 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 85 | natd_hash: port= 01 f4 | natd_hash: hash= 53 b3 b4 a5 c4 da 26 36 c8 2a e5 e1 3e af ad 98 | natd_hash: hash= 58 9a bf c4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 53 b3 b4 a5 c4 da 26 36 c8 2a e5 e1 3e af ad 98 | Notify data 58 9a bf c4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 93 2c 91 72 20 8c aa 76 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 31 45 bd 61 73 08 cb 41 73 c4 72 6c eb e0 15 88 | natd_hash: hash= 84 49 78 a3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 31 45 bd 61 73 08 cb 41 73 c4 72 6c eb e0 15 88 | Notify data 84 49 78 a3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #133 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #133: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #133 to 4294967295 after switching state | Message ID: IKE #133 skipping update_recv as MD is fake | Message ID: sent #133 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-133" #133: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.133:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #133) | 93 2c 91 72 20 8c aa 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c d8 f9 2c 2b a0 b1 31 57 35 e0 04 75 fa ff 27 | 53 64 2e 54 ea 38 e0 ef 52 11 3d 36 64 b6 af 29 | 51 f7 3a cb 03 fb a8 9c 8c 4c bb 74 63 76 7d d1 | a9 88 c4 5e 87 dd 7f 20 3b 30 84 84 16 86 c9 65 | d1 47 a8 28 8d 73 90 06 c4 7f 57 27 02 dd dc 34 | 3e 36 07 bc f4 b2 13 c9 ca 56 ee e3 b6 fc 0e 46 | 17 c4 47 02 3c 22 35 e8 99 a1 3a f2 88 57 e2 b2 | 76 46 aa bb c5 86 a7 a3 5d df 02 48 a4 96 00 22 | 34 1a 70 44 11 10 cb ff f2 1d 21 21 00 41 5a a7 | a1 5f 54 12 46 7f 51 02 26 94 4f 54 f8 0e be ce | 2f 5a 2b 9b 25 dc a0 31 41 2a dd d5 76 31 f7 83 | c2 70 58 eb 31 ba 5b 36 57 70 32 a0 20 3d ec e9 | 48 52 21 d4 39 1a 79 f6 31 e1 9a c8 d2 b3 fd 12 | 8c 10 74 fe 54 6f eb b1 c3 58 8e 49 2a 38 98 47 | 38 39 a8 64 1a 71 f1 c2 47 f8 d0 db da e6 75 10 | 1b a2 b7 e4 c4 eb b7 43 ca b9 9e 23 21 75 e9 b6 | 29 00 00 24 2f d1 c4 74 6b fd 49 84 52 1d 9d 1d | ec af 19 02 47 e5 8f b7 c6 73 48 d2 a9 91 58 b2 | b6 74 d3 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 b3 b4 a5 c4 da 26 36 c8 2a e5 e1 | 3e af ad 98 58 9a bf c4 00 00 00 1c 00 00 40 05 | 31 45 bd 61 73 08 cb 41 73 c4 72 6c eb e0 15 88 | 84 49 78 a3 | state #133 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3780180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2cc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #133 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 | #133 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49611.087648 | resume sending helper answer for #133 suppresed complete_v2_state_transition() and stole MD | #133 spent 0.323 milliseconds in resume sending helper answer | stop processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c02a950 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 93 2c 91 72 20 8c aa 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #133 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #133 | rejected packet: | 93 2c 91 72 20 8c aa 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #133: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0536 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f4be0 | handling event EVENT_RETRANSMIT for parent state #105 | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #105 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #105 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49611.094818; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002443 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f7760 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #105 | libevent_malloc: new ptr-libevent@0x7fb35c02a950 size 128 "road-eastnet-nonat-105" #105: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #105) | f1 44 62 e8 b2 96 b0 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 2c 0f 43 7a b6 95 d2 da 02 c7 c3 b7 c1 84 3a | 45 85 a1 11 41 47 db 34 2a fb b4 18 d1 bf ea 06 | 1a 10 f5 e2 f0 2e 22 4f eb 14 58 fa 5c 28 c5 97 | e2 ae 87 b0 f4 b2 19 f2 c0 72 df 2a 2b df 2e 30 | f5 e9 e3 d6 5a 85 fc e6 1c 1c 2d 36 25 55 ff d7 | e9 f8 4f e9 95 2f bf 23 70 c4 27 2f 59 aa 5a d4 | 00 1b f9 ac 9d 1b 73 43 66 d9 a7 24 55 56 33 f4 | df 70 86 46 09 22 db 6f ad cb 9a 9a bd 6e 03 ac | ab d8 ee 40 d0 e9 4f 4e ad 4c 58 0f 93 e2 e1 c8 | a2 ad 19 24 8d ca 10 9a 44 cb e8 b8 40 12 de e1 | 29 64 1e 40 f8 bf aa 87 bb 84 b2 5f 6f 0d 9d b9 | 12 51 1b 65 f4 ee e0 55 a1 dc 96 99 27 5b 4c a9 | 9a e4 cf 90 e8 fa 83 39 ff df 24 19 f2 75 1e b2 | 3a c5 5a ee 20 09 c9 38 60 08 ab 53 42 3f a9 0e | 51 ea 72 b2 25 2b b8 e3 e2 f5 9e 45 c1 0c 4c 33 | 68 83 d9 f1 9b 1b 60 f3 f4 29 c3 90 eb 9c dd 59 | 29 00 00 24 b7 9a f1 29 40 44 aa 07 d6 8e b0 7b | 73 1b 3f b3 0a e3 ed 21 f1 bb 89 35 39 a9 d4 99 | a7 53 6e 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 95 3e 47 a9 bf e3 9c 92 80 50 73 | b0 a9 03 26 40 9a 45 50 00 00 00 1c 00 00 40 05 | c6 93 aa 3b 5e af 6b 75 f9 54 eb f4 c6 61 f4 b6 | b4 32 51 f3 | libevent_free: release ptr-libevent@0x7fb3440251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f4be0 | #105 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f1 44 62 e8 b2 96 b0 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #105 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #105 | rejected packet: | f1 44 62 e8 b2 96 b0 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #105: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2e150 | handling event EVENT_RETRANSMIT for parent state #26 | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #26 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #26 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49611.104079; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004927 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a855c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #26 | libevent_malloc: new ptr-libevent@0x7fb3440251c0 size 128 "road-eastnet-nonat-26" #26: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #26) | f4 88 08 87 51 21 ca bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af d0 7b 56 fd 83 24 e2 7f 6d 07 5b 14 cf 37 08 | c2 df a1 e8 d0 3d d9 70 11 a2 f7 87 78 ef 74 57 | 42 80 b9 d0 66 00 01 7b 09 5e 7e 2a 26 27 6c f8 | 72 db 2f 73 3f 38 89 07 c7 29 09 0b 07 35 1d d7 | 5c 45 0c 9e 1b e1 95 53 4a ee ac 68 bd 09 aa 3d | 27 0f 50 02 03 b3 ad ea c4 c7 28 b1 bc b2 70 07 | fc b6 58 d4 ed 1b fe 1b 64 8b 86 a1 fe fc 72 d9 | f1 ba a9 eb 7d ce cd 2c b8 6e 00 33 4c be dd dd | 3d 98 b2 2e 58 56 f2 f2 80 02 eb 21 ee 6b bd 96 | 40 1f 33 62 77 0f c1 a2 eb f8 19 6e 1a 5e 18 e2 | c2 89 f7 17 30 91 11 29 f1 9d 22 c7 c8 11 a1 d6 | b3 ae 73 01 db d3 1a d2 95 3f af b3 66 e8 e4 3f | 7f 26 bd b3 f0 37 10 0c fa cc 87 cc 8d 67 d1 69 | 87 60 66 13 b3 cf ae b5 94 11 93 f7 71 af 4a e8 | 96 fa e6 46 bb bb 17 b4 9c 44 80 04 e3 4c ce 52 | 44 6c a3 c2 a0 6e 82 a5 21 5c cc c5 65 7c 81 dc | 29 00 00 24 8a 04 a2 be b1 ba fb 75 a9 90 e3 4a | e4 71 c4 43 1c fe 30 e6 85 0e 15 7e 50 52 02 a7 | d2 a1 ae dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 32 7f b1 02 26 47 ea b2 9e 1c ce | 0f f8 7e 1c 87 59 f3 12 00 00 00 1c 00 00 40 05 | f0 af 8c 45 09 60 6e 14 7f 54 da 7f 84 35 07 83 | 60 40 27 0a | libevent_free: release ptr-libevent@0x7fb35800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2e150 | #26 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 88 08 87 51 21 ca bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #26 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #26 | rejected packet: | f4 88 08 87 51 21 ca bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #26: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37000d120 | handling event EVENT_RETRANSMIT for parent state #81 | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #81 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #81 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49611.143353; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004403 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2e150 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #81 | libevent_malloc: new ptr-libevent@0x7fb35800cf80 size 128 "road-eastnet-nonat-81" #81: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #81) | 66 17 84 1d 01 f5 89 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 79 cf 2e c9 58 5a cf 22 0f e4 95 f3 b3 ec e3 | d7 ab 2d 5f 01 54 3c c5 38 6c 9c d3 40 e3 80 92 | e9 89 68 26 a0 e4 bb a0 7a eb 4c f1 e4 9f 20 12 | 58 2a 4c f1 f2 df 9a 6d 19 39 bd 12 58 10 e1 11 | 60 c9 9d ed 18 33 de 94 c1 bb 5d 21 df 07 9b 4e | 1e ae ec 4e 5f 9a 7f b4 b3 f8 3c 10 c2 09 ea 68 | 5d bc a9 fd 8a bb 40 95 8d 3b d1 39 da 16 f8 a8 | 93 df 32 68 37 e0 b9 31 f0 a7 f2 55 d6 2d bc ef | ef 45 3f e8 34 12 fc 98 2a dc 19 03 8b dc 1f 09 | cd 02 40 97 95 a7 39 71 09 ba 54 e3 53 28 2c b9 | 98 bb af 3a 25 6b e9 e7 4c 76 46 d1 aa 9d 3b 59 | 03 52 8a 61 f9 f7 83 33 a1 6c a0 29 48 f7 36 48 | 3a 5a f9 b5 72 5e fe 9f e0 84 df 16 32 28 ce ca | c6 27 c5 b5 d7 f3 93 db 10 54 fb f4 c3 70 76 d4 | 5f 00 b9 4c 0d 91 91 e7 a8 18 4b 2b 7f cf a5 4e | 76 2e 5b 38 e2 0b 32 aa 89 74 93 4b e3 81 6f 21 | 29 00 00 24 78 b9 6f 78 8b 1e bb 84 c4 a1 7c 02 | 08 74 d8 82 11 75 a1 52 cd 59 45 9e 38 4d d2 1d | 56 1f 81 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 31 12 3e 08 55 9e 26 f3 2f be 08 | b5 7f 7c 7d c5 5f 44 c0 00 00 00 1c 00 00 40 05 | 16 fd af 38 8b 2a c1 77 ea 51 ea 68 dc 9b f5 3d | 6a 08 67 b3 | libevent_free: release ptr-libevent@0x7fb370012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37000d120 | #81 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 17 84 1d 01 f5 89 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #81 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #81 | rejected packet: | 66 17 84 1d 01 f5 89 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #81: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0564 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5f0d0 | handling event EVENT_RETRANSMIT for parent state #127 | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #127 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #127 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49611.144661; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500098 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37000d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #127 | libevent_malloc: new ptr-libevent@0x7fb370012840 size 128 "road-eastnet-nonat-127" #127: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #127) | 63 d9 7e 94 07 33 4b 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 5b 4a 46 df 60 33 0f 95 de e0 db c8 23 3c 72 | 78 4a 11 2d af 6a 95 71 57 bb 1d b2 0d c1 6e 56 | 18 59 e0 13 b5 5d 90 db b2 9a 12 87 33 39 67 e9 | 2a 2f bf ff 22 ca 7b ca ba cd 4e 56 00 bb 9c b4 | 81 b8 dd 6f 82 ec c7 49 d2 fc 91 38 84 1c a6 e9 | d6 e7 21 dd e8 11 d8 38 94 4d 8d 43 29 97 aa c4 | 81 24 9f fc d5 c9 48 0f a7 fe 34 f9 6d 30 3e 1f | 7a 4f f5 5e d9 cc da 01 80 42 b1 dc 13 04 fb 2f | cb ae 40 53 b9 7a ac 75 1a e1 0f 4b 6c 39 b0 ff | 2b d7 8e 64 87 22 57 2b a9 3e db 52 7f 0f 13 61 | 69 1f 61 e7 d0 1e 23 3d f6 9d 28 2b 3f e5 f0 23 | 95 70 12 d6 55 37 d1 5b 40 5e db 9b 46 bb 6c 24 | 88 d7 92 17 91 7b 88 03 03 b9 b9 93 f8 4d f8 75 | f3 71 3b 2a a2 b6 bc ae e3 8d ee 63 ed ee d1 97 | a9 a0 39 37 70 8d 13 eb 74 48 45 78 0b 87 f6 b1 | 15 7d 71 1f 58 45 48 e4 7a 5a b6 44 5f 0b 02 01 | 29 00 00 24 18 52 6f 35 05 34 eb 05 2a 3b d4 f4 | de e8 63 2a a6 7a 78 01 4b 37 13 8c b7 e1 00 ae | 6b 38 e3 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 57 41 80 41 67 da fb a0 6b fa cf | 8b d9 9a b2 68 5d 7b 8a 00 00 00 1c 00 00 40 05 | f9 e3 24 ce 79 a6 67 62 c8 57 cc ee 7e 1e 81 c5 | 41 7c 30 2d | libevent_free: release ptr-libevent@0x7fb37c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5f0d0 | #127 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 d9 7e 94 07 33 4b 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #127 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #127 | rejected packet: | 63 d9 7e 94 07 33 4b 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #127: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-134" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-134' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #134 at 0x557d46a8b7c0 | State DB: adding IKEv2 state #134 in UNDEFINED | pstats #134 ikev2.ike started | Message ID: init #134: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #134: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #134; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-134" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-134" IKE SA #134 "road-eastnet-nonat-134" "road-eastnet-nonat-134" #134: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-134 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-134": constructed local IKE proposals for road-eastnet-nonat-134 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 134 for state #134 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a5f0d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #134 | libevent_malloc: new ptr-libevent@0x7fb37c0251c0 size 128 | #134 spent 0.139 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-134" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.231 milliseconds in whack | crypto helper 17 resuming | crypto helper 17 starting work-order 134 for state #134 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 134 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 134 time elapsed 0.000719 seconds | (#134) spent 0.714 milliseconds in crypto helper computing work-order 134: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 134 for state #134 to event queue | scheduling resume sending helper answer for #134 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #134 | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 134 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #134 | **emit ISAKMP Message: | initiator cookie: | 80 c9 f7 0f 34 43 e8 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-134 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0a 45 e5 b7 ab 0c a4 4c 5f b2 54 d8 39 c5 f7 ae | ikev2 g^x a7 a1 c9 5c 2b 5a 97 72 d3 14 80 31 3f b5 24 0d | ikev2 g^x cb 02 f5 57 a3 d0 5f 51 b9 29 93 ae b9 a3 6f 26 | ikev2 g^x d5 1f 2c 2d f7 c7 46 60 60 aa 8f 11 69 88 d5 d6 | ikev2 g^x 7f c3 44 3b 7a f5 6e 59 77 4f a4 43 34 c4 26 e5 | ikev2 g^x ae dc 49 7d 8b cd 2b ab 18 68 bd 39 90 28 6c 4a | ikev2 g^x 23 91 a3 0e 3f fb 01 de 41 7d 06 32 ac 44 1c 44 | ikev2 g^x 83 e0 6e 5a 17 ec 28 70 e3 9f 5e 65 cd d5 6a 13 | ikev2 g^x f4 b1 48 8a 51 f8 b7 54 21 1a 5d da c7 53 38 a4 | ikev2 g^x e5 03 02 af 81 ae 46 39 d4 15 23 f5 a8 b9 79 ca | ikev2 g^x ed 1c 97 81 a2 68 bb 3f 5d 13 76 91 c8 b3 35 4a | ikev2 g^x a1 e6 8f 6f 10 12 49 6f 3e bb 3b bc 07 2d 62 f9 | ikev2 g^x 63 5c f1 5a ec c4 50 49 e3 cf a2 cc 8f 61 b4 4c | ikev2 g^x 09 95 92 ca 4c 19 06 a3 80 ad 6b cf ef 46 70 41 | ikev2 g^x 9a 5d 9d 72 62 c3 a0 af ac b6 f0 ed e6 2e a4 c8 | ikev2 g^x 97 d4 46 3b dc 90 f1 11 ff c1 1a f7 bc 4d b4 b1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d7 88 26 03 5a 89 cf 88 bf 43 40 13 b0 8c b4 f5 | IKEv2 nonce 85 1c 5d f5 ed 6d ea f7 d0 1d 42 5d 64 c8 0e 4b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 80 c9 f7 0f 34 43 e8 16 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 86 | natd_hash: port= 01 f4 | natd_hash: hash= 92 5d 43 f9 e4 68 67 0d 96 3e 2a d1 87 17 c9 81 | natd_hash: hash= 16 11 d8 11 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 92 5d 43 f9 e4 68 67 0d 96 3e 2a d1 87 17 c9 81 | Notify data 16 11 d8 11 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 80 c9 f7 0f 34 43 e8 16 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 17 79 69 7c c9 bf 1a b4 97 b1 98 46 4c 85 68 c7 | natd_hash: hash= a4 36 11 6c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 17 79 69 7c c9 bf 1a b4 97 b1 98 46 4c 85 68 c7 | Notify data a4 36 11 6c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #134 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #134: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #134 to 4294967295 after switching state | Message ID: IKE #134 skipping update_recv as MD is fake | Message ID: sent #134 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-134" #134: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.134:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #134) | 80 c9 f7 0f 34 43 e8 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 45 e5 b7 ab 0c a4 4c 5f b2 54 d8 39 c5 f7 ae | a7 a1 c9 5c 2b 5a 97 72 d3 14 80 31 3f b5 24 0d | cb 02 f5 57 a3 d0 5f 51 b9 29 93 ae b9 a3 6f 26 | d5 1f 2c 2d f7 c7 46 60 60 aa 8f 11 69 88 d5 d6 | 7f c3 44 3b 7a f5 6e 59 77 4f a4 43 34 c4 26 e5 | ae dc 49 7d 8b cd 2b ab 18 68 bd 39 90 28 6c 4a | 23 91 a3 0e 3f fb 01 de 41 7d 06 32 ac 44 1c 44 | 83 e0 6e 5a 17 ec 28 70 e3 9f 5e 65 cd d5 6a 13 | f4 b1 48 8a 51 f8 b7 54 21 1a 5d da c7 53 38 a4 | e5 03 02 af 81 ae 46 39 d4 15 23 f5 a8 b9 79 ca | ed 1c 97 81 a2 68 bb 3f 5d 13 76 91 c8 b3 35 4a | a1 e6 8f 6f 10 12 49 6f 3e bb 3b bc 07 2d 62 f9 | 63 5c f1 5a ec c4 50 49 e3 cf a2 cc 8f 61 b4 4c | 09 95 92 ca 4c 19 06 a3 80 ad 6b cf ef 46 70 41 | 9a 5d 9d 72 62 c3 a0 af ac b6 f0 ed e6 2e a4 c8 | 97 d4 46 3b dc 90 f1 11 ff c1 1a f7 bc 4d b4 b1 | 29 00 00 24 d7 88 26 03 5a 89 cf 88 bf 43 40 13 | b0 8c b4 f5 85 1c 5d f5 ed 6d ea f7 d0 1d 42 5d | 64 c8 0e 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 5d 43 f9 e4 68 67 0d 96 3e 2a d1 | 87 17 c9 81 16 11 d8 11 00 00 00 1c 00 00 40 05 | 17 79 69 7c c9 bf 1a b4 97 b1 98 46 4c 85 68 c7 | a4 36 11 6c | state #134 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c0251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a5f0d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5f0d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #134 | libevent_malloc: new ptr-libevent@0x7fb37c0251c0 size 128 | #134 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49611.147482 | resume sending helper answer for #134 suppresed complete_v2_state_transition() and stole MD | #134 spent 0.402 milliseconds in resume sending helper answer | stop processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35002a950 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 c9 f7 0f 34 43 e8 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #134 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #134 | rejected packet: | 80 c9 f7 0f 34 43 e8 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #134: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf50 | handling event EVENT_RETRANSMIT for parent state #120 | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #120 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #120 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49611.15269; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001252 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f4be0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #120 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 "road-eastnet-nonat-120" #120: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #120) | 87 fa a7 32 05 23 14 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec 6c 11 66 a6 95 d9 e6 e2 88 b9 98 2a 60 c1 38 | c4 e7 6d c7 8d 08 5f c7 b2 af 28 df 28 55 74 6b | 75 22 9e ab 67 eb 95 72 f6 3e 95 b3 15 85 4f d6 | c1 c3 2d 9e 07 29 16 41 13 5e bb cf c0 e6 4f 24 | 10 cc 57 fd 9c ba 63 ce ec 86 10 c7 d4 7c 34 a8 | a5 5b fd 1f 33 3b a2 f8 03 46 9a 66 74 53 5d 27 | bd d8 93 4e 14 8b 45 9a 6d ce b3 cb 29 f0 cc 6c | 0a 42 f4 3b 31 46 fc ae db a9 72 48 29 6a 06 1a | 3f 35 fb 97 be 23 c9 c4 df 59 9b d7 24 09 d8 73 | f7 9d 98 e5 b5 21 68 b6 e2 c9 13 2b 11 7a 73 1b | e9 35 93 72 82 45 b9 27 a7 9d a4 9d 09 5e 20 78 | 29 0e a5 bd 44 31 dd 75 00 a1 c2 9f 09 4f 24 eb | 16 42 da bf 3a 12 d4 84 33 67 7f 85 66 00 36 74 | 79 21 73 94 9b df b2 a9 01 30 1b db 75 7a 3d 46 | 6c 6c eb ca 16 ae 1a 85 9f eb e5 ef 46 e7 91 51 | ee 18 48 f1 20 6b 2b c6 77 fb 41 ba bd 6b 56 4e | 29 00 00 24 6f c3 ef a5 ff 17 51 3e dd e4 5e c3 | e4 15 2b 4d c5 b5 58 85 08 f4 21 f4 d7 43 b1 43 | 4c 64 51 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 47 24 d0 22 75 93 6e dd 7d f7 25 | 7b 0d 80 0a 15 3a a3 09 00 00 00 1c 00 00 40 05 | 8f c4 23 24 1b 0a 54 8e c8 2f b2 b8 ec 80 e9 f3 | ca 99 ed fd | libevent_free: release ptr-libevent@0x7fb3500180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf50 | #120 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 fa a7 32 05 23 14 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #120 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #120 | rejected packet: | 87 fa a7 32 05 23 14 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #120: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a24730 | handling event EVENT_RETRANSMIT for parent state #106 | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #106 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #106 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49611.177964; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003319 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf50 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #106 | libevent_malloc: new ptr-libevent@0x7fb3500180b0 size 128 "road-eastnet-nonat-106" #106: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #106) | fe df 65 eb e2 ca b1 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad da 7e a9 45 cb 20 7d e8 1c 81 82 05 64 57 6e | 75 d8 44 d1 29 49 80 30 70 57 33 94 8e d0 1f 14 | bc ae 59 d5 21 a0 94 8f 2c d7 0e ae 64 85 ee 4d | 50 69 c0 d8 4e 47 ef 8f 3a 2d ef b1 7b 6b a7 c8 | 8d 12 00 9d cb 02 d1 fa 1a e5 8c 51 be 6d 05 c8 | be 42 ed 64 5d 5d eb 43 74 14 7b 2e df 96 fd f0 | be d2 f5 e5 50 93 03 3d e5 7a 2c d8 01 5a 9b de | a0 3b d7 ce 9a ef 2b 39 02 de 74 61 50 3b eb 81 | 05 67 4f 23 be 3a 8e 5c be 32 5b 04 eb 4a 0a 52 | c4 c5 a5 9b 90 ef 60 8e e0 0b c4 2e df 2e 03 08 | 7d 0d 7d 77 85 98 9e 4b 28 0a fe 25 1d a7 29 db | 4e a8 1b 4a ee 35 1d 2c ba 8d 50 15 cc 00 fd b8 | 76 4c 44 ae c6 c8 10 0a ab 0a 64 76 0a 4d ee 2e | 50 89 e6 58 b8 26 b4 69 a0 66 8e 81 ad 9d da 80 | f3 00 a8 93 0e 88 6f 79 09 79 fc 16 36 77 35 c1 | 3d 72 2e 00 31 12 9c f8 70 79 c2 64 a5 05 9a 24 | 29 00 00 24 a4 51 db a3 25 2a 8b 08 e6 f6 81 86 | 04 5c da 12 5e 8f 68 4a 8c ec ef 5b e1 08 6f b7 | 57 a9 96 c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 f9 ad bd d7 95 65 27 17 8c 87 a1 | c4 9b a8 f7 4c 6b d7 13 00 00 00 1c 00 00 40 05 | 1a ac 1c ef 71 2b dc a9 6f 07 a5 2c d5 55 fb 6b | d6 5b 32 77 | libevent_free: release ptr-libevent@0x7fb38801abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a24730 | #106 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #27 | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #27 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #27 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49611.178164; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.013916 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a86b80 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #27 | libevent_malloc: new ptr-libevent@0x7fb38801abe0 size 128 "road-eastnet-nonat-27" #27: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #27) | dd bb 9e aa 71 2c a8 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa f5 f3 8a 2e ca 64 13 4e ef 73 e4 1f 3e 67 ad | a1 5c bf b8 82 2d 98 4b ba 2f 4b 9c 4a 49 f6 7b | 11 53 66 d7 f2 df c6 4d 6c e8 fe ca eb 65 f7 23 | 79 97 e3 ea 55 ca fa 7d 0e 42 d8 5c 14 c7 91 72 | a4 fc cd 45 56 42 b0 30 e3 75 4e 16 78 7d 09 4f | c2 b4 68 6b 47 a2 0e 20 da b0 6a 41 7f ac 79 d0 | d4 2d 42 99 fd 0a 3a e2 6d 7f 90 e8 4d 1a 00 b2 | e9 9e 2f 5f 8c ef b1 f3 83 5d 30 13 95 c4 ca 84 | fc 5b f8 fd 99 e0 ef 1a ad a3 e3 11 fc de 8e cc | 62 ac 46 25 e8 4f ae 15 57 eb 6c c5 d8 d5 81 b9 | c0 5f a7 29 95 52 01 a8 27 41 88 9f 21 51 57 97 | 0e c0 5b 72 b9 1f 72 3e c5 18 84 95 8f 3a f7 5b | 8e ab cb da 5c d8 78 8b 6b d1 3d 62 f9 12 53 ba | 86 1f 8f 29 ce 9f 76 76 1e 5f 01 99 06 da 91 72 | f3 a9 41 c1 f1 95 87 95 cf 5a fe 09 57 13 44 9d | 62 a4 a9 60 fa 79 cc f9 5d bf f3 2b 5c 5b b4 99 | 29 00 00 24 55 62 09 8a 44 b4 a9 1d d9 35 9c 9a | 78 93 87 c8 d6 2b f2 b0 a8 b2 26 80 5e 03 70 47 | 73 8a 49 c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ef ee 96 1f 62 1c cd f0 a1 f5 67 ee | 76 d8 b6 28 a5 c0 9f 1d 00 00 00 1c 00 00 40 05 | 69 41 25 fb 01 9f 0c 01 9b e6 f4 5d 86 8e 8e d0 | 2b 2d f0 b6 | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #27 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe df 65 eb e2 ca b1 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #106 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #106 | rejected packet: | fe df 65 eb e2 ca b1 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #106: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0761 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd bb 9e aa 71 2c a8 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #27 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #27 | rejected packet: | dd bb 9e aa 71 2c a8 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #27: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0649 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-135" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-135' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #135 at 0x557d46a8cd80 | State DB: adding IKEv2 state #135 in UNDEFINED | pstats #135 ikev2.ike started | Message ID: init #135: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #135: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #135; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-135" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-135" IKE SA #135 "road-eastnet-nonat-135" "road-eastnet-nonat-135" #135: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-135 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-135": constructed local IKE proposals for road-eastnet-nonat-135 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 135 for state #135 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb378005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #135 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 | #135 spent 0.16 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-135" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.252 milliseconds in whack | crypto helper 18 resuming | crypto helper 18 starting work-order 135 for state #135 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 135 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 135 time elapsed 0.000804 seconds | (#135) spent 0.761 milliseconds in crypto helper computing work-order 135: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 135 for state #135 to event queue | scheduling resume sending helper answer for #135 | libevent_malloc: new ptr-libevent@0x7fb35402a950 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #135 | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 135 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #135 | **emit ISAKMP Message: | initiator cookie: | 6f cc 42 0b fb 9b 4b 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-135 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d9 27 90 6c a9 76 2a c4 50 c5 bf 04 2d 39 82 d0 | ikev2 g^x f1 4e e9 ff 6c d4 67 d5 6a f7 c3 33 36 2d 41 eb | ikev2 g^x 01 b8 52 cf 33 75 55 83 36 e9 3b 1e e0 f5 4c 33 | ikev2 g^x f6 13 14 fe 0b 40 f0 7a 1d e6 e9 63 2c 7f 9b 3f | ikev2 g^x 43 d7 8b 49 de 08 d9 f7 cb b8 85 8d 24 76 ea 07 | ikev2 g^x 74 e0 eb 3b 7b 61 bd 6e d0 81 bc 30 2d b1 a8 bc | ikev2 g^x 95 7a c1 8e 91 81 20 78 4b 9d 5f 4b 55 88 98 a7 | ikev2 g^x 4c 89 7d 2e c5 f4 b0 76 31 ac d8 73 5d 09 ed 2d | ikev2 g^x bb 07 67 90 bf 59 f1 9b 89 79 b4 48 ab 68 0b 4b | ikev2 g^x a7 49 da 7c 24 b3 1c f9 17 8c 28 77 5a 6e 44 15 | ikev2 g^x 7d 9f 86 31 20 2d 95 04 ee 8e 03 70 03 dc 14 11 | ikev2 g^x e5 4b 44 1d be 0a 83 04 0b 7e 48 68 b0 0f 04 64 | ikev2 g^x 81 84 d0 41 fd 8b 49 2c f9 af ea 95 2c f3 49 aa | ikev2 g^x 7c 3c d3 83 ef 0f 20 1f 8b 15 3b 94 9d 57 0f 83 | ikev2 g^x e9 c9 85 72 a3 81 40 26 3d 9e 4f 4c 25 2e 6f de | ikev2 g^x 2e 5c c2 5b 74 8c 58 60 bd 5e 06 db 51 f6 b7 a3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4f 27 a7 6e b5 c8 d8 49 72 0f 78 be 0c 3a 88 f4 | IKEv2 nonce 37 97 d5 4f 51 27 f0 3f 45 0a b8 19 ba c2 3b 27 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6f cc 42 0b fb 9b 4b 6a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 87 | natd_hash: port= 01 f4 | natd_hash: hash= d2 5e 90 14 7c 0c 3f fe 72 ae db a0 43 97 c2 6c | natd_hash: hash= fa c9 b7 b1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d2 5e 90 14 7c 0c 3f fe 72 ae db a0 43 97 c2 6c | Notify data fa c9 b7 b1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6f cc 42 0b fb 9b 4b 6a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6c 85 24 93 7d cc 8d 2c 5e c0 f8 bf 19 38 1d 99 | natd_hash: hash= 5f b9 fd e3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6c 85 24 93 7d cc 8d 2c 5e c0 f8 bf 19 38 1d 99 | Notify data 5f b9 fd e3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #135 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #135: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #135 to 4294967295 after switching state | Message ID: IKE #135 skipping update_recv as MD is fake | Message ID: sent #135 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-135" #135: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.135:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #135) | 6f cc 42 0b fb 9b 4b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 27 90 6c a9 76 2a c4 50 c5 bf 04 2d 39 82 d0 | f1 4e e9 ff 6c d4 67 d5 6a f7 c3 33 36 2d 41 eb | 01 b8 52 cf 33 75 55 83 36 e9 3b 1e e0 f5 4c 33 | f6 13 14 fe 0b 40 f0 7a 1d e6 e9 63 2c 7f 9b 3f | 43 d7 8b 49 de 08 d9 f7 cb b8 85 8d 24 76 ea 07 | 74 e0 eb 3b 7b 61 bd 6e d0 81 bc 30 2d b1 a8 bc | 95 7a c1 8e 91 81 20 78 4b 9d 5f 4b 55 88 98 a7 | 4c 89 7d 2e c5 f4 b0 76 31 ac d8 73 5d 09 ed 2d | bb 07 67 90 bf 59 f1 9b 89 79 b4 48 ab 68 0b 4b | a7 49 da 7c 24 b3 1c f9 17 8c 28 77 5a 6e 44 15 | 7d 9f 86 31 20 2d 95 04 ee 8e 03 70 03 dc 14 11 | e5 4b 44 1d be 0a 83 04 0b 7e 48 68 b0 0f 04 64 | 81 84 d0 41 fd 8b 49 2c f9 af ea 95 2c f3 49 aa | 7c 3c d3 83 ef 0f 20 1f 8b 15 3b 94 9d 57 0f 83 | e9 c9 85 72 a3 81 40 26 3d 9e 4f 4c 25 2e 6f de | 2e 5c c2 5b 74 8c 58 60 bd 5e 06 db 51 f6 b7 a3 | 29 00 00 24 4f 27 a7 6e b5 c8 d8 49 72 0f 78 be | 0c 3a 88 f4 37 97 d5 4f 51 27 f0 3f 45 0a b8 19 | ba c2 3b 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 5e 90 14 7c 0c 3f fe 72 ae db a0 | 43 97 c2 6c fa c9 b7 b1 00 00 00 1c 00 00 40 05 | 6c 85 24 93 7d cc 8d 2c 5e c0 f8 bf 19 38 1d 99 | 5f b9 fd e3 | state #135 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb378005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #135 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 | #135 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49611.207557 | resume sending helper answer for #135 suppresed complete_v2_state_transition() and stole MD | #135 spent 0.439 milliseconds in resume sending helper answer | stop processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35402a950 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f cc 42 0b fb 9b 4b 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #135 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #135 | rejected packet: | 6f cc 42 0b fb 9b 4b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #135: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #82 | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #82 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #82 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49611.211749; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00696 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a24730 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #82 | libevent_malloc: new ptr-libevent@0x7fb35402a950 size 128 "road-eastnet-nonat-82" #82: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #82) | 0d 59 4a 91 cd 0d a8 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d de 62 a5 d0 5e bf 56 63 0e 91 36 97 7a 1e b1 | b4 16 cc 30 41 76 2c 4d 4b 72 e2 c2 b2 a1 f9 60 | dd 93 5e 0e 34 f7 25 c7 9f 53 30 68 3a c2 8d 97 | 4c 9d fc 02 66 0b d5 60 41 52 07 34 69 fd 84 a5 | ec 72 09 87 c6 8f 05 fb 8f 4e 6b ba 77 83 dc 16 | 60 81 0d a8 71 f3 cf c7 95 36 23 35 f7 97 ca 50 | b2 db d3 48 30 34 aa be 9a a2 37 9b 39 19 60 98 | ac 8b 67 73 12 da 16 80 58 c0 2a 80 56 eb 21 9f | 3c 3d 73 57 e9 89 d6 8c 3d 04 dc a8 2c a0 35 72 | 3a b3 ec 9f 41 04 d4 7f d9 68 36 d5 13 cd 39 04 | 57 48 05 ca 9e f9 64 20 0d 91 1f 4e 5d ee 28 d1 | 38 36 5d 35 10 47 60 e0 25 2a b4 90 4f 2b 22 f8 | 94 db c6 d0 bc a1 a8 ee 23 9e 12 7c 06 be 13 c9 | e4 f8 bb 10 03 1f 37 ab 38 d2 32 58 2a 26 f3 33 | 1c 60 32 46 6c a1 0e 88 78 61 ec 6b c9 dd e6 45 | 58 22 90 cf 6d f9 2b cd d5 02 5b 51 ea 18 fb dc | 29 00 00 24 61 df db a2 1d df 12 0c 5e ab 31 16 | 03 92 3a 6f 24 ce 35 05 3e f5 da 2f 7c 0d 1e 54 | bb d5 49 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 70 c6 55 5e 2d 9d b0 0a d9 87 23 | 4b f7 4f fa 28 d8 1e 81 00 00 00 1c 00 00 40 05 | 40 ed 3d f8 bd 8d 40 9e 57 65 9a d5 21 53 67 44 | eb 0f 4b 38 | libevent_free: release ptr-libevent@0x7fb38800a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #82 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 59 4a 91 cd 0d a8 c9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #82 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #82 | rejected packet: | 0d 59 4a 91 cd 0d a8 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #82: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35000d120 | handling event EVENT_RETRANSMIT for parent state #121 | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #121 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #121 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49611.221041; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00224 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #121 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 "road-eastnet-nonat-121" #121: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #121) | 1a c4 23 3a 2f fb 8d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 72 b0 fb 70 4e c0 8d 7d 37 18 c1 ce 4c 8b 63 | 3b ed bd b3 7c e2 68 d0 e4 78 d3 ff 67 2f 87 6b | 58 6e aa 28 e2 71 48 9f 9e 55 8d d7 f0 fa a8 2d | cf d6 ae d1 2d 00 58 7f 1d 28 13 c8 1c b2 dd 2d | 0b 8c e4 ed 5c aa b6 84 75 0e 0c f4 87 20 ea a7 | 6f 81 08 6f ca 1d ea a5 cc 8b 1d 07 3a 98 ee 34 | 92 f7 0d 60 c7 27 69 9a 54 db 7b c6 0a ed 9e 6e | 48 c9 2d 78 78 eb 23 a8 d4 08 fd 81 af 22 ee 61 | 94 de e2 4a 3e 31 5e 98 b3 8e 80 72 e5 9a 23 e5 | 36 5f 19 09 16 90 75 46 fe 81 ca 01 97 f5 9d b9 | ee 86 b8 f1 4d 40 49 77 bf ea d6 8d cf e1 3f ed | ea d1 6f a1 94 f1 b6 1e ce cf 58 8f 34 28 d9 e9 | 91 30 27 07 3d a8 1a 9e 1f 56 eb 39 c7 99 10 18 | f7 a0 93 02 25 a4 35 d3 3b 85 c6 a5 d4 ee 05 5a | 0a 2e cd 8b 56 c3 43 2f ad b6 de d6 76 50 8d 8d | 31 49 b6 ba ff a2 3a 1a 19 8e 58 36 38 db d0 39 | 29 00 00 24 ce 58 3c f3 71 03 62 3b f7 b4 bf 47 | 86 b0 47 20 d2 a4 5f 23 42 6a 81 bd c0 a6 20 e9 | 9a 46 27 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 ab b4 fc 6a e4 2a a5 95 ca 3f ba | 4a 7b 1d be 72 ff 8c 93 00 00 00 1c 00 00 40 05 | 7e 13 e9 d3 7d bc 8a 17 e1 3e 93 a5 d0 ee 9b cd | 6e 9a 4b 6b | libevent_free: release ptr-libevent@0x7fb350012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35000d120 | #121 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a c4 23 3a 2f fb 8d 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #121 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #121 | rejected packet: | 1a c4 23 3a 2f fb 8d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #121: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469defe0 | handling event EVENT_RETRANSMIT for parent state #28 | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #28 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #28 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49611.232338; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005462 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35000d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #28 | libevent_malloc: new ptr-libevent@0x7fb350012840 size 128 "road-eastnet-nonat-28" #28: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #28) | 8a 4b 73 21 31 f2 6a 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 df aa e5 83 52 1a b7 2d d0 6a 7e dc d8 a5 d6 | 60 61 e0 83 0f 2b 6a 2b b8 0c 87 3f 14 f7 2a a4 | 98 70 c5 3a a2 0f 1f 46 6a b1 86 1e e5 5c 59 31 | 32 22 91 5d a2 6a 04 29 2b 10 13 47 0d 40 ca 72 | cd e0 cf f3 84 ed 4f bf 99 02 d6 fe 28 30 e6 6c | 0e 7e ca 11 f9 11 9f a6 4c d1 42 ed 4a 0f de 1b | d1 6c 18 cd c5 6b d0 23 4a e0 04 a7 c5 ef 74 ac | 27 c8 ec 0e 1f 0d 3c 8b a9 02 76 2a 67 8e fc de | 50 4d 80 13 28 3f 33 79 17 2e 6d b4 b5 19 8a 07 | 87 4a ec 6e c5 3c fb 34 d8 bf 04 77 90 53 b4 91 | 82 d0 d4 cb ca fc 05 22 43 e7 d4 8d 52 a6 ff 42 | 3e 8b bc 55 2d a6 ee 39 af 98 64 0e 18 a4 e9 08 | 5d d9 7e 8e 5f 00 df 4b 1b cc 49 d9 d0 64 64 c8 | 91 98 82 46 10 8e 0a 7c d6 f9 65 30 9e a6 47 1d | b8 47 35 3b c7 13 08 d5 39 45 15 b2 10 ce ee 48 | 7d d8 33 00 3c 55 6c 41 f3 1e 7b 0e 34 03 4f b7 | 29 00 00 24 ad 13 98 57 a2 9c 4e ec e1 0a 80 5c | a0 80 42 e1 ab 4f 47 32 a1 1d 36 58 8b 1c 71 8b | 25 4d b5 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 83 6c 60 48 f0 55 9f 8d d1 7e b1 | fd da e6 ac 8a a5 fd 2f 00 00 00 1c 00 00 40 05 | 4a 9c 1d b6 db 3c dd 9b 4a da 5d 6f ea e8 da 4e | 08 2e ae f5 | libevent_free: release ptr-libevent@0x7fb38001abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469defe0 | #28 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 4b 73 21 31 f2 6a 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #28 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #28 | rejected packet: | 8a 4b 73 21 31 f2 6a 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #28: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #128 | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #128 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #128 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49611.237624; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500786 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a88140 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #128 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 "road-eastnet-nonat-128" #128: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #128) | 77 d1 59 6d 55 cb 18 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 01 e0 bd 82 fe e0 91 d9 ed 2a 7b 41 58 aa d2 | c1 83 b5 d4 08 da f3 c7 61 8a cf 68 fe 9a 21 e3 | 57 03 c4 31 d0 d0 ec 56 cc 27 d9 52 cc f2 63 0f | a0 ad 50 12 a9 19 98 c4 cb 8f 93 9b 57 4e ae 53 | 05 9f f7 4f 18 99 38 38 06 c2 82 4a ed ef 9d cc | 7b 44 9f 1c 19 10 74 71 d4 89 98 82 e7 d0 72 33 | aa 5f 8b bd da a0 8b 0a 73 9d 51 cb d2 a3 14 69 | d1 4b 0c 71 9d 71 26 5d bf 23 7a 67 5d 15 2b a2 | ce b7 8c 37 a6 d1 63 b0 6b dc f1 b5 b5 72 45 86 | c8 59 1a 35 a1 54 36 81 14 ea b5 34 cc 86 95 36 | de 73 da 51 28 93 ec 98 2d 7a d9 01 e1 1c 11 2d | 35 8e 59 23 0d de 42 1b 00 c8 28 40 ea c4 bc 1a | 0b 22 97 22 23 59 28 f2 30 da 60 85 07 fb be 9a | 26 22 87 03 aa 66 5a 47 26 21 89 bb a9 0e 6a fe | 60 1c 6c 90 e2 96 28 ae 41 e9 23 65 8c f4 23 57 | 72 00 10 88 06 ca 67 04 cf 4b c7 04 50 60 fe 2f | 29 00 00 24 3b ae 04 a3 29 53 44 16 26 36 89 01 | ad 8c c7 bd 38 5d c9 f9 a5 cd 29 aa 82 21 0f 5e | 4f 91 67 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 73 cd 7c c3 ca 92 54 ff 7d 3a 5c | 01 84 d2 b8 f1 a4 c9 bd 00 00 00 1c 00 00 40 05 | ec 18 dc 66 2d cf 71 2e 85 c0 4a 75 63 a1 b7 19 | b3 41 97 a0 | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #128 spent 0.0914 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 d1 59 6d 55 cb 18 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #128 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #128 | rejected packet: | 77 d1 59 6d 55 cb 18 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #128: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #107 | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #107 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #107 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49611.248878; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00259 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #107 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 "road-eastnet-nonat-107" #107: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #107) | ac 4e b3 f4 ed 6e 1b 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 73 84 90 b0 a1 c9 25 a6 16 5e 4b 67 ce 07 6b | 92 04 d0 37 9e 07 4b 09 02 c2 78 f5 a4 a2 15 3a | 81 d0 8e e8 00 40 7b 2f 93 05 4b f1 72 7f 82 62 | 11 07 a0 1f 82 07 75 ea 96 ea 88 0b 0d 07 25 f0 | 53 bc 84 a7 a4 75 94 5f 48 4e 4a 60 2b e3 6f 76 | 92 f7 9d 74 6e 3f f1 39 f4 ea a5 df f6 6b e2 19 | 19 b6 60 26 c6 fe d4 1c bc ad 80 f2 46 47 46 93 | 4a da 3f 4a 2e 08 aa d8 dd f9 58 37 f0 1b 68 77 | ce 96 bc c9 19 65 a5 66 67 6f a9 fc 8b f9 e5 15 | 20 ed ca 26 5a cf 00 8e 65 d8 10 df c9 2f 55 c3 | 64 dc 1d 41 fa 8c 1a 44 06 90 c6 59 bf c3 6e 3f | fb f3 89 2e c3 0c 98 20 fe c3 39 08 86 b8 6d 84 | 72 50 7b 56 51 ac 06 e0 20 77 cc 21 04 85 51 fd | 65 1e 59 7f 79 5a a9 9c 4e fa 78 0d d8 f6 cf 3c | cd 73 f9 1e 3d 38 88 98 9e 60 ec bd 06 0d 2d 0c | 39 4f f8 8a 60 2e a2 ac 6c bc 30 73 f0 bc 87 4c | 29 00 00 24 2b ab 2f 68 f7 5a dc 67 d2 bf 24 50 | 1d 74 5b c9 72 db b8 cd 99 25 80 eb 1e bb 50 81 | 94 b2 ae 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 39 55 8e 98 9a a9 9a 86 88 c5 10 | 1f 60 cd 0e 59 85 0d 5e 00 00 00 1c 00 00 40 05 | 18 34 33 25 63 a4 39 e3 ca 5d cd 23 8f 87 c0 51 | 02 99 ff a0 | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #107 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac 4e b3 f4 ed 6e 1b 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #107 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #107 | rejected packet: | ac 4e b3 f4 ed 6e 1b 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #107: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28af0 | handling event EVENT_RETRANSMIT for parent state #83 | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #83 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #83 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49611.268999; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004733 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #83 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 "road-eastnet-nonat-83" #83: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #83) | e6 2b 97 c6 d1 4c 13 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 e0 14 c2 4a 13 d8 77 12 b1 93 fe 09 ee 1d 88 | 31 85 5e 91 48 ad b1 20 71 3f cb af eb 92 c7 d3 | e3 3b dc e2 9e c2 45 29 c9 59 6d 7a 62 12 34 26 | 8c eb c3 61 ed 07 95 b3 f8 74 eb 61 63 eb 1c b2 | 60 84 c3 e0 69 12 37 aa 40 a9 ee 46 d3 1a 26 fd | 77 29 43 bd fd b4 e3 3b c7 a8 7e e9 e3 51 f4 e6 | b9 4a 57 59 1d 18 ef df e9 5a be 77 08 df e7 55 | 46 7f 6c 4f 13 29 e4 bb ef bd 6c fb 60 8b fc 62 | e9 ba c0 54 d3 2b 44 c6 2f 29 d7 34 b4 6b 61 c0 | c9 cb 1e cb a6 25 28 61 95 9e 2c f5 86 69 f9 7c | b8 7c 34 c0 e0 ed f4 f7 82 f9 b3 c4 8e 1a 55 fb | d8 ed 0f e9 ed ff da 76 3e bb 0b ca e5 d5 7e 00 | 28 52 cc 3e d7 7f e9 d9 c5 bd e9 a7 17 e5 95 51 | 9f 9f 95 b4 65 d9 e7 b3 d2 a5 c2 fe 86 92 6e 23 | 5c 06 60 94 75 50 49 bf 5b 48 f5 bd b4 b4 de 5e | dd 11 02 11 73 fd f3 0f cb 43 d1 ff 6c 2f 1d fa | 29 00 00 24 d9 ea 5f 5d e7 8b 27 ca 82 31 28 fd | 7a 4f 51 83 32 9a 18 8a 6e 2a 8b d4 95 e6 d6 b1 | 0f 0b a2 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf 83 ee f4 b4 fb 0f 43 eb c7 c4 87 | aa a0 5e 5c f1 0e 63 f4 00 00 00 1c 00 00 40 05 | 05 b9 81 d9 1f fe b2 68 6c 59 f2 c5 07 41 cc 9a | 8a 8b 10 9b | libevent_free: release ptr-libevent@0x7fb374024f80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28af0 | #83 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 2b 97 c6 d1 4c 13 c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #83 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #83 | rejected packet: | e6 2b 97 c6 d1 4c 13 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #83: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0668 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-136" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-136' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #136 at 0x557d46a8e340 | State DB: adding IKEv2 state #136 in UNDEFINED | pstats #136 ikev2.ike started | Message ID: init #136: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #136: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #136; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-136" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-136" IKE SA #136 "road-eastnet-nonat-136" "road-eastnet-nonat-136" #136: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-136 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-136": constructed local IKE proposals for road-eastnet-nonat-136 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 136 for state #136 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a28af0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #136 | libevent_malloc: new ptr-libevent@0x7fb374024f80 size 128 | #136 spent 0.162 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 resuming | crypto helper 7 starting work-order 136 for state #136 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 136 | RESET processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-136" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.253 milliseconds in whack | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 136 time elapsed 0.001063 seconds | (#136) spent 1 milliseconds in crypto helper computing work-order 136: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 136 for state #136 to event queue | scheduling resume sending helper answer for #136 | libevent_malloc: new ptr-libevent@0x7fb34802a950 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #136 | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 136 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #136 | **emit ISAKMP Message: | initiator cookie: | d6 c8 9e 97 21 46 fb d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-136 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 42 a9 84 13 62 aa bd 1d ad 3e 60 88 dc a9 35 5e | ikev2 g^x 57 2f a4 3a d3 ae c1 11 b0 24 19 68 c2 75 c1 4f | ikev2 g^x 59 cf f8 40 bb af 7e d1 b9 71 42 ce c6 09 6e 74 | ikev2 g^x 9e f2 29 0d 91 21 24 74 6d 2f 10 75 65 f8 b8 44 | ikev2 g^x e9 15 55 bb 2b 6f 25 4c 58 9b 0b 45 c2 40 5a 9f | ikev2 g^x ff e2 b3 e2 f7 0d c5 79 1b 00 36 3a 21 20 e7 06 | ikev2 g^x d4 05 ab e6 7f 0e 4f 26 f4 28 cb d2 12 3f 60 75 | ikev2 g^x e8 8c 1f 18 e0 09 73 82 2e 56 2f fe 00 1a 31 26 | ikev2 g^x 0b 05 07 a6 fc 87 93 26 a9 c2 69 7c 30 9c 7a 89 | ikev2 g^x e9 2a 6b aa c2 98 8a d1 cc 85 ab 8a 1d b6 6c 3a | ikev2 g^x 46 51 76 9a 2b ea bd 4c 92 d8 c8 5c 56 7a b8 5f | ikev2 g^x 71 f6 c7 f5 f4 4e c8 ce cc 9b 6f 50 15 3b 30 b5 | ikev2 g^x cc 32 0c 15 e6 9e 78 33 f4 30 d7 c5 bc a6 29 97 | ikev2 g^x 00 2f a4 12 c0 82 9e 84 f0 b8 38 05 f1 51 00 d1 | ikev2 g^x 48 64 6a f9 cc d7 36 54 45 d6 ee 3e 02 d0 d5 50 | ikev2 g^x ec e5 a0 1a 70 ee 96 eb 78 4d 45 6b e4 50 2d ed | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 24 22 aa ae c7 66 c9 3a 20 66 58 4a 54 df 58 65 | IKEv2 nonce c1 5d d7 a3 b2 c7 e8 e8 de 15 89 70 84 48 bb d5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d6 c8 9e 97 21 46 fb d1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 88 | natd_hash: port= 01 f4 | natd_hash: hash= 50 7f 22 d9 ee cc a0 1b 0a 4c ff 84 da dc a7 a5 | natd_hash: hash= 32 ec b3 c6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 50 7f 22 d9 ee cc a0 1b 0a 4c ff 84 da dc a7 a5 | Notify data 32 ec b3 c6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d6 c8 9e 97 21 46 fb d1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e4 4f b8 48 f2 80 69 e7 b9 85 06 aa 82 75 ce d9 | natd_hash: hash= b4 81 0b 76 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e4 4f b8 48 f2 80 69 e7 b9 85 06 aa 82 75 ce d9 | Notify data b4 81 0b 76 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #136 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #136: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #136 to 4294967295 after switching state | Message ID: IKE #136 skipping update_recv as MD is fake | Message ID: sent #136 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-136" #136: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.136:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #136) | d6 c8 9e 97 21 46 fb d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 a9 84 13 62 aa bd 1d ad 3e 60 88 dc a9 35 5e | 57 2f a4 3a d3 ae c1 11 b0 24 19 68 c2 75 c1 4f | 59 cf f8 40 bb af 7e d1 b9 71 42 ce c6 09 6e 74 | 9e f2 29 0d 91 21 24 74 6d 2f 10 75 65 f8 b8 44 | e9 15 55 bb 2b 6f 25 4c 58 9b 0b 45 c2 40 5a 9f | ff e2 b3 e2 f7 0d c5 79 1b 00 36 3a 21 20 e7 06 | d4 05 ab e6 7f 0e 4f 26 f4 28 cb d2 12 3f 60 75 | e8 8c 1f 18 e0 09 73 82 2e 56 2f fe 00 1a 31 26 | 0b 05 07 a6 fc 87 93 26 a9 c2 69 7c 30 9c 7a 89 | e9 2a 6b aa c2 98 8a d1 cc 85 ab 8a 1d b6 6c 3a | 46 51 76 9a 2b ea bd 4c 92 d8 c8 5c 56 7a b8 5f | 71 f6 c7 f5 f4 4e c8 ce cc 9b 6f 50 15 3b 30 b5 | cc 32 0c 15 e6 9e 78 33 f4 30 d7 c5 bc a6 29 97 | 00 2f a4 12 c0 82 9e 84 f0 b8 38 05 f1 51 00 d1 | 48 64 6a f9 cc d7 36 54 45 d6 ee 3e 02 d0 d5 50 | ec e5 a0 1a 70 ee 96 eb 78 4d 45 6b e4 50 2d ed | 29 00 00 24 24 22 aa ae c7 66 c9 3a 20 66 58 4a | 54 df 58 65 c1 5d d7 a3 b2 c7 e8 e8 de 15 89 70 | 84 48 bb d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 7f 22 d9 ee cc a0 1b 0a 4c ff 84 | da dc a7 a5 32 ec b3 c6 00 00 00 1c 00 00 40 05 | e4 4f b8 48 f2 80 69 e7 b9 85 06 aa 82 75 ce d9 | b4 81 0b 76 | state #136 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374024f80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a28af0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469defe0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #136 | libevent_malloc: new ptr-libevent@0x7fb374024f80 size 128 | #136 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49611.272806 | resume sending helper answer for #136 suppresed complete_v2_state_transition() and stole MD | #136 spent 0.462 milliseconds in resume sending helper answer | stop processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34802a950 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 c8 9e 97 21 46 fb d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #136 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #136 | rejected packet: | d6 c8 9e 97 21 46 fb d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #136: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0589 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #122 | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #122 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #122 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49611.283002; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001874 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a89700 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #122 | libevent_malloc: new ptr-libevent@0x7fb34802a950 size 128 "road-eastnet-nonat-122" #122: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #122) | 14 66 d6 bd ae 2b be a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 a1 e9 e4 be 1e 51 8a 55 59 79 73 21 36 56 e2 | 77 7a 08 bd 06 ab d4 92 e5 dc ae f7 64 76 23 ff | f4 fc 6d 61 73 31 e1 d2 4f df c1 6b b7 79 5a 65 | a0 cc f6 e0 aa a2 1e 56 c9 61 f0 64 10 6e 71 e4 | de d3 38 6f 01 f0 ef d1 f6 56 f5 aa fb d5 dc 96 | f9 0b be 72 ef 23 60 6a 39 4c 10 fa 40 46 a5 4f | 9d 4e 1b 63 94 dd bb 2e 79 61 b0 23 01 f5 74 e7 | c5 3f 64 7f 13 8b 72 4d bd da 91 fc 61 61 ef f0 | e7 bf ad 46 59 ed ad 05 2c f7 04 21 03 71 4c c7 | 7f 1d ad ca ef 53 b4 42 e8 7b 9b 3d 7a 70 68 63 | f6 3b fc 00 63 e2 d1 50 20 42 35 cc 18 3b ef e3 | 5c 49 2e b5 43 b5 11 94 a2 42 32 89 ab 4a 75 44 | 28 03 13 02 78 a8 b9 d4 86 df f7 69 0e 5b f1 03 | 59 e8 3f 87 be c1 4f 01 d7 b7 0b 01 72 03 2c 0c | c5 51 b7 34 27 69 20 c2 1e 3c 1a 82 2c 40 e7 31 | 94 67 b7 79 04 1c c9 e0 fd 58 15 b5 e2 95 d3 0d | 29 00 00 24 7c 10 f9 fd 3b aa 03 0a 4e 70 88 76 | 8d 21 8d 7a 77 a3 25 87 bf 2c 07 91 c2 03 c6 70 | 6f 0a b2 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 62 3b d9 22 f1 42 3b 85 55 78 b5 | c8 14 63 8d 0b 44 d6 d6 00 00 00 1c 00 00 40 05 | 1b ba f6 9b c4 53 50 8e 11 46 cb 49 4f 65 db eb | 69 7d d4 7c | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #122 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 66 d6 bd ae 2b be a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #122 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #122 | rejected packet: | 14 66 d6 bd ae 2b be a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #122: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8e0 | handling event EVENT_RETRANSMIT for parent state #29 | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #29 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #29 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49611.301381; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.008245 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #29 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-29" #29: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #29) | 76 94 35 7f f9 86 66 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 c8 26 94 c9 ea 16 54 c7 a0 a7 ee 80 e9 d2 eb | c7 74 3d 70 a6 ce 1b 7f 47 b8 a9 22 6c e9 de 3e | 5e 1a da 80 d6 29 b5 60 85 8e c7 9a 07 14 0f 2e | 5e 85 13 8e 17 81 27 ae b9 44 36 2c 21 79 b7 4c | 9f fe 6e 8f 50 03 81 71 96 dc 7d 13 e0 2d e5 55 | 9d 35 cf 6e 26 2f 6c 88 8f fc 20 a1 7f b4 44 e0 | 98 88 95 7e ed 39 2c 67 fe ec 38 89 03 76 30 8b | 31 e8 7f 06 73 93 d0 0a 0d a2 5e e7 17 d8 ae 0f | 27 a8 77 dc e5 16 a6 b2 26 c7 b0 e5 80 71 68 10 | 38 5e 32 59 c0 68 b7 75 a8 13 99 bb ca 95 f9 78 | 1f 9b 7b 46 65 6b 90 b3 9b cd ca 91 c9 75 7e 4d | 2e 06 ee 10 f0 8c c2 89 1e c3 a8 05 28 9a e8 eb | 20 63 32 0f f1 3f 82 9c 83 27 56 48 7d 7c a9 e7 | f5 1b db 86 e5 b7 2b 70 8a da ea 00 2d 06 e8 11 | 3c 90 f7 22 75 39 1f c5 87 f2 55 24 18 21 90 81 | 04 ec 8f 65 74 d4 59 92 bb 69 88 b7 6d 42 21 28 | 29 00 00 24 36 a8 1f b0 73 93 1f c8 b8 98 90 7a | af 61 a7 3e 69 e8 46 34 d6 9e 89 22 1f 07 54 41 | cf b8 14 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 3a eb 7a 38 98 4c b3 ed b5 e4 e8 | 5b 3d 4d 17 15 a4 85 ff 00 00 00 1c 00 00 40 05 | c1 f9 34 11 26 e0 6f d6 1d 57 cb be 7c d0 71 cf | 3a bd fc a1 | libevent_free: release ptr-libevent@0x7fb38401cc10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8e0 | #29 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 94 35 7f f9 86 66 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #29 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #29 | rejected packet: | 76 94 35 7f f9 86 66 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #29: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #129 | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #129 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #129 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49611.320709; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500809 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a89740 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #129 | libevent_malloc: new ptr-libevent@0x7fb38401cc10 size 128 "road-eastnet-nonat-129" #129: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #129) | 72 fb d4 3a 3d 31 ef 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 72 cd 05 8b 1a e1 a8 66 68 a3 88 d4 37 ab 29 | 8d ca b6 b0 86 38 49 65 ce de c8 b0 39 b5 e5 f9 | 49 66 a0 ac 83 68 f5 08 38 44 61 fc b4 c4 e3 93 | 86 b2 c8 75 e1 f1 8d 43 35 de 04 cc bd e4 ef a7 | 8b 7d df 6d 22 63 24 bb ce 8f 77 d1 43 ca 6b c6 | 70 cf 4e 81 02 44 0d 39 85 28 ca ae 69 3d 8b 1d | 8e 2a f9 28 37 54 47 1b 7f 1e 6c c3 e7 ca 7d c5 | 5d eb 2d b5 ee 04 65 71 a3 9b 69 bf 7f 5f e0 e8 | b1 ac e6 e0 77 7c 27 c0 f7 96 26 05 ab 95 ca fd | fa ef 5c 22 dc 42 3f 47 3c 21 7c b3 45 c2 0f 2d | 47 18 59 0f e9 05 83 ad b3 18 86 6e 4c 0f 6a 6f | a2 bf 54 51 83 2a 64 42 06 32 16 00 c7 cc 1b e9 | 3e b9 e5 cf 6c 0f 2e 6b fd eb c0 0a 44 95 18 9e | 2c d3 00 4b bf 67 5f 7a f5 b4 f7 f7 d7 fd a9 64 | 98 77 b8 cc 18 a8 1d 3e 8f 95 27 46 f6 67 44 7b | 96 ba b1 ae ad ee 56 93 ac c5 ad 91 dc 2a d2 ba | 29 00 00 24 64 51 a8 77 1e c3 b2 0e 1e 7b 14 6a | 5f 64 3b ca 18 8a 91 d8 b8 bf ce 82 b9 6f e1 5d | aa 66 20 12 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f cd a9 5a 90 93 b1 13 f3 88 1c ea | 0f f5 0f 31 39 58 6f be 00 00 00 1c 00 00 40 05 | 0e bb c8 26 22 69 20 e6 e2 bf a8 b0 a2 3b 98 e4 | e2 fb 7b 71 | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #129 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 fb d4 3a 3d 31 ef 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #129 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #129 | rejected packet: | 72 fb d4 3a 3d 31 ef 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #129: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56dd0 | handling event EVENT_RETRANSMIT for parent state #84 | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #84 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #84 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49611.331022; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006065 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #84 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 "road-eastnet-nonat-84" #84: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #84) | 1f 2f b6 8b 51 48 06 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 1f 67 e9 76 20 6a 2b f7 ad 13 77 97 e1 68 87 | e9 75 71 19 c9 83 f3 73 fb 25 68 00 8c ff f8 c9 | 1d 39 8c aa 48 91 67 ae d7 68 2a 58 40 8a 8f c7 | 80 6c 8a 0d 2c 34 0e dd 31 f9 0d 20 54 ae b8 ad | f3 e5 66 87 27 c1 b9 3b f7 7e 5f 91 9e 13 72 c4 | fb 1c ec 84 d9 28 50 4e 83 04 2b 64 28 38 b2 c3 | 26 3d 3f fe b0 3a 31 93 a2 da 74 58 0f e3 c4 e7 | 1b d4 4a 7b 98 e4 bf 2d 17 77 1c c7 60 c6 cd f4 | a4 b3 3e 33 44 58 50 ab 79 af 8a 67 8e c3 a4 76 | 74 f4 47 b0 6e 53 b7 1d 0a 98 f8 36 13 56 c4 89 | c8 ca cc fb f1 a4 98 cd 59 ff 4a e3 78 5d 3c 67 | 86 c4 70 68 e1 a0 3e 7b 7f c1 2f 3d a4 0d c2 c5 | bd ed 93 ba 2d ff bd 57 2f b9 ac d7 dc 77 9f ae | 61 e7 8a 25 fb 95 fa b6 ae 27 5d f2 7d 25 5c 37 | cd dc a1 e7 01 66 ba 0c 28 2e 4b 30 85 a4 73 58 | f5 b4 a3 77 ea dd 82 87 c2 5d 3f 72 7d 74 36 cc | 29 00 00 24 76 ac e1 c3 58 b8 41 7b 54 b2 2a 6d | c8 c8 51 a4 ca 16 83 ce 76 9e a1 e9 43 b8 d3 34 | c3 53 e0 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f 3a 1a f8 04 5d 3c b5 2b e1 4e ab | 33 49 9d 7d 4f 74 a2 8f 00 00 00 1c 00 00 40 05 | 1b c4 6f 3a e9 14 b6 7b 2a e7 ad b0 65 58 df 39 | fd 38 92 37 | libevent_free: release ptr-libevent@0x7fb3680180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56dd0 | #84 spent 0.206 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 2f b6 8b 51 48 06 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #84 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #84 | rejected packet: | 1f 2f b6 8b 51 48 06 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #84: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0867 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #108 | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #108 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #108 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49611.333447; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002302 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56dd0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #108 | libevent_malloc: new ptr-libevent@0x7fb3680180b0 size 128 "road-eastnet-nonat-108" #108: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #108) | b6 36 fb 7e 9b 39 08 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 8f 7e 30 55 17 55 d0 7b cc 1e 1e d2 0b 4a cb | f4 10 86 26 73 3d 12 d5 07 43 0f 11 e4 f8 f6 27 | 0b a5 f1 36 07 fc f3 05 3c 23 da bb fc 30 83 87 | 4d 41 58 5e 99 3a a9 ce 46 15 98 87 9b 24 d7 8f | 4b 59 7f b7 31 2a 48 e9 80 ab 05 c8 c6 49 95 79 | 0d 98 4a 2c 3d fe d3 d5 57 7f be e0 6f 80 49 7e | 12 83 14 1f 0d 26 16 aa cd e1 d8 a5 e8 e4 d2 0b | 8c a3 fb db 9a 33 4c 54 d3 db d0 4d 8d 8e a8 6d | 02 98 c7 65 a7 c6 72 0c be 01 bc 52 89 54 3a 59 | 6c 0b 5d c0 31 d7 63 e7 46 02 b3 0a b3 c7 5c de | 0f 7c c0 40 9f a9 b4 60 e4 65 87 1b d1 de 9c 27 | 3d df 5c 7f 27 8d e9 84 86 44 ce 9d 88 43 1a 58 | 28 56 bd 9e df a0 81 8f 79 ba 7e dd 69 15 d8 10 | e7 15 0f da 12 84 35 19 8e 2f 46 d3 83 f4 76 51 | 58 93 90 90 80 38 02 b8 02 db 96 cc e8 5b bf 28 | 0c 19 e8 c4 f6 ae 03 e7 2c 85 d1 50 dc 63 a6 cc | 29 00 00 24 6f 78 95 93 53 4c be 35 be d7 12 7f | aa e5 be 16 ad 5c 36 ac 46 40 9b c8 37 9c 91 65 | 00 a5 4b a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 98 20 9c 05 26 c6 0c 16 0d f3 71 | 8e b0 d2 f3 4f 39 a2 61 00 00 00 1c 00 00 40 05 | 96 4b e6 dc 37 23 61 90 08 5b 41 4a ab 35 e9 fe | 61 65 2c 1d | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #108 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b6 36 fb 7e 9b 39 08 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #108 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #108 | rejected packet: | b6 36 fb 7e 9b 39 08 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #108: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-137" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-137' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #137 at 0x557d46a8f900 | State DB: adding IKEv2 state #137 in UNDEFINED | pstats #137 ikev2.ike started | Message ID: init #137: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #137: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #137; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-137" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-137" IKE SA #137 "road-eastnet-nonat-137" "road-eastnet-nonat-137" #137: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-137 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-137": constructed local IKE proposals for road-eastnet-nonat-137 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 137 for state #137 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a02770 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #137 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 | #137 spent 0.15 milliseconds in ikev2_parent_outI1() | crypto helper 8 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 starting work-order 137 for state #137 | RESET processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 137 | RESET processing: connection "road-eastnet-nonat-137" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.245 milliseconds in whack | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 137 time elapsed 0.000995 seconds | (#137) spent 0.99 milliseconds in crypto helper computing work-order 137: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 137 for state #137 to event queue | scheduling resume sending helper answer for #137 | libevent_malloc: new ptr-libevent@0x7fb34c02a950 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #137 | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 137 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #137 | **emit ISAKMP Message: | initiator cookie: | 71 ba fb 1f 95 88 29 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-137 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 42 75 6d 4d 0f bb db 8d 24 d0 ba 5f 79 5b 88 be | ikev2 g^x 94 ae ea 89 7e 95 49 22 fa 6f 0d 51 90 a6 60 1f | ikev2 g^x 08 fe 3b 9a b1 a8 b5 c8 e8 a5 d1 c2 b6 3a f6 5c | ikev2 g^x 07 25 e1 53 6d cd f9 d3 3f 17 7a b9 97 ee 73 6b | ikev2 g^x da 87 59 77 74 9c 5c 05 a7 16 5c 85 33 f2 d8 f0 | ikev2 g^x a7 84 4c 20 01 fc 53 bf 21 28 ba 99 79 44 ea b7 | ikev2 g^x b7 e2 9a c6 4e 09 9d 5a 41 46 ff 69 36 bd 47 3d | ikev2 g^x 68 59 0e 87 0c b2 db 9d ef 27 b1 ef a7 c3 7d 74 | ikev2 g^x d1 bf 63 41 fd 34 70 c8 08 69 9e 0d 21 dd b6 ca | ikev2 g^x 61 47 c8 f6 20 99 94 42 4a b6 3c e4 c1 6f 59 47 | ikev2 g^x 32 7f e7 88 96 d9 c5 8f 82 9f aa 9b 0b 9e 03 53 | ikev2 g^x 65 a9 c8 5c d7 fe be da 56 44 27 26 98 d6 9a ae | ikev2 g^x 35 b2 bc fb a7 4d 1f ae ae 76 fb c2 8c 86 63 40 | ikev2 g^x 59 88 a0 8b a9 0e 3a 8f 10 76 ad e8 54 d2 9e 91 | ikev2 g^x 7a bc 03 79 61 0b 83 53 4c 4e 2d 22 ca 69 54 24 | ikev2 g^x ae 77 e1 5c 6b 3a ff ee 1f 59 52 e0 9c 51 48 2c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f7 ec 22 b0 d2 45 cb de 11 9d 88 dc d9 c8 87 82 | IKEv2 nonce 94 72 01 b4 91 d8 41 1f 07 fb 13 21 60 9f a8 fa | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 71 ba fb 1f 95 88 29 b4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 89 | natd_hash: port= 01 f4 | natd_hash: hash= df ee b9 3b 05 6b fc 34 5a 00 ef 69 58 dc d5 6e | natd_hash: hash= 13 53 c2 0c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data df ee b9 3b 05 6b fc 34 5a 00 ef 69 58 dc d5 6e | Notify data 13 53 c2 0c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 71 ba fb 1f 95 88 29 b4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 42 f2 83 df 2f 64 fb 42 98 b0 17 b3 99 82 89 4f | natd_hash: hash= 79 b2 42 ca | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 42 f2 83 df 2f 64 fb 42 98 b0 17 b3 99 82 89 4f | Notify data 79 b2 42 ca | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #137 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #137: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #137 to 4294967295 after switching state | Message ID: IKE #137 skipping update_recv as MD is fake | Message ID: sent #137 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-137" #137: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.137:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #137) | 71 ba fb 1f 95 88 29 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 75 6d 4d 0f bb db 8d 24 d0 ba 5f 79 5b 88 be | 94 ae ea 89 7e 95 49 22 fa 6f 0d 51 90 a6 60 1f | 08 fe 3b 9a b1 a8 b5 c8 e8 a5 d1 c2 b6 3a f6 5c | 07 25 e1 53 6d cd f9 d3 3f 17 7a b9 97 ee 73 6b | da 87 59 77 74 9c 5c 05 a7 16 5c 85 33 f2 d8 f0 | a7 84 4c 20 01 fc 53 bf 21 28 ba 99 79 44 ea b7 | b7 e2 9a c6 4e 09 9d 5a 41 46 ff 69 36 bd 47 3d | 68 59 0e 87 0c b2 db 9d ef 27 b1 ef a7 c3 7d 74 | d1 bf 63 41 fd 34 70 c8 08 69 9e 0d 21 dd b6 ca | 61 47 c8 f6 20 99 94 42 4a b6 3c e4 c1 6f 59 47 | 32 7f e7 88 96 d9 c5 8f 82 9f aa 9b 0b 9e 03 53 | 65 a9 c8 5c d7 fe be da 56 44 27 26 98 d6 9a ae | 35 b2 bc fb a7 4d 1f ae ae 76 fb c2 8c 86 63 40 | 59 88 a0 8b a9 0e 3a 8f 10 76 ad e8 54 d2 9e 91 | 7a bc 03 79 61 0b 83 53 4c 4e 2d 22 ca 69 54 24 | ae 77 e1 5c 6b 3a ff ee 1f 59 52 e0 9c 51 48 2c | 29 00 00 24 f7 ec 22 b0 d2 45 cb de 11 9d 88 dc | d9 c8 87 82 94 72 01 b4 91 d8 41 1f 07 fb 13 21 | 60 9f a8 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ee b9 3b 05 6b fc 34 5a 00 ef 69 | 58 dc d5 6e 13 53 c2 0c 00 00 00 1c 00 00 40 05 | 42 f2 83 df 2f 64 fb 42 98 b0 17 b3 99 82 89 4f | 79 b2 42 ca | state #137 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a02770 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #137 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 | #137 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49611.341481 | resume sending helper answer for #137 suppresed complete_v2_state_transition() and stole MD | #137 spent 0.471 milliseconds in resume sending helper answer | stop processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c02a950 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 ba fb 1f 95 88 29 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #137 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #137 | rejected packet: | 71 ba fb 1f 95 88 29 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #137: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a42790 | handling event EVENT_RETRANSMIT for parent state #123 | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #123 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #123 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49611.346676; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002958 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8e0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #123 | libevent_malloc: new ptr-libevent@0x7fb34c02a950 size 128 "road-eastnet-nonat-123" #123: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #123) | 6c 7d b3 a1 76 62 7d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 56 4f 8e 37 33 e9 f0 f8 7f b8 e1 b3 f9 a8 fa | b7 62 0a da df 31 2b 33 3e c3 84 d4 70 c9 16 31 | 80 ac 1c 22 4c fb 0e d9 48 14 9a 6c 58 8b b2 b1 | ab d6 de 52 1b e7 85 36 94 02 66 e4 ea 4b 3e bb | cb 9a 60 cd b2 64 9c 54 4c 58 05 94 9a 41 90 e5 | 3d f7 e6 13 47 7c 5c ae 9e ed 2f 47 46 7c b6 ec | 64 99 4c 90 1f 2b 27 83 ee 7d 0c 95 53 61 78 0e | fc 0d ee f9 69 83 ad f2 29 e6 77 fd 16 29 ec c4 | 55 89 e7 07 dc 10 66 d5 0f fd 31 a1 54 12 3e c7 | b1 16 f6 98 63 b4 d5 90 8d e3 ff 44 b5 31 8e 32 | c1 26 fd ff 42 9b c5 01 50 0b be e0 4e 8b d1 4e | 1e cc 49 12 14 c5 7d a4 df 96 fd 82 a1 fa 2c 84 | 20 3e 8f a2 9b 0b 00 ca 45 cd 8b a5 8a 1e 6a fa | 02 7f 67 67 3a 15 da 2b 32 2d 18 bd 05 df 1f 49 | 13 dc cd f2 4e 24 ac 3e c3 6e b4 5b 9b c7 3e 7b | f3 b3 b6 54 f0 4f 36 43 d8 39 48 ea ae 56 03 eb | 29 00 00 24 9d 71 0d 4c e1 28 99 bb a1 c2 a8 97 | 82 df 6e a7 59 50 e5 e7 83 d9 52 2c 3a b5 f8 0a | ab 34 6b 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd f0 b7 a5 ab c1 1e 9f 00 5e 1f f4 | 01 11 d6 41 8c c8 44 db 00 00 00 1c 00 00 40 05 | 74 ad b7 af a3 7a 6a 08 ff e9 f2 f1 74 4e c9 b2 | f6 ce db 1e | libevent_free: release ptr-libevent@0x7fb36c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a42790 | #123 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 7d b3 a1 76 62 7d ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #123 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #123 | rejected packet: | 6c 7d b3 a1 76 62 7d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #123: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45350 | handling event EVENT_RETRANSMIT for parent state #30 | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #30 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #30 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49611.387027; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.010658 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a42790 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #30 | libevent_malloc: new ptr-libevent@0x7fb36c0180b0 size 128 "road-eastnet-nonat-30" #30: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #30) | eb 37 b2 e3 45 e6 a7 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 14 f4 3b 23 14 59 57 11 85 13 a2 12 2b b5 a3 ff | 27 d1 a6 d6 83 ba ed 6e 70 90 a1 d6 22 c0 f4 dc | 88 16 36 cb d1 72 72 bc de f4 41 0b 1b 89 09 42 | b9 3c f8 7c e9 f8 b9 9e 79 49 a8 2b 7f 1d 06 99 | c2 4a dd e8 2d e9 b4 cd ab 59 b3 cd 90 a2 ae 3c | dc 2b a8 89 42 be 2f 72 3b d2 e2 27 b4 65 50 d4 | 35 50 bc 83 c6 85 ec 49 08 26 e7 a9 0e b6 5e a5 | 85 8b 68 21 3e 90 ff 7d 8a b3 a3 ab 4e 47 64 32 | 27 11 da 90 e5 4b bc e9 16 11 6a bf 15 7e 85 08 | 28 9b e3 ef 08 8b 63 b8 f5 43 71 2f 4c 67 78 41 | b8 23 b8 9c 92 66 99 57 0d 3e 91 c2 06 23 98 e8 | 6d 98 00 38 76 9f e2 83 8a e1 b7 3f 0f fe 0a 46 | d4 29 95 ea ed 7c f2 88 a6 07 6b 92 26 ac 08 4f | 2f b2 56 84 37 68 ea c9 79 62 e3 b0 e5 14 a4 c8 | 94 04 78 6c 13 14 ae b3 aa ac 60 8d 12 46 30 65 | 4d f6 8a 38 3e 83 8d 9b ed 94 87 9f 15 c1 ab 90 | 29 00 00 24 3c c6 27 c6 e1 5b ef ef 28 05 b6 9a | 73 ea 46 41 c6 a4 e3 b1 86 51 d2 31 50 73 0b 09 | 13 5f 9d 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 2d bd fb cd 00 1b 4b be 47 ff 4c | 9b 30 9e df 04 ed 35 e5 00 00 00 1c 00 00 40 05 | f4 eb 1d 0f f6 3b e7 d6 54 0e 88 15 bd 63 45 57 | 71 e8 c0 52 | libevent_free: release ptr-libevent@0x7fb37c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45350 | #30 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 37 b2 e3 45 e6 a7 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #30 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #30 | rejected packet: | eb 37 b2 e3 45 e6 a7 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #30: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0667 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47ed0 | handling event EVENT_RETRANSMIT for parent state #85 | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #85 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #85 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49611.389369; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003915 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45350 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #85 | libevent_malloc: new ptr-libevent@0x7fb37c01d920 size 128 "road-eastnet-nonat-85" #85: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #85) | b7 4f d7 db a6 e2 bd 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 c8 89 a4 0b 04 f2 b9 62 f8 58 f1 1c 0c 91 1a | aa 25 df 1a e7 a5 32 9d 0b b5 9b 93 ab d7 64 b6 | 7e 0d ee f0 b5 83 e8 90 d8 94 b7 d1 ea 05 1c 4f | 85 63 ef bf 80 da 59 c5 18 c9 fd 82 f7 cd 12 c7 | ec b4 9e 35 b0 0c 13 ac 89 c3 d8 6c 14 b9 3b f7 | 41 eb 65 45 c9 66 0a f2 c7 e9 1b 09 a2 d5 ad 2e | 24 aa 0a a8 48 81 8f bc 8d df 3f 90 a2 d2 26 b2 | 84 b7 2d b6 67 ac 5a fa 85 04 e2 96 e3 0b 1d f3 | b9 b5 0f f0 5b d4 c6 d3 b2 9b d4 ad e6 94 18 68 | bf f6 64 ed 26 d4 b7 68 7f a4 94 0e af 4c 0c b4 | 64 91 32 f4 da 5b 38 c2 84 b3 fe 0e e5 1b 3f a5 | 6b 83 a5 f2 b9 7d 21 72 89 70 28 f2 d4 86 bb fd | 03 43 fe f4 4e 6c 9c 49 29 03 b2 15 2f 72 ba 73 | 18 d4 39 82 08 55 da c3 e4 86 cb d0 04 31 94 6a | f5 7b 4a de 4d 49 5a 6d 51 3e 71 b4 0d e8 2e 33 | 9f 26 4a 91 c4 9b 06 1a 88 4b 6e 77 93 8a 7d ed | 29 00 00 24 af e3 01 7b 71 cd 34 07 4b 0a a0 9b | 85 75 4e ed b9 b3 c5 7d 83 a1 ee 6b 3c aa 39 e2 | 0b 8b fa b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 41 7b 44 0a d6 6d 6a b0 b1 8e ad | b0 c3 33 77 45 ba 39 18 00 00 00 1c 00 00 40 05 | 63 0f 1e f2 8f 76 1d 60 09 1e 0d 94 28 78 d8 b0 | 16 5a de 8a | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47ed0 | #85 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 4f d7 db a6 e2 bd 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #85 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #85 | rejected packet: | b7 4f d7 db a6 e2 bd 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #85: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47f10 | handling event EVENT_RETRANSMIT for parent state #130 | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #130 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #130 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49611.392702; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501048 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47ed0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #130 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 "road-eastnet-nonat-130" #130: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #130) | 85 43 6a ad 59 7d ce ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 ae b5 ed fb fd 70 00 13 8d 64 ee 46 d1 86 03 | 85 09 b4 b0 21 e1 75 08 18 f5 01 a5 ce d9 28 32 | 42 84 d9 a2 5d 29 4b 02 ec 24 a8 1c 76 d6 11 b3 | b7 ca cc 7d bb 8a 73 62 20 57 c8 ee 7d 78 9e 1d | 7a d7 f6 f5 3d b0 f3 26 b5 f8 7e 6c 34 29 9d e1 | 66 87 a7 94 04 46 39 e6 b7 02 1f 92 b6 19 a4 2b | 93 1f ea 2c 8d 99 b7 50 6f cd f0 d6 4b e1 d1 c9 | 7e 98 1d 25 8f 0a 2c a3 9a 8f 46 07 29 ef b1 91 | 6c b5 e6 a3 11 c5 c9 c8 5f a8 7f 93 e8 c3 28 29 | 1d 87 06 30 a9 b3 18 af 13 99 e2 ea 6d ca d3 37 | f0 97 8e c5 32 05 cc 70 9c 35 a3 ab 7d bb 03 4c | 6f 27 f2 98 7e 64 26 7d a4 db 20 0f 0c 9d fa ef | 62 00 52 b0 8e 30 a4 8a e8 bb 41 07 76 b9 71 f2 | 63 f8 6e da 4f 74 79 ae c9 5c 70 e4 82 06 94 fd | 62 5b ee db c2 84 ae ea bf 8a 91 a6 ef 57 d0 e7 | d1 ef 3e 19 e8 2e 02 37 b6 05 eb 7c 5d f3 b5 d0 | 29 00 00 24 6c 1f 45 88 1e 42 31 9a b9 27 19 26 | 95 8c 4f c4 41 99 09 32 1c bf f6 27 de 6a fb 55 | 00 73 7a e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 41 0f ce 80 1a 0e 57 d0 34 7b d4 | 5a 51 a5 89 80 d3 8f c9 00 00 00 1c 00 00 40 05 | 7f 09 ba 77 a9 79 98 e7 5b 47 dc 5e 0f 55 ef 6e | 76 2d 29 18 | libevent_free: release ptr-libevent@0x7fb37801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47f10 | #130 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 43 6a ad 59 7d ce ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #130 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #130 | rejected packet: | 85 43 6a ad 59 7d ce ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #130: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.067 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a30d70 | handling event EVENT_RETRANSMIT for parent state #109 | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #109 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #109 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49611.409037; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002324 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #109 | libevent_malloc: new ptr-libevent@0x7fb37801d920 size 128 "road-eastnet-nonat-109" #109: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #109) | 53 c2 aa ad 50 91 d9 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 1a 23 bb a3 ce 6a 0d 92 7a aa 8d 69 c7 99 27 | db f2 23 5c cd 5e 2d f6 c4 13 c1 c7 87 46 ed 75 | d8 b9 55 72 40 32 53 f1 21 db f3 6d 45 6a d9 b4 | 9c 06 b1 28 c5 00 1e e2 70 2c 2a 1a f0 fa 65 1b | a8 db b9 2c 83 95 23 c4 4d 60 4b a3 fc 58 c6 c8 | a8 b0 c1 e8 32 2c d3 70 a2 4d cb c8 7c 80 17 90 | c1 c1 fd 82 03 1f 32 d8 5e cd ad 60 ce c1 24 ab | 82 68 88 db 79 b3 aa 37 ff 36 d4 a3 82 06 b7 59 | 0c 4c 61 6f 22 1c 48 b3 94 8b 71 14 8f 57 c8 03 | 31 41 b9 e3 a9 ea 8f 4d 51 15 4a 4c 5f 30 c2 c4 | 40 3e 6a 9e 7d 33 6d fb 91 1c b2 be 1e 33 35 f6 | 1a db ff 1e 8c 4e e8 12 71 d7 94 88 49 d8 37 d9 | cb 52 5b 22 87 0a c9 2f a4 1d 52 36 85 74 38 7e | de e2 44 79 f2 36 18 5e 82 cf d4 fb db 3f c9 35 | 36 d8 7b 5d 04 fb fa a4 fe b5 87 c5 e7 4e 90 d6 | 9f 17 87 48 32 5d ec 5c f7 e6 e2 39 17 1c 9c 2a | 29 00 00 24 8f bd ba cb 6b fc de c1 80 b9 fe c3 | b3 e0 ad b2 e9 fa 37 77 43 04 c6 81 1a 91 41 eb | 20 40 b9 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f d2 7c ae 7e 39 2b fb 54 2c 44 94 | 2e c2 37 67 8d e5 fe 8b 00 00 00 1c 00 00 40 05 | 12 b6 58 87 f0 a8 b9 d4 aa ae 6f 5a ed df 76 d7 | 1d 86 02 2c | libevent_free: release ptr-libevent@0x7fb3700251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a30d70 | #109 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 c2 aa ad 50 91 d9 00 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #109 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #109 | rejected packet: | 53 c2 aa ad 50 91 d9 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #109: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0583 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a276e0 | handling event EVENT_RETRANSMIT for parent state #124 | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #124 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #124 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49611.410362; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000718 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28af0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #124 | libevent_malloc: new ptr-libevent@0x7fb3700251c0 size 128 "road-eastnet-nonat-124" #124: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #124) | 8e 52 ee 7a 33 75 3f 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 57 9a 04 43 62 52 e5 fc b5 c2 fe cc ad 34 2f | 82 f3 00 f6 ee 21 08 77 c9 b1 bb 69 fe 78 0f 21 | bf 36 0c 3c d2 28 d9 56 83 ae 1a 8d 60 fc ba 85 | 54 56 0c 31 1b 34 8f 99 3a cf de 75 87 a0 b6 a4 | d8 62 39 46 a5 f4 50 6b 49 13 47 6a b8 07 fd 9b | a0 24 9b 8e 36 86 71 8d 3a 86 06 ec 43 9f d0 fa | fb 5f d7 26 3c ad 44 31 62 f2 eb 50 ab 84 4b c8 | 92 d2 94 d1 cf 28 72 53 f0 98 5e 24 79 26 3e b6 | 8a 49 4d a1 69 34 ff 0b 63 f0 6a 98 fb 9b 9e fc | 07 2e cd bb 5b c5 49 f8 a9 bd 52 eb e2 d4 29 6f | e4 1e 81 a0 d3 65 f5 f3 07 20 20 0d 39 fe 60 11 | 31 d5 df 57 2f d9 ac 24 3b 95 8a 93 3c 37 3c fe | 00 f5 ae e3 8b 73 07 19 bf 7a 74 b9 19 54 31 a8 | c6 05 b4 3c c9 b4 f2 d1 4f 8d c4 e7 6c 6b d7 8c | a7 72 14 8c da 9f 42 94 91 f0 27 3c ef a5 63 c0 | 4b e5 9c 5d a2 4a 47 0f 02 ed 81 c6 7a 36 ca c0 | 29 00 00 24 35 37 ad 9e 25 61 50 57 d7 60 4e 9e | 7c 24 2e 8d b9 f6 52 07 e6 cf b3 cb 88 5a c5 03 | c4 c6 aa c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 73 0e 7d 3a 1d a8 f9 ef 84 7c a6 | 0b 05 4a f4 88 18 b0 42 00 00 00 1c 00 00 40 05 | 95 90 15 33 51 5d ad 36 64 2a 62 55 cb ba 4d 6f | 9b 17 ee 8d | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a276e0 | #124 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 52 ee 7a 33 75 3f 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #124 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #124 | rejected packet: | 8e 52 ee 7a 33 75 3f 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #124: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0579 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-138" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-138' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #138 at 0x557d46a90ec0 | State DB: adding IKEv2 state #138 in UNDEFINED | pstats #138 ikev2.ike started | Message ID: init #138: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #138: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #138; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-138" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-138" IKE SA #138 "road-eastnet-nonat-138" "road-eastnet-nonat-138" #138: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-138 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-138": constructed local IKE proposals for road-eastnet-nonat-138 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 138 for state #138 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a276e0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #138 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 | #138 spent 0.144 milliseconds in ikev2_parent_outI1() | crypto helper 12 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 starting work-order 138 for state #138 | RESET processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-138" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 138 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.245 milliseconds in whack | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 138 time elapsed 0.000822 seconds | (#138) spent 0.825 milliseconds in crypto helper computing work-order 138: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 138 for state #138 to event queue | scheduling resume sending helper answer for #138 | libevent_malloc: new ptr-libevent@0x7fb34002a900 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #138 | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 138 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #138 | **emit ISAKMP Message: | initiator cookie: | 9e 04 07 cd 3c 90 2d 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-138 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d0 26 9c 69 c2 fb a0 0a d4 c6 8a e3 3a 35 d9 72 | ikev2 g^x c4 6d dc 97 97 46 4f 49 45 f3 89 7c 26 93 32 59 | ikev2 g^x 0e 55 34 82 9b 12 80 e6 60 cd 9e 59 15 f7 7d 65 | ikev2 g^x 53 e2 d3 d8 c2 ed 2c ad 8a b3 a9 0f 4d 3e ac 86 | ikev2 g^x 1c 67 54 95 04 00 bf 86 4e 8b bf af 44 15 eb 62 | ikev2 g^x ea cc 94 5a 6b 1a 81 0f 38 cc a4 0b 8b 3e f7 1f | ikev2 g^x ed 1b ee bf 3c b7 b3 6b c3 78 66 29 1f dc 55 cd | ikev2 g^x cd 9e c4 55 82 0d 26 16 81 1d 3b 87 44 bb 54 ef | ikev2 g^x 02 0c 05 f7 04 a0 83 3c c1 fe 2c d3 4e 3d ca 62 | ikev2 g^x 71 e8 db ac f9 9d 90 a6 0d 1e d9 94 f5 c3 29 22 | ikev2 g^x f5 2c d8 67 db 54 e1 d3 df b5 df 85 0d 36 cf 0c | ikev2 g^x 0f 08 0d 38 84 31 cd 9b 35 a0 fd df e8 86 86 f3 | ikev2 g^x a8 84 f3 56 c8 9a eb 02 1a c2 37 30 b1 0d 51 72 | ikev2 g^x 6c ba 2c ab f4 fb 66 85 22 97 66 d7 6b a3 32 2b | ikev2 g^x 57 22 c0 38 a7 76 1b d3 ea e0 94 87 f8 5d 23 88 | ikev2 g^x 1d 92 5d 32 0c 98 0b 93 d1 e9 b6 e4 2e 67 5c f1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e6 24 a9 20 36 d0 44 65 2c ba 3d 80 21 f7 06 3f | IKEv2 nonce 8d eb de 66 e7 ca a9 01 80 86 00 a0 79 48 c1 d0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9e 04 07 cd 3c 90 2d 57 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8a | natd_hash: port= 01 f4 | natd_hash: hash= af 88 b2 43 70 03 fc c5 39 dd 7b 65 af e5 61 63 | natd_hash: hash= 70 8d 5a 32 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data af 88 b2 43 70 03 fc c5 39 dd 7b 65 af e5 61 63 | Notify data 70 8d 5a 32 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9e 04 07 cd 3c 90 2d 57 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 84 c7 81 66 9c 3a cd fa d9 98 02 0d f2 5f b1 72 | natd_hash: hash= 68 cd 62 b2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 84 c7 81 66 9c 3a cd fa d9 98 02 0d f2 5f b1 72 | Notify data 68 cd 62 b2 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #138 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #138: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #138 to 4294967295 after switching state | Message ID: IKE #138 skipping update_recv as MD is fake | Message ID: sent #138 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-138" #138: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.138:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #138) | 9e 04 07 cd 3c 90 2d 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 26 9c 69 c2 fb a0 0a d4 c6 8a e3 3a 35 d9 72 | c4 6d dc 97 97 46 4f 49 45 f3 89 7c 26 93 32 59 | 0e 55 34 82 9b 12 80 e6 60 cd 9e 59 15 f7 7d 65 | 53 e2 d3 d8 c2 ed 2c ad 8a b3 a9 0f 4d 3e ac 86 | 1c 67 54 95 04 00 bf 86 4e 8b bf af 44 15 eb 62 | ea cc 94 5a 6b 1a 81 0f 38 cc a4 0b 8b 3e f7 1f | ed 1b ee bf 3c b7 b3 6b c3 78 66 29 1f dc 55 cd | cd 9e c4 55 82 0d 26 16 81 1d 3b 87 44 bb 54 ef | 02 0c 05 f7 04 a0 83 3c c1 fe 2c d3 4e 3d ca 62 | 71 e8 db ac f9 9d 90 a6 0d 1e d9 94 f5 c3 29 22 | f5 2c d8 67 db 54 e1 d3 df b5 df 85 0d 36 cf 0c | 0f 08 0d 38 84 31 cd 9b 35 a0 fd df e8 86 86 f3 | a8 84 f3 56 c8 9a eb 02 1a c2 37 30 b1 0d 51 72 | 6c ba 2c ab f4 fb 66 85 22 97 66 d7 6b a3 32 2b | 57 22 c0 38 a7 76 1b d3 ea e0 94 87 f8 5d 23 88 | 1d 92 5d 32 0c 98 0b 93 d1 e9 b6 e4 2e 67 5c f1 | 29 00 00 24 e6 24 a9 20 36 d0 44 65 2c ba 3d 80 | 21 f7 06 3f 8d eb de 66 e7 ca a9 01 80 86 00 a0 | 79 48 c1 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 af 88 b2 43 70 03 fc c5 39 dd 7b 65 | af e5 61 63 70 8d 5a 32 00 00 00 1c 00 00 40 05 | 84 c7 81 66 9c 3a cd fa d9 98 02 0d f2 5f b1 72 | 68 cd 62 b2 | state #138 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a276e0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a276e0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #138 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 | #138 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49611.41446 | resume sending helper answer for #138 suppresed complete_v2_state_transition() and stole MD | #138 spent 0.723 milliseconds in resume sending helper answer | stop processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34002a900 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e 04 07 cd 3c 90 2d 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #138 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #138 | rejected packet: | 9e 04 07 cd 3c 90 2d 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #138: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0873 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1af10 | handling event EVENT_RETRANSMIT for parent state #86 | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #86 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #86 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49611.457708; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003336 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a30d70 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #86 | libevent_malloc: new ptr-libevent@0x7fb34002a900 size 128 "road-eastnet-nonat-86" #86: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #86) | bc cc 1d a8 6f 14 2f d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 02 f4 30 81 01 a2 84 c7 c8 75 14 73 a0 b4 f1 | ce 00 5c 2a 70 74 58 bb 3e a0 6e e2 4f 0a 9f 83 | 08 76 97 6b fa 62 74 7d db ae df 90 de 69 8c b2 | 0e 6c a5 3a 87 61 1a 3a 8f 5d a0 5a ba ab 91 5a | 1c 85 49 b3 c5 25 e7 4c 6e 03 2b ac 66 42 56 f1 | d7 31 b5 bb 5b 45 b9 dd 90 6d ee 07 cc 7c f5 62 | 74 01 c5 67 95 ba 42 bf 74 f6 d2 a1 03 af 1b fd | e4 7f bc c7 c5 75 0a a8 6e 5c 9e 6c 4f 5b c1 73 | df 6f 2d 86 ef d9 7b 7f 50 00 74 9f 02 e6 99 af | 69 db f9 f3 80 3c 99 58 33 58 03 46 c0 6e d1 8c | d1 aa bb ba e8 f4 a9 85 5b aa 0d 22 6e e9 62 24 | 0d 2c d4 54 19 e8 97 d8 e7 d3 1e 75 fe 1d 11 bb | 8a ef b3 15 49 d2 bd 11 ce 93 3c 78 52 c8 0e 77 | 1d b3 5a f2 76 6d 63 9a e0 92 62 06 a0 bc 29 93 | a6 78 17 fe 37 4a 17 27 33 46 cd 3f 1c 77 4a d6 | df 68 38 cd 2b 58 7b 28 94 f9 86 34 46 7d e4 ec | 29 00 00 24 3f 6f 33 90 58 31 9c 9e c4 12 e4 33 | 9b 9e 11 d9 fa de 80 3a 9a 7c 3d 2b 3e 4c e8 aa | 92 49 b7 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 27 7b 26 e6 59 48 3b 7c 9f 7a cf | bb 52 6d 94 e2 1f 43 00 00 00 00 1c 00 00 40 05 | 49 8d b2 ff d2 6f bf 71 ec 03 78 4c 49 00 83 b0 | 23 90 3a 8b | libevent_free: release ptr-libevent@0x7fb3600180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1af10 | #86 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc cc 1d a8 6f 14 2f d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #86 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #86 | rejected packet: | bc cc 1d a8 6f 14 2f d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #86: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.067 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b610 | handling event EVENT_RETRANSMIT for parent state #131 | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #131 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #131 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49611.462068; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500652 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1af10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #131 | libevent_malloc: new ptr-libevent@0x7fb3600180b0 size 128 "road-eastnet-nonat-131" #131: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #131) | ad 34 7c 82 56 8e 42 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 46 e3 f8 a7 ca 79 f1 93 d8 0a 34 f9 91 ea 90 | 77 1f 83 03 4d 56 b1 a2 80 fd 5f 11 9a a9 0e 07 | 36 d2 ed 03 17 79 a3 f7 12 9f 05 ea 25 52 aa 39 | 69 97 15 3f 13 ff 62 78 88 a8 12 45 6d 5a 25 bd | 48 89 e9 ef 1f ad 28 87 00 42 ce a4 5f 7b 92 dc | 5d 1c f0 bb 25 31 dd e0 95 17 e2 9c e6 0b 50 26 | d7 14 f3 fe 1e d8 81 cc 32 fc 47 d4 65 1e 3b 75 | 32 54 1f 31 95 11 57 b2 4c 02 a6 33 ce 14 e9 e2 | e8 05 1b 1c cb 66 89 aa 6f 57 54 90 f2 c1 cf bd | a5 b3 7a c8 ef 67 d8 5e 26 3c 19 61 97 89 69 83 | 4b df 7e 44 0f 87 25 bc 6c 4f d8 49 5f 35 7f 1f | 6e 25 45 69 17 ee 43 65 f2 ee f7 63 5d 98 79 9e | fc c9 a2 e1 68 04 58 49 4b 9f c5 76 64 08 49 29 | 17 3a 17 1d 87 31 e4 d7 77 de 85 c2 0a d4 26 0f | 9f f4 0b fc 3f 26 bf f9 03 95 99 d3 57 10 6f ed | 92 8e 36 88 87 df d0 52 c8 ab 1d e3 6f cc ae 49 | 29 00 00 24 3c 10 ae 50 61 d8 53 b3 d3 e2 21 42 | 85 3a 07 db 01 3a f5 3e 94 0e a7 09 dd b2 ae 2b | e1 07 91 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 36 c8 4a f5 a5 90 83 e4 ec b2 3e | 44 38 46 9b 6e 4b f9 11 00 00 00 1c 00 00 40 05 | 1e 37 ad 88 e1 0a 42 8f 3f c7 b2 8c f4 b1 3f 27 | c4 6f 80 e6 | libevent_free: release ptr-libevent@0x7fb34c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b610 | #131 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 34 7c 82 56 8e 42 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #131 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #131 | rejected packet: | ad 34 7c 82 56 8e 42 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #131: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #31 | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #31 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #31 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49611.47043; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.001196 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b610 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #31 | libevent_malloc: new ptr-libevent@0x7fb34c00cf80 size 128 "road-eastnet-nonat-31" #31: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #31) | d5 d5 f7 7f 23 0d 4b 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 d8 4b a5 f9 d4 3a a9 51 97 2e 27 d1 cc 90 15 | e2 e2 8d 96 07 4d fd 40 9f 4f 7f 6f 35 0e 23 bc | 4a 6a 76 f9 9f 83 b0 54 30 ee b6 fc 0a 45 0c 73 | 2d e9 2a b2 ca 81 a2 ff 50 db 13 29 75 7d e9 7e | a9 33 06 c4 32 68 94 61 41 2b 8d f1 ff df 69 cc | e8 c4 b4 6d ef bc 3d c5 49 cc a7 2a fc 4c 98 e2 | 30 43 57 19 e1 0a 22 00 d7 07 6f aa ba 35 b2 14 | 36 27 5e 66 b6 08 a0 40 46 47 86 94 6d 23 bf ed | 9b 86 94 95 7d 7c df ed 26 58 08 d9 19 18 cf 17 | d2 31 cb 23 b8 00 65 a0 2d c7 80 be d9 c6 2d 9b | 2d 24 dd 1f 09 8c cb bd 5d a9 d7 7b 30 d7 87 68 | f3 c0 0e 20 8d c3 3f 32 80 d9 ab 29 26 00 09 ea | b0 b4 2f 7d 8f fc 22 1d 7c 39 80 08 04 22 2a 49 | f4 26 0e 59 4e ac 0e 0e 46 93 3b ba 87 01 a8 59 | ea 18 2f 09 70 d0 fb 69 f1 4a 19 c7 fd d5 be f0 | ff bb d7 7c ef dd e5 ed c9 a4 0a b6 e1 11 1b ed | 29 00 00 24 6a 1e b5 3b 00 37 08 50 6d 81 0e e2 | cf 1b 46 47 4b 2b 09 3d 6e 9a 95 9d 52 78 61 ae | d4 0d 66 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 91 23 cd ed e8 35 56 6f f7 85 4c | 49 64 a9 75 0a 07 1b 5f 00 00 00 1c 00 00 40 05 | a3 62 6c f7 52 92 b8 35 33 98 a9 6b 00 6d db 28 | 96 bc 0a b6 | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | #31 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 d5 f7 7f 23 0d 4b 11 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #31 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #31 | rejected packet: | d5 d5 f7 7f 23 0d 4b 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #31: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0679 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #125 | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #125 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #125 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49611.477788; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00173 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #125 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 "road-eastnet-nonat-125" #125: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #125) | f8 42 71 02 91 3f e5 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 9e 73 35 93 13 e2 cc 9b bb 37 d3 75 99 15 b9 | c8 4a ce 55 d3 69 e2 90 ce b4 49 6a 8b 41 15 d7 | f2 46 e0 27 62 0c f2 50 c4 fb 7a 1e 5f c1 57 37 | ab d6 7e 39 28 cf 50 b1 15 3d a6 21 69 94 78 9b | 54 78 01 d1 17 2e a1 fd 93 52 02 9b 3c fa 9a 7e | f8 6f 1b 35 4d b8 9a ab 6d e7 64 f6 f2 1a 64 ed | d4 92 58 2f 44 f7 44 27 44 49 1f 1e 22 3d 31 b1 | 50 2c 4d bf f2 3d 61 05 62 ba 25 68 46 81 35 68 | ee 83 cc 8e 2f 04 b6 7e f4 22 67 88 a2 a7 7a f7 | d0 39 1f 83 7d bc f9 79 5c 9d a8 05 2d 41 b5 ef | cc 86 a3 2b c2 79 2a 6d ea bc cb e6 b2 db 61 3a | 30 32 b0 ff 93 a0 20 c1 58 b9 6f 0c 98 fb c0 64 | d2 03 d7 d7 ac 87 bc 66 28 b7 cc 94 87 ea 24 29 | 58 cf 8f 26 39 81 cd e2 dc 0f e9 13 b2 ad b9 3b | 9a e1 c6 4a a2 fb 0d d5 e3 d1 b9 df 52 b9 c6 69 | 37 c0 e4 dc a2 a0 32 29 a3 ce 29 ec cc 5f 70 82 | 29 00 00 24 10 12 73 da 9a 48 c8 49 81 7a 15 0b | 6c a0 98 5f 53 25 0d 7d 05 70 86 c7 7b b0 fa 34 | 5d 40 8d 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 88 74 d5 c4 71 1e 67 79 c5 82 86 | 3b ab 9f 01 a1 7f ec b6 00 00 00 1c 00 00 40 05 | cc 1e cf e5 ba 96 b4 e9 50 32 59 97 59 23 89 39 | 4f 1c 94 28 | libevent_free: release ptr-libevent@0x7fb364017f20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #125 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 42 71 02 91 3f e5 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #125 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #125 | rejected packet: | f8 42 71 02 91 3f e5 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #125: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-139" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-139' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #139 at 0x557d46a92480 | State DB: adding IKEv2 state #139 in UNDEFINED | pstats #139 ikev2.ike started | Message ID: init #139: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #139: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #139; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-139" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-139" IKE SA #139 "road-eastnet-nonat-139" "road-eastnet-nonat-139" #139: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-139 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-139": constructed local IKE proposals for road-eastnet-nonat-139 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 139 for state #139 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a6b490 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #139 | libevent_malloc: new ptr-libevent@0x7fb364017f20 size 128 | #139 spent 0.142 milliseconds in ikev2_parent_outI1() | crypto helper 5 resuming | crypto helper 5 starting work-order 139 for state #139 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 139 | RESET processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-139" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.241 milliseconds in whack | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 139 time elapsed 0.000998 seconds | (#139) spent 0.998 milliseconds in crypto helper computing work-order 139: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 139 for state #139 to event queue | scheduling resume sending helper answer for #139 | libevent_malloc: new ptr-libevent@0x7fb34402a950 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #139 | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 139 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #139 | **emit ISAKMP Message: | initiator cookie: | 98 4d 89 18 32 14 8f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-139 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fb bc f6 61 86 12 c3 bf 44 ad ab c8 f8 6d 1d 7a | ikev2 g^x 8e 0b a1 af 30 f0 3a 9c 0b 72 59 7b 0e cc 41 e5 | ikev2 g^x 8e 8e a0 7e 30 1e 50 82 23 bf b6 e1 69 ee be 0d | ikev2 g^x cc 36 07 e5 53 86 7d cf f5 63 8d 89 06 e8 7e 7e | ikev2 g^x 8f 2c 9d a8 ed 05 f6 a5 d3 42 db b5 95 59 0b 32 | ikev2 g^x 04 71 41 13 63 f9 4a 4c 42 0e 00 d5 c5 99 ba ab | ikev2 g^x 17 4c ce 49 6c 52 88 21 1f b3 2a 6c 8d cc 9d ad | ikev2 g^x 58 96 b7 c5 a6 44 e9 2c bb f7 31 ef f0 0b f9 1c | ikev2 g^x 1b 4e 21 f5 a2 ea 26 1f 03 aa b4 4e 34 e2 87 84 | ikev2 g^x cf 38 c7 5e ef db 85 1f 03 a7 73 48 68 be 7e b1 | ikev2 g^x 00 74 8f e9 65 a8 0b 8a 27 e7 a0 51 5b c9 e3 2d | ikev2 g^x 64 f7 22 1b 1e b7 6f af e1 0f 11 f6 9b 82 c4 de | ikev2 g^x 33 fe da 26 0e d7 f8 c3 43 49 4f e1 38 7e 8a 70 | ikev2 g^x 40 40 85 6b ea cf c0 b6 a0 c2 ac 2b eb 0c 58 ce | ikev2 g^x 0e cd 1f 9c 72 bb e0 55 da 15 7c 5d ad 4e 80 77 | ikev2 g^x d9 86 7e 35 e9 dd 73 d2 de c2 f2 ae 3e 6a 77 fd | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ce a2 61 71 0b 59 18 45 32 ff fc 20 d2 f9 be 9d | IKEv2 nonce 52 e8 20 ba 16 46 42 c2 a8 74 a7 11 49 eb 52 b6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 98 4d 89 18 32 14 8f 1c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8b | natd_hash: port= 01 f4 | natd_hash: hash= 65 5e 21 46 6e c2 25 7d 16 7d 1e 10 d1 b7 00 9d | natd_hash: hash= a8 c1 7e fa | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 65 5e 21 46 6e c2 25 7d 16 7d 1e 10 d1 b7 00 9d | Notify data a8 c1 7e fa | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 98 4d 89 18 32 14 8f 1c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 95 96 61 58 5f 24 29 d9 13 26 c9 57 d8 b0 16 e2 | natd_hash: hash= 35 e6 bc 7d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 95 96 61 58 5f 24 29 d9 13 26 c9 57 d8 b0 16 e2 | Notify data 35 e6 bc 7d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #139 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #139: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #139 to 4294967295 after switching state | Message ID: IKE #139 skipping update_recv as MD is fake | Message ID: sent #139 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-139" #139: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.139:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #139) | 98 4d 89 18 32 14 8f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb bc f6 61 86 12 c3 bf 44 ad ab c8 f8 6d 1d 7a | 8e 0b a1 af 30 f0 3a 9c 0b 72 59 7b 0e cc 41 e5 | 8e 8e a0 7e 30 1e 50 82 23 bf b6 e1 69 ee be 0d | cc 36 07 e5 53 86 7d cf f5 63 8d 89 06 e8 7e 7e | 8f 2c 9d a8 ed 05 f6 a5 d3 42 db b5 95 59 0b 32 | 04 71 41 13 63 f9 4a 4c 42 0e 00 d5 c5 99 ba ab | 17 4c ce 49 6c 52 88 21 1f b3 2a 6c 8d cc 9d ad | 58 96 b7 c5 a6 44 e9 2c bb f7 31 ef f0 0b f9 1c | 1b 4e 21 f5 a2 ea 26 1f 03 aa b4 4e 34 e2 87 84 | cf 38 c7 5e ef db 85 1f 03 a7 73 48 68 be 7e b1 | 00 74 8f e9 65 a8 0b 8a 27 e7 a0 51 5b c9 e3 2d | 64 f7 22 1b 1e b7 6f af e1 0f 11 f6 9b 82 c4 de | 33 fe da 26 0e d7 f8 c3 43 49 4f e1 38 7e 8a 70 | 40 40 85 6b ea cf c0 b6 a0 c2 ac 2b eb 0c 58 ce | 0e cd 1f 9c 72 bb e0 55 da 15 7c 5d ad 4e 80 77 | d9 86 7e 35 e9 dd 73 d2 de c2 f2 ae 3e 6a 77 fd | 29 00 00 24 ce a2 61 71 0b 59 18 45 32 ff fc 20 | d2 f9 be 9d 52 e8 20 ba 16 46 42 c2 a8 74 a7 11 | 49 eb 52 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 5e 21 46 6e c2 25 7d 16 7d 1e 10 | d1 b7 00 9d a8 c1 7e fa 00 00 00 1c 00 00 40 05 | 95 96 61 58 5f 24 29 d9 13 26 c9 57 d8 b0 16 e2 | 35 e6 bc 7d | state #139 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb364017f20 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a6b490 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #139 | libevent_malloc: new ptr-libevent@0x7fb364017f20 size 128 | #139 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49611.480847 | resume sending helper answer for #139 suppresed complete_v2_state_transition() and stole MD | #139 spent 0.464 milliseconds in resume sending helper answer | stop processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34402a950 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 4d 89 18 32 14 8f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #139 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #139 | rejected packet: | 98 4d 89 18 32 14 8f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #139: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a30d30 | handling event EVENT_RETRANSMIT for parent state #110 | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #110 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #110 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49611.513073; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003299 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7fec0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #110 | libevent_malloc: new ptr-libevent@0x7fb34402a950 size 128 "road-eastnet-nonat-110" #110: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #110) | 3a df d4 0d 3f 72 b9 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 51 e2 9f 86 58 b1 8c 95 ac 68 08 4c 4a f6 70 | ad a1 89 82 51 9f 97 f7 49 8c 33 6b 14 6a e8 d8 | 5d 56 92 c8 3c 2c 40 17 32 2d 8f e8 79 30 ee 40 | f9 ba 9e a6 39 a8 9f 6a 60 30 36 fa 91 73 4e bf | e6 d5 bf ce 9d 89 72 4d e1 c3 4f 68 a3 0e 2d 22 | 55 9f 70 0b d2 5a 8e 49 bb 26 55 db 7b 06 39 59 | 26 09 73 11 d4 24 0c 12 fd 4f 4c 65 6c 3c af 90 | 8b 17 1f a8 52 96 38 96 91 03 13 81 89 15 d8 cf | 89 39 0b 98 8d cb b9 22 57 8d d7 cd 73 bd 42 b5 | c1 8a b1 55 88 ee 90 bf 86 98 c5 68 56 01 34 02 | ea ea cd ee 0d 3a 71 7c d0 06 82 a7 ca 34 05 ec | e1 16 4c 22 f3 b3 ca 01 1c d1 2d c9 10 65 0e d7 | 83 4d bc 53 a1 a2 68 8a 44 da c7 16 6f 1e 28 70 | e8 f3 08 87 27 18 70 75 bc 4e bd 4f 1d 1a 9f 84 | ef 78 e6 04 c6 13 ce e5 f8 3c cb 1e ba 12 8a 0a | 59 36 fd 3c 70 1f 1b ce d5 b3 7d ea 00 09 cd 9d | 29 00 00 24 58 d9 16 9f 6f 84 74 3f e6 2f bd ae | 97 8a 68 2c 39 11 78 2c 3d 3c 5e 7b f6 a4 c9 df | f7 87 68 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f6 22 5f bf 4c e5 cb 6e 52 c3 e8 | bb 73 1b e3 52 cd b5 da 00 00 00 1c 00 00 40 05 | 55 f2 83 9d d0 ff 8f 70 ef 45 0c 6f 49 6d a9 68 | 5e 51 a7 34 | libevent_free: release ptr-libevent@0x7fb37800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a30d30 | #110 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a df d4 0d 3f 72 b9 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #110 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #110 | rejected packet: | 3a df d4 0d 3f 72 b9 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #110: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #87 | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #87 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #87 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49611.520347; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004231 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a30d30 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #87 | libevent_malloc: new ptr-libevent@0x7fb37800cf80 size 128 "road-eastnet-nonat-87" #87: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #87) | a2 df 19 46 98 d4 bb 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de ac a7 56 a2 bc 95 5a 6c 57 c8 2b e0 20 68 16 | a2 ff 5a bd 83 94 6a 4d 58 8c b2 a4 d4 76 ed fc | 0f 4a 9b b9 df 7c 6c 34 8f 70 fd e9 a0 17 cd ff | 42 ae c6 35 53 50 df 4f 92 fb b8 ae 34 b4 21 4a | 96 f4 d2 6a f3 c3 2c b1 14 ce 42 da 82 6b e3 0d | db 7a 9e a9 08 f5 73 b2 1d 45 e9 bc fe 79 e6 2d | 2f 0a 64 4b ee 86 b7 4b 3f 77 d9 fd c5 b0 bd d9 | f0 f9 4a 67 c3 b1 50 bb ba e6 76 27 0e 9b 80 ac | ac a5 3d ed e4 7f 3e ce 9b 7e 70 ae 76 56 31 41 | 17 98 86 1f 1f 85 2b 2b b2 36 28 19 25 14 37 3e | bb a6 a5 e3 f0 64 b9 9c 0b af e9 c8 fc dd 9d 10 | 05 4f 6e 73 4c 08 a1 b5 54 a0 ae e0 d5 30 bc af | af 63 ef 9e e4 70 09 3a 1e 60 6f c5 bb 77 c5 0b | 60 c8 18 55 dd 77 cc 86 3f 7c 34 56 80 93 c4 30 | 61 51 d7 11 b2 4d 6f 17 c0 8c 7f d5 08 fa 5f 63 | d7 b3 cd 14 9f 3a 9d 07 13 ee 34 e9 84 52 68 1b | 29 00 00 24 8b f5 b9 e8 72 8a d8 5e 1a d6 70 1a | a6 5f 3d 02 9f 40 bc e8 9c c3 88 16 89 ec af ca | b1 90 6f 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 83 d5 c2 93 bc 76 7b c0 f5 6a f5 | c6 03 a7 0c 52 da b8 7c 00 00 00 1c 00 00 40 05 | 9f 00 07 ca 6e 64 62 64 56 d5 c5 aa 95 9f c8 6b | 83 2b 36 93 | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #87 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 df 19 46 98 d4 bb 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #87 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #87 | rejected packet: | a2 df 19 46 98 d4 bb 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #87: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a82ac0 | handling event EVENT_RETRANSMIT for parent state #132 | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #132 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #132 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49611.524615; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500405 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #132 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 "road-eastnet-nonat-132" #132: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #132) | 8f fb fe 61 19 e1 9c b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 1f 4f d1 68 44 b0 da 10 cc a3 65 0b 05 29 46 | a5 ef 62 34 d2 17 30 f6 7e b7 1c 3d c0 61 fd c8 | 25 96 8a e1 67 57 19 a7 8f 6a aa 6e 4c 1e 1c bb | 2a 10 04 d7 17 65 58 ce 83 ac 91 4f 48 71 e3 8d | af 3f 22 d8 df 00 4a d4 1b df 76 a7 ad 26 ba ba | 91 be fb 08 a9 70 66 2f 99 bf ef e8 c6 21 cc c0 | ed 1d fb 20 f6 60 07 53 22 da 88 1b 1d 11 4a 37 | e6 c8 75 11 02 89 b4 55 ec 0c 8b 31 52 06 0f 18 | 81 e2 42 d3 fe 87 7f dc c5 02 18 bb 87 cb 91 7a | 01 aa 5e f6 49 fd e3 ed df 8b 65 4a 5d 0c dc 05 | 45 9e f7 6f 6c 11 d8 bd 19 75 3d 5b 55 32 77 3d | 44 4c 11 8d 32 50 da 6e 0a 86 ef 69 5f 2a bb 9d | b7 76 10 6b da 52 00 cf e9 de 40 71 fd 9c 21 a3 | 2a ac 7a 1a 3b 67 9b 88 e6 1e 25 7c 3a 6e 9c 54 | 4b 96 e9 1a 08 38 3b 3b 27 21 e9 0c 79 a6 d9 1c | 14 07 fc c1 42 9e 29 79 0d 68 f7 e2 3d 93 ce 38 | 29 00 00 24 92 fc 82 18 58 23 4b 06 62 ee b8 b2 | f1 d5 54 0c 3d b0 88 33 58 36 a6 39 d7 5f 04 ee | ca 34 01 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 e7 04 0b 0d 59 5a cd 8a 54 e3 8a | 4e 81 3b 76 de 25 c1 57 00 00 00 1c 00 00 40 05 | c3 b5 61 af 5d 2d 46 0f c8 2c 48 99 41 b8 6c e0 | 5b 12 cb e3 | libevent_free: release ptr-libevent@0x7fb3780251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a82ac0 | #132 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f fb fe 61 19 e1 9c b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #132 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #132 | rejected packet: | 8f fb fe 61 19 e1 9c b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #132: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-140" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-140' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #140 at 0x557d46a93a40 | State DB: adding IKEv2 state #140 in UNDEFINED | pstats #140 ikev2.ike started | Message ID: init #140: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #140: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #140; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-140" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-140" IKE SA #140 "road-eastnet-nonat-140" "road-eastnet-nonat-140" #140: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-140 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-140": constructed local IKE proposals for road-eastnet-nonat-140 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 140 for state #140 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a82ac0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #140 | libevent_malloc: new ptr-libevent@0x7fb3780251c0 size 128 | crypto helper 3 resuming | #140 spent 0.156 milliseconds in ikev2_parent_outI1() | crypto helper 3 starting work-order 140 for state #140 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 140 | RESET processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-140" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.254 milliseconds in whack | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 140 time elapsed 0.000803 seconds | (#140) spent 0.805 milliseconds in crypto helper computing work-order 140: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 140 for state #140 to event queue | scheduling resume sending helper answer for #140 | libevent_malloc: new ptr-libevent@0x7fb33802a950 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #140 | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 140 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #140 | **emit ISAKMP Message: | initiator cookie: | 7b af c7 ac 06 7e 5a 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-140 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6b 03 39 d2 09 32 a1 ff 81 2d 15 dc 96 08 01 c1 | ikev2 g^x 8e 0a 6e 33 a6 3e 74 05 5c 15 33 12 1d f7 12 20 | ikev2 g^x db f5 3e 24 ba 17 01 dc a0 95 5b 2c 7b 77 c2 3e | ikev2 g^x 02 67 33 d7 d6 86 dc 63 50 16 65 87 a1 a9 2b c2 | ikev2 g^x 68 87 45 fa 03 db 21 3c 23 cd d5 14 5d 40 bf 10 | ikev2 g^x 6f 14 34 95 51 53 c7 d5 77 b9 67 66 94 9a cd 21 | ikev2 g^x 08 bb de 59 ba ca 48 d5 21 97 e5 28 87 2d fd 83 | ikev2 g^x d2 62 24 c7 7c f8 ac 68 7a f8 c3 7f 7d 8d 72 d0 | ikev2 g^x 9d 64 ef 67 4b f1 5c 24 57 ca c2 b1 9f b6 11 d3 | ikev2 g^x 07 3e 55 51 fc 73 7a 83 2c 11 87 97 33 3d 5c cd | ikev2 g^x 48 68 02 58 27 c2 fe 9a f6 51 01 87 b5 32 4d fc | ikev2 g^x 09 2c 09 a0 1f 82 25 e8 47 96 80 8e 9d 80 b5 a7 | ikev2 g^x 86 8d 11 ad 04 69 30 3a 7c 49 92 c3 9e 7f 81 14 | ikev2 g^x 42 d8 62 ef 10 0a 21 b2 bb b9 42 01 9c 86 19 33 | ikev2 g^x dd 9b 24 b9 8a d5 68 9d ee 00 85 c1 cc df b7 34 | ikev2 g^x d9 c8 e4 31 8c bd d3 67 7d ad 51 86 db 69 96 5d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f8 43 b0 82 a0 04 df 35 49 ed 46 83 05 44 45 f4 | IKEv2 nonce 4f f6 f3 e1 63 59 5a aa 3f 59 d1 20 a6 81 b5 27 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7b af c7 ac 06 7e 5a 38 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8c | natd_hash: port= 01 f4 | natd_hash: hash= 0a 8e a2 d1 63 df 73 41 77 f0 6a b9 17 c7 13 b6 | natd_hash: hash= 69 6d 12 29 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0a 8e a2 d1 63 df 73 41 77 f0 6a b9 17 c7 13 b6 | Notify data 69 6d 12 29 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7b af c7 ac 06 7e 5a 38 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a8 9c d4 0d d7 3c af a8 56 f5 ab f4 4f 7a 90 fd | natd_hash: hash= 96 a4 e3 47 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a8 9c d4 0d d7 3c af a8 56 f5 ab f4 4f 7a 90 fd | Notify data 96 a4 e3 47 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #140 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #140: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #140 to 4294967295 after switching state | Message ID: IKE #140 skipping update_recv as MD is fake | Message ID: sent #140 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-140" #140: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.140:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #140) | 7b af c7 ac 06 7e 5a 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 03 39 d2 09 32 a1 ff 81 2d 15 dc 96 08 01 c1 | 8e 0a 6e 33 a6 3e 74 05 5c 15 33 12 1d f7 12 20 | db f5 3e 24 ba 17 01 dc a0 95 5b 2c 7b 77 c2 3e | 02 67 33 d7 d6 86 dc 63 50 16 65 87 a1 a9 2b c2 | 68 87 45 fa 03 db 21 3c 23 cd d5 14 5d 40 bf 10 | 6f 14 34 95 51 53 c7 d5 77 b9 67 66 94 9a cd 21 | 08 bb de 59 ba ca 48 d5 21 97 e5 28 87 2d fd 83 | d2 62 24 c7 7c f8 ac 68 7a f8 c3 7f 7d 8d 72 d0 | 9d 64 ef 67 4b f1 5c 24 57 ca c2 b1 9f b6 11 d3 | 07 3e 55 51 fc 73 7a 83 2c 11 87 97 33 3d 5c cd | 48 68 02 58 27 c2 fe 9a f6 51 01 87 b5 32 4d fc | 09 2c 09 a0 1f 82 25 e8 47 96 80 8e 9d 80 b5 a7 | 86 8d 11 ad 04 69 30 3a 7c 49 92 c3 9e 7f 81 14 | 42 d8 62 ef 10 0a 21 b2 bb b9 42 01 9c 86 19 33 | dd 9b 24 b9 8a d5 68 9d ee 00 85 c1 cc df b7 34 | d9 c8 e4 31 8c bd d3 67 7d ad 51 86 db 69 96 5d | 29 00 00 24 f8 43 b0 82 a0 04 df 35 49 ed 46 83 | 05 44 45 f4 4f f6 f3 e1 63 59 5a aa 3f 59 d1 20 | a6 81 b5 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a 8e a2 d1 63 df 73 41 77 f0 6a b9 | 17 c7 13 b6 69 6d 12 29 00 00 00 1c 00 00 40 05 | a8 9c d4 0d d7 3c af a8 56 f5 ab f4 4f 7a 90 fd | 96 a4 e3 47 | state #140 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3780251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a82ac0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a82ac0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #140 | libevent_malloc: new ptr-libevent@0x7fb3780251c0 size 128 | #140 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49611.545391 | resume sending helper answer for #140 suppresed complete_v2_state_transition() and stole MD | #140 spent 0.459 milliseconds in resume sending helper answer | stop processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb33802a950 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7b af c7 ac 06 7e 5a 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #140 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #140 | rejected packet: | 7b af c7 ac 06 7e 5a 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #140: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0507 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f61a0 | handling event EVENT_RETRANSMIT for parent state #32 | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #32 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #32 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49611.548576; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00476 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7a350 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #32 | libevent_malloc: new ptr-libevent@0x7fb33802a950 size 128 "road-eastnet-nonat-32" #32: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #32) | 91 2f 9d 69 76 5d 8a 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 54 17 4f f3 31 b1 0f c2 14 96 a0 49 f3 c5 20 | 38 78 7d e5 0a d8 95 bc 7a a9 a2 f1 ff ab 0d 66 | a2 fe 53 90 8e fe 51 43 04 57 01 9c e7 22 ca 9e | 98 aa 3b 0d 0d 5f ee 9d 1e 59 e6 04 c4 7f 07 84 | f1 a5 dc 31 6f fa b4 db 4a d9 1c 93 5d b0 7e 5d | 37 79 07 ab 3e 5c a3 de d6 8b a4 ac df 4b a7 7c | af 6f 03 fd 31 bd 7d c1 34 31 76 57 00 e4 23 e1 | 82 cb b8 38 12 59 cd 21 e3 0e 67 54 27 e1 6e 8f | 1e a1 dd 84 f8 ca 82 2a 39 9d 17 56 58 46 a3 3b | 7b 5d 3a 21 a2 b3 03 79 c6 bd 25 cc df a0 12 67 | b3 f4 5a c2 b0 73 2d 33 df 1c dc fa 26 25 56 72 | 59 7b 3c f0 d8 e2 d9 b0 57 2e 4a 8e ec 96 92 09 | 75 70 f6 57 59 ce 54 70 90 14 41 34 b1 57 0f 5d | 19 dd 8a a1 77 43 7e cf 1c ef 3e 0b 72 1e cc f4 | 78 66 2f 15 74 e8 33 6b d3 89 bb a9 fb bc fa 46 | 95 b5 88 f8 a3 91 1f 3a b1 92 bc 1e 84 a5 5b 07 | 29 00 00 24 2d 29 95 26 bc 23 fe d9 76 bb c2 d5 | 43 41 98 03 bf c6 eb 4a b9 6e a6 4e f6 f7 82 f1 | 09 94 9d 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 13 8b 5d 25 b5 3b 06 af a0 3f ac | be 9b 92 09 9d c4 50 7f 00 00 00 1c 00 00 40 05 | ef 32 45 23 d7 6a b0 96 66 7f 58 39 f6 19 a5 1f | 4b 49 56 02 | libevent_free: release ptr-libevent@0x7fb37401f7f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f61a0 | #32 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 2f 9d 69 76 5d 8a 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #32 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #32 | rejected packet: | 91 2f 9d 69 76 5d 8a 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #32: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0917 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a15810 | handling event EVENT_RETRANSMIT for parent state #126 | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #126 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #126 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49611.553937; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001603 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7a390 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #126 | libevent_malloc: new ptr-libevent@0x7fb37401f7f0 size 128 "road-eastnet-nonat-126" #126: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #126) | e8 37 9e 74 e5 40 14 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 2e 1b 05 80 5b 31 08 d1 66 2e 5c f6 e3 82 b6 | cf 5f b9 6a dd 55 f8 75 d5 3d b8 5c bd 4f c2 50 | 0a c1 a5 ba ac d3 ed a9 a2 26 e9 cf 5d c3 e4 66 | fe 0f 85 c2 a3 49 2f d8 4a 79 55 9a fa 0f f5 79 | a1 74 22 f0 7e 0f 09 7b 62 ab a2 9e b4 ea 39 68 | 42 b2 f9 25 9e 6d 73 5b 0f 09 1e ea 93 29 57 3e | 0b 28 34 22 62 d9 38 bd 99 bc 2b d5 1f 39 74 2e | a0 e4 e1 6b 64 87 fc 4f 05 cf 11 87 31 49 19 0e | 81 e6 fe 59 5e 93 b2 b8 96 16 02 eb 5c 73 68 d5 | 8f 57 c4 c3 f1 4b 35 e7 45 9d 6f ab 95 16 38 da | 48 f9 98 9a 6a b3 e3 05 7e d3 b1 16 a3 ba 0c e1 | 94 2d b8 d2 c3 17 d4 a2 cf ba 7e e1 17 95 db f9 | 30 a3 18 b6 15 c5 b0 4b 3c 79 61 0d 1e 89 51 db | 9f 34 0b 87 9c ce 8f 37 05 a4 88 d5 17 64 46 6f | 94 21 dd 40 17 99 04 39 5f 44 53 61 87 2c 68 27 | 48 25 14 cc 6b a9 f6 c2 49 c7 4e ae 4c 5d 8d 5b | 29 00 00 24 d1 b1 6b 78 78 5e 9b dd d4 c3 b9 87 | 6c a1 e5 10 d6 78 32 5b 72 67 12 c8 56 ea b2 20 | 83 0f e6 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 48 05 b5 88 11 05 1e fc 96 b7 8b | c4 84 87 55 48 6d 71 7e 00 00 00 1c 00 00 40 05 | a7 78 89 b5 72 dc 59 97 b9 1b 86 02 9b 2c 28 d0 | 8e b7 7c 05 | libevent_free: release ptr-libevent@0x7fb3440180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a15810 | #126 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 37 9e 74 e5 40 14 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #126 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #126 | rejected packet: | e8 37 9e 74 e5 40 14 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #126: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0588 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c00d120 | handling event EVENT_RETRANSMIT for parent state #111 | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #111 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #111 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49611.581234; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00183 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a15810 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #111 | libevent_malloc: new ptr-libevent@0x7fb3440180b0 size 128 "road-eastnet-nonat-111" #111: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #111) | db b9 51 1a 0a cf 53 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 96 48 dc 9a 43 6a d5 ae 03 52 b4 84 8e 3e 89 | 00 f6 64 fe 26 5b b6 db 11 e1 9c 06 8a 4f 1d 0d | cd 6f a7 c8 64 23 7a a7 23 6f 45 51 c6 b1 a2 cd | 04 59 b4 88 b4 33 b7 f5 29 c7 d8 52 6d 1c cb a8 | 42 75 af 22 25 ca 35 12 a4 f6 ac 0c 2b 80 3f 01 | bd fa ce f1 3e 58 78 41 9a d7 72 cc 7c 4c b5 a2 | 56 ce 00 40 9d 2a 87 6a d3 b8 b7 fb 45 19 d9 27 | 33 38 86 30 4d 76 55 5a 60 ea 7e 6f 94 b2 e8 37 | d0 79 a6 3c 48 bb 9f d4 de 11 46 70 8b ed 34 0e | 15 56 a1 c3 7c 1c f5 7b 9a 67 eb 7c ed e1 17 20 | 66 f5 ab 00 0b 09 22 9e 86 9e ea d1 22 bb 69 09 | 19 11 1b ae 5d 6f a7 6f aa f4 bc 2d bf a0 df 13 | 3d bb c4 b2 54 23 e0 47 22 8c a9 37 14 2d 77 13 | 46 7b e2 07 7c 12 26 7e 27 76 b7 f9 5b 81 4d b4 | 81 97 8e fa 60 cb 4d fd c3 c9 15 c0 dd 03 c9 a5 | 4e ed a7 b5 aa a5 47 31 bc c5 72 e4 a7 3b 8a 6d | 29 00 00 24 dd ff c8 1b e8 28 de a6 83 fb aa 57 | 7e 6e 8e c5 12 ea 53 ce c6 ab e5 e4 50 89 14 5a | d7 45 05 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 7b fa 07 36 ff 6e 35 97 9c d7 f0 | 58 a3 9d ce 15 df 78 68 00 00 00 1c 00 00 40 05 | 32 ea 3f b0 b0 6d 1e bd 58 89 67 45 00 2c 5a 38 | ea f9 ac 8b | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c00d120 | #111 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db b9 51 1a 0a cf 53 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #111 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #111 | rejected packet: | db b9 51 1a 0a cf 53 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #111: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0459 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a60690 | handling event EVENT_RETRANSMIT for parent state #88 | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #88 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #88 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49611.587517; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004136 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #88 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 "road-eastnet-nonat-88" #88: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #88) | 4f b4 b9 96 90 ac 87 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 55 7d 2b ef 81 b7 ac 80 5f 94 f2 45 3d 30 4f | 1d db a2 af 47 67 b7 7c be e3 bc 36 9a 72 1e e6 | 4f 47 07 85 4a dc c2 8c 23 63 be 8e ef c5 79 8f | 9f 5c 4f 9d 4f 85 09 c3 d7 cd 09 d7 9c 93 a4 d2 | cb 1f 73 cb f5 4a 96 ce 2b f9 75 2e 3c f9 67 24 | b7 40 01 a2 9a 5a 3a b5 1b 81 51 3d 6c dd 22 93 | a7 84 80 70 90 68 0a 70 88 ae 95 b6 8d ea e4 d4 | 54 cf 85 55 04 a4 94 5d cc ba 3d e2 31 46 75 ff | 7c 75 77 1a 1b 6c e0 fd b6 75 6b 40 9a b7 ac 36 | 39 45 a5 48 a8 96 90 52 cb 62 b2 ca a6 08 23 37 | d2 f9 be 02 8c 54 29 91 80 43 1c 2d 5f 25 44 25 | ff e7 b9 7d 14 3d 11 4a a3 ab 8e 4f b9 9b a1 4d | 91 68 13 50 1e 3b 88 4e ac 27 30 6a c7 2b ef cb | 81 87 56 8d dd bd 93 b9 d2 77 ea ab 8e f7 84 26 | 38 de 93 6d 11 fc f2 e4 c4 b3 df 42 49 8c 39 27 | 12 40 d4 6f db 31 51 71 3a c5 b3 bf 78 b4 72 ae | 29 00 00 24 d0 42 a3 31 c3 ed 67 67 3c 0c 74 87 | e1 18 ba c3 96 b7 23 3a c3 28 fa 83 32 6a f8 22 | c5 3d ce 47 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 13 5d 9d 57 2e de f0 16 54 40 11 | ce e4 63 b7 5f de e1 17 00 00 00 1c 00 00 40 05 | 73 d1 3a 60 f3 dc 99 f7 0c 4b 4c 3e d1 f1 65 ae | 8d f5 93 01 | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a60690 | #88 spent 0.0954 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f b4 b9 96 90 ac 87 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #88 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #88 | rejected packet: | 4f b4 b9 96 90 ac 87 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #88: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cc10 | handling event EVENT_RETRANSMIT for parent state #133 | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #133 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #133 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49611.588755; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501107 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a60690 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #133 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 "road-eastnet-nonat-133" #133: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #133) | 93 2c 91 72 20 8c aa 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c d8 f9 2c 2b a0 b1 31 57 35 e0 04 75 fa ff 27 | 53 64 2e 54 ea 38 e0 ef 52 11 3d 36 64 b6 af 29 | 51 f7 3a cb 03 fb a8 9c 8c 4c bb 74 63 76 7d d1 | a9 88 c4 5e 87 dd 7f 20 3b 30 84 84 16 86 c9 65 | d1 47 a8 28 8d 73 90 06 c4 7f 57 27 02 dd dc 34 | 3e 36 07 bc f4 b2 13 c9 ca 56 ee e3 b6 fc 0e 46 | 17 c4 47 02 3c 22 35 e8 99 a1 3a f2 88 57 e2 b2 | 76 46 aa bb c5 86 a7 a3 5d df 02 48 a4 96 00 22 | 34 1a 70 44 11 10 cb ff f2 1d 21 21 00 41 5a a7 | a1 5f 54 12 46 7f 51 02 26 94 4f 54 f8 0e be ce | 2f 5a 2b 9b 25 dc a0 31 41 2a dd d5 76 31 f7 83 | c2 70 58 eb 31 ba 5b 36 57 70 32 a0 20 3d ec e9 | 48 52 21 d4 39 1a 79 f6 31 e1 9a c8 d2 b3 fd 12 | 8c 10 74 fe 54 6f eb b1 c3 58 8e 49 2a 38 98 47 | 38 39 a8 64 1a 71 f1 c2 47 f8 d0 db da e6 75 10 | 1b a2 b7 e4 c4 eb b7 43 ca b9 9e 23 21 75 e9 b6 | 29 00 00 24 2f d1 c4 74 6b fd 49 84 52 1d 9d 1d | ec af 19 02 47 e5 8f b7 c6 73 48 d2 a9 91 58 b2 | b6 74 d3 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 b3 b4 a5 c4 da 26 36 c8 2a e5 e1 | 3e af ad 98 58 9a bf c4 00 00 00 1c 00 00 40 05 | 31 45 bd 61 73 08 cb 41 73 c4 72 6c eb e0 15 88 | 84 49 78 a3 | libevent_free: release ptr-libevent@0x7fb3780180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cc10 | #133 spent 0.0857 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 93 2c 91 72 20 8c aa 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #133 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #133 | rejected packet: | 93 2c 91 72 20 8c aa 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #133: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-141" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-141' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #141 at 0x557d46a95000 | State DB: adding IKEv2 state #141 in UNDEFINED | pstats #141 ikev2.ike started | Message ID: init #141: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #141: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #141; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-141" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-141" IKE SA #141 "road-eastnet-nonat-141" "road-eastnet-nonat-141" #141: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-141 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-141": constructed local IKE proposals for road-eastnet-nonat-141 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 141 for state #141 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2cc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #141 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 | #141 spent 0.141 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-141" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 1 resuming | crypto helper 1 starting work-order 141 for state #141 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 141 | spent 0.274 milliseconds in whack | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 141 time elapsed 0.000777 seconds | (#141) spent 0.773 milliseconds in crypto helper computing work-order 141: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 141 for state #141 to event queue | scheduling resume sending helper answer for #141 | libevent_malloc: new ptr-libevent@0x7fb38802d3a0 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #141 | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 141 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #141 | **emit ISAKMP Message: | initiator cookie: | c7 a4 5e d6 85 96 e8 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-141 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f0 5c 64 85 22 7f 26 67 9b 1d d2 dc 77 48 35 3a | ikev2 g^x d4 3f ae a5 de d9 02 e1 be b1 54 1d 8f 3c 81 66 | ikev2 g^x 72 af 44 35 86 52 1f 94 d8 67 4f d5 3d aa 9a 28 | ikev2 g^x b8 7d b2 44 cd ad e4 36 73 fc b7 ff a8 f3 fa 52 | ikev2 g^x bc bb ec ae b0 14 24 28 e8 98 61 c7 6e 10 46 be | ikev2 g^x 9e 1b d1 62 7d 6b 63 8d 57 98 39 e0 7a 2b d7 fb | ikev2 g^x 08 85 91 84 64 96 ca 9e 7d d6 44 71 24 e2 7b d9 | ikev2 g^x 4e df 37 ef 69 35 3e bf d9 e6 0c fe 44 26 04 4e | ikev2 g^x f0 05 82 74 b2 9b 24 5e e9 a2 22 8d 25 f4 83 56 | ikev2 g^x 66 7a 36 9b c2 83 bb 7e 03 9c 77 3b 87 eb 41 c7 | ikev2 g^x 94 78 c3 88 92 ee d7 85 b7 c9 76 9d e6 b0 56 99 | ikev2 g^x 3c 23 e2 55 4e f4 22 8d 17 30 9c c5 cd a0 fa a5 | ikev2 g^x 54 c0 8e f4 5a 2c 24 46 f9 7c 1e 86 1f 7b 3c ed | ikev2 g^x d6 ba ae a7 70 a2 9b 24 e8 02 bd 30 c2 66 66 44 | ikev2 g^x 25 e0 d1 5b fc c6 60 e2 9a 7f 9c 7f d3 c2 d2 0d | ikev2 g^x 71 6b ce d7 9c d1 77 52 aa 1f 4c 8a aa 84 99 be | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 77 e9 14 43 da cb a0 62 0a e5 af ee ca 47 6a 87 | IKEv2 nonce 48 66 6e 70 1f 90 c9 e8 b5 aa eb 33 74 97 4a b0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c7 a4 5e d6 85 96 e8 87 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8d | natd_hash: port= 01 f4 | natd_hash: hash= c6 5f b0 2c dc 05 ab ba 7d 8f a9 67 57 cd cc b4 | natd_hash: hash= 50 46 52 bd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c6 5f b0 2c dc 05 ab ba 7d 8f a9 67 57 cd cc b4 | Notify data 50 46 52 bd | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c7 a4 5e d6 85 96 e8 87 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 25 fc 66 29 f4 e3 aa bf a8 61 5f 67 dd d5 39 f5 | natd_hash: hash= bb 8c 0c c1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 25 fc 66 29 f4 e3 aa bf a8 61 5f 67 dd d5 39 f5 | Notify data bb 8c 0c c1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #141 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #141: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #141 to 4294967295 after switching state | Message ID: IKE #141 skipping update_recv as MD is fake | Message ID: sent #141 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-141" #141: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.141:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #141) | c7 a4 5e d6 85 96 e8 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 5c 64 85 22 7f 26 67 9b 1d d2 dc 77 48 35 3a | d4 3f ae a5 de d9 02 e1 be b1 54 1d 8f 3c 81 66 | 72 af 44 35 86 52 1f 94 d8 67 4f d5 3d aa 9a 28 | b8 7d b2 44 cd ad e4 36 73 fc b7 ff a8 f3 fa 52 | bc bb ec ae b0 14 24 28 e8 98 61 c7 6e 10 46 be | 9e 1b d1 62 7d 6b 63 8d 57 98 39 e0 7a 2b d7 fb | 08 85 91 84 64 96 ca 9e 7d d6 44 71 24 e2 7b d9 | 4e df 37 ef 69 35 3e bf d9 e6 0c fe 44 26 04 4e | f0 05 82 74 b2 9b 24 5e e9 a2 22 8d 25 f4 83 56 | 66 7a 36 9b c2 83 bb 7e 03 9c 77 3b 87 eb 41 c7 | 94 78 c3 88 92 ee d7 85 b7 c9 76 9d e6 b0 56 99 | 3c 23 e2 55 4e f4 22 8d 17 30 9c c5 cd a0 fa a5 | 54 c0 8e f4 5a 2c 24 46 f9 7c 1e 86 1f 7b 3c ed | d6 ba ae a7 70 a2 9b 24 e8 02 bd 30 c2 66 66 44 | 25 e0 d1 5b fc c6 60 e2 9a 7f 9c 7f d3 c2 d2 0d | 71 6b ce d7 9c d1 77 52 aa 1f 4c 8a aa 84 99 be | 29 00 00 24 77 e9 14 43 da cb a0 62 0a e5 af ee | ca 47 6a 87 48 66 6e 70 1f 90 c9 e8 b5 aa eb 33 | 74 97 4a b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 5f b0 2c dc 05 ab ba 7d 8f a9 67 | 57 cd cc b4 50 46 52 bd 00 00 00 1c 00 00 40 05 | 25 fc 66 29 f4 e3 aa bf a8 61 5f 67 dd d5 39 f5 | bb 8c 0c c1 | state #141 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3780180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2cc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #141 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 | #141 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49611.607726 | resume sending helper answer for #141 suppresed complete_v2_state_transition() and stole MD | #141 spent 0.348 milliseconds in resume sending helper answer | stop processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38802d3a0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 a4 5e d6 85 96 e8 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #141 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #141 | rejected packet: | c7 a4 5e d6 85 96 e8 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #141: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0412 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34000d120 | handling event EVENT_RETRANSMIT for parent state #33 | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #33 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #33 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49611.615896; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004455 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f61a0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #33 | libevent_malloc: new ptr-libevent@0x7fb38802d3a0 size 128 "road-eastnet-nonat-33" #33: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #33) | c7 46 be 2e 5d 25 78 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 fb 56 35 bc 7c 07 73 43 c0 53 96 f8 9b 69 93 | 49 fe be 57 af 79 18 68 5a 92 2b 2b a6 ed e4 23 | 35 6b 49 80 b0 8c 38 3d c5 a9 f4 61 c1 8b 08 4d | 96 53 f0 d9 1b 6c 56 bc 0d ea 97 5b b0 d7 0d 16 | 49 88 40 6d 71 9e 2d 30 fe 42 42 37 20 10 14 5c | 75 38 c4 da 71 b3 b1 3b a6 23 58 dc a3 9a e0 40 | ae dc 8e cf de 76 e6 55 4e 33 19 fe 18 08 f5 70 | 8e 50 6f 64 32 2f d6 7a 45 39 d0 ba 32 a4 1e ab | 2d 4d 83 e7 1f d4 28 47 30 da f7 2e a0 79 9c 09 | 2b 6b 46 2e c8 c1 e5 37 84 54 0b 0c 97 40 ae db | 52 08 f5 e5 d5 a9 49 2a c9 b8 1f f6 14 c7 78 d5 | 70 93 cb 5e 8c 96 b6 ac 74 c2 85 cf 89 ad 75 5d | fe 0b 68 86 21 96 4e 79 63 5a 81 98 b3 45 c5 f0 | b2 fd 49 e2 ff b2 a3 2c 96 3c ba 10 d8 3f 86 56 | e0 c6 d2 d5 d7 7d 5f 52 2a 95 0f 65 04 12 82 60 | e3 5b 42 b7 a8 9e 92 b0 fa 34 79 45 e1 34 ab c5 | 29 00 00 24 b8 c6 4b 62 72 20 c9 09 07 72 44 d0 | 79 00 e2 dc 8f 6b 83 e9 3d 67 2f d3 a6 5d 27 77 | 58 61 12 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 b6 d4 e5 76 6f b7 90 e8 c3 ad b3 | 49 49 44 7a b5 13 9b a6 00 00 00 1c 00 00 40 05 | 15 0a 54 d9 c3 ee ba ab b9 96 60 bb a3 40 4e fb | d5 1b 34 be | libevent_free: release ptr-libevent@0x7fb340012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000d120 | #33 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 46 be 2e 5d 25 78 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #33 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #33 | rejected packet: | c7 46 be 2e 5d 25 78 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #33: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0769 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61c10 | handling event EVENT_RETRANSMIT for parent state #112 | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #112 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #112 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49611.642265; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002459 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #112 | libevent_malloc: new ptr-libevent@0x7fb340012840 size 128 "road-eastnet-nonat-112" #112: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #112) | 47 d5 03 db 13 27 2f b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 0e 6c 25 08 df e6 da 49 14 54 03 50 04 cf 48 | 95 75 ae 2d bc 03 6f 48 b8 d7 01 38 b0 30 90 fc | ff e3 c7 81 96 6b 61 34 0c 60 d4 12 f5 e2 2d fc | 51 c2 f0 8d 66 50 fb 99 8e e7 b2 7a 6c 96 47 68 | b2 95 cc 13 0e 51 31 7d 67 b6 95 35 7a 36 fb 65 | 99 b0 0f 89 29 13 5d 90 12 37 2d 11 35 2d b1 44 | 94 62 9d e9 25 b3 9d a0 a4 a6 21 f1 2f 1e cd 7c | e1 45 a8 9a 87 d2 53 e3 a2 32 e1 24 cf d4 84 b6 | d5 f2 14 94 09 c7 86 4b f6 5c 13 c3 cd 16 8e 96 | 09 f6 db 84 7c 68 6c 48 a7 94 92 3a 1f dd 75 5e | 2c 36 f1 6f 81 03 42 93 73 6d a8 a1 de b3 ee 78 | 53 dc 84 4e 49 9c c8 3c d2 8e 9e 10 6c e7 28 b0 | 11 a3 fb e6 6e 4d e5 e0 87 56 00 b9 8b bd 7a 34 | c7 01 93 2c df ea 24 e3 c0 b7 3c 4f 9c fd 99 11 | 44 90 bc 5c 8f 0c c6 10 b3 66 24 ea 61 81 fc 7a | 33 5f 5b b7 cd 2f 8e 95 d1 b4 0b d4 4c f2 ce 45 | 29 00 00 24 e0 34 a3 40 45 a9 39 5f c9 a9 a0 f5 | 90 bc 5f 96 21 2e 5a ab 31 ef 27 59 8c 9d b8 53 | c4 51 4a f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 19 b7 b4 22 31 1f 00 af ac cd cc | 10 5d a8 e7 0a 7e 75 3d 00 00 00 1c 00 00 40 05 | 93 2a 52 65 d2 92 1c 7e fa c3 8c df bd 81 85 07 | 8f 9c 4c 85 | libevent_free: release ptr-libevent@0x7fb36801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61c10 | #112 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 d5 03 db 13 27 2f b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #112 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #112 | rejected packet: | 47 d5 03 db 13 27 2f b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #112: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37000d120 | handling event EVENT_RETRANSMIT for parent state #127 | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #127 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #127 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49611.645543; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00098 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61c10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #127 | libevent_malloc: new ptr-libevent@0x7fb36801d920 size 128 "road-eastnet-nonat-127" #127: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #127) | 63 d9 7e 94 07 33 4b 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 5b 4a 46 df 60 33 0f 95 de e0 db c8 23 3c 72 | 78 4a 11 2d af 6a 95 71 57 bb 1d b2 0d c1 6e 56 | 18 59 e0 13 b5 5d 90 db b2 9a 12 87 33 39 67 e9 | 2a 2f bf ff 22 ca 7b ca ba cd 4e 56 00 bb 9c b4 | 81 b8 dd 6f 82 ec c7 49 d2 fc 91 38 84 1c a6 e9 | d6 e7 21 dd e8 11 d8 38 94 4d 8d 43 29 97 aa c4 | 81 24 9f fc d5 c9 48 0f a7 fe 34 f9 6d 30 3e 1f | 7a 4f f5 5e d9 cc da 01 80 42 b1 dc 13 04 fb 2f | cb ae 40 53 b9 7a ac 75 1a e1 0f 4b 6c 39 b0 ff | 2b d7 8e 64 87 22 57 2b a9 3e db 52 7f 0f 13 61 | 69 1f 61 e7 d0 1e 23 3d f6 9d 28 2b 3f e5 f0 23 | 95 70 12 d6 55 37 d1 5b 40 5e db 9b 46 bb 6c 24 | 88 d7 92 17 91 7b 88 03 03 b9 b9 93 f8 4d f8 75 | f3 71 3b 2a a2 b6 bc ae e3 8d ee 63 ed ee d1 97 | a9 a0 39 37 70 8d 13 eb 74 48 45 78 0b 87 f6 b1 | 15 7d 71 1f 58 45 48 e4 7a 5a b6 44 5f 0b 02 01 | 29 00 00 24 18 52 6f 35 05 34 eb 05 2a 3b d4 f4 | de e8 63 2a a6 7a 78 01 4b 37 13 8c b7 e1 00 ae | 6b 38 e3 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 57 41 80 41 67 da fb a0 6b fa cf | 8b d9 9a b2 68 5d 7b 8a 00 00 00 1c 00 00 40 05 | f9 e3 24 ce 79 a6 67 62 c8 57 cc ee 7e 1e 81 c5 | 41 7c 30 2d | libevent_free: release ptr-libevent@0x7fb370012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37000d120 | #127 spent 0.0848 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 d9 7e 94 07 33 4b 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #127 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #127 | rejected packet: | 63 d9 7e 94 07 33 4b 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #127: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0397 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5f0d0 | handling event EVENT_RETRANSMIT for parent state #134 | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #134 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #134 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49611.647784; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500302 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37000d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #134 | libevent_malloc: new ptr-libevent@0x7fb370012840 size 128 "road-eastnet-nonat-134" #134: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #134) | 80 c9 f7 0f 34 43 e8 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 45 e5 b7 ab 0c a4 4c 5f b2 54 d8 39 c5 f7 ae | a7 a1 c9 5c 2b 5a 97 72 d3 14 80 31 3f b5 24 0d | cb 02 f5 57 a3 d0 5f 51 b9 29 93 ae b9 a3 6f 26 | d5 1f 2c 2d f7 c7 46 60 60 aa 8f 11 69 88 d5 d6 | 7f c3 44 3b 7a f5 6e 59 77 4f a4 43 34 c4 26 e5 | ae dc 49 7d 8b cd 2b ab 18 68 bd 39 90 28 6c 4a | 23 91 a3 0e 3f fb 01 de 41 7d 06 32 ac 44 1c 44 | 83 e0 6e 5a 17 ec 28 70 e3 9f 5e 65 cd d5 6a 13 | f4 b1 48 8a 51 f8 b7 54 21 1a 5d da c7 53 38 a4 | e5 03 02 af 81 ae 46 39 d4 15 23 f5 a8 b9 79 ca | ed 1c 97 81 a2 68 bb 3f 5d 13 76 91 c8 b3 35 4a | a1 e6 8f 6f 10 12 49 6f 3e bb 3b bc 07 2d 62 f9 | 63 5c f1 5a ec c4 50 49 e3 cf a2 cc 8f 61 b4 4c | 09 95 92 ca 4c 19 06 a3 80 ad 6b cf ef 46 70 41 | 9a 5d 9d 72 62 c3 a0 af ac b6 f0 ed e6 2e a4 c8 | 97 d4 46 3b dc 90 f1 11 ff c1 1a f7 bc 4d b4 b1 | 29 00 00 24 d7 88 26 03 5a 89 cf 88 bf 43 40 13 | b0 8c b4 f5 85 1c 5d f5 ed 6d ea f7 d0 1d 42 5d | 64 c8 0e 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 5d 43 f9 e4 68 67 0d 96 3e 2a d1 | 87 17 c9 81 16 11 d8 11 00 00 00 1c 00 00 40 05 | 17 79 69 7c c9 bf 1a b4 97 b1 98 46 4c 85 68 c7 | a4 36 11 6c | libevent_free: release ptr-libevent@0x7fb37c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5f0d0 | #134 spent 0.0838 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 c9 f7 0f 34 43 e8 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #134 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #134 | rejected packet: | 80 c9 f7 0f 34 43 e8 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #134: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0392 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e7260 | handling event EVENT_RETRANSMIT for parent state #89 | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #89 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #89 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49611.653; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003687 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5f0d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #89 | libevent_malloc: new ptr-libevent@0x7fb37c0251c0 size 128 "road-eastnet-nonat-89" #89: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #89) | 9d 5f d8 02 80 b8 e7 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 e3 b9 05 71 34 7d 24 1f b0 78 15 60 77 1c 08 | 9e 6a 97 b0 4c 89 e3 5a dc c3 13 ad 84 6a 5e aa | fd ca 45 35 ba 35 de 44 be ce 11 ea 86 29 6c 73 | 0b 7f 74 63 63 d2 81 70 21 25 9e 55 c0 3c 14 62 | da 13 e5 79 f3 ac 65 c2 4c 57 6a e3 37 8f 5c 04 | 8a 01 65 69 49 a9 46 40 f2 f3 a8 b3 1a af d6 79 | f9 34 6f 04 49 9e f3 10 ca 6b d5 6f d3 e5 36 7a | c9 32 cd 69 df 91 08 6d 35 ec 78 52 d9 57 09 e3 | f5 63 af 57 d7 93 38 af ff 2c e8 36 87 e0 92 43 | f0 f6 97 f6 50 a5 d2 4c 16 d1 d2 d2 96 90 50 82 | 09 99 3b fa 59 66 b4 48 e1 b1 0d 01 76 3d b4 c2 | b2 4d a5 5c 8a c7 cb a9 bb 09 56 bf 65 e9 da 28 | 24 dc 22 59 97 49 92 d0 c5 d3 9b 2b da 0b d5 26 | df 68 b6 c9 f1 0d 58 08 b0 7e 26 ce 7d 24 b1 d2 | a7 c4 2d 42 0c 8d 57 57 7b 42 5d d8 f7 b9 c8 ba | e6 b0 9d 60 5a 01 d8 33 e3 a6 9f f1 3b 81 e4 a8 | 29 00 00 24 50 a5 b1 4c 6d 18 8a 79 34 52 af 57 | 9c b8 99 4d b9 e7 5c 74 bb 7f a4 8c e5 f5 2c a5 | 8d 6b 1d 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 41 ee 04 aa 3d b0 21 0a d0 67 73 | 50 8d e2 01 ce 26 f9 77 00 00 00 1c 00 00 40 05 | 7b 60 8a 47 58 c7 18 57 64 ec a9 8e 15 07 49 b1 | ed 9e c4 1b | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e7260 | #89 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d 5f d8 02 80 b8 e7 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #89 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #89 | rejected packet: | 9d 5f d8 02 80 b8 e7 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #89: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-142" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-142' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #142 at 0x557d46a965c0 | State DB: adding IKEv2 state #142 in UNDEFINED | pstats #142 ikev2.ike started | Message ID: init #142: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #142: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #142; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-142" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-142" IKE SA #142 "road-eastnet-nonat-142" "road-eastnet-nonat-142" #142: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-142 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-142": constructed local IKE proposals for road-eastnet-nonat-142 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 142 for state #142 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469e7260 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #142 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 | crypto helper 2 resuming | #142 spent 0.127 milliseconds in ikev2_parent_outI1() | crypto helper 2 starting work-order 142 for state #142 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 142 | RESET processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-142" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.21 milliseconds in whack | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 142 time elapsed 0.000577 seconds | (#142) spent 0.579 milliseconds in crypto helper computing work-order 142: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 142 for state #142 to event queue | scheduling resume sending helper answer for #142 | libevent_malloc: new ptr-libevent@0x7fb38002d3a0 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #142 | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 142 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #142 | **emit ISAKMP Message: | initiator cookie: | 41 39 64 14 10 77 e9 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-142 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fc f2 be 7b 98 10 67 76 c4 71 20 94 23 de f4 7b | ikev2 g^x f8 c4 af 24 ce 1c a4 2e 78 f9 2e 3f 92 4d 95 da | ikev2 g^x b0 24 e9 98 5b 94 79 3a a7 65 db 91 8d 98 6f 60 | ikev2 g^x 39 37 f9 9a 0b 2c 5f 0f 2f ab bc 06 c4 26 ad 3a | ikev2 g^x cb 21 02 45 52 b2 d1 fd f5 7c fc a1 d2 ea 0e b1 | ikev2 g^x ba 62 e9 1e b2 ad cc 0d 27 c3 3b 69 ca 23 50 32 | ikev2 g^x eb 22 0c cc d3 fb 5f db 9c 9b 31 50 db f4 03 47 | ikev2 g^x 71 96 ad b4 c6 fc 17 71 7e b3 b0 ab 55 4f e2 51 | ikev2 g^x da 27 48 0f fb 5a 5c 14 f2 9f a1 0b bc 57 8c f8 | ikev2 g^x af d3 b0 d4 6a 72 47 34 c3 ab 52 90 fc 49 ad 86 | ikev2 g^x 46 90 a0 10 2b fd 92 3d 6b 38 ac d2 f1 fb fa a7 | ikev2 g^x 40 39 9e cd 87 10 91 66 2e ab 47 10 a6 88 c0 52 | ikev2 g^x d8 c9 3f b4 b3 d0 6c 91 b2 0e 49 7c 2a dc 94 d8 | ikev2 g^x 21 4c c9 df 3c b1 a2 d4 d4 f0 4b 25 d9 08 87 46 | ikev2 g^x 22 c7 0a 5a cc 6c a2 0b 4a 09 99 09 fb f2 2e 33 | ikev2 g^x 66 ad 2f c0 16 9e 3c 6f 99 46 27 79 f7 75 88 d3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1d 1b 1c 65 cb f5 ff f0 c9 00 69 e9 d1 b3 22 15 | IKEv2 nonce 24 4a 7b cc a6 4c 2e 0b ef 42 21 b2 d1 d6 06 3e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 41 39 64 14 10 77 e9 c2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8e | natd_hash: port= 01 f4 | natd_hash: hash= 8b 3a fc 83 97 ab 17 41 58 12 a1 f9 48 2f 13 f0 | natd_hash: hash= 7a 91 16 3d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8b 3a fc 83 97 ab 17 41 58 12 a1 f9 48 2f 13 f0 | Notify data 7a 91 16 3d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 41 39 64 14 10 77 e9 c2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 13 50 5d f0 78 ea 60 59 51 2f a8 23 2c 7c d0 1f | natd_hash: hash= 4c a0 b1 5b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 13 50 5d f0 78 ea 60 59 51 2f a8 23 2c 7c d0 1f | Notify data 4c a0 b1 5b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #142 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #142: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #142 to 4294967295 after switching state | Message ID: IKE #142 skipping update_recv as MD is fake | Message ID: sent #142 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-142" #142: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.142:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #142) | 41 39 64 14 10 77 e9 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc f2 be 7b 98 10 67 76 c4 71 20 94 23 de f4 7b | f8 c4 af 24 ce 1c a4 2e 78 f9 2e 3f 92 4d 95 da | b0 24 e9 98 5b 94 79 3a a7 65 db 91 8d 98 6f 60 | 39 37 f9 9a 0b 2c 5f 0f 2f ab bc 06 c4 26 ad 3a | cb 21 02 45 52 b2 d1 fd f5 7c fc a1 d2 ea 0e b1 | ba 62 e9 1e b2 ad cc 0d 27 c3 3b 69 ca 23 50 32 | eb 22 0c cc d3 fb 5f db 9c 9b 31 50 db f4 03 47 | 71 96 ad b4 c6 fc 17 71 7e b3 b0 ab 55 4f e2 51 | da 27 48 0f fb 5a 5c 14 f2 9f a1 0b bc 57 8c f8 | af d3 b0 d4 6a 72 47 34 c3 ab 52 90 fc 49 ad 86 | 46 90 a0 10 2b fd 92 3d 6b 38 ac d2 f1 fb fa a7 | 40 39 9e cd 87 10 91 66 2e ab 47 10 a6 88 c0 52 | d8 c9 3f b4 b3 d0 6c 91 b2 0e 49 7c 2a dc 94 d8 | 21 4c c9 df 3c b1 a2 d4 d4 f0 4b 25 d9 08 87 46 | 22 c7 0a 5a cc 6c a2 0b 4a 09 99 09 fb f2 2e 33 | 66 ad 2f c0 16 9e 3c 6f 99 46 27 79 f7 75 88 d3 | 29 00 00 24 1d 1b 1c 65 cb f5 ff f0 c9 00 69 e9 | d1 b3 22 15 24 4a 7b cc a6 4c 2e 0b ef 42 21 b2 | d1 d6 06 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 3a fc 83 97 ab 17 41 58 12 a1 f9 | 48 2f 13 f0 7a 91 16 3d 00 00 00 1c 00 00 40 05 | 13 50 5d f0 78 ea 60 59 51 2f a8 23 2c 7c d0 1f | 4c a0 b1 5b | state #142 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469e7260 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a74cd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #142 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 | #142 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49611.669713 | resume sending helper answer for #142 suppresed complete_v2_state_transition() and stole MD | #142 spent 0.349 milliseconds in resume sending helper answer | stop processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38002d3a0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 39 64 14 10 77 e9 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #142 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #142 | rejected packet: | 41 39 64 14 10 77 e9 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #142: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8cc0 | handling event EVENT_RETRANSMIT for parent state #34 | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #34 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #34 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49611.683933; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.009674 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a76210 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #34 | libevent_malloc: new ptr-libevent@0x7fb38002d3a0 size 128 "road-eastnet-nonat-34" #34: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #34) | 6d a4 8e 40 25 ac 37 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 f2 a8 cc bb ec 52 8f ff d3 4f 1e 29 f8 d2 55 | ab 15 48 e3 86 d2 3c 7c c1 31 02 4c e6 92 88 7e | 1c 57 68 2c 31 6d 99 d6 04 b4 80 d9 9e 5d d6 2f | 5a 7c 33 74 f6 a2 f4 af 71 14 01 00 45 ac 02 2c | ae fd dc f0 fb 16 b1 b8 bb b1 c9 b6 79 4a 45 9c | f4 6e 30 a0 38 dd b1 84 0e 3d b2 47 58 b0 ed c1 | 2c 5c e6 69 11 9f 94 94 7a 6d 4e 80 2c 22 d1 2d | b1 3c 47 06 4d 81 ee b9 c9 ba 0f 94 7b ed d2 71 | 8c 4b 77 a2 43 7f 68 8c 2b 66 69 53 94 cf 5a 27 | 05 7e 88 ec 42 d8 31 27 ae 04 92 bf 4a 26 5e 51 | 58 d6 5c 7a 0b 0b 73 c1 d6 39 9b da c3 56 61 4e | 3f 7e 4e 21 30 a1 53 bd c0 b7 f9 c7 e1 cc 61 3a | e9 b4 0e 5d 6b 1a 6c d3 c1 42 80 a0 b9 ee e4 20 | 50 5f 0b 18 55 d4 17 9c be 51 af c3 be 4e 5f 48 | b1 02 bd 4d 0a 84 45 32 17 0f c9 bf 50 68 f3 a6 | 11 69 ef 13 ba a2 fb dd c4 95 c8 b3 71 8c 02 9e | 29 00 00 24 20 3c 42 13 ea f1 47 8b ab 88 6c 38 | 29 a2 e3 60 5f 2e e8 36 7d 92 76 6d 48 1c fe a8 | 8c f2 3e 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 92 97 87 98 41 7a 2f 24 03 5c de | 5f 9b fc ff 10 46 f5 79 00 00 00 1c 00 00 40 05 | 10 63 6f 88 71 aa 1b 8a ba b8 d4 ac c9 e8 55 07 | 6b c5 63 c0 | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8cc0 | #34 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d a4 8e 40 25 ac 37 c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #34 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #34 | rejected packet: | 6d a4 8e 40 25 ac 37 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #34: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0484 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #135 | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #135 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #135 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49611.707218; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499661 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8cc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #135 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 "road-eastnet-nonat-135" #135: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #135) | 6f cc 42 0b fb 9b 4b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 27 90 6c a9 76 2a c4 50 c5 bf 04 2d 39 82 d0 | f1 4e e9 ff 6c d4 67 d5 6a f7 c3 33 36 2d 41 eb | 01 b8 52 cf 33 75 55 83 36 e9 3b 1e e0 f5 4c 33 | f6 13 14 fe 0b 40 f0 7a 1d e6 e9 63 2c 7f 9b 3f | 43 d7 8b 49 de 08 d9 f7 cb b8 85 8d 24 76 ea 07 | 74 e0 eb 3b 7b 61 bd 6e d0 81 bc 30 2d b1 a8 bc | 95 7a c1 8e 91 81 20 78 4b 9d 5f 4b 55 88 98 a7 | 4c 89 7d 2e c5 f4 b0 76 31 ac d8 73 5d 09 ed 2d | bb 07 67 90 bf 59 f1 9b 89 79 b4 48 ab 68 0b 4b | a7 49 da 7c 24 b3 1c f9 17 8c 28 77 5a 6e 44 15 | 7d 9f 86 31 20 2d 95 04 ee 8e 03 70 03 dc 14 11 | e5 4b 44 1d be 0a 83 04 0b 7e 48 68 b0 0f 04 64 | 81 84 d0 41 fd 8b 49 2c f9 af ea 95 2c f3 49 aa | 7c 3c d3 83 ef 0f 20 1f 8b 15 3b 94 9d 57 0f 83 | e9 c9 85 72 a3 81 40 26 3d 9e 4f 4c 25 2e 6f de | 2e 5c c2 5b 74 8c 58 60 bd 5e 06 db 51 f6 b7 a3 | 29 00 00 24 4f 27 a7 6e b5 c8 d8 49 72 0f 78 be | 0c 3a 88 f4 37 97 d5 4f 51 27 f0 3f 45 0a b8 19 | ba c2 3b 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 5e 90 14 7c 0c 3f fe 72 ae db a0 | 43 97 c2 6c fa c9 b7 b1 00 00 00 1c 00 00 40 05 | 6c 85 24 93 7d cc 8d 2c 5e c0 f8 bf 19 38 1d 99 | 5f b9 fd e3 | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #135 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f cc 42 0b fb 9b 4b 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #135 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #135 | rejected packet: | 6f cc 42 0b fb 9b 4b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #135: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0647 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a69e50 | handling event EVENT_RETRANSMIT for parent state #113 | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #113 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #113 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49611.715893; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.007185 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #113 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 "road-eastnet-nonat-113" #113: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #113) | 65 aa 2d d8 a6 29 20 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df aa fe 5d 18 fa cf 0f ff 28 95 2b df 41 5e e5 | 93 b1 5d 05 b9 f8 45 e3 a0 1d 39 ec fc 7d ae 4b | 05 3f bf 03 bf 80 a9 6e 8e fd 3b e8 32 58 c8 f7 | c6 df 30 b6 09 5f 2a 57 25 11 cb 3c da a5 01 9d | ba 5a dd a7 bc 6b 95 4a 6d df f0 56 fa 5d b6 d5 | 32 bd cc 28 5e b5 ff 1a d9 af f1 6d a9 3a c6 a5 | ab a2 21 23 63 1f 7a d5 a9 f2 d8 6e 34 2c c0 14 | b5 44 80 cc 01 b8 bc 1d 88 15 f0 56 5b 9e 16 11 | 53 49 7c 46 a4 d6 df 15 cc 76 08 99 30 8d bd 16 | fc 22 5e e2 91 1e 29 90 27 cb 4a a1 bb fb df c0 | e1 57 58 ac 38 1b 6a 91 9c 4e c8 14 95 91 e6 23 | a6 57 8f 86 03 7d ff ac 75 e9 09 5f f5 40 29 9b | 12 ab c4 82 96 27 04 ff 62 2b 29 96 91 b3 9d b0 | 86 8f c7 9d 9e d4 5c a2 76 cf a2 55 cf 18 d5 47 | 6a bc c0 f7 de 25 72 ff 89 ad a0 ee b6 9c 33 78 | 04 18 e5 3b 76 6f 93 07 22 6f ad 6a 13 43 4b d1 | 29 00 00 24 24 d3 7a 96 b8 4b b9 c8 77 6f a9 e8 | 8c 18 33 84 b7 52 88 cd 9d a3 3f f7 dd 42 d5 3a | e4 24 11 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 39 d7 c2 57 ac 0e 5c ea ab f6 c3 | 2b 95 40 5a 3d 34 d1 e0 00 00 00 1c 00 00 40 05 | e1 b8 84 36 a4 5f d1 6d 3f 9f 07 dc 0f 94 99 b2 | ea cc 3a 90 | libevent_free: release ptr-libevent@0x7fb378012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a69e50 | #113 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 aa 2d d8 a6 29 20 d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #113 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #113 | rejected packet: | 65 aa 2d d8 a6 29 20 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #113: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a88140 | handling event EVENT_RETRANSMIT for parent state #128 | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #128 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #128 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49611.738269; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001431 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a69e50 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #128 | libevent_malloc: new ptr-libevent@0x7fb378012840 size 128 "road-eastnet-nonat-128" #128: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #128) | 77 d1 59 6d 55 cb 18 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 01 e0 bd 82 fe e0 91 d9 ed 2a 7b 41 58 aa d2 | c1 83 b5 d4 08 da f3 c7 61 8a cf 68 fe 9a 21 e3 | 57 03 c4 31 d0 d0 ec 56 cc 27 d9 52 cc f2 63 0f | a0 ad 50 12 a9 19 98 c4 cb 8f 93 9b 57 4e ae 53 | 05 9f f7 4f 18 99 38 38 06 c2 82 4a ed ef 9d cc | 7b 44 9f 1c 19 10 74 71 d4 89 98 82 e7 d0 72 33 | aa 5f 8b bd da a0 8b 0a 73 9d 51 cb d2 a3 14 69 | d1 4b 0c 71 9d 71 26 5d bf 23 7a 67 5d 15 2b a2 | ce b7 8c 37 a6 d1 63 b0 6b dc f1 b5 b5 72 45 86 | c8 59 1a 35 a1 54 36 81 14 ea b5 34 cc 86 95 36 | de 73 da 51 28 93 ec 98 2d 7a d9 01 e1 1c 11 2d | 35 8e 59 23 0d de 42 1b 00 c8 28 40 ea c4 bc 1a | 0b 22 97 22 23 59 28 f2 30 da 60 85 07 fb be 9a | 26 22 87 03 aa 66 5a 47 26 21 89 bb a9 0e 6a fe | 60 1c 6c 90 e2 96 28 ae 41 e9 23 65 8c f4 23 57 | 72 00 10 88 06 ca 67 04 cf 4b c7 04 50 60 fe 2f | 29 00 00 24 3b ae 04 a3 29 53 44 16 26 36 89 01 | ad 8c c7 bd 38 5d c9 f9 a5 cd 29 aa 82 21 0f 5e | 4f 91 67 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 73 cd 7c c3 ca 92 54 ff 7d 3a 5c | 01 84 d2 b8 f1 a4 c9 bd 00 00 00 1c 00 00 40 05 | ec 18 dc 66 2d cf 71 2e 85 c0 4a 75 63 a1 b7 19 | b3 41 97 a0 | libevent_free: release ptr-libevent@0x7fb38001abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a88140 | #128 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 d1 59 6d 55 cb 18 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #128 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #128 | rejected packet: | 77 d1 59 6d 55 cb 18 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #128: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fa300 | handling event EVENT_RETRANSMIT for parent state #90 | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #90 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #90 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49611.739663; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004011 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a88140 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #90 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 "road-eastnet-nonat-90" #90: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #90) | 26 95 92 02 0c 74 14 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 ed e3 a8 eb 0c e2 00 1e b8 30 77 f5 0e ad ce | 65 c1 45 a9 f8 d6 59 16 4d 14 6e d4 77 5e 81 5d | e4 5a fa df cb d1 e9 b4 fb 7a 1b 94 96 f5 cd a1 | 92 48 08 b0 94 02 60 49 2d a3 e6 bd 87 20 3a b6 | b3 a4 42 54 6e e3 59 4f 33 f7 d9 14 23 f3 be 46 | 0e 6a b0 16 f3 25 4c 11 1c 90 dd a1 d3 04 dc 69 | 8d 39 0c 51 5f 83 72 cb 93 87 70 c9 f5 3d e0 2a | c5 11 3c 75 bc 46 e8 c6 f5 45 c5 bc bb 53 d8 9c | 7a ab 11 6e 8b 56 f1 6e cd 93 8a 23 e4 3d ba 8e | f3 e8 36 9d 53 65 3b 19 f4 e3 cc f3 54 92 3e af | 1e ea f7 7a 71 af d2 c7 14 e2 2f f0 39 fe 17 bf | 5f 5e bd 3d 44 b3 a2 13 36 c4 88 da f8 e8 06 a9 | 63 d0 49 96 b9 8b b5 05 47 2d f0 7c f0 b7 4b a3 | d9 0f 59 ad 42 e6 a2 62 85 25 36 ae 56 68 a9 08 | 18 48 13 b3 3d 8c 24 fd 03 b0 13 b0 fc 3c f6 fc | 7b 2f 36 dc 82 d7 51 c4 8b bc 56 3e 48 7c ce 7f | 29 00 00 24 7b f2 d7 97 09 c8 65 d1 69 47 34 b1 | 55 8b 56 a2 4a 71 ee 64 d5 6c 65 05 c4 2c 51 b4 | b0 ab 0f 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 4b f3 32 75 d7 ef f4 06 67 91 40 | 71 93 9a 6d f5 fe b0 cc 00 00 00 1c 00 00 40 05 | 99 8e 72 1b 4f e3 a6 e8 23 e7 c4 0e ce 5c a4 3c | cd e1 15 1b | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fa300 | #90 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 95 92 02 0c 74 14 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #90 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #90 | rejected packet: | 26 95 92 02 0c 74 14 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #90: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.05 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-143" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-143' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #143 at 0x557d46a97b80 | State DB: adding IKEv2 state #143 in UNDEFINED | pstats #143 ikev2.ike started | Message ID: init #143: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #143: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #143; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-143" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-143" IKE SA #143 "road-eastnet-nonat-143" "road-eastnet-nonat-143" #143: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-143 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-143": constructed local IKE proposals for road-eastnet-nonat-143 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 143 for state #143 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469fa300 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #143 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 | #143 spent 0.116 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 resuming | crypto helper 0 starting work-order 143 for state #143 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 143 | RESET processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-143" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.241 milliseconds in whack | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 143 time elapsed 0.001004 seconds | (#143) spent 1.01 milliseconds in crypto helper computing work-order 143: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 143 for state #143 to event queue | scheduling resume sending helper answer for #143 | libevent_malloc: new ptr-libevent@0x7fb38402d380 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #143 | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 143 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #143 | **emit ISAKMP Message: | initiator cookie: | fe 08 8f c1 30 76 36 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-143 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ae 59 10 0a 33 69 60 29 ec cb 88 e8 3a c1 e5 55 | ikev2 g^x 26 67 1a ec 62 9e 8e 22 6f b0 d9 0b 9d f1 88 4a | ikev2 g^x e6 aa 92 54 ef 0d ca 48 fc de 93 8e cc 1b be 9e | ikev2 g^x 2a 5e f3 2a 08 3f 42 43 4c 7d 9b 8f 28 00 df 48 | ikev2 g^x e8 21 87 a4 f6 50 fb f0 b0 17 a4 67 51 7c 94 f5 | ikev2 g^x bf 3d 99 c9 85 3f 6a 47 12 df 61 eb 04 e7 9a 6c | ikev2 g^x b7 d5 b3 00 34 48 70 01 04 f1 38 e6 2a 1b 58 fe | ikev2 g^x 45 c8 88 15 fe fd f8 a1 17 d4 b0 e0 da 11 1c 39 | ikev2 g^x ad d0 8c b8 02 34 e9 cc d8 17 f6 f2 94 8e c1 9b | ikev2 g^x bc 9e 9d 32 92 5b 2a 34 cd 6a fb 2e 20 96 68 57 | ikev2 g^x 5b d5 8b 51 c6 02 26 d3 9c 0f 2f 12 c2 48 e7 4a | ikev2 g^x 4a 0b 12 1b 9e 56 b5 85 4d d5 b2 31 1e ed 3e 7b | ikev2 g^x 36 b4 c3 2a eb a3 dd fa 18 8b db b6 6e 6f 26 25 | ikev2 g^x d4 07 3d fa df 09 23 4b f0 61 a0 e2 e7 88 89 b7 | ikev2 g^x 4a 08 a7 b8 23 da c7 50 cb 24 82 e1 9d bc ac 0c | ikev2 g^x ad 50 25 66 22 31 ab bb bb 61 7d f2 14 fa 8e 17 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5c 1f 93 ac 9c d9 6d bc 1c 83 06 35 6d 1c ce da | IKEv2 nonce 8c 6b 1d 7b a8 23 6f c9 2c 64 35 22 c8 0a 79 63 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fe 08 8f c1 30 76 36 cc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8f | natd_hash: port= 01 f4 | natd_hash: hash= e9 3f e0 89 56 6b 89 d9 2f e3 34 a5 92 0a 7f a5 | natd_hash: hash= 70 51 be 33 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e9 3f e0 89 56 6b 89 d9 2f e3 34 a5 92 0a 7f a5 | Notify data 70 51 be 33 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fe 08 8f c1 30 76 36 cc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 8d 31 d1 99 a4 16 d7 c5 96 20 51 29 c7 9b 80 8c | natd_hash: hash= b7 4b 38 13 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8d 31 d1 99 a4 16 d7 c5 96 20 51 29 c7 9b 80 8c | Notify data b7 4b 38 13 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #143 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #143: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #143 to 4294967295 after switching state | Message ID: IKE #143 skipping update_recv as MD is fake | Message ID: sent #143 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-143" #143: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.143:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #143) | fe 08 8f c1 30 76 36 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 59 10 0a 33 69 60 29 ec cb 88 e8 3a c1 e5 55 | 26 67 1a ec 62 9e 8e 22 6f b0 d9 0b 9d f1 88 4a | e6 aa 92 54 ef 0d ca 48 fc de 93 8e cc 1b be 9e | 2a 5e f3 2a 08 3f 42 43 4c 7d 9b 8f 28 00 df 48 | e8 21 87 a4 f6 50 fb f0 b0 17 a4 67 51 7c 94 f5 | bf 3d 99 c9 85 3f 6a 47 12 df 61 eb 04 e7 9a 6c | b7 d5 b3 00 34 48 70 01 04 f1 38 e6 2a 1b 58 fe | 45 c8 88 15 fe fd f8 a1 17 d4 b0 e0 da 11 1c 39 | ad d0 8c b8 02 34 e9 cc d8 17 f6 f2 94 8e c1 9b | bc 9e 9d 32 92 5b 2a 34 cd 6a fb 2e 20 96 68 57 | 5b d5 8b 51 c6 02 26 d3 9c 0f 2f 12 c2 48 e7 4a | 4a 0b 12 1b 9e 56 b5 85 4d d5 b2 31 1e ed 3e 7b | 36 b4 c3 2a eb a3 dd fa 18 8b db b6 6e 6f 26 25 | d4 07 3d fa df 09 23 4b f0 61 a0 e2 e7 88 89 b7 | 4a 08 a7 b8 23 da c7 50 cb 24 82 e1 9d bc ac 0c | ad 50 25 66 22 31 ab bb bb 61 7d f2 14 fa 8e 17 | 29 00 00 24 5c 1f 93 ac 9c d9 6d bc 1c 83 06 35 | 6d 1c ce da 8c 6b 1d 7b a8 23 6f c9 2c 64 35 22 | c8 0a 79 63 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 3f e0 89 56 6b 89 d9 2f e3 34 a5 | 92 0a 7f a5 70 51 be 33 00 00 00 1c 00 00 40 05 | 8d 31 d1 99 a4 16 d7 c5 96 20 51 29 c7 9b 80 8c | b7 4b 38 13 | state #143 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469fa300 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fa300 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #143 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 | #143 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49611.742151 | resume sending helper answer for #143 suppresed complete_v2_state_transition() and stole MD | #143 spent 0.474 milliseconds in resume sending helper answer | stop processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38402d380 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 08 8f c1 30 76 36 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #143 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #143 | rejected packet: | fe 08 8f c1 30 76 36 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #143: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a205f0 | handling event EVENT_RETRANSMIT for parent state #35 | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #35 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #35 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49611.745344; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005419 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e7260 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #35 | libevent_malloc: new ptr-libevent@0x7fb38402d380 size 128 "road-eastnet-nonat-35" #35: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #35) | ef 15 ea 36 a5 a5 5c 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 96 b3 aa c0 4d d9 88 e5 ac e1 94 c5 3f 96 d9 | b4 11 6c 13 85 3c 47 49 a4 e7 6c bf 49 2c f7 e6 | 82 c1 3a 00 a1 f9 46 f7 54 13 9f 65 48 18 8b 9f | e6 da f8 f3 07 a0 ac 41 d5 a9 3b e6 a7 7c a3 81 | db 32 9e 99 47 70 04 b0 f4 2d a4 b0 a4 3b e1 28 | 9f 63 a2 94 b7 1f 9e 68 18 47 6f ef 05 c0 65 15 | cc 6b 7e 6d 5e e8 2a 06 87 47 6c aa e2 89 a2 b1 | 87 d5 9a c7 5c f6 c5 c9 ef 9a f5 1e 14 44 ed f6 | 21 c2 10 91 92 32 f4 48 3d 48 76 7f da 54 41 70 | 3a 27 f3 0e a6 36 ab ef 51 4a ee 27 f3 fa b5 4a | 81 80 97 f8 12 4a 6b 6e 11 f7 41 fe d5 56 ec af | 7e dc 33 c0 77 e2 37 b5 3f fc b0 40 58 cb 92 b6 | 44 3d 99 0d 17 ae 15 bb a7 c0 2c 1d dc 42 f0 67 | d6 5a 17 88 ce 32 f6 da 90 65 b7 17 83 70 da 67 | c5 33 42 42 d7 1a 6c 70 ed 40 df e9 ee 39 2a 8f | f5 b4 db 3f e7 42 51 2e 4d a9 fe 76 ba 09 20 58 | 29 00 00 24 f0 8c e1 d2 ee 2f 9e 4d 17 8a 20 ca | cf 55 95 6a 83 c3 98 8f db 61 db bb f1 69 5e b0 | e6 61 e7 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 5c ea 28 17 8f c3 f5 57 90 ad 1e | 3a ae c2 e5 e1 92 7b 3c 00 00 00 1c 00 00 40 05 | cb 88 24 12 73 0e 41 cb fe 6b 7e d6 a5 c0 bb a2 | e1 60 1e c0 | libevent_free: release ptr-libevent@0x7fb36001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a205f0 | #35 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 15 ea 36 a5 a5 5c 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #35 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #35 | rejected packet: | ef 15 ea 36 a5 a5 5c 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #35: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469defe0 | handling event EVENT_RETRANSMIT for parent state #136 | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #136 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #136 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49611.773671; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500865 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e490 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #136 | libevent_malloc: new ptr-libevent@0x7fb36001d920 size 128 "road-eastnet-nonat-136" #136: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #136) | d6 c8 9e 97 21 46 fb d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 a9 84 13 62 aa bd 1d ad 3e 60 88 dc a9 35 5e | 57 2f a4 3a d3 ae c1 11 b0 24 19 68 c2 75 c1 4f | 59 cf f8 40 bb af 7e d1 b9 71 42 ce c6 09 6e 74 | 9e f2 29 0d 91 21 24 74 6d 2f 10 75 65 f8 b8 44 | e9 15 55 bb 2b 6f 25 4c 58 9b 0b 45 c2 40 5a 9f | ff e2 b3 e2 f7 0d c5 79 1b 00 36 3a 21 20 e7 06 | d4 05 ab e6 7f 0e 4f 26 f4 28 cb d2 12 3f 60 75 | e8 8c 1f 18 e0 09 73 82 2e 56 2f fe 00 1a 31 26 | 0b 05 07 a6 fc 87 93 26 a9 c2 69 7c 30 9c 7a 89 | e9 2a 6b aa c2 98 8a d1 cc 85 ab 8a 1d b6 6c 3a | 46 51 76 9a 2b ea bd 4c 92 d8 c8 5c 56 7a b8 5f | 71 f6 c7 f5 f4 4e c8 ce cc 9b 6f 50 15 3b 30 b5 | cc 32 0c 15 e6 9e 78 33 f4 30 d7 c5 bc a6 29 97 | 00 2f a4 12 c0 82 9e 84 f0 b8 38 05 f1 51 00 d1 | 48 64 6a f9 cc d7 36 54 45 d6 ee 3e 02 d0 d5 50 | ec e5 a0 1a 70 ee 96 eb 78 4d 45 6b e4 50 2d ed | 29 00 00 24 24 22 aa ae c7 66 c9 3a 20 66 58 4a | 54 df 58 65 c1 5d d7 a3 b2 c7 e8 e8 de 15 89 70 | 84 48 bb d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 7f 22 d9 ee cc a0 1b 0a 4c ff 84 | da dc a7 a5 32 ec b3 c6 00 00 00 1c 00 00 40 05 | e4 4f b8 48 f2 80 69 e7 b9 85 06 aa 82 75 ce d9 | b4 81 0b 76 | libevent_free: release ptr-libevent@0x7fb374024f80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469defe0 | #136 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 c8 9e 97 21 46 fb d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #136 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #136 | rejected packet: | d6 c8 9e 97 21 46 fb d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #136: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0576 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_RETRANSMIT for parent state #114 | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #114 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #114 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49611.774973; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002539 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #114 | libevent_malloc: new ptr-libevent@0x7fb374024f80 size 128 "road-eastnet-nonat-114" #114: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #114) | d6 76 3e 2a df 8d 49 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 89 bc e4 ca cf 42 9f 8c 3e 0c bd bc ae 4f 3b | d3 c7 ce d3 ca 55 eb 39 04 eb 76 8e a9 75 7d e3 | b6 18 fe 44 5f 1c ef b7 b7 41 cc 4d 34 22 30 65 | 06 59 1e ef 39 63 eb fe 02 26 56 aa 64 57 8d 53 | 7a 80 31 9c 0a f7 30 cf 50 cb a2 17 9f 63 45 27 | 3c d2 e0 b9 54 07 a2 b1 46 40 09 3b 94 40 bf f1 | 40 f9 b6 13 93 c3 4e d6 d8 b1 db 99 2b ea b1 51 | cb eb aa 9a ed ac 6d b8 6b 55 e2 2f 64 52 21 e2 | 9d 13 28 a8 e7 03 1f ba 1a 35 29 e1 bf bc 71 81 | 00 b3 30 d7 67 e8 0d 4c f0 57 7f 78 f9 6a af a6 | f5 69 67 2d 44 65 18 2d d8 cb 15 95 95 67 b6 a2 | 53 6a 9c 3b 84 13 f8 02 23 28 ee d8 85 45 e3 f6 | 5a a4 85 e6 1c 98 88 9c 1f 95 20 64 13 9f 49 1c | 78 c0 c0 ca f6 15 03 7c ad a7 9e 6d 64 5a 3a 90 | 22 4b eb 71 cf 24 e9 b9 6a 4d d7 77 ec 73 7e 9d | b2 6f c8 a4 49 bf 18 63 90 cf af e1 1e da 29 bc | 29 00 00 24 73 ab 08 be 9c 8c 4d 6d 6c 17 9d b7 | 72 a8 6d 05 77 58 95 9d b6 49 34 83 b7 04 21 62 | 34 da 48 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 91 b3 8b e1 5d a7 b1 99 b7 4d e6 | 18 7a 40 70 0a cf e4 42 00 00 00 1c 00 00 40 05 | 2c bf 9c 44 68 90 73 42 ea f8 95 cd ea 90 69 66 | 03 01 a9 72 | libevent_free: release ptr-libevent@0x7fb35401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | #114 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 76 3e 2a df 8d 49 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #114 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #114 | rejected packet: | d6 76 3e 2a df 8d 49 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #114: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0531 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47e90 | handling event EVENT_RETRANSMIT for parent state #36 | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #36 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #36 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49611.815255; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004055 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #36 | libevent_malloc: new ptr-libevent@0x7fb35401d920 size 128 "road-eastnet-nonat-36" #36: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #36) | c4 93 27 79 3b f0 36 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 44 1e 02 70 5f fd 14 41 57 b4 33 c5 4d c1 bf | 56 a3 d0 f5 4b 1b 15 73 5b 56 52 91 f2 4c 9d dc | 3f 2d 5a 36 27 be 97 1b 2d 43 21 16 b5 25 60 73 | 31 d7 04 cb ac b3 fd 19 61 2f 36 91 05 d7 55 8c | 92 5d 99 4b ae f6 cf a1 6e 2e de fa cb a4 7e 7e | b4 08 08 4f 90 51 13 b7 5b cb 7e 2c db 61 c5 d9 | d2 2f 86 cb df 97 d1 5e d4 95 3b c2 71 e2 2b bf | 7b e5 e9 8b bd 5c de 24 ac 5a 8b 4a 5d 3b ff 1e | f8 f4 2b 7b 96 0c 02 8f ac d9 62 f7 21 fb 07 5e | 9d 3f 41 15 d1 79 65 31 2a 68 5a 1a 56 fc 9c 2a | 20 90 63 93 fd d9 59 08 0d 3a 51 cc ee 1b ca 83 | 3c 5f 8f 03 9c cf 6f 04 52 23 a8 cb 50 43 72 18 | 78 cb 0f 8d bf 67 75 81 61 d9 91 a3 5f f5 1e ad | 09 8c 98 32 17 11 19 f3 54 f2 c6 36 e6 24 63 e2 | 41 b5 39 5c af a7 57 20 af 37 ac c1 12 94 ec 3a | e0 ac a7 07 42 78 d2 32 96 5c a0 ed 7e 90 04 46 | 29 00 00 24 e4 05 e8 ad 6f 35 18 e8 9c ba 2a d7 | ba f9 eb 8c c3 7b 43 88 9a 23 1f e0 cb de a0 8e | 76 67 65 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab a4 b2 11 db 45 90 fb 99 ab 4d 81 | 85 c6 e5 03 d5 18 31 7d 00 00 00 1c 00 00 40 05 | 9e c9 75 d2 3b 5d 13 cd bd fe b5 96 1f 79 bf 21 | fa a0 06 d7 | libevent_free: release ptr-libevent@0x7fb36401f860 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47e90 | #36 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 93 27 79 3b f0 36 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #36 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #36 | rejected packet: | c4 93 27 79 3b f0 36 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #36: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0757 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3a590 | handling event EVENT_RETRANSMIT for parent state #91 | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #91 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #91 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49611.817634; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003264 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47e90 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #91 | libevent_malloc: new ptr-libevent@0x7fb36401f860 size 128 "road-eastnet-nonat-91" #91: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #91) | a6 f1 37 27 17 86 c6 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 6a 94 73 f6 c2 01 42 8c 6e f6 05 6f 1c e2 ee | 38 45 16 e5 f6 17 c9 fc 07 cc bc 0b 02 da 35 c8 | 5a ca 9d 87 29 53 47 69 49 7f 31 f0 fb ce e2 59 | 00 57 9b 32 9e 1f da 4b f7 41 b5 05 14 af c4 d7 | 09 7f 69 01 a0 cd 93 57 e5 a7 fd 93 a9 9e c3 fc | b0 af f5 37 11 6f 2b 38 a8 2a 8b 37 b3 e6 bc bf | 0c 06 37 86 ca f2 b6 b0 ed 1e 3f d6 8a f0 0b f9 | e8 80 df 35 d6 a2 36 c0 a2 dc a4 1a ca 7d d9 0b | 6f fc 29 fc 92 12 f8 05 c1 88 8e 81 27 4a 61 62 | c3 16 fc 6e 5e a6 59 bf d1 b1 ad d5 92 05 c4 60 | 2f 54 a3 71 e0 ec ca 5d 37 16 ec 5f ec 37 29 2d | 46 5a 04 10 84 ad 36 aa 07 ca f2 60 8b 7c ac f8 | ac e2 8b a3 69 23 74 f2 d2 2d c5 0d 51 9b 2c 7f | 42 45 54 c3 ec 3d 44 63 f0 0a ec ff b3 69 48 ee | 22 28 aa af 72 8c cd ca 9e 3c dd f6 ac 2b 6f b7 | a1 90 21 32 ae b8 23 39 1e cc fe 3e d6 b6 21 70 | 29 00 00 24 29 05 58 2b f0 ba fb 18 77 b3 53 8d | 8b 05 bb 0a 8a c5 e8 dc 24 17 58 d9 a6 60 c9 1d | bc c9 21 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 d0 cc 50 f7 83 7e b1 80 37 a7 4b | da df 68 8f 62 b7 e5 89 00 00 00 1c 00 00 40 05 | 8a 41 f9 2e 73 42 40 08 8e 79 f6 3e 7a 3f 48 7e | 67 86 16 af | libevent_free: release ptr-libevent@0x7fb354009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3a590 | #91 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 f1 37 27 17 86 c6 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #91 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #91 | rejected packet: | a6 f1 37 27 17 86 c6 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #91: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.077 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a89740 | handling event EVENT_RETRANSMIT for parent state #129 | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #129 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #129 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49611.821999; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002099 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #129 | libevent_malloc: new ptr-libevent@0x7fb354009640 size 128 "road-eastnet-nonat-129" #129: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #129) | 72 fb d4 3a 3d 31 ef 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 72 cd 05 8b 1a e1 a8 66 68 a3 88 d4 37 ab 29 | 8d ca b6 b0 86 38 49 65 ce de c8 b0 39 b5 e5 f9 | 49 66 a0 ac 83 68 f5 08 38 44 61 fc b4 c4 e3 93 | 86 b2 c8 75 e1 f1 8d 43 35 de 04 cc bd e4 ef a7 | 8b 7d df 6d 22 63 24 bb ce 8f 77 d1 43 ca 6b c6 | 70 cf 4e 81 02 44 0d 39 85 28 ca ae 69 3d 8b 1d | 8e 2a f9 28 37 54 47 1b 7f 1e 6c c3 e7 ca 7d c5 | 5d eb 2d b5 ee 04 65 71 a3 9b 69 bf 7f 5f e0 e8 | b1 ac e6 e0 77 7c 27 c0 f7 96 26 05 ab 95 ca fd | fa ef 5c 22 dc 42 3f 47 3c 21 7c b3 45 c2 0f 2d | 47 18 59 0f e9 05 83 ad b3 18 86 6e 4c 0f 6a 6f | a2 bf 54 51 83 2a 64 42 06 32 16 00 c7 cc 1b e9 | 3e b9 e5 cf 6c 0f 2e 6b fd eb c0 0a 44 95 18 9e | 2c d3 00 4b bf 67 5f 7a f5 b4 f7 f7 d7 fd a9 64 | 98 77 b8 cc 18 a8 1d 3e 8f 95 27 46 f6 67 44 7b | 96 ba b1 ae ad ee 56 93 ac c5 ad 91 dc 2a d2 ba | 29 00 00 24 64 51 a8 77 1e c3 b2 0e 1e 7b 14 6a | 5f 64 3b ca 18 8a 91 d8 b8 bf ce 82 b9 6f e1 5d | aa 66 20 12 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f cd a9 5a 90 93 b1 13 f3 88 1c ea | 0f f5 0f 31 39 58 6f be 00 00 00 1c 00 00 40 05 | 0e bb c8 26 22 69 20 e6 e2 bf a8 b0 a2 3b 98 e4 | e2 fb 7b 71 | libevent_free: release ptr-libevent@0x7fb38401cc10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a89740 | #129 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-144" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-144' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #144 at 0x557d46a99140 | State DB: adding IKEv2 state #144 in UNDEFINED | pstats #144 ikev2.ike started | Message ID: init #144: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #144: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #144; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-144" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-144" IKE SA #144 "road-eastnet-nonat-144" "road-eastnet-nonat-144" #144: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-144 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-144": constructed local IKE proposals for road-eastnet-nonat-144 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 144 for state #144 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a89740 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #144 | libevent_malloc: new ptr-libevent@0x7fb38401cc10 size 128 | #144 spent 0.149 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-144" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.215 milliseconds in whack recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 fb d4 3a 3d 31 ef 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #129 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #129 | rejected packet: | 72 fb d4 3a 3d 31 ef 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #129: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0539 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 9 resuming | crypto helper 9 starting work-order 144 for state #144 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 144 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 144 time elapsed 0.000554 seconds | (#144) spent 0.558 milliseconds in crypto helper computing work-order 144: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 144 for state #144 to event queue | scheduling resume sending helper answer for #144 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #144 | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 144 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #144 | **emit ISAKMP Message: | initiator cookie: | 95 f5 7e 43 50 83 91 f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-144 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f5 af 0d 3c f0 04 33 31 65 f6 8e 0a e2 6d 8f 2b | ikev2 g^x 3a 54 de b3 ca 0f b9 57 94 b3 82 c2 80 38 37 42 | ikev2 g^x 7f 12 9e 2e 71 85 9b 4b b8 30 72 8d 13 66 8d 18 | ikev2 g^x cc b4 6c 82 a9 1c ff 5f bc 21 44 b4 04 e3 03 9f | ikev2 g^x 86 65 ce c2 4c 9e c7 42 cb 55 d7 40 69 8e 4e 35 | ikev2 g^x 08 db 41 09 bf 5b 9f e9 29 80 fb 24 8c ee 8a 18 | ikev2 g^x 98 d5 9e 29 b1 2e 48 fa a4 54 8d 89 c7 a3 3f 0e | ikev2 g^x fc 43 c8 e1 70 19 e6 79 93 90 9a 7f 29 dc 10 54 | ikev2 g^x 5c 05 ee 55 8b da f3 4a d4 d1 7a 22 56 b9 55 f2 | ikev2 g^x 83 7d ee 0a 7b 20 d8 88 a4 b2 35 e6 85 84 6e ea | ikev2 g^x 73 63 0f 8a e4 f5 ba b9 cf c5 6d ef 42 bc 1c 31 | ikev2 g^x 91 cc e3 6a cc 1c 24 a0 43 43 cd 4a d2 99 1f d0 | ikev2 g^x 12 0e 0b 61 86 58 8a 2a 98 ff 0e 20 62 f2 a9 6f | ikev2 g^x 84 85 8e 3d 34 eb 58 ea 76 88 a9 8b bd 38 f7 19 | ikev2 g^x 7f 52 1e a6 e1 d5 d4 4f 95 6d fa 80 6a e1 f8 3e | ikev2 g^x c4 ca 0c d0 70 40 4c 9c cb 3a a3 28 2b c3 1c ff | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1f 01 c0 5a 0d f1 22 7b f9 16 68 fa 7d 4a 59 bf | IKEv2 nonce c4 b6 f1 ab 98 c0 67 1a 42 27 bf 9d d6 b1 35 d3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 95 f5 7e 43 50 83 91 f9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 90 | natd_hash: port= 01 f4 | natd_hash: hash= 01 96 0c ca 76 1c 4b 86 73 02 f4 3a a5 21 4a 8f | natd_hash: hash= fe b4 03 ee | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 01 96 0c ca 76 1c 4b 86 73 02 f4 3a a5 21 4a 8f | Notify data fe b4 03 ee | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 95 f5 7e 43 50 83 91 f9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 86 67 99 5d 30 be 3d 57 d4 ea af 87 c1 18 21 08 | natd_hash: hash= 32 c4 b1 0f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 86 67 99 5d 30 be 3d 57 d4 ea af 87 c1 18 21 08 | Notify data 32 c4 b1 0f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #144 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #144: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #144 to 4294967295 after switching state | Message ID: IKE #144 skipping update_recv as MD is fake | Message ID: sent #144 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-144" #144: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.144:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #144) | 95 f5 7e 43 50 83 91 f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 af 0d 3c f0 04 33 31 65 f6 8e 0a e2 6d 8f 2b | 3a 54 de b3 ca 0f b9 57 94 b3 82 c2 80 38 37 42 | 7f 12 9e 2e 71 85 9b 4b b8 30 72 8d 13 66 8d 18 | cc b4 6c 82 a9 1c ff 5f bc 21 44 b4 04 e3 03 9f | 86 65 ce c2 4c 9e c7 42 cb 55 d7 40 69 8e 4e 35 | 08 db 41 09 bf 5b 9f e9 29 80 fb 24 8c ee 8a 18 | 98 d5 9e 29 b1 2e 48 fa a4 54 8d 89 c7 a3 3f 0e | fc 43 c8 e1 70 19 e6 79 93 90 9a 7f 29 dc 10 54 | 5c 05 ee 55 8b da f3 4a d4 d1 7a 22 56 b9 55 f2 | 83 7d ee 0a 7b 20 d8 88 a4 b2 35 e6 85 84 6e ea | 73 63 0f 8a e4 f5 ba b9 cf c5 6d ef 42 bc 1c 31 | 91 cc e3 6a cc 1c 24 a0 43 43 cd 4a d2 99 1f d0 | 12 0e 0b 61 86 58 8a 2a 98 ff 0e 20 62 f2 a9 6f | 84 85 8e 3d 34 eb 58 ea 76 88 a9 8b bd 38 f7 19 | 7f 52 1e a6 e1 d5 d4 4f 95 6d fa 80 6a e1 f8 3e | c4 ca 0c d0 70 40 4c 9c cb 3a a3 28 2b c3 1c ff | 29 00 00 24 1f 01 c0 5a 0d f1 22 7b f9 16 68 fa | 7d 4a 59 bf c4 b6 f1 ab 98 c0 67 1a 42 27 bf 9d | d6 b1 35 d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 96 0c ca 76 1c 4b 86 73 02 f4 3a | a5 21 4a 8f fe b4 03 ee 00 00 00 1c 00 00 40 05 | 86 67 99 5d 30 be 3d 57 d4 ea af 87 c1 18 21 08 | 32 c4 b1 0f | state #144 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38401cc10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a89740 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a89740 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #144 | libevent_malloc: new ptr-libevent@0x7fb38401cc10 size 128 | #144 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49611.824583 | resume sending helper answer for #144 suppresed complete_v2_state_transition() and stole MD | #144 spent 0.471 milliseconds in resume sending helper answer | stop processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3780300e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 f5 7e 43 50 83 91 f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #144 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #144 | rejected packet: | 95 f5 7e 43 50 83 91 f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #144: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0587 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #115 | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #115 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #115 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49611.839794; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003045 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469defe0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #115 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 "road-eastnet-nonat-115" #115: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #115) | c4 57 de ea ab 7c 97 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d 60 64 b4 6d 6b ab d1 46 47 bf d9 bb b3 15 d9 | 76 6a d8 89 d3 b0 5a 81 28 ba 1d 93 76 a5 80 bb | 38 99 6f de 11 f7 c8 2c 23 bb 14 6a 9f 0d a9 47 | 32 e4 6d d5 c4 32 60 81 49 22 36 5b 90 09 c7 0c | 27 45 32 0f 98 73 ed a3 58 24 f6 91 48 ba e7 1f | da 48 cc 0b e5 09 56 9d bd e9 fe a4 8f 0e 2b 69 | 4d 35 1f 28 bf 51 97 13 c0 2e 28 0e de c2 67 89 | 74 f0 15 44 d8 28 5b 7f f9 a9 ff b2 03 37 cf 2c | 3b 6e e1 4e 7e c7 1c 07 07 33 f5 e7 ff 50 1f 8d | 31 38 08 fc a1 18 db f4 32 10 6d f3 26 bd 9e d9 | db 50 5b 6d 6b 19 89 41 88 e3 7e 3b 01 55 72 67 | 91 73 3c 48 31 9d dd 55 e1 1b 9a a9 f9 5f 58 30 | 2e b7 6d 0e 83 a7 65 f9 86 ec 70 47 1e 65 85 e1 | e6 c5 21 98 7e 5c d4 94 dd 2a 93 5a 70 ed 80 a7 | 59 4c 40 1d 45 f5 3b 9b ad 67 94 6a 65 cc 62 c5 | 57 fb 85 e6 12 1e d8 43 f4 ef fe f0 cc a4 02 e0 | 29 00 00 24 34 89 d0 cd bb 68 33 bb 66 4c 49 99 | 21 34 57 e7 67 32 62 7f b0 e9 7c 89 a8 87 a7 1b | 14 49 2b 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 7a 1e c7 ed 14 54 ea ac f9 9a 4e | af 78 6e 32 16 f1 84 2f 00 00 00 1c 00 00 40 05 | 1a 60 d9 ab c3 38 58 4e 6c 49 b7 eb b4 e1 91 a6 | 90 ea 24 0f | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #115 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 57 de ea ab 7c 97 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #115 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #115 | rejected packet: | c4 57 de ea ab 7c 97 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #115: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0647 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #137 | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #137 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #137 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49611.842109; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500628 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #137 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 "road-eastnet-nonat-137" #137: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #137) | 71 ba fb 1f 95 88 29 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 75 6d 4d 0f bb db 8d 24 d0 ba 5f 79 5b 88 be | 94 ae ea 89 7e 95 49 22 fa 6f 0d 51 90 a6 60 1f | 08 fe 3b 9a b1 a8 b5 c8 e8 a5 d1 c2 b6 3a f6 5c | 07 25 e1 53 6d cd f9 d3 3f 17 7a b9 97 ee 73 6b | da 87 59 77 74 9c 5c 05 a7 16 5c 85 33 f2 d8 f0 | a7 84 4c 20 01 fc 53 bf 21 28 ba 99 79 44 ea b7 | b7 e2 9a c6 4e 09 9d 5a 41 46 ff 69 36 bd 47 3d | 68 59 0e 87 0c b2 db 9d ef 27 b1 ef a7 c3 7d 74 | d1 bf 63 41 fd 34 70 c8 08 69 9e 0d 21 dd b6 ca | 61 47 c8 f6 20 99 94 42 4a b6 3c e4 c1 6f 59 47 | 32 7f e7 88 96 d9 c5 8f 82 9f aa 9b 0b 9e 03 53 | 65 a9 c8 5c d7 fe be da 56 44 27 26 98 d6 9a ae | 35 b2 bc fb a7 4d 1f ae ae 76 fb c2 8c 86 63 40 | 59 88 a0 8b a9 0e 3a 8f 10 76 ad e8 54 d2 9e 91 | 7a bc 03 79 61 0b 83 53 4c 4e 2d 22 ca 69 54 24 | ae 77 e1 5c 6b 3a ff ee 1f 59 52 e0 9c 51 48 2c | 29 00 00 24 f7 ec 22 b0 d2 45 cb de 11 9d 88 dc | d9 c8 87 82 94 72 01 b4 91 d8 41 1f 07 fb 13 21 | 60 9f a8 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ee b9 3b 05 6b fc 34 5a 00 ef 69 | 58 dc d5 6e 13 53 c2 0c 00 00 00 1c 00 00 40 05 | 42 f2 83 df 2f 64 fb 42 98 b0 17 b3 99 82 89 4f | 79 b2 42 ca | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #137 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 ba fb 1f 95 88 29 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #137 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #137 | rejected packet: | 71 ba fb 1f 95 88 29 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #137: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45310 | handling event EVENT_RETRANSMIT for parent state #37 | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #37 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #37 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49611.889474; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005646 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #37 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 "road-eastnet-nonat-37" #37: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #37) | 17 02 22 e9 ab 5b 91 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f f0 24 04 15 84 3f 8d a0 47 69 89 53 1c 67 b8 | 33 2a a4 f5 84 95 fd 12 c4 95 3c eb 03 f8 76 46 | 15 20 9b c5 17 a5 48 da 05 b3 14 87 45 a5 03 ce | 15 45 04 84 4f ce c5 7f 7f d9 f6 69 e6 fa 2a ce | 98 6a 3f d1 cc fe 7f e2 41 fd 61 7b af af 30 7e | 0a 75 d2 92 05 56 ed e9 09 bd bc db cd 80 58 20 | 86 cc 39 bd f2 1c dd 9d 77 bb 28 c3 7e a4 97 11 | 86 79 5d 68 34 e4 33 4c b3 b1 ed 26 ab a1 c5 7d | dd f5 b8 0e 55 cd f4 1f ea 00 32 c8 4b fd 8f a5 | 71 8b 05 79 0a 34 41 68 bd c7 7d 96 51 77 5e 6b | d9 65 0d cf f7 34 f5 5b 4b bf 3e ae f6 63 25 2e | ea 9e 2a 3f 64 43 4d 0c 4a de f8 57 38 d7 5a c8 | 89 09 d3 81 3b 61 a8 5e 87 ab 34 9f c0 a6 2e 8e | a4 55 d9 e8 61 49 db 19 2f a0 89 a1 e6 24 e6 14 | 77 4b 63 b1 94 0b fe b9 37 07 5d a5 3f f4 4e 97 | 2a 98 e3 ca 6e 7f 3f a3 88 c3 da 3a c0 a1 79 c5 | 29 00 00 24 75 33 7f 61 eb 0d 1b f9 84 ec ca bb | af cf f0 96 3c 65 2f 09 ef 72 4a c4 05 f7 86 9b | fc 7f 3c 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 5d ed 76 d7 41 0c 3c 88 ec 15 de | 69 08 6f 06 52 19 de 0f 00 00 00 1c 00 00 40 05 | 52 bb 9d ab bf 18 49 c2 17 f2 d0 27 18 10 66 1c | c7 07 9d fe | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45310 | #37 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 02 22 e9 ab 5b 91 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #37 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #37 | rejected packet: | 17 02 22 e9 ab 5b 91 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #37: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47ed0 | handling event EVENT_RETRANSMIT for parent state #130 | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #130 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #130 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49611.893751; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002097 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45310 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #130 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 "road-eastnet-nonat-130" #130: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #130) | 85 43 6a ad 59 7d ce ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 ae b5 ed fb fd 70 00 13 8d 64 ee 46 d1 86 03 | 85 09 b4 b0 21 e1 75 08 18 f5 01 a5 ce d9 28 32 | 42 84 d9 a2 5d 29 4b 02 ec 24 a8 1c 76 d6 11 b3 | b7 ca cc 7d bb 8a 73 62 20 57 c8 ee 7d 78 9e 1d | 7a d7 f6 f5 3d b0 f3 26 b5 f8 7e 6c 34 29 9d e1 | 66 87 a7 94 04 46 39 e6 b7 02 1f 92 b6 19 a4 2b | 93 1f ea 2c 8d 99 b7 50 6f cd f0 d6 4b e1 d1 c9 | 7e 98 1d 25 8f 0a 2c a3 9a 8f 46 07 29 ef b1 91 | 6c b5 e6 a3 11 c5 c9 c8 5f a8 7f 93 e8 c3 28 29 | 1d 87 06 30 a9 b3 18 af 13 99 e2 ea 6d ca d3 37 | f0 97 8e c5 32 05 cc 70 9c 35 a3 ab 7d bb 03 4c | 6f 27 f2 98 7e 64 26 7d a4 db 20 0f 0c 9d fa ef | 62 00 52 b0 8e 30 a4 8a e8 bb 41 07 76 b9 71 f2 | 63 f8 6e da 4f 74 79 ae c9 5c 70 e4 82 06 94 fd | 62 5b ee db c2 84 ae ea bf 8a 91 a6 ef 57 d0 e7 | d1 ef 3e 19 e8 2e 02 37 b6 05 eb 7c 5d f3 b5 d0 | 29 00 00 24 6c 1f 45 88 1e 42 31 9a b9 27 19 26 | 95 8c 4f c4 41 99 09 32 1c bf f6 27 de 6a fb 55 | 00 73 7a e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 41 0f ce 80 1a 0e 57 d0 34 7b d4 | 5a 51 a5 89 80 d3 8f c9 00 00 00 1c 00 00 40 05 | 7f 09 ba 77 a9 79 98 e7 5b 47 dc 5e 0f 55 ef 6e | 76 2d 29 18 | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47ed0 | #130 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 43 6a ad 59 7d ce ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #130 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #130 | rejected packet: | 85 43 6a ad 59 7d ce ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #130: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #92 | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #92 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #92 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49611.899041; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004585 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47ed0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #92 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 "road-eastnet-nonat-92" #92: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #92) | 07 61 83 69 17 8d a7 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 13 06 9b 22 b9 09 02 07 4e 56 e2 9a 05 b7 70 | b7 25 ba 3c e0 d7 4b 41 68 60 e2 84 fa 7d 2e 53 | 6d 05 81 6c 1d a6 11 6c f3 c1 91 94 93 3c 04 e1 | 47 48 3f a6 f9 c1 bd d3 55 1c 44 87 99 6c 2b ee | 1a fc ef da ca ee 71 5f 90 30 42 cf 28 4f 89 1f | 86 f8 61 c0 95 c8 84 9c 1c 5f 1c 12 41 c6 05 de | 97 e9 89 32 6b 06 59 ff 06 2b 2f 06 a3 7f d2 ee | 73 0b 6d 38 c1 ed f4 4b b5 20 b3 c7 2c 91 97 4e | e0 5f 39 be 43 66 47 ab c5 cc 93 72 f7 60 85 3f | db 39 5c a4 81 f1 02 ef e4 62 a4 fe 72 6e 67 a1 | 96 94 e2 5d 70 64 80 e3 dc 1a 37 fd 9b e4 85 ab | 94 44 5e 2f e2 eb 91 bf ec 37 e1 84 2a 65 44 ca | 1a 08 22 fa 52 cb 8e 26 f3 0a e0 f3 e8 ed d0 ab | dc 5c 23 93 37 b0 3f ec 3e d7 3b 37 ac 5f 12 98 | 95 79 c8 ae bc 21 83 a1 90 e1 8c a5 2a 7f b7 ff | e0 96 4f 2b 8d 89 b3 7b 60 e0 d7 14 33 e7 9c 37 | 29 00 00 24 0e 70 86 57 dd 9d d2 8d 77 a4 03 8e | d4 ef 6c f9 5f 5e da 54 db 62 42 7e 49 f6 2b 1b | b6 ad f3 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 b0 5c 2e fc f8 56 4b e1 e9 3b 08 | c9 71 30 03 41 fd 60 2e 00 00 00 1c 00 00 40 05 | f0 af c3 ce dd eb 90 e8 cb ac 91 a5 38 a0 f8 72 | 06 9d 9d 60 | libevent_free: release ptr-libevent@0x7fb35c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #92 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 61 83 69 17 8d a7 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #92 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #92 | rejected packet: | 07 61 83 69 17 8d a7 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #92: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-145" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-145' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #145 at 0x557d46a9a700 | State DB: adding IKEv2 state #145 in UNDEFINED | pstats #145 ikev2.ike started | Message ID: init #145: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #145: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #145; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-145" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-145" IKE SA #145 "road-eastnet-nonat-145" "road-eastnet-nonat-145" #145: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-145 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-145": constructed local IKE proposals for road-eastnet-nonat-145 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 145 for state #145 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #145 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 | #145 spent 0.162 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-145" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.249 milliseconds in whack | crypto helper 10 resuming | crypto helper 10 starting work-order 145 for state #145 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 145 | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 145 time elapsed 0.000923 seconds | (#145) spent 0.931 milliseconds in crypto helper computing work-order 145: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 145 for state #145 to event queue | scheduling resume sending helper answer for #145 | libevent_malloc: new ptr-libevent@0x7fb37c0300e0 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #145 | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 145 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #145 | **emit ISAKMP Message: | initiator cookie: | a6 a1 9f 1d 3f 3a 29 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-145 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 13 ad 76 df ba ca 18 92 b9 50 e2 27 a3 57 3f f5 | ikev2 g^x d7 ce ae 5d 80 a9 09 c6 8a 53 e3 ab 22 af 0e a7 | ikev2 g^x 88 2e e6 ed 37 ce 02 dd 03 71 9a aa 64 d1 00 5c | ikev2 g^x 54 65 05 0e 62 cb 77 34 78 e8 1d 0f 3c 6f 76 4f | ikev2 g^x d8 fc 9f c4 10 87 e5 9a b0 72 db 0a 63 63 0e ec | ikev2 g^x a2 67 9d 72 98 db 53 5f a6 6f e8 b3 98 59 aa 3b | ikev2 g^x 88 1a a2 8d d0 7f c4 94 06 61 c1 99 f9 c0 e1 fc | ikev2 g^x 19 b1 6a 14 b7 fd 63 fd d3 3b 83 b6 f1 f8 68 d2 | ikev2 g^x 13 f3 e6 28 90 fe d0 d0 88 c6 ca e3 4e 56 e1 09 | ikev2 g^x b8 4b c6 48 c4 d4 00 e6 af d0 6c fa ac 01 46 d9 | ikev2 g^x 68 30 67 9c 6d 90 ca de 4f 57 74 b7 7a b8 1b 41 | ikev2 g^x a9 90 f5 03 0d 89 d9 ac 42 f8 f9 ae 19 2a 88 37 | ikev2 g^x d2 a9 69 9e 81 b2 1c 52 07 de 0f fa d0 69 b1 a8 | ikev2 g^x 12 38 cf d3 2e 09 65 b8 1c da 6e 0b 4d 41 c0 65 | ikev2 g^x 80 dc 01 75 47 41 de 6c 83 4d 93 25 86 5c 1b c8 | ikev2 g^x f3 08 39 71 bd f1 c4 fe f5 43 e7 4c 77 94 d2 cc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 03 a8 59 45 29 a4 02 15 24 82 5a 54 64 ac fd bc | IKEv2 nonce 55 59 ba ca b7 e9 80 0d f2 9c bd f0 d3 a5 de f6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a6 a1 9f 1d 3f 3a 29 1e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 91 | natd_hash: port= 01 f4 | natd_hash: hash= 51 e0 ba e6 72 d8 87 8f de 74 38 1d 19 eb b3 76 | natd_hash: hash= 79 6b d3 38 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 51 e0 ba e6 72 d8 87 8f de 74 38 1d 19 eb b3 76 | Notify data 79 6b d3 38 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a6 a1 9f 1d 3f 3a 29 1e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6f 55 64 02 f2 84 7e 5a 25 36 99 f3 de 2c 7f 97 | natd_hash: hash= 3a 54 f2 52 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6f 55 64 02 f2 84 7e 5a 25 36 99 f3 de 2c 7f 97 | Notify data 3a 54 f2 52 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #145 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #145: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #145 to 4294967295 after switching state | Message ID: IKE #145 skipping update_recv as MD is fake | Message ID: sent #145 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-145" #145: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.145:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #145) | a6 a1 9f 1d 3f 3a 29 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 ad 76 df ba ca 18 92 b9 50 e2 27 a3 57 3f f5 | d7 ce ae 5d 80 a9 09 c6 8a 53 e3 ab 22 af 0e a7 | 88 2e e6 ed 37 ce 02 dd 03 71 9a aa 64 d1 00 5c | 54 65 05 0e 62 cb 77 34 78 e8 1d 0f 3c 6f 76 4f | d8 fc 9f c4 10 87 e5 9a b0 72 db 0a 63 63 0e ec | a2 67 9d 72 98 db 53 5f a6 6f e8 b3 98 59 aa 3b | 88 1a a2 8d d0 7f c4 94 06 61 c1 99 f9 c0 e1 fc | 19 b1 6a 14 b7 fd 63 fd d3 3b 83 b6 f1 f8 68 d2 | 13 f3 e6 28 90 fe d0 d0 88 c6 ca e3 4e 56 e1 09 | b8 4b c6 48 c4 d4 00 e6 af d0 6c fa ac 01 46 d9 | 68 30 67 9c 6d 90 ca de 4f 57 74 b7 7a b8 1b 41 | a9 90 f5 03 0d 89 d9 ac 42 f8 f9 ae 19 2a 88 37 | d2 a9 69 9e 81 b2 1c 52 07 de 0f fa d0 69 b1 a8 | 12 38 cf d3 2e 09 65 b8 1c da 6e 0b 4d 41 c0 65 | 80 dc 01 75 47 41 de 6c 83 4d 93 25 86 5c 1b c8 | f3 08 39 71 bd f1 c4 fe f5 43 e7 4c 77 94 d2 cc | 29 00 00 24 03 a8 59 45 29 a4 02 15 24 82 5a 54 | 64 ac fd bc 55 59 ba ca b7 e9 80 0d f2 9c bd f0 | d3 a5 de f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 e0 ba e6 72 d8 87 8f de 74 38 1d | 19 eb b3 76 79 6b d3 38 00 00 00 1c 00 00 40 05 | 6f 55 64 02 f2 84 7e 5a 25 36 99 f3 de 2c 7f 97 | 3a 54 f2 52 | state #145 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #145 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 | #145 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49611.905335 | resume sending helper answer for #145 suppresed complete_v2_state_transition() and stole MD | #145 spent 0.485 milliseconds in resume sending helper answer | stop processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c0300e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 a1 9f 1d 3f 3a 29 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #145 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #145 | rejected packet: | a6 a1 9f 1d 3f 3a 29 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #145: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0662 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28ab0 | handling event EVENT_RETRANSMIT for parent state #116 | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #116 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #116 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49611.907547; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004895 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a205f0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #116 | libevent_malloc: new ptr-libevent@0x7fb37c0300e0 size 128 "road-eastnet-nonat-116" #116: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #116) | b2 c1 8f cb f7 6a 1e a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 10 14 ae 52 93 c7 02 e8 52 e1 37 d5 de 46 8c | fd 60 c1 85 87 df bb 73 86 74 dd ca 8d 28 84 e8 | ae a4 cc 28 e4 8d 32 74 8d 1a ce d7 d3 d2 af b0 | 17 d9 f0 1f a3 6b 80 67 ac 90 16 e8 bd 63 76 cd | 29 1d 99 79 32 0a f9 72 a3 b1 6c a3 80 e8 98 c7 | 50 db 8b a2 a3 d2 f5 f7 af ea cb e0 92 9e 24 f1 | ee d0 e5 d9 31 06 c1 bd 2c 7e d3 0a 21 44 11 df | a4 42 5a ee bb 8a 79 72 e4 f3 c9 99 7b df 25 70 | 3c 49 19 99 e1 b4 65 cb cf 1f dc af da 2b bd 09 | 11 55 b0 c8 e4 15 8c 50 3c c0 c3 00 8c 8c 4c ab | 69 1b ad 8f b8 1a e0 31 01 be 05 d6 f9 1d 43 66 | f1 fd 89 96 83 b0 fe 81 90 88 96 0a aa b0 30 a0 | 85 c7 97 d5 26 67 92 b8 99 15 c1 d7 75 f8 4b 96 | 28 a4 71 fb e3 bc ab 36 e6 56 13 b6 1e 48 b3 3d | 9c e0 fd 0d 74 f8 ef 54 b8 1f 40 6b e3 af 77 76 | c8 a0 52 42 e3 01 29 91 49 f3 39 82 3e 75 b6 74 | 29 00 00 24 f8 40 4d b3 f4 26 54 f3 cf b0 a0 c8 | 54 6e 9f a9 95 bb 15 87 06 e3 63 86 66 7d 8a 82 | ee 67 c6 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 63 f6 16 ae 7e d5 6c 46 12 68 8c | 69 38 5c 9a 54 a3 19 f3 00 00 00 1c 00 00 40 05 | 9e 9c 34 46 1f 45 a3 36 da 24 a6 33 3a 00 62 20 | 5b e0 e0 ea | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28ab0 | #116 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 c1 8f cb f7 6a 1e a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #116 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #116 | rejected packet: | b2 c1 8f cb f7 6a 1e a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #116: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0668 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a276e0 | handling event EVENT_RETRANSMIT for parent state #138 | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #138 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #138 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49611.9149; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50044 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28ab0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #138 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 "road-eastnet-nonat-138" #138: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #138) | 9e 04 07 cd 3c 90 2d 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 26 9c 69 c2 fb a0 0a d4 c6 8a e3 3a 35 d9 72 | c4 6d dc 97 97 46 4f 49 45 f3 89 7c 26 93 32 59 | 0e 55 34 82 9b 12 80 e6 60 cd 9e 59 15 f7 7d 65 | 53 e2 d3 d8 c2 ed 2c ad 8a b3 a9 0f 4d 3e ac 86 | 1c 67 54 95 04 00 bf 86 4e 8b bf af 44 15 eb 62 | ea cc 94 5a 6b 1a 81 0f 38 cc a4 0b 8b 3e f7 1f | ed 1b ee bf 3c b7 b3 6b c3 78 66 29 1f dc 55 cd | cd 9e c4 55 82 0d 26 16 81 1d 3b 87 44 bb 54 ef | 02 0c 05 f7 04 a0 83 3c c1 fe 2c d3 4e 3d ca 62 | 71 e8 db ac f9 9d 90 a6 0d 1e d9 94 f5 c3 29 22 | f5 2c d8 67 db 54 e1 d3 df b5 df 85 0d 36 cf 0c | 0f 08 0d 38 84 31 cd 9b 35 a0 fd df e8 86 86 f3 | a8 84 f3 56 c8 9a eb 02 1a c2 37 30 b1 0d 51 72 | 6c ba 2c ab f4 fb 66 85 22 97 66 d7 6b a3 32 2b | 57 22 c0 38 a7 76 1b d3 ea e0 94 87 f8 5d 23 88 | 1d 92 5d 32 0c 98 0b 93 d1 e9 b6 e4 2e 67 5c f1 | 29 00 00 24 e6 24 a9 20 36 d0 44 65 2c ba 3d 80 | 21 f7 06 3f 8d eb de 66 e7 ca a9 01 80 86 00 a0 | 79 48 c1 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 af 88 b2 43 70 03 fc c5 39 dd 7b 65 | af e5 61 63 70 8d 5a 32 00 00 00 1c 00 00 40 05 | 84 c7 81 66 9c 3a cd fa d9 98 02 0d f2 5f b1 72 | 68 cd 62 b2 | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a276e0 | #138 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e 04 07 cd 3c 90 2d 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #138 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #138 | rejected packet: | 9e 04 07 cd 3c 90 2d 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #138: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.068 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1af10 | handling event EVENT_RETRANSMIT for parent state #131 | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #131 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #131 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49611.962263; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000847 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a276e0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #131 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 "road-eastnet-nonat-131" #131: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #131) | ad 34 7c 82 56 8e 42 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 46 e3 f8 a7 ca 79 f1 93 d8 0a 34 f9 91 ea 90 | 77 1f 83 03 4d 56 b1 a2 80 fd 5f 11 9a a9 0e 07 | 36 d2 ed 03 17 79 a3 f7 12 9f 05 ea 25 52 aa 39 | 69 97 15 3f 13 ff 62 78 88 a8 12 45 6d 5a 25 bd | 48 89 e9 ef 1f ad 28 87 00 42 ce a4 5f 7b 92 dc | 5d 1c f0 bb 25 31 dd e0 95 17 e2 9c e6 0b 50 26 | d7 14 f3 fe 1e d8 81 cc 32 fc 47 d4 65 1e 3b 75 | 32 54 1f 31 95 11 57 b2 4c 02 a6 33 ce 14 e9 e2 | e8 05 1b 1c cb 66 89 aa 6f 57 54 90 f2 c1 cf bd | a5 b3 7a c8 ef 67 d8 5e 26 3c 19 61 97 89 69 83 | 4b df 7e 44 0f 87 25 bc 6c 4f d8 49 5f 35 7f 1f | 6e 25 45 69 17 ee 43 65 f2 ee f7 63 5d 98 79 9e | fc c9 a2 e1 68 04 58 49 4b 9f c5 76 64 08 49 29 | 17 3a 17 1d 87 31 e4 d7 77 de 85 c2 0a d4 26 0f | 9f f4 0b fc 3f 26 bf f9 03 95 99 d3 57 10 6f ed | 92 8e 36 88 87 df d0 52 c8 ab 1d e3 6f cc ae 49 | 29 00 00 24 3c 10 ae 50 61 d8 53 b3 d3 e2 21 42 | 85 3a 07 db 01 3a f5 3e 94 0e a7 09 dd b2 ae 2b | e1 07 91 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 36 c8 4a f5 a5 90 83 e4 ec b2 3e | 44 38 46 9b 6e 4b f9 11 00 00 00 1c 00 00 40 05 | 1e 37 ad 88 e1 0a 42 8f 3f c7 b2 8c f4 b1 3f 27 | c4 6f 80 e6 | libevent_free: release ptr-libevent@0x7fb3600180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1af10 | #131 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 34 7c 82 56 8e 42 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #131 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #131 | rejected packet: | ad 34 7c 82 56 8e 42 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #131: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #117 | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #117 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #117 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49611.965619; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002897 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1af10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #117 | libevent_malloc: new ptr-libevent@0x7fb3600180b0 size 128 "road-eastnet-nonat-117" #117: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #117) | 4a b5 59 cb ed d6 a3 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 62 d1 99 4b 20 24 18 5d d2 31 2a 1c e6 82 aa | d2 1a 74 70 f8 1e f2 71 00 48 0a 80 0d 91 e6 e0 | e0 7b 66 1e 0f a2 c5 f3 2e cc 8d 72 40 de 7d 14 | e0 b7 d4 a2 80 96 97 77 ac ba 2b fb 1f 79 f2 32 | 8b a5 84 65 3d e1 3e 2e 60 82 26 3f 6d cf 4b 43 | 84 0b 96 d0 d5 70 61 64 4c 71 e0 b1 63 e8 0c 82 | 17 82 85 c0 c3 eb d9 cf 4e b8 f4 b1 87 57 e5 c1 | 06 2a d8 41 87 ab aa ec 3f f6 5e ac 9b 45 ab a8 | 0b e4 13 8d 76 0c 8c 2b 1f d4 61 19 ad 16 37 d8 | d0 65 3e 14 53 34 26 1a a6 5e 31 57 79 20 50 43 | 71 29 f3 4a 86 68 0e 08 74 59 1e 0f 6e 37 0c 10 | b2 e1 5f 52 67 c2 35 e3 ff 31 9d c5 bb 7f 45 96 | 61 58 38 40 0e b5 86 40 8f 24 ab 5a 52 cc 83 a1 | 23 61 7d 29 78 a8 96 57 13 15 75 48 5f 5a 5b 21 | 7b dd 4e 50 1d 23 67 01 84 5f f8 e7 69 4f 16 1a | 7e b5 9f 38 da 45 67 22 75 50 ab b6 62 cc cb 76 | 29 00 00 24 c3 7a 28 6c 12 59 4b e7 9f 08 e5 89 | 61 e9 dd c1 64 c5 cd 33 70 a1 b8 fb a5 4b b4 8c | 0b 78 ad a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 90 26 e7 b8 63 3c dc 5c 03 43 0c | 57 b3 5f a9 02 48 0a b5 00 00 00 1c 00 00 40 05 | 75 50 aa 52 d7 4b 1d bd 0c f6 2a 37 d5 af e8 8d | 12 a0 66 45 | libevent_free: release ptr-libevent@0x7fb36402a780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #117 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a b5 59 cb ed d6 a3 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #117 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #117 | rejected packet: | 4a b5 59 cb ed d6 a3 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #117: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-146" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-146' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #146 at 0x557d46a9bcc0 | State DB: adding IKEv2 state #146 in UNDEFINED | pstats #146 ikev2.ike started | Message ID: init #146: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #146: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #146; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-146" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-146" IKE SA #146 "road-eastnet-nonat-146" "road-eastnet-nonat-146" #146: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-146 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-146": constructed local IKE proposals for road-eastnet-nonat-146 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 146 for state #146 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a81500 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #146 | libevent_malloc: new ptr-libevent@0x7fb36402a780 size 128 | #146 spent 0.189 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-146" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.29 milliseconds in whack | crypto helper 14 resuming | crypto helper 14 starting work-order 146 for state #146 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 146 | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 146 time elapsed 0.00118 seconds | (#146) spent 0.953 milliseconds in crypto helper computing work-order 146: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 146 for state #146 to event queue | scheduling resume sending helper answer for #146 | libevent_malloc: new ptr-libevent@0x7fb3700300e0 size 128 | crypto helper 14 waiting (nothing to do) | timer_event_cb: processing event@0x557d46a272b0 | handling event EVENT_RETRANSMIT for parent state #38 | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #38 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #38 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49611.970605; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006573 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a672d0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #38 | libevent_malloc: new ptr-libevent@0x7fb338012840 size 128 "road-eastnet-nonat-38" #38: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #38) | 63 6f 4b 9c a2 38 4b f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 c6 a0 5e 80 62 3e 9a 9c 42 e1 05 80 df 04 bf | 1e b5 eb a5 bb ef bc 82 8b e6 75 a7 2e 01 28 64 | e4 76 b9 2e 24 4c bf de dc 13 dd 2b 71 c5 93 43 | 1b 46 d4 7e b2 da 9a 48 5b 59 35 a7 05 07 a3 e4 | 2d c6 06 3d 04 99 06 6d e6 f3 82 a2 e0 b0 3d 7e | 06 24 2a d6 83 0e 98 7d 98 49 2f 5f ab 8e 6a a0 | d8 9e 97 9f 3a b5 0b 41 09 f4 3d 1d 01 c6 79 69 | 84 a4 53 1f bd 4e 48 87 76 0d 6e 5e db cc c6 9f | 32 ff 46 70 0d 72 cf 06 98 99 df 58 29 5b 2c 8c | fb 98 a9 76 0f 25 88 9a f5 19 cc e3 5c 2b 68 1d | 01 4d 25 7a f1 7a 21 df b2 8f 9c 28 7d d1 ec da | 1d aa a1 0e 2a 91 6c fc cd c9 76 e7 51 08 7a ff | e5 ff f8 19 fa 3a 8e cc 1e 84 49 b9 c5 19 d0 a9 | d3 37 e2 20 31 e7 32 dd 71 90 7c 76 34 4e 29 57 | 1e 56 51 56 0c 5f 17 75 67 40 80 dc 44 27 6b 9a | c7 16 b2 3b 68 69 4b 25 42 5f 6c bd 14 34 a0 fd | 29 00 00 24 11 36 0f 5e a0 00 74 be 57 cf e9 ad | 0b 41 64 75 76 be 45 9c 57 4a dd ea fc 94 1e c3 | 3b 87 2f 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b 5e 04 97 03 6e 1a 6a 1c 69 28 d2 | a2 f5 94 bd 95 4c fa 5e 00 00 00 1c 00 00 40 05 | aa 31 5d 54 cf 5a 81 b9 1b cd fe 19 22 77 54 6d | f5 50 1b 4f | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a272b0 | #38 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #146 | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 146 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #146 | **emit ISAKMP Message: | initiator cookie: | 44 6c 8c 11 77 9b c1 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-146 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5b e4 4b 01 63 76 c0 7a c8 2d 36 69 32 60 94 ea | ikev2 g^x 6d 55 57 2b 4e ff 0e 39 b8 87 ae 9d 5d a1 84 c3 | ikev2 g^x fd 7e 75 5e b5 db f9 c0 f2 b4 77 67 0c bc 83 d2 | ikev2 g^x b3 2c 18 7b 18 da 84 81 dc 1d 09 bc ef cb 96 0b | ikev2 g^x 54 3e 13 a5 2c e8 26 52 c4 b3 5b d7 9c b8 e6 22 | ikev2 g^x f7 8d 8e 88 21 d1 87 46 36 62 d4 63 42 41 4c 1f | ikev2 g^x 8f 43 21 27 b3 df 00 21 d1 8d 41 5a e5 9f 04 8b | ikev2 g^x ff c6 a4 97 a5 12 34 cb aa c2 51 13 9f 26 59 55 | ikev2 g^x a5 7b 2f 9e 53 52 08 32 a2 06 5f 18 aa a0 ac 8a | ikev2 g^x 4c 25 e1 2e cb 23 eb 05 33 52 1c b1 e7 32 06 d0 | ikev2 g^x 42 ed ad 95 48 c5 eb 3d 1a cb f5 6d dc 2f a2 a8 | ikev2 g^x 4e 15 75 28 ce 0c d4 fb 09 18 56 79 e6 17 c1 dd | ikev2 g^x e4 ed 35 be 6f e9 12 84 6e 1e 87 b9 38 ca fc f5 | ikev2 g^x d4 85 cf 4e a3 1f db 6c 1f e5 f2 54 ba 88 10 cb | ikev2 g^x 4e bc 46 9b 79 cb 0a 36 af 61 69 14 f8 97 5e 9d | ikev2 g^x 27 b8 f4 1b 36 1d 0b 8b f0 e7 f8 06 78 36 dc d7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 79 24 14 13 36 a3 2b 17 a4 40 30 01 57 eb a4 ff | IKEv2 nonce f9 15 14 cb 86 dc 31 a7 64 7c e3 06 ae fb 59 a2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 44 6c 8c 11 77 9b c1 c8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 92 | natd_hash: port= 01 f4 | natd_hash: hash= b9 46 87 8a 4c 47 2e ae ab e2 03 f4 cf 0f 35 fc | natd_hash: hash= df 03 af ad | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b9 46 87 8a 4c 47 2e ae ab e2 03 f4 cf 0f 35 fc | Notify data df 03 af ad | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 44 6c 8c 11 77 9b c1 c8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7f ed fa 9e 74 b9 38 c0 e7 89 49 8c f1 a3 30 c7 | natd_hash: hash= bc 00 44 f5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7f ed fa 9e 74 b9 38 c0 e7 89 49 8c f1 a3 30 c7 | Notify data bc 00 44 f5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #146 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #146: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #146 to 4294967295 after switching state | Message ID: IKE #146 skipping update_recv as MD is fake | Message ID: sent #146 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-146" #146: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.146:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #146) | 44 6c 8c 11 77 9b c1 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b e4 4b 01 63 76 c0 7a c8 2d 36 69 32 60 94 ea | 6d 55 57 2b 4e ff 0e 39 b8 87 ae 9d 5d a1 84 c3 | fd 7e 75 5e b5 db f9 c0 f2 b4 77 67 0c bc 83 d2 | b3 2c 18 7b 18 da 84 81 dc 1d 09 bc ef cb 96 0b | 54 3e 13 a5 2c e8 26 52 c4 b3 5b d7 9c b8 e6 22 | f7 8d 8e 88 21 d1 87 46 36 62 d4 63 42 41 4c 1f | 8f 43 21 27 b3 df 00 21 d1 8d 41 5a e5 9f 04 8b | ff c6 a4 97 a5 12 34 cb aa c2 51 13 9f 26 59 55 | a5 7b 2f 9e 53 52 08 32 a2 06 5f 18 aa a0 ac 8a | 4c 25 e1 2e cb 23 eb 05 33 52 1c b1 e7 32 06 d0 | 42 ed ad 95 48 c5 eb 3d 1a cb f5 6d dc 2f a2 a8 | 4e 15 75 28 ce 0c d4 fb 09 18 56 79 e6 17 c1 dd | e4 ed 35 be 6f e9 12 84 6e 1e 87 b9 38 ca fc f5 | d4 85 cf 4e a3 1f db 6c 1f e5 f2 54 ba 88 10 cb | 4e bc 46 9b 79 cb 0a 36 af 61 69 14 f8 97 5e 9d | 27 b8 f4 1b 36 1d 0b 8b f0 e7 f8 06 78 36 dc d7 | 29 00 00 24 79 24 14 13 36 a3 2b 17 a4 40 30 01 | 57 eb a4 ff f9 15 14 cb 86 dc 31 a7 64 7c e3 06 | ae fb 59 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 46 87 8a 4c 47 2e ae ab e2 03 f4 | cf 0f 35 fc df 03 af ad 00 00 00 1c 00 00 40 05 | 7f ed fa 9e 74 b9 38 c0 e7 89 49 8c f1 a3 30 c7 | bc 00 44 f5 | state #146 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36402a780 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a81500 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #146 | libevent_malloc: new ptr-libevent@0x7fb36402a780 size 128 | #146 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49611.971532 | resume sending helper answer for #146 suppresed complete_v2_state_transition() and stole MD | #146 spent 0.495 milliseconds in resume sending helper answer | stop processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3700300e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 6f 4b 9c a2 38 4b f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #38 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #38 | rejected packet: | 63 6f 4b 9c a2 38 4b f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #38: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0662 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 6c 8c 11 77 9b c1 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #146 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #146 | rejected packet: | 44 6c 8c 11 77 9b c1 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #146: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0554 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #139 | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #139 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #139 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49611.981818; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500971 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a67330 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #139 | libevent_malloc: new ptr-libevent@0x7fb3700300e0 size 128 "road-eastnet-nonat-139" #139: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #139) | 98 4d 89 18 32 14 8f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb bc f6 61 86 12 c3 bf 44 ad ab c8 f8 6d 1d 7a | 8e 0b a1 af 30 f0 3a 9c 0b 72 59 7b 0e cc 41 e5 | 8e 8e a0 7e 30 1e 50 82 23 bf b6 e1 69 ee be 0d | cc 36 07 e5 53 86 7d cf f5 63 8d 89 06 e8 7e 7e | 8f 2c 9d a8 ed 05 f6 a5 d3 42 db b5 95 59 0b 32 | 04 71 41 13 63 f9 4a 4c 42 0e 00 d5 c5 99 ba ab | 17 4c ce 49 6c 52 88 21 1f b3 2a 6c 8d cc 9d ad | 58 96 b7 c5 a6 44 e9 2c bb f7 31 ef f0 0b f9 1c | 1b 4e 21 f5 a2 ea 26 1f 03 aa b4 4e 34 e2 87 84 | cf 38 c7 5e ef db 85 1f 03 a7 73 48 68 be 7e b1 | 00 74 8f e9 65 a8 0b 8a 27 e7 a0 51 5b c9 e3 2d | 64 f7 22 1b 1e b7 6f af e1 0f 11 f6 9b 82 c4 de | 33 fe da 26 0e d7 f8 c3 43 49 4f e1 38 7e 8a 70 | 40 40 85 6b ea cf c0 b6 a0 c2 ac 2b eb 0c 58 ce | 0e cd 1f 9c 72 bb e0 55 da 15 7c 5d ad 4e 80 77 | d9 86 7e 35 e9 dd 73 d2 de c2 f2 ae 3e 6a 77 fd | 29 00 00 24 ce a2 61 71 0b 59 18 45 32 ff fc 20 | d2 f9 be 9d 52 e8 20 ba 16 46 42 c2 a8 74 a7 11 | 49 eb 52 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 5e 21 46 6e c2 25 7d 16 7d 1e 10 | d1 b7 00 9d a8 c1 7e fa 00 00 00 1c 00 00 40 05 | 95 96 61 58 5f 24 29 d9 13 26 c9 57 d8 b0 16 e2 | 35 e6 bc 7d | libevent_free: release ptr-libevent@0x7fb364017f20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #139 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 4d 89 18 32 14 8f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #139 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #139 | rejected packet: | 98 4d 89 18 32 14 8f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #139: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #93 | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #93 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #93 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49612.022112; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005755 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #93 | libevent_malloc: new ptr-libevent@0x7fb364017f20 size 128 "road-eastnet-nonat-93" #93: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #93) | 8f 2b 82 41 be 50 7f e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cd 43 20 82 ea 0d 92 4d b7 6f 10 e5 73 62 a1 74 | 5f 8b b1 bd e8 48 72 86 0f fc f7 f4 6d aa 74 9c | c6 32 cc 9c 2e 89 27 81 1a 44 1a e2 a0 dc ee ce | 11 9a 86 db b2 0d 84 8c a7 35 4b a3 54 44 ff a5 | 46 90 60 08 6b 0b b2 6e 30 fe 4a 71 80 d7 a0 82 | 42 f8 84 b3 d1 ca 25 4a c6 d4 78 a8 df 7e e5 c9 | 03 e0 84 12 8e f0 91 14 81 e1 1e 7d 14 d0 21 c6 | 0b a7 bd a5 91 4d 74 5f a5 49 fb 47 92 a4 f6 f2 | 46 b5 1e 26 6d f1 8f 2b 0f f1 aa b1 98 3a 25 3a | b5 d3 2a 4c bc bb 1d f8 fd dc 58 f3 d0 d8 1b 32 | 38 77 9b c8 3c 93 48 af 2e 17 ec f8 87 96 76 0f | 85 58 80 2d fe e0 ad 94 9a 85 9c 5e 26 2b ed 2c | f6 a6 2f 18 05 50 d7 9c 67 0d fc 1d 16 0d 73 cf | e1 da cd 32 28 a8 c7 82 3a 82 36 71 d2 89 fb 29 | 72 68 23 fe 3a 1e 23 55 bf ae 58 43 08 3b 0f b5 | 11 45 c9 10 6a 4c 49 3d 66 da 53 be f8 72 a4 ba | 29 00 00 24 38 5c 7f a9 1f f6 b2 d3 ed 46 5d a7 | 91 ec df cb c1 74 f9 14 df e8 fc 11 90 67 a3 a7 | 1e 7f 11 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c cc 1f b2 cd 2b 6c 7e 5b 50 dd 93 | 55 b1 e2 f6 27 0b bd 36 00 00 00 1c 00 00 40 05 | b6 37 a4 32 e9 5e 9f 19 d6 7a 97 0a 5b 76 69 49 | 01 0d 5c 45 | libevent_free: release ptr-libevent@0x7fb3600251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #93 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 2b 82 41 be 50 7f e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #93 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #93 | rejected packet: | 8f 2b 82 41 be 50 7f e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #93: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0655 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #132 | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #132 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #132 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49612.025455; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001245 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #132 | libevent_malloc: new ptr-libevent@0x7fb3600251c0 size 128 "road-eastnet-nonat-132" #132: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #132) | 8f fb fe 61 19 e1 9c b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 1f 4f d1 68 44 b0 da 10 cc a3 65 0b 05 29 46 | a5 ef 62 34 d2 17 30 f6 7e b7 1c 3d c0 61 fd c8 | 25 96 8a e1 67 57 19 a7 8f 6a aa 6e 4c 1e 1c bb | 2a 10 04 d7 17 65 58 ce 83 ac 91 4f 48 71 e3 8d | af 3f 22 d8 df 00 4a d4 1b df 76 a7 ad 26 ba ba | 91 be fb 08 a9 70 66 2f 99 bf ef e8 c6 21 cc c0 | ed 1d fb 20 f6 60 07 53 22 da 88 1b 1d 11 4a 37 | e6 c8 75 11 02 89 b4 55 ec 0c 8b 31 52 06 0f 18 | 81 e2 42 d3 fe 87 7f dc c5 02 18 bb 87 cb 91 7a | 01 aa 5e f6 49 fd e3 ed df 8b 65 4a 5d 0c dc 05 | 45 9e f7 6f 6c 11 d8 bd 19 75 3d 5b 55 32 77 3d | 44 4c 11 8d 32 50 da 6e 0a 86 ef 69 5f 2a bb 9d | b7 76 10 6b da 52 00 cf e9 de 40 71 fd 9c 21 a3 | 2a ac 7a 1a 3b 67 9b 88 e6 1e 25 7c 3a 6e 9c 54 | 4b 96 e9 1a 08 38 3b 3b 27 21 e9 0c 79 a6 d9 1c | 14 07 fc c1 42 9e 29 79 0d 68 f7 e2 3d 93 ce 38 | 29 00 00 24 92 fc 82 18 58 23 4b 06 62 ee b8 b2 | f1 d5 54 0c 3d b0 88 33 58 36 a6 39 d7 5f 04 ee | ca 34 01 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 e7 04 0b 0d 59 5a cd 8a 54 e3 8a | 4e 81 3b 76 de 25 c1 57 00 00 00 1c 00 00 40 05 | c3 b5 61 af 5d 2d 46 0f c8 2c 48 99 41 b8 6c e0 | 5b 12 cb e3 | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #132 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f fb fe 61 19 e1 9c b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #132 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #132 | rejected packet: | 8f fb fe 61 19 e1 9c b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #132: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a84000 | handling event EVENT_RETRANSMIT for parent state #118 | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #118 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #118 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49612.026828; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003083 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #118 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 "road-eastnet-nonat-118" #118: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #118) | 8e a7 a4 7e e9 0a bc a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a ec c5 01 c5 e9 b5 94 ac 43 67 db 08 47 bd 0c | 54 49 81 74 3a 3b f9 51 2c 6b 48 98 c1 d5 7c ee | 4b 95 1c 5e 71 e6 0b 08 a0 85 de c0 1d ef b9 d0 | 5c f8 32 2b 5d f8 44 47 b6 dc c5 4b 50 10 f9 77 | 99 80 83 bc 5c bf 6a 79 a5 41 39 97 c6 b0 17 4c | 84 d1 fa 16 7a 7a 3e e5 51 2d fc 5d b0 66 e1 6f | 66 c6 ed f3 a4 54 56 06 ac 5d ee b2 4b 4a 38 5f | aa 09 29 91 e5 8c 9b 64 60 8e 7c f6 86 7a 07 43 | f1 93 d1 26 4a 28 da b7 0c a1 1a 0c 4c d6 c5 1f | ee f5 92 b2 e4 15 93 35 4c 07 88 be ec 21 4e 23 | f9 ed 56 db b0 43 b1 c7 7d 57 a1 20 bb 88 d2 9a | 23 9e be ef e2 0d b6 dc 67 12 32 69 0b ef 17 5f | 45 8b bf 08 ff c1 84 fb d6 41 58 81 ba c4 68 e8 | 6d 5c 50 c4 fa 14 2d 1e b6 d3 3f da 53 ee 59 40 | e0 c2 e3 5e 46 f4 96 f5 35 c7 87 50 c6 81 32 4e | 30 f8 e6 fa a0 f5 a3 88 f0 51 68 02 71 eb f4 fa | 29 00 00 24 fc fa 6f 0b ed d7 fd 9b f1 eb 70 56 | 1f a0 0f 98 c6 28 ab da a8 c2 09 53 33 ea a7 33 | 5c 74 50 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e 87 94 32 ac f3 4e 0f e0 49 b5 2d | ec 68 6c 45 41 83 dc 40 00 00 00 1c 00 00 40 05 | e8 e9 7b b7 56 9d 8b dd 59 77 e6 95 c2 ea 88 7c | d5 64 a3 dc | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a84000 | #118 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e a7 a4 7e e9 0a bc a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #118 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #118 | rejected packet: | 8e a7 a4 7e e9 0a bc a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #118: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-147" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-147' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #147 at 0x557d46a9d280 | State DB: adding IKEv2 state #147 in UNDEFINED | pstats #147 ikev2.ike started | Message ID: init #147: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #147: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #147; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-147" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-147" IKE SA #147 "road-eastnet-nonat-147" "road-eastnet-nonat-147" #147: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-147 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-147": constructed local IKE proposals for road-eastnet-nonat-147 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 147 for state #147 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a84000 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #147 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 | #147 spent 0.128 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 resuming | RESET processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 starting work-order 147 for state #147 | RESET processing: connection "road-eastnet-nonat-147" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 147 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.219 milliseconds in whack | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 147 time elapsed 0.000854 seconds | (#147) spent 0.849 milliseconds in crypto helper computing work-order 147: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 147 for state #147 to event queue | scheduling resume sending helper answer for #147 | libevent_malloc: new ptr-libevent@0x7fb37402ff60 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #147 | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 147 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #147 | **emit ISAKMP Message: | initiator cookie: | c9 49 59 84 c8 e5 a9 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-147 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 55 23 1f ef d0 ab 86 83 db 3a 42 1d 72 53 7f 1d | ikev2 g^x 10 99 05 4a 99 4f 3f 9a 98 88 bd df 90 bb 6b e6 | ikev2 g^x 5a 0a ce 6c 41 04 da 58 5d c4 4f ac da 97 26 a7 | ikev2 g^x 11 32 a8 06 1f e1 87 a2 42 1e e6 6a 0c 68 08 40 | ikev2 g^x f5 b9 1e 41 1b cf 5c 75 a8 60 06 b2 5f cf d9 87 | ikev2 g^x 6b e4 af 8e 02 f2 fa 22 10 06 d6 15 19 bb fa f0 | ikev2 g^x 66 24 d5 79 4a bf 96 b3 63 ad e6 0f 0b 5c f6 47 | ikev2 g^x 01 64 bd d8 46 3f e5 ea a4 26 5d e5 06 c2 a7 0f | ikev2 g^x 35 e2 b0 0a 2c 32 20 be 52 14 9d b5 0e ec 56 cf | ikev2 g^x b3 f0 bf 5e 01 73 a8 04 a0 e0 5c 8a fe 29 b1 7f | ikev2 g^x 37 66 a5 5b ec c8 06 fb 07 01 0f 4c 5e 63 33 d2 | ikev2 g^x 2f d4 5c 61 3e 3f 82 73 d1 fb c8 86 80 bb eb c9 | ikev2 g^x 28 2b cc 48 8d 11 24 24 01 fe 7a 40 83 2b 75 31 | ikev2 g^x d3 44 40 97 d2 ba 07 04 c5 0b 99 12 41 24 f8 ad | ikev2 g^x ae 7e f2 a1 cb 5b d9 cd e9 53 59 dd 6f dc 6a 90 | ikev2 g^x 39 c5 d7 b8 42 59 e8 06 c8 85 08 f1 c6 2d 85 3e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 56 cc b0 4f af 68 49 01 85 6b 57 3a 2e bf 2e 45 | IKEv2 nonce 7c 71 09 75 a1 1e fe 83 ec 88 f6 fe d7 b8 8a 0f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c9 49 59 84 c8 e5 a9 fc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 93 | natd_hash: port= 01 f4 | natd_hash: hash= dd 3a 80 78 a8 ce 4e 37 f2 7e 4e 6e c2 ec 51 b5 | natd_hash: hash= d8 d3 ef c5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dd 3a 80 78 a8 ce 4e 37 f2 7e 4e 6e c2 ec 51 b5 | Notify data d8 d3 ef c5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c9 49 59 84 c8 e5 a9 fc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 80 dd aa b7 d6 9c 8d 45 3b 70 75 ca 6b f3 11 7a | natd_hash: hash= 54 5b 54 8d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 80 dd aa b7 d6 9c 8d 45 3b 70 75 ca 6b f3 11 7a | Notify data 54 5b 54 8d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #147 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #147: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #147 to 4294967295 after switching state | Message ID: IKE #147 skipping update_recv as MD is fake | Message ID: sent #147 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-147" #147: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.147:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #147) | c9 49 59 84 c8 e5 a9 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 23 1f ef d0 ab 86 83 db 3a 42 1d 72 53 7f 1d | 10 99 05 4a 99 4f 3f 9a 98 88 bd df 90 bb 6b e6 | 5a 0a ce 6c 41 04 da 58 5d c4 4f ac da 97 26 a7 | 11 32 a8 06 1f e1 87 a2 42 1e e6 6a 0c 68 08 40 | f5 b9 1e 41 1b cf 5c 75 a8 60 06 b2 5f cf d9 87 | 6b e4 af 8e 02 f2 fa 22 10 06 d6 15 19 bb fa f0 | 66 24 d5 79 4a bf 96 b3 63 ad e6 0f 0b 5c f6 47 | 01 64 bd d8 46 3f e5 ea a4 26 5d e5 06 c2 a7 0f | 35 e2 b0 0a 2c 32 20 be 52 14 9d b5 0e ec 56 cf | b3 f0 bf 5e 01 73 a8 04 a0 e0 5c 8a fe 29 b1 7f | 37 66 a5 5b ec c8 06 fb 07 01 0f 4c 5e 63 33 d2 | 2f d4 5c 61 3e 3f 82 73 d1 fb c8 86 80 bb eb c9 | 28 2b cc 48 8d 11 24 24 01 fe 7a 40 83 2b 75 31 | d3 44 40 97 d2 ba 07 04 c5 0b 99 12 41 24 f8 ad | ae 7e f2 a1 cb 5b d9 cd e9 53 59 dd 6f dc 6a 90 | 39 c5 d7 b8 42 59 e8 06 c8 85 08 f1 c6 2d 85 3e | 29 00 00 24 56 cc b0 4f af 68 49 01 85 6b 57 3a | 2e bf 2e 45 7c 71 09 75 a1 1e fe 83 ec 88 f6 fe | d7 b8 8a 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 3a 80 78 a8 ce 4e 37 f2 7e 4e 6e | c2 ec 51 b5 d8 d3 ef c5 00 00 00 1c 00 00 40 05 | 80 dd aa b7 d6 9c 8d 45 3b 70 75 ca 6b f3 11 7a | 54 5b 54 8d | state #147 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a84000 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #147 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 | #147 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49612.035158 | resume sending helper answer for #147 suppresed complete_v2_state_transition() and stole MD | #147 spent 0.556 milliseconds in resume sending helper answer | stop processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37402ff60 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c9 49 59 84 c8 e5 a9 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #147 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #147 | rejected packet: | c9 49 59 84 c8 e5 a9 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #147: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.047 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a82ac0 | handling event EVENT_RETRANSMIT for parent state #140 | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #140 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #140 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49612.045381; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.49999 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a67370 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #140 | libevent_malloc: new ptr-libevent@0x7fb37402ff60 size 128 "road-eastnet-nonat-140" #140: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #140) | 7b af c7 ac 06 7e 5a 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 03 39 d2 09 32 a1 ff 81 2d 15 dc 96 08 01 c1 | 8e 0a 6e 33 a6 3e 74 05 5c 15 33 12 1d f7 12 20 | db f5 3e 24 ba 17 01 dc a0 95 5b 2c 7b 77 c2 3e | 02 67 33 d7 d6 86 dc 63 50 16 65 87 a1 a9 2b c2 | 68 87 45 fa 03 db 21 3c 23 cd d5 14 5d 40 bf 10 | 6f 14 34 95 51 53 c7 d5 77 b9 67 66 94 9a cd 21 | 08 bb de 59 ba ca 48 d5 21 97 e5 28 87 2d fd 83 | d2 62 24 c7 7c f8 ac 68 7a f8 c3 7f 7d 8d 72 d0 | 9d 64 ef 67 4b f1 5c 24 57 ca c2 b1 9f b6 11 d3 | 07 3e 55 51 fc 73 7a 83 2c 11 87 97 33 3d 5c cd | 48 68 02 58 27 c2 fe 9a f6 51 01 87 b5 32 4d fc | 09 2c 09 a0 1f 82 25 e8 47 96 80 8e 9d 80 b5 a7 | 86 8d 11 ad 04 69 30 3a 7c 49 92 c3 9e 7f 81 14 | 42 d8 62 ef 10 0a 21 b2 bb b9 42 01 9c 86 19 33 | dd 9b 24 b9 8a d5 68 9d ee 00 85 c1 cc df b7 34 | d9 c8 e4 31 8c bd d3 67 7d ad 51 86 db 69 96 5d | 29 00 00 24 f8 43 b0 82 a0 04 df 35 49 ed 46 83 | 05 44 45 f4 4f f6 f3 e1 63 59 5a aa 3f 59 d1 20 | a6 81 b5 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a 8e a2 d1 63 df 73 41 77 f0 6a b9 | 17 c7 13 b6 69 6d 12 29 00 00 00 1c 00 00 40 05 | a8 9c d4 0d d7 3c af a8 56 f5 ab f4 4f 7a 90 fd | 96 a4 e3 47 | libevent_free: release ptr-libevent@0x7fb3780251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a82ac0 | #140 spent 0.0971 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7b af c7 ac 06 7e 5a 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #140 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #140 | rejected packet: | 7b af c7 ac 06 7e 5a 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #140: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a32290 | handling event EVENT_RETRANSMIT for parent state #39 | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #39 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #39 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49612.049652; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004361 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a82ac0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #39 | libevent_malloc: new ptr-libevent@0x7fb3780251c0 size 128 "road-eastnet-nonat-39" #39: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #39) | 19 fb 2f c4 ac 44 fb 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e b1 09 86 9c 45 db 95 7b d2 00 66 c6 50 ec 38 | 85 24 bf d9 80 0e ac 2e 4c 6c 22 df ca 10 97 2e | 3e b3 c6 bc af 43 d2 f1 96 a9 4b 69 aa cd 6c e0 | 9b a6 4b b2 87 0e 1c ca 32 4c 46 ee 52 f9 70 fd | fe 31 27 8d 61 a4 9c 97 7a a3 30 46 a8 d5 6f 83 | a7 6a c3 e9 ff 23 17 48 fe 4f dd cf 4e a9 a1 5e | d7 78 c0 fe 7d d7 62 84 4a b2 9d ae 37 bc ab ed | d5 8c 32 96 61 41 3f 21 7c ca ab 28 b6 ad 04 a3 | c6 dc bc c3 e1 13 16 74 7a 42 5b e7 e2 a2 c1 8c | b7 73 45 24 dc 37 dd 6b f2 55 c7 4f 97 81 79 6f | 14 cb 11 1e b4 40 01 19 cd a9 dd 29 3f 6f e4 ee | 95 68 2f 56 df 0a 08 86 e6 cd 7f a3 7b 00 61 f4 | c5 7c bb 03 05 36 7a 30 d5 36 53 38 4c f8 39 18 | 08 9c f5 06 b6 85 f9 e9 1b ab 6e 6e 92 66 b2 2b | 43 5a 44 5b 6f f1 98 dd 01 3a 01 23 5e f7 bc 7d | 6e f5 05 b9 ec 45 1c 8c 77 33 f8 a3 1c 1e 8c 99 | 29 00 00 24 2f 9c d8 9a 10 ed a2 18 bd 6a 97 cb | 42 26 f8 54 76 a0 4d 6e 60 6c fb c1 ce 0f 53 f0 | 1f 6b 99 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 74 e0 c5 89 b2 32 b1 7d 7b 02 d3 | e0 e6 47 82 80 6f 9f 55 00 00 00 1c 00 00 40 05 | 2e a2 7a f5 ee f4 77 35 9e db 48 5d 65 9b e7 f5 | e4 1e af e9 | libevent_free: release ptr-libevent@0x7fb37c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a32290 | #39 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 19 fb 2f c4 ac 44 fb 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #39 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #39 | rejected packet: | 19 fb 2f c4 ac 44 fb 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #39: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46950 | handling event EVENT_RETRANSMIT for parent state #119 | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #119 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #119 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49612.086912; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002585 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a32290 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #119 | libevent_malloc: new ptr-libevent@0x7fb37c009640 size 128 "road-eastnet-nonat-119" #119: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #119) | ec af 1e 58 4f bc 16 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee 25 46 13 3c ef fe 01 ba 63 b1 50 ca a7 dd f5 | 7a b0 49 43 35 e3 74 57 d0 52 bc 3a b2 ee 6b 2d | 57 80 2f df 71 ea 94 b3 0a 0c 7b 41 50 c2 f6 7a | 6e 96 5b 3d 0d 51 9a 0b a0 fa d0 8d d8 98 f0 45 | d5 fa eb 0a f5 ea 33 8d ee 1d 3f cb 09 35 dc f7 | 0d a7 89 25 f9 a6 f9 a3 0f 9a 3d b0 bb 98 db 2a | 8f f4 ad 7f 6a ae b3 bd df 23 e8 8d 52 72 79 9f | 3d 34 85 f2 e2 b4 d7 cc 39 ee a0 dc 64 4f fa 2a | a9 30 c6 c2 7a 7a 1d cd 26 c0 0f 55 58 ed 9d 22 | c6 a1 9c 81 01 bd 16 3d 36 47 70 a1 46 0d 07 ca | 5c 2f 9d 3c 24 d8 e7 19 57 44 18 a0 58 ed b0 c8 | 65 f2 98 6e 64 04 01 87 4d c3 6e 78 76 c5 fa ee | ff 60 94 9e 6a fc 5b 5e 1a 15 3a a6 4d fe ba 28 | 39 70 2d 49 9e b7 11 89 3d 89 a8 26 59 f3 51 ef | 05 36 27 99 84 62 16 13 24 49 d2 7d b9 18 a2 21 | 0f 0d 2a 9a 79 02 d0 e1 a1 af ee 7c 84 e5 76 9a | 29 00 00 24 93 ff 34 01 41 de 6e 58 b7 82 d5 c2 | 8a 60 ef 17 fc 48 d2 4e 23 80 6e 54 cf 7a 62 03 | 64 73 a8 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 43 1b c4 4b b2 17 2e 38 4e 57 6d | 6b 77 1d 82 1a c2 9c 87 00 00 00 1c 00 00 40 05 | f7 09 55 f2 00 b0 ce 9f d1 9c 54 d7 51 50 ae 6b | e8 b4 0e d9 | libevent_free: release ptr-libevent@0x7fb3580180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46950 | #119 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec af 1e 58 4f bc 16 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #119 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #119 | rejected packet: | ec af 1e 58 4f bc 16 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #119: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a60690 | handling event EVENT_RETRANSMIT for parent state #133 | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #133 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #133 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49612.089253; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001605 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46950 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #133 | libevent_malloc: new ptr-libevent@0x7fb3580180b0 size 128 "road-eastnet-nonat-133" #133: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #133) | 93 2c 91 72 20 8c aa 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c d8 f9 2c 2b a0 b1 31 57 35 e0 04 75 fa ff 27 | 53 64 2e 54 ea 38 e0 ef 52 11 3d 36 64 b6 af 29 | 51 f7 3a cb 03 fb a8 9c 8c 4c bb 74 63 76 7d d1 | a9 88 c4 5e 87 dd 7f 20 3b 30 84 84 16 86 c9 65 | d1 47 a8 28 8d 73 90 06 c4 7f 57 27 02 dd dc 34 | 3e 36 07 bc f4 b2 13 c9 ca 56 ee e3 b6 fc 0e 46 | 17 c4 47 02 3c 22 35 e8 99 a1 3a f2 88 57 e2 b2 | 76 46 aa bb c5 86 a7 a3 5d df 02 48 a4 96 00 22 | 34 1a 70 44 11 10 cb ff f2 1d 21 21 00 41 5a a7 | a1 5f 54 12 46 7f 51 02 26 94 4f 54 f8 0e be ce | 2f 5a 2b 9b 25 dc a0 31 41 2a dd d5 76 31 f7 83 | c2 70 58 eb 31 ba 5b 36 57 70 32 a0 20 3d ec e9 | 48 52 21 d4 39 1a 79 f6 31 e1 9a c8 d2 b3 fd 12 | 8c 10 74 fe 54 6f eb b1 c3 58 8e 49 2a 38 98 47 | 38 39 a8 64 1a 71 f1 c2 47 f8 d0 db da e6 75 10 | 1b a2 b7 e4 c4 eb b7 43 ca b9 9e 23 21 75 e9 b6 | 29 00 00 24 2f d1 c4 74 6b fd 49 84 52 1d 9d 1d | ec af 19 02 47 e5 8f b7 c6 73 48 d2 a9 91 58 b2 | b6 74 d3 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 b3 b4 a5 c4 da 26 36 c8 2a e5 e1 | 3e af ad 98 58 9a bf c4 00 00 00 1c 00 00 40 05 | 31 45 bd 61 73 08 cb 41 73 c4 72 6c eb e0 15 88 | 84 49 78 a3 | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a60690 | #133 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 93 2c 91 72 20 8c aa 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #133 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #133 | rejected packet: | 93 2c 91 72 20 8c aa 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #133: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-148" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-148' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #148 at 0x557d46a9e840 | State DB: adding IKEv2 state #148 in UNDEFINED | pstats #148 ikev2.ike started | Message ID: init #148: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #148: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #148; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-148" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-148" IKE SA #148 "road-eastnet-nonat-148" "road-eastnet-nonat-148" #148: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-148 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-148": constructed local IKE proposals for road-eastnet-nonat-148 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 148 for state #148 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a60690 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #148 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 | crypto helper 19 resuming | #148 spent 0.157 milliseconds in ikev2_parent_outI1() | crypto helper 19 starting work-order 148 for state #148 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 148 | RESET processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-148" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.25 milliseconds in whack | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 148 time elapsed 0.000981 seconds | (#148) spent 0.983 milliseconds in crypto helper computing work-order 148: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 148 for state #148 to event queue | scheduling resume sending helper answer for #148 | libevent_malloc: new ptr-libevent@0x7fb3680300e0 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #148 | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 148 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #148 | **emit ISAKMP Message: | initiator cookie: | 7c 0d 88 21 0c f2 96 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-148 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fa 04 bc 64 c4 a9 25 09 2d 75 95 3b 11 b4 ff 15 | ikev2 g^x 97 7a 18 93 a6 88 e9 2c b9 6a 56 2f 0c f9 8a d8 | ikev2 g^x e8 e9 8c f3 6e a2 1a 4d de 32 b3 62 b7 1f cf 21 | ikev2 g^x 58 10 7d f4 24 b5 81 70 c7 68 14 37 9d fd 00 6b | ikev2 g^x b4 bb f2 40 cc b3 6b 23 df e5 3d 42 b5 d1 d7 42 | ikev2 g^x c0 5c ac 6a f7 66 60 50 9f bf be d5 78 f9 b4 31 | ikev2 g^x b1 86 de 30 ed 54 6a fc f4 65 4d b6 71 b3 0e 10 | ikev2 g^x 8b ff f6 ba 06 b3 35 4f f4 27 dc 02 7d 26 88 9b | ikev2 g^x ce 4c 6b f4 f0 e1 8d 43 1e f3 4c 5f ec 71 b9 2c | ikev2 g^x e9 3b 85 fd 08 23 e1 df 81 46 1d 11 72 44 8f d9 | ikev2 g^x 74 89 1c 9f d5 79 90 5f cf 86 54 f4 23 c9 c4 31 | ikev2 g^x af 2e 84 a4 ff ec cf b7 ba 60 46 0a 15 eb 88 9e | ikev2 g^x 1a 9f 61 a8 80 c2 60 68 d5 be 6e 09 41 6f c1 fc | ikev2 g^x 1b 37 54 8c 93 b5 3d fd bd 96 aa 9b bc 05 8d 2f | ikev2 g^x 00 4c 54 bb 3b 96 94 4f 45 ac 6c 6e b1 21 ad e3 | ikev2 g^x 8b d3 f2 47 fe 35 bf 98 09 a6 a6 c8 c9 12 c2 70 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b1 81 e7 c9 15 f6 0b 96 d5 74 cc 65 51 5c df 58 | IKEv2 nonce 13 0b 15 8c 15 4d e2 64 8b 9f d6 7a 91 6a aa 5f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7c 0d 88 21 0c f2 96 55 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 94 | natd_hash: port= 01 f4 | natd_hash: hash= e5 56 10 9c c6 bc 82 78 34 d0 03 57 7a d1 bd 45 | natd_hash: hash= e3 1a b3 5c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e5 56 10 9c c6 bc 82 78 34 d0 03 57 7a d1 bd 45 | Notify data e3 1a b3 5c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7c 0d 88 21 0c f2 96 55 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 74 be 93 cb aa 1f 0e 04 cc 93 49 b7 b1 e0 d6 3d | natd_hash: hash= b3 9a 6d 48 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 74 be 93 cb aa 1f 0e 04 cc 93 49 b7 b1 e0 d6 3d | Notify data b3 9a 6d 48 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #148 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #148: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #148 to 4294967295 after switching state | Message ID: IKE #148 skipping update_recv as MD is fake | Message ID: sent #148 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-148" #148: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.148:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #148) | 7c 0d 88 21 0c f2 96 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 04 bc 64 c4 a9 25 09 2d 75 95 3b 11 b4 ff 15 | 97 7a 18 93 a6 88 e9 2c b9 6a 56 2f 0c f9 8a d8 | e8 e9 8c f3 6e a2 1a 4d de 32 b3 62 b7 1f cf 21 | 58 10 7d f4 24 b5 81 70 c7 68 14 37 9d fd 00 6b | b4 bb f2 40 cc b3 6b 23 df e5 3d 42 b5 d1 d7 42 | c0 5c ac 6a f7 66 60 50 9f bf be d5 78 f9 b4 31 | b1 86 de 30 ed 54 6a fc f4 65 4d b6 71 b3 0e 10 | 8b ff f6 ba 06 b3 35 4f f4 27 dc 02 7d 26 88 9b | ce 4c 6b f4 f0 e1 8d 43 1e f3 4c 5f ec 71 b9 2c | e9 3b 85 fd 08 23 e1 df 81 46 1d 11 72 44 8f d9 | 74 89 1c 9f d5 79 90 5f cf 86 54 f4 23 c9 c4 31 | af 2e 84 a4 ff ec cf b7 ba 60 46 0a 15 eb 88 9e | 1a 9f 61 a8 80 c2 60 68 d5 be 6e 09 41 6f c1 fc | 1b 37 54 8c 93 b5 3d fd bd 96 aa 9b bc 05 8d 2f | 00 4c 54 bb 3b 96 94 4f 45 ac 6c 6e b1 21 ad e3 | 8b d3 f2 47 fe 35 bf 98 09 a6 a6 c8 c9 12 c2 70 | 29 00 00 24 b1 81 e7 c9 15 f6 0b 96 d5 74 cc 65 | 51 5c df 58 13 0b 15 8c 15 4d e2 64 8b 9f d6 7a | 91 6a aa 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 56 10 9c c6 bc 82 78 34 d0 03 57 | 7a d1 bd 45 e3 1a b3 5c 00 00 00 1c 00 00 40 05 | 74 be 93 cb aa 1f 0e 04 cc 93 49 b7 b1 e0 d6 3d | b3 9a 6d 48 | state #148 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a60690 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a60690 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #148 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 | #148 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49612.09751 | resume sending helper answer for #148 suppresed complete_v2_state_transition() and stole MD | #148 spent 0.436 milliseconds in resume sending helper answer | stop processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3680300e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 0d 88 21 0c f2 96 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #148 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #148 | rejected packet: | 7c 0d 88 21 0c f2 96 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #148: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cc10 | handling event EVENT_RETRANSMIT for parent state #141 | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #141 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #141 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49612.10871; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500984 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a272b0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #141 | libevent_malloc: new ptr-libevent@0x7fb3680300e0 size 128 "road-eastnet-nonat-141" #141: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #141) | c7 a4 5e d6 85 96 e8 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 5c 64 85 22 7f 26 67 9b 1d d2 dc 77 48 35 3a | d4 3f ae a5 de d9 02 e1 be b1 54 1d 8f 3c 81 66 | 72 af 44 35 86 52 1f 94 d8 67 4f d5 3d aa 9a 28 | b8 7d b2 44 cd ad e4 36 73 fc b7 ff a8 f3 fa 52 | bc bb ec ae b0 14 24 28 e8 98 61 c7 6e 10 46 be | 9e 1b d1 62 7d 6b 63 8d 57 98 39 e0 7a 2b d7 fb | 08 85 91 84 64 96 ca 9e 7d d6 44 71 24 e2 7b d9 | 4e df 37 ef 69 35 3e bf d9 e6 0c fe 44 26 04 4e | f0 05 82 74 b2 9b 24 5e e9 a2 22 8d 25 f4 83 56 | 66 7a 36 9b c2 83 bb 7e 03 9c 77 3b 87 eb 41 c7 | 94 78 c3 88 92 ee d7 85 b7 c9 76 9d e6 b0 56 99 | 3c 23 e2 55 4e f4 22 8d 17 30 9c c5 cd a0 fa a5 | 54 c0 8e f4 5a 2c 24 46 f9 7c 1e 86 1f 7b 3c ed | d6 ba ae a7 70 a2 9b 24 e8 02 bd 30 c2 66 66 44 | 25 e0 d1 5b fc c6 60 e2 9a 7f 9c 7f d3 c2 d2 0d | 71 6b ce d7 9c d1 77 52 aa 1f 4c 8a aa 84 99 be | 29 00 00 24 77 e9 14 43 da cb a0 62 0a e5 af ee | ca 47 6a 87 48 66 6e 70 1f 90 c9 e8 b5 aa eb 33 | 74 97 4a b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 5f b0 2c dc 05 ab ba 7d 8f a9 67 | 57 cd cc b4 50 46 52 bd 00 00 00 1c 00 00 40 05 | 25 fc 66 29 f4 e3 aa bf a8 61 5f 67 dd d5 39 f5 | bb 8c 0c c1 | libevent_free: release ptr-libevent@0x7fb3780180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cc10 | #141 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 a4 5e d6 85 96 e8 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #141 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #141 | rejected packet: | c7 a4 5e d6 85 96 e8 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #141: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.049 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e05a0 | handling event EVENT_RETRANSMIT for parent state #94 | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #94 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #94 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49612.115008; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004362 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #94 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 "road-eastnet-nonat-94" #94: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #94) | c4 af dc f4 22 ca 1a 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b8 0d 8e 0d 24 fa 48 9f 6f 70 45 44 af 29 03 81 | fb 75 7f 29 b1 65 5b 6b f3 dc dc e0 d1 ea 65 d0 | 45 a3 5f 01 d6 e7 51 37 b4 25 82 eb 71 98 d8 b2 | 75 57 7a 0e db af 40 2b 1a 10 c2 e4 b7 7e 18 39 | 54 3c 4a ec 4d d5 3a 2e ab bd e0 80 1e 0f e2 b5 | e4 a9 bf ef 3b ba fe af b1 7b cb 8a 16 e9 8c 65 | 20 92 b8 a2 66 75 85 84 5a e4 4c c5 4e 4c dd 10 | 51 c2 7a 85 78 58 a1 10 d6 cf c5 6b e8 22 f2 d1 | 41 df 6b 5c 73 f6 87 2e 17 45 1b 75 b8 bd 3d 9e | d2 3e d8 cd d1 d8 9e 58 23 f3 68 0b e1 b8 89 69 | 76 b7 7e 92 6a 4a 5b 2c 36 99 61 9d bb 09 19 68 | e0 83 4b 97 a3 48 26 96 74 a7 da 5f 7d b7 55 9e | e3 e8 68 32 6b 6e 35 3d 26 d7 4f 19 6d d6 44 17 | 3d 23 4c ff 1c ff e3 77 85 72 fa 85 64 76 2e ac | 5a 7b 31 bf 7b 44 eb 9a f4 5c 9d 72 ec 95 e5 4e | fc 10 63 57 5f 09 74 f6 c6 17 bc 05 7d ea 5c 13 | 29 00 00 24 c5 77 30 ba 9e 22 45 4a 1a af ea 19 | 02 b6 fb 3a f7 c7 ff 86 e4 75 07 62 09 1a 17 15 | a7 99 2d 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d bd d3 d9 55 1d 16 4d 34 06 fd 91 | 92 b6 52 35 3e d3 c6 4f 00 00 00 1c 00 00 40 05 | 83 77 03 33 97 20 84 34 b1 e3 aa 6c 05 af 74 6e | f0 8d d0 a3 | libevent_free: release ptr-libevent@0x7fb3700180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e05a0 | #94 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469e5ca0 | handling event EVENT_RETRANSMIT for parent state #40 | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #40 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #40 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49612.115208; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004932 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #40 | libevent_malloc: new ptr-libevent@0x7fb3700180b0 size 128 "road-eastnet-nonat-40" #40: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #40) | f4 2d ea 23 2d fd 9f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 1a 9e 5c fb fb e3 3a 12 40 55 ea 02 66 64 cb | 69 42 9f 9e 73 38 34 f9 9b 29 99 d0 1f 2f 62 b0 | ff 78 90 10 b8 86 3f 49 a8 32 be f6 08 0d 11 29 | 94 2b 8b de b8 63 2c 35 79 92 00 39 68 56 d7 ad | 7e 9a a2 59 50 2b c4 f8 63 a3 0c 5d 5e 44 62 5b | fc 42 68 dd ca 56 4c 44 63 17 39 39 e0 00 1c 8f | c5 28 a6 4f 80 e9 f0 8c 5a ea 63 37 5f d7 0a a3 | b8 dc 6a fd 41 02 14 01 fa 2f 62 ae cb f1 1e 40 | 2f 20 1d 4c b4 7d c9 2c fa 60 f5 5e 61 26 a0 89 | b5 80 ba fe 31 f9 79 3e 12 33 cf 6c 99 9f 52 55 | 62 d6 02 f9 0e 35 e1 e7 8d 67 93 09 10 77 15 30 | 4a e9 d6 a0 31 50 fb be 13 05 50 dc f4 46 03 08 | 2f 95 1b 33 25 b1 ea 42 27 b1 8d 6c a6 26 e8 12 | 28 ee 49 16 a3 ec 76 ad 9e 1b cb d5 8a 26 5b 22 | 55 46 26 40 fb a4 30 9e 31 e9 07 5c 3b f7 53 4f | 4f ec 0e ee ad 7e 3f fc 05 9c b5 15 17 a2 62 3f | 29 00 00 24 28 3a b9 16 f5 d3 fa 3e 82 0e 6c a5 | b6 e0 32 27 f5 86 22 6d 8d 85 0f 17 f1 b4 a5 df | eb 51 66 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 e9 4b 4d 06 92 e2 ba cc 1d e9 b2 | 45 c8 92 47 34 22 29 80 00 00 00 1c 00 00 40 05 | 84 da 3f 80 5c a8 47 c1 08 aa 1f 48 69 9f 8f ac | 3e 3c 6c 93 | libevent_free: release ptr-libevent@0x7fb35001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e5ca0 | #40 spent 0.0841 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 af dc f4 22 ca 1a 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #94 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #94 | rejected packet: | c4 af dc f4 22 ca 1a 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #94: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 2d ea 23 2d fd 9f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #40 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #40 | rejected packet: | f4 2d ea 23 2d fd 9f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #40: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0383 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37000d120 | handling event EVENT_RETRANSMIT for parent state #134 | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #134 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #134 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49612.148491; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001009 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b50 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #134 | libevent_malloc: new ptr-libevent@0x7fb35001d920 size 128 "road-eastnet-nonat-134" #134: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #134) | 80 c9 f7 0f 34 43 e8 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 45 e5 b7 ab 0c a4 4c 5f b2 54 d8 39 c5 f7 ae | a7 a1 c9 5c 2b 5a 97 72 d3 14 80 31 3f b5 24 0d | cb 02 f5 57 a3 d0 5f 51 b9 29 93 ae b9 a3 6f 26 | d5 1f 2c 2d f7 c7 46 60 60 aa 8f 11 69 88 d5 d6 | 7f c3 44 3b 7a f5 6e 59 77 4f a4 43 34 c4 26 e5 | ae dc 49 7d 8b cd 2b ab 18 68 bd 39 90 28 6c 4a | 23 91 a3 0e 3f fb 01 de 41 7d 06 32 ac 44 1c 44 | 83 e0 6e 5a 17 ec 28 70 e3 9f 5e 65 cd d5 6a 13 | f4 b1 48 8a 51 f8 b7 54 21 1a 5d da c7 53 38 a4 | e5 03 02 af 81 ae 46 39 d4 15 23 f5 a8 b9 79 ca | ed 1c 97 81 a2 68 bb 3f 5d 13 76 91 c8 b3 35 4a | a1 e6 8f 6f 10 12 49 6f 3e bb 3b bc 07 2d 62 f9 | 63 5c f1 5a ec c4 50 49 e3 cf a2 cc 8f 61 b4 4c | 09 95 92 ca 4c 19 06 a3 80 ad 6b cf ef 46 70 41 | 9a 5d 9d 72 62 c3 a0 af ac b6 f0 ed e6 2e a4 c8 | 97 d4 46 3b dc 90 f1 11 ff c1 1a f7 bc 4d b4 b1 | 29 00 00 24 d7 88 26 03 5a 89 cf 88 bf 43 40 13 | b0 8c b4 f5 85 1c 5d f5 ed 6d ea f7 d0 1d 42 5d | 64 c8 0e 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 5d 43 f9 e4 68 67 0d 96 3e 2a d1 | 87 17 c9 81 16 11 d8 11 00 00 00 1c 00 00 40 05 | 17 79 69 7c c9 bf 1a b4 97 b1 98 46 4c 85 68 c7 | a4 36 11 6c | libevent_free: release ptr-libevent@0x7fb370012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37000d120 | #134 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 c9 f7 0f 34 43 e8 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #134 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #134 | rejected packet: | 80 c9 f7 0f 34 43 e8 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #134: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0674 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f4be0 | handling event EVENT_RETRANSMIT for parent state #120 | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #120 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #120 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49612.153843; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002405 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37000d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #120 | libevent_malloc: new ptr-libevent@0x7fb370012840 size 128 "road-eastnet-nonat-120" #120: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #120) | 87 fa a7 32 05 23 14 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec 6c 11 66 a6 95 d9 e6 e2 88 b9 98 2a 60 c1 38 | c4 e7 6d c7 8d 08 5f c7 b2 af 28 df 28 55 74 6b | 75 22 9e ab 67 eb 95 72 f6 3e 95 b3 15 85 4f d6 | c1 c3 2d 9e 07 29 16 41 13 5e bb cf c0 e6 4f 24 | 10 cc 57 fd 9c ba 63 ce ec 86 10 c7 d4 7c 34 a8 | a5 5b fd 1f 33 3b a2 f8 03 46 9a 66 74 53 5d 27 | bd d8 93 4e 14 8b 45 9a 6d ce b3 cb 29 f0 cc 6c | 0a 42 f4 3b 31 46 fc ae db a9 72 48 29 6a 06 1a | 3f 35 fb 97 be 23 c9 c4 df 59 9b d7 24 09 d8 73 | f7 9d 98 e5 b5 21 68 b6 e2 c9 13 2b 11 7a 73 1b | e9 35 93 72 82 45 b9 27 a7 9d a4 9d 09 5e 20 78 | 29 0e a5 bd 44 31 dd 75 00 a1 c2 9f 09 4f 24 eb | 16 42 da bf 3a 12 d4 84 33 67 7f 85 66 00 36 74 | 79 21 73 94 9b df b2 a9 01 30 1b db 75 7a 3d 46 | 6c 6c eb ca 16 ae 1a 85 9f eb e5 ef 46 e7 91 51 | ee 18 48 f1 20 6b 2b c6 77 fb 41 ba bd 6b 56 4e | 29 00 00 24 6f c3 ef a5 ff 17 51 3e dd e4 5e c3 | e4 15 2b 4d c5 b5 58 85 08 f4 21 f4 d7 43 b1 43 | 4c 64 51 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 47 24 d0 22 75 93 6e dd 7d f7 25 | 7b 0d 80 0a 15 3a a3 09 00 00 00 1c 00 00 40 05 | 8f c4 23 24 1b 0a 54 8e c8 2f b2 b8 ec 80 e9 f3 | ca 99 ed fd | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f4be0 | #120 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 fa a7 32 05 23 14 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #120 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #120 | rejected packet: | 87 fa a7 32 05 23 14 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #120: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0692 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-149" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-149' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #149 at 0x557d46a9fe00 | State DB: adding IKEv2 state #149 in UNDEFINED | pstats #149 ikev2.ike started | Message ID: init #149: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #149: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #149; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-149" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-149" IKE SA #149 "road-eastnet-nonat-149" "road-eastnet-nonat-149" #149: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-149 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-149": constructed local IKE proposals for road-eastnet-nonat-149 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 149 for state #149 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469f4be0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #149 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 | #149 spent 0.155 milliseconds in ikev2_parent_outI1() | crypto helper 6 resuming | crypto helper 6 starting work-order 149 for state #149 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 149 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 149 time elapsed 0.000987 seconds | (#149) spent 0.984 milliseconds in crypto helper computing work-order 149: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 149 for state #149 to event queue | scheduling resume sending helper answer for #149 | libevent_malloc: new ptr-libevent@0x7fb36c0300e0 size 128 | crypto helper 6 waiting (nothing to do) | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-149" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.263 milliseconds in whack | processing resume sending helper answer for #149 | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 149 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #149 | **emit ISAKMP Message: | initiator cookie: | ec 1b 62 37 44 a3 17 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-149 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3c 08 91 37 b8 3d c4 a5 fb 8f 59 2b cb c4 ee a3 | ikev2 g^x 59 01 01 81 cd 69 2d 85 93 60 f7 65 1f 64 aa eb | ikev2 g^x 93 60 17 84 59 2d ec 44 26 cf 20 fe db 7e d9 f6 | ikev2 g^x 7d a2 69 c3 4c ed d8 f3 0a 6b d4 5b e7 47 78 e3 | ikev2 g^x 80 3c 2c 01 cd d6 a8 65 7e cc 13 22 72 38 45 64 | ikev2 g^x 17 76 db 68 fd 9e 02 c1 4e e0 91 4f 14 0c 06 72 | ikev2 g^x 4e df 03 59 bc 72 4f af 9f 27 39 bd 57 c8 9d e1 | ikev2 g^x 90 f7 3b a1 d1 79 66 94 af 42 c3 62 cd d5 2d cd | ikev2 g^x ac 6c ea d6 94 1b f4 91 4d ad 49 21 48 4b 36 1c | ikev2 g^x 53 18 c6 23 73 5e 40 ed e6 7e 6a 25 d8 dd ef 07 | ikev2 g^x 7d 88 f4 a9 e1 ff e9 29 7d 10 cf 47 92 a2 72 35 | ikev2 g^x 95 c9 53 7e 8d f1 bb ba 54 1d 40 b5 a0 d1 1e d9 | ikev2 g^x 0b 86 d8 2d 01 1a 34 e1 77 f0 c8 57 84 a9 f4 dc | ikev2 g^x 35 1f 8e bc 5d f2 ca 58 ec a1 ad a9 cd 45 4a 2d | ikev2 g^x 23 38 26 ab df a9 05 75 cd 84 d4 66 7c be 9c f9 | ikev2 g^x 7f e7 96 6a 2b a4 d6 b4 04 50 ef ba e8 3c eb 60 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f6 11 7c 5d 38 85 36 80 dd ed f7 d5 65 1c 39 a3 | IKEv2 nonce 95 3d e4 a2 88 84 cf 2f 03 e4 0d 86 6f f9 18 2b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ec 1b 62 37 44 a3 17 93 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 95 | natd_hash: port= 01 f4 | natd_hash: hash= 1e 49 c3 fc 0d 4b 5b dd c8 8b e4 44 1a 6a 18 02 | natd_hash: hash= f4 d1 ea f3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1e 49 c3 fc 0d 4b 5b dd c8 8b e4 44 1a 6a 18 02 | Notify data f4 d1 ea f3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ec 1b 62 37 44 a3 17 93 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4e f4 0c 8d 48 4d 9f e4 0b 19 05 64 48 99 98 79 | natd_hash: hash= d2 ff 3d 6d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4e f4 0c 8d 48 4d 9f e4 0b 19 05 64 48 99 98 79 | Notify data d2 ff 3d 6d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #149 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #149: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #149 to 4294967295 after switching state | Message ID: IKE #149 skipping update_recv as MD is fake | Message ID: sent #149 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-149" #149: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.149:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #149) | ec 1b 62 37 44 a3 17 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 08 91 37 b8 3d c4 a5 fb 8f 59 2b cb c4 ee a3 | 59 01 01 81 cd 69 2d 85 93 60 f7 65 1f 64 aa eb | 93 60 17 84 59 2d ec 44 26 cf 20 fe db 7e d9 f6 | 7d a2 69 c3 4c ed d8 f3 0a 6b d4 5b e7 47 78 e3 | 80 3c 2c 01 cd d6 a8 65 7e cc 13 22 72 38 45 64 | 17 76 db 68 fd 9e 02 c1 4e e0 91 4f 14 0c 06 72 | 4e df 03 59 bc 72 4f af 9f 27 39 bd 57 c8 9d e1 | 90 f7 3b a1 d1 79 66 94 af 42 c3 62 cd d5 2d cd | ac 6c ea d6 94 1b f4 91 4d ad 49 21 48 4b 36 1c | 53 18 c6 23 73 5e 40 ed e6 7e 6a 25 d8 dd ef 07 | 7d 88 f4 a9 e1 ff e9 29 7d 10 cf 47 92 a2 72 35 | 95 c9 53 7e 8d f1 bb ba 54 1d 40 b5 a0 d1 1e d9 | 0b 86 d8 2d 01 1a 34 e1 77 f0 c8 57 84 a9 f4 dc | 35 1f 8e bc 5d f2 ca 58 ec a1 ad a9 cd 45 4a 2d | 23 38 26 ab df a9 05 75 cd 84 d4 66 7c be 9c f9 | 7f e7 96 6a 2b a4 d6 b4 04 50 ef ba e8 3c eb 60 | 29 00 00 24 f6 11 7c 5d 38 85 36 80 dd ed f7 d5 | 65 1c 39 a3 95 3d e4 a2 88 84 cf 2f 03 e4 0d 86 | 6f f9 18 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 49 c3 fc 0d 4b 5b dd c8 8b e4 44 | 1a 6a 18 02 f4 d1 ea f3 00 00 00 1c 00 00 40 05 | 4e f4 0c 8d 48 4d 9f e4 0b 19 05 64 48 99 98 79 | d2 ff 3d 6d | state #149 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469f4be0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e5ca0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #149 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 | #149 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49612.164709 | resume sending helper answer for #149 suppresed complete_v2_state_transition() and stole MD | #149 spent 0.469 milliseconds in resume sending helper answer | stop processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c0300e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 1b 62 37 44 a3 17 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #149 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #149 | rejected packet: | ec 1b 62 37 44 a3 17 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #149: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a74cd0 | handling event EVENT_RETRANSMIT for parent state #142 | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #142 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #142 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49612.170913; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.5012 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e05a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #142 | libevent_malloc: new ptr-libevent@0x7fb36c0300e0 size 128 "road-eastnet-nonat-142" #142: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #142) | 41 39 64 14 10 77 e9 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc f2 be 7b 98 10 67 76 c4 71 20 94 23 de f4 7b | f8 c4 af 24 ce 1c a4 2e 78 f9 2e 3f 92 4d 95 da | b0 24 e9 98 5b 94 79 3a a7 65 db 91 8d 98 6f 60 | 39 37 f9 9a 0b 2c 5f 0f 2f ab bc 06 c4 26 ad 3a | cb 21 02 45 52 b2 d1 fd f5 7c fc a1 d2 ea 0e b1 | ba 62 e9 1e b2 ad cc 0d 27 c3 3b 69 ca 23 50 32 | eb 22 0c cc d3 fb 5f db 9c 9b 31 50 db f4 03 47 | 71 96 ad b4 c6 fc 17 71 7e b3 b0 ab 55 4f e2 51 | da 27 48 0f fb 5a 5c 14 f2 9f a1 0b bc 57 8c f8 | af d3 b0 d4 6a 72 47 34 c3 ab 52 90 fc 49 ad 86 | 46 90 a0 10 2b fd 92 3d 6b 38 ac d2 f1 fb fa a7 | 40 39 9e cd 87 10 91 66 2e ab 47 10 a6 88 c0 52 | d8 c9 3f b4 b3 d0 6c 91 b2 0e 49 7c 2a dc 94 d8 | 21 4c c9 df 3c b1 a2 d4 d4 f0 4b 25 d9 08 87 46 | 22 c7 0a 5a cc 6c a2 0b 4a 09 99 09 fb f2 2e 33 | 66 ad 2f c0 16 9e 3c 6f 99 46 27 79 f7 75 88 d3 | 29 00 00 24 1d 1b 1c 65 cb f5 ff f0 c9 00 69 e9 | d1 b3 22 15 24 4a 7b cc a6 4c 2e 0b ef 42 21 b2 | d1 d6 06 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 3a fc 83 97 ab 17 41 58 12 a1 f9 | 48 2f 13 f0 7a 91 16 3d 00 00 00 1c 00 00 40 05 | 13 50 5d f0 78 ea 60 59 51 2f a8 23 2c 7c d0 1f | 4c a0 b1 5b | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a74cd0 | #142 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 39 64 14 10 77 e9 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #142 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #142 | rejected packet: | 41 39 64 14 10 77 e9 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #142: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8cc0 | handling event EVENT_RETRANSMIT for parent state #135 | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #135 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #135 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49612.208272; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000715 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a74cd0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #135 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 "road-eastnet-nonat-135" #135: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #135) | 6f cc 42 0b fb 9b 4b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 27 90 6c a9 76 2a c4 50 c5 bf 04 2d 39 82 d0 | f1 4e e9 ff 6c d4 67 d5 6a f7 c3 33 36 2d 41 eb | 01 b8 52 cf 33 75 55 83 36 e9 3b 1e e0 f5 4c 33 | f6 13 14 fe 0b 40 f0 7a 1d e6 e9 63 2c 7f 9b 3f | 43 d7 8b 49 de 08 d9 f7 cb b8 85 8d 24 76 ea 07 | 74 e0 eb 3b 7b 61 bd 6e d0 81 bc 30 2d b1 a8 bc | 95 7a c1 8e 91 81 20 78 4b 9d 5f 4b 55 88 98 a7 | 4c 89 7d 2e c5 f4 b0 76 31 ac d8 73 5d 09 ed 2d | bb 07 67 90 bf 59 f1 9b 89 79 b4 48 ab 68 0b 4b | a7 49 da 7c 24 b3 1c f9 17 8c 28 77 5a 6e 44 15 | 7d 9f 86 31 20 2d 95 04 ee 8e 03 70 03 dc 14 11 | e5 4b 44 1d be 0a 83 04 0b 7e 48 68 b0 0f 04 64 | 81 84 d0 41 fd 8b 49 2c f9 af ea 95 2c f3 49 aa | 7c 3c d3 83 ef 0f 20 1f 8b 15 3b 94 9d 57 0f 83 | e9 c9 85 72 a3 81 40 26 3d 9e 4f 4c 25 2e 6f de | 2e 5c c2 5b 74 8c 58 60 bd 5e 06 db 51 f6 b7 a3 | 29 00 00 24 4f 27 a7 6e b5 c8 d8 49 72 0f 78 be | 0c 3a 88 f4 37 97 d5 4f 51 27 f0 3f 45 0a b8 19 | ba c2 3b 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 5e 90 14 7c 0c 3f fe 72 ae db a0 | 43 97 c2 6c fa c9 b7 b1 00 00 00 1c 00 00 40 05 | 6c 85 24 93 7d cc 8d 2c 5e c0 f8 bf 19 38 1d 99 | 5f b9 fd e3 | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8cc0 | #135 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f cc 42 0b fb 9b 4b 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #135 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #135 | rejected packet: | 6f cc 42 0b fb 9b 4b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #135: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #41 | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #41 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #41 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49612.209551; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005006 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8cc0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #41 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 "road-eastnet-nonat-41" #41: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #41) | 8c ff 26 ec fd d0 54 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 6e ec 95 3c 3a 16 99 41 58 58 6d 01 e2 00 52 | 61 4b c1 ec e1 3d d8 4e 54 c1 3f 99 6b 75 66 7c | 92 13 65 ae e7 70 46 75 9c c5 22 7e 39 16 2c 7c | ed 79 f7 7b 1e 03 31 32 5f 32 c2 43 74 2e 80 66 | 05 70 11 cc 43 ce 1e db 54 28 24 d1 42 b1 78 ad | e4 d1 e6 87 87 84 0f b3 11 50 a6 79 e1 08 7c 97 | 7e bd ba 46 ef f8 51 ce 68 86 83 2a 2c 29 00 29 | a5 58 88 f4 ed 2a f4 20 30 da 5d b1 69 45 2e 86 | 07 5f aa 0a 89 4a 6e 50 df 32 c3 37 59 a0 ba ad | 86 bd 19 1f 9a e2 19 57 1e fc 59 a2 20 ba a6 61 | df 8c b1 78 f4 73 20 28 d7 5d 27 a9 6d f4 51 05 | 00 85 1f 11 24 82 a0 ad b8 70 fc 6e 4d 99 a5 50 | dd 2e 79 4a 4c a1 78 07 7c f4 48 8d c5 cd ae 3d | 60 f1 3e 46 13 92 0c ad 34 dc 62 b8 45 01 1d 0e | 54 aa 15 f0 b8 36 03 5c 9a b5 ba b5 7c 77 32 6f | a5 95 b6 eb ec c2 d3 a2 c8 7a f9 23 04 ed b5 3b | 29 00 00 24 d2 1e ab ae e7 c2 8c f2 ef 74 c1 f0 | 3d f2 d7 f9 46 a9 e4 e0 b6 87 92 c1 10 9a fa bd | 74 9b e3 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 98 3f 00 de 9d 4b 8f 8e e4 88 e6 | cb 33 f8 3a c9 9d db 23 00 00 00 1c 00 00 40 05 | 7d 19 19 07 bb fc 4c f4 5b 43 3f 70 14 2d 10 a5 | 77 03 39 4f | libevent_free: release ptr-libevent@0x7fb348009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #41 spent 0.0872 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c ff 26 ec fd d0 54 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #41 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #41 | rejected packet: | 8c ff 26 ec fd d0 54 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #41: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #121 | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #121 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #121 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49612.221796; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002995 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #121 | libevent_malloc: new ptr-libevent@0x7fb348009640 size 128 "road-eastnet-nonat-121" #121: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #121) | 1a c4 23 3a 2f fb 8d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 72 b0 fb 70 4e c0 8d 7d 37 18 c1 ce 4c 8b 63 | 3b ed bd b3 7c e2 68 d0 e4 78 d3 ff 67 2f 87 6b | 58 6e aa 28 e2 71 48 9f 9e 55 8d d7 f0 fa a8 2d | cf d6 ae d1 2d 00 58 7f 1d 28 13 c8 1c b2 dd 2d | 0b 8c e4 ed 5c aa b6 84 75 0e 0c f4 87 20 ea a7 | 6f 81 08 6f ca 1d ea a5 cc 8b 1d 07 3a 98 ee 34 | 92 f7 0d 60 c7 27 69 9a 54 db 7b c6 0a ed 9e 6e | 48 c9 2d 78 78 eb 23 a8 d4 08 fd 81 af 22 ee 61 | 94 de e2 4a 3e 31 5e 98 b3 8e 80 72 e5 9a 23 e5 | 36 5f 19 09 16 90 75 46 fe 81 ca 01 97 f5 9d b9 | ee 86 b8 f1 4d 40 49 77 bf ea d6 8d cf e1 3f ed | ea d1 6f a1 94 f1 b6 1e ce cf 58 8f 34 28 d9 e9 | 91 30 27 07 3d a8 1a 9e 1f 56 eb 39 c7 99 10 18 | f7 a0 93 02 25 a4 35 d3 3b 85 c6 a5 d4 ee 05 5a | 0a 2e cd 8b 56 c3 43 2f ad b6 de d6 76 50 8d 8d | 31 49 b6 ba ff a2 3a 1a 19 8e 58 36 38 db d0 39 | 29 00 00 24 ce 58 3c f3 71 03 62 3b f7 b4 bf 47 | 86 b0 47 20 d2 a4 5f 23 42 6a 81 bd c0 a6 20 e9 | 9a 46 27 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 ab b4 fc 6a e4 2a a5 95 ca 3f ba | 4a 7b 1d be 72 ff 8c 93 00 00 00 1c 00 00 40 05 | 7e 13 e9 d3 7d bc 8a 17 e1 3e 93 a5 d0 ee 9b cd | 6e 9a 4b 6b | libevent_free: release ptr-libevent@0x7fb38800a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #121 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a c4 23 3a 2f fb 8d 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #121 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #121 | rejected packet: | 1a c4 23 3a 2f fb 8d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #121: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-150" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-150' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #150 at 0x557d46aa13c0 | State DB: adding IKEv2 state #150 in UNDEFINED | pstats #150 ikev2.ike started | Message ID: init #150: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #150: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #150; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-150" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-150" IKE SA #150 "road-eastnet-nonat-150" "road-eastnet-nonat-150" #150: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-150 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-150": constructed local IKE proposals for road-eastnet-nonat-150 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 150 for state #150 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #150 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 | #150 spent 0.163 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-150" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 11 resuming | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | crypto helper 11 starting work-order 150 for state #150 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 150 | spent 0.248 milliseconds in whack | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 150 time elapsed 0.000665 seconds | (#150) spent 0.665 milliseconds in crypto helper computing work-order 150: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 150 for state #150 to event queue | scheduling resume sending helper answer for #150 | libevent_malloc: new ptr-libevent@0x7fb3600300e0 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #150 | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 150 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #150 | **emit ISAKMP Message: | initiator cookie: | 8a b6 09 5a 0a 8f be 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-150 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1b 2e 98 c4 69 1c 50 37 00 a8 8c d0 f1 d2 8c 28 | ikev2 g^x 94 f1 69 8e be e8 36 fe 99 97 d5 0c 37 4e 1b 26 | ikev2 g^x 9e e0 4e bd 73 a0 79 f4 5a 6b f2 8d 96 4f 03 3e | ikev2 g^x 0e 75 44 c8 2c a3 81 79 2e 0b 2e 8f 7d 7f dc f9 | ikev2 g^x 3f db 53 4d 6e 68 53 6c 49 99 36 00 d7 4f 7e e1 | ikev2 g^x 7e a7 57 fb ab 9f e1 d6 e7 24 3b 02 1f 12 10 de | ikev2 g^x 15 c5 08 ce f3 51 03 84 19 e7 47 83 1a 2e 38 c2 | ikev2 g^x 45 5b ab 60 7e 25 f4 92 0b eb 31 c2 32 59 f7 71 | ikev2 g^x 30 c7 ef cb 28 48 6e e3 c6 10 bc 9c 64 1e 68 59 | ikev2 g^x ee 88 40 85 37 40 80 12 7d 99 b2 33 c0 da 4b fb | ikev2 g^x 3a 39 ae b6 0e 0b 59 93 7d 9a d6 ee 50 27 09 f4 | ikev2 g^x a0 3a c3 63 a9 ac e9 9b 13 ed 9f a6 df 4f 55 3a | ikev2 g^x 82 36 63 e6 11 77 4d 54 ff a6 ad fe 0f 97 d9 c1 | ikev2 g^x 30 72 88 21 1f 78 34 56 b8 51 de f7 62 00 f9 29 | ikev2 g^x 66 5f d3 86 45 83 9d 48 c9 24 49 11 29 28 62 bd | ikev2 g^x 6e 8b 60 b5 72 8e cb ea 93 0b fd cb 0c 58 7b 88 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 36 30 98 85 8b 67 65 29 82 81 da 88 70 5a df 1d | IKEv2 nonce 0c c2 0c e8 b9 29 94 59 0f 89 5b 4b 52 bc 0b a0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8a b6 09 5a 0a 8f be 8a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 96 | natd_hash: port= 01 f4 | natd_hash: hash= 79 25 ba 47 28 1c 0e 38 fd e4 d3 0a c8 ae 66 94 | natd_hash: hash= c0 bd 04 2b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 79 25 ba 47 28 1c 0e 38 fd e4 d3 0a c8 ae 66 94 | Notify data c0 bd 04 2b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8a b6 09 5a 0a 8f be 8a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 5a 15 ef 3e 5b 63 8d c2 17 ab ae 76 63 67 33 8b | natd_hash: hash= f3 ee 4c d4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5a 15 ef 3e 5b 63 8d c2 17 ab ae 76 63 67 33 8b | Notify data f3 ee 4c d4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #150 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #150: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #150 to 4294967295 after switching state | Message ID: IKE #150 skipping update_recv as MD is fake | Message ID: sent #150 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-150" #150: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.150:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #150) | 8a b6 09 5a 0a 8f be 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 2e 98 c4 69 1c 50 37 00 a8 8c d0 f1 d2 8c 28 | 94 f1 69 8e be e8 36 fe 99 97 d5 0c 37 4e 1b 26 | 9e e0 4e bd 73 a0 79 f4 5a 6b f2 8d 96 4f 03 3e | 0e 75 44 c8 2c a3 81 79 2e 0b 2e 8f 7d 7f dc f9 | 3f db 53 4d 6e 68 53 6c 49 99 36 00 d7 4f 7e e1 | 7e a7 57 fb ab 9f e1 d6 e7 24 3b 02 1f 12 10 de | 15 c5 08 ce f3 51 03 84 19 e7 47 83 1a 2e 38 c2 | 45 5b ab 60 7e 25 f4 92 0b eb 31 c2 32 59 f7 71 | 30 c7 ef cb 28 48 6e e3 c6 10 bc 9c 64 1e 68 59 | ee 88 40 85 37 40 80 12 7d 99 b2 33 c0 da 4b fb | 3a 39 ae b6 0e 0b 59 93 7d 9a d6 ee 50 27 09 f4 | a0 3a c3 63 a9 ac e9 9b 13 ed 9f a6 df 4f 55 3a | 82 36 63 e6 11 77 4d 54 ff a6 ad fe 0f 97 d9 c1 | 30 72 88 21 1f 78 34 56 b8 51 de f7 62 00 f9 29 | 66 5f d3 86 45 83 9d 48 c9 24 49 11 29 28 62 bd | 6e 8b 60 b5 72 8e cb ea 93 0b fd cb 0c 58 7b 88 | 29 00 00 24 36 30 98 85 8b 67 65 29 82 81 da 88 | 70 5a df 1d 0c c2 0c e8 b9 29 94 59 0f 89 5b 4b | 52 bc 0b a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 25 ba 47 28 1c 0e 38 fd e4 d3 0a | c8 ae 66 94 c0 bd 04 2b 00 00 00 1c 00 00 40 05 | 5a 15 ef 3e 5b 63 8d c2 17 ab ae 76 63 67 33 8b | f3 ee 4c d4 | state #150 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38800a240 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #150 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 | #150 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49612.227706 | resume sending helper answer for #150 suppresed complete_v2_state_transition() and stole MD | #150 spent 0.682 milliseconds in resume sending helper answer | stop processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3600300e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a b6 09 5a 0a 8f be 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #150 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #150 | rejected packet: | 8a b6 09 5a 0a 8f be 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #150: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0889 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a12c70 | handling event EVENT_RETRANSMIT for parent state #95 | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #95 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #95 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49612.235959; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004502 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f4be0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #95 | libevent_malloc: new ptr-libevent@0x7fb3600300e0 size 128 "road-eastnet-nonat-95" #95: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #95) | 04 bb 1c 2b 41 e0 8a 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 79 b0 02 7c 1a 3a 07 ca 11 d1 03 7a 77 85 cb | ae ba 70 1b ee 9d e4 3c fb 83 b0 cf 85 ea f6 b1 | 44 27 5d 05 92 dc 5f 4f 10 d0 a1 c9 ef dd c6 ab | ac a1 db c0 15 56 b1 c8 1f 3b 2a 1e 0e 90 2f d7 | 1a 17 b9 f7 eb 61 37 1e 43 cf 9e 15 29 73 84 5a | a5 ef e1 fb 94 7f 43 bb 78 59 95 64 2c 87 b9 4b | 2e 15 ae fc 6c ec ab 40 45 3d 2f f3 c8 00 44 83 | 12 a7 e2 b8 59 bb 92 ce 59 8c ba f6 68 47 32 55 | e8 20 37 e3 3d d3 1b 3c 4e 84 f3 ae 58 53 16 45 | 58 97 74 47 9d a2 44 2f 81 9e ee 5c e8 ce 37 e9 | 5c 14 3e 89 c4 f1 89 ca 70 e0 1d 7a a9 38 f6 40 | 66 fb 41 8c 9b be 2c ea fc cd 2c ca 26 30 dd f0 | b1 29 6c c0 a6 b8 e6 ad e2 7b ae 2b 83 8b e5 9d | 01 26 d8 0c 5a 11 5f 25 a6 3e 25 b6 0f 26 26 34 | 01 b9 a7 4b b7 42 77 99 87 64 20 bd 67 77 cc 7e | b2 79 54 9b 12 25 7f ea ef 16 57 4a f6 24 75 7e | 29 00 00 24 fc b1 a7 58 88 f4 1b 4f aa 0e 2d d3 | a4 65 ca 66 dc 36 b5 47 7f 16 51 11 a3 c3 71 08 | 58 80 43 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ca 3c bb 33 78 12 9a 1b 10 5c d5 8f | d8 1f d4 ad ee 67 79 04 00 00 00 1c 00 00 40 05 | 61 56 68 61 76 b1 38 9f d6 2b 7a dd 4f cb 90 80 | 12 f2 80 83 | libevent_free: release ptr-libevent@0x7fb388027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a12c70 | #95 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 bb 1c 2b 41 e0 8a 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #95 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #95 | rejected packet: | 04 bb 1c 2b 41 e0 8a 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #95: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0706 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fa300 | handling event EVENT_RETRANSMIT for parent state #143 | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #143 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #143 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49612.242358; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500207 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a72150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #143 | libevent_malloc: new ptr-libevent@0x7fb388027c10 size 128 "road-eastnet-nonat-143" #143: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #143) | fe 08 8f c1 30 76 36 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 59 10 0a 33 69 60 29 ec cb 88 e8 3a c1 e5 55 | 26 67 1a ec 62 9e 8e 22 6f b0 d9 0b 9d f1 88 4a | e6 aa 92 54 ef 0d ca 48 fc de 93 8e cc 1b be 9e | 2a 5e f3 2a 08 3f 42 43 4c 7d 9b 8f 28 00 df 48 | e8 21 87 a4 f6 50 fb f0 b0 17 a4 67 51 7c 94 f5 | bf 3d 99 c9 85 3f 6a 47 12 df 61 eb 04 e7 9a 6c | b7 d5 b3 00 34 48 70 01 04 f1 38 e6 2a 1b 58 fe | 45 c8 88 15 fe fd f8 a1 17 d4 b0 e0 da 11 1c 39 | ad d0 8c b8 02 34 e9 cc d8 17 f6 f2 94 8e c1 9b | bc 9e 9d 32 92 5b 2a 34 cd 6a fb 2e 20 96 68 57 | 5b d5 8b 51 c6 02 26 d3 9c 0f 2f 12 c2 48 e7 4a | 4a 0b 12 1b 9e 56 b5 85 4d d5 b2 31 1e ed 3e 7b | 36 b4 c3 2a eb a3 dd fa 18 8b db b6 6e 6f 26 25 | d4 07 3d fa df 09 23 4b f0 61 a0 e2 e7 88 89 b7 | 4a 08 a7 b8 23 da c7 50 cb 24 82 e1 9d bc ac 0c | ad 50 25 66 22 31 ab bb bb 61 7d f2 14 fa 8e 17 | 29 00 00 24 5c 1f 93 ac 9c d9 6d bc 1c 83 06 35 | 6d 1c ce da 8c 6b 1d 7b a8 23 6f c9 2c 64 35 22 | c8 0a 79 63 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 3f e0 89 56 6b 89 d9 2f e3 34 a5 | 92 0a 7f a5 70 51 be 33 00 00 00 1c 00 00 40 05 | 8d 31 d1 99 a4 16 d7 c5 96 20 51 29 c7 9b 80 8c | b7 4b 38 13 | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fa300 | #143 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 08 8f c1 30 76 36 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #143 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #143 | rejected packet: | fe 08 8f c1 30 76 36 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #143: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.072 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7e490 | handling event EVENT_RETRANSMIT for parent state #136 | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #136 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #136 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49612.274746; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00194 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fa300 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #136 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 "road-eastnet-nonat-136" #136: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #136) | d6 c8 9e 97 21 46 fb d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 a9 84 13 62 aa bd 1d ad 3e 60 88 dc a9 35 5e | 57 2f a4 3a d3 ae c1 11 b0 24 19 68 c2 75 c1 4f | 59 cf f8 40 bb af 7e d1 b9 71 42 ce c6 09 6e 74 | 9e f2 29 0d 91 21 24 74 6d 2f 10 75 65 f8 b8 44 | e9 15 55 bb 2b 6f 25 4c 58 9b 0b 45 c2 40 5a 9f | ff e2 b3 e2 f7 0d c5 79 1b 00 36 3a 21 20 e7 06 | d4 05 ab e6 7f 0e 4f 26 f4 28 cb d2 12 3f 60 75 | e8 8c 1f 18 e0 09 73 82 2e 56 2f fe 00 1a 31 26 | 0b 05 07 a6 fc 87 93 26 a9 c2 69 7c 30 9c 7a 89 | e9 2a 6b aa c2 98 8a d1 cc 85 ab 8a 1d b6 6c 3a | 46 51 76 9a 2b ea bd 4c 92 d8 c8 5c 56 7a b8 5f | 71 f6 c7 f5 f4 4e c8 ce cc 9b 6f 50 15 3b 30 b5 | cc 32 0c 15 e6 9e 78 33 f4 30 d7 c5 bc a6 29 97 | 00 2f a4 12 c0 82 9e 84 f0 b8 38 05 f1 51 00 d1 | 48 64 6a f9 cc d7 36 54 45 d6 ee 3e 02 d0 d5 50 | ec e5 a0 1a 70 ee 96 eb 78 4d 45 6b e4 50 2d ed | 29 00 00 24 24 22 aa ae c7 66 c9 3a 20 66 58 4a | 54 df 58 65 c1 5d d7 a3 b2 c7 e8 e8 de 15 89 70 | 84 48 bb d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 7f 22 d9 ee cc a0 1b 0a 4c ff 84 | da dc a7 a5 32 ec b3 c6 00 00 00 1c 00 00 40 05 | e4 4f b8 48 f2 80 69 e7 b9 85 06 aa 82 75 ce d9 | b4 81 0b 76 | libevent_free: release ptr-libevent@0x7fb36001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e490 | #136 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 c8 9e 97 21 46 fb d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #136 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #136 | rejected packet: | d6 c8 9e 97 21 46 fb d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #136: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a89700 | handling event EVENT_RETRANSMIT for parent state #122 | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #122 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #122 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49612.284374; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003246 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e490 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #122 | libevent_malloc: new ptr-libevent@0x7fb36001d920 size 128 "road-eastnet-nonat-122" #122: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #122) | 14 66 d6 bd ae 2b be a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 a1 e9 e4 be 1e 51 8a 55 59 79 73 21 36 56 e2 | 77 7a 08 bd 06 ab d4 92 e5 dc ae f7 64 76 23 ff | f4 fc 6d 61 73 31 e1 d2 4f df c1 6b b7 79 5a 65 | a0 cc f6 e0 aa a2 1e 56 c9 61 f0 64 10 6e 71 e4 | de d3 38 6f 01 f0 ef d1 f6 56 f5 aa fb d5 dc 96 | f9 0b be 72 ef 23 60 6a 39 4c 10 fa 40 46 a5 4f | 9d 4e 1b 63 94 dd bb 2e 79 61 b0 23 01 f5 74 e7 | c5 3f 64 7f 13 8b 72 4d bd da 91 fc 61 61 ef f0 | e7 bf ad 46 59 ed ad 05 2c f7 04 21 03 71 4c c7 | 7f 1d ad ca ef 53 b4 42 e8 7b 9b 3d 7a 70 68 63 | f6 3b fc 00 63 e2 d1 50 20 42 35 cc 18 3b ef e3 | 5c 49 2e b5 43 b5 11 94 a2 42 32 89 ab 4a 75 44 | 28 03 13 02 78 a8 b9 d4 86 df f7 69 0e 5b f1 03 | 59 e8 3f 87 be c1 4f 01 d7 b7 0b 01 72 03 2c 0c | c5 51 b7 34 27 69 20 c2 1e 3c 1a 82 2c 40 e7 31 | 94 67 b7 79 04 1c c9 e0 fd 58 15 b5 e2 95 d3 0d | 29 00 00 24 7c 10 f9 fd 3b aa 03 0a 4e 70 88 76 | 8d 21 8d 7a 77 a3 25 87 bf 2c 07 91 c2 03 c6 70 | 6f 0a b2 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 62 3b d9 22 f1 42 3b 85 55 78 b5 | c8 14 63 8d 0b 44 d6 d6 00 00 00 1c 00 00 40 05 | 1b ba f6 9b c4 53 50 8e 11 46 cb 49 4f 65 db eb | 69 7d d4 7c | libevent_free: release ptr-libevent@0x7fb34802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a89700 | #122 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 66 d6 bd ae 2b be a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #122 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #122 | rejected packet: | 14 66 d6 bd ae 2b be a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #122: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #42 | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #42 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #42 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49612.292725; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004373 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a89700 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #42 | libevent_malloc: new ptr-libevent@0x7fb34802a950 size 128 "road-eastnet-nonat-42" #42: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #42) | 6d 45 59 82 ce 2c 77 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 19 87 21 99 aa 5a cb db ce 0f 02 f2 50 c9 ac 92 | 89 7c 70 85 a8 a7 33 4a c2 44 36 a5 03 8e 1f 50 | c8 86 2e d1 a1 d8 14 17 9c 7c a1 44 65 ba 61 77 | f0 62 19 6f f9 72 cc 36 22 03 c3 7d e3 8c 01 7c | 58 c0 91 2e 4f 24 ac cd af f7 da 61 3e 4b 43 c9 | b4 5d 67 e2 f1 65 be 23 88 f7 f4 e6 25 50 c9 e3 | 21 af 1c 45 62 8a 73 3a 98 47 b9 78 6f ee 87 26 | 3b 63 01 1e 58 61 99 0e 7a 91 7d 30 e0 59 53 0b | 92 57 66 fd a7 1f 2b 11 d7 59 95 9a 31 fc 95 b7 | 6b 6d 54 d3 d2 0f 8f 6e 22 a6 95 24 ad 69 c7 e4 | 30 99 2e f3 f9 ce 36 7f 2b 10 24 3b 8a de bf 7e | cb e6 f5 71 51 3c fe 08 40 b7 0a aa 06 06 b7 d2 | 69 fa d5 d4 16 ea b0 b1 e6 af 20 69 3c 12 1e 86 | 3a 05 a1 45 01 d3 59 e6 49 c9 c2 6a 69 6b a1 a1 | b0 18 e7 68 dc 1f 70 e8 33 59 8d 8e 1f 6a e1 13 | 5e 04 b2 02 62 fb f4 16 44 cd 9d 1e 33 84 73 83 | 29 00 00 24 98 90 54 f6 26 53 aa 96 7a 47 ff f3 | 5b dc e1 95 5c f0 6d 5d ed 6d 00 c6 1d e8 59 f1 | 2a 1c 8a 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 cb 92 0c 07 24 d9 90 48 22 d8 76 | e5 5b bc c8 39 99 d2 4d 00 00 00 1c 00 00 40 05 | cb e3 e2 5e 9a 09 f4 90 ee 73 df 07 77 16 6b 37 | da 99 3b e3 | libevent_free: release ptr-libevent@0x7fb358009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | #42 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 45 59 82 ce 2c 77 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #42 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #42 | rejected packet: | 6d 45 59 82 ce 2c 77 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #42: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-151" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-151' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #151 at 0x557d46aa2980 | State DB: adding IKEv2 state #151 in UNDEFINED | pstats #151 ikev2.ike started | Message ID: init #151: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #151: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #151; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-151" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-151" IKE SA #151 "road-eastnet-nonat-151" "road-eastnet-nonat-151" #151: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-151 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-151": constructed local IKE proposals for road-eastnet-nonat-151 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 151 for state #151 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb358005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #151 | libevent_malloc: new ptr-libevent@0x7fb358009640 size 128 | #151 spent 0.124 milliseconds in ikev2_parent_outI1() | crypto helper 16 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 starting work-order 151 for state #151 | RESET processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 151 | RESET processing: connection "road-eastnet-nonat-151" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.203 milliseconds in whack | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 151 time elapsed 0.000566 seconds | (#151) spent 0.568 milliseconds in crypto helper computing work-order 151: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 151 for state #151 to event queue | scheduling resume sending helper answer for #151 | libevent_malloc: new ptr-libevent@0x7fb36402ffd0 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #151 | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 151 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #151 | **emit ISAKMP Message: | initiator cookie: | d6 d5 c3 1b 58 0f 5c 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-151 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 66 37 31 25 ac 2b c6 c6 54 4a 25 58 cc 38 99 e0 | ikev2 g^x ed 33 16 21 c3 45 6a eb 3b a9 cb 98 85 d1 bc b2 | ikev2 g^x fb 43 f8 dc 85 42 20 a9 d4 7c dc c0 4c df 30 b1 | ikev2 g^x 6f cb 58 0b 5e 23 e6 14 ea 93 76 de 25 96 78 81 | ikev2 g^x 99 69 10 aa a3 9f ec 08 71 07 18 69 73 22 c9 ac | ikev2 g^x 3c e3 bf f1 09 8a 27 19 15 60 45 3d 4e 4f f3 e6 | ikev2 g^x c0 ab 4b c7 bb fb 2d 92 26 ca 7f de c4 f9 dd 4a | ikev2 g^x fa 18 2a 06 8c 14 94 9f a3 5d e6 b2 6b b0 ef e2 | ikev2 g^x 03 7f 7e f8 41 9d 8b 81 6b ea 4b 0b 45 f7 4c 93 | ikev2 g^x 70 05 72 9a ed 29 ed 3c 18 ca 66 2f d4 84 e6 4b | ikev2 g^x c1 2d 49 d6 3e cb 03 40 00 76 c7 f7 62 87 c5 1b | ikev2 g^x 85 d6 9d d1 8f 62 a3 ce 21 63 7a e5 94 35 85 13 | ikev2 g^x e3 c0 a5 2d 68 e8 0d 1f 37 ec 8c 55 12 d8 2a 1f | ikev2 g^x 06 81 5f d0 f4 ed e5 b1 5f c7 61 8a f0 5a 81 39 | ikev2 g^x 9f 6d e8 7f 5c 42 26 99 4f 51 2b 10 a9 6b b8 4c | ikev2 g^x a4 af 1c 69 f6 99 03 59 f6 8d eb d2 5c c8 04 4e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3f 57 34 15 0e f6 1f 97 00 4e ca 13 c7 48 27 43 | IKEv2 nonce fb 8e ac 87 27 dd cc da bb e1 5d 76 d8 9b a6 5f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d6 d5 c3 1b 58 0f 5c 6a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 97 | natd_hash: port= 01 f4 | natd_hash: hash= 34 1e a1 42 f7 31 41 ef 44 00 e7 a6 3d d6 a8 bb | natd_hash: hash= 50 6c 59 e3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 34 1e a1 42 f7 31 41 ef 44 00 e7 a6 3d d6 a8 bb | Notify data 50 6c 59 e3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d6 d5 c3 1b 58 0f 5c 6a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 29 1a ff ca 49 77 f5 cd 99 41 a4 64 5f 6e 4a e7 | natd_hash: hash= 0f a2 34 de | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 29 1a ff ca 49 77 f5 cd 99 41 a4 64 5f 6e 4a e7 | Notify data 0f a2 34 de | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #151 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #151: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #151 to 4294967295 after switching state | Message ID: IKE #151 skipping update_recv as MD is fake | Message ID: sent #151 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-151" #151: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.151:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #151) | d6 d5 c3 1b 58 0f 5c 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 37 31 25 ac 2b c6 c6 54 4a 25 58 cc 38 99 e0 | ed 33 16 21 c3 45 6a eb 3b a9 cb 98 85 d1 bc b2 | fb 43 f8 dc 85 42 20 a9 d4 7c dc c0 4c df 30 b1 | 6f cb 58 0b 5e 23 e6 14 ea 93 76 de 25 96 78 81 | 99 69 10 aa a3 9f ec 08 71 07 18 69 73 22 c9 ac | 3c e3 bf f1 09 8a 27 19 15 60 45 3d 4e 4f f3 e6 | c0 ab 4b c7 bb fb 2d 92 26 ca 7f de c4 f9 dd 4a | fa 18 2a 06 8c 14 94 9f a3 5d e6 b2 6b b0 ef e2 | 03 7f 7e f8 41 9d 8b 81 6b ea 4b 0b 45 f7 4c 93 | 70 05 72 9a ed 29 ed 3c 18 ca 66 2f d4 84 e6 4b | c1 2d 49 d6 3e cb 03 40 00 76 c7 f7 62 87 c5 1b | 85 d6 9d d1 8f 62 a3 ce 21 63 7a e5 94 35 85 13 | e3 c0 a5 2d 68 e8 0d 1f 37 ec 8c 55 12 d8 2a 1f | 06 81 5f d0 f4 ed e5 b1 5f c7 61 8a f0 5a 81 39 | 9f 6d e8 7f 5c 42 26 99 4f 51 2b 10 a9 6b b8 4c | a4 af 1c 69 f6 99 03 59 f6 8d eb d2 5c c8 04 4e | 29 00 00 24 3f 57 34 15 0e f6 1f 97 00 4e ca 13 | c7 48 27 43 fb 8e ac 87 27 dd cc da bb e1 5d 76 | d8 9b a6 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 1e a1 42 f7 31 41 ef 44 00 e7 a6 | 3d d6 a8 bb 50 6c 59 e3 00 00 00 1c 00 00 40 05 | 29 1a ff ca 49 77 f5 cd 99 41 a4 64 5f 6e 4a e7 | 0f a2 34 de | state #151 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb358009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb358005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #151 | libevent_malloc: new ptr-libevent@0x7fb358009640 size 128 | #151 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49612.294894 | resume sending helper answer for #151 suppresed complete_v2_state_transition() and stole MD | #151 spent 0.376 milliseconds in resume sending helper answer | stop processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36402ffd0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 d5 c3 1b 58 0f 5c 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #151 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #151 | rejected packet: | d6 d5 c3 1b 58 0f 5c 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #151: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0589 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a89740 | handling event EVENT_RETRANSMIT for parent state #144 | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #144 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #144 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49612.325153; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50057 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a12c70 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #144 | libevent_malloc: new ptr-libevent@0x7fb36402ffd0 size 128 "road-eastnet-nonat-144" #144: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #144) | 95 f5 7e 43 50 83 91 f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 af 0d 3c f0 04 33 31 65 f6 8e 0a e2 6d 8f 2b | 3a 54 de b3 ca 0f b9 57 94 b3 82 c2 80 38 37 42 | 7f 12 9e 2e 71 85 9b 4b b8 30 72 8d 13 66 8d 18 | cc b4 6c 82 a9 1c ff 5f bc 21 44 b4 04 e3 03 9f | 86 65 ce c2 4c 9e c7 42 cb 55 d7 40 69 8e 4e 35 | 08 db 41 09 bf 5b 9f e9 29 80 fb 24 8c ee 8a 18 | 98 d5 9e 29 b1 2e 48 fa a4 54 8d 89 c7 a3 3f 0e | fc 43 c8 e1 70 19 e6 79 93 90 9a 7f 29 dc 10 54 | 5c 05 ee 55 8b da f3 4a d4 d1 7a 22 56 b9 55 f2 | 83 7d ee 0a 7b 20 d8 88 a4 b2 35 e6 85 84 6e ea | 73 63 0f 8a e4 f5 ba b9 cf c5 6d ef 42 bc 1c 31 | 91 cc e3 6a cc 1c 24 a0 43 43 cd 4a d2 99 1f d0 | 12 0e 0b 61 86 58 8a 2a 98 ff 0e 20 62 f2 a9 6f | 84 85 8e 3d 34 eb 58 ea 76 88 a9 8b bd 38 f7 19 | 7f 52 1e a6 e1 d5 d4 4f 95 6d fa 80 6a e1 f8 3e | c4 ca 0c d0 70 40 4c 9c cb 3a a3 28 2b c3 1c ff | 29 00 00 24 1f 01 c0 5a 0d f1 22 7b f9 16 68 fa | 7d 4a 59 bf c4 b6 f1 ab 98 c0 67 1a 42 27 bf 9d | d6 b1 35 d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 96 0c ca 76 1c 4b 86 73 02 f4 3a | a5 21 4a 8f fe b4 03 ee 00 00 00 1c 00 00 40 05 | 86 67 99 5d 30 be 3d 57 d4 ea af 87 c1 18 21 08 | 32 c4 b1 0f | libevent_free: release ptr-libevent@0x7fb38401cc10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a89740 | #144 spent 0.226 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 f5 7e 43 50 83 91 f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #144 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #144 | rejected packet: | 95 f5 7e 43 50 83 91 f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #144: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c00d120 | handling event EVENT_RETRANSMIT for parent state #96 | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #96 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #96 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49612.340554; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003954 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a89740 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #96 | libevent_malloc: new ptr-libevent@0x7fb38401cc10 size 128 "road-eastnet-nonat-96" #96: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #96) | 4d 94 02 39 3c 71 1f ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 27 e8 d9 3b fa 4a fd 06 7e 6c e7 d4 28 0e 9b | df ea 6a b2 fc 9c 70 c8 54 bf db 6f b0 0a 35 03 | f4 08 a8 1f a5 9d 3d d9 36 ba b8 d7 c7 a5 02 b2 | bf b0 56 c5 e8 85 3a 3f 3e 64 27 86 e6 32 36 9e | e3 cb 8f 61 07 7c f1 f7 b9 98 01 dc 75 bf ec 8e | e7 f3 67 03 e1 e0 44 02 7f 11 18 67 70 37 2d 5e | 1b 6f 89 19 20 17 f1 e7 a8 e9 33 cb ea 00 46 56 | 49 ba cc 5d 15 50 da 98 ff 9c 3f 56 7f 50 23 17 | 4f 39 25 c0 2c 24 4b 31 aa 08 bf c3 fa 73 75 f8 | 66 d4 df a2 81 2f b6 b1 85 b3 e1 b9 2c ba cc f0 | 05 a5 8e 76 4a d0 1e 4a 24 c4 b4 b6 c2 9f 5a c8 | d7 f7 62 5f e5 ae 58 69 f5 08 1a e6 3f f8 45 99 | 93 41 5e 16 d1 fa c4 dc dc 43 aa 67 19 5f 0d 6b | d0 93 a7 d0 e0 42 60 37 df bb b8 67 3d be 3f 73 | 01 ab df b7 44 63 b3 2e 2f eb b6 11 c7 6c 12 e1 | 09 64 f6 e9 82 4b 4a d1 f8 5c 86 44 cf 9c 7b 84 | 29 00 00 24 fb b6 a6 14 5d d4 9f d4 3b de f1 45 | f6 4a ea e3 bf d0 33 9e b1 50 af 7d ca 56 7c e5 | 77 5f 83 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 32 ad 1c 75 03 32 df 0c 2b d0 a0 | cb f7 34 b2 23 e4 90 14 00 00 00 1c 00 00 40 05 | 3d 4e a8 fd 45 70 26 15 be c0 96 dc 33 de 8f ea | e2 1a 12 a7 | libevent_free: release ptr-libevent@0x7fb36c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00d120 | #96 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d 94 02 39 3c 71 1f ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #96 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #96 | rejected packet: | 4d 94 02 39 3c 71 1f ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #96: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.073 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #137 | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #137 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #137 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49612.343902; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002421 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #137 | libevent_malloc: new ptr-libevent@0x7fb36c012840 size 128 "road-eastnet-nonat-137" #137: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #137) | 71 ba fb 1f 95 88 29 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 75 6d 4d 0f bb db 8d 24 d0 ba 5f 79 5b 88 be | 94 ae ea 89 7e 95 49 22 fa 6f 0d 51 90 a6 60 1f | 08 fe 3b 9a b1 a8 b5 c8 e8 a5 d1 c2 b6 3a f6 5c | 07 25 e1 53 6d cd f9 d3 3f 17 7a b9 97 ee 73 6b | da 87 59 77 74 9c 5c 05 a7 16 5c 85 33 f2 d8 f0 | a7 84 4c 20 01 fc 53 bf 21 28 ba 99 79 44 ea b7 | b7 e2 9a c6 4e 09 9d 5a 41 46 ff 69 36 bd 47 3d | 68 59 0e 87 0c b2 db 9d ef 27 b1 ef a7 c3 7d 74 | d1 bf 63 41 fd 34 70 c8 08 69 9e 0d 21 dd b6 ca | 61 47 c8 f6 20 99 94 42 4a b6 3c e4 c1 6f 59 47 | 32 7f e7 88 96 d9 c5 8f 82 9f aa 9b 0b 9e 03 53 | 65 a9 c8 5c d7 fe be da 56 44 27 26 98 d6 9a ae | 35 b2 bc fb a7 4d 1f ae ae 76 fb c2 8c 86 63 40 | 59 88 a0 8b a9 0e 3a 8f 10 76 ad e8 54 d2 9e 91 | 7a bc 03 79 61 0b 83 53 4c 4e 2d 22 ca 69 54 24 | ae 77 e1 5c 6b 3a ff ee 1f 59 52 e0 9c 51 48 2c | 29 00 00 24 f7 ec 22 b0 d2 45 cb de 11 9d 88 dc | d9 c8 87 82 94 72 01 b4 91 d8 41 1f 07 fb 13 21 | 60 9f a8 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ee b9 3b 05 6b fc 34 5a 00 ef 69 | 58 dc d5 6e 13 53 c2 0c 00 00 00 1c 00 00 40 05 | 42 f2 83 df 2f 64 fb 42 98 b0 17 b3 99 82 89 4f | 79 b2 42 ca | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #137 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 ba fb 1f 95 88 29 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #137 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #137 | rejected packet: | 71 ba fb 1f 95 88 29 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #137: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8e0 | handling event EVENT_RETRANSMIT for parent state #123 | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #123 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #123 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49612.347238; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00352 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #123 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 "road-eastnet-nonat-123" #123: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #123) | 6c 7d b3 a1 76 62 7d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 56 4f 8e 37 33 e9 f0 f8 7f b8 e1 b3 f9 a8 fa | b7 62 0a da df 31 2b 33 3e c3 84 d4 70 c9 16 31 | 80 ac 1c 22 4c fb 0e d9 48 14 9a 6c 58 8b b2 b1 | ab d6 de 52 1b e7 85 36 94 02 66 e4 ea 4b 3e bb | cb 9a 60 cd b2 64 9c 54 4c 58 05 94 9a 41 90 e5 | 3d f7 e6 13 47 7c 5c ae 9e ed 2f 47 46 7c b6 ec | 64 99 4c 90 1f 2b 27 83 ee 7d 0c 95 53 61 78 0e | fc 0d ee f9 69 83 ad f2 29 e6 77 fd 16 29 ec c4 | 55 89 e7 07 dc 10 66 d5 0f fd 31 a1 54 12 3e c7 | b1 16 f6 98 63 b4 d5 90 8d e3 ff 44 b5 31 8e 32 | c1 26 fd ff 42 9b c5 01 50 0b be e0 4e 8b d1 4e | 1e cc 49 12 14 c5 7d a4 df 96 fd 82 a1 fa 2c 84 | 20 3e 8f a2 9b 0b 00 ca 45 cd 8b a5 8a 1e 6a fa | 02 7f 67 67 3a 15 da 2b 32 2d 18 bd 05 df 1f 49 | 13 dc cd f2 4e 24 ac 3e c3 6e b4 5b 9b c7 3e 7b | f3 b3 b6 54 f0 4f 36 43 d8 39 48 ea ae 56 03 eb | 29 00 00 24 9d 71 0d 4c e1 28 99 bb a1 c2 a8 97 | 82 df 6e a7 59 50 e5 e7 83 d9 52 2c 3a b5 f8 0a | ab 34 6b 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd f0 b7 a5 ab c1 1e 9f 00 5e 1f f4 | 01 11 d6 41 8c c8 44 db 00 00 00 1c 00 00 40 05 | 74 ad b7 af a3 7a 6a 08 ff e9 f2 f1 74 4e c9 b2 | f6 ce db 1e | libevent_free: release ptr-libevent@0x7fb34c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8e0 | #123 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 7d b3 a1 76 62 7d ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #123 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #123 | rejected packet: | 6c 7d b3 a1 76 62 7d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #123: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-152" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-152' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #152 at 0x557d46aa3f40 | State DB: adding IKEv2 state #152 in UNDEFINED | pstats #152 ikev2.ike started | Message ID: init #152: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #152: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #152; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-152" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-152" IKE SA #152 "road-eastnet-nonat-152" "road-eastnet-nonat-152" #152: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-152 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-152": constructed local IKE proposals for road-eastnet-nonat-152 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 152 for state #152 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469fb8e0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #152 | libevent_malloc: new ptr-libevent@0x7fb34c02a950 size 128 | #152 spent 0.153 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-152" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.256 milliseconds in whack | crypto helper 4 resuming | crypto helper 4 starting work-order 152 for state #152 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 152 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 152 time elapsed 0.000743 seconds | (#152) spent 0.75 milliseconds in crypto helper computing work-order 152: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 152 for state #152 to event queue | scheduling resume sending helper answer for #152 | libevent_malloc: new ptr-libevent@0x7fb3580300e0 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #152 | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 152 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #152 | **emit ISAKMP Message: | initiator cookie: | c7 e3 df ec 9e c4 62 b6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-152 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a7 d8 bf 29 24 11 1c ce c6 eb 11 96 dd 30 8f aa | ikev2 g^x 0c 4c 70 ce 87 a4 df 43 d2 6c ba d5 f0 3b d8 41 | ikev2 g^x 39 bd 2b 1a 59 08 f6 28 59 f9 b3 0f e5 b5 40 32 | ikev2 g^x 97 af 83 49 1b 9c e1 41 6c 19 d9 81 bd 62 6f 16 | ikev2 g^x 88 77 9c c6 99 70 f5 87 ca bd 33 9d e4 05 6b 5b | ikev2 g^x c0 98 a4 04 59 99 ff a8 0d 45 13 de 94 59 78 3e | ikev2 g^x 9f 29 e2 f0 6e 7e b9 fe f0 0d e5 7f 5b 4c 01 84 | ikev2 g^x ef a7 c0 48 17 b5 cf 69 2f 9d 37 d6 9e 2c 49 b7 | ikev2 g^x 21 74 f9 23 52 39 e5 70 37 49 22 ad bf 6a ae c7 | ikev2 g^x 00 73 99 52 14 5a 01 1d ec dc e2 c6 b8 f0 0e df | ikev2 g^x bb 4f 3c 66 48 6a d8 f8 3d dd ce 84 36 d7 fe 75 | ikev2 g^x b0 8b 40 6c b7 0a 71 a4 a1 89 ca 62 6c e9 05 72 | ikev2 g^x 42 a3 a2 98 b2 36 46 5e b4 83 55 6f f7 d0 07 bb | ikev2 g^x be 2a 0c 02 1c 0f 1c ef 21 73 11 f7 92 da ee 38 | ikev2 g^x b3 d6 c9 03 8b 2f b8 eb 38 2b 9f 1a 71 81 4d 22 | ikev2 g^x 5e d5 1f 81 77 a6 9c 34 d3 30 8a 8b 41 61 5e 1b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 29 e4 ca ab 2a 30 18 fc 26 46 3c 50 1a f5 21 d0 | IKEv2 nonce 52 38 f5 d5 7b 74 90 b3 b6 ed 01 58 e0 d9 32 85 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c7 e3 df ec 9e c4 62 b6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 98 | natd_hash: port= 01 f4 | natd_hash: hash= 11 38 7f 4c 40 24 5c 70 b7 73 9c 98 de a9 9b f3 | natd_hash: hash= 50 76 96 bb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 11 38 7f 4c 40 24 5c 70 b7 73 9c 98 de a9 9b f3 | Notify data 50 76 96 bb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c7 e3 df ec 9e c4 62 b6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 28 07 96 1e 77 dd a7 3a bc 86 9b 87 bc da 1a a0 | natd_hash: hash= d3 4f e8 fc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 28 07 96 1e 77 dd a7 3a bc 86 9b 87 bc da 1a a0 | Notify data d3 4f e8 fc | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #152 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #152: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #152 to 4294967295 after switching state | Message ID: IKE #152 skipping update_recv as MD is fake | Message ID: sent #152 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-152" #152: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.152:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #152) | c7 e3 df ec 9e c4 62 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a7 d8 bf 29 24 11 1c ce c6 eb 11 96 dd 30 8f aa | 0c 4c 70 ce 87 a4 df 43 d2 6c ba d5 f0 3b d8 41 | 39 bd 2b 1a 59 08 f6 28 59 f9 b3 0f e5 b5 40 32 | 97 af 83 49 1b 9c e1 41 6c 19 d9 81 bd 62 6f 16 | 88 77 9c c6 99 70 f5 87 ca bd 33 9d e4 05 6b 5b | c0 98 a4 04 59 99 ff a8 0d 45 13 de 94 59 78 3e | 9f 29 e2 f0 6e 7e b9 fe f0 0d e5 7f 5b 4c 01 84 | ef a7 c0 48 17 b5 cf 69 2f 9d 37 d6 9e 2c 49 b7 | 21 74 f9 23 52 39 e5 70 37 49 22 ad bf 6a ae c7 | 00 73 99 52 14 5a 01 1d ec dc e2 c6 b8 f0 0e df | bb 4f 3c 66 48 6a d8 f8 3d dd ce 84 36 d7 fe 75 | b0 8b 40 6c b7 0a 71 a4 a1 89 ca 62 6c e9 05 72 | 42 a3 a2 98 b2 36 46 5e b4 83 55 6f f7 d0 07 bb | be 2a 0c 02 1c 0f 1c ef 21 73 11 f7 92 da ee 38 | b3 d6 c9 03 8b 2f b8 eb 38 2b 9f 1a 71 81 4d 22 | 5e d5 1f 81 77 a6 9c 34 d3 30 8a 8b 41 61 5e 1b | 29 00 00 24 29 e4 ca ab 2a 30 18 fc 26 46 3c 50 | 1a f5 21 d0 52 38 f5 d5 7b 74 90 b3 b6 ed 01 58 | e0 d9 32 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 38 7f 4c 40 24 5c 70 b7 73 9c 98 | de a9 9b f3 50 76 96 bb 00 00 00 1c 00 00 40 05 | 28 07 96 1e 77 dd a7 3a bc 86 9b 87 bc da 1a a0 | d3 4f e8 fc | state #152 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c02a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469fb8e0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a903c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #152 | libevent_malloc: new ptr-libevent@0x7fb34c02a950 size 128 | #152 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49612.35651 | resume sending helper answer for #152 suppresed complete_v2_state_transition() and stole MD | #152 spent 0.546 milliseconds in resume sending helper answer | stop processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3580300e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 e3 df ec 9e c4 62 b6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #152 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #152 | rejected packet: | c7 e3 df ec 9e c4 62 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #152: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0588 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e8820 | handling event EVENT_RETRANSMIT for parent state #43 | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #43 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #43 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49612.374732; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.010776 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90400 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #43 | libevent_malloc: new ptr-libevent@0x7fb3580300e0 size 128 "road-eastnet-nonat-43" #43: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #43) | cc ee 6c 19 e2 66 91 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 b3 dc 74 af 8b 5f 17 f2 a2 67 e8 55 b6 7f 2f | d6 4e 7a 73 eb 13 7d 78 44 82 5e 9f c0 c9 a7 ce | 19 55 10 32 8b 27 a5 29 28 74 fd 00 e6 f7 6a 74 | 56 7d 4b 3f aa d7 b5 46 cb 2d 3c a3 dc 3f bf 05 | 8d ef fa 60 0a d7 e7 b4 43 44 81 a1 10 dd db 69 | 30 53 16 90 a0 49 c9 94 16 9b 8e 16 05 cc a3 b0 | bb c8 6f 12 2c 69 ac ba c2 57 c1 0e 1d 24 c4 b7 | c5 6e 9f 50 e2 e4 26 8c 25 36 d7 6d d8 cd 2c bd | d4 0a 33 47 c9 6e 1d c8 6c 02 27 85 0b ac 4e d8 | 84 b3 28 76 fc c6 2f a9 af 4b b0 f5 08 9e 56 b5 | 24 d4 f4 cb 0a 9c 0d ce 12 fa 25 29 9d 95 d6 4a | 9a e8 aa eb d1 08 9a 51 c5 21 4d b3 dd e9 4f d9 | a6 74 14 2d 42 fa 5e 68 63 d0 8e 8d 34 39 23 04 | 84 91 4d 1d 1d 39 77 e7 bb f1 e3 79 e8 0b 4e 9f | 52 2d 52 8d 33 23 04 37 3b 2c 9b 0f 37 da 18 16 | 07 6b 4f 80 6f e8 48 15 68 23 83 ca b6 b1 12 eb | 29 00 00 24 d5 f8 b0 cb f4 3b d7 c6 a9 5b 1f ef | 6f 5a 34 02 07 02 b5 92 c9 43 df 42 45 9e 46 a4 | f2 42 44 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 70 b3 40 c0 d2 23 ad 4c 6d 70 f1 | 0b c9 5a 99 fd 55 fa c5 00 00 00 1c 00 00 40 05 | fc 9d 2b d9 20 f9 c1 0e d3 88 83 de d6 d0 5e 66 | 9c 2c 6f e5 | libevent_free: release ptr-libevent@0x7fb34801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e8820 | #43 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc ee 6c 19 e2 66 91 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #43 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #43 | rejected packet: | cc ee 6c 19 e2 66 91 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #43: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #145 | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #145 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #145 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49612.406011; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500676 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90440 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #145 | libevent_malloc: new ptr-libevent@0x7fb34801d920 size 128 "road-eastnet-nonat-145" #145: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #145) | a6 a1 9f 1d 3f 3a 29 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 ad 76 df ba ca 18 92 b9 50 e2 27 a3 57 3f f5 | d7 ce ae 5d 80 a9 09 c6 8a 53 e3 ab 22 af 0e a7 | 88 2e e6 ed 37 ce 02 dd 03 71 9a aa 64 d1 00 5c | 54 65 05 0e 62 cb 77 34 78 e8 1d 0f 3c 6f 76 4f | d8 fc 9f c4 10 87 e5 9a b0 72 db 0a 63 63 0e ec | a2 67 9d 72 98 db 53 5f a6 6f e8 b3 98 59 aa 3b | 88 1a a2 8d d0 7f c4 94 06 61 c1 99 f9 c0 e1 fc | 19 b1 6a 14 b7 fd 63 fd d3 3b 83 b6 f1 f8 68 d2 | 13 f3 e6 28 90 fe d0 d0 88 c6 ca e3 4e 56 e1 09 | b8 4b c6 48 c4 d4 00 e6 af d0 6c fa ac 01 46 d9 | 68 30 67 9c 6d 90 ca de 4f 57 74 b7 7a b8 1b 41 | a9 90 f5 03 0d 89 d9 ac 42 f8 f9 ae 19 2a 88 37 | d2 a9 69 9e 81 b2 1c 52 07 de 0f fa d0 69 b1 a8 | 12 38 cf d3 2e 09 65 b8 1c da 6e 0b 4d 41 c0 65 | 80 dc 01 75 47 41 de 6c 83 4d 93 25 86 5c 1b c8 | f3 08 39 71 bd f1 c4 fe f5 43 e7 4c 77 94 d2 cc | 29 00 00 24 03 a8 59 45 29 a4 02 15 24 82 5a 54 | 64 ac fd bc 55 59 ba ca b7 e9 80 0d f2 9c bd f0 | d3 a5 de f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 e0 ba e6 72 d8 87 8f de 74 38 1d | 19 eb b3 76 79 6b d3 38 00 00 00 1c 00 00 40 05 | 6f 55 64 02 f2 84 7e 5a 25 36 99 f3 de 2c 7f 97 | 3a 54 f2 52 | libevent_free: release ptr-libevent@0x7fb35c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #145 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 a1 9f 1d 3f 3a 29 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #145 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #145 | rejected packet: | a6 a1 9f 1d 3f 3a 29 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #145: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28af0 | handling event EVENT_RETRANSMIT for parent state #124 | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #124 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #124 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49612.41142; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001776 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #124 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 "road-eastnet-nonat-124" #124: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #124) | 8e 52 ee 7a 33 75 3f 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 57 9a 04 43 62 52 e5 fc b5 c2 fe cc ad 34 2f | 82 f3 00 f6 ee 21 08 77 c9 b1 bb 69 fe 78 0f 21 | bf 36 0c 3c d2 28 d9 56 83 ae 1a 8d 60 fc ba 85 | 54 56 0c 31 1b 34 8f 99 3a cf de 75 87 a0 b6 a4 | d8 62 39 46 a5 f4 50 6b 49 13 47 6a b8 07 fd 9b | a0 24 9b 8e 36 86 71 8d 3a 86 06 ec 43 9f d0 fa | fb 5f d7 26 3c ad 44 31 62 f2 eb 50 ab 84 4b c8 | 92 d2 94 d1 cf 28 72 53 f0 98 5e 24 79 26 3e b6 | 8a 49 4d a1 69 34 ff 0b 63 f0 6a 98 fb 9b 9e fc | 07 2e cd bb 5b c5 49 f8 a9 bd 52 eb e2 d4 29 6f | e4 1e 81 a0 d3 65 f5 f3 07 20 20 0d 39 fe 60 11 | 31 d5 df 57 2f d9 ac 24 3b 95 8a 93 3c 37 3c fe | 00 f5 ae e3 8b 73 07 19 bf 7a 74 b9 19 54 31 a8 | c6 05 b4 3c c9 b4 f2 d1 4f 8d c4 e7 6c 6b d7 8c | a7 72 14 8c da 9f 42 94 91 f0 27 3c ef a5 63 c0 | 4b e5 9c 5d a2 4a 47 0f 02 ed 81 c6 7a 36 ca c0 | 29 00 00 24 35 37 ad 9e 25 61 50 57 d7 60 4e 9e | 7c 24 2e 8d b9 f6 52 07 e6 cf b3 cb 88 5a c5 03 | c4 c6 aa c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 73 0e 7d 3a 1d a8 f9 ef 84 7c a6 | 0b 05 4a f4 88 18 b0 42 00 00 00 1c 00 00 40 05 | 95 90 15 33 51 5d ad 36 64 2a 62 55 cb ba 4d 6f | 9b 17 ee 8d | libevent_free: release ptr-libevent@0x7fb3700251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28af0 | #124 spent 0.225 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 52 ee 7a 33 75 3f 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #124 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #124 | rejected packet: | 8e 52 ee 7a 33 75 3f 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #124: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0777 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28ab0 | handling event EVENT_RETRANSMIT for parent state #138 | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #138 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #138 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49612.415861; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001401 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4bfd0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #138 | libevent_malloc: new ptr-libevent@0x7fb3700251c0 size 128 "road-eastnet-nonat-138" #138: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #138) | 9e 04 07 cd 3c 90 2d 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 26 9c 69 c2 fb a0 0a d4 c6 8a e3 3a 35 d9 72 | c4 6d dc 97 97 46 4f 49 45 f3 89 7c 26 93 32 59 | 0e 55 34 82 9b 12 80 e6 60 cd 9e 59 15 f7 7d 65 | 53 e2 d3 d8 c2 ed 2c ad 8a b3 a9 0f 4d 3e ac 86 | 1c 67 54 95 04 00 bf 86 4e 8b bf af 44 15 eb 62 | ea cc 94 5a 6b 1a 81 0f 38 cc a4 0b 8b 3e f7 1f | ed 1b ee bf 3c b7 b3 6b c3 78 66 29 1f dc 55 cd | cd 9e c4 55 82 0d 26 16 81 1d 3b 87 44 bb 54 ef | 02 0c 05 f7 04 a0 83 3c c1 fe 2c d3 4e 3d ca 62 | 71 e8 db ac f9 9d 90 a6 0d 1e d9 94 f5 c3 29 22 | f5 2c d8 67 db 54 e1 d3 df b5 df 85 0d 36 cf 0c | 0f 08 0d 38 84 31 cd 9b 35 a0 fd df e8 86 86 f3 | a8 84 f3 56 c8 9a eb 02 1a c2 37 30 b1 0d 51 72 | 6c ba 2c ab f4 fb 66 85 22 97 66 d7 6b a3 32 2b | 57 22 c0 38 a7 76 1b d3 ea e0 94 87 f8 5d 23 88 | 1d 92 5d 32 0c 98 0b 93 d1 e9 b6 e4 2e 67 5c f1 | 29 00 00 24 e6 24 a9 20 36 d0 44 65 2c ba 3d 80 | 21 f7 06 3f 8d eb de 66 e7 ca a9 01 80 86 00 a0 | 79 48 c1 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 af 88 b2 43 70 03 fc c5 39 dd 7b 65 | af e5 61 63 70 8d 5a 32 00 00 00 1c 00 00 40 05 | 84 c7 81 66 9c 3a cd fa d9 98 02 0d f2 5f b1 72 | 68 cd 62 b2 | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28ab0 | #138 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e 04 07 cd 3c 90 2d 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #138 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #138 | rejected packet: | 9e 04 07 cd 3c 90 2d 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #138: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-153" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-153' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #153 at 0x557d46aa5500 | State DB: adding IKEv2 state #153 in UNDEFINED | pstats #153 ikev2.ike started | Message ID: init #153: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #153: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #153; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-153" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-153" IKE SA #153 "road-eastnet-nonat-153" "road-eastnet-nonat-153" #153: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-153 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-153": constructed local IKE proposals for road-eastnet-nonat-153 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 153 for state #153 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a28ab0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #153 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 | #153 spent 0.155 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-153" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 13 resuming | crypto helper 13 starting work-order 153 for state #153 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 153 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 153 time elapsed 0.000991 seconds | (#153) spent 0.997 milliseconds in crypto helper computing work-order 153: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 153 for state #153 to event queue | scheduling resume sending helper answer for #153 | libevent_malloc: new ptr-libevent@0x7fb35c0300e0 size 128 | crypto helper 13 waiting (nothing to do) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.242 milliseconds in whack | processing resume sending helper answer for #153 | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 153 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #153 | **emit ISAKMP Message: | initiator cookie: | ed 10 7e d3 7b 33 74 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-153 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c6 23 2b fa a2 7a a7 c0 a4 0c c7 9f 58 c4 e7 e8 | ikev2 g^x 70 a1 a8 0f 51 5f a2 04 f4 14 9f d7 e2 33 9b d1 | ikev2 g^x 70 a9 9d e5 73 3e d4 0c 84 28 f3 47 b9 3c 03 49 | ikev2 g^x 98 c3 54 58 79 2a 6a d2 f7 19 34 3f ea 9b 09 66 | ikev2 g^x 26 4b 77 9a 2e 2d 06 7d b1 99 09 62 d6 ef 52 44 | ikev2 g^x 03 d0 e7 2e 96 a1 8d 5c ea 4e a7 ca 7e fb ac a0 | ikev2 g^x 2f ea 86 d8 ac 11 f8 20 6b 77 af c2 6c 84 38 e7 | ikev2 g^x 8a b3 d4 12 59 8f 14 90 f8 a1 09 66 1f 57 d8 3c | ikev2 g^x 73 c4 11 8b a8 7f b3 1e 97 ed 1c 65 90 26 33 5b | ikev2 g^x 30 76 3b 3b d5 b4 96 62 cb 7d 86 9d ad 4a 9e e5 | ikev2 g^x 2b b2 c9 9e 69 f5 8a e4 08 29 24 90 1c 8f 81 c4 | ikev2 g^x d0 5a 30 f4 83 2c f9 11 5c 07 b1 f7 f6 7a 22 ac | ikev2 g^x 46 53 33 91 c1 25 ad 6c f8 ee d4 49 b1 09 fc 61 | ikev2 g^x 27 91 e2 9d 17 78 bb a6 45 04 eb ad 01 76 59 27 | ikev2 g^x df 49 c6 69 61 22 0d b2 77 f2 e5 49 0e d0 19 37 | ikev2 g^x f9 e3 3c 5d ab 0d ee 24 0e 3a 1b 87 b3 59 f2 dd | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 11 3e 89 f2 e4 5a b4 91 6f f3 6f e0 10 78 d4 00 | IKEv2 nonce e7 63 f4 34 67 6a f8 b4 dc 99 94 12 b9 1e 59 e2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ed 10 7e d3 7b 33 74 b8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 99 | natd_hash: port= 01 f4 | natd_hash: hash= cc 1e 02 bf 67 12 0b 49 15 df fb a0 1b e0 2a 30 | natd_hash: hash= f1 cf bd 20 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cc 1e 02 bf 67 12 0b 49 15 df fb a0 1b e0 2a 30 | Notify data f1 cf bd 20 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ed 10 7e d3 7b 33 74 b8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ce 1d 48 38 8b bc 75 71 1c ff 01 f5 d1 af 95 90 | natd_hash: hash= 14 3b df 16 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ce 1d 48 38 8b bc 75 71 1c ff 01 f5 d1 af 95 90 | Notify data 14 3b df 16 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #153 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #153: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #153 to 4294967295 after switching state | Message ID: IKE #153 skipping update_recv as MD is fake | Message ID: sent #153 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-153" #153: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.153:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #153) | ed 10 7e d3 7b 33 74 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 23 2b fa a2 7a a7 c0 a4 0c c7 9f 58 c4 e7 e8 | 70 a1 a8 0f 51 5f a2 04 f4 14 9f d7 e2 33 9b d1 | 70 a9 9d e5 73 3e d4 0c 84 28 f3 47 b9 3c 03 49 | 98 c3 54 58 79 2a 6a d2 f7 19 34 3f ea 9b 09 66 | 26 4b 77 9a 2e 2d 06 7d b1 99 09 62 d6 ef 52 44 | 03 d0 e7 2e 96 a1 8d 5c ea 4e a7 ca 7e fb ac a0 | 2f ea 86 d8 ac 11 f8 20 6b 77 af c2 6c 84 38 e7 | 8a b3 d4 12 59 8f 14 90 f8 a1 09 66 1f 57 d8 3c | 73 c4 11 8b a8 7f b3 1e 97 ed 1c 65 90 26 33 5b | 30 76 3b 3b d5 b4 96 62 cb 7d 86 9d ad 4a 9e e5 | 2b b2 c9 9e 69 f5 8a e4 08 29 24 90 1c 8f 81 c4 | d0 5a 30 f4 83 2c f9 11 5c 07 b1 f7 f6 7a 22 ac | 46 53 33 91 c1 25 ad 6c f8 ee d4 49 b1 09 fc 61 | 27 91 e2 9d 17 78 bb a6 45 04 eb ad 01 76 59 27 | df 49 c6 69 61 22 0d b2 77 f2 e5 49 0e d0 19 37 | f9 e3 3c 5d ab 0d ee 24 0e 3a 1b 87 b3 59 f2 dd | 29 00 00 24 11 3e 89 f2 e4 5a b4 91 6f f3 6f e0 | 10 78 d4 00 e7 63 f4 34 67 6a f8 b4 dc 99 94 12 | b9 1e 59 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cc 1e 02 bf 67 12 0b 49 15 df fb a0 | 1b e0 2a 30 f1 cf bd 20 00 00 00 1c 00 00 40 05 | ce 1d 48 38 8b bc 75 71 1c ff 01 f5 d1 af 95 90 | 14 3b df 16 | state #153 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a28ab0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28ab0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #153 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 | #153 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49612.420342 | resume sending helper answer for #153 suppresed complete_v2_state_transition() and stole MD | #153 spent 0.473 milliseconds in resume sending helper answer | stop processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c0300e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 10 7e d3 7b 33 74 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #153 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #153 | rejected packet: | ed 10 7e d3 7b 33 74 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #153: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000d120 | handling event EVENT_RETRANSMIT for parent state #44 | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #44 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #44 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49612.436561; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004401 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28af0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #44 | libevent_malloc: new ptr-libevent@0x7fb35c0300e0 size 128 "road-eastnet-nonat-44" #44: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #44) | 2c a5 57 82 94 bb 0c bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f f1 d9 3a 5c ec da ab 46 a0 1a 50 8e c5 b2 4a | 63 93 0d d6 bb 0b cb a2 7b 64 4c d6 0d 5d 75 c0 | a4 fb 12 20 36 86 d2 5a 85 de 9f 1a 56 dd 51 88 | 1f dd 14 6d 54 37 65 2c 39 00 b9 0b d0 9a b8 93 | dd 72 9a 78 33 2f fe d8 37 67 48 08 b2 16 1f 29 | 2a f2 be 3c 42 f3 72 0d 31 7d f4 16 71 3f 2a 28 | a2 72 a2 07 56 93 05 b3 01 4f f8 0a 3d 17 c2 61 | 36 84 95 ef b4 4f 95 5b 93 28 0b 0c 46 73 8a 49 | 11 16 41 b2 73 0b 44 cf a4 af 2f d7 2a 7a 6d 3e | 45 30 bc f5 de 74 14 4c f1 52 50 35 c7 29 67 5d | 02 d9 88 3e 6a e4 83 d6 7c b8 69 a3 7c 7f 9b 8b | 37 21 48 68 00 9a 01 a3 9a d7 3b 02 8c 67 ac 11 | 42 36 9e 84 ad 85 da a3 35 c1 ee c3 6a 24 37 55 | cc 67 9a 57 48 6e 0b 5c b6 9c 4d 16 ed 25 57 02 | 16 2f e6 f6 ce 2a b1 ca e6 1e 1f f9 44 d1 46 60 | 1f 00 3a 24 c7 f4 7b 04 f3 08 7e 6f de 0b 6c 0f | 29 00 00 24 c3 85 c7 9f 53 c2 4b 6d 4a b2 71 6f | 5f 3f 70 d0 bf 0d 26 13 04 46 9b 8c 51 07 8b 19 | bb fc 96 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f 56 cd 95 dd 34 fe 03 70 04 69 b5 | 7b 30 2c 80 a8 67 5b f1 00 00 00 1c 00 00 40 05 | 20 cd 88 b3 c4 29 91 b7 4b 43 e6 f4 9f a3 71 4b | c5 83 8c 17 | libevent_free: release ptr-libevent@0x7fb360012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000d120 | #44 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c a5 57 82 94 bb 0c bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #44 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #44 | rejected packet: | 2c a5 57 82 94 bb 0c bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #44: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a43dd0 | handling event EVENT_RETRANSMIT for parent state #97 | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #97 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #97 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49612.44485; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004625 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #97 | libevent_malloc: new ptr-libevent@0x7fb360012840 size 128 "road-eastnet-nonat-97" #97: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #97) | 7c 9c 8d d2 c5 3c 3b 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 98 e5 dd bd 5b c0 22 fb 24 a8 9d 4b ca 6c 72 | 78 61 7f 8f 02 15 b8 56 b3 c2 d4 89 90 42 e9 ae | b3 56 28 83 de be c5 dc f3 99 87 bf 7c 20 cf 1e | 80 26 a3 f6 7f d4 66 5c a2 37 d4 2d 88 37 5b ee | 37 eb f6 f3 73 47 4e f2 3e 1b de e1 36 54 bd 6f | 97 78 ce cb 16 0a da 34 fa 11 bc e7 e5 27 11 6b | 72 0d 9c de de 06 66 d8 74 64 a9 64 0b 12 b1 e7 | 15 84 3a 8c d9 6a d5 46 6c 00 4b f9 69 74 47 d1 | f3 79 bc d4 c9 0f 58 86 00 a5 0b 46 4c d7 20 78 | 99 ce 0d 0d cd 99 98 27 cc ce 50 e5 63 fc 25 ec | 4a 78 c1 76 a6 35 df cd 30 8a 57 10 1a b9 c6 85 | f5 05 46 77 76 2a ba 40 b5 da 98 c0 91 e5 03 c9 | 47 7d 79 56 d6 82 48 c6 a2 b4 f6 fc f6 16 30 98 | d9 b0 79 c5 33 a4 80 eb bb 99 51 9a 3b 3b ae a3 | 9b a3 5f 5f ce 23 78 fd 36 29 21 9b 24 8f 30 93 | 1f 0b 71 91 41 28 b6 d5 e2 dd ce 67 83 67 83 41 | 29 00 00 24 4a 40 88 f3 3a ca ff 58 9b 48 04 9a | a8 d0 f5 15 e8 12 b6 3b 4a 95 b2 73 79 da d4 a0 | df 94 6f b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 5b 76 c7 df cc 29 e7 8f 6d d6 7a | e3 d4 c1 e2 a2 33 fe 59 00 00 00 1c 00 00 40 05 | 63 90 91 6f c8 44 50 2a ff 12 5c 17 cd fa e6 2d | 07 cd 17 d6 | libevent_free: release ptr-libevent@0x7fb34c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a43dd0 | #97 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 9c 8d d2 c5 3c 3b 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #97 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #97 | rejected packet: | 7c 9c 8d d2 c5 3c 3b 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #97: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #146 | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #146 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #146 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49612.47212; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500588 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a43dd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #146 | libevent_malloc: new ptr-libevent@0x7fb34c01d920 size 128 "road-eastnet-nonat-146" #146: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #146) | 44 6c 8c 11 77 9b c1 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b e4 4b 01 63 76 c0 7a c8 2d 36 69 32 60 94 ea | 6d 55 57 2b 4e ff 0e 39 b8 87 ae 9d 5d a1 84 c3 | fd 7e 75 5e b5 db f9 c0 f2 b4 77 67 0c bc 83 d2 | b3 2c 18 7b 18 da 84 81 dc 1d 09 bc ef cb 96 0b | 54 3e 13 a5 2c e8 26 52 c4 b3 5b d7 9c b8 e6 22 | f7 8d 8e 88 21 d1 87 46 36 62 d4 63 42 41 4c 1f | 8f 43 21 27 b3 df 00 21 d1 8d 41 5a e5 9f 04 8b | ff c6 a4 97 a5 12 34 cb aa c2 51 13 9f 26 59 55 | a5 7b 2f 9e 53 52 08 32 a2 06 5f 18 aa a0 ac 8a | 4c 25 e1 2e cb 23 eb 05 33 52 1c b1 e7 32 06 d0 | 42 ed ad 95 48 c5 eb 3d 1a cb f5 6d dc 2f a2 a8 | 4e 15 75 28 ce 0c d4 fb 09 18 56 79 e6 17 c1 dd | e4 ed 35 be 6f e9 12 84 6e 1e 87 b9 38 ca fc f5 | d4 85 cf 4e a3 1f db 6c 1f e5 f2 54 ba 88 10 cb | 4e bc 46 9b 79 cb 0a 36 af 61 69 14 f8 97 5e 9d | 27 b8 f4 1b 36 1d 0b 8b f0 e7 f8 06 78 36 dc d7 | 29 00 00 24 79 24 14 13 36 a3 2b 17 a4 40 30 01 | 57 eb a4 ff f9 15 14 cb 86 dc 31 a7 64 7c e3 06 | ae fb 59 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 46 87 8a 4c 47 2e ae ab e2 03 f4 | cf 0f 35 fc df 03 af ad 00 00 00 1c 00 00 40 05 | 7f ed fa 9e 74 b9 38 c0 e7 89 49 8c f1 a3 30 c7 | bc 00 44 f5 | libevent_free: release ptr-libevent@0x7fb36402a780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #146 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 6c 8c 11 77 9b c1 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #146 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #146 | rejected packet: | 44 6c 8c 11 77 9b c1 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #146: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0457 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #125 | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #125 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #125 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49612.478414; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002356 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #125 | libevent_malloc: new ptr-libevent@0x7fb36402a780 size 128 "road-eastnet-nonat-125" #125: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #125) | f8 42 71 02 91 3f e5 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 9e 73 35 93 13 e2 cc 9b bb 37 d3 75 99 15 b9 | c8 4a ce 55 d3 69 e2 90 ce b4 49 6a 8b 41 15 d7 | f2 46 e0 27 62 0c f2 50 c4 fb 7a 1e 5f c1 57 37 | ab d6 7e 39 28 cf 50 b1 15 3d a6 21 69 94 78 9b | 54 78 01 d1 17 2e a1 fd 93 52 02 9b 3c fa 9a 7e | f8 6f 1b 35 4d b8 9a ab 6d e7 64 f6 f2 1a 64 ed | d4 92 58 2f 44 f7 44 27 44 49 1f 1e 22 3d 31 b1 | 50 2c 4d bf f2 3d 61 05 62 ba 25 68 46 81 35 68 | ee 83 cc 8e 2f 04 b6 7e f4 22 67 88 a2 a7 7a f7 | d0 39 1f 83 7d bc f9 79 5c 9d a8 05 2d 41 b5 ef | cc 86 a3 2b c2 79 2a 6d ea bc cb e6 b2 db 61 3a | 30 32 b0 ff 93 a0 20 c1 58 b9 6f 0c 98 fb c0 64 | d2 03 d7 d7 ac 87 bc 66 28 b7 cc 94 87 ea 24 29 | 58 cf 8f 26 39 81 cd e2 dc 0f e9 13 b2 ad b9 3b | 9a e1 c6 4a a2 fb 0d d5 e3 d1 b9 df 52 b9 c6 69 | 37 c0 e4 dc a2 a0 32 29 a3 ce 29 ec cc 5f 70 82 | 29 00 00 24 10 12 73 da 9a 48 c8 49 81 7a 15 0b | 6c a0 98 5f 53 25 0d 7d 05 70 86 c7 7b b0 fa 34 | 5d 40 8d 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 88 74 d5 c4 71 1e 67 79 c5 82 86 | 3b ab 9f 01 a1 7f ec b6 00 00 00 1c 00 00 40 05 | cc 1e cf e5 ba 96 b4 e9 50 32 59 97 59 23 89 39 | 4f 1c 94 28 | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | #125 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 42 71 02 91 3f e5 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #125 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #125 | rejected packet: | f8 42 71 02 91 3f e5 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #125: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-154" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-154' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #154 at 0x557d46aa6ac0 | State DB: adding IKEv2 state #154 in UNDEFINED | pstats #154 ikev2.ike started | Message ID: init #154: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #154: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #154; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-154" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-154" IKE SA #154 "road-eastnet-nonat-154" "road-eastnet-nonat-154" #154: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-154 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-154": constructed local IKE proposals for road-eastnet-nonat-154 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 154 for state #154 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a468d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #154 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 | #154 spent 0.11 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-154" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.172 milliseconds in whack | crypto helper 17 resuming | crypto helper 17 starting work-order 154 for state #154 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 154 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 154 time elapsed 0.000656 seconds | (#154) spent 0.665 milliseconds in crypto helper computing work-order 154: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 154 for state #154 to event queue | scheduling resume sending helper answer for #154 | libevent_malloc: new ptr-libevent@0x7fb3500300e0 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #154 | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 154 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #154 | **emit ISAKMP Message: | initiator cookie: | 58 44 d0 f4 a9 dc 50 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-154 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 97 19 a5 f0 13 d1 8a b9 49 96 a8 fe 61 6f 4c e6 | ikev2 g^x ed 98 cc 8a 65 9d e4 af 10 e6 cf 62 f8 4a ff 02 | ikev2 g^x 90 85 dd 9e 23 5d 3e 90 f8 fe da b0 af 0e f7 4d | ikev2 g^x 4a 05 63 a1 69 db d1 01 e1 b1 0c 86 c9 3e 7d 9b | ikev2 g^x a4 2a 0f 98 09 40 36 8c 8d db ff 98 96 15 32 bf | ikev2 g^x 21 16 30 40 ae ae fb 4d 47 43 6a 1d c4 ee 0d b8 | ikev2 g^x 26 d3 b2 3f 2c ab f7 f8 0e a5 40 0f 3a fc 7c 80 | ikev2 g^x cc 8b 34 d2 f1 7f 26 73 45 a4 a9 ed 44 96 56 b1 | ikev2 g^x 73 9b 2b 0c 92 10 cb f0 48 16 48 7a 38 20 64 1d | ikev2 g^x 96 ee 19 8c 5c 7f a1 2d 3c cf aa b0 87 20 50 5a | ikev2 g^x d7 fe ed 1e da e9 09 e6 09 9a 75 a1 17 60 9e 3f | ikev2 g^x eb eb 3b 4a e8 5b e7 e1 61 2b a2 e0 ec 37 4d 19 | ikev2 g^x 5f 61 62 98 dd f9 aa d9 4b 8e bd 76 64 f0 89 37 | ikev2 g^x 39 0c 99 e6 f2 9b c5 88 8a eb 5b 10 1d 66 5f 10 | ikev2 g^x c6 5a 71 1c 22 22 ac a4 dd 72 16 46 60 ff 04 a0 | ikev2 g^x 8f 7a b8 da e1 39 b2 3e 50 39 72 e6 6a 86 81 1e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8a 71 f4 36 cf 99 83 f2 20 30 a8 af 91 e1 58 d7 | IKEv2 nonce 2f 81 0b 43 f4 5f a3 87 48 cc 52 31 9b 27 40 b3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 58 44 d0 f4 a9 dc 50 75 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9a | natd_hash: port= 01 f4 | natd_hash: hash= 01 21 57 f3 9f 4c 07 c6 03 b1 b0 7f 5c 7f 90 aa | natd_hash: hash= ef 12 66 a4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 01 21 57 f3 9f 4c 07 c6 03 b1 b0 7f 5c 7f 90 aa | Notify data ef 12 66 a4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 58 44 d0 f4 a9 dc 50 75 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= de 38 70 15 e3 5a 3a 70 b8 42 a9 af 5d 6c a1 ee | natd_hash: hash= f3 f1 65 20 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data de 38 70 15 e3 5a 3a 70 b8 42 a9 af 5d 6c a1 ee | Notify data f3 f1 65 20 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #154 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #154: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #154 to 4294967295 after switching state | Message ID: IKE #154 skipping update_recv as MD is fake | Message ID: sent #154 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-154" #154: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.154:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #154) | 58 44 d0 f4 a9 dc 50 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 19 a5 f0 13 d1 8a b9 49 96 a8 fe 61 6f 4c e6 | ed 98 cc 8a 65 9d e4 af 10 e6 cf 62 f8 4a ff 02 | 90 85 dd 9e 23 5d 3e 90 f8 fe da b0 af 0e f7 4d | 4a 05 63 a1 69 db d1 01 e1 b1 0c 86 c9 3e 7d 9b | a4 2a 0f 98 09 40 36 8c 8d db ff 98 96 15 32 bf | 21 16 30 40 ae ae fb 4d 47 43 6a 1d c4 ee 0d b8 | 26 d3 b2 3f 2c ab f7 f8 0e a5 40 0f 3a fc 7c 80 | cc 8b 34 d2 f1 7f 26 73 45 a4 a9 ed 44 96 56 b1 | 73 9b 2b 0c 92 10 cb f0 48 16 48 7a 38 20 64 1d | 96 ee 19 8c 5c 7f a1 2d 3c cf aa b0 87 20 50 5a | d7 fe ed 1e da e9 09 e6 09 9a 75 a1 17 60 9e 3f | eb eb 3b 4a e8 5b e7 e1 61 2b a2 e0 ec 37 4d 19 | 5f 61 62 98 dd f9 aa d9 4b 8e bd 76 64 f0 89 37 | 39 0c 99 e6 f2 9b c5 88 8a eb 5b 10 1d 66 5f 10 | c6 5a 71 1c 22 22 ac a4 dd 72 16 46 60 ff 04 a0 | 8f 7a b8 da e1 39 b2 3e 50 39 72 e6 6a 86 81 1e | 29 00 00 24 8a 71 f4 36 cf 99 83 f2 20 30 a8 af | 91 e1 58 d7 2f 81 0b 43 f4 5f a3 87 48 cc 52 31 | 9b 27 40 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 21 57 f3 9f 4c 07 c6 03 b1 b0 7f | 5c 7f 90 aa ef 12 66 a4 00 00 00 1c 00 00 40 05 | de 38 70 15 e3 5a 3a 70 b8 42 a9 af 5d 6c a1 ee | f3 f1 65 20 | state #154 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a468d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #154 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 | #154 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49612.482024 | resume sending helper answer for #154 suppresed complete_v2_state_transition() and stole MD | #154 spent 0.358 milliseconds in resume sending helper answer | stop processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3500300e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 44 d0 f4 a9 dc 50 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #154 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #154 | rejected packet: | 58 44 d0 f4 a9 dc 50 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #154: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a67330 | handling event EVENT_RETRANSMIT for parent state #139 | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #139 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #139 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49612.48318; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002333 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e8820 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #139 | libevent_malloc: new ptr-libevent@0x7fb3500300e0 size 128 "road-eastnet-nonat-139" #139: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #139) | 98 4d 89 18 32 14 8f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb bc f6 61 86 12 c3 bf 44 ad ab c8 f8 6d 1d 7a | 8e 0b a1 af 30 f0 3a 9c 0b 72 59 7b 0e cc 41 e5 | 8e 8e a0 7e 30 1e 50 82 23 bf b6 e1 69 ee be 0d | cc 36 07 e5 53 86 7d cf f5 63 8d 89 06 e8 7e 7e | 8f 2c 9d a8 ed 05 f6 a5 d3 42 db b5 95 59 0b 32 | 04 71 41 13 63 f9 4a 4c 42 0e 00 d5 c5 99 ba ab | 17 4c ce 49 6c 52 88 21 1f b3 2a 6c 8d cc 9d ad | 58 96 b7 c5 a6 44 e9 2c bb f7 31 ef f0 0b f9 1c | 1b 4e 21 f5 a2 ea 26 1f 03 aa b4 4e 34 e2 87 84 | cf 38 c7 5e ef db 85 1f 03 a7 73 48 68 be 7e b1 | 00 74 8f e9 65 a8 0b 8a 27 e7 a0 51 5b c9 e3 2d | 64 f7 22 1b 1e b7 6f af e1 0f 11 f6 9b 82 c4 de | 33 fe da 26 0e d7 f8 c3 43 49 4f e1 38 7e 8a 70 | 40 40 85 6b ea cf c0 b6 a0 c2 ac 2b eb 0c 58 ce | 0e cd 1f 9c 72 bb e0 55 da 15 7c 5d ad 4e 80 77 | d9 86 7e 35 e9 dd 73 d2 de c2 f2 ae 3e 6a 77 fd | 29 00 00 24 ce a2 61 71 0b 59 18 45 32 ff fc 20 | d2 f9 be 9d 52 e8 20 ba 16 46 42 c2 a8 74 a7 11 | 49 eb 52 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 5e 21 46 6e c2 25 7d 16 7d 1e 10 | d1 b7 00 9d a8 c1 7e fa 00 00 00 1c 00 00 40 05 | 95 96 61 58 5f 24 29 d9 13 26 c9 57 d8 b0 16 e2 | 35 e6 bc 7d | libevent_free: release ptr-libevent@0x7fb3700300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a67330 | #139 spent 0.0878 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 4d 89 18 32 14 8f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #139 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #139 | rejected packet: | 98 4d 89 18 32 14 8f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #139: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0403 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #45 | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #45 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #45 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49612.502449; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006731 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a67330 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #45 | libevent_malloc: new ptr-libevent@0x7fb3700300e0 size 128 "road-eastnet-nonat-45" #45: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #45) | a3 bb a6 38 bf 16 36 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 bf 7f b3 da cb 24 f0 9d 9b d3 fd dc cf db 07 | e6 5b 40 74 f8 99 0f 8a 69 5b 21 df 39 e1 ee 66 | 6e d2 eb aa da ff dd cd ef 30 5f f7 58 03 e1 db | 0d 74 f6 29 93 ca f1 42 fd ad b9 96 9c 2f 50 32 | 58 c3 21 d3 aa 48 12 01 4c e3 13 6e 9b ee 2d 74 | 42 be dc c8 fd 3f 8a d7 32 bc c2 52 53 8d f7 2a | 84 67 44 c8 2e dc 1a b1 bb 7e 48 68 aa 07 71 d2 | ed bb 6e e8 36 32 f2 a5 31 45 4d 85 68 10 11 40 | f6 85 5c 6f 85 60 44 96 50 66 ff a4 e4 4d 79 e9 | 3c a7 0e 91 f7 05 c3 d3 85 48 8e e8 a2 59 53 66 | 1c c3 08 ca 90 69 7f b0 5f 9c 5b ec cd 7e 11 67 | 1a 0f 4b b0 b3 89 8c 73 6f 1c d6 27 19 18 73 72 | 31 f5 6c a7 f0 f8 1b 36 35 8a f6 30 2e d1 b7 af | a6 2e 5d 9a f5 83 05 7a b2 73 c7 24 06 c8 92 6b | 85 fe 7f 79 f1 ba 3f d3 86 28 f4 16 3a 94 56 af | 55 d5 d6 bc 89 52 4c e8 34 d8 86 d5 fe 13 15 fe | 29 00 00 24 a8 f8 bf 2a 70 d8 0d e9 bf c1 0f 00 | 25 da 1d db 8f ac 61 b5 e1 f0 75 9a 00 6d 79 0f | ff f5 3b 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 ff e8 4e 79 94 20 d9 00 0d 87 37 | ed 16 46 76 d8 43 be 32 00 00 00 1c 00 00 40 05 | 2d 67 24 20 12 0e 18 8c 34 32 0f 7c 4f 51 94 df | fd 23 b8 c6 | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | #45 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 bb a6 38 bf 16 36 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #45 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #45 | rejected packet: | a3 bb a6 38 bf 16 36 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #45: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.073 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #98 | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #98 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #98 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49612.529834; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005717 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #98 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 "road-eastnet-nonat-98" #98: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #98) | 36 f6 17 30 89 34 87 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e de 22 15 b8 37 99 8a 19 60 74 d9 cc fb 93 74 | 46 52 5b 4c b2 15 42 20 b8 92 87 ba 2d f3 d7 43 | b5 37 b0 ea 4d f5 7a 45 62 c7 3f 47 fb 44 64 d3 | e1 f9 e0 4b e7 fb 3e 3d b1 04 53 7b 67 35 99 55 | 77 f9 c2 de 1c 5e 4e 46 02 3b e5 0c e9 31 90 64 | 6e cb e0 dd 1a 59 99 ef 3d a7 c1 9b 74 f9 45 3f | 99 cd de c7 d0 13 5f 2b 11 ac cd ff c9 47 2e 86 | 69 0d e8 ec 31 64 37 7f 01 74 30 f7 db 0e d0 fb | 8b 6d 9d cc 98 7f 1a b4 87 7d bf 2e 19 53 89 24 | 00 4f 0a 93 5d 06 c9 01 d3 dd 9f 4d 48 ee ba 48 | 79 5c 5f f3 cb 01 ba a7 ec 71 ed fd 64 af 41 a6 | ff 80 dd aa 0c ae 06 5c 0b a3 1c 56 84 5b 6c 26 | fd ff b3 07 94 15 1d 68 35 03 8e 60 07 84 12 f9 | ee d9 d1 91 a2 f4 75 f6 9e 29 11 0a 54 bc 2f 41 | 2c ea 22 ab ab 32 6a 0c 62 23 b1 4a 4b 29 bb 22 | de a9 03 f4 17 e0 39 72 79 31 e0 0a 30 fa 14 a0 | 29 00 00 24 dc e2 b9 cb c5 4c 15 ab 06 6c 97 a6 | 72 6b 55 8f 7d 14 aa 13 19 ae 9e 9d 27 a3 3a 17 | 86 0f 7c a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 94 a8 82 2a 1f 7d 1b 29 07 9f 80 | 75 97 d7 a2 ab 24 e8 8d 00 00 00 1c 00 00 40 05 | b8 4f 85 79 77 db f6 74 dd c9 e6 fd e8 91 c3 41 | 66 c0 f7 3b | libevent_free: release ptr-libevent@0x7fb35c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #98 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 f6 17 30 89 34 87 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #98 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #98 | rejected packet: | 36 f6 17 30 89 34 87 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #98: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0782 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a84000 | handling event EVENT_RETRANSMIT for parent state #147 | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #147 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #147 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49612.536211; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501053 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #147 | libevent_malloc: new ptr-libevent@0x7fb35c01d920 size 128 "road-eastnet-nonat-147" #147: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #147) | c9 49 59 84 c8 e5 a9 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 23 1f ef d0 ab 86 83 db 3a 42 1d 72 53 7f 1d | 10 99 05 4a 99 4f 3f 9a 98 88 bd df 90 bb 6b e6 | 5a 0a ce 6c 41 04 da 58 5d c4 4f ac da 97 26 a7 | 11 32 a8 06 1f e1 87 a2 42 1e e6 6a 0c 68 08 40 | f5 b9 1e 41 1b cf 5c 75 a8 60 06 b2 5f cf d9 87 | 6b e4 af 8e 02 f2 fa 22 10 06 d6 15 19 bb fa f0 | 66 24 d5 79 4a bf 96 b3 63 ad e6 0f 0b 5c f6 47 | 01 64 bd d8 46 3f e5 ea a4 26 5d e5 06 c2 a7 0f | 35 e2 b0 0a 2c 32 20 be 52 14 9d b5 0e ec 56 cf | b3 f0 bf 5e 01 73 a8 04 a0 e0 5c 8a fe 29 b1 7f | 37 66 a5 5b ec c8 06 fb 07 01 0f 4c 5e 63 33 d2 | 2f d4 5c 61 3e 3f 82 73 d1 fb c8 86 80 bb eb c9 | 28 2b cc 48 8d 11 24 24 01 fe 7a 40 83 2b 75 31 | d3 44 40 97 d2 ba 07 04 c5 0b 99 12 41 24 f8 ad | ae 7e f2 a1 cb 5b d9 cd e9 53 59 dd 6f dc 6a 90 | 39 c5 d7 b8 42 59 e8 06 c8 85 08 f1 c6 2d 85 3e | 29 00 00 24 56 cc b0 4f af 68 49 01 85 6b 57 3a | 2e bf 2e 45 7c 71 09 75 a1 1e fe 83 ec 88 f6 fe | d7 b8 8a 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 3a 80 78 a8 ce 4e 37 f2 7e 4e 6e | c2 ec 51 b5 d8 d3 ef c5 00 00 00 1c 00 00 40 05 | 80 dd aa b7 d6 9c 8d 45 3b 70 75 ca 6b f3 11 7a | 54 5b 54 8d | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a84000 | #147 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c9 49 59 84 c8 e5 a9 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #147 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #147 | rejected packet: | c9 49 59 84 c8 e5 a9 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #147: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-155" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-155' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #155 at 0x557d46aa8080 | State DB: adding IKEv2 state #155 in UNDEFINED | pstats #155 ikev2.ike started | Message ID: init #155: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #155: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #155; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-155" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-155" IKE SA #155 "road-eastnet-nonat-155" "road-eastnet-nonat-155" #155: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-155 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-155": constructed local IKE proposals for road-eastnet-nonat-155 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 155 for state #155 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a84000 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #155 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 | #155 spent 0.153 milliseconds in ikev2_parent_outI1() | crypto helper 18 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 starting work-order 155 for state #155 | RESET processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 155 | RESET processing: connection "road-eastnet-nonat-155" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.243 milliseconds in whack | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 155 time elapsed 0.000587 seconds | (#155) spent 0.586 milliseconds in crypto helper computing work-order 155: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 155 for state #155 to event queue | scheduling resume sending helper answer for #155 | libevent_malloc: new ptr-libevent@0x7fb3540300e0 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #155 | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 155 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #155 | **emit ISAKMP Message: | initiator cookie: | ba 2d 75 59 38 9a 40 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-155 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 33 2d 8b bd fb e0 3e 63 93 cb 94 a3 59 ba 66 52 | ikev2 g^x 15 4e 4f 76 34 6f 63 6c 04 46 3b 73 fd d8 a5 8e | ikev2 g^x 35 33 06 7a 8c 2a 4d a0 d2 b7 a5 ef 60 5a a8 23 | ikev2 g^x ae c6 93 50 9f f0 c3 f5 06 df 4c 45 c0 4d 3b 90 | ikev2 g^x 71 b1 18 44 3a bb 92 05 e2 cb 38 9c 05 04 9c e5 | ikev2 g^x 33 86 8c 22 6f 05 07 53 37 10 99 50 e7 0b 25 55 | ikev2 g^x 89 9d 75 47 09 a1 92 af c6 86 5d 17 e6 b3 28 20 | ikev2 g^x 26 34 0c 4e a0 b6 47 51 4c df 53 f2 97 03 03 a6 | ikev2 g^x 89 4b b3 92 4a ab b5 e2 4b 58 52 5d fc 27 cb e8 | ikev2 g^x 64 f4 d9 2f f4 95 21 72 e7 fe 03 93 84 af de ff | ikev2 g^x 1c 75 39 21 b3 f9 de 3e e2 ac 5f bb e7 9f 0c bd | ikev2 g^x 32 99 99 15 33 bb 7d f8 f9 aa 92 5a 38 4d 6d 97 | ikev2 g^x 0e 69 3d a1 d8 b7 8f 44 ed 36 63 50 f7 7e 74 d2 | ikev2 g^x 45 dc 02 6e 87 72 5d 06 c1 0c 87 2a 42 4a 0c 96 | ikev2 g^x e5 33 b2 8a 28 de 43 7b 5c 89 da 84 03 93 af 07 | ikev2 g^x 0f 41 63 be 8b 32 2d a1 13 d7 f4 a0 78 5d 7b 02 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1b 6f 61 ca 07 05 56 47 f0 44 a9 2b df 2e 5b cb | IKEv2 nonce e9 85 db 0d bf 4e 16 8e a5 b1 b6 3b d1 6b b0 4f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ba 2d 75 59 38 9a 40 df | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9b | natd_hash: port= 01 f4 | natd_hash: hash= b9 9d 23 9a a7 98 84 7a 80 70 0e 3e c4 f1 43 a7 | natd_hash: hash= 4e 6b 6b 59 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b9 9d 23 9a a7 98 84 7a 80 70 0e 3e c4 f1 43 a7 | Notify data 4e 6b 6b 59 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ba 2d 75 59 38 9a 40 df | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2e 42 b0 ef a0 75 a1 7c 37 dd 50 d1 c0 f7 e8 21 | natd_hash: hash= 72 07 2b e7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2e 42 b0 ef a0 75 a1 7c 37 dd 50 d1 c0 f7 e8 21 | Notify data 72 07 2b e7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #155 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #155: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #155 to 4294967295 after switching state | Message ID: IKE #155 skipping update_recv as MD is fake | Message ID: sent #155 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-155" #155: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.155:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #155) | ba 2d 75 59 38 9a 40 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 2d 8b bd fb e0 3e 63 93 cb 94 a3 59 ba 66 52 | 15 4e 4f 76 34 6f 63 6c 04 46 3b 73 fd d8 a5 8e | 35 33 06 7a 8c 2a 4d a0 d2 b7 a5 ef 60 5a a8 23 | ae c6 93 50 9f f0 c3 f5 06 df 4c 45 c0 4d 3b 90 | 71 b1 18 44 3a bb 92 05 e2 cb 38 9c 05 04 9c e5 | 33 86 8c 22 6f 05 07 53 37 10 99 50 e7 0b 25 55 | 89 9d 75 47 09 a1 92 af c6 86 5d 17 e6 b3 28 20 | 26 34 0c 4e a0 b6 47 51 4c df 53 f2 97 03 03 a6 | 89 4b b3 92 4a ab b5 e2 4b 58 52 5d fc 27 cb e8 | 64 f4 d9 2f f4 95 21 72 e7 fe 03 93 84 af de ff | 1c 75 39 21 b3 f9 de 3e e2 ac 5f bb e7 9f 0c bd | 32 99 99 15 33 bb 7d f8 f9 aa 92 5a 38 4d 6d 97 | 0e 69 3d a1 d8 b7 8f 44 ed 36 63 50 f7 7e 74 d2 | 45 dc 02 6e 87 72 5d 06 c1 0c 87 2a 42 4a 0c 96 | e5 33 b2 8a 28 de 43 7b 5c 89 da 84 03 93 af 07 | 0f 41 63 be 8b 32 2d a1 13 d7 f4 a0 78 5d 7b 02 | 29 00 00 24 1b 6f 61 ca 07 05 56 47 f0 44 a9 2b | df 2e 5b cb e9 85 db 0d bf 4e 16 8e a5 b1 b6 3b | d1 6b b0 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 9d 23 9a a7 98 84 7a 80 70 0e 3e | c4 f1 43 a7 4e 6b 6b 59 00 00 00 1c 00 00 40 05 | 2e 42 b0 ef a0 75 a1 7c 37 dd 50 d1 c0 f7 e8 21 | 72 07 2b e7 | state #155 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a84000 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #155 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 | #155 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49612.545065 | resume sending helper answer for #155 suppresed complete_v2_state_transition() and stole MD | #155 spent 0.472 milliseconds in resume sending helper answer | stop processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3540300e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 2d 75 59 38 9a 40 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #155 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #155 | rejected packet: | ba 2d 75 59 38 9a 40 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #155: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a67370 | handling event EVENT_RETRANSMIT for parent state #140 | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #140 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #140 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49612.546252; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000861 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8e0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #140 | libevent_malloc: new ptr-libevent@0x7fb3540300e0 size 128 "road-eastnet-nonat-140" #140: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #140) | 7b af c7 ac 06 7e 5a 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 03 39 d2 09 32 a1 ff 81 2d 15 dc 96 08 01 c1 | 8e 0a 6e 33 a6 3e 74 05 5c 15 33 12 1d f7 12 20 | db f5 3e 24 ba 17 01 dc a0 95 5b 2c 7b 77 c2 3e | 02 67 33 d7 d6 86 dc 63 50 16 65 87 a1 a9 2b c2 | 68 87 45 fa 03 db 21 3c 23 cd d5 14 5d 40 bf 10 | 6f 14 34 95 51 53 c7 d5 77 b9 67 66 94 9a cd 21 | 08 bb de 59 ba ca 48 d5 21 97 e5 28 87 2d fd 83 | d2 62 24 c7 7c f8 ac 68 7a f8 c3 7f 7d 8d 72 d0 | 9d 64 ef 67 4b f1 5c 24 57 ca c2 b1 9f b6 11 d3 | 07 3e 55 51 fc 73 7a 83 2c 11 87 97 33 3d 5c cd | 48 68 02 58 27 c2 fe 9a f6 51 01 87 b5 32 4d fc | 09 2c 09 a0 1f 82 25 e8 47 96 80 8e 9d 80 b5 a7 | 86 8d 11 ad 04 69 30 3a 7c 49 92 c3 9e 7f 81 14 | 42 d8 62 ef 10 0a 21 b2 bb b9 42 01 9c 86 19 33 | dd 9b 24 b9 8a d5 68 9d ee 00 85 c1 cc df b7 34 | d9 c8 e4 31 8c bd d3 67 7d ad 51 86 db 69 96 5d | 29 00 00 24 f8 43 b0 82 a0 04 df 35 49 ed 46 83 | 05 44 45 f4 4f f6 f3 e1 63 59 5a aa 3f 59 d1 20 | a6 81 b5 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a 8e a2 d1 63 df 73 41 77 f0 6a b9 | 17 c7 13 b6 69 6d 12 29 00 00 00 1c 00 00 40 05 | a8 9c d4 0d d7 3c af a8 56 f5 ab f4 4f 7a 90 fd | 96 a4 e3 47 | libevent_free: release ptr-libevent@0x7fb37402ff60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a67370 | #140 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7b af c7 ac 06 7e 5a 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #140 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #140 | rejected packet: | 7b af c7 ac 06 7e 5a 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #140: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7a390 | handling event EVENT_RETRANSMIT for parent state #126 | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #126 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #126 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49612.554579; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002245 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9b1c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #126 | libevent_malloc: new ptr-libevent@0x7fb37402ff60 size 128 "road-eastnet-nonat-126" #126: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #126) | e8 37 9e 74 e5 40 14 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 2e 1b 05 80 5b 31 08 d1 66 2e 5c f6 e3 82 b6 | cf 5f b9 6a dd 55 f8 75 d5 3d b8 5c bd 4f c2 50 | 0a c1 a5 ba ac d3 ed a9 a2 26 e9 cf 5d c3 e4 66 | fe 0f 85 c2 a3 49 2f d8 4a 79 55 9a fa 0f f5 79 | a1 74 22 f0 7e 0f 09 7b 62 ab a2 9e b4 ea 39 68 | 42 b2 f9 25 9e 6d 73 5b 0f 09 1e ea 93 29 57 3e | 0b 28 34 22 62 d9 38 bd 99 bc 2b d5 1f 39 74 2e | a0 e4 e1 6b 64 87 fc 4f 05 cf 11 87 31 49 19 0e | 81 e6 fe 59 5e 93 b2 b8 96 16 02 eb 5c 73 68 d5 | 8f 57 c4 c3 f1 4b 35 e7 45 9d 6f ab 95 16 38 da | 48 f9 98 9a 6a b3 e3 05 7e d3 b1 16 a3 ba 0c e1 | 94 2d b8 d2 c3 17 d4 a2 cf ba 7e e1 17 95 db f9 | 30 a3 18 b6 15 c5 b0 4b 3c 79 61 0d 1e 89 51 db | 9f 34 0b 87 9c ce 8f 37 05 a4 88 d5 17 64 46 6f | 94 21 dd 40 17 99 04 39 5f 44 53 61 87 2c 68 27 | 48 25 14 cc 6b a9 f6 c2 49 c7 4e ae 4c 5d 8d 5b | 29 00 00 24 d1 b1 6b 78 78 5e 9b dd d4 c3 b9 87 | 6c a1 e5 10 d6 78 32 5b 72 67 12 c8 56 ea b2 20 | 83 0f e6 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 48 05 b5 88 11 05 1e fc 96 b7 8b | c4 84 87 55 48 6d 71 7e 00 00 00 1c 00 00 40 05 | a7 78 89 b5 72 dc 59 97 b9 1b 86 02 9b 2c 28 d0 | 8e b7 7c 05 | libevent_free: release ptr-libevent@0x7fb37401f7f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7a390 | #126 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 37 9e 74 e5 40 14 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #126 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #126 | rejected packet: | e8 37 9e 74 e5 40 14 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #126: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #46 | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #46 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #46 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49612.593889; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006073 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7a390 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #46 | libevent_malloc: new ptr-libevent@0x7fb37401f7f0 size 128 "road-eastnet-nonat-46" #46: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #46) | b8 02 bd ab b2 01 5a b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 02 34 ab 29 73 17 93 9c d3 ac d4 2d a7 40 8f | 6c ab ce c1 cf 26 d8 e1 c0 a5 2f a8 7c e6 62 97 | 14 ae ce 27 9d 48 da 55 bb 1a 50 83 cd 98 7c 7e | 93 0d ef 6b a4 36 24 54 0e e8 77 76 0a 46 5c 28 | c7 d2 ff f1 d4 08 43 1a 21 66 26 cc ac 89 a4 fa | 9e 6f e1 5a 6f bb 4b ea 22 4d 9a 3d 2a 1c 97 d5 | e7 d2 d1 ac 8d d0 32 2d 42 98 eb fc 7f 55 28 65 | e5 b7 88 e1 ec b5 ba 0a 74 06 aa 48 51 b1 11 3b | 2f 1d 4c c7 49 ef 3c d0 65 a2 df 8e 59 96 65 b4 | 5b 67 18 f6 c6 dd c1 ba 8c 98 60 72 7f 9b 34 f1 | f4 df 07 a6 02 25 08 e0 ca 45 1c 4e 5a 84 92 f8 | 41 4b e2 11 63 dd 97 cd e2 1c a6 92 32 6d 9f 66 | 47 ba 05 95 3f 93 67 80 97 77 56 16 84 bf 6b d6 | e6 b0 76 58 be 43 b2 86 c2 1e 75 44 04 7d 93 a8 | 8c b0 a8 b8 83 ce 3c 1a d2 a1 85 f4 c7 9a 35 d1 | a2 ff 32 1f de 4b 99 be 80 8a 49 9b 41 45 2e a7 | 29 00 00 24 59 91 d6 77 3b 12 ba 32 8c e3 4b 3b | 93 6d 1e 3b 04 96 db ec 7e 0e 16 50 f1 18 04 aa | e6 1e e5 ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c a5 da 82 02 27 22 be 3c d8 f4 7e | 26 be f7 a0 40 5a a0 f6 00 00 00 1c 00 00 40 05 | 90 e6 40 68 17 4b f9 af 42 5a 03 6b 4d 68 d7 fb | 1b b9 9d a8 | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | #46 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 02 bd ab b2 01 5a b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #46 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #46 | rejected packet: | b8 02 bd ab b2 01 5a b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #46: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a60690 | handling event EVENT_RETRANSMIT for parent state #148 | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #148 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #148 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49612.597236; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499726 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #148 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 "road-eastnet-nonat-148" #148: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #148) | 7c 0d 88 21 0c f2 96 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 04 bc 64 c4 a9 25 09 2d 75 95 3b 11 b4 ff 15 | 97 7a 18 93 a6 88 e9 2c b9 6a 56 2f 0c f9 8a d8 | e8 e9 8c f3 6e a2 1a 4d de 32 b3 62 b7 1f cf 21 | 58 10 7d f4 24 b5 81 70 c7 68 14 37 9d fd 00 6b | b4 bb f2 40 cc b3 6b 23 df e5 3d 42 b5 d1 d7 42 | c0 5c ac 6a f7 66 60 50 9f bf be d5 78 f9 b4 31 | b1 86 de 30 ed 54 6a fc f4 65 4d b6 71 b3 0e 10 | 8b ff f6 ba 06 b3 35 4f f4 27 dc 02 7d 26 88 9b | ce 4c 6b f4 f0 e1 8d 43 1e f3 4c 5f ec 71 b9 2c | e9 3b 85 fd 08 23 e1 df 81 46 1d 11 72 44 8f d9 | 74 89 1c 9f d5 79 90 5f cf 86 54 f4 23 c9 c4 31 | af 2e 84 a4 ff ec cf b7 ba 60 46 0a 15 eb 88 9e | 1a 9f 61 a8 80 c2 60 68 d5 be 6e 09 41 6f c1 fc | 1b 37 54 8c 93 b5 3d fd bd 96 aa 9b bc 05 8d 2f | 00 4c 54 bb 3b 96 94 4f 45 ac 6c 6e b1 21 ad e3 | 8b d3 f2 47 fe 35 bf 98 09 a6 a6 c8 c9 12 c2 70 | 29 00 00 24 b1 81 e7 c9 15 f6 0b 96 d5 74 cc 65 | 51 5c df 58 13 0b 15 8c 15 4d e2 64 8b 9f d6 7a | 91 6a aa 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 56 10 9c c6 bc 82 78 34 d0 03 57 | 7a d1 bd 45 e3 1a b3 5c 00 00 00 1c 00 00 40 05 | 74 be 93 cb aa 1f 0e 04 cc 93 49 b7 b1 e0 d6 3d | b3 9a 6d 48 | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a60690 | #148 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 0d 88 21 0c f2 96 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #148 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #148 | rejected packet: | 7c 0d 88 21 0c f2 96 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #148: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-156" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-156' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #156 at 0x557d46aa9640 | State DB: adding IKEv2 state #156 in UNDEFINED | pstats #156 ikev2.ike started | Message ID: init #156: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #156: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #156; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-156" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-156" IKE SA #156 "road-eastnet-nonat-156" "road-eastnet-nonat-156" #156: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-156 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-156": constructed local IKE proposals for road-eastnet-nonat-156 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 156 for state #156 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a60690 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #156 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 | #156 spent 0.16 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-156" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.252 milliseconds in whack | crypto helper 7 resuming | crypto helper 7 starting work-order 156 for state #156 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 156 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 156 time elapsed 0.001003 seconds | (#156) spent 0.979 milliseconds in crypto helper computing work-order 156: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 156 for state #156 to event queue | scheduling resume sending helper answer for #156 | libevent_malloc: new ptr-libevent@0x7fb3480300e0 size 128 | crypto helper 7 waiting (nothing to do) | timer_event_cb: processing event@0x557d46a272b0 | handling event EVENT_RETRANSMIT for parent state #141 | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #141 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #141 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49612.609911; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002185 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a67370 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #141 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 "road-eastnet-nonat-141" #141: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #141) | c7 a4 5e d6 85 96 e8 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 5c 64 85 22 7f 26 67 9b 1d d2 dc 77 48 35 3a | d4 3f ae a5 de d9 02 e1 be b1 54 1d 8f 3c 81 66 | 72 af 44 35 86 52 1f 94 d8 67 4f d5 3d aa 9a 28 | b8 7d b2 44 cd ad e4 36 73 fc b7 ff a8 f3 fa 52 | bc bb ec ae b0 14 24 28 e8 98 61 c7 6e 10 46 be | 9e 1b d1 62 7d 6b 63 8d 57 98 39 e0 7a 2b d7 fb | 08 85 91 84 64 96 ca 9e 7d d6 44 71 24 e2 7b d9 | 4e df 37 ef 69 35 3e bf d9 e6 0c fe 44 26 04 4e | f0 05 82 74 b2 9b 24 5e e9 a2 22 8d 25 f4 83 56 | 66 7a 36 9b c2 83 bb 7e 03 9c 77 3b 87 eb 41 c7 | 94 78 c3 88 92 ee d7 85 b7 c9 76 9d e6 b0 56 99 | 3c 23 e2 55 4e f4 22 8d 17 30 9c c5 cd a0 fa a5 | 54 c0 8e f4 5a 2c 24 46 f9 7c 1e 86 1f 7b 3c ed | d6 ba ae a7 70 a2 9b 24 e8 02 bd 30 c2 66 66 44 | 25 e0 d1 5b fc c6 60 e2 9a 7f 9c 7f d3 c2 d2 0d | 71 6b ce d7 9c d1 77 52 aa 1f 4c 8a aa 84 99 be | 29 00 00 24 77 e9 14 43 da cb a0 62 0a e5 af ee | ca 47 6a 87 48 66 6e 70 1f 90 c9 e8 b5 aa eb 33 | 74 97 4a b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 5f b0 2c dc 05 ab ba 7d 8f a9 67 | 57 cd cc b4 50 46 52 bd 00 00 00 1c 00 00 40 05 | 25 fc 66 29 f4 e3 aa bf a8 61 5f 67 dd d5 39 f5 | bb 8c 0c c1 | libevent_free: release ptr-libevent@0x7fb3680300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a272b0 | #141 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #156 | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 156 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #156 | **emit ISAKMP Message: | initiator cookie: | dd 32 b7 34 a5 67 d1 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-156 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 18 58 47 50 60 00 e3 2a ab 04 ac a5 14 a4 e1 f8 | ikev2 g^x 89 44 71 9e b6 e2 f8 e1 89 a3 38 1e eb a4 57 9b | ikev2 g^x c0 92 a7 d8 d8 8c 0f 8c f9 d0 36 f7 8d 04 cc a1 | ikev2 g^x 61 5a bc bb 35 d5 16 ad 1c 27 3b fa 1b a3 4f 77 | ikev2 g^x 4e 80 47 b0 e1 83 82 b2 b5 df c4 bc d9 8d 01 04 | ikev2 g^x 4e b5 a6 60 d4 4f b3 0f 13 49 05 d9 85 5d f8 18 | ikev2 g^x 24 40 91 d1 3d 7e 6a 98 45 d7 dd 05 70 e0 c6 57 | ikev2 g^x c1 84 e8 77 d6 e2 7f 57 50 49 e0 f2 9f b0 43 93 | ikev2 g^x be 02 be f3 99 3a 02 72 36 17 a3 a7 b6 d3 1e 0b | ikev2 g^x e7 53 c6 c9 cc d5 25 75 87 c0 73 6c 5f 57 27 d6 | ikev2 g^x 52 91 24 4a 97 d3 d6 0e af 8d 6c 52 24 2d ea 91 | ikev2 g^x a1 73 e1 9e 71 14 d1 4f eb 25 67 a3 b8 12 64 b9 | ikev2 g^x 8a 15 3f 88 bc 65 32 65 96 0c ff f7 b9 a7 84 11 | ikev2 g^x bd 40 10 e1 dc 1a 04 fe 8c 35 23 2a ec b7 33 72 | ikev2 g^x 4b f4 4a e9 9d f1 da a3 b6 9c fe 09 27 14 3a 79 | ikev2 g^x 5d 82 c7 e0 9b d4 a3 ce 53 68 f7 6f b3 06 c9 71 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b7 44 fe 38 00 43 d3 2b ff 97 13 ca 89 7c c3 ed | IKEv2 nonce e0 15 4d 76 12 7b b9 2f 48 9b b5 b3 8b 4d ce 51 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= dd 32 b7 34 a5 67 d1 67 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9c | natd_hash: port= 01 f4 | natd_hash: hash= ed 13 6e 65 76 b7 ef f6 88 e7 f3 9e f3 f9 5a bb | natd_hash: hash= 01 8b 91 4f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ed 13 6e 65 76 b7 ef f6 88 e7 f3 9e f3 f9 5a bb | Notify data 01 8b 91 4f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= dd 32 b7 34 a5 67 d1 67 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4f 93 4d ef 0e 69 28 8b f3 02 75 93 a5 b3 16 9b | natd_hash: hash= e0 c9 4b 18 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4f 93 4d ef 0e 69 28 8b f3 02 75 93 a5 b3 16 9b | Notify data e0 c9 4b 18 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #156 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #156: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #156 to 4294967295 after switching state | Message ID: IKE #156 skipping update_recv as MD is fake | Message ID: sent #156 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-156" #156: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.156:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #156) | dd 32 b7 34 a5 67 d1 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 58 47 50 60 00 e3 2a ab 04 ac a5 14 a4 e1 f8 | 89 44 71 9e b6 e2 f8 e1 89 a3 38 1e eb a4 57 9b | c0 92 a7 d8 d8 8c 0f 8c f9 d0 36 f7 8d 04 cc a1 | 61 5a bc bb 35 d5 16 ad 1c 27 3b fa 1b a3 4f 77 | 4e 80 47 b0 e1 83 82 b2 b5 df c4 bc d9 8d 01 04 | 4e b5 a6 60 d4 4f b3 0f 13 49 05 d9 85 5d f8 18 | 24 40 91 d1 3d 7e 6a 98 45 d7 dd 05 70 e0 c6 57 | c1 84 e8 77 d6 e2 7f 57 50 49 e0 f2 9f b0 43 93 | be 02 be f3 99 3a 02 72 36 17 a3 a7 b6 d3 1e 0b | e7 53 c6 c9 cc d5 25 75 87 c0 73 6c 5f 57 27 d6 | 52 91 24 4a 97 d3 d6 0e af 8d 6c 52 24 2d ea 91 | a1 73 e1 9e 71 14 d1 4f eb 25 67 a3 b8 12 64 b9 | 8a 15 3f 88 bc 65 32 65 96 0c ff f7 b9 a7 84 11 | bd 40 10 e1 dc 1a 04 fe 8c 35 23 2a ec b7 33 72 | 4b f4 4a e9 9d f1 da a3 b6 9c fe 09 27 14 3a 79 | 5d 82 c7 e0 9b d4 a3 ce 53 68 f7 6f b3 06 c9 71 | 29 00 00 24 b7 44 fe 38 00 43 d3 2b ff 97 13 ca | 89 7c c3 ed e0 15 4d 76 12 7b b9 2f 48 9b b5 b3 | 8b 4d ce 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 13 6e 65 76 b7 ef f6 88 e7 f3 9e | f3 f9 5a bb 01 8b 91 4f 00 00 00 1c 00 00 40 05 | 4f 93 4d ef 0e 69 28 8b f3 02 75 93 a5 b3 16 9b | e0 c9 4b 18 | state #156 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a60690 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a60690 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #156 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 | #156 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49612.610557 | resume sending helper answer for #156 suppresed complete_v2_state_transition() and stole MD | #156 spent 0.457 milliseconds in resume sending helper answer | stop processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3480300e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 a4 5e d6 85 96 e8 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #141 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #141 | rejected packet: | c7 a4 5e d6 85 96 e8 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #141: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd 32 b7 34 a5 67 d1 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #156 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #156 | rejected packet: | dd 32 b7 34 a5 67 d1 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #156: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0536 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #99 | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #99 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #99 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49612.623822; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003993 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c780 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #99 | libevent_malloc: new ptr-libevent@0x7fb3480300e0 size 128 "road-eastnet-nonat-99" #99: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #99) | 20 f2 8d 71 65 ac 47 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 55 64 d8 ad 81 88 80 21 0e 25 1a b1 6c d3 13 | 60 47 54 9f 37 b3 3b e4 ef 17 20 61 85 67 62 f1 | 02 df 28 57 14 6d e3 be a6 7d d0 60 0f d8 35 56 | 23 d8 87 e9 4a f8 7b 29 e9 15 5f 82 0d 90 dd 56 | 5d 5a 2c 1a fd 14 77 42 8f 36 df a6 c7 9c d4 1a | 4f 67 c2 2e a6 a1 f6 1c 58 4b f8 cb b3 cd ce 08 | 48 62 dd 58 41 3a 14 29 9a 8c dd db 6a 06 47 a4 | 6c b7 ae b7 e4 5d db e5 9d e5 08 8e 17 5b 65 be | 17 aa 8e 73 be 9c 01 fb 31 11 79 f8 7d b5 ee ca | 7b e0 59 52 95 92 4d d8 40 43 34 f1 14 b9 84 18 | 60 68 b3 da 39 48 0e 5b 21 3c 0f 30 5d 85 b9 b8 | 1e e9 36 ff 36 9e aa 51 52 b1 5e 1d 27 fe 89 5d | cd 1e 0d 8d d6 a1 c3 a1 84 3f ea 32 11 45 0d 67 | 3f e2 4b 56 64 56 35 98 b6 f3 83 f0 90 30 0e 75 | b7 c7 9b 32 1d 5c 5f 2d d9 a9 92 93 d5 c6 6e 2b | ba f3 5c d6 20 4b dd 47 18 da e4 05 c0 7c 3e d8 | 29 00 00 24 0e 55 53 da 51 ef 9c 5f c5 b0 f0 9b | 78 63 11 53 43 43 64 d7 34 99 64 b7 14 ad 81 b4 | bb 55 f4 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 cf c4 07 93 b6 10 89 13 8b 25 5a | 5c dd 08 90 5b 56 28 b0 00 00 00 1c 00 00 40 05 | 9d 1e cf 39 e1 37 a4 6a 40 83 a9 41 54 1a 0d 5f | 91 61 32 ea | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | #99 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 f2 8d 71 65 ac 47 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #99 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #99 | rejected packet: | 20 f2 8d 71 65 ac 47 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #99: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61c10 | handling event EVENT_RETRANSMIT for parent state #127 | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #127 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #127 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49612.647118; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002555 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #127 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 "road-eastnet-nonat-127" #127: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #127) | 63 d9 7e 94 07 33 4b 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 5b 4a 46 df 60 33 0f 95 de e0 db c8 23 3c 72 | 78 4a 11 2d af 6a 95 71 57 bb 1d b2 0d c1 6e 56 | 18 59 e0 13 b5 5d 90 db b2 9a 12 87 33 39 67 e9 | 2a 2f bf ff 22 ca 7b ca ba cd 4e 56 00 bb 9c b4 | 81 b8 dd 6f 82 ec c7 49 d2 fc 91 38 84 1c a6 e9 | d6 e7 21 dd e8 11 d8 38 94 4d 8d 43 29 97 aa c4 | 81 24 9f fc d5 c9 48 0f a7 fe 34 f9 6d 30 3e 1f | 7a 4f f5 5e d9 cc da 01 80 42 b1 dc 13 04 fb 2f | cb ae 40 53 b9 7a ac 75 1a e1 0f 4b 6c 39 b0 ff | 2b d7 8e 64 87 22 57 2b a9 3e db 52 7f 0f 13 61 | 69 1f 61 e7 d0 1e 23 3d f6 9d 28 2b 3f e5 f0 23 | 95 70 12 d6 55 37 d1 5b 40 5e db 9b 46 bb 6c 24 | 88 d7 92 17 91 7b 88 03 03 b9 b9 93 f8 4d f8 75 | f3 71 3b 2a a2 b6 bc ae e3 8d ee 63 ed ee d1 97 | a9 a0 39 37 70 8d 13 eb 74 48 45 78 0b 87 f6 b1 | 15 7d 71 1f 58 45 48 e4 7a 5a b6 44 5f 0b 02 01 | 29 00 00 24 18 52 6f 35 05 34 eb 05 2a 3b d4 f4 | de e8 63 2a a6 7a 78 01 4b 37 13 8c b7 e1 00 ae | 6b 38 e3 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 57 41 80 41 67 da fb a0 6b fa cf | 8b d9 9a b2 68 5d 7b 8a 00 00 00 1c 00 00 40 05 | f9 e3 24 ce 79 a6 67 62 c8 57 cc ee 7e 1e 81 c5 | 41 7c 30 2d | libevent_free: release ptr-libevent@0x7fb36801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61c10 | #127 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 d9 7e 94 07 33 4b 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #127 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #127 | rejected packet: | 63 d9 7e 94 07 33 4b 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #127: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #47 | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #47 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #47 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49612.659475; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00554 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61c10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #47 | libevent_malloc: new ptr-libevent@0x7fb36801d920 size 128 "road-eastnet-nonat-47" #47: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #47) | d1 80 96 dc 70 12 fd 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 89 48 be 2f 23 20 1a aa c0 f9 41 f1 9f b5 dc | 61 3b 4e 1d f2 94 aa 61 39 fa ff 9e ad da aa 8b | 79 a4 b0 75 86 17 be 8d f9 64 cd 5f 2c a3 74 02 | 5c d2 0b c0 e1 bc 40 a4 41 01 24 b6 16 65 80 b1 | 8d 5b f4 3e d9 78 1c 78 5b d0 4f 36 20 49 cf f5 | e6 39 8f 45 c4 05 3e 9a 58 8d 26 dc 13 63 31 38 | f0 e2 e6 6e a9 06 79 15 81 1d f5 b1 3e c3 40 32 | 5c c3 ef 40 73 34 78 3f 9f 9d fe 1e 7a 64 15 bd | f5 c1 66 e8 e7 57 72 db 6e e7 07 6d fc c3 84 15 | a7 9e a5 ae 49 06 60 b0 66 25 b2 60 5b c9 52 7b | 84 da 9e 07 cb 22 63 3f f7 e3 75 51 cd b7 f5 a9 | 00 8e ee 37 13 40 c4 a0 04 91 8b 4e b2 90 26 27 | 78 4c 50 15 9b df e6 81 a0 a4 86 f0 9c 4a d6 4e | 71 20 bc ef 14 af bb ba f8 7a 84 f5 e8 b4 d8 08 | bb e0 cf f0 c2 7a 1a fb 6d c0 80 83 cb fe 9c fe | 4d f9 6c 4a 79 4d c9 ec 6b b4 1f c4 42 35 86 05 | 29 00 00 24 45 2a 73 9c 59 88 24 30 1b 4c d7 76 | 91 c3 f5 9d 27 d4 d8 42 63 2d 46 4d bb 79 5b 50 | bd 3d d6 ba 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 44 84 40 30 da 67 e5 a7 75 a7 f1 | b3 01 a1 ea ef 36 29 e3 00 00 00 1c 00 00 40 05 | 02 24 d1 73 8e ed 3e 54 49 25 16 88 bd 9a 48 c6 | 35 3e 63 7f | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | #47 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d1 80 96 dc 70 12 fd 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #47 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #47 | rejected packet: | d1 80 96 dc 70 12 fd 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #47: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.067 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e5ca0 | handling event EVENT_RETRANSMIT for parent state #149 | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #149 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #149 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49612.66583; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501121 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #149 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 "road-eastnet-nonat-149" #149: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #149) | ec 1b 62 37 44 a3 17 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 08 91 37 b8 3d c4 a5 fb 8f 59 2b cb c4 ee a3 | 59 01 01 81 cd 69 2d 85 93 60 f7 65 1f 64 aa eb | 93 60 17 84 59 2d ec 44 26 cf 20 fe db 7e d9 f6 | 7d a2 69 c3 4c ed d8 f3 0a 6b d4 5b e7 47 78 e3 | 80 3c 2c 01 cd d6 a8 65 7e cc 13 22 72 38 45 64 | 17 76 db 68 fd 9e 02 c1 4e e0 91 4f 14 0c 06 72 | 4e df 03 59 bc 72 4f af 9f 27 39 bd 57 c8 9d e1 | 90 f7 3b a1 d1 79 66 94 af 42 c3 62 cd d5 2d cd | ac 6c ea d6 94 1b f4 91 4d ad 49 21 48 4b 36 1c | 53 18 c6 23 73 5e 40 ed e6 7e 6a 25 d8 dd ef 07 | 7d 88 f4 a9 e1 ff e9 29 7d 10 cf 47 92 a2 72 35 | 95 c9 53 7e 8d f1 bb ba 54 1d 40 b5 a0 d1 1e d9 | 0b 86 d8 2d 01 1a 34 e1 77 f0 c8 57 84 a9 f4 dc | 35 1f 8e bc 5d f2 ca 58 ec a1 ad a9 cd 45 4a 2d | 23 38 26 ab df a9 05 75 cd 84 d4 66 7c be 9c f9 | 7f e7 96 6a 2b a4 d6 b4 04 50 ef ba e8 3c eb 60 | 29 00 00 24 f6 11 7c 5d 38 85 36 80 dd ed f7 d5 | 65 1c 39 a3 95 3d e4 a2 88 84 cf 2f 03 e4 0d 86 | 6f f9 18 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 49 c3 fc 0d 4b 5b dd c8 8b e4 44 | 1a 6a 18 02 f4 d1 ea f3 00 00 00 1c 00 00 40 05 | 4e f4 0c 8d 48 4d 9f e4 0b 19 05 64 48 99 98 79 | d2 ff 3d 6d | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e5ca0 | #149 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 1b 62 37 44 a3 17 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #149 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #149 | rejected packet: | ec 1b 62 37 44 a3 17 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #149: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0555 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e05a0 | handling event EVENT_RETRANSMIT for parent state #142 | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #142 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #142 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49612.672112; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002399 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #142 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 "road-eastnet-nonat-142" #142: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #142) | 41 39 64 14 10 77 e9 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc f2 be 7b 98 10 67 76 c4 71 20 94 23 de f4 7b | f8 c4 af 24 ce 1c a4 2e 78 f9 2e 3f 92 4d 95 da | b0 24 e9 98 5b 94 79 3a a7 65 db 91 8d 98 6f 60 | 39 37 f9 9a 0b 2c 5f 0f 2f ab bc 06 c4 26 ad 3a | cb 21 02 45 52 b2 d1 fd f5 7c fc a1 d2 ea 0e b1 | ba 62 e9 1e b2 ad cc 0d 27 c3 3b 69 ca 23 50 32 | eb 22 0c cc d3 fb 5f db 9c 9b 31 50 db f4 03 47 | 71 96 ad b4 c6 fc 17 71 7e b3 b0 ab 55 4f e2 51 | da 27 48 0f fb 5a 5c 14 f2 9f a1 0b bc 57 8c f8 | af d3 b0 d4 6a 72 47 34 c3 ab 52 90 fc 49 ad 86 | 46 90 a0 10 2b fd 92 3d 6b 38 ac d2 f1 fb fa a7 | 40 39 9e cd 87 10 91 66 2e ab 47 10 a6 88 c0 52 | d8 c9 3f b4 b3 d0 6c 91 b2 0e 49 7c 2a dc 94 d8 | 21 4c c9 df 3c b1 a2 d4 d4 f0 4b 25 d9 08 87 46 | 22 c7 0a 5a cc 6c a2 0b 4a 09 99 09 fb f2 2e 33 | 66 ad 2f c0 16 9e 3c 6f 99 46 27 79 f7 75 88 d3 | 29 00 00 24 1d 1b 1c 65 cb f5 ff f0 c9 00 69 e9 | d1 b3 22 15 24 4a 7b cc a6 4c 2e 0b ef 42 21 b2 | d1 d6 06 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 3a fc 83 97 ab 17 41 58 12 a1 f9 | 48 2f 13 f0 7a 91 16 3d 00 00 00 1c 00 00 40 05 | 13 50 5d f0 78 ea 60 59 51 2f a8 23 2c 7c d0 1f | 4c a0 b1 5b | libevent_free: release ptr-libevent@0x7fb36c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e05a0 | #142 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 39 64 14 10 77 e9 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #142 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #142 | rejected packet: | 41 39 64 14 10 77 e9 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #142: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-157" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-157' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #157 at 0x557d46aaac00 | State DB: adding IKEv2 state #157 in UNDEFINED | pstats #157 ikev2.ike started | Message ID: init #157: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #157: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #157; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-157" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-157" IKE SA #157 "road-eastnet-nonat-157" "road-eastnet-nonat-157" #157: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-157 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-157": constructed local IKE proposals for road-eastnet-nonat-157 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 157 for state #157 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469e05a0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #157 | libevent_malloc: new ptr-libevent@0x7fb36c0300e0 size 128 | #157 spent 0.149 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-157" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.23 milliseconds in whack | crypto helper 8 resuming | crypto helper 8 starting work-order 157 for state #157 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 157 | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 157 time elapsed 0.000758 seconds | (#157) spent 0.764 milliseconds in crypto helper computing work-order 157: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 157 for state #157 to event queue | scheduling resume sending helper answer for #157 | libevent_malloc: new ptr-libevent@0x7fb34c0300e0 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #157 | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 157 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #157 | **emit ISAKMP Message: | initiator cookie: | 58 3c 05 73 d3 10 8c 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-157 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 16 05 06 2f 3b 22 9e 88 08 ab fe 29 25 f8 32 23 | ikev2 g^x d0 15 af d8 5f 65 e8 be c6 03 98 0f 18 e5 00 77 | ikev2 g^x 99 86 03 c7 fc 1b e8 83 43 61 ba 00 0c dc 29 59 | ikev2 g^x 0d fd 85 a1 75 5e f3 f7 d2 64 26 3b e1 11 43 3a | ikev2 g^x 94 43 08 73 30 5e 1d 91 aa 8f 9d c1 5c 52 ae c1 | ikev2 g^x 1d 90 3b cb 44 47 58 f3 40 38 01 58 63 65 29 32 | ikev2 g^x b6 4a 78 a5 71 58 c1 30 ea 73 8e 14 71 72 8e df | ikev2 g^x ee 45 ee f6 d2 a7 99 89 1c 7b fc 81 aa fe 75 bb | ikev2 g^x 36 cb a8 81 eb 73 7b eb 5a e7 fa 6d e5 b4 95 b2 | ikev2 g^x be 54 f3 23 c2 44 23 4a b5 30 87 1d 26 24 c6 c4 | ikev2 g^x 6b d1 5d 1a 24 7a 69 b5 9b 7f 97 17 e0 18 0f 6f | ikev2 g^x 1f f9 f1 e8 6c 46 2c d8 28 aa 7c 1d ec ed d6 d3 | ikev2 g^x b6 eb c6 eb 3b 55 59 5b 10 23 06 f1 f2 aa 19 3c | ikev2 g^x 8e ca 99 c8 e5 ba 47 04 47 84 62 13 96 06 08 0d | ikev2 g^x 88 7a a1 63 08 7b df 84 fd 48 36 29 3e 5c 44 7d | ikev2 g^x 05 23 1e 33 96 d8 b6 34 ea b3 94 6e cc d2 07 97 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a9 6f a2 6f e4 cf 6b 0e 7b b9 69 24 56 3d ee de | IKEv2 nonce fe c6 39 89 8e 14 c9 0f 9e 2f 60 95 f7 4e c6 2f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 58 3c 05 73 d3 10 8c 54 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9d | natd_hash: port= 01 f4 | natd_hash: hash= 03 bf ce be 86 a6 d7 14 f3 ba 0e 49 ee d2 d5 26 | natd_hash: hash= 4c 2e 13 18 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 03 bf ce be 86 a6 d7 14 f3 ba 0e 49 ee d2 d5 26 | Notify data 4c 2e 13 18 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 58 3c 05 73 d3 10 8c 54 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 0a 36 59 95 a8 fb 5c 3b ea 04 70 de 29 72 15 40 | natd_hash: hash= a3 00 f6 34 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0a 36 59 95 a8 fb 5c 3b ea 04 70 de 29 72 15 40 | Notify data a3 00 f6 34 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #157 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #157: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #157 to 4294967295 after switching state | Message ID: IKE #157 skipping update_recv as MD is fake | Message ID: sent #157 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-157" #157: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.157:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #157) | 58 3c 05 73 d3 10 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 16 05 06 2f 3b 22 9e 88 08 ab fe 29 25 f8 32 23 | d0 15 af d8 5f 65 e8 be c6 03 98 0f 18 e5 00 77 | 99 86 03 c7 fc 1b e8 83 43 61 ba 00 0c dc 29 59 | 0d fd 85 a1 75 5e f3 f7 d2 64 26 3b e1 11 43 3a | 94 43 08 73 30 5e 1d 91 aa 8f 9d c1 5c 52 ae c1 | 1d 90 3b cb 44 47 58 f3 40 38 01 58 63 65 29 32 | b6 4a 78 a5 71 58 c1 30 ea 73 8e 14 71 72 8e df | ee 45 ee f6 d2 a7 99 89 1c 7b fc 81 aa fe 75 bb | 36 cb a8 81 eb 73 7b eb 5a e7 fa 6d e5 b4 95 b2 | be 54 f3 23 c2 44 23 4a b5 30 87 1d 26 24 c6 c4 | 6b d1 5d 1a 24 7a 69 b5 9b 7f 97 17 e0 18 0f 6f | 1f f9 f1 e8 6c 46 2c d8 28 aa 7c 1d ec ed d6 d3 | b6 eb c6 eb 3b 55 59 5b 10 23 06 f1 f2 aa 19 3c | 8e ca 99 c8 e5 ba 47 04 47 84 62 13 96 06 08 0d | 88 7a a1 63 08 7b df 84 fd 48 36 29 3e 5c 44 7d | 05 23 1e 33 96 d8 b6 34 ea b3 94 6e cc d2 07 97 | 29 00 00 24 a9 6f a2 6f e4 cf 6b 0e 7b b9 69 24 | 56 3d ee de fe c6 39 89 8e 14 c9 0f 9e 2f 60 95 | f7 4e c6 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 bf ce be 86 a6 d7 14 f3 ba 0e 49 | ee d2 d5 26 4c 2e 13 18 00 00 00 1c 00 00 40 05 | 0a 36 59 95 a8 fb 5c 3b ea 04 70 de 29 72 15 40 | a3 00 f6 34 | state #157 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c0300e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469e05a0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e5ca0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #157 | libevent_malloc: new ptr-libevent@0x7fb36c0300e0 size 128 | #157 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49612.675146 | resume sending helper answer for #157 suppresed complete_v2_state_transition() and stole MD | #157 spent 0.51 milliseconds in resume sending helper answer | stop processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c0300e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 3c 05 73 d3 10 8c 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #157 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #157 | rejected packet: | 58 3c 05 73 d3 10 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #157: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0476 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #100 | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #100 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #100 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49612.708358; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002783 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a272b0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #100 | libevent_malloc: new ptr-libevent@0x7fb34c0300e0 size 128 "road-eastnet-nonat-100" #100: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #100) | e4 31 72 ce cb 4c 2e da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 02 70 26 8b f7 4c 10 d5 54 2d e1 56 87 42 60 | 52 43 18 58 d2 c6 63 79 e0 4c 7b 4a 2f b9 0e c8 | b1 65 1d 3e 6c a0 42 98 0c 60 fd b3 4d 30 f1 76 | 5e b7 85 03 42 2b d9 76 75 50 2e c4 69 94 03 7a | 6e c6 23 13 83 28 87 89 db 36 67 01 a4 44 23 73 | e4 b0 04 73 26 bb b0 01 8a 59 be 71 cf 90 5c 3a | 4f 3e 50 e0 98 79 eb 2c 62 ed 3b ff 05 2e f6 81 | 65 38 8c a4 51 39 05 8b 85 23 c5 f6 84 98 62 7d | 1d 2f 44 0d 73 e0 13 c3 51 be 3b 56 26 36 4c 79 | eb bc 2b 5e 2c 37 b2 d5 29 fa 64 f9 de 60 b9 ba | 73 c4 a9 28 1e 62 38 24 9d a3 96 c5 53 73 2c 7d | 0d 39 e6 12 54 ca 75 11 6f 12 17 8e e1 13 5d 45 | 12 9e c5 b7 6a ce 49 b5 ef 7b 55 be 70 ce 3a 18 | d9 f0 2c b9 2c 8a 17 6a 09 a2 d9 96 28 14 14 67 | 3e 3b 41 a6 c6 44 44 f5 69 48 d1 0a 41 9c 30 d6 | 74 2c 38 9d d2 1f 0a f9 85 a8 83 ce dd 7d a1 17 | 29 00 00 24 9b 63 67 5a a5 90 71 08 bf 01 2e 0d | 7a 17 c3 85 da c2 c9 b2 79 84 88 d1 44 e9 43 2f | de e8 87 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb bf 15 80 9f fe 69 e3 a2 7b 53 a0 | 71 05 30 05 2a 8e cb 5a 00 00 00 1c 00 00 40 05 | e0 55 02 95 04 d8 fc 5b b5 ab 42 28 79 3c 3e 17 | 70 aa 5d 58 | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #100 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 31 72 ce cb 4c 2e da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #100 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #100 | rejected packet: | e4 31 72 ce cb 4c 2e da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #100: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #150 | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #150 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #150 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49612.727696; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.49999 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #150 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 "road-eastnet-nonat-150" #150: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #150) | 8a b6 09 5a 0a 8f be 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 2e 98 c4 69 1c 50 37 00 a8 8c d0 f1 d2 8c 28 | 94 f1 69 8e be e8 36 fe 99 97 d5 0c 37 4e 1b 26 | 9e e0 4e bd 73 a0 79 f4 5a 6b f2 8d 96 4f 03 3e | 0e 75 44 c8 2c a3 81 79 2e 0b 2e 8f 7d 7f dc f9 | 3f db 53 4d 6e 68 53 6c 49 99 36 00 d7 4f 7e e1 | 7e a7 57 fb ab 9f e1 d6 e7 24 3b 02 1f 12 10 de | 15 c5 08 ce f3 51 03 84 19 e7 47 83 1a 2e 38 c2 | 45 5b ab 60 7e 25 f4 92 0b eb 31 c2 32 59 f7 71 | 30 c7 ef cb 28 48 6e e3 c6 10 bc 9c 64 1e 68 59 | ee 88 40 85 37 40 80 12 7d 99 b2 33 c0 da 4b fb | 3a 39 ae b6 0e 0b 59 93 7d 9a d6 ee 50 27 09 f4 | a0 3a c3 63 a9 ac e9 9b 13 ed 9f a6 df 4f 55 3a | 82 36 63 e6 11 77 4d 54 ff a6 ad fe 0f 97 d9 c1 | 30 72 88 21 1f 78 34 56 b8 51 de f7 62 00 f9 29 | 66 5f d3 86 45 83 9d 48 c9 24 49 11 29 28 62 bd | 6e 8b 60 b5 72 8e cb ea 93 0b fd cb 0c 58 7b 88 | 29 00 00 24 36 30 98 85 8b 67 65 29 82 81 da 88 | 70 5a df 1d 0c c2 0c e8 b9 29 94 59 0f 89 5b 4b | 52 bc 0b a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 25 ba 47 28 1c 0e 38 fd e4 d3 0a | c8 ae 66 94 c0 bd 04 2b 00 00 00 1c 00 00 40 05 | 5a 15 ef 3e 5b 63 8d c2 17 ab ae 76 63 67 33 8b | f3 ee 4c d4 | libevent_free: release ptr-libevent@0x7fb38800a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #150 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a23110 | handling event EVENT_RETRANSMIT for parent state #48 | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #48 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #48 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49612.727883; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00512 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #48 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 "road-eastnet-nonat-48" #48: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #48) | 92 07 42 48 2a e6 dd 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 27 70 ee fe 7b a5 6b c0 91 72 76 bf b9 26 41 | 8a c5 01 3c cd 8b 21 f3 23 df 5c 81 f1 ed a2 12 | a1 c4 5e 2f a7 b1 21 02 24 b9 30 c4 f5 c4 2d c4 | 90 7e 3e f0 c9 0b f2 18 3c 2b b9 91 3a da c1 6c | 57 28 75 1b 3a 0e e8 9b fc 4b ee 5c 39 98 fa 15 | be 81 4e e4 0c 6c a4 75 1b 83 45 74 98 dd 81 5b | 06 80 95 32 c0 f4 a2 4b 9d f4 17 33 73 16 94 48 | 16 60 93 ae 3d ce 3e d6 a3 61 16 51 cb 19 ec 02 | 00 f8 5a 99 f9 c4 14 2b 6a 99 61 a3 6a e4 c5 97 | ad 75 bb 6b 78 38 5a b9 44 bc 5c a3 2d 23 20 4c | 99 1b 88 95 1f b4 34 15 92 91 16 2b 1d 90 a8 32 | bd a4 79 83 a7 b0 92 15 f0 e3 c2 79 58 67 56 eb | 4d 0c 97 c3 3f ae 15 49 f9 9c d2 3e ec c3 17 b9 | bd 62 c7 73 21 fe 81 8b e3 b9 eb a9 ce c7 0f d3 | 3f 5d 5a 44 c2 b4 29 b6 b5 67 52 29 de ca c6 15 | 31 6c 15 9d 56 b1 be 81 9a 0d b9 07 79 05 6e c9 | 29 00 00 24 56 48 d0 40 29 5d 70 09 47 7a f3 f6 | 53 84 44 57 f6 31 5c 3b e1 9a 2b 92 5f 13 77 b9 | 29 81 06 a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 92 e0 aa 95 98 e7 44 d2 2d 1e d8 | d0 35 7f 77 52 84 b9 c1 00 00 00 1c 00 00 40 05 | a2 97 dc 1e 35 5d 8b 7e f0 05 d9 9d 5b 9e 9f 7f | 26 7a 4a c3 | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23110 | #48 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a b6 09 5a 0a 8f be 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #150 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #150 | rejected packet: | 8a b6 09 5a 0a 8f be 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #150: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 07 42 48 2a e6 dd 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #48 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #48 | rejected packet: | 92 07 42 48 2a e6 dd 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #48: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0539 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-158" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-158' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #158 at 0x557d46aac1c0 | State DB: adding IKEv2 state #158 in UNDEFINED | pstats #158 ikev2.ike started | Message ID: init #158: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #158: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #158; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-158" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-158" IKE SA #158 "road-eastnet-nonat-158" "road-eastnet-nonat-158" #158: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-158 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-158": constructed local IKE proposals for road-eastnet-nonat-158 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 158 for state #158 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a23110 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #158 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 | #158 spent 0.153 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-158" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.236 milliseconds in whack | crypto helper 12 resuming | crypto helper 12 starting work-order 158 for state #158 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 158 | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 158 time elapsed 0.001254 seconds | (#158) spent 1.01 milliseconds in crypto helper computing work-order 158: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 158 for state #158 to event queue | scheduling resume sending helper answer for #158 | libevent_malloc: new ptr-libevent@0x7fb340030080 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #158 | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 158 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #158 | **emit ISAKMP Message: | initiator cookie: | e6 a0 1a 4e 16 85 73 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-158 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4d fe 92 1d 51 a7 6d 12 34 05 5b 88 3c 14 89 6b | ikev2 g^x 35 8c a3 94 b4 c5 44 d8 4b 8c 87 4c af 0d 5e 27 | ikev2 g^x cd 39 40 ee d3 b1 d8 0b a2 08 8c 95 70 dc 7c 67 | ikev2 g^x 00 94 18 0b cc 36 ba 02 42 ac 1b 6e 83 e8 f3 b5 | ikev2 g^x 91 59 9d ad e6 9f 36 2d a8 98 92 82 b5 58 8d 17 | ikev2 g^x e8 c3 14 93 e3 79 91 5b e9 d6 f6 a5 7b ab 15 3e | ikev2 g^x 02 89 3b e3 40 68 94 7c a5 09 b7 59 3e c5 6a 99 | ikev2 g^x 03 29 08 a9 4d cb 54 e8 24 b9 ad 4e d9 ec 0b 15 | ikev2 g^x 00 2a bb 1a df 73 04 f9 ab 12 4b db 50 44 e0 e2 | ikev2 g^x 22 35 8e 9a 3a 55 04 43 31 37 ac 1b 04 2e 40 6f | ikev2 g^x a3 ce 4b 7d 81 aa 0c 4f 00 20 e7 14 67 8a 92 03 | ikev2 g^x be 6c 2c b0 1e 89 ff eb d0 66 ac db b5 5f 07 46 | ikev2 g^x 34 4e 75 3e 19 4d d5 e5 2d 16 89 cc 75 86 80 6f | ikev2 g^x 3f aa e7 c1 07 a0 f4 7f 40 db 1c df 1d 97 4e 83 | ikev2 g^x 99 fc 4e 29 fa a7 c5 07 07 e9 c0 d9 34 f7 42 65 | ikev2 g^x b3 46 1d 34 7e 34 fc b8 2a d6 72 9b 56 fa c8 74 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 93 3e 30 9d 56 73 68 ed 32 94 90 87 db 7b 56 ae | IKEv2 nonce fd bb a5 6c 98 47 2c cb b8 9c 69 c6 ac 01 dc 09 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e6 a0 1a 4e 16 85 73 67 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9e | natd_hash: port= 01 f4 | natd_hash: hash= af 5c ca 3f 10 b2 e1 eb 3b d6 06 3e 82 97 94 30 | natd_hash: hash= e1 e8 70 cd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data af 5c ca 3f 10 b2 e1 eb 3b d6 06 3e 82 97 94 30 | Notify data e1 e8 70 cd | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e6 a0 1a 4e 16 85 73 67 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= bb 02 3a cc bb 31 72 ec b9 81 77 29 32 3e e8 21 | natd_hash: hash= a2 17 d3 ee | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bb 02 3a cc bb 31 72 ec b9 81 77 29 32 3e e8 21 | Notify data a2 17 d3 ee | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #158 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #158: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #158 to 4294967295 after switching state | Message ID: IKE #158 skipping update_recv as MD is fake | Message ID: sent #158 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-158" #158: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.158:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #158) | e6 a0 1a 4e 16 85 73 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d fe 92 1d 51 a7 6d 12 34 05 5b 88 3c 14 89 6b | 35 8c a3 94 b4 c5 44 d8 4b 8c 87 4c af 0d 5e 27 | cd 39 40 ee d3 b1 d8 0b a2 08 8c 95 70 dc 7c 67 | 00 94 18 0b cc 36 ba 02 42 ac 1b 6e 83 e8 f3 b5 | 91 59 9d ad e6 9f 36 2d a8 98 92 82 b5 58 8d 17 | e8 c3 14 93 e3 79 91 5b e9 d6 f6 a5 7b ab 15 3e | 02 89 3b e3 40 68 94 7c a5 09 b7 59 3e c5 6a 99 | 03 29 08 a9 4d cb 54 e8 24 b9 ad 4e d9 ec 0b 15 | 00 2a bb 1a df 73 04 f9 ab 12 4b db 50 44 e0 e2 | 22 35 8e 9a 3a 55 04 43 31 37 ac 1b 04 2e 40 6f | a3 ce 4b 7d 81 aa 0c 4f 00 20 e7 14 67 8a 92 03 | be 6c 2c b0 1e 89 ff eb d0 66 ac db b5 5f 07 46 | 34 4e 75 3e 19 4d d5 e5 2d 16 89 cc 75 86 80 6f | 3f aa e7 c1 07 a0 f4 7f 40 db 1c df 1d 97 4e 83 | 99 fc 4e 29 fa a7 c5 07 07 e9 c0 d9 34 f7 42 65 | b3 46 1d 34 7e 34 fc b8 2a d6 72 9b 56 fa c8 74 | 29 00 00 24 93 3e 30 9d 56 73 68 ed 32 94 90 87 | db 7b 56 ae fd bb a5 6c 98 47 2c cb b8 9c 69 c6 | ac 01 dc 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 af 5c ca 3f 10 b2 e1 eb 3b d6 06 3e | 82 97 94 30 e1 e8 70 cd 00 00 00 1c 00 00 40 05 | bb 02 3a cc bb 31 72 ec b9 81 77 29 32 3e e8 21 | a2 17 d3 ee | state #158 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a23110 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23110 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #158 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 | #158 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49612.738403 | resume sending helper answer for #158 suppresed complete_v2_state_transition() and stole MD | #158 spent 0.469 milliseconds in resume sending helper answer | stop processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb340030080 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 a0 1a 4e 16 85 73 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #158 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #158 | rejected packet: | e6 a0 1a 4e 16 85 73 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #158: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a69e50 | handling event EVENT_RETRANSMIT for parent state #128 | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #128 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #128 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49612.739592; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002754 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e05a0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #128 | libevent_malloc: new ptr-libevent@0x7fb340030080 size 128 "road-eastnet-nonat-128" #128: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #128) | 77 d1 59 6d 55 cb 18 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 01 e0 bd 82 fe e0 91 d9 ed 2a 7b 41 58 aa d2 | c1 83 b5 d4 08 da f3 c7 61 8a cf 68 fe 9a 21 e3 | 57 03 c4 31 d0 d0 ec 56 cc 27 d9 52 cc f2 63 0f | a0 ad 50 12 a9 19 98 c4 cb 8f 93 9b 57 4e ae 53 | 05 9f f7 4f 18 99 38 38 06 c2 82 4a ed ef 9d cc | 7b 44 9f 1c 19 10 74 71 d4 89 98 82 e7 d0 72 33 | aa 5f 8b bd da a0 8b 0a 73 9d 51 cb d2 a3 14 69 | d1 4b 0c 71 9d 71 26 5d bf 23 7a 67 5d 15 2b a2 | ce b7 8c 37 a6 d1 63 b0 6b dc f1 b5 b5 72 45 86 | c8 59 1a 35 a1 54 36 81 14 ea b5 34 cc 86 95 36 | de 73 da 51 28 93 ec 98 2d 7a d9 01 e1 1c 11 2d | 35 8e 59 23 0d de 42 1b 00 c8 28 40 ea c4 bc 1a | 0b 22 97 22 23 59 28 f2 30 da 60 85 07 fb be 9a | 26 22 87 03 aa 66 5a 47 26 21 89 bb a9 0e 6a fe | 60 1c 6c 90 e2 96 28 ae 41 e9 23 65 8c f4 23 57 | 72 00 10 88 06 ca 67 04 cf 4b c7 04 50 60 fe 2f | 29 00 00 24 3b ae 04 a3 29 53 44 16 26 36 89 01 | ad 8c c7 bd 38 5d c9 f9 a5 cd 29 aa 82 21 0f 5e | 4f 91 67 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 73 cd 7c c3 ca 92 54 ff 7d 3a 5c | 01 84 d2 b8 f1 a4 c9 bd 00 00 00 1c 00 00 40 05 | ec 18 dc 66 2d cf 71 2e 85 c0 4a 75 63 a1 b7 19 | b3 41 97 a0 | libevent_free: release ptr-libevent@0x7fb378012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a69e50 | #128 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 d1 59 6d 55 cb 18 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #128 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #128 | rejected packet: | 77 d1 59 6d 55 cb 18 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #128: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a72150 | handling event EVENT_RETRANSMIT for parent state #143 | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #143 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #143 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49612.743879; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001728 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a69e50 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #143 | libevent_malloc: new ptr-libevent@0x7fb378012840 size 128 "road-eastnet-nonat-143" #143: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #143) | fe 08 8f c1 30 76 36 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 59 10 0a 33 69 60 29 ec cb 88 e8 3a c1 e5 55 | 26 67 1a ec 62 9e 8e 22 6f b0 d9 0b 9d f1 88 4a | e6 aa 92 54 ef 0d ca 48 fc de 93 8e cc 1b be 9e | 2a 5e f3 2a 08 3f 42 43 4c 7d 9b 8f 28 00 df 48 | e8 21 87 a4 f6 50 fb f0 b0 17 a4 67 51 7c 94 f5 | bf 3d 99 c9 85 3f 6a 47 12 df 61 eb 04 e7 9a 6c | b7 d5 b3 00 34 48 70 01 04 f1 38 e6 2a 1b 58 fe | 45 c8 88 15 fe fd f8 a1 17 d4 b0 e0 da 11 1c 39 | ad d0 8c b8 02 34 e9 cc d8 17 f6 f2 94 8e c1 9b | bc 9e 9d 32 92 5b 2a 34 cd 6a fb 2e 20 96 68 57 | 5b d5 8b 51 c6 02 26 d3 9c 0f 2f 12 c2 48 e7 4a | 4a 0b 12 1b 9e 56 b5 85 4d d5 b2 31 1e ed 3e 7b | 36 b4 c3 2a eb a3 dd fa 18 8b db b6 6e 6f 26 25 | d4 07 3d fa df 09 23 4b f0 61 a0 e2 e7 88 89 b7 | 4a 08 a7 b8 23 da c7 50 cb 24 82 e1 9d bc ac 0c | ad 50 25 66 22 31 ab bb bb 61 7d f2 14 fa 8e 17 | 29 00 00 24 5c 1f 93 ac 9c d9 6d bc 1c 83 06 35 | 6d 1c ce da 8c 6b 1d 7b a8 23 6f c9 2c 64 35 22 | c8 0a 79 63 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 3f e0 89 56 6b 89 d9 2f e3 34 a5 | 92 0a 7f a5 70 51 be 33 00 00 00 1c 00 00 40 05 | 8d 31 d1 99 a4 16 d7 c5 96 20 51 29 c7 9b 80 8c | b7 4b 38 13 | libevent_free: release ptr-libevent@0x7fb388027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a72150 | #143 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 08 8f c1 30 76 36 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #143 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #143 | rejected packet: | fe 08 8f c1 30 76 36 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #143: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.066 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a100f0 | handling event EVENT_RETRANSMIT for parent state #49 | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #49 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #49 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49612.789266; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004084 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a72150 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #49 | libevent_malloc: new ptr-libevent@0x7fb388027c10 size 128 "road-eastnet-nonat-49" #49: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #49) | 8b 45 5c f0 af 2f 9d ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 38 13 81 3a b9 33 6e f2 a1 41 ed b7 e9 17 cf | 38 df bd f2 c5 3d 78 1c 98 5b e5 97 39 7c 00 0a | 9b b9 2b 4e ee 4e 90 b7 3f 17 93 3b 49 e6 73 ac | f3 36 ea c0 f6 08 78 26 b2 58 4a a1 8f ff 26 a9 | a2 29 62 4b f6 47 e2 5d a0 f3 e8 a3 da 86 cc 66 | 5a 6a 1d 0c 47 30 d7 e6 6e 32 62 71 d7 d3 1b 25 | 92 10 eb e7 f4 a1 c6 b8 cf 48 2b c2 a1 ae c9 5f | 55 56 6d 5d 77 a7 5f aa 02 cf a8 ea bb 62 18 44 | 0f aa 1d 7d 23 c7 37 6d 72 2b 4a da 38 22 af af | 35 47 8a 4d fb f1 2e 0f fa 54 54 48 f4 2f 1b 4b | 5a 9a c8 ab f4 0a 9c 36 8e 9a 37 b6 3a a4 36 09 | f9 cb 85 a0 d5 4e 66 72 2d dc a7 8d 87 52 32 39 | 0d 6e ce 73 51 c4 9b ee a5 7a c3 e9 dd 43 0b 8d | c9 c7 df e3 c7 9a fc aa 8b 37 41 93 d2 be 3c 27 | 15 30 62 da 6c d3 07 29 68 48 b5 55 56 c4 17 4f | b5 8f 29 d1 f2 fb 9e ea 13 d1 f0 21 44 a0 36 ca | 29 00 00 24 0e e2 a8 92 f0 b5 63 29 61 a0 ee 39 | b4 45 f6 bb e0 ab b1 76 a4 84 16 9e da d2 be 94 | e8 6d f8 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 12 9b 83 c2 c3 d2 71 a5 38 21 6e | a0 97 8f 66 c6 b8 71 3b 00 00 00 1c 00 00 40 05 | d2 ce 05 69 62 ac 37 a7 c1 ab 75 f3 75 7a c1 3e | 4a 93 d7 88 | libevent_free: release ptr-libevent@0x7fb36800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a100f0 | #49 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 45 5c f0 af 2f 9d ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #49 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #49 | rejected packet: | 8b 45 5c f0 af 2f 9d ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #49: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0667 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #101 | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #101 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #101 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49612.794607; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004878 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6e010 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #101 | libevent_malloc: new ptr-libevent@0x7fb36800cf80 size 128 "road-eastnet-nonat-101" #101: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #101) | a4 e5 70 36 3e 53 78 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 47 67 da db 52 1d 6f 38 4e a0 14 fb a3 22 ee | a5 bd 87 bb f4 50 cd e1 5f f4 bb 7f 5e 01 20 78 | 03 d2 5e e5 f5 4c 45 4d 90 0b ab 1e a9 68 0d a2 | 63 8b 82 0b 63 5a be b1 7a 7f 0a d0 8f 73 00 89 | 01 d6 0d 8e e0 01 de 09 aa b1 2b c9 2a 85 99 3e | e4 12 33 b6 ff a4 02 5b a4 0f a9 0e 49 92 c4 c4 | 91 bb bd cc bc 4e ec 81 b6 b6 b8 9c 4a 4e 40 d2 | 5e b4 c5 bc f7 4c 25 7f b5 8f df 4b 29 de 24 b5 | 99 9e 0e bd 10 eb 77 c5 31 71 d3 38 c7 ae 1b 45 | a1 15 8f 53 f2 46 e1 e0 f3 7d cd 3a fa d7 ce cc | 71 fa 98 05 20 5e 2b 57 e0 1e 93 66 04 94 47 68 | b5 fc da d4 67 d1 27 06 e7 0b 81 26 9b 06 3d 8a | 68 ab 7d 23 5f b3 75 b4 20 05 d5 0a d7 9f 47 f8 | cc 49 2f 28 05 85 5c 22 76 a9 df c7 57 38 c2 59 | 85 34 bf b9 39 30 70 bd fe 4d 41 14 30 36 f4 a7 | a4 75 83 53 e7 c0 5a e0 b5 e5 07 a1 66 16 4d c3 | 29 00 00 24 08 f8 1e 60 51 22 a7 7a 61 74 80 8a | 8a 13 29 1d 07 8a 7f 81 27 3b e2 db 98 17 8f 37 | 46 82 14 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 37 fb 68 83 f3 3a 11 a5 17 fb 1f | 7d e8 ab 39 06 f5 fb 7f 00 00 00 1c 00 00 40 05 | 98 33 35 18 bc 62 08 ee 27 45 3b 5b 93 d4 b0 de | 01 b6 d3 96 | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #101 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 e5 70 36 3e 53 78 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #101 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #101 | rejected packet: | a4 e5 70 36 3e 53 78 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #101: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #151 | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #151 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #151 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49612.795937; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501043 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #151 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 "road-eastnet-nonat-151" #151: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #151) | d6 d5 c3 1b 58 0f 5c 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 37 31 25 ac 2b c6 c6 54 4a 25 58 cc 38 99 e0 | ed 33 16 21 c3 45 6a eb 3b a9 cb 98 85 d1 bc b2 | fb 43 f8 dc 85 42 20 a9 d4 7c dc c0 4c df 30 b1 | 6f cb 58 0b 5e 23 e6 14 ea 93 76 de 25 96 78 81 | 99 69 10 aa a3 9f ec 08 71 07 18 69 73 22 c9 ac | 3c e3 bf f1 09 8a 27 19 15 60 45 3d 4e 4f f3 e6 | c0 ab 4b c7 bb fb 2d 92 26 ca 7f de c4 f9 dd 4a | fa 18 2a 06 8c 14 94 9f a3 5d e6 b2 6b b0 ef e2 | 03 7f 7e f8 41 9d 8b 81 6b ea 4b 0b 45 f7 4c 93 | 70 05 72 9a ed 29 ed 3c 18 ca 66 2f d4 84 e6 4b | c1 2d 49 d6 3e cb 03 40 00 76 c7 f7 62 87 c5 1b | 85 d6 9d d1 8f 62 a3 ce 21 63 7a e5 94 35 85 13 | e3 c0 a5 2d 68 e8 0d 1f 37 ec 8c 55 12 d8 2a 1f | 06 81 5f d0 f4 ed e5 b1 5f c7 61 8a f0 5a 81 39 | 9f 6d e8 7f 5c 42 26 99 4f 51 2b 10 a9 6b b8 4c | a4 af 1c 69 f6 99 03 59 f6 8d eb d2 5c c8 04 4e | 29 00 00 24 3f 57 34 15 0e f6 1f 97 00 4e ca 13 | c7 48 27 43 fb 8e ac 87 27 dd cc da bb e1 5d 76 | d8 9b a6 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 1e a1 42 f7 31 41 ef 44 00 e7 a6 | 3d d6 a8 bb 50 6c 59 e3 00 00 00 1c 00 00 40 05 | 29 1a ff ca 49 77 f5 cd 99 41 a4 64 5f 6e 4a e7 | 0f a2 34 de | libevent_free: release ptr-libevent@0x7fb358009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | #151 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 d5 c3 1b 58 0f 5c 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #151 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #151 | rejected packet: | d6 d5 c3 1b 58 0f 5c 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #151: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0592 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-159" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-159' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #159 at 0x557d46aad780 | State DB: adding IKEv2 state #159 in UNDEFINED | pstats #159 ikev2.ike started | Message ID: init #159: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #159: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #159; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-159" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-159" IKE SA #159 "road-eastnet-nonat-159" "road-eastnet-nonat-159" #159: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-159 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-159": constructed local IKE proposals for road-eastnet-nonat-159 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 159 for state #159 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb358005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #159 | libevent_malloc: new ptr-libevent@0x7fb358009640 size 128 | #159 spent 0.152 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-159" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.235 milliseconds in whack | crypto helper 5 resuming | crypto helper 5 starting work-order 159 for state #159 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 159 | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 159 time elapsed 0.000732 seconds | (#159) spent 0.736 milliseconds in crypto helper computing work-order 159: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 159 for state #159 to event queue | scheduling resume sending helper answer for #159 | libevent_malloc: new ptr-libevent@0x7fb3440300e0 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #159 | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 159 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #159 | **emit ISAKMP Message: | initiator cookie: | 9d f6 62 77 51 33 7c 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-159 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 48 a4 0d 7c 3f bb 62 60 89 5b f7 52 ab d7 ca 61 | ikev2 g^x c6 32 47 69 10 70 7b 4b b6 2a 70 55 d5 38 a9 c2 | ikev2 g^x 06 fe 6f 0d a3 c3 18 2d 09 43 b4 f7 9b ba 82 ec | ikev2 g^x 93 e7 fe 37 c0 9d ff 14 eb fc f4 a5 4f eb f2 e9 | ikev2 g^x 81 40 d5 d7 0d b6 64 ad 86 89 bc 12 73 da 31 6d | ikev2 g^x 21 c9 f1 76 ef e5 fa c1 2f 00 73 7b 29 f7 14 d0 | ikev2 g^x cc 33 12 7b be c7 0b 95 25 c7 3c c9 94 8d 40 b3 | ikev2 g^x 24 76 27 7e c2 06 53 7c 39 6a 80 69 0a b2 fa aa | ikev2 g^x 13 ac 6b d9 25 77 ea de 54 91 5a 44 b0 3f bb f5 | ikev2 g^x d7 05 e4 68 6e f2 57 14 f5 2f 93 5c 8b e1 18 57 | ikev2 g^x a7 aa 40 49 0b b7 ce d1 00 80 ba 6e 5e cc 5b a3 | ikev2 g^x 7d 08 af 9a a8 cd d2 ac df 34 27 c2 04 7d d9 9f | ikev2 g^x e2 bf b9 fd 43 84 3d e1 23 56 2b 91 01 a7 94 b9 | ikev2 g^x 39 80 83 eb c5 4c de ac 80 1d 05 1e 22 14 a6 fb | ikev2 g^x 08 b1 be 3f 9b 24 b0 c4 63 eb 31 8d 24 20 37 93 | ikev2 g^x 7d fa a5 c0 26 eb c3 7c ae e2 24 2a 4f 31 bf c0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 93 99 a4 63 0d 72 bd 0a 86 bd f8 14 bb 6c 2c e3 | IKEv2 nonce e4 66 d1 1e e3 70 5a 2a 46 97 fd 74 37 df 1f 41 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9d f6 62 77 51 33 7c 30 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9f | natd_hash: port= 01 f4 | natd_hash: hash= 46 4a e8 13 db 7e 81 08 43 48 ab 41 d6 8f 57 84 | natd_hash: hash= 74 b1 75 e1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 46 4a e8 13 db 7e 81 08 43 48 ab 41 d6 8f 57 84 | Notify data 74 b1 75 e1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9d f6 62 77 51 33 7c 30 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 43 72 1d eb 44 7d 24 cc 39 78 4a ec 22 c2 1a 4e | natd_hash: hash= 3d 2f 0c bd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 43 72 1d eb 44 7d 24 cc 39 78 4a ec 22 c2 1a 4e | Notify data 3d 2f 0c bd | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #159 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #159: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #159 to 4294967295 after switching state | Message ID: IKE #159 skipping update_recv as MD is fake | Message ID: sent #159 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-159" #159: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.159:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #159) | 9d f6 62 77 51 33 7c 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 a4 0d 7c 3f bb 62 60 89 5b f7 52 ab d7 ca 61 | c6 32 47 69 10 70 7b 4b b6 2a 70 55 d5 38 a9 c2 | 06 fe 6f 0d a3 c3 18 2d 09 43 b4 f7 9b ba 82 ec | 93 e7 fe 37 c0 9d ff 14 eb fc f4 a5 4f eb f2 e9 | 81 40 d5 d7 0d b6 64 ad 86 89 bc 12 73 da 31 6d | 21 c9 f1 76 ef e5 fa c1 2f 00 73 7b 29 f7 14 d0 | cc 33 12 7b be c7 0b 95 25 c7 3c c9 94 8d 40 b3 | 24 76 27 7e c2 06 53 7c 39 6a 80 69 0a b2 fa aa | 13 ac 6b d9 25 77 ea de 54 91 5a 44 b0 3f bb f5 | d7 05 e4 68 6e f2 57 14 f5 2f 93 5c 8b e1 18 57 | a7 aa 40 49 0b b7 ce d1 00 80 ba 6e 5e cc 5b a3 | 7d 08 af 9a a8 cd d2 ac df 34 27 c2 04 7d d9 9f | e2 bf b9 fd 43 84 3d e1 23 56 2b 91 01 a7 94 b9 | 39 80 83 eb c5 4c de ac 80 1d 05 1e 22 14 a6 fb | 08 b1 be 3f 9b 24 b0 c4 63 eb 31 8d 24 20 37 93 | 7d fa a5 c0 26 eb c3 7c ae e2 24 2a 4f 31 bf c0 | 29 00 00 24 93 99 a4 63 0d 72 bd 0a 86 bd f8 14 | bb 6c 2c e3 e4 66 d1 1e e3 70 5a 2a 46 97 fd 74 | 37 df 1f 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 4a e8 13 db 7e 81 08 43 48 ab 41 | d6 8f 57 84 74 b1 75 e1 00 00 00 1c 00 00 40 05 | 43 72 1d eb 44 7d 24 cc 39 78 4a ec 22 c2 1a 4e | 3d 2f 0c bd | state #159 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb358009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb358005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #159 | libevent_malloc: new ptr-libevent@0x7fb358009640 size 128 | #159 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49612.801835 | resume sending helper answer for #159 suppresed complete_v2_state_transition() and stole MD | #159 spent 0.477 milliseconds in resume sending helper answer | stop processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3440300e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d f6 62 77 51 33 7c 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #159 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #159 | rejected packet: | 9d f6 62 77 51 33 7c 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #159: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3a590 | handling event EVENT_RETRANSMIT for parent state #129 | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #129 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #129 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49612.823024; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003124 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a100f0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #129 | libevent_malloc: new ptr-libevent@0x7fb3440300e0 size 128 "road-eastnet-nonat-129" #129: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #129) | 72 fb d4 3a 3d 31 ef 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 72 cd 05 8b 1a e1 a8 66 68 a3 88 d4 37 ab 29 | 8d ca b6 b0 86 38 49 65 ce de c8 b0 39 b5 e5 f9 | 49 66 a0 ac 83 68 f5 08 38 44 61 fc b4 c4 e3 93 | 86 b2 c8 75 e1 f1 8d 43 35 de 04 cc bd e4 ef a7 | 8b 7d df 6d 22 63 24 bb ce 8f 77 d1 43 ca 6b c6 | 70 cf 4e 81 02 44 0d 39 85 28 ca ae 69 3d 8b 1d | 8e 2a f9 28 37 54 47 1b 7f 1e 6c c3 e7 ca 7d c5 | 5d eb 2d b5 ee 04 65 71 a3 9b 69 bf 7f 5f e0 e8 | b1 ac e6 e0 77 7c 27 c0 f7 96 26 05 ab 95 ca fd | fa ef 5c 22 dc 42 3f 47 3c 21 7c b3 45 c2 0f 2d | 47 18 59 0f e9 05 83 ad b3 18 86 6e 4c 0f 6a 6f | a2 bf 54 51 83 2a 64 42 06 32 16 00 c7 cc 1b e9 | 3e b9 e5 cf 6c 0f 2e 6b fd eb c0 0a 44 95 18 9e | 2c d3 00 4b bf 67 5f 7a f5 b4 f7 f7 d7 fd a9 64 | 98 77 b8 cc 18 a8 1d 3e 8f 95 27 46 f6 67 44 7b | 96 ba b1 ae ad ee 56 93 ac c5 ad 91 dc 2a d2 ba | 29 00 00 24 64 51 a8 77 1e c3 b2 0e 1e 7b 14 6a | 5f 64 3b ca 18 8a 91 d8 b8 bf ce 82 b9 6f e1 5d | aa 66 20 12 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f cd a9 5a 90 93 b1 13 f3 88 1c ea | 0f f5 0f 31 39 58 6f be 00 00 00 1c 00 00 40 05 | 0e bb c8 26 22 69 20 e6 e2 bf a8 b0 a2 3b 98 e4 | e2 fb 7b 71 | libevent_free: release ptr-libevent@0x7fb354009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3a590 | #129 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 fb d4 3a 3d 31 ef 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #129 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #129 | rejected packet: | 72 fb d4 3a 3d 31 ef 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #129: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a12c70 | handling event EVENT_RETRANSMIT for parent state #144 | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #144 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #144 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49612.826295; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001712 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #144 | libevent_malloc: new ptr-libevent@0x7fb354009640 size 128 "road-eastnet-nonat-144" #144: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #144) | 95 f5 7e 43 50 83 91 f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 af 0d 3c f0 04 33 31 65 f6 8e 0a e2 6d 8f 2b | 3a 54 de b3 ca 0f b9 57 94 b3 82 c2 80 38 37 42 | 7f 12 9e 2e 71 85 9b 4b b8 30 72 8d 13 66 8d 18 | cc b4 6c 82 a9 1c ff 5f bc 21 44 b4 04 e3 03 9f | 86 65 ce c2 4c 9e c7 42 cb 55 d7 40 69 8e 4e 35 | 08 db 41 09 bf 5b 9f e9 29 80 fb 24 8c ee 8a 18 | 98 d5 9e 29 b1 2e 48 fa a4 54 8d 89 c7 a3 3f 0e | fc 43 c8 e1 70 19 e6 79 93 90 9a 7f 29 dc 10 54 | 5c 05 ee 55 8b da f3 4a d4 d1 7a 22 56 b9 55 f2 | 83 7d ee 0a 7b 20 d8 88 a4 b2 35 e6 85 84 6e ea | 73 63 0f 8a e4 f5 ba b9 cf c5 6d ef 42 bc 1c 31 | 91 cc e3 6a cc 1c 24 a0 43 43 cd 4a d2 99 1f d0 | 12 0e 0b 61 86 58 8a 2a 98 ff 0e 20 62 f2 a9 6f | 84 85 8e 3d 34 eb 58 ea 76 88 a9 8b bd 38 f7 19 | 7f 52 1e a6 e1 d5 d4 4f 95 6d fa 80 6a e1 f8 3e | c4 ca 0c d0 70 40 4c 9c cb 3a a3 28 2b c3 1c ff | 29 00 00 24 1f 01 c0 5a 0d f1 22 7b f9 16 68 fa | 7d 4a 59 bf c4 b6 f1 ab 98 c0 67 1a 42 27 bf 9d | d6 b1 35 d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 96 0c ca 76 1c 4b 86 73 02 f4 3a | a5 21 4a 8f fe b4 03 ee 00 00 00 1c 00 00 40 05 | 86 67 99 5d 30 be 3d 57 d4 ea af 87 c1 18 21 08 | 32 c4 b1 0f | libevent_free: release ptr-libevent@0x7fb36402ffd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a12c70 | #144 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 f5 7e 43 50 83 91 f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #144 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #144 | rejected packet: | 95 f5 7e 43 50 83 91 f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #144: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a903c0 | handling event EVENT_RETRANSMIT for parent state #152 | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #152 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #152 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49612.856566; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500056 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9f380 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #152 | libevent_malloc: new ptr-libevent@0x7fb36402ffd0 size 128 "road-eastnet-nonat-152" #152: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #152) | c7 e3 df ec 9e c4 62 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a7 d8 bf 29 24 11 1c ce c6 eb 11 96 dd 30 8f aa | 0c 4c 70 ce 87 a4 df 43 d2 6c ba d5 f0 3b d8 41 | 39 bd 2b 1a 59 08 f6 28 59 f9 b3 0f e5 b5 40 32 | 97 af 83 49 1b 9c e1 41 6c 19 d9 81 bd 62 6f 16 | 88 77 9c c6 99 70 f5 87 ca bd 33 9d e4 05 6b 5b | c0 98 a4 04 59 99 ff a8 0d 45 13 de 94 59 78 3e | 9f 29 e2 f0 6e 7e b9 fe f0 0d e5 7f 5b 4c 01 84 | ef a7 c0 48 17 b5 cf 69 2f 9d 37 d6 9e 2c 49 b7 | 21 74 f9 23 52 39 e5 70 37 49 22 ad bf 6a ae c7 | 00 73 99 52 14 5a 01 1d ec dc e2 c6 b8 f0 0e df | bb 4f 3c 66 48 6a d8 f8 3d dd ce 84 36 d7 fe 75 | b0 8b 40 6c b7 0a 71 a4 a1 89 ca 62 6c e9 05 72 | 42 a3 a2 98 b2 36 46 5e b4 83 55 6f f7 d0 07 bb | be 2a 0c 02 1c 0f 1c ef 21 73 11 f7 92 da ee 38 | b3 d6 c9 03 8b 2f b8 eb 38 2b 9f 1a 71 81 4d 22 | 5e d5 1f 81 77 a6 9c 34 d3 30 8a 8b 41 61 5e 1b | 29 00 00 24 29 e4 ca ab 2a 30 18 fc 26 46 3c 50 | 1a f5 21 d0 52 38 f5 d5 7b 74 90 b3 b6 ed 01 58 | e0 d9 32 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 38 7f 4c 40 24 5c 70 b7 73 9c 98 | de a9 9b f3 50 76 96 bb 00 00 00 1c 00 00 40 05 | 28 07 96 1e 77 dd a7 3a bc 86 9b 87 bc da 1a a0 | d3 4f e8 fc | libevent_free: release ptr-libevent@0x7fb34c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a903c0 | #152 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35400d120 | handling event EVENT_RETRANSMIT for parent state #102 | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #102 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #102 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49612.856757; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003189 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a903c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #102 | libevent_malloc: new ptr-libevent@0x7fb34c02a950 size 128 "road-eastnet-nonat-102" #102: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #102) | 27 a9 08 a7 62 f6 e2 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 3c 29 a0 c9 87 b4 80 a8 37 0b 02 31 7e 05 06 | 02 b7 61 4c 60 0e af ef 4b 5c b9 dc 19 0b 5d d9 | 85 a8 a5 ba 16 2d 92 a5 e8 44 5d 48 48 06 cf a5 | c8 1d 53 0f c9 1c 2d 7b a3 b3 51 75 2d 98 e2 85 | e1 14 fe ce 69 6e ee 85 ba cc ab 6a ed ac 29 a6 | 04 6d ec cb be 61 e5 98 b4 1e dc 38 dc 20 70 bb | 52 99 a2 ac 6c 5b d5 dd f6 c6 54 38 29 d3 1c 88 | 10 77 53 7e af 0b 17 62 42 90 de ab 20 33 28 bc | 91 f7 eb 8f 86 fb 2e 6b 0f 94 c5 1b d9 40 a4 9e | 85 bd 8a 30 d0 a6 6c 09 f4 53 70 9d 11 c9 76 49 | 32 46 6a 4a 93 73 a4 59 28 e7 d5 c6 a2 40 d9 fe | c5 0c 7c 9f 70 ed 22 06 0b e5 2d 6e 16 d1 d2 84 | dd d9 af a3 b3 06 49 42 9f 97 37 00 03 72 48 b5 | 2c 38 f9 d2 b0 86 d6 8d ff f1 cb a6 a2 01 50 8e | d5 f2 44 23 56 23 e0 80 83 60 74 3c 92 0d 5e fb | ab 02 db 75 25 b6 fb 54 b8 2c cc 93 7e 04 7e 47 | 29 00 00 24 02 3b 00 99 07 4d 65 f7 7a c6 71 3b | f3 f6 94 93 e2 10 88 59 58 b9 a5 ba 96 a3 b3 bb | 2e a4 a0 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f0 3d eb e8 fa 43 c6 b4 69 3b f8 | f6 b0 ac 09 3e c3 01 6c 00 00 00 1c 00 00 40 05 | 27 e7 8a b1 d1 bb a4 87 76 d6 0f f9 d8 03 fa 51 | 25 22 7e d6 | libevent_free: release ptr-libevent@0x7fb354012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400d120 | #102 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 e3 df ec 9e c4 62 b6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #152 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #152 | rejected packet: | c7 e3 df ec 9e c4 62 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #152: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 a9 08 a7 62 f6 e2 d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #102 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #102 | rejected packet: | 27 a9 08 a7 62 f6 e2 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #102: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0538 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2f770 | handling event EVENT_RETRANSMIT for parent state #50 | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #50 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #50 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49612.858088; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006189 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #50 | libevent_malloc: new ptr-libevent@0x7fb354012840 size 128 "road-eastnet-nonat-50" #50: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #50) | 96 fd fa e4 3e 0e 84 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 85 b8 19 de 5c 0b b8 2d cb 54 cd 4a 1a dc 75 | 29 fd ca 47 94 14 29 17 31 bc e5 6f 6c f8 34 07 | 54 0a 45 19 2c 2a 6f 1c b9 dd 1e a6 5c 18 fd 5f | 81 44 c7 97 e9 8f a1 20 0b 20 67 50 dc 17 2d 25 | 1e 18 a7 76 43 da 58 3d a0 3c 42 3d 77 42 d1 eb | ed 35 62 7a 01 62 e1 32 87 10 6c d5 80 f8 d5 7a | e6 0d bc 8d d6 42 76 b9 2d fe 0d c3 eb e6 a9 0d | 0e 9f 06 5b af 9e 49 ff c0 94 83 2a d0 2d 71 88 | 4e 9a 35 ec c3 f5 8a a6 c6 22 6e 7e 16 d4 d9 e4 | d9 14 a9 a0 89 f2 18 8e be cf da c0 b4 27 62 b2 | 69 81 38 d5 cf 1b 18 ef 28 a2 d6 ab 45 93 46 f0 | b0 cf a6 b1 57 a8 1a d7 72 93 ec cd 51 ba 98 80 | 63 05 e1 50 59 41 cf a5 af 5d 7f 76 36 8e 63 f7 | e7 a8 78 3d b4 e5 4b 57 33 d8 0b ca bb 46 3b d1 | 5c 60 2c ab 89 51 2a 58 57 80 21 7f 56 14 26 65 | bd a7 02 e1 81 1f b6 ff ab b3 3c 36 3a 4d e7 be | 29 00 00 24 62 85 07 c7 f7 76 d5 f9 35 e6 84 85 | cf ff 39 b7 d3 8a fe b9 27 ad b1 ed 4e 28 c4 d4 | 73 2f 0f ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 6a 14 0a 8a ea 03 bd 41 dc ab fe | 15 04 7a 2b 71 ea 6d 09 00 00 00 1c 00 00 40 05 | 24 23 f0 d4 3c 33 30 25 f8 fc 46 79 64 b6 7b 59 | 6c 35 21 7f | libevent_free: release ptr-libevent@0x7fb380022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2f770 | #50 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 fd fa e4 3e 0e 84 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #50 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #50 | rejected packet: | 96 fd fa e4 3e 0e 84 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #50: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-160" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-160' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #160 at 0x557d46aaed40 | State DB: adding IKEv2 state #160 in UNDEFINED | pstats #160 ikev2.ike started | Message ID: init #160: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #160: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #160; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-160" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-160" IKE SA #160 "road-eastnet-nonat-160" "road-eastnet-nonat-160" #160: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-160 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-160": constructed local IKE proposals for road-eastnet-nonat-160 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 160 for state #160 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2f770 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #160 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 | #160 spent 0.151 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-160" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.236 milliseconds in whack | crypto helper 3 resuming | crypto helper 3 starting work-order 160 for state #160 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 160 | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 160 time elapsed 0.000941 seconds | (#160) spent 0.948 milliseconds in crypto helper computing work-order 160: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 160 for state #160 to event queue | scheduling resume sending helper answer for #160 | libevent_malloc: new ptr-libevent@0x7fb3380300e0 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #160 | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 160 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #160 | **emit ISAKMP Message: | initiator cookie: | ec 91 fb f1 0c bb 28 b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-160 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3e 30 17 61 87 0e 49 c3 b5 8e 06 e9 0f 8d 98 6f | ikev2 g^x af 06 7c a8 d8 5f dc 88 0a 69 f2 9d 79 59 e2 95 | ikev2 g^x a1 fb db 6f 1f 95 32 7b b7 f9 9f f9 87 3d 1e fd | ikev2 g^x 84 a3 dc 5e 41 59 c7 3d 40 a9 2a 90 d5 3d ec a5 | ikev2 g^x 70 8f 09 86 de c0 6f f0 8b 3d 45 2f a8 92 74 65 | ikev2 g^x dc 5a 07 23 6d 89 30 20 25 5a 37 b2 af 30 d2 98 | ikev2 g^x c2 6a 98 57 d0 a0 8f ff e2 c6 37 8c 7f c8 5e c3 | ikev2 g^x 9d 98 d2 5d 5e 70 59 77 03 8a bf 2a a1 c0 c1 c0 | ikev2 g^x 77 97 84 ec 45 c7 38 00 39 c5 2e 6a 0f 64 17 e5 | ikev2 g^x 6e 90 68 05 f5 f6 24 a7 89 fc 3d ac 97 b9 b8 8e | ikev2 g^x 69 68 d2 76 c0 8b ed 21 84 18 d2 89 99 90 e5 b1 | ikev2 g^x e9 a1 7c 9d 78 af 48 90 e7 1b 1a 7c 29 30 21 6e | ikev2 g^x 39 f7 cd b5 93 ab 03 d1 25 14 24 ad 0e 2c 3a 55 | ikev2 g^x 23 bf 0e 11 13 d6 6c 92 56 a2 2e ac 22 4b 36 72 | ikev2 g^x 62 e4 c0 2c 6e a1 80 10 e9 1f 33 37 5b 82 aa ab | ikev2 g^x bc d0 55 fd fd 61 98 d4 55 8c e5 05 44 59 3d 11 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5a 7f a2 3e 7b 7f ae 84 88 a2 b0 db 20 96 18 8a | IKEv2 nonce e9 32 7e 19 52 af 25 1a 74 e6 9f 5e 17 1f 26 57 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ec 91 fb f1 0c bb 28 b3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a0 | natd_hash: port= 01 f4 | natd_hash: hash= 17 25 02 d7 0c d0 85 e5 86 af b4 01 ce 64 18 db | natd_hash: hash= 06 ad 6a 73 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 17 25 02 d7 0c d0 85 e5 86 af b4 01 ce 64 18 db | Notify data 06 ad 6a 73 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ec 91 fb f1 0c bb 28 b3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 33 04 36 eb ae 2e 87 8f ec 4d 9c 69 20 d1 b8 6e | natd_hash: hash= 57 bb 48 2f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 33 04 36 eb ae 2e 87 8f ec 4d 9c 69 20 d1 b8 6e | Notify data 57 bb 48 2f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #160 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #160: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #160 to 4294967295 after switching state | Message ID: IKE #160 skipping update_recv as MD is fake | Message ID: sent #160 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-160" #160: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.160:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #160) | ec 91 fb f1 0c bb 28 b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 30 17 61 87 0e 49 c3 b5 8e 06 e9 0f 8d 98 6f | af 06 7c a8 d8 5f dc 88 0a 69 f2 9d 79 59 e2 95 | a1 fb db 6f 1f 95 32 7b b7 f9 9f f9 87 3d 1e fd | 84 a3 dc 5e 41 59 c7 3d 40 a9 2a 90 d5 3d ec a5 | 70 8f 09 86 de c0 6f f0 8b 3d 45 2f a8 92 74 65 | dc 5a 07 23 6d 89 30 20 25 5a 37 b2 af 30 d2 98 | c2 6a 98 57 d0 a0 8f ff e2 c6 37 8c 7f c8 5e c3 | 9d 98 d2 5d 5e 70 59 77 03 8a bf 2a a1 c0 c1 c0 | 77 97 84 ec 45 c7 38 00 39 c5 2e 6a 0f 64 17 e5 | 6e 90 68 05 f5 f6 24 a7 89 fc 3d ac 97 b9 b8 8e | 69 68 d2 76 c0 8b ed 21 84 18 d2 89 99 90 e5 b1 | e9 a1 7c 9d 78 af 48 90 e7 1b 1a 7c 29 30 21 6e | 39 f7 cd b5 93 ab 03 d1 25 14 24 ad 0e 2c 3a 55 | 23 bf 0e 11 13 d6 6c 92 56 a2 2e ac 22 4b 36 72 | 62 e4 c0 2c 6e a1 80 10 e9 1f 33 37 5b 82 aa ab | bc d0 55 fd fd 61 98 d4 55 8c e5 05 44 59 3d 11 | 29 00 00 24 5a 7f a2 3e 7b 7f ae 84 88 a2 b0 db | 20 96 18 8a e9 32 7e 19 52 af 25 1a 74 e6 9f 5e | 17 1f 26 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 25 02 d7 0c d0 85 e5 86 af b4 01 | ce 64 18 db 06 ad 6a 73 00 00 00 1c 00 00 40 05 | 33 04 36 eb ae 2e 87 8f ec 4d 9c 69 20 d1 b8 6e | 57 bb 48 2f | state #160 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380022480 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2f770 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a12c70 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #160 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 | #160 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49612.867685 | resume sending helper answer for #160 suppresed complete_v2_state_transition() and stole MD | #160 spent 0.506 milliseconds in resume sending helper answer | stop processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3380300e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 91 fb f1 0c bb 28 b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #160 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #160 | rejected packet: | ec 91 fb f1 0c bb 28 b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #160: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45310 | handling event EVENT_RETRANSMIT for parent state #130 | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #130 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #130 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49612.894912; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003258 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa0940 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #130 | libevent_malloc: new ptr-libevent@0x7fb3380300e0 size 128 "road-eastnet-nonat-130" #130: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #130) | 85 43 6a ad 59 7d ce ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 ae b5 ed fb fd 70 00 13 8d 64 ee 46 d1 86 03 | 85 09 b4 b0 21 e1 75 08 18 f5 01 a5 ce d9 28 32 | 42 84 d9 a2 5d 29 4b 02 ec 24 a8 1c 76 d6 11 b3 | b7 ca cc 7d bb 8a 73 62 20 57 c8 ee 7d 78 9e 1d | 7a d7 f6 f5 3d b0 f3 26 b5 f8 7e 6c 34 29 9d e1 | 66 87 a7 94 04 46 39 e6 b7 02 1f 92 b6 19 a4 2b | 93 1f ea 2c 8d 99 b7 50 6f cd f0 d6 4b e1 d1 c9 | 7e 98 1d 25 8f 0a 2c a3 9a 8f 46 07 29 ef b1 91 | 6c b5 e6 a3 11 c5 c9 c8 5f a8 7f 93 e8 c3 28 29 | 1d 87 06 30 a9 b3 18 af 13 99 e2 ea 6d ca d3 37 | f0 97 8e c5 32 05 cc 70 9c 35 a3 ab 7d bb 03 4c | 6f 27 f2 98 7e 64 26 7d a4 db 20 0f 0c 9d fa ef | 62 00 52 b0 8e 30 a4 8a e8 bb 41 07 76 b9 71 f2 | 63 f8 6e da 4f 74 79 ae c9 5c 70 e4 82 06 94 fd | 62 5b ee db c2 84 ae ea bf 8a 91 a6 ef 57 d0 e7 | d1 ef 3e 19 e8 2e 02 37 b6 05 eb 7c 5d f3 b5 d0 | 29 00 00 24 6c 1f 45 88 1e 42 31 9a b9 27 19 26 | 95 8c 4f c4 41 99 09 32 1c bf f6 27 de 6a fb 55 | 00 73 7a e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 41 0f ce 80 1a 0e 57 d0 34 7b d4 | 5a 51 a5 89 80 d3 8f c9 00 00 00 1c 00 00 40 05 | 7f 09 ba 77 a9 79 98 e7 5b 47 dc 5e 0f 55 ef 6e | 76 2d 29 18 | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45310 | #130 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 43 6a ad 59 7d ce ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #130 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #130 | rejected packet: | 85 43 6a ad 59 7d ce ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #130: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0476 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90440 | handling event EVENT_RETRANSMIT for parent state #145 | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #145 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #145 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49612.907191; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001856 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45310 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #145 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 "road-eastnet-nonat-145" #145: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #145) | a6 a1 9f 1d 3f 3a 29 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 ad 76 df ba ca 18 92 b9 50 e2 27 a3 57 3f f5 | d7 ce ae 5d 80 a9 09 c6 8a 53 e3 ab 22 af 0e a7 | 88 2e e6 ed 37 ce 02 dd 03 71 9a aa 64 d1 00 5c | 54 65 05 0e 62 cb 77 34 78 e8 1d 0f 3c 6f 76 4f | d8 fc 9f c4 10 87 e5 9a b0 72 db 0a 63 63 0e ec | a2 67 9d 72 98 db 53 5f a6 6f e8 b3 98 59 aa 3b | 88 1a a2 8d d0 7f c4 94 06 61 c1 99 f9 c0 e1 fc | 19 b1 6a 14 b7 fd 63 fd d3 3b 83 b6 f1 f8 68 d2 | 13 f3 e6 28 90 fe d0 d0 88 c6 ca e3 4e 56 e1 09 | b8 4b c6 48 c4 d4 00 e6 af d0 6c fa ac 01 46 d9 | 68 30 67 9c 6d 90 ca de 4f 57 74 b7 7a b8 1b 41 | a9 90 f5 03 0d 89 d9 ac 42 f8 f9 ae 19 2a 88 37 | d2 a9 69 9e 81 b2 1c 52 07 de 0f fa d0 69 b1 a8 | 12 38 cf d3 2e 09 65 b8 1c da 6e 0b 4d 41 c0 65 | 80 dc 01 75 47 41 de 6c 83 4d 93 25 86 5c 1b c8 | f3 08 39 71 bd f1 c4 fe f5 43 e7 4c 77 94 d2 cc | 29 00 00 24 03 a8 59 45 29 a4 02 15 24 82 5a 54 | 64 ac fd bc 55 59 ba ca b7 e9 80 0d f2 9c bd f0 | d3 a5 de f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 e0 ba e6 72 d8 87 8f de 74 38 1d | 19 eb b3 76 79 6b d3 38 00 00 00 1c 00 00 40 05 | 6f 55 64 02 f2 84 7e 5a 25 36 99 f3 de 2c 7f 97 | 3a 54 f2 52 | libevent_free: release ptr-libevent@0x7fb34801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90440 | #145 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 a1 9f 1d 3f 3a 29 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #145 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #145 | rejected packet: | a6 a1 9f 1d 3f 3a 29 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #145: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28ab0 | handling event EVENT_RETRANSMIT for parent state #153 | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #153 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #153 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49612.920506; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500164 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90440 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #153 | libevent_malloc: new ptr-libevent@0x7fb34801d920 size 128 "road-eastnet-nonat-153" #153: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #153) | ed 10 7e d3 7b 33 74 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 23 2b fa a2 7a a7 c0 a4 0c c7 9f 58 c4 e7 e8 | 70 a1 a8 0f 51 5f a2 04 f4 14 9f d7 e2 33 9b d1 | 70 a9 9d e5 73 3e d4 0c 84 28 f3 47 b9 3c 03 49 | 98 c3 54 58 79 2a 6a d2 f7 19 34 3f ea 9b 09 66 | 26 4b 77 9a 2e 2d 06 7d b1 99 09 62 d6 ef 52 44 | 03 d0 e7 2e 96 a1 8d 5c ea 4e a7 ca 7e fb ac a0 | 2f ea 86 d8 ac 11 f8 20 6b 77 af c2 6c 84 38 e7 | 8a b3 d4 12 59 8f 14 90 f8 a1 09 66 1f 57 d8 3c | 73 c4 11 8b a8 7f b3 1e 97 ed 1c 65 90 26 33 5b | 30 76 3b 3b d5 b4 96 62 cb 7d 86 9d ad 4a 9e e5 | 2b b2 c9 9e 69 f5 8a e4 08 29 24 90 1c 8f 81 c4 | d0 5a 30 f4 83 2c f9 11 5c 07 b1 f7 f6 7a 22 ac | 46 53 33 91 c1 25 ad 6c f8 ee d4 49 b1 09 fc 61 | 27 91 e2 9d 17 78 bb a6 45 04 eb ad 01 76 59 27 | df 49 c6 69 61 22 0d b2 77 f2 e5 49 0e d0 19 37 | f9 e3 3c 5d ab 0d ee 24 0e 3a 1b 87 b3 59 f2 dd | 29 00 00 24 11 3e 89 f2 e4 5a b4 91 6f f3 6f e0 | 10 78 d4 00 e7 63 f4 34 67 6a f8 b4 dc 99 94 12 | b9 1e 59 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cc 1e 02 bf 67 12 0b 49 15 df fb a0 | 1b e0 2a 30 f1 cf bd 20 00 00 00 1c 00 00 40 05 | ce 1d 48 38 8b bc 75 71 1c ff 01 f5 d1 af 95 90 | 14 3b df 16 | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28ab0 | #153 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 10 7e d3 7b 33 74 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #153 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #153 | rejected packet: | ed 10 7e d3 7b 33 74 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #153: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-161" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-161' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #161 at 0x557d46ab0300 | State DB: adding IKEv2 state #161 in UNDEFINED | pstats #161 ikev2.ike started | Message ID: init #161: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #161: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #161; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-161" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-161" IKE SA #161 "road-eastnet-nonat-161" "road-eastnet-nonat-161" #161: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-161 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-161": constructed local IKE proposals for road-eastnet-nonat-161 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 161 for state #161 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a28ab0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #161 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 | #161 spent 0.172 milliseconds in ikev2_parent_outI1() | crypto helper 1 resuming | crypto helper 1 starting work-order 161 for state #161 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 161 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-161" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.274 milliseconds in whack | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 161 time elapsed 0.000994 seconds | (#161) spent 0.997 milliseconds in crypto helper computing work-order 161: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 161 for state #161 to event queue | scheduling resume sending helper answer for #161 | libevent_malloc: new ptr-libevent@0x7fb388032bf0 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #161 | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 161 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #161 | **emit ISAKMP Message: | initiator cookie: | 0e 21 c5 28 e0 11 16 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-161 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 98 b1 7e f7 73 9d 3d 0b 9c d2 8e 29 c6 08 34 06 | ikev2 g^x 2d dc ae 10 7c 53 33 af cd 18 8c 8c 37 fc eb 71 | ikev2 g^x 2c 3b de 0f 76 b3 63 bc 1c 05 f0 af 4b 44 5e c7 | ikev2 g^x 23 d4 29 d3 16 0f fb 8c 12 fb 18 1d 9e 65 94 73 | ikev2 g^x c1 7f 44 d2 39 97 a4 57 24 65 09 c9 9f 95 0f 07 | ikev2 g^x 98 bb c4 fc e8 f9 84 20 79 d3 9b da f2 f3 7b ff | ikev2 g^x 76 4d 74 89 ed 7a aa a4 38 3a 39 de f9 ec 60 48 | ikev2 g^x 7f 57 eb 50 ff 9b 33 98 7d 3b 5f cc 64 ba 1b 81 | ikev2 g^x 67 2a 02 26 ec 3f 45 a5 fe c6 9b 0d 1d 37 b0 40 | ikev2 g^x 01 1f 97 01 e8 87 5e 53 40 bf fb d3 7e 9e 2e b3 | ikev2 g^x 15 ba fc 8b b1 4a 7e fa af 94 c4 67 c0 2c 29 d2 | ikev2 g^x 74 fe d7 24 50 34 48 da f7 a1 54 c5 1c 2b 5a 35 | ikev2 g^x 33 a6 86 42 a8 e3 25 9b e3 fe 4c de 22 93 ae dd | ikev2 g^x c7 11 a7 9f 05 b4 87 2f a1 b9 2b f6 21 37 9c 8e | ikev2 g^x 50 21 6a 50 8e bd 1d 5f a1 42 92 50 68 2f 4e 9a | ikev2 g^x 54 04 e8 cc b9 5f 82 df 48 23 c8 76 49 63 f0 50 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b8 74 18 e1 c4 b4 30 2e a4 31 94 25 46 e1 dc 47 | IKEv2 nonce b5 0b e4 ae a0 1d 11 3a f1 77 67 fa 52 d5 2a a2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0e 21 c5 28 e0 11 16 2e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a1 | natd_hash: port= 01 f4 | natd_hash: hash= f8 94 bf 28 28 ea 74 13 ca 7d 07 ba 5d 79 38 7b | natd_hash: hash= d7 5d 40 d3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f8 94 bf 28 28 ea 74 13 ca 7d 07 ba 5d 79 38 7b | Notify data d7 5d 40 d3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0e 21 c5 28 e0 11 16 2e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= aa 2f 88 27 56 8a 2e 19 5d ff 44 bb aa 2d 48 42 | natd_hash: hash= c7 75 31 6a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data aa 2f 88 27 56 8a 2e 19 5d ff 44 bb aa 2d 48 42 | Notify data c7 75 31 6a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #161 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #161: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #161 to 4294967295 after switching state | Message ID: IKE #161 skipping update_recv as MD is fake | Message ID: sent #161 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-161" #161: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.161:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #161) | 0e 21 c5 28 e0 11 16 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 b1 7e f7 73 9d 3d 0b 9c d2 8e 29 c6 08 34 06 | 2d dc ae 10 7c 53 33 af cd 18 8c 8c 37 fc eb 71 | 2c 3b de 0f 76 b3 63 bc 1c 05 f0 af 4b 44 5e c7 | 23 d4 29 d3 16 0f fb 8c 12 fb 18 1d 9e 65 94 73 | c1 7f 44 d2 39 97 a4 57 24 65 09 c9 9f 95 0f 07 | 98 bb c4 fc e8 f9 84 20 79 d3 9b da f2 f3 7b ff | 76 4d 74 89 ed 7a aa a4 38 3a 39 de f9 ec 60 48 | 7f 57 eb 50 ff 9b 33 98 7d 3b 5f cc 64 ba 1b 81 | 67 2a 02 26 ec 3f 45 a5 fe c6 9b 0d 1d 37 b0 40 | 01 1f 97 01 e8 87 5e 53 40 bf fb d3 7e 9e 2e b3 | 15 ba fc 8b b1 4a 7e fa af 94 c4 67 c0 2c 29 d2 | 74 fe d7 24 50 34 48 da f7 a1 54 c5 1c 2b 5a 35 | 33 a6 86 42 a8 e3 25 9b e3 fe 4c de 22 93 ae dd | c7 11 a7 9f 05 b4 87 2f a1 b9 2b f6 21 37 9c 8e | 50 21 6a 50 8e bd 1d 5f a1 42 92 50 68 2f 4e 9a | 54 04 e8 cc b9 5f 82 df 48 23 c8 76 49 63 f0 50 | 29 00 00 24 b8 74 18 e1 c4 b4 30 2e a4 31 94 25 | 46 e1 dc 47 b5 0b e4 ae a0 1d 11 3a f1 77 67 fa | 52 d5 2a a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 94 bf 28 28 ea 74 13 ca 7d 07 ba | 5d 79 38 7b d7 5d 40 d3 00 00 00 1c 00 00 40 05 | aa 2f 88 27 56 8a 2e 19 5d ff 44 bb aa 2d 48 42 | c7 75 31 6a | state #161 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a28ab0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28ab0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #161 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 | #161 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49612.929954 | resume sending helper answer for #161 suppresed complete_v2_state_transition() and stole MD | #161 spent 0.419 milliseconds in resume sending helper answer | stop processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388032bf0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 21 c5 28 e0 11 16 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #161 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #161 | rejected packet: | 0e 21 c5 28 e0 11 16 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #161: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0586 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #103 | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #103 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #103 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49612.93211; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004265 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2f770 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #103 | libevent_malloc: new ptr-libevent@0x7fb388032bf0 size 128 "road-eastnet-nonat-103" #103: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #103) | 20 80 ad df 5a 9a 13 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d a9 30 94 a8 d4 ad b7 ab 41 10 cf dd 34 d7 45 | db 9e 99 58 0d 72 d8 74 bd 3c 1d 4a 98 9b ff 38 | 08 61 4e c7 a6 75 c7 cd ff 21 41 e1 5d c2 9d c6 | 7c 47 d1 97 8a 16 0e 0e 3c 96 7a d8 10 82 5b 8a | 00 b3 29 44 ad 13 12 a6 fb af 01 2d 66 5c e1 02 | 4b 01 af e5 ba 61 e3 fe 71 46 2a af 0d 0d 2a 26 | f8 12 e9 10 f0 8f ca f1 fd 82 c7 ea fa 46 02 26 | b6 95 72 2c b1 d7 c7 46 5a e6 4a 07 87 39 fe e7 | c6 a1 7d 2d 52 a4 c7 a2 b5 e7 2f 2b 1d 48 eb d9 | 7c e8 c4 cb da 19 e0 04 20 53 7b 3c 73 86 a7 70 | c7 09 d6 f9 52 be 12 99 31 58 c4 f8 6c 8b 22 3a | c5 da 0c e1 bd 65 73 c3 27 14 e7 0f ae a0 e8 45 | 58 e0 c3 02 1b 48 ee 20 03 b9 0c ec ad e0 21 05 | 1b 38 52 4b dd 92 f0 58 d2 29 eb 4e be 57 49 4d | 5d 0f a4 01 4b 76 95 2b 60 de d3 82 01 e6 15 d8 | 32 f5 60 60 88 d1 83 bc a6 c2 db 62 29 b3 d7 5e | 29 00 00 24 fb ef 9e 44 e4 82 6e 41 3f 46 3a c8 | d1 69 b9 34 c6 14 27 a3 23 52 4c 58 0c 66 b4 10 | 6a d0 69 ee 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 a3 d6 8d 6e 26 8b a3 26 28 d5 ff | 4a 28 a8 bb 6f af 66 22 00 00 00 1c 00 00 40 05 | e5 6e de 91 25 32 b5 3b 38 9d 70 ef 64 14 11 f9 | c0 c1 79 e6 | libevent_free: release ptr-libevent@0x7fb36c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #103 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 80 ad df 5a 9a 13 26 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #103 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #103 | rejected packet: | 20 80 ad df 5a 9a 13 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #103: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a25d10 | handling event EVENT_RETRANSMIT for parent state #51 | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #51 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #51 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49612.934396; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005789 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #51 | libevent_malloc: new ptr-libevent@0x7fb36c00cf80 size 128 "road-eastnet-nonat-51" #51: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #51) | 4e ec 23 15 b1 7b 72 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb ca ad 90 d3 c3 42 ab 02 0a 3a 99 99 08 46 41 | e3 20 e2 b5 e7 92 8d 56 c0 f6 81 f6 d7 1f 61 ae | fb 7c 4e 49 1a 90 7d af 41 51 b1 4f a9 1c af 26 | 43 e3 44 1a 2b 54 c2 29 d3 73 8c a6 e2 ba 3d 02 | 79 ed 80 dd 4b 1e 56 a7 0d 93 2b 80 2d fa ef a7 | a5 07 28 e5 1d 36 9e 70 e3 83 04 4a 00 cd 83 0a | dd f1 6f 7b 41 89 16 39 86 45 b3 89 6b 38 63 99 | 64 d2 3b 37 57 db 5b aa 3c 09 dd b1 e9 2a 36 7d | 07 9a 1b 84 49 cb 9b 53 1f e3 16 45 5a 7e 7d 6a | b6 b2 5f ad 65 38 70 73 69 63 43 b9 48 24 d6 aa | 84 39 4e 67 2a d2 39 99 70 07 69 a7 7e 3b f3 d0 | 5d 4d 0d 43 76 2c 16 f2 ef 43 c1 03 3c a0 15 fa | 7b dd 0d 24 8d 60 85 f6 a5 c6 c1 eb e0 9b 23 f3 | 77 0d cd ab 79 52 59 61 60 d0 e6 6a b2 5f 84 3c | bc fe a3 56 10 78 f4 57 b0 c9 73 a2 9c 16 ae e5 | 21 a9 af 1c 86 05 49 d7 79 de ea 6f 42 c1 58 6c | 29 00 00 24 8a 81 ff 83 11 9d 7f 95 f4 0f 60 37 | ee c1 de 9d 9d 4a 24 6c a2 0d 2e aa 53 c1 6d 4e | 8c ed 61 8e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 84 7c cd 2e 5d e1 e4 b9 3d 91 59 | 8e 0e df bf 1a 34 00 37 00 00 00 1c 00 00 40 05 | 4f e7 ab 4c a7 2a fc d1 46 25 a0 98 d8 53 89 a8 | 24 a4 22 8e | libevent_free: release ptr-libevent@0x7fb3840223a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a25d10 | #51 spent 0.0924 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e ec 23 15 b1 7b 72 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #51 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #51 | rejected packet: | 4e ec 23 15 b1 7b 72 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #51: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a276e0 | handling event EVENT_RETRANSMIT for parent state #131 | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #131 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #131 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49612.963634; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002218 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a25d10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #131 | libevent_malloc: new ptr-libevent@0x7fb3840223a0 size 128 "road-eastnet-nonat-131" #131: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #131) | ad 34 7c 82 56 8e 42 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 46 e3 f8 a7 ca 79 f1 93 d8 0a 34 f9 91 ea 90 | 77 1f 83 03 4d 56 b1 a2 80 fd 5f 11 9a a9 0e 07 | 36 d2 ed 03 17 79 a3 f7 12 9f 05 ea 25 52 aa 39 | 69 97 15 3f 13 ff 62 78 88 a8 12 45 6d 5a 25 bd | 48 89 e9 ef 1f ad 28 87 00 42 ce a4 5f 7b 92 dc | 5d 1c f0 bb 25 31 dd e0 95 17 e2 9c e6 0b 50 26 | d7 14 f3 fe 1e d8 81 cc 32 fc 47 d4 65 1e 3b 75 | 32 54 1f 31 95 11 57 b2 4c 02 a6 33 ce 14 e9 e2 | e8 05 1b 1c cb 66 89 aa 6f 57 54 90 f2 c1 cf bd | a5 b3 7a c8 ef 67 d8 5e 26 3c 19 61 97 89 69 83 | 4b df 7e 44 0f 87 25 bc 6c 4f d8 49 5f 35 7f 1f | 6e 25 45 69 17 ee 43 65 f2 ee f7 63 5d 98 79 9e | fc c9 a2 e1 68 04 58 49 4b 9f c5 76 64 08 49 29 | 17 3a 17 1d 87 31 e4 d7 77 de 85 c2 0a d4 26 0f | 9f f4 0b fc 3f 26 bf f9 03 95 99 d3 57 10 6f ed | 92 8e 36 88 87 df d0 52 c8 ab 1d e3 6f cc ae 49 | 29 00 00 24 3c 10 ae 50 61 d8 53 b3 d3 e2 21 42 | 85 3a 07 db 01 3a f5 3e 94 0e a7 09 dd b2 ae 2b | e1 07 91 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 36 c8 4a f5 a5 90 83 e4 ec b2 3e | 44 38 46 9b 6e 4b f9 11 00 00 00 1c 00 00 40 05 | 1e 37 ad 88 e1 0a 42 8f 3f c7 b2 8c f4 b1 3f 27 | c4 6f 80 e6 | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a276e0 | #131 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 34 7c 82 56 8e 42 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #131 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #131 | rejected packet: | ad 34 7c 82 56 8e 42 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #131: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0487 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a43dd0 | handling event EVENT_RETRANSMIT for parent state #146 | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #146 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #146 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49612.973914; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002382 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a276e0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #146 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 "road-eastnet-nonat-146" #146: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #146) | 44 6c 8c 11 77 9b c1 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b e4 4b 01 63 76 c0 7a c8 2d 36 69 32 60 94 ea | 6d 55 57 2b 4e ff 0e 39 b8 87 ae 9d 5d a1 84 c3 | fd 7e 75 5e b5 db f9 c0 f2 b4 77 67 0c bc 83 d2 | b3 2c 18 7b 18 da 84 81 dc 1d 09 bc ef cb 96 0b | 54 3e 13 a5 2c e8 26 52 c4 b3 5b d7 9c b8 e6 22 | f7 8d 8e 88 21 d1 87 46 36 62 d4 63 42 41 4c 1f | 8f 43 21 27 b3 df 00 21 d1 8d 41 5a e5 9f 04 8b | ff c6 a4 97 a5 12 34 cb aa c2 51 13 9f 26 59 55 | a5 7b 2f 9e 53 52 08 32 a2 06 5f 18 aa a0 ac 8a | 4c 25 e1 2e cb 23 eb 05 33 52 1c b1 e7 32 06 d0 | 42 ed ad 95 48 c5 eb 3d 1a cb f5 6d dc 2f a2 a8 | 4e 15 75 28 ce 0c d4 fb 09 18 56 79 e6 17 c1 dd | e4 ed 35 be 6f e9 12 84 6e 1e 87 b9 38 ca fc f5 | d4 85 cf 4e a3 1f db 6c 1f e5 f2 54 ba 88 10 cb | 4e bc 46 9b 79 cb 0a 36 af 61 69 14 f8 97 5e 9d | 27 b8 f4 1b 36 1d 0b 8b f0 e7 f8 06 78 36 dc d7 | 29 00 00 24 79 24 14 13 36 a3 2b 17 a4 40 30 01 | 57 eb a4 ff f9 15 14 cb 86 dc 31 a7 64 7c e3 06 | ae fb 59 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 46 87 8a 4c 47 2e ae ab e2 03 f4 | cf 0f 35 fc df 03 af ad 00 00 00 1c 00 00 40 05 | 7f ed fa 9e 74 b9 38 c0 e7 89 49 8c f1 a3 30 c7 | bc 00 44 f5 | libevent_free: release ptr-libevent@0x7fb34c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a43dd0 | #146 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 6c 8c 11 77 9b c1 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #146 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #146 | rejected packet: | 44 6c 8c 11 77 9b c1 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #146: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #154 | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #154 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #154 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49612.982252; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500228 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a43dd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #154 | libevent_malloc: new ptr-libevent@0x7fb34c01d920 size 128 "road-eastnet-nonat-154" #154: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #154) | 58 44 d0 f4 a9 dc 50 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 19 a5 f0 13 d1 8a b9 49 96 a8 fe 61 6f 4c e6 | ed 98 cc 8a 65 9d e4 af 10 e6 cf 62 f8 4a ff 02 | 90 85 dd 9e 23 5d 3e 90 f8 fe da b0 af 0e f7 4d | 4a 05 63 a1 69 db d1 01 e1 b1 0c 86 c9 3e 7d 9b | a4 2a 0f 98 09 40 36 8c 8d db ff 98 96 15 32 bf | 21 16 30 40 ae ae fb 4d 47 43 6a 1d c4 ee 0d b8 | 26 d3 b2 3f 2c ab f7 f8 0e a5 40 0f 3a fc 7c 80 | cc 8b 34 d2 f1 7f 26 73 45 a4 a9 ed 44 96 56 b1 | 73 9b 2b 0c 92 10 cb f0 48 16 48 7a 38 20 64 1d | 96 ee 19 8c 5c 7f a1 2d 3c cf aa b0 87 20 50 5a | d7 fe ed 1e da e9 09 e6 09 9a 75 a1 17 60 9e 3f | eb eb 3b 4a e8 5b e7 e1 61 2b a2 e0 ec 37 4d 19 | 5f 61 62 98 dd f9 aa d9 4b 8e bd 76 64 f0 89 37 | 39 0c 99 e6 f2 9b c5 88 8a eb 5b 10 1d 66 5f 10 | c6 5a 71 1c 22 22 ac a4 dd 72 16 46 60 ff 04 a0 | 8f 7a b8 da e1 39 b2 3e 50 39 72 e6 6a 86 81 1e | 29 00 00 24 8a 71 f4 36 cf 99 83 f2 20 30 a8 af | 91 e1 58 d7 2f 81 0b 43 f4 5f a3 87 48 cc 52 31 | 9b 27 40 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 21 57 f3 9f 4c 07 c6 03 b1 b0 7f | 5c 7f 90 aa ef 12 66 a4 00 00 00 1c 00 00 40 05 | de 38 70 15 e3 5a 3a 70 b8 42 a9 af 5d 6c a1 ee | f3 f1 65 20 | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | #154 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 44 d0 f4 a9 dc 50 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #154 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #154 | rejected packet: | 58 44 d0 f4 a9 dc 50 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #154: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0656 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-162" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-162' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #162 at 0x557d46ab18c0 | State DB: adding IKEv2 state #162 in UNDEFINED | pstats #162 ikev2.ike started | Message ID: init #162: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #162: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #162; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-162" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-162" IKE SA #162 "road-eastnet-nonat-162" "road-eastnet-nonat-162" #162: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-162 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-162": constructed local IKE proposals for road-eastnet-nonat-162 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 162 for state #162 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a468d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #162 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 | #162 spent 0.147 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-162" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.221 milliseconds in whack | timer_event_cb: processing event@0x557d46a2b650 | handling event EVENT_RETRANSMIT for parent state #52 | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #52 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #52 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49613.005464; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006319 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8d840 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #52 | libevent_malloc: new ptr-libevent@0x7fb3680300e0 size 128 "road-eastnet-nonat-52" #52: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #52) | 3f 70 d8 3e f5 22 c6 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 a5 a2 fa 37 05 a0 83 be fb 7c 66 e8 09 2d 85 | 01 d0 84 ba 7e 80 ad 7e ed 7e 94 4b 5a d1 13 c1 | b1 3f 59 cf ac e4 bd 6c 95 59 bf de 9d 80 55 dd | 6c d4 7d e3 9f 38 7c 31 e7 3a f4 3d 5f ba 5a 68 | 83 7f 56 b6 a6 97 f9 9a 87 45 7b ad 59 c8 c8 c2 | 85 24 f6 8d 4c 54 59 44 37 96 77 29 ac 68 3f 6e | df da 66 fc fd e2 52 7f c0 d8 5a 6e 87 c7 d0 ea | dd 74 ac b4 2a 5c 26 2d 8f 9d 33 80 5d 13 86 23 | e5 74 ae 2d f0 58 19 74 bb 0c 9a fe 02 e9 ea 18 | 9b e9 68 5d 7c 72 e9 79 59 15 c2 74 d4 16 6f 97 | c0 92 81 74 a6 70 c8 c9 0a 8b 1e 5b 97 dd a0 5d | 10 4a 89 98 ee 3e 73 f8 ad 8e 0b 84 2b bb 87 07 | d3 19 10 ac f4 31 29 ae a0 fb 57 db 57 8e e8 3d | 7b 1c bf f9 0f c4 88 43 de 6a ac 3c e2 0b 51 3c | 47 b2 1e 04 99 56 29 39 94 ab 53 44 ad 54 e0 54 | 9d 52 e0 9a 6d 24 de d9 e3 52 91 a1 b5 19 19 fc | 29 00 00 24 bc 06 52 3b 0a a9 d6 55 15 a3 be 4e | de 77 6e 83 33 60 ab 6d e9 76 1e 6c cb ab 4d 19 | f5 ca 65 a4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 c4 b5 bf ec 75 31 9e 5d c6 9c 0c | 53 7b fb 92 b5 6c 20 70 00 00 00 1c 00 00 40 05 | 2a 93 28 00 9d ed cf 28 c2 1f ba 32 c1 4a e1 a2 | d1 c6 7c 44 | libevent_free: release ptr-libevent@0x7fb34c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b650 | #52 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f 70 d8 3e f5 22 c6 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #52 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #52 | rejected packet: | 3f 70 d8 3e f5 22 c6 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #52: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 2 resuming | crypto helper 2 starting work-order 162 for state #162 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 162 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 162 time elapsed 0.001289 seconds | (#162) spent 0.907 milliseconds in crypto helper computing work-order 162: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 162 for state #162 to event queue | scheduling resume sending helper answer for #162 | libevent_malloc: new ptr-libevent@0x7fb380032bf0 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #162 | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 162 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #162 | **emit ISAKMP Message: | initiator cookie: | 3b bf da 45 10 1c 63 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-162 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e8 2a 00 6f 37 4b f5 08 dc 2d d5 a4 5f d7 a7 d8 | ikev2 g^x a8 4d 31 bb 56 e7 51 71 5b 5d fc c8 0e 08 fb e2 | ikev2 g^x c0 7c 0d 9e fa 59 01 dc 52 d2 c1 e7 2f 1a e5 b4 | ikev2 g^x 5b d5 c8 45 b5 dd 91 a9 d5 c3 73 76 9d 7e fd b8 | ikev2 g^x f9 df d1 f8 01 94 2b 6f e5 9a 29 12 9e de 27 97 | ikev2 g^x 71 f3 e6 1b 74 76 a7 3a 8c e6 a9 61 00 52 7e f7 | ikev2 g^x c9 6f 55 40 33 0a 80 4c aa c5 55 f4 4e 14 8a a7 | ikev2 g^x 71 a6 78 3d d0 59 58 77 2f 99 7c 4c c3 1e 74 08 | ikev2 g^x f9 85 d0 5e 65 f5 6a 31 d7 63 2d f9 e8 59 8b 16 | ikev2 g^x 32 89 82 d2 3f 02 ed 88 92 cb b0 35 d8 db 40 15 | ikev2 g^x 72 43 38 f2 76 11 5a 75 77 0e 67 e7 50 ab d6 be | ikev2 g^x 45 bd 9e 45 2f 01 23 b3 e6 91 d2 ea db c5 26 44 | ikev2 g^x 62 95 26 52 cc d7 f4 4b d1 06 28 b1 bb 01 1a 47 | ikev2 g^x 2c 16 e5 b8 18 7a 69 d5 78 76 2f ea 81 85 bf fa | ikev2 g^x 27 ed 91 6a 8a 48 18 3c 3f 20 85 89 ae e6 4e 97 | ikev2 g^x 89 5c 72 59 c7 16 4a 7b 0a b0 0c 8e 44 0c ca 39 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 95 de a1 84 1b 6b 5e e8 be 4d c4 44 d7 89 7f ff | IKEv2 nonce f7 3c d6 b5 51 9e bf df 42 03 ca bf 75 41 b7 ce | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3b bf da 45 10 1c 63 64 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a2 | natd_hash: port= 01 f4 | natd_hash: hash= 01 45 b2 30 32 2f 26 ad dc fc 75 7c 7f bc 91 0d | natd_hash: hash= 37 21 2d 1b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 01 45 b2 30 32 2f 26 ad dc fc 75 7c 7f bc 91 0d | Notify data 37 21 2d 1b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3b bf da 45 10 1c 63 64 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= b1 72 3a ba 32 f9 7a 15 ec b8 bb 62 7e ea 84 2a | natd_hash: hash= af f4 56 24 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b1 72 3a ba 32 f9 7a 15 ec b8 bb 62 7e ea 84 2a | Notify data af f4 56 24 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #162 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #162: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #162 to 4294967295 after switching state | Message ID: IKE #162 skipping update_recv as MD is fake | Message ID: sent #162 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-162" #162: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.162:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #162) | 3b bf da 45 10 1c 63 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 2a 00 6f 37 4b f5 08 dc 2d d5 a4 5f d7 a7 d8 | a8 4d 31 bb 56 e7 51 71 5b 5d fc c8 0e 08 fb e2 | c0 7c 0d 9e fa 59 01 dc 52 d2 c1 e7 2f 1a e5 b4 | 5b d5 c8 45 b5 dd 91 a9 d5 c3 73 76 9d 7e fd b8 | f9 df d1 f8 01 94 2b 6f e5 9a 29 12 9e de 27 97 | 71 f3 e6 1b 74 76 a7 3a 8c e6 a9 61 00 52 7e f7 | c9 6f 55 40 33 0a 80 4c aa c5 55 f4 4e 14 8a a7 | 71 a6 78 3d d0 59 58 77 2f 99 7c 4c c3 1e 74 08 | f9 85 d0 5e 65 f5 6a 31 d7 63 2d f9 e8 59 8b 16 | 32 89 82 d2 3f 02 ed 88 92 cb b0 35 d8 db 40 15 | 72 43 38 f2 76 11 5a 75 77 0e 67 e7 50 ab d6 be | 45 bd 9e 45 2f 01 23 b3 e6 91 d2 ea db c5 26 44 | 62 95 26 52 cc d7 f4 4b d1 06 28 b1 bb 01 1a 47 | 2c 16 e5 b8 18 7a 69 d5 78 76 2f ea 81 85 bf fa | 27 ed 91 6a 8a 48 18 3c 3f 20 85 89 ae e6 4e 97 | 89 5c 72 59 c7 16 4a 7b 0a b0 0c 8e 44 0c ca 39 | 29 00 00 24 95 de a1 84 1b 6b 5e e8 be 4d c4 44 | d7 89 7f ff f7 3c d6 b5 51 9e bf df 42 03 ca bf | 75 41 b7 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 45 b2 30 32 2f 26 ad dc fc 75 7c | 7f bc 91 0d 37 21 2d 1b 00 00 00 1c 00 00 40 05 | b1 72 3a ba 32 f9 7a 15 ec b8 bb 62 7e ea 84 2a | af f4 56 24 | state #162 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a468d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #162 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 | #162 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49613.007551 | resume sending helper answer for #162 suppresed complete_v2_state_transition() and stole MD | #162 spent 0.472 milliseconds in resume sending helper answer | stop processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb380032bf0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b bf da 45 10 1c 63 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #162 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #162 | rejected packet: | 3b bf da 45 10 1c 63 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #162: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.055 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34800d120 | handling event EVENT_RETRANSMIT for parent state #104 | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #104 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #104 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49613.018857; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.008622 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b650 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #104 | libevent_malloc: new ptr-libevent@0x7fb380032bf0 size 128 "road-eastnet-nonat-104" #104: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #104) | c8 97 67 f1 1b 46 da 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 e4 3d 30 95 de e5 8c 73 da 01 a0 e2 a0 c0 5e | ab 07 43 87 84 24 88 49 ca d1 13 72 cc 7b 38 93 | 5a ab ff 3c 3d d2 b7 a9 16 19 a5 56 5c 01 9f 05 | 2f 70 be 2d 9d 04 2c f7 80 b3 5f 24 70 c4 0d 58 | b9 f4 31 d3 bd 25 62 64 07 37 4c 59 6f a0 74 90 | e2 15 77 64 4c 06 2d 41 bc 70 c3 30 0a 01 9b df | a0 88 42 69 26 57 a1 25 9a c0 ee 4c ee 57 50 5f | 0c 95 2a a5 72 cb d8 81 34 25 75 ee 4d 04 23 27 | e9 da 7c 36 60 32 11 97 39 d8 f4 3f 96 13 6c 72 | 19 1d 43 e4 f0 4a 92 88 29 4c 84 63 63 7d 3a aa | 3f 23 85 5a 73 71 01 2f 63 e6 b3 a0 2d 7f 75 e1 | e9 d4 1c 1a 83 67 2e 29 49 85 8a a1 31 04 a5 31 | 1b e6 35 a4 14 80 ac 17 6c 11 db 3d c3 88 57 d2 | 55 c5 b6 4e 2c 2b 58 d9 50 1f f2 54 b6 50 63 00 | d4 ad 6c 3c 60 cd 52 3b 9b 0f 69 cc f2 8f 29 dc | 29 5e 75 22 60 a0 c9 59 5b 00 1a 98 02 fb 23 0f | 29 00 00 24 16 fd b9 d2 33 64 36 d1 f0 bb fa 0d | d8 4a 7e 7c 2a 2e d1 92 40 9f bf f6 34 ac 7a 15 | 2b 49 c7 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 28 db 0c 20 22 dd ba ac 9b fa 10 | b6 bd 27 81 bf 6a a0 a8 00 00 00 1c 00 00 40 05 | 90 9a 71 02 e5 61 58 ec fb 0f 5f 95 cd f2 2e 99 | e5 4b 54 60 | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800d120 | #104 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 97 67 f1 1b 46 da 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #104 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #104 | rejected packet: | c8 97 67 f1 1b 46 da 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #104: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0709 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #132 | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #132 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #132 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49613.02622; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00201 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #132 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 "road-eastnet-nonat-132" #132: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #132) | 8f fb fe 61 19 e1 9c b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 1f 4f d1 68 44 b0 da 10 cc a3 65 0b 05 29 46 | a5 ef 62 34 d2 17 30 f6 7e b7 1c 3d c0 61 fd c8 | 25 96 8a e1 67 57 19 a7 8f 6a aa 6e 4c 1e 1c bb | 2a 10 04 d7 17 65 58 ce 83 ac 91 4f 48 71 e3 8d | af 3f 22 d8 df 00 4a d4 1b df 76 a7 ad 26 ba ba | 91 be fb 08 a9 70 66 2f 99 bf ef e8 c6 21 cc c0 | ed 1d fb 20 f6 60 07 53 22 da 88 1b 1d 11 4a 37 | e6 c8 75 11 02 89 b4 55 ec 0c 8b 31 52 06 0f 18 | 81 e2 42 d3 fe 87 7f dc c5 02 18 bb 87 cb 91 7a | 01 aa 5e f6 49 fd e3 ed df 8b 65 4a 5d 0c dc 05 | 45 9e f7 6f 6c 11 d8 bd 19 75 3d 5b 55 32 77 3d | 44 4c 11 8d 32 50 da 6e 0a 86 ef 69 5f 2a bb 9d | b7 76 10 6b da 52 00 cf e9 de 40 71 fd 9c 21 a3 | 2a ac 7a 1a 3b 67 9b 88 e6 1e 25 7c 3a 6e 9c 54 | 4b 96 e9 1a 08 38 3b 3b 27 21 e9 0c 79 a6 d9 1c | 14 07 fc c1 42 9e 29 79 0d 68 f7 e2 3d 93 ce 38 | 29 00 00 24 92 fc 82 18 58 23 4b 06 62 ee b8 b2 | f1 d5 54 0c 3d b0 88 33 58 36 a6 39 d7 5f 04 ee | ca 34 01 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 e7 04 0b 0d 59 5a cd 8a 54 e3 8a | 4e 81 3b 76 de 25 c1 57 00 00 00 1c 00 00 40 05 | c3 b5 61 af 5d 2d 46 0f c8 2c 48 99 41 b8 6c e0 | 5b 12 cb e3 | libevent_free: release ptr-libevent@0x7fb3600251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #132 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f fb fe 61 19 e1 9c b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #132 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #132 | rejected packet: | 8f fb fe 61 19 e1 9c b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #132: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #147 | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #147 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #147 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49613.037586; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002428 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #147 | libevent_malloc: new ptr-libevent@0x7fb3600251c0 size 128 "road-eastnet-nonat-147" #147: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #147) | c9 49 59 84 c8 e5 a9 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 23 1f ef d0 ab 86 83 db 3a 42 1d 72 53 7f 1d | 10 99 05 4a 99 4f 3f 9a 98 88 bd df 90 bb 6b e6 | 5a 0a ce 6c 41 04 da 58 5d c4 4f ac da 97 26 a7 | 11 32 a8 06 1f e1 87 a2 42 1e e6 6a 0c 68 08 40 | f5 b9 1e 41 1b cf 5c 75 a8 60 06 b2 5f cf d9 87 | 6b e4 af 8e 02 f2 fa 22 10 06 d6 15 19 bb fa f0 | 66 24 d5 79 4a bf 96 b3 63 ad e6 0f 0b 5c f6 47 | 01 64 bd d8 46 3f e5 ea a4 26 5d e5 06 c2 a7 0f | 35 e2 b0 0a 2c 32 20 be 52 14 9d b5 0e ec 56 cf | b3 f0 bf 5e 01 73 a8 04 a0 e0 5c 8a fe 29 b1 7f | 37 66 a5 5b ec c8 06 fb 07 01 0f 4c 5e 63 33 d2 | 2f d4 5c 61 3e 3f 82 73 d1 fb c8 86 80 bb eb c9 | 28 2b cc 48 8d 11 24 24 01 fe 7a 40 83 2b 75 31 | d3 44 40 97 d2 ba 07 04 c5 0b 99 12 41 24 f8 ad | ae 7e f2 a1 cb 5b d9 cd e9 53 59 dd 6f dc 6a 90 | 39 c5 d7 b8 42 59 e8 06 c8 85 08 f1 c6 2d 85 3e | 29 00 00 24 56 cc b0 4f af 68 49 01 85 6b 57 3a | 2e bf 2e 45 7c 71 09 75 a1 1e fe 83 ec 88 f6 fe | d7 b8 8a 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 3a 80 78 a8 ce 4e 37 f2 7e 4e 6e | c2 ec 51 b5 d8 d3 ef c5 00 00 00 1c 00 00 40 05 | 80 dd aa b7 d6 9c 8d 45 3b 70 75 ca 6b f3 11 7a | 54 5b 54 8d | libevent_free: release ptr-libevent@0x7fb35c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #147 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c9 49 59 84 c8 e5 a9 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #147 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #147 | rejected packet: | c9 49 59 84 c8 e5 a9 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #147: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a84000 | handling event EVENT_RETRANSMIT for parent state #155 | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #155 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #155 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49613.045944; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500879 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #155 | libevent_malloc: new ptr-libevent@0x7fb35c01d920 size 128 "road-eastnet-nonat-155" #155: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #155) | ba 2d 75 59 38 9a 40 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 2d 8b bd fb e0 3e 63 93 cb 94 a3 59 ba 66 52 | 15 4e 4f 76 34 6f 63 6c 04 46 3b 73 fd d8 a5 8e | 35 33 06 7a 8c 2a 4d a0 d2 b7 a5 ef 60 5a a8 23 | ae c6 93 50 9f f0 c3 f5 06 df 4c 45 c0 4d 3b 90 | 71 b1 18 44 3a bb 92 05 e2 cb 38 9c 05 04 9c e5 | 33 86 8c 22 6f 05 07 53 37 10 99 50 e7 0b 25 55 | 89 9d 75 47 09 a1 92 af c6 86 5d 17 e6 b3 28 20 | 26 34 0c 4e a0 b6 47 51 4c df 53 f2 97 03 03 a6 | 89 4b b3 92 4a ab b5 e2 4b 58 52 5d fc 27 cb e8 | 64 f4 d9 2f f4 95 21 72 e7 fe 03 93 84 af de ff | 1c 75 39 21 b3 f9 de 3e e2 ac 5f bb e7 9f 0c bd | 32 99 99 15 33 bb 7d f8 f9 aa 92 5a 38 4d 6d 97 | 0e 69 3d a1 d8 b7 8f 44 ed 36 63 50 f7 7e 74 d2 | 45 dc 02 6e 87 72 5d 06 c1 0c 87 2a 42 4a 0c 96 | e5 33 b2 8a 28 de 43 7b 5c 89 da 84 03 93 af 07 | 0f 41 63 be 8b 32 2d a1 13 d7 f4 a0 78 5d 7b 02 | 29 00 00 24 1b 6f 61 ca 07 05 56 47 f0 44 a9 2b | df 2e 5b cb e9 85 db 0d bf 4e 16 8e a5 b1 b6 3b | d1 6b b0 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 9d 23 9a a7 98 84 7a 80 70 0e 3e | c4 f1 43 a7 4e 6b 6b 59 00 00 00 1c 00 00 40 05 | 2e 42 b0 ef a0 75 a1 7c 37 dd 50 d1 c0 f7 e8 21 | 72 07 2b e7 | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a84000 | #155 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 2d 75 59 38 9a 40 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #155 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #155 | rejected packet: | ba 2d 75 59 38 9a 40 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #155: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0552 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-163" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-163' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #163 at 0x557d46ab2e80 | State DB: adding IKEv2 state #163 in UNDEFINED | pstats #163 ikev2.ike started | Message ID: init #163: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #163: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #163; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-163" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-163" IKE SA #163 "road-eastnet-nonat-163" "road-eastnet-nonat-163" #163: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-163 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-163": constructed local IKE proposals for road-eastnet-nonat-163 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 163 for state #163 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a84000 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #163 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 | #163 spent 0.155 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-163" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.248 milliseconds in whack | crypto helper 0 resuming | crypto helper 0 starting work-order 163 for state #163 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 163 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 163 time elapsed 0.000626 seconds | (#163) spent 0.643 milliseconds in crypto helper computing work-order 163: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 163 for state #163 to event queue | scheduling resume sending helper answer for #163 | libevent_malloc: new ptr-libevent@0x7fb384032b00 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #163 | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 163 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #163 | **emit ISAKMP Message: | initiator cookie: | b1 c1 5c f9 4d 0c 91 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-163 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 53 d1 ee ef 57 4d b8 a5 18 99 63 b7 ad a0 31 43 | ikev2 g^x d2 4c 84 95 c1 56 d8 c2 a0 e0 21 45 55 6c 89 41 | ikev2 g^x 0a ee 26 bb ae 9b 55 18 51 40 94 3e b5 e8 52 b3 | ikev2 g^x f5 21 f9 c6 39 17 43 69 05 cf af ff e3 2c 05 76 | ikev2 g^x 7f cc d0 9f 70 3b df 95 16 de 0c 79 98 56 e5 a0 | ikev2 g^x 35 3e 81 89 f8 f4 57 f4 b0 38 84 5c 5c 95 c5 75 | ikev2 g^x db 5d ff 22 a3 04 68 2a 25 a8 ca 43 e9 88 c1 c7 | ikev2 g^x f1 52 93 65 ec 22 3d 52 6b b8 00 65 57 c2 e3 a8 | ikev2 g^x 9e 23 a1 b2 55 fc 9b 13 25 aa af 20 21 98 a7 a2 | ikev2 g^x 67 94 3b 2e 91 84 12 14 99 be b3 af 12 1e 8a 45 | ikev2 g^x f6 79 09 3e 9e e8 3f fa a3 e8 99 22 6f d9 b8 e7 | ikev2 g^x 13 bd 62 da a2 36 db a1 c0 b9 40 6d 4f e4 fd e0 | ikev2 g^x be a7 dc c7 36 bf 14 ea 84 eb 4f 8e 85 9d 9c de | ikev2 g^x 91 8b 80 a4 7b dc e6 20 7f bc ce 40 33 ff 25 de | ikev2 g^x 32 53 56 b7 10 56 66 76 3f 7a e3 c4 c5 0e a7 df | ikev2 g^x 21 e3 47 1d 5c 2e 41 54 d0 87 c6 c9 9f 14 d5 5a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce cf 96 ac 26 a7 c4 21 b6 9b dc fc 7a 6b 63 82 8c | IKEv2 nonce ca 2e ba 40 54 d7 a8 1f 94 42 b0 f9 02 a1 4a 97 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b1 c1 5c f9 4d 0c 91 f4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a3 | natd_hash: port= 01 f4 | natd_hash: hash= 65 05 f9 8b c8 3a 1a ac 16 65 f3 b7 0f 08 b9 7b | natd_hash: hash= 40 ca e7 92 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 65 05 f9 8b c8 3a 1a ac 16 65 f3 b7 0f 08 b9 7b | Notify data 40 ca e7 92 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b1 c1 5c f9 4d 0c 91 f4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 34 4b bc c5 91 2d b9 5e a5 87 8c 3c 9e 2e e2 11 | natd_hash: hash= d1 e0 38 4e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 34 4b bc c5 91 2d b9 5e a5 87 8c 3c 9e 2e e2 11 | Notify data d1 e0 38 4e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #163 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #163: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #163 to 4294967295 after switching state | Message ID: IKE #163 skipping update_recv as MD is fake | Message ID: sent #163 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-163" #163: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.163:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #163) | b1 c1 5c f9 4d 0c 91 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 d1 ee ef 57 4d b8 a5 18 99 63 b7 ad a0 31 43 | d2 4c 84 95 c1 56 d8 c2 a0 e0 21 45 55 6c 89 41 | 0a ee 26 bb ae 9b 55 18 51 40 94 3e b5 e8 52 b3 | f5 21 f9 c6 39 17 43 69 05 cf af ff e3 2c 05 76 | 7f cc d0 9f 70 3b df 95 16 de 0c 79 98 56 e5 a0 | 35 3e 81 89 f8 f4 57 f4 b0 38 84 5c 5c 95 c5 75 | db 5d ff 22 a3 04 68 2a 25 a8 ca 43 e9 88 c1 c7 | f1 52 93 65 ec 22 3d 52 6b b8 00 65 57 c2 e3 a8 | 9e 23 a1 b2 55 fc 9b 13 25 aa af 20 21 98 a7 a2 | 67 94 3b 2e 91 84 12 14 99 be b3 af 12 1e 8a 45 | f6 79 09 3e 9e e8 3f fa a3 e8 99 22 6f d9 b8 e7 | 13 bd 62 da a2 36 db a1 c0 b9 40 6d 4f e4 fd e0 | be a7 dc c7 36 bf 14 ea 84 eb 4f 8e 85 9d 9c de | 91 8b 80 a4 7b dc e6 20 7f bc ce 40 33 ff 25 de | 32 53 56 b7 10 56 66 76 3f 7a e3 c4 c5 0e a7 df | 21 e3 47 1d 5c 2e 41 54 d0 87 c6 c9 9f 14 d5 5a | 29 00 00 24 cf 96 ac 26 a7 c4 21 b6 9b dc fc 7a | 6b 63 82 8c ca 2e ba 40 54 d7 a8 1f 94 42 b0 f9 | 02 a1 4a 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 05 f9 8b c8 3a 1a ac 16 65 f3 b7 | 0f 08 b9 7b 40 ca e7 92 00 00 00 1c 00 00 40 05 | 34 4b bc c5 91 2d b9 5e a5 87 8c 3c 9e 2e e2 11 | d1 e0 38 4e | state #163 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a84000 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #163 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 | #163 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49613.068543 | resume sending helper answer for #163 suppresed complete_v2_state_transition() and stole MD | #163 spent 0.341 milliseconds in resume sending helper answer | stop processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb384032b00 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 c1 5c f9 4d 0c 91 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #163 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #163 | rejected packet: | b1 c1 5c f9 4d 0c 91 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #163: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4ebd0 | handling event EVENT_RETRANSMIT for parent state #53 | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #53 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #53 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49613.079707; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004643 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd40 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #53 | libevent_malloc: new ptr-libevent@0x7fb384032b00 size 128 "road-eastnet-nonat-53" #53: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #53) | 22 bd 87 7d 85 b9 18 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 30 f1 21 57 e7 a6 a0 b1 5a 51 b3 c9 69 4a 15 | 0c ef ee d8 55 97 13 32 e2 cf 8d c8 f3 74 4c 97 | 22 ad ca ab 81 a4 a0 26 9d e6 3b e7 1c 2b d2 a1 | d6 72 47 dd ab 72 ec c1 cc d7 d9 8f d8 66 bc e6 | 53 77 a5 12 d5 84 8f 13 60 d3 99 01 c2 30 50 56 | 18 a7 45 bc dd f7 11 3f 14 e8 e1 27 67 4e d9 50 | bb c0 6c 1a d8 e9 1e 81 c4 fa a9 14 22 9d 32 b4 | e1 11 67 1b f4 56 6f d3 5b 27 83 19 34 08 ee 9b | f3 6b 24 bb c8 a8 09 ee 97 89 49 a0 fb 47 38 93 | ca a8 21 f6 da 4a ff ce b8 5a 83 17 3c fa b5 a4 | 1d 50 f4 b9 26 78 5e a6 78 30 f6 80 a4 cd 3e ae | ea 19 26 25 27 2f a8 b0 bc e9 8e dc 47 51 61 79 | 07 e7 6e 1f 82 d0 fe 19 b0 44 4b f8 92 c9 fb 82 | 83 56 b0 37 a7 92 bf 23 17 cb fb 8b 75 11 c5 e0 | 1d 95 a6 1f 6a 1b 78 a9 5c 16 4e 89 74 ff c7 5a | 43 0f 1f 26 45 20 46 36 e0 37 07 46 11 e2 7c fd | 29 00 00 24 1d d0 6e d2 14 3b 95 3d 7a f3 16 f0 | 13 a4 5c 97 24 08 af 2b 29 b2 1a e1 3b dc 59 4d | 62 47 73 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 de d2 d7 2b e1 3c 0c 4b a2 6a 97 | 5e 9e de 30 79 3d d7 e0 00 00 00 1c 00 00 40 05 | de 44 b7 78 c2 27 43 2d 86 e9 13 34 57 72 8f 74 | 48 51 21 6e | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | #53 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 22 bd 87 7d 85 b9 18 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #53 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #53 | rejected packet: | 22 bd 87 7d 85 b9 18 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #53: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.075 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46950 | handling event EVENT_RETRANSMIT for parent state #133 | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #133 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #133 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49613.091016; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003368 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #133 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 "road-eastnet-nonat-133" #133: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #133) | 93 2c 91 72 20 8c aa 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c d8 f9 2c 2b a0 b1 31 57 35 e0 04 75 fa ff 27 | 53 64 2e 54 ea 38 e0 ef 52 11 3d 36 64 b6 af 29 | 51 f7 3a cb 03 fb a8 9c 8c 4c bb 74 63 76 7d d1 | a9 88 c4 5e 87 dd 7f 20 3b 30 84 84 16 86 c9 65 | d1 47 a8 28 8d 73 90 06 c4 7f 57 27 02 dd dc 34 | 3e 36 07 bc f4 b2 13 c9 ca 56 ee e3 b6 fc 0e 46 | 17 c4 47 02 3c 22 35 e8 99 a1 3a f2 88 57 e2 b2 | 76 46 aa bb c5 86 a7 a3 5d df 02 48 a4 96 00 22 | 34 1a 70 44 11 10 cb ff f2 1d 21 21 00 41 5a a7 | a1 5f 54 12 46 7f 51 02 26 94 4f 54 f8 0e be ce | 2f 5a 2b 9b 25 dc a0 31 41 2a dd d5 76 31 f7 83 | c2 70 58 eb 31 ba 5b 36 57 70 32 a0 20 3d ec e9 | 48 52 21 d4 39 1a 79 f6 31 e1 9a c8 d2 b3 fd 12 | 8c 10 74 fe 54 6f eb b1 c3 58 8e 49 2a 38 98 47 | 38 39 a8 64 1a 71 f1 c2 47 f8 d0 db da e6 75 10 | 1b a2 b7 e4 c4 eb b7 43 ca b9 9e 23 21 75 e9 b6 | 29 00 00 24 2f d1 c4 74 6b fd 49 84 52 1d 9d 1d | ec af 19 02 47 e5 8f b7 c6 73 48 d2 a9 91 58 b2 | b6 74 d3 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 b3 b4 a5 c4 da 26 36 c8 2a e5 e1 | 3e af ad 98 58 9a bf c4 00 00 00 1c 00 00 40 05 | 31 45 bd 61 73 08 cb 41 73 c4 72 6c eb e0 15 88 | 84 49 78 a3 | libevent_free: release ptr-libevent@0x7fb3580180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46950 | #133 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 93 2c 91 72 20 8c aa 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #133 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #133 | rejected packet: | 93 2c 91 72 20 8c aa 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #133: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f7760 | handling event EVENT_RETRANSMIT for parent state #105 | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #105 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #105 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49613.095309; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002934 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46950 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #105 | libevent_malloc: new ptr-libevent@0x7fb3580180b0 size 128 "road-eastnet-nonat-105" #105: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #105) | f1 44 62 e8 b2 96 b0 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 2c 0f 43 7a b6 95 d2 da 02 c7 c3 b7 c1 84 3a | 45 85 a1 11 41 47 db 34 2a fb b4 18 d1 bf ea 06 | 1a 10 f5 e2 f0 2e 22 4f eb 14 58 fa 5c 28 c5 97 | e2 ae 87 b0 f4 b2 19 f2 c0 72 df 2a 2b df 2e 30 | f5 e9 e3 d6 5a 85 fc e6 1c 1c 2d 36 25 55 ff d7 | e9 f8 4f e9 95 2f bf 23 70 c4 27 2f 59 aa 5a d4 | 00 1b f9 ac 9d 1b 73 43 66 d9 a7 24 55 56 33 f4 | df 70 86 46 09 22 db 6f ad cb 9a 9a bd 6e 03 ac | ab d8 ee 40 d0 e9 4f 4e ad 4c 58 0f 93 e2 e1 c8 | a2 ad 19 24 8d ca 10 9a 44 cb e8 b8 40 12 de e1 | 29 64 1e 40 f8 bf aa 87 bb 84 b2 5f 6f 0d 9d b9 | 12 51 1b 65 f4 ee e0 55 a1 dc 96 99 27 5b 4c a9 | 9a e4 cf 90 e8 fa 83 39 ff df 24 19 f2 75 1e b2 | 3a c5 5a ee 20 09 c9 38 60 08 ab 53 42 3f a9 0e | 51 ea 72 b2 25 2b b8 e3 e2 f5 9e 45 c1 0c 4c 33 | 68 83 d9 f1 9b 1b 60 f3 f4 29 c3 90 eb 9c dd 59 | 29 00 00 24 b7 9a f1 29 40 44 aa 07 d6 8e b0 7b | 73 1b 3f b3 0a e3 ed 21 f1 bb 89 35 39 a9 d4 99 | a7 53 6e 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 95 3e 47 a9 bf e3 9c 92 80 50 73 | b0 a9 03 26 40 9a 45 50 00 00 00 1c 00 00 40 05 | c6 93 aa 3b 5e af 6b 75 f9 54 eb f4 c6 61 f4 b6 | b4 32 51 f3 | libevent_free: release ptr-libevent@0x7fb35c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f7760 | #105 spent 0.0955 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f1 44 62 e8 b2 96 b0 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #105 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #105 | rejected packet: | f1 44 62 e8 b2 96 b0 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #105: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #148 | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #148 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #148 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49613.098585; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001075 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd80 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #148 | libevent_malloc: new ptr-libevent@0x7fb35c02a950 size 128 "road-eastnet-nonat-148" #148: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #148) | 7c 0d 88 21 0c f2 96 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 04 bc 64 c4 a9 25 09 2d 75 95 3b 11 b4 ff 15 | 97 7a 18 93 a6 88 e9 2c b9 6a 56 2f 0c f9 8a d8 | e8 e9 8c f3 6e a2 1a 4d de 32 b3 62 b7 1f cf 21 | 58 10 7d f4 24 b5 81 70 c7 68 14 37 9d fd 00 6b | b4 bb f2 40 cc b3 6b 23 df e5 3d 42 b5 d1 d7 42 | c0 5c ac 6a f7 66 60 50 9f bf be d5 78 f9 b4 31 | b1 86 de 30 ed 54 6a fc f4 65 4d b6 71 b3 0e 10 | 8b ff f6 ba 06 b3 35 4f f4 27 dc 02 7d 26 88 9b | ce 4c 6b f4 f0 e1 8d 43 1e f3 4c 5f ec 71 b9 2c | e9 3b 85 fd 08 23 e1 df 81 46 1d 11 72 44 8f d9 | 74 89 1c 9f d5 79 90 5f cf 86 54 f4 23 c9 c4 31 | af 2e 84 a4 ff ec cf b7 ba 60 46 0a 15 eb 88 9e | 1a 9f 61 a8 80 c2 60 68 d5 be 6e 09 41 6f c1 fc | 1b 37 54 8c 93 b5 3d fd bd 96 aa 9b bc 05 8d 2f | 00 4c 54 bb 3b 96 94 4f 45 ac 6c 6e b1 21 ad e3 | 8b d3 f2 47 fe 35 bf 98 09 a6 a6 c8 c9 12 c2 70 | 29 00 00 24 b1 81 e7 c9 15 f6 0b 96 d5 74 cc 65 | 51 5c df 58 13 0b 15 8c 15 4d e2 64 8b 9f d6 7a | 91 6a aa 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 56 10 9c c6 bc 82 78 34 d0 03 57 | 7a d1 bd 45 e3 1a b3 5c 00 00 00 1c 00 00 40 05 | 74 be 93 cb aa 1f 0e 04 cc 93 49 b7 b1 e0 d6 3d | b3 9a 6d 48 | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | #148 spent 0.0994 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 0d 88 21 0c f2 96 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #148 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #148 | rejected packet: | 7c 0d 88 21 0c f2 96 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #148: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a60690 | handling event EVENT_RETRANSMIT for parent state #156 | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #156 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #156 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49613.110857; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.5003 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #156 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 "road-eastnet-nonat-156" #156: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #156) | dd 32 b7 34 a5 67 d1 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 58 47 50 60 00 e3 2a ab 04 ac a5 14 a4 e1 f8 | 89 44 71 9e b6 e2 f8 e1 89 a3 38 1e eb a4 57 9b | c0 92 a7 d8 d8 8c 0f 8c f9 d0 36 f7 8d 04 cc a1 | 61 5a bc bb 35 d5 16 ad 1c 27 3b fa 1b a3 4f 77 | 4e 80 47 b0 e1 83 82 b2 b5 df c4 bc d9 8d 01 04 | 4e b5 a6 60 d4 4f b3 0f 13 49 05 d9 85 5d f8 18 | 24 40 91 d1 3d 7e 6a 98 45 d7 dd 05 70 e0 c6 57 | c1 84 e8 77 d6 e2 7f 57 50 49 e0 f2 9f b0 43 93 | be 02 be f3 99 3a 02 72 36 17 a3 a7 b6 d3 1e 0b | e7 53 c6 c9 cc d5 25 75 87 c0 73 6c 5f 57 27 d6 | 52 91 24 4a 97 d3 d6 0e af 8d 6c 52 24 2d ea 91 | a1 73 e1 9e 71 14 d1 4f eb 25 67 a3 b8 12 64 b9 | 8a 15 3f 88 bc 65 32 65 96 0c ff f7 b9 a7 84 11 | bd 40 10 e1 dc 1a 04 fe 8c 35 23 2a ec b7 33 72 | 4b f4 4a e9 9d f1 da a3 b6 9c fe 09 27 14 3a 79 | 5d 82 c7 e0 9b d4 a3 ce 53 68 f7 6f b3 06 c9 71 | 29 00 00 24 b7 44 fe 38 00 43 d3 2b ff 97 13 ca | 89 7c c3 ed e0 15 4d 76 12 7b b9 2f 48 9b b5 b3 | 8b 4d ce 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 13 6e 65 76 b7 ef f6 88 e7 f3 9e | f3 f9 5a bb 01 8b 91 4f 00 00 00 1c 00 00 40 05 | 4f 93 4d ef 0e 69 28 8b f3 02 75 93 a5 b3 16 9b | e0 c9 4b 18 | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a60690 | #156 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd 32 b7 34 a5 67 d1 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #156 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #156 | rejected packet: | dd 32 b7 34 a5 67 d1 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #156: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-164" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-164' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #164 at 0x557d46ab4440 | State DB: adding IKEv2 state #164 in UNDEFINED | pstats #164 ikev2.ike started | Message ID: init #164: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #164: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #164; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-164" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-164" IKE SA #164 "road-eastnet-nonat-164" "road-eastnet-nonat-164" #164: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-164 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-164": constructed local IKE proposals for road-eastnet-nonat-164 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 164 for state #164 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a60690 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #164 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 | #164 spent 0.162 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-164" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.278 milliseconds in whack | crypto helper 9 resuming | crypto helper 9 starting work-order 164 for state #164 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 164 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 164 time elapsed 0.000854 seconds | (#164) spent 0.859 milliseconds in crypto helper computing work-order 164: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 164 for state #164 to event queue | scheduling resume sending helper answer for #164 | libevent_malloc: new ptr-libevent@0x7fb378035930 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #164 | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 164 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #164 | **emit ISAKMP Message: | initiator cookie: | 44 ec da ac e4 4e 81 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-164 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a1 94 19 dd 63 76 e7 8b e4 83 63 43 89 b2 25 2d | ikev2 g^x cf 02 f9 4f bb e0 9f 71 73 45 f7 70 9f f0 9c 56 | ikev2 g^x 36 6b be c1 42 fc 0e 64 e7 c2 6d 24 a0 c6 36 60 | ikev2 g^x f7 b6 44 63 1f f0 38 ff c1 f7 6f 09 6f 4b 15 6f | ikev2 g^x 4b a9 13 86 3c 04 b4 e0 2d 41 b8 5f 44 ac d3 1c | ikev2 g^x 62 7f f8 b0 79 c8 65 ec 61 21 a8 52 27 b3 79 db | ikev2 g^x 53 67 7e 4f 89 b2 45 b9 ee 3a 63 76 a6 cd 73 36 | ikev2 g^x 58 41 37 8e 8c 8a ef d6 60 54 ff 74 54 a2 07 6a | ikev2 g^x 56 54 10 22 af 8e 9e 38 af 48 a8 f2 42 f1 a6 05 | ikev2 g^x c8 55 0c 92 44 27 a3 4d be a5 b4 50 92 f3 bb 45 | ikev2 g^x b6 87 15 6c 92 a5 f1 21 ba 44 19 05 5c 4c f2 dd | ikev2 g^x 7d 64 1c 49 e3 61 8b 21 2c ef 63 14 91 93 e6 e8 | ikev2 g^x 84 82 9f 30 40 50 49 82 eb b8 19 d0 b6 4a c4 be | ikev2 g^x 05 18 e6 9d 08 3f bb c7 7a 98 44 e5 42 f9 eb fa | ikev2 g^x fc 80 53 22 fc 7c b9 e3 92 39 dd 88 61 10 2d 74 | ikev2 g^x 06 8e 96 3a 48 45 58 41 40 85 53 83 03 19 1d 49 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e5 04 5f 5d b9 93 eb b6 f3 88 8f 81 b6 50 c2 5a | IKEv2 nonce e0 91 27 94 ef 3b 1e 82 c9 33 1d 99 72 cc f9 03 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 44 ec da ac e4 4e 81 16 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a4 | natd_hash: port= 01 f4 | natd_hash: hash= 91 cd 86 69 c3 fa 02 39 bf fc f5 08 1b bd f9 dc | natd_hash: hash= 60 39 91 12 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 91 cd 86 69 c3 fa 02 39 bf fc f5 08 1b bd f9 dc | Notify data 60 39 91 12 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 44 ec da ac e4 4e 81 16 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 76 11 49 93 b0 52 97 cc bc 0b 84 d2 15 33 08 b4 | natd_hash: hash= 9a f9 d3 5b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 76 11 49 93 b0 52 97 cc bc 0b 84 d2 15 33 08 b4 | Notify data 9a f9 d3 5b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #164 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #164: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #164 to 4294967295 after switching state | Message ID: IKE #164 skipping update_recv as MD is fake | Message ID: sent #164 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-164" #164: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.164:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #164) | 44 ec da ac e4 4e 81 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 94 19 dd 63 76 e7 8b e4 83 63 43 89 b2 25 2d | cf 02 f9 4f bb e0 9f 71 73 45 f7 70 9f f0 9c 56 | 36 6b be c1 42 fc 0e 64 e7 c2 6d 24 a0 c6 36 60 | f7 b6 44 63 1f f0 38 ff c1 f7 6f 09 6f 4b 15 6f | 4b a9 13 86 3c 04 b4 e0 2d 41 b8 5f 44 ac d3 1c | 62 7f f8 b0 79 c8 65 ec 61 21 a8 52 27 b3 79 db | 53 67 7e 4f 89 b2 45 b9 ee 3a 63 76 a6 cd 73 36 | 58 41 37 8e 8c 8a ef d6 60 54 ff 74 54 a2 07 6a | 56 54 10 22 af 8e 9e 38 af 48 a8 f2 42 f1 a6 05 | c8 55 0c 92 44 27 a3 4d be a5 b4 50 92 f3 bb 45 | b6 87 15 6c 92 a5 f1 21 ba 44 19 05 5c 4c f2 dd | 7d 64 1c 49 e3 61 8b 21 2c ef 63 14 91 93 e6 e8 | 84 82 9f 30 40 50 49 82 eb b8 19 d0 b6 4a c4 be | 05 18 e6 9d 08 3f bb c7 7a 98 44 e5 42 f9 eb fa | fc 80 53 22 fc 7c b9 e3 92 39 dd 88 61 10 2d 74 | 06 8e 96 3a 48 45 58 41 40 85 53 83 03 19 1d 49 | 29 00 00 24 e5 04 5f 5d b9 93 eb b6 f3 88 8f 81 | b6 50 c2 5a e0 91 27 94 ef 3b 1e 82 c9 33 1d 99 | 72 cc f9 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 cd 86 69 c3 fa 02 39 bf fc f5 08 | 1b bd f9 dc 60 39 91 12 00 00 00 1c 00 00 40 05 | 76 11 49 93 b0 52 97 cc bc 0b 84 d2 15 33 08 b4 | 9a f9 d3 5b | state #164 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a60690 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a60690 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #164 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 | #164 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49613.131537 | resume sending helper answer for #164 suppresed complete_v2_state_transition() and stole MD | #164 spent 0.47 milliseconds in resume sending helper answer | stop processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb378035930 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ec da ac e4 4e 81 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #164 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #164 | rejected packet: | 44 ec da ac e4 4e 81 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #164: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a70b50 | handling event EVENT_RETRANSMIT for parent state #134 | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #134 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #134 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49613.149767; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002285 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f7760 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #134 | libevent_malloc: new ptr-libevent@0x7fb378035930 size 128 "road-eastnet-nonat-134" #134: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #134) | 80 c9 f7 0f 34 43 e8 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 45 e5 b7 ab 0c a4 4c 5f b2 54 d8 39 c5 f7 ae | a7 a1 c9 5c 2b 5a 97 72 d3 14 80 31 3f b5 24 0d | cb 02 f5 57 a3 d0 5f 51 b9 29 93 ae b9 a3 6f 26 | d5 1f 2c 2d f7 c7 46 60 60 aa 8f 11 69 88 d5 d6 | 7f c3 44 3b 7a f5 6e 59 77 4f a4 43 34 c4 26 e5 | ae dc 49 7d 8b cd 2b ab 18 68 bd 39 90 28 6c 4a | 23 91 a3 0e 3f fb 01 de 41 7d 06 32 ac 44 1c 44 | 83 e0 6e 5a 17 ec 28 70 e3 9f 5e 65 cd d5 6a 13 | f4 b1 48 8a 51 f8 b7 54 21 1a 5d da c7 53 38 a4 | e5 03 02 af 81 ae 46 39 d4 15 23 f5 a8 b9 79 ca | ed 1c 97 81 a2 68 bb 3f 5d 13 76 91 c8 b3 35 4a | a1 e6 8f 6f 10 12 49 6f 3e bb 3b bc 07 2d 62 f9 | 63 5c f1 5a ec c4 50 49 e3 cf a2 cc 8f 61 b4 4c | 09 95 92 ca 4c 19 06 a3 80 ad 6b cf ef 46 70 41 | 9a 5d 9d 72 62 c3 a0 af ac b6 f0 ed e6 2e a4 c8 | 97 d4 46 3b dc 90 f1 11 ff c1 1a f7 bc 4d b4 b1 | 29 00 00 24 d7 88 26 03 5a 89 cf 88 bf 43 40 13 | b0 8c b4 f5 85 1c 5d f5 ed 6d ea f7 d0 1d 42 5d | 64 c8 0e 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 5d 43 f9 e4 68 67 0d 96 3e 2a d1 | 87 17 c9 81 16 11 d8 11 00 00 00 1c 00 00 40 05 | 17 79 69 7c c9 bf 1a b4 97 b1 98 46 4c 85 68 c7 | a4 36 11 6c | libevent_free: release ptr-libevent@0x7fb35001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b50 | #134 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 c9 f7 0f 34 43 e8 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #134 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #134 | rejected packet: | 80 c9 f7 0f 34 43 e8 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #134: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338005860 | handling event EVENT_RETRANSMIT for parent state #54 | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #54 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #54 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49613.159127; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004995 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b50 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #54 | libevent_malloc: new ptr-libevent@0x7fb35001d920 size 128 "road-eastnet-nonat-54" #54: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #54) | 4e 45 bc 88 5c 41 98 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 f4 91 14 5c ab 2e e9 80 6d af 62 f3 7d f3 c8 | 41 66 e7 43 38 9a c7 1b 1e f8 8c 7d f7 db 12 65 | 59 fd 3d ea 2d 58 b5 eb bc 29 cf 89 c5 08 e0 32 | af 71 20 82 0f be ca 31 6c 17 02 ca 88 1d 08 2b | 41 de be 4f db b6 e0 c9 ce b8 f5 78 72 16 5b d3 | af b2 62 71 28 3f 0e a5 9b 79 4c c6 6b 64 ea 6c | 30 86 90 45 62 e9 86 e5 b2 f0 de b0 25 c7 2c 5e | 72 55 be b3 8f b3 05 2b 3b 6d 68 2a 44 c2 cc ec | 6b 1d 92 df 89 1a 9d f7 c1 18 8f 4d 34 ce b2 72 | dc 24 61 bd 37 65 28 f1 26 42 c6 a1 48 90 50 40 | 60 3f 78 ce 04 9c 3d ba 18 4e dd 4c d6 82 6e 51 | 67 48 49 62 37 f2 ed 52 4d b8 26 ec b0 85 3e 94 | ba a6 36 bb c9 80 6e e3 33 72 02 87 28 51 f7 0e | b2 b1 8f 9a df 7c ac 13 32 02 9e b4 45 75 85 e3 | 86 3b 1f 81 8b 2b 4d 2b b9 af 80 14 c8 c0 37 3b | 75 10 32 13 c6 74 a7 41 62 92 b3 87 9f e2 ed 2a | 29 00 00 24 f9 a0 5c 35 4a 9e bd 0e 0d 94 7a f9 | 8f b8 01 dd 15 88 70 42 78 10 83 16 a2 ba 62 6b | bf 0e 5b 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b f1 3a 2c 8b e8 c9 68 86 e1 0f be | 41 4d 1c 16 cf d5 b6 01 00 00 00 1c 00 00 40 05 | 84 fa 3c 0d 93 21 b5 34 8e ca ca 4a 93 ec 16 d0 | 28 a4 5e 28 | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338005860 | #54 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e 45 bc 88 5c 41 98 f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #54 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #54 | rejected packet: | 4e 45 bc 88 5c 41 98 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #54: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #149 | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #149 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #149 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49613.166477; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001768 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #149 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-149" #149: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #149) | ec 1b 62 37 44 a3 17 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 08 91 37 b8 3d c4 a5 fb 8f 59 2b cb c4 ee a3 | 59 01 01 81 cd 69 2d 85 93 60 f7 65 1f 64 aa eb | 93 60 17 84 59 2d ec 44 26 cf 20 fe db 7e d9 f6 | 7d a2 69 c3 4c ed d8 f3 0a 6b d4 5b e7 47 78 e3 | 80 3c 2c 01 cd d6 a8 65 7e cc 13 22 72 38 45 64 | 17 76 db 68 fd 9e 02 c1 4e e0 91 4f 14 0c 06 72 | 4e df 03 59 bc 72 4f af 9f 27 39 bd 57 c8 9d e1 | 90 f7 3b a1 d1 79 66 94 af 42 c3 62 cd d5 2d cd | ac 6c ea d6 94 1b f4 91 4d ad 49 21 48 4b 36 1c | 53 18 c6 23 73 5e 40 ed e6 7e 6a 25 d8 dd ef 07 | 7d 88 f4 a9 e1 ff e9 29 7d 10 cf 47 92 a2 72 35 | 95 c9 53 7e 8d f1 bb ba 54 1d 40 b5 a0 d1 1e d9 | 0b 86 d8 2d 01 1a 34 e1 77 f0 c8 57 84 a9 f4 dc | 35 1f 8e bc 5d f2 ca 58 ec a1 ad a9 cd 45 4a 2d | 23 38 26 ab df a9 05 75 cd 84 d4 66 7c be 9c f9 | 7f e7 96 6a 2b a4 d6 b4 04 50 ef ba e8 3c eb 60 | 29 00 00 24 f6 11 7c 5d 38 85 36 80 dd ed f7 d5 | 65 1c 39 a3 95 3d e4 a2 88 84 cf 2f 03 e4 0d 86 | 6f f9 18 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 49 c3 fc 0d 4b 5b dd c8 8b e4 44 | 1a 6a 18 02 f4 d1 ea f3 00 00 00 1c 00 00 40 05 | 4e f4 0c 8d 48 4d 9f e4 0b 19 05 64 48 99 98 79 | d2 ff 3d 6d | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | #149 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 1b 62 37 44 a3 17 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #149 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #149 | rejected packet: | ec 1b 62 37 44 a3 17 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #149: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e5ca0 | handling event EVENT_RETRANSMIT for parent state #157 | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #157 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #157 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49613.175829; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500683 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #157 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 "road-eastnet-nonat-157" #157: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #157) | 58 3c 05 73 d3 10 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 16 05 06 2f 3b 22 9e 88 08 ab fe 29 25 f8 32 23 | d0 15 af d8 5f 65 e8 be c6 03 98 0f 18 e5 00 77 | 99 86 03 c7 fc 1b e8 83 43 61 ba 00 0c dc 29 59 | 0d fd 85 a1 75 5e f3 f7 d2 64 26 3b e1 11 43 3a | 94 43 08 73 30 5e 1d 91 aa 8f 9d c1 5c 52 ae c1 | 1d 90 3b cb 44 47 58 f3 40 38 01 58 63 65 29 32 | b6 4a 78 a5 71 58 c1 30 ea 73 8e 14 71 72 8e df | ee 45 ee f6 d2 a7 99 89 1c 7b fc 81 aa fe 75 bb | 36 cb a8 81 eb 73 7b eb 5a e7 fa 6d e5 b4 95 b2 | be 54 f3 23 c2 44 23 4a b5 30 87 1d 26 24 c6 c4 | 6b d1 5d 1a 24 7a 69 b5 9b 7f 97 17 e0 18 0f 6f | 1f f9 f1 e8 6c 46 2c d8 28 aa 7c 1d ec ed d6 d3 | b6 eb c6 eb 3b 55 59 5b 10 23 06 f1 f2 aa 19 3c | 8e ca 99 c8 e5 ba 47 04 47 84 62 13 96 06 08 0d | 88 7a a1 63 08 7b df 84 fd 48 36 29 3e 5c 44 7d | 05 23 1e 33 96 d8 b6 34 ea b3 94 6e cc d2 07 97 | 29 00 00 24 a9 6f a2 6f e4 cf 6b 0e 7b b9 69 24 | 56 3d ee de fe c6 39 89 8e 14 c9 0f 9e 2f 60 95 | f7 4e c6 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 bf ce be 86 a6 d7 14 f3 ba 0e 49 | ee d2 d5 26 4c 2e 13 18 00 00 00 1c 00 00 40 05 | 0a 36 59 95 a8 fb 5c 3b ea 04 70 de 29 72 15 40 | a3 00 f6 34 | libevent_free: release ptr-libevent@0x7fb36c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e5ca0 | #157 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 3c 05 73 d3 10 8c 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #157 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #157 | rejected packet: | 58 3c 05 73 d3 10 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #157: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0756 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf50 | handling event EVENT_RETRANSMIT for parent state #106 | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #106 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #106 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49613.179194; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004549 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5da90 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #106 | libevent_malloc: new ptr-libevent@0x7fb36c0300e0 size 128 "road-eastnet-nonat-106" #106: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #106) | fe df 65 eb e2 ca b1 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad da 7e a9 45 cb 20 7d e8 1c 81 82 05 64 57 6e | 75 d8 44 d1 29 49 80 30 70 57 33 94 8e d0 1f 14 | bc ae 59 d5 21 a0 94 8f 2c d7 0e ae 64 85 ee 4d | 50 69 c0 d8 4e 47 ef 8f 3a 2d ef b1 7b 6b a7 c8 | 8d 12 00 9d cb 02 d1 fa 1a e5 8c 51 be 6d 05 c8 | be 42 ed 64 5d 5d eb 43 74 14 7b 2e df 96 fd f0 | be d2 f5 e5 50 93 03 3d e5 7a 2c d8 01 5a 9b de | a0 3b d7 ce 9a ef 2b 39 02 de 74 61 50 3b eb 81 | 05 67 4f 23 be 3a 8e 5c be 32 5b 04 eb 4a 0a 52 | c4 c5 a5 9b 90 ef 60 8e e0 0b c4 2e df 2e 03 08 | 7d 0d 7d 77 85 98 9e 4b 28 0a fe 25 1d a7 29 db | 4e a8 1b 4a ee 35 1d 2c ba 8d 50 15 cc 00 fd b8 | 76 4c 44 ae c6 c8 10 0a ab 0a 64 76 0a 4d ee 2e | 50 89 e6 58 b8 26 b4 69 a0 66 8e 81 ad 9d da 80 | f3 00 a8 93 0e 88 6f 79 09 79 fc 16 36 77 35 c1 | 3d 72 2e 00 31 12 9c f8 70 79 c2 64 a5 05 9a 24 | 29 00 00 24 a4 51 db a3 25 2a 8b 08 e6 f6 81 86 | 04 5c da 12 5e 8f 68 4a 8c ec ef 5b e1 08 6f b7 | 57 a9 96 c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 f9 ad bd d7 95 65 27 17 8c 87 a1 | c4 9b a8 f7 4c 6b d7 13 00 00 00 1c 00 00 40 05 | 1a ac 1c ef 71 2b dc a9 6f 07 a5 2c d5 55 fb 6b | d6 5b 32 77 | libevent_free: release ptr-libevent@0x7fb3500180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf50 | #106 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe df 65 eb e2 ca b1 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #106 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #106 | rejected packet: | fe df 65 eb e2 ca b1 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #106: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0671 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-165" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-165' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #165 at 0x557d46ab5a00 | State DB: adding IKEv2 state #165 in UNDEFINED | pstats #165 ikev2.ike started | Message ID: init #165: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #165: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #165; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-165" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-165" IKE SA #165 "road-eastnet-nonat-165" "road-eastnet-nonat-165" #165: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-165 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-165": constructed local IKE proposals for road-eastnet-nonat-165 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 165 for state #165 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7cf50 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #165 | libevent_malloc: new ptr-libevent@0x7fb3500180b0 size 128 | #165 spent 0.142 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-165" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.217 milliseconds in whack | crypto helper 10 resuming | crypto helper 10 starting work-order 165 for state #165 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 165 | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 165 time elapsed 0.000717 seconds | (#165) spent 0.726 milliseconds in crypto helper computing work-order 165: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 165 for state #165 to event queue | scheduling resume sending helper answer for #165 | libevent_malloc: new ptr-libevent@0x7fb37c035930 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #165 | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 165 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #165 | **emit ISAKMP Message: | initiator cookie: | 84 89 ec 12 36 85 f6 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-165 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5f 64 07 de ac 8a b1 da f5 cd 1e 8a 72 06 02 07 | ikev2 g^x b4 71 02 7a d1 b4 70 86 ed 7c e5 04 db 06 11 b0 | ikev2 g^x 70 66 08 44 59 b7 49 22 d3 ba f4 ee ab fa 59 73 | ikev2 g^x b1 06 c3 8e 52 a6 3b 08 b7 93 04 a1 45 f3 91 38 | ikev2 g^x 82 d7 95 0c b3 fe bf fd 60 7f 15 7a b2 c9 6e 96 | ikev2 g^x 31 f3 92 9f 9b d4 51 14 46 6d a7 f8 2c 3c c3 fe | ikev2 g^x 86 c5 71 52 b8 28 62 77 5e 36 d1 7b 6a db 03 2c | ikev2 g^x f5 d4 3e 3d 1f 4e cb e7 cf b8 d2 9f e6 10 67 e1 | ikev2 g^x a3 1a 3a 9b e2 59 8a f3 f7 c0 58 cc fc 02 e0 b1 | ikev2 g^x da aa 4f e9 d2 86 5e 94 d6 73 96 ea 14 32 c4 4e | ikev2 g^x 3d c9 38 94 c5 47 af 83 6c ee e9 2a a3 8b e4 12 | ikev2 g^x f9 91 c1 53 48 67 8c 42 6e c0 7e 45 20 2e 6a a6 | ikev2 g^x d3 98 3e 6d d1 40 3d 9d 84 9f 54 62 49 b6 f8 67 | ikev2 g^x 32 fb 70 e2 78 08 b2 de c4 3e 70 08 0b 45 41 d7 | ikev2 g^x 34 49 14 7d a4 bf 53 d6 45 c5 fb 03 1e ef d6 06 | ikev2 g^x 6f 22 f9 f9 7c 4f e3 63 ea 02 1e 63 6e 3d 4d 36 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a3 25 18 45 df 55 70 c4 52 41 87 e0 ac 0c cb c2 | IKEv2 nonce e9 c1 36 19 df a3 78 76 61 ca c0 73 a3 74 0a f0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 84 89 ec 12 36 85 f6 42 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a5 | natd_hash: port= 01 f4 | natd_hash: hash= 70 2e 20 30 11 5b 47 b9 0d c9 d3 63 b9 57 85 b4 | natd_hash: hash= 89 e5 03 11 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 70 2e 20 30 11 5b 47 b9 0d c9 d3 63 b9 57 85 b4 | Notify data 89 e5 03 11 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 84 89 ec 12 36 85 f6 42 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 69 81 91 3b c9 31 0b 05 42 34 36 76 be 6a 34 94 | natd_hash: hash= 71 f5 f0 25 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 69 81 91 3b c9 31 0b 05 42 34 36 76 be 6a 34 94 | Notify data 71 f5 f0 25 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #165 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #165: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #165 to 4294967295 after switching state | Message ID: IKE #165 skipping update_recv as MD is fake | Message ID: sent #165 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-165" #165: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.165:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #165) | 84 89 ec 12 36 85 f6 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 64 07 de ac 8a b1 da f5 cd 1e 8a 72 06 02 07 | b4 71 02 7a d1 b4 70 86 ed 7c e5 04 db 06 11 b0 | 70 66 08 44 59 b7 49 22 d3 ba f4 ee ab fa 59 73 | b1 06 c3 8e 52 a6 3b 08 b7 93 04 a1 45 f3 91 38 | 82 d7 95 0c b3 fe bf fd 60 7f 15 7a b2 c9 6e 96 | 31 f3 92 9f 9b d4 51 14 46 6d a7 f8 2c 3c c3 fe | 86 c5 71 52 b8 28 62 77 5e 36 d1 7b 6a db 03 2c | f5 d4 3e 3d 1f 4e cb e7 cf b8 d2 9f e6 10 67 e1 | a3 1a 3a 9b e2 59 8a f3 f7 c0 58 cc fc 02 e0 b1 | da aa 4f e9 d2 86 5e 94 d6 73 96 ea 14 32 c4 4e | 3d c9 38 94 c5 47 af 83 6c ee e9 2a a3 8b e4 12 | f9 91 c1 53 48 67 8c 42 6e c0 7e 45 20 2e 6a a6 | d3 98 3e 6d d1 40 3d 9d 84 9f 54 62 49 b6 f8 67 | 32 fb 70 e2 78 08 b2 de c4 3e 70 08 0b 45 41 d7 | 34 49 14 7d a4 bf 53 d6 45 c5 fb 03 1e ef d6 06 | 6f 22 f9 f9 7c 4f e3 63 ea 02 1e 63 6e 3d 4d 36 | 29 00 00 24 a3 25 18 45 df 55 70 c4 52 41 87 e0 | ac 0c cb c2 e9 c1 36 19 df a3 78 76 61 ca c0 73 | a3 74 0a f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 2e 20 30 11 5b 47 b9 0d c9 d3 63 | b9 57 85 b4 89 e5 03 11 00 00 00 1c 00 00 40 05 | 69 81 91 3b c9 31 0b 05 42 34 36 76 be 6a 34 94 | 71 f5 f0 25 | state #165 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3500180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7cf50 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #165 | libevent_malloc: new ptr-libevent@0x7fb3500180b0 size 128 | #165 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49613.198472 | resume sending helper answer for #165 suppresed complete_v2_state_transition() and stole MD | #165 spent 0.493 milliseconds in resume sending helper answer | stop processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c035930 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 89 ec 12 36 85 f6 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #165 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #165 | rejected packet: | 84 89 ec 12 36 85 f6 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #165: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0647 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a74cd0 | handling event EVENT_RETRANSMIT for parent state #135 | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #135 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #135 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49613.209681; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002124 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e5ca0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #135 | libevent_malloc: new ptr-libevent@0x7fb37c035930 size 128 "road-eastnet-nonat-135" #135: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #135) | 6f cc 42 0b fb 9b 4b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 27 90 6c a9 76 2a c4 50 c5 bf 04 2d 39 82 d0 | f1 4e e9 ff 6c d4 67 d5 6a f7 c3 33 36 2d 41 eb | 01 b8 52 cf 33 75 55 83 36 e9 3b 1e e0 f5 4c 33 | f6 13 14 fe 0b 40 f0 7a 1d e6 e9 63 2c 7f 9b 3f | 43 d7 8b 49 de 08 d9 f7 cb b8 85 8d 24 76 ea 07 | 74 e0 eb 3b 7b 61 bd 6e d0 81 bc 30 2d b1 a8 bc | 95 7a c1 8e 91 81 20 78 4b 9d 5f 4b 55 88 98 a7 | 4c 89 7d 2e c5 f4 b0 76 31 ac d8 73 5d 09 ed 2d | bb 07 67 90 bf 59 f1 9b 89 79 b4 48 ab 68 0b 4b | a7 49 da 7c 24 b3 1c f9 17 8c 28 77 5a 6e 44 15 | 7d 9f 86 31 20 2d 95 04 ee 8e 03 70 03 dc 14 11 | e5 4b 44 1d be 0a 83 04 0b 7e 48 68 b0 0f 04 64 | 81 84 d0 41 fd 8b 49 2c f9 af ea 95 2c f3 49 aa | 7c 3c d3 83 ef 0f 20 1f 8b 15 3b 94 9d 57 0f 83 | e9 c9 85 72 a3 81 40 26 3d 9e 4f 4c 25 2e 6f de | 2e 5c c2 5b 74 8c 58 60 bd 5e 06 db 51 f6 b7 a3 | 29 00 00 24 4f 27 a7 6e b5 c8 d8 49 72 0f 78 be | 0c 3a 88 f4 37 97 d5 4f 51 27 f0 3f 45 0a b8 19 | ba c2 3b 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 5e 90 14 7c 0c 3f fe 72 ae db a0 | 43 97 c2 6c fa c9 b7 b1 00 00 00 1c 00 00 40 05 | 6c 85 24 93 7d cc 8d 2c 5e c0 f8 bf 19 38 1d 99 | 5f b9 fd e3 | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a74cd0 | #135 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f cc 42 0b fb 9b 4b 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #135 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #135 | rejected packet: | 6f cc 42 0b fb 9b 4b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #135: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #150 | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #150 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #150 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49613.229035; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001329 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a74cd0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #150 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 "road-eastnet-nonat-150" #150: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #150) | 8a b6 09 5a 0a 8f be 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 2e 98 c4 69 1c 50 37 00 a8 8c d0 f1 d2 8c 28 | 94 f1 69 8e be e8 36 fe 99 97 d5 0c 37 4e 1b 26 | 9e e0 4e bd 73 a0 79 f4 5a 6b f2 8d 96 4f 03 3e | 0e 75 44 c8 2c a3 81 79 2e 0b 2e 8f 7d 7f dc f9 | 3f db 53 4d 6e 68 53 6c 49 99 36 00 d7 4f 7e e1 | 7e a7 57 fb ab 9f e1 d6 e7 24 3b 02 1f 12 10 de | 15 c5 08 ce f3 51 03 84 19 e7 47 83 1a 2e 38 c2 | 45 5b ab 60 7e 25 f4 92 0b eb 31 c2 32 59 f7 71 | 30 c7 ef cb 28 48 6e e3 c6 10 bc 9c 64 1e 68 59 | ee 88 40 85 37 40 80 12 7d 99 b2 33 c0 da 4b fb | 3a 39 ae b6 0e 0b 59 93 7d 9a d6 ee 50 27 09 f4 | a0 3a c3 63 a9 ac e9 9b 13 ed 9f a6 df 4f 55 3a | 82 36 63 e6 11 77 4d 54 ff a6 ad fe 0f 97 d9 c1 | 30 72 88 21 1f 78 34 56 b8 51 de f7 62 00 f9 29 | 66 5f d3 86 45 83 9d 48 c9 24 49 11 29 28 62 bd | 6e 8b 60 b5 72 8e cb ea 93 0b fd cb 0c 58 7b 88 | 29 00 00 24 36 30 98 85 8b 67 65 29 82 81 da 88 | 70 5a df 1d 0c c2 0c e8 b9 29 94 59 0f 89 5b 4b | 52 bc 0b a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 25 ba 47 28 1c 0e 38 fd e4 d3 0a | c8 ae 66 94 c0 bd 04 2b 00 00 00 1c 00 00 40 05 | 5a 15 ef 3e 5b 63 8d c2 17 ab ae 76 63 67 33 8b | f3 ee 4c d4 | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #150 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a b6 09 5a 0a 8f be 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #150 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #150 | rejected packet: | 8a b6 09 5a 0a 8f be 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #150: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23110 | handling event EVENT_RETRANSMIT for parent state #158 | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #158 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #158 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49613.238399; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499996 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #158 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 "road-eastnet-nonat-158" #158: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #158) | e6 a0 1a 4e 16 85 73 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d fe 92 1d 51 a7 6d 12 34 05 5b 88 3c 14 89 6b | 35 8c a3 94 b4 c5 44 d8 4b 8c 87 4c af 0d 5e 27 | cd 39 40 ee d3 b1 d8 0b a2 08 8c 95 70 dc 7c 67 | 00 94 18 0b cc 36 ba 02 42 ac 1b 6e 83 e8 f3 b5 | 91 59 9d ad e6 9f 36 2d a8 98 92 82 b5 58 8d 17 | e8 c3 14 93 e3 79 91 5b e9 d6 f6 a5 7b ab 15 3e | 02 89 3b e3 40 68 94 7c a5 09 b7 59 3e c5 6a 99 | 03 29 08 a9 4d cb 54 e8 24 b9 ad 4e d9 ec 0b 15 | 00 2a bb 1a df 73 04 f9 ab 12 4b db 50 44 e0 e2 | 22 35 8e 9a 3a 55 04 43 31 37 ac 1b 04 2e 40 6f | a3 ce 4b 7d 81 aa 0c 4f 00 20 e7 14 67 8a 92 03 | be 6c 2c b0 1e 89 ff eb d0 66 ac db b5 5f 07 46 | 34 4e 75 3e 19 4d d5 e5 2d 16 89 cc 75 86 80 6f | 3f aa e7 c1 07 a0 f4 7f 40 db 1c df 1d 97 4e 83 | 99 fc 4e 29 fa a7 c5 07 07 e9 c0 d9 34 f7 42 65 | b3 46 1d 34 7e 34 fc b8 2a d6 72 9b 56 fa c8 74 | 29 00 00 24 93 3e 30 9d 56 73 68 ed 32 94 90 87 | db 7b 56 ae fd bb a5 6c 98 47 2c cb b8 9c 69 c6 | ac 01 dc 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 af 5c ca 3f 10 b2 e1 eb 3b d6 06 3e | 82 97 94 30 e1 e8 70 cd 00 00 00 1c 00 00 40 05 | bb 02 3a cc bb 31 72 ec b9 81 77 29 32 3e e8 21 | a2 17 d3 ee | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23110 | #158 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 a0 1a 4e 16 85 73 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #158 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #158 | rejected packet: | e6 a0 1a 4e 16 85 73 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #158: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #107 | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #107 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #107 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49613.249732; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003444 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23110 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #107 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 "road-eastnet-nonat-107" #107: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #107) | ac 4e b3 f4 ed 6e 1b 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 73 84 90 b0 a1 c9 25 a6 16 5e 4b 67 ce 07 6b | 92 04 d0 37 9e 07 4b 09 02 c2 78 f5 a4 a2 15 3a | 81 d0 8e e8 00 40 7b 2f 93 05 4b f1 72 7f 82 62 | 11 07 a0 1f 82 07 75 ea 96 ea 88 0b 0d 07 25 f0 | 53 bc 84 a7 a4 75 94 5f 48 4e 4a 60 2b e3 6f 76 | 92 f7 9d 74 6e 3f f1 39 f4 ea a5 df f6 6b e2 19 | 19 b6 60 26 c6 fe d4 1c bc ad 80 f2 46 47 46 93 | 4a da 3f 4a 2e 08 aa d8 dd f9 58 37 f0 1b 68 77 | ce 96 bc c9 19 65 a5 66 67 6f a9 fc 8b f9 e5 15 | 20 ed ca 26 5a cf 00 8e 65 d8 10 df c9 2f 55 c3 | 64 dc 1d 41 fa 8c 1a 44 06 90 c6 59 bf c3 6e 3f | fb f3 89 2e c3 0c 98 20 fe c3 39 08 86 b8 6d 84 | 72 50 7b 56 51 ac 06 e0 20 77 cc 21 04 85 51 fd | 65 1e 59 7f 79 5a a9 9c 4e fa 78 0d d8 f6 cf 3c | cd 73 f9 1e 3d 38 88 98 9e 60 ec bd 06 0d 2d 0c | 39 4f f8 8a 60 2e a2 ac 6c bc 30 73 f0 bc 87 4c | 29 00 00 24 2b ab 2f 68 f7 5a dc 67 d2 bf 24 50 | 1d 74 5b c9 72 db b8 cd 99 25 80 eb 1e bb 50 81 | 94 b2 ae 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 39 55 8e 98 9a a9 9a 86 88 c5 10 | 1f 60 cd 0e 59 85 0d 5e 00 00 00 1c 00 00 40 05 | 18 34 33 25 63 a4 39 e3 ca 5d cd 23 8f 87 c0 51 | 02 99 ff a0 | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #107 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac 4e b3 f4 ed 6e 1b 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #107 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #107 | rejected packet: | ac 4e b3 f4 ed 6e 1b 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #107: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-166" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-166' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #166 at 0x557d46ab6fc0 | State DB: adding IKEv2 state #166 in UNDEFINED | pstats #166 ikev2.ike started | Message ID: init #166: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #166: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #166; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-166" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-166" IKE SA #166 "road-eastnet-nonat-166" "road-eastnet-nonat-166" #166: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-166 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-166": constructed local IKE proposals for road-eastnet-nonat-166 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 166 for state #166 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #166 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #166 spent 0.158 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-166" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.238 milliseconds in whack | crypto helper 14 resuming | crypto helper 14 starting work-order 166 for state #166 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 166 | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 166 time elapsed 0.000769 seconds | (#166) spent 0.751 milliseconds in crypto helper computing work-order 166: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 166 for state #166 to event queue | scheduling resume sending helper answer for #166 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #166 | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 166 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #166 | **emit ISAKMP Message: | initiator cookie: | d7 12 9c be 9a d9 20 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-166 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1b c9 02 ed 54 28 bb 69 3a fa da 89 fc 4e 39 8f | ikev2 g^x a4 d9 5e 2f e7 5a f0 78 e4 4f 3d 81 ef 79 61 1f | ikev2 g^x a3 10 38 af aa 4b f6 ef 84 82 56 19 cd b4 c3 5b | ikev2 g^x aa a8 08 49 1f b4 b8 b1 4e cd 8c 0c 86 09 40 1d | ikev2 g^x 3a ac 4d 85 be 4c 1d e8 f2 bd e7 23 97 c2 da f8 | ikev2 g^x 65 82 fb 26 55 00 06 12 19 2c fe d3 7b c4 ff 31 | ikev2 g^x 3f 92 30 47 40 04 59 ba c0 27 99 b0 dd 45 22 cb | ikev2 g^x 97 1b 7a c0 ab ef 56 9c f3 d7 45 a0 a5 37 a3 b2 | ikev2 g^x 58 e2 9e 19 5e 81 d9 fa 7b fe 78 35 15 83 01 42 | ikev2 g^x 24 2c 5a ee 4f 05 09 f4 1d dd c3 06 45 d3 ea 94 | ikev2 g^x 81 04 37 3a 2a 09 3c 79 d8 7b 16 c9 e4 4e 70 57 | ikev2 g^x ac 53 d9 f3 76 57 6b 10 ff a1 91 96 c5 09 1d b2 | ikev2 g^x 37 da 15 c6 76 39 0e 79 8e b4 e3 6b b6 34 b5 ee | ikev2 g^x 59 40 13 d1 7e a5 f4 50 26 80 c7 4d 2f bd 97 83 | ikev2 g^x 7b 42 78 41 a6 62 d7 58 6e e8 20 3d f8 07 e4 57 | ikev2 g^x 49 7e 0c 32 68 81 0c ed 46 bc 7b e3 e1 f5 77 38 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a6 0c 32 e7 5a d1 b5 ca 07 42 9a 49 78 63 23 e6 | IKEv2 nonce 6a be e5 1f b9 dd 49 81 36 5a 86 c7 6b 23 86 43 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d7 12 9c be 9a d9 20 9f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a6 | natd_hash: port= 01 f4 | natd_hash: hash= f4 81 0a 2e 3d e5 a2 7d c2 7a 52 36 53 f5 16 ff | natd_hash: hash= 78 27 b0 06 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f4 81 0a 2e 3d e5 a2 7d c2 7a 52 36 53 f5 16 ff | Notify data 78 27 b0 06 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d7 12 9c be 9a d9 20 9f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 82 68 99 97 5e 62 33 7b 33 19 33 98 83 8d 7f b1 | natd_hash: hash= f3 01 32 b7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 82 68 99 97 5e 62 33 7b 33 19 33 98 83 8d 7f b1 | Notify data f3 01 32 b7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #166 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #166: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #166 to 4294967295 after switching state | Message ID: IKE #166 skipping update_recv as MD is fake | Message ID: sent #166 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-166" #166: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.166:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #166) | d7 12 9c be 9a d9 20 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b c9 02 ed 54 28 bb 69 3a fa da 89 fc 4e 39 8f | a4 d9 5e 2f e7 5a f0 78 e4 4f 3d 81 ef 79 61 1f | a3 10 38 af aa 4b f6 ef 84 82 56 19 cd b4 c3 5b | aa a8 08 49 1f b4 b8 b1 4e cd 8c 0c 86 09 40 1d | 3a ac 4d 85 be 4c 1d e8 f2 bd e7 23 97 c2 da f8 | 65 82 fb 26 55 00 06 12 19 2c fe d3 7b c4 ff 31 | 3f 92 30 47 40 04 59 ba c0 27 99 b0 dd 45 22 cb | 97 1b 7a c0 ab ef 56 9c f3 d7 45 a0 a5 37 a3 b2 | 58 e2 9e 19 5e 81 d9 fa 7b fe 78 35 15 83 01 42 | 24 2c 5a ee 4f 05 09 f4 1d dd c3 06 45 d3 ea 94 | 81 04 37 3a 2a 09 3c 79 d8 7b 16 c9 e4 4e 70 57 | ac 53 d9 f3 76 57 6b 10 ff a1 91 96 c5 09 1d b2 | 37 da 15 c6 76 39 0e 79 8e b4 e3 6b b6 34 b5 ee | 59 40 13 d1 7e a5 f4 50 26 80 c7 4d 2f bd 97 83 | 7b 42 78 41 a6 62 d7 58 6e e8 20 3d f8 07 e4 57 | 49 7e 0c 32 68 81 0c ed 46 bc 7b e3 e1 f5 77 38 | 29 00 00 24 a6 0c 32 e7 5a d1 b5 ca 07 42 9a 49 | 78 63 23 e6 6a be e5 1f b9 dd 49 81 36 5a 86 c7 | 6b 23 86 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 81 0a 2e 3d e5 a2 7d c2 7a 52 36 | 53 f5 16 ff 78 27 b0 06 00 00 00 1c 00 00 40 05 | 82 68 99 97 5e 62 33 7b 33 19 33 98 83 8d 7f b1 | f3 01 32 b7 | state #166 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #166 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #166 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49613.261913 | resume sending helper answer for #166 suppresed complete_v2_state_transition() and stole MD | #166 spent 0.368 milliseconds in resume sending helper answer | stop processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb370035930 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 12 9c be 9a d9 20 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #166 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #166 | rejected packet: | d7 12 9c be 9a d9 20 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #166: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fa300 | handling event EVENT_RETRANSMIT for parent state #136 | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #136 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #136 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49613.276101; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003295 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a77850 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #136 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 "road-eastnet-nonat-136" #136: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #136) | d6 c8 9e 97 21 46 fb d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 a9 84 13 62 aa bd 1d ad 3e 60 88 dc a9 35 5e | 57 2f a4 3a d3 ae c1 11 b0 24 19 68 c2 75 c1 4f | 59 cf f8 40 bb af 7e d1 b9 71 42 ce c6 09 6e 74 | 9e f2 29 0d 91 21 24 74 6d 2f 10 75 65 f8 b8 44 | e9 15 55 bb 2b 6f 25 4c 58 9b 0b 45 c2 40 5a 9f | ff e2 b3 e2 f7 0d c5 79 1b 00 36 3a 21 20 e7 06 | d4 05 ab e6 7f 0e 4f 26 f4 28 cb d2 12 3f 60 75 | e8 8c 1f 18 e0 09 73 82 2e 56 2f fe 00 1a 31 26 | 0b 05 07 a6 fc 87 93 26 a9 c2 69 7c 30 9c 7a 89 | e9 2a 6b aa c2 98 8a d1 cc 85 ab 8a 1d b6 6c 3a | 46 51 76 9a 2b ea bd 4c 92 d8 c8 5c 56 7a b8 5f | 71 f6 c7 f5 f4 4e c8 ce cc 9b 6f 50 15 3b 30 b5 | cc 32 0c 15 e6 9e 78 33 f4 30 d7 c5 bc a6 29 97 | 00 2f a4 12 c0 82 9e 84 f0 b8 38 05 f1 51 00 d1 | 48 64 6a f9 cc d7 36 54 45 d6 ee 3e 02 d0 d5 50 | ec e5 a0 1a 70 ee 96 eb 78 4d 45 6b e4 50 2d ed | 29 00 00 24 24 22 aa ae c7 66 c9 3a 20 66 58 4a | 54 df 58 65 c1 5d d7 a3 b2 c7 e8 e8 de 15 89 70 | 84 48 bb d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 7f 22 d9 ee cc a0 1b 0a 4c ff 84 | da dc a7 a5 32 ec b3 c6 00 00 00 1c 00 00 40 05 | e4 4f b8 48 f2 80 69 e7 b9 85 06 aa 82 75 ce d9 | b4 81 0b 76 | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fa300 | #136 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 c8 9e 97 21 46 fb d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #136 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #136 | rejected packet: | d6 c8 9e 97 21 46 fb d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #136: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #151 | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #151 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #151 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49613.296422; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001528 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fa300 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #151 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 "road-eastnet-nonat-151" #151: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #151) | d6 d5 c3 1b 58 0f 5c 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 37 31 25 ac 2b c6 c6 54 4a 25 58 cc 38 99 e0 | ed 33 16 21 c3 45 6a eb 3b a9 cb 98 85 d1 bc b2 | fb 43 f8 dc 85 42 20 a9 d4 7c dc c0 4c df 30 b1 | 6f cb 58 0b 5e 23 e6 14 ea 93 76 de 25 96 78 81 | 99 69 10 aa a3 9f ec 08 71 07 18 69 73 22 c9 ac | 3c e3 bf f1 09 8a 27 19 15 60 45 3d 4e 4f f3 e6 | c0 ab 4b c7 bb fb 2d 92 26 ca 7f de c4 f9 dd 4a | fa 18 2a 06 8c 14 94 9f a3 5d e6 b2 6b b0 ef e2 | 03 7f 7e f8 41 9d 8b 81 6b ea 4b 0b 45 f7 4c 93 | 70 05 72 9a ed 29 ed 3c 18 ca 66 2f d4 84 e6 4b | c1 2d 49 d6 3e cb 03 40 00 76 c7 f7 62 87 c5 1b | 85 d6 9d d1 8f 62 a3 ce 21 63 7a e5 94 35 85 13 | e3 c0 a5 2d 68 e8 0d 1f 37 ec 8c 55 12 d8 2a 1f | 06 81 5f d0 f4 ed e5 b1 5f c7 61 8a f0 5a 81 39 | 9f 6d e8 7f 5c 42 26 99 4f 51 2b 10 a9 6b b8 4c | a4 af 1c 69 f6 99 03 59 f6 8d eb d2 5c c8 04 4e | 29 00 00 24 3f 57 34 15 0e f6 1f 97 00 4e ca 13 | c7 48 27 43 fb 8e ac 87 27 dd cc da bb e1 5d 76 | d8 9b a6 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 1e a1 42 f7 31 41 ef 44 00 e7 a6 | 3d d6 a8 bb 50 6c 59 e3 00 00 00 1c 00 00 40 05 | 29 1a ff ca 49 77 f5 cd 99 41 a4 64 5f 6e 4a e7 | 0f a2 34 de | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #151 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 d5 c3 1b 58 0f 5c 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #151 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #151 | rejected packet: | d6 d5 c3 1b 58 0f 5c 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #151: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0472 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #159 | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #159 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #159 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49613.302708; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500873 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #159 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 "road-eastnet-nonat-159" #159: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #159) | 9d f6 62 77 51 33 7c 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 a4 0d 7c 3f bb 62 60 89 5b f7 52 ab d7 ca 61 | c6 32 47 69 10 70 7b 4b b6 2a 70 55 d5 38 a9 c2 | 06 fe 6f 0d a3 c3 18 2d 09 43 b4 f7 9b ba 82 ec | 93 e7 fe 37 c0 9d ff 14 eb fc f4 a5 4f eb f2 e9 | 81 40 d5 d7 0d b6 64 ad 86 89 bc 12 73 da 31 6d | 21 c9 f1 76 ef e5 fa c1 2f 00 73 7b 29 f7 14 d0 | cc 33 12 7b be c7 0b 95 25 c7 3c c9 94 8d 40 b3 | 24 76 27 7e c2 06 53 7c 39 6a 80 69 0a b2 fa aa | 13 ac 6b d9 25 77 ea de 54 91 5a 44 b0 3f bb f5 | d7 05 e4 68 6e f2 57 14 f5 2f 93 5c 8b e1 18 57 | a7 aa 40 49 0b b7 ce d1 00 80 ba 6e 5e cc 5b a3 | 7d 08 af 9a a8 cd d2 ac df 34 27 c2 04 7d d9 9f | e2 bf b9 fd 43 84 3d e1 23 56 2b 91 01 a7 94 b9 | 39 80 83 eb c5 4c de ac 80 1d 05 1e 22 14 a6 fb | 08 b1 be 3f 9b 24 b0 c4 63 eb 31 8d 24 20 37 93 | 7d fa a5 c0 26 eb c3 7c ae e2 24 2a 4f 31 bf c0 | 29 00 00 24 93 99 a4 63 0d 72 bd 0a 86 bd f8 14 | bb 6c 2c e3 e4 66 d1 1e e3 70 5a 2a 46 97 fd 74 | 37 df 1f 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 4a e8 13 db 7e 81 08 43 48 ab 41 | d6 8f 57 84 74 b1 75 e1 00 00 00 1c 00 00 40 05 | 43 72 1d eb 44 7d 24 cc 39 78 4a ec 22 c2 1a 4e | 3d 2f 0c bd | libevent_free: release ptr-libevent@0x7fb358009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | #159 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d f6 62 77 51 33 7c 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #159 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #159 | rejected packet: | 9d f6 62 77 51 33 7c 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #159: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0476 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #55 | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #55 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #55 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49613.320019; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005275 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #55 | libevent_malloc: new ptr-libevent@0x7fb358009640 size 128 "road-eastnet-nonat-55" #55: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #55) | 3d db 2e dd 07 aa ba 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e 71 91 32 93 9e d9 77 ef 53 94 b9 d3 5b 34 5a | fe 84 a7 6b 7a 00 f9 5d 90 9e 95 ec 98 7e 50 90 | 6f 0f ae d2 9f 29 ef dd 60 22 99 95 c1 b0 c0 54 | a7 26 de ae fa 13 60 60 4e 33 18 74 d6 1f 83 02 | 06 b2 59 fa 7c 17 46 c9 2a 0a 3f 67 46 5b 6e d7 | 09 8c 97 98 d9 8f c1 fc 1c ec 49 28 fb cb 2a 4f | 78 96 26 a0 14 e4 f8 b2 87 ff f8 94 08 22 94 74 | 80 62 7b 3c 7f 07 b1 d4 49 9b 9c af da 12 43 95 | 22 ed c4 32 82 8f fd 22 2e 14 7f a3 9e 9a 0a 95 | 1c ac 99 95 6e eb ff 73 9e fa c4 9b c2 7f 18 d1 | a6 f5 7d a7 31 3b 50 d9 03 2b 9b 6a 48 7d 39 5a | 55 2b 5f c8 64 07 45 ea 51 98 d9 85 73 51 e2 22 | 6a fe cb 2c f3 b0 0b 08 b0 e7 70 07 6e 79 7c 1c | 6c d7 90 19 69 d2 44 49 0a 0f 6a 33 f1 60 ee 72 | 89 92 e0 5a 96 45 5d c4 8c 2b 42 de 01 b6 de 4f | b8 41 dc e7 4d 6a e5 69 01 12 96 be b3 ca 0c ef | 29 00 00 24 34 26 bc 6d 2a b2 15 83 73 e7 09 34 | 40 d7 8e 8c 63 fe fd 1b d2 38 8c 24 da 45 67 bf | a5 9b 8a 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 45 13 d7 91 8d b2 95 9c 7e b4 17 | 75 e1 5c f2 7c 3c ca 26 00 00 00 1c 00 00 40 05 | d0 0d a6 5e 1b c4 3a dd c0 34 b3 e5 87 cb 47 3a | 73 94 3b 44 | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #55 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d db 2e dd 07 aa ba 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #55 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #55 | rejected packet: | 3d db 2e dd 07 aa ba 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #55: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-167" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-167' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #167 at 0x557d46ab8580 | State DB: adding IKEv2 state #167 in UNDEFINED | pstats #167 ikev2.ike started | Message ID: init #167: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #167: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #167; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-167" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-167" IKE SA #167 "road-eastnet-nonat-167" "road-eastnet-nonat-167" #167: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-167 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-167": constructed local IKE proposals for road-eastnet-nonat-167 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 167 for state #167 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb364005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #167 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 | #167 spent 0.153 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-167" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.239 milliseconds in whack | crypto helper 15 resuming | crypto helper 15 starting work-order 167 for state #167 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 167 | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 167 time elapsed 0.000981 seconds | (#167) spent 0.986 milliseconds in crypto helper computing work-order 167: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 167 for state #167 to event queue | scheduling resume sending helper answer for #167 | libevent_malloc: new ptr-libevent@0x7fb3740356e0 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #167 | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 167 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #167 | **emit ISAKMP Message: | initiator cookie: | d1 34 e0 8f fb 7c 13 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-167 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 06 19 19 47 f8 53 ed d0 cd 1b 23 74 a8 df 03 3c | ikev2 g^x 9b a0 ef 95 f1 ce f6 ae 26 37 05 42 40 f8 1b 11 | ikev2 g^x 25 b6 88 f4 08 21 89 99 64 30 46 35 2b e5 72 51 | ikev2 g^x 22 12 a5 4d 09 28 30 73 8d 80 f8 3e 6a c2 3d d6 | ikev2 g^x 8d b5 a5 60 de 1d e9 8e c3 96 be eb 9a e4 82 44 | ikev2 g^x cd c0 61 18 61 45 71 3d 05 11 06 a9 ca 4e 06 4e | ikev2 g^x cb 22 e9 93 7b 78 bf 7f 83 42 10 73 45 d5 b3 1b | ikev2 g^x 92 fd 26 c3 64 99 f5 61 c8 1f 64 c2 09 10 74 12 | ikev2 g^x fd fe 01 de ac 29 c7 4b 49 1a d9 8d 7a bd 94 f7 | ikev2 g^x 39 58 38 2e ae 17 b2 73 1d e4 a7 77 fc bf 85 3c | ikev2 g^x 63 5b 1a 29 48 e8 aa 07 3f e9 82 92 50 e7 72 9f | ikev2 g^x 9a d8 a5 97 f7 0c 72 e2 e7 b6 cb 0c ff 4e 38 9e | ikev2 g^x 6d f9 d9 e0 8f df a4 4e 9c de 86 ff 7f 6f 46 07 | ikev2 g^x 19 30 44 7c c3 76 d0 df 68 7b cd 98 75 c7 57 02 | ikev2 g^x 52 bd 7f a1 c9 22 2c 83 36 62 ea 42 c7 31 3b 8a | ikev2 g^x 30 42 3c 51 50 0b 14 55 d5 43 19 16 fa 0b 4c a5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 15 4a d1 bb d8 87 b7 c2 1d 20 84 6d 4c 8a c4 e7 | IKEv2 nonce 5d 03 8e 8f 16 37 df e9 c3 77 de 41 b9 4c a3 ff | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d1 34 e0 8f fb 7c 13 7b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a7 | natd_hash: port= 01 f4 | natd_hash: hash= a2 52 6d ba 0b 84 f5 59 4b dd eb 25 53 bb c6 97 | natd_hash: hash= e9 c5 42 9c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a2 52 6d ba 0b 84 f5 59 4b dd eb 25 53 bb c6 97 | Notify data e9 c5 42 9c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d1 34 e0 8f fb 7c 13 7b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f4 8a 9c 13 b7 e1 a4 8b 85 79 9e 14 f1 e3 5c 5f | natd_hash: hash= 69 af 71 4a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f4 8a 9c 13 b7 e1 a4 8b 85 79 9e 14 f1 e3 5c 5f | Notify data 69 af 71 4a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #167 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #167: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #167 to 4294967295 after switching state | Message ID: IKE #167 skipping update_recv as MD is fake | Message ID: sent #167 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-167" #167: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.167:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #167) | d1 34 e0 8f fb 7c 13 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 06 19 19 47 f8 53 ed d0 cd 1b 23 74 a8 df 03 3c | 9b a0 ef 95 f1 ce f6 ae 26 37 05 42 40 f8 1b 11 | 25 b6 88 f4 08 21 89 99 64 30 46 35 2b e5 72 51 | 22 12 a5 4d 09 28 30 73 8d 80 f8 3e 6a c2 3d d6 | 8d b5 a5 60 de 1d e9 8e c3 96 be eb 9a e4 82 44 | cd c0 61 18 61 45 71 3d 05 11 06 a9 ca 4e 06 4e | cb 22 e9 93 7b 78 bf 7f 83 42 10 73 45 d5 b3 1b | 92 fd 26 c3 64 99 f5 61 c8 1f 64 c2 09 10 74 12 | fd fe 01 de ac 29 c7 4b 49 1a d9 8d 7a bd 94 f7 | 39 58 38 2e ae 17 b2 73 1d e4 a7 77 fc bf 85 3c | 63 5b 1a 29 48 e8 aa 07 3f e9 82 92 50 e7 72 9f | 9a d8 a5 97 f7 0c 72 e2 e7 b6 cb 0c ff 4e 38 9e | 6d f9 d9 e0 8f df a4 4e 9c de 86 ff 7f 6f 46 07 | 19 30 44 7c c3 76 d0 df 68 7b cd 98 75 c7 57 02 | 52 bd 7f a1 c9 22 2c 83 36 62 ea 42 c7 31 3b 8a | 30 42 3c 51 50 0b 14 55 d5 43 19 16 fa 0b 4c a5 | 29 00 00 24 15 4a d1 bb d8 87 b7 c2 1d 20 84 6d | 4c 8a c4 e7 5d 03 8e 8f 16 37 df e9 c3 77 de 41 | b9 4c a3 ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 52 6d ba 0b 84 f5 59 4b dd eb 25 | 53 bb c6 97 e9 c5 42 9c 00 00 00 1c 00 00 40 05 | f4 8a 9c 13 b7 e1 a4 8b 85 79 9e 14 f1 e3 5c 5f | 69 af 71 4a | state #167 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb364005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #167 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 | #167 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49613.327259 | resume sending helper answer for #167 suppresed complete_v2_state_transition() and stole MD | #167 spent 0.475 milliseconds in resume sending helper answer | stop processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3740356e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d1 34 e0 8f fb 7c 13 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #167 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #167 | rejected packet: | d1 34 e0 8f fb 7c 13 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #167: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56dd0 | handling event EVENT_RETRANSMIT for parent state #108 | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #108 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #108 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49613.334465; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00332 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa1f00 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #108 | libevent_malloc: new ptr-libevent@0x7fb3740356e0 size 128 "road-eastnet-nonat-108" #108: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #108) | b6 36 fb 7e 9b 39 08 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 8f 7e 30 55 17 55 d0 7b cc 1e 1e d2 0b 4a cb | f4 10 86 26 73 3d 12 d5 07 43 0f 11 e4 f8 f6 27 | 0b a5 f1 36 07 fc f3 05 3c 23 da bb fc 30 83 87 | 4d 41 58 5e 99 3a a9 ce 46 15 98 87 9b 24 d7 8f | 4b 59 7f b7 31 2a 48 e9 80 ab 05 c8 c6 49 95 79 | 0d 98 4a 2c 3d fe d3 d5 57 7f be e0 6f 80 49 7e | 12 83 14 1f 0d 26 16 aa cd e1 d8 a5 e8 e4 d2 0b | 8c a3 fb db 9a 33 4c 54 d3 db d0 4d 8d 8e a8 6d | 02 98 c7 65 a7 c6 72 0c be 01 bc 52 89 54 3a 59 | 6c 0b 5d c0 31 d7 63 e7 46 02 b3 0a b3 c7 5c de | 0f 7c c0 40 9f a9 b4 60 e4 65 87 1b d1 de 9c 27 | 3d df 5c 7f 27 8d e9 84 86 44 ce 9d 88 43 1a 58 | 28 56 bd 9e df a0 81 8f 79 ba 7e dd 69 15 d8 10 | e7 15 0f da 12 84 35 19 8e 2f 46 d3 83 f4 76 51 | 58 93 90 90 80 38 02 b8 02 db 96 cc e8 5b bf 28 | 0c 19 e8 c4 f6 ae 03 e7 2c 85 d1 50 dc 63 a6 cc | 29 00 00 24 6f 78 95 93 53 4c be 35 be d7 12 7f | aa e5 be 16 ad 5c 36 ac 46 40 9b c8 37 9c 91 65 | 00 a5 4b a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 98 20 9c 05 26 c6 0c 16 0d f3 71 | 8e b0 d2 f3 4f 39 a2 61 00 00 00 1c 00 00 40 05 | 96 4b e6 dc 37 23 61 90 08 5b 41 4a ab 35 e9 fe | 61 65 2c 1d | libevent_free: release ptr-libevent@0x7fb3680180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56dd0 | #108 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b6 36 fb 7e 9b 39 08 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #108 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #108 | rejected packet: | b6 36 fb 7e 9b 39 08 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #108: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c00d120 | handling event EVENT_RETRANSMIT for parent state #137 | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #137 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #137 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49613.344803; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003322 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56dd0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #137 | libevent_malloc: new ptr-libevent@0x7fb3680180b0 size 128 "road-eastnet-nonat-137" #137: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #137) | 71 ba fb 1f 95 88 29 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 75 6d 4d 0f bb db 8d 24 d0 ba 5f 79 5b 88 be | 94 ae ea 89 7e 95 49 22 fa 6f 0d 51 90 a6 60 1f | 08 fe 3b 9a b1 a8 b5 c8 e8 a5 d1 c2 b6 3a f6 5c | 07 25 e1 53 6d cd f9 d3 3f 17 7a b9 97 ee 73 6b | da 87 59 77 74 9c 5c 05 a7 16 5c 85 33 f2 d8 f0 | a7 84 4c 20 01 fc 53 bf 21 28 ba 99 79 44 ea b7 | b7 e2 9a c6 4e 09 9d 5a 41 46 ff 69 36 bd 47 3d | 68 59 0e 87 0c b2 db 9d ef 27 b1 ef a7 c3 7d 74 | d1 bf 63 41 fd 34 70 c8 08 69 9e 0d 21 dd b6 ca | 61 47 c8 f6 20 99 94 42 4a b6 3c e4 c1 6f 59 47 | 32 7f e7 88 96 d9 c5 8f 82 9f aa 9b 0b 9e 03 53 | 65 a9 c8 5c d7 fe be da 56 44 27 26 98 d6 9a ae | 35 b2 bc fb a7 4d 1f ae ae 76 fb c2 8c 86 63 40 | 59 88 a0 8b a9 0e 3a 8f 10 76 ad e8 54 d2 9e 91 | 7a bc 03 79 61 0b 83 53 4c 4e 2d 22 ca 69 54 24 | ae 77 e1 5c 6b 3a ff ee 1f 59 52 e0 9c 51 48 2c | 29 00 00 24 f7 ec 22 b0 d2 45 cb de 11 9d 88 dc | d9 c8 87 82 94 72 01 b4 91 d8 41 1f 07 fb 13 21 | 60 9f a8 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ee b9 3b 05 6b fc 34 5a 00 ef 69 | 58 dc d5 6e 13 53 c2 0c 00 00 00 1c 00 00 40 05 | 42 f2 83 df 2f 64 fb 42 98 b0 17 b3 99 82 89 4f | 79 b2 42 ca | libevent_free: release ptr-libevent@0x7fb36c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00d120 | #137 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 ba fb 1f 95 88 29 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #137 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #137 | rejected packet: | 71 ba fb 1f 95 88 29 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #137: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9f380 | handling event EVENT_RETRANSMIT for parent state #152 | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #152 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #152 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49613.36049; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00398 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #152 | libevent_malloc: new ptr-libevent@0x7fb36c012840 size 128 "road-eastnet-nonat-152" #152: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #152) | c7 e3 df ec 9e c4 62 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a7 d8 bf 29 24 11 1c ce c6 eb 11 96 dd 30 8f aa | 0c 4c 70 ce 87 a4 df 43 d2 6c ba d5 f0 3b d8 41 | 39 bd 2b 1a 59 08 f6 28 59 f9 b3 0f e5 b5 40 32 | 97 af 83 49 1b 9c e1 41 6c 19 d9 81 bd 62 6f 16 | 88 77 9c c6 99 70 f5 87 ca bd 33 9d e4 05 6b 5b | c0 98 a4 04 59 99 ff a8 0d 45 13 de 94 59 78 3e | 9f 29 e2 f0 6e 7e b9 fe f0 0d e5 7f 5b 4c 01 84 | ef a7 c0 48 17 b5 cf 69 2f 9d 37 d6 9e 2c 49 b7 | 21 74 f9 23 52 39 e5 70 37 49 22 ad bf 6a ae c7 | 00 73 99 52 14 5a 01 1d ec dc e2 c6 b8 f0 0e df | bb 4f 3c 66 48 6a d8 f8 3d dd ce 84 36 d7 fe 75 | b0 8b 40 6c b7 0a 71 a4 a1 89 ca 62 6c e9 05 72 | 42 a3 a2 98 b2 36 46 5e b4 83 55 6f f7 d0 07 bb | be 2a 0c 02 1c 0f 1c ef 21 73 11 f7 92 da ee 38 | b3 d6 c9 03 8b 2f b8 eb 38 2b 9f 1a 71 81 4d 22 | 5e d5 1f 81 77 a6 9c 34 d3 30 8a 8b 41 61 5e 1b | 29 00 00 24 29 e4 ca ab 2a 30 18 fc 26 46 3c 50 | 1a f5 21 d0 52 38 f5 d5 7b 74 90 b3 b6 ed 01 58 | e0 d9 32 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 38 7f 4c 40 24 5c 70 b7 73 9c 98 | de a9 9b f3 50 76 96 bb 00 00 00 1c 00 00 40 05 | 28 07 96 1e 77 dd a7 3a bc 86 9b 87 bc da 1a a0 | d3 4f e8 fc | libevent_free: release ptr-libevent@0x7fb36402ffd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9f380 | #152 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 e3 df ec 9e c4 62 b6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #152 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #152 | rejected packet: | c7 e3 df ec 9e c4 62 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #152: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a12c70 | handling event EVENT_RETRANSMIT for parent state #160 | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #160 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #160 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49613.368832; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501147 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9f380 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #160 | libevent_malloc: new ptr-libevent@0x7fb36402ffd0 size 128 "road-eastnet-nonat-160" #160: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #160) | ec 91 fb f1 0c bb 28 b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 30 17 61 87 0e 49 c3 b5 8e 06 e9 0f 8d 98 6f | af 06 7c a8 d8 5f dc 88 0a 69 f2 9d 79 59 e2 95 | a1 fb db 6f 1f 95 32 7b b7 f9 9f f9 87 3d 1e fd | 84 a3 dc 5e 41 59 c7 3d 40 a9 2a 90 d5 3d ec a5 | 70 8f 09 86 de c0 6f f0 8b 3d 45 2f a8 92 74 65 | dc 5a 07 23 6d 89 30 20 25 5a 37 b2 af 30 d2 98 | c2 6a 98 57 d0 a0 8f ff e2 c6 37 8c 7f c8 5e c3 | 9d 98 d2 5d 5e 70 59 77 03 8a bf 2a a1 c0 c1 c0 | 77 97 84 ec 45 c7 38 00 39 c5 2e 6a 0f 64 17 e5 | 6e 90 68 05 f5 f6 24 a7 89 fc 3d ac 97 b9 b8 8e | 69 68 d2 76 c0 8b ed 21 84 18 d2 89 99 90 e5 b1 | e9 a1 7c 9d 78 af 48 90 e7 1b 1a 7c 29 30 21 6e | 39 f7 cd b5 93 ab 03 d1 25 14 24 ad 0e 2c 3a 55 | 23 bf 0e 11 13 d6 6c 92 56 a2 2e ac 22 4b 36 72 | 62 e4 c0 2c 6e a1 80 10 e9 1f 33 37 5b 82 aa ab | bc d0 55 fd fd 61 98 d4 55 8c e5 05 44 59 3d 11 | 29 00 00 24 5a 7f a2 3e 7b 7f ae 84 88 a2 b0 db | 20 96 18 8a e9 32 7e 19 52 af 25 1a 74 e6 9f 5e | 17 1f 26 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 25 02 d7 0c d0 85 e5 86 af b4 01 | ce 64 18 db 06 ad 6a 73 00 00 00 1c 00 00 40 05 | 33 04 36 eb ae 2e 87 8f ec 4d 9c 69 20 d1 b8 6e | 57 bb 48 2f | libevent_free: release ptr-libevent@0x7fb380022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a12c70 | #160 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 91 fb f1 0c bb 28 b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #160 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #160 | rejected packet: | ec 91 fb f1 0c bb 28 b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #160: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0963 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-168" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-168' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #168 at 0x557d46ab9b40 | State DB: adding IKEv2 state #168 in UNDEFINED | pstats #168 ikev2.ike started | Message ID: init #168: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #168: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #168; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-168" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-168" IKE SA #168 "road-eastnet-nonat-168" "road-eastnet-nonat-168" #168: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-168 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-168": constructed local IKE proposals for road-eastnet-nonat-168 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 168 for state #168 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a12c70 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #168 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 | crypto helper 19 resuming | #168 spent 0.167 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-168" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.261 milliseconds in whack | crypto helper 19 starting work-order 168 for state #168 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 168 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 168 time elapsed 0.000806 seconds | (#168) spent 0.813 milliseconds in crypto helper computing work-order 168: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 168 for state #168 to event queue | scheduling resume sending helper answer for #168 | libevent_malloc: new ptr-libevent@0x7fb368035930 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #168 | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 168 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #168 | **emit ISAKMP Message: | initiator cookie: | b9 02 4f a9 68 0f a0 fe | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-168 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x de 38 63 d7 fd 7e 45 ef 72 03 13 6e 35 cd 53 26 | ikev2 g^x dd fc 38 ee df 06 1b 11 d5 c4 09 34 ea 9e 52 e9 | ikev2 g^x 90 99 59 42 6e 45 cc 92 f7 0d d9 7f 81 1b 1c 4d | ikev2 g^x 72 ce 0d 51 93 0e f8 d3 b9 70 d1 ad 64 8a 6a e2 | ikev2 g^x a3 1d 17 ed 1c a1 e4 c2 92 7b 01 e5 0d a5 15 1e | ikev2 g^x c9 45 f6 10 06 37 94 e2 37 85 e0 bc d4 3b da fb | ikev2 g^x 39 7d 59 09 ad a9 c4 e3 7a c2 37 5d ed ee 68 e8 | ikev2 g^x b1 63 07 9f 75 29 29 20 65 07 02 b1 8b 8b 01 b0 | ikev2 g^x 2b 52 3c a4 c8 5c 27 70 49 1c a9 4a ee d4 27 a2 | ikev2 g^x d7 44 e4 1a a5 20 37 9f 74 66 e1 72 a9 aa a5 00 | ikev2 g^x ec 99 a9 b7 19 84 18 49 d0 9b 4f 00 03 95 50 90 | ikev2 g^x b6 93 61 e2 6b 86 3b a3 1f 9e fe be b9 00 11 4e | ikev2 g^x d0 ee 6d 6d 92 bc 2a 22 db 5c 6c ba d6 ed 5d 3e | ikev2 g^x 26 d4 a4 f0 75 e3 70 55 39 8d c3 1c 3c 5e 40 3f | ikev2 g^x 06 f2 7d 36 24 34 4a 10 84 8b e4 b1 b8 1a 47 88 | ikev2 g^x b9 e7 73 06 47 d4 d0 41 aa 50 1b af 0e 28 2a e0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3f 02 e6 1c 86 66 81 19 d2 36 b7 e8 e6 9a a6 e7 | IKEv2 nonce 5e 78 b6 e8 13 75 aa 57 3b a6 be 37 b8 21 ac c0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b9 02 4f a9 68 0f a0 fe | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a8 | natd_hash: port= 01 f4 | natd_hash: hash= 72 8a 57 55 a3 9f b5 8e 63 74 0d de 85 a9 a1 c8 | natd_hash: hash= 2f d9 1c 61 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 72 8a 57 55 a3 9f b5 8e 63 74 0d de 85 a9 a1 c8 | Notify data 2f d9 1c 61 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b9 02 4f a9 68 0f a0 fe | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7a 31 f7 15 f8 cd 69 10 6a f0 ab d3 a9 c2 c3 c7 | natd_hash: hash= 07 31 9b 08 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7a 31 f7 15 f8 cd 69 10 6a f0 ab d3 a9 c2 c3 c7 | Notify data 07 31 9b 08 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #168 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #168: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #168 to 4294967295 after switching state | Message ID: IKE #168 skipping update_recv as MD is fake | Message ID: sent #168 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-168" #168: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.168:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #168) | b9 02 4f a9 68 0f a0 fe 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 38 63 d7 fd 7e 45 ef 72 03 13 6e 35 cd 53 26 | dd fc 38 ee df 06 1b 11 d5 c4 09 34 ea 9e 52 e9 | 90 99 59 42 6e 45 cc 92 f7 0d d9 7f 81 1b 1c 4d | 72 ce 0d 51 93 0e f8 d3 b9 70 d1 ad 64 8a 6a e2 | a3 1d 17 ed 1c a1 e4 c2 92 7b 01 e5 0d a5 15 1e | c9 45 f6 10 06 37 94 e2 37 85 e0 bc d4 3b da fb | 39 7d 59 09 ad a9 c4 e3 7a c2 37 5d ed ee 68 e8 | b1 63 07 9f 75 29 29 20 65 07 02 b1 8b 8b 01 b0 | 2b 52 3c a4 c8 5c 27 70 49 1c a9 4a ee d4 27 a2 | d7 44 e4 1a a5 20 37 9f 74 66 e1 72 a9 aa a5 00 | ec 99 a9 b7 19 84 18 49 d0 9b 4f 00 03 95 50 90 | b6 93 61 e2 6b 86 3b a3 1f 9e fe be b9 00 11 4e | d0 ee 6d 6d 92 bc 2a 22 db 5c 6c ba d6 ed 5d 3e | 26 d4 a4 f0 75 e3 70 55 39 8d c3 1c 3c 5e 40 3f | 06 f2 7d 36 24 34 4a 10 84 8b e4 b1 b8 1a 47 88 | b9 e7 73 06 47 d4 d0 41 aa 50 1b af 0e 28 2a e0 | 29 00 00 24 3f 02 e6 1c 86 66 81 19 d2 36 b7 e8 | e6 9a a6 e7 5e 78 b6 e8 13 75 aa 57 3b a6 be 37 | b8 21 ac c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 8a 57 55 a3 9f b5 8e 63 74 0d de | 85 a9 a1 c8 2f d9 1c 61 00 00 00 1c 00 00 40 05 | 7a 31 f7 15 f8 cd 69 10 6a f0 ab d3 a9 c2 c3 c7 | 07 31 9b 08 | state #168 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380022480 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a12c70 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa34c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #168 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 | #168 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49613.396991 | resume sending helper answer for #168 suppresed complete_v2_state_transition() and stole MD | #168 spent 0.49 milliseconds in resume sending helper answer | stop processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb368035930 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 02 4f a9 68 0f a0 fe | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #168 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #168 | rejected packet: | b9 02 4f a9 68 0f a0 fe 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #168: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0678 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47f10 | handling event EVENT_RETRANSMIT for parent state #109 | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #109 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #109 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49613.410219; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003506 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee00 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #109 | libevent_malloc: new ptr-libevent@0x7fb368035930 size 128 "road-eastnet-nonat-109" #109: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #109) | 53 c2 aa ad 50 91 d9 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 1a 23 bb a3 ce 6a 0d 92 7a aa 8d 69 c7 99 27 | db f2 23 5c cd 5e 2d f6 c4 13 c1 c7 87 46 ed 75 | d8 b9 55 72 40 32 53 f1 21 db f3 6d 45 6a d9 b4 | 9c 06 b1 28 c5 00 1e e2 70 2c 2a 1a f0 fa 65 1b | a8 db b9 2c 83 95 23 c4 4d 60 4b a3 fc 58 c6 c8 | a8 b0 c1 e8 32 2c d3 70 a2 4d cb c8 7c 80 17 90 | c1 c1 fd 82 03 1f 32 d8 5e cd ad 60 ce c1 24 ab | 82 68 88 db 79 b3 aa 37 ff 36 d4 a3 82 06 b7 59 | 0c 4c 61 6f 22 1c 48 b3 94 8b 71 14 8f 57 c8 03 | 31 41 b9 e3 a9 ea 8f 4d 51 15 4a 4c 5f 30 c2 c4 | 40 3e 6a 9e 7d 33 6d fb 91 1c b2 be 1e 33 35 f6 | 1a db ff 1e 8c 4e e8 12 71 d7 94 88 49 d8 37 d9 | cb 52 5b 22 87 0a c9 2f a4 1d 52 36 85 74 38 7e | de e2 44 79 f2 36 18 5e 82 cf d4 fb db 3f c9 35 | 36 d8 7b 5d 04 fb fa a4 fe b5 87 c5 e7 4e 90 d6 | 9f 17 87 48 32 5d ec 5c f7 e6 e2 39 17 1c 9c 2a | 29 00 00 24 8f bd ba cb 6b fc de c1 80 b9 fe c3 | b3 e0 ad b2 e9 fa 37 77 43 04 c6 81 1a 91 41 eb | 20 40 b9 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f d2 7c ae 7e 39 2b fb 54 2c 44 94 | 2e c2 37 67 8d e5 fe 8b 00 00 00 1c 00 00 40 05 | 12 b6 58 87 f0 a8 b9 d4 aa ae 6f 5a ed df 76 d7 | 1d 86 02 2c | libevent_free: release ptr-libevent@0x7fb37801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47f10 | #109 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 c2 aa ad 50 91 d9 00 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #109 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #109 | rejected packet: | 53 c2 aa ad 50 91 d9 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #109: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56e70 | handling event EVENT_RETRANSMIT for parent state #56 | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #56 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #56 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49613.411489; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005028 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #56 | libevent_malloc: new ptr-libevent@0x7fb37801d920 size 128 "road-eastnet-nonat-56" #56: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #56) | a2 38 96 b9 83 17 2c 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c 86 44 cb cd d5 e6 ca 09 de cc 09 a4 86 65 dc | 8e 5e 46 71 c3 c7 a8 ed be 75 06 f3 62 76 ba da | ce e9 f2 5f 5c 9e e4 0c 00 41 ba fd 53 1c 48 95 | 4a ae 4f cc 78 85 9f f0 fa 4c 13 7a c5 dc 96 cf | 8c 8f e9 26 db 93 6d c0 e4 2b 06 79 49 8a 1c 86 | 23 8a 00 51 5e 48 57 fe 2b c6 2d 2e cc 90 37 77 | 16 54 2d 1c 52 6e 88 f9 06 69 91 14 40 a3 3e 1f | 64 d7 73 f6 42 da 0d 73 5f 6b eb 89 ee 97 cd 6c | fd 1d 89 b8 17 39 77 3f b0 8b a8 13 2f f9 45 f4 | e3 ec 7f a4 35 be 17 3d c6 80 db be df d2 e9 bc | 39 46 6a e1 d0 06 ce 65 d8 13 18 bc e7 ef 70 ba | 17 09 9b 7f c9 d6 90 ff cb 53 6a 15 26 bc 84 d0 | 3c 63 f9 85 08 c0 bf 6b 92 00 26 8e 7e 39 47 fa | 15 93 5e ae af a3 95 34 bf f7 9a 05 60 79 f9 78 | fe 1c 09 6f 2a d7 a8 e6 dd 20 f6 bd f3 b0 a8 de | 56 b0 c1 b0 a8 8e c2 c9 51 e8 12 8c 23 35 5a 34 | 29 00 00 24 d3 9d 92 33 15 50 42 07 cb e2 93 fb | fa f0 4d 62 ce 86 f8 78 f6 e4 5a c4 46 ff 05 fd | 2d fe b5 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 f6 95 c7 6a 67 27 fa d2 0e 4e 26 | b1 fb ce d1 96 08 1b d4 00 00 00 1c 00 00 40 05 | 86 3b a6 fc 26 15 66 79 c8 2d 3b 9c 75 89 43 54 | 51 cf ae 75 | libevent_free: release ptr-libevent@0x7fb36c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56e70 | #56 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 38 96 b9 83 17 2c 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #56 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #56 | rejected packet: | a2 38 96 b9 83 17 2c 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #56: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0587 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4bfd0 | handling event EVENT_RETRANSMIT for parent state #138 | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #138 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #138 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49613.416797; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002337 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee40 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #138 | libevent_malloc: new ptr-libevent@0x7fb36c0251c0 size 128 "road-eastnet-nonat-138" #138: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #138) | 9e 04 07 cd 3c 90 2d 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 26 9c 69 c2 fb a0 0a d4 c6 8a e3 3a 35 d9 72 | c4 6d dc 97 97 46 4f 49 45 f3 89 7c 26 93 32 59 | 0e 55 34 82 9b 12 80 e6 60 cd 9e 59 15 f7 7d 65 | 53 e2 d3 d8 c2 ed 2c ad 8a b3 a9 0f 4d 3e ac 86 | 1c 67 54 95 04 00 bf 86 4e 8b bf af 44 15 eb 62 | ea cc 94 5a 6b 1a 81 0f 38 cc a4 0b 8b 3e f7 1f | ed 1b ee bf 3c b7 b3 6b c3 78 66 29 1f dc 55 cd | cd 9e c4 55 82 0d 26 16 81 1d 3b 87 44 bb 54 ef | 02 0c 05 f7 04 a0 83 3c c1 fe 2c d3 4e 3d ca 62 | 71 e8 db ac f9 9d 90 a6 0d 1e d9 94 f5 c3 29 22 | f5 2c d8 67 db 54 e1 d3 df b5 df 85 0d 36 cf 0c | 0f 08 0d 38 84 31 cd 9b 35 a0 fd df e8 86 86 f3 | a8 84 f3 56 c8 9a eb 02 1a c2 37 30 b1 0d 51 72 | 6c ba 2c ab f4 fb 66 85 22 97 66 d7 6b a3 32 2b | 57 22 c0 38 a7 76 1b d3 ea e0 94 87 f8 5d 23 88 | 1d 92 5d 32 0c 98 0b 93 d1 e9 b6 e4 2e 67 5c f1 | 29 00 00 24 e6 24 a9 20 36 d0 44 65 2c ba 3d 80 | 21 f7 06 3f 8d eb de 66 e7 ca a9 01 80 86 00 a0 | 79 48 c1 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 af 88 b2 43 70 03 fc c5 39 dd 7b 65 | af e5 61 63 70 8d 5a 32 00 00 00 1c 00 00 40 05 | 84 c7 81 66 9c 3a cd fa d9 98 02 0d f2 5f b1 72 | 68 cd 62 b2 | libevent_free: release ptr-libevent@0x7fb3700251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4bfd0 | #138 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e 04 07 cd 3c 90 2d 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #138 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #138 | rejected packet: | 9e 04 07 cd 3c 90 2d 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #138: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90440 | handling event EVENT_RETRANSMIT for parent state #153 | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #153 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #153 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49613.422104; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001762 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4bfd0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #153 | libevent_malloc: new ptr-libevent@0x7fb3700251c0 size 128 "road-eastnet-nonat-153" #153: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #153) | ed 10 7e d3 7b 33 74 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 23 2b fa a2 7a a7 c0 a4 0c c7 9f 58 c4 e7 e8 | 70 a1 a8 0f 51 5f a2 04 f4 14 9f d7 e2 33 9b d1 | 70 a9 9d e5 73 3e d4 0c 84 28 f3 47 b9 3c 03 49 | 98 c3 54 58 79 2a 6a d2 f7 19 34 3f ea 9b 09 66 | 26 4b 77 9a 2e 2d 06 7d b1 99 09 62 d6 ef 52 44 | 03 d0 e7 2e 96 a1 8d 5c ea 4e a7 ca 7e fb ac a0 | 2f ea 86 d8 ac 11 f8 20 6b 77 af c2 6c 84 38 e7 | 8a b3 d4 12 59 8f 14 90 f8 a1 09 66 1f 57 d8 3c | 73 c4 11 8b a8 7f b3 1e 97 ed 1c 65 90 26 33 5b | 30 76 3b 3b d5 b4 96 62 cb 7d 86 9d ad 4a 9e e5 | 2b b2 c9 9e 69 f5 8a e4 08 29 24 90 1c 8f 81 c4 | d0 5a 30 f4 83 2c f9 11 5c 07 b1 f7 f6 7a 22 ac | 46 53 33 91 c1 25 ad 6c f8 ee d4 49 b1 09 fc 61 | 27 91 e2 9d 17 78 bb a6 45 04 eb ad 01 76 59 27 | df 49 c6 69 61 22 0d b2 77 f2 e5 49 0e d0 19 37 | f9 e3 3c 5d ab 0d ee 24 0e 3a 1b 87 b3 59 f2 dd | 29 00 00 24 11 3e 89 f2 e4 5a b4 91 6f f3 6f e0 | 10 78 d4 00 e7 63 f4 34 67 6a f8 b4 dc 99 94 12 | b9 1e 59 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cc 1e 02 bf 67 12 0b 49 15 df fb a0 | 1b e0 2a 30 f1 cf bd 20 00 00 00 1c 00 00 40 05 | ce 1d 48 38 8b bc 75 71 1c ff 01 f5 d1 af 95 90 | 14 3b df 16 | libevent_free: release ptr-libevent@0x7fb34801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90440 | #153 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 10 7e d3 7b 33 74 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #153 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #153 | rejected packet: | ed 10 7e d3 7b 33 74 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #153: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28ab0 | handling event EVENT_RETRANSMIT for parent state #161 | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #161 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #161 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49613.430435; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500481 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90440 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #161 | libevent_malloc: new ptr-libevent@0x7fb34801d920 size 128 "road-eastnet-nonat-161" #161: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #161) | 0e 21 c5 28 e0 11 16 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 b1 7e f7 73 9d 3d 0b 9c d2 8e 29 c6 08 34 06 | 2d dc ae 10 7c 53 33 af cd 18 8c 8c 37 fc eb 71 | 2c 3b de 0f 76 b3 63 bc 1c 05 f0 af 4b 44 5e c7 | 23 d4 29 d3 16 0f fb 8c 12 fb 18 1d 9e 65 94 73 | c1 7f 44 d2 39 97 a4 57 24 65 09 c9 9f 95 0f 07 | 98 bb c4 fc e8 f9 84 20 79 d3 9b da f2 f3 7b ff | 76 4d 74 89 ed 7a aa a4 38 3a 39 de f9 ec 60 48 | 7f 57 eb 50 ff 9b 33 98 7d 3b 5f cc 64 ba 1b 81 | 67 2a 02 26 ec 3f 45 a5 fe c6 9b 0d 1d 37 b0 40 | 01 1f 97 01 e8 87 5e 53 40 bf fb d3 7e 9e 2e b3 | 15 ba fc 8b b1 4a 7e fa af 94 c4 67 c0 2c 29 d2 | 74 fe d7 24 50 34 48 da f7 a1 54 c5 1c 2b 5a 35 | 33 a6 86 42 a8 e3 25 9b e3 fe 4c de 22 93 ae dd | c7 11 a7 9f 05 b4 87 2f a1 b9 2b f6 21 37 9c 8e | 50 21 6a 50 8e bd 1d 5f a1 42 92 50 68 2f 4e 9a | 54 04 e8 cc b9 5f 82 df 48 23 c8 76 49 63 f0 50 | 29 00 00 24 b8 74 18 e1 c4 b4 30 2e a4 31 94 25 | 46 e1 dc 47 b5 0b e4 ae a0 1d 11 3a f1 77 67 fa | 52 d5 2a a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 94 bf 28 28 ea 74 13 ca 7d 07 ba | 5d 79 38 7b d7 5d 40 d3 00 00 00 1c 00 00 40 05 | aa 2f 88 27 56 8a 2e 19 5d ff 44 bb aa 2d 48 42 | c7 75 31 6a | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28ab0 | #161 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 21 c5 28 e0 11 16 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #161 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #161 | rejected packet: | 0e 21 c5 28 e0 11 16 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #161: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-169" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-169' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #169 at 0x557d46abb100 | State DB: adding IKEv2 state #169 in UNDEFINED | pstats #169 ikev2.ike started | Message ID: init #169: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #169: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #169; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-169" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-169" IKE SA #169 "road-eastnet-nonat-169" "road-eastnet-nonat-169" #169: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-169 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-169": constructed local IKE proposals for road-eastnet-nonat-169 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 169 for state #169 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a28ab0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #169 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 | #169 spent 0.151 milliseconds in ikev2_parent_outI1() | crypto helper 6 resuming | crypto helper 6 starting work-order 169 for state #169 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 169 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-169" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.232 milliseconds in whack | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 169 time elapsed 0.000855 seconds | (#169) spent 0.864 milliseconds in crypto helper computing work-order 169: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 169 for state #169 to event queue | scheduling resume sending helper answer for #169 | libevent_malloc: new ptr-libevent@0x7fb36c035930 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #169 | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 169 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #169 | **emit ISAKMP Message: | initiator cookie: | 36 7b 71 a0 e2 7f 3d 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-169 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fb 4f 45 f4 ab d7 36 ef 76 4d 44 de 6d 62 2d ae | ikev2 g^x 4e 5c 7f da 0a b2 48 be 78 ae 6d be 58 68 4b a4 | ikev2 g^x 8f 2f d2 29 68 46 25 1b 12 f9 92 02 9c d7 87 f1 | ikev2 g^x eb d6 eb 82 f8 34 c7 6d 1b 97 bd 5a 16 3f 5c d9 | ikev2 g^x 45 ff a3 65 05 29 38 16 83 1c 73 b0 0d 2c 32 2c | ikev2 g^x fa dc 03 8b a8 c2 e4 3a 68 19 c8 6f 81 6b a9 c7 | ikev2 g^x f3 1e d3 85 90 6b 23 38 49 5d e8 b8 1a 99 c6 3a | ikev2 g^x 6a a2 1b 8c c9 a7 dc be 9d 40 85 d1 eb b3 30 ea | ikev2 g^x 56 c0 aa c1 0c 1e 30 02 2d 3d a6 f2 04 1d 14 69 | ikev2 g^x 6d b1 c7 5c 5a 62 14 b7 a7 b0 4d b4 4a ea d7 8e | ikev2 g^x 92 28 ac 35 b4 c0 43 9c a2 b3 5b b7 49 ed fe 09 | ikev2 g^x 58 d4 4b a6 dd 4b ac 69 dc 3a 32 2b 1e e0 8a 39 | ikev2 g^x ae 70 61 ea 71 bb e0 10 48 b3 9a 5d a8 33 73 7a | ikev2 g^x e9 75 bd 48 dd 69 c9 c8 be a6 8c 92 7f 96 ad 37 | ikev2 g^x 04 3d 47 69 86 1c fb 25 12 87 50 73 a4 63 1a 75 | ikev2 g^x dc 73 f6 d1 8e ed 8a 90 43 3f ec 36 e2 fd c3 e9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c6 0f 04 68 5e 20 5e 64 7b fe 77 4f 0f cb 3e 64 | IKEv2 nonce 8c ad ed 27 06 6f 13 47 5c 0b 0d 8e 1c d7 84 89 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 36 7b 71 a0 e2 7f 3d 1c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a9 | natd_hash: port= 01 f4 | natd_hash: hash= fa 7c 50 0f e9 f1 70 67 4d 08 f0 45 40 25 4d e8 | natd_hash: hash= 01 bd 9b 4f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fa 7c 50 0f e9 f1 70 67 4d 08 f0 45 40 25 4d e8 | Notify data 01 bd 9b 4f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 36 7b 71 a0 e2 7f 3d 1c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= cc 1b 7d 85 9d ec 77 c3 d4 a3 45 1a a2 36 2f 10 | natd_hash: hash= c5 f4 8f 3e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cc 1b 7d 85 9d ec 77 c3 d4 a3 45 1a a2 36 2f 10 | Notify data c5 f4 8f 3e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #169 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #169: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #169 to 4294967295 after switching state | Message ID: IKE #169 skipping update_recv as MD is fake | Message ID: sent #169 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-169" #169: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.169:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #169) | 36 7b 71 a0 e2 7f 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 4f 45 f4 ab d7 36 ef 76 4d 44 de 6d 62 2d ae | 4e 5c 7f da 0a b2 48 be 78 ae 6d be 58 68 4b a4 | 8f 2f d2 29 68 46 25 1b 12 f9 92 02 9c d7 87 f1 | eb d6 eb 82 f8 34 c7 6d 1b 97 bd 5a 16 3f 5c d9 | 45 ff a3 65 05 29 38 16 83 1c 73 b0 0d 2c 32 2c | fa dc 03 8b a8 c2 e4 3a 68 19 c8 6f 81 6b a9 c7 | f3 1e d3 85 90 6b 23 38 49 5d e8 b8 1a 99 c6 3a | 6a a2 1b 8c c9 a7 dc be 9d 40 85 d1 eb b3 30 ea | 56 c0 aa c1 0c 1e 30 02 2d 3d a6 f2 04 1d 14 69 | 6d b1 c7 5c 5a 62 14 b7 a7 b0 4d b4 4a ea d7 8e | 92 28 ac 35 b4 c0 43 9c a2 b3 5b b7 49 ed fe 09 | 58 d4 4b a6 dd 4b ac 69 dc 3a 32 2b 1e e0 8a 39 | ae 70 61 ea 71 bb e0 10 48 b3 9a 5d a8 33 73 7a | e9 75 bd 48 dd 69 c9 c8 be a6 8c 92 7f 96 ad 37 | 04 3d 47 69 86 1c fb 25 12 87 50 73 a4 63 1a 75 | dc 73 f6 d1 8e ed 8a 90 43 3f ec 36 e2 fd c3 e9 | 29 00 00 24 c6 0f 04 68 5e 20 5e 64 7b fe 77 4f | 0f cb 3e 64 8c ad ed 27 06 6f 13 47 5c 0b 0d 8e | 1c d7 84 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fa 7c 50 0f e9 f1 70 67 4d 08 f0 45 | 40 25 4d e8 01 bd 9b 4f 00 00 00 1c 00 00 40 05 | cc 1b 7d 85 9d ec 77 c3 d4 a3 45 1a a2 36 2f 10 | c5 f4 8f 3e | state #169 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a28ab0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28ab0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #169 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 | #169 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49613.477721 | resume sending helper answer for #169 suppresed complete_v2_state_transition() and stole MD | #169 spent 0.485 milliseconds in resume sending helper answer | stop processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c035930 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 7b 71 a0 e2 7f 3d 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #169 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #169 | rejected packet: | 36 7b 71 a0 e2 7f 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #169: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0562 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a43dd0 | handling event EVENT_RETRANSMIT for parent state #154 | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #154 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #154 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49613.483933; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001909 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56e70 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #154 | libevent_malloc: new ptr-libevent@0x7fb36c035930 size 128 "road-eastnet-nonat-154" #154: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #154) | 58 44 d0 f4 a9 dc 50 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 19 a5 f0 13 d1 8a b9 49 96 a8 fe 61 6f 4c e6 | ed 98 cc 8a 65 9d e4 af 10 e6 cf 62 f8 4a ff 02 | 90 85 dd 9e 23 5d 3e 90 f8 fe da b0 af 0e f7 4d | 4a 05 63 a1 69 db d1 01 e1 b1 0c 86 c9 3e 7d 9b | a4 2a 0f 98 09 40 36 8c 8d db ff 98 96 15 32 bf | 21 16 30 40 ae ae fb 4d 47 43 6a 1d c4 ee 0d b8 | 26 d3 b2 3f 2c ab f7 f8 0e a5 40 0f 3a fc 7c 80 | cc 8b 34 d2 f1 7f 26 73 45 a4 a9 ed 44 96 56 b1 | 73 9b 2b 0c 92 10 cb f0 48 16 48 7a 38 20 64 1d | 96 ee 19 8c 5c 7f a1 2d 3c cf aa b0 87 20 50 5a | d7 fe ed 1e da e9 09 e6 09 9a 75 a1 17 60 9e 3f | eb eb 3b 4a e8 5b e7 e1 61 2b a2 e0 ec 37 4d 19 | 5f 61 62 98 dd f9 aa d9 4b 8e bd 76 64 f0 89 37 | 39 0c 99 e6 f2 9b c5 88 8a eb 5b 10 1d 66 5f 10 | c6 5a 71 1c 22 22 ac a4 dd 72 16 46 60 ff 04 a0 | 8f 7a b8 da e1 39 b2 3e 50 39 72 e6 6a 86 81 1e | 29 00 00 24 8a 71 f4 36 cf 99 83 f2 20 30 a8 af | 91 e1 58 d7 2f 81 0b 43 f4 5f a3 87 48 cc 52 31 | 9b 27 40 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 21 57 f3 9f 4c 07 c6 03 b1 b0 7f | 5c 7f 90 aa ef 12 66 a4 00 00 00 1c 00 00 40 05 | de 38 70 15 e3 5a 3a 70 b8 42 a9 af 5d 6c a1 ee | f3 f1 65 20 | libevent_free: release ptr-libevent@0x7fb34c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a43dd0 | #154 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 44 d0 f4 a9 dc 50 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #154 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #154 | rejected packet: | 58 44 d0 f4 a9 dc 50 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #154: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.07 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e8820 | handling event EVENT_RETRANSMIT for parent state #139 | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #139 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #139 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49613.48417; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003323 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a43dd0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #139 | libevent_malloc: new ptr-libevent@0x7fb34c01d920 size 128 "road-eastnet-nonat-139" #139: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #139) | 98 4d 89 18 32 14 8f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb bc f6 61 86 12 c3 bf 44 ad ab c8 f8 6d 1d 7a | 8e 0b a1 af 30 f0 3a 9c 0b 72 59 7b 0e cc 41 e5 | 8e 8e a0 7e 30 1e 50 82 23 bf b6 e1 69 ee be 0d | cc 36 07 e5 53 86 7d cf f5 63 8d 89 06 e8 7e 7e | 8f 2c 9d a8 ed 05 f6 a5 d3 42 db b5 95 59 0b 32 | 04 71 41 13 63 f9 4a 4c 42 0e 00 d5 c5 99 ba ab | 17 4c ce 49 6c 52 88 21 1f b3 2a 6c 8d cc 9d ad | 58 96 b7 c5 a6 44 e9 2c bb f7 31 ef f0 0b f9 1c | 1b 4e 21 f5 a2 ea 26 1f 03 aa b4 4e 34 e2 87 84 | cf 38 c7 5e ef db 85 1f 03 a7 73 48 68 be 7e b1 | 00 74 8f e9 65 a8 0b 8a 27 e7 a0 51 5b c9 e3 2d | 64 f7 22 1b 1e b7 6f af e1 0f 11 f6 9b 82 c4 de | 33 fe da 26 0e d7 f8 c3 43 49 4f e1 38 7e 8a 70 | 40 40 85 6b ea cf c0 b6 a0 c2 ac 2b eb 0c 58 ce | 0e cd 1f 9c 72 bb e0 55 da 15 7c 5d ad 4e 80 77 | d9 86 7e 35 e9 dd 73 d2 de c2 f2 ae 3e 6a 77 fd | 29 00 00 24 ce a2 61 71 0b 59 18 45 32 ff fc 20 | d2 f9 be 9d 52 e8 20 ba 16 46 42 c2 a8 74 a7 11 | 49 eb 52 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 5e 21 46 6e c2 25 7d 16 7d 1e 10 | d1 b7 00 9d a8 c1 7e fa 00 00 00 1c 00 00 40 05 | 95 96 61 58 5f 24 29 d9 13 26 c9 57 d8 b0 16 e2 | 35 e6 bc 7d | libevent_free: release ptr-libevent@0x7fb3500300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e8820 | #139 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 4d 89 18 32 14 8f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #139 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #139 | rejected packet: | 98 4d 89 18 32 14 8f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #139: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0589 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #162 | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #162 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #162 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49613.507455; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499904 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a12c70 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #162 | libevent_malloc: new ptr-libevent@0x7fb3500300e0 size 128 "road-eastnet-nonat-162" #162: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #162) | 3b bf da 45 10 1c 63 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 2a 00 6f 37 4b f5 08 dc 2d d5 a4 5f d7 a7 d8 | a8 4d 31 bb 56 e7 51 71 5b 5d fc c8 0e 08 fb e2 | c0 7c 0d 9e fa 59 01 dc 52 d2 c1 e7 2f 1a e5 b4 | 5b d5 c8 45 b5 dd 91 a9 d5 c3 73 76 9d 7e fd b8 | f9 df d1 f8 01 94 2b 6f e5 9a 29 12 9e de 27 97 | 71 f3 e6 1b 74 76 a7 3a 8c e6 a9 61 00 52 7e f7 | c9 6f 55 40 33 0a 80 4c aa c5 55 f4 4e 14 8a a7 | 71 a6 78 3d d0 59 58 77 2f 99 7c 4c c3 1e 74 08 | f9 85 d0 5e 65 f5 6a 31 d7 63 2d f9 e8 59 8b 16 | 32 89 82 d2 3f 02 ed 88 92 cb b0 35 d8 db 40 15 | 72 43 38 f2 76 11 5a 75 77 0e 67 e7 50 ab d6 be | 45 bd 9e 45 2f 01 23 b3 e6 91 d2 ea db c5 26 44 | 62 95 26 52 cc d7 f4 4b d1 06 28 b1 bb 01 1a 47 | 2c 16 e5 b8 18 7a 69 d5 78 76 2f ea 81 85 bf fa | 27 ed 91 6a 8a 48 18 3c 3f 20 85 89 ae e6 4e 97 | 89 5c 72 59 c7 16 4a 7b 0a b0 0c 8e 44 0c ca 39 | 29 00 00 24 95 de a1 84 1b 6b 5e e8 be 4d c4 44 | d7 89 7f ff f7 3c d6 b5 51 9e bf df 42 03 ca bf | 75 41 b7 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 45 b2 30 32 2f 26 ad dc fc 75 7c | 7f bc 91 0d 37 21 2d 1b 00 00 00 1c 00 00 40 05 | b1 72 3a ba 32 f9 7a 15 ec b8 bb 62 7e ea 84 2a | af f4 56 24 | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | #162 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b bf da 45 10 1c 63 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #162 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #162 | rejected packet: | 3b bf da 45 10 1c 63 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #162: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f0aa0 | handling event EVENT_RETRANSMIT for parent state #57 | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #57 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #57 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49613.509775; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.001935 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #57 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 "road-eastnet-nonat-57" #57: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #57) | dc 73 20 b1 64 22 3b 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 2f 93 7c 8a da 22 fa 03 a0 fd 43 de d5 8f 84 | 5a 41 29 20 95 01 7c 7c 28 a1 27 22 f2 08 de cf | e0 98 16 08 1c e5 25 a6 bd bd 17 32 15 8e 0a 84 | f3 a2 7e 8a 0b 23 85 bf 7a b1 94 6d 13 0e bc 89 | 00 57 96 19 37 39 1b 02 a4 75 0f 94 90 d1 10 4b | e3 d2 66 0a 4f b7 c6 79 75 d4 b5 7d e4 36 1f c8 | 04 58 22 28 f1 96 40 a5 11 63 03 12 07 da 6e c4 | d6 87 58 17 eb bc 28 31 1f 88 9d a5 0c ef e1 d5 | b2 c3 d0 ee 08 43 a9 fb b1 8f de 78 3c c7 ae 7f | e9 04 ce d2 ab ca 37 0c f1 2a 72 1c 60 e7 51 7f | f2 49 54 44 b1 5f 43 7b 10 10 64 5c c3 44 75 d6 | 07 11 18 89 6c 1c 54 ef 0a c3 7f 69 cd 21 c7 ca | 32 33 4c f8 00 03 d2 d4 0f 41 96 9b 82 7d 76 81 | 10 2f 53 dd cd 91 0b 3d ff 38 8f 40 80 5c 77 b7 | 3d 66 a7 7b a1 8f 9e 2d 33 51 5c 72 92 e6 a3 7a | 40 cc ae 39 5f df 20 2b 13 8b bd 4c 81 23 66 a3 | 29 00 00 24 ad 63 ea 8e 7a 7b c2 d1 15 38 47 f0 | b3 a0 1a e0 85 11 f2 24 75 cc 3c d8 47 12 da f1 | 4a 24 d2 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 1b 4d 24 72 19 56 63 62 33 64 a7 | 66 22 df c0 bd 29 cc 1c 00 00 00 1c 00 00 40 05 | 7a aa 57 0f 26 4b 8b c1 eb 1a a3 08 c1 cf b1 49 | 59 b9 d4 8a | libevent_free: release ptr-libevent@0x7fb35000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f0aa0 | #57 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 73 20 b1 64 22 3b 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #57 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #57 | rejected packet: | dc 73 20 b1 64 22 3b 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #57: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0678 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7fec0 | handling event EVENT_RETRANSMIT for parent state #110 | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #110 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #110 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49613.514199; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004425 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a97080 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #110 | libevent_malloc: new ptr-libevent@0x7fb35000cf80 size 128 "road-eastnet-nonat-110" #110: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #110) | 3a df d4 0d 3f 72 b9 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 51 e2 9f 86 58 b1 8c 95 ac 68 08 4c 4a f6 70 | ad a1 89 82 51 9f 97 f7 49 8c 33 6b 14 6a e8 d8 | 5d 56 92 c8 3c 2c 40 17 32 2d 8f e8 79 30 ee 40 | f9 ba 9e a6 39 a8 9f 6a 60 30 36 fa 91 73 4e bf | e6 d5 bf ce 9d 89 72 4d e1 c3 4f 68 a3 0e 2d 22 | 55 9f 70 0b d2 5a 8e 49 bb 26 55 db 7b 06 39 59 | 26 09 73 11 d4 24 0c 12 fd 4f 4c 65 6c 3c af 90 | 8b 17 1f a8 52 96 38 96 91 03 13 81 89 15 d8 cf | 89 39 0b 98 8d cb b9 22 57 8d d7 cd 73 bd 42 b5 | c1 8a b1 55 88 ee 90 bf 86 98 c5 68 56 01 34 02 | ea ea cd ee 0d 3a 71 7c d0 06 82 a7 ca 34 05 ec | e1 16 4c 22 f3 b3 ca 01 1c d1 2d c9 10 65 0e d7 | 83 4d bc 53 a1 a2 68 8a 44 da c7 16 6f 1e 28 70 | e8 f3 08 87 27 18 70 75 bc 4e bd 4f 1d 1a 9f 84 | ef 78 e6 04 c6 13 ce e5 f8 3c cb 1e ba 12 8a 0a | 59 36 fd 3c 70 1f 1b ce d5 b3 7d ea 00 09 cd 9d | 29 00 00 24 58 d9 16 9f 6f 84 74 3f e6 2f bd ae | 97 8a 68 2c 39 11 78 2c 3d 3c 5e 7b f6 a4 c9 df | f7 87 68 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f6 22 5f bf 4c e5 cb 6e 52 c3 e8 | bb 73 1b e3 52 cd b5 da 00 00 00 1c 00 00 40 05 | 55 f2 83 9d d0 ff 8f 70 ef 45 0c 6f 49 6d a9 68 | 5e 51 a7 34 | libevent_free: release ptr-libevent@0x7fb34402a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7fec0 | #110 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a df d4 0d 3f 72 b9 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #110 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #110 | rejected packet: | 3a df d4 0d 3f 72 b9 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #110: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-170" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-170' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #170 at 0x557d46abc6c0 | State DB: adding IKEv2 state #170 in UNDEFINED | pstats #170 ikev2.ike started | Message ID: init #170: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #170: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #170; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-170" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-170" IKE SA #170 "road-eastnet-nonat-170" "road-eastnet-nonat-170" #170: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-170 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-170": constructed local IKE proposals for road-eastnet-nonat-170 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 170 for state #170 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7fec0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #170 | libevent_malloc: new ptr-libevent@0x7fb34402a950 size 128 | #170 spent 0.151 milliseconds in ikev2_parent_outI1() | crypto helper 11 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 starting work-order 170 for state #170 | RESET processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-170" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 170 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.246 milliseconds in whack | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 170 time elapsed 0.000604 seconds | (#170) spent 0.607 milliseconds in crypto helper computing work-order 170: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 170 for state #170 to event queue | scheduling resume sending helper answer for #170 | libevent_malloc: new ptr-libevent@0x7fb360035930 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #170 | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 170 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #170 | **emit ISAKMP Message: | initiator cookie: | 0e 3d 5a e4 33 67 ae f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-170 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6c 3a 08 5b b2 3f a4 8e df 9b c0 eb a8 ff 32 50 | ikev2 g^x b7 58 7d 7d 4a 10 8c 9a ad 53 11 df 0e 8d 39 fb | ikev2 g^x 8a c0 5f d6 8f ee 32 b4 c6 d6 4c 41 39 dc c8 7f | ikev2 g^x a6 9c 35 ef 09 08 ca f8 2d 7d 3c 76 aa 39 58 43 | ikev2 g^x 35 eb 36 d9 ef 09 c3 c6 d0 ab 11 b8 34 40 ff 55 | ikev2 g^x c8 35 93 0b bc c0 66 e0 d9 9f c1 89 c0 9b 98 09 | ikev2 g^x c8 0d 44 3a d6 3d e2 b0 52 69 78 44 4a 24 b0 ad | ikev2 g^x 80 aa 61 eb 53 d9 1a 0a 53 30 0a eb d5 8c f7 f3 | ikev2 g^x ca 01 74 12 22 ff f3 9d 01 97 d0 63 da 1b b6 a1 | ikev2 g^x 02 35 c9 78 38 c4 96 f6 23 08 55 58 52 01 18 8c | ikev2 g^x 46 ea 56 a8 65 c1 e7 43 3b b8 d3 07 66 36 b4 14 | ikev2 g^x 25 9e f5 4d 86 46 ab 55 94 68 c7 67 da 70 2b 06 | ikev2 g^x a8 71 55 97 18 18 f9 3a 98 e0 35 83 6a 8d aa b1 | ikev2 g^x bc e1 50 ed 72 ba 83 3d 44 b6 97 eb 32 ff 41 57 | ikev2 g^x 48 97 03 67 e5 b8 1f 12 59 d4 1e 23 84 44 9b 29 | ikev2 g^x 9a 72 cd 57 ba 76 df 2f d8 46 ae e3 a7 ac 2c 37 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f5 be bd 85 ea bf a8 35 5e 2e fb 98 21 e3 d9 77 | IKEv2 nonce 11 2b 7a 24 c1 b5 1e 2f 89 52 5c d3 bf 7f 74 7d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0e 3d 5a e4 33 67 ae f6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 aa | natd_hash: port= 01 f4 | natd_hash: hash= 8a ca 79 b0 52 c7 26 24 58 ba d7 c8 58 6a 36 93 | natd_hash: hash= 64 5a 0d 23 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8a ca 79 b0 52 c7 26 24 58 ba d7 c8 58 6a 36 93 | Notify data 64 5a 0d 23 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0e 3d 5a e4 33 67 ae f6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2e 8d 3a 82 9a 56 9c b7 68 e2 e0 45 0d 65 b1 99 | natd_hash: hash= f9 22 bb fc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2e 8d 3a 82 9a 56 9c b7 68 e2 e0 45 0d 65 b1 99 | Notify data f9 22 bb fc | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #170 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #170: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #170 to 4294967295 after switching state | Message ID: IKE #170 skipping update_recv as MD is fake | Message ID: sent #170 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-170" #170: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.170:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #170) | 0e 3d 5a e4 33 67 ae f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 3a 08 5b b2 3f a4 8e df 9b c0 eb a8 ff 32 50 | b7 58 7d 7d 4a 10 8c 9a ad 53 11 df 0e 8d 39 fb | 8a c0 5f d6 8f ee 32 b4 c6 d6 4c 41 39 dc c8 7f | a6 9c 35 ef 09 08 ca f8 2d 7d 3c 76 aa 39 58 43 | 35 eb 36 d9 ef 09 c3 c6 d0 ab 11 b8 34 40 ff 55 | c8 35 93 0b bc c0 66 e0 d9 9f c1 89 c0 9b 98 09 | c8 0d 44 3a d6 3d e2 b0 52 69 78 44 4a 24 b0 ad | 80 aa 61 eb 53 d9 1a 0a 53 30 0a eb d5 8c f7 f3 | ca 01 74 12 22 ff f3 9d 01 97 d0 63 da 1b b6 a1 | 02 35 c9 78 38 c4 96 f6 23 08 55 58 52 01 18 8c | 46 ea 56 a8 65 c1 e7 43 3b b8 d3 07 66 36 b4 14 | 25 9e f5 4d 86 46 ab 55 94 68 c7 67 da 70 2b 06 | a8 71 55 97 18 18 f9 3a 98 e0 35 83 6a 8d aa b1 | bc e1 50 ed 72 ba 83 3d 44 b6 97 eb 32 ff 41 57 | 48 97 03 67 e5 b8 1f 12 59 d4 1e 23 84 44 9b 29 | 9a 72 cd 57 ba 76 df 2f d8 46 ae e3 a7 ac 2c 37 | 29 00 00 24 f5 be bd 85 ea bf a8 35 5e 2e fb 98 | 21 e3 d9 77 11 2b 7a 24 c1 b5 1e 2f 89 52 5c d3 | bf 7f 74 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a ca 79 b0 52 c7 26 24 58 ba d7 c8 | 58 6a 36 93 64 5a 0d 23 00 00 00 1c 00 00 40 05 | 2e 8d 3a 82 9a 56 9c b7 68 e2 e0 45 0d 65 b1 99 | f9 22 bb fc | state #170 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34402a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7fec0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7fec0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #170 | libevent_malloc: new ptr-libevent@0x7fb34402a950 size 128 | #170 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49613.542042 | resume sending helper answer for #170 suppresed complete_v2_state_transition() and stole MD | #170 spent 0.356 milliseconds in resume sending helper answer | stop processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb360035930 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 3d 5a e4 33 67 ae f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #170 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #170 | rejected packet: | 0e 3d 5a e4 33 67 ae f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #170: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #155 | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #155 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #155 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49613.54624; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001175 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f0aa0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #155 | libevent_malloc: new ptr-libevent@0x7fb360035930 size 128 "road-eastnet-nonat-155" #155: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #155) | ba 2d 75 59 38 9a 40 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 2d 8b bd fb e0 3e 63 93 cb 94 a3 59 ba 66 52 | 15 4e 4f 76 34 6f 63 6c 04 46 3b 73 fd d8 a5 8e | 35 33 06 7a 8c 2a 4d a0 d2 b7 a5 ef 60 5a a8 23 | ae c6 93 50 9f f0 c3 f5 06 df 4c 45 c0 4d 3b 90 | 71 b1 18 44 3a bb 92 05 e2 cb 38 9c 05 04 9c e5 | 33 86 8c 22 6f 05 07 53 37 10 99 50 e7 0b 25 55 | 89 9d 75 47 09 a1 92 af c6 86 5d 17 e6 b3 28 20 | 26 34 0c 4e a0 b6 47 51 4c df 53 f2 97 03 03 a6 | 89 4b b3 92 4a ab b5 e2 4b 58 52 5d fc 27 cb e8 | 64 f4 d9 2f f4 95 21 72 e7 fe 03 93 84 af de ff | 1c 75 39 21 b3 f9 de 3e e2 ac 5f bb e7 9f 0c bd | 32 99 99 15 33 bb 7d f8 f9 aa 92 5a 38 4d 6d 97 | 0e 69 3d a1 d8 b7 8f 44 ed 36 63 50 f7 7e 74 d2 | 45 dc 02 6e 87 72 5d 06 c1 0c 87 2a 42 4a 0c 96 | e5 33 b2 8a 28 de 43 7b 5c 89 da 84 03 93 af 07 | 0f 41 63 be 8b 32 2d a1 13 d7 f4 a0 78 5d 7b 02 | 29 00 00 24 1b 6f 61 ca 07 05 56 47 f0 44 a9 2b | df 2e 5b cb e9 85 db 0d bf 4e 16 8e a5 b1 b6 3b | d1 6b b0 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 9d 23 9a a7 98 84 7a 80 70 0e 3e | c4 f1 43 a7 4e 6b 6b 59 00 00 00 1c 00 00 40 05 | 2e 42 b0 ef a0 75 a1 7c 37 dd 50 d1 c0 f7 e8 21 | 72 07 2b e7 | libevent_free: release ptr-libevent@0x7fb35c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #155 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 2d 75 59 38 9a 40 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #155 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #155 | rejected packet: | ba 2d 75 59 38 9a 40 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #155: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8e0 | handling event EVENT_RETRANSMIT for parent state #140 | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #140 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #140 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49613.547491; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.0021 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #140 | libevent_malloc: new ptr-libevent@0x7fb35c01d920 size 128 "road-eastnet-nonat-140" #140: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #140) | 7b af c7 ac 06 7e 5a 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 03 39 d2 09 32 a1 ff 81 2d 15 dc 96 08 01 c1 | 8e 0a 6e 33 a6 3e 74 05 5c 15 33 12 1d f7 12 20 | db f5 3e 24 ba 17 01 dc a0 95 5b 2c 7b 77 c2 3e | 02 67 33 d7 d6 86 dc 63 50 16 65 87 a1 a9 2b c2 | 68 87 45 fa 03 db 21 3c 23 cd d5 14 5d 40 bf 10 | 6f 14 34 95 51 53 c7 d5 77 b9 67 66 94 9a cd 21 | 08 bb de 59 ba ca 48 d5 21 97 e5 28 87 2d fd 83 | d2 62 24 c7 7c f8 ac 68 7a f8 c3 7f 7d 8d 72 d0 | 9d 64 ef 67 4b f1 5c 24 57 ca c2 b1 9f b6 11 d3 | 07 3e 55 51 fc 73 7a 83 2c 11 87 97 33 3d 5c cd | 48 68 02 58 27 c2 fe 9a f6 51 01 87 b5 32 4d fc | 09 2c 09 a0 1f 82 25 e8 47 96 80 8e 9d 80 b5 a7 | 86 8d 11 ad 04 69 30 3a 7c 49 92 c3 9e 7f 81 14 | 42 d8 62 ef 10 0a 21 b2 bb b9 42 01 9c 86 19 33 | dd 9b 24 b9 8a d5 68 9d ee 00 85 c1 cc df b7 34 | d9 c8 e4 31 8c bd d3 67 7d ad 51 86 db 69 96 5d | 29 00 00 24 f8 43 b0 82 a0 04 df 35 49 ed 46 83 | 05 44 45 f4 4f f6 f3 e1 63 59 5a aa 3f 59 d1 20 | a6 81 b5 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a 8e a2 d1 63 df 73 41 77 f0 6a b9 | 17 c7 13 b6 69 6d 12 29 00 00 00 1c 00 00 40 05 | a8 9c d4 0d d7 3c af a8 56 f5 ab f4 4f 7a 90 fd | 96 a4 e3 47 | libevent_free: release ptr-libevent@0x7fb3540300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8e0 | #140 spent 0.0911 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7b af c7 ac 06 7e 5a 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #140 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #140 | rejected packet: | 7b af c7 ac 06 7e 5a 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #140: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0511 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a84000 | handling event EVENT_RETRANSMIT for parent state #163 | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #163 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #163 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49613.56975; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501207 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e8820 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #163 | libevent_malloc: new ptr-libevent@0x7fb3540300e0 size 128 "road-eastnet-nonat-163" #163: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #163) | b1 c1 5c f9 4d 0c 91 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 d1 ee ef 57 4d b8 a5 18 99 63 b7 ad a0 31 43 | d2 4c 84 95 c1 56 d8 c2 a0 e0 21 45 55 6c 89 41 | 0a ee 26 bb ae 9b 55 18 51 40 94 3e b5 e8 52 b3 | f5 21 f9 c6 39 17 43 69 05 cf af ff e3 2c 05 76 | 7f cc d0 9f 70 3b df 95 16 de 0c 79 98 56 e5 a0 | 35 3e 81 89 f8 f4 57 f4 b0 38 84 5c 5c 95 c5 75 | db 5d ff 22 a3 04 68 2a 25 a8 ca 43 e9 88 c1 c7 | f1 52 93 65 ec 22 3d 52 6b b8 00 65 57 c2 e3 a8 | 9e 23 a1 b2 55 fc 9b 13 25 aa af 20 21 98 a7 a2 | 67 94 3b 2e 91 84 12 14 99 be b3 af 12 1e 8a 45 | f6 79 09 3e 9e e8 3f fa a3 e8 99 22 6f d9 b8 e7 | 13 bd 62 da a2 36 db a1 c0 b9 40 6d 4f e4 fd e0 | be a7 dc c7 36 bf 14 ea 84 eb 4f 8e 85 9d 9c de | 91 8b 80 a4 7b dc e6 20 7f bc ce 40 33 ff 25 de | 32 53 56 b7 10 56 66 76 3f 7a e3 c4 c5 0e a7 df | 21 e3 47 1d 5c 2e 41 54 d0 87 c6 c9 9f 14 d5 5a | 29 00 00 24 cf 96 ac 26 a7 c4 21 b6 9b dc fc 7a | 6b 63 82 8c ca 2e ba 40 54 d7 a8 1f 94 42 b0 f9 | 02 a1 4a 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 05 f9 8b c8 3a 1a ac 16 65 f3 b7 | 0f 08 b9 7b 40 ca e7 92 00 00 00 1c 00 00 40 05 | 34 4b bc c5 91 2d b9 5e a5 87 8c 3c 9e 2e e2 11 | d1 e0 38 4e | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a84000 | #163 spent 0.128 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 c1 5c f9 4d 0c 91 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #163 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #163 | rejected packet: | b1 c1 5c f9 4d 0c 91 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #163: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0563 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a15810 | handling event EVENT_RETRANSMIT for parent state #111 | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #111 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #111 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49613.583048; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003644 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #111 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 "road-eastnet-nonat-111" #111: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #111) | db b9 51 1a 0a cf 53 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 96 48 dc 9a 43 6a d5 ae 03 52 b4 84 8e 3e 89 | 00 f6 64 fe 26 5b b6 db 11 e1 9c 06 8a 4f 1d 0d | cd 6f a7 c8 64 23 7a a7 23 6f 45 51 c6 b1 a2 cd | 04 59 b4 88 b4 33 b7 f5 29 c7 d8 52 6d 1c cb a8 | 42 75 af 22 25 ca 35 12 a4 f6 ac 0c 2b 80 3f 01 | bd fa ce f1 3e 58 78 41 9a d7 72 cc 7c 4c b5 a2 | 56 ce 00 40 9d 2a 87 6a d3 b8 b7 fb 45 19 d9 27 | 33 38 86 30 4d 76 55 5a 60 ea 7e 6f 94 b2 e8 37 | d0 79 a6 3c 48 bb 9f d4 de 11 46 70 8b ed 34 0e | 15 56 a1 c3 7c 1c f5 7b 9a 67 eb 7c ed e1 17 20 | 66 f5 ab 00 0b 09 22 9e 86 9e ea d1 22 bb 69 09 | 19 11 1b ae 5d 6f a7 6f aa f4 bc 2d bf a0 df 13 | 3d bb c4 b2 54 23 e0 47 22 8c a9 37 14 2d 77 13 | 46 7b e2 07 7c 12 26 7e 27 76 b7 f9 5b 81 4d b4 | 81 97 8e fa 60 cb 4d fd c3 c9 15 c0 dd 03 c9 a5 | 4e ed a7 b5 aa a5 47 31 bc c5 72 e4 a7 3b 8a 6d | 29 00 00 24 dd ff c8 1b e8 28 de a6 83 fb aa 57 | 7e 6e 8e c5 12 ea 53 ce c6 ab e5 e4 50 89 14 5a | d7 45 05 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 7b fa 07 36 ff 6e 35 97 9c d7 f0 | 58 a3 9d ce 15 df 78 68 00 00 00 1c 00 00 40 05 | 32 ea 3f b0 b0 6d 1e bd 58 89 67 45 00 2c 5a 38 | ea f9 ac 8b | libevent_free: release ptr-libevent@0x7fb3440180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a15810 | #111 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db b9 51 1a 0a cf 53 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #111 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #111 | rejected packet: | db b9 51 1a 0a cf 53 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #111: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61bd0 | handling event EVENT_RETRANSMIT for parent state #58 | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #58 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #58 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49613.595363; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004301 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a15810 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #58 | libevent_malloc: new ptr-libevent@0x7fb3440180b0 size 128 "road-eastnet-nonat-58" #58: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #58) | 0b a9 81 95 1f 0d 8e 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f b0 e3 df ce d1 d0 b9 30 6e 16 b3 e7 cf 92 e5 | a6 70 0e 23 5e 02 05 19 f5 b5 1a 04 6c 5e 7d a2 | 79 25 aa 0e 70 2a 25 1f 1c 02 b5 fc b9 3e 75 ad | e7 1e f1 8c 9c 7f 92 92 1d dc b1 ca 6d cf 53 ac | b8 0b 70 9b 2c 6a e7 8d 07 95 ae e1 37 ab ac 14 | 91 d8 79 4c ef 08 d0 d9 b0 55 82 09 5f 15 d9 df | e8 2c 4e cb ea a0 59 1c 81 c7 f6 39 0a 52 62 8e | 4b 57 28 22 1f d7 52 eb ec 16 d8 46 16 0a 27 88 | c7 c5 f7 e2 87 71 a1 2d 5e 9c 25 83 70 f1 a8 0c | df 63 58 3a 6f ba 9a fc 71 ac 13 82 0c ff 96 f7 | b2 3e 0f af a2 df f1 69 8f db ce 47 13 89 8f fd | ce 0a 15 3f 64 ea 8f f4 c7 b7 5e 3b b0 17 0a 90 | ef 23 ff a9 81 27 7d 7c ee 7a 36 7f 56 c1 b8 52 | 77 69 e0 69 4b 05 7c e7 a7 d2 48 f2 eb ac 08 c4 | 5f 9f b5 9e fc d5 98 d0 41 7f 9b ec 07 64 d8 f7 | 80 37 a2 97 6c ab e1 aa b4 48 78 11 a3 f3 d8 0a | 29 00 00 24 dd 82 37 0e 6e 7f fd 43 0e f6 0a 6a | 68 bc 25 88 0a 9e 3e 74 64 09 ae e7 87 f2 db fe | 06 d2 df 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 02 ef 4d 47 45 3b d6 d5 d7 fa ad | b5 dd 5d f9 98 95 75 30 00 00 00 1c 00 00 40 05 | 0c 06 c0 09 b1 a9 53 e2 00 18 ae 12 95 c7 71 d4 | 78 09 4b e3 | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61bd0 | #58 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b a9 81 95 1f 0d 8e 78 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #58 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #58 | rejected packet: | 0b a9 81 95 1f 0d 8e 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #58: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-171" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-171' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #171 at 0x557d46abdc80 | State DB: adding IKEv2 state #171 in UNDEFINED | pstats #171 ikev2.ike started | Message ID: init #171: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #171: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #171; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-171" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-171" IKE SA #171 "road-eastnet-nonat-171" "road-eastnet-nonat-171" #171: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-171 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-171": constructed local IKE proposals for road-eastnet-nonat-171 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 171 for state #171 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a61bd0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #171 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 | #171 spent 0.149 milliseconds in ikev2_parent_outI1() | crypto helper 16 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 starting work-order 171 for state #171 | RESET processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 171 | RESET processing: connection "road-eastnet-nonat-171" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.241 milliseconds in whack | timer_event_cb: processing event@0x557d46a67370 | handling event EVENT_RETRANSMIT for parent state #141 | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #141 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #141 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49613.610828; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003102 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8e0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #141 | libevent_malloc: new ptr-libevent@0x7fb34c0180b0 size 128 "road-eastnet-nonat-141" #141: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #141) | c7 a4 5e d6 85 96 e8 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 5c 64 85 22 7f 26 67 9b 1d d2 dc 77 48 35 3a | d4 3f ae a5 de d9 02 e1 be b1 54 1d 8f 3c 81 66 | 72 af 44 35 86 52 1f 94 d8 67 4f d5 3d aa 9a 28 | b8 7d b2 44 cd ad e4 36 73 fc b7 ff a8 f3 fa 52 | bc bb ec ae b0 14 24 28 e8 98 61 c7 6e 10 46 be | 9e 1b d1 62 7d 6b 63 8d 57 98 39 e0 7a 2b d7 fb | 08 85 91 84 64 96 ca 9e 7d d6 44 71 24 e2 7b d9 | 4e df 37 ef 69 35 3e bf d9 e6 0c fe 44 26 04 4e | f0 05 82 74 b2 9b 24 5e e9 a2 22 8d 25 f4 83 56 | 66 7a 36 9b c2 83 bb 7e 03 9c 77 3b 87 eb 41 c7 | 94 78 c3 88 92 ee d7 85 b7 c9 76 9d e6 b0 56 99 | 3c 23 e2 55 4e f4 22 8d 17 30 9c c5 cd a0 fa a5 | 54 c0 8e f4 5a 2c 24 46 f9 7c 1e 86 1f 7b 3c ed | d6 ba ae a7 70 a2 9b 24 e8 02 bd 30 c2 66 66 44 | 25 e0 d1 5b fc c6 60 e2 9a 7f 9c 7f d3 c2 d2 0d | 71 6b ce d7 9c d1 77 52 aa 1f 4c 8a aa 84 99 be | 29 00 00 24 77 e9 14 43 da cb a0 62 0a e5 af ee | ca 47 6a 87 48 66 6e 70 1f 90 c9 e8 b5 aa eb 33 | 74 97 4a b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 5f b0 2c dc 05 ab ba 7d 8f a9 67 | 57 cd cc b4 50 46 52 bd 00 00 00 1c 00 00 40 05 | 25 fc 66 29 f4 e3 aa bf a8 61 5f 67 dd d5 39 f5 | bb 8c 0c c1 | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a67370 | #141 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 a4 5e d6 85 96 e8 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #141 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #141 | rejected packet: | c7 a4 5e d6 85 96 e8 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #141: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0744 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 171 time elapsed 0.000683 seconds | (#171) spent 0.651 milliseconds in crypto helper computing work-order 171: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 171 for state #171 to event queue | scheduling resume sending helper answer for #171 | libevent_malloc: new ptr-libevent@0x7fb364035750 size 128 | crypto helper 16 waiting (nothing to do) | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #156 | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #156 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #156 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49613.61146; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000903 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a986c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #156 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 "road-eastnet-nonat-156" #156: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #156) | dd 32 b7 34 a5 67 d1 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 58 47 50 60 00 e3 2a ab 04 ac a5 14 a4 e1 f8 | 89 44 71 9e b6 e2 f8 e1 89 a3 38 1e eb a4 57 9b | c0 92 a7 d8 d8 8c 0f 8c f9 d0 36 f7 8d 04 cc a1 | 61 5a bc bb 35 d5 16 ad 1c 27 3b fa 1b a3 4f 77 | 4e 80 47 b0 e1 83 82 b2 b5 df c4 bc d9 8d 01 04 | 4e b5 a6 60 d4 4f b3 0f 13 49 05 d9 85 5d f8 18 | 24 40 91 d1 3d 7e 6a 98 45 d7 dd 05 70 e0 c6 57 | c1 84 e8 77 d6 e2 7f 57 50 49 e0 f2 9f b0 43 93 | be 02 be f3 99 3a 02 72 36 17 a3 a7 b6 d3 1e 0b | e7 53 c6 c9 cc d5 25 75 87 c0 73 6c 5f 57 27 d6 | 52 91 24 4a 97 d3 d6 0e af 8d 6c 52 24 2d ea 91 | a1 73 e1 9e 71 14 d1 4f eb 25 67 a3 b8 12 64 b9 | 8a 15 3f 88 bc 65 32 65 96 0c ff f7 b9 a7 84 11 | bd 40 10 e1 dc 1a 04 fe 8c 35 23 2a ec b7 33 72 | 4b f4 4a e9 9d f1 da a3 b6 9c fe 09 27 14 3a 79 | 5d 82 c7 e0 9b d4 a3 ce 53 68 f7 6f b3 06 c9 71 | 29 00 00 24 b7 44 fe 38 00 43 d3 2b ff 97 13 ca | 89 7c c3 ed e0 15 4d 76 12 7b b9 2f 48 9b b5 b3 | 8b 4d ce 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 13 6e 65 76 b7 ef f6 88 e7 f3 9e | f3 f9 5a bb 01 8b 91 4f 00 00 00 1c 00 00 40 05 | 4f 93 4d ef 0e 69 28 8b f3 02 75 93 a5 b3 16 9b | e0 c9 4b 18 | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | #156 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #171 | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 171 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #171 | **emit ISAKMP Message: | initiator cookie: | 60 ea a0 b8 11 41 67 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-171 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 87 a6 a0 3d a3 d3 f7 3a 92 38 69 11 fc c0 0a e6 | ikev2 g^x ae 99 13 7e 46 80 4c 8f eb cb 1b a4 6d 5c fc 08 | ikev2 g^x ec 45 f4 48 c3 e3 73 a8 1a d3 f7 7f 3a 28 95 0f | ikev2 g^x b3 2e 82 89 be a5 d3 a6 ab 70 83 ad 3e e2 73 a1 | ikev2 g^x 73 7c b9 be d5 96 dd de 07 cc fe da 6e 65 6b 76 | ikev2 g^x 25 27 16 21 7c ef 70 24 a4 77 29 aa 15 d7 7b a8 | ikev2 g^x 16 72 3e d5 01 58 3c 97 7b 78 28 15 2b 7d 70 03 | ikev2 g^x 64 96 9b 75 19 62 f5 2d d6 23 a9 0d ca a5 9a 70 | ikev2 g^x a6 bd cc 03 9b 58 60 ee fc 9f 9e d6 00 fa 23 02 | ikev2 g^x 63 d3 b6 b9 2c b8 b0 66 04 8e 85 03 2d 8a 3b 14 | ikev2 g^x f1 66 74 61 f6 ab 2b 8f f8 31 4b 0b da 07 ed 98 | ikev2 g^x a3 08 1a 85 f1 f2 be 38 18 37 9b 13 eb 17 a9 c3 | ikev2 g^x c0 a5 db c8 dd 9c 88 27 54 50 ba 9a 47 c0 2c 00 | ikev2 g^x d1 c4 c3 04 be b5 8f d9 f7 25 9c ae 45 27 ee 47 | ikev2 g^x a2 c2 11 cc 79 aa fd 06 ae ea 3a 65 e0 36 c3 05 | ikev2 g^x dd d3 e2 dd c1 bd 1f da b7 d1 ff 87 93 0f c5 00 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f4 77 f4 2a e1 ad 87 d1 e0 b8 f3 03 93 45 a7 36 | IKEv2 nonce 54 7e 24 81 6c 5d 13 c9 3a 4c ab c2 28 19 06 22 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 60 ea a0 b8 11 41 67 62 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ab | natd_hash: port= 01 f4 | natd_hash: hash= 09 9a 54 5d 74 7c 3e 57 ce 44 f1 6a b5 dc 40 d6 | natd_hash: hash= fc 98 8f 10 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 09 9a 54 5d 74 7c 3e 57 ce 44 f1 6a b5 dc 40 d6 | Notify data fc 98 8f 10 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 60 ea a0 b8 11 41 67 62 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ab ff fc 00 2d 34 de 32 ad 3a 53 9d f5 35 ab 6e | natd_hash: hash= 4f ce 82 8b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ab ff fc 00 2d 34 de 32 ad 3a 53 9d f5 35 ab 6e | Notify data 4f ce 82 8b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #171 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #171: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #171 to 4294967295 after switching state | Message ID: IKE #171 skipping update_recv as MD is fake | Message ID: sent #171 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-171" #171: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.171:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #171) | 60 ea a0 b8 11 41 67 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 a6 a0 3d a3 d3 f7 3a 92 38 69 11 fc c0 0a e6 | ae 99 13 7e 46 80 4c 8f eb cb 1b a4 6d 5c fc 08 | ec 45 f4 48 c3 e3 73 a8 1a d3 f7 7f 3a 28 95 0f | b3 2e 82 89 be a5 d3 a6 ab 70 83 ad 3e e2 73 a1 | 73 7c b9 be d5 96 dd de 07 cc fe da 6e 65 6b 76 | 25 27 16 21 7c ef 70 24 a4 77 29 aa 15 d7 7b a8 | 16 72 3e d5 01 58 3c 97 7b 78 28 15 2b 7d 70 03 | 64 96 9b 75 19 62 f5 2d d6 23 a9 0d ca a5 9a 70 | a6 bd cc 03 9b 58 60 ee fc 9f 9e d6 00 fa 23 02 | 63 d3 b6 b9 2c b8 b0 66 04 8e 85 03 2d 8a 3b 14 | f1 66 74 61 f6 ab 2b 8f f8 31 4b 0b da 07 ed 98 | a3 08 1a 85 f1 f2 be 38 18 37 9b 13 eb 17 a9 c3 | c0 a5 db c8 dd 9c 88 27 54 50 ba 9a 47 c0 2c 00 | d1 c4 c3 04 be b5 8f d9 f7 25 9c ae 45 27 ee 47 | a2 c2 11 cc 79 aa fd 06 ae ea 3a 65 e0 36 c3 05 | dd d3 e2 dd c1 bd 1f da b7 d1 ff 87 93 0f c5 00 | 29 00 00 24 f4 77 f4 2a e1 ad 87 d1 e0 b8 f3 03 | 93 45 a7 36 54 7e 24 81 6c 5d 13 c9 3a 4c ab c2 | 28 19 06 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 9a 54 5d 74 7c 3e 57 ce 44 f1 6a | b5 dc 40 d6 fc 98 8f 10 00 00 00 1c 00 00 40 05 | ab ff fc 00 2d 34 de 32 ad 3a 53 9d f5 35 ab 6e | 4f ce 82 8b | state #171 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a61bd0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #171 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 | #171 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49613.612078 | resume sending helper answer for #171 suppresed complete_v2_state_transition() and stole MD | #171 spent 0.455 milliseconds in resume sending helper answer | stop processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb364035750 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd 32 b7 34 a5 67 d1 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #156 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #156 | rejected packet: | dd 32 b7 34 a5 67 d1 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #156: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 60 ea a0 b8 11 41 67 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #171 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #171 | rejected packet: | 60 ea a0 b8 11 41 67 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #171: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.053 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a60690 | handling event EVENT_RETRANSMIT for parent state #164 | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #164 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #164 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49613.631348; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499811 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #164 | libevent_malloc: new ptr-libevent@0x7fb364035750 size 128 "road-eastnet-nonat-164" #164: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #164) | 44 ec da ac e4 4e 81 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 94 19 dd 63 76 e7 8b e4 83 63 43 89 b2 25 2d | cf 02 f9 4f bb e0 9f 71 73 45 f7 70 9f f0 9c 56 | 36 6b be c1 42 fc 0e 64 e7 c2 6d 24 a0 c6 36 60 | f7 b6 44 63 1f f0 38 ff c1 f7 6f 09 6f 4b 15 6f | 4b a9 13 86 3c 04 b4 e0 2d 41 b8 5f 44 ac d3 1c | 62 7f f8 b0 79 c8 65 ec 61 21 a8 52 27 b3 79 db | 53 67 7e 4f 89 b2 45 b9 ee 3a 63 76 a6 cd 73 36 | 58 41 37 8e 8c 8a ef d6 60 54 ff 74 54 a2 07 6a | 56 54 10 22 af 8e 9e 38 af 48 a8 f2 42 f1 a6 05 | c8 55 0c 92 44 27 a3 4d be a5 b4 50 92 f3 bb 45 | b6 87 15 6c 92 a5 f1 21 ba 44 19 05 5c 4c f2 dd | 7d 64 1c 49 e3 61 8b 21 2c ef 63 14 91 93 e6 e8 | 84 82 9f 30 40 50 49 82 eb b8 19 d0 b6 4a c4 be | 05 18 e6 9d 08 3f bb c7 7a 98 44 e5 42 f9 eb fa | fc 80 53 22 fc 7c b9 e3 92 39 dd 88 61 10 2d 74 | 06 8e 96 3a 48 45 58 41 40 85 53 83 03 19 1d 49 | 29 00 00 24 e5 04 5f 5d b9 93 eb b6 f3 88 8f 81 | b6 50 c2 5a e0 91 27 94 ef 3b 1e 82 c9 33 1d 99 | 72 cc f9 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 cd 86 69 c3 fa 02 39 bf fc f5 08 | 1b bd f9 dc 60 39 91 12 00 00 00 1c 00 00 40 05 | 76 11 49 93 b0 52 97 cc bc 0b 84 d2 15 33 08 b4 | 9a f9 d3 5b | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a60690 | #164 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ec da ac e4 4e 81 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #164 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #164 | rejected packet: | 44 ec da ac e4 4e 81 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #164: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34000d120 | handling event EVENT_RETRANSMIT for parent state #112 | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #112 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #112 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49613.643704; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003898 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a60690 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #112 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 "road-eastnet-nonat-112" #112: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #112) | 47 d5 03 db 13 27 2f b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 0e 6c 25 08 df e6 da 49 14 54 03 50 04 cf 48 | 95 75 ae 2d bc 03 6f 48 b8 d7 01 38 b0 30 90 fc | ff e3 c7 81 96 6b 61 34 0c 60 d4 12 f5 e2 2d fc | 51 c2 f0 8d 66 50 fb 99 8e e7 b2 7a 6c 96 47 68 | b2 95 cc 13 0e 51 31 7d 67 b6 95 35 7a 36 fb 65 | 99 b0 0f 89 29 13 5d 90 12 37 2d 11 35 2d b1 44 | 94 62 9d e9 25 b3 9d a0 a4 a6 21 f1 2f 1e cd 7c | e1 45 a8 9a 87 d2 53 e3 a2 32 e1 24 cf d4 84 b6 | d5 f2 14 94 09 c7 86 4b f6 5c 13 c3 cd 16 8e 96 | 09 f6 db 84 7c 68 6c 48 a7 94 92 3a 1f dd 75 5e | 2c 36 f1 6f 81 03 42 93 73 6d a8 a1 de b3 ee 78 | 53 dc 84 4e 49 9c c8 3c d2 8e 9e 10 6c e7 28 b0 | 11 a3 fb e6 6e 4d e5 e0 87 56 00 b9 8b bd 7a 34 | c7 01 93 2c df ea 24 e3 c0 b7 3c 4f 9c fd 99 11 | 44 90 bc 5c 8f 0c c6 10 b3 66 24 ea 61 81 fc 7a | 33 5f 5b b7 cd 2f 8e 95 d1 b4 0b d4 4c f2 ce 45 | 29 00 00 24 e0 34 a3 40 45 a9 39 5f c9 a9 a0 f5 | 90 bc 5f 96 21 2e 5a ab 31 ef 27 59 8c 9d b8 53 | c4 51 4a f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 19 b7 b4 22 31 1f 00 af ac cd cc | 10 5d a8 e7 0a 7e 75 3d 00 00 00 1c 00 00 40 05 | 93 2a 52 65 d2 92 1c 7e fa c3 8c df bd 81 85 07 | 8f 9c 4c 85 | libevent_free: release ptr-libevent@0x7fb340012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000d120 | #112 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 d5 03 db 13 27 2f b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #112 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #112 | rejected packet: | 47 d5 03 db 13 27 2f b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #112: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a49450 | handling event EVENT_RETRANSMIT for parent state #59 | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #59 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #59 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49613.658987; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005516 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #59 | libevent_malloc: new ptr-libevent@0x7fb340012840 size 128 "road-eastnet-nonat-59" #59: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #59) | 97 6c 3a 75 a9 04 c6 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 c8 5b 92 1f 75 89 eb 0e 2e 34 19 de c9 7d 34 | 18 5b 4b 86 10 db bf e2 6c 1e 94 2d 7a 7d c9 7a | a0 2b b5 06 7b 90 f1 d3 cd af 0e 61 7b ec c3 64 | de a5 53 e3 bf 5e 51 d1 84 95 1f 6e cb 81 61 93 | ad 42 3a 9f 1e 3a 65 25 36 02 e8 9c 31 54 18 98 | 6f 55 90 5b bf 33 e8 09 e2 db 7f a5 0d 28 2f b0 | 76 e2 e4 a4 df b5 68 69 d1 19 fe bd 73 f2 f2 54 | 46 48 bd 1c fd b1 5e e2 cc c0 6c c9 e5 04 1c 0c | 40 92 81 c8 73 67 1a af d8 5e 9b 4f 61 bb 61 8c | a9 de 42 09 33 14 9f 91 4f 50 01 94 4d 87 81 f8 | a7 b9 37 9b 88 d2 60 21 55 19 56 c4 fc 7d e4 11 | 28 74 cf ae 93 f1 51 10 2e 23 31 34 07 b8 e7 37 | a3 5e 4c 95 61 50 f9 d4 96 86 63 2e 49 88 c6 44 | 13 5e 5b c4 2d 0c 65 06 af 27 76 b6 3c bb 87 1b | d8 ae 43 ad 30 39 b0 94 f9 53 b3 ee d3 35 1d 60 | 44 54 ef 8a f8 7d 13 88 d2 f8 8c df 8f 77 8c e4 | 29 00 00 24 b8 98 0c 82 63 7c e1 4a 6e 4e 96 76 | c9 de 50 23 14 2c 80 d9 d0 99 72 c2 8b e9 f8 32 | 80 1a 11 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 09 60 c9 a8 1a 7b a4 38 cc f7 74 | 87 5e fa dc 42 53 d3 c5 00 00 00 1c 00 00 40 05 | a9 7a 6a af 06 6a 57 69 21 03 39 50 4a 98 de 11 | 5d 3e 78 2b | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a49450 | #59 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 6c 3a 75 a9 04 c6 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #59 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #59 | rejected packet: | 97 6c 3a 75 a9 04 c6 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #59: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c7c0 | handling event EVENT_RETRANSMIT for parent state #142 | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #142 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #142 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49613.673337; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003624 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a49450 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #142 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 "road-eastnet-nonat-142" #142: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #142) | 41 39 64 14 10 77 e9 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc f2 be 7b 98 10 67 76 c4 71 20 94 23 de f4 7b | f8 c4 af 24 ce 1c a4 2e 78 f9 2e 3f 92 4d 95 da | b0 24 e9 98 5b 94 79 3a a7 65 db 91 8d 98 6f 60 | 39 37 f9 9a 0b 2c 5f 0f 2f ab bc 06 c4 26 ad 3a | cb 21 02 45 52 b2 d1 fd f5 7c fc a1 d2 ea 0e b1 | ba 62 e9 1e b2 ad cc 0d 27 c3 3b 69 ca 23 50 32 | eb 22 0c cc d3 fb 5f db 9c 9b 31 50 db f4 03 47 | 71 96 ad b4 c6 fc 17 71 7e b3 b0 ab 55 4f e2 51 | da 27 48 0f fb 5a 5c 14 f2 9f a1 0b bc 57 8c f8 | af d3 b0 d4 6a 72 47 34 c3 ab 52 90 fc 49 ad 86 | 46 90 a0 10 2b fd 92 3d 6b 38 ac d2 f1 fb fa a7 | 40 39 9e cd 87 10 91 66 2e ab 47 10 a6 88 c0 52 | d8 c9 3f b4 b3 d0 6c 91 b2 0e 49 7c 2a dc 94 d8 | 21 4c c9 df 3c b1 a2 d4 d4 f0 4b 25 d9 08 87 46 | 22 c7 0a 5a cc 6c a2 0b 4a 09 99 09 fb f2 2e 33 | 66 ad 2f c0 16 9e 3c 6f 99 46 27 79 f7 75 88 d3 | 29 00 00 24 1d 1b 1c 65 cb f5 ff f0 c9 00 69 e9 | d1 b3 22 15 24 4a 7b cc a6 4c 2e 0b ef 42 21 b2 | d1 d6 06 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 3a fc 83 97 ab 17 41 58 12 a1 f9 | 48 2f 13 f0 7a 91 16 3d 00 00 00 1c 00 00 40 05 | 13 50 5d f0 78 ea 60 59 51 2f a8 23 2c 7c d0 1f | 4c a0 b1 5b | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | #142 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 39 64 14 10 77 e9 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #142 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #142 | rejected packet: | 41 39 64 14 10 77 e9 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #142: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #157 | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #157 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #157 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49613.676681; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001535 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #157 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 "road-eastnet-nonat-157" #157: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #157) | 58 3c 05 73 d3 10 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 16 05 06 2f 3b 22 9e 88 08 ab fe 29 25 f8 32 23 | d0 15 af d8 5f 65 e8 be c6 03 98 0f 18 e5 00 77 | 99 86 03 c7 fc 1b e8 83 43 61 ba 00 0c dc 29 59 | 0d fd 85 a1 75 5e f3 f7 d2 64 26 3b e1 11 43 3a | 94 43 08 73 30 5e 1d 91 aa 8f 9d c1 5c 52 ae c1 | 1d 90 3b cb 44 47 58 f3 40 38 01 58 63 65 29 32 | b6 4a 78 a5 71 58 c1 30 ea 73 8e 14 71 72 8e df | ee 45 ee f6 d2 a7 99 89 1c 7b fc 81 aa fe 75 bb | 36 cb a8 81 eb 73 7b eb 5a e7 fa 6d e5 b4 95 b2 | be 54 f3 23 c2 44 23 4a b5 30 87 1d 26 24 c6 c4 | 6b d1 5d 1a 24 7a 69 b5 9b 7f 97 17 e0 18 0f 6f | 1f f9 f1 e8 6c 46 2c d8 28 aa 7c 1d ec ed d6 d3 | b6 eb c6 eb 3b 55 59 5b 10 23 06 f1 f2 aa 19 3c | 8e ca 99 c8 e5 ba 47 04 47 84 62 13 96 06 08 0d | 88 7a a1 63 08 7b df 84 fd 48 36 29 3e 5c 44 7d | 05 23 1e 33 96 d8 b6 34 ea b3 94 6e cc d2 07 97 | 29 00 00 24 a9 6f a2 6f e4 cf 6b 0e 7b b9 69 24 | 56 3d ee de fe c6 39 89 8e 14 c9 0f 9e 2f 60 95 | f7 4e c6 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 bf ce be 86 a6 d7 14 f3 ba 0e 49 | ee d2 d5 26 4c 2e 13 18 00 00 00 1c 00 00 40 05 | 0a 36 59 95 a8 fb 5c 3b ea 04 70 de 29 72 15 40 | a3 00 f6 34 | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | #157 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 3c 05 73 d3 10 8c 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #157 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #157 | rejected packet: | 58 3c 05 73 d3 10 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #157: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-172" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-172' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #172 at 0x557d46abf240 | State DB: adding IKEv2 state #172 in UNDEFINED | pstats #172 ikev2.ike started | Message ID: init #172: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #172: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #172; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-172" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-172" IKE SA #172 "road-eastnet-nonat-172" "road-eastnet-nonat-172" #172: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-172 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-172": constructed local IKE proposals for road-eastnet-nonat-172 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 172 for state #172 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c00d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #172 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 | #172 spent 0.144 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-172" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.214 milliseconds in whack | crypto helper 4 resuming | crypto helper 4 starting work-order 172 for state #172 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 172 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 172 time elapsed 0.001121 seconds | (#172) spent 1 milliseconds in crypto helper computing work-order 172: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 172 for state #172 to event queue | scheduling resume sending helper answer for #172 | libevent_malloc: new ptr-libevent@0x7fb358035930 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #172 | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 172 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #172 | **emit ISAKMP Message: | initiator cookie: | 47 43 39 2e 38 d9 e4 43 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-172 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 58 65 17 b4 48 89 eb 1e b2 78 b8 1e 15 3a 4a a1 | ikev2 g^x a2 3a fd 43 76 59 59 a1 75 7a 16 45 66 68 dc 97 | ikev2 g^x f3 bc ee bc d4 e0 57 41 47 eb 59 3e b3 f4 36 c1 | ikev2 g^x 10 8f 59 fc 57 3a 37 29 71 bf ce 33 91 c2 37 65 | ikev2 g^x 5c 9c 9f 71 6e b0 1d 6c 6c ed 90 b3 bd fc 22 6b | ikev2 g^x 94 91 98 6d a1 2f c5 a8 ca 58 04 fa 18 79 03 0a | ikev2 g^x 3e 27 a9 a6 f4 08 b2 f5 32 35 e8 b7 83 a3 4b c7 | ikev2 g^x 82 d2 5d ed b4 7c af 9d be b8 23 49 75 bb 7f 62 | ikev2 g^x 0e b3 38 1c ec 9d 39 3b f4 04 b7 d0 93 52 70 e6 | ikev2 g^x 23 bb 4d 7f 7c 2a 5e ec cb 0d 74 24 7b 07 99 42 | ikev2 g^x 6c 43 eb 64 ec ce f6 41 88 91 d0 50 22 25 43 54 | ikev2 g^x aa b8 db 3d b2 e3 bd ee 47 71 69 be 83 a3 d8 90 | ikev2 g^x 99 79 30 84 6a ac 04 1b 20 13 06 10 f1 e1 43 b3 | ikev2 g^x 50 14 89 62 82 b4 57 81 1e 80 23 23 72 24 b5 3b | ikev2 g^x 66 27 db 5a d9 e0 9f 07 96 df 6b d0 43 88 1d 6c | ikev2 g^x 19 73 59 ba d5 80 1f b5 38 2f da 5f 85 a1 ce d0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 54 d0 27 67 15 cd c6 d9 d3 f4 1c e0 4e b2 db 81 | IKEv2 nonce 71 2f 53 78 96 2e b8 d9 e9 fc be ad 28 73 0e 23 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 47 43 39 2e 38 d9 e4 43 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ac | natd_hash: port= 01 f4 | natd_hash: hash= eb 71 7f 76 8f b4 09 cb 9b d9 d3 22 dc b5 61 93 | natd_hash: hash= 71 75 88 d5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data eb 71 7f 76 8f b4 09 cb 9b d9 d3 22 dc b5 61 93 | Notify data 71 75 88 d5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 47 43 39 2e 38 d9 e4 43 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= df a3 69 ab bf ad 58 61 9f ed 54 03 7c e8 ac 70 | natd_hash: hash= c8 e7 d2 fb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data df a3 69 ab bf ad 58 61 9f ed 54 03 7c e8 ac 70 | Notify data c8 e7 d2 fb | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #172 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #172: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #172 to 4294967295 after switching state | Message ID: IKE #172 skipping update_recv as MD is fake | Message ID: sent #172 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-172" #172: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.172:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #172) | 47 43 39 2e 38 d9 e4 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 65 17 b4 48 89 eb 1e b2 78 b8 1e 15 3a 4a a1 | a2 3a fd 43 76 59 59 a1 75 7a 16 45 66 68 dc 97 | f3 bc ee bc d4 e0 57 41 47 eb 59 3e b3 f4 36 c1 | 10 8f 59 fc 57 3a 37 29 71 bf ce 33 91 c2 37 65 | 5c 9c 9f 71 6e b0 1d 6c 6c ed 90 b3 bd fc 22 6b | 94 91 98 6d a1 2f c5 a8 ca 58 04 fa 18 79 03 0a | 3e 27 a9 a6 f4 08 b2 f5 32 35 e8 b7 83 a3 4b c7 | 82 d2 5d ed b4 7c af 9d be b8 23 49 75 bb 7f 62 | 0e b3 38 1c ec 9d 39 3b f4 04 b7 d0 93 52 70 e6 | 23 bb 4d 7f 7c 2a 5e ec cb 0d 74 24 7b 07 99 42 | 6c 43 eb 64 ec ce f6 41 88 91 d0 50 22 25 43 54 | aa b8 db 3d b2 e3 bd ee 47 71 69 be 83 a3 d8 90 | 99 79 30 84 6a ac 04 1b 20 13 06 10 f1 e1 43 b3 | 50 14 89 62 82 b4 57 81 1e 80 23 23 72 24 b5 3b | 66 27 db 5a d9 e0 9f 07 96 df 6b d0 43 88 1d 6c | 19 73 59 ba d5 80 1f b5 38 2f da 5f 85 a1 ce d0 | 29 00 00 24 54 d0 27 67 15 cd c6 d9 d3 f4 1c e0 | 4e b2 db 81 71 2f 53 78 96 2e b8 d9 e9 fc be ad | 28 73 0e 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 71 7f 76 8f b4 09 cb 9b d9 d3 22 | dc b5 61 93 71 75 88 d5 00 00 00 1c 00 00 40 05 | df a3 69 ab bf ad 58 61 9f ed 54 03 7c e8 ac 70 | c8 e7 d2 fb | state #172 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c00d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #172 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 | #172 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49613.679817 | resume sending helper answer for #172 suppresed complete_v2_state_transition() and stole MD | #172 spent 0.472 milliseconds in resume sending helper answer | stop processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb358035930 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 43 39 2e 38 d9 e4 43 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #172 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #172 | rejected packet: | 47 43 39 2e 38 d9 e4 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #172: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf50 | handling event EVENT_RETRANSMIT for parent state #165 | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #165 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #165 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49613.699021; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500549 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a67370 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #165 | libevent_malloc: new ptr-libevent@0x7fb358035930 size 128 "road-eastnet-nonat-165" #165: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #165) | 84 89 ec 12 36 85 f6 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 64 07 de ac 8a b1 da f5 cd 1e 8a 72 06 02 07 | b4 71 02 7a d1 b4 70 86 ed 7c e5 04 db 06 11 b0 | 70 66 08 44 59 b7 49 22 d3 ba f4 ee ab fa 59 73 | b1 06 c3 8e 52 a6 3b 08 b7 93 04 a1 45 f3 91 38 | 82 d7 95 0c b3 fe bf fd 60 7f 15 7a b2 c9 6e 96 | 31 f3 92 9f 9b d4 51 14 46 6d a7 f8 2c 3c c3 fe | 86 c5 71 52 b8 28 62 77 5e 36 d1 7b 6a db 03 2c | f5 d4 3e 3d 1f 4e cb e7 cf b8 d2 9f e6 10 67 e1 | a3 1a 3a 9b e2 59 8a f3 f7 c0 58 cc fc 02 e0 b1 | da aa 4f e9 d2 86 5e 94 d6 73 96 ea 14 32 c4 4e | 3d c9 38 94 c5 47 af 83 6c ee e9 2a a3 8b e4 12 | f9 91 c1 53 48 67 8c 42 6e c0 7e 45 20 2e 6a a6 | d3 98 3e 6d d1 40 3d 9d 84 9f 54 62 49 b6 f8 67 | 32 fb 70 e2 78 08 b2 de c4 3e 70 08 0b 45 41 d7 | 34 49 14 7d a4 bf 53 d6 45 c5 fb 03 1e ef d6 06 | 6f 22 f9 f9 7c 4f e3 63 ea 02 1e 63 6e 3d 4d 36 | 29 00 00 24 a3 25 18 45 df 55 70 c4 52 41 87 e0 | ac 0c cb c2 e9 c1 36 19 df a3 78 76 61 ca c0 73 | a3 74 0a f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 2e 20 30 11 5b 47 b9 0d c9 d3 63 | b9 57 85 b4 89 e5 03 11 00 00 00 1c 00 00 40 05 | 69 81 91 3b c9 31 0b 05 42 34 36 76 be 6a 34 94 | 71 f5 f0 25 | libevent_free: release ptr-libevent@0x7fb3500180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf50 | #165 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 89 ec 12 36 85 f6 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #165 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #165 | rejected packet: | 84 89 ec 12 36 85 f6 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #165: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0477 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #113 | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #113 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #113 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49613.716325; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.007617 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf50 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #113 | libevent_malloc: new ptr-libevent@0x7fb3500180b0 size 128 "road-eastnet-nonat-113" #113: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #113) | 65 aa 2d d8 a6 29 20 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df aa fe 5d 18 fa cf 0f ff 28 95 2b df 41 5e e5 | 93 b1 5d 05 b9 f8 45 e3 a0 1d 39 ec fc 7d ae 4b | 05 3f bf 03 bf 80 a9 6e 8e fd 3b e8 32 58 c8 f7 | c6 df 30 b6 09 5f 2a 57 25 11 cb 3c da a5 01 9d | ba 5a dd a7 bc 6b 95 4a 6d df f0 56 fa 5d b6 d5 | 32 bd cc 28 5e b5 ff 1a d9 af f1 6d a9 3a c6 a5 | ab a2 21 23 63 1f 7a d5 a9 f2 d8 6e 34 2c c0 14 | b5 44 80 cc 01 b8 bc 1d 88 15 f0 56 5b 9e 16 11 | 53 49 7c 46 a4 d6 df 15 cc 76 08 99 30 8d bd 16 | fc 22 5e e2 91 1e 29 90 27 cb 4a a1 bb fb df c0 | e1 57 58 ac 38 1b 6a 91 9c 4e c8 14 95 91 e6 23 | a6 57 8f 86 03 7d ff ac 75 e9 09 5f f5 40 29 9b | 12 ab c4 82 96 27 04 ff 62 2b 29 96 91 b3 9d b0 | 86 8f c7 9d 9e d4 5c a2 76 cf a2 55 cf 18 d5 47 | 6a bc c0 f7 de 25 72 ff 89 ad a0 ee b6 9c 33 78 | 04 18 e5 3b 76 6f 93 07 22 6f ad 6a 13 43 4b d1 | 29 00 00 24 24 d3 7a 96 b8 4b b9 c8 77 6f a9 e8 | 8c 18 33 84 b7 52 88 cd 9d a3 3f f7 dd 42 d5 3a | e4 24 11 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 39 d7 c2 57 ac 0e 5c ea ab f6 c3 | 2b 95 40 5a 3d 34 d1 e0 00 00 00 1c 00 00 40 05 | e1 b8 84 36 a4 5f d1 6d 3f 9f 07 dc 0f 94 99 b2 | ea cc 3a 90 | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #113 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 aa 2d d8 a6 29 20 d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #113 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #113 | rejected packet: | 65 aa 2d d8 a6 29 20 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #113: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0478 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a63210 | handling event EVENT_RETRANSMIT for parent state #60 | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #60 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #60 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49613.722593; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006554 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #60 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 "road-eastnet-nonat-60" #60: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #60) | 25 9c c0 c5 c2 ae 29 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 2c 75 39 d4 fe e8 bb 01 36 72 a5 b5 e5 a5 81 | c7 38 4b e5 4a ae c6 e0 64 23 ae a4 00 42 bd c1 | 2e 59 84 56 2c d7 14 24 66 d8 ee 01 96 14 85 e4 | 4a 5d 41 c9 bd f2 52 f7 81 ad 7f d6 d0 a1 27 d2 | 97 41 8d b3 c0 bc 77 ec 23 18 fe 60 e2 a8 0c 93 | 13 c8 08 44 38 cf 40 53 40 99 23 6d f6 02 db 2a | 6e 32 b0 2c 67 33 6c a2 f1 af da 97 e3 24 99 d0 | 08 b1 cf 27 91 4b c8 a0 67 76 74 84 3e e8 94 b8 | 9c 46 bf ee d2 a1 d1 93 0c c9 20 9b fb 9c cc 69 | d2 c3 9f 9f 32 ce e3 cd 1e a4 06 0c ce ad 3b b5 | 3d 52 01 2e 64 72 a4 a5 0d 13 96 53 80 55 c3 af | c7 4a a9 17 ce 71 79 67 8d 48 4c a9 b8 00 02 38 | 2d 7c a0 0b 36 f5 68 34 0f dd 83 6f 1d d1 e9 b9 | 9a 43 52 12 d9 b1 6e ac 6a 5e ac d3 3c 20 66 93 | 6b 7e 85 4c aa e5 92 08 98 a1 8b 28 75 13 39 85 | b8 6c 05 ff ad 0d f2 e7 73 79 5c 18 65 6b dd 7e | 29 00 00 24 a0 1d b4 bd 19 70 24 f8 23 e6 87 dc | 50 af bd f2 95 21 f1 1c 7f 4c 51 8f f3 4c 1a 81 | a9 6f fb c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d6 a7 42 56 6b af 55 7e 9e 1f c2 40 | ba 0d 74 ad 6e b0 b4 2e 00 00 00 1c 00 00 40 05 | 49 f8 c3 9d b1 df 49 97 21 c8 2e 46 27 7c d9 25 | e7 f0 a2 de | libevent_free: release ptr-libevent@0x7fb35c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a63210 | #60 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 9c c0 c5 c2 ae 29 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #60 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #60 | rejected packet: | 25 9c c0 c5 c2 ae 29 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #60: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #158 | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #158 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #158 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49613.739244; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000841 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a63210 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #158 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 "road-eastnet-nonat-158" #158: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #158) | e6 a0 1a 4e 16 85 73 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d fe 92 1d 51 a7 6d 12 34 05 5b 88 3c 14 89 6b | 35 8c a3 94 b4 c5 44 d8 4b 8c 87 4c af 0d 5e 27 | cd 39 40 ee d3 b1 d8 0b a2 08 8c 95 70 dc 7c 67 | 00 94 18 0b cc 36 ba 02 42 ac 1b 6e 83 e8 f3 b5 | 91 59 9d ad e6 9f 36 2d a8 98 92 82 b5 58 8d 17 | e8 c3 14 93 e3 79 91 5b e9 d6 f6 a5 7b ab 15 3e | 02 89 3b e3 40 68 94 7c a5 09 b7 59 3e c5 6a 99 | 03 29 08 a9 4d cb 54 e8 24 b9 ad 4e d9 ec 0b 15 | 00 2a bb 1a df 73 04 f9 ab 12 4b db 50 44 e0 e2 | 22 35 8e 9a 3a 55 04 43 31 37 ac 1b 04 2e 40 6f | a3 ce 4b 7d 81 aa 0c 4f 00 20 e7 14 67 8a 92 03 | be 6c 2c b0 1e 89 ff eb d0 66 ac db b5 5f 07 46 | 34 4e 75 3e 19 4d d5 e5 2d 16 89 cc 75 86 80 6f | 3f aa e7 c1 07 a0 f4 7f 40 db 1c df 1d 97 4e 83 | 99 fc 4e 29 fa a7 c5 07 07 e9 c0 d9 34 f7 42 65 | b3 46 1d 34 7e 34 fc b8 2a d6 72 9b 56 fa c8 74 | 29 00 00 24 93 3e 30 9d 56 73 68 ed 32 94 90 87 | db 7b 56 ae fd bb a5 6c 98 47 2c cb b8 9c 69 c6 | ac 01 dc 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 af 5c ca 3f 10 b2 e1 eb 3b d6 06 3e | 82 97 94 30 e1 e8 70 cd 00 00 00 1c 00 00 40 05 | bb 02 3a cc bb 31 72 ec b9 81 77 29 32 3e e8 21 | a2 17 d3 ee | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #158 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 a0 1a 4e 16 85 73 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #158 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #158 | rejected packet: | e6 a0 1a 4e 16 85 73 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #158: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0481 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-173" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-173' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #173 at 0x557d46ac0800 | State DB: adding IKEv2 state #173 in UNDEFINED | pstats #173 ikev2.ike started | Message ID: init #173: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #173: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #173; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-173" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-173" IKE SA #173 "road-eastnet-nonat-173" "road-eastnet-nonat-173" #173: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-173 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-173": constructed local IKE proposals for road-eastnet-nonat-173 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 173 for state #173 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a38f50 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #173 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 | #173 spent 0.123 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 resuming | crypto helper 13 starting work-order 173 for state #173 | RESET processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 173 | RESET processing: connection "road-eastnet-nonat-173" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.194 milliseconds in whack | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 173 time elapsed 0.001032 seconds | (#173) spent 1.04 milliseconds in crypto helper computing work-order 173: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 173 for state #173 to event queue | scheduling resume sending helper answer for #173 | libevent_malloc: new ptr-libevent@0x7fb35c035930 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #173 | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 173 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #173 | **emit ISAKMP Message: | initiator cookie: | a3 dc 1a aa b2 53 81 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-173 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c7 50 c6 a8 2b 15 44 29 7d 0a e3 39 95 9c 54 98 | ikev2 g^x 15 94 31 dc b2 f4 dc 06 12 a0 ff 21 13 48 30 95 | ikev2 g^x af bf 2b b8 09 10 1f 12 f1 ba 4e d2 4d c9 b1 a8 | ikev2 g^x 05 1a 20 e3 76 d4 0d 6b 38 00 2d 67 2b 07 73 be | ikev2 g^x a7 20 4c aa b8 f7 39 95 13 6d ae b6 ef 79 3a 33 | ikev2 g^x 8d e1 63 74 10 aa 27 63 ae 0f b0 2c 9f a5 74 21 | ikev2 g^x 20 ef 3b da 07 cd e1 2a ac 84 10 e1 eb 87 c2 5c | ikev2 g^x 8c 49 b1 a8 55 4a 0b c6 97 48 c7 fa 85 87 f0 7a | ikev2 g^x d7 45 9c 5f 2a c6 38 4c 4e a1 54 1f 2a b5 2e 49 | ikev2 g^x c6 5b 7a b8 69 98 a8 6a 03 80 1c 7f 20 55 e9 fd | ikev2 g^x 67 3c d3 ce e1 0d bb 8d 6b d2 95 4c af 6b 27 f3 | ikev2 g^x df f3 c1 d1 42 37 39 82 9f 58 eb 0d c5 ad bb 97 | ikev2 g^x 84 ff 4d 8a ba d9 60 19 d6 8e a0 cf fa 4d d0 49 | ikev2 g^x 61 07 20 ea f9 3b 35 e5 ef 25 c3 9f 36 d2 2d 11 | ikev2 g^x 5f 51 ff fc 25 f0 0e 63 2f a3 a3 cd af f0 c5 be | ikev2 g^x 34 51 97 11 a8 5a bf 5a f6 22 be 55 c5 08 d3 d9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 12 84 f7 8f dc 17 04 fd a9 ee 45 ef 2f aa ad ed | IKEv2 nonce 39 8e cd ff 76 be dc 7b d9 a9 2b e6 08 21 dc 16 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a3 dc 1a aa b2 53 81 db | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ad | natd_hash: port= 01 f4 | natd_hash: hash= d8 b7 38 fa 70 81 30 71 1e 17 26 ac fb ca c9 c3 | natd_hash: hash= 02 40 69 eb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d8 b7 38 fa 70 81 30 71 1e 17 26 ac fb ca c9 c3 | Notify data 02 40 69 eb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a3 dc 1a aa b2 53 81 db | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 47 2a 00 7e f6 06 aa e7 bc a5 be 89 f2 8d 4b b1 | natd_hash: hash= 1c ba 94 b3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 47 2a 00 7e f6 06 aa e7 bc a5 be 89 f2 8d 4b b1 | Notify data 1c ba 94 b3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #173 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #173: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #173 to 4294967295 after switching state | Message ID: IKE #173 skipping update_recv as MD is fake | Message ID: sent #173 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-173" #173: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.173:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #173) | a3 dc 1a aa b2 53 81 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 50 c6 a8 2b 15 44 29 7d 0a e3 39 95 9c 54 98 | 15 94 31 dc b2 f4 dc 06 12 a0 ff 21 13 48 30 95 | af bf 2b b8 09 10 1f 12 f1 ba 4e d2 4d c9 b1 a8 | 05 1a 20 e3 76 d4 0d 6b 38 00 2d 67 2b 07 73 be | a7 20 4c aa b8 f7 39 95 13 6d ae b6 ef 79 3a 33 | 8d e1 63 74 10 aa 27 63 ae 0f b0 2c 9f a5 74 21 | 20 ef 3b da 07 cd e1 2a ac 84 10 e1 eb 87 c2 5c | 8c 49 b1 a8 55 4a 0b c6 97 48 c7 fa 85 87 f0 7a | d7 45 9c 5f 2a c6 38 4c 4e a1 54 1f 2a b5 2e 49 | c6 5b 7a b8 69 98 a8 6a 03 80 1c 7f 20 55 e9 fd | 67 3c d3 ce e1 0d bb 8d 6b d2 95 4c af 6b 27 f3 | df f3 c1 d1 42 37 39 82 9f 58 eb 0d c5 ad bb 97 | 84 ff 4d 8a ba d9 60 19 d6 8e a0 cf fa 4d d0 49 | 61 07 20 ea f9 3b 35 e5 ef 25 c3 9f 36 d2 2d 11 | 5f 51 ff fc 25 f0 0e 63 2f a3 a3 cd af f0 c5 be | 34 51 97 11 a8 5a bf 5a f6 22 be 55 c5 08 d3 d9 | 29 00 00 24 12 84 f7 8f dc 17 04 fd a9 ee 45 ef | 2f aa ad ed 39 8e cd ff 76 be dc 7b d9 a9 2b e6 | 08 21 dc 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 b7 38 fa 70 81 30 71 1e 17 26 ac | fb ca c9 c3 02 40 69 eb 00 00 00 1c 00 00 40 05 | 47 2a 00 7e f6 06 aa e7 bc a5 be 89 f2 8d 4b b1 | 1c ba 94 b3 | state #173 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a38f50 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #173 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 | #173 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49613.741755 | resume sending helper answer for #173 suppresed complete_v2_state_transition() and stole MD | #173 spent 0.322 milliseconds in resume sending helper answer | stop processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c035930 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 dc 1a aa b2 53 81 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #173 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #173 | rejected packet: | a3 dc 1a aa b2 53 81 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #173: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a69e50 | handling event EVENT_RETRANSMIT for parent state #143 | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #143 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #143 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49613.744924; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002773 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aba600 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #143 | libevent_malloc: new ptr-libevent@0x7fb35c035930 size 128 "road-eastnet-nonat-143" #143: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #143) | fe 08 8f c1 30 76 36 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 59 10 0a 33 69 60 29 ec cb 88 e8 3a c1 e5 55 | 26 67 1a ec 62 9e 8e 22 6f b0 d9 0b 9d f1 88 4a | e6 aa 92 54 ef 0d ca 48 fc de 93 8e cc 1b be 9e | 2a 5e f3 2a 08 3f 42 43 4c 7d 9b 8f 28 00 df 48 | e8 21 87 a4 f6 50 fb f0 b0 17 a4 67 51 7c 94 f5 | bf 3d 99 c9 85 3f 6a 47 12 df 61 eb 04 e7 9a 6c | b7 d5 b3 00 34 48 70 01 04 f1 38 e6 2a 1b 58 fe | 45 c8 88 15 fe fd f8 a1 17 d4 b0 e0 da 11 1c 39 | ad d0 8c b8 02 34 e9 cc d8 17 f6 f2 94 8e c1 9b | bc 9e 9d 32 92 5b 2a 34 cd 6a fb 2e 20 96 68 57 | 5b d5 8b 51 c6 02 26 d3 9c 0f 2f 12 c2 48 e7 4a | 4a 0b 12 1b 9e 56 b5 85 4d d5 b2 31 1e ed 3e 7b | 36 b4 c3 2a eb a3 dd fa 18 8b db b6 6e 6f 26 25 | d4 07 3d fa df 09 23 4b f0 61 a0 e2 e7 88 89 b7 | 4a 08 a7 b8 23 da c7 50 cb 24 82 e1 9d bc ac 0c | ad 50 25 66 22 31 ab bb bb 61 7d f2 14 fa 8e 17 | 29 00 00 24 5c 1f 93 ac 9c d9 6d bc 1c 83 06 35 | 6d 1c ce da 8c 6b 1d 7b a8 23 6f c9 2c 64 35 22 | c8 0a 79 63 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 3f e0 89 56 6b 89 d9 2f e3 34 a5 | 92 0a 7f a5 70 51 be 33 00 00 00 1c 00 00 40 05 | 8d 31 d1 99 a4 16 d7 c5 96 20 51 29 c7 9b 80 8c | b7 4b 38 13 | libevent_free: release ptr-libevent@0x7fb378012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a69e50 | #143 spent 0.178 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 08 8f c1 30 76 36 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #143 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #143 | rejected packet: | fe 08 8f c1 30 76 36 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #143: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #166 | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #166 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #166 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49613.762648; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500735 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a69e50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #166 | libevent_malloc: new ptr-libevent@0x7fb378012840 size 128 "road-eastnet-nonat-166" #166: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #166) | d7 12 9c be 9a d9 20 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b c9 02 ed 54 28 bb 69 3a fa da 89 fc 4e 39 8f | a4 d9 5e 2f e7 5a f0 78 e4 4f 3d 81 ef 79 61 1f | a3 10 38 af aa 4b f6 ef 84 82 56 19 cd b4 c3 5b | aa a8 08 49 1f b4 b8 b1 4e cd 8c 0c 86 09 40 1d | 3a ac 4d 85 be 4c 1d e8 f2 bd e7 23 97 c2 da f8 | 65 82 fb 26 55 00 06 12 19 2c fe d3 7b c4 ff 31 | 3f 92 30 47 40 04 59 ba c0 27 99 b0 dd 45 22 cb | 97 1b 7a c0 ab ef 56 9c f3 d7 45 a0 a5 37 a3 b2 | 58 e2 9e 19 5e 81 d9 fa 7b fe 78 35 15 83 01 42 | 24 2c 5a ee 4f 05 09 f4 1d dd c3 06 45 d3 ea 94 | 81 04 37 3a 2a 09 3c 79 d8 7b 16 c9 e4 4e 70 57 | ac 53 d9 f3 76 57 6b 10 ff a1 91 96 c5 09 1d b2 | 37 da 15 c6 76 39 0e 79 8e b4 e3 6b b6 34 b5 ee | 59 40 13 d1 7e a5 f4 50 26 80 c7 4d 2f bd 97 83 | 7b 42 78 41 a6 62 d7 58 6e e8 20 3d f8 07 e4 57 | 49 7e 0c 32 68 81 0c ed 46 bc 7b e3 e1 f5 77 38 | 29 00 00 24 a6 0c 32 e7 5a d1 b5 ca 07 42 9a 49 | 78 63 23 e6 6a be e5 1f b9 dd 49 81 36 5a 86 c7 | 6b 23 86 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 81 0a 2e 3d e5 a2 7d c2 7a 52 36 | 53 f5 16 ff 78 27 b0 06 00 00 00 1c 00 00 40 05 | 82 68 99 97 5e 62 33 7b 33 19 33 98 83 8d 7f b1 | f3 01 32 b7 | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #166 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 12 9c be 9a d9 20 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #166 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #166 | rejected packet: | d7 12 9c be 9a d9 20 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #166: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7e4d0 | handling event EVENT_RETRANSMIT for parent state #114 | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #114 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #114 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49613.775953; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003519 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #114 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 "road-eastnet-nonat-114" #114: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #114) | d6 76 3e 2a df 8d 49 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 89 bc e4 ca cf 42 9f 8c 3e 0c bd bc ae 4f 3b | d3 c7 ce d3 ca 55 eb 39 04 eb 76 8e a9 75 7d e3 | b6 18 fe 44 5f 1c ef b7 b7 41 cc 4d 34 22 30 65 | 06 59 1e ef 39 63 eb fe 02 26 56 aa 64 57 8d 53 | 7a 80 31 9c 0a f7 30 cf 50 cb a2 17 9f 63 45 27 | 3c d2 e0 b9 54 07 a2 b1 46 40 09 3b 94 40 bf f1 | 40 f9 b6 13 93 c3 4e d6 d8 b1 db 99 2b ea b1 51 | cb eb aa 9a ed ac 6d b8 6b 55 e2 2f 64 52 21 e2 | 9d 13 28 a8 e7 03 1f ba 1a 35 29 e1 bf bc 71 81 | 00 b3 30 d7 67 e8 0d 4c f0 57 7f 78 f9 6a af a6 | f5 69 67 2d 44 65 18 2d d8 cb 15 95 95 67 b6 a2 | 53 6a 9c 3b 84 13 f8 02 23 28 ee d8 85 45 e3 f6 | 5a a4 85 e6 1c 98 88 9c 1f 95 20 64 13 9f 49 1c | 78 c0 c0 ca f6 15 03 7c ad a7 9e 6d 64 5a 3a 90 | 22 4b eb 71 cf 24 e9 b9 6a 4d d7 77 ec 73 7e 9d | b2 6f c8 a4 49 bf 18 63 90 cf af e1 1e da 29 bc | 29 00 00 24 73 ab 08 be 9c 8c 4d 6d 6c 17 9d b7 | 72 a8 6d 05 77 58 95 9d b6 49 34 83 b7 04 21 62 | 34 da 48 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 91 b3 8b e1 5d a7 b1 99 b7 4d e6 | 18 7a 40 70 0a cf e4 42 00 00 00 1c 00 00 40 05 | 2c bf 9c 44 68 90 73 42 ea f8 95 cd ea 90 69 66 | 03 01 a9 72 | libevent_free: release ptr-libevent@0x7fb374024f80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | #114 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 76 3e 2a df 8d 49 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #114 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #114 | rejected packet: | d6 76 3e 2a df 8d 49 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #114: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0717 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a647d0 | handling event EVENT_RETRANSMIT for parent state #61 | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #61 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #61 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49613.780318; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004117 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #61 | libevent_malloc: new ptr-libevent@0x7fb374024f80 size 128 "road-eastnet-nonat-61" #61: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #61) | f7 bc 52 c3 08 41 7d fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 a3 fc 88 6c c9 17 99 e8 c8 f4 84 4b dd e6 d6 | a2 3c cb b6 7d b8 4b 73 4d d1 4a 52 0a 17 63 b0 | ce a1 f6 5b 22 20 08 31 0e da ec fd b8 c2 13 f9 | b7 0d 78 21 3f 05 bc f7 2c 5a 0e b5 1a 70 bf 53 | b0 72 5e 64 9f c9 e5 f6 6b aa f3 db 8b b8 b8 b3 | f6 f8 ae 22 20 f7 35 9c 39 6d 5a ba 98 af 4b 1d | 6d d4 8e 29 87 bb 7a 2b 6b 4a b8 79 51 26 39 b0 | 6a 6c be 49 5f 57 bf 03 7a 6e 7f ac 45 f9 af fb | a3 06 52 bf 07 ef a5 db 3d b8 9b 73 f0 8e b1 76 | 2b 5d b7 93 de 9f 59 44 c1 67 8a 9a a5 50 66 6c | 27 3e 5e 44 b1 e9 13 dc 81 57 82 47 20 a2 32 79 | d4 b0 d6 87 f1 f1 20 bf e9 93 fc 11 dd 5e 42 b0 | a4 4f 0e f8 93 a1 1c a5 59 56 db 69 8d ca d0 53 | 78 b2 af e6 28 15 c5 c9 00 fd bf f0 33 a6 bf 2d | 7e 87 d7 d1 a0 82 65 91 eb 3c cf d0 6f fb 0e 4b | 57 a1 5c 8a 3f 3c 13 19 f1 bc 6c 89 96 42 e0 e9 | 29 00 00 24 30 62 04 12 b8 d1 41 8a 1d 82 4c c7 | f3 e8 92 81 d6 0e cc 31 5a f2 7c 04 56 a0 26 04 | e6 c5 8a 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 04 89 46 c0 2a 68 09 d3 b8 a6 1e | 7d d4 48 56 88 7a 56 d6 00 00 00 1c 00 00 40 05 | bb 1e 0b f8 57 9c 2b 42 0a de e4 96 f3 8b 61 81 | fa a3 7d bc | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a647d0 | #61 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 bc 52 c3 08 41 7d fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #61 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #61 | rejected packet: | f7 bc 52 c3 08 41 7d fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #61: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #159 | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #159 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #159 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49613.803656; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001821 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a647d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #159 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 "road-eastnet-nonat-159" #159: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #159) | 9d f6 62 77 51 33 7c 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 a4 0d 7c 3f bb 62 60 89 5b f7 52 ab d7 ca 61 | c6 32 47 69 10 70 7b 4b b6 2a 70 55 d5 38 a9 c2 | 06 fe 6f 0d a3 c3 18 2d 09 43 b4 f7 9b ba 82 ec | 93 e7 fe 37 c0 9d ff 14 eb fc f4 a5 4f eb f2 e9 | 81 40 d5 d7 0d b6 64 ad 86 89 bc 12 73 da 31 6d | 21 c9 f1 76 ef e5 fa c1 2f 00 73 7b 29 f7 14 d0 | cc 33 12 7b be c7 0b 95 25 c7 3c c9 94 8d 40 b3 | 24 76 27 7e c2 06 53 7c 39 6a 80 69 0a b2 fa aa | 13 ac 6b d9 25 77 ea de 54 91 5a 44 b0 3f bb f5 | d7 05 e4 68 6e f2 57 14 f5 2f 93 5c 8b e1 18 57 | a7 aa 40 49 0b b7 ce d1 00 80 ba 6e 5e cc 5b a3 | 7d 08 af 9a a8 cd d2 ac df 34 27 c2 04 7d d9 9f | e2 bf b9 fd 43 84 3d e1 23 56 2b 91 01 a7 94 b9 | 39 80 83 eb c5 4c de ac 80 1d 05 1e 22 14 a6 fb | 08 b1 be 3f 9b 24 b0 c4 63 eb 31 8d 24 20 37 93 | 7d fa a5 c0 26 eb c3 7c ae e2 24 2a 4f 31 bf c0 | 29 00 00 24 93 99 a4 63 0d 72 bd 0a 86 bd f8 14 | bb 6c 2c e3 e4 66 d1 1e e3 70 5a 2a 46 97 fd 74 | 37 df 1f 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 4a e8 13 db 7e 81 08 43 48 ab 41 | d6 8f 57 84 74 b1 75 e1 00 00 00 1c 00 00 40 05 | 43 72 1d eb 44 7d 24 cc 39 78 4a ec 22 c2 1a 4e | 3d 2f 0c bd | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #159 spent 0.185 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d f6 62 77 51 33 7c 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #159 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #159 | rejected packet: | 9d f6 62 77 51 33 7c 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #159: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0801 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-174" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-174' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #174 at 0x557d46ac1dc0 | State DB: adding IKEv2 state #174 in UNDEFINED | pstats #174 ikev2.ike started | Message ID: init #174: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #174: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #174; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-174" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-174" IKE SA #174 "road-eastnet-nonat-174" "road-eastnet-nonat-174" #174: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-174 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-174": constructed local IKE proposals for road-eastnet-nonat-174 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 174 for state #174 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb360005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #174 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 | #174 spent 0.183 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-174" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.284 milliseconds in whack | crypto helper 17 resuming | crypto helper 17 starting work-order 174 for state #174 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 174 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 174 time elapsed 0.000676 seconds | (#174) spent 0.677 milliseconds in crypto helper computing work-order 174: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 174 for state #174 to event queue | scheduling resume sending helper answer for #174 | libevent_malloc: new ptr-libevent@0x7fb350035930 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #174 | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 174 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #174 | **emit ISAKMP Message: | initiator cookie: | 91 36 4b 21 8c e3 c8 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-174 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c8 dd c5 98 91 80 2f bf e7 2b 43 43 70 f9 1c a2 | ikev2 g^x 78 b6 0b 56 89 c7 17 d8 c4 a4 ed 43 14 68 00 55 | ikev2 g^x ee dd ad 6d 8a 38 ba ad d9 23 b7 9e bb 3d 86 07 | ikev2 g^x ed 16 db de b0 44 67 be ba 65 0e 96 fd 54 eb cc | ikev2 g^x d4 d8 f1 83 4a 85 62 b4 81 ea c9 6f d6 2b 35 08 | ikev2 g^x 27 1d 44 b3 72 05 f6 d5 ee 0e c6 0c ad 30 dd 17 | ikev2 g^x d5 9d 92 9d 6e 7c 3d b9 06 e4 e1 7a b8 af 86 7e | ikev2 g^x 60 5c 18 1e 77 1f a3 0b 6c 39 63 8e 3b e2 37 7b | ikev2 g^x 90 c4 a3 0b 91 18 0b 29 93 4d 27 18 cf a4 37 53 | ikev2 g^x b6 2a 69 e7 1d 14 6c 93 05 8e 44 d8 16 2f a7 9f | ikev2 g^x 79 72 c5 dc 33 34 fc 0e b4 98 f8 e3 05 25 fe de | ikev2 g^x b4 63 51 46 dc 88 2d 12 37 aa 30 40 1c da d8 aa | ikev2 g^x d1 04 09 9e 82 a0 ef 0f 6a 96 1b 9b 72 30 77 32 | ikev2 g^x 93 8b f7 e8 2a a0 a2 dd 84 00 ba 24 75 30 17 4b | ikev2 g^x 8e 71 da c7 7b bd 41 ab b9 40 da db 82 29 9b 27 | ikev2 g^x d8 26 4c cc a8 73 89 de dd ff 26 53 c5 6f 01 3f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce cd b7 f1 c7 48 65 7b d0 51 fe 51 f7 71 0f cd 4b | IKEv2 nonce 00 33 35 86 2b 0b ad 56 3c d5 7d aa 0f f5 4e e3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 91 36 4b 21 8c e3 c8 14 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ae | natd_hash: port= 01 f4 | natd_hash: hash= 80 08 52 e7 44 c5 f0 65 19 f6 45 55 b4 2d dd 6f | natd_hash: hash= 21 a4 bb e8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 80 08 52 e7 44 c5 f0 65 19 f6 45 55 b4 2d dd 6f | Notify data 21 a4 bb e8 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 91 36 4b 21 8c e3 c8 14 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 78 4d 37 08 7f b6 6b 98 3a f8 5f d9 3e 81 c3 c7 | natd_hash: hash= 93 cf d6 90 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 78 4d 37 08 7f b6 6b 98 3a f8 5f d9 3e 81 c3 c7 | Notify data 93 cf d6 90 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #174 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #174: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #174 to 4294967295 after switching state | Message ID: IKE #174 skipping update_recv as MD is fake | Message ID: sent #174 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-174" #174: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.174:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #174) | 91 36 4b 21 8c e3 c8 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 dd c5 98 91 80 2f bf e7 2b 43 43 70 f9 1c a2 | 78 b6 0b 56 89 c7 17 d8 c4 a4 ed 43 14 68 00 55 | ee dd ad 6d 8a 38 ba ad d9 23 b7 9e bb 3d 86 07 | ed 16 db de b0 44 67 be ba 65 0e 96 fd 54 eb cc | d4 d8 f1 83 4a 85 62 b4 81 ea c9 6f d6 2b 35 08 | 27 1d 44 b3 72 05 f6 d5 ee 0e c6 0c ad 30 dd 17 | d5 9d 92 9d 6e 7c 3d b9 06 e4 e1 7a b8 af 86 7e | 60 5c 18 1e 77 1f a3 0b 6c 39 63 8e 3b e2 37 7b | 90 c4 a3 0b 91 18 0b 29 93 4d 27 18 cf a4 37 53 | b6 2a 69 e7 1d 14 6c 93 05 8e 44 d8 16 2f a7 9f | 79 72 c5 dc 33 34 fc 0e b4 98 f8 e3 05 25 fe de | b4 63 51 46 dc 88 2d 12 37 aa 30 40 1c da d8 aa | d1 04 09 9e 82 a0 ef 0f 6a 96 1b 9b 72 30 77 32 | 93 8b f7 e8 2a a0 a2 dd 84 00 ba 24 75 30 17 4b | 8e 71 da c7 7b bd 41 ab b9 40 da db 82 29 9b 27 | d8 26 4c cc a8 73 89 de dd ff 26 53 c5 6f 01 3f | 29 00 00 24 cd b7 f1 c7 48 65 7b d0 51 fe 51 f7 | 71 0f cd 4b 00 33 35 86 2b 0b ad 56 3c d5 7d aa | 0f f5 4e e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 08 52 e7 44 c5 f0 65 19 f6 45 55 | b4 2d dd 6f 21 a4 bb e8 00 00 00 1c 00 00 40 05 | 78 4d 37 08 7f b6 6b 98 3a f8 5f d9 3e 81 c3 c7 | 93 cf d6 90 | state #174 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb360005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #174 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 | #174 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49613.812299 | resume sending helper answer for #174 suppresed complete_v2_state_transition() and stole MD | #174 spent 0.407 milliseconds in resume sending helper answer | stop processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb350035930 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 36 4b 21 8c e3 c8 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #174 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #174 | rejected packet: | 91 36 4b 21 8c e3 c8 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #174: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #167 | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #167 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #167 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49613.827468; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500209 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbbc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #167 | libevent_malloc: new ptr-libevent@0x7fb350035930 size 128 "road-eastnet-nonat-167" #167: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #167) | d1 34 e0 8f fb 7c 13 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 06 19 19 47 f8 53 ed d0 cd 1b 23 74 a8 df 03 3c | 9b a0 ef 95 f1 ce f6 ae 26 37 05 42 40 f8 1b 11 | 25 b6 88 f4 08 21 89 99 64 30 46 35 2b e5 72 51 | 22 12 a5 4d 09 28 30 73 8d 80 f8 3e 6a c2 3d d6 | 8d b5 a5 60 de 1d e9 8e c3 96 be eb 9a e4 82 44 | cd c0 61 18 61 45 71 3d 05 11 06 a9 ca 4e 06 4e | cb 22 e9 93 7b 78 bf 7f 83 42 10 73 45 d5 b3 1b | 92 fd 26 c3 64 99 f5 61 c8 1f 64 c2 09 10 74 12 | fd fe 01 de ac 29 c7 4b 49 1a d9 8d 7a bd 94 f7 | 39 58 38 2e ae 17 b2 73 1d e4 a7 77 fc bf 85 3c | 63 5b 1a 29 48 e8 aa 07 3f e9 82 92 50 e7 72 9f | 9a d8 a5 97 f7 0c 72 e2 e7 b6 cb 0c ff 4e 38 9e | 6d f9 d9 e0 8f df a4 4e 9c de 86 ff 7f 6f 46 07 | 19 30 44 7c c3 76 d0 df 68 7b cd 98 75 c7 57 02 | 52 bd 7f a1 c9 22 2c 83 36 62 ea 42 c7 31 3b 8a | 30 42 3c 51 50 0b 14 55 d5 43 19 16 fa 0b 4c a5 | 29 00 00 24 15 4a d1 bb d8 87 b7 c2 1d 20 84 6d | 4c 8a c4 e7 5d 03 8e 8f 16 37 df e9 c3 77 de 41 | b9 4c a3 ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 52 6d ba 0b 84 f5 59 4b dd eb 25 | 53 bb c6 97 e9 c5 42 9c 00 00 00 1c 00 00 40 05 | f4 8a 9c 13 b7 e1 a4 8b 85 79 9e 14 f1 e3 5c 5f | 69 af 71 4a | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #167 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a3a590 | handling event EVENT_RETRANSMIT for parent state #144 | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #144 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #144 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49613.827638; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003055 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #144 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 "road-eastnet-nonat-144" #144: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #144) | 95 f5 7e 43 50 83 91 f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 af 0d 3c f0 04 33 31 65 f6 8e 0a e2 6d 8f 2b | 3a 54 de b3 ca 0f b9 57 94 b3 82 c2 80 38 37 42 | 7f 12 9e 2e 71 85 9b 4b b8 30 72 8d 13 66 8d 18 | cc b4 6c 82 a9 1c ff 5f bc 21 44 b4 04 e3 03 9f | 86 65 ce c2 4c 9e c7 42 cb 55 d7 40 69 8e 4e 35 | 08 db 41 09 bf 5b 9f e9 29 80 fb 24 8c ee 8a 18 | 98 d5 9e 29 b1 2e 48 fa a4 54 8d 89 c7 a3 3f 0e | fc 43 c8 e1 70 19 e6 79 93 90 9a 7f 29 dc 10 54 | 5c 05 ee 55 8b da f3 4a d4 d1 7a 22 56 b9 55 f2 | 83 7d ee 0a 7b 20 d8 88 a4 b2 35 e6 85 84 6e ea | 73 63 0f 8a e4 f5 ba b9 cf c5 6d ef 42 bc 1c 31 | 91 cc e3 6a cc 1c 24 a0 43 43 cd 4a d2 99 1f d0 | 12 0e 0b 61 86 58 8a 2a 98 ff 0e 20 62 f2 a9 6f | 84 85 8e 3d 34 eb 58 ea 76 88 a9 8b bd 38 f7 19 | 7f 52 1e a6 e1 d5 d4 4f 95 6d fa 80 6a e1 f8 3e | c4 ca 0c d0 70 40 4c 9c cb 3a a3 28 2b c3 1c ff | 29 00 00 24 1f 01 c0 5a 0d f1 22 7b f9 16 68 fa | 7d 4a 59 bf c4 b6 f1 ab 98 c0 67 1a 42 27 bf 9d | d6 b1 35 d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 96 0c ca 76 1c 4b 86 73 02 f4 3a | a5 21 4a 8f fe b4 03 ee 00 00 00 1c 00 00 40 05 | 86 67 99 5d 30 be 3d 57 d4 ea af 87 c1 18 21 08 | 32 c4 b1 0f | libevent_free: release ptr-libevent@0x7fb354009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3a590 | #144 spent 0.0876 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d1 34 e0 8f fb 7c 13 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #167 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #167 | rejected packet: | d1 34 e0 8f fb 7c 13 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #167: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 f5 7e 43 50 83 91 f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #144 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #144 | rejected packet: | 95 f5 7e 43 50 83 91 f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #144: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0363 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469defe0 | handling event EVENT_RETRANSMIT for parent state #115 | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #115 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #115 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49613.840922; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004173 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #115 | libevent_malloc: new ptr-libevent@0x7fb354009640 size 128 "road-eastnet-nonat-115" #115: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #115) | c4 57 de ea ab 7c 97 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d 60 64 b4 6d 6b ab d1 46 47 bf d9 bb b3 15 d9 | 76 6a d8 89 d3 b0 5a 81 28 ba 1d 93 76 a5 80 bb | 38 99 6f de 11 f7 c8 2c 23 bb 14 6a 9f 0d a9 47 | 32 e4 6d d5 c4 32 60 81 49 22 36 5b 90 09 c7 0c | 27 45 32 0f 98 73 ed a3 58 24 f6 91 48 ba e7 1f | da 48 cc 0b e5 09 56 9d bd e9 fe a4 8f 0e 2b 69 | 4d 35 1f 28 bf 51 97 13 c0 2e 28 0e de c2 67 89 | 74 f0 15 44 d8 28 5b 7f f9 a9 ff b2 03 37 cf 2c | 3b 6e e1 4e 7e c7 1c 07 07 33 f5 e7 ff 50 1f 8d | 31 38 08 fc a1 18 db f4 32 10 6d f3 26 bd 9e d9 | db 50 5b 6d 6b 19 89 41 88 e3 7e 3b 01 55 72 67 | 91 73 3c 48 31 9d dd 55 e1 1b 9a a9 f9 5f 58 30 | 2e b7 6d 0e 83 a7 65 f9 86 ec 70 47 1e 65 85 e1 | e6 c5 21 98 7e 5c d4 94 dd 2a 93 5a 70 ed 80 a7 | 59 4c 40 1d 45 f5 3b 9b ad 67 94 6a 65 cc 62 c5 | 57 fb 85 e6 12 1e d8 43 f4 ef fe f0 cc a4 02 e0 | 29 00 00 24 34 89 d0 cd bb 68 33 bb 66 4c 49 99 | 21 34 57 e7 67 32 62 7f b0 e9 7c 89 a8 87 a7 1b | 14 49 2b 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 7a 1e c7 ed 14 54 ea ac f9 9a 4e | af 78 6e 32 16 f1 84 2f 00 00 00 1c 00 00 40 05 | 1a 60 d9 ab c3 38 58 4e 6c 49 b7 eb b4 e1 91 a6 | 90 ea 24 0f | libevent_free: release ptr-libevent@0x7fb3780300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469defe0 | #115 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 57 de ea ab 7c 97 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #115 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #115 | rejected packet: | c4 57 de ea ab 7c 97 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #115: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0eb30 | handling event EVENT_RETRANSMIT for parent state #62 | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #62 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #62 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49613.847285; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005655 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc00 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #62 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 "road-eastnet-nonat-62" #62: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #62) | a4 88 8e 77 b1 f4 8c bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 16 5e 67 aa cb b3 98 fe b6 e6 44 1a 07 e2 be | 44 c7 a0 47 e1 e7 ec b4 60 c9 7d b0 5b 56 2d 1b | e4 9a 0e 63 18 22 7a fa a9 c7 63 82 b0 af 0b 0d | 77 29 15 f5 8e 1b 69 90 f4 7c 19 86 79 0a 5f e8 | f6 12 ff 9f 31 22 5c e3 f7 e6 5c 40 a8 f4 37 ed | 38 af f3 38 7f df 64 d9 95 08 2b d7 e3 b5 1f 60 | 26 37 fe 9a 98 33 04 94 0b 0e 07 08 c5 5e 7d f8 | c0 0f 76 eb 24 9a 96 24 01 c7 9b fd dc 2c ed 1c | 7f 8c f6 fb 9d b0 c1 a4 53 e2 53 da 53 65 1f 9e | 4e d5 a4 5d a2 34 99 86 95 17 7b b9 d0 eb c5 9a | 7a c4 fd c2 ec 45 e1 8d 1b 55 bb 91 5f 61 39 83 | ed 3e fd ec 0b 7f cf a5 d0 34 4d 78 f0 19 f9 dd | 25 c0 20 38 67 61 04 4f 0d 51 42 43 cb 7c 44 01 | 6b 99 d1 a6 d3 b1 5e 29 d8 c7 53 4a 9e 9d fe 70 | 66 03 05 bd 1d 96 be 53 72 9a fa 30 50 08 24 ae | eb 69 31 f0 f7 2f d9 1c ab 9d 37 cd ad 7a ed 6a | 29 00 00 24 0c 26 e7 cd 38 ca 58 e6 02 58 43 30 | ae e2 2c 6c 6d 36 d5 ae 9b 11 96 a7 26 d9 7a c2 | 05 18 d0 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 28 4f 82 49 71 8c 73 8e 61 ba dd | 8f a7 28 9b 76 c2 13 ce 00 00 00 1c 00 00 40 05 | 01 46 1c d3 66 df 29 38 51 83 6e 7c d6 51 6d 46 | 6c 4e be 2f | libevent_free: release ptr-libevent@0x7fb3540251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0eb30 | #62 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 88 8e 77 b1 f4 8c bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #62 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #62 | rejected packet: | a4 88 8e 77 b1 f4 8c bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #62: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9f380 | handling event EVENT_RETRANSMIT for parent state #160 | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #160 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #160 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49613.869661; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001976 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc40 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #160 | libevent_malloc: new ptr-libevent@0x7fb3540251c0 size 128 "road-eastnet-nonat-160" #160: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #160) | ec 91 fb f1 0c bb 28 b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 30 17 61 87 0e 49 c3 b5 8e 06 e9 0f 8d 98 6f | af 06 7c a8 d8 5f dc 88 0a 69 f2 9d 79 59 e2 95 | a1 fb db 6f 1f 95 32 7b b7 f9 9f f9 87 3d 1e fd | 84 a3 dc 5e 41 59 c7 3d 40 a9 2a 90 d5 3d ec a5 | 70 8f 09 86 de c0 6f f0 8b 3d 45 2f a8 92 74 65 | dc 5a 07 23 6d 89 30 20 25 5a 37 b2 af 30 d2 98 | c2 6a 98 57 d0 a0 8f ff e2 c6 37 8c 7f c8 5e c3 | 9d 98 d2 5d 5e 70 59 77 03 8a bf 2a a1 c0 c1 c0 | 77 97 84 ec 45 c7 38 00 39 c5 2e 6a 0f 64 17 e5 | 6e 90 68 05 f5 f6 24 a7 89 fc 3d ac 97 b9 b8 8e | 69 68 d2 76 c0 8b ed 21 84 18 d2 89 99 90 e5 b1 | e9 a1 7c 9d 78 af 48 90 e7 1b 1a 7c 29 30 21 6e | 39 f7 cd b5 93 ab 03 d1 25 14 24 ad 0e 2c 3a 55 | 23 bf 0e 11 13 d6 6c 92 56 a2 2e ac 22 4b 36 72 | 62 e4 c0 2c 6e a1 80 10 e9 1f 33 37 5b 82 aa ab | bc d0 55 fd fd 61 98 d4 55 8c e5 05 44 59 3d 11 | 29 00 00 24 5a 7f a2 3e 7b 7f ae 84 88 a2 b0 db | 20 96 18 8a e9 32 7e 19 52 af 25 1a 74 e6 9f 5e | 17 1f 26 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 25 02 d7 0c d0 85 e5 86 af b4 01 | ce 64 18 db 06 ad 6a 73 00 00 00 1c 00 00 40 05 | 33 04 36 eb ae 2e 87 8f ec 4d 9c 69 20 d1 b8 6e | 57 bb 48 2f | libevent_free: release ptr-libevent@0x7fb36402ffd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9f380 | #160 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 91 fb f1 0c bb 28 b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #160 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #160 | rejected packet: | ec 91 fb f1 0c bb 28 b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #160: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0668 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-175" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-175' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #175 at 0x557d46ac3380 | State DB: adding IKEv2 state #175 in UNDEFINED | pstats #175 ikev2.ike started | Message ID: init #175: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #175: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #175; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-175" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-175" IKE SA #175 "road-eastnet-nonat-175" "road-eastnet-nonat-175" #175: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-175 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-175": constructed local IKE proposals for road-eastnet-nonat-175 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 175 for state #175 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9f380 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #175 | libevent_malloc: new ptr-libevent@0x7fb36402ffd0 size 128 | #175 spent 0.155 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-175" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.235 milliseconds in whack | crypto helper 18 resuming | crypto helper 18 starting work-order 175 for state #175 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 175 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 175 time elapsed 0.000981 seconds | (#175) spent 0.985 milliseconds in crypto helper computing work-order 175: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 175 for state #175 to event queue | scheduling resume sending helper answer for #175 | libevent_malloc: new ptr-libevent@0x7fb354035930 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #175 | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 175 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #175 | **emit ISAKMP Message: | initiator cookie: | 12 29 28 fb 65 9c c2 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-175 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 03 ef d9 b0 55 d5 14 e7 83 ea 0c 0f eb c0 4d b2 | ikev2 g^x 18 36 c3 0d 3c 5f 0d a0 d7 f5 a9 e8 30 23 62 2f | ikev2 g^x 3d 90 5e 25 d3 54 b3 8c d3 ab 1c d3 33 34 03 78 | ikev2 g^x 85 cd 74 0f 8e 35 c2 5d e8 af fd 9d 00 2e ac e4 | ikev2 g^x 84 d5 07 fd 55 8c 43 bf 89 61 dc 61 43 3c cd 62 | ikev2 g^x c3 a0 1f 02 31 0b 07 a5 78 c5 10 08 e8 a4 7f 16 | ikev2 g^x 2c ae 5c 93 2d 6e c4 24 f5 3a 2e c6 c8 6f 2e ed | ikev2 g^x e3 0a 8d 68 b0 44 75 d4 95 53 f7 73 cd 7d 6e 84 | ikev2 g^x d1 e9 9a 86 1e 26 9e 3c d7 df ee 11 ad 66 97 c8 | ikev2 g^x d5 8e 03 f4 d8 ef b9 76 f2 13 a1 73 f1 c4 5a 4e | ikev2 g^x 4f 30 eb 7b 7a f1 c0 eb 65 91 cf a9 f3 ae 0d 25 | ikev2 g^x 9b ee 1e 21 c2 ad 7e f5 01 73 92 f7 51 aa 80 fe | ikev2 g^x 91 d2 a8 9c 23 90 be c1 3c 6a f1 41 0c 91 0d 9d | ikev2 g^x 20 55 1f c9 0c b7 77 36 a0 ac 09 f3 01 de b4 91 | ikev2 g^x 94 8a 20 8c 1f ad 5f d7 63 70 2d 9a bd f2 8c e9 | ikev2 g^x fc ac 2d 5f 45 8f 88 b9 47 ef 43 3d 71 ea 60 f1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 97 30 3a 8f 02 71 88 b4 dc ed 53 7a 89 3f 00 b1 | IKEv2 nonce 2f 4a 80 0e 10 53 03 26 85 ad 54 ab da 16 12 83 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 12 29 28 fb 65 9c c2 ca | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 af | natd_hash: port= 01 f4 | natd_hash: hash= e8 ca 83 64 e4 50 88 08 79 37 9f 8c 5a be 7c 44 | natd_hash: hash= 1e d9 01 29 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e8 ca 83 64 e4 50 88 08 79 37 9f 8c 5a be 7c 44 | Notify data 1e d9 01 29 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 12 29 28 fb 65 9c c2 ca | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4a 03 e5 d4 1c 09 77 92 d5 8c 25 e7 2e 76 d9 45 | natd_hash: hash= 5b fb 35 ac | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4a 03 e5 d4 1c 09 77 92 d5 8c 25 e7 2e 76 d9 45 | Notify data 5b fb 35 ac | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #175 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #175: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #175 to 4294967295 after switching state | Message ID: IKE #175 skipping update_recv as MD is fake | Message ID: sent #175 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-175" #175: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.175:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #175) | 12 29 28 fb 65 9c c2 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 ef d9 b0 55 d5 14 e7 83 ea 0c 0f eb c0 4d b2 | 18 36 c3 0d 3c 5f 0d a0 d7 f5 a9 e8 30 23 62 2f | 3d 90 5e 25 d3 54 b3 8c d3 ab 1c d3 33 34 03 78 | 85 cd 74 0f 8e 35 c2 5d e8 af fd 9d 00 2e ac e4 | 84 d5 07 fd 55 8c 43 bf 89 61 dc 61 43 3c cd 62 | c3 a0 1f 02 31 0b 07 a5 78 c5 10 08 e8 a4 7f 16 | 2c ae 5c 93 2d 6e c4 24 f5 3a 2e c6 c8 6f 2e ed | e3 0a 8d 68 b0 44 75 d4 95 53 f7 73 cd 7d 6e 84 | d1 e9 9a 86 1e 26 9e 3c d7 df ee 11 ad 66 97 c8 | d5 8e 03 f4 d8 ef b9 76 f2 13 a1 73 f1 c4 5a 4e | 4f 30 eb 7b 7a f1 c0 eb 65 91 cf a9 f3 ae 0d 25 | 9b ee 1e 21 c2 ad 7e f5 01 73 92 f7 51 aa 80 fe | 91 d2 a8 9c 23 90 be c1 3c 6a f1 41 0c 91 0d 9d | 20 55 1f c9 0c b7 77 36 a0 ac 09 f3 01 de b4 91 | 94 8a 20 8c 1f ad 5f d7 63 70 2d 9a bd f2 8c e9 | fc ac 2d 5f 45 8f 88 b9 47 ef 43 3d 71 ea 60 f1 | 29 00 00 24 97 30 3a 8f 02 71 88 b4 dc ed 53 7a | 89 3f 00 b1 2f 4a 80 0e 10 53 03 26 85 ad 54 ab | da 16 12 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 ca 83 64 e4 50 88 08 79 37 9f 8c | 5a be 7c 44 1e d9 01 29 00 00 00 1c 00 00 40 05 | 4a 03 e5 d4 1c 09 77 92 d5 8c 25 e7 2e 76 d9 45 | 5b fb 35 ac | state #175 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36402ffd0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9f380 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9f380 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #175 | libevent_malloc: new ptr-libevent@0x7fb36402ffd0 size 128 | #175 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49613.891919 | resume sending helper answer for #175 suppresed complete_v2_state_transition() and stole MD | #175 spent 0.454 milliseconds in resume sending helper answer | stop processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb354035930 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 12 29 28 fb 65 9c c2 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #175 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #175 | rejected packet: | 12 29 28 fb 65 9c c2 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #175: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa34c0 | handling event EVENT_RETRANSMIT for parent state #168 | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #168 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #168 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49613.898127; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501136 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0eb30 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #168 | libevent_malloc: new ptr-libevent@0x7fb354035930 size 128 "road-eastnet-nonat-168" #168: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #168) | b9 02 4f a9 68 0f a0 fe 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 38 63 d7 fd 7e 45 ef 72 03 13 6e 35 cd 53 26 | dd fc 38 ee df 06 1b 11 d5 c4 09 34 ea 9e 52 e9 | 90 99 59 42 6e 45 cc 92 f7 0d d9 7f 81 1b 1c 4d | 72 ce 0d 51 93 0e f8 d3 b9 70 d1 ad 64 8a 6a e2 | a3 1d 17 ed 1c a1 e4 c2 92 7b 01 e5 0d a5 15 1e | c9 45 f6 10 06 37 94 e2 37 85 e0 bc d4 3b da fb | 39 7d 59 09 ad a9 c4 e3 7a c2 37 5d ed ee 68 e8 | b1 63 07 9f 75 29 29 20 65 07 02 b1 8b 8b 01 b0 | 2b 52 3c a4 c8 5c 27 70 49 1c a9 4a ee d4 27 a2 | d7 44 e4 1a a5 20 37 9f 74 66 e1 72 a9 aa a5 00 | ec 99 a9 b7 19 84 18 49 d0 9b 4f 00 03 95 50 90 | b6 93 61 e2 6b 86 3b a3 1f 9e fe be b9 00 11 4e | d0 ee 6d 6d 92 bc 2a 22 db 5c 6c ba d6 ed 5d 3e | 26 d4 a4 f0 75 e3 70 55 39 8d c3 1c 3c 5e 40 3f | 06 f2 7d 36 24 34 4a 10 84 8b e4 b1 b8 1a 47 88 | b9 e7 73 06 47 d4 d0 41 aa 50 1b af 0e 28 2a e0 | 29 00 00 24 3f 02 e6 1c 86 66 81 19 d2 36 b7 e8 | e6 9a a6 e7 5e 78 b6 e8 13 75 aa 57 3b a6 be 37 | b8 21 ac c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 8a 57 55 a3 9f b5 8e 63 74 0d de | 85 a9 a1 c8 2f d9 1c 61 00 00 00 1c 00 00 40 05 | 7a 31 f7 15 f8 cd 69 10 6a f0 ab d3 a9 c2 c3 c7 | 07 31 9b 08 | libevent_free: release ptr-libevent@0x7fb380022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa34c0 | #168 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 02 4f a9 68 0f a0 fe | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #168 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #168 | rejected packet: | b9 02 4f a9 68 0f a0 fe 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #168: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45310 | handling event EVENT_RETRANSMIT for parent state #145 | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #145 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #145 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49613.908829; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003494 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa34c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #145 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 "road-eastnet-nonat-145" #145: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #145) | a6 a1 9f 1d 3f 3a 29 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 ad 76 df ba ca 18 92 b9 50 e2 27 a3 57 3f f5 | d7 ce ae 5d 80 a9 09 c6 8a 53 e3 ab 22 af 0e a7 | 88 2e e6 ed 37 ce 02 dd 03 71 9a aa 64 d1 00 5c | 54 65 05 0e 62 cb 77 34 78 e8 1d 0f 3c 6f 76 4f | d8 fc 9f c4 10 87 e5 9a b0 72 db 0a 63 63 0e ec | a2 67 9d 72 98 db 53 5f a6 6f e8 b3 98 59 aa 3b | 88 1a a2 8d d0 7f c4 94 06 61 c1 99 f9 c0 e1 fc | 19 b1 6a 14 b7 fd 63 fd d3 3b 83 b6 f1 f8 68 d2 | 13 f3 e6 28 90 fe d0 d0 88 c6 ca e3 4e 56 e1 09 | b8 4b c6 48 c4 d4 00 e6 af d0 6c fa ac 01 46 d9 | 68 30 67 9c 6d 90 ca de 4f 57 74 b7 7a b8 1b 41 | a9 90 f5 03 0d 89 d9 ac 42 f8 f9 ae 19 2a 88 37 | d2 a9 69 9e 81 b2 1c 52 07 de 0f fa d0 69 b1 a8 | 12 38 cf d3 2e 09 65 b8 1c da 6e 0b 4d 41 c0 65 | 80 dc 01 75 47 41 de 6c 83 4d 93 25 86 5c 1b c8 | f3 08 39 71 bd f1 c4 fe f5 43 e7 4c 77 94 d2 cc | 29 00 00 24 03 a8 59 45 29 a4 02 15 24 82 5a 54 | 64 ac fd bc 55 59 ba ca b7 e9 80 0d f2 9c bd f0 | d3 a5 de f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 e0 ba e6 72 d8 87 8f de 74 38 1d | 19 eb b3 76 79 6b d3 38 00 00 00 1c 00 00 40 05 | 6f 55 64 02 f2 84 7e 5a 25 36 99 f3 de 2c 7f 97 | 3a 54 f2 52 | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45310 | #145 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a205f0 | handling event EVENT_RETRANSMIT for parent state #116 | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #116 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #116 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49613.909011; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006359 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45310 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #116 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 "road-eastnet-nonat-116" #116: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #116) | b2 c1 8f cb f7 6a 1e a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 10 14 ae 52 93 c7 02 e8 52 e1 37 d5 de 46 8c | fd 60 c1 85 87 df bb 73 86 74 dd ca 8d 28 84 e8 | ae a4 cc 28 e4 8d 32 74 8d 1a ce d7 d3 d2 af b0 | 17 d9 f0 1f a3 6b 80 67 ac 90 16 e8 bd 63 76 cd | 29 1d 99 79 32 0a f9 72 a3 b1 6c a3 80 e8 98 c7 | 50 db 8b a2 a3 d2 f5 f7 af ea cb e0 92 9e 24 f1 | ee d0 e5 d9 31 06 c1 bd 2c 7e d3 0a 21 44 11 df | a4 42 5a ee bb 8a 79 72 e4 f3 c9 99 7b df 25 70 | 3c 49 19 99 e1 b4 65 cb cf 1f dc af da 2b bd 09 | 11 55 b0 c8 e4 15 8c 50 3c c0 c3 00 8c 8c 4c ab | 69 1b ad 8f b8 1a e0 31 01 be 05 d6 f9 1d 43 66 | f1 fd 89 96 83 b0 fe 81 90 88 96 0a aa b0 30 a0 | 85 c7 97 d5 26 67 92 b8 99 15 c1 d7 75 f8 4b 96 | 28 a4 71 fb e3 bc ab 36 e6 56 13 b6 1e 48 b3 3d | 9c e0 fd 0d 74 f8 ef 54 b8 1f 40 6b e3 af 77 76 | c8 a0 52 42 e3 01 29 91 49 f3 39 82 3e 75 b6 74 | 29 00 00 24 f8 40 4d b3 f4 26 54 f3 cf b0 a0 c8 | 54 6e 9f a9 95 bb 15 87 06 e3 63 86 66 7d 8a 82 | ee 67 c6 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 63 f6 16 ae 7e d5 6c 46 12 68 8c | 69 38 5c 9a 54 a3 19 f3 00 00 00 1c 00 00 40 05 | 9e 9c 34 46 1f 45 a3 36 da 24 a6 33 3a 00 62 20 | 5b e0 e0 ea | libevent_free: release ptr-libevent@0x7fb37c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a205f0 | #116 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #63 | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #63 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #63 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49613.909143; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004736 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469defe0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #63 | libevent_malloc: new ptr-libevent@0x7fb37c0300e0 size 128 "road-eastnet-nonat-63" #63: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #63) | 43 a8 4d 01 ec 36 de 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa e2 93 e3 30 a1 06 ee b4 85 58 c9 2f 9d d0 1a | ad 38 32 dc 30 89 d1 a0 98 57 8d 01 77 84 b3 55 | 47 fd ae cc e0 a9 2a 35 58 f1 6a 27 c8 b7 88 d3 | c3 78 1e 95 37 0b 81 ee cb 00 02 38 fb 0c bc ff | 55 19 c6 c0 be 69 d1 78 c8 9a ae e0 96 6c 3f 9b | 54 61 8c 4b 6b 45 ac 74 a1 6d f1 1d de 9e c2 52 | 40 62 38 7c 4d c1 06 5c f5 e4 71 d5 c6 8f eb 8d | a1 58 7d a8 05 d7 f2 d1 12 1f d4 be 60 08 06 1f | 2a 4d 28 f0 ba 0e 77 13 d0 8f 4c 08 fc 37 3f 98 | 37 6b f8 7a b1 44 d3 8b 12 01 3a e0 ab 1c 6f 72 | d8 5a cc 1f f0 ef fd b0 38 cb c0 2b 70 72 dd 77 | 20 94 89 cc 24 42 7c 89 06 09 17 e9 b7 42 85 43 | b5 81 b7 cc a1 a3 3a 6b b1 18 c1 ec 8a 13 0d f9 | 71 43 3d 9a 1f 64 16 b7 2b bd 29 ea 9f 4f 17 43 | a8 18 9f fc 5b 56 59 fa 46 4c 5d 82 89 28 f2 04 | 51 6c b3 97 3a a5 95 f1 fd 87 8b 14 08 ce a0 6b | 29 00 00 24 42 95 7e 08 3c e5 ab b4 d2 f9 ef 7f | d8 0c 96 cd c4 ca c3 e4 35 0f 70 37 5f 05 86 60 | 4b 19 91 ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 ed eb 0b 29 2b d1 a0 42 dd cd 92 | 88 75 fb d1 70 51 78 cf 00 00 00 1c 00 00 40 05 | a8 06 2d d1 ac 32 5a b6 7e b8 ae d6 ec a9 34 27 | 7d 9e 90 d0 | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #63 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 a1 9f 1d 3f 3a 29 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #145 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #145 | rejected packet: | a6 a1 9f 1d 3f 3a 29 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #145: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0676 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 c1 8f cb f7 6a 1e a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #116 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #116 | rejected packet: | b2 c1 8f cb f7 6a 1e a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #116: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.057 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 a8 4d 01 ec 36 de 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #63 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #63 | rejected packet: | 43 a8 4d 01 ec 36 de 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #63: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0576 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90440 | handling event EVENT_RETRANSMIT for parent state #161 | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #161 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #161 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49613.931743; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001789 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #161 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 "road-eastnet-nonat-161" #161: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #161) | 0e 21 c5 28 e0 11 16 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 b1 7e f7 73 9d 3d 0b 9c d2 8e 29 c6 08 34 06 | 2d dc ae 10 7c 53 33 af cd 18 8c 8c 37 fc eb 71 | 2c 3b de 0f 76 b3 63 bc 1c 05 f0 af 4b 44 5e c7 | 23 d4 29 d3 16 0f fb 8c 12 fb 18 1d 9e 65 94 73 | c1 7f 44 d2 39 97 a4 57 24 65 09 c9 9f 95 0f 07 | 98 bb c4 fc e8 f9 84 20 79 d3 9b da f2 f3 7b ff | 76 4d 74 89 ed 7a aa a4 38 3a 39 de f9 ec 60 48 | 7f 57 eb 50 ff 9b 33 98 7d 3b 5f cc 64 ba 1b 81 | 67 2a 02 26 ec 3f 45 a5 fe c6 9b 0d 1d 37 b0 40 | 01 1f 97 01 e8 87 5e 53 40 bf fb d3 7e 9e 2e b3 | 15 ba fc 8b b1 4a 7e fa af 94 c4 67 c0 2c 29 d2 | 74 fe d7 24 50 34 48 da f7 a1 54 c5 1c 2b 5a 35 | 33 a6 86 42 a8 e3 25 9b e3 fe 4c de 22 93 ae dd | c7 11 a7 9f 05 b4 87 2f a1 b9 2b f6 21 37 9c 8e | 50 21 6a 50 8e bd 1d 5f a1 42 92 50 68 2f 4e 9a | 54 04 e8 cc b9 5f 82 df 48 23 c8 76 49 63 f0 50 | 29 00 00 24 b8 74 18 e1 c4 b4 30 2e a4 31 94 25 | 46 e1 dc 47 b5 0b e4 ae a0 1d 11 3a f1 77 67 fa | 52 d5 2a a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 94 bf 28 28 ea 74 13 ca 7d 07 ba | 5d 79 38 7b d7 5d 40 d3 00 00 00 1c 00 00 40 05 | aa 2f 88 27 56 8a 2e 19 5d ff 44 bb aa 2d 48 42 | c7 75 31 6a | libevent_free: release ptr-libevent@0x7fb34801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90440 | #161 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 21 c5 28 e0 11 16 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #161 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #161 | rejected packet: | 0e 21 c5 28 e0 11 16 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #161: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0482 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-176" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-176' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #176 at 0x557d46ac4940 | State DB: adding IKEv2 state #176 in UNDEFINED | pstats #176 ikev2.ike started | Message ID: init #176: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #176: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #176; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-176" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-176" IKE SA #176 "road-eastnet-nonat-176" "road-eastnet-nonat-176" #176: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-176 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-176": constructed local IKE proposals for road-eastnet-nonat-176 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 176 for state #176 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a90440 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #176 | libevent_malloc: new ptr-libevent@0x7fb34801d920 size 128 | #176 spent 0.168 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-176" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.257 milliseconds in whack | crypto helper 7 resuming | crypto helper 7 starting work-order 176 for state #176 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 176 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 176 time elapsed 0.000713 seconds | (#176) spent 0.721 milliseconds in crypto helper computing work-order 176: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 176 for state #176 to event queue | scheduling resume sending helper answer for #176 | libevent_malloc: new ptr-libevent@0x7fb348035930 size 128 | crypto helper 7 waiting (nothing to do) | timer_event_cb: processing event@0x557d46a1af10 | handling event EVENT_RETRANSMIT for parent state #117 | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #117 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #117 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49613.966468; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003746 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a205f0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #117 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 "road-eastnet-nonat-117" #117: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #117) | 4a b5 59 cb ed d6 a3 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 62 d1 99 4b 20 24 18 5d d2 31 2a 1c e6 82 aa | d2 1a 74 70 f8 1e f2 71 00 48 0a 80 0d 91 e6 e0 | e0 7b 66 1e 0f a2 c5 f3 2e cc 8d 72 40 de 7d 14 | e0 b7 d4 a2 80 96 97 77 ac ba 2b fb 1f 79 f2 32 | 8b a5 84 65 3d e1 3e 2e 60 82 26 3f 6d cf 4b 43 | 84 0b 96 d0 d5 70 61 64 4c 71 e0 b1 63 e8 0c 82 | 17 82 85 c0 c3 eb d9 cf 4e b8 f4 b1 87 57 e5 c1 | 06 2a d8 41 87 ab aa ec 3f f6 5e ac 9b 45 ab a8 | 0b e4 13 8d 76 0c 8c 2b 1f d4 61 19 ad 16 37 d8 | d0 65 3e 14 53 34 26 1a a6 5e 31 57 79 20 50 43 | 71 29 f3 4a 86 68 0e 08 74 59 1e 0f 6e 37 0c 10 | b2 e1 5f 52 67 c2 35 e3 ff 31 9d c5 bb 7f 45 96 | 61 58 38 40 0e b5 86 40 8f 24 ab 5a 52 cc 83 a1 | 23 61 7d 29 78 a8 96 57 13 15 75 48 5f 5a 5b 21 | 7b dd 4e 50 1d 23 67 01 84 5f f8 e7 69 4f 16 1a | 7e b5 9f 38 da 45 67 22 75 50 ab b6 62 cc cb 76 | 29 00 00 24 c3 7a 28 6c 12 59 4b e7 9f 08 e5 89 | 61 e9 dd c1 64 c5 cd 33 70 a1 b8 fb a5 4b b4 8c | 0b 78 ad a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 90 26 e7 b8 63 3c dc 5c 03 43 0c | 57 b3 5f a9 02 48 0a b5 00 00 00 1c 00 00 40 05 | 75 50 aa 52 d7 4b 1d bd 0c f6 2a 37 d5 af e8 8d | 12 a0 66 45 | libevent_free: release ptr-libevent@0x7fb3600180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1af10 | #117 spent 0.0956 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #176 | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 176 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #176 | **emit ISAKMP Message: | initiator cookie: | a4 22 94 6b b7 90 01 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-176 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 06 20 a9 49 fb 93 2b 74 d8 83 cb 06 8c 55 7f 57 | ikev2 g^x 5d f1 cc 70 90 ee ee 41 59 8d d1 e4 58 c0 02 89 | ikev2 g^x 12 8f 04 73 87 28 bc ec 0e 96 08 f0 49 03 74 3b | ikev2 g^x 4f eb c4 d0 c6 21 f7 38 1b 92 1e f3 ba 46 7f 28 | ikev2 g^x b7 fb 3b 9f fa d9 3a 39 83 bb a2 23 67 98 f1 b5 | ikev2 g^x a1 a5 1f cd 74 bb 92 db b0 18 17 3e 12 cd 1b ef | ikev2 g^x c7 08 37 6b 02 81 e5 23 06 48 6f 12 26 7a 04 03 | ikev2 g^x 41 41 ce c5 75 5e 67 35 c5 ce e1 ac d5 40 0e 48 | ikev2 g^x 02 a1 2b 2d 14 1a 42 85 97 cf d2 fc 57 8d 5d de | ikev2 g^x 6b d9 22 6f 79 7d c3 c2 dd 65 20 aa 1d 5b 57 40 | ikev2 g^x a0 1a 0e 1e 45 35 58 17 0b 20 5c b0 ba 44 7d db | ikev2 g^x a2 bd 64 77 9a d5 0b a1 b5 5c 94 07 3a 31 f0 5b | ikev2 g^x 14 75 f7 58 da e1 d3 e6 78 67 58 17 31 77 19 91 | ikev2 g^x 11 0f cf 7e 64 09 ce c1 12 cf d6 40 b9 60 dd 56 | ikev2 g^x e1 a2 ed 56 fd 45 7f 51 84 03 0b 96 6c a0 15 97 | ikev2 g^x 40 65 89 e3 a9 b7 e3 e5 5a 24 e4 6f 77 a5 63 fc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce bc 2f bb 65 01 f5 95 86 7b 82 6d a7 33 bf 89 13 | IKEv2 nonce 08 c1 15 eb 66 27 ad 6e 9d 4d 82 1c fe 4f 3f 4d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a4 22 94 6b b7 90 01 fb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b0 | natd_hash: port= 01 f4 | natd_hash: hash= 7b 44 db b2 76 4d c5 a9 b2 17 20 52 87 84 27 9b | natd_hash: hash= ed 5c 63 75 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7b 44 db b2 76 4d c5 a9 b2 17 20 52 87 84 27 9b | Notify data ed 5c 63 75 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a4 22 94 6b b7 90 01 fb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 53 a7 06 a0 b6 ee 02 94 c4 3e c2 3c 5b 31 75 91 | natd_hash: hash= 62 98 b0 aa | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 53 a7 06 a0 b6 ee 02 94 c4 3e c2 3c 5b 31 75 91 | Notify data 62 98 b0 aa | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #176 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #176: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #176 to 4294967295 after switching state | Message ID: IKE #176 skipping update_recv as MD is fake | Message ID: sent #176 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-176" #176: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.176:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #176) | a4 22 94 6b b7 90 01 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 06 20 a9 49 fb 93 2b 74 d8 83 cb 06 8c 55 7f 57 | 5d f1 cc 70 90 ee ee 41 59 8d d1 e4 58 c0 02 89 | 12 8f 04 73 87 28 bc ec 0e 96 08 f0 49 03 74 3b | 4f eb c4 d0 c6 21 f7 38 1b 92 1e f3 ba 46 7f 28 | b7 fb 3b 9f fa d9 3a 39 83 bb a2 23 67 98 f1 b5 | a1 a5 1f cd 74 bb 92 db b0 18 17 3e 12 cd 1b ef | c7 08 37 6b 02 81 e5 23 06 48 6f 12 26 7a 04 03 | 41 41 ce c5 75 5e 67 35 c5 ce e1 ac d5 40 0e 48 | 02 a1 2b 2d 14 1a 42 85 97 cf d2 fc 57 8d 5d de | 6b d9 22 6f 79 7d c3 c2 dd 65 20 aa 1d 5b 57 40 | a0 1a 0e 1e 45 35 58 17 0b 20 5c b0 ba 44 7d db | a2 bd 64 77 9a d5 0b a1 b5 5c 94 07 3a 31 f0 5b | 14 75 f7 58 da e1 d3 e6 78 67 58 17 31 77 19 91 | 11 0f cf 7e 64 09 ce c1 12 cf d6 40 b9 60 dd 56 | e1 a2 ed 56 fd 45 7f 51 84 03 0b 96 6c a0 15 97 | 40 65 89 e3 a9 b7 e3 e5 5a 24 e4 6f 77 a5 63 fc | 29 00 00 24 bc 2f bb 65 01 f5 95 86 7b 82 6d a7 | 33 bf 89 13 08 c1 15 eb 66 27 ad 6e 9d 4d 82 1c | fe 4f 3f 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 44 db b2 76 4d c5 a9 b2 17 20 52 | 87 84 27 9b ed 5c 63 75 00 00 00 1c 00 00 40 05 | 53 a7 06 a0 b6 ee 02 94 c4 3e c2 3c 5b 31 75 91 | 62 98 b0 aa | state #176 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34801d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a90440 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90440 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #176 | libevent_malloc: new ptr-libevent@0x7fb34801d920 size 128 | #176 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49613.967026 | resume sending helper answer for #176 suppresed complete_v2_state_transition() and stole MD | #176 spent 0.359 milliseconds in resume sending helper answer | stop processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb348035930 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a b5 59 cb ed d6 a3 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #117 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #117 | rejected packet: | 4a b5 59 cb ed d6 a3 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #117: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0497 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 22 94 6b b7 90 01 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #176 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #176 | rejected packet: | a4 22 94 6b b7 90 01 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #176: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0366 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a276e0 | handling event EVENT_RETRANSMIT for parent state #146 | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #146 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #146 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49613.974252; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00272 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1af10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #146 | libevent_malloc: new ptr-libevent@0x7fb348035930 size 128 "road-eastnet-nonat-146" #146: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #146) | 44 6c 8c 11 77 9b c1 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b e4 4b 01 63 76 c0 7a c8 2d 36 69 32 60 94 ea | 6d 55 57 2b 4e ff 0e 39 b8 87 ae 9d 5d a1 84 c3 | fd 7e 75 5e b5 db f9 c0 f2 b4 77 67 0c bc 83 d2 | b3 2c 18 7b 18 da 84 81 dc 1d 09 bc ef cb 96 0b | 54 3e 13 a5 2c e8 26 52 c4 b3 5b d7 9c b8 e6 22 | f7 8d 8e 88 21 d1 87 46 36 62 d4 63 42 41 4c 1f | 8f 43 21 27 b3 df 00 21 d1 8d 41 5a e5 9f 04 8b | ff c6 a4 97 a5 12 34 cb aa c2 51 13 9f 26 59 55 | a5 7b 2f 9e 53 52 08 32 a2 06 5f 18 aa a0 ac 8a | 4c 25 e1 2e cb 23 eb 05 33 52 1c b1 e7 32 06 d0 | 42 ed ad 95 48 c5 eb 3d 1a cb f5 6d dc 2f a2 a8 | 4e 15 75 28 ce 0c d4 fb 09 18 56 79 e6 17 c1 dd | e4 ed 35 be 6f e9 12 84 6e 1e 87 b9 38 ca fc f5 | d4 85 cf 4e a3 1f db 6c 1f e5 f2 54 ba 88 10 cb | 4e bc 46 9b 79 cb 0a 36 af 61 69 14 f8 97 5e 9d | 27 b8 f4 1b 36 1d 0b 8b f0 e7 f8 06 78 36 dc d7 | 29 00 00 24 79 24 14 13 36 a3 2b 17 a4 40 30 01 | 57 eb a4 ff f9 15 14 cb 86 dc 31 a7 64 7c e3 06 | ae fb 59 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 46 87 8a 4c 47 2e ae ab e2 03 f4 | cf 0f 35 fc df 03 af ad 00 00 00 1c 00 00 40 05 | 7f ed fa 9e 74 b9 38 c0 e7 89 49 8c f1 a3 30 c7 | bc 00 44 f5 | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a276e0 | #146 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469ef4e0 | handling event EVENT_RETRANSMIT for parent state #64 | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #64 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #64 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49613.974449; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004674 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a276e0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #64 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 "road-eastnet-nonat-64" #64: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #64) | 28 7e be 04 bb c7 3c e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 7e 43 6c c6 61 f7 8d 74 52 44 4a 1c ca e7 9e | ac 14 d9 31 6d 60 9d f4 ba 6e c2 e0 7b d5 53 a3 | 16 85 f9 c3 ce f8 f1 6f bf 00 c2 bc 5a d4 f5 80 | d8 8f 02 50 d5 75 7e 2e dc 8c e1 ab a9 5d a2 cc | da fa 4e bf fb 7e 0d a9 06 25 1f 41 e3 0d cd 1b | 1a a7 53 a9 ce 79 cd b5 77 9b b8 2e 89 66 fa cb | ad fc 1f a1 86 e2 14 75 9e d9 ee bd ba f9 9f 7c | e4 64 68 99 18 9c 70 2b 82 20 55 55 75 56 88 5d | d8 d5 c7 f6 4d e5 dc 25 37 08 b7 1b d0 a6 99 40 | 0a 49 58 f6 83 1c 88 a0 08 dc b3 c1 aa ed 91 6f | c6 a5 be 4d 6b b9 bb 18 cf 12 ba 0d 71 89 70 ef | 66 fa c4 5b 33 09 3f ff 55 ca 19 24 9a 74 4d 4c | d1 a6 e0 57 41 7a 44 3f b8 12 3a 3f 06 a7 52 cd | 97 1c e0 a8 3c be fa 81 97 1d d6 2b 3f 0b c8 9f | b8 ad e1 63 a0 10 8f f1 ce 62 64 83 9e 28 1c 57 | ba 8c 77 7e 6f fe 44 22 ea fc fc 43 05 9a a7 9f | 29 00 00 24 d6 fa 6f 28 11 8e 89 70 36 5a 3b d2 | 30 2c 96 5f 7f e3 aa dc e7 9f 74 e4 9d 9a 67 37 | a5 4e 3a 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 34 45 e6 51 f4 83 8b a3 3b 13 c9 | fe 48 d2 4a 75 21 a9 ed 00 00 00 1c 00 00 40 05 | 1b 38 c5 d0 41 1e ff f1 67 34 2b 17 6a 69 bf 2e | 0c d6 b9 4f | libevent_free: release ptr-libevent@0x7fb34c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ef4e0 | #64 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 6c 8c 11 77 9b c1 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #146 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #146 | rejected packet: | 44 6c 8c 11 77 9b c1 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #146: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 7e be 04 bb c7 3c e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #64 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #64 | rejected packet: | 28 7e be 04 bb c7 3c e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #64: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0584 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28ab0 | handling event EVENT_RETRANSMIT for parent state #169 | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #169 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #169 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49613.976798; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499077 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe740 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #169 | libevent_malloc: new ptr-libevent@0x7fb34c0251c0 size 128 "road-eastnet-nonat-169" #169: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #169) | 36 7b 71 a0 e2 7f 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 4f 45 f4 ab d7 36 ef 76 4d 44 de 6d 62 2d ae | 4e 5c 7f da 0a b2 48 be 78 ae 6d be 58 68 4b a4 | 8f 2f d2 29 68 46 25 1b 12 f9 92 02 9c d7 87 f1 | eb d6 eb 82 f8 34 c7 6d 1b 97 bd 5a 16 3f 5c d9 | 45 ff a3 65 05 29 38 16 83 1c 73 b0 0d 2c 32 2c | fa dc 03 8b a8 c2 e4 3a 68 19 c8 6f 81 6b a9 c7 | f3 1e d3 85 90 6b 23 38 49 5d e8 b8 1a 99 c6 3a | 6a a2 1b 8c c9 a7 dc be 9d 40 85 d1 eb b3 30 ea | 56 c0 aa c1 0c 1e 30 02 2d 3d a6 f2 04 1d 14 69 | 6d b1 c7 5c 5a 62 14 b7 a7 b0 4d b4 4a ea d7 8e | 92 28 ac 35 b4 c0 43 9c a2 b3 5b b7 49 ed fe 09 | 58 d4 4b a6 dd 4b ac 69 dc 3a 32 2b 1e e0 8a 39 | ae 70 61 ea 71 bb e0 10 48 b3 9a 5d a8 33 73 7a | e9 75 bd 48 dd 69 c9 c8 be a6 8c 92 7f 96 ad 37 | 04 3d 47 69 86 1c fb 25 12 87 50 73 a4 63 1a 75 | dc 73 f6 d1 8e ed 8a 90 43 3f ec 36 e2 fd c3 e9 | 29 00 00 24 c6 0f 04 68 5e 20 5e 64 7b fe 77 4f | 0f cb 3e 64 8c ad ed 27 06 6f 13 47 5c 0b 0d 8e | 1c d7 84 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fa 7c 50 0f e9 f1 70 67 4d 08 f0 45 | 40 25 4d e8 01 bd 9b 4f 00 00 00 1c 00 00 40 05 | cc 1b 7d 85 9d ec 77 c3 d4 a3 45 1a a2 36 2f 10 | c5 f4 8f 3e | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28ab0 | #169 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 7b 71 a0 e2 7f 3d 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #169 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #169 | rejected packet: | 36 7b 71 a0 e2 7f 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #169: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a12c70 | handling event EVENT_RETRANSMIT for parent state #162 | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #162 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #162 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49614.009117; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001566 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28ab0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #162 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 "road-eastnet-nonat-162" #162: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #162) | 3b bf da 45 10 1c 63 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 2a 00 6f 37 4b f5 08 dc 2d d5 a4 5f d7 a7 d8 | a8 4d 31 bb 56 e7 51 71 5b 5d fc c8 0e 08 fb e2 | c0 7c 0d 9e fa 59 01 dc 52 d2 c1 e7 2f 1a e5 b4 | 5b d5 c8 45 b5 dd 91 a9 d5 c3 73 76 9d 7e fd b8 | f9 df d1 f8 01 94 2b 6f e5 9a 29 12 9e de 27 97 | 71 f3 e6 1b 74 76 a7 3a 8c e6 a9 61 00 52 7e f7 | c9 6f 55 40 33 0a 80 4c aa c5 55 f4 4e 14 8a a7 | 71 a6 78 3d d0 59 58 77 2f 99 7c 4c c3 1e 74 08 | f9 85 d0 5e 65 f5 6a 31 d7 63 2d f9 e8 59 8b 16 | 32 89 82 d2 3f 02 ed 88 92 cb b0 35 d8 db 40 15 | 72 43 38 f2 76 11 5a 75 77 0e 67 e7 50 ab d6 be | 45 bd 9e 45 2f 01 23 b3 e6 91 d2 ea db c5 26 44 | 62 95 26 52 cc d7 f4 4b d1 06 28 b1 bb 01 1a 47 | 2c 16 e5 b8 18 7a 69 d5 78 76 2f ea 81 85 bf fa | 27 ed 91 6a 8a 48 18 3c 3f 20 85 89 ae e6 4e 97 | 89 5c 72 59 c7 16 4a 7b 0a b0 0c 8e 44 0c ca 39 | 29 00 00 24 95 de a1 84 1b 6b 5e e8 be 4d c4 44 | d7 89 7f ff f7 3c d6 b5 51 9e bf df 42 03 ca bf | 75 41 b7 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 45 b2 30 32 2f 26 ad dc fc 75 7c | 7f bc 91 0d 37 21 2d 1b 00 00 00 1c 00 00 40 05 | b1 72 3a ba 32 f9 7a 15 ec b8 bb 62 7e ea 84 2a | af f4 56 24 | libevent_free: release ptr-libevent@0x7fb3500300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a12c70 | #162 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b bf da 45 10 1c 63 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #162 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #162 | rejected packet: | 3b bf da 45 10 1c 63 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #162: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0647 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #118 | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #118 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #118 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49614.027468; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003723 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe780 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #118 | libevent_malloc: new ptr-libevent@0x7fb3500300e0 size 128 "road-eastnet-nonat-118" #118: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #118) | 8e a7 a4 7e e9 0a bc a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a ec c5 01 c5 e9 b5 94 ac 43 67 db 08 47 bd 0c | 54 49 81 74 3a 3b f9 51 2c 6b 48 98 c1 d5 7c ee | 4b 95 1c 5e 71 e6 0b 08 a0 85 de c0 1d ef b9 d0 | 5c f8 32 2b 5d f8 44 47 b6 dc c5 4b 50 10 f9 77 | 99 80 83 bc 5c bf 6a 79 a5 41 39 97 c6 b0 17 4c | 84 d1 fa 16 7a 7a 3e e5 51 2d fc 5d b0 66 e1 6f | 66 c6 ed f3 a4 54 56 06 ac 5d ee b2 4b 4a 38 5f | aa 09 29 91 e5 8c 9b 64 60 8e 7c f6 86 7a 07 43 | f1 93 d1 26 4a 28 da b7 0c a1 1a 0c 4c d6 c5 1f | ee f5 92 b2 e4 15 93 35 4c 07 88 be ec 21 4e 23 | f9 ed 56 db b0 43 b1 c7 7d 57 a1 20 bb 88 d2 9a | 23 9e be ef e2 0d b6 dc 67 12 32 69 0b ef 17 5f | 45 8b bf 08 ff c1 84 fb d6 41 58 81 ba c4 68 e8 | 6d 5c 50 c4 fa 14 2d 1e b6 d3 3f da 53 ee 59 40 | e0 c2 e3 5e 46 f4 96 f5 35 c7 87 50 c6 81 32 4e | 30 f8 e6 fa a0 f5 a3 88 f0 51 68 02 71 eb f4 fa | 29 00 00 24 fc fa 6f 0b ed d7 fd 9b f1 eb 70 56 | 1f a0 0f 98 c6 28 ab da a8 c2 09 53 33 ea a7 33 | 5c 74 50 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e 87 94 32 ac f3 4e 0f e0 49 b5 2d | ec 68 6c 45 41 83 dc 40 00 00 00 1c 00 00 40 05 | e8 e9 7b b7 56 9d 8b dd 59 77 e6 95 c2 ea 88 7c | d5 64 a3 dc | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #118 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e a7 a4 7e e9 0a bc a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #118 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #118 | rejected packet: | 8e a7 a4 7e e9 0a bc a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #118: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0674 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #147 | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #147 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #147 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49614.038894; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003736 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #147 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 "road-eastnet-nonat-147" #147: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #147) | c9 49 59 84 c8 e5 a9 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 23 1f ef d0 ab 86 83 db 3a 42 1d 72 53 7f 1d | 10 99 05 4a 99 4f 3f 9a 98 88 bd df 90 bb 6b e6 | 5a 0a ce 6c 41 04 da 58 5d c4 4f ac da 97 26 a7 | 11 32 a8 06 1f e1 87 a2 42 1e e6 6a 0c 68 08 40 | f5 b9 1e 41 1b cf 5c 75 a8 60 06 b2 5f cf d9 87 | 6b e4 af 8e 02 f2 fa 22 10 06 d6 15 19 bb fa f0 | 66 24 d5 79 4a bf 96 b3 63 ad e6 0f 0b 5c f6 47 | 01 64 bd d8 46 3f e5 ea a4 26 5d e5 06 c2 a7 0f | 35 e2 b0 0a 2c 32 20 be 52 14 9d b5 0e ec 56 cf | b3 f0 bf 5e 01 73 a8 04 a0 e0 5c 8a fe 29 b1 7f | 37 66 a5 5b ec c8 06 fb 07 01 0f 4c 5e 63 33 d2 | 2f d4 5c 61 3e 3f 82 73 d1 fb c8 86 80 bb eb c9 | 28 2b cc 48 8d 11 24 24 01 fe 7a 40 83 2b 75 31 | d3 44 40 97 d2 ba 07 04 c5 0b 99 12 41 24 f8 ad | ae 7e f2 a1 cb 5b d9 cd e9 53 59 dd 6f dc 6a 90 | 39 c5 d7 b8 42 59 e8 06 c8 85 08 f1 c6 2d 85 3e | 29 00 00 24 56 cc b0 4f af 68 49 01 85 6b 57 3a | 2e bf 2e 45 7c 71 09 75 a1 1e fe 83 ec 88 f6 fe | d7 b8 8a 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 3a 80 78 a8 ce 4e 37 f2 7e 4e 6e | c2 ec 51 b5 d8 d3 ef c5 00 00 00 1c 00 00 40 05 | 80 dd aa b7 d6 9c 8d 45 3b 70 75 ca 6b f3 11 7a | 54 5b 54 8d | libevent_free: release ptr-libevent@0x7fb3600251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #147 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2cbd0 | handling event EVENT_RETRANSMIT for parent state #65 | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #65 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #65 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49614.039085; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004573 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #65 | libevent_malloc: new ptr-libevent@0x7fb3600251c0 size 128 "road-eastnet-nonat-65" #65: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #65) | ef 12 90 5c 48 7d 35 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 1d 09 25 1e 78 f1 ab 15 10 4e 97 1c df 6e dc | ea a4 f2 51 40 2c fc 70 83 3b d1 14 8e 0e 9b f0 | ed 07 86 8f 8c 86 61 7e ec 48 49 64 93 36 5d 3e | 17 1f e8 61 4f 64 88 6f dc 05 20 78 89 b7 e5 6b | 2c bb be 5b d1 73 00 a1 4f 26 6a 56 a9 d6 41 92 | 2d 76 96 98 ed 1d 08 e4 99 fe 2c 5e 06 f5 6b bd | 7e 5c 39 22 bf ae a8 e1 92 1c 13 3f 1d 70 c4 80 | 07 a5 77 ff 91 5d 4b 48 ee 7b fd 40 d0 32 19 b5 | 09 de 90 f8 5a 03 1b 2a 6a c3 ef 64 b2 ec 44 55 | 99 02 c6 b9 5e db b2 cd f2 ce d4 a6 86 55 55 7c | 29 4f 4b ce 6a 0b b1 f7 34 a8 01 90 c9 f9 c3 1c | 81 d7 a5 bb 19 5a 7d e2 de 08 df 1d b2 6d 5a f1 | 1e a2 87 2c 96 1b c7 cb 00 ed 5b 85 f3 b5 ad fb | 85 9e 29 58 fd ca dd fe cc ef 21 ce b6 4c a2 4d | d7 d2 d7 9a 36 aa ca e6 4f 15 82 d8 a4 cd 14 4f | 08 9f 68 62 be 95 a7 c1 d4 3f 0f 63 b9 f6 80 56 | 29 00 00 24 56 09 76 96 73 f6 7a d5 b4 ac d9 d3 | f5 d3 52 17 38 15 85 8c 5c 9b 9d d9 ed a7 ee 26 | 3a e8 6f 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 23 18 fa b0 e0 93 30 87 95 e8 a3 | 79 bf 51 a0 e1 20 e5 2d 00 00 00 1c 00 00 40 05 | 26 a2 95 ca b7 c9 12 03 be 34 1f 1e 21 7b 79 10 | 86 6d e0 e7 | libevent_free: release ptr-libevent@0x7fb3400250b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cbd0 | #65 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c9 49 59 84 c8 e5 a9 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #147 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #147 | rejected packet: | c9 49 59 84 c8 e5 a9 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #147: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 12 90 5c 48 7d 35 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #65 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #65 | rejected packet: | ef 12 90 5c 48 7d 35 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #65: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0548 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7fec0 | handling event EVENT_RETRANSMIT for parent state #170 | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #170 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #170 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49614.042416; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500374 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cbd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #170 | libevent_malloc: new ptr-libevent@0x7fb3400250b0 size 128 "road-eastnet-nonat-170" #170: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #170) | 0e 3d 5a e4 33 67 ae f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 3a 08 5b b2 3f a4 8e df 9b c0 eb a8 ff 32 50 | b7 58 7d 7d 4a 10 8c 9a ad 53 11 df 0e 8d 39 fb | 8a c0 5f d6 8f ee 32 b4 c6 d6 4c 41 39 dc c8 7f | a6 9c 35 ef 09 08 ca f8 2d 7d 3c 76 aa 39 58 43 | 35 eb 36 d9 ef 09 c3 c6 d0 ab 11 b8 34 40 ff 55 | c8 35 93 0b bc c0 66 e0 d9 9f c1 89 c0 9b 98 09 | c8 0d 44 3a d6 3d e2 b0 52 69 78 44 4a 24 b0 ad | 80 aa 61 eb 53 d9 1a 0a 53 30 0a eb d5 8c f7 f3 | ca 01 74 12 22 ff f3 9d 01 97 d0 63 da 1b b6 a1 | 02 35 c9 78 38 c4 96 f6 23 08 55 58 52 01 18 8c | 46 ea 56 a8 65 c1 e7 43 3b b8 d3 07 66 36 b4 14 | 25 9e f5 4d 86 46 ab 55 94 68 c7 67 da 70 2b 06 | a8 71 55 97 18 18 f9 3a 98 e0 35 83 6a 8d aa b1 | bc e1 50 ed 72 ba 83 3d 44 b6 97 eb 32 ff 41 57 | 48 97 03 67 e5 b8 1f 12 59 d4 1e 23 84 44 9b 29 | 9a 72 cd 57 ba 76 df 2f d8 46 ae e3 a7 ac 2c 37 | 29 00 00 24 f5 be bd 85 ea bf a8 35 5e 2e fb 98 | 21 e3 d9 77 11 2b 7a 24 c1 b5 1e 2f 89 52 5c d3 | bf 7f 74 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a ca 79 b0 52 c7 26 24 58 ba d7 c8 | 58 6a 36 93 64 5a 0d 23 00 00 00 1c 00 00 40 05 | 2e 8d 3a 82 9a 56 9c b7 68 e2 e0 45 0d 65 b1 99 | f9 22 bb fc | libevent_free: release ptr-libevent@0x7fb34402a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7fec0 | #170 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 3d 5a e4 33 67 ae f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #170 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #170 | rejected packet: | 0e 3d 5a e4 33 67 ae f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #170: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-177" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-177' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #177 at 0x557d46ac5f00 | State DB: adding IKEv2 state #177 in UNDEFINED | pstats #177 ikev2.ike started | Message ID: init #177: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #177: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #177; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-177" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-177" IKE SA #177 "road-eastnet-nonat-177" "road-eastnet-nonat-177" #177: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-177 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-177": constructed local IKE proposals for road-eastnet-nonat-177 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 177 for state #177 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7fec0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #177 | libevent_malloc: new ptr-libevent@0x7fb34402a950 size 128 | #177 spent 0.153 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-177" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.234 milliseconds in whack | crypto helper 8 resuming | crypto helper 8 starting work-order 177 for state #177 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 177 | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 177 time elapsed 0.000995 seconds | (#177) spent 0.993 milliseconds in crypto helper computing work-order 177: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 177 for state #177 to event queue | scheduling resume sending helper answer for #177 | libevent_malloc: new ptr-libevent@0x7fb34c035930 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #177 | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 177 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #177 | **emit ISAKMP Message: | initiator cookie: | 18 be 44 9b 6e ed 30 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-177 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6b 07 e3 cb ba 41 f5 29 89 53 b2 f3 1e 5e 07 87 | ikev2 g^x e1 d5 ed d4 f7 64 97 f7 8a 96 5e a4 19 72 f5 99 | ikev2 g^x db af d0 a6 4b 51 f7 55 92 f6 5e e0 30 09 2c b6 | ikev2 g^x 43 a0 4f d7 6f e1 d3 20 57 34 04 7c 3d 9a 99 83 | ikev2 g^x f9 a3 8a 6a fe fe a9 91 f2 83 44 a1 2d af 4b ef | ikev2 g^x b0 18 e4 e4 62 e5 83 a7 cf b5 7d ca 15 6b 57 02 | ikev2 g^x c4 53 c6 7f f4 9f 1d 3d 3b b0 8c b2 2b 17 6d 36 | ikev2 g^x 19 38 bf 55 ce 8a 72 4f 20 1b a4 9c a2 84 da e5 | ikev2 g^x 7c f0 4b de 9a 22 9d 10 b8 0c f6 b5 af 79 8d d9 | ikev2 g^x c7 ca 65 16 d7 e0 a1 a8 7f e6 15 6a 53 ef 5b f4 | ikev2 g^x a2 b4 0d 9c 61 31 ea 4a 75 b2 62 d9 d6 fe 75 27 | ikev2 g^x 38 c2 d0 97 b9 a4 b7 2c 60 e6 08 ea 3f 0a 15 59 | ikev2 g^x f6 77 c4 7c d1 46 84 4f f2 09 1e c0 00 e1 c8 65 | ikev2 g^x bf 5e 6f 2d 94 6e 4c d7 96 38 7b ba 94 5a e8 e2 | ikev2 g^x 2f d6 8c 88 2d de 4f ca 52 aa 70 7a c4 e8 89 b2 | ikev2 g^x cf 3d 59 65 f1 b7 65 b1 ff 08 3f df 87 d6 e3 b4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 06 53 6b 3a e9 83 68 db aa 70 45 4d fe 90 0e f2 | IKEv2 nonce c3 a1 be 18 1d d8 e7 bb b9 75 13 f1 bb b6 76 91 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 18 be 44 9b 6e ed 30 b1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b1 | natd_hash: port= 01 f4 | natd_hash: hash= 9d 1b 1a a2 88 2e 9b 85 cb bf 3f e0 58 f8 7a 1a | natd_hash: hash= ca d0 ae de | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9d 1b 1a a2 88 2e 9b 85 cb bf 3f e0 58 f8 7a 1a | Notify data ca d0 ae de | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 18 be 44 9b 6e ed 30 b1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 46 28 df e2 d1 63 c9 0b 29 af bd b8 e5 56 e6 b6 | natd_hash: hash= 34 92 84 18 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 46 28 df e2 d1 63 c9 0b 29 af bd b8 e5 56 e6 b6 | Notify data 34 92 84 18 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #177 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #177: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #177 to 4294967295 after switching state | Message ID: IKE #177 skipping update_recv as MD is fake | Message ID: sent #177 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-177" #177: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.177:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #177) | 18 be 44 9b 6e ed 30 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 07 e3 cb ba 41 f5 29 89 53 b2 f3 1e 5e 07 87 | e1 d5 ed d4 f7 64 97 f7 8a 96 5e a4 19 72 f5 99 | db af d0 a6 4b 51 f7 55 92 f6 5e e0 30 09 2c b6 | 43 a0 4f d7 6f e1 d3 20 57 34 04 7c 3d 9a 99 83 | f9 a3 8a 6a fe fe a9 91 f2 83 44 a1 2d af 4b ef | b0 18 e4 e4 62 e5 83 a7 cf b5 7d ca 15 6b 57 02 | c4 53 c6 7f f4 9f 1d 3d 3b b0 8c b2 2b 17 6d 36 | 19 38 bf 55 ce 8a 72 4f 20 1b a4 9c a2 84 da e5 | 7c f0 4b de 9a 22 9d 10 b8 0c f6 b5 af 79 8d d9 | c7 ca 65 16 d7 e0 a1 a8 7f e6 15 6a 53 ef 5b f4 | a2 b4 0d 9c 61 31 ea 4a 75 b2 62 d9 d6 fe 75 27 | 38 c2 d0 97 b9 a4 b7 2c 60 e6 08 ea 3f 0a 15 59 | f6 77 c4 7c d1 46 84 4f f2 09 1e c0 00 e1 c8 65 | bf 5e 6f 2d 94 6e 4c d7 96 38 7b ba 94 5a e8 e2 | 2f d6 8c 88 2d de 4f ca 52 aa 70 7a c4 e8 89 b2 | cf 3d 59 65 f1 b7 65 b1 ff 08 3f df 87 d6 e3 b4 | 29 00 00 24 06 53 6b 3a e9 83 68 db aa 70 45 4d | fe 90 0e f2 c3 a1 be 18 1d d8 e7 bb b9 75 13 f1 | bb b6 76 91 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 1b 1a a2 88 2e 9b 85 cb bf 3f e0 | 58 f8 7a 1a ca d0 ae de 00 00 00 1c 00 00 40 05 | 46 28 df e2 d1 63 c9 0b 29 af bd b8 e5 56 e6 b6 | 34 92 84 18 | state #177 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34402a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7fec0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7fec0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #177 | libevent_malloc: new ptr-libevent@0x7fb34402a950 size 128 | #177 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49614.054139 | resume sending helper answer for #177 suppresed complete_v2_state_transition() and stole MD | #177 spent 0.471 milliseconds in resume sending helper answer | stop processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c035930 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 18 be 44 9b 6e ed 30 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #177 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #177 | rejected packet: | 18 be 44 9b 6e ed 30 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #177: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e8820 | handling event EVENT_RETRANSMIT for parent state #163 | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #163 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #163 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49614.070346; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001803 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a12c70 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #163 | libevent_malloc: new ptr-libevent@0x7fb34c035930 size 128 "road-eastnet-nonat-163" #163: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #163) | b1 c1 5c f9 4d 0c 91 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 d1 ee ef 57 4d b8 a5 18 99 63 b7 ad a0 31 43 | d2 4c 84 95 c1 56 d8 c2 a0 e0 21 45 55 6c 89 41 | 0a ee 26 bb ae 9b 55 18 51 40 94 3e b5 e8 52 b3 | f5 21 f9 c6 39 17 43 69 05 cf af ff e3 2c 05 76 | 7f cc d0 9f 70 3b df 95 16 de 0c 79 98 56 e5 a0 | 35 3e 81 89 f8 f4 57 f4 b0 38 84 5c 5c 95 c5 75 | db 5d ff 22 a3 04 68 2a 25 a8 ca 43 e9 88 c1 c7 | f1 52 93 65 ec 22 3d 52 6b b8 00 65 57 c2 e3 a8 | 9e 23 a1 b2 55 fc 9b 13 25 aa af 20 21 98 a7 a2 | 67 94 3b 2e 91 84 12 14 99 be b3 af 12 1e 8a 45 | f6 79 09 3e 9e e8 3f fa a3 e8 99 22 6f d9 b8 e7 | 13 bd 62 da a2 36 db a1 c0 b9 40 6d 4f e4 fd e0 | be a7 dc c7 36 bf 14 ea 84 eb 4f 8e 85 9d 9c de | 91 8b 80 a4 7b dc e6 20 7f bc ce 40 33 ff 25 de | 32 53 56 b7 10 56 66 76 3f 7a e3 c4 c5 0e a7 df | 21 e3 47 1d 5c 2e 41 54 d0 87 c6 c9 9f 14 d5 5a | 29 00 00 24 cf 96 ac 26 a7 c4 21 b6 9b dc fc 7a | 6b 63 82 8c ca 2e ba 40 54 d7 a8 1f 94 42 b0 f9 | 02 a1 4a 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 05 f9 8b c8 3a 1a ac 16 65 f3 b7 | 0f 08 b9 7b 40 ca e7 92 00 00 00 1c 00 00 40 05 | 34 4b bc c5 91 2d b9 5e a5 87 8c 3c 9e 2e e2 11 | d1 e0 38 4e | libevent_free: release ptr-libevent@0x7fb3540300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e8820 | #163 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 c1 5c f9 4d 0c 91 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #163 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #163 | rejected packet: | b1 c1 5c f9 4d 0c 91 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #163: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a32290 | handling event EVENT_RETRANSMIT for parent state #119 | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #119 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #119 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49614.087687; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00336 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ef4e0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #119 | libevent_malloc: new ptr-libevent@0x7fb3540300e0 size 128 "road-eastnet-nonat-119" #119: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #119) | ec af 1e 58 4f bc 16 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee 25 46 13 3c ef fe 01 ba 63 b1 50 ca a7 dd f5 | 7a b0 49 43 35 e3 74 57 d0 52 bc 3a b2 ee 6b 2d | 57 80 2f df 71 ea 94 b3 0a 0c 7b 41 50 c2 f6 7a | 6e 96 5b 3d 0d 51 9a 0b a0 fa d0 8d d8 98 f0 45 | d5 fa eb 0a f5 ea 33 8d ee 1d 3f cb 09 35 dc f7 | 0d a7 89 25 f9 a6 f9 a3 0f 9a 3d b0 bb 98 db 2a | 8f f4 ad 7f 6a ae b3 bd df 23 e8 8d 52 72 79 9f | 3d 34 85 f2 e2 b4 d7 cc 39 ee a0 dc 64 4f fa 2a | a9 30 c6 c2 7a 7a 1d cd 26 c0 0f 55 58 ed 9d 22 | c6 a1 9c 81 01 bd 16 3d 36 47 70 a1 46 0d 07 ca | 5c 2f 9d 3c 24 d8 e7 19 57 44 18 a0 58 ed b0 c8 | 65 f2 98 6e 64 04 01 87 4d c3 6e 78 76 c5 fa ee | ff 60 94 9e 6a fc 5b 5e 1a 15 3a a6 4d fe ba 28 | 39 70 2d 49 9e b7 11 89 3d 89 a8 26 59 f3 51 ef | 05 36 27 99 84 62 16 13 24 49 d2 7d b9 18 a2 21 | 0f 0d 2a 9a 79 02 d0 e1 a1 af ee 7c 84 e5 76 9a | 29 00 00 24 93 ff 34 01 41 de 6e 58 b7 82 d5 c2 | 8a 60 ef 17 fc 48 d2 4e 23 80 6e 54 cf 7a 62 03 | 64 73 a8 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 43 1b c4 4b b2 17 2e 38 4e 57 6d | 6b 77 1d 82 1a c2 9c 87 00 00 00 1c 00 00 40 05 | f7 09 55 f2 00 b0 ce 9f d1 9c 54 d7 51 50 ae 6b | e8 b4 0e d9 | libevent_free: release ptr-libevent@0x7fb37c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a32290 | #119 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec af 1e 58 4f bc 16 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #119 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #119 | rejected packet: | ec af 1e 58 4f bc 16 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #119: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd80 | handling event EVENT_RETRANSMIT for parent state #148 | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #148 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #148 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49614.100079; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002569 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a32290 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #148 | libevent_malloc: new ptr-libevent@0x7fb37c009640 size 128 "road-eastnet-nonat-148" #148: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #148) | 7c 0d 88 21 0c f2 96 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 04 bc 64 c4 a9 25 09 2d 75 95 3b 11 b4 ff 15 | 97 7a 18 93 a6 88 e9 2c b9 6a 56 2f 0c f9 8a d8 | e8 e9 8c f3 6e a2 1a 4d de 32 b3 62 b7 1f cf 21 | 58 10 7d f4 24 b5 81 70 c7 68 14 37 9d fd 00 6b | b4 bb f2 40 cc b3 6b 23 df e5 3d 42 b5 d1 d7 42 | c0 5c ac 6a f7 66 60 50 9f bf be d5 78 f9 b4 31 | b1 86 de 30 ed 54 6a fc f4 65 4d b6 71 b3 0e 10 | 8b ff f6 ba 06 b3 35 4f f4 27 dc 02 7d 26 88 9b | ce 4c 6b f4 f0 e1 8d 43 1e f3 4c 5f ec 71 b9 2c | e9 3b 85 fd 08 23 e1 df 81 46 1d 11 72 44 8f d9 | 74 89 1c 9f d5 79 90 5f cf 86 54 f4 23 c9 c4 31 | af 2e 84 a4 ff ec cf b7 ba 60 46 0a 15 eb 88 9e | 1a 9f 61 a8 80 c2 60 68 d5 be 6e 09 41 6f c1 fc | 1b 37 54 8c 93 b5 3d fd bd 96 aa 9b bc 05 8d 2f | 00 4c 54 bb 3b 96 94 4f 45 ac 6c 6e b1 21 ad e3 | 8b d3 f2 47 fe 35 bf 98 09 a6 a6 c8 c9 12 c2 70 | 29 00 00 24 b1 81 e7 c9 15 f6 0b 96 d5 74 cc 65 | 51 5c df 58 13 0b 15 8c 15 4d e2 64 8b 9f d6 7a | 91 6a aa 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 56 10 9c c6 bc 82 78 34 d0 03 57 | 7a d1 bd 45 e3 1a b3 5c 00 00 00 1c 00 00 40 05 | 74 be 93 cb aa 1f 0e 04 cc 93 49 b7 b1 e0 d6 3d | b3 9a 6d 48 | libevent_free: release ptr-libevent@0x7fb35c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd80 | #148 spent 0.186 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 0d 88 21 0c f2 96 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #148 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #148 | rejected packet: | 7c 0d 88 21 0c f2 96 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #148: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0509 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #66 | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #66 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #66 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49614.104469; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007995 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd80 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #66 | libevent_malloc: new ptr-libevent@0x7fb35c02a950 size 128 "road-eastnet-nonat-66" #66: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #66) | 64 fc 26 82 c6 65 9b e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 5c 42 12 a8 cf 54 30 35 41 88 3e 73 38 e5 58 | 88 e1 84 4c b4 74 fd b0 fa c4 88 6f 83 90 67 ee | ea 08 5d 03 f5 21 c1 48 f4 fa d9 68 de f8 02 e9 | 20 8c 8f 00 bb e0 27 04 09 fe 8d f2 a1 9c cf 02 | 35 98 ce 70 23 87 ee fc 94 cd 0c 7b 9f 06 08 77 | f2 7f c2 13 7f e1 04 f8 2f 23 ef 1d fb 54 4c 0d | ac 20 e0 c8 bd 84 3e ce b6 49 37 85 56 01 f1 9b | ac 54 85 9c fd 7d 5d 63 30 bd f9 4d d5 7a c1 a0 | 6c 64 e9 25 18 ed 7b 3f 1a a2 52 c0 47 b8 c4 ff | 46 70 76 9b eb db 63 e5 d9 0f fb e2 44 f2 65 5e | ab 82 c1 e9 45 5a aa 38 88 06 f2 1d 2e 7b 75 16 | bf 94 df 07 bd 89 cd 9e ba b0 6c 38 fc 80 69 75 | 55 88 bd 23 1e bc ab 76 6d 9e ce 05 ea ee d0 f1 | 1a bd 0c b1 86 63 56 69 8c 5f 2e 8a f5 e2 c1 97 | 10 bc e7 eb 71 fb 81 cd 25 de 9b 6d 12 04 dd ce | 36 90 99 3b a3 2d 73 4a 99 7b f0 18 dc 83 2b 7d | 29 00 00 24 64 f2 bd 07 f3 b0 6e 75 d4 40 2c d9 | f4 e5 3f 9a 4d aa 41 b2 3f a1 6e 03 4f 7d 3f ec | 58 37 55 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d dc 62 51 f8 7c c3 1c 6d 46 26 31 | c0 6e bd 6d 19 0c cf 42 00 00 00 1c 00 00 40 05 | 76 be 2b c3 74 ff 88 3d a8 f9 74 84 97 f5 dc 48 | 6c 56 c4 9c | libevent_free: release ptr-libevent@0x7fb34c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | #66 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 fc 26 82 c6 65 9b e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #66 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #66 | rejected packet: | 64 fc 26 82 c6 65 9b e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #66: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61bd0 | handling event EVENT_RETRANSMIT for parent state #171 | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #171 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #171 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49614.112813; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500735 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #171 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 "road-eastnet-nonat-171" #171: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #171) | 60 ea a0 b8 11 41 67 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 a6 a0 3d a3 d3 f7 3a 92 38 69 11 fc c0 0a e6 | ae 99 13 7e 46 80 4c 8f eb cb 1b a4 6d 5c fc 08 | ec 45 f4 48 c3 e3 73 a8 1a d3 f7 7f 3a 28 95 0f | b3 2e 82 89 be a5 d3 a6 ab 70 83 ad 3e e2 73 a1 | 73 7c b9 be d5 96 dd de 07 cc fe da 6e 65 6b 76 | 25 27 16 21 7c ef 70 24 a4 77 29 aa 15 d7 7b a8 | 16 72 3e d5 01 58 3c 97 7b 78 28 15 2b 7d 70 03 | 64 96 9b 75 19 62 f5 2d d6 23 a9 0d ca a5 9a 70 | a6 bd cc 03 9b 58 60 ee fc 9f 9e d6 00 fa 23 02 | 63 d3 b6 b9 2c b8 b0 66 04 8e 85 03 2d 8a 3b 14 | f1 66 74 61 f6 ab 2b 8f f8 31 4b 0b da 07 ed 98 | a3 08 1a 85 f1 f2 be 38 18 37 9b 13 eb 17 a9 c3 | c0 a5 db c8 dd 9c 88 27 54 50 ba 9a 47 c0 2c 00 | d1 c4 c3 04 be b5 8f d9 f7 25 9c ae 45 27 ee 47 | a2 c2 11 cc 79 aa fd 06 ae ea 3a 65 e0 36 c3 05 | dd d3 e2 dd c1 bd 1f da b7 d1 ff 87 93 0f c5 00 | 29 00 00 24 f4 77 f4 2a e1 ad 87 d1 e0 b8 f3 03 | 93 45 a7 36 54 7e 24 81 6c 5d 13 c9 3a 4c ab c2 | 28 19 06 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 9a 54 5d 74 7c 3e 57 ce 44 f1 6a | b5 dc 40 d6 fc 98 8f 10 00 00 00 1c 00 00 40 05 | ab ff fc 00 2d 34 de 32 ad 3a 53 9d f5 35 ab 6e | 4f ce 82 8b | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61bd0 | #171 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 60 ea a0 b8 11 41 67 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #171 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #171 | rejected packet: | 60 ea a0 b8 11 41 67 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #171: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #164 | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #164 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #164 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49614.133149; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001612 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #164 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 "road-eastnet-nonat-164" #164: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #164) | 44 ec da ac e4 4e 81 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 94 19 dd 63 76 e7 8b e4 83 63 43 89 b2 25 2d | cf 02 f9 4f bb e0 9f 71 73 45 f7 70 9f f0 9c 56 | 36 6b be c1 42 fc 0e 64 e7 c2 6d 24 a0 c6 36 60 | f7 b6 44 63 1f f0 38 ff c1 f7 6f 09 6f 4b 15 6f | 4b a9 13 86 3c 04 b4 e0 2d 41 b8 5f 44 ac d3 1c | 62 7f f8 b0 79 c8 65 ec 61 21 a8 52 27 b3 79 db | 53 67 7e 4f 89 b2 45 b9 ee 3a 63 76 a6 cd 73 36 | 58 41 37 8e 8c 8a ef d6 60 54 ff 74 54 a2 07 6a | 56 54 10 22 af 8e 9e 38 af 48 a8 f2 42 f1 a6 05 | c8 55 0c 92 44 27 a3 4d be a5 b4 50 92 f3 bb 45 | b6 87 15 6c 92 a5 f1 21 ba 44 19 05 5c 4c f2 dd | 7d 64 1c 49 e3 61 8b 21 2c ef 63 14 91 93 e6 e8 | 84 82 9f 30 40 50 49 82 eb b8 19 d0 b6 4a c4 be | 05 18 e6 9d 08 3f bb c7 7a 98 44 e5 42 f9 eb fa | fc 80 53 22 fc 7c b9 e3 92 39 dd 88 61 10 2d 74 | 06 8e 96 3a 48 45 58 41 40 85 53 83 03 19 1d 49 | 29 00 00 24 e5 04 5f 5d b9 93 eb b6 f3 88 8f 81 | b6 50 c2 5a e0 91 27 94 ef 3b 1e 82 c9 33 1d 99 | 72 cc f9 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 cd 86 69 c3 fa 02 39 bf fc f5 08 | 1b bd f9 dc 60 39 91 12 00 00 00 1c 00 00 40 05 | 76 11 49 93 b0 52 97 cc bc 0b 84 d2 15 33 08 b4 | 9a f9 d3 5b | libevent_free: release ptr-libevent@0x7fb364035750 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | #164 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ec da ac e4 4e 81 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #164 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #164 | rejected packet: | 44 ec da ac e4 4e 81 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #164: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-178" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-178' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #178 at 0x557d46ac74c0 | State DB: adding IKEv2 state #178 in UNDEFINED | pstats #178 ikev2.ike started | Message ID: init #178: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #178: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #178; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-178" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-178" IKE SA #178 "road-eastnet-nonat-178" "road-eastnet-nonat-178" #178: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-178 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-178": constructed local IKE proposals for road-eastnet-nonat-178 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 178 for state #178 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a01150 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #178 | libevent_malloc: new ptr-libevent@0x7fb364035750 size 128 | #178 spent 0.165 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-178" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.25 milliseconds in whack | crypto helper 12 resuming | crypto helper 12 starting work-order 178 for state #178 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 178 | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 178 time elapsed 0.00081 seconds | (#178) spent 0.818 milliseconds in crypto helper computing work-order 178: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 178 for state #178 to event queue | scheduling resume sending helper answer for #178 | libevent_malloc: new ptr-libevent@0x7fb3400357c0 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #178 | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 178 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #178 | **emit ISAKMP Message: | initiator cookie: | ca 8e d5 21 04 56 f5 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-178 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 24 67 d8 60 5f 40 63 92 f2 6d b4 ba f5 02 b8 ef | ikev2 g^x 38 7a 12 cd 11 ce 9d 9b 17 62 5f df 94 e9 07 b5 | ikev2 g^x 67 9d c2 aa a5 fe a1 11 f4 ad b8 0d 63 27 26 1e | ikev2 g^x d8 17 fe 6f e7 68 09 0e 02 53 a4 bf 49 a0 db 19 | ikev2 g^x df 91 5e e9 b7 6f eb 81 53 29 3b eb 8c 48 64 ce | ikev2 g^x 19 01 46 02 e1 7d 00 12 d7 22 72 65 96 38 74 47 | ikev2 g^x fc 95 5b de f7 59 12 e1 89 c8 7c b4 26 93 4b 67 | ikev2 g^x 78 1e d0 18 c0 19 90 65 2b 34 10 55 57 cb 01 6d | ikev2 g^x c4 3f b5 2b 33 1e 80 2e 70 90 f3 a0 65 bd de 46 | ikev2 g^x 7d 2e 31 80 28 5c 82 45 70 58 e1 27 1c 57 b4 3b | ikev2 g^x 35 12 78 64 02 e3 69 39 84 d2 f4 a5 19 f1 96 0b | ikev2 g^x b4 1f 01 e4 be d8 4f ee 70 c6 2d 15 1b 96 dd 0a | ikev2 g^x 64 1f 43 c4 0e c9 83 9e ef 67 e0 c2 2c f3 12 d0 | ikev2 g^x 79 5e f6 25 ee e3 f8 a3 fa 94 d3 a2 a3 89 7b 98 | ikev2 g^x 74 09 e9 86 33 de 66 6c 13 2b 07 44 f9 44 67 9b | ikev2 g^x 43 01 93 ea 4d 3f aa bd f6 c6 55 44 dd 66 4b d4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2e 3d 1e d2 58 00 63 7b ef e7 79 ba 26 0d 83 e4 | IKEv2 nonce 01 3b ff 2b eb 29 12 83 06 3e 6a dc 34 f9 2f 89 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ca 8e d5 21 04 56 f5 f2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b2 | natd_hash: port= 01 f4 | natd_hash: hash= 53 2f 67 46 e9 ec d0 44 c4 cc 2f 43 d4 84 bf d5 | natd_hash: hash= 2b 37 9d e7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 53 2f 67 46 e9 ec d0 44 c4 cc 2f 43 d4 84 bf d5 | Notify data 2b 37 9d e7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ca 8e d5 21 04 56 f5 f2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 39 35 73 9e a6 30 0e 5d 9d 4e 3c 93 77 b7 78 c9 | natd_hash: hash= 08 75 bf c2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 39 35 73 9e a6 30 0e 5d 9d 4e 3c 93 77 b7 78 c9 | Notify data 08 75 bf c2 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #178 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #178: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #178 to 4294967295 after switching state | Message ID: IKE #178 skipping update_recv as MD is fake | Message ID: sent #178 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-178" #178: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.178:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #178) | ca 8e d5 21 04 56 f5 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 67 d8 60 5f 40 63 92 f2 6d b4 ba f5 02 b8 ef | 38 7a 12 cd 11 ce 9d 9b 17 62 5f df 94 e9 07 b5 | 67 9d c2 aa a5 fe a1 11 f4 ad b8 0d 63 27 26 1e | d8 17 fe 6f e7 68 09 0e 02 53 a4 bf 49 a0 db 19 | df 91 5e e9 b7 6f eb 81 53 29 3b eb 8c 48 64 ce | 19 01 46 02 e1 7d 00 12 d7 22 72 65 96 38 74 47 | fc 95 5b de f7 59 12 e1 89 c8 7c b4 26 93 4b 67 | 78 1e d0 18 c0 19 90 65 2b 34 10 55 57 cb 01 6d | c4 3f b5 2b 33 1e 80 2e 70 90 f3 a0 65 bd de 46 | 7d 2e 31 80 28 5c 82 45 70 58 e1 27 1c 57 b4 3b | 35 12 78 64 02 e3 69 39 84 d2 f4 a5 19 f1 96 0b | b4 1f 01 e4 be d8 4f ee 70 c6 2d 15 1b 96 dd 0a | 64 1f 43 c4 0e c9 83 9e ef 67 e0 c2 2c f3 12 d0 | 79 5e f6 25 ee e3 f8 a3 fa 94 d3 a2 a3 89 7b 98 | 74 09 e9 86 33 de 66 6c 13 2b 07 44 f9 44 67 9b | 43 01 93 ea 4d 3f aa bd f6 c6 55 44 dd 66 4b d4 | 29 00 00 24 2e 3d 1e d2 58 00 63 7b ef e7 79 ba | 26 0d 83 e4 01 3b ff 2b eb 29 12 83 06 3e 6a dc | 34 f9 2f 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 2f 67 46 e9 ec d0 44 c4 cc 2f 43 | d4 84 bf d5 2b 37 9d e7 00 00 00 1c 00 00 40 05 | 39 35 73 9e a6 30 0e 5d 9d 4e 3c 93 77 b7 78 c9 | 08 75 bf c2 | state #178 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb364035750 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a01150 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #178 | libevent_malloc: new ptr-libevent@0x7fb364035750 size 128 | #178 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49614.141931 | resume sending helper answer for #178 suppresed complete_v2_state_transition() and stole MD | #178 spent 0.432 milliseconds in resume sending helper answer | stop processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3400357c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca 8e d5 21 04 56 f5 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #178 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #178 | rejected packet: | ca 8e d5 21 04 56 f5 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #178: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0504 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37000d120 | handling event EVENT_RETRANSMIT for parent state #120 | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #120 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #120 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49614.15513; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003692 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e8820 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #120 | libevent_malloc: new ptr-libevent@0x7fb3400357c0 size 128 "road-eastnet-nonat-120" #120: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #120) | 87 fa a7 32 05 23 14 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec 6c 11 66 a6 95 d9 e6 e2 88 b9 98 2a 60 c1 38 | c4 e7 6d c7 8d 08 5f c7 b2 af 28 df 28 55 74 6b | 75 22 9e ab 67 eb 95 72 f6 3e 95 b3 15 85 4f d6 | c1 c3 2d 9e 07 29 16 41 13 5e bb cf c0 e6 4f 24 | 10 cc 57 fd 9c ba 63 ce ec 86 10 c7 d4 7c 34 a8 | a5 5b fd 1f 33 3b a2 f8 03 46 9a 66 74 53 5d 27 | bd d8 93 4e 14 8b 45 9a 6d ce b3 cb 29 f0 cc 6c | 0a 42 f4 3b 31 46 fc ae db a9 72 48 29 6a 06 1a | 3f 35 fb 97 be 23 c9 c4 df 59 9b d7 24 09 d8 73 | f7 9d 98 e5 b5 21 68 b6 e2 c9 13 2b 11 7a 73 1b | e9 35 93 72 82 45 b9 27 a7 9d a4 9d 09 5e 20 78 | 29 0e a5 bd 44 31 dd 75 00 a1 c2 9f 09 4f 24 eb | 16 42 da bf 3a 12 d4 84 33 67 7f 85 66 00 36 74 | 79 21 73 94 9b df b2 a9 01 30 1b db 75 7a 3d 46 | 6c 6c eb ca 16 ae 1a 85 9f eb e5 ef 46 e7 91 51 | ee 18 48 f1 20 6b 2b c6 77 fb 41 ba bd 6b 56 4e | 29 00 00 24 6f c3 ef a5 ff 17 51 3e dd e4 5e c3 | e4 15 2b 4d c5 b5 58 85 08 f4 21 f4 d7 43 b1 43 | 4c 64 51 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 47 24 d0 22 75 93 6e dd 7d f7 25 | 7b 0d 80 0a 15 3a a3 09 00 00 00 1c 00 00 40 05 | 8f c4 23 24 1b 0a 54 8e c8 2f b2 b8 ec 80 e9 f3 | ca 99 ed fd | libevent_free: release ptr-libevent@0x7fb370012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37000d120 | #120 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 fa a7 32 05 23 14 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #120 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #120 | rejected packet: | 87 fa a7 32 05 23 14 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #120: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0655 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ec960 | handling event EVENT_RETRANSMIT for parent state #67 | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #67 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #67 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49614.164463; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004616 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37000d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #67 | libevent_malloc: new ptr-libevent@0x7fb370012840 size 128 "road-eastnet-nonat-67" #67: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #67) | d5 dc 19 08 bd ef 9f dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 15 d2 0d 8c 5c 68 38 3d 2d 2f ab 03 65 12 47 | 3e b1 d3 f9 3a 86 7c eb 4f 39 8c ad 4d 38 70 41 | d1 7d 9c 72 4f 83 e4 6c 89 f6 b0 17 b5 42 16 02 | 98 46 bb 9b ed 5c 3f ac 09 0d be a1 fd 38 36 65 | 29 1c 76 c9 62 fc be 23 07 ff 11 92 31 9b 27 f0 | d5 89 d4 07 37 e6 d9 c5 11 e2 68 cc f6 fa 8f ad | d4 d7 3d 81 a6 50 a2 3b 0c 6d a4 dc e7 02 2c 0e | b0 92 5d 4d d1 8c bc b1 d3 8b 8b 57 d6 a3 1b fb | 45 de 41 0c 4c 00 09 3b b7 02 6a 18 be d3 e2 bf | 60 42 87 71 10 49 5d 99 2a 98 69 45 a3 b9 8a 57 | c3 e1 71 dc 21 28 e6 7b 37 29 eb da 68 00 eb 12 | 52 79 13 c3 54 c6 f4 5a 0f 77 f8 92 a7 c4 70 9c | 42 51 17 18 c9 d7 b0 85 26 54 bb 62 a6 c6 48 68 | 6f 63 77 09 be 06 39 71 28 8e 68 84 3f f2 9b 78 | 53 a2 0d 5b a4 87 76 9f e3 e1 57 84 7f 83 44 ad | 59 6d db cc b7 ca a2 5b d9 9b 67 9f f8 59 1b 8c | 29 00 00 24 ea 05 1a 8b a3 08 e1 05 bd ec 39 06 | dc 75 19 c7 61 25 8f 0d bb ee a8 4f 1e a0 d7 a0 | e4 5f a7 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c a1 13 b6 f8 7a c8 5e ab 0d 26 ff | 9e 2c 49 6a b7 74 41 36 00 00 00 1c 00 00 40 05 | 1e 6d d9 18 71 66 9b 77 ce ef 92 9d c1 b1 8d 12 | ab 9b 0c 2a | libevent_free: release ptr-libevent@0x7fb3380251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ec960 | #67 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 dc 19 08 bd ef 9f dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #67 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #67 | rejected packet: | d5 dc 19 08 bd ef 9f dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #67: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338005860 | handling event EVENT_RETRANSMIT for parent state #149 | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #149 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #149 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49614.167782; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003073 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abfd80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #149 | libevent_malloc: new ptr-libevent@0x7fb3380251c0 size 128 "road-eastnet-nonat-149" #149: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #149) | ec 1b 62 37 44 a3 17 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 08 91 37 b8 3d c4 a5 fb 8f 59 2b cb c4 ee a3 | 59 01 01 81 cd 69 2d 85 93 60 f7 65 1f 64 aa eb | 93 60 17 84 59 2d ec 44 26 cf 20 fe db 7e d9 f6 | 7d a2 69 c3 4c ed d8 f3 0a 6b d4 5b e7 47 78 e3 | 80 3c 2c 01 cd d6 a8 65 7e cc 13 22 72 38 45 64 | 17 76 db 68 fd 9e 02 c1 4e e0 91 4f 14 0c 06 72 | 4e df 03 59 bc 72 4f af 9f 27 39 bd 57 c8 9d e1 | 90 f7 3b a1 d1 79 66 94 af 42 c3 62 cd d5 2d cd | ac 6c ea d6 94 1b f4 91 4d ad 49 21 48 4b 36 1c | 53 18 c6 23 73 5e 40 ed e6 7e 6a 25 d8 dd ef 07 | 7d 88 f4 a9 e1 ff e9 29 7d 10 cf 47 92 a2 72 35 | 95 c9 53 7e 8d f1 bb ba 54 1d 40 b5 a0 d1 1e d9 | 0b 86 d8 2d 01 1a 34 e1 77 f0 c8 57 84 a9 f4 dc | 35 1f 8e bc 5d f2 ca 58 ec a1 ad a9 cd 45 4a 2d | 23 38 26 ab df a9 05 75 cd 84 d4 66 7c be 9c f9 | 7f e7 96 6a 2b a4 d6 b4 04 50 ef ba e8 3c eb 60 | 29 00 00 24 f6 11 7c 5d 38 85 36 80 dd ed f7 d5 | 65 1c 39 a3 95 3d e4 a2 88 84 cf 2f 03 e4 0d 86 | 6f f9 18 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 49 c3 fc 0d 4b 5b dd c8 8b e4 44 | 1a 6a 18 02 f4 d1 ea f3 00 00 00 1c 00 00 40 05 | 4e f4 0c 8d 48 4d 9f e4 0b 19 05 64 48 99 98 79 | d2 ff 3d 6d | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338005860 | #149 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 1b 62 37 44 a3 17 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #149 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #149 | rejected packet: | ec 1b 62 37 44 a3 17 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #149: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #172 | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #172 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #172 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49614.181083; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501266 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #172 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-172" #172: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #172) | 47 43 39 2e 38 d9 e4 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 65 17 b4 48 89 eb 1e b2 78 b8 1e 15 3a 4a a1 | a2 3a fd 43 76 59 59 a1 75 7a 16 45 66 68 dc 97 | f3 bc ee bc d4 e0 57 41 47 eb 59 3e b3 f4 36 c1 | 10 8f 59 fc 57 3a 37 29 71 bf ce 33 91 c2 37 65 | 5c 9c 9f 71 6e b0 1d 6c 6c ed 90 b3 bd fc 22 6b | 94 91 98 6d a1 2f c5 a8 ca 58 04 fa 18 79 03 0a | 3e 27 a9 a6 f4 08 b2 f5 32 35 e8 b7 83 a3 4b c7 | 82 d2 5d ed b4 7c af 9d be b8 23 49 75 bb 7f 62 | 0e b3 38 1c ec 9d 39 3b f4 04 b7 d0 93 52 70 e6 | 23 bb 4d 7f 7c 2a 5e ec cb 0d 74 24 7b 07 99 42 | 6c 43 eb 64 ec ce f6 41 88 91 d0 50 22 25 43 54 | aa b8 db 3d b2 e3 bd ee 47 71 69 be 83 a3 d8 90 | 99 79 30 84 6a ac 04 1b 20 13 06 10 f1 e1 43 b3 | 50 14 89 62 82 b4 57 81 1e 80 23 23 72 24 b5 3b | 66 27 db 5a d9 e0 9f 07 96 df 6b d0 43 88 1d 6c | 19 73 59 ba d5 80 1f b5 38 2f da 5f 85 a1 ce d0 | 29 00 00 24 54 d0 27 67 15 cd c6 d9 d3 f4 1c e0 | 4e b2 db 81 71 2f 53 78 96 2e b8 d9 e9 fc be ad | 28 73 0e 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 71 7f 76 8f b4 09 cb 9b d9 d3 22 | dc b5 61 93 71 75 88 d5 00 00 00 1c 00 00 40 05 | df a3 69 ab bf ad 58 61 9f ed 54 03 7c e8 ac 70 | c8 e7 d2 fb | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | #172 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 43 39 2e 38 d9 e4 43 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #172 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #172 | rejected packet: | 47 43 39 2e 38 d9 e4 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #172: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a67370 | handling event EVENT_RETRANSMIT for parent state #165 | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #165 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #165 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49614.199382; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00091 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #165 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 "road-eastnet-nonat-165" #165: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #165) | 84 89 ec 12 36 85 f6 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 64 07 de ac 8a b1 da f5 cd 1e 8a 72 06 02 07 | b4 71 02 7a d1 b4 70 86 ed 7c e5 04 db 06 11 b0 | 70 66 08 44 59 b7 49 22 d3 ba f4 ee ab fa 59 73 | b1 06 c3 8e 52 a6 3b 08 b7 93 04 a1 45 f3 91 38 | 82 d7 95 0c b3 fe bf fd 60 7f 15 7a b2 c9 6e 96 | 31 f3 92 9f 9b d4 51 14 46 6d a7 f8 2c 3c c3 fe | 86 c5 71 52 b8 28 62 77 5e 36 d1 7b 6a db 03 2c | f5 d4 3e 3d 1f 4e cb e7 cf b8 d2 9f e6 10 67 e1 | a3 1a 3a 9b e2 59 8a f3 f7 c0 58 cc fc 02 e0 b1 | da aa 4f e9 d2 86 5e 94 d6 73 96 ea 14 32 c4 4e | 3d c9 38 94 c5 47 af 83 6c ee e9 2a a3 8b e4 12 | f9 91 c1 53 48 67 8c 42 6e c0 7e 45 20 2e 6a a6 | d3 98 3e 6d d1 40 3d 9d 84 9f 54 62 49 b6 f8 67 | 32 fb 70 e2 78 08 b2 de c4 3e 70 08 0b 45 41 d7 | 34 49 14 7d a4 bf 53 d6 45 c5 fb 03 1e ef d6 06 | 6f 22 f9 f9 7c 4f e3 63 ea 02 1e 63 6e 3d 4d 36 | 29 00 00 24 a3 25 18 45 df 55 70 c4 52 41 87 e0 | ac 0c cb c2 e9 c1 36 19 df a3 78 76 61 ca c0 73 | a3 74 0a f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 2e 20 30 11 5b 47 b9 0d c9 d3 63 | b9 57 85 b4 89 e5 03 11 00 00 00 1c 00 00 40 05 | 69 81 91 3b c9 31 0b 05 42 34 36 76 be 6a 34 94 | 71 f5 f0 25 | libevent_free: release ptr-libevent@0x7fb358035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a67370 | #165 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 89 ec 12 36 85 f6 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #165 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #165 | rejected packet: | 84 89 ec 12 36 85 f6 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #165: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0665 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-179" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-179' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #179 at 0x557d46ac8a80 | State DB: adding IKEv2 state #179 in UNDEFINED | pstats #179 ikev2.ike started | Message ID: init #179: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #179: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #179; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-179" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-179" IKE SA #179 "road-eastnet-nonat-179" "road-eastnet-nonat-179" #179: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-179 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-179": constructed local IKE proposals for road-eastnet-nonat-179 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 179 for state #179 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a67370 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #179 | libevent_malloc: new ptr-libevent@0x7fb358035930 size 128 | crypto helper 5 resuming | crypto helper 5 starting work-order 179 for state #179 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 179 | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 179 time elapsed 0.000798 seconds | (#179) spent 0.638 milliseconds in crypto helper computing work-order 179: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 179 for state #179 to event queue | scheduling resume sending helper answer for #179 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 | crypto helper 5 waiting (nothing to do) | #179 spent 0.145 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-179" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.23 milliseconds in whack | processing resume sending helper answer for #179 | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 179 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #179 | **emit ISAKMP Message: | initiator cookie: | b7 0c 53 b0 d6 55 ba e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-179 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d5 e7 aa 3a d2 93 3a b1 f3 2d ef 15 4a db bc fb | ikev2 g^x 18 f2 f0 2f d7 d8 6d f1 e0 2e 7d 29 59 b1 d6 21 | ikev2 g^x e4 35 ac b2 5c fa 8c 68 d7 56 48 2c 90 1a 63 31 | ikev2 g^x 37 9f fa 36 a0 bf f8 7e a9 36 73 05 48 39 6c 08 | ikev2 g^x e9 ae 8d 6f c7 ab 9c 0b dc b9 88 2c 91 ea 94 a4 | ikev2 g^x 59 7b a5 d7 8e b8 d2 97 70 12 0b 31 b0 2a d1 31 | ikev2 g^x eb e4 69 dc 81 ca 29 66 be 80 6d 1a c2 c0 f9 06 | ikev2 g^x 99 5a 19 63 89 a6 4b 85 38 ed a4 d0 df b0 06 34 | ikev2 g^x 93 de d4 51 e8 02 b6 ef 9c b9 23 ed 94 d4 3f 30 | ikev2 g^x ed 82 5a 99 89 3b af 7c 11 96 d9 f0 92 93 d2 4f | ikev2 g^x 04 c6 5c f3 49 5b 49 5d bc f7 66 01 86 c2 c8 a2 | ikev2 g^x d8 ee 9a a2 a9 a0 e8 45 16 a7 7f a0 45 50 f6 f0 | ikev2 g^x 8b 1c 98 0a f0 a8 07 43 b8 bc ec e9 38 ec 58 b8 | ikev2 g^x 3b 0d b2 96 d1 71 70 f7 1c 22 9f 03 fc f8 39 95 | ikev2 g^x 81 cb 62 38 1d 55 75 60 24 db a4 45 80 e8 81 2f | ikev2 g^x df c7 ac c2 4c be 19 14 89 79 da 68 5f ad f7 81 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce af 43 c4 7a 3d 3b b5 29 a0 89 4a e7 b1 1d 19 14 | IKEv2 nonce 88 65 8d 60 36 ce d7 11 01 48 56 1b 05 16 7d 49 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b7 0c 53 b0 d6 55 ba e5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b3 | natd_hash: port= 01 f4 | natd_hash: hash= 51 78 e7 1d 9d 7c 1d 2a b3 39 b5 dd b4 d7 38 76 | natd_hash: hash= a1 49 48 f7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 51 78 e7 1d 9d 7c 1d 2a b3 39 b5 dd b4 d7 38 76 | Notify data a1 49 48 f7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b7 0c 53 b0 d6 55 ba e5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 86 2a 8d 44 0e a3 13 1a 2d e3 72 66 a4 35 f9 18 | natd_hash: hash= 8b 41 6c dc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 86 2a 8d 44 0e a3 13 1a 2d e3 72 66 a4 35 f9 18 | Notify data 8b 41 6c dc | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #179 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #179: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #179 to 4294967295 after switching state | Message ID: IKE #179 skipping update_recv as MD is fake | Message ID: sent #179 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-179" #179: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.179:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #179) | b7 0c 53 b0 d6 55 ba e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 e7 aa 3a d2 93 3a b1 f3 2d ef 15 4a db bc fb | 18 f2 f0 2f d7 d8 6d f1 e0 2e 7d 29 59 b1 d6 21 | e4 35 ac b2 5c fa 8c 68 d7 56 48 2c 90 1a 63 31 | 37 9f fa 36 a0 bf f8 7e a9 36 73 05 48 39 6c 08 | e9 ae 8d 6f c7 ab 9c 0b dc b9 88 2c 91 ea 94 a4 | 59 7b a5 d7 8e b8 d2 97 70 12 0b 31 b0 2a d1 31 | eb e4 69 dc 81 ca 29 66 be 80 6d 1a c2 c0 f9 06 | 99 5a 19 63 89 a6 4b 85 38 ed a4 d0 df b0 06 34 | 93 de d4 51 e8 02 b6 ef 9c b9 23 ed 94 d4 3f 30 | ed 82 5a 99 89 3b af 7c 11 96 d9 f0 92 93 d2 4f | 04 c6 5c f3 49 5b 49 5d bc f7 66 01 86 c2 c8 a2 | d8 ee 9a a2 a9 a0 e8 45 16 a7 7f a0 45 50 f6 f0 | 8b 1c 98 0a f0 a8 07 43 b8 bc ec e9 38 ec 58 b8 | 3b 0d b2 96 d1 71 70 f7 1c 22 9f 03 fc f8 39 95 | 81 cb 62 38 1d 55 75 60 24 db a4 45 80 e8 81 2f | df c7 ac c2 4c be 19 14 89 79 da 68 5f ad f7 81 | 29 00 00 24 af 43 c4 7a 3d 3b b5 29 a0 89 4a e7 | b1 1d 19 14 88 65 8d 60 36 ce d7 11 01 48 56 1b | 05 16 7d 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 78 e7 1d 9d 7c 1d 2a b3 39 b5 dd | b4 d7 38 76 a1 49 48 f7 00 00 00 1c 00 00 40 05 | 86 2a 8d 44 0e a3 13 1a 2d e3 72 66 a4 35 f9 18 | 8b 41 6c dc | state #179 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb358035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a67370 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ec960 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #179 | libevent_malloc: new ptr-libevent@0x7fb358035930 size 128 | #179 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49614.21213 | resume sending helper answer for #179 suppresed complete_v2_state_transition() and stole MD | #179 spent 0.466 milliseconds in resume sending helper answer | stop processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb344035930 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 0c 53 b0 d6 55 ba e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #179 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #179 | rejected packet: | b7 0c 53 b0 d6 55 ba e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #179: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0388 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #121 | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #121 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #121 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49614.22231; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003509 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac1340 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #121 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 "road-eastnet-nonat-121" #121: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #121) | 1a c4 23 3a 2f fb 8d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 72 b0 fb 70 4e c0 8d 7d 37 18 c1 ce 4c 8b 63 | 3b ed bd b3 7c e2 68 d0 e4 78 d3 ff 67 2f 87 6b | 58 6e aa 28 e2 71 48 9f 9e 55 8d d7 f0 fa a8 2d | cf d6 ae d1 2d 00 58 7f 1d 28 13 c8 1c b2 dd 2d | 0b 8c e4 ed 5c aa b6 84 75 0e 0c f4 87 20 ea a7 | 6f 81 08 6f ca 1d ea a5 cc 8b 1d 07 3a 98 ee 34 | 92 f7 0d 60 c7 27 69 9a 54 db 7b c6 0a ed 9e 6e | 48 c9 2d 78 78 eb 23 a8 d4 08 fd 81 af 22 ee 61 | 94 de e2 4a 3e 31 5e 98 b3 8e 80 72 e5 9a 23 e5 | 36 5f 19 09 16 90 75 46 fe 81 ca 01 97 f5 9d b9 | ee 86 b8 f1 4d 40 49 77 bf ea d6 8d cf e1 3f ed | ea d1 6f a1 94 f1 b6 1e ce cf 58 8f 34 28 d9 e9 | 91 30 27 07 3d a8 1a 9e 1f 56 eb 39 c7 99 10 18 | f7 a0 93 02 25 a4 35 d3 3b 85 c6 a5 d4 ee 05 5a | 0a 2e cd 8b 56 c3 43 2f ad b6 de d6 76 50 8d 8d | 31 49 b6 ba ff a2 3a 1a 19 8e 58 36 38 db d0 39 | 29 00 00 24 ce 58 3c f3 71 03 62 3b f7 b4 bf 47 | 86 b0 47 20 d2 a4 5f 23 42 6a 81 bd c0 a6 20 e9 | 9a 46 27 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 ab b4 fc 6a e4 2a a5 95 ca 3f ba | 4a 7b 1d be 72 ff 8c 93 00 00 00 1c 00 00 40 05 | 7e 13 e9 d3 7d bc 8a 17 e1 3e 93 a5 d0 ee 9b cd | 6e 9a 4b 6b | libevent_free: release ptr-libevent@0x7fb348009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #121 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a c4 23 3a 2f fb 8d 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #121 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #121 | rejected packet: | 1a c4 23 3a 2f fb 8d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #121: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a74cd0 | handling event EVENT_RETRANSMIT for parent state #150 | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #150 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #150 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49614.229577; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001871 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #150 | libevent_malloc: new ptr-libevent@0x7fb348009640 size 128 "road-eastnet-nonat-150" #150: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #150) | 8a b6 09 5a 0a 8f be 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 2e 98 c4 69 1c 50 37 00 a8 8c d0 f1 d2 8c 28 | 94 f1 69 8e be e8 36 fe 99 97 d5 0c 37 4e 1b 26 | 9e e0 4e bd 73 a0 79 f4 5a 6b f2 8d 96 4f 03 3e | 0e 75 44 c8 2c a3 81 79 2e 0b 2e 8f 7d 7f dc f9 | 3f db 53 4d 6e 68 53 6c 49 99 36 00 d7 4f 7e e1 | 7e a7 57 fb ab 9f e1 d6 e7 24 3b 02 1f 12 10 de | 15 c5 08 ce f3 51 03 84 19 e7 47 83 1a 2e 38 c2 | 45 5b ab 60 7e 25 f4 92 0b eb 31 c2 32 59 f7 71 | 30 c7 ef cb 28 48 6e e3 c6 10 bc 9c 64 1e 68 59 | ee 88 40 85 37 40 80 12 7d 99 b2 33 c0 da 4b fb | 3a 39 ae b6 0e 0b 59 93 7d 9a d6 ee 50 27 09 f4 | a0 3a c3 63 a9 ac e9 9b 13 ed 9f a6 df 4f 55 3a | 82 36 63 e6 11 77 4d 54 ff a6 ad fe 0f 97 d9 c1 | 30 72 88 21 1f 78 34 56 b8 51 de f7 62 00 f9 29 | 66 5f d3 86 45 83 9d 48 c9 24 49 11 29 28 62 bd | 6e 8b 60 b5 72 8e cb ea 93 0b fd cb 0c 58 7b 88 | 29 00 00 24 36 30 98 85 8b 67 65 29 82 81 da 88 | 70 5a df 1d 0c c2 0c e8 b9 29 94 59 0f 89 5b 4b | 52 bc 0b a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 25 ba 47 28 1c 0e 38 fd e4 d3 0a | c8 ae 66 94 c0 bd 04 2b 00 00 00 1c 00 00 40 05 | 5a 15 ef 3e 5b 63 8d c2 17 ab ae 76 63 67 33 8b | f3 ee 4c d4 | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a74cd0 | #150 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a b6 09 5a 0a 8f be 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #150 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #150 | rejected packet: | 8a b6 09 5a 0a 8f be 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #150: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #173 | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #173 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #173 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49614.242884; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501129 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a74cd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #173 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 "road-eastnet-nonat-173" #173: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #173) | a3 dc 1a aa b2 53 81 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 50 c6 a8 2b 15 44 29 7d 0a e3 39 95 9c 54 98 | 15 94 31 dc b2 f4 dc 06 12 a0 ff 21 13 48 30 95 | af bf 2b b8 09 10 1f 12 f1 ba 4e d2 4d c9 b1 a8 | 05 1a 20 e3 76 d4 0d 6b 38 00 2d 67 2b 07 73 be | a7 20 4c aa b8 f7 39 95 13 6d ae b6 ef 79 3a 33 | 8d e1 63 74 10 aa 27 63 ae 0f b0 2c 9f a5 74 21 | 20 ef 3b da 07 cd e1 2a ac 84 10 e1 eb 87 c2 5c | 8c 49 b1 a8 55 4a 0b c6 97 48 c7 fa 85 87 f0 7a | d7 45 9c 5f 2a c6 38 4c 4e a1 54 1f 2a b5 2e 49 | c6 5b 7a b8 69 98 a8 6a 03 80 1c 7f 20 55 e9 fd | 67 3c d3 ce e1 0d bb 8d 6b d2 95 4c af 6b 27 f3 | df f3 c1 d1 42 37 39 82 9f 58 eb 0d c5 ad bb 97 | 84 ff 4d 8a ba d9 60 19 d6 8e a0 cf fa 4d d0 49 | 61 07 20 ea f9 3b 35 e5 ef 25 c3 9f 36 d2 2d 11 | 5f 51 ff fc 25 f0 0e 63 2f a3 a3 cd af f0 c5 be | 34 51 97 11 a8 5a bf 5a f6 22 be 55 c5 08 d3 d9 | 29 00 00 24 12 84 f7 8f dc 17 04 fd a9 ee 45 ef | 2f aa ad ed 39 8e cd ff 76 be dc 7b d9 a9 2b e6 | 08 21 dc 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 b7 38 fa 70 81 30 71 1e 17 26 ac | fb ca c9 c3 02 40 69 eb 00 00 00 1c 00 00 40 05 | 47 2a 00 7e f6 06 aa e7 bc a5 be 89 f2 8d 4b b1 | 1c ba 94 b3 | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #173 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 dc 1a aa b2 53 81 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #173 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #173 | rejected packet: | a3 dc 1a aa b2 53 81 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #173: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a68890 | handling event EVENT_RETRANSMIT for parent state #68 | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #68 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #68 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49614.260165; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006147 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #68 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 "road-eastnet-nonat-68" #68: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #68) | 70 75 31 66 aa 5c 9c e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 5d b8 31 5b 51 c7 81 22 c3 12 8e cd 03 2f 05 | f3 e7 e9 e0 56 07 0e 19 4f f3 59 f8 5f 92 30 b5 | 72 b6 ae 5a 15 67 03 c0 c9 25 86 6f b6 cd 52 32 | 93 89 9d 85 44 28 f4 e9 22 34 65 fb b6 28 63 5f | 80 98 37 5a 06 27 0e fb ee f6 cc 60 03 1e c8 99 | 96 20 20 2b e8 6a b0 1d 57 83 e1 9f d1 09 80 29 | 2a 2a 69 37 ce 92 30 79 1a 45 aa a3 bd 30 cd 8b | 23 97 c9 73 f8 32 ee fe d7 1e 67 73 bd 11 db 26 | 12 e8 63 a6 c5 a1 37 4f 2f 5c 98 66 44 92 9a da | 46 ed 57 a3 46 50 a7 e5 d9 ec 61 b3 fb 59 43 1f | 96 83 9a 55 36 c4 68 5f a7 ee f4 08 c7 30 31 52 | b8 7e 06 a5 b1 e2 2e 1a 2b de 01 96 c6 3e f1 89 | d8 1f b9 ac 77 f1 c6 91 93 f5 70 bc 2f 41 d6 e3 | ff da e8 8a 1d 5f de 22 6f 38 d0 51 a3 b4 49 ef | d5 06 ff ea 4d f6 71 eb 33 f8 fd c7 e6 95 54 de | 64 89 15 37 cd bd bf d2 74 6c 8e f3 c4 d1 b1 ad | 29 00 00 24 8c 8f d0 a2 59 9b be 88 0a db 9c c0 | a3 eb 04 0d aa d5 13 33 65 39 12 37 76 6e 7e e3 | e3 60 8c 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 a4 28 dd c4 89 9a c5 51 2a d8 15 | 55 6e c2 5e f1 52 b9 d0 00 00 00 1c 00 00 40 05 | ac d9 33 90 76 69 a3 40 a6 e4 ee bb 11 92 b7 71 | 1e 90 c3 02 | libevent_free: release ptr-libevent@0x7fb374014820 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a68890 | #68 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 75 31 66 aa 5c 9c e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #68 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #68 | rejected packet: | 70 75 31 66 aa 5c 9c e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #68: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a69e50 | handling event EVENT_RETRANSMIT for parent state #166 | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #166 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #166 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49614.263493; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00158 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a68890 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #166 | libevent_malloc: new ptr-libevent@0x7fb374014820 size 128 "road-eastnet-nonat-166" #166: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #166) | d7 12 9c be 9a d9 20 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b c9 02 ed 54 28 bb 69 3a fa da 89 fc 4e 39 8f | a4 d9 5e 2f e7 5a f0 78 e4 4f 3d 81 ef 79 61 1f | a3 10 38 af aa 4b f6 ef 84 82 56 19 cd b4 c3 5b | aa a8 08 49 1f b4 b8 b1 4e cd 8c 0c 86 09 40 1d | 3a ac 4d 85 be 4c 1d e8 f2 bd e7 23 97 c2 da f8 | 65 82 fb 26 55 00 06 12 19 2c fe d3 7b c4 ff 31 | 3f 92 30 47 40 04 59 ba c0 27 99 b0 dd 45 22 cb | 97 1b 7a c0 ab ef 56 9c f3 d7 45 a0 a5 37 a3 b2 | 58 e2 9e 19 5e 81 d9 fa 7b fe 78 35 15 83 01 42 | 24 2c 5a ee 4f 05 09 f4 1d dd c3 06 45 d3 ea 94 | 81 04 37 3a 2a 09 3c 79 d8 7b 16 c9 e4 4e 70 57 | ac 53 d9 f3 76 57 6b 10 ff a1 91 96 c5 09 1d b2 | 37 da 15 c6 76 39 0e 79 8e b4 e3 6b b6 34 b5 ee | 59 40 13 d1 7e a5 f4 50 26 80 c7 4d 2f bd 97 83 | 7b 42 78 41 a6 62 d7 58 6e e8 20 3d f8 07 e4 57 | 49 7e 0c 32 68 81 0c ed 46 bc 7b e3 e1 f5 77 38 | 29 00 00 24 a6 0c 32 e7 5a d1 b5 ca 07 42 9a 49 | 78 63 23 e6 6a be e5 1f b9 dd 49 81 36 5a 86 c7 | 6b 23 86 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 81 0a 2e 3d e5 a2 7d c2 7a 52 36 | 53 f5 16 ff 78 27 b0 06 00 00 00 1c 00 00 40 05 | 82 68 99 97 5e 62 33 7b 33 19 33 98 83 8d 7f b1 | f3 01 32 b7 | libevent_free: release ptr-libevent@0x7fb378012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a69e50 | #166 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 12 9c be 9a d9 20 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #166 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #166 | rejected packet: | d7 12 9c be 9a d9 20 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #166: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7e490 | handling event EVENT_RETRANSMIT for parent state #122 | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #122 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #122 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49614.286056; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004928 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a69e50 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #122 | libevent_malloc: new ptr-libevent@0x7fb378012840 size 128 "road-eastnet-nonat-122" #122: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #122) | 14 66 d6 bd ae 2b be a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 a1 e9 e4 be 1e 51 8a 55 59 79 73 21 36 56 e2 | 77 7a 08 bd 06 ab d4 92 e5 dc ae f7 64 76 23 ff | f4 fc 6d 61 73 31 e1 d2 4f df c1 6b b7 79 5a 65 | a0 cc f6 e0 aa a2 1e 56 c9 61 f0 64 10 6e 71 e4 | de d3 38 6f 01 f0 ef d1 f6 56 f5 aa fb d5 dc 96 | f9 0b be 72 ef 23 60 6a 39 4c 10 fa 40 46 a5 4f | 9d 4e 1b 63 94 dd bb 2e 79 61 b0 23 01 f5 74 e7 | c5 3f 64 7f 13 8b 72 4d bd da 91 fc 61 61 ef f0 | e7 bf ad 46 59 ed ad 05 2c f7 04 21 03 71 4c c7 | 7f 1d ad ca ef 53 b4 42 e8 7b 9b 3d 7a 70 68 63 | f6 3b fc 00 63 e2 d1 50 20 42 35 cc 18 3b ef e3 | 5c 49 2e b5 43 b5 11 94 a2 42 32 89 ab 4a 75 44 | 28 03 13 02 78 a8 b9 d4 86 df f7 69 0e 5b f1 03 | 59 e8 3f 87 be c1 4f 01 d7 b7 0b 01 72 03 2c 0c | c5 51 b7 34 27 69 20 c2 1e 3c 1a 82 2c 40 e7 31 | 94 67 b7 79 04 1c c9 e0 fd 58 15 b5 e2 95 d3 0d | 29 00 00 24 7c 10 f9 fd 3b aa 03 0a 4e 70 88 76 | 8d 21 8d 7a 77 a3 25 87 bf 2c 07 91 c2 03 c6 70 | 6f 0a b2 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 62 3b d9 22 f1 42 3b 85 55 78 b5 | c8 14 63 8d 0b 44 d6 d6 00 00 00 1c 00 00 40 05 | 1b ba f6 9b c4 53 50 8e 11 46 cb 49 4f 65 db eb | 69 7d d4 7c | libevent_free: release ptr-libevent@0x7fb36001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e490 | #122 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 66 d6 bd ae 2b be a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #122 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #122 | rejected packet: | 14 66 d6 bd ae 2b be a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #122: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0679 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fa300 | handling event EVENT_RETRANSMIT for parent state #151 | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #151 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #151 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49614.298893; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003999 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e490 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #151 | libevent_malloc: new ptr-libevent@0x7fb36001d920 size 128 "road-eastnet-nonat-151" #151: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #151) | d6 d5 c3 1b 58 0f 5c 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 37 31 25 ac 2b c6 c6 54 4a 25 58 cc 38 99 e0 | ed 33 16 21 c3 45 6a eb 3b a9 cb 98 85 d1 bc b2 | fb 43 f8 dc 85 42 20 a9 d4 7c dc c0 4c df 30 b1 | 6f cb 58 0b 5e 23 e6 14 ea 93 76 de 25 96 78 81 | 99 69 10 aa a3 9f ec 08 71 07 18 69 73 22 c9 ac | 3c e3 bf f1 09 8a 27 19 15 60 45 3d 4e 4f f3 e6 | c0 ab 4b c7 bb fb 2d 92 26 ca 7f de c4 f9 dd 4a | fa 18 2a 06 8c 14 94 9f a3 5d e6 b2 6b b0 ef e2 | 03 7f 7e f8 41 9d 8b 81 6b ea 4b 0b 45 f7 4c 93 | 70 05 72 9a ed 29 ed 3c 18 ca 66 2f d4 84 e6 4b | c1 2d 49 d6 3e cb 03 40 00 76 c7 f7 62 87 c5 1b | 85 d6 9d d1 8f 62 a3 ce 21 63 7a e5 94 35 85 13 | e3 c0 a5 2d 68 e8 0d 1f 37 ec 8c 55 12 d8 2a 1f | 06 81 5f d0 f4 ed e5 b1 5f c7 61 8a f0 5a 81 39 | 9f 6d e8 7f 5c 42 26 99 4f 51 2b 10 a9 6b b8 4c | a4 af 1c 69 f6 99 03 59 f6 8d eb d2 5c c8 04 4e | 29 00 00 24 3f 57 34 15 0e f6 1f 97 00 4e ca 13 | c7 48 27 43 fb 8e ac 87 27 dd cc da bb e1 5d 76 | d8 9b a6 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 1e a1 42 f7 31 41 ef 44 00 e7 a6 | 3d d6 a8 bb 50 6c 59 e3 00 00 00 1c 00 00 40 05 | 29 1a ff ca 49 77 f5 cd 99 41 a4 64 5f 6e 4a e7 | 0f a2 34 de | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fa300 | #151 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 d5 c3 1b 58 0f 5c 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #151 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #151 | rejected packet: | d6 d5 c3 1b 58 0f 5c 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #151: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0675 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-180" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-180' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #180 at 0x557d46aca040 | State DB: adding IKEv2 state #180 in UNDEFINED | pstats #180 ikev2.ike started | Message ID: init #180: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #180: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #180; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-180" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-180" IKE SA #180 "road-eastnet-nonat-180" "road-eastnet-nonat-180" #180: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-180 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-180": constructed local IKE proposals for road-eastnet-nonat-180 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 180 for state #180 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469fa300 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #180 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 | #180 spent 0.147 milliseconds in ikev2_parent_outI1() | crypto helper 3 resuming | crypto helper 3 starting work-order 180 for state #180 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 180 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-180" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.237 milliseconds in whack | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 180 time elapsed 0.000898 seconds | (#180) spent 0.905 milliseconds in crypto helper computing work-order 180: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 180 for state #180 to event queue | scheduling resume sending helper answer for #180 | libevent_malloc: new ptr-libevent@0x7fb338035930 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #180 | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 180 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #180 | **emit ISAKMP Message: | initiator cookie: | fe 73 72 02 92 15 d8 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-180 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 46 07 70 60 c7 56 30 74 c1 b3 ab 81 1b b5 12 a6 | ikev2 g^x 5b b3 64 05 c5 bb 30 3a 1e 92 5a 22 82 67 57 cb | ikev2 g^x ec df cc 78 63 1b 82 f2 76 a9 50 bd 80 d2 65 3a | ikev2 g^x b4 e2 7b 0a a1 1e b4 05 49 bc 96 6f 1f f1 51 36 | ikev2 g^x c7 6c ca c1 27 98 ee 50 22 95 3e cb c3 ea ef b5 | ikev2 g^x b6 40 b3 fc db 2f 79 46 a9 ac d5 8e 6f 0a 3a 8d | ikev2 g^x 7e 51 bf 5f 98 c8 56 24 ad e5 63 d9 fa 96 3f ce | ikev2 g^x b0 c6 79 3b 61 48 6d fd d7 15 2a 6b 8d 91 68 52 | ikev2 g^x a6 e1 08 45 fe 40 cd 13 6b e8 f0 74 af 74 46 b5 | ikev2 g^x 90 2f 5d d8 88 37 08 fa 12 4d 78 ce 41 b7 64 80 | ikev2 g^x a2 4d 76 43 ea e0 49 cc c2 cc 44 b2 cd 61 27 7e | ikev2 g^x 3d 40 9b 0b ff 59 99 9d a8 52 49 ee d5 dd 07 2e | ikev2 g^x 2d 3b 1d 7b e9 b4 f8 d7 66 08 0c c9 41 1c 3c eb | ikev2 g^x ca 7b 16 c5 f5 de ae 99 52 e3 17 c8 ed 61 56 a0 | ikev2 g^x 61 ae ef c8 11 73 22 d7 35 ab 44 d5 09 26 21 e1 | ikev2 g^x 09 c4 17 ac b7 7a 6c 9f bd 3c 11 d1 18 1d 51 88 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9d 80 d3 ad d5 e1 1c 51 35 bd a3 6a 04 d1 ff 4c | IKEv2 nonce 54 9f ed 38 00 a0 89 9d 6d 48 6f b5 c4 22 6c 99 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fe 73 72 02 92 15 d8 82 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b4 | natd_hash: port= 01 f4 | natd_hash: hash= 78 22 7d cd 9d 96 05 69 33 a1 7c ff fb a1 ed a2 | natd_hash: hash= be 25 c7 02 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 78 22 7d cd 9d 96 05 69 33 a1 7c ff fb a1 ed a2 | Notify data be 25 c7 02 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fe 73 72 02 92 15 d8 82 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= cd 91 7d 35 4a 67 75 33 41 31 18 ee 7e 93 4a 7e | natd_hash: hash= ae 98 50 4f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cd 91 7d 35 4a 67 75 33 41 31 18 ee 7e 93 4a 7e | Notify data ae 98 50 4f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #180 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #180: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #180 to 4294967295 after switching state | Message ID: IKE #180 skipping update_recv as MD is fake | Message ID: sent #180 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-180" #180: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.180:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #180) | fe 73 72 02 92 15 d8 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 07 70 60 c7 56 30 74 c1 b3 ab 81 1b b5 12 a6 | 5b b3 64 05 c5 bb 30 3a 1e 92 5a 22 82 67 57 cb | ec df cc 78 63 1b 82 f2 76 a9 50 bd 80 d2 65 3a | b4 e2 7b 0a a1 1e b4 05 49 bc 96 6f 1f f1 51 36 | c7 6c ca c1 27 98 ee 50 22 95 3e cb c3 ea ef b5 | b6 40 b3 fc db 2f 79 46 a9 ac d5 8e 6f 0a 3a 8d | 7e 51 bf 5f 98 c8 56 24 ad e5 63 d9 fa 96 3f ce | b0 c6 79 3b 61 48 6d fd d7 15 2a 6b 8d 91 68 52 | a6 e1 08 45 fe 40 cd 13 6b e8 f0 74 af 74 46 b5 | 90 2f 5d d8 88 37 08 fa 12 4d 78 ce 41 b7 64 80 | a2 4d 76 43 ea e0 49 cc c2 cc 44 b2 cd 61 27 7e | 3d 40 9b 0b ff 59 99 9d a8 52 49 ee d5 dd 07 2e | 2d 3b 1d 7b e9 b4 f8 d7 66 08 0c c9 41 1c 3c eb | ca 7b 16 c5 f5 de ae 99 52 e3 17 c8 ed 61 56 a0 | 61 ae ef c8 11 73 22 d7 35 ab 44 d5 09 26 21 e1 | 09 c4 17 ac b7 7a 6c 9f bd 3c 11 d1 18 1d 51 88 | 29 00 00 24 9d 80 d3 ad d5 e1 1c 51 35 bd a3 6a | 04 d1 ff 4c 54 9f ed 38 00 a0 89 9d 6d 48 6f b5 | c4 22 6c 99 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 22 7d cd 9d 96 05 69 33 a1 7c ff | fb a1 ed a2 be 25 c7 02 00 00 00 1c 00 00 40 05 | cd 91 7d 35 4a 67 75 33 41 31 18 ee 7e 93 4a 7e | ae 98 50 4f | state #180 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469fa300 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fa300 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #180 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 | #180 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49614.308239 | resume sending helper answer for #180 suppresed complete_v2_state_transition() and stole MD | #180 spent 0.465 milliseconds in resume sending helper answer | stop processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb338035930 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 73 72 02 92 15 d8 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #180 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #180 | rejected packet: | fe 73 72 02 92 15 d8 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #180: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #174 | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #174 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #174 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49614.312427; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500128 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a67370 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #174 | libevent_malloc: new ptr-libevent@0x7fb338035930 size 128 "road-eastnet-nonat-174" #174: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #174) | 91 36 4b 21 8c e3 c8 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 dd c5 98 91 80 2f bf e7 2b 43 43 70 f9 1c a2 | 78 b6 0b 56 89 c7 17 d8 c4 a4 ed 43 14 68 00 55 | ee dd ad 6d 8a 38 ba ad d9 23 b7 9e bb 3d 86 07 | ed 16 db de b0 44 67 be ba 65 0e 96 fd 54 eb cc | d4 d8 f1 83 4a 85 62 b4 81 ea c9 6f d6 2b 35 08 | 27 1d 44 b3 72 05 f6 d5 ee 0e c6 0c ad 30 dd 17 | d5 9d 92 9d 6e 7c 3d b9 06 e4 e1 7a b8 af 86 7e | 60 5c 18 1e 77 1f a3 0b 6c 39 63 8e 3b e2 37 7b | 90 c4 a3 0b 91 18 0b 29 93 4d 27 18 cf a4 37 53 | b6 2a 69 e7 1d 14 6c 93 05 8e 44 d8 16 2f a7 9f | 79 72 c5 dc 33 34 fc 0e b4 98 f8 e3 05 25 fe de | b4 63 51 46 dc 88 2d 12 37 aa 30 40 1c da d8 aa | d1 04 09 9e 82 a0 ef 0f 6a 96 1b 9b 72 30 77 32 | 93 8b f7 e8 2a a0 a2 dd 84 00 ba 24 75 30 17 4b | 8e 71 da c7 7b bd 41 ab b9 40 da db 82 29 9b 27 | d8 26 4c cc a8 73 89 de dd ff 26 53 c5 6f 01 3f | 29 00 00 24 cd b7 f1 c7 48 65 7b d0 51 fe 51 f7 | 71 0f cd 4b 00 33 35 86 2b 0b ad 56 3c d5 7d aa | 0f f5 4e e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 08 52 e7 44 c5 f0 65 19 f6 45 55 | b4 2d dd 6f 21 a4 bb e8 00 00 00 1c 00 00 40 05 | 78 4d 37 08 7f b6 6b 98 3a f8 5f d9 3e 81 c3 c7 | 93 cf d6 90 | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #174 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 36 4b 21 8c e3 c8 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #174 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #174 | rejected packet: | 91 36 4b 21 8c e3 c8 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #174: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.059 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a03d30 | handling event EVENT_RETRANSMIT for parent state #69 | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #69 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #69 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49614.322737; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004163 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #69 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 "road-eastnet-nonat-69" #69: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #69) | f2 a5 7f fe 4a 34 bb 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 e4 3b 13 88 fe 14 57 37 ea f2 64 67 d0 00 fc | 08 06 ee d2 9e 18 57 6d 24 e0 9d ec 05 43 cc ba | 46 84 14 09 e9 e2 59 69 78 ab 8d 44 b4 c5 40 3a | a2 89 7d 06 7b bd cc e4 70 62 31 9f 43 8b b5 bc | 3c 9f 69 fb 1f f5 22 54 18 e5 72 15 5a 48 ee 5c | c3 f3 42 0b 25 4e 7f 00 ca 3e e9 db 4e ab 7a 2a | 5e 8e 14 a5 6c b8 fa ac c8 1b f3 01 fc 2e 88 fc | de 9d 1f b4 30 64 da 79 40 14 b9 cb 57 7b 44 a9 | 8b 4d e2 fe 10 ef 78 5b 95 32 a7 75 3e 68 a2 02 | 50 a9 63 99 4c de c2 a2 55 8e e7 c1 4c 9d ba d5 | 23 4b 1b 11 eb 5b d1 0e 0a 69 30 ae 96 7b a4 e6 | d5 07 c0 08 e9 6f 21 3e f5 fc eb 69 b8 6d f7 0c | e4 6a a2 62 87 f1 46 98 bb 82 fd ef c3 b7 37 d9 | 4f 4d 06 a6 46 29 3d cf 6d 59 1a 7a 7d 4c 43 d4 | 05 3e e7 70 e1 23 3b 86 eb 4e 8f 26 e0 cf 97 cf | 6f 21 b0 32 5e 71 a6 25 0b f1 15 b5 06 82 51 60 | 29 00 00 24 ca 10 ed 53 1e ff c5 43 38 73 0a 51 | c6 98 7c 29 17 9d 86 f8 04 d8 2e 0c fa 41 a7 af | 38 8b 0b 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 9a cb 7f 17 aa e7 97 ca 43 a3 43 | c3 e4 41 43 e3 4b 2a 3e 00 00 00 1c 00 00 40 05 | 50 72 12 31 6b fb 9c 33 88 e7 6f 1a 9e 5d 70 fe | 3b 28 e9 92 | libevent_free: release ptr-libevent@0x7fb380027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a03d30 | #69 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 a5 7f fe 4a 34 bb 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #69 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #69 | rejected packet: | f2 a5 7f fe 4a 34 bb 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #69: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbbc0 | handling event EVENT_RETRANSMIT for parent state #167 | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #167 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #167 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49614.329097; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001838 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac2900 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #167 | libevent_malloc: new ptr-libevent@0x7fb380027c10 size 128 "road-eastnet-nonat-167" #167: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #167) | d1 34 e0 8f fb 7c 13 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 06 19 19 47 f8 53 ed d0 cd 1b 23 74 a8 df 03 3c | 9b a0 ef 95 f1 ce f6 ae 26 37 05 42 40 f8 1b 11 | 25 b6 88 f4 08 21 89 99 64 30 46 35 2b e5 72 51 | 22 12 a5 4d 09 28 30 73 8d 80 f8 3e 6a c2 3d d6 | 8d b5 a5 60 de 1d e9 8e c3 96 be eb 9a e4 82 44 | cd c0 61 18 61 45 71 3d 05 11 06 a9 ca 4e 06 4e | cb 22 e9 93 7b 78 bf 7f 83 42 10 73 45 d5 b3 1b | 92 fd 26 c3 64 99 f5 61 c8 1f 64 c2 09 10 74 12 | fd fe 01 de ac 29 c7 4b 49 1a d9 8d 7a bd 94 f7 | 39 58 38 2e ae 17 b2 73 1d e4 a7 77 fc bf 85 3c | 63 5b 1a 29 48 e8 aa 07 3f e9 82 92 50 e7 72 9f | 9a d8 a5 97 f7 0c 72 e2 e7 b6 cb 0c ff 4e 38 9e | 6d f9 d9 e0 8f df a4 4e 9c de 86 ff 7f 6f 46 07 | 19 30 44 7c c3 76 d0 df 68 7b cd 98 75 c7 57 02 | 52 bd 7f a1 c9 22 2c 83 36 62 ea 42 c7 31 3b 8a | 30 42 3c 51 50 0b 14 55 d5 43 19 16 fa 0b 4c a5 | 29 00 00 24 15 4a d1 bb d8 87 b7 c2 1d 20 84 6d | 4c 8a c4 e7 5d 03 8e 8f 16 37 df e9 c3 77 de 41 | b9 4c a3 ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 52 6d ba 0b 84 f5 59 4b dd eb 25 | 53 bb c6 97 e9 c5 42 9c 00 00 00 1c 00 00 40 05 | f4 8a 9c 13 b7 e1 a4 8b 85 79 9e 14 f1 e3 5c 5f | 69 af 71 4a | libevent_free: release ptr-libevent@0x7fb350035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbbc0 | #167 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d1 34 e0 8f fb 7c 13 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #167 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #167 | rejected packet: | d1 34 e0 8f fb 7c 13 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #167: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0662 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #123 | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #123 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #123 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49614.348443; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004725 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbbc0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #123 | libevent_malloc: new ptr-libevent@0x7fb350035930 size 128 "road-eastnet-nonat-123" #123: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #123) | 6c 7d b3 a1 76 62 7d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 56 4f 8e 37 33 e9 f0 f8 7f b8 e1 b3 f9 a8 fa | b7 62 0a da df 31 2b 33 3e c3 84 d4 70 c9 16 31 | 80 ac 1c 22 4c fb 0e d9 48 14 9a 6c 58 8b b2 b1 | ab d6 de 52 1b e7 85 36 94 02 66 e4 ea 4b 3e bb | cb 9a 60 cd b2 64 9c 54 4c 58 05 94 9a 41 90 e5 | 3d f7 e6 13 47 7c 5c ae 9e ed 2f 47 46 7c b6 ec | 64 99 4c 90 1f 2b 27 83 ee 7d 0c 95 53 61 78 0e | fc 0d ee f9 69 83 ad f2 29 e6 77 fd 16 29 ec c4 | 55 89 e7 07 dc 10 66 d5 0f fd 31 a1 54 12 3e c7 | b1 16 f6 98 63 b4 d5 90 8d e3 ff 44 b5 31 8e 32 | c1 26 fd ff 42 9b c5 01 50 0b be e0 4e 8b d1 4e | 1e cc 49 12 14 c5 7d a4 df 96 fd 82 a1 fa 2c 84 | 20 3e 8f a2 9b 0b 00 ca 45 cd 8b a5 8a 1e 6a fa | 02 7f 67 67 3a 15 da 2b 32 2d 18 bd 05 df 1f 49 | 13 dc cd f2 4e 24 ac 3e c3 6e b4 5b 9b c7 3e 7b | f3 b3 b6 54 f0 4f 36 43 d8 39 48 ea ae 56 03 eb | 29 00 00 24 9d 71 0d 4c e1 28 99 bb a1 c2 a8 97 | 82 df 6e a7 59 50 e5 e7 83 d9 52 2c 3a b5 f8 0a | ab 34 6b 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd f0 b7 a5 ab c1 1e 9f 00 5e 1f f4 | 01 11 d6 41 8c c8 44 db 00 00 00 1c 00 00 40 05 | 74 ad b7 af a3 7a 6a 08 ff e9 f2 f1 74 4e c9 b2 | f6 ce db 1e | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #123 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 7d b3 a1 76 62 7d ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #123 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #123 | rejected packet: | 6c 7d b3 a1 76 62 7d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #123: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c00d120 | handling event EVENT_RETRANSMIT for parent state #152 | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #152 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #152 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49614.367106; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.010596 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #152 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 "road-eastnet-nonat-152" #152: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #152) | c7 e3 df ec 9e c4 62 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a7 d8 bf 29 24 11 1c ce c6 eb 11 96 dd 30 8f aa | 0c 4c 70 ce 87 a4 df 43 d2 6c ba d5 f0 3b d8 41 | 39 bd 2b 1a 59 08 f6 28 59 f9 b3 0f e5 b5 40 32 | 97 af 83 49 1b 9c e1 41 6c 19 d9 81 bd 62 6f 16 | 88 77 9c c6 99 70 f5 87 ca bd 33 9d e4 05 6b 5b | c0 98 a4 04 59 99 ff a8 0d 45 13 de 94 59 78 3e | 9f 29 e2 f0 6e 7e b9 fe f0 0d e5 7f 5b 4c 01 84 | ef a7 c0 48 17 b5 cf 69 2f 9d 37 d6 9e 2c 49 b7 | 21 74 f9 23 52 39 e5 70 37 49 22 ad bf 6a ae c7 | 00 73 99 52 14 5a 01 1d ec dc e2 c6 b8 f0 0e df | bb 4f 3c 66 48 6a d8 f8 3d dd ce 84 36 d7 fe 75 | b0 8b 40 6c b7 0a 71 a4 a1 89 ca 62 6c e9 05 72 | 42 a3 a2 98 b2 36 46 5e b4 83 55 6f f7 d0 07 bb | be 2a 0c 02 1c 0f 1c ef 21 73 11 f7 92 da ee 38 | b3 d6 c9 03 8b 2f b8 eb 38 2b 9f 1a 71 81 4d 22 | 5e d5 1f 81 77 a6 9c 34 d3 30 8a 8b 41 61 5e 1b | 29 00 00 24 29 e4 ca ab 2a 30 18 fc 26 46 3c 50 | 1a f5 21 d0 52 38 f5 d5 7b 74 90 b3 b6 ed 01 58 | e0 d9 32 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 38 7f 4c 40 24 5c 70 b7 73 9c 98 | de a9 9b f3 50 76 96 bb 00 00 00 1c 00 00 40 05 | 28 07 96 1e 77 dd a7 3a bc 86 9b 87 bc da 1a a0 | d3 4f e8 fc | libevent_free: release ptr-libevent@0x7fb36c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00d120 | #152 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 e3 df ec 9e c4 62 b6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #152 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #152 | rejected packet: | c7 e3 df ec 9e c4 62 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #152: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-181" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-181' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #181 at 0x557d46acb600 | State DB: adding IKEv2 state #181 in UNDEFINED | pstats #181 ikev2.ike started | Message ID: init #181: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #181: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #181; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-181" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-181" IKE SA #181 "road-eastnet-nonat-181" "road-eastnet-nonat-181" #181: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-181 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-181": constructed local IKE proposals for road-eastnet-nonat-181 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 181 for state #181 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c00d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #181 | libevent_malloc: new ptr-libevent@0x7fb36c012840 size 128 | #181 spent 0.172 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-181" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.263 milliseconds in whack | crypto helper 1 resuming | crypto helper 1 starting work-order 181 for state #181 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 181 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 181 time elapsed 0.000983 seconds | (#181) spent 0.989 milliseconds in crypto helper computing work-order 181: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 181 for state #181 to event queue | scheduling resume sending helper answer for #181 | libevent_malloc: new ptr-libevent@0x7fb388038370 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #181 | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 181 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #181 | **emit ISAKMP Message: | initiator cookie: | 87 ea 0d a4 c5 cc c9 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-181 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a5 96 2b 80 67 25 14 db 43 a4 69 96 1f d6 7f 44 | ikev2 g^x 16 0f d8 a3 fa cd 04 6f 4e 52 d1 61 93 e5 7d 61 | ikev2 g^x 78 3a 71 d4 ab 07 09 6a 8d e4 9e 59 3a 16 71 d0 | ikev2 g^x 6a fd 27 9b 67 10 88 a3 7b 06 8c 1d bd 77 73 97 | ikev2 g^x cb 10 8a 01 63 6c f3 e0 d9 84 4d f6 7b 2b fb e5 | ikev2 g^x 64 39 42 1e 6a 5d e5 a2 c0 54 6b 84 eb 36 36 98 | ikev2 g^x a7 bb 04 c5 ca 92 0e 5f af 5a 95 43 e3 52 3f ff | ikev2 g^x 54 f4 17 a7 9b 5c ce c8 79 5b 79 1b f8 16 5e d7 | ikev2 g^x 38 2d 41 ad 74 20 7d b3 0e 73 6b 2e d6 c4 34 48 | ikev2 g^x 1d 4c 33 fc 1f 31 06 e5 ef d9 8a ee a4 d3 10 13 | ikev2 g^x 9f f3 13 d6 08 5c dd 5e f3 41 90 99 dc 19 c1 90 | ikev2 g^x 0b 1a f0 8f 10 ca 00 81 f3 4c 0b 20 a3 62 92 ed | ikev2 g^x 2c 01 0a 11 e9 9d cb 11 95 e0 55 b1 08 02 a2 07 | ikev2 g^x 35 a8 d1 5c 3e 00 4b 4e 53 71 3f 8a 08 82 11 91 | ikev2 g^x 21 25 67 71 35 af ba 8c 78 51 c7 49 62 d2 6d 39 | ikev2 g^x 87 19 14 5e e7 83 0f e7 70 65 a7 bd b3 6a 59 43 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f0 e0 42 a6 e3 a5 05 54 c9 6b cd 2c d1 4e 0f ea | IKEv2 nonce 18 76 ac 9e 15 69 24 da 67 51 76 47 7a b9 31 35 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 87 ea 0d a4 c5 cc c9 96 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b5 | natd_hash: port= 01 f4 | natd_hash: hash= d2 1c 40 9b 6a 7c 59 59 f4 5a 8b 5d d3 44 cd 77 | natd_hash: hash= 5a a2 8f ab | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d2 1c 40 9b 6a 7c 59 59 f4 5a 8b 5d d3 44 cd 77 | Notify data 5a a2 8f ab | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 87 ea 0d a4 c5 cc c9 96 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c9 f4 ff 9a 5d 3b 38 1b 8f 98 0f 89 fb a2 c8 0e | natd_hash: hash= aa 7e 43 ef | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c9 f4 ff 9a 5d 3b 38 1b 8f 98 0f 89 fb a2 c8 0e | Notify data aa 7e 43 ef | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #181 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #181: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #181 to 4294967295 after switching state | Message ID: IKE #181 skipping update_recv as MD is fake | Message ID: sent #181 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-181" #181: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.181:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #181) | 87 ea 0d a4 c5 cc c9 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 96 2b 80 67 25 14 db 43 a4 69 96 1f d6 7f 44 | 16 0f d8 a3 fa cd 04 6f 4e 52 d1 61 93 e5 7d 61 | 78 3a 71 d4 ab 07 09 6a 8d e4 9e 59 3a 16 71 d0 | 6a fd 27 9b 67 10 88 a3 7b 06 8c 1d bd 77 73 97 | cb 10 8a 01 63 6c f3 e0 d9 84 4d f6 7b 2b fb e5 | 64 39 42 1e 6a 5d e5 a2 c0 54 6b 84 eb 36 36 98 | a7 bb 04 c5 ca 92 0e 5f af 5a 95 43 e3 52 3f ff | 54 f4 17 a7 9b 5c ce c8 79 5b 79 1b f8 16 5e d7 | 38 2d 41 ad 74 20 7d b3 0e 73 6b 2e d6 c4 34 48 | 1d 4c 33 fc 1f 31 06 e5 ef d9 8a ee a4 d3 10 13 | 9f f3 13 d6 08 5c dd 5e f3 41 90 99 dc 19 c1 90 | 0b 1a f0 8f 10 ca 00 81 f3 4c 0b 20 a3 62 92 ed | 2c 01 0a 11 e9 9d cb 11 95 e0 55 b1 08 02 a2 07 | 35 a8 d1 5c 3e 00 4b 4e 53 71 3f 8a 08 82 11 91 | 21 25 67 71 35 af ba 8c 78 51 c7 49 62 d2 6d 39 | 87 19 14 5e e7 83 0f e7 70 65 a7 bd b3 6a 59 43 | 29 00 00 24 f0 e0 42 a6 e3 a5 05 54 c9 6b cd 2c | d1 4e 0f ea 18 76 ac 9e 15 69 24 da 67 51 76 47 | 7a b9 31 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 1c 40 9b 6a 7c 59 59 f4 5a 8b 5d | d3 44 cd 77 5a a2 8f ab 00 00 00 1c 00 00 40 05 | c9 f4 ff 9a 5d 3b 38 1b 8f 98 0f 89 fb a2 c8 0e | aa 7e 43 ef | state #181 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c00d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #181 | libevent_malloc: new ptr-libevent@0x7fb36c012840 size 128 | #181 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49614.378683 | resume sending helper answer for #181 suppresed complete_v2_state_transition() and stole MD | #181 spent 0.47 milliseconds in resume sending helper answer | stop processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388038370 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 ea 0d a4 c5 cc c9 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #181 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #181 | rejected packet: | 87 ea 0d a4 c5 cc c9 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #181: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a011f0 | handling event EVENT_RETRANSMIT for parent state #70 | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #70 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #70 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49614.382888; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004464 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a03d30 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #70 | libevent_malloc: new ptr-libevent@0x7fb388038370 size 128 "road-eastnet-nonat-70" #70: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #70) | 80 24 74 22 d5 0f 52 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 68 71 3c 0e 60 a8 bb a5 bd cc ef ef 0c eb f4 | 82 28 4b 5e 34 f6 13 aa c3 d7 89 31 ad 91 46 ac | 15 dc aa e6 7a e7 0b 3f 82 69 6e e1 56 f0 c8 52 | de 05 0d fd 08 00 ee cd cc b6 87 fe a0 b0 ff e6 | 05 55 e6 b7 5e 20 53 79 90 12 ce ff 82 cf ad 41 | 3f a9 51 ad f1 8c d6 57 77 1c ef 27 f0 57 e1 8c | 97 cb b6 ce ff c0 f1 f4 a5 49 d9 74 1f 1d 74 75 | 54 be f3 af 4b 6b 43 9d 43 d4 e5 05 71 04 36 2c | c7 7c 5d f8 30 fc 44 25 48 9e 9e 82 91 e8 e4 34 | 70 26 3e 95 67 c5 a4 cb 36 d4 25 b1 2b 4a 77 2f | ae 15 52 3f 18 49 f9 47 bb a7 d2 0a ef 99 db 3d | 39 af f3 91 da 08 e3 b3 1f e4 ed 82 f5 26 e3 03 | 98 c1 58 ff ba 18 2d c8 81 ea 83 51 70 26 1e 19 | 23 60 13 98 08 43 34 78 7d 3c 93 d1 af b4 fb fe | d5 41 09 8b c9 2b 05 f4 1c a3 62 cd 21 e3 82 7b | 55 52 fe 90 11 4a 62 6c 99 8c d7 30 a6 21 f0 d1 | 29 00 00 24 e3 da 6d 7f a1 8b eb f9 61 52 ce 97 | 54 be ad 07 4c e8 1e 18 ff 49 38 58 56 77 f6 8a | c3 33 cb 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 9f 21 cd 26 5d 21 04 f0 de c9 2f | 2e 65 dc 8c 6b f1 6c dd 00 00 00 1c 00 00 40 05 | 7b 41 25 4c 4c ca db 2b 78 bf 1e 87 08 ff 47 0c | c4 b0 37 95 | libevent_free: release ptr-libevent@0x7fb384027b30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a011f0 | #70 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 24 74 22 d5 0f 52 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #70 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #70 | rejected packet: | 80 24 74 22 d5 0f 52 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #70: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0708 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9f380 | handling event EVENT_RETRANSMIT for parent state #175 | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #175 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #175 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49614.392241; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500322 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #175 | libevent_malloc: new ptr-libevent@0x7fb384027b30 size 128 "road-eastnet-nonat-175" #175: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #175) | 12 29 28 fb 65 9c c2 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 ef d9 b0 55 d5 14 e7 83 ea 0c 0f eb c0 4d b2 | 18 36 c3 0d 3c 5f 0d a0 d7 f5 a9 e8 30 23 62 2f | 3d 90 5e 25 d3 54 b3 8c d3 ab 1c d3 33 34 03 78 | 85 cd 74 0f 8e 35 c2 5d e8 af fd 9d 00 2e ac e4 | 84 d5 07 fd 55 8c 43 bf 89 61 dc 61 43 3c cd 62 | c3 a0 1f 02 31 0b 07 a5 78 c5 10 08 e8 a4 7f 16 | 2c ae 5c 93 2d 6e c4 24 f5 3a 2e c6 c8 6f 2e ed | e3 0a 8d 68 b0 44 75 d4 95 53 f7 73 cd 7d 6e 84 | d1 e9 9a 86 1e 26 9e 3c d7 df ee 11 ad 66 97 c8 | d5 8e 03 f4 d8 ef b9 76 f2 13 a1 73 f1 c4 5a 4e | 4f 30 eb 7b 7a f1 c0 eb 65 91 cf a9 f3 ae 0d 25 | 9b ee 1e 21 c2 ad 7e f5 01 73 92 f7 51 aa 80 fe | 91 d2 a8 9c 23 90 be c1 3c 6a f1 41 0c 91 0d 9d | 20 55 1f c9 0c b7 77 36 a0 ac 09 f3 01 de b4 91 | 94 8a 20 8c 1f ad 5f d7 63 70 2d 9a bd f2 8c e9 | fc ac 2d 5f 45 8f 88 b9 47 ef 43 3d 71 ea 60 f1 | 29 00 00 24 97 30 3a 8f 02 71 88 b4 dc ed 53 7a | 89 3f 00 b1 2f 4a 80 0e 10 53 03 26 85 ad 54 ab | da 16 12 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 ca 83 64 e4 50 88 08 79 37 9f 8c | 5a be 7c 44 1e d9 01 29 00 00 00 1c 00 00 40 05 | 4a 03 e5 d4 1c 09 77 92 d5 8c 25 e7 2e 76 d9 45 | 5b fb 35 ac | libevent_free: release ptr-libevent@0x7fb36402ffd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9f380 | #175 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 12 29 28 fb 65 9c c2 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #175 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #175 | rejected packet: | 12 29 28 fb 65 9c c2 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #175: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0727 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0eb30 | handling event EVENT_RETRANSMIT for parent state #168 | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #168 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #168 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49614.399609; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002618 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9f380 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #168 | libevent_malloc: new ptr-libevent@0x7fb36402ffd0 size 128 "road-eastnet-nonat-168" #168: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #168) | b9 02 4f a9 68 0f a0 fe 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 38 63 d7 fd 7e 45 ef 72 03 13 6e 35 cd 53 26 | dd fc 38 ee df 06 1b 11 d5 c4 09 34 ea 9e 52 e9 | 90 99 59 42 6e 45 cc 92 f7 0d d9 7f 81 1b 1c 4d | 72 ce 0d 51 93 0e f8 d3 b9 70 d1 ad 64 8a 6a e2 | a3 1d 17 ed 1c a1 e4 c2 92 7b 01 e5 0d a5 15 1e | c9 45 f6 10 06 37 94 e2 37 85 e0 bc d4 3b da fb | 39 7d 59 09 ad a9 c4 e3 7a c2 37 5d ed ee 68 e8 | b1 63 07 9f 75 29 29 20 65 07 02 b1 8b 8b 01 b0 | 2b 52 3c a4 c8 5c 27 70 49 1c a9 4a ee d4 27 a2 | d7 44 e4 1a a5 20 37 9f 74 66 e1 72 a9 aa a5 00 | ec 99 a9 b7 19 84 18 49 d0 9b 4f 00 03 95 50 90 | b6 93 61 e2 6b 86 3b a3 1f 9e fe be b9 00 11 4e | d0 ee 6d 6d 92 bc 2a 22 db 5c 6c ba d6 ed 5d 3e | 26 d4 a4 f0 75 e3 70 55 39 8d c3 1c 3c 5e 40 3f | 06 f2 7d 36 24 34 4a 10 84 8b e4 b1 b8 1a 47 88 | b9 e7 73 06 47 d4 d0 41 aa 50 1b af 0e 28 2a e0 | 29 00 00 24 3f 02 e6 1c 86 66 81 19 d2 36 b7 e8 | e6 9a a6 e7 5e 78 b6 e8 13 75 aa 57 3b a6 be 37 | b8 21 ac c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 8a 57 55 a3 9f b5 8e 63 74 0d de | 85 a9 a1 c8 2f d9 1c 61 00 00 00 1c 00 00 40 05 | 7a 31 f7 15 f8 cd 69 10 6a f0 ab d3 a9 c2 c3 c7 | 07 31 9b 08 | libevent_free: release ptr-libevent@0x7fb354035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0eb30 | #168 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 02 4f a9 68 0f a0 fe | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #168 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #168 | rejected packet: | b9 02 4f a9 68 0f a0 fe 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #168: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0694 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #124 | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #124 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #124 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49614.412995; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003351 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac5400 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #124 | libevent_malloc: new ptr-libevent@0x7fb354035930 size 128 "road-eastnet-nonat-124" #124: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #124) | 8e 52 ee 7a 33 75 3f 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 57 9a 04 43 62 52 e5 fc b5 c2 fe cc ad 34 2f | 82 f3 00 f6 ee 21 08 77 c9 b1 bb 69 fe 78 0f 21 | bf 36 0c 3c d2 28 d9 56 83 ae 1a 8d 60 fc ba 85 | 54 56 0c 31 1b 34 8f 99 3a cf de 75 87 a0 b6 a4 | d8 62 39 46 a5 f4 50 6b 49 13 47 6a b8 07 fd 9b | a0 24 9b 8e 36 86 71 8d 3a 86 06 ec 43 9f d0 fa | fb 5f d7 26 3c ad 44 31 62 f2 eb 50 ab 84 4b c8 | 92 d2 94 d1 cf 28 72 53 f0 98 5e 24 79 26 3e b6 | 8a 49 4d a1 69 34 ff 0b 63 f0 6a 98 fb 9b 9e fc | 07 2e cd bb 5b c5 49 f8 a9 bd 52 eb e2 d4 29 6f | e4 1e 81 a0 d3 65 f5 f3 07 20 20 0d 39 fe 60 11 | 31 d5 df 57 2f d9 ac 24 3b 95 8a 93 3c 37 3c fe | 00 f5 ae e3 8b 73 07 19 bf 7a 74 b9 19 54 31 a8 | c6 05 b4 3c c9 b4 f2 d1 4f 8d c4 e7 6c 6b d7 8c | a7 72 14 8c da 9f 42 94 91 f0 27 3c ef a5 63 c0 | 4b e5 9c 5d a2 4a 47 0f 02 ed 81 c6 7a 36 ca c0 | 29 00 00 24 35 37 ad 9e 25 61 50 57 d7 60 4e 9e | 7c 24 2e 8d b9 f6 52 07 e6 cf b3 cb 88 5a c5 03 | c4 c6 aa c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 73 0e 7d 3a 1d a8 f9 ef 84 7c a6 | 0b 05 4a f4 88 18 b0 42 00 00 00 1c 00 00 40 05 | 95 90 15 33 51 5d ad 36 64 2a 62 55 cb ba 4d 6f | 9b 17 ee 8d | libevent_free: release ptr-libevent@0x7fb35c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #124 spent 0.181 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 52 ee 7a 33 75 3f 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #124 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #124 | rejected packet: | 8e 52 ee 7a 33 75 3f 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #124: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4bfd0 | handling event EVENT_RETRANSMIT for parent state #153 | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #153 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #153 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49614.423426; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003084 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #153 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 "road-eastnet-nonat-153" #153: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #153) | ed 10 7e d3 7b 33 74 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 23 2b fa a2 7a a7 c0 a4 0c c7 9f 58 c4 e7 e8 | 70 a1 a8 0f 51 5f a2 04 f4 14 9f d7 e2 33 9b d1 | 70 a9 9d e5 73 3e d4 0c 84 28 f3 47 b9 3c 03 49 | 98 c3 54 58 79 2a 6a d2 f7 19 34 3f ea 9b 09 66 | 26 4b 77 9a 2e 2d 06 7d b1 99 09 62 d6 ef 52 44 | 03 d0 e7 2e 96 a1 8d 5c ea 4e a7 ca 7e fb ac a0 | 2f ea 86 d8 ac 11 f8 20 6b 77 af c2 6c 84 38 e7 | 8a b3 d4 12 59 8f 14 90 f8 a1 09 66 1f 57 d8 3c | 73 c4 11 8b a8 7f b3 1e 97 ed 1c 65 90 26 33 5b | 30 76 3b 3b d5 b4 96 62 cb 7d 86 9d ad 4a 9e e5 | 2b b2 c9 9e 69 f5 8a e4 08 29 24 90 1c 8f 81 c4 | d0 5a 30 f4 83 2c f9 11 5c 07 b1 f7 f6 7a 22 ac | 46 53 33 91 c1 25 ad 6c f8 ee d4 49 b1 09 fc 61 | 27 91 e2 9d 17 78 bb a6 45 04 eb ad 01 76 59 27 | df 49 c6 69 61 22 0d b2 77 f2 e5 49 0e d0 19 37 | f9 e3 3c 5d ab 0d ee 24 0e 3a 1b 87 b3 59 f2 dd | 29 00 00 24 11 3e 89 f2 e4 5a b4 91 6f f3 6f e0 | 10 78 d4 00 e7 63 f4 34 67 6a f8 b4 dc 99 94 12 | b9 1e 59 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cc 1e 02 bf 67 12 0b 49 15 df fb a0 | 1b e0 2a 30 f1 cf bd 20 00 00 00 1c 00 00 40 05 | ce 1d 48 38 8b bc 75 71 1c ff 01 f5 d1 af 95 90 | 14 3b df 16 | libevent_free: release ptr-libevent@0x7fb3700251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4bfd0 | #153 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 10 7e d3 7b 33 74 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #153 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #153 | rejected packet: | ed 10 7e d3 7b 33 74 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #153: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fd070 | handling event EVENT_RETRANSMIT for parent state #71 | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #71 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #71 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49614.44277; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004264 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4bfd0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #71 | libevent_malloc: new ptr-libevent@0x7fb3700251c0 size 128 "road-eastnet-nonat-71" #71: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #71) | 95 1a 0e bc b8 89 e9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 b7 52 d3 88 4c 72 94 29 6d 07 48 59 53 9a 94 | c0 d8 40 dd 8b 33 cc b5 e7 5f 10 c4 f9 b5 b0 62 | 0e 7e dc 7c c0 5d c2 c0 b8 2a 1e ee d8 c7 67 c5 | 6e 7a 2e c8 c8 78 d1 01 66 2d d2 7e a8 80 78 39 | ed 64 bc 65 47 6b 53 20 db f8 49 7d 75 df ac 21 | 43 37 22 43 cf 85 a4 b5 c6 f2 cc 18 4e ff c1 67 | d6 fb 3b b4 2a 72 36 3e af 12 4f 93 13 35 59 a3 | 8d fd 4c ac bd 7c e1 d6 8a 63 b4 aa 9a 01 66 5d | 44 4d c8 c6 a5 27 c2 50 76 c4 0f 7a ea 30 2c 2e | c8 fd c2 09 eb 13 95 a3 62 05 52 05 99 27 2d 5d | 04 8a cb d5 bd f0 da af b1 fd a8 57 4b 25 12 cd | 81 31 3f 97 9d 49 d1 70 50 67 35 65 ba 2d c4 ae | a9 91 18 06 72 21 47 2c 8e e0 a3 db 1b a2 3f 13 | 0f a8 f6 3e 94 d7 36 d8 17 22 ad cd f5 cd f3 43 | 86 8f ec 5e a8 71 d9 dd 87 6e d8 e4 58 cb 3c 76 | ee 77 2a 83 0c e5 de 50 b0 fc 77 61 13 ac a0 07 | 29 00 00 24 12 6c 20 e2 d1 b6 94 1d 42 66 63 a9 | 4b 6f 5d 9a 24 6f cd 6b 53 ff a3 87 80 0a b8 8b | a0 96 5f 5a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d bc a1 51 aa 8f 7f ab dc e5 06 f0 | 38 bb 8c 63 92 8e b2 f3 00 00 00 1c 00 00 40 05 | c9 d4 4d 25 1c 7e db b6 b8 a8 68 63 26 d6 45 14 | b5 8e ec 75 | libevent_free: release ptr-libevent@0x7fb37802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fd070 | #71 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 1a 0e bc b8 89 e9 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #71 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #71 | rejected packet: | 95 1a 0e bc b8 89 e9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #71: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0675 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-182" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-182' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #182 at 0x557d46accbc0 | State DB: adding IKEv2 state #182 in UNDEFINED | pstats #182 ikev2.ike started | Message ID: init #182: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #182: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #182; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-182" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-182" IKE SA #182 "road-eastnet-nonat-182" "road-eastnet-nonat-182" #182: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-182 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-182": constructed local IKE proposals for road-eastnet-nonat-182 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 182 for state #182 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469fd070 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #182 | libevent_malloc: new ptr-libevent@0x7fb37802a950 size 128 | crypto helper 2 resuming | #182 spent 0.174 milliseconds in ikev2_parent_outI1() | crypto helper 2 starting work-order 182 for state #182 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 182 | RESET processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-182" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.262 milliseconds in whack | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 182 time elapsed 0.000994 seconds | (#182) spent 0.999 milliseconds in crypto helper computing work-order 182: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 182 for state #182 to event queue | scheduling resume sending helper answer for #182 | libevent_malloc: new ptr-libevent@0x7fb380038370 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #182 | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 182 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #182 | **emit ISAKMP Message: | initiator cookie: | 8e 7e 13 89 c5 5d f7 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-182 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d0 e9 75 54 2d e8 42 37 37 23 34 72 75 33 ca 7f | ikev2 g^x b2 72 0c b6 c2 49 71 7a 03 e3 1d 07 58 b0 51 38 | ikev2 g^x 61 45 b2 16 d2 ad 2f f3 7c 0e 1f f4 c5 05 13 4c | ikev2 g^x d6 98 4b 66 e1 54 c0 73 13 91 4a f2 b3 d9 63 4c | ikev2 g^x 05 4b dc 71 47 da 12 a0 d3 dd 69 f7 37 06 e9 cd | ikev2 g^x 0a 8b 52 94 8a 6d da 5b 07 14 54 d3 97 43 1d a2 | ikev2 g^x ab 36 1f dc b8 97 c0 22 40 d5 44 3f fd 99 bd 8a | ikev2 g^x 9c f3 b8 47 00 bf 43 3d ae b2 e8 4a 6b 45 ec 0f | ikev2 g^x 5f e8 9a 25 7c ca 9d 80 f8 42 ce d3 9c bf c6 35 | ikev2 g^x 83 b9 bc 3b e5 0c da 92 14 98 a7 1a ce 79 b0 48 | ikev2 g^x 82 a8 51 c4 ec a8 10 1d b7 45 e5 80 dc 95 d7 16 | ikev2 g^x 44 79 9a ed 89 ab 16 cf 11 d5 7e 53 46 f0 d9 00 | ikev2 g^x eb 07 b7 8a d9 e3 ff b1 2b 68 df 33 18 af 5f 4c | ikev2 g^x 9c 70 63 04 6b ff 29 aa a6 e4 41 5f 2d 42 80 3a | ikev2 g^x 0d 17 98 f8 4e ea 6a f2 2b f3 0d 26 ff 27 2a a7 | ikev2 g^x a3 13 57 12 6f 11 b8 dd 58 53 1d d0 16 a0 b0 ee | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 65 07 2e e4 49 be 52 f9 c6 9f 8e 3b 7c a2 61 d2 | IKEv2 nonce 67 51 00 51 49 02 4e 77 4c 09 9c a2 72 c6 03 a7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8e 7e 13 89 c5 5d f7 83 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b6 | natd_hash: port= 01 f4 | natd_hash: hash= 6d 04 ff 12 2b f3 10 13 86 f3 c1 ff 09 98 25 be | natd_hash: hash= d2 68 ad 5e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6d 04 ff 12 2b f3 10 13 86 f3 c1 ff 09 98 25 be | Notify data d2 68 ad 5e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8e 7e 13 89 c5 5d f7 83 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d9 6b 4d a2 91 b8 eb 60 71 cf 0d f0 f9 f0 84 45 | natd_hash: hash= 87 2d 57 76 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d9 6b 4d a2 91 b8 eb 60 71 cf 0d f0 f9 f0 84 45 | Notify data 87 2d 57 76 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #182 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #182: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #182 to 4294967295 after switching state | Message ID: IKE #182 skipping update_recv as MD is fake | Message ID: sent #182 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-182" #182: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.182:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #182) | 8e 7e 13 89 c5 5d f7 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 e9 75 54 2d e8 42 37 37 23 34 72 75 33 ca 7f | b2 72 0c b6 c2 49 71 7a 03 e3 1d 07 58 b0 51 38 | 61 45 b2 16 d2 ad 2f f3 7c 0e 1f f4 c5 05 13 4c | d6 98 4b 66 e1 54 c0 73 13 91 4a f2 b3 d9 63 4c | 05 4b dc 71 47 da 12 a0 d3 dd 69 f7 37 06 e9 cd | 0a 8b 52 94 8a 6d da 5b 07 14 54 d3 97 43 1d a2 | ab 36 1f dc b8 97 c0 22 40 d5 44 3f fd 99 bd 8a | 9c f3 b8 47 00 bf 43 3d ae b2 e8 4a 6b 45 ec 0f | 5f e8 9a 25 7c ca 9d 80 f8 42 ce d3 9c bf c6 35 | 83 b9 bc 3b e5 0c da 92 14 98 a7 1a ce 79 b0 48 | 82 a8 51 c4 ec a8 10 1d b7 45 e5 80 dc 95 d7 16 | 44 79 9a ed 89 ab 16 cf 11 d5 7e 53 46 f0 d9 00 | eb 07 b7 8a d9 e3 ff b1 2b 68 df 33 18 af 5f 4c | 9c 70 63 04 6b ff 29 aa a6 e4 41 5f 2d 42 80 3a | 0d 17 98 f8 4e ea 6a f2 2b f3 0d 26 ff 27 2a a7 | a3 13 57 12 6f 11 b8 dd 58 53 1d d0 16 a0 b0 ee | 29 00 00 24 65 07 2e e4 49 be 52 f9 c6 9f 8e 3b | 7c a2 61 d2 67 51 00 51 49 02 4e 77 4c 09 9c a2 | 72 c6 03 a7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 04 ff 12 2b f3 10 13 86 f3 c1 ff | 09 98 25 be d2 68 ad 5e 00 00 00 1c 00 00 40 05 | d9 6b 4d a2 91 b8 eb 60 71 cf 0d f0 f9 f0 84 45 | 87 2d 57 76 | state #182 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37802a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469fd070 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0eb30 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #182 | libevent_malloc: new ptr-libevent@0x7fb37802a950 size 128 | #182 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49614.451739 | resume sending helper answer for #182 suppresed complete_v2_state_transition() and stole MD | #182 spent 0.499 milliseconds in resume sending helper answer | stop processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb380038370 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 7e 13 89 c5 5d f7 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #182 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #182 | rejected packet: | 8e 7e 13 89 c5 5d f7 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #182: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90440 | handling event EVENT_RETRANSMIT for parent state #176 | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #176 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #176 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49614.467963; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500937 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a011f0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #176 | libevent_malloc: new ptr-libevent@0x7fb380038370 size 128 "road-eastnet-nonat-176" #176: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #176) | a4 22 94 6b b7 90 01 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 06 20 a9 49 fb 93 2b 74 d8 83 cb 06 8c 55 7f 57 | 5d f1 cc 70 90 ee ee 41 59 8d d1 e4 58 c0 02 89 | 12 8f 04 73 87 28 bc ec 0e 96 08 f0 49 03 74 3b | 4f eb c4 d0 c6 21 f7 38 1b 92 1e f3 ba 46 7f 28 | b7 fb 3b 9f fa d9 3a 39 83 bb a2 23 67 98 f1 b5 | a1 a5 1f cd 74 bb 92 db b0 18 17 3e 12 cd 1b ef | c7 08 37 6b 02 81 e5 23 06 48 6f 12 26 7a 04 03 | 41 41 ce c5 75 5e 67 35 c5 ce e1 ac d5 40 0e 48 | 02 a1 2b 2d 14 1a 42 85 97 cf d2 fc 57 8d 5d de | 6b d9 22 6f 79 7d c3 c2 dd 65 20 aa 1d 5b 57 40 | a0 1a 0e 1e 45 35 58 17 0b 20 5c b0 ba 44 7d db | a2 bd 64 77 9a d5 0b a1 b5 5c 94 07 3a 31 f0 5b | 14 75 f7 58 da e1 d3 e6 78 67 58 17 31 77 19 91 | 11 0f cf 7e 64 09 ce c1 12 cf d6 40 b9 60 dd 56 | e1 a2 ed 56 fd 45 7f 51 84 03 0b 96 6c a0 15 97 | 40 65 89 e3 a9 b7 e3 e5 5a 24 e4 6f 77 a5 63 fc | 29 00 00 24 bc 2f bb 65 01 f5 95 86 7b 82 6d a7 | 33 bf 89 13 08 c1 15 eb 66 27 ad 6e 9d 4d 82 1c | fe 4f 3f 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 44 db b2 76 4d c5 a9 b2 17 20 52 | 87 84 27 9b ed 5c 63 75 00 00 00 1c 00 00 40 05 | 53 a7 06 a0 b6 ee 02 94 c4 3e c2 3c 5b 31 75 91 | 62 98 b0 aa | libevent_free: release ptr-libevent@0x7fb34801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90440 | #176 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 22 94 6b b7 90 01 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #176 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #176 | rejected packet: | a4 22 94 6b b7 90 01 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #176: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0551 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abe740 | handling event EVENT_RETRANSMIT for parent state #169 | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #169 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #169 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49614.477287; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.999566 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90440 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #169 | libevent_malloc: new ptr-libevent@0x7fb34801d920 size 128 "road-eastnet-nonat-169" #169: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #169) | 36 7b 71 a0 e2 7f 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 4f 45 f4 ab d7 36 ef 76 4d 44 de 6d 62 2d ae | 4e 5c 7f da 0a b2 48 be 78 ae 6d be 58 68 4b a4 | 8f 2f d2 29 68 46 25 1b 12 f9 92 02 9c d7 87 f1 | eb d6 eb 82 f8 34 c7 6d 1b 97 bd 5a 16 3f 5c d9 | 45 ff a3 65 05 29 38 16 83 1c 73 b0 0d 2c 32 2c | fa dc 03 8b a8 c2 e4 3a 68 19 c8 6f 81 6b a9 c7 | f3 1e d3 85 90 6b 23 38 49 5d e8 b8 1a 99 c6 3a | 6a a2 1b 8c c9 a7 dc be 9d 40 85 d1 eb b3 30 ea | 56 c0 aa c1 0c 1e 30 02 2d 3d a6 f2 04 1d 14 69 | 6d b1 c7 5c 5a 62 14 b7 a7 b0 4d b4 4a ea d7 8e | 92 28 ac 35 b4 c0 43 9c a2 b3 5b b7 49 ed fe 09 | 58 d4 4b a6 dd 4b ac 69 dc 3a 32 2b 1e e0 8a 39 | ae 70 61 ea 71 bb e0 10 48 b3 9a 5d a8 33 73 7a | e9 75 bd 48 dd 69 c9 c8 be a6 8c 92 7f 96 ad 37 | 04 3d 47 69 86 1c fb 25 12 87 50 73 a4 63 1a 75 | dc 73 f6 d1 8e ed 8a 90 43 3f ec 36 e2 fd c3 e9 | 29 00 00 24 c6 0f 04 68 5e 20 5e 64 7b fe 77 4f | 0f cb 3e 64 8c ad ed 27 06 6f 13 47 5c 0b 0d 8e | 1c d7 84 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fa 7c 50 0f e9 f1 70 67 4d 08 f0 45 | 40 25 4d e8 01 bd 9b 4f 00 00 00 1c 00 00 40 05 | cc 1b 7d 85 9d ec 77 c3 d4 a3 45 1a a2 36 2f 10 | c5 f4 8f 3e | libevent_free: release ptr-libevent@0x7fb34c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe740 | #169 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 7b 71 a0 e2 7f 3d 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #169 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #169 | rejected packet: | 36 7b 71 a0 e2 7f 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #169: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #125 | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #125 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #125 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49614.479605; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003547 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe740 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #125 | libevent_malloc: new ptr-libevent@0x7fb34c0251c0 size 128 "road-eastnet-nonat-125" #125: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #125) | f8 42 71 02 91 3f e5 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 9e 73 35 93 13 e2 cc 9b bb 37 d3 75 99 15 b9 | c8 4a ce 55 d3 69 e2 90 ce b4 49 6a 8b 41 15 d7 | f2 46 e0 27 62 0c f2 50 c4 fb 7a 1e 5f c1 57 37 | ab d6 7e 39 28 cf 50 b1 15 3d a6 21 69 94 78 9b | 54 78 01 d1 17 2e a1 fd 93 52 02 9b 3c fa 9a 7e | f8 6f 1b 35 4d b8 9a ab 6d e7 64 f6 f2 1a 64 ed | d4 92 58 2f 44 f7 44 27 44 49 1f 1e 22 3d 31 b1 | 50 2c 4d bf f2 3d 61 05 62 ba 25 68 46 81 35 68 | ee 83 cc 8e 2f 04 b6 7e f4 22 67 88 a2 a7 7a f7 | d0 39 1f 83 7d bc f9 79 5c 9d a8 05 2d 41 b5 ef | cc 86 a3 2b c2 79 2a 6d ea bc cb e6 b2 db 61 3a | 30 32 b0 ff 93 a0 20 c1 58 b9 6f 0c 98 fb c0 64 | d2 03 d7 d7 ac 87 bc 66 28 b7 cc 94 87 ea 24 29 | 58 cf 8f 26 39 81 cd e2 dc 0f e9 13 b2 ad b9 3b | 9a e1 c6 4a a2 fb 0d d5 e3 d1 b9 df 52 b9 c6 69 | 37 c0 e4 dc a2 a0 32 29 a3 ce 29 ec cc 5f 70 82 | 29 00 00 24 10 12 73 da 9a 48 c8 49 81 7a 15 0b | 6c a0 98 5f 53 25 0d 7d 05 70 86 c7 7b b0 fa 34 | 5d 40 8d 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 88 74 d5 c4 71 1e 67 79 c5 82 86 | 3b ab 9f 01 a1 7f ec b6 00 00 00 1c 00 00 40 05 | cc 1e cf e5 ba 96 b4 e9 50 32 59 97 59 23 89 39 | 4f 1c 94 28 | libevent_free: release ptr-libevent@0x7fb36402a780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #125 spent 0.0961 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 42 71 02 91 3f e5 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #125 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #125 | rejected packet: | f8 42 71 02 91 3f e5 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #125: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56e70 | handling event EVENT_RETRANSMIT for parent state #154 | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #154 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #154 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49614.484866; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002842 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #154 | libevent_malloc: new ptr-libevent@0x7fb36402a780 size 128 "road-eastnet-nonat-154" #154: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #154) | 58 44 d0 f4 a9 dc 50 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 19 a5 f0 13 d1 8a b9 49 96 a8 fe 61 6f 4c e6 | ed 98 cc 8a 65 9d e4 af 10 e6 cf 62 f8 4a ff 02 | 90 85 dd 9e 23 5d 3e 90 f8 fe da b0 af 0e f7 4d | 4a 05 63 a1 69 db d1 01 e1 b1 0c 86 c9 3e 7d 9b | a4 2a 0f 98 09 40 36 8c 8d db ff 98 96 15 32 bf | 21 16 30 40 ae ae fb 4d 47 43 6a 1d c4 ee 0d b8 | 26 d3 b2 3f 2c ab f7 f8 0e a5 40 0f 3a fc 7c 80 | cc 8b 34 d2 f1 7f 26 73 45 a4 a9 ed 44 96 56 b1 | 73 9b 2b 0c 92 10 cb f0 48 16 48 7a 38 20 64 1d | 96 ee 19 8c 5c 7f a1 2d 3c cf aa b0 87 20 50 5a | d7 fe ed 1e da e9 09 e6 09 9a 75 a1 17 60 9e 3f | eb eb 3b 4a e8 5b e7 e1 61 2b a2 e0 ec 37 4d 19 | 5f 61 62 98 dd f9 aa d9 4b 8e bd 76 64 f0 89 37 | 39 0c 99 e6 f2 9b c5 88 8a eb 5b 10 1d 66 5f 10 | c6 5a 71 1c 22 22 ac a4 dd 72 16 46 60 ff 04 a0 | 8f 7a b8 da e1 39 b2 3e 50 39 72 e6 6a 86 81 1e | 29 00 00 24 8a 71 f4 36 cf 99 83 f2 20 30 a8 af | 91 e1 58 d7 2f 81 0b 43 f4 5f a3 87 48 cc 52 31 | 9b 27 40 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 21 57 f3 9f 4c 07 c6 03 b1 b0 7f | 5c 7f 90 aa ef 12 66 a4 00 00 00 1c 00 00 40 05 | de 38 70 15 e3 5a 3a 70 b8 42 a9 af 5d 6c a1 ee | f3 f1 65 20 | libevent_free: release ptr-libevent@0x7fb36c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56e70 | #154 spent 0.0864 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 44 d0 f4 a9 dc 50 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #154 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #154 | rejected packet: | 58 44 d0 f4 a9 dc 50 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #154: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a18370 | handling event EVENT_RETRANSMIT for parent state #72 | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #72 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #72 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49614.508107; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004931 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac69c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #72 | libevent_malloc: new ptr-libevent@0x7fb36c035930 size 128 "road-eastnet-nonat-72" #72: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #72) | 66 13 43 d6 1b b9 0c ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 b1 4f d1 eb 26 94 0a e8 d2 78 fe d2 e8 05 7d | 72 29 9f e5 e1 94 c3 7f a9 6a ca 75 12 4e 13 6e | e4 11 a5 e1 89 1e 08 5a 0d 5f 6b 49 0c e7 ba a3 | db 19 75 da a7 48 e8 e9 64 d4 80 8e 45 f5 82 09 | 04 17 24 14 78 b4 6e bb 71 57 6f 3e 18 4c d6 76 | a4 ec 50 14 2c c8 4e c9 04 89 23 f1 0a 7f 62 28 | 45 8e 70 27 19 66 b0 68 5f c8 be 34 a7 7e 02 24 | 87 3b ee fe 4b 57 85 64 69 04 b9 42 92 f3 d5 c0 | fe 76 05 b0 05 50 57 66 f6 f8 0b 76 74 c3 53 a1 | 05 f6 81 e4 08 d7 39 f0 53 40 e0 f4 aa 4c ff a6 | 90 72 89 fb 79 82 71 5c b3 e4 6d 43 97 e8 51 8b | ba 0a c8 eb e3 46 09 21 84 b9 ea ef 0d 8d d4 64 | 4c bf f8 b1 9c cd 8a 27 78 9c ef 52 df a6 5e b4 | 15 f4 af e2 3a 17 55 a8 8a cb 58 8c 66 bc a1 fb | 21 eb f8 38 a5 f6 b0 fd 47 53 aa ad 2e e9 17 ad | 29 40 34 3f b5 2c 48 93 29 5b c3 81 a9 9a f6 f7 | 29 00 00 24 d2 7d 93 13 5f e4 cd 1b 68 e9 96 b6 | 73 3d 25 76 63 d4 92 1a 4f 51 ac b1 63 90 04 8e | 34 c5 00 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c4 6c df 39 39 e8 cd 3f 26 eb f0 86 | 8a 8d 3e 3d 91 1f 2d ed 00 00 00 1c 00 00 40 05 | 4c 1b 62 1c 4c 06 92 d2 01 38 c8 0e 4f 7e fd bc | 86 e6 84 ff | libevent_free: release ptr-libevent@0x7fb37c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a18370 | #72 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 13 43 d6 1b b9 0c ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #72 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #72 | rejected packet: | 66 13 43 d6 1b b9 0c ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #72: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-183" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-183' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #183 at 0x557d46ace180 | State DB: adding IKEv2 state #183 in UNDEFINED | pstats #183 ikev2.ike started | Message ID: init #183: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #183: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #183; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-183" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-183" IKE SA #183 "road-eastnet-nonat-183" "road-eastnet-nonat-183" #183: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-183 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-183": constructed local IKE proposals for road-eastnet-nonat-183 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 183 for state #183 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a18370 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #183 | libevent_malloc: new ptr-libevent@0x7fb37c02a950 size 128 | #183 spent 0.151 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 resuming | RESET processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-183" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 starting work-order 183 for state #183 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 183 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.26 milliseconds in whack | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 183 time elapsed 0.000991 seconds | (#183) spent 0.996 milliseconds in crypto helper computing work-order 183: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 183 for state #183 to event queue | scheduling resume sending helper answer for #183 | libevent_malloc: new ptr-libevent@0x7fb384038240 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #183 | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 183 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #183 | **emit ISAKMP Message: | initiator cookie: | d6 e6 54 26 a5 51 49 90 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-183 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8b d3 2c d5 46 1e bb 45 3e b1 07 9c 29 85 98 93 | ikev2 g^x ee 36 97 24 0c 65 6e 72 03 fd eb 26 66 8a 4d 99 | ikev2 g^x 30 4c 18 3c 80 72 a6 76 e5 f3 36 3a 07 42 32 c2 | ikev2 g^x 39 e8 9d 5f ec e0 51 20 28 56 14 b3 ac 67 3c fa | ikev2 g^x 98 5a 37 73 bb 28 df c4 30 da b1 be 2e 7d cf b5 | ikev2 g^x aa 2a 51 9d a6 55 f1 d6 02 88 71 ea 44 18 ea 39 | ikev2 g^x 96 0e 47 c9 6e 26 f7 c4 74 bc 17 b7 c1 ce f4 36 | ikev2 g^x 36 cb e7 f5 29 fd 74 37 cc 31 1f ce 2f ee 7a 23 | ikev2 g^x fd da 91 35 f0 f9 ff ec 58 26 8a a2 2f d2 81 0d | ikev2 g^x a1 17 24 44 c9 5f 1e 77 b9 2b 2f 5a f9 47 ce 83 | ikev2 g^x a8 fd f0 5f 20 8d e8 9e 6f 25 55 3c b9 c3 9c 82 | ikev2 g^x 64 c6 bd 5c b0 07 c1 4a d5 fd 91 20 b3 b1 5d bd | ikev2 g^x 38 8e ad d0 f3 fd d6 24 13 d0 4b 1a eb b6 e2 f9 | ikev2 g^x 08 8d ad d1 8e e2 f0 e9 c7 8d cc 8b a6 0c 02 89 | ikev2 g^x 89 a8 da 17 42 b0 bd b2 29 34 67 25 c6 68 61 cb | ikev2 g^x 05 67 1d b0 18 99 57 3e 48 e0 4d 27 90 f1 05 8d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce fb 03 08 25 8e 6d 3a 5f 6f 85 88 7b 77 f7 13 2b | IKEv2 nonce 6d 57 c0 a9 57 85 b0 8d 7b f6 0e 38 56 d2 56 04 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d6 e6 54 26 a5 51 49 90 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b7 | natd_hash: port= 01 f4 | natd_hash: hash= fb 0a 8e a5 81 0b e2 cf 5a 0e 0b 81 8d 82 2c 01 | natd_hash: hash= 80 91 75 34 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fb 0a 8e a5 81 0b e2 cf 5a 0e 0b 81 8d 82 2c 01 | Notify data 80 91 75 34 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d6 e6 54 26 a5 51 49 90 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= bf 20 fb 11 3c 6a fd 35 31 59 61 81 c5 7f e8 2f | natd_hash: hash= e6 90 5e b8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bf 20 fb 11 3c 6a fd 35 31 59 61 81 c5 7f e8 2f | Notify data e6 90 5e b8 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #183 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #183: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #183 to 4294967295 after switching state | Message ID: IKE #183 skipping update_recv as MD is fake | Message ID: sent #183 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-183" #183: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.183:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #183) | d6 e6 54 26 a5 51 49 90 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b d3 2c d5 46 1e bb 45 3e b1 07 9c 29 85 98 93 | ee 36 97 24 0c 65 6e 72 03 fd eb 26 66 8a 4d 99 | 30 4c 18 3c 80 72 a6 76 e5 f3 36 3a 07 42 32 c2 | 39 e8 9d 5f ec e0 51 20 28 56 14 b3 ac 67 3c fa | 98 5a 37 73 bb 28 df c4 30 da b1 be 2e 7d cf b5 | aa 2a 51 9d a6 55 f1 d6 02 88 71 ea 44 18 ea 39 | 96 0e 47 c9 6e 26 f7 c4 74 bc 17 b7 c1 ce f4 36 | 36 cb e7 f5 29 fd 74 37 cc 31 1f ce 2f ee 7a 23 | fd da 91 35 f0 f9 ff ec 58 26 8a a2 2f d2 81 0d | a1 17 24 44 c9 5f 1e 77 b9 2b 2f 5a f9 47 ce 83 | a8 fd f0 5f 20 8d e8 9e 6f 25 55 3c b9 c3 9c 82 | 64 c6 bd 5c b0 07 c1 4a d5 fd 91 20 b3 b1 5d bd | 38 8e ad d0 f3 fd d6 24 13 d0 4b 1a eb b6 e2 f9 | 08 8d ad d1 8e e2 f0 e9 c7 8d cc 8b a6 0c 02 89 | 89 a8 da 17 42 b0 bd b2 29 34 67 25 c6 68 61 cb | 05 67 1d b0 18 99 57 3e 48 e0 4d 27 90 f1 05 8d | 29 00 00 24 fb 03 08 25 8e 6d 3a 5f 6f 85 88 7b | 77 f7 13 2b 6d 57 c0 a9 57 85 b0 8d 7b f6 0e 38 | 56 d2 56 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 0a 8e a5 81 0b e2 cf 5a 0e 0b 81 | 8d 82 2c 01 80 91 75 34 00 00 00 1c 00 00 40 05 | bf 20 fb 11 3c 6a fd 35 31 59 61 81 c5 7f e8 2f | e6 90 5e b8 | state #183 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c02a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a18370 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56e70 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #183 | libevent_malloc: new ptr-libevent@0x7fb37c02a950 size 128 | #183 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49614.51464 | resume sending helper answer for #183 suppresed complete_v2_state_transition() and stole MD | #183 spent 0.468 milliseconds in resume sending helper answer | stop processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb384038240 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 e6 54 26 a5 51 49 90 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #183 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #183 | rejected packet: | d6 e6 54 26 a5 51 49 90 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #183: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cbd0 | handling event EVENT_RETRANSMIT for parent state #170 | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #170 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #170 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49614.544131; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002089 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fd070 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #170 | libevent_malloc: new ptr-libevent@0x7fb384038240 size 128 "road-eastnet-nonat-170" #170: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #170) | 0e 3d 5a e4 33 67 ae f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 3a 08 5b b2 3f a4 8e df 9b c0 eb a8 ff 32 50 | b7 58 7d 7d 4a 10 8c 9a ad 53 11 df 0e 8d 39 fb | 8a c0 5f d6 8f ee 32 b4 c6 d6 4c 41 39 dc c8 7f | a6 9c 35 ef 09 08 ca f8 2d 7d 3c 76 aa 39 58 43 | 35 eb 36 d9 ef 09 c3 c6 d0 ab 11 b8 34 40 ff 55 | c8 35 93 0b bc c0 66 e0 d9 9f c1 89 c0 9b 98 09 | c8 0d 44 3a d6 3d e2 b0 52 69 78 44 4a 24 b0 ad | 80 aa 61 eb 53 d9 1a 0a 53 30 0a eb d5 8c f7 f3 | ca 01 74 12 22 ff f3 9d 01 97 d0 63 da 1b b6 a1 | 02 35 c9 78 38 c4 96 f6 23 08 55 58 52 01 18 8c | 46 ea 56 a8 65 c1 e7 43 3b b8 d3 07 66 36 b4 14 | 25 9e f5 4d 86 46 ab 55 94 68 c7 67 da 70 2b 06 | a8 71 55 97 18 18 f9 3a 98 e0 35 83 6a 8d aa b1 | bc e1 50 ed 72 ba 83 3d 44 b6 97 eb 32 ff 41 57 | 48 97 03 67 e5 b8 1f 12 59 d4 1e 23 84 44 9b 29 | 9a 72 cd 57 ba 76 df 2f d8 46 ae e3 a7 ac 2c 37 | 29 00 00 24 f5 be bd 85 ea bf a8 35 5e 2e fb 98 | 21 e3 d9 77 11 2b 7a 24 c1 b5 1e 2f 89 52 5c d3 | bf 7f 74 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a ca 79 b0 52 c7 26 24 58 ba d7 c8 | 58 6a 36 93 64 5a 0d 23 00 00 00 1c 00 00 40 05 | 2e 8d 3a 82 9a 56 9c b7 68 e2 e0 45 0d 65 b1 99 | f9 22 bb fc | libevent_free: release ptr-libevent@0x7fb3400250b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cbd0 | #170 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 3d 5a e4 33 67 ae f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #170 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #170 | rejected packet: | 0e 3d 5a e4 33 67 ae f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #170: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0495 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f0aa0 | handling event EVENT_RETRANSMIT for parent state #155 | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #155 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #155 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49614.547453; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002388 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cbd0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #155 | libevent_malloc: new ptr-libevent@0x7fb3400250b0 size 128 "road-eastnet-nonat-155" #155: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #155) | ba 2d 75 59 38 9a 40 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 2d 8b bd fb e0 3e 63 93 cb 94 a3 59 ba 66 52 | 15 4e 4f 76 34 6f 63 6c 04 46 3b 73 fd d8 a5 8e | 35 33 06 7a 8c 2a 4d a0 d2 b7 a5 ef 60 5a a8 23 | ae c6 93 50 9f f0 c3 f5 06 df 4c 45 c0 4d 3b 90 | 71 b1 18 44 3a bb 92 05 e2 cb 38 9c 05 04 9c e5 | 33 86 8c 22 6f 05 07 53 37 10 99 50 e7 0b 25 55 | 89 9d 75 47 09 a1 92 af c6 86 5d 17 e6 b3 28 20 | 26 34 0c 4e a0 b6 47 51 4c df 53 f2 97 03 03 a6 | 89 4b b3 92 4a ab b5 e2 4b 58 52 5d fc 27 cb e8 | 64 f4 d9 2f f4 95 21 72 e7 fe 03 93 84 af de ff | 1c 75 39 21 b3 f9 de 3e e2 ac 5f bb e7 9f 0c bd | 32 99 99 15 33 bb 7d f8 f9 aa 92 5a 38 4d 6d 97 | 0e 69 3d a1 d8 b7 8f 44 ed 36 63 50 f7 7e 74 d2 | 45 dc 02 6e 87 72 5d 06 c1 0c 87 2a 42 4a 0c 96 | e5 33 b2 8a 28 de 43 7b 5c 89 da 84 03 93 af 07 | 0f 41 63 be 8b 32 2d a1 13 d7 f4 a0 78 5d 7b 02 | 29 00 00 24 1b 6f 61 ca 07 05 56 47 f0 44 a9 2b | df 2e 5b cb e9 85 db 0d bf 4e 16 8e a5 b1 b6 3b | d1 6b b0 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 9d 23 9a a7 98 84 7a 80 70 0e 3e | c4 f1 43 a7 4e 6b 6b 59 00 00 00 1c 00 00 40 05 | 2e 42 b0 ef a0 75 a1 7c 37 dd 50 d1 c0 f7 e8 21 | 72 07 2b e7 | libevent_free: release ptr-libevent@0x7fb360035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f0aa0 | #155 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 2d 75 59 38 9a 40 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #155 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #155 | rejected packet: | ba 2d 75 59 38 9a 40 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #155: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7fec0 | handling event EVENT_RETRANSMIT for parent state #177 | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #177 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #177 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49614.55476; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500621 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac7f80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #177 | libevent_malloc: new ptr-libevent@0x7fb360035930 size 128 "road-eastnet-nonat-177" #177: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #177) | 18 be 44 9b 6e ed 30 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 07 e3 cb ba 41 f5 29 89 53 b2 f3 1e 5e 07 87 | e1 d5 ed d4 f7 64 97 f7 8a 96 5e a4 19 72 f5 99 | db af d0 a6 4b 51 f7 55 92 f6 5e e0 30 09 2c b6 | 43 a0 4f d7 6f e1 d3 20 57 34 04 7c 3d 9a 99 83 | f9 a3 8a 6a fe fe a9 91 f2 83 44 a1 2d af 4b ef | b0 18 e4 e4 62 e5 83 a7 cf b5 7d ca 15 6b 57 02 | c4 53 c6 7f f4 9f 1d 3d 3b b0 8c b2 2b 17 6d 36 | 19 38 bf 55 ce 8a 72 4f 20 1b a4 9c a2 84 da e5 | 7c f0 4b de 9a 22 9d 10 b8 0c f6 b5 af 79 8d d9 | c7 ca 65 16 d7 e0 a1 a8 7f e6 15 6a 53 ef 5b f4 | a2 b4 0d 9c 61 31 ea 4a 75 b2 62 d9 d6 fe 75 27 | 38 c2 d0 97 b9 a4 b7 2c 60 e6 08 ea 3f 0a 15 59 | f6 77 c4 7c d1 46 84 4f f2 09 1e c0 00 e1 c8 65 | bf 5e 6f 2d 94 6e 4c d7 96 38 7b ba 94 5a e8 e2 | 2f d6 8c 88 2d de 4f ca 52 aa 70 7a c4 e8 89 b2 | cf 3d 59 65 f1 b7 65 b1 ff 08 3f df 87 d6 e3 b4 | 29 00 00 24 06 53 6b 3a e9 83 68 db aa 70 45 4d | fe 90 0e f2 c3 a1 be 18 1d d8 e7 bb b9 75 13 f1 | bb b6 76 91 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 1b 1a a2 88 2e 9b 85 cb bf 3f e0 | 58 f8 7a 1a ca d0 ae de 00 00 00 1c 00 00 40 05 | 46 28 df e2 d1 63 c9 0b 29 af bd b8 e5 56 e6 b6 | 34 92 84 18 | libevent_free: release ptr-libevent@0x7fb34402a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7fec0 | #177 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 18 be 44 9b 6e ed 30 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #177 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #177 | rejected packet: | 18 be 44 9b 6e ed 30 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #177: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0578 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9b1c0 | handling event EVENT_RETRANSMIT for parent state #126 | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #126 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #126 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49614.556083; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003749 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7fec0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #126 | libevent_malloc: new ptr-libevent@0x7fb34402a950 size 128 "road-eastnet-nonat-126" #126: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #126) | e8 37 9e 74 e5 40 14 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 2e 1b 05 80 5b 31 08 d1 66 2e 5c f6 e3 82 b6 | cf 5f b9 6a dd 55 f8 75 d5 3d b8 5c bd 4f c2 50 | 0a c1 a5 ba ac d3 ed a9 a2 26 e9 cf 5d c3 e4 66 | fe 0f 85 c2 a3 49 2f d8 4a 79 55 9a fa 0f f5 79 | a1 74 22 f0 7e 0f 09 7b 62 ab a2 9e b4 ea 39 68 | 42 b2 f9 25 9e 6d 73 5b 0f 09 1e ea 93 29 57 3e | 0b 28 34 22 62 d9 38 bd 99 bc 2b d5 1f 39 74 2e | a0 e4 e1 6b 64 87 fc 4f 05 cf 11 87 31 49 19 0e | 81 e6 fe 59 5e 93 b2 b8 96 16 02 eb 5c 73 68 d5 | 8f 57 c4 c3 f1 4b 35 e7 45 9d 6f ab 95 16 38 da | 48 f9 98 9a 6a b3 e3 05 7e d3 b1 16 a3 ba 0c e1 | 94 2d b8 d2 c3 17 d4 a2 cf ba 7e e1 17 95 db f9 | 30 a3 18 b6 15 c5 b0 4b 3c 79 61 0d 1e 89 51 db | 9f 34 0b 87 9c ce 8f 37 05 a4 88 d5 17 64 46 6f | 94 21 dd 40 17 99 04 39 5f 44 53 61 87 2c 68 27 | 48 25 14 cc 6b a9 f6 c2 49 c7 4e ae 4c 5d 8d 5b | 29 00 00 24 d1 b1 6b 78 78 5e 9b dd d4 c3 b9 87 | 6c a1 e5 10 d6 78 32 5b 72 67 12 c8 56 ea b2 20 | 83 0f e6 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 48 05 b5 88 11 05 1e fc 96 b7 8b | c4 84 87 55 48 6d 71 7e 00 00 00 1c 00 00 40 05 | a7 78 89 b5 72 dc 59 97 b9 1b 86 02 9b 2c 28 d0 | 8e b7 7c 05 | libevent_free: release ptr-libevent@0x7fb37402ff60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9b1c0 | #126 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 37 9e 74 e5 40 14 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #126 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #126 | rejected packet: | e8 37 9e 74 e5 40 14 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #126: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.058 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-184" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-184' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #184 at 0x557d46acf740 | State DB: adding IKEv2 state #184 in UNDEFINED | pstats #184 ikev2.ike started | Message ID: init #184: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #184: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #184; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-184" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-184" IKE SA #184 "road-eastnet-nonat-184" "road-eastnet-nonat-184" #184: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-184 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-184": constructed local IKE proposals for road-eastnet-nonat-184 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 184 for state #184 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9b1c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #184 | libevent_malloc: new ptr-libevent@0x7fb37402ff60 size 128 | #184 spent 0.164 milliseconds in ikev2_parent_outI1() | crypto helper 9 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 starting work-order 184 for state #184 | RESET processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-184" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 184 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.303 milliseconds in whack | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 184 time elapsed 0.000651 seconds | (#184) spent 0.659 milliseconds in crypto helper computing work-order 184: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 184 for state #184 to event queue | scheduling resume sending helper answer for #184 | libevent_malloc: new ptr-libevent@0x7fb37803b0b0 size 128 | crypto helper 9 waiting (nothing to do) | timer_event_cb: processing event@0x557d46a7b910 | handling event EVENT_RETRANSMIT for parent state #73 | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #73 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #73 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49614.578114; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004958 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f0aa0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #73 | libevent_malloc: new ptr-libevent@0x7fb3600180b0 size 128 "road-eastnet-nonat-73" #73: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #73) | 1b d1 f7 22 4f 1d be c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 17 af cb 15 dc ab b1 a5 7f 34 62 4e 0f 28 9a | 18 48 48 5b 8a 7c 0e f9 96 fe 06 d5 63 de 59 f8 | 49 35 b4 79 b1 9f 27 0d e0 5d f1 56 f3 be 3d 0b | 2c 98 27 ba b0 9f 63 a4 e7 98 a1 c0 ce b7 fa 57 | bc af 56 22 b4 0b 08 17 91 1f 28 fd 21 7d b9 47 | be 94 09 11 9d 2a ae 62 55 90 ec cd fb 6d 33 53 | dc 6e 16 d9 31 7b 9a c8 fd c1 75 61 52 f6 98 91 | 94 9a f3 05 36 de 11 ce 66 87 ce 7a d3 f8 fd 04 | 0b ba 01 fd 05 22 ef 85 db 52 65 4a 74 05 92 71 | be df ba dc 65 01 21 6c d5 86 65 2b 9a e5 83 35 | a5 c8 2d 49 2e 69 13 a9 18 d4 42 31 7e 26 5b 88 | 7c 6f cd 46 42 cb fc 6c 40 14 2b 57 0e e7 97 72 | 5b db 5d 77 72 cd 54 3e 63 fa 42 39 c6 a7 84 0d | 90 25 f3 6f 23 cf 8e 04 75 0a 41 85 e3 ef 88 28 | 25 3f 56 c1 9a ec 95 fb a0 fa ac 95 ac 16 97 71 | 2e b2 fb 1e 8b 8f a8 12 b2 0a 1f 31 5e c4 d7 fa | 29 00 00 24 93 de fa 16 34 ae c4 6f 1c b0 6f ba | 95 0e 80 10 81 5f 54 52 00 a9 bf 63 44 18 a5 30 | 6d af 4e 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 5e 43 5b b5 69 a0 f9 16 98 c0 46 | f4 de 55 67 f2 0c 20 b2 00 00 00 1c 00 00 40 05 | 50 cf 48 cc c9 4e 77 06 66 f1 57 3b 42 c0 94 82 | a3 eb c2 6e | libevent_free: release ptr-libevent@0x7fb37002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7b910 | #73 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #184 | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 184 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #184 | **emit ISAKMP Message: | initiator cookie: | 71 40 97 9a 99 00 ff cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-184 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 15 9e 33 f9 05 c0 53 fb 65 12 d0 fd a6 93 df f1 | ikev2 g^x 7d bc 07 5e 94 4b 97 6f 27 67 0f f1 85 c0 12 45 | ikev2 g^x 70 43 01 96 7d 01 69 81 8a b0 0b 08 d1 40 54 69 | ikev2 g^x 08 7f 69 f8 31 5e 9b 37 c2 56 46 05 8a 2c 74 cd | ikev2 g^x 73 c4 b5 39 bb 8c 81 c4 97 49 18 2c ce 17 a4 56 | ikev2 g^x a5 b1 98 b5 93 fe 6b bc c2 93 00 1a 7a aa e8 f7 | ikev2 g^x 9e 16 d8 e6 36 67 49 7e af 2f 60 eb cd f3 b7 6a | ikev2 g^x 60 d2 41 2c 2b 50 9f c8 44 40 ce 80 81 98 cf 17 | ikev2 g^x 31 53 e1 d5 34 76 90 8f 6f 17 46 44 c2 a9 25 1a | ikev2 g^x bb c8 2b 12 0a 1a 41 c9 b5 0e b1 65 5f 47 47 f0 | ikev2 g^x bf a6 e5 e4 cc d3 34 bc 81 ca de 84 80 2f 52 78 | ikev2 g^x 36 7b 26 1f 30 98 4d d6 d7 8c 77 eb b9 19 2a e8 | ikev2 g^x 7d a0 5e 92 74 2d 37 d4 17 8f 23 ce 1e cd 45 d9 | ikev2 g^x cf f5 6b 81 d5 e3 95 2b bc 84 3e 19 7f 4a db 38 | ikev2 g^x c7 46 31 2c ab 66 d6 cd 71 a0 bf 63 ef a6 eb 59 | ikev2 g^x 13 88 4c 39 34 56 d9 d0 92 f8 f4 65 45 ad 6a 55 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b3 65 f5 f0 87 cd d5 8a 91 5d ad e3 f8 32 68 b3 | IKEv2 nonce e0 0d 46 b4 25 a3 92 64 33 fb 91 6e c0 dc 6f 57 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 71 40 97 9a 99 00 ff cd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b8 | natd_hash: port= 01 f4 | natd_hash: hash= 93 f2 a2 9a 11 9e a6 4a 33 e0 87 52 8a c6 6f 7b | natd_hash: hash= 74 99 45 a9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 93 f2 a2 9a 11 9e a6 4a 33 e0 87 52 8a c6 6f 7b | Notify data 74 99 45 a9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 71 40 97 9a 99 00 ff cd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 98 85 7b 6c 79 cd cc f7 14 5f 2b 56 dd 51 39 9c | natd_hash: hash= f7 d7 a1 50 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 98 85 7b 6c 79 cd cc f7 14 5f 2b 56 dd 51 39 9c | Notify data f7 d7 a1 50 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #184 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #184: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #184 to 4294967295 after switching state | Message ID: IKE #184 skipping update_recv as MD is fake | Message ID: sent #184 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-184" #184: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.184:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #184) | 71 40 97 9a 99 00 ff cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 9e 33 f9 05 c0 53 fb 65 12 d0 fd a6 93 df f1 | 7d bc 07 5e 94 4b 97 6f 27 67 0f f1 85 c0 12 45 | 70 43 01 96 7d 01 69 81 8a b0 0b 08 d1 40 54 69 | 08 7f 69 f8 31 5e 9b 37 c2 56 46 05 8a 2c 74 cd | 73 c4 b5 39 bb 8c 81 c4 97 49 18 2c ce 17 a4 56 | a5 b1 98 b5 93 fe 6b bc c2 93 00 1a 7a aa e8 f7 | 9e 16 d8 e6 36 67 49 7e af 2f 60 eb cd f3 b7 6a | 60 d2 41 2c 2b 50 9f c8 44 40 ce 80 81 98 cf 17 | 31 53 e1 d5 34 76 90 8f 6f 17 46 44 c2 a9 25 1a | bb c8 2b 12 0a 1a 41 c9 b5 0e b1 65 5f 47 47 f0 | bf a6 e5 e4 cc d3 34 bc 81 ca de 84 80 2f 52 78 | 36 7b 26 1f 30 98 4d d6 d7 8c 77 eb b9 19 2a e8 | 7d a0 5e 92 74 2d 37 d4 17 8f 23 ce 1e cd 45 d9 | cf f5 6b 81 d5 e3 95 2b bc 84 3e 19 7f 4a db 38 | c7 46 31 2c ab 66 d6 cd 71 a0 bf 63 ef a6 eb 59 | 13 88 4c 39 34 56 d9 d0 92 f8 f4 65 45 ad 6a 55 | 29 00 00 24 b3 65 f5 f0 87 cd d5 8a 91 5d ad e3 | f8 32 68 b3 e0 0d 46 b4 25 a3 92 64 33 fb 91 6e | c0 dc 6f 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 f2 a2 9a 11 9e a6 4a 33 e0 87 52 | 8a c6 6f 7b 74 99 45 a9 00 00 00 1c 00 00 40 05 | 98 85 7b 6c 79 cd cc f7 14 5f 2b 56 dd 51 39 9c | f7 d7 a1 50 | state #184 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37402ff60 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9b1c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9b1c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #184 | libevent_malloc: new ptr-libevent@0x7fb37402ff60 size 128 | #184 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49614.578779 | resume sending helper answer for #184 suppresed complete_v2_state_transition() and stole MD | #184 spent 0.467 milliseconds in resume sending helper answer | stop processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37803b0b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b d1 f7 22 4f 1d be c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #73 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #73 | rejected packet: | 1b d1 f7 22 4f 1d be c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #73: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 40 97 9a 99 00 ff cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #184 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #184 | rejected packet: | 71 40 97 9a 99 00 ff cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #184: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0566 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a986c0 | handling event EVENT_RETRANSMIT for parent state #156 | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #156 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #156 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49614.613044; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002487 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7b910 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #156 | libevent_malloc: new ptr-libevent@0x7fb37803b0b0 size 128 "road-eastnet-nonat-156" #156: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #156) | dd 32 b7 34 a5 67 d1 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 58 47 50 60 00 e3 2a ab 04 ac a5 14 a4 e1 f8 | 89 44 71 9e b6 e2 f8 e1 89 a3 38 1e eb a4 57 9b | c0 92 a7 d8 d8 8c 0f 8c f9 d0 36 f7 8d 04 cc a1 | 61 5a bc bb 35 d5 16 ad 1c 27 3b fa 1b a3 4f 77 | 4e 80 47 b0 e1 83 82 b2 b5 df c4 bc d9 8d 01 04 | 4e b5 a6 60 d4 4f b3 0f 13 49 05 d9 85 5d f8 18 | 24 40 91 d1 3d 7e 6a 98 45 d7 dd 05 70 e0 c6 57 | c1 84 e8 77 d6 e2 7f 57 50 49 e0 f2 9f b0 43 93 | be 02 be f3 99 3a 02 72 36 17 a3 a7 b6 d3 1e 0b | e7 53 c6 c9 cc d5 25 75 87 c0 73 6c 5f 57 27 d6 | 52 91 24 4a 97 d3 d6 0e af 8d 6c 52 24 2d ea 91 | a1 73 e1 9e 71 14 d1 4f eb 25 67 a3 b8 12 64 b9 | 8a 15 3f 88 bc 65 32 65 96 0c ff f7 b9 a7 84 11 | bd 40 10 e1 dc 1a 04 fe 8c 35 23 2a ec b7 33 72 | 4b f4 4a e9 9d f1 da a3 b6 9c fe 09 27 14 3a 79 | 5d 82 c7 e0 9b d4 a3 ce 53 68 f7 6f b3 06 c9 71 | 29 00 00 24 b7 44 fe 38 00 43 d3 2b ff 97 13 ca | 89 7c c3 ed e0 15 4d 76 12 7b b9 2f 48 9b b5 b3 | 8b 4d ce 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 13 6e 65 76 b7 ef f6 88 e7 f3 9e | f3 f9 5a bb 01 8b 91 4f 00 00 00 1c 00 00 40 05 | 4f 93 4d ef 0e 69 28 8b f3 02 75 93 a5 b3 16 9b | e0 c9 4b 18 | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a986c0 | #156 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd 32 b7 34 a5 67 d1 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #156 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #156 | rejected packet: | dd 32 b7 34 a5 67 d1 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #156: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0472 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #171 | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #171 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #171 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49614.613297; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001219 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a986c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #171 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 "road-eastnet-nonat-171" #171: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #171) | 60 ea a0 b8 11 41 67 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 a6 a0 3d a3 d3 f7 3a 92 38 69 11 fc c0 0a e6 | ae 99 13 7e 46 80 4c 8f eb cb 1b a4 6d 5c fc 08 | ec 45 f4 48 c3 e3 73 a8 1a d3 f7 7f 3a 28 95 0f | b3 2e 82 89 be a5 d3 a6 ab 70 83 ad 3e e2 73 a1 | 73 7c b9 be d5 96 dd de 07 cc fe da 6e 65 6b 76 | 25 27 16 21 7c ef 70 24 a4 77 29 aa 15 d7 7b a8 | 16 72 3e d5 01 58 3c 97 7b 78 28 15 2b 7d 70 03 | 64 96 9b 75 19 62 f5 2d d6 23 a9 0d ca a5 9a 70 | a6 bd cc 03 9b 58 60 ee fc 9f 9e d6 00 fa 23 02 | 63 d3 b6 b9 2c b8 b0 66 04 8e 85 03 2d 8a 3b 14 | f1 66 74 61 f6 ab 2b 8f f8 31 4b 0b da 07 ed 98 | a3 08 1a 85 f1 f2 be 38 18 37 9b 13 eb 17 a9 c3 | c0 a5 db c8 dd 9c 88 27 54 50 ba 9a 47 c0 2c 00 | d1 c4 c3 04 be b5 8f d9 f7 25 9c ae 45 27 ee 47 | a2 c2 11 cc 79 aa fd 06 ae ea 3a 65 e0 36 c3 05 | dd d3 e2 dd c1 bd 1f da b7 d1 ff 87 93 0f c5 00 | 29 00 00 24 f4 77 f4 2a e1 ad 87 d1 e0 b8 f3 03 | 93 45 a7 36 54 7e 24 81 6c 5d 13 c9 3a 4c ab c2 | 28 19 06 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 9a 54 5d 74 7c 3e 57 ce 44 f1 6a | b5 dc 40 d6 fc 98 8f 10 00 00 00 1c 00 00 40 05 | ab ff fc 00 2d 34 de 32 ad 3a 53 9d f5 35 ab 6e | 4f ce 82 8b | libevent_free: release ptr-libevent@0x7fb34c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | #171 spent 0.0704 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 60 ea a0 b8 11 41 67 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #171 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #171 | rejected packet: | 60 ea a0 b8 11 41 67 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #171: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0398 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #178 | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #178 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #178 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49614.642518; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500587 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #178 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 "road-eastnet-nonat-178" #178: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #178) | ca 8e d5 21 04 56 f5 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 67 d8 60 5f 40 63 92 f2 6d b4 ba f5 02 b8 ef | 38 7a 12 cd 11 ce 9d 9b 17 62 5f df 94 e9 07 b5 | 67 9d c2 aa a5 fe a1 11 f4 ad b8 0d 63 27 26 1e | d8 17 fe 6f e7 68 09 0e 02 53 a4 bf 49 a0 db 19 | df 91 5e e9 b7 6f eb 81 53 29 3b eb 8c 48 64 ce | 19 01 46 02 e1 7d 00 12 d7 22 72 65 96 38 74 47 | fc 95 5b de f7 59 12 e1 89 c8 7c b4 26 93 4b 67 | 78 1e d0 18 c0 19 90 65 2b 34 10 55 57 cb 01 6d | c4 3f b5 2b 33 1e 80 2e 70 90 f3 a0 65 bd de 46 | 7d 2e 31 80 28 5c 82 45 70 58 e1 27 1c 57 b4 3b | 35 12 78 64 02 e3 69 39 84 d2 f4 a5 19 f1 96 0b | b4 1f 01 e4 be d8 4f ee 70 c6 2d 15 1b 96 dd 0a | 64 1f 43 c4 0e c9 83 9e ef 67 e0 c2 2c f3 12 d0 | 79 5e f6 25 ee e3 f8 a3 fa 94 d3 a2 a3 89 7b 98 | 74 09 e9 86 33 de 66 6c 13 2b 07 44 f9 44 67 9b | 43 01 93 ea 4d 3f aa bd f6 c6 55 44 dd 66 4b d4 | 29 00 00 24 2e 3d 1e d2 58 00 63 7b ef e7 79 ba | 26 0d 83 e4 01 3b ff 2b eb 29 12 83 06 3e 6a dc | 34 f9 2f 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 2f 67 46 e9 ec d0 44 c4 cc 2f 43 | d4 84 bf d5 2b 37 9d e7 00 00 00 1c 00 00 40 05 | 39 35 73 9e a6 30 0e 5d 9d 4e 3c 93 77 b7 78 c9 | 08 75 bf c2 | libevent_free: release ptr-libevent@0x7fb364035750 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | #178 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca 8e d5 21 04 56 f5 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #178 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #178 | rejected packet: | ca 8e d5 21 04 56 f5 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #178: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-185" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-185' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #185 at 0x557d46ad0d00 | State DB: adding IKEv2 state #185 in UNDEFINED | pstats #185 ikev2.ike started | Message ID: init #185: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #185: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #185; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-185" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-185" IKE SA #185 "road-eastnet-nonat-185" "road-eastnet-nonat-185" #185: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-185 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-185": constructed local IKE proposals for road-eastnet-nonat-185 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 185 for state #185 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a01150 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #185 | libevent_malloc: new ptr-libevent@0x7fb364035750 size 128 | #185 spent 0.148 milliseconds in ikev2_parent_outI1() | crypto helper 10 resuming | crypto helper 10 starting work-order 185 for state #185 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 185 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-185" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.233 milliseconds in whack | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 185 time elapsed 0.001008 seconds | (#185) spent 0.998 milliseconds in crypto helper computing work-order 185: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 185 for state #185 to event queue | scheduling resume sending helper answer for #185 | libevent_malloc: new ptr-libevent@0x7fb37c03b0b0 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #185 | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 185 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #185 | **emit ISAKMP Message: | initiator cookie: | 94 c0 c2 c7 3b 30 ec 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-185 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3d 10 80 e8 ac 1b 57 a4 b7 f2 12 9c c9 c8 96 12 | ikev2 g^x d8 b4 37 f7 f8 c8 3c b7 f2 86 fb 6d bc 61 da 40 | ikev2 g^x 39 a4 09 f0 8f 66 50 7a 6b 75 22 97 37 a4 94 4e | ikev2 g^x a8 5c 5f 80 9b d3 2e fd ee fe 03 91 38 cd a2 e4 | ikev2 g^x 3e 5d b4 2b f3 14 af ae 26 82 7e 4b 88 39 37 81 | ikev2 g^x 82 aa 3c c6 ab ba 4d b3 20 34 8d 80 3d de a0 ad | ikev2 g^x 42 64 df 60 e3 cc 41 7d eb 1f a9 4c f0 d1 47 57 | ikev2 g^x 07 35 a5 e9 25 89 b5 0e 8b 91 92 1f 2f 09 b9 ab | ikev2 g^x 46 f1 69 33 6d d8 ef 90 01 9f 20 97 28 19 d8 4c | ikev2 g^x ce 9d c5 c8 74 d2 ec a5 dd e6 34 68 1e 8b 44 b9 | ikev2 g^x 5e 3c 90 76 95 68 8e 41 20 32 dd ca 48 f2 30 6e | ikev2 g^x af 87 2d 28 a1 ad c2 a1 66 51 1d 16 88 02 4d 4b | ikev2 g^x 75 a2 59 e4 ff 63 fb 70 3e 65 bb 8f d3 36 fc 97 | ikev2 g^x bb a3 6c c7 eb b7 6a f4 47 9b e0 12 1b e1 cc 32 | ikev2 g^x 68 f4 57 ff 85 75 10 4d 46 e9 36 6a ae db 06 a6 | ikev2 g^x 0f 02 20 5f 93 d8 c0 d3 99 19 3c 12 5e d8 75 16 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d5 ca 6a 54 4d eb c2 30 7e c2 c0 88 f4 64 53 65 | IKEv2 nonce cf cb b4 99 9a a7 3b 19 af 88 ec 6a ae 0e 11 15 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 94 c0 c2 c7 3b 30 ec 6b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b9 | natd_hash: port= 01 f4 | natd_hash: hash= 6a b7 31 38 16 04 07 33 64 be 6b 23 be e3 1c e2 | natd_hash: hash= 4f 4e 6e d8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6a b7 31 38 16 04 07 33 64 be 6b 23 be e3 1c e2 | Notify data 4f 4e 6e d8 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 94 c0 c2 c7 3b 30 ec 6b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c2 92 61 e3 4d 3a b1 c0 20 50 44 2b db 6e 80 18 | natd_hash: hash= c6 ee 39 60 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c2 92 61 e3 4d 3a b1 c0 20 50 44 2b db 6e 80 18 | Notify data c6 ee 39 60 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #185 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #185: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #185 to 4294967295 after switching state | Message ID: IKE #185 skipping update_recv as MD is fake | Message ID: sent #185 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-185" #185: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.185:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #185) | 94 c0 c2 c7 3b 30 ec 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 10 80 e8 ac 1b 57 a4 b7 f2 12 9c c9 c8 96 12 | d8 b4 37 f7 f8 c8 3c b7 f2 86 fb 6d bc 61 da 40 | 39 a4 09 f0 8f 66 50 7a 6b 75 22 97 37 a4 94 4e | a8 5c 5f 80 9b d3 2e fd ee fe 03 91 38 cd a2 e4 | 3e 5d b4 2b f3 14 af ae 26 82 7e 4b 88 39 37 81 | 82 aa 3c c6 ab ba 4d b3 20 34 8d 80 3d de a0 ad | 42 64 df 60 e3 cc 41 7d eb 1f a9 4c f0 d1 47 57 | 07 35 a5 e9 25 89 b5 0e 8b 91 92 1f 2f 09 b9 ab | 46 f1 69 33 6d d8 ef 90 01 9f 20 97 28 19 d8 4c | ce 9d c5 c8 74 d2 ec a5 dd e6 34 68 1e 8b 44 b9 | 5e 3c 90 76 95 68 8e 41 20 32 dd ca 48 f2 30 6e | af 87 2d 28 a1 ad c2 a1 66 51 1d 16 88 02 4d 4b | 75 a2 59 e4 ff 63 fb 70 3e 65 bb 8f d3 36 fc 97 | bb a3 6c c7 eb b7 6a f4 47 9b e0 12 1b e1 cc 32 | 68 f4 57 ff 85 75 10 4d 46 e9 36 6a ae db 06 a6 | 0f 02 20 5f 93 d8 c0 d3 99 19 3c 12 5e d8 75 16 | 29 00 00 24 d5 ca 6a 54 4d eb c2 30 7e c2 c0 88 | f4 64 53 65 cf cb b4 99 9a a7 3b 19 af 88 ec 6a | ae 0e 11 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a b7 31 38 16 04 07 33 64 be 6b 23 | be e3 1c e2 4f 4e 6e d8 00 00 00 1c 00 00 40 05 | c2 92 61 e3 4d 3a b1 c0 20 50 44 2b db 6e 80 18 | c6 ee 39 60 | state #185 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb364035750 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a01150 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #185 | libevent_malloc: new ptr-libevent@0x7fb364035750 size 128 | #185 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49614.645884 | resume sending helper answer for #185 suppresed complete_v2_state_transition() and stole MD | #185 spent 0.468 milliseconds in resume sending helper answer | stop processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c03b0b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 c0 c2 c7 3b 30 ec 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #185 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #185 | rejected packet: | 94 c0 c2 c7 3b 30 ec 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #185: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ced0 | handling event EVENT_RETRANSMIT for parent state #74 | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #74 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #74 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49614.64708; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005764 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a18370 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #74 | libevent_malloc: new ptr-libevent@0x7fb37c03b0b0 size 128 "road-eastnet-nonat-74" #74: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #74) | 74 9c fc 4a 6a e3 e3 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 4c a1 32 c0 37 d8 5b 48 9c e5 d1 93 92 0c 53 | 2d 7a c8 b1 df 24 d3 9a 3f 8c d4 c5 68 47 a3 a6 | 97 97 ce bb 01 47 69 1c 80 a7 65 98 e9 23 03 f4 | d4 b7 9b 7e d3 4c aa b4 56 9e 09 14 71 47 28 7f | c7 55 55 ab d5 8e 75 f5 9a f4 57 8c 05 da 66 0a | 40 9c be 25 a4 ef c7 bf 8b 81 b2 07 d2 0a 7d 79 | a8 74 67 c4 01 41 ba 6b 27 91 81 d4 a9 3f 71 a7 | d8 a9 d4 20 88 c0 67 ed 9a eb cb 95 5d 27 cd ae | 65 ee b7 22 c0 dd 63 86 9c 71 c8 d0 62 02 64 6a | 57 b2 8d 13 05 28 bc e0 52 39 21 a1 da 4e f2 d4 | b5 8a d4 4a 90 a1 15 ec 76 63 23 1b 27 bd 31 af | 95 a2 f3 5b 2d 4e d4 42 7c 32 a2 bf 50 28 83 76 | 27 c1 4e 56 b2 c9 33 07 a5 ee bf 65 36 77 b7 43 | c5 de f7 7c c7 52 fc 27 15 dc 50 6e c0 2f d7 72 | 5a 3b a4 4a 5b f6 13 1e 38 47 4d 77 c3 69 47 89 | 95 21 ff 50 2d c1 83 a3 1a 90 31 a7 2f c0 c1 a5 | 29 00 00 24 5c 46 aa ed 6c 5c 2a de e4 4c 0f 0d | ff be a8 c1 d6 16 7f 78 81 97 e2 33 fc 98 55 93 | 9e 14 cc 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 26 fa 02 ef ac 51 67 96 4e b3 ca | 7c 6c ba e3 fb 9a 52 77 00 00 00 1c 00 00 40 05 | 65 ee a5 86 f4 0e 73 b1 a9 eb cb 64 18 5a 0c a9 | fd 3d e5 eb | libevent_free: release ptr-libevent@0x7fb37402a710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ced0 | #74 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 9c fc 4a 6a e3 e3 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #74 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #74 | rejected packet: | 74 9c fc 4a 6a e3 e3 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #74: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #127 | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #127 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #127 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49614.648374; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003811 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ced0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #127 | libevent_malloc: new ptr-libevent@0x7fb37402a710 size 128 "road-eastnet-nonat-127" #127: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #127) | 63 d9 7e 94 07 33 4b 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 5b 4a 46 df 60 33 0f 95 de e0 db c8 23 3c 72 | 78 4a 11 2d af 6a 95 71 57 bb 1d b2 0d c1 6e 56 | 18 59 e0 13 b5 5d 90 db b2 9a 12 87 33 39 67 e9 | 2a 2f bf ff 22 ca 7b ca ba cd 4e 56 00 bb 9c b4 | 81 b8 dd 6f 82 ec c7 49 d2 fc 91 38 84 1c a6 e9 | d6 e7 21 dd e8 11 d8 38 94 4d 8d 43 29 97 aa c4 | 81 24 9f fc d5 c9 48 0f a7 fe 34 f9 6d 30 3e 1f | 7a 4f f5 5e d9 cc da 01 80 42 b1 dc 13 04 fb 2f | cb ae 40 53 b9 7a ac 75 1a e1 0f 4b 6c 39 b0 ff | 2b d7 8e 64 87 22 57 2b a9 3e db 52 7f 0f 13 61 | 69 1f 61 e7 d0 1e 23 3d f6 9d 28 2b 3f e5 f0 23 | 95 70 12 d6 55 37 d1 5b 40 5e db 9b 46 bb 6c 24 | 88 d7 92 17 91 7b 88 03 03 b9 b9 93 f8 4d f8 75 | f3 71 3b 2a a2 b6 bc ae e3 8d ee 63 ed ee d1 97 | a9 a0 39 37 70 8d 13 eb 74 48 45 78 0b 87 f6 b1 | 15 7d 71 1f 58 45 48 e4 7a 5a b6 44 5f 0b 02 01 | 29 00 00 24 18 52 6f 35 05 34 eb 05 2a 3b d4 f4 | de e8 63 2a a6 7a 78 01 4b 37 13 8c b7 e1 00 ae | 6b 38 e3 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 57 41 80 41 67 da fb a0 6b fa cf | 8b d9 9a b2 68 5d 7b 8a 00 00 00 1c 00 00 40 05 | f9 e3 24 ce 79 a6 67 62 c8 57 cc ee 7e 1e 81 c5 | 41 7c 30 2d | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | #127 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 d9 7e 94 07 33 4b 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #127 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #127 | rejected packet: | 63 d9 7e 94 07 33 4b 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #127: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0578 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c7c0 | handling event EVENT_RETRANSMIT for parent state #157 | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #157 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #157 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49614.677674; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002528 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #157 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 "road-eastnet-nonat-157" #157: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #157) | 58 3c 05 73 d3 10 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 16 05 06 2f 3b 22 9e 88 08 ab fe 29 25 f8 32 23 | d0 15 af d8 5f 65 e8 be c6 03 98 0f 18 e5 00 77 | 99 86 03 c7 fc 1b e8 83 43 61 ba 00 0c dc 29 59 | 0d fd 85 a1 75 5e f3 f7 d2 64 26 3b e1 11 43 3a | 94 43 08 73 30 5e 1d 91 aa 8f 9d c1 5c 52 ae c1 | 1d 90 3b cb 44 47 58 f3 40 38 01 58 63 65 29 32 | b6 4a 78 a5 71 58 c1 30 ea 73 8e 14 71 72 8e df | ee 45 ee f6 d2 a7 99 89 1c 7b fc 81 aa fe 75 bb | 36 cb a8 81 eb 73 7b eb 5a e7 fa 6d e5 b4 95 b2 | be 54 f3 23 c2 44 23 4a b5 30 87 1d 26 24 c6 c4 | 6b d1 5d 1a 24 7a 69 b5 9b 7f 97 17 e0 18 0f 6f | 1f f9 f1 e8 6c 46 2c d8 28 aa 7c 1d ec ed d6 d3 | b6 eb c6 eb 3b 55 59 5b 10 23 06 f1 f2 aa 19 3c | 8e ca 99 c8 e5 ba 47 04 47 84 62 13 96 06 08 0d | 88 7a a1 63 08 7b df 84 fd 48 36 29 3e 5c 44 7d | 05 23 1e 33 96 d8 b6 34 ea b3 94 6e cc d2 07 97 | 29 00 00 24 a9 6f a2 6f e4 cf 6b 0e 7b b9 69 24 | 56 3d ee de fe c6 39 89 8e 14 c9 0f 9e 2f 60 95 | f7 4e c6 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 bf ce be 86 a6 d7 14 f3 ba 0e 49 | ee d2 d5 26 4c 2e 13 18 00 00 00 1c 00 00 40 05 | 0a 36 59 95 a8 fb 5c 3b ea 04 70 de 29 72 15 40 | a3 00 f6 34 | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | #157 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 3c 05 73 d3 10 8c 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #157 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #157 | rejected packet: | 58 3c 05 73 d3 10 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #157: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338005860 | handling event EVENT_RETRANSMIT for parent state #172 | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #172 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #172 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49614.681943; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002126 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #172 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 "road-eastnet-nonat-172" #172: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #172) | 47 43 39 2e 38 d9 e4 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 65 17 b4 48 89 eb 1e b2 78 b8 1e 15 3a 4a a1 | a2 3a fd 43 76 59 59 a1 75 7a 16 45 66 68 dc 97 | f3 bc ee bc d4 e0 57 41 47 eb 59 3e b3 f4 36 c1 | 10 8f 59 fc 57 3a 37 29 71 bf ce 33 91 c2 37 65 | 5c 9c 9f 71 6e b0 1d 6c 6c ed 90 b3 bd fc 22 6b | 94 91 98 6d a1 2f c5 a8 ca 58 04 fa 18 79 03 0a | 3e 27 a9 a6 f4 08 b2 f5 32 35 e8 b7 83 a3 4b c7 | 82 d2 5d ed b4 7c af 9d be b8 23 49 75 bb 7f 62 | 0e b3 38 1c ec 9d 39 3b f4 04 b7 d0 93 52 70 e6 | 23 bb 4d 7f 7c 2a 5e ec cb 0d 74 24 7b 07 99 42 | 6c 43 eb 64 ec ce f6 41 88 91 d0 50 22 25 43 54 | aa b8 db 3d b2 e3 bd ee 47 71 69 be 83 a3 d8 90 | 99 79 30 84 6a ac 04 1b 20 13 06 10 f1 e1 43 b3 | 50 14 89 62 82 b4 57 81 1e 80 23 23 72 24 b5 3b | 66 27 db 5a d9 e0 9f 07 96 df 6b d0 43 88 1d 6c | 19 73 59 ba d5 80 1f b5 38 2f da 5f 85 a1 ce d0 | 29 00 00 24 54 d0 27 67 15 cd c6 d9 d3 f4 1c e0 | 4e b2 db 81 71 2f 53 78 96 2e b8 d9 e9 fc be ad | 28 73 0e 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 71 7f 76 8f b4 09 cb 9b d9 d3 22 | dc b5 61 93 71 75 88 d5 00 00 00 1c 00 00 40 05 | df a3 69 ab bf ad 58 61 9f ed 54 03 7c e8 ac 70 | c8 e7 d2 fb | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338005860 | #172 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 43 39 2e 38 d9 e4 43 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #172 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #172 | rejected packet: | 47 43 39 2e 38 d9 e4 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #172: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ec960 | handling event EVENT_RETRANSMIT for parent state #179 | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #179 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #179 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49614.720106; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.507976 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #179 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-179" #179: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #179) | b7 0c 53 b0 d6 55 ba e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 e7 aa 3a d2 93 3a b1 f3 2d ef 15 4a db bc fb | 18 f2 f0 2f d7 d8 6d f1 e0 2e 7d 29 59 b1 d6 21 | e4 35 ac b2 5c fa 8c 68 d7 56 48 2c 90 1a 63 31 | 37 9f fa 36 a0 bf f8 7e a9 36 73 05 48 39 6c 08 | e9 ae 8d 6f c7 ab 9c 0b dc b9 88 2c 91 ea 94 a4 | 59 7b a5 d7 8e b8 d2 97 70 12 0b 31 b0 2a d1 31 | eb e4 69 dc 81 ca 29 66 be 80 6d 1a c2 c0 f9 06 | 99 5a 19 63 89 a6 4b 85 38 ed a4 d0 df b0 06 34 | 93 de d4 51 e8 02 b6 ef 9c b9 23 ed 94 d4 3f 30 | ed 82 5a 99 89 3b af 7c 11 96 d9 f0 92 93 d2 4f | 04 c6 5c f3 49 5b 49 5d bc f7 66 01 86 c2 c8 a2 | d8 ee 9a a2 a9 a0 e8 45 16 a7 7f a0 45 50 f6 f0 | 8b 1c 98 0a f0 a8 07 43 b8 bc ec e9 38 ec 58 b8 | 3b 0d b2 96 d1 71 70 f7 1c 22 9f 03 fc f8 39 95 | 81 cb 62 38 1d 55 75 60 24 db a4 45 80 e8 81 2f | df c7 ac c2 4c be 19 14 89 79 da 68 5f ad f7 81 | 29 00 00 24 af 43 c4 7a 3d 3b b5 29 a0 89 4a e7 | b1 1d 19 14 88 65 8d 60 36 ce d7 11 01 48 56 1b | 05 16 7d 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 78 e7 1d 9d 7c 1d 2a b3 39 b5 dd | b4 d7 38 76 a1 49 48 f7 00 00 00 1c 00 00 40 05 | 86 2a 8d 44 0e a3 13 1a 2d e3 72 66 a4 35 f9 18 | 8b 41 6c dc | libevent_free: release ptr-libevent@0x7fb358035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ec960 | #179 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 0c 53 b0 d6 55 ba e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #179 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #179 | rejected packet: | b7 0c 53 b0 d6 55 ba e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #179: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0594 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-186" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-186' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #186 at 0x557d46ad22c0 | State DB: adding IKEv2 state #186 in UNDEFINED | pstats #186 ikev2.ike started | Message ID: init #186: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #186: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #186; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-186" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-186" IKE SA #186 "road-eastnet-nonat-186" "road-eastnet-nonat-186" #186: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-186 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-186": constructed local IKE proposals for road-eastnet-nonat-186 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 186 for state #186 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469ec960 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #186 | libevent_malloc: new ptr-libevent@0x7fb358035930 size 128 | crypto helper 14 resuming | crypto helper 14 starting work-order 186 for state #186 | #186 spent 0.153 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-186" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.242 milliseconds in whack | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 186 | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 186 time elapsed 0.00117 seconds | (#186) spent 0.941 milliseconds in crypto helper computing work-order 186: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 186 for state #186 to event queue | scheduling resume sending helper answer for #186 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #186 | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 186 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #186 | **emit ISAKMP Message: | initiator cookie: | 89 a9 38 aa a6 c0 30 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-186 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x bc fc 7f 3d ba 5a de bc 76 c2 c4 f8 68 37 1f ff | ikev2 g^x ca 8e ea 53 55 b1 47 97 0b 37 3b 65 fa 61 e7 dd | ikev2 g^x 35 17 7f ab 01 8e 38 9f 4b 7f 31 31 92 f1 ba bb | ikev2 g^x d0 06 33 61 10 0b fa 86 b8 ef 01 c3 cf b1 bb 29 | ikev2 g^x 2f 2d 37 13 10 34 87 1c 1a 2a fa 97 52 ab 57 63 | ikev2 g^x 92 bf 2b 4d 93 56 f2 e9 12 3c 46 24 50 0a 19 24 | ikev2 g^x b2 fa e0 6c 1d 91 6c 12 4e 27 c3 47 94 7d 6e 37 | ikev2 g^x 39 fc 81 56 89 ca 68 6b ce 06 f5 e3 55 1e 76 a1 | ikev2 g^x 72 bf 58 f7 9a b2 03 67 a0 61 c5 e9 74 36 67 70 | ikev2 g^x b9 96 14 a2 56 cb b9 33 ac 90 e3 4f 5c 75 ef 3c | ikev2 g^x 0e 13 a9 08 94 45 0a e0 b9 1a 9c 47 5c ef 62 4f | ikev2 g^x 55 46 d5 a5 09 5b 68 73 3a 25 4c 57 99 05 2a 57 | ikev2 g^x 57 52 51 7e 0f b6 14 9f 14 b0 d1 cf 63 29 63 a1 | ikev2 g^x 49 60 4a 12 aa 1e 1e 0f 3e 32 25 9c d8 71 75 aa | ikev2 g^x 14 8e 9d fc 55 96 cf 4d 35 00 a5 a7 02 46 8a b7 | ikev2 g^x 5a f6 88 8a 4d 78 6c e2 1c 82 47 88 0b 3b 1c 06 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d4 45 d6 30 bc fb 2b aa 5c 8e f3 b7 0c 17 f8 b2 | IKEv2 nonce 59 80 d2 e0 0c b8 b9 7f 67 b9 de e9 d9 5a 25 87 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 89 a9 38 aa a6 c0 30 3e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ba | natd_hash: port= 01 f4 | natd_hash: hash= fc 68 b4 19 b5 e8 c7 d6 3c c7 30 38 5a e1 45 af | natd_hash: hash= bf 1b f1 0b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fc 68 b4 19 b5 e8 c7 d6 3c c7 30 38 5a e1 45 af | Notify data bf 1b f1 0b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 89 a9 38 aa a6 c0 30 3e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= db 71 7b 2e 3b 5f 62 cf 6c 1d 8c 60 1b 08 38 c5 | natd_hash: hash= 84 d6 4e b5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data db 71 7b 2e 3b 5f 62 cf 6c 1d 8c 60 1b 08 38 c5 | Notify data 84 d6 4e b5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #186 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #186: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #186 to 4294967295 after switching state | Message ID: IKE #186 skipping update_recv as MD is fake | Message ID: sent #186 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-186" #186: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.186:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #186) | 89 a9 38 aa a6 c0 30 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc fc 7f 3d ba 5a de bc 76 c2 c4 f8 68 37 1f ff | ca 8e ea 53 55 b1 47 97 0b 37 3b 65 fa 61 e7 dd | 35 17 7f ab 01 8e 38 9f 4b 7f 31 31 92 f1 ba bb | d0 06 33 61 10 0b fa 86 b8 ef 01 c3 cf b1 bb 29 | 2f 2d 37 13 10 34 87 1c 1a 2a fa 97 52 ab 57 63 | 92 bf 2b 4d 93 56 f2 e9 12 3c 46 24 50 0a 19 24 | b2 fa e0 6c 1d 91 6c 12 4e 27 c3 47 94 7d 6e 37 | 39 fc 81 56 89 ca 68 6b ce 06 f5 e3 55 1e 76 a1 | 72 bf 58 f7 9a b2 03 67 a0 61 c5 e9 74 36 67 70 | b9 96 14 a2 56 cb b9 33 ac 90 e3 4f 5c 75 ef 3c | 0e 13 a9 08 94 45 0a e0 b9 1a 9c 47 5c ef 62 4f | 55 46 d5 a5 09 5b 68 73 3a 25 4c 57 99 05 2a 57 | 57 52 51 7e 0f b6 14 9f 14 b0 d1 cf 63 29 63 a1 | 49 60 4a 12 aa 1e 1e 0f 3e 32 25 9c d8 71 75 aa | 14 8e 9d fc 55 96 cf 4d 35 00 a5 a7 02 46 8a b7 | 5a f6 88 8a 4d 78 6c e2 1c 82 47 88 0b 3b 1c 06 | 29 00 00 24 d4 45 d6 30 bc fb 2b aa 5c 8e f3 b7 | 0c 17 f8 b2 59 80 d2 e0 0c b8 b9 7f 67 b9 de e9 | d9 5a 25 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 68 b4 19 b5 e8 c7 d6 3c c7 30 38 | 5a e1 45 af bf 1b f1 0b 00 00 00 1c 00 00 40 05 | db 71 7b 2e 3b 5f 62 cf 6c 1d 8c 60 1b 08 38 c5 | 84 d6 4e b5 | state #186 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb358035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469ec960 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3940 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #186 | libevent_malloc: new ptr-libevent@0x7fb358035930 size 128 | #186 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49614.728318 | resume sending helper answer for #186 suppresed complete_v2_state_transition() and stole MD | #186 spent 0.479 milliseconds in resume sending helper answer | stop processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37003b0b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 a9 38 aa a6 c0 30 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #186 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #186 | rejected packet: | 89 a9 38 aa a6 c0 30 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #186: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a63210 | handling event EVENT_RETRANSMIT for parent state #158 | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #158 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #158 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49614.740548; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002145 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3980 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #158 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 "road-eastnet-nonat-158" #158: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #158) | e6 a0 1a 4e 16 85 73 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d fe 92 1d 51 a7 6d 12 34 05 5b 88 3c 14 89 6b | 35 8c a3 94 b4 c5 44 d8 4b 8c 87 4c af 0d 5e 27 | cd 39 40 ee d3 b1 d8 0b a2 08 8c 95 70 dc 7c 67 | 00 94 18 0b cc 36 ba 02 42 ac 1b 6e 83 e8 f3 b5 | 91 59 9d ad e6 9f 36 2d a8 98 92 82 b5 58 8d 17 | e8 c3 14 93 e3 79 91 5b e9 d6 f6 a5 7b ab 15 3e | 02 89 3b e3 40 68 94 7c a5 09 b7 59 3e c5 6a 99 | 03 29 08 a9 4d cb 54 e8 24 b9 ad 4e d9 ec 0b 15 | 00 2a bb 1a df 73 04 f9 ab 12 4b db 50 44 e0 e2 | 22 35 8e 9a 3a 55 04 43 31 37 ac 1b 04 2e 40 6f | a3 ce 4b 7d 81 aa 0c 4f 00 20 e7 14 67 8a 92 03 | be 6c 2c b0 1e 89 ff eb d0 66 ac db b5 5f 07 46 | 34 4e 75 3e 19 4d d5 e5 2d 16 89 cc 75 86 80 6f | 3f aa e7 c1 07 a0 f4 7f 40 db 1c df 1d 97 4e 83 | 99 fc 4e 29 fa a7 c5 07 07 e9 c0 d9 34 f7 42 65 | b3 46 1d 34 7e 34 fc b8 2a d6 72 9b 56 fa c8 74 | 29 00 00 24 93 3e 30 9d 56 73 68 ed 32 94 90 87 | db 7b 56 ae fd bb a5 6c 98 47 2c cb b8 9c 69 c6 | ac 01 dc 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 af 5c ca 3f 10 b2 e1 eb 3b d6 06 3e | 82 97 94 30 e1 e8 70 cd 00 00 00 1c 00 00 40 05 | bb 02 3a cc bb 31 72 ec b9 81 77 29 32 3e e8 21 | a2 17 d3 ee | libevent_free: release ptr-libevent@0x7fb35c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a63210 | #158 spent 0.213 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469e05a0 | handling event EVENT_RETRANSMIT for parent state #128 | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #128 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #128 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49614.740817; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003979 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a63210 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #128 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 "road-eastnet-nonat-128" #128: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #128) | 77 d1 59 6d 55 cb 18 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 01 e0 bd 82 fe e0 91 d9 ed 2a 7b 41 58 aa d2 | c1 83 b5 d4 08 da f3 c7 61 8a cf 68 fe 9a 21 e3 | 57 03 c4 31 d0 d0 ec 56 cc 27 d9 52 cc f2 63 0f | a0 ad 50 12 a9 19 98 c4 cb 8f 93 9b 57 4e ae 53 | 05 9f f7 4f 18 99 38 38 06 c2 82 4a ed ef 9d cc | 7b 44 9f 1c 19 10 74 71 d4 89 98 82 e7 d0 72 33 | aa 5f 8b bd da a0 8b 0a 73 9d 51 cb d2 a3 14 69 | d1 4b 0c 71 9d 71 26 5d bf 23 7a 67 5d 15 2b a2 | ce b7 8c 37 a6 d1 63 b0 6b dc f1 b5 b5 72 45 86 | c8 59 1a 35 a1 54 36 81 14 ea b5 34 cc 86 95 36 | de 73 da 51 28 93 ec 98 2d 7a d9 01 e1 1c 11 2d | 35 8e 59 23 0d de 42 1b 00 c8 28 40 ea c4 bc 1a | 0b 22 97 22 23 59 28 f2 30 da 60 85 07 fb be 9a | 26 22 87 03 aa 66 5a 47 26 21 89 bb a9 0e 6a fe | 60 1c 6c 90 e2 96 28 ae 41 e9 23 65 8c f4 23 57 | 72 00 10 88 06 ca 67 04 cf 4b c7 04 50 60 fe 2f | 29 00 00 24 3b ae 04 a3 29 53 44 16 26 36 89 01 | ad 8c c7 bd 38 5d c9 f9 a5 cd 29 aa 82 21 0f 5e | 4f 91 67 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 73 cd 7c c3 ca 92 54 ff 7d 3a 5c | 01 84 d2 b8 f1 a4 c9 bd 00 00 00 1c 00 00 40 05 | ec 18 dc 66 2d cf 71 2e 85 c0 4a 75 63 a1 b7 19 | b3 41 97 a0 | libevent_free: release ptr-libevent@0x7fb340030080 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e05a0 | #128 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 a0 1a 4e 16 85 73 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #158 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #158 | rejected packet: | e6 a0 1a 4e 16 85 73 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #158: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0968 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 d1 59 6d 55 cb 18 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #128 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #128 | rejected packet: | 77 d1 59 6d 55 cb 18 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #128: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0763 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a74cd0 | handling event EVENT_RETRANSMIT for parent state #173 | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #173 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #173 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49614.744259; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002504 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab39c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #173 | libevent_malloc: new ptr-libevent@0x7fb340030080 size 128 "road-eastnet-nonat-173" #173: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #173) | a3 dc 1a aa b2 53 81 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 50 c6 a8 2b 15 44 29 7d 0a e3 39 95 9c 54 98 | 15 94 31 dc b2 f4 dc 06 12 a0 ff 21 13 48 30 95 | af bf 2b b8 09 10 1f 12 f1 ba 4e d2 4d c9 b1 a8 | 05 1a 20 e3 76 d4 0d 6b 38 00 2d 67 2b 07 73 be | a7 20 4c aa b8 f7 39 95 13 6d ae b6 ef 79 3a 33 | 8d e1 63 74 10 aa 27 63 ae 0f b0 2c 9f a5 74 21 | 20 ef 3b da 07 cd e1 2a ac 84 10 e1 eb 87 c2 5c | 8c 49 b1 a8 55 4a 0b c6 97 48 c7 fa 85 87 f0 7a | d7 45 9c 5f 2a c6 38 4c 4e a1 54 1f 2a b5 2e 49 | c6 5b 7a b8 69 98 a8 6a 03 80 1c 7f 20 55 e9 fd | 67 3c d3 ce e1 0d bb 8d 6b d2 95 4c af 6b 27 f3 | df f3 c1 d1 42 37 39 82 9f 58 eb 0d c5 ad bb 97 | 84 ff 4d 8a ba d9 60 19 d6 8e a0 cf fa 4d d0 49 | 61 07 20 ea f9 3b 35 e5 ef 25 c3 9f 36 d2 2d 11 | 5f 51 ff fc 25 f0 0e 63 2f a3 a3 cd af f0 c5 be | 34 51 97 11 a8 5a bf 5a f6 22 be 55 c5 08 d3 d9 | 29 00 00 24 12 84 f7 8f dc 17 04 fd a9 ee 45 ef | 2f aa ad ed 39 8e cd ff 76 be dc 7b d9 a9 2b e6 | 08 21 dc 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 b7 38 fa 70 81 30 71 1e 17 26 ac | fb ca c9 c3 02 40 69 eb 00 00 00 1c 00 00 40 05 | 47 2a 00 7e f6 06 aa e7 bc a5 be 89 f2 8d 4b b1 | 1c ba 94 b3 | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a74cd0 | #173 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 dc 1a aa b2 53 81 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #173 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #173 | rejected packet: | a3 dc 1a aa b2 53 81 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #173: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.082 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #75 | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #75 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #75 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49614.767628; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.010402 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a74cd0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #75 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 "road-eastnet-nonat-75" #75: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #75) | d6 96 43 68 6a ec ab 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b e7 f0 1b 8c 0a 12 dd d6 e5 bf 02 28 26 dd ac | 6b 5a 27 84 cc 5b e1 51 a5 48 25 1e 64 a9 f9 15 | a7 cf bd df a0 ad 76 b9 f4 06 07 4e 82 21 11 6b | 26 3f e9 d5 c8 28 2c a1 f2 de e8 cf 1b 66 10 aa | 48 33 36 9a e1 15 5a 5f 6d a7 50 58 f0 d8 c9 11 | b2 31 61 66 dc 13 e3 c7 ff 39 58 4c c1 88 d6 62 | 58 b9 1d ad d3 89 b6 21 d6 53 4e 88 4f 41 13 08 | 17 e6 d6 6a c0 94 05 0a ca 81 fd 84 5a f1 98 1e | b0 e9 8c 00 0a 4a 9c 8f 68 9e 7b 0d 09 60 4d 06 | b0 a8 a6 4f 85 49 38 bb ac 0a 4e 89 c8 a9 1a ef | 21 bd 3e 11 8d 34 77 94 db 0a 8d 1b 25 93 bc 6d | 26 8e 7b 5a 1c a6 da 04 b8 b9 68 16 5d 98 25 e7 | 4f 1c fe b2 4a 85 cb fd 7d 24 86 89 1b f6 19 0f | c0 e3 71 1b 57 41 f6 79 be 0c 81 b2 d6 8d b1 21 | 0e f7 f7 b1 1e d7 c5 ff e7 e6 4b 6a 5e 29 e6 f5 | 33 d7 87 e4 a6 ee a9 a9 4b 11 cd 2e d2 b6 0a d2 | 29 00 00 24 80 4b a3 25 3b 73 08 25 20 19 cd 1b | 6b 4a 3a cd 29 5e ac 55 94 fe 42 a8 a3 13 30 97 | 0f 50 65 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 04 fe 2e 3e a3 d6 9c 0e cd 5a 49 | b4 f8 ac 71 05 8a 92 ef 00 00 00 1c 00 00 40 05 | 56 54 de 54 0a a0 dc 64 96 23 cc 19 a1 e6 37 21 | c0 78 fa 6f | libevent_free: release ptr-libevent@0x7fb36802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #75 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 96 43 68 6a ec ab 11 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #75 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #75 | rejected packet: | d6 96 43 68 6a ec ab 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #75: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-187" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-187' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #187 at 0x557d46ad3880 | State DB: adding IKEv2 state #187 in UNDEFINED | pstats #187 ikev2.ike started | Message ID: init #187: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #187: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #187; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-187" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-187" IKE SA #187 "road-eastnet-nonat-187" "road-eastnet-nonat-187" #187: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-187 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-187": constructed local IKE proposals for road-eastnet-nonat-187 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 187 for state #187 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb33800d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #187 | libevent_malloc: new ptr-libevent@0x7fb36802a950 size 128 | #187 spent 0.126 milliseconds in ikev2_parent_outI1() | crypto helper 15 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 starting work-order 187 for state #187 | RESET processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 187 | RESET processing: connection "road-eastnet-nonat-187" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.21 milliseconds in whack | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 187 time elapsed 0.000832 seconds | (#187) spent 0.837 milliseconds in crypto helper computing work-order 187: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 187 for state #187 to event queue | scheduling resume sending helper answer for #187 | libevent_malloc: new ptr-libevent@0x7fb37403ae20 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #187 | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 187 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #187 | **emit ISAKMP Message: | initiator cookie: | e7 c9 b3 98 5a b5 d8 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-187 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x aa 8c 48 13 ec 18 80 1b 32 77 ec 9e 3b 86 33 3b | ikev2 g^x 02 ed ce 45 9e d1 07 07 3e bc 97 2e 75 42 14 66 | ikev2 g^x 03 ce bf d6 11 7b 13 df d2 31 59 70 fe 3e 83 b2 | ikev2 g^x 64 79 15 03 06 38 db 20 68 31 b1 be e0 b0 81 7d | ikev2 g^x 4e ac bf 91 07 33 90 db 11 13 bd 16 b3 19 bb 2f | ikev2 g^x bd 78 ea 08 d7 04 61 29 46 e0 b0 be 88 fb b6 99 | ikev2 g^x 78 ba 8a fa f7 9f 36 82 a5 d0 b5 cc 15 77 46 bf | ikev2 g^x 6f 96 e3 0e c4 42 db ac 87 dc 33 da 45 8d 53 39 | ikev2 g^x 47 ad bd 32 b7 e2 e1 e0 66 2c 6d db 19 28 b7 a9 | ikev2 g^x b4 a9 eb 1e eb 6f ee c7 40 8b 38 5d 63 81 df 4c | ikev2 g^x ca 8e 71 2d f6 ed 35 fe b2 fe 7e cb 56 c2 0b db | ikev2 g^x 35 33 69 6f 1e 16 e5 63 9f 75 fa ec 8a 49 49 95 | ikev2 g^x 1a f3 8c 29 d9 10 61 09 99 f1 00 c7 a8 23 e7 4f | ikev2 g^x 74 f2 03 0e 72 27 59 cb 0b e6 eb fe 8d cd 75 0f | ikev2 g^x 66 f2 35 88 c0 48 17 b6 36 94 37 a8 a7 99 a0 7a | ikev2 g^x 46 3f c8 7b 62 bc 09 7b 66 12 f0 77 17 2a c3 df | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 92 ee 3c 64 04 c9 f4 27 93 49 ca cc 80 d7 5b 2f | IKEv2 nonce 40 c6 99 75 47 bf 36 6e b0 fd dd e8 14 05 72 21 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e7 c9 b3 98 5a b5 d8 0e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 bb | natd_hash: port= 01 f4 | natd_hash: hash= 4e d3 6f 6b 08 b5 24 1b c7 b0 97 c1 57 a8 5f 57 | natd_hash: hash= 16 36 48 8c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4e d3 6f 6b 08 b5 24 1b c7 b0 97 c1 57 a8 5f 57 | Notify data 16 36 48 8c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e7 c9 b3 98 5a b5 d8 0e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 70 ae b7 c1 13 54 ea fb c0 86 88 d6 98 09 04 e8 | natd_hash: hash= dd f9 c2 0b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 70 ae b7 c1 13 54 ea fb c0 86 88 d6 98 09 04 e8 | Notify data dd f9 c2 0b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #187 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #187: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #187 to 4294967295 after switching state | Message ID: IKE #187 skipping update_recv as MD is fake | Message ID: sent #187 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-187" #187: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.187:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #187) | e7 c9 b3 98 5a b5 d8 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 8c 48 13 ec 18 80 1b 32 77 ec 9e 3b 86 33 3b | 02 ed ce 45 9e d1 07 07 3e bc 97 2e 75 42 14 66 | 03 ce bf d6 11 7b 13 df d2 31 59 70 fe 3e 83 b2 | 64 79 15 03 06 38 db 20 68 31 b1 be e0 b0 81 7d | 4e ac bf 91 07 33 90 db 11 13 bd 16 b3 19 bb 2f | bd 78 ea 08 d7 04 61 29 46 e0 b0 be 88 fb b6 99 | 78 ba 8a fa f7 9f 36 82 a5 d0 b5 cc 15 77 46 bf | 6f 96 e3 0e c4 42 db ac 87 dc 33 da 45 8d 53 39 | 47 ad bd 32 b7 e2 e1 e0 66 2c 6d db 19 28 b7 a9 | b4 a9 eb 1e eb 6f ee c7 40 8b 38 5d 63 81 df 4c | ca 8e 71 2d f6 ed 35 fe b2 fe 7e cb 56 c2 0b db | 35 33 69 6f 1e 16 e5 63 9f 75 fa ec 8a 49 49 95 | 1a f3 8c 29 d9 10 61 09 99 f1 00 c7 a8 23 e7 4f | 74 f2 03 0e 72 27 59 cb 0b e6 eb fe 8d cd 75 0f | 66 f2 35 88 c0 48 17 b6 36 94 37 a8 a7 99 a0 7a | 46 3f c8 7b 62 bc 09 7b 66 12 f0 77 17 2a c3 df | 29 00 00 24 92 ee 3c 64 04 c9 f4 27 93 49 ca cc | 80 d7 5b 2f 40 c6 99 75 47 bf 36 6e b0 fd dd e8 | 14 05 72 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e d3 6f 6b 08 b5 24 1b c7 b0 97 c1 | 57 a8 5f 57 16 36 48 8c 00 00 00 1c 00 00 40 05 | 70 ae b7 c1 13 54 ea fb c0 86 88 d6 98 09 04 e8 | dd f9 c2 0b | state #187 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36802a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb33800d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #187 | libevent_malloc: new ptr-libevent@0x7fb36802a950 size 128 | #187 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49614.794232 | resume sending helper answer for #187 suppresed complete_v2_state_transition() and stole MD | #187 spent 0.448 milliseconds in resume sending helper answer | stop processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37403ae20 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 c9 b3 98 5a b5 d8 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #187 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #187 | rejected packet: | e7 c9 b3 98 5a b5 d8 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #187: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a647d0 | handling event EVENT_RETRANSMIT for parent state #159 | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #159 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #159 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49614.804445; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00261 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e05a0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #159 | libevent_malloc: new ptr-libevent@0x7fb37403ae20 size 128 "road-eastnet-nonat-159" #159: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #159) | 9d f6 62 77 51 33 7c 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 a4 0d 7c 3f bb 62 60 89 5b f7 52 ab d7 ca 61 | c6 32 47 69 10 70 7b 4b b6 2a 70 55 d5 38 a9 c2 | 06 fe 6f 0d a3 c3 18 2d 09 43 b4 f7 9b ba 82 ec | 93 e7 fe 37 c0 9d ff 14 eb fc f4 a5 4f eb f2 e9 | 81 40 d5 d7 0d b6 64 ad 86 89 bc 12 73 da 31 6d | 21 c9 f1 76 ef e5 fa c1 2f 00 73 7b 29 f7 14 d0 | cc 33 12 7b be c7 0b 95 25 c7 3c c9 94 8d 40 b3 | 24 76 27 7e c2 06 53 7c 39 6a 80 69 0a b2 fa aa | 13 ac 6b d9 25 77 ea de 54 91 5a 44 b0 3f bb f5 | d7 05 e4 68 6e f2 57 14 f5 2f 93 5c 8b e1 18 57 | a7 aa 40 49 0b b7 ce d1 00 80 ba 6e 5e cc 5b a3 | 7d 08 af 9a a8 cd d2 ac df 34 27 c2 04 7d d9 9f | e2 bf b9 fd 43 84 3d e1 23 56 2b 91 01 a7 94 b9 | 39 80 83 eb c5 4c de ac 80 1d 05 1e 22 14 a6 fb | 08 b1 be 3f 9b 24 b0 c4 63 eb 31 8d 24 20 37 93 | 7d fa a5 c0 26 eb c3 7c ae e2 24 2a 4f 31 bf c0 | 29 00 00 24 93 99 a4 63 0d 72 bd 0a 86 bd f8 14 | bb 6c 2c e3 e4 66 d1 1e e3 70 5a 2a 46 97 fd 74 | 37 df 1f 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 4a e8 13 db 7e 81 08 43 48 ab 41 | d6 8f 57 84 74 b1 75 e1 00 00 00 1c 00 00 40 05 | 43 72 1d eb 44 7d 24 cc 39 78 4a ec 22 c2 1a 4e | 3d 2f 0c bd | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a647d0 | #159 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d f6 62 77 51 33 7c 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #159 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #159 | rejected packet: | 9d f6 62 77 51 33 7c 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #159: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0673 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fa300 | handling event EVENT_RETRANSMIT for parent state #180 | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #180 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #180 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49614.808794; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500555 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a647d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #180 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 "road-eastnet-nonat-180" #180: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #180) | fe 73 72 02 92 15 d8 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 07 70 60 c7 56 30 74 c1 b3 ab 81 1b b5 12 a6 | 5b b3 64 05 c5 bb 30 3a 1e 92 5a 22 82 67 57 cb | ec df cc 78 63 1b 82 f2 76 a9 50 bd 80 d2 65 3a | b4 e2 7b 0a a1 1e b4 05 49 bc 96 6f 1f f1 51 36 | c7 6c ca c1 27 98 ee 50 22 95 3e cb c3 ea ef b5 | b6 40 b3 fc db 2f 79 46 a9 ac d5 8e 6f 0a 3a 8d | 7e 51 bf 5f 98 c8 56 24 ad e5 63 d9 fa 96 3f ce | b0 c6 79 3b 61 48 6d fd d7 15 2a 6b 8d 91 68 52 | a6 e1 08 45 fe 40 cd 13 6b e8 f0 74 af 74 46 b5 | 90 2f 5d d8 88 37 08 fa 12 4d 78 ce 41 b7 64 80 | a2 4d 76 43 ea e0 49 cc c2 cc 44 b2 cd 61 27 7e | 3d 40 9b 0b ff 59 99 9d a8 52 49 ee d5 dd 07 2e | 2d 3b 1d 7b e9 b4 f8 d7 66 08 0c c9 41 1c 3c eb | ca 7b 16 c5 f5 de ae 99 52 e3 17 c8 ed 61 56 a0 | 61 ae ef c8 11 73 22 d7 35 ab 44 d5 09 26 21 e1 | 09 c4 17 ac b7 7a 6c 9f bd 3c 11 d1 18 1d 51 88 | 29 00 00 24 9d 80 d3 ad d5 e1 1c 51 35 bd a3 6a | 04 d1 ff 4c 54 9f ed 38 00 a0 89 9d 6d 48 6f b5 | c4 22 6c 99 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 22 7d cd 9d 96 05 69 33 a1 7c ff | fb a1 ed a2 be 25 c7 02 00 00 00 1c 00 00 40 05 | cd 91 7d 35 4a 67 75 33 41 31 18 ee 7e 93 4a 7e | ae 98 50 4f | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fa300 | #180 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 73 72 02 92 15 d8 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #180 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #180 | rejected packet: | fe 73 72 02 92 15 d8 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #180: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a67370 | handling event EVENT_RETRANSMIT for parent state #174 | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #174 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #174 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49614.814103; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001804 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fa300 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #174 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 "road-eastnet-nonat-174" #174: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #174) | 91 36 4b 21 8c e3 c8 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 dd c5 98 91 80 2f bf e7 2b 43 43 70 f9 1c a2 | 78 b6 0b 56 89 c7 17 d8 c4 a4 ed 43 14 68 00 55 | ee dd ad 6d 8a 38 ba ad d9 23 b7 9e bb 3d 86 07 | ed 16 db de b0 44 67 be ba 65 0e 96 fd 54 eb cc | d4 d8 f1 83 4a 85 62 b4 81 ea c9 6f d6 2b 35 08 | 27 1d 44 b3 72 05 f6 d5 ee 0e c6 0c ad 30 dd 17 | d5 9d 92 9d 6e 7c 3d b9 06 e4 e1 7a b8 af 86 7e | 60 5c 18 1e 77 1f a3 0b 6c 39 63 8e 3b e2 37 7b | 90 c4 a3 0b 91 18 0b 29 93 4d 27 18 cf a4 37 53 | b6 2a 69 e7 1d 14 6c 93 05 8e 44 d8 16 2f a7 9f | 79 72 c5 dc 33 34 fc 0e b4 98 f8 e3 05 25 fe de | b4 63 51 46 dc 88 2d 12 37 aa 30 40 1c da d8 aa | d1 04 09 9e 82 a0 ef 0f 6a 96 1b 9b 72 30 77 32 | 93 8b f7 e8 2a a0 a2 dd 84 00 ba 24 75 30 17 4b | 8e 71 da c7 7b bd 41 ab b9 40 da db 82 29 9b 27 | d8 26 4c cc a8 73 89 de dd ff 26 53 c5 6f 01 3f | 29 00 00 24 cd b7 f1 c7 48 65 7b d0 51 fe 51 f7 | 71 0f cd 4b 00 33 35 86 2b 0b ad 56 3c d5 7d aa | 0f f5 4e e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 08 52 e7 44 c5 f0 65 19 f6 45 55 | b4 2d dd 6f 21 a4 bb e8 00 00 00 1c 00 00 40 05 | 78 4d 37 08 7f b6 6b 98 3a f8 5f d9 3e 81 c3 c7 | 93 cf d6 90 | libevent_free: release ptr-libevent@0x7fb338035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a67370 | #174 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 36 4b 21 8c e3 c8 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #174 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #174 | rejected packet: | 91 36 4b 21 8c e3 c8 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #174: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0647 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a100f0 | handling event EVENT_RETRANSMIT for parent state #129 | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #129 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #129 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49614.823433; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003533 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ec960 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #129 | libevent_malloc: new ptr-libevent@0x7fb338035930 size 128 "road-eastnet-nonat-129" #129: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #129) | 72 fb d4 3a 3d 31 ef 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 72 cd 05 8b 1a e1 a8 66 68 a3 88 d4 37 ab 29 | 8d ca b6 b0 86 38 49 65 ce de c8 b0 39 b5 e5 f9 | 49 66 a0 ac 83 68 f5 08 38 44 61 fc b4 c4 e3 93 | 86 b2 c8 75 e1 f1 8d 43 35 de 04 cc bd e4 ef a7 | 8b 7d df 6d 22 63 24 bb ce 8f 77 d1 43 ca 6b c6 | 70 cf 4e 81 02 44 0d 39 85 28 ca ae 69 3d 8b 1d | 8e 2a f9 28 37 54 47 1b 7f 1e 6c c3 e7 ca 7d c5 | 5d eb 2d b5 ee 04 65 71 a3 9b 69 bf 7f 5f e0 e8 | b1 ac e6 e0 77 7c 27 c0 f7 96 26 05 ab 95 ca fd | fa ef 5c 22 dc 42 3f 47 3c 21 7c b3 45 c2 0f 2d | 47 18 59 0f e9 05 83 ad b3 18 86 6e 4c 0f 6a 6f | a2 bf 54 51 83 2a 64 42 06 32 16 00 c7 cc 1b e9 | 3e b9 e5 cf 6c 0f 2e 6b fd eb c0 0a 44 95 18 9e | 2c d3 00 4b bf 67 5f 7a f5 b4 f7 f7 d7 fd a9 64 | 98 77 b8 cc 18 a8 1d 3e 8f 95 27 46 f6 67 44 7b | 96 ba b1 ae ad ee 56 93 ac c5 ad 91 dc 2a d2 ba | 29 00 00 24 64 51 a8 77 1e c3 b2 0e 1e 7b 14 6a | 5f 64 3b ca 18 8a 91 d8 b8 bf ce 82 b9 6f e1 5d | aa 66 20 12 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f cd a9 5a 90 93 b1 13 f3 88 1c ea | 0f f5 0f 31 39 58 6f be 00 00 00 1c 00 00 40 05 | 0e bb c8 26 22 69 20 e6 e2 bf a8 b0 a2 3b 98 e4 | e2 fb 7b 71 | libevent_free: release ptr-libevent@0x7fb3440300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a100f0 | #129 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 fb d4 3a 3d 31 ef 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #129 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #129 | rejected packet: | 72 fb d4 3a 3d 31 ef 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #129: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #76 | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #76 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #76 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49614.832747; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005723 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acc140 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #76 | libevent_malloc: new ptr-libevent@0x7fb3440300e0 size 128 "road-eastnet-nonat-76" #76: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #76) | 08 23 b8 f6 73 09 18 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 b3 88 98 c3 00 3b ee 78 d3 a9 62 79 c8 5e 50 | ca be d3 60 b9 ac ef b3 70 f2 72 51 6e d0 6f e7 | 76 2f 02 45 ea 0c 3e b7 a1 fa 9a de 13 7f 48 f6 | 9a 0d 43 96 53 05 8a 3f 59 81 18 a2 54 08 83 e6 | b2 23 5b f0 fb 8a 5c 92 dc 0e cf 01 e1 94 34 22 | c2 e0 dc ae e5 0d ab a5 e1 89 bb 62 bf 90 17 bf | 34 96 56 44 a4 0c 23 a8 83 ef d0 4c 0b 33 57 7c | 55 bb 56 dc a3 43 8f 68 ba 01 38 40 7f c5 c5 3f | 05 89 dc 6e 0f 54 d6 e4 1f 39 ed af 78 c0 40 5e | de 96 c5 64 7e 4a 03 ee be b0 cb 81 ef de ed 18 | d9 e4 a5 05 6d 9a 00 f2 6a ea 28 7f 9c 2d 97 a0 | 10 8c cf d6 69 56 ba cb c7 fa 65 c6 5b b9 83 ba | f4 70 1e a9 02 08 4b 23 06 c6 59 e2 2c c1 32 a4 | 3b f4 b6 34 0c f2 27 38 ff 60 3f ff db da aa 0d | 54 69 d6 85 b5 50 9d 06 87 5b 28 9b f1 40 e5 16 | 60 3a e9 e8 52 ec 8a 8f b6 c8 a1 d2 cd ff f5 a1 | 29 00 00 24 15 3e 8d 58 5c 16 4e 6b 9c 08 25 92 | 8d ef 80 f2 25 ea cd 1e ba c6 95 f9 1b a7 f2 dd | 45 1d 12 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 8b 52 aa 3c 87 b6 df df 8c 81 fe | ec 85 60 df 06 8e 81 b3 00 00 00 1c 00 00 40 05 | 54 01 aa b8 56 eb 7a 7b 30 98 73 ed 67 e2 36 06 | bd 7f 30 ed | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #76 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 23 b8 f6 73 09 18 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #76 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #76 | rejected packet: | 08 23 b8 f6 73 09 18 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #76: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0672 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc40 | handling event EVENT_RETRANSMIT for parent state #160 | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #160 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #160 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49614.871104; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003419 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #160 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 "road-eastnet-nonat-160" #160: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #160) | ec 91 fb f1 0c bb 28 b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 30 17 61 87 0e 49 c3 b5 8e 06 e9 0f 8d 98 6f | af 06 7c a8 d8 5f dc 88 0a 69 f2 9d 79 59 e2 95 | a1 fb db 6f 1f 95 32 7b b7 f9 9f f9 87 3d 1e fd | 84 a3 dc 5e 41 59 c7 3d 40 a9 2a 90 d5 3d ec a5 | 70 8f 09 86 de c0 6f f0 8b 3d 45 2f a8 92 74 65 | dc 5a 07 23 6d 89 30 20 25 5a 37 b2 af 30 d2 98 | c2 6a 98 57 d0 a0 8f ff e2 c6 37 8c 7f c8 5e c3 | 9d 98 d2 5d 5e 70 59 77 03 8a bf 2a a1 c0 c1 c0 | 77 97 84 ec 45 c7 38 00 39 c5 2e 6a 0f 64 17 e5 | 6e 90 68 05 f5 f6 24 a7 89 fc 3d ac 97 b9 b8 8e | 69 68 d2 76 c0 8b ed 21 84 18 d2 89 99 90 e5 b1 | e9 a1 7c 9d 78 af 48 90 e7 1b 1a 7c 29 30 21 6e | 39 f7 cd b5 93 ab 03 d1 25 14 24 ad 0e 2c 3a 55 | 23 bf 0e 11 13 d6 6c 92 56 a2 2e ac 22 4b 36 72 | 62 e4 c0 2c 6e a1 80 10 e9 1f 33 37 5b 82 aa ab | bc d0 55 fd fd 61 98 d4 55 8c e5 05 44 59 3d 11 | 29 00 00 24 5a 7f a2 3e 7b 7f ae 84 88 a2 b0 db | 20 96 18 8a e9 32 7e 19 52 af 25 1a 74 e6 9f 5e | 17 1f 26 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 25 02 d7 0c d0 85 e5 86 af b4 01 | ce 64 18 db 06 ad 6a 73 00 00 00 1c 00 00 40 05 | 33 04 36 eb ae 2e 87 8f ec 4d 9c 69 20 d1 b8 6e | 57 bb 48 2f | libevent_free: release ptr-libevent@0x7fb3540251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc40 | #160 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 91 fb f1 0c bb 28 b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #160 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #160 | rejected packet: | ec 91 fb f1 0c bb 28 b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #160: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0715 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c00d120 | handling event EVENT_RETRANSMIT for parent state #181 | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #181 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #181 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49614.879471; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500788 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #181 | libevent_malloc: new ptr-libevent@0x7fb3540251c0 size 128 "road-eastnet-nonat-181" #181: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #181) | 87 ea 0d a4 c5 cc c9 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 96 2b 80 67 25 14 db 43 a4 69 96 1f d6 7f 44 | 16 0f d8 a3 fa cd 04 6f 4e 52 d1 61 93 e5 7d 61 | 78 3a 71 d4 ab 07 09 6a 8d e4 9e 59 3a 16 71 d0 | 6a fd 27 9b 67 10 88 a3 7b 06 8c 1d bd 77 73 97 | cb 10 8a 01 63 6c f3 e0 d9 84 4d f6 7b 2b fb e5 | 64 39 42 1e 6a 5d e5 a2 c0 54 6b 84 eb 36 36 98 | a7 bb 04 c5 ca 92 0e 5f af 5a 95 43 e3 52 3f ff | 54 f4 17 a7 9b 5c ce c8 79 5b 79 1b f8 16 5e d7 | 38 2d 41 ad 74 20 7d b3 0e 73 6b 2e d6 c4 34 48 | 1d 4c 33 fc 1f 31 06 e5 ef d9 8a ee a4 d3 10 13 | 9f f3 13 d6 08 5c dd 5e f3 41 90 99 dc 19 c1 90 | 0b 1a f0 8f 10 ca 00 81 f3 4c 0b 20 a3 62 92 ed | 2c 01 0a 11 e9 9d cb 11 95 e0 55 b1 08 02 a2 07 | 35 a8 d1 5c 3e 00 4b 4e 53 71 3f 8a 08 82 11 91 | 21 25 67 71 35 af ba 8c 78 51 c7 49 62 d2 6d 39 | 87 19 14 5e e7 83 0f e7 70 65 a7 bd b3 6a 59 43 | 29 00 00 24 f0 e0 42 a6 e3 a5 05 54 c9 6b cd 2c | d1 4e 0f ea 18 76 ac 9e 15 69 24 da 67 51 76 47 | 7a b9 31 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 1c 40 9b 6a 7c 59 59 f4 5a 8b 5d | d3 44 cd 77 5a a2 8f ab 00 00 00 1c 00 00 40 05 | c9 f4 ff 9a 5d 3b 38 1b 8f 98 0f 89 fb a2 c8 0e | aa 7e 43 ef | libevent_free: release ptr-libevent@0x7fb36c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00d120 | #181 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 ea 0d a4 c5 cc c9 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #181 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #181 | rejected packet: | 87 ea 0d a4 c5 cc c9 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #181: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac3ec0 | handling event EVENT_RETRANSMIT for parent state #175 | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #175 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #175 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49614.893839; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00192 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #175 | libevent_malloc: new ptr-libevent@0x7fb36c012840 size 128 "road-eastnet-nonat-175" #175: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #175) | 12 29 28 fb 65 9c c2 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 ef d9 b0 55 d5 14 e7 83 ea 0c 0f eb c0 4d b2 | 18 36 c3 0d 3c 5f 0d a0 d7 f5 a9 e8 30 23 62 2f | 3d 90 5e 25 d3 54 b3 8c d3 ab 1c d3 33 34 03 78 | 85 cd 74 0f 8e 35 c2 5d e8 af fd 9d 00 2e ac e4 | 84 d5 07 fd 55 8c 43 bf 89 61 dc 61 43 3c cd 62 | c3 a0 1f 02 31 0b 07 a5 78 c5 10 08 e8 a4 7f 16 | 2c ae 5c 93 2d 6e c4 24 f5 3a 2e c6 c8 6f 2e ed | e3 0a 8d 68 b0 44 75 d4 95 53 f7 73 cd 7d 6e 84 | d1 e9 9a 86 1e 26 9e 3c d7 df ee 11 ad 66 97 c8 | d5 8e 03 f4 d8 ef b9 76 f2 13 a1 73 f1 c4 5a 4e | 4f 30 eb 7b 7a f1 c0 eb 65 91 cf a9 f3 ae 0d 25 | 9b ee 1e 21 c2 ad 7e f5 01 73 92 f7 51 aa 80 fe | 91 d2 a8 9c 23 90 be c1 3c 6a f1 41 0c 91 0d 9d | 20 55 1f c9 0c b7 77 36 a0 ac 09 f3 01 de b4 91 | 94 8a 20 8c 1f ad 5f d7 63 70 2d 9a bd f2 8c e9 | fc ac 2d 5f 45 8f 88 b9 47 ef 43 3d 71 ea 60 f1 | 29 00 00 24 97 30 3a 8f 02 71 88 b4 dc ed 53 7a | 89 3f 00 b1 2f 4a 80 0e 10 53 03 26 85 ad 54 ab | da 16 12 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 ca 83 64 e4 50 88 08 79 37 9f 8c | 5a be 7c 44 1e d9 01 29 00 00 00 1c 00 00 40 05 | 4a 03 e5 d4 1c 09 77 92 d5 8c 25 e7 2e 76 d9 45 | 5b fb 35 ac | libevent_free: release ptr-libevent@0x7fb384027b30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | #175 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a16db0 | handling event EVENT_RETRANSMIT for parent state #77 | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #77 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #77 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49614.89404; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005591 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #77 | libevent_malloc: new ptr-libevent@0x7fb384027b30 size 128 "road-eastnet-nonat-77" #77: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #77) | 4f f7 57 30 7e 30 db a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 14 f0 66 5e 0a 53 d9 86 47 70 5a 8a 73 bc cb | 52 bc 3f 13 31 b6 9a 6b ff ca f8 2e b7 f0 48 d4 | 77 e7 4c 8e 73 e9 11 6d 0b d9 88 30 75 88 11 48 | 3e 3b 98 fa 3c 66 3a 0b 64 a6 08 cb b7 12 5b 20 | d5 1b 40 67 18 3f 33 02 0f 4c 76 b1 96 fb 38 53 | 46 2f 32 4f 32 aa f2 f1 c1 7e 1b a3 93 84 38 d3 | 1e e6 5e 44 4e 6a 52 d2 5d 7c 9d 39 17 98 69 cc | ec 36 94 6b e8 33 1d ce 1b 8f 5c 7f dd d4 89 82 | 85 a6 1d ff 6c 9b 05 f9 47 a5 19 cd c4 fd 29 1a | 81 51 1f 14 ac 62 dd 33 b1 29 91 3b e8 1b 12 6e | ed 37 99 ae 6f 7a c8 95 71 30 61 a1 ef a5 33 55 | ef 40 50 d8 41 20 80 d2 32 15 fe 53 0a 4d 72 3e | a0 4f 5d 9d 14 7f 1b d9 8a 58 bc 3b 06 b1 c0 d6 | 7a 44 d2 2e f1 5d e3 62 b2 7b f9 e3 44 aa 80 9c | 12 99 76 f5 03 a4 33 27 55 fb 36 b5 80 18 d9 30 | de 03 51 b8 74 0a cb fb 17 be 0d a8 1c 8a af f0 | 29 00 00 24 70 06 ac 37 52 b8 ec 28 7d 6d 81 11 | 1b 1b 6d ce ed 39 8f ce a3 eb 17 d2 32 09 4a 8f | f1 a8 0e 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 42 86 64 cb f7 df d8 ee 6f 6b 28 | 69 76 6e 6d 07 28 e7 b4 00 00 00 1c 00 00 40 05 | cd 8e d4 a4 9f b1 74 d8 7d 8d 61 97 d8 57 39 f7 | 36 5a 1d 66 | libevent_free: release ptr-libevent@0x7fb36002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a16db0 | #77 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 12 29 28 fb 65 9c c2 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #175 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #175 | rejected packet: | 12 29 28 fb 65 9c c2 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #175: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f f7 57 30 7e 30 db a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #77 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #77 | rejected packet: | 4f f7 57 30 7e 30 db a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #77: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0505 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa0940 | handling event EVENT_RETRANSMIT for parent state #130 | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #130 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #130 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49614.89537; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003716 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acd680 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #130 | libevent_malloc: new ptr-libevent@0x7fb36002a950 size 128 "road-eastnet-nonat-130" #130: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #130) | 85 43 6a ad 59 7d ce ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 ae b5 ed fb fd 70 00 13 8d 64 ee 46 d1 86 03 | 85 09 b4 b0 21 e1 75 08 18 f5 01 a5 ce d9 28 32 | 42 84 d9 a2 5d 29 4b 02 ec 24 a8 1c 76 d6 11 b3 | b7 ca cc 7d bb 8a 73 62 20 57 c8 ee 7d 78 9e 1d | 7a d7 f6 f5 3d b0 f3 26 b5 f8 7e 6c 34 29 9d e1 | 66 87 a7 94 04 46 39 e6 b7 02 1f 92 b6 19 a4 2b | 93 1f ea 2c 8d 99 b7 50 6f cd f0 d6 4b e1 d1 c9 | 7e 98 1d 25 8f 0a 2c a3 9a 8f 46 07 29 ef b1 91 | 6c b5 e6 a3 11 c5 c9 c8 5f a8 7f 93 e8 c3 28 29 | 1d 87 06 30 a9 b3 18 af 13 99 e2 ea 6d ca d3 37 | f0 97 8e c5 32 05 cc 70 9c 35 a3 ab 7d bb 03 4c | 6f 27 f2 98 7e 64 26 7d a4 db 20 0f 0c 9d fa ef | 62 00 52 b0 8e 30 a4 8a e8 bb 41 07 76 b9 71 f2 | 63 f8 6e da 4f 74 79 ae c9 5c 70 e4 82 06 94 fd | 62 5b ee db c2 84 ae ea bf 8a 91 a6 ef 57 d0 e7 | d1 ef 3e 19 e8 2e 02 37 b6 05 eb 7c 5d f3 b5 d0 | 29 00 00 24 6c 1f 45 88 1e 42 31 9a b9 27 19 26 | 95 8c 4f c4 41 99 09 32 1c bf f6 27 de 6a fb 55 | 00 73 7a e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 41 0f ce 80 1a 0e 57 d0 34 7b d4 | 5a 51 a5 89 80 d3 8f c9 00 00 00 1c 00 00 40 05 | 7f 09 ba 77 a9 79 98 e7 5b 47 dc 5e 0f 55 ef 6e | 76 2d 29 18 | libevent_free: release ptr-libevent@0x7fb3380300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa0940 | #130 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 43 6a ad 59 7d ce ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #130 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #130 | rejected packet: | 85 43 6a ad 59 7d ce ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #130: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-188" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-188' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #188 at 0x557d46ad4e40 | State DB: adding IKEv2 state #188 in UNDEFINED | pstats #188 ikev2.ike started | Message ID: init #188: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #188: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #188; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-188" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-188" IKE SA #188 "road-eastnet-nonat-188" "road-eastnet-nonat-188" #188: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-188 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-188": constructed local IKE proposals for road-eastnet-nonat-188 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 188 for state #188 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aa0940 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #188 | libevent_malloc: new ptr-libevent@0x7fb3380300e0 size 128 | #188 spent 0.156 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 19 resuming | crypto helper 19 starting work-order 188 for state #188 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 188 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 188 time elapsed 0.000897 seconds | (#188) spent 0.904 milliseconds in crypto helper computing work-order 188: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 188 for state #188 to event queue | scheduling resume sending helper answer for #188 | libevent_malloc: new ptr-libevent@0x7fb36803b0b0 size 128 | crypto helper 19 waiting (nothing to do) | RESET processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-188" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.281 milliseconds in whack | processing resume sending helper answer for #188 | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 188 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #188 | **emit ISAKMP Message: | initiator cookie: | f8 92 2e dc 48 c8 64 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-188 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 09 8c 6e 8b 73 15 ff 0e bb aa f8 24 68 da ef 6a | ikev2 g^x 1c 01 19 e8 a2 a3 5e f6 5a 71 31 aa 3c b1 c4 41 | ikev2 g^x 27 8d 2a 58 b3 aa 09 ec ab 9b 79 a4 37 2c 57 bc | ikev2 g^x 33 2a 63 cb 88 61 ff 6f 57 a5 f5 2c 3b 28 ff c0 | ikev2 g^x e2 03 fe e0 d7 c3 cd af a3 47 59 59 0e 58 bb 20 | ikev2 g^x d6 dc 5a 4c 31 47 b6 5a 25 02 b2 63 30 de fe 0f | ikev2 g^x aa 00 d1 fa e6 0a 07 a2 95 d3 2a cc eb a7 d4 64 | ikev2 g^x 92 40 37 20 3b f0 9c 95 06 bf 89 fe 4e 9c 75 93 | ikev2 g^x be 49 6d 83 74 cb 43 a9 68 b0 b3 1b 6c 7e b1 7d | ikev2 g^x 71 1f eb 81 78 ef b8 84 cd 25 a3 cb 59 97 64 95 | ikev2 g^x 1c 19 a1 95 2c 31 c2 d1 08 08 8a 2a 38 f4 5e 06 | ikev2 g^x d0 60 01 b7 7e f7 37 07 7c 57 50 f7 20 78 35 94 | ikev2 g^x 90 2f 3d b8 01 db 62 a4 93 0c bc 99 72 08 c3 2a | ikev2 g^x 65 b1 ef fc 8b 00 29 6d 1d eb d8 05 c6 bd 18 34 | ikev2 g^x 85 96 91 a6 8d 87 95 d6 03 d2 b7 ec 1a a3 0e 66 | ikev2 g^x 18 52 9c 51 fa 27 d5 c0 2b 40 de 51 c6 17 5c e3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 32 b3 09 c7 6d 35 ae 79 0b a9 93 c1 25 b3 85 c2 | IKEv2 nonce 02 53 dd a2 dc f7 0c 55 f9 9f 55 72 45 99 28 f0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f8 92 2e dc 48 c8 64 8b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 bc | natd_hash: port= 01 f4 | natd_hash: hash= 62 05 c4 f8 2b d0 22 47 d6 02 77 fd 96 35 b9 b3 | natd_hash: hash= 1b 70 08 41 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 62 05 c4 f8 2b d0 22 47 d6 02 77 fd 96 35 b9 b3 | Notify data 1b 70 08 41 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f8 92 2e dc 48 c8 64 8b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f1 47 98 30 50 7a f1 c9 d1 56 2e ed 54 8a b8 d4 | natd_hash: hash= be 9f b3 89 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f1 47 98 30 50 7a f1 c9 d1 56 2e ed 54 8a b8 d4 | Notify data be 9f b3 89 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #188 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #188: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #188 to 4294967295 after switching state | Message ID: IKE #188 skipping update_recv as MD is fake | Message ID: sent #188 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-188" #188: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.188:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #188) | f8 92 2e dc 48 c8 64 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 8c 6e 8b 73 15 ff 0e bb aa f8 24 68 da ef 6a | 1c 01 19 e8 a2 a3 5e f6 5a 71 31 aa 3c b1 c4 41 | 27 8d 2a 58 b3 aa 09 ec ab 9b 79 a4 37 2c 57 bc | 33 2a 63 cb 88 61 ff 6f 57 a5 f5 2c 3b 28 ff c0 | e2 03 fe e0 d7 c3 cd af a3 47 59 59 0e 58 bb 20 | d6 dc 5a 4c 31 47 b6 5a 25 02 b2 63 30 de fe 0f | aa 00 d1 fa e6 0a 07 a2 95 d3 2a cc eb a7 d4 64 | 92 40 37 20 3b f0 9c 95 06 bf 89 fe 4e 9c 75 93 | be 49 6d 83 74 cb 43 a9 68 b0 b3 1b 6c 7e b1 7d | 71 1f eb 81 78 ef b8 84 cd 25 a3 cb 59 97 64 95 | 1c 19 a1 95 2c 31 c2 d1 08 08 8a 2a 38 f4 5e 06 | d0 60 01 b7 7e f7 37 07 7c 57 50 f7 20 78 35 94 | 90 2f 3d b8 01 db 62 a4 93 0c bc 99 72 08 c3 2a | 65 b1 ef fc 8b 00 29 6d 1d eb d8 05 c6 bd 18 34 | 85 96 91 a6 8d 87 95 d6 03 d2 b7 ec 1a a3 0e 66 | 18 52 9c 51 fa 27 d5 c0 2b 40 de 51 c6 17 5c e3 | 29 00 00 24 32 b3 09 c7 6d 35 ae 79 0b a9 93 c1 | 25 b3 85 c2 02 53 dd a2 dc f7 0c 55 f9 9f 55 72 | 45 99 28 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 05 c4 f8 2b d0 22 47 d6 02 77 fd | 96 35 b9 b3 1b 70 08 41 00 00 00 1c 00 00 40 05 | f1 47 98 30 50 7a f1 c9 d1 56 2e ed 54 8a b8 d4 | be 9f b3 89 | state #188 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3380300e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aa0940 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa0940 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #188 | libevent_malloc: new ptr-libevent@0x7fb3380300e0 size 128 | #188 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49614.909426 | resume sending helper answer for #188 suppresed complete_v2_state_transition() and stole MD | #188 spent 0.575 milliseconds in resume sending helper answer | stop processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36803b0b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 92 2e dc 48 c8 64 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #188 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #188 | rejected packet: | f8 92 2e dc 48 c8 64 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #188: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #161 | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #161 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #161 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49614.937746; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.007792 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a16db0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #161 | libevent_malloc: new ptr-libevent@0x7fb36803b0b0 size 128 "road-eastnet-nonat-161" #161: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #161) | 0e 21 c5 28 e0 11 16 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 b1 7e f7 73 9d 3d 0b 9c d2 8e 29 c6 08 34 06 | 2d dc ae 10 7c 53 33 af cd 18 8c 8c 37 fc eb 71 | 2c 3b de 0f 76 b3 63 bc 1c 05 f0 af 4b 44 5e c7 | 23 d4 29 d3 16 0f fb 8c 12 fb 18 1d 9e 65 94 73 | c1 7f 44 d2 39 97 a4 57 24 65 09 c9 9f 95 0f 07 | 98 bb c4 fc e8 f9 84 20 79 d3 9b da f2 f3 7b ff | 76 4d 74 89 ed 7a aa a4 38 3a 39 de f9 ec 60 48 | 7f 57 eb 50 ff 9b 33 98 7d 3b 5f cc 64 ba 1b 81 | 67 2a 02 26 ec 3f 45 a5 fe c6 9b 0d 1d 37 b0 40 | 01 1f 97 01 e8 87 5e 53 40 bf fb d3 7e 9e 2e b3 | 15 ba fc 8b b1 4a 7e fa af 94 c4 67 c0 2c 29 d2 | 74 fe d7 24 50 34 48 da f7 a1 54 c5 1c 2b 5a 35 | 33 a6 86 42 a8 e3 25 9b e3 fe 4c de 22 93 ae dd | c7 11 a7 9f 05 b4 87 2f a1 b9 2b f6 21 37 9c 8e | 50 21 6a 50 8e bd 1d 5f a1 42 92 50 68 2f 4e 9a | 54 04 e8 cc b9 5f 82 df 48 23 c8 76 49 63 f0 50 | 29 00 00 24 b8 74 18 e1 c4 b4 30 2e a4 31 94 25 | 46 e1 dc 47 b5 0b e4 ae a0 1d 11 3a f1 77 67 fa | 52 d5 2a a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 94 bf 28 28 ea 74 13 ca 7d 07 ba | 5d 79 38 7b d7 5d 40 d3 00 00 00 1c 00 00 40 05 | aa 2f 88 27 56 8a 2e 19 5d ff 44 bb aa 2d 48 42 | c7 75 31 6a | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #161 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 21 c5 28 e0 11 16 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #161 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #161 | rejected packet: | 0e 21 c5 28 e0 11 16 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #161: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0eb30 | handling event EVENT_RETRANSMIT for parent state #182 | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #182 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #182 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49614.953097; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501358 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #182 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 "road-eastnet-nonat-182" #182: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #182) | 8e 7e 13 89 c5 5d f7 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 e9 75 54 2d e8 42 37 37 23 34 72 75 33 ca 7f | b2 72 0c b6 c2 49 71 7a 03 e3 1d 07 58 b0 51 38 | 61 45 b2 16 d2 ad 2f f3 7c 0e 1f f4 c5 05 13 4c | d6 98 4b 66 e1 54 c0 73 13 91 4a f2 b3 d9 63 4c | 05 4b dc 71 47 da 12 a0 d3 dd 69 f7 37 06 e9 cd | 0a 8b 52 94 8a 6d da 5b 07 14 54 d3 97 43 1d a2 | ab 36 1f dc b8 97 c0 22 40 d5 44 3f fd 99 bd 8a | 9c f3 b8 47 00 bf 43 3d ae b2 e8 4a 6b 45 ec 0f | 5f e8 9a 25 7c ca 9d 80 f8 42 ce d3 9c bf c6 35 | 83 b9 bc 3b e5 0c da 92 14 98 a7 1a ce 79 b0 48 | 82 a8 51 c4 ec a8 10 1d b7 45 e5 80 dc 95 d7 16 | 44 79 9a ed 89 ab 16 cf 11 d5 7e 53 46 f0 d9 00 | eb 07 b7 8a d9 e3 ff b1 2b 68 df 33 18 af 5f 4c | 9c 70 63 04 6b ff 29 aa a6 e4 41 5f 2d 42 80 3a | 0d 17 98 f8 4e ea 6a f2 2b f3 0d 26 ff 27 2a a7 | a3 13 57 12 6f 11 b8 dd 58 53 1d d0 16 a0 b0 ee | 29 00 00 24 65 07 2e e4 49 be 52 f9 c6 9f 8e 3b | 7c a2 61 d2 67 51 00 51 49 02 4e 77 4c 09 9c a2 | 72 c6 03 a7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 04 ff 12 2b f3 10 13 86 f3 c1 ff | 09 98 25 be d2 68 ad 5e 00 00 00 1c 00 00 40 05 | d9 6b 4d a2 91 b8 eb 60 71 cf 0d f0 f9 f0 84 45 | 87 2d 57 76 | libevent_free: release ptr-libevent@0x7fb37802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0eb30 | #182 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 7e 13 89 c5 5d f7 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #182 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #182 | rejected packet: | 8e 7e 13 89 c5 5d f7 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #182: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a34e10 | handling event EVENT_RETRANSMIT for parent state #78 | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #78 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #78 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49614.954426; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005522 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a100f0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #78 | libevent_malloc: new ptr-libevent@0x7fb37802a950 size 128 "road-eastnet-nonat-78" #78: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #78) | a4 c9 07 ac 54 d6 e0 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 5b 1c ec 96 24 e8 86 d8 c5 db 68 a4 e8 84 cc | f4 a2 ed 99 bf 5e 8a c5 ce b3 9d 08 41 58 29 f0 | dd 3a 5a 77 6f 59 d0 63 db 3e 63 03 3b 94 a8 82 | ea c5 b5 55 dc 2c ec 77 5f 63 ff ce 1a d3 98 5f | ea ba 50 e4 20 9b 1b 0b de 70 1d 72 5e 41 20 22 | dd 96 8b a8 2c 90 f1 b3 79 70 7b 0b d2 f5 29 64 | 24 96 41 c0 b2 23 eb 70 92 6c 66 1d 59 a6 82 09 | 57 e0 df 9e 1d 1d 55 b5 06 9b 7f 66 07 cc cc ff | f3 52 44 fb 3d f1 4f 79 5c 0c 51 85 cc cb 4f 32 | 4d 99 ed e1 7c 32 81 a7 49 c4 5e 9c f7 c7 98 e6 | 2c 03 b7 c8 ab bf 01 d1 70 a5 d7 0f 97 f6 d8 06 | e8 43 56 25 d8 da 9c 66 8b 84 9d ed 34 99 f3 6a | ab 13 48 0a 68 c6 9c 38 c0 da 1e ec 9d bd 23 04 | 56 2e b0 d9 0e 5f 21 85 8d b7 b7 e4 3f 8c e4 76 | 68 1b d3 cc a6 1f 24 7c 46 61 29 b6 47 f3 ad 62 | ed ad e7 10 a5 af 19 f0 76 6b ea 90 57 9b 3b 13 | 29 00 00 24 e3 1c 8b 3a ff 4e 05 3e c1 af db 58 | 7b 8f 74 6d 20 c2 73 1e 04 d3 ec 5f 05 cc 9d e9 | 4b 1e 83 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f c3 34 65 1f ff 78 b6 0e ee cd 35 | 94 8b f4 3a 81 46 94 12 00 00 00 1c 00 00 40 05 | f3 90 ab 75 b4 45 e0 98 82 06 c5 91 b7 b5 12 83 | 38 ae 55 ca | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a34e10 | #78 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 c9 07 ac 54 d6 e0 33 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #78 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #78 | rejected packet: | a4 c9 07 ac 54 d6 e0 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #78: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a25d10 | handling event EVENT_RETRANSMIT for parent state #131 | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #131 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #131 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49614.964923; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003507 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a34e10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #131 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 "road-eastnet-nonat-131" #131: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #131) | ad 34 7c 82 56 8e 42 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 46 e3 f8 a7 ca 79 f1 93 d8 0a 34 f9 91 ea 90 | 77 1f 83 03 4d 56 b1 a2 80 fd 5f 11 9a a9 0e 07 | 36 d2 ed 03 17 79 a3 f7 12 9f 05 ea 25 52 aa 39 | 69 97 15 3f 13 ff 62 78 88 a8 12 45 6d 5a 25 bd | 48 89 e9 ef 1f ad 28 87 00 42 ce a4 5f 7b 92 dc | 5d 1c f0 bb 25 31 dd e0 95 17 e2 9c e6 0b 50 26 | d7 14 f3 fe 1e d8 81 cc 32 fc 47 d4 65 1e 3b 75 | 32 54 1f 31 95 11 57 b2 4c 02 a6 33 ce 14 e9 e2 | e8 05 1b 1c cb 66 89 aa 6f 57 54 90 f2 c1 cf bd | a5 b3 7a c8 ef 67 d8 5e 26 3c 19 61 97 89 69 83 | 4b df 7e 44 0f 87 25 bc 6c 4f d8 49 5f 35 7f 1f | 6e 25 45 69 17 ee 43 65 f2 ee f7 63 5d 98 79 9e | fc c9 a2 e1 68 04 58 49 4b 9f c5 76 64 08 49 29 | 17 3a 17 1d 87 31 e4 d7 77 de 85 c2 0a d4 26 0f | 9f f4 0b fc 3f 26 bf f9 03 95 99 d3 57 10 6f ed | 92 8e 36 88 87 df d0 52 c8 ab 1d e3 6f cc ae 49 | 29 00 00 24 3c 10 ae 50 61 d8 53 b3 d3 e2 21 42 | 85 3a 07 db 01 3a f5 3e 94 0e a7 09 dd b2 ae 2b | e1 07 91 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 36 c8 4a f5 a5 90 83 e4 ec b2 3e | 44 38 46 9b 6e 4b f9 11 00 00 00 1c 00 00 40 05 | 1e 37 ad 88 e1 0a 42 8f 3f c7 b2 8c f4 b1 3f 27 | c4 6f 80 e6 | libevent_free: release ptr-libevent@0x7fb3840223a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a25d10 | #131 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 34 7c 82 56 8e 42 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #131 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #131 | rejected packet: | ad 34 7c 82 56 8e 42 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #131: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0676 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a011f0 | handling event EVENT_RETRANSMIT for parent state #176 | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #176 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #176 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49614.968264; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001238 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a25d10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #176 | libevent_malloc: new ptr-libevent@0x7fb3840223a0 size 128 "road-eastnet-nonat-176" #176: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #176) | a4 22 94 6b b7 90 01 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 06 20 a9 49 fb 93 2b 74 d8 83 cb 06 8c 55 7f 57 | 5d f1 cc 70 90 ee ee 41 59 8d d1 e4 58 c0 02 89 | 12 8f 04 73 87 28 bc ec 0e 96 08 f0 49 03 74 3b | 4f eb c4 d0 c6 21 f7 38 1b 92 1e f3 ba 46 7f 28 | b7 fb 3b 9f fa d9 3a 39 83 bb a2 23 67 98 f1 b5 | a1 a5 1f cd 74 bb 92 db b0 18 17 3e 12 cd 1b ef | c7 08 37 6b 02 81 e5 23 06 48 6f 12 26 7a 04 03 | 41 41 ce c5 75 5e 67 35 c5 ce e1 ac d5 40 0e 48 | 02 a1 2b 2d 14 1a 42 85 97 cf d2 fc 57 8d 5d de | 6b d9 22 6f 79 7d c3 c2 dd 65 20 aa 1d 5b 57 40 | a0 1a 0e 1e 45 35 58 17 0b 20 5c b0 ba 44 7d db | a2 bd 64 77 9a d5 0b a1 b5 5c 94 07 3a 31 f0 5b | 14 75 f7 58 da e1 d3 e6 78 67 58 17 31 77 19 91 | 11 0f cf 7e 64 09 ce c1 12 cf d6 40 b9 60 dd 56 | e1 a2 ed 56 fd 45 7f 51 84 03 0b 96 6c a0 15 97 | 40 65 89 e3 a9 b7 e3 e5 5a 24 e4 6f 77 a5 63 fc | 29 00 00 24 bc 2f bb 65 01 f5 95 86 7b 82 6d a7 | 33 bf 89 13 08 c1 15 eb 66 27 ad 6e 9d 4d 82 1c | fe 4f 3f 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 44 db b2 76 4d c5 a9 b2 17 20 52 | 87 84 27 9b ed 5c 63 75 00 00 00 1c 00 00 40 05 | 53 a7 06 a0 b6 ee 02 94 c4 3e c2 3c 5b 31 75 91 | 62 98 b0 aa | libevent_free: release ptr-libevent@0x7fb380038370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a011f0 | #176 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 22 94 6b b7 90 01 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #176 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #176 | rejected packet: | a4 22 94 6b b7 90 01 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #176: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28ab0 | handling event EVENT_RETRANSMIT for parent state #162 | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #162 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #162 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49615.010597; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003046 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a67370 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #162 | libevent_malloc: new ptr-libevent@0x7fb380038370 size 128 "road-eastnet-nonat-162" #162: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #162) | 3b bf da 45 10 1c 63 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 2a 00 6f 37 4b f5 08 dc 2d d5 a4 5f d7 a7 d8 | a8 4d 31 bb 56 e7 51 71 5b 5d fc c8 0e 08 fb e2 | c0 7c 0d 9e fa 59 01 dc 52 d2 c1 e7 2f 1a e5 b4 | 5b d5 c8 45 b5 dd 91 a9 d5 c3 73 76 9d 7e fd b8 | f9 df d1 f8 01 94 2b 6f e5 9a 29 12 9e de 27 97 | 71 f3 e6 1b 74 76 a7 3a 8c e6 a9 61 00 52 7e f7 | c9 6f 55 40 33 0a 80 4c aa c5 55 f4 4e 14 8a a7 | 71 a6 78 3d d0 59 58 77 2f 99 7c 4c c3 1e 74 08 | f9 85 d0 5e 65 f5 6a 31 d7 63 2d f9 e8 59 8b 16 | 32 89 82 d2 3f 02 ed 88 92 cb b0 35 d8 db 40 15 | 72 43 38 f2 76 11 5a 75 77 0e 67 e7 50 ab d6 be | 45 bd 9e 45 2f 01 23 b3 e6 91 d2 ea db c5 26 44 | 62 95 26 52 cc d7 f4 4b d1 06 28 b1 bb 01 1a 47 | 2c 16 e5 b8 18 7a 69 d5 78 76 2f ea 81 85 bf fa | 27 ed 91 6a 8a 48 18 3c 3f 20 85 89 ae e6 4e 97 | 89 5c 72 59 c7 16 4a 7b 0a b0 0c 8e 44 0c ca 39 | 29 00 00 24 95 de a1 84 1b 6b 5e e8 be 4d c4 44 | d7 89 7f ff f7 3c d6 b5 51 9e bf df 42 03 ca bf | 75 41 b7 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 45 b2 30 32 2f 26 ad dc fc 75 7c | 7f bc 91 0d 37 21 2d 1b 00 00 00 1c 00 00 40 05 | b1 72 3a ba 32 f9 7a 15 ec b8 bb 62 7e ea 84 2a | af f4 56 24 | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28ab0 | #162 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b bf da 45 10 1c 63 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #162 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #162 | rejected packet: | 3b bf da 45 10 1c 63 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #162: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0688 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56e70 | handling event EVENT_RETRANSMIT for parent state #183 | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #183 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #183 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49615.01538; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50074 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28ab0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #183 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 "road-eastnet-nonat-183" #183: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #183) | d6 e6 54 26 a5 51 49 90 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b d3 2c d5 46 1e bb 45 3e b1 07 9c 29 85 98 93 | ee 36 97 24 0c 65 6e 72 03 fd eb 26 66 8a 4d 99 | 30 4c 18 3c 80 72 a6 76 e5 f3 36 3a 07 42 32 c2 | 39 e8 9d 5f ec e0 51 20 28 56 14 b3 ac 67 3c fa | 98 5a 37 73 bb 28 df c4 30 da b1 be 2e 7d cf b5 | aa 2a 51 9d a6 55 f1 d6 02 88 71 ea 44 18 ea 39 | 96 0e 47 c9 6e 26 f7 c4 74 bc 17 b7 c1 ce f4 36 | 36 cb e7 f5 29 fd 74 37 cc 31 1f ce 2f ee 7a 23 | fd da 91 35 f0 f9 ff ec 58 26 8a a2 2f d2 81 0d | a1 17 24 44 c9 5f 1e 77 b9 2b 2f 5a f9 47 ce 83 | a8 fd f0 5f 20 8d e8 9e 6f 25 55 3c b9 c3 9c 82 | 64 c6 bd 5c b0 07 c1 4a d5 fd 91 20 b3 b1 5d bd | 38 8e ad d0 f3 fd d6 24 13 d0 4b 1a eb b6 e2 f9 | 08 8d ad d1 8e e2 f0 e9 c7 8d cc 8b a6 0c 02 89 | 89 a8 da 17 42 b0 bd b2 29 34 67 25 c6 68 61 cb | 05 67 1d b0 18 99 57 3e 48 e0 4d 27 90 f1 05 8d | 29 00 00 24 fb 03 08 25 8e 6d 3a 5f 6f 85 88 7b | 77 f7 13 2b 6d 57 c0 a9 57 85 b0 8d 7b f6 0e 38 | 56 d2 56 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 0a 8e a5 81 0b e2 cf 5a 0e 0b 81 | 8d 82 2c 01 80 91 75 34 00 00 00 1c 00 00 40 05 | bf 20 fb 11 3c 6a fd 35 31 59 61 81 c5 7f e8 2f | e6 90 5e b8 | libevent_free: release ptr-libevent@0x7fb37c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56e70 | #183 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 e6 54 26 a5 51 49 90 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #183 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #183 | rejected packet: | d6 e6 54 26 a5 51 49 90 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #183: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0679 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #79 | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #79 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #79 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49615.018726; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005248 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acec40 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #79 | libevent_malloc: new ptr-libevent@0x7fb37c02a950 size 128 "road-eastnet-nonat-79" #79: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #79) | cb 0e 87 22 6d 04 19 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 8d fa 75 ee f5 0c 34 b3 09 04 c3 a6 70 35 18 | 8c e8 6b 6c 5c 5b 2d 90 26 5a 5e f9 d4 07 05 c2 | f5 73 64 12 f5 c2 51 38 6d 89 1a 0c 01 ef 01 94 | 08 08 2e cb 41 34 b4 4a 2f f7 ed 3c c1 7e 04 ba | 4c cb 90 52 00 84 c7 1d 71 85 6e 14 f7 d6 ba c6 | 6a 98 c9 b3 82 dd 58 3d c8 6f 45 92 9b e7 64 4a | 6e c9 47 ec bd a8 a4 79 ac 0e 9c ec e9 38 db 99 | d6 25 d7 25 8b 64 97 e5 d5 6a 07 ae 6b 9a 25 6c | ea 70 9f 4a 9e ba a1 e7 d8 d9 69 c1 2c a9 28 e5 | 2c 51 5f 2a f8 17 0e 3b 43 9f 77 5e 3a 59 4f 18 | 6f 20 ad 6e aa 63 b5 82 47 75 97 d0 4a 75 bf 68 | 0b ac a2 f9 6c 9d b8 21 cd c5 79 8b 66 f4 0e 4b | 32 8b f9 5e de 93 2f 2f 11 cf e9 f6 3a 2b 4b 7a | bd 3c a3 27 78 6d f5 6c 33 13 d9 14 f8 0e 44 d7 | 3e 91 89 43 f4 2f 9b b6 ab 6d 76 71 13 52 45 fd | 0e 5e 7c 72 38 35 d5 eb 86 2e 14 37 c5 c9 56 83 | 29 00 00 24 5a 77 8f b1 9a 0e 27 f5 13 b5 b3 3b | 54 a7 64 e6 f0 cd 7e 6d c0 5a 2d 35 86 f1 cb 9d | 32 23 be bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 31 42 b5 5a b6 78 6b 4f 08 f8 04 | 13 cc 8c 45 a7 cd ab bc 00 00 00 1c 00 00 40 05 | 2d 9f b7 7e f4 d4 af ae b0 e9 56 0d ae 10 83 85 | d2 ea 45 54 | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #79 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cb 0e 87 22 6d 04 19 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #79 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #79 | rejected packet: | cb 0e 87 22 6d 04 19 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #79: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-189" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-189' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #189 at 0x557d46ad6400 | State DB: adding IKEv2 state #189 in UNDEFINED | pstats #189 ikev2.ike started | Message ID: init #189: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #189: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #189; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-189" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-189" IKE SA #189 "road-eastnet-nonat-189" "road-eastnet-nonat-189" #189: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-189 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-189": constructed local IKE proposals for road-eastnet-nonat-189 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 189 for state #189 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb368005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #189 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 | #189 spent 0.161 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-189" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.249 milliseconds in whack | crypto helper 6 resuming | crypto helper 6 starting work-order 189 for state #189 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 189 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 189 time elapsed 0.000918 seconds | (#189) spent 0.927 milliseconds in crypto helper computing work-order 189: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 189 for state #189 to event queue | scheduling resume sending helper answer for #189 | libevent_malloc: new ptr-libevent@0x7fb36c03b0b0 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #189 | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 189 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #189 | **emit ISAKMP Message: | initiator cookie: | 86 0c af cf d7 4f f0 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-189 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e5 da a6 92 01 b3 1e 2d 01 6d b4 b0 5b c8 86 63 | ikev2 g^x fa d3 04 1f 4a 5d 42 51 c6 fa 83 7f 52 a9 5c 5f | ikev2 g^x 29 a2 a6 67 ca c4 cb cd f8 82 1e 41 60 3e d2 fa | ikev2 g^x be e5 64 f3 5e f3 de 1c 66 73 04 70 83 c5 c9 fa | ikev2 g^x d9 0c 95 4f d8 7c 96 92 62 c0 89 3f a6 f5 e5 1c | ikev2 g^x 1d 8a 04 ae 7f 59 7e f9 0a 02 65 1e e5 50 67 cc | ikev2 g^x 8a fa 7a d2 bf b6 8d 22 68 80 58 92 0d 46 32 32 | ikev2 g^x ac 55 d1 c6 9f 27 eb 86 dd 30 64 7d 70 38 1f e2 | ikev2 g^x 82 2f 8e ad e7 06 c8 10 a8 89 ac cd 34 d4 ef 54 | ikev2 g^x d9 fa ef 60 3c 01 17 c1 e0 90 2b 1d 49 9b 9e e6 | ikev2 g^x 59 07 02 91 fb ba 4f 73 08 2f de a1 3c 70 c1 7b | ikev2 g^x f2 11 29 b4 eb 0f 6e 10 04 0d 03 e4 29 ad b5 0b | ikev2 g^x 6b 4b aa f3 91 cc 9d d5 fa 2e 4d ea 3f 0e 7e 09 | ikev2 g^x 29 dd 22 a7 1f e8 ee 73 1f 35 15 51 78 6d 86 ea | ikev2 g^x cd eb 92 50 fc 79 44 24 ff 9f f8 19 89 f2 31 2b | ikev2 g^x 2f 82 13 db f2 4a 67 b7 c4 2a 16 2f d5 d4 31 ee | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ab 6b 1b 01 ee 77 53 c6 2a de 6e a0 bf 1d e9 b5 | IKEv2 nonce 56 76 a7 4b d5 a7 a9 e9 a7 01 9e 47 cc 4b 2a 5e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 86 0c af cf d7 4f f0 1f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 bd | natd_hash: port= 01 f4 | natd_hash: hash= 28 a4 06 85 0c 28 ca 55 e9 70 4f 7f 1a ca eb c6 | natd_hash: hash= 50 e4 53 f0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 28 a4 06 85 0c 28 ca 55 e9 70 4f 7f 1a ca eb c6 | Notify data 50 e4 53 f0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 86 0c af cf d7 4f f0 1f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2a 84 d0 22 8e e3 5b 68 a0 3f 20 22 83 cb 94 15 | natd_hash: hash= 67 d9 c0 48 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2a 84 d0 22 8e e3 5b 68 a0 3f 20 22 83 cb 94 15 | Notify data 67 d9 c0 48 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #189 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #189: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #189 to 4294967295 after switching state | Message ID: IKE #189 skipping update_recv as MD is fake | Message ID: sent #189 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-189" #189: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.189:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #189) | 86 0c af cf d7 4f f0 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 da a6 92 01 b3 1e 2d 01 6d b4 b0 5b c8 86 63 | fa d3 04 1f 4a 5d 42 51 c6 fa 83 7f 52 a9 5c 5f | 29 a2 a6 67 ca c4 cb cd f8 82 1e 41 60 3e d2 fa | be e5 64 f3 5e f3 de 1c 66 73 04 70 83 c5 c9 fa | d9 0c 95 4f d8 7c 96 92 62 c0 89 3f a6 f5 e5 1c | 1d 8a 04 ae 7f 59 7e f9 0a 02 65 1e e5 50 67 cc | 8a fa 7a d2 bf b6 8d 22 68 80 58 92 0d 46 32 32 | ac 55 d1 c6 9f 27 eb 86 dd 30 64 7d 70 38 1f e2 | 82 2f 8e ad e7 06 c8 10 a8 89 ac cd 34 d4 ef 54 | d9 fa ef 60 3c 01 17 c1 e0 90 2b 1d 49 9b 9e e6 | 59 07 02 91 fb ba 4f 73 08 2f de a1 3c 70 c1 7b | f2 11 29 b4 eb 0f 6e 10 04 0d 03 e4 29 ad b5 0b | 6b 4b aa f3 91 cc 9d d5 fa 2e 4d ea 3f 0e 7e 09 | 29 dd 22 a7 1f e8 ee 73 1f 35 15 51 78 6d 86 ea | cd eb 92 50 fc 79 44 24 ff 9f f8 19 89 f2 31 2b | 2f 82 13 db f2 4a 67 b7 c4 2a 16 2f d5 d4 31 ee | 29 00 00 24 ab 6b 1b 01 ee 77 53 c6 2a de 6e a0 | bf 1d e9 b5 56 76 a7 4b d5 a7 a9 e9 a7 01 9e 47 | cc 4b 2a 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 a4 06 85 0c 28 ca 55 e9 70 4f 7f | 1a ca eb c6 50 e4 53 f0 00 00 00 1c 00 00 40 05 | 2a 84 d0 22 8e e3 5b 68 a0 3f 20 22 83 cb 94 15 | 67 d9 c0 48 | state #189 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb368005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #189 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 | #189 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49615.022894 | resume sending helper answer for #189 suppresed complete_v2_state_transition() and stole MD | #189 spent 0.519 milliseconds in resume sending helper answer | stop processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c03b0b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 0c af cf d7 4f f0 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #189 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #189 | rejected packet: | 86 0c af cf d7 4f f0 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #189: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34800d120 | handling event EVENT_RETRANSMIT for parent state #132 | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #132 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #132 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49615.029624; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005414 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56e70 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #132 | libevent_malloc: new ptr-libevent@0x7fb36c03b0b0 size 128 "road-eastnet-nonat-132" #132: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #132) | 8f fb fe 61 19 e1 9c b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 1f 4f d1 68 44 b0 da 10 cc a3 65 0b 05 29 46 | a5 ef 62 34 d2 17 30 f6 7e b7 1c 3d c0 61 fd c8 | 25 96 8a e1 67 57 19 a7 8f 6a aa 6e 4c 1e 1c bb | 2a 10 04 d7 17 65 58 ce 83 ac 91 4f 48 71 e3 8d | af 3f 22 d8 df 00 4a d4 1b df 76 a7 ad 26 ba ba | 91 be fb 08 a9 70 66 2f 99 bf ef e8 c6 21 cc c0 | ed 1d fb 20 f6 60 07 53 22 da 88 1b 1d 11 4a 37 | e6 c8 75 11 02 89 b4 55 ec 0c 8b 31 52 06 0f 18 | 81 e2 42 d3 fe 87 7f dc c5 02 18 bb 87 cb 91 7a | 01 aa 5e f6 49 fd e3 ed df 8b 65 4a 5d 0c dc 05 | 45 9e f7 6f 6c 11 d8 bd 19 75 3d 5b 55 32 77 3d | 44 4c 11 8d 32 50 da 6e 0a 86 ef 69 5f 2a bb 9d | b7 76 10 6b da 52 00 cf e9 de 40 71 fd 9c 21 a3 | 2a ac 7a 1a 3b 67 9b 88 e6 1e 25 7c 3a 6e 9c 54 | 4b 96 e9 1a 08 38 3b 3b 27 21 e9 0c 79 a6 d9 1c | 14 07 fc c1 42 9e 29 79 0d 68 f7 e2 3d 93 ce 38 | 29 00 00 24 92 fc 82 18 58 23 4b 06 62 ee b8 b2 | f1 d5 54 0c 3d b0 88 33 58 36 a6 39 d7 5f 04 ee | ca 34 01 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 e7 04 0b 0d 59 5a cd 8a 54 e3 8a | 4e 81 3b 76 de 25 c1 57 00 00 00 1c 00 00 40 05 | c3 b5 61 af 5d 2d 46 0f c8 2c 48 99 41 b8 6c e0 | 5b 12 cb e3 | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800d120 | #132 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f fb fe 61 19 e1 9c b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #132 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #132 | rejected packet: | 8f fb fe 61 19 e1 9c b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #132: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac7f80 | handling event EVENT_RETRANSMIT for parent state #177 | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #177 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #177 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49615.055972; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001833 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #177 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 "road-eastnet-nonat-177" #177: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #177) | 18 be 44 9b 6e ed 30 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 07 e3 cb ba 41 f5 29 89 53 b2 f3 1e 5e 07 87 | e1 d5 ed d4 f7 64 97 f7 8a 96 5e a4 19 72 f5 99 | db af d0 a6 4b 51 f7 55 92 f6 5e e0 30 09 2c b6 | 43 a0 4f d7 6f e1 d3 20 57 34 04 7c 3d 9a 99 83 | f9 a3 8a 6a fe fe a9 91 f2 83 44 a1 2d af 4b ef | b0 18 e4 e4 62 e5 83 a7 cf b5 7d ca 15 6b 57 02 | c4 53 c6 7f f4 9f 1d 3d 3b b0 8c b2 2b 17 6d 36 | 19 38 bf 55 ce 8a 72 4f 20 1b a4 9c a2 84 da e5 | 7c f0 4b de 9a 22 9d 10 b8 0c f6 b5 af 79 8d d9 | c7 ca 65 16 d7 e0 a1 a8 7f e6 15 6a 53 ef 5b f4 | a2 b4 0d 9c 61 31 ea 4a 75 b2 62 d9 d6 fe 75 27 | 38 c2 d0 97 b9 a4 b7 2c 60 e6 08 ea 3f 0a 15 59 | f6 77 c4 7c d1 46 84 4f f2 09 1e c0 00 e1 c8 65 | bf 5e 6f 2d 94 6e 4c d7 96 38 7b ba 94 5a e8 e2 | 2f d6 8c 88 2d de 4f ca 52 aa 70 7a c4 e8 89 b2 | cf 3d 59 65 f1 b7 65 b1 ff 08 3f df 87 d6 e3 b4 | 29 00 00 24 06 53 6b 3a e9 83 68 db aa 70 45 4d | fe 90 0e f2 c3 a1 be 18 1d d8 e7 bb b9 75 13 f1 | bb b6 76 91 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 1b 1a a2 88 2e 9b 85 cb bf 3f e0 | 58 f8 7a 1a ca d0 ae de 00 00 00 1c 00 00 40 05 | 46 28 df e2 d1 63 c9 0b 29 af bd b8 e5 56 e6 b6 | 34 92 84 18 | libevent_free: release ptr-libevent@0x7fb360035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac7f80 | #177 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 18 be 44 9b 6e ed 30 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #177 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #177 | rejected packet: | 18 be 44 9b 6e ed 30 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #177: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a12c70 | handling event EVENT_RETRANSMIT for parent state #163 | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #163 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #163 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49615.07206; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003517 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac7f80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #163 | libevent_malloc: new ptr-libevent@0x7fb360035930 size 128 "road-eastnet-nonat-163" #163: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #163) | b1 c1 5c f9 4d 0c 91 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 d1 ee ef 57 4d b8 a5 18 99 63 b7 ad a0 31 43 | d2 4c 84 95 c1 56 d8 c2 a0 e0 21 45 55 6c 89 41 | 0a ee 26 bb ae 9b 55 18 51 40 94 3e b5 e8 52 b3 | f5 21 f9 c6 39 17 43 69 05 cf af ff e3 2c 05 76 | 7f cc d0 9f 70 3b df 95 16 de 0c 79 98 56 e5 a0 | 35 3e 81 89 f8 f4 57 f4 b0 38 84 5c 5c 95 c5 75 | db 5d ff 22 a3 04 68 2a 25 a8 ca 43 e9 88 c1 c7 | f1 52 93 65 ec 22 3d 52 6b b8 00 65 57 c2 e3 a8 | 9e 23 a1 b2 55 fc 9b 13 25 aa af 20 21 98 a7 a2 | 67 94 3b 2e 91 84 12 14 99 be b3 af 12 1e 8a 45 | f6 79 09 3e 9e e8 3f fa a3 e8 99 22 6f d9 b8 e7 | 13 bd 62 da a2 36 db a1 c0 b9 40 6d 4f e4 fd e0 | be a7 dc c7 36 bf 14 ea 84 eb 4f 8e 85 9d 9c de | 91 8b 80 a4 7b dc e6 20 7f bc ce 40 33 ff 25 de | 32 53 56 b7 10 56 66 76 3f 7a e3 c4 c5 0e a7 df | 21 e3 47 1d 5c 2e 41 54 d0 87 c6 c9 9f 14 d5 5a | 29 00 00 24 cf 96 ac 26 a7 c4 21 b6 9b dc fc 7a | 6b 63 82 8c ca 2e ba 40 54 d7 a8 1f 94 42 b0 f9 | 02 a1 4a 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 05 f9 8b c8 3a 1a ac 16 65 f3 b7 | 0f 08 b9 7b 40 ca e7 92 00 00 00 1c 00 00 40 05 | 34 4b bc c5 91 2d b9 5e a5 87 8c 3c 9e 2e e2 11 | d1 e0 38 4e | libevent_free: release ptr-libevent@0x7fb34c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a12c70 | #163 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 c1 5c f9 4d 0c 91 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #163 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #163 | rejected packet: | b1 c1 5c f9 4d 0c 91 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #163: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9b1c0 | handling event EVENT_RETRANSMIT for parent state #184 | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #184 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #184 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49615.079419; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50064 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a011f0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #184 | libevent_malloc: new ptr-libevent@0x7fb34c035930 size 128 "road-eastnet-nonat-184" #184: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #184) | 71 40 97 9a 99 00 ff cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 9e 33 f9 05 c0 53 fb 65 12 d0 fd a6 93 df f1 | 7d bc 07 5e 94 4b 97 6f 27 67 0f f1 85 c0 12 45 | 70 43 01 96 7d 01 69 81 8a b0 0b 08 d1 40 54 69 | 08 7f 69 f8 31 5e 9b 37 c2 56 46 05 8a 2c 74 cd | 73 c4 b5 39 bb 8c 81 c4 97 49 18 2c ce 17 a4 56 | a5 b1 98 b5 93 fe 6b bc c2 93 00 1a 7a aa e8 f7 | 9e 16 d8 e6 36 67 49 7e af 2f 60 eb cd f3 b7 6a | 60 d2 41 2c 2b 50 9f c8 44 40 ce 80 81 98 cf 17 | 31 53 e1 d5 34 76 90 8f 6f 17 46 44 c2 a9 25 1a | bb c8 2b 12 0a 1a 41 c9 b5 0e b1 65 5f 47 47 f0 | bf a6 e5 e4 cc d3 34 bc 81 ca de 84 80 2f 52 78 | 36 7b 26 1f 30 98 4d d6 d7 8c 77 eb b9 19 2a e8 | 7d a0 5e 92 74 2d 37 d4 17 8f 23 ce 1e cd 45 d9 | cf f5 6b 81 d5 e3 95 2b bc 84 3e 19 7f 4a db 38 | c7 46 31 2c ab 66 d6 cd 71 a0 bf 63 ef a6 eb 59 | 13 88 4c 39 34 56 d9 d0 92 f8 f4 65 45 ad 6a 55 | 29 00 00 24 b3 65 f5 f0 87 cd d5 8a 91 5d ad e3 | f8 32 68 b3 e0 0d 46 b4 25 a3 92 64 33 fb 91 6e | c0 dc 6f 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 f2 a2 9a 11 9e a6 4a 33 e0 87 52 | 8a c6 6f 7b 74 99 45 a9 00 00 00 1c 00 00 40 05 | 98 85 7b 6c 79 cd cc f7 14 5f 2b 56 dd 51 39 9c | f7 d7 a1 50 | libevent_free: release ptr-libevent@0x7fb37402ff60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9b1c0 | #184 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350005860 | handling event EVENT_RETRANSMIT for parent state #80 | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #80 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #80 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49615.079607; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004203 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9b1c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #80 | libevent_malloc: new ptr-libevent@0x7fb37402ff60 size 128 "road-eastnet-nonat-80" #80: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #80) | aa bd f3 45 40 fd 66 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a f9 52 fe 2c 07 55 9a 9f 75 be 2d bb 6b aa b0 | 07 01 f4 20 39 c9 c6 12 04 59 16 f7 53 ca 23 cf | b2 a3 d6 d7 cd d3 78 95 1e ae 2c b7 17 84 30 6c | 9a 6e 0d 1b ef 48 24 1d f1 c9 12 65 61 88 44 c9 | 4b 27 23 9a 65 49 0a 11 49 89 68 1f 69 8b cd 8d | e9 1c 22 5e 52 f0 a3 c1 f7 8e 10 9b 8e 27 61 b3 | aa d7 5b 30 40 8f 25 2e 0d 7c bd dc 0e 4d aa 95 | b6 5a 44 77 7b 33 24 ed 5e bf f2 78 c5 d8 1e 5c | 38 0e af a8 70 85 81 7a 43 7a de 45 73 d1 23 0a | 21 50 82 2c fb 48 a9 b6 ed 4a 3a 01 52 3d 91 cf | 62 7a 95 ef ff 5d 9f b3 85 63 dc f5 46 12 fc e4 | ac 22 23 7e 8e 79 eb cb 39 31 bb de 91 1f fd 9c | 95 3c fe ca 99 40 e4 17 71 ad 8e 05 ed f6 14 9e | 6b 26 3c 1c 13 2f 5a 94 9d 9c cd 71 11 6d bb c9 | 9a 84 65 ba e1 3d ae 2e 2c 88 f5 b9 e4 60 97 3a | ad 9a 6f f8 77 43 67 40 a8 7b be e5 9d 13 c4 6d | 29 00 00 24 53 2a 2d 72 a4 0b ac f1 46 3b 88 60 | a1 1f 05 e7 3a 9a 78 ce 7e 03 67 44 f4 b3 91 7b | 4e 29 6b 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 ed 0c 1a de d8 39 29 7d 81 95 16 | 89 64 a4 1b c6 93 47 b1 00 00 00 1c 00 00 40 05 | 41 2d b0 0c 88 62 05 80 34 d7 2b cd 52 bc d2 c8 | ff 29 c4 37 | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350005860 | #80 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 40 97 9a 99 00 ff cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #184 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #184 | rejected packet: | 71 40 97 9a 99 00 ff cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #184: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | aa bd f3 45 40 fd 66 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #80 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #80 | rejected packet: | aa bd f3 45 40 fd 66 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #80: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0535 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4ebd0 | handling event EVENT_RETRANSMIT for parent state #133 | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #133 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #133 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49615.093753; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006105 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #133 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 "road-eastnet-nonat-133" #133: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #133) | 93 2c 91 72 20 8c aa 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c d8 f9 2c 2b a0 b1 31 57 35 e0 04 75 fa ff 27 | 53 64 2e 54 ea 38 e0 ef 52 11 3d 36 64 b6 af 29 | 51 f7 3a cb 03 fb a8 9c 8c 4c bb 74 63 76 7d d1 | a9 88 c4 5e 87 dd 7f 20 3b 30 84 84 16 86 c9 65 | d1 47 a8 28 8d 73 90 06 c4 7f 57 27 02 dd dc 34 | 3e 36 07 bc f4 b2 13 c9 ca 56 ee e3 b6 fc 0e 46 | 17 c4 47 02 3c 22 35 e8 99 a1 3a f2 88 57 e2 b2 | 76 46 aa bb c5 86 a7 a3 5d df 02 48 a4 96 00 22 | 34 1a 70 44 11 10 cb ff f2 1d 21 21 00 41 5a a7 | a1 5f 54 12 46 7f 51 02 26 94 4f 54 f8 0e be ce | 2f 5a 2b 9b 25 dc a0 31 41 2a dd d5 76 31 f7 83 | c2 70 58 eb 31 ba 5b 36 57 70 32 a0 20 3d ec e9 | 48 52 21 d4 39 1a 79 f6 31 e1 9a c8 d2 b3 fd 12 | 8c 10 74 fe 54 6f eb b1 c3 58 8e 49 2a 38 98 47 | 38 39 a8 64 1a 71 f1 c2 47 f8 d0 db da e6 75 10 | 1b a2 b7 e4 c4 eb b7 43 ca b9 9e 23 21 75 e9 b6 | 29 00 00 24 2f d1 c4 74 6b fd 49 84 52 1d 9d 1d | ec af 19 02 47 e5 8f b7 c6 73 48 d2 a9 91 58 b2 | b6 74 d3 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 b3 b4 a5 c4 da 26 36 c8 2a e5 e1 | 3e af ad 98 58 9a bf c4 00 00 00 1c 00 00 40 05 | 31 45 bd 61 73 08 cb 41 73 c4 72 6c eb e0 15 88 | 84 49 78 a3 | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | #133 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 93 2c 91 72 20 8c aa 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #133 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #133 | rejected packet: | 93 2c 91 72 20 8c aa 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #133: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-190" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-190' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #190 at 0x557d46ad79c0 | State DB: adding IKEv2 state #190 in UNDEFINED | pstats #190 ikev2.ike started | Message ID: init #190: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #190: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #190; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-190" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-190" IKE SA #190 "road-eastnet-nonat-190" "road-eastnet-nonat-190" #190: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-190 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-190": constructed local IKE proposals for road-eastnet-nonat-190 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 190 for state #190 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4ebd0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #190 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 | #190 spent 0.15 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-190" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.228 milliseconds in whack | crypto helper 11 resuming | crypto helper 11 starting work-order 190 for state #190 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 190 | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 190 time elapsed 0.000945 seconds | (#190) spent 0.951 milliseconds in crypto helper computing work-order 190: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 190 for state #190 to event queue | scheduling resume sending helper answer for #190 | libevent_malloc: new ptr-libevent@0x7fb36003b0b0 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #190 | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 190 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #190 | **emit ISAKMP Message: | initiator cookie: | da 8a 0c 65 e6 2b 3c 3b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-190 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 28 54 17 f8 a5 01 f3 68 22 77 c6 18 00 12 b3 14 | ikev2 g^x 54 3d f4 b3 34 1e fd 72 0e 4d ab df e8 2f e1 56 | ikev2 g^x d7 6e 5a 40 eb 22 8c 08 69 45 e9 fd 19 98 3c aa | ikev2 g^x 8d 83 ce d6 37 74 60 c8 87 61 28 d5 63 be 48 e9 | ikev2 g^x ac f9 f7 e4 f2 02 da 1e ec 22 1e 5a d2 5a 2b 8a | ikev2 g^x 3b 57 71 3a 73 29 7d d1 21 cb fe 25 7a 4a 44 7a | ikev2 g^x d3 e0 2e 8b b0 82 19 e0 d0 d4 ad 62 8a eb ad 5f | ikev2 g^x cd 5f 01 c2 97 9c ca 0a 84 fd e9 c6 24 7d a2 13 | ikev2 g^x 18 78 86 de 18 44 7c 6e 03 a7 c1 8c f5 10 72 e4 | ikev2 g^x 18 35 f0 48 fd 3b 9d 06 d6 b2 cc 32 8d c8 ab 02 | ikev2 g^x 22 2a e1 65 5c 07 67 dd 84 00 eb 6c 69 e6 d9 74 | ikev2 g^x 15 08 fb 78 e2 63 d8 e3 71 dc a5 a7 be b4 49 92 | ikev2 g^x ca 4f af 55 e1 5d c5 43 c7 03 58 76 b8 41 c6 a2 | ikev2 g^x f8 e5 96 26 df 8f 3c ed b5 1d 45 31 66 bd 99 75 | ikev2 g^x c9 f2 c5 21 dc 35 1b 0a 99 75 5d 5c a4 07 02 4f | ikev2 g^x 98 82 da 07 a8 27 6d 15 d8 05 50 39 0a b9 0a 99 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f4 39 3c cf b3 b2 13 92 d2 3b 37 9f 62 32 43 c3 | IKEv2 nonce 74 37 47 22 30 dc 01 af 01 09 20 fa 09 9a 8b e6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= da 8a 0c 65 e6 2b 3c 3b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 be | natd_hash: port= 01 f4 | natd_hash: hash= 6f a0 3a 65 d8 4c 58 fb ee 8d a7 57 94 7e 0d f0 | natd_hash: hash= 9d 14 5d c2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6f a0 3a 65 d8 4c 58 fb ee 8d a7 57 94 7e 0d f0 | Notify data 9d 14 5d c2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= da 8a 0c 65 e6 2b 3c 3b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c2 56 8a f7 34 3a b7 10 07 49 00 4f af 85 84 af | natd_hash: hash= 10 cb 7b 4a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c2 56 8a f7 34 3a b7 10 07 49 00 4f af 85 84 af | Notify data 10 cb 7b 4a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #190 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #190: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #190 to 4294967295 after switching state | Message ID: IKE #190 skipping update_recv as MD is fake | Message ID: sent #190 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-190" #190: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.190:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #190) | da 8a 0c 65 e6 2b 3c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 54 17 f8 a5 01 f3 68 22 77 c6 18 00 12 b3 14 | 54 3d f4 b3 34 1e fd 72 0e 4d ab df e8 2f e1 56 | d7 6e 5a 40 eb 22 8c 08 69 45 e9 fd 19 98 3c aa | 8d 83 ce d6 37 74 60 c8 87 61 28 d5 63 be 48 e9 | ac f9 f7 e4 f2 02 da 1e ec 22 1e 5a d2 5a 2b 8a | 3b 57 71 3a 73 29 7d d1 21 cb fe 25 7a 4a 44 7a | d3 e0 2e 8b b0 82 19 e0 d0 d4 ad 62 8a eb ad 5f | cd 5f 01 c2 97 9c ca 0a 84 fd e9 c6 24 7d a2 13 | 18 78 86 de 18 44 7c 6e 03 a7 c1 8c f5 10 72 e4 | 18 35 f0 48 fd 3b 9d 06 d6 b2 cc 32 8d c8 ab 02 | 22 2a e1 65 5c 07 67 dd 84 00 eb 6c 69 e6 d9 74 | 15 08 fb 78 e2 63 d8 e3 71 dc a5 a7 be b4 49 92 | ca 4f af 55 e1 5d c5 43 c7 03 58 76 b8 41 c6 a2 | f8 e5 96 26 df 8f 3c ed b5 1d 45 31 66 bd 99 75 | c9 f2 c5 21 dc 35 1b 0a 99 75 5d 5c a4 07 02 4f | 98 82 da 07 a8 27 6d 15 d8 05 50 39 0a b9 0a 99 | 29 00 00 24 f4 39 3c cf b3 b2 13 92 d2 3b 37 9f | 62 32 43 c3 74 37 47 22 30 dc 01 af 01 09 20 fa | 09 9a 8b e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6f a0 3a 65 d8 4c 58 fb ee 8d a7 57 | 94 7e 0d f0 9d 14 5d c2 00 00 00 1c 00 00 40 05 | c2 56 8a f7 34 3a b7 10 07 49 00 4f af 85 84 af | 10 cb 7b 4a | state #190 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4ebd0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #190 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 | #190 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49615.126677 | resume sending helper answer for #190 suppresed complete_v2_state_transition() and stole MD | #190 spent 0.462 milliseconds in resume sending helper answer | stop processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36003b0b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 8a 0c 65 e6 2b 3c 3b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #190 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #190 | rejected packet: | da 8a 0c 65 e6 2b 3c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #190: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0743 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61bd0 | handling event EVENT_RETRANSMIT for parent state #164 | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #164 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #164 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49615.134927; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00339 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0eb30 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #164 | libevent_malloc: new ptr-libevent@0x7fb36003b0b0 size 128 "road-eastnet-nonat-164" #164: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #164) | 44 ec da ac e4 4e 81 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 94 19 dd 63 76 e7 8b e4 83 63 43 89 b2 25 2d | cf 02 f9 4f bb e0 9f 71 73 45 f7 70 9f f0 9c 56 | 36 6b be c1 42 fc 0e 64 e7 c2 6d 24 a0 c6 36 60 | f7 b6 44 63 1f f0 38 ff c1 f7 6f 09 6f 4b 15 6f | 4b a9 13 86 3c 04 b4 e0 2d 41 b8 5f 44 ac d3 1c | 62 7f f8 b0 79 c8 65 ec 61 21 a8 52 27 b3 79 db | 53 67 7e 4f 89 b2 45 b9 ee 3a 63 76 a6 cd 73 36 | 58 41 37 8e 8c 8a ef d6 60 54 ff 74 54 a2 07 6a | 56 54 10 22 af 8e 9e 38 af 48 a8 f2 42 f1 a6 05 | c8 55 0c 92 44 27 a3 4d be a5 b4 50 92 f3 bb 45 | b6 87 15 6c 92 a5 f1 21 ba 44 19 05 5c 4c f2 dd | 7d 64 1c 49 e3 61 8b 21 2c ef 63 14 91 93 e6 e8 | 84 82 9f 30 40 50 49 82 eb b8 19 d0 b6 4a c4 be | 05 18 e6 9d 08 3f bb c7 7a 98 44 e5 42 f9 eb fa | fc 80 53 22 fc 7c b9 e3 92 39 dd 88 61 10 2d 74 | 06 8e 96 3a 48 45 58 41 40 85 53 83 03 19 1d 49 | 29 00 00 24 e5 04 5f 5d b9 93 eb b6 f3 88 8f 81 | b6 50 c2 5a e0 91 27 94 ef 3b 1e 82 c9 33 1d 99 | 72 cc f9 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 cd 86 69 c3 fa 02 39 bf fc f5 08 | 1b bd f9 dc 60 39 91 12 00 00 00 1c 00 00 40 05 | 76 11 49 93 b0 52 97 cc bc 0b 84 d2 15 33 08 b4 | 9a f9 d3 5b | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61bd0 | #164 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ec da ac e4 4e 81 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #164 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #164 | rejected packet: | 44 ec da ac e4 4e 81 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #164: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #178 | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #178 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #178 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49615.143295; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001364 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #178 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 "road-eastnet-nonat-178" #178: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #178) | ca 8e d5 21 04 56 f5 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 67 d8 60 5f 40 63 92 f2 6d b4 ba f5 02 b8 ef | 38 7a 12 cd 11 ce 9d 9b 17 62 5f df 94 e9 07 b5 | 67 9d c2 aa a5 fe a1 11 f4 ad b8 0d 63 27 26 1e | d8 17 fe 6f e7 68 09 0e 02 53 a4 bf 49 a0 db 19 | df 91 5e e9 b7 6f eb 81 53 29 3b eb 8c 48 64 ce | 19 01 46 02 e1 7d 00 12 d7 22 72 65 96 38 74 47 | fc 95 5b de f7 59 12 e1 89 c8 7c b4 26 93 4b 67 | 78 1e d0 18 c0 19 90 65 2b 34 10 55 57 cb 01 6d | c4 3f b5 2b 33 1e 80 2e 70 90 f3 a0 65 bd de 46 | 7d 2e 31 80 28 5c 82 45 70 58 e1 27 1c 57 b4 3b | 35 12 78 64 02 e3 69 39 84 d2 f4 a5 19 f1 96 0b | b4 1f 01 e4 be d8 4f ee 70 c6 2d 15 1b 96 dd 0a | 64 1f 43 c4 0e c9 83 9e ef 67 e0 c2 2c f3 12 d0 | 79 5e f6 25 ee e3 f8 a3 fa 94 d3 a2 a3 89 7b 98 | 74 09 e9 86 33 de 66 6c 13 2b 07 44 f9 44 67 9b | 43 01 93 ea 4d 3f aa bd f6 c6 55 44 dd 66 4b d4 | 29 00 00 24 2e 3d 1e d2 58 00 63 7b ef e7 79 ba | 26 0d 83 e4 01 3b ff 2b eb 29 12 83 06 3e 6a dc | 34 f9 2f 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 2f 67 46 e9 ec d0 44 c4 cc 2f 43 | d4 84 bf d5 2b 37 9d e7 00 00 00 1c 00 00 40 05 | 39 35 73 9e a6 30 0e 5d 9d 4e 3c 93 77 b7 78 c9 | 08 75 bf c2 | libevent_free: release ptr-libevent@0x7fb34c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | #178 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca 8e d5 21 04 56 f5 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #178 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #178 | rejected packet: | ca 8e d5 21 04 56 f5 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #178: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2e150 | handling event EVENT_RETRANSMIT for parent state #81 | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #81 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #81 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49615.144711; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005761 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #81 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 "road-eastnet-nonat-81" #81: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #81) | 66 17 84 1d 01 f5 89 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 79 cf 2e c9 58 5a cf 22 0f e4 95 f3 b3 ec e3 | d7 ab 2d 5f 01 54 3c c5 38 6c 9c d3 40 e3 80 92 | e9 89 68 26 a0 e4 bb a0 7a eb 4c f1 e4 9f 20 12 | 58 2a 4c f1 f2 df 9a 6d 19 39 bd 12 58 10 e1 11 | 60 c9 9d ed 18 33 de 94 c1 bb 5d 21 df 07 9b 4e | 1e ae ec 4e 5f 9a 7f b4 b3 f8 3c 10 c2 09 ea 68 | 5d bc a9 fd 8a bb 40 95 8d 3b d1 39 da 16 f8 a8 | 93 df 32 68 37 e0 b9 31 f0 a7 f2 55 d6 2d bc ef | ef 45 3f e8 34 12 fc 98 2a dc 19 03 8b dc 1f 09 | cd 02 40 97 95 a7 39 71 09 ba 54 e3 53 28 2c b9 | 98 bb af 3a 25 6b e9 e7 4c 76 46 d1 aa 9d 3b 59 | 03 52 8a 61 f9 f7 83 33 a1 6c a0 29 48 f7 36 48 | 3a 5a f9 b5 72 5e fe 9f e0 84 df 16 32 28 ce ca | c6 27 c5 b5 d7 f3 93 db 10 54 fb f4 c3 70 76 d4 | 5f 00 b9 4c 0d 91 91 e7 a8 18 4b 2b 7f cf a5 4e | 76 2e 5b 38 e2 0b 32 aa 89 74 93 4b e3 81 6f 21 | 29 00 00 24 78 b9 6f 78 8b 1e bb 84 c4 a1 7c 02 | 08 74 d8 82 11 75 a1 52 cd 59 45 9e 38 4d d2 1d | 56 1f 81 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 31 12 3e 08 55 9e 26 f3 2f be 08 | b5 7f 7c 7d c5 5f 44 c0 00 00 00 1c 00 00 40 05 | 16 fd af 38 8b 2a c1 77 ea 51 ea 68 dc 9b f5 3d | 6a 08 67 b3 | libevent_free: release ptr-libevent@0x7fb35800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2e150 | #81 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 17 84 1d 01 f5 89 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #81 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #81 | rejected packet: | 66 17 84 1d 01 f5 89 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #81: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0516 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #185 | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #185 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #185 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49615.147101; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501217 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2e150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #185 | libevent_malloc: new ptr-libevent@0x7fb35800cf80 size 128 "road-eastnet-nonat-185" #185: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #185) | 94 c0 c2 c7 3b 30 ec 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 10 80 e8 ac 1b 57 a4 b7 f2 12 9c c9 c8 96 12 | d8 b4 37 f7 f8 c8 3c b7 f2 86 fb 6d bc 61 da 40 | 39 a4 09 f0 8f 66 50 7a 6b 75 22 97 37 a4 94 4e | a8 5c 5f 80 9b d3 2e fd ee fe 03 91 38 cd a2 e4 | 3e 5d b4 2b f3 14 af ae 26 82 7e 4b 88 39 37 81 | 82 aa 3c c6 ab ba 4d b3 20 34 8d 80 3d de a0 ad | 42 64 df 60 e3 cc 41 7d eb 1f a9 4c f0 d1 47 57 | 07 35 a5 e9 25 89 b5 0e 8b 91 92 1f 2f 09 b9 ab | 46 f1 69 33 6d d8 ef 90 01 9f 20 97 28 19 d8 4c | ce 9d c5 c8 74 d2 ec a5 dd e6 34 68 1e 8b 44 b9 | 5e 3c 90 76 95 68 8e 41 20 32 dd ca 48 f2 30 6e | af 87 2d 28 a1 ad c2 a1 66 51 1d 16 88 02 4d 4b | 75 a2 59 e4 ff 63 fb 70 3e 65 bb 8f d3 36 fc 97 | bb a3 6c c7 eb b7 6a f4 47 9b e0 12 1b e1 cc 32 | 68 f4 57 ff 85 75 10 4d 46 e9 36 6a ae db 06 a6 | 0f 02 20 5f 93 d8 c0 d3 99 19 3c 12 5e d8 75 16 | 29 00 00 24 d5 ca 6a 54 4d eb c2 30 7e c2 c0 88 | f4 64 53 65 cf cb b4 99 9a a7 3b 19 af 88 ec 6a | ae 0e 11 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a b7 31 38 16 04 07 33 64 be 6b 23 | be e3 1c e2 4f 4e 6e d8 00 00 00 1c 00 00 40 05 | c2 92 61 e3 4d 3a b1 c0 20 50 44 2b db 6e 80 18 | c6 ee 39 60 | libevent_free: release ptr-libevent@0x7fb364035750 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | #185 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 c0 c2 c7 3b 30 ec 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #185 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #185 | rejected packet: | 94 c0 c2 c7 3b 30 ec 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #185: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f7760 | handling event EVENT_RETRANSMIT for parent state #134 | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #134 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #134 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49615.151154; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003672 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #134 | libevent_malloc: new ptr-libevent@0x7fb364035750 size 128 "road-eastnet-nonat-134" #134: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #134) | 80 c9 f7 0f 34 43 e8 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 45 e5 b7 ab 0c a4 4c 5f b2 54 d8 39 c5 f7 ae | a7 a1 c9 5c 2b 5a 97 72 d3 14 80 31 3f b5 24 0d | cb 02 f5 57 a3 d0 5f 51 b9 29 93 ae b9 a3 6f 26 | d5 1f 2c 2d f7 c7 46 60 60 aa 8f 11 69 88 d5 d6 | 7f c3 44 3b 7a f5 6e 59 77 4f a4 43 34 c4 26 e5 | ae dc 49 7d 8b cd 2b ab 18 68 bd 39 90 28 6c 4a | 23 91 a3 0e 3f fb 01 de 41 7d 06 32 ac 44 1c 44 | 83 e0 6e 5a 17 ec 28 70 e3 9f 5e 65 cd d5 6a 13 | f4 b1 48 8a 51 f8 b7 54 21 1a 5d da c7 53 38 a4 | e5 03 02 af 81 ae 46 39 d4 15 23 f5 a8 b9 79 ca | ed 1c 97 81 a2 68 bb 3f 5d 13 76 91 c8 b3 35 4a | a1 e6 8f 6f 10 12 49 6f 3e bb 3b bc 07 2d 62 f9 | 63 5c f1 5a ec c4 50 49 e3 cf a2 cc 8f 61 b4 4c | 09 95 92 ca 4c 19 06 a3 80 ad 6b cf ef 46 70 41 | 9a 5d 9d 72 62 c3 a0 af ac b6 f0 ed e6 2e a4 c8 | 97 d4 46 3b dc 90 f1 11 ff c1 1a f7 bc 4d b4 b1 | 29 00 00 24 d7 88 26 03 5a 89 cf 88 bf 43 40 13 | b0 8c b4 f5 85 1c 5d f5 ed 6d ea f7 d0 1d 42 5d | 64 c8 0e 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 5d 43 f9 e4 68 67 0d 96 3e 2a d1 | 87 17 c9 81 16 11 d8 11 00 00 00 1c 00 00 40 05 | 17 79 69 7c c9 bf 1a b4 97 b1 98 46 4c 85 68 c7 | a4 36 11 6c | libevent_free: release ptr-libevent@0x7fb378035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f7760 | #134 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 c9 f7 0f 34 43 e8 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #134 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #134 | rejected packet: | 80 c9 f7 0f 34 43 e8 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #134: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #165 | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #165 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #165 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49615.200495; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002023 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a12c70 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #165 | libevent_malloc: new ptr-libevent@0x7fb378035930 size 128 "road-eastnet-nonat-165" #165: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #165) | 84 89 ec 12 36 85 f6 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 64 07 de ac 8a b1 da f5 cd 1e 8a 72 06 02 07 | b4 71 02 7a d1 b4 70 86 ed 7c e5 04 db 06 11 b0 | 70 66 08 44 59 b7 49 22 d3 ba f4 ee ab fa 59 73 | b1 06 c3 8e 52 a6 3b 08 b7 93 04 a1 45 f3 91 38 | 82 d7 95 0c b3 fe bf fd 60 7f 15 7a b2 c9 6e 96 | 31 f3 92 9f 9b d4 51 14 46 6d a7 f8 2c 3c c3 fe | 86 c5 71 52 b8 28 62 77 5e 36 d1 7b 6a db 03 2c | f5 d4 3e 3d 1f 4e cb e7 cf b8 d2 9f e6 10 67 e1 | a3 1a 3a 9b e2 59 8a f3 f7 c0 58 cc fc 02 e0 b1 | da aa 4f e9 d2 86 5e 94 d6 73 96 ea 14 32 c4 4e | 3d c9 38 94 c5 47 af 83 6c ee e9 2a a3 8b e4 12 | f9 91 c1 53 48 67 8c 42 6e c0 7e 45 20 2e 6a a6 | d3 98 3e 6d d1 40 3d 9d 84 9f 54 62 49 b6 f8 67 | 32 fb 70 e2 78 08 b2 de c4 3e 70 08 0b 45 41 d7 | 34 49 14 7d a4 bf 53 d6 45 c5 fb 03 1e ef d6 06 | 6f 22 f9 f9 7c 4f e3 63 ea 02 1e 63 6e 3d 4d 36 | 29 00 00 24 a3 25 18 45 df 55 70 c4 52 41 87 e0 | ac 0c cb c2 e9 c1 36 19 df a3 78 76 61 ca c0 73 | a3 74 0a f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 2e 20 30 11 5b 47 b9 0d c9 d3 63 | b9 57 85 b4 89 e5 03 11 00 00 00 1c 00 00 40 05 | 69 81 91 3b c9 31 0b 05 42 34 36 76 be 6a 34 94 | 71 f5 f0 25 | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | #165 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 89 ec 12 36 85 f6 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #165 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #165 | rejected packet: | 84 89 ec 12 36 85 f6 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #165: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e5ca0 | handling event EVENT_RETRANSMIT for parent state #135 | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #135 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #135 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49615.210862; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003305 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #135 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 "road-eastnet-nonat-135" #135: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #135) | 6f cc 42 0b fb 9b 4b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 27 90 6c a9 76 2a c4 50 c5 bf 04 2d 39 82 d0 | f1 4e e9 ff 6c d4 67 d5 6a f7 c3 33 36 2d 41 eb | 01 b8 52 cf 33 75 55 83 36 e9 3b 1e e0 f5 4c 33 | f6 13 14 fe 0b 40 f0 7a 1d e6 e9 63 2c 7f 9b 3f | 43 d7 8b 49 de 08 d9 f7 cb b8 85 8d 24 76 ea 07 | 74 e0 eb 3b 7b 61 bd 6e d0 81 bc 30 2d b1 a8 bc | 95 7a c1 8e 91 81 20 78 4b 9d 5f 4b 55 88 98 a7 | 4c 89 7d 2e c5 f4 b0 76 31 ac d8 73 5d 09 ed 2d | bb 07 67 90 bf 59 f1 9b 89 79 b4 48 ab 68 0b 4b | a7 49 da 7c 24 b3 1c f9 17 8c 28 77 5a 6e 44 15 | 7d 9f 86 31 20 2d 95 04 ee 8e 03 70 03 dc 14 11 | e5 4b 44 1d be 0a 83 04 0b 7e 48 68 b0 0f 04 64 | 81 84 d0 41 fd 8b 49 2c f9 af ea 95 2c f3 49 aa | 7c 3c d3 83 ef 0f 20 1f 8b 15 3b 94 9d 57 0f 83 | e9 c9 85 72 a3 81 40 26 3d 9e 4f 4c 25 2e 6f de | 2e 5c c2 5b 74 8c 58 60 bd 5e 06 db 51 f6 b7 a3 | 29 00 00 24 4f 27 a7 6e b5 c8 d8 49 72 0f 78 be | 0c 3a 88 f4 37 97 d5 4f 51 27 f0 3f 45 0a b8 19 | ba c2 3b 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 5e 90 14 7c 0c 3f fe 72 ae db a0 | 43 97 c2 6c fa c9 b7 b1 00 00 00 1c 00 00 40 05 | 6c 85 24 93 7d cc 8d 2c 5e c0 f8 bf 19 38 1d 99 | 5f b9 fd e3 | libevent_free: release ptr-libevent@0x7fb37c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e5ca0 | #135 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f cc 42 0b fb 9b 4b 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #135 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #135 | rejected packet: | 6f cc 42 0b fb 9b 4b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #135: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a24730 | handling event EVENT_RETRANSMIT for parent state #82 | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #82 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #82 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49615.213186; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.008397 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad0280 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #82 | libevent_malloc: new ptr-libevent@0x7fb37c035930 size 128 "road-eastnet-nonat-82" #82: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #82) | 0d 59 4a 91 cd 0d a8 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d de 62 a5 d0 5e bf 56 63 0e 91 36 97 7a 1e b1 | b4 16 cc 30 41 76 2c 4d 4b 72 e2 c2 b2 a1 f9 60 | dd 93 5e 0e 34 f7 25 c7 9f 53 30 68 3a c2 8d 97 | 4c 9d fc 02 66 0b d5 60 41 52 07 34 69 fd 84 a5 | ec 72 09 87 c6 8f 05 fb 8f 4e 6b ba 77 83 dc 16 | 60 81 0d a8 71 f3 cf c7 95 36 23 35 f7 97 ca 50 | b2 db d3 48 30 34 aa be 9a a2 37 9b 39 19 60 98 | ac 8b 67 73 12 da 16 80 58 c0 2a 80 56 eb 21 9f | 3c 3d 73 57 e9 89 d6 8c 3d 04 dc a8 2c a0 35 72 | 3a b3 ec 9f 41 04 d4 7f d9 68 36 d5 13 cd 39 04 | 57 48 05 ca 9e f9 64 20 0d 91 1f 4e 5d ee 28 d1 | 38 36 5d 35 10 47 60 e0 25 2a b4 90 4f 2b 22 f8 | 94 db c6 d0 bc a1 a8 ee 23 9e 12 7c 06 be 13 c9 | e4 f8 bb 10 03 1f 37 ab 38 d2 32 58 2a 26 f3 33 | 1c 60 32 46 6c a1 0e 88 78 61 ec 6b c9 dd e6 45 | 58 22 90 cf 6d f9 2b cd d5 02 5b 51 ea 18 fb dc | 29 00 00 24 61 df db a2 1d df 12 0c 5e ab 31 16 | 03 92 3a 6f 24 ce 35 05 3e f5 da 2f 7c 0d 1e 54 | bb d5 49 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 70 c6 55 5e 2d 9d b0 0a d9 87 23 | 4b f7 4f fa 28 d8 1e 81 00 00 00 1c 00 00 40 05 | 40 ed 3d f8 bd 8d 40 9e 57 65 9a d5 21 53 67 44 | eb 0f 4b 38 | libevent_free: release ptr-libevent@0x7fb35402a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a24730 | #82 spent 0.0899 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 59 4a 91 cd 0d a8 c9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #82 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #82 | rejected packet: | 0d 59 4a 91 cd 0d a8 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #82: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338005860 | handling event EVENT_RETRANSMIT for parent state #179 | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #179 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #179 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49615.221516; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.009386 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad17c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #179 | libevent_malloc: new ptr-libevent@0x7fb35402a950 size 128 "road-eastnet-nonat-179" #179: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #179) | b7 0c 53 b0 d6 55 ba e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 e7 aa 3a d2 93 3a b1 f3 2d ef 15 4a db bc fb | 18 f2 f0 2f d7 d8 6d f1 e0 2e 7d 29 59 b1 d6 21 | e4 35 ac b2 5c fa 8c 68 d7 56 48 2c 90 1a 63 31 | 37 9f fa 36 a0 bf f8 7e a9 36 73 05 48 39 6c 08 | e9 ae 8d 6f c7 ab 9c 0b dc b9 88 2c 91 ea 94 a4 | 59 7b a5 d7 8e b8 d2 97 70 12 0b 31 b0 2a d1 31 | eb e4 69 dc 81 ca 29 66 be 80 6d 1a c2 c0 f9 06 | 99 5a 19 63 89 a6 4b 85 38 ed a4 d0 df b0 06 34 | 93 de d4 51 e8 02 b6 ef 9c b9 23 ed 94 d4 3f 30 | ed 82 5a 99 89 3b af 7c 11 96 d9 f0 92 93 d2 4f | 04 c6 5c f3 49 5b 49 5d bc f7 66 01 86 c2 c8 a2 | d8 ee 9a a2 a9 a0 e8 45 16 a7 7f a0 45 50 f6 f0 | 8b 1c 98 0a f0 a8 07 43 b8 bc ec e9 38 ec 58 b8 | 3b 0d b2 96 d1 71 70 f7 1c 22 9f 03 fc f8 39 95 | 81 cb 62 38 1d 55 75 60 24 db a4 45 80 e8 81 2f | df c7 ac c2 4c be 19 14 89 79 da 68 5f ad f7 81 | 29 00 00 24 af 43 c4 7a 3d 3b b5 29 a0 89 4a e7 | b1 1d 19 14 88 65 8d 60 36 ce d7 11 01 48 56 1b | 05 16 7d 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 78 e7 1d 9d 7c 1d 2a b3 39 b5 dd | b4 d7 38 76 a1 49 48 f7 00 00 00 1c 00 00 40 05 | 86 2a 8d 44 0e a3 13 1a 2d e3 72 66 a4 35 f9 18 | 8b 41 6c dc | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338005860 | #179 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 0c 53 b0 d6 55 ba e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #179 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #179 | rejected packet: | b7 0c 53 b0 d6 55 ba e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #179: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-191" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-191' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #191 at 0x557d46ad8f80 | State DB: adding IKEv2 state #191 in UNDEFINED | pstats #191 ikev2.ike started | Message ID: init #191: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #191: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #191; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-191" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-191" IKE SA #191 "road-eastnet-nonat-191" "road-eastnet-nonat-191" #191: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-191 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-191": constructed local IKE proposals for road-eastnet-nonat-191 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 191 for state #191 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb338005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #191 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 | #191 spent 0.164 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-191" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.249 milliseconds in whack | crypto helper 16 resuming | crypto helper 16 starting work-order 191 for state #191 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 191 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 191 time elapsed 0.000885 seconds | (#191) spent 0.894 milliseconds in crypto helper computing work-order 191: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 191 for state #191 to event queue | scheduling resume sending helper answer for #191 | libevent_malloc: new ptr-libevent@0x7fb36403ae90 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #191 | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 191 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #191 | **emit ISAKMP Message: | initiator cookie: | 85 8f 6a 80 de be 76 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-191 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x bc 47 0f 49 e8 87 b7 e4 13 ff fb 5d 9a 22 17 d1 | ikev2 g^x a7 da b3 32 4a c2 68 c6 3d 29 6b b9 0a 47 72 fb | ikev2 g^x 44 ba cf 07 42 83 b0 15 52 d5 79 a1 0a cc fd 8c | ikev2 g^x 03 5d 92 9f bc f2 7f 7a 58 36 93 f8 ff cd 46 92 | ikev2 g^x 33 75 4c e4 12 5e a1 f8 b3 1e 61 09 80 4a a1 c5 | ikev2 g^x 5a c7 19 d2 44 74 1d 5d 1d 57 21 f5 83 fe 20 06 | ikev2 g^x 89 ca 32 09 05 22 51 7a bb d7 0f b2 89 a9 0b 74 | ikev2 g^x 7c f9 0e 07 47 37 47 69 61 d8 9b ef fb c6 bb 4f | ikev2 g^x 6f e9 47 2c 3e ce 0c c7 87 a3 c6 a6 6c 56 d1 3e | ikev2 g^x ff a6 a9 4b d0 b7 79 88 c1 3f b4 9e fc 37 5c 19 | ikev2 g^x 1d 93 d7 b8 ac 50 69 85 b1 c4 53 e5 5e cc 86 e1 | ikev2 g^x 99 0a 5b e0 3c 4f fe 9e c8 dd 39 c2 94 6f 36 d5 | ikev2 g^x 9a 4e 4e dd b3 93 c7 8c d1 85 48 7f 16 2c 4f fb | ikev2 g^x 42 93 63 f4 95 ff 92 cb fb d6 5a 99 77 ab b8 13 | ikev2 g^x 67 d4 bf 16 1e 20 38 f7 7c 3d 2c 7c ef 50 6c 66 | ikev2 g^x 06 df 76 dd 94 55 30 cb 6c f9 4c e3 a8 ba 0c 19 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f0 4e f3 f0 90 16 59 02 63 21 11 a3 11 30 40 08 | IKEv2 nonce 3c fe e4 63 ec 70 ae b0 94 4f 51 4b 97 b6 49 1d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 85 8f 6a 80 de be 76 fa | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 bf | natd_hash: port= 01 f4 | natd_hash: hash= 0c cc b1 ee ce 47 be 7b b0 c4 63 84 75 d0 08 1a | natd_hash: hash= f9 42 67 0a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0c cc b1 ee ce 47 be 7b b0 c4 63 84 75 d0 08 1a | Notify data f9 42 67 0a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 85 8f 6a 80 de be 76 fa | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 29 7b 9f b8 2f b5 a8 ce c6 6c 30 7d a4 05 33 b3 | natd_hash: hash= 99 4c ae 49 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 29 7b 9f b8 2f b5 a8 ce c6 6c 30 7d a4 05 33 b3 | Notify data 99 4c ae 49 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #191 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #191: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #191 to 4294967295 after switching state | Message ID: IKE #191 skipping update_recv as MD is fake | Message ID: sent #191 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-191" #191: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.191:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #191) | 85 8f 6a 80 de be 76 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 47 0f 49 e8 87 b7 e4 13 ff fb 5d 9a 22 17 d1 | a7 da b3 32 4a c2 68 c6 3d 29 6b b9 0a 47 72 fb | 44 ba cf 07 42 83 b0 15 52 d5 79 a1 0a cc fd 8c | 03 5d 92 9f bc f2 7f 7a 58 36 93 f8 ff cd 46 92 | 33 75 4c e4 12 5e a1 f8 b3 1e 61 09 80 4a a1 c5 | 5a c7 19 d2 44 74 1d 5d 1d 57 21 f5 83 fe 20 06 | 89 ca 32 09 05 22 51 7a bb d7 0f b2 89 a9 0b 74 | 7c f9 0e 07 47 37 47 69 61 d8 9b ef fb c6 bb 4f | 6f e9 47 2c 3e ce 0c c7 87 a3 c6 a6 6c 56 d1 3e | ff a6 a9 4b d0 b7 79 88 c1 3f b4 9e fc 37 5c 19 | 1d 93 d7 b8 ac 50 69 85 b1 c4 53 e5 5e cc 86 e1 | 99 0a 5b e0 3c 4f fe 9e c8 dd 39 c2 94 6f 36 d5 | 9a 4e 4e dd b3 93 c7 8c d1 85 48 7f 16 2c 4f fb | 42 93 63 f4 95 ff 92 cb fb d6 5a 99 77 ab b8 13 | 67 d4 bf 16 1e 20 38 f7 7c 3d 2c 7c ef 50 6c 66 | 06 df 76 dd 94 55 30 cb 6c f9 4c e3 a8 ba 0c 19 | 29 00 00 24 f0 4e f3 f0 90 16 59 02 63 21 11 a3 | 11 30 40 08 3c fe e4 63 ec 70 ae b0 94 4f 51 4b | 97 b6 49 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c cc b1 ee ce 47 be 7b b0 c4 63 84 | 75 d0 08 1a f9 42 67 0a 00 00 00 1c 00 00 40 05 | 29 7b 9f b8 2f b5 a8 ce c6 6c 30 7d a4 05 33 b3 | 99 4c ae 49 | state #191 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb338005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #191 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 | #191 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49615.226456 | resume sending helper answer for #191 suppresed complete_v2_state_transition() and stole MD | #191 spent 0.481 milliseconds in resume sending helper answer | stop processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36403ae90 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 8f 6a 80 de be 76 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #191 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #191 | rejected packet: | 85 8f 6a 80 de be 76 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #191: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3940 | handling event EVENT_RETRANSMIT for parent state #186 | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #186 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #186 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49615.229693; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501375 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a24730 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #186 | libevent_malloc: new ptr-libevent@0x7fb36403ae90 size 128 "road-eastnet-nonat-186" #186: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #186) | 89 a9 38 aa a6 c0 30 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc fc 7f 3d ba 5a de bc 76 c2 c4 f8 68 37 1f ff | ca 8e ea 53 55 b1 47 97 0b 37 3b 65 fa 61 e7 dd | 35 17 7f ab 01 8e 38 9f 4b 7f 31 31 92 f1 ba bb | d0 06 33 61 10 0b fa 86 b8 ef 01 c3 cf b1 bb 29 | 2f 2d 37 13 10 34 87 1c 1a 2a fa 97 52 ab 57 63 | 92 bf 2b 4d 93 56 f2 e9 12 3c 46 24 50 0a 19 24 | b2 fa e0 6c 1d 91 6c 12 4e 27 c3 47 94 7d 6e 37 | 39 fc 81 56 89 ca 68 6b ce 06 f5 e3 55 1e 76 a1 | 72 bf 58 f7 9a b2 03 67 a0 61 c5 e9 74 36 67 70 | b9 96 14 a2 56 cb b9 33 ac 90 e3 4f 5c 75 ef 3c | 0e 13 a9 08 94 45 0a e0 b9 1a 9c 47 5c ef 62 4f | 55 46 d5 a5 09 5b 68 73 3a 25 4c 57 99 05 2a 57 | 57 52 51 7e 0f b6 14 9f 14 b0 d1 cf 63 29 63 a1 | 49 60 4a 12 aa 1e 1e 0f 3e 32 25 9c d8 71 75 aa | 14 8e 9d fc 55 96 cf 4d 35 00 a5 a7 02 46 8a b7 | 5a f6 88 8a 4d 78 6c e2 1c 82 47 88 0b 3b 1c 06 | 29 00 00 24 d4 45 d6 30 bc fb 2b aa 5c 8e f3 b7 | 0c 17 f8 b2 59 80 d2 e0 0c b8 b9 7f 67 b9 de e9 | d9 5a 25 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 68 b4 19 b5 e8 c7 d6 3c c7 30 38 | 5a e1 45 af bf 1b f1 0b 00 00 00 1c 00 00 40 05 | db 71 7b 2e 3b 5f 62 cf 6c 1d 8c 60 1b 08 38 c5 | 84 d6 4e b5 | libevent_free: release ptr-libevent@0x7fb358035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3940 | #186 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 a9 38 aa a6 c0 30 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #186 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #186 | rejected packet: | 89 a9 38 aa a6 c0 30 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #186: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a68890 | handling event EVENT_RETRANSMIT for parent state #166 | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #166 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #166 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49615.265032; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003119 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3940 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #166 | libevent_malloc: new ptr-libevent@0x7fb358035930 size 128 "road-eastnet-nonat-166" #166: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #166) | d7 12 9c be 9a d9 20 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b c9 02 ed 54 28 bb 69 3a fa da 89 fc 4e 39 8f | a4 d9 5e 2f e7 5a f0 78 e4 4f 3d 81 ef 79 61 1f | a3 10 38 af aa 4b f6 ef 84 82 56 19 cd b4 c3 5b | aa a8 08 49 1f b4 b8 b1 4e cd 8c 0c 86 09 40 1d | 3a ac 4d 85 be 4c 1d e8 f2 bd e7 23 97 c2 da f8 | 65 82 fb 26 55 00 06 12 19 2c fe d3 7b c4 ff 31 | 3f 92 30 47 40 04 59 ba c0 27 99 b0 dd 45 22 cb | 97 1b 7a c0 ab ef 56 9c f3 d7 45 a0 a5 37 a3 b2 | 58 e2 9e 19 5e 81 d9 fa 7b fe 78 35 15 83 01 42 | 24 2c 5a ee 4f 05 09 f4 1d dd c3 06 45 d3 ea 94 | 81 04 37 3a 2a 09 3c 79 d8 7b 16 c9 e4 4e 70 57 | ac 53 d9 f3 76 57 6b 10 ff a1 91 96 c5 09 1d b2 | 37 da 15 c6 76 39 0e 79 8e b4 e3 6b b6 34 b5 ee | 59 40 13 d1 7e a5 f4 50 26 80 c7 4d 2f bd 97 83 | 7b 42 78 41 a6 62 d7 58 6e e8 20 3d f8 07 e4 57 | 49 7e 0c 32 68 81 0c ed 46 bc 7b e3 e1 f5 77 38 | 29 00 00 24 a6 0c 32 e7 5a d1 b5 ca 07 42 9a 49 | 78 63 23 e6 6a be e5 1f b9 dd 49 81 36 5a 86 c7 | 6b 23 86 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 81 0a 2e 3d e5 a2 7d c2 7a 52 36 | 53 f5 16 ff 78 27 b0 06 00 00 00 1c 00 00 40 05 | 82 68 99 97 5e 62 33 7b 33 19 33 98 83 8d 7f b1 | f3 01 32 b7 | libevent_free: release ptr-libevent@0x7fb374014820 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a68890 | #166 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 12 9c be 9a d9 20 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #166 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #166 | rejected packet: | d7 12 9c be 9a d9 20 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #166: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #83 | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #83 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #83 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49615.269373; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005107 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a68890 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #83 | libevent_malloc: new ptr-libevent@0x7fb374014820 size 128 "road-eastnet-nonat-83" #83: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #83) | e6 2b 97 c6 d1 4c 13 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 e0 14 c2 4a 13 d8 77 12 b1 93 fe 09 ee 1d 88 | 31 85 5e 91 48 ad b1 20 71 3f cb af eb 92 c7 d3 | e3 3b dc e2 9e c2 45 29 c9 59 6d 7a 62 12 34 26 | 8c eb c3 61 ed 07 95 b3 f8 74 eb 61 63 eb 1c b2 | 60 84 c3 e0 69 12 37 aa 40 a9 ee 46 d3 1a 26 fd | 77 29 43 bd fd b4 e3 3b c7 a8 7e e9 e3 51 f4 e6 | b9 4a 57 59 1d 18 ef df e9 5a be 77 08 df e7 55 | 46 7f 6c 4f 13 29 e4 bb ef bd 6c fb 60 8b fc 62 | e9 ba c0 54 d3 2b 44 c6 2f 29 d7 34 b4 6b 61 c0 | c9 cb 1e cb a6 25 28 61 95 9e 2c f5 86 69 f9 7c | b8 7c 34 c0 e0 ed f4 f7 82 f9 b3 c4 8e 1a 55 fb | d8 ed 0f e9 ed ff da 76 3e bb 0b ca e5 d5 7e 00 | 28 52 cc 3e d7 7f e9 d9 c5 bd e9 a7 17 e5 95 51 | 9f 9f 95 b4 65 d9 e7 b3 d2 a5 c2 fe 86 92 6e 23 | 5c 06 60 94 75 50 49 bf 5b 48 f5 bd b4 b4 de 5e | dd 11 02 11 73 fd f3 0f cb 43 d1 ff 6c 2f 1d fa | 29 00 00 24 d9 ea 5f 5d e7 8b 27 ca 82 31 28 fd | 7a 4f 51 83 32 9a 18 8a 6e 2a 8b d4 95 e6 d6 b1 | 0f 0b a2 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf 83 ee f4 b4 fb 0f 43 eb c7 c4 87 | aa a0 5e 5c f1 0e 63 f4 00 00 00 1c 00 00 40 05 | 05 b9 81 d9 1f fe b2 68 6c 59 f2 c5 07 41 cc 9a | 8a 8b 10 9b | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #83 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 2b 97 c6 d1 4c 13 c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #83 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #83 | rejected packet: | e6 2b 97 c6 d1 4c 13 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #83: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a77850 | handling event EVENT_RETRANSMIT for parent state #136 | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #136 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #136 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49615.277708; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004902 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #136 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 "road-eastnet-nonat-136" #136: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #136) | d6 c8 9e 97 21 46 fb d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 a9 84 13 62 aa bd 1d ad 3e 60 88 dc a9 35 5e | 57 2f a4 3a d3 ae c1 11 b0 24 19 68 c2 75 c1 4f | 59 cf f8 40 bb af 7e d1 b9 71 42 ce c6 09 6e 74 | 9e f2 29 0d 91 21 24 74 6d 2f 10 75 65 f8 b8 44 | e9 15 55 bb 2b 6f 25 4c 58 9b 0b 45 c2 40 5a 9f | ff e2 b3 e2 f7 0d c5 79 1b 00 36 3a 21 20 e7 06 | d4 05 ab e6 7f 0e 4f 26 f4 28 cb d2 12 3f 60 75 | e8 8c 1f 18 e0 09 73 82 2e 56 2f fe 00 1a 31 26 | 0b 05 07 a6 fc 87 93 26 a9 c2 69 7c 30 9c 7a 89 | e9 2a 6b aa c2 98 8a d1 cc 85 ab 8a 1d b6 6c 3a | 46 51 76 9a 2b ea bd 4c 92 d8 c8 5c 56 7a b8 5f | 71 f6 c7 f5 f4 4e c8 ce cc 9b 6f 50 15 3b 30 b5 | cc 32 0c 15 e6 9e 78 33 f4 30 d7 c5 bc a6 29 97 | 00 2f a4 12 c0 82 9e 84 f0 b8 38 05 f1 51 00 d1 | 48 64 6a f9 cc d7 36 54 45 d6 ee 3e 02 d0 d5 50 | ec e5 a0 1a 70 ee 96 eb 78 4d 45 6b e4 50 2d ed | 29 00 00 24 24 22 aa ae c7 66 c9 3a 20 66 58 4a | 54 df 58 65 c1 5d d7 a3 b2 c7 e8 e8 de 15 89 70 | 84 48 bb d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 7f 22 d9 ee cc a0 1b 0a 4c ff 84 | da dc a7 a5 32 ec b3 c6 00 00 00 1c 00 00 40 05 | e4 4f b8 48 f2 80 69 e7 b9 85 06 aa 82 75 ce d9 | b4 81 0b 76 | libevent_free: release ptr-libevent@0x7fb370035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a77850 | #136 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 c8 9e 97 21 46 fb d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #136 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #136 | rejected packet: | d6 c8 9e 97 21 46 fb d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #136: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-192" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-192' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #192 at 0x557d46ada540 | State DB: adding IKEv2 state #192 in UNDEFINED | pstats #192 ikev2.ike started | Message ID: init #192: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #192: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #192; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-192" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-192" IKE SA #192 "road-eastnet-nonat-192" "road-eastnet-nonat-192" #192: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-192 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-192": constructed local IKE proposals for road-eastnet-nonat-192 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 192 for state #192 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a77850 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #192 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 | #192 spent 0.152 milliseconds in ikev2_parent_outI1() | crypto helper 4 resuming | crypto helper 4 starting work-order 192 for state #192 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 192 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-192" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.258 milliseconds in whack | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #187 | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #187 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #187 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49615.295258; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501026 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e5ca0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #187 | libevent_malloc: new ptr-libevent@0x7fb37002a950 size 128 "road-eastnet-nonat-187" #187: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #187) | e7 c9 b3 98 5a b5 d8 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 8c 48 13 ec 18 80 1b 32 77 ec 9e 3b 86 33 3b | 02 ed ce 45 9e d1 07 07 3e bc 97 2e 75 42 14 66 | 03 ce bf d6 11 7b 13 df d2 31 59 70 fe 3e 83 b2 | 64 79 15 03 06 38 db 20 68 31 b1 be e0 b0 81 7d | 4e ac bf 91 07 33 90 db 11 13 bd 16 b3 19 bb 2f | bd 78 ea 08 d7 04 61 29 46 e0 b0 be 88 fb b6 99 | 78 ba 8a fa f7 9f 36 82 a5 d0 b5 cc 15 77 46 bf | 6f 96 e3 0e c4 42 db ac 87 dc 33 da 45 8d 53 39 | 47 ad bd 32 b7 e2 e1 e0 66 2c 6d db 19 28 b7 a9 | b4 a9 eb 1e eb 6f ee c7 40 8b 38 5d 63 81 df 4c | ca 8e 71 2d f6 ed 35 fe b2 fe 7e cb 56 c2 0b db | 35 33 69 6f 1e 16 e5 63 9f 75 fa ec 8a 49 49 95 | 1a f3 8c 29 d9 10 61 09 99 f1 00 c7 a8 23 e7 4f | 74 f2 03 0e 72 27 59 cb 0b e6 eb fe 8d cd 75 0f | 66 f2 35 88 c0 48 17 b6 36 94 37 a8 a7 99 a0 7a | 46 3f c8 7b 62 bc 09 7b 66 12 f0 77 17 2a c3 df | 29 00 00 24 92 ee 3c 64 04 c9 f4 27 93 49 ca cc | 80 d7 5b 2f 40 c6 99 75 47 bf 36 6e b0 fd dd e8 | 14 05 72 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e d3 6f 6b 08 b5 24 1b c7 b0 97 c1 | 57 a8 5f 57 16 36 48 8c 00 00 00 1c 00 00 40 05 | 70 ae b7 c1 13 54 ea fb c0 86 88 d6 98 09 04 e8 | dd f9 c2 0b | libevent_free: release ptr-libevent@0x7fb36802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #187 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 c9 b3 98 5a b5 d8 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #187 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #187 | rejected packet: | e7 c9 b3 98 5a b5 d8 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #187: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 192 time elapsed 0.00099 seconds | (#192) spent 0.987 milliseconds in crypto helper computing work-order 192: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 192 for state #192 to event queue | scheduling resume sending helper answer for #192 | libevent_malloc: new ptr-libevent@0x7fb35803b0b0 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #192 | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 192 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #192 | **emit ISAKMP Message: | initiator cookie: | c8 ff f4 e6 c7 17 a0 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-192 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c4 d3 4a 60 f3 6b 7c bf bf ce 75 aa 6b ec f0 aa | ikev2 g^x 6f fd 60 63 46 fe 0f ab c7 68 02 df c4 c6 ca 90 | ikev2 g^x 76 3b 3d fe 56 bf ba a8 ba d0 ca f7 0b 74 9f c5 | ikev2 g^x d1 05 87 00 01 63 f1 b2 af 9b 1a 75 92 cd 23 75 | ikev2 g^x 4b c9 10 79 b9 97 80 8d 36 ac 73 a4 c7 b8 fd cc | ikev2 g^x b1 38 24 08 46 20 a1 f7 27 44 94 85 0d d1 c0 73 | ikev2 g^x 03 9e 85 e9 52 56 70 2c 82 87 11 d5 67 bd 17 0b | ikev2 g^x b7 79 e5 dd 43 5b 11 13 e5 80 26 ae 8c 3b 5c 3e | ikev2 g^x 39 de 54 5e 94 90 b6 94 bf 91 dc dc 3a b0 dc 33 | ikev2 g^x c2 af e8 1e 41 35 52 7c 14 9d d3 2a 93 8c 0c 2f | ikev2 g^x 4c dd 47 e3 33 95 7f 32 01 a2 12 1d 55 d6 96 ba | ikev2 g^x 80 04 ad 84 ae 69 4d 77 46 16 b8 c1 14 67 ff 90 | ikev2 g^x 15 d3 6f 27 f5 ca 1c 28 65 98 cb 29 af 5a 3d 4d | ikev2 g^x 38 de 5a e8 93 6e 36 0e 60 ea e1 05 60 eb 23 cb | ikev2 g^x 78 44 37 ea 66 63 22 ea 85 48 d4 a0 76 12 75 a9 | ikev2 g^x 2c 64 ca f2 05 fb 36 e8 35 db d2 9f 91 a5 c4 20 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a1 c2 f0 6b 73 a0 8d a3 3d b9 fc 65 4f d9 ed 3c | IKEv2 nonce 9f 8f 87 98 60 fa 1e 4a fb c7 f1 6c 8c d3 14 3f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c8 ff f4 e6 c7 17 a0 6c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c0 | natd_hash: port= 01 f4 | natd_hash: hash= 5b 12 d3 2e 8d 56 f4 3c 1b 6c 80 b7 a9 e2 20 50 | natd_hash: hash= 4b 37 dd 45 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5b 12 d3 2e 8d 56 f4 3c 1b 6c 80 b7 a9 e2 20 50 | Notify data 4b 37 dd 45 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c8 ff f4 e6 c7 17 a0 6c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c6 22 26 cb ae fa 29 03 74 5f 21 c6 81 1a 29 8b | natd_hash: hash= 43 e3 ee ee | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c6 22 26 cb ae fa 29 03 74 5f 21 c6 81 1a 29 8b | Notify data 43 e3 ee ee | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #192 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #192: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #192 to 4294967295 after switching state | Message ID: IKE #192 skipping update_recv as MD is fake | Message ID: sent #192 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-192" #192: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.192:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #192) | c8 ff f4 e6 c7 17 a0 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 d3 4a 60 f3 6b 7c bf bf ce 75 aa 6b ec f0 aa | 6f fd 60 63 46 fe 0f ab c7 68 02 df c4 c6 ca 90 | 76 3b 3d fe 56 bf ba a8 ba d0 ca f7 0b 74 9f c5 | d1 05 87 00 01 63 f1 b2 af 9b 1a 75 92 cd 23 75 | 4b c9 10 79 b9 97 80 8d 36 ac 73 a4 c7 b8 fd cc | b1 38 24 08 46 20 a1 f7 27 44 94 85 0d d1 c0 73 | 03 9e 85 e9 52 56 70 2c 82 87 11 d5 67 bd 17 0b | b7 79 e5 dd 43 5b 11 13 e5 80 26 ae 8c 3b 5c 3e | 39 de 54 5e 94 90 b6 94 bf 91 dc dc 3a b0 dc 33 | c2 af e8 1e 41 35 52 7c 14 9d d3 2a 93 8c 0c 2f | 4c dd 47 e3 33 95 7f 32 01 a2 12 1d 55 d6 96 ba | 80 04 ad 84 ae 69 4d 77 46 16 b8 c1 14 67 ff 90 | 15 d3 6f 27 f5 ca 1c 28 65 98 cb 29 af 5a 3d 4d | 38 de 5a e8 93 6e 36 0e 60 ea e1 05 60 eb 23 cb | 78 44 37 ea 66 63 22 ea 85 48 d4 a0 76 12 75 a9 | 2c 64 ca f2 05 fb 36 e8 35 db d2 9f 91 a5 c4 20 | 29 00 00 24 a1 c2 f0 6b 73 a0 8d a3 3d b9 fc 65 | 4f d9 ed 3c 9f 8f 87 98 60 fa 1e 4a fb c7 f1 6c | 8c d3 14 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 12 d3 2e 8d 56 f4 3c 1b 6c 80 b7 | a9 e2 20 50 4b 37 dd 45 00 00 00 1c 00 00 40 05 | c6 22 26 cb ae fa 29 03 74 5f 21 c6 81 1a 29 8b | 43 e3 ee ee | state #192 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb370035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a77850 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a77850 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #192 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 | #192 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49615.296595 | resume sending helper answer for #192 suppresed complete_v2_state_transition() and stole MD | #192 spent 0.47 milliseconds in resume sending helper answer | stop processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35803b0b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 ff f4 e6 c7 17 a0 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #192 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #192 | rejected packet: | c8 ff f4 e6 c7 17 a0 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #192: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a647d0 | handling event EVENT_RETRANSMIT for parent state #180 | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #180 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #180 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49615.309805; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001566 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #180 | libevent_malloc: new ptr-libevent@0x7fb35803b0b0 size 128 "road-eastnet-nonat-180" #180: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #180) | fe 73 72 02 92 15 d8 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 07 70 60 c7 56 30 74 c1 b3 ab 81 1b b5 12 a6 | 5b b3 64 05 c5 bb 30 3a 1e 92 5a 22 82 67 57 cb | ec df cc 78 63 1b 82 f2 76 a9 50 bd 80 d2 65 3a | b4 e2 7b 0a a1 1e b4 05 49 bc 96 6f 1f f1 51 36 | c7 6c ca c1 27 98 ee 50 22 95 3e cb c3 ea ef b5 | b6 40 b3 fc db 2f 79 46 a9 ac d5 8e 6f 0a 3a 8d | 7e 51 bf 5f 98 c8 56 24 ad e5 63 d9 fa 96 3f ce | b0 c6 79 3b 61 48 6d fd d7 15 2a 6b 8d 91 68 52 | a6 e1 08 45 fe 40 cd 13 6b e8 f0 74 af 74 46 b5 | 90 2f 5d d8 88 37 08 fa 12 4d 78 ce 41 b7 64 80 | a2 4d 76 43 ea e0 49 cc c2 cc 44 b2 cd 61 27 7e | 3d 40 9b 0b ff 59 99 9d a8 52 49 ee d5 dd 07 2e | 2d 3b 1d 7b e9 b4 f8 d7 66 08 0c c9 41 1c 3c eb | ca 7b 16 c5 f5 de ae 99 52 e3 17 c8 ed 61 56 a0 | 61 ae ef c8 11 73 22 d7 35 ab 44 d5 09 26 21 e1 | 09 c4 17 ac b7 7a 6c 9f bd 3c 11 d1 18 1d 51 88 | 29 00 00 24 9d 80 d3 ad d5 e1 1c 51 35 bd a3 6a | 04 d1 ff 4c 54 9f ed 38 00 a0 89 9d 6d 48 6f b5 | c4 22 6c 99 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 22 7d cd 9d 96 05 69 33 a1 7c ff | fb a1 ed a2 be 25 c7 02 00 00 00 1c 00 00 40 05 | cd 91 7d 35 4a 67 75 33 41 31 18 ee 7e 93 4a 7e | ae 98 50 4f | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a647d0 | #180 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 73 72 02 92 15 d8 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #180 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #180 | rejected packet: | fe 73 72 02 92 15 d8 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #180: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac2900 | handling event EVENT_RETRANSMIT for parent state #167 | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #167 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #167 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49615.331108; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003849 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a647d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #167 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 "road-eastnet-nonat-167" #167: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #167) | d1 34 e0 8f fb 7c 13 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 06 19 19 47 f8 53 ed d0 cd 1b 23 74 a8 df 03 3c | 9b a0 ef 95 f1 ce f6 ae 26 37 05 42 40 f8 1b 11 | 25 b6 88 f4 08 21 89 99 64 30 46 35 2b e5 72 51 | 22 12 a5 4d 09 28 30 73 8d 80 f8 3e 6a c2 3d d6 | 8d b5 a5 60 de 1d e9 8e c3 96 be eb 9a e4 82 44 | cd c0 61 18 61 45 71 3d 05 11 06 a9 ca 4e 06 4e | cb 22 e9 93 7b 78 bf 7f 83 42 10 73 45 d5 b3 1b | 92 fd 26 c3 64 99 f5 61 c8 1f 64 c2 09 10 74 12 | fd fe 01 de ac 29 c7 4b 49 1a d9 8d 7a bd 94 f7 | 39 58 38 2e ae 17 b2 73 1d e4 a7 77 fc bf 85 3c | 63 5b 1a 29 48 e8 aa 07 3f e9 82 92 50 e7 72 9f | 9a d8 a5 97 f7 0c 72 e2 e7 b6 cb 0c ff 4e 38 9e | 6d f9 d9 e0 8f df a4 4e 9c de 86 ff 7f 6f 46 07 | 19 30 44 7c c3 76 d0 df 68 7b cd 98 75 c7 57 02 | 52 bd 7f a1 c9 22 2c 83 36 62 ea 42 c7 31 3b 8a | 30 42 3c 51 50 0b 14 55 d5 43 19 16 fa 0b 4c a5 | 29 00 00 24 15 4a d1 bb d8 87 b7 c2 1d 20 84 6d | 4c 8a c4 e7 5d 03 8e 8f 16 37 df e9 c3 77 de 41 | b9 4c a3 ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 52 6d ba 0b 84 f5 59 4b dd eb 25 | 53 bb c6 97 e9 c5 42 9c 00 00 00 1c 00 00 40 05 | f4 8a 9c 13 b7 e1 a4 8b 85 79 9e 14 f1 e3 5c 5f | 69 af 71 4a | libevent_free: release ptr-libevent@0x7fb380027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac2900 | #167 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #84 | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #84 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #84 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49615.331295; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006338 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac2900 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #84 | libevent_malloc: new ptr-libevent@0x7fb380027c10 size 128 "road-eastnet-nonat-84" #84: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #84) | 1f 2f b6 8b 51 48 06 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 1f 67 e9 76 20 6a 2b f7 ad 13 77 97 e1 68 87 | e9 75 71 19 c9 83 f3 73 fb 25 68 00 8c ff f8 c9 | 1d 39 8c aa 48 91 67 ae d7 68 2a 58 40 8a 8f c7 | 80 6c 8a 0d 2c 34 0e dd 31 f9 0d 20 54 ae b8 ad | f3 e5 66 87 27 c1 b9 3b f7 7e 5f 91 9e 13 72 c4 | fb 1c ec 84 d9 28 50 4e 83 04 2b 64 28 38 b2 c3 | 26 3d 3f fe b0 3a 31 93 a2 da 74 58 0f e3 c4 e7 | 1b d4 4a 7b 98 e4 bf 2d 17 77 1c c7 60 c6 cd f4 | a4 b3 3e 33 44 58 50 ab 79 af 8a 67 8e c3 a4 76 | 74 f4 47 b0 6e 53 b7 1d 0a 98 f8 36 13 56 c4 89 | c8 ca cc fb f1 a4 98 cd 59 ff 4a e3 78 5d 3c 67 | 86 c4 70 68 e1 a0 3e 7b 7f c1 2f 3d a4 0d c2 c5 | bd ed 93 ba 2d ff bd 57 2f b9 ac d7 dc 77 9f ae | 61 e7 8a 25 fb 95 fa b6 ae 27 5d f2 7d 25 5c 37 | cd dc a1 e7 01 66 ba 0c 28 2e 4b 30 85 a4 73 58 | f5 b4 a3 77 ea dd 82 87 c2 5d 3f 72 7d 74 36 cc | 29 00 00 24 76 ac e1 c3 58 b8 41 7b 54 b2 2a 6d | c8 c8 51 a4 ca 16 83 ce 76 9e a1 e9 43 b8 d3 34 | c3 53 e0 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f 3a 1a f8 04 5d 3c b5 2b e1 4e ab | 33 49 9d 7d 4f 74 a2 8f 00 00 00 1c 00 00 40 05 | 1b c4 6f 3a e9 14 b6 7b 2a e7 ad b0 65 58 df 39 | fd 38 92 37 | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #84 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d1 34 e0 8f fb 7c 13 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #167 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #167 | rejected packet: | d1 34 e0 8f fb 7c 13 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #167: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 2f b6 8b 51 48 06 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #84 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #84 | rejected packet: | 1f 2f b6 8b 51 48 06 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #84: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0555 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56dd0 | handling event EVENT_RETRANSMIT for parent state #137 | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #137 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #137 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49615.345635; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004154 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #137 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 "road-eastnet-nonat-137" #137: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #137) | 71 ba fb 1f 95 88 29 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 75 6d 4d 0f bb db 8d 24 d0 ba 5f 79 5b 88 be | 94 ae ea 89 7e 95 49 22 fa 6f 0d 51 90 a6 60 1f | 08 fe 3b 9a b1 a8 b5 c8 e8 a5 d1 c2 b6 3a f6 5c | 07 25 e1 53 6d cd f9 d3 3f 17 7a b9 97 ee 73 6b | da 87 59 77 74 9c 5c 05 a7 16 5c 85 33 f2 d8 f0 | a7 84 4c 20 01 fc 53 bf 21 28 ba 99 79 44 ea b7 | b7 e2 9a c6 4e 09 9d 5a 41 46 ff 69 36 bd 47 3d | 68 59 0e 87 0c b2 db 9d ef 27 b1 ef a7 c3 7d 74 | d1 bf 63 41 fd 34 70 c8 08 69 9e 0d 21 dd b6 ca | 61 47 c8 f6 20 99 94 42 4a b6 3c e4 c1 6f 59 47 | 32 7f e7 88 96 d9 c5 8f 82 9f aa 9b 0b 9e 03 53 | 65 a9 c8 5c d7 fe be da 56 44 27 26 98 d6 9a ae | 35 b2 bc fb a7 4d 1f ae ae 76 fb c2 8c 86 63 40 | 59 88 a0 8b a9 0e 3a 8f 10 76 ad e8 54 d2 9e 91 | 7a bc 03 79 61 0b 83 53 4c 4e 2d 22 ca 69 54 24 | ae 77 e1 5c 6b 3a ff ee 1f 59 52 e0 9c 51 48 2c | 29 00 00 24 f7 ec 22 b0 d2 45 cb de 11 9d 88 dc | d9 c8 87 82 94 72 01 b4 91 d8 41 1f 07 fb 13 21 | 60 9f a8 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ee b9 3b 05 6b fc 34 5a 00 ef 69 | 58 dc d5 6e 13 53 c2 0c 00 00 00 1c 00 00 40 05 | 42 f2 83 df 2f 64 fb 42 98 b0 17 b3 99 82 89 4f | 79 b2 42 ca | libevent_free: release ptr-libevent@0x7fb3680180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56dd0 | #137 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 ba fb 1f 95 88 29 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #137 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #137 | rejected packet: | 71 ba fb 1f 95 88 29 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #137: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc40 | handling event EVENT_RETRANSMIT for parent state #181 | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #181 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #181 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49615.380985; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002302 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56dd0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #181 | libevent_malloc: new ptr-libevent@0x7fb3680180b0 size 128 "road-eastnet-nonat-181" #181: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #181) | 87 ea 0d a4 c5 cc c9 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 96 2b 80 67 25 14 db 43 a4 69 96 1f d6 7f 44 | 16 0f d8 a3 fa cd 04 6f 4e 52 d1 61 93 e5 7d 61 | 78 3a 71 d4 ab 07 09 6a 8d e4 9e 59 3a 16 71 d0 | 6a fd 27 9b 67 10 88 a3 7b 06 8c 1d bd 77 73 97 | cb 10 8a 01 63 6c f3 e0 d9 84 4d f6 7b 2b fb e5 | 64 39 42 1e 6a 5d e5 a2 c0 54 6b 84 eb 36 36 98 | a7 bb 04 c5 ca 92 0e 5f af 5a 95 43 e3 52 3f ff | 54 f4 17 a7 9b 5c ce c8 79 5b 79 1b f8 16 5e d7 | 38 2d 41 ad 74 20 7d b3 0e 73 6b 2e d6 c4 34 48 | 1d 4c 33 fc 1f 31 06 e5 ef d9 8a ee a4 d3 10 13 | 9f f3 13 d6 08 5c dd 5e f3 41 90 99 dc 19 c1 90 | 0b 1a f0 8f 10 ca 00 81 f3 4c 0b 20 a3 62 92 ed | 2c 01 0a 11 e9 9d cb 11 95 e0 55 b1 08 02 a2 07 | 35 a8 d1 5c 3e 00 4b 4e 53 71 3f 8a 08 82 11 91 | 21 25 67 71 35 af ba 8c 78 51 c7 49 62 d2 6d 39 | 87 19 14 5e e7 83 0f e7 70 65 a7 bd b3 6a 59 43 | 29 00 00 24 f0 e0 42 a6 e3 a5 05 54 c9 6b cd 2c | d1 4e 0f ea 18 76 ac 9e 15 69 24 da 67 51 76 47 | 7a b9 31 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 1c 40 9b 6a 7c 59 59 f4 5a 8b 5d | d3 44 cd 77 5a a2 8f ab 00 00 00 1c 00 00 40 05 | c9 f4 ff 9a 5d 3b 38 1b 8f 98 0f 89 fb a2 c8 0e | aa 7e 43 ef | libevent_free: release ptr-libevent@0x7fb3540251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc40 | #181 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 ea 0d a4 c5 cc c9 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #181 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #181 | rejected packet: | 87 ea 0d a4 c5 cc c9 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #181: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0681 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-193" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-193' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #193 at 0x557d46adbb00 | State DB: adding IKEv2 state #193 in UNDEFINED | pstats #193 ikev2.ike started | Message ID: init #193: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #193: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #193; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-193" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-193" IKE SA #193 "road-eastnet-nonat-193" "road-eastnet-nonat-193" #193: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-193 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-193": constructed local IKE proposals for road-eastnet-nonat-193 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 193 for state #193 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46abbc40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #193 | libevent_malloc: new ptr-libevent@0x7fb3540251c0 size 128 | #193 spent 0.158 milliseconds in ikev2_parent_outI1() | crypto helper 13 resuming | crypto helper 13 starting work-order 193 for state #193 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 193 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 193 time elapsed 0.000952 seconds | (#193) spent 0.952 milliseconds in crypto helper computing work-order 193: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 193 for state #193 to event queue | scheduling resume sending helper answer for #193 | libevent_malloc: new ptr-libevent@0x7fb35c03b0b0 size 128 | crypto helper 13 waiting (nothing to do) | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-193" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.244 milliseconds in whack | processing resume sending helper answer for #193 | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 193 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #193 | **emit ISAKMP Message: | initiator cookie: | 09 06 18 28 25 97 f6 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-193 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2d fb a2 00 c4 81 91 0e b9 c0 41 7e a3 8e d5 a7 | ikev2 g^x 8f f9 71 10 26 95 10 e6 4e 8b 4b cc bc fc 28 8b | ikev2 g^x b7 f8 db 09 cb 68 57 d8 0f d5 cb 0f b4 d7 8f 3d | ikev2 g^x bd 12 fa dc 76 89 b1 cd af d1 36 87 37 88 94 35 | ikev2 g^x dc 1d 71 91 3b f3 e1 80 cc f2 f0 d3 3a 4d 9e 94 | ikev2 g^x 07 3c 65 6d 3e 40 ff 84 75 64 e8 1b b1 8c 09 6d | ikev2 g^x 19 40 40 a9 6d 88 cd b7 e8 19 c9 3d e5 92 7e 64 | ikev2 g^x de 57 bb db cd d4 22 17 89 b5 3e 22 3c e2 24 0b | ikev2 g^x 14 89 5a 96 bd 20 3b aa d7 bd af 6b d4 f2 98 3c | ikev2 g^x 51 d6 02 8a 1a 1e 91 da fa 7c 17 97 ea 62 5d 5c | ikev2 g^x 64 1a ef 72 b1 d0 d3 26 fb a0 cf 97 96 42 ef 85 | ikev2 g^x 1f 2a 66 aa 06 10 71 63 af 7d da 60 c1 c8 13 08 | ikev2 g^x 97 23 c5 07 eb 43 86 64 05 41 06 20 ee 9b 27 00 | ikev2 g^x 30 a6 42 a7 c6 f6 78 37 51 13 98 31 24 47 eb e1 | ikev2 g^x 16 0f ee 4e 11 f9 96 b6 72 84 dc 21 2b 6e e3 77 | ikev2 g^x 3a 73 af fe 81 a3 c6 e9 eb 76 cf a2 f6 45 8e f3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ca 9d 5e 32 ed 0b e6 19 dc 2f e8 6f 8e a5 0f 9f | IKEv2 nonce 9c 08 6d f3 68 e8 0a 59 74 47 ad 67 e3 bf 67 88 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 09 06 18 28 25 97 f6 74 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c1 | natd_hash: port= 01 f4 | natd_hash: hash= 0c 89 f1 95 94 6f 28 52 1d 00 7f 87 cf b9 fb 25 | natd_hash: hash= a2 94 8b 5c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0c 89 f1 95 94 6f 28 52 1d 00 7f 87 cf b9 fb 25 | Notify data a2 94 8b 5c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 09 06 18 28 25 97 f6 74 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= cf 55 4f 40 25 07 37 da af 22 52 57 b9 8b da a2 | natd_hash: hash= e2 e1 f8 6b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cf 55 4f 40 25 07 37 da af 22 52 57 b9 8b da a2 | Notify data e2 e1 f8 6b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #193 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #193: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #193 to 4294967295 after switching state | Message ID: IKE #193 skipping update_recv as MD is fake | Message ID: sent #193 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-193" #193: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.193:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #193) | 09 06 18 28 25 97 f6 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d fb a2 00 c4 81 91 0e b9 c0 41 7e a3 8e d5 a7 | 8f f9 71 10 26 95 10 e6 4e 8b 4b cc bc fc 28 8b | b7 f8 db 09 cb 68 57 d8 0f d5 cb 0f b4 d7 8f 3d | bd 12 fa dc 76 89 b1 cd af d1 36 87 37 88 94 35 | dc 1d 71 91 3b f3 e1 80 cc f2 f0 d3 3a 4d 9e 94 | 07 3c 65 6d 3e 40 ff 84 75 64 e8 1b b1 8c 09 6d | 19 40 40 a9 6d 88 cd b7 e8 19 c9 3d e5 92 7e 64 | de 57 bb db cd d4 22 17 89 b5 3e 22 3c e2 24 0b | 14 89 5a 96 bd 20 3b aa d7 bd af 6b d4 f2 98 3c | 51 d6 02 8a 1a 1e 91 da fa 7c 17 97 ea 62 5d 5c | 64 1a ef 72 b1 d0 d3 26 fb a0 cf 97 96 42 ef 85 | 1f 2a 66 aa 06 10 71 63 af 7d da 60 c1 c8 13 08 | 97 23 c5 07 eb 43 86 64 05 41 06 20 ee 9b 27 00 | 30 a6 42 a7 c6 f6 78 37 51 13 98 31 24 47 eb e1 | 16 0f ee 4e 11 f9 96 b6 72 84 dc 21 2b 6e e3 77 | 3a 73 af fe 81 a3 c6 e9 eb 76 cf a2 f6 45 8e f3 | 29 00 00 24 ca 9d 5e 32 ed 0b e6 19 dc 2f e8 6f | 8e a5 0f 9f 9c 08 6d f3 68 e8 0a 59 74 47 ad 67 | e3 bf 67 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c 89 f1 95 94 6f 28 52 1d 00 7f 87 | cf b9 fb 25 a2 94 8b 5c 00 00 00 1c 00 00 40 05 | cf 55 4f 40 25 07 37 da af 22 52 57 b9 8b da a2 | e2 e1 f8 6b | state #193 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3540251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46abbc40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #193 | libevent_malloc: new ptr-libevent@0x7fb3540251c0 size 128 | #193 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49615.383678 | resume sending helper answer for #193 suppresed complete_v2_state_transition() and stole MD | #193 spent 0.533 milliseconds in resume sending helper answer | stop processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c03b0b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 09 06 18 28 25 97 f6 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #193 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #193 | rejected packet: | 09 06 18 28 25 97 f6 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #193: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0649 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45350 | handling event EVENT_RETRANSMIT for parent state #85 | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #85 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #85 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49615.395803; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.010349 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f7760 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #85 | libevent_malloc: new ptr-libevent@0x7fb35c03b0b0 size 128 "road-eastnet-nonat-85" #85: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #85) | b7 4f d7 db a6 e2 bd 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 c8 89 a4 0b 04 f2 b9 62 f8 58 f1 1c 0c 91 1a | aa 25 df 1a e7 a5 32 9d 0b b5 9b 93 ab d7 64 b6 | 7e 0d ee f0 b5 83 e8 90 d8 94 b7 d1 ea 05 1c 4f | 85 63 ef bf 80 da 59 c5 18 c9 fd 82 f7 cd 12 c7 | ec b4 9e 35 b0 0c 13 ac 89 c3 d8 6c 14 b9 3b f7 | 41 eb 65 45 c9 66 0a f2 c7 e9 1b 09 a2 d5 ad 2e | 24 aa 0a a8 48 81 8f bc 8d df 3f 90 a2 d2 26 b2 | 84 b7 2d b6 67 ac 5a fa 85 04 e2 96 e3 0b 1d f3 | b9 b5 0f f0 5b d4 c6 d3 b2 9b d4 ad e6 94 18 68 | bf f6 64 ed 26 d4 b7 68 7f a4 94 0e af 4c 0c b4 | 64 91 32 f4 da 5b 38 c2 84 b3 fe 0e e5 1b 3f a5 | 6b 83 a5 f2 b9 7d 21 72 89 70 28 f2 d4 86 bb fd | 03 43 fe f4 4e 6c 9c 49 29 03 b2 15 2f 72 ba 73 | 18 d4 39 82 08 55 da c3 e4 86 cb d0 04 31 94 6a | f5 7b 4a de 4d 49 5a 6d 51 3e 71 b4 0d e8 2e 33 | 9f 26 4a 91 c4 9b 06 1a 88 4b 6e 77 93 8a 7d ed | 29 00 00 24 af e3 01 7b 71 cd 34 07 4b 0a a0 9b | 85 75 4e ed b9 b3 c5 7d 83 a1 ee 6b 3c aa 39 e2 | 0b 8b fa b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 41 7b 44 0a d6 6d 6a b0 b1 8e ad | b0 c3 33 77 45 ba 39 18 00 00 00 1c 00 00 40 05 | 63 0f 1e f2 8f 76 1d 60 09 1e 0d 94 28 78 d8 b0 | 16 5a de 8a | libevent_free: release ptr-libevent@0x7fb37c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45350 | #85 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 4f d7 db a6 e2 bd 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #85 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #85 | rejected packet: | b7 4f d7 db a6 e2 bd 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #85: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9f380 | handling event EVENT_RETRANSMIT for parent state #168 | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #168 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #168 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49615.401236; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004245 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45350 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #168 | libevent_malloc: new ptr-libevent@0x7fb37c01d920 size 128 "road-eastnet-nonat-168" #168: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #168) | b9 02 4f a9 68 0f a0 fe 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 38 63 d7 fd 7e 45 ef 72 03 13 6e 35 cd 53 26 | dd fc 38 ee df 06 1b 11 d5 c4 09 34 ea 9e 52 e9 | 90 99 59 42 6e 45 cc 92 f7 0d d9 7f 81 1b 1c 4d | 72 ce 0d 51 93 0e f8 d3 b9 70 d1 ad 64 8a 6a e2 | a3 1d 17 ed 1c a1 e4 c2 92 7b 01 e5 0d a5 15 1e | c9 45 f6 10 06 37 94 e2 37 85 e0 bc d4 3b da fb | 39 7d 59 09 ad a9 c4 e3 7a c2 37 5d ed ee 68 e8 | b1 63 07 9f 75 29 29 20 65 07 02 b1 8b 8b 01 b0 | 2b 52 3c a4 c8 5c 27 70 49 1c a9 4a ee d4 27 a2 | d7 44 e4 1a a5 20 37 9f 74 66 e1 72 a9 aa a5 00 | ec 99 a9 b7 19 84 18 49 d0 9b 4f 00 03 95 50 90 | b6 93 61 e2 6b 86 3b a3 1f 9e fe be b9 00 11 4e | d0 ee 6d 6d 92 bc 2a 22 db 5c 6c ba d6 ed 5d 3e | 26 d4 a4 f0 75 e3 70 55 39 8d c3 1c 3c 5e 40 3f | 06 f2 7d 36 24 34 4a 10 84 8b e4 b1 b8 1a 47 88 | b9 e7 73 06 47 d4 d0 41 aa 50 1b af 0e 28 2a e0 | 29 00 00 24 3f 02 e6 1c 86 66 81 19 d2 36 b7 e8 | e6 9a a6 e7 5e 78 b6 e8 13 75 aa 57 3b a6 be 37 | b8 21 ac c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 8a 57 55 a3 9f b5 8e 63 74 0d de | 85 a9 a1 c8 2f d9 1c 61 00 00 00 1c 00 00 40 05 | 7a 31 f7 15 f8 cd 69 10 6a f0 ab d3 a9 c2 c3 c7 | 07 31 9b 08 | libevent_free: release ptr-libevent@0x7fb36402ffd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9f380 | #168 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 02 4f a9 68 0f a0 fe | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #168 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #168 | rejected packet: | b9 02 4f a9 68 0f a0 fe 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #168: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa0940 | handling event EVENT_RETRANSMIT for parent state #188 | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #188 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #188 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49615.409589; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500163 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9f380 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #188 | libevent_malloc: new ptr-libevent@0x7fb36402ffd0 size 128 "road-eastnet-nonat-188" #188: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #188) | f8 92 2e dc 48 c8 64 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 8c 6e 8b 73 15 ff 0e bb aa f8 24 68 da ef 6a | 1c 01 19 e8 a2 a3 5e f6 5a 71 31 aa 3c b1 c4 41 | 27 8d 2a 58 b3 aa 09 ec ab 9b 79 a4 37 2c 57 bc | 33 2a 63 cb 88 61 ff 6f 57 a5 f5 2c 3b 28 ff c0 | e2 03 fe e0 d7 c3 cd af a3 47 59 59 0e 58 bb 20 | d6 dc 5a 4c 31 47 b6 5a 25 02 b2 63 30 de fe 0f | aa 00 d1 fa e6 0a 07 a2 95 d3 2a cc eb a7 d4 64 | 92 40 37 20 3b f0 9c 95 06 bf 89 fe 4e 9c 75 93 | be 49 6d 83 74 cb 43 a9 68 b0 b3 1b 6c 7e b1 7d | 71 1f eb 81 78 ef b8 84 cd 25 a3 cb 59 97 64 95 | 1c 19 a1 95 2c 31 c2 d1 08 08 8a 2a 38 f4 5e 06 | d0 60 01 b7 7e f7 37 07 7c 57 50 f7 20 78 35 94 | 90 2f 3d b8 01 db 62 a4 93 0c bc 99 72 08 c3 2a | 65 b1 ef fc 8b 00 29 6d 1d eb d8 05 c6 bd 18 34 | 85 96 91 a6 8d 87 95 d6 03 d2 b7 ec 1a a3 0e 66 | 18 52 9c 51 fa 27 d5 c0 2b 40 de 51 c6 17 5c e3 | 29 00 00 24 32 b3 09 c7 6d 35 ae 79 0b a9 93 c1 | 25 b3 85 c2 02 53 dd a2 dc f7 0c 55 f9 9f 55 72 | 45 99 28 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 05 c4 f8 2b d0 22 47 d6 02 77 fd | 96 35 b9 b3 1b 70 08 41 00 00 00 1c 00 00 40 05 | f1 47 98 30 50 7a f1 c9 d1 56 2e ed 54 8a b8 d4 | be 9f b3 89 | libevent_free: release ptr-libevent@0x7fb3380300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa0940 | #188 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 92 2e dc 48 c8 64 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #188 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #188 | rejected packet: | f8 92 2e dc 48 c8 64 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #188: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8ee40 | handling event EVENT_RETRANSMIT for parent state #138 | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #138 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #138 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49615.417956; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003496 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa0940 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #138 | libevent_malloc: new ptr-libevent@0x7fb3380300e0 size 128 "road-eastnet-nonat-138" #138: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #138) | 9e 04 07 cd 3c 90 2d 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 26 9c 69 c2 fb a0 0a d4 c6 8a e3 3a 35 d9 72 | c4 6d dc 97 97 46 4f 49 45 f3 89 7c 26 93 32 59 | 0e 55 34 82 9b 12 80 e6 60 cd 9e 59 15 f7 7d 65 | 53 e2 d3 d8 c2 ed 2c ad 8a b3 a9 0f 4d 3e ac 86 | 1c 67 54 95 04 00 bf 86 4e 8b bf af 44 15 eb 62 | ea cc 94 5a 6b 1a 81 0f 38 cc a4 0b 8b 3e f7 1f | ed 1b ee bf 3c b7 b3 6b c3 78 66 29 1f dc 55 cd | cd 9e c4 55 82 0d 26 16 81 1d 3b 87 44 bb 54 ef | 02 0c 05 f7 04 a0 83 3c c1 fe 2c d3 4e 3d ca 62 | 71 e8 db ac f9 9d 90 a6 0d 1e d9 94 f5 c3 29 22 | f5 2c d8 67 db 54 e1 d3 df b5 df 85 0d 36 cf 0c | 0f 08 0d 38 84 31 cd 9b 35 a0 fd df e8 86 86 f3 | a8 84 f3 56 c8 9a eb 02 1a c2 37 30 b1 0d 51 72 | 6c ba 2c ab f4 fb 66 85 22 97 66 d7 6b a3 32 2b | 57 22 c0 38 a7 76 1b d3 ea e0 94 87 f8 5d 23 88 | 1d 92 5d 32 0c 98 0b 93 d1 e9 b6 e4 2e 67 5c f1 | 29 00 00 24 e6 24 a9 20 36 d0 44 65 2c ba 3d 80 | 21 f7 06 3f 8d eb de 66 e7 ca a9 01 80 86 00 a0 | 79 48 c1 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 af 88 b2 43 70 03 fc c5 39 dd 7b 65 | af e5 61 63 70 8d 5a 32 00 00 00 1c 00 00 40 05 | 84 c7 81 66 9c 3a cd fa d9 98 02 0d f2 5f b1 72 | 68 cd 62 b2 | libevent_free: release ptr-libevent@0x7fb36c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee40 | #138 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e 04 07 cd 3c 90 2d 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #138 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #138 | rejected packet: | 9e 04 07 cd 3c 90 2d 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #138: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-194" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-194' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #194 at 0x557d46add0c0 | State DB: adding IKEv2 state #194 in UNDEFINED | pstats #194 ikev2.ike started | Message ID: init #194: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #194: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #194; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-194" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-194" IKE SA #194 "road-eastnet-nonat-194" "road-eastnet-nonat-194" #194: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-194 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-194": constructed local IKE proposals for road-eastnet-nonat-194 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 194 for state #194 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a8ee40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #194 | libevent_malloc: new ptr-libevent@0x7fb36c0251c0 size 128 | crypto helper 17 resuming | crypto helper 17 starting work-order 194 for state #194 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 194 | #194 spent 0.172 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-194" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.272 milliseconds in whack | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 194 time elapsed 0.001111 seconds | (#194) spent 0.891 milliseconds in crypto helper computing work-order 194: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 194 for state #194 to event queue | scheduling resume sending helper answer for #194 | libevent_malloc: new ptr-libevent@0x7fb35003b0b0 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #194 | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 194 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #194 | **emit ISAKMP Message: | initiator cookie: | fb a9 4a 68 01 02 ca 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-194 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ad aa 66 9d b6 64 e0 b9 0d 37 a2 d5 08 fd 46 b0 | ikev2 g^x f7 b3 8b 64 d2 0b f9 59 d3 20 8f d2 23 52 ab 2e | ikev2 g^x d6 99 18 d2 2f 54 8c e7 99 6c 8c 9d cd ff 9d 5a | ikev2 g^x 44 41 3e 80 ea ff 21 1e 5c 82 8a bc ec 41 36 14 | ikev2 g^x dd 8d af 05 d5 6f c4 3b eb c0 61 1c 5d 0d 70 dd | ikev2 g^x 40 c9 d4 1f 8a d2 d8 76 8a b9 bd f7 f3 8d f9 d9 | ikev2 g^x da 19 38 58 8d de a2 45 b1 7d bb f4 44 36 75 08 | ikev2 g^x 1e 19 e1 7e 40 21 fc 21 30 c5 e3 bd 20 8d d8 be | ikev2 g^x bf bc a6 60 a1 d6 d8 51 07 69 fd 62 da 68 85 ce | ikev2 g^x 37 74 1e f7 ae d2 77 4a f2 bc 1e 10 5e ed ca 3e | ikev2 g^x bf 36 bc 15 0b 03 92 f4 43 13 b4 d6 80 6a 65 a5 | ikev2 g^x da 3f fd 89 e4 f3 95 6e ad 5c 51 06 e7 4d 88 1f | ikev2 g^x 8e b3 8c 1c 17 69 df 75 37 d0 1f f8 06 a4 4e 15 | ikev2 g^x d4 9e 45 dc a2 0b 41 4c 07 55 90 db 32 9b e2 82 | ikev2 g^x 2b f7 f7 40 85 e7 33 60 11 d2 9c 0f 8b 18 ca 0d | ikev2 g^x 1e 7e c6 7b e1 da d7 c5 9b 44 c8 e8 12 48 03 39 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a9 61 02 67 eb 1a 8f ba e2 2e bf 6e fa 3f 6f bb | IKEv2 nonce 4e c3 80 0d df 43 7e 7d a3 f5 81 cc f3 7a bb 30 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fb a9 4a 68 01 02 ca 05 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c2 | natd_hash: port= 01 f4 | natd_hash: hash= 1b 5d 39 f5 08 60 5b 2c d2 7c 9c f1 a9 84 d1 dc | natd_hash: hash= ab 40 bc 42 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b 5d 39 f5 08 60 5b 2c d2 7c 9c f1 a9 84 d1 dc | Notify data ab 40 bc 42 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fb a9 4a 68 01 02 ca 05 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= dc 98 c1 28 2a 8c a1 5f e1 55 35 3c e4 55 00 85 | natd_hash: hash= a7 4e ac da | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dc 98 c1 28 2a 8c a1 5f e1 55 35 3c e4 55 00 85 | Notify data a7 4e ac da | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #194 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #194: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #194 to 4294967295 after switching state | Message ID: IKE #194 skipping update_recv as MD is fake | Message ID: sent #194 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-194" #194: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.194:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #194) | fb a9 4a 68 01 02 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad aa 66 9d b6 64 e0 b9 0d 37 a2 d5 08 fd 46 b0 | f7 b3 8b 64 d2 0b f9 59 d3 20 8f d2 23 52 ab 2e | d6 99 18 d2 2f 54 8c e7 99 6c 8c 9d cd ff 9d 5a | 44 41 3e 80 ea ff 21 1e 5c 82 8a bc ec 41 36 14 | dd 8d af 05 d5 6f c4 3b eb c0 61 1c 5d 0d 70 dd | 40 c9 d4 1f 8a d2 d8 76 8a b9 bd f7 f3 8d f9 d9 | da 19 38 58 8d de a2 45 b1 7d bb f4 44 36 75 08 | 1e 19 e1 7e 40 21 fc 21 30 c5 e3 bd 20 8d d8 be | bf bc a6 60 a1 d6 d8 51 07 69 fd 62 da 68 85 ce | 37 74 1e f7 ae d2 77 4a f2 bc 1e 10 5e ed ca 3e | bf 36 bc 15 0b 03 92 f4 43 13 b4 d6 80 6a 65 a5 | da 3f fd 89 e4 f3 95 6e ad 5c 51 06 e7 4d 88 1f | 8e b3 8c 1c 17 69 df 75 37 d0 1f f8 06 a4 4e 15 | d4 9e 45 dc a2 0b 41 4c 07 55 90 db 32 9b e2 82 | 2b f7 f7 40 85 e7 33 60 11 d2 9c 0f 8b 18 ca 0d | 1e 7e c6 7b e1 da d7 c5 9b 44 c8 e8 12 48 03 39 | 29 00 00 24 a9 61 02 67 eb 1a 8f ba e2 2e bf 6e | fa 3f 6f bb 4e c3 80 0d df 43 7e 7d a3 f5 81 cc | f3 7a bb 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 5d 39 f5 08 60 5b 2c d2 7c 9c f1 | a9 84 d1 dc ab 40 bc 42 00 00 00 1c 00 00 40 05 | dc 98 c1 28 2a 8c a1 5f e1 55 35 3c e4 55 00 85 | a7 4e ac da | state #194 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c0251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a8ee40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #194 | libevent_malloc: new ptr-libevent@0x7fb36c0251c0 size 128 | #194 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49615.452077 | resume sending helper answer for #194 suppresed complete_v2_state_transition() and stole MD | #194 spent 0.48 milliseconds in resume sending helper answer | stop processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35003b0b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb a9 4a 68 01 02 ca 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #194 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #194 | rejected packet: | fb a9 4a 68 01 02 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #194: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.068 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #182 | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #182 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #182 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49615.453294; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001555 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abd200 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #182 | libevent_malloc: new ptr-libevent@0x7fb35003b0b0 size 128 "road-eastnet-nonat-182" #182: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #182) | 8e 7e 13 89 c5 5d f7 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 e9 75 54 2d e8 42 37 37 23 34 72 75 33 ca 7f | b2 72 0c b6 c2 49 71 7a 03 e3 1d 07 58 b0 51 38 | 61 45 b2 16 d2 ad 2f f3 7c 0e 1f f4 c5 05 13 4c | d6 98 4b 66 e1 54 c0 73 13 91 4a f2 b3 d9 63 4c | 05 4b dc 71 47 da 12 a0 d3 dd 69 f7 37 06 e9 cd | 0a 8b 52 94 8a 6d da 5b 07 14 54 d3 97 43 1d a2 | ab 36 1f dc b8 97 c0 22 40 d5 44 3f fd 99 bd 8a | 9c f3 b8 47 00 bf 43 3d ae b2 e8 4a 6b 45 ec 0f | 5f e8 9a 25 7c ca 9d 80 f8 42 ce d3 9c bf c6 35 | 83 b9 bc 3b e5 0c da 92 14 98 a7 1a ce 79 b0 48 | 82 a8 51 c4 ec a8 10 1d b7 45 e5 80 dc 95 d7 16 | 44 79 9a ed 89 ab 16 cf 11 d5 7e 53 46 f0 d9 00 | eb 07 b7 8a d9 e3 ff b1 2b 68 df 33 18 af 5f 4c | 9c 70 63 04 6b ff 29 aa a6 e4 41 5f 2d 42 80 3a | 0d 17 98 f8 4e ea 6a f2 2b f3 0d 26 ff 27 2a a7 | a3 13 57 12 6f 11 b8 dd 58 53 1d d0 16 a0 b0 ee | 29 00 00 24 65 07 2e e4 49 be 52 f9 c6 9f 8e 3b | 7c a2 61 d2 67 51 00 51 49 02 4e 77 4c 09 9c a2 | 72 c6 03 a7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 04 ff 12 2b f3 10 13 86 f3 c1 ff | 09 98 25 be d2 68 ad 5e 00 00 00 1c 00 00 40 05 | d9 6b 4d a2 91 b8 eb 60 71 cf 0d f0 f9 f0 84 45 | 87 2d 57 76 | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #182 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 7e 13 89 c5 5d f7 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #182 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #182 | rejected packet: | 8e 7e 13 89 c5 5d f7 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #182: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0673 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a30d70 | handling event EVENT_RETRANSMIT for parent state #86 | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #86 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #86 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49615.458671; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004299 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #86 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 "road-eastnet-nonat-86" #86: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #86) | bc cc 1d a8 6f 14 2f d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 02 f4 30 81 01 a2 84 c7 c8 75 14 73 a0 b4 f1 | ce 00 5c 2a 70 74 58 bb 3e a0 6e e2 4f 0a 9f 83 | 08 76 97 6b fa 62 74 7d db ae df 90 de 69 8c b2 | 0e 6c a5 3a 87 61 1a 3a 8f 5d a0 5a ba ab 91 5a | 1c 85 49 b3 c5 25 e7 4c 6e 03 2b ac 66 42 56 f1 | d7 31 b5 bb 5b 45 b9 dd 90 6d ee 07 cc 7c f5 62 | 74 01 c5 67 95 ba 42 bf 74 f6 d2 a1 03 af 1b fd | e4 7f bc c7 c5 75 0a a8 6e 5c 9e 6c 4f 5b c1 73 | df 6f 2d 86 ef d9 7b 7f 50 00 74 9f 02 e6 99 af | 69 db f9 f3 80 3c 99 58 33 58 03 46 c0 6e d1 8c | d1 aa bb ba e8 f4 a9 85 5b aa 0d 22 6e e9 62 24 | 0d 2c d4 54 19 e8 97 d8 e7 d3 1e 75 fe 1d 11 bb | 8a ef b3 15 49 d2 bd 11 ce 93 3c 78 52 c8 0e 77 | 1d b3 5a f2 76 6d 63 9a e0 92 62 06 a0 bc 29 93 | a6 78 17 fe 37 4a 17 27 33 46 cd 3f 1c 77 4a d6 | df 68 38 cd 2b 58 7b 28 94 f9 86 34 46 7d e4 ec | 29 00 00 24 3f 6f 33 90 58 31 9c 9e c4 12 e4 33 | 9b 9e 11 d9 fa de 80 3a 9a 7c 3d 2b 3e 4c e8 aa | 92 49 b7 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 27 7b 26 e6 59 48 3b 7c 9f 7a cf | bb 52 6d 94 e2 1f 43 00 00 00 00 1c 00 00 40 05 | 49 8d b2 ff d2 6f bf 71 ec 03 78 4c 49 00 83 b0 | 23 90 3a 8b | libevent_free: release ptr-libevent@0x7fb34002a900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a30d70 | #86 spent 0.175 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc cc 1d a8 6f 14 2f d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #86 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #86 | rejected packet: | bc cc 1d a8 6f 14 2f d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #86: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.067 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90440 | handling event EVENT_RETRANSMIT for parent state #169 | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #169 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #169 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49615.479089; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001368 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #169 | libevent_malloc: new ptr-libevent@0x7fb34002a900 size 128 "road-eastnet-nonat-169" #169: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #169) | 36 7b 71 a0 e2 7f 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 4f 45 f4 ab d7 36 ef 76 4d 44 de 6d 62 2d ae | 4e 5c 7f da 0a b2 48 be 78 ae 6d be 58 68 4b a4 | 8f 2f d2 29 68 46 25 1b 12 f9 92 02 9c d7 87 f1 | eb d6 eb 82 f8 34 c7 6d 1b 97 bd 5a 16 3f 5c d9 | 45 ff a3 65 05 29 38 16 83 1c 73 b0 0d 2c 32 2c | fa dc 03 8b a8 c2 e4 3a 68 19 c8 6f 81 6b a9 c7 | f3 1e d3 85 90 6b 23 38 49 5d e8 b8 1a 99 c6 3a | 6a a2 1b 8c c9 a7 dc be 9d 40 85 d1 eb b3 30 ea | 56 c0 aa c1 0c 1e 30 02 2d 3d a6 f2 04 1d 14 69 | 6d b1 c7 5c 5a 62 14 b7 a7 b0 4d b4 4a ea d7 8e | 92 28 ac 35 b4 c0 43 9c a2 b3 5b b7 49 ed fe 09 | 58 d4 4b a6 dd 4b ac 69 dc 3a 32 2b 1e e0 8a 39 | ae 70 61 ea 71 bb e0 10 48 b3 9a 5d a8 33 73 7a | e9 75 bd 48 dd 69 c9 c8 be a6 8c 92 7f 96 ad 37 | 04 3d 47 69 86 1c fb 25 12 87 50 73 a4 63 1a 75 | dc 73 f6 d1 8e ed 8a 90 43 3f ec 36 e2 fd c3 e9 | 29 00 00 24 c6 0f 04 68 5e 20 5e 64 7b fe 77 4f | 0f cb 3e 64 8c ad ed 27 06 6f 13 47 5c 0b 0d 8e | 1c d7 84 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fa 7c 50 0f e9 f1 70 67 4d 08 f0 45 | 40 25 4d e8 01 bd 9b 4f 00 00 00 1c 00 00 40 05 | cc 1b 7d 85 9d ec 77 c3 d4 a3 45 1a a2 36 2f 10 | c5 f4 8f 3e | libevent_free: release ptr-libevent@0x7fb34801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90440 | #169 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 7b 71 a0 e2 7f 3d 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #169 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #169 | rejected packet: | 36 7b 71 a0 e2 7f 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #169: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0678 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a43dd0 | handling event EVENT_RETRANSMIT for parent state #139 | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #139 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #139 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49615.485565; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004718 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90440 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #139 | libevent_malloc: new ptr-libevent@0x7fb34801d920 size 128 "road-eastnet-nonat-139" #139: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #139) | 98 4d 89 18 32 14 8f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb bc f6 61 86 12 c3 bf 44 ad ab c8 f8 6d 1d 7a | 8e 0b a1 af 30 f0 3a 9c 0b 72 59 7b 0e cc 41 e5 | 8e 8e a0 7e 30 1e 50 82 23 bf b6 e1 69 ee be 0d | cc 36 07 e5 53 86 7d cf f5 63 8d 89 06 e8 7e 7e | 8f 2c 9d a8 ed 05 f6 a5 d3 42 db b5 95 59 0b 32 | 04 71 41 13 63 f9 4a 4c 42 0e 00 d5 c5 99 ba ab | 17 4c ce 49 6c 52 88 21 1f b3 2a 6c 8d cc 9d ad | 58 96 b7 c5 a6 44 e9 2c bb f7 31 ef f0 0b f9 1c | 1b 4e 21 f5 a2 ea 26 1f 03 aa b4 4e 34 e2 87 84 | cf 38 c7 5e ef db 85 1f 03 a7 73 48 68 be 7e b1 | 00 74 8f e9 65 a8 0b 8a 27 e7 a0 51 5b c9 e3 2d | 64 f7 22 1b 1e b7 6f af e1 0f 11 f6 9b 82 c4 de | 33 fe da 26 0e d7 f8 c3 43 49 4f e1 38 7e 8a 70 | 40 40 85 6b ea cf c0 b6 a0 c2 ac 2b eb 0c 58 ce | 0e cd 1f 9c 72 bb e0 55 da 15 7c 5d ad 4e 80 77 | d9 86 7e 35 e9 dd 73 d2 de c2 f2 ae 3e 6a 77 fd | 29 00 00 24 ce a2 61 71 0b 59 18 45 32 ff fc 20 | d2 f9 be 9d 52 e8 20 ba 16 46 42 c2 a8 74 a7 11 | 49 eb 52 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 5e 21 46 6e c2 25 7d 16 7d 1e 10 | d1 b7 00 9d a8 c1 7e fa 00 00 00 1c 00 00 40 05 | 95 96 61 58 5f 24 29 d9 13 26 c9 57 d8 b0 16 e2 | 35 e6 bc 7d | libevent_free: release ptr-libevent@0x7fb34c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a43dd0 | #139 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 4d 89 18 32 14 8f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #139 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #139 | rejected packet: | 98 4d 89 18 32 14 8f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #139: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28ab0 | handling event EVENT_RETRANSMIT for parent state #183 | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #183 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #183 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49615.517076; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002436 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a43dd0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #183 | libevent_malloc: new ptr-libevent@0x7fb34c01d920 size 128 "road-eastnet-nonat-183" #183: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #183) | d6 e6 54 26 a5 51 49 90 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b d3 2c d5 46 1e bb 45 3e b1 07 9c 29 85 98 93 | ee 36 97 24 0c 65 6e 72 03 fd eb 26 66 8a 4d 99 | 30 4c 18 3c 80 72 a6 76 e5 f3 36 3a 07 42 32 c2 | 39 e8 9d 5f ec e0 51 20 28 56 14 b3 ac 67 3c fa | 98 5a 37 73 bb 28 df c4 30 da b1 be 2e 7d cf b5 | aa 2a 51 9d a6 55 f1 d6 02 88 71 ea 44 18 ea 39 | 96 0e 47 c9 6e 26 f7 c4 74 bc 17 b7 c1 ce f4 36 | 36 cb e7 f5 29 fd 74 37 cc 31 1f ce 2f ee 7a 23 | fd da 91 35 f0 f9 ff ec 58 26 8a a2 2f d2 81 0d | a1 17 24 44 c9 5f 1e 77 b9 2b 2f 5a f9 47 ce 83 | a8 fd f0 5f 20 8d e8 9e 6f 25 55 3c b9 c3 9c 82 | 64 c6 bd 5c b0 07 c1 4a d5 fd 91 20 b3 b1 5d bd | 38 8e ad d0 f3 fd d6 24 13 d0 4b 1a eb b6 e2 f9 | 08 8d ad d1 8e e2 f0 e9 c7 8d cc 8b a6 0c 02 89 | 89 a8 da 17 42 b0 bd b2 29 34 67 25 c6 68 61 cb | 05 67 1d b0 18 99 57 3e 48 e0 4d 27 90 f1 05 8d | 29 00 00 24 fb 03 08 25 8e 6d 3a 5f 6f 85 88 7b | 77 f7 13 2b 6d 57 c0 a9 57 85 b0 8d 7b f6 0e 38 | 56 d2 56 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 0a 8e a5 81 0b e2 cf 5a 0e 0b 81 | 8d 82 2c 01 80 91 75 34 00 00 00 1c 00 00 40 05 | bf 20 fb 11 3c 6a fd 35 31 59 61 81 c5 7f e8 2f | e6 90 5e b8 | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28ab0 | #183 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 e6 54 26 a5 51 49 90 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #183 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #183 | rejected packet: | d6 e6 54 26 a5 51 49 90 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #183: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0681 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a30d30 | handling event EVENT_RETRANSMIT for parent state #87 | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #87 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #87 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49615.521433; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005317 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28ab0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #87 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 "road-eastnet-nonat-87" #87: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #87) | a2 df 19 46 98 d4 bb 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de ac a7 56 a2 bc 95 5a 6c 57 c8 2b e0 20 68 16 | a2 ff 5a bd 83 94 6a 4d 58 8c b2 a4 d4 76 ed fc | 0f 4a 9b b9 df 7c 6c 34 8f 70 fd e9 a0 17 cd ff | 42 ae c6 35 53 50 df 4f 92 fb b8 ae 34 b4 21 4a | 96 f4 d2 6a f3 c3 2c b1 14 ce 42 da 82 6b e3 0d | db 7a 9e a9 08 f5 73 b2 1d 45 e9 bc fe 79 e6 2d | 2f 0a 64 4b ee 86 b7 4b 3f 77 d9 fd c5 b0 bd d9 | f0 f9 4a 67 c3 b1 50 bb ba e6 76 27 0e 9b 80 ac | ac a5 3d ed e4 7f 3e ce 9b 7e 70 ae 76 56 31 41 | 17 98 86 1f 1f 85 2b 2b b2 36 28 19 25 14 37 3e | bb a6 a5 e3 f0 64 b9 9c 0b af e9 c8 fc dd 9d 10 | 05 4f 6e 73 4c 08 a1 b5 54 a0 ae e0 d5 30 bc af | af 63 ef 9e e4 70 09 3a 1e 60 6f c5 bb 77 c5 0b | 60 c8 18 55 dd 77 cc 86 3f 7c 34 56 80 93 c4 30 | 61 51 d7 11 b2 4d 6f 17 c0 8c 7f d5 08 fa 5f 63 | d7 b3 cd 14 9f 3a 9d 07 13 ee 34 e9 84 52 68 1b | 29 00 00 24 8b f5 b9 e8 72 8a d8 5e 1a d6 70 1a | a6 5f 3d 02 9f 40 bc e8 9c c3 88 16 89 ec af ca | b1 90 6f 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 83 d5 c2 93 bc 76 7b c0 f5 6a f5 | c6 03 a7 0c 52 da b8 7c 00 00 00 1c 00 00 40 05 | 9f 00 07 ca 6e 64 62 64 56 d5 c5 aa 95 9f c8 6b | 83 2b 36 93 | libevent_free: release ptr-libevent@0x7fb37800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a30d30 | #87 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 df 19 46 98 d4 bb 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #87 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #87 | rejected packet: | a2 df 19 46 98 d4 bb 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #87: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #189 | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #189 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #189 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49615.524096; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501202 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a30d30 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #189 | libevent_malloc: new ptr-libevent@0x7fb37800cf80 size 128 "road-eastnet-nonat-189" #189: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #189) | 86 0c af cf d7 4f f0 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 da a6 92 01 b3 1e 2d 01 6d b4 b0 5b c8 86 63 | fa d3 04 1f 4a 5d 42 51 c6 fa 83 7f 52 a9 5c 5f | 29 a2 a6 67 ca c4 cb cd f8 82 1e 41 60 3e d2 fa | be e5 64 f3 5e f3 de 1c 66 73 04 70 83 c5 c9 fa | d9 0c 95 4f d8 7c 96 92 62 c0 89 3f a6 f5 e5 1c | 1d 8a 04 ae 7f 59 7e f9 0a 02 65 1e e5 50 67 cc | 8a fa 7a d2 bf b6 8d 22 68 80 58 92 0d 46 32 32 | ac 55 d1 c6 9f 27 eb 86 dd 30 64 7d 70 38 1f e2 | 82 2f 8e ad e7 06 c8 10 a8 89 ac cd 34 d4 ef 54 | d9 fa ef 60 3c 01 17 c1 e0 90 2b 1d 49 9b 9e e6 | 59 07 02 91 fb ba 4f 73 08 2f de a1 3c 70 c1 7b | f2 11 29 b4 eb 0f 6e 10 04 0d 03 e4 29 ad b5 0b | 6b 4b aa f3 91 cc 9d d5 fa 2e 4d ea 3f 0e 7e 09 | 29 dd 22 a7 1f e8 ee 73 1f 35 15 51 78 6d 86 ea | cd eb 92 50 fc 79 44 24 ff 9f f8 19 89 f2 31 2b | 2f 82 13 db f2 4a 67 b7 c4 2a 16 2f d5 d4 31 ee | 29 00 00 24 ab 6b 1b 01 ee 77 53 c6 2a de 6e a0 | bf 1d e9 b5 56 76 a7 4b d5 a7 a9 e9 a7 01 9e 47 | cc 4b 2a 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 a4 06 85 0c 28 ca 55 e9 70 4f 7f | 1a ca eb c6 50 e4 53 f0 00 00 00 1c 00 00 40 05 | 2a 84 d0 22 8e e3 5b 68 a0 3f 20 22 83 cb 94 15 | 67 d9 c0 48 | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #189 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 0c af cf d7 4f f0 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #189 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #189 | rejected packet: | 86 0c af cf d7 4f f0 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #189: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fd070 | handling event EVENT_RETRANSMIT for parent state #170 | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #170 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #170 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49615.545454; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003412 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #170 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 "road-eastnet-nonat-170" #170: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #170) | 0e 3d 5a e4 33 67 ae f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 3a 08 5b b2 3f a4 8e df 9b c0 eb a8 ff 32 50 | b7 58 7d 7d 4a 10 8c 9a ad 53 11 df 0e 8d 39 fb | 8a c0 5f d6 8f ee 32 b4 c6 d6 4c 41 39 dc c8 7f | a6 9c 35 ef 09 08 ca f8 2d 7d 3c 76 aa 39 58 43 | 35 eb 36 d9 ef 09 c3 c6 d0 ab 11 b8 34 40 ff 55 | c8 35 93 0b bc c0 66 e0 d9 9f c1 89 c0 9b 98 09 | c8 0d 44 3a d6 3d e2 b0 52 69 78 44 4a 24 b0 ad | 80 aa 61 eb 53 d9 1a 0a 53 30 0a eb d5 8c f7 f3 | ca 01 74 12 22 ff f3 9d 01 97 d0 63 da 1b b6 a1 | 02 35 c9 78 38 c4 96 f6 23 08 55 58 52 01 18 8c | 46 ea 56 a8 65 c1 e7 43 3b b8 d3 07 66 36 b4 14 | 25 9e f5 4d 86 46 ab 55 94 68 c7 67 da 70 2b 06 | a8 71 55 97 18 18 f9 3a 98 e0 35 83 6a 8d aa b1 | bc e1 50 ed 72 ba 83 3d 44 b6 97 eb 32 ff 41 57 | 48 97 03 67 e5 b8 1f 12 59 d4 1e 23 84 44 9b 29 | 9a 72 cd 57 ba 76 df 2f d8 46 ae e3 a7 ac 2c 37 | 29 00 00 24 f5 be bd 85 ea bf a8 35 5e 2e fb 98 | 21 e3 d9 77 11 2b 7a 24 c1 b5 1e 2f 89 52 5c d3 | bf 7f 74 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a ca 79 b0 52 c7 26 24 58 ba d7 c8 | 58 6a 36 93 64 5a 0d 23 00 00 00 1c 00 00 40 05 | 2e 8d 3a 82 9a 56 9c b7 68 e2 e0 45 0d 65 b1 99 | f9 22 bb fc | libevent_free: release ptr-libevent@0x7fb384038240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fd070 | #170 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 3d 5a e4 33 67 ae f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #170 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #170 | rejected packet: | 0e 3d 5a e4 33 67 ae f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #170: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #140 | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #140 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #140 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49615.548894; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003503 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab6500 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #140 | libevent_malloc: new ptr-libevent@0x7fb384038240 size 128 "road-eastnet-nonat-140" #140: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #140) | 7b af c7 ac 06 7e 5a 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 03 39 d2 09 32 a1 ff 81 2d 15 dc 96 08 01 c1 | 8e 0a 6e 33 a6 3e 74 05 5c 15 33 12 1d f7 12 20 | db f5 3e 24 ba 17 01 dc a0 95 5b 2c 7b 77 c2 3e | 02 67 33 d7 d6 86 dc 63 50 16 65 87 a1 a9 2b c2 | 68 87 45 fa 03 db 21 3c 23 cd d5 14 5d 40 bf 10 | 6f 14 34 95 51 53 c7 d5 77 b9 67 66 94 9a cd 21 | 08 bb de 59 ba ca 48 d5 21 97 e5 28 87 2d fd 83 | d2 62 24 c7 7c f8 ac 68 7a f8 c3 7f 7d 8d 72 d0 | 9d 64 ef 67 4b f1 5c 24 57 ca c2 b1 9f b6 11 d3 | 07 3e 55 51 fc 73 7a 83 2c 11 87 97 33 3d 5c cd | 48 68 02 58 27 c2 fe 9a f6 51 01 87 b5 32 4d fc | 09 2c 09 a0 1f 82 25 e8 47 96 80 8e 9d 80 b5 a7 | 86 8d 11 ad 04 69 30 3a 7c 49 92 c3 9e 7f 81 14 | 42 d8 62 ef 10 0a 21 b2 bb b9 42 01 9c 86 19 33 | dd 9b 24 b9 8a d5 68 9d ee 00 85 c1 cc df b7 34 | d9 c8 e4 31 8c bd d3 67 7d ad 51 86 db 69 96 5d | 29 00 00 24 f8 43 b0 82 a0 04 df 35 49 ed 46 83 | 05 44 45 f4 4f f6 f3 e1 63 59 5a aa 3f 59 d1 20 | a6 81 b5 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a 8e a2 d1 63 df 73 41 77 f0 6a b9 | 17 c7 13 b6 69 6d 12 29 00 00 00 1c 00 00 40 05 | a8 9c d4 0d d7 3c af a8 56 f5 ab f4 4f 7a 90 fd | 96 a4 e3 47 | libevent_free: release ptr-libevent@0x7fb35c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #140 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7b af c7 ac 06 7e 5a 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #140 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #140 | rejected packet: | 7b af c7 ac 06 7e 5a 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #140: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-195" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-195' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #195 at 0x557d46ade680 | State DB: adding IKEv2 state #195 in UNDEFINED | pstats #195 ikev2.ike started | Message ID: init #195: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #195: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #195; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-195" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-195" IKE SA #195 "road-eastnet-nonat-195" "road-eastnet-nonat-195" #195: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-195 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-195": constructed local IKE proposals for road-eastnet-nonat-195 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 195 for state #195 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2cb90 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #195 | libevent_malloc: new ptr-libevent@0x7fb35c01d920 size 128 | #195 spent 0.174 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-195" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.261 milliseconds in whack | crypto helper 18 resuming | crypto helper 18 starting work-order 195 for state #195 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 195 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 195 time elapsed 0.000977 seconds | (#195) spent 0.983 milliseconds in crypto helper computing work-order 195: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 195 for state #195 to event queue | scheduling resume sending helper answer for #195 | libevent_malloc: new ptr-libevent@0x7fb35403b0b0 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #195 | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 195 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #195 | **emit ISAKMP Message: | initiator cookie: | 37 e6 90 db 14 bc bf 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-195 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b6 53 c9 77 b4 f3 d5 4d 42 00 37 51 2c 1c 68 3c | ikev2 g^x f1 54 0f 7a 55 d8 cb dc 59 bb 2f b5 96 8c 4e d4 | ikev2 g^x 85 27 5a ea f2 a7 4d 9e 5a 6b ee c6 28 a0 d2 57 | ikev2 g^x 71 7a 7b 0b 80 39 ac 27 cd 87 0d ef e4 ef af 3a | ikev2 g^x d6 b3 f6 12 c5 5f 2f d9 cd fb 17 d4 43 5e 16 c4 | ikev2 g^x 87 67 d1 70 07 84 e5 8e 71 91 de 30 59 cc e6 ee | ikev2 g^x 34 fb c0 51 e2 87 5b 7e 3f 08 db 50 ff 54 7a b1 | ikev2 g^x bd cb 77 92 50 41 31 65 47 73 69 2a fd d6 77 f3 | ikev2 g^x b0 89 f6 8e e2 6a 07 fc af 84 ca d3 f2 87 73 27 | ikev2 g^x c4 cf 2d 21 63 f5 8f 71 28 70 95 02 a0 27 ac 78 | ikev2 g^x a4 bb 1e 75 dc be 0d b4 ad 92 30 f8 7c 7f 5d 71 | ikev2 g^x a5 c9 9d 8b 71 f5 b5 68 db 9c 63 56 82 3f 35 f1 | ikev2 g^x f2 81 65 6a 20 3e b0 68 92 e4 10 6f a0 15 ab a8 | ikev2 g^x 72 4d 4d 54 b6 ef 0b 2d 62 75 65 6d be 42 39 3d | ikev2 g^x c4 80 ed ba e2 23 03 5c 4c 11 92 92 a4 9b 70 7c | ikev2 g^x cd 9d 5e 6a ce f4 42 ce b7 88 b0 01 79 41 f3 ce | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9e 21 2f 19 56 de ef 57 88 5d 72 9d d0 e9 ed cf | IKEv2 nonce f1 53 49 64 11 8c ea d8 bc d7 7f b1 97 11 98 9b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 37 e6 90 db 14 bc bf 64 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c3 | natd_hash: port= 01 f4 | natd_hash: hash= be a1 e0 42 82 c4 3c a5 9f 98 67 8d 2c 4b 8d ec | natd_hash: hash= 3b 56 95 d6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data be a1 e0 42 82 c4 3c a5 9f 98 67 8d 2c 4b 8d ec | Notify data 3b 56 95 d6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 37 e6 90 db 14 bc bf 64 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9b 76 ec e0 3b 32 32 e4 22 87 e5 16 97 1d 20 83 | natd_hash: hash= b5 a4 81 66 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9b 76 ec e0 3b 32 32 e4 22 87 e5 16 97 1d 20 83 | Notify data b5 a4 81 66 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #195 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #195: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #195 to 4294967295 after switching state | Message ID: IKE #195 skipping update_recv as MD is fake | Message ID: sent #195 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-195" #195: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.195:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #195) | 37 e6 90 db 14 bc bf 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 53 c9 77 b4 f3 d5 4d 42 00 37 51 2c 1c 68 3c | f1 54 0f 7a 55 d8 cb dc 59 bb 2f b5 96 8c 4e d4 | 85 27 5a ea f2 a7 4d 9e 5a 6b ee c6 28 a0 d2 57 | 71 7a 7b 0b 80 39 ac 27 cd 87 0d ef e4 ef af 3a | d6 b3 f6 12 c5 5f 2f d9 cd fb 17 d4 43 5e 16 c4 | 87 67 d1 70 07 84 e5 8e 71 91 de 30 59 cc e6 ee | 34 fb c0 51 e2 87 5b 7e 3f 08 db 50 ff 54 7a b1 | bd cb 77 92 50 41 31 65 47 73 69 2a fd d6 77 f3 | b0 89 f6 8e e2 6a 07 fc af 84 ca d3 f2 87 73 27 | c4 cf 2d 21 63 f5 8f 71 28 70 95 02 a0 27 ac 78 | a4 bb 1e 75 dc be 0d b4 ad 92 30 f8 7c 7f 5d 71 | a5 c9 9d 8b 71 f5 b5 68 db 9c 63 56 82 3f 35 f1 | f2 81 65 6a 20 3e b0 68 92 e4 10 6f a0 15 ab a8 | 72 4d 4d 54 b6 ef 0b 2d 62 75 65 6d be 42 39 3d | c4 80 ed ba e2 23 03 5c 4c 11 92 92 a4 9b 70 7c | cd 9d 5e 6a ce f4 42 ce b7 88 b0 01 79 41 f3 ce | 29 00 00 24 9e 21 2f 19 56 de ef 57 88 5d 72 9d | d0 e9 ed cf f1 53 49 64 11 8c ea d8 bc d7 7f b1 | 97 11 98 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be a1 e0 42 82 c4 3c a5 9f 98 67 8d | 2c 4b 8d ec 3b 56 95 d6 00 00 00 1c 00 00 40 05 | 9b 76 ec e0 3b 32 32 e4 22 87 e5 16 97 1d 20 83 | b5 a4 81 66 | state #195 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c01d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2cb90 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #195 | libevent_malloc: new ptr-libevent@0x7fb35c01d920 size 128 | #195 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49615.560705 | resume sending helper answer for #195 suppresed complete_v2_state_transition() and stole MD | #195 spent 0.463 milliseconds in resume sending helper answer | stop processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35403b0b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 e6 90 db 14 bc bf 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #195 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #195 | rejected packet: | 37 e6 90 db 14 bc bf 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #195: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a011f0 | handling event EVENT_RETRANSMIT for parent state #184 | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #184 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #184 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49615.580909; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00213 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fd070 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #184 | libevent_malloc: new ptr-libevent@0x7fb35403b0b0 size 128 "road-eastnet-nonat-184" #184: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #184) | 71 40 97 9a 99 00 ff cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 9e 33 f9 05 c0 53 fb 65 12 d0 fd a6 93 df f1 | 7d bc 07 5e 94 4b 97 6f 27 67 0f f1 85 c0 12 45 | 70 43 01 96 7d 01 69 81 8a b0 0b 08 d1 40 54 69 | 08 7f 69 f8 31 5e 9b 37 c2 56 46 05 8a 2c 74 cd | 73 c4 b5 39 bb 8c 81 c4 97 49 18 2c ce 17 a4 56 | a5 b1 98 b5 93 fe 6b bc c2 93 00 1a 7a aa e8 f7 | 9e 16 d8 e6 36 67 49 7e af 2f 60 eb cd f3 b7 6a | 60 d2 41 2c 2b 50 9f c8 44 40 ce 80 81 98 cf 17 | 31 53 e1 d5 34 76 90 8f 6f 17 46 44 c2 a9 25 1a | bb c8 2b 12 0a 1a 41 c9 b5 0e b1 65 5f 47 47 f0 | bf a6 e5 e4 cc d3 34 bc 81 ca de 84 80 2f 52 78 | 36 7b 26 1f 30 98 4d d6 d7 8c 77 eb b9 19 2a e8 | 7d a0 5e 92 74 2d 37 d4 17 8f 23 ce 1e cd 45 d9 | cf f5 6b 81 d5 e3 95 2b bc 84 3e 19 7f 4a db 38 | c7 46 31 2c ab 66 d6 cd 71 a0 bf 63 ef a6 eb 59 | 13 88 4c 39 34 56 d9 d0 92 f8 f4 65 45 ad 6a 55 | 29 00 00 24 b3 65 f5 f0 87 cd d5 8a 91 5d ad e3 | f8 32 68 b3 e0 0d 46 b4 25 a3 92 64 33 fb 91 6e | c0 dc 6f 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 f2 a2 9a 11 9e a6 4a 33 e0 87 52 | 8a c6 6f 7b 74 99 45 a9 00 00 00 1c 00 00 40 05 | 98 85 7b 6c 79 cd cc f7 14 5f 2b 56 dd 51 39 9c | f7 d7 a1 50 | libevent_free: release ptr-libevent@0x7fb34c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a011f0 | #184 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 40 97 9a 99 00 ff cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #184 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #184 | rejected packet: | 71 40 97 9a 99 00 ff cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #184: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c00d120 | handling event EVENT_RETRANSMIT for parent state #88 | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #88 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #88 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49615.589111; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00573 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a30d70 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #88 | libevent_malloc: new ptr-libevent@0x7fb34c035930 size 128 "road-eastnet-nonat-88" #88: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #88) | 4f b4 b9 96 90 ac 87 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 55 7d 2b ef 81 b7 ac 80 5f 94 f2 45 3d 30 4f | 1d db a2 af 47 67 b7 7c be e3 bc 36 9a 72 1e e6 | 4f 47 07 85 4a dc c2 8c 23 63 be 8e ef c5 79 8f | 9f 5c 4f 9d 4f 85 09 c3 d7 cd 09 d7 9c 93 a4 d2 | cb 1f 73 cb f5 4a 96 ce 2b f9 75 2e 3c f9 67 24 | b7 40 01 a2 9a 5a 3a b5 1b 81 51 3d 6c dd 22 93 | a7 84 80 70 90 68 0a 70 88 ae 95 b6 8d ea e4 d4 | 54 cf 85 55 04 a4 94 5d cc ba 3d e2 31 46 75 ff | 7c 75 77 1a 1b 6c e0 fd b6 75 6b 40 9a b7 ac 36 | 39 45 a5 48 a8 96 90 52 cb 62 b2 ca a6 08 23 37 | d2 f9 be 02 8c 54 29 91 80 43 1c 2d 5f 25 44 25 | ff e7 b9 7d 14 3d 11 4a a3 ab 8e 4f b9 9b a1 4d | 91 68 13 50 1e 3b 88 4e ac 27 30 6a c7 2b ef cb | 81 87 56 8d dd bd 93 b9 d2 77 ea ab 8e f7 84 26 | 38 de 93 6d 11 fc f2 e4 c4 b3 df 42 49 8c 39 27 | 12 40 d4 6f db 31 51 71 3a c5 b3 bf 78 b4 72 ae | 29 00 00 24 d0 42 a3 31 c3 ed 67 67 3c 0c 74 87 | e1 18 ba c3 96 b7 23 3a c3 28 fa 83 32 6a f8 22 | c5 3d ce 47 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 13 5d 9d 57 2e de f0 16 54 40 11 | ce e4 63 b7 5f de e1 17 00 00 00 1c 00 00 40 05 | 73 d1 3a 60 f3 dc 99 f7 0c 4b 4c 3e d1 f1 65 ae | 8d f5 93 01 | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c00d120 | #88 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f b4 b9 96 90 ac 87 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #88 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #88 | rejected packet: | 4f b4 b9 96 90 ac 87 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #88: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0669 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8e0 | handling event EVENT_RETRANSMIT for parent state #141 | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #141 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #141 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49615.611467; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003741 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #141 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 "road-eastnet-nonat-141" #141: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #141) | c7 a4 5e d6 85 96 e8 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 5c 64 85 22 7f 26 67 9b 1d d2 dc 77 48 35 3a | d4 3f ae a5 de d9 02 e1 be b1 54 1d 8f 3c 81 66 | 72 af 44 35 86 52 1f 94 d8 67 4f d5 3d aa 9a 28 | b8 7d b2 44 cd ad e4 36 73 fc b7 ff a8 f3 fa 52 | bc bb ec ae b0 14 24 28 e8 98 61 c7 6e 10 46 be | 9e 1b d1 62 7d 6b 63 8d 57 98 39 e0 7a 2b d7 fb | 08 85 91 84 64 96 ca 9e 7d d6 44 71 24 e2 7b d9 | 4e df 37 ef 69 35 3e bf d9 e6 0c fe 44 26 04 4e | f0 05 82 74 b2 9b 24 5e e9 a2 22 8d 25 f4 83 56 | 66 7a 36 9b c2 83 bb 7e 03 9c 77 3b 87 eb 41 c7 | 94 78 c3 88 92 ee d7 85 b7 c9 76 9d e6 b0 56 99 | 3c 23 e2 55 4e f4 22 8d 17 30 9c c5 cd a0 fa a5 | 54 c0 8e f4 5a 2c 24 46 f9 7c 1e 86 1f 7b 3c ed | d6 ba ae a7 70 a2 9b 24 e8 02 bd 30 c2 66 66 44 | 25 e0 d1 5b fc c6 60 e2 9a 7f 9c 7f d3 c2 d2 0d | 71 6b ce d7 9c d1 77 52 aa 1f 4c 8a aa 84 99 be | 29 00 00 24 77 e9 14 43 da cb a0 62 0a e5 af ee | ca 47 6a 87 48 66 6e 70 1f 90 c9 e8 b5 aa eb 33 | 74 97 4a b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 5f b0 2c dc 05 ab ba 7d 8f a9 67 | 57 cd cc b4 50 46 52 bd 00 00 00 1c 00 00 40 05 | 25 fc 66 29 f4 e3 aa bf a8 61 5f 67 dd d5 39 f5 | bb 8c 0c c1 | libevent_free: release ptr-libevent@0x7fb34c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8e0 | #141 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 a4 5e d6 85 96 e8 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #141 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #141 | rejected packet: | c7 a4 5e d6 85 96 e8 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #141: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0681 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a986c0 | handling event EVENT_RETRANSMIT for parent state #171 | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #171 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #171 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49615.614869; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002791 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab7a80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #171 | libevent_malloc: new ptr-libevent@0x7fb34c0180b0 size 128 "road-eastnet-nonat-171" #171: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #171) | 60 ea a0 b8 11 41 67 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 a6 a0 3d a3 d3 f7 3a 92 38 69 11 fc c0 0a e6 | ae 99 13 7e 46 80 4c 8f eb cb 1b a4 6d 5c fc 08 | ec 45 f4 48 c3 e3 73 a8 1a d3 f7 7f 3a 28 95 0f | b3 2e 82 89 be a5 d3 a6 ab 70 83 ad 3e e2 73 a1 | 73 7c b9 be d5 96 dd de 07 cc fe da 6e 65 6b 76 | 25 27 16 21 7c ef 70 24 a4 77 29 aa 15 d7 7b a8 | 16 72 3e d5 01 58 3c 97 7b 78 28 15 2b 7d 70 03 | 64 96 9b 75 19 62 f5 2d d6 23 a9 0d ca a5 9a 70 | a6 bd cc 03 9b 58 60 ee fc 9f 9e d6 00 fa 23 02 | 63 d3 b6 b9 2c b8 b0 66 04 8e 85 03 2d 8a 3b 14 | f1 66 74 61 f6 ab 2b 8f f8 31 4b 0b da 07 ed 98 | a3 08 1a 85 f1 f2 be 38 18 37 9b 13 eb 17 a9 c3 | c0 a5 db c8 dd 9c 88 27 54 50 ba 9a 47 c0 2c 00 | d1 c4 c3 04 be b5 8f d9 f7 25 9c ae 45 27 ee 47 | a2 c2 11 cc 79 aa fd 06 ae ea 3a 65 e0 36 c3 05 | dd d3 e2 dd c1 bd 1f da b7 d1 ff 87 93 0f c5 00 | 29 00 00 24 f4 77 f4 2a e1 ad 87 d1 e0 b8 f3 03 | 93 45 a7 36 54 7e 24 81 6c 5d 13 c9 3a 4c ab c2 | 28 19 06 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 9a 54 5d 74 7c 3e 57 ce 44 f1 6a | b5 dc 40 d6 fc 98 8f 10 00 00 00 1c 00 00 40 05 | ab ff fc 00 2d 34 de 32 ad 3a 53 9d f5 35 ab 6e | 4f ce 82 8b | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a986c0 | #171 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 60 ea a0 b8 11 41 67 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #171 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #171 | rejected packet: | 60 ea a0 b8 11 41 67 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #171: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.073 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4ebd0 | handling event EVENT_RETRANSMIT for parent state #190 | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #190 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #190 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49615.628329; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501652 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a986c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #190 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 "road-eastnet-nonat-190" #190: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #190) | da 8a 0c 65 e6 2b 3c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 54 17 f8 a5 01 f3 68 22 77 c6 18 00 12 b3 14 | 54 3d f4 b3 34 1e fd 72 0e 4d ab df e8 2f e1 56 | d7 6e 5a 40 eb 22 8c 08 69 45 e9 fd 19 98 3c aa | 8d 83 ce d6 37 74 60 c8 87 61 28 d5 63 be 48 e9 | ac f9 f7 e4 f2 02 da 1e ec 22 1e 5a d2 5a 2b 8a | 3b 57 71 3a 73 29 7d d1 21 cb fe 25 7a 4a 44 7a | d3 e0 2e 8b b0 82 19 e0 d0 d4 ad 62 8a eb ad 5f | cd 5f 01 c2 97 9c ca 0a 84 fd e9 c6 24 7d a2 13 | 18 78 86 de 18 44 7c 6e 03 a7 c1 8c f5 10 72 e4 | 18 35 f0 48 fd 3b 9d 06 d6 b2 cc 32 8d c8 ab 02 | 22 2a e1 65 5c 07 67 dd 84 00 eb 6c 69 e6 d9 74 | 15 08 fb 78 e2 63 d8 e3 71 dc a5 a7 be b4 49 92 | ca 4f af 55 e1 5d c5 43 c7 03 58 76 b8 41 c6 a2 | f8 e5 96 26 df 8f 3c ed b5 1d 45 31 66 bd 99 75 | c9 f2 c5 21 dc 35 1b 0a 99 75 5d 5c a4 07 02 4f | 98 82 da 07 a8 27 6d 15 d8 05 50 39 0a b9 0a 99 | 29 00 00 24 f4 39 3c cf b3 b2 13 92 d2 3b 37 9f | 62 32 43 c3 74 37 47 22 30 dc 01 af 01 09 20 fa | 09 9a 8b e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6f a0 3a 65 d8 4c 58 fb ee 8d a7 57 | 94 7e 0d f0 9d 14 5d c2 00 00 00 1c 00 00 40 05 | c2 56 8a f7 34 3a b7 10 07 49 00 4f af 85 84 af | 10 cb 7b 4a | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | #190 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 8a 0c 65 e6 2b 3c 3b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #190 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #190 | rejected packet: | da 8a 0c 65 e6 2b 3c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #190: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0669 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-196" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-196' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #196 at 0x557d46adfc40 | State DB: adding IKEv2 state #196 in UNDEFINED | pstats #196 ikev2.ike started | Message ID: init #196: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #196: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #196; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-196" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-196" IKE SA #196 "road-eastnet-nonat-196" "road-eastnet-nonat-196" #196: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-196 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-196": constructed local IKE proposals for road-eastnet-nonat-196 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 196 for state #196 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4ebd0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #196 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 | #196 spent 0.153 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-196" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.23 milliseconds in whack | crypto helper 7 resuming | crypto helper 7 starting work-order 196 for state #196 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 196 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 196 time elapsed 0.000929 seconds | (#196) spent 0.939 milliseconds in crypto helper computing work-order 196: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 196 for state #196 to event queue | scheduling resume sending helper answer for #196 | libevent_malloc: new ptr-libevent@0x7fb34803b0b0 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #196 | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 196 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #196 | **emit ISAKMP Message: | initiator cookie: | 56 d5 c7 24 09 fd 90 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-196 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 45 8f 70 c3 ed 41 cd d6 d2 1b f8 2a 49 7b d2 65 | ikev2 g^x 1d 48 5c 44 f7 09 ac 3e 9c 08 81 f6 b3 65 8e 9b | ikev2 g^x 4e f9 50 8c c8 e7 7b 20 7c 22 4e ca 64 9d 3b 78 | ikev2 g^x 6f 58 b3 9e 1c 75 62 70 7c 61 ef 34 cb 86 a6 1c | ikev2 g^x 58 51 2c 23 30 92 4a 45 b4 b8 ae 94 76 05 b8 97 | ikev2 g^x 44 53 83 e4 01 1b 12 69 e8 13 a8 21 92 4d 3c f0 | ikev2 g^x 3d 68 d7 2a 32 bb e5 1c b4 56 88 6b 46 1e 40 2b | ikev2 g^x 43 ea 27 d3 55 2f cf 9a 31 8f 09 d3 05 58 fd 61 | ikev2 g^x 42 c4 db 9a 42 0a 57 3b 19 4b c6 5f d6 ea 27 6a | ikev2 g^x 7f bf 49 6f e7 37 63 cd b0 56 7c d1 00 23 b6 75 | ikev2 g^x b5 9d 85 99 73 08 5b 3f 63 22 53 47 75 51 36 9e | ikev2 g^x 7d c3 2d 34 ef d2 c8 dc ed 30 18 e1 fc d9 f1 f0 | ikev2 g^x 6e d9 74 09 8b e8 94 06 ae aa 96 8e cd d8 85 a8 | ikev2 g^x 1d 1c c6 45 d2 df a8 88 f7 4f 9f 49 92 80 ca a3 | ikev2 g^x 24 f7 b2 76 f6 e9 c7 34 75 8f 12 25 2f 88 bf 00 | ikev2 g^x af 80 e2 a0 d5 42 a1 0f 8a 93 9d 2c 68 e7 dc 08 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ed 57 45 ce d5 85 17 38 4f bc 48 45 b8 48 4b 6f | IKEv2 nonce c9 94 96 34 41 c5 a0 9e ee f3 85 65 17 35 60 ad | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 56 d5 c7 24 09 fd 90 a8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c4 | natd_hash: port= 01 f4 | natd_hash: hash= 87 33 d1 79 b1 42 18 cd cb 66 ed 21 50 1a 62 22 | natd_hash: hash= 98 16 96 33 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 87 33 d1 79 b1 42 18 cd cb 66 ed 21 50 1a 62 22 | Notify data 98 16 96 33 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 56 d5 c7 24 09 fd 90 a8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 37 d9 a8 f6 16 ad 1f 94 88 50 6d 18 f9 5d 91 a6 | natd_hash: hash= 7a d6 46 08 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 37 d9 a8 f6 16 ad 1f 94 88 50 6d 18 f9 5d 91 a6 | Notify data 7a d6 46 08 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #196 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #196: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #196 to 4294967295 after switching state | Message ID: IKE #196 skipping update_recv as MD is fake | Message ID: sent #196 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-196" #196: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.196:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #196) | 56 d5 c7 24 09 fd 90 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 8f 70 c3 ed 41 cd d6 d2 1b f8 2a 49 7b d2 65 | 1d 48 5c 44 f7 09 ac 3e 9c 08 81 f6 b3 65 8e 9b | 4e f9 50 8c c8 e7 7b 20 7c 22 4e ca 64 9d 3b 78 | 6f 58 b3 9e 1c 75 62 70 7c 61 ef 34 cb 86 a6 1c | 58 51 2c 23 30 92 4a 45 b4 b8 ae 94 76 05 b8 97 | 44 53 83 e4 01 1b 12 69 e8 13 a8 21 92 4d 3c f0 | 3d 68 d7 2a 32 bb e5 1c b4 56 88 6b 46 1e 40 2b | 43 ea 27 d3 55 2f cf 9a 31 8f 09 d3 05 58 fd 61 | 42 c4 db 9a 42 0a 57 3b 19 4b c6 5f d6 ea 27 6a | 7f bf 49 6f e7 37 63 cd b0 56 7c d1 00 23 b6 75 | b5 9d 85 99 73 08 5b 3f 63 22 53 47 75 51 36 9e | 7d c3 2d 34 ef d2 c8 dc ed 30 18 e1 fc d9 f1 f0 | 6e d9 74 09 8b e8 94 06 ae aa 96 8e cd d8 85 a8 | 1d 1c c6 45 d2 df a8 88 f7 4f 9f 49 92 80 ca a3 | 24 f7 b2 76 f6 e9 c7 34 75 8f 12 25 2f 88 bf 00 | af 80 e2 a0 d5 42 a1 0f 8a 93 9d 2c 68 e7 dc 08 | 29 00 00 24 ed 57 45 ce d5 85 17 38 4f bc 48 45 | b8 48 4b 6f c9 94 96 34 41 c5 a0 9e ee f3 85 65 | 17 35 60 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 33 d1 79 b1 42 18 cd cb 66 ed 21 | 50 1a 62 22 98 16 96 33 00 00 00 1c 00 00 40 05 | 37 d9 a8 f6 16 ad 1f 94 88 50 6d 18 f9 5d 91 a6 | 7a d6 46 08 | state #196 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4ebd0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #196 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 | #196 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49615.637038 | resume sending helper answer for #196 suppresed complete_v2_state_transition() and stole MD | #196 spent 0.469 milliseconds in resume sending helper answer | stop processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34803b0b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 d5 c7 24 09 fd 90 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #196 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #196 | rejected packet: | 56 d5 c7 24 09 fd 90 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #196: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2e150 | handling event EVENT_RETRANSMIT for parent state #185 | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #185 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #185 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49615.648245; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002361 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8e0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #185 | libevent_malloc: new ptr-libevent@0x7fb34803b0b0 size 128 "road-eastnet-nonat-185" #185: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #185) | 94 c0 c2 c7 3b 30 ec 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 10 80 e8 ac 1b 57 a4 b7 f2 12 9c c9 c8 96 12 | d8 b4 37 f7 f8 c8 3c b7 f2 86 fb 6d bc 61 da 40 | 39 a4 09 f0 8f 66 50 7a 6b 75 22 97 37 a4 94 4e | a8 5c 5f 80 9b d3 2e fd ee fe 03 91 38 cd a2 e4 | 3e 5d b4 2b f3 14 af ae 26 82 7e 4b 88 39 37 81 | 82 aa 3c c6 ab ba 4d b3 20 34 8d 80 3d de a0 ad | 42 64 df 60 e3 cc 41 7d eb 1f a9 4c f0 d1 47 57 | 07 35 a5 e9 25 89 b5 0e 8b 91 92 1f 2f 09 b9 ab | 46 f1 69 33 6d d8 ef 90 01 9f 20 97 28 19 d8 4c | ce 9d c5 c8 74 d2 ec a5 dd e6 34 68 1e 8b 44 b9 | 5e 3c 90 76 95 68 8e 41 20 32 dd ca 48 f2 30 6e | af 87 2d 28 a1 ad c2 a1 66 51 1d 16 88 02 4d 4b | 75 a2 59 e4 ff 63 fb 70 3e 65 bb 8f d3 36 fc 97 | bb a3 6c c7 eb b7 6a f4 47 9b e0 12 1b e1 cc 32 | 68 f4 57 ff 85 75 10 4d 46 e9 36 6a ae db 06 a6 | 0f 02 20 5f 93 d8 c0 d3 99 19 3c 12 5e d8 75 16 | 29 00 00 24 d5 ca 6a 54 4d eb c2 30 7e c2 c0 88 | f4 64 53 65 cf cb b4 99 9a a7 3b 19 af 88 ec 6a | ae 0e 11 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a b7 31 38 16 04 07 33 64 be 6b 23 | be e3 1c e2 4f 4e 6e d8 00 00 00 1c 00 00 40 05 | c2 92 61 e3 4d 3a b1 c0 20 50 44 2b db 6e 80 18 | c6 ee 39 60 | libevent_free: release ptr-libevent@0x7fb35800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2e150 | #185 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 c0 c2 c7 3b 30 ec 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #185 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #185 | rejected packet: | 94 c0 c2 c7 3b 30 ec 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #185: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5f0d0 | handling event EVENT_RETRANSMIT for parent state #89 | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #89 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #89 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49615.653591; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004278 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2e150 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #89 | libevent_malloc: new ptr-libevent@0x7fb35800cf80 size 128 "road-eastnet-nonat-89" #89: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #89) | 9d 5f d8 02 80 b8 e7 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 e3 b9 05 71 34 7d 24 1f b0 78 15 60 77 1c 08 | 9e 6a 97 b0 4c 89 e3 5a dc c3 13 ad 84 6a 5e aa | fd ca 45 35 ba 35 de 44 be ce 11 ea 86 29 6c 73 | 0b 7f 74 63 63 d2 81 70 21 25 9e 55 c0 3c 14 62 | da 13 e5 79 f3 ac 65 c2 4c 57 6a e3 37 8f 5c 04 | 8a 01 65 69 49 a9 46 40 f2 f3 a8 b3 1a af d6 79 | f9 34 6f 04 49 9e f3 10 ca 6b d5 6f d3 e5 36 7a | c9 32 cd 69 df 91 08 6d 35 ec 78 52 d9 57 09 e3 | f5 63 af 57 d7 93 38 af ff 2c e8 36 87 e0 92 43 | f0 f6 97 f6 50 a5 d2 4c 16 d1 d2 d2 96 90 50 82 | 09 99 3b fa 59 66 b4 48 e1 b1 0d 01 76 3d b4 c2 | b2 4d a5 5c 8a c7 cb a9 bb 09 56 bf 65 e9 da 28 | 24 dc 22 59 97 49 92 d0 c5 d3 9b 2b da 0b d5 26 | df 68 b6 c9 f1 0d 58 08 b0 7e 26 ce 7d 24 b1 d2 | a7 c4 2d 42 0c 8d 57 57 7b 42 5d d8 f7 b9 c8 ba | e6 b0 9d 60 5a 01 d8 33 e3 a6 9f f1 3b 81 e4 a8 | 29 00 00 24 50 a5 b1 4c 6d 18 8a 79 34 52 af 57 | 9c b8 99 4d b9 e7 5c 74 bb 7f a4 8c e5 f5 2c a5 | 8d 6b 1d 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 41 ee 04 aa 3d b0 21 0a d0 67 73 | 50 8d e2 01 ce 26 f9 77 00 00 00 1c 00 00 40 05 | 7b 60 8a 47 58 c7 18 57 64 ec a9 8e 15 07 49 b1 | ed 9e c4 1b | libevent_free: release ptr-libevent@0x7fb37c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5f0d0 | #89 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d 5f d8 02 80 b8 e7 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #89 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #89 | rejected packet: | 9d 5f d8 02 80 b8 e7 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #89: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a49450 | handling event EVENT_RETRANSMIT for parent state #142 | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #142 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #142 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49615.674949; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005236 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5f0d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #142 | libevent_malloc: new ptr-libevent@0x7fb37c0251c0 size 128 "road-eastnet-nonat-142" #142: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #142) | 41 39 64 14 10 77 e9 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc f2 be 7b 98 10 67 76 c4 71 20 94 23 de f4 7b | f8 c4 af 24 ce 1c a4 2e 78 f9 2e 3f 92 4d 95 da | b0 24 e9 98 5b 94 79 3a a7 65 db 91 8d 98 6f 60 | 39 37 f9 9a 0b 2c 5f 0f 2f ab bc 06 c4 26 ad 3a | cb 21 02 45 52 b2 d1 fd f5 7c fc a1 d2 ea 0e b1 | ba 62 e9 1e b2 ad cc 0d 27 c3 3b 69 ca 23 50 32 | eb 22 0c cc d3 fb 5f db 9c 9b 31 50 db f4 03 47 | 71 96 ad b4 c6 fc 17 71 7e b3 b0 ab 55 4f e2 51 | da 27 48 0f fb 5a 5c 14 f2 9f a1 0b bc 57 8c f8 | af d3 b0 d4 6a 72 47 34 c3 ab 52 90 fc 49 ad 86 | 46 90 a0 10 2b fd 92 3d 6b 38 ac d2 f1 fb fa a7 | 40 39 9e cd 87 10 91 66 2e ab 47 10 a6 88 c0 52 | d8 c9 3f b4 b3 d0 6c 91 b2 0e 49 7c 2a dc 94 d8 | 21 4c c9 df 3c b1 a2 d4 d4 f0 4b 25 d9 08 87 46 | 22 c7 0a 5a cc 6c a2 0b 4a 09 99 09 fb f2 2e 33 | 66 ad 2f c0 16 9e 3c 6f 99 46 27 79 f7 75 88 d3 | 29 00 00 24 1d 1b 1c 65 cb f5 ff f0 c9 00 69 e9 | d1 b3 22 15 24 4a 7b cc a6 4c 2e 0b ef 42 21 b2 | d1 d6 06 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 3a fc 83 97 ab 17 41 58 12 a1 f9 | 48 2f 13 f0 7a 91 16 3d 00 00 00 1c 00 00 40 05 | 13 50 5d f0 78 ea 60 59 51 2f a8 23 2c 7c d0 1f | 4c a0 b1 5b | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a49450 | #142 spent 0.194 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 39 64 14 10 77 e9 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #142 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #142 | rejected packet: | 41 39 64 14 10 77 e9 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #142: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0491 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c7c0 | handling event EVENT_RETRANSMIT for parent state #172 | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #172 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #172 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49615.68243; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002613 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a49450 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #172 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 "road-eastnet-nonat-172" #172: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #172) | 47 43 39 2e 38 d9 e4 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 65 17 b4 48 89 eb 1e b2 78 b8 1e 15 3a 4a a1 | a2 3a fd 43 76 59 59 a1 75 7a 16 45 66 68 dc 97 | f3 bc ee bc d4 e0 57 41 47 eb 59 3e b3 f4 36 c1 | 10 8f 59 fc 57 3a 37 29 71 bf ce 33 91 c2 37 65 | 5c 9c 9f 71 6e b0 1d 6c 6c ed 90 b3 bd fc 22 6b | 94 91 98 6d a1 2f c5 a8 ca 58 04 fa 18 79 03 0a | 3e 27 a9 a6 f4 08 b2 f5 32 35 e8 b7 83 a3 4b c7 | 82 d2 5d ed b4 7c af 9d be b8 23 49 75 bb 7f 62 | 0e b3 38 1c ec 9d 39 3b f4 04 b7 d0 93 52 70 e6 | 23 bb 4d 7f 7c 2a 5e ec cb 0d 74 24 7b 07 99 42 | 6c 43 eb 64 ec ce f6 41 88 91 d0 50 22 25 43 54 | aa b8 db 3d b2 e3 bd ee 47 71 69 be 83 a3 d8 90 | 99 79 30 84 6a ac 04 1b 20 13 06 10 f1 e1 43 b3 | 50 14 89 62 82 b4 57 81 1e 80 23 23 72 24 b5 3b | 66 27 db 5a d9 e0 9f 07 96 df 6b d0 43 88 1d 6c | 19 73 59 ba d5 80 1f b5 38 2f da 5f 85 a1 ce d0 | 29 00 00 24 54 d0 27 67 15 cd c6 d9 d3 f4 1c e0 | 4e b2 db 81 71 2f 53 78 96 2e b8 d9 e9 fc be ad | 28 73 0e 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 71 7f 76 8f b4 09 cb 9b d9 d3 22 | dc b5 61 93 71 75 88 d5 00 00 00 1c 00 00 40 05 | df a3 69 ab bf ad 58 61 9f ed 54 03 7c e8 ac 70 | c8 e7 d2 fb | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | #172 spent 0.177 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 43 39 2e 38 d9 e4 43 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #172 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #172 | rejected packet: | 47 43 39 2e 38 d9 e4 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #172: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0914 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-197" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-197' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #197 at 0x557d46ae1200 | State DB: adding IKEv2 state #197 in UNDEFINED | pstats #197 ikev2.ike started | Message ID: init #197: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #197: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #197; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-197" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-197" IKE SA #197 "road-eastnet-nonat-197" "road-eastnet-nonat-197" #197: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-197 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-197": constructed local IKE proposals for road-eastnet-nonat-197 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 197 for state #197 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9c7c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #197 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 | #197 spent 0.175 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-197" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.26 milliseconds in whack | crypto helper 8 resuming | crypto helper 8 starting work-order 197 for state #197 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 197 | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 197 time elapsed 0.000919 seconds | (#197) spent 0.852 milliseconds in crypto helper computing work-order 197: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 197 for state #197 to event queue | scheduling resume sending helper answer for #197 | libevent_malloc: new ptr-libevent@0x7fb34c03b0b0 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #197 | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 197 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #197 | **emit ISAKMP Message: | initiator cookie: | 76 fd 06 22 f8 72 39 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-197 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ff 68 ad 96 cd 76 be 78 ca de ba cf 7d b8 d2 27 | ikev2 g^x eb 47 3d ab 5c da 69 f4 c0 aa ef 37 1d c8 bc 64 | ikev2 g^x b3 77 c8 06 c7 c1 ca 6e ba 13 a5 88 a0 2f 7d 28 | ikev2 g^x 77 76 19 e0 b9 08 19 f4 ea 19 57 8a 4a c5 51 64 | ikev2 g^x b2 b3 06 1d b7 55 89 e3 2f 55 c2 0a 68 16 ae bf | ikev2 g^x bc 84 d6 24 e3 0d 3a 6d 7f b0 26 cf fc 83 69 6f | ikev2 g^x 06 6c 19 78 05 aa 1a a7 a3 53 01 3e 4f 01 0c e2 | ikev2 g^x b6 b8 5e d8 44 74 c4 4a 7b 03 78 a3 0d 18 93 01 | ikev2 g^x ca 83 a7 98 02 8f 9a c5 fb 52 4a 95 fa 85 65 9f | ikev2 g^x 48 a4 30 21 ca 8f d8 e0 98 f5 f9 49 2a 0a 5a b1 | ikev2 g^x e0 a0 a3 25 65 8b 86 36 1d 17 ff 3c 76 35 24 e3 | ikev2 g^x b6 f7 d8 e5 22 2f 0d 80 58 07 89 c1 b8 b9 b6 a3 | ikev2 g^x ac a9 f3 74 55 c9 1c c7 ef 2f b9 00 be f9 d3 c9 | ikev2 g^x 30 e9 ef 92 c0 ce 36 02 ea 19 c8 d7 f7 c5 6a 1c | ikev2 g^x b8 72 5b 69 21 d3 b8 ca 13 78 68 f5 5e 6f 80 64 | ikev2 g^x 1c aa ea 24 03 ee 29 9b c1 bb 83 e4 a6 7c 10 08 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 74 4f 18 14 83 36 22 20 12 7b 44 86 f2 c1 e1 0b | IKEv2 nonce 40 a8 83 e6 1a 42 e2 88 a2 98 21 31 2c b2 85 92 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 76 fd 06 22 f8 72 39 86 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c5 | natd_hash: port= 01 f4 | natd_hash: hash= 09 2f 89 09 b5 52 02 b8 23 bc 44 51 94 1d 2d 47 | natd_hash: hash= 4e ed 65 d6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 09 2f 89 09 b5 52 02 b8 23 bc 44 51 94 1d 2d 47 | Notify data 4e ed 65 d6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 76 fd 06 22 f8 72 39 86 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 73 fc 3d fb 5c fa a5 ca c9 53 fd 67 5c 67 b8 86 | natd_hash: hash= 11 c4 a6 88 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 73 fc 3d fb 5c fa a5 ca c9 53 fd 67 5c 67 b8 86 | Notify data 11 c4 a6 88 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #197 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #197: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #197 to 4294967295 after switching state | Message ID: IKE #197 skipping update_recv as MD is fake | Message ID: sent #197 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-197" #197: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.197:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #197) | 76 fd 06 22 f8 72 39 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff 68 ad 96 cd 76 be 78 ca de ba cf 7d b8 d2 27 | eb 47 3d ab 5c da 69 f4 c0 aa ef 37 1d c8 bc 64 | b3 77 c8 06 c7 c1 ca 6e ba 13 a5 88 a0 2f 7d 28 | 77 76 19 e0 b9 08 19 f4 ea 19 57 8a 4a c5 51 64 | b2 b3 06 1d b7 55 89 e3 2f 55 c2 0a 68 16 ae bf | bc 84 d6 24 e3 0d 3a 6d 7f b0 26 cf fc 83 69 6f | 06 6c 19 78 05 aa 1a a7 a3 53 01 3e 4f 01 0c e2 | b6 b8 5e d8 44 74 c4 4a 7b 03 78 a3 0d 18 93 01 | ca 83 a7 98 02 8f 9a c5 fb 52 4a 95 fa 85 65 9f | 48 a4 30 21 ca 8f d8 e0 98 f5 f9 49 2a 0a 5a b1 | e0 a0 a3 25 65 8b 86 36 1d 17 ff 3c 76 35 24 e3 | b6 f7 d8 e5 22 2f 0d 80 58 07 89 c1 b8 b9 b6 a3 | ac a9 f3 74 55 c9 1c c7 ef 2f b9 00 be f9 d3 c9 | 30 e9 ef 92 c0 ce 36 02 ea 19 c8 d7 f7 c5 6a 1c | b8 72 5b 69 21 d3 b8 ca 13 78 68 f5 5e 6f 80 64 | 1c aa ea 24 03 ee 29 9b c1 bb 83 e4 a6 7c 10 08 | 29 00 00 24 74 4f 18 14 83 36 22 20 12 7b 44 86 | f2 c1 e1 0b 40 a8 83 e6 1a 42 e2 88 a2 98 21 31 | 2c b2 85 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 2f 89 09 b5 52 02 b8 23 bc 44 51 | 94 1d 2d 47 4e ed 65 d6 00 00 00 1c 00 00 40 05 | 73 fc 3d fb 5c fa a5 ca c9 53 fd 67 5c 67 b8 86 | 11 c4 a6 88 | state #197 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9c7c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #197 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 | #197 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49615.719504 | resume sending helper answer for #197 suppresed complete_v2_state_transition() and stole MD | #197 spent 0.529 milliseconds in resume sending helper answer | stop processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c03b0b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 fd 06 22 f8 72 39 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #197 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #197 | rejected packet: | 76 fd 06 22 f8 72 39 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #197: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338005860 | handling event EVENT_RETRANSMIT for parent state #191 | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #191 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #191 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49615.726725; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500269 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a011f0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #191 | libevent_malloc: new ptr-libevent@0x7fb34c03b0b0 size 128 "road-eastnet-nonat-191" #191: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #191) | 85 8f 6a 80 de be 76 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 47 0f 49 e8 87 b7 e4 13 ff fb 5d 9a 22 17 d1 | a7 da b3 32 4a c2 68 c6 3d 29 6b b9 0a 47 72 fb | 44 ba cf 07 42 83 b0 15 52 d5 79 a1 0a cc fd 8c | 03 5d 92 9f bc f2 7f 7a 58 36 93 f8 ff cd 46 92 | 33 75 4c e4 12 5e a1 f8 b3 1e 61 09 80 4a a1 c5 | 5a c7 19 d2 44 74 1d 5d 1d 57 21 f5 83 fe 20 06 | 89 ca 32 09 05 22 51 7a bb d7 0f b2 89 a9 0b 74 | 7c f9 0e 07 47 37 47 69 61 d8 9b ef fb c6 bb 4f | 6f e9 47 2c 3e ce 0c c7 87 a3 c6 a6 6c 56 d1 3e | ff a6 a9 4b d0 b7 79 88 c1 3f b4 9e fc 37 5c 19 | 1d 93 d7 b8 ac 50 69 85 b1 c4 53 e5 5e cc 86 e1 | 99 0a 5b e0 3c 4f fe 9e c8 dd 39 c2 94 6f 36 d5 | 9a 4e 4e dd b3 93 c7 8c d1 85 48 7f 16 2c 4f fb | 42 93 63 f4 95 ff 92 cb fb d6 5a 99 77 ab b8 13 | 67 d4 bf 16 1e 20 38 f7 7c 3d 2c 7c ef 50 6c 66 | 06 df 76 dd 94 55 30 cb 6c f9 4c e3 a8 ba 0c 19 | 29 00 00 24 f0 4e f3 f0 90 16 59 02 63 21 11 a3 | 11 30 40 08 3c fe e4 63 ec 70 ae b0 94 4f 51 4b | 97 b6 49 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c cc b1 ee ce 47 be 7b b0 c4 63 84 | 75 d0 08 1a f9 42 67 0a 00 00 00 1c 00 00 40 05 | 29 7b 9f b8 2f b5 a8 ce c6 6c 30 7d a4 05 33 b3 | 99 4c ae 49 | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338005860 | #191 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 8f 6a 80 de be 76 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #191 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #191 | rejected packet: | 85 8f 6a 80 de be 76 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #191: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0665 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a24730 | handling event EVENT_RETRANSMIT for parent state #186 | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #186 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #186 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49615.731233; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002915 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #186 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-186" #186: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #186) | 89 a9 38 aa a6 c0 30 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc fc 7f 3d ba 5a de bc 76 c2 c4 f8 68 37 1f ff | ca 8e ea 53 55 b1 47 97 0b 37 3b 65 fa 61 e7 dd | 35 17 7f ab 01 8e 38 9f 4b 7f 31 31 92 f1 ba bb | d0 06 33 61 10 0b fa 86 b8 ef 01 c3 cf b1 bb 29 | 2f 2d 37 13 10 34 87 1c 1a 2a fa 97 52 ab 57 63 | 92 bf 2b 4d 93 56 f2 e9 12 3c 46 24 50 0a 19 24 | b2 fa e0 6c 1d 91 6c 12 4e 27 c3 47 94 7d 6e 37 | 39 fc 81 56 89 ca 68 6b ce 06 f5 e3 55 1e 76 a1 | 72 bf 58 f7 9a b2 03 67 a0 61 c5 e9 74 36 67 70 | b9 96 14 a2 56 cb b9 33 ac 90 e3 4f 5c 75 ef 3c | 0e 13 a9 08 94 45 0a e0 b9 1a 9c 47 5c ef 62 4f | 55 46 d5 a5 09 5b 68 73 3a 25 4c 57 99 05 2a 57 | 57 52 51 7e 0f b6 14 9f 14 b0 d1 cf 63 29 63 a1 | 49 60 4a 12 aa 1e 1e 0f 3e 32 25 9c d8 71 75 aa | 14 8e 9d fc 55 96 cf 4d 35 00 a5 a7 02 46 8a b7 | 5a f6 88 8a 4d 78 6c e2 1c 82 47 88 0b 3b 1c 06 | 29 00 00 24 d4 45 d6 30 bc fb 2b aa 5c 8e f3 b7 | 0c 17 f8 b2 59 80 d2 e0 0c b8 b9 7f 67 b9 de e9 | d9 5a 25 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 68 b4 19 b5 e8 c7 d6 3c c7 30 38 | 5a e1 45 af bf 1b f1 0b 00 00 00 1c 00 00 40 05 | db 71 7b 2e 3b 5f 62 cf 6c 1d 8c 60 1b 08 38 c5 | 84 d6 4e b5 | libevent_free: release ptr-libevent@0x7fb36403ae90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a24730 | #186 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 a9 38 aa a6 c0 30 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #186 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #186 | rejected packet: | 89 a9 38 aa a6 c0 30 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #186: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0649 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a88140 | handling event EVENT_RETRANSMIT for parent state #90 | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #90 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #90 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49615.740593; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004941 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab90c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #90 | libevent_malloc: new ptr-libevent@0x7fb36403ae90 size 128 "road-eastnet-nonat-90" #90: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #90) | 26 95 92 02 0c 74 14 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 ed e3 a8 eb 0c e2 00 1e b8 30 77 f5 0e ad ce | 65 c1 45 a9 f8 d6 59 16 4d 14 6e d4 77 5e 81 5d | e4 5a fa df cb d1 e9 b4 fb 7a 1b 94 96 f5 cd a1 | 92 48 08 b0 94 02 60 49 2d a3 e6 bd 87 20 3a b6 | b3 a4 42 54 6e e3 59 4f 33 f7 d9 14 23 f3 be 46 | 0e 6a b0 16 f3 25 4c 11 1c 90 dd a1 d3 04 dc 69 | 8d 39 0c 51 5f 83 72 cb 93 87 70 c9 f5 3d e0 2a | c5 11 3c 75 bc 46 e8 c6 f5 45 c5 bc bb 53 d8 9c | 7a ab 11 6e 8b 56 f1 6e cd 93 8a 23 e4 3d ba 8e | f3 e8 36 9d 53 65 3b 19 f4 e3 cc f3 54 92 3e af | 1e ea f7 7a 71 af d2 c7 14 e2 2f f0 39 fe 17 bf | 5f 5e bd 3d 44 b3 a2 13 36 c4 88 da f8 e8 06 a9 | 63 d0 49 96 b9 8b b5 05 47 2d f0 7c f0 b7 4b a3 | d9 0f 59 ad 42 e6 a2 62 85 25 36 ae 56 68 a9 08 | 18 48 13 b3 3d 8c 24 fd 03 b0 13 b0 fc 3c f6 fc | 7b 2f 36 dc 82 d7 51 c4 8b bc 56 3e 48 7c ce 7f | 29 00 00 24 7b f2 d7 97 09 c8 65 d1 69 47 34 b1 | 55 8b 56 a2 4a 71 ee 64 d5 6c 65 05 c4 2c 51 b4 | b0 ab 0f 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 4b f3 32 75 d7 ef f4 06 67 91 40 | 71 93 9a 6d f5 fe b0 cc 00 00 00 1c 00 00 40 05 | 99 8e 72 1b 4f e3 a6 e8 23 e7 c4 0e ce 5c a4 3c | cd e1 15 1b | libevent_free: release ptr-libevent@0x7fb38001abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a88140 | #90 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 95 92 02 0c 74 14 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #90 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #90 | rejected packet: | 26 95 92 02 0c 74 14 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #90: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab39c0 | handling event EVENT_RETRANSMIT for parent state #173 | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #173 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #173 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49615.746063; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004308 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a88140 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #173 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 "road-eastnet-nonat-173" #173: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #173) | a3 dc 1a aa b2 53 81 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 50 c6 a8 2b 15 44 29 7d 0a e3 39 95 9c 54 98 | 15 94 31 dc b2 f4 dc 06 12 a0 ff 21 13 48 30 95 | af bf 2b b8 09 10 1f 12 f1 ba 4e d2 4d c9 b1 a8 | 05 1a 20 e3 76 d4 0d 6b 38 00 2d 67 2b 07 73 be | a7 20 4c aa b8 f7 39 95 13 6d ae b6 ef 79 3a 33 | 8d e1 63 74 10 aa 27 63 ae 0f b0 2c 9f a5 74 21 | 20 ef 3b da 07 cd e1 2a ac 84 10 e1 eb 87 c2 5c | 8c 49 b1 a8 55 4a 0b c6 97 48 c7 fa 85 87 f0 7a | d7 45 9c 5f 2a c6 38 4c 4e a1 54 1f 2a b5 2e 49 | c6 5b 7a b8 69 98 a8 6a 03 80 1c 7f 20 55 e9 fd | 67 3c d3 ce e1 0d bb 8d 6b d2 95 4c af 6b 27 f3 | df f3 c1 d1 42 37 39 82 9f 58 eb 0d c5 ad bb 97 | 84 ff 4d 8a ba d9 60 19 d6 8e a0 cf fa 4d d0 49 | 61 07 20 ea f9 3b 35 e5 ef 25 c3 9f 36 d2 2d 11 | 5f 51 ff fc 25 f0 0e 63 2f a3 a3 cd af f0 c5 be | 34 51 97 11 a8 5a bf 5a f6 22 be 55 c5 08 d3 d9 | 29 00 00 24 12 84 f7 8f dc 17 04 fd a9 ee 45 ef | 2f aa ad ed 39 8e cd ff 76 be dc 7b d9 a9 2b e6 | 08 21 dc 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 b7 38 fa 70 81 30 71 1e 17 26 ac | fb ca c9 c3 02 40 69 eb 00 00 00 1c 00 00 40 05 | 47 2a 00 7e f6 06 aa e7 bc a5 be 89 f2 8d 4b b1 | 1c ba 94 b3 | libevent_free: release ptr-libevent@0x7fb340030080 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab39c0 | #173 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aba600 | handling event EVENT_RETRANSMIT for parent state #143 | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #143 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #143 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49615.746261; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00411 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab39c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #143 | libevent_malloc: new ptr-libevent@0x7fb340030080 size 128 "road-eastnet-nonat-143" #143: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #143) | fe 08 8f c1 30 76 36 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 59 10 0a 33 69 60 29 ec cb 88 e8 3a c1 e5 55 | 26 67 1a ec 62 9e 8e 22 6f b0 d9 0b 9d f1 88 4a | e6 aa 92 54 ef 0d ca 48 fc de 93 8e cc 1b be 9e | 2a 5e f3 2a 08 3f 42 43 4c 7d 9b 8f 28 00 df 48 | e8 21 87 a4 f6 50 fb f0 b0 17 a4 67 51 7c 94 f5 | bf 3d 99 c9 85 3f 6a 47 12 df 61 eb 04 e7 9a 6c | b7 d5 b3 00 34 48 70 01 04 f1 38 e6 2a 1b 58 fe | 45 c8 88 15 fe fd f8 a1 17 d4 b0 e0 da 11 1c 39 | ad d0 8c b8 02 34 e9 cc d8 17 f6 f2 94 8e c1 9b | bc 9e 9d 32 92 5b 2a 34 cd 6a fb 2e 20 96 68 57 | 5b d5 8b 51 c6 02 26 d3 9c 0f 2f 12 c2 48 e7 4a | 4a 0b 12 1b 9e 56 b5 85 4d d5 b2 31 1e ed 3e 7b | 36 b4 c3 2a eb a3 dd fa 18 8b db b6 6e 6f 26 25 | d4 07 3d fa df 09 23 4b f0 61 a0 e2 e7 88 89 b7 | 4a 08 a7 b8 23 da c7 50 cb 24 82 e1 9d bc ac 0c | ad 50 25 66 22 31 ab bb bb 61 7d f2 14 fa 8e 17 | 29 00 00 24 5c 1f 93 ac 9c d9 6d bc 1c 83 06 35 | 6d 1c ce da 8c 6b 1d 7b a8 23 6f c9 2c 64 35 22 | c8 0a 79 63 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 3f e0 89 56 6b 89 d9 2f e3 34 a5 | 92 0a 7f a5 70 51 be 33 00 00 00 1c 00 00 40 05 | 8d 31 d1 99 a4 16 d7 c5 96 20 51 29 c7 9b 80 8c | b7 4b 38 13 | libevent_free: release ptr-libevent@0x7fb35c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aba600 | #143 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 dc 1a aa b2 53 81 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #173 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #173 | rejected packet: | a3 dc 1a aa b2 53 81 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #173: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0662 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 08 8f c1 30 76 36 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #143 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #143 | rejected packet: | fe 08 8f c1 30 76 36 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #143: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0557 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e5ca0 | handling event EVENT_RETRANSMIT for parent state #187 | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #187 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #187 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49615.796145; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001913 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aba600 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #187 | libevent_malloc: new ptr-libevent@0x7fb35c035930 size 128 "road-eastnet-nonat-187" #187: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #187) | e7 c9 b3 98 5a b5 d8 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 8c 48 13 ec 18 80 1b 32 77 ec 9e 3b 86 33 3b | 02 ed ce 45 9e d1 07 07 3e bc 97 2e 75 42 14 66 | 03 ce bf d6 11 7b 13 df d2 31 59 70 fe 3e 83 b2 | 64 79 15 03 06 38 db 20 68 31 b1 be e0 b0 81 7d | 4e ac bf 91 07 33 90 db 11 13 bd 16 b3 19 bb 2f | bd 78 ea 08 d7 04 61 29 46 e0 b0 be 88 fb b6 99 | 78 ba 8a fa f7 9f 36 82 a5 d0 b5 cc 15 77 46 bf | 6f 96 e3 0e c4 42 db ac 87 dc 33 da 45 8d 53 39 | 47 ad bd 32 b7 e2 e1 e0 66 2c 6d db 19 28 b7 a9 | b4 a9 eb 1e eb 6f ee c7 40 8b 38 5d 63 81 df 4c | ca 8e 71 2d f6 ed 35 fe b2 fe 7e cb 56 c2 0b db | 35 33 69 6f 1e 16 e5 63 9f 75 fa ec 8a 49 49 95 | 1a f3 8c 29 d9 10 61 09 99 f1 00 c7 a8 23 e7 4f | 74 f2 03 0e 72 27 59 cb 0b e6 eb fe 8d cd 75 0f | 66 f2 35 88 c0 48 17 b6 36 94 37 a8 a7 99 a0 7a | 46 3f c8 7b 62 bc 09 7b 66 12 f0 77 17 2a c3 df | 29 00 00 24 92 ee 3c 64 04 c9 f4 27 93 49 ca cc | 80 d7 5b 2f 40 c6 99 75 47 bf 36 6e b0 fd dd e8 | 14 05 72 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e d3 6f 6b 08 b5 24 1b c7 b0 97 c1 | 57 a8 5f 57 16 36 48 8c 00 00 00 1c 00 00 40 05 | 70 ae b7 c1 13 54 ea fb c0 86 88 d6 98 09 04 e8 | dd f9 c2 0b | libevent_free: release ptr-libevent@0x7fb37002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e5ca0 | #187 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a77850 | handling event EVENT_RETRANSMIT for parent state #192 | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #192 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #192 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49615.796342; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499747 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab2380 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #192 | libevent_malloc: new ptr-libevent@0x7fb37002a950 size 128 "road-eastnet-nonat-192" #192: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #192) | c8 ff f4 e6 c7 17 a0 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 d3 4a 60 f3 6b 7c bf bf ce 75 aa 6b ec f0 aa | 6f fd 60 63 46 fe 0f ab c7 68 02 df c4 c6 ca 90 | 76 3b 3d fe 56 bf ba a8 ba d0 ca f7 0b 74 9f c5 | d1 05 87 00 01 63 f1 b2 af 9b 1a 75 92 cd 23 75 | 4b c9 10 79 b9 97 80 8d 36 ac 73 a4 c7 b8 fd cc | b1 38 24 08 46 20 a1 f7 27 44 94 85 0d d1 c0 73 | 03 9e 85 e9 52 56 70 2c 82 87 11 d5 67 bd 17 0b | b7 79 e5 dd 43 5b 11 13 e5 80 26 ae 8c 3b 5c 3e | 39 de 54 5e 94 90 b6 94 bf 91 dc dc 3a b0 dc 33 | c2 af e8 1e 41 35 52 7c 14 9d d3 2a 93 8c 0c 2f | 4c dd 47 e3 33 95 7f 32 01 a2 12 1d 55 d6 96 ba | 80 04 ad 84 ae 69 4d 77 46 16 b8 c1 14 67 ff 90 | 15 d3 6f 27 f5 ca 1c 28 65 98 cb 29 af 5a 3d 4d | 38 de 5a e8 93 6e 36 0e 60 ea e1 05 60 eb 23 cb | 78 44 37 ea 66 63 22 ea 85 48 d4 a0 76 12 75 a9 | 2c 64 ca f2 05 fb 36 e8 35 db d2 9f 91 a5 c4 20 | 29 00 00 24 a1 c2 f0 6b 73 a0 8d a3 3d b9 fc 65 | 4f d9 ed 3c 9f 8f 87 98 60 fa 1e 4a fb c7 f1 6c | 8c d3 14 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 12 d3 2e 8d 56 f4 3c 1b 6c 80 b7 | a9 e2 20 50 4b 37 dd 45 00 00 00 1c 00 00 40 05 | c6 22 26 cb ae fa 29 03 74 5f 21 c6 81 1a 29 8b | 43 e3 ee ee | libevent_free: release ptr-libevent@0x7fb370035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a77850 | #192 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 c9 b3 98 5a b5 d8 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #187 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #187 | rejected packet: | e7 c9 b3 98 5a b5 d8 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #187: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0706 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 ff f4 e6 c7 17 a0 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #192 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #192 | rejected packet: | c8 ff f4 e6 c7 17 a0 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #192: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0519 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fa300 | handling event EVENT_RETRANSMIT for parent state #174 | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #174 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #174 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49615.815521; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003222 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a77850 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #174 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 "road-eastnet-nonat-174" #174: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #174) | 91 36 4b 21 8c e3 c8 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 dd c5 98 91 80 2f bf e7 2b 43 43 70 f9 1c a2 | 78 b6 0b 56 89 c7 17 d8 c4 a4 ed 43 14 68 00 55 | ee dd ad 6d 8a 38 ba ad d9 23 b7 9e bb 3d 86 07 | ed 16 db de b0 44 67 be ba 65 0e 96 fd 54 eb cc | d4 d8 f1 83 4a 85 62 b4 81 ea c9 6f d6 2b 35 08 | 27 1d 44 b3 72 05 f6 d5 ee 0e c6 0c ad 30 dd 17 | d5 9d 92 9d 6e 7c 3d b9 06 e4 e1 7a b8 af 86 7e | 60 5c 18 1e 77 1f a3 0b 6c 39 63 8e 3b e2 37 7b | 90 c4 a3 0b 91 18 0b 29 93 4d 27 18 cf a4 37 53 | b6 2a 69 e7 1d 14 6c 93 05 8e 44 d8 16 2f a7 9f | 79 72 c5 dc 33 34 fc 0e b4 98 f8 e3 05 25 fe de | b4 63 51 46 dc 88 2d 12 37 aa 30 40 1c da d8 aa | d1 04 09 9e 82 a0 ef 0f 6a 96 1b 9b 72 30 77 32 | 93 8b f7 e8 2a a0 a2 dd 84 00 ba 24 75 30 17 4b | 8e 71 da c7 7b bd 41 ab b9 40 da db 82 29 9b 27 | d8 26 4c cc a8 73 89 de dd ff 26 53 c5 6f 01 3f | 29 00 00 24 cd b7 f1 c7 48 65 7b d0 51 fe 51 f7 | 71 0f cd 4b 00 33 35 86 2b 0b ad 56 3c d5 7d aa | 0f f5 4e e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 08 52 e7 44 c5 f0 65 19 f6 45 55 | b4 2d dd 6f 21 a4 bb e8 00 00 00 1c 00 00 40 05 | 78 4d 37 08 7f b6 6b 98 3a f8 5f d9 3e 81 c3 c7 | 93 cf d6 90 | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fa300 | #174 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 36 4b 21 8c e3 c8 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #174 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #174 | rejected packet: | 91 36 4b 21 8c e3 c8 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #174: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0662 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47e90 | handling event EVENT_RETRANSMIT for parent state #91 | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #91 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #91 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49615.818873; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004503 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fa300 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #91 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 "road-eastnet-nonat-91" #91: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #91) | a6 f1 37 27 17 86 c6 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 6a 94 73 f6 c2 01 42 8c 6e f6 05 6f 1c e2 ee | 38 45 16 e5 f6 17 c9 fc 07 cc bc 0b 02 da 35 c8 | 5a ca 9d 87 29 53 47 69 49 7f 31 f0 fb ce e2 59 | 00 57 9b 32 9e 1f da 4b f7 41 b5 05 14 af c4 d7 | 09 7f 69 01 a0 cd 93 57 e5 a7 fd 93 a9 9e c3 fc | b0 af f5 37 11 6f 2b 38 a8 2a 8b 37 b3 e6 bc bf | 0c 06 37 86 ca f2 b6 b0 ed 1e 3f d6 8a f0 0b f9 | e8 80 df 35 d6 a2 36 c0 a2 dc a4 1a ca 7d d9 0b | 6f fc 29 fc 92 12 f8 05 c1 88 8e 81 27 4a 61 62 | c3 16 fc 6e 5e a6 59 bf d1 b1 ad d5 92 05 c4 60 | 2f 54 a3 71 e0 ec ca 5d 37 16 ec 5f ec 37 29 2d | 46 5a 04 10 84 ad 36 aa 07 ca f2 60 8b 7c ac f8 | ac e2 8b a3 69 23 74 f2 d2 2d c5 0d 51 9b 2c 7f | 42 45 54 c3 ec 3d 44 63 f0 0a ec ff b3 69 48 ee | 22 28 aa af 72 8c cd ca 9e 3c dd f6 ac 2b 6f b7 | a1 90 21 32 ae b8 23 39 1e cc fe 3e d6 b6 21 70 | 29 00 00 24 29 05 58 2b f0 ba fb 18 77 b3 53 8d | 8b 05 bb 0a 8a c5 e8 dc 24 17 58 d9 a6 60 c9 1d | bc c9 21 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 d0 cc 50 f7 83 7e b1 80 37 a7 4b | da df 68 8f 62 b7 e5 89 00 00 00 1c 00 00 40 05 | 8a 41 f9 2e 73 42 40 08 8e 79 f6 3e 7a 3f 48 7e | 67 86 16 af | libevent_free: release ptr-libevent@0x7fb36401f860 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47e90 | #91 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 f1 37 27 17 86 c6 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #91 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #91 | rejected packet: | a6 f1 37 27 17 86 c6 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #91: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0705 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-198" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-198' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #198 at 0x557d46ae27c0 | State DB: adding IKEv2 state #198 in UNDEFINED | pstats #198 ikev2.ike started | Message ID: init #198: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #198: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #198; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-198" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-198" IKE SA #198 "road-eastnet-nonat-198" "road-eastnet-nonat-198" #198: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-198 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-198": constructed local IKE proposals for road-eastnet-nonat-198 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 198 for state #198 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47e90 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #198 | libevent_malloc: new ptr-libevent@0x7fb36401f860 size 128 | #198 spent 0.169 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-198" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.254 milliseconds in whack | crypto helper 12 resuming | crypto helper 12 starting work-order 198 for state #198 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 198 | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 198 time elapsed 0.000889 seconds | (#198) spent 0.899 milliseconds in crypto helper computing work-order 198: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 198 for state #198 to event queue | scheduling resume sending helper answer for #198 | libevent_malloc: new ptr-libevent@0x7fb34003b010 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #198 | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 198 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #198 | **emit ISAKMP Message: | initiator cookie: | 38 c2 c3 e5 3e e5 82 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-198 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 61 f7 55 c5 c4 5e d0 83 66 79 06 76 ff 91 2f 9b | ikev2 g^x 12 d0 24 44 db b1 bb 60 15 c5 59 2d d1 18 5f af | ikev2 g^x af eb bb bf af 0f d5 a7 6d 21 23 3c 7a d5 2f 3a | ikev2 g^x b3 ef ca 8b 4c db ec bc f0 8c 19 8a b2 60 93 64 | ikev2 g^x a7 e9 05 44 28 9e 74 5d d9 95 66 66 f7 e5 b4 1f | ikev2 g^x d5 4f c6 33 f7 6e 5b 80 b4 15 1d 1d 0e 0a 1d ec | ikev2 g^x d1 57 f6 0c 8a 85 f5 7e b6 52 c9 40 29 cb 30 96 | ikev2 g^x b6 70 b8 b9 59 b7 f3 5d 39 15 1c 09 f2 d7 22 1a | ikev2 g^x 2f a6 71 e7 c2 13 1a 03 5a ae 65 2f 9f ab 09 6a | ikev2 g^x f8 76 83 82 4d 45 c3 9c c4 22 81 0b 0c de 1f 60 | ikev2 g^x c4 83 6f 80 69 4d fb 9f c9 f8 93 ff f8 9f 02 54 | ikev2 g^x a0 9a b8 b4 d0 4b 39 8e 82 eb a2 4d fd 53 0b 42 | ikev2 g^x 08 c3 3b 83 a3 55 58 9c 32 8d d4 50 90 35 7f 36 | ikev2 g^x 30 25 cb 7b da d7 20 59 55 75 68 f3 54 82 bd 15 | ikev2 g^x 66 45 d1 d6 73 76 d2 e1 4b 15 1f c3 2a 8d b1 0b | ikev2 g^x e3 7d 9a 2f f6 14 5c e9 eb 5c bb c0 32 a0 bd c5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 88 f3 29 1f 7c 05 5c 84 29 93 1b 9b 8b f1 e4 5b | IKEv2 nonce 97 f1 d8 9e b8 85 d9 30 2a 5f 45 e2 98 31 41 85 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 38 c2 c3 e5 3e e5 82 09 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c6 | natd_hash: port= 01 f4 | natd_hash: hash= 28 05 30 82 a4 eb e3 d3 07 9b b1 ad f0 ee 15 a7 | natd_hash: hash= e9 bb 27 63 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 28 05 30 82 a4 eb e3 d3 07 9b b1 ad f0 ee 15 a7 | Notify data e9 bb 27 63 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 38 c2 c3 e5 3e e5 82 09 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 88 8a 68 49 cd fa 13 38 3a 2a 49 e8 1c 37 c8 41 | natd_hash: hash= 63 44 84 75 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 88 8a 68 49 cd fa 13 38 3a 2a 49 e8 1c 37 c8 41 | Notify data 63 44 84 75 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #198 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #198: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #198 to 4294967295 after switching state | Message ID: IKE #198 skipping update_recv as MD is fake | Message ID: sent #198 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-198" #198: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.198:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #198) | 38 c2 c3 e5 3e e5 82 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 61 f7 55 c5 c4 5e d0 83 66 79 06 76 ff 91 2f 9b | 12 d0 24 44 db b1 bb 60 15 c5 59 2d d1 18 5f af | af eb bb bf af 0f d5 a7 6d 21 23 3c 7a d5 2f 3a | b3 ef ca 8b 4c db ec bc f0 8c 19 8a b2 60 93 64 | a7 e9 05 44 28 9e 74 5d d9 95 66 66 f7 e5 b4 1f | d5 4f c6 33 f7 6e 5b 80 b4 15 1d 1d 0e 0a 1d ec | d1 57 f6 0c 8a 85 f5 7e b6 52 c9 40 29 cb 30 96 | b6 70 b8 b9 59 b7 f3 5d 39 15 1c 09 f2 d7 22 1a | 2f a6 71 e7 c2 13 1a 03 5a ae 65 2f 9f ab 09 6a | f8 76 83 82 4d 45 c3 9c c4 22 81 0b 0c de 1f 60 | c4 83 6f 80 69 4d fb 9f c9 f8 93 ff f8 9f 02 54 | a0 9a b8 b4 d0 4b 39 8e 82 eb a2 4d fd 53 0b 42 | 08 c3 3b 83 a3 55 58 9c 32 8d d4 50 90 35 7f 36 | 30 25 cb 7b da d7 20 59 55 75 68 f3 54 82 bd 15 | 66 45 d1 d6 73 76 d2 e1 4b 15 1f c3 2a 8d b1 0b | e3 7d 9a 2f f6 14 5c e9 eb 5c bb c0 32 a0 bd c5 | 29 00 00 24 88 f3 29 1f 7c 05 5c 84 29 93 1b 9b | 8b f1 e4 5b 97 f1 d8 9e b8 85 d9 30 2a 5f 45 e2 | 98 31 41 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 05 30 82 a4 eb e3 d3 07 9b b1 ad | f0 ee 15 a7 e9 bb 27 63 00 00 00 1c 00 00 40 05 | 88 8a 68 49 cd fa 13 38 3a 2a 49 e8 1c 37 c8 41 | 63 44 84 75 | state #198 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36401f860 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47e90 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47e90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #198 | libevent_malloc: new ptr-libevent@0x7fb36401f860 size 128 | #198 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49615.824285 | resume sending helper answer for #198 suppresed complete_v2_state_transition() and stole MD | #198 spent 0.506 milliseconds in resume sending helper answer | stop processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34003b010 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 c2 c3 e5 3e e5 82 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #198 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #198 | rejected packet: | 38 c2 c3 e5 3e e5 82 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #198: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0678 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #144 | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #144 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #144 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49615.828499; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003916 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e5ca0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #144 | libevent_malloc: new ptr-libevent@0x7fb34003b010 size 128 "road-eastnet-nonat-144" #144: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #144) | 95 f5 7e 43 50 83 91 f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 af 0d 3c f0 04 33 31 65 f6 8e 0a e2 6d 8f 2b | 3a 54 de b3 ca 0f b9 57 94 b3 82 c2 80 38 37 42 | 7f 12 9e 2e 71 85 9b 4b b8 30 72 8d 13 66 8d 18 | cc b4 6c 82 a9 1c ff 5f bc 21 44 b4 04 e3 03 9f | 86 65 ce c2 4c 9e c7 42 cb 55 d7 40 69 8e 4e 35 | 08 db 41 09 bf 5b 9f e9 29 80 fb 24 8c ee 8a 18 | 98 d5 9e 29 b1 2e 48 fa a4 54 8d 89 c7 a3 3f 0e | fc 43 c8 e1 70 19 e6 79 93 90 9a 7f 29 dc 10 54 | 5c 05 ee 55 8b da f3 4a d4 d1 7a 22 56 b9 55 f2 | 83 7d ee 0a 7b 20 d8 88 a4 b2 35 e6 85 84 6e ea | 73 63 0f 8a e4 f5 ba b9 cf c5 6d ef 42 bc 1c 31 | 91 cc e3 6a cc 1c 24 a0 43 43 cd 4a d2 99 1f d0 | 12 0e 0b 61 86 58 8a 2a 98 ff 0e 20 62 f2 a9 6f | 84 85 8e 3d 34 eb 58 ea 76 88 a9 8b bd 38 f7 19 | 7f 52 1e a6 e1 d5 d4 4f 95 6d fa 80 6a e1 f8 3e | c4 ca 0c d0 70 40 4c 9c cb 3a a3 28 2b c3 1c ff | 29 00 00 24 1f 01 c0 5a 0d f1 22 7b f9 16 68 fa | 7d 4a 59 bf c4 b6 f1 ab 98 c0 67 1a 42 27 bf 9d | d6 b1 35 d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 96 0c ca 76 1c 4b 86 73 02 f4 3a | a5 21 4a 8f fe b4 03 ee 00 00 00 1c 00 00 40 05 | 86 67 99 5d 30 be 3d 57 d4 ea af 87 c1 18 21 08 | 32 c4 b1 0f | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #144 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 f5 7e 43 50 83 91 f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #144 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #144 | rejected packet: | 95 f5 7e 43 50 83 91 f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #144: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0656 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc40 | handling event EVENT_RETRANSMIT for parent state #193 | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #193 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #193 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49615.883851; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500173 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #193 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 "road-eastnet-nonat-193" #193: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #193) | 09 06 18 28 25 97 f6 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d fb a2 00 c4 81 91 0e b9 c0 41 7e a3 8e d5 a7 | 8f f9 71 10 26 95 10 e6 4e 8b 4b cc bc fc 28 8b | b7 f8 db 09 cb 68 57 d8 0f d5 cb 0f b4 d7 8f 3d | bd 12 fa dc 76 89 b1 cd af d1 36 87 37 88 94 35 | dc 1d 71 91 3b f3 e1 80 cc f2 f0 d3 3a 4d 9e 94 | 07 3c 65 6d 3e 40 ff 84 75 64 e8 1b b1 8c 09 6d | 19 40 40 a9 6d 88 cd b7 e8 19 c9 3d e5 92 7e 64 | de 57 bb db cd d4 22 17 89 b5 3e 22 3c e2 24 0b | 14 89 5a 96 bd 20 3b aa d7 bd af 6b d4 f2 98 3c | 51 d6 02 8a 1a 1e 91 da fa 7c 17 97 ea 62 5d 5c | 64 1a ef 72 b1 d0 d3 26 fb a0 cf 97 96 42 ef 85 | 1f 2a 66 aa 06 10 71 63 af 7d da 60 c1 c8 13 08 | 97 23 c5 07 eb 43 86 64 05 41 06 20 ee 9b 27 00 | 30 a6 42 a7 c6 f6 78 37 51 13 98 31 24 47 eb e1 | 16 0f ee 4e 11 f9 96 b6 72 84 dc 21 2b 6e e3 77 | 3a 73 af fe 81 a3 c6 e9 eb 76 cf a2 f6 45 8e f3 | 29 00 00 24 ca 9d 5e 32 ed 0b e6 19 dc 2f e8 6f | 8e a5 0f 9f 9c 08 6d f3 68 e8 0a 59 74 47 ad 67 | e3 bf 67 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c 89 f1 95 94 6f 28 52 1d 00 7f 87 | cf b9 fb 25 a2 94 8b 5c 00 00 00 1c 00 00 40 05 | cf 55 4f 40 25 07 37 da af 22 52 57 b9 8b da a2 | e2 e1 f8 6b | libevent_free: release ptr-libevent@0x7fb3540251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc40 | #193 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 09 06 18 28 25 97 f6 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #193 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #193 | rejected packet: | 09 06 18 28 25 97 f6 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #193: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0845 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c00d120 | handling event EVENT_RETRANSMIT for parent state #175 | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #175 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #175 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49615.895245; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003326 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc40 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #175 | libevent_malloc: new ptr-libevent@0x7fb3540251c0 size 128 "road-eastnet-nonat-175" #175: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #175) | 12 29 28 fb 65 9c c2 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 ef d9 b0 55 d5 14 e7 83 ea 0c 0f eb c0 4d b2 | 18 36 c3 0d 3c 5f 0d a0 d7 f5 a9 e8 30 23 62 2f | 3d 90 5e 25 d3 54 b3 8c d3 ab 1c d3 33 34 03 78 | 85 cd 74 0f 8e 35 c2 5d e8 af fd 9d 00 2e ac e4 | 84 d5 07 fd 55 8c 43 bf 89 61 dc 61 43 3c cd 62 | c3 a0 1f 02 31 0b 07 a5 78 c5 10 08 e8 a4 7f 16 | 2c ae 5c 93 2d 6e c4 24 f5 3a 2e c6 c8 6f 2e ed | e3 0a 8d 68 b0 44 75 d4 95 53 f7 73 cd 7d 6e 84 | d1 e9 9a 86 1e 26 9e 3c d7 df ee 11 ad 66 97 c8 | d5 8e 03 f4 d8 ef b9 76 f2 13 a1 73 f1 c4 5a 4e | 4f 30 eb 7b 7a f1 c0 eb 65 91 cf a9 f3 ae 0d 25 | 9b ee 1e 21 c2 ad 7e f5 01 73 92 f7 51 aa 80 fe | 91 d2 a8 9c 23 90 be c1 3c 6a f1 41 0c 91 0d 9d | 20 55 1f c9 0c b7 77 36 a0 ac 09 f3 01 de b4 91 | 94 8a 20 8c 1f ad 5f d7 63 70 2d 9a bd f2 8c e9 | fc ac 2d 5f 45 8f 88 b9 47 ef 43 3d 71 ea 60 f1 | 29 00 00 24 97 30 3a 8f 02 71 88 b4 dc ed 53 7a | 89 3f 00 b1 2f 4a 80 0e 10 53 03 26 85 ad 54 ab | da 16 12 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 ca 83 64 e4 50 88 08 79 37 9f 8c | 5a be 7c 44 1e d9 01 29 00 00 00 1c 00 00 40 05 | 4a 03 e5 d4 1c 09 77 92 d5 8c 25 e7 2e 76 d9 45 | 5b fb 35 ac | libevent_free: release ptr-libevent@0x7fb36c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00d120 | #175 spent 0.56 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 12 29 28 fb 65 9c c2 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #175 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #175 | rejected packet: | 12 29 28 fb 65 9c c2 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #175: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0737 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47ed0 | handling event EVENT_RETRANSMIT for parent state #92 | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #92 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #92 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49615.900013; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005557 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #92 | libevent_malloc: new ptr-libevent@0x7fb36c012840 size 128 "road-eastnet-nonat-92" #92: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #92) | 07 61 83 69 17 8d a7 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 13 06 9b 22 b9 09 02 07 4e 56 e2 9a 05 b7 70 | b7 25 ba 3c e0 d7 4b 41 68 60 e2 84 fa 7d 2e 53 | 6d 05 81 6c 1d a6 11 6c f3 c1 91 94 93 3c 04 e1 | 47 48 3f a6 f9 c1 bd d3 55 1c 44 87 99 6c 2b ee | 1a fc ef da ca ee 71 5f 90 30 42 cf 28 4f 89 1f | 86 f8 61 c0 95 c8 84 9c 1c 5f 1c 12 41 c6 05 de | 97 e9 89 32 6b 06 59 ff 06 2b 2f 06 a3 7f d2 ee | 73 0b 6d 38 c1 ed f4 4b b5 20 b3 c7 2c 91 97 4e | e0 5f 39 be 43 66 47 ab c5 cc 93 72 f7 60 85 3f | db 39 5c a4 81 f1 02 ef e4 62 a4 fe 72 6e 67 a1 | 96 94 e2 5d 70 64 80 e3 dc 1a 37 fd 9b e4 85 ab | 94 44 5e 2f e2 eb 91 bf ec 37 e1 84 2a 65 44 ca | 1a 08 22 fa 52 cb 8e 26 f3 0a e0 f3 e8 ed d0 ab | dc 5c 23 93 37 b0 3f ec 3e d7 3b 37 ac 5f 12 98 | 95 79 c8 ae bc 21 83 a1 90 e1 8c a5 2a 7f b7 ff | e0 96 4f 2b 8d 89 b3 7b 60 e0 d7 14 33 e7 9c 37 | 29 00 00 24 0e 70 86 57 dd 9d d2 8d 77 a4 03 8e | d4 ef 6c f9 5f 5e da 54 db 62 42 7e 49 f6 2b 1b | b6 ad f3 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 b0 5c 2e fc f8 56 4b e1 e9 3b 08 | c9 71 30 03 41 fd 60 2e 00 00 00 1c 00 00 40 05 | f0 af c3 ce dd eb 90 e8 cb ac 91 a5 38 a0 f8 72 | 06 9d 9d 60 | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47ed0 | #92 spent 0.223 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 61 83 69 17 8d a7 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #92 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #92 | rejected packet: | 07 61 83 69 17 8d a7 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #92: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0671 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa34c0 | handling event EVENT_RETRANSMIT for parent state #145 | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #145 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #145 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49615.909763; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004428 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47ed0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #145 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 "road-eastnet-nonat-145" #145: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #145) | a6 a1 9f 1d 3f 3a 29 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 ad 76 df ba ca 18 92 b9 50 e2 27 a3 57 3f f5 | d7 ce ae 5d 80 a9 09 c6 8a 53 e3 ab 22 af 0e a7 | 88 2e e6 ed 37 ce 02 dd 03 71 9a aa 64 d1 00 5c | 54 65 05 0e 62 cb 77 34 78 e8 1d 0f 3c 6f 76 4f | d8 fc 9f c4 10 87 e5 9a b0 72 db 0a 63 63 0e ec | a2 67 9d 72 98 db 53 5f a6 6f e8 b3 98 59 aa 3b | 88 1a a2 8d d0 7f c4 94 06 61 c1 99 f9 c0 e1 fc | 19 b1 6a 14 b7 fd 63 fd d3 3b 83 b6 f1 f8 68 d2 | 13 f3 e6 28 90 fe d0 d0 88 c6 ca e3 4e 56 e1 09 | b8 4b c6 48 c4 d4 00 e6 af d0 6c fa ac 01 46 d9 | 68 30 67 9c 6d 90 ca de 4f 57 74 b7 7a b8 1b 41 | a9 90 f5 03 0d 89 d9 ac 42 f8 f9 ae 19 2a 88 37 | d2 a9 69 9e 81 b2 1c 52 07 de 0f fa d0 69 b1 a8 | 12 38 cf d3 2e 09 65 b8 1c da 6e 0b 4d 41 c0 65 | 80 dc 01 75 47 41 de 6c 83 4d 93 25 86 5c 1b c8 | f3 08 39 71 bd f1 c4 fe f5 43 e7 4c 77 94 d2 cc | 29 00 00 24 03 a8 59 45 29 a4 02 15 24 82 5a 54 | 64 ac fd bc 55 59 ba ca b7 e9 80 0d f2 9c bd f0 | d3 a5 de f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 e0 ba e6 72 d8 87 8f de 74 38 1d | 19 eb b3 76 79 6b d3 38 00 00 00 1c 00 00 40 05 | 6f 55 64 02 f2 84 7e 5a 25 36 99 f3 de 2c 7f 97 | 3a 54 f2 52 | libevent_free: release ptr-libevent@0x7fb380022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa34c0 | #145 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 a1 9f 1d 3f 3a 29 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #145 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #145 | rejected packet: | a6 a1 9f 1d 3f 3a 29 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #145: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9f380 | handling event EVENT_RETRANSMIT for parent state #188 | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #188 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #188 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49615.911093; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001667 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa34c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #188 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 "road-eastnet-nonat-188" #188: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #188) | f8 92 2e dc 48 c8 64 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 8c 6e 8b 73 15 ff 0e bb aa f8 24 68 da ef 6a | 1c 01 19 e8 a2 a3 5e f6 5a 71 31 aa 3c b1 c4 41 | 27 8d 2a 58 b3 aa 09 ec ab 9b 79 a4 37 2c 57 bc | 33 2a 63 cb 88 61 ff 6f 57 a5 f5 2c 3b 28 ff c0 | e2 03 fe e0 d7 c3 cd af a3 47 59 59 0e 58 bb 20 | d6 dc 5a 4c 31 47 b6 5a 25 02 b2 63 30 de fe 0f | aa 00 d1 fa e6 0a 07 a2 95 d3 2a cc eb a7 d4 64 | 92 40 37 20 3b f0 9c 95 06 bf 89 fe 4e 9c 75 93 | be 49 6d 83 74 cb 43 a9 68 b0 b3 1b 6c 7e b1 7d | 71 1f eb 81 78 ef b8 84 cd 25 a3 cb 59 97 64 95 | 1c 19 a1 95 2c 31 c2 d1 08 08 8a 2a 38 f4 5e 06 | d0 60 01 b7 7e f7 37 07 7c 57 50 f7 20 78 35 94 | 90 2f 3d b8 01 db 62 a4 93 0c bc 99 72 08 c3 2a | 65 b1 ef fc 8b 00 29 6d 1d eb d8 05 c6 bd 18 34 | 85 96 91 a6 8d 87 95 d6 03 d2 b7 ec 1a a3 0e 66 | 18 52 9c 51 fa 27 d5 c0 2b 40 de 51 c6 17 5c e3 | 29 00 00 24 32 b3 09 c7 6d 35 ae 79 0b a9 93 c1 | 25 b3 85 c2 02 53 dd a2 dc f7 0c 55 f9 9f 55 72 | 45 99 28 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 05 c4 f8 2b d0 22 47 d6 02 77 fd | 96 35 b9 b3 1b 70 08 41 00 00 00 1c 00 00 40 05 | f1 47 98 30 50 7a f1 c9 d1 56 2e ed 54 8a b8 d4 | be 9f b3 89 | libevent_free: release ptr-libevent@0x7fb36402ffd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9f380 | #188 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 92 2e dc 48 c8 64 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #188 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #188 | rejected packet: | f8 92 2e dc 48 c8 64 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #188: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-199" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-199' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #199 at 0x557d46ae3d80 | State DB: adding IKEv2 state #199 in UNDEFINED | pstats #199 ikev2.ike started | Message ID: init #199: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #199: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #199; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-199" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-199" IKE SA #199 "road-eastnet-nonat-199" "road-eastnet-nonat-199" #199: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-199 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-199": constructed local IKE proposals for road-eastnet-nonat-199 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 199 for state #199 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9f380 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #199 | libevent_malloc: new ptr-libevent@0x7fb36402ffd0 size 128 | #199 spent 0.163 milliseconds in ikev2_parent_outI1() | crypto helper 5 resuming | crypto helper 5 starting work-order 199 for state #199 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 199 | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 199 time elapsed 0.000875 seconds | (#199) spent 0.884 milliseconds in crypto helper computing work-order 199: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 199 for state #199 to event queue | scheduling resume sending helper answer for #199 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 | crypto helper 5 waiting (nothing to do) | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-199" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.262 milliseconds in whack | processing resume sending helper answer for #199 | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 199 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #199 | **emit ISAKMP Message: | initiator cookie: | 27 d1 6c c4 4c 84 e3 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-199 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 56 f7 e5 ae 44 da 7b a1 b1 3e 44 fb ef 82 32 77 | ikev2 g^x a0 c2 72 43 50 19 7e 5e c7 1d 24 fa 9d 99 ff 71 | ikev2 g^x 44 54 82 8e cd bf 0f 40 ad 0d 4a 27 75 78 aa 64 | ikev2 g^x 63 e6 66 6d e9 bf 1f 5a 74 65 bf 0f ba 29 57 51 | ikev2 g^x 0a 44 9c 16 52 28 db 48 f9 d7 ab e8 1e 98 b5 a0 | ikev2 g^x ff 9d 9d 22 6a 26 d5 06 1f b5 07 29 59 d7 ec 33 | ikev2 g^x 10 b5 a0 31 95 73 ec 20 a2 11 23 56 06 d8 ad a2 | ikev2 g^x 6d 0f c8 00 64 2f 99 96 5d d2 5b a5 dd 2c 34 78 | ikev2 g^x ce 80 35 74 5d 74 56 55 47 bf 15 c1 84 c7 0f 64 | ikev2 g^x a6 70 c6 99 14 c9 d9 b3 02 6a 70 83 2d ca 4f aa | ikev2 g^x b9 b4 39 e1 b3 2e 81 8c 26 1f 8e f8 1a b1 b1 4b | ikev2 g^x b0 9b 0a c4 8c 38 2e 14 24 c9 96 c5 ae 69 55 cb | ikev2 g^x f9 3b a1 e1 2b 54 42 88 42 2f d5 f9 04 ab 91 7e | ikev2 g^x 86 11 e3 bd 2a 54 c0 da 96 34 89 6a 25 46 14 93 | ikev2 g^x 51 fb 1f 2b bf 29 76 41 f2 16 a8 f5 e3 fb 49 39 | ikev2 g^x 86 d5 c2 41 0f 92 03 df 3b a9 75 b2 e3 1f cd 5c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ce b1 60 ec b2 6d 5b aa dc 41 a3 c6 5b 6b 71 42 | IKEv2 nonce 8d 0b d4 85 d2 79 6d f3 81 c0 ff 8a e8 8f f9 2a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 27 d1 6c c4 4c 84 e3 b1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c7 | natd_hash: port= 01 f4 | natd_hash: hash= 5e b6 28 45 f6 47 a9 89 2b f2 e1 02 ea 34 3a fc | natd_hash: hash= e5 a7 2b f1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5e b6 28 45 f6 47 a9 89 2b f2 e1 02 ea 34 3a fc | Notify data e5 a7 2b f1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 27 d1 6c c4 4c 84 e3 b1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a9 d3 87 ec eb bf 81 b0 18 6d 86 a6 a8 63 05 fc | natd_hash: hash= 1c 93 4f b5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a9 d3 87 ec eb bf 81 b0 18 6d 86 a6 a8 63 05 fc | Notify data 1c 93 4f b5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #199 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #199: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #199 to 4294967295 after switching state | Message ID: IKE #199 skipping update_recv as MD is fake | Message ID: sent #199 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-199" #199: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.199:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #199) | 27 d1 6c c4 4c 84 e3 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 f7 e5 ae 44 da 7b a1 b1 3e 44 fb ef 82 32 77 | a0 c2 72 43 50 19 7e 5e c7 1d 24 fa 9d 99 ff 71 | 44 54 82 8e cd bf 0f 40 ad 0d 4a 27 75 78 aa 64 | 63 e6 66 6d e9 bf 1f 5a 74 65 bf 0f ba 29 57 51 | 0a 44 9c 16 52 28 db 48 f9 d7 ab e8 1e 98 b5 a0 | ff 9d 9d 22 6a 26 d5 06 1f b5 07 29 59 d7 ec 33 | 10 b5 a0 31 95 73 ec 20 a2 11 23 56 06 d8 ad a2 | 6d 0f c8 00 64 2f 99 96 5d d2 5b a5 dd 2c 34 78 | ce 80 35 74 5d 74 56 55 47 bf 15 c1 84 c7 0f 64 | a6 70 c6 99 14 c9 d9 b3 02 6a 70 83 2d ca 4f aa | b9 b4 39 e1 b3 2e 81 8c 26 1f 8e f8 1a b1 b1 4b | b0 9b 0a c4 8c 38 2e 14 24 c9 96 c5 ae 69 55 cb | f9 3b a1 e1 2b 54 42 88 42 2f d5 f9 04 ab 91 7e | 86 11 e3 bd 2a 54 c0 da 96 34 89 6a 25 46 14 93 | 51 fb 1f 2b bf 29 76 41 f2 16 a8 f5 e3 fb 49 39 | 86 d5 c2 41 0f 92 03 df 3b a9 75 b2 e3 1f cd 5c | 29 00 00 24 ce b1 60 ec b2 6d 5b aa dc 41 a3 c6 | 5b 6b 71 42 8d 0b d4 85 d2 79 6d f3 81 c0 ff 8a | e8 8f f9 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b6 28 45 f6 47 a9 89 2b f2 e1 02 | ea 34 3a fc e5 a7 2b f1 00 00 00 1c 00 00 40 05 | a9 d3 87 ec eb bf 81 b0 18 6d 86 a6 a8 63 05 fc | 1c 93 4f b5 | state #199 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36402ffd0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9f380 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9f380 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #199 | libevent_malloc: new ptr-libevent@0x7fb36402ffd0 size 128 | #199 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49615.935664 | resume sending helper answer for #199 suppresed complete_v2_state_transition() and stole MD | #199 spent 0.463 milliseconds in resume sending helper answer | stop processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34403b0b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 d1 6c c4 4c 84 e3 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #199 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #199 | rejected packet: | 27 d1 6c c4 4c 84 e3 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #199: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0701 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8ee40 | handling event EVENT_RETRANSMIT for parent state #194 | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #194 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #194 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49615.952996; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500919 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a24730 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #194 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 "road-eastnet-nonat-194" #194: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #194) | fb a9 4a 68 01 02 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad aa 66 9d b6 64 e0 b9 0d 37 a2 d5 08 fd 46 b0 | f7 b3 8b 64 d2 0b f9 59 d3 20 8f d2 23 52 ab 2e | d6 99 18 d2 2f 54 8c e7 99 6c 8c 9d cd ff 9d 5a | 44 41 3e 80 ea ff 21 1e 5c 82 8a bc ec 41 36 14 | dd 8d af 05 d5 6f c4 3b eb c0 61 1c 5d 0d 70 dd | 40 c9 d4 1f 8a d2 d8 76 8a b9 bd f7 f3 8d f9 d9 | da 19 38 58 8d de a2 45 b1 7d bb f4 44 36 75 08 | 1e 19 e1 7e 40 21 fc 21 30 c5 e3 bd 20 8d d8 be | bf bc a6 60 a1 d6 d8 51 07 69 fd 62 da 68 85 ce | 37 74 1e f7 ae d2 77 4a f2 bc 1e 10 5e ed ca 3e | bf 36 bc 15 0b 03 92 f4 43 13 b4 d6 80 6a 65 a5 | da 3f fd 89 e4 f3 95 6e ad 5c 51 06 e7 4d 88 1f | 8e b3 8c 1c 17 69 df 75 37 d0 1f f8 06 a4 4e 15 | d4 9e 45 dc a2 0b 41 4c 07 55 90 db 32 9b e2 82 | 2b f7 f7 40 85 e7 33 60 11 d2 9c 0f 8b 18 ca 0d | 1e 7e c6 7b e1 da d7 c5 9b 44 c8 e8 12 48 03 39 | 29 00 00 24 a9 61 02 67 eb 1a 8f ba e2 2e bf 6e | fa 3f 6f bb 4e c3 80 0d df 43 7e 7d a3 f5 81 cc | f3 7a bb 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 5d 39 f5 08 60 5b 2c d2 7c 9c f1 | a9 84 d1 dc ab 40 bc 42 00 00 00 1c 00 00 40 05 | dc 98 c1 28 2a 8c a1 5f e1 55 35 3c e4 55 00 85 | a7 4e ac da | libevent_free: release ptr-libevent@0x7fb36c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee40 | #194 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb a9 4a 68 01 02 ca 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #194 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #194 | rejected packet: | fb a9 4a 68 01 02 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #194: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a25d10 | handling event EVENT_RETRANSMIT for parent state #176 | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #176 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #176 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49615.96934; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002314 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee40 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #176 | libevent_malloc: new ptr-libevent@0x7fb36c0251c0 size 128 "road-eastnet-nonat-176" #176: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #176) | a4 22 94 6b b7 90 01 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 06 20 a9 49 fb 93 2b 74 d8 83 cb 06 8c 55 7f 57 | 5d f1 cc 70 90 ee ee 41 59 8d d1 e4 58 c0 02 89 | 12 8f 04 73 87 28 bc ec 0e 96 08 f0 49 03 74 3b | 4f eb c4 d0 c6 21 f7 38 1b 92 1e f3 ba 46 7f 28 | b7 fb 3b 9f fa d9 3a 39 83 bb a2 23 67 98 f1 b5 | a1 a5 1f cd 74 bb 92 db b0 18 17 3e 12 cd 1b ef | c7 08 37 6b 02 81 e5 23 06 48 6f 12 26 7a 04 03 | 41 41 ce c5 75 5e 67 35 c5 ce e1 ac d5 40 0e 48 | 02 a1 2b 2d 14 1a 42 85 97 cf d2 fc 57 8d 5d de | 6b d9 22 6f 79 7d c3 c2 dd 65 20 aa 1d 5b 57 40 | a0 1a 0e 1e 45 35 58 17 0b 20 5c b0 ba 44 7d db | a2 bd 64 77 9a d5 0b a1 b5 5c 94 07 3a 31 f0 5b | 14 75 f7 58 da e1 d3 e6 78 67 58 17 31 77 19 91 | 11 0f cf 7e 64 09 ce c1 12 cf d6 40 b9 60 dd 56 | e1 a2 ed 56 fd 45 7f 51 84 03 0b 96 6c a0 15 97 | 40 65 89 e3 a9 b7 e3 e5 5a 24 e4 6f 77 a5 63 fc | 29 00 00 24 bc 2f bb 65 01 f5 95 86 7b 82 6d a7 | 33 bf 89 13 08 c1 15 eb 66 27 ad 6e 9d 4d 82 1c | fe 4f 3f 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 44 db b2 76 4d c5 a9 b2 17 20 52 | 87 84 27 9b ed 5c 63 75 00 00 00 1c 00 00 40 05 | 53 a7 06 a0 b6 ee 02 94 c4 3e c2 3c 5b 31 75 91 | 62 98 b0 aa | libevent_free: release ptr-libevent@0x7fb3840223a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a25d10 | #176 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 22 94 6b b7 90 01 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #176 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #176 | rejected packet: | a4 22 94 6b b7 90 01 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #176: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0671 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1af10 | handling event EVENT_RETRANSMIT for parent state #146 | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #146 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #146 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49615.975701; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004169 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a25d10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #146 | libevent_malloc: new ptr-libevent@0x7fb3840223a0 size 128 "road-eastnet-nonat-146" #146: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #146) | 44 6c 8c 11 77 9b c1 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b e4 4b 01 63 76 c0 7a c8 2d 36 69 32 60 94 ea | 6d 55 57 2b 4e ff 0e 39 b8 87 ae 9d 5d a1 84 c3 | fd 7e 75 5e b5 db f9 c0 f2 b4 77 67 0c bc 83 d2 | b3 2c 18 7b 18 da 84 81 dc 1d 09 bc ef cb 96 0b | 54 3e 13 a5 2c e8 26 52 c4 b3 5b d7 9c b8 e6 22 | f7 8d 8e 88 21 d1 87 46 36 62 d4 63 42 41 4c 1f | 8f 43 21 27 b3 df 00 21 d1 8d 41 5a e5 9f 04 8b | ff c6 a4 97 a5 12 34 cb aa c2 51 13 9f 26 59 55 | a5 7b 2f 9e 53 52 08 32 a2 06 5f 18 aa a0 ac 8a | 4c 25 e1 2e cb 23 eb 05 33 52 1c b1 e7 32 06 d0 | 42 ed ad 95 48 c5 eb 3d 1a cb f5 6d dc 2f a2 a8 | 4e 15 75 28 ce 0c d4 fb 09 18 56 79 e6 17 c1 dd | e4 ed 35 be 6f e9 12 84 6e 1e 87 b9 38 ca fc f5 | d4 85 cf 4e a3 1f db 6c 1f e5 f2 54 ba 88 10 cb | 4e bc 46 9b 79 cb 0a 36 af 61 69 14 f8 97 5e 9d | 27 b8 f4 1b 36 1d 0b 8b f0 e7 f8 06 78 36 dc d7 | 29 00 00 24 79 24 14 13 36 a3 2b 17 a4 40 30 01 | 57 eb a4 ff f9 15 14 cb 86 dc 31 a7 64 7c e3 06 | ae fb 59 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 46 87 8a 4c 47 2e ae ab e2 03 f4 | cf 0f 35 fc df 03 af ad 00 00 00 1c 00 00 40 05 | 7f ed fa 9e 74 b9 38 c0 e7 89 49 8c f1 a3 30 c7 | bc 00 44 f5 | libevent_free: release ptr-libevent@0x7fb348035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1af10 | #146 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 6c 8c 11 77 9b c1 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #146 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #146 | rejected packet: | 44 6c 8c 11 77 9b c1 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #146: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #93 | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #93 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #93 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49616.024027; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00767 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1af10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #93 | libevent_malloc: new ptr-libevent@0x7fb348035930 size 128 "road-eastnet-nonat-93" #93: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #93) | 8f 2b 82 41 be 50 7f e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cd 43 20 82 ea 0d 92 4d b7 6f 10 e5 73 62 a1 74 | 5f 8b b1 bd e8 48 72 86 0f fc f7 f4 6d aa 74 9c | c6 32 cc 9c 2e 89 27 81 1a 44 1a e2 a0 dc ee ce | 11 9a 86 db b2 0d 84 8c a7 35 4b a3 54 44 ff a5 | 46 90 60 08 6b 0b b2 6e 30 fe 4a 71 80 d7 a0 82 | 42 f8 84 b3 d1 ca 25 4a c6 d4 78 a8 df 7e e5 c9 | 03 e0 84 12 8e f0 91 14 81 e1 1e 7d 14 d0 21 c6 | 0b a7 bd a5 91 4d 74 5f a5 49 fb 47 92 a4 f6 f2 | 46 b5 1e 26 6d f1 8f 2b 0f f1 aa b1 98 3a 25 3a | b5 d3 2a 4c bc bb 1d f8 fd dc 58 f3 d0 d8 1b 32 | 38 77 9b c8 3c 93 48 af 2e 17 ec f8 87 96 76 0f | 85 58 80 2d fe e0 ad 94 9a 85 9c 5e 26 2b ed 2c | f6 a6 2f 18 05 50 d7 9c 67 0d fc 1d 16 0d 73 cf | e1 da cd 32 28 a8 c7 82 3a 82 36 71 d2 89 fb 29 | 72 68 23 fe 3a 1e 23 55 bf ae 58 43 08 3b 0f b5 | 11 45 c9 10 6a 4c 49 3d 66 da 53 be f8 72 a4 ba | 29 00 00 24 38 5c 7f a9 1f f6 b2 d3 ed 46 5d a7 | 91 ec df cb c1 74 f9 14 df e8 fc 11 90 67 a3 a7 | 1e 7f 11 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c cc 1f b2 cd 2b 6c 7e 5b 50 dd 93 | 55 b1 e2 f6 27 0b bd 36 00 00 00 1c 00 00 40 05 | b6 37 a4 32 e9 5e 9f 19 d6 7a 97 0a 5b 76 69 49 | 01 0d 5c 45 | libevent_free: release ptr-libevent@0x7fb364017f20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #93 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 2b 82 41 be 50 7f e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #93 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #93 | rejected packet: | 8f 2b 82 41 be 50 7f e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #93: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a30d30 | handling event EVENT_RETRANSMIT for parent state #189 | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #189 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #189 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49616.024297; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001403 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #189 | libevent_malloc: new ptr-libevent@0x7fb364017f20 size 128 "road-eastnet-nonat-189" #189: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #189) | 86 0c af cf d7 4f f0 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 da a6 92 01 b3 1e 2d 01 6d b4 b0 5b c8 86 63 | fa d3 04 1f 4a 5d 42 51 c6 fa 83 7f 52 a9 5c 5f | 29 a2 a6 67 ca c4 cb cd f8 82 1e 41 60 3e d2 fa | be e5 64 f3 5e f3 de 1c 66 73 04 70 83 c5 c9 fa | d9 0c 95 4f d8 7c 96 92 62 c0 89 3f a6 f5 e5 1c | 1d 8a 04 ae 7f 59 7e f9 0a 02 65 1e e5 50 67 cc | 8a fa 7a d2 bf b6 8d 22 68 80 58 92 0d 46 32 32 | ac 55 d1 c6 9f 27 eb 86 dd 30 64 7d 70 38 1f e2 | 82 2f 8e ad e7 06 c8 10 a8 89 ac cd 34 d4 ef 54 | d9 fa ef 60 3c 01 17 c1 e0 90 2b 1d 49 9b 9e e6 | 59 07 02 91 fb ba 4f 73 08 2f de a1 3c 70 c1 7b | f2 11 29 b4 eb 0f 6e 10 04 0d 03 e4 29 ad b5 0b | 6b 4b aa f3 91 cc 9d d5 fa 2e 4d ea 3f 0e 7e 09 | 29 dd 22 a7 1f e8 ee 73 1f 35 15 51 78 6d 86 ea | cd eb 92 50 fc 79 44 24 ff 9f f8 19 89 f2 31 2b | 2f 82 13 db f2 4a 67 b7 c4 2a 16 2f d5 d4 31 ee | 29 00 00 24 ab 6b 1b 01 ee 77 53 c6 2a de 6e a0 | bf 1d e9 b5 56 76 a7 4b d5 a7 a9 e9 a7 01 9e 47 | cc 4b 2a 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 a4 06 85 0c 28 ca 55 e9 70 4f 7f | 1a ca eb c6 50 e4 53 f0 00 00 00 1c 00 00 40 05 | 2a 84 d0 22 8e e3 5b 68 a0 3f 20 22 83 cb 94 15 | 67 d9 c0 48 | libevent_free: release ptr-libevent@0x7fb37800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a30d30 | #189 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 0c af cf d7 4f f0 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #189 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #189 | rejected packet: | 86 0c af cf d7 4f f0 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #189: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0571 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-200" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-200' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #200 at 0x557d46ae5340 | State DB: adding IKEv2 state #200 in UNDEFINED | pstats #200 ikev2.ike started | Message ID: init #200: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #200: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #200; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-200" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-200" IKE SA #200 "road-eastnet-nonat-200" "road-eastnet-nonat-200" #200: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-200 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-200": constructed local IKE proposals for road-eastnet-nonat-200 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 200 for state #200 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a30d30 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #200 | libevent_malloc: new ptr-libevent@0x7fb37800cf80 size 128 | #200 spent 0.121 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 resuming | RESET processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 starting work-order 200 for state #200 | RESET processing: connection "road-eastnet-nonat-200" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 200 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.198 milliseconds in whack | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 200 time elapsed 0.001055 seconds | (#200) spent 1.01 milliseconds in crypto helper computing work-order 200: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 200 for state #200 to event queue | scheduling resume sending helper answer for #200 | libevent_malloc: new ptr-libevent@0x7fb33803b0b0 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #200 | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 200 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #200 | **emit ISAKMP Message: | initiator cookie: | 75 f9 3c ee 3d 43 50 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-200 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4d d7 f4 2c e9 d8 b4 58 bc f6 5c 68 d0 e8 20 d2 | ikev2 g^x 70 0a 56 63 f6 74 43 04 b4 cd d8 23 88 fe c7 f6 | ikev2 g^x 1e d9 bd ee 25 c8 67 c7 2d b9 d9 c6 54 ca cd 9c | ikev2 g^x 4d 78 05 42 6a b4 88 a1 71 4e fd 59 90 2e 53 a1 | ikev2 g^x 4c c1 78 ca ca ed 13 0b 48 7e 72 f2 de cc bf 74 | ikev2 g^x d8 13 14 01 89 5b 3d f3 26 5d 17 ef 74 28 fa a9 | ikev2 g^x a5 86 f8 17 01 9e 46 6d 69 c4 ce 7b 85 c2 8b f2 | ikev2 g^x 6a 40 21 88 6b 4c 0d e0 b2 55 9a f1 b6 c4 a5 34 | ikev2 g^x 5e ea a9 16 4b 7b 22 02 6e b5 62 bf 0e 13 c4 75 | ikev2 g^x 5a f6 47 5c d0 c2 01 a3 46 b7 b7 ca c6 5e f6 e3 | ikev2 g^x 79 8e 25 ba 76 6d ee 11 df 8f 10 22 5f 50 31 f4 | ikev2 g^x b3 77 76 36 47 ec 67 35 64 4d 22 bd 77 3c 61 d0 | ikev2 g^x 1c 1c ab b4 d6 cf e4 0f 57 21 d8 30 aa 58 f6 84 | ikev2 g^x a1 48 51 27 85 8c 83 cc 89 77 d2 37 58 0f 1d e2 | ikev2 g^x 1d d9 35 ce 76 2e 8b 0d 16 1d 75 c0 13 c5 08 c0 | ikev2 g^x 3c d5 3b aa 74 68 e3 69 d7 c9 6b 6b d6 2e 6c a1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0e 33 98 69 ac 19 40 8d 23 0b bc 95 8f 5a 8e 62 | IKEv2 nonce b3 f7 97 e2 1f 4f da 87 39 88 58 8e fe 30 e9 82 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 75 f9 3c ee 3d 43 50 ce | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c8 | natd_hash: port= 01 f4 | natd_hash: hash= 73 45 f2 7a b7 3f 1c 77 84 16 29 66 7f d3 6a c0 | natd_hash: hash= 22 39 cf e5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 73 45 f2 7a b7 3f 1c 77 84 16 29 66 7f d3 6a c0 | Notify data 22 39 cf e5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 75 f9 3c ee 3d 43 50 ce | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a7 72 f7 48 87 f0 01 9a b9 14 bf 98 e7 f8 65 3b | natd_hash: hash= c7 d8 2f ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a7 72 f7 48 87 f0 01 9a b9 14 bf 98 e7 f8 65 3b | Notify data c7 d8 2f ed | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #200 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #200: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #200 to 4294967295 after switching state | Message ID: IKE #200 skipping update_recv as MD is fake | Message ID: sent #200 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-200" #200: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.200:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #200) | 75 f9 3c ee 3d 43 50 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d d7 f4 2c e9 d8 b4 58 bc f6 5c 68 d0 e8 20 d2 | 70 0a 56 63 f6 74 43 04 b4 cd d8 23 88 fe c7 f6 | 1e d9 bd ee 25 c8 67 c7 2d b9 d9 c6 54 ca cd 9c | 4d 78 05 42 6a b4 88 a1 71 4e fd 59 90 2e 53 a1 | 4c c1 78 ca ca ed 13 0b 48 7e 72 f2 de cc bf 74 | d8 13 14 01 89 5b 3d f3 26 5d 17 ef 74 28 fa a9 | a5 86 f8 17 01 9e 46 6d 69 c4 ce 7b 85 c2 8b f2 | 6a 40 21 88 6b 4c 0d e0 b2 55 9a f1 b6 c4 a5 34 | 5e ea a9 16 4b 7b 22 02 6e b5 62 bf 0e 13 c4 75 | 5a f6 47 5c d0 c2 01 a3 46 b7 b7 ca c6 5e f6 e3 | 79 8e 25 ba 76 6d ee 11 df 8f 10 22 5f 50 31 f4 | b3 77 76 36 47 ec 67 35 64 4d 22 bd 77 3c 61 d0 | 1c 1c ab b4 d6 cf e4 0f 57 21 d8 30 aa 58 f6 84 | a1 48 51 27 85 8c 83 cc 89 77 d2 37 58 0f 1d e2 | 1d d9 35 ce 76 2e 8b 0d 16 1d 75 c0 13 c5 08 c0 | 3c d5 3b aa 74 68 e3 69 d7 c9 6b 6b d6 2e 6c a1 | 29 00 00 24 0e 33 98 69 ac 19 40 8d 23 0b bc 95 | 8f 5a 8e 62 b3 f7 97 e2 1f 4f da 87 39 88 58 8e | fe 30 e9 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 45 f2 7a b7 3f 1c 77 84 16 29 66 | 7f d3 6a c0 22 39 cf e5 00 00 00 1c 00 00 40 05 | a7 72 f7 48 87 f0 01 9a b9 14 bf 98 e7 f8 65 3b | c7 d8 2f ed | state #200 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37800cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a30d30 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a30d30 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #200 | libevent_malloc: new ptr-libevent@0x7fb37800cf80 size 128 | #200 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49616.027417 | resume sending helper answer for #200 suppresed complete_v2_state_transition() and stole MD | #200 spent 0.495 milliseconds in resume sending helper answer | stop processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb33803b0b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 f9 3c ee 3d 43 50 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #200 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #200 | rejected packet: | 75 f9 3c ee 3d 43 50 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #200: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #147 | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #147 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #147 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49616.039626; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004468 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6f550 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #147 | libevent_malloc: new ptr-libevent@0x7fb33803b0b0 size 128 "road-eastnet-nonat-147" #147: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #147) | c9 49 59 84 c8 e5 a9 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 23 1f ef d0 ab 86 83 db 3a 42 1d 72 53 7f 1d | 10 99 05 4a 99 4f 3f 9a 98 88 bd df 90 bb 6b e6 | 5a 0a ce 6c 41 04 da 58 5d c4 4f ac da 97 26 a7 | 11 32 a8 06 1f e1 87 a2 42 1e e6 6a 0c 68 08 40 | f5 b9 1e 41 1b cf 5c 75 a8 60 06 b2 5f cf d9 87 | 6b e4 af 8e 02 f2 fa 22 10 06 d6 15 19 bb fa f0 | 66 24 d5 79 4a bf 96 b3 63 ad e6 0f 0b 5c f6 47 | 01 64 bd d8 46 3f e5 ea a4 26 5d e5 06 c2 a7 0f | 35 e2 b0 0a 2c 32 20 be 52 14 9d b5 0e ec 56 cf | b3 f0 bf 5e 01 73 a8 04 a0 e0 5c 8a fe 29 b1 7f | 37 66 a5 5b ec c8 06 fb 07 01 0f 4c 5e 63 33 d2 | 2f d4 5c 61 3e 3f 82 73 d1 fb c8 86 80 bb eb c9 | 28 2b cc 48 8d 11 24 24 01 fe 7a 40 83 2b 75 31 | d3 44 40 97 d2 ba 07 04 c5 0b 99 12 41 24 f8 ad | ae 7e f2 a1 cb 5b d9 cd e9 53 59 dd 6f dc 6a 90 | 39 c5 d7 b8 42 59 e8 06 c8 85 08 f1 c6 2d 85 3e | 29 00 00 24 56 cc b0 4f af 68 49 01 85 6b 57 3a | 2e bf 2e 45 7c 71 09 75 a1 1e fe 83 ec 88 f6 fe | d7 b8 8a 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 3a 80 78 a8 ce 4e 37 f2 7e 4e 6e | c2 ec 51 b5 d8 d3 ef c5 00 00 00 1c 00 00 40 05 | 80 dd aa b7 d6 9c 8d 45 3b 70 75 ca 6b f3 11 7a | 54 5b 54 8d | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #147 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c9 49 59 84 c8 e5 a9 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #147 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #147 | rejected packet: | c9 49 59 84 c8 e5 a9 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #147: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34800d120 | handling event EVENT_RETRANSMIT for parent state #177 | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #177 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #177 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49616.056979; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00284 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #177 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 "road-eastnet-nonat-177" #177: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #177) | 18 be 44 9b 6e ed 30 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 07 e3 cb ba 41 f5 29 89 53 b2 f3 1e 5e 07 87 | e1 d5 ed d4 f7 64 97 f7 8a 96 5e a4 19 72 f5 99 | db af d0 a6 4b 51 f7 55 92 f6 5e e0 30 09 2c b6 | 43 a0 4f d7 6f e1 d3 20 57 34 04 7c 3d 9a 99 83 | f9 a3 8a 6a fe fe a9 91 f2 83 44 a1 2d af 4b ef | b0 18 e4 e4 62 e5 83 a7 cf b5 7d ca 15 6b 57 02 | c4 53 c6 7f f4 9f 1d 3d 3b b0 8c b2 2b 17 6d 36 | 19 38 bf 55 ce 8a 72 4f 20 1b a4 9c a2 84 da e5 | 7c f0 4b de 9a 22 9d 10 b8 0c f6 b5 af 79 8d d9 | c7 ca 65 16 d7 e0 a1 a8 7f e6 15 6a 53 ef 5b f4 | a2 b4 0d 9c 61 31 ea 4a 75 b2 62 d9 d6 fe 75 27 | 38 c2 d0 97 b9 a4 b7 2c 60 e6 08 ea 3f 0a 15 59 | f6 77 c4 7c d1 46 84 4f f2 09 1e c0 00 e1 c8 65 | bf 5e 6f 2d 94 6e 4c d7 96 38 7b ba 94 5a e8 e2 | 2f d6 8c 88 2d de 4f ca 52 aa 70 7a c4 e8 89 b2 | cf 3d 59 65 f1 b7 65 b1 ff 08 3f df 87 d6 e3 b4 | 29 00 00 24 06 53 6b 3a e9 83 68 db aa 70 45 4d | fe 90 0e f2 c3 a1 be 18 1d d8 e7 bb b9 75 13 f1 | bb b6 76 91 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 1b 1a a2 88 2e 9b 85 cb bf 3f e0 | 58 f8 7a 1a ca d0 ae de 00 00 00 1c 00 00 40 05 | 46 28 df e2 d1 63 c9 0b 29 af bd b8 e5 56 e6 b6 | 34 92 84 18 | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800d120 | #177 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 18 be 44 9b 6e ed 30 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #177 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #177 | rejected packet: | 18 be 44 9b 6e ed 30 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #177: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #195 | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #195 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #195 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49616.061343; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500638 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #195 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 "road-eastnet-nonat-195" #195: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #195) | 37 e6 90 db 14 bc bf 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 53 c9 77 b4 f3 d5 4d 42 00 37 51 2c 1c 68 3c | f1 54 0f 7a 55 d8 cb dc 59 bb 2f b5 96 8c 4e d4 | 85 27 5a ea f2 a7 4d 9e 5a 6b ee c6 28 a0 d2 57 | 71 7a 7b 0b 80 39 ac 27 cd 87 0d ef e4 ef af 3a | d6 b3 f6 12 c5 5f 2f d9 cd fb 17 d4 43 5e 16 c4 | 87 67 d1 70 07 84 e5 8e 71 91 de 30 59 cc e6 ee | 34 fb c0 51 e2 87 5b 7e 3f 08 db 50 ff 54 7a b1 | bd cb 77 92 50 41 31 65 47 73 69 2a fd d6 77 f3 | b0 89 f6 8e e2 6a 07 fc af 84 ca d3 f2 87 73 27 | c4 cf 2d 21 63 f5 8f 71 28 70 95 02 a0 27 ac 78 | a4 bb 1e 75 dc be 0d b4 ad 92 30 f8 7c 7f 5d 71 | a5 c9 9d 8b 71 f5 b5 68 db 9c 63 56 82 3f 35 f1 | f2 81 65 6a 20 3e b0 68 92 e4 10 6f a0 15 ab a8 | 72 4d 4d 54 b6 ef 0b 2d 62 75 65 6d be 42 39 3d | c4 80 ed ba e2 23 03 5c 4c 11 92 92 a4 9b 70 7c | cd 9d 5e 6a ce f4 42 ce b7 88 b0 01 79 41 f3 ce | 29 00 00 24 9e 21 2f 19 56 de ef 57 88 5d 72 9d | d0 e9 ed cf f1 53 49 64 11 8c ea d8 bc d7 7f b1 | 97 11 98 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be a1 e0 42 82 c4 3c a5 9f 98 67 8d | 2c 4b 8d ec 3b 56 95 d6 00 00 00 1c 00 00 40 05 | 9b 76 ec e0 3b 32 32 e4 22 87 e5 16 97 1d 20 83 | b5 a4 81 66 | libevent_free: release ptr-libevent@0x7fb35c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #195 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 e6 90 db 14 bc bf 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #195 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #195 | rejected packet: | 37 e6 90 db 14 bc bf 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #195: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0669 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-201" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-201' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #201 at 0x557d46ae6900 | State DB: adding IKEv2 state #201 in UNDEFINED | pstats #201 ikev2.ike started | Message ID: init #201: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #201: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #201; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-201" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-201" IKE SA #201 "road-eastnet-nonat-201" "road-eastnet-nonat-201" #201: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-201 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-201": constructed local IKE proposals for road-eastnet-nonat-201 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 201 for state #201 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2cb90 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #201 | libevent_malloc: new ptr-libevent@0x7fb35c01d920 size 128 | #201 spent 0.155 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-201" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.234 milliseconds in whack | crypto helper 1 resuming | crypto helper 1 starting work-order 201 for state #201 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 201 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 201 time elapsed 0.000979 seconds | (#201) spent 0.984 milliseconds in crypto helper computing work-order 201: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 201 for state #201 to event queue | scheduling resume sending helper answer for #201 | libevent_malloc: new ptr-libevent@0x7fb38803dab0 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #201 | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 201 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #201 | **emit ISAKMP Message: | initiator cookie: | 5f 8c 2f 98 2a b9 f9 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-201 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c7 72 1b 4b d5 18 dd 2d 5a 73 d0 41 7c 7e 89 a9 | ikev2 g^x 19 f8 4b 62 c1 9f f8 9d ff 76 0b e2 1f 44 b2 65 | ikev2 g^x 43 ea 94 88 bf 44 69 e7 07 70 c1 dc 59 58 cc ff | ikev2 g^x 59 19 82 57 fc 1c 37 9e a0 3e e4 f1 e5 85 09 b8 | ikev2 g^x cc 92 31 ca fd aa 7e e0 16 48 4f 93 4f 42 e6 41 | ikev2 g^x c6 d3 52 7b 4e f3 0c 48 a9 04 ea f5 d3 65 18 f4 | ikev2 g^x 8a 3e 8f 3d 66 71 a1 fb 46 fb e6 68 d4 de 30 4a | ikev2 g^x 77 d7 f7 51 80 44 5e 85 cb 41 c1 dc 19 46 1a 15 | ikev2 g^x 01 41 bb 17 40 1e c9 5b 1b 21 a1 10 c3 62 4c 55 | ikev2 g^x fa d0 3d 43 4e f3 0e a9 19 fd a5 f4 e9 a2 ac b4 | ikev2 g^x 40 11 51 f5 60 d4 30 87 a9 01 d5 04 88 71 af 01 | ikev2 g^x 0d f5 ab c7 33 ac d8 6a 80 db b1 bc 74 30 96 9e | ikev2 g^x f3 e1 bc b7 79 7c 12 ad fa 75 5d d2 23 fd a0 f7 | ikev2 g^x 3c 1c 0b d2 90 e2 83 a1 35 0f 5a b5 72 3d 6d 57 | ikev2 g^x 77 a3 af 0c 6a cb c1 58 a8 44 91 03 d0 f1 c3 69 | ikev2 g^x 53 0b 4f 4c fa 84 4b 60 c6 19 9c a4 39 a4 5b 44 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ae be 08 16 b0 5a 8a 2b 33 7f 9f 5f cb b1 1f 0b | IKEv2 nonce c0 df 08 67 ec 99 94 2a ad 60 2a 4f 52 2c d3 86 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5f 8c 2f 98 2a b9 f9 d3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c9 | natd_hash: port= 01 f4 | natd_hash: hash= 7b 75 8b 84 8e ba 07 72 da 16 0b 96 fb 30 39 ca | natd_hash: hash= 67 c0 9f 42 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7b 75 8b 84 8e ba 07 72 da 16 0b 96 fb 30 39 ca | Notify data 67 c0 9f 42 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5f 8c 2f 98 2a b9 f9 d3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 88 1b f0 23 47 26 b3 be 92 d6 69 de 00 cf 4d 8d | natd_hash: hash= 78 92 34 e3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 88 1b f0 23 47 26 b3 be 92 d6 69 de 00 cf 4d 8d | Notify data 78 92 34 e3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #201 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #201: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #201 to 4294967295 after switching state | Message ID: IKE #201 skipping update_recv as MD is fake | Message ID: sent #201 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-201" #201: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.201:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #201) | 5f 8c 2f 98 2a b9 f9 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 72 1b 4b d5 18 dd 2d 5a 73 d0 41 7c 7e 89 a9 | 19 f8 4b 62 c1 9f f8 9d ff 76 0b e2 1f 44 b2 65 | 43 ea 94 88 bf 44 69 e7 07 70 c1 dc 59 58 cc ff | 59 19 82 57 fc 1c 37 9e a0 3e e4 f1 e5 85 09 b8 | cc 92 31 ca fd aa 7e e0 16 48 4f 93 4f 42 e6 41 | c6 d3 52 7b 4e f3 0c 48 a9 04 ea f5 d3 65 18 f4 | 8a 3e 8f 3d 66 71 a1 fb 46 fb e6 68 d4 de 30 4a | 77 d7 f7 51 80 44 5e 85 cb 41 c1 dc 19 46 1a 15 | 01 41 bb 17 40 1e c9 5b 1b 21 a1 10 c3 62 4c 55 | fa d0 3d 43 4e f3 0e a9 19 fd a5 f4 e9 a2 ac b4 | 40 11 51 f5 60 d4 30 87 a9 01 d5 04 88 71 af 01 | 0d f5 ab c7 33 ac d8 6a 80 db b1 bc 74 30 96 9e | f3 e1 bc b7 79 7c 12 ad fa 75 5d d2 23 fd a0 f7 | 3c 1c 0b d2 90 e2 83 a1 35 0f 5a b5 72 3d 6d 57 | 77 a3 af 0c 6a cb c1 58 a8 44 91 03 d0 f1 c3 69 | 53 0b 4f 4c fa 84 4b 60 c6 19 9c a4 39 a4 5b 44 | 29 00 00 24 ae be 08 16 b0 5a 8a 2b 33 7f 9f 5f | cb b1 1f 0b c0 df 08 67 ec 99 94 2a ad 60 2a 4f | 52 2c d3 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 75 8b 84 8e ba 07 72 da 16 0b 96 | fb 30 39 ca 67 c0 9f 42 00 00 00 1c 00 00 40 05 | 88 1b f0 23 47 26 b3 be 92 d6 69 de 00 cf 4d 8d | 78 92 34 e3 | state #201 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c01d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2cb90 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #201 | libevent_malloc: new ptr-libevent@0x7fb35c01d920 size 128 | #201 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49616.093382 | resume sending helper answer for #201 suppresed complete_v2_state_transition() and stole MD | #201 spent 0.466 milliseconds in resume sending helper answer | stop processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38803dab0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f 8c 2f 98 2a b9 f9 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #201 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #201 | rejected packet: | 5f 8c 2f 98 2a b9 f9 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #201: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a32290 | handling event EVENT_RETRANSMIT for parent state #148 | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #148 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #148 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49616.100937; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003427 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a52c90 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #148 | libevent_malloc: new ptr-libevent@0x7fb38803dab0 size 128 "road-eastnet-nonat-148" #148: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #148) | 7c 0d 88 21 0c f2 96 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 04 bc 64 c4 a9 25 09 2d 75 95 3b 11 b4 ff 15 | 97 7a 18 93 a6 88 e9 2c b9 6a 56 2f 0c f9 8a d8 | e8 e9 8c f3 6e a2 1a 4d de 32 b3 62 b7 1f cf 21 | 58 10 7d f4 24 b5 81 70 c7 68 14 37 9d fd 00 6b | b4 bb f2 40 cc b3 6b 23 df e5 3d 42 b5 d1 d7 42 | c0 5c ac 6a f7 66 60 50 9f bf be d5 78 f9 b4 31 | b1 86 de 30 ed 54 6a fc f4 65 4d b6 71 b3 0e 10 | 8b ff f6 ba 06 b3 35 4f f4 27 dc 02 7d 26 88 9b | ce 4c 6b f4 f0 e1 8d 43 1e f3 4c 5f ec 71 b9 2c | e9 3b 85 fd 08 23 e1 df 81 46 1d 11 72 44 8f d9 | 74 89 1c 9f d5 79 90 5f cf 86 54 f4 23 c9 c4 31 | af 2e 84 a4 ff ec cf b7 ba 60 46 0a 15 eb 88 9e | 1a 9f 61 a8 80 c2 60 68 d5 be 6e 09 41 6f c1 fc | 1b 37 54 8c 93 b5 3d fd bd 96 aa 9b bc 05 8d 2f | 00 4c 54 bb 3b 96 94 4f 45 ac 6c 6e b1 21 ad e3 | 8b d3 f2 47 fe 35 bf 98 09 a6 a6 c8 c9 12 c2 70 | 29 00 00 24 b1 81 e7 c9 15 f6 0b 96 d5 74 cc 65 | 51 5c df 58 13 0b 15 8c 15 4d e2 64 8b 9f d6 7a | 91 6a aa 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 56 10 9c c6 bc 82 78 34 d0 03 57 | 7a d1 bd 45 e3 1a b3 5c 00 00 00 1c 00 00 40 05 | 74 be 93 cb aa 1f 0e 04 cc 93 49 b7 b1 e0 d6 3d | b3 9a 6d 48 | libevent_free: release ptr-libevent@0x7fb37c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a32290 | #148 spent 0.188 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 0d 88 21 0c f2 96 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #148 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #148 | rejected packet: | 7c 0d 88 21 0c f2 96 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #148: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.047 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cc10 | handling event EVENT_RETRANSMIT for parent state #94 | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #94 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #94 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49616.128099; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.017453 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a32290 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #94 | libevent_malloc: new ptr-libevent@0x7fb37c009640 size 128 "road-eastnet-nonat-94" #94: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #94) | c4 af dc f4 22 ca 1a 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b8 0d 8e 0d 24 fa 48 9f 6f 70 45 44 af 29 03 81 | fb 75 7f 29 b1 65 5b 6b f3 dc dc e0 d1 ea 65 d0 | 45 a3 5f 01 d6 e7 51 37 b4 25 82 eb 71 98 d8 b2 | 75 57 7a 0e db af 40 2b 1a 10 c2 e4 b7 7e 18 39 | 54 3c 4a ec 4d d5 3a 2e ab bd e0 80 1e 0f e2 b5 | e4 a9 bf ef 3b ba fe af b1 7b cb 8a 16 e9 8c 65 | 20 92 b8 a2 66 75 85 84 5a e4 4c c5 4e 4c dd 10 | 51 c2 7a 85 78 58 a1 10 d6 cf c5 6b e8 22 f2 d1 | 41 df 6b 5c 73 f6 87 2e 17 45 1b 75 b8 bd 3d 9e | d2 3e d8 cd d1 d8 9e 58 23 f3 68 0b e1 b8 89 69 | 76 b7 7e 92 6a 4a 5b 2c 36 99 61 9d bb 09 19 68 | e0 83 4b 97 a3 48 26 96 74 a7 da 5f 7d b7 55 9e | e3 e8 68 32 6b 6e 35 3d 26 d7 4f 19 6d d6 44 17 | 3d 23 4c ff 1c ff e3 77 85 72 fa 85 64 76 2e ac | 5a 7b 31 bf 7b 44 eb 9a f4 5c 9d 72 ec 95 e5 4e | fc 10 63 57 5f 09 74 f6 c6 17 bc 05 7d ea 5c 13 | 29 00 00 24 c5 77 30 ba 9e 22 45 4a 1a af ea 19 | 02 b6 fb 3a f7 c7 ff 86 e4 75 07 62 09 1a 17 15 | a7 99 2d 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d bd d3 d9 55 1d 16 4d 34 06 fd 91 | 92 b6 52 35 3e d3 c6 4f 00 00 00 1c 00 00 40 05 | 83 77 03 33 97 20 84 34 b1 e3 aa 6c 05 af 74 6e | f0 8d d0 a3 | libevent_free: release ptr-libevent@0x7fb3780180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cc10 | #94 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 af dc f4 22 ca 1a 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #94 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #94 | rejected packet: | c4 af dc f4 22 ca 1a 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #94: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0577 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a986c0 | handling event EVENT_RETRANSMIT for parent state #190 | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #190 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #190 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49616.140763; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.014086 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #190 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 "road-eastnet-nonat-190" #190: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #190) | da 8a 0c 65 e6 2b 3c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 54 17 f8 a5 01 f3 68 22 77 c6 18 00 12 b3 14 | 54 3d f4 b3 34 1e fd 72 0e 4d ab df e8 2f e1 56 | d7 6e 5a 40 eb 22 8c 08 69 45 e9 fd 19 98 3c aa | 8d 83 ce d6 37 74 60 c8 87 61 28 d5 63 be 48 e9 | ac f9 f7 e4 f2 02 da 1e ec 22 1e 5a d2 5a 2b 8a | 3b 57 71 3a 73 29 7d d1 21 cb fe 25 7a 4a 44 7a | d3 e0 2e 8b b0 82 19 e0 d0 d4 ad 62 8a eb ad 5f | cd 5f 01 c2 97 9c ca 0a 84 fd e9 c6 24 7d a2 13 | 18 78 86 de 18 44 7c 6e 03 a7 c1 8c f5 10 72 e4 | 18 35 f0 48 fd 3b 9d 06 d6 b2 cc 32 8d c8 ab 02 | 22 2a e1 65 5c 07 67 dd 84 00 eb 6c 69 e6 d9 74 | 15 08 fb 78 e2 63 d8 e3 71 dc a5 a7 be b4 49 92 | ca 4f af 55 e1 5d c5 43 c7 03 58 76 b8 41 c6 a2 | f8 e5 96 26 df 8f 3c ed b5 1d 45 31 66 bd 99 75 | c9 f2 c5 21 dc 35 1b 0a 99 75 5d 5c a4 07 02 4f | 98 82 da 07 a8 27 6d 15 d8 05 50 39 0a b9 0a 99 | 29 00 00 24 f4 39 3c cf b3 b2 13 92 d2 3b 37 9f | 62 32 43 c3 74 37 47 22 30 dc 01 af 01 09 20 fa | 09 9a 8b e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6f a0 3a 65 d8 4c 58 fb ee 8d a7 57 | 94 7e 0d f0 9d 14 5d c2 00 00 00 1c 00 00 40 05 | c2 56 8a f7 34 3a b7 10 07 49 00 4f af 85 84 af | 10 cb 7b 4a | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a986c0 | #190 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a4ebd0 | handling event EVENT_RETRANSMIT for parent state #196 | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #196 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #196 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49616.140945; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.503907 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a986c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #196 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 "road-eastnet-nonat-196" #196: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #196) | 56 d5 c7 24 09 fd 90 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 8f 70 c3 ed 41 cd d6 d2 1b f8 2a 49 7b d2 65 | 1d 48 5c 44 f7 09 ac 3e 9c 08 81 f6 b3 65 8e 9b | 4e f9 50 8c c8 e7 7b 20 7c 22 4e ca 64 9d 3b 78 | 6f 58 b3 9e 1c 75 62 70 7c 61 ef 34 cb 86 a6 1c | 58 51 2c 23 30 92 4a 45 b4 b8 ae 94 76 05 b8 97 | 44 53 83 e4 01 1b 12 69 e8 13 a8 21 92 4d 3c f0 | 3d 68 d7 2a 32 bb e5 1c b4 56 88 6b 46 1e 40 2b | 43 ea 27 d3 55 2f cf 9a 31 8f 09 d3 05 58 fd 61 | 42 c4 db 9a 42 0a 57 3b 19 4b c6 5f d6 ea 27 6a | 7f bf 49 6f e7 37 63 cd b0 56 7c d1 00 23 b6 75 | b5 9d 85 99 73 08 5b 3f 63 22 53 47 75 51 36 9e | 7d c3 2d 34 ef d2 c8 dc ed 30 18 e1 fc d9 f1 f0 | 6e d9 74 09 8b e8 94 06 ae aa 96 8e cd d8 85 a8 | 1d 1c c6 45 d2 df a8 88 f7 4f 9f 49 92 80 ca a3 | 24 f7 b2 76 f6 e9 c7 34 75 8f 12 25 2f 88 bf 00 | af 80 e2 a0 d5 42 a1 0f 8a 93 9d 2c 68 e7 dc 08 | 29 00 00 24 ed 57 45 ce d5 85 17 38 4f bc 48 45 | b8 48 4b 6f c9 94 96 34 41 c5 a0 9e ee f3 85 65 | 17 35 60 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 33 d1 79 b1 42 18 cd cb 66 ed 21 | 50 1a 62 22 98 16 96 33 00 00 00 1c 00 00 40 05 | 37 d9 a8 f6 16 ad 1f 94 88 50 6d 18 f9 5d 91 a6 | 7a d6 46 08 | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | #196 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 8a 0c 65 e6 2b 3c 3b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #190 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #190 | rejected packet: | da 8a 0c 65 e6 2b 3c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #190: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 d5 c7 24 09 fd 90 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #196 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #196 | rejected packet: | 56 d5 c7 24 09 fd 90 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #196: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.056 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61bd0 | handling event EVENT_RETRANSMIT for parent state #178 | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #178 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #178 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49616.145257; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003326 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #178 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 "road-eastnet-nonat-178" #178: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #178) | ca 8e d5 21 04 56 f5 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 67 d8 60 5f 40 63 92 f2 6d b4 ba f5 02 b8 ef | 38 7a 12 cd 11 ce 9d 9b 17 62 5f df 94 e9 07 b5 | 67 9d c2 aa a5 fe a1 11 f4 ad b8 0d 63 27 26 1e | d8 17 fe 6f e7 68 09 0e 02 53 a4 bf 49 a0 db 19 | df 91 5e e9 b7 6f eb 81 53 29 3b eb 8c 48 64 ce | 19 01 46 02 e1 7d 00 12 d7 22 72 65 96 38 74 47 | fc 95 5b de f7 59 12 e1 89 c8 7c b4 26 93 4b 67 | 78 1e d0 18 c0 19 90 65 2b 34 10 55 57 cb 01 6d | c4 3f b5 2b 33 1e 80 2e 70 90 f3 a0 65 bd de 46 | 7d 2e 31 80 28 5c 82 45 70 58 e1 27 1c 57 b4 3b | 35 12 78 64 02 e3 69 39 84 d2 f4 a5 19 f1 96 0b | b4 1f 01 e4 be d8 4f ee 70 c6 2d 15 1b 96 dd 0a | 64 1f 43 c4 0e c9 83 9e ef 67 e0 c2 2c f3 12 d0 | 79 5e f6 25 ee e3 f8 a3 fa 94 d3 a2 a3 89 7b 98 | 74 09 e9 86 33 de 66 6c 13 2b 07 44 f9 44 67 9b | 43 01 93 ea 4d 3f aa bd f6 c6 55 44 dd 66 4b d4 | 29 00 00 24 2e 3d 1e d2 58 00 63 7b ef e7 79 ba | 26 0d 83 e4 01 3b ff 2b eb 29 12 83 06 3e 6a dc | 34 f9 2f 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 2f 67 46 e9 ec d0 44 c4 cc 2f 43 | d4 84 bf d5 2b 37 9d e7 00 00 00 1c 00 00 40 05 | 39 35 73 9e a6 30 0e 5d 9d 4e 3c 93 77 b7 78 c9 | 08 75 bf c2 | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61bd0 | #178 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca 8e d5 21 04 56 f5 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #178 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #178 | rejected packet: | ca 8e d5 21 04 56 f5 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #178: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abfd80 | handling event EVENT_RETRANSMIT for parent state #149 | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #149 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #149 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49616.168578; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003869 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #149 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 "road-eastnet-nonat-149" #149: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #149) | ec 1b 62 37 44 a3 17 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 08 91 37 b8 3d c4 a5 fb 8f 59 2b cb c4 ee a3 | 59 01 01 81 cd 69 2d 85 93 60 f7 65 1f 64 aa eb | 93 60 17 84 59 2d ec 44 26 cf 20 fe db 7e d9 f6 | 7d a2 69 c3 4c ed d8 f3 0a 6b d4 5b e7 47 78 e3 | 80 3c 2c 01 cd d6 a8 65 7e cc 13 22 72 38 45 64 | 17 76 db 68 fd 9e 02 c1 4e e0 91 4f 14 0c 06 72 | 4e df 03 59 bc 72 4f af 9f 27 39 bd 57 c8 9d e1 | 90 f7 3b a1 d1 79 66 94 af 42 c3 62 cd d5 2d cd | ac 6c ea d6 94 1b f4 91 4d ad 49 21 48 4b 36 1c | 53 18 c6 23 73 5e 40 ed e6 7e 6a 25 d8 dd ef 07 | 7d 88 f4 a9 e1 ff e9 29 7d 10 cf 47 92 a2 72 35 | 95 c9 53 7e 8d f1 bb ba 54 1d 40 b5 a0 d1 1e d9 | 0b 86 d8 2d 01 1a 34 e1 77 f0 c8 57 84 a9 f4 dc | 35 1f 8e bc 5d f2 ca 58 ec a1 ad a9 cd 45 4a 2d | 23 38 26 ab df a9 05 75 cd 84 d4 66 7c be 9c f9 | 7f e7 96 6a 2b a4 d6 b4 04 50 ef ba e8 3c eb 60 | 29 00 00 24 f6 11 7c 5d 38 85 36 80 dd ed f7 d5 | 65 1c 39 a3 95 3d e4 a2 88 84 cf 2f 03 e4 0d 86 | 6f f9 18 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 49 c3 fc 0d 4b 5b dd c8 8b e4 44 | 1a 6a 18 02 f4 d1 ea f3 00 00 00 1c 00 00 40 05 | 4e f4 0c 8d 48 4d 9f e4 0b 19 05 64 48 99 98 79 | d2 ff 3d 6d | libevent_free: release ptr-libevent@0x7fb3380251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abfd80 | #149 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 1b 62 37 44 a3 17 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #149 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #149 | rejected packet: | ec 1b 62 37 44 a3 17 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #149: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0656 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-202" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-202' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #202 at 0x557d46ae7ec0 | State DB: adding IKEv2 state #202 in UNDEFINED | pstats #202 ikev2.ike started | Message ID: init #202: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #202: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #202; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-202" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-202" IKE SA #202 "road-eastnet-nonat-202" "road-eastnet-nonat-202" #202: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-202 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-202": constructed local IKE proposals for road-eastnet-nonat-202 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 202 for state #202 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46abfd80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #202 | libevent_malloc: new ptr-libevent@0x7fb3380251c0 size 128 | #202 spent 0.158 milliseconds in ikev2_parent_outI1() | crypto helper 2 resuming | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 starting work-order 202 for state #202 | RESET processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 202 | RESET processing: connection "road-eastnet-nonat-202" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.257 milliseconds in whack | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 202 time elapsed 0.000963 seconds | (#202) spent 0.971 milliseconds in crypto helper computing work-order 202: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 202 for state #202 to event queue | scheduling resume sending helper answer for #202 | libevent_malloc: new ptr-libevent@0x7fb38003dab0 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #202 | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 202 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #202 | **emit ISAKMP Message: | initiator cookie: | 98 0c a0 3b 8e c3 04 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-202 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f2 4a de 90 9e 09 12 3c c9 7a 03 ab 1b f1 18 11 | ikev2 g^x 66 c3 f7 79 15 3a 95 02 ba e1 c3 e1 f6 5a 7b 34 | ikev2 g^x 8e de 4d 10 9a e1 70 a5 55 9d f4 c1 17 92 7c df | ikev2 g^x 68 e1 17 a5 99 1c fb 35 b9 25 cd 23 53 a8 26 d2 | ikev2 g^x b4 87 e9 2f e3 5a ea 45 0a 90 48 f4 6a 56 94 50 | ikev2 g^x e4 57 95 d6 52 83 af 6a c6 31 70 b1 c4 d3 c8 6b | ikev2 g^x cf c5 42 e4 73 01 2f be 13 4a 08 6e a7 91 68 14 | ikev2 g^x ad a5 a0 e4 14 1f a0 f2 00 98 4c ce c7 d5 c0 b6 | ikev2 g^x 15 77 5c 51 52 78 e1 34 5c df ff 32 7c 7c eb 4c | ikev2 g^x 74 06 ff d8 24 f4 34 27 4b f7 4d 5c de 29 22 32 | ikev2 g^x 61 0e 41 b1 a4 d1 44 ff 96 54 64 39 71 47 b7 07 | ikev2 g^x 8b 2d f1 7b c7 ff 29 67 2b 47 cf 64 2a ba 75 f5 | ikev2 g^x b7 8f 94 01 0c 73 d3 d0 a0 ca 7b 5c 80 ff e9 5a | ikev2 g^x df 27 66 99 d5 41 03 93 26 82 2e 43 c1 d3 4e 98 | ikev2 g^x 2a e1 9f 1a 15 c9 bf 3d d7 73 59 c0 eb c5 7f 3c | ikev2 g^x 4c 61 b0 05 20 29 0a b9 6b bf 44 e2 c1 1a 84 6d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 99 ea 46 58 fc ef 28 85 a0 72 43 c8 36 86 2f 35 | IKEv2 nonce 31 69 ef db 0d c0 f1 46 4d af df db 48 57 6f 8f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 98 0c a0 3b 8e c3 04 dd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ca | natd_hash: port= 01 f4 | natd_hash: hash= 17 23 33 21 68 f3 9f d6 75 73 74 16 0f 96 1b 0a | natd_hash: hash= 5a 2e 12 b4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 17 23 33 21 68 f3 9f d6 75 73 74 16 0f 96 1b 0a | Notify data 5a 2e 12 b4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 98 0c a0 3b 8e c3 04 dd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9b b4 ff f5 5e e8 7e 5a 50 28 47 10 22 d7 72 89 | natd_hash: hash= 2b d0 c4 98 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9b b4 ff f5 5e e8 7e 5a 50 28 47 10 22 d7 72 89 | Notify data 2b d0 c4 98 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #202 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #202: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #202 to 4294967295 after switching state | Message ID: IKE #202 skipping update_recv as MD is fake | Message ID: sent #202 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-202" #202: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.202:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #202) | 98 0c a0 3b 8e c3 04 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 4a de 90 9e 09 12 3c c9 7a 03 ab 1b f1 18 11 | 66 c3 f7 79 15 3a 95 02 ba e1 c3 e1 f6 5a 7b 34 | 8e de 4d 10 9a e1 70 a5 55 9d f4 c1 17 92 7c df | 68 e1 17 a5 99 1c fb 35 b9 25 cd 23 53 a8 26 d2 | b4 87 e9 2f e3 5a ea 45 0a 90 48 f4 6a 56 94 50 | e4 57 95 d6 52 83 af 6a c6 31 70 b1 c4 d3 c8 6b | cf c5 42 e4 73 01 2f be 13 4a 08 6e a7 91 68 14 | ad a5 a0 e4 14 1f a0 f2 00 98 4c ce c7 d5 c0 b6 | 15 77 5c 51 52 78 e1 34 5c df ff 32 7c 7c eb 4c | 74 06 ff d8 24 f4 34 27 4b f7 4d 5c de 29 22 32 | 61 0e 41 b1 a4 d1 44 ff 96 54 64 39 71 47 b7 07 | 8b 2d f1 7b c7 ff 29 67 2b 47 cf 64 2a ba 75 f5 | b7 8f 94 01 0c 73 d3 d0 a0 ca 7b 5c 80 ff e9 5a | df 27 66 99 d5 41 03 93 26 82 2e 43 c1 d3 4e 98 | 2a e1 9f 1a 15 c9 bf 3d d7 73 59 c0 eb c5 7f 3c | 4c 61 b0 05 20 29 0a b9 6b bf 44 e2 c1 1a 84 6d | 29 00 00 24 99 ea 46 58 fc ef 28 85 a0 72 43 c8 | 36 86 2f 35 31 69 ef db 0d c0 f1 46 4d af df db | 48 57 6f 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 23 33 21 68 f3 9f d6 75 73 74 16 | 0f 96 1b 0a 5a 2e 12 b4 00 00 00 1c 00 00 40 05 | 9b b4 ff f5 5e e8 7e 5a 50 28 47 10 22 d7 72 89 | 2b d0 c4 98 | state #202 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3380251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46abfd80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abfd80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #202 | libevent_malloc: new ptr-libevent@0x7fb3380251c0 size 128 | #202 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49616.185376 | resume sending helper answer for #202 suppresed complete_v2_state_transition() and stole MD | #202 spent 0.473 milliseconds in resume sending helper answer | stop processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38003dab0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 0c a0 3b 8e c3 04 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #202 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #202 | rejected packet: | 98 0c a0 3b 8e c3 04 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #202: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c7c0 | handling event EVENT_RETRANSMIT for parent state #197 | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #197 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #197 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49616.219574; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50007 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #197 | libevent_malloc: new ptr-libevent@0x7fb38003dab0 size 128 "road-eastnet-nonat-197" #197: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #197) | 76 fd 06 22 f8 72 39 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff 68 ad 96 cd 76 be 78 ca de ba cf 7d b8 d2 27 | eb 47 3d ab 5c da 69 f4 c0 aa ef 37 1d c8 bc 64 | b3 77 c8 06 c7 c1 ca 6e ba 13 a5 88 a0 2f 7d 28 | 77 76 19 e0 b9 08 19 f4 ea 19 57 8a 4a c5 51 64 | b2 b3 06 1d b7 55 89 e3 2f 55 c2 0a 68 16 ae bf | bc 84 d6 24 e3 0d 3a 6d 7f b0 26 cf fc 83 69 6f | 06 6c 19 78 05 aa 1a a7 a3 53 01 3e 4f 01 0c e2 | b6 b8 5e d8 44 74 c4 4a 7b 03 78 a3 0d 18 93 01 | ca 83 a7 98 02 8f 9a c5 fb 52 4a 95 fa 85 65 9f | 48 a4 30 21 ca 8f d8 e0 98 f5 f9 49 2a 0a 5a b1 | e0 a0 a3 25 65 8b 86 36 1d 17 ff 3c 76 35 24 e3 | b6 f7 d8 e5 22 2f 0d 80 58 07 89 c1 b8 b9 b6 a3 | ac a9 f3 74 55 c9 1c c7 ef 2f b9 00 be f9 d3 c9 | 30 e9 ef 92 c0 ce 36 02 ea 19 c8 d7 f7 c5 6a 1c | b8 72 5b 69 21 d3 b8 ca 13 78 68 f5 5e 6f 80 64 | 1c aa ea 24 03 ee 29 9b c1 bb 83 e4 a6 7c 10 08 | 29 00 00 24 74 4f 18 14 83 36 22 20 12 7b 44 86 | f2 c1 e1 0b 40 a8 83 e6 1a 42 e2 88 a2 98 21 31 | 2c b2 85 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 2f 89 09 b5 52 02 b8 23 bc 44 51 | 94 1d 2d 47 4e ed 65 d6 00 00 00 1c 00 00 40 05 | 73 fc 3d fb 5c fa a5 ca c9 53 fd 67 5c 67 b8 86 | 11 c4 a6 88 | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | #197 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 fd 06 22 f8 72 39 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #197 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #197 | rejected packet: | 76 fd 06 22 f8 72 39 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #197: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad17c0 | handling event EVENT_RETRANSMIT for parent state #179 | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #179 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #179 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49616.2229; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.01077 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #179 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 "road-eastnet-nonat-179" #179: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #179) | b7 0c 53 b0 d6 55 ba e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 e7 aa 3a d2 93 3a b1 f3 2d ef 15 4a db bc fb | 18 f2 f0 2f d7 d8 6d f1 e0 2e 7d 29 59 b1 d6 21 | e4 35 ac b2 5c fa 8c 68 d7 56 48 2c 90 1a 63 31 | 37 9f fa 36 a0 bf f8 7e a9 36 73 05 48 39 6c 08 | e9 ae 8d 6f c7 ab 9c 0b dc b9 88 2c 91 ea 94 a4 | 59 7b a5 d7 8e b8 d2 97 70 12 0b 31 b0 2a d1 31 | eb e4 69 dc 81 ca 29 66 be 80 6d 1a c2 c0 f9 06 | 99 5a 19 63 89 a6 4b 85 38 ed a4 d0 df b0 06 34 | 93 de d4 51 e8 02 b6 ef 9c b9 23 ed 94 d4 3f 30 | ed 82 5a 99 89 3b af 7c 11 96 d9 f0 92 93 d2 4f | 04 c6 5c f3 49 5b 49 5d bc f7 66 01 86 c2 c8 a2 | d8 ee 9a a2 a9 a0 e8 45 16 a7 7f a0 45 50 f6 f0 | 8b 1c 98 0a f0 a8 07 43 b8 bc ec e9 38 ec 58 b8 | 3b 0d b2 96 d1 71 70 f7 1c 22 9f 03 fc f8 39 95 | 81 cb 62 38 1d 55 75 60 24 db a4 45 80 e8 81 2f | df c7 ac c2 4c be 19 14 89 79 da 68 5f ad f7 81 | 29 00 00 24 af 43 c4 7a 3d 3b b5 29 a0 89 4a e7 | b1 1d 19 14 88 65 8d 60 36 ce d7 11 01 48 56 1b | 05 16 7d 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 78 e7 1d 9d 7c 1d 2a b3 39 b5 dd | b4 d7 38 76 a1 49 48 f7 00 00 00 1c 00 00 40 05 | 86 2a 8d 44 0e a3 13 1a 2d e3 72 66 a4 35 f9 18 | 8b 41 6c dc | libevent_free: release ptr-libevent@0x7fb35402a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad17c0 | #179 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 0c 53 b0 d6 55 ba e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #179 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #179 | rejected packet: | b7 0c 53 b0 d6 55 ba e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #179: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a011f0 | handling event EVENT_RETRANSMIT for parent state #191 | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #191 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #191 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49616.227614; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001158 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad17c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #191 | libevent_malloc: new ptr-libevent@0x7fb35402a950 size 128 "road-eastnet-nonat-191" #191: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #191) | 85 8f 6a 80 de be 76 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 47 0f 49 e8 87 b7 e4 13 ff fb 5d 9a 22 17 d1 | a7 da b3 32 4a c2 68 c6 3d 29 6b b9 0a 47 72 fb | 44 ba cf 07 42 83 b0 15 52 d5 79 a1 0a cc fd 8c | 03 5d 92 9f bc f2 7f 7a 58 36 93 f8 ff cd 46 92 | 33 75 4c e4 12 5e a1 f8 b3 1e 61 09 80 4a a1 c5 | 5a c7 19 d2 44 74 1d 5d 1d 57 21 f5 83 fe 20 06 | 89 ca 32 09 05 22 51 7a bb d7 0f b2 89 a9 0b 74 | 7c f9 0e 07 47 37 47 69 61 d8 9b ef fb c6 bb 4f | 6f e9 47 2c 3e ce 0c c7 87 a3 c6 a6 6c 56 d1 3e | ff a6 a9 4b d0 b7 79 88 c1 3f b4 9e fc 37 5c 19 | 1d 93 d7 b8 ac 50 69 85 b1 c4 53 e5 5e cc 86 e1 | 99 0a 5b e0 3c 4f fe 9e c8 dd 39 c2 94 6f 36 d5 | 9a 4e 4e dd b3 93 c7 8c d1 85 48 7f 16 2c 4f fb | 42 93 63 f4 95 ff 92 cb fb d6 5a 99 77 ab b8 13 | 67 d4 bf 16 1e 20 38 f7 7c 3d 2c 7c ef 50 6c 66 | 06 df 76 dd 94 55 30 cb 6c f9 4c e3 a8 ba 0c 19 | 29 00 00 24 f0 4e f3 f0 90 16 59 02 63 21 11 a3 | 11 30 40 08 3c fe e4 63 ec 70 ae b0 94 4f 51 4b | 97 b6 49 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c cc b1 ee ce 47 be 7b b0 c4 63 84 | 75 d0 08 1a f9 42 67 0a 00 00 00 1c 00 00 40 05 | 29 7b 9f b8 2f b5 a8 ce c6 6c 30 7d a4 05 33 b3 | 99 4c ae 49 | libevent_free: release ptr-libevent@0x7fb34c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a011f0 | #191 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 8f 6a 80 de be 76 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #191 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #191 | rejected packet: | 85 8f 6a 80 de be 76 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #191: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0699 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #150 | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #150 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #150 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49616.230989; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003283 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #150 | libevent_malloc: new ptr-libevent@0x7fb34c03b0b0 size 128 "road-eastnet-nonat-150" #150: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #150) | 8a b6 09 5a 0a 8f be 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 2e 98 c4 69 1c 50 37 00 a8 8c d0 f1 d2 8c 28 | 94 f1 69 8e be e8 36 fe 99 97 d5 0c 37 4e 1b 26 | 9e e0 4e bd 73 a0 79 f4 5a 6b f2 8d 96 4f 03 3e | 0e 75 44 c8 2c a3 81 79 2e 0b 2e 8f 7d 7f dc f9 | 3f db 53 4d 6e 68 53 6c 49 99 36 00 d7 4f 7e e1 | 7e a7 57 fb ab 9f e1 d6 e7 24 3b 02 1f 12 10 de | 15 c5 08 ce f3 51 03 84 19 e7 47 83 1a 2e 38 c2 | 45 5b ab 60 7e 25 f4 92 0b eb 31 c2 32 59 f7 71 | 30 c7 ef cb 28 48 6e e3 c6 10 bc 9c 64 1e 68 59 | ee 88 40 85 37 40 80 12 7d 99 b2 33 c0 da 4b fb | 3a 39 ae b6 0e 0b 59 93 7d 9a d6 ee 50 27 09 f4 | a0 3a c3 63 a9 ac e9 9b 13 ed 9f a6 df 4f 55 3a | 82 36 63 e6 11 77 4d 54 ff a6 ad fe 0f 97 d9 c1 | 30 72 88 21 1f 78 34 56 b8 51 de f7 62 00 f9 29 | 66 5f d3 86 45 83 9d 48 c9 24 49 11 29 28 62 bd | 6e 8b 60 b5 72 8e cb ea 93 0b fd cb 0c 58 7b 88 | 29 00 00 24 36 30 98 85 8b 67 65 29 82 81 da 88 | 70 5a df 1d 0c c2 0c e8 b9 29 94 59 0f 89 5b 4b | 52 bc 0b a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 25 ba 47 28 1c 0e 38 fd e4 d3 0a | c8 ae 66 94 c0 bd 04 2b 00 00 00 1c 00 00 40 05 | 5a 15 ef 3e 5b 63 8d c2 17 ab ae 76 63 67 33 8b | f3 ee 4c d4 | libevent_free: release ptr-libevent@0x7fb348009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #150 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a b6 09 5a 0a 8f be 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #150 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #150 | rejected packet: | 8a b6 09 5a 0a 8f be 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #150: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0596 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f4be0 | handling event EVENT_RETRANSMIT for parent state #95 | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #95 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #95 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49616.236322; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004865 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #95 | libevent_malloc: new ptr-libevent@0x7fb348009640 size 128 "road-eastnet-nonat-95" #95: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #95) | 04 bb 1c 2b 41 e0 8a 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 79 b0 02 7c 1a 3a 07 ca 11 d1 03 7a 77 85 cb | ae ba 70 1b ee 9d e4 3c fb 83 b0 cf 85 ea f6 b1 | 44 27 5d 05 92 dc 5f 4f 10 d0 a1 c9 ef dd c6 ab | ac a1 db c0 15 56 b1 c8 1f 3b 2a 1e 0e 90 2f d7 | 1a 17 b9 f7 eb 61 37 1e 43 cf 9e 15 29 73 84 5a | a5 ef e1 fb 94 7f 43 bb 78 59 95 64 2c 87 b9 4b | 2e 15 ae fc 6c ec ab 40 45 3d 2f f3 c8 00 44 83 | 12 a7 e2 b8 59 bb 92 ce 59 8c ba f6 68 47 32 55 | e8 20 37 e3 3d d3 1b 3c 4e 84 f3 ae 58 53 16 45 | 58 97 74 47 9d a2 44 2f 81 9e ee 5c e8 ce 37 e9 | 5c 14 3e 89 c4 f1 89 ca 70 e0 1d 7a a9 38 f6 40 | 66 fb 41 8c 9b be 2c ea fc cd 2c ca 26 30 dd f0 | b1 29 6c c0 a6 b8 e6 ad e2 7b ae 2b 83 8b e5 9d | 01 26 d8 0c 5a 11 5f 25 a6 3e 25 b6 0f 26 26 34 | 01 b9 a7 4b b7 42 77 99 87 64 20 bd 67 77 cc 7e | b2 79 54 9b 12 25 7f ea ef 16 57 4a f6 24 75 7e | 29 00 00 24 fc b1 a7 58 88 f4 1b 4f aa 0e 2d d3 | a4 65 ca 66 dc 36 b5 47 7f 16 51 11 a3 c3 71 08 | 58 80 43 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ca 3c bb 33 78 12 9a 1b 10 5c d5 8f | d8 1f d4 ad ee 67 79 04 00 00 00 1c 00 00 40 05 | 61 56 68 61 76 b1 38 9f d6 2b 7a dd 4f cb 90 80 | 12 f2 80 83 | libevent_free: release ptr-libevent@0x7fb3600300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f4be0 | #95 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 bb 1c 2b 41 e0 8a 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #95 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #95 | rejected packet: | 04 bb 1c 2b 41 e0 8a 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #95: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-203" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-203' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #203 at 0x557d46ae9480 | State DB: adding IKEv2 state #203 in UNDEFINED | pstats #203 ikev2.ike started | Message ID: init #203: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #203: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #203; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-203" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-203" IKE SA #203 "road-eastnet-nonat-203" "road-eastnet-nonat-203" #203: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-203 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-203": constructed local IKE proposals for road-eastnet-nonat-203 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 203 for state #203 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469f4be0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #203 | libevent_malloc: new ptr-libevent@0x7fb3600300e0 size 128 | #203 spent 0.139 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-203" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.215 milliseconds in whack | crypto helper 0 resuming | crypto helper 0 starting work-order 203 for state #203 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 203 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 203 time elapsed 0.00072 seconds | (#203) spent 0.726 milliseconds in crypto helper computing work-order 203: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 203 for state #203 to event queue | scheduling resume sending helper answer for #203 | libevent_malloc: new ptr-libevent@0x7fb38403da90 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #203 | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 203 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #203 | **emit ISAKMP Message: | initiator cookie: | 02 57 d9 3d 13 25 98 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-203 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1f 1c fb 0e 8f 43 ac f5 0b 5f c4 59 e2 84 8d ff | ikev2 g^x 93 42 c3 e3 19 35 29 34 62 44 7f 8b b9 60 94 1a | ikev2 g^x 68 20 33 36 7e 07 ef b9 9d 1a c3 c4 e5 e3 be 6f | ikev2 g^x df 48 47 f9 cf 7a 23 fa b8 b9 0f be e3 51 16 88 | ikev2 g^x 65 2c 32 42 a7 de 33 7a 8d 00 20 5f 8c 23 cc 9e | ikev2 g^x fd 93 18 91 08 48 46 f6 9e a4 63 04 36 57 fb 82 | ikev2 g^x db a9 f0 b9 fc 47 88 c1 af a0 52 b6 f2 77 4a 78 | ikev2 g^x 7b 45 5f 81 61 4c a8 5c 40 e9 6e 59 e6 65 a5 7d | ikev2 g^x 8f 67 9e 58 05 f0 0e f3 10 e5 4c 4f bd 20 a3 7c | ikev2 g^x 88 1e 84 95 b7 f3 51 db 65 68 67 47 f1 73 c2 67 | ikev2 g^x 48 a3 dc a1 e1 3f e7 d7 4c f9 dc 2e f5 e0 7c 72 | ikev2 g^x 3d 2f 82 8d c1 ef e8 9c 9c 82 12 27 e5 0a e4 bb | ikev2 g^x af 79 89 91 83 59 68 9b 2f 98 3b 89 0a 25 be 74 | ikev2 g^x c0 0f b6 99 3d 8f b4 39 9b 96 c4 d8 6a 5d 53 81 | ikev2 g^x 43 9d 7a a3 69 c9 61 8c c0 23 f3 33 21 de 95 0e | ikev2 g^x 53 97 be e9 2a e9 9e 71 b5 e7 b9 2b cb 16 40 76 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ad 22 cd 07 aa fe 98 d8 02 52 a4 3c 95 12 5a d9 | IKEv2 nonce ed 8e 49 c5 19 c8 cb b1 88 c1 88 b9 c9 3f 70 93 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 02 57 d9 3d 13 25 98 e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 cb | natd_hash: port= 01 f4 | natd_hash: hash= ed 60 71 59 6f 4c 24 43 8a 9c 00 7b c3 3a 97 05 | natd_hash: hash= f3 23 35 42 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ed 60 71 59 6f 4c 24 43 8a 9c 00 7b c3 3a 97 05 | Notify data f3 23 35 42 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 02 57 d9 3d 13 25 98 e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 0d db 79 a2 0f bb d9 bd 26 88 9d ac d1 d3 87 df | natd_hash: hash= 66 b4 d9 d4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0d db 79 a2 0f bb d9 bd 26 88 9d ac d1 d3 87 df | Notify data 66 b4 d9 d4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #203 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #203: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #203 to 4294967295 after switching state | Message ID: IKE #203 skipping update_recv as MD is fake | Message ID: sent #203 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-203" #203: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.203:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #203) | 02 57 d9 3d 13 25 98 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 1c fb 0e 8f 43 ac f5 0b 5f c4 59 e2 84 8d ff | 93 42 c3 e3 19 35 29 34 62 44 7f 8b b9 60 94 1a | 68 20 33 36 7e 07 ef b9 9d 1a c3 c4 e5 e3 be 6f | df 48 47 f9 cf 7a 23 fa b8 b9 0f be e3 51 16 88 | 65 2c 32 42 a7 de 33 7a 8d 00 20 5f 8c 23 cc 9e | fd 93 18 91 08 48 46 f6 9e a4 63 04 36 57 fb 82 | db a9 f0 b9 fc 47 88 c1 af a0 52 b6 f2 77 4a 78 | 7b 45 5f 81 61 4c a8 5c 40 e9 6e 59 e6 65 a5 7d | 8f 67 9e 58 05 f0 0e f3 10 e5 4c 4f bd 20 a3 7c | 88 1e 84 95 b7 f3 51 db 65 68 67 47 f1 73 c2 67 | 48 a3 dc a1 e1 3f e7 d7 4c f9 dc 2e f5 e0 7c 72 | 3d 2f 82 8d c1 ef e8 9c 9c 82 12 27 e5 0a e4 bb | af 79 89 91 83 59 68 9b 2f 98 3b 89 0a 25 be 74 | c0 0f b6 99 3d 8f b4 39 9b 96 c4 d8 6a 5d 53 81 | 43 9d 7a a3 69 c9 61 8c c0 23 f3 33 21 de 95 0e | 53 97 be e9 2a e9 9e 71 b5 e7 b9 2b cb 16 40 76 | 29 00 00 24 ad 22 cd 07 aa fe 98 d8 02 52 a4 3c | 95 12 5a d9 ed 8e 49 c5 19 c8 cb b1 88 c1 88 b9 | c9 3f 70 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 60 71 59 6f 4c 24 43 8a 9c 00 7b | c3 3a 97 05 f3 23 35 42 00 00 00 1c 00 00 40 05 | 0d db 79 a2 0f bb d9 bd 26 88 9d ac d1 d3 87 df | 66 b4 d9 d4 | state #203 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3600300e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469f4be0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a011f0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #203 | libevent_malloc: new ptr-libevent@0x7fb3600300e0 size 128 | #203 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49616.265163 | resume sending helper answer for #203 suppresed complete_v2_state_transition() and stole MD | #203 spent 0.475 milliseconds in resume sending helper answer | stop processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38403da90 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 57 d9 3d 13 25 98 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #203 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #203 | rejected packet: | 02 57 d9 3d 13 25 98 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #203: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0537 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1da10 | handling event EVENT_RETRANSMIT for parent state #1 | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #1 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #1 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49616.278357; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.015639 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aaa100 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #1 | libevent_malloc: new ptr-libevent@0x7fb38403da90 size 128 "road-eastnet-nonat-1" #1: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #1) | 6c 47 a0 1e 4e 7a e8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 72 0a 33 22 17 06 fc fa 28 91 b3 4f 57 56 e3 | ee 34 d7 20 66 52 7a 35 d8 92 bd 3b 01 15 87 45 | 58 9b 73 12 6d c9 2d 63 ff 30 68 a3 01 b0 11 62 | 0d 6a c8 7a 26 90 7a 07 0b 27 d1 49 b8 5c b5 22 | a1 78 8f 5c ca 62 0b 66 89 cf a4 d3 28 f3 60 65 | c4 0b 09 ab 6c 65 0c 24 ce 5f 6b 9e 2d 74 21 c1 | cc dd a3 d2 b1 b2 d7 b0 e3 c8 e7 e0 b1 08 40 98 | ea 60 7f cb f6 03 0b de 16 74 c6 45 5a 5d fd 06 | 19 e0 e9 1d 81 07 89 02 31 28 9a 67 2f ad 6e 4a | 5d d5 b0 90 bd e1 d1 0c 6f c0 ca db 12 8a 57 f5 | 47 c8 09 2a 1b de 2b dc d0 ab ee bf fc be 4f ae | f0 8e 4b a7 a7 58 e9 98 9f 49 09 09 2b 4d 67 80 | 28 41 88 84 93 b4 f0 c4 d7 78 27 c0 fe b8 4a 13 | 52 ab 44 91 d1 9f f2 59 6f dd 35 3c 1e 70 9c d8 | 9d ab 34 6f 48 48 c0 46 69 91 44 bd 80 07 2d e1 | 42 55 8f bd 8c 53 47 7c 85 94 0c 8c ae 5e 19 a4 | 29 00 00 24 e7 5a 07 18 3f 34 30 d2 f0 5d 94 65 | 65 0d d9 4a 64 02 60 6e 32 ba 95 35 8b ff 59 40 | 3a 8b 9e 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 00 78 5c 8b 16 a5 c0 7d 51 c3 29 | 54 44 32 39 1b 8f 23 e8 00 00 00 1c 00 00 40 05 | 68 e9 c0 40 f1 97 39 51 93 0a 30 e5 6a bd eb d1 | f4 d9 bb 8c | libevent_free: release ptr-libevent@0x7fb37c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1da10 | #1 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 47 a0 1e 4e 7a e8 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #1 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #1 | rejected packet: | 6c 47 a0 1e 4e 7a e8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #1: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0552 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab2380 | handling event EVENT_RETRANSMIT for parent state #192 | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #192 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #192 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49616.29779; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001195 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1da10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #192 | libevent_malloc: new ptr-libevent@0x7fb37c00cf80 size 128 "road-eastnet-nonat-192" #192: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #192) | c8 ff f4 e6 c7 17 a0 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 d3 4a 60 f3 6b 7c bf bf ce 75 aa 6b ec f0 aa | 6f fd 60 63 46 fe 0f ab c7 68 02 df c4 c6 ca 90 | 76 3b 3d fe 56 bf ba a8 ba d0 ca f7 0b 74 9f c5 | d1 05 87 00 01 63 f1 b2 af 9b 1a 75 92 cd 23 75 | 4b c9 10 79 b9 97 80 8d 36 ac 73 a4 c7 b8 fd cc | b1 38 24 08 46 20 a1 f7 27 44 94 85 0d d1 c0 73 | 03 9e 85 e9 52 56 70 2c 82 87 11 d5 67 bd 17 0b | b7 79 e5 dd 43 5b 11 13 e5 80 26 ae 8c 3b 5c 3e | 39 de 54 5e 94 90 b6 94 bf 91 dc dc 3a b0 dc 33 | c2 af e8 1e 41 35 52 7c 14 9d d3 2a 93 8c 0c 2f | 4c dd 47 e3 33 95 7f 32 01 a2 12 1d 55 d6 96 ba | 80 04 ad 84 ae 69 4d 77 46 16 b8 c1 14 67 ff 90 | 15 d3 6f 27 f5 ca 1c 28 65 98 cb 29 af 5a 3d 4d | 38 de 5a e8 93 6e 36 0e 60 ea e1 05 60 eb 23 cb | 78 44 37 ea 66 63 22 ea 85 48 d4 a0 76 12 75 a9 | 2c 64 ca f2 05 fb 36 e8 35 db d2 9f 91 a5 c4 20 | 29 00 00 24 a1 c2 f0 6b 73 a0 8d a3 3d b9 fc 65 | 4f d9 ed 3c 9f 8f 87 98 60 fa 1e 4a fb c7 f1 6c | 8c d3 14 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 12 d3 2e 8d 56 f4 3c 1b 6c 80 b7 | a9 e2 20 50 4b 37 dd 45 00 00 00 1c 00 00 40 05 | c6 22 26 cb ae fa 29 03 74 5f 21 c6 81 1a 29 8b | 43 e3 ee ee | libevent_free: release ptr-libevent@0x7fb37002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab2380 | #192 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 ff f4 e6 c7 17 a0 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #192 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #192 | rejected packet: | c8 ff f4 e6 c7 17 a0 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #192: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.079 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7e490 | handling event EVENT_RETRANSMIT for parent state #151 | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #151 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #151 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49616.299978; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005084 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab2380 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #151 | libevent_malloc: new ptr-libevent@0x7fb37002a950 size 128 "road-eastnet-nonat-151" #151: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #151) | d6 d5 c3 1b 58 0f 5c 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 37 31 25 ac 2b c6 c6 54 4a 25 58 cc 38 99 e0 | ed 33 16 21 c3 45 6a eb 3b a9 cb 98 85 d1 bc b2 | fb 43 f8 dc 85 42 20 a9 d4 7c dc c0 4c df 30 b1 | 6f cb 58 0b 5e 23 e6 14 ea 93 76 de 25 96 78 81 | 99 69 10 aa a3 9f ec 08 71 07 18 69 73 22 c9 ac | 3c e3 bf f1 09 8a 27 19 15 60 45 3d 4e 4f f3 e6 | c0 ab 4b c7 bb fb 2d 92 26 ca 7f de c4 f9 dd 4a | fa 18 2a 06 8c 14 94 9f a3 5d e6 b2 6b b0 ef e2 | 03 7f 7e f8 41 9d 8b 81 6b ea 4b 0b 45 f7 4c 93 | 70 05 72 9a ed 29 ed 3c 18 ca 66 2f d4 84 e6 4b | c1 2d 49 d6 3e cb 03 40 00 76 c7 f7 62 87 c5 1b | 85 d6 9d d1 8f 62 a3 ce 21 63 7a e5 94 35 85 13 | e3 c0 a5 2d 68 e8 0d 1f 37 ec 8c 55 12 d8 2a 1f | 06 81 5f d0 f4 ed e5 b1 5f c7 61 8a f0 5a 81 39 | 9f 6d e8 7f 5c 42 26 99 4f 51 2b 10 a9 6b b8 4c | a4 af 1c 69 f6 99 03 59 f6 8d eb d2 5c c8 04 4e | 29 00 00 24 3f 57 34 15 0e f6 1f 97 00 4e ca 13 | c7 48 27 43 fb 8e ac 87 27 dd cc da bb e1 5d 76 | d8 9b a6 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 1e a1 42 f7 31 41 ef 44 00 e7 a6 | 3d d6 a8 bb 50 6c 59 e3 00 00 00 1c 00 00 40 05 | 29 1a ff ca 49 77 f5 cd 99 41 a4 64 5f 6e 4a e7 | 0f a2 34 de | libevent_free: release ptr-libevent@0x7fb36001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e490 | #151 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 d5 c3 1b 58 0f 5c 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #151 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #151 | rejected packet: | d6 d5 c3 1b 58 0f 5c 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #151: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #180 | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #180 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #180 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49616.310369; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00213 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e490 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #180 | libevent_malloc: new ptr-libevent@0x7fb36001d920 size 128 "road-eastnet-nonat-180" #180: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #180) | fe 73 72 02 92 15 d8 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 07 70 60 c7 56 30 74 c1 b3 ab 81 1b b5 12 a6 | 5b b3 64 05 c5 bb 30 3a 1e 92 5a 22 82 67 57 cb | ec df cc 78 63 1b 82 f2 76 a9 50 bd 80 d2 65 3a | b4 e2 7b 0a a1 1e b4 05 49 bc 96 6f 1f f1 51 36 | c7 6c ca c1 27 98 ee 50 22 95 3e cb c3 ea ef b5 | b6 40 b3 fc db 2f 79 46 a9 ac d5 8e 6f 0a 3a 8d | 7e 51 bf 5f 98 c8 56 24 ad e5 63 d9 fa 96 3f ce | b0 c6 79 3b 61 48 6d fd d7 15 2a 6b 8d 91 68 52 | a6 e1 08 45 fe 40 cd 13 6b e8 f0 74 af 74 46 b5 | 90 2f 5d d8 88 37 08 fa 12 4d 78 ce 41 b7 64 80 | a2 4d 76 43 ea e0 49 cc c2 cc 44 b2 cd 61 27 7e | 3d 40 9b 0b ff 59 99 9d a8 52 49 ee d5 dd 07 2e | 2d 3b 1d 7b e9 b4 f8 d7 66 08 0c c9 41 1c 3c eb | ca 7b 16 c5 f5 de ae 99 52 e3 17 c8 ed 61 56 a0 | 61 ae ef c8 11 73 22 d7 35 ab 44 d5 09 26 21 e1 | 09 c4 17 ac b7 7a 6c 9f bd 3c 11 d1 18 1d 51 88 | 29 00 00 24 9d 80 d3 ad d5 e1 1c 51 35 bd a3 6a | 04 d1 ff 4c 54 9f ed 38 00 a0 89 9d 6d 48 6f b5 | c4 22 6c 99 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 22 7d cd 9d 96 05 69 33 a1 7c ff | fb a1 ed a2 be 25 c7 02 00 00 00 1c 00 00 40 05 | cd 91 7d 35 4a 67 75 33 41 31 18 ee 7e 93 4a 7e | ae 98 50 4f | libevent_free: release ptr-libevent@0x7fb35803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #180 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 73 72 02 92 15 d8 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #180 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #180 | rejected packet: | fe 73 72 02 92 15 d8 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #180: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47e90 | handling event EVENT_RETRANSMIT for parent state #198 | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #198 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #198 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49616.324708; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500423 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #198 | libevent_malloc: new ptr-libevent@0x7fb35803b0b0 size 128 "road-eastnet-nonat-198" #198: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #198) | 38 c2 c3 e5 3e e5 82 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 61 f7 55 c5 c4 5e d0 83 66 79 06 76 ff 91 2f 9b | 12 d0 24 44 db b1 bb 60 15 c5 59 2d d1 18 5f af | af eb bb bf af 0f d5 a7 6d 21 23 3c 7a d5 2f 3a | b3 ef ca 8b 4c db ec bc f0 8c 19 8a b2 60 93 64 | a7 e9 05 44 28 9e 74 5d d9 95 66 66 f7 e5 b4 1f | d5 4f c6 33 f7 6e 5b 80 b4 15 1d 1d 0e 0a 1d ec | d1 57 f6 0c 8a 85 f5 7e b6 52 c9 40 29 cb 30 96 | b6 70 b8 b9 59 b7 f3 5d 39 15 1c 09 f2 d7 22 1a | 2f a6 71 e7 c2 13 1a 03 5a ae 65 2f 9f ab 09 6a | f8 76 83 82 4d 45 c3 9c c4 22 81 0b 0c de 1f 60 | c4 83 6f 80 69 4d fb 9f c9 f8 93 ff f8 9f 02 54 | a0 9a b8 b4 d0 4b 39 8e 82 eb a2 4d fd 53 0b 42 | 08 c3 3b 83 a3 55 58 9c 32 8d d4 50 90 35 7f 36 | 30 25 cb 7b da d7 20 59 55 75 68 f3 54 82 bd 15 | 66 45 d1 d6 73 76 d2 e1 4b 15 1f c3 2a 8d b1 0b | e3 7d 9a 2f f6 14 5c e9 eb 5c bb c0 32 a0 bd c5 | 29 00 00 24 88 f3 29 1f 7c 05 5c 84 29 93 1b 9b | 8b f1 e4 5b 97 f1 d8 9e b8 85 d9 30 2a 5f 45 e2 | 98 31 41 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 05 30 82 a4 eb e3 d3 07 9b b1 ad | f0 ee 15 a7 e9 bb 27 63 00 00 00 1c 00 00 40 05 | 88 8a 68 49 cd fa 13 38 3a 2a 49 e8 1c 37 c8 41 | 63 44 84 75 | libevent_free: release ptr-libevent@0x7fb36401f860 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47e90 | #198 spent 0.189 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 c2 c3 e5 3e e5 82 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #198 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #198 | rejected packet: | 38 c2 c3 e5 3e e5 82 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #198: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0391 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a89740 | handling event EVENT_RETRANSMIT for parent state #96 | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #96 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #96 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49616.342063; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005463 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47e90 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #96 | libevent_malloc: new ptr-libevent@0x7fb36401f860 size 128 "road-eastnet-nonat-96" #96: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #96) | 4d 94 02 39 3c 71 1f ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 27 e8 d9 3b fa 4a fd 06 7e 6c e7 d4 28 0e 9b | df ea 6a b2 fc 9c 70 c8 54 bf db 6f b0 0a 35 03 | f4 08 a8 1f a5 9d 3d d9 36 ba b8 d7 c7 a5 02 b2 | bf b0 56 c5 e8 85 3a 3f 3e 64 27 86 e6 32 36 9e | e3 cb 8f 61 07 7c f1 f7 b9 98 01 dc 75 bf ec 8e | e7 f3 67 03 e1 e0 44 02 7f 11 18 67 70 37 2d 5e | 1b 6f 89 19 20 17 f1 e7 a8 e9 33 cb ea 00 46 56 | 49 ba cc 5d 15 50 da 98 ff 9c 3f 56 7f 50 23 17 | 4f 39 25 c0 2c 24 4b 31 aa 08 bf c3 fa 73 75 f8 | 66 d4 df a2 81 2f b6 b1 85 b3 e1 b9 2c ba cc f0 | 05 a5 8e 76 4a d0 1e 4a 24 c4 b4 b6 c2 9f 5a c8 | d7 f7 62 5f e5 ae 58 69 f5 08 1a e6 3f f8 45 99 | 93 41 5e 16 d1 fa c4 dc dc 43 aa 67 19 5f 0d 6b | d0 93 a7 d0 e0 42 60 37 df bb b8 67 3d be 3f 73 | 01 ab df b7 44 63 b3 2e 2f eb b6 11 c7 6c 12 e1 | 09 64 f6 e9 82 4b 4a d1 f8 5c 86 44 cf 9c 7b 84 | 29 00 00 24 fb b6 a6 14 5d d4 9f d4 3b de f1 45 | f6 4a ea e3 bf d0 33 9e b1 50 af 7d ca 56 7c e5 | 77 5f 83 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 32 ad 1c 75 03 32 df 0c 2b d0 a0 | cb f7 34 b2 23 e4 90 14 00 00 00 1c 00 00 40 05 | 3d 4e a8 fd 45 70 26 15 be c0 96 dc 33 de 8f ea | e2 1a 12 a7 | libevent_free: release ptr-libevent@0x7fb38401cc10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a89740 | #96 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d 94 02 39 3c 71 1f ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #96 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #96 | rejected packet: | 4d 94 02 39 3c 71 1f ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #96: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0576 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-204" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-204' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #204 at 0x557d46aeaa40 | State DB: adding IKEv2 state #204 in UNDEFINED | pstats #204 ikev2.ike started | Message ID: init #204: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #204: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #204; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-204" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-204" IKE SA #204 "road-eastnet-nonat-204" "road-eastnet-nonat-204" #204: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-204 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-204": constructed local IKE proposals for road-eastnet-nonat-204 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 204 for state #204 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a89740 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #204 | libevent_malloc: new ptr-libevent@0x7fb38401cc10 size 128 | #204 spent 0.191 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-204" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.287 milliseconds in whack | crypto helper 9 resuming | crypto helper 9 starting work-order 204 for state #204 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 204 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 204 time elapsed 0.000833 seconds | (#204) spent 0.841 milliseconds in crypto helper computing work-order 204: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 204 for state #204 to event queue | scheduling resume sending helper answer for #204 | libevent_malloc: new ptr-libevent@0x7fb3780407f0 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #204 | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 204 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #204 | **emit ISAKMP Message: | initiator cookie: | 26 9b 30 ce 1c 69 a2 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-204 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 73 5c 6f c5 e4 37 b5 85 8b 88 c9 38 4a 33 67 e3 | ikev2 g^x b5 76 e8 6e 58 ca 85 66 b2 6e bc 01 cc 91 d2 fa | ikev2 g^x e1 db ef 4b 77 17 f5 08 16 0c 8c d0 2e 39 5b 3d | ikev2 g^x 15 8c a2 f2 d6 7b 21 20 d2 5d b0 fc e4 ac 76 97 | ikev2 g^x 30 50 2e 26 71 1a 34 95 4e 65 5f 33 21 89 a5 4a | ikev2 g^x 55 91 fa cb b0 1c 50 2f 03 b1 71 df 7e 93 5d 3f | ikev2 g^x 83 d0 25 32 6e 4a 7a e8 b7 9c c4 2c bc 70 88 ca | ikev2 g^x 1a 12 c7 c4 81 cf af 5b 96 ed ff 17 ee ac bf bc | ikev2 g^x 7e ee e8 ea bf 0e 25 06 f6 11 f2 0c fc 01 f3 a1 | ikev2 g^x a3 a5 0f 39 3b 0e 4e 24 40 89 5e e7 dc 14 70 db | ikev2 g^x b0 59 4e 88 e4 58 74 9d 4c 35 67 80 45 58 10 7b | ikev2 g^x 90 72 ed 6b 8c 09 3f 83 31 52 aa d0 a7 ad e8 5e | ikev2 g^x 62 2d e8 c2 d2 5f d4 fe 77 1a 24 07 0f a0 1b 7f | ikev2 g^x b1 31 3d fc 2d 59 58 95 dc 6b 56 ff a8 81 81 ca | ikev2 g^x bd 63 b1 a6 f3 e4 7a e1 08 85 c1 19 90 12 c0 7e | ikev2 g^x 58 38 76 3a 98 a3 e6 81 1a a9 a3 c2 1d 81 96 94 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f4 44 35 a4 a3 93 f6 e1 66 d4 43 db 1b ee 9d af | IKEv2 nonce 99 ba 18 1d 96 99 f1 ca 00 4e 65 c8 19 9f df 52 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 26 9b 30 ce 1c 69 a2 31 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 cc | natd_hash: port= 01 f4 | natd_hash: hash= 73 dc 32 bc d5 a3 92 90 2d a7 77 26 1c 78 dd c4 | natd_hash: hash= 9b 23 7d 3e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 73 dc 32 bc d5 a3 92 90 2d a7 77 26 1c 78 dd c4 | Notify data 9b 23 7d 3e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 26 9b 30 ce 1c 69 a2 31 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 5b a2 10 3c 9e 91 f8 b5 af bf b9 e6 23 08 5d a3 | natd_hash: hash= 6c 17 22 88 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5b a2 10 3c 9e 91 f8 b5 af bf b9 e6 23 08 5d a3 | Notify data 6c 17 22 88 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #204 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #204: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #204 to 4294967295 after switching state | Message ID: IKE #204 skipping update_recv as MD is fake | Message ID: sent #204 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-204" #204: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.204:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #204) | 26 9b 30 ce 1c 69 a2 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 5c 6f c5 e4 37 b5 85 8b 88 c9 38 4a 33 67 e3 | b5 76 e8 6e 58 ca 85 66 b2 6e bc 01 cc 91 d2 fa | e1 db ef 4b 77 17 f5 08 16 0c 8c d0 2e 39 5b 3d | 15 8c a2 f2 d6 7b 21 20 d2 5d b0 fc e4 ac 76 97 | 30 50 2e 26 71 1a 34 95 4e 65 5f 33 21 89 a5 4a | 55 91 fa cb b0 1c 50 2f 03 b1 71 df 7e 93 5d 3f | 83 d0 25 32 6e 4a 7a e8 b7 9c c4 2c bc 70 88 ca | 1a 12 c7 c4 81 cf af 5b 96 ed ff 17 ee ac bf bc | 7e ee e8 ea bf 0e 25 06 f6 11 f2 0c fc 01 f3 a1 | a3 a5 0f 39 3b 0e 4e 24 40 89 5e e7 dc 14 70 db | b0 59 4e 88 e4 58 74 9d 4c 35 67 80 45 58 10 7b | 90 72 ed 6b 8c 09 3f 83 31 52 aa d0 a7 ad e8 5e | 62 2d e8 c2 d2 5f d4 fe 77 1a 24 07 0f a0 1b 7f | b1 31 3d fc 2d 59 58 95 dc 6b 56 ff a8 81 81 ca | bd 63 b1 a6 f3 e4 7a e1 08 85 c1 19 90 12 c0 7e | 58 38 76 3a 98 a3 e6 81 1a a9 a3 c2 1d 81 96 94 | 29 00 00 24 f4 44 35 a4 a3 93 f6 e1 66 d4 43 db | 1b ee 9d af 99 ba 18 1d 96 99 f1 ca 00 4e 65 c8 | 19 9f df 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 dc 32 bc d5 a3 92 90 2d a7 77 26 | 1c 78 dd c4 9b 23 7d 3e 00 00 00 1c 00 00 40 05 | 5b a2 10 3c 9e 91 f8 b5 af bf b9 e6 23 08 5d a3 | 6c 17 22 88 | state #204 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38401cc10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a89740 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a89740 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #204 | libevent_malloc: new ptr-libevent@0x7fb38401cc10 size 128 | #204 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49616.364935 | resume sending helper answer for #204 suppresed complete_v2_state_transition() and stole MD | #204 spent 0.461 milliseconds in resume sending helper answer | stop processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3780407f0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 9b 30 ce 1c 69 a2 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #204 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #204 | rejected packet: | 26 9b 30 ce 1c 69 a2 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #204: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #152 | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #152 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #152 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49616.369106; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.012596 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f4be0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #152 | libevent_malloc: new ptr-libevent@0x7fb3780407f0 size 128 "road-eastnet-nonat-152" #152: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #152) | c7 e3 df ec 9e c4 62 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a7 d8 bf 29 24 11 1c ce c6 eb 11 96 dd 30 8f aa | 0c 4c 70 ce 87 a4 df 43 d2 6c ba d5 f0 3b d8 41 | 39 bd 2b 1a 59 08 f6 28 59 f9 b3 0f e5 b5 40 32 | 97 af 83 49 1b 9c e1 41 6c 19 d9 81 bd 62 6f 16 | 88 77 9c c6 99 70 f5 87 ca bd 33 9d e4 05 6b 5b | c0 98 a4 04 59 99 ff a8 0d 45 13 de 94 59 78 3e | 9f 29 e2 f0 6e 7e b9 fe f0 0d e5 7f 5b 4c 01 84 | ef a7 c0 48 17 b5 cf 69 2f 9d 37 d6 9e 2c 49 b7 | 21 74 f9 23 52 39 e5 70 37 49 22 ad bf 6a ae c7 | 00 73 99 52 14 5a 01 1d ec dc e2 c6 b8 f0 0e df | bb 4f 3c 66 48 6a d8 f8 3d dd ce 84 36 d7 fe 75 | b0 8b 40 6c b7 0a 71 a4 a1 89 ca 62 6c e9 05 72 | 42 a3 a2 98 b2 36 46 5e b4 83 55 6f f7 d0 07 bb | be 2a 0c 02 1c 0f 1c ef 21 73 11 f7 92 da ee 38 | b3 d6 c9 03 8b 2f b8 eb 38 2b 9f 1a 71 81 4d 22 | 5e d5 1f 81 77 a6 9c 34 d3 30 8a 8b 41 61 5e 1b | 29 00 00 24 29 e4 ca ab 2a 30 18 fc 26 46 3c 50 | 1a f5 21 d0 52 38 f5 d5 7b 74 90 b3 b6 ed 01 58 | e0 d9 32 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 38 7f 4c 40 24 5c 70 b7 73 9c 98 | de a9 9b f3 50 76 96 bb 00 00 00 1c 00 00 40 05 | 28 07 96 1e 77 dd a7 3a bc 86 9b 87 bc da 1a a0 | d3 4f e8 fc | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #152 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 e3 df ec 9e c4 62 b6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #152 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #152 | rejected packet: | c7 e3 df ec 9e c4 62 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #152: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56dd0 | handling event EVENT_RETRANSMIT for parent state #181 | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #181 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #181 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49616.381513; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00283 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #181 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 "road-eastnet-nonat-181" #181: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #181) | 87 ea 0d a4 c5 cc c9 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 96 2b 80 67 25 14 db 43 a4 69 96 1f d6 7f 44 | 16 0f d8 a3 fa cd 04 6f 4e 52 d1 61 93 e5 7d 61 | 78 3a 71 d4 ab 07 09 6a 8d e4 9e 59 3a 16 71 d0 | 6a fd 27 9b 67 10 88 a3 7b 06 8c 1d bd 77 73 97 | cb 10 8a 01 63 6c f3 e0 d9 84 4d f6 7b 2b fb e5 | 64 39 42 1e 6a 5d e5 a2 c0 54 6b 84 eb 36 36 98 | a7 bb 04 c5 ca 92 0e 5f af 5a 95 43 e3 52 3f ff | 54 f4 17 a7 9b 5c ce c8 79 5b 79 1b f8 16 5e d7 | 38 2d 41 ad 74 20 7d b3 0e 73 6b 2e d6 c4 34 48 | 1d 4c 33 fc 1f 31 06 e5 ef d9 8a ee a4 d3 10 13 | 9f f3 13 d6 08 5c dd 5e f3 41 90 99 dc 19 c1 90 | 0b 1a f0 8f 10 ca 00 81 f3 4c 0b 20 a3 62 92 ed | 2c 01 0a 11 e9 9d cb 11 95 e0 55 b1 08 02 a2 07 | 35 a8 d1 5c 3e 00 4b 4e 53 71 3f 8a 08 82 11 91 | 21 25 67 71 35 af ba 8c 78 51 c7 49 62 d2 6d 39 | 87 19 14 5e e7 83 0f e7 70 65 a7 bd b3 6a 59 43 | 29 00 00 24 f0 e0 42 a6 e3 a5 05 54 c9 6b cd 2c | d1 4e 0f ea 18 76 ac 9e 15 69 24 da 67 51 76 47 | 7a b9 31 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 1c 40 9b 6a 7c 59 59 f4 5a 8b 5d | d3 44 cd 77 5a a2 8f ab 00 00 00 1c 00 00 40 05 | c9 f4 ff 9a 5d 3b 38 1b 8f 98 0f 89 fb a2 c8 0e | aa 7e 43 ef | libevent_free: release ptr-libevent@0x7fb3680180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56dd0 | #181 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 ea 0d a4 c5 cc c9 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #181 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #181 | rejected packet: | 87 ea 0d a4 c5 cc c9 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #181: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #193 | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #193 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #193 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49616.384931; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001253 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56dd0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #193 | libevent_malloc: new ptr-libevent@0x7fb3680180b0 size 128 "road-eastnet-nonat-193" #193: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #193) | 09 06 18 28 25 97 f6 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d fb a2 00 c4 81 91 0e b9 c0 41 7e a3 8e d5 a7 | 8f f9 71 10 26 95 10 e6 4e 8b 4b cc bc fc 28 8b | b7 f8 db 09 cb 68 57 d8 0f d5 cb 0f b4 d7 8f 3d | bd 12 fa dc 76 89 b1 cd af d1 36 87 37 88 94 35 | dc 1d 71 91 3b f3 e1 80 cc f2 f0 d3 3a 4d 9e 94 | 07 3c 65 6d 3e 40 ff 84 75 64 e8 1b b1 8c 09 6d | 19 40 40 a9 6d 88 cd b7 e8 19 c9 3d e5 92 7e 64 | de 57 bb db cd d4 22 17 89 b5 3e 22 3c e2 24 0b | 14 89 5a 96 bd 20 3b aa d7 bd af 6b d4 f2 98 3c | 51 d6 02 8a 1a 1e 91 da fa 7c 17 97 ea 62 5d 5c | 64 1a ef 72 b1 d0 d3 26 fb a0 cf 97 96 42 ef 85 | 1f 2a 66 aa 06 10 71 63 af 7d da 60 c1 c8 13 08 | 97 23 c5 07 eb 43 86 64 05 41 06 20 ee 9b 27 00 | 30 a6 42 a7 c6 f6 78 37 51 13 98 31 24 47 eb e1 | 16 0f ee 4e 11 f9 96 b6 72 84 dc 21 2b 6e e3 77 | 3a 73 af fe 81 a3 c6 e9 eb 76 cf a2 f6 45 8e f3 | 29 00 00 24 ca 9d 5e 32 ed 0b e6 19 dc 2f e8 6f | 8e a5 0f 9f 9c 08 6d f3 68 e8 0a 59 74 47 ad 67 | e3 bf 67 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c 89 f1 95 94 6f 28 52 1d 00 7f 87 | cf b9 fb 25 a2 94 8b 5c 00 00 00 1c 00 00 40 05 | cf 55 4f 40 25 07 37 da af 22 52 57 b9 8b da a2 | e2 e1 f8 6b | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #193 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 09 06 18 28 25 97 f6 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #193 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #193 | rejected packet: | 09 06 18 28 25 97 f6 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #193: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0641 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #153 | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #153 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #153 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49616.424548; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004206 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #153 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 "road-eastnet-nonat-153" #153: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #153) | ed 10 7e d3 7b 33 74 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 23 2b fa a2 7a a7 c0 a4 0c c7 9f 58 c4 e7 e8 | 70 a1 a8 0f 51 5f a2 04 f4 14 9f d7 e2 33 9b d1 | 70 a9 9d e5 73 3e d4 0c 84 28 f3 47 b9 3c 03 49 | 98 c3 54 58 79 2a 6a d2 f7 19 34 3f ea 9b 09 66 | 26 4b 77 9a 2e 2d 06 7d b1 99 09 62 d6 ef 52 44 | 03 d0 e7 2e 96 a1 8d 5c ea 4e a7 ca 7e fb ac a0 | 2f ea 86 d8 ac 11 f8 20 6b 77 af c2 6c 84 38 e7 | 8a b3 d4 12 59 8f 14 90 f8 a1 09 66 1f 57 d8 3c | 73 c4 11 8b a8 7f b3 1e 97 ed 1c 65 90 26 33 5b | 30 76 3b 3b d5 b4 96 62 cb 7d 86 9d ad 4a 9e e5 | 2b b2 c9 9e 69 f5 8a e4 08 29 24 90 1c 8f 81 c4 | d0 5a 30 f4 83 2c f9 11 5c 07 b1 f7 f6 7a 22 ac | 46 53 33 91 c1 25 ad 6c f8 ee d4 49 b1 09 fc 61 | 27 91 e2 9d 17 78 bb a6 45 04 eb ad 01 76 59 27 | df 49 c6 69 61 22 0d b2 77 f2 e5 49 0e d0 19 37 | f9 e3 3c 5d ab 0d ee 24 0e 3a 1b 87 b3 59 f2 dd | 29 00 00 24 11 3e 89 f2 e4 5a b4 91 6f f3 6f e0 | 10 78 d4 00 e7 63 f4 34 67 6a f8 b4 dc 99 94 12 | b9 1e 59 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cc 1e 02 bf 67 12 0b 49 15 df fb a0 | 1b e0 2a 30 f1 cf bd 20 00 00 00 1c 00 00 40 05 | ce 1d 48 38 8b bc 75 71 1c ff 01 f5 d1 af 95 90 | 14 3b df 16 | libevent_free: release ptr-libevent@0x7fb35c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #153 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 10 7e d3 7b 33 74 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #153 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #153 | rejected packet: | ed 10 7e d3 7b 33 74 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #153: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0675 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9f380 | handling event EVENT_RETRANSMIT for parent state #199 | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #199 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #199 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49616.436892; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501228 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #199 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 "road-eastnet-nonat-199" #199: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #199) | 27 d1 6c c4 4c 84 e3 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 f7 e5 ae 44 da 7b a1 b1 3e 44 fb ef 82 32 77 | a0 c2 72 43 50 19 7e 5e c7 1d 24 fa 9d 99 ff 71 | 44 54 82 8e cd bf 0f 40 ad 0d 4a 27 75 78 aa 64 | 63 e6 66 6d e9 bf 1f 5a 74 65 bf 0f ba 29 57 51 | 0a 44 9c 16 52 28 db 48 f9 d7 ab e8 1e 98 b5 a0 | ff 9d 9d 22 6a 26 d5 06 1f b5 07 29 59 d7 ec 33 | 10 b5 a0 31 95 73 ec 20 a2 11 23 56 06 d8 ad a2 | 6d 0f c8 00 64 2f 99 96 5d d2 5b a5 dd 2c 34 78 | ce 80 35 74 5d 74 56 55 47 bf 15 c1 84 c7 0f 64 | a6 70 c6 99 14 c9 d9 b3 02 6a 70 83 2d ca 4f aa | b9 b4 39 e1 b3 2e 81 8c 26 1f 8e f8 1a b1 b1 4b | b0 9b 0a c4 8c 38 2e 14 24 c9 96 c5 ae 69 55 cb | f9 3b a1 e1 2b 54 42 88 42 2f d5 f9 04 ab 91 7e | 86 11 e3 bd 2a 54 c0 da 96 34 89 6a 25 46 14 93 | 51 fb 1f 2b bf 29 76 41 f2 16 a8 f5 e3 fb 49 39 | 86 d5 c2 41 0f 92 03 df 3b a9 75 b2 e3 1f cd 5c | 29 00 00 24 ce b1 60 ec b2 6d 5b aa dc 41 a3 c6 | 5b 6b 71 42 8d 0b d4 85 d2 79 6d f3 81 c0 ff 8a | e8 8f f9 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b6 28 45 f6 47 a9 89 2b f2 e1 02 | ea 34 3a fc e5 a7 2b f1 00 00 00 1c 00 00 40 05 | a9 d3 87 ec eb bf 81 b0 18 6d 86 a6 a8 63 05 fc | 1c 93 4f b5 | libevent_free: release ptr-libevent@0x7fb36402ffd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9f380 | #199 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 d1 6c c4 4c 84 e3 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #199 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #199 | rejected packet: | 27 d1 6c c4 4c 84 e3 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #199: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0676 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000d120 | handling event EVENT_RETRANSMIT for parent state #97 | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #97 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #97 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49616.445245; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00502 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9f380 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #97 | libevent_malloc: new ptr-libevent@0x7fb36402ffd0 size 128 "road-eastnet-nonat-97" #97: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #97) | 7c 9c 8d d2 c5 3c 3b 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 98 e5 dd bd 5b c0 22 fb 24 a8 9d 4b ca 6c 72 | 78 61 7f 8f 02 15 b8 56 b3 c2 d4 89 90 42 e9 ae | b3 56 28 83 de be c5 dc f3 99 87 bf 7c 20 cf 1e | 80 26 a3 f6 7f d4 66 5c a2 37 d4 2d 88 37 5b ee | 37 eb f6 f3 73 47 4e f2 3e 1b de e1 36 54 bd 6f | 97 78 ce cb 16 0a da 34 fa 11 bc e7 e5 27 11 6b | 72 0d 9c de de 06 66 d8 74 64 a9 64 0b 12 b1 e7 | 15 84 3a 8c d9 6a d5 46 6c 00 4b f9 69 74 47 d1 | f3 79 bc d4 c9 0f 58 86 00 a5 0b 46 4c d7 20 78 | 99 ce 0d 0d cd 99 98 27 cc ce 50 e5 63 fc 25 ec | 4a 78 c1 76 a6 35 df cd 30 8a 57 10 1a b9 c6 85 | f5 05 46 77 76 2a ba 40 b5 da 98 c0 91 e5 03 c9 | 47 7d 79 56 d6 82 48 c6 a2 b4 f6 fc f6 16 30 98 | d9 b0 79 c5 33 a4 80 eb bb 99 51 9a 3b 3b ae a3 | 9b a3 5f 5f ce 23 78 fd 36 29 21 9b 24 8f 30 93 | 1f 0b 71 91 41 28 b6 d5 e2 dd ce 67 83 67 83 41 | 29 00 00 24 4a 40 88 f3 3a ca ff 58 9b 48 04 9a | a8 d0 f5 15 e8 12 b6 3b 4a 95 b2 73 79 da d4 a0 | df 94 6f b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 5b 76 c7 df cc 29 e7 8f 6d d6 7a | e3 d4 c1 e2 a2 33 fe 59 00 00 00 1c 00 00 40 05 | 63 90 91 6f c8 44 50 2a ff 12 5c 17 cd fa e6 2d | 07 cd 17 d6 | libevent_free: release ptr-libevent@0x7fb360012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000d120 | #97 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 9c 8d d2 c5 3c 3b 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #97 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #97 | rejected packet: | 7c 9c 8d d2 c5 3c 3b 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #97: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a24730 | handling event EVENT_RETRANSMIT for parent state #194 | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #194 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #194 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49616.45358; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001503 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #194 | libevent_malloc: new ptr-libevent@0x7fb360012840 size 128 "road-eastnet-nonat-194" #194: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #194) | fb a9 4a 68 01 02 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad aa 66 9d b6 64 e0 b9 0d 37 a2 d5 08 fd 46 b0 | f7 b3 8b 64 d2 0b f9 59 d3 20 8f d2 23 52 ab 2e | d6 99 18 d2 2f 54 8c e7 99 6c 8c 9d cd ff 9d 5a | 44 41 3e 80 ea ff 21 1e 5c 82 8a bc ec 41 36 14 | dd 8d af 05 d5 6f c4 3b eb c0 61 1c 5d 0d 70 dd | 40 c9 d4 1f 8a d2 d8 76 8a b9 bd f7 f3 8d f9 d9 | da 19 38 58 8d de a2 45 b1 7d bb f4 44 36 75 08 | 1e 19 e1 7e 40 21 fc 21 30 c5 e3 bd 20 8d d8 be | bf bc a6 60 a1 d6 d8 51 07 69 fd 62 da 68 85 ce | 37 74 1e f7 ae d2 77 4a f2 bc 1e 10 5e ed ca 3e | bf 36 bc 15 0b 03 92 f4 43 13 b4 d6 80 6a 65 a5 | da 3f fd 89 e4 f3 95 6e ad 5c 51 06 e7 4d 88 1f | 8e b3 8c 1c 17 69 df 75 37 d0 1f f8 06 a4 4e 15 | d4 9e 45 dc a2 0b 41 4c 07 55 90 db 32 9b e2 82 | 2b f7 f7 40 85 e7 33 60 11 d2 9c 0f 8b 18 ca 0d | 1e 7e c6 7b e1 da d7 c5 9b 44 c8 e8 12 48 03 39 | 29 00 00 24 a9 61 02 67 eb 1a 8f ba e2 2e bf 6e | fa 3f 6f bb 4e c3 80 0d df 43 7e 7d a3 f5 81 cc | f3 7a bb 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 5d 39 f5 08 60 5b 2c d2 7c 9c f1 | a9 84 d1 dc ab 40 bc 42 00 00 00 1c 00 00 40 05 | dc 98 c1 28 2a 8c a1 5f e1 55 35 3c e4 55 00 85 | a7 4e ac da | libevent_free: release ptr-libevent@0x7fb34403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a24730 | #194 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb a9 4a 68 01 02 ca 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #194 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #194 | rejected packet: | fb a9 4a 68 01 02 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #194: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0587 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abd200 | handling event EVENT_RETRANSMIT for parent state #182 | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #182 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #182 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49616.454904; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003165 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a73690 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #182 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 "road-eastnet-nonat-182" #182: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #182) | 8e 7e 13 89 c5 5d f7 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 e9 75 54 2d e8 42 37 37 23 34 72 75 33 ca 7f | b2 72 0c b6 c2 49 71 7a 03 e3 1d 07 58 b0 51 38 | 61 45 b2 16 d2 ad 2f f3 7c 0e 1f f4 c5 05 13 4c | d6 98 4b 66 e1 54 c0 73 13 91 4a f2 b3 d9 63 4c | 05 4b dc 71 47 da 12 a0 d3 dd 69 f7 37 06 e9 cd | 0a 8b 52 94 8a 6d da 5b 07 14 54 d3 97 43 1d a2 | ab 36 1f dc b8 97 c0 22 40 d5 44 3f fd 99 bd 8a | 9c f3 b8 47 00 bf 43 3d ae b2 e8 4a 6b 45 ec 0f | 5f e8 9a 25 7c ca 9d 80 f8 42 ce d3 9c bf c6 35 | 83 b9 bc 3b e5 0c da 92 14 98 a7 1a ce 79 b0 48 | 82 a8 51 c4 ec a8 10 1d b7 45 e5 80 dc 95 d7 16 | 44 79 9a ed 89 ab 16 cf 11 d5 7e 53 46 f0 d9 00 | eb 07 b7 8a d9 e3 ff b1 2b 68 df 33 18 af 5f 4c | 9c 70 63 04 6b ff 29 aa a6 e4 41 5f 2d 42 80 3a | 0d 17 98 f8 4e ea 6a f2 2b f3 0d 26 ff 27 2a a7 | a3 13 57 12 6f 11 b8 dd 58 53 1d d0 16 a0 b0 ee | 29 00 00 24 65 07 2e e4 49 be 52 f9 c6 9f 8e 3b | 7c a2 61 d2 67 51 00 51 49 02 4e 77 4c 09 9c a2 | 72 c6 03 a7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 04 ff 12 2b f3 10 13 86 f3 c1 ff | 09 98 25 be d2 68 ad 5e 00 00 00 1c 00 00 40 05 | d9 6b 4d a2 91 b8 eb 60 71 cf 0d f0 f9 f0 84 45 | 87 2d 57 76 | libevent_free: release ptr-libevent@0x7fb35003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abd200 | #182 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 7e 13 89 c5 5d f7 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #182 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #182 | rejected packet: | 8e 7e 13 89 c5 5d f7 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #182: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.059 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #154 | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #154 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #154 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49616.485233; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003209 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abd200 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #154 | libevent_malloc: new ptr-libevent@0x7fb35003b0b0 size 128 "road-eastnet-nonat-154" #154: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #154) | 58 44 d0 f4 a9 dc 50 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 19 a5 f0 13 d1 8a b9 49 96 a8 fe 61 6f 4c e6 | ed 98 cc 8a 65 9d e4 af 10 e6 cf 62 f8 4a ff 02 | 90 85 dd 9e 23 5d 3e 90 f8 fe da b0 af 0e f7 4d | 4a 05 63 a1 69 db d1 01 e1 b1 0c 86 c9 3e 7d 9b | a4 2a 0f 98 09 40 36 8c 8d db ff 98 96 15 32 bf | 21 16 30 40 ae ae fb 4d 47 43 6a 1d c4 ee 0d b8 | 26 d3 b2 3f 2c ab f7 f8 0e a5 40 0f 3a fc 7c 80 | cc 8b 34 d2 f1 7f 26 73 45 a4 a9 ed 44 96 56 b1 | 73 9b 2b 0c 92 10 cb f0 48 16 48 7a 38 20 64 1d | 96 ee 19 8c 5c 7f a1 2d 3c cf aa b0 87 20 50 5a | d7 fe ed 1e da e9 09 e6 09 9a 75 a1 17 60 9e 3f | eb eb 3b 4a e8 5b e7 e1 61 2b a2 e0 ec 37 4d 19 | 5f 61 62 98 dd f9 aa d9 4b 8e bd 76 64 f0 89 37 | 39 0c 99 e6 f2 9b c5 88 8a eb 5b 10 1d 66 5f 10 | c6 5a 71 1c 22 22 ac a4 dd 72 16 46 60 ff 04 a0 | 8f 7a b8 da e1 39 b2 3e 50 39 72 e6 6a 86 81 1e | 29 00 00 24 8a 71 f4 36 cf 99 83 f2 20 30 a8 af | 91 e1 58 d7 2f 81 0b 43 f4 5f a3 87 48 cc 52 31 | 9b 27 40 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 21 57 f3 9f 4c 07 c6 03 b1 b0 7f | 5c 7f 90 aa ef 12 66 a4 00 00 00 1c 00 00 40 05 | de 38 70 15 e3 5a 3a 70 b8 42 a9 af 5d 6c a1 ee | f3 f1 65 20 | libevent_free: release ptr-libevent@0x7fb36402a780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #154 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 44 d0 f4 a9 dc 50 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #154 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #154 | rejected packet: | 58 44 d0 f4 a9 dc 50 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #154: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a43dd0 | handling event EVENT_RETRANSMIT for parent state #183 | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #183 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #183 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49616.517572; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002932 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #183 | libevent_malloc: new ptr-libevent@0x7fb36402a780 size 128 "road-eastnet-nonat-183" #183: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #183) | d6 e6 54 26 a5 51 49 90 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b d3 2c d5 46 1e bb 45 3e b1 07 9c 29 85 98 93 | ee 36 97 24 0c 65 6e 72 03 fd eb 26 66 8a 4d 99 | 30 4c 18 3c 80 72 a6 76 e5 f3 36 3a 07 42 32 c2 | 39 e8 9d 5f ec e0 51 20 28 56 14 b3 ac 67 3c fa | 98 5a 37 73 bb 28 df c4 30 da b1 be 2e 7d cf b5 | aa 2a 51 9d a6 55 f1 d6 02 88 71 ea 44 18 ea 39 | 96 0e 47 c9 6e 26 f7 c4 74 bc 17 b7 c1 ce f4 36 | 36 cb e7 f5 29 fd 74 37 cc 31 1f ce 2f ee 7a 23 | fd da 91 35 f0 f9 ff ec 58 26 8a a2 2f d2 81 0d | a1 17 24 44 c9 5f 1e 77 b9 2b 2f 5a f9 47 ce 83 | a8 fd f0 5f 20 8d e8 9e 6f 25 55 3c b9 c3 9c 82 | 64 c6 bd 5c b0 07 c1 4a d5 fd 91 20 b3 b1 5d bd | 38 8e ad d0 f3 fd d6 24 13 d0 4b 1a eb b6 e2 f9 | 08 8d ad d1 8e e2 f0 e9 c7 8d cc 8b a6 0c 02 89 | 89 a8 da 17 42 b0 bd b2 29 34 67 25 c6 68 61 cb | 05 67 1d b0 18 99 57 3e 48 e0 4d 27 90 f1 05 8d | 29 00 00 24 fb 03 08 25 8e 6d 3a 5f 6f 85 88 7b | 77 f7 13 2b 6d 57 c0 a9 57 85 b0 8d 7b f6 0e 38 | 56 d2 56 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 0a 8e a5 81 0b e2 cf 5a 0e 0b 81 | 8d 82 2c 01 80 91 75 34 00 00 00 1c 00 00 40 05 | bf 20 fb 11 3c 6a fd 35 31 59 61 81 c5 7f e8 2f | e6 90 5e b8 | libevent_free: release ptr-libevent@0x7fb34c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a43dd0 | #183 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 e6 54 26 a5 51 49 90 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #183 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #183 | rejected packet: | d6 e6 54 26 a5 51 49 90 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #183: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a30d30 | handling event EVENT_RETRANSMIT for parent state #200 | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #200 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #200 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49616.527941; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500524 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a43dd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #200 | libevent_malloc: new ptr-libevent@0x7fb34c01d920 size 128 "road-eastnet-nonat-200" #200: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #200) | 75 f9 3c ee 3d 43 50 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d d7 f4 2c e9 d8 b4 58 bc f6 5c 68 d0 e8 20 d2 | 70 0a 56 63 f6 74 43 04 b4 cd d8 23 88 fe c7 f6 | 1e d9 bd ee 25 c8 67 c7 2d b9 d9 c6 54 ca cd 9c | 4d 78 05 42 6a b4 88 a1 71 4e fd 59 90 2e 53 a1 | 4c c1 78 ca ca ed 13 0b 48 7e 72 f2 de cc bf 74 | d8 13 14 01 89 5b 3d f3 26 5d 17 ef 74 28 fa a9 | a5 86 f8 17 01 9e 46 6d 69 c4 ce 7b 85 c2 8b f2 | 6a 40 21 88 6b 4c 0d e0 b2 55 9a f1 b6 c4 a5 34 | 5e ea a9 16 4b 7b 22 02 6e b5 62 bf 0e 13 c4 75 | 5a f6 47 5c d0 c2 01 a3 46 b7 b7 ca c6 5e f6 e3 | 79 8e 25 ba 76 6d ee 11 df 8f 10 22 5f 50 31 f4 | b3 77 76 36 47 ec 67 35 64 4d 22 bd 77 3c 61 d0 | 1c 1c ab b4 d6 cf e4 0f 57 21 d8 30 aa 58 f6 84 | a1 48 51 27 85 8c 83 cc 89 77 d2 37 58 0f 1d e2 | 1d d9 35 ce 76 2e 8b 0d 16 1d 75 c0 13 c5 08 c0 | 3c d5 3b aa 74 68 e3 69 d7 c9 6b 6b d6 2e 6c a1 | 29 00 00 24 0e 33 98 69 ac 19 40 8d 23 0b bc 95 | 8f 5a 8e 62 b3 f7 97 e2 1f 4f da 87 39 88 58 8e | fe 30 e9 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 45 f2 7a b7 3f 1c 77 84 16 29 66 | 7f d3 6a c0 22 39 cf e5 00 00 00 1c 00 00 40 05 | a7 72 f7 48 87 f0 01 9a b9 14 bf 98 e7 f8 65 3b | c7 d8 2f ed | libevent_free: release ptr-libevent@0x7fb37800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a30d30 | #200 spent 0.189 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 f9 3c ee 3d 43 50 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #200 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #200 | rejected packet: | 75 f9 3c ee 3d 43 50 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #200: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0506 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #98 | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #98 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #98 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49616.530714; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006597 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a30d30 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #98 | libevent_malloc: new ptr-libevent@0x7fb37800cf80 size 128 "road-eastnet-nonat-98" #98: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #98) | 36 f6 17 30 89 34 87 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e de 22 15 b8 37 99 8a 19 60 74 d9 cc fb 93 74 | 46 52 5b 4c b2 15 42 20 b8 92 87 ba 2d f3 d7 43 | b5 37 b0 ea 4d f5 7a 45 62 c7 3f 47 fb 44 64 d3 | e1 f9 e0 4b e7 fb 3e 3d b1 04 53 7b 67 35 99 55 | 77 f9 c2 de 1c 5e 4e 46 02 3b e5 0c e9 31 90 64 | 6e cb e0 dd 1a 59 99 ef 3d a7 c1 9b 74 f9 45 3f | 99 cd de c7 d0 13 5f 2b 11 ac cd ff c9 47 2e 86 | 69 0d e8 ec 31 64 37 7f 01 74 30 f7 db 0e d0 fb | 8b 6d 9d cc 98 7f 1a b4 87 7d bf 2e 19 53 89 24 | 00 4f 0a 93 5d 06 c9 01 d3 dd 9f 4d 48 ee ba 48 | 79 5c 5f f3 cb 01 ba a7 ec 71 ed fd 64 af 41 a6 | ff 80 dd aa 0c ae 06 5c 0b a3 1c 56 84 5b 6c 26 | fd ff b3 07 94 15 1d 68 35 03 8e 60 07 84 12 f9 | ee d9 d1 91 a2 f4 75 f6 9e 29 11 0a 54 bc 2f 41 | 2c ea 22 ab ab 32 6a 0c 62 23 b1 4a 4b 29 bb 22 | de a9 03 f4 17 e0 39 72 79 31 e0 0a 30 fa 14 a0 | 29 00 00 24 dc e2 b9 cb c5 4c 15 ab 06 6c 97 a6 | 72 6b 55 8f 7d 14 aa 13 19 ae 9e 9d 27 a3 3a 17 | 86 0f 7c a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 94 a8 82 2a 1f 7d 1b 29 07 9f 80 | 75 97 d7 a2 ab 24 e8 8d 00 00 00 1c 00 00 40 05 | b8 4f 85 79 77 db f6 74 dd c9 e6 fd e8 91 c3 41 | 66 c0 f7 3b | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | #98 spent 0.176 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 f6 17 30 89 34 87 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #98 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #98 | rejected packet: | 36 f6 17 30 89 34 87 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #98: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0591 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-205" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-205' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #205 at 0x557d46aec000 | State DB: adding IKEv2 state #205 in UNDEFINED | pstats #205 ikev2.ike started | Message ID: init #205: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #205: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #205; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-205" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-205" IKE SA #205 "road-eastnet-nonat-205" "road-eastnet-nonat-205" #205: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-205 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-205": constructed local IKE proposals for road-eastnet-nonat-205 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 205 for state #205 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a0a990 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #205 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 | #205 spent 0.166 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-205" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.235 milliseconds in whack | crypto helper 10 resuming | crypto helper 10 starting work-order 205 for state #205 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 205 | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 205 time elapsed 0.002243 seconds | (#205) spent 0.994 milliseconds in crypto helper computing work-order 205: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 205 for state #205 to event queue | scheduling resume sending helper answer for #205 | libevent_malloc: new ptr-libevent@0x7fb37c0407f0 size 128 | crypto helper 10 waiting (nothing to do) | timer_event_cb: processing event@0x557d469f8d60 | handling event EVENT_RETRANSMIT for parent state #2 | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #2 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #2 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49616.533608; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.01245 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a24730 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #2 | libevent_malloc: new ptr-libevent@0x7fb36802a950 size 128 "road-eastnet-nonat-2" #2: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #2) | 1a 6c de c8 74 c5 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e e6 40 8d 01 9a df ee a1 21 ef 7c 27 51 b1 50 | 11 ab 49 b8 aa be 06 6f 98 06 4f a8 49 fc 42 fd | ea ae 86 e5 22 2c b5 91 3d 9f 17 1f 02 b9 b9 8d | 62 48 db a9 bf 68 b6 2a 81 1e f5 ea 96 5e fc 90 | a8 90 23 f2 fa 81 8e 8c d6 45 a8 56 67 da 61 6d | ec 8f 6b 5d aa 73 41 20 29 44 b2 20 1c ab 68 57 | 66 6f ca 43 df ea 03 70 f7 0e 47 cb 21 da 37 fa | b6 1e 94 d5 b1 5e b7 96 a4 f5 5a 22 ff b7 b7 1e | 62 65 38 93 8b 8d 44 bd 9f ea 0f 68 70 be 74 db | b6 35 f8 53 58 61 01 df be e6 bf 45 b0 94 55 ae | 5d 6b 51 98 47 dd 93 18 5c 30 93 96 42 3e 47 91 | 90 01 1e 32 64 de ec ce 38 b5 ab f8 4a 4f 0c ed | d8 fd 0a f1 53 ed ad 6b 9e c5 db 7f 6d 9f 1b e5 | 0c 7b f2 2f 6f ec 10 d1 5b 4b 71 ee 47 5f b6 1f | b0 01 08 5f 12 c2 5d 47 67 6d 8f ee c4 bf 47 5b | 6c 71 d5 40 dd 10 ef f5 69 2a fd 09 2a aa 47 a4 | 29 00 00 24 31 10 28 eb fd d1 21 19 30 13 d3 a7 | cd be e5 7b ca b3 e1 fc 00 55 31 87 01 f1 62 07 | 15 72 f6 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 6d fc d3 8f 25 27 03 1f 7a b6 de | f8 04 ad d3 88 d5 17 aa 00 00 00 1c 00 00 40 05 | 09 59 07 05 b4 e1 f1 0d 32 74 62 04 62 1e 48 d0 | 7d 5b 7f 5e | libevent_free: release ptr-libevent@0x7fb34001f920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8d60 | #2 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #205 | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 205 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #205 | **emit ISAKMP Message: | initiator cookie: | 96 a5 4d 09 36 59 36 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-205 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d9 af 72 1b a0 98 9e 50 b5 1c 2a f4 25 37 46 6d | ikev2 g^x 29 08 48 dc 3a 43 a8 47 58 90 05 63 32 ed 1e 67 | ikev2 g^x 1c d6 5d a6 5c c9 d2 88 4d 23 9d 29 85 6c bc 34 | ikev2 g^x b6 39 47 15 78 35 07 0e dc 99 e1 b1 20 70 65 8b | ikev2 g^x 00 6c f0 e9 44 5b 08 c2 17 e1 6b 72 9c af 6c 5b | ikev2 g^x a9 60 97 0c ec 66 17 57 bd 76 76 97 27 d0 77 4a | ikev2 g^x 2a 55 71 50 75 d7 68 7b d8 80 b2 7a 09 02 08 2b | ikev2 g^x 09 0a ee 89 61 3b 8a 2f 12 7c cc 05 74 ec 11 d1 | ikev2 g^x 9b a1 09 08 7c 39 7a ee 4d 88 62 16 e2 82 1b b3 | ikev2 g^x d9 8f 53 7a 4b 48 dd 7d 8c 47 a4 25 61 2b 5a 2a | ikev2 g^x 2f 93 a5 82 b2 4d a6 fe b3 ac 51 3e da 8f 23 63 | ikev2 g^x f4 2a 7e 1b 28 f1 63 98 1b 09 f8 46 7c 59 0e 77 | ikev2 g^x 0b 32 ae 4e 95 8f da e9 a4 30 df 08 42 58 09 74 | ikev2 g^x 83 d9 4e 39 cd 7e 3b e6 37 1b b5 f8 2d 02 a3 8b | ikev2 g^x db d0 44 1c b8 65 c5 60 b6 1d bd 0a 87 21 84 61 | ikev2 g^x fa 21 34 4e 05 0a 9f 1b ec 7d 07 6c c5 18 67 d9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6c 40 f7 85 3a 61 11 e1 6e 44 7b 14 a7 18 59 d8 | IKEv2 nonce 8f ce 04 ee 70 39 7f 15 26 c1 43 92 dc 05 98 29 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 96 a5 4d 09 36 59 36 16 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 cd | natd_hash: port= 01 f4 | natd_hash: hash= 87 dd f4 0a 58 0e d8 12 1e dc 08 fa c5 ab bd a9 | natd_hash: hash= a1 ef e0 c4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 87 dd f4 0a 58 0e d8 12 1e dc 08 fa c5 ab bd a9 | Notify data a1 ef e0 c4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 96 a5 4d 09 36 59 36 16 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 38 8d 68 ba 0f a0 5d 58 b7 93 ab fe 9b f6 26 59 | natd_hash: hash= 71 96 1a e7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 38 8d 68 ba 0f a0 5d 58 b7 93 ab fe 9b f6 26 59 | Notify data 71 96 1a e7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #205 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #205: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #205 to 4294967295 after switching state | Message ID: IKE #205 skipping update_recv as MD is fake | Message ID: sent #205 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-205" #205: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.205:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #205) | 96 a5 4d 09 36 59 36 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 af 72 1b a0 98 9e 50 b5 1c 2a f4 25 37 46 6d | 29 08 48 dc 3a 43 a8 47 58 90 05 63 32 ed 1e 67 | 1c d6 5d a6 5c c9 d2 88 4d 23 9d 29 85 6c bc 34 | b6 39 47 15 78 35 07 0e dc 99 e1 b1 20 70 65 8b | 00 6c f0 e9 44 5b 08 c2 17 e1 6b 72 9c af 6c 5b | a9 60 97 0c ec 66 17 57 bd 76 76 97 27 d0 77 4a | 2a 55 71 50 75 d7 68 7b d8 80 b2 7a 09 02 08 2b | 09 0a ee 89 61 3b 8a 2f 12 7c cc 05 74 ec 11 d1 | 9b a1 09 08 7c 39 7a ee 4d 88 62 16 e2 82 1b b3 | d9 8f 53 7a 4b 48 dd 7d 8c 47 a4 25 61 2b 5a 2a | 2f 93 a5 82 b2 4d a6 fe b3 ac 51 3e da 8f 23 63 | f4 2a 7e 1b 28 f1 63 98 1b 09 f8 46 7c 59 0e 77 | 0b 32 ae 4e 95 8f da e9 a4 30 df 08 42 58 09 74 | 83 d9 4e 39 cd 7e 3b e6 37 1b b5 f8 2d 02 a3 8b | db d0 44 1c b8 65 c5 60 b6 1d bd 0a 87 21 84 61 | fa 21 34 4e 05 0a 9f 1b ec 7d 07 6c c5 18 67 d9 | 29 00 00 24 6c 40 f7 85 3a 61 11 e1 6e 44 7b 14 | a7 18 59 d8 8f ce 04 ee 70 39 7f 15 26 c1 43 92 | dc 05 98 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 dd f4 0a 58 0e d8 12 1e dc 08 fa | c5 ab bd a9 a1 ef e0 c4 00 00 00 1c 00 00 40 05 | 38 8d 68 ba 0f a0 5d 58 b7 93 ab fe 9b f6 26 59 | 71 96 1a e7 | state #205 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a0a990 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #205 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 | #205 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49616.534286 | resume sending helper answer for #205 suppresed complete_v2_state_transition() and stole MD | #205 spent 0.466 milliseconds in resume sending helper answer | stop processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c0407f0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 6c de c8 74 c5 fb 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #2 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #2 | rejected packet: | 1a 6c de c8 74 c5 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #2: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.066 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 a5 4d 09 36 59 36 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #205 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #205 | rejected packet: | 96 a5 4d 09 36 59 36 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #205: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cbd0 | handling event EVENT_RETRANSMIT for parent state #155 | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #155 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #155 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49616.550327; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005262 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c450 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #155 | libevent_malloc: new ptr-libevent@0x7fb37c0407f0 size 128 "road-eastnet-nonat-155" #155: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #155) | ba 2d 75 59 38 9a 40 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 2d 8b bd fb e0 3e 63 93 cb 94 a3 59 ba 66 52 | 15 4e 4f 76 34 6f 63 6c 04 46 3b 73 fd d8 a5 8e | 35 33 06 7a 8c 2a 4d a0 d2 b7 a5 ef 60 5a a8 23 | ae c6 93 50 9f f0 c3 f5 06 df 4c 45 c0 4d 3b 90 | 71 b1 18 44 3a bb 92 05 e2 cb 38 9c 05 04 9c e5 | 33 86 8c 22 6f 05 07 53 37 10 99 50 e7 0b 25 55 | 89 9d 75 47 09 a1 92 af c6 86 5d 17 e6 b3 28 20 | 26 34 0c 4e a0 b6 47 51 4c df 53 f2 97 03 03 a6 | 89 4b b3 92 4a ab b5 e2 4b 58 52 5d fc 27 cb e8 | 64 f4 d9 2f f4 95 21 72 e7 fe 03 93 84 af de ff | 1c 75 39 21 b3 f9 de 3e e2 ac 5f bb e7 9f 0c bd | 32 99 99 15 33 bb 7d f8 f9 aa 92 5a 38 4d 6d 97 | 0e 69 3d a1 d8 b7 8f 44 ed 36 63 50 f7 7e 74 d2 | 45 dc 02 6e 87 72 5d 06 c1 0c 87 2a 42 4a 0c 96 | e5 33 b2 8a 28 de 43 7b 5c 89 da 84 03 93 af 07 | 0f 41 63 be 8b 32 2d a1 13 d7 f4 a0 78 5d 7b 02 | 29 00 00 24 1b 6f 61 ca 07 05 56 47 f0 44 a9 2b | df 2e 5b cb e9 85 db 0d bf 4e 16 8e a5 b1 b6 3b | d1 6b b0 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 9d 23 9a a7 98 84 7a 80 70 0e 3e | c4 f1 43 a7 4e 6b 6b 59 00 00 00 1c 00 00 40 05 | 2e 42 b0 ef a0 75 a1 7c 37 dd 50 d1 c0 f7 e8 21 | 72 07 2b e7 | libevent_free: release ptr-libevent@0x7fb3400250b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cbd0 | #155 spent 0.176 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 2d 75 59 38 9a 40 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #155 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #155 | rejected packet: | ba 2d 75 59 38 9a 40 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #155: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.074 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34800d120 | handling event EVENT_RETRANSMIT for parent state #195 | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #195 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #195 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49616.562481; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001776 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cbd0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #195 | libevent_malloc: new ptr-libevent@0x7fb3400250b0 size 128 "road-eastnet-nonat-195" #195: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #195) | 37 e6 90 db 14 bc bf 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 53 c9 77 b4 f3 d5 4d 42 00 37 51 2c 1c 68 3c | f1 54 0f 7a 55 d8 cb dc 59 bb 2f b5 96 8c 4e d4 | 85 27 5a ea f2 a7 4d 9e 5a 6b ee c6 28 a0 d2 57 | 71 7a 7b 0b 80 39 ac 27 cd 87 0d ef e4 ef af 3a | d6 b3 f6 12 c5 5f 2f d9 cd fb 17 d4 43 5e 16 c4 | 87 67 d1 70 07 84 e5 8e 71 91 de 30 59 cc e6 ee | 34 fb c0 51 e2 87 5b 7e 3f 08 db 50 ff 54 7a b1 | bd cb 77 92 50 41 31 65 47 73 69 2a fd d6 77 f3 | b0 89 f6 8e e2 6a 07 fc af 84 ca d3 f2 87 73 27 | c4 cf 2d 21 63 f5 8f 71 28 70 95 02 a0 27 ac 78 | a4 bb 1e 75 dc be 0d b4 ad 92 30 f8 7c 7f 5d 71 | a5 c9 9d 8b 71 f5 b5 68 db 9c 63 56 82 3f 35 f1 | f2 81 65 6a 20 3e b0 68 92 e4 10 6f a0 15 ab a8 | 72 4d 4d 54 b6 ef 0b 2d 62 75 65 6d be 42 39 3d | c4 80 ed ba e2 23 03 5c 4c 11 92 92 a4 9b 70 7c | cd 9d 5e 6a ce f4 42 ce b7 88 b0 01 79 41 f3 ce | 29 00 00 24 9e 21 2f 19 56 de ef 57 88 5d 72 9d | d0 e9 ed cf f1 53 49 64 11 8c ea d8 bc d7 7f b1 | 97 11 98 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be a1 e0 42 82 c4 3c a5 9f 98 67 8d | 2c 4b 8d ec 3b 56 95 d6 00 00 00 1c 00 00 40 05 | 9b 76 ec e0 3b 32 32 e4 22 87 e5 16 97 1d 20 83 | b5 a4 81 66 | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800d120 | #195 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 e6 90 db 14 bc bf 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #195 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #195 | rejected packet: | 37 e6 90 db 14 bc bf 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #195: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0732 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fd070 | handling event EVENT_RETRANSMIT for parent state #184 | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #184 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #184 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49616.582061; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003282 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #184 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 "road-eastnet-nonat-184" #184: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #184) | 71 40 97 9a 99 00 ff cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 9e 33 f9 05 c0 53 fb 65 12 d0 fd a6 93 df f1 | 7d bc 07 5e 94 4b 97 6f 27 67 0f f1 85 c0 12 45 | 70 43 01 96 7d 01 69 81 8a b0 0b 08 d1 40 54 69 | 08 7f 69 f8 31 5e 9b 37 c2 56 46 05 8a 2c 74 cd | 73 c4 b5 39 bb 8c 81 c4 97 49 18 2c ce 17 a4 56 | a5 b1 98 b5 93 fe 6b bc c2 93 00 1a 7a aa e8 f7 | 9e 16 d8 e6 36 67 49 7e af 2f 60 eb cd f3 b7 6a | 60 d2 41 2c 2b 50 9f c8 44 40 ce 80 81 98 cf 17 | 31 53 e1 d5 34 76 90 8f 6f 17 46 44 c2 a9 25 1a | bb c8 2b 12 0a 1a 41 c9 b5 0e b1 65 5f 47 47 f0 | bf a6 e5 e4 cc d3 34 bc 81 ca de 84 80 2f 52 78 | 36 7b 26 1f 30 98 4d d6 d7 8c 77 eb b9 19 2a e8 | 7d a0 5e 92 74 2d 37 d4 17 8f 23 ce 1e cd 45 d9 | cf f5 6b 81 d5 e3 95 2b bc 84 3e 19 7f 4a db 38 | c7 46 31 2c ab 66 d6 cd 71 a0 bf 63 ef a6 eb 59 | 13 88 4c 39 34 56 d9 d0 92 f8 f4 65 45 ad 6a 55 | 29 00 00 24 b3 65 f5 f0 87 cd d5 8a 91 5d ad e3 | f8 32 68 b3 e0 0d 46 b4 25 a3 92 64 33 fb 91 6e | c0 dc 6f 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 f2 a2 9a 11 9e a6 4a 33 e0 87 52 | 8a c6 6f 7b 74 99 45 a9 00 00 00 1c 00 00 40 05 | 98 85 7b 6c 79 cd cc f7 14 5f 2b 56 dd 51 39 9c | f7 d7 a1 50 | libevent_free: release ptr-libevent@0x7fb35403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fd070 | #184 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 40 97 9a 99 00 ff cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #184 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #184 | rejected packet: | 71 40 97 9a 99 00 ff cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #184: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.066 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #201 | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #201 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #201 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49616.593408; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500026 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c490 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #201 | libevent_malloc: new ptr-libevent@0x7fb35403b0b0 size 128 "road-eastnet-nonat-201" #201: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #201) | 5f 8c 2f 98 2a b9 f9 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 72 1b 4b d5 18 dd 2d 5a 73 d0 41 7c 7e 89 a9 | 19 f8 4b 62 c1 9f f8 9d ff 76 0b e2 1f 44 b2 65 | 43 ea 94 88 bf 44 69 e7 07 70 c1 dc 59 58 cc ff | 59 19 82 57 fc 1c 37 9e a0 3e e4 f1 e5 85 09 b8 | cc 92 31 ca fd aa 7e e0 16 48 4f 93 4f 42 e6 41 | c6 d3 52 7b 4e f3 0c 48 a9 04 ea f5 d3 65 18 f4 | 8a 3e 8f 3d 66 71 a1 fb 46 fb e6 68 d4 de 30 4a | 77 d7 f7 51 80 44 5e 85 cb 41 c1 dc 19 46 1a 15 | 01 41 bb 17 40 1e c9 5b 1b 21 a1 10 c3 62 4c 55 | fa d0 3d 43 4e f3 0e a9 19 fd a5 f4 e9 a2 ac b4 | 40 11 51 f5 60 d4 30 87 a9 01 d5 04 88 71 af 01 | 0d f5 ab c7 33 ac d8 6a 80 db b1 bc 74 30 96 9e | f3 e1 bc b7 79 7c 12 ad fa 75 5d d2 23 fd a0 f7 | 3c 1c 0b d2 90 e2 83 a1 35 0f 5a b5 72 3d 6d 57 | 77 a3 af 0c 6a cb c1 58 a8 44 91 03 d0 f1 c3 69 | 53 0b 4f 4c fa 84 4b 60 c6 19 9c a4 39 a4 5b 44 | 29 00 00 24 ae be 08 16 b0 5a 8a 2b 33 7f 9f 5f | cb b1 1f 0b c0 df 08 67 ec 99 94 2a ad 60 2a 4f | 52 2c d3 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 75 8b 84 8e ba 07 72 da 16 0b 96 | fb 30 39 ca 67 c0 9f 42 00 00 00 1c 00 00 40 05 | 88 1b f0 23 47 26 b3 be 92 d6 69 de 00 cf 4d 8d | 78 92 34 e3 | libevent_free: release ptr-libevent@0x7fb35c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #201 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f 8c 2f 98 2a b9 f9 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #201 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #201 | rejected packet: | 5f 8c 2f 98 2a b9 f9 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #201: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7b910 | handling event EVENT_RETRANSMIT for parent state #156 | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #156 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #156 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49616.614549; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003992 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #156 | libevent_malloc: new ptr-libevent@0x7fb35c01d920 size 128 "road-eastnet-nonat-156" #156: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #156) | dd 32 b7 34 a5 67 d1 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 58 47 50 60 00 e3 2a ab 04 ac a5 14 a4 e1 f8 | 89 44 71 9e b6 e2 f8 e1 89 a3 38 1e eb a4 57 9b | c0 92 a7 d8 d8 8c 0f 8c f9 d0 36 f7 8d 04 cc a1 | 61 5a bc bb 35 d5 16 ad 1c 27 3b fa 1b a3 4f 77 | 4e 80 47 b0 e1 83 82 b2 b5 df c4 bc d9 8d 01 04 | 4e b5 a6 60 d4 4f b3 0f 13 49 05 d9 85 5d f8 18 | 24 40 91 d1 3d 7e 6a 98 45 d7 dd 05 70 e0 c6 57 | c1 84 e8 77 d6 e2 7f 57 50 49 e0 f2 9f b0 43 93 | be 02 be f3 99 3a 02 72 36 17 a3 a7 b6 d3 1e 0b | e7 53 c6 c9 cc d5 25 75 87 c0 73 6c 5f 57 27 d6 | 52 91 24 4a 97 d3 d6 0e af 8d 6c 52 24 2d ea 91 | a1 73 e1 9e 71 14 d1 4f eb 25 67 a3 b8 12 64 b9 | 8a 15 3f 88 bc 65 32 65 96 0c ff f7 b9 a7 84 11 | bd 40 10 e1 dc 1a 04 fe 8c 35 23 2a ec b7 33 72 | 4b f4 4a e9 9d f1 da a3 b6 9c fe 09 27 14 3a 79 | 5d 82 c7 e0 9b d4 a3 ce 53 68 f7 6f b3 06 c9 71 | 29 00 00 24 b7 44 fe 38 00 43 d3 2b ff 97 13 ca | 89 7c c3 ed e0 15 4d 76 12 7b b9 2f 48 9b b5 b3 | 8b 4d ce 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 13 6e 65 76 b7 ef f6 88 e7 f3 9e | f3 f9 5a bb 01 8b 91 4f 00 00 00 1c 00 00 40 05 | 4f 93 4d ef 0e 69 28 8b f3 02 75 93 a5 b3 16 9b | e0 c9 4b 18 | libevent_free: release ptr-libevent@0x7fb37803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7b910 | #156 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd 32 b7 34 a5 67 d1 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #156 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #156 | rejected packet: | dd 32 b7 34 a5 67 d1 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #156: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.067 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c780 | handling event EVENT_RETRANSMIT for parent state #99 | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #99 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #99 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49616.625217; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005388 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7b910 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #99 | libevent_malloc: new ptr-libevent@0x7fb37803b0b0 size 128 "road-eastnet-nonat-99" #99: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #99) | 20 f2 8d 71 65 ac 47 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 55 64 d8 ad 81 88 80 21 0e 25 1a b1 6c d3 13 | 60 47 54 9f 37 b3 3b e4 ef 17 20 61 85 67 62 f1 | 02 df 28 57 14 6d e3 be a6 7d d0 60 0f d8 35 56 | 23 d8 87 e9 4a f8 7b 29 e9 15 5f 82 0d 90 dd 56 | 5d 5a 2c 1a fd 14 77 42 8f 36 df a6 c7 9c d4 1a | 4f 67 c2 2e a6 a1 f6 1c 58 4b f8 cb b3 cd ce 08 | 48 62 dd 58 41 3a 14 29 9a 8c dd db 6a 06 47 a4 | 6c b7 ae b7 e4 5d db e5 9d e5 08 8e 17 5b 65 be | 17 aa 8e 73 be 9c 01 fb 31 11 79 f8 7d b5 ee ca | 7b e0 59 52 95 92 4d d8 40 43 34 f1 14 b9 84 18 | 60 68 b3 da 39 48 0e 5b 21 3c 0f 30 5d 85 b9 b8 | 1e e9 36 ff 36 9e aa 51 52 b1 5e 1d 27 fe 89 5d | cd 1e 0d 8d d6 a1 c3 a1 84 3f ea 32 11 45 0d 67 | 3f e2 4b 56 64 56 35 98 b6 f3 83 f0 90 30 0e 75 | b7 c7 9b 32 1d 5c 5f 2d d9 a9 92 93 d5 c6 6e 2b | ba f3 5c d6 20 4b dd 47 18 da e4 05 c0 7c 3e d8 | 29 00 00 24 0e 55 53 da 51 ef 9c 5f c5 b0 f0 9b | 78 63 11 53 43 43 64 d7 34 99 64 b7 14 ad 81 b4 | bb 55 f4 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 cf c4 07 93 b6 10 89 13 8b 25 5a | 5c dd 08 90 5b 56 28 b0 00 00 00 1c 00 00 40 05 | 9d 1e cf 39 e1 37 a4 6a 40 83 a9 41 54 1a 0d 5f | 91 61 32 ea | libevent_free: release ptr-libevent@0x7fb3480300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c780 | #99 spent 0.189 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 f2 8d 71 65 ac 47 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #99 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #99 | rejected packet: | 20 f2 8d 71 65 ac 47 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #99: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a986c0 | handling event EVENT_RETRANSMIT for parent state #196 | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #196 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #196 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49616.641696; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.004658 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c780 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #196 | libevent_malloc: new ptr-libevent@0x7fb3480300e0 size 128 "road-eastnet-nonat-196" #196: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #196) | 56 d5 c7 24 09 fd 90 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 8f 70 c3 ed 41 cd d6 d2 1b f8 2a 49 7b d2 65 | 1d 48 5c 44 f7 09 ac 3e 9c 08 81 f6 b3 65 8e 9b | 4e f9 50 8c c8 e7 7b 20 7c 22 4e ca 64 9d 3b 78 | 6f 58 b3 9e 1c 75 62 70 7c 61 ef 34 cb 86 a6 1c | 58 51 2c 23 30 92 4a 45 b4 b8 ae 94 76 05 b8 97 | 44 53 83 e4 01 1b 12 69 e8 13 a8 21 92 4d 3c f0 | 3d 68 d7 2a 32 bb e5 1c b4 56 88 6b 46 1e 40 2b | 43 ea 27 d3 55 2f cf 9a 31 8f 09 d3 05 58 fd 61 | 42 c4 db 9a 42 0a 57 3b 19 4b c6 5f d6 ea 27 6a | 7f bf 49 6f e7 37 63 cd b0 56 7c d1 00 23 b6 75 | b5 9d 85 99 73 08 5b 3f 63 22 53 47 75 51 36 9e | 7d c3 2d 34 ef d2 c8 dc ed 30 18 e1 fc d9 f1 f0 | 6e d9 74 09 8b e8 94 06 ae aa 96 8e cd d8 85 a8 | 1d 1c c6 45 d2 df a8 88 f7 4f 9f 49 92 80 ca a3 | 24 f7 b2 76 f6 e9 c7 34 75 8f 12 25 2f 88 bf 00 | af 80 e2 a0 d5 42 a1 0f 8a 93 9d 2c 68 e7 dc 08 | 29 00 00 24 ed 57 45 ce d5 85 17 38 4f bc 48 45 | b8 48 4b 6f c9 94 96 34 41 c5 a0 9e ee f3 85 65 | 17 35 60 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 33 d1 79 b1 42 18 cd cb 66 ed 21 | 50 1a 62 22 98 16 96 33 00 00 00 1c 00 00 40 05 | 37 d9 a8 f6 16 ad 1f 94 88 50 6d 18 f9 5d 91 a6 | 7a d6 46 08 | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a986c0 | #196 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 d5 c7 24 09 fd 90 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #196 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #196 | rejected packet: | 56 d5 c7 24 09 fd 90 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #196: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-206" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-206' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #206 at 0x557d46aed5c0 | State DB: adding IKEv2 state #206 in UNDEFINED | pstats #206 ikev2.ike started | Message ID: init #206: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #206: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #206; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-206" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-206" IKE SA #206 "road-eastnet-nonat-206" "road-eastnet-nonat-206" #206: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-206 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-206": constructed local IKE proposals for road-eastnet-nonat-206 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 206 for state #206 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a986c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #206 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 | #206 spent 0.156 milliseconds in ikev2_parent_outI1() | crypto helper 14 resuming | crypto helper 14 starting work-order 206 for state #206 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 206 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-206" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.245 milliseconds in whack | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 206 time elapsed 0.001044 seconds | (#206) spent 0.999 milliseconds in crypto helper computing work-order 206: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 206 for state #206 to event queue | scheduling resume sending helper answer for #206 | libevent_malloc: new ptr-libevent@0x7fb3700407f0 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #206 | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 206 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #206 | **emit ISAKMP Message: | initiator cookie: | 01 b3 28 e7 e1 8b 13 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-206 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 47 fa e3 24 f9 a6 bc f3 21 1e 37 1a 6d f4 9a 7b | ikev2 g^x 77 24 5e 56 24 67 7b 74 f9 64 dc d8 1a b5 59 69 | ikev2 g^x d9 52 b7 b7 59 74 06 38 08 06 47 89 aa a8 f6 76 | ikev2 g^x 67 bf d4 4c 77 38 3b a1 63 60 dc 2b e4 fd cd 8b | ikev2 g^x 9a 4a 0c c7 7b 27 52 84 4e da 22 90 8d d5 51 6e | ikev2 g^x 00 c5 39 c6 ed 97 f2 c6 62 d9 ba 39 61 32 bb b8 | ikev2 g^x 11 91 00 ac cd 59 52 93 9f 38 fd 04 59 e4 ef 16 | ikev2 g^x eb bf 19 45 a5 bc 57 3a 53 a0 af 42 99 76 fa 1f | ikev2 g^x bd f3 4c 0f c8 d9 db e2 c0 a7 a6 04 31 f7 f9 f3 | ikev2 g^x 77 5c f7 e0 36 17 0a 5b 7e 68 29 02 15 2c e5 8a | ikev2 g^x 69 a2 34 36 51 a6 dc bd 4c c4 84 48 fa dd 5f b4 | ikev2 g^x 73 4d 7d 2b ff 7e df 63 45 9b 17 c7 95 9a 49 c4 | ikev2 g^x 94 db d0 f3 cd fa 37 d8 ec f4 8c 44 3e 14 f3 a8 | ikev2 g^x 13 2a dc fa 14 d8 cb 5f 5e 17 3a bf 2d 92 c3 14 | ikev2 g^x 49 5a 16 33 0a 40 13 9b 4f 56 1a aa ae 2b 43 6f | ikev2 g^x 7d 54 d1 07 b7 2a 7c 54 16 74 51 00 fd 0a b4 02 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 44 53 3f fa 64 f7 0e 35 c1 fb 1d 6e fa 42 52 34 | IKEv2 nonce 05 1a a7 3b 67 a9 b1 fa 7a da c7 46 65 3a cf a1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 01 b3 28 e7 e1 8b 13 e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ce | natd_hash: port= 01 f4 | natd_hash: hash= f4 ab 21 a3 8f 50 c0 c7 3c cf c9 b6 d3 91 c9 10 | natd_hash: hash= 6d b3 85 90 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f4 ab 21 a3 8f 50 c0 c7 3c cf c9 b6 d3 91 c9 10 | Notify data 6d b3 85 90 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 01 b3 28 e7 e1 8b 13 e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= fa 90 51 e6 cc c6 e6 dc b8 75 a7 d9 1e dd 64 0c | natd_hash: hash= e1 7b e8 fe | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fa 90 51 e6 cc c6 e6 dc b8 75 a7 d9 1e dd 64 0c | Notify data e1 7b e8 fe | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #206 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #206: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #206 to 4294967295 after switching state | Message ID: IKE #206 skipping update_recv as MD is fake | Message ID: sent #206 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-206" #206: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.206:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #206) | 01 b3 28 e7 e1 8b 13 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 fa e3 24 f9 a6 bc f3 21 1e 37 1a 6d f4 9a 7b | 77 24 5e 56 24 67 7b 74 f9 64 dc d8 1a b5 59 69 | d9 52 b7 b7 59 74 06 38 08 06 47 89 aa a8 f6 76 | 67 bf d4 4c 77 38 3b a1 63 60 dc 2b e4 fd cd 8b | 9a 4a 0c c7 7b 27 52 84 4e da 22 90 8d d5 51 6e | 00 c5 39 c6 ed 97 f2 c6 62 d9 ba 39 61 32 bb b8 | 11 91 00 ac cd 59 52 93 9f 38 fd 04 59 e4 ef 16 | eb bf 19 45 a5 bc 57 3a 53 a0 af 42 99 76 fa 1f | bd f3 4c 0f c8 d9 db e2 c0 a7 a6 04 31 f7 f9 f3 | 77 5c f7 e0 36 17 0a 5b 7e 68 29 02 15 2c e5 8a | 69 a2 34 36 51 a6 dc bd 4c c4 84 48 fa dd 5f b4 | 73 4d 7d 2b ff 7e df 63 45 9b 17 c7 95 9a 49 c4 | 94 db d0 f3 cd fa 37 d8 ec f4 8c 44 3e 14 f3 a8 | 13 2a dc fa 14 d8 cb 5f 5e 17 3a bf 2d 92 c3 14 | 49 5a 16 33 0a 40 13 9b 4f 56 1a aa ae 2b 43 6f | 7d 54 d1 07 b7 2a 7c 54 16 74 51 00 fd 0a b4 02 | 29 00 00 24 44 53 3f fa 64 f7 0e 35 c1 fb 1d 6e | fa 42 52 34 05 1a a7 3b 67 a9 b1 fa 7a da c7 46 | 65 3a cf a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 ab 21 a3 8f 50 c0 c7 3c cf c9 b6 | d3 91 c9 10 6d b3 85 90 00 00 00 1c 00 00 40 05 | fa 90 51 e6 cc c6 e6 dc b8 75 a7 d9 1e dd 64 0c | e1 7b e8 fe | state #206 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a986c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a986c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #206 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 | #206 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49616.647488 | resume sending helper answer for #206 suppresed complete_v2_state_transition() and stole MD | #206 spent 0.486 milliseconds in resume sending helper answer | stop processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3700407f0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 b3 28 e7 e1 8b 13 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #206 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #206 | rejected packet: | 01 b3 28 e7 e1 8b 13 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #206: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8e0 | handling event EVENT_RETRANSMIT for parent state #185 | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #185 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #185 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49616.650378; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004494 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fd070 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #185 | libevent_malloc: new ptr-libevent@0x7fb3700407f0 size 128 "road-eastnet-nonat-185" #185: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #185) | 94 c0 c2 c7 3b 30 ec 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 10 80 e8 ac 1b 57 a4 b7 f2 12 9c c9 c8 96 12 | d8 b4 37 f7 f8 c8 3c b7 f2 86 fb 6d bc 61 da 40 | 39 a4 09 f0 8f 66 50 7a 6b 75 22 97 37 a4 94 4e | a8 5c 5f 80 9b d3 2e fd ee fe 03 91 38 cd a2 e4 | 3e 5d b4 2b f3 14 af ae 26 82 7e 4b 88 39 37 81 | 82 aa 3c c6 ab ba 4d b3 20 34 8d 80 3d de a0 ad | 42 64 df 60 e3 cc 41 7d eb 1f a9 4c f0 d1 47 57 | 07 35 a5 e9 25 89 b5 0e 8b 91 92 1f 2f 09 b9 ab | 46 f1 69 33 6d d8 ef 90 01 9f 20 97 28 19 d8 4c | ce 9d c5 c8 74 d2 ec a5 dd e6 34 68 1e 8b 44 b9 | 5e 3c 90 76 95 68 8e 41 20 32 dd ca 48 f2 30 6e | af 87 2d 28 a1 ad c2 a1 66 51 1d 16 88 02 4d 4b | 75 a2 59 e4 ff 63 fb 70 3e 65 bb 8f d3 36 fc 97 | bb a3 6c c7 eb b7 6a f4 47 9b e0 12 1b e1 cc 32 | 68 f4 57 ff 85 75 10 4d 46 e9 36 6a ae db 06 a6 | 0f 02 20 5f 93 d8 c0 d3 99 19 3c 12 5e d8 75 16 | 29 00 00 24 d5 ca 6a 54 4d eb c2 30 7e c2 c0 88 | f4 64 53 65 cf cb b4 99 9a a7 3b 19 af 88 ec 6a | ae 0e 11 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a b7 31 38 16 04 07 33 64 be 6b 23 | be e3 1c e2 4f 4e 6e d8 00 00 00 1c 00 00 40 05 | c2 92 61 e3 4d 3a b1 c0 20 50 44 2b db 6e 80 18 | c6 ee 39 60 | libevent_free: release ptr-libevent@0x7fb34803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8e0 | #185 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 c0 c2 c7 3b 30 ec 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #185 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #185 | rejected packet: | 94 c0 c2 c7 3b 30 ec 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #185: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #157 | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #157 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #157 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49616.678763; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003617 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8d60 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #157 | libevent_malloc: new ptr-libevent@0x7fb34803b0b0 size 128 "road-eastnet-nonat-157" #157: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #157) | 58 3c 05 73 d3 10 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 16 05 06 2f 3b 22 9e 88 08 ab fe 29 25 f8 32 23 | d0 15 af d8 5f 65 e8 be c6 03 98 0f 18 e5 00 77 | 99 86 03 c7 fc 1b e8 83 43 61 ba 00 0c dc 29 59 | 0d fd 85 a1 75 5e f3 f7 d2 64 26 3b e1 11 43 3a | 94 43 08 73 30 5e 1d 91 aa 8f 9d c1 5c 52 ae c1 | 1d 90 3b cb 44 47 58 f3 40 38 01 58 63 65 29 32 | b6 4a 78 a5 71 58 c1 30 ea 73 8e 14 71 72 8e df | ee 45 ee f6 d2 a7 99 89 1c 7b fc 81 aa fe 75 bb | 36 cb a8 81 eb 73 7b eb 5a e7 fa 6d e5 b4 95 b2 | be 54 f3 23 c2 44 23 4a b5 30 87 1d 26 24 c6 c4 | 6b d1 5d 1a 24 7a 69 b5 9b 7f 97 17 e0 18 0f 6f | 1f f9 f1 e8 6c 46 2c d8 28 aa 7c 1d ec ed d6 d3 | b6 eb c6 eb 3b 55 59 5b 10 23 06 f1 f2 aa 19 3c | 8e ca 99 c8 e5 ba 47 04 47 84 62 13 96 06 08 0d | 88 7a a1 63 08 7b df 84 fd 48 36 29 3e 5c 44 7d | 05 23 1e 33 96 d8 b6 34 ea b3 94 6e cc d2 07 97 | 29 00 00 24 a9 6f a2 6f e4 cf 6b 0e 7b b9 69 24 | 56 3d ee de fe c6 39 89 8e 14 c9 0f 9e 2f 60 95 | f7 4e c6 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 bf ce be 86 a6 d7 14 f3 ba 0e 49 | ee d2 d5 26 4c 2e 13 18 00 00 00 1c 00 00 40 05 | 0a 36 59 95 a8 fb 5c 3b ea 04 70 de 29 72 15 40 | a3 00 f6 34 | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | #157 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 3c 05 73 d3 10 8c 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #157 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #157 | rejected packet: | 58 3c 05 73 d3 10 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #157: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_RETRANSMIT for parent state #3 | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #3 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #3 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49616.681188; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.012245 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #3 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 "road-eastnet-nonat-3" #3: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #3) | 81 44 b6 c8 2a 40 ce 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 54 15 6a 8c 9d d0 48 d6 59 e5 e2 2e a9 83 c3 | a8 ba 16 88 07 d6 11 91 3a 48 ca 9a fe dc 40 cc | 29 63 c0 dc 38 80 92 c8 fd f6 81 d3 d8 66 94 3d | c5 2d e7 b1 2b da e7 bc 78 d1 e4 dc 9a 41 8c 14 | c6 fb cd 2a 97 af ef ad 23 32 6d 6d f8 fa b5 27 | 9e 41 35 14 10 3b f6 98 c8 8f d3 aa de fa 55 91 | cb c5 c0 43 8b 3e 66 29 8a ce 63 ed 04 d9 5e 36 | d1 ee b2 55 32 92 26 8a 60 a1 e6 8a c1 81 34 3b | fe bb 92 45 5e 07 2a fa 53 4e 52 04 9a fe 49 14 | 7b 7a a1 34 68 ab 79 c6 b1 5b 9e 7d ee f2 e3 2b | b4 f7 cd 72 14 0a 7e 40 88 1b b7 27 4f cc 0e 08 | a7 a7 14 77 d4 62 20 1a 96 bd a4 9c 9c c7 ed e3 | be 59 87 38 e7 1a a8 83 a8 52 47 62 89 d6 f0 d1 | ce 49 83 2a 83 87 c7 c7 2e 90 40 05 a6 4e c5 26 | bd c4 1e e7 34 ac 09 b9 70 d9 7f 32 91 1c d9 7b | 01 ed eb 14 c7 ff 07 8b 68 87 79 fe ab f8 54 a7 | 29 00 00 24 af 67 2a 08 9a 9a ad ff 86 6c 03 06 | 6f 2f 6b af d5 26 d4 77 40 17 03 25 58 a0 84 c4 | 14 b9 e1 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 4b 9f 22 64 ba ce 64 1d b6 f5 ba | 24 33 ca 6e b0 87 4a 02 00 00 00 1c 00 00 40 05 | 8e b1 42 d9 c7 63 9c 7b 3d 57 a7 c1 0c 5d 8c 4c | 33 59 3d db | libevent_free: release ptr-libevent@0x7fb34400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | #3 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 44 b6 c8 2a 40 ce 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #3 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #3 | rejected packet: | 81 44 b6 c8 2a 40 ce 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #3: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abfd80 | handling event EVENT_RETRANSMIT for parent state #202 | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #202 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #202 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49616.68551; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500134 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #202 | libevent_malloc: new ptr-libevent@0x7fb34400cf80 size 128 "road-eastnet-nonat-202" #202: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #202) | 98 0c a0 3b 8e c3 04 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 4a de 90 9e 09 12 3c c9 7a 03 ab 1b f1 18 11 | 66 c3 f7 79 15 3a 95 02 ba e1 c3 e1 f6 5a 7b 34 | 8e de 4d 10 9a e1 70 a5 55 9d f4 c1 17 92 7c df | 68 e1 17 a5 99 1c fb 35 b9 25 cd 23 53 a8 26 d2 | b4 87 e9 2f e3 5a ea 45 0a 90 48 f4 6a 56 94 50 | e4 57 95 d6 52 83 af 6a c6 31 70 b1 c4 d3 c8 6b | cf c5 42 e4 73 01 2f be 13 4a 08 6e a7 91 68 14 | ad a5 a0 e4 14 1f a0 f2 00 98 4c ce c7 d5 c0 b6 | 15 77 5c 51 52 78 e1 34 5c df ff 32 7c 7c eb 4c | 74 06 ff d8 24 f4 34 27 4b f7 4d 5c de 29 22 32 | 61 0e 41 b1 a4 d1 44 ff 96 54 64 39 71 47 b7 07 | 8b 2d f1 7b c7 ff 29 67 2b 47 cf 64 2a ba 75 f5 | b7 8f 94 01 0c 73 d3 d0 a0 ca 7b 5c 80 ff e9 5a | df 27 66 99 d5 41 03 93 26 82 2e 43 c1 d3 4e 98 | 2a e1 9f 1a 15 c9 bf 3d d7 73 59 c0 eb c5 7f 3c | 4c 61 b0 05 20 29 0a b9 6b bf 44 e2 c1 1a 84 6d | 29 00 00 24 99 ea 46 58 fc ef 28 85 a0 72 43 c8 | 36 86 2f 35 31 69 ef db 0d c0 f1 46 4d af df db | 48 57 6f 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 23 33 21 68 f3 9f d6 75 73 74 16 | 0f 96 1b 0a 5a 2e 12 b4 00 00 00 1c 00 00 40 05 | 9b b4 ff f5 5e e8 7e 5a 50 28 47 10 22 d7 72 89 | 2b d0 c4 98 | libevent_free: release ptr-libevent@0x7fb3380251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abfd80 | #202 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 0c a0 3b 8e c3 04 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #202 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #202 | rejected packet: | 98 0c a0 3b 8e c3 04 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #202: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a272b0 | handling event EVENT_RETRANSMIT for parent state #100 | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #100 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #100 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49616.709346; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003771 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abfd80 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #100 | libevent_malloc: new ptr-libevent@0x7fb3380251c0 size 128 "road-eastnet-nonat-100" #100: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #100) | e4 31 72 ce cb 4c 2e da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 02 70 26 8b f7 4c 10 d5 54 2d e1 56 87 42 60 | 52 43 18 58 d2 c6 63 79 e0 4c 7b 4a 2f b9 0e c8 | b1 65 1d 3e 6c a0 42 98 0c 60 fd b3 4d 30 f1 76 | 5e b7 85 03 42 2b d9 76 75 50 2e c4 69 94 03 7a | 6e c6 23 13 83 28 87 89 db 36 67 01 a4 44 23 73 | e4 b0 04 73 26 bb b0 01 8a 59 be 71 cf 90 5c 3a | 4f 3e 50 e0 98 79 eb 2c 62 ed 3b ff 05 2e f6 81 | 65 38 8c a4 51 39 05 8b 85 23 c5 f6 84 98 62 7d | 1d 2f 44 0d 73 e0 13 c3 51 be 3b 56 26 36 4c 79 | eb bc 2b 5e 2c 37 b2 d5 29 fa 64 f9 de 60 b9 ba | 73 c4 a9 28 1e 62 38 24 9d a3 96 c5 53 73 2c 7d | 0d 39 e6 12 54 ca 75 11 6f 12 17 8e e1 13 5d 45 | 12 9e c5 b7 6a ce 49 b5 ef 7b 55 be 70 ce 3a 18 | d9 f0 2c b9 2c 8a 17 6a 09 a2 d9 96 28 14 14 67 | 3e 3b 41 a6 c6 44 44 f5 69 48 d1 0a 41 9c 30 d6 | 74 2c 38 9d d2 1f 0a f9 85 a8 83 ce dd 7d a1 17 | 29 00 00 24 9b 63 67 5a a5 90 71 08 bf 01 2e 0d | 7a 17 c3 85 da c2 c9 b2 79 84 88 d1 44 e9 43 2f | de e8 87 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb bf 15 80 9f fe 69 e3 a2 7b 53 a0 | 71 05 30 05 2a 8e cb 5a 00 00 00 1c 00 00 40 05 | e0 55 02 95 04 d8 fc 5b b5 ab 42 28 79 3c 3e 17 | 70 aa 5d 58 | libevent_free: release ptr-libevent@0x7fb34c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a272b0 | #100 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 31 72 ce cb 4c 2e da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #100 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #100 | rejected packet: | e4 31 72 ce cb 4c 2e da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #100: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0731 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a92f40 | handling event EVENT_RETRANSMIT for parent state #197 | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #197 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #197 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49616.720863; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001359 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad5900 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #197 | libevent_malloc: new ptr-libevent@0x7fb34c0300e0 size 128 "road-eastnet-nonat-197" #197: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #197) | 76 fd 06 22 f8 72 39 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff 68 ad 96 cd 76 be 78 ca de ba cf 7d b8 d2 27 | eb 47 3d ab 5c da 69 f4 c0 aa ef 37 1d c8 bc 64 | b3 77 c8 06 c7 c1 ca 6e ba 13 a5 88 a0 2f 7d 28 | 77 76 19 e0 b9 08 19 f4 ea 19 57 8a 4a c5 51 64 | b2 b3 06 1d b7 55 89 e3 2f 55 c2 0a 68 16 ae bf | bc 84 d6 24 e3 0d 3a 6d 7f b0 26 cf fc 83 69 6f | 06 6c 19 78 05 aa 1a a7 a3 53 01 3e 4f 01 0c e2 | b6 b8 5e d8 44 74 c4 4a 7b 03 78 a3 0d 18 93 01 | ca 83 a7 98 02 8f 9a c5 fb 52 4a 95 fa 85 65 9f | 48 a4 30 21 ca 8f d8 e0 98 f5 f9 49 2a 0a 5a b1 | e0 a0 a3 25 65 8b 86 36 1d 17 ff 3c 76 35 24 e3 | b6 f7 d8 e5 22 2f 0d 80 58 07 89 c1 b8 b9 b6 a3 | ac a9 f3 74 55 c9 1c c7 ef 2f b9 00 be f9 d3 c9 | 30 e9 ef 92 c0 ce 36 02 ea 19 c8 d7 f7 c5 6a 1c | b8 72 5b 69 21 d3 b8 ca 13 78 68 f5 5e 6f 80 64 | 1c aa ea 24 03 ee 29 9b c1 bb 83 e4 a6 7c 10 08 | 29 00 00 24 74 4f 18 14 83 36 22 20 12 7b 44 86 | f2 c1 e1 0b 40 a8 83 e6 1a 42 e2 88 a2 98 21 31 | 2c b2 85 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 2f 89 09 b5 52 02 b8 23 bc 44 51 | 94 1d 2d 47 4e ed 65 d6 00 00 00 1c 00 00 40 05 | 73 fc 3d fb 5c fa a5 ca c9 53 fd 67 5c 67 b8 86 | 11 c4 a6 88 | libevent_free: release ptr-libevent@0x7fb38003dab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f40 | #197 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 fd 06 22 f8 72 39 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #197 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #197 | rejected packet: | 76 fd 06 22 f8 72 39 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #197: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.087 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338005860 | handling event EVENT_RETRANSMIT for parent state #186 | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #186 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #186 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49616.733271; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004953 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f40 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #186 | libevent_malloc: new ptr-libevent@0x7fb38003dab0 size 128 "road-eastnet-nonat-186" #186: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #186) | 89 a9 38 aa a6 c0 30 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc fc 7f 3d ba 5a de bc 76 c2 c4 f8 68 37 1f ff | ca 8e ea 53 55 b1 47 97 0b 37 3b 65 fa 61 e7 dd | 35 17 7f ab 01 8e 38 9f 4b 7f 31 31 92 f1 ba bb | d0 06 33 61 10 0b fa 86 b8 ef 01 c3 cf b1 bb 29 | 2f 2d 37 13 10 34 87 1c 1a 2a fa 97 52 ab 57 63 | 92 bf 2b 4d 93 56 f2 e9 12 3c 46 24 50 0a 19 24 | b2 fa e0 6c 1d 91 6c 12 4e 27 c3 47 94 7d 6e 37 | 39 fc 81 56 89 ca 68 6b ce 06 f5 e3 55 1e 76 a1 | 72 bf 58 f7 9a b2 03 67 a0 61 c5 e9 74 36 67 70 | b9 96 14 a2 56 cb b9 33 ac 90 e3 4f 5c 75 ef 3c | 0e 13 a9 08 94 45 0a e0 b9 1a 9c 47 5c ef 62 4f | 55 46 d5 a5 09 5b 68 73 3a 25 4c 57 99 05 2a 57 | 57 52 51 7e 0f b6 14 9f 14 b0 d1 cf 63 29 63 a1 | 49 60 4a 12 aa 1e 1e 0f 3e 32 25 9c d8 71 75 aa | 14 8e 9d fc 55 96 cf 4d 35 00 a5 a7 02 46 8a b7 | 5a f6 88 8a 4d 78 6c e2 1c 82 47 88 0b 3b 1c 06 | 29 00 00 24 d4 45 d6 30 bc fb 2b aa 5c 8e f3 b7 | 0c 17 f8 b2 59 80 d2 e0 0c b8 b9 7f 67 b9 de e9 | d9 5a 25 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 68 b4 19 b5 e8 c7 d6 3c c7 30 38 | 5a e1 45 af bf 1b f1 0b 00 00 00 1c 00 00 40 05 | db 71 7b 2e 3b 5f 62 cf 6c 1d 8c 60 1b 08 38 c5 | 84 d6 4e b5 | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338005860 | #186 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 a9 38 aa a6 c0 30 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #186 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #186 | rejected packet: | 89 a9 38 aa a6 c0 30 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #186: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0656 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3980 | handling event EVENT_RETRANSMIT for parent state #158 | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #158 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #158 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49616.741602; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003199 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #158 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-158" #158: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #158) | e6 a0 1a 4e 16 85 73 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d fe 92 1d 51 a7 6d 12 34 05 5b 88 3c 14 89 6b | 35 8c a3 94 b4 c5 44 d8 4b 8c 87 4c af 0d 5e 27 | cd 39 40 ee d3 b1 d8 0b a2 08 8c 95 70 dc 7c 67 | 00 94 18 0b cc 36 ba 02 42 ac 1b 6e 83 e8 f3 b5 | 91 59 9d ad e6 9f 36 2d a8 98 92 82 b5 58 8d 17 | e8 c3 14 93 e3 79 91 5b e9 d6 f6 a5 7b ab 15 3e | 02 89 3b e3 40 68 94 7c a5 09 b7 59 3e c5 6a 99 | 03 29 08 a9 4d cb 54 e8 24 b9 ad 4e d9 ec 0b 15 | 00 2a bb 1a df 73 04 f9 ab 12 4b db 50 44 e0 e2 | 22 35 8e 9a 3a 55 04 43 31 37 ac 1b 04 2e 40 6f | a3 ce 4b 7d 81 aa 0c 4f 00 20 e7 14 67 8a 92 03 | be 6c 2c b0 1e 89 ff eb d0 66 ac db b5 5f 07 46 | 34 4e 75 3e 19 4d d5 e5 2d 16 89 cc 75 86 80 6f | 3f aa e7 c1 07 a0 f4 7f 40 db 1c df 1d 97 4e 83 | 99 fc 4e 29 fa a7 c5 07 07 e9 c0 d9 34 f7 42 65 | b3 46 1d 34 7e 34 fc b8 2a d6 72 9b 56 fa c8 74 | 29 00 00 24 93 3e 30 9d 56 73 68 ed 32 94 90 87 | db 7b 56 ae fd bb a5 6c 98 47 2c cb b8 9c 69 c6 | ac 01 dc 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 af 5c ca 3f 10 b2 e1 eb 3b d6 06 3e | 82 97 94 30 e1 e8 70 cd 00 00 00 1c 00 00 40 05 | bb 02 3a cc bb 31 72 ec b9 81 77 29 32 3e e8 21 | a2 17 d3 ee | libevent_free: release ptr-libevent@0x7fb37003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3980 | #158 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 a0 1a 4e 16 85 73 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #158 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #158 | rejected packet: | e6 a0 1a 4e 16 85 73 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #158: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-207" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-207' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #207 at 0x557d46aeeb80 | State DB: adding IKEv2 state #207 in UNDEFINED | pstats #207 ikev2.ike started | Message ID: init #207: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #207: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #207; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-207" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-207" IKE SA #207 "road-eastnet-nonat-207" "road-eastnet-nonat-207" #207: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-207 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-207": constructed local IKE proposals for road-eastnet-nonat-207 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 207 for state #207 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab3980 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #207 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 | #207 spent 0.175 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-207" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.263 milliseconds in whack | crypto helper 15 resuming | crypto helper 15 starting work-order 207 for state #207 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 207 | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 207 time elapsed 0.000989 seconds | (#207) spent 0.995 milliseconds in crypto helper computing work-order 207: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 207 for state #207 to event queue | scheduling resume sending helper answer for #207 | libevent_malloc: new ptr-libevent@0x7fb374040670 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #207 | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 207 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #207 | **emit ISAKMP Message: | initiator cookie: | 98 86 9a c8 81 d3 6e e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-207 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8e 59 ae 25 5d aa 28 92 c6 18 2f bc 82 85 c2 3b | ikev2 g^x ef 2d af ff 7a e6 4d 2d 70 93 a0 de ce 52 57 5f | ikev2 g^x cf 57 26 3f 1c a7 0f b2 96 d8 25 c6 cb c3 1d 15 | ikev2 g^x 8e 04 6c c9 e5 de a9 9f 48 ec bf 8a ac af 55 b7 | ikev2 g^x 16 4e ac b3 75 43 96 89 7c 9a 69 70 08 ac 14 3e | ikev2 g^x 96 4b 5a 70 2a 29 e5 8b 07 f0 5c cb ed e2 91 b3 | ikev2 g^x 9b d7 77 9b 28 c0 fb 49 4d 80 b8 6a 5f 4b e2 be | ikev2 g^x 9f 93 81 d7 4b ea 7b e4 89 24 53 bc a4 06 8a 63 | ikev2 g^x ae f3 eb f3 e4 35 75 5b 3f a9 62 83 5c be e9 3f | ikev2 g^x da 2a 80 0c d1 89 a8 df 56 22 c5 4a 79 92 72 a5 | ikev2 g^x 3c 63 0a 48 54 25 a3 65 43 13 ce a4 3e 09 f7 a7 | ikev2 g^x 13 60 08 7a 31 57 5f 3e ec 21 89 2d 48 e6 b5 d0 | ikev2 g^x 55 c4 14 94 07 66 75 e1 7b b7 31 ad 1e 44 cd 2a | ikev2 g^x 84 8d 3f db f4 29 57 19 60 3f fa 98 86 72 4b e8 | ikev2 g^x c5 e2 25 d0 6a 0d c6 7c 2e b9 5b 59 7f 50 39 10 | ikev2 g^x 7f 2b dd a7 68 a0 e6 07 75 6e ff 62 1d 5c 80 75 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e2 c5 0f b4 00 31 2d 18 4e d6 58 87 9d 2e 37 b9 | IKEv2 nonce b3 22 c5 5a fd 1c 75 2e 4d 23 6a 09 d6 2f 3b 6a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 98 86 9a c8 81 d3 6e e1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 cf | natd_hash: port= 01 f4 | natd_hash: hash= 74 0a 15 af 31 57 a5 69 ec 8c db 25 c8 27 a9 b0 | natd_hash: hash= 00 8f 48 7f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 74 0a 15 af 31 57 a5 69 ec 8c db 25 c8 27 a9 b0 | Notify data 00 8f 48 7f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 98 86 9a c8 81 d3 6e e1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= af fe 48 1b 76 51 69 26 e1 f2 f5 ea 64 9f 61 35 | natd_hash: hash= 72 2e c3 f3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data af fe 48 1b 76 51 69 26 e1 f2 f5 ea 64 9f 61 35 | Notify data 72 2e c3 f3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #207 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #207: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #207 to 4294967295 after switching state | Message ID: IKE #207 skipping update_recv as MD is fake | Message ID: sent #207 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-207" #207: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.207:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #207) | 98 86 9a c8 81 d3 6e e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 59 ae 25 5d aa 28 92 c6 18 2f bc 82 85 c2 3b | ef 2d af ff 7a e6 4d 2d 70 93 a0 de ce 52 57 5f | cf 57 26 3f 1c a7 0f b2 96 d8 25 c6 cb c3 1d 15 | 8e 04 6c c9 e5 de a9 9f 48 ec bf 8a ac af 55 b7 | 16 4e ac b3 75 43 96 89 7c 9a 69 70 08 ac 14 3e | 96 4b 5a 70 2a 29 e5 8b 07 f0 5c cb ed e2 91 b3 | 9b d7 77 9b 28 c0 fb 49 4d 80 b8 6a 5f 4b e2 be | 9f 93 81 d7 4b ea 7b e4 89 24 53 bc a4 06 8a 63 | ae f3 eb f3 e4 35 75 5b 3f a9 62 83 5c be e9 3f | da 2a 80 0c d1 89 a8 df 56 22 c5 4a 79 92 72 a5 | 3c 63 0a 48 54 25 a3 65 43 13 ce a4 3e 09 f7 a7 | 13 60 08 7a 31 57 5f 3e ec 21 89 2d 48 e6 b5 d0 | 55 c4 14 94 07 66 75 e1 7b b7 31 ad 1e 44 cd 2a | 84 8d 3f db f4 29 57 19 60 3f fa 98 86 72 4b e8 | c5 e2 25 d0 6a 0d c6 7c 2e b9 5b 59 7f 50 39 10 | 7f 2b dd a7 68 a0 e6 07 75 6e ff 62 1d 5c 80 75 | 29 00 00 24 e2 c5 0f b4 00 31 2d 18 4e d6 58 87 | 9d 2e 37 b9 b3 22 c5 5a fd 1c 75 2e 4d 23 6a 09 | d6 2f 3b 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 0a 15 af 31 57 a5 69 ec 8c db 25 | c8 27 a9 b0 00 8f 48 7f 00 00 00 1c 00 00 40 05 | af fe 48 1b 76 51 69 26 e1 f2 f5 ea 64 9f 61 35 | 72 2e c3 f3 | state #207 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37003b0b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab3980 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3980 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #207 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 | #207 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49616.760526 | resume sending helper answer for #207 suppresed complete_v2_state_transition() and stole MD | #207 spent 0.479 milliseconds in resume sending helper answer | stop processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb374040670 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 86 9a c8 81 d3 6e e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #207 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #207 | rejected packet: | 98 86 9a c8 81 d3 6e e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #207: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a011f0 | handling event EVENT_RETRANSMIT for parent state #203 | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #203 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #203 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49616.7658; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500637 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a272b0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #203 | libevent_malloc: new ptr-libevent@0x7fb374040670 size 128 "road-eastnet-nonat-203" #203: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #203) | 02 57 d9 3d 13 25 98 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 1c fb 0e 8f 43 ac f5 0b 5f c4 59 e2 84 8d ff | 93 42 c3 e3 19 35 29 34 62 44 7f 8b b9 60 94 1a | 68 20 33 36 7e 07 ef b9 9d 1a c3 c4 e5 e3 be 6f | df 48 47 f9 cf 7a 23 fa b8 b9 0f be e3 51 16 88 | 65 2c 32 42 a7 de 33 7a 8d 00 20 5f 8c 23 cc 9e | fd 93 18 91 08 48 46 f6 9e a4 63 04 36 57 fb 82 | db a9 f0 b9 fc 47 88 c1 af a0 52 b6 f2 77 4a 78 | 7b 45 5f 81 61 4c a8 5c 40 e9 6e 59 e6 65 a5 7d | 8f 67 9e 58 05 f0 0e f3 10 e5 4c 4f bd 20 a3 7c | 88 1e 84 95 b7 f3 51 db 65 68 67 47 f1 73 c2 67 | 48 a3 dc a1 e1 3f e7 d7 4c f9 dc 2e f5 e0 7c 72 | 3d 2f 82 8d c1 ef e8 9c 9c 82 12 27 e5 0a e4 bb | af 79 89 91 83 59 68 9b 2f 98 3b 89 0a 25 be 74 | c0 0f b6 99 3d 8f b4 39 9b 96 c4 d8 6a 5d 53 81 | 43 9d 7a a3 69 c9 61 8c c0 23 f3 33 21 de 95 0e | 53 97 be e9 2a e9 9e 71 b5 e7 b9 2b cb 16 40 76 | 29 00 00 24 ad 22 cd 07 aa fe 98 d8 02 52 a4 3c | 95 12 5a d9 ed 8e 49 c5 19 c8 cb b1 88 c1 88 b9 | c9 3f 70 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 60 71 59 6f 4c 24 43 8a 9c 00 7b | c3 3a 97 05 f3 23 35 42 00 00 00 1c 00 00 40 05 | 0d db 79 a2 0f bb d9 bd 26 88 9d ac d1 d3 87 df | 66 b4 d9 d4 | libevent_free: release ptr-libevent@0x7fb3600300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a011f0 | #203 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 57 d9 3d 13 25 98 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #203 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #203 | rejected packet: | 02 57 d9 3d 13 25 98 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #203: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6e010 | handling event EVENT_RETRANSMIT for parent state #101 | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #101 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #101 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49616.805109; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.01538 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8e0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #101 | libevent_malloc: new ptr-libevent@0x7fb3600300e0 size 128 "road-eastnet-nonat-101" #101: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #101) | a4 e5 70 36 3e 53 78 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 47 67 da db 52 1d 6f 38 4e a0 14 fb a3 22 ee | a5 bd 87 bb f4 50 cd e1 5f f4 bb 7f 5e 01 20 78 | 03 d2 5e e5 f5 4c 45 4d 90 0b ab 1e a9 68 0d a2 | 63 8b 82 0b 63 5a be b1 7a 7f 0a d0 8f 73 00 89 | 01 d6 0d 8e e0 01 de 09 aa b1 2b c9 2a 85 99 3e | e4 12 33 b6 ff a4 02 5b a4 0f a9 0e 49 92 c4 c4 | 91 bb bd cc bc 4e ec 81 b6 b6 b8 9c 4a 4e 40 d2 | 5e b4 c5 bc f7 4c 25 7f b5 8f df 4b 29 de 24 b5 | 99 9e 0e bd 10 eb 77 c5 31 71 d3 38 c7 ae 1b 45 | a1 15 8f 53 f2 46 e1 e0 f3 7d cd 3a fa d7 ce cc | 71 fa 98 05 20 5e 2b 57 e0 1e 93 66 04 94 47 68 | b5 fc da d4 67 d1 27 06 e7 0b 81 26 9b 06 3d 8a | 68 ab 7d 23 5f b3 75 b4 20 05 d5 0a d7 9f 47 f8 | cc 49 2f 28 05 85 5c 22 76 a9 df c7 57 38 c2 59 | 85 34 bf b9 39 30 70 bd fe 4d 41 14 30 36 f4 a7 | a4 75 83 53 e7 c0 5a e0 b5 e5 07 a1 66 16 4d c3 | 29 00 00 24 08 f8 1e 60 51 22 a7 7a 61 74 80 8a | 8a 13 29 1d 07 8a 7f 81 27 3b e2 db 98 17 8f 37 | 46 82 14 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 37 fb 68 83 f3 3a 11 a5 17 fb 1f | 7d e8 ab 39 06 f5 fb 7f 00 00 00 1c 00 00 40 05 | 98 33 35 18 bc 62 08 ee 27 45 3b 5b 93 d4 b0 de | 01 b6 d3 96 | libevent_free: release ptr-libevent@0x7fb36800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6e010 | #101 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aba600 | handling event EVENT_RETRANSMIT for parent state #187 | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #187 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #187 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49616.805292; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.01106 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6e010 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #187 | libevent_malloc: new ptr-libevent@0x7fb36800cf80 size 128 "road-eastnet-nonat-187" #187: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #187) | e7 c9 b3 98 5a b5 d8 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 8c 48 13 ec 18 80 1b 32 77 ec 9e 3b 86 33 3b | 02 ed ce 45 9e d1 07 07 3e bc 97 2e 75 42 14 66 | 03 ce bf d6 11 7b 13 df d2 31 59 70 fe 3e 83 b2 | 64 79 15 03 06 38 db 20 68 31 b1 be e0 b0 81 7d | 4e ac bf 91 07 33 90 db 11 13 bd 16 b3 19 bb 2f | bd 78 ea 08 d7 04 61 29 46 e0 b0 be 88 fb b6 99 | 78 ba 8a fa f7 9f 36 82 a5 d0 b5 cc 15 77 46 bf | 6f 96 e3 0e c4 42 db ac 87 dc 33 da 45 8d 53 39 | 47 ad bd 32 b7 e2 e1 e0 66 2c 6d db 19 28 b7 a9 | b4 a9 eb 1e eb 6f ee c7 40 8b 38 5d 63 81 df 4c | ca 8e 71 2d f6 ed 35 fe b2 fe 7e cb 56 c2 0b db | 35 33 69 6f 1e 16 e5 63 9f 75 fa ec 8a 49 49 95 | 1a f3 8c 29 d9 10 61 09 99 f1 00 c7 a8 23 e7 4f | 74 f2 03 0e 72 27 59 cb 0b e6 eb fe 8d cd 75 0f | 66 f2 35 88 c0 48 17 b6 36 94 37 a8 a7 99 a0 7a | 46 3f c8 7b 62 bc 09 7b 66 12 f0 77 17 2a c3 df | 29 00 00 24 92 ee 3c 64 04 c9 f4 27 93 49 ca cc | 80 d7 5b 2f 40 c6 99 75 47 bf 36 6e b0 fd dd e8 | 14 05 72 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e d3 6f 6b 08 b5 24 1b c7 b0 97 c1 | 57 a8 5f 57 16 36 48 8c 00 00 00 1c 00 00 40 05 | 70 ae b7 c1 13 54 ea fb c0 86 88 d6 98 09 04 e8 | dd f9 c2 0b | libevent_free: release ptr-libevent@0x7fb35c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aba600 | #187 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469e05a0 | handling event EVENT_RETRANSMIT for parent state #159 | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #159 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #159 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49616.805419; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003584 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aba600 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #159 | libevent_malloc: new ptr-libevent@0x7fb35c035930 size 128 "road-eastnet-nonat-159" #159: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #159) | 9d f6 62 77 51 33 7c 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 a4 0d 7c 3f bb 62 60 89 5b f7 52 ab d7 ca 61 | c6 32 47 69 10 70 7b 4b b6 2a 70 55 d5 38 a9 c2 | 06 fe 6f 0d a3 c3 18 2d 09 43 b4 f7 9b ba 82 ec | 93 e7 fe 37 c0 9d ff 14 eb fc f4 a5 4f eb f2 e9 | 81 40 d5 d7 0d b6 64 ad 86 89 bc 12 73 da 31 6d | 21 c9 f1 76 ef e5 fa c1 2f 00 73 7b 29 f7 14 d0 | cc 33 12 7b be c7 0b 95 25 c7 3c c9 94 8d 40 b3 | 24 76 27 7e c2 06 53 7c 39 6a 80 69 0a b2 fa aa | 13 ac 6b d9 25 77 ea de 54 91 5a 44 b0 3f bb f5 | d7 05 e4 68 6e f2 57 14 f5 2f 93 5c 8b e1 18 57 | a7 aa 40 49 0b b7 ce d1 00 80 ba 6e 5e cc 5b a3 | 7d 08 af 9a a8 cd d2 ac df 34 27 c2 04 7d d9 9f | e2 bf b9 fd 43 84 3d e1 23 56 2b 91 01 a7 94 b9 | 39 80 83 eb c5 4c de ac 80 1d 05 1e 22 14 a6 fb | 08 b1 be 3f 9b 24 b0 c4 63 eb 31 8d 24 20 37 93 | 7d fa a5 c0 26 eb c3 7c ae e2 24 2a 4f 31 bf c0 | 29 00 00 24 93 99 a4 63 0d 72 bd 0a 86 bd f8 14 | bb 6c 2c e3 e4 66 d1 1e e3 70 5a 2a 46 97 fd 74 | 37 df 1f 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 4a e8 13 db 7e 81 08 43 48 ab 41 | d6 8f 57 84 74 b1 75 e1 00 00 00 1c 00 00 40 05 | 43 72 1d eb 44 7d 24 cc 39 78 4a ec 22 c2 1a 4e | 3d 2f 0c bd | libevent_free: release ptr-libevent@0x7fb37403ae20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e05a0 | #159 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 e5 70 36 3e 53 78 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #101 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #101 | rejected packet: | a4 e5 70 36 3e 53 78 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #101: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 c9 b3 98 5a b5 d8 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #187 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #187 | rejected packet: | e7 c9 b3 98 5a b5 d8 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #187: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0547 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d f6 62 77 51 33 7c 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #159 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #159 | rejected packet: | 9d f6 62 77 51 33 7c 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #159: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0532 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #4 | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #4 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #4 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49616.81882; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005312 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #4 | libevent_malloc: new ptr-libevent@0x7fb37403ae20 size 128 "road-eastnet-nonat-4" #4: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #4) | 9f e3 9d 02 77 44 b7 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 12 be 82 37 05 d2 52 25 54 17 1c 7e a4 e7 a1 | 7e a3 9e 01 f0 c9 5e f6 79 14 37 d9 ec ef 3e 7b | d6 12 38 d8 73 16 9f 73 2c 17 04 25 c3 08 1e 06 | d4 99 19 15 32 45 9a a7 b4 d5 ad 96 4d 41 dc 91 | 4d c8 05 99 28 4b a0 e8 08 9f f7 76 6e 87 6e f0 | e8 58 e3 c1 70 13 6f 8d cd 7f 4b 91 ab b0 98 2b | 80 11 c8 ef d5 8f f3 5b b1 1f e0 43 de 0c 0e b1 | 13 32 29 e5 dd ca fb b5 e8 02 d1 3b 1d 9e 4d 95 | 8d f8 b1 fd 7f db 1b 37 33 cf 99 72 de f0 e3 79 | 73 e7 61 a0 9f 73 96 2a c8 d9 3f f2 5e 93 fa f5 | 10 3a 62 6a 38 cd 93 3a 9f a8 56 7d f2 c3 ee 21 | b5 e7 1b 68 51 3a 6c 80 5b ad 50 8d 16 63 1e 8c | 65 d8 ef 12 42 db b7 45 7e c0 09 e7 f6 56 5d da | d8 52 c7 89 46 5c ed c7 24 ca 60 5c ff 30 28 b2 | a1 94 8c ec d2 08 2c a4 8a 1d a2 db fd 97 89 ac | cf d6 3b e3 0f 35 26 7e 4f b9 c8 b0 82 f2 80 6e | 29 00 00 24 ff 8a 31 04 ed 0e 73 16 f9 33 92 87 | 63 96 e9 90 5e 3a 90 66 d0 c2 86 27 40 23 58 23 | 51 d5 8c f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 57 40 bb 9d 01 b2 e8 79 26 d3 b2 | 9e 9a c3 98 03 95 6b f7 00 00 00 1c 00 00 40 05 | 19 68 23 54 27 85 e7 5a 70 ec 13 67 75 7a 20 68 | 80 f1 f5 99 | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #4 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f e3 9d 02 77 44 b7 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #4 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #4 | rejected packet: | 9f e3 9d 02 77 44 b7 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #4: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #198 | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #198 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #198 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49616.828111; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003826 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #198 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 "road-eastnet-nonat-198" #198: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #198) | 38 c2 c3 e5 3e e5 82 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 61 f7 55 c5 c4 5e d0 83 66 79 06 76 ff 91 2f 9b | 12 d0 24 44 db b1 bb 60 15 c5 59 2d d1 18 5f af | af eb bb bf af 0f d5 a7 6d 21 23 3c 7a d5 2f 3a | b3 ef ca 8b 4c db ec bc f0 8c 19 8a b2 60 93 64 | a7 e9 05 44 28 9e 74 5d d9 95 66 66 f7 e5 b4 1f | d5 4f c6 33 f7 6e 5b 80 b4 15 1d 1d 0e 0a 1d ec | d1 57 f6 0c 8a 85 f5 7e b6 52 c9 40 29 cb 30 96 | b6 70 b8 b9 59 b7 f3 5d 39 15 1c 09 f2 d7 22 1a | 2f a6 71 e7 c2 13 1a 03 5a ae 65 2f 9f ab 09 6a | f8 76 83 82 4d 45 c3 9c c4 22 81 0b 0c de 1f 60 | c4 83 6f 80 69 4d fb 9f c9 f8 93 ff f8 9f 02 54 | a0 9a b8 b4 d0 4b 39 8e 82 eb a2 4d fd 53 0b 42 | 08 c3 3b 83 a3 55 58 9c 32 8d d4 50 90 35 7f 36 | 30 25 cb 7b da d7 20 59 55 75 68 f3 54 82 bd 15 | 66 45 d1 d6 73 76 d2 e1 4b 15 1f c3 2a 8d b1 0b | e3 7d 9a 2f f6 14 5c e9 eb 5c bb c0 32 a0 bd c5 | 29 00 00 24 88 f3 29 1f 7c 05 5c 84 29 93 1b 9b | 8b f1 e4 5b 97 f1 d8 9e b8 85 d9 30 2a 5f 45 e2 | 98 31 41 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 05 30 82 a4 eb e3 d3 07 9b b1 ad | f0 ee 15 a7 e9 bb 27 63 00 00 00 1c 00 00 40 05 | 88 8a 68 49 cd fa 13 38 3a 2a 49 e8 1c 37 c8 41 | 63 44 84 75 | libevent_free: release ptr-libevent@0x7fb35803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #198 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 c2 c3 e5 3e e5 82 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #198 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #198 | rejected packet: | 38 c2 c3 e5 3e e5 82 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #198: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0672 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a903c0 | handling event EVENT_RETRANSMIT for parent state #102 | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #102 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #102 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49616.857886; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004318 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #102 | libevent_malloc: new ptr-libevent@0x7fb35803b0b0 size 128 "road-eastnet-nonat-102" #102: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #102) | 27 a9 08 a7 62 f6 e2 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 3c 29 a0 c9 87 b4 80 a8 37 0b 02 31 7e 05 06 | 02 b7 61 4c 60 0e af ef 4b 5c b9 dc 19 0b 5d d9 | 85 a8 a5 ba 16 2d 92 a5 e8 44 5d 48 48 06 cf a5 | c8 1d 53 0f c9 1c 2d 7b a3 b3 51 75 2d 98 e2 85 | e1 14 fe ce 69 6e ee 85 ba cc ab 6a ed ac 29 a6 | 04 6d ec cb be 61 e5 98 b4 1e dc 38 dc 20 70 bb | 52 99 a2 ac 6c 5b d5 dd f6 c6 54 38 29 d3 1c 88 | 10 77 53 7e af 0b 17 62 42 90 de ab 20 33 28 bc | 91 f7 eb 8f 86 fb 2e 6b 0f 94 c5 1b d9 40 a4 9e | 85 bd 8a 30 d0 a6 6c 09 f4 53 70 9d 11 c9 76 49 | 32 46 6a 4a 93 73 a4 59 28 e7 d5 c6 a2 40 d9 fe | c5 0c 7c 9f 70 ed 22 06 0b e5 2d 6e 16 d1 d2 84 | dd d9 af a3 b3 06 49 42 9f 97 37 00 03 72 48 b5 | 2c 38 f9 d2 b0 86 d6 8d ff f1 cb a6 a2 01 50 8e | d5 f2 44 23 56 23 e0 80 83 60 74 3c 92 0d 5e fb | ab 02 db 75 25 b6 fb 54 b8 2c cc 93 7e 04 7e 47 | 29 00 00 24 02 3b 00 99 07 4d 65 f7 7a c6 71 3b | f3 f6 94 93 e2 10 88 59 58 b9 a5 ba 96 a3 b3 bb | 2e a4 a0 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f0 3d eb e8 fa 43 c6 b4 69 3b f8 | f6 b0 ac 09 3e c3 01 6c 00 00 00 1c 00 00 40 05 | 27 e7 8a b1 d1 bb a4 87 76 d6 0f f9 d8 03 fa 51 | 25 22 7e d6 | libevent_free: release ptr-libevent@0x7fb34c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a903c0 | #102 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 a9 08 a7 62 f6 e2 d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #102 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #102 | rejected packet: | 27 a9 08 a7 62 f6 e2 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #102: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0697 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a89740 | handling event EVENT_RETRANSMIT for parent state #204 | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #204 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #204 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49616.865244; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500309 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a903c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #204 | libevent_malloc: new ptr-libevent@0x7fb34c02a950 size 128 "road-eastnet-nonat-204" #204: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #204) | 26 9b 30 ce 1c 69 a2 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 5c 6f c5 e4 37 b5 85 8b 88 c9 38 4a 33 67 e3 | b5 76 e8 6e 58 ca 85 66 b2 6e bc 01 cc 91 d2 fa | e1 db ef 4b 77 17 f5 08 16 0c 8c d0 2e 39 5b 3d | 15 8c a2 f2 d6 7b 21 20 d2 5d b0 fc e4 ac 76 97 | 30 50 2e 26 71 1a 34 95 4e 65 5f 33 21 89 a5 4a | 55 91 fa cb b0 1c 50 2f 03 b1 71 df 7e 93 5d 3f | 83 d0 25 32 6e 4a 7a e8 b7 9c c4 2c bc 70 88 ca | 1a 12 c7 c4 81 cf af 5b 96 ed ff 17 ee ac bf bc | 7e ee e8 ea bf 0e 25 06 f6 11 f2 0c fc 01 f3 a1 | a3 a5 0f 39 3b 0e 4e 24 40 89 5e e7 dc 14 70 db | b0 59 4e 88 e4 58 74 9d 4c 35 67 80 45 58 10 7b | 90 72 ed 6b 8c 09 3f 83 31 52 aa d0 a7 ad e8 5e | 62 2d e8 c2 d2 5f d4 fe 77 1a 24 07 0f a0 1b 7f | b1 31 3d fc 2d 59 58 95 dc 6b 56 ff a8 81 81 ca | bd 63 b1 a6 f3 e4 7a e1 08 85 c1 19 90 12 c0 7e | 58 38 76 3a 98 a3 e6 81 1a a9 a3 c2 1d 81 96 94 | 29 00 00 24 f4 44 35 a4 a3 93 f6 e1 66 d4 43 db | 1b ee 9d af 99 ba 18 1d 96 99 f1 ca 00 4e 65 c8 | 19 9f df 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 dc 32 bc d5 a3 92 90 2d a7 77 26 | 1c 78 dd c4 9b 23 7d 3e 00 00 00 1c 00 00 40 05 | 5b a2 10 3c 9e 91 f8 b5 af bf b9 e6 23 08 5d a3 | 6c 17 22 88 | libevent_free: release ptr-libevent@0x7fb38401cc10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a89740 | #204 spent 0.176 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 9b 30 ce 1c 69 a2 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #204 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #204 | rejected packet: | 26 9b 30 ce 1c 69 a2 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #204: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0681 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #160 | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #160 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #160 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49616.871706; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004021 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a89740 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #160 | libevent_malloc: new ptr-libevent@0x7fb38401cc10 size 128 "road-eastnet-nonat-160" #160: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #160) | ec 91 fb f1 0c bb 28 b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 30 17 61 87 0e 49 c3 b5 8e 06 e9 0f 8d 98 6f | af 06 7c a8 d8 5f dc 88 0a 69 f2 9d 79 59 e2 95 | a1 fb db 6f 1f 95 32 7b b7 f9 9f f9 87 3d 1e fd | 84 a3 dc 5e 41 59 c7 3d 40 a9 2a 90 d5 3d ec a5 | 70 8f 09 86 de c0 6f f0 8b 3d 45 2f a8 92 74 65 | dc 5a 07 23 6d 89 30 20 25 5a 37 b2 af 30 d2 98 | c2 6a 98 57 d0 a0 8f ff e2 c6 37 8c 7f c8 5e c3 | 9d 98 d2 5d 5e 70 59 77 03 8a bf 2a a1 c0 c1 c0 | 77 97 84 ec 45 c7 38 00 39 c5 2e 6a 0f 64 17 e5 | 6e 90 68 05 f5 f6 24 a7 89 fc 3d ac 97 b9 b8 8e | 69 68 d2 76 c0 8b ed 21 84 18 d2 89 99 90 e5 b1 | e9 a1 7c 9d 78 af 48 90 e7 1b 1a 7c 29 30 21 6e | 39 f7 cd b5 93 ab 03 d1 25 14 24 ad 0e 2c 3a 55 | 23 bf 0e 11 13 d6 6c 92 56 a2 2e ac 22 4b 36 72 | 62 e4 c0 2c 6e a1 80 10 e9 1f 33 37 5b 82 aa ab | bc d0 55 fd fd 61 98 d4 55 8c e5 05 44 59 3d 11 | 29 00 00 24 5a 7f a2 3e 7b 7f ae 84 88 a2 b0 db | 20 96 18 8a e9 32 7e 19 52 af 25 1a 74 e6 9f 5e | 17 1f 26 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 25 02 d7 0c d0 85 e5 86 af b4 01 | ce 64 18 db 06 ad 6a 73 00 00 00 1c 00 00 40 05 | 33 04 36 eb ae 2e 87 8f ec 4d 9c 69 20 d1 b8 6e | 57 bb 48 2f | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #160 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 91 fb f1 0c bb 28 b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #160 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #160 | rejected packet: | ec 91 fb f1 0c bb 28 b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #160: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-208" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-208' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #208 at 0x557d46af0140 | State DB: adding IKEv2 state #208 in UNDEFINED | pstats #208 ikev2.ike started | Message ID: init #208: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #208: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #208; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-208" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-208" IKE SA #208 "road-eastnet-nonat-208" "road-eastnet-nonat-208" #208: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-208 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-208": constructed local IKE proposals for road-eastnet-nonat-208 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 208 for state #208 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb380002b20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #208 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 | #208 spent 0.165 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-208" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.264 milliseconds in whack | crypto helper 19 resuming | crypto helper 19 starting work-order 208 for state #208 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 208 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 208 time elapsed 0.000984 seconds | (#208) spent 0.968 milliseconds in crypto helper computing work-order 208: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 208 for state #208 to event queue | scheduling resume sending helper answer for #208 | libevent_malloc: new ptr-libevent@0x7fb3680407f0 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #208 | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 208 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #208 | **emit ISAKMP Message: | initiator cookie: | 8f 5c 5f 4e 3a f5 16 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-208 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d3 92 7c 11 dd 8e a5 d7 54 92 a0 06 d5 10 ac 42 | ikev2 g^x 6b 15 ed 47 e9 69 c6 dc ee be 05 fb f7 98 ca cc | ikev2 g^x 76 c8 1e 19 2f 4d 8b 90 94 87 44 8e 66 b4 d8 02 | ikev2 g^x 68 05 60 b8 e3 7d 75 b7 4a 7c ab de a8 fd 41 6e | ikev2 g^x d6 76 9e 53 12 c0 6c 1d 7a 52 1e 69 01 3b 4b c1 | ikev2 g^x e7 6b 22 d6 c7 2e 90 0a 6b 5b 89 db 1a 6d af 36 | ikev2 g^x b5 41 be bc 9c 90 ed 64 78 a2 9b 4a 8f 0d 28 7e | ikev2 g^x 60 aa 46 05 6e d0 b2 52 c1 92 88 e6 04 b2 49 48 | ikev2 g^x c1 79 f2 f3 15 c9 58 54 7e a8 48 76 87 71 8d 7e | ikev2 g^x d5 41 8a 58 60 e1 22 51 b6 c8 da 62 23 cd 7f 72 | ikev2 g^x ed db 2b 44 40 79 52 36 a1 7b 1f f4 ce 24 ba 47 | ikev2 g^x 7a c2 df 3d 0b 70 e1 d1 d8 6a b0 33 7a 8b a6 83 | ikev2 g^x 44 26 40 e1 a6 53 73 33 8b d6 96 05 57 d5 68 55 | ikev2 g^x da 59 03 a3 8b 2e 16 30 b2 69 8f 5c 37 5b 88 82 | ikev2 g^x f8 0d 7c f2 a3 34 16 b2 3a a4 64 ba aa 6e 09 cf | ikev2 g^x de ff 28 7b 22 28 98 ba a1 44 cc d7 e1 ec e2 fc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6d f9 31 58 db 7e 5c 23 da 78 97 04 9a 1c fc fa | IKEv2 nonce 9f 9f da b9 38 4a 1a f0 e7 71 5f 51 b4 ee 4f 14 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8f 5c 5f 4e 3a f5 16 5e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d0 | natd_hash: port= 01 f4 | natd_hash: hash= a7 c6 9e d7 bc 34 04 8f 07 db d5 e1 11 54 7a 15 | natd_hash: hash= 87 49 41 6f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a7 c6 9e d7 bc 34 04 8f 07 db d5 e1 11 54 7a 15 | Notify data 87 49 41 6f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8f 5c 5f 4e 3a f5 16 5e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= da 8d 6c 65 d7 12 37 8a 51 87 98 29 74 33 3a f5 | natd_hash: hash= 86 ee 4b 0a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data da 8d 6c 65 d7 12 37 8a 51 87 98 29 74 33 3a f5 | Notify data 86 ee 4b 0a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #208 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #208: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #208 to 4294967295 after switching state | Message ID: IKE #208 skipping update_recv as MD is fake | Message ID: sent #208 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-208" #208: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.208:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #208) | 8f 5c 5f 4e 3a f5 16 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 92 7c 11 dd 8e a5 d7 54 92 a0 06 d5 10 ac 42 | 6b 15 ed 47 e9 69 c6 dc ee be 05 fb f7 98 ca cc | 76 c8 1e 19 2f 4d 8b 90 94 87 44 8e 66 b4 d8 02 | 68 05 60 b8 e3 7d 75 b7 4a 7c ab de a8 fd 41 6e | d6 76 9e 53 12 c0 6c 1d 7a 52 1e 69 01 3b 4b c1 | e7 6b 22 d6 c7 2e 90 0a 6b 5b 89 db 1a 6d af 36 | b5 41 be bc 9c 90 ed 64 78 a2 9b 4a 8f 0d 28 7e | 60 aa 46 05 6e d0 b2 52 c1 92 88 e6 04 b2 49 48 | c1 79 f2 f3 15 c9 58 54 7e a8 48 76 87 71 8d 7e | d5 41 8a 58 60 e1 22 51 b6 c8 da 62 23 cd 7f 72 | ed db 2b 44 40 79 52 36 a1 7b 1f f4 ce 24 ba 47 | 7a c2 df 3d 0b 70 e1 d1 d8 6a b0 33 7a 8b a6 83 | 44 26 40 e1 a6 53 73 33 8b d6 96 05 57 d5 68 55 | da 59 03 a3 8b 2e 16 30 b2 69 8f 5c 37 5b 88 82 | f8 0d 7c f2 a3 34 16 b2 3a a4 64 ba aa 6e 09 cf | de ff 28 7b 22 28 98 ba a1 44 cc d7 e1 ec e2 fc | 29 00 00 24 6d f9 31 58 db 7e 5c 23 da 78 97 04 | 9a 1c fc fa 9f 9f da b9 38 4a 1a f0 e7 71 5f 51 | b4 ee 4f 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 c6 9e d7 bc 34 04 8f 07 db d5 e1 | 11 54 7a 15 87 49 41 6f 00 00 00 1c 00 00 40 05 | da 8d 6c 65 d7 12 37 8a 51 87 98 29 74 33 3a f5 | 86 ee 4b 0a | state #208 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb380002b20 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #208 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 | #208 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49616.881276 | resume sending helper answer for #208 suppresed complete_v2_state_transition() and stole MD | #208 spent 0.486 milliseconds in resume sending helper answer | stop processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3680407f0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 5c 5f 4e 3a f5 16 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #208 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #208 | rejected packet: | 8f 5c 5f 4e 3a f5 16 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #208: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa34c0 | handling event EVENT_RETRANSMIT for parent state #188 | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #188 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #188 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49616.912679; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003253 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e05a0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #188 | libevent_malloc: new ptr-libevent@0x7fb3680407f0 size 128 "road-eastnet-nonat-188" #188: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #188) | f8 92 2e dc 48 c8 64 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 8c 6e 8b 73 15 ff 0e bb aa f8 24 68 da ef 6a | 1c 01 19 e8 a2 a3 5e f6 5a 71 31 aa 3c b1 c4 41 | 27 8d 2a 58 b3 aa 09 ec ab 9b 79 a4 37 2c 57 bc | 33 2a 63 cb 88 61 ff 6f 57 a5 f5 2c 3b 28 ff c0 | e2 03 fe e0 d7 c3 cd af a3 47 59 59 0e 58 bb 20 | d6 dc 5a 4c 31 47 b6 5a 25 02 b2 63 30 de fe 0f | aa 00 d1 fa e6 0a 07 a2 95 d3 2a cc eb a7 d4 64 | 92 40 37 20 3b f0 9c 95 06 bf 89 fe 4e 9c 75 93 | be 49 6d 83 74 cb 43 a9 68 b0 b3 1b 6c 7e b1 7d | 71 1f eb 81 78 ef b8 84 cd 25 a3 cb 59 97 64 95 | 1c 19 a1 95 2c 31 c2 d1 08 08 8a 2a 38 f4 5e 06 | d0 60 01 b7 7e f7 37 07 7c 57 50 f7 20 78 35 94 | 90 2f 3d b8 01 db 62 a4 93 0c bc 99 72 08 c3 2a | 65 b1 ef fc 8b 00 29 6d 1d eb d8 05 c6 bd 18 34 | 85 96 91 a6 8d 87 95 d6 03 d2 b7 ec 1a a3 0e 66 | 18 52 9c 51 fa 27 d5 c0 2b 40 de 51 c6 17 5c e3 | 29 00 00 24 32 b3 09 c7 6d 35 ae 79 0b a9 93 c1 | 25 b3 85 c2 02 53 dd a2 dc f7 0c 55 f9 9f 55 72 | 45 99 28 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 05 c4 f8 2b d0 22 47 d6 02 77 fd | 96 35 b9 b3 1b 70 08 41 00 00 00 1c 00 00 40 05 | f1 47 98 30 50 7a f1 c9 d1 56 2e ed 54 8a b8 d4 | be 9f b3 89 | libevent_free: release ptr-libevent@0x7fb380022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa34c0 | #188 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 92 2e dc 48 c8 64 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #188 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #188 | rejected packet: | f8 92 2e dc 48 c8 64 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #188: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2f770 | handling event EVENT_RETRANSMIT for parent state #103 | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #103 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #103 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49616.934198; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006353 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa34c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #103 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 "road-eastnet-nonat-103" #103: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #103) | 20 80 ad df 5a 9a 13 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d a9 30 94 a8 d4 ad b7 ab 41 10 cf dd 34 d7 45 | db 9e 99 58 0d 72 d8 74 bd 3c 1d 4a 98 9b ff 38 | 08 61 4e c7 a6 75 c7 cd ff 21 41 e1 5d c2 9d c6 | 7c 47 d1 97 8a 16 0e 0e 3c 96 7a d8 10 82 5b 8a | 00 b3 29 44 ad 13 12 a6 fb af 01 2d 66 5c e1 02 | 4b 01 af e5 ba 61 e3 fe 71 46 2a af 0d 0d 2a 26 | f8 12 e9 10 f0 8f ca f1 fd 82 c7 ea fa 46 02 26 | b6 95 72 2c b1 d7 c7 46 5a e6 4a 07 87 39 fe e7 | c6 a1 7d 2d 52 a4 c7 a2 b5 e7 2f 2b 1d 48 eb d9 | 7c e8 c4 cb da 19 e0 04 20 53 7b 3c 73 86 a7 70 | c7 09 d6 f9 52 be 12 99 31 58 c4 f8 6c 8b 22 3a | c5 da 0c e1 bd 65 73 c3 27 14 e7 0f ae a0 e8 45 | 58 e0 c3 02 1b 48 ee 20 03 b9 0c ec ad e0 21 05 | 1b 38 52 4b dd 92 f0 58 d2 29 eb 4e be 57 49 4d | 5d 0f a4 01 4b 76 95 2b 60 de d3 82 01 e6 15 d8 | 32 f5 60 60 88 d1 83 bc a6 c2 db 62 29 b3 d7 5e | 29 00 00 24 fb ef 9e 44 e4 82 6e 41 3f 46 3a c8 | d1 69 b9 34 c6 14 27 a3 23 52 4c 58 0c 66 b4 10 | 6a d0 69 ee 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 a3 d6 8d 6e 26 8b a3 26 28 d5 ff | 4a 28 a8 bb 6f af 66 22 00 00 00 1c 00 00 40 05 | e5 6e de 91 25 32 b5 3b 38 9d 70 ef 64 14 11 f9 | c0 c1 79 e6 | libevent_free: release ptr-libevent@0x7fb388032bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2f770 | #103 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 80 ad df 5a 9a 13 26 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #103 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #103 | rejected packet: | 20 80 ad df 5a 9a 13 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #103: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #199 | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #199 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #199 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49616.937556; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001892 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a011f0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #199 | libevent_malloc: new ptr-libevent@0x7fb388032bf0 size 128 "road-eastnet-nonat-199" #199: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #199) | 27 d1 6c c4 4c 84 e3 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 f7 e5 ae 44 da 7b a1 b1 3e 44 fb ef 82 32 77 | a0 c2 72 43 50 19 7e 5e c7 1d 24 fa 9d 99 ff 71 | 44 54 82 8e cd bf 0f 40 ad 0d 4a 27 75 78 aa 64 | 63 e6 66 6d e9 bf 1f 5a 74 65 bf 0f ba 29 57 51 | 0a 44 9c 16 52 28 db 48 f9 d7 ab e8 1e 98 b5 a0 | ff 9d 9d 22 6a 26 d5 06 1f b5 07 29 59 d7 ec 33 | 10 b5 a0 31 95 73 ec 20 a2 11 23 56 06 d8 ad a2 | 6d 0f c8 00 64 2f 99 96 5d d2 5b a5 dd 2c 34 78 | ce 80 35 74 5d 74 56 55 47 bf 15 c1 84 c7 0f 64 | a6 70 c6 99 14 c9 d9 b3 02 6a 70 83 2d ca 4f aa | b9 b4 39 e1 b3 2e 81 8c 26 1f 8e f8 1a b1 b1 4b | b0 9b 0a c4 8c 38 2e 14 24 c9 96 c5 ae 69 55 cb | f9 3b a1 e1 2b 54 42 88 42 2f d5 f9 04 ab 91 7e | 86 11 e3 bd 2a 54 c0 da 96 34 89 6a 25 46 14 93 | 51 fb 1f 2b bf 29 76 41 f2 16 a8 f5 e3 fb 49 39 | 86 d5 c2 41 0f 92 03 df 3b a9 75 b2 e3 1f cd 5c | 29 00 00 24 ce b1 60 ec b2 6d 5b aa dc 41 a3 c6 | 5b 6b 71 42 8d 0b d4 85 d2 79 6d f3 81 c0 ff 8a | e8 8f f9 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b6 28 45 f6 47 a9 89 2b f2 e1 02 | ea 34 3a fc e5 a7 2b f1 00 00 00 1c 00 00 40 05 | a9 d3 87 ec eb bf 81 b0 18 6d 86 a6 a8 63 05 fc | 1c 93 4f b5 | libevent_free: release ptr-libevent@0x7fb35c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #199 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 d1 6c c4 4c 84 e3 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #199 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #199 | rejected packet: | 27 d1 6c c4 4c 84 e3 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #199: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0673 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a16db0 | handling event EVENT_RETRANSMIT for parent state #161 | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #161 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #161 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49616.938952; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.008998 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #161 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 "road-eastnet-nonat-161" #161: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #161) | 0e 21 c5 28 e0 11 16 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 b1 7e f7 73 9d 3d 0b 9c d2 8e 29 c6 08 34 06 | 2d dc ae 10 7c 53 33 af cd 18 8c 8c 37 fc eb 71 | 2c 3b de 0f 76 b3 63 bc 1c 05 f0 af 4b 44 5e c7 | 23 d4 29 d3 16 0f fb 8c 12 fb 18 1d 9e 65 94 73 | c1 7f 44 d2 39 97 a4 57 24 65 09 c9 9f 95 0f 07 | 98 bb c4 fc e8 f9 84 20 79 d3 9b da f2 f3 7b ff | 76 4d 74 89 ed 7a aa a4 38 3a 39 de f9 ec 60 48 | 7f 57 eb 50 ff 9b 33 98 7d 3b 5f cc 64 ba 1b 81 | 67 2a 02 26 ec 3f 45 a5 fe c6 9b 0d 1d 37 b0 40 | 01 1f 97 01 e8 87 5e 53 40 bf fb d3 7e 9e 2e b3 | 15 ba fc 8b b1 4a 7e fa af 94 c4 67 c0 2c 29 d2 | 74 fe d7 24 50 34 48 da f7 a1 54 c5 1c 2b 5a 35 | 33 a6 86 42 a8 e3 25 9b e3 fe 4c de 22 93 ae dd | c7 11 a7 9f 05 b4 87 2f a1 b9 2b f6 21 37 9c 8e | 50 21 6a 50 8e bd 1d 5f a1 42 92 50 68 2f 4e 9a | 54 04 e8 cc b9 5f 82 df 48 23 c8 76 49 63 f0 50 | 29 00 00 24 b8 74 18 e1 c4 b4 30 2e a4 31 94 25 | 46 e1 dc 47 b5 0b e4 ae a0 1d 11 3a f1 77 67 fa | 52 d5 2a a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 94 bf 28 28 ea 74 13 ca 7d 07 ba | 5d 79 38 7b d7 5d 40 d3 00 00 00 1c 00 00 40 05 | aa 2f 88 27 56 8a 2e 19 5d ff 44 bb aa 2d 48 42 | c7 75 31 6a | libevent_free: release ptr-libevent@0x7fb36803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a16db0 | #161 spent 0.182 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 21 c5 28 e0 11 16 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #161 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #161 | rejected packet: | 0e 21 c5 28 e0 11 16 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #161: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b5d0 | handling event EVENT_RETRANSMIT for parent state #5 | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #5 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #5 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49616.949043; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.018672 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad8480 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #5 | libevent_malloc: new ptr-libevent@0x7fb36803b0b0 size 128 "road-eastnet-nonat-5" #5: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #5) | 83 a8 82 4c 6a b9 9b 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 f2 6a ba 4d 4c f4 ca d6 76 c6 37 a4 fc c6 08 | 03 3e 5e e8 b3 56 67 2c ed e0 33 33 68 d8 a5 17 | c5 ad 89 58 8b 66 c2 c6 28 95 15 86 95 42 17 c5 | 43 6b d6 1b 90 e3 ce 5a 73 0f aa 25 80 ef 21 ed | 95 16 dc 62 db 9c 9c f1 05 8d 7b ad 88 fd 8e 82 | 62 66 a4 5c 00 db 53 d1 2c ac b4 13 62 a5 17 eb | 3f 3a 4e bc 42 77 a1 e8 e1 8a 0f 63 81 66 10 64 | 10 0d 86 9e 89 34 85 5c 5f 55 4a cb 5a 29 86 16 | 42 90 ac 93 0b a7 fb e8 a5 4a 23 43 d7 02 e6 fe | c6 7b a9 b3 68 72 59 2e 24 fd 0c 7f 98 b0 6f 9f | bb aa 48 ce f6 ec 36 99 c2 bc 70 c4 81 9e 1c 55 | 65 47 9c 55 e0 d5 f3 7e 77 c4 a5 f3 6e 82 b5 1c | 5c 56 a1 3a b8 57 69 f9 25 e2 ae ed 66 c5 c1 3d | f8 ca 2e 2b 1c 6e 27 f2 e3 ed 73 79 be b7 90 0f | cb 45 38 5f bb 3a e3 c2 44 15 72 9c 24 d0 bd 4e | fa c4 ea 53 31 95 57 c9 dc a4 ff 15 7a 28 e4 1a | 29 00 00 24 13 3d aa 25 dd 95 48 ab fd a8 d2 56 | 6c 28 74 71 5d 45 11 19 10 09 0a f3 46 e9 c4 b3 | 56 85 8c 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bb 69 2e cb ee d3 68 5b 1c f0 7d a0 | 26 ce 80 e4 bd 02 f5 15 00 00 00 1c 00 00 40 05 | 1b de 40 93 48 c5 33 61 5d a6 1a 99 ad 20 57 85 | b1 bf 8b 0c | libevent_free: release ptr-libevent@0x7fb384015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b5d0 | #5 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 a8 82 4c 6a b9 9b 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #5 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #5 | rejected packet: | 83 a8 82 4c 6a b9 9b 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #5: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-209" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-209' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #209 at 0x557d46af1700 | State DB: adding IKEv2 state #209 in UNDEFINED | pstats #209 ikev2.ike started | Message ID: init #209: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #209: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #209; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-209" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-209" IKE SA #209 "road-eastnet-nonat-209" "road-eastnet-nonat-209" #209: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-209 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-209": constructed local IKE proposals for road-eastnet-nonat-209 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 209 for state #209 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2b5d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #209 | libevent_malloc: new ptr-libevent@0x7fb384015370 size 128 | crypto helper 6 resuming | crypto helper 6 starting work-order 209 for state #209 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 209 | #209 spent 0.184 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-209" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.286 milliseconds in whack | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 209 time elapsed 0.001197 seconds | (#209) spent 1.03 milliseconds in crypto helper computing work-order 209: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 209 for state #209 to event queue | scheduling resume sending helper answer for #209 | libevent_malloc: new ptr-libevent@0x7fb36c0407f0 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #209 | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 209 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #209 | **emit ISAKMP Message: | initiator cookie: | 94 c0 53 32 b7 6b d2 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-209 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fa aa 8f b6 87 c3 5d 98 e8 47 9c 34 3c ba fd c2 | ikev2 g^x 26 06 ee 61 85 3c e9 e8 7d e0 7a e3 30 dc 26 ae | ikev2 g^x 92 30 41 01 44 74 f7 33 20 3e 9d c4 91 ce 67 c8 | ikev2 g^x 16 8f 2d 63 7e 65 88 2d 42 e0 e7 51 27 b9 54 c3 | ikev2 g^x cb 64 94 8c 44 0b bb aa 89 37 4f 4c 19 3a 97 c2 | ikev2 g^x a7 78 bb a9 b6 bc c5 9a 0d 18 1b 6f 6c 81 28 5f | ikev2 g^x 96 22 7f 4e e9 03 4f f8 d6 4d 77 d5 fe b9 d2 6d | ikev2 g^x cd 7d 32 95 3a ae 28 68 07 70 28 76 ea 67 8a a4 | ikev2 g^x 02 0f 70 b8 39 d5 ef 06 00 8a 9d f6 62 11 fb 55 | ikev2 g^x 5d 2a 4e 92 67 d8 83 81 5c e2 b4 e7 58 f2 f1 29 | ikev2 g^x e2 e9 12 6d a8 99 db 90 fa c3 c7 67 22 60 c4 0d | ikev2 g^x b5 aa 8e 50 88 98 a0 7e 46 1d 18 c2 ea bc 90 f9 | ikev2 g^x 2c 89 53 10 11 da ca 7e 79 27 58 0a 97 be f4 b6 | ikev2 g^x df 47 81 cd fc cb 51 b6 90 69 20 0a b1 64 c6 52 | ikev2 g^x f3 67 4f b9 89 27 0d 82 44 e6 02 ff 6a 0a a5 77 | ikev2 g^x bc 54 13 6b 28 ab 23 fb 03 b0 ab d8 e9 7c 16 89 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 32 f5 dd 6d be 9b 09 7c 2d 16 66 7c 9d 31 58 f8 | IKEv2 nonce 20 f4 30 10 2d 04 04 00 c5 24 46 19 07 98 5b 3a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 94 c0 53 32 b7 6b d2 60 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d1 | natd_hash: port= 01 f4 | natd_hash: hash= 57 be 30 60 49 91 51 94 d8 39 4f be 6e 81 91 5e | natd_hash: hash= 2f 8c 88 7e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 57 be 30 60 49 91 51 94 d8 39 4f be 6e 81 91 5e | Notify data 2f 8c 88 7e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 94 c0 53 32 b7 6b d2 60 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2d 19 47 e1 25 d9 8a e8 d3 7e a2 ad 7d 2a 38 10 | natd_hash: hash= 8b 55 bc a7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2d 19 47 e1 25 d9 8a e8 d3 7e a2 ad 7d 2a 38 10 | Notify data 8b 55 bc a7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #209 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #209: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #209 to 4294967295 after switching state | Message ID: IKE #209 skipping update_recv as MD is fake | Message ID: sent #209 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-209" #209: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.209:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #209) | 94 c0 53 32 b7 6b d2 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa aa 8f b6 87 c3 5d 98 e8 47 9c 34 3c ba fd c2 | 26 06 ee 61 85 3c e9 e8 7d e0 7a e3 30 dc 26 ae | 92 30 41 01 44 74 f7 33 20 3e 9d c4 91 ce 67 c8 | 16 8f 2d 63 7e 65 88 2d 42 e0 e7 51 27 b9 54 c3 | cb 64 94 8c 44 0b bb aa 89 37 4f 4c 19 3a 97 c2 | a7 78 bb a9 b6 bc c5 9a 0d 18 1b 6f 6c 81 28 5f | 96 22 7f 4e e9 03 4f f8 d6 4d 77 d5 fe b9 d2 6d | cd 7d 32 95 3a ae 28 68 07 70 28 76 ea 67 8a a4 | 02 0f 70 b8 39 d5 ef 06 00 8a 9d f6 62 11 fb 55 | 5d 2a 4e 92 67 d8 83 81 5c e2 b4 e7 58 f2 f1 29 | e2 e9 12 6d a8 99 db 90 fa c3 c7 67 22 60 c4 0d | b5 aa 8e 50 88 98 a0 7e 46 1d 18 c2 ea bc 90 f9 | 2c 89 53 10 11 da ca 7e 79 27 58 0a 97 be f4 b6 | df 47 81 cd fc cb 51 b6 90 69 20 0a b1 64 c6 52 | f3 67 4f b9 89 27 0d 82 44 e6 02 ff 6a 0a a5 77 | bc 54 13 6b 28 ab 23 fb 03 b0 ab d8 e9 7c 16 89 | 29 00 00 24 32 f5 dd 6d be 9b 09 7c 2d 16 66 7c | 9d 31 58 f8 20 f4 30 10 2d 04 04 00 c5 24 46 19 | 07 98 5b 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 be 30 60 49 91 51 94 d8 39 4f be | 6e 81 91 5e 2f 8c 88 7e 00 00 00 1c 00 00 40 05 | 2d 19 47 e1 25 d9 8a e8 d3 7e a2 ad 7d 2a 38 10 | 8b 55 bc a7 | state #209 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb384015370 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2b5d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b5d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #209 | libevent_malloc: new ptr-libevent@0x7fb384015370 size 128 | #209 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49616.976749 | resume sending helper answer for #209 suppresed complete_v2_state_transition() and stole MD | #209 spent 0.472 milliseconds in resume sending helper answer | stop processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c0407f0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 c0 53 32 b7 6b d2 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #209 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #209 | rejected packet: | 94 c0 53 32 b7 6b d2 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #209: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a67370 | handling event EVENT_RETRANSMIT for parent state #162 | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #162 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #162 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49617.011956; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004405 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a16db0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #162 | libevent_malloc: new ptr-libevent@0x7fb36c0407f0 size 128 "road-eastnet-nonat-162" #162: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #162) | 3b bf da 45 10 1c 63 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 2a 00 6f 37 4b f5 08 dc 2d d5 a4 5f d7 a7 d8 | a8 4d 31 bb 56 e7 51 71 5b 5d fc c8 0e 08 fb e2 | c0 7c 0d 9e fa 59 01 dc 52 d2 c1 e7 2f 1a e5 b4 | 5b d5 c8 45 b5 dd 91 a9 d5 c3 73 76 9d 7e fd b8 | f9 df d1 f8 01 94 2b 6f e5 9a 29 12 9e de 27 97 | 71 f3 e6 1b 74 76 a7 3a 8c e6 a9 61 00 52 7e f7 | c9 6f 55 40 33 0a 80 4c aa c5 55 f4 4e 14 8a a7 | 71 a6 78 3d d0 59 58 77 2f 99 7c 4c c3 1e 74 08 | f9 85 d0 5e 65 f5 6a 31 d7 63 2d f9 e8 59 8b 16 | 32 89 82 d2 3f 02 ed 88 92 cb b0 35 d8 db 40 15 | 72 43 38 f2 76 11 5a 75 77 0e 67 e7 50 ab d6 be | 45 bd 9e 45 2f 01 23 b3 e6 91 d2 ea db c5 26 44 | 62 95 26 52 cc d7 f4 4b d1 06 28 b1 bb 01 1a 47 | 2c 16 e5 b8 18 7a 69 d5 78 76 2f ea 81 85 bf fa | 27 ed 91 6a 8a 48 18 3c 3f 20 85 89 ae e6 4e 97 | 89 5c 72 59 c7 16 4a 7b 0a b0 0c 8e 44 0c ca 39 | 29 00 00 24 95 de a1 84 1b 6b 5e e8 be 4d c4 44 | d7 89 7f ff f7 3c d6 b5 51 9e bf df 42 03 ca bf | 75 41 b7 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 45 b2 30 32 2f 26 ad dc fc 75 7c | 7f bc 91 0d 37 21 2d 1b 00 00 00 1c 00 00 40 05 | b1 72 3a ba 32 f9 7a 15 ec b8 bb 62 7e ea 84 2a | af f4 56 24 | libevent_free: release ptr-libevent@0x7fb380038370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a67370 | #162 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b bf da 45 10 1c 63 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #162 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #162 | rejected packet: | 3b bf da 45 10 1c 63 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #162: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0691 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b650 | handling event EVENT_RETRANSMIT for parent state #104 | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #104 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #104 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49617.024089; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.013854 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2f770 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #104 | libevent_malloc: new ptr-libevent@0x7fb380038370 size 128 "road-eastnet-nonat-104" #104: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #104) | c8 97 67 f1 1b 46 da 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 e4 3d 30 95 de e5 8c 73 da 01 a0 e2 a0 c0 5e | ab 07 43 87 84 24 88 49 ca d1 13 72 cc 7b 38 93 | 5a ab ff 3c 3d d2 b7 a9 16 19 a5 56 5c 01 9f 05 | 2f 70 be 2d 9d 04 2c f7 80 b3 5f 24 70 c4 0d 58 | b9 f4 31 d3 bd 25 62 64 07 37 4c 59 6f a0 74 90 | e2 15 77 64 4c 06 2d 41 bc 70 c3 30 0a 01 9b df | a0 88 42 69 26 57 a1 25 9a c0 ee 4c ee 57 50 5f | 0c 95 2a a5 72 cb d8 81 34 25 75 ee 4d 04 23 27 | e9 da 7c 36 60 32 11 97 39 d8 f4 3f 96 13 6c 72 | 19 1d 43 e4 f0 4a 92 88 29 4c 84 63 63 7d 3a aa | 3f 23 85 5a 73 71 01 2f 63 e6 b3 a0 2d 7f 75 e1 | e9 d4 1c 1a 83 67 2e 29 49 85 8a a1 31 04 a5 31 | 1b e6 35 a4 14 80 ac 17 6c 11 db 3d c3 88 57 d2 | 55 c5 b6 4e 2c 2b 58 d9 50 1f f2 54 b6 50 63 00 | d4 ad 6c 3c 60 cd 52 3b 9b 0f 69 cc f2 8f 29 dc | 29 5e 75 22 60 a0 c9 59 5b 00 1a 98 02 fb 23 0f | 29 00 00 24 16 fd b9 d2 33 64 36 d1 f0 bb fa 0d | d8 4a 7e 7c 2a 2e d1 92 40 9f bf f6 34 ac 7a 15 | 2b 49 c7 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 28 db 0c 20 22 dd ba ac 9b fa 10 | b6 bd 27 81 bf 6a a0 a8 00 00 00 1c 00 00 40 05 | 90 9a 71 02 e5 61 58 ec fb 0f 5f 95 cd f2 2e 99 | e5 4b 54 60 | libevent_free: release ptr-libevent@0x7fb380032bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b650 | #104 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 97 67 f1 1b 46 da 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #104 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #104 | rejected packet: | c8 97 67 f1 1b 46 da 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #104: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0703 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46910 | handling event EVENT_RETRANSMIT for parent state #6 | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #6 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #6 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49617.024365; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.013398 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b650 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #6 | libevent_malloc: new ptr-libevent@0x7fb380032bf0 size 128 "road-eastnet-nonat-6" #6: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #6) | 2c 27 82 3a c6 31 e5 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f e3 1c 46 2f 61 c1 a4 57 04 b2 32 f2 da 47 30 | c5 f1 b2 8c 52 8c bd 20 1e 07 9a 1f 74 e3 50 fd | 03 ad cd d6 6e b2 e0 ed 18 de c6 cf db 53 d8 91 | 57 59 05 93 13 39 ca c4 cd bf 1d c1 99 f1 ea ab | d7 0d 4d 84 1a b9 23 c8 19 a7 00 fc 45 cd 28 de | 1b 23 11 46 b2 a5 20 88 7d a8 2e 93 69 c4 77 be | 7d 08 db 5c 91 33 d0 aa e2 d7 27 ba c6 03 59 3c | 8a b9 c7 4b aa b0 c2 31 f9 3d af 03 a0 d0 38 f5 | 81 cf 2e 3b 37 ea b5 50 38 0b b5 3b be c1 ac 52 | d4 bd 41 74 e3 b0 cc da 00 70 a4 c8 a9 ae 2b 0c | 84 70 b9 c2 c8 dd e4 ca c8 d6 7a 14 75 f2 9f ca | f3 8a 9e fb 56 2f 7b 5f 34 ab 29 a4 eb 5d 7a 01 | af 1d 55 9d 0e 4d 00 2f f9 2a c8 90 cf 50 fe a3 | 20 3f bc dc b3 d6 01 f7 dd dc c1 b1 72 f5 58 73 | b8 72 e4 a9 88 17 39 c5 a4 43 c8 df b5 2f 8d cd | 75 f3 2c cf e2 85 8e ce 7f c9 07 83 41 8f 33 7b | 29 00 00 24 aa 55 22 5c 95 3a 98 8a 23 4e 55 f5 | f2 5b 2d e6 0f d6 a3 fc b7 39 7f a3 84 04 6c 99 | b3 1f 01 c8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd d8 7d b0 3b ed a4 77 8e 72 bc 87 | 11 c3 4a b5 09 51 99 2e 00 00 00 1c 00 00 40 05 | 3b ee 43 00 bb c4 11 7e a6 6d 91 83 5e ff b0 fd | ab 20 73 91 | libevent_free: release ptr-libevent@0x7fb364012740 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46910 | #6 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c 27 82 3a c6 31 e5 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #6 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #6 | rejected packet: | 2c 27 82 3a c6 31 e5 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #6: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.059 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #189 | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #189 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #189 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49617.025645; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002751 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46910 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #189 | libevent_malloc: new ptr-libevent@0x7fb364012740 size 128 "road-eastnet-nonat-189" #189: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #189) | 86 0c af cf d7 4f f0 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 da a6 92 01 b3 1e 2d 01 6d b4 b0 5b c8 86 63 | fa d3 04 1f 4a 5d 42 51 c6 fa 83 7f 52 a9 5c 5f | 29 a2 a6 67 ca c4 cb cd f8 82 1e 41 60 3e d2 fa | be e5 64 f3 5e f3 de 1c 66 73 04 70 83 c5 c9 fa | d9 0c 95 4f d8 7c 96 92 62 c0 89 3f a6 f5 e5 1c | 1d 8a 04 ae 7f 59 7e f9 0a 02 65 1e e5 50 67 cc | 8a fa 7a d2 bf b6 8d 22 68 80 58 92 0d 46 32 32 | ac 55 d1 c6 9f 27 eb 86 dd 30 64 7d 70 38 1f e2 | 82 2f 8e ad e7 06 c8 10 a8 89 ac cd 34 d4 ef 54 | d9 fa ef 60 3c 01 17 c1 e0 90 2b 1d 49 9b 9e e6 | 59 07 02 91 fb ba 4f 73 08 2f de a1 3c 70 c1 7b | f2 11 29 b4 eb 0f 6e 10 04 0d 03 e4 29 ad b5 0b | 6b 4b aa f3 91 cc 9d d5 fa 2e 4d ea 3f 0e 7e 09 | 29 dd 22 a7 1f e8 ee 73 1f 35 15 51 78 6d 86 ea | cd eb 92 50 fc 79 44 24 ff 9f f8 19 89 f2 31 2b | 2f 82 13 db f2 4a 67 b7 c4 2a 16 2f d5 d4 31 ee | 29 00 00 24 ab 6b 1b 01 ee 77 53 c6 2a de 6e a0 | bf 1d e9 b5 56 76 a7 4b d5 a7 a9 e9 a7 01 9e 47 | cc 4b 2a 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 a4 06 85 0c 28 ca 55 e9 70 4f 7f | 1a ca eb c6 50 e4 53 f0 00 00 00 1c 00 00 40 05 | 2a 84 d0 22 8e e3 5b 68 a0 3f 20 22 83 cb 94 15 | 67 d9 c0 48 | libevent_free: release ptr-libevent@0x7fb364017f20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #189 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 0c af cf d7 4f f0 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #189 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #189 | rejected packet: | 86 0c af cf d7 4f f0 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #189: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a43dd0 | handling event EVENT_RETRANSMIT for parent state #200 | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #200 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #200 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49617.032216; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.004799 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #200 | libevent_malloc: new ptr-libevent@0x7fb364017f20 size 128 "road-eastnet-nonat-200" #200: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #200) | 75 f9 3c ee 3d 43 50 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d d7 f4 2c e9 d8 b4 58 bc f6 5c 68 d0 e8 20 d2 | 70 0a 56 63 f6 74 43 04 b4 cd d8 23 88 fe c7 f6 | 1e d9 bd ee 25 c8 67 c7 2d b9 d9 c6 54 ca cd 9c | 4d 78 05 42 6a b4 88 a1 71 4e fd 59 90 2e 53 a1 | 4c c1 78 ca ca ed 13 0b 48 7e 72 f2 de cc bf 74 | d8 13 14 01 89 5b 3d f3 26 5d 17 ef 74 28 fa a9 | a5 86 f8 17 01 9e 46 6d 69 c4 ce 7b 85 c2 8b f2 | 6a 40 21 88 6b 4c 0d e0 b2 55 9a f1 b6 c4 a5 34 | 5e ea a9 16 4b 7b 22 02 6e b5 62 bf 0e 13 c4 75 | 5a f6 47 5c d0 c2 01 a3 46 b7 b7 ca c6 5e f6 e3 | 79 8e 25 ba 76 6d ee 11 df 8f 10 22 5f 50 31 f4 | b3 77 76 36 47 ec 67 35 64 4d 22 bd 77 3c 61 d0 | 1c 1c ab b4 d6 cf e4 0f 57 21 d8 30 aa 58 f6 84 | a1 48 51 27 85 8c 83 cc 89 77 d2 37 58 0f 1d e2 | 1d d9 35 ce 76 2e 8b 0d 16 1d 75 c0 13 c5 08 c0 | 3c d5 3b aa 74 68 e3 69 d7 c9 6b 6b d6 2e 6c a1 | 29 00 00 24 0e 33 98 69 ac 19 40 8d 23 0b bc 95 | 8f 5a 8e 62 b3 f7 97 e2 1f 4f da 87 39 88 58 8e | fe 30 e9 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 45 f2 7a b7 3f 1c 77 84 16 29 66 | 7f d3 6a c0 22 39 cf e5 00 00 00 1c 00 00 40 05 | a7 72 f7 48 87 f0 01 9a b9 14 bf 98 e7 f8 65 3b | c7 d8 2f ed | libevent_free: release ptr-libevent@0x7fb34c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a43dd0 | #200 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 f9 3c ee 3d 43 50 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #200 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #200 | rejected packet: | 75 f9 3c ee 3d 43 50 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #200: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0712 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #205 | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #205 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #205 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49617.034583; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500297 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a43dd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #205 | libevent_malloc: new ptr-libevent@0x7fb34c01d920 size 128 "road-eastnet-nonat-205" #205: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #205) | 96 a5 4d 09 36 59 36 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 af 72 1b a0 98 9e 50 b5 1c 2a f4 25 37 46 6d | 29 08 48 dc 3a 43 a8 47 58 90 05 63 32 ed 1e 67 | 1c d6 5d a6 5c c9 d2 88 4d 23 9d 29 85 6c bc 34 | b6 39 47 15 78 35 07 0e dc 99 e1 b1 20 70 65 8b | 00 6c f0 e9 44 5b 08 c2 17 e1 6b 72 9c af 6c 5b | a9 60 97 0c ec 66 17 57 bd 76 76 97 27 d0 77 4a | 2a 55 71 50 75 d7 68 7b d8 80 b2 7a 09 02 08 2b | 09 0a ee 89 61 3b 8a 2f 12 7c cc 05 74 ec 11 d1 | 9b a1 09 08 7c 39 7a ee 4d 88 62 16 e2 82 1b b3 | d9 8f 53 7a 4b 48 dd 7d 8c 47 a4 25 61 2b 5a 2a | 2f 93 a5 82 b2 4d a6 fe b3 ac 51 3e da 8f 23 63 | f4 2a 7e 1b 28 f1 63 98 1b 09 f8 46 7c 59 0e 77 | 0b 32 ae 4e 95 8f da e9 a4 30 df 08 42 58 09 74 | 83 d9 4e 39 cd 7e 3b e6 37 1b b5 f8 2d 02 a3 8b | db d0 44 1c b8 65 c5 60 b6 1d bd 0a 87 21 84 61 | fa 21 34 4e 05 0a 9f 1b ec 7d 07 6c c5 18 67 d9 | 29 00 00 24 6c 40 f7 85 3a 61 11 e1 6e 44 7b 14 | a7 18 59 d8 8f ce 04 ee 70 39 7f 15 26 c1 43 92 | dc 05 98 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 dd f4 0a 58 0e d8 12 1e dc 08 fa | c5 ab bd a9 a1 ef e0 c4 00 00 00 1c 00 00 40 05 | 38 8d 68 ba 0f a0 5d 58 b7 93 ab fe 9b f6 26 59 | 71 96 1a e7 | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | #205 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 a5 4d 09 36 59 36 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #205 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #205 | rejected packet: | 96 a5 4d 09 36 59 36 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #205: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0708 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-210" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-210' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #210 at 0x557d46af2cc0 | State DB: adding IKEv2 state #210 in UNDEFINED | pstats #210 ikev2.ike started | Message ID: init #210: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #210: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #210; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-210" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-210" IKE SA #210 "road-eastnet-nonat-210" "road-eastnet-nonat-210" #210: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-210 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-210": constructed local IKE proposals for road-eastnet-nonat-210 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 210 for state #210 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a0a990 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #210 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 | crypto helper 11 resuming | crypto helper 11 starting work-order 210 for state #210 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 210 | #210 spent 0.135 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-210" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.22 milliseconds in whack | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 210 time elapsed 0.000672 seconds | (#210) spent 0.646 milliseconds in crypto helper computing work-order 210: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 210 for state #210 to event queue | scheduling resume sending helper answer for #210 | libevent_malloc: new ptr-libevent@0x7fb3600407f0 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #210 | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 210 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #210 | **emit ISAKMP Message: | initiator cookie: | aa f0 6c 1e 8f b0 d8 5f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-210 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e2 2f d8 9e b6 32 84 b3 62 ee 33 24 ed 0e fd d4 | ikev2 g^x fb 0e fa b0 5a fb 4d c1 44 66 ed 6c d9 22 6b 05 | ikev2 g^x 5a 31 76 75 51 2d 58 63 68 30 79 28 a1 8c f7 58 | ikev2 g^x 78 1f ed 9b 41 29 7f de 5e 35 7e 32 cc 4f eb 97 | ikev2 g^x f3 d2 34 17 b1 d4 d0 fd f0 52 da 3a 73 a4 1f 58 | ikev2 g^x 68 7e 43 79 1c f9 07 46 32 fb 81 59 a1 8b 36 99 | ikev2 g^x 63 59 69 2b 65 b6 49 f0 2c 89 5f 6f 77 04 35 7e | ikev2 g^x de cb d9 d5 71 0b 78 b5 5b 65 ab a6 ce 91 19 fa | ikev2 g^x 51 58 77 c1 4e 94 ff 17 29 dc 29 f8 bd 1c c5 36 | ikev2 g^x 82 f3 20 0b 04 da 30 59 b0 d1 05 3e 3f aa ef 6a | ikev2 g^x 84 97 f2 ea a5 27 2e 15 1e f4 66 a5 d9 21 ce 67 | ikev2 g^x e8 bd 44 de 20 df 28 17 c9 3c 33 10 eb 28 78 7e | ikev2 g^x 45 57 17 c5 4c aa eb a9 d1 47 13 10 17 f0 99 19 | ikev2 g^x db 6b d3 97 fa 92 c7 c8 43 99 f3 77 fc f5 56 ad | ikev2 g^x 75 cc 5d 24 35 8b 29 95 64 a0 e4 4c e0 27 1c 2a | ikev2 g^x fb fd b3 6d 87 9d 4a e7 f3 e4 fa 49 6c 90 9e db | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b7 0e 02 eb 9f 32 9f 45 44 47 90 9f 97 de 23 e8 | IKEv2 nonce e1 c4 97 88 69 d1 3d 46 ce 63 23 0a 5b 61 d3 74 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= aa f0 6c 1e 8f b0 d8 5f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d2 | natd_hash: port= 01 f4 | natd_hash: hash= 06 f2 e2 75 79 7b 92 3c e8 e4 c1 f3 d5 ae c0 9c | natd_hash: hash= c7 8c de 57 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 06 f2 e2 75 79 7b 92 3c e8 e4 c1 f3 d5 ae c0 9c | Notify data c7 8c de 57 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= aa f0 6c 1e 8f b0 d8 5f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a7 24 70 f0 1a 13 21 fc 21 f0 f5 1e 72 fd 1a 35 | natd_hash: hash= c3 6c 26 99 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a7 24 70 f0 1a 13 21 fc 21 f0 f5 1e 72 fd 1a 35 | Notify data c3 6c 26 99 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #210 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #210: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #210 to 4294967295 after switching state | Message ID: IKE #210 skipping update_recv as MD is fake | Message ID: sent #210 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-210" #210: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.210:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #210) | aa f0 6c 1e 8f b0 d8 5f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 2f d8 9e b6 32 84 b3 62 ee 33 24 ed 0e fd d4 | fb 0e fa b0 5a fb 4d c1 44 66 ed 6c d9 22 6b 05 | 5a 31 76 75 51 2d 58 63 68 30 79 28 a1 8c f7 58 | 78 1f ed 9b 41 29 7f de 5e 35 7e 32 cc 4f eb 97 | f3 d2 34 17 b1 d4 d0 fd f0 52 da 3a 73 a4 1f 58 | 68 7e 43 79 1c f9 07 46 32 fb 81 59 a1 8b 36 99 | 63 59 69 2b 65 b6 49 f0 2c 89 5f 6f 77 04 35 7e | de cb d9 d5 71 0b 78 b5 5b 65 ab a6 ce 91 19 fa | 51 58 77 c1 4e 94 ff 17 29 dc 29 f8 bd 1c c5 36 | 82 f3 20 0b 04 da 30 59 b0 d1 05 3e 3f aa ef 6a | 84 97 f2 ea a5 27 2e 15 1e f4 66 a5 d9 21 ce 67 | e8 bd 44 de 20 df 28 17 c9 3c 33 10 eb 28 78 7e | 45 57 17 c5 4c aa eb a9 d1 47 13 10 17 f0 99 19 | db 6b d3 97 fa 92 c7 c8 43 99 f3 77 fc f5 56 ad | 75 cc 5d 24 35 8b 29 95 64 a0 e4 4c e0 27 1c 2a | fb fd b3 6d 87 9d 4a e7 f3 e4 fa 49 6c 90 9e db | 29 00 00 24 b7 0e 02 eb 9f 32 9f 45 44 47 90 9f | 97 de 23 e8 e1 c4 97 88 69 d1 3d 46 ce 63 23 0a | 5b 61 d3 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 f2 e2 75 79 7b 92 3c e8 e4 c1 f3 | d5 ae c0 9c c7 8c de 57 00 00 00 1c 00 00 40 05 | a7 24 70 f0 1a 13 21 fc 21 f0 f5 1e 72 fd 1a 35 | c3 6c 26 99 | state #210 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a0a990 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #210 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 | #210 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49617.051939 | resume sending helper answer for #210 suppresed complete_v2_state_transition() and stole MD | #210 spent 0.47 milliseconds in resume sending helper answer | stop processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3600407f0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | aa f0 6c 1e 8f b0 d8 5f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #210 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #210 | rejected packet: | aa f0 6c 1e 8f b0 d8 5f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #210: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac7f80 | handling event EVENT_RETRANSMIT for parent state #163 | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #163 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #163 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49617.075028; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006485 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a67370 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #163 | libevent_malloc: new ptr-libevent@0x7fb3600407f0 size 128 "road-eastnet-nonat-163" #163: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #163) | b1 c1 5c f9 4d 0c 91 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 d1 ee ef 57 4d b8 a5 18 99 63 b7 ad a0 31 43 | d2 4c 84 95 c1 56 d8 c2 a0 e0 21 45 55 6c 89 41 | 0a ee 26 bb ae 9b 55 18 51 40 94 3e b5 e8 52 b3 | f5 21 f9 c6 39 17 43 69 05 cf af ff e3 2c 05 76 | 7f cc d0 9f 70 3b df 95 16 de 0c 79 98 56 e5 a0 | 35 3e 81 89 f8 f4 57 f4 b0 38 84 5c 5c 95 c5 75 | db 5d ff 22 a3 04 68 2a 25 a8 ca 43 e9 88 c1 c7 | f1 52 93 65 ec 22 3d 52 6b b8 00 65 57 c2 e3 a8 | 9e 23 a1 b2 55 fc 9b 13 25 aa af 20 21 98 a7 a2 | 67 94 3b 2e 91 84 12 14 99 be b3 af 12 1e 8a 45 | f6 79 09 3e 9e e8 3f fa a3 e8 99 22 6f d9 b8 e7 | 13 bd 62 da a2 36 db a1 c0 b9 40 6d 4f e4 fd e0 | be a7 dc c7 36 bf 14 ea 84 eb 4f 8e 85 9d 9c de | 91 8b 80 a4 7b dc e6 20 7f bc ce 40 33 ff 25 de | 32 53 56 b7 10 56 66 76 3f 7a e3 c4 c5 0e a7 df | 21 e3 47 1d 5c 2e 41 54 d0 87 c6 c9 9f 14 d5 5a | 29 00 00 24 cf 96 ac 26 a7 c4 21 b6 9b dc fc 7a | 6b 63 82 8c ca 2e ba 40 54 d7 a8 1f 94 42 b0 f9 | 02 a1 4a 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 05 f9 8b c8 3a 1a ac 16 65 f3 b7 | 0f 08 b9 7b 40 ca e7 92 00 00 00 1c 00 00 40 05 | 34 4b bc c5 91 2d b9 5e a5 87 8c 3c 9e 2e e2 11 | d1 e0 38 4e | libevent_free: release ptr-libevent@0x7fb360035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac7f80 | #163 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 c1 5c f9 4d 0c 91 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #163 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #163 | rejected packet: | b1 c1 5c f9 4d 0c 91 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #163: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0708 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1c490 | handling event EVENT_RETRANSMIT for parent state #201 | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #201 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #201 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49617.094414; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001032 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac7f80 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #201 | libevent_malloc: new ptr-libevent@0x7fb360035930 size 128 "road-eastnet-nonat-201" #201: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #201) | 5f 8c 2f 98 2a b9 f9 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 72 1b 4b d5 18 dd 2d 5a 73 d0 41 7c 7e 89 a9 | 19 f8 4b 62 c1 9f f8 9d ff 76 0b e2 1f 44 b2 65 | 43 ea 94 88 bf 44 69 e7 07 70 c1 dc 59 58 cc ff | 59 19 82 57 fc 1c 37 9e a0 3e e4 f1 e5 85 09 b8 | cc 92 31 ca fd aa 7e e0 16 48 4f 93 4f 42 e6 41 | c6 d3 52 7b 4e f3 0c 48 a9 04 ea f5 d3 65 18 f4 | 8a 3e 8f 3d 66 71 a1 fb 46 fb e6 68 d4 de 30 4a | 77 d7 f7 51 80 44 5e 85 cb 41 c1 dc 19 46 1a 15 | 01 41 bb 17 40 1e c9 5b 1b 21 a1 10 c3 62 4c 55 | fa d0 3d 43 4e f3 0e a9 19 fd a5 f4 e9 a2 ac b4 | 40 11 51 f5 60 d4 30 87 a9 01 d5 04 88 71 af 01 | 0d f5 ab c7 33 ac d8 6a 80 db b1 bc 74 30 96 9e | f3 e1 bc b7 79 7c 12 ad fa 75 5d d2 23 fd a0 f7 | 3c 1c 0b d2 90 e2 83 a1 35 0f 5a b5 72 3d 6d 57 | 77 a3 af 0c 6a cb c1 58 a8 44 91 03 d0 f1 c3 69 | 53 0b 4f 4c fa 84 4b 60 c6 19 9c a4 39 a4 5b 44 | 29 00 00 24 ae be 08 16 b0 5a 8a 2b 33 7f 9f 5f | cb b1 1f 0b c0 df 08 67 ec 99 94 2a ad 60 2a 4f | 52 2c d3 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 75 8b 84 8e ba 07 72 da 16 0b 96 | fb 30 39 ca 67 c0 9f 42 00 00 00 1c 00 00 40 05 | 88 1b f0 23 47 26 b3 be 92 d6 69 de 00 cf 4d 8d | 78 92 34 e3 | libevent_free: release ptr-libevent@0x7fb35403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c490 | #201 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f 8c 2f 98 2a b9 f9 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #201 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #201 | rejected packet: | 5f 8c 2f 98 2a b9 f9 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #201: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0599 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46950 | handling event EVENT_RETRANSMIT for parent state #105 | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #105 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #105 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49617.096767; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004392 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c490 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #105 | libevent_malloc: new ptr-libevent@0x7fb35403b0b0 size 128 "road-eastnet-nonat-105" #105: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #105) | f1 44 62 e8 b2 96 b0 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 2c 0f 43 7a b6 95 d2 da 02 c7 c3 b7 c1 84 3a | 45 85 a1 11 41 47 db 34 2a fb b4 18 d1 bf ea 06 | 1a 10 f5 e2 f0 2e 22 4f eb 14 58 fa 5c 28 c5 97 | e2 ae 87 b0 f4 b2 19 f2 c0 72 df 2a 2b df 2e 30 | f5 e9 e3 d6 5a 85 fc e6 1c 1c 2d 36 25 55 ff d7 | e9 f8 4f e9 95 2f bf 23 70 c4 27 2f 59 aa 5a d4 | 00 1b f9 ac 9d 1b 73 43 66 d9 a7 24 55 56 33 f4 | df 70 86 46 09 22 db 6f ad cb 9a 9a bd 6e 03 ac | ab d8 ee 40 d0 e9 4f 4e ad 4c 58 0f 93 e2 e1 c8 | a2 ad 19 24 8d ca 10 9a 44 cb e8 b8 40 12 de e1 | 29 64 1e 40 f8 bf aa 87 bb 84 b2 5f 6f 0d 9d b9 | 12 51 1b 65 f4 ee e0 55 a1 dc 96 99 27 5b 4c a9 | 9a e4 cf 90 e8 fa 83 39 ff df 24 19 f2 75 1e b2 | 3a c5 5a ee 20 09 c9 38 60 08 ab 53 42 3f a9 0e | 51 ea 72 b2 25 2b b8 e3 e2 f5 9e 45 c1 0c 4c 33 | 68 83 d9 f1 9b 1b 60 f3 f4 29 c3 90 eb 9c dd 59 | 29 00 00 24 b7 9a f1 29 40 44 aa 07 d6 8e b0 7b | 73 1b 3f b3 0a e3 ed 21 f1 bb 89 35 39 a9 d4 99 | a7 53 6e 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 95 3e 47 a9 bf e3 9c 92 80 50 73 | b0 a9 03 26 40 9a 45 50 00 00 00 1c 00 00 40 05 | c6 93 aa 3b 5e af 6b 75 f9 54 eb f4 c6 61 f4 b6 | b4 32 51 f3 | libevent_free: release ptr-libevent@0x7fb3580180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46950 | #105 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f1 44 62 e8 b2 96 b0 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #105 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #105 | rejected packet: | f1 44 62 e8 b2 96 b0 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #105: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #7 | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #7 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #7 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49617.12687; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.010167 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46950 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #7 | libevent_malloc: new ptr-libevent@0x7fb3580180b0 size 128 "road-eastnet-nonat-7" #7: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #7) | df 0f 9a c7 72 fc c7 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 16 59 37 af 9b 5a d1 22 e5 b7 89 f5 29 0b b4 | f8 e5 4b 2e 70 7a c8 bc f1 ab 2a 61 eb 02 ca fa | a3 75 2e 7e 2d d5 25 c9 fa fb 53 11 81 f8 e7 7c | 35 1a 09 cf c2 a1 7a e6 ba 83 f5 ea 71 c2 29 ca | 29 da 7e bf 99 10 95 66 d2 23 d8 4f 49 2f bd 63 | 11 b8 e1 71 39 92 a3 a7 60 6b 7a e8 94 6f c6 09 | 3e 44 50 a7 14 dd 81 7d 4c 7f 80 8c 35 65 97 9c | b1 11 76 e7 2a ca 44 b5 84 ae 8b 5a 9b fd ff 0d | 19 d8 e9 75 5a 70 67 71 dc 0e 22 08 1b 97 e2 25 | ad 6c 4c 80 de ff 3e 29 34 2a 32 fa 3b 41 ab 38 | c8 2c a4 db 1f 4a 62 fb 24 ff ed 13 44 3e 4c cb | a1 99 52 bb 30 b7 29 d8 9d 52 b8 4d 90 9d ab aa | c0 57 68 4e 57 cb d7 d7 cc 96 2c bc 75 0c 87 f5 | 9c 71 0b 3a 29 74 b7 e2 7f 5e 8b 9f 17 4e 89 84 | da f8 88 1c 69 02 1c 1f 41 83 de df 0e 7e 58 56 | 61 84 83 da 8c c8 98 f6 a7 9f db ce b7 aa a6 bc | 29 00 00 24 9d 55 08 62 c0 73 1e 47 79 75 2c 10 | 4a ab 88 17 80 18 91 8e 0d 3b 8f 21 a0 4a c9 52 | dc 93 16 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e cd 5f ad 94 80 bb 48 49 e9 a2 c8 | 76 8b 7e e8 6f 59 19 d9 00 00 00 1c 00 00 40 05 | 2f 3e df 6a 16 4a bb 95 81 15 e0 c0 73 52 29 fa | 60 85 d2 fd | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #7 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 0f 9a c7 72 fc c7 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #7 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #7 | rejected packet: | df 0f 9a c7 72 fc c7 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #7: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0717 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0eb30 | handling event EVENT_RETRANSMIT for parent state #164 | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #164 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #164 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49617.136773; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005236 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #164 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 "road-eastnet-nonat-164" #164: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #164) | 44 ec da ac e4 4e 81 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 94 19 dd 63 76 e7 8b e4 83 63 43 89 b2 25 2d | cf 02 f9 4f bb e0 9f 71 73 45 f7 70 9f f0 9c 56 | 36 6b be c1 42 fc 0e 64 e7 c2 6d 24 a0 c6 36 60 | f7 b6 44 63 1f f0 38 ff c1 f7 6f 09 6f 4b 15 6f | 4b a9 13 86 3c 04 b4 e0 2d 41 b8 5f 44 ac d3 1c | 62 7f f8 b0 79 c8 65 ec 61 21 a8 52 27 b3 79 db | 53 67 7e 4f 89 b2 45 b9 ee 3a 63 76 a6 cd 73 36 | 58 41 37 8e 8c 8a ef d6 60 54 ff 74 54 a2 07 6a | 56 54 10 22 af 8e 9e 38 af 48 a8 f2 42 f1 a6 05 | c8 55 0c 92 44 27 a3 4d be a5 b4 50 92 f3 bb 45 | b6 87 15 6c 92 a5 f1 21 ba 44 19 05 5c 4c f2 dd | 7d 64 1c 49 e3 61 8b 21 2c ef 63 14 91 93 e6 e8 | 84 82 9f 30 40 50 49 82 eb b8 19 d0 b6 4a c4 be | 05 18 e6 9d 08 3f bb c7 7a 98 44 e5 42 f9 eb fa | fc 80 53 22 fc 7c b9 e3 92 39 dd 88 61 10 2d 74 | 06 8e 96 3a 48 45 58 41 40 85 53 83 03 19 1d 49 | 29 00 00 24 e5 04 5f 5d b9 93 eb b6 f3 88 8f 81 | b6 50 c2 5a e0 91 27 94 ef 3b 1e 82 c9 33 1d 99 | 72 cc f9 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 cd 86 69 c3 fa 02 39 bf fc f5 08 | 1b bd f9 dc 60 39 91 12 00 00 00 1c 00 00 40 05 | 76 11 49 93 b0 52 97 cc bc 0b 84 d2 15 33 08 b4 | 9a f9 d3 5b | libevent_free: release ptr-libevent@0x7fb36003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0eb30 | #164 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ec da ac e4 4e 81 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #164 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #164 | rejected packet: | 44 ec da ac e4 4e 81 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #164: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cc10 | handling event EVENT_RETRANSMIT for parent state #190 | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #190 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #190 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49617.142109; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.015432 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad9ac0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #190 | libevent_malloc: new ptr-libevent@0x7fb36003b0b0 size 128 "road-eastnet-nonat-190" #190: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #190) | da 8a 0c 65 e6 2b 3c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 54 17 f8 a5 01 f3 68 22 77 c6 18 00 12 b3 14 | 54 3d f4 b3 34 1e fd 72 0e 4d ab df e8 2f e1 56 | d7 6e 5a 40 eb 22 8c 08 69 45 e9 fd 19 98 3c aa | 8d 83 ce d6 37 74 60 c8 87 61 28 d5 63 be 48 e9 | ac f9 f7 e4 f2 02 da 1e ec 22 1e 5a d2 5a 2b 8a | 3b 57 71 3a 73 29 7d d1 21 cb fe 25 7a 4a 44 7a | d3 e0 2e 8b b0 82 19 e0 d0 d4 ad 62 8a eb ad 5f | cd 5f 01 c2 97 9c ca 0a 84 fd e9 c6 24 7d a2 13 | 18 78 86 de 18 44 7c 6e 03 a7 c1 8c f5 10 72 e4 | 18 35 f0 48 fd 3b 9d 06 d6 b2 cc 32 8d c8 ab 02 | 22 2a e1 65 5c 07 67 dd 84 00 eb 6c 69 e6 d9 74 | 15 08 fb 78 e2 63 d8 e3 71 dc a5 a7 be b4 49 92 | ca 4f af 55 e1 5d c5 43 c7 03 58 76 b8 41 c6 a2 | f8 e5 96 26 df 8f 3c ed b5 1d 45 31 66 bd 99 75 | c9 f2 c5 21 dc 35 1b 0a 99 75 5d 5c a4 07 02 4f | 98 82 da 07 a8 27 6d 15 d8 05 50 39 0a b9 0a 99 | 29 00 00 24 f4 39 3c cf b3 b2 13 92 d2 3b 37 9f | 62 32 43 c3 74 37 47 22 30 dc 01 af 01 09 20 fa | 09 9a 8b e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6f a0 3a 65 d8 4c 58 fb ee 8d a7 57 | 94 7e 0d f0 9d 14 5d c2 00 00 00 1c 00 00 40 05 | c2 56 8a f7 34 3a b7 10 07 49 00 4f af 85 84 af | 10 cb 7b 4a | libevent_free: release ptr-libevent@0x7fb3780180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cc10 | #190 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 8a 0c 65 e6 2b 3c 3b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #190 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #190 | rejected packet: | da 8a 0c 65 e6 2b 3c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #190: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a986c0 | handling event EVENT_RETRANSMIT for parent state #206 | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #206 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #206 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49617.14744; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499952 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #206 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 "road-eastnet-nonat-206" #206: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #206) | 01 b3 28 e7 e1 8b 13 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 fa e3 24 f9 a6 bc f3 21 1e 37 1a 6d f4 9a 7b | 77 24 5e 56 24 67 7b 74 f9 64 dc d8 1a b5 59 69 | d9 52 b7 b7 59 74 06 38 08 06 47 89 aa a8 f6 76 | 67 bf d4 4c 77 38 3b a1 63 60 dc 2b e4 fd cd 8b | 9a 4a 0c c7 7b 27 52 84 4e da 22 90 8d d5 51 6e | 00 c5 39 c6 ed 97 f2 c6 62 d9 ba 39 61 32 bb b8 | 11 91 00 ac cd 59 52 93 9f 38 fd 04 59 e4 ef 16 | eb bf 19 45 a5 bc 57 3a 53 a0 af 42 99 76 fa 1f | bd f3 4c 0f c8 d9 db e2 c0 a7 a6 04 31 f7 f9 f3 | 77 5c f7 e0 36 17 0a 5b 7e 68 29 02 15 2c e5 8a | 69 a2 34 36 51 a6 dc bd 4c c4 84 48 fa dd 5f b4 | 73 4d 7d 2b ff 7e df 63 45 9b 17 c7 95 9a 49 c4 | 94 db d0 f3 cd fa 37 d8 ec f4 8c 44 3e 14 f3 a8 | 13 2a dc fa 14 d8 cb 5f 5e 17 3a bf 2d 92 c3 14 | 49 5a 16 33 0a 40 13 9b 4f 56 1a aa ae 2b 43 6f | 7d 54 d1 07 b7 2a 7c 54 16 74 51 00 fd 0a b4 02 | 29 00 00 24 44 53 3f fa 64 f7 0e 35 c1 fb 1d 6e | fa 42 52 34 05 1a a7 3b 67 a9 b1 fa 7a da c7 46 | 65 3a cf a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 ab 21 a3 8f 50 c0 c7 3c cf c9 b6 | d3 91 c9 10 6d b3 85 90 00 00 00 1c 00 00 40 05 | fa 90 51 e6 cc c6 e6 dc b8 75 a7 d9 1e dd 64 0c | e1 7b e8 fe | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a986c0 | #206 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 b3 28 e7 e1 8b 13 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #206 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #206 | rejected packet: | 01 b3 28 e7 e1 8b 13 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #206: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0672 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-211" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-211' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #211 at 0x557d46af4280 | State DB: adding IKEv2 state #211 in UNDEFINED | pstats #211 ikev2.ike started | Message ID: init #211: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #211: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #211; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-211" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-211" IKE SA #211 "road-eastnet-nonat-211" "road-eastnet-nonat-211" #211: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-211 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-211": constructed local IKE proposals for road-eastnet-nonat-211 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 211 for state #211 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a986c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #211 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 | #211 spent 0.163 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-211" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.246 milliseconds in whack | crypto helper 16 resuming | crypto helper 16 starting work-order 211 for state #211 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 211 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 211 time elapsed 0.000991 seconds | (#211) spent 0.994 milliseconds in crypto helper computing work-order 211: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 211 for state #211 to event queue | scheduling resume sending helper answer for #211 | libevent_malloc: new ptr-libevent@0x7fb3640406e0 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #211 | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 211 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #211 | **emit ISAKMP Message: | initiator cookie: | 53 9a 08 81 c1 f5 e1 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-211 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ef 09 3e 48 73 4c 9b c2 57 71 c3 fe a1 82 75 e5 | ikev2 g^x f2 fc 00 52 66 b2 69 a1 98 d7 a1 43 e2 9d 75 cc | ikev2 g^x 9d b4 06 fc 88 d6 44 63 90 41 43 c2 45 55 dc 1a | ikev2 g^x 12 ee 32 35 ef 1c ea 74 ac df 20 43 5d 1c 90 c2 | ikev2 g^x e0 80 56 a4 79 bd f8 c0 a8 96 3b 25 fa 43 51 16 | ikev2 g^x 7e ae 16 08 0c ee 53 be c7 29 52 25 44 6d fa 34 | ikev2 g^x 69 9f 31 ba 70 30 84 e6 d5 99 f5 2e ee 13 fd e4 | ikev2 g^x 65 1c ef 89 6e 83 29 44 bd 4f 23 ac ed 0f c3 ea | ikev2 g^x db 20 3d 79 09 22 a5 94 a4 f8 6d ce bf 13 df 61 | ikev2 g^x d3 3f 02 e7 af bb ce de f0 b1 2a fb 97 3e 5d 05 | ikev2 g^x 56 5c 13 18 20 58 3e 43 ac b1 9e 74 31 3c 13 bc | ikev2 g^x 7c 7a 3a eb be df d5 2e e9 60 5f 5a 7e af 73 b1 | ikev2 g^x 92 1c d6 e2 be f1 a5 75 8e 08 54 b0 2b e1 2c 5a | ikev2 g^x 6f 54 93 f5 5b 16 d8 ba 78 77 2e f6 39 16 6f 65 | ikev2 g^x 5e 98 fb 40 29 ab 34 cf 31 b1 1c 43 74 9c 6b 56 | ikev2 g^x 46 0a 1c e2 58 fe 1e 51 fc 87 18 4b d7 84 46 cc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ac f5 37 f2 09 3e be 57 f0 76 41 01 45 fc a2 49 | IKEv2 nonce 1d 14 8a 0e 25 fc 49 cd 6b 6f 69 01 e7 4f 36 d7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 53 9a 08 81 c1 f5 e1 f1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d3 | natd_hash: port= 01 f4 | natd_hash: hash= 1c 6c d6 1b 30 f3 11 7c 9a 75 f0 de fa 6c c9 cc | natd_hash: hash= a4 62 9e ac | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1c 6c d6 1b 30 f3 11 7c 9a 75 f0 de fa 6c c9 cc | Notify data a4 62 9e ac | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 53 9a 08 81 c1 f5 e1 f1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 73 92 bd e7 98 2e a4 8f a5 8d 6a 24 e0 26 ee e5 | natd_hash: hash= ed 8e de 68 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 73 92 bd e7 98 2e a4 8f a5 8d 6a 24 e0 26 ee e5 | Notify data ed 8e de 68 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #211 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #211: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #211 to 4294967295 after switching state | Message ID: IKE #211 skipping update_recv as MD is fake | Message ID: sent #211 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-211" #211: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.211:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #211) | 53 9a 08 81 c1 f5 e1 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef 09 3e 48 73 4c 9b c2 57 71 c3 fe a1 82 75 e5 | f2 fc 00 52 66 b2 69 a1 98 d7 a1 43 e2 9d 75 cc | 9d b4 06 fc 88 d6 44 63 90 41 43 c2 45 55 dc 1a | 12 ee 32 35 ef 1c ea 74 ac df 20 43 5d 1c 90 c2 | e0 80 56 a4 79 bd f8 c0 a8 96 3b 25 fa 43 51 16 | 7e ae 16 08 0c ee 53 be c7 29 52 25 44 6d fa 34 | 69 9f 31 ba 70 30 84 e6 d5 99 f5 2e ee 13 fd e4 | 65 1c ef 89 6e 83 29 44 bd 4f 23 ac ed 0f c3 ea | db 20 3d 79 09 22 a5 94 a4 f8 6d ce bf 13 df 61 | d3 3f 02 e7 af bb ce de f0 b1 2a fb 97 3e 5d 05 | 56 5c 13 18 20 58 3e 43 ac b1 9e 74 31 3c 13 bc | 7c 7a 3a eb be df d5 2e e9 60 5f 5a 7e af 73 b1 | 92 1c d6 e2 be f1 a5 75 8e 08 54 b0 2b e1 2c 5a | 6f 54 93 f5 5b 16 d8 ba 78 77 2e f6 39 16 6f 65 | 5e 98 fb 40 29 ab 34 cf 31 b1 1c 43 74 9c 6b 56 | 46 0a 1c e2 58 fe 1e 51 fc 87 18 4b d7 84 46 cc | 29 00 00 24 ac f5 37 f2 09 3e be 57 f0 76 41 01 | 45 fc a2 49 1d 14 8a 0e 25 fc 49 cd 6b 6f 69 01 | e7 4f 36 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 6c d6 1b 30 f3 11 7c 9a 75 f0 de | fa 6c c9 cc a4 62 9e ac 00 00 00 1c 00 00 40 05 | 73 92 bd e7 98 2e a4 8f a5 8d 6a 24 e0 26 ee e5 | ed 8e de 68 | state #211 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a986c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a986c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #211 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 | #211 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49617.175738 | resume sending helper answer for #211 suppresed complete_v2_state_transition() and stole MD | #211 spent 0.469 milliseconds in resume sending helper answer | stop processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3640406e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 9a 08 81 c1 f5 e1 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #211 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #211 | rejected packet: | 53 9a 08 81 c1 f5 e1 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #211: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5da90 | handling event EVENT_RETRANSMIT for parent state #106 | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #106 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #106 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49617.180939; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006294 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0eb30 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #106 | libevent_malloc: new ptr-libevent@0x7fb3640406e0 size 128 "road-eastnet-nonat-106" #106: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #106) | fe df 65 eb e2 ca b1 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad da 7e a9 45 cb 20 7d e8 1c 81 82 05 64 57 6e | 75 d8 44 d1 29 49 80 30 70 57 33 94 8e d0 1f 14 | bc ae 59 d5 21 a0 94 8f 2c d7 0e ae 64 85 ee 4d | 50 69 c0 d8 4e 47 ef 8f 3a 2d ef b1 7b 6b a7 c8 | 8d 12 00 9d cb 02 d1 fa 1a e5 8c 51 be 6d 05 c8 | be 42 ed 64 5d 5d eb 43 74 14 7b 2e df 96 fd f0 | be d2 f5 e5 50 93 03 3d e5 7a 2c d8 01 5a 9b de | a0 3b d7 ce 9a ef 2b 39 02 de 74 61 50 3b eb 81 | 05 67 4f 23 be 3a 8e 5c be 32 5b 04 eb 4a 0a 52 | c4 c5 a5 9b 90 ef 60 8e e0 0b c4 2e df 2e 03 08 | 7d 0d 7d 77 85 98 9e 4b 28 0a fe 25 1d a7 29 db | 4e a8 1b 4a ee 35 1d 2c ba 8d 50 15 cc 00 fd b8 | 76 4c 44 ae c6 c8 10 0a ab 0a 64 76 0a 4d ee 2e | 50 89 e6 58 b8 26 b4 69 a0 66 8e 81 ad 9d da 80 | f3 00 a8 93 0e 88 6f 79 09 79 fc 16 36 77 35 c1 | 3d 72 2e 00 31 12 9c f8 70 79 c2 64 a5 05 9a 24 | 29 00 00 24 a4 51 db a3 25 2a 8b 08 e6 f6 81 86 | 04 5c da 12 5e 8f 68 4a 8c ec ef 5b e1 08 6f b7 | 57 a9 96 c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 f9 ad bd d7 95 65 27 17 8c 87 a1 | c4 9b a8 f7 4c 6b d7 13 00 00 00 1c 00 00 40 05 | 1a ac 1c ef 71 2b dc a9 6f 07 a5 2c d5 55 fb 6b | d6 5b 32 77 | libevent_free: release ptr-libevent@0x7fb36c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5da90 | #106 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe df 65 eb e2 ca b1 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #106 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #106 | rejected packet: | fe df 65 eb e2 ca b1 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #106: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_RETRANSMIT for parent state #202 | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #202 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #202 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49617.186486; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00111 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5da90 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #202 | libevent_malloc: new ptr-libevent@0x7fb36c0300e0 size 128 "road-eastnet-nonat-202" #202: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #202) | 98 0c a0 3b 8e c3 04 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 4a de 90 9e 09 12 3c c9 7a 03 ab 1b f1 18 11 | 66 c3 f7 79 15 3a 95 02 ba e1 c3 e1 f6 5a 7b 34 | 8e de 4d 10 9a e1 70 a5 55 9d f4 c1 17 92 7c df | 68 e1 17 a5 99 1c fb 35 b9 25 cd 23 53 a8 26 d2 | b4 87 e9 2f e3 5a ea 45 0a 90 48 f4 6a 56 94 50 | e4 57 95 d6 52 83 af 6a c6 31 70 b1 c4 d3 c8 6b | cf c5 42 e4 73 01 2f be 13 4a 08 6e a7 91 68 14 | ad a5 a0 e4 14 1f a0 f2 00 98 4c ce c7 d5 c0 b6 | 15 77 5c 51 52 78 e1 34 5c df ff 32 7c 7c eb 4c | 74 06 ff d8 24 f4 34 27 4b f7 4d 5c de 29 22 32 | 61 0e 41 b1 a4 d1 44 ff 96 54 64 39 71 47 b7 07 | 8b 2d f1 7b c7 ff 29 67 2b 47 cf 64 2a ba 75 f5 | b7 8f 94 01 0c 73 d3 d0 a0 ca 7b 5c 80 ff e9 5a | df 27 66 99 d5 41 03 93 26 82 2e 43 c1 d3 4e 98 | 2a e1 9f 1a 15 c9 bf 3d d7 73 59 c0 eb c5 7f 3c | 4c 61 b0 05 20 29 0a b9 6b bf 44 e2 c1 1a 84 6d | 29 00 00 24 99 ea 46 58 fc ef 28 85 a0 72 43 c8 | 36 86 2f 35 31 69 ef db 0d c0 f1 46 4d af df db | 48 57 6f 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 23 33 21 68 f3 9f d6 75 73 74 16 | 0f 96 1b 0a 5a 2e 12 b4 00 00 00 1c 00 00 40 05 | 9b b4 ff f5 5e e8 7e 5a 50 28 47 10 22 d7 72 89 | 2b d0 c4 98 | libevent_free: release ptr-libevent@0x7fb34400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | #202 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 0c a0 3b 8e c3 04 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #202 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #202 | rejected packet: | 98 0c a0 3b 8e c3 04 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #202: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a12c70 | handling event EVENT_RETRANSMIT for parent state #165 | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #165 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #165 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49617.202066; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003594 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #165 | libevent_malloc: new ptr-libevent@0x7fb34400cf80 size 128 "road-eastnet-nonat-165" #165: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #165) | 84 89 ec 12 36 85 f6 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 64 07 de ac 8a b1 da f5 cd 1e 8a 72 06 02 07 | b4 71 02 7a d1 b4 70 86 ed 7c e5 04 db 06 11 b0 | 70 66 08 44 59 b7 49 22 d3 ba f4 ee ab fa 59 73 | b1 06 c3 8e 52 a6 3b 08 b7 93 04 a1 45 f3 91 38 | 82 d7 95 0c b3 fe bf fd 60 7f 15 7a b2 c9 6e 96 | 31 f3 92 9f 9b d4 51 14 46 6d a7 f8 2c 3c c3 fe | 86 c5 71 52 b8 28 62 77 5e 36 d1 7b 6a db 03 2c | f5 d4 3e 3d 1f 4e cb e7 cf b8 d2 9f e6 10 67 e1 | a3 1a 3a 9b e2 59 8a f3 f7 c0 58 cc fc 02 e0 b1 | da aa 4f e9 d2 86 5e 94 d6 73 96 ea 14 32 c4 4e | 3d c9 38 94 c5 47 af 83 6c ee e9 2a a3 8b e4 12 | f9 91 c1 53 48 67 8c 42 6e c0 7e 45 20 2e 6a a6 | d3 98 3e 6d d1 40 3d 9d 84 9f 54 62 49 b6 f8 67 | 32 fb 70 e2 78 08 b2 de c4 3e 70 08 0b 45 41 d7 | 34 49 14 7d a4 bf 53 d6 45 c5 fb 03 1e ef d6 06 | 6f 22 f9 f9 7c 4f e3 63 ea 02 1e 63 6e 3d 4d 36 | 29 00 00 24 a3 25 18 45 df 55 70 c4 52 41 87 e0 | ac 0c cb c2 e9 c1 36 19 df a3 78 76 61 ca c0 73 | a3 74 0a f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 2e 20 30 11 5b 47 b9 0d c9 d3 63 | b9 57 85 b4 89 e5 03 11 00 00 00 1c 00 00 40 05 | 69 81 91 3b c9 31 0b 05 42 34 36 76 be 6a 34 94 | 71 f5 f0 25 | libevent_free: release ptr-libevent@0x7fb378035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a12c70 | #165 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 89 ec 12 36 85 f6 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #165 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #165 | rejected packet: | 84 89 ec 12 36 85 f6 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #165: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad17c0 | handling event EVENT_RETRANSMIT for parent state #191 | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #191 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #191 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49617.228408; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001952 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adb080 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #191 | libevent_malloc: new ptr-libevent@0x7fb378035930 size 128 "road-eastnet-nonat-191" #191: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #191) | 85 8f 6a 80 de be 76 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 47 0f 49 e8 87 b7 e4 13 ff fb 5d 9a 22 17 d1 | a7 da b3 32 4a c2 68 c6 3d 29 6b b9 0a 47 72 fb | 44 ba cf 07 42 83 b0 15 52 d5 79 a1 0a cc fd 8c | 03 5d 92 9f bc f2 7f 7a 58 36 93 f8 ff cd 46 92 | 33 75 4c e4 12 5e a1 f8 b3 1e 61 09 80 4a a1 c5 | 5a c7 19 d2 44 74 1d 5d 1d 57 21 f5 83 fe 20 06 | 89 ca 32 09 05 22 51 7a bb d7 0f b2 89 a9 0b 74 | 7c f9 0e 07 47 37 47 69 61 d8 9b ef fb c6 bb 4f | 6f e9 47 2c 3e ce 0c c7 87 a3 c6 a6 6c 56 d1 3e | ff a6 a9 4b d0 b7 79 88 c1 3f b4 9e fc 37 5c 19 | 1d 93 d7 b8 ac 50 69 85 b1 c4 53 e5 5e cc 86 e1 | 99 0a 5b e0 3c 4f fe 9e c8 dd 39 c2 94 6f 36 d5 | 9a 4e 4e dd b3 93 c7 8c d1 85 48 7f 16 2c 4f fb | 42 93 63 f4 95 ff 92 cb fb d6 5a 99 77 ab b8 13 | 67 d4 bf 16 1e 20 38 f7 7c 3d 2c 7c ef 50 6c 66 | 06 df 76 dd 94 55 30 cb 6c f9 4c e3 a8 ba 0c 19 | 29 00 00 24 f0 4e f3 f0 90 16 59 02 63 21 11 a3 | 11 30 40 08 3c fe e4 63 ec 70 ae b0 94 4f 51 4b | 97 b6 49 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c cc b1 ee ce 47 be 7b b0 c4 63 84 | 75 d0 08 1a f9 42 67 0a 00 00 00 1c 00 00 40 05 | 29 7b 9f b8 2f b5 a8 ce c6 6c 30 7d a4 05 33 b3 | 99 4c ae 49 | libevent_free: release ptr-libevent@0x7fb35402a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad17c0 | #191 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 8f 6a 80 de be 76 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #191 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #191 | rejected packet: | 85 8f 6a 80 de be 76 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #191: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fbb00 | handling event EVENT_RETRANSMIT for parent state #8 | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #8 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #8 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49617.230027; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.014576 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad17c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #8 | libevent_malloc: new ptr-libevent@0x7fb35402a950 size 128 "road-eastnet-nonat-8" #8: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #8) | fc e4 b0 97 be 19 e9 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb d7 b3 51 4b 56 31 da 19 b8 5b 11 80 3b 41 1d | db f2 28 3e 72 37 5d 51 ba b2 d1 db 84 a6 bb ce | 1e df 68 85 ad 45 d9 42 b6 3f f1 bf ca c0 f5 c2 | 41 11 18 ed 51 a4 a9 fb cb 5c 4b aa 1e 3a 47 5b | 44 a6 6a b6 94 62 27 08 46 1d 7b c4 ed 7e 13 6a | ca 75 f3 53 1a b4 5c e1 d0 26 6f 40 15 2a cf 5a | f0 64 c4 e8 99 40 1c 70 04 b2 00 e7 d0 a3 f5 96 | 6f ea 9b 0f 3f 68 a1 38 bf d5 ee 9b d4 28 95 59 | 43 fb 48 c8 ce 17 ed f6 a6 07 54 e9 76 3f ee 31 | e6 e0 4a 4a d9 1d 0e e2 d0 7f ee 9c f3 8f a5 65 | 31 c9 6f 45 ef 29 7c e4 98 48 e7 74 36 9b 60 48 | d3 f3 57 f0 4c b4 e7 0c b5 86 17 23 2a 25 88 1a | fd 48 0b e6 cd dd cd 71 67 f2 f0 ef a5 6a 24 ce | 8d d1 03 48 9c cf 4e e9 3a a8 3d 43 bb 43 cc 87 | 8b c7 29 54 b9 be 7f 2d 59 4b b6 ed 8e 48 bd b3 | 3d c6 30 ad ce 82 73 65 33 71 0d 41 0a f1 8b 76 | 29 00 00 24 ca f3 cf 9b f4 48 aa 70 c1 ee a6 ea | 0d e2 1f 7c 7a 99 db 08 31 a2 ad 99 ee 01 2c 76 | 68 be 3a 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d b5 e6 39 e3 40 62 d7 8a aa fc 72 | 51 01 50 53 91 71 a4 51 00 00 00 1c 00 00 40 05 | 09 30 f5 72 c0 48 d1 9e 95 11 78 b6 cb 80 4b c0 | 24 25 44 07 | libevent_free: release ptr-libevent@0x7fb37000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fbb00 | #8 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc e4 b0 97 be 19 e9 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #8 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #8 | rejected packet: | fc e4 b0 97 be 19 e9 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #8: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23110 | handling event EVENT_RETRANSMIT for parent state #107 | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #107 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #107 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49617.254568; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00828 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fbb00 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #107 | libevent_malloc: new ptr-libevent@0x7fb37000cf80 size 128 "road-eastnet-nonat-107" #107: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #107) | ac 4e b3 f4 ed 6e 1b 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 73 84 90 b0 a1 c9 25 a6 16 5e 4b 67 ce 07 6b | 92 04 d0 37 9e 07 4b 09 02 c2 78 f5 a4 a2 15 3a | 81 d0 8e e8 00 40 7b 2f 93 05 4b f1 72 7f 82 62 | 11 07 a0 1f 82 07 75 ea 96 ea 88 0b 0d 07 25 f0 | 53 bc 84 a7 a4 75 94 5f 48 4e 4a 60 2b e3 6f 76 | 92 f7 9d 74 6e 3f f1 39 f4 ea a5 df f6 6b e2 19 | 19 b6 60 26 c6 fe d4 1c bc ad 80 f2 46 47 46 93 | 4a da 3f 4a 2e 08 aa d8 dd f9 58 37 f0 1b 68 77 | ce 96 bc c9 19 65 a5 66 67 6f a9 fc 8b f9 e5 15 | 20 ed ca 26 5a cf 00 8e 65 d8 10 df c9 2f 55 c3 | 64 dc 1d 41 fa 8c 1a 44 06 90 c6 59 bf c3 6e 3f | fb f3 89 2e c3 0c 98 20 fe c3 39 08 86 b8 6d 84 | 72 50 7b 56 51 ac 06 e0 20 77 cc 21 04 85 51 fd | 65 1e 59 7f 79 5a a9 9c 4e fa 78 0d d8 f6 cf 3c | cd 73 f9 1e 3d 38 88 98 9e 60 ec bd 06 0d 2d 0c | 39 4f f8 8a 60 2e a2 ac 6c bc 30 73 f0 bc 87 4c | 29 00 00 24 2b ab 2f 68 f7 5a dc 67 d2 bf 24 50 | 1d 74 5b c9 72 db b8 cd 99 25 80 eb 1e bb 50 81 | 94 b2 ae 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 39 55 8e 98 9a a9 9a 86 88 c5 10 | 1f 60 cd 0e 59 85 0d 5e 00 00 00 1c 00 00 40 05 | 18 34 33 25 63 a4 39 e3 ca 5d cd 23 8f 87 c0 51 | 02 99 ff a0 | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23110 | #107 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac 4e b3 f4 ed 6e 1b 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #107 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #107 | rejected packet: | ac 4e b3 f4 ed 6e 1b 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #107: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3980 | handling event EVENT_RETRANSMIT for parent state #207 | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #207 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #207 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49617.260973; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500447 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23110 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #207 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 "road-eastnet-nonat-207" #207: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #207) | 98 86 9a c8 81 d3 6e e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 59 ae 25 5d aa 28 92 c6 18 2f bc 82 85 c2 3b | ef 2d af ff 7a e6 4d 2d 70 93 a0 de ce 52 57 5f | cf 57 26 3f 1c a7 0f b2 96 d8 25 c6 cb c3 1d 15 | 8e 04 6c c9 e5 de a9 9f 48 ec bf 8a ac af 55 b7 | 16 4e ac b3 75 43 96 89 7c 9a 69 70 08 ac 14 3e | 96 4b 5a 70 2a 29 e5 8b 07 f0 5c cb ed e2 91 b3 | 9b d7 77 9b 28 c0 fb 49 4d 80 b8 6a 5f 4b e2 be | 9f 93 81 d7 4b ea 7b e4 89 24 53 bc a4 06 8a 63 | ae f3 eb f3 e4 35 75 5b 3f a9 62 83 5c be e9 3f | da 2a 80 0c d1 89 a8 df 56 22 c5 4a 79 92 72 a5 | 3c 63 0a 48 54 25 a3 65 43 13 ce a4 3e 09 f7 a7 | 13 60 08 7a 31 57 5f 3e ec 21 89 2d 48 e6 b5 d0 | 55 c4 14 94 07 66 75 e1 7b b7 31 ad 1e 44 cd 2a | 84 8d 3f db f4 29 57 19 60 3f fa 98 86 72 4b e8 | c5 e2 25 d0 6a 0d c6 7c 2e b9 5b 59 7f 50 39 10 | 7f 2b dd a7 68 a0 e6 07 75 6e ff 62 1d 5c 80 75 | 29 00 00 24 e2 c5 0f b4 00 31 2d 18 4e d6 58 87 | 9d 2e 37 b9 b3 22 c5 5a fd 1c 75 2e 4d 23 6a 09 | d6 2f 3b 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 0a 15 af 31 57 a5 69 ec 8c db 25 | c8 27 a9 b0 00 8f 48 7f 00 00 00 1c 00 00 40 05 | af fe 48 1b 76 51 69 26 e1 f2 f5 ea 64 9f 61 35 | 72 2e c3 f3 | libevent_free: release ptr-libevent@0x7fb37003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3980 | #207 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 86 9a c8 81 d3 6e e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #207 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #207 | rejected packet: | 98 86 9a c8 81 d3 6e e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #207: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3940 | handling event EVENT_RETRANSMIT for parent state #166 | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #166 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #166 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49617.265303; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00339 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3980 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #166 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 "road-eastnet-nonat-166" #166: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #166) | d7 12 9c be 9a d9 20 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b c9 02 ed 54 28 bb 69 3a fa da 89 fc 4e 39 8f | a4 d9 5e 2f e7 5a f0 78 e4 4f 3d 81 ef 79 61 1f | a3 10 38 af aa 4b f6 ef 84 82 56 19 cd b4 c3 5b | aa a8 08 49 1f b4 b8 b1 4e cd 8c 0c 86 09 40 1d | 3a ac 4d 85 be 4c 1d e8 f2 bd e7 23 97 c2 da f8 | 65 82 fb 26 55 00 06 12 19 2c fe d3 7b c4 ff 31 | 3f 92 30 47 40 04 59 ba c0 27 99 b0 dd 45 22 cb | 97 1b 7a c0 ab ef 56 9c f3 d7 45 a0 a5 37 a3 b2 | 58 e2 9e 19 5e 81 d9 fa 7b fe 78 35 15 83 01 42 | 24 2c 5a ee 4f 05 09 f4 1d dd c3 06 45 d3 ea 94 | 81 04 37 3a 2a 09 3c 79 d8 7b 16 c9 e4 4e 70 57 | ac 53 d9 f3 76 57 6b 10 ff a1 91 96 c5 09 1d b2 | 37 da 15 c6 76 39 0e 79 8e b4 e3 6b b6 34 b5 ee | 59 40 13 d1 7e a5 f4 50 26 80 c7 4d 2f bd 97 83 | 7b 42 78 41 a6 62 d7 58 6e e8 20 3d f8 07 e4 57 | 49 7e 0c 32 68 81 0c ed 46 bc 7b e3 e1 f5 77 38 | 29 00 00 24 a6 0c 32 e7 5a d1 b5 ca 07 42 9a 49 | 78 63 23 e6 6a be e5 1f b9 dd 49 81 36 5a 86 c7 | 6b 23 86 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 81 0a 2e 3d e5 a2 7d c2 7a 52 36 | 53 f5 16 ff 78 27 b0 06 00 00 00 1c 00 00 40 05 | 82 68 99 97 5e 62 33 7b 33 19 33 98 83 8d 7f b1 | f3 01 32 b7 | libevent_free: release ptr-libevent@0x7fb358035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3940 | #166 spent 0.128 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 12 9c be 9a d9 20 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #166 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #166 | rejected packet: | d7 12 9c be 9a d9 20 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #166: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a272b0 | handling event EVENT_RETRANSMIT for parent state #203 | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #203 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #203 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49617.266612; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001449 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3940 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #203 | libevent_malloc: new ptr-libevent@0x7fb358035930 size 128 "road-eastnet-nonat-203" #203: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #203) | 02 57 d9 3d 13 25 98 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 1c fb 0e 8f 43 ac f5 0b 5f c4 59 e2 84 8d ff | 93 42 c3 e3 19 35 29 34 62 44 7f 8b b9 60 94 1a | 68 20 33 36 7e 07 ef b9 9d 1a c3 c4 e5 e3 be 6f | df 48 47 f9 cf 7a 23 fa b8 b9 0f be e3 51 16 88 | 65 2c 32 42 a7 de 33 7a 8d 00 20 5f 8c 23 cc 9e | fd 93 18 91 08 48 46 f6 9e a4 63 04 36 57 fb 82 | db a9 f0 b9 fc 47 88 c1 af a0 52 b6 f2 77 4a 78 | 7b 45 5f 81 61 4c a8 5c 40 e9 6e 59 e6 65 a5 7d | 8f 67 9e 58 05 f0 0e f3 10 e5 4c 4f bd 20 a3 7c | 88 1e 84 95 b7 f3 51 db 65 68 67 47 f1 73 c2 67 | 48 a3 dc a1 e1 3f e7 d7 4c f9 dc 2e f5 e0 7c 72 | 3d 2f 82 8d c1 ef e8 9c 9c 82 12 27 e5 0a e4 bb | af 79 89 91 83 59 68 9b 2f 98 3b 89 0a 25 be 74 | c0 0f b6 99 3d 8f b4 39 9b 96 c4 d8 6a 5d 53 81 | 43 9d 7a a3 69 c9 61 8c c0 23 f3 33 21 de 95 0e | 53 97 be e9 2a e9 9e 71 b5 e7 b9 2b cb 16 40 76 | 29 00 00 24 ad 22 cd 07 aa fe 98 d8 02 52 a4 3c | 95 12 5a d9 ed 8e 49 c5 19 c8 cb b1 88 c1 88 b9 | c9 3f 70 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 60 71 59 6f 4c 24 43 8a 9c 00 7b | c3 3a 97 05 f3 23 35 42 00 00 00 1c 00 00 40 05 | 0d db 79 a2 0f bb d9 bd 26 88 9d ac d1 d3 87 df | 66 b4 d9 d4 | libevent_free: release ptr-libevent@0x7fb374040670 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a272b0 | #203 spent 0.128 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 57 d9 3d 13 25 98 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #203 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #203 | rejected packet: | 02 57 d9 3d 13 25 98 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #203: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-212" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-212' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #212 at 0x557d46af5840 | State DB: adding IKEv2 state #212 in UNDEFINED | pstats #212 ikev2.ike started | Message ID: init #212: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #212: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #212; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-212" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-212" IKE SA #212 "road-eastnet-nonat-212" "road-eastnet-nonat-212" #212: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-212 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-212": constructed local IKE proposals for road-eastnet-nonat-212 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 212 for state #212 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a272b0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #212 | libevent_malloc: new ptr-libevent@0x7fb374040670 size 128 | #212 spent 0.163 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-212" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.246 milliseconds in whack | crypto helper 4 resuming | crypto helper 4 starting work-order 212 for state #212 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 212 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 212 time elapsed 0.000952 seconds | (#212) spent 0.96 milliseconds in crypto helper computing work-order 212: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 212 for state #212 to event queue | scheduling resume sending helper answer for #212 | libevent_malloc: new ptr-libevent@0x7fb3580407f0 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #212 | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 212 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #212 | **emit ISAKMP Message: | initiator cookie: | 94 ac 86 b7 f8 83 d4 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-212 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 21 79 5c 0c 28 90 8c ef 02 3c d8 f8 1a 0b d6 b1 | ikev2 g^x 04 69 40 2f 72 b0 4d 73 12 19 ce 98 f8 6f 0b 9f | ikev2 g^x b9 13 67 6a 06 b8 41 b4 12 d3 3b 5e 00 45 d7 98 | ikev2 g^x a9 e1 2d 0a c7 48 98 e8 4f 26 89 26 1d eb 0f 63 | ikev2 g^x d1 cd 01 b0 ac c0 e6 9c c4 d5 af f4 d2 0a f8 fc | ikev2 g^x 50 8b 97 23 e0 8c a0 c2 04 25 1e a8 35 a0 f0 95 | ikev2 g^x 6e 38 07 0c ab 5c e3 d8 94 8f 44 fe f3 fe 9f 14 | ikev2 g^x 8e b7 78 55 0b 6e 31 2e c3 a7 48 da be 5b b7 47 | ikev2 g^x 21 9c c6 d3 74 d7 58 d3 13 78 3e ed 28 44 9b 87 | ikev2 g^x a8 e3 a1 e6 89 b5 03 ef 3b fe d5 17 e8 f9 73 04 | ikev2 g^x 1c 9e 5a c3 69 56 f2 c1 24 33 17 fd 7d 0d ed e7 | ikev2 g^x 7d 2c 20 7c 0b 8e 94 c1 2e c1 1b fa 0b 32 e2 6f | ikev2 g^x 8a b2 5d b4 79 8d 9a 89 ea a8 6f 97 71 92 fa f9 | ikev2 g^x bc 34 75 15 ab ea 61 f5 3d 74 25 af 37 7b 97 2f | ikev2 g^x 19 3e 0a b6 c1 50 67 1c b8 51 37 9b 9a b3 26 67 | ikev2 g^x c4 f2 b4 e7 06 7e 5d 5b 28 22 1e 8e 7e da b7 8b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5c 64 5d 43 88 c1 08 90 f5 2a 0e 23 99 a9 ce 32 | IKEv2 nonce 1e 4e 34 e5 9c b5 04 95 ad 56 32 fb 31 cf fd 5d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 94 ac 86 b7 f8 83 d4 a6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d4 | natd_hash: port= 01 f4 | natd_hash: hash= 94 0d b1 e5 c0 7d 3f 73 e9 5f 1b 2c de e5 07 26 | natd_hash: hash= 54 11 d9 1b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 94 0d b1 e5 c0 7d 3f 73 e9 5f 1b 2c de e5 07 26 | Notify data 54 11 d9 1b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 94 ac 86 b7 f8 83 d4 a6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 08 da df 20 35 aa 7d dd ef ff 4a 4d 21 f5 f2 fb | natd_hash: hash= f9 b4 9f 22 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 08 da df 20 35 aa 7d dd ef ff 4a 4d 21 f5 f2 fb | Notify data f9 b4 9f 22 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #212 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #212: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #212 to 4294967295 after switching state | Message ID: IKE #212 skipping update_recv as MD is fake | Message ID: sent #212 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-212" #212: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.212:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #212) | 94 ac 86 b7 f8 83 d4 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 79 5c 0c 28 90 8c ef 02 3c d8 f8 1a 0b d6 b1 | 04 69 40 2f 72 b0 4d 73 12 19 ce 98 f8 6f 0b 9f | b9 13 67 6a 06 b8 41 b4 12 d3 3b 5e 00 45 d7 98 | a9 e1 2d 0a c7 48 98 e8 4f 26 89 26 1d eb 0f 63 | d1 cd 01 b0 ac c0 e6 9c c4 d5 af f4 d2 0a f8 fc | 50 8b 97 23 e0 8c a0 c2 04 25 1e a8 35 a0 f0 95 | 6e 38 07 0c ab 5c e3 d8 94 8f 44 fe f3 fe 9f 14 | 8e b7 78 55 0b 6e 31 2e c3 a7 48 da be 5b b7 47 | 21 9c c6 d3 74 d7 58 d3 13 78 3e ed 28 44 9b 87 | a8 e3 a1 e6 89 b5 03 ef 3b fe d5 17 e8 f9 73 04 | 1c 9e 5a c3 69 56 f2 c1 24 33 17 fd 7d 0d ed e7 | 7d 2c 20 7c 0b 8e 94 c1 2e c1 1b fa 0b 32 e2 6f | 8a b2 5d b4 79 8d 9a 89 ea a8 6f 97 71 92 fa f9 | bc 34 75 15 ab ea 61 f5 3d 74 25 af 37 7b 97 2f | 19 3e 0a b6 c1 50 67 1c b8 51 37 9b 9a b3 26 67 | c4 f2 b4 e7 06 7e 5d 5b 28 22 1e 8e 7e da b7 8b | 29 00 00 24 5c 64 5d 43 88 c1 08 90 f5 2a 0e 23 | 99 a9 ce 32 1e 4e 34 e5 9c b5 04 95 ad 56 32 fb | 31 cf fd 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 0d b1 e5 c0 7d 3f 73 e9 5f 1b 2c | de e5 07 26 54 11 d9 1b 00 00 00 1c 00 00 40 05 | 08 da df 20 35 aa 7d dd ef ff 4a 4d 21 f5 f2 fb | f9 b4 9f 22 | state #212 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374040670 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a272b0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a12c70 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #212 | libevent_malloc: new ptr-libevent@0x7fb374040670 size 128 | #212 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49617.292545 | resume sending helper answer for #212 suppresed complete_v2_state_transition() and stole MD | #212 spent 0.488 milliseconds in resume sending helper answer | stop processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3580407f0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 ac 86 b7 f8 83 d4 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #212 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #212 | rejected packet: | 94 ac 86 b7 f8 83 d4 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #212: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1da10 | handling event EVENT_RETRANSMIT for parent state #192 | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #192 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #192 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49617.29851; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001915 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adc640 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #192 | libevent_malloc: new ptr-libevent@0x7fb3580407f0 size 128 "road-eastnet-nonat-192" #192: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #192) | c8 ff f4 e6 c7 17 a0 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 d3 4a 60 f3 6b 7c bf bf ce 75 aa 6b ec f0 aa | 6f fd 60 63 46 fe 0f ab c7 68 02 df c4 c6 ca 90 | 76 3b 3d fe 56 bf ba a8 ba d0 ca f7 0b 74 9f c5 | d1 05 87 00 01 63 f1 b2 af 9b 1a 75 92 cd 23 75 | 4b c9 10 79 b9 97 80 8d 36 ac 73 a4 c7 b8 fd cc | b1 38 24 08 46 20 a1 f7 27 44 94 85 0d d1 c0 73 | 03 9e 85 e9 52 56 70 2c 82 87 11 d5 67 bd 17 0b | b7 79 e5 dd 43 5b 11 13 e5 80 26 ae 8c 3b 5c 3e | 39 de 54 5e 94 90 b6 94 bf 91 dc dc 3a b0 dc 33 | c2 af e8 1e 41 35 52 7c 14 9d d3 2a 93 8c 0c 2f | 4c dd 47 e3 33 95 7f 32 01 a2 12 1d 55 d6 96 ba | 80 04 ad 84 ae 69 4d 77 46 16 b8 c1 14 67 ff 90 | 15 d3 6f 27 f5 ca 1c 28 65 98 cb 29 af 5a 3d 4d | 38 de 5a e8 93 6e 36 0e 60 ea e1 05 60 eb 23 cb | 78 44 37 ea 66 63 22 ea 85 48 d4 a0 76 12 75 a9 | 2c 64 ca f2 05 fb 36 e8 35 db d2 9f 91 a5 c4 20 | 29 00 00 24 a1 c2 f0 6b 73 a0 8d a3 3d b9 fc 65 | 4f d9 ed 3c 9f 8f 87 98 60 fa 1e 4a fb c7 f1 6c | 8c d3 14 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 12 d3 2e 8d 56 f4 3c 1b 6c 80 b7 | a9 e2 20 50 4b 37 dd 45 00 00 00 1c 00 00 40 05 | c6 22 26 cb ae fa 29 03 74 5f 21 c6 81 1a 29 8b | 43 e3 ee ee | libevent_free: release ptr-libevent@0x7fb37c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1da10 | #192 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 ff f4 e6 c7 17 a0 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #192 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #192 | rejected packet: | c8 ff f4 e6 c7 17 a0 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #192: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56e30 | handling event EVENT_RETRANSMIT for parent state #9 | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #9 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #9 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49617.332231; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.014929 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1da10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #9 | libevent_malloc: new ptr-libevent@0x7fb37c00cf80 size 128 "road-eastnet-nonat-9" #9: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #9) | 42 d4 37 7c 6c a2 32 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b e7 ee 8b 3f 67 fc 59 f9 cf cd 11 31 95 6f 6f | 1a 68 46 c3 76 29 7e 71 e4 25 40 18 dc 88 c2 53 | ee 88 a1 08 66 15 f3 28 c2 cb 4a e2 b5 75 33 59 | 55 79 a1 88 5f 78 4f 18 38 8e ae 5c 13 15 13 df | ba 4a 47 c9 50 41 88 b6 f1 7a 74 8c 60 ff 93 b2 | 20 68 e4 46 db 20 8c 30 74 ea 04 10 5a 30 ea 94 | 23 ad e3 f6 b8 fd ef 4b 90 8b 27 14 bc c0 83 ef | 74 2c ab 49 65 76 af 73 fb 43 7c f1 ae d1 dd 3f | cd c7 7b 68 fb f4 41 39 5c 57 ef 8f 92 ea 9a 47 | 45 2a 1a ac 29 88 a1 89 ea a8 1a 7b a4 32 e3 9e | 8d f2 ad cb d1 f4 4e b8 a3 dd 79 49 05 1f 03 30 | 8a 93 8b ac 8f aa 22 b8 9b 89 24 78 34 56 75 f6 | e9 af c1 e4 36 df ba ca 6c 64 ef d5 97 79 d5 33 | 78 61 be 8d 16 b6 42 4a 4c 79 ee 04 84 ce 68 09 | e7 e6 62 4d 5a 49 5e d0 0c 5b 80 69 ff fd 56 0f | 18 1b 5a c8 54 c8 76 c4 ef 5e 74 08 bd 6d 13 c8 | 29 00 00 24 56 5b 42 39 e6 4b 00 04 2e 83 3d 83 | 1e c8 b4 ab 97 9b 33 06 82 c0 a9 36 06 ea b4 2d | 23 5d c5 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 a8 01 3e 09 4e 61 7c 63 45 b6 fc | 6b 13 a6 83 ef 8b fa 92 00 00 00 1c 00 00 40 05 | 4f 50 e4 89 50 50 84 2d e7 09 2b 9f ac 1d 9b 91 | c6 7c af 4c | libevent_free: release ptr-libevent@0x7fb3680251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56e30 | #9 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a647d0 | handling event EVENT_RETRANSMIT for parent state #167 | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #167 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #167 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49617.332418; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005159 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56e30 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #167 | libevent_malloc: new ptr-libevent@0x7fb3680251c0 size 128 "road-eastnet-nonat-167" #167: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #167) | d1 34 e0 8f fb 7c 13 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 06 19 19 47 f8 53 ed d0 cd 1b 23 74 a8 df 03 3c | 9b a0 ef 95 f1 ce f6 ae 26 37 05 42 40 f8 1b 11 | 25 b6 88 f4 08 21 89 99 64 30 46 35 2b e5 72 51 | 22 12 a5 4d 09 28 30 73 8d 80 f8 3e 6a c2 3d d6 | 8d b5 a5 60 de 1d e9 8e c3 96 be eb 9a e4 82 44 | cd c0 61 18 61 45 71 3d 05 11 06 a9 ca 4e 06 4e | cb 22 e9 93 7b 78 bf 7f 83 42 10 73 45 d5 b3 1b | 92 fd 26 c3 64 99 f5 61 c8 1f 64 c2 09 10 74 12 | fd fe 01 de ac 29 c7 4b 49 1a d9 8d 7a bd 94 f7 | 39 58 38 2e ae 17 b2 73 1d e4 a7 77 fc bf 85 3c | 63 5b 1a 29 48 e8 aa 07 3f e9 82 92 50 e7 72 9f | 9a d8 a5 97 f7 0c 72 e2 e7 b6 cb 0c ff 4e 38 9e | 6d f9 d9 e0 8f df a4 4e 9c de 86 ff 7f 6f 46 07 | 19 30 44 7c c3 76 d0 df 68 7b cd 98 75 c7 57 02 | 52 bd 7f a1 c9 22 2c 83 36 62 ea 42 c7 31 3b 8a | 30 42 3c 51 50 0b 14 55 d5 43 19 16 fa 0b 4c a5 | 29 00 00 24 15 4a d1 bb d8 87 b7 c2 1d 20 84 6d | 4c 8a c4 e7 5d 03 8e 8f 16 37 df e9 c3 77 de 41 | b9 4c a3 ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 52 6d ba 0b 84 f5 59 4b dd eb 25 | 53 bb c6 97 e9 c5 42 9c 00 00 00 1c 00 00 40 05 | f4 8a 9c 13 b7 e1 a4 8b 85 79 9e 14 f1 e3 5c 5f | 69 af 71 4a | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a647d0 | #167 spent 0.0956 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 d4 37 7c 6c a2 32 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #9 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #9 | rejected packet: | 42 d4 37 7c 6c a2 32 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #9: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d1 34 e0 8f fb 7c 13 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #167 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #167 | rejected packet: | d1 34 e0 8f fb 7c 13 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #167: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa1f00 | handling event EVENT_RETRANSMIT for parent state #108 | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #108 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #108 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49617.342177; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.011032 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a647d0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #108 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 "road-eastnet-nonat-108" #108: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #108) | b6 36 fb 7e 9b 39 08 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 8f 7e 30 55 17 55 d0 7b cc 1e 1e d2 0b 4a cb | f4 10 86 26 73 3d 12 d5 07 43 0f 11 e4 f8 f6 27 | 0b a5 f1 36 07 fc f3 05 3c 23 da bb fc 30 83 87 | 4d 41 58 5e 99 3a a9 ce 46 15 98 87 9b 24 d7 8f | 4b 59 7f b7 31 2a 48 e9 80 ab 05 c8 c6 49 95 79 | 0d 98 4a 2c 3d fe d3 d5 57 7f be e0 6f 80 49 7e | 12 83 14 1f 0d 26 16 aa cd e1 d8 a5 e8 e4 d2 0b | 8c a3 fb db 9a 33 4c 54 d3 db d0 4d 8d 8e a8 6d | 02 98 c7 65 a7 c6 72 0c be 01 bc 52 89 54 3a 59 | 6c 0b 5d c0 31 d7 63 e7 46 02 b3 0a b3 c7 5c de | 0f 7c c0 40 9f a9 b4 60 e4 65 87 1b d1 de 9c 27 | 3d df 5c 7f 27 8d e9 84 86 44 ce 9d 88 43 1a 58 | 28 56 bd 9e df a0 81 8f 79 ba 7e dd 69 15 d8 10 | e7 15 0f da 12 84 35 19 8e 2f 46 d3 83 f4 76 51 | 58 93 90 90 80 38 02 b8 02 db 96 cc e8 5b bf 28 | 0c 19 e8 c4 f6 ae 03 e7 2c 85 d1 50 dc 63 a6 cc | 29 00 00 24 6f 78 95 93 53 4c be 35 be d7 12 7f | aa e5 be 16 ad 5c 36 ac 46 40 9b c8 37 9c 91 65 | 00 a5 4b a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 98 20 9c 05 26 c6 0c 16 0d f3 71 | 8e b0 d2 f3 4f 39 a2 61 00 00 00 1c 00 00 40 05 | 96 4b e6 dc 37 23 61 90 08 5b 41 4a ab 35 e9 fe | 61 65 2c 1d | libevent_free: release ptr-libevent@0x7fb3740356e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa1f00 | #108 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b6 36 fb 7e 9b 39 08 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #108 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #108 | rejected packet: | b6 36 fb 7e 9b 39 08 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #108: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a903c0 | handling event EVENT_RETRANSMIT for parent state #204 | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #204 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #204 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49617.366522; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001587 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa1f00 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #204 | libevent_malloc: new ptr-libevent@0x7fb3740356e0 size 128 "road-eastnet-nonat-204" #204: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #204) | 26 9b 30 ce 1c 69 a2 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 5c 6f c5 e4 37 b5 85 8b 88 c9 38 4a 33 67 e3 | b5 76 e8 6e 58 ca 85 66 b2 6e bc 01 cc 91 d2 fa | e1 db ef 4b 77 17 f5 08 16 0c 8c d0 2e 39 5b 3d | 15 8c a2 f2 d6 7b 21 20 d2 5d b0 fc e4 ac 76 97 | 30 50 2e 26 71 1a 34 95 4e 65 5f 33 21 89 a5 4a | 55 91 fa cb b0 1c 50 2f 03 b1 71 df 7e 93 5d 3f | 83 d0 25 32 6e 4a 7a e8 b7 9c c4 2c bc 70 88 ca | 1a 12 c7 c4 81 cf af 5b 96 ed ff 17 ee ac bf bc | 7e ee e8 ea bf 0e 25 06 f6 11 f2 0c fc 01 f3 a1 | a3 a5 0f 39 3b 0e 4e 24 40 89 5e e7 dc 14 70 db | b0 59 4e 88 e4 58 74 9d 4c 35 67 80 45 58 10 7b | 90 72 ed 6b 8c 09 3f 83 31 52 aa d0 a7 ad e8 5e | 62 2d e8 c2 d2 5f d4 fe 77 1a 24 07 0f a0 1b 7f | b1 31 3d fc 2d 59 58 95 dc 6b 56 ff a8 81 81 ca | bd 63 b1 a6 f3 e4 7a e1 08 85 c1 19 90 12 c0 7e | 58 38 76 3a 98 a3 e6 81 1a a9 a3 c2 1d 81 96 94 | 29 00 00 24 f4 44 35 a4 a3 93 f6 e1 66 d4 43 db | 1b ee 9d af 99 ba 18 1d 96 99 f1 ca 00 4e 65 c8 | 19 9f df 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 dc 32 bc d5 a3 92 90 2d a7 77 26 | 1c 78 dd c4 9b 23 7d 3e 00 00 00 1c 00 00 40 05 | 5b a2 10 3c 9e 91 f8 b5 af bf b9 e6 23 08 5d a3 | 6c 17 22 88 | libevent_free: release ptr-libevent@0x7fb34c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a903c0 | #204 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 9b 30 ce 1c 69 a2 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #204 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #204 | rejected packet: | 26 9b 30 ce 1c 69 a2 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #204: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-213" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-213' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #213 at 0x557d46af6e00 | State DB: adding IKEv2 state #213 in UNDEFINED | pstats #213 ikev2.ike started | Message ID: init #213: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #213: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #213; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-213" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-213" IKE SA #213 "road-eastnet-nonat-213" "road-eastnet-nonat-213" #213: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-213 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-213": constructed local IKE proposals for road-eastnet-nonat-213 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 213 for state #213 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a903c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #213 | libevent_malloc: new ptr-libevent@0x7fb34c02a950 size 128 | #213 spent 0.157 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 resuming | RESET processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 starting work-order 213 for state #213 | RESET processing: connection "road-eastnet-nonat-213" (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 213 | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.257 milliseconds in whack | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 213 time elapsed 0.002889 seconds | (#213) spent 1.03 milliseconds in crypto helper computing work-order 213: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 213 for state #213 to event queue | scheduling resume sending helper answer for #213 | libevent_malloc: new ptr-libevent@0x7fb35c0407f0 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #213 | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 213 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #213 | **emit ISAKMP Message: | initiator cookie: | 4a f6 d6 f4 f7 c1 a9 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-213 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f3 87 92 0f fd 56 61 cf 88 27 07 68 fb 27 94 14 | ikev2 g^x ab 6f 99 e6 75 dc 26 2f 1e 93 7a c8 7f ed e5 7d | ikev2 g^x 6b b9 9d 92 4b e7 28 92 86 1e 95 f5 3a f0 df 50 | ikev2 g^x 69 19 a3 90 28 b6 f5 2d 21 d9 e8 a3 e1 5b a3 90 | ikev2 g^x 3f a9 b0 a1 2a 68 b5 63 77 3b aa 0b 6a 92 36 d6 | ikev2 g^x 32 61 b7 e6 8e cd 51 f2 78 e2 77 58 13 92 00 bb | ikev2 g^x 90 bd cb b3 98 f4 c1 b4 f9 bd 9c 07 84 cd 8b 44 | ikev2 g^x 56 64 bd 56 88 30 16 b1 de 15 4b 10 e0 33 82 0c | ikev2 g^x 53 be e7 f5 bb 24 10 e7 6d a3 b2 a5 08 f8 45 52 | ikev2 g^x 21 5c 7f a2 a6 ba 7c c6 84 2d 67 10 b4 86 8f 9c | ikev2 g^x f0 28 12 88 fb c8 52 6a e2 26 a6 a9 6d 8d 51 de | ikev2 g^x 96 9d d4 31 fb 52 b9 5a 75 dd 19 ef dd 61 8f 1b | ikev2 g^x 4b 84 99 e3 45 d4 ee 63 d4 75 8b e1 c7 c9 46 a5 | ikev2 g^x 75 72 66 74 64 ad ff 53 8e cd 6a 8d e1 aa 8b e0 | ikev2 g^x 68 cf 60 1e 6d 53 aa b5 21 a7 9f 74 3a 51 a3 ac | ikev2 g^x e3 62 94 51 c3 8c 9b b8 34 1f 9f 73 40 9a 49 cb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b5 56 f5 24 67 7b ee bc b9 fe c7 48 4d 15 0a a4 | IKEv2 nonce 8c 8b d0 3d 4d d5 8d 67 be 58 a4 6d 51 fe 0b 38 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4a f6 d6 f4 f7 c1 a9 60 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d5 | natd_hash: port= 01 f4 | natd_hash: hash= 75 44 29 1f 54 8d f8 98 7c 02 ef 5a ae 02 c1 10 | natd_hash: hash= 4c 75 c9 6b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 75 44 29 1f 54 8d f8 98 7c 02 ef 5a ae 02 c1 10 | Notify data 4c 75 c9 6b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4a f6 d6 f4 f7 c1 a9 60 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= bc 12 92 95 d4 1b f9 ad 5d 6a 71 41 82 c9 bd c2 | natd_hash: hash= 29 69 a1 81 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bc 12 92 95 d4 1b f9 ad 5d 6a 71 41 82 c9 bd c2 | Notify data 29 69 a1 81 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #213 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #213: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #213 to 4294967295 after switching state | Message ID: IKE #213 skipping update_recv as MD is fake | Message ID: sent #213 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-213" #213: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.213:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #213) | 4a f6 d6 f4 f7 c1 a9 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 87 92 0f fd 56 61 cf 88 27 07 68 fb 27 94 14 | ab 6f 99 e6 75 dc 26 2f 1e 93 7a c8 7f ed e5 7d | 6b b9 9d 92 4b e7 28 92 86 1e 95 f5 3a f0 df 50 | 69 19 a3 90 28 b6 f5 2d 21 d9 e8 a3 e1 5b a3 90 | 3f a9 b0 a1 2a 68 b5 63 77 3b aa 0b 6a 92 36 d6 | 32 61 b7 e6 8e cd 51 f2 78 e2 77 58 13 92 00 bb | 90 bd cb b3 98 f4 c1 b4 f9 bd 9c 07 84 cd 8b 44 | 56 64 bd 56 88 30 16 b1 de 15 4b 10 e0 33 82 0c | 53 be e7 f5 bb 24 10 e7 6d a3 b2 a5 08 f8 45 52 | 21 5c 7f a2 a6 ba 7c c6 84 2d 67 10 b4 86 8f 9c | f0 28 12 88 fb c8 52 6a e2 26 a6 a9 6d 8d 51 de | 96 9d d4 31 fb 52 b9 5a 75 dd 19 ef dd 61 8f 1b | 4b 84 99 e3 45 d4 ee 63 d4 75 8b e1 c7 c9 46 a5 | 75 72 66 74 64 ad ff 53 8e cd 6a 8d e1 aa 8b e0 | 68 cf 60 1e 6d 53 aa b5 21 a7 9f 74 3a 51 a3 ac | e3 62 94 51 c3 8c 9b b8 34 1f 9f 73 40 9a 49 cb | 29 00 00 24 b5 56 f5 24 67 7b ee bc b9 fe c7 48 | 4d 15 0a a4 8c 8b d0 3d 4d d5 8d 67 be 58 a4 6d | 51 fe 0b 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 44 29 1f 54 8d f8 98 7c 02 ef 5a | ae 02 c1 10 4c 75 c9 6b 00 00 00 1c 00 00 40 05 | bc 12 92 95 d4 1b f9 ad 5d 6a 71 41 82 c9 bd c2 | 29 69 a1 81 | state #213 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c02a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a903c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a903c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #213 | libevent_malloc: new ptr-libevent@0x7fb34c02a950 size 128 | #213 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49617.380204 | resume sending helper answer for #213 suppresed complete_v2_state_transition() and stole MD | #213 spent 0.474 milliseconds in resume sending helper answer | stop processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c0407f0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a f6 d6 f4 f7 c1 a9 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #213 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #213 | rejected packet: | 4a f6 d6 f4 f7 c1 a9 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #213: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #208 | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #208 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #208 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49617.381388; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500112 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a272b0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #208 | libevent_malloc: new ptr-libevent@0x7fb35c0407f0 size 128 "road-eastnet-nonat-208" #208: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #208) | 8f 5c 5f 4e 3a f5 16 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 92 7c 11 dd 8e a5 d7 54 92 a0 06 d5 10 ac 42 | 6b 15 ed 47 e9 69 c6 dc ee be 05 fb f7 98 ca cc | 76 c8 1e 19 2f 4d 8b 90 94 87 44 8e 66 b4 d8 02 | 68 05 60 b8 e3 7d 75 b7 4a 7c ab de a8 fd 41 6e | d6 76 9e 53 12 c0 6c 1d 7a 52 1e 69 01 3b 4b c1 | e7 6b 22 d6 c7 2e 90 0a 6b 5b 89 db 1a 6d af 36 | b5 41 be bc 9c 90 ed 64 78 a2 9b 4a 8f 0d 28 7e | 60 aa 46 05 6e d0 b2 52 c1 92 88 e6 04 b2 49 48 | c1 79 f2 f3 15 c9 58 54 7e a8 48 76 87 71 8d 7e | d5 41 8a 58 60 e1 22 51 b6 c8 da 62 23 cd 7f 72 | ed db 2b 44 40 79 52 36 a1 7b 1f f4 ce 24 ba 47 | 7a c2 df 3d 0b 70 e1 d1 d8 6a b0 33 7a 8b a6 83 | 44 26 40 e1 a6 53 73 33 8b d6 96 05 57 d5 68 55 | da 59 03 a3 8b 2e 16 30 b2 69 8f 5c 37 5b 88 82 | f8 0d 7c f2 a3 34 16 b2 3a a4 64 ba aa 6e 09 cf | de ff 28 7b 22 28 98 ba a1 44 cc d7 e1 ec e2 fc | 29 00 00 24 6d f9 31 58 db 7e 5c 23 da 78 97 04 | 9a 1c fc fa 9f 9f da b9 38 4a 1a f0 e7 71 5f 51 | b4 ee 4f 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 c6 9e d7 bc 34 04 8f 07 db d5 e1 | 11 54 7a 15 87 49 41 6f 00 00 00 1c 00 00 40 05 | da 8d 6c 65 d7 12 37 8a 51 87 98 29 74 33 3a f5 | 86 ee 4b 0a | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #208 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 5c 5f 4e 3a f5 16 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #208 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #208 | rejected packet: | 8f 5c 5f 4e 3a f5 16 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #208: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56dd0 | handling event EVENT_RETRANSMIT for parent state #193 | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #193 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #193 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49617.385664; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001986 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #193 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 "road-eastnet-nonat-193" #193: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #193) | 09 06 18 28 25 97 f6 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d fb a2 00 c4 81 91 0e b9 c0 41 7e a3 8e d5 a7 | 8f f9 71 10 26 95 10 e6 4e 8b 4b cc bc fc 28 8b | b7 f8 db 09 cb 68 57 d8 0f d5 cb 0f b4 d7 8f 3d | bd 12 fa dc 76 89 b1 cd af d1 36 87 37 88 94 35 | dc 1d 71 91 3b f3 e1 80 cc f2 f0 d3 3a 4d 9e 94 | 07 3c 65 6d 3e 40 ff 84 75 64 e8 1b b1 8c 09 6d | 19 40 40 a9 6d 88 cd b7 e8 19 c9 3d e5 92 7e 64 | de 57 bb db cd d4 22 17 89 b5 3e 22 3c e2 24 0b | 14 89 5a 96 bd 20 3b aa d7 bd af 6b d4 f2 98 3c | 51 d6 02 8a 1a 1e 91 da fa 7c 17 97 ea 62 5d 5c | 64 1a ef 72 b1 d0 d3 26 fb a0 cf 97 96 42 ef 85 | 1f 2a 66 aa 06 10 71 63 af 7d da 60 c1 c8 13 08 | 97 23 c5 07 eb 43 86 64 05 41 06 20 ee 9b 27 00 | 30 a6 42 a7 c6 f6 78 37 51 13 98 31 24 47 eb e1 | 16 0f ee 4e 11 f9 96 b6 72 84 dc 21 2b 6e e3 77 | 3a 73 af fe 81 a3 c6 e9 eb 76 cf a2 f6 45 8e f3 | 29 00 00 24 ca 9d 5e 32 ed 0b e6 19 dc 2f e8 6f | 8e a5 0f 9f 9c 08 6d f3 68 e8 0a 59 74 47 ad 67 | e3 bf 67 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c 89 f1 95 94 6f 28 52 1d 00 7f 87 | cf b9 fb 25 a2 94 8b 5c 00 00 00 1c 00 00 40 05 | cf 55 4f 40 25 07 37 da af 22 52 57 b9 8b da a2 | e2 e1 f8 6b | libevent_free: release ptr-libevent@0x7fb3680180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56dd0 | #193 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 09 06 18 28 25 97 f6 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #193 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #193 | rejected packet: | 09 06 18 28 25 97 f6 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #193: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0641 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45350 | handling event EVENT_RETRANSMIT for parent state #168 | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #168 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #168 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49617.405615; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.008624 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56dd0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #168 | libevent_malloc: new ptr-libevent@0x7fb3680180b0 size 128 "road-eastnet-nonat-168" #168: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #168) | b9 02 4f a9 68 0f a0 fe 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 38 63 d7 fd 7e 45 ef 72 03 13 6e 35 cd 53 26 | dd fc 38 ee df 06 1b 11 d5 c4 09 34 ea 9e 52 e9 | 90 99 59 42 6e 45 cc 92 f7 0d d9 7f 81 1b 1c 4d | 72 ce 0d 51 93 0e f8 d3 b9 70 d1 ad 64 8a 6a e2 | a3 1d 17 ed 1c a1 e4 c2 92 7b 01 e5 0d a5 15 1e | c9 45 f6 10 06 37 94 e2 37 85 e0 bc d4 3b da fb | 39 7d 59 09 ad a9 c4 e3 7a c2 37 5d ed ee 68 e8 | b1 63 07 9f 75 29 29 20 65 07 02 b1 8b 8b 01 b0 | 2b 52 3c a4 c8 5c 27 70 49 1c a9 4a ee d4 27 a2 | d7 44 e4 1a a5 20 37 9f 74 66 e1 72 a9 aa a5 00 | ec 99 a9 b7 19 84 18 49 d0 9b 4f 00 03 95 50 90 | b6 93 61 e2 6b 86 3b a3 1f 9e fe be b9 00 11 4e | d0 ee 6d 6d 92 bc 2a 22 db 5c 6c ba d6 ed 5d 3e | 26 d4 a4 f0 75 e3 70 55 39 8d c3 1c 3c 5e 40 3f | 06 f2 7d 36 24 34 4a 10 84 8b e4 b1 b8 1a 47 88 | b9 e7 73 06 47 d4 d0 41 aa 50 1b af 0e 28 2a e0 | 29 00 00 24 3f 02 e6 1c 86 66 81 19 d2 36 b7 e8 | e6 9a a6 e7 5e 78 b6 e8 13 75 aa 57 3b a6 be 37 | b8 21 ac c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 8a 57 55 a3 9f b5 8e 63 74 0d de | 85 a9 a1 c8 2f d9 1c 61 00 00 00 1c 00 00 40 05 | 7a 31 f7 15 f8 cd 69 10 6a f0 ab d3 a9 c2 c3 c7 | 07 31 9b 08 | libevent_free: release ptr-libevent@0x7fb37c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45350 | #168 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 02 4f a9 68 0f a0 fe | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #168 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #168 | rejected packet: | b9 02 4f a9 68 0f a0 fe 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #168: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.069 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8ee00 | handling event EVENT_RETRANSMIT for parent state #109 | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #109 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #109 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49617.41184; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005127 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45350 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #109 | libevent_malloc: new ptr-libevent@0x7fb37c01d920 size 128 "road-eastnet-nonat-109" #109: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #109) | 53 c2 aa ad 50 91 d9 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 1a 23 bb a3 ce 6a 0d 92 7a aa 8d 69 c7 99 27 | db f2 23 5c cd 5e 2d f6 c4 13 c1 c7 87 46 ed 75 | d8 b9 55 72 40 32 53 f1 21 db f3 6d 45 6a d9 b4 | 9c 06 b1 28 c5 00 1e e2 70 2c 2a 1a f0 fa 65 1b | a8 db b9 2c 83 95 23 c4 4d 60 4b a3 fc 58 c6 c8 | a8 b0 c1 e8 32 2c d3 70 a2 4d cb c8 7c 80 17 90 | c1 c1 fd 82 03 1f 32 d8 5e cd ad 60 ce c1 24 ab | 82 68 88 db 79 b3 aa 37 ff 36 d4 a3 82 06 b7 59 | 0c 4c 61 6f 22 1c 48 b3 94 8b 71 14 8f 57 c8 03 | 31 41 b9 e3 a9 ea 8f 4d 51 15 4a 4c 5f 30 c2 c4 | 40 3e 6a 9e 7d 33 6d fb 91 1c b2 be 1e 33 35 f6 | 1a db ff 1e 8c 4e e8 12 71 d7 94 88 49 d8 37 d9 | cb 52 5b 22 87 0a c9 2f a4 1d 52 36 85 74 38 7e | de e2 44 79 f2 36 18 5e 82 cf d4 fb db 3f c9 35 | 36 d8 7b 5d 04 fb fa a4 fe b5 87 c5 e7 4e 90 d6 | 9f 17 87 48 32 5d ec 5c f7 e6 e2 39 17 1c 9c 2a | 29 00 00 24 8f bd ba cb 6b fc de c1 80 b9 fe c3 | b3 e0 ad b2 e9 fa 37 77 43 04 c6 81 1a 91 41 eb | 20 40 b9 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f d2 7c ae 7e 39 2b fb 54 2c 44 94 | 2e c2 37 67 8d e5 fe 8b 00 00 00 1c 00 00 40 05 | 12 b6 58 87 f0 a8 b9 d4 aa ae 6f 5a ed df 76 d7 | 1d 86 02 2c | libevent_free: release ptr-libevent@0x7fb368035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee00 | #109 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 c2 aa ad 50 91 d9 00 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #109 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #109 | rejected packet: | 53 c2 aa ad 50 91 d9 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #109: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0655 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d590 | handling event EVENT_RETRANSMIT for parent state #10 | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #10 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #10 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49617.435236; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.018413 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee00 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #10 | libevent_malloc: new ptr-libevent@0x7fb368035930 size 128 "road-eastnet-nonat-10" #10: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #10) | 6b e4 01 c3 ed 3e ed 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2b 6a 85 96 38 f3 d3 4e 55 03 ae f3 d4 0f ad 38 | 83 2b 8b 92 04 a5 95 20 97 dc f8 34 30 38 91 0d | b9 c4 11 ab e9 a9 94 d4 16 5b f1 c4 91 68 3e fa | fb b4 36 73 13 7d c7 d0 75 c4 f9 ef fd 92 5b cc | aa e4 77 57 96 44 12 f0 38 b5 1d ad 33 4d 65 c3 | 93 63 ce 14 d7 d8 25 ef f8 0d ae dd 78 dc 8e b7 | 7e c2 3d a5 d5 d3 09 2b ad 9d bd a9 6f 55 df a1 | 6f b4 2e cf 9f fe 7e ae 25 58 a2 81 78 bb f7 29 | dd 53 e8 91 13 65 1e 1e 60 9c d0 15 9f bb 76 ed | ab 75 ce 2a 44 05 fa b1 a3 a7 39 d0 53 b7 7f 4f | e0 b7 8f a6 98 8c 07 ab a8 32 37 42 0c 8c 3d a7 | fc 6c 53 ac 60 2a 04 67 31 66 47 13 4f bc 34 8c | 30 51 26 7c 6a 36 76 70 15 29 7e 23 fc ac 0e 32 | 57 5c bb d9 b8 c0 27 61 5e fd 8f bc 73 83 16 ba | bf 42 32 51 56 3e 21 8b 6d 4a af 80 6d 52 1f d5 | 84 cd 2e ff dc c3 b8 a0 b2 26 7e 0c b7 e0 d0 d6 | 29 00 00 24 23 a8 6c e8 37 a1 47 09 f8 10 83 5c | 3f e5 80 de e6 d0 ee 9e 1f f2 6d 6a 1a c1 8c be | 9a 4a a5 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 14 ac ca 29 d0 75 c4 40 2c aa 37 | f4 15 d0 3b ed 2d a9 e1 00 00 00 1c 00 00 40 05 | 85 e0 a4 b5 9f 75 13 0f 6d a9 52 94 7d fa 0b 2d | 65 f2 06 03 | libevent_free: release ptr-libevent@0x7fb3480180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d590 | #10 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b e4 01 c3 ed 3e ed 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #10 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #10 | rejected packet: | 6b e4 01 c3 ed 3e ed 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #10: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000d120 | handling event EVENT_RETRANSMIT for parent state #194 | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #194 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #194 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49617.45812; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.006043 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d590 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #194 | libevent_malloc: new ptr-libevent@0x7fb3480180b0 size 128 "road-eastnet-nonat-194" #194: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #194) | fb a9 4a 68 01 02 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad aa 66 9d b6 64 e0 b9 0d 37 a2 d5 08 fd 46 b0 | f7 b3 8b 64 d2 0b f9 59 d3 20 8f d2 23 52 ab 2e | d6 99 18 d2 2f 54 8c e7 99 6c 8c 9d cd ff 9d 5a | 44 41 3e 80 ea ff 21 1e 5c 82 8a bc ec 41 36 14 | dd 8d af 05 d5 6f c4 3b eb c0 61 1c 5d 0d 70 dd | 40 c9 d4 1f 8a d2 d8 76 8a b9 bd f7 f3 8d f9 d9 | da 19 38 58 8d de a2 45 b1 7d bb f4 44 36 75 08 | 1e 19 e1 7e 40 21 fc 21 30 c5 e3 bd 20 8d d8 be | bf bc a6 60 a1 d6 d8 51 07 69 fd 62 da 68 85 ce | 37 74 1e f7 ae d2 77 4a f2 bc 1e 10 5e ed ca 3e | bf 36 bc 15 0b 03 92 f4 43 13 b4 d6 80 6a 65 a5 | da 3f fd 89 e4 f3 95 6e ad 5c 51 06 e7 4d 88 1f | 8e b3 8c 1c 17 69 df 75 37 d0 1f f8 06 a4 4e 15 | d4 9e 45 dc a2 0b 41 4c 07 55 90 db 32 9b e2 82 | 2b f7 f7 40 85 e7 33 60 11 d2 9c 0f 8b 18 ca 0d | 1e 7e c6 7b e1 da d7 c5 9b 44 c8 e8 12 48 03 39 | 29 00 00 24 a9 61 02 67 eb 1a 8f ba e2 2e bf 6e | fa 3f 6f bb 4e c3 80 0d df 43 7e 7d a3 f5 81 cc | f3 7a bb 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 5d 39 f5 08 60 5b 2c d2 7c 9c f1 | a9 84 d1 dc ab 40 bc 42 00 00 00 1c 00 00 40 05 | dc 98 c1 28 2a 8c a1 5f e1 55 35 3c e4 55 00 85 | a7 4e ac da | libevent_free: release ptr-libevent@0x7fb360012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000d120 | #194 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb a9 4a 68 01 02 ca 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #194 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #194 | rejected packet: | fb a9 4a 68 01 02 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #194: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-214" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-214' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #214 at 0x557d46af83c0 | State DB: adding IKEv2 state #214 in UNDEFINED | pstats #214 ikev2.ike started | Message ID: init #214: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #214: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #214; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-214" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-214" IKE SA #214 "road-eastnet-nonat-214" "road-eastnet-nonat-214" #214: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-214 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-214": constructed local IKE proposals for road-eastnet-nonat-214 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 214 for state #214 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36000d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #214 | libevent_malloc: new ptr-libevent@0x7fb360012840 size 128 | #214 spent 0.189 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-214" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.289 milliseconds in whack | crypto helper 17 resuming | crypto helper 17 starting work-order 214 for state #214 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 214 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 214 time elapsed 0.00088 seconds | (#214) spent 0.892 milliseconds in crypto helper computing work-order 214: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 214 for state #214 to event queue | scheduling resume sending helper answer for #214 | libevent_malloc: new ptr-libevent@0x7fb3500407f0 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #214 | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 214 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #214 | **emit ISAKMP Message: | initiator cookie: | 4f 29 16 ab 3e 1b 1d 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-214 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f9 9a ad a4 54 39 e9 04 15 a2 a4 f0 c8 dc 49 94 | ikev2 g^x 47 5a 04 64 04 57 79 8f 63 87 e7 ae b7 39 62 ec | ikev2 g^x 47 13 85 3d 4e a0 14 32 15 25 a6 7d a4 f2 aa aa | ikev2 g^x 67 17 a5 b2 08 db fc bd dc 96 aa 21 e7 a5 f2 3b | ikev2 g^x 34 82 35 14 fb 4a be 16 a9 a7 92 42 29 b2 17 4d | ikev2 g^x 52 27 87 ea b1 3a fa 6c 11 62 48 2f 81 f0 58 f6 | ikev2 g^x 6c 8b 54 c6 3c a7 1a eb fd 0e 51 2e 43 a1 67 7f | ikev2 g^x 52 b6 51 7f f1 6a 5e 3d a1 55 84 4d aa 64 fa dd | ikev2 g^x d4 68 19 0a 1c f1 aa ed d1 aa 12 27 11 44 c1 42 | ikev2 g^x 4c 3e ce c4 42 e7 8a 9f 52 d8 86 65 33 7c 9a 6a | ikev2 g^x ee 61 16 79 e0 6f bf 94 55 b9 32 ad 6e 68 90 17 | ikev2 g^x bb 0e f5 75 b4 7f bb 34 59 92 4e 2a eb db ac 26 | ikev2 g^x 62 0d 79 8b 29 38 a9 d3 9a dc 81 9e 5b 01 b1 77 | ikev2 g^x b2 97 be 93 40 8c 22 a8 ed c3 3b 34 e3 61 26 ff | ikev2 g^x 40 f0 34 c1 02 20 28 94 a9 ac e5 14 88 22 c0 0f | ikev2 g^x 0a ad af f1 ac 83 5f 84 02 43 33 bf d4 08 dc 06 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce dc 16 0d 02 e8 ab 94 84 4c 26 85 d4 77 69 31 1b | IKEv2 nonce 43 d5 c1 b1 2c a0 69 25 59 ad 36 b7 5c 40 16 d4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4f 29 16 ab 3e 1b 1d 7d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d6 | natd_hash: port= 01 f4 | natd_hash: hash= c5 ae d6 cb 98 74 13 91 af 99 ac 97 02 1b 9a 5a | natd_hash: hash= 71 bb 20 28 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c5 ae d6 cb 98 74 13 91 af 99 ac 97 02 1b 9a 5a | Notify data 71 bb 20 28 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4f 29 16 ab 3e 1b 1d 7d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 20 56 0b 1b ec fa 37 e0 47 28 94 e0 2b 28 be ff | natd_hash: hash= 21 7d 56 5a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 20 56 0b 1b ec fa 37 e0 47 28 94 e0 2b 28 be ff | Notify data 21 7d 56 5a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #214 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #214: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #214 to 4294967295 after switching state | Message ID: IKE #214 skipping update_recv as MD is fake | Message ID: sent #214 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-214" #214: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.214:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #214) | 4f 29 16 ab 3e 1b 1d 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 9a ad a4 54 39 e9 04 15 a2 a4 f0 c8 dc 49 94 | 47 5a 04 64 04 57 79 8f 63 87 e7 ae b7 39 62 ec | 47 13 85 3d 4e a0 14 32 15 25 a6 7d a4 f2 aa aa | 67 17 a5 b2 08 db fc bd dc 96 aa 21 e7 a5 f2 3b | 34 82 35 14 fb 4a be 16 a9 a7 92 42 29 b2 17 4d | 52 27 87 ea b1 3a fa 6c 11 62 48 2f 81 f0 58 f6 | 6c 8b 54 c6 3c a7 1a eb fd 0e 51 2e 43 a1 67 7f | 52 b6 51 7f f1 6a 5e 3d a1 55 84 4d aa 64 fa dd | d4 68 19 0a 1c f1 aa ed d1 aa 12 27 11 44 c1 42 | 4c 3e ce c4 42 e7 8a 9f 52 d8 86 65 33 7c 9a 6a | ee 61 16 79 e0 6f bf 94 55 b9 32 ad 6e 68 90 17 | bb 0e f5 75 b4 7f bb 34 59 92 4e 2a eb db ac 26 | 62 0d 79 8b 29 38 a9 d3 9a dc 81 9e 5b 01 b1 77 | b2 97 be 93 40 8c 22 a8 ed c3 3b 34 e3 61 26 ff | 40 f0 34 c1 02 20 28 94 a9 ac e5 14 88 22 c0 0f | 0a ad af f1 ac 83 5f 84 02 43 33 bf d4 08 dc 06 | 29 00 00 24 dc 16 0d 02 e8 ab 94 84 4c 26 85 d4 | 77 69 31 1b 43 d5 c1 b1 2c a0 69 25 59 ad 36 b7 | 5c 40 16 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 ae d6 cb 98 74 13 91 af 99 ac 97 | 02 1b 9a 5a 71 bb 20 28 00 00 00 1c 00 00 40 05 | 20 56 0b 1b ec fa 37 e0 47 28 94 e0 2b 28 be ff | 21 7d 56 5a | state #214 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb360012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36000d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #214 | libevent_malloc: new ptr-libevent@0x7fb360012840 size 128 | #214 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49617.469494 | resume sending helper answer for #214 suppresed complete_v2_state_transition() and stole MD | #214 spent 0.533 milliseconds in resume sending helper answer | stop processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3500407f0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 29 16 ab 3e 1b 1d 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #214 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #214 | rejected packet: | 4f 29 16 ab 3e 1b 1d 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #214: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0676 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b5d0 | handling event EVENT_RETRANSMIT for parent state #209 | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #209 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #209 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49617.477715; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500966 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae8980 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #209 | libevent_malloc: new ptr-libevent@0x7fb3500407f0 size 128 "road-eastnet-nonat-209" #209: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #209) | 94 c0 53 32 b7 6b d2 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa aa 8f b6 87 c3 5d 98 e8 47 9c 34 3c ba fd c2 | 26 06 ee 61 85 3c e9 e8 7d e0 7a e3 30 dc 26 ae | 92 30 41 01 44 74 f7 33 20 3e 9d c4 91 ce 67 c8 | 16 8f 2d 63 7e 65 88 2d 42 e0 e7 51 27 b9 54 c3 | cb 64 94 8c 44 0b bb aa 89 37 4f 4c 19 3a 97 c2 | a7 78 bb a9 b6 bc c5 9a 0d 18 1b 6f 6c 81 28 5f | 96 22 7f 4e e9 03 4f f8 d6 4d 77 d5 fe b9 d2 6d | cd 7d 32 95 3a ae 28 68 07 70 28 76 ea 67 8a a4 | 02 0f 70 b8 39 d5 ef 06 00 8a 9d f6 62 11 fb 55 | 5d 2a 4e 92 67 d8 83 81 5c e2 b4 e7 58 f2 f1 29 | e2 e9 12 6d a8 99 db 90 fa c3 c7 67 22 60 c4 0d | b5 aa 8e 50 88 98 a0 7e 46 1d 18 c2 ea bc 90 f9 | 2c 89 53 10 11 da ca 7e 79 27 58 0a 97 be f4 b6 | df 47 81 cd fc cb 51 b6 90 69 20 0a b1 64 c6 52 | f3 67 4f b9 89 27 0d 82 44 e6 02 ff 6a 0a a5 77 | bc 54 13 6b 28 ab 23 fb 03 b0 ab d8 e9 7c 16 89 | 29 00 00 24 32 f5 dd 6d be 9b 09 7c 2d 16 66 7c | 9d 31 58 f8 20 f4 30 10 2d 04 04 00 c5 24 46 19 | 07 98 5b 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 be 30 60 49 91 51 94 d8 39 4f be | 6e 81 91 5e 2f 8c 88 7e 00 00 00 1c 00 00 40 05 | 2d 19 47 e1 25 d9 8a e8 d3 7e a2 ad 7d 2a 38 10 | 8b 55 bc a7 | libevent_free: release ptr-libevent@0x7fb384015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b5d0 | #209 spent 0.183 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 c0 53 32 b7 6b d2 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #209 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #209 | rejected packet: | 94 c0 53 32 b7 6b d2 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #209: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0454 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #169 | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #169 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #169 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49617.480074; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002353 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b5d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #169 | libevent_malloc: new ptr-libevent@0x7fb384015370 size 128 "road-eastnet-nonat-169" #169: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #169) | 36 7b 71 a0 e2 7f 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 4f 45 f4 ab d7 36 ef 76 4d 44 de 6d 62 2d ae | 4e 5c 7f da 0a b2 48 be 78 ae 6d be 58 68 4b a4 | 8f 2f d2 29 68 46 25 1b 12 f9 92 02 9c d7 87 f1 | eb d6 eb 82 f8 34 c7 6d 1b 97 bd 5a 16 3f 5c d9 | 45 ff a3 65 05 29 38 16 83 1c 73 b0 0d 2c 32 2c | fa dc 03 8b a8 c2 e4 3a 68 19 c8 6f 81 6b a9 c7 | f3 1e d3 85 90 6b 23 38 49 5d e8 b8 1a 99 c6 3a | 6a a2 1b 8c c9 a7 dc be 9d 40 85 d1 eb b3 30 ea | 56 c0 aa c1 0c 1e 30 02 2d 3d a6 f2 04 1d 14 69 | 6d b1 c7 5c 5a 62 14 b7 a7 b0 4d b4 4a ea d7 8e | 92 28 ac 35 b4 c0 43 9c a2 b3 5b b7 49 ed fe 09 | 58 d4 4b a6 dd 4b ac 69 dc 3a 32 2b 1e e0 8a 39 | ae 70 61 ea 71 bb e0 10 48 b3 9a 5d a8 33 73 7a | e9 75 bd 48 dd 69 c9 c8 be a6 8c 92 7f 96 ad 37 | 04 3d 47 69 86 1c fb 25 12 87 50 73 a4 63 1a 75 | dc 73 f6 d1 8e ed 8a 90 43 3f ec 36 e2 fd c3 e9 | 29 00 00 24 c6 0f 04 68 5e 20 5e 64 7b fe 77 4f | 0f cb 3e 64 8c ad ed 27 06 6f 13 47 5c 0b 0d 8e | 1c d7 84 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fa 7c 50 0f e9 f1 70 67 4d 08 f0 45 | 40 25 4d e8 01 bd 9b 4f 00 00 00 1c 00 00 40 05 | cc 1b 7d 85 9d ec 77 c3 d4 a3 45 1a a2 36 2f 10 | c5 f4 8f 3e | libevent_free: release ptr-libevent@0x7fb34002a900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | #169 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 7b 71 a0 e2 7f 3d 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #169 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #169 | rejected packet: | 36 7b 71 a0 e2 7f 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #169: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a97080 | handling event EVENT_RETRANSMIT for parent state #110 | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #110 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #110 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49617.515425; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005651 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #110 | libevent_malloc: new ptr-libevent@0x7fb34002a900 size 128 "road-eastnet-nonat-110" #110: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #110) | 3a df d4 0d 3f 72 b9 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 51 e2 9f 86 58 b1 8c 95 ac 68 08 4c 4a f6 70 | ad a1 89 82 51 9f 97 f7 49 8c 33 6b 14 6a e8 d8 | 5d 56 92 c8 3c 2c 40 17 32 2d 8f e8 79 30 ee 40 | f9 ba 9e a6 39 a8 9f 6a 60 30 36 fa 91 73 4e bf | e6 d5 bf ce 9d 89 72 4d e1 c3 4f 68 a3 0e 2d 22 | 55 9f 70 0b d2 5a 8e 49 bb 26 55 db 7b 06 39 59 | 26 09 73 11 d4 24 0c 12 fd 4f 4c 65 6c 3c af 90 | 8b 17 1f a8 52 96 38 96 91 03 13 81 89 15 d8 cf | 89 39 0b 98 8d cb b9 22 57 8d d7 cd 73 bd 42 b5 | c1 8a b1 55 88 ee 90 bf 86 98 c5 68 56 01 34 02 | ea ea cd ee 0d 3a 71 7c d0 06 82 a7 ca 34 05 ec | e1 16 4c 22 f3 b3 ca 01 1c d1 2d c9 10 65 0e d7 | 83 4d bc 53 a1 a2 68 8a 44 da c7 16 6f 1e 28 70 | e8 f3 08 87 27 18 70 75 bc 4e bd 4f 1d 1a 9f 84 | ef 78 e6 04 c6 13 ce e5 f8 3c cb 1e ba 12 8a 0a | 59 36 fd 3c 70 1f 1b ce d5 b3 7d ea 00 09 cd 9d | 29 00 00 24 58 d9 16 9f 6f 84 74 3f e6 2f bd ae | 97 8a 68 2c 39 11 78 2c 3d 3c 5e 7b f6 a4 c9 df | f7 87 68 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f6 22 5f bf 4c e5 cb 6e 52 c3 e8 | bb 73 1b e3 52 cd b5 da 00 00 00 1c 00 00 40 05 | 55 f2 83 9d d0 ff 8f 70 ef 45 0c 6f 49 6d a9 68 | 5e 51 a7 34 | libevent_free: release ptr-libevent@0x7fb35000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a97080 | #110 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a df d4 0d 3f 72 b9 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #110 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #110 | rejected packet: | 3a df d4 0d 3f 72 b9 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #110: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a43dd0 | handling event EVENT_RETRANSMIT for parent state #205 | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #205 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #205 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49617.53578; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001494 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a97080 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #205 | libevent_malloc: new ptr-libevent@0x7fb35000cf80 size 128 "road-eastnet-nonat-205" #205: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #205) | 96 a5 4d 09 36 59 36 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 af 72 1b a0 98 9e 50 b5 1c 2a f4 25 37 46 6d | 29 08 48 dc 3a 43 a8 47 58 90 05 63 32 ed 1e 67 | 1c d6 5d a6 5c c9 d2 88 4d 23 9d 29 85 6c bc 34 | b6 39 47 15 78 35 07 0e dc 99 e1 b1 20 70 65 8b | 00 6c f0 e9 44 5b 08 c2 17 e1 6b 72 9c af 6c 5b | a9 60 97 0c ec 66 17 57 bd 76 76 97 27 d0 77 4a | 2a 55 71 50 75 d7 68 7b d8 80 b2 7a 09 02 08 2b | 09 0a ee 89 61 3b 8a 2f 12 7c cc 05 74 ec 11 d1 | 9b a1 09 08 7c 39 7a ee 4d 88 62 16 e2 82 1b b3 | d9 8f 53 7a 4b 48 dd 7d 8c 47 a4 25 61 2b 5a 2a | 2f 93 a5 82 b2 4d a6 fe b3 ac 51 3e da 8f 23 63 | f4 2a 7e 1b 28 f1 63 98 1b 09 f8 46 7c 59 0e 77 | 0b 32 ae 4e 95 8f da e9 a4 30 df 08 42 58 09 74 | 83 d9 4e 39 cd 7e 3b e6 37 1b b5 f8 2d 02 a3 8b | db d0 44 1c b8 65 c5 60 b6 1d bd 0a 87 21 84 61 | fa 21 34 4e 05 0a 9f 1b ec 7d 07 6c c5 18 67 d9 | 29 00 00 24 6c 40 f7 85 3a 61 11 e1 6e 44 7b 14 | a7 18 59 d8 8f ce 04 ee 70 39 7f 15 26 c1 43 92 | dc 05 98 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 dd f4 0a 58 0e d8 12 1e dc 08 fa | c5 ab bd a9 a1 ef e0 c4 00 00 00 1c 00 00 40 05 | 38 8d 68 ba 0f a0 5d 58 b7 93 ab fe 9b f6 26 59 | 71 96 1a e7 | libevent_free: release ptr-libevent@0x7fb34c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a43dd0 | #205 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 a5 4d 09 36 59 36 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #205 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #205 | rejected packet: | 96 a5 4d 09 36 59 36 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #205: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0778 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #170 | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #170 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #170 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49617.547206; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005164 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a43dd0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #170 | libevent_malloc: new ptr-libevent@0x7fb34c01d920 size 128 "road-eastnet-nonat-170" #170: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #170) | 0e 3d 5a e4 33 67 ae f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 3a 08 5b b2 3f a4 8e df 9b c0 eb a8 ff 32 50 | b7 58 7d 7d 4a 10 8c 9a ad 53 11 df 0e 8d 39 fb | 8a c0 5f d6 8f ee 32 b4 c6 d6 4c 41 39 dc c8 7f | a6 9c 35 ef 09 08 ca f8 2d 7d 3c 76 aa 39 58 43 | 35 eb 36 d9 ef 09 c3 c6 d0 ab 11 b8 34 40 ff 55 | c8 35 93 0b bc c0 66 e0 d9 9f c1 89 c0 9b 98 09 | c8 0d 44 3a d6 3d e2 b0 52 69 78 44 4a 24 b0 ad | 80 aa 61 eb 53 d9 1a 0a 53 30 0a eb d5 8c f7 f3 | ca 01 74 12 22 ff f3 9d 01 97 d0 63 da 1b b6 a1 | 02 35 c9 78 38 c4 96 f6 23 08 55 58 52 01 18 8c | 46 ea 56 a8 65 c1 e7 43 3b b8 d3 07 66 36 b4 14 | 25 9e f5 4d 86 46 ab 55 94 68 c7 67 da 70 2b 06 | a8 71 55 97 18 18 f9 3a 98 e0 35 83 6a 8d aa b1 | bc e1 50 ed 72 ba 83 3d 44 b6 97 eb 32 ff 41 57 | 48 97 03 67 e5 b8 1f 12 59 d4 1e 23 84 44 9b 29 | 9a 72 cd 57 ba 76 df 2f d8 46 ae e3 a7 ac 2c 37 | 29 00 00 24 f5 be bd 85 ea bf a8 35 5e 2e fb 98 | 21 e3 d9 77 11 2b 7a 24 c1 b5 1e 2f 89 52 5c d3 | bf 7f 74 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a ca 79 b0 52 c7 26 24 58 ba d7 c8 | 58 6a 36 93 64 5a 0d 23 00 00 00 1c 00 00 40 05 | 2e 8d 3a 82 9a 56 9c b7 68 e2 e0 45 0d 65 b1 99 | f9 22 bb fc | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #170 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 3d 5a e4 33 67 ae f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #170 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #170 | rejected packet: | 0e 3d 5a e4 33 67 ae f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #170: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0712 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-215" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-215' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #215 at 0x557d46af9980 | State DB: adding IKEv2 state #215 in UNDEFINED | pstats #215 ikev2.ike started | Message ID: init #215: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #215: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #215; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-215" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-215" IKE SA #215 "road-eastnet-nonat-215" "road-eastnet-nonat-215" #215: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-215 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-215": constructed local IKE proposals for road-eastnet-nonat-215 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 215 for state #215 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb368005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #215 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 | #215 spent 0.163 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 resuming | crypto helper 18 starting work-order 215 for state #215 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 215 | RESET processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-215" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.273 milliseconds in whack | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 215 time elapsed 0.0009 seconds | (#215) spent 0.905 milliseconds in crypto helper computing work-order 215: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 215 for state #215 to event queue | scheduling resume sending helper answer for #215 | libevent_malloc: new ptr-libevent@0x7fb3540407f0 size 128 | crypto helper 18 waiting (nothing to do) | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #210 | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #210 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #210 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49617.552504; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500565 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aaf800 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #210 | libevent_malloc: new ptr-libevent@0x7fb34001f920 size 128 "road-eastnet-nonat-210" #210: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #210) | aa f0 6c 1e 8f b0 d8 5f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 2f d8 9e b6 32 84 b3 62 ee 33 24 ed 0e fd d4 | fb 0e fa b0 5a fb 4d c1 44 66 ed 6c d9 22 6b 05 | 5a 31 76 75 51 2d 58 63 68 30 79 28 a1 8c f7 58 | 78 1f ed 9b 41 29 7f de 5e 35 7e 32 cc 4f eb 97 | f3 d2 34 17 b1 d4 d0 fd f0 52 da 3a 73 a4 1f 58 | 68 7e 43 79 1c f9 07 46 32 fb 81 59 a1 8b 36 99 | 63 59 69 2b 65 b6 49 f0 2c 89 5f 6f 77 04 35 7e | de cb d9 d5 71 0b 78 b5 5b 65 ab a6 ce 91 19 fa | 51 58 77 c1 4e 94 ff 17 29 dc 29 f8 bd 1c c5 36 | 82 f3 20 0b 04 da 30 59 b0 d1 05 3e 3f aa ef 6a | 84 97 f2 ea a5 27 2e 15 1e f4 66 a5 d9 21 ce 67 | e8 bd 44 de 20 df 28 17 c9 3c 33 10 eb 28 78 7e | 45 57 17 c5 4c aa eb a9 d1 47 13 10 17 f0 99 19 | db 6b d3 97 fa 92 c7 c8 43 99 f3 77 fc f5 56 ad | 75 cc 5d 24 35 8b 29 95 64 a0 e4 4c e0 27 1c 2a | fb fd b3 6d 87 9d 4a e7 f3 e4 fa 49 6c 90 9e db | 29 00 00 24 b7 0e 02 eb 9f 32 9f 45 44 47 90 9f | 97 de 23 e8 e1 c4 97 88 69 d1 3d 46 ce 63 23 0a | 5b 61 d3 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 f2 e2 75 79 7b 92 3c e8 e4 c1 f3 | d5 ae c0 9c c7 8c de 57 00 00 00 1c 00 00 40 05 | a7 24 70 f0 1a 13 21 fc 21 f0 f5 1e 72 fd 1a 35 | c3 6c 26 99 | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | #210 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #215 | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 215 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #215 | **emit ISAKMP Message: | initiator cookie: | c5 c0 dd cc b6 af 51 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-215 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 42 5c 66 6c 45 6f a8 d2 4f 25 98 20 11 a6 a1 bb | ikev2 g^x 37 55 34 73 15 5d a4 49 35 cd f6 0a 9e e7 f3 5c | ikev2 g^x ad 42 56 ef b0 f4 fa f6 d5 ba 84 d6 dc e0 5f 55 | ikev2 g^x dc 55 56 f2 be 03 fe 4f 4a b4 66 3c 99 cb 71 e7 | ikev2 g^x b6 73 b2 44 ce 0d f7 96 90 78 2f 50 92 28 ba f9 | ikev2 g^x 22 e7 15 cf fa c8 47 f5 0c 38 c1 8a 24 5b 39 a8 | ikev2 g^x ac 47 31 ea aa c2 b1 57 78 79 5e 0b a7 a0 33 1b | ikev2 g^x 86 d9 45 31 c0 29 bb 67 d1 68 a7 f5 10 84 25 ff | ikev2 g^x 4c 83 f7 42 1d c4 e6 b7 53 b1 ed 6d 1b f7 86 9b | ikev2 g^x 3e cc 2d ee 22 b8 61 e0 e7 95 7c e8 c8 d8 b2 10 | ikev2 g^x 06 d9 50 52 8e 07 0b 4b 94 83 c7 4b 90 09 3a d9 | ikev2 g^x 8a 35 2d 83 36 bb 75 45 45 1c cf c0 11 7f 85 8d | ikev2 g^x ec e0 a4 ca 58 99 97 8b 10 af 58 2d b7 9b a7 f0 | ikev2 g^x a5 cb ea 38 04 fe 36 b9 b4 81 1d 8f 85 c7 76 a8 | ikev2 g^x d9 30 86 6d bd 32 3b 6b 02 28 ec 10 b1 28 43 17 | ikev2 g^x 56 d4 9e 0c 76 ce cc 71 e8 70 44 59 5e b3 3a a2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 21 81 d6 ee 95 75 07 f2 b0 ff 0f d3 a2 c0 2b d7 | IKEv2 nonce de b5 1b 67 08 ca 6e a7 a2 d0 6b ed 6d c9 d5 96 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c5 c0 dd cc b6 af 51 de | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d7 | natd_hash: port= 01 f4 | natd_hash: hash= 2c 19 de 62 93 d0 a4 3d 26 c7 25 16 8c 72 93 29 | natd_hash: hash= 4a 06 74 1d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2c 19 de 62 93 d0 a4 3d 26 c7 25 16 8c 72 93 29 | Notify data 4a 06 74 1d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c5 c0 dd cc b6 af 51 de | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 5e 68 d5 fe 16 1c 49 30 75 2d c6 7b 65 a2 b6 24 | natd_hash: hash= 10 76 bd 1f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5e 68 d5 fe 16 1c 49 30 75 2d c6 7b 65 a2 b6 24 | Notify data 10 76 bd 1f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #215 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #215: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #215 to 4294967295 after switching state | Message ID: IKE #215 skipping update_recv as MD is fake | Message ID: sent #215 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-215" #215: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.215:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #215) | c5 c0 dd cc b6 af 51 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 5c 66 6c 45 6f a8 d2 4f 25 98 20 11 a6 a1 bb | 37 55 34 73 15 5d a4 49 35 cd f6 0a 9e e7 f3 5c | ad 42 56 ef b0 f4 fa f6 d5 ba 84 d6 dc e0 5f 55 | dc 55 56 f2 be 03 fe 4f 4a b4 66 3c 99 cb 71 e7 | b6 73 b2 44 ce 0d f7 96 90 78 2f 50 92 28 ba f9 | 22 e7 15 cf fa c8 47 f5 0c 38 c1 8a 24 5b 39 a8 | ac 47 31 ea aa c2 b1 57 78 79 5e 0b a7 a0 33 1b | 86 d9 45 31 c0 29 bb 67 d1 68 a7 f5 10 84 25 ff | 4c 83 f7 42 1d c4 e6 b7 53 b1 ed 6d 1b f7 86 9b | 3e cc 2d ee 22 b8 61 e0 e7 95 7c e8 c8 d8 b2 10 | 06 d9 50 52 8e 07 0b 4b 94 83 c7 4b 90 09 3a d9 | 8a 35 2d 83 36 bb 75 45 45 1c cf c0 11 7f 85 8d | ec e0 a4 ca 58 99 97 8b 10 af 58 2d b7 9b a7 f0 | a5 cb ea 38 04 fe 36 b9 b4 81 1d 8f 85 c7 76 a8 | d9 30 86 6d bd 32 3b 6b 02 28 ec 10 b1 28 43 17 | 56 d4 9e 0c 76 ce cc 71 e8 70 44 59 5e b3 3a a2 | 29 00 00 24 21 81 d6 ee 95 75 07 f2 b0 ff 0f d3 | a2 c0 2b d7 de b5 1b 67 08 ca 6e a7 a2 d0 6b ed | 6d c9 d5 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c 19 de 62 93 d0 a4 3d 26 c7 25 16 | 8c 72 93 29 4a 06 74 1d 00 00 00 1c 00 00 40 05 | 5e 68 d5 fe 16 1c 49 30 75 2d c6 7b 65 a2 b6 24 | 10 76 bd 1f | state #215 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb368005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #215 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 | #215 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49617.553187 | resume sending helper answer for #215 suppresed complete_v2_state_transition() and stole MD | #215 spent 0.47 milliseconds in resume sending helper answer | stop processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3540407f0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | aa f0 6c 1e 8f b0 d8 5f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #210 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #210 | rejected packet: | aa f0 6c 1e 8f b0 d8 5f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #210: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0649 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 c0 dd cc b6 af 51 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #215 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #215 | rejected packet: | c5 c0 dd cc b6 af 51 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #215: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0569 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35800d120 | handling event EVENT_RETRANSMIT for parent state #11 | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #11 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #11 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49617.560459; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.01992 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #11 | libevent_malloc: new ptr-libevent@0x7fb3540407f0 size 128 "road-eastnet-nonat-11" #11: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #11) | c8 da f8 5c 6a b5 39 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 9a 4c 70 8e 88 d1 64 8d ca 55 b5 43 ac 3e 50 | 7f 03 c2 7c 99 61 59 48 6a 23 b9 2d d3 3a 08 ba | 31 66 90 b0 52 32 93 73 23 bd 35 f2 7d dc a9 8f | 88 4e 43 5d 55 55 8f 7b a2 ea ce 35 e9 07 bb 71 | 1f 5d f0 9c c9 20 a4 7c c9 a5 33 c5 b0 c5 fd 99 | f9 36 f9 d6 da 33 fa e1 2d e1 b8 55 01 35 5b d0 | b9 e1 af af a6 38 ef b1 36 65 8c 44 00 8a 8f f0 | cb 31 ec d5 89 23 22 d8 6f 57 3d 9d af 74 08 ea | 86 b5 7c 8c 76 9b 8d 04 5b 27 f9 7a 8d ed d8 36 | 77 1c 37 9a 9e c6 40 9c bb 1e 24 77 dc 4c b2 dc | 76 0c 2f 2d 23 9c f1 63 a5 64 8f c0 7e 6e 08 97 | 35 1b 8e 35 d5 a9 e6 fc d1 af 35 f0 b0 21 d4 42 | 5d 1b 4e c6 75 04 f0 3a f4 cc 11 09 3f ff 2d c6 | bf fa 44 99 e7 46 de 13 f5 47 98 02 47 dd 33 15 | 52 36 1a 46 d4 d8 ce dd 1a ad eb 4f 6b 1d 9e 82 | 8f b0 52 7f b0 b6 aa 8b 85 c1 d8 ed 73 6b 09 85 | 29 00 00 24 71 b3 70 95 41 f1 8a 3d 3f e8 5d 7c | 6b 52 d9 59 47 90 bd 2c 17 95 9e 28 b0 5d 83 17 | df a2 84 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 c8 ac c9 12 67 90 a0 d8 a9 94 84 | cc d4 e1 68 d0 49 e5 0f 00 00 00 1c 00 00 40 05 | a0 0d 8b f9 78 72 8b b9 69 a6 ab 0f 8f 46 28 db | d3 de 3a b5 | libevent_free: release ptr-libevent@0x7fb358012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800d120 | #11 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 da f8 5c 6a b5 39 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #11 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #11 | rejected packet: | c8 da f8 5c 6a b5 39 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #11: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cbd0 | handling event EVENT_RETRANSMIT for parent state #195 | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #195 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #195 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49617.563818; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003113 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #195 | libevent_malloc: new ptr-libevent@0x7fb358012840 size 128 "road-eastnet-nonat-195" #195: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #195) | 37 e6 90 db 14 bc bf 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 53 c9 77 b4 f3 d5 4d 42 00 37 51 2c 1c 68 3c | f1 54 0f 7a 55 d8 cb dc 59 bb 2f b5 96 8c 4e d4 | 85 27 5a ea f2 a7 4d 9e 5a 6b ee c6 28 a0 d2 57 | 71 7a 7b 0b 80 39 ac 27 cd 87 0d ef e4 ef af 3a | d6 b3 f6 12 c5 5f 2f d9 cd fb 17 d4 43 5e 16 c4 | 87 67 d1 70 07 84 e5 8e 71 91 de 30 59 cc e6 ee | 34 fb c0 51 e2 87 5b 7e 3f 08 db 50 ff 54 7a b1 | bd cb 77 92 50 41 31 65 47 73 69 2a fd d6 77 f3 | b0 89 f6 8e e2 6a 07 fc af 84 ca d3 f2 87 73 27 | c4 cf 2d 21 63 f5 8f 71 28 70 95 02 a0 27 ac 78 | a4 bb 1e 75 dc be 0d b4 ad 92 30 f8 7c 7f 5d 71 | a5 c9 9d 8b 71 f5 b5 68 db 9c 63 56 82 3f 35 f1 | f2 81 65 6a 20 3e b0 68 92 e4 10 6f a0 15 ab a8 | 72 4d 4d 54 b6 ef 0b 2d 62 75 65 6d be 42 39 3d | c4 80 ed ba e2 23 03 5c 4c 11 92 92 a4 9b 70 7c | cd 9d 5e 6a ce f4 42 ce b7 88 b0 01 79 41 f3 ce | 29 00 00 24 9e 21 2f 19 56 de ef 57 88 5d 72 9d | d0 e9 ed cf f1 53 49 64 11 8c ea d8 bc d7 7f b1 | 97 11 98 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be a1 e0 42 82 c4 3c a5 9f 98 67 8d | 2c 4b 8d ec 3b 56 95 d6 00 00 00 1c 00 00 40 05 | 9b 76 ec e0 3b 32 32 e4 22 87 e5 16 97 1d 20 83 | b5 a4 81 66 | libevent_free: release ptr-libevent@0x7fb3400250b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cbd0 | #195 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 e6 90 db 14 bc bf 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #195 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #195 | rejected packet: | 37 e6 90 db 14 bc bf 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #195: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a84000 | handling event EVENT_RETRANSMIT for parent state #111 | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #111 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #111 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49617.584161; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004757 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cbd0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #111 | libevent_malloc: new ptr-libevent@0x7fb3400250b0 size 128 "road-eastnet-nonat-111" #111: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #111) | db b9 51 1a 0a cf 53 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 96 48 dc 9a 43 6a d5 ae 03 52 b4 84 8e 3e 89 | 00 f6 64 fe 26 5b b6 db 11 e1 9c 06 8a 4f 1d 0d | cd 6f a7 c8 64 23 7a a7 23 6f 45 51 c6 b1 a2 cd | 04 59 b4 88 b4 33 b7 f5 29 c7 d8 52 6d 1c cb a8 | 42 75 af 22 25 ca 35 12 a4 f6 ac 0c 2b 80 3f 01 | bd fa ce f1 3e 58 78 41 9a d7 72 cc 7c 4c b5 a2 | 56 ce 00 40 9d 2a 87 6a d3 b8 b7 fb 45 19 d9 27 | 33 38 86 30 4d 76 55 5a 60 ea 7e 6f 94 b2 e8 37 | d0 79 a6 3c 48 bb 9f d4 de 11 46 70 8b ed 34 0e | 15 56 a1 c3 7c 1c f5 7b 9a 67 eb 7c ed e1 17 20 | 66 f5 ab 00 0b 09 22 9e 86 9e ea d1 22 bb 69 09 | 19 11 1b ae 5d 6f a7 6f aa f4 bc 2d bf a0 df 13 | 3d bb c4 b2 54 23 e0 47 22 8c a9 37 14 2d 77 13 | 46 7b e2 07 7c 12 26 7e 27 76 b7 f9 5b 81 4d b4 | 81 97 8e fa 60 cb 4d fd c3 c9 15 c0 dd 03 c9 a5 | 4e ed a7 b5 aa a5 47 31 bc c5 72 e4 a7 3b 8a 6d | 29 00 00 24 dd ff c8 1b e8 28 de a6 83 fb aa 57 | 7e 6e 8e c5 12 ea 53 ce c6 ab e5 e4 50 89 14 5a | d7 45 05 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 7b fa 07 36 ff 6e 35 97 9c d7 f0 | 58 a3 9d ce 15 df 78 68 00 00 00 1c 00 00 40 05 | 32 ea 3f b0 b0 6d 1e bd 58 89 67 45 00 2c 5a 38 | ea f9 ac 8b | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a84000 | #111 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db b9 51 1a 0a cf 53 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #111 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #111 | rejected packet: | db b9 51 1a 0a cf 53 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #111: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0727 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab7a80 | handling event EVENT_RETRANSMIT for parent state #171 | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #171 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #171 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49617.615504; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003426 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #171 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 "road-eastnet-nonat-171" #171: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #171) | 60 ea a0 b8 11 41 67 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 a6 a0 3d a3 d3 f7 3a 92 38 69 11 fc c0 0a e6 | ae 99 13 7e 46 80 4c 8f eb cb 1b a4 6d 5c fc 08 | ec 45 f4 48 c3 e3 73 a8 1a d3 f7 7f 3a 28 95 0f | b3 2e 82 89 be a5 d3 a6 ab 70 83 ad 3e e2 73 a1 | 73 7c b9 be d5 96 dd de 07 cc fe da 6e 65 6b 76 | 25 27 16 21 7c ef 70 24 a4 77 29 aa 15 d7 7b a8 | 16 72 3e d5 01 58 3c 97 7b 78 28 15 2b 7d 70 03 | 64 96 9b 75 19 62 f5 2d d6 23 a9 0d ca a5 9a 70 | a6 bd cc 03 9b 58 60 ee fc 9f 9e d6 00 fa 23 02 | 63 d3 b6 b9 2c b8 b0 66 04 8e 85 03 2d 8a 3b 14 | f1 66 74 61 f6 ab 2b 8f f8 31 4b 0b da 07 ed 98 | a3 08 1a 85 f1 f2 be 38 18 37 9b 13 eb 17 a9 c3 | c0 a5 db c8 dd 9c 88 27 54 50 ba 9a 47 c0 2c 00 | d1 c4 c3 04 be b5 8f d9 f7 25 9c ae 45 27 ee 47 | a2 c2 11 cc 79 aa fd 06 ae ea 3a 65 e0 36 c3 05 | dd d3 e2 dd c1 bd 1f da b7 d1 ff 87 93 0f c5 00 | 29 00 00 24 f4 77 f4 2a e1 ad 87 d1 e0 b8 f3 03 | 93 45 a7 36 54 7e 24 81 6c 5d 13 c9 3a 4c ab c2 | 28 19 06 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 9a 54 5d 74 7c 3e 57 ce 44 f1 6a | b5 dc 40 d6 fc 98 8f 10 00 00 00 1c 00 00 40 05 | ab ff fc 00 2d 34 de 32 ad 3a 53 9d f5 35 ab 6e | 4f ce 82 8b | libevent_free: release ptr-libevent@0x7fb34c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab7a80 | #171 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 60 ea a0 b8 11 41 67 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #171 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #171 | rejected packet: | 60 ea a0 b8 11 41 67 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #171: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-216" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-216' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #216 at 0x557d46afaf40 | State DB: adding IKEv2 state #216 in UNDEFINED | pstats #216 ikev2.ike started | Message ID: init #216: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #216: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #216; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-216" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-216" IKE SA #216 "road-eastnet-nonat-216" "road-eastnet-nonat-216" #216: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-216 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-216": constructed local IKE proposals for road-eastnet-nonat-216 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 216 for state #216 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab7a80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #216 | libevent_malloc: new ptr-libevent@0x7fb34c0180b0 size 128 | #216 spent 0.162 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-216" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.256 milliseconds in whack | crypto helper 7 resuming | crypto helper 7 starting work-order 216 for state #216 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 216 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 216 time elapsed 0.00092 seconds | (#216) spent 0.927 milliseconds in crypto helper computing work-order 216: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 216 for state #216 to event queue | scheduling resume sending helper answer for #216 | libevent_malloc: new ptr-libevent@0x7fb3480407f0 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #216 | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 216 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #216 | **emit ISAKMP Message: | initiator cookie: | e7 ef a7 cc e6 d3 f6 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-216 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 78 f0 d1 10 02 25 ff 09 54 9a 27 0a d6 e1 75 e9 | ikev2 g^x 4b 25 09 80 13 1a bd 53 71 22 e7 a5 75 81 d1 8a | ikev2 g^x 25 47 40 c6 b3 5d 03 6d 9e 83 d1 92 a9 46 5d 4b | ikev2 g^x 0d 28 c0 ae 0f 26 63 48 22 7d dc 47 5b d5 77 07 | ikev2 g^x 29 79 06 04 6b 6b 34 8f 3e bd d3 ec 63 f9 78 20 | ikev2 g^x 47 7a 08 c2 44 b5 60 c5 73 9a 3e 6a 29 e5 d6 96 | ikev2 g^x 62 d8 90 b5 3b c6 8d 28 1b e2 87 89 6b 14 69 c3 | ikev2 g^x 86 f7 90 a6 77 5f 07 46 5b 86 a4 37 e5 80 d5 e7 | ikev2 g^x e9 b6 1c 3b fa 48 83 e6 86 71 bb 22 3d c4 ff 70 | ikev2 g^x 08 57 53 75 69 80 73 34 3e 38 54 52 61 ad 52 b2 | ikev2 g^x 0c fc ac 12 69 16 4e 5c 14 e0 22 a5 7c 1b 1c 49 | ikev2 g^x 5d 41 d4 29 4c a2 8d 47 62 eb 64 7a 68 a3 77 fb | ikev2 g^x 8e a3 71 52 dc 60 0e ae 77 65 2b 4f c0 c2 80 7f | ikev2 g^x 93 d4 83 22 60 eb f0 ba 08 6e ef a3 c7 ae 6d c8 | ikev2 g^x ec 04 d3 0d a9 20 db 31 6f de c9 65 e4 0b a9 11 | ikev2 g^x a7 ab 82 ef 2d c1 74 f2 d3 be 19 9c 04 b0 c9 04 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 95 80 09 e7 7a 52 78 28 1a 48 0b 4c 98 2f 28 0b | IKEv2 nonce b9 93 53 be d8 60 a3 a7 18 da 10 17 4f 70 e3 02 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e7 ef a7 cc e6 d3 f6 c6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d8 | natd_hash: port= 01 f4 | natd_hash: hash= 70 7b e5 1c 98 48 0c 58 81 2b 7b fc 78 24 fa 6c | natd_hash: hash= 15 2c ab c0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 70 7b e5 1c 98 48 0c 58 81 2b 7b fc 78 24 fa 6c | Notify data 15 2c ab c0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e7 ef a7 cc e6 d3 f6 c6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 11 88 73 d8 fc 53 52 81 2d 03 8d 95 6f 83 2f ef | natd_hash: hash= fe a8 7c ee | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 11 88 73 d8 fc 53 52 81 2d 03 8d 95 6f 83 2f ef | Notify data fe a8 7c ee | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #216 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #216: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #216 to 4294967295 after switching state | Message ID: IKE #216 skipping update_recv as MD is fake | Message ID: sent #216 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-216" #216: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.216:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #216) | e7 ef a7 cc e6 d3 f6 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 f0 d1 10 02 25 ff 09 54 9a 27 0a d6 e1 75 e9 | 4b 25 09 80 13 1a bd 53 71 22 e7 a5 75 81 d1 8a | 25 47 40 c6 b3 5d 03 6d 9e 83 d1 92 a9 46 5d 4b | 0d 28 c0 ae 0f 26 63 48 22 7d dc 47 5b d5 77 07 | 29 79 06 04 6b 6b 34 8f 3e bd d3 ec 63 f9 78 20 | 47 7a 08 c2 44 b5 60 c5 73 9a 3e 6a 29 e5 d6 96 | 62 d8 90 b5 3b c6 8d 28 1b e2 87 89 6b 14 69 c3 | 86 f7 90 a6 77 5f 07 46 5b 86 a4 37 e5 80 d5 e7 | e9 b6 1c 3b fa 48 83 e6 86 71 bb 22 3d c4 ff 70 | 08 57 53 75 69 80 73 34 3e 38 54 52 61 ad 52 b2 | 0c fc ac 12 69 16 4e 5c 14 e0 22 a5 7c 1b 1c 49 | 5d 41 d4 29 4c a2 8d 47 62 eb 64 7a 68 a3 77 fb | 8e a3 71 52 dc 60 0e ae 77 65 2b 4f c0 c2 80 7f | 93 d4 83 22 60 eb f0 ba 08 6e ef a3 c7 ae 6d c8 | ec 04 d3 0d a9 20 db 31 6f de c9 65 e4 0b a9 11 | a7 ab 82 ef 2d c1 74 f2 d3 be 19 9c 04 b0 c9 04 | 29 00 00 24 95 80 09 e7 7a 52 78 28 1a 48 0b 4c | 98 2f 28 0b b9 93 53 be d8 60 a3 a7 18 da 10 17 | 4f 70 e3 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 7b e5 1c 98 48 0c 58 81 2b 7b fc | 78 24 fa 6c 15 2c ab c0 00 00 00 1c 00 00 40 05 | 11 88 73 d8 fc 53 52 81 2d 03 8d 95 6f 83 2f ef | fe a8 7c ee | state #216 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c0180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab7a80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab7a80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #216 | libevent_malloc: new ptr-libevent@0x7fb34c0180b0 size 128 | #216 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49617.641878 | resume sending helper answer for #216 suppresed complete_v2_state_transition() and stole MD | #216 spent 0.485 milliseconds in resume sending helper answer | stop processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3480407f0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 ef a7 cc e6 d3 f6 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #216 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #216 | rejected packet: | e7 ef a7 cc e6 d3 f6 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #216: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0728 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c780 | handling event EVENT_RETRANSMIT for parent state #196 | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #196 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #196 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49617.643259; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.006221 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aeb500 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #196 | libevent_malloc: new ptr-libevent@0x7fb3480407f0 size 128 "road-eastnet-nonat-196" #196: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #196) | 56 d5 c7 24 09 fd 90 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 8f 70 c3 ed 41 cd d6 d2 1b f8 2a 49 7b d2 65 | 1d 48 5c 44 f7 09 ac 3e 9c 08 81 f6 b3 65 8e 9b | 4e f9 50 8c c8 e7 7b 20 7c 22 4e ca 64 9d 3b 78 | 6f 58 b3 9e 1c 75 62 70 7c 61 ef 34 cb 86 a6 1c | 58 51 2c 23 30 92 4a 45 b4 b8 ae 94 76 05 b8 97 | 44 53 83 e4 01 1b 12 69 e8 13 a8 21 92 4d 3c f0 | 3d 68 d7 2a 32 bb e5 1c b4 56 88 6b 46 1e 40 2b | 43 ea 27 d3 55 2f cf 9a 31 8f 09 d3 05 58 fd 61 | 42 c4 db 9a 42 0a 57 3b 19 4b c6 5f d6 ea 27 6a | 7f bf 49 6f e7 37 63 cd b0 56 7c d1 00 23 b6 75 | b5 9d 85 99 73 08 5b 3f 63 22 53 47 75 51 36 9e | 7d c3 2d 34 ef d2 c8 dc ed 30 18 e1 fc d9 f1 f0 | 6e d9 74 09 8b e8 94 06 ae aa 96 8e cd d8 85 a8 | 1d 1c c6 45 d2 df a8 88 f7 4f 9f 49 92 80 ca a3 | 24 f7 b2 76 f6 e9 c7 34 75 8f 12 25 2f 88 bf 00 | af 80 e2 a0 d5 42 a1 0f 8a 93 9d 2c 68 e7 dc 08 | 29 00 00 24 ed 57 45 ce d5 85 17 38 4f bc 48 45 | b8 48 4b 6f c9 94 96 34 41 c5 a0 9e ee f3 85 65 | 17 35 60 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 33 d1 79 b1 42 18 cd cb 66 ed 21 | 50 1a 62 22 98 16 96 33 00 00 00 1c 00 00 40 05 | 37 d9 a8 f6 16 ad 1f 94 88 50 6d 18 f9 5d 91 a6 | 7a d6 46 08 | libevent_free: release ptr-libevent@0x7fb3480300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c780 | #196 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 d5 c7 24 09 fd 90 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #196 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #196 | rejected packet: | 56 d5 c7 24 09 fd 90 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #196: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a60690 | handling event EVENT_RETRANSMIT for parent state #112 | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #112 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #112 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49617.648203; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.008397 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c780 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #112 | libevent_malloc: new ptr-libevent@0x7fb3480300e0 size 128 "road-eastnet-nonat-112" #112: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #112) | 47 d5 03 db 13 27 2f b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 0e 6c 25 08 df e6 da 49 14 54 03 50 04 cf 48 | 95 75 ae 2d bc 03 6f 48 b8 d7 01 38 b0 30 90 fc | ff e3 c7 81 96 6b 61 34 0c 60 d4 12 f5 e2 2d fc | 51 c2 f0 8d 66 50 fb 99 8e e7 b2 7a 6c 96 47 68 | b2 95 cc 13 0e 51 31 7d 67 b6 95 35 7a 36 fb 65 | 99 b0 0f 89 29 13 5d 90 12 37 2d 11 35 2d b1 44 | 94 62 9d e9 25 b3 9d a0 a4 a6 21 f1 2f 1e cd 7c | e1 45 a8 9a 87 d2 53 e3 a2 32 e1 24 cf d4 84 b6 | d5 f2 14 94 09 c7 86 4b f6 5c 13 c3 cd 16 8e 96 | 09 f6 db 84 7c 68 6c 48 a7 94 92 3a 1f dd 75 5e | 2c 36 f1 6f 81 03 42 93 73 6d a8 a1 de b3 ee 78 | 53 dc 84 4e 49 9c c8 3c d2 8e 9e 10 6c e7 28 b0 | 11 a3 fb e6 6e 4d e5 e0 87 56 00 b9 8b bd 7a 34 | c7 01 93 2c df ea 24 e3 c0 b7 3c 4f 9c fd 99 11 | 44 90 bc 5c 8f 0c c6 10 b3 66 24 ea 61 81 fc 7a | 33 5f 5b b7 cd 2f 8e 95 d1 b4 0b d4 4c f2 ce 45 | 29 00 00 24 e0 34 a3 40 45 a9 39 5f c9 a9 a0 f5 | 90 bc 5f 96 21 2e 5a ab 31 ef 27 59 8c 9d b8 53 | c4 51 4a f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 19 b7 b4 22 31 1f 00 af ac cd cc | 10 5d a8 e7 0a 7e 75 3d 00 00 00 1c 00 00 40 05 | 93 2a 52 65 d2 92 1c 7e fa c3 8c df bd 81 85 07 | 8f 9c 4c 85 | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a60690 | #112 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2cc10 | handling event EVENT_RETRANSMIT for parent state #206 | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #206 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #206 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49617.648372; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000884 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a60690 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #206 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 "road-eastnet-nonat-206" #206: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #206) | 01 b3 28 e7 e1 8b 13 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 fa e3 24 f9 a6 bc f3 21 1e 37 1a 6d f4 9a 7b | 77 24 5e 56 24 67 7b 74 f9 64 dc d8 1a b5 59 69 | d9 52 b7 b7 59 74 06 38 08 06 47 89 aa a8 f6 76 | 67 bf d4 4c 77 38 3b a1 63 60 dc 2b e4 fd cd 8b | 9a 4a 0c c7 7b 27 52 84 4e da 22 90 8d d5 51 6e | 00 c5 39 c6 ed 97 f2 c6 62 d9 ba 39 61 32 bb b8 | 11 91 00 ac cd 59 52 93 9f 38 fd 04 59 e4 ef 16 | eb bf 19 45 a5 bc 57 3a 53 a0 af 42 99 76 fa 1f | bd f3 4c 0f c8 d9 db e2 c0 a7 a6 04 31 f7 f9 f3 | 77 5c f7 e0 36 17 0a 5b 7e 68 29 02 15 2c e5 8a | 69 a2 34 36 51 a6 dc bd 4c c4 84 48 fa dd 5f b4 | 73 4d 7d 2b ff 7e df 63 45 9b 17 c7 95 9a 49 c4 | 94 db d0 f3 cd fa 37 d8 ec f4 8c 44 3e 14 f3 a8 | 13 2a dc fa 14 d8 cb 5f 5e 17 3a bf 2d 92 c3 14 | 49 5a 16 33 0a 40 13 9b 4f 56 1a aa ae 2b 43 6f | 7d 54 d1 07 b7 2a 7c 54 16 74 51 00 fd 0a b4 02 | 29 00 00 24 44 53 3f fa 64 f7 0e 35 c1 fb 1d 6e | fa 42 52 34 05 1a a7 3b 67 a9 b1 fa 7a da c7 46 | 65 3a cf a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 ab 21 a3 8f 50 c0 c7 3c cf c9 b6 | d3 91 c9 10 6d b3 85 90 00 00 00 1c 00 00 40 05 | fa 90 51 e6 cc c6 e6 dc b8 75 a7 d9 1e dd 64 0c | e1 7b e8 fe | libevent_free: release ptr-libevent@0x7fb3780180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cc10 | #206 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 d5 03 db 13 27 2f b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #112 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #112 | rejected packet: | 47 d5 03 db 13 27 2f b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #112: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0667 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 b3 28 e7 e1 8b 13 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #206 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #206 | rejected packet: | 01 b3 28 e7 e1 8b 13 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #206: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0572 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ddbf0 | handling event EVENT_RETRANSMIT for parent state #12 | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #12 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #12 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49617.674106; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.020903 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cc10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #12 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 "road-eastnet-nonat-12" #12: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #12) | e6 90 0f 5b 12 9e fb 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 8d ca d0 bf fc d0 53 2f c8 94 c7 75 f0 b7 3b | 06 8d af 15 08 3d 4d 43 8a f2 0e 43 03 74 47 ab | c5 f6 5e c6 9d af 64 6c 5f 50 aa bb 63 91 17 7c | de 19 d6 a8 3d b9 0e 6f 98 77 91 78 cd c6 0f f1 | 83 bd 49 b7 4d 19 90 e6 2f f7 8d c2 99 5e 0c 41 | a4 92 59 8c f3 bc 56 51 55 c4 fc 8d 06 b4 b2 46 | fe 62 b5 0f 4e f1 c7 d9 31 4c e1 f7 06 2d 45 f5 | a0 d5 f5 94 55 0e 2f 00 35 d8 fb d6 3c 6a b6 b5 | 4d 93 6e 6b 9b 52 5b 1c 59 3e d0 a9 2b 70 a2 ec | b5 2f 18 f2 51 cd 4a e5 eb b3 21 70 eb 17 7e fb | 54 5e a1 de 02 46 1e 7f ed c7 44 7e dc 6d 9e 84 | 08 46 48 8f 2c 45 f3 c2 00 ca b5 46 fd 56 d4 bf | b0 41 68 33 e0 2a 67 86 f6 4d 18 8b 90 8d 3e 6b | c2 91 48 4f de cb 41 cd 2e 17 3b f1 b9 af ca 73 | 4b 2f d1 11 2b 7a 96 60 de b9 66 93 28 70 95 94 | 75 11 24 ea 0b a4 9a 4f 1b d9 88 31 b6 8a fe 22 | 29 00 00 24 52 e1 94 79 21 2a ea cc 69 4a af 5a | 5d ef 62 83 14 35 3b dc 33 a8 4c d8 5d ab 20 41 | 8b a5 be 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 aa 63 73 f1 76 ab f8 1b 79 46 f7 | 09 75 6d 3c 97 fc 7d df 00 00 00 1c 00 00 40 05 | db 6d 58 42 c9 d1 b0 49 17 a0 1e 30 4f f9 7e 58 | 72 29 56 37 | libevent_free: release ptr-libevent@0x7fb36c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ddbf0 | #12 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 90 0f 5b 12 9e fb 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #12 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #12 | rejected packet: | e6 90 0f 5b 12 9e fb 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #12: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a986c0 | handling event EVENT_RETRANSMIT for parent state #211 | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #211 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #211 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49617.681758; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50602 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aeb540 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #211 | libevent_malloc: new ptr-libevent@0x7fb36c01d920 size 128 "road-eastnet-nonat-211" #211: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #211) | 53 9a 08 81 c1 f5 e1 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef 09 3e 48 73 4c 9b c2 57 71 c3 fe a1 82 75 e5 | f2 fc 00 52 66 b2 69 a1 98 d7 a1 43 e2 9d 75 cc | 9d b4 06 fc 88 d6 44 63 90 41 43 c2 45 55 dc 1a | 12 ee 32 35 ef 1c ea 74 ac df 20 43 5d 1c 90 c2 | e0 80 56 a4 79 bd f8 c0 a8 96 3b 25 fa 43 51 16 | 7e ae 16 08 0c ee 53 be c7 29 52 25 44 6d fa 34 | 69 9f 31 ba 70 30 84 e6 d5 99 f5 2e ee 13 fd e4 | 65 1c ef 89 6e 83 29 44 bd 4f 23 ac ed 0f c3 ea | db 20 3d 79 09 22 a5 94 a4 f8 6d ce bf 13 df 61 | d3 3f 02 e7 af bb ce de f0 b1 2a fb 97 3e 5d 05 | 56 5c 13 18 20 58 3e 43 ac b1 9e 74 31 3c 13 bc | 7c 7a 3a eb be df d5 2e e9 60 5f 5a 7e af 73 b1 | 92 1c d6 e2 be f1 a5 75 8e 08 54 b0 2b e1 2c 5a | 6f 54 93 f5 5b 16 d8 ba 78 77 2e f6 39 16 6f 65 | 5e 98 fb 40 29 ab 34 cf 31 b1 1c 43 74 9c 6b 56 | 46 0a 1c e2 58 fe 1e 51 fc 87 18 4b d7 84 46 cc | 29 00 00 24 ac f5 37 f2 09 3e be 57 f0 76 41 01 | 45 fc a2 49 1d 14 8a 0e 25 fc 49 cd 6b 6f 69 01 | e7 4f 36 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 6c d6 1b 30 f3 11 7c 9a 75 f0 de | fa 6c c9 cc a4 62 9e ac 00 00 00 1c 00 00 40 05 | 73 92 bd e7 98 2e a4 8f a5 8d 6a 24 e0 26 ee e5 | ed 8e de 68 | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a986c0 | #211 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 9a 08 81 c1 f5 e1 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #211 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #211 | rejected packet: | 53 9a 08 81 c1 f5 e1 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #211: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a49450 | handling event EVENT_RETRANSMIT for parent state #172 | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #172 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #172 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49617.684086; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004269 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a986c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #172 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 "road-eastnet-nonat-172" #172: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #172) | 47 43 39 2e 38 d9 e4 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 65 17 b4 48 89 eb 1e b2 78 b8 1e 15 3a 4a a1 | a2 3a fd 43 76 59 59 a1 75 7a 16 45 66 68 dc 97 | f3 bc ee bc d4 e0 57 41 47 eb 59 3e b3 f4 36 c1 | 10 8f 59 fc 57 3a 37 29 71 bf ce 33 91 c2 37 65 | 5c 9c 9f 71 6e b0 1d 6c 6c ed 90 b3 bd fc 22 6b | 94 91 98 6d a1 2f c5 a8 ca 58 04 fa 18 79 03 0a | 3e 27 a9 a6 f4 08 b2 f5 32 35 e8 b7 83 a3 4b c7 | 82 d2 5d ed b4 7c af 9d be b8 23 49 75 bb 7f 62 | 0e b3 38 1c ec 9d 39 3b f4 04 b7 d0 93 52 70 e6 | 23 bb 4d 7f 7c 2a 5e ec cb 0d 74 24 7b 07 99 42 | 6c 43 eb 64 ec ce f6 41 88 91 d0 50 22 25 43 54 | aa b8 db 3d b2 e3 bd ee 47 71 69 be 83 a3 d8 90 | 99 79 30 84 6a ac 04 1b 20 13 06 10 f1 e1 43 b3 | 50 14 89 62 82 b4 57 81 1e 80 23 23 72 24 b5 3b | 66 27 db 5a d9 e0 9f 07 96 df 6b d0 43 88 1d 6c | 19 73 59 ba d5 80 1f b5 38 2f da 5f 85 a1 ce d0 | 29 00 00 24 54 d0 27 67 15 cd c6 d9 d3 f4 1c e0 | 4e b2 db 81 71 2f 53 78 96 2e b8 d9 e9 fc be ad | 28 73 0e 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 71 7f 76 8f b4 09 cb 9b d9 d3 22 | dc b5 61 93 71 75 88 d5 00 00 00 1c 00 00 40 05 | df a3 69 ab bf ad 58 61 9f ed 54 03 7c e8 ac 70 | c8 e7 d2 fb | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a49450 | #172 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 43 39 2e 38 d9 e4 43 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #172 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #172 | rejected packet: | 47 43 39 2e 38 d9 e4 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #172: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf50 | handling event EVENT_RETRANSMIT for parent state #113 | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #113 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #113 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49617.717392; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.008684 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a49450 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #113 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 "road-eastnet-nonat-113" #113: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #113) | 65 aa 2d d8 a6 29 20 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df aa fe 5d 18 fa cf 0f ff 28 95 2b df 41 5e e5 | 93 b1 5d 05 b9 f8 45 e3 a0 1d 39 ec fc 7d ae 4b | 05 3f bf 03 bf 80 a9 6e 8e fd 3b e8 32 58 c8 f7 | c6 df 30 b6 09 5f 2a 57 25 11 cb 3c da a5 01 9d | ba 5a dd a7 bc 6b 95 4a 6d df f0 56 fa 5d b6 d5 | 32 bd cc 28 5e b5 ff 1a d9 af f1 6d a9 3a c6 a5 | ab a2 21 23 63 1f 7a d5 a9 f2 d8 6e 34 2c c0 14 | b5 44 80 cc 01 b8 bc 1d 88 15 f0 56 5b 9e 16 11 | 53 49 7c 46 a4 d6 df 15 cc 76 08 99 30 8d bd 16 | fc 22 5e e2 91 1e 29 90 27 cb 4a a1 bb fb df c0 | e1 57 58 ac 38 1b 6a 91 9c 4e c8 14 95 91 e6 23 | a6 57 8f 86 03 7d ff ac 75 e9 09 5f f5 40 29 9b | 12 ab c4 82 96 27 04 ff 62 2b 29 96 91 b3 9d b0 | 86 8f c7 9d 9e d4 5c a2 76 cf a2 55 cf 18 d5 47 | 6a bc c0 f7 de 25 72 ff 89 ad a0 ee b6 9c 33 78 | 04 18 e5 3b 76 6f 93 07 22 6f ad 6a 13 43 4b d1 | 29 00 00 24 24 d3 7a 96 b8 4b b9 c8 77 6f a9 e8 | 8c 18 33 84 b7 52 88 cd 9d a3 3f f7 dd 42 d5 3a | e4 24 11 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 39 d7 c2 57 ac 0e 5c ea ab f6 c3 | 2b 95 40 5a 3d 34 d1 e0 00 00 00 1c 00 00 40 05 | e1 b8 84 36 a4 5f d1 6d 3f 9f 07 dc 0f 94 99 b2 | ea cc 3a 90 | libevent_free: release ptr-libevent@0x7fb3500180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf50 | #113 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 aa 2d d8 a6 29 20 d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #113 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #113 | rejected packet: | 65 aa 2d d8 a6 29 20 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #113: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad5900 | handling event EVENT_RETRANSMIT for parent state #197 | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #197 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #197 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49617.722187; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002683 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf50 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #197 | libevent_malloc: new ptr-libevent@0x7fb3500180b0 size 128 "road-eastnet-nonat-197" #197: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #197) | 76 fd 06 22 f8 72 39 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff 68 ad 96 cd 76 be 78 ca de ba cf 7d b8 d2 27 | eb 47 3d ab 5c da 69 f4 c0 aa ef 37 1d c8 bc 64 | b3 77 c8 06 c7 c1 ca 6e ba 13 a5 88 a0 2f 7d 28 | 77 76 19 e0 b9 08 19 f4 ea 19 57 8a 4a c5 51 64 | b2 b3 06 1d b7 55 89 e3 2f 55 c2 0a 68 16 ae bf | bc 84 d6 24 e3 0d 3a 6d 7f b0 26 cf fc 83 69 6f | 06 6c 19 78 05 aa 1a a7 a3 53 01 3e 4f 01 0c e2 | b6 b8 5e d8 44 74 c4 4a 7b 03 78 a3 0d 18 93 01 | ca 83 a7 98 02 8f 9a c5 fb 52 4a 95 fa 85 65 9f | 48 a4 30 21 ca 8f d8 e0 98 f5 f9 49 2a 0a 5a b1 | e0 a0 a3 25 65 8b 86 36 1d 17 ff 3c 76 35 24 e3 | b6 f7 d8 e5 22 2f 0d 80 58 07 89 c1 b8 b9 b6 a3 | ac a9 f3 74 55 c9 1c c7 ef 2f b9 00 be f9 d3 c9 | 30 e9 ef 92 c0 ce 36 02 ea 19 c8 d7 f7 c5 6a 1c | b8 72 5b 69 21 d3 b8 ca 13 78 68 f5 5e 6f 80 64 | 1c aa ea 24 03 ee 29 9b c1 bb 83 e4 a6 7c 10 08 | 29 00 00 24 74 4f 18 14 83 36 22 20 12 7b 44 86 | f2 c1 e1 0b 40 a8 83 e6 1a 42 e2 88 a2 98 21 31 | 2c b2 85 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 2f 89 09 b5 52 02 b8 23 bc 44 51 | 94 1d 2d 47 4e ed 65 d6 00 00 00 1c 00 00 40 05 | 73 fc 3d fb 5c fa a5 ca c9 53 fd 67 5c 67 b8 86 | 11 c4 a6 88 | libevent_free: release ptr-libevent@0x7fb34c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad5900 | #197 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 fd 06 22 f8 72 39 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #197 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #197 | rejected packet: | 76 fd 06 22 f8 72 39 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #197: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a88140 | handling event EVENT_RETRANSMIT for parent state #173 | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #173 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #173 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49617.746526; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004771 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad5900 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #173 | libevent_malloc: new ptr-libevent@0x7fb34c0300e0 size 128 "road-eastnet-nonat-173" #173: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #173) | a3 dc 1a aa b2 53 81 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 50 c6 a8 2b 15 44 29 7d 0a e3 39 95 9c 54 98 | 15 94 31 dc b2 f4 dc 06 12 a0 ff 21 13 48 30 95 | af bf 2b b8 09 10 1f 12 f1 ba 4e d2 4d c9 b1 a8 | 05 1a 20 e3 76 d4 0d 6b 38 00 2d 67 2b 07 73 be | a7 20 4c aa b8 f7 39 95 13 6d ae b6 ef 79 3a 33 | 8d e1 63 74 10 aa 27 63 ae 0f b0 2c 9f a5 74 21 | 20 ef 3b da 07 cd e1 2a ac 84 10 e1 eb 87 c2 5c | 8c 49 b1 a8 55 4a 0b c6 97 48 c7 fa 85 87 f0 7a | d7 45 9c 5f 2a c6 38 4c 4e a1 54 1f 2a b5 2e 49 | c6 5b 7a b8 69 98 a8 6a 03 80 1c 7f 20 55 e9 fd | 67 3c d3 ce e1 0d bb 8d 6b d2 95 4c af 6b 27 f3 | df f3 c1 d1 42 37 39 82 9f 58 eb 0d c5 ad bb 97 | 84 ff 4d 8a ba d9 60 19 d6 8e a0 cf fa 4d d0 49 | 61 07 20 ea f9 3b 35 e5 ef 25 c3 9f 36 d2 2d 11 | 5f 51 ff fc 25 f0 0e 63 2f a3 a3 cd af f0 c5 be | 34 51 97 11 a8 5a bf 5a f6 22 be 55 c5 08 d3 d9 | 29 00 00 24 12 84 f7 8f dc 17 04 fd a9 ee 45 ef | 2f aa ad ed 39 8e cd ff 76 be dc 7b d9 a9 2b e6 | 08 21 dc 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 b7 38 fa 70 81 30 71 1e 17 26 ac | fb ca c9 c3 02 40 69 eb 00 00 00 1c 00 00 40 05 | 47 2a 00 7e f6 06 aa e7 bc a5 be 89 f2 8d 4b b1 | 1c ba 94 b3 | libevent_free: release ptr-libevent@0x7fb38001abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a88140 | #173 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 dc 1a aa b2 53 81 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #173 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #173 | rejected packet: | a3 dc 1a aa b2 53 81 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #173: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0789 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-217" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-217' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #217 at 0x557d46afc500 | State DB: adding IKEv2 state #217 in UNDEFINED | pstats #217 ikev2.ike started | Message ID: init #217: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #217: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #217; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-217" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-217" IKE SA #217 "road-eastnet-nonat-217" "road-eastnet-nonat-217" #217: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-217 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-217": constructed local IKE proposals for road-eastnet-nonat-217 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 217 for state #217 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a88140 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #217 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 | #217 spent 0.168 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-217" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.253 milliseconds in whack | crypto helper 8 resuming | crypto helper 8 starting work-order 217 for state #217 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 217 | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 217 time elapsed 0.001929 seconds | (#217) spent 0.902 milliseconds in crypto helper computing work-order 217: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 217 for state #217 to event queue | scheduling resume sending helper answer for #217 | libevent_malloc: new ptr-libevent@0x7fb34c0407f0 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #217 | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 217 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #217 | **emit ISAKMP Message: | initiator cookie: | d2 36 bf 64 89 a3 fd 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-217 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d3 f4 5b dc ca 6a f6 be c1 c2 c8 63 19 fb 3a 1f | ikev2 g^x 70 dc de 5b 54 b8 eb 8d 2b 5e fc c2 60 b3 0c b8 | ikev2 g^x 9b c4 53 f6 87 96 b1 7e c0 8d e1 b0 c0 a3 08 59 | ikev2 g^x f8 18 05 78 a7 5e f9 f4 d8 1f 45 f9 8a db 9c 99 | ikev2 g^x 0e 07 3e 2a ba bb 8c 14 d2 d8 55 43 f4 c4 74 29 | ikev2 g^x 81 f6 ff c1 34 b9 34 a3 97 b9 37 cc 81 87 17 91 | ikev2 g^x 44 f4 e5 3a 28 aa cc 0c 3a 69 40 14 f6 3b 92 b7 | ikev2 g^x db 83 50 42 f0 36 82 ac f1 19 7e 5c 4e 90 c6 ec | ikev2 g^x cf fd 70 a2 a6 79 e2 bb b0 2b b1 df 8d e0 62 86 | ikev2 g^x 52 eb e4 a9 60 bc ec b9 d7 99 33 ce 9f d2 75 d6 | ikev2 g^x ea 82 29 7d d5 df f1 81 05 f9 8d d7 ff 39 0b 3b | ikev2 g^x 2c fe 6f 59 ae d2 c3 c5 12 3f 62 54 ed fc 61 4f | ikev2 g^x c2 74 90 8a b6 79 a0 b5 31 fc 8c d5 cb 45 21 48 | ikev2 g^x b0 1d 10 ec cf 2a b3 30 35 95 3b 32 3a 79 8c 33 | ikev2 g^x ab 0a b9 7d 4f 43 6c 9b d9 20 e5 7e 28 a9 95 05 | ikev2 g^x ed 38 6d f0 1a 10 8c 41 cd 59 c0 e4 ec 28 25 e4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 50 f4 8b cc 88 78 9a 77 ca 06 50 f2 60 9a 06 39 | IKEv2 nonce 64 9a 92 2a 1d 6a 83 ae 2a 35 88 82 1c 3d 43 e4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d2 36 bf 64 89 a3 fd 7a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d9 | natd_hash: port= 01 f4 | natd_hash: hash= bf a3 05 4d ff 0f f5 da 0b f8 e7 54 e5 88 17 6e | natd_hash: hash= 1b 78 5e cb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bf a3 05 4d ff 0f f5 da 0b f8 e7 54 e5 88 17 6e | Notify data 1b 78 5e cb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d2 36 bf 64 89 a3 fd 7a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9b 1b 06 2c 11 9c 55 41 9d b0 16 46 62 0b cd 66 | natd_hash: hash= 9f 92 84 50 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9b 1b 06 2c 11 9c 55 41 9d b0 16 46 62 0b cd 66 | Notify data 9f 92 84 50 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #217 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #217: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #217 to 4294967295 after switching state | Message ID: IKE #217 skipping update_recv as MD is fake | Message ID: sent #217 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-217" #217: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.217:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #217) | d2 36 bf 64 89 a3 fd 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 f4 5b dc ca 6a f6 be c1 c2 c8 63 19 fb 3a 1f | 70 dc de 5b 54 b8 eb 8d 2b 5e fc c2 60 b3 0c b8 | 9b c4 53 f6 87 96 b1 7e c0 8d e1 b0 c0 a3 08 59 | f8 18 05 78 a7 5e f9 f4 d8 1f 45 f9 8a db 9c 99 | 0e 07 3e 2a ba bb 8c 14 d2 d8 55 43 f4 c4 74 29 | 81 f6 ff c1 34 b9 34 a3 97 b9 37 cc 81 87 17 91 | 44 f4 e5 3a 28 aa cc 0c 3a 69 40 14 f6 3b 92 b7 | db 83 50 42 f0 36 82 ac f1 19 7e 5c 4e 90 c6 ec | cf fd 70 a2 a6 79 e2 bb b0 2b b1 df 8d e0 62 86 | 52 eb e4 a9 60 bc ec b9 d7 99 33 ce 9f d2 75 d6 | ea 82 29 7d d5 df f1 81 05 f9 8d d7 ff 39 0b 3b | 2c fe 6f 59 ae d2 c3 c5 12 3f 62 54 ed fc 61 4f | c2 74 90 8a b6 79 a0 b5 31 fc 8c d5 cb 45 21 48 | b0 1d 10 ec cf 2a b3 30 35 95 3b 32 3a 79 8c 33 | ab 0a b9 7d 4f 43 6c 9b d9 20 e5 7e 28 a9 95 05 | ed 38 6d f0 1a 10 8c 41 cd 59 c0 e4 ec 28 25 e4 | 29 00 00 24 50 f4 8b cc 88 78 9a 77 ca 06 50 f2 | 60 9a 06 39 64 9a 92 2a 1d 6a 83 ae 2a 35 88 82 | 1c 3d 43 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf a3 05 4d ff 0f f5 da 0b f8 e7 54 | e5 88 17 6e 1b 78 5e cb 00 00 00 1c 00 00 40 05 | 9b 1b 06 2c 11 9c 55 41 9d b0 16 46 62 0b cd 66 | 9f 92 84 50 | state #217 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38001abe0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a88140 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a88140 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #217 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 | #217 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49617.753041 | resume sending helper answer for #217 suppresed complete_v2_state_transition() and stole MD | #217 spent 0.478 milliseconds in resume sending helper answer | stop processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c0407f0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 36 bf 64 89 a3 fd 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #217 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #217 | rejected packet: | d2 36 bf 64 89 a3 fd 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #217: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23110 | handling event EVENT_RETRANSMIT for parent state #207 | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #207 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #207 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49617.762874; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002348 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ddbf0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #207 | libevent_malloc: new ptr-libevent@0x7fb34c0407f0 size 128 "road-eastnet-nonat-207" #207: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #207) | 98 86 9a c8 81 d3 6e e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 59 ae 25 5d aa 28 92 c6 18 2f bc 82 85 c2 3b | ef 2d af ff 7a e6 4d 2d 70 93 a0 de ce 52 57 5f | cf 57 26 3f 1c a7 0f b2 96 d8 25 c6 cb c3 1d 15 | 8e 04 6c c9 e5 de a9 9f 48 ec bf 8a ac af 55 b7 | 16 4e ac b3 75 43 96 89 7c 9a 69 70 08 ac 14 3e | 96 4b 5a 70 2a 29 e5 8b 07 f0 5c cb ed e2 91 b3 | 9b d7 77 9b 28 c0 fb 49 4d 80 b8 6a 5f 4b e2 be | 9f 93 81 d7 4b ea 7b e4 89 24 53 bc a4 06 8a 63 | ae f3 eb f3 e4 35 75 5b 3f a9 62 83 5c be e9 3f | da 2a 80 0c d1 89 a8 df 56 22 c5 4a 79 92 72 a5 | 3c 63 0a 48 54 25 a3 65 43 13 ce a4 3e 09 f7 a7 | 13 60 08 7a 31 57 5f 3e ec 21 89 2d 48 e6 b5 d0 | 55 c4 14 94 07 66 75 e1 7b b7 31 ad 1e 44 cd 2a | 84 8d 3f db f4 29 57 19 60 3f fa 98 86 72 4b e8 | c5 e2 25 d0 6a 0d c6 7c 2e b9 5b 59 7f 50 39 10 | 7f 2b dd a7 68 a0 e6 07 75 6e ff 62 1d 5c 80 75 | 29 00 00 24 e2 c5 0f b4 00 31 2d 18 4e d6 58 87 | 9d 2e 37 b9 b3 22 c5 5a fd 1c 75 2e 4d 23 6a 09 | d6 2f 3b 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 0a 15 af 31 57 a5 69 ec 8c db 25 | c8 27 a9 b0 00 8f 48 7f 00 00 00 1c 00 00 40 05 | af fe 48 1b 76 51 69 26 e1 f2 f5 ea 64 9f 61 35 | 72 2e c3 f3 | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23110 | #207 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 86 9a c8 81 d3 6e e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #207 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #207 | rejected packet: | 98 86 9a c8 81 d3 6e e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #207: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0703 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #114 | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #114 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #114 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49617.77912; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006686 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23110 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #114 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 "road-eastnet-nonat-114" #114: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #114) | d6 76 3e 2a df 8d 49 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 89 bc e4 ca cf 42 9f 8c 3e 0c bd bc ae 4f 3b | d3 c7 ce d3 ca 55 eb 39 04 eb 76 8e a9 75 7d e3 | b6 18 fe 44 5f 1c ef b7 b7 41 cc 4d 34 22 30 65 | 06 59 1e ef 39 63 eb fe 02 26 56 aa 64 57 8d 53 | 7a 80 31 9c 0a f7 30 cf 50 cb a2 17 9f 63 45 27 | 3c d2 e0 b9 54 07 a2 b1 46 40 09 3b 94 40 bf f1 | 40 f9 b6 13 93 c3 4e d6 d8 b1 db 99 2b ea b1 51 | cb eb aa 9a ed ac 6d b8 6b 55 e2 2f 64 52 21 e2 | 9d 13 28 a8 e7 03 1f ba 1a 35 29 e1 bf bc 71 81 | 00 b3 30 d7 67 e8 0d 4c f0 57 7f 78 f9 6a af a6 | f5 69 67 2d 44 65 18 2d d8 cb 15 95 95 67 b6 a2 | 53 6a 9c 3b 84 13 f8 02 23 28 ee d8 85 45 e3 f6 | 5a a4 85 e6 1c 98 88 9c 1f 95 20 64 13 9f 49 1c | 78 c0 c0 ca f6 15 03 7c ad a7 9e 6d 64 5a 3a 90 | 22 4b eb 71 cf 24 e9 b9 6a 4d d7 77 ec 73 7e 9d | b2 6f c8 a4 49 bf 18 63 90 cf af e1 1e da 29 bc | 29 00 00 24 73 ab 08 be 9c 8c 4d 6d 6c 17 9d b7 | 72 a8 6d 05 77 58 95 9d b6 49 34 83 b7 04 21 62 | 34 da 48 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 91 b3 8b e1 5d a7 b1 99 b7 4d e6 | 18 7a 40 70 0a cf e4 42 00 00 00 1c 00 00 40 05 | 2c bf 9c 44 68 90 73 42 ea f8 95 cd ea 90 69 66 | 03 01 a9 72 | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #114 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469ffbf0 | handling event EVENT_RETRANSMIT for parent state #13 | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #13 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #13 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49617.779303; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.016625 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #13 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 "road-eastnet-nonat-13" #13: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #13) | 49 f7 1e 6a 42 26 33 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 71 af 86 f4 71 f9 bb e4 0d 2b 45 d7 29 39 05 | b7 87 ba 66 cb fb 2a f9 a1 bd 3d 61 b3 93 ac e4 | c3 99 b0 f5 02 62 ee dd 97 cd f6 04 fc 6c e4 91 | fc 5c 11 ba 5a 79 b1 78 a2 d0 e7 22 4a 47 b5 e0 | 1b 08 7f a6 c3 8e ce 71 40 0d 06 f3 62 f6 df f1 | 5d 7c 5b e2 d5 cd 0f 4d e6 c6 f8 d8 22 4f 95 11 | 69 b0 4c 7b c2 82 8e f9 ea f5 33 82 00 b3 c7 cc | c1 9e 50 02 8e 45 ef af 1a f9 8b 37 72 41 32 b8 | 47 f2 be df 3f 94 e4 a3 17 d5 55 32 fb 1f 2d d2 | 75 88 9c 98 42 60 51 41 31 79 19 3b ff ef b8 2a | 8e 39 2b ea 32 11 93 14 1c d3 9c 70 36 49 9b d1 | ea 38 9f 9a 6a 33 49 23 7d e2 c2 d5 b0 8d 83 b6 | ef a7 10 c8 a2 18 a7 4e 8b 07 bd 67 b5 96 c1 6a | d6 9d 73 c7 60 9d 60 25 5d 63 21 25 68 0e 24 b3 | 8f 19 40 42 2e 27 e9 30 d9 f9 1b 80 8f 2d ab dd | 1e f0 98 f5 b2 55 9b 6b 06 84 0f fe 26 32 f1 f7 | 29 00 00 24 dd b6 a9 bb fd 56 26 b2 23 d7 97 2f | 99 f7 92 2e ca d6 19 06 93 b1 8e 77 8d b7 a4 a3 | 73 9b 88 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 83 1c 22 e0 45 23 6f 5f d0 4f 89 | cf 59 8e 77 1e 0a 0b d7 00 00 00 1c 00 00 40 05 | e8 12 13 20 8d f1 d3 89 00 ae 66 0d fd eb 92 63 | f1 cf 85 56 | libevent_free: release ptr-libevent@0x7fb3500251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ffbf0 | #13 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 76 3e 2a df 8d 49 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #114 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #114 | rejected packet: | d6 76 3e 2a df 8d 49 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #114: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 f7 1e 6a 42 26 33 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #13 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #13 | rejected packet: | 49 f7 1e 6a 42 26 33 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #13: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0582 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a12c70 | handling event EVENT_RETRANSMIT for parent state #212 | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #212 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #212 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49617.792679; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500134 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecac0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #212 | libevent_malloc: new ptr-libevent@0x7fb3500251c0 size 128 "road-eastnet-nonat-212" #212: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #212) | 94 ac 86 b7 f8 83 d4 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 79 5c 0c 28 90 8c ef 02 3c d8 f8 1a 0b d6 b1 | 04 69 40 2f 72 b0 4d 73 12 19 ce 98 f8 6f 0b 9f | b9 13 67 6a 06 b8 41 b4 12 d3 3b 5e 00 45 d7 98 | a9 e1 2d 0a c7 48 98 e8 4f 26 89 26 1d eb 0f 63 | d1 cd 01 b0 ac c0 e6 9c c4 d5 af f4 d2 0a f8 fc | 50 8b 97 23 e0 8c a0 c2 04 25 1e a8 35 a0 f0 95 | 6e 38 07 0c ab 5c e3 d8 94 8f 44 fe f3 fe 9f 14 | 8e b7 78 55 0b 6e 31 2e c3 a7 48 da be 5b b7 47 | 21 9c c6 d3 74 d7 58 d3 13 78 3e ed 28 44 9b 87 | a8 e3 a1 e6 89 b5 03 ef 3b fe d5 17 e8 f9 73 04 | 1c 9e 5a c3 69 56 f2 c1 24 33 17 fd 7d 0d ed e7 | 7d 2c 20 7c 0b 8e 94 c1 2e c1 1b fa 0b 32 e2 6f | 8a b2 5d b4 79 8d 9a 89 ea a8 6f 97 71 92 fa f9 | bc 34 75 15 ab ea 61 f5 3d 74 25 af 37 7b 97 2f | 19 3e 0a b6 c1 50 67 1c b8 51 37 9b 9a b3 26 67 | c4 f2 b4 e7 06 7e 5d 5b 28 22 1e 8e 7e da b7 8b | 29 00 00 24 5c 64 5d 43 88 c1 08 90 f5 2a 0e 23 | 99 a9 ce 32 1e 4e 34 e5 9c b5 04 95 ad 56 32 fb | 31 cf fd 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 0d b1 e5 c0 7d 3f 73 e9 5f 1b 2c | de e5 07 26 54 11 d9 1b 00 00 00 1c 00 00 40 05 | 08 da df 20 35 aa 7d dd ef ff 4a 4d 21 f5 f2 fb | f9 b4 9f 22 | libevent_free: release ptr-libevent@0x7fb374040670 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a12c70 | #212 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 ac 86 b7 f8 83 d4 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #212 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #212 | rejected packet: | 94 ac 86 b7 f8 83 d4 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #212: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0699 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a77850 | handling event EVENT_RETRANSMIT for parent state #174 | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #174 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #174 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49617.817283; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004984 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #174 | libevent_malloc: new ptr-libevent@0x7fb374040670 size 128 "road-eastnet-nonat-174" #174: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #174) | 91 36 4b 21 8c e3 c8 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 dd c5 98 91 80 2f bf e7 2b 43 43 70 f9 1c a2 | 78 b6 0b 56 89 c7 17 d8 c4 a4 ed 43 14 68 00 55 | ee dd ad 6d 8a 38 ba ad d9 23 b7 9e bb 3d 86 07 | ed 16 db de b0 44 67 be ba 65 0e 96 fd 54 eb cc | d4 d8 f1 83 4a 85 62 b4 81 ea c9 6f d6 2b 35 08 | 27 1d 44 b3 72 05 f6 d5 ee 0e c6 0c ad 30 dd 17 | d5 9d 92 9d 6e 7c 3d b9 06 e4 e1 7a b8 af 86 7e | 60 5c 18 1e 77 1f a3 0b 6c 39 63 8e 3b e2 37 7b | 90 c4 a3 0b 91 18 0b 29 93 4d 27 18 cf a4 37 53 | b6 2a 69 e7 1d 14 6c 93 05 8e 44 d8 16 2f a7 9f | 79 72 c5 dc 33 34 fc 0e b4 98 f8 e3 05 25 fe de | b4 63 51 46 dc 88 2d 12 37 aa 30 40 1c da d8 aa | d1 04 09 9e 82 a0 ef 0f 6a 96 1b 9b 72 30 77 32 | 93 8b f7 e8 2a a0 a2 dd 84 00 ba 24 75 30 17 4b | 8e 71 da c7 7b bd 41 ab b9 40 da db 82 29 9b 27 | d8 26 4c cc a8 73 89 de dd ff 26 53 c5 6f 01 3f | 29 00 00 24 cd b7 f1 c7 48 65 7b d0 51 fe 51 f7 | 71 0f cd 4b 00 33 35 86 2b 0b ad 56 3c d5 7d aa | 0f f5 4e e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 08 52 e7 44 c5 f0 65 19 f6 45 55 | b4 2d dd 6f 21 a4 bb e8 00 00 00 1c 00 00 40 05 | 78 4d 37 08 7f b6 6b 98 3a f8 5f d9 3e 81 c3 c7 | 93 cf d6 90 | libevent_free: release ptr-libevent@0x7fb370035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a77850 | #174 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 36 4b 21 8c e3 c8 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #174 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #174 | rejected packet: | 91 36 4b 21 8c e3 c8 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #174: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.067 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #198 | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #198 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #198 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49617.82962; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.005335 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a77850 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #198 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 "road-eastnet-nonat-198" #198: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #198) | 38 c2 c3 e5 3e e5 82 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 61 f7 55 c5 c4 5e d0 83 66 79 06 76 ff 91 2f 9b | 12 d0 24 44 db b1 bb 60 15 c5 59 2d d1 18 5f af | af eb bb bf af 0f d5 a7 6d 21 23 3c 7a d5 2f 3a | b3 ef ca 8b 4c db ec bc f0 8c 19 8a b2 60 93 64 | a7 e9 05 44 28 9e 74 5d d9 95 66 66 f7 e5 b4 1f | d5 4f c6 33 f7 6e 5b 80 b4 15 1d 1d 0e 0a 1d ec | d1 57 f6 0c 8a 85 f5 7e b6 52 c9 40 29 cb 30 96 | b6 70 b8 b9 59 b7 f3 5d 39 15 1c 09 f2 d7 22 1a | 2f a6 71 e7 c2 13 1a 03 5a ae 65 2f 9f ab 09 6a | f8 76 83 82 4d 45 c3 9c c4 22 81 0b 0c de 1f 60 | c4 83 6f 80 69 4d fb 9f c9 f8 93 ff f8 9f 02 54 | a0 9a b8 b4 d0 4b 39 8e 82 eb a2 4d fd 53 0b 42 | 08 c3 3b 83 a3 55 58 9c 32 8d d4 50 90 35 7f 36 | 30 25 cb 7b da d7 20 59 55 75 68 f3 54 82 bd 15 | 66 45 d1 d6 73 76 d2 e1 4b 15 1f c3 2a 8d b1 0b | e3 7d 9a 2f f6 14 5c e9 eb 5c bb c0 32 a0 bd c5 | 29 00 00 24 88 f3 29 1f 7c 05 5c 84 29 93 1b 9b | 8b f1 e4 5b 97 f1 d8 9e b8 85 d9 30 2a 5f 45 e2 | 98 31 41 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 05 30 82 a4 eb e3 d3 07 9b b1 ad | f0 ee 15 a7 e9 bb 27 63 00 00 00 1c 00 00 40 05 | 88 8a 68 49 cd fa 13 38 3a 2a 49 e8 1c 37 c8 41 | 63 44 84 75 | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #198 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 c2 c3 e5 3e e5 82 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #198 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #198 | rejected packet: | 38 c2 c3 e5 3e e5 82 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #198: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3a590 | handling event EVENT_RETRANSMIT for parent state #115 | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #115 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #115 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49617.841961; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005212 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #115 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 "road-eastnet-nonat-115" #115: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #115) | c4 57 de ea ab 7c 97 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d 60 64 b4 6d 6b ab d1 46 47 bf d9 bb b3 15 d9 | 76 6a d8 89 d3 b0 5a 81 28 ba 1d 93 76 a5 80 bb | 38 99 6f de 11 f7 c8 2c 23 bb 14 6a 9f 0d a9 47 | 32 e4 6d d5 c4 32 60 81 49 22 36 5b 90 09 c7 0c | 27 45 32 0f 98 73 ed a3 58 24 f6 91 48 ba e7 1f | da 48 cc 0b e5 09 56 9d bd e9 fe a4 8f 0e 2b 69 | 4d 35 1f 28 bf 51 97 13 c0 2e 28 0e de c2 67 89 | 74 f0 15 44 d8 28 5b 7f f9 a9 ff b2 03 37 cf 2c | 3b 6e e1 4e 7e c7 1c 07 07 33 f5 e7 ff 50 1f 8d | 31 38 08 fc a1 18 db f4 32 10 6d f3 26 bd 9e d9 | db 50 5b 6d 6b 19 89 41 88 e3 7e 3b 01 55 72 67 | 91 73 3c 48 31 9d dd 55 e1 1b 9a a9 f9 5f 58 30 | 2e b7 6d 0e 83 a7 65 f9 86 ec 70 47 1e 65 85 e1 | e6 c5 21 98 7e 5c d4 94 dd 2a 93 5a 70 ed 80 a7 | 59 4c 40 1d 45 f5 3b 9b ad 67 94 6a 65 cc 62 c5 | 57 fb 85 e6 12 1e d8 43 f4 ef fe f0 cc a4 02 e0 | 29 00 00 24 34 89 d0 cd bb 68 33 bb 66 4c 49 99 | 21 34 57 e7 67 32 62 7f b0 e9 7c 89 a8 87 a7 1b | 14 49 2b 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 7a 1e c7 ed 14 54 ea ac f9 9a 4e | af 78 6e 32 16 f1 84 2f 00 00 00 1c 00 00 40 05 | 1a 60 d9 ab c3 38 58 4e 6c 49 b7 eb b4 e1 91 a6 | 90 ea 24 0f | libevent_free: release ptr-libevent@0x7fb354009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3a590 | #115 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 57 de ea ab 7c 97 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #115 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #115 | rejected packet: | c4 57 de ea ab 7c 97 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #115: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0685 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #14 | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #14 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #14 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49617.863337; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.010449 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #14 | libevent_malloc: new ptr-libevent@0x7fb354009640 size 128 "road-eastnet-nonat-14" #14: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #14) | c3 13 eb 28 05 44 3c c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 9d 4b 57 65 9b 44 ef 02 5a 55 12 34 bd 3e fa | 1d 1d 02 b8 47 b4 07 d2 1c 40 a7 d2 b5 27 54 0d | 81 c5 8d d2 b0 f1 46 e6 2b f6 3a de 28 5d 98 ae | 72 2f 81 53 d7 e7 b2 d9 8d 92 9d 09 f6 b7 ce cc | 3e 71 cd 6b bc 9b 98 ad b9 25 11 78 67 a8 99 c6 | d0 09 70 45 b3 4c 5d bb c4 08 3e 65 01 7c 91 1b | 71 62 4d 8f 21 92 6e 0d cc 31 2a e5 1d 4d 2c 13 | a8 c8 3c 02 8d 36 79 d7 6c 16 bc 07 ba a2 3a 87 | 13 5a 36 f7 58 04 34 60 a3 2f 3a 9f 7c 23 64 3e | 35 e2 e2 a2 79 4c 9f fc 94 b5 56 35 03 c7 fc 3a | cf 61 0a a2 ca 12 f9 93 6a 8b f6 7c 71 75 e0 48 | 38 16 70 bd 8e 4a bd d6 cf f6 8e 6b de fc 4a f7 | 37 83 73 dd be 05 96 b0 07 8a ee 94 33 ed 86 17 | 8e 84 02 b1 3c 02 91 6e df 44 9a 23 83 12 9c 66 | e4 27 4d ff 2c b0 4c 89 bc bc 90 88 ea ad 2f 69 | 0e ca 37 3b 42 e0 ad 13 24 ad bb e5 a5 03 12 10 | 29 00 00 24 cb 20 8c 9f 6a 8c dd ed 7f 5a c1 49 | 4c ab 23 eb 51 b5 51 02 d0 17 95 d7 22 4b 61 df | 15 62 c3 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e 81 d0 17 a6 30 05 4d 92 15 c2 f3 | f4 8b 67 24 b4 9e ba 2d 00 00 00 1c 00 00 40 05 | 8a 85 97 fb 20 dc 58 d7 a0 fe fa ad 9b 31 ea 8a | c5 2b 9c 59 | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #14 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c3 13 eb 28 05 44 3c c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #14 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #14 | rejected packet: | c3 13 eb 28 05 44 3c c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #14: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a903c0 | handling event EVENT_RETRANSMIT for parent state #213 | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #213 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #213 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49617.88068; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500476 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #213 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 "road-eastnet-nonat-213" #213: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #213) | 4a f6 d6 f4 f7 c1 a9 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 87 92 0f fd 56 61 cf 88 27 07 68 fb 27 94 14 | ab 6f 99 e6 75 dc 26 2f 1e 93 7a c8 7f ed e5 7d | 6b b9 9d 92 4b e7 28 92 86 1e 95 f5 3a f0 df 50 | 69 19 a3 90 28 b6 f5 2d 21 d9 e8 a3 e1 5b a3 90 | 3f a9 b0 a1 2a 68 b5 63 77 3b aa 0b 6a 92 36 d6 | 32 61 b7 e6 8e cd 51 f2 78 e2 77 58 13 92 00 bb | 90 bd cb b3 98 f4 c1 b4 f9 bd 9c 07 84 cd 8b 44 | 56 64 bd 56 88 30 16 b1 de 15 4b 10 e0 33 82 0c | 53 be e7 f5 bb 24 10 e7 6d a3 b2 a5 08 f8 45 52 | 21 5c 7f a2 a6 ba 7c c6 84 2d 67 10 b4 86 8f 9c | f0 28 12 88 fb c8 52 6a e2 26 a6 a9 6d 8d 51 de | 96 9d d4 31 fb 52 b9 5a 75 dd 19 ef dd 61 8f 1b | 4b 84 99 e3 45 d4 ee 63 d4 75 8b e1 c7 c9 46 a5 | 75 72 66 74 64 ad ff 53 8e cd 6a 8d e1 aa 8b e0 | 68 cf 60 1e 6d 53 aa b5 21 a7 9f 74 3a 51 a3 ac | e3 62 94 51 c3 8c 9b b8 34 1f 9f 73 40 9a 49 cb | 29 00 00 24 b5 56 f5 24 67 7b ee bc b9 fe c7 48 | 4d 15 0a a4 8c 8b d0 3d 4d d5 8d 67 be 58 a4 6d | 51 fe 0b 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 44 29 1f 54 8d f8 98 7c 02 ef 5a | ae 02 c1 10 4c 75 c9 6b 00 00 00 1c 00 00 40 05 | bc 12 92 95 d4 1b f9 ad 5d 6a 71 41 82 c9 bd c2 | 29 69 a1 81 | libevent_free: release ptr-libevent@0x7fb34c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a903c0 | #213 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a f6 d6 f4 f7 c1 a9 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #213 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #213 | rejected packet: | 4a f6 d6 f4 f7 c1 a9 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #213: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0706 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a272b0 | handling event EVENT_RETRANSMIT for parent state #208 | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #208 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #208 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49617.883035; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001759 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a903c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #208 | libevent_malloc: new ptr-libevent@0x7fb34c02a950 size 128 "road-eastnet-nonat-208" #208: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #208) | 8f 5c 5f 4e 3a f5 16 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 92 7c 11 dd 8e a5 d7 54 92 a0 06 d5 10 ac 42 | 6b 15 ed 47 e9 69 c6 dc ee be 05 fb f7 98 ca cc | 76 c8 1e 19 2f 4d 8b 90 94 87 44 8e 66 b4 d8 02 | 68 05 60 b8 e3 7d 75 b7 4a 7c ab de a8 fd 41 6e | d6 76 9e 53 12 c0 6c 1d 7a 52 1e 69 01 3b 4b c1 | e7 6b 22 d6 c7 2e 90 0a 6b 5b 89 db 1a 6d af 36 | b5 41 be bc 9c 90 ed 64 78 a2 9b 4a 8f 0d 28 7e | 60 aa 46 05 6e d0 b2 52 c1 92 88 e6 04 b2 49 48 | c1 79 f2 f3 15 c9 58 54 7e a8 48 76 87 71 8d 7e | d5 41 8a 58 60 e1 22 51 b6 c8 da 62 23 cd 7f 72 | ed db 2b 44 40 79 52 36 a1 7b 1f f4 ce 24 ba 47 | 7a c2 df 3d 0b 70 e1 d1 d8 6a b0 33 7a 8b a6 83 | 44 26 40 e1 a6 53 73 33 8b d6 96 05 57 d5 68 55 | da 59 03 a3 8b 2e 16 30 b2 69 8f 5c 37 5b 88 82 | f8 0d 7c f2 a3 34 16 b2 3a a4 64 ba aa 6e 09 cf | de ff 28 7b 22 28 98 ba a1 44 cc d7 e1 ec e2 fc | 29 00 00 24 6d f9 31 58 db 7e 5c 23 da 78 97 04 | 9a 1c fc fa 9f 9f da b9 38 4a 1a f0 e7 71 5f 51 | b4 ee 4f 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 c6 9e d7 bc 34 04 8f 07 db d5 e1 | 11 54 7a 15 87 49 41 6f 00 00 00 1c 00 00 40 05 | da 8d 6c 65 d7 12 37 8a 51 87 98 29 74 33 3a f5 | 86 ee 4b 0a | libevent_free: release ptr-libevent@0x7fb35c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a272b0 | #208 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 5c 5f 4e 3a f5 16 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #208 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #208 | rejected packet: | 8f 5c 5f 4e 3a f5 16 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #208: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0707 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc40 | handling event EVENT_RETRANSMIT for parent state #175 | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #175 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #175 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49617.896677; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004758 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb40 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #175 | libevent_malloc: new ptr-libevent@0x7fb35c0407f0 size 128 "road-eastnet-nonat-175" #175: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #175) | 12 29 28 fb 65 9c c2 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 ef d9 b0 55 d5 14 e7 83 ea 0c 0f eb c0 4d b2 | 18 36 c3 0d 3c 5f 0d a0 d7 f5 a9 e8 30 23 62 2f | 3d 90 5e 25 d3 54 b3 8c d3 ab 1c d3 33 34 03 78 | 85 cd 74 0f 8e 35 c2 5d e8 af fd 9d 00 2e ac e4 | 84 d5 07 fd 55 8c 43 bf 89 61 dc 61 43 3c cd 62 | c3 a0 1f 02 31 0b 07 a5 78 c5 10 08 e8 a4 7f 16 | 2c ae 5c 93 2d 6e c4 24 f5 3a 2e c6 c8 6f 2e ed | e3 0a 8d 68 b0 44 75 d4 95 53 f7 73 cd 7d 6e 84 | d1 e9 9a 86 1e 26 9e 3c d7 df ee 11 ad 66 97 c8 | d5 8e 03 f4 d8 ef b9 76 f2 13 a1 73 f1 c4 5a 4e | 4f 30 eb 7b 7a f1 c0 eb 65 91 cf a9 f3 ae 0d 25 | 9b ee 1e 21 c2 ad 7e f5 01 73 92 f7 51 aa 80 fe | 91 d2 a8 9c 23 90 be c1 3c 6a f1 41 0c 91 0d 9d | 20 55 1f c9 0c b7 77 36 a0 ac 09 f3 01 de b4 91 | 94 8a 20 8c 1f ad 5f d7 63 70 2d 9a bd f2 8c e9 | fc ac 2d 5f 45 8f 88 b9 47 ef 43 3d 71 ea 60 f1 | 29 00 00 24 97 30 3a 8f 02 71 88 b4 dc ed 53 7a | 89 3f 00 b1 2f 4a 80 0e 10 53 03 26 85 ad 54 ab | da 16 12 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 ca 83 64 e4 50 88 08 79 37 9f 8c | 5a be 7c 44 1e d9 01 29 00 00 00 1c 00 00 40 05 | 4a 03 e5 d4 1c 09 77 92 d5 8c 25 e7 2e 76 d9 45 | 5b fb 35 ac | libevent_free: release ptr-libevent@0x7fb3540251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc40 | #175 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 12 29 28 fb 65 9c c2 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #175 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #175 | rejected packet: | 12 29 28 fb 65 9c c2 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #175: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45310 | handling event EVENT_RETRANSMIT for parent state #116 | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #116 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #116 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49617.910026; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007374 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc40 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #116 | libevent_malloc: new ptr-libevent@0x7fb3540251c0 size 128 "road-eastnet-nonat-116" #116: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #116) | b2 c1 8f cb f7 6a 1e a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 10 14 ae 52 93 c7 02 e8 52 e1 37 d5 de 46 8c | fd 60 c1 85 87 df bb 73 86 74 dd ca 8d 28 84 e8 | ae a4 cc 28 e4 8d 32 74 8d 1a ce d7 d3 d2 af b0 | 17 d9 f0 1f a3 6b 80 67 ac 90 16 e8 bd 63 76 cd | 29 1d 99 79 32 0a f9 72 a3 b1 6c a3 80 e8 98 c7 | 50 db 8b a2 a3 d2 f5 f7 af ea cb e0 92 9e 24 f1 | ee d0 e5 d9 31 06 c1 bd 2c 7e d3 0a 21 44 11 df | a4 42 5a ee bb 8a 79 72 e4 f3 c9 99 7b df 25 70 | 3c 49 19 99 e1 b4 65 cb cf 1f dc af da 2b bd 09 | 11 55 b0 c8 e4 15 8c 50 3c c0 c3 00 8c 8c 4c ab | 69 1b ad 8f b8 1a e0 31 01 be 05 d6 f9 1d 43 66 | f1 fd 89 96 83 b0 fe 81 90 88 96 0a aa b0 30 a0 | 85 c7 97 d5 26 67 92 b8 99 15 c1 d7 75 f8 4b 96 | 28 a4 71 fb e3 bc ab 36 e6 56 13 b6 1e 48 b3 3d | 9c e0 fd 0d 74 f8 ef 54 b8 1f 40 6b e3 af 77 76 | c8 a0 52 42 e3 01 29 91 49 f3 39 82 3e 75 b6 74 | 29 00 00 24 f8 40 4d b3 f4 26 54 f3 cf b0 a0 c8 | 54 6e 9f a9 95 bb 15 87 06 e3 63 86 66 7d 8a 82 | ee 67 c6 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 63 f6 16 ae 7e d5 6c 46 12 68 8c | 69 38 5c 9a 54 a3 19 f3 00 00 00 1c 00 00 40 05 | 9e 9c 34 46 1f 45 a3 36 da 24 a6 33 3a 00 62 20 | 5b e0 e0 ea | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45310 | #116 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 c1 8f cb f7 6a 1e a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #116 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #116 | rejected packet: | b2 c1 8f cb f7 6a 1e a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #116: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-218" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-218' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #218 at 0x557d46afdac0 | State DB: adding IKEv2 state #218 in UNDEFINED | pstats #218 ikev2.ike started | Message ID: init #218: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #218: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #218; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-218" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-218" IKE SA #218 "road-eastnet-nonat-218" "road-eastnet-nonat-218" #218: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-218 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-218": constructed local IKE proposals for road-eastnet-nonat-218 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 218 for state #218 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a45310 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #218 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 | #218 spent 0.158 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-218" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.241 milliseconds in whack | crypto helper 12 resuming | crypto helper 12 starting work-order 218 for state #218 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 218 | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 218 time elapsed 0.000993 seconds | (#218) spent 1 milliseconds in crypto helper computing work-order 218: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 218 for state #218 to event queue | scheduling resume sending helper answer for #218 | libevent_malloc: new ptr-libevent@0x7fb340040790 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #218 | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 218 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #218 | **emit ISAKMP Message: | initiator cookie: | fc 84 28 e6 d0 d4 a3 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-218 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c5 d7 19 e0 b8 a7 81 99 33 01 41 39 ef 55 14 82 | ikev2 g^x 36 e8 1e 6f 78 81 cb 8b ba 30 50 9b f0 49 c2 8d | ikev2 g^x 4d b2 2b 95 f1 d8 28 60 35 5d 42 53 4d 43 c7 8c | ikev2 g^x 4f 74 15 45 95 27 14 77 eb 50 5d 4a f6 fd be ee | ikev2 g^x 3c 1a 88 ee 70 83 66 98 31 0a fd ad 4a 03 b5 37 | ikev2 g^x 5d 2e 93 bd 7a be 39 56 60 d9 aa 84 79 74 3d 0e | ikev2 g^x dc e3 b7 0b 24 c5 94 3d 31 8b f6 0e 82 f6 06 b8 | ikev2 g^x 26 12 7e 3f 3e d6 7d b6 51 ee ad b2 d2 ab 27 77 | ikev2 g^x 53 f8 1e d7 91 5f 2a 81 5e 4e 7d 22 21 5e 55 9c | ikev2 g^x c3 53 13 8f 2a fb e3 93 47 36 6a 2c 3e 5b e2 b0 | ikev2 g^x 72 17 1d b0 34 33 da 2e 57 d4 77 d4 d7 37 4b 04 | ikev2 g^x e0 fd 56 ba 03 09 e0 ee 03 55 18 7a 06 0c cf 4c | ikev2 g^x 2a 51 58 97 6d b9 c7 55 61 75 dd e7 d8 0d 3a 1d | ikev2 g^x 49 6c f2 e4 06 70 89 d9 24 cc ed 33 51 12 2c eb | ikev2 g^x 69 6c 48 51 d3 c5 03 79 af 69 1b 7c 09 b9 68 90 | ikev2 g^x b7 fa 26 e6 18 f8 80 d5 96 f3 c9 3f f4 18 bb d2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 11 b2 a5 5c a6 46 80 f9 3d 23 f2 ab ce 5d 83 0a | IKEv2 nonce f1 1a 01 82 7c 29 4c e1 e5 d0 ae 3c 95 98 eb 20 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fc 84 28 e6 d0 d4 a3 6c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 da | natd_hash: port= 01 f4 | natd_hash: hash= 4f 29 50 5e 23 8d 7d 6b 34 9f ff eb 11 dc 43 b6 | natd_hash: hash= 12 c1 95 47 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4f 29 50 5e 23 8d 7d 6b 34 9f ff eb 11 dc 43 b6 | Notify data 12 c1 95 47 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fc 84 28 e6 d0 d4 a3 6c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a7 99 e5 52 4c 36 7b 61 4e b2 63 45 25 bf 82 23 | natd_hash: hash= 34 fa af bb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a7 99 e5 52 4c 36 7b 61 4e b2 63 45 25 bf 82 23 | Notify data 34 fa af bb | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #218 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #218: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #218 to 4294967295 after switching state | Message ID: IKE #218 skipping update_recv as MD is fake | Message ID: sent #218 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-218" #218: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.218:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #218) | fc 84 28 e6 d0 d4 a3 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 d7 19 e0 b8 a7 81 99 33 01 41 39 ef 55 14 82 | 36 e8 1e 6f 78 81 cb 8b ba 30 50 9b f0 49 c2 8d | 4d b2 2b 95 f1 d8 28 60 35 5d 42 53 4d 43 c7 8c | 4f 74 15 45 95 27 14 77 eb 50 5d 4a f6 fd be ee | 3c 1a 88 ee 70 83 66 98 31 0a fd ad 4a 03 b5 37 | 5d 2e 93 bd 7a be 39 56 60 d9 aa 84 79 74 3d 0e | dc e3 b7 0b 24 c5 94 3d 31 8b f6 0e 82 f6 06 b8 | 26 12 7e 3f 3e d6 7d b6 51 ee ad b2 d2 ab 27 77 | 53 f8 1e d7 91 5f 2a 81 5e 4e 7d 22 21 5e 55 9c | c3 53 13 8f 2a fb e3 93 47 36 6a 2c 3e 5b e2 b0 | 72 17 1d b0 34 33 da 2e 57 d4 77 d4 d7 37 4b 04 | e0 fd 56 ba 03 09 e0 ee 03 55 18 7a 06 0c cf 4c | 2a 51 58 97 6d b9 c7 55 61 75 dd e7 d8 0d 3a 1d | 49 6c f2 e4 06 70 89 d9 24 cc ed 33 51 12 2c eb | 69 6c 48 51 d3 c5 03 79 af 69 1b 7c 09 b9 68 90 | b7 fa 26 e6 18 f8 80 d5 96 f3 c9 3f f4 18 bb d2 | 29 00 00 24 11 b2 a5 5c a6 46 80 f9 3d 23 f2 ab | ce 5d 83 0a f1 1a 01 82 7c 29 4c e1 e5 d0 ae 3c | 95 98 eb 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4f 29 50 5e 23 8d 7d 6b 34 9f ff eb | 11 dc 43 b6 12 c1 95 47 00 00 00 1c 00 00 40 05 | a7 99 e5 52 4c 36 7b 61 4e b2 63 45 25 bf 82 23 | 34 fa af bb | state #218 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a45310 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45310 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #218 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 | #218 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49617.920111 | resume sending helper answer for #218 suppresed complete_v2_state_transition() and stole MD | #218 spent 0.463 milliseconds in resume sending helper answer | stop processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb340040790 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 84 28 e6 d0 d4 a3 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #218 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #218 | rejected packet: | fc 84 28 e6 d0 d4 a3 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #218: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a011f0 | handling event EVENT_RETRANSMIT for parent state #199 | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #199 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #199 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49617.938599; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002935 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a272b0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #199 | libevent_malloc: new ptr-libevent@0x7fb340040790 size 128 "road-eastnet-nonat-199" #199: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #199) | 27 d1 6c c4 4c 84 e3 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 f7 e5 ae 44 da 7b a1 b1 3e 44 fb ef 82 32 77 | a0 c2 72 43 50 19 7e 5e c7 1d 24 fa 9d 99 ff 71 | 44 54 82 8e cd bf 0f 40 ad 0d 4a 27 75 78 aa 64 | 63 e6 66 6d e9 bf 1f 5a 74 65 bf 0f ba 29 57 51 | 0a 44 9c 16 52 28 db 48 f9 d7 ab e8 1e 98 b5 a0 | ff 9d 9d 22 6a 26 d5 06 1f b5 07 29 59 d7 ec 33 | 10 b5 a0 31 95 73 ec 20 a2 11 23 56 06 d8 ad a2 | 6d 0f c8 00 64 2f 99 96 5d d2 5b a5 dd 2c 34 78 | ce 80 35 74 5d 74 56 55 47 bf 15 c1 84 c7 0f 64 | a6 70 c6 99 14 c9 d9 b3 02 6a 70 83 2d ca 4f aa | b9 b4 39 e1 b3 2e 81 8c 26 1f 8e f8 1a b1 b1 4b | b0 9b 0a c4 8c 38 2e 14 24 c9 96 c5 ae 69 55 cb | f9 3b a1 e1 2b 54 42 88 42 2f d5 f9 04 ab 91 7e | 86 11 e3 bd 2a 54 c0 da 96 34 89 6a 25 46 14 93 | 51 fb 1f 2b bf 29 76 41 f2 16 a8 f5 e3 fb 49 39 | 86 d5 c2 41 0f 92 03 df 3b a9 75 b2 e3 1f cd 5c | 29 00 00 24 ce b1 60 ec b2 6d 5b aa dc 41 a3 c6 | 5b 6b 71 42 8d 0b d4 85 d2 79 6d f3 81 c0 ff 8a | e8 8f f9 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b6 28 45 f6 47 a9 89 2b f2 e1 02 | ea 34 3a fc e5 a7 2b f1 00 00 00 1c 00 00 40 05 | a9 d3 87 ec eb bf 81 b0 18 6d 86 a6 a8 63 05 fc | 1c 93 4f b5 | libevent_free: release ptr-libevent@0x7fb388032bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a011f0 | #199 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 d1 6c c4 4c 84 e3 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #199 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #199 | rejected packet: | 27 d1 6c c4 4c 84 e3 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #199: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0677 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_RETRANSMIT for parent state #15 | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #15 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #15 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49617.95885; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009657 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a12c70 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #15 | libevent_malloc: new ptr-libevent@0x7fb388032bf0 size 128 "road-eastnet-nonat-15" #15: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #15) | 26 a2 6e 3b 12 a8 59 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 6b 03 2b 64 b1 a2 70 7f 8d ca f2 6f 54 de 1b | 11 e2 1d 10 c1 2b 3c 5f 6d e7 ca 6d ea a7 28 53 | d6 4f 75 27 52 bc 43 63 3a ab 63 49 ff c4 e6 b2 | 78 96 18 25 61 28 7f 9b 98 22 5e da 00 8c e8 eb | 6c 4d 9e 76 25 8b 7a 47 ab 33 22 55 42 23 3f c1 | 32 ba e7 e4 c9 4a 5f 0d 8b 0d 29 12 b2 18 5b ef | 5f af 09 c8 a4 7c fe 53 bc 8e 96 c3 8e be 32 ff | 43 00 6d 58 cd 42 72 b2 1b fc 90 55 08 bf 9d 89 | 5e b3 d9 d7 ab 1d c3 3d 09 0d c3 a0 b4 39 9a 0c | ea 26 37 38 25 17 00 86 5a bc 7b e6 34 6a b8 82 | f3 f9 2d 18 8b 60 8a e1 44 59 97 9d 3d 8f e9 c5 | f8 41 9b cd 41 cb 5c 6e 45 99 77 f2 5a 87 7b f0 | 1d 7f 22 98 41 7d c2 e4 77 82 d2 02 ca 3f 14 b4 | ed 6e 31 66 40 7e 40 f0 ba 85 c9 d3 8f 47 3c 65 | b9 d2 a6 cf 54 28 00 31 9f 56 44 5d 75 4a b4 99 | 1b dd 03 d3 13 f1 55 d7 db 2e bc 45 cf 65 35 32 | 29 00 00 24 67 e3 6e 73 a7 21 14 7b f9 65 b0 3b | c5 ad 46 44 e6 80 5b 79 23 9d d2 69 99 df e6 8a | c8 33 da 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 9d 30 3b 19 a7 57 ef 03 62 55 06 | 80 94 c0 4d a8 e2 a5 61 00 00 00 1c 00 00 40 05 | d9 d1 f1 c9 94 93 28 e9 a6 95 bd a3 15 8f 8e 30 | 15 95 ff 3f | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | #15 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 a2 6e 3b 12 a8 59 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #15 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #15 | rejected packet: | 26 a2 6e 3b 12 a8 59 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #15: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0711 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a205f0 | handling event EVENT_RETRANSMIT for parent state #117 | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #117 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #117 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49617.970843; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.008121 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #117 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 "road-eastnet-nonat-117" #117: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #117) | 4a b5 59 cb ed d6 a3 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 62 d1 99 4b 20 24 18 5d d2 31 2a 1c e6 82 aa | d2 1a 74 70 f8 1e f2 71 00 48 0a 80 0d 91 e6 e0 | e0 7b 66 1e 0f a2 c5 f3 2e cc 8d 72 40 de 7d 14 | e0 b7 d4 a2 80 96 97 77 ac ba 2b fb 1f 79 f2 32 | 8b a5 84 65 3d e1 3e 2e 60 82 26 3f 6d cf 4b 43 | 84 0b 96 d0 d5 70 61 64 4c 71 e0 b1 63 e8 0c 82 | 17 82 85 c0 c3 eb d9 cf 4e b8 f4 b1 87 57 e5 c1 | 06 2a d8 41 87 ab aa ec 3f f6 5e ac 9b 45 ab a8 | 0b e4 13 8d 76 0c 8c 2b 1f d4 61 19 ad 16 37 d8 | d0 65 3e 14 53 34 26 1a a6 5e 31 57 79 20 50 43 | 71 29 f3 4a 86 68 0e 08 74 59 1e 0f 6e 37 0c 10 | b2 e1 5f 52 67 c2 35 e3 ff 31 9d c5 bb 7f 45 96 | 61 58 38 40 0e b5 86 40 8f 24 ab 5a 52 cc 83 a1 | 23 61 7d 29 78 a8 96 57 13 15 75 48 5f 5a 5b 21 | 7b dd 4e 50 1d 23 67 01 84 5f f8 e7 69 4f 16 1a | 7e b5 9f 38 da 45 67 22 75 50 ab b6 62 cc cb 76 | 29 00 00 24 c3 7a 28 6c 12 59 4b e7 9f 08 e5 89 | 61 e9 dd c1 64 c5 cd 33 70 a1 b8 fb a5 4b b4 8c | 0b 78 ad a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 90 26 e7 b8 63 3c dc 5c 03 43 0c | 57 b3 5f a9 02 48 0a b5 00 00 00 1c 00 00 40 05 | 75 50 aa 52 d7 4b 1d bd 0c f6 2a 37 d5 af e8 8d | 12 a0 66 45 | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a205f0 | #117 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36000d120 | handling event EVENT_RETRANSMIT for parent state #214 | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #214 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #214 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49617.971027; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501533 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ffbf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #214 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 "road-eastnet-nonat-214" #214: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #214) | 4f 29 16 ab 3e 1b 1d 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 9a ad a4 54 39 e9 04 15 a2 a4 f0 c8 dc 49 94 | 47 5a 04 64 04 57 79 8f 63 87 e7 ae b7 39 62 ec | 47 13 85 3d 4e a0 14 32 15 25 a6 7d a4 f2 aa aa | 67 17 a5 b2 08 db fc bd dc 96 aa 21 e7 a5 f2 3b | 34 82 35 14 fb 4a be 16 a9 a7 92 42 29 b2 17 4d | 52 27 87 ea b1 3a fa 6c 11 62 48 2f 81 f0 58 f6 | 6c 8b 54 c6 3c a7 1a eb fd 0e 51 2e 43 a1 67 7f | 52 b6 51 7f f1 6a 5e 3d a1 55 84 4d aa 64 fa dd | d4 68 19 0a 1c f1 aa ed d1 aa 12 27 11 44 c1 42 | 4c 3e ce c4 42 e7 8a 9f 52 d8 86 65 33 7c 9a 6a | ee 61 16 79 e0 6f bf 94 55 b9 32 ad 6e 68 90 17 | bb 0e f5 75 b4 7f bb 34 59 92 4e 2a eb db ac 26 | 62 0d 79 8b 29 38 a9 d3 9a dc 81 9e 5b 01 b1 77 | b2 97 be 93 40 8c 22 a8 ed c3 3b 34 e3 61 26 ff | 40 f0 34 c1 02 20 28 94 a9 ac e5 14 88 22 c0 0f | 0a ad af f1 ac 83 5f 84 02 43 33 bf d4 08 dc 06 | 29 00 00 24 dc 16 0d 02 e8 ab 94 84 4c 26 85 d4 | 77 69 31 1b 43 d5 c1 b1 2c a0 69 25 59 ad 36 b7 | 5c 40 16 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 ae d6 cb 98 74 13 91 af 99 ac 97 | 02 1b 9a 5a 71 bb 20 28 00 00 00 1c 00 00 40 05 | 20 56 0b 1b ec fa 37 e0 47 28 94 e0 2b 28 be ff | 21 7d 56 5a | libevent_free: release ptr-libevent@0x7fb360012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000d120 | #214 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a8ee40 | handling event EVENT_RETRANSMIT for parent state #176 | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #176 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #176 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49617.971161; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004135 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #176 | libevent_malloc: new ptr-libevent@0x7fb360012840 size 128 "road-eastnet-nonat-176" #176: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #176) | a4 22 94 6b b7 90 01 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 06 20 a9 49 fb 93 2b 74 d8 83 cb 06 8c 55 7f 57 | 5d f1 cc 70 90 ee ee 41 59 8d d1 e4 58 c0 02 89 | 12 8f 04 73 87 28 bc ec 0e 96 08 f0 49 03 74 3b | 4f eb c4 d0 c6 21 f7 38 1b 92 1e f3 ba 46 7f 28 | b7 fb 3b 9f fa d9 3a 39 83 bb a2 23 67 98 f1 b5 | a1 a5 1f cd 74 bb 92 db b0 18 17 3e 12 cd 1b ef | c7 08 37 6b 02 81 e5 23 06 48 6f 12 26 7a 04 03 | 41 41 ce c5 75 5e 67 35 c5 ce e1 ac d5 40 0e 48 | 02 a1 2b 2d 14 1a 42 85 97 cf d2 fc 57 8d 5d de | 6b d9 22 6f 79 7d c3 c2 dd 65 20 aa 1d 5b 57 40 | a0 1a 0e 1e 45 35 58 17 0b 20 5c b0 ba 44 7d db | a2 bd 64 77 9a d5 0b a1 b5 5c 94 07 3a 31 f0 5b | 14 75 f7 58 da e1 d3 e6 78 67 58 17 31 77 19 91 | 11 0f cf 7e 64 09 ce c1 12 cf d6 40 b9 60 dd 56 | e1 a2 ed 56 fd 45 7f 51 84 03 0b 96 6c a0 15 97 | 40 65 89 e3 a9 b7 e3 e5 5a 24 e4 6f 77 a5 63 fc | 29 00 00 24 bc 2f bb 65 01 f5 95 86 7b 82 6d a7 | 33 bf 89 13 08 c1 15 eb 66 27 ad 6e 9d 4d 82 1c | fe 4f 3f 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 44 db b2 76 4d c5 a9 b2 17 20 52 | 87 84 27 9b ed 5c 63 75 00 00 00 1c 00 00 40 05 | 53 a7 06 a0 b6 ee 02 94 c4 3e c2 3c 5b 31 75 91 | 62 98 b0 aa | libevent_free: release ptr-libevent@0x7fb36c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee40 | #176 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a b5 59 cb ed d6 a3 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #117 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #117 | rejected packet: | 4a b5 59 cb ed d6 a3 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #117: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 29 16 ab 3e 1b 1d 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #214 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #214 | rejected packet: | 4f 29 16 ab 3e 1b 1d 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #214: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0556 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 22 94 6b b7 90 01 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #176 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #176 | rejected packet: | a4 22 94 6b b7 90 01 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #176: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0548 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae8980 | handling event EVENT_RETRANSMIT for parent state #209 | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #209 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #209 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49617.978836; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002087 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee40 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #209 | libevent_malloc: new ptr-libevent@0x7fb36c0251c0 size 128 "road-eastnet-nonat-209" #209: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #209) | 94 c0 53 32 b7 6b d2 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa aa 8f b6 87 c3 5d 98 e8 47 9c 34 3c ba fd c2 | 26 06 ee 61 85 3c e9 e8 7d e0 7a e3 30 dc 26 ae | 92 30 41 01 44 74 f7 33 20 3e 9d c4 91 ce 67 c8 | 16 8f 2d 63 7e 65 88 2d 42 e0 e7 51 27 b9 54 c3 | cb 64 94 8c 44 0b bb aa 89 37 4f 4c 19 3a 97 c2 | a7 78 bb a9 b6 bc c5 9a 0d 18 1b 6f 6c 81 28 5f | 96 22 7f 4e e9 03 4f f8 d6 4d 77 d5 fe b9 d2 6d | cd 7d 32 95 3a ae 28 68 07 70 28 76 ea 67 8a a4 | 02 0f 70 b8 39 d5 ef 06 00 8a 9d f6 62 11 fb 55 | 5d 2a 4e 92 67 d8 83 81 5c e2 b4 e7 58 f2 f1 29 | e2 e9 12 6d a8 99 db 90 fa c3 c7 67 22 60 c4 0d | b5 aa 8e 50 88 98 a0 7e 46 1d 18 c2 ea bc 90 f9 | 2c 89 53 10 11 da ca 7e 79 27 58 0a 97 be f4 b6 | df 47 81 cd fc cb 51 b6 90 69 20 0a b1 64 c6 52 | f3 67 4f b9 89 27 0d 82 44 e6 02 ff 6a 0a a5 77 | bc 54 13 6b 28 ab 23 fb 03 b0 ab d8 e9 7c 16 89 | 29 00 00 24 32 f5 dd 6d be 9b 09 7c 2d 16 66 7c | 9d 31 58 f8 20 f4 30 10 2d 04 04 00 c5 24 46 19 | 07 98 5b 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 be 30 60 49 91 51 94 d8 39 4f be | 6e 81 91 5e 2f 8c 88 7e 00 00 00 1c 00 00 40 05 | 2d 19 47 e1 25 d9 8a e8 d3 7e a2 ad 7d 2a 38 10 | 8b 55 bc a7 | libevent_free: release ptr-libevent@0x7fb3500407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae8980 | #209 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 c0 53 32 b7 6b d2 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #209 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #209 | rejected packet: | 94 c0 53 32 b7 6b d2 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #209: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0649 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abe780 | handling event EVENT_RETRANSMIT for parent state #118 | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #118 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #118 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49618.029786; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006041 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae8980 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #118 | libevent_malloc: new ptr-libevent@0x7fb3500407f0 size 128 "road-eastnet-nonat-118" #118: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #118) | 8e a7 a4 7e e9 0a bc a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a ec c5 01 c5 e9 b5 94 ac 43 67 db 08 47 bd 0c | 54 49 81 74 3a 3b f9 51 2c 6b 48 98 c1 d5 7c ee | 4b 95 1c 5e 71 e6 0b 08 a0 85 de c0 1d ef b9 d0 | 5c f8 32 2b 5d f8 44 47 b6 dc c5 4b 50 10 f9 77 | 99 80 83 bc 5c bf 6a 79 a5 41 39 97 c6 b0 17 4c | 84 d1 fa 16 7a 7a 3e e5 51 2d fc 5d b0 66 e1 6f | 66 c6 ed f3 a4 54 56 06 ac 5d ee b2 4b 4a 38 5f | aa 09 29 91 e5 8c 9b 64 60 8e 7c f6 86 7a 07 43 | f1 93 d1 26 4a 28 da b7 0c a1 1a 0c 4c d6 c5 1f | ee f5 92 b2 e4 15 93 35 4c 07 88 be ec 21 4e 23 | f9 ed 56 db b0 43 b1 c7 7d 57 a1 20 bb 88 d2 9a | 23 9e be ef e2 0d b6 dc 67 12 32 69 0b ef 17 5f | 45 8b bf 08 ff c1 84 fb d6 41 58 81 ba c4 68 e8 | 6d 5c 50 c4 fa 14 2d 1e b6 d3 3f da 53 ee 59 40 | e0 c2 e3 5e 46 f4 96 f5 35 c7 87 50 c6 81 32 4e | 30 f8 e6 fa a0 f5 a3 88 f0 51 68 02 71 eb f4 fa | 29 00 00 24 fc fa 6f 0b ed d7 fd 9b f1 eb 70 56 | 1f a0 0f 98 c6 28 ab da a8 c2 09 53 33 ea a7 33 | 5c 74 50 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e 87 94 32 ac f3 4e 0f e0 49 b5 2d | ec 68 6c 45 41 83 dc 40 00 00 00 1c 00 00 40 05 | e8 e9 7b b7 56 9d 8b dd 59 77 e6 95 c2 ea 88 7c | d5 64 a3 dc | libevent_free: release ptr-libevent@0x7fb3500300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe780 | #118 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e a7 a4 7e e9 0a bc a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #118 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #118 | rejected packet: | 8e a7 a4 7e e9 0a bc a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #118: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-219" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-219' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #219 at 0x557d46aff080 | State DB: adding IKEv2 state #219 in UNDEFINED | pstats #219 ikev2.ike started | Message ID: init #219: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #219: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #219; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-219" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-219" IKE SA #219 "road-eastnet-nonat-219" "road-eastnet-nonat-219" #219: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-219 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-219": constructed local IKE proposals for road-eastnet-nonat-219 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 219 for state #219 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46abe780 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #219 | libevent_malloc: new ptr-libevent@0x7fb3500300e0 size 128 | #219 spent 0.163 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-219" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.249 milliseconds in whack | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #200 | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #200 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #200 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49618.033742; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.006325 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a205f0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #200 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 "road-eastnet-nonat-200" #200: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #200) | 75 f9 3c ee 3d 43 50 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d d7 f4 2c e9 d8 b4 58 bc f6 5c 68 d0 e8 20 d2 | 70 0a 56 63 f6 74 43 04 b4 cd d8 23 88 fe c7 f6 | 1e d9 bd ee 25 c8 67 c7 2d b9 d9 c6 54 ca cd 9c | 4d 78 05 42 6a b4 88 a1 71 4e fd 59 90 2e 53 a1 | 4c c1 78 ca ca ed 13 0b 48 7e 72 f2 de cc bf 74 | d8 13 14 01 89 5b 3d f3 26 5d 17 ef 74 28 fa a9 | a5 86 f8 17 01 9e 46 6d 69 c4 ce 7b 85 c2 8b f2 | 6a 40 21 88 6b 4c 0d e0 b2 55 9a f1 b6 c4 a5 34 | 5e ea a9 16 4b 7b 22 02 6e b5 62 bf 0e 13 c4 75 | 5a f6 47 5c d0 c2 01 a3 46 b7 b7 ca c6 5e f6 e3 | 79 8e 25 ba 76 6d ee 11 df 8f 10 22 5f 50 31 f4 | b3 77 76 36 47 ec 67 35 64 4d 22 bd 77 3c 61 d0 | 1c 1c ab b4 d6 cf e4 0f 57 21 d8 30 aa 58 f6 84 | a1 48 51 27 85 8c 83 cc 89 77 d2 37 58 0f 1d e2 | 1d d9 35 ce 76 2e 8b 0d 16 1d 75 c0 13 c5 08 c0 | 3c d5 3b aa 74 68 e3 69 d7 c9 6b 6b d6 2e 6c a1 | 29 00 00 24 0e 33 98 69 ac 19 40 8d 23 0b bc 95 | 8f 5a 8e 62 b3 f7 97 e2 1f 4f da 87 39 88 58 8e | fe 30 e9 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 45 f2 7a b7 3f 1c 77 84 16 29 66 | 7f d3 6a c0 22 39 cf e5 00 00 00 1c 00 00 40 05 | a7 72 f7 48 87 f0 01 9a b9 14 bf 98 e7 f8 65 3b | c7 d8 2f ed | libevent_free: release ptr-libevent@0x7fb364017f20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #200 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 f9 3c ee 3d 43 50 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #200 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #200 | rejected packet: | 75 f9 3c ee 3d 43 50 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #200: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0649 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 5 resuming | crypto helper 5 starting work-order 219 for state #219 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 219 | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 219 time elapsed 0.000907 seconds | (#219) spent 0.914 milliseconds in crypto helper computing work-order 219: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 219 for state #219 to event queue | scheduling resume sending helper answer for #219 | libevent_malloc: new ptr-libevent@0x7fb3440407f0 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #219 | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 219 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #219 | **emit ISAKMP Message: | initiator cookie: | 7d 80 b0 77 1f 48 77 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-219 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d7 87 5e 24 5c db 31 0a 96 84 9d 90 05 c1 73 ea | ikev2 g^x 13 fd da 1a eb 02 9b 1b a2 ef f5 1e 7d d5 07 48 | ikev2 g^x 63 2b 15 ef 39 49 2f 72 57 96 fc d0 52 b7 b4 5b | ikev2 g^x b9 8f 1f 7d 66 98 1a 54 e8 35 20 c8 da d6 6b 14 | ikev2 g^x 12 96 09 73 f0 2a 18 19 ad 4f ad c0 e9 02 7d bf | ikev2 g^x 91 ef d7 b5 3d bf 72 91 c2 b3 4a 21 80 f5 15 86 | ikev2 g^x f5 a2 c4 99 67 47 6c 96 fc e1 53 b9 1a ff ad 2e | ikev2 g^x 5a 73 b4 6f 29 39 2a 43 c9 46 c0 b4 6f 20 2e 1e | ikev2 g^x 67 a0 45 fd 13 c6 d4 73 ef 07 78 d4 9f 67 9c 74 | ikev2 g^x b8 b8 8b 57 22 93 1b 6e 1c 48 7c 01 8f e1 37 24 | ikev2 g^x ca 0b 69 5d 4d 5a 11 fe 79 69 f3 19 5f e1 13 01 | ikev2 g^x 72 da c7 1d 2e 2d 95 6b 1a 0c 79 15 cc 16 3b c9 | ikev2 g^x df 53 b2 62 55 3b 89 98 3a 35 b4 a3 d8 f7 72 66 | ikev2 g^x 5a 4a cd 05 1d 45 02 1c a4 80 ce 7b 71 ea 76 a3 | ikev2 g^x 4c 87 0d 5f a5 5d 61 29 09 d4 52 68 95 1e 6d d6 | ikev2 g^x 81 6a 00 e1 92 ed bb e5 1a 97 43 9e cf 2e 23 af | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3d 29 6e 63 66 7a 35 4b 56 6e f9 8b 96 51 14 3b | IKEv2 nonce cc a7 be 10 65 46 ea 6e 67 b7 cd b3 c7 62 bc 02 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7d 80 b0 77 1f 48 77 e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 db | natd_hash: port= 01 f4 | natd_hash: hash= 65 d7 c1 a6 5e c6 d2 33 1c 31 12 89 58 68 2a 17 | natd_hash: hash= e1 05 d4 0f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 65 d7 c1 a6 5e c6 d2 33 1c 31 12 89 58 68 2a 17 | Notify data e1 05 d4 0f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7d 80 b0 77 1f 48 77 e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 8f 01 0b 19 90 57 cd de dd b3 66 c4 60 3d 67 fe | natd_hash: hash= 89 ed 52 b0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8f 01 0b 19 90 57 cd de dd b3 66 c4 60 3d 67 fe | Notify data 89 ed 52 b0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #219 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #219: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #219 to 4294967295 after switching state | Message ID: IKE #219 skipping update_recv as MD is fake | Message ID: sent #219 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-219" #219: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.219:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #219) | 7d 80 b0 77 1f 48 77 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 87 5e 24 5c db 31 0a 96 84 9d 90 05 c1 73 ea | 13 fd da 1a eb 02 9b 1b a2 ef f5 1e 7d d5 07 48 | 63 2b 15 ef 39 49 2f 72 57 96 fc d0 52 b7 b4 5b | b9 8f 1f 7d 66 98 1a 54 e8 35 20 c8 da d6 6b 14 | 12 96 09 73 f0 2a 18 19 ad 4f ad c0 e9 02 7d bf | 91 ef d7 b5 3d bf 72 91 c2 b3 4a 21 80 f5 15 86 | f5 a2 c4 99 67 47 6c 96 fc e1 53 b9 1a ff ad 2e | 5a 73 b4 6f 29 39 2a 43 c9 46 c0 b4 6f 20 2e 1e | 67 a0 45 fd 13 c6 d4 73 ef 07 78 d4 9f 67 9c 74 | b8 b8 8b 57 22 93 1b 6e 1c 48 7c 01 8f e1 37 24 | ca 0b 69 5d 4d 5a 11 fe 79 69 f3 19 5f e1 13 01 | 72 da c7 1d 2e 2d 95 6b 1a 0c 79 15 cc 16 3b c9 | df 53 b2 62 55 3b 89 98 3a 35 b4 a3 d8 f7 72 66 | 5a 4a cd 05 1d 45 02 1c a4 80 ce 7b 71 ea 76 a3 | 4c 87 0d 5f a5 5d 61 29 09 d4 52 68 95 1e 6d d6 | 81 6a 00 e1 92 ed bb e5 1a 97 43 9e cf 2e 23 af | 29 00 00 24 3d 29 6e 63 66 7a 35 4b 56 6e f9 8b | 96 51 14 3b cc a7 be 10 65 46 ea 6e 67 b7 cd b3 | c7 62 bc 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 d7 c1 a6 5e c6 d2 33 1c 31 12 89 | 58 68 2a 17 e1 05 d4 0f 00 00 00 1c 00 00 40 05 | 8f 01 0b 19 90 57 cd de dd b3 66 c4 60 3d 67 fe | 89 ed 52 b0 | state #219 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3500300e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46abe780 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe780 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #219 | libevent_malloc: new ptr-libevent@0x7fb3500300e0 size 128 | #219 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49618.035415 | resume sending helper answer for #219 suppresed complete_v2_state_transition() and stole MD | #219 spent 0.448 milliseconds in resume sending helper answer | stop processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3440407f0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 80 b0 77 1f 48 77 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #219 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #219 | rejected packet: | 7d 80 b0 77 1f 48 77 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #219: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0576 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aaf800 | handling event EVENT_RETRANSMIT for parent state #210 | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #210 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #210 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49618.053625; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001686 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #210 | libevent_malloc: new ptr-libevent@0x7fb3440407f0 size 128 "road-eastnet-nonat-210" #210: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #210) | aa f0 6c 1e 8f b0 d8 5f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 2f d8 9e b6 32 84 b3 62 ee 33 24 ed 0e fd d4 | fb 0e fa b0 5a fb 4d c1 44 66 ed 6c d9 22 6b 05 | 5a 31 76 75 51 2d 58 63 68 30 79 28 a1 8c f7 58 | 78 1f ed 9b 41 29 7f de 5e 35 7e 32 cc 4f eb 97 | f3 d2 34 17 b1 d4 d0 fd f0 52 da 3a 73 a4 1f 58 | 68 7e 43 79 1c f9 07 46 32 fb 81 59 a1 8b 36 99 | 63 59 69 2b 65 b6 49 f0 2c 89 5f 6f 77 04 35 7e | de cb d9 d5 71 0b 78 b5 5b 65 ab a6 ce 91 19 fa | 51 58 77 c1 4e 94 ff 17 29 dc 29 f8 bd 1c c5 36 | 82 f3 20 0b 04 da 30 59 b0 d1 05 3e 3f aa ef 6a | 84 97 f2 ea a5 27 2e 15 1e f4 66 a5 d9 21 ce 67 | e8 bd 44 de 20 df 28 17 c9 3c 33 10 eb 28 78 7e | 45 57 17 c5 4c aa eb a9 d1 47 13 10 17 f0 99 19 | db 6b d3 97 fa 92 c7 c8 43 99 f3 77 fc f5 56 ad | 75 cc 5d 24 35 8b 29 95 64 a0 e4 4c e0 27 1c 2a | fb fd b3 6d 87 9d 4a e7 f3 e4 fa 49 6c 90 9e db | 29 00 00 24 b7 0e 02 eb 9f 32 9f 45 44 47 90 9f | 97 de 23 e8 e1 c4 97 88 69 d1 3d 46 ce 63 23 0a | 5b 61 d3 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 f2 e2 75 79 7b 92 3c e8 e4 c1 f3 | d5 ae c0 9c c7 8c de 57 00 00 00 1c 00 00 40 05 | a7 24 70 f0 1a 13 21 fc 21 f0 f5 1e 72 fd 1a 35 | c3 6c 26 99 | libevent_free: release ptr-libevent@0x7fb34001f920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aaf800 | #210 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #215 | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #215 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #215 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49618.053807; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50062 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aaf800 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #215 | libevent_malloc: new ptr-libevent@0x7fb34001f920 size 128 "road-eastnet-nonat-215" #215: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #215) | c5 c0 dd cc b6 af 51 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 5c 66 6c 45 6f a8 d2 4f 25 98 20 11 a6 a1 bb | 37 55 34 73 15 5d a4 49 35 cd f6 0a 9e e7 f3 5c | ad 42 56 ef b0 f4 fa f6 d5 ba 84 d6 dc e0 5f 55 | dc 55 56 f2 be 03 fe 4f 4a b4 66 3c 99 cb 71 e7 | b6 73 b2 44 ce 0d f7 96 90 78 2f 50 92 28 ba f9 | 22 e7 15 cf fa c8 47 f5 0c 38 c1 8a 24 5b 39 a8 | ac 47 31 ea aa c2 b1 57 78 79 5e 0b a7 a0 33 1b | 86 d9 45 31 c0 29 bb 67 d1 68 a7 f5 10 84 25 ff | 4c 83 f7 42 1d c4 e6 b7 53 b1 ed 6d 1b f7 86 9b | 3e cc 2d ee 22 b8 61 e0 e7 95 7c e8 c8 d8 b2 10 | 06 d9 50 52 8e 07 0b 4b 94 83 c7 4b 90 09 3a d9 | 8a 35 2d 83 36 bb 75 45 45 1c cf c0 11 7f 85 8d | ec e0 a4 ca 58 99 97 8b 10 af 58 2d b7 9b a7 f0 | a5 cb ea 38 04 fe 36 b9 b4 81 1d 8f 85 c7 76 a8 | d9 30 86 6d bd 32 3b 6b 02 28 ec 10 b1 28 43 17 | 56 d4 9e 0c 76 ce cc 71 e8 70 44 59 5e b3 3a a2 | 29 00 00 24 21 81 d6 ee 95 75 07 f2 b0 ff 0f d3 | a2 c0 2b d7 de b5 1b 67 08 ca 6e a7 a2 d0 6b ed | 6d c9 d5 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c 19 de 62 93 d0 a4 3d 26 c7 25 16 | 8c 72 93 29 4a 06 74 1d 00 00 00 1c 00 00 40 05 | 5e 68 d5 fe 16 1c 49 30 75 2d c6 7b 65 a2 b6 24 | 10 76 bd 1f | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #215 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | aa f0 6c 1e 8f b0 d8 5f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #210 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #210 | rejected packet: | aa f0 6c 1e 8f b0 d8 5f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #210: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 c0 dd cc b6 af 51 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #215 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #215 | rejected packet: | c5 c0 dd cc b6 af 51 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #215: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0549 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #177 | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #177 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #177 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49618.058171; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004032 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #177 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 "road-eastnet-nonat-177" #177: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #177) | 18 be 44 9b 6e ed 30 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 07 e3 cb ba 41 f5 29 89 53 b2 f3 1e 5e 07 87 | e1 d5 ed d4 f7 64 97 f7 8a 96 5e a4 19 72 f5 99 | db af d0 a6 4b 51 f7 55 92 f6 5e e0 30 09 2c b6 | 43 a0 4f d7 6f e1 d3 20 57 34 04 7c 3d 9a 99 83 | f9 a3 8a 6a fe fe a9 91 f2 83 44 a1 2d af 4b ef | b0 18 e4 e4 62 e5 83 a7 cf b5 7d ca 15 6b 57 02 | c4 53 c6 7f f4 9f 1d 3d 3b b0 8c b2 2b 17 6d 36 | 19 38 bf 55 ce 8a 72 4f 20 1b a4 9c a2 84 da e5 | 7c f0 4b de 9a 22 9d 10 b8 0c f6 b5 af 79 8d d9 | c7 ca 65 16 d7 e0 a1 a8 7f e6 15 6a 53 ef 5b f4 | a2 b4 0d 9c 61 31 ea 4a 75 b2 62 d9 d6 fe 75 27 | 38 c2 d0 97 b9 a4 b7 2c 60 e6 08 ea 3f 0a 15 59 | f6 77 c4 7c d1 46 84 4f f2 09 1e c0 00 e1 c8 65 | bf 5e 6f 2d 94 6e 4c d7 96 38 7b ba 94 5a e8 e2 | 2f d6 8c 88 2d de 4f ca 52 aa 70 7a c4 e8 89 b2 | cf 3d 59 65 f1 b7 65 b1 ff 08 3f df 87 d6 e3 b4 | 29 00 00 24 06 53 6b 3a e9 83 68 db aa 70 45 4d | fe 90 0e f2 c3 a1 be 18 1d d8 e7 bb b9 75 13 f1 | bb b6 76 91 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 1b 1a a2 88 2e 9b 85 cb bf 3f e0 | 58 f8 7a 1a ca d0 ae de 00 00 00 1c 00 00 40 05 | 46 28 df e2 d1 63 c9 0b 29 af bd b8 e5 56 e6 b6 | 34 92 84 18 | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #177 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 18 be 44 9b 6e ed 30 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #177 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #177 | rejected packet: | 18 be 44 9b 6e ed 30 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #177: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ef4e0 | handling event EVENT_RETRANSMIT for parent state #119 | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #119 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #119 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49618.089986; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005659 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #119 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 "road-eastnet-nonat-119" #119: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #119) | ec af 1e 58 4f bc 16 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee 25 46 13 3c ef fe 01 ba 63 b1 50 ca a7 dd f5 | 7a b0 49 43 35 e3 74 57 d0 52 bc 3a b2 ee 6b 2d | 57 80 2f df 71 ea 94 b3 0a 0c 7b 41 50 c2 f6 7a | 6e 96 5b 3d 0d 51 9a 0b a0 fa d0 8d d8 98 f0 45 | d5 fa eb 0a f5 ea 33 8d ee 1d 3f cb 09 35 dc f7 | 0d a7 89 25 f9 a6 f9 a3 0f 9a 3d b0 bb 98 db 2a | 8f f4 ad 7f 6a ae b3 bd df 23 e8 8d 52 72 79 9f | 3d 34 85 f2 e2 b4 d7 cc 39 ee a0 dc 64 4f fa 2a | a9 30 c6 c2 7a 7a 1d cd 26 c0 0f 55 58 ed 9d 22 | c6 a1 9c 81 01 bd 16 3d 36 47 70 a1 46 0d 07 ca | 5c 2f 9d 3c 24 d8 e7 19 57 44 18 a0 58 ed b0 c8 | 65 f2 98 6e 64 04 01 87 4d c3 6e 78 76 c5 fa ee | ff 60 94 9e 6a fc 5b 5e 1a 15 3a a6 4d fe ba 28 | 39 70 2d 49 9e b7 11 89 3d 89 a8 26 59 f3 51 ef | 05 36 27 99 84 62 16 13 24 49 d2 7d b9 18 a2 21 | 0f 0d 2a 9a 79 02 d0 e1 a1 af ee 7c 84 e5 76 9a | 29 00 00 24 93 ff 34 01 41 de 6e 58 b7 82 d5 c2 | 8a 60 ef 17 fc 48 d2 4e 23 80 6e 54 cf 7a 62 03 | 64 73 a8 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 43 1b c4 4b b2 17 2e 38 4e 57 6d | 6b 77 1d 82 1a c2 9c 87 00 00 00 1c 00 00 40 05 | f7 09 55 f2 00 b0 ce 9f d1 9c 54 d7 51 50 ae 6b | e8 b4 0e d9 | libevent_free: release ptr-libevent@0x7fb3540300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ef4e0 | #119 spent 0.191 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec af 1e 58 4f bc 16 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #119 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #119 | rejected packet: | ec af 1e 58 4f bc 16 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #119: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0734 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac7f80 | handling event EVENT_RETRANSMIT for parent state #201 | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #201 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #201 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49618.096027; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002645 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a011f0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #201 | libevent_malloc: new ptr-libevent@0x7fb3540300e0 size 128 "road-eastnet-nonat-201" #201: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #201) | 5f 8c 2f 98 2a b9 f9 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 72 1b 4b d5 18 dd 2d 5a 73 d0 41 7c 7e 89 a9 | 19 f8 4b 62 c1 9f f8 9d ff 76 0b e2 1f 44 b2 65 | 43 ea 94 88 bf 44 69 e7 07 70 c1 dc 59 58 cc ff | 59 19 82 57 fc 1c 37 9e a0 3e e4 f1 e5 85 09 b8 | cc 92 31 ca fd aa 7e e0 16 48 4f 93 4f 42 e6 41 | c6 d3 52 7b 4e f3 0c 48 a9 04 ea f5 d3 65 18 f4 | 8a 3e 8f 3d 66 71 a1 fb 46 fb e6 68 d4 de 30 4a | 77 d7 f7 51 80 44 5e 85 cb 41 c1 dc 19 46 1a 15 | 01 41 bb 17 40 1e c9 5b 1b 21 a1 10 c3 62 4c 55 | fa d0 3d 43 4e f3 0e a9 19 fd a5 f4 e9 a2 ac b4 | 40 11 51 f5 60 d4 30 87 a9 01 d5 04 88 71 af 01 | 0d f5 ab c7 33 ac d8 6a 80 db b1 bc 74 30 96 9e | f3 e1 bc b7 79 7c 12 ad fa 75 5d d2 23 fd a0 f7 | 3c 1c 0b d2 90 e2 83 a1 35 0f 5a b5 72 3d 6d 57 | 77 a3 af 0c 6a cb c1 58 a8 44 91 03 d0 f1 c3 69 | 53 0b 4f 4c fa 84 4b 60 c6 19 9c a4 39 a4 5b 44 | 29 00 00 24 ae be 08 16 b0 5a 8a 2b 33 7f 9f 5f | cb b1 1f 0b c0 df 08 67 ec 99 94 2a ad 60 2a 4f | 52 2c d3 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 75 8b 84 8e ba 07 72 da 16 0b 96 | fb 30 39 ca 67 c0 9f 42 00 00 00 1c 00 00 40 05 | 88 1b f0 23 47 26 b3 be 92 d6 69 de 00 cf 4d 8d | 78 92 34 e3 | libevent_free: release ptr-libevent@0x7fb360035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac7f80 | #201 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f 8c 2f 98 2a b9 f9 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #201 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #201 | rejected packet: | 5f 8c 2f 98 2a b9 f9 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #201: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0482 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a50110 | handling event EVENT_RETRANSMIT for parent state #16 | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #16 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #16 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49618.111311; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008877 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac7f80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #16 | libevent_malloc: new ptr-libevent@0x7fb360035930 size 128 "road-eastnet-nonat-16" #16: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #16) | 6b 57 6c f9 94 8d 37 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 79 95 56 0f 3a d5 d4 38 4f 8b a1 27 c3 02 1b | 5e 3a 85 e1 08 09 e6 fc a8 62 0f 43 42 55 29 b8 | e4 f9 04 77 e0 10 6e f0 87 0e 34 48 79 7d 7a e8 | ca f4 cc cc 99 09 3c b6 c2 35 0f bc 7b 2d 41 d5 | dd f7 e4 e1 a4 f1 02 00 be 44 4b 47 7e b4 a8 a2 | 62 b7 14 ca 2d 3c f6 2d ca f0 71 35 95 46 55 c7 | 1c ba 8e 83 ee 6a 95 4e 0b 06 27 00 95 fd 56 5f | a2 f2 d6 ed a0 30 96 bf 3e 03 94 41 ed 51 4c 15 | 54 db 62 3c 9c 56 76 98 56 78 f9 0d a3 f4 ac 74 | a4 8d 21 e9 c2 d6 c6 f2 bf cc ab 95 d5 b5 69 db | 99 07 4a 4f 0a fb b6 0d 07 d8 b8 7a ef c0 3c c0 | fa 7f 1c 08 05 55 7f 42 6a 4f 4e 4e 1f 35 3a 92 | 3a 9a 25 4f 7a 92 43 f1 5a 60 e4 7c d0 47 d1 12 | 01 ce a1 b9 b7 b6 c9 00 28 c2 19 89 84 44 e5 78 | 95 8c db 08 69 6a 49 44 32 07 7d 96 fb 06 00 43 | c3 4e a1 ee cd 85 94 29 a6 9f 2d d7 39 41 3b c9 | 29 00 00 24 85 0d a1 fb 37 74 4a 69 68 3b 97 74 | ca a6 8b 60 be e5 4d eb 21 82 d1 c7 17 0f 24 83 | fe 05 13 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 42 5d 5a fd 9e 39 f4 1d d5 d8 fc | 51 9a 83 f2 5f a0 b0 5a 00 00 00 1c 00 00 40 05 | 36 95 c1 ea ee d0 12 21 b4 68 71 46 60 49 f3 80 | 34 92 b4 f4 | libevent_free: release ptr-libevent@0x557d469e1b60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a50110 | #16 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b 57 6c f9 94 8d 37 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #16 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #16 | rejected packet: | 6b 57 6c f9 94 8d 37 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #16: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.067 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-220" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-220' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #220 at 0x557d46b00640 | State DB: adding IKEv2 state #220 in UNDEFINED | pstats #220 ikev2.ike started | Message ID: init #220: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #220: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #220; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-220" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-220" IKE SA #220 "road-eastnet-nonat-220" "road-eastnet-nonat-220" #220: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-220 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-220": constructed local IKE proposals for road-eastnet-nonat-220 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 220 for state #220 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a50110 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #220 | libevent_malloc: new ptr-libevent@0x557d469e1b60 size 128 | #220 spent 0.158 milliseconds in ikev2_parent_outI1() | crypto helper 3 resuming | crypto helper 3 starting work-order 220 for state #220 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 220 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-220" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.243 milliseconds in whack | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 220 time elapsed 0.001167 seconds | (#220) spent 1.02 milliseconds in crypto helper computing work-order 220: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 220 for state #220 to event queue | scheduling resume sending helper answer for #220 | libevent_malloc: new ptr-libevent@0x7fb3380407f0 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #220 | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 220 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #220 | **emit ISAKMP Message: | initiator cookie: | 46 e4 bb be 2e c2 5d 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-220 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x dd 39 4d 80 66 08 94 81 6d ee b8 9e f9 65 a1 19 | ikev2 g^x 54 a6 0a fc 14 3b 49 4b a5 b0 75 d5 8f f4 dc f0 | ikev2 g^x 1b a7 3c f6 bb e2 05 ae e7 81 f3 39 80 b8 01 f9 | ikev2 g^x 77 d5 d3 86 7b 99 e2 d3 05 f7 72 fa 5c f1 d2 51 | ikev2 g^x b2 76 8c 56 54 09 b2 f0 63 f0 63 23 b4 3d 48 f6 | ikev2 g^x f1 7c 7c 9e fe e8 97 61 67 eb 6f f5 a8 99 0f d8 | ikev2 g^x f0 a4 2a 65 98 03 64 d4 51 ad 7e ce 83 6c 68 5a | ikev2 g^x 24 81 05 98 d2 e5 16 4b 8b 3e c7 e6 5d cd e2 fb | ikev2 g^x a8 b3 8a 3b d0 a3 7d ce 4c 78 67 e6 b6 09 60 ba | ikev2 g^x f9 1c b9 ed ac 41 f4 ed a2 6c 61 ed 1a 8b 86 32 | ikev2 g^x f9 bb e7 03 fa 79 52 88 d5 55 24 b9 5c 26 d9 4f | ikev2 g^x 84 6f 26 7a 2c f2 0f 72 55 f3 04 53 6d 42 03 19 | ikev2 g^x 2c 35 89 e8 72 3a 30 cc ba be ce f2 4a 96 71 78 | ikev2 g^x 63 64 85 27 33 b9 dc 2a 58 25 92 09 0e 9f ab 45 | ikev2 g^x ad 24 0f 92 22 24 6c f4 98 77 7a 79 50 d8 2c a5 | ikev2 g^x 5a fb ac f5 20 e9 5a 93 8b 11 3b 04 5b 8e 94 e7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b8 3d f3 f9 87 d9 e7 9e 4b f1 71 60 7a f6 ea f9 | IKEv2 nonce 0f a9 84 5d c0 c1 a6 93 b2 00 5b f0 d8 3e 37 a9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 46 e4 bb be 2e c2 5d 09 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 dc | natd_hash: port= 01 f4 | natd_hash: hash= f9 77 af d4 23 66 f6 eb 62 8a 75 68 f1 14 74 bf | natd_hash: hash= 89 18 b5 2c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f9 77 af d4 23 66 f6 eb 62 8a 75 68 f1 14 74 bf | Notify data 89 18 b5 2c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 46 e4 bb be 2e c2 5d 09 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 75 8f 21 77 9e bf 74 11 1b b7 a1 b1 db ce 3f 91 | natd_hash: hash= e1 e1 a3 e9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 75 8f 21 77 9e bf 74 11 1b b7 a1 b1 db ce 3f 91 | Notify data e1 e1 a3 e9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #220 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #220: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #220 to 4294967295 after switching state | Message ID: IKE #220 skipping update_recv as MD is fake | Message ID: sent #220 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-220" #220: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.220:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #220) | 46 e4 bb be 2e c2 5d 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 39 4d 80 66 08 94 81 6d ee b8 9e f9 65 a1 19 | 54 a6 0a fc 14 3b 49 4b a5 b0 75 d5 8f f4 dc f0 | 1b a7 3c f6 bb e2 05 ae e7 81 f3 39 80 b8 01 f9 | 77 d5 d3 86 7b 99 e2 d3 05 f7 72 fa 5c f1 d2 51 | b2 76 8c 56 54 09 b2 f0 63 f0 63 23 b4 3d 48 f6 | f1 7c 7c 9e fe e8 97 61 67 eb 6f f5 a8 99 0f d8 | f0 a4 2a 65 98 03 64 d4 51 ad 7e ce 83 6c 68 5a | 24 81 05 98 d2 e5 16 4b 8b 3e c7 e6 5d cd e2 fb | a8 b3 8a 3b d0 a3 7d ce 4c 78 67 e6 b6 09 60 ba | f9 1c b9 ed ac 41 f4 ed a2 6c 61 ed 1a 8b 86 32 | f9 bb e7 03 fa 79 52 88 d5 55 24 b9 5c 26 d9 4f | 84 6f 26 7a 2c f2 0f 72 55 f3 04 53 6d 42 03 19 | 2c 35 89 e8 72 3a 30 cc ba be ce f2 4a 96 71 78 | 63 64 85 27 33 b9 dc 2a 58 25 92 09 0e 9f ab 45 | ad 24 0f 92 22 24 6c f4 98 77 7a 79 50 d8 2c a5 | 5a fb ac f5 20 e9 5a 93 8b 11 3b 04 5b 8e 94 e7 | 29 00 00 24 b8 3d f3 f9 87 d9 e7 9e 4b f1 71 60 | 7a f6 ea f9 0f a9 84 5d c0 c1 a6 93 b2 00 5b f0 | d8 3e 37 a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f9 77 af d4 23 66 f6 eb 62 8a 75 68 | f1 14 74 bf 89 18 b5 2c 00 00 00 1c 00 00 40 05 | 75 8f 21 77 9e bf 74 11 1b b7 a1 b1 db ce 3f 91 | e1 e1 a3 e9 | state #220 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x557d469e1b60 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a50110 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a50110 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #220 | libevent_malloc: new ptr-libevent@0x557d469e1b60 size 128 | #220 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49618.120865 | resume sending helper answer for #220 suppresed complete_v2_state_transition() and stole MD | #220 spent 0.466 milliseconds in resume sending helper answer | stop processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3380407f0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 e4 bb be 2e c2 5d 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #220 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #220 | rejected packet: | 46 e4 bb be 2e c2 5d 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #220: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab7a80 | handling event EVENT_RETRANSMIT for parent state #216 | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #216 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #216 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49618.143232; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501354 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ef4e0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #216 | libevent_malloc: new ptr-libevent@0x7fb3380407f0 size 128 "road-eastnet-nonat-216" #216: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #216) | e7 ef a7 cc e6 d3 f6 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 f0 d1 10 02 25 ff 09 54 9a 27 0a d6 e1 75 e9 | 4b 25 09 80 13 1a bd 53 71 22 e7 a5 75 81 d1 8a | 25 47 40 c6 b3 5d 03 6d 9e 83 d1 92 a9 46 5d 4b | 0d 28 c0 ae 0f 26 63 48 22 7d dc 47 5b d5 77 07 | 29 79 06 04 6b 6b 34 8f 3e bd d3 ec 63 f9 78 20 | 47 7a 08 c2 44 b5 60 c5 73 9a 3e 6a 29 e5 d6 96 | 62 d8 90 b5 3b c6 8d 28 1b e2 87 89 6b 14 69 c3 | 86 f7 90 a6 77 5f 07 46 5b 86 a4 37 e5 80 d5 e7 | e9 b6 1c 3b fa 48 83 e6 86 71 bb 22 3d c4 ff 70 | 08 57 53 75 69 80 73 34 3e 38 54 52 61 ad 52 b2 | 0c fc ac 12 69 16 4e 5c 14 e0 22 a5 7c 1b 1c 49 | 5d 41 d4 29 4c a2 8d 47 62 eb 64 7a 68 a3 77 fb | 8e a3 71 52 dc 60 0e ae 77 65 2b 4f c0 c2 80 7f | 93 d4 83 22 60 eb f0 ba 08 6e ef a3 c7 ae 6d c8 | ec 04 d3 0d a9 20 db 31 6f de c9 65 e4 0b a9 11 | a7 ab 82 ef 2d c1 74 f2 d3 be 19 9c 04 b0 c9 04 | 29 00 00 24 95 80 09 e7 7a 52 78 28 1a 48 0b 4c | 98 2f 28 0b b9 93 53 be d8 60 a3 a7 18 da 10 17 | 4f 70 e3 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 7b e5 1c 98 48 0c 58 81 2b 7b fc | 78 24 fa 6c 15 2c ab c0 00 00 00 1c 00 00 40 05 | 11 88 73 d8 fc 53 52 81 2d 03 8d 95 6f 83 2f ef | fe a8 7c ee | libevent_free: release ptr-libevent@0x7fb34c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab7a80 | #216 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 ef a7 cc e6 d3 f6 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #216 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #216 | rejected packet: | e7 ef a7 cc e6 d3 f6 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #216: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4ebd0 | handling event EVENT_RETRANSMIT for parent state #178 | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #178 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #178 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49618.146566; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004635 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab7a80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #178 | libevent_malloc: new ptr-libevent@0x7fb34c0180b0 size 128 "road-eastnet-nonat-178" #178: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #178) | ca 8e d5 21 04 56 f5 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 67 d8 60 5f 40 63 92 f2 6d b4 ba f5 02 b8 ef | 38 7a 12 cd 11 ce 9d 9b 17 62 5f df 94 e9 07 b5 | 67 9d c2 aa a5 fe a1 11 f4 ad b8 0d 63 27 26 1e | d8 17 fe 6f e7 68 09 0e 02 53 a4 bf 49 a0 db 19 | df 91 5e e9 b7 6f eb 81 53 29 3b eb 8c 48 64 ce | 19 01 46 02 e1 7d 00 12 d7 22 72 65 96 38 74 47 | fc 95 5b de f7 59 12 e1 89 c8 7c b4 26 93 4b 67 | 78 1e d0 18 c0 19 90 65 2b 34 10 55 57 cb 01 6d | c4 3f b5 2b 33 1e 80 2e 70 90 f3 a0 65 bd de 46 | 7d 2e 31 80 28 5c 82 45 70 58 e1 27 1c 57 b4 3b | 35 12 78 64 02 e3 69 39 84 d2 f4 a5 19 f1 96 0b | b4 1f 01 e4 be d8 4f ee 70 c6 2d 15 1b 96 dd 0a | 64 1f 43 c4 0e c9 83 9e ef 67 e0 c2 2c f3 12 d0 | 79 5e f6 25 ee e3 f8 a3 fa 94 d3 a2 a3 89 7b 98 | 74 09 e9 86 33 de 66 6c 13 2b 07 44 f9 44 67 9b | 43 01 93 ea 4d 3f aa bd f6 c6 55 44 dd 66 4b d4 | 29 00 00 24 2e 3d 1e d2 58 00 63 7b ef e7 79 ba | 26 0d 83 e4 01 3b ff 2b eb 29 12 83 06 3e 6a dc | 34 f9 2f 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 2f 67 46 e9 ec d0 44 c4 cc 2f 43 | d4 84 bf d5 2b 37 9d e7 00 00 00 1c 00 00 40 05 | 39 35 73 9e a6 30 0e 5d 9d 4e 3c 93 77 b7 78 c9 | 08 75 bf c2 | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | #178 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca 8e d5 21 04 56 f5 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #178 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #178 | rejected packet: | ca 8e d5 21 04 56 f5 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #178: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0751 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e8820 | handling event EVENT_RETRANSMIT for parent state #120 | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #120 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #120 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49618.156952; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005514 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #120 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 "road-eastnet-nonat-120" #120: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #120) | 87 fa a7 32 05 23 14 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec 6c 11 66 a6 95 d9 e6 e2 88 b9 98 2a 60 c1 38 | c4 e7 6d c7 8d 08 5f c7 b2 af 28 df 28 55 74 6b | 75 22 9e ab 67 eb 95 72 f6 3e 95 b3 15 85 4f d6 | c1 c3 2d 9e 07 29 16 41 13 5e bb cf c0 e6 4f 24 | 10 cc 57 fd 9c ba 63 ce ec 86 10 c7 d4 7c 34 a8 | a5 5b fd 1f 33 3b a2 f8 03 46 9a 66 74 53 5d 27 | bd d8 93 4e 14 8b 45 9a 6d ce b3 cb 29 f0 cc 6c | 0a 42 f4 3b 31 46 fc ae db a9 72 48 29 6a 06 1a | 3f 35 fb 97 be 23 c9 c4 df 59 9b d7 24 09 d8 73 | f7 9d 98 e5 b5 21 68 b6 e2 c9 13 2b 11 7a 73 1b | e9 35 93 72 82 45 b9 27 a7 9d a4 9d 09 5e 20 78 | 29 0e a5 bd 44 31 dd 75 00 a1 c2 9f 09 4f 24 eb | 16 42 da bf 3a 12 d4 84 33 67 7f 85 66 00 36 74 | 79 21 73 94 9b df b2 a9 01 30 1b db 75 7a 3d 46 | 6c 6c eb ca 16 ae 1a 85 9f eb e5 ef 46 e7 91 51 | ee 18 48 f1 20 6b 2b c6 77 fb 41 ba bd 6b 56 4e | 29 00 00 24 6f c3 ef a5 ff 17 51 3e dd e4 5e c3 | e4 15 2b 4d c5 b5 58 85 08 f4 21 f4 d7 43 b1 43 | 4c 64 51 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 47 24 d0 22 75 93 6e dd 7d f7 25 | 7b 0d 80 0a 15 3a a3 09 00 00 00 1c 00 00 40 05 | 8f c4 23 24 1b 0a 54 8e c8 2f b2 b8 ec 80 e9 f3 | ca 99 ed fd | libevent_free: release ptr-libevent@0x7fb3400357c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e8820 | #120 spent 0.182 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 fa a7 32 05 23 14 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #120 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #120 | rejected packet: | 87 fa a7 32 05 23 14 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #120: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aeb540 | handling event EVENT_RETRANSMIT for parent state #211 | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #211 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #211 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49618.182302; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.006564 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aef6c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #211 | libevent_malloc: new ptr-libevent@0x7fb3400357c0 size 128 "road-eastnet-nonat-211" #211: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #211) | 53 9a 08 81 c1 f5 e1 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef 09 3e 48 73 4c 9b c2 57 71 c3 fe a1 82 75 e5 | f2 fc 00 52 66 b2 69 a1 98 d7 a1 43 e2 9d 75 cc | 9d b4 06 fc 88 d6 44 63 90 41 43 c2 45 55 dc 1a | 12 ee 32 35 ef 1c ea 74 ac df 20 43 5d 1c 90 c2 | e0 80 56 a4 79 bd f8 c0 a8 96 3b 25 fa 43 51 16 | 7e ae 16 08 0c ee 53 be c7 29 52 25 44 6d fa 34 | 69 9f 31 ba 70 30 84 e6 d5 99 f5 2e ee 13 fd e4 | 65 1c ef 89 6e 83 29 44 bd 4f 23 ac ed 0f c3 ea | db 20 3d 79 09 22 a5 94 a4 f8 6d ce bf 13 df 61 | d3 3f 02 e7 af bb ce de f0 b1 2a fb 97 3e 5d 05 | 56 5c 13 18 20 58 3e 43 ac b1 9e 74 31 3c 13 bc | 7c 7a 3a eb be df d5 2e e9 60 5f 5a 7e af 73 b1 | 92 1c d6 e2 be f1 a5 75 8e 08 54 b0 2b e1 2c 5a | 6f 54 93 f5 5b 16 d8 ba 78 77 2e f6 39 16 6f 65 | 5e 98 fb 40 29 ab 34 cf 31 b1 1c 43 74 9c 6b 56 | 46 0a 1c e2 58 fe 1e 51 fc 87 18 4b d7 84 46 cc | 29 00 00 24 ac f5 37 f2 09 3e be 57 f0 76 41 01 | 45 fc a2 49 1d 14 8a 0e 25 fc 49 cd 6b 6f 69 01 | e7 4f 36 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 6c d6 1b 30 f3 11 7c 9a 75 f0 de | fa 6c c9 cc a4 62 9e ac 00 00 00 1c 00 00 40 05 | 73 92 bd e7 98 2e a4 8f a5 8d 6a 24 e0 26 ee e5 | ed 8e de 68 | libevent_free: release ptr-libevent@0x7fb36c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aeb540 | #211 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 9a 08 81 c1 f5 e1 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #211 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #211 | rejected packet: | 53 9a 08 81 c1 f5 e1 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #211: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5da90 | handling event EVENT_RETRANSMIT for parent state #202 | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #202 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #202 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49618.18764; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002264 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aeb540 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #202 | libevent_malloc: new ptr-libevent@0x7fb36c01d920 size 128 "road-eastnet-nonat-202" #202: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #202) | 98 0c a0 3b 8e c3 04 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 4a de 90 9e 09 12 3c c9 7a 03 ab 1b f1 18 11 | 66 c3 f7 79 15 3a 95 02 ba e1 c3 e1 f6 5a 7b 34 | 8e de 4d 10 9a e1 70 a5 55 9d f4 c1 17 92 7c df | 68 e1 17 a5 99 1c fb 35 b9 25 cd 23 53 a8 26 d2 | b4 87 e9 2f e3 5a ea 45 0a 90 48 f4 6a 56 94 50 | e4 57 95 d6 52 83 af 6a c6 31 70 b1 c4 d3 c8 6b | cf c5 42 e4 73 01 2f be 13 4a 08 6e a7 91 68 14 | ad a5 a0 e4 14 1f a0 f2 00 98 4c ce c7 d5 c0 b6 | 15 77 5c 51 52 78 e1 34 5c df ff 32 7c 7c eb 4c | 74 06 ff d8 24 f4 34 27 4b f7 4d 5c de 29 22 32 | 61 0e 41 b1 a4 d1 44 ff 96 54 64 39 71 47 b7 07 | 8b 2d f1 7b c7 ff 29 67 2b 47 cf 64 2a ba 75 f5 | b7 8f 94 01 0c 73 d3 d0 a0 ca 7b 5c 80 ff e9 5a | df 27 66 99 d5 41 03 93 26 82 2e 43 c1 d3 4e 98 | 2a e1 9f 1a 15 c9 bf 3d d7 73 59 c0 eb c5 7f 3c | 4c 61 b0 05 20 29 0a b9 6b bf 44 e2 c1 1a 84 6d | 29 00 00 24 99 ea 46 58 fc ef 28 85 a0 72 43 c8 | 36 86 2f 35 31 69 ef db 0d c0 f1 46 4d af df db | 48 57 6f 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 23 33 21 68 f3 9f d6 75 73 74 16 | 0f 96 1b 0a 5a 2e 12 b4 00 00 00 1c 00 00 40 05 | 9b b4 ff f5 5e e8 7e 5a 50 28 47 10 22 d7 72 89 | 2b d0 c4 98 | libevent_free: release ptr-libevent@0x7fb36c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5da90 | #202 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 0c a0 3b 8e c3 04 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #202 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #202 | rejected packet: | 98 0c a0 3b 8e c3 04 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #202: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c7c0 | handling event EVENT_RETRANSMIT for parent state #179 | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #179 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #179 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49618.226853; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.014723 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5da90 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #179 | libevent_malloc: new ptr-libevent@0x7fb36c0300e0 size 128 "road-eastnet-nonat-179" #179: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #179) | b7 0c 53 b0 d6 55 ba e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 e7 aa 3a d2 93 3a b1 f3 2d ef 15 4a db bc fb | 18 f2 f0 2f d7 d8 6d f1 e0 2e 7d 29 59 b1 d6 21 | e4 35 ac b2 5c fa 8c 68 d7 56 48 2c 90 1a 63 31 | 37 9f fa 36 a0 bf f8 7e a9 36 73 05 48 39 6c 08 | e9 ae 8d 6f c7 ab 9c 0b dc b9 88 2c 91 ea 94 a4 | 59 7b a5 d7 8e b8 d2 97 70 12 0b 31 b0 2a d1 31 | eb e4 69 dc 81 ca 29 66 be 80 6d 1a c2 c0 f9 06 | 99 5a 19 63 89 a6 4b 85 38 ed a4 d0 df b0 06 34 | 93 de d4 51 e8 02 b6 ef 9c b9 23 ed 94 d4 3f 30 | ed 82 5a 99 89 3b af 7c 11 96 d9 f0 92 93 d2 4f | 04 c6 5c f3 49 5b 49 5d bc f7 66 01 86 c2 c8 a2 | d8 ee 9a a2 a9 a0 e8 45 16 a7 7f a0 45 50 f6 f0 | 8b 1c 98 0a f0 a8 07 43 b8 bc ec e9 38 ec 58 b8 | 3b 0d b2 96 d1 71 70 f7 1c 22 9f 03 fc f8 39 95 | 81 cb 62 38 1d 55 75 60 24 db a4 45 80 e8 81 2f | df c7 ac c2 4c be 19 14 89 79 da 68 5f ad f7 81 | 29 00 00 24 af 43 c4 7a 3d 3b b5 29 a0 89 4a e7 | b1 1d 19 14 88 65 8d 60 36 ce d7 11 01 48 56 1b | 05 16 7d 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 78 e7 1d 9d 7c 1d 2a b3 39 b5 dd | b4 d7 38 76 a1 49 48 f7 00 00 00 1c 00 00 40 05 | 86 2a 8d 44 0e a3 13 1a 2d e3 72 66 a4 35 f9 18 | 8b 41 6c dc | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | #179 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ac1340 | handling event EVENT_RETRANSMIT for parent state #121 | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #121 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #121 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49618.227; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.008199 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #121 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 "road-eastnet-nonat-121" #121: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #121) | 1a c4 23 3a 2f fb 8d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 72 b0 fb 70 4e c0 8d 7d 37 18 c1 ce 4c 8b 63 | 3b ed bd b3 7c e2 68 d0 e4 78 d3 ff 67 2f 87 6b | 58 6e aa 28 e2 71 48 9f 9e 55 8d d7 f0 fa a8 2d | cf d6 ae d1 2d 00 58 7f 1d 28 13 c8 1c b2 dd 2d | 0b 8c e4 ed 5c aa b6 84 75 0e 0c f4 87 20 ea a7 | 6f 81 08 6f ca 1d ea a5 cc 8b 1d 07 3a 98 ee 34 | 92 f7 0d 60 c7 27 69 9a 54 db 7b c6 0a ed 9e 6e | 48 c9 2d 78 78 eb 23 a8 d4 08 fd 81 af 22 ee 61 | 94 de e2 4a 3e 31 5e 98 b3 8e 80 72 e5 9a 23 e5 | 36 5f 19 09 16 90 75 46 fe 81 ca 01 97 f5 9d b9 | ee 86 b8 f1 4d 40 49 77 bf ea d6 8d cf e1 3f ed | ea d1 6f a1 94 f1 b6 1e ce cf 58 8f 34 28 d9 e9 | 91 30 27 07 3d a8 1a 9e 1f 56 eb 39 c7 99 10 18 | f7 a0 93 02 25 a4 35 d3 3b 85 c6 a5 d4 ee 05 5a | 0a 2e cd 8b 56 c3 43 2f ad b6 de d6 76 50 8d 8d | 31 49 b6 ba ff a2 3a 1a 19 8e 58 36 38 db d0 39 | 29 00 00 24 ce 58 3c f3 71 03 62 3b f7 b4 bf 47 | 86 b0 47 20 d2 a4 5f 23 42 6a 81 bd c0 a6 20 e9 | 9a 46 27 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 ab b4 fc 6a e4 2a a5 95 ca 3f ba | 4a 7b 1d be 72 ff 8c 93 00 00 00 1c 00 00 40 05 | 7e 13 e9 d3 7d bc 8a 17 e1 3e 93 a5 d0 ee 9b cd | 6e 9a 4b 6b | libevent_free: release ptr-libevent@0x7fb344035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac1340 | #121 spent 0.0754 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 0c 53 b0 d6 55 ba e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #179 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #179 | rejected packet: | b7 0c 53 b0 d6 55 ba e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #179: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a c4 23 3a 2f fb 8d 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #121 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #121 | rejected packet: | 1a c4 23 3a 2f fb 8d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #121: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0496 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-221" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-221' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #221 at 0x557d46b01c00 | State DB: adding IKEv2 state #221 in UNDEFINED | pstats #221 ikev2.ike started | Message ID: init #221: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #221: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #221; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-221" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-221" IKE SA #221 "road-eastnet-nonat-221" "road-eastnet-nonat-221" #221: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-221 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-221": constructed local IKE proposals for road-eastnet-nonat-221 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 221 for state #221 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ac1340 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #221 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 | #221 spent 0.165 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 resuming | RESET processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 starting work-order 221 for state #221 | RESET processing: connection "road-eastnet-nonat-221" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 221 | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.284 milliseconds in whack | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 221 time elapsed 0.001187 seconds | (#221) spent 1.01 milliseconds in crypto helper computing work-order 221: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 221 for state #221 to event queue | scheduling resume sending helper answer for #221 | libevent_malloc: new ptr-libevent@0x7fb388043300 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #221 | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 221 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #221 | **emit ISAKMP Message: | initiator cookie: | 90 8f bf e7 cf b7 65 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-221 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e8 72 44 57 63 97 26 0b d0 33 1e c1 f5 c9 36 d4 | ikev2 g^x f7 1a 62 3c a3 39 42 e3 c4 ee 5b 04 7a e2 93 d5 | ikev2 g^x 0f 83 78 28 fb 94 39 4c 7a cc c9 c9 ad ce 5e 59 | ikev2 g^x 68 4d ba 18 1e 4a 63 94 c5 70 f6 5d b4 77 65 58 | ikev2 g^x 10 84 fe ef 60 83 64 5b f2 89 50 99 ac e1 51 8a | ikev2 g^x d7 74 3b 5d 70 17 cd 8b 95 39 65 4b aa 2f 20 67 | ikev2 g^x bc c1 06 22 2c 60 51 a7 d1 25 ba e3 e5 7c 2a 24 | ikev2 g^x 9f dc 2e 8b 87 d8 be dd e2 1f 7f 7d 88 f1 33 ff | ikev2 g^x db 8b ce 43 0a 9d db 20 79 1b 34 f9 9e 77 87 58 | ikev2 g^x 03 3d 5b 8a b0 e8 e3 38 e6 81 79 10 ab 3d b2 02 | ikev2 g^x af 63 97 ff 1b 89 ab 73 45 c7 84 d1 96 d1 2b 2c | ikev2 g^x 45 33 cc 2a 87 09 9b 3c 40 ce 87 0c 1b b1 51 a1 | ikev2 g^x 8d 74 42 7d fd e9 3f de a9 93 ef 77 e9 c1 c8 91 | ikev2 g^x 38 fa 26 85 5e 1b 88 91 35 9e 5f 73 34 d8 96 fe | ikev2 g^x 85 b3 52 f7 42 b5 7d 56 e8 9e bb f2 e5 07 db 70 | ikev2 g^x 5b 28 4b 5d 8e 85 f0 35 5c f8 45 ae 02 de 27 d9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce cd 4c af b1 99 23 18 29 29 9d f9 32 c6 a6 09 22 | IKEv2 nonce 63 0a d9 08 58 b2 a1 77 c9 06 48 e1 9c 8b 9e bb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 90 8f bf e7 cf b7 65 92 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 dd | natd_hash: port= 01 f4 | natd_hash: hash= 64 fb 28 ad 15 31 02 8e bd d8 0f 80 1c 8f fa a7 | natd_hash: hash= e9 1f 34 e3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 64 fb 28 ad 15 31 02 8e bd d8 0f 80 1c 8f fa a7 | Notify data e9 1f 34 e3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 90 8f bf e7 cf b7 65 92 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c4 70 86 36 d0 0a de 28 47 ec ca 4b f0 c7 6b 67 | natd_hash: hash= c3 4a 0b 4c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c4 70 86 36 d0 0a de 28 47 ec ca 4b f0 c7 6b 67 | Notify data c3 4a 0b 4c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #221 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #221: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #221 to 4294967295 after switching state | Message ID: IKE #221 skipping update_recv as MD is fake | Message ID: sent #221 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-221" #221: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.221:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #221) | 90 8f bf e7 cf b7 65 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 72 44 57 63 97 26 0b d0 33 1e c1 f5 c9 36 d4 | f7 1a 62 3c a3 39 42 e3 c4 ee 5b 04 7a e2 93 d5 | 0f 83 78 28 fb 94 39 4c 7a cc c9 c9 ad ce 5e 59 | 68 4d ba 18 1e 4a 63 94 c5 70 f6 5d b4 77 65 58 | 10 84 fe ef 60 83 64 5b f2 89 50 99 ac e1 51 8a | d7 74 3b 5d 70 17 cd 8b 95 39 65 4b aa 2f 20 67 | bc c1 06 22 2c 60 51 a7 d1 25 ba e3 e5 7c 2a 24 | 9f dc 2e 8b 87 d8 be dd e2 1f 7f 7d 88 f1 33 ff | db 8b ce 43 0a 9d db 20 79 1b 34 f9 9e 77 87 58 | 03 3d 5b 8a b0 e8 e3 38 e6 81 79 10 ab 3d b2 02 | af 63 97 ff 1b 89 ab 73 45 c7 84 d1 96 d1 2b 2c | 45 33 cc 2a 87 09 9b 3c 40 ce 87 0c 1b b1 51 a1 | 8d 74 42 7d fd e9 3f de a9 93 ef 77 e9 c1 c8 91 | 38 fa 26 85 5e 1b 88 91 35 9e 5f 73 34 d8 96 fe | 85 b3 52 f7 42 b5 7d 56 e8 9e bb f2 e5 07 db 70 | 5b 28 4b 5d 8e 85 f0 35 5c f8 45 ae 02 de 27 d9 | 29 00 00 24 cd 4c af b1 99 23 18 29 29 9d f9 32 | c6 a6 09 22 63 0a d9 08 58 b2 a1 77 c9 06 48 e1 | 9c 8b 9e bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 fb 28 ad 15 31 02 8e bd d8 0f 80 | 1c 8f fa a7 e9 1f 34 e3 00 00 00 1c 00 00 40 05 | c4 70 86 36 d0 0a de 28 47 ec ca 4b f0 c7 6b 67 | c3 4a 0b 4c | state #221 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ac1340 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac1340 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #221 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 | #221 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49618.240015 | resume sending helper answer for #221 suppresed complete_v2_state_transition() and stole MD | #221 spent 0.484 milliseconds in resume sending helper answer | stop processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388043300 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 8f bf e7 cf b7 65 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #221 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #221 | rejected packet: | 90 8f bf e7 cf b7 65 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #221: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23150 | handling event EVENT_RETRANSMIT for parent state #17 | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #17 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #17 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49618.253206; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.013562 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e8820 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #17 | libevent_malloc: new ptr-libevent@0x7fb388043300 size 128 "road-eastnet-nonat-17" #17: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #17) | 95 d9 df c6 2f 4d 0c 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 5e 55 de a7 df 8c 8d ec f1 a6 b3 e1 a3 c9 2d | 5c 34 98 9a bf 18 3c 5f 5f 84 6f cc 00 89 2f b6 | 2e 0d 8a f0 e8 8a 33 b9 9f e3 4d bb 6f 5d 7f 7f | 55 e8 00 b1 58 6d 0f 17 37 b6 dc aa e5 63 e1 98 | c3 81 a6 04 b7 5c e1 a6 b2 29 9c 5a 0a 92 22 a4 | dd 4c 33 c2 4e 6f 90 29 c5 be 39 30 e7 2e 62 6c | 05 d7 89 8e 0f da b5 53 da 3f 31 31 12 b0 4c a7 | e6 a2 e9 57 ae d6 ea 04 d8 8b 73 ef 0e 9c 95 4e | 4b da 65 9c ef 6c 55 46 7d 0a 54 0c 93 37 db 94 | 63 8b a7 e9 ec 58 ed b4 f2 15 0c b0 9d 7b 2c 0d | 1e e8 20 04 e7 f0 90 d5 81 ce 8a 1d d9 30 60 b1 | c6 44 b1 01 fa 02 ef 06 8d 26 a1 09 a3 ce f8 2b | cd fc 0a 07 b0 8e b6 9d e8 6f 0c f0 b6 d6 40 9f | 58 4b a3 1f 87 35 a9 b2 45 93 43 35 38 68 86 6f | ea 62 4d 90 7e b9 e7 0c 07 f5 2a d5 71 68 12 96 | 09 17 2e 55 3e a1 6c 35 b5 20 1e 2a bf 27 6e 02 | 29 00 00 24 bf 2e 79 82 7e c6 1a 66 e2 b9 4b 2e | f8 c7 dc 78 b4 81 b9 5d 2e e5 4c 2c 27 2c b6 31 | c3 63 bf d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 f5 2d 98 10 e8 c0 4d c4 df 42 b6 | b0 c6 0b 95 91 b6 b4 67 00 00 00 1c 00 00 40 05 | 6f dc f7 24 ac 26 1a a6 48 cc ee 5d 39 06 66 40 | 4c d6 6b fc | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23150 | #17 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a88140 | handling event EVENT_RETRANSMIT for parent state #217 | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #217 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #217 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49618.253395; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500354 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #217 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 "road-eastnet-nonat-217" #217: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #217) | d2 36 bf 64 89 a3 fd 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 f4 5b dc ca 6a f6 be c1 c2 c8 63 19 fb 3a 1f | 70 dc de 5b 54 b8 eb 8d 2b 5e fc c2 60 b3 0c b8 | 9b c4 53 f6 87 96 b1 7e c0 8d e1 b0 c0 a3 08 59 | f8 18 05 78 a7 5e f9 f4 d8 1f 45 f9 8a db 9c 99 | 0e 07 3e 2a ba bb 8c 14 d2 d8 55 43 f4 c4 74 29 | 81 f6 ff c1 34 b9 34 a3 97 b9 37 cc 81 87 17 91 | 44 f4 e5 3a 28 aa cc 0c 3a 69 40 14 f6 3b 92 b7 | db 83 50 42 f0 36 82 ac f1 19 7e 5c 4e 90 c6 ec | cf fd 70 a2 a6 79 e2 bb b0 2b b1 df 8d e0 62 86 | 52 eb e4 a9 60 bc ec b9 d7 99 33 ce 9f d2 75 d6 | ea 82 29 7d d5 df f1 81 05 f9 8d d7 ff 39 0b 3b | 2c fe 6f 59 ae d2 c3 c5 12 3f 62 54 ed fc 61 4f | c2 74 90 8a b6 79 a0 b5 31 fc 8c d5 cb 45 21 48 | b0 1d 10 ec cf 2a b3 30 35 95 3b 32 3a 79 8c 33 | ab 0a b9 7d 4f 43 6c 9b d9 20 e5 7e 28 a9 95 05 | ed 38 6d f0 1a 10 8c 41 cd 59 c0 e4 ec 28 25 e4 | 29 00 00 24 50 f4 8b cc 88 78 9a 77 ca 06 50 f2 | 60 9a 06 39 64 9a 92 2a 1d 6a 83 ae 2a 35 88 82 | 1c 3d 43 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf a3 05 4d ff 0f f5 da 0b f8 e7 54 | e5 88 17 6e 1b 78 5e cb 00 00 00 1c 00 00 40 05 | 9b 1b 06 2c 11 9c 55 41 9d b0 16 46 62 0b cd 66 | 9f 92 84 50 | libevent_free: release ptr-libevent@0x7fb38001abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a88140 | #217 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 d9 df c6 2f 4d 0c 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #17 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #17 | rejected packet: | 95 d9 df c6 2f 4d 0c 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #17: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0649 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 36 bf 64 89 a3 fd 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #217 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #217 | rejected packet: | d2 36 bf 64 89 a3 fd 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #217: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0544 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3940 | handling event EVENT_RETRANSMIT for parent state #203 | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #203 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #203 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49618.267738; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002575 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a88140 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #203 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 "road-eastnet-nonat-203" #203: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #203) | 02 57 d9 3d 13 25 98 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 1c fb 0e 8f 43 ac f5 0b 5f c4 59 e2 84 8d ff | 93 42 c3 e3 19 35 29 34 62 44 7f 8b b9 60 94 1a | 68 20 33 36 7e 07 ef b9 9d 1a c3 c4 e5 e3 be 6f | df 48 47 f9 cf 7a 23 fa b8 b9 0f be e3 51 16 88 | 65 2c 32 42 a7 de 33 7a 8d 00 20 5f 8c 23 cc 9e | fd 93 18 91 08 48 46 f6 9e a4 63 04 36 57 fb 82 | db a9 f0 b9 fc 47 88 c1 af a0 52 b6 f2 77 4a 78 | 7b 45 5f 81 61 4c a8 5c 40 e9 6e 59 e6 65 a5 7d | 8f 67 9e 58 05 f0 0e f3 10 e5 4c 4f bd 20 a3 7c | 88 1e 84 95 b7 f3 51 db 65 68 67 47 f1 73 c2 67 | 48 a3 dc a1 e1 3f e7 d7 4c f9 dc 2e f5 e0 7c 72 | 3d 2f 82 8d c1 ef e8 9c 9c 82 12 27 e5 0a e4 bb | af 79 89 91 83 59 68 9b 2f 98 3b 89 0a 25 be 74 | c0 0f b6 99 3d 8f b4 39 9b 96 c4 d8 6a 5d 53 81 | 43 9d 7a a3 69 c9 61 8c c0 23 f3 33 21 de 95 0e | 53 97 be e9 2a e9 9e 71 b5 e7 b9 2b cb 16 40 76 | 29 00 00 24 ad 22 cd 07 aa fe 98 d8 02 52 a4 3c | 95 12 5a d9 ed 8e 49 c5 19 c8 cb b1 88 c1 88 b9 | c9 3f 70 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 60 71 59 6f 4c 24 43 8a 9c 00 7b | c3 3a 97 05 f3 23 35 42 00 00 00 1c 00 00 40 05 | 0d db 79 a2 0f bb d9 bd 26 88 9d ac d1 d3 87 df | 66 b4 d9 d4 | libevent_free: release ptr-libevent@0x7fb358035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3940 | #203 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 57 d9 3d 13 25 98 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #203 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #203 | rejected packet: | 02 57 d9 3d 13 25 98 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #203: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a69e50 | handling event EVENT_RETRANSMIT for parent state #122 | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #122 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #122 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49618.287063; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005935 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3940 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #122 | libevent_malloc: new ptr-libevent@0x7fb358035930 size 128 "road-eastnet-nonat-122" #122: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #122) | 14 66 d6 bd ae 2b be a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 a1 e9 e4 be 1e 51 8a 55 59 79 73 21 36 56 e2 | 77 7a 08 bd 06 ab d4 92 e5 dc ae f7 64 76 23 ff | f4 fc 6d 61 73 31 e1 d2 4f df c1 6b b7 79 5a 65 | a0 cc f6 e0 aa a2 1e 56 c9 61 f0 64 10 6e 71 e4 | de d3 38 6f 01 f0 ef d1 f6 56 f5 aa fb d5 dc 96 | f9 0b be 72 ef 23 60 6a 39 4c 10 fa 40 46 a5 4f | 9d 4e 1b 63 94 dd bb 2e 79 61 b0 23 01 f5 74 e7 | c5 3f 64 7f 13 8b 72 4d bd da 91 fc 61 61 ef f0 | e7 bf ad 46 59 ed ad 05 2c f7 04 21 03 71 4c c7 | 7f 1d ad ca ef 53 b4 42 e8 7b 9b 3d 7a 70 68 63 | f6 3b fc 00 63 e2 d1 50 20 42 35 cc 18 3b ef e3 | 5c 49 2e b5 43 b5 11 94 a2 42 32 89 ab 4a 75 44 | 28 03 13 02 78 a8 b9 d4 86 df f7 69 0e 5b f1 03 | 59 e8 3f 87 be c1 4f 01 d7 b7 0b 01 72 03 2c 0c | c5 51 b7 34 27 69 20 c2 1e 3c 1a 82 2c 40 e7 31 | 94 67 b7 79 04 1c c9 e0 fd 58 15 b5 e2 95 d3 0d | 29 00 00 24 7c 10 f9 fd 3b aa 03 0a 4e 70 88 76 | 8d 21 8d 7a 77 a3 25 87 bf 2c 07 91 c2 03 c6 70 | 6f 0a b2 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 62 3b d9 22 f1 42 3b 85 55 78 b5 | c8 14 63 8d 0b 44 d6 d6 00 00 00 1c 00 00 40 05 | 1b ba f6 9b c4 53 50 8e 11 46 cb 49 4f 65 db eb | 69 7d d4 7c | libevent_free: release ptr-libevent@0x7fb378012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a69e50 | #122 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 66 d6 bd ae 2b be a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #122 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #122 | rejected packet: | 14 66 d6 bd ae 2b be a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #122: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecac0 | handling event EVENT_RETRANSMIT for parent state #212 | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #212 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #212 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49618.293401; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000856 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a69e50 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #212 | libevent_malloc: new ptr-libevent@0x7fb378012840 size 128 "road-eastnet-nonat-212" #212: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #212) | 94 ac 86 b7 f8 83 d4 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 79 5c 0c 28 90 8c ef 02 3c d8 f8 1a 0b d6 b1 | 04 69 40 2f 72 b0 4d 73 12 19 ce 98 f8 6f 0b 9f | b9 13 67 6a 06 b8 41 b4 12 d3 3b 5e 00 45 d7 98 | a9 e1 2d 0a c7 48 98 e8 4f 26 89 26 1d eb 0f 63 | d1 cd 01 b0 ac c0 e6 9c c4 d5 af f4 d2 0a f8 fc | 50 8b 97 23 e0 8c a0 c2 04 25 1e a8 35 a0 f0 95 | 6e 38 07 0c ab 5c e3 d8 94 8f 44 fe f3 fe 9f 14 | 8e b7 78 55 0b 6e 31 2e c3 a7 48 da be 5b b7 47 | 21 9c c6 d3 74 d7 58 d3 13 78 3e ed 28 44 9b 87 | a8 e3 a1 e6 89 b5 03 ef 3b fe d5 17 e8 f9 73 04 | 1c 9e 5a c3 69 56 f2 c1 24 33 17 fd 7d 0d ed e7 | 7d 2c 20 7c 0b 8e 94 c1 2e c1 1b fa 0b 32 e2 6f | 8a b2 5d b4 79 8d 9a 89 ea a8 6f 97 71 92 fa f9 | bc 34 75 15 ab ea 61 f5 3d 74 25 af 37 7b 97 2f | 19 3e 0a b6 c1 50 67 1c b8 51 37 9b 9a b3 26 67 | c4 f2 b4 e7 06 7e 5d 5b 28 22 1e 8e 7e da b7 8b | 29 00 00 24 5c 64 5d 43 88 c1 08 90 f5 2a 0e 23 | 99 a9 ce 32 1e 4e 34 e5 9c b5 04 95 ad 56 32 fb | 31 cf fd 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 0d b1 e5 c0 7d 3f 73 e9 5f 1b 2c | de e5 07 26 54 11 d9 1b 00 00 00 1c 00 00 40 05 | 08 da df 20 35 aa 7d dd ef ff 4a 4d 21 f5 f2 fb | f9 b4 9f 22 | libevent_free: release ptr-libevent@0x7fb3500251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecac0 | #212 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 ac 86 b7 f8 83 d4 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #212 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #212 | rejected packet: | 94 ac 86 b7 f8 83 d4 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #212: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7e490 | handling event EVENT_RETRANSMIT for parent state #180 | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #180 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #180 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49618.31179; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003551 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecac0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #180 | libevent_malloc: new ptr-libevent@0x7fb3500251c0 size 128 "road-eastnet-nonat-180" #180: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #180) | fe 73 72 02 92 15 d8 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 07 70 60 c7 56 30 74 c1 b3 ab 81 1b b5 12 a6 | 5b b3 64 05 c5 bb 30 3a 1e 92 5a 22 82 67 57 cb | ec df cc 78 63 1b 82 f2 76 a9 50 bd 80 d2 65 3a | b4 e2 7b 0a a1 1e b4 05 49 bc 96 6f 1f f1 51 36 | c7 6c ca c1 27 98 ee 50 22 95 3e cb c3 ea ef b5 | b6 40 b3 fc db 2f 79 46 a9 ac d5 8e 6f 0a 3a 8d | 7e 51 bf 5f 98 c8 56 24 ad e5 63 d9 fa 96 3f ce | b0 c6 79 3b 61 48 6d fd d7 15 2a 6b 8d 91 68 52 | a6 e1 08 45 fe 40 cd 13 6b e8 f0 74 af 74 46 b5 | 90 2f 5d d8 88 37 08 fa 12 4d 78 ce 41 b7 64 80 | a2 4d 76 43 ea e0 49 cc c2 cc 44 b2 cd 61 27 7e | 3d 40 9b 0b ff 59 99 9d a8 52 49 ee d5 dd 07 2e | 2d 3b 1d 7b e9 b4 f8 d7 66 08 0c c9 41 1c 3c eb | ca 7b 16 c5 f5 de ae 99 52 e3 17 c8 ed 61 56 a0 | 61 ae ef c8 11 73 22 d7 35 ab 44 d5 09 26 21 e1 | 09 c4 17 ac b7 7a 6c 9f bd 3c 11 d1 18 1d 51 88 | 29 00 00 24 9d 80 d3 ad d5 e1 1c 51 35 bd a3 6a | 04 d1 ff 4c 54 9f ed 38 00 a0 89 9d 6d 48 6f b5 | c4 22 6c 99 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 22 7d cd 9d 96 05 69 33 a1 7c ff | fb a1 ed a2 be 25 c7 02 00 00 00 1c 00 00 40 05 | cd 91 7d 35 4a 67 75 33 41 31 18 ee 7e 93 4a 7e | ae 98 50 4f | libevent_free: release ptr-libevent@0x7fb36001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e490 | #180 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 73 72 02 92 15 d8 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #180 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #180 | rejected packet: | fe 73 72 02 92 15 d8 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #180: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a54250 | handling event EVENT_RETRANSMIT for parent state #18 | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #18 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #18 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49618.336193; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007026 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e490 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #18 | libevent_malloc: new ptr-libevent@0x7fb36001d920 size 128 "road-eastnet-nonat-18" #18: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #18) | fb 32 f3 fa 98 61 11 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 1b 0e e3 36 19 71 f2 00 c4 a6 18 1e bb 4a b9 | 3f d0 79 e4 4c 35 e5 1e 56 1e d1 56 df b2 32 fa | cb c3 c2 d3 4a 94 0b 28 4c 8e ed f1 14 00 ce ed | b6 d4 73 ac db 94 04 97 4d da 90 7f 61 f0 d2 4f | 60 04 42 6d 98 5c e4 05 d2 7d 05 4f 2d 99 94 a5 | 24 07 67 86 b6 21 b9 09 3a ea 16 cd cc b4 37 10 | 72 43 f6 be 6d 76 63 9b 24 f5 23 e6 b1 48 bc f9 | f2 cf d4 72 32 75 ee 93 a2 3d a2 fc 4d 35 5b 06 | 2a 31 6e 66 38 b7 b9 5b ce 6b 7a 5c 24 6c c6 91 | 21 f8 32 cc e1 e9 56 aa 56 2c 50 74 9d 0e c3 9c | b6 78 ee 5d a7 11 af c5 d5 50 6d b5 f0 a5 9d 4e | 3f d5 dc b9 6a 00 2b e1 dd 5f 8a e9 31 c5 30 8b | ee 43 f2 79 32 71 d6 e9 6e 27 23 22 2e 49 e0 0f | a1 32 43 40 65 d3 35 9f 97 aa f2 5c 61 69 29 93 | 3e f9 84 1e 9a f8 ea a4 2a 81 be 45 2f 6a 95 39 | a8 bb 2b 71 c2 45 83 fa e9 8d 63 1f 25 98 d1 4c | 29 00 00 24 64 09 7d 4a c3 95 64 a7 f6 f8 ca 35 | d6 3a 22 ea 52 84 43 22 db d2 95 2f 1d 96 44 f9 | 61 f7 89 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 f9 c7 a2 f7 e0 10 e9 b6 c5 14 f2 | 0e d4 f3 ff 41 9a 2e 34 00 00 00 1c 00 00 40 05 | be 8c d9 50 c4 e0 70 2a 58 15 0e 32 3f df db 0d | 01 81 6c d8 | libevent_free: release ptr-libevent@0x7fb388022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a54250 | #18 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 32 f3 fa 98 61 11 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #18 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #18 | rejected packet: | fb 32 f3 fa 98 61 11 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #18: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-222" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-222' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #222 at 0x557d46b031c0 | State DB: adding IKEv2 state #222 in UNDEFINED | pstats #222 ikev2.ike started | Message ID: init #222: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #222: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #222; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-222" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-222" IKE SA #222 "road-eastnet-nonat-222" "road-eastnet-nonat-222" #222: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-222 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-222": constructed local IKE proposals for road-eastnet-nonat-222 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 222 for state #222 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a54250 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #222 | libevent_malloc: new ptr-libevent@0x7fb388022480 size 128 | #222 spent 0.158 milliseconds in ikev2_parent_outI1() | crypto helper 2 resuming | crypto helper 2 starting work-order 222 for state #222 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 222 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-222" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.254 milliseconds in whack | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 222 time elapsed 0.000913 seconds | (#222) spent 0.898 milliseconds in crypto helper computing work-order 222: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 222 for state #222 to event queue | scheduling resume sending helper answer for #222 | libevent_malloc: new ptr-libevent@0x7fb380043300 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #222 | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 222 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #222 | **emit ISAKMP Message: | initiator cookie: | eb 26 f4 19 1a 54 68 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-222 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 09 a4 6e 20 fd 50 2f 35 57 aa de 4a f5 e5 f9 4f | ikev2 g^x ca f6 bf 35 d5 20 df 61 18 72 c7 7b 3b d6 89 fe | ikev2 g^x 57 a2 45 9e 67 3f 8a f7 1b bb 33 5b 2f 19 93 13 | ikev2 g^x 4d bc bb d5 5a 76 0b 8c 08 e4 e4 47 2d c3 07 c6 | ikev2 g^x df c3 86 a0 6b 90 b3 31 74 8b 42 bf c4 10 0e bf | ikev2 g^x 13 cf 0b 76 db 86 6a 9f 8c f0 b4 0e c7 08 95 7e | ikev2 g^x ce 41 5e 4a 31 5c bb fb 47 19 b3 63 fb 4f ca f3 | ikev2 g^x 07 c7 1d d9 7a 1b f2 0d 5e dd f5 ac 4b 35 32 4a | ikev2 g^x fb 08 38 da 83 ea de 30 e1 52 16 cd fe ea bf b3 | ikev2 g^x 88 b6 b0 c4 6f 9e 4d bb 67 f6 e4 a0 eb 71 82 6a | ikev2 g^x ad 65 be 80 db 5a 69 3b 90 3a 58 e9 30 d6 fe 7a | ikev2 g^x f6 9b 28 5c 13 9f 6a 77 4f c9 8b bc 07 b5 a1 d9 | ikev2 g^x 2b de 81 5d 47 e4 3c c1 b1 a8 f5 bc 8d 40 df 63 | ikev2 g^x b5 80 17 f2 8c 1f b1 78 d7 35 f2 4c 44 06 cc 65 | ikev2 g^x 15 11 55 93 d9 f0 56 8f ad b9 7e 2b 7d cb da 6d | ikev2 g^x 9c ab 97 02 8c 9c fc 9d 3d c3 47 69 0f ac 56 88 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 77 e8 83 df 75 f1 9b ea 8f aa ae 8f cc 39 a6 6f | IKEv2 nonce 03 de be 68 b3 66 64 be 5d 42 33 fc 61 2a ce bf | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= eb 26 f4 19 1a 54 68 de | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 de | natd_hash: port= 01 f4 | natd_hash: hash= 1e 87 6a 56 c8 8d 7a 5a c9 70 42 a3 93 38 10 ea | natd_hash: hash= 25 8a 09 bf | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1e 87 6a 56 c8 8d 7a 5a c9 70 42 a3 93 38 10 ea | Notify data 25 8a 09 bf | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= eb 26 f4 19 1a 54 68 de | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d9 43 32 2c d8 2a fd ec 96 bd 92 a4 54 e0 a9 82 | natd_hash: hash= 8b 73 b6 b2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d9 43 32 2c d8 2a fd ec 96 bd 92 a4 54 e0 a9 82 | Notify data 8b 73 b6 b2 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #222 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #222: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #222 to 4294967295 after switching state | Message ID: IKE #222 skipping update_recv as MD is fake | Message ID: sent #222 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-222" #222: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.222:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #222) | eb 26 f4 19 1a 54 68 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 a4 6e 20 fd 50 2f 35 57 aa de 4a f5 e5 f9 4f | ca f6 bf 35 d5 20 df 61 18 72 c7 7b 3b d6 89 fe | 57 a2 45 9e 67 3f 8a f7 1b bb 33 5b 2f 19 93 13 | 4d bc bb d5 5a 76 0b 8c 08 e4 e4 47 2d c3 07 c6 | df c3 86 a0 6b 90 b3 31 74 8b 42 bf c4 10 0e bf | 13 cf 0b 76 db 86 6a 9f 8c f0 b4 0e c7 08 95 7e | ce 41 5e 4a 31 5c bb fb 47 19 b3 63 fb 4f ca f3 | 07 c7 1d d9 7a 1b f2 0d 5e dd f5 ac 4b 35 32 4a | fb 08 38 da 83 ea de 30 e1 52 16 cd fe ea bf b3 | 88 b6 b0 c4 6f 9e 4d bb 67 f6 e4 a0 eb 71 82 6a | ad 65 be 80 db 5a 69 3b 90 3a 58 e9 30 d6 fe 7a | f6 9b 28 5c 13 9f 6a 77 4f c9 8b bc 07 b5 a1 d9 | 2b de 81 5d 47 e4 3c c1 b1 a8 f5 bc 8d 40 df 63 | b5 80 17 f2 8c 1f b1 78 d7 35 f2 4c 44 06 cc 65 | 15 11 55 93 d9 f0 56 8f ad b9 7e 2b 7d cb da 6d | 9c ab 97 02 8c 9c fc 9d 3d c3 47 69 0f ac 56 88 | 29 00 00 24 77 e8 83 df 75 f1 9b ea 8f aa ae 8f | cc 39 a6 6f 03 de be 68 b3 66 64 be 5d 42 33 fc | 61 2a ce bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 87 6a 56 c8 8d 7a 5a c9 70 42 a3 | 93 38 10 ea 25 8a 09 bf 00 00 00 1c 00 00 40 05 | d9 43 32 2c d8 2a fd ec 96 bd 92 a4 54 e0 a9 82 | 8b 73 b6 b2 | state #222 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388022480 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a54250 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a54250 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #222 | libevent_malloc: new ptr-libevent@0x7fb388022480 size 128 | #222 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49618.341632 | resume sending helper answer for #222 suppresed complete_v2_state_transition() and stole MD | #222 spent 0.463 milliseconds in resume sending helper answer | stop processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb380043300 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 26 f4 19 1a 54 68 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #222 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #222 | rejected packet: | eb 26 f4 19 1a 54 68 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #222: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbbc0 | handling event EVENT_RETRANSMIT for parent state #123 | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #123 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #123 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49618.349848; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00613 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab0dc0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #123 | libevent_malloc: new ptr-libevent@0x7fb380043300 size 128 "road-eastnet-nonat-123" #123: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #123) | 6c 7d b3 a1 76 62 7d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 56 4f 8e 37 33 e9 f0 f8 7f b8 e1 b3 f9 a8 fa | b7 62 0a da df 31 2b 33 3e c3 84 d4 70 c9 16 31 | 80 ac 1c 22 4c fb 0e d9 48 14 9a 6c 58 8b b2 b1 | ab d6 de 52 1b e7 85 36 94 02 66 e4 ea 4b 3e bb | cb 9a 60 cd b2 64 9c 54 4c 58 05 94 9a 41 90 e5 | 3d f7 e6 13 47 7c 5c ae 9e ed 2f 47 46 7c b6 ec | 64 99 4c 90 1f 2b 27 83 ee 7d 0c 95 53 61 78 0e | fc 0d ee f9 69 83 ad f2 29 e6 77 fd 16 29 ec c4 | 55 89 e7 07 dc 10 66 d5 0f fd 31 a1 54 12 3e c7 | b1 16 f6 98 63 b4 d5 90 8d e3 ff 44 b5 31 8e 32 | c1 26 fd ff 42 9b c5 01 50 0b be e0 4e 8b d1 4e | 1e cc 49 12 14 c5 7d a4 df 96 fd 82 a1 fa 2c 84 | 20 3e 8f a2 9b 0b 00 ca 45 cd 8b a5 8a 1e 6a fa | 02 7f 67 67 3a 15 da 2b 32 2d 18 bd 05 df 1f 49 | 13 dc cd f2 4e 24 ac 3e c3 6e b4 5b 9b c7 3e 7b | f3 b3 b6 54 f0 4f 36 43 d8 39 48 ea ae 56 03 eb | 29 00 00 24 9d 71 0d 4c e1 28 99 bb a1 c2 a8 97 | 82 df 6e a7 59 50 e5 e7 83 d9 52 2c 3a b5 f8 0a | ab 34 6b 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd f0 b7 a5 ab c1 1e 9f 00 5e 1f f4 | 01 11 d6 41 8c c8 44 db 00 00 00 1c 00 00 40 05 | 74 ad b7 af a3 7a 6a 08 ff e9 f2 f1 74 4e c9 b2 | f6 ce db 1e | libevent_free: release ptr-libevent@0x7fb350035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbbc0 | #123 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 7d b3 a1 76 62 7d ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #123 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #123 | rejected packet: | 6c 7d b3 a1 76 62 7d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #123: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.072 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa1f00 | handling event EVENT_RETRANSMIT for parent state #204 | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #204 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #204 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49618.37113; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.006195 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbbc0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #204 | libevent_malloc: new ptr-libevent@0x7fb350035930 size 128 "road-eastnet-nonat-204" #204: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #204) | 26 9b 30 ce 1c 69 a2 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 5c 6f c5 e4 37 b5 85 8b 88 c9 38 4a 33 67 e3 | b5 76 e8 6e 58 ca 85 66 b2 6e bc 01 cc 91 d2 fa | e1 db ef 4b 77 17 f5 08 16 0c 8c d0 2e 39 5b 3d | 15 8c a2 f2 d6 7b 21 20 d2 5d b0 fc e4 ac 76 97 | 30 50 2e 26 71 1a 34 95 4e 65 5f 33 21 89 a5 4a | 55 91 fa cb b0 1c 50 2f 03 b1 71 df 7e 93 5d 3f | 83 d0 25 32 6e 4a 7a e8 b7 9c c4 2c bc 70 88 ca | 1a 12 c7 c4 81 cf af 5b 96 ed ff 17 ee ac bf bc | 7e ee e8 ea bf 0e 25 06 f6 11 f2 0c fc 01 f3 a1 | a3 a5 0f 39 3b 0e 4e 24 40 89 5e e7 dc 14 70 db | b0 59 4e 88 e4 58 74 9d 4c 35 67 80 45 58 10 7b | 90 72 ed 6b 8c 09 3f 83 31 52 aa d0 a7 ad e8 5e | 62 2d e8 c2 d2 5f d4 fe 77 1a 24 07 0f a0 1b 7f | b1 31 3d fc 2d 59 58 95 dc 6b 56 ff a8 81 81 ca | bd 63 b1 a6 f3 e4 7a e1 08 85 c1 19 90 12 c0 7e | 58 38 76 3a 98 a3 e6 81 1a a9 a3 c2 1d 81 96 94 | 29 00 00 24 f4 44 35 a4 a3 93 f6 e1 66 d4 43 db | 1b ee 9d af 99 ba 18 1d 96 99 f1 ca 00 4e 65 c8 | 19 9f df 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 dc 32 bc d5 a3 92 90 2d a7 77 26 | 1c 78 dd c4 9b 23 7d 3e 00 00 00 1c 00 00 40 05 | 5b a2 10 3c 9e 91 f8 b5 af bf b9 e6 23 08 5d a3 | 6c 17 22 88 | libevent_free: release ptr-libevent@0x7fb3740356e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa1f00 | #204 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 9b 30 ce 1c 69 a2 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #204 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #204 | rejected packet: | 26 9b 30 ce 1c 69 a2 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #204: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #213 | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #213 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #213 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49618.381486; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001282 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa1f00 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #213 | libevent_malloc: new ptr-libevent@0x7fb3740356e0 size 128 "road-eastnet-nonat-213" #213: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #213) | 4a f6 d6 f4 f7 c1 a9 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 87 92 0f fd 56 61 cf 88 27 07 68 fb 27 94 14 | ab 6f 99 e6 75 dc 26 2f 1e 93 7a c8 7f ed e5 7d | 6b b9 9d 92 4b e7 28 92 86 1e 95 f5 3a f0 df 50 | 69 19 a3 90 28 b6 f5 2d 21 d9 e8 a3 e1 5b a3 90 | 3f a9 b0 a1 2a 68 b5 63 77 3b aa 0b 6a 92 36 d6 | 32 61 b7 e6 8e cd 51 f2 78 e2 77 58 13 92 00 bb | 90 bd cb b3 98 f4 c1 b4 f9 bd 9c 07 84 cd 8b 44 | 56 64 bd 56 88 30 16 b1 de 15 4b 10 e0 33 82 0c | 53 be e7 f5 bb 24 10 e7 6d a3 b2 a5 08 f8 45 52 | 21 5c 7f a2 a6 ba 7c c6 84 2d 67 10 b4 86 8f 9c | f0 28 12 88 fb c8 52 6a e2 26 a6 a9 6d 8d 51 de | 96 9d d4 31 fb 52 b9 5a 75 dd 19 ef dd 61 8f 1b | 4b 84 99 e3 45 d4 ee 63 d4 75 8b e1 c7 c9 46 a5 | 75 72 66 74 64 ad ff 53 8e cd 6a 8d e1 aa 8b e0 | 68 cf 60 1e 6d 53 aa b5 21 a7 9f 74 3a 51 a3 ac | e3 62 94 51 c3 8c 9b b8 34 1f 9f 73 40 9a 49 cb | 29 00 00 24 b5 56 f5 24 67 7b ee bc b9 fe c7 48 | 4d 15 0a a4 8c 8b d0 3d 4d d5 8d 67 be 58 a4 6d | 51 fe 0b 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 44 29 1f 54 8d f8 98 7c 02 ef 5a | ae 02 c1 10 4c 75 c9 6b 00 00 00 1c 00 00 40 05 | bc 12 92 95 d4 1b f9 ad 5d 6a 71 41 82 c9 bd c2 | 29 69 a1 81 | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #213 spent 0.237 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a f6 d6 f4 f7 c1 a9 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #213 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #213 | rejected packet: | 4a f6 d6 f4 f7 c1 a9 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #213: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0765 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #181 | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #181 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #181 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49618.384355; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005672 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #181 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 "road-eastnet-nonat-181" #181: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #181) | 87 ea 0d a4 c5 cc c9 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 96 2b 80 67 25 14 db 43 a4 69 96 1f d6 7f 44 | 16 0f d8 a3 fa cd 04 6f 4e 52 d1 61 93 e5 7d 61 | 78 3a 71 d4 ab 07 09 6a 8d e4 9e 59 3a 16 71 d0 | 6a fd 27 9b 67 10 88 a3 7b 06 8c 1d bd 77 73 97 | cb 10 8a 01 63 6c f3 e0 d9 84 4d f6 7b 2b fb e5 | 64 39 42 1e 6a 5d e5 a2 c0 54 6b 84 eb 36 36 98 | a7 bb 04 c5 ca 92 0e 5f af 5a 95 43 e3 52 3f ff | 54 f4 17 a7 9b 5c ce c8 79 5b 79 1b f8 16 5e d7 | 38 2d 41 ad 74 20 7d b3 0e 73 6b 2e d6 c4 34 48 | 1d 4c 33 fc 1f 31 06 e5 ef d9 8a ee a4 d3 10 13 | 9f f3 13 d6 08 5c dd 5e f3 41 90 99 dc 19 c1 90 | 0b 1a f0 8f 10 ca 00 81 f3 4c 0b 20 a3 62 92 ed | 2c 01 0a 11 e9 9d cb 11 95 e0 55 b1 08 02 a2 07 | 35 a8 d1 5c 3e 00 4b 4e 53 71 3f 8a 08 82 11 91 | 21 25 67 71 35 af ba 8c 78 51 c7 49 62 d2 6d 39 | 87 19 14 5e e7 83 0f e7 70 65 a7 bd b3 6a 59 43 | 29 00 00 24 f0 e0 42 a6 e3 a5 05 54 c9 6b cd 2c | d1 4e 0f ea 18 76 ac 9e 15 69 24 da 67 51 76 47 | 7a b9 31 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 1c 40 9b 6a 7c 59 59 f4 5a 8b 5d | d3 44 cd 77 5a a2 8f ab 00 00 00 1c 00 00 40 05 | c9 f4 ff 9a 5d 3b 38 1b 8f 98 0f 89 fb a2 c8 0e | aa 7e 43 ef | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #181 spent 0.202 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 ea 0d a4 c5 cc c9 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #181 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #181 | rejected packet: | 87 ea 0d a4 c5 cc c9 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #181: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0965 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac5400 | handling event EVENT_RETRANSMIT for parent state #124 | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #124 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #124 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49618.414579; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004935 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #124 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 "road-eastnet-nonat-124" #124: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #124) | 8e 52 ee 7a 33 75 3f 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 57 9a 04 43 62 52 e5 fc b5 c2 fe cc ad 34 2f | 82 f3 00 f6 ee 21 08 77 c9 b1 bb 69 fe 78 0f 21 | bf 36 0c 3c d2 28 d9 56 83 ae 1a 8d 60 fc ba 85 | 54 56 0c 31 1b 34 8f 99 3a cf de 75 87 a0 b6 a4 | d8 62 39 46 a5 f4 50 6b 49 13 47 6a b8 07 fd 9b | a0 24 9b 8e 36 86 71 8d 3a 86 06 ec 43 9f d0 fa | fb 5f d7 26 3c ad 44 31 62 f2 eb 50 ab 84 4b c8 | 92 d2 94 d1 cf 28 72 53 f0 98 5e 24 79 26 3e b6 | 8a 49 4d a1 69 34 ff 0b 63 f0 6a 98 fb 9b 9e fc | 07 2e cd bb 5b c5 49 f8 a9 bd 52 eb e2 d4 29 6f | e4 1e 81 a0 d3 65 f5 f3 07 20 20 0d 39 fe 60 11 | 31 d5 df 57 2f d9 ac 24 3b 95 8a 93 3c 37 3c fe | 00 f5 ae e3 8b 73 07 19 bf 7a 74 b9 19 54 31 a8 | c6 05 b4 3c c9 b4 f2 d1 4f 8d c4 e7 6c 6b d7 8c | a7 72 14 8c da 9f 42 94 91 f0 27 3c ef a5 63 c0 | 4b e5 9c 5d a2 4a 47 0f 02 ed 81 c6 7a 36 ca c0 | 29 00 00 24 35 37 ad 9e 25 61 50 57 d7 60 4e 9e | 7c 24 2e 8d b9 f6 52 07 e6 cf b3 cb 88 5a c5 03 | c4 c6 aa c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 73 0e 7d 3a 1d a8 f9 ef 84 7c a6 | 0b 05 4a f4 88 18 b0 42 00 00 00 1c 00 00 40 05 | 95 90 15 33 51 5d ad 36 64 2a 62 55 cb ba 4d 6f | 9b 17 ee 8d | libevent_free: release ptr-libevent@0x7fb354035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac5400 | #124 spent 0.183 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 52 ee 7a 33 75 3f 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #124 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #124 | rejected packet: | 8e 52 ee 7a 33 75 3f 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #124: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45310 | handling event EVENT_RETRANSMIT for parent state #218 | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #218 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #218 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49618.42226; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.502149 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac5400 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #218 | libevent_malloc: new ptr-libevent@0x7fb354035930 size 128 "road-eastnet-nonat-218" #218: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #218) | fc 84 28 e6 d0 d4 a3 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 d7 19 e0 b8 a7 81 99 33 01 41 39 ef 55 14 82 | 36 e8 1e 6f 78 81 cb 8b ba 30 50 9b f0 49 c2 8d | 4d b2 2b 95 f1 d8 28 60 35 5d 42 53 4d 43 c7 8c | 4f 74 15 45 95 27 14 77 eb 50 5d 4a f6 fd be ee | 3c 1a 88 ee 70 83 66 98 31 0a fd ad 4a 03 b5 37 | 5d 2e 93 bd 7a be 39 56 60 d9 aa 84 79 74 3d 0e | dc e3 b7 0b 24 c5 94 3d 31 8b f6 0e 82 f6 06 b8 | 26 12 7e 3f 3e d6 7d b6 51 ee ad b2 d2 ab 27 77 | 53 f8 1e d7 91 5f 2a 81 5e 4e 7d 22 21 5e 55 9c | c3 53 13 8f 2a fb e3 93 47 36 6a 2c 3e 5b e2 b0 | 72 17 1d b0 34 33 da 2e 57 d4 77 d4 d7 37 4b 04 | e0 fd 56 ba 03 09 e0 ee 03 55 18 7a 06 0c cf 4c | 2a 51 58 97 6d b9 c7 55 61 75 dd e7 d8 0d 3a 1d | 49 6c f2 e4 06 70 89 d9 24 cc ed 33 51 12 2c eb | 69 6c 48 51 d3 c5 03 79 af 69 1b 7c 09 b9 68 90 | b7 fa 26 e6 18 f8 80 d5 96 f3 c9 3f f4 18 bb d2 | 29 00 00 24 11 b2 a5 5c a6 46 80 f9 3d 23 f2 ab | ce 5d 83 0a f1 1a 01 82 7c 29 4c e1 e5 d0 ae 3c | 95 98 eb 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4f 29 50 5e 23 8d 7d 6b 34 9f ff eb | 11 dc 43 b6 12 c1 95 47 00 00 00 1c 00 00 40 05 | a7 99 e5 52 4c 36 7b 61 4e b2 63 45 25 bf 82 23 | 34 fa af bb | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45310 | #218 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 84 28 e6 d0 d4 a3 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #218 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #218 | rejected packet: | fc 84 28 e6 d0 d4 a3 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #218: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0583 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-223" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-223' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #223 at 0x557d46b04780 | State DB: adding IKEv2 state #223 in UNDEFINED | pstats #223 ikev2.ike started | Message ID: init #223: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #223: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #223; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-223" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-223" IKE SA #223 "road-eastnet-nonat-223" "road-eastnet-nonat-223" #223: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-223 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-223": constructed local IKE proposals for road-eastnet-nonat-223 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 223 for state #223 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a45310 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #223 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 | #223 spent 0.152 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-223" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.237 milliseconds in whack | crypto helper 0 resuming | crypto helper 0 starting work-order 223 for state #223 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 223 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 223 time elapsed 0.000985 seconds | (#223) spent 0.988 milliseconds in crypto helper computing work-order 223: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 223 for state #223 to event queue | scheduling resume sending helper answer for #223 | libevent_malloc: new ptr-libevent@0x7fb384043210 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #223 | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 223 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #223 | **emit ISAKMP Message: | initiator cookie: | 7a 51 ea 00 7b 14 8e 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-223 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8e c0 c4 41 9a 95 cc 81 e9 60 68 ab 45 9c 08 20 | ikev2 g^x b4 5a a9 9d 67 49 a7 46 aa 2b 2c 92 19 0c 98 42 | ikev2 g^x fe fb 4d 10 39 99 af 92 9d b6 2e 88 4d d0 11 c1 | ikev2 g^x cc 58 dc fa d8 45 59 75 a4 74 03 ef 28 b6 b2 df | ikev2 g^x 65 14 7b c4 56 cb 7e 8e c8 a4 2d ad 67 70 a7 55 | ikev2 g^x 5c 9f d8 c8 c5 46 4c 1e 63 7d 5e ab 57 ab 59 40 | ikev2 g^x f4 a8 4b fe 89 d6 bf 01 54 f9 46 07 86 f8 bc 75 | ikev2 g^x ef 26 9f 79 f2 7c 5a c2 f7 65 21 b4 f5 f9 18 0f | ikev2 g^x 7d 48 47 25 7b 23 3b 60 c4 8a 45 86 e2 31 42 68 | ikev2 g^x 91 5b 9e 0c 6c bd d5 91 7e aa 25 22 d3 ee bf b3 | ikev2 g^x c7 ca 4c a5 a7 05 79 a5 99 a0 88 70 14 6f be 39 | ikev2 g^x bf 8f 50 de 92 0a f3 4f c2 47 ed ec a9 88 76 bd | ikev2 g^x f2 c3 85 8c 4a 5e bf dc 44 3e af ee 45 cf 06 99 | ikev2 g^x e5 de 11 6a 2b 48 7c 22 42 d6 dd 11 a6 82 39 4f | ikev2 g^x 9c 24 2f 97 4c 87 c3 35 46 b2 19 ca 91 0d f2 ce | ikev2 g^x c9 8b b5 a0 e0 d7 a9 24 95 51 89 2f 04 0b 43 0c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 82 03 c4 08 4c 73 33 ac 95 33 24 a4 7a b6 82 c3 | IKEv2 nonce 62 e4 f0 a1 f5 68 f8 16 c8 95 15 db 31 e3 65 d0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7a 51 ea 00 7b 14 8e 05 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 df | natd_hash: port= 01 f4 | natd_hash: hash= d4 01 2d a5 d7 3f aa d5 34 53 23 34 04 fb 26 40 | natd_hash: hash= 92 12 55 4e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d4 01 2d a5 d7 3f aa d5 34 53 23 34 04 fb 26 40 | Notify data 92 12 55 4e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7a 51 ea 00 7b 14 8e 05 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a6 35 a0 ce 14 8d c6 b8 e2 da 44 eb d4 cc fd 65 | natd_hash: hash= 95 2a 9c c1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a6 35 a0 ce 14 8d c6 b8 e2 da 44 eb d4 cc fd 65 | Notify data 95 2a 9c c1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #223 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #223: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #223 to 4294967295 after switching state | Message ID: IKE #223 skipping update_recv as MD is fake | Message ID: sent #223 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-223" #223: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.223:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #223) | 7a 51 ea 00 7b 14 8e 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e c0 c4 41 9a 95 cc 81 e9 60 68 ab 45 9c 08 20 | b4 5a a9 9d 67 49 a7 46 aa 2b 2c 92 19 0c 98 42 | fe fb 4d 10 39 99 af 92 9d b6 2e 88 4d d0 11 c1 | cc 58 dc fa d8 45 59 75 a4 74 03 ef 28 b6 b2 df | 65 14 7b c4 56 cb 7e 8e c8 a4 2d ad 67 70 a7 55 | 5c 9f d8 c8 c5 46 4c 1e 63 7d 5e ab 57 ab 59 40 | f4 a8 4b fe 89 d6 bf 01 54 f9 46 07 86 f8 bc 75 | ef 26 9f 79 f2 7c 5a c2 f7 65 21 b4 f5 f9 18 0f | 7d 48 47 25 7b 23 3b 60 c4 8a 45 86 e2 31 42 68 | 91 5b 9e 0c 6c bd d5 91 7e aa 25 22 d3 ee bf b3 | c7 ca 4c a5 a7 05 79 a5 99 a0 88 70 14 6f be 39 | bf 8f 50 de 92 0a f3 4f c2 47 ed ec a9 88 76 bd | f2 c3 85 8c 4a 5e bf dc 44 3e af ee 45 cf 06 99 | e5 de 11 6a 2b 48 7c 22 42 d6 dd 11 a6 82 39 4f | 9c 24 2f 97 4c 87 c3 35 46 b2 19 ca 91 0d f2 ce | c9 8b b5 a0 e0 d7 a9 24 95 51 89 2f 04 0b 43 0c | 29 00 00 24 82 03 c4 08 4c 73 33 ac 95 33 24 a4 | 7a b6 82 c3 62 e4 f0 a1 f5 68 f8 16 c8 95 15 db | 31 e3 65 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 01 2d a5 d7 3f aa d5 34 53 23 34 | 04 fb 26 40 92 12 55 4e 00 00 00 1c 00 00 40 05 | a6 35 a0 ce 14 8d c6 b8 e2 da 44 eb d4 cc fd 65 | 95 2a 9c c1 | state #223 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a45310 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45310 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #223 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 | #223 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49618.446128 | resume sending helper answer for #223 suppresed complete_v2_state_transition() and stole MD | #223 spent 0.465 milliseconds in resume sending helper answer | stop processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb384043210 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a 51 ea 00 7b 14 8e 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #223 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #223 | rejected packet: | 7a 51 ea 00 7b 14 8e 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #223: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #19 | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #19 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #19 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49618.454867; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007228 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94500 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #19 | libevent_malloc: new ptr-libevent@0x7fb384043210 size 128 "road-eastnet-nonat-19" #19: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #19) | 71 b7 8f 2a c9 ab 65 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 3e b3 71 5b 2a 7e 67 38 d7 ab 7a d2 03 90 2c | 27 b7 e6 d5 a7 20 27 79 5e 88 db 2d 02 14 e6 05 | 6f 07 f4 c1 2b 42 e9 2b 16 c7 24 00 68 97 23 09 | 9b 28 53 ba dc 36 46 57 40 1e 29 01 4a b7 49 a8 | 4d 9b c0 f6 6d 6c 59 7a d3 fe f7 05 02 d7 dc 3f | 33 37 fa 6e 66 82 3b 0b fc 41 01 e0 cf 12 33 b2 | a1 18 77 fd c8 36 dd ad 0b 8f 44 4a dc 2c 38 79 | 30 fa d4 bf 2a 29 27 db 37 30 a3 c6 e5 0f b5 2b | 3c 20 72 b8 f7 83 6c 1c 84 55 8f f3 1f 64 ae 19 | e5 47 9f 5e eb 0a e5 2c 75 55 6a e2 43 09 5c e9 | 24 9c 73 ae e6 a6 e7 07 f6 fe ad 11 3d af ab 94 | 47 55 a2 0e c7 5d 4b 0e 42 8f 1e 08 35 c6 12 3b | 76 58 3a e5 1d 69 62 62 bc c4 a4 b5 cb 6c d9 c9 | 2b 81 e2 3b e9 c6 13 78 c3 3f f3 38 91 f3 11 a1 | 04 e8 fa 3f 9f e8 f9 3d 60 98 07 62 99 3c 36 86 | 40 55 c7 f1 5a 42 4d 99 21 5e 58 f5 e4 8a cb d6 | 29 00 00 24 d1 01 c3 e5 0a d4 10 8b f6 20 25 e6 | de b5 f4 be cf de 7f f4 c1 d3 ec a5 70 52 4e 33 | 0b 30 f5 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 74 af f0 20 10 33 a5 14 d9 51 67 | 36 d9 37 b0 71 8d 2c dc 00 00 00 1c 00 00 40 05 | 0e 08 6a ae a9 27 97 90 41 13 4d a4 49 51 01 50 | a2 07 2e 34 | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #19 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 b7 8f 2a c9 ab 65 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #19 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #19 | rejected packet: | 71 b7 8f 2a c9 ab 65 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #19: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a73690 | handling event EVENT_RETRANSMIT for parent state #182 | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #182 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #182 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49618.45516; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003421 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #182 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-182" #182: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #182) | 8e 7e 13 89 c5 5d f7 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 e9 75 54 2d e8 42 37 37 23 34 72 75 33 ca 7f | b2 72 0c b6 c2 49 71 7a 03 e3 1d 07 58 b0 51 38 | 61 45 b2 16 d2 ad 2f f3 7c 0e 1f f4 c5 05 13 4c | d6 98 4b 66 e1 54 c0 73 13 91 4a f2 b3 d9 63 4c | 05 4b dc 71 47 da 12 a0 d3 dd 69 f7 37 06 e9 cd | 0a 8b 52 94 8a 6d da 5b 07 14 54 d3 97 43 1d a2 | ab 36 1f dc b8 97 c0 22 40 d5 44 3f fd 99 bd 8a | 9c f3 b8 47 00 bf 43 3d ae b2 e8 4a 6b 45 ec 0f | 5f e8 9a 25 7c ca 9d 80 f8 42 ce d3 9c bf c6 35 | 83 b9 bc 3b e5 0c da 92 14 98 a7 1a ce 79 b0 48 | 82 a8 51 c4 ec a8 10 1d b7 45 e5 80 dc 95 d7 16 | 44 79 9a ed 89 ab 16 cf 11 d5 7e 53 46 f0 d9 00 | eb 07 b7 8a d9 e3 ff b1 2b 68 df 33 18 af 5f 4c | 9c 70 63 04 6b ff 29 aa a6 e4 41 5f 2d 42 80 3a | 0d 17 98 f8 4e ea 6a f2 2b f3 0d 26 ff 27 2a a7 | a3 13 57 12 6f 11 b8 dd 58 53 1d d0 16 a0 b0 ee | 29 00 00 24 65 07 2e e4 49 be 52 f9 c6 9f 8e 3b | 7c a2 61 d2 67 51 00 51 49 02 4e 77 4c 09 9c a2 | 72 c6 03 a7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 04 ff 12 2b f3 10 13 86 f3 c1 ff | 09 98 25 be d2 68 ad 5e 00 00 00 1c 00 00 40 05 | d9 6b 4d a2 91 b8 eb 60 71 cf 0d f0 f9 f0 84 45 | 87 2d 57 76 | libevent_free: release ptr-libevent@0x7fb34403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a73690 | #182 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 7e 13 89 c5 5d f7 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #182 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #182 | rejected packet: | 8e 7e 13 89 c5 5d f7 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #182: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0573 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ffbf0 | handling event EVENT_RETRANSMIT for parent state #214 | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #214 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #214 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49618.471446; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001952 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a73690 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #214 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 "road-eastnet-nonat-214" #214: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #214) | 4f 29 16 ab 3e 1b 1d 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 9a ad a4 54 39 e9 04 15 a2 a4 f0 c8 dc 49 94 | 47 5a 04 64 04 57 79 8f 63 87 e7 ae b7 39 62 ec | 47 13 85 3d 4e a0 14 32 15 25 a6 7d a4 f2 aa aa | 67 17 a5 b2 08 db fc bd dc 96 aa 21 e7 a5 f2 3b | 34 82 35 14 fb 4a be 16 a9 a7 92 42 29 b2 17 4d | 52 27 87 ea b1 3a fa 6c 11 62 48 2f 81 f0 58 f6 | 6c 8b 54 c6 3c a7 1a eb fd 0e 51 2e 43 a1 67 7f | 52 b6 51 7f f1 6a 5e 3d a1 55 84 4d aa 64 fa dd | d4 68 19 0a 1c f1 aa ed d1 aa 12 27 11 44 c1 42 | 4c 3e ce c4 42 e7 8a 9f 52 d8 86 65 33 7c 9a 6a | ee 61 16 79 e0 6f bf 94 55 b9 32 ad 6e 68 90 17 | bb 0e f5 75 b4 7f bb 34 59 92 4e 2a eb db ac 26 | 62 0d 79 8b 29 38 a9 d3 9a dc 81 9e 5b 01 b1 77 | b2 97 be 93 40 8c 22 a8 ed c3 3b 34 e3 61 26 ff | 40 f0 34 c1 02 20 28 94 a9 ac e5 14 88 22 c0 0f | 0a ad af f1 ac 83 5f 84 02 43 33 bf d4 08 dc 06 | 29 00 00 24 dc 16 0d 02 e8 ab 94 84 4c 26 85 d4 | 77 69 31 1b 43 d5 c1 b1 2c a0 69 25 59 ad 36 b7 | 5c 40 16 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 ae d6 cb 98 74 13 91 af 99 ac 97 | 02 1b 9a 5a 71 bb 20 28 00 00 00 1c 00 00 40 05 | 20 56 0b 1b ec fa 37 e0 47 28 94 e0 2b 28 be ff | 21 7d 56 5a | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ffbf0 | #214 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 29 16 ab 3e 1b 1d 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #214 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #214 | rejected packet: | 4f 29 16 ab 3e 1b 1d 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #214: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abe740 | handling event EVENT_RETRANSMIT for parent state #125 | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #125 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #125 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49618.480819; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004761 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94540 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #125 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 "road-eastnet-nonat-125" #125: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #125) | f8 42 71 02 91 3f e5 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 9e 73 35 93 13 e2 cc 9b bb 37 d3 75 99 15 b9 | c8 4a ce 55 d3 69 e2 90 ce b4 49 6a 8b 41 15 d7 | f2 46 e0 27 62 0c f2 50 c4 fb 7a 1e 5f c1 57 37 | ab d6 7e 39 28 cf 50 b1 15 3d a6 21 69 94 78 9b | 54 78 01 d1 17 2e a1 fd 93 52 02 9b 3c fa 9a 7e | f8 6f 1b 35 4d b8 9a ab 6d e7 64 f6 f2 1a 64 ed | d4 92 58 2f 44 f7 44 27 44 49 1f 1e 22 3d 31 b1 | 50 2c 4d bf f2 3d 61 05 62 ba 25 68 46 81 35 68 | ee 83 cc 8e 2f 04 b6 7e f4 22 67 88 a2 a7 7a f7 | d0 39 1f 83 7d bc f9 79 5c 9d a8 05 2d 41 b5 ef | cc 86 a3 2b c2 79 2a 6d ea bc cb e6 b2 db 61 3a | 30 32 b0 ff 93 a0 20 c1 58 b9 6f 0c 98 fb c0 64 | d2 03 d7 d7 ac 87 bc 66 28 b7 cc 94 87 ea 24 29 | 58 cf 8f 26 39 81 cd e2 dc 0f e9 13 b2 ad b9 3b | 9a e1 c6 4a a2 fb 0d d5 e3 d1 b9 df 52 b9 c6 69 | 37 c0 e4 dc a2 a0 32 29 a3 ce 29 ec cc 5f 70 82 | 29 00 00 24 10 12 73 da 9a 48 c8 49 81 7a 15 0b | 6c a0 98 5f 53 25 0d 7d 05 70 86 c7 7b b0 fa 34 | 5d 40 8d 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 88 74 d5 c4 71 1e 67 79 c5 82 86 | 3b ab 9f 01 a1 7f ec b6 00 00 00 1c 00 00 40 05 | cc 1e cf e5 ba 96 b4 e9 50 32 59 97 59 23 89 39 | 4f 1c 94 28 | libevent_free: release ptr-libevent@0x7fb34c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe740 | #125 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 42 71 02 91 3f e5 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #125 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #125 | rejected packet: | f8 42 71 02 91 3f e5 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #125: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #183 | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #183 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #183 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49618.523155; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.008515 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe740 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #183 | libevent_malloc: new ptr-libevent@0x7fb34c0251c0 size 128 "road-eastnet-nonat-183" #183: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #183) | d6 e6 54 26 a5 51 49 90 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b d3 2c d5 46 1e bb 45 3e b1 07 9c 29 85 98 93 | ee 36 97 24 0c 65 6e 72 03 fd eb 26 66 8a 4d 99 | 30 4c 18 3c 80 72 a6 76 e5 f3 36 3a 07 42 32 c2 | 39 e8 9d 5f ec e0 51 20 28 56 14 b3 ac 67 3c fa | 98 5a 37 73 bb 28 df c4 30 da b1 be 2e 7d cf b5 | aa 2a 51 9d a6 55 f1 d6 02 88 71 ea 44 18 ea 39 | 96 0e 47 c9 6e 26 f7 c4 74 bc 17 b7 c1 ce f4 36 | 36 cb e7 f5 29 fd 74 37 cc 31 1f ce 2f ee 7a 23 | fd da 91 35 f0 f9 ff ec 58 26 8a a2 2f d2 81 0d | a1 17 24 44 c9 5f 1e 77 b9 2b 2f 5a f9 47 ce 83 | a8 fd f0 5f 20 8d e8 9e 6f 25 55 3c b9 c3 9c 82 | 64 c6 bd 5c b0 07 c1 4a d5 fd 91 20 b3 b1 5d bd | 38 8e ad d0 f3 fd d6 24 13 d0 4b 1a eb b6 e2 f9 | 08 8d ad d1 8e e2 f0 e9 c7 8d cc 8b a6 0c 02 89 | 89 a8 da 17 42 b0 bd b2 29 34 67 25 c6 68 61 cb | 05 67 1d b0 18 99 57 3e 48 e0 4d 27 90 f1 05 8d | 29 00 00 24 fb 03 08 25 8e 6d 3a 5f 6f 85 88 7b | 77 f7 13 2b 6d 57 c0 a9 57 85 b0 8d 7b f6 0e 38 | 56 d2 56 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 0a 8e a5 81 0b e2 cf 5a 0e 0b 81 | 8d 82 2c 01 80 91 75 34 00 00 00 1c 00 00 40 05 | bf 20 fb 11 3c 6a fd 35 31 59 61 81 c5 7f e8 2f | e6 90 5e b8 | libevent_free: release ptr-libevent@0x7fb36402a780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #183 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 e6 54 26 a5 51 49 90 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #183 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #183 | rejected packet: | d6 e6 54 26 a5 51 49 90 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #183: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0696 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abe780 | handling event EVENT_RETRANSMIT for parent state #219 | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #219 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #219 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49618.53572; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500305 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #219 | libevent_malloc: new ptr-libevent@0x7fb36402a780 size 128 "road-eastnet-nonat-219" #219: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #219) | 7d 80 b0 77 1f 48 77 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 87 5e 24 5c db 31 0a 96 84 9d 90 05 c1 73 ea | 13 fd da 1a eb 02 9b 1b a2 ef f5 1e 7d d5 07 48 | 63 2b 15 ef 39 49 2f 72 57 96 fc d0 52 b7 b4 5b | b9 8f 1f 7d 66 98 1a 54 e8 35 20 c8 da d6 6b 14 | 12 96 09 73 f0 2a 18 19 ad 4f ad c0 e9 02 7d bf | 91 ef d7 b5 3d bf 72 91 c2 b3 4a 21 80 f5 15 86 | f5 a2 c4 99 67 47 6c 96 fc e1 53 b9 1a ff ad 2e | 5a 73 b4 6f 29 39 2a 43 c9 46 c0 b4 6f 20 2e 1e | 67 a0 45 fd 13 c6 d4 73 ef 07 78 d4 9f 67 9c 74 | b8 b8 8b 57 22 93 1b 6e 1c 48 7c 01 8f e1 37 24 | ca 0b 69 5d 4d 5a 11 fe 79 69 f3 19 5f e1 13 01 | 72 da c7 1d 2e 2d 95 6b 1a 0c 79 15 cc 16 3b c9 | df 53 b2 62 55 3b 89 98 3a 35 b4 a3 d8 f7 72 66 | 5a 4a cd 05 1d 45 02 1c a4 80 ce 7b 71 ea 76 a3 | 4c 87 0d 5f a5 5d 61 29 09 d4 52 68 95 1e 6d d6 | 81 6a 00 e1 92 ed bb e5 1a 97 43 9e cf 2e 23 af | 29 00 00 24 3d 29 6e 63 66 7a 35 4b 56 6e f9 8b | 96 51 14 3b cc a7 be 10 65 46 ea 6e 67 b7 cd b3 | c7 62 bc 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 d7 c1 a6 5e c6 d2 33 1c 31 12 89 | 58 68 2a 17 e1 05 d4 0f 00 00 00 1c 00 00 40 05 | 8f 01 0b 19 90 57 cd de dd b3 66 c4 60 3d 67 fe | 89 ed 52 b0 | libevent_free: release ptr-libevent@0x7fb3500300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe780 | #219 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 80 b0 77 1f 48 77 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #219 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #219 | rejected packet: | 7d 80 b0 77 1f 48 77 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #219: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.066 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a97080 | handling event EVENT_RETRANSMIT for parent state #205 | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #205 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #205 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49618.537054; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002768 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe780 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #205 | libevent_malloc: new ptr-libevent@0x7fb3500300e0 size 128 "road-eastnet-nonat-205" #205: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #205) | 96 a5 4d 09 36 59 36 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 af 72 1b a0 98 9e 50 b5 1c 2a f4 25 37 46 6d | 29 08 48 dc 3a 43 a8 47 58 90 05 63 32 ed 1e 67 | 1c d6 5d a6 5c c9 d2 88 4d 23 9d 29 85 6c bc 34 | b6 39 47 15 78 35 07 0e dc 99 e1 b1 20 70 65 8b | 00 6c f0 e9 44 5b 08 c2 17 e1 6b 72 9c af 6c 5b | a9 60 97 0c ec 66 17 57 bd 76 76 97 27 d0 77 4a | 2a 55 71 50 75 d7 68 7b d8 80 b2 7a 09 02 08 2b | 09 0a ee 89 61 3b 8a 2f 12 7c cc 05 74 ec 11 d1 | 9b a1 09 08 7c 39 7a ee 4d 88 62 16 e2 82 1b b3 | d9 8f 53 7a 4b 48 dd 7d 8c 47 a4 25 61 2b 5a 2a | 2f 93 a5 82 b2 4d a6 fe b3 ac 51 3e da 8f 23 63 | f4 2a 7e 1b 28 f1 63 98 1b 09 f8 46 7c 59 0e 77 | 0b 32 ae 4e 95 8f da e9 a4 30 df 08 42 58 09 74 | 83 d9 4e 39 cd 7e 3b e6 37 1b b5 f8 2d 02 a3 8b | db d0 44 1c b8 65 c5 60 b6 1d bd 0a 87 21 84 61 | fa 21 34 4e 05 0a 9f 1b ec 7d 07 6c c5 18 67 d9 | 29 00 00 24 6c 40 f7 85 3a 61 11 e1 6e 44 7b 14 | a7 18 59 d8 8f ce 04 ee 70 39 7f 15 26 c1 43 92 | dc 05 98 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 dd f4 0a 58 0e d8 12 1e dc 08 fa | c5 ab bd a9 a1 ef e0 c4 00 00 00 1c 00 00 40 05 | 38 8d 68 ba 0f a0 5d 58 b7 93 ab fe 9b f6 26 59 | 71 96 1a e7 | libevent_free: release ptr-libevent@0x7fb35000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a97080 | #205 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 a5 4d 09 36 59 36 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #205 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #205 | rejected packet: | 96 a5 4d 09 36 59 36 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #205: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3fc10 | handling event EVENT_RETRANSMIT for parent state #20 | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #20 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #20 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49618.539378; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006521 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a97080 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #20 | libevent_malloc: new ptr-libevent@0x7fb35000cf80 size 128 "road-eastnet-nonat-20" #20: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #20) | 2a d8 6a 5c 08 dc 68 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad 76 8b c3 8a cd 7e 81 09 43 af dc 84 86 57 86 | ac 01 81 74 96 d6 08 70 58 d2 f7 10 2a f2 1e 9d | b0 95 95 b3 32 1e e8 01 5c d2 e7 39 14 67 2f fd | 6f cc fb 0b 1d bd c7 ac 37 fb c6 6d e0 84 f8 c8 | 00 c1 d6 0f 3b e2 a7 4b 51 a3 13 bb 3d f4 c2 99 | 9b 84 74 df c2 bf fa 13 e4 2a f9 e8 2d 4c 6c c5 | 8d e3 52 85 e9 f8 18 fc 4b 38 b9 82 e0 ab 65 b7 | ae a5 89 3c 88 ee 05 34 a9 d7 52 0c 03 2e a9 7e | e2 c7 7b c9 35 8f e6 9e 0b 55 49 71 ce bd 37 1f | 22 8f 48 76 19 75 9b c0 7a 62 4e 51 77 02 d7 bf | e0 ea 0a 67 41 41 2e 98 4f f3 cf 32 f2 ae 82 83 | 1f 56 7c 33 17 50 fa 76 01 41 f1 ba 05 90 db bd | 83 b9 cd 1b b8 6e f3 33 72 7e 47 f3 20 71 8f e7 | ec 91 f3 37 6a 94 11 a2 55 f0 09 1c 76 98 cd 56 | 66 be 33 43 a6 1c f5 8b 31 c4 e3 0a 7b 29 cc 17 | 3f 13 b8 73 4c 86 e0 b0 2a 03 32 6a 19 82 cb a2 | 29 00 00 24 47 97 3a 6f 12 05 22 fe fb dc 3c 25 | ff 91 0d 7a c8 4c ac f8 1f 7e d1 5f 41 39 e3 39 | e8 aa 43 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f 67 98 f7 05 c6 ee 5e 5b 5f e2 fa | ee a5 ba af 57 96 46 d2 00 00 00 1c 00 00 40 05 | 3e ef c3 bb 3d a5 88 fb 9f 3c 53 fd 3b c9 ea 45 | 6f 53 bd 02 | libevent_free: release ptr-libevent@0x7fb34001a190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3fc10 | #20 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a d8 6a 5c 08 dc 68 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #20 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #20 | rejected packet: | 2a d8 6a 5c 08 dc 68 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #20: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0811 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aaf800 | handling event EVENT_RETRANSMIT for parent state #215 | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #215 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #215 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49618.555037; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00185 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3fc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #215 | libevent_malloc: new ptr-libevent@0x7fb34001a190 size 128 "road-eastnet-nonat-215" #215: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #215) | c5 c0 dd cc b6 af 51 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 5c 66 6c 45 6f a8 d2 4f 25 98 20 11 a6 a1 bb | 37 55 34 73 15 5d a4 49 35 cd f6 0a 9e e7 f3 5c | ad 42 56 ef b0 f4 fa f6 d5 ba 84 d6 dc e0 5f 55 | dc 55 56 f2 be 03 fe 4f 4a b4 66 3c 99 cb 71 e7 | b6 73 b2 44 ce 0d f7 96 90 78 2f 50 92 28 ba f9 | 22 e7 15 cf fa c8 47 f5 0c 38 c1 8a 24 5b 39 a8 | ac 47 31 ea aa c2 b1 57 78 79 5e 0b a7 a0 33 1b | 86 d9 45 31 c0 29 bb 67 d1 68 a7 f5 10 84 25 ff | 4c 83 f7 42 1d c4 e6 b7 53 b1 ed 6d 1b f7 86 9b | 3e cc 2d ee 22 b8 61 e0 e7 95 7c e8 c8 d8 b2 10 | 06 d9 50 52 8e 07 0b 4b 94 83 c7 4b 90 09 3a d9 | 8a 35 2d 83 36 bb 75 45 45 1c cf c0 11 7f 85 8d | ec e0 a4 ca 58 99 97 8b 10 af 58 2d b7 9b a7 f0 | a5 cb ea 38 04 fe 36 b9 b4 81 1d 8f 85 c7 76 a8 | d9 30 86 6d bd 32 3b 6b 02 28 ec 10 b1 28 43 17 | 56 d4 9e 0c 76 ce cc 71 e8 70 44 59 5e b3 3a a2 | 29 00 00 24 21 81 d6 ee 95 75 07 f2 b0 ff 0f d3 | a2 c0 2b d7 de b5 1b 67 08 ca 6e a7 a2 d0 6b ed | 6d c9 d5 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c 19 de 62 93 d0 a4 3d 26 c7 25 16 | 8c 72 93 29 4a 06 74 1d 00 00 00 1c 00 00 40 05 | 5e 68 d5 fe 16 1c 49 30 75 2d c6 7b 65 a2 b6 24 | 10 76 bd 1f | libevent_free: release ptr-libevent@0x7fb34001f920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aaf800 | #215 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 c0 dd cc b6 af 51 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #215 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #215 | rejected packet: | c5 c0 dd cc b6 af 51 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #215: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0751 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7fec0 | handling event EVENT_RETRANSMIT for parent state #126 | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #126 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #126 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49618.556832; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004498 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aaf800 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #126 | libevent_malloc: new ptr-libevent@0x7fb34001f920 size 128 "road-eastnet-nonat-126" #126: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #126) | e8 37 9e 74 e5 40 14 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 2e 1b 05 80 5b 31 08 d1 66 2e 5c f6 e3 82 b6 | cf 5f b9 6a dd 55 f8 75 d5 3d b8 5c bd 4f c2 50 | 0a c1 a5 ba ac d3 ed a9 a2 26 e9 cf 5d c3 e4 66 | fe 0f 85 c2 a3 49 2f d8 4a 79 55 9a fa 0f f5 79 | a1 74 22 f0 7e 0f 09 7b 62 ab a2 9e b4 ea 39 68 | 42 b2 f9 25 9e 6d 73 5b 0f 09 1e ea 93 29 57 3e | 0b 28 34 22 62 d9 38 bd 99 bc 2b d5 1f 39 74 2e | a0 e4 e1 6b 64 87 fc 4f 05 cf 11 87 31 49 19 0e | 81 e6 fe 59 5e 93 b2 b8 96 16 02 eb 5c 73 68 d5 | 8f 57 c4 c3 f1 4b 35 e7 45 9d 6f ab 95 16 38 da | 48 f9 98 9a 6a b3 e3 05 7e d3 b1 16 a3 ba 0c e1 | 94 2d b8 d2 c3 17 d4 a2 cf ba 7e e1 17 95 db f9 | 30 a3 18 b6 15 c5 b0 4b 3c 79 61 0d 1e 89 51 db | 9f 34 0b 87 9c ce 8f 37 05 a4 88 d5 17 64 46 6f | 94 21 dd 40 17 99 04 39 5f 44 53 61 87 2c 68 27 | 48 25 14 cc 6b a9 f6 c2 49 c7 4e ae 4c 5d 8d 5b | 29 00 00 24 d1 b1 6b 78 78 5e 9b dd d4 c3 b9 87 | 6c a1 e5 10 d6 78 32 5b 72 67 12 c8 56 ea b2 20 | 83 0f e6 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 48 05 b5 88 11 05 1e fc 96 b7 8b | c4 84 87 55 48 6d 71 7e 00 00 00 1c 00 00 40 05 | a7 78 89 b5 72 dc 59 97 b9 1b 86 02 9b 2c 28 d0 | 8e b7 7c 05 | libevent_free: release ptr-libevent@0x7fb34402a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7fec0 | #126 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 37 9e 74 e5 40 14 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #126 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #126 | rejected packet: | e8 37 9e 74 e5 40 14 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #126: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0721 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34800d120 | handling event EVENT_RETRANSMIT for parent state #184 | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #184 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #184 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49618.583849; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00507 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7fec0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #184 | libevent_malloc: new ptr-libevent@0x7fb34402a950 size 128 "road-eastnet-nonat-184" #184: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #184) | 71 40 97 9a 99 00 ff cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 9e 33 f9 05 c0 53 fb 65 12 d0 fd a6 93 df f1 | 7d bc 07 5e 94 4b 97 6f 27 67 0f f1 85 c0 12 45 | 70 43 01 96 7d 01 69 81 8a b0 0b 08 d1 40 54 69 | 08 7f 69 f8 31 5e 9b 37 c2 56 46 05 8a 2c 74 cd | 73 c4 b5 39 bb 8c 81 c4 97 49 18 2c ce 17 a4 56 | a5 b1 98 b5 93 fe 6b bc c2 93 00 1a 7a aa e8 f7 | 9e 16 d8 e6 36 67 49 7e af 2f 60 eb cd f3 b7 6a | 60 d2 41 2c 2b 50 9f c8 44 40 ce 80 81 98 cf 17 | 31 53 e1 d5 34 76 90 8f 6f 17 46 44 c2 a9 25 1a | bb c8 2b 12 0a 1a 41 c9 b5 0e b1 65 5f 47 47 f0 | bf a6 e5 e4 cc d3 34 bc 81 ca de 84 80 2f 52 78 | 36 7b 26 1f 30 98 4d d6 d7 8c 77 eb b9 19 2a e8 | 7d a0 5e 92 74 2d 37 d4 17 8f 23 ce 1e cd 45 d9 | cf f5 6b 81 d5 e3 95 2b bc 84 3e 19 7f 4a db 38 | c7 46 31 2c ab 66 d6 cd 71 a0 bf 63 ef a6 eb 59 | 13 88 4c 39 34 56 d9 d0 92 f8 f4 65 45 ad 6a 55 | 29 00 00 24 b3 65 f5 f0 87 cd d5 8a 91 5d ad e3 | f8 32 68 b3 e0 0d 46 b4 25 a3 92 64 33 fb 91 6e | c0 dc 6f 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 f2 a2 9a 11 9e a6 4a 33 e0 87 52 | 8a c6 6f 7b 74 99 45 a9 00 00 00 1c 00 00 40 05 | 98 85 7b 6c 79 cd cc f7 14 5f 2b 56 dd 51 39 9c | f7 d7 a1 50 | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800d120 | #184 spent 0.177 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 40 97 9a 99 00 ff cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #184 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #184 | rejected packet: | 71 40 97 9a 99 00 ff cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #184: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0757 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-224" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-224' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #224 at 0x557d46b05d40 | State DB: adding IKEv2 state #224 in UNDEFINED | pstats #224 ikev2.ike started | Message ID: init #224: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #224: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #224; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-224" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-224" IKE SA #224 "road-eastnet-nonat-224" "road-eastnet-nonat-224" #224: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-224 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-224": constructed local IKE proposals for road-eastnet-nonat-224 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 224 for state #224 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34800d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #224 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 | #224 spent 0.16 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-224" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.249 milliseconds in whack | crypto helper 9 resuming | crypto helper 9 starting work-order 224 for state #224 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 224 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 224 time elapsed 0.001004 seconds | (#224) spent 1.01 milliseconds in crypto helper computing work-order 224: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 224 for state #224 to event queue | scheduling resume sending helper answer for #224 | libevent_malloc: new ptr-libevent@0x7fb378046040 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #224 | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 224 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #224 | **emit ISAKMP Message: | initiator cookie: | df 89 b3 52 1f 0f f1 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-224 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 02 96 f9 c5 cf 52 6e 98 60 ae 95 1a e5 7e 1a 31 | ikev2 g^x 50 be ef 8d 41 26 11 5a 53 58 33 b0 a8 71 a8 6c | ikev2 g^x e8 76 92 5b e2 75 f3 94 63 68 60 f5 a8 87 0f b1 | ikev2 g^x 85 e3 57 f0 0a 68 7c 03 0c 38 78 58 ee f2 b7 98 | ikev2 g^x 27 f8 ff c8 7f ae 35 5b f2 27 8d 00 b6 82 75 2b | ikev2 g^x 3b 8a 79 42 25 39 44 44 74 88 57 0d 59 d9 ac 5f | ikev2 g^x 3a a3 28 54 30 c8 14 8d d4 ac c4 45 3f f7 ef e3 | ikev2 g^x 1f eb 55 97 53 44 9f 09 90 a7 a8 b1 9f 93 b7 ec | ikev2 g^x 77 b6 57 89 c8 dc e6 37 8a a8 71 f3 b4 89 24 f8 | ikev2 g^x 4d 88 b5 f8 54 45 64 00 76 98 8f 87 5f 00 73 6a | ikev2 g^x f6 f0 80 19 81 11 66 a0 99 ea 82 6c 63 da b4 a5 | ikev2 g^x 98 93 6c 76 ef 6c 97 72 9f 10 64 96 91 57 93 6d | ikev2 g^x a1 3f 92 89 58 38 d2 cf 72 5f 0f 1e 71 7d 51 50 | ikev2 g^x af 30 4c 3a ad 78 8a 2d 7e 0c 42 b8 89 96 d8 fc | ikev2 g^x a1 5f f4 b6 9f 10 b4 87 26 b0 a3 fb 36 06 d9 24 | ikev2 g^x c5 ea bd 98 29 fe 3b d7 81 37 c6 01 f7 9b f8 78 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c7 58 00 d8 91 d9 da 4a 3e 8b 1d 2d a3 43 99 18 | IKEv2 nonce 27 ab 56 0f 2a b9 54 4e 52 a3 14 24 6c 73 a2 b8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= df 89 b3 52 1f 0f f1 c2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e0 | natd_hash: port= 01 f4 | natd_hash: hash= 40 3a 6a 95 ab 61 8d 6b 1f 3b c7 26 b3 ad 90 46 | natd_hash: hash= 7f 26 ab 97 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 40 3a 6a 95 ab 61 8d 6b 1f 3b c7 26 b3 ad 90 46 | Notify data 7f 26 ab 97 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= df 89 b3 52 1f 0f f1 c2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 80 ec 8b 4c 52 09 6e c6 12 ca 33 07 bd aa 68 3f | natd_hash: hash= 33 bf 9b d1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 80 ec 8b 4c 52 09 6e c6 12 ca 33 07 bd aa 68 3f | Notify data 33 bf 9b d1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #224 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #224: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #224 to 4294967295 after switching state | Message ID: IKE #224 skipping update_recv as MD is fake | Message ID: sent #224 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-224" #224: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.224:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #224) | df 89 b3 52 1f 0f f1 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 96 f9 c5 cf 52 6e 98 60 ae 95 1a e5 7e 1a 31 | 50 be ef 8d 41 26 11 5a 53 58 33 b0 a8 71 a8 6c | e8 76 92 5b e2 75 f3 94 63 68 60 f5 a8 87 0f b1 | 85 e3 57 f0 0a 68 7c 03 0c 38 78 58 ee f2 b7 98 | 27 f8 ff c8 7f ae 35 5b f2 27 8d 00 b6 82 75 2b | 3b 8a 79 42 25 39 44 44 74 88 57 0d 59 d9 ac 5f | 3a a3 28 54 30 c8 14 8d d4 ac c4 45 3f f7 ef e3 | 1f eb 55 97 53 44 9f 09 90 a7 a8 b1 9f 93 b7 ec | 77 b6 57 89 c8 dc e6 37 8a a8 71 f3 b4 89 24 f8 | 4d 88 b5 f8 54 45 64 00 76 98 8f 87 5f 00 73 6a | f6 f0 80 19 81 11 66 a0 99 ea 82 6c 63 da b4 a5 | 98 93 6c 76 ef 6c 97 72 9f 10 64 96 91 57 93 6d | a1 3f 92 89 58 38 d2 cf 72 5f 0f 1e 71 7d 51 50 | af 30 4c 3a ad 78 8a 2d 7e 0c 42 b8 89 96 d8 fc | a1 5f f4 b6 9f 10 b4 87 26 b0 a3 fb 36 06 d9 24 | c5 ea bd 98 29 fe 3b d7 81 37 c6 01 f7 9b f8 78 | 29 00 00 24 c7 58 00 d8 91 d9 da 4a 3e 8b 1d 2d | a3 43 99 18 27 ab 56 0f 2a b9 54 4e 52 a3 14 24 | 6c 73 a2 b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 40 3a 6a 95 ab 61 8d 6b 1f 3b c7 26 | b3 ad 90 46 7f 26 ab 97 00 00 00 1c 00 00 40 05 | 80 ec 8b 4c 52 09 6e c6 12 ca 33 07 bd aa 68 3f | 33 bf 9b d1 | state #224 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34800d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #224 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 | #224 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49618.614373 | resume sending helper answer for #224 suppresed complete_v2_state_transition() and stole MD | #224 spent 0.472 milliseconds in resume sending helper answer | stop processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb378046040 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 89 b3 52 1f 0f f1 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #224 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #224 | rejected packet: | df 89 b3 52 1f 0f f1 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #224: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a50110 | handling event EVENT_RETRANSMIT for parent state #220 | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #220 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #220 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49618.625829; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.504964 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ffbf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #220 | libevent_malloc: new ptr-libevent@0x7fb378046040 size 128 "road-eastnet-nonat-220" #220: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #220) | 46 e4 bb be 2e c2 5d 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 39 4d 80 66 08 94 81 6d ee b8 9e f9 65 a1 19 | 54 a6 0a fc 14 3b 49 4b a5 b0 75 d5 8f f4 dc f0 | 1b a7 3c f6 bb e2 05 ae e7 81 f3 39 80 b8 01 f9 | 77 d5 d3 86 7b 99 e2 d3 05 f7 72 fa 5c f1 d2 51 | b2 76 8c 56 54 09 b2 f0 63 f0 63 23 b4 3d 48 f6 | f1 7c 7c 9e fe e8 97 61 67 eb 6f f5 a8 99 0f d8 | f0 a4 2a 65 98 03 64 d4 51 ad 7e ce 83 6c 68 5a | 24 81 05 98 d2 e5 16 4b 8b 3e c7 e6 5d cd e2 fb | a8 b3 8a 3b d0 a3 7d ce 4c 78 67 e6 b6 09 60 ba | f9 1c b9 ed ac 41 f4 ed a2 6c 61 ed 1a 8b 86 32 | f9 bb e7 03 fa 79 52 88 d5 55 24 b9 5c 26 d9 4f | 84 6f 26 7a 2c f2 0f 72 55 f3 04 53 6d 42 03 19 | 2c 35 89 e8 72 3a 30 cc ba be ce f2 4a 96 71 78 | 63 64 85 27 33 b9 dc 2a 58 25 92 09 0e 9f ab 45 | ad 24 0f 92 22 24 6c f4 98 77 7a 79 50 d8 2c a5 | 5a fb ac f5 20 e9 5a 93 8b 11 3b 04 5b 8e 94 e7 | 29 00 00 24 b8 3d f3 f9 87 d9 e7 9e 4b f1 71 60 | 7a f6 ea f9 0f a9 84 5d c0 c1 a6 93 b2 00 5b f0 | d8 3e 37 a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f9 77 af d4 23 66 f6 eb 62 8a 75 68 | f1 14 74 bf 89 18 b5 2c 00 00 00 1c 00 00 40 05 | 75 8f 21 77 9e bf 74 11 1b b7 a1 b1 db ce 3f 91 | e1 e1 a3 e9 | libevent_free: release ptr-libevent@0x557d469e1b60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a50110 | #220 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 e4 bb be 2e c2 5d 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #220 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #220 | rejected packet: | 46 e4 bb be 2e c2 5d 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #220: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0732 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ef4e0 | handling event EVENT_RETRANSMIT for parent state #216 | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #216 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #216 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49618.645279; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003401 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a50110 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #216 | libevent_malloc: new ptr-libevent@0x557d469e1b60 size 128 "road-eastnet-nonat-216" #216: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #216) | e7 ef a7 cc e6 d3 f6 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 f0 d1 10 02 25 ff 09 54 9a 27 0a d6 e1 75 e9 | 4b 25 09 80 13 1a bd 53 71 22 e7 a5 75 81 d1 8a | 25 47 40 c6 b3 5d 03 6d 9e 83 d1 92 a9 46 5d 4b | 0d 28 c0 ae 0f 26 63 48 22 7d dc 47 5b d5 77 07 | 29 79 06 04 6b 6b 34 8f 3e bd d3 ec 63 f9 78 20 | 47 7a 08 c2 44 b5 60 c5 73 9a 3e 6a 29 e5 d6 96 | 62 d8 90 b5 3b c6 8d 28 1b e2 87 89 6b 14 69 c3 | 86 f7 90 a6 77 5f 07 46 5b 86 a4 37 e5 80 d5 e7 | e9 b6 1c 3b fa 48 83 e6 86 71 bb 22 3d c4 ff 70 | 08 57 53 75 69 80 73 34 3e 38 54 52 61 ad 52 b2 | 0c fc ac 12 69 16 4e 5c 14 e0 22 a5 7c 1b 1c 49 | 5d 41 d4 29 4c a2 8d 47 62 eb 64 7a 68 a3 77 fb | 8e a3 71 52 dc 60 0e ae 77 65 2b 4f c0 c2 80 7f | 93 d4 83 22 60 eb f0 ba 08 6e ef a3 c7 ae 6d c8 | ec 04 d3 0d a9 20 db 31 6f de c9 65 e4 0b a9 11 | a7 ab 82 ef 2d c1 74 f2 d3 be 19 9c 04 b0 c9 04 | 29 00 00 24 95 80 09 e7 7a 52 78 28 1a 48 0b 4c | 98 2f 28 0b b9 93 53 be d8 60 a3 a7 18 da 10 17 | 4f 70 e3 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 7b e5 1c 98 48 0c 58 81 2b 7b fc | 78 24 fa 6c 15 2c ab c0 00 00 00 1c 00 00 40 05 | 11 88 73 d8 fc 53 52 81 2d 03 8d 95 6f 83 2f ef | fe a8 7c ee | libevent_free: release ptr-libevent@0x7fb3380407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ef4e0 | #216 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 ef a7 cc e6 d3 f6 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #216 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #216 | rejected packet: | e7 ef a7 cc e6 d3 f6 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #216: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a60690 | handling event EVENT_RETRANSMIT for parent state #206 | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #206 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #206 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49618.652127; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004639 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae4840 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #206 | libevent_malloc: new ptr-libevent@0x7fb3380407f0 size 128 "road-eastnet-nonat-206" #206: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #206) | 01 b3 28 e7 e1 8b 13 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 fa e3 24 f9 a6 bc f3 21 1e 37 1a 6d f4 9a 7b | 77 24 5e 56 24 67 7b 74 f9 64 dc d8 1a b5 59 69 | d9 52 b7 b7 59 74 06 38 08 06 47 89 aa a8 f6 76 | 67 bf d4 4c 77 38 3b a1 63 60 dc 2b e4 fd cd 8b | 9a 4a 0c c7 7b 27 52 84 4e da 22 90 8d d5 51 6e | 00 c5 39 c6 ed 97 f2 c6 62 d9 ba 39 61 32 bb b8 | 11 91 00 ac cd 59 52 93 9f 38 fd 04 59 e4 ef 16 | eb bf 19 45 a5 bc 57 3a 53 a0 af 42 99 76 fa 1f | bd f3 4c 0f c8 d9 db e2 c0 a7 a6 04 31 f7 f9 f3 | 77 5c f7 e0 36 17 0a 5b 7e 68 29 02 15 2c e5 8a | 69 a2 34 36 51 a6 dc bd 4c c4 84 48 fa dd 5f b4 | 73 4d 7d 2b ff 7e df 63 45 9b 17 c7 95 9a 49 c4 | 94 db d0 f3 cd fa 37 d8 ec f4 8c 44 3e 14 f3 a8 | 13 2a dc fa 14 d8 cb 5f 5e 17 3a bf 2d 92 c3 14 | 49 5a 16 33 0a 40 13 9b 4f 56 1a aa ae 2b 43 6f | 7d 54 d1 07 b7 2a 7c 54 16 74 51 00 fd 0a b4 02 | 29 00 00 24 44 53 3f fa 64 f7 0e 35 c1 fb 1d 6e | fa 42 52 34 05 1a a7 3b 67 a9 b1 fa 7a da c7 46 | 65 3a cf a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 ab 21 a3 8f 50 c0 c7 3c cf c9 b6 | d3 91 c9 10 6d b3 85 90 00 00 00 1c 00 00 40 05 | fa 90 51 e6 cc c6 e6 dc b8 75 a7 d9 1e dd 64 0c | e1 7b e8 fe | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a60690 | #206 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7ced0 | handling event EVENT_RETRANSMIT for parent state #127 | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #127 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #127 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49618.652318; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007755 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a60690 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #127 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 "road-eastnet-nonat-127" #127: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #127) | 63 d9 7e 94 07 33 4b 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 5b 4a 46 df 60 33 0f 95 de e0 db c8 23 3c 72 | 78 4a 11 2d af 6a 95 71 57 bb 1d b2 0d c1 6e 56 | 18 59 e0 13 b5 5d 90 db b2 9a 12 87 33 39 67 e9 | 2a 2f bf ff 22 ca 7b ca ba cd 4e 56 00 bb 9c b4 | 81 b8 dd 6f 82 ec c7 49 d2 fc 91 38 84 1c a6 e9 | d6 e7 21 dd e8 11 d8 38 94 4d 8d 43 29 97 aa c4 | 81 24 9f fc d5 c9 48 0f a7 fe 34 f9 6d 30 3e 1f | 7a 4f f5 5e d9 cc da 01 80 42 b1 dc 13 04 fb 2f | cb ae 40 53 b9 7a ac 75 1a e1 0f 4b 6c 39 b0 ff | 2b d7 8e 64 87 22 57 2b a9 3e db 52 7f 0f 13 61 | 69 1f 61 e7 d0 1e 23 3d f6 9d 28 2b 3f e5 f0 23 | 95 70 12 d6 55 37 d1 5b 40 5e db 9b 46 bb 6c 24 | 88 d7 92 17 91 7b 88 03 03 b9 b9 93 f8 4d f8 75 | f3 71 3b 2a a2 b6 bc ae e3 8d ee 63 ed ee d1 97 | a9 a0 39 37 70 8d 13 eb 74 48 45 78 0b 87 f6 b1 | 15 7d 71 1f 58 45 48 e4 7a 5a b6 44 5f 0b 02 01 | 29 00 00 24 18 52 6f 35 05 34 eb 05 2a 3b d4 f4 | de e8 63 2a a6 7a 78 01 4b 37 13 8c b7 e1 00 ae | 6b 38 e3 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 57 41 80 41 67 da fb a0 6b fa cf | 8b d9 9a b2 68 5d 7b 8a 00 00 00 1c 00 00 40 05 | f9 e3 24 ce 79 a6 67 62 c8 57 cc ee 7e 1e 81 c5 | 41 7c 30 2d | libevent_free: release ptr-libevent@0x7fb37402a710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ced0 | #127 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7cf10 | handling event EVENT_RETRANSMIT for parent state #21 | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #21 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #21 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49618.652459; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008258 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ced0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #21 | libevent_malloc: new ptr-libevent@0x7fb37402a710 size 128 "road-eastnet-nonat-21" #21: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #21) | c1 e2 95 19 0d 6d aa c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 62 b7 cc 73 d3 9f c3 8b a1 e4 26 f8 ce 22 33 | 92 13 78 50 86 db 45 6a 88 c0 09 ba 4c 3a ed 8d | 07 a9 f3 c5 90 2e 12 14 58 94 56 71 46 c0 41 ae | 27 c0 08 e3 c4 02 5d ee 64 22 79 77 74 67 02 97 | 15 c4 99 75 53 da b8 d8 73 7b 03 dd 0e 63 e5 c8 | 2f a1 74 7d 1c 73 5d e6 89 77 c2 84 53 e8 81 35 | 14 8c 80 35 a3 ae 1e 09 89 8b c1 64 7d fd 4f 89 | 8f b7 6b da 51 0c c4 21 04 59 18 7c 8d 33 1a 85 | 98 29 76 e4 22 ac 91 00 31 d3 90 f1 d2 f4 f2 9a | 20 a3 6d 51 7b 67 e4 d8 4d 7c 9a fb 7c 63 7f d7 | c7 25 20 29 d5 e0 63 b5 f2 a7 5f d2 ec 98 84 3a | cb 95 85 f5 af 28 8d c4 5a 27 b6 9c 15 cc dd ed | f7 9f 6c d0 d0 af 5b 13 f0 d8 0f 7e 40 99 08 7d | 42 b3 e6 b5 93 1f 1e e1 85 38 e6 f0 e2 af 01 7d | 4f a1 b9 ef 5c 3f 42 c4 c2 ef e5 bc 70 ba 8e 68 | 71 82 c2 53 b9 56 35 3d c9 38 89 b6 a0 89 2b f3 | 29 00 00 24 b6 59 e5 4e ee 3f fd 49 7f 16 f6 82 | 11 23 a0 41 4a 5a b9 59 7b 13 06 de 98 79 ac e0 | 67 18 f7 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 70 4a 79 4b fb 19 31 c0 36 bc 71 | 8e f3 57 13 5a bf 33 aa 00 00 00 1c 00 00 40 05 | 04 fc 29 44 06 78 d7 26 30 ef ba 81 66 98 ec 1d | 35 84 86 e1 | libevent_free: release ptr-libevent@0x7fb34401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf10 | #21 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469fd070 | handling event EVENT_RETRANSMIT for parent state #185 | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #185 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #185 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49618.652589; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006705 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #185 | libevent_malloc: new ptr-libevent@0x7fb34401d920 size 128 "road-eastnet-nonat-185" #185: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #185) | 94 c0 c2 c7 3b 30 ec 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 10 80 e8 ac 1b 57 a4 b7 f2 12 9c c9 c8 96 12 | d8 b4 37 f7 f8 c8 3c b7 f2 86 fb 6d bc 61 da 40 | 39 a4 09 f0 8f 66 50 7a 6b 75 22 97 37 a4 94 4e | a8 5c 5f 80 9b d3 2e fd ee fe 03 91 38 cd a2 e4 | 3e 5d b4 2b f3 14 af ae 26 82 7e 4b 88 39 37 81 | 82 aa 3c c6 ab ba 4d b3 20 34 8d 80 3d de a0 ad | 42 64 df 60 e3 cc 41 7d eb 1f a9 4c f0 d1 47 57 | 07 35 a5 e9 25 89 b5 0e 8b 91 92 1f 2f 09 b9 ab | 46 f1 69 33 6d d8 ef 90 01 9f 20 97 28 19 d8 4c | ce 9d c5 c8 74 d2 ec a5 dd e6 34 68 1e 8b 44 b9 | 5e 3c 90 76 95 68 8e 41 20 32 dd ca 48 f2 30 6e | af 87 2d 28 a1 ad c2 a1 66 51 1d 16 88 02 4d 4b | 75 a2 59 e4 ff 63 fb 70 3e 65 bb 8f d3 36 fc 97 | bb a3 6c c7 eb b7 6a f4 47 9b e0 12 1b e1 cc 32 | 68 f4 57 ff 85 75 10 4d 46 e9 36 6a ae db 06 a6 | 0f 02 20 5f 93 d8 c0 d3 99 19 3c 12 5e d8 75 16 | 29 00 00 24 d5 ca 6a 54 4d eb c2 30 7e c2 c0 88 | f4 64 53 65 cf cb b4 99 9a a7 3b 19 af 88 ec 6a | ae 0e 11 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a b7 31 38 16 04 07 33 64 be 6b 23 | be e3 1c e2 4f 4e 6e d8 00 00 00 1c 00 00 40 05 | c2 92 61 e3 4d 3a b1 c0 20 50 44 2b db 6e 80 18 | c6 ee 39 60 | libevent_free: release ptr-libevent@0x7fb3700407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fd070 | #185 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 b3 28 e7 e1 8b 13 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #206 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #206 | rejected packet: | 01 b3 28 e7 e1 8b 13 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #206: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0674 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 d9 7e 94 07 33 4b 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #127 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #127 | rejected packet: | 63 d9 7e 94 07 33 4b 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #127: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0568 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c1 e2 95 19 0d 6d aa c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #21 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #21 | rejected packet: | c1 e2 95 19 0d 6d aa c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #21: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0572 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 c0 c2 c7 3b 30 ec 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #185 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #185 | rejected packet: | 94 c0 c2 c7 3b 30 ec 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #185: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a92f40 | handling event EVENT_RETRANSMIT for parent state #186 | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #186 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #186 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49618.735105; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006787 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae4880 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #186 | libevent_malloc: new ptr-libevent@0x7fb3700407f0 size 128 "road-eastnet-nonat-186" #186: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #186) | 89 a9 38 aa a6 c0 30 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc fc 7f 3d ba 5a de bc 76 c2 c4 f8 68 37 1f ff | ca 8e ea 53 55 b1 47 97 0b 37 3b 65 fa 61 e7 dd | 35 17 7f ab 01 8e 38 9f 4b 7f 31 31 92 f1 ba bb | d0 06 33 61 10 0b fa 86 b8 ef 01 c3 cf b1 bb 29 | 2f 2d 37 13 10 34 87 1c 1a 2a fa 97 52 ab 57 63 | 92 bf 2b 4d 93 56 f2 e9 12 3c 46 24 50 0a 19 24 | b2 fa e0 6c 1d 91 6c 12 4e 27 c3 47 94 7d 6e 37 | 39 fc 81 56 89 ca 68 6b ce 06 f5 e3 55 1e 76 a1 | 72 bf 58 f7 9a b2 03 67 a0 61 c5 e9 74 36 67 70 | b9 96 14 a2 56 cb b9 33 ac 90 e3 4f 5c 75 ef 3c | 0e 13 a9 08 94 45 0a e0 b9 1a 9c 47 5c ef 62 4f | 55 46 d5 a5 09 5b 68 73 3a 25 4c 57 99 05 2a 57 | 57 52 51 7e 0f b6 14 9f 14 b0 d1 cf 63 29 63 a1 | 49 60 4a 12 aa 1e 1e 0f 3e 32 25 9c d8 71 75 aa | 14 8e 9d fc 55 96 cf 4d 35 00 a5 a7 02 46 8a b7 | 5a f6 88 8a 4d 78 6c e2 1c 82 47 88 0b 3b 1c 06 | 29 00 00 24 d4 45 d6 30 bc fb 2b aa 5c 8e f3 b7 | 0c 17 f8 b2 59 80 d2 e0 0c b8 b9 7f 67 b9 de e9 | d9 5a 25 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 68 b4 19 b5 e8 c7 d6 3c c7 30 38 | 5a e1 45 af bf 1b f1 0b 00 00 00 1c 00 00 40 05 | db 71 7b 2e 3b 5f 62 cf 6c 1d 8c 60 1b 08 38 c5 | 84 d6 4e b5 | libevent_free: release ptr-libevent@0x7fb38003dab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f40 | #186 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 a9 38 aa a6 c0 30 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #186 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #186 | rejected packet: | 89 a9 38 aa a6 c0 30 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #186: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0692 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a027b0 | handling event EVENT_RETRANSMIT for parent state #22 | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #22 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #22 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49618.73745; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009498 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f40 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #22 | libevent_malloc: new ptr-libevent@0x7fb38003dab0 size 128 "road-eastnet-nonat-22" #22: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #22) | fb 94 21 58 38 c3 f9 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 fa b9 d7 68 fd 72 8f 42 0c d5 a2 f7 f4 9b 8a | d7 23 52 ca 6c 52 76 c9 13 29 10 22 e6 ec 59 2c | a8 f2 aa 73 f8 3e 6b 2a a1 80 14 ff a7 56 48 4f | 3e 9b c4 33 e8 9f 3f e1 00 d1 2f db 56 9e da 18 | 67 a2 e0 d7 98 13 63 9f 28 d8 20 03 fc d6 f3 6a | 0b 8c 23 20 ba 26 3e 63 f5 df a1 d6 76 bf 7c f8 | 52 9b 7b e3 ba 8b f9 13 50 1b 61 13 1c 98 cb 7a | 18 f4 0d 9c 45 e0 10 ca 68 77 fa c0 54 76 19 a8 | f4 83 b0 e9 4d 71 3e a8 7b e6 82 90 01 66 8f f4 | 47 f6 ec 2f 3d 48 64 9c f2 b5 21 50 b5 a6 c1 a0 | 91 f5 21 c6 ec 6a bd 95 39 08 03 b0 29 f0 d4 a1 | f0 7d 39 2b f5 47 de 25 f6 c5 56 6c a0 9c af 3d | e0 4f 7d d8 1e 86 d7 ac 96 7e 36 e6 1e 20 3d 6a | 91 0f b8 c5 68 62 9b 7a 5c 1e b4 57 88 ac 53 77 | e1 de dd ef 41 8c d3 d4 57 c9 16 9b e4 e9 05 4c | 74 12 06 2b a5 93 e5 02 33 46 72 d8 88 42 05 bd | 29 00 00 24 90 c9 d4 3c 5f 0b 25 0f f1 bc 52 9a | c3 5c 4d d3 31 89 58 99 a1 8a 08 b0 ed 9a e3 4f | 90 7f 17 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 cd b6 d8 9c a0 ac 4f 4b ba 38 63 | e9 a9 a0 ba 13 a5 50 1a 00 00 00 1c 00 00 40 05 | 2f e0 72 4a 02 ff fa 8e 97 a9 39 d6 93 d4 2c 35 | dd 9e 83 2a | libevent_free: release ptr-libevent@0x7fb3480251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a027b0 | #22 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 94 21 58 38 c3 f9 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #22 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #22 | rejected packet: | fb 94 21 58 38 c3 f9 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #22: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0656 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac1340 | handling event EVENT_RETRANSMIT for parent state #221 | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #221 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #221 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49618.740786; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500771 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae48c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #221 | libevent_malloc: new ptr-libevent@0x7fb3480251c0 size 128 "road-eastnet-nonat-221" #221: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #221) | 90 8f bf e7 cf b7 65 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 72 44 57 63 97 26 0b d0 33 1e c1 f5 c9 36 d4 | f7 1a 62 3c a3 39 42 e3 c4 ee 5b 04 7a e2 93 d5 | 0f 83 78 28 fb 94 39 4c 7a cc c9 c9 ad ce 5e 59 | 68 4d ba 18 1e 4a 63 94 c5 70 f6 5d b4 77 65 58 | 10 84 fe ef 60 83 64 5b f2 89 50 99 ac e1 51 8a | d7 74 3b 5d 70 17 cd 8b 95 39 65 4b aa 2f 20 67 | bc c1 06 22 2c 60 51 a7 d1 25 ba e3 e5 7c 2a 24 | 9f dc 2e 8b 87 d8 be dd e2 1f 7f 7d 88 f1 33 ff | db 8b ce 43 0a 9d db 20 79 1b 34 f9 9e 77 87 58 | 03 3d 5b 8a b0 e8 e3 38 e6 81 79 10 ab 3d b2 02 | af 63 97 ff 1b 89 ab 73 45 c7 84 d1 96 d1 2b 2c | 45 33 cc 2a 87 09 9b 3c 40 ce 87 0c 1b b1 51 a1 | 8d 74 42 7d fd e9 3f de a9 93 ef 77 e9 c1 c8 91 | 38 fa 26 85 5e 1b 88 91 35 9e 5f 73 34 d8 96 fe | 85 b3 52 f7 42 b5 7d 56 e8 9e bb f2 e5 07 db 70 | 5b 28 4b 5d 8e 85 f0 35 5c f8 45 ae 02 de 27 d9 | 29 00 00 24 cd 4c af b1 99 23 18 29 29 9d f9 32 | c6 a6 09 22 63 0a d9 08 58 b2 a1 77 c9 06 48 e1 | 9c 8b 9e bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 fb 28 ad 15 31 02 8e bd d8 0f 80 | 1c 8f fa a7 e9 1f 34 e3 00 00 00 1c 00 00 40 05 | c4 70 86 36 d0 0a de 28 47 ec ca 4b f0 c7 6b 67 | c3 4a 0b 4c | libevent_free: release ptr-libevent@0x7fb344035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac1340 | #221 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 8f bf e7 cf b7 65 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #221 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #221 | rejected packet: | 90 8f bf e7 cf b7 65 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #221: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a63210 | handling event EVENT_RETRANSMIT for parent state #128 | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #128 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #128 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49618.742105; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005267 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac1340 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #128 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 "road-eastnet-nonat-128" #128: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #128) | 77 d1 59 6d 55 cb 18 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 01 e0 bd 82 fe e0 91 d9 ed 2a 7b 41 58 aa d2 | c1 83 b5 d4 08 da f3 c7 61 8a cf 68 fe 9a 21 e3 | 57 03 c4 31 d0 d0 ec 56 cc 27 d9 52 cc f2 63 0f | a0 ad 50 12 a9 19 98 c4 cb 8f 93 9b 57 4e ae 53 | 05 9f f7 4f 18 99 38 38 06 c2 82 4a ed ef 9d cc | 7b 44 9f 1c 19 10 74 71 d4 89 98 82 e7 d0 72 33 | aa 5f 8b bd da a0 8b 0a 73 9d 51 cb d2 a3 14 69 | d1 4b 0c 71 9d 71 26 5d bf 23 7a 67 5d 15 2b a2 | ce b7 8c 37 a6 d1 63 b0 6b dc f1 b5 b5 72 45 86 | c8 59 1a 35 a1 54 36 81 14 ea b5 34 cc 86 95 36 | de 73 da 51 28 93 ec 98 2d 7a d9 01 e1 1c 11 2d | 35 8e 59 23 0d de 42 1b 00 c8 28 40 ea c4 bc 1a | 0b 22 97 22 23 59 28 f2 30 da 60 85 07 fb be 9a | 26 22 87 03 aa 66 5a 47 26 21 89 bb a9 0e 6a fe | 60 1c 6c 90 e2 96 28 ae 41 e9 23 65 8c f4 23 57 | 72 00 10 88 06 ca 67 04 cf 4b c7 04 50 60 fe 2f | 29 00 00 24 3b ae 04 a3 29 53 44 16 26 36 89 01 | ad 8c c7 bd 38 5d c9 f9 a5 cd 29 aa 82 21 0f 5e | 4f 91 67 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 73 cd 7c c3 ca 92 54 ff 7d 3a 5c | 01 84 d2 b8 f1 a4 c9 bd 00 00 00 1c 00 00 40 05 | ec 18 dc 66 2d cf 71 2e 85 c0 4a 75 63 a1 b7 19 | b3 41 97 a0 | libevent_free: release ptr-libevent@0x7fb35c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a63210 | #128 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 d1 59 6d 55 cb 18 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #128 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #128 | rejected packet: | 77 d1 59 6d 55 cb 18 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #128: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-225" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-225' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #225 at 0x557d46b07300 | State DB: adding IKEv2 state #225 in UNDEFINED | pstats #225 ikev2.ike started | Message ID: init #225: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #225: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #225; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-225" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-225" IKE SA #225 "road-eastnet-nonat-225" "road-eastnet-nonat-225" #225: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-225 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-225": constructed local IKE proposals for road-eastnet-nonat-225 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 225 for state #225 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a63210 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #225 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 | #225 spent 0.155 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-225" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.241 milliseconds in whack | crypto helper 10 resuming | crypto helper 10 starting work-order 225 for state #225 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 225 | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 225 time elapsed 0.000997 seconds | (#225) spent 0.993 milliseconds in crypto helper computing work-order 225: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 225 for state #225 to event queue | scheduling resume sending helper answer for #225 | libevent_malloc: new ptr-libevent@0x7fb37c046040 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #225 | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 225 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #225 | **emit ISAKMP Message: | initiator cookie: | 1c 46 35 b1 a5 15 7d 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-225 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ae fb 41 53 6b 81 0b c3 2d 10 6f c4 43 42 9b b5 | ikev2 g^x 58 ae de 87 ce bb b8 82 21 69 b3 17 de bc f9 c2 | ikev2 g^x a6 34 e7 7f 32 f0 7d a7 6c 08 3e 2b 62 ab 16 a0 | ikev2 g^x 49 34 97 75 bc a1 e7 57 c6 b6 15 50 f3 8a f1 c4 | ikev2 g^x e3 18 e0 09 c0 26 64 c1 d3 38 7d 95 30 90 58 4d | ikev2 g^x 99 27 bc 98 4e c8 b5 39 36 2c 46 50 c2 b8 f6 07 | ikev2 g^x a6 3c 00 2b 8d 8c 50 f6 a6 08 bd fd 79 68 91 be | ikev2 g^x 81 69 f3 24 98 59 43 c8 78 e1 dc 86 d2 16 6e a3 | ikev2 g^x 6a de dc a4 19 ff e6 d6 63 67 69 75 d8 ae 52 31 | ikev2 g^x c3 a7 ea ea 95 69 03 74 0f ef e1 6f 99 0c 56 d4 | ikev2 g^x 62 d0 1b 8d 8f 7c ad 94 ab 7c 03 43 80 8a 6e bb | ikev2 g^x 36 aa d3 44 03 e6 5c 20 d3 4b 45 e5 a2 5c 00 25 | ikev2 g^x 37 ab 32 ce e0 ae 35 8e 13 d7 03 37 11 57 20 f8 | ikev2 g^x ae 87 85 bc 10 d5 2c 64 54 e7 c4 49 10 99 df 04 | ikev2 g^x 79 9e f4 43 41 4b 6a 31 13 21 e7 cf d7 1a da 5b | ikev2 g^x 4b c0 6d 43 c6 e7 f0 86 e7 2a 75 03 ec 4c de 27 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 27 0f 48 fe da 9f b7 b6 f5 85 2e 21 09 ff e1 4d | IKEv2 nonce 05 12 3c c0 4b 2e ad df df d0 69 83 11 81 8e 52 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1c 46 35 b1 a5 15 7d 21 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e1 | natd_hash: port= 01 f4 | natd_hash: hash= b7 11 33 1d 86 3c cb d4 6f 7e 68 c8 95 dd 6a 6a | natd_hash: hash= 4f 3e eb 1f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b7 11 33 1d 86 3c cb d4 6f 7e 68 c8 95 dd 6a 6a | Notify data 4f 3e eb 1f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1c 46 35 b1 a5 15 7d 21 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 41 16 5c d3 40 8f 72 70 a4 ea ff c4 c5 31 7c 04 | natd_hash: hash= 7c 81 7f e0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 41 16 5c d3 40 8f 72 70 a4 ea ff c4 c5 31 7c 04 | Notify data 7c 81 7f e0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #225 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #225: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #225 to 4294967295 after switching state | Message ID: IKE #225 skipping update_recv as MD is fake | Message ID: sent #225 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-225" #225: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.225:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #225) | 1c 46 35 b1 a5 15 7d 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae fb 41 53 6b 81 0b c3 2d 10 6f c4 43 42 9b b5 | 58 ae de 87 ce bb b8 82 21 69 b3 17 de bc f9 c2 | a6 34 e7 7f 32 f0 7d a7 6c 08 3e 2b 62 ab 16 a0 | 49 34 97 75 bc a1 e7 57 c6 b6 15 50 f3 8a f1 c4 | e3 18 e0 09 c0 26 64 c1 d3 38 7d 95 30 90 58 4d | 99 27 bc 98 4e c8 b5 39 36 2c 46 50 c2 b8 f6 07 | a6 3c 00 2b 8d 8c 50 f6 a6 08 bd fd 79 68 91 be | 81 69 f3 24 98 59 43 c8 78 e1 dc 86 d2 16 6e a3 | 6a de dc a4 19 ff e6 d6 63 67 69 75 d8 ae 52 31 | c3 a7 ea ea 95 69 03 74 0f ef e1 6f 99 0c 56 d4 | 62 d0 1b 8d 8f 7c ad 94 ab 7c 03 43 80 8a 6e bb | 36 aa d3 44 03 e6 5c 20 d3 4b 45 e5 a2 5c 00 25 | 37 ab 32 ce e0 ae 35 8e 13 d7 03 37 11 57 20 f8 | ae 87 85 bc 10 d5 2c 64 54 e7 c4 49 10 99 df 04 | 79 9e f4 43 41 4b 6a 31 13 21 e7 cf d7 1a da 5b | 4b c0 6d 43 c6 e7 f0 86 e7 2a 75 03 ec 4c de 27 | 29 00 00 24 27 0f 48 fe da 9f b7 b6 f5 85 2e 21 | 09 ff e1 4d 05 12 3c c0 4b 2e ad df df d0 69 83 | 11 81 8e 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 11 33 1d 86 3c cb d4 6f 7e 68 c8 | 95 dd 6a 6a 4f 3e eb 1f 00 00 00 1c 00 00 40 05 | 41 16 5c d3 40 8f 72 70 a4 ea ff c4 c5 31 7c 04 | 7c 81 7f e0 | state #225 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c0251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a63210 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a63210 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #225 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 | #225 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49618.752452 | resume sending helper answer for #225 suppresed complete_v2_state_transition() and stole MD | #225 spent 0.506 milliseconds in resume sending helper answer | stop processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c046040 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c 46 35 b1 a5 15 7d 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #225 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #225 | rejected packet: | 1c 46 35 b1 a5 15 7d 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #225: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23150 | handling event EVENT_RETRANSMIT for parent state #217 | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #217 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #217 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49618.773106; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.020065 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a027b0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #217 | libevent_malloc: new ptr-libevent@0x7fb37c046040 size 128 "road-eastnet-nonat-217" #217: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #217) | d2 36 bf 64 89 a3 fd 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 f4 5b dc ca 6a f6 be c1 c2 c8 63 19 fb 3a 1f | 70 dc de 5b 54 b8 eb 8d 2b 5e fc c2 60 b3 0c b8 | 9b c4 53 f6 87 96 b1 7e c0 8d e1 b0 c0 a3 08 59 | f8 18 05 78 a7 5e f9 f4 d8 1f 45 f9 8a db 9c 99 | 0e 07 3e 2a ba bb 8c 14 d2 d8 55 43 f4 c4 74 29 | 81 f6 ff c1 34 b9 34 a3 97 b9 37 cc 81 87 17 91 | 44 f4 e5 3a 28 aa cc 0c 3a 69 40 14 f6 3b 92 b7 | db 83 50 42 f0 36 82 ac f1 19 7e 5c 4e 90 c6 ec | cf fd 70 a2 a6 79 e2 bb b0 2b b1 df 8d e0 62 86 | 52 eb e4 a9 60 bc ec b9 d7 99 33 ce 9f d2 75 d6 | ea 82 29 7d d5 df f1 81 05 f9 8d d7 ff 39 0b 3b | 2c fe 6f 59 ae d2 c3 c5 12 3f 62 54 ed fc 61 4f | c2 74 90 8a b6 79 a0 b5 31 fc 8c d5 cb 45 21 48 | b0 1d 10 ec cf 2a b3 30 35 95 3b 32 3a 79 8c 33 | ab 0a b9 7d 4f 43 6c 9b d9 20 e5 7e 28 a9 95 05 | ed 38 6d f0 1a 10 8c 41 cd 59 c0 e4 ec 28 25 e4 | 29 00 00 24 50 f4 8b cc 88 78 9a 77 ca 06 50 f2 | 60 9a 06 39 64 9a 92 2a 1d 6a 83 ae 2a 35 88 82 | 1c 3d 43 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf a3 05 4d ff 0f f5 da 0b f8 e7 54 | e5 88 17 6e 1b 78 5e cb 00 00 00 1c 00 00 40 05 | 9b 1b 06 2c 11 9c 55 41 9d b0 16 46 62 0b cd 66 | 9f 92 84 50 | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23150 | #217 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469ddbf0 | handling event EVENT_RETRANSMIT for parent state #207 | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #207 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #207 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49618.773292; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.012766 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23150 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #207 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 "road-eastnet-nonat-207" #207: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #207) | 98 86 9a c8 81 d3 6e e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 59 ae 25 5d aa 28 92 c6 18 2f bc 82 85 c2 3b | ef 2d af ff 7a e6 4d 2d 70 93 a0 de ce 52 57 5f | cf 57 26 3f 1c a7 0f b2 96 d8 25 c6 cb c3 1d 15 | 8e 04 6c c9 e5 de a9 9f 48 ec bf 8a ac af 55 b7 | 16 4e ac b3 75 43 96 89 7c 9a 69 70 08 ac 14 3e | 96 4b 5a 70 2a 29 e5 8b 07 f0 5c cb ed e2 91 b3 | 9b d7 77 9b 28 c0 fb 49 4d 80 b8 6a 5f 4b e2 be | 9f 93 81 d7 4b ea 7b e4 89 24 53 bc a4 06 8a 63 | ae f3 eb f3 e4 35 75 5b 3f a9 62 83 5c be e9 3f | da 2a 80 0c d1 89 a8 df 56 22 c5 4a 79 92 72 a5 | 3c 63 0a 48 54 25 a3 65 43 13 ce a4 3e 09 f7 a7 | 13 60 08 7a 31 57 5f 3e ec 21 89 2d 48 e6 b5 d0 | 55 c4 14 94 07 66 75 e1 7b b7 31 ad 1e 44 cd 2a | 84 8d 3f db f4 29 57 19 60 3f fa 98 86 72 4b e8 | c5 e2 25 d0 6a 0d c6 7c 2e b9 5b 59 7f 50 39 10 | 7f 2b dd a7 68 a0 e6 07 75 6e ff 62 1d 5c 80 75 | 29 00 00 24 e2 c5 0f b4 00 31 2d 18 4e d6 58 87 | 9d 2e 37 b9 b3 22 c5 5a fd 1c 75 2e 4d 23 6a 09 | d6 2f 3b 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 0a 15 af 31 57 a5 69 ec 8c db 25 | c8 27 a9 b0 00 8f 48 7f 00 00 00 1c 00 00 40 05 | af fe 48 1b 76 51 69 26 e1 f2 f5 ea 64 9f 61 35 | 72 2e c3 f3 | libevent_free: release ptr-libevent@0x7fb34c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ddbf0 | #207 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 36 bf 64 89 a3 fd 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #217 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #217 | rejected packet: | d2 36 bf 64 89 a3 fd 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #217: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 86 9a c8 81 d3 6e e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #207 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #207 | rejected packet: | 98 86 9a c8 81 d3 6e e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #207: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0578 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6e010 | handling event EVENT_RETRANSMIT for parent state #187 | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #187 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #187 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49618.806644; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.012412 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fd070 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #187 | libevent_malloc: new ptr-libevent@0x7fb34c0407f0 size 128 "road-eastnet-nonat-187" #187: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #187) | e7 c9 b3 98 5a b5 d8 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 8c 48 13 ec 18 80 1b 32 77 ec 9e 3b 86 33 3b | 02 ed ce 45 9e d1 07 07 3e bc 97 2e 75 42 14 66 | 03 ce bf d6 11 7b 13 df d2 31 59 70 fe 3e 83 b2 | 64 79 15 03 06 38 db 20 68 31 b1 be e0 b0 81 7d | 4e ac bf 91 07 33 90 db 11 13 bd 16 b3 19 bb 2f | bd 78 ea 08 d7 04 61 29 46 e0 b0 be 88 fb b6 99 | 78 ba 8a fa f7 9f 36 82 a5 d0 b5 cc 15 77 46 bf | 6f 96 e3 0e c4 42 db ac 87 dc 33 da 45 8d 53 39 | 47 ad bd 32 b7 e2 e1 e0 66 2c 6d db 19 28 b7 a9 | b4 a9 eb 1e eb 6f ee c7 40 8b 38 5d 63 81 df 4c | ca 8e 71 2d f6 ed 35 fe b2 fe 7e cb 56 c2 0b db | 35 33 69 6f 1e 16 e5 63 9f 75 fa ec 8a 49 49 95 | 1a f3 8c 29 d9 10 61 09 99 f1 00 c7 a8 23 e7 4f | 74 f2 03 0e 72 27 59 cb 0b e6 eb fe 8d cd 75 0f | 66 f2 35 88 c0 48 17 b6 36 94 37 a8 a7 99 a0 7a | 46 3f c8 7b 62 bc 09 7b 66 12 f0 77 17 2a c3 df | 29 00 00 24 92 ee 3c 64 04 c9 f4 27 93 49 ca cc | 80 d7 5b 2f 40 c6 99 75 47 bf 36 6e b0 fd dd e8 | 14 05 72 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e d3 6f 6b 08 b5 24 1b c7 b0 97 c1 | 57 a8 5f 57 16 36 48 8c 00 00 00 1c 00 00 40 05 | 70 ae b7 c1 13 54 ea fb c0 86 88 d6 98 09 04 e8 | dd f9 c2 0b | libevent_free: release ptr-libevent@0x7fb36800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6e010 | #187 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 c9 b3 98 5a b5 d8 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #187 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #187 | rejected packet: | e7 c9 b3 98 5a b5 d8 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #187: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ec960 | handling event EVENT_RETRANSMIT for parent state #129 | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #129 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #129 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49618.827563; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007663 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6e010 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #129 | libevent_malloc: new ptr-libevent@0x7fb36800cf80 size 128 "road-eastnet-nonat-129" #129: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #129) | 72 fb d4 3a 3d 31 ef 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 72 cd 05 8b 1a e1 a8 66 68 a3 88 d4 37 ab 29 | 8d ca b6 b0 86 38 49 65 ce de c8 b0 39 b5 e5 f9 | 49 66 a0 ac 83 68 f5 08 38 44 61 fc b4 c4 e3 93 | 86 b2 c8 75 e1 f1 8d 43 35 de 04 cc bd e4 ef a7 | 8b 7d df 6d 22 63 24 bb ce 8f 77 d1 43 ca 6b c6 | 70 cf 4e 81 02 44 0d 39 85 28 ca ae 69 3d 8b 1d | 8e 2a f9 28 37 54 47 1b 7f 1e 6c c3 e7 ca 7d c5 | 5d eb 2d b5 ee 04 65 71 a3 9b 69 bf 7f 5f e0 e8 | b1 ac e6 e0 77 7c 27 c0 f7 96 26 05 ab 95 ca fd | fa ef 5c 22 dc 42 3f 47 3c 21 7c b3 45 c2 0f 2d | 47 18 59 0f e9 05 83 ad b3 18 86 6e 4c 0f 6a 6f | a2 bf 54 51 83 2a 64 42 06 32 16 00 c7 cc 1b e9 | 3e b9 e5 cf 6c 0f 2e 6b fd eb c0 0a 44 95 18 9e | 2c d3 00 4b bf 67 5f 7a f5 b4 f7 f7 d7 fd a9 64 | 98 77 b8 cc 18 a8 1d 3e 8f 95 27 46 f6 67 44 7b | 96 ba b1 ae ad ee 56 93 ac c5 ad 91 dc 2a d2 ba | 29 00 00 24 64 51 a8 77 1e c3 b2 0e 1e 7b 14 6a | 5f 64 3b ca 18 8a 91 d8 b8 bf ce 82 b9 6f e1 5d | aa 66 20 12 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f cd a9 5a 90 93 b1 13 f3 88 1c ea | 0f f5 0f 31 39 58 6f be 00 00 00 1c 00 00 40 05 | 0e bb c8 26 22 69 20 e6 e2 bf a8 b0 a2 3b 98 e4 | e2 fb 7b 71 | libevent_free: release ptr-libevent@0x7fb338035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ec960 | #129 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469f2060 | handling event EVENT_RETRANSMIT for parent state #23 | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #23 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #23 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49618.827757; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009553 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ef4e0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #23 | libevent_malloc: new ptr-libevent@0x7fb338035930 size 128 "road-eastnet-nonat-23" #23: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #23) | 11 64 2b cc 79 62 5e 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 73 2b eb f6 ef a5 89 1a 84 5f 77 86 97 95 f5 | 41 68 46 e7 c2 3a 4b 96 08 d9 dc ac 0c dd 5f 9b | 9c 2f fb 55 35 f0 7e cd 72 e1 cc 2d 6a fa 78 20 | 87 1a 7a 27 9f 9e c1 5d d5 9e 2c a0 07 0d 68 be | 9e e9 e9 2b 00 f9 05 41 09 d8 c4 31 fa 61 72 87 | 90 51 a0 68 b9 49 7c 1e 75 38 ea 5f 98 5e c2 d2 | 66 ca 13 be 66 2b cf da 9f 87 38 b0 7e a9 5b 2c | b6 4d 89 7d 77 c1 b9 97 25 e9 f9 03 6e 50 c9 f0 | 4a 7a ea 26 c5 82 77 fd 51 df 29 99 2b 7c 16 40 | 15 23 9e b1 86 5f 7e 14 de 76 c4 15 a3 9d c9 b4 | 9c 1b 90 c7 1e 57 7f 74 e2 ad 9a 3c 48 8f 70 44 | 85 18 d4 03 39 40 d0 15 5b 33 89 0a c2 cc bd 37 | e0 4e e5 f2 46 4f 47 44 cf d8 ce b3 b6 34 38 c5 | 35 57 26 ef 2d db be d0 db df 2a 42 e2 e1 8f 1d | 48 dc 28 b8 9a 19 2e b1 d2 17 f5 9d a6 50 4d 1a | 18 88 cf 51 7a 98 9f 7a 85 1b 6d 6e b4 28 52 31 | 29 00 00 24 7b 3d c1 32 8e 45 e7 94 6a 53 a8 c9 | d4 42 3b 62 4a d5 d1 ca c0 9b 8b 0f 34 82 fe 78 | 98 28 d2 99 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 90 87 c3 2a f9 31 e3 ce f5 bd a0 4a | 02 f7 6c fe 1a b5 f1 41 00 00 00 1c 00 00 40 05 | a7 5c 60 43 7b 55 16 31 7f 2f 25 27 9c df 44 42 | dd 9f 1f 73 | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f2060 | #23 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 fb d4 3a 3d 31 ef 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #129 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #129 | rejected packet: | 72 fb d4 3a 3d 31 ef 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #129: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 64 2b cc 79 62 5e 8e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #23 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #23 | rejected packet: | 11 64 2b cc 79 62 5e 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #23: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0559 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a54250 | handling event EVENT_RETRANSMIT for parent state #222 | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #222 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #222 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49618.843146; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501514 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af6380 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #222 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 "road-eastnet-nonat-222" #222: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #222) | eb 26 f4 19 1a 54 68 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 a4 6e 20 fd 50 2f 35 57 aa de 4a f5 e5 f9 4f | ca f6 bf 35 d5 20 df 61 18 72 c7 7b 3b d6 89 fe | 57 a2 45 9e 67 3f 8a f7 1b bb 33 5b 2f 19 93 13 | 4d bc bb d5 5a 76 0b 8c 08 e4 e4 47 2d c3 07 c6 | df c3 86 a0 6b 90 b3 31 74 8b 42 bf c4 10 0e bf | 13 cf 0b 76 db 86 6a 9f 8c f0 b4 0e c7 08 95 7e | ce 41 5e 4a 31 5c bb fb 47 19 b3 63 fb 4f ca f3 | 07 c7 1d d9 7a 1b f2 0d 5e dd f5 ac 4b 35 32 4a | fb 08 38 da 83 ea de 30 e1 52 16 cd fe ea bf b3 | 88 b6 b0 c4 6f 9e 4d bb 67 f6 e4 a0 eb 71 82 6a | ad 65 be 80 db 5a 69 3b 90 3a 58 e9 30 d6 fe 7a | f6 9b 28 5c 13 9f 6a 77 4f c9 8b bc 07 b5 a1 d9 | 2b de 81 5d 47 e4 3c c1 b1 a8 f5 bc 8d 40 df 63 | b5 80 17 f2 8c 1f b1 78 d7 35 f2 4c 44 06 cc 65 | 15 11 55 93 d9 f0 56 8f ad b9 7e 2b 7d cb da 6d | 9c ab 97 02 8c 9c fc 9d 3d c3 47 69 0f ac 56 88 | 29 00 00 24 77 e8 83 df 75 f1 9b ea 8f aa ae 8f | cc 39 a6 6f 03 de be 68 b3 66 64 be 5d 42 33 fc | 61 2a ce bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 87 6a 56 c8 8d 7a 5a c9 70 42 a3 | 93 38 10 ea 25 8a 09 bf 00 00 00 1c 00 00 40 05 | d9 43 32 2c d8 2a fd ec 96 bd 92 a4 54 e0 a9 82 | 8b 73 b6 b2 | libevent_free: release ptr-libevent@0x7fb388022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a54250 | #222 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 26 f4 19 1a 54 68 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #222 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #222 | rejected packet: | eb 26 f4 19 1a 54 68 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #222: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0656 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-226" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-226' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #226 at 0x557d46b088c0 | State DB: adding IKEv2 state #226 in UNDEFINED | pstats #226 ikev2.ike started | Message ID: init #226: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #226: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #226; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-226" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-226" IKE SA #226 "road-eastnet-nonat-226" "road-eastnet-nonat-226" #226: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-226 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-226": constructed local IKE proposals for road-eastnet-nonat-226 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 226 for state #226 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a54250 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #226 | libevent_malloc: new ptr-libevent@0x7fb388022480 size 128 | #226 spent 0.159 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-226" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.247 milliseconds in whack | crypto helper 14 resuming | crypto helper 14 starting work-order 226 for state #226 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 226 | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 226 time elapsed 0.000961 seconds | (#226) spent 0.969 milliseconds in crypto helper computing work-order 226: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 226 for state #226 to event queue | scheduling resume sending helper answer for #226 | libevent_malloc: new ptr-libevent@0x7fb370046040 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #226 | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 226 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #226 | **emit ISAKMP Message: | initiator cookie: | df 8a 99 41 35 8f 22 b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-226 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5c 39 0d ed 10 1f e3 0e ea ca 85 c3 5a 17 31 22 | ikev2 g^x 97 9f 06 33 b0 59 ed 25 d5 cd 46 5c e1 b7 68 7b | ikev2 g^x 60 f5 73 ac 22 e6 10 7a c8 3f 64 54 b7 2c c9 ba | ikev2 g^x 36 26 b8 60 a9 a1 e6 a3 6e 44 7f 00 0c 75 49 7e | ikev2 g^x c6 17 73 3d c6 70 48 38 43 a2 56 d7 f5 0c 3f 3f | ikev2 g^x 3f 97 93 c5 a1 2b c4 07 4f 49 5c fa 0d e2 93 83 | ikev2 g^x 1d 93 5e ee cb e1 2d 5d 17 f0 04 37 84 12 a1 e4 | ikev2 g^x ea a7 ca c8 ca 5c 70 fb 0f d5 b4 aa ca 0a eb f9 | ikev2 g^x b6 b5 03 c1 29 21 80 90 c2 2f 2a fe 6c ab e2 c4 | ikev2 g^x da df fe dd 41 56 bd 81 ee 73 c7 0a e6 2a 84 64 | ikev2 g^x 7e c8 7b 2b 7f 3e cd 94 23 75 81 89 67 c2 03 bf | ikev2 g^x 33 3e d9 d2 a5 ec 73 d5 af 8a 02 94 e8 dd 1e 6c | ikev2 g^x 57 45 a8 23 17 bc 83 80 e2 7d fe e3 0d bf 65 a8 | ikev2 g^x 6f 93 8d 7c 46 a5 58 a7 45 54 b1 bb ae e2 cb 5a | ikev2 g^x 09 4c cd b3 40 87 10 07 3f c6 8e 21 cf 42 d3 a0 | ikev2 g^x 05 bf ba f5 eb 01 2d 75 a7 76 4b e5 7b 42 b7 8d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c0 94 06 00 9d 87 40 a0 ec d8 4c ee 0c 16 0e a6 | IKEv2 nonce 24 3d 43 67 f1 e5 1b a0 19 81 a3 5d 35 48 05 e5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= df 8a 99 41 35 8f 22 b0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e2 | natd_hash: port= 01 f4 | natd_hash: hash= fd dc 27 ce 4f 2a 14 a6 0d 4a 3f dc 07 9c 36 b1 | natd_hash: hash= 1b e9 59 bb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fd dc 27 ce 4f 2a 14 a6 0d 4a 3f dc 07 9c 36 b1 | Notify data 1b e9 59 bb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= df 8a 99 41 35 8f 22 b0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e3 eb a3 4f 44 c3 b7 5b e6 19 f6 7f 9a 7d 29 4c | natd_hash: hash= 6a 02 ce 75 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e3 eb a3 4f 44 c3 b7 5b e6 19 f6 7f 9a 7d 29 4c | Notify data 6a 02 ce 75 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #226 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #226: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #226 to 4294967295 after switching state | Message ID: IKE #226 skipping update_recv as MD is fake | Message ID: sent #226 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-226" #226: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.226:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #226) | df 8a 99 41 35 8f 22 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 39 0d ed 10 1f e3 0e ea ca 85 c3 5a 17 31 22 | 97 9f 06 33 b0 59 ed 25 d5 cd 46 5c e1 b7 68 7b | 60 f5 73 ac 22 e6 10 7a c8 3f 64 54 b7 2c c9 ba | 36 26 b8 60 a9 a1 e6 a3 6e 44 7f 00 0c 75 49 7e | c6 17 73 3d c6 70 48 38 43 a2 56 d7 f5 0c 3f 3f | 3f 97 93 c5 a1 2b c4 07 4f 49 5c fa 0d e2 93 83 | 1d 93 5e ee cb e1 2d 5d 17 f0 04 37 84 12 a1 e4 | ea a7 ca c8 ca 5c 70 fb 0f d5 b4 aa ca 0a eb f9 | b6 b5 03 c1 29 21 80 90 c2 2f 2a fe 6c ab e2 c4 | da df fe dd 41 56 bd 81 ee 73 c7 0a e6 2a 84 64 | 7e c8 7b 2b 7f 3e cd 94 23 75 81 89 67 c2 03 bf | 33 3e d9 d2 a5 ec 73 d5 af 8a 02 94 e8 dd 1e 6c | 57 45 a8 23 17 bc 83 80 e2 7d fe e3 0d bf 65 a8 | 6f 93 8d 7c 46 a5 58 a7 45 54 b1 bb ae e2 cb 5a | 09 4c cd b3 40 87 10 07 3f c6 8e 21 cf 42 d3 a0 | 05 bf ba f5 eb 01 2d 75 a7 76 4b e5 7b 42 b7 8d | 29 00 00 24 c0 94 06 00 9d 87 40 a0 ec d8 4c ee | 0c 16 0e a6 24 3d 43 67 f1 e5 1b a0 19 81 a3 5d | 35 48 05 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd dc 27 ce 4f 2a 14 a6 0d 4a 3f dc | 07 9c 36 b1 1b e9 59 bb 00 00 00 1c 00 00 40 05 | e3 eb a3 4f 44 c3 b7 5b e6 19 f6 7f 9a 7d 29 4c | 6a 02 ce 75 | state #226 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388022480 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a54250 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a54250 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #226 | libevent_malloc: new ptr-libevent@0x7fb388022480 size 128 | #226 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49618.872681 | resume sending helper answer for #226 suppresed complete_v2_state_transition() and stole MD | #226 spent 0.449 milliseconds in resume sending helper answer | stop processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb370046040 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 8a 99 41 35 8f 22 b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #226 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #226 | rejected packet: | df 8a 99 41 35 8f 22 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #226: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0553 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a903c0 | handling event EVENT_RETRANSMIT for parent state #208 | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #208 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #208 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49618.883893; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002617 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f2060 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #208 | libevent_malloc: new ptr-libevent@0x7fb370046040 size 128 "road-eastnet-nonat-208" #208: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #208) | 8f 5c 5f 4e 3a f5 16 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 92 7c 11 dd 8e a5 d7 54 92 a0 06 d5 10 ac 42 | 6b 15 ed 47 e9 69 c6 dc ee be 05 fb f7 98 ca cc | 76 c8 1e 19 2f 4d 8b 90 94 87 44 8e 66 b4 d8 02 | 68 05 60 b8 e3 7d 75 b7 4a 7c ab de a8 fd 41 6e | d6 76 9e 53 12 c0 6c 1d 7a 52 1e 69 01 3b 4b c1 | e7 6b 22 d6 c7 2e 90 0a 6b 5b 89 db 1a 6d af 36 | b5 41 be bc 9c 90 ed 64 78 a2 9b 4a 8f 0d 28 7e | 60 aa 46 05 6e d0 b2 52 c1 92 88 e6 04 b2 49 48 | c1 79 f2 f3 15 c9 58 54 7e a8 48 76 87 71 8d 7e | d5 41 8a 58 60 e1 22 51 b6 c8 da 62 23 cd 7f 72 | ed db 2b 44 40 79 52 36 a1 7b 1f f4 ce 24 ba 47 | 7a c2 df 3d 0b 70 e1 d1 d8 6a b0 33 7a 8b a6 83 | 44 26 40 e1 a6 53 73 33 8b d6 96 05 57 d5 68 55 | da 59 03 a3 8b 2e 16 30 b2 69 8f 5c 37 5b 88 82 | f8 0d 7c f2 a3 34 16 b2 3a a4 64 ba aa 6e 09 cf | de ff 28 7b 22 28 98 ba a1 44 cc d7 e1 ec e2 fc | 29 00 00 24 6d f9 31 58 db 7e 5c 23 da 78 97 04 | 9a 1c fc fa 9f 9f da b9 38 4a 1a f0 e7 71 5f 51 | b4 ee 4f 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 c6 9e d7 bc 34 04 8f 07 db d5 e1 | 11 54 7a 15 87 49 41 6f 00 00 00 1c 00 00 40 05 | da 8d 6c 65 d7 12 37 8a 51 87 98 29 74 33 3a f5 | 86 ee 4b 0a | libevent_free: release ptr-libevent@0x7fb34c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a903c0 | #208 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 5c 5f 4e 3a f5 16 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #208 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #208 | rejected packet: | 8f 5c 5f 4e 3a f5 16 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #208: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0683 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acd680 | handling event EVENT_RETRANSMIT for parent state #130 | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #130 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #130 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49618.896266; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004612 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a903c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #130 | libevent_malloc: new ptr-libevent@0x7fb34c02a950 size 128 "road-eastnet-nonat-130" #130: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #130) | 85 43 6a ad 59 7d ce ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 ae b5 ed fb fd 70 00 13 8d 64 ee 46 d1 86 03 | 85 09 b4 b0 21 e1 75 08 18 f5 01 a5 ce d9 28 32 | 42 84 d9 a2 5d 29 4b 02 ec 24 a8 1c 76 d6 11 b3 | b7 ca cc 7d bb 8a 73 62 20 57 c8 ee 7d 78 9e 1d | 7a d7 f6 f5 3d b0 f3 26 b5 f8 7e 6c 34 29 9d e1 | 66 87 a7 94 04 46 39 e6 b7 02 1f 92 b6 19 a4 2b | 93 1f ea 2c 8d 99 b7 50 6f cd f0 d6 4b e1 d1 c9 | 7e 98 1d 25 8f 0a 2c a3 9a 8f 46 07 29 ef b1 91 | 6c b5 e6 a3 11 c5 c9 c8 5f a8 7f 93 e8 c3 28 29 | 1d 87 06 30 a9 b3 18 af 13 99 e2 ea 6d ca d3 37 | f0 97 8e c5 32 05 cc 70 9c 35 a3 ab 7d bb 03 4c | 6f 27 f2 98 7e 64 26 7d a4 db 20 0f 0c 9d fa ef | 62 00 52 b0 8e 30 a4 8a e8 bb 41 07 76 b9 71 f2 | 63 f8 6e da 4f 74 79 ae c9 5c 70 e4 82 06 94 fd | 62 5b ee db c2 84 ae ea bf 8a 91 a6 ef 57 d0 e7 | d1 ef 3e 19 e8 2e 02 37 b6 05 eb 7c 5d f3 b5 d0 | 29 00 00 24 6c 1f 45 88 1e 42 31 9a b9 27 19 26 | 95 8c 4f c4 41 99 09 32 1c bf f6 27 de 6a fb 55 | 00 73 7a e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 41 0f ce 80 1a 0e 57 d0 34 7b d4 | 5a 51 a5 89 80 d3 8f c9 00 00 00 1c 00 00 40 05 | 7f 09 ba 77 a9 79 98 e7 5b 47 dc 5e 0f 55 ef 6e | 76 2d 29 18 | libevent_free: release ptr-libevent@0x7fb36002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acd680 | #130 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 43 6a ad 59 7d ce ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #130 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #130 | rejected packet: | 85 43 6a ad 59 7d ce ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #130: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e05a0 | handling event EVENT_RETRANSMIT for parent state #188 | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #188 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #188 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49618.913621; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004195 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acd680 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #188 | libevent_malloc: new ptr-libevent@0x7fb36002a950 size 128 "road-eastnet-nonat-188" #188: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #188) | f8 92 2e dc 48 c8 64 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 8c 6e 8b 73 15 ff 0e bb aa f8 24 68 da ef 6a | 1c 01 19 e8 a2 a3 5e f6 5a 71 31 aa 3c b1 c4 41 | 27 8d 2a 58 b3 aa 09 ec ab 9b 79 a4 37 2c 57 bc | 33 2a 63 cb 88 61 ff 6f 57 a5 f5 2c 3b 28 ff c0 | e2 03 fe e0 d7 c3 cd af a3 47 59 59 0e 58 bb 20 | d6 dc 5a 4c 31 47 b6 5a 25 02 b2 63 30 de fe 0f | aa 00 d1 fa e6 0a 07 a2 95 d3 2a cc eb a7 d4 64 | 92 40 37 20 3b f0 9c 95 06 bf 89 fe 4e 9c 75 93 | be 49 6d 83 74 cb 43 a9 68 b0 b3 1b 6c 7e b1 7d | 71 1f eb 81 78 ef b8 84 cd 25 a3 cb 59 97 64 95 | 1c 19 a1 95 2c 31 c2 d1 08 08 8a 2a 38 f4 5e 06 | d0 60 01 b7 7e f7 37 07 7c 57 50 f7 20 78 35 94 | 90 2f 3d b8 01 db 62 a4 93 0c bc 99 72 08 c3 2a | 65 b1 ef fc 8b 00 29 6d 1d eb d8 05 c6 bd 18 34 | 85 96 91 a6 8d 87 95 d6 03 d2 b7 ec 1a a3 0e 66 | 18 52 9c 51 fa 27 d5 c0 2b 40 de 51 c6 17 5c e3 | 29 00 00 24 32 b3 09 c7 6d 35 ae 79 0b a9 93 c1 | 25 b3 85 c2 02 53 dd a2 dc f7 0c 55 f9 9f 55 72 | 45 99 28 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 05 c4 f8 2b d0 22 47 d6 02 77 fd | 96 35 b9 b3 1b 70 08 41 00 00 00 1c 00 00 40 05 | f1 47 98 30 50 7a f1 c9 d1 56 2e ed 54 8a b8 d4 | be 9f b3 89 | libevent_free: release ptr-libevent@0x7fb3680407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e05a0 | #188 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 92 2e dc 48 c8 64 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #188 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #188 | rejected packet: | f8 92 2e dc 48 c8 64 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #188: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac5400 | handling event EVENT_RETRANSMIT for parent state #218 | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #218 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #218 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49618.923969; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003858 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ec960 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #218 | libevent_malloc: new ptr-libevent@0x7fb3680407f0 size 128 "road-eastnet-nonat-218" #218: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #218) | fc 84 28 e6 d0 d4 a3 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 d7 19 e0 b8 a7 81 99 33 01 41 39 ef 55 14 82 | 36 e8 1e 6f 78 81 cb 8b ba 30 50 9b f0 49 c2 8d | 4d b2 2b 95 f1 d8 28 60 35 5d 42 53 4d 43 c7 8c | 4f 74 15 45 95 27 14 77 eb 50 5d 4a f6 fd be ee | 3c 1a 88 ee 70 83 66 98 31 0a fd ad 4a 03 b5 37 | 5d 2e 93 bd 7a be 39 56 60 d9 aa 84 79 74 3d 0e | dc e3 b7 0b 24 c5 94 3d 31 8b f6 0e 82 f6 06 b8 | 26 12 7e 3f 3e d6 7d b6 51 ee ad b2 d2 ab 27 77 | 53 f8 1e d7 91 5f 2a 81 5e 4e 7d 22 21 5e 55 9c | c3 53 13 8f 2a fb e3 93 47 36 6a 2c 3e 5b e2 b0 | 72 17 1d b0 34 33 da 2e 57 d4 77 d4 d7 37 4b 04 | e0 fd 56 ba 03 09 e0 ee 03 55 18 7a 06 0c cf 4c | 2a 51 58 97 6d b9 c7 55 61 75 dd e7 d8 0d 3a 1d | 49 6c f2 e4 06 70 89 d9 24 cc ed 33 51 12 2c eb | 69 6c 48 51 d3 c5 03 79 af 69 1b 7c 09 b9 68 90 | b7 fa 26 e6 18 f8 80 d5 96 f3 c9 3f f4 18 bb d2 | 29 00 00 24 11 b2 a5 5c a6 46 80 f9 3d 23 f2 ab | ce 5d 83 0a f1 1a 01 82 7c 29 4c e1 e5 d0 ae 3c | 95 98 eb 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4f 29 50 5e 23 8d 7d 6b 34 9f ff eb | 11 dc 43 b6 12 c1 95 47 00 00 00 1c 00 00 40 05 | a7 99 e5 52 4c 36 7b 61 4e b2 63 45 25 bf 82 23 | 34 fa af bb | libevent_free: release ptr-libevent@0x7fb354035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac5400 | #218 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 84 28 e6 d0 d4 a3 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #218 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #218 | rejected packet: | fc 84 28 e6 d0 d4 a3 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #218: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5af90 | handling event EVENT_RETRANSMIT for parent state #24 | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #24 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #24 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49618.937325; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.012666 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac5400 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #24 | libevent_malloc: new ptr-libevent@0x7fb354035930 size 128 "road-eastnet-nonat-24" #24: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #24) | a6 6a cf 12 4f 5d 80 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 64 6b 6f 54 02 19 88 ba 7c 08 ae f0 e8 ac 9d | c2 ca d4 17 41 fd 62 15 e6 80 a2 22 8c 15 09 a2 | e7 a1 72 ea 0a df 45 b3 25 d6 2f ad 4b 53 6c aa | 40 78 bc 47 40 56 b3 31 58 04 4d 38 c6 d0 b5 d8 | 7f 6f a2 f1 93 94 05 6c d0 31 6f f5 91 da 3d ba | e0 df 58 d8 a7 5c 43 d6 dc 3f 84 1b 95 82 7b 74 | 0c 41 0a 55 c5 c4 26 cf be bc a7 fe 25 56 32 c1 | 74 4d 01 af d9 1d ba 5f df c3 24 6e 66 7d 9c 22 | 84 1a 96 19 75 ab 7b e5 8d 21 ff f9 0c c5 57 de | 08 b9 a5 25 49 54 61 98 e2 43 6f b1 cb e2 3e 2a | f8 2c b2 cc ec bc 5e 41 c3 a9 95 de 3e ae 27 18 | 0c 51 55 28 d4 52 b5 1c e5 35 a1 75 a4 31 5a 74 | 09 2d 83 0a f9 22 55 04 79 c9 7a 03 c4 3f b9 27 | 7d 94 7e 25 32 de fa 8a ba c3 f8 47 1a 89 e0 04 | 1c 2a 74 59 3a 33 c6 78 c9 39 62 b5 5b 83 e0 ec | 74 d5 64 ba c0 ee 33 ea 4f ca fc f0 da aa dc 97 | 29 00 00 24 86 65 98 51 47 8e f6 4b 35 71 6a af | 55 7d 2d 69 5a 9e 6d 36 94 f6 45 50 b1 44 a3 6d | d2 78 d3 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 db bf 4d aa d7 35 0a 3b ec 97 e0 | 4c d5 57 e3 dd 13 4a e5 00 00 00 1c 00 00 40 05 | c7 67 96 20 f6 5f 6f 16 76 12 96 1c 43 e0 40 0f | 0e 23 33 02 | libevent_free: release ptr-libevent@0x7fb35801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5af90 | #24 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 6a cf 12 4f 5d 80 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #24 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #24 | rejected packet: | a6 6a cf 12 4f 5d 80 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #24: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45310 | handling event EVENT_RETRANSMIT for parent state #223 | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #223 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #223 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49618.946684; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500556 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5af90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #223 | libevent_malloc: new ptr-libevent@0x7fb35801d920 size 128 "road-eastnet-nonat-223" #223: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #223) | 7a 51 ea 00 7b 14 8e 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e c0 c4 41 9a 95 cc 81 e9 60 68 ab 45 9c 08 20 | b4 5a a9 9d 67 49 a7 46 aa 2b 2c 92 19 0c 98 42 | fe fb 4d 10 39 99 af 92 9d b6 2e 88 4d d0 11 c1 | cc 58 dc fa d8 45 59 75 a4 74 03 ef 28 b6 b2 df | 65 14 7b c4 56 cb 7e 8e c8 a4 2d ad 67 70 a7 55 | 5c 9f d8 c8 c5 46 4c 1e 63 7d 5e ab 57 ab 59 40 | f4 a8 4b fe 89 d6 bf 01 54 f9 46 07 86 f8 bc 75 | ef 26 9f 79 f2 7c 5a c2 f7 65 21 b4 f5 f9 18 0f | 7d 48 47 25 7b 23 3b 60 c4 8a 45 86 e2 31 42 68 | 91 5b 9e 0c 6c bd d5 91 7e aa 25 22 d3 ee bf b3 | c7 ca 4c a5 a7 05 79 a5 99 a0 88 70 14 6f be 39 | bf 8f 50 de 92 0a f3 4f c2 47 ed ec a9 88 76 bd | f2 c3 85 8c 4a 5e bf dc 44 3e af ee 45 cf 06 99 | e5 de 11 6a 2b 48 7c 22 42 d6 dd 11 a6 82 39 4f | 9c 24 2f 97 4c 87 c3 35 46 b2 19 ca 91 0d f2 ce | c9 8b b5 a0 e0 d7 a9 24 95 51 89 2f 04 0b 43 0c | 29 00 00 24 82 03 c4 08 4c 73 33 ac 95 33 24 a4 | 7a b6 82 c3 62 e4 f0 a1 f5 68 f8 16 c8 95 15 db | 31 e3 65 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 01 2d a5 d7 3f aa d5 34 53 23 34 | 04 fb 26 40 92 12 55 4e 00 00 00 1c 00 00 40 05 | a6 35 a0 ce 14 8d c6 b8 e2 da 44 eb d4 cc fd 65 | 95 2a 9c c1 | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45310 | #223 spent 0.175 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a 51 ea 00 7b 14 8e 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #223 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #223 | rejected packet: | 7a 51 ea 00 7b 14 8e 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #223: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a34e10 | handling event EVENT_RETRANSMIT for parent state #131 | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #131 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #131 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49618.966105; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004689 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45310 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #131 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 "road-eastnet-nonat-131" #131: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #131) | ad 34 7c 82 56 8e 42 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 46 e3 f8 a7 ca 79 f1 93 d8 0a 34 f9 91 ea 90 | 77 1f 83 03 4d 56 b1 a2 80 fd 5f 11 9a a9 0e 07 | 36 d2 ed 03 17 79 a3 f7 12 9f 05 ea 25 52 aa 39 | 69 97 15 3f 13 ff 62 78 88 a8 12 45 6d 5a 25 bd | 48 89 e9 ef 1f ad 28 87 00 42 ce a4 5f 7b 92 dc | 5d 1c f0 bb 25 31 dd e0 95 17 e2 9c e6 0b 50 26 | d7 14 f3 fe 1e d8 81 cc 32 fc 47 d4 65 1e 3b 75 | 32 54 1f 31 95 11 57 b2 4c 02 a6 33 ce 14 e9 e2 | e8 05 1b 1c cb 66 89 aa 6f 57 54 90 f2 c1 cf bd | a5 b3 7a c8 ef 67 d8 5e 26 3c 19 61 97 89 69 83 | 4b df 7e 44 0f 87 25 bc 6c 4f d8 49 5f 35 7f 1f | 6e 25 45 69 17 ee 43 65 f2 ee f7 63 5d 98 79 9e | fc c9 a2 e1 68 04 58 49 4b 9f c5 76 64 08 49 29 | 17 3a 17 1d 87 31 e4 d7 77 de 85 c2 0a d4 26 0f | 9f f4 0b fc 3f 26 bf f9 03 95 99 d3 57 10 6f ed | 92 8e 36 88 87 df d0 52 c8 ab 1d e3 6f cc ae 49 | 29 00 00 24 3c 10 ae 50 61 d8 53 b3 d3 e2 21 42 | 85 3a 07 db 01 3a f5 3e 94 0e a7 09 dd b2 ae 2b | e1 07 91 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 36 c8 4a f5 a5 90 83 e4 ec b2 3e | 44 38 46 9b 6e 4b f9 11 00 00 00 1c 00 00 40 05 | 1e 37 ad 88 e1 0a 42 8f 3f c7 b2 8c f4 b1 3f 27 | c4 6f 80 e6 | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a34e10 | #131 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 34 7c 82 56 8e 42 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #131 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #131 | rejected packet: | ad 34 7c 82 56 8e 42 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #131: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-227" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-227' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #227 at 0x557d46b09e80 | State DB: adding IKEv2 state #227 in UNDEFINED | pstats #227 ikev2.ike started | Message ID: init #227: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #227: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #227; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-227" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-227" IKE SA #227 "road-eastnet-nonat-227" "road-eastnet-nonat-227" #227: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-227 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-227": constructed local IKE proposals for road-eastnet-nonat-227 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 227 for state #227 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a34e10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #227 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 | #227 spent 0.175 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-227" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.264 milliseconds in whack | crypto helper 15 resuming | crypto helper 15 starting work-order 227 for state #227 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 227 | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 227 time elapsed 0.00092 seconds | (#227) spent 0.927 milliseconds in crypto helper computing work-order 227: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 227 for state #227 to event queue | scheduling resume sending helper answer for #227 | libevent_malloc: new ptr-libevent@0x7fb374045df0 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #227 | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 227 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #227 | **emit ISAKMP Message: | initiator cookie: | c5 c2 6a 83 d2 66 bb b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-227 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 93 5b f4 b6 58 9a 18 76 c3 e1 6e 19 2a 39 ae a1 | ikev2 g^x 62 ea 44 d1 30 52 4d 8a 54 61 7d 23 98 f8 8d d5 | ikev2 g^x 84 3b 68 fd c2 f3 21 b9 78 0c dc e3 83 0f 8e 04 | ikev2 g^x 74 b0 67 51 d8 1a 83 67 df 2f 54 ee 3c eb 78 8c | ikev2 g^x dc ab 5e ad 88 89 74 dd b8 42 f8 3b 65 bb c7 d6 | ikev2 g^x 58 b5 ad 0a ef 24 29 f4 ee 94 22 81 71 d7 21 71 | ikev2 g^x cf 9a 96 87 e9 3e 34 bd 96 10 75 82 fd 44 7e e5 | ikev2 g^x d5 b4 6d be 50 02 22 60 ae ae 61 82 1e 48 c4 e8 | ikev2 g^x fb e2 e4 71 81 50 e1 9c 82 80 8f 59 e3 b5 cd 3d | ikev2 g^x 6c 63 88 9c 58 f3 61 37 6d 11 4f 91 c3 dc 04 d5 | ikev2 g^x 78 82 60 cb 5e 0d 1d a4 89 4d 74 78 d6 b1 e9 18 | ikev2 g^x bf 79 a1 1a 16 e0 b4 3d 00 ec 02 c0 3f 69 19 a5 | ikev2 g^x ad 3d e3 6c cb 66 a6 b9 ff c5 30 88 8f f5 e7 a8 | ikev2 g^x f5 33 4d 86 13 42 87 b3 82 49 90 36 bb 5e e9 47 | ikev2 g^x c4 bf c9 a4 e4 1a 35 38 6a 04 9b 4b 05 29 61 c8 | ikev2 g^x cf c0 72 4f 16 6a 7e 8b 6f 02 0b ab 68 bf 34 71 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 73 17 4e 35 59 6e 44 c0 fd cd 46 68 7d aa 47 75 | IKEv2 nonce fe fd 8d d7 e4 53 d6 a0 cb 05 84 4f 51 ed 61 8c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c5 c2 6a 83 d2 66 bb b1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e3 | natd_hash: port= 01 f4 | natd_hash: hash= 88 60 9b b9 46 e5 98 89 ad c1 cb e5 e9 7b 12 83 | natd_hash: hash= 3d 55 5a fc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 88 60 9b b9 46 e5 98 89 ad c1 cb e5 e9 7b 12 83 | Notify data 3d 55 5a fc | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c5 c2 6a 83 d2 66 bb b1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 0c dc fe 43 8b 17 32 a8 d8 5e bc 45 b2 f1 c1 93 | natd_hash: hash= bc b6 5b dc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0c dc fe 43 8b 17 32 a8 d8 5e bc 45 b2 f1 c1 93 | Notify data bc b6 5b dc | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #227 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #227: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #227 to 4294967295 after switching state | Message ID: IKE #227 skipping update_recv as MD is fake | Message ID: sent #227 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-227" #227: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.227:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #227) | c5 c2 6a 83 d2 66 bb b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 5b f4 b6 58 9a 18 76 c3 e1 6e 19 2a 39 ae a1 | 62 ea 44 d1 30 52 4d 8a 54 61 7d 23 98 f8 8d d5 | 84 3b 68 fd c2 f3 21 b9 78 0c dc e3 83 0f 8e 04 | 74 b0 67 51 d8 1a 83 67 df 2f 54 ee 3c eb 78 8c | dc ab 5e ad 88 89 74 dd b8 42 f8 3b 65 bb c7 d6 | 58 b5 ad 0a ef 24 29 f4 ee 94 22 81 71 d7 21 71 | cf 9a 96 87 e9 3e 34 bd 96 10 75 82 fd 44 7e e5 | d5 b4 6d be 50 02 22 60 ae ae 61 82 1e 48 c4 e8 | fb e2 e4 71 81 50 e1 9c 82 80 8f 59 e3 b5 cd 3d | 6c 63 88 9c 58 f3 61 37 6d 11 4f 91 c3 dc 04 d5 | 78 82 60 cb 5e 0d 1d a4 89 4d 74 78 d6 b1 e9 18 | bf 79 a1 1a 16 e0 b4 3d 00 ec 02 c0 3f 69 19 a5 | ad 3d e3 6c cb 66 a6 b9 ff c5 30 88 8f f5 e7 a8 | f5 33 4d 86 13 42 87 b3 82 49 90 36 bb 5e e9 47 | c4 bf c9 a4 e4 1a 35 38 6a 04 9b 4b 05 29 61 c8 | cf c0 72 4f 16 6a 7e 8b 6f 02 0b ab 68 bf 34 71 | 29 00 00 24 73 17 4e 35 59 6e 44 c0 fd cd 46 68 | 7d aa 47 75 fe fd 8d d7 e4 53 d6 a0 cb 05 84 4f | 51 ed 61 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 60 9b b9 46 e5 98 89 ad c1 cb e5 | e9 7b 12 83 3d 55 5a fc 00 00 00 1c 00 00 40 05 | 0c dc fe 43 8b 17 32 a8 d8 5e bc 45 b2 f1 c1 93 | bc b6 5b dc | state #227 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a34e10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a34e10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #227 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 | #227 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49618.978647 | resume sending helper answer for #227 suppresed complete_v2_state_transition() and stole MD | #227 spent 0.476 milliseconds in resume sending helper answer | stop processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb374045df0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 c2 6a 83 d2 66 bb b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #227 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #227 | rejected packet: | c5 c2 6a 83 d2 66 bb b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #227: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8ee40 | handling event EVENT_RETRANSMIT for parent state #209 | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #209 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #209 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49618.979832; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003083 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ddbf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #209 | libevent_malloc: new ptr-libevent@0x7fb374045df0 size 128 "road-eastnet-nonat-209" #209: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #209) | 94 c0 53 32 b7 6b d2 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa aa 8f b6 87 c3 5d 98 e8 47 9c 34 3c ba fd c2 | 26 06 ee 61 85 3c e9 e8 7d e0 7a e3 30 dc 26 ae | 92 30 41 01 44 74 f7 33 20 3e 9d c4 91 ce 67 c8 | 16 8f 2d 63 7e 65 88 2d 42 e0 e7 51 27 b9 54 c3 | cb 64 94 8c 44 0b bb aa 89 37 4f 4c 19 3a 97 c2 | a7 78 bb a9 b6 bc c5 9a 0d 18 1b 6f 6c 81 28 5f | 96 22 7f 4e e9 03 4f f8 d6 4d 77 d5 fe b9 d2 6d | cd 7d 32 95 3a ae 28 68 07 70 28 76 ea 67 8a a4 | 02 0f 70 b8 39 d5 ef 06 00 8a 9d f6 62 11 fb 55 | 5d 2a 4e 92 67 d8 83 81 5c e2 b4 e7 58 f2 f1 29 | e2 e9 12 6d a8 99 db 90 fa c3 c7 67 22 60 c4 0d | b5 aa 8e 50 88 98 a0 7e 46 1d 18 c2 ea bc 90 f9 | 2c 89 53 10 11 da ca 7e 79 27 58 0a 97 be f4 b6 | df 47 81 cd fc cb 51 b6 90 69 20 0a b1 64 c6 52 | f3 67 4f b9 89 27 0d 82 44 e6 02 ff 6a 0a a5 77 | bc 54 13 6b 28 ab 23 fb 03 b0 ab d8 e9 7c 16 89 | 29 00 00 24 32 f5 dd 6d be 9b 09 7c 2d 16 66 7c | 9d 31 58 f8 20 f4 30 10 2d 04 04 00 c5 24 46 19 | 07 98 5b 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 be 30 60 49 91 51 94 d8 39 4f be | 6e 81 91 5e 2f 8c 88 7e 00 00 00 1c 00 00 40 05 | 2d 19 47 e1 25 d9 8a e8 d3 7e a2 ad 7d 2a 38 10 | 8b 55 bc a7 | libevent_free: release ptr-libevent@0x7fb36c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee40 | #209 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 c0 53 32 b7 6b d2 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #209 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #209 | rejected packet: | 94 c0 53 32 b7 6b d2 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #209: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46910 | handling event EVENT_RETRANSMIT for parent state #189 | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #189 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #189 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49619.030034; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00714 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee40 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #189 | libevent_malloc: new ptr-libevent@0x7fb36c0251c0 size 128 "road-eastnet-nonat-189" #189: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #189) | 86 0c af cf d7 4f f0 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 da a6 92 01 b3 1e 2d 01 6d b4 b0 5b c8 86 63 | fa d3 04 1f 4a 5d 42 51 c6 fa 83 7f 52 a9 5c 5f | 29 a2 a6 67 ca c4 cb cd f8 82 1e 41 60 3e d2 fa | be e5 64 f3 5e f3 de 1c 66 73 04 70 83 c5 c9 fa | d9 0c 95 4f d8 7c 96 92 62 c0 89 3f a6 f5 e5 1c | 1d 8a 04 ae 7f 59 7e f9 0a 02 65 1e e5 50 67 cc | 8a fa 7a d2 bf b6 8d 22 68 80 58 92 0d 46 32 32 | ac 55 d1 c6 9f 27 eb 86 dd 30 64 7d 70 38 1f e2 | 82 2f 8e ad e7 06 c8 10 a8 89 ac cd 34 d4 ef 54 | d9 fa ef 60 3c 01 17 c1 e0 90 2b 1d 49 9b 9e e6 | 59 07 02 91 fb ba 4f 73 08 2f de a1 3c 70 c1 7b | f2 11 29 b4 eb 0f 6e 10 04 0d 03 e4 29 ad b5 0b | 6b 4b aa f3 91 cc 9d d5 fa 2e 4d ea 3f 0e 7e 09 | 29 dd 22 a7 1f e8 ee 73 1f 35 15 51 78 6d 86 ea | cd eb 92 50 fc 79 44 24 ff 9f f8 19 89 f2 31 2b | 2f 82 13 db f2 4a 67 b7 c4 2a 16 2f d5 d4 31 ee | 29 00 00 24 ab 6b 1b 01 ee 77 53 c6 2a de 6e a0 | bf 1d e9 b5 56 76 a7 4b d5 a7 a9 e9 a7 01 9e 47 | cc 4b 2a 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 a4 06 85 0c 28 ca 55 e9 70 4f 7f | 1a ca eb c6 50 e4 53 f0 00 00 00 1c 00 00 40 05 | 2a 84 d0 22 8e e3 5b 68 a0 3f 20 22 83 cb 94 15 | 67 d9 c0 48 | libevent_free: release ptr-libevent@0x7fb364012740 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46910 | #189 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46906b40 | handling event EVENT_RETRANSMIT for parent state #25 | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #25 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #25 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49619.030228; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009349 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46910 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #25 | libevent_malloc: new ptr-libevent@0x7fb364012740 size 128 "road-eastnet-nonat-25" #25: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #25) | 78 5e ec 19 c3 e9 2e 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 3a 20 04 5c a3 28 e0 27 26 70 8b 2f d3 d3 dd | 4a ad b8 1e 2e 37 87 d2 d3 a8 c4 9d c6 ee 0f a0 | 73 84 05 06 74 d6 4d 07 19 2b 12 8b 69 7a 83 b9 | 89 8c 88 b4 63 15 c8 b2 2d cc 49 7a 79 d1 07 bf | ee 4e b7 0b 0d 2d 3d 97 a7 24 aa 10 a0 e9 fc 77 | 06 e9 cd 21 f9 64 fc 4a 83 9d 5e f3 a2 9b 32 c3 | d3 50 6b 09 58 29 c8 67 c4 22 3b 38 ef 52 9f dd | 6e 41 e8 16 88 89 59 a6 9f 8d 30 13 4e 6f 06 5b | 1b 0e 62 f8 90 29 6e c8 e5 89 28 a2 ea ec 59 64 | 67 71 02 aa 61 49 46 0f fe 0a d1 4d 62 20 44 13 | 22 6b 41 1e 83 c0 52 5c 04 b5 86 ac e3 c4 87 52 | 79 53 63 6b c1 fd a7 16 e1 a2 b6 27 78 fe 10 69 | 79 cb f1 75 47 7f aa 61 41 c8 00 01 b4 6e 89 cf | 41 c5 e9 e7 92 08 38 fd 15 78 0a 2b 93 44 c9 ca | b1 70 2a 2b ec 91 fe 70 63 59 89 8e 57 c3 33 c3 | 54 24 a1 21 c8 2a c0 85 b2 60 de 71 38 dc 7c 22 | 29 00 00 24 e1 d5 1d 82 b2 16 85 fd 33 85 77 2b | fc 68 12 4a cf f8 6e 1b 7e ab 43 df ab 9a a1 84 | be 92 7e 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a 8e 47 d6 ba 1e 42 85 a7 7b 2f db | 65 2a 1e ef d5 42 ee 43 00 00 00 1c 00 00 40 05 | 5d 12 0d 5e 92 91 ee 2b 6d 12 02 e9 64 25 a1 22 | eb b7 d7 ed | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46906b40 | #25 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 0c af cf d7 4f f0 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #189 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #189 | rejected packet: | 86 0c af cf d7 4f f0 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #189: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 5e ec 19 c3 e9 2e 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #25 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #25 | rejected packet: | 78 5e ec 19 c3 e9 2e 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #25: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0589 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56e70 | handling event EVENT_RETRANSMIT for parent state #132 | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #132 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #132 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49619.030493; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006283 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46906b40 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #132 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 "road-eastnet-nonat-132" #132: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #132) | 8f fb fe 61 19 e1 9c b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 1f 4f d1 68 44 b0 da 10 cc a3 65 0b 05 29 46 | a5 ef 62 34 d2 17 30 f6 7e b7 1c 3d c0 61 fd c8 | 25 96 8a e1 67 57 19 a7 8f 6a aa 6e 4c 1e 1c bb | 2a 10 04 d7 17 65 58 ce 83 ac 91 4f 48 71 e3 8d | af 3f 22 d8 df 00 4a d4 1b df 76 a7 ad 26 ba ba | 91 be fb 08 a9 70 66 2f 99 bf ef e8 c6 21 cc c0 | ed 1d fb 20 f6 60 07 53 22 da 88 1b 1d 11 4a 37 | e6 c8 75 11 02 89 b4 55 ec 0c 8b 31 52 06 0f 18 | 81 e2 42 d3 fe 87 7f dc c5 02 18 bb 87 cb 91 7a | 01 aa 5e f6 49 fd e3 ed df 8b 65 4a 5d 0c dc 05 | 45 9e f7 6f 6c 11 d8 bd 19 75 3d 5b 55 32 77 3d | 44 4c 11 8d 32 50 da 6e 0a 86 ef 69 5f 2a bb 9d | b7 76 10 6b da 52 00 cf e9 de 40 71 fd 9c 21 a3 | 2a ac 7a 1a 3b 67 9b 88 e6 1e 25 7c 3a 6e 9c 54 | 4b 96 e9 1a 08 38 3b 3b 27 21 e9 0c 79 a6 d9 1c | 14 07 fc c1 42 9e 29 79 0d 68 f7 e2 3d 93 ce 38 | 29 00 00 24 92 fc 82 18 58 23 4b 06 62 ee b8 b2 | f1 d5 54 0c 3d b0 88 33 58 36 a6 39 d7 5f 04 ee | ca 34 01 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 e7 04 0b 0d 59 5a cd 8a 54 e3 8a | 4e 81 3b 76 de 25 c1 57 00 00 00 1c 00 00 40 05 | c3 b5 61 af 5d 2d 46 0f c8 2c 48 99 41 b8 6c e0 | 5b 12 cb e3 | libevent_free: release ptr-libevent@0x7fb36c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56e70 | #132 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f fb fe 61 19 e1 9c b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #132 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #132 | rejected packet: | 8f fb fe 61 19 e1 9c b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #132: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.057 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #219 | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #219 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #219 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49619.03682; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001405 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e05a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #219 | libevent_malloc: new ptr-libevent@0x7fb36c03b0b0 size 128 "road-eastnet-nonat-219" #219: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #219) | 7d 80 b0 77 1f 48 77 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 87 5e 24 5c db 31 0a 96 84 9d 90 05 c1 73 ea | 13 fd da 1a eb 02 9b 1b a2 ef f5 1e 7d d5 07 48 | 63 2b 15 ef 39 49 2f 72 57 96 fc d0 52 b7 b4 5b | b9 8f 1f 7d 66 98 1a 54 e8 35 20 c8 da d6 6b 14 | 12 96 09 73 f0 2a 18 19 ad 4f ad c0 e9 02 7d bf | 91 ef d7 b5 3d bf 72 91 c2 b3 4a 21 80 f5 15 86 | f5 a2 c4 99 67 47 6c 96 fc e1 53 b9 1a ff ad 2e | 5a 73 b4 6f 29 39 2a 43 c9 46 c0 b4 6f 20 2e 1e | 67 a0 45 fd 13 c6 d4 73 ef 07 78 d4 9f 67 9c 74 | b8 b8 8b 57 22 93 1b 6e 1c 48 7c 01 8f e1 37 24 | ca 0b 69 5d 4d 5a 11 fe 79 69 f3 19 5f e1 13 01 | 72 da c7 1d 2e 2d 95 6b 1a 0c 79 15 cc 16 3b c9 | df 53 b2 62 55 3b 89 98 3a 35 b4 a3 d8 f7 72 66 | 5a 4a cd 05 1d 45 02 1c a4 80 ce 7b 71 ea 76 a3 | 4c 87 0d 5f a5 5d 61 29 09 d4 52 68 95 1e 6d d6 | 81 6a 00 e1 92 ed bb e5 1a 97 43 9e cf 2e 23 af | 29 00 00 24 3d 29 6e 63 66 7a 35 4b 56 6e f9 8b | 96 51 14 3b cc a7 be 10 65 46 ea 6e 67 b7 cd b3 | c7 62 bc 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 d7 c1 a6 5e c6 d2 33 1c 31 12 89 | 58 68 2a 17 e1 05 d4 0f 00 00 00 1c 00 00 40 05 | 8f 01 0b 19 90 57 cd de dd b3 66 c4 60 3d 67 fe | 89 ed 52 b0 | libevent_free: release ptr-libevent@0x7fb36402a780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #219 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 80 b0 77 1f 48 77 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #219 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #219 | rejected packet: | 7d 80 b0 77 1f 48 77 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #219: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0697 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #210 | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #210 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #210 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49619.058271; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.006332 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #210 | libevent_malloc: new ptr-libevent@0x7fb36402a780 size 128 "road-eastnet-nonat-210" #210: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #210) | aa f0 6c 1e 8f b0 d8 5f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 2f d8 9e b6 32 84 b3 62 ee 33 24 ed 0e fd d4 | fb 0e fa b0 5a fb 4d c1 44 66 ed 6c d9 22 6b 05 | 5a 31 76 75 51 2d 58 63 68 30 79 28 a1 8c f7 58 | 78 1f ed 9b 41 29 7f de 5e 35 7e 32 cc 4f eb 97 | f3 d2 34 17 b1 d4 d0 fd f0 52 da 3a 73 a4 1f 58 | 68 7e 43 79 1c f9 07 46 32 fb 81 59 a1 8b 36 99 | 63 59 69 2b 65 b6 49 f0 2c 89 5f 6f 77 04 35 7e | de cb d9 d5 71 0b 78 b5 5b 65 ab a6 ce 91 19 fa | 51 58 77 c1 4e 94 ff 17 29 dc 29 f8 bd 1c c5 36 | 82 f3 20 0b 04 da 30 59 b0 d1 05 3e 3f aa ef 6a | 84 97 f2 ea a5 27 2e 15 1e f4 66 a5 d9 21 ce 67 | e8 bd 44 de 20 df 28 17 c9 3c 33 10 eb 28 78 7e | 45 57 17 c5 4c aa eb a9 d1 47 13 10 17 f0 99 19 | db 6b d3 97 fa 92 c7 c8 43 99 f3 77 fc f5 56 ad | 75 cc 5d 24 35 8b 29 95 64 a0 e4 4c e0 27 1c 2a | fb fd b3 6d 87 9d 4a e7 f3 e4 fa 49 6c 90 9e db | 29 00 00 24 b7 0e 02 eb 9f 32 9f 45 44 47 90 9f | 97 de 23 e8 e1 c4 97 88 69 d1 3d 46 ce 63 23 0a | 5b 61 d3 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 f2 e2 75 79 7b 92 3c e8 e4 c1 f3 | d5 ae c0 9c c7 8c de 57 00 00 00 1c 00 00 40 05 | a7 24 70 f0 1a 13 21 fc 21 f0 f5 1e 72 fd 1a 35 | c3 6c 26 99 | libevent_free: release ptr-libevent@0x7fb3440407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #210 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | aa f0 6c 1e 8f b0 d8 5f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #210 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #210 | rejected packet: | aa f0 6c 1e 8f b0 d8 5f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #210: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-228" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-228' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #228 at 0x557d46b0b440 | State DB: adding IKEv2 state #228 in UNDEFINED | pstats #228 ikev2.ike started | Message ID: init #228: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #228: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #228; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-228" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-228" IKE SA #228 "road-eastnet-nonat-228" "road-eastnet-nonat-228" #228: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-228 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-228": constructed local IKE proposals for road-eastnet-nonat-228 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 228 for state #228 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a6b490 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #228 | libevent_malloc: new ptr-libevent@0x7fb3440407f0 size 128 | #228 spent 0.16 milliseconds in ikev2_parent_outI1() | crypto helper 19 resuming | crypto helper 19 starting work-order 228 for state #228 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 228 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-228" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.271 milliseconds in whack | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 228 time elapsed 0.001263 seconds | (#228) spent 0.977 milliseconds in crypto helper computing work-order 228: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 228 for state #228 to event queue | scheduling resume sending helper answer for #228 | libevent_malloc: new ptr-libevent@0x7fb368046040 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #228 | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 228 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #228 | **emit ISAKMP Message: | initiator cookie: | d5 f0 72 59 9f 13 94 bf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-228 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 74 4d 11 72 16 86 29 05 39 41 97 2f ff 33 6b a3 | ikev2 g^x e2 5f 51 ee 71 23 04 d6 72 0c fb dd 15 ef 6d c8 | ikev2 g^x 1d b7 c6 17 96 9b 3b 82 3f 74 55 80 22 53 76 ea | ikev2 g^x 2b 12 aa ae d8 aa 3b e7 03 c1 8e 79 97 e5 92 eb | ikev2 g^x b7 6d 0d a0 78 62 d0 f2 27 fb a0 42 72 ed d8 cd | ikev2 g^x 0b b4 e6 0c 99 75 b7 07 dd f8 fc 47 fd 38 1d bf | ikev2 g^x fc 96 ec 5d d0 ea 7b a2 99 77 8a 86 42 74 89 83 | ikev2 g^x 1d d8 30 c9 41 1c 6d 04 55 5a e4 6a 7f a2 48 37 | ikev2 g^x 02 c7 31 e3 a7 ef f2 c3 5f 9e 83 8d 0c 35 c9 0e | ikev2 g^x e5 2e 96 42 63 e4 ee 14 f2 43 a8 13 d6 19 12 1c | ikev2 g^x 71 11 80 4d 71 0f 19 3b 63 b8 05 30 82 8b 88 80 | ikev2 g^x bc 55 78 f9 8c 98 4b c3 03 95 ca f9 2f 2c ae 8f | ikev2 g^x 75 58 72 ba 8e 10 73 eb 12 6f 65 4a c0 7e 83 a9 | ikev2 g^x 2f 5f f5 39 44 b0 f3 71 90 fa 59 65 c5 77 f4 ce | ikev2 g^x b1 2f 6d f7 a7 ee d0 bc fc b5 7f 3e 18 f7 e0 77 | ikev2 g^x 4c 26 72 38 ff 07 80 23 0f 43 31 54 b4 87 d0 e8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 53 c7 ad d5 ed 06 63 64 b1 b9 04 17 96 5d 45 22 | IKEv2 nonce 6a eb a8 60 3b 32 23 a5 f3 37 e3 7f 1e aa 66 00 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d5 f0 72 59 9f 13 94 bf | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e4 | natd_hash: port= 01 f4 | natd_hash: hash= 41 e7 5c 74 6b 3c 37 c1 41 0f fa b6 88 19 1c 11 | natd_hash: hash= 1d 3e 7c 16 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 41 e7 5c 74 6b 3c 37 c1 41 0f fa b6 88 19 1c 11 | Notify data 1d 3e 7c 16 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d5 f0 72 59 9f 13 94 bf | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e2 48 33 be 38 78 72 f6 d1 00 6b 61 a1 72 02 86 | natd_hash: hash= 37 c7 48 ae | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e2 48 33 be 38 78 72 f6 d1 00 6b 61 a1 72 02 86 | Notify data 37 c7 48 ae | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #228 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #228: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #228 to 4294967295 after switching state | Message ID: IKE #228 skipping update_recv as MD is fake | Message ID: sent #228 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-228" #228: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.228:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #228) | d5 f0 72 59 9f 13 94 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 4d 11 72 16 86 29 05 39 41 97 2f ff 33 6b a3 | e2 5f 51 ee 71 23 04 d6 72 0c fb dd 15 ef 6d c8 | 1d b7 c6 17 96 9b 3b 82 3f 74 55 80 22 53 76 ea | 2b 12 aa ae d8 aa 3b e7 03 c1 8e 79 97 e5 92 eb | b7 6d 0d a0 78 62 d0 f2 27 fb a0 42 72 ed d8 cd | 0b b4 e6 0c 99 75 b7 07 dd f8 fc 47 fd 38 1d bf | fc 96 ec 5d d0 ea 7b a2 99 77 8a 86 42 74 89 83 | 1d d8 30 c9 41 1c 6d 04 55 5a e4 6a 7f a2 48 37 | 02 c7 31 e3 a7 ef f2 c3 5f 9e 83 8d 0c 35 c9 0e | e5 2e 96 42 63 e4 ee 14 f2 43 a8 13 d6 19 12 1c | 71 11 80 4d 71 0f 19 3b 63 b8 05 30 82 8b 88 80 | bc 55 78 f9 8c 98 4b c3 03 95 ca f9 2f 2c ae 8f | 75 58 72 ba 8e 10 73 eb 12 6f 65 4a c0 7e 83 a9 | 2f 5f f5 39 44 b0 f3 71 90 fa 59 65 c5 77 f4 ce | b1 2f 6d f7 a7 ee d0 bc fc b5 7f 3e 18 f7 e0 77 | 4c 26 72 38 ff 07 80 23 0f 43 31 54 b4 87 d0 e8 | 29 00 00 24 53 c7 ad d5 ed 06 63 64 b1 b9 04 17 | 96 5d 45 22 6a eb a8 60 3b 32 23 a5 f3 37 e3 7f | 1e aa 66 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 e7 5c 74 6b 3c 37 c1 41 0f fa b6 | 88 19 1c 11 1d 3e 7c 16 00 00 00 1c 00 00 40 05 | e2 48 33 be 38 78 72 f6 d1 00 6b 61 a1 72 02 86 | 37 c7 48 ae | state #228 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3440407f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a6b490 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #228 | libevent_malloc: new ptr-libevent@0x7fb3440407f0 size 128 | #228 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49619.074358 | resume sending helper answer for #228 suppresed complete_v2_state_transition() and stole MD | #228 spent 0.544 milliseconds in resume sending helper answer | stop processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb368046040 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 f0 72 59 9f 13 94 bf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #228 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #228 | rejected packet: | d5 f0 72 59 9f 13 94 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #228: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350005860 | handling event EVENT_RETRANSMIT for parent state #133 | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #133 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #133 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49619.094578; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00693 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56e70 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #133 | libevent_malloc: new ptr-libevent@0x7fb368046040 size 128 "road-eastnet-nonat-133" #133: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #133) | 93 2c 91 72 20 8c aa 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c d8 f9 2c 2b a0 b1 31 57 35 e0 04 75 fa ff 27 | 53 64 2e 54 ea 38 e0 ef 52 11 3d 36 64 b6 af 29 | 51 f7 3a cb 03 fb a8 9c 8c 4c bb 74 63 76 7d d1 | a9 88 c4 5e 87 dd 7f 20 3b 30 84 84 16 86 c9 65 | d1 47 a8 28 8d 73 90 06 c4 7f 57 27 02 dd dc 34 | 3e 36 07 bc f4 b2 13 c9 ca 56 ee e3 b6 fc 0e 46 | 17 c4 47 02 3c 22 35 e8 99 a1 3a f2 88 57 e2 b2 | 76 46 aa bb c5 86 a7 a3 5d df 02 48 a4 96 00 22 | 34 1a 70 44 11 10 cb ff f2 1d 21 21 00 41 5a a7 | a1 5f 54 12 46 7f 51 02 26 94 4f 54 f8 0e be ce | 2f 5a 2b 9b 25 dc a0 31 41 2a dd d5 76 31 f7 83 | c2 70 58 eb 31 ba 5b 36 57 70 32 a0 20 3d ec e9 | 48 52 21 d4 39 1a 79 f6 31 e1 9a c8 d2 b3 fd 12 | 8c 10 74 fe 54 6f eb b1 c3 58 8e 49 2a 38 98 47 | 38 39 a8 64 1a 71 f1 c2 47 f8 d0 db da e6 75 10 | 1b a2 b7 e4 c4 eb b7 43 ca b9 9e 23 21 75 e9 b6 | 29 00 00 24 2f d1 c4 74 6b fd 49 84 52 1d 9d 1d | ec af 19 02 47 e5 8f b7 c6 73 48 d2 a9 91 58 b2 | b6 74 d3 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 b3 b4 a5 c4 da 26 36 c8 2a e5 e1 | 3e af ad 98 58 9a bf c4 00 00 00 1c 00 00 40 05 | 31 45 bd 61 73 08 cb 41 73 c4 72 6c eb e0 15 88 | 84 49 78 a3 | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350005860 | #133 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 93 2c 91 72 20 8c aa 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #133 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #133 | rejected packet: | 93 2c 91 72 20 8c aa 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #133: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0647 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a855c0 | handling event EVENT_RETRANSMIT for parent state #26 | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #26 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #26 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49619.104997; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005845 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #26 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 "road-eastnet-nonat-26" #26: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #26) | f4 88 08 87 51 21 ca bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af d0 7b 56 fd 83 24 e2 7f 6d 07 5b 14 cf 37 08 | c2 df a1 e8 d0 3d d9 70 11 a2 f7 87 78 ef 74 57 | 42 80 b9 d0 66 00 01 7b 09 5e 7e 2a 26 27 6c f8 | 72 db 2f 73 3f 38 89 07 c7 29 09 0b 07 35 1d d7 | 5c 45 0c 9e 1b e1 95 53 4a ee ac 68 bd 09 aa 3d | 27 0f 50 02 03 b3 ad ea c4 c7 28 b1 bc b2 70 07 | fc b6 58 d4 ed 1b fe 1b 64 8b 86 a1 fe fc 72 d9 | f1 ba a9 eb 7d ce cd 2c b8 6e 00 33 4c be dd dd | 3d 98 b2 2e 58 56 f2 f2 80 02 eb 21 ee 6b bd 96 | 40 1f 33 62 77 0f c1 a2 eb f8 19 6e 1a 5e 18 e2 | c2 89 f7 17 30 91 11 29 f1 9d 22 c7 c8 11 a1 d6 | b3 ae 73 01 db d3 1a d2 95 3f af b3 66 e8 e4 3f | 7f 26 bd b3 f0 37 10 0c fa cc 87 cc 8d 67 d1 69 | 87 60 66 13 b3 cf ae b5 94 11 93 f7 71 af 4a e8 | 96 fa e6 46 bb bb 17 b4 9c 44 80 04 e3 4c ce 52 | 44 6c a3 c2 a0 6e 82 a5 21 5c cc c5 65 7c 81 dc | 29 00 00 24 8a 04 a2 be b1 ba fb 75 a9 90 e3 4a | e4 71 c4 43 1c fe 30 e6 85 0e 15 7e 50 52 02 a7 | d2 a1 ae dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 32 7f b1 02 26 47 ea b2 9e 1c ce | 0f f8 7e 1c 87 59 f3 12 00 00 00 1c 00 00 40 05 | f0 af 8c 45 09 60 6e 14 7f 54 da 7f 84 35 07 83 | 60 40 27 0a | libevent_free: release ptr-libevent@0x7fb3440251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a855c0 | #26 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 88 08 87 51 21 ca bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #26 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #26 | rejected packet: | f4 88 08 87 51 21 ca bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #26: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34800d120 | handling event EVENT_RETRANSMIT for parent state #224 | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #224 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #224 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49619.114347; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499974 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a855c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #224 | libevent_malloc: new ptr-libevent@0x7fb3440251c0 size 128 "road-eastnet-nonat-224" #224: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #224) | df 89 b3 52 1f 0f f1 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 96 f9 c5 cf 52 6e 98 60 ae 95 1a e5 7e 1a 31 | 50 be ef 8d 41 26 11 5a 53 58 33 b0 a8 71 a8 6c | e8 76 92 5b e2 75 f3 94 63 68 60 f5 a8 87 0f b1 | 85 e3 57 f0 0a 68 7c 03 0c 38 78 58 ee f2 b7 98 | 27 f8 ff c8 7f ae 35 5b f2 27 8d 00 b6 82 75 2b | 3b 8a 79 42 25 39 44 44 74 88 57 0d 59 d9 ac 5f | 3a a3 28 54 30 c8 14 8d d4 ac c4 45 3f f7 ef e3 | 1f eb 55 97 53 44 9f 09 90 a7 a8 b1 9f 93 b7 ec | 77 b6 57 89 c8 dc e6 37 8a a8 71 f3 b4 89 24 f8 | 4d 88 b5 f8 54 45 64 00 76 98 8f 87 5f 00 73 6a | f6 f0 80 19 81 11 66 a0 99 ea 82 6c 63 da b4 a5 | 98 93 6c 76 ef 6c 97 72 9f 10 64 96 91 57 93 6d | a1 3f 92 89 58 38 d2 cf 72 5f 0f 1e 71 7d 51 50 | af 30 4c 3a ad 78 8a 2d 7e 0c 42 b8 89 96 d8 fc | a1 5f f4 b6 9f 10 b4 87 26 b0 a3 fb 36 06 d9 24 | c5 ea bd 98 29 fe 3b d7 81 37 c6 01 f7 9b f8 78 | 29 00 00 24 c7 58 00 d8 91 d9 da 4a 3e 8b 1d 2d | a3 43 99 18 27 ab 56 0f 2a b9 54 4e 52 a3 14 24 | 6c 73 a2 b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 40 3a 6a 95 ab 61 8d 6b 1f 3b c7 26 | b3 ad 90 46 7f 26 ab 97 00 00 00 1c 00 00 40 05 | 80 ec 8b 4c 52 09 6e c6 12 ca 33 07 bd aa 68 3f | 33 bf 9b d1 | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800d120 | #224 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 89 b3 52 1f 0f f1 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #224 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #224 | rejected packet: | df 89 b3 52 1f 0f f1 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #224: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ffbf0 | handling event EVENT_RETRANSMIT for parent state #220 | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #220 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #220 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49619.126889; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.006024 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #220 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 "road-eastnet-nonat-220" #220: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #220) | 46 e4 bb be 2e c2 5d 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 39 4d 80 66 08 94 81 6d ee b8 9e f9 65 a1 19 | 54 a6 0a fc 14 3b 49 4b a5 b0 75 d5 8f f4 dc f0 | 1b a7 3c f6 bb e2 05 ae e7 81 f3 39 80 b8 01 f9 | 77 d5 d3 86 7b 99 e2 d3 05 f7 72 fa 5c f1 d2 51 | b2 76 8c 56 54 09 b2 f0 63 f0 63 23 b4 3d 48 f6 | f1 7c 7c 9e fe e8 97 61 67 eb 6f f5 a8 99 0f d8 | f0 a4 2a 65 98 03 64 d4 51 ad 7e ce 83 6c 68 5a | 24 81 05 98 d2 e5 16 4b 8b 3e c7 e6 5d cd e2 fb | a8 b3 8a 3b d0 a3 7d ce 4c 78 67 e6 b6 09 60 ba | f9 1c b9 ed ac 41 f4 ed a2 6c 61 ed 1a 8b 86 32 | f9 bb e7 03 fa 79 52 88 d5 55 24 b9 5c 26 d9 4f | 84 6f 26 7a 2c f2 0f 72 55 f3 04 53 6d 42 03 19 | 2c 35 89 e8 72 3a 30 cc ba be ce f2 4a 96 71 78 | 63 64 85 27 33 b9 dc 2a 58 25 92 09 0e 9f ab 45 | ad 24 0f 92 22 24 6c f4 98 77 7a 79 50 d8 2c a5 | 5a fb ac f5 20 e9 5a 93 8b 11 3b 04 5b 8e 94 e7 | 29 00 00 24 b8 3d f3 f9 87 d9 e7 9e 4b f1 71 60 | 7a f6 ea f9 0f a9 84 5d c0 c1 a6 93 b2 00 5b f0 | d8 3e 37 a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f9 77 af d4 23 66 f6 eb 62 8a 75 68 | f1 14 74 bf 89 18 b5 2c 00 00 00 1c 00 00 40 05 | 75 8f 21 77 9e bf 74 11 1b b7 a1 b1 db ce 3f 91 | e1 e1 a3 e9 | libevent_free: release ptr-libevent@0x7fb378046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ffbf0 | #220 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 e4 bb be 2e c2 5d 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #220 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #220 | rejected packet: | 46 e4 bb be 2e c2 5d 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #220: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad9ac0 | handling event EVENT_RETRANSMIT for parent state #190 | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #190 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #190 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49619.143253; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.016576 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af0c80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #190 | libevent_malloc: new ptr-libevent@0x7fb378046040 size 128 "road-eastnet-nonat-190" #190: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #190) | da 8a 0c 65 e6 2b 3c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 54 17 f8 a5 01 f3 68 22 77 c6 18 00 12 b3 14 | 54 3d f4 b3 34 1e fd 72 0e 4d ab df e8 2f e1 56 | d7 6e 5a 40 eb 22 8c 08 69 45 e9 fd 19 98 3c aa | 8d 83 ce d6 37 74 60 c8 87 61 28 d5 63 be 48 e9 | ac f9 f7 e4 f2 02 da 1e ec 22 1e 5a d2 5a 2b 8a | 3b 57 71 3a 73 29 7d d1 21 cb fe 25 7a 4a 44 7a | d3 e0 2e 8b b0 82 19 e0 d0 d4 ad 62 8a eb ad 5f | cd 5f 01 c2 97 9c ca 0a 84 fd e9 c6 24 7d a2 13 | 18 78 86 de 18 44 7c 6e 03 a7 c1 8c f5 10 72 e4 | 18 35 f0 48 fd 3b 9d 06 d6 b2 cc 32 8d c8 ab 02 | 22 2a e1 65 5c 07 67 dd 84 00 eb 6c 69 e6 d9 74 | 15 08 fb 78 e2 63 d8 e3 71 dc a5 a7 be b4 49 92 | ca 4f af 55 e1 5d c5 43 c7 03 58 76 b8 41 c6 a2 | f8 e5 96 26 df 8f 3c ed b5 1d 45 31 66 bd 99 75 | c9 f2 c5 21 dc 35 1b 0a 99 75 5d 5c a4 07 02 4f | 98 82 da 07 a8 27 6d 15 d8 05 50 39 0a b9 0a 99 | 29 00 00 24 f4 39 3c cf b3 b2 13 92 d2 3b 37 9f | 62 32 43 c3 74 37 47 22 30 dc 01 af 01 09 20 fa | 09 9a 8b e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6f a0 3a 65 d8 4c 58 fb ee 8d a7 57 | 94 7e 0d f0 9d 14 5d c2 00 00 00 1c 00 00 40 05 | c2 56 8a f7 34 3a b7 10 07 49 00 4f af 85 84 af | 10 cb 7b 4a | libevent_free: release ptr-libevent@0x7fb36003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad9ac0 | #190 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 8a 0c 65 e6 2b 3c 3b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #190 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #190 | rejected packet: | da 8a 0c 65 e6 2b 3c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #190: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0731 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #134 | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #134 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #134 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49619.152781; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005299 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad9ac0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #134 | libevent_malloc: new ptr-libevent@0x7fb36003b0b0 size 128 "road-eastnet-nonat-134" #134: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #134) | 80 c9 f7 0f 34 43 e8 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 45 e5 b7 ab 0c a4 4c 5f b2 54 d8 39 c5 f7 ae | a7 a1 c9 5c 2b 5a 97 72 d3 14 80 31 3f b5 24 0d | cb 02 f5 57 a3 d0 5f 51 b9 29 93 ae b9 a3 6f 26 | d5 1f 2c 2d f7 c7 46 60 60 aa 8f 11 69 88 d5 d6 | 7f c3 44 3b 7a f5 6e 59 77 4f a4 43 34 c4 26 e5 | ae dc 49 7d 8b cd 2b ab 18 68 bd 39 90 28 6c 4a | 23 91 a3 0e 3f fb 01 de 41 7d 06 32 ac 44 1c 44 | 83 e0 6e 5a 17 ec 28 70 e3 9f 5e 65 cd d5 6a 13 | f4 b1 48 8a 51 f8 b7 54 21 1a 5d da c7 53 38 a4 | e5 03 02 af 81 ae 46 39 d4 15 23 f5 a8 b9 79 ca | ed 1c 97 81 a2 68 bb 3f 5d 13 76 91 c8 b3 35 4a | a1 e6 8f 6f 10 12 49 6f 3e bb 3b bc 07 2d 62 f9 | 63 5c f1 5a ec c4 50 49 e3 cf a2 cc 8f 61 b4 4c | 09 95 92 ca 4c 19 06 a3 80 ad 6b cf ef 46 70 41 | 9a 5d 9d 72 62 c3 a0 af ac b6 f0 ed e6 2e a4 c8 | 97 d4 46 3b dc 90 f1 11 ff c1 1a f7 bc 4d b4 b1 | 29 00 00 24 d7 88 26 03 5a 89 cf 88 bf 43 40 13 | b0 8c b4 f5 85 1c 5d f5 ed 6d ea f7 d0 1d 42 5d | 64 c8 0e 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 5d 43 f9 e4 68 67 0d 96 3e 2a d1 | 87 17 c9 81 16 11 d8 11 00 00 00 1c 00 00 40 05 | 17 79 69 7c c9 bf 1a b4 97 b1 98 46 4c 85 68 c7 | a4 36 11 6c | libevent_free: release ptr-libevent@0x7fb364035750 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | #134 spent 0.181 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 c9 f7 0f 34 43 e8 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #134 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #134 | rejected packet: | 80 c9 f7 0f 34 43 e8 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #134: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0687 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a86b80 | handling event EVENT_RETRANSMIT for parent state #27 | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #27 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #27 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49619.179111; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.014863 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #27 | libevent_malloc: new ptr-libevent@0x7fb364035750 size 128 "road-eastnet-nonat-27" #27: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #27) | dd bb 9e aa 71 2c a8 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa f5 f3 8a 2e ca 64 13 4e ef 73 e4 1f 3e 67 ad | a1 5c bf b8 82 2d 98 4b ba 2f 4b 9c 4a 49 f6 7b | 11 53 66 d7 f2 df c6 4d 6c e8 fe ca eb 65 f7 23 | 79 97 e3 ea 55 ca fa 7d 0e 42 d8 5c 14 c7 91 72 | a4 fc cd 45 56 42 b0 30 e3 75 4e 16 78 7d 09 4f | c2 b4 68 6b 47 a2 0e 20 da b0 6a 41 7f ac 79 d0 | d4 2d 42 99 fd 0a 3a e2 6d 7f 90 e8 4d 1a 00 b2 | e9 9e 2f 5f 8c ef b1 f3 83 5d 30 13 95 c4 ca 84 | fc 5b f8 fd 99 e0 ef 1a ad a3 e3 11 fc de 8e cc | 62 ac 46 25 e8 4f ae 15 57 eb 6c c5 d8 d5 81 b9 | c0 5f a7 29 95 52 01 a8 27 41 88 9f 21 51 57 97 | 0e c0 5b 72 b9 1f 72 3e c5 18 84 95 8f 3a f7 5b | 8e ab cb da 5c d8 78 8b 6b d1 3d 62 f9 12 53 ba | 86 1f 8f 29 ce 9f 76 76 1e 5f 01 99 06 da 91 72 | f3 a9 41 c1 f1 95 87 95 cf 5a fe 09 57 13 44 9d | 62 a4 a9 60 fa 79 cc f9 5d bf f3 2b 5c 5b b4 99 | 29 00 00 24 55 62 09 8a 44 b4 a9 1d d9 35 9c 9a | 78 93 87 c8 d6 2b f2 b0 a8 b2 26 80 5e 03 70 47 | 73 8a 49 c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ef ee 96 1f 62 1c cd f0 a1 f5 67 ee | 76 d8 b6 28 a5 c0 9f 1d 00 00 00 1c 00 00 40 05 | 69 41 25 fb 01 9f 0c 01 9b e6 f4 5d 86 8e 8e d0 | 2b 2d f0 b6 | libevent_free: release ptr-libevent@0x7fb38801abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a86b80 | #27 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd bb 9e aa 71 2c a8 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #27 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #27 | rejected packet: | dd bb 9e aa 71 2c a8 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #27: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0698 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aef6c0 | handling event EVENT_RETRANSMIT for parent state #211 | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #211 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #211 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49619.184108; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00837 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a86b80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #211 | libevent_malloc: new ptr-libevent@0x7fb38801abe0 size 128 "road-eastnet-nonat-211" #211: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #211) | 53 9a 08 81 c1 f5 e1 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef 09 3e 48 73 4c 9b c2 57 71 c3 fe a1 82 75 e5 | f2 fc 00 52 66 b2 69 a1 98 d7 a1 43 e2 9d 75 cc | 9d b4 06 fc 88 d6 44 63 90 41 43 c2 45 55 dc 1a | 12 ee 32 35 ef 1c ea 74 ac df 20 43 5d 1c 90 c2 | e0 80 56 a4 79 bd f8 c0 a8 96 3b 25 fa 43 51 16 | 7e ae 16 08 0c ee 53 be c7 29 52 25 44 6d fa 34 | 69 9f 31 ba 70 30 84 e6 d5 99 f5 2e ee 13 fd e4 | 65 1c ef 89 6e 83 29 44 bd 4f 23 ac ed 0f c3 ea | db 20 3d 79 09 22 a5 94 a4 f8 6d ce bf 13 df 61 | d3 3f 02 e7 af bb ce de f0 b1 2a fb 97 3e 5d 05 | 56 5c 13 18 20 58 3e 43 ac b1 9e 74 31 3c 13 bc | 7c 7a 3a eb be df d5 2e e9 60 5f 5a 7e af 73 b1 | 92 1c d6 e2 be f1 a5 75 8e 08 54 b0 2b e1 2c 5a | 6f 54 93 f5 5b 16 d8 ba 78 77 2e f6 39 16 6f 65 | 5e 98 fb 40 29 ab 34 cf 31 b1 1c 43 74 9c 6b 56 | 46 0a 1c e2 58 fe 1e 51 fc 87 18 4b d7 84 46 cc | 29 00 00 24 ac f5 37 f2 09 3e be 57 f0 76 41 01 | 45 fc a2 49 1d 14 8a 0e 25 fc 49 cd 6b 6f 69 01 | e7 4f 36 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 6c d6 1b 30 f3 11 7c 9a 75 f0 de | fa 6c c9 cc a4 62 9e ac 00 00 00 1c 00 00 40 05 | 73 92 bd e7 98 2e a4 8f a5 8d 6a 24 e0 26 ee e5 | ed 8e de 68 | libevent_free: release ptr-libevent@0x7fb3400357c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aef6c0 | #211 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 9a 08 81 c1 f5 e1 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #211 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #211 | rejected packet: | 53 9a 08 81 c1 f5 e1 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #211: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0705 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-229" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-229' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #229 at 0x557d46b0ca00 | State DB: adding IKEv2 state #229 in UNDEFINED | pstats #229 ikev2.ike started | Message ID: init #229: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #229: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #229; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-229" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-229" IKE SA #229 "road-eastnet-nonat-229" "road-eastnet-nonat-229" #229: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-229 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-229": constructed local IKE proposals for road-eastnet-nonat-229 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 229 for state #229 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aef6c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #229 | libevent_malloc: new ptr-libevent@0x7fb3400357c0 size 128 | #229 spent 0.157 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-229" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.231 milliseconds in whack | crypto helper 6 resuming | crypto helper 6 starting work-order 229 for state #229 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 229 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 229 time elapsed 0.000979 seconds | (#229) spent 0.986 milliseconds in crypto helper computing work-order 229: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 229 for state #229 to event queue | scheduling resume sending helper answer for #229 | libevent_malloc: new ptr-libevent@0x7fb36c046040 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #229 | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 229 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #229 | **emit ISAKMP Message: | initiator cookie: | 20 97 6e 08 83 53 46 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-229 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 59 ef 6c f0 3c e5 e0 cc 33 49 bc 05 30 a4 2e 63 | ikev2 g^x 40 b9 24 1d 30 3f 19 68 ce 4b ca f6 ef 1a a6 a9 | ikev2 g^x 5d 39 1c 86 c0 9f ab 47 fc 91 e7 41 3f 1d 89 da | ikev2 g^x 32 34 23 b2 92 45 82 aa b6 a2 b3 81 08 5d d4 d6 | ikev2 g^x 1a c6 db 13 96 83 8f db 02 0b e9 7b b2 14 62 aa | ikev2 g^x e1 68 37 82 79 1d ad b1 57 7f 25 a7 73 b7 37 87 | ikev2 g^x 5f 18 8b b1 9d a8 83 da d0 1c d4 ab 43 2e 39 e8 | ikev2 g^x 66 1a a5 36 6d 58 db 88 48 18 f4 d1 6a aa ea a2 | ikev2 g^x d4 61 12 6e 9d 66 34 26 cc 34 20 9e ee d3 7c 0e | ikev2 g^x b5 c3 c0 49 b9 a1 7d aa 84 e0 16 0d 30 3d 39 8b | ikev2 g^x 45 8b ca 2d 9a b8 31 03 33 bc e7 3c 1d 38 7b ad | ikev2 g^x c5 f3 f6 f7 be e9 2c 8c 87 60 cc eb a3 f8 ab f2 | ikev2 g^x a1 ec 16 ca f8 6c 96 69 77 3b 56 28 d0 57 05 dd | ikev2 g^x fa 6d 9c 0b 58 57 29 b7 d8 9e 77 ff a1 d9 ae 60 | ikev2 g^x 7b 96 73 6a b9 b8 7b 60 c3 f5 35 8e 8a fc 09 4d | ikev2 g^x 37 4c b1 4a c0 bc c4 90 71 ce a8 9f 0b 83 84 f7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce bf ef 58 c8 50 05 c6 7d 73 f4 dc fa 25 60 4d 48 | IKEv2 nonce 2b 2d d1 e6 80 96 87 ef d5 27 62 2c 4a bf b7 27 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 20 97 6e 08 83 53 46 5a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e5 | natd_hash: port= 01 f4 | natd_hash: hash= 13 5b b6 cd 13 a1 fb 02 f0 d8 20 b7 ee bd 8b 90 | natd_hash: hash= 01 a4 d0 34 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 13 5b b6 cd 13 a1 fb 02 f0 d8 20 b7 ee bd 8b 90 | Notify data 01 a4 d0 34 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 20 97 6e 08 83 53 46 5a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f3 e5 ac c7 45 89 3a 77 ae 9e aa 53 4d 4c 6f 3c | natd_hash: hash= 03 52 b3 50 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f3 e5 ac c7 45 89 3a 77 ae 9e aa 53 4d 4c 6f 3c | Notify data 03 52 b3 50 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #229 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #229: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #229 to 4294967295 after switching state | Message ID: IKE #229 skipping update_recv as MD is fake | Message ID: sent #229 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-229" #229: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.229:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #229) | 20 97 6e 08 83 53 46 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 59 ef 6c f0 3c e5 e0 cc 33 49 bc 05 30 a4 2e 63 | 40 b9 24 1d 30 3f 19 68 ce 4b ca f6 ef 1a a6 a9 | 5d 39 1c 86 c0 9f ab 47 fc 91 e7 41 3f 1d 89 da | 32 34 23 b2 92 45 82 aa b6 a2 b3 81 08 5d d4 d6 | 1a c6 db 13 96 83 8f db 02 0b e9 7b b2 14 62 aa | e1 68 37 82 79 1d ad b1 57 7f 25 a7 73 b7 37 87 | 5f 18 8b b1 9d a8 83 da d0 1c d4 ab 43 2e 39 e8 | 66 1a a5 36 6d 58 db 88 48 18 f4 d1 6a aa ea a2 | d4 61 12 6e 9d 66 34 26 cc 34 20 9e ee d3 7c 0e | b5 c3 c0 49 b9 a1 7d aa 84 e0 16 0d 30 3d 39 8b | 45 8b ca 2d 9a b8 31 03 33 bc e7 3c 1d 38 7b ad | c5 f3 f6 f7 be e9 2c 8c 87 60 cc eb a3 f8 ab f2 | a1 ec 16 ca f8 6c 96 69 77 3b 56 28 d0 57 05 dd | fa 6d 9c 0b 58 57 29 b7 d8 9e 77 ff a1 d9 ae 60 | 7b 96 73 6a b9 b8 7b 60 c3 f5 35 8e 8a fc 09 4d | 37 4c b1 4a c0 bc c4 90 71 ce a8 9f 0b 83 84 f7 | 29 00 00 24 bf ef 58 c8 50 05 c6 7d 73 f4 dc fa | 25 60 4d 48 2b 2d d1 e6 80 96 87 ef d5 27 62 2c | 4a bf b7 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 5b b6 cd 13 a1 fb 02 f0 d8 20 b7 | ee bd 8b 90 01 a4 d0 34 00 00 00 1c 00 00 40 05 | f3 e5 ac c7 45 89 3a 77 ae 9e aa 53 4d 4c 6f 3c | 03 52 b3 50 | state #229 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3400357c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aef6c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aef6c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #229 | libevent_malloc: new ptr-libevent@0x7fb3400357c0 size 128 | #229 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49619.190904 | resume sending helper answer for #229 suppresed complete_v2_state_transition() and stole MD | #229 spent 0.474 milliseconds in resume sending helper answer | stop processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c046040 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 97 6e 08 83 53 46 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #229 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #229 | rejected packet: | 20 97 6e 08 83 53 46 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #229: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #135 | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #135 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #135 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49619.212111; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004554 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ffbf0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #135 | libevent_malloc: new ptr-libevent@0x7fb36c046040 size 128 "road-eastnet-nonat-135" #135: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #135) | 6f cc 42 0b fb 9b 4b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 27 90 6c a9 76 2a c4 50 c5 bf 04 2d 39 82 d0 | f1 4e e9 ff 6c d4 67 d5 6a f7 c3 33 36 2d 41 eb | 01 b8 52 cf 33 75 55 83 36 e9 3b 1e e0 f5 4c 33 | f6 13 14 fe 0b 40 f0 7a 1d e6 e9 63 2c 7f 9b 3f | 43 d7 8b 49 de 08 d9 f7 cb b8 85 8d 24 76 ea 07 | 74 e0 eb 3b 7b 61 bd 6e d0 81 bc 30 2d b1 a8 bc | 95 7a c1 8e 91 81 20 78 4b 9d 5f 4b 55 88 98 a7 | 4c 89 7d 2e c5 f4 b0 76 31 ac d8 73 5d 09 ed 2d | bb 07 67 90 bf 59 f1 9b 89 79 b4 48 ab 68 0b 4b | a7 49 da 7c 24 b3 1c f9 17 8c 28 77 5a 6e 44 15 | 7d 9f 86 31 20 2d 95 04 ee 8e 03 70 03 dc 14 11 | e5 4b 44 1d be 0a 83 04 0b 7e 48 68 b0 0f 04 64 | 81 84 d0 41 fd 8b 49 2c f9 af ea 95 2c f3 49 aa | 7c 3c d3 83 ef 0f 20 1f 8b 15 3b 94 9d 57 0f 83 | e9 c9 85 72 a3 81 40 26 3d 9e 4f 4c 25 2e 6f de | 2e 5c c2 5b 74 8c 58 60 bd 5e 06 db 51 f6 b7 a3 | 29 00 00 24 4f 27 a7 6e b5 c8 d8 49 72 0f 78 be | 0c 3a 88 f4 37 97 d5 4f 51 27 f0 3f 45 0a b8 19 | ba c2 3b 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 5e 90 14 7c 0c 3f fe 72 ae db a0 | 43 97 c2 6c fa c9 b7 b1 00 00 00 1c 00 00 40 05 | 6c 85 24 93 7d cc 8d 2c 5e c0 f8 bf 19 38 1d 99 | 5f b9 fd e3 | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | #135 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f cc 42 0b fb 9b 4b 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #135 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #135 | rejected packet: | 6f cc 42 0b fb 9b 4b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #135: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46adb080 | handling event EVENT_RETRANSMIT for parent state #191 | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #191 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #191 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49619.229451; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002995 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #191 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 "road-eastnet-nonat-191" #191: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #191) | 85 8f 6a 80 de be 76 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 47 0f 49 e8 87 b7 e4 13 ff fb 5d 9a 22 17 d1 | a7 da b3 32 4a c2 68 c6 3d 29 6b b9 0a 47 72 fb | 44 ba cf 07 42 83 b0 15 52 d5 79 a1 0a cc fd 8c | 03 5d 92 9f bc f2 7f 7a 58 36 93 f8 ff cd 46 92 | 33 75 4c e4 12 5e a1 f8 b3 1e 61 09 80 4a a1 c5 | 5a c7 19 d2 44 74 1d 5d 1d 57 21 f5 83 fe 20 06 | 89 ca 32 09 05 22 51 7a bb d7 0f b2 89 a9 0b 74 | 7c f9 0e 07 47 37 47 69 61 d8 9b ef fb c6 bb 4f | 6f e9 47 2c 3e ce 0c c7 87 a3 c6 a6 6c 56 d1 3e | ff a6 a9 4b d0 b7 79 88 c1 3f b4 9e fc 37 5c 19 | 1d 93 d7 b8 ac 50 69 85 b1 c4 53 e5 5e cc 86 e1 | 99 0a 5b e0 3c 4f fe 9e c8 dd 39 c2 94 6f 36 d5 | 9a 4e 4e dd b3 93 c7 8c d1 85 48 7f 16 2c 4f fb | 42 93 63 f4 95 ff 92 cb fb d6 5a 99 77 ab b8 13 | 67 d4 bf 16 1e 20 38 f7 7c 3d 2c 7c ef 50 6c 66 | 06 df 76 dd 94 55 30 cb 6c f9 4c e3 a8 ba 0c 19 | 29 00 00 24 f0 4e f3 f0 90 16 59 02 63 21 11 a3 | 11 30 40 08 3c fe e4 63 ec 70 ae b0 94 4f 51 4b | 97 b6 49 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c cc b1 ee ce 47 be 7b b0 c4 63 84 | 75 d0 08 1a f9 42 67 0a 00 00 00 1c 00 00 40 05 | 29 7b 9f b8 2f b5 a8 ce c6 6c 30 7d a4 05 33 b3 | 99 4c ae 49 | libevent_free: release ptr-libevent@0x7fb378035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adb080 | #191 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 8f 6a 80 de be 76 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #191 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #191 | rejected packet: | 85 8f 6a 80 de be 76 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #191: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35000d120 | handling event EVENT_RETRANSMIT for parent state #28 | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #28 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #28 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49619.233779; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006903 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adb080 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #28 | libevent_malloc: new ptr-libevent@0x7fb378035930 size 128 "road-eastnet-nonat-28" #28: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #28) | 8a 4b 73 21 31 f2 6a 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 df aa e5 83 52 1a b7 2d d0 6a 7e dc d8 a5 d6 | 60 61 e0 83 0f 2b 6a 2b b8 0c 87 3f 14 f7 2a a4 | 98 70 c5 3a a2 0f 1f 46 6a b1 86 1e e5 5c 59 31 | 32 22 91 5d a2 6a 04 29 2b 10 13 47 0d 40 ca 72 | cd e0 cf f3 84 ed 4f bf 99 02 d6 fe 28 30 e6 6c | 0e 7e ca 11 f9 11 9f a6 4c d1 42 ed 4a 0f de 1b | d1 6c 18 cd c5 6b d0 23 4a e0 04 a7 c5 ef 74 ac | 27 c8 ec 0e 1f 0d 3c 8b a9 02 76 2a 67 8e fc de | 50 4d 80 13 28 3f 33 79 17 2e 6d b4 b5 19 8a 07 | 87 4a ec 6e c5 3c fb 34 d8 bf 04 77 90 53 b4 91 | 82 d0 d4 cb ca fc 05 22 43 e7 d4 8d 52 a6 ff 42 | 3e 8b bc 55 2d a6 ee 39 af 98 64 0e 18 a4 e9 08 | 5d d9 7e 8e 5f 00 df 4b 1b cc 49 d9 d0 64 64 c8 | 91 98 82 46 10 8e 0a 7c d6 f9 65 30 9e a6 47 1d | b8 47 35 3b c7 13 08 d5 39 45 15 b2 10 ce ee 48 | 7d d8 33 00 3c 55 6c 41 f3 1e 7b 0e 34 03 4f b7 | 29 00 00 24 ad 13 98 57 a2 9c 4e ec e1 0a 80 5c | a0 80 42 e1 ab 4f 47 32 a1 1d 36 58 8b 1c 71 8b | 25 4d b5 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 83 6c 60 48 f0 55 9f 8d d1 7e b1 | fd da e6 ac 8a a5 fd 2f 00 00 00 1c 00 00 40 05 | 4a 9c 1d b6 db 3c dd 9b 4a da 5d 6f ea e8 da 4e | 08 2e ae f5 | libevent_free: release ptr-libevent@0x7fb350012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35000d120 | #28 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 4b 73 21 31 f2 6a 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #28 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #28 | rejected packet: | 8a 4b 73 21 31 f2 6a 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #28: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae48c0 | handling event EVENT_RETRANSMIT for parent state #221 | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #221 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #221 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49619.242122; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002107 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35000d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #221 | libevent_malloc: new ptr-libevent@0x7fb350012840 size 128 "road-eastnet-nonat-221" #221: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #221) | 90 8f bf e7 cf b7 65 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 72 44 57 63 97 26 0b d0 33 1e c1 f5 c9 36 d4 | f7 1a 62 3c a3 39 42 e3 c4 ee 5b 04 7a e2 93 d5 | 0f 83 78 28 fb 94 39 4c 7a cc c9 c9 ad ce 5e 59 | 68 4d ba 18 1e 4a 63 94 c5 70 f6 5d b4 77 65 58 | 10 84 fe ef 60 83 64 5b f2 89 50 99 ac e1 51 8a | d7 74 3b 5d 70 17 cd 8b 95 39 65 4b aa 2f 20 67 | bc c1 06 22 2c 60 51 a7 d1 25 ba e3 e5 7c 2a 24 | 9f dc 2e 8b 87 d8 be dd e2 1f 7f 7d 88 f1 33 ff | db 8b ce 43 0a 9d db 20 79 1b 34 f9 9e 77 87 58 | 03 3d 5b 8a b0 e8 e3 38 e6 81 79 10 ab 3d b2 02 | af 63 97 ff 1b 89 ab 73 45 c7 84 d1 96 d1 2b 2c | 45 33 cc 2a 87 09 9b 3c 40 ce 87 0c 1b b1 51 a1 | 8d 74 42 7d fd e9 3f de a9 93 ef 77 e9 c1 c8 91 | 38 fa 26 85 5e 1b 88 91 35 9e 5f 73 34 d8 96 fe | 85 b3 52 f7 42 b5 7d 56 e8 9e bb f2 e5 07 db 70 | 5b 28 4b 5d 8e 85 f0 35 5c f8 45 ae 02 de 27 d9 | 29 00 00 24 cd 4c af b1 99 23 18 29 29 9d f9 32 | c6 a6 09 22 63 0a d9 08 58 b2 a1 77 c9 06 48 e1 | 9c 8b 9e bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 fb 28 ad 15 31 02 8e bd d8 0f 80 | 1c 8f fa a7 e9 1f 34 e3 00 00 00 1c 00 00 40 05 | c4 70 86 36 d0 0a de 28 47 ec ca 4b f0 c7 6b 67 | c3 4a 0b 4c | libevent_free: release ptr-libevent@0x7fb3480251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae48c0 | #221 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 8f bf e7 cf b7 65 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #221 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #221 | rejected packet: | 90 8f bf e7 cf b7 65 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #221: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a63210 | handling event EVENT_RETRANSMIT for parent state #225 | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #225 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #225 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49619.25313; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500678 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae48c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #225 | libevent_malloc: new ptr-libevent@0x7fb3480251c0 size 128 "road-eastnet-nonat-225" #225: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #225) | 1c 46 35 b1 a5 15 7d 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae fb 41 53 6b 81 0b c3 2d 10 6f c4 43 42 9b b5 | 58 ae de 87 ce bb b8 82 21 69 b3 17 de bc f9 c2 | a6 34 e7 7f 32 f0 7d a7 6c 08 3e 2b 62 ab 16 a0 | 49 34 97 75 bc a1 e7 57 c6 b6 15 50 f3 8a f1 c4 | e3 18 e0 09 c0 26 64 c1 d3 38 7d 95 30 90 58 4d | 99 27 bc 98 4e c8 b5 39 36 2c 46 50 c2 b8 f6 07 | a6 3c 00 2b 8d 8c 50 f6 a6 08 bd fd 79 68 91 be | 81 69 f3 24 98 59 43 c8 78 e1 dc 86 d2 16 6e a3 | 6a de dc a4 19 ff e6 d6 63 67 69 75 d8 ae 52 31 | c3 a7 ea ea 95 69 03 74 0f ef e1 6f 99 0c 56 d4 | 62 d0 1b 8d 8f 7c ad 94 ab 7c 03 43 80 8a 6e bb | 36 aa d3 44 03 e6 5c 20 d3 4b 45 e5 a2 5c 00 25 | 37 ab 32 ce e0 ae 35 8e 13 d7 03 37 11 57 20 f8 | ae 87 85 bc 10 d5 2c 64 54 e7 c4 49 10 99 df 04 | 79 9e f4 43 41 4b 6a 31 13 21 e7 cf d7 1a da 5b | 4b c0 6d 43 c6 e7 f0 86 e7 2a 75 03 ec 4c de 27 | 29 00 00 24 27 0f 48 fe da 9f b7 b6 f5 85 2e 21 | 09 ff e1 4d 05 12 3c c0 4b 2e ad df df d0 69 83 | 11 81 8e 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 11 33 1d 86 3c cb d4 6f 7e 68 c8 | 95 dd 6a 6a 4f 3e eb 1f 00 00 00 1c 00 00 40 05 | 41 16 5c d3 40 8f 72 70 a4 ea ff c4 c5 31 7c 04 | 7c 81 7f e0 | libevent_free: release ptr-libevent@0x7fb35c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a63210 | #225 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c 46 35 b1 a5 15 7d 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #225 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #225 | rejected packet: | 1c 46 35 b1 a5 15 7d 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #225: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-230" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-230' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #230 at 0x557d46b0dfc0 | State DB: adding IKEv2 state #230 in UNDEFINED | pstats #230 ikev2.ike started | Message ID: init #230: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #230: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #230; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-230" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-230" IKE SA #230 "road-eastnet-nonat-230" "road-eastnet-nonat-230" #230: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-230 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-230": constructed local IKE proposals for road-eastnet-nonat-230 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 230 for state #230 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a63210 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #230 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 | #230 spent 0.197 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-230" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.297 milliseconds in whack | crypto helper 11 resuming | crypto helper 11 starting work-order 230 for state #230 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 230 | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 230 time elapsed 0.00094 seconds | (#230) spent 0.949 milliseconds in crypto helper computing work-order 230: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 230 for state #230 to event queue | scheduling resume sending helper answer for #230 | libevent_malloc: new ptr-libevent@0x7fb360046040 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #230 | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 230 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #230 | **emit ISAKMP Message: | initiator cookie: | 69 22 82 19 d7 c8 c9 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-230 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 79 71 02 af b0 7d 99 80 ca 0a ed d4 9f 12 56 05 | ikev2 g^x 6a 75 f1 ff 5b 89 24 b2 2d d4 89 b9 fc ea 10 f2 | ikev2 g^x df 8b 07 6c 92 3c 32 d6 01 3c 1f 7c 77 2b 56 de | ikev2 g^x 1e a1 3c 62 24 a6 4e 3c 9e 57 23 35 a7 0e 3a c6 | ikev2 g^x fa 5e 05 ee c7 8d 32 41 ce 29 80 63 51 1d 1e 52 | ikev2 g^x 10 94 62 f2 6f 5b c8 e5 23 77 b3 5f 63 5e f3 42 | ikev2 g^x a7 b1 47 2a 85 90 69 04 a8 c1 76 53 9f c5 2d 06 | ikev2 g^x 66 93 5b f5 d4 f1 c7 6c 23 0b 21 57 da 55 b4 10 | ikev2 g^x b4 68 7f 72 aa 6f fd bf fc 43 d5 6e 02 91 b0 ea | ikev2 g^x ca b7 fc 32 ec e5 bd 79 74 66 56 52 a1 e5 b7 e9 | ikev2 g^x d9 32 42 bc f6 01 cc 69 66 87 01 cd 32 29 bd 73 | ikev2 g^x ff aa f2 68 30 ae 30 af 09 b3 2b 2d 0b 90 c5 d7 | ikev2 g^x e7 b1 60 17 46 74 a0 50 98 f9 06 d2 06 37 1f b3 | ikev2 g^x 0c 89 d8 99 c7 ac a0 2a 5a 19 c6 cc 6e e1 77 ee | ikev2 g^x 98 e6 45 5b c8 98 8d c9 0d d9 64 39 5b ba a1 36 | ikev2 g^x 39 81 f2 e5 39 16 cf c0 fa 26 3f 76 ff 4a de 8f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ca 6b 45 b5 ad 3a dc fb 46 3f ff f9 b7 9e 2a f6 | IKEv2 nonce cb 7b a0 93 c0 ff b4 97 10 4e 36 19 c5 61 7a bb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 69 22 82 19 d7 c8 c9 6a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e6 | natd_hash: port= 01 f4 | natd_hash: hash= 0f fa a5 ce 96 35 1e 80 97 f9 81 69 6c 9b 29 c3 | natd_hash: hash= b6 c2 c3 05 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0f fa a5 ce 96 35 1e 80 97 f9 81 69 6c 9b 29 c3 | Notify data b6 c2 c3 05 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 69 22 82 19 d7 c8 c9 6a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7e 27 b2 4c db 32 1f 5b c7 5c 32 4b 9f eb 6e df | natd_hash: hash= 20 af 51 69 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7e 27 b2 4c db 32 1f 5b c7 5c 32 4b 9f eb 6e df | Notify data 20 af 51 69 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #230 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #230: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #230 to 4294967295 after switching state | Message ID: IKE #230 skipping update_recv as MD is fake | Message ID: sent #230 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-230" #230: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.230:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #230) | 69 22 82 19 d7 c8 c9 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 71 02 af b0 7d 99 80 ca 0a ed d4 9f 12 56 05 | 6a 75 f1 ff 5b 89 24 b2 2d d4 89 b9 fc ea 10 f2 | df 8b 07 6c 92 3c 32 d6 01 3c 1f 7c 77 2b 56 de | 1e a1 3c 62 24 a6 4e 3c 9e 57 23 35 a7 0e 3a c6 | fa 5e 05 ee c7 8d 32 41 ce 29 80 63 51 1d 1e 52 | 10 94 62 f2 6f 5b c8 e5 23 77 b3 5f 63 5e f3 42 | a7 b1 47 2a 85 90 69 04 a8 c1 76 53 9f c5 2d 06 | 66 93 5b f5 d4 f1 c7 6c 23 0b 21 57 da 55 b4 10 | b4 68 7f 72 aa 6f fd bf fc 43 d5 6e 02 91 b0 ea | ca b7 fc 32 ec e5 bd 79 74 66 56 52 a1 e5 b7 e9 | d9 32 42 bc f6 01 cc 69 66 87 01 cd 32 29 bd 73 | ff aa f2 68 30 ae 30 af 09 b3 2b 2d 0b 90 c5 d7 | e7 b1 60 17 46 74 a0 50 98 f9 06 d2 06 37 1f b3 | 0c 89 d8 99 c7 ac a0 2a 5a 19 c6 cc 6e e1 77 ee | 98 e6 45 5b c8 98 8d c9 0d d9 64 39 5b ba a1 36 | 39 81 f2 e5 39 16 cf c0 fa 26 3f 76 ff 4a de 8f | 29 00 00 24 ca 6b 45 b5 ad 3a dc fb 46 3f ff f9 | b7 9e 2a f6 cb 7b a0 93 c0 ff b4 97 10 4e 36 19 | c5 61 7a bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f fa a5 ce 96 35 1e 80 97 f9 81 69 | 6c 9b 29 c3 b6 c2 c3 05 00 00 00 1c 00 00 40 05 | 7e 27 b2 4c db 32 1f 5b c7 5c 32 4b 9f eb 6e df | 20 af 51 69 | state #230 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c0251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a63210 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a63210 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #230 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 | #230 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49619.269265 | resume sending helper answer for #230 suppresed complete_v2_state_transition() and stole MD | #230 spent 0.501 milliseconds in resume sending helper answer | stop processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb360046040 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 22 82 19 d7 c8 c9 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #230 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #230 | rejected packet: | 69 22 82 19 d7 c8 c9 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #230: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0669 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #136 | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #136 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #136 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49619.278478; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005672 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b06800 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #136 | libevent_malloc: new ptr-libevent@0x7fb360046040 size 128 "road-eastnet-nonat-136" #136: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #136) | d6 c8 9e 97 21 46 fb d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 a9 84 13 62 aa bd 1d ad 3e 60 88 dc a9 35 5e | 57 2f a4 3a d3 ae c1 11 b0 24 19 68 c2 75 c1 4f | 59 cf f8 40 bb af 7e d1 b9 71 42 ce c6 09 6e 74 | 9e f2 29 0d 91 21 24 74 6d 2f 10 75 65 f8 b8 44 | e9 15 55 bb 2b 6f 25 4c 58 9b 0b 45 c2 40 5a 9f | ff e2 b3 e2 f7 0d c5 79 1b 00 36 3a 21 20 e7 06 | d4 05 ab e6 7f 0e 4f 26 f4 28 cb d2 12 3f 60 75 | e8 8c 1f 18 e0 09 73 82 2e 56 2f fe 00 1a 31 26 | 0b 05 07 a6 fc 87 93 26 a9 c2 69 7c 30 9c 7a 89 | e9 2a 6b aa c2 98 8a d1 cc 85 ab 8a 1d b6 6c 3a | 46 51 76 9a 2b ea bd 4c 92 d8 c8 5c 56 7a b8 5f | 71 f6 c7 f5 f4 4e c8 ce cc 9b 6f 50 15 3b 30 b5 | cc 32 0c 15 e6 9e 78 33 f4 30 d7 c5 bc a6 29 97 | 00 2f a4 12 c0 82 9e 84 f0 b8 38 05 f1 51 00 d1 | 48 64 6a f9 cc d7 36 54 45 d6 ee 3e 02 d0 d5 50 | ec e5 a0 1a 70 ee 96 eb 78 4d 45 6b e4 50 2d ed | 29 00 00 24 24 22 aa ae c7 66 c9 3a 20 66 58 4a | 54 df 58 65 c1 5d d7 a3 b2 c7 e8 e8 de 15 89 70 | 84 48 bb d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 7f 22 d9 ee cc a0 1b 0a 4c ff 84 | da dc a7 a5 32 ec b3 c6 00 00 00 1c 00 00 40 05 | e4 4f b8 48 f2 80 69 e7 b9 85 06 aa 82 75 ce d9 | b4 81 0b 76 | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #136 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 c8 9e 97 21 46 fb d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #136 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #136 | rejected packet: | d6 c8 9e 97 21 46 fb d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #136: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a69e50 | handling event EVENT_RETRANSMIT for parent state #212 | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #212 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #212 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49619.294853; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002308 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #212 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 "road-eastnet-nonat-212" #212: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #212) | 94 ac 86 b7 f8 83 d4 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 79 5c 0c 28 90 8c ef 02 3c d8 f8 1a 0b d6 b1 | 04 69 40 2f 72 b0 4d 73 12 19 ce 98 f8 6f 0b 9f | b9 13 67 6a 06 b8 41 b4 12 d3 3b 5e 00 45 d7 98 | a9 e1 2d 0a c7 48 98 e8 4f 26 89 26 1d eb 0f 63 | d1 cd 01 b0 ac c0 e6 9c c4 d5 af f4 d2 0a f8 fc | 50 8b 97 23 e0 8c a0 c2 04 25 1e a8 35 a0 f0 95 | 6e 38 07 0c ab 5c e3 d8 94 8f 44 fe f3 fe 9f 14 | 8e b7 78 55 0b 6e 31 2e c3 a7 48 da be 5b b7 47 | 21 9c c6 d3 74 d7 58 d3 13 78 3e ed 28 44 9b 87 | a8 e3 a1 e6 89 b5 03 ef 3b fe d5 17 e8 f9 73 04 | 1c 9e 5a c3 69 56 f2 c1 24 33 17 fd 7d 0d ed e7 | 7d 2c 20 7c 0b 8e 94 c1 2e c1 1b fa 0b 32 e2 6f | 8a b2 5d b4 79 8d 9a 89 ea a8 6f 97 71 92 fa f9 | bc 34 75 15 ab ea 61 f5 3d 74 25 af 37 7b 97 2f | 19 3e 0a b6 c1 50 67 1c b8 51 37 9b 9a b3 26 67 | c4 f2 b4 e7 06 7e 5d 5b 28 22 1e 8e 7e da b7 8b | 29 00 00 24 5c 64 5d 43 88 c1 08 90 f5 2a 0e 23 | 99 a9 ce 32 1e 4e 34 e5 9c b5 04 95 ad 56 32 fb | 31 cf fd 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 0d b1 e5 c0 7d 3f 73 e9 5f 1b 2c | de e5 07 26 54 11 d9 1b 00 00 00 1c 00 00 40 05 | 08 da df 20 35 aa 7d dd ef ff 4a 4d 21 f5 f2 fb | f9 b4 9f 22 | libevent_free: release ptr-libevent@0x7fb378012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a69e50 | #212 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 ac 86 b7 f8 83 d4 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #212 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #212 | rejected packet: | 94 ac 86 b7 f8 83 d4 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #212: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0674 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46adc640 | handling event EVENT_RETRANSMIT for parent state #192 | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #192 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #192 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49619.301023; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004428 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a69e50 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #192 | libevent_malloc: new ptr-libevent@0x7fb378012840 size 128 "road-eastnet-nonat-192" #192: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #192) | c8 ff f4 e6 c7 17 a0 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 d3 4a 60 f3 6b 7c bf bf ce 75 aa 6b ec f0 aa | 6f fd 60 63 46 fe 0f ab c7 68 02 df c4 c6 ca 90 | 76 3b 3d fe 56 bf ba a8 ba d0 ca f7 0b 74 9f c5 | d1 05 87 00 01 63 f1 b2 af 9b 1a 75 92 cd 23 75 | 4b c9 10 79 b9 97 80 8d 36 ac 73 a4 c7 b8 fd cc | b1 38 24 08 46 20 a1 f7 27 44 94 85 0d d1 c0 73 | 03 9e 85 e9 52 56 70 2c 82 87 11 d5 67 bd 17 0b | b7 79 e5 dd 43 5b 11 13 e5 80 26 ae 8c 3b 5c 3e | 39 de 54 5e 94 90 b6 94 bf 91 dc dc 3a b0 dc 33 | c2 af e8 1e 41 35 52 7c 14 9d d3 2a 93 8c 0c 2f | 4c dd 47 e3 33 95 7f 32 01 a2 12 1d 55 d6 96 ba | 80 04 ad 84 ae 69 4d 77 46 16 b8 c1 14 67 ff 90 | 15 d3 6f 27 f5 ca 1c 28 65 98 cb 29 af 5a 3d 4d | 38 de 5a e8 93 6e 36 0e 60 ea e1 05 60 eb 23 cb | 78 44 37 ea 66 63 22 ea 85 48 d4 a0 76 12 75 a9 | 2c 64 ca f2 05 fb 36 e8 35 db d2 9f 91 a5 c4 20 | 29 00 00 24 a1 c2 f0 6b 73 a0 8d a3 3d b9 fc 65 | 4f d9 ed 3c 9f 8f 87 98 60 fa 1e 4a fb c7 f1 6c | 8c d3 14 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 12 d3 2e 8d 56 f4 3c 1b 6c 80 b7 | a9 e2 20 50 4b 37 dd 45 00 00 00 1c 00 00 40 05 | c6 22 26 cb ae fa 29 03 74 5f 21 c6 81 1a 29 8b | 43 e3 ee ee | libevent_free: release ptr-libevent@0x7fb3580407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adc640 | #192 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 ff f4 e6 c7 17 a0 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #192 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #192 | rejected packet: | c8 ff f4 e6 c7 17 a0 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #192: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #29 | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #29 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #29 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49619.302364; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009228 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adc640 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #29 | libevent_malloc: new ptr-libevent@0x7fb3580407f0 size 128 "road-eastnet-nonat-29" #29: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #29) | 76 94 35 7f f9 86 66 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 c8 26 94 c9 ea 16 54 c7 a0 a7 ee 80 e9 d2 eb | c7 74 3d 70 a6 ce 1b 7f 47 b8 a9 22 6c e9 de 3e | 5e 1a da 80 d6 29 b5 60 85 8e c7 9a 07 14 0f 2e | 5e 85 13 8e 17 81 27 ae b9 44 36 2c 21 79 b7 4c | 9f fe 6e 8f 50 03 81 71 96 dc 7d 13 e0 2d e5 55 | 9d 35 cf 6e 26 2f 6c 88 8f fc 20 a1 7f b4 44 e0 | 98 88 95 7e ed 39 2c 67 fe ec 38 89 03 76 30 8b | 31 e8 7f 06 73 93 d0 0a 0d a2 5e e7 17 d8 ae 0f | 27 a8 77 dc e5 16 a6 b2 26 c7 b0 e5 80 71 68 10 | 38 5e 32 59 c0 68 b7 75 a8 13 99 bb ca 95 f9 78 | 1f 9b 7b 46 65 6b 90 b3 9b cd ca 91 c9 75 7e 4d | 2e 06 ee 10 f0 8c c2 89 1e c3 a8 05 28 9a e8 eb | 20 63 32 0f f1 3f 82 9c 83 27 56 48 7d 7c a9 e7 | f5 1b db 86 e5 b7 2b 70 8a da ea 00 2d 06 e8 11 | 3c 90 f7 22 75 39 1f c5 87 f2 55 24 18 21 90 81 | 04 ec 8f 65 74 d4 59 92 bb 69 88 b7 6d 42 21 28 | 29 00 00 24 36 a8 1f b0 73 93 1f c8 b8 98 90 7a | af 61 a7 3e 69 e8 46 34 d6 9e 89 22 1f 07 54 41 | cf b8 14 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 3a eb 7a 38 98 4c b3 ed b5 e4 e8 | 5b 3d 4d 17 15 a4 85 ff 00 00 00 1c 00 00 40 05 | c1 f9 34 11 26 e0 6f d6 1d 57 cb be 7c d0 71 cf | 3a bd fc a1 | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #29 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 94 35 7f f9 86 66 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #29 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #29 | rejected packet: | 76 94 35 7f f9 86 66 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #29: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46af6380 | handling event EVENT_RETRANSMIT for parent state #222 | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #222 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #222 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49619.344683; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003051 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #222 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-222" #222: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #222) | eb 26 f4 19 1a 54 68 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 a4 6e 20 fd 50 2f 35 57 aa de 4a f5 e5 f9 4f | ca f6 bf 35 d5 20 df 61 18 72 c7 7b 3b d6 89 fe | 57 a2 45 9e 67 3f 8a f7 1b bb 33 5b 2f 19 93 13 | 4d bc bb d5 5a 76 0b 8c 08 e4 e4 47 2d c3 07 c6 | df c3 86 a0 6b 90 b3 31 74 8b 42 bf c4 10 0e bf | 13 cf 0b 76 db 86 6a 9f 8c f0 b4 0e c7 08 95 7e | ce 41 5e 4a 31 5c bb fb 47 19 b3 63 fb 4f ca f3 | 07 c7 1d d9 7a 1b f2 0d 5e dd f5 ac 4b 35 32 4a | fb 08 38 da 83 ea de 30 e1 52 16 cd fe ea bf b3 | 88 b6 b0 c4 6f 9e 4d bb 67 f6 e4 a0 eb 71 82 6a | ad 65 be 80 db 5a 69 3b 90 3a 58 e9 30 d6 fe 7a | f6 9b 28 5c 13 9f 6a 77 4f c9 8b bc 07 b5 a1 d9 | 2b de 81 5d 47 e4 3c c1 b1 a8 f5 bc 8d 40 df 63 | b5 80 17 f2 8c 1f b1 78 d7 35 f2 4c 44 06 cc 65 | 15 11 55 93 d9 f0 56 8f ad b9 7e 2b 7d cb da 6d | 9c ab 97 02 8c 9c fc 9d 3d c3 47 69 0f ac 56 88 | 29 00 00 24 77 e8 83 df 75 f1 9b ea 8f aa ae 8f | cc 39 a6 6f 03 de be 68 b3 66 64 be 5d 42 33 fc | 61 2a ce bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 87 6a 56 c8 8d 7a 5a c9 70 42 a3 | 93 38 10 ea 25 8a 09 bf 00 00 00 1c 00 00 40 05 | d9 43 32 2c d8 2a fd ec 96 bd 92 a4 54 e0 a9 82 | 8b 73 b6 b2 | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af6380 | #222 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 26 f4 19 1a 54 68 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #222 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #222 | rejected packet: | eb 26 f4 19 1a 54 68 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #222: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #137 | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #137 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #137 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49619.347219; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005738 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af6380 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #137 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 "road-eastnet-nonat-137" #137: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #137) | 71 ba fb 1f 95 88 29 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 75 6d 4d 0f bb db 8d 24 d0 ba 5f 79 5b 88 be | 94 ae ea 89 7e 95 49 22 fa 6f 0d 51 90 a6 60 1f | 08 fe 3b 9a b1 a8 b5 c8 e8 a5 d1 c2 b6 3a f6 5c | 07 25 e1 53 6d cd f9 d3 3f 17 7a b9 97 ee 73 6b | da 87 59 77 74 9c 5c 05 a7 16 5c 85 33 f2 d8 f0 | a7 84 4c 20 01 fc 53 bf 21 28 ba 99 79 44 ea b7 | b7 e2 9a c6 4e 09 9d 5a 41 46 ff 69 36 bd 47 3d | 68 59 0e 87 0c b2 db 9d ef 27 b1 ef a7 c3 7d 74 | d1 bf 63 41 fd 34 70 c8 08 69 9e 0d 21 dd b6 ca | 61 47 c8 f6 20 99 94 42 4a b6 3c e4 c1 6f 59 47 | 32 7f e7 88 96 d9 c5 8f 82 9f aa 9b 0b 9e 03 53 | 65 a9 c8 5c d7 fe be da 56 44 27 26 98 d6 9a ae | 35 b2 bc fb a7 4d 1f ae ae 76 fb c2 8c 86 63 40 | 59 88 a0 8b a9 0e 3a 8f 10 76 ad e8 54 d2 9e 91 | 7a bc 03 79 61 0b 83 53 4c 4e 2d 22 ca 69 54 24 | ae 77 e1 5c 6b 3a ff ee 1f 59 52 e0 9c 51 48 2c | 29 00 00 24 f7 ec 22 b0 d2 45 cb de 11 9d 88 dc | d9 c8 87 82 94 72 01 b4 91 d8 41 1f 07 fb 13 21 | 60 9f a8 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ee b9 3b 05 6b fc 34 5a 00 ef 69 | 58 dc d5 6e 13 53 c2 0c 00 00 00 1c 00 00 40 05 | 42 f2 83 df 2f 64 fb 42 98 b0 17 b3 99 82 89 4f | 79 b2 42 ca | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #137 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 ba fb 1f 95 88 29 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #137 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #137 | rejected packet: | 71 ba fb 1f 95 88 29 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #137: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a54250 | handling event EVENT_RETRANSMIT for parent state #226 | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #226 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #226 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49619.373584; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500903 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #226 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 "road-eastnet-nonat-226" #226: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #226) | df 8a 99 41 35 8f 22 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 39 0d ed 10 1f e3 0e ea ca 85 c3 5a 17 31 22 | 97 9f 06 33 b0 59 ed 25 d5 cd 46 5c e1 b7 68 7b | 60 f5 73 ac 22 e6 10 7a c8 3f 64 54 b7 2c c9 ba | 36 26 b8 60 a9 a1 e6 a3 6e 44 7f 00 0c 75 49 7e | c6 17 73 3d c6 70 48 38 43 a2 56 d7 f5 0c 3f 3f | 3f 97 93 c5 a1 2b c4 07 4f 49 5c fa 0d e2 93 83 | 1d 93 5e ee cb e1 2d 5d 17 f0 04 37 84 12 a1 e4 | ea a7 ca c8 ca 5c 70 fb 0f d5 b4 aa ca 0a eb f9 | b6 b5 03 c1 29 21 80 90 c2 2f 2a fe 6c ab e2 c4 | da df fe dd 41 56 bd 81 ee 73 c7 0a e6 2a 84 64 | 7e c8 7b 2b 7f 3e cd 94 23 75 81 89 67 c2 03 bf | 33 3e d9 d2 a5 ec 73 d5 af 8a 02 94 e8 dd 1e 6c | 57 45 a8 23 17 bc 83 80 e2 7d fe e3 0d bf 65 a8 | 6f 93 8d 7c 46 a5 58 a7 45 54 b1 bb ae e2 cb 5a | 09 4c cd b3 40 87 10 07 3f c6 8e 21 cf 42 d3 a0 | 05 bf ba f5 eb 01 2d 75 a7 76 4b e5 7b 42 b7 8d | 29 00 00 24 c0 94 06 00 9d 87 40 a0 ec d8 4c ee | 0c 16 0e a6 24 3d 43 67 f1 e5 1b a0 19 81 a3 5d | 35 48 05 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd dc 27 ce 4f 2a 14 a6 0d 4a 3f dc | 07 9c 36 b1 1b e9 59 bb 00 00 00 1c 00 00 40 05 | e3 eb a3 4f 44 c3 b7 5b e6 19 f6 7f 9a 7d 29 4c | 6a 02 ce 75 | libevent_free: release ptr-libevent@0x7fb388022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a54250 | #226 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 8a 99 41 35 8f 22 b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #226 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #226 | rejected packet: | df 8a 99 41 35 8f 22 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #226: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-231" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-231' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #231 at 0x557d46b0f580 | State DB: adding IKEv2 state #231 in UNDEFINED | pstats #231 ikev2.ike started | Message ID: init #231: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #231: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #231; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-231" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-231" IKE SA #231 "road-eastnet-nonat-231" "road-eastnet-nonat-231" #231: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-231 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-231": constructed local IKE proposals for road-eastnet-nonat-231 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 231 for state #231 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a54250 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #231 | libevent_malloc: new ptr-libevent@0x7fb388022480 size 128 | #231 spent 0.157 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-231" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.239 milliseconds in whack | crypto helper 16 resuming | crypto helper 16 starting work-order 231 for state #231 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 231 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 231 time elapsed 0.000984 seconds | (#231) spent 0.992 milliseconds in crypto helper computing work-order 231: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 231 for state #231 to event queue | scheduling resume sending helper answer for #231 | libevent_malloc: new ptr-libevent@0x7fb364045e60 size 128 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #231 | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 231 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #231 | **emit ISAKMP Message: | initiator cookie: | ec d8 99 0e 50 36 87 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-231 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ea c5 d9 ea 48 9d 9d db e4 72 21 b2 eb fe e0 0a | ikev2 g^x 9b e5 ce 23 20 eb ad 65 b0 89 ca 3d 24 ef 66 7d | ikev2 g^x d9 a3 7a c2 3d 05 aa 43 9f 45 1a 14 d9 e7 ad 4c | ikev2 g^x 1c 30 1e e4 db 2e f5 09 08 f0 6c 1f 45 18 25 f3 | ikev2 g^x 98 35 42 0b 1b fc c0 95 3b d0 88 ca bf 43 11 51 | ikev2 g^x ba ac ee 62 bc ef 20 2d 09 0b 30 2b b3 a9 30 69 | ikev2 g^x 22 9f f7 e5 19 cc d8 4a 41 18 b5 2a 03 31 91 4d | ikev2 g^x d9 f3 33 5c b6 61 8b 80 4c 0b 65 d5 6f 4b 62 d8 | ikev2 g^x e0 38 d3 a6 32 83 92 b3 ca df 09 07 0d f6 33 d7 | ikev2 g^x b9 f9 01 8c 3b d1 ff 19 bf 3d d5 72 dd d6 67 1d | ikev2 g^x 24 a4 3b 88 00 71 46 68 47 66 c6 d8 6d 38 1a ca | ikev2 g^x 01 20 d4 7a e4 46 1b 52 ab ad 61 81 76 76 13 bf | ikev2 g^x 76 df 80 04 67 b5 86 86 0e 85 a0 4b 41 5b e3 0b | ikev2 g^x 3c 1a 51 b5 b4 55 ce 12 56 93 02 32 82 c4 86 69 | ikev2 g^x a7 eb 80 c4 8e 9a 08 dd 86 61 45 1e 8a 33 7c 03 | ikev2 g^x 7e 20 42 a9 8c 8c 89 72 43 a6 59 29 92 30 fd 49 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b3 7b 27 54 be 06 93 cc 3c 78 ad 44 9e 7e c7 5b | IKEv2 nonce aa 5c 64 c5 5c 99 5a 37 63 dc 53 a7 33 95 f4 b1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ec d8 99 0e 50 36 87 41 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e7 | natd_hash: port= 01 f4 | natd_hash: hash= 05 2a 24 2a a3 f9 b8 d4 c1 28 f7 1a f6 32 c3 8a | natd_hash: hash= 97 33 de f4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 05 2a 24 2a a3 f9 b8 d4 c1 28 f7 1a f6 32 c3 8a | Notify data 97 33 de f4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ec d8 99 0e 50 36 87 41 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e6 68 a7 21 48 f4 d3 88 6e c3 71 dc ea d3 53 aa | natd_hash: hash= 0b f4 bb 84 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e6 68 a7 21 48 f4 d3 88 6e c3 71 dc ea d3 53 aa | Notify data 0b f4 bb 84 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #231 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #231: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #231 to 4294967295 after switching state | Message ID: IKE #231 skipping update_recv as MD is fake | Message ID: sent #231 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-231" #231: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.231:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #231) | ec d8 99 0e 50 36 87 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea c5 d9 ea 48 9d 9d db e4 72 21 b2 eb fe e0 0a | 9b e5 ce 23 20 eb ad 65 b0 89 ca 3d 24 ef 66 7d | d9 a3 7a c2 3d 05 aa 43 9f 45 1a 14 d9 e7 ad 4c | 1c 30 1e e4 db 2e f5 09 08 f0 6c 1f 45 18 25 f3 | 98 35 42 0b 1b fc c0 95 3b d0 88 ca bf 43 11 51 | ba ac ee 62 bc ef 20 2d 09 0b 30 2b b3 a9 30 69 | 22 9f f7 e5 19 cc d8 4a 41 18 b5 2a 03 31 91 4d | d9 f3 33 5c b6 61 8b 80 4c 0b 65 d5 6f 4b 62 d8 | e0 38 d3 a6 32 83 92 b3 ca df 09 07 0d f6 33 d7 | b9 f9 01 8c 3b d1 ff 19 bf 3d d5 72 dd d6 67 1d | 24 a4 3b 88 00 71 46 68 47 66 c6 d8 6d 38 1a ca | 01 20 d4 7a e4 46 1b 52 ab ad 61 81 76 76 13 bf | 76 df 80 04 67 b5 86 86 0e 85 a0 4b 41 5b e3 0b | 3c 1a 51 b5 b4 55 ce 12 56 93 02 32 82 c4 86 69 | a7 eb 80 c4 8e 9a 08 dd 86 61 45 1e 8a 33 7c 03 | 7e 20 42 a9 8c 8c 89 72 43 a6 59 29 92 30 fd 49 | 29 00 00 24 b3 7b 27 54 be 06 93 cc 3c 78 ad 44 | 9e 7e c7 5b aa 5c 64 c5 5c 99 5a 37 63 dc 53 a7 | 33 95 f4 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 2a 24 2a a3 f9 b8 d4 c1 28 f7 1a | f6 32 c3 8a 97 33 de f4 00 00 00 1c 00 00 40 05 | e6 68 a7 21 48 f4 d3 88 6e c3 71 dc ea d3 53 aa | 0b f4 bb 84 | state #231 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388022480 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a54250 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a54250 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #231 | libevent_malloc: new ptr-libevent@0x7fb388022480 size 128 | #231 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49619.378543 | resume sending helper answer for #231 suppresed complete_v2_state_transition() and stole MD | #231 spent 0.471 milliseconds in resume sending helper answer | stop processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb364045e60 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec d8 99 0e 50 36 87 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #231 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #231 | rejected packet: | ec d8 99 0e 50 36 87 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #231: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa1f00 | handling event EVENT_RETRANSMIT for parent state #213 | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #213 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #213 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49619.393331; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.013127 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #213 | libevent_malloc: new ptr-libevent@0x7fb364045e60 size 128 "road-eastnet-nonat-213" #213: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #213) | 4a f6 d6 f4 f7 c1 a9 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 87 92 0f fd 56 61 cf 88 27 07 68 fb 27 94 14 | ab 6f 99 e6 75 dc 26 2f 1e 93 7a c8 7f ed e5 7d | 6b b9 9d 92 4b e7 28 92 86 1e 95 f5 3a f0 df 50 | 69 19 a3 90 28 b6 f5 2d 21 d9 e8 a3 e1 5b a3 90 | 3f a9 b0 a1 2a 68 b5 63 77 3b aa 0b 6a 92 36 d6 | 32 61 b7 e6 8e cd 51 f2 78 e2 77 58 13 92 00 bb | 90 bd cb b3 98 f4 c1 b4 f9 bd 9c 07 84 cd 8b 44 | 56 64 bd 56 88 30 16 b1 de 15 4b 10 e0 33 82 0c | 53 be e7 f5 bb 24 10 e7 6d a3 b2 a5 08 f8 45 52 | 21 5c 7f a2 a6 ba 7c c6 84 2d 67 10 b4 86 8f 9c | f0 28 12 88 fb c8 52 6a e2 26 a6 a9 6d 8d 51 de | 96 9d d4 31 fb 52 b9 5a 75 dd 19 ef dd 61 8f 1b | 4b 84 99 e3 45 d4 ee 63 d4 75 8b e1 c7 c9 46 a5 | 75 72 66 74 64 ad ff 53 8e cd 6a 8d e1 aa 8b e0 | 68 cf 60 1e 6d 53 aa b5 21 a7 9f 74 3a 51 a3 ac | e3 62 94 51 c3 8c 9b b8 34 1f 9f 73 40 9a 49 cb | 29 00 00 24 b5 56 f5 24 67 7b ee bc b9 fe c7 48 | 4d 15 0a a4 8c 8b d0 3d 4d d5 8d 67 be 58 a4 6d | 51 fe 0b 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 44 29 1f 54 8d f8 98 7c 02 ef 5a | ae 02 c1 10 4c 75 c9 6b 00 00 00 1c 00 00 40 05 | bc 12 92 95 d4 1b f9 ad 5d 6a 71 41 82 c9 bd c2 | 29 69 a1 81 | libevent_free: release ptr-libevent@0x7fb3740356e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa1f00 | #213 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #193 | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #193 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #193 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49619.393524; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.009846 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa1f00 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #193 | libevent_malloc: new ptr-libevent@0x7fb3740356e0 size 128 "road-eastnet-nonat-193" #193: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #193) | 09 06 18 28 25 97 f6 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d fb a2 00 c4 81 91 0e b9 c0 41 7e a3 8e d5 a7 | 8f f9 71 10 26 95 10 e6 4e 8b 4b cc bc fc 28 8b | b7 f8 db 09 cb 68 57 d8 0f d5 cb 0f b4 d7 8f 3d | bd 12 fa dc 76 89 b1 cd af d1 36 87 37 88 94 35 | dc 1d 71 91 3b f3 e1 80 cc f2 f0 d3 3a 4d 9e 94 | 07 3c 65 6d 3e 40 ff 84 75 64 e8 1b b1 8c 09 6d | 19 40 40 a9 6d 88 cd b7 e8 19 c9 3d e5 92 7e 64 | de 57 bb db cd d4 22 17 89 b5 3e 22 3c e2 24 0b | 14 89 5a 96 bd 20 3b aa d7 bd af 6b d4 f2 98 3c | 51 d6 02 8a 1a 1e 91 da fa 7c 17 97 ea 62 5d 5c | 64 1a ef 72 b1 d0 d3 26 fb a0 cf 97 96 42 ef 85 | 1f 2a 66 aa 06 10 71 63 af 7d da 60 c1 c8 13 08 | 97 23 c5 07 eb 43 86 64 05 41 06 20 ee 9b 27 00 | 30 a6 42 a7 c6 f6 78 37 51 13 98 31 24 47 eb e1 | 16 0f ee 4e 11 f9 96 b6 72 84 dc 21 2b 6e e3 77 | 3a 73 af fe 81 a3 c6 e9 eb 76 cf a2 f6 45 8e f3 | 29 00 00 24 ca 9d 5e 32 ed 0b e6 19 dc 2f e8 6f | 8e a5 0f 9f 9c 08 6d f3 68 e8 0a 59 74 47 ad 67 | e3 bf 67 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c 89 f1 95 94 6f 28 52 1d 00 7f 87 | cf b9 fb 25 a2 94 8b 5c 00 00 00 1c 00 00 40 05 | cf 55 4f 40 25 07 37 da af 22 52 57 b9 8b da a2 | e2 e1 f8 6b | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #193 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a42790 | handling event EVENT_RETRANSMIT for parent state #30 | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #30 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #30 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49619.393659; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.01729 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #30 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 "road-eastnet-nonat-30" #30: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #30) | eb 37 b2 e3 45 e6 a7 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 14 f4 3b 23 14 59 57 11 85 13 a2 12 2b b5 a3 ff | 27 d1 a6 d6 83 ba ed 6e 70 90 a1 d6 22 c0 f4 dc | 88 16 36 cb d1 72 72 bc de f4 41 0b 1b 89 09 42 | b9 3c f8 7c e9 f8 b9 9e 79 49 a8 2b 7f 1d 06 99 | c2 4a dd e8 2d e9 b4 cd ab 59 b3 cd 90 a2 ae 3c | dc 2b a8 89 42 be 2f 72 3b d2 e2 27 b4 65 50 d4 | 35 50 bc 83 c6 85 ec 49 08 26 e7 a9 0e b6 5e a5 | 85 8b 68 21 3e 90 ff 7d 8a b3 a3 ab 4e 47 64 32 | 27 11 da 90 e5 4b bc e9 16 11 6a bf 15 7e 85 08 | 28 9b e3 ef 08 8b 63 b8 f5 43 71 2f 4c 67 78 41 | b8 23 b8 9c 92 66 99 57 0d 3e 91 c2 06 23 98 e8 | 6d 98 00 38 76 9f e2 83 8a e1 b7 3f 0f fe 0a 46 | d4 29 95 ea ed 7c f2 88 a6 07 6b 92 26 ac 08 4f | 2f b2 56 84 37 68 ea c9 79 62 e3 b0 e5 14 a4 c8 | 94 04 78 6c 13 14 ae b3 aa ac 60 8d 12 46 30 65 | 4d f6 8a 38 3e 83 8d 9b ed 94 87 9f 15 c1 ab 90 | 29 00 00 24 3c c6 27 c6 e1 5b ef ef 28 05 b6 9a | 73 ea 46 41 c6 a4 e3 b1 86 51 d2 31 50 73 0b 09 | 13 5f 9d 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 2d bd fb cd 00 1b 4b be 47 ff 4c | 9b 30 9e df 04 ed 35 e5 00 00 00 1c 00 00 40 05 | f4 eb 1d 0f f6 3b e7 d6 54 0e 88 15 bd 63 45 57 | 71 e8 c0 52 | libevent_free: release ptr-libevent@0x7fb36c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a42790 | #30 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a f6 d6 f4 f7 c1 a9 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #213 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #213 | rejected packet: | 4a f6 d6 f4 f7 c1 a9 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #213: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 09 06 18 28 25 97 f6 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #193 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #193 | rejected packet: | 09 06 18 28 25 97 f6 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #193: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0558 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 37 b2 e3 45 e6 a7 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #30 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #30 | rejected packet: | eb 37 b2 e3 45 e6 a7 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #30: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa0940 | handling event EVENT_RETRANSMIT for parent state #138 | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #138 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #138 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49619.419464; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005004 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a42790 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #138 | libevent_malloc: new ptr-libevent@0x7fb36c0180b0 size 128 "road-eastnet-nonat-138" #138: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #138) | 9e 04 07 cd 3c 90 2d 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 26 9c 69 c2 fb a0 0a d4 c6 8a e3 3a 35 d9 72 | c4 6d dc 97 97 46 4f 49 45 f3 89 7c 26 93 32 59 | 0e 55 34 82 9b 12 80 e6 60 cd 9e 59 15 f7 7d 65 | 53 e2 d3 d8 c2 ed 2c ad 8a b3 a9 0f 4d 3e ac 86 | 1c 67 54 95 04 00 bf 86 4e 8b bf af 44 15 eb 62 | ea cc 94 5a 6b 1a 81 0f 38 cc a4 0b 8b 3e f7 1f | ed 1b ee bf 3c b7 b3 6b c3 78 66 29 1f dc 55 cd | cd 9e c4 55 82 0d 26 16 81 1d 3b 87 44 bb 54 ef | 02 0c 05 f7 04 a0 83 3c c1 fe 2c d3 4e 3d ca 62 | 71 e8 db ac f9 9d 90 a6 0d 1e d9 94 f5 c3 29 22 | f5 2c d8 67 db 54 e1 d3 df b5 df 85 0d 36 cf 0c | 0f 08 0d 38 84 31 cd 9b 35 a0 fd df e8 86 86 f3 | a8 84 f3 56 c8 9a eb 02 1a c2 37 30 b1 0d 51 72 | 6c ba 2c ab f4 fb 66 85 22 97 66 d7 6b a3 32 2b | 57 22 c0 38 a7 76 1b d3 ea e0 94 87 f8 5d 23 88 | 1d 92 5d 32 0c 98 0b 93 d1 e9 b6 e4 2e 67 5c f1 | 29 00 00 24 e6 24 a9 20 36 d0 44 65 2c ba 3d 80 | 21 f7 06 3f 8d eb de 66 e7 ca a9 01 80 86 00 a0 | 79 48 c1 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 af 88 b2 43 70 03 fc c5 39 dd 7b 65 | af e5 61 63 70 8d 5a 32 00 00 00 1c 00 00 40 05 | 84 c7 81 66 9c 3a cd fa d9 98 02 0d f2 5f b1 72 | 68 cd 62 b2 | libevent_free: release ptr-libevent@0x7fb3380300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa0940 | #138 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e 04 07 cd 3c 90 2d 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #138 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #138 | rejected packet: | 9e 04 07 cd 3c 90 2d 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #138: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5af90 | handling event EVENT_RETRANSMIT for parent state #223 | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #223 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #223 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49619.447801; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001673 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa0940 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #223 | libevent_malloc: new ptr-libevent@0x7fb3380300e0 size 128 "road-eastnet-nonat-223" #223: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #223) | 7a 51 ea 00 7b 14 8e 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e c0 c4 41 9a 95 cc 81 e9 60 68 ab 45 9c 08 20 | b4 5a a9 9d 67 49 a7 46 aa 2b 2c 92 19 0c 98 42 | fe fb 4d 10 39 99 af 92 9d b6 2e 88 4d d0 11 c1 | cc 58 dc fa d8 45 59 75 a4 74 03 ef 28 b6 b2 df | 65 14 7b c4 56 cb 7e 8e c8 a4 2d ad 67 70 a7 55 | 5c 9f d8 c8 c5 46 4c 1e 63 7d 5e ab 57 ab 59 40 | f4 a8 4b fe 89 d6 bf 01 54 f9 46 07 86 f8 bc 75 | ef 26 9f 79 f2 7c 5a c2 f7 65 21 b4 f5 f9 18 0f | 7d 48 47 25 7b 23 3b 60 c4 8a 45 86 e2 31 42 68 | 91 5b 9e 0c 6c bd d5 91 7e aa 25 22 d3 ee bf b3 | c7 ca 4c a5 a7 05 79 a5 99 a0 88 70 14 6f be 39 | bf 8f 50 de 92 0a f3 4f c2 47 ed ec a9 88 76 bd | f2 c3 85 8c 4a 5e bf dc 44 3e af ee 45 cf 06 99 | e5 de 11 6a 2b 48 7c 22 42 d6 dd 11 a6 82 39 4f | 9c 24 2f 97 4c 87 c3 35 46 b2 19 ca 91 0d f2 ce | c9 8b b5 a0 e0 d7 a9 24 95 51 89 2f 04 0b 43 0c | 29 00 00 24 82 03 c4 08 4c 73 33 ac 95 33 24 a4 | 7a b6 82 c3 62 e4 f0 a1 f5 68 f8 16 c8 95 15 db | 31 e3 65 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 01 2d a5 d7 3f aa d5 34 53 23 34 | 04 fb 26 40 92 12 55 4e 00 00 00 1c 00 00 40 05 | a6 35 a0 ce 14 8d c6 b8 e2 da 44 eb d4 cc fd 65 | 95 2a 9c c1 | libevent_free: release ptr-libevent@0x7fb35801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5af90 | #223 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a 51 ea 00 7b 14 8e 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #223 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #223 | rejected packet: | 7a 51 ea 00 7b 14 8e 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #223: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d590 | handling event EVENT_RETRANSMIT for parent state #194 | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #194 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #194 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49619.460123; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.008046 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5af90 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #194 | libevent_malloc: new ptr-libevent@0x7fb35801d920 size 128 "road-eastnet-nonat-194" #194: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #194) | fb a9 4a 68 01 02 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad aa 66 9d b6 64 e0 b9 0d 37 a2 d5 08 fd 46 b0 | f7 b3 8b 64 d2 0b f9 59 d3 20 8f d2 23 52 ab 2e | d6 99 18 d2 2f 54 8c e7 99 6c 8c 9d cd ff 9d 5a | 44 41 3e 80 ea ff 21 1e 5c 82 8a bc ec 41 36 14 | dd 8d af 05 d5 6f c4 3b eb c0 61 1c 5d 0d 70 dd | 40 c9 d4 1f 8a d2 d8 76 8a b9 bd f7 f3 8d f9 d9 | da 19 38 58 8d de a2 45 b1 7d bb f4 44 36 75 08 | 1e 19 e1 7e 40 21 fc 21 30 c5 e3 bd 20 8d d8 be | bf bc a6 60 a1 d6 d8 51 07 69 fd 62 da 68 85 ce | 37 74 1e f7 ae d2 77 4a f2 bc 1e 10 5e ed ca 3e | bf 36 bc 15 0b 03 92 f4 43 13 b4 d6 80 6a 65 a5 | da 3f fd 89 e4 f3 95 6e ad 5c 51 06 e7 4d 88 1f | 8e b3 8c 1c 17 69 df 75 37 d0 1f f8 06 a4 4e 15 | d4 9e 45 dc a2 0b 41 4c 07 55 90 db 32 9b e2 82 | 2b f7 f7 40 85 e7 33 60 11 d2 9c 0f 8b 18 ca 0d | 1e 7e c6 7b e1 da d7 c5 9b 44 c8 e8 12 48 03 39 | 29 00 00 24 a9 61 02 67 eb 1a 8f ba e2 2e bf 6e | fa 3f 6f bb 4e c3 80 0d df 43 7e 7d a3 f5 81 cc | f3 7a bb 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 5d 39 f5 08 60 5b 2c d2 7c 9c f1 | a9 84 d1 dc ab 40 bc 42 00 00 00 1c 00 00 40 05 | dc 98 c1 28 2a 8c a1 5f e1 55 35 3c e4 55 00 85 | a7 4e ac da | libevent_free: release ptr-libevent@0x7fb3480180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d590 | #194 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb a9 4a 68 01 02 ca 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #194 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #194 | rejected packet: | fb a9 4a 68 01 02 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #194: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0547 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-232" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-232' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #232 at 0x557d46b10b40 | State DB: adding IKEv2 state #232 in UNDEFINED | pstats #232 ikev2.ike started | Message ID: init #232: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #232: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #232; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-232" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-232" IKE SA #232 "road-eastnet-nonat-232" "road-eastnet-nonat-232" #232: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-232 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-232": constructed local IKE proposals for road-eastnet-nonat-232 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 232 for state #232 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4d590 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #232 | libevent_malloc: new ptr-libevent@0x7fb3480180b0 size 128 | #232 spent 0.155 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-232" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.242 milliseconds in whack | crypto helper 4 resuming | crypto helper 4 starting work-order 232 for state #232 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 232 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 232 time elapsed 0.000845 seconds | (#232) spent 0.852 milliseconds in crypto helper computing work-order 232: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 232 for state #232 to event queue | scheduling resume sending helper answer for #232 | libevent_malloc: new ptr-libevent@0x7fb358046040 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #232 | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 232 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #232 | **emit ISAKMP Message: | initiator cookie: | 24 ac 89 77 7f d4 00 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-232 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8d e3 39 fa 31 96 0e da 0d 87 de fe bc da ee 7b | ikev2 g^x f9 35 54 93 66 77 87 a0 67 c2 b4 11 e6 0a 7a 53 | ikev2 g^x b3 1d a8 6c 5c b3 d5 5b f1 71 74 80 47 74 8f eb | ikev2 g^x 25 fb 81 fc 67 2b 6d fc c2 93 27 e4 ad 7c e4 44 | ikev2 g^x 62 ee e5 d7 4d 6f 45 7a fb 56 b0 33 e4 c0 e1 a0 | ikev2 g^x 0d 2e c4 d7 7c a8 3d 9c d0 51 2f 55 54 40 46 36 | ikev2 g^x 1c 6c 65 82 d9 49 b2 d4 69 f8 3b 26 10 eb 42 4c | ikev2 g^x 23 39 f8 bc c3 39 9a c3 11 d4 4e 97 4e b9 f8 a2 | ikev2 g^x 8b 74 d5 f0 11 c2 a0 7d ca dd 76 40 1b 01 76 b0 | ikev2 g^x a4 bf 05 91 b6 25 97 e5 e6 51 ee 64 fa 3b 0a c5 | ikev2 g^x a6 9c c8 8d fc dc 9a b7 88 e8 5a 4a 57 96 98 00 | ikev2 g^x db 6d 9a cd 76 5b a7 49 16 56 06 32 a5 f0 51 87 | ikev2 g^x 36 26 1d 21 19 29 89 68 02 06 6d 37 2b a0 74 d8 | ikev2 g^x 14 94 a7 12 8f 7a e7 ad 72 26 fb ca e9 57 f6 ae | ikev2 g^x 40 e1 77 ae bd 14 78 69 df f7 02 98 cb 60 f6 4b | ikev2 g^x ad ea 83 90 fd 04 b0 25 b3 92 71 37 ed 5d 75 e1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce aa 59 21 22 32 5d 1b 0e 90 4a a6 80 93 f2 d5 94 | IKEv2 nonce dc dc 41 5c 7e 9b 58 30 e5 e0 1c a2 9a c8 ed 70 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 24 ac 89 77 7f d4 00 ca | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e8 | natd_hash: port= 01 f4 | natd_hash: hash= eb 58 75 66 d7 36 51 ed 56 98 88 32 c1 e3 29 ac | natd_hash: hash= 35 46 df e2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data eb 58 75 66 d7 36 51 ed 56 98 88 32 c1 e3 29 ac | Notify data 35 46 df e2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 24 ac 89 77 7f d4 00 ca | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 0c 44 36 93 b4 a9 f5 59 b8 d7 76 83 b8 b4 fd 37 | natd_hash: hash= 81 aa c4 e2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0c 44 36 93 b4 a9 f5 59 b8 d7 76 83 b8 b4 fd 37 | Notify data 81 aa c4 e2 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #232 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #232: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #232 to 4294967295 after switching state | Message ID: IKE #232 skipping update_recv as MD is fake | Message ID: sent #232 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-232" #232: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.232:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #232) | 24 ac 89 77 7f d4 00 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d e3 39 fa 31 96 0e da 0d 87 de fe bc da ee 7b | f9 35 54 93 66 77 87 a0 67 c2 b4 11 e6 0a 7a 53 | b3 1d a8 6c 5c b3 d5 5b f1 71 74 80 47 74 8f eb | 25 fb 81 fc 67 2b 6d fc c2 93 27 e4 ad 7c e4 44 | 62 ee e5 d7 4d 6f 45 7a fb 56 b0 33 e4 c0 e1 a0 | 0d 2e c4 d7 7c a8 3d 9c d0 51 2f 55 54 40 46 36 | 1c 6c 65 82 d9 49 b2 d4 69 f8 3b 26 10 eb 42 4c | 23 39 f8 bc c3 39 9a c3 11 d4 4e 97 4e b9 f8 a2 | 8b 74 d5 f0 11 c2 a0 7d ca dd 76 40 1b 01 76 b0 | a4 bf 05 91 b6 25 97 e5 e6 51 ee 64 fa 3b 0a c5 | a6 9c c8 8d fc dc 9a b7 88 e8 5a 4a 57 96 98 00 | db 6d 9a cd 76 5b a7 49 16 56 06 32 a5 f0 51 87 | 36 26 1d 21 19 29 89 68 02 06 6d 37 2b a0 74 d8 | 14 94 a7 12 8f 7a e7 ad 72 26 fb ca e9 57 f6 ae | 40 e1 77 ae bd 14 78 69 df f7 02 98 cb 60 f6 4b | ad ea 83 90 fd 04 b0 25 b3 92 71 37 ed 5d 75 e1 | 29 00 00 24 aa 59 21 22 32 5d 1b 0e 90 4a a6 80 | 93 f2 d5 94 dc dc 41 5c 7e 9b 58 30 e5 e0 1c a2 | 9a c8 ed 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 58 75 66 d7 36 51 ed 56 98 88 32 | c1 e3 29 ac 35 46 df e2 00 00 00 1c 00 00 40 05 | 0c 44 36 93 b4 a9 f5 59 b8 d7 76 83 b8 b4 fd 37 | 81 aa c4 e2 | state #232 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3480180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4d590 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d590 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #232 | libevent_malloc: new ptr-libevent@0x7fb3480180b0 size 128 | #232 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49619.463712 | resume sending helper answer for #232 suppresed complete_v2_state_transition() and stole MD | #232 spent 0.449 milliseconds in resume sending helper answer | stop processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb358046040 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 ac 89 77 7f d4 00 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #232 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #232 | rejected packet: | 24 ac 89 77 7f d4 00 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #232: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0579 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b610 | handling event EVENT_RETRANSMIT for parent state #31 | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #31 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #31 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49619.47191; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.002676 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b09380 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #31 | libevent_malloc: new ptr-libevent@0x7fb358046040 size 128 "road-eastnet-nonat-31" #31: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #31) | d5 d5 f7 7f 23 0d 4b 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 d8 4b a5 f9 d4 3a a9 51 97 2e 27 d1 cc 90 15 | e2 e2 8d 96 07 4d fd 40 9f 4f 7f 6f 35 0e 23 bc | 4a 6a 76 f9 9f 83 b0 54 30 ee b6 fc 0a 45 0c 73 | 2d e9 2a b2 ca 81 a2 ff 50 db 13 29 75 7d e9 7e | a9 33 06 c4 32 68 94 61 41 2b 8d f1 ff df 69 cc | e8 c4 b4 6d ef bc 3d c5 49 cc a7 2a fc 4c 98 e2 | 30 43 57 19 e1 0a 22 00 d7 07 6f aa ba 35 b2 14 | 36 27 5e 66 b6 08 a0 40 46 47 86 94 6d 23 bf ed | 9b 86 94 95 7d 7c df ed 26 58 08 d9 19 18 cf 17 | d2 31 cb 23 b8 00 65 a0 2d c7 80 be d9 c6 2d 9b | 2d 24 dd 1f 09 8c cb bd 5d a9 d7 7b 30 d7 87 68 | f3 c0 0e 20 8d c3 3f 32 80 d9 ab 29 26 00 09 ea | b0 b4 2f 7d 8f fc 22 1d 7c 39 80 08 04 22 2a 49 | f4 26 0e 59 4e ac 0e 0e 46 93 3b ba 87 01 a8 59 | ea 18 2f 09 70 d0 fb 69 f1 4a 19 c7 fd d5 be f0 | ff bb d7 7c ef dd e5 ed c9 a4 0a b6 e1 11 1b ed | 29 00 00 24 6a 1e b5 3b 00 37 08 50 6d 81 0e e2 | cf 1b 46 47 4b 2b 09 3d 6e 9a 95 9d 52 78 61 ae | d4 0d 66 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 91 23 cd ed e8 35 56 6f f7 85 4c | 49 64 a9 75 0a 07 1b 5f 00 00 00 1c 00 00 40 05 | a3 62 6c f7 52 92 b8 35 33 98 a9 6b 00 6d db 28 | 96 bc 0a b6 | libevent_free: release ptr-libevent@0x7fb34c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b610 | #31 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 d5 f7 7f 23 0d 4b 11 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #31 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #31 | rejected packet: | d5 d5 f7 7f 23 0d 4b 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #31: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a73690 | handling event EVENT_RETRANSMIT for parent state #214 | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #214 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #214 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49619.472212; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002718 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b610 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #214 | libevent_malloc: new ptr-libevent@0x7fb34c00cf80 size 128 "road-eastnet-nonat-214" #214: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #214) | 4f 29 16 ab 3e 1b 1d 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 9a ad a4 54 39 e9 04 15 a2 a4 f0 c8 dc 49 94 | 47 5a 04 64 04 57 79 8f 63 87 e7 ae b7 39 62 ec | 47 13 85 3d 4e a0 14 32 15 25 a6 7d a4 f2 aa aa | 67 17 a5 b2 08 db fc bd dc 96 aa 21 e7 a5 f2 3b | 34 82 35 14 fb 4a be 16 a9 a7 92 42 29 b2 17 4d | 52 27 87 ea b1 3a fa 6c 11 62 48 2f 81 f0 58 f6 | 6c 8b 54 c6 3c a7 1a eb fd 0e 51 2e 43 a1 67 7f | 52 b6 51 7f f1 6a 5e 3d a1 55 84 4d aa 64 fa dd | d4 68 19 0a 1c f1 aa ed d1 aa 12 27 11 44 c1 42 | 4c 3e ce c4 42 e7 8a 9f 52 d8 86 65 33 7c 9a 6a | ee 61 16 79 e0 6f bf 94 55 b9 32 ad 6e 68 90 17 | bb 0e f5 75 b4 7f bb 34 59 92 4e 2a eb db ac 26 | 62 0d 79 8b 29 38 a9 d3 9a dc 81 9e 5b 01 b1 77 | b2 97 be 93 40 8c 22 a8 ed c3 3b 34 e3 61 26 ff | 40 f0 34 c1 02 20 28 94 a9 ac e5 14 88 22 c0 0f | 0a ad af f1 ac 83 5f 84 02 43 33 bf d4 08 dc 06 | 29 00 00 24 dc 16 0d 02 e8 ab 94 84 4c 26 85 d4 | 77 69 31 1b 43 d5 c1 b1 2c a0 69 25 59 ad 36 b7 | 5c 40 16 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 ae d6 cb 98 74 13 91 af 99 ac 97 | 02 1b 9a 5a 71 bb 20 28 00 00 00 1c 00 00 40 05 | 20 56 0b 1b ec fa 37 e0 47 28 94 e0 2b 28 be ff | 21 7d 56 5a | libevent_free: release ptr-libevent@0x7fb34403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a73690 | #214 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 29 16 ab 3e 1b 1d 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #214 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #214 | rejected packet: | 4f 29 16 ab 3e 1b 1d 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #214: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a34e10 | handling event EVENT_RETRANSMIT for parent state #227 | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #227 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #227 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49619.479485; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500838 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a73690 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #227 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 "road-eastnet-nonat-227" #227: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #227) | c5 c2 6a 83 d2 66 bb b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 5b f4 b6 58 9a 18 76 c3 e1 6e 19 2a 39 ae a1 | 62 ea 44 d1 30 52 4d 8a 54 61 7d 23 98 f8 8d d5 | 84 3b 68 fd c2 f3 21 b9 78 0c dc e3 83 0f 8e 04 | 74 b0 67 51 d8 1a 83 67 df 2f 54 ee 3c eb 78 8c | dc ab 5e ad 88 89 74 dd b8 42 f8 3b 65 bb c7 d6 | 58 b5 ad 0a ef 24 29 f4 ee 94 22 81 71 d7 21 71 | cf 9a 96 87 e9 3e 34 bd 96 10 75 82 fd 44 7e e5 | d5 b4 6d be 50 02 22 60 ae ae 61 82 1e 48 c4 e8 | fb e2 e4 71 81 50 e1 9c 82 80 8f 59 e3 b5 cd 3d | 6c 63 88 9c 58 f3 61 37 6d 11 4f 91 c3 dc 04 d5 | 78 82 60 cb 5e 0d 1d a4 89 4d 74 78 d6 b1 e9 18 | bf 79 a1 1a 16 e0 b4 3d 00 ec 02 c0 3f 69 19 a5 | ad 3d e3 6c cb 66 a6 b9 ff c5 30 88 8f f5 e7 a8 | f5 33 4d 86 13 42 87 b3 82 49 90 36 bb 5e e9 47 | c4 bf c9 a4 e4 1a 35 38 6a 04 9b 4b 05 29 61 c8 | cf c0 72 4f 16 6a 7e 8b 6f 02 0b ab 68 bf 34 71 | 29 00 00 24 73 17 4e 35 59 6e 44 c0 fd cd 46 68 | 7d aa 47 75 fe fd 8d d7 e4 53 d6 a0 cb 05 84 4f | 51 ed 61 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 60 9b b9 46 e5 98 89 ad c1 cb e5 | e9 7b 12 83 3d 55 5a fc 00 00 00 1c 00 00 40 05 | 0c dc fe 43 8b 17 32 a8 d8 5e bc 45 b2 f1 c1 93 | bc b6 5b dc | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a34e10 | #227 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 c2 6a 83 d2 66 bb b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #227 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #227 | rejected packet: | c5 c2 6a 83 d2 66 bb b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #227: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90440 | handling event EVENT_RETRANSMIT for parent state #139 | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #139 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #139 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49619.486815; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005968 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a34e10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #139 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 "road-eastnet-nonat-139" #139: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #139) | 98 4d 89 18 32 14 8f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb bc f6 61 86 12 c3 bf 44 ad ab c8 f8 6d 1d 7a | 8e 0b a1 af 30 f0 3a 9c 0b 72 59 7b 0e cc 41 e5 | 8e 8e a0 7e 30 1e 50 82 23 bf b6 e1 69 ee be 0d | cc 36 07 e5 53 86 7d cf f5 63 8d 89 06 e8 7e 7e | 8f 2c 9d a8 ed 05 f6 a5 d3 42 db b5 95 59 0b 32 | 04 71 41 13 63 f9 4a 4c 42 0e 00 d5 c5 99 ba ab | 17 4c ce 49 6c 52 88 21 1f b3 2a 6c 8d cc 9d ad | 58 96 b7 c5 a6 44 e9 2c bb f7 31 ef f0 0b f9 1c | 1b 4e 21 f5 a2 ea 26 1f 03 aa b4 4e 34 e2 87 84 | cf 38 c7 5e ef db 85 1f 03 a7 73 48 68 be 7e b1 | 00 74 8f e9 65 a8 0b 8a 27 e7 a0 51 5b c9 e3 2d | 64 f7 22 1b 1e b7 6f af e1 0f 11 f6 9b 82 c4 de | 33 fe da 26 0e d7 f8 c3 43 49 4f e1 38 7e 8a 70 | 40 40 85 6b ea cf c0 b6 a0 c2 ac 2b eb 0c 58 ce | 0e cd 1f 9c 72 bb e0 55 da 15 7c 5d ad 4e 80 77 | d9 86 7e 35 e9 dd 73 d2 de c2 f2 ae 3e 6a 77 fd | 29 00 00 24 ce a2 61 71 0b 59 18 45 32 ff fc 20 | d2 f9 be 9d 52 e8 20 ba 16 46 42 c2 a8 74 a7 11 | 49 eb 52 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 5e 21 46 6e c2 25 7d 16 7d 1e 10 | d1 b7 00 9d a8 c1 7e fa 00 00 00 1c 00 00 40 05 | 95 96 61 58 5f 24 29 d9 13 26 c9 57 d8 b0 16 e2 | 35 e6 bc 7d | libevent_free: release ptr-libevent@0x7fb34801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90440 | #139 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 4d 89 18 32 14 8f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #139 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #139 | rejected packet: | 98 4d 89 18 32 14 8f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #139: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab6500 | handling event EVENT_RETRANSMIT for parent state #140 | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #140 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #140 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49619.550182; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004791 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90440 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #140 | libevent_malloc: new ptr-libevent@0x7fb34801d920 size 128 "road-eastnet-nonat-140" #140: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #140) | 7b af c7 ac 06 7e 5a 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 03 39 d2 09 32 a1 ff 81 2d 15 dc 96 08 01 c1 | 8e 0a 6e 33 a6 3e 74 05 5c 15 33 12 1d f7 12 20 | db f5 3e 24 ba 17 01 dc a0 95 5b 2c 7b 77 c2 3e | 02 67 33 d7 d6 86 dc 63 50 16 65 87 a1 a9 2b c2 | 68 87 45 fa 03 db 21 3c 23 cd d5 14 5d 40 bf 10 | 6f 14 34 95 51 53 c7 d5 77 b9 67 66 94 9a cd 21 | 08 bb de 59 ba ca 48 d5 21 97 e5 28 87 2d fd 83 | d2 62 24 c7 7c f8 ac 68 7a f8 c3 7f 7d 8d 72 d0 | 9d 64 ef 67 4b f1 5c 24 57 ca c2 b1 9f b6 11 d3 | 07 3e 55 51 fc 73 7a 83 2c 11 87 97 33 3d 5c cd | 48 68 02 58 27 c2 fe 9a f6 51 01 87 b5 32 4d fc | 09 2c 09 a0 1f 82 25 e8 47 96 80 8e 9d 80 b5 a7 | 86 8d 11 ad 04 69 30 3a 7c 49 92 c3 9e 7f 81 14 | 42 d8 62 ef 10 0a 21 b2 bb b9 42 01 9c 86 19 33 | dd 9b 24 b9 8a d5 68 9d ee 00 85 c1 cc df b7 34 | d9 c8 e4 31 8c bd d3 67 7d ad 51 86 db 69 96 5d | 29 00 00 24 f8 43 b0 82 a0 04 df 35 49 ed 46 83 | 05 44 45 f4 4f f6 f3 e1 63 59 5a aa 3f 59 d1 20 | a6 81 b5 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a 8e a2 d1 63 df 73 41 77 f0 6a b9 | 17 c7 13 b6 69 6d 12 29 00 00 00 1c 00 00 40 05 | a8 9c d4 0d d7 3c af a8 56 f5 ab f4 4f 7a 90 fd | 96 a4 e3 47 | libevent_free: release ptr-libevent@0x7fb384038240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab6500 | #140 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7a350 | handling event EVENT_RETRANSMIT for parent state #32 | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #32 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #32 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49619.550374; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006558 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab6500 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #32 | libevent_malloc: new ptr-libevent@0x7fb384038240 size 128 "road-eastnet-nonat-32" #32: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #32) | 91 2f 9d 69 76 5d 8a 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 54 17 4f f3 31 b1 0f c2 14 96 a0 49 f3 c5 20 | 38 78 7d e5 0a d8 95 bc 7a a9 a2 f1 ff ab 0d 66 | a2 fe 53 90 8e fe 51 43 04 57 01 9c e7 22 ca 9e | 98 aa 3b 0d 0d 5f ee 9d 1e 59 e6 04 c4 7f 07 84 | f1 a5 dc 31 6f fa b4 db 4a d9 1c 93 5d b0 7e 5d | 37 79 07 ab 3e 5c a3 de d6 8b a4 ac df 4b a7 7c | af 6f 03 fd 31 bd 7d c1 34 31 76 57 00 e4 23 e1 | 82 cb b8 38 12 59 cd 21 e3 0e 67 54 27 e1 6e 8f | 1e a1 dd 84 f8 ca 82 2a 39 9d 17 56 58 46 a3 3b | 7b 5d 3a 21 a2 b3 03 79 c6 bd 25 cc df a0 12 67 | b3 f4 5a c2 b0 73 2d 33 df 1c dc fa 26 25 56 72 | 59 7b 3c f0 d8 e2 d9 b0 57 2e 4a 8e ec 96 92 09 | 75 70 f6 57 59 ce 54 70 90 14 41 34 b1 57 0f 5d | 19 dd 8a a1 77 43 7e cf 1c ef 3e 0b 72 1e cc f4 | 78 66 2f 15 74 e8 33 6b d3 89 bb a9 fb bc fa 46 | 95 b5 88 f8 a3 91 1f 3a b1 92 bc 1e 84 a5 5b 07 | 29 00 00 24 2d 29 95 26 bc 23 fe d9 76 bb c2 d5 | 43 41 98 03 bf c6 eb 4a b9 6e a6 4e f6 f7 82 f1 | 09 94 9d 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 13 8b 5d 25 b5 3b 06 af a0 3f ac | be 9b 92 09 9d c4 50 7f 00 00 00 1c 00 00 40 05 | ef 32 45 23 d7 6a b0 96 66 7f 58 39 f6 19 a5 1f | 4b 49 56 02 | libevent_free: release ptr-libevent@0x7fb33802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7a350 | #32 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7b af c7 ac 06 7e 5a 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #140 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #140 | rejected packet: | 7b af c7 ac 06 7e 5a 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #140: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 2f 9d 69 76 5d 8a 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #32 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #32 | rejected packet: | 91 2f 9d 69 76 5d 8a 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #32: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3fc10 | handling event EVENT_RETRANSMIT for parent state #215 | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #215 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #215 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49619.555729; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002542 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7a350 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #215 | libevent_malloc: new ptr-libevent@0x7fb33802a950 size 128 "road-eastnet-nonat-215" #215: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #215) | c5 c0 dd cc b6 af 51 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 5c 66 6c 45 6f a8 d2 4f 25 98 20 11 a6 a1 bb | 37 55 34 73 15 5d a4 49 35 cd f6 0a 9e e7 f3 5c | ad 42 56 ef b0 f4 fa f6 d5 ba 84 d6 dc e0 5f 55 | dc 55 56 f2 be 03 fe 4f 4a b4 66 3c 99 cb 71 e7 | b6 73 b2 44 ce 0d f7 96 90 78 2f 50 92 28 ba f9 | 22 e7 15 cf fa c8 47 f5 0c 38 c1 8a 24 5b 39 a8 | ac 47 31 ea aa c2 b1 57 78 79 5e 0b a7 a0 33 1b | 86 d9 45 31 c0 29 bb 67 d1 68 a7 f5 10 84 25 ff | 4c 83 f7 42 1d c4 e6 b7 53 b1 ed 6d 1b f7 86 9b | 3e cc 2d ee 22 b8 61 e0 e7 95 7c e8 c8 d8 b2 10 | 06 d9 50 52 8e 07 0b 4b 94 83 c7 4b 90 09 3a d9 | 8a 35 2d 83 36 bb 75 45 45 1c cf c0 11 7f 85 8d | ec e0 a4 ca 58 99 97 8b 10 af 58 2d b7 9b a7 f0 | a5 cb ea 38 04 fe 36 b9 b4 81 1d 8f 85 c7 76 a8 | d9 30 86 6d bd 32 3b 6b 02 28 ec 10 b1 28 43 17 | 56 d4 9e 0c 76 ce cc 71 e8 70 44 59 5e b3 3a a2 | 29 00 00 24 21 81 d6 ee 95 75 07 f2 b0 ff 0f d3 | a2 c0 2b d7 de b5 1b 67 08 ca 6e a7 a2 d0 6b ed | 6d c9 d5 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c 19 de 62 93 d0 a4 3d 26 c7 25 16 | 8c 72 93 29 4a 06 74 1d 00 00 00 1c 00 00 40 05 | 5e 68 d5 fe 16 1c 49 30 75 2d c6 7b 65 a2 b6 24 | 10 76 bd 1f | libevent_free: release ptr-libevent@0x7fb34001a190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3fc10 | #215 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 c0 dd cc b6 af 51 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #215 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #215 | rejected packet: | c5 c0 dd cc b6 af 51 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #215: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35800d120 | handling event EVENT_RETRANSMIT for parent state #195 | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #195 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #195 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49619.565071; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004366 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3fc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #195 | libevent_malloc: new ptr-libevent@0x7fb34001a190 size 128 "road-eastnet-nonat-195" #195: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #195) | 37 e6 90 db 14 bc bf 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 53 c9 77 b4 f3 d5 4d 42 00 37 51 2c 1c 68 3c | f1 54 0f 7a 55 d8 cb dc 59 bb 2f b5 96 8c 4e d4 | 85 27 5a ea f2 a7 4d 9e 5a 6b ee c6 28 a0 d2 57 | 71 7a 7b 0b 80 39 ac 27 cd 87 0d ef e4 ef af 3a | d6 b3 f6 12 c5 5f 2f d9 cd fb 17 d4 43 5e 16 c4 | 87 67 d1 70 07 84 e5 8e 71 91 de 30 59 cc e6 ee | 34 fb c0 51 e2 87 5b 7e 3f 08 db 50 ff 54 7a b1 | bd cb 77 92 50 41 31 65 47 73 69 2a fd d6 77 f3 | b0 89 f6 8e e2 6a 07 fc af 84 ca d3 f2 87 73 27 | c4 cf 2d 21 63 f5 8f 71 28 70 95 02 a0 27 ac 78 | a4 bb 1e 75 dc be 0d b4 ad 92 30 f8 7c 7f 5d 71 | a5 c9 9d 8b 71 f5 b5 68 db 9c 63 56 82 3f 35 f1 | f2 81 65 6a 20 3e b0 68 92 e4 10 6f a0 15 ab a8 | 72 4d 4d 54 b6 ef 0b 2d 62 75 65 6d be 42 39 3d | c4 80 ed ba e2 23 03 5c 4c 11 92 92 a4 9b 70 7c | cd 9d 5e 6a ce f4 42 ce b7 88 b0 01 79 41 f3 ce | 29 00 00 24 9e 21 2f 19 56 de ef 57 88 5d 72 9d | d0 e9 ed cf f1 53 49 64 11 8c ea d8 bc d7 7f b1 | 97 11 98 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be a1 e0 42 82 c4 3c a5 9f 98 67 8d | 2c 4b 8d ec 3b 56 95 d6 00 00 00 1c 00 00 40 05 | 9b 76 ec e0 3b 32 32 e4 22 87 e5 16 97 1d 20 83 | b5 a4 81 66 | libevent_free: release ptr-libevent@0x7fb358012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800d120 | #195 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 e6 90 db 14 bc bf 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #195 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #195 | rejected packet: | 37 e6 90 db 14 bc bf 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #195: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #228 | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #228 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #228 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49619.574408; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50005 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #228 | libevent_malloc: new ptr-libevent@0x7fb358012840 size 128 "road-eastnet-nonat-228" #228: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #228) | d5 f0 72 59 9f 13 94 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 4d 11 72 16 86 29 05 39 41 97 2f ff 33 6b a3 | e2 5f 51 ee 71 23 04 d6 72 0c fb dd 15 ef 6d c8 | 1d b7 c6 17 96 9b 3b 82 3f 74 55 80 22 53 76 ea | 2b 12 aa ae d8 aa 3b e7 03 c1 8e 79 97 e5 92 eb | b7 6d 0d a0 78 62 d0 f2 27 fb a0 42 72 ed d8 cd | 0b b4 e6 0c 99 75 b7 07 dd f8 fc 47 fd 38 1d bf | fc 96 ec 5d d0 ea 7b a2 99 77 8a 86 42 74 89 83 | 1d d8 30 c9 41 1c 6d 04 55 5a e4 6a 7f a2 48 37 | 02 c7 31 e3 a7 ef f2 c3 5f 9e 83 8d 0c 35 c9 0e | e5 2e 96 42 63 e4 ee 14 f2 43 a8 13 d6 19 12 1c | 71 11 80 4d 71 0f 19 3b 63 b8 05 30 82 8b 88 80 | bc 55 78 f9 8c 98 4b c3 03 95 ca f9 2f 2c ae 8f | 75 58 72 ba 8e 10 73 eb 12 6f 65 4a c0 7e 83 a9 | 2f 5f f5 39 44 b0 f3 71 90 fa 59 65 c5 77 f4 ce | b1 2f 6d f7 a7 ee d0 bc fc b5 7f 3e 18 f7 e0 77 | 4c 26 72 38 ff 07 80 23 0f 43 31 54 b4 87 d0 e8 | 29 00 00 24 53 c7 ad d5 ed 06 63 64 b1 b9 04 17 | 96 5d 45 22 6a eb a8 60 3b 32 23 a5 f3 37 e3 7f | 1e aa 66 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 e7 5c 74 6b 3c 37 c1 41 0f fa b6 | 88 19 1c 11 1d 3e 7c 16 00 00 00 1c 00 00 40 05 | e2 48 33 be 38 78 72 f6 d1 00 6b 61 a1 72 02 86 | 37 c7 48 ae | libevent_free: release ptr-libevent@0x7fb3440407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #228 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 f0 72 59 9f 13 94 bf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #228 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #228 | rejected packet: | d5 f0 72 59 9f 13 94 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #228: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-233" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-233' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #233 at 0x557d46b12100 | State DB: adding IKEv2 state #233 in UNDEFINED | pstats #233 ikev2.ike started | Message ID: init #233: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #233: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #233; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-233" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-233" IKE SA #233 "road-eastnet-nonat-233" "road-eastnet-nonat-233" #233: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-233 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-233": constructed local IKE proposals for road-eastnet-nonat-233 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 233 for state #233 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a6b490 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #233 | libevent_malloc: new ptr-libevent@0x7fb3440407f0 size 128 | #233 spent 0.148 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-233" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.218 milliseconds in whack | crypto helper 13 resuming | crypto helper 13 starting work-order 233 for state #233 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 233 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 233 time elapsed 0.000984 seconds | (#233) spent 0.988 milliseconds in crypto helper computing work-order 233: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 233 for state #233 to event queue | scheduling resume sending helper answer for #233 | libevent_malloc: new ptr-libevent@0x7fb35c046040 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #233 | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 233 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #233 | **emit ISAKMP Message: | initiator cookie: | 77 22 f4 9c 3e 1f 99 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-233 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6b ec 2a 3f 06 d1 8b 5a e8 a0 a7 30 dd 97 56 a8 | ikev2 g^x fc 83 ab 1c 41 f5 e8 c3 f3 53 9d 30 18 0d be a8 | ikev2 g^x 6b a6 4b 53 32 26 a8 d4 bc df 11 84 c3 51 c0 79 | ikev2 g^x eb 6a aa 97 40 5a 35 1b a4 6a 1c c4 04 e6 8f 18 | ikev2 g^x 55 5f 5f c2 af ea 6a 6c 05 59 de 4e 19 d5 22 46 | ikev2 g^x 8f 6c 32 5b 58 46 45 5f 0c 50 78 8c 5e 88 c7 73 | ikev2 g^x e0 06 97 88 0d 6e 77 b6 da 57 bc be e2 24 fb f2 | ikev2 g^x bc 09 06 c5 c0 aa 19 66 66 6f 88 a3 1d 28 43 e3 | ikev2 g^x 36 51 8c 80 0a 70 81 d2 c6 66 0e c8 9f c6 17 19 | ikev2 g^x b8 81 ac 81 1a 75 2c b9 dc 5b 7e 21 7e 73 b2 27 | ikev2 g^x 88 a7 6d 88 e3 28 4e 9c 2a a6 e3 b1 c2 84 18 fe | ikev2 g^x a8 bd 00 37 6c ea ee 13 7b 00 0f 0a d1 ff 5f 9e | ikev2 g^x d5 9b e4 25 b2 e5 a0 5b a7 8c 8c 3d 30 b8 3c 2d | ikev2 g^x d7 5a cb be 36 80 67 eb 87 97 e6 10 f7 e4 20 c7 | ikev2 g^x b9 ae bd af 99 ea 2b 87 69 7f 4e 89 2a ed a5 67 | ikev2 g^x 99 05 49 1e d6 46 c3 74 7b 66 be bf b6 f1 d6 cc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c5 f3 2f 2c 84 76 05 a0 25 7b 18 6c b7 6d f8 2f | IKEv2 nonce 27 cc e2 71 11 4d 56 a5 c7 36 d6 2c 0b df 39 d7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 77 22 f4 9c 3e 1f 99 ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e9 | natd_hash: port= 01 f4 | natd_hash: hash= 32 f4 1a 0b 18 23 e3 b7 72 f4 2b e8 42 64 3b ae | natd_hash: hash= 76 1f 34 42 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 32 f4 1a 0b 18 23 e3 b7 72 f4 2b e8 42 64 3b ae | Notify data 76 1f 34 42 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 77 22 f4 9c 3e 1f 99 ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 5e 56 c8 b1 db 9e 88 e1 bd b5 14 1e 2e de bc 55 | natd_hash: hash= b2 28 a2 2d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5e 56 c8 b1 db 9e 88 e1 bd b5 14 1e 2e de bc 55 | Notify data b2 28 a2 2d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #233 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #233: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #233 to 4294967295 after switching state | Message ID: IKE #233 skipping update_recv as MD is fake | Message ID: sent #233 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-233" #233: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.233:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #233) | 77 22 f4 9c 3e 1f 99 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b ec 2a 3f 06 d1 8b 5a e8 a0 a7 30 dd 97 56 a8 | fc 83 ab 1c 41 f5 e8 c3 f3 53 9d 30 18 0d be a8 | 6b a6 4b 53 32 26 a8 d4 bc df 11 84 c3 51 c0 79 | eb 6a aa 97 40 5a 35 1b a4 6a 1c c4 04 e6 8f 18 | 55 5f 5f c2 af ea 6a 6c 05 59 de 4e 19 d5 22 46 | 8f 6c 32 5b 58 46 45 5f 0c 50 78 8c 5e 88 c7 73 | e0 06 97 88 0d 6e 77 b6 da 57 bc be e2 24 fb f2 | bc 09 06 c5 c0 aa 19 66 66 6f 88 a3 1d 28 43 e3 | 36 51 8c 80 0a 70 81 d2 c6 66 0e c8 9f c6 17 19 | b8 81 ac 81 1a 75 2c b9 dc 5b 7e 21 7e 73 b2 27 | 88 a7 6d 88 e3 28 4e 9c 2a a6 e3 b1 c2 84 18 fe | a8 bd 00 37 6c ea ee 13 7b 00 0f 0a d1 ff 5f 9e | d5 9b e4 25 b2 e5 a0 5b a7 8c 8c 3d 30 b8 3c 2d | d7 5a cb be 36 80 67 eb 87 97 e6 10 f7 e4 20 c7 | b9 ae bd af 99 ea 2b 87 69 7f 4e 89 2a ed a5 67 | 99 05 49 1e d6 46 c3 74 7b 66 be bf b6 f1 d6 cc | 29 00 00 24 c5 f3 2f 2c 84 76 05 a0 25 7b 18 6c | b7 6d f8 2f 27 cc e2 71 11 4d 56 a5 c7 36 d6 2c | 0b df 39 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 f4 1a 0b 18 23 e3 b7 72 f4 2b e8 | 42 64 3b ae 76 1f 34 42 00 00 00 1c 00 00 40 05 | 5e 56 c8 b1 db 9e 88 e1 bd b5 14 1e 2e de bc 55 | b2 28 a2 2d | state #233 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3440407f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a6b490 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #233 | libevent_malloc: new ptr-libevent@0x7fb3440407f0 size 128 | #233 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49619.577137 | resume sending helper answer for #233 suppresed complete_v2_state_transition() and stole MD | #233 spent 0.455 milliseconds in resume sending helper answer | stop processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c046040 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 22 f4 9c 3e 1f 99 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #233 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #233 | rejected packet: | 77 22 f4 9c 3e 1f 99 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #233: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0591 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c00d120 | handling event EVENT_RETRANSMIT for parent state #141 | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #141 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #141 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49619.612341; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004615 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0a940 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #141 | libevent_malloc: new ptr-libevent@0x7fb35c046040 size 128 "road-eastnet-nonat-141" #141: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #141) | c7 a4 5e d6 85 96 e8 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 5c 64 85 22 7f 26 67 9b 1d d2 dc 77 48 35 3a | d4 3f ae a5 de d9 02 e1 be b1 54 1d 8f 3c 81 66 | 72 af 44 35 86 52 1f 94 d8 67 4f d5 3d aa 9a 28 | b8 7d b2 44 cd ad e4 36 73 fc b7 ff a8 f3 fa 52 | bc bb ec ae b0 14 24 28 e8 98 61 c7 6e 10 46 be | 9e 1b d1 62 7d 6b 63 8d 57 98 39 e0 7a 2b d7 fb | 08 85 91 84 64 96 ca 9e 7d d6 44 71 24 e2 7b d9 | 4e df 37 ef 69 35 3e bf d9 e6 0c fe 44 26 04 4e | f0 05 82 74 b2 9b 24 5e e9 a2 22 8d 25 f4 83 56 | 66 7a 36 9b c2 83 bb 7e 03 9c 77 3b 87 eb 41 c7 | 94 78 c3 88 92 ee d7 85 b7 c9 76 9d e6 b0 56 99 | 3c 23 e2 55 4e f4 22 8d 17 30 9c c5 cd a0 fa a5 | 54 c0 8e f4 5a 2c 24 46 f9 7c 1e 86 1f 7b 3c ed | d6 ba ae a7 70 a2 9b 24 e8 02 bd 30 c2 66 66 44 | 25 e0 d1 5b fc c6 60 e2 9a 7f 9c 7f d3 c2 d2 0d | 71 6b ce d7 9c d1 77 52 aa 1f 4c 8a aa 84 99 be | 29 00 00 24 77 e9 14 43 da cb a0 62 0a e5 af ee | ca 47 6a 87 48 66 6e 70 1f 90 c9 e8 b5 aa eb 33 | 74 97 4a b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 5f b0 2c dc 05 ab ba 7d 8f a9 67 | 57 cd cc b4 50 46 52 bd 00 00 00 1c 00 00 40 05 | 25 fc 66 29 f4 e3 aa bf a8 61 5f 67 dd d5 39 f5 | bb 8c 0c c1 | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c00d120 | #141 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 a4 5e d6 85 96 e8 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #141 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #141 | rejected packet: | c7 a4 5e d6 85 96 e8 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #141: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a855c0 | handling event EVENT_RETRANSMIT for parent state #224 | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #224 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #224 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49619.615689; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001316 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #224 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 "road-eastnet-nonat-224" #224: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #224) | df 89 b3 52 1f 0f f1 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 96 f9 c5 cf 52 6e 98 60 ae 95 1a e5 7e 1a 31 | 50 be ef 8d 41 26 11 5a 53 58 33 b0 a8 71 a8 6c | e8 76 92 5b e2 75 f3 94 63 68 60 f5 a8 87 0f b1 | 85 e3 57 f0 0a 68 7c 03 0c 38 78 58 ee f2 b7 98 | 27 f8 ff c8 7f ae 35 5b f2 27 8d 00 b6 82 75 2b | 3b 8a 79 42 25 39 44 44 74 88 57 0d 59 d9 ac 5f | 3a a3 28 54 30 c8 14 8d d4 ac c4 45 3f f7 ef e3 | 1f eb 55 97 53 44 9f 09 90 a7 a8 b1 9f 93 b7 ec | 77 b6 57 89 c8 dc e6 37 8a a8 71 f3 b4 89 24 f8 | 4d 88 b5 f8 54 45 64 00 76 98 8f 87 5f 00 73 6a | f6 f0 80 19 81 11 66 a0 99 ea 82 6c 63 da b4 a5 | 98 93 6c 76 ef 6c 97 72 9f 10 64 96 91 57 93 6d | a1 3f 92 89 58 38 d2 cf 72 5f 0f 1e 71 7d 51 50 | af 30 4c 3a ad 78 8a 2d 7e 0c 42 b8 89 96 d8 fc | a1 5f f4 b6 9f 10 b4 87 26 b0 a3 fb 36 06 d9 24 | c5 ea bd 98 29 fe 3b d7 81 37 c6 01 f7 9b f8 78 | 29 00 00 24 c7 58 00 d8 91 d9 da 4a 3e 8b 1d 2d | a3 43 99 18 27 ab 56 0f 2a b9 54 4e 52 a3 14 24 | 6c 73 a2 b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 40 3a 6a 95 ab 61 8d 6b 1f 3b c7 26 | b3 ad 90 46 7f 26 ab 97 00 00 00 1c 00 00 40 05 | 80 ec 8b 4c 52 09 6e c6 12 ca 33 07 bd aa 68 3f | 33 bf 9b d1 | libevent_free: release ptr-libevent@0x7fb3440251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a855c0 | #224 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 89 b3 52 1f 0f f1 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #224 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #224 | rejected packet: | df 89 b3 52 1f 0f f1 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #224: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0718 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f61a0 | handling event EVENT_RETRANSMIT for parent state #33 | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #33 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #33 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49619.617045; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005604 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a855c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #33 | libevent_malloc: new ptr-libevent@0x7fb3440251c0 size 128 "road-eastnet-nonat-33" #33: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #33) | c7 46 be 2e 5d 25 78 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 fb 56 35 bc 7c 07 73 43 c0 53 96 f8 9b 69 93 | 49 fe be 57 af 79 18 68 5a 92 2b 2b a6 ed e4 23 | 35 6b 49 80 b0 8c 38 3d c5 a9 f4 61 c1 8b 08 4d | 96 53 f0 d9 1b 6c 56 bc 0d ea 97 5b b0 d7 0d 16 | 49 88 40 6d 71 9e 2d 30 fe 42 42 37 20 10 14 5c | 75 38 c4 da 71 b3 b1 3b a6 23 58 dc a3 9a e0 40 | ae dc 8e cf de 76 e6 55 4e 33 19 fe 18 08 f5 70 | 8e 50 6f 64 32 2f d6 7a 45 39 d0 ba 32 a4 1e ab | 2d 4d 83 e7 1f d4 28 47 30 da f7 2e a0 79 9c 09 | 2b 6b 46 2e c8 c1 e5 37 84 54 0b 0c 97 40 ae db | 52 08 f5 e5 d5 a9 49 2a c9 b8 1f f6 14 c7 78 d5 | 70 93 cb 5e 8c 96 b6 ac 74 c2 85 cf 89 ad 75 5d | fe 0b 68 86 21 96 4e 79 63 5a 81 98 b3 45 c5 f0 | b2 fd 49 e2 ff b2 a3 2c 96 3c ba 10 d8 3f 86 56 | e0 c6 d2 d5 d7 7d 5f 52 2a 95 0f 65 04 12 82 60 | e3 5b 42 b7 a8 9e 92 b0 fa 34 79 45 e1 34 ab c5 | 29 00 00 24 b8 c6 4b 62 72 20 c9 09 07 72 44 d0 | 79 00 e2 dc 8f 6b 83 e9 3d 67 2f d3 a6 5d 27 77 | 58 61 12 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 b6 d4 e5 76 6f b7 90 e8 c3 ad b3 | 49 49 44 7a b5 13 9b a6 00 00 00 1c 00 00 40 05 | 15 0a 54 d9 c3 ee ba ab b9 96 60 bb a3 40 4e fb | d5 1b 34 be | libevent_free: release ptr-libevent@0x7fb38802d3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f61a0 | #33 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 46 be 2e 5d 25 78 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #33 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #33 | rejected packet: | c7 46 be 2e 5d 25 78 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #33: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0724 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aeb500 | handling event EVENT_RETRANSMIT for parent state #196 | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #196 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #196 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49619.644406; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.007368 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0a980 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #196 | libevent_malloc: new ptr-libevent@0x7fb38802d3a0 size 128 "road-eastnet-nonat-196" #196: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #196) | 56 d5 c7 24 09 fd 90 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 8f 70 c3 ed 41 cd d6 d2 1b f8 2a 49 7b d2 65 | 1d 48 5c 44 f7 09 ac 3e 9c 08 81 f6 b3 65 8e 9b | 4e f9 50 8c c8 e7 7b 20 7c 22 4e ca 64 9d 3b 78 | 6f 58 b3 9e 1c 75 62 70 7c 61 ef 34 cb 86 a6 1c | 58 51 2c 23 30 92 4a 45 b4 b8 ae 94 76 05 b8 97 | 44 53 83 e4 01 1b 12 69 e8 13 a8 21 92 4d 3c f0 | 3d 68 d7 2a 32 bb e5 1c b4 56 88 6b 46 1e 40 2b | 43 ea 27 d3 55 2f cf 9a 31 8f 09 d3 05 58 fd 61 | 42 c4 db 9a 42 0a 57 3b 19 4b c6 5f d6 ea 27 6a | 7f bf 49 6f e7 37 63 cd b0 56 7c d1 00 23 b6 75 | b5 9d 85 99 73 08 5b 3f 63 22 53 47 75 51 36 9e | 7d c3 2d 34 ef d2 c8 dc ed 30 18 e1 fc d9 f1 f0 | 6e d9 74 09 8b e8 94 06 ae aa 96 8e cd d8 85 a8 | 1d 1c c6 45 d2 df a8 88 f7 4f 9f 49 92 80 ca a3 | 24 f7 b2 76 f6 e9 c7 34 75 8f 12 25 2f 88 bf 00 | af 80 e2 a0 d5 42 a1 0f 8a 93 9d 2c 68 e7 dc 08 | 29 00 00 24 ed 57 45 ce d5 85 17 38 4f bc 48 45 | b8 48 4b 6f c9 94 96 34 41 c5 a0 9e ee f3 85 65 | 17 35 60 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 33 d1 79 b1 42 18 cd cb 66 ed 21 | 50 1a 62 22 98 16 96 33 00 00 00 1c 00 00 40 05 | 37 d9 a8 f6 16 ad 1f 94 88 50 6d 18 f9 5d 91 a6 | 7a d6 46 08 | libevent_free: release ptr-libevent@0x7fb3480407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aeb500 | #196 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 d5 c7 24 09 fd 90 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #196 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #196 | rejected packet: | 56 d5 c7 24 09 fd 90 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #196: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0692 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a50110 | handling event EVENT_RETRANSMIT for parent state #216 | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #216 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #216 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49619.64675; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004872 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aeb500 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #216 | libevent_malloc: new ptr-libevent@0x7fb3480407f0 size 128 "road-eastnet-nonat-216" #216: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #216) | e7 ef a7 cc e6 d3 f6 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 f0 d1 10 02 25 ff 09 54 9a 27 0a d6 e1 75 e9 | 4b 25 09 80 13 1a bd 53 71 22 e7 a5 75 81 d1 8a | 25 47 40 c6 b3 5d 03 6d 9e 83 d1 92 a9 46 5d 4b | 0d 28 c0 ae 0f 26 63 48 22 7d dc 47 5b d5 77 07 | 29 79 06 04 6b 6b 34 8f 3e bd d3 ec 63 f9 78 20 | 47 7a 08 c2 44 b5 60 c5 73 9a 3e 6a 29 e5 d6 96 | 62 d8 90 b5 3b c6 8d 28 1b e2 87 89 6b 14 69 c3 | 86 f7 90 a6 77 5f 07 46 5b 86 a4 37 e5 80 d5 e7 | e9 b6 1c 3b fa 48 83 e6 86 71 bb 22 3d c4 ff 70 | 08 57 53 75 69 80 73 34 3e 38 54 52 61 ad 52 b2 | 0c fc ac 12 69 16 4e 5c 14 e0 22 a5 7c 1b 1c 49 | 5d 41 d4 29 4c a2 8d 47 62 eb 64 7a 68 a3 77 fb | 8e a3 71 52 dc 60 0e ae 77 65 2b 4f c0 c2 80 7f | 93 d4 83 22 60 eb f0 ba 08 6e ef a3 c7 ae 6d c8 | ec 04 d3 0d a9 20 db 31 6f de c9 65 e4 0b a9 11 | a7 ab 82 ef 2d c1 74 f2 d3 be 19 9c 04 b0 c9 04 | 29 00 00 24 95 80 09 e7 7a 52 78 28 1a 48 0b 4c | 98 2f 28 0b b9 93 53 be d8 60 a3 a7 18 da 10 17 | 4f 70 e3 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 7b e5 1c 98 48 0c 58 81 2b 7b fc | 78 24 fa 6c 15 2c ab c0 00 00 00 1c 00 00 40 05 | 11 88 73 d8 fc 53 52 81 2d 03 8d 95 6f 83 2f ef | fe a8 7c ee | libevent_free: release ptr-libevent@0x557d469e1b60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a50110 | #216 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 ef a7 cc e6 d3 f6 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #216 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #216 | rejected packet: | e7 ef a7 cc e6 d3 f6 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #216: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.069 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5f0d0 | handling event EVENT_RETRANSMIT for parent state #142 | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #142 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #142 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49619.676187; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006474 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a50110 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #142 | libevent_malloc: new ptr-libevent@0x557d469e1b60 size 128 "road-eastnet-nonat-142" #142: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #142) | 41 39 64 14 10 77 e9 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc f2 be 7b 98 10 67 76 c4 71 20 94 23 de f4 7b | f8 c4 af 24 ce 1c a4 2e 78 f9 2e 3f 92 4d 95 da | b0 24 e9 98 5b 94 79 3a a7 65 db 91 8d 98 6f 60 | 39 37 f9 9a 0b 2c 5f 0f 2f ab bc 06 c4 26 ad 3a | cb 21 02 45 52 b2 d1 fd f5 7c fc a1 d2 ea 0e b1 | ba 62 e9 1e b2 ad cc 0d 27 c3 3b 69 ca 23 50 32 | eb 22 0c cc d3 fb 5f db 9c 9b 31 50 db f4 03 47 | 71 96 ad b4 c6 fc 17 71 7e b3 b0 ab 55 4f e2 51 | da 27 48 0f fb 5a 5c 14 f2 9f a1 0b bc 57 8c f8 | af d3 b0 d4 6a 72 47 34 c3 ab 52 90 fc 49 ad 86 | 46 90 a0 10 2b fd 92 3d 6b 38 ac d2 f1 fb fa a7 | 40 39 9e cd 87 10 91 66 2e ab 47 10 a6 88 c0 52 | d8 c9 3f b4 b3 d0 6c 91 b2 0e 49 7c 2a dc 94 d8 | 21 4c c9 df 3c b1 a2 d4 d4 f0 4b 25 d9 08 87 46 | 22 c7 0a 5a cc 6c a2 0b 4a 09 99 09 fb f2 2e 33 | 66 ad 2f c0 16 9e 3c 6f 99 46 27 79 f7 75 88 d3 | 29 00 00 24 1d 1b 1c 65 cb f5 ff f0 c9 00 69 e9 | d1 b3 22 15 24 4a 7b cc a6 4c 2e 0b ef 42 21 b2 | d1 d6 06 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 3a fc 83 97 ab 17 41 58 12 a1 f9 | 48 2f 13 f0 7a 91 16 3d 00 00 00 1c 00 00 40 05 | 13 50 5d f0 78 ea 60 59 51 2f a8 23 2c 7c d0 1f | 4c a0 b1 5b | libevent_free: release ptr-libevent@0x7fb37c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5f0d0 | #142 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 39 64 14 10 77 e9 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #142 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #142 | rejected packet: | 41 39 64 14 10 77 e9 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #142: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a76210 | handling event EVENT_RETRANSMIT for parent state #34 | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #34 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #34 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49619.685003; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.010744 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5f0d0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #34 | libevent_malloc: new ptr-libevent@0x7fb37c0251c0 size 128 "road-eastnet-nonat-34" #34: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #34) | 6d a4 8e 40 25 ac 37 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 f2 a8 cc bb ec 52 8f ff d3 4f 1e 29 f8 d2 55 | ab 15 48 e3 86 d2 3c 7c c1 31 02 4c e6 92 88 7e | 1c 57 68 2c 31 6d 99 d6 04 b4 80 d9 9e 5d d6 2f | 5a 7c 33 74 f6 a2 f4 af 71 14 01 00 45 ac 02 2c | ae fd dc f0 fb 16 b1 b8 bb b1 c9 b6 79 4a 45 9c | f4 6e 30 a0 38 dd b1 84 0e 3d b2 47 58 b0 ed c1 | 2c 5c e6 69 11 9f 94 94 7a 6d 4e 80 2c 22 d1 2d | b1 3c 47 06 4d 81 ee b9 c9 ba 0f 94 7b ed d2 71 | 8c 4b 77 a2 43 7f 68 8c 2b 66 69 53 94 cf 5a 27 | 05 7e 88 ec 42 d8 31 27 ae 04 92 bf 4a 26 5e 51 | 58 d6 5c 7a 0b 0b 73 c1 d6 39 9b da c3 56 61 4e | 3f 7e 4e 21 30 a1 53 bd c0 b7 f9 c7 e1 cc 61 3a | e9 b4 0e 5d 6b 1a 6c d3 c1 42 80 a0 b9 ee e4 20 | 50 5f 0b 18 55 d4 17 9c be 51 af c3 be 4e 5f 48 | b1 02 bd 4d 0a 84 45 32 17 0f c9 bf 50 68 f3 a6 | 11 69 ef 13 ba a2 fb dd c4 95 c8 b3 71 8c 02 9e | 29 00 00 24 20 3c 42 13 ea f1 47 8b ab 88 6c 38 | 29 a2 e3 60 5f 2e e8 36 7d 92 76 6d 48 1c fe a8 | 8c f2 3e 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 92 97 87 98 41 7a 2f 24 03 5c de | 5f 9b fc ff 10 46 f5 79 00 00 00 1c 00 00 40 05 | 10 63 6f 88 71 aa 1b 8a ba b8 d4 ac c9 e8 55 07 | 6b c5 63 c0 | libevent_free: release ptr-libevent@0x7fb38002d3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a76210 | #34 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d a4 8e 40 25 ac 37 c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #34 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #34 | rejected packet: | 6d a4 8e 40 25 ac 37 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #34: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aef6c0 | handling event EVENT_RETRANSMIT for parent state #229 | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #229 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #229 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49619.696061; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.505157 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a76210 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #229 | libevent_malloc: new ptr-libevent@0x7fb38002d3a0 size 128 "road-eastnet-nonat-229" #229: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #229) | 20 97 6e 08 83 53 46 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 59 ef 6c f0 3c e5 e0 cc 33 49 bc 05 30 a4 2e 63 | 40 b9 24 1d 30 3f 19 68 ce 4b ca f6 ef 1a a6 a9 | 5d 39 1c 86 c0 9f ab 47 fc 91 e7 41 3f 1d 89 da | 32 34 23 b2 92 45 82 aa b6 a2 b3 81 08 5d d4 d6 | 1a c6 db 13 96 83 8f db 02 0b e9 7b b2 14 62 aa | e1 68 37 82 79 1d ad b1 57 7f 25 a7 73 b7 37 87 | 5f 18 8b b1 9d a8 83 da d0 1c d4 ab 43 2e 39 e8 | 66 1a a5 36 6d 58 db 88 48 18 f4 d1 6a aa ea a2 | d4 61 12 6e 9d 66 34 26 cc 34 20 9e ee d3 7c 0e | b5 c3 c0 49 b9 a1 7d aa 84 e0 16 0d 30 3d 39 8b | 45 8b ca 2d 9a b8 31 03 33 bc e7 3c 1d 38 7b ad | c5 f3 f6 f7 be e9 2c 8c 87 60 cc eb a3 f8 ab f2 | a1 ec 16 ca f8 6c 96 69 77 3b 56 28 d0 57 05 dd | fa 6d 9c 0b 58 57 29 b7 d8 9e 77 ff a1 d9 ae 60 | 7b 96 73 6a b9 b8 7b 60 c3 f5 35 8e 8a fc 09 4d | 37 4c b1 4a c0 bc c4 90 71 ce a8 9f 0b 83 84 f7 | 29 00 00 24 bf ef 58 c8 50 05 c6 7d 73 f4 dc fa | 25 60 4d 48 2b 2d d1 e6 80 96 87 ef d5 27 62 2c | 4a bf b7 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 5b b6 cd 13 a1 fb 02 f0 d8 20 b7 | ee bd 8b 90 01 a4 d0 34 00 00 00 1c 00 00 40 05 | f3 e5 ac c7 45 89 3a 77 ae 9e aa 53 4d 4c 6f 3c | 03 52 b3 50 | libevent_free: release ptr-libevent@0x7fb3400357c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aef6c0 | #229 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 97 6e 08 83 53 46 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #229 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #229 | rejected packet: | 20 97 6e 08 83 53 46 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #229: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.068 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-234" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-234' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #234 at 0x557d46b136c0 | State DB: adding IKEv2 state #234 in UNDEFINED | pstats #234 ikev2.ike started | Message ID: init #234: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #234: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #234; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-234" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-234" IKE SA #234 "road-eastnet-nonat-234" "road-eastnet-nonat-234" #234: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-234 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-234": constructed local IKE proposals for road-eastnet-nonat-234 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 234 for state #234 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aef6c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #234 | libevent_malloc: new ptr-libevent@0x7fb3400357c0 size 128 | #234 spent 0.154 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-234" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.234 milliseconds in whack | crypto helper 17 resuming | crypto helper 17 starting work-order 234 for state #234 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 234 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 234 time elapsed 0.00098 seconds | (#234) spent 0.986 milliseconds in crypto helper computing work-order 234: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 234 for state #234 to event queue | scheduling resume sending helper answer for #234 | libevent_malloc: new ptr-libevent@0x7fb350046040 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #234 | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 234 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #234 | **emit ISAKMP Message: | initiator cookie: | f2 fd b6 5b dd 65 ca 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-234 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 28 84 9f 8e f2 4d ae 28 c3 a6 33 85 a7 41 17 2e | ikev2 g^x a7 fb 37 ec dc 5e da 22 ed a7 d6 7f e1 29 5e 3a | ikev2 g^x c1 0a e8 67 19 e8 ac d8 ab c4 ce 43 3f 4e 0f bb | ikev2 g^x 7c 98 41 2b 6f 77 ca d9 32 a6 af f9 98 cd dd 12 | ikev2 g^x d9 37 bd e9 25 be 75 b5 bd 5e e0 83 6f 45 f8 da | ikev2 g^x 18 94 6a f4 88 bf 0e 4d e2 07 2b 36 d8 6f 3a 20 | ikev2 g^x 7f 78 6a 85 8a e5 3c dd 81 bb 63 90 5e cb bc ba | ikev2 g^x da ba 10 8a c6 0e 8a aa 71 5a 96 4e 6c 70 41 b3 | ikev2 g^x b5 ed c1 a3 26 f6 9d 2f 3e 30 60 a8 7a d4 51 c7 | ikev2 g^x c1 d0 6f 12 78 fa f6 7a 64 88 82 80 72 24 ff 23 | ikev2 g^x 06 91 a9 95 a1 36 33 ce f2 c2 55 d0 b5 3c 49 79 | ikev2 g^x 6f 7f 3e 42 f0 3e 13 68 8b e1 82 c2 f7 ef 92 e7 | ikev2 g^x 73 e6 b2 0b c7 04 76 33 01 80 30 de 76 f1 e6 56 | ikev2 g^x a7 c5 01 91 93 65 f4 09 85 c4 02 fa 63 8b e5 e6 | ikev2 g^x 21 78 9f 81 bf e4 b0 d6 2d 62 90 d2 7c 1e 4b d9 | ikev2 g^x ae 42 db a5 3c 94 61 a1 2c 3b 37 25 2d 53 32 5c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9d 5d 40 b5 2d ec 67 ae 83 64 17 c2 32 3b d8 b9 | IKEv2 nonce 21 ed 79 bc f4 91 0a 50 e4 b3 2c c0 f4 72 58 85 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f2 fd b6 5b dd 65 ca 9a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ea | natd_hash: port= 01 f4 | natd_hash: hash= 3c 89 bc a1 a0 be dd 06 e7 d6 84 21 72 6a c6 f8 | natd_hash: hash= b6 a8 a1 51 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3c 89 bc a1 a0 be dd 06 e7 d6 84 21 72 6a c6 f8 | Notify data b6 a8 a1 51 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f2 fd b6 5b dd 65 ca 9a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 53 6b 47 d7 1e 7d 4e e3 0d 3e 41 f7 75 f0 92 15 | natd_hash: hash= 7c 13 7e ba | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 53 6b 47 d7 1e 7d 4e e3 0d 3e 41 f7 75 f0 92 15 | Notify data 7c 13 7e ba | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #234 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #234: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #234 to 4294967295 after switching state | Message ID: IKE #234 skipping update_recv as MD is fake | Message ID: sent #234 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-234" #234: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.234:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #234) | f2 fd b6 5b dd 65 ca 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 84 9f 8e f2 4d ae 28 c3 a6 33 85 a7 41 17 2e | a7 fb 37 ec dc 5e da 22 ed a7 d6 7f e1 29 5e 3a | c1 0a e8 67 19 e8 ac d8 ab c4 ce 43 3f 4e 0f bb | 7c 98 41 2b 6f 77 ca d9 32 a6 af f9 98 cd dd 12 | d9 37 bd e9 25 be 75 b5 bd 5e e0 83 6f 45 f8 da | 18 94 6a f4 88 bf 0e 4d e2 07 2b 36 d8 6f 3a 20 | 7f 78 6a 85 8a e5 3c dd 81 bb 63 90 5e cb bc ba | da ba 10 8a c6 0e 8a aa 71 5a 96 4e 6c 70 41 b3 | b5 ed c1 a3 26 f6 9d 2f 3e 30 60 a8 7a d4 51 c7 | c1 d0 6f 12 78 fa f6 7a 64 88 82 80 72 24 ff 23 | 06 91 a9 95 a1 36 33 ce f2 c2 55 d0 b5 3c 49 79 | 6f 7f 3e 42 f0 3e 13 68 8b e1 82 c2 f7 ef 92 e7 | 73 e6 b2 0b c7 04 76 33 01 80 30 de 76 f1 e6 56 | a7 c5 01 91 93 65 f4 09 85 c4 02 fa 63 8b e5 e6 | 21 78 9f 81 bf e4 b0 d6 2d 62 90 d2 7c 1e 4b d9 | ae 42 db a5 3c 94 61 a1 2c 3b 37 25 2d 53 32 5c | 29 00 00 24 9d 5d 40 b5 2d ec 67 ae 83 64 17 c2 | 32 3b d8 b9 21 ed 79 bc f4 91 0a 50 e4 b3 2c c0 | f4 72 58 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 89 bc a1 a0 be dd 06 e7 d6 84 21 | 72 6a c6 f8 b6 a8 a1 51 00 00 00 1c 00 00 40 05 | 53 6b 47 d7 1e 7d 4e e3 0d 3e 41 f7 75 f0 92 15 | 7c 13 7e ba | state #234 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3400357c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aef6c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aef6c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #234 | libevent_malloc: new ptr-libevent@0x7fb3400357c0 size 128 | #234 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49619.718161 | resume sending helper answer for #234 suppresed complete_v2_state_transition() and stole MD | #234 spent 0.477 milliseconds in resume sending helper answer | stop processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb350046040 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 fd b6 5b dd 65 ca 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #234 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #234 | rejected packet: | f2 fd b6 5b dd 65 ca 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #234: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf50 | handling event EVENT_RETRANSMIT for parent state #197 | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #197 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #197 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49619.743102; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.023598 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f61a0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #197 | libevent_malloc: new ptr-libevent@0x7fb350046040 size 128 "road-eastnet-nonat-197" #197: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #197) | 76 fd 06 22 f8 72 39 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff 68 ad 96 cd 76 be 78 ca de ba cf 7d b8 d2 27 | eb 47 3d ab 5c da 69 f4 c0 aa ef 37 1d c8 bc 64 | b3 77 c8 06 c7 c1 ca 6e ba 13 a5 88 a0 2f 7d 28 | 77 76 19 e0 b9 08 19 f4 ea 19 57 8a 4a c5 51 64 | b2 b3 06 1d b7 55 89 e3 2f 55 c2 0a 68 16 ae bf | bc 84 d6 24 e3 0d 3a 6d 7f b0 26 cf fc 83 69 6f | 06 6c 19 78 05 aa 1a a7 a3 53 01 3e 4f 01 0c e2 | b6 b8 5e d8 44 74 c4 4a 7b 03 78 a3 0d 18 93 01 | ca 83 a7 98 02 8f 9a c5 fb 52 4a 95 fa 85 65 9f | 48 a4 30 21 ca 8f d8 e0 98 f5 f9 49 2a 0a 5a b1 | e0 a0 a3 25 65 8b 86 36 1d 17 ff 3c 76 35 24 e3 | b6 f7 d8 e5 22 2f 0d 80 58 07 89 c1 b8 b9 b6 a3 | ac a9 f3 74 55 c9 1c c7 ef 2f b9 00 be f9 d3 c9 | 30 e9 ef 92 c0 ce 36 02 ea 19 c8 d7 f7 c5 6a 1c | b8 72 5b 69 21 d3 b8 ca 13 78 68 f5 5e 6f 80 64 | 1c aa ea 24 03 ee 29 9b c1 bb 83 e4 a6 7c 10 08 | 29 00 00 24 74 4f 18 14 83 36 22 20 12 7b 44 86 | f2 c1 e1 0b 40 a8 83 e6 1a 42 e2 88 a2 98 21 31 | 2c b2 85 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 2f 89 09 b5 52 02 b8 23 bc 44 51 | 94 1d 2d 47 4e ed 65 d6 00 00 00 1c 00 00 40 05 | 73 fc 3d fb 5c fa a5 ca c9 53 fd 67 5c 67 b8 86 | 11 c4 a6 88 | libevent_free: release ptr-libevent@0x7fb3500180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf50 | #197 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 fd 06 22 f8 72 39 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #197 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #197 | rejected packet: | 76 fd 06 22 f8 72 39 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #197: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab39c0 | handling event EVENT_RETRANSMIT for parent state #143 | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #143 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #143 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49619.752185; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.010034 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf50 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #143 | libevent_malloc: new ptr-libevent@0x7fb3500180b0 size 128 "road-eastnet-nonat-143" #143: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #143) | fe 08 8f c1 30 76 36 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 59 10 0a 33 69 60 29 ec cb 88 e8 3a c1 e5 55 | 26 67 1a ec 62 9e 8e 22 6f b0 d9 0b 9d f1 88 4a | e6 aa 92 54 ef 0d ca 48 fc de 93 8e cc 1b be 9e | 2a 5e f3 2a 08 3f 42 43 4c 7d 9b 8f 28 00 df 48 | e8 21 87 a4 f6 50 fb f0 b0 17 a4 67 51 7c 94 f5 | bf 3d 99 c9 85 3f 6a 47 12 df 61 eb 04 e7 9a 6c | b7 d5 b3 00 34 48 70 01 04 f1 38 e6 2a 1b 58 fe | 45 c8 88 15 fe fd f8 a1 17 d4 b0 e0 da 11 1c 39 | ad d0 8c b8 02 34 e9 cc d8 17 f6 f2 94 8e c1 9b | bc 9e 9d 32 92 5b 2a 34 cd 6a fb 2e 20 96 68 57 | 5b d5 8b 51 c6 02 26 d3 9c 0f 2f 12 c2 48 e7 4a | 4a 0b 12 1b 9e 56 b5 85 4d d5 b2 31 1e ed 3e 7b | 36 b4 c3 2a eb a3 dd fa 18 8b db b6 6e 6f 26 25 | d4 07 3d fa df 09 23 4b f0 61 a0 e2 e7 88 89 b7 | 4a 08 a7 b8 23 da c7 50 cb 24 82 e1 9d bc ac 0c | ad 50 25 66 22 31 ab bb bb 61 7d f2 14 fa 8e 17 | 29 00 00 24 5c 1f 93 ac 9c d9 6d bc 1c 83 06 35 | 6d 1c ce da 8c 6b 1d 7b a8 23 6f c9 2c 64 35 22 | c8 0a 79 63 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 3f e0 89 56 6b 89 d9 2f e3 34 a5 | 92 0a 7f a5 70 51 be 33 00 00 00 1c 00 00 40 05 | 8d 31 d1 99 a4 16 d7 c5 96 20 51 29 c7 9b 80 8c | b7 4b 38 13 | libevent_free: release ptr-libevent@0x7fb340030080 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab39c0 | #143 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469e7260 | handling event EVENT_RETRANSMIT for parent state #35 | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #35 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #35 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49619.752366; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.012441 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab39c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #35 | libevent_malloc: new ptr-libevent@0x7fb340030080 size 128 "road-eastnet-nonat-35" #35: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #35) | ef 15 ea 36 a5 a5 5c 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 96 b3 aa c0 4d d9 88 e5 ac e1 94 c5 3f 96 d9 | b4 11 6c 13 85 3c 47 49 a4 e7 6c bf 49 2c f7 e6 | 82 c1 3a 00 a1 f9 46 f7 54 13 9f 65 48 18 8b 9f | e6 da f8 f3 07 a0 ac 41 d5 a9 3b e6 a7 7c a3 81 | db 32 9e 99 47 70 04 b0 f4 2d a4 b0 a4 3b e1 28 | 9f 63 a2 94 b7 1f 9e 68 18 47 6f ef 05 c0 65 15 | cc 6b 7e 6d 5e e8 2a 06 87 47 6c aa e2 89 a2 b1 | 87 d5 9a c7 5c f6 c5 c9 ef 9a f5 1e 14 44 ed f6 | 21 c2 10 91 92 32 f4 48 3d 48 76 7f da 54 41 70 | 3a 27 f3 0e a6 36 ab ef 51 4a ee 27 f3 fa b5 4a | 81 80 97 f8 12 4a 6b 6e 11 f7 41 fe d5 56 ec af | 7e dc 33 c0 77 e2 37 b5 3f fc b0 40 58 cb 92 b6 | 44 3d 99 0d 17 ae 15 bb a7 c0 2c 1d dc 42 f0 67 | d6 5a 17 88 ce 32 f6 da 90 65 b7 17 83 70 da 67 | c5 33 42 42 d7 1a 6c 70 ed 40 df e9 ee 39 2a 8f | f5 b4 db 3f e7 42 51 2e 4d a9 fe 76 ba 09 20 58 | 29 00 00 24 f0 8c e1 d2 ee 2f 9e 4d 17 8a 20 ca | cf 55 95 6a 83 c3 98 8f db 61 db bb f1 69 5e b0 | e6 61 e7 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 5c ea 28 17 8f c3 f5 57 90 ad 1e | 3a ae c2 e5 e1 92 7b 3c 00 00 00 1c 00 00 40 05 | cb 88 24 12 73 0e 41 cb fe 6b 7e d6 a5 c0 bb a2 | e1 60 1e c0 | libevent_free: release ptr-libevent@0x7fb38402d380 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e7260 | #35 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 08 8f c1 30 76 36 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #143 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #143 | rejected packet: | fe 08 8f c1 30 76 36 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #143: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 15 ea 36 a5 a5 5c 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #35 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #35 | rejected packet: | ef 15 ea 36 a5 a5 5c 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #35: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0558 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae48c0 | handling event EVENT_RETRANSMIT for parent state #225 | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #225 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #225 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49619.755575; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003123 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf00 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #225 | libevent_malloc: new ptr-libevent@0x7fb38402d380 size 128 "road-eastnet-nonat-225" #225: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #225) | 1c 46 35 b1 a5 15 7d 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae fb 41 53 6b 81 0b c3 2d 10 6f c4 43 42 9b b5 | 58 ae de 87 ce bb b8 82 21 69 b3 17 de bc f9 c2 | a6 34 e7 7f 32 f0 7d a7 6c 08 3e 2b 62 ab 16 a0 | 49 34 97 75 bc a1 e7 57 c6 b6 15 50 f3 8a f1 c4 | e3 18 e0 09 c0 26 64 c1 d3 38 7d 95 30 90 58 4d | 99 27 bc 98 4e c8 b5 39 36 2c 46 50 c2 b8 f6 07 | a6 3c 00 2b 8d 8c 50 f6 a6 08 bd fd 79 68 91 be | 81 69 f3 24 98 59 43 c8 78 e1 dc 86 d2 16 6e a3 | 6a de dc a4 19 ff e6 d6 63 67 69 75 d8 ae 52 31 | c3 a7 ea ea 95 69 03 74 0f ef e1 6f 99 0c 56 d4 | 62 d0 1b 8d 8f 7c ad 94 ab 7c 03 43 80 8a 6e bb | 36 aa d3 44 03 e6 5c 20 d3 4b 45 e5 a2 5c 00 25 | 37 ab 32 ce e0 ae 35 8e 13 d7 03 37 11 57 20 f8 | ae 87 85 bc 10 d5 2c 64 54 e7 c4 49 10 99 df 04 | 79 9e f4 43 41 4b 6a 31 13 21 e7 cf d7 1a da 5b | 4b c0 6d 43 c6 e7 f0 86 e7 2a 75 03 ec 4c de 27 | 29 00 00 24 27 0f 48 fe da 9f b7 b6 f5 85 2e 21 | 09 ff e1 4d 05 12 3c c0 4b 2e ad df df d0 69 83 | 11 81 8e 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 11 33 1d 86 3c cb d4 6f 7e 68 c8 | 95 dd 6a 6a 4f 3e eb 1f 00 00 00 1c 00 00 40 05 | 41 16 5c d3 40 8f 72 70 a4 ea ff c4 c5 31 7c 04 | 7c 81 7f e0 | libevent_free: release ptr-libevent@0x7fb3480251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae48c0 | #225 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c 46 35 b1 a5 15 7d 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #225 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #225 | rejected packet: | 1c 46 35 b1 a5 15 7d 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #225: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a63210 | handling event EVENT_RETRANSMIT for parent state #230 | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #230 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #230 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49619.769905; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50064 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae48c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #230 | libevent_malloc: new ptr-libevent@0x7fb3480251c0 size 128 "road-eastnet-nonat-230" #230: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #230) | 69 22 82 19 d7 c8 c9 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 71 02 af b0 7d 99 80 ca 0a ed d4 9f 12 56 05 | 6a 75 f1 ff 5b 89 24 b2 2d d4 89 b9 fc ea 10 f2 | df 8b 07 6c 92 3c 32 d6 01 3c 1f 7c 77 2b 56 de | 1e a1 3c 62 24 a6 4e 3c 9e 57 23 35 a7 0e 3a c6 | fa 5e 05 ee c7 8d 32 41 ce 29 80 63 51 1d 1e 52 | 10 94 62 f2 6f 5b c8 e5 23 77 b3 5f 63 5e f3 42 | a7 b1 47 2a 85 90 69 04 a8 c1 76 53 9f c5 2d 06 | 66 93 5b f5 d4 f1 c7 6c 23 0b 21 57 da 55 b4 10 | b4 68 7f 72 aa 6f fd bf fc 43 d5 6e 02 91 b0 ea | ca b7 fc 32 ec e5 bd 79 74 66 56 52 a1 e5 b7 e9 | d9 32 42 bc f6 01 cc 69 66 87 01 cd 32 29 bd 73 | ff aa f2 68 30 ae 30 af 09 b3 2b 2d 0b 90 c5 d7 | e7 b1 60 17 46 74 a0 50 98 f9 06 d2 06 37 1f b3 | 0c 89 d8 99 c7 ac a0 2a 5a 19 c6 cc 6e e1 77 ee | 98 e6 45 5b c8 98 8d c9 0d d9 64 39 5b ba a1 36 | 39 81 f2 e5 39 16 cf c0 fa 26 3f 76 ff 4a de 8f | 29 00 00 24 ca 6b 45 b5 ad 3a dc fb 46 3f ff f9 | b7 9e 2a f6 cb 7b a0 93 c0 ff b4 97 10 4e 36 19 | c5 61 7a bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f fa a5 ce 96 35 1e 80 97 f9 81 69 | 6c 9b 29 c3 b6 c2 c3 05 00 00 00 1c 00 00 40 05 | 7e 27 b2 4c db 32 1f 5b c7 5c 32 4b 9f eb 6e df | 20 af 51 69 | libevent_free: release ptr-libevent@0x7fb35c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a63210 | #230 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 22 82 19 d7 c8 c9 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #230 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #230 | rejected packet: | 69 22 82 19 d7 c8 c9 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #230: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a027b0 | handling event EVENT_RETRANSMIT for parent state #217 | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #217 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #217 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49619.774393; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.021352 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a63210 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #217 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 "road-eastnet-nonat-217" #217: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #217) | d2 36 bf 64 89 a3 fd 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 f4 5b dc ca 6a f6 be c1 c2 c8 63 19 fb 3a 1f | 70 dc de 5b 54 b8 eb 8d 2b 5e fc c2 60 b3 0c b8 | 9b c4 53 f6 87 96 b1 7e c0 8d e1 b0 c0 a3 08 59 | f8 18 05 78 a7 5e f9 f4 d8 1f 45 f9 8a db 9c 99 | 0e 07 3e 2a ba bb 8c 14 d2 d8 55 43 f4 c4 74 29 | 81 f6 ff c1 34 b9 34 a3 97 b9 37 cc 81 87 17 91 | 44 f4 e5 3a 28 aa cc 0c 3a 69 40 14 f6 3b 92 b7 | db 83 50 42 f0 36 82 ac f1 19 7e 5c 4e 90 c6 ec | cf fd 70 a2 a6 79 e2 bb b0 2b b1 df 8d e0 62 86 | 52 eb e4 a9 60 bc ec b9 d7 99 33 ce 9f d2 75 d6 | ea 82 29 7d d5 df f1 81 05 f9 8d d7 ff 39 0b 3b | 2c fe 6f 59 ae d2 c3 c5 12 3f 62 54 ed fc 61 4f | c2 74 90 8a b6 79 a0 b5 31 fc 8c d5 cb 45 21 48 | b0 1d 10 ec cf 2a b3 30 35 95 3b 32 3a 79 8c 33 | ab 0a b9 7d 4f 43 6c 9b d9 20 e5 7e 28 a9 95 05 | ed 38 6d f0 1a 10 8c 41 cd 59 c0 e4 ec 28 25 e4 | 29 00 00 24 50 f4 8b cc 88 78 9a 77 ca 06 50 f2 | 60 9a 06 39 64 9a 92 2a 1d 6a 83 ae 2a 35 88 82 | 1c 3d 43 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf a3 05 4d ff 0f f5 da 0b f8 e7 54 | e5 88 17 6e 1b 78 5e cb 00 00 00 1c 00 00 40 05 | 9b 1b 06 2c 11 9c 55 41 9d b0 16 46 62 0b cd 66 | 9f 92 84 50 | libevent_free: release ptr-libevent@0x7fb37c046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a027b0 | #217 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 36 bf 64 89 a3 fd 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #217 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #217 | rejected packet: | d2 36 bf 64 89 a3 fd 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #217: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_RETRANSMIT for parent state #36 | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #36 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #36 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49619.816718; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005518 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #36 | libevent_malloc: new ptr-libevent@0x7fb37c046040 size 128 "road-eastnet-nonat-36" #36: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #36) | c4 93 27 79 3b f0 36 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 44 1e 02 70 5f fd 14 41 57 b4 33 c5 4d c1 bf | 56 a3 d0 f5 4b 1b 15 73 5b 56 52 91 f2 4c 9d dc | 3f 2d 5a 36 27 be 97 1b 2d 43 21 16 b5 25 60 73 | 31 d7 04 cb ac b3 fd 19 61 2f 36 91 05 d7 55 8c | 92 5d 99 4b ae f6 cf a1 6e 2e de fa cb a4 7e 7e | b4 08 08 4f 90 51 13 b7 5b cb 7e 2c db 61 c5 d9 | d2 2f 86 cb df 97 d1 5e d4 95 3b c2 71 e2 2b bf | 7b e5 e9 8b bd 5c de 24 ac 5a 8b 4a 5d 3b ff 1e | f8 f4 2b 7b 96 0c 02 8f ac d9 62 f7 21 fb 07 5e | 9d 3f 41 15 d1 79 65 31 2a 68 5a 1a 56 fc 9c 2a | 20 90 63 93 fd d9 59 08 0d 3a 51 cc ee 1b ca 83 | 3c 5f 8f 03 9c cf 6f 04 52 23 a8 cb 50 43 72 18 | 78 cb 0f 8d bf 67 75 81 61 d9 91 a3 5f f5 1e ad | 09 8c 98 32 17 11 19 f3 54 f2 c6 36 e6 24 63 e2 | 41 b5 39 5c af a7 57 20 af 37 ac c1 12 94 ec 3a | e0 ac a7 07 42 78 d2 32 96 5c a0 ed 7e 90 04 46 | 29 00 00 24 e4 05 e8 ad 6f 35 18 e8 9c ba 2a d7 | ba f9 eb 8c c3 7b 43 88 9a 23 1f e0 cb de a0 8e | 76 67 65 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab a4 b2 11 db 45 90 fb 99 ab 4d 81 | 85 c6 e5 03 d5 18 31 7d 00 00 00 1c 00 00 40 05 | 9e c9 75 d2 3b 5d 13 cd bd fe b5 96 1f 79 bf 21 | fa a0 06 d7 | libevent_free: release ptr-libevent@0x7fb35401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | #36 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 93 27 79 3b f0 36 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #36 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #36 | rejected packet: | c4 93 27 79 3b f0 36 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #36: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e5ca0 | handling event EVENT_RETRANSMIT for parent state #144 | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #144 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #144 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49619.830055; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005472 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #144 | libevent_malloc: new ptr-libevent@0x7fb35401d920 size 128 "road-eastnet-nonat-144" #144: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #144) | 95 f5 7e 43 50 83 91 f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 af 0d 3c f0 04 33 31 65 f6 8e 0a e2 6d 8f 2b | 3a 54 de b3 ca 0f b9 57 94 b3 82 c2 80 38 37 42 | 7f 12 9e 2e 71 85 9b 4b b8 30 72 8d 13 66 8d 18 | cc b4 6c 82 a9 1c ff 5f bc 21 44 b4 04 e3 03 9f | 86 65 ce c2 4c 9e c7 42 cb 55 d7 40 69 8e 4e 35 | 08 db 41 09 bf 5b 9f e9 29 80 fb 24 8c ee 8a 18 | 98 d5 9e 29 b1 2e 48 fa a4 54 8d 89 c7 a3 3f 0e | fc 43 c8 e1 70 19 e6 79 93 90 9a 7f 29 dc 10 54 | 5c 05 ee 55 8b da f3 4a d4 d1 7a 22 56 b9 55 f2 | 83 7d ee 0a 7b 20 d8 88 a4 b2 35 e6 85 84 6e ea | 73 63 0f 8a e4 f5 ba b9 cf c5 6d ef 42 bc 1c 31 | 91 cc e3 6a cc 1c 24 a0 43 43 cd 4a d2 99 1f d0 | 12 0e 0b 61 86 58 8a 2a 98 ff 0e 20 62 f2 a9 6f | 84 85 8e 3d 34 eb 58 ea 76 88 a9 8b bd 38 f7 19 | 7f 52 1e a6 e1 d5 d4 4f 95 6d fa 80 6a e1 f8 3e | c4 ca 0c d0 70 40 4c 9c cb 3a a3 28 2b c3 1c ff | 29 00 00 24 1f 01 c0 5a 0d f1 22 7b f9 16 68 fa | 7d 4a 59 bf c4 b6 f1 ab 98 c0 67 1a 42 27 bf 9d | d6 b1 35 d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 96 0c ca 76 1c 4b 86 73 02 f4 3a | a5 21 4a 8f fe b4 03 ee 00 00 00 1c 00 00 40 05 | 86 67 99 5d 30 be 3d 57 d4 ea af 87 c1 18 21 08 | 32 c4 b1 0f | libevent_free: release ptr-libevent@0x7fb34003b010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e5ca0 | #144 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 f5 7e 43 50 83 91 f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #144 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #144 | rejected packet: | 95 f5 7e 43 50 83 91 f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #144: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0683 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a77850 | handling event EVENT_RETRANSMIT for parent state #198 | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #198 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #198 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49619.830376; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006091 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #198 | libevent_malloc: new ptr-libevent@0x7fb34003b010 size 128 "road-eastnet-nonat-198" #198: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #198) | 38 c2 c3 e5 3e e5 82 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 61 f7 55 c5 c4 5e d0 83 66 79 06 76 ff 91 2f 9b | 12 d0 24 44 db b1 bb 60 15 c5 59 2d d1 18 5f af | af eb bb bf af 0f d5 a7 6d 21 23 3c 7a d5 2f 3a | b3 ef ca 8b 4c db ec bc f0 8c 19 8a b2 60 93 64 | a7 e9 05 44 28 9e 74 5d d9 95 66 66 f7 e5 b4 1f | d5 4f c6 33 f7 6e 5b 80 b4 15 1d 1d 0e 0a 1d ec | d1 57 f6 0c 8a 85 f5 7e b6 52 c9 40 29 cb 30 96 | b6 70 b8 b9 59 b7 f3 5d 39 15 1c 09 f2 d7 22 1a | 2f a6 71 e7 c2 13 1a 03 5a ae 65 2f 9f ab 09 6a | f8 76 83 82 4d 45 c3 9c c4 22 81 0b 0c de 1f 60 | c4 83 6f 80 69 4d fb 9f c9 f8 93 ff f8 9f 02 54 | a0 9a b8 b4 d0 4b 39 8e 82 eb a2 4d fd 53 0b 42 | 08 c3 3b 83 a3 55 58 9c 32 8d d4 50 90 35 7f 36 | 30 25 cb 7b da d7 20 59 55 75 68 f3 54 82 bd 15 | 66 45 d1 d6 73 76 d2 e1 4b 15 1f c3 2a 8d b1 0b | e3 7d 9a 2f f6 14 5c e9 eb 5c bb c0 32 a0 bd c5 | 29 00 00 24 88 f3 29 1f 7c 05 5c 84 29 93 1b 9b | 8b f1 e4 5b 97 f1 d8 9e b8 85 d9 30 2a 5f 45 e2 | 98 31 41 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 05 30 82 a4 eb e3 d3 07 9b b1 ad | f0 ee 15 a7 e9 bb 27 63 00 00 00 1c 00 00 40 05 | 88 8a 68 49 cd fa 13 38 3a 2a 49 e8 1c 37 c8 41 | 63 44 84 75 | libevent_free: release ptr-libevent@0x7fb370035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a77850 | #198 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 c2 c3 e5 3e e5 82 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #198 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #198 | rejected packet: | 38 c2 c3 e5 3e e5 82 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #198: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.057 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #226 | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #226 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #226 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49619.874669; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001988 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a77850 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #226 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 "road-eastnet-nonat-226" #226: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #226) | df 8a 99 41 35 8f 22 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 39 0d ed 10 1f e3 0e ea ca 85 c3 5a 17 31 22 | 97 9f 06 33 b0 59 ed 25 d5 cd 46 5c e1 b7 68 7b | 60 f5 73 ac 22 e6 10 7a c8 3f 64 54 b7 2c c9 ba | 36 26 b8 60 a9 a1 e6 a3 6e 44 7f 00 0c 75 49 7e | c6 17 73 3d c6 70 48 38 43 a2 56 d7 f5 0c 3f 3f | 3f 97 93 c5 a1 2b c4 07 4f 49 5c fa 0d e2 93 83 | 1d 93 5e ee cb e1 2d 5d 17 f0 04 37 84 12 a1 e4 | ea a7 ca c8 ca 5c 70 fb 0f d5 b4 aa ca 0a eb f9 | b6 b5 03 c1 29 21 80 90 c2 2f 2a fe 6c ab e2 c4 | da df fe dd 41 56 bd 81 ee 73 c7 0a e6 2a 84 64 | 7e c8 7b 2b 7f 3e cd 94 23 75 81 89 67 c2 03 bf | 33 3e d9 d2 a5 ec 73 d5 af 8a 02 94 e8 dd 1e 6c | 57 45 a8 23 17 bc 83 80 e2 7d fe e3 0d bf 65 a8 | 6f 93 8d 7c 46 a5 58 a7 45 54 b1 bb ae e2 cb 5a | 09 4c cd b3 40 87 10 07 3f c6 8e 21 cf 42 d3 a0 | 05 bf ba f5 eb 01 2d 75 a7 76 4b e5 7b 42 b7 8d | 29 00 00 24 c0 94 06 00 9d 87 40 a0 ec d8 4c ee | 0c 16 0e a6 24 3d 43 67 f1 e5 1b a0 19 81 a3 5d | 35 48 05 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd dc 27 ce 4f 2a 14 a6 0d 4a 3f dc | 07 9c 36 b1 1b e9 59 bb 00 00 00 1c 00 00 40 05 | e3 eb a3 4f 44 c3 b7 5b e6 19 f6 7f 9a 7d 29 4c | 6a 02 ce 75 | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #226 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 8a 99 41 35 8f 22 b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #226 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #226 | rejected packet: | df 8a 99 41 35 8f 22 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #226: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a54250 | handling event EVENT_RETRANSMIT for parent state #231 | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #231 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #231 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49619.878996; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500453 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #231 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 "road-eastnet-nonat-231" #231: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #231) | ec d8 99 0e 50 36 87 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea c5 d9 ea 48 9d 9d db e4 72 21 b2 eb fe e0 0a | 9b e5 ce 23 20 eb ad 65 b0 89 ca 3d 24 ef 66 7d | d9 a3 7a c2 3d 05 aa 43 9f 45 1a 14 d9 e7 ad 4c | 1c 30 1e e4 db 2e f5 09 08 f0 6c 1f 45 18 25 f3 | 98 35 42 0b 1b fc c0 95 3b d0 88 ca bf 43 11 51 | ba ac ee 62 bc ef 20 2d 09 0b 30 2b b3 a9 30 69 | 22 9f f7 e5 19 cc d8 4a 41 18 b5 2a 03 31 91 4d | d9 f3 33 5c b6 61 8b 80 4c 0b 65 d5 6f 4b 62 d8 | e0 38 d3 a6 32 83 92 b3 ca df 09 07 0d f6 33 d7 | b9 f9 01 8c 3b d1 ff 19 bf 3d d5 72 dd d6 67 1d | 24 a4 3b 88 00 71 46 68 47 66 c6 d8 6d 38 1a ca | 01 20 d4 7a e4 46 1b 52 ab ad 61 81 76 76 13 bf | 76 df 80 04 67 b5 86 86 0e 85 a0 4b 41 5b e3 0b | 3c 1a 51 b5 b4 55 ce 12 56 93 02 32 82 c4 86 69 | a7 eb 80 c4 8e 9a 08 dd 86 61 45 1e 8a 33 7c 03 | 7e 20 42 a9 8c 8c 89 72 43 a6 59 29 92 30 fd 49 | 29 00 00 24 b3 7b 27 54 be 06 93 cc 3c 78 ad 44 | 9e 7e c7 5b aa 5c 64 c5 5c 99 5a 37 63 dc 53 a7 | 33 95 f4 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 2a 24 2a a3 f9 b8 d4 c1 28 f7 1a | f6 32 c3 8a 97 33 de f4 00 00 00 1c 00 00 40 05 | e6 68 a7 21 48 f4 d3 88 6e c3 71 dc ea d3 53 aa | 0b f4 bb 84 | libevent_free: release ptr-libevent@0x7fb388022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a54250 | #231 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec d8 99 0e 50 36 87 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #231 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #231 | rejected packet: | ec d8 99 0e 50 36 87 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #231: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #37 | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #37 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #37 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49619.890315; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006487 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a54250 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #37 | libevent_malloc: new ptr-libevent@0x7fb388022480 size 128 "road-eastnet-nonat-37" #37: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #37) | 17 02 22 e9 ab 5b 91 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f f0 24 04 15 84 3f 8d a0 47 69 89 53 1c 67 b8 | 33 2a a4 f5 84 95 fd 12 c4 95 3c eb 03 f8 76 46 | 15 20 9b c5 17 a5 48 da 05 b3 14 87 45 a5 03 ce | 15 45 04 84 4f ce c5 7f 7f d9 f6 69 e6 fa 2a ce | 98 6a 3f d1 cc fe 7f e2 41 fd 61 7b af af 30 7e | 0a 75 d2 92 05 56 ed e9 09 bd bc db cd 80 58 20 | 86 cc 39 bd f2 1c dd 9d 77 bb 28 c3 7e a4 97 11 | 86 79 5d 68 34 e4 33 4c b3 b1 ed 26 ab a1 c5 7d | dd f5 b8 0e 55 cd f4 1f ea 00 32 c8 4b fd 8f a5 | 71 8b 05 79 0a 34 41 68 bd c7 7d 96 51 77 5e 6b | d9 65 0d cf f7 34 f5 5b 4b bf 3e ae f6 63 25 2e | ea 9e 2a 3f 64 43 4d 0c 4a de f8 57 38 d7 5a c8 | 89 09 d3 81 3b 61 a8 5e 87 ab 34 9f c0 a6 2e 8e | a4 55 d9 e8 61 49 db 19 2f a0 89 a1 e6 24 e6 14 | 77 4b 63 b1 94 0b fe b9 37 07 5d a5 3f f4 4e 97 | 2a 98 e3 ca 6e 7f 3f a3 88 c3 da 3a c0 a1 79 c5 | 29 00 00 24 75 33 7f 61 eb 0d 1b f9 84 ec ca bb | af cf f0 96 3c 65 2f 09 ef 72 4a c4 05 f7 86 9b | fc 7f 3c 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 5d ed 76 d7 41 0c 3c 88 ec 15 de | 69 08 6f 06 52 19 de 0f 00 00 00 1c 00 00 40 05 | 52 bb 9d ab bf 18 49 c2 17 f2 d0 27 18 10 66 1c | c7 07 9d fe | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #37 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 02 22 e9 ab 5b 91 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #37 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #37 | rejected packet: | 17 02 22 e9 ab 5b 91 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #37: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0647 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-235" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-235' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #235 at 0x557d46b14c80 | State DB: adding IKEv2 state #235 in UNDEFINED | pstats #235 ikev2.ike started | Message ID: init #235: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #235: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #235; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-235" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-235" IKE SA #235 "road-eastnet-nonat-235" "road-eastnet-nonat-235" #235: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-235 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-235": constructed local IKE proposals for road-eastnet-nonat-235 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 235 for state #235 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a02770 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #235 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 | #235 spent 0.151 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-235" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.23 milliseconds in whack | crypto helper 18 resuming | crypto helper 18 starting work-order 235 for state #235 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 235 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 235 time elapsed 0.000988 seconds | (#235) spent 0.994 milliseconds in crypto helper computing work-order 235: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 235 for state #235 to event queue | scheduling resume sending helper answer for #235 | libevent_malloc: new ptr-libevent@0x7fb354046040 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #235 | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 235 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #235 | **emit ISAKMP Message: | initiator cookie: | 7e 07 6a 55 b2 86 f9 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-235 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8e 15 b0 98 97 a3 9b e7 91 af 63 8f 32 c2 f0 a6 | ikev2 g^x 5a 92 40 40 d6 e9 e6 fc ec 5f 9d 94 27 3d 04 cc | ikev2 g^x 99 dc 7e ac 23 a0 7a 25 ef 03 33 84 5f 4e 3e 44 | ikev2 g^x ab 45 fc 51 2f 77 0e 04 9c 57 58 3e e3 c4 95 ac | ikev2 g^x 99 c6 cf 74 8b ee 49 3f 97 64 5a ae 23 26 21 49 | ikev2 g^x 82 68 17 68 04 08 36 f9 22 38 ec 23 ce 8f 41 44 | ikev2 g^x bf d0 3d c1 f8 23 b3 6a aa 39 20 ad 4f 3f f3 2b | ikev2 g^x 3d f9 49 23 b6 22 6b 6a 39 8a 61 bb b3 33 4a 8f | ikev2 g^x 12 ce 51 75 41 2f c2 97 7c 24 15 e6 c7 4c 0b 5a | ikev2 g^x 7e 98 8c f9 eb 79 4c 87 18 6e 22 0f ce f5 5a f4 | ikev2 g^x 97 f7 88 3c 20 6b 59 a3 22 56 0b 5d ff 73 43 0c | ikev2 g^x d0 ab c4 fb b1 97 4e c1 93 9b 6a 7d 3a c0 41 34 | ikev2 g^x 56 74 13 c4 02 0c 52 4b 7f 7c ed c1 a7 58 84 db | ikev2 g^x 34 3e fa dc e2 91 c8 b6 c5 5f f0 1a 94 9c 21 62 | ikev2 g^x 9c 24 2a b8 60 58 3a 4f ea 5e 65 e5 c2 96 45 62 | ikev2 g^x b2 a3 11 26 4c 94 9a fb e2 2b 93 1c 4f 08 c6 66 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0c f1 17 b1 15 6c 67 72 28 b0 8f 38 fd 2e 9a ff | IKEv2 nonce fb 4a d4 a7 a7 b2 00 ff 88 fe ef 90 e3 f8 e6 b7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7e 07 6a 55 b2 86 f9 bc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 eb | natd_hash: port= 01 f4 | natd_hash: hash= e2 78 bf 00 5e f0 c9 41 6d 35 37 22 b0 4c f8 53 | natd_hash: hash= 8c eb 59 4e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e2 78 bf 00 5e f0 c9 41 6d 35 37 22 b0 4c f8 53 | Notify data 8c eb 59 4e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7e 07 6a 55 b2 86 f9 bc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6e 5c 6f da 69 07 20 20 73 2e b2 7c a0 00 c1 c2 | natd_hash: hash= 79 44 3d 62 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6e 5c 6f da 69 07 20 20 73 2e b2 7c a0 00 c1 c2 | Notify data 79 44 3d 62 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #235 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #235: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #235 to 4294967295 after switching state | Message ID: IKE #235 skipping update_recv as MD is fake | Message ID: sent #235 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-235" #235: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.235:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #235) | 7e 07 6a 55 b2 86 f9 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 15 b0 98 97 a3 9b e7 91 af 63 8f 32 c2 f0 a6 | 5a 92 40 40 d6 e9 e6 fc ec 5f 9d 94 27 3d 04 cc | 99 dc 7e ac 23 a0 7a 25 ef 03 33 84 5f 4e 3e 44 | ab 45 fc 51 2f 77 0e 04 9c 57 58 3e e3 c4 95 ac | 99 c6 cf 74 8b ee 49 3f 97 64 5a ae 23 26 21 49 | 82 68 17 68 04 08 36 f9 22 38 ec 23 ce 8f 41 44 | bf d0 3d c1 f8 23 b3 6a aa 39 20 ad 4f 3f f3 2b | 3d f9 49 23 b6 22 6b 6a 39 8a 61 bb b3 33 4a 8f | 12 ce 51 75 41 2f c2 97 7c 24 15 e6 c7 4c 0b 5a | 7e 98 8c f9 eb 79 4c 87 18 6e 22 0f ce f5 5a f4 | 97 f7 88 3c 20 6b 59 a3 22 56 0b 5d ff 73 43 0c | d0 ab c4 fb b1 97 4e c1 93 9b 6a 7d 3a c0 41 34 | 56 74 13 c4 02 0c 52 4b 7f 7c ed c1 a7 58 84 db | 34 3e fa dc e2 91 c8 b6 c5 5f f0 1a 94 9c 21 62 | 9c 24 2a b8 60 58 3a 4f ea 5e 65 e5 c2 96 45 62 | b2 a3 11 26 4c 94 9a fb e2 2b 93 1c 4f 08 c6 66 | 29 00 00 24 0c f1 17 b1 15 6c 67 72 28 b0 8f 38 | fd 2e 9a ff fb 4a d4 a7 a7 b2 00 ff 88 fe ef 90 | e3 f8 e6 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 78 bf 00 5e f0 c9 41 6d 35 37 22 | b0 4c f8 53 8c eb 59 4e 00 00 00 1c 00 00 40 05 | 6e 5c 6f da 69 07 20 20 73 2e b2 7c a0 00 c1 c2 | 79 44 3d 62 | state #235 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a02770 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #235 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 | #235 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49619.894488 | resume sending helper answer for #235 suppresed complete_v2_state_transition() and stole MD | #235 spent 0.47 milliseconds in resume sending helper answer | stop processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb354046040 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 07 6a 55 b2 86 f9 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #235 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #235 | rejected packet: | 7e 07 6a 55 b2 86 f9 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #235: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47ed0 | handling event EVENT_RETRANSMIT for parent state #145 | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #145 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #145 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49619.910692; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005357 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e5ca0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #145 | libevent_malloc: new ptr-libevent@0x7fb354046040 size 128 "road-eastnet-nonat-145" #145: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #145) | a6 a1 9f 1d 3f 3a 29 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 ad 76 df ba ca 18 92 b9 50 e2 27 a3 57 3f f5 | d7 ce ae 5d 80 a9 09 c6 8a 53 e3 ab 22 af 0e a7 | 88 2e e6 ed 37 ce 02 dd 03 71 9a aa 64 d1 00 5c | 54 65 05 0e 62 cb 77 34 78 e8 1d 0f 3c 6f 76 4f | d8 fc 9f c4 10 87 e5 9a b0 72 db 0a 63 63 0e ec | a2 67 9d 72 98 db 53 5f a6 6f e8 b3 98 59 aa 3b | 88 1a a2 8d d0 7f c4 94 06 61 c1 99 f9 c0 e1 fc | 19 b1 6a 14 b7 fd 63 fd d3 3b 83 b6 f1 f8 68 d2 | 13 f3 e6 28 90 fe d0 d0 88 c6 ca e3 4e 56 e1 09 | b8 4b c6 48 c4 d4 00 e6 af d0 6c fa ac 01 46 d9 | 68 30 67 9c 6d 90 ca de 4f 57 74 b7 7a b8 1b 41 | a9 90 f5 03 0d 89 d9 ac 42 f8 f9 ae 19 2a 88 37 | d2 a9 69 9e 81 b2 1c 52 07 de 0f fa d0 69 b1 a8 | 12 38 cf d3 2e 09 65 b8 1c da 6e 0b 4d 41 c0 65 | 80 dc 01 75 47 41 de 6c 83 4d 93 25 86 5c 1b c8 | f3 08 39 71 bd f1 c4 fe f5 43 e7 4c 77 94 d2 cc | 29 00 00 24 03 a8 59 45 29 a4 02 15 24 82 5a 54 | 64 ac fd bc 55 59 ba ca b7 e9 80 0d f2 9c bd f0 | d3 a5 de f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 e0 ba e6 72 d8 87 8f de 74 38 1d | 19 eb b3 76 79 6b d3 38 00 00 00 1c 00 00 40 05 | 6f 55 64 02 f2 84 7e 5a 25 36 99 f3 de 2c 7f 97 | 3a 54 f2 52 | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47ed0 | #145 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 a1 9f 1d 3f 3a 29 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #145 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #145 | rejected packet: | a6 a1 9f 1d 3f 3a 29 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #145: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ec960 | handling event EVENT_RETRANSMIT for parent state #218 | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #218 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #218 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49619.925031; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00492 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47ed0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #218 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 "road-eastnet-nonat-218" #218: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #218) | fc 84 28 e6 d0 d4 a3 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 d7 19 e0 b8 a7 81 99 33 01 41 39 ef 55 14 82 | 36 e8 1e 6f 78 81 cb 8b ba 30 50 9b f0 49 c2 8d | 4d b2 2b 95 f1 d8 28 60 35 5d 42 53 4d 43 c7 8c | 4f 74 15 45 95 27 14 77 eb 50 5d 4a f6 fd be ee | 3c 1a 88 ee 70 83 66 98 31 0a fd ad 4a 03 b5 37 | 5d 2e 93 bd 7a be 39 56 60 d9 aa 84 79 74 3d 0e | dc e3 b7 0b 24 c5 94 3d 31 8b f6 0e 82 f6 06 b8 | 26 12 7e 3f 3e d6 7d b6 51 ee ad b2 d2 ab 27 77 | 53 f8 1e d7 91 5f 2a 81 5e 4e 7d 22 21 5e 55 9c | c3 53 13 8f 2a fb e3 93 47 36 6a 2c 3e 5b e2 b0 | 72 17 1d b0 34 33 da 2e 57 d4 77 d4 d7 37 4b 04 | e0 fd 56 ba 03 09 e0 ee 03 55 18 7a 06 0c cf 4c | 2a 51 58 97 6d b9 c7 55 61 75 dd e7 d8 0d 3a 1d | 49 6c f2 e4 06 70 89 d9 24 cc ed 33 51 12 2c eb | 69 6c 48 51 d3 c5 03 79 af 69 1b 7c 09 b9 68 90 | b7 fa 26 e6 18 f8 80 d5 96 f3 c9 3f f4 18 bb d2 | 29 00 00 24 11 b2 a5 5c a6 46 80 f9 3d 23 f2 ab | ce 5d 83 0a f1 1a 01 82 7c 29 4c e1 e5 d0 ae 3c | 95 98 eb 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4f 29 50 5e 23 8d 7d 6b 34 9f ff eb | 11 dc 43 b6 12 c1 95 47 00 00 00 1c 00 00 40 05 | a7 99 e5 52 4c 36 7b 61 4e b2 63 45 25 bf 82 23 | 34 fa af bb | libevent_free: release ptr-libevent@0x7fb3680407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ec960 | #218 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 84 28 e6 d0 d4 a3 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #218 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #218 | rejected packet: | fc 84 28 e6 d0 d4 a3 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #218: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a272b0 | handling event EVENT_RETRANSMIT for parent state #199 | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #199 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #199 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49619.939377; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003713 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a027b0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #199 | libevent_malloc: new ptr-libevent@0x7fb3680407f0 size 128 "road-eastnet-nonat-199" #199: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #199) | 27 d1 6c c4 4c 84 e3 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 f7 e5 ae 44 da 7b a1 b1 3e 44 fb ef 82 32 77 | a0 c2 72 43 50 19 7e 5e c7 1d 24 fa 9d 99 ff 71 | 44 54 82 8e cd bf 0f 40 ad 0d 4a 27 75 78 aa 64 | 63 e6 66 6d e9 bf 1f 5a 74 65 bf 0f ba 29 57 51 | 0a 44 9c 16 52 28 db 48 f9 d7 ab e8 1e 98 b5 a0 | ff 9d 9d 22 6a 26 d5 06 1f b5 07 29 59 d7 ec 33 | 10 b5 a0 31 95 73 ec 20 a2 11 23 56 06 d8 ad a2 | 6d 0f c8 00 64 2f 99 96 5d d2 5b a5 dd 2c 34 78 | ce 80 35 74 5d 74 56 55 47 bf 15 c1 84 c7 0f 64 | a6 70 c6 99 14 c9 d9 b3 02 6a 70 83 2d ca 4f aa | b9 b4 39 e1 b3 2e 81 8c 26 1f 8e f8 1a b1 b1 4b | b0 9b 0a c4 8c 38 2e 14 24 c9 96 c5 ae 69 55 cb | f9 3b a1 e1 2b 54 42 88 42 2f d5 f9 04 ab 91 7e | 86 11 e3 bd 2a 54 c0 da 96 34 89 6a 25 46 14 93 | 51 fb 1f 2b bf 29 76 41 f2 16 a8 f5 e3 fb 49 39 | 86 d5 c2 41 0f 92 03 df 3b a9 75 b2 e3 1f cd 5c | 29 00 00 24 ce b1 60 ec b2 6d 5b aa dc 41 a3 c6 | 5b 6b 71 42 8d 0b d4 85 d2 79 6d f3 81 c0 ff 8a | e8 8f f9 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b6 28 45 f6 47 a9 89 2b f2 e1 02 | ea 34 3a fc e5 a7 2b f1 00 00 00 1c 00 00 40 05 | a9 d3 87 ec eb bf 81 b0 18 6d 86 a6 a8 63 05 fc | 1c 93 4f b5 | libevent_free: release ptr-libevent@0x7fb340040790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a272b0 | #199 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 d1 6c c4 4c 84 e3 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #199 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #199 | rejected packet: | 27 d1 6c c4 4c 84 e3 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #199: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d590 | handling event EVENT_RETRANSMIT for parent state #232 | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #232 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #232 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49619.964705; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500993 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e7260 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #232 | libevent_malloc: new ptr-libevent@0x7fb340040790 size 128 "road-eastnet-nonat-232" #232: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #232) | 24 ac 89 77 7f d4 00 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d e3 39 fa 31 96 0e da 0d 87 de fe bc da ee 7b | f9 35 54 93 66 77 87 a0 67 c2 b4 11 e6 0a 7a 53 | b3 1d a8 6c 5c b3 d5 5b f1 71 74 80 47 74 8f eb | 25 fb 81 fc 67 2b 6d fc c2 93 27 e4 ad 7c e4 44 | 62 ee e5 d7 4d 6f 45 7a fb 56 b0 33 e4 c0 e1 a0 | 0d 2e c4 d7 7c a8 3d 9c d0 51 2f 55 54 40 46 36 | 1c 6c 65 82 d9 49 b2 d4 69 f8 3b 26 10 eb 42 4c | 23 39 f8 bc c3 39 9a c3 11 d4 4e 97 4e b9 f8 a2 | 8b 74 d5 f0 11 c2 a0 7d ca dd 76 40 1b 01 76 b0 | a4 bf 05 91 b6 25 97 e5 e6 51 ee 64 fa 3b 0a c5 | a6 9c c8 8d fc dc 9a b7 88 e8 5a 4a 57 96 98 00 | db 6d 9a cd 76 5b a7 49 16 56 06 32 a5 f0 51 87 | 36 26 1d 21 19 29 89 68 02 06 6d 37 2b a0 74 d8 | 14 94 a7 12 8f 7a e7 ad 72 26 fb ca e9 57 f6 ae | 40 e1 77 ae bd 14 78 69 df f7 02 98 cb 60 f6 4b | ad ea 83 90 fd 04 b0 25 b3 92 71 37 ed 5d 75 e1 | 29 00 00 24 aa 59 21 22 32 5d 1b 0e 90 4a a6 80 | 93 f2 d5 94 dc dc 41 5c 7e 9b 58 30 e5 e0 1c a2 | 9a c8 ed 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 58 75 66 d7 36 51 ed 56 98 88 32 | c1 e3 29 ac 35 46 df e2 00 00 00 1c 00 00 40 05 | 0c 44 36 93 b4 a9 f5 59 b8 d7 76 83 b8 b4 fd 37 | 81 aa c4 e2 | libevent_free: release ptr-libevent@0x7fb3480180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d590 | #232 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 ac 89 77 7f d4 00 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #232 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #232 | rejected packet: | 24 ac 89 77 7f d4 00 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #232: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a672d0 | handling event EVENT_RETRANSMIT for parent state #38 | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #38 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #38 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49619.972055; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008023 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d590 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #38 | libevent_malloc: new ptr-libevent@0x7fb3480180b0 size 128 "road-eastnet-nonat-38" #38: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #38) | 63 6f 4b 9c a2 38 4b f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 c6 a0 5e 80 62 3e 9a 9c 42 e1 05 80 df 04 bf | 1e b5 eb a5 bb ef bc 82 8b e6 75 a7 2e 01 28 64 | e4 76 b9 2e 24 4c bf de dc 13 dd 2b 71 c5 93 43 | 1b 46 d4 7e b2 da 9a 48 5b 59 35 a7 05 07 a3 e4 | 2d c6 06 3d 04 99 06 6d e6 f3 82 a2 e0 b0 3d 7e | 06 24 2a d6 83 0e 98 7d 98 49 2f 5f ab 8e 6a a0 | d8 9e 97 9f 3a b5 0b 41 09 f4 3d 1d 01 c6 79 69 | 84 a4 53 1f bd 4e 48 87 76 0d 6e 5e db cc c6 9f | 32 ff 46 70 0d 72 cf 06 98 99 df 58 29 5b 2c 8c | fb 98 a9 76 0f 25 88 9a f5 19 cc e3 5c 2b 68 1d | 01 4d 25 7a f1 7a 21 df b2 8f 9c 28 7d d1 ec da | 1d aa a1 0e 2a 91 6c fc cd c9 76 e7 51 08 7a ff | e5 ff f8 19 fa 3a 8e cc 1e 84 49 b9 c5 19 d0 a9 | d3 37 e2 20 31 e7 32 dd 71 90 7c 76 34 4e 29 57 | 1e 56 51 56 0c 5f 17 75 67 40 80 dc 44 27 6b 9a | c7 16 b2 3b 68 69 4b 25 42 5f 6c bd 14 34 a0 fd | 29 00 00 24 11 36 0f 5e a0 00 74 be 57 cf e9 ad | 0b 41 64 75 76 be 45 9c 57 4a dd ea fc 94 1e c3 | 3b 87 2f 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b 5e 04 97 03 6e 1a 6a 1c 69 28 d2 | a2 f5 94 bd 95 4c fa 5e 00 00 00 1c 00 00 40 05 | aa 31 5d 54 cf 5a 81 b9 1b cd fe 19 22 77 54 6d | f5 50 1b 4f | libevent_free: release ptr-libevent@0x7fb338012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a672d0 | #38 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 6f 4b 9c a2 38 4b f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #38 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #38 | rejected packet: | 63 6f 4b 9c a2 38 4b f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #38: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a25d10 | handling event EVENT_RETRANSMIT for parent state #146 | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #146 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #146 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49619.982174; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.010642 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a672d0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #146 | libevent_malloc: new ptr-libevent@0x7fb338012840 size 128 "road-eastnet-nonat-146" #146: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #146) | 44 6c 8c 11 77 9b c1 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b e4 4b 01 63 76 c0 7a c8 2d 36 69 32 60 94 ea | 6d 55 57 2b 4e ff 0e 39 b8 87 ae 9d 5d a1 84 c3 | fd 7e 75 5e b5 db f9 c0 f2 b4 77 67 0c bc 83 d2 | b3 2c 18 7b 18 da 84 81 dc 1d 09 bc ef cb 96 0b | 54 3e 13 a5 2c e8 26 52 c4 b3 5b d7 9c b8 e6 22 | f7 8d 8e 88 21 d1 87 46 36 62 d4 63 42 41 4c 1f | 8f 43 21 27 b3 df 00 21 d1 8d 41 5a e5 9f 04 8b | ff c6 a4 97 a5 12 34 cb aa c2 51 13 9f 26 59 55 | a5 7b 2f 9e 53 52 08 32 a2 06 5f 18 aa a0 ac 8a | 4c 25 e1 2e cb 23 eb 05 33 52 1c b1 e7 32 06 d0 | 42 ed ad 95 48 c5 eb 3d 1a cb f5 6d dc 2f a2 a8 | 4e 15 75 28 ce 0c d4 fb 09 18 56 79 e6 17 c1 dd | e4 ed 35 be 6f e9 12 84 6e 1e 87 b9 38 ca fc f5 | d4 85 cf 4e a3 1f db 6c 1f e5 f2 54 ba 88 10 cb | 4e bc 46 9b 79 cb 0a 36 af 61 69 14 f8 97 5e 9d | 27 b8 f4 1b 36 1d 0b 8b f0 e7 f8 06 78 36 dc d7 | 29 00 00 24 79 24 14 13 36 a3 2b 17 a4 40 30 01 | 57 eb a4 ff f9 15 14 cb 86 dc 31 a7 64 7c e3 06 | ae fb 59 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 46 87 8a 4c 47 2e ae ab e2 03 f4 | cf 0f 35 fc df 03 af ad 00 00 00 1c 00 00 40 05 | 7f ed fa 9e 74 b9 38 c0 e7 89 49 8c f1 a3 30 c7 | bc 00 44 f5 | libevent_free: release ptr-libevent@0x7fb3840223a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a25d10 | #146 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a73690 | handling event EVENT_RETRANSMIT for parent state #227 | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #227 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #227 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49619.982363; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003716 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a25d10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #227 | libevent_malloc: new ptr-libevent@0x7fb3840223a0 size 128 "road-eastnet-nonat-227" #227: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #227) | c5 c2 6a 83 d2 66 bb b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 5b f4 b6 58 9a 18 76 c3 e1 6e 19 2a 39 ae a1 | 62 ea 44 d1 30 52 4d 8a 54 61 7d 23 98 f8 8d d5 | 84 3b 68 fd c2 f3 21 b9 78 0c dc e3 83 0f 8e 04 | 74 b0 67 51 d8 1a 83 67 df 2f 54 ee 3c eb 78 8c | dc ab 5e ad 88 89 74 dd b8 42 f8 3b 65 bb c7 d6 | 58 b5 ad 0a ef 24 29 f4 ee 94 22 81 71 d7 21 71 | cf 9a 96 87 e9 3e 34 bd 96 10 75 82 fd 44 7e e5 | d5 b4 6d be 50 02 22 60 ae ae 61 82 1e 48 c4 e8 | fb e2 e4 71 81 50 e1 9c 82 80 8f 59 e3 b5 cd 3d | 6c 63 88 9c 58 f3 61 37 6d 11 4f 91 c3 dc 04 d5 | 78 82 60 cb 5e 0d 1d a4 89 4d 74 78 d6 b1 e9 18 | bf 79 a1 1a 16 e0 b4 3d 00 ec 02 c0 3f 69 19 a5 | ad 3d e3 6c cb 66 a6 b9 ff c5 30 88 8f f5 e7 a8 | f5 33 4d 86 13 42 87 b3 82 49 90 36 bb 5e e9 47 | c4 bf c9 a4 e4 1a 35 38 6a 04 9b 4b 05 29 61 c8 | cf c0 72 4f 16 6a 7e 8b 6f 02 0b ab 68 bf 34 71 | 29 00 00 24 73 17 4e 35 59 6e 44 c0 fd cd 46 68 | 7d aa 47 75 fe fd 8d d7 e4 53 d6 a0 cb 05 84 4f | 51 ed 61 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 60 9b b9 46 e5 98 89 ad c1 cb e5 | e9 7b 12 83 3d 55 5a fc 00 00 00 1c 00 00 40 05 | 0c dc fe 43 8b 17 32 a8 d8 5e bc 45 b2 f1 c1 93 | bc b6 5b dc | libevent_free: release ptr-libevent@0x7fb34403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a73690 | #227 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 6c 8c 11 77 9b c1 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #146 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #146 | rejected packet: | 44 6c 8c 11 77 9b c1 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #146: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0748 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 c2 6a 83 d2 66 bb b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #227 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #227 | rejected packet: | c5 c2 6a 83 d2 66 bb b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #227: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0578 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_SHUNT_SCAN | expiring aged bare shunts from shunt table | spent 0.00384 milliseconds in global timer EVENT_SHUNT_SCAN | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-236" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-236' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #236 at 0x557d46b16240 | State DB: adding IKEv2 state #236 in UNDEFINED | pstats #236 ikev2.ike started | Message ID: init #236: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #236: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #236; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-236" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-236" IKE SA #236 "road-eastnet-nonat-236" "road-eastnet-nonat-236" #236: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-236 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-236": constructed local IKE proposals for road-eastnet-nonat-236 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 236 for state #236 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a73690 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #236 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 | #236 spent 0.176 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-236" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.259 milliseconds in whack | crypto helper 7 resuming | crypto helper 7 starting work-order 236 for state #236 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 236 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 236 time elapsed 0.00099 seconds | (#236) spent 0.996 milliseconds in crypto helper computing work-order 236: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 236 for state #236 to event queue | scheduling resume sending helper answer for #236 | libevent_malloc: new ptr-libevent@0x7fb348046040 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #236 | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 236 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #236 | **emit ISAKMP Message: | initiator cookie: | 4f c5 63 73 3b b2 d7 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-236 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9c 5b 06 ee 84 fa 79 7f e6 43 db d2 0d 8b cd f5 | ikev2 g^x 59 c7 e2 83 26 7e 92 07 02 e5 75 02 5a 6a f0 b8 | ikev2 g^x 61 d3 80 1a 18 f6 6c 41 f4 8b 1c 06 f8 08 1d ec | ikev2 g^x 22 4e 32 49 5f 33 c9 49 bb d4 b4 9a 8b 9e f4 b7 | ikev2 g^x ce cc cf cb 5d b3 17 75 80 5e 65 75 ed 96 58 92 | ikev2 g^x ba 35 70 a7 18 25 e3 2d 24 94 8c 18 40 c5 8f 8e | ikev2 g^x 52 27 34 ad d5 17 cd 88 62 97 c4 7d b7 05 9c fd | ikev2 g^x 87 2b 85 fb 44 37 03 91 16 87 52 0a e0 03 40 76 | ikev2 g^x 05 68 d4 2b 81 46 59 09 54 29 07 bd 68 5b bc 5c | ikev2 g^x 8c 95 6c ea 24 20 a3 81 a2 b7 51 34 bf 49 44 7c | ikev2 g^x d1 b4 84 70 99 94 3b 26 25 f6 f8 e9 a2 1d 40 46 | ikev2 g^x 82 c9 ad f3 5f 36 60 f9 1a 16 eb 90 3e 33 04 f7 | ikev2 g^x 6d 37 8a a4 9b 0b b3 e7 22 8c ca b9 99 a2 ef 47 | ikev2 g^x df af 33 fd 94 a4 95 ab c9 0d 75 62 b8 13 05 a5 | ikev2 g^x 03 c9 74 d6 f5 9e 6f a1 90 65 6c b2 72 e9 df f5 | ikev2 g^x 5d 19 cb 15 48 a4 79 d7 52 7c ec ab 28 6e 6d 0a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 28 83 19 a9 be e7 a3 f6 92 20 74 48 e6 d2 29 74 | IKEv2 nonce 96 b0 77 d3 bd 1e ee 26 dd 0d 67 63 ff bc dc bf | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4f c5 63 73 3b b2 d7 be | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ec | natd_hash: port= 01 f4 | natd_hash: hash= 88 3a ff 41 6e c5 dd cc 76 37 c9 88 fe 40 cf a9 | natd_hash: hash= 30 61 ac fb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 88 3a ff 41 6e c5 dd cc 76 37 c9 88 fe 40 cf a9 | Notify data 30 61 ac fb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4f c5 63 73 3b b2 d7 be | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e2 5c 52 8d c8 02 86 2e 47 16 0b 04 4f 16 65 56 | natd_hash: hash= c3 38 ce 94 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e2 5c 52 8d c8 02 86 2e 47 16 0b 04 4f 16 65 56 | Notify data c3 38 ce 94 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #236 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #236: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #236 to 4294967295 after switching state | Message ID: IKE #236 skipping update_recv as MD is fake | Message ID: sent #236 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-236" #236: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.236:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #236) | 4f c5 63 73 3b b2 d7 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 5b 06 ee 84 fa 79 7f e6 43 db d2 0d 8b cd f5 | 59 c7 e2 83 26 7e 92 07 02 e5 75 02 5a 6a f0 b8 | 61 d3 80 1a 18 f6 6c 41 f4 8b 1c 06 f8 08 1d ec | 22 4e 32 49 5f 33 c9 49 bb d4 b4 9a 8b 9e f4 b7 | ce cc cf cb 5d b3 17 75 80 5e 65 75 ed 96 58 92 | ba 35 70 a7 18 25 e3 2d 24 94 8c 18 40 c5 8f 8e | 52 27 34 ad d5 17 cd 88 62 97 c4 7d b7 05 9c fd | 87 2b 85 fb 44 37 03 91 16 87 52 0a e0 03 40 76 | 05 68 d4 2b 81 46 59 09 54 29 07 bd 68 5b bc 5c | 8c 95 6c ea 24 20 a3 81 a2 b7 51 34 bf 49 44 7c | d1 b4 84 70 99 94 3b 26 25 f6 f8 e9 a2 1d 40 46 | 82 c9 ad f3 5f 36 60 f9 1a 16 eb 90 3e 33 04 f7 | 6d 37 8a a4 9b 0b b3 e7 22 8c ca b9 99 a2 ef 47 | df af 33 fd 94 a4 95 ab c9 0d 75 62 b8 13 05 a5 | 03 c9 74 d6 f5 9e 6f a1 90 65 6c b2 72 e9 df f5 | 5d 19 cb 15 48 a4 79 d7 52 7c ec ab 28 6e 6d 0a | 29 00 00 24 28 83 19 a9 be e7 a3 f6 92 20 74 48 | e6 d2 29 74 96 b0 77 d3 bd 1e ee 26 dd 0d 67 63 | ff bc dc bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 3a ff 41 6e c5 dd cc 76 37 c9 88 | fe 40 cf a9 30 61 ac fb 00 00 00 1c 00 00 40 05 | e2 5c 52 8d c8 02 86 2e 47 16 0b 04 4f 16 65 56 | c3 38 ce 94 | state #236 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34403b0b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a73690 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a73690 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #236 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 | #236 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49620.021011 | resume sending helper answer for #236 suppresed complete_v2_state_transition() and stole MD | #236 spent 0.61 milliseconds in resume sending helper answer | stop processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb348046040 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f c5 63 73 3b b2 d7 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #236 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #236 | rejected packet: | 4f c5 63 73 3b b2 d7 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #236: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.115 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a205f0 | handling event EVENT_RETRANSMIT for parent state #200 | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #200 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #200 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49620.036255; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.008838 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a272b0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #200 | libevent_malloc: new ptr-libevent@0x7fb348046040 size 128 "road-eastnet-nonat-200" #200: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #200) | 75 f9 3c ee 3d 43 50 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d d7 f4 2c e9 d8 b4 58 bc f6 5c 68 d0 e8 20 d2 | 70 0a 56 63 f6 74 43 04 b4 cd d8 23 88 fe c7 f6 | 1e d9 bd ee 25 c8 67 c7 2d b9 d9 c6 54 ca cd 9c | 4d 78 05 42 6a b4 88 a1 71 4e fd 59 90 2e 53 a1 | 4c c1 78 ca ca ed 13 0b 48 7e 72 f2 de cc bf 74 | d8 13 14 01 89 5b 3d f3 26 5d 17 ef 74 28 fa a9 | a5 86 f8 17 01 9e 46 6d 69 c4 ce 7b 85 c2 8b f2 | 6a 40 21 88 6b 4c 0d e0 b2 55 9a f1 b6 c4 a5 34 | 5e ea a9 16 4b 7b 22 02 6e b5 62 bf 0e 13 c4 75 | 5a f6 47 5c d0 c2 01 a3 46 b7 b7 ca c6 5e f6 e3 | 79 8e 25 ba 76 6d ee 11 df 8f 10 22 5f 50 31 f4 | b3 77 76 36 47 ec 67 35 64 4d 22 bd 77 3c 61 d0 | 1c 1c ab b4 d6 cf e4 0f 57 21 d8 30 aa 58 f6 84 | a1 48 51 27 85 8c 83 cc 89 77 d2 37 58 0f 1d e2 | 1d d9 35 ce 76 2e 8b 0d 16 1d 75 c0 13 c5 08 c0 | 3c d5 3b aa 74 68 e3 69 d7 c9 6b 6b d6 2e 6c a1 | 29 00 00 24 0e 33 98 69 ac 19 40 8d 23 0b bc 95 | 8f 5a 8e 62 b3 f7 97 e2 1f 4f da 87 39 88 58 8e | fe 30 e9 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 45 f2 7a b7 3f 1c 77 84 16 29 66 | 7f d3 6a c0 22 39 cf e5 00 00 00 1c 00 00 40 05 | a7 72 f7 48 87 f0 01 9a b9 14 bf 98 e7 f8 65 3b | c7 d8 2f ed | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a205f0 | #200 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 f9 3c ee 3d 43 50 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #200 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #200 | rejected packet: | 75 f9 3c ee 3d 43 50 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #200: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0681 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e05a0 | handling event EVENT_RETRANSMIT for parent state #219 | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #219 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #219 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49620.03761; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002195 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ec960 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #219 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 "road-eastnet-nonat-219" #219: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #219) | 7d 80 b0 77 1f 48 77 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 87 5e 24 5c db 31 0a 96 84 9d 90 05 c1 73 ea | 13 fd da 1a eb 02 9b 1b a2 ef f5 1e 7d d5 07 48 | 63 2b 15 ef 39 49 2f 72 57 96 fc d0 52 b7 b4 5b | b9 8f 1f 7d 66 98 1a 54 e8 35 20 c8 da d6 6b 14 | 12 96 09 73 f0 2a 18 19 ad 4f ad c0 e9 02 7d bf | 91 ef d7 b5 3d bf 72 91 c2 b3 4a 21 80 f5 15 86 | f5 a2 c4 99 67 47 6c 96 fc e1 53 b9 1a ff ad 2e | 5a 73 b4 6f 29 39 2a 43 c9 46 c0 b4 6f 20 2e 1e | 67 a0 45 fd 13 c6 d4 73 ef 07 78 d4 9f 67 9c 74 | b8 b8 8b 57 22 93 1b 6e 1c 48 7c 01 8f e1 37 24 | ca 0b 69 5d 4d 5a 11 fe 79 69 f3 19 5f e1 13 01 | 72 da c7 1d 2e 2d 95 6b 1a 0c 79 15 cc 16 3b c9 | df 53 b2 62 55 3b 89 98 3a 35 b4 a3 d8 f7 72 66 | 5a 4a cd 05 1d 45 02 1c a4 80 ce 7b 71 ea 76 a3 | 4c 87 0d 5f a5 5d 61 29 09 d4 52 68 95 1e 6d d6 | 81 6a 00 e1 92 ed bb e5 1a 97 43 9e cf 2e 23 af | 29 00 00 24 3d 29 6e 63 66 7a 35 4b 56 6e f9 8b | 96 51 14 3b cc a7 be 10 65 46 ea 6e 67 b7 cd b3 | c7 62 bc 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 d7 c1 a6 5e c6 d2 33 1c 31 12 89 | 58 68 2a 17 e1 05 d4 0f 00 00 00 1c 00 00 40 05 | 8f 01 0b 19 90 57 cd de dd b3 66 c4 60 3d 67 fe | 89 ed 52 b0 | libevent_free: release ptr-libevent@0x7fb36c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e05a0 | #219 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 80 b0 77 1f 48 77 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #219 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #219 | rejected packet: | 7d 80 b0 77 1f 48 77 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #219: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6f550 | handling event EVENT_RETRANSMIT for parent state #147 | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #147 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #147 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49620.040929; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005771 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0ea80 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #147 | libevent_malloc: new ptr-libevent@0x7fb36c03b0b0 size 128 "road-eastnet-nonat-147" #147: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #147) | c9 49 59 84 c8 e5 a9 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 23 1f ef d0 ab 86 83 db 3a 42 1d 72 53 7f 1d | 10 99 05 4a 99 4f 3f 9a 98 88 bd df 90 bb 6b e6 | 5a 0a ce 6c 41 04 da 58 5d c4 4f ac da 97 26 a7 | 11 32 a8 06 1f e1 87 a2 42 1e e6 6a 0c 68 08 40 | f5 b9 1e 41 1b cf 5c 75 a8 60 06 b2 5f cf d9 87 | 6b e4 af 8e 02 f2 fa 22 10 06 d6 15 19 bb fa f0 | 66 24 d5 79 4a bf 96 b3 63 ad e6 0f 0b 5c f6 47 | 01 64 bd d8 46 3f e5 ea a4 26 5d e5 06 c2 a7 0f | 35 e2 b0 0a 2c 32 20 be 52 14 9d b5 0e ec 56 cf | b3 f0 bf 5e 01 73 a8 04 a0 e0 5c 8a fe 29 b1 7f | 37 66 a5 5b ec c8 06 fb 07 01 0f 4c 5e 63 33 d2 | 2f d4 5c 61 3e 3f 82 73 d1 fb c8 86 80 bb eb c9 | 28 2b cc 48 8d 11 24 24 01 fe 7a 40 83 2b 75 31 | d3 44 40 97 d2 ba 07 04 c5 0b 99 12 41 24 f8 ad | ae 7e f2 a1 cb 5b d9 cd e9 53 59 dd 6f dc 6a 90 | 39 c5 d7 b8 42 59 e8 06 c8 85 08 f1 c6 2d 85 3e | 29 00 00 24 56 cc b0 4f af 68 49 01 85 6b 57 3a | 2e bf 2e 45 7c 71 09 75 a1 1e fe 83 ec 88 f6 fe | d7 b8 8a 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 3a 80 78 a8 ce 4e 37 f2 7e 4e 6e | c2 ec 51 b5 d8 d3 ef c5 00 00 00 1c 00 00 40 05 | 80 dd aa b7 d6 9c 8d 45 3b 70 75 ca 6b f3 11 7a | 54 5b 54 8d | libevent_free: release ptr-libevent@0x7fb33803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6f550 | #147 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c9 49 59 84 c8 e5 a9 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #147 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #147 | rejected packet: | c9 49 59 84 c8 e5 a9 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #147: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.074 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a82ac0 | handling event EVENT_RETRANSMIT for parent state #39 | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #39 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #39 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49620.050303; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005012 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6f550 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #39 | libevent_malloc: new ptr-libevent@0x7fb33803b0b0 size 128 "road-eastnet-nonat-39" #39: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #39) | 19 fb 2f c4 ac 44 fb 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e b1 09 86 9c 45 db 95 7b d2 00 66 c6 50 ec 38 | 85 24 bf d9 80 0e ac 2e 4c 6c 22 df ca 10 97 2e | 3e b3 c6 bc af 43 d2 f1 96 a9 4b 69 aa cd 6c e0 | 9b a6 4b b2 87 0e 1c ca 32 4c 46 ee 52 f9 70 fd | fe 31 27 8d 61 a4 9c 97 7a a3 30 46 a8 d5 6f 83 | a7 6a c3 e9 ff 23 17 48 fe 4f dd cf 4e a9 a1 5e | d7 78 c0 fe 7d d7 62 84 4a b2 9d ae 37 bc ab ed | d5 8c 32 96 61 41 3f 21 7c ca ab 28 b6 ad 04 a3 | c6 dc bc c3 e1 13 16 74 7a 42 5b e7 e2 a2 c1 8c | b7 73 45 24 dc 37 dd 6b f2 55 c7 4f 97 81 79 6f | 14 cb 11 1e b4 40 01 19 cd a9 dd 29 3f 6f e4 ee | 95 68 2f 56 df 0a 08 86 e6 cd 7f a3 7b 00 61 f4 | c5 7c bb 03 05 36 7a 30 d5 36 53 38 4c f8 39 18 | 08 9c f5 06 b6 85 f9 e9 1b ab 6e 6e 92 66 b2 2b | 43 5a 44 5b 6f f1 98 dd 01 3a 01 23 5e f7 bc 7d | 6e f5 05 b9 ec 45 1c 8c 77 33 f8 a3 1c 1e 8c 99 | 29 00 00 24 2f 9c d8 9a 10 ed a2 18 bd 6a 97 cb | 42 26 f8 54 76 a0 4d 6e 60 6c fb c1 ce 0f 53 f0 | 1f 6b 99 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 74 e0 c5 89 b2 32 b1 7d 7b 02 d3 | e0 e6 47 82 80 6f 9f 55 00 00 00 1c 00 00 40 05 | 2e a2 7a f5 ee f4 77 35 9e db 48 5d 65 9b e7 f5 | e4 1e af e9 | libevent_free: release ptr-libevent@0x7fb3780251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a82ac0 | #39 spent 0.175 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 19 fb 2f c4 ac 44 fb 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #39 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #39 | rejected packet: | 19 fb 2f c4 ac 44 fb 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #39: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0701 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35800d120 | handling event EVENT_RETRANSMIT for parent state #228 | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #228 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #228 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49620.075677; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001319 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a82ac0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #228 | libevent_malloc: new ptr-libevent@0x7fb3780251c0 size 128 "road-eastnet-nonat-228" #228: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #228) | d5 f0 72 59 9f 13 94 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 4d 11 72 16 86 29 05 39 41 97 2f ff 33 6b a3 | e2 5f 51 ee 71 23 04 d6 72 0c fb dd 15 ef 6d c8 | 1d b7 c6 17 96 9b 3b 82 3f 74 55 80 22 53 76 ea | 2b 12 aa ae d8 aa 3b e7 03 c1 8e 79 97 e5 92 eb | b7 6d 0d a0 78 62 d0 f2 27 fb a0 42 72 ed d8 cd | 0b b4 e6 0c 99 75 b7 07 dd f8 fc 47 fd 38 1d bf | fc 96 ec 5d d0 ea 7b a2 99 77 8a 86 42 74 89 83 | 1d d8 30 c9 41 1c 6d 04 55 5a e4 6a 7f a2 48 37 | 02 c7 31 e3 a7 ef f2 c3 5f 9e 83 8d 0c 35 c9 0e | e5 2e 96 42 63 e4 ee 14 f2 43 a8 13 d6 19 12 1c | 71 11 80 4d 71 0f 19 3b 63 b8 05 30 82 8b 88 80 | bc 55 78 f9 8c 98 4b c3 03 95 ca f9 2f 2c ae 8f | 75 58 72 ba 8e 10 73 eb 12 6f 65 4a c0 7e 83 a9 | 2f 5f f5 39 44 b0 f3 71 90 fa 59 65 c5 77 f4 ce | b1 2f 6d f7 a7 ee d0 bc fc b5 7f 3e 18 f7 e0 77 | 4c 26 72 38 ff 07 80 23 0f 43 31 54 b4 87 d0 e8 | 29 00 00 24 53 c7 ad d5 ed 06 63 64 b1 b9 04 17 | 96 5d 45 22 6a eb a8 60 3b 32 23 a5 f3 37 e3 7f | 1e aa 66 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 e7 5c 74 6b 3c 37 c1 41 0f fa b6 | 88 19 1c 11 1d 3e 7c 16 00 00 00 1c 00 00 40 05 | e2 48 33 be 38 78 72 f6 d1 00 6b 61 a1 72 02 86 | 37 c7 48 ae | libevent_free: release ptr-libevent@0x7fb358012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800d120 | #228 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 f0 72 59 9f 13 94 bf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #228 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #228 | rejected packet: | d5 f0 72 59 9f 13 94 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #228: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.068 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #233 | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #233 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #233 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49620.078026; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500889 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #233 | libevent_malloc: new ptr-libevent@0x7fb358012840 size 128 "road-eastnet-nonat-233" #233: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #233) | 77 22 f4 9c 3e 1f 99 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b ec 2a 3f 06 d1 8b 5a e8 a0 a7 30 dd 97 56 a8 | fc 83 ab 1c 41 f5 e8 c3 f3 53 9d 30 18 0d be a8 | 6b a6 4b 53 32 26 a8 d4 bc df 11 84 c3 51 c0 79 | eb 6a aa 97 40 5a 35 1b a4 6a 1c c4 04 e6 8f 18 | 55 5f 5f c2 af ea 6a 6c 05 59 de 4e 19 d5 22 46 | 8f 6c 32 5b 58 46 45 5f 0c 50 78 8c 5e 88 c7 73 | e0 06 97 88 0d 6e 77 b6 da 57 bc be e2 24 fb f2 | bc 09 06 c5 c0 aa 19 66 66 6f 88 a3 1d 28 43 e3 | 36 51 8c 80 0a 70 81 d2 c6 66 0e c8 9f c6 17 19 | b8 81 ac 81 1a 75 2c b9 dc 5b 7e 21 7e 73 b2 27 | 88 a7 6d 88 e3 28 4e 9c 2a a6 e3 b1 c2 84 18 fe | a8 bd 00 37 6c ea ee 13 7b 00 0f 0a d1 ff 5f 9e | d5 9b e4 25 b2 e5 a0 5b a7 8c 8c 3d 30 b8 3c 2d | d7 5a cb be 36 80 67 eb 87 97 e6 10 f7 e4 20 c7 | b9 ae bd af 99 ea 2b 87 69 7f 4e 89 2a ed a5 67 | 99 05 49 1e d6 46 c3 74 7b 66 be bf b6 f1 d6 cc | 29 00 00 24 c5 f3 2f 2c 84 76 05 a0 25 7b 18 6c | b7 6d f8 2f 27 cc e2 71 11 4d 56 a5 c7 36 d6 2c | 0b df 39 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 f4 1a 0b 18 23 e3 b7 72 f4 2b e8 | 42 64 3b ae 76 1f 34 42 00 00 00 1c 00 00 40 05 | 5e 56 c8 b1 db 9e 88 e1 bd b5 14 1e 2e de bc 55 | b2 28 a2 2d | libevent_free: release ptr-libevent@0x7fb3440407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #233 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 22 f4 9c 3e 1f 99 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #233 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #233 | rejected packet: | 77 22 f4 9c 3e 1f 99 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #233: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a011f0 | handling event EVENT_RETRANSMIT for parent state #201 | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #201 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #201 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49620.096351; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002969 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #201 | libevent_malloc: new ptr-libevent@0x7fb3440407f0 size 128 "road-eastnet-nonat-201" #201: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #201) | 5f 8c 2f 98 2a b9 f9 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 72 1b 4b d5 18 dd 2d 5a 73 d0 41 7c 7e 89 a9 | 19 f8 4b 62 c1 9f f8 9d ff 76 0b e2 1f 44 b2 65 | 43 ea 94 88 bf 44 69 e7 07 70 c1 dc 59 58 cc ff | 59 19 82 57 fc 1c 37 9e a0 3e e4 f1 e5 85 09 b8 | cc 92 31 ca fd aa 7e e0 16 48 4f 93 4f 42 e6 41 | c6 d3 52 7b 4e f3 0c 48 a9 04 ea f5 d3 65 18 f4 | 8a 3e 8f 3d 66 71 a1 fb 46 fb e6 68 d4 de 30 4a | 77 d7 f7 51 80 44 5e 85 cb 41 c1 dc 19 46 1a 15 | 01 41 bb 17 40 1e c9 5b 1b 21 a1 10 c3 62 4c 55 | fa d0 3d 43 4e f3 0e a9 19 fd a5 f4 e9 a2 ac b4 | 40 11 51 f5 60 d4 30 87 a9 01 d5 04 88 71 af 01 | 0d f5 ab c7 33 ac d8 6a 80 db b1 bc 74 30 96 9e | f3 e1 bc b7 79 7c 12 ad fa 75 5d d2 23 fd a0 f7 | 3c 1c 0b d2 90 e2 83 a1 35 0f 5a b5 72 3d 6d 57 | 77 a3 af 0c 6a cb c1 58 a8 44 91 03 d0 f1 c3 69 | 53 0b 4f 4c fa 84 4b 60 c6 19 9c a4 39 a4 5b 44 | 29 00 00 24 ae be 08 16 b0 5a 8a 2b 33 7f 9f 5f | cb b1 1f 0b c0 df 08 67 ec 99 94 2a ad 60 2a 4f | 52 2c d3 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 75 8b 84 8e ba 07 72 da 16 0b 96 | fb 30 39 ca 67 c0 9f 42 00 00 00 1c 00 00 40 05 | 88 1b f0 23 47 26 b3 be 92 d6 69 de 00 cf 4d 8d | 78 92 34 e3 | libevent_free: release ptr-libevent@0x7fb3540300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a011f0 | #201 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f 8c 2f 98 2a b9 f9 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #201 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #201 | rejected packet: | 5f 8c 2f 98 2a b9 f9 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #201: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a52c90 | handling event EVENT_RETRANSMIT for parent state #148 | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #148 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #148 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49620.102111; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004601 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0eac0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #148 | libevent_malloc: new ptr-libevent@0x7fb3540300e0 size 128 "road-eastnet-nonat-148" #148: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #148) | 7c 0d 88 21 0c f2 96 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 04 bc 64 c4 a9 25 09 2d 75 95 3b 11 b4 ff 15 | 97 7a 18 93 a6 88 e9 2c b9 6a 56 2f 0c f9 8a d8 | e8 e9 8c f3 6e a2 1a 4d de 32 b3 62 b7 1f cf 21 | 58 10 7d f4 24 b5 81 70 c7 68 14 37 9d fd 00 6b | b4 bb f2 40 cc b3 6b 23 df e5 3d 42 b5 d1 d7 42 | c0 5c ac 6a f7 66 60 50 9f bf be d5 78 f9 b4 31 | b1 86 de 30 ed 54 6a fc f4 65 4d b6 71 b3 0e 10 | 8b ff f6 ba 06 b3 35 4f f4 27 dc 02 7d 26 88 9b | ce 4c 6b f4 f0 e1 8d 43 1e f3 4c 5f ec 71 b9 2c | e9 3b 85 fd 08 23 e1 df 81 46 1d 11 72 44 8f d9 | 74 89 1c 9f d5 79 90 5f cf 86 54 f4 23 c9 c4 31 | af 2e 84 a4 ff ec cf b7 ba 60 46 0a 15 eb 88 9e | 1a 9f 61 a8 80 c2 60 68 d5 be 6e 09 41 6f c1 fc | 1b 37 54 8c 93 b5 3d fd bd 96 aa 9b bc 05 8d 2f | 00 4c 54 bb 3b 96 94 4f 45 ac 6c 6e b1 21 ad e3 | 8b d3 f2 47 fe 35 bf 98 09 a6 a6 c8 c9 12 c2 70 | 29 00 00 24 b1 81 e7 c9 15 f6 0b 96 d5 74 cc 65 | 51 5c df 58 13 0b 15 8c 15 4d e2 64 8b 9f d6 7a | 91 6a aa 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 56 10 9c c6 bc 82 78 34 d0 03 57 | 7a d1 bd 45 e3 1a b3 5c 00 00 00 1c 00 00 40 05 | 74 be 93 cb aa 1f 0e 04 cc 93 49 b7 b1 e0 d6 3d | b3 9a 6d 48 | libevent_free: release ptr-libevent@0x7fb38803dab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a52c90 | #148 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 0d 88 21 0c f2 96 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #148 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #148 | rejected packet: | 7c 0d 88 21 0c f2 96 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #148: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a70b10 | handling event EVENT_RETRANSMIT for parent state #40 | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #40 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #40 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49620.11885; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008574 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a52c90 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #40 | libevent_malloc: new ptr-libevent@0x7fb38803dab0 size 128 "road-eastnet-nonat-40" #40: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #40) | f4 2d ea 23 2d fd 9f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 1a 9e 5c fb fb e3 3a 12 40 55 ea 02 66 64 cb | 69 42 9f 9e 73 38 34 f9 9b 29 99 d0 1f 2f 62 b0 | ff 78 90 10 b8 86 3f 49 a8 32 be f6 08 0d 11 29 | 94 2b 8b de b8 63 2c 35 79 92 00 39 68 56 d7 ad | 7e 9a a2 59 50 2b c4 f8 63 a3 0c 5d 5e 44 62 5b | fc 42 68 dd ca 56 4c 44 63 17 39 39 e0 00 1c 8f | c5 28 a6 4f 80 e9 f0 8c 5a ea 63 37 5f d7 0a a3 | b8 dc 6a fd 41 02 14 01 fa 2f 62 ae cb f1 1e 40 | 2f 20 1d 4c b4 7d c9 2c fa 60 f5 5e 61 26 a0 89 | b5 80 ba fe 31 f9 79 3e 12 33 cf 6c 99 9f 52 55 | 62 d6 02 f9 0e 35 e1 e7 8d 67 93 09 10 77 15 30 | 4a e9 d6 a0 31 50 fb be 13 05 50 dc f4 46 03 08 | 2f 95 1b 33 25 b1 ea 42 27 b1 8d 6c a6 26 e8 12 | 28 ee 49 16 a3 ec 76 ad 9e 1b cb d5 8a 26 5b 22 | 55 46 26 40 fb a4 30 9e 31 e9 07 5c 3b f7 53 4f | 4f ec 0e ee ad 7e 3f fc 05 9c b5 15 17 a2 62 3f | 29 00 00 24 28 3a b9 16 f5 d3 fa 3e 82 0e 6c a5 | b6 e0 32 27 f5 86 22 6d 8d 85 0f 17 f1 b4 a5 df | eb 51 66 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 e9 4b 4d 06 92 e2 ba cc 1d e9 b2 | 45 c8 92 47 34 22 29 80 00 00 00 1c 00 00 40 05 | 84 da 3f 80 5c a8 47 c1 08 aa 1f 48 69 9f 8f ac | 3e 3c 6c 93 | libevent_free: release ptr-libevent@0x7fb3700180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b10 | #40 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 2d ea 23 2d fd 9f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #40 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #40 | rejected packet: | f4 2d ea 23 2d fd 9f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #40: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0655 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34800d120 | handling event EVENT_RETRANSMIT for parent state #220 | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #220 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #220 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49620.139293; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.018428 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #220 | libevent_malloc: new ptr-libevent@0x7fb3700180b0 size 128 "road-eastnet-nonat-220" #220: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #220) | 46 e4 bb be 2e c2 5d 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 39 4d 80 66 08 94 81 6d ee b8 9e f9 65 a1 19 | 54 a6 0a fc 14 3b 49 4b a5 b0 75 d5 8f f4 dc f0 | 1b a7 3c f6 bb e2 05 ae e7 81 f3 39 80 b8 01 f9 | 77 d5 d3 86 7b 99 e2 d3 05 f7 72 fa 5c f1 d2 51 | b2 76 8c 56 54 09 b2 f0 63 f0 63 23 b4 3d 48 f6 | f1 7c 7c 9e fe e8 97 61 67 eb 6f f5 a8 99 0f d8 | f0 a4 2a 65 98 03 64 d4 51 ad 7e ce 83 6c 68 5a | 24 81 05 98 d2 e5 16 4b 8b 3e c7 e6 5d cd e2 fb | a8 b3 8a 3b d0 a3 7d ce 4c 78 67 e6 b6 09 60 ba | f9 1c b9 ed ac 41 f4 ed a2 6c 61 ed 1a 8b 86 32 | f9 bb e7 03 fa 79 52 88 d5 55 24 b9 5c 26 d9 4f | 84 6f 26 7a 2c f2 0f 72 55 f3 04 53 6d 42 03 19 | 2c 35 89 e8 72 3a 30 cc ba be ce f2 4a 96 71 78 | 63 64 85 27 33 b9 dc 2a 58 25 92 09 0e 9f ab 45 | ad 24 0f 92 22 24 6c f4 98 77 7a 79 50 d8 2c a5 | 5a fb ac f5 20 e9 5a 93 8b 11 3b 04 5b 8e 94 e7 | 29 00 00 24 b8 3d f3 f9 87 d9 e7 9e 4b f1 71 60 | 7a f6 ea f9 0f a9 84 5d c0 c1 a6 93 b2 00 5b f0 | d8 3e 37 a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f9 77 af d4 23 66 f6 eb 62 8a 75 68 | f1 14 74 bf 89 18 b5 2c 00 00 00 1c 00 00 40 05 | 75 8f 21 77 9e bf 74 11 1b b7 a1 b1 db ce 3f 91 | e1 e1 a3 e9 | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800d120 | #220 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-237" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-237' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #237 at 0x557d46b17800 | State DB: adding IKEv2 state #237 in UNDEFINED | pstats #237 ikev2.ike started | Message ID: init #237: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #237: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #237; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-237" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-237" IKE SA #237 "road-eastnet-nonat-237" "road-eastnet-nonat-237" #237: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-237 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-237": constructed local IKE proposals for road-eastnet-nonat-237 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 237 for state #237 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34800d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #237 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 | #237 spent 0.154 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-237" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.22 milliseconds in whack recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 e4 bb be 2e c2 5d 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #220 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #220 | rejected packet: | 46 e4 bb be 2e c2 5d 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #220: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 8 resuming | crypto helper 8 starting work-order 237 for state #237 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 237 | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 237 time elapsed 0.000999 seconds | (#237) spent 1 milliseconds in crypto helper computing work-order 237: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 237 for state #237 to event queue | scheduling resume sending helper answer for #237 | libevent_malloc: new ptr-libevent@0x7fb34c046040 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #237 | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 237 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #237 | **emit ISAKMP Message: | initiator cookie: | 4f 30 a3 80 9f 9f 65 f0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-237 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 62 80 47 96 1c c9 51 f1 0b e5 85 bc ba 8d d8 2f | ikev2 g^x 7e 2e aa 44 d1 4d 1c a5 32 20 f2 ef d0 59 1d c7 | ikev2 g^x a5 77 ca 5e 02 89 87 a6 bb c0 e0 54 5b b5 84 79 | ikev2 g^x 29 9f bb 42 c6 20 c7 56 ce cc 84 c6 1e c1 d2 f4 | ikev2 g^x 13 76 c9 2e e4 05 e9 37 e6 bd 6f 35 dc f2 cd db | ikev2 g^x 35 16 6c ad 20 92 a2 8f 48 33 b4 20 26 8f 59 2d | ikev2 g^x 4c d4 d1 24 86 23 46 ee 6e c6 b6 24 d5 4f 00 17 | ikev2 g^x 52 61 b1 bb 85 d2 0d d3 70 1d c1 d8 3c 26 6e b6 | ikev2 g^x 77 3b f1 af 93 e8 cc 5f cb 1e 13 01 93 4d 4b b3 | ikev2 g^x 72 06 cc a6 aa 05 5c 87 d3 9f 0b a2 d6 36 1e 41 | ikev2 g^x 74 1d 84 0c 84 17 40 09 ae 80 b1 14 f6 05 f4 d7 | ikev2 g^x 5d 5f bd 62 54 0a 41 03 07 59 f0 77 45 28 e1 78 | ikev2 g^x 15 ba 85 f9 68 5c c5 ec 72 3c 38 3b 02 ac c0 42 | ikev2 g^x c6 0b db 17 1d c8 55 9c ae 19 48 78 01 ba db 02 | ikev2 g^x d5 a9 df ad 4f 67 c1 5c 0b ad 91 db 71 af d7 d7 | ikev2 g^x 81 9f c3 2e 7e 4d 1a 85 96 12 81 67 a7 1b 56 fa | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e8 e3 42 9e a6 0b 6b 38 33 d4 39 b2 ba a4 24 74 | IKEv2 nonce 62 c1 99 66 60 77 d8 65 6c a2 d4 f2 70 50 e9 26 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4f 30 a3 80 9f 9f 65 f0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ed | natd_hash: port= 01 f4 | natd_hash: hash= 86 8a 35 95 f7 6d e2 2a d4 81 0f d3 67 1d 3d 86 | natd_hash: hash= 23 6d 84 2e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 86 8a 35 95 f7 6d e2 2a d4 81 0f d3 67 1d 3d 86 | Notify data 23 6d 84 2e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4f 30 a3 80 9f 9f 65 f0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 36 30 d8 35 65 36 0c cb 2b 9c c9 7a 14 59 39 58 | natd_hash: hash= c5 b8 4c 54 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 36 30 d8 35 65 36 0c cb 2b 9c c9 7a 14 59 39 58 | Notify data c5 b8 4c 54 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #237 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #237: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #237 to 4294967295 after switching state | Message ID: IKE #237 skipping update_recv as MD is fake | Message ID: sent #237 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-237" #237: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.237:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #237) | 4f 30 a3 80 9f 9f 65 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 80 47 96 1c c9 51 f1 0b e5 85 bc ba 8d d8 2f | 7e 2e aa 44 d1 4d 1c a5 32 20 f2 ef d0 59 1d c7 | a5 77 ca 5e 02 89 87 a6 bb c0 e0 54 5b b5 84 79 | 29 9f bb 42 c6 20 c7 56 ce cc 84 c6 1e c1 d2 f4 | 13 76 c9 2e e4 05 e9 37 e6 bd 6f 35 dc f2 cd db | 35 16 6c ad 20 92 a2 8f 48 33 b4 20 26 8f 59 2d | 4c d4 d1 24 86 23 46 ee 6e c6 b6 24 d5 4f 00 17 | 52 61 b1 bb 85 d2 0d d3 70 1d c1 d8 3c 26 6e b6 | 77 3b f1 af 93 e8 cc 5f cb 1e 13 01 93 4d 4b b3 | 72 06 cc a6 aa 05 5c 87 d3 9f 0b a2 d6 36 1e 41 | 74 1d 84 0c 84 17 40 09 ae 80 b1 14 f6 05 f4 d7 | 5d 5f bd 62 54 0a 41 03 07 59 f0 77 45 28 e1 78 | 15 ba 85 f9 68 5c c5 ec 72 3c 38 3b 02 ac c0 42 | c6 0b db 17 1d c8 55 9c ae 19 48 78 01 ba db 02 | d5 a9 df ad 4f 67 c1 5c 0b ad 91 db 71 af d7 d7 | 81 9f c3 2e 7e 4d 1a 85 96 12 81 67 a7 1b 56 fa | 29 00 00 24 e8 e3 42 9e a6 0b 6b 38 33 d4 39 b2 | ba a4 24 74 62 c1 99 66 60 77 d8 65 6c a2 d4 f2 | 70 50 e9 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 8a 35 95 f7 6d e2 2a d4 81 0f d3 | 67 1d 3d 86 23 6d 84 2e 00 00 00 1c 00 00 40 05 | 36 30 d8 35 65 36 0c cb 2b 9c c9 7a 14 59 39 58 | c5 b8 4c 54 | state #237 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34800d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #237 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 | #237 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49620.145623 | resume sending helper answer for #237 suppresed complete_v2_state_transition() and stole MD | #237 spent 0.48 milliseconds in resume sending helper answer | stop processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c046040 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 30 a3 80 9f 9f 65 f0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #237 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #237 | rejected packet: | 4f 30 a3 80 9f 9f 65 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #237: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61bd0 | handling event EVENT_RETRANSMIT for parent state #149 | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #149 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #149 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49620.16983; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005121 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a011f0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #149 | libevent_malloc: new ptr-libevent@0x7fb34c046040 size 128 "road-eastnet-nonat-149" #149: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #149) | ec 1b 62 37 44 a3 17 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 08 91 37 b8 3d c4 a5 fb 8f 59 2b cb c4 ee a3 | 59 01 01 81 cd 69 2d 85 93 60 f7 65 1f 64 aa eb | 93 60 17 84 59 2d ec 44 26 cf 20 fe db 7e d9 f6 | 7d a2 69 c3 4c ed d8 f3 0a 6b d4 5b e7 47 78 e3 | 80 3c 2c 01 cd d6 a8 65 7e cc 13 22 72 38 45 64 | 17 76 db 68 fd 9e 02 c1 4e e0 91 4f 14 0c 06 72 | 4e df 03 59 bc 72 4f af 9f 27 39 bd 57 c8 9d e1 | 90 f7 3b a1 d1 79 66 94 af 42 c3 62 cd d5 2d cd | ac 6c ea d6 94 1b f4 91 4d ad 49 21 48 4b 36 1c | 53 18 c6 23 73 5e 40 ed e6 7e 6a 25 d8 dd ef 07 | 7d 88 f4 a9 e1 ff e9 29 7d 10 cf 47 92 a2 72 35 | 95 c9 53 7e 8d f1 bb ba 54 1d 40 b5 a0 d1 1e d9 | 0b 86 d8 2d 01 1a 34 e1 77 f0 c8 57 84 a9 f4 dc | 35 1f 8e bc 5d f2 ca 58 ec a1 ad a9 cd 45 4a 2d | 23 38 26 ab df a9 05 75 cd 84 d4 66 7c be 9c f9 | 7f e7 96 6a 2b a4 d6 b4 04 50 ef ba e8 3c eb 60 | 29 00 00 24 f6 11 7c 5d 38 85 36 80 dd ed f7 d5 | 65 1c 39 a3 95 3d e4 a2 88 84 cf 2f 03 e4 0d 86 | 6f f9 18 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 49 c3 fc 0d 4b 5b dd c8 8b e4 44 | 1a 6a 18 02 f4 d1 ea f3 00 00 00 1c 00 00 40 05 | 4e f4 0c 8d 48 4d 9f e4 0b 19 05 64 48 99 98 79 | d2 ff 3d 6d | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61bd0 | #149 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 1b 62 37 44 a3 17 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #149 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #149 | rejected packet: | ec 1b 62 37 44 a3 17 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #149: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0822 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aeb540 | handling event EVENT_RETRANSMIT for parent state #202 | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #202 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #202 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49620.189202; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003826 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #202 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 "road-eastnet-nonat-202" #202: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #202) | 98 0c a0 3b 8e c3 04 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 4a de 90 9e 09 12 3c c9 7a 03 ab 1b f1 18 11 | 66 c3 f7 79 15 3a 95 02 ba e1 c3 e1 f6 5a 7b 34 | 8e de 4d 10 9a e1 70 a5 55 9d f4 c1 17 92 7c df | 68 e1 17 a5 99 1c fb 35 b9 25 cd 23 53 a8 26 d2 | b4 87 e9 2f e3 5a ea 45 0a 90 48 f4 6a 56 94 50 | e4 57 95 d6 52 83 af 6a c6 31 70 b1 c4 d3 c8 6b | cf c5 42 e4 73 01 2f be 13 4a 08 6e a7 91 68 14 | ad a5 a0 e4 14 1f a0 f2 00 98 4c ce c7 d5 c0 b6 | 15 77 5c 51 52 78 e1 34 5c df ff 32 7c 7c eb 4c | 74 06 ff d8 24 f4 34 27 4b f7 4d 5c de 29 22 32 | 61 0e 41 b1 a4 d1 44 ff 96 54 64 39 71 47 b7 07 | 8b 2d f1 7b c7 ff 29 67 2b 47 cf 64 2a ba 75 f5 | b7 8f 94 01 0c 73 d3 d0 a0 ca 7b 5c 80 ff e9 5a | df 27 66 99 d5 41 03 93 26 82 2e 43 c1 d3 4e 98 | 2a e1 9f 1a 15 c9 bf 3d d7 73 59 c0 eb c5 7f 3c | 4c 61 b0 05 20 29 0a b9 6b bf 44 e2 c1 1a 84 6d | 29 00 00 24 99 ea 46 58 fc ef 28 85 a0 72 43 c8 | 36 86 2f 35 31 69 ef db 0d c0 f1 46 4d af df db | 48 57 6f 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 23 33 21 68 f3 9f d6 75 73 74 16 | 0f 96 1b 0a 5a 2e 12 b4 00 00 00 1c 00 00 40 05 | 9b b4 ff f5 5e e8 7e 5a 50 28 47 10 22 d7 72 89 | 2b d0 c4 98 | libevent_free: release ptr-libevent@0x7fb36c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aeb540 | #202 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 0c a0 3b 8e c3 04 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #202 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #202 | rejected packet: | 98 0c a0 3b 8e c3 04 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #202: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a76210 | handling event EVENT_RETRANSMIT for parent state #229 | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #229 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #229 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49620.196523; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.005619 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aeb540 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #229 | libevent_malloc: new ptr-libevent@0x7fb36c01d920 size 128 "road-eastnet-nonat-229" #229: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #229) | 20 97 6e 08 83 53 46 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 59 ef 6c f0 3c e5 e0 cc 33 49 bc 05 30 a4 2e 63 | 40 b9 24 1d 30 3f 19 68 ce 4b ca f6 ef 1a a6 a9 | 5d 39 1c 86 c0 9f ab 47 fc 91 e7 41 3f 1d 89 da | 32 34 23 b2 92 45 82 aa b6 a2 b3 81 08 5d d4 d6 | 1a c6 db 13 96 83 8f db 02 0b e9 7b b2 14 62 aa | e1 68 37 82 79 1d ad b1 57 7f 25 a7 73 b7 37 87 | 5f 18 8b b1 9d a8 83 da d0 1c d4 ab 43 2e 39 e8 | 66 1a a5 36 6d 58 db 88 48 18 f4 d1 6a aa ea a2 | d4 61 12 6e 9d 66 34 26 cc 34 20 9e ee d3 7c 0e | b5 c3 c0 49 b9 a1 7d aa 84 e0 16 0d 30 3d 39 8b | 45 8b ca 2d 9a b8 31 03 33 bc e7 3c 1d 38 7b ad | c5 f3 f6 f7 be e9 2c 8c 87 60 cc eb a3 f8 ab f2 | a1 ec 16 ca f8 6c 96 69 77 3b 56 28 d0 57 05 dd | fa 6d 9c 0b 58 57 29 b7 d8 9e 77 ff a1 d9 ae 60 | 7b 96 73 6a b9 b8 7b 60 c3 f5 35 8e 8a fc 09 4d | 37 4c b1 4a c0 bc c4 90 71 ce a8 9f 0b 83 84 f7 | 29 00 00 24 bf ef 58 c8 50 05 c6 7d 73 f4 dc fa | 25 60 4d 48 2b 2d d1 e6 80 96 87 ef d5 27 62 2c | 4a bf b7 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 5b b6 cd 13 a1 fb 02 f0 d8 20 b7 | ee bd 8b 90 01 a4 d0 34 00 00 00 1c 00 00 40 05 | f3 e5 ac c7 45 89 3a 77 ae 9e aa 53 4d 4c 6f 3c | 03 52 b3 50 | libevent_free: release ptr-libevent@0x7fb38002d3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a76210 | #229 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 97 6e 08 83 53 46 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #229 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #229 | rejected packet: | 20 97 6e 08 83 53 46 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #229: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8cc0 | handling event EVENT_RETRANSMIT for parent state #41 | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #41 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #41 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49620.210869; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006324 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a76210 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #41 | libevent_malloc: new ptr-libevent@0x7fb38002d3a0 size 128 "road-eastnet-nonat-41" #41: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #41) | 8c ff 26 ec fd d0 54 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 6e ec 95 3c 3a 16 99 41 58 58 6d 01 e2 00 52 | 61 4b c1 ec e1 3d d8 4e 54 c1 3f 99 6b 75 66 7c | 92 13 65 ae e7 70 46 75 9c c5 22 7e 39 16 2c 7c | ed 79 f7 7b 1e 03 31 32 5f 32 c2 43 74 2e 80 66 | 05 70 11 cc 43 ce 1e db 54 28 24 d1 42 b1 78 ad | e4 d1 e6 87 87 84 0f b3 11 50 a6 79 e1 08 7c 97 | 7e bd ba 46 ef f8 51 ce 68 86 83 2a 2c 29 00 29 | a5 58 88 f4 ed 2a f4 20 30 da 5d b1 69 45 2e 86 | 07 5f aa 0a 89 4a 6e 50 df 32 c3 37 59 a0 ba ad | 86 bd 19 1f 9a e2 19 57 1e fc 59 a2 20 ba a6 61 | df 8c b1 78 f4 73 20 28 d7 5d 27 a9 6d f4 51 05 | 00 85 1f 11 24 82 a0 ad b8 70 fc 6e 4d 99 a5 50 | dd 2e 79 4a 4c a1 78 07 7c f4 48 8d c5 cd ae 3d | 60 f1 3e 46 13 92 0c ad 34 dc 62 b8 45 01 1d 0e | 54 aa 15 f0 b8 36 03 5c 9a b5 ba b5 7c 77 32 6f | a5 95 b6 eb ec c2 d3 a2 c8 7a f9 23 04 ed b5 3b | 29 00 00 24 d2 1e ab ae e7 c2 8c f2 ef 74 c1 f0 | 3d f2 d7 f9 46 a9 e4 e0 b6 87 92 c1 10 9a fa bd | 74 9b e3 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 98 3f 00 de 9d 4b 8f 8e e4 88 e6 | cb 33 f8 3a c9 9d db 23 00 00 00 1c 00 00 40 05 | 7d 19 19 07 bb fc 4c f4 5b 43 3f 70 14 2d 10 a5 | 77 03 39 4f | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8cc0 | #41 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c ff 26 ec fd d0 54 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #41 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #41 | rejected packet: | 8c ff 26 ec fd d0 54 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #41: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.067 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-238" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-238' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #238 at 0x557d46b18dc0 | State DB: adding IKEv2 state #238 in UNDEFINED | pstats #238 ikev2.ike started | Message ID: init #238: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #238: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #238; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-238" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-238" IKE SA #238 "road-eastnet-nonat-238" "road-eastnet-nonat-238" #238: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-238 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-238": constructed local IKE proposals for road-eastnet-nonat-238 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 238 for state #238 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469f8cc0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #238 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 | #238 spent 0.164 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-238" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.243 milliseconds in whack | crypto helper 12 resuming | crypto helper 12 starting work-order 238 for state #238 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 238 | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 238 time elapsed 0.000989 seconds | (#238) spent 0.994 milliseconds in crypto helper computing work-order 238: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 238 for state #238 to event queue | scheduling resume sending helper answer for #238 | libevent_malloc: new ptr-libevent@0x7fb340045ed0 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #238 | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 238 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #238 | **emit ISAKMP Message: | initiator cookie: | f6 ab 39 cf c5 7d 06 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-238 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x af d3 7b 83 d9 03 ff 12 c8 97 56 ab b2 14 10 e0 | ikev2 g^x 48 f1 3b e3 4f 64 7a 9a 9e ba 3d 1c 59 ad a8 95 | ikev2 g^x bd 51 64 ba be 30 e1 34 45 a4 34 1f 3e df 3f d6 | ikev2 g^x 86 b0 59 41 db 94 3d 0d e6 62 59 ee 2c dc c0 b6 | ikev2 g^x 14 1d 3c ee 48 4c 83 08 18 f6 26 a9 cc aa db a7 | ikev2 g^x 11 c4 2a 15 e2 1f 73 e6 9e 15 53 88 2a 78 32 86 | ikev2 g^x e7 60 9e db ba 38 76 7a 13 5c c5 ac fd 1c e1 b3 | ikev2 g^x d9 b0 34 80 53 e2 98 a7 ba 07 c7 e0 29 79 99 fa | ikev2 g^x 34 4e 3c 41 8c 32 8f 62 7b 0b 06 3e 96 0f e4 ec | ikev2 g^x 50 ea 8b 72 ce 3c a2 48 3d 50 a6 bf fa b9 6f 49 | ikev2 g^x 42 35 90 06 bb 42 36 54 c0 36 66 cb e8 62 33 36 | ikev2 g^x 54 3c 66 18 ff f4 71 a8 dc 58 87 96 fa c3 1b c5 | ikev2 g^x dd a8 8d cc aa e7 e2 09 78 51 8e a8 fa 1a ff ca | ikev2 g^x 8e a6 7b eb 75 ad 7d 26 12 45 b0 78 8a db a7 e1 | ikev2 g^x 91 4e 5d 71 95 e7 03 95 d9 44 14 28 62 b8 ce bc | ikev2 g^x 33 38 e8 30 35 30 6f c6 da 40 e4 e4 28 6a f5 3c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e9 54 88 95 a6 38 9d 64 f1 e3 1e dc e9 d3 25 19 | IKEv2 nonce 54 a9 08 d5 30 10 d0 0d 46 91 20 94 d2 ec 4b e2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f6 ab 39 cf c5 7d 06 84 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ee | natd_hash: port= 01 f4 | natd_hash: hash= ba 09 df c5 c7 bf ac 94 7a a2 81 0c 76 04 c4 df | natd_hash: hash= 2b 4d 28 f9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ba 09 df c5 c7 bf ac 94 7a a2 81 0c 76 04 c4 df | Notify data 2b 4d 28 f9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f6 ab 39 cf c5 7d 06 84 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 49 c2 83 19 04 1a b6 87 e7 32 12 a0 0a 0c 4f 92 | natd_hash: hash= e7 02 e1 ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 49 c2 83 19 04 1a b6 87 e7 32 12 a0 0a 0c 4f 92 | Notify data e7 02 e1 ed | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #238 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #238: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #238 to 4294967295 after switching state | Message ID: IKE #238 skipping update_recv as MD is fake | Message ID: sent #238 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-238" #238: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.238:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #238) | f6 ab 39 cf c5 7d 06 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af d3 7b 83 d9 03 ff 12 c8 97 56 ab b2 14 10 e0 | 48 f1 3b e3 4f 64 7a 9a 9e ba 3d 1c 59 ad a8 95 | bd 51 64 ba be 30 e1 34 45 a4 34 1f 3e df 3f d6 | 86 b0 59 41 db 94 3d 0d e6 62 59 ee 2c dc c0 b6 | 14 1d 3c ee 48 4c 83 08 18 f6 26 a9 cc aa db a7 | 11 c4 2a 15 e2 1f 73 e6 9e 15 53 88 2a 78 32 86 | e7 60 9e db ba 38 76 7a 13 5c c5 ac fd 1c e1 b3 | d9 b0 34 80 53 e2 98 a7 ba 07 c7 e0 29 79 99 fa | 34 4e 3c 41 8c 32 8f 62 7b 0b 06 3e 96 0f e4 ec | 50 ea 8b 72 ce 3c a2 48 3d 50 a6 bf fa b9 6f 49 | 42 35 90 06 bb 42 36 54 c0 36 66 cb e8 62 33 36 | 54 3c 66 18 ff f4 71 a8 dc 58 87 96 fa c3 1b c5 | dd a8 8d cc aa e7 e2 09 78 51 8e a8 fa 1a ff ca | 8e a6 7b eb 75 ad 7d 26 12 45 b0 78 8a db a7 e1 | 91 4e 5d 71 95 e7 03 95 d9 44 14 28 62 b8 ce bc | 33 38 e8 30 35 30 6f c6 da 40 e4 e4 28 6a f5 3c | 29 00 00 24 e9 54 88 95 a6 38 9d 64 f1 e3 1e dc | e9 d3 25 19 54 a9 08 d5 30 10 d0 0d 46 91 20 94 | d2 ec 4b e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 09 df c5 c7 bf ac 94 7a a2 81 0c | 76 04 c4 df 2b 4d 28 f9 00 00 00 1c 00 00 40 05 | 49 c2 83 19 04 1a b6 87 e7 32 12 a0 0a 0c 4f 92 | e7 02 e1 ed | state #238 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469f8cc0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8cc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #238 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 | #238 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49620.215762 | resume sending helper answer for #238 suppresed complete_v2_state_transition() and stole MD | #238 spent 0.487 milliseconds in resume sending helper answer | stop processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb340045ed0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 ab 39 cf c5 7d 06 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #238 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #238 | rejected packet: | f6 ab 39 cf c5 7d 06 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #238: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aef6c0 | handling event EVENT_RETRANSMIT for parent state #234 | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #234 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #234 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49620.218974; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500813 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e05a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #234 | libevent_malloc: new ptr-libevent@0x7fb340045ed0 size 128 "road-eastnet-nonat-234" #234: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #234) | f2 fd b6 5b dd 65 ca 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 84 9f 8e f2 4d ae 28 c3 a6 33 85 a7 41 17 2e | a7 fb 37 ec dc 5e da 22 ed a7 d6 7f e1 29 5e 3a | c1 0a e8 67 19 e8 ac d8 ab c4 ce 43 3f 4e 0f bb | 7c 98 41 2b 6f 77 ca d9 32 a6 af f9 98 cd dd 12 | d9 37 bd e9 25 be 75 b5 bd 5e e0 83 6f 45 f8 da | 18 94 6a f4 88 bf 0e 4d e2 07 2b 36 d8 6f 3a 20 | 7f 78 6a 85 8a e5 3c dd 81 bb 63 90 5e cb bc ba | da ba 10 8a c6 0e 8a aa 71 5a 96 4e 6c 70 41 b3 | b5 ed c1 a3 26 f6 9d 2f 3e 30 60 a8 7a d4 51 c7 | c1 d0 6f 12 78 fa f6 7a 64 88 82 80 72 24 ff 23 | 06 91 a9 95 a1 36 33 ce f2 c2 55 d0 b5 3c 49 79 | 6f 7f 3e 42 f0 3e 13 68 8b e1 82 c2 f7 ef 92 e7 | 73 e6 b2 0b c7 04 76 33 01 80 30 de 76 f1 e6 56 | a7 c5 01 91 93 65 f4 09 85 c4 02 fa 63 8b e5 e6 | 21 78 9f 81 bf e4 b0 d6 2d 62 90 d2 7c 1e 4b d9 | ae 42 db a5 3c 94 61 a1 2c 3b 37 25 2d 53 32 5c | 29 00 00 24 9d 5d 40 b5 2d ec 67 ae 83 64 17 c2 | 32 3b d8 b9 21 ed 79 bc f4 91 0a 50 e4 b3 2c c0 | f4 72 58 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 89 bc a1 a0 be dd 06 e7 d6 84 21 | 72 6a c6 f8 b6 a8 a1 51 00 00 00 1c 00 00 40 05 | 53 6b 47 d7 1e 7d 4e e3 0d 3e 41 f7 75 f0 92 15 | 7c 13 7e ba | libevent_free: release ptr-libevent@0x7fb3400357c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aef6c0 | #234 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 fd b6 5b dd 65 ca 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #234 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #234 | rejected packet: | f2 fd b6 5b dd 65 ca 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #234: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0647 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a92f80 | handling event EVENT_RETRANSMIT for parent state #150 | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #150 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #150 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49620.233895; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006189 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aef6c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #150 | libevent_malloc: new ptr-libevent@0x7fb3400357c0 size 128 "road-eastnet-nonat-150" #150: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #150) | 8a b6 09 5a 0a 8f be 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 2e 98 c4 69 1c 50 37 00 a8 8c d0 f1 d2 8c 28 | 94 f1 69 8e be e8 36 fe 99 97 d5 0c 37 4e 1b 26 | 9e e0 4e bd 73 a0 79 f4 5a 6b f2 8d 96 4f 03 3e | 0e 75 44 c8 2c a3 81 79 2e 0b 2e 8f 7d 7f dc f9 | 3f db 53 4d 6e 68 53 6c 49 99 36 00 d7 4f 7e e1 | 7e a7 57 fb ab 9f e1 d6 e7 24 3b 02 1f 12 10 de | 15 c5 08 ce f3 51 03 84 19 e7 47 83 1a 2e 38 c2 | 45 5b ab 60 7e 25 f4 92 0b eb 31 c2 32 59 f7 71 | 30 c7 ef cb 28 48 6e e3 c6 10 bc 9c 64 1e 68 59 | ee 88 40 85 37 40 80 12 7d 99 b2 33 c0 da 4b fb | 3a 39 ae b6 0e 0b 59 93 7d 9a d6 ee 50 27 09 f4 | a0 3a c3 63 a9 ac e9 9b 13 ed 9f a6 df 4f 55 3a | 82 36 63 e6 11 77 4d 54 ff a6 ad fe 0f 97 d9 c1 | 30 72 88 21 1f 78 34 56 b8 51 de f7 62 00 f9 29 | 66 5f d3 86 45 83 9d 48 c9 24 49 11 29 28 62 bd | 6e 8b 60 b5 72 8e cb ea 93 0b fd cb 0c 58 7b 88 | 29 00 00 24 36 30 98 85 8b 67 65 29 82 81 da 88 | 70 5a df 1d 0c c2 0c e8 b9 29 94 59 0f 89 5b 4b | 52 bc 0b a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 25 ba 47 28 1c 0e 38 fd e4 d3 0a | c8 ae 66 94 c0 bd 04 2b 00 00 00 1c 00 00 40 05 | 5a 15 ef 3e 5b 63 8d c2 17 ab ae 76 63 67 33 8b | f3 ee 4c d4 | libevent_free: release ptr-libevent@0x7fb34c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f80 | #150 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a b6 09 5a 0a 8f be 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #150 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #150 | rejected packet: | 8a b6 09 5a 0a 8f be 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #150: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35000d120 | handling event EVENT_RETRANSMIT for parent state #221 | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #221 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #221 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49620.242251; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002236 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #221 | libevent_malloc: new ptr-libevent@0x7fb34c03b0b0 size 128 "road-eastnet-nonat-221" #221: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #221) | 90 8f bf e7 cf b7 65 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 72 44 57 63 97 26 0b d0 33 1e c1 f5 c9 36 d4 | f7 1a 62 3c a3 39 42 e3 c4 ee 5b 04 7a e2 93 d5 | 0f 83 78 28 fb 94 39 4c 7a cc c9 c9 ad ce 5e 59 | 68 4d ba 18 1e 4a 63 94 c5 70 f6 5d b4 77 65 58 | 10 84 fe ef 60 83 64 5b f2 89 50 99 ac e1 51 8a | d7 74 3b 5d 70 17 cd 8b 95 39 65 4b aa 2f 20 67 | bc c1 06 22 2c 60 51 a7 d1 25 ba e3 e5 7c 2a 24 | 9f dc 2e 8b 87 d8 be dd e2 1f 7f 7d 88 f1 33 ff | db 8b ce 43 0a 9d db 20 79 1b 34 f9 9e 77 87 58 | 03 3d 5b 8a b0 e8 e3 38 e6 81 79 10 ab 3d b2 02 | af 63 97 ff 1b 89 ab 73 45 c7 84 d1 96 d1 2b 2c | 45 33 cc 2a 87 09 9b 3c 40 ce 87 0c 1b b1 51 a1 | 8d 74 42 7d fd e9 3f de a9 93 ef 77 e9 c1 c8 91 | 38 fa 26 85 5e 1b 88 91 35 9e 5f 73 34 d8 96 fe | 85 b3 52 f7 42 b5 7d 56 e8 9e bb f2 e5 07 db 70 | 5b 28 4b 5d 8e 85 f0 35 5c f8 45 ae 02 de 27 d9 | 29 00 00 24 cd 4c af b1 99 23 18 29 29 9d f9 32 | c6 a6 09 22 63 0a d9 08 58 b2 a1 77 c9 06 48 e1 | 9c 8b 9e bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 fb 28 ad 15 31 02 8e bd d8 0f 80 | 1c 8f fa a7 e9 1f 34 e3 00 00 00 1c 00 00 40 05 | c4 70 86 36 d0 0a de 28 47 ec ca 4b f0 c7 6b 67 | c3 4a 0b 4c | libevent_free: release ptr-libevent@0x7fb350012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35000d120 | #221 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 8f bf e7 cf b7 65 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #221 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #221 | rejected packet: | 90 8f bf e7 cf b7 65 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #221: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a88140 | handling event EVENT_RETRANSMIT for parent state #203 | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #203 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #203 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49620.269024; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003861 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35000d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #203 | libevent_malloc: new ptr-libevent@0x7fb350012840 size 128 "road-eastnet-nonat-203" #203: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #203) | 02 57 d9 3d 13 25 98 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 1c fb 0e 8f 43 ac f5 0b 5f c4 59 e2 84 8d ff | 93 42 c3 e3 19 35 29 34 62 44 7f 8b b9 60 94 1a | 68 20 33 36 7e 07 ef b9 9d 1a c3 c4 e5 e3 be 6f | df 48 47 f9 cf 7a 23 fa b8 b9 0f be e3 51 16 88 | 65 2c 32 42 a7 de 33 7a 8d 00 20 5f 8c 23 cc 9e | fd 93 18 91 08 48 46 f6 9e a4 63 04 36 57 fb 82 | db a9 f0 b9 fc 47 88 c1 af a0 52 b6 f2 77 4a 78 | 7b 45 5f 81 61 4c a8 5c 40 e9 6e 59 e6 65 a5 7d | 8f 67 9e 58 05 f0 0e f3 10 e5 4c 4f bd 20 a3 7c | 88 1e 84 95 b7 f3 51 db 65 68 67 47 f1 73 c2 67 | 48 a3 dc a1 e1 3f e7 d7 4c f9 dc 2e f5 e0 7c 72 | 3d 2f 82 8d c1 ef e8 9c 9c 82 12 27 e5 0a e4 bb | af 79 89 91 83 59 68 9b 2f 98 3b 89 0a 25 be 74 | c0 0f b6 99 3d 8f b4 39 9b 96 c4 d8 6a 5d 53 81 | 43 9d 7a a3 69 c9 61 8c c0 23 f3 33 21 de 95 0e | 53 97 be e9 2a e9 9e 71 b5 e7 b9 2b cb 16 40 76 | 29 00 00 24 ad 22 cd 07 aa fe 98 d8 02 52 a4 3c | 95 12 5a d9 ed 8e 49 c5 19 c8 cb b1 88 c1 88 b9 | c9 3f 70 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 60 71 59 6f 4c 24 43 8a 9c 00 7b | c3 3a 97 05 f3 23 35 42 00 00 00 1c 00 00 40 05 | 0d db 79 a2 0f bb d9 bd 26 88 9d ac d1 d3 87 df | 66 b4 d9 d4 | libevent_free: release ptr-libevent@0x7fb38001abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a88140 | #203 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 57 d9 3d 13 25 98 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #203 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #203 | rejected packet: | 02 57 d9 3d 13 25 98 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #203: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae48c0 | handling event EVENT_RETRANSMIT for parent state #230 | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #230 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #230 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49620.270571; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001306 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a88140 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #230 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 "road-eastnet-nonat-230" #230: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #230) | 69 22 82 19 d7 c8 c9 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 71 02 af b0 7d 99 80 ca 0a ed d4 9f 12 56 05 | 6a 75 f1 ff 5b 89 24 b2 2d d4 89 b9 fc ea 10 f2 | df 8b 07 6c 92 3c 32 d6 01 3c 1f 7c 77 2b 56 de | 1e a1 3c 62 24 a6 4e 3c 9e 57 23 35 a7 0e 3a c6 | fa 5e 05 ee c7 8d 32 41 ce 29 80 63 51 1d 1e 52 | 10 94 62 f2 6f 5b c8 e5 23 77 b3 5f 63 5e f3 42 | a7 b1 47 2a 85 90 69 04 a8 c1 76 53 9f c5 2d 06 | 66 93 5b f5 d4 f1 c7 6c 23 0b 21 57 da 55 b4 10 | b4 68 7f 72 aa 6f fd bf fc 43 d5 6e 02 91 b0 ea | ca b7 fc 32 ec e5 bd 79 74 66 56 52 a1 e5 b7 e9 | d9 32 42 bc f6 01 cc 69 66 87 01 cd 32 29 bd 73 | ff aa f2 68 30 ae 30 af 09 b3 2b 2d 0b 90 c5 d7 | e7 b1 60 17 46 74 a0 50 98 f9 06 d2 06 37 1f b3 | 0c 89 d8 99 c7 ac a0 2a 5a 19 c6 cc 6e e1 77 ee | 98 e6 45 5b c8 98 8d c9 0d d9 64 39 5b ba a1 36 | 39 81 f2 e5 39 16 cf c0 fa 26 3f 76 ff 4a de 8f | 29 00 00 24 ca 6b 45 b5 ad 3a dc fb 46 3f ff f9 | b7 9e 2a f6 cb 7b a0 93 c0 ff b4 97 10 4e 36 19 | c5 61 7a bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f fa a5 ce 96 35 1e 80 97 f9 81 69 | 6c 9b 29 c3 b6 c2 c3 05 00 00 00 1c 00 00 40 05 | 7e 27 b2 4c db 32 1f 5b c7 5c 32 4b 9f eb 6e df | 20 af 51 69 | libevent_free: release ptr-libevent@0x7fb3480251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae48c0 | #230 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 22 82 19 d7 c8 c9 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #230 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #230 | rejected packet: | 69 22 82 19 d7 c8 c9 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #230: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0753 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a89700 | handling event EVENT_RETRANSMIT for parent state #42 | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #42 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #42 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49620.294408; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006056 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae48c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #42 | libevent_malloc: new ptr-libevent@0x7fb3480251c0 size 128 "road-eastnet-nonat-42" #42: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #42) | 6d 45 59 82 ce 2c 77 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 19 87 21 99 aa 5a cb db ce 0f 02 f2 50 c9 ac 92 | 89 7c 70 85 a8 a7 33 4a c2 44 36 a5 03 8e 1f 50 | c8 86 2e d1 a1 d8 14 17 9c 7c a1 44 65 ba 61 77 | f0 62 19 6f f9 72 cc 36 22 03 c3 7d e3 8c 01 7c | 58 c0 91 2e 4f 24 ac cd af f7 da 61 3e 4b 43 c9 | b4 5d 67 e2 f1 65 be 23 88 f7 f4 e6 25 50 c9 e3 | 21 af 1c 45 62 8a 73 3a 98 47 b9 78 6f ee 87 26 | 3b 63 01 1e 58 61 99 0e 7a 91 7d 30 e0 59 53 0b | 92 57 66 fd a7 1f 2b 11 d7 59 95 9a 31 fc 95 b7 | 6b 6d 54 d3 d2 0f 8f 6e 22 a6 95 24 ad 69 c7 e4 | 30 99 2e f3 f9 ce 36 7f 2b 10 24 3b 8a de bf 7e | cb e6 f5 71 51 3c fe 08 40 b7 0a aa 06 06 b7 d2 | 69 fa d5 d4 16 ea b0 b1 e6 af 20 69 3c 12 1e 86 | 3a 05 a1 45 01 d3 59 e6 49 c9 c2 6a 69 6b a1 a1 | b0 18 e7 68 dc 1f 70 e8 33 59 8d 8e 1f 6a e1 13 | 5e 04 b2 02 62 fb f4 16 44 cd 9d 1e 33 84 73 83 | 29 00 00 24 98 90 54 f6 26 53 aa 96 7a 47 ff f3 | 5b dc e1 95 5c f0 6d 5d ed 6d 00 c6 1d e8 59 f1 | 2a 1c 8a 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 cb 92 0c 07 24 d9 90 48 22 d8 76 | e5 5b bc c8 39 99 d2 4d 00 00 00 1c 00 00 40 05 | cb e3 e2 5e 9a 09 f4 90 ee 73 df 07 77 16 6b 37 | da 99 3b e3 | libevent_free: release ptr-libevent@0x7fb34802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a89700 | #42 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 45 59 82 ce 2c 77 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #42 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #42 | rejected packet: | 6d 45 59 82 ce 2c 77 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #42: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0668 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-239" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-239' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #239 at 0x557d46b1a380 | State DB: adding IKEv2 state #239 in UNDEFINED | pstats #239 ikev2.ike started | Message ID: init #239: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #239: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #239; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-239" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-239" IKE SA #239 "road-eastnet-nonat-239" "road-eastnet-nonat-239" #239: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-239 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-239": constructed local IKE proposals for road-eastnet-nonat-239 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 239 for state #239 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a89700 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #239 | libevent_malloc: new ptr-libevent@0x7fb34802a950 size 128 | #239 spent 0.156 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-239" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.233 milliseconds in whack | timer_event_cb: processing event@0x557d46ab2380 | handling event EVENT_RETRANSMIT for parent state #151 | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #151 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #151 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49620.300377; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005483 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a205f0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #151 | libevent_malloc: new ptr-libevent@0x7fb364017f20 size 128 "road-eastnet-nonat-151" #151: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #151) | d6 d5 c3 1b 58 0f 5c 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 37 31 25 ac 2b c6 c6 54 4a 25 58 cc 38 99 e0 | ed 33 16 21 c3 45 6a eb 3b a9 cb 98 85 d1 bc b2 | fb 43 f8 dc 85 42 20 a9 d4 7c dc c0 4c df 30 b1 | 6f cb 58 0b 5e 23 e6 14 ea 93 76 de 25 96 78 81 | 99 69 10 aa a3 9f ec 08 71 07 18 69 73 22 c9 ac | 3c e3 bf f1 09 8a 27 19 15 60 45 3d 4e 4f f3 e6 | c0 ab 4b c7 bb fb 2d 92 26 ca 7f de c4 f9 dd 4a | fa 18 2a 06 8c 14 94 9f a3 5d e6 b2 6b b0 ef e2 | 03 7f 7e f8 41 9d 8b 81 6b ea 4b 0b 45 f7 4c 93 | 70 05 72 9a ed 29 ed 3c 18 ca 66 2f d4 84 e6 4b | c1 2d 49 d6 3e cb 03 40 00 76 c7 f7 62 87 c5 1b | 85 d6 9d d1 8f 62 a3 ce 21 63 7a e5 94 35 85 13 | e3 c0 a5 2d 68 e8 0d 1f 37 ec 8c 55 12 d8 2a 1f | 06 81 5f d0 f4 ed e5 b1 5f c7 61 8a f0 5a 81 39 | 9f 6d e8 7f 5c 42 26 99 4f 51 2b 10 a9 6b b8 4c | a4 af 1c 69 f6 99 03 59 f6 8d eb d2 5c c8 04 4e | 29 00 00 24 3f 57 34 15 0e f6 1f 97 00 4e ca 13 | c7 48 27 43 fb 8e ac 87 27 dd cc da bb e1 5d 76 | d8 9b a6 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 1e a1 42 f7 31 41 ef 44 00 e7 a6 | 3d d6 a8 bb 50 6c 59 e3 00 00 00 1c 00 00 40 05 | 29 1a ff ca 49 77 f5 cd 99 41 a4 64 5f 6e 4a e7 | 0f a2 34 de | crypto helper 5 resuming | crypto helper 5 starting work-order 239 for state #239 | libevent_free: release ptr-libevent@0x7fb37002a950 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 239 | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 239 time elapsed 0.001002 seconds | (#239) spent 1 milliseconds in crypto helper computing work-order 239: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 239 for state #239 to event queue | scheduling resume sending helper answer for #239 | libevent_malloc: new ptr-libevent@0x7fb344046040 size 128 | crypto helper 5 waiting (nothing to do) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab2380 | #151 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 d5 c3 1b 58 0f 5c 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #151 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #151 | rejected packet: | d6 d5 c3 1b 58 0f 5c 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #151: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #239 | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 239 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #239 | **emit ISAKMP Message: | initiator cookie: | b9 4e df 3e 84 90 25 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-239 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ea ef 5f 41 79 0b fe 19 84 c3 03 27 cb e7 22 b5 | ikev2 g^x 4b 8d ad 5a dd 57 ea a0 d4 aa e3 61 84 72 47 6a | ikev2 g^x 4d 42 f7 0c 18 4a 15 88 92 91 45 67 3d 64 ce a8 | ikev2 g^x f0 3e 2a 18 f5 33 74 78 5b 6d 2d ad 60 68 a7 2c | ikev2 g^x 42 44 24 a7 49 23 19 0c fa 8d 52 0c 5c f4 c5 65 | ikev2 g^x 9c 02 7d 4d 52 90 91 ba 69 4d a0 bb 25 6e ec 3a | ikev2 g^x e9 30 9b 1f f4 e8 ec d1 8d 6a 8c 3f 41 9e 38 b3 | ikev2 g^x 41 e7 4e 00 b5 c6 ea 1b 8f 24 c7 a8 c4 ec 84 ef | ikev2 g^x e4 cf 76 d1 2b eb 8f 91 66 1a d6 b3 71 c5 5b 71 | ikev2 g^x c2 ce 48 72 d6 b0 0f 07 ef 9a 8e fd 8a 44 8d eb | ikev2 g^x 79 c7 74 c1 a0 f8 4b 78 8d 62 3e 5a d2 f7 58 20 | ikev2 g^x ab d5 b3 52 66 2e d1 5e a8 11 59 26 5b 03 c4 c7 | ikev2 g^x 72 cc b1 7b df 43 62 14 05 c3 52 d4 b9 35 c7 18 | ikev2 g^x ab d1 fe d6 f2 c4 bf d0 34 85 da 05 d8 1c 9e bd | ikev2 g^x 53 20 10 e1 51 57 70 e6 78 d1 56 9f cf b4 da 8d | ikev2 g^x 2c 7b cb 52 64 97 83 25 dd f7 88 42 c4 42 ba 2b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 60 20 cc a1 fe 49 9c e3 77 c9 2c 1b 58 3a e0 e5 | IKEv2 nonce 74 37 cc 08 7f e8 2c 53 5a 76 29 4f ad de 78 e5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b9 4e df 3e 84 90 25 d2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ef | natd_hash: port= 01 f4 | natd_hash: hash= d4 5b b0 88 0f ba 91 5e f1 72 ec fe c8 60 42 a1 | natd_hash: hash= 68 5e 5f c0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d4 5b b0 88 0f ba 91 5e f1 72 ec fe c8 60 42 a1 | Notify data 68 5e 5f c0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b9 4e df 3e 84 90 25 d2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4c 5b ce 23 3c 60 29 97 fc d7 dc 03 c2 55 73 9c | natd_hash: hash= d8 91 a1 ef | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4c 5b ce 23 3c 60 29 97 fc d7 dc 03 c2 55 73 9c | Notify data d8 91 a1 ef | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #239 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #239: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #239 to 4294967295 after switching state | Message ID: IKE #239 skipping update_recv as MD is fake | Message ID: sent #239 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-239" #239: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.239:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #239) | b9 4e df 3e 84 90 25 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea ef 5f 41 79 0b fe 19 84 c3 03 27 cb e7 22 b5 | 4b 8d ad 5a dd 57 ea a0 d4 aa e3 61 84 72 47 6a | 4d 42 f7 0c 18 4a 15 88 92 91 45 67 3d 64 ce a8 | f0 3e 2a 18 f5 33 74 78 5b 6d 2d ad 60 68 a7 2c | 42 44 24 a7 49 23 19 0c fa 8d 52 0c 5c f4 c5 65 | 9c 02 7d 4d 52 90 91 ba 69 4d a0 bb 25 6e ec 3a | e9 30 9b 1f f4 e8 ec d1 8d 6a 8c 3f 41 9e 38 b3 | 41 e7 4e 00 b5 c6 ea 1b 8f 24 c7 a8 c4 ec 84 ef | e4 cf 76 d1 2b eb 8f 91 66 1a d6 b3 71 c5 5b 71 | c2 ce 48 72 d6 b0 0f 07 ef 9a 8e fd 8a 44 8d eb | 79 c7 74 c1 a0 f8 4b 78 8d 62 3e 5a d2 f7 58 20 | ab d5 b3 52 66 2e d1 5e a8 11 59 26 5b 03 c4 c7 | 72 cc b1 7b df 43 62 14 05 c3 52 d4 b9 35 c7 18 | ab d1 fe d6 f2 c4 bf d0 34 85 da 05 d8 1c 9e bd | 53 20 10 e1 51 57 70 e6 78 d1 56 9f cf b4 da 8d | 2c 7b cb 52 64 97 83 25 dd f7 88 42 c4 42 ba 2b | 29 00 00 24 60 20 cc a1 fe 49 9c e3 77 c9 2c 1b | 58 3a e0 e5 74 37 cc 08 7f e8 2c 53 5a 76 29 4f | ad de 78 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 5b b0 88 0f ba 91 5e f1 72 ec fe | c8 60 42 a1 68 5e 5f c0 00 00 00 1c 00 00 40 05 | 4c 5b ce 23 3c 60 29 97 fc d7 dc 03 c2 55 73 9c | d8 91 a1 ef | state #239 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34802a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a89700 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a89700 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #239 | libevent_malloc: new ptr-libevent@0x7fb34802a950 size 128 | #239 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49620.302491 | resume sending helper answer for #239 suppresed complete_v2_state_transition() and stole MD | #239 spent 0.474 milliseconds in resume sending helper answer | stop processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb344046040 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 4e df 3e 84 90 25 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #239 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #239 | rejected packet: | b9 4e df 3e 84 90 25 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #239: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0578 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #222 | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #222 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #222 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49620.345696; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004064 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab2380 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #222 | libevent_malloc: new ptr-libevent@0x7fb344046040 size 128 "road-eastnet-nonat-222" #222: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #222) | eb 26 f4 19 1a 54 68 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 a4 6e 20 fd 50 2f 35 57 aa de 4a f5 e5 f9 4f | ca f6 bf 35 d5 20 df 61 18 72 c7 7b 3b d6 89 fe | 57 a2 45 9e 67 3f 8a f7 1b bb 33 5b 2f 19 93 13 | 4d bc bb d5 5a 76 0b 8c 08 e4 e4 47 2d c3 07 c6 | df c3 86 a0 6b 90 b3 31 74 8b 42 bf c4 10 0e bf | 13 cf 0b 76 db 86 6a 9f 8c f0 b4 0e c7 08 95 7e | ce 41 5e 4a 31 5c bb fb 47 19 b3 63 fb 4f ca f3 | 07 c7 1d d9 7a 1b f2 0d 5e dd f5 ac 4b 35 32 4a | fb 08 38 da 83 ea de 30 e1 52 16 cd fe ea bf b3 | 88 b6 b0 c4 6f 9e 4d bb 67 f6 e4 a0 eb 71 82 6a | ad 65 be 80 db 5a 69 3b 90 3a 58 e9 30 d6 fe 7a | f6 9b 28 5c 13 9f 6a 77 4f c9 8b bc 07 b5 a1 d9 | 2b de 81 5d 47 e4 3c c1 b1 a8 f5 bc 8d 40 df 63 | b5 80 17 f2 8c 1f b1 78 d7 35 f2 4c 44 06 cc 65 | 15 11 55 93 d9 f0 56 8f ad b9 7e 2b 7d cb da 6d | 9c ab 97 02 8c 9c fc 9d 3d c3 47 69 0f ac 56 88 | 29 00 00 24 77 e8 83 df 75 f1 9b ea 8f aa ae 8f | cc 39 a6 6f 03 de be 68 b3 66 64 be 5d 42 33 fc | 61 2a ce bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 87 6a 56 c8 8d 7a 5a c9 70 42 a3 | 93 38 10 ea 25 8a 09 bf 00 00 00 1c 00 00 40 05 | d9 43 32 2c d8 2a fd ec 96 bd 92 a4 54 e0 a9 82 | 8b 73 b6 b2 | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #222 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 26 f4 19 1a 54 68 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #222 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #222 | rejected packet: | eb 26 f4 19 1a 54 68 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #222: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f4be0 | handling event EVENT_RETRANSMIT for parent state #152 | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #152 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #152 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49620.371071; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.014561 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #152 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-152" #152: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #152) | c7 e3 df ec 9e c4 62 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a7 d8 bf 29 24 11 1c ce c6 eb 11 96 dd 30 8f aa | 0c 4c 70 ce 87 a4 df 43 d2 6c ba d5 f0 3b d8 41 | 39 bd 2b 1a 59 08 f6 28 59 f9 b3 0f e5 b5 40 32 | 97 af 83 49 1b 9c e1 41 6c 19 d9 81 bd 62 6f 16 | 88 77 9c c6 99 70 f5 87 ca bd 33 9d e4 05 6b 5b | c0 98 a4 04 59 99 ff a8 0d 45 13 de 94 59 78 3e | 9f 29 e2 f0 6e 7e b9 fe f0 0d e5 7f 5b 4c 01 84 | ef a7 c0 48 17 b5 cf 69 2f 9d 37 d6 9e 2c 49 b7 | 21 74 f9 23 52 39 e5 70 37 49 22 ad bf 6a ae c7 | 00 73 99 52 14 5a 01 1d ec dc e2 c6 b8 f0 0e df | bb 4f 3c 66 48 6a d8 f8 3d dd ce 84 36 d7 fe 75 | b0 8b 40 6c b7 0a 71 a4 a1 89 ca 62 6c e9 05 72 | 42 a3 a2 98 b2 36 46 5e b4 83 55 6f f7 d0 07 bb | be 2a 0c 02 1c 0f 1c ef 21 73 11 f7 92 da ee 38 | b3 d6 c9 03 8b 2f b8 eb 38 2b 9f 1a 71 81 4d 22 | 5e d5 1f 81 77 a6 9c 34 d3 30 8a 8b 41 61 5e 1b | 29 00 00 24 29 e4 ca ab 2a 30 18 fc 26 46 3c 50 | 1a f5 21 d0 52 38 f5 d5 7b 74 90 b3 b6 ed 01 58 | e0 d9 32 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 38 7f 4c 40 24 5c 70 b7 73 9c 98 | de a9 9b f3 50 76 96 bb 00 00 00 1c 00 00 40 05 | 28 07 96 1e 77 dd a7 3a bc 86 9b 87 bc da 1a a0 | d3 4f e8 fc | libevent_free: release ptr-libevent@0x7fb3780407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f4be0 | #152 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 e3 df ec 9e c4 62 b6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #152 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #152 | rejected packet: | c7 e3 df ec 9e c4 62 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #152: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbbc0 | handling event EVENT_RETRANSMIT for parent state #204 | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #204 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #204 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49620.374542; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.009607 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aacc80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #204 | libevent_malloc: new ptr-libevent@0x7fb3780407f0 size 128 "road-eastnet-nonat-204" #204: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #204) | 26 9b 30 ce 1c 69 a2 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 5c 6f c5 e4 37 b5 85 8b 88 c9 38 4a 33 67 e3 | b5 76 e8 6e 58 ca 85 66 b2 6e bc 01 cc 91 d2 fa | e1 db ef 4b 77 17 f5 08 16 0c 8c d0 2e 39 5b 3d | 15 8c a2 f2 d6 7b 21 20 d2 5d b0 fc e4 ac 76 97 | 30 50 2e 26 71 1a 34 95 4e 65 5f 33 21 89 a5 4a | 55 91 fa cb b0 1c 50 2f 03 b1 71 df 7e 93 5d 3f | 83 d0 25 32 6e 4a 7a e8 b7 9c c4 2c bc 70 88 ca | 1a 12 c7 c4 81 cf af 5b 96 ed ff 17 ee ac bf bc | 7e ee e8 ea bf 0e 25 06 f6 11 f2 0c fc 01 f3 a1 | a3 a5 0f 39 3b 0e 4e 24 40 89 5e e7 dc 14 70 db | b0 59 4e 88 e4 58 74 9d 4c 35 67 80 45 58 10 7b | 90 72 ed 6b 8c 09 3f 83 31 52 aa d0 a7 ad e8 5e | 62 2d e8 c2 d2 5f d4 fe 77 1a 24 07 0f a0 1b 7f | b1 31 3d fc 2d 59 58 95 dc 6b 56 ff a8 81 81 ca | bd 63 b1 a6 f3 e4 7a e1 08 85 c1 19 90 12 c0 7e | 58 38 76 3a 98 a3 e6 81 1a a9 a3 c2 1d 81 96 94 | 29 00 00 24 f4 44 35 a4 a3 93 f6 e1 66 d4 43 db | 1b ee 9d af 99 ba 18 1d 96 99 f1 ca 00 4e 65 c8 | 19 9f df 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 dc 32 bc d5 a3 92 90 2d a7 77 26 | 1c 78 dd c4 9b 23 7d 3e 00 00 00 1c 00 00 40 05 | 5b a2 10 3c 9e 91 f8 b5 af bf b9 e6 23 08 5d a3 | 6c 17 22 88 | libevent_free: release ptr-libevent@0x7fb350035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbbc0 | #204 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 9b 30 ce 1c 69 a2 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #204 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #204 | rejected packet: | 26 9b 30 ce 1c 69 a2 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #204: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.076 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90400 | handling event EVENT_RETRANSMIT for parent state #43 | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #43 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #43 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49620.375915; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.011959 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbbc0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #43 | libevent_malloc: new ptr-libevent@0x7fb350035930 size 128 "road-eastnet-nonat-43" #43: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #43) | cc ee 6c 19 e2 66 91 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 b3 dc 74 af 8b 5f 17 f2 a2 67 e8 55 b6 7f 2f | d6 4e 7a 73 eb 13 7d 78 44 82 5e 9f c0 c9 a7 ce | 19 55 10 32 8b 27 a5 29 28 74 fd 00 e6 f7 6a 74 | 56 7d 4b 3f aa d7 b5 46 cb 2d 3c a3 dc 3f bf 05 | 8d ef fa 60 0a d7 e7 b4 43 44 81 a1 10 dd db 69 | 30 53 16 90 a0 49 c9 94 16 9b 8e 16 05 cc a3 b0 | bb c8 6f 12 2c 69 ac ba c2 57 c1 0e 1d 24 c4 b7 | c5 6e 9f 50 e2 e4 26 8c 25 36 d7 6d d8 cd 2c bd | d4 0a 33 47 c9 6e 1d c8 6c 02 27 85 0b ac 4e d8 | 84 b3 28 76 fc c6 2f a9 af 4b b0 f5 08 9e 56 b5 | 24 d4 f4 cb 0a 9c 0d ce 12 fa 25 29 9d 95 d6 4a | 9a e8 aa eb d1 08 9a 51 c5 21 4d b3 dd e9 4f d9 | a6 74 14 2d 42 fa 5e 68 63 d0 8e 8d 34 39 23 04 | 84 91 4d 1d 1d 39 77 e7 bb f1 e3 79 e8 0b 4e 9f | 52 2d 52 8d 33 23 04 37 3b 2c 9b 0f 37 da 18 16 | 07 6b 4f 80 6f e8 48 15 68 23 83 ca b6 b1 12 eb | 29 00 00 24 d5 f8 b0 cb f4 3b d7 c6 a9 5b 1f ef | 6f 5a 34 02 07 02 b5 92 c9 43 df 42 45 9e 46 a4 | f2 42 44 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 70 b3 40 c0 d2 23 ad 4c 6d 70 f1 | 0b c9 5a 99 fd 55 fa c5 00 00 00 1c 00 00 40 05 | fc 9d 2b d9 20 f9 c1 0e d3 88 83 de d6 d0 5e 66 | 9c 2c 6f e5 | libevent_free: release ptr-libevent@0x7fb3580300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90400 | #43 spent 0.128 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc ee 6c 19 e2 66 91 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #43 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #43 | rejected packet: | cc ee 6c 19 e2 66 91 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #43: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #231 | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #231 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #231 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49620.379249; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000706 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90400 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #231 | libevent_malloc: new ptr-libevent@0x7fb3580300e0 size 128 "road-eastnet-nonat-231" #231: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #231) | ec d8 99 0e 50 36 87 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea c5 d9 ea 48 9d 9d db e4 72 21 b2 eb fe e0 0a | 9b e5 ce 23 20 eb ad 65 b0 89 ca 3d 24 ef 66 7d | d9 a3 7a c2 3d 05 aa 43 9f 45 1a 14 d9 e7 ad 4c | 1c 30 1e e4 db 2e f5 09 08 f0 6c 1f 45 18 25 f3 | 98 35 42 0b 1b fc c0 95 3b d0 88 ca bf 43 11 51 | ba ac ee 62 bc ef 20 2d 09 0b 30 2b b3 a9 30 69 | 22 9f f7 e5 19 cc d8 4a 41 18 b5 2a 03 31 91 4d | d9 f3 33 5c b6 61 8b 80 4c 0b 65 d5 6f 4b 62 d8 | e0 38 d3 a6 32 83 92 b3 ca df 09 07 0d f6 33 d7 | b9 f9 01 8c 3b d1 ff 19 bf 3d d5 72 dd d6 67 1d | 24 a4 3b 88 00 71 46 68 47 66 c6 d8 6d 38 1a ca | 01 20 d4 7a e4 46 1b 52 ab ad 61 81 76 76 13 bf | 76 df 80 04 67 b5 86 86 0e 85 a0 4b 41 5b e3 0b | 3c 1a 51 b5 b4 55 ce 12 56 93 02 32 82 c4 86 69 | a7 eb 80 c4 8e 9a 08 dd 86 61 45 1e 8a 33 7c 03 | 7e 20 42 a9 8c 8c 89 72 43 a6 59 29 92 30 fd 49 | 29 00 00 24 b3 7b 27 54 be 06 93 cc 3c 78 ad 44 | 9e 7e c7 5b aa 5c 64 c5 5c 99 5a 37 63 dc 53 a7 | 33 95 f4 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 2a 24 2a a3 f9 b8 d4 c1 28 f7 1a | f6 32 c3 8a 97 33 de f4 00 00 00 1c 00 00 40 05 | e6 68 a7 21 48 f4 d3 88 6e c3 71 dc ea d3 53 aa | 0b f4 bb 84 | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #231 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec d8 99 0e 50 36 87 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #231 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #231 | rejected packet: | ec d8 99 0e 50 36 87 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #231: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-240" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-240' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #240 at 0x557d46b1b940 | State DB: adding IKEv2 state #240 in UNDEFINED | pstats #240 ikev2.ike started | Message ID: init #240: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #240: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #240; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-240" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-240" IKE SA #240 "road-eastnet-nonat-240" "road-eastnet-nonat-240" #240: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-240 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-240": constructed local IKE proposals for road-eastnet-nonat-240 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 240 for state #240 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36800d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #240 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 | #240 spent 0.164 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-240" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.249 milliseconds in whack | crypto helper 3 resuming | crypto helper 3 starting work-order 240 for state #240 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 240 | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 240 time elapsed 0.001035 seconds | (#240) spent 1.01 milliseconds in crypto helper computing work-order 240: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 240 for state #240 to event queue | scheduling resume sending helper answer for #240 | libevent_malloc: new ptr-libevent@0x7fb338046040 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #240 | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 240 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #240 | **emit ISAKMP Message: | initiator cookie: | 52 3d c4 7d aa 75 f9 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-240 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a5 b8 f7 97 d2 8e a4 26 e4 de 50 11 3b 27 c2 bf | ikev2 g^x 82 42 f8 30 a7 cf e7 f1 22 7e 96 6e 08 55 b8 5b | ikev2 g^x 99 ce ba b9 bc a4 b9 85 84 1c 35 bd 81 0b 36 0d | ikev2 g^x b0 03 99 1c 13 93 72 39 72 77 b7 23 f3 36 8a 70 | ikev2 g^x 77 80 87 4b 02 4d f9 86 a0 7e c1 4d a8 f2 4c 39 | ikev2 g^x d7 80 8b 66 22 e6 a4 de 4b 09 73 0d 3d 7c b2 2f | ikev2 g^x 50 8d 5f 1f 57 2a bd 9f ac c8 a9 74 90 54 67 b7 | ikev2 g^x 8f c8 3d 39 71 39 c6 de 18 02 eb c5 ea 94 b8 db | ikev2 g^x 08 c3 39 15 f9 0b b0 93 02 0a 8a a7 ec 92 53 e4 | ikev2 g^x 1e 2b 04 08 46 40 50 55 30 ed 5b e2 89 d0 46 9a | ikev2 g^x af 8e 24 41 aa aa b9 1a e4 ce 8c fe 9d a8 de b8 | ikev2 g^x f4 9b 8a 9d 2c 1b bf b8 d5 b4 e2 72 19 89 07 85 | ikev2 g^x 8b d5 73 d5 4b b2 72 a1 17 f2 16 b2 06 c3 69 10 | ikev2 g^x 03 64 01 f6 2e ee b3 bb 12 bf 7f 2a 4b 56 f5 04 | ikev2 g^x 51 3d ee 1a 3c 36 62 a8 15 0b 0b b5 26 c4 ba ef | ikev2 g^x d2 cb 15 c8 7e 83 38 88 e7 bf 96 1b 07 79 a7 4b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce eb a6 92 08 8f 76 ab e5 c4 52 e9 41 1d 77 03 c7 | IKEv2 nonce 35 5c e5 3a 95 58 fe 07 d6 1d ad f0 56 12 6d d5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 52 3d c4 7d aa 75 f9 99 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f0 | natd_hash: port= 01 f4 | natd_hash: hash= 45 c9 c0 38 06 3a 92 7e a1 78 c0 15 6c a9 8e 74 | natd_hash: hash= 3a a1 8f 67 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 45 c9 c0 38 06 3a 92 7e a1 78 c0 15 6c a9 8e 74 | Notify data 3a a1 8f 67 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 52 3d c4 7d aa 75 f9 99 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 56 20 31 94 4b 81 36 39 3c f9 b9 11 bf 66 a1 27 | natd_hash: hash= 0d 62 c5 10 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 56 20 31 94 4b 81 36 39 3c f9 b9 11 bf 66 a1 27 | Notify data 0d 62 c5 10 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #240 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #240: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #240 to 4294967295 after switching state | Message ID: IKE #240 skipping update_recv as MD is fake | Message ID: sent #240 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-240" #240: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.240:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #240) | 52 3d c4 7d aa 75 f9 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 b8 f7 97 d2 8e a4 26 e4 de 50 11 3b 27 c2 bf | 82 42 f8 30 a7 cf e7 f1 22 7e 96 6e 08 55 b8 5b | 99 ce ba b9 bc a4 b9 85 84 1c 35 bd 81 0b 36 0d | b0 03 99 1c 13 93 72 39 72 77 b7 23 f3 36 8a 70 | 77 80 87 4b 02 4d f9 86 a0 7e c1 4d a8 f2 4c 39 | d7 80 8b 66 22 e6 a4 de 4b 09 73 0d 3d 7c b2 2f | 50 8d 5f 1f 57 2a bd 9f ac c8 a9 74 90 54 67 b7 | 8f c8 3d 39 71 39 c6 de 18 02 eb c5 ea 94 b8 db | 08 c3 39 15 f9 0b b0 93 02 0a 8a a7 ec 92 53 e4 | 1e 2b 04 08 46 40 50 55 30 ed 5b e2 89 d0 46 9a | af 8e 24 41 aa aa b9 1a e4 ce 8c fe 9d a8 de b8 | f4 9b 8a 9d 2c 1b bf b8 d5 b4 e2 72 19 89 07 85 | 8b d5 73 d5 4b b2 72 a1 17 f2 16 b2 06 c3 69 10 | 03 64 01 f6 2e ee b3 bb 12 bf 7f 2a 4b 56 f5 04 | 51 3d ee 1a 3c 36 62 a8 15 0b 0b b5 26 c4 ba ef | d2 cb 15 c8 7e 83 38 88 e7 bf 96 1b 07 79 a7 4b | 29 00 00 24 eb a6 92 08 8f 76 ab e5 c4 52 e9 41 | 1d 77 03 c7 35 5c e5 3a 95 58 fe 07 d6 1d ad f0 | 56 12 6d d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 c9 c0 38 06 3a 92 7e a1 78 c0 15 | 6c a9 8e 74 3a a1 8f 67 00 00 00 1c 00 00 40 05 | 56 20 31 94 4b 81 36 39 3c f9 b9 11 bf 66 a1 27 | 0d 62 c5 10 | state #240 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36800d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #240 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 | #240 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49620.392114 | resume sending helper answer for #240 suppresed complete_v2_state_transition() and stole MD | #240 spent 0.496 milliseconds in resume sending helper answer | stop processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb338046040 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 3d c4 7d aa 75 f9 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #240 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #240 | rejected packet: | 52 3d c4 7d aa 75 f9 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #240: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #235 | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #235 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #235 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49620.3943; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499812 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f4be0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #235 | libevent_malloc: new ptr-libevent@0x7fb338046040 size 128 "road-eastnet-nonat-235" #235: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #235) | 7e 07 6a 55 b2 86 f9 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 15 b0 98 97 a3 9b e7 91 af 63 8f 32 c2 f0 a6 | 5a 92 40 40 d6 e9 e6 fc ec 5f 9d 94 27 3d 04 cc | 99 dc 7e ac 23 a0 7a 25 ef 03 33 84 5f 4e 3e 44 | ab 45 fc 51 2f 77 0e 04 9c 57 58 3e e3 c4 95 ac | 99 c6 cf 74 8b ee 49 3f 97 64 5a ae 23 26 21 49 | 82 68 17 68 04 08 36 f9 22 38 ec 23 ce 8f 41 44 | bf d0 3d c1 f8 23 b3 6a aa 39 20 ad 4f 3f f3 2b | 3d f9 49 23 b6 22 6b 6a 39 8a 61 bb b3 33 4a 8f | 12 ce 51 75 41 2f c2 97 7c 24 15 e6 c7 4c 0b 5a | 7e 98 8c f9 eb 79 4c 87 18 6e 22 0f ce f5 5a f4 | 97 f7 88 3c 20 6b 59 a3 22 56 0b 5d ff 73 43 0c | d0 ab c4 fb b1 97 4e c1 93 9b 6a 7d 3a c0 41 34 | 56 74 13 c4 02 0c 52 4b 7f 7c ed c1 a7 58 84 db | 34 3e fa dc e2 91 c8 b6 c5 5f f0 1a 94 9c 21 62 | 9c 24 2a b8 60 58 3a 4f ea 5e 65 e5 c2 96 45 62 | b2 a3 11 26 4c 94 9a fb e2 2b 93 1c 4f 08 c6 66 | 29 00 00 24 0c f1 17 b1 15 6c 67 72 28 b0 8f 38 | fd 2e 9a ff fb 4a d4 a7 a7 b2 00 ff 88 fe ef 90 | e3 f8 e6 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 78 bf 00 5e f0 c9 41 6d 35 37 22 | b0 4c f8 53 8c eb 59 4e 00 00 00 1c 00 00 40 05 | 6e 5c 6f da 69 07 20 20 73 2e b2 7c a0 00 c1 c2 | 79 44 3d 62 | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #235 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 07 6a 55 b2 86 f9 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #235 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #235 | rejected packet: | 7e 07 6a 55 b2 86 f9 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #235: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #153 | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #153 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #153 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49620.425614; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005272 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #153 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 "road-eastnet-nonat-153" #153: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #153) | ed 10 7e d3 7b 33 74 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 23 2b fa a2 7a a7 c0 a4 0c c7 9f 58 c4 e7 e8 | 70 a1 a8 0f 51 5f a2 04 f4 14 9f d7 e2 33 9b d1 | 70 a9 9d e5 73 3e d4 0c 84 28 f3 47 b9 3c 03 49 | 98 c3 54 58 79 2a 6a d2 f7 19 34 3f ea 9b 09 66 | 26 4b 77 9a 2e 2d 06 7d b1 99 09 62 d6 ef 52 44 | 03 d0 e7 2e 96 a1 8d 5c ea 4e a7 ca 7e fb ac a0 | 2f ea 86 d8 ac 11 f8 20 6b 77 af c2 6c 84 38 e7 | 8a b3 d4 12 59 8f 14 90 f8 a1 09 66 1f 57 d8 3c | 73 c4 11 8b a8 7f b3 1e 97 ed 1c 65 90 26 33 5b | 30 76 3b 3b d5 b4 96 62 cb 7d 86 9d ad 4a 9e e5 | 2b b2 c9 9e 69 f5 8a e4 08 29 24 90 1c 8f 81 c4 | d0 5a 30 f4 83 2c f9 11 5c 07 b1 f7 f6 7a 22 ac | 46 53 33 91 c1 25 ad 6c f8 ee d4 49 b1 09 fc 61 | 27 91 e2 9d 17 78 bb a6 45 04 eb ad 01 76 59 27 | df 49 c6 69 61 22 0d b2 77 f2 e5 49 0e d0 19 37 | f9 e3 3c 5d ab 0d ee 24 0e 3a 1b 87 b3 59 f2 dd | 29 00 00 24 11 3e 89 f2 e4 5a b4 91 6f f3 6f e0 | 10 78 d4 00 e7 63 f4 34 67 6a f8 b4 dc 99 94 12 | b9 1e 59 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cc 1e 02 bf 67 12 0b 49 15 df fb a0 | 1b e0 2a 30 f1 cf bd 20 00 00 00 1c 00 00 40 05 | ce 1d 48 38 8b bc 75 71 1c ff 01 f5 d1 af 95 90 | 14 3b df 16 | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #153 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 10 7e d3 7b 33 74 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #153 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #153 | rejected packet: | ed 10 7e d3 7b 33 74 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #153: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0691 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28af0 | handling event EVENT_RETRANSMIT for parent state #44 | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #44 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #44 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49620.438904; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006744 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #44 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 "road-eastnet-nonat-44" #44: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #44) | 2c a5 57 82 94 bb 0c bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f f1 d9 3a 5c ec da ab 46 a0 1a 50 8e c5 b2 4a | 63 93 0d d6 bb 0b cb a2 7b 64 4c d6 0d 5d 75 c0 | a4 fb 12 20 36 86 d2 5a 85 de 9f 1a 56 dd 51 88 | 1f dd 14 6d 54 37 65 2c 39 00 b9 0b d0 9a b8 93 | dd 72 9a 78 33 2f fe d8 37 67 48 08 b2 16 1f 29 | 2a f2 be 3c 42 f3 72 0d 31 7d f4 16 71 3f 2a 28 | a2 72 a2 07 56 93 05 b3 01 4f f8 0a 3d 17 c2 61 | 36 84 95 ef b4 4f 95 5b 93 28 0b 0c 46 73 8a 49 | 11 16 41 b2 73 0b 44 cf a4 af 2f d7 2a 7a 6d 3e | 45 30 bc f5 de 74 14 4c f1 52 50 35 c7 29 67 5d | 02 d9 88 3e 6a e4 83 d6 7c b8 69 a3 7c 7f 9b 8b | 37 21 48 68 00 9a 01 a3 9a d7 3b 02 8c 67 ac 11 | 42 36 9e 84 ad 85 da a3 35 c1 ee c3 6a 24 37 55 | cc 67 9a 57 48 6e 0b 5c b6 9c 4d 16 ed 25 57 02 | 16 2f e6 f6 ce 2a b1 ca e6 1e 1f f9 44 d1 46 60 | 1f 00 3a 24 c7 f4 7b 04 f3 08 7e 6f de 0b 6c 0f | 29 00 00 24 c3 85 c7 9f 53 c2 4b 6d 4a b2 71 6f | 5f 3f 70 d0 bf 0d 26 13 04 46 9b 8c 51 07 8b 19 | bb fc 96 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f 56 cd 95 dd 34 fe 03 70 04 69 b5 | 7b 30 2c 80 a8 67 5b f1 00 00 00 1c 00 00 40 05 | 20 cd 88 b3 c4 29 91 b7 4b 43 e6 f4 9f a3 71 4b | c5 83 8c 17 | libevent_free: release ptr-libevent@0x7fb35c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28af0 | #44 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c a5 57 82 94 bb 0c bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #44 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #44 | rejected packet: | 2c a5 57 82 94 bb 0c bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #44: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa0940 | handling event EVENT_RETRANSMIT for parent state #223 | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #223 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #223 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49620.450896; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004768 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #223 | libevent_malloc: new ptr-libevent@0x7fb35c0300e0 size 128 "road-eastnet-nonat-223" #223: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #223) | 7a 51 ea 00 7b 14 8e 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e c0 c4 41 9a 95 cc 81 e9 60 68 ab 45 9c 08 20 | b4 5a a9 9d 67 49 a7 46 aa 2b 2c 92 19 0c 98 42 | fe fb 4d 10 39 99 af 92 9d b6 2e 88 4d d0 11 c1 | cc 58 dc fa d8 45 59 75 a4 74 03 ef 28 b6 b2 df | 65 14 7b c4 56 cb 7e 8e c8 a4 2d ad 67 70 a7 55 | 5c 9f d8 c8 c5 46 4c 1e 63 7d 5e ab 57 ab 59 40 | f4 a8 4b fe 89 d6 bf 01 54 f9 46 07 86 f8 bc 75 | ef 26 9f 79 f2 7c 5a c2 f7 65 21 b4 f5 f9 18 0f | 7d 48 47 25 7b 23 3b 60 c4 8a 45 86 e2 31 42 68 | 91 5b 9e 0c 6c bd d5 91 7e aa 25 22 d3 ee bf b3 | c7 ca 4c a5 a7 05 79 a5 99 a0 88 70 14 6f be 39 | bf 8f 50 de 92 0a f3 4f c2 47 ed ec a9 88 76 bd | f2 c3 85 8c 4a 5e bf dc 44 3e af ee 45 cf 06 99 | e5 de 11 6a 2b 48 7c 22 42 d6 dd 11 a6 82 39 4f | 9c 24 2f 97 4c 87 c3 35 46 b2 19 ca 91 0d f2 ce | c9 8b b5 a0 e0 d7 a9 24 95 51 89 2f 04 0b 43 0c | 29 00 00 24 82 03 c4 08 4c 73 33 ac 95 33 24 a4 | 7a b6 82 c3 62 e4 f0 a1 f5 68 f8 16 c8 95 15 db | 31 e3 65 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 01 2d a5 d7 3f aa d5 34 53 23 34 | 04 fb 26 40 92 12 55 4e 00 00 00 1c 00 00 40 05 | a6 35 a0 ce 14 8d c6 b8 e2 da 44 eb d4 cc fd 65 | 95 2a 9c c1 | libevent_free: release ptr-libevent@0x7fb3380300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa0940 | #223 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a 51 ea 00 7b 14 8e 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #223 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #223 | rejected packet: | 7a 51 ea 00 7b 14 8e 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #223: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e7260 | handling event EVENT_RETRANSMIT for parent state #232 | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #232 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #232 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49620.465938; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002226 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa0940 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #232 | libevent_malloc: new ptr-libevent@0x7fb3380300e0 size 128 "road-eastnet-nonat-232" #232: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #232) | 24 ac 89 77 7f d4 00 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d e3 39 fa 31 96 0e da 0d 87 de fe bc da ee 7b | f9 35 54 93 66 77 87 a0 67 c2 b4 11 e6 0a 7a 53 | b3 1d a8 6c 5c b3 d5 5b f1 71 74 80 47 74 8f eb | 25 fb 81 fc 67 2b 6d fc c2 93 27 e4 ad 7c e4 44 | 62 ee e5 d7 4d 6f 45 7a fb 56 b0 33 e4 c0 e1 a0 | 0d 2e c4 d7 7c a8 3d 9c d0 51 2f 55 54 40 46 36 | 1c 6c 65 82 d9 49 b2 d4 69 f8 3b 26 10 eb 42 4c | 23 39 f8 bc c3 39 9a c3 11 d4 4e 97 4e b9 f8 a2 | 8b 74 d5 f0 11 c2 a0 7d ca dd 76 40 1b 01 76 b0 | a4 bf 05 91 b6 25 97 e5 e6 51 ee 64 fa 3b 0a c5 | a6 9c c8 8d fc dc 9a b7 88 e8 5a 4a 57 96 98 00 | db 6d 9a cd 76 5b a7 49 16 56 06 32 a5 f0 51 87 | 36 26 1d 21 19 29 89 68 02 06 6d 37 2b a0 74 d8 | 14 94 a7 12 8f 7a e7 ad 72 26 fb ca e9 57 f6 ae | 40 e1 77 ae bd 14 78 69 df f7 02 98 cb 60 f6 4b | ad ea 83 90 fd 04 b0 25 b3 92 71 37 ed 5d 75 e1 | 29 00 00 24 aa 59 21 22 32 5d 1b 0e 90 4a a6 80 | 93 f2 d5 94 dc dc 41 5c 7e 9b 58 30 e5 e0 1c a2 | 9a c8 ed 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 58 75 66 d7 36 51 ed 56 98 88 32 | c1 e3 29 ac 35 46 df e2 00 00 00 1c 00 00 40 05 | 0c 44 36 93 b4 a9 f5 59 b8 d7 76 83 b8 b4 fd 37 | 81 aa c4 e2 | libevent_free: release ptr-libevent@0x7fb340040790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e7260 | #232 spent 0.187 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 ac 89 77 7f d4 00 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #232 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #232 | rejected packet: | 24 ac 89 77 7f d4 00 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #232: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-241" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-241' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #241 at 0x557d46b1cf00 | State DB: adding IKEv2 state #241 in UNDEFINED | pstats #241 ikev2.ike started | Message ID: init #241: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #241: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #241; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-241" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-241" IKE SA #241 "road-eastnet-nonat-241" "road-eastnet-nonat-241" #241: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-241 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-241": constructed local IKE proposals for road-eastnet-nonat-241 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 241 for state #241 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469e7260 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #241 | libevent_malloc: new ptr-libevent@0x7fb340040790 size 128 | #241 spent 0.165 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-241" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.259 milliseconds in whack | crypto helper 1 resuming | crypto helper 1 starting work-order 241 for state #241 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 241 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 241 time elapsed 0.000988 seconds | (#241) spent 0.997 milliseconds in crypto helper computing work-order 241: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 241 for state #241 to event queue | scheduling resume sending helper answer for #241 | libevent_malloc: new ptr-libevent@0x7fb388048a80 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #241 | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 241 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #241 | **emit ISAKMP Message: | initiator cookie: | ed bf c0 ae d9 fd 74 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-241 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9c 7f 1d 53 5e bf 7c 50 89 9a 1b 66 7a f6 ac 57 | ikev2 g^x 1e 44 b6 4e f9 ce e0 60 9e 35 82 8c 12 e1 ec 87 | ikev2 g^x c3 32 1d d0 30 6f 24 b0 84 5b 58 a3 dd 46 7f 56 | ikev2 g^x 3a fc a0 86 c1 a5 f0 b8 b4 7f c2 24 a0 35 a3 8b | ikev2 g^x 46 8b ad d0 3a 85 a8 93 6d 92 12 5e c7 60 d3 02 | ikev2 g^x 9d 48 49 61 d0 53 cf 87 bc ba 4a 86 e9 1d 0e c4 | ikev2 g^x 8a 55 24 90 50 13 2a fe 86 c6 6d 09 e7 31 26 ca | ikev2 g^x d2 d8 c1 f1 76 8e 79 98 8c eb 73 50 64 00 6e af | ikev2 g^x 8a ae f2 36 6c c7 fa cd 65 22 6c 5b 48 98 da 47 | ikev2 g^x c0 bc 45 31 fc 5e 0f aa b4 b8 1d d3 be 55 8c ba | ikev2 g^x 12 b5 d1 65 9a 9f 14 76 d4 89 e3 78 f3 26 29 2e | ikev2 g^x 46 8d 9d 7c 77 7b 47 8f 64 31 0d 93 e5 f5 e2 8f | ikev2 g^x 76 81 eb ad 7e 90 fd 6f b1 86 5e 11 a2 e7 77 5f | ikev2 g^x c1 4e 81 30 92 43 c5 b4 66 60 7f 33 52 22 85 c1 | ikev2 g^x 6f 01 81 ec 5d 5f 91 b7 53 01 fe 18 96 c2 64 e9 | ikev2 g^x d4 ad d0 b7 b7 a3 ba e1 97 81 a4 d5 9e 61 d0 8e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 48 1f 7b 4e 8c 39 27 4c 54 7b 31 27 38 83 2b 38 | IKEv2 nonce ab a8 0f 41 0e 72 e0 b6 b5 f5 a8 48 24 b7 3e 98 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ed bf c0 ae d9 fd 74 e2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f1 | natd_hash: port= 01 f4 | natd_hash: hash= 1c d9 59 12 c5 45 19 36 85 eb ed 91 74 0a b9 7e | natd_hash: hash= c6 b2 17 c0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1c d9 59 12 c5 45 19 36 85 eb ed 91 74 0a b9 7e | Notify data c6 b2 17 c0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ed bf c0 ae d9 fd 74 e2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 8c de 28 49 d8 e8 ba a2 04 93 2a 1c a7 e3 0e 84 | natd_hash: hash= b2 9d 1f bb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8c de 28 49 d8 e8 ba a2 04 93 2a 1c a7 e3 0e 84 | Notify data b2 9d 1f bb | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #241 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #241: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #241 to 4294967295 after switching state | Message ID: IKE #241 skipping update_recv as MD is fake | Message ID: sent #241 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-241" #241: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.241:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #241) | ed bf c0 ae d9 fd 74 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 7f 1d 53 5e bf 7c 50 89 9a 1b 66 7a f6 ac 57 | 1e 44 b6 4e f9 ce e0 60 9e 35 82 8c 12 e1 ec 87 | c3 32 1d d0 30 6f 24 b0 84 5b 58 a3 dd 46 7f 56 | 3a fc a0 86 c1 a5 f0 b8 b4 7f c2 24 a0 35 a3 8b | 46 8b ad d0 3a 85 a8 93 6d 92 12 5e c7 60 d3 02 | 9d 48 49 61 d0 53 cf 87 bc ba 4a 86 e9 1d 0e c4 | 8a 55 24 90 50 13 2a fe 86 c6 6d 09 e7 31 26 ca | d2 d8 c1 f1 76 8e 79 98 8c eb 73 50 64 00 6e af | 8a ae f2 36 6c c7 fa cd 65 22 6c 5b 48 98 da 47 | c0 bc 45 31 fc 5e 0f aa b4 b8 1d d3 be 55 8c ba | 12 b5 d1 65 9a 9f 14 76 d4 89 e3 78 f3 26 29 2e | 46 8d 9d 7c 77 7b 47 8f 64 31 0d 93 e5 f5 e2 8f | 76 81 eb ad 7e 90 fd 6f b1 86 5e 11 a2 e7 77 5f | c1 4e 81 30 92 43 c5 b4 66 60 7f 33 52 22 85 c1 | 6f 01 81 ec 5d 5f 91 b7 53 01 fe 18 96 c2 64 e9 | d4 ad d0 b7 b7 a3 ba e1 97 81 a4 d5 9e 61 d0 8e | 29 00 00 24 48 1f 7b 4e 8c 39 27 4c 54 7b 31 27 | 38 83 2b 38 ab a8 0f 41 0e 72 e0 b6 b5 f5 a8 48 | 24 b7 3e 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c d9 59 12 c5 45 19 36 85 eb ed 91 | 74 0a b9 7e c6 b2 17 c0 00 00 00 1c 00 00 40 05 | 8c de 28 49 d8 e8 ba a2 04 93 2a 1c a7 e3 0e 84 | b2 9d 1f bb | state #241 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb340040790 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469e7260 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28af0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #241 | libevent_malloc: new ptr-libevent@0x7fb340040790 size 128 | #241 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49620.480421 | resume sending helper answer for #241 suppresed complete_v2_state_transition() and stole MD | #241 spent 0.477 milliseconds in resume sending helper answer | stop processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388048a80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed bf c0 ae d9 fd 74 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #241 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #241 | rejected packet: | ed bf c0 ae d9 fd 74 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #241: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abd200 | handling event EVENT_RETRANSMIT for parent state #154 | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #154 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #154 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49620.500795; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.018771 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b026c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #154 | libevent_malloc: new ptr-libevent@0x7fb388048a80 size 128 "road-eastnet-nonat-154" #154: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #154) | 58 44 d0 f4 a9 dc 50 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 19 a5 f0 13 d1 8a b9 49 96 a8 fe 61 6f 4c e6 | ed 98 cc 8a 65 9d e4 af 10 e6 cf 62 f8 4a ff 02 | 90 85 dd 9e 23 5d 3e 90 f8 fe da b0 af 0e f7 4d | 4a 05 63 a1 69 db d1 01 e1 b1 0c 86 c9 3e 7d 9b | a4 2a 0f 98 09 40 36 8c 8d db ff 98 96 15 32 bf | 21 16 30 40 ae ae fb 4d 47 43 6a 1d c4 ee 0d b8 | 26 d3 b2 3f 2c ab f7 f8 0e a5 40 0f 3a fc 7c 80 | cc 8b 34 d2 f1 7f 26 73 45 a4 a9 ed 44 96 56 b1 | 73 9b 2b 0c 92 10 cb f0 48 16 48 7a 38 20 64 1d | 96 ee 19 8c 5c 7f a1 2d 3c cf aa b0 87 20 50 5a | d7 fe ed 1e da e9 09 e6 09 9a 75 a1 17 60 9e 3f | eb eb 3b 4a e8 5b e7 e1 61 2b a2 e0 ec 37 4d 19 | 5f 61 62 98 dd f9 aa d9 4b 8e bd 76 64 f0 89 37 | 39 0c 99 e6 f2 9b c5 88 8a eb 5b 10 1d 66 5f 10 | c6 5a 71 1c 22 22 ac a4 dd 72 16 46 60 ff 04 a0 | 8f 7a b8 da e1 39 b2 3e 50 39 72 e6 6a 86 81 1e | 29 00 00 24 8a 71 f4 36 cf 99 83 f2 20 30 a8 af | 91 e1 58 d7 2f 81 0b 43 f4 5f a3 87 48 cc 52 31 | 9b 27 40 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 21 57 f3 9f 4c 07 c6 03 b1 b0 7f | 5c 7f 90 aa ef 12 66 a4 00 00 00 1c 00 00 40 05 | de 38 70 15 e3 5a 3a 70 b8 42 a9 af 5d 6c a1 ee | f3 f1 65 20 | libevent_free: release ptr-libevent@0x7fb35003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abd200 | #154 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 44 d0 f4 a9 dc 50 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #154 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #154 | rejected packet: | 58 44 d0 f4 a9 dc 50 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #154: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a67330 | handling event EVENT_RETRANSMIT for parent state #45 | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #45 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #45 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49620.507573; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.011855 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abd200 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #45 | libevent_malloc: new ptr-libevent@0x7fb35003b0b0 size 128 "road-eastnet-nonat-45" #45: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #45) | a3 bb a6 38 bf 16 36 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 bf 7f b3 da cb 24 f0 9d 9b d3 fd dc cf db 07 | e6 5b 40 74 f8 99 0f 8a 69 5b 21 df 39 e1 ee 66 | 6e d2 eb aa da ff dd cd ef 30 5f f7 58 03 e1 db | 0d 74 f6 29 93 ca f1 42 fd ad b9 96 9c 2f 50 32 | 58 c3 21 d3 aa 48 12 01 4c e3 13 6e 9b ee 2d 74 | 42 be dc c8 fd 3f 8a d7 32 bc c2 52 53 8d f7 2a | 84 67 44 c8 2e dc 1a b1 bb 7e 48 68 aa 07 71 d2 | ed bb 6e e8 36 32 f2 a5 31 45 4d 85 68 10 11 40 | f6 85 5c 6f 85 60 44 96 50 66 ff a4 e4 4d 79 e9 | 3c a7 0e 91 f7 05 c3 d3 85 48 8e e8 a2 59 53 66 | 1c c3 08 ca 90 69 7f b0 5f 9c 5b ec cd 7e 11 67 | 1a 0f 4b b0 b3 89 8c 73 6f 1c d6 27 19 18 73 72 | 31 f5 6c a7 f0 f8 1b 36 35 8a f6 30 2e d1 b7 af | a6 2e 5d 9a f5 83 05 7a b2 73 c7 24 06 c8 92 6b | 85 fe 7f 79 f1 ba 3f d3 86 28 f4 16 3a 94 56 af | 55 d5 d6 bc 89 52 4c e8 34 d8 86 d5 fe 13 15 fe | 29 00 00 24 a8 f8 bf 2a 70 d8 0d e9 bf c1 0f 00 | 25 da 1d db 8f ac 61 b5 e1 f0 75 9a 00 6d 79 0f | ff f5 3b 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 ff e8 4e 79 94 20 d9 00 0d 87 37 | ed 16 46 76 d8 43 be 32 00 00 00 1c 00 00 40 05 | 2d 67 24 20 12 0e 18 8c 34 32 0f 7c 4f 51 94 df | fd 23 b8 c6 | libevent_free: release ptr-libevent@0x7fb3700300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a67330 | #45 spent 0.176 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 bb a6 38 bf 16 36 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #45 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #45 | rejected packet: | a3 bb a6 38 bf 16 36 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #45: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0917 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a73690 | handling event EVENT_RETRANSMIT for parent state #236 | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #236 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #236 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49620.52412; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.503109 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a67330 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #236 | libevent_malloc: new ptr-libevent@0x7fb3700300e0 size 128 "road-eastnet-nonat-236" #236: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #236) | 4f c5 63 73 3b b2 d7 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 5b 06 ee 84 fa 79 7f e6 43 db d2 0d 8b cd f5 | 59 c7 e2 83 26 7e 92 07 02 e5 75 02 5a 6a f0 b8 | 61 d3 80 1a 18 f6 6c 41 f4 8b 1c 06 f8 08 1d ec | 22 4e 32 49 5f 33 c9 49 bb d4 b4 9a 8b 9e f4 b7 | ce cc cf cb 5d b3 17 75 80 5e 65 75 ed 96 58 92 | ba 35 70 a7 18 25 e3 2d 24 94 8c 18 40 c5 8f 8e | 52 27 34 ad d5 17 cd 88 62 97 c4 7d b7 05 9c fd | 87 2b 85 fb 44 37 03 91 16 87 52 0a e0 03 40 76 | 05 68 d4 2b 81 46 59 09 54 29 07 bd 68 5b bc 5c | 8c 95 6c ea 24 20 a3 81 a2 b7 51 34 bf 49 44 7c | d1 b4 84 70 99 94 3b 26 25 f6 f8 e9 a2 1d 40 46 | 82 c9 ad f3 5f 36 60 f9 1a 16 eb 90 3e 33 04 f7 | 6d 37 8a a4 9b 0b b3 e7 22 8c ca b9 99 a2 ef 47 | df af 33 fd 94 a4 95 ab c9 0d 75 62 b8 13 05 a5 | 03 c9 74 d6 f5 9e 6f a1 90 65 6c b2 72 e9 df f5 | 5d 19 cb 15 48 a4 79 d7 52 7c ec ab 28 6e 6d 0a | 29 00 00 24 28 83 19 a9 be e7 a3 f6 92 20 74 48 | e6 d2 29 74 96 b0 77 d3 bd 1e ee 26 dd 0d 67 63 | ff bc dc bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 3a ff 41 6e c5 dd cc 76 37 c9 88 | fe 40 cf a9 30 61 ac fb 00 00 00 1c 00 00 40 05 | e2 5c 52 8d c8 02 86 2e 47 16 0b 04 4f 16 65 56 | c3 38 ce 94 | libevent_free: release ptr-libevent@0x7fb34403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a73690 | #236 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f c5 63 73 3b b2 d7 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #236 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #236 | rejected packet: | 4f c5 63 73 3b b2 d7 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #236: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abe780 | handling event EVENT_RETRANSMIT for parent state #205 | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #205 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #205 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49620.540123; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005837 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a73690 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #205 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 "road-eastnet-nonat-205" #205: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #205) | 96 a5 4d 09 36 59 36 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 af 72 1b a0 98 9e 50 b5 1c 2a f4 25 37 46 6d | 29 08 48 dc 3a 43 a8 47 58 90 05 63 32 ed 1e 67 | 1c d6 5d a6 5c c9 d2 88 4d 23 9d 29 85 6c bc 34 | b6 39 47 15 78 35 07 0e dc 99 e1 b1 20 70 65 8b | 00 6c f0 e9 44 5b 08 c2 17 e1 6b 72 9c af 6c 5b | a9 60 97 0c ec 66 17 57 bd 76 76 97 27 d0 77 4a | 2a 55 71 50 75 d7 68 7b d8 80 b2 7a 09 02 08 2b | 09 0a ee 89 61 3b 8a 2f 12 7c cc 05 74 ec 11 d1 | 9b a1 09 08 7c 39 7a ee 4d 88 62 16 e2 82 1b b3 | d9 8f 53 7a 4b 48 dd 7d 8c 47 a4 25 61 2b 5a 2a | 2f 93 a5 82 b2 4d a6 fe b3 ac 51 3e da 8f 23 63 | f4 2a 7e 1b 28 f1 63 98 1b 09 f8 46 7c 59 0e 77 | 0b 32 ae 4e 95 8f da e9 a4 30 df 08 42 58 09 74 | 83 d9 4e 39 cd 7e 3b e6 37 1b b5 f8 2d 02 a3 8b | db d0 44 1c b8 65 c5 60 b6 1d bd 0a 87 21 84 61 | fa 21 34 4e 05 0a 9f 1b ec 7d 07 6c c5 18 67 d9 | 29 00 00 24 6c 40 f7 85 3a 61 11 e1 6e 44 7b 14 | a7 18 59 d8 8f ce 04 ee 70 39 7f 15 26 c1 43 92 | dc 05 98 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 dd f4 0a 58 0e d8 12 1e dc 08 fa | c5 ab bd a9 a1 ef e0 c4 00 00 00 1c 00 00 40 05 | 38 8d 68 ba 0f a0 5d 58 b7 93 ab fe 9b f6 26 59 | 71 96 1a e7 | libevent_free: release ptr-libevent@0x7fb3500300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe780 | #205 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 a5 4d 09 36 59 36 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #205 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #205 | rejected packet: | 96 a5 4d 09 36 59 36 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #205: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0706 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1c450 | handling event EVENT_RETRANSMIT for parent state #155 | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #155 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #155 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49620.551814; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006749 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe780 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #155 | libevent_malloc: new ptr-libevent@0x7fb3500300e0 size 128 "road-eastnet-nonat-155" #155: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #155) | ba 2d 75 59 38 9a 40 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 2d 8b bd fb e0 3e 63 93 cb 94 a3 59 ba 66 52 | 15 4e 4f 76 34 6f 63 6c 04 46 3b 73 fd d8 a5 8e | 35 33 06 7a 8c 2a 4d a0 d2 b7 a5 ef 60 5a a8 23 | ae c6 93 50 9f f0 c3 f5 06 df 4c 45 c0 4d 3b 90 | 71 b1 18 44 3a bb 92 05 e2 cb 38 9c 05 04 9c e5 | 33 86 8c 22 6f 05 07 53 37 10 99 50 e7 0b 25 55 | 89 9d 75 47 09 a1 92 af c6 86 5d 17 e6 b3 28 20 | 26 34 0c 4e a0 b6 47 51 4c df 53 f2 97 03 03 a6 | 89 4b b3 92 4a ab b5 e2 4b 58 52 5d fc 27 cb e8 | 64 f4 d9 2f f4 95 21 72 e7 fe 03 93 84 af de ff | 1c 75 39 21 b3 f9 de 3e e2 ac 5f bb e7 9f 0c bd | 32 99 99 15 33 bb 7d f8 f9 aa 92 5a 38 4d 6d 97 | 0e 69 3d a1 d8 b7 8f 44 ed 36 63 50 f7 7e 74 d2 | 45 dc 02 6e 87 72 5d 06 c1 0c 87 2a 42 4a 0c 96 | e5 33 b2 8a 28 de 43 7b 5c 89 da 84 03 93 af 07 | 0f 41 63 be 8b 32 2d a1 13 d7 f4 a0 78 5d 7b 02 | 29 00 00 24 1b 6f 61 ca 07 05 56 47 f0 44 a9 2b | df 2e 5b cb e9 85 db 0d bf 4e 16 8e a5 b1 b6 3b | d1 6b b0 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 9d 23 9a a7 98 84 7a 80 70 0e 3e | c4 f1 43 a7 4e 6b 6b 59 00 00 00 1c 00 00 40 05 | 2e 42 b0 ef a0 75 a1 7c 37 dd 50 d1 c0 f7 e8 21 | 72 07 2b e7 | libevent_free: release ptr-libevent@0x7fb37c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c450 | #155 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 2d 75 59 38 9a 40 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #155 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #155 | rejected packet: | ba 2d 75 59 38 9a 40 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #155: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0679 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35800d120 | handling event EVENT_RETRANSMIT for parent state #233 | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #233 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #233 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49620.582843; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.005706 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c450 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #233 | libevent_malloc: new ptr-libevent@0x7fb37c0407f0 size 128 "road-eastnet-nonat-233" #233: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #233) | 77 22 f4 9c 3e 1f 99 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b ec 2a 3f 06 d1 8b 5a e8 a0 a7 30 dd 97 56 a8 | fc 83 ab 1c 41 f5 e8 c3 f3 53 9d 30 18 0d be a8 | 6b a6 4b 53 32 26 a8 d4 bc df 11 84 c3 51 c0 79 | eb 6a aa 97 40 5a 35 1b a4 6a 1c c4 04 e6 8f 18 | 55 5f 5f c2 af ea 6a 6c 05 59 de 4e 19 d5 22 46 | 8f 6c 32 5b 58 46 45 5f 0c 50 78 8c 5e 88 c7 73 | e0 06 97 88 0d 6e 77 b6 da 57 bc be e2 24 fb f2 | bc 09 06 c5 c0 aa 19 66 66 6f 88 a3 1d 28 43 e3 | 36 51 8c 80 0a 70 81 d2 c6 66 0e c8 9f c6 17 19 | b8 81 ac 81 1a 75 2c b9 dc 5b 7e 21 7e 73 b2 27 | 88 a7 6d 88 e3 28 4e 9c 2a a6 e3 b1 c2 84 18 fe | a8 bd 00 37 6c ea ee 13 7b 00 0f 0a d1 ff 5f 9e | d5 9b e4 25 b2 e5 a0 5b a7 8c 8c 3d 30 b8 3c 2d | d7 5a cb be 36 80 67 eb 87 97 e6 10 f7 e4 20 c7 | b9 ae bd af 99 ea 2b 87 69 7f 4e 89 2a ed a5 67 | 99 05 49 1e d6 46 c3 74 7b 66 be bf b6 f1 d6 cc | 29 00 00 24 c5 f3 2f 2c 84 76 05 a0 25 7b 18 6c | b7 6d f8 2f 27 cc e2 71 11 4d 56 a5 c7 36 d6 2c | 0b df 39 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 f4 1a 0b 18 23 e3 b7 72 f4 2b e8 | 42 64 3b ae 76 1f 34 42 00 00 00 1c 00 00 40 05 | 5e 56 c8 b1 db 9e 88 e1 bd b5 14 1e 2e de bc 55 | b2 28 a2 2d | libevent_free: release ptr-libevent@0x7fb358012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800d120 | #233 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 22 f4 9c 3e 1f 99 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #233 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #233 | rejected packet: | 77 22 f4 9c 3e 1f 99 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #233: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0695 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7a390 | handling event EVENT_RETRANSMIT for parent state #46 | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #46 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #46 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49620.595202; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007386 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #46 | libevent_malloc: new ptr-libevent@0x7fb358012840 size 128 "road-eastnet-nonat-46" #46: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #46) | b8 02 bd ab b2 01 5a b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 02 34 ab 29 73 17 93 9c d3 ac d4 2d a7 40 8f | 6c ab ce c1 cf 26 d8 e1 c0 a5 2f a8 7c e6 62 97 | 14 ae ce 27 9d 48 da 55 bb 1a 50 83 cd 98 7c 7e | 93 0d ef 6b a4 36 24 54 0e e8 77 76 0a 46 5c 28 | c7 d2 ff f1 d4 08 43 1a 21 66 26 cc ac 89 a4 fa | 9e 6f e1 5a 6f bb 4b ea 22 4d 9a 3d 2a 1c 97 d5 | e7 d2 d1 ac 8d d0 32 2d 42 98 eb fc 7f 55 28 65 | e5 b7 88 e1 ec b5 ba 0a 74 06 aa 48 51 b1 11 3b | 2f 1d 4c c7 49 ef 3c d0 65 a2 df 8e 59 96 65 b4 | 5b 67 18 f6 c6 dd c1 ba 8c 98 60 72 7f 9b 34 f1 | f4 df 07 a6 02 25 08 e0 ca 45 1c 4e 5a 84 92 f8 | 41 4b e2 11 63 dd 97 cd e2 1c a6 92 32 6d 9f 66 | 47 ba 05 95 3f 93 67 80 97 77 56 16 84 bf 6b d6 | e6 b0 76 58 be 43 b2 86 c2 1e 75 44 04 7d 93 a8 | 8c b0 a8 b8 83 ce 3c 1a d2 a1 85 f4 c7 9a 35 d1 | a2 ff 32 1f de 4b 99 be 80 8a 49 9b 41 45 2e a7 | 29 00 00 24 59 91 d6 77 3b 12 ba 32 8c e3 4b 3b | 93 6d 1e 3b 04 96 db ec 7e 0e 16 50 f1 18 04 aa | e6 1e e5 ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c a5 da 82 02 27 22 be 3c d8 f4 7e | 26 be f7 a0 40 5a a0 f6 00 00 00 1c 00 00 40 05 | 90 e6 40 68 17 4b f9 af 42 5a 03 6b 4d 68 d7 fb | 1b b9 9d a8 | libevent_free: release ptr-libevent@0x7fb37401f7f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7a390 | #46 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 02 bd ab b2 01 5a b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #46 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #46 | rejected packet: | b8 02 bd ab b2 01 5a b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #46: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #156 | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #156 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #156 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49620.615546; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004989 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7a390 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #156 | libevent_malloc: new ptr-libevent@0x7fb37401f7f0 size 128 "road-eastnet-nonat-156" #156: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #156) | dd 32 b7 34 a5 67 d1 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 58 47 50 60 00 e3 2a ab 04 ac a5 14 a4 e1 f8 | 89 44 71 9e b6 e2 f8 e1 89 a3 38 1e eb a4 57 9b | c0 92 a7 d8 d8 8c 0f 8c f9 d0 36 f7 8d 04 cc a1 | 61 5a bc bb 35 d5 16 ad 1c 27 3b fa 1b a3 4f 77 | 4e 80 47 b0 e1 83 82 b2 b5 df c4 bc d9 8d 01 04 | 4e b5 a6 60 d4 4f b3 0f 13 49 05 d9 85 5d f8 18 | 24 40 91 d1 3d 7e 6a 98 45 d7 dd 05 70 e0 c6 57 | c1 84 e8 77 d6 e2 7f 57 50 49 e0 f2 9f b0 43 93 | be 02 be f3 99 3a 02 72 36 17 a3 a7 b6 d3 1e 0b | e7 53 c6 c9 cc d5 25 75 87 c0 73 6c 5f 57 27 d6 | 52 91 24 4a 97 d3 d6 0e af 8d 6c 52 24 2d ea 91 | a1 73 e1 9e 71 14 d1 4f eb 25 67 a3 b8 12 64 b9 | 8a 15 3f 88 bc 65 32 65 96 0c ff f7 b9 a7 84 11 | bd 40 10 e1 dc 1a 04 fe 8c 35 23 2a ec b7 33 72 | 4b f4 4a e9 9d f1 da a3 b6 9c fe 09 27 14 3a 79 | 5d 82 c7 e0 9b d4 a3 ce 53 68 f7 6f b3 06 c9 71 | 29 00 00 24 b7 44 fe 38 00 43 d3 2b ff 97 13 ca | 89 7c c3 ed e0 15 4d 76 12 7b b9 2f 48 9b b5 b3 | 8b 4d ce 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 13 6e 65 76 b7 ef f6 88 e7 f3 9e | f3 f9 5a bb 01 8b 91 4f 00 00 00 1c 00 00 40 05 | 4f 93 4d ef 0e 69 28 8b f3 02 75 93 a5 b3 16 9b | e0 c9 4b 18 | libevent_free: release ptr-libevent@0x7fb35c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #156 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd 32 b7 34 a5 67 d1 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #156 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #156 | rejected packet: | dd 32 b7 34 a5 67 d1 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #156: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0697 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c00d120 | handling event EVENT_RETRANSMIT for parent state #224 | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #224 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #224 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49620.616871; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002498 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #224 | libevent_malloc: new ptr-libevent@0x7fb35c01d920 size 128 "road-eastnet-nonat-224" #224: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #224) | df 89 b3 52 1f 0f f1 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 96 f9 c5 cf 52 6e 98 60 ae 95 1a e5 7e 1a 31 | 50 be ef 8d 41 26 11 5a 53 58 33 b0 a8 71 a8 6c | e8 76 92 5b e2 75 f3 94 63 68 60 f5 a8 87 0f b1 | 85 e3 57 f0 0a 68 7c 03 0c 38 78 58 ee f2 b7 98 | 27 f8 ff c8 7f ae 35 5b f2 27 8d 00 b6 82 75 2b | 3b 8a 79 42 25 39 44 44 74 88 57 0d 59 d9 ac 5f | 3a a3 28 54 30 c8 14 8d d4 ac c4 45 3f f7 ef e3 | 1f eb 55 97 53 44 9f 09 90 a7 a8 b1 9f 93 b7 ec | 77 b6 57 89 c8 dc e6 37 8a a8 71 f3 b4 89 24 f8 | 4d 88 b5 f8 54 45 64 00 76 98 8f 87 5f 00 73 6a | f6 f0 80 19 81 11 66 a0 99 ea 82 6c 63 da b4 a5 | 98 93 6c 76 ef 6c 97 72 9f 10 64 96 91 57 93 6d | a1 3f 92 89 58 38 d2 cf 72 5f 0f 1e 71 7d 51 50 | af 30 4c 3a ad 78 8a 2d 7e 0c 42 b8 89 96 d8 fc | a1 5f f4 b6 9f 10 b4 87 26 b0 a3 fb 36 06 d9 24 | c5 ea bd 98 29 fe 3b d7 81 37 c6 01 f7 9b f8 78 | 29 00 00 24 c7 58 00 d8 91 d9 da 4a 3e 8b 1d 2d | a3 43 99 18 27 ab 56 0f 2a b9 54 4e 52 a3 14 24 | 6c 73 a2 b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 40 3a 6a 95 ab 61 8d 6b 1f 3b c7 26 | b3 ad 90 46 7f 26 ab 97 00 00 00 1c 00 00 40 05 | 80 ec 8b 4c 52 09 6e c6 12 ca 33 07 bd aa 68 3f | 33 bf 9b d1 | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c00d120 | #224 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 89 b3 52 1f 0f f1 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #224 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #224 | rejected packet: | df 89 b3 52 1f 0f f1 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #224: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-242" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-242' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #242 at 0x557d46b1e4c0 | State DB: adding IKEv2 state #242 in UNDEFINED | pstats #242 ikev2.ike started | Message ID: init #242: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #242: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #242; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-242" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-242" IKE SA #242 "road-eastnet-nonat-242" "road-eastnet-nonat-242" #242: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-242 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-242": constructed local IKE proposals for road-eastnet-nonat-242 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 242 for state #242 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c00d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #242 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 | #242 spent 0.158 milliseconds in ikev2_parent_outI1() | crypto helper 2 resuming | crypto helper 2 starting work-order 242 for state #242 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 242 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 242 time elapsed 0.000993 seconds | (#242) spent 0.998 milliseconds in crypto helper computing work-order 242: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 242 for state #242 to event queue | scheduling resume sending helper answer for #242 | libevent_malloc: new ptr-libevent@0x7fb380048a80 size 128 | crypto helper 2 waiting (nothing to do) | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-242" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.256 milliseconds in whack | processing resume sending helper answer for #242 | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 242 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #242 | **emit ISAKMP Message: | initiator cookie: | bb 4d 15 84 4a d1 63 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-242 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x be b8 bd 73 36 69 de db bd 2c 4d 3f 4c ae 08 43 | ikev2 g^x b3 f3 d7 53 b9 34 af 4a b1 04 e1 e2 27 f6 b2 b1 | ikev2 g^x 3e 96 98 76 a6 00 83 11 2e 07 de 5b 47 a6 5a a5 | ikev2 g^x 8f 0c 87 f8 e6 f5 c8 d5 f0 ce bf 70 a9 e4 7d f9 | ikev2 g^x c0 99 10 3b ec 9c 30 58 7b 73 32 96 65 b5 9d 37 | ikev2 g^x 48 ba 52 b0 1b 39 cd 58 16 bc 06 a4 25 89 da 22 | ikev2 g^x ca c6 85 48 e1 fd 54 81 b4 f6 46 e3 a3 cc 04 fd | ikev2 g^x ed 22 5b c4 4b c5 12 3d 87 53 9d f3 99 49 26 6d | ikev2 g^x e0 15 46 62 13 40 fa fc 54 c0 0d bd 54 60 26 93 | ikev2 g^x aa dc 01 46 3c 92 65 7b 4e 15 bf 35 9f 0d 1e ef | ikev2 g^x 63 43 fe c2 e1 31 5d 4e e4 23 fe ab 39 17 60 89 | ikev2 g^x ab b5 9b 1d 6d ed 49 c1 f4 3e 50 67 a1 09 05 d9 | ikev2 g^x c3 d6 c1 46 1e 9a db 86 ae f2 48 84 9e 9d 6d f5 | ikev2 g^x 1a 55 ad e2 9f 23 3f a2 29 49 4a 81 a2 25 2b 78 | ikev2 g^x b3 0b 2d 2a ec 81 b7 72 6f 93 e3 8b ce 4c b6 e9 | ikev2 g^x 10 ec a2 f6 93 c8 51 54 e2 4d 42 c5 bb 12 0b c1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 43 16 25 02 5f 89 fd c4 95 04 8f 29 f5 97 17 77 | IKEv2 nonce c9 2f ab bf 71 ef e8 74 04 bd c8 92 df d9 0b 74 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= bb 4d 15 84 4a d1 63 66 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f2 | natd_hash: port= 01 f4 | natd_hash: hash= 14 dc d6 bb 84 20 bd 3d 97 6d a1 71 60 d0 7a 61 | natd_hash: hash= e2 12 2c 58 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 14 dc d6 bb 84 20 bd 3d 97 6d a1 71 60 d0 7a 61 | Notify data e2 12 2c 58 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= bb 4d 15 84 4a d1 63 66 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6c 10 68 84 3a c9 9c f7 49 94 4f 1d 42 c4 e8 ff | natd_hash: hash= 34 65 7d fa | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6c 10 68 84 3a c9 9c f7 49 94 4f 1d 42 c4 e8 ff | Notify data 34 65 7d fa | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #242 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #242: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #242 to 4294967295 after switching state | Message ID: IKE #242 skipping update_recv as MD is fake | Message ID: sent #242 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-242" #242: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.242:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #242) | bb 4d 15 84 4a d1 63 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be b8 bd 73 36 69 de db bd 2c 4d 3f 4c ae 08 43 | b3 f3 d7 53 b9 34 af 4a b1 04 e1 e2 27 f6 b2 b1 | 3e 96 98 76 a6 00 83 11 2e 07 de 5b 47 a6 5a a5 | 8f 0c 87 f8 e6 f5 c8 d5 f0 ce bf 70 a9 e4 7d f9 | c0 99 10 3b ec 9c 30 58 7b 73 32 96 65 b5 9d 37 | 48 ba 52 b0 1b 39 cd 58 16 bc 06 a4 25 89 da 22 | ca c6 85 48 e1 fd 54 81 b4 f6 46 e3 a3 cc 04 fd | ed 22 5b c4 4b c5 12 3d 87 53 9d f3 99 49 26 6d | e0 15 46 62 13 40 fa fc 54 c0 0d bd 54 60 26 93 | aa dc 01 46 3c 92 65 7b 4e 15 bf 35 9f 0d 1e ef | 63 43 fe c2 e1 31 5d 4e e4 23 fe ab 39 17 60 89 | ab b5 9b 1d 6d ed 49 c1 f4 3e 50 67 a1 09 05 d9 | c3 d6 c1 46 1e 9a db 86 ae f2 48 84 9e 9d 6d f5 | 1a 55 ad e2 9f 23 3f a2 29 49 4a 81 a2 25 2b 78 | b3 0b 2d 2a ec 81 b7 72 6f 93 e3 8b ce 4c b6 e9 | 10 ec a2 f6 93 c8 51 54 e2 4d 42 c5 bb 12 0b c1 | 29 00 00 24 43 16 25 02 5f 89 fd c4 95 04 8f 29 | f5 97 17 77 c9 2f ab bf 71 ef e8 74 04 bd c8 92 | df d9 0b 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 dc d6 bb 84 20 bd 3d 97 6d a1 71 | 60 d0 7a 61 e2 12 2c 58 00 00 00 1c 00 00 40 05 | 6c 10 68 84 3a c9 9c f7 49 94 4f 1d 42 c4 e8 ff | 34 65 7d fa | state #242 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c00d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #242 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 | #242 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49620.642438 | resume sending helper answer for #242 suppresed complete_v2_state_transition() and stole MD | #242 spent 0.464 milliseconds in resume sending helper answer | stop processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb380048a80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 4d 15 84 4a d1 63 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #242 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #242 | rejected packet: | bb 4d 15 84 4a d1 63 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #242: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0588 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34800d120 | handling event EVENT_RETRANSMIT for parent state #237 | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #237 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #237 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49620.646639; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501016 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e7260 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #237 | libevent_malloc: new ptr-libevent@0x7fb380048a80 size 128 "road-eastnet-nonat-237" #237: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #237) | 4f 30 a3 80 9f 9f 65 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 80 47 96 1c c9 51 f1 0b e5 85 bc ba 8d d8 2f | 7e 2e aa 44 d1 4d 1c a5 32 20 f2 ef d0 59 1d c7 | a5 77 ca 5e 02 89 87 a6 bb c0 e0 54 5b b5 84 79 | 29 9f bb 42 c6 20 c7 56 ce cc 84 c6 1e c1 d2 f4 | 13 76 c9 2e e4 05 e9 37 e6 bd 6f 35 dc f2 cd db | 35 16 6c ad 20 92 a2 8f 48 33 b4 20 26 8f 59 2d | 4c d4 d1 24 86 23 46 ee 6e c6 b6 24 d5 4f 00 17 | 52 61 b1 bb 85 d2 0d d3 70 1d c1 d8 3c 26 6e b6 | 77 3b f1 af 93 e8 cc 5f cb 1e 13 01 93 4d 4b b3 | 72 06 cc a6 aa 05 5c 87 d3 9f 0b a2 d6 36 1e 41 | 74 1d 84 0c 84 17 40 09 ae 80 b1 14 f6 05 f4 d7 | 5d 5f bd 62 54 0a 41 03 07 59 f0 77 45 28 e1 78 | 15 ba 85 f9 68 5c c5 ec 72 3c 38 3b 02 ac c0 42 | c6 0b db 17 1d c8 55 9c ae 19 48 78 01 ba db 02 | d5 a9 df ad 4f 67 c1 5c 0b ad 91 db 71 af d7 d7 | 81 9f c3 2e 7e 4d 1a 85 96 12 81 67 a7 1b 56 fa | 29 00 00 24 e8 e3 42 9e a6 0b 6b 38 33 d4 39 b2 | ba a4 24 74 62 c1 99 66 60 77 d8 65 6c a2 d4 f2 | 70 50 e9 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 8a 35 95 f7 6d e2 2a d4 81 0f d3 | 67 1d 3d 86 23 6d 84 2e 00 00 00 1c 00 00 40 05 | 36 30 d8 35 65 36 0c cb 2b 9c c9 7a 14 59 39 58 | c5 b8 4c 54 | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800d120 | #237 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 30 a3 80 9f 9f 65 f0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #237 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #237 | rejected packet: | 4f 30 a3 80 9f 9f 65 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #237: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae4840 | handling event EVENT_RETRANSMIT for parent state #206 | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #206 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #206 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49620.654081; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006593 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #206 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 "road-eastnet-nonat-206" #206: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #206) | 01 b3 28 e7 e1 8b 13 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 fa e3 24 f9 a6 bc f3 21 1e 37 1a 6d f4 9a 7b | 77 24 5e 56 24 67 7b 74 f9 64 dc d8 1a b5 59 69 | d9 52 b7 b7 59 74 06 38 08 06 47 89 aa a8 f6 76 | 67 bf d4 4c 77 38 3b a1 63 60 dc 2b e4 fd cd 8b | 9a 4a 0c c7 7b 27 52 84 4e da 22 90 8d d5 51 6e | 00 c5 39 c6 ed 97 f2 c6 62 d9 ba 39 61 32 bb b8 | 11 91 00 ac cd 59 52 93 9f 38 fd 04 59 e4 ef 16 | eb bf 19 45 a5 bc 57 3a 53 a0 af 42 99 76 fa 1f | bd f3 4c 0f c8 d9 db e2 c0 a7 a6 04 31 f7 f9 f3 | 77 5c f7 e0 36 17 0a 5b 7e 68 29 02 15 2c e5 8a | 69 a2 34 36 51 a6 dc bd 4c c4 84 48 fa dd 5f b4 | 73 4d 7d 2b ff 7e df 63 45 9b 17 c7 95 9a 49 c4 | 94 db d0 f3 cd fa 37 d8 ec f4 8c 44 3e 14 f3 a8 | 13 2a dc fa 14 d8 cb 5f 5e 17 3a bf 2d 92 c3 14 | 49 5a 16 33 0a 40 13 9b 4f 56 1a aa ae 2b 43 6f | 7d 54 d1 07 b7 2a 7c 54 16 74 51 00 fd 0a b4 02 | 29 00 00 24 44 53 3f fa 64 f7 0e 35 c1 fb 1d 6e | fa 42 52 34 05 1a a7 3b 67 a9 b1 fa 7a da c7 46 | 65 3a cf a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 ab 21 a3 8f 50 c0 c7 3c cf c9 b6 | d3 91 c9 10 6d b3 85 90 00 00 00 1c 00 00 40 05 | fa 90 51 e6 cc c6 e6 dc b8 75 a7 d9 1e dd 64 0c | e1 7b e8 fe | libevent_free: release ptr-libevent@0x7fb3380407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae4840 | #206 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 b3 28 e7 e1 8b 13 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #206 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #206 | rejected packet: | 01 b3 28 e7 e1 8b 13 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #206: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61c10 | handling event EVENT_RETRANSMIT for parent state #47 | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #47 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #47 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49620.662103; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008168 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae4840 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #47 | libevent_malloc: new ptr-libevent@0x7fb3380407f0 size 128 "road-eastnet-nonat-47" #47: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #47) | d1 80 96 dc 70 12 fd 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 89 48 be 2f 23 20 1a aa c0 f9 41 f1 9f b5 dc | 61 3b 4e 1d f2 94 aa 61 39 fa ff 9e ad da aa 8b | 79 a4 b0 75 86 17 be 8d f9 64 cd 5f 2c a3 74 02 | 5c d2 0b c0 e1 bc 40 a4 41 01 24 b6 16 65 80 b1 | 8d 5b f4 3e d9 78 1c 78 5b d0 4f 36 20 49 cf f5 | e6 39 8f 45 c4 05 3e 9a 58 8d 26 dc 13 63 31 38 | f0 e2 e6 6e a9 06 79 15 81 1d f5 b1 3e c3 40 32 | 5c c3 ef 40 73 34 78 3f 9f 9d fe 1e 7a 64 15 bd | f5 c1 66 e8 e7 57 72 db 6e e7 07 6d fc c3 84 15 | a7 9e a5 ae 49 06 60 b0 66 25 b2 60 5b c9 52 7b | 84 da 9e 07 cb 22 63 3f f7 e3 75 51 cd b7 f5 a9 | 00 8e ee 37 13 40 c4 a0 04 91 8b 4e b2 90 26 27 | 78 4c 50 15 9b df e6 81 a0 a4 86 f0 9c 4a d6 4e | 71 20 bc ef 14 af bb ba f8 7a 84 f5 e8 b4 d8 08 | bb e0 cf f0 c2 7a 1a fb 6d c0 80 83 cb fe 9c fe | 4d f9 6c 4a 79 4d c9 ec 6b b4 1f c4 42 35 86 05 | 29 00 00 24 45 2a 73 9c 59 88 24 30 1b 4c d7 76 | 91 c3 f5 9d 27 d4 d8 42 63 2d 46 4d bb 79 5b 50 | bd 3d d6 ba 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 44 84 40 30 da 67 e5 a7 75 a7 f1 | b3 01 a1 ea ef 36 29 e3 00 00 00 1c 00 00 40 05 | 02 24 d1 73 8e ed 3e 54 49 25 16 88 bd 9a 48 c6 | 35 3e 63 7f | libevent_free: release ptr-libevent@0x7fb36801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61c10 | #47 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d1 80 96 dc 70 12 fd 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #47 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #47 | rejected packet: | d1 80 96 dc 70 12 fd 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #47: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8d60 | handling event EVENT_RETRANSMIT for parent state #157 | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #157 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #157 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49620.686809; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.011663 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61c10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #157 | libevent_malloc: new ptr-libevent@0x7fb36801d920 size 128 "road-eastnet-nonat-157" #157: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #157) | 58 3c 05 73 d3 10 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 16 05 06 2f 3b 22 9e 88 08 ab fe 29 25 f8 32 23 | d0 15 af d8 5f 65 e8 be c6 03 98 0f 18 e5 00 77 | 99 86 03 c7 fc 1b e8 83 43 61 ba 00 0c dc 29 59 | 0d fd 85 a1 75 5e f3 f7 d2 64 26 3b e1 11 43 3a | 94 43 08 73 30 5e 1d 91 aa 8f 9d c1 5c 52 ae c1 | 1d 90 3b cb 44 47 58 f3 40 38 01 58 63 65 29 32 | b6 4a 78 a5 71 58 c1 30 ea 73 8e 14 71 72 8e df | ee 45 ee f6 d2 a7 99 89 1c 7b fc 81 aa fe 75 bb | 36 cb a8 81 eb 73 7b eb 5a e7 fa 6d e5 b4 95 b2 | be 54 f3 23 c2 44 23 4a b5 30 87 1d 26 24 c6 c4 | 6b d1 5d 1a 24 7a 69 b5 9b 7f 97 17 e0 18 0f 6f | 1f f9 f1 e8 6c 46 2c d8 28 aa 7c 1d ec ed d6 d3 | b6 eb c6 eb 3b 55 59 5b 10 23 06 f1 f2 aa 19 3c | 8e ca 99 c8 e5 ba 47 04 47 84 62 13 96 06 08 0d | 88 7a a1 63 08 7b df 84 fd 48 36 29 3e 5c 44 7d | 05 23 1e 33 96 d8 b6 34 ea b3 94 6e cc d2 07 97 | 29 00 00 24 a9 6f a2 6f e4 cf 6b 0e 7b b9 69 24 | 56 3d ee de fe c6 39 89 8e 14 c9 0f 9e 2f 60 95 | f7 4e c6 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 bf ce be 86 a6 d7 14 f3 ba 0e 49 | ee d2 d5 26 4c 2e 13 18 00 00 00 1c 00 00 40 05 | 0a 36 59 95 a8 fb 5c 3b ea 04 70 de 29 72 15 40 | a3 00 f6 34 | libevent_free: release ptr-libevent@0x7fb34803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8d60 | #157 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 3c 05 73 d3 10 8c 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #157 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #157 | rejected packet: | 58 3c 05 73 d3 10 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #157: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8cc0 | handling event EVENT_RETRANSMIT for parent state #238 | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #238 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #238 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49620.723328; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.507566 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #238 | libevent_malloc: new ptr-libevent@0x7fb34803b0b0 size 128 "road-eastnet-nonat-238" #238: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #238) | f6 ab 39 cf c5 7d 06 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af d3 7b 83 d9 03 ff 12 c8 97 56 ab b2 14 10 e0 | 48 f1 3b e3 4f 64 7a 9a 9e ba 3d 1c 59 ad a8 95 | bd 51 64 ba be 30 e1 34 45 a4 34 1f 3e df 3f d6 | 86 b0 59 41 db 94 3d 0d e6 62 59 ee 2c dc c0 b6 | 14 1d 3c ee 48 4c 83 08 18 f6 26 a9 cc aa db a7 | 11 c4 2a 15 e2 1f 73 e6 9e 15 53 88 2a 78 32 86 | e7 60 9e db ba 38 76 7a 13 5c c5 ac fd 1c e1 b3 | d9 b0 34 80 53 e2 98 a7 ba 07 c7 e0 29 79 99 fa | 34 4e 3c 41 8c 32 8f 62 7b 0b 06 3e 96 0f e4 ec | 50 ea 8b 72 ce 3c a2 48 3d 50 a6 bf fa b9 6f 49 | 42 35 90 06 bb 42 36 54 c0 36 66 cb e8 62 33 36 | 54 3c 66 18 ff f4 71 a8 dc 58 87 96 fa c3 1b c5 | dd a8 8d cc aa e7 e2 09 78 51 8e a8 fa 1a ff ca | 8e a6 7b eb 75 ad 7d 26 12 45 b0 78 8a db a7 e1 | 91 4e 5d 71 95 e7 03 95 d9 44 14 28 62 b8 ce bc | 33 38 e8 30 35 30 6f c6 da 40 e4 e4 28 6a f5 3c | 29 00 00 24 e9 54 88 95 a6 38 9d 64 f1 e3 1e dc | e9 d3 25 19 54 a9 08 d5 30 10 d0 0d 46 91 20 94 | d2 ec 4b e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 09 df c5 c7 bf ac 94 7a a2 81 0c | 76 04 c4 df 2b 4d 28 f9 00 00 00 1c 00 00 40 05 | 49 c2 83 19 04 1a b6 87 e7 32 12 a0 0a 0c 4f 92 | e7 02 e1 ed | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8cc0 | #238 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469e05a0 | handling event EVENT_RETRANSMIT for parent state #234 | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #234 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #234 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49620.723511; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00535 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8cc0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #234 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 "road-eastnet-nonat-234" #234: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #234) | f2 fd b6 5b dd 65 ca 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 84 9f 8e f2 4d ae 28 c3 a6 33 85 a7 41 17 2e | a7 fb 37 ec dc 5e da 22 ed a7 d6 7f e1 29 5e 3a | c1 0a e8 67 19 e8 ac d8 ab c4 ce 43 3f 4e 0f bb | 7c 98 41 2b 6f 77 ca d9 32 a6 af f9 98 cd dd 12 | d9 37 bd e9 25 be 75 b5 bd 5e e0 83 6f 45 f8 da | 18 94 6a f4 88 bf 0e 4d e2 07 2b 36 d8 6f 3a 20 | 7f 78 6a 85 8a e5 3c dd 81 bb 63 90 5e cb bc ba | da ba 10 8a c6 0e 8a aa 71 5a 96 4e 6c 70 41 b3 | b5 ed c1 a3 26 f6 9d 2f 3e 30 60 a8 7a d4 51 c7 | c1 d0 6f 12 78 fa f6 7a 64 88 82 80 72 24 ff 23 | 06 91 a9 95 a1 36 33 ce f2 c2 55 d0 b5 3c 49 79 | 6f 7f 3e 42 f0 3e 13 68 8b e1 82 c2 f7 ef 92 e7 | 73 e6 b2 0b c7 04 76 33 01 80 30 de 76 f1 e6 56 | a7 c5 01 91 93 65 f4 09 85 c4 02 fa 63 8b e5 e6 | 21 78 9f 81 bf e4 b0 d6 2d 62 90 d2 7c 1e 4b d9 | ae 42 db a5 3c 94 61 a1 2c 3b 37 25 2d 53 32 5c | 29 00 00 24 9d 5d 40 b5 2d ec 67 ae 83 64 17 c2 | 32 3b d8 b9 21 ed 79 bc f4 91 0a 50 e4 b3 2c c0 | f4 72 58 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 89 bc a1 a0 be dd 06 e7 d6 84 21 | 72 6a c6 f8 b6 a8 a1 51 00 00 00 1c 00 00 40 05 | 53 6b 47 d7 1e 7d 4e e3 0d 3e 41 f7 75 f0 92 15 | 7c 13 7e ba | libevent_free: release ptr-libevent@0x7fb340045ed0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e05a0 | #234 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 ab 39 cf c5 7d 06 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #238 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #238 | rejected packet: | f6 ab 39 cf c5 7d 06 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #238: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 fd b6 5b dd 65 ca 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #234 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #234 | rejected packet: | f2 fd b6 5b dd 65 ca 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #234: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0565 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #48 | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #48 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #48 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49620.741103; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.01834 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d500 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #48 | libevent_malloc: new ptr-libevent@0x7fb340045ed0 size 128 "road-eastnet-nonat-48" #48: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #48) | 92 07 42 48 2a e6 dd 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 27 70 ee fe 7b a5 6b c0 91 72 76 bf b9 26 41 | 8a c5 01 3c cd 8b 21 f3 23 df 5c 81 f1 ed a2 12 | a1 c4 5e 2f a7 b1 21 02 24 b9 30 c4 f5 c4 2d c4 | 90 7e 3e f0 c9 0b f2 18 3c 2b b9 91 3a da c1 6c | 57 28 75 1b 3a 0e e8 9b fc 4b ee 5c 39 98 fa 15 | be 81 4e e4 0c 6c a4 75 1b 83 45 74 98 dd 81 5b | 06 80 95 32 c0 f4 a2 4b 9d f4 17 33 73 16 94 48 | 16 60 93 ae 3d ce 3e d6 a3 61 16 51 cb 19 ec 02 | 00 f8 5a 99 f9 c4 14 2b 6a 99 61 a3 6a e4 c5 97 | ad 75 bb 6b 78 38 5a b9 44 bc 5c a3 2d 23 20 4c | 99 1b 88 95 1f b4 34 15 92 91 16 2b 1d 90 a8 32 | bd a4 79 83 a7 b0 92 15 f0 e3 c2 79 58 67 56 eb | 4d 0c 97 c3 3f ae 15 49 f9 9c d2 3e ec c3 17 b9 | bd 62 c7 73 21 fe 81 8b e3 b9 eb a9 ce c7 0f d3 | 3f 5d 5a 44 c2 b4 29 b6 b5 67 52 29 de ca c6 15 | 31 6c 15 9d 56 b1 be 81 9a 0d b9 07 79 05 6e c9 | 29 00 00 24 56 48 d0 40 29 5d 70 09 47 7a f3 f6 | 53 84 44 57 f6 31 5c 3b e1 9a 2b 92 5f 13 77 b9 | 29 81 06 a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 92 e0 aa 95 98 e7 44 d2 2d 1e d8 | d0 35 7f 77 52 84 b9 c1 00 00 00 1c 00 00 40 05 | a2 97 dc 1e 35 5d 8b 7e f0 05 d9 9d 5b 9e 9f 7f | 26 7a 4a c3 | libevent_free: release ptr-libevent@0x7fb38800a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #48 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 07 42 48 2a e6 dd 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #48 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #48 | rejected packet: | 92 07 42 48 2a e6 dd 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #48: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338005860 | handling event EVENT_RETRANSMIT for parent state #158 | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #158 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #158 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49620.742418; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004015 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #158 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 "road-eastnet-nonat-158" #158: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #158) | e6 a0 1a 4e 16 85 73 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d fe 92 1d 51 a7 6d 12 34 05 5b 88 3c 14 89 6b | 35 8c a3 94 b4 c5 44 d8 4b 8c 87 4c af 0d 5e 27 | cd 39 40 ee d3 b1 d8 0b a2 08 8c 95 70 dc 7c 67 | 00 94 18 0b cc 36 ba 02 42 ac 1b 6e 83 e8 f3 b5 | 91 59 9d ad e6 9f 36 2d a8 98 92 82 b5 58 8d 17 | e8 c3 14 93 e3 79 91 5b e9 d6 f6 a5 7b ab 15 3e | 02 89 3b e3 40 68 94 7c a5 09 b7 59 3e c5 6a 99 | 03 29 08 a9 4d cb 54 e8 24 b9 ad 4e d9 ec 0b 15 | 00 2a bb 1a df 73 04 f9 ab 12 4b db 50 44 e0 e2 | 22 35 8e 9a 3a 55 04 43 31 37 ac 1b 04 2e 40 6f | a3 ce 4b 7d 81 aa 0c 4f 00 20 e7 14 67 8a 92 03 | be 6c 2c b0 1e 89 ff eb d0 66 ac db b5 5f 07 46 | 34 4e 75 3e 19 4d d5 e5 2d 16 89 cc 75 86 80 6f | 3f aa e7 c1 07 a0 f4 7f 40 db 1c df 1d 97 4e 83 | 99 fc 4e 29 fa a7 c5 07 07 e9 c0 d9 34 f7 42 65 | b3 46 1d 34 7e 34 fc b8 2a d6 72 9b 56 fa c8 74 | 29 00 00 24 93 3e 30 9d 56 73 68 ed 32 94 90 87 | db 7b 56 ae fd bb a5 6c 98 47 2c cb b8 9c 69 c6 | ac 01 dc 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 af 5c ca 3f 10 b2 e1 eb 3b d6 06 3e | 82 97 94 30 e1 e8 70 cd 00 00 00 1c 00 00 40 05 | bb 02 3a cc bb 31 72 ec b9 81 77 29 32 3e e8 21 | a2 17 d3 ee | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338005860 | #158 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 a0 1a 4e 16 85 73 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #158 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #158 | rejected packet: | e6 a0 1a 4e 16 85 73 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #158: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf00 | handling event EVENT_RETRANSMIT for parent state #225 | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #225 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #225 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49620.765111; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.012659 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #225 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-225" #225: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #225) | 1c 46 35 b1 a5 15 7d 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae fb 41 53 6b 81 0b c3 2d 10 6f c4 43 42 9b b5 | 58 ae de 87 ce bb b8 82 21 69 b3 17 de bc f9 c2 | a6 34 e7 7f 32 f0 7d a7 6c 08 3e 2b 62 ab 16 a0 | 49 34 97 75 bc a1 e7 57 c6 b6 15 50 f3 8a f1 c4 | e3 18 e0 09 c0 26 64 c1 d3 38 7d 95 30 90 58 4d | 99 27 bc 98 4e c8 b5 39 36 2c 46 50 c2 b8 f6 07 | a6 3c 00 2b 8d 8c 50 f6 a6 08 bd fd 79 68 91 be | 81 69 f3 24 98 59 43 c8 78 e1 dc 86 d2 16 6e a3 | 6a de dc a4 19 ff e6 d6 63 67 69 75 d8 ae 52 31 | c3 a7 ea ea 95 69 03 74 0f ef e1 6f 99 0c 56 d4 | 62 d0 1b 8d 8f 7c ad 94 ab 7c 03 43 80 8a 6e bb | 36 aa d3 44 03 e6 5c 20 d3 4b 45 e5 a2 5c 00 25 | 37 ab 32 ce e0 ae 35 8e 13 d7 03 37 11 57 20 f8 | ae 87 85 bc 10 d5 2c 64 54 e7 c4 49 10 99 df 04 | 79 9e f4 43 41 4b 6a 31 13 21 e7 cf d7 1a da 5b | 4b c0 6d 43 c6 e7 f0 86 e7 2a 75 03 ec 4c de 27 | 29 00 00 24 27 0f 48 fe da 9f b7 b6 f5 85 2e 21 | 09 ff e1 4d 05 12 3c c0 4b 2e ad df df d0 69 83 | 11 81 8e 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 11 33 1d 86 3c cb d4 6f 7e 68 c8 | 95 dd 6a 6a 4f 3e eb 1f 00 00 00 1c 00 00 40 05 | 41 16 5c d3 40 8f 72 70 a4 ea ff c4 c5 31 7c 04 | 7c 81 7f e0 | libevent_free: release ptr-libevent@0x7fb38402d380 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf00 | #225 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c 46 35 b1 a5 15 7d 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #225 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #225 | rejected packet: | 1c 46 35 b1 a5 15 7d 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #225: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0692 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23150 | handling event EVENT_RETRANSMIT for parent state #207 | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #207 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #207 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49620.776301; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.015775 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf00 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #207 | libevent_malloc: new ptr-libevent@0x7fb38402d380 size 128 "road-eastnet-nonat-207" #207: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #207) | 98 86 9a c8 81 d3 6e e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 59 ae 25 5d aa 28 92 c6 18 2f bc 82 85 c2 3b | ef 2d af ff 7a e6 4d 2d 70 93 a0 de ce 52 57 5f | cf 57 26 3f 1c a7 0f b2 96 d8 25 c6 cb c3 1d 15 | 8e 04 6c c9 e5 de a9 9f 48 ec bf 8a ac af 55 b7 | 16 4e ac b3 75 43 96 89 7c 9a 69 70 08 ac 14 3e | 96 4b 5a 70 2a 29 e5 8b 07 f0 5c cb ed e2 91 b3 | 9b d7 77 9b 28 c0 fb 49 4d 80 b8 6a 5f 4b e2 be | 9f 93 81 d7 4b ea 7b e4 89 24 53 bc a4 06 8a 63 | ae f3 eb f3 e4 35 75 5b 3f a9 62 83 5c be e9 3f | da 2a 80 0c d1 89 a8 df 56 22 c5 4a 79 92 72 a5 | 3c 63 0a 48 54 25 a3 65 43 13 ce a4 3e 09 f7 a7 | 13 60 08 7a 31 57 5f 3e ec 21 89 2d 48 e6 b5 d0 | 55 c4 14 94 07 66 75 e1 7b b7 31 ad 1e 44 cd 2a | 84 8d 3f db f4 29 57 19 60 3f fa 98 86 72 4b e8 | c5 e2 25 d0 6a 0d c6 7c 2e b9 5b 59 7f 50 39 10 | 7f 2b dd a7 68 a0 e6 07 75 6e ff 62 1d 5c 80 75 | 29 00 00 24 e2 c5 0f b4 00 31 2d 18 4e d6 58 87 | 9d 2e 37 b9 b3 22 c5 5a fd 1c 75 2e 4d 23 6a 09 | d6 2f 3b 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 0a 15 af 31 57 a5 69 ec 8c db 25 | c8 27 a9 b0 00 8f 48 7f 00 00 00 1c 00 00 40 05 | af fe 48 1b 76 51 69 26 e1 f2 f5 ea 64 9f 61 35 | 72 2e c3 f3 | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23150 | #207 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 86 9a c8 81 d3 6e e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #207 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #207 | rejected packet: | 98 86 9a c8 81 d3 6e e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #207: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0672 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-243" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-243' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #243 at 0x557d46b1fa80 | State DB: adding IKEv2 state #243 in UNDEFINED | pstats #243 ikev2.ike started | Message ID: init #243: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #243: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #243; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-243" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-243" IKE SA #243 "road-eastnet-nonat-243" "road-eastnet-nonat-243" #243: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-243 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-243": constructed local IKE proposals for road-eastnet-nonat-243 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 243 for state #243 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a23150 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #243 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 | #243 spent 0.154 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-243" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.235 milliseconds in whack | crypto helper 0 resuming | crypto helper 0 starting work-order 243 for state #243 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 243 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 243 time elapsed 0.001353 seconds | (#243) spent 0.997 milliseconds in crypto helper computing work-order 243: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 243 for state #243 to event queue | scheduling resume sending helper answer for #243 | libevent_malloc: new ptr-libevent@0x7fb384048950 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #243 | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 243 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #243 | **emit ISAKMP Message: | initiator cookie: | 39 d2 8c 3c d9 9b d0 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-243 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e5 7c 7b 28 d8 43 9d a6 57 48 f3 56 58 a9 96 02 | ikev2 g^x 89 eb 92 ba df fe 7c b4 93 87 0a 15 04 96 3d d9 | ikev2 g^x 97 4f ed fb da 47 e0 91 75 a8 ae 92 a4 07 c6 b2 | ikev2 g^x 54 7e 3f f7 5a ab 2d 86 ec bf b6 60 fc b0 e0 42 | ikev2 g^x 42 76 7a 8f aa 4f aa 15 dc 06 c4 c5 a6 64 c4 cb | ikev2 g^x cc bb 4c d4 38 55 bd b1 4e f2 bf cc 48 b4 72 4f | ikev2 g^x 87 59 b4 0f 7e ed 03 f1 41 ee a8 6e 5e c8 2d 73 | ikev2 g^x 30 2b 8d ba 0f 00 07 b3 03 3d 8c 71 2e 4d 64 94 | ikev2 g^x 7c 2a 25 17 eb 7f f4 7c 3d ac 47 e3 e8 64 b3 1d | ikev2 g^x 93 52 33 b4 60 d2 91 0a df 53 00 a1 04 e7 82 d1 | ikev2 g^x ba cb 66 13 49 96 51 fe 75 53 10 a1 e8 ed 85 c1 | ikev2 g^x 24 57 8f 5c 2d ab 6e 1a d8 d2 18 48 42 bf 96 fc | ikev2 g^x f2 c5 7f a1 3d 7c 8d 10 dd 4d fc 0c 94 ce 13 b9 | ikev2 g^x f3 c9 49 d3 a2 9b 04 c3 51 ef 2c 4a 1d 70 85 00 | ikev2 g^x f9 d1 0e 6b 0b 48 a0 fc 89 8f e7 8e 83 74 57 7a | ikev2 g^x c9 0c 8d f3 c6 50 96 a3 99 76 7c eb ac 17 30 58 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 35 b2 35 5f d9 02 63 3b 19 19 86 78 0e 3a e9 6c | IKEv2 nonce 99 53 dc 00 7c 7f ad 46 fe dc 4c 82 97 17 87 d5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 39 d2 8c 3c d9 9b d0 6f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f3 | natd_hash: port= 01 f4 | natd_hash: hash= 5f 31 4b 64 ab 4a 78 81 95 90 fa 46 73 84 e5 27 | natd_hash: hash= 1c 47 ef db | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5f 31 4b 64 ab 4a 78 81 95 90 fa 46 73 84 e5 27 | Notify data 1c 47 ef db | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 39 d2 8c 3c d9 9b d0 6f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 94 bc 64 25 b1 da 5d db 67 02 68 07 a8 c5 47 cd | natd_hash: hash= f9 c3 f5 ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 94 bc 64 25 b1 da 5d db 67 02 68 07 a8 c5 47 cd | Notify data f9 c3 f5 ed | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #243 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #243: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #243 to 4294967295 after switching state | Message ID: IKE #243 skipping update_recv as MD is fake | Message ID: sent #243 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-243" #243: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.243:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #243) | 39 d2 8c 3c d9 9b d0 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 7c 7b 28 d8 43 9d a6 57 48 f3 56 58 a9 96 02 | 89 eb 92 ba df fe 7c b4 93 87 0a 15 04 96 3d d9 | 97 4f ed fb da 47 e0 91 75 a8 ae 92 a4 07 c6 b2 | 54 7e 3f f7 5a ab 2d 86 ec bf b6 60 fc b0 e0 42 | 42 76 7a 8f aa 4f aa 15 dc 06 c4 c5 a6 64 c4 cb | cc bb 4c d4 38 55 bd b1 4e f2 bf cc 48 b4 72 4f | 87 59 b4 0f 7e ed 03 f1 41 ee a8 6e 5e c8 2d 73 | 30 2b 8d ba 0f 00 07 b3 03 3d 8c 71 2e 4d 64 94 | 7c 2a 25 17 eb 7f f4 7c 3d ac 47 e3 e8 64 b3 1d | 93 52 33 b4 60 d2 91 0a df 53 00 a1 04 e7 82 d1 | ba cb 66 13 49 96 51 fe 75 53 10 a1 e8 ed 85 c1 | 24 57 8f 5c 2d ab 6e 1a d8 d2 18 48 42 bf 96 fc | f2 c5 7f a1 3d 7c 8d 10 dd 4d fc 0c 94 ce 13 b9 | f3 c9 49 d3 a2 9b 04 c3 51 ef 2c 4a 1d 70 85 00 | f9 d1 0e 6b 0b 48 a0 fc 89 8f e7 8e 83 74 57 7a | c9 0c 8d f3 c6 50 96 a3 99 76 7c eb ac 17 30 58 | 29 00 00 24 35 b2 35 5f d9 02 63 3b 19 19 86 78 | 0e 3a e9 6c 99 53 dc 00 7c 7f ad 46 fe dc 4c 82 | 97 17 87 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 31 4b 64 ab 4a 78 81 95 90 fa 46 | 73 84 e5 27 1c 47 ef db 00 00 00 1c 00 00 40 05 | 94 bc 64 25 b1 da 5d db 67 02 68 07 a8 c5 47 cd | f9 c3 f5 ed | state #243 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a23150 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #243 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 | #243 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49620.787334 | resume sending helper answer for #243 suppresed complete_v2_state_transition() and stole MD | #243 spent 0.513 milliseconds in resume sending helper answer | stop processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb384048950 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 39 d2 8c 3c d9 9b d0 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #243 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #243 | rejected packet: | 39 d2 8c 3c d9 9b d0 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #243: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a72150 | handling event EVENT_RETRANSMIT for parent state #49 | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #49 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #49 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49620.796374; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.011192 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e05a0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #49 | libevent_malloc: new ptr-libevent@0x7fb384048950 size 128 "road-eastnet-nonat-49" #49: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #49) | 8b 45 5c f0 af 2f 9d ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 38 13 81 3a b9 33 6e f2 a1 41 ed b7 e9 17 cf | 38 df bd f2 c5 3d 78 1c 98 5b e5 97 39 7c 00 0a | 9b b9 2b 4e ee 4e 90 b7 3f 17 93 3b 49 e6 73 ac | f3 36 ea c0 f6 08 78 26 b2 58 4a a1 8f ff 26 a9 | a2 29 62 4b f6 47 e2 5d a0 f3 e8 a3 da 86 cc 66 | 5a 6a 1d 0c 47 30 d7 e6 6e 32 62 71 d7 d3 1b 25 | 92 10 eb e7 f4 a1 c6 b8 cf 48 2b c2 a1 ae c9 5f | 55 56 6d 5d 77 a7 5f aa 02 cf a8 ea bb 62 18 44 | 0f aa 1d 7d 23 c7 37 6d 72 2b 4a da 38 22 af af | 35 47 8a 4d fb f1 2e 0f fa 54 54 48 f4 2f 1b 4b | 5a 9a c8 ab f4 0a 9c 36 8e 9a 37 b6 3a a4 36 09 | f9 cb 85 a0 d5 4e 66 72 2d dc a7 8d 87 52 32 39 | 0d 6e ce 73 51 c4 9b ee a5 7a c3 e9 dd 43 0b 8d | c9 c7 df e3 c7 9a fc aa 8b 37 41 93 d2 be 3c 27 | 15 30 62 da 6c d3 07 29 68 48 b5 55 56 c4 17 4f | b5 8f 29 d1 f2 fb 9e ea 13 d1 f0 21 44 a0 36 ca | 29 00 00 24 0e e2 a8 92 f0 b5 63 29 61 a0 ee 39 | b4 45 f6 bb e0 ab b1 76 a4 84 16 9e da d2 be 94 | e8 6d f8 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 12 9b 83 c2 c3 d2 71 a5 38 21 6e | a0 97 8f 66 c6 b8 71 3b 00 00 00 1c 00 00 40 05 | d2 ce 05 69 62 ac 37 a7 c1 ab 75 f3 75 7a c1 3e | 4a 93 d7 88 | libevent_free: release ptr-libevent@0x7fb388027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a72150 | #49 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 45 5c f0 af 2f 9d ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #49 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #49 | rejected packet: | 8b 45 5c f0 af 2f 9d ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #49: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a89700 | handling event EVENT_RETRANSMIT for parent state #239 | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #239 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #239 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49620.81835; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.515859 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a72150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #239 | libevent_malloc: new ptr-libevent@0x7fb388027c10 size 128 "road-eastnet-nonat-239" #239: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #239) | b9 4e df 3e 84 90 25 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea ef 5f 41 79 0b fe 19 84 c3 03 27 cb e7 22 b5 | 4b 8d ad 5a dd 57 ea a0 d4 aa e3 61 84 72 47 6a | 4d 42 f7 0c 18 4a 15 88 92 91 45 67 3d 64 ce a8 | f0 3e 2a 18 f5 33 74 78 5b 6d 2d ad 60 68 a7 2c | 42 44 24 a7 49 23 19 0c fa 8d 52 0c 5c f4 c5 65 | 9c 02 7d 4d 52 90 91 ba 69 4d a0 bb 25 6e ec 3a | e9 30 9b 1f f4 e8 ec d1 8d 6a 8c 3f 41 9e 38 b3 | 41 e7 4e 00 b5 c6 ea 1b 8f 24 c7 a8 c4 ec 84 ef | e4 cf 76 d1 2b eb 8f 91 66 1a d6 b3 71 c5 5b 71 | c2 ce 48 72 d6 b0 0f 07 ef 9a 8e fd 8a 44 8d eb | 79 c7 74 c1 a0 f8 4b 78 8d 62 3e 5a d2 f7 58 20 | ab d5 b3 52 66 2e d1 5e a8 11 59 26 5b 03 c4 c7 | 72 cc b1 7b df 43 62 14 05 c3 52 d4 b9 35 c7 18 | ab d1 fe d6 f2 c4 bf d0 34 85 da 05 d8 1c 9e bd | 53 20 10 e1 51 57 70 e6 78 d1 56 9f cf b4 da 8d | 2c 7b cb 52 64 97 83 25 dd f7 88 42 c4 42 ba 2b | 29 00 00 24 60 20 cc a1 fe 49 9c e3 77 c9 2c 1b | 58 3a e0 e5 74 37 cc 08 7f e8 2c 53 5a 76 29 4f | ad de 78 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 5b b0 88 0f ba 91 5e f1 72 ec fe | c8 60 42 a1 68 5e 5f c0 00 00 00 1c 00 00 40 05 | 4c 5b ce 23 3c 60 29 97 fc d7 dc 03 c2 55 73 9c | d8 91 a1 ef | libevent_free: release ptr-libevent@0x7fb34802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a89700 | #239 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aba600 | handling event EVENT_RETRANSMIT for parent state #159 | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #159 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #159 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49620.818537; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.016702 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a89700 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #159 | libevent_malloc: new ptr-libevent@0x7fb34802a950 size 128 "road-eastnet-nonat-159" #159: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #159) | 9d f6 62 77 51 33 7c 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 a4 0d 7c 3f bb 62 60 89 5b f7 52 ab d7 ca 61 | c6 32 47 69 10 70 7b 4b b6 2a 70 55 d5 38 a9 c2 | 06 fe 6f 0d a3 c3 18 2d 09 43 b4 f7 9b ba 82 ec | 93 e7 fe 37 c0 9d ff 14 eb fc f4 a5 4f eb f2 e9 | 81 40 d5 d7 0d b6 64 ad 86 89 bc 12 73 da 31 6d | 21 c9 f1 76 ef e5 fa c1 2f 00 73 7b 29 f7 14 d0 | cc 33 12 7b be c7 0b 95 25 c7 3c c9 94 8d 40 b3 | 24 76 27 7e c2 06 53 7c 39 6a 80 69 0a b2 fa aa | 13 ac 6b d9 25 77 ea de 54 91 5a 44 b0 3f bb f5 | d7 05 e4 68 6e f2 57 14 f5 2f 93 5c 8b e1 18 57 | a7 aa 40 49 0b b7 ce d1 00 80 ba 6e 5e cc 5b a3 | 7d 08 af 9a a8 cd d2 ac df 34 27 c2 04 7d d9 9f | e2 bf b9 fd 43 84 3d e1 23 56 2b 91 01 a7 94 b9 | 39 80 83 eb c5 4c de ac 80 1d 05 1e 22 14 a6 fb | 08 b1 be 3f 9b 24 b0 c4 63 eb 31 8d 24 20 37 93 | 7d fa a5 c0 26 eb c3 7c ae e2 24 2a 4f 31 bf c0 | 29 00 00 24 93 99 a4 63 0d 72 bd 0a 86 bd f8 14 | bb 6c 2c e3 e4 66 d1 1e e3 70 5a 2a 46 97 fd 74 | 37 df 1f 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 4a e8 13 db 7e 81 08 43 48 ab 41 | d6 8f 57 84 74 b1 75 e1 00 00 00 1c 00 00 40 05 | 43 72 1d eb 44 7d 24 cc 39 78 4a ec 22 c2 1a 4e | 3d 2f 0c bd | libevent_free: release ptr-libevent@0x7fb35c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aba600 | #159 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 4e df 3e 84 90 25 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #239 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #239 | rejected packet: | b9 4e df 3e 84 90 25 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #239: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d f6 62 77 51 33 7c 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #159 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #159 | rejected packet: | 9d f6 62 77 51 33 7c 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #159: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0536 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35400d120 | handling event EVENT_RETRANSMIT for parent state #50 | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #50 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #50 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49620.862847; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.010948 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aba600 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #50 | libevent_malloc: new ptr-libevent@0x7fb35c035930 size 128 "road-eastnet-nonat-50" #50: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #50) | 96 fd fa e4 3e 0e 84 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 85 b8 19 de 5c 0b b8 2d cb 54 cd 4a 1a dc 75 | 29 fd ca 47 94 14 29 17 31 bc e5 6f 6c f8 34 07 | 54 0a 45 19 2c 2a 6f 1c b9 dd 1e a6 5c 18 fd 5f | 81 44 c7 97 e9 8f a1 20 0b 20 67 50 dc 17 2d 25 | 1e 18 a7 76 43 da 58 3d a0 3c 42 3d 77 42 d1 eb | ed 35 62 7a 01 62 e1 32 87 10 6c d5 80 f8 d5 7a | e6 0d bc 8d d6 42 76 b9 2d fe 0d c3 eb e6 a9 0d | 0e 9f 06 5b af 9e 49 ff c0 94 83 2a d0 2d 71 88 | 4e 9a 35 ec c3 f5 8a a6 c6 22 6e 7e 16 d4 d9 e4 | d9 14 a9 a0 89 f2 18 8e be cf da c0 b4 27 62 b2 | 69 81 38 d5 cf 1b 18 ef 28 a2 d6 ab 45 93 46 f0 | b0 cf a6 b1 57 a8 1a d7 72 93 ec cd 51 ba 98 80 | 63 05 e1 50 59 41 cf a5 af 5d 7f 76 36 8e 63 f7 | e7 a8 78 3d b4 e5 4b 57 33 d8 0b ca bb 46 3b d1 | 5c 60 2c ab 89 51 2a 58 57 80 21 7f 56 14 26 65 | bd a7 02 e1 81 1f b6 ff ab b3 3c 36 3a 4d e7 be | 29 00 00 24 62 85 07 c7 f7 76 d5 f9 35 e6 84 85 | cf ff 39 b7 d3 8a fe b9 27 ad b1 ed 4e 28 c4 d4 | 73 2f 0f ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 6a 14 0a 8a ea 03 bd 41 dc ab fe | 15 04 7a 2b 71 ea 6d 09 00 00 00 1c 00 00 40 05 | 24 23 f0 d4 3c 33 30 25 f8 fc 46 79 64 b6 7b 59 | 6c 35 21 7f | libevent_free: release ptr-libevent@0x7fb354012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400d120 | #50 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 fd fa e4 3e 0e 84 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #50 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #50 | rejected packet: | 96 fd fa e4 3e 0e 84 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #50: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.066 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a89740 | handling event EVENT_RETRANSMIT for parent state #160 | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #160 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #160 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49620.873198; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005513 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #160 | libevent_malloc: new ptr-libevent@0x7fb354012840 size 128 "road-eastnet-nonat-160" #160: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #160) | ec 91 fb f1 0c bb 28 b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 30 17 61 87 0e 49 c3 b5 8e 06 e9 0f 8d 98 6f | af 06 7c a8 d8 5f dc 88 0a 69 f2 9d 79 59 e2 95 | a1 fb db 6f 1f 95 32 7b b7 f9 9f f9 87 3d 1e fd | 84 a3 dc 5e 41 59 c7 3d 40 a9 2a 90 d5 3d ec a5 | 70 8f 09 86 de c0 6f f0 8b 3d 45 2f a8 92 74 65 | dc 5a 07 23 6d 89 30 20 25 5a 37 b2 af 30 d2 98 | c2 6a 98 57 d0 a0 8f ff e2 c6 37 8c 7f c8 5e c3 | 9d 98 d2 5d 5e 70 59 77 03 8a bf 2a a1 c0 c1 c0 | 77 97 84 ec 45 c7 38 00 39 c5 2e 6a 0f 64 17 e5 | 6e 90 68 05 f5 f6 24 a7 89 fc 3d ac 97 b9 b8 8e | 69 68 d2 76 c0 8b ed 21 84 18 d2 89 99 90 e5 b1 | e9 a1 7c 9d 78 af 48 90 e7 1b 1a 7c 29 30 21 6e | 39 f7 cd b5 93 ab 03 d1 25 14 24 ad 0e 2c 3a 55 | 23 bf 0e 11 13 d6 6c 92 56 a2 2e ac 22 4b 36 72 | 62 e4 c0 2c 6e a1 80 10 e9 1f 33 37 5b 82 aa ab | bc d0 55 fd fd 61 98 d4 55 8c e5 05 44 59 3d 11 | 29 00 00 24 5a 7f a2 3e 7b 7f ae 84 88 a2 b0 db | 20 96 18 8a e9 32 7e 19 52 af 25 1a 74 e6 9f 5e | 17 1f 26 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 25 02 d7 0c d0 85 e5 86 af b4 01 | ce 64 18 db 06 ad 6a 73 00 00 00 1c 00 00 40 05 | 33 04 36 eb ae 2e 87 8f ec 4d 9c 69 20 d1 b8 6e | 57 bb 48 2f | libevent_free: release ptr-libevent@0x7fb38401cc10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a89740 | #160 spent 0.177 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 91 fb f1 0c bb 28 b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #160 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #160 | rejected packet: | ec 91 fb f1 0c bb 28 b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #160: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a77850 | handling event EVENT_RETRANSMIT for parent state #226 | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #226 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #226 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49620.875555; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002874 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a89740 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #226 | libevent_malloc: new ptr-libevent@0x7fb38401cc10 size 128 "road-eastnet-nonat-226" #226: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #226) | df 8a 99 41 35 8f 22 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 39 0d ed 10 1f e3 0e ea ca 85 c3 5a 17 31 22 | 97 9f 06 33 b0 59 ed 25 d5 cd 46 5c e1 b7 68 7b | 60 f5 73 ac 22 e6 10 7a c8 3f 64 54 b7 2c c9 ba | 36 26 b8 60 a9 a1 e6 a3 6e 44 7f 00 0c 75 49 7e | c6 17 73 3d c6 70 48 38 43 a2 56 d7 f5 0c 3f 3f | 3f 97 93 c5 a1 2b c4 07 4f 49 5c fa 0d e2 93 83 | 1d 93 5e ee cb e1 2d 5d 17 f0 04 37 84 12 a1 e4 | ea a7 ca c8 ca 5c 70 fb 0f d5 b4 aa ca 0a eb f9 | b6 b5 03 c1 29 21 80 90 c2 2f 2a fe 6c ab e2 c4 | da df fe dd 41 56 bd 81 ee 73 c7 0a e6 2a 84 64 | 7e c8 7b 2b 7f 3e cd 94 23 75 81 89 67 c2 03 bf | 33 3e d9 d2 a5 ec 73 d5 af 8a 02 94 e8 dd 1e 6c | 57 45 a8 23 17 bc 83 80 e2 7d fe e3 0d bf 65 a8 | 6f 93 8d 7c 46 a5 58 a7 45 54 b1 bb ae e2 cb 5a | 09 4c cd b3 40 87 10 07 3f c6 8e 21 cf 42 d3 a0 | 05 bf ba f5 eb 01 2d 75 a7 76 4b e5 7b 42 b7 8d | 29 00 00 24 c0 94 06 00 9d 87 40 a0 ec d8 4c ee | 0c 16 0e a6 24 3d 43 67 f1 e5 1b a0 19 81 a3 5d | 35 48 05 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd dc 27 ce 4f 2a 14 a6 0d 4a 3f dc | 07 9c 36 b1 1b e9 59 bb 00 00 00 1c 00 00 40 05 | e3 eb a3 4f 44 c3 b7 5b e6 19 f6 7f 9a 7d 29 4c | 6a 02 ce 75 | libevent_free: release ptr-libevent@0x7fb370035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a77850 | #226 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 8a 99 41 35 8f 22 b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #226 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #226 | rejected packet: | df 8a 99 41 35 8f 22 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #226: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f2060 | handling event EVENT_RETRANSMIT for parent state #208 | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #208 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #208 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49620.884867; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003591 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a77850 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #208 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 "road-eastnet-nonat-208" #208: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #208) | 8f 5c 5f 4e 3a f5 16 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 92 7c 11 dd 8e a5 d7 54 92 a0 06 d5 10 ac 42 | 6b 15 ed 47 e9 69 c6 dc ee be 05 fb f7 98 ca cc | 76 c8 1e 19 2f 4d 8b 90 94 87 44 8e 66 b4 d8 02 | 68 05 60 b8 e3 7d 75 b7 4a 7c ab de a8 fd 41 6e | d6 76 9e 53 12 c0 6c 1d 7a 52 1e 69 01 3b 4b c1 | e7 6b 22 d6 c7 2e 90 0a 6b 5b 89 db 1a 6d af 36 | b5 41 be bc 9c 90 ed 64 78 a2 9b 4a 8f 0d 28 7e | 60 aa 46 05 6e d0 b2 52 c1 92 88 e6 04 b2 49 48 | c1 79 f2 f3 15 c9 58 54 7e a8 48 76 87 71 8d 7e | d5 41 8a 58 60 e1 22 51 b6 c8 da 62 23 cd 7f 72 | ed db 2b 44 40 79 52 36 a1 7b 1f f4 ce 24 ba 47 | 7a c2 df 3d 0b 70 e1 d1 d8 6a b0 33 7a 8b a6 83 | 44 26 40 e1 a6 53 73 33 8b d6 96 05 57 d5 68 55 | da 59 03 a3 8b 2e 16 30 b2 69 8f 5c 37 5b 88 82 | f8 0d 7c f2 a3 34 16 b2 3a a4 64 ba aa 6e 09 cf | de ff 28 7b 22 28 98 ba a1 44 cc d7 e1 ec e2 fc | 29 00 00 24 6d f9 31 58 db 7e 5c 23 da 78 97 04 | 9a 1c fc fa 9f 9f da b9 38 4a 1a f0 e7 71 5f 51 | b4 ee 4f 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 c6 9e d7 bc 34 04 8f 07 db d5 e1 | 11 54 7a 15 87 49 41 6f 00 00 00 1c 00 00 40 05 | da 8d 6c 65 d7 12 37 8a 51 87 98 29 74 33 3a f5 | 86 ee 4b 0a | libevent_free: release ptr-libevent@0x7fb370046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f2060 | #208 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 5c 5f 4e 3a f5 16 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #208 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #208 | rejected packet: | 8f 5c 5f 4e 3a f5 16 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #208: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0674 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #240 | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #240 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #240 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49620.893248; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501134 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8d60 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #240 | libevent_malloc: new ptr-libevent@0x7fb370046040 size 128 "road-eastnet-nonat-240" #240: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #240) | 52 3d c4 7d aa 75 f9 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 b8 f7 97 d2 8e a4 26 e4 de 50 11 3b 27 c2 bf | 82 42 f8 30 a7 cf e7 f1 22 7e 96 6e 08 55 b8 5b | 99 ce ba b9 bc a4 b9 85 84 1c 35 bd 81 0b 36 0d | b0 03 99 1c 13 93 72 39 72 77 b7 23 f3 36 8a 70 | 77 80 87 4b 02 4d f9 86 a0 7e c1 4d a8 f2 4c 39 | d7 80 8b 66 22 e6 a4 de 4b 09 73 0d 3d 7c b2 2f | 50 8d 5f 1f 57 2a bd 9f ac c8 a9 74 90 54 67 b7 | 8f c8 3d 39 71 39 c6 de 18 02 eb c5 ea 94 b8 db | 08 c3 39 15 f9 0b b0 93 02 0a 8a a7 ec 92 53 e4 | 1e 2b 04 08 46 40 50 55 30 ed 5b e2 89 d0 46 9a | af 8e 24 41 aa aa b9 1a e4 ce 8c fe 9d a8 de b8 | f4 9b 8a 9d 2c 1b bf b8 d5 b4 e2 72 19 89 07 85 | 8b d5 73 d5 4b b2 72 a1 17 f2 16 b2 06 c3 69 10 | 03 64 01 f6 2e ee b3 bb 12 bf 7f 2a 4b 56 f5 04 | 51 3d ee 1a 3c 36 62 a8 15 0b 0b b5 26 c4 ba ef | d2 cb 15 c8 7e 83 38 88 e7 bf 96 1b 07 79 a7 4b | 29 00 00 24 eb a6 92 08 8f 76 ab e5 c4 52 e9 41 | 1d 77 03 c7 35 5c e5 3a 95 58 fe 07 d6 1d ad f0 | 56 12 6d d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 c9 c0 38 06 3a 92 7e a1 78 c0 15 | 6c a9 8e 74 3a a1 8f 67 00 00 00 1c 00 00 40 05 | 56 20 31 94 4b 81 36 39 3c f9 b9 11 bf 66 a1 27 | 0d 62 c5 10 | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #240 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 3d c4 7d aa 75 f9 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #240 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #240 | rejected packet: | 52 3d c4 7d aa 75 f9 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #240: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0662 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f4be0 | handling event EVENT_RETRANSMIT for parent state #235 | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #235 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #235 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49620.89557; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001082 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #235 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 "road-eastnet-nonat-235" #235: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #235) | 7e 07 6a 55 b2 86 f9 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 15 b0 98 97 a3 9b e7 91 af 63 8f 32 c2 f0 a6 | 5a 92 40 40 d6 e9 e6 fc ec 5f 9d 94 27 3d 04 cc | 99 dc 7e ac 23 a0 7a 25 ef 03 33 84 5f 4e 3e 44 | ab 45 fc 51 2f 77 0e 04 9c 57 58 3e e3 c4 95 ac | 99 c6 cf 74 8b ee 49 3f 97 64 5a ae 23 26 21 49 | 82 68 17 68 04 08 36 f9 22 38 ec 23 ce 8f 41 44 | bf d0 3d c1 f8 23 b3 6a aa 39 20 ad 4f 3f f3 2b | 3d f9 49 23 b6 22 6b 6a 39 8a 61 bb b3 33 4a 8f | 12 ce 51 75 41 2f c2 97 7c 24 15 e6 c7 4c 0b 5a | 7e 98 8c f9 eb 79 4c 87 18 6e 22 0f ce f5 5a f4 | 97 f7 88 3c 20 6b 59 a3 22 56 0b 5d ff 73 43 0c | d0 ab c4 fb b1 97 4e c1 93 9b 6a 7d 3a c0 41 34 | 56 74 13 c4 02 0c 52 4b 7f 7c ed c1 a7 58 84 db | 34 3e fa dc e2 91 c8 b6 c5 5f f0 1a 94 9c 21 62 | 9c 24 2a b8 60 58 3a 4f ea 5e 65 e5 c2 96 45 62 | b2 a3 11 26 4c 94 9a fb e2 2b 93 1c 4f 08 c6 66 | 29 00 00 24 0c f1 17 b1 15 6c 67 72 28 b0 8f 38 | fd 2e 9a ff fb 4a d4 a7 a7 b2 00 ff 88 fe ef 90 | e3 f8 e6 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 78 bf 00 5e f0 c9 41 6d 35 37 22 | b0 4c f8 53 8c eb 59 4e 00 00 00 1c 00 00 40 05 | 6e 5c 6f da 69 07 20 20 73 2e b2 7c a0 00 c1 c2 | 79 44 3d 62 | libevent_free: release ptr-libevent@0x7fb338046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f4be0 | #235 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 07 6a 55 b2 86 f9 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #235 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #235 | rejected packet: | 7e 07 6a 55 b2 86 f9 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #235: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #51 | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #51 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #51 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49620.941435; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.012828 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b05240 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #51 | libevent_malloc: new ptr-libevent@0x7fb338046040 size 128 "road-eastnet-nonat-51" #51: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #51) | 4e ec 23 15 b1 7b 72 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb ca ad 90 d3 c3 42 ab 02 0a 3a 99 99 08 46 41 | e3 20 e2 b5 e7 92 8d 56 c0 f6 81 f6 d7 1f 61 ae | fb 7c 4e 49 1a 90 7d af 41 51 b1 4f a9 1c af 26 | 43 e3 44 1a 2b 54 c2 29 d3 73 8c a6 e2 ba 3d 02 | 79 ed 80 dd 4b 1e 56 a7 0d 93 2b 80 2d fa ef a7 | a5 07 28 e5 1d 36 9e 70 e3 83 04 4a 00 cd 83 0a | dd f1 6f 7b 41 89 16 39 86 45 b3 89 6b 38 63 99 | 64 d2 3b 37 57 db 5b aa 3c 09 dd b1 e9 2a 36 7d | 07 9a 1b 84 49 cb 9b 53 1f e3 16 45 5a 7e 7d 6a | b6 b2 5f ad 65 38 70 73 69 63 43 b9 48 24 d6 aa | 84 39 4e 67 2a d2 39 99 70 07 69 a7 7e 3b f3 d0 | 5d 4d 0d 43 76 2c 16 f2 ef 43 c1 03 3c a0 15 fa | 7b dd 0d 24 8d 60 85 f6 a5 c6 c1 eb e0 9b 23 f3 | 77 0d cd ab 79 52 59 61 60 d0 e6 6a b2 5f 84 3c | bc fe a3 56 10 78 f4 57 b0 c9 73 a2 9c 16 ae e5 | 21 a9 af 1c 86 05 49 d7 79 de ea 6f 42 c1 58 6c | 29 00 00 24 8a 81 ff 83 11 9d 7f 95 f4 0f 60 37 | ee c1 de 9d 9d 4a 24 6c a2 0d 2e aa 53 c1 6d 4e | 8c ed 61 8e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 84 7c cd 2e 5d e1 e4 b9 3d 91 59 | 8e 0e df bf 1a 34 00 37 00 00 00 1c 00 00 40 05 | 4f e7 ab 4c a7 2a fc d1 46 25 a0 98 d8 53 89 a8 | 24 a4 22 8e | libevent_free: release ptr-libevent@0x7fb36c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #51 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #161 | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #161 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #161 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49620.941615; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.011661 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #161 | libevent_malloc: new ptr-libevent@0x7fb36c00cf80 size 128 "road-eastnet-nonat-161" #161: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #161) | 0e 21 c5 28 e0 11 16 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 b1 7e f7 73 9d 3d 0b 9c d2 8e 29 c6 08 34 06 | 2d dc ae 10 7c 53 33 af cd 18 8c 8c 37 fc eb 71 | 2c 3b de 0f 76 b3 63 bc 1c 05 f0 af 4b 44 5e c7 | 23 d4 29 d3 16 0f fb 8c 12 fb 18 1d 9e 65 94 73 | c1 7f 44 d2 39 97 a4 57 24 65 09 c9 9f 95 0f 07 | 98 bb c4 fc e8 f9 84 20 79 d3 9b da f2 f3 7b ff | 76 4d 74 89 ed 7a aa a4 38 3a 39 de f9 ec 60 48 | 7f 57 eb 50 ff 9b 33 98 7d 3b 5f cc 64 ba 1b 81 | 67 2a 02 26 ec 3f 45 a5 fe c6 9b 0d 1d 37 b0 40 | 01 1f 97 01 e8 87 5e 53 40 bf fb d3 7e 9e 2e b3 | 15 ba fc 8b b1 4a 7e fa af 94 c4 67 c0 2c 29 d2 | 74 fe d7 24 50 34 48 da f7 a1 54 c5 1c 2b 5a 35 | 33 a6 86 42 a8 e3 25 9b e3 fe 4c de 22 93 ae dd | c7 11 a7 9f 05 b4 87 2f a1 b9 2b f6 21 37 9c 8e | 50 21 6a 50 8e bd 1d 5f a1 42 92 50 68 2f 4e 9a | 54 04 e8 cc b9 5f 82 df 48 23 c8 76 49 63 f0 50 | 29 00 00 24 b8 74 18 e1 c4 b4 30 2e a4 31 94 25 | 46 e1 dc 47 b5 0b e4 ae a0 1d 11 3a f1 77 67 fa | 52 d5 2a a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 94 bf 28 28 ea 74 13 ca 7d 07 ba | 5d 79 38 7b d7 5d 40 d3 00 00 00 1c 00 00 40 05 | aa 2f 88 27 56 8a 2e 19 5d ff 44 bb aa 2d 48 42 | c7 75 31 6a | libevent_free: release ptr-libevent@0x7fb35c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #161 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e ec 23 15 b1 7b 72 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #51 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #51 | rejected packet: | 4e ec 23 15 b1 7b 72 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #51: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 21 c5 28 e0 11 16 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #161 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #161 | rejected packet: | 0e 21 c5 28 e0 11 16 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #161: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0562 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-244" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-244' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #244 at 0x557d46b21040 | State DB: adding IKEv2 state #244 in UNDEFINED | pstats #244 ikev2.ike started | Message ID: init #244: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #244: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #244; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-244" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-244" IKE SA #244 "road-eastnet-nonat-244" "road-eastnet-nonat-244" #244: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-244 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-244": constructed local IKE proposals for road-eastnet-nonat-244 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 244 for state #244 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #244 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 | #244 spent 0.17 milliseconds in ikev2_parent_outI1() | crypto helper 9 resuming | crypto helper 9 starting work-order 244 for state #244 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 244 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 244 time elapsed 0.000989 seconds | (#244) spent 0.996 milliseconds in crypto helper computing work-order 244: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 244 for state #244 to event queue | scheduling resume sending helper answer for #244 | libevent_malloc: new ptr-libevent@0x7fb37804b7c0 size 128 | crypto helper 9 waiting (nothing to do) | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-244" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.26 milliseconds in whack | processing resume sending helper answer for #244 | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 244 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #244 | **emit ISAKMP Message: | initiator cookie: | 4b f1 49 87 f9 a6 76 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-244 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 28 99 c6 ce 30 f7 89 45 59 4d 59 48 bc e8 db b7 | ikev2 g^x 6e 51 73 db f1 50 f0 84 78 35 a5 96 97 1e cf a2 | ikev2 g^x ba 46 c2 c3 3c f1 3a 6e 96 bf 5f af 7c b4 86 ff | ikev2 g^x c1 77 25 46 ad 5b ec 41 ea 88 d5 b2 00 e8 44 78 | ikev2 g^x 0e 9f 1e 30 ef 44 2c 78 1a e7 51 e7 d9 ad 9d e1 | ikev2 g^x 0d 69 bb c8 c6 a9 e9 4f 0c d7 5e 29 38 5c 8e e0 | ikev2 g^x 8e 7c a8 b7 93 d1 97 5f 38 52 c5 7b 09 49 6a 76 | ikev2 g^x 8a 53 22 ab 09 ab d7 9d 44 f6 cf 05 91 df 27 29 | ikev2 g^x 68 68 78 b8 7a 10 b4 e5 9b cb 01 8d f1 35 fc c7 | ikev2 g^x 7f 8f 0c 26 0d 68 38 58 4d f7 b1 9e 96 4e 4d c2 | ikev2 g^x 24 dc 6f 1f 81 ff 16 30 89 d9 d3 07 46 98 c4 17 | ikev2 g^x fc 99 c1 d0 c2 70 9e d5 7c 43 6d 12 f3 10 9e 43 | ikev2 g^x 41 f8 15 2e de ff 3f c8 97 02 5f 67 73 89 79 ac | ikev2 g^x 6a 34 e1 ed 55 83 46 98 af 4b eb 61 ab ed 9c 2f | ikev2 g^x 3c d3 92 2f df 77 9f 98 51 e0 24 45 80 51 7a 35 | ikev2 g^x d5 76 40 ee 59 99 54 8f 46 a1 fc 48 cb 2a 6a 64 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 23 47 a6 9f de 30 3b be 65 32 63 50 62 d5 89 0b | IKEv2 nonce d7 3d ea 19 da 4e 55 f9 53 26 8c d3 8a e5 35 df | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4b f1 49 87 f9 a6 76 1a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f4 | natd_hash: port= 01 f4 | natd_hash: hash= 75 5e c3 f3 c5 40 cc e2 50 93 80 f8 58 99 fe 09 | natd_hash: hash= 2c 8c 43 58 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 75 5e c3 f3 c5 40 cc e2 50 93 80 f8 58 99 fe 09 | Notify data 2c 8c 43 58 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4b f1 49 87 f9 a6 76 1a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 42 a9 a5 4e 6c 3d 71 a6 0f 5e 70 c5 17 4e 52 56 | natd_hash: hash= 03 54 70 77 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 42 a9 a5 4e 6c 3d 71 a6 0f 5e 70 c5 17 4e 52 56 | Notify data 03 54 70 77 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #244 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #244: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #244 to 4294967295 after switching state | Message ID: IKE #244 skipping update_recv as MD is fake | Message ID: sent #244 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-244" #244: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.244:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #244) | 4b f1 49 87 f9 a6 76 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 99 c6 ce 30 f7 89 45 59 4d 59 48 bc e8 db b7 | 6e 51 73 db f1 50 f0 84 78 35 a5 96 97 1e cf a2 | ba 46 c2 c3 3c f1 3a 6e 96 bf 5f af 7c b4 86 ff | c1 77 25 46 ad 5b ec 41 ea 88 d5 b2 00 e8 44 78 | 0e 9f 1e 30 ef 44 2c 78 1a e7 51 e7 d9 ad 9d e1 | 0d 69 bb c8 c6 a9 e9 4f 0c d7 5e 29 38 5c 8e e0 | 8e 7c a8 b7 93 d1 97 5f 38 52 c5 7b 09 49 6a 76 | 8a 53 22 ab 09 ab d7 9d 44 f6 cf 05 91 df 27 29 | 68 68 78 b8 7a 10 b4 e5 9b cb 01 8d f1 35 fc c7 | 7f 8f 0c 26 0d 68 38 58 4d f7 b1 9e 96 4e 4d c2 | 24 dc 6f 1f 81 ff 16 30 89 d9 d3 07 46 98 c4 17 | fc 99 c1 d0 c2 70 9e d5 7c 43 6d 12 f3 10 9e 43 | 41 f8 15 2e de ff 3f c8 97 02 5f 67 73 89 79 ac | 6a 34 e1 ed 55 83 46 98 af 4b eb 61 ab ed 9c 2f | 3c d3 92 2f df 77 9f 98 51 e0 24 45 80 51 7a 35 | d5 76 40 ee 59 99 54 8f 46 a1 fc 48 cb 2a 6a 64 | 29 00 00 24 23 47 a6 9f de 30 3b be 65 32 63 50 | 62 d5 89 0b d7 3d ea 19 da 4e 55 f9 53 26 8c d3 | 8a e5 35 df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 5e c3 f3 c5 40 cc e2 50 93 80 f8 | 58 99 fe 09 2c 8c 43 58 00 00 00 1c 00 00 40 05 | 42 a9 a5 4e 6c 3d 71 a6 0f 5e 70 c5 17 4e 52 56 | 03 54 70 77 | state #244 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #244 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 | #244 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49620.968437 | resume sending helper answer for #244 suppresed complete_v2_state_transition() and stole MD | #244 spent 0.465 milliseconds in resume sending helper answer | stop processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37804b7c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b f1 49 87 f9 a6 76 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #244 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #244 | rejected packet: | 4b f1 49 87 f9 a6 76 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #244: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28af0 | handling event EVENT_RETRANSMIT for parent state #241 | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #241 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #241 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49620.980635; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500214 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f4be0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #241 | libevent_malloc: new ptr-libevent@0x7fb37804b7c0 size 128 "road-eastnet-nonat-241" #241: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #241) | ed bf c0 ae d9 fd 74 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 7f 1d 53 5e bf 7c 50 89 9a 1b 66 7a f6 ac 57 | 1e 44 b6 4e f9 ce e0 60 9e 35 82 8c 12 e1 ec 87 | c3 32 1d d0 30 6f 24 b0 84 5b 58 a3 dd 46 7f 56 | 3a fc a0 86 c1 a5 f0 b8 b4 7f c2 24 a0 35 a3 8b | 46 8b ad d0 3a 85 a8 93 6d 92 12 5e c7 60 d3 02 | 9d 48 49 61 d0 53 cf 87 bc ba 4a 86 e9 1d 0e c4 | 8a 55 24 90 50 13 2a fe 86 c6 6d 09 e7 31 26 ca | d2 d8 c1 f1 76 8e 79 98 8c eb 73 50 64 00 6e af | 8a ae f2 36 6c c7 fa cd 65 22 6c 5b 48 98 da 47 | c0 bc 45 31 fc 5e 0f aa b4 b8 1d d3 be 55 8c ba | 12 b5 d1 65 9a 9f 14 76 d4 89 e3 78 f3 26 29 2e | 46 8d 9d 7c 77 7b 47 8f 64 31 0d 93 e5 f5 e2 8f | 76 81 eb ad 7e 90 fd 6f b1 86 5e 11 a2 e7 77 5f | c1 4e 81 30 92 43 c5 b4 66 60 7f 33 52 22 85 c1 | 6f 01 81 ec 5d 5f 91 b7 53 01 fe 18 96 c2 64 e9 | d4 ad d0 b7 b7 a3 ba e1 97 81 a4 d5 9e 61 d0 8e | 29 00 00 24 48 1f 7b 4e 8c 39 27 4c 54 7b 31 27 | 38 83 2b 38 ab a8 0f 41 0e 72 e0 b6 b5 f5 a8 48 | 24 b7 3e 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c d9 59 12 c5 45 19 36 85 eb ed 91 | 74 0a b9 7e c6 b2 17 c0 00 00 00 1c 00 00 40 05 | 8c de 28 49 d8 e8 ba a2 04 93 2a 1c a7 e3 0e 84 | b2 9d 1f bb | libevent_free: release ptr-libevent@0x7fb340040790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28af0 | #241 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469ddbf0 | handling event EVENT_RETRANSMIT for parent state #209 | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #209 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #209 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49620.980818; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004069 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f2060 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #209 | libevent_malloc: new ptr-libevent@0x7fb340040790 size 128 "road-eastnet-nonat-209" #209: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #209) | 94 c0 53 32 b7 6b d2 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa aa 8f b6 87 c3 5d 98 e8 47 9c 34 3c ba fd c2 | 26 06 ee 61 85 3c e9 e8 7d e0 7a e3 30 dc 26 ae | 92 30 41 01 44 74 f7 33 20 3e 9d c4 91 ce 67 c8 | 16 8f 2d 63 7e 65 88 2d 42 e0 e7 51 27 b9 54 c3 | cb 64 94 8c 44 0b bb aa 89 37 4f 4c 19 3a 97 c2 | a7 78 bb a9 b6 bc c5 9a 0d 18 1b 6f 6c 81 28 5f | 96 22 7f 4e e9 03 4f f8 d6 4d 77 d5 fe b9 d2 6d | cd 7d 32 95 3a ae 28 68 07 70 28 76 ea 67 8a a4 | 02 0f 70 b8 39 d5 ef 06 00 8a 9d f6 62 11 fb 55 | 5d 2a 4e 92 67 d8 83 81 5c e2 b4 e7 58 f2 f1 29 | e2 e9 12 6d a8 99 db 90 fa c3 c7 67 22 60 c4 0d | b5 aa 8e 50 88 98 a0 7e 46 1d 18 c2 ea bc 90 f9 | 2c 89 53 10 11 da ca 7e 79 27 58 0a 97 be f4 b6 | df 47 81 cd fc cb 51 b6 90 69 20 0a b1 64 c6 52 | f3 67 4f b9 89 27 0d 82 44 e6 02 ff 6a 0a a5 77 | bc 54 13 6b 28 ab 23 fb 03 b0 ab d8 e9 7c 16 89 | 29 00 00 24 32 f5 dd 6d be 9b 09 7c 2d 16 66 7c | 9d 31 58 f8 20 f4 30 10 2d 04 04 00 c5 24 46 19 | 07 98 5b 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 be 30 60 49 91 51 94 d8 39 4f be | 6e 81 91 5e 2f 8c 88 7e 00 00 00 1c 00 00 40 05 | 2d 19 47 e1 25 d9 8a e8 d3 7e a2 ad 7d 2a 38 10 | 8b 55 bc a7 | libevent_free: release ptr-libevent@0x7fb374045df0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ddbf0 | #209 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed bf c0 ae d9 fd 74 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #241 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #241 | rejected packet: | ed bf c0 ae d9 fd 74 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #241: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 c0 53 32 b7 6b d2 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #209 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #209 | rejected packet: | 94 c0 53 32 b7 6b d2 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #209: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.054 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a25d10 | handling event EVENT_RETRANSMIT for parent state #227 | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #227 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #227 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49620.984102; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.005455 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afcfc0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #227 | libevent_malloc: new ptr-libevent@0x7fb374045df0 size 128 "road-eastnet-nonat-227" #227: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #227) | c5 c2 6a 83 d2 66 bb b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 5b f4 b6 58 9a 18 76 c3 e1 6e 19 2a 39 ae a1 | 62 ea 44 d1 30 52 4d 8a 54 61 7d 23 98 f8 8d d5 | 84 3b 68 fd c2 f3 21 b9 78 0c dc e3 83 0f 8e 04 | 74 b0 67 51 d8 1a 83 67 df 2f 54 ee 3c eb 78 8c | dc ab 5e ad 88 89 74 dd b8 42 f8 3b 65 bb c7 d6 | 58 b5 ad 0a ef 24 29 f4 ee 94 22 81 71 d7 21 71 | cf 9a 96 87 e9 3e 34 bd 96 10 75 82 fd 44 7e e5 | d5 b4 6d be 50 02 22 60 ae ae 61 82 1e 48 c4 e8 | fb e2 e4 71 81 50 e1 9c 82 80 8f 59 e3 b5 cd 3d | 6c 63 88 9c 58 f3 61 37 6d 11 4f 91 c3 dc 04 d5 | 78 82 60 cb 5e 0d 1d a4 89 4d 74 78 d6 b1 e9 18 | bf 79 a1 1a 16 e0 b4 3d 00 ec 02 c0 3f 69 19 a5 | ad 3d e3 6c cb 66 a6 b9 ff c5 30 88 8f f5 e7 a8 | f5 33 4d 86 13 42 87 b3 82 49 90 36 bb 5e e9 47 | c4 bf c9 a4 e4 1a 35 38 6a 04 9b 4b 05 29 61 c8 | cf c0 72 4f 16 6a 7e 8b 6f 02 0b ab 68 bf 34 71 | 29 00 00 24 73 17 4e 35 59 6e 44 c0 fd cd 46 68 | 7d aa 47 75 fe fd 8d d7 e4 53 d6 a0 cb 05 84 4f | 51 ed 61 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 60 9b b9 46 e5 98 89 ad c1 cb e5 | e9 7b 12 83 3d 55 5a fc 00 00 00 1c 00 00 40 05 | 0c dc fe 43 8b 17 32 a8 d8 5e bc 45 b2 f1 c1 93 | bc b6 5b dc | libevent_free: release ptr-libevent@0x7fb3840223a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a25d10 | #227 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 c2 6a 83 d2 66 bb b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #227 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #227 | rejected packet: | c5 c2 6a 83 d2 66 bb b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #227: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8d840 | handling event EVENT_RETRANSMIT for parent state #52 | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #52 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #52 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49621.006426; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007281 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a25d10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #52 | libevent_malloc: new ptr-libevent@0x7fb3840223a0 size 128 "road-eastnet-nonat-52" #52: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #52) | 3f 70 d8 3e f5 22 c6 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 a5 a2 fa 37 05 a0 83 be fb 7c 66 e8 09 2d 85 | 01 d0 84 ba 7e 80 ad 7e ed 7e 94 4b 5a d1 13 c1 | b1 3f 59 cf ac e4 bd 6c 95 59 bf de 9d 80 55 dd | 6c d4 7d e3 9f 38 7c 31 e7 3a f4 3d 5f ba 5a 68 | 83 7f 56 b6 a6 97 f9 9a 87 45 7b ad 59 c8 c8 c2 | 85 24 f6 8d 4c 54 59 44 37 96 77 29 ac 68 3f 6e | df da 66 fc fd e2 52 7f c0 d8 5a 6e 87 c7 d0 ea | dd 74 ac b4 2a 5c 26 2d 8f 9d 33 80 5d 13 86 23 | e5 74 ae 2d f0 58 19 74 bb 0c 9a fe 02 e9 ea 18 | 9b e9 68 5d 7c 72 e9 79 59 15 c2 74 d4 16 6f 97 | c0 92 81 74 a6 70 c8 c9 0a 8b 1e 5b 97 dd a0 5d | 10 4a 89 98 ee 3e 73 f8 ad 8e 0b 84 2b bb 87 07 | d3 19 10 ac f4 31 29 ae a0 fb 57 db 57 8e e8 3d | 7b 1c bf f9 0f c4 88 43 de 6a ac 3c e2 0b 51 3c | 47 b2 1e 04 99 56 29 39 94 ab 53 44 ad 54 e0 54 | 9d 52 e0 9a 6d 24 de d9 e3 52 91 a1 b5 19 19 fc | 29 00 00 24 bc 06 52 3b 0a a9 d6 55 15 a3 be 4e | de 77 6e 83 33 60 ab 6d e9 76 1e 6c cb ab 4d 19 | f5 ca 65 a4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 c4 b5 bf ec 75 31 9e 5d c6 9c 0c | 53 7b fb 92 b5 6c 20 70 00 00 00 1c 00 00 40 05 | 2a 93 28 00 9d ed cf 28 c2 1f ba 32 c1 4a e1 a2 | d1 c6 7c 44 | libevent_free: release ptr-libevent@0x7fb3680300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8d840 | #52 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f 70 d8 3e f5 22 c6 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #52 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #52 | rejected packet: | 3f 70 d8 3e f5 22 c6 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #52: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a16db0 | handling event EVENT_RETRANSMIT for parent state #162 | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #162 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #162 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49621.012754; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005203 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8d840 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #162 | libevent_malloc: new ptr-libevent@0x7fb3680300e0 size 128 "road-eastnet-nonat-162" #162: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #162) | 3b bf da 45 10 1c 63 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 2a 00 6f 37 4b f5 08 dc 2d d5 a4 5f d7 a7 d8 | a8 4d 31 bb 56 e7 51 71 5b 5d fc c8 0e 08 fb e2 | c0 7c 0d 9e fa 59 01 dc 52 d2 c1 e7 2f 1a e5 b4 | 5b d5 c8 45 b5 dd 91 a9 d5 c3 73 76 9d 7e fd b8 | f9 df d1 f8 01 94 2b 6f e5 9a 29 12 9e de 27 97 | 71 f3 e6 1b 74 76 a7 3a 8c e6 a9 61 00 52 7e f7 | c9 6f 55 40 33 0a 80 4c aa c5 55 f4 4e 14 8a a7 | 71 a6 78 3d d0 59 58 77 2f 99 7c 4c c3 1e 74 08 | f9 85 d0 5e 65 f5 6a 31 d7 63 2d f9 e8 59 8b 16 | 32 89 82 d2 3f 02 ed 88 92 cb b0 35 d8 db 40 15 | 72 43 38 f2 76 11 5a 75 77 0e 67 e7 50 ab d6 be | 45 bd 9e 45 2f 01 23 b3 e6 91 d2 ea db c5 26 44 | 62 95 26 52 cc d7 f4 4b d1 06 28 b1 bb 01 1a 47 | 2c 16 e5 b8 18 7a 69 d5 78 76 2f ea 81 85 bf fa | 27 ed 91 6a 8a 48 18 3c 3f 20 85 89 ae e6 4e 97 | 89 5c 72 59 c7 16 4a 7b 0a b0 0c 8e 44 0c ca 39 | 29 00 00 24 95 de a1 84 1b 6b 5e e8 be 4d c4 44 | d7 89 7f ff f7 3c d6 b5 51 9e bf df 42 03 ca bf | 75 41 b7 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 45 b2 30 32 2f 26 ad dc fc 75 7c | 7f bc 91 0d 37 21 2d 1b 00 00 00 1c 00 00 40 05 | b1 72 3a ba 32 f9 7a 15 ec b8 bb 62 7e ea 84 2a | af f4 56 24 | libevent_free: release ptr-libevent@0x7fb36c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a16db0 | #162 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b bf da 45 10 1c 63 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #162 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #162 | rejected packet: | 3b bf da 45 10 1c 63 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #162: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a67330 | handling event EVENT_RETRANSMIT for parent state #236 | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #236 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #236 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49621.026107; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.005096 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afd000 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #236 | libevent_malloc: new ptr-libevent@0x7fb36c0407f0 size 128 "road-eastnet-nonat-236" #236: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #236) | 4f c5 63 73 3b b2 d7 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 5b 06 ee 84 fa 79 7f e6 43 db d2 0d 8b cd f5 | 59 c7 e2 83 26 7e 92 07 02 e5 75 02 5a 6a f0 b8 | 61 d3 80 1a 18 f6 6c 41 f4 8b 1c 06 f8 08 1d ec | 22 4e 32 49 5f 33 c9 49 bb d4 b4 9a 8b 9e f4 b7 | ce cc cf cb 5d b3 17 75 80 5e 65 75 ed 96 58 92 | ba 35 70 a7 18 25 e3 2d 24 94 8c 18 40 c5 8f 8e | 52 27 34 ad d5 17 cd 88 62 97 c4 7d b7 05 9c fd | 87 2b 85 fb 44 37 03 91 16 87 52 0a e0 03 40 76 | 05 68 d4 2b 81 46 59 09 54 29 07 bd 68 5b bc 5c | 8c 95 6c ea 24 20 a3 81 a2 b7 51 34 bf 49 44 7c | d1 b4 84 70 99 94 3b 26 25 f6 f8 e9 a2 1d 40 46 | 82 c9 ad f3 5f 36 60 f9 1a 16 eb 90 3e 33 04 f7 | 6d 37 8a a4 9b 0b b3 e7 22 8c ca b9 99 a2 ef 47 | df af 33 fd 94 a4 95 ab c9 0d 75 62 b8 13 05 a5 | 03 c9 74 d6 f5 9e 6f a1 90 65 6c b2 72 e9 df f5 | 5d 19 cb 15 48 a4 79 d7 52 7c ec ab 28 6e 6d 0a | 29 00 00 24 28 83 19 a9 be e7 a3 f6 92 20 74 48 | e6 d2 29 74 96 b0 77 d3 bd 1e ee 26 dd 0d 67 63 | ff bc dc bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 3a ff 41 6e c5 dd cc 76 37 c9 88 | fe 40 cf a9 30 61 ac fb 00 00 00 1c 00 00 40 05 | e2 5c 52 8d c8 02 86 2e 47 16 0b 04 4f 16 65 56 | c3 38 ce 94 | libevent_free: release ptr-libevent@0x7fb3700300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a67330 | #236 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f c5 63 73 3b b2 d7 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #236 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #236 | rejected packet: | 4f c5 63 73 3b b2 d7 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #236: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #210 | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #210 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #210 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49621.059493; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.007554 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a67330 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #210 | libevent_malloc: new ptr-libevent@0x7fb3700300e0 size 128 "road-eastnet-nonat-210" #210: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #210) | aa f0 6c 1e 8f b0 d8 5f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 2f d8 9e b6 32 84 b3 62 ee 33 24 ed 0e fd d4 | fb 0e fa b0 5a fb 4d c1 44 66 ed 6c d9 22 6b 05 | 5a 31 76 75 51 2d 58 63 68 30 79 28 a1 8c f7 58 | 78 1f ed 9b 41 29 7f de 5e 35 7e 32 cc 4f eb 97 | f3 d2 34 17 b1 d4 d0 fd f0 52 da 3a 73 a4 1f 58 | 68 7e 43 79 1c f9 07 46 32 fb 81 59 a1 8b 36 99 | 63 59 69 2b 65 b6 49 f0 2c 89 5f 6f 77 04 35 7e | de cb d9 d5 71 0b 78 b5 5b 65 ab a6 ce 91 19 fa | 51 58 77 c1 4e 94 ff 17 29 dc 29 f8 bd 1c c5 36 | 82 f3 20 0b 04 da 30 59 b0 d1 05 3e 3f aa ef 6a | 84 97 f2 ea a5 27 2e 15 1e f4 66 a5 d9 21 ce 67 | e8 bd 44 de 20 df 28 17 c9 3c 33 10 eb 28 78 7e | 45 57 17 c5 4c aa eb a9 d1 47 13 10 17 f0 99 19 | db 6b d3 97 fa 92 c7 c8 43 99 f3 77 fc f5 56 ad | 75 cc 5d 24 35 8b 29 95 64 a0 e4 4c e0 27 1c 2a | fb fd b3 6d 87 9d 4a e7 f3 e4 fa 49 6c 90 9e db | 29 00 00 24 b7 0e 02 eb 9f 32 9f 45 44 47 90 9f | 97 de 23 e8 e1 c4 97 88 69 d1 3d 46 ce 63 23 0a | 5b 61 d3 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 f2 e2 75 79 7b 92 3c e8 e4 c1 f3 | d5 ae c0 9c c7 8c de 57 00 00 00 1c 00 00 40 05 | a7 24 70 f0 1a 13 21 fc 21 f0 f5 1e 72 fd 1a 35 | c3 6c 26 99 | libevent_free: release ptr-libevent@0x7fb36402a780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #210 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | aa f0 6c 1e 8f b0 d8 5f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #210 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #210 | rejected packet: | aa f0 6c 1e 8f b0 d8 5f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #210: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a67370 | handling event EVENT_RETRANSMIT for parent state #163 | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #163 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #163 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49621.075839; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007296 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #163 | libevent_malloc: new ptr-libevent@0x7fb36402a780 size 128 "road-eastnet-nonat-163" #163: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #163) | b1 c1 5c f9 4d 0c 91 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 d1 ee ef 57 4d b8 a5 18 99 63 b7 ad a0 31 43 | d2 4c 84 95 c1 56 d8 c2 a0 e0 21 45 55 6c 89 41 | 0a ee 26 bb ae 9b 55 18 51 40 94 3e b5 e8 52 b3 | f5 21 f9 c6 39 17 43 69 05 cf af ff e3 2c 05 76 | 7f cc d0 9f 70 3b df 95 16 de 0c 79 98 56 e5 a0 | 35 3e 81 89 f8 f4 57 f4 b0 38 84 5c 5c 95 c5 75 | db 5d ff 22 a3 04 68 2a 25 a8 ca 43 e9 88 c1 c7 | f1 52 93 65 ec 22 3d 52 6b b8 00 65 57 c2 e3 a8 | 9e 23 a1 b2 55 fc 9b 13 25 aa af 20 21 98 a7 a2 | 67 94 3b 2e 91 84 12 14 99 be b3 af 12 1e 8a 45 | f6 79 09 3e 9e e8 3f fa a3 e8 99 22 6f d9 b8 e7 | 13 bd 62 da a2 36 db a1 c0 b9 40 6d 4f e4 fd e0 | be a7 dc c7 36 bf 14 ea 84 eb 4f 8e 85 9d 9c de | 91 8b 80 a4 7b dc e6 20 7f bc ce 40 33 ff 25 de | 32 53 56 b7 10 56 66 76 3f 7a e3 c4 c5 0e a7 df | 21 e3 47 1d 5c 2e 41 54 d0 87 c6 c9 9f 14 d5 5a | 29 00 00 24 cf 96 ac 26 a7 c4 21 b6 9b dc fc 7a | 6b 63 82 8c ca 2e ba 40 54 d7 a8 1f 94 42 b0 f9 | 02 a1 4a 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 05 f9 8b c8 3a 1a ac 16 65 f3 b7 | 0f 08 b9 7b 40 ca e7 92 00 00 00 1c 00 00 40 05 | 34 4b bc c5 91 2d b9 5e a5 87 8c 3c 9e 2e e2 11 | d1 e0 38 4e | libevent_free: release ptr-libevent@0x7fb3600407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a67370 | #163 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 c1 5c f9 4d 0c 91 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #163 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #163 | rejected packet: | b1 c1 5c f9 4d 0c 91 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #163: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0802 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a82ac0 | handling event EVENT_RETRANSMIT for parent state #228 | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #228 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #228 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49621.077205; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002847 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afd040 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #228 | libevent_malloc: new ptr-libevent@0x7fb3600407f0 size 128 "road-eastnet-nonat-228" #228: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #228) | d5 f0 72 59 9f 13 94 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 4d 11 72 16 86 29 05 39 41 97 2f ff 33 6b a3 | e2 5f 51 ee 71 23 04 d6 72 0c fb dd 15 ef 6d c8 | 1d b7 c6 17 96 9b 3b 82 3f 74 55 80 22 53 76 ea | 2b 12 aa ae d8 aa 3b e7 03 c1 8e 79 97 e5 92 eb | b7 6d 0d a0 78 62 d0 f2 27 fb a0 42 72 ed d8 cd | 0b b4 e6 0c 99 75 b7 07 dd f8 fc 47 fd 38 1d bf | fc 96 ec 5d d0 ea 7b a2 99 77 8a 86 42 74 89 83 | 1d d8 30 c9 41 1c 6d 04 55 5a e4 6a 7f a2 48 37 | 02 c7 31 e3 a7 ef f2 c3 5f 9e 83 8d 0c 35 c9 0e | e5 2e 96 42 63 e4 ee 14 f2 43 a8 13 d6 19 12 1c | 71 11 80 4d 71 0f 19 3b 63 b8 05 30 82 8b 88 80 | bc 55 78 f9 8c 98 4b c3 03 95 ca f9 2f 2c ae 8f | 75 58 72 ba 8e 10 73 eb 12 6f 65 4a c0 7e 83 a9 | 2f 5f f5 39 44 b0 f3 71 90 fa 59 65 c5 77 f4 ce | b1 2f 6d f7 a7 ee d0 bc fc b5 7f 3e 18 f7 e0 77 | 4c 26 72 38 ff 07 80 23 0f 43 31 54 b4 87 d0 e8 | 29 00 00 24 53 c7 ad d5 ed 06 63 64 b1 b9 04 17 | 96 5d 45 22 6a eb a8 60 3b 32 23 a5 f3 37 e3 7f | 1e aa 66 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 e7 5c 74 6b 3c 37 c1 41 0f fa b6 | 88 19 1c 11 1d 3e 7c 16 00 00 00 1c 00 00 40 05 | e2 48 33 be 38 78 72 f6 d1 00 6b 61 a1 72 02 86 | 37 c7 48 ae | libevent_free: release ptr-libevent@0x7fb3780251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a82ac0 | #228 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 f0 72 59 9f 13 94 bf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #228 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #228 | rejected packet: | d5 f0 72 59 9f 13 94 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #228: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd40 | handling event EVENT_RETRANSMIT for parent state #53 | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #53 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #53 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49621.080502; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005438 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a82ac0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #53 | libevent_malloc: new ptr-libevent@0x7fb3780251c0 size 128 "road-eastnet-nonat-53" #53: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #53) | 22 bd 87 7d 85 b9 18 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 30 f1 21 57 e7 a6 a0 b1 5a 51 b3 c9 69 4a 15 | 0c ef ee d8 55 97 13 32 e2 cf 8d c8 f3 74 4c 97 | 22 ad ca ab 81 a4 a0 26 9d e6 3b e7 1c 2b d2 a1 | d6 72 47 dd ab 72 ec c1 cc d7 d9 8f d8 66 bc e6 | 53 77 a5 12 d5 84 8f 13 60 d3 99 01 c2 30 50 56 | 18 a7 45 bc dd f7 11 3f 14 e8 e1 27 67 4e d9 50 | bb c0 6c 1a d8 e9 1e 81 c4 fa a9 14 22 9d 32 b4 | e1 11 67 1b f4 56 6f d3 5b 27 83 19 34 08 ee 9b | f3 6b 24 bb c8 a8 09 ee 97 89 49 a0 fb 47 38 93 | ca a8 21 f6 da 4a ff ce b8 5a 83 17 3c fa b5 a4 | 1d 50 f4 b9 26 78 5e a6 78 30 f6 80 a4 cd 3e ae | ea 19 26 25 27 2f a8 b0 bc e9 8e dc 47 51 61 79 | 07 e7 6e 1f 82 d0 fe 19 b0 44 4b f8 92 c9 fb 82 | 83 56 b0 37 a7 92 bf 23 17 cb fb 8b 75 11 c5 e0 | 1d 95 a6 1f 6a 1b 78 a9 5c 16 4e 89 74 ff c7 5a | 43 0f 1f 26 45 20 46 36 e0 37 07 46 11 e2 7c fd | 29 00 00 24 1d d0 6e d2 14 3b 95 3d 7a f3 16 f0 | 13 a4 5c 97 24 08 af 2b 29 b2 1a e1 3b dc 59 4d | 62 47 73 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 de d2 d7 2b e1 3c 0c 4b a2 6a 97 | 5e 9e de 30 79 3d d7 e0 00 00 00 1c 00 00 40 05 | de 44 b7 78 c2 27 43 2d 86 e9 13 34 57 72 8f 74 | 48 51 21 6e | libevent_free: release ptr-libevent@0x7fb384032b00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd40 | #53 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 22 bd 87 7d 85 b9 18 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #53 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #53 | rejected packet: | 22 bd 87 7d 85 b9 18 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #53: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-245" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-245' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #245 at 0x557d46b22600 | State DB: adding IKEv2 state #245 in UNDEFINED | pstats #245 ikev2.ike started | Message ID: init #245: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #245: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #245; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-245" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-245" IKE SA #245 "road-eastnet-nonat-245" "road-eastnet-nonat-245" #245: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-245 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-245": constructed local IKE proposals for road-eastnet-nonat-245 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 245 for state #245 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9dd40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #245 | libevent_malloc: new ptr-libevent@0x7fb384032b00 size 128 | #245 spent 0.156 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-245" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.239 milliseconds in whack | crypto helper 10 resuming | crypto helper 10 starting work-order 245 for state #245 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 245 | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 245 time elapsed 0.001048 seconds | (#245) spent 1.01 milliseconds in crypto helper computing work-order 245: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 245 for state #245 to event queue | scheduling resume sending helper answer for #245 | libevent_malloc: new ptr-libevent@0x7fb37c04b7c0 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #245 | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 245 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #245 | **emit ISAKMP Message: | initiator cookie: | 15 95 fb a9 f3 2d 54 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-245 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fc 07 75 44 62 b4 90 36 f0 1f 9d c1 5d 1b f7 db | ikev2 g^x 07 17 dd 42 63 05 02 d3 cf 19 39 61 be b0 c7 13 | ikev2 g^x b1 14 a4 a5 b8 a1 23 ab 35 be c3 4c de 16 3f 73 | ikev2 g^x 4f a1 df 22 33 3b cb 49 9e 26 36 44 30 39 b1 65 | ikev2 g^x 42 b6 93 29 4a f4 de 14 94 ba c8 61 f8 84 44 5d | ikev2 g^x 84 ad c9 32 19 82 79 9b 9b e9 75 42 04 bf 32 59 | ikev2 g^x 46 4e b6 9b ee 27 62 a3 18 81 ea 6a 95 c0 2b da | ikev2 g^x f4 8a 3a 0c 58 60 40 77 5e 77 85 02 1a 93 66 69 | ikev2 g^x 9d df f5 b9 a5 ac 45 4a 0d c0 94 39 1f d8 c9 eb | ikev2 g^x f6 d6 d7 0e d5 20 a4 de 35 3e cb b1 5a 3e 07 b8 | ikev2 g^x 15 10 06 8b 76 b5 1a ee 6d 90 d8 56 e7 da d7 5c | ikev2 g^x f6 12 4e f3 18 b2 7d 97 43 2c 6c d6 56 7e a8 7d | ikev2 g^x 7a cc 89 83 61 47 f5 78 b4 bb 7a cf 96 f5 41 2c | ikev2 g^x bd 99 b7 5f 2f 94 22 34 ed af 72 69 47 9d b0 d6 | ikev2 g^x ba d6 46 d7 20 70 b9 2b 04 c8 60 1d 2d 34 a0 00 | ikev2 g^x f0 50 7a 8d 2d 98 72 24 0c bf 1e e2 f2 65 16 ca | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 78 20 60 94 4c f0 10 8a 14 01 4a 36 9d 71 3a 32 | IKEv2 nonce dc 84 92 f3 9e ca b0 c6 c6 47 0c 0e 5c 4a 16 1a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 15 95 fb a9 f3 2d 54 44 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f5 | natd_hash: port= 01 f4 | natd_hash: hash= 13 94 6f 42 13 dc 75 9d 65 6a 04 f1 12 0b d5 9b | natd_hash: hash= e2 af 9f 6d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 13 94 6f 42 13 dc 75 9d 65 6a 04 f1 12 0b d5 9b | Notify data e2 af 9f 6d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 15 95 fb a9 f3 2d 54 44 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= dd ae 8a 7b 09 c8 82 03 b9 81 1c f4 27 30 35 7a | natd_hash: hash= 2b 8b 29 2f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dd ae 8a 7b 09 c8 82 03 b9 81 1c f4 27 30 35 7a | Notify data 2b 8b 29 2f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #245 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #245: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #245 to 4294967295 after switching state | Message ID: IKE #245 skipping update_recv as MD is fake | Message ID: sent #245 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-245" #245: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.245:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #245) | 15 95 fb a9 f3 2d 54 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 07 75 44 62 b4 90 36 f0 1f 9d c1 5d 1b f7 db | 07 17 dd 42 63 05 02 d3 cf 19 39 61 be b0 c7 13 | b1 14 a4 a5 b8 a1 23 ab 35 be c3 4c de 16 3f 73 | 4f a1 df 22 33 3b cb 49 9e 26 36 44 30 39 b1 65 | 42 b6 93 29 4a f4 de 14 94 ba c8 61 f8 84 44 5d | 84 ad c9 32 19 82 79 9b 9b e9 75 42 04 bf 32 59 | 46 4e b6 9b ee 27 62 a3 18 81 ea 6a 95 c0 2b da | f4 8a 3a 0c 58 60 40 77 5e 77 85 02 1a 93 66 69 | 9d df f5 b9 a5 ac 45 4a 0d c0 94 39 1f d8 c9 eb | f6 d6 d7 0e d5 20 a4 de 35 3e cb b1 5a 3e 07 b8 | 15 10 06 8b 76 b5 1a ee 6d 90 d8 56 e7 da d7 5c | f6 12 4e f3 18 b2 7d 97 43 2c 6c d6 56 7e a8 7d | 7a cc 89 83 61 47 f5 78 b4 bb 7a cf 96 f5 41 2c | bd 99 b7 5f 2f 94 22 34 ed af 72 69 47 9d b0 d6 | ba d6 46 d7 20 70 b9 2b 04 c8 60 1d 2d 34 a0 00 | f0 50 7a 8d 2d 98 72 24 0c bf 1e e2 f2 65 16 ca | 29 00 00 24 78 20 60 94 4c f0 10 8a 14 01 4a 36 | 9d 71 3a 32 dc 84 92 f3 9e ca b0 c6 c6 47 0c 0e | 5c 4a 16 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 94 6f 42 13 dc 75 9d 65 6a 04 f1 | 12 0b d5 9b e2 af 9f 6d 00 00 00 1c 00 00 40 05 | dd ae 8a 7b 09 c8 82 03 b9 81 1c f4 27 30 35 7a | 2b 8b 29 2f | state #245 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb384032b00 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9dd40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #245 | libevent_malloc: new ptr-libevent@0x7fb384032b00 size 128 | #245 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49621.095404 | resume sending helper answer for #245 suppresed complete_v2_state_transition() and stole MD | #245 spent 0.483 milliseconds in resume sending helper answer | stop processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c04b7c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 95 fb a9 f3 2d 54 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #245 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #245 | rejected packet: | 15 95 fb a9 f3 2d 54 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #245: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #164 | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #164 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #164 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49621.138849; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007312 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a67370 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #164 | libevent_malloc: new ptr-libevent@0x7fb37c04b7c0 size 128 "road-eastnet-nonat-164" #164: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #164) | 44 ec da ac e4 4e 81 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 94 19 dd 63 76 e7 8b e4 83 63 43 89 b2 25 2d | cf 02 f9 4f bb e0 9f 71 73 45 f7 70 9f f0 9c 56 | 36 6b be c1 42 fc 0e 64 e7 c2 6d 24 a0 c6 36 60 | f7 b6 44 63 1f f0 38 ff c1 f7 6f 09 6f 4b 15 6f | 4b a9 13 86 3c 04 b4 e0 2d 41 b8 5f 44 ac d3 1c | 62 7f f8 b0 79 c8 65 ec 61 21 a8 52 27 b3 79 db | 53 67 7e 4f 89 b2 45 b9 ee 3a 63 76 a6 cd 73 36 | 58 41 37 8e 8c 8a ef d6 60 54 ff 74 54 a2 07 6a | 56 54 10 22 af 8e 9e 38 af 48 a8 f2 42 f1 a6 05 | c8 55 0c 92 44 27 a3 4d be a5 b4 50 92 f3 bb 45 | b6 87 15 6c 92 a5 f1 21 ba 44 19 05 5c 4c f2 dd | 7d 64 1c 49 e3 61 8b 21 2c ef 63 14 91 93 e6 e8 | 84 82 9f 30 40 50 49 82 eb b8 19 d0 b6 4a c4 be | 05 18 e6 9d 08 3f bb c7 7a 98 44 e5 42 f9 eb fa | fc 80 53 22 fc 7c b9 e3 92 39 dd 88 61 10 2d 74 | 06 8e 96 3a 48 45 58 41 40 85 53 83 03 19 1d 49 | 29 00 00 24 e5 04 5f 5d b9 93 eb b6 f3 88 8f 81 | b6 50 c2 5a e0 91 27 94 ef 3b 1e 82 c9 33 1d 99 | 72 cc f9 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 cd 86 69 c3 fa 02 39 bf fc f5 08 | 1b bd f9 dc 60 39 91 12 00 00 00 1c 00 00 40 05 | 76 11 49 93 b0 52 97 cc bc 0b 84 d2 15 33 08 b4 | 9a f9 d3 5b | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #164 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ec da ac e4 4e 81 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #164 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #164 | rejected packet: | 44 ec da ac e4 4e 81 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #164: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0674 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c00d120 | handling event EVENT_RETRANSMIT for parent state #242 | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #242 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #242 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49621.143203; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500765 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #242 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 "road-eastnet-nonat-242" #242: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #242) | bb 4d 15 84 4a d1 63 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be b8 bd 73 36 69 de db bd 2c 4d 3f 4c ae 08 43 | b3 f3 d7 53 b9 34 af 4a b1 04 e1 e2 27 f6 b2 b1 | 3e 96 98 76 a6 00 83 11 2e 07 de 5b 47 a6 5a a5 | 8f 0c 87 f8 e6 f5 c8 d5 f0 ce bf 70 a9 e4 7d f9 | c0 99 10 3b ec 9c 30 58 7b 73 32 96 65 b5 9d 37 | 48 ba 52 b0 1b 39 cd 58 16 bc 06 a4 25 89 da 22 | ca c6 85 48 e1 fd 54 81 b4 f6 46 e3 a3 cc 04 fd | ed 22 5b c4 4b c5 12 3d 87 53 9d f3 99 49 26 6d | e0 15 46 62 13 40 fa fc 54 c0 0d bd 54 60 26 93 | aa dc 01 46 3c 92 65 7b 4e 15 bf 35 9f 0d 1e ef | 63 43 fe c2 e1 31 5d 4e e4 23 fe ab 39 17 60 89 | ab b5 9b 1d 6d ed 49 c1 f4 3e 50 67 a1 09 05 d9 | c3 d6 c1 46 1e 9a db 86 ae f2 48 84 9e 9d 6d f5 | 1a 55 ad e2 9f 23 3f a2 29 49 4a 81 a2 25 2b 78 | b3 0b 2d 2a ec 81 b7 72 6f 93 e3 8b ce 4c b6 e9 | 10 ec a2 f6 93 c8 51 54 e2 4d 42 c5 bb 12 0b c1 | 29 00 00 24 43 16 25 02 5f 89 fd c4 95 04 8f 29 | f5 97 17 77 c9 2f ab bf 71 ef e8 74 04 bd c8 92 | df d9 0b 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 dc d6 bb 84 20 bd 3d 97 6d a1 71 | 60 d0 7a 61 e2 12 2c 58 00 00 00 1c 00 00 40 05 | 6c 10 68 84 3a c9 9c f7 49 94 4f 1d 42 c4 e8 ff | 34 65 7d fa | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c00d120 | #242 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 4d 15 84 4a d1 63 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #242 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #242 | rejected packet: | bb 4d 15 84 4a d1 63 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #242: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e7260 | handling event EVENT_RETRANSMIT for parent state #237 | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #237 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #237 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49621.148617; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002994 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #237 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 "road-eastnet-nonat-237" #237: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #237) | 4f 30 a3 80 9f 9f 65 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 80 47 96 1c c9 51 f1 0b e5 85 bc ba 8d d8 2f | 7e 2e aa 44 d1 4d 1c a5 32 20 f2 ef d0 59 1d c7 | a5 77 ca 5e 02 89 87 a6 bb c0 e0 54 5b b5 84 79 | 29 9f bb 42 c6 20 c7 56 ce cc 84 c6 1e c1 d2 f4 | 13 76 c9 2e e4 05 e9 37 e6 bd 6f 35 dc f2 cd db | 35 16 6c ad 20 92 a2 8f 48 33 b4 20 26 8f 59 2d | 4c d4 d1 24 86 23 46 ee 6e c6 b6 24 d5 4f 00 17 | 52 61 b1 bb 85 d2 0d d3 70 1d c1 d8 3c 26 6e b6 | 77 3b f1 af 93 e8 cc 5f cb 1e 13 01 93 4d 4b b3 | 72 06 cc a6 aa 05 5c 87 d3 9f 0b a2 d6 36 1e 41 | 74 1d 84 0c 84 17 40 09 ae 80 b1 14 f6 05 f4 d7 | 5d 5f bd 62 54 0a 41 03 07 59 f0 77 45 28 e1 78 | 15 ba 85 f9 68 5c c5 ec 72 3c 38 3b 02 ac c0 42 | c6 0b db 17 1d c8 55 9c ae 19 48 78 01 ba db 02 | d5 a9 df ad 4f 67 c1 5c 0b ad 91 db 71 af d7 d7 | 81 9f c3 2e 7e 4d 1a 85 96 12 81 67 a7 1b 56 fa | 29 00 00 24 e8 e3 42 9e a6 0b 6b 38 33 d4 39 b2 | ba a4 24 74 62 c1 99 66 60 77 d8 65 6c a2 d4 f2 | 70 50 e9 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 8a 35 95 f7 6d e2 2a d4 81 0f d3 | 67 1d 3d 86 23 6d 84 2e 00 00 00 1c 00 00 40 05 | 36 30 d8 35 65 36 0c cb 2b 9c c9 7a 14 59 39 58 | c5 b8 4c 54 | libevent_free: release ptr-libevent@0x7fb380048a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e7260 | #237 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 30 a3 80 9f 9f 65 f0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #237 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #237 | rejected packet: | 4f 30 a3 80 9f 9f 65 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #237: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a70b50 | handling event EVENT_RETRANSMIT for parent state #54 | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #54 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #54 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49621.160954; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006822 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a16db0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #54 | libevent_malloc: new ptr-libevent@0x7fb380048a80 size 128 "road-eastnet-nonat-54" #54: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #54) | 4e 45 bc 88 5c 41 98 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 f4 91 14 5c ab 2e e9 80 6d af 62 f3 7d f3 c8 | 41 66 e7 43 38 9a c7 1b 1e f8 8c 7d f7 db 12 65 | 59 fd 3d ea 2d 58 b5 eb bc 29 cf 89 c5 08 e0 32 | af 71 20 82 0f be ca 31 6c 17 02 ca 88 1d 08 2b | 41 de be 4f db b6 e0 c9 ce b8 f5 78 72 16 5b d3 | af b2 62 71 28 3f 0e a5 9b 79 4c c6 6b 64 ea 6c | 30 86 90 45 62 e9 86 e5 b2 f0 de b0 25 c7 2c 5e | 72 55 be b3 8f b3 05 2b 3b 6d 68 2a 44 c2 cc ec | 6b 1d 92 df 89 1a 9d f7 c1 18 8f 4d 34 ce b2 72 | dc 24 61 bd 37 65 28 f1 26 42 c6 a1 48 90 50 40 | 60 3f 78 ce 04 9c 3d ba 18 4e dd 4c d6 82 6e 51 | 67 48 49 62 37 f2 ed 52 4d b8 26 ec b0 85 3e 94 | ba a6 36 bb c9 80 6e e3 33 72 02 87 28 51 f7 0e | b2 b1 8f 9a df 7c ac 13 32 02 9e b4 45 75 85 e3 | 86 3b 1f 81 8b 2b 4d 2b b9 af 80 14 c8 c0 37 3b | 75 10 32 13 c6 74 a7 41 62 92 b3 87 9f e2 ed 2a | 29 00 00 24 f9 a0 5c 35 4a 9e bd 0e 0d 94 7a f9 | 8f b8 01 dd 15 88 70 42 78 10 83 16 a2 ba 62 6b | bf 0e 5b 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b f1 3a 2c 8b e8 c9 68 86 e1 0f be | 41 4d 1c 16 cf d5 b6 01 00 00 00 1c 00 00 40 05 | 84 fa 3c 0d 93 21 b5 34 8e ca ca 4a 93 ec 16 d0 | 28 a4 5e 28 | libevent_free: release ptr-libevent@0x7fb35001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b50 | #54 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e 45 bc 88 5c 41 98 f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #54 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #54 | rejected packet: | 4e 45 bc 88 5c 41 98 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #54: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0666 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a86b80 | handling event EVENT_RETRANSMIT for parent state #211 | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #211 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #211 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49621.185328; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00959 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b50 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #211 | libevent_malloc: new ptr-libevent@0x7fb35001d920 size 128 "road-eastnet-nonat-211" #211: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #211) | 53 9a 08 81 c1 f5 e1 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef 09 3e 48 73 4c 9b c2 57 71 c3 fe a1 82 75 e5 | f2 fc 00 52 66 b2 69 a1 98 d7 a1 43 e2 9d 75 cc | 9d b4 06 fc 88 d6 44 63 90 41 43 c2 45 55 dc 1a | 12 ee 32 35 ef 1c ea 74 ac df 20 43 5d 1c 90 c2 | e0 80 56 a4 79 bd f8 c0 a8 96 3b 25 fa 43 51 16 | 7e ae 16 08 0c ee 53 be c7 29 52 25 44 6d fa 34 | 69 9f 31 ba 70 30 84 e6 d5 99 f5 2e ee 13 fd e4 | 65 1c ef 89 6e 83 29 44 bd 4f 23 ac ed 0f c3 ea | db 20 3d 79 09 22 a5 94 a4 f8 6d ce bf 13 df 61 | d3 3f 02 e7 af bb ce de f0 b1 2a fb 97 3e 5d 05 | 56 5c 13 18 20 58 3e 43 ac b1 9e 74 31 3c 13 bc | 7c 7a 3a eb be df d5 2e e9 60 5f 5a 7e af 73 b1 | 92 1c d6 e2 be f1 a5 75 8e 08 54 b0 2b e1 2c 5a | 6f 54 93 f5 5b 16 d8 ba 78 77 2e f6 39 16 6f 65 | 5e 98 fb 40 29 ab 34 cf 31 b1 1c 43 74 9c 6b 56 | 46 0a 1c e2 58 fe 1e 51 fc 87 18 4b d7 84 46 cc | 29 00 00 24 ac f5 37 f2 09 3e be 57 f0 76 41 01 | 45 fc a2 49 1d 14 8a 0e 25 fc 49 cd 6b 6f 69 01 | e7 4f 36 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 6c d6 1b 30 f3 11 7c 9a 75 f0 de | fa 6c c9 cc a4 62 9e ac 00 00 00 1c 00 00 40 05 | 73 92 bd e7 98 2e a4 8f a5 8d 6a 24 e0 26 ee e5 | ed 8e de 68 | libevent_free: release ptr-libevent@0x7fb38801abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a86b80 | #211 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 9a 08 81 c1 f5 e1 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #211 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #211 | rejected packet: | 53 9a 08 81 c1 f5 e1 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #211: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aeb540 | handling event EVENT_RETRANSMIT for parent state #229 | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #229 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #229 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49621.197665; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.006761 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a86b80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #229 | libevent_malloc: new ptr-libevent@0x7fb38801abe0 size 128 "road-eastnet-nonat-229" #229: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #229) | 20 97 6e 08 83 53 46 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 59 ef 6c f0 3c e5 e0 cc 33 49 bc 05 30 a4 2e 63 | 40 b9 24 1d 30 3f 19 68 ce 4b ca f6 ef 1a a6 a9 | 5d 39 1c 86 c0 9f ab 47 fc 91 e7 41 3f 1d 89 da | 32 34 23 b2 92 45 82 aa b6 a2 b3 81 08 5d d4 d6 | 1a c6 db 13 96 83 8f db 02 0b e9 7b b2 14 62 aa | e1 68 37 82 79 1d ad b1 57 7f 25 a7 73 b7 37 87 | 5f 18 8b b1 9d a8 83 da d0 1c d4 ab 43 2e 39 e8 | 66 1a a5 36 6d 58 db 88 48 18 f4 d1 6a aa ea a2 | d4 61 12 6e 9d 66 34 26 cc 34 20 9e ee d3 7c 0e | b5 c3 c0 49 b9 a1 7d aa 84 e0 16 0d 30 3d 39 8b | 45 8b ca 2d 9a b8 31 03 33 bc e7 3c 1d 38 7b ad | c5 f3 f6 f7 be e9 2c 8c 87 60 cc eb a3 f8 ab f2 | a1 ec 16 ca f8 6c 96 69 77 3b 56 28 d0 57 05 dd | fa 6d 9c 0b 58 57 29 b7 d8 9e 77 ff a1 d9 ae 60 | 7b 96 73 6a b9 b8 7b 60 c3 f5 35 8e 8a fc 09 4d | 37 4c b1 4a c0 bc c4 90 71 ce a8 9f 0b 83 84 f7 | 29 00 00 24 bf ef 58 c8 50 05 c6 7d 73 f4 dc fa | 25 60 4d 48 2b 2d d1 e6 80 96 87 ef d5 27 62 2c | 4a bf b7 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 5b b6 cd 13 a1 fb 02 f0 d8 20 b7 | ee bd 8b 90 01 a4 d0 34 00 00 00 1c 00 00 40 05 | f3 e5 ac c7 45 89 3a 77 ae 9e aa 53 4d 4c 6f 3c | 03 52 b3 50 | libevent_free: release ptr-libevent@0x7fb36c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aeb540 | #229 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 97 6e 08 83 53 46 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #229 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #229 | rejected packet: | 20 97 6e 08 83 53 46 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #229: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_RETRANSMIT for parent state #165 | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #165 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #165 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49621.203002; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00453 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aeb540 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #165 | libevent_malloc: new ptr-libevent@0x7fb36c01d920 size 128 "road-eastnet-nonat-165" #165: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #165) | 84 89 ec 12 36 85 f6 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 64 07 de ac 8a b1 da f5 cd 1e 8a 72 06 02 07 | b4 71 02 7a d1 b4 70 86 ed 7c e5 04 db 06 11 b0 | 70 66 08 44 59 b7 49 22 d3 ba f4 ee ab fa 59 73 | b1 06 c3 8e 52 a6 3b 08 b7 93 04 a1 45 f3 91 38 | 82 d7 95 0c b3 fe bf fd 60 7f 15 7a b2 c9 6e 96 | 31 f3 92 9f 9b d4 51 14 46 6d a7 f8 2c 3c c3 fe | 86 c5 71 52 b8 28 62 77 5e 36 d1 7b 6a db 03 2c | f5 d4 3e 3d 1f 4e cb e7 cf b8 d2 9f e6 10 67 e1 | a3 1a 3a 9b e2 59 8a f3 f7 c0 58 cc fc 02 e0 b1 | da aa 4f e9 d2 86 5e 94 d6 73 96 ea 14 32 c4 4e | 3d c9 38 94 c5 47 af 83 6c ee e9 2a a3 8b e4 12 | f9 91 c1 53 48 67 8c 42 6e c0 7e 45 20 2e 6a a6 | d3 98 3e 6d d1 40 3d 9d 84 9f 54 62 49 b6 f8 67 | 32 fb 70 e2 78 08 b2 de c4 3e 70 08 0b 45 41 d7 | 34 49 14 7d a4 bf 53 d6 45 c5 fb 03 1e ef d6 06 | 6f 22 f9 f9 7c 4f e3 63 ea 02 1e 63 6e 3d 4d 36 | 29 00 00 24 a3 25 18 45 df 55 70 c4 52 41 87 e0 | ac 0c cb c2 e9 c1 36 19 df a3 78 76 61 ca c0 73 | a3 74 0a f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 2e 20 30 11 5b 47 b9 0d c9 d3 63 | b9 57 85 b4 89 e5 03 11 00 00 00 1c 00 00 40 05 | 69 81 91 3b c9 31 0b 05 42 34 36 76 be 6a 34 94 | 71 f5 f0 25 | libevent_free: release ptr-libevent@0x7fb34400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | #165 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 89 ec 12 36 85 f6 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #165 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #165 | rejected packet: | 84 89 ec 12 36 85 f6 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #165: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0d4c0 | handling event EVENT_RETRANSMIT for parent state #238 | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #238 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #238 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49621.224383; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.008621 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #238 | libevent_malloc: new ptr-libevent@0x7fb34400cf80 size 128 "road-eastnet-nonat-238" #238: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #238) | f6 ab 39 cf c5 7d 06 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af d3 7b 83 d9 03 ff 12 c8 97 56 ab b2 14 10 e0 | 48 f1 3b e3 4f 64 7a 9a 9e ba 3d 1c 59 ad a8 95 | bd 51 64 ba be 30 e1 34 45 a4 34 1f 3e df 3f d6 | 86 b0 59 41 db 94 3d 0d e6 62 59 ee 2c dc c0 b6 | 14 1d 3c ee 48 4c 83 08 18 f6 26 a9 cc aa db a7 | 11 c4 2a 15 e2 1f 73 e6 9e 15 53 88 2a 78 32 86 | e7 60 9e db ba 38 76 7a 13 5c c5 ac fd 1c e1 b3 | d9 b0 34 80 53 e2 98 a7 ba 07 c7 e0 29 79 99 fa | 34 4e 3c 41 8c 32 8f 62 7b 0b 06 3e 96 0f e4 ec | 50 ea 8b 72 ce 3c a2 48 3d 50 a6 bf fa b9 6f 49 | 42 35 90 06 bb 42 36 54 c0 36 66 cb e8 62 33 36 | 54 3c 66 18 ff f4 71 a8 dc 58 87 96 fa c3 1b c5 | dd a8 8d cc aa e7 e2 09 78 51 8e a8 fa 1a ff ca | 8e a6 7b eb 75 ad 7d 26 12 45 b0 78 8a db a7 e1 | 91 4e 5d 71 95 e7 03 95 d9 44 14 28 62 b8 ce bc | 33 38 e8 30 35 30 6f c6 da 40 e4 e4 28 6a f5 3c | 29 00 00 24 e9 54 88 95 a6 38 9d 64 f1 e3 1e dc | e9 d3 25 19 54 a9 08 d5 30 10 d0 0d 46 91 20 94 | d2 ec 4b e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 09 df c5 c7 bf ac 94 7a a2 81 0c | 76 04 c4 df 2b 4d 28 f9 00 00 00 1c 00 00 40 05 | 49 c2 83 19 04 1a b6 87 e7 32 12 a0 0a 0c 4f 92 | e7 02 e1 ed | libevent_free: release ptr-libevent@0x7fb34803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | #238 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 ab 39 cf c5 7d 06 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #238 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #238 | rejected packet: | f6 ab 39 cf c5 7d 06 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #238: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0641 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-246" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-246' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #246 at 0x557d46b23bc0 | State DB: adding IKEv2 state #246 in UNDEFINED | pstats #246 ikev2.ike started | Message ID: init #246: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #246: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #246; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-246" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-246" IKE SA #246 "road-eastnet-nonat-246" "road-eastnet-nonat-246" #246: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-246 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-246": constructed local IKE proposals for road-eastnet-nonat-246 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 246 for state #246 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0d4c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #246 | libevent_malloc: new ptr-libevent@0x7fb34803b0b0 size 128 | #246 spent 0.159 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-246" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.236 milliseconds in whack | crypto helper 14 resuming | crypto helper 14 starting work-order 246 for state #246 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 246 | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 246 time elapsed 0.000986 seconds | (#246) spent 0.992 milliseconds in crypto helper computing work-order 246: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 246 for state #246 to event queue | scheduling resume sending helper answer for #246 | libevent_malloc: new ptr-libevent@0x7fb37004b7c0 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #246 | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 246 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #246 | **emit ISAKMP Message: | initiator cookie: | a0 25 29 39 44 0f 25 eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-246 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3d 89 2d 00 d4 20 29 db cd 68 77 f7 b8 f4 ff 24 | ikev2 g^x 1d 5c 36 95 62 d1 6b 2e 7a df 4b 3c 19 93 58 6c | ikev2 g^x ce e3 80 e5 ca a3 cf cd d3 d9 a2 b5 58 7c 6c 24 | ikev2 g^x e1 80 e9 fc d5 84 ae 0d 7e ea e8 9d e7 06 ab 00 | ikev2 g^x 72 40 cb c2 16 e6 8b f6 4d 5d d8 7e 9f 89 2b e1 | ikev2 g^x 0d a8 b1 ac 98 7a 10 80 97 71 ec 1f c2 1c 60 a0 | ikev2 g^x 4a 47 2e 26 d4 f8 3f c5 e0 4a c3 e3 ec a5 f8 3d | ikev2 g^x e3 be 62 c2 d3 a8 de ed 5f db cd 09 f3 df 3a 1b | ikev2 g^x 2f ae d7 5b 61 a7 b7 f8 35 c0 11 77 df e4 3c 50 | ikev2 g^x b9 e3 f0 3f 49 55 b1 46 c2 af 2d 77 f7 83 81 bc | ikev2 g^x 3d 89 16 cb 06 4f 2b 0b 77 6a cd 08 70 dd b2 5e | ikev2 g^x 34 34 1a 43 20 61 50 18 62 59 04 5a 1c 76 f2 1a | ikev2 g^x c5 6a 20 de 8a f0 5f 77 96 4b dc b9 ab a2 15 f3 | ikev2 g^x e6 86 a6 63 09 55 5d af 9f e1 30 a3 28 2a 95 86 | ikev2 g^x 24 6f f2 be f6 80 d7 fc 17 1b db 4c 69 eb f3 36 | ikev2 g^x e3 f0 06 e4 5d c6 62 de 3e 20 88 cc a6 63 59 4c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ac df 8c 0e a5 90 d3 52 1f a2 e9 1c c5 97 45 07 | IKEv2 nonce c2 87 cc 4e 1a 76 e7 94 30 33 9e 66 b7 ac 45 67 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a0 25 29 39 44 0f 25 eb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f6 | natd_hash: port= 01 f4 | natd_hash: hash= ec f9 d9 bf 03 4f f2 a2 1a a6 75 4a e9 f5 fc 17 | natd_hash: hash= 1c 38 34 10 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ec f9 d9 bf 03 4f f2 a2 1a a6 75 4a e9 f5 fc 17 | Notify data 1c 38 34 10 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a0 25 29 39 44 0f 25 eb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= fd 95 24 c3 10 0c 51 95 0e 6e a3 ad 3b a1 a5 1a | natd_hash: hash= 2c 16 a1 31 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fd 95 24 c3 10 0c 51 95 0e 6e a3 ad 3b a1 a5 1a | Notify data 2c 16 a1 31 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #246 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #246: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #246 to 4294967295 after switching state | Message ID: IKE #246 skipping update_recv as MD is fake | Message ID: sent #246 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-246" #246: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.246:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #246) | a0 25 29 39 44 0f 25 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 89 2d 00 d4 20 29 db cd 68 77 f7 b8 f4 ff 24 | 1d 5c 36 95 62 d1 6b 2e 7a df 4b 3c 19 93 58 6c | ce e3 80 e5 ca a3 cf cd d3 d9 a2 b5 58 7c 6c 24 | e1 80 e9 fc d5 84 ae 0d 7e ea e8 9d e7 06 ab 00 | 72 40 cb c2 16 e6 8b f6 4d 5d d8 7e 9f 89 2b e1 | 0d a8 b1 ac 98 7a 10 80 97 71 ec 1f c2 1c 60 a0 | 4a 47 2e 26 d4 f8 3f c5 e0 4a c3 e3 ec a5 f8 3d | e3 be 62 c2 d3 a8 de ed 5f db cd 09 f3 df 3a 1b | 2f ae d7 5b 61 a7 b7 f8 35 c0 11 77 df e4 3c 50 | b9 e3 f0 3f 49 55 b1 46 c2 af 2d 77 f7 83 81 bc | 3d 89 16 cb 06 4f 2b 0b 77 6a cd 08 70 dd b2 5e | 34 34 1a 43 20 61 50 18 62 59 04 5a 1c 76 f2 1a | c5 6a 20 de 8a f0 5f 77 96 4b dc b9 ab a2 15 f3 | e6 86 a6 63 09 55 5d af 9f e1 30 a3 28 2a 95 86 | 24 6f f2 be f6 80 d7 fc 17 1b db 4c 69 eb f3 36 | e3 f0 06 e4 5d c6 62 de 3e 20 88 cc a6 63 59 4c | 29 00 00 24 ac df 8c 0e a5 90 d3 52 1f a2 e9 1c | c5 97 45 07 c2 87 cc 4e 1a 76 e7 94 30 33 9e 66 | b7 ac 45 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec f9 d9 bf 03 4f f2 a2 1a a6 75 4a | e9 f5 fc 17 1c 38 34 10 00 00 00 1c 00 00 40 05 | fd 95 24 c3 10 0c 51 95 0e 6e a3 ad 3b a1 a5 1a | 2c 16 a1 31 | state #246 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34803b0b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0d4c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #246 | libevent_malloc: new ptr-libevent@0x7fb34803b0b0 size 128 | #246 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49621.228235 | resume sending helper answer for #246 suppresed complete_v2_state_transition() and stole MD | #246 spent 0.466 milliseconds in resume sending helper answer | stop processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37004b7c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 25 29 39 44 0f 25 eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #246 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #246 | rejected packet: | a0 25 29 39 44 0f 25 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #246: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3980 | handling event EVENT_RETRANSMIT for parent state #166 | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #166 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #166 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49621.266433; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00452 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469ddbf0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #166 | libevent_malloc: new ptr-libevent@0x7fb37004b7c0 size 128 "road-eastnet-nonat-166" #166: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #166) | d7 12 9c be 9a d9 20 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b c9 02 ed 54 28 bb 69 3a fa da 89 fc 4e 39 8f | a4 d9 5e 2f e7 5a f0 78 e4 4f 3d 81 ef 79 61 1f | a3 10 38 af aa 4b f6 ef 84 82 56 19 cd b4 c3 5b | aa a8 08 49 1f b4 b8 b1 4e cd 8c 0c 86 09 40 1d | 3a ac 4d 85 be 4c 1d e8 f2 bd e7 23 97 c2 da f8 | 65 82 fb 26 55 00 06 12 19 2c fe d3 7b c4 ff 31 | 3f 92 30 47 40 04 59 ba c0 27 99 b0 dd 45 22 cb | 97 1b 7a c0 ab ef 56 9c f3 d7 45 a0 a5 37 a3 b2 | 58 e2 9e 19 5e 81 d9 fa 7b fe 78 35 15 83 01 42 | 24 2c 5a ee 4f 05 09 f4 1d dd c3 06 45 d3 ea 94 | 81 04 37 3a 2a 09 3c 79 d8 7b 16 c9 e4 4e 70 57 | ac 53 d9 f3 76 57 6b 10 ff a1 91 96 c5 09 1d b2 | 37 da 15 c6 76 39 0e 79 8e b4 e3 6b b6 34 b5 ee | 59 40 13 d1 7e a5 f4 50 26 80 c7 4d 2f bd 97 83 | 7b 42 78 41 a6 62 d7 58 6e e8 20 3d f8 07 e4 57 | 49 7e 0c 32 68 81 0c ed 46 bc 7b e3 e1 f5 77 38 | 29 00 00 24 a6 0c 32 e7 5a d1 b5 ca 07 42 9a 49 | 78 63 23 e6 6a be e5 1f b9 dd 49 81 36 5a 86 c7 | 6b 23 86 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 81 0a 2e 3d e5 a2 7d c2 7a 52 36 | 53 f5 16 ff 78 27 b0 06 00 00 00 1c 00 00 40 05 | 82 68 99 97 5e 62 33 7b 33 19 33 98 83 8d 7f b1 | f3 01 32 b7 | libevent_free: release ptr-libevent@0x7fb37003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3980 | #166 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 12 9c be 9a d9 20 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #166 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #166 | rejected packet: | d7 12 9c be 9a d9 20 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #166: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a88140 | handling event EVENT_RETRANSMIT for parent state #230 | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #230 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #230 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49621.272129; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002864 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3980 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #230 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 "road-eastnet-nonat-230" #230: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #230) | 69 22 82 19 d7 c8 c9 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 71 02 af b0 7d 99 80 ca 0a ed d4 9f 12 56 05 | 6a 75 f1 ff 5b 89 24 b2 2d d4 89 b9 fc ea 10 f2 | df 8b 07 6c 92 3c 32 d6 01 3c 1f 7c 77 2b 56 de | 1e a1 3c 62 24 a6 4e 3c 9e 57 23 35 a7 0e 3a c6 | fa 5e 05 ee c7 8d 32 41 ce 29 80 63 51 1d 1e 52 | 10 94 62 f2 6f 5b c8 e5 23 77 b3 5f 63 5e f3 42 | a7 b1 47 2a 85 90 69 04 a8 c1 76 53 9f c5 2d 06 | 66 93 5b f5 d4 f1 c7 6c 23 0b 21 57 da 55 b4 10 | b4 68 7f 72 aa 6f fd bf fc 43 d5 6e 02 91 b0 ea | ca b7 fc 32 ec e5 bd 79 74 66 56 52 a1 e5 b7 e9 | d9 32 42 bc f6 01 cc 69 66 87 01 cd 32 29 bd 73 | ff aa f2 68 30 ae 30 af 09 b3 2b 2d 0b 90 c5 d7 | e7 b1 60 17 46 74 a0 50 98 f9 06 d2 06 37 1f b3 | 0c 89 d8 99 c7 ac a0 2a 5a 19 c6 cc 6e e1 77 ee | 98 e6 45 5b c8 98 8d c9 0d d9 64 39 5b ba a1 36 | 39 81 f2 e5 39 16 cf c0 fa 26 3f 76 ff 4a de 8f | 29 00 00 24 ca 6b 45 b5 ad 3a dc fb 46 3f ff f9 | b7 9e 2a f6 cb 7b a0 93 c0 ff b4 97 10 4e 36 19 | c5 61 7a bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f fa a5 ce 96 35 1e 80 97 f9 81 69 | 6c 9b 29 c3 b6 c2 c3 05 00 00 00 1c 00 00 40 05 | 7e 27 b2 4c db 32 1f 5b c7 5c 32 4b 9f eb 6e df | 20 af 51 69 | libevent_free: release ptr-libevent@0x7fb38001abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a88140 | #230 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 22 82 19 d7 c8 c9 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #230 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #230 | rejected packet: | 69 22 82 19 d7 c8 c9 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #230: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23150 | handling event EVENT_RETRANSMIT for parent state #243 | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #243 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #243 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49621.284462; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.497128 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a88140 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #243 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 "road-eastnet-nonat-243" #243: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #243) | 39 d2 8c 3c d9 9b d0 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 7c 7b 28 d8 43 9d a6 57 48 f3 56 58 a9 96 02 | 89 eb 92 ba df fe 7c b4 93 87 0a 15 04 96 3d d9 | 97 4f ed fb da 47 e0 91 75 a8 ae 92 a4 07 c6 b2 | 54 7e 3f f7 5a ab 2d 86 ec bf b6 60 fc b0 e0 42 | 42 76 7a 8f aa 4f aa 15 dc 06 c4 c5 a6 64 c4 cb | cc bb 4c d4 38 55 bd b1 4e f2 bf cc 48 b4 72 4f | 87 59 b4 0f 7e ed 03 f1 41 ee a8 6e 5e c8 2d 73 | 30 2b 8d ba 0f 00 07 b3 03 3d 8c 71 2e 4d 64 94 | 7c 2a 25 17 eb 7f f4 7c 3d ac 47 e3 e8 64 b3 1d | 93 52 33 b4 60 d2 91 0a df 53 00 a1 04 e7 82 d1 | ba cb 66 13 49 96 51 fe 75 53 10 a1 e8 ed 85 c1 | 24 57 8f 5c 2d ab 6e 1a d8 d2 18 48 42 bf 96 fc | f2 c5 7f a1 3d 7c 8d 10 dd 4d fc 0c 94 ce 13 b9 | f3 c9 49 d3 a2 9b 04 c3 51 ef 2c 4a 1d 70 85 00 | f9 d1 0e 6b 0b 48 a0 fc 89 8f e7 8e 83 74 57 7a | c9 0c 8d f3 c6 50 96 a3 99 76 7c eb ac 17 30 58 | 29 00 00 24 35 b2 35 5f d9 02 63 3b 19 19 86 78 | 0e 3a e9 6c 99 53 dc 00 7c 7f ad 46 fe dc 4c 82 | 97 17 87 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 31 4b 64 ab 4a 78 81 95 90 fa 46 | 73 84 e5 27 1c 47 ef db 00 00 00 1c 00 00 40 05 | 94 bc 64 25 b1 da 5d db 67 02 68 07 a8 c5 47 cd | f9 c3 f5 ed | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23150 | #243 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 39 d2 8c 3c d9 9b d0 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #243 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #243 | rejected packet: | 39 d2 8c 3c d9 9b d0 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #243: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #212 | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #212 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #212 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49621.298857; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006312 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23150 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #212 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 "road-eastnet-nonat-212" #212: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #212) | 94 ac 86 b7 f8 83 d4 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 79 5c 0c 28 90 8c ef 02 3c d8 f8 1a 0b d6 b1 | 04 69 40 2f 72 b0 4d 73 12 19 ce 98 f8 6f 0b 9f | b9 13 67 6a 06 b8 41 b4 12 d3 3b 5e 00 45 d7 98 | a9 e1 2d 0a c7 48 98 e8 4f 26 89 26 1d eb 0f 63 | d1 cd 01 b0 ac c0 e6 9c c4 d5 af f4 d2 0a f8 fc | 50 8b 97 23 e0 8c a0 c2 04 25 1e a8 35 a0 f0 95 | 6e 38 07 0c ab 5c e3 d8 94 8f 44 fe f3 fe 9f 14 | 8e b7 78 55 0b 6e 31 2e c3 a7 48 da be 5b b7 47 | 21 9c c6 d3 74 d7 58 d3 13 78 3e ed 28 44 9b 87 | a8 e3 a1 e6 89 b5 03 ef 3b fe d5 17 e8 f9 73 04 | 1c 9e 5a c3 69 56 f2 c1 24 33 17 fd 7d 0d ed e7 | 7d 2c 20 7c 0b 8e 94 c1 2e c1 1b fa 0b 32 e2 6f | 8a b2 5d b4 79 8d 9a 89 ea a8 6f 97 71 92 fa f9 | bc 34 75 15 ab ea 61 f5 3d 74 25 af 37 7b 97 2f | 19 3e 0a b6 c1 50 67 1c b8 51 37 9b 9a b3 26 67 | c4 f2 b4 e7 06 7e 5d 5b 28 22 1e 8e 7e da b7 8b | 29 00 00 24 5c 64 5d 43 88 c1 08 90 f5 2a 0e 23 | 99 a9 ce 32 1e 4e 34 e5 9c b5 04 95 ad 56 32 fb | 31 cf fd 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 0d b1 e5 c0 7d 3f 73 e9 5f 1b 2c | de e5 07 26 54 11 d9 1b 00 00 00 1c 00 00 40 05 | 08 da df 20 35 aa 7d dd ef ff 4a 4d 21 f5 f2 fb | f9 b4 9f 22 | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #212 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 ac 86 b7 f8 83 d4 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #212 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #212 | rejected packet: | 94 ac 86 b7 f8 83 d4 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #212: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.071 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a72150 | handling event EVENT_RETRANSMIT for parent state #239 | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #239 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #239 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49621.322107; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.019616 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #239 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 "road-eastnet-nonat-239" #239: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #239) | b9 4e df 3e 84 90 25 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea ef 5f 41 79 0b fe 19 84 c3 03 27 cb e7 22 b5 | 4b 8d ad 5a dd 57 ea a0 d4 aa e3 61 84 72 47 6a | 4d 42 f7 0c 18 4a 15 88 92 91 45 67 3d 64 ce a8 | f0 3e 2a 18 f5 33 74 78 5b 6d 2d ad 60 68 a7 2c | 42 44 24 a7 49 23 19 0c fa 8d 52 0c 5c f4 c5 65 | 9c 02 7d 4d 52 90 91 ba 69 4d a0 bb 25 6e ec 3a | e9 30 9b 1f f4 e8 ec d1 8d 6a 8c 3f 41 9e 38 b3 | 41 e7 4e 00 b5 c6 ea 1b 8f 24 c7 a8 c4 ec 84 ef | e4 cf 76 d1 2b eb 8f 91 66 1a d6 b3 71 c5 5b 71 | c2 ce 48 72 d6 b0 0f 07 ef 9a 8e fd 8a 44 8d eb | 79 c7 74 c1 a0 f8 4b 78 8d 62 3e 5a d2 f7 58 20 | ab d5 b3 52 66 2e d1 5e a8 11 59 26 5b 03 c4 c7 | 72 cc b1 7b df 43 62 14 05 c3 52 d4 b9 35 c7 18 | ab d1 fe d6 f2 c4 bf d0 34 85 da 05 d8 1c 9e bd | 53 20 10 e1 51 57 70 e6 78 d1 56 9f cf b4 da 8d | 2c 7b cb 52 64 97 83 25 dd f7 88 42 c4 42 ba 2b | 29 00 00 24 60 20 cc a1 fe 49 9c e3 77 c9 2c 1b | 58 3a e0 e5 74 37 cc 08 7f e8 2c 53 5a 76 29 4f | ad de 78 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 5b b0 88 0f ba 91 5e f1 72 ec fe | c8 60 42 a1 68 5e 5f c0 00 00 00 1c 00 00 40 05 | 4c 5b ce 23 3c 60 29 97 fc d7 dc 03 c2 55 73 9c | d8 91 a1 ef | libevent_free: release ptr-libevent@0x7fb388027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a72150 | #239 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #55 | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #55 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #55 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49621.322295; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007551 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a72150 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #55 | libevent_malloc: new ptr-libevent@0x7fb388027c10 size 128 "road-eastnet-nonat-55" #55: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #55) | 3d db 2e dd 07 aa ba 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e 71 91 32 93 9e d9 77 ef 53 94 b9 d3 5b 34 5a | fe 84 a7 6b 7a 00 f9 5d 90 9e 95 ec 98 7e 50 90 | 6f 0f ae d2 9f 29 ef dd 60 22 99 95 c1 b0 c0 54 | a7 26 de ae fa 13 60 60 4e 33 18 74 d6 1f 83 02 | 06 b2 59 fa 7c 17 46 c9 2a 0a 3f 67 46 5b 6e d7 | 09 8c 97 98 d9 8f c1 fc 1c ec 49 28 fb cb 2a 4f | 78 96 26 a0 14 e4 f8 b2 87 ff f8 94 08 22 94 74 | 80 62 7b 3c 7f 07 b1 d4 49 9b 9c af da 12 43 95 | 22 ed c4 32 82 8f fd 22 2e 14 7f a3 9e 9a 0a 95 | 1c ac 99 95 6e eb ff 73 9e fa c4 9b c2 7f 18 d1 | a6 f5 7d a7 31 3b 50 d9 03 2b 9b 6a 48 7d 39 5a | 55 2b 5f c8 64 07 45 ea 51 98 d9 85 73 51 e2 22 | 6a fe cb 2c f3 b0 0b 08 b0 e7 70 07 6e 79 7c 1c | 6c d7 90 19 69 d2 44 49 0a 0f 6a 33 f1 60 ee 72 | 89 92 e0 5a 96 45 5d c4 8c 2b 42 de 01 b6 de 4f | b8 41 dc e7 4d 6a e5 69 01 12 96 be b3 ca 0c ef | 29 00 00 24 34 26 bc 6d 2a b2 15 83 73 e7 09 34 | 40 d7 8e 8c 63 fe fd 1b d2 38 8c 24 da 45 67 bf | a5 9b 8a 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 45 13 d7 91 8d b2 95 9c 7e b4 17 | 75 e1 5c f2 7c 3c ca 26 00 00 00 1c 00 00 40 05 | d0 0d a6 5e 1b c4 3a dd c0 34 b3 e5 87 cb 47 3a | 73 94 3b 44 | libevent_free: release ptr-libevent@0x7fb358009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | #55 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 4e df 3e 84 90 25 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #239 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #239 | rejected packet: | b9 4e df 3e 84 90 25 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #239: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d db 2e dd 07 aa ba 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #55 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #55 | rejected packet: | 3d db 2e dd 07 aa ba 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #55: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0563 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56e30 | handling event EVENT_RETRANSMIT for parent state #167 | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #167 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #167 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49621.334882; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007623 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #167 | libevent_malloc: new ptr-libevent@0x7fb358009640 size 128 "road-eastnet-nonat-167" #167: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #167) | d1 34 e0 8f fb 7c 13 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 06 19 19 47 f8 53 ed d0 cd 1b 23 74 a8 df 03 3c | 9b a0 ef 95 f1 ce f6 ae 26 37 05 42 40 f8 1b 11 | 25 b6 88 f4 08 21 89 99 64 30 46 35 2b e5 72 51 | 22 12 a5 4d 09 28 30 73 8d 80 f8 3e 6a c2 3d d6 | 8d b5 a5 60 de 1d e9 8e c3 96 be eb 9a e4 82 44 | cd c0 61 18 61 45 71 3d 05 11 06 a9 ca 4e 06 4e | cb 22 e9 93 7b 78 bf 7f 83 42 10 73 45 d5 b3 1b | 92 fd 26 c3 64 99 f5 61 c8 1f 64 c2 09 10 74 12 | fd fe 01 de ac 29 c7 4b 49 1a d9 8d 7a bd 94 f7 | 39 58 38 2e ae 17 b2 73 1d e4 a7 77 fc bf 85 3c | 63 5b 1a 29 48 e8 aa 07 3f e9 82 92 50 e7 72 9f | 9a d8 a5 97 f7 0c 72 e2 e7 b6 cb 0c ff 4e 38 9e | 6d f9 d9 e0 8f df a4 4e 9c de 86 ff 7f 6f 46 07 | 19 30 44 7c c3 76 d0 df 68 7b cd 98 75 c7 57 02 | 52 bd 7f a1 c9 22 2c 83 36 62 ea 42 c7 31 3b 8a | 30 42 3c 51 50 0b 14 55 d5 43 19 16 fa 0b 4c a5 | 29 00 00 24 15 4a d1 bb d8 87 b7 c2 1d 20 84 6d | 4c 8a c4 e7 5d 03 8e 8f 16 37 df e9 c3 77 de 41 | b9 4c a3 ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 52 6d ba 0b 84 f5 59 4b dd eb 25 | 53 bb c6 97 e9 c5 42 9c 00 00 00 1c 00 00 40 05 | f4 8a 9c 13 b7 e1 a4 8b 85 79 9e 14 f1 e3 5c 5f | 69 af 71 4a | libevent_free: release ptr-libevent@0x7fb3680251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56e30 | #167 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d1 34 e0 8f fb 7c 13 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #167 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #167 | rejected packet: | d1 34 e0 8f fb 7c 13 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #167: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-247" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-247' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #247 at 0x557d46b25180 | State DB: adding IKEv2 state #247 in UNDEFINED | pstats #247 ikev2.ike started | Message ID: init #247: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #247: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #247; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-247" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-247" IKE SA #247 "road-eastnet-nonat-247" "road-eastnet-nonat-247" #247: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-247 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-247": constructed local IKE proposals for road-eastnet-nonat-247 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 247 for state #247 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a56e30 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #247 | libevent_malloc: new ptr-libevent@0x7fb3680251c0 size 128 | #247 spent 0.167 milliseconds in ikev2_parent_outI1() | crypto helper 15 resuming | crypto helper 15 starting work-order 247 for state #247 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 247 | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-247" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.281 milliseconds in whack | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 247 time elapsed 0.00101 seconds | (#247) spent 1.01 milliseconds in crypto helper computing work-order 247: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 247 for state #247 to event queue | scheduling resume sending helper answer for #247 | libevent_malloc: new ptr-libevent@0x7fb37404b530 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #247 | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 247 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #247 | **emit ISAKMP Message: | initiator cookie: | 5d 14 02 50 68 e1 05 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-247 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 11 49 8a 2d d4 33 c0 d7 bc cf 08 ab af 13 85 8e | ikev2 g^x 9a 12 a5 cd 3b 66 31 91 51 03 92 de 96 84 44 92 | ikev2 g^x 2f 58 74 2e ab 28 ea 0d 4e f8 e3 ae 21 e6 45 c8 | ikev2 g^x 43 4c d5 50 a9 19 c3 44 67 b2 10 6b 79 6d 94 47 | ikev2 g^x fa 38 4e 33 78 ee e7 d3 9c 31 e4 3a 0a 97 fc f9 | ikev2 g^x af cb 80 37 57 a0 1b c2 09 c2 31 8b fc c7 0b 20 | ikev2 g^x de c6 8f fd b8 6b 84 a5 39 ac f6 54 bc 56 ef 0f | ikev2 g^x 64 4c b3 c3 15 1d ff 22 52 dd 24 dc a2 84 2b db | ikev2 g^x e1 cf 6b 7a 77 75 72 44 46 ba 71 64 0d 1e 05 41 | ikev2 g^x 6b 10 ff 59 ad 5c e4 40 01 51 72 36 a2 b0 08 e3 | ikev2 g^x a6 82 a9 79 20 45 b1 f4 1e 13 22 a0 f1 4f 23 23 | ikev2 g^x 9c e9 d5 77 c7 56 3c 45 ca 5c a9 1c b1 68 03 08 | ikev2 g^x a1 eb f6 b1 e5 5b 6c d6 3f 31 2a ba a0 3e 1f d2 | ikev2 g^x a5 29 ae bf 59 de 0d b4 a3 d2 df a5 98 9f 76 2c | ikev2 g^x 4f cf 7a 3e 6d ac 96 b0 e7 e5 ce f6 05 40 9c 9b | ikev2 g^x 09 66 cd 5d b1 dd cb f0 23 07 ad be 0d 42 b6 2e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ef c2 8a a6 2e c6 51 78 10 63 06 58 ba ed 73 0f | IKEv2 nonce a8 fa 21 72 a3 1c 39 ab 2c 37 74 08 1a c5 f7 c1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5d 14 02 50 68 e1 05 7b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f7 | natd_hash: port= 01 f4 | natd_hash: hash= d9 eb f7 f6 58 75 8d be 43 b7 49 b8 cd 30 58 5c | natd_hash: hash= 95 8f b2 8d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d9 eb f7 f6 58 75 8d be 43 b7 49 b8 cd 30 58 5c | Notify data 95 8f b2 8d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5d 14 02 50 68 e1 05 7b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 15 66 60 c0 d3 3c e7 68 f4 56 38 e9 31 35 3c 02 | natd_hash: hash= ee cd 1d 4a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 15 66 60 c0 d3 3c e7 68 f4 56 38 e9 31 35 3c 02 | Notify data ee cd 1d 4a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #247 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #247: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #247 to 4294967295 after switching state | Message ID: IKE #247 skipping update_recv as MD is fake | Message ID: sent #247 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-247" #247: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.247:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #247) | 5d 14 02 50 68 e1 05 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 49 8a 2d d4 33 c0 d7 bc cf 08 ab af 13 85 8e | 9a 12 a5 cd 3b 66 31 91 51 03 92 de 96 84 44 92 | 2f 58 74 2e ab 28 ea 0d 4e f8 e3 ae 21 e6 45 c8 | 43 4c d5 50 a9 19 c3 44 67 b2 10 6b 79 6d 94 47 | fa 38 4e 33 78 ee e7 d3 9c 31 e4 3a 0a 97 fc f9 | af cb 80 37 57 a0 1b c2 09 c2 31 8b fc c7 0b 20 | de c6 8f fd b8 6b 84 a5 39 ac f6 54 bc 56 ef 0f | 64 4c b3 c3 15 1d ff 22 52 dd 24 dc a2 84 2b db | e1 cf 6b 7a 77 75 72 44 46 ba 71 64 0d 1e 05 41 | 6b 10 ff 59 ad 5c e4 40 01 51 72 36 a2 b0 08 e3 | a6 82 a9 79 20 45 b1 f4 1e 13 22 a0 f1 4f 23 23 | 9c e9 d5 77 c7 56 3c 45 ca 5c a9 1c b1 68 03 08 | a1 eb f6 b1 e5 5b 6c d6 3f 31 2a ba a0 3e 1f d2 | a5 29 ae bf 59 de 0d b4 a3 d2 df a5 98 9f 76 2c | 4f cf 7a 3e 6d ac 96 b0 e7 e5 ce f6 05 40 9c 9b | 09 66 cd 5d b1 dd cb f0 23 07 ad be 0d 42 b6 2e | 29 00 00 24 ef c2 8a a6 2e c6 51 78 10 63 06 58 | ba ed 73 0f a8 fa 21 72 a3 1c 39 ab 2c 37 74 08 | 1a c5 f7 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 eb f7 f6 58 75 8d be 43 b7 49 b8 | cd 30 58 5c 95 8f b2 8d 00 00 00 1c 00 00 40 05 | 15 66 60 c0 d3 3c e7 68 f4 56 38 e9 31 35 3c 02 | ee cd 1d 4a | state #247 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3680251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a56e30 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56e30 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #247 | libevent_malloc: new ptr-libevent@0x7fb3680251c0 size 128 | #247 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49621.353024 | resume sending helper answer for #247 suppresed complete_v2_state_transition() and stole MD | #247 spent 0.486 milliseconds in resume sending helper answer | stop processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37404b530 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d 14 02 50 68 e1 05 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #247 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #247 | rejected packet: | 5d 14 02 50 68 e1 05 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #247: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90400 | handling event EVENT_RETRANSMIT for parent state #231 | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #231 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #231 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49621.380235; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001692 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28af0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #231 | libevent_malloc: new ptr-libevent@0x7fb37404b530 size 128 "road-eastnet-nonat-231" #231: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #231) | ec d8 99 0e 50 36 87 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea c5 d9 ea 48 9d 9d db e4 72 21 b2 eb fe e0 0a | 9b e5 ce 23 20 eb ad 65 b0 89 ca 3d 24 ef 66 7d | d9 a3 7a c2 3d 05 aa 43 9f 45 1a 14 d9 e7 ad 4c | 1c 30 1e e4 db 2e f5 09 08 f0 6c 1f 45 18 25 f3 | 98 35 42 0b 1b fc c0 95 3b d0 88 ca bf 43 11 51 | ba ac ee 62 bc ef 20 2d 09 0b 30 2b b3 a9 30 69 | 22 9f f7 e5 19 cc d8 4a 41 18 b5 2a 03 31 91 4d | d9 f3 33 5c b6 61 8b 80 4c 0b 65 d5 6f 4b 62 d8 | e0 38 d3 a6 32 83 92 b3 ca df 09 07 0d f6 33 d7 | b9 f9 01 8c 3b d1 ff 19 bf 3d d5 72 dd d6 67 1d | 24 a4 3b 88 00 71 46 68 47 66 c6 d8 6d 38 1a ca | 01 20 d4 7a e4 46 1b 52 ab ad 61 81 76 76 13 bf | 76 df 80 04 67 b5 86 86 0e 85 a0 4b 41 5b e3 0b | 3c 1a 51 b5 b4 55 ce 12 56 93 02 32 82 c4 86 69 | a7 eb 80 c4 8e 9a 08 dd 86 61 45 1e 8a 33 7c 03 | 7e 20 42 a9 8c 8c 89 72 43 a6 59 29 92 30 fd 49 | 29 00 00 24 b3 7b 27 54 be 06 93 cc 3c 78 ad 44 | 9e 7e c7 5b aa 5c 64 c5 5c 99 5a 37 63 dc 53 a7 | 33 95 f4 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 2a 24 2a a3 f9 b8 d4 c1 28 f7 1a | f6 32 c3 8a 97 33 de f4 00 00 00 1c 00 00 40 05 | e6 68 a7 21 48 f4 d3 88 6e c3 71 dc ea d3 53 aa | 0b f4 bb 84 | libevent_free: release ptr-libevent@0x7fb3580300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90400 | #231 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec d8 99 0e 50 36 87 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #231 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #231 | rejected packet: | ec d8 99 0e 50 36 87 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #231: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8d60 | handling event EVENT_RETRANSMIT for parent state #240 | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #240 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #240 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49621.394566; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002452 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90400 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #240 | libevent_malloc: new ptr-libevent@0x7fb3580300e0 size 128 "road-eastnet-nonat-240" #240: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #240) | 52 3d c4 7d aa 75 f9 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 b8 f7 97 d2 8e a4 26 e4 de 50 11 3b 27 c2 bf | 82 42 f8 30 a7 cf e7 f1 22 7e 96 6e 08 55 b8 5b | 99 ce ba b9 bc a4 b9 85 84 1c 35 bd 81 0b 36 0d | b0 03 99 1c 13 93 72 39 72 77 b7 23 f3 36 8a 70 | 77 80 87 4b 02 4d f9 86 a0 7e c1 4d a8 f2 4c 39 | d7 80 8b 66 22 e6 a4 de 4b 09 73 0d 3d 7c b2 2f | 50 8d 5f 1f 57 2a bd 9f ac c8 a9 74 90 54 67 b7 | 8f c8 3d 39 71 39 c6 de 18 02 eb c5 ea 94 b8 db | 08 c3 39 15 f9 0b b0 93 02 0a 8a a7 ec 92 53 e4 | 1e 2b 04 08 46 40 50 55 30 ed 5b e2 89 d0 46 9a | af 8e 24 41 aa aa b9 1a e4 ce 8c fe 9d a8 de b8 | f4 9b 8a 9d 2c 1b bf b8 d5 b4 e2 72 19 89 07 85 | 8b d5 73 d5 4b b2 72 a1 17 f2 16 b2 06 c3 69 10 | 03 64 01 f6 2e ee b3 bb 12 bf 7f 2a 4b 56 f5 04 | 51 3d ee 1a 3c 36 62 a8 15 0b 0b b5 26 c4 ba ef | d2 cb 15 c8 7e 83 38 88 e7 bf 96 1b 07 79 a7 4b | 29 00 00 24 eb a6 92 08 8f 76 ab e5 c4 52 e9 41 | 1d 77 03 c7 35 5c e5 3a 95 58 fe 07 d6 1d ad f0 | 56 12 6d d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 c9 c0 38 06 3a 92 7e a1 78 c0 15 | 6c a9 8e 74 3a a1 8f 67 00 00 00 1c 00 00 40 05 | 56 20 31 94 4b 81 36 39 3c f9 b9 11 bf 66 a1 27 | 0d 62 c5 10 | libevent_free: release ptr-libevent@0x7fb370046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8d60 | #240 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b07dc0 | handling event EVENT_RETRANSMIT for parent state #213 | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #213 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #213 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49621.394749; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.014545 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469e7260 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #213 | libevent_malloc: new ptr-libevent@0x7fb370046040 size 128 "road-eastnet-nonat-213" #213: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #213) | 4a f6 d6 f4 f7 c1 a9 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 87 92 0f fd 56 61 cf 88 27 07 68 fb 27 94 14 | ab 6f 99 e6 75 dc 26 2f 1e 93 7a c8 7f ed e5 7d | 6b b9 9d 92 4b e7 28 92 86 1e 95 f5 3a f0 df 50 | 69 19 a3 90 28 b6 f5 2d 21 d9 e8 a3 e1 5b a3 90 | 3f a9 b0 a1 2a 68 b5 63 77 3b aa 0b 6a 92 36 d6 | 32 61 b7 e6 8e cd 51 f2 78 e2 77 58 13 92 00 bb | 90 bd cb b3 98 f4 c1 b4 f9 bd 9c 07 84 cd 8b 44 | 56 64 bd 56 88 30 16 b1 de 15 4b 10 e0 33 82 0c | 53 be e7 f5 bb 24 10 e7 6d a3 b2 a5 08 f8 45 52 | 21 5c 7f a2 a6 ba 7c c6 84 2d 67 10 b4 86 8f 9c | f0 28 12 88 fb c8 52 6a e2 26 a6 a9 6d 8d 51 de | 96 9d d4 31 fb 52 b9 5a 75 dd 19 ef dd 61 8f 1b | 4b 84 99 e3 45 d4 ee 63 d4 75 8b e1 c7 c9 46 a5 | 75 72 66 74 64 ad ff 53 8e cd 6a 8d e1 aa 8b e0 | 68 cf 60 1e 6d 53 aa b5 21 a7 9f 74 3a 51 a3 ac | e3 62 94 51 c3 8c 9b b8 34 1f 9f 73 40 9a 49 cb | 29 00 00 24 b5 56 f5 24 67 7b ee bc b9 fe c7 48 | 4d 15 0a a4 8c 8b d0 3d 4d d5 8d 67 be 58 a4 6d | 51 fe 0b 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 44 29 1f 54 8d f8 98 7c 02 ef 5a | ae 02 c1 10 4c 75 c9 6b 00 00 00 1c 00 00 40 05 | bc 12 92 95 d4 1b f9 ad 5d 6a 71 41 82 c9 bd c2 | 29 69 a1 81 | libevent_free: release ptr-libevent@0x7fb364045e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b07dc0 | #213 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 3d c4 7d aa 75 f9 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #240 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #240 | rejected packet: | 52 3d c4 7d aa 75 f9 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #240: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a f6 d6 f4 f7 c1 a9 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #213 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #213 | rejected packet: | 4a f6 d6 f4 f7 c1 a9 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #213: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0785 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56dd0 | handling event EVENT_RETRANSMIT for parent state #168 | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #168 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #168 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49621.409115; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.012124 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #168 | libevent_malloc: new ptr-libevent@0x7fb364045e60 size 128 "road-eastnet-nonat-168" #168: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #168) | b9 02 4f a9 68 0f a0 fe 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 38 63 d7 fd 7e 45 ef 72 03 13 6e 35 cd 53 26 | dd fc 38 ee df 06 1b 11 d5 c4 09 34 ea 9e 52 e9 | 90 99 59 42 6e 45 cc 92 f7 0d d9 7f 81 1b 1c 4d | 72 ce 0d 51 93 0e f8 d3 b9 70 d1 ad 64 8a 6a e2 | a3 1d 17 ed 1c a1 e4 c2 92 7b 01 e5 0d a5 15 1e | c9 45 f6 10 06 37 94 e2 37 85 e0 bc d4 3b da fb | 39 7d 59 09 ad a9 c4 e3 7a c2 37 5d ed ee 68 e8 | b1 63 07 9f 75 29 29 20 65 07 02 b1 8b 8b 01 b0 | 2b 52 3c a4 c8 5c 27 70 49 1c a9 4a ee d4 27 a2 | d7 44 e4 1a a5 20 37 9f 74 66 e1 72 a9 aa a5 00 | ec 99 a9 b7 19 84 18 49 d0 9b 4f 00 03 95 50 90 | b6 93 61 e2 6b 86 3b a3 1f 9e fe be b9 00 11 4e | d0 ee 6d 6d 92 bc 2a 22 db 5c 6c ba d6 ed 5d 3e | 26 d4 a4 f0 75 e3 70 55 39 8d c3 1c 3c 5e 40 3f | 06 f2 7d 36 24 34 4a 10 84 8b e4 b1 b8 1a 47 88 | b9 e7 73 06 47 d4 d0 41 aa 50 1b af 0e 28 2a e0 | 29 00 00 24 3f 02 e6 1c 86 66 81 19 d2 36 b7 e8 | e6 9a a6 e7 5e 78 b6 e8 13 75 aa 57 3b a6 be 37 | b8 21 ac c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 8a 57 55 a3 9f b5 8e 63 74 0d de | 85 a9 a1 c8 2f d9 1c 61 00 00 00 1c 00 00 40 05 | 7a 31 f7 15 f8 cd 69 10 6a f0 ab d3 a9 c2 c3 c7 | 07 31 9b 08 | libevent_free: release ptr-libevent@0x7fb3680180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56dd0 | #168 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 02 4f a9 68 0f a0 fe | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #168 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #168 | rejected packet: | b9 02 4f a9 68 0f a0 fe 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #168: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0688 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47f10 | handling event EVENT_RETRANSMIT for parent state #56 | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #56 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #56 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49621.412465; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006004 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56dd0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #56 | libevent_malloc: new ptr-libevent@0x7fb3680180b0 size 128 "road-eastnet-nonat-56" #56: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #56) | a2 38 96 b9 83 17 2c 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c 86 44 cb cd d5 e6 ca 09 de cc 09 a4 86 65 dc | 8e 5e 46 71 c3 c7 a8 ed be 75 06 f3 62 76 ba da | ce e9 f2 5f 5c 9e e4 0c 00 41 ba fd 53 1c 48 95 | 4a ae 4f cc 78 85 9f f0 fa 4c 13 7a c5 dc 96 cf | 8c 8f e9 26 db 93 6d c0 e4 2b 06 79 49 8a 1c 86 | 23 8a 00 51 5e 48 57 fe 2b c6 2d 2e cc 90 37 77 | 16 54 2d 1c 52 6e 88 f9 06 69 91 14 40 a3 3e 1f | 64 d7 73 f6 42 da 0d 73 5f 6b eb 89 ee 97 cd 6c | fd 1d 89 b8 17 39 77 3f b0 8b a8 13 2f f9 45 f4 | e3 ec 7f a4 35 be 17 3d c6 80 db be df d2 e9 bc | 39 46 6a e1 d0 06 ce 65 d8 13 18 bc e7 ef 70 ba | 17 09 9b 7f c9 d6 90 ff cb 53 6a 15 26 bc 84 d0 | 3c 63 f9 85 08 c0 bf 6b 92 00 26 8e 7e 39 47 fa | 15 93 5e ae af a3 95 34 bf f7 9a 05 60 79 f9 78 | fe 1c 09 6f 2a d7 a8 e6 dd 20 f6 bd f3 b0 a8 de | 56 b0 c1 b0 a8 8e c2 c9 51 e8 12 8c 23 35 5a 34 | 29 00 00 24 d3 9d 92 33 15 50 42 07 cb e2 93 fb | fa f0 4d 62 ce 86 f8 78 f6 e4 5a c4 46 ff 05 fd | 2d fe b5 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 f6 95 c7 6a 67 27 fa d2 0e 4e 26 | b1 fb ce d1 96 08 1b d4 00 00 00 1c 00 00 40 05 | 86 3b a6 fc 26 15 66 79 c8 2d 3b 9c 75 89 43 54 | 51 cf ae 75 | libevent_free: release ptr-libevent@0x7fb37801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47f10 | #56 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 38 96 b9 83 17 2c 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #56 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #56 | rejected packet: | a2 38 96 b9 83 17 2c 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #56: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-248" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-248' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #248 at 0x557d46b26740 | State DB: adding IKEv2 state #248 in UNDEFINED | pstats #248 ikev2.ike started | Message ID: init #248: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #248: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #248; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-248" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-248" IKE SA #248 "road-eastnet-nonat-248" "road-eastnet-nonat-248" #248: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-248 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-248": constructed local IKE proposals for road-eastnet-nonat-248 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 248 for state #248 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47f10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #248 | libevent_malloc: new ptr-libevent@0x7fb37801d920 size 128 | #248 spent 0.159 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-248" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.245 milliseconds in whack | crypto helper 19 resuming | crypto helper 19 starting work-order 248 for state #248 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 248 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 248 time elapsed 0.001003 seconds | (#248) spent 0.997 milliseconds in crypto helper computing work-order 248: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 248 for state #248 to event queue | scheduling resume sending helper answer for #248 | libevent_malloc: new ptr-libevent@0x7fb36804b7c0 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #248 | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 248 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #248 | **emit ISAKMP Message: | initiator cookie: | 0a 60 4f 04 ec 5d f9 e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-248 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8b 96 4e 6b 1a 47 f3 29 f4 97 63 43 e3 c7 7c c2 | ikev2 g^x b5 40 35 82 f8 ae 61 14 ae 37 68 84 b3 6c 17 bd | ikev2 g^x e2 38 fa 08 01 a0 06 e7 9f 6c ca f7 e0 61 70 92 | ikev2 g^x 35 69 98 cb 13 b9 35 de 14 7b 48 01 ca 16 d2 a3 | ikev2 g^x 8a 8d f7 e5 16 28 68 18 42 b1 0f f2 66 75 2f 1f | ikev2 g^x 92 e4 b0 69 36 a2 b4 75 60 ca a5 a2 69 6d e6 5d | ikev2 g^x 46 24 17 68 8a bc 97 e8 9e ee 7a 06 d8 89 ea da | ikev2 g^x 29 95 98 02 98 06 f1 21 8f de de a8 b1 db 6b e4 | ikev2 g^x 16 54 6a d8 f1 bf 06 c3 2a de 4c 0f 1e 69 c7 60 | ikev2 g^x 71 82 15 35 09 a6 80 73 54 ab 5a 82 af 1b da 3b | ikev2 g^x c5 0a 69 1d 72 1d bd 02 fa 14 6a b4 37 14 ab b1 | ikev2 g^x 6c ef 68 fb 08 a8 b0 c6 58 93 07 45 93 1f 0d 53 | ikev2 g^x 5a 7c 44 c6 e8 cb d0 e7 6c 54 5d c1 89 3a e8 2b | ikev2 g^x e2 33 79 6e fa fd a1 8c dd 41 32 f8 12 7c 52 d0 | ikev2 g^x ef b1 cc 9f e3 23 da b6 ea 6c dc 48 7a 7e 45 73 | ikev2 g^x a1 ca 75 fd a6 b2 28 b4 4d de 48 05 30 76 df f1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce da d0 88 5b 97 8e 08 a8 b2 aa 35 1a a0 f5 0d fa | IKEv2 nonce 05 bb 67 43 a9 98 40 73 a9 62 0f f1 91 cf ba 2a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0a 60 4f 04 ec 5d f9 e1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f8 | natd_hash: port= 01 f4 | natd_hash: hash= 70 42 31 df 79 b8 d9 7f 21 24 fd aa 74 f3 12 b0 | natd_hash: hash= e3 0d 96 52 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 70 42 31 df 79 b8 d9 7f 21 24 fd aa 74 f3 12 b0 | Notify data e3 0d 96 52 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0a 60 4f 04 ec 5d f9 e1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1d 11 c7 78 91 0f ef bb 0b 1a 85 c0 59 35 e2 cd | natd_hash: hash= c1 30 49 b7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1d 11 c7 78 91 0f ef bb 0b 1a 85 c0 59 35 e2 cd | Notify data c1 30 49 b7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #248 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #248: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #248 to 4294967295 after switching state | Message ID: IKE #248 skipping update_recv as MD is fake | Message ID: sent #248 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-248" #248: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.248:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #248) | 0a 60 4f 04 ec 5d f9 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b 96 4e 6b 1a 47 f3 29 f4 97 63 43 e3 c7 7c c2 | b5 40 35 82 f8 ae 61 14 ae 37 68 84 b3 6c 17 bd | e2 38 fa 08 01 a0 06 e7 9f 6c ca f7 e0 61 70 92 | 35 69 98 cb 13 b9 35 de 14 7b 48 01 ca 16 d2 a3 | 8a 8d f7 e5 16 28 68 18 42 b1 0f f2 66 75 2f 1f | 92 e4 b0 69 36 a2 b4 75 60 ca a5 a2 69 6d e6 5d | 46 24 17 68 8a bc 97 e8 9e ee 7a 06 d8 89 ea da | 29 95 98 02 98 06 f1 21 8f de de a8 b1 db 6b e4 | 16 54 6a d8 f1 bf 06 c3 2a de 4c 0f 1e 69 c7 60 | 71 82 15 35 09 a6 80 73 54 ab 5a 82 af 1b da 3b | c5 0a 69 1d 72 1d bd 02 fa 14 6a b4 37 14 ab b1 | 6c ef 68 fb 08 a8 b0 c6 58 93 07 45 93 1f 0d 53 | 5a 7c 44 c6 e8 cb d0 e7 6c 54 5d c1 89 3a e8 2b | e2 33 79 6e fa fd a1 8c dd 41 32 f8 12 7c 52 d0 | ef b1 cc 9f e3 23 da b6 ea 6c dc 48 7a 7e 45 73 | a1 ca 75 fd a6 b2 28 b4 4d de 48 05 30 76 df f1 | 29 00 00 24 da d0 88 5b 97 8e 08 a8 b2 aa 35 1a | a0 f5 0d fa 05 bb 67 43 a9 98 40 73 a9 62 0f f1 | 91 cf ba 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 42 31 df 79 b8 d9 7f 21 24 fd aa | 74 f3 12 b0 e3 0d 96 52 00 00 00 1c 00 00 40 05 | 1d 11 c7 78 91 0f ef bb 0b 1a 85 c0 59 35 e2 cd | c1 30 49 b7 | state #248 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37801d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47f10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #248 | libevent_malloc: new ptr-libevent@0x7fb37801d920 size 128 | #248 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49621.464436 | resume sending helper answer for #248 suppresed complete_v2_state_transition() and stole MD | #248 spent 0.465 milliseconds in resume sending helper answer | stop processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36804b7c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0a 60 4f 04 ec 5d f9 e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #248 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #248 | rejected packet: | 0a 60 4f 04 ec 5d f9 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #248: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa0940 | handling event EVENT_RETRANSMIT for parent state #232 | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #232 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #232 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49621.466708; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002996 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8d60 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #232 | libevent_malloc: new ptr-libevent@0x7fb36804b7c0 size 128 "road-eastnet-nonat-232" #232: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #232) | 24 ac 89 77 7f d4 00 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d e3 39 fa 31 96 0e da 0d 87 de fe bc da ee 7b | f9 35 54 93 66 77 87 a0 67 c2 b4 11 e6 0a 7a 53 | b3 1d a8 6c 5c b3 d5 5b f1 71 74 80 47 74 8f eb | 25 fb 81 fc 67 2b 6d fc c2 93 27 e4 ad 7c e4 44 | 62 ee e5 d7 4d 6f 45 7a fb 56 b0 33 e4 c0 e1 a0 | 0d 2e c4 d7 7c a8 3d 9c d0 51 2f 55 54 40 46 36 | 1c 6c 65 82 d9 49 b2 d4 69 f8 3b 26 10 eb 42 4c | 23 39 f8 bc c3 39 9a c3 11 d4 4e 97 4e b9 f8 a2 | 8b 74 d5 f0 11 c2 a0 7d ca dd 76 40 1b 01 76 b0 | a4 bf 05 91 b6 25 97 e5 e6 51 ee 64 fa 3b 0a c5 | a6 9c c8 8d fc dc 9a b7 88 e8 5a 4a 57 96 98 00 | db 6d 9a cd 76 5b a7 49 16 56 06 32 a5 f0 51 87 | 36 26 1d 21 19 29 89 68 02 06 6d 37 2b a0 74 d8 | 14 94 a7 12 8f 7a e7 ad 72 26 fb ca e9 57 f6 ae | 40 e1 77 ae bd 14 78 69 df f7 02 98 cb 60 f6 4b | ad ea 83 90 fd 04 b0 25 b3 92 71 37 ed 5d 75 e1 | 29 00 00 24 aa 59 21 22 32 5d 1b 0e 90 4a a6 80 | 93 f2 d5 94 dc dc 41 5c 7e 9b 58 30 e5 e0 1c a2 | 9a c8 ed 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 58 75 66 d7 36 51 ed 56 98 88 32 | c1 e3 29 ac 35 46 df e2 00 00 00 1c 00 00 40 05 | 0c 44 36 93 b4 a9 f5 59 b8 d7 76 83 b8 b4 fd 37 | 81 aa c4 e2 | libevent_free: release ptr-libevent@0x7fb3380300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa0940 | #232 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 ac 89 77 7f d4 00 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #232 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #232 | rejected packet: | 24 ac 89 77 7f d4 00 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #232: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #244 | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #244 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #244 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49621.469054; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500617 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa0940 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #244 | libevent_malloc: new ptr-libevent@0x7fb3380300e0 size 128 "road-eastnet-nonat-244" #244: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #244) | 4b f1 49 87 f9 a6 76 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 99 c6 ce 30 f7 89 45 59 4d 59 48 bc e8 db b7 | 6e 51 73 db f1 50 f0 84 78 35 a5 96 97 1e cf a2 | ba 46 c2 c3 3c f1 3a 6e 96 bf 5f af 7c b4 86 ff | c1 77 25 46 ad 5b ec 41 ea 88 d5 b2 00 e8 44 78 | 0e 9f 1e 30 ef 44 2c 78 1a e7 51 e7 d9 ad 9d e1 | 0d 69 bb c8 c6 a9 e9 4f 0c d7 5e 29 38 5c 8e e0 | 8e 7c a8 b7 93 d1 97 5f 38 52 c5 7b 09 49 6a 76 | 8a 53 22 ab 09 ab d7 9d 44 f6 cf 05 91 df 27 29 | 68 68 78 b8 7a 10 b4 e5 9b cb 01 8d f1 35 fc c7 | 7f 8f 0c 26 0d 68 38 58 4d f7 b1 9e 96 4e 4d c2 | 24 dc 6f 1f 81 ff 16 30 89 d9 d3 07 46 98 c4 17 | fc 99 c1 d0 c2 70 9e d5 7c 43 6d 12 f3 10 9e 43 | 41 f8 15 2e de ff 3f c8 97 02 5f 67 73 89 79 ac | 6a 34 e1 ed 55 83 46 98 af 4b eb 61 ab ed 9c 2f | 3c d3 92 2f df 77 9f 98 51 e0 24 45 80 51 7a 35 | d5 76 40 ee 59 99 54 8f 46 a1 fc 48 cb 2a 6a 64 | 29 00 00 24 23 47 a6 9f de 30 3b be 65 32 63 50 | 62 d5 89 0b d7 3d ea 19 da 4e 55 f9 53 26 8c d3 | 8a e5 35 df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 5e c3 f3 c5 40 cc e2 50 93 80 f8 | 58 99 fe 09 2c 8c 43 58 00 00 00 1c 00 00 40 05 | 42 a9 a5 4e 6c 3d 71 a6 0f 5e 70 c5 17 4e 52 56 | 03 54 70 77 | libevent_free: release ptr-libevent@0x7fb35c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #244 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b f1 49 87 f9 a6 76 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #244 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #244 | rejected packet: | 4b f1 49 87 f9 a6 76 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #244: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b610 | handling event EVENT_RETRANSMIT for parent state #214 | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #214 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #214 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49621.47339; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003896 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #214 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 "road-eastnet-nonat-214" #214: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #214) | 4f 29 16 ab 3e 1b 1d 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 9a ad a4 54 39 e9 04 15 a2 a4 f0 c8 dc 49 94 | 47 5a 04 64 04 57 79 8f 63 87 e7 ae b7 39 62 ec | 47 13 85 3d 4e a0 14 32 15 25 a6 7d a4 f2 aa aa | 67 17 a5 b2 08 db fc bd dc 96 aa 21 e7 a5 f2 3b | 34 82 35 14 fb 4a be 16 a9 a7 92 42 29 b2 17 4d | 52 27 87 ea b1 3a fa 6c 11 62 48 2f 81 f0 58 f6 | 6c 8b 54 c6 3c a7 1a eb fd 0e 51 2e 43 a1 67 7f | 52 b6 51 7f f1 6a 5e 3d a1 55 84 4d aa 64 fa dd | d4 68 19 0a 1c f1 aa ed d1 aa 12 27 11 44 c1 42 | 4c 3e ce c4 42 e7 8a 9f 52 d8 86 65 33 7c 9a 6a | ee 61 16 79 e0 6f bf 94 55 b9 32 ad 6e 68 90 17 | bb 0e f5 75 b4 7f bb 34 59 92 4e 2a eb db ac 26 | 62 0d 79 8b 29 38 a9 d3 9a dc 81 9e 5b 01 b1 77 | b2 97 be 93 40 8c 22 a8 ed c3 3b 34 e3 61 26 ff | 40 f0 34 c1 02 20 28 94 a9 ac e5 14 88 22 c0 0f | 0a ad af f1 ac 83 5f 84 02 43 33 bf d4 08 dc 06 | 29 00 00 24 dc 16 0d 02 e8 ab 94 84 4c 26 85 d4 | 77 69 31 1b 43 d5 c1 b1 2c a0 69 25 59 ad 36 b7 | 5c 40 16 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 ae d6 cb 98 74 13 91 af 99 ac 97 | 02 1b 9a 5a 71 bb 20 28 00 00 00 1c 00 00 40 05 | 20 56 0b 1b ec fa 37 e0 47 28 94 e0 2b 28 be ff | 21 7d 56 5a | libevent_free: release ptr-libevent@0x7fb34c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b610 | #214 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 29 16 ab 3e 1b 1d 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #214 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #214 | rejected packet: | 4f 29 16 ab 3e 1b 1d 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #214: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b5d0 | handling event EVENT_RETRANSMIT for parent state #169 | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #169 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #169 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49621.48072; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.002999 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b610 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #169 | libevent_malloc: new ptr-libevent@0x7fb34c00cf80 size 128 "road-eastnet-nonat-169" #169: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #169) | 36 7b 71 a0 e2 7f 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 4f 45 f4 ab d7 36 ef 76 4d 44 de 6d 62 2d ae | 4e 5c 7f da 0a b2 48 be 78 ae 6d be 58 68 4b a4 | 8f 2f d2 29 68 46 25 1b 12 f9 92 02 9c d7 87 f1 | eb d6 eb 82 f8 34 c7 6d 1b 97 bd 5a 16 3f 5c d9 | 45 ff a3 65 05 29 38 16 83 1c 73 b0 0d 2c 32 2c | fa dc 03 8b a8 c2 e4 3a 68 19 c8 6f 81 6b a9 c7 | f3 1e d3 85 90 6b 23 38 49 5d e8 b8 1a 99 c6 3a | 6a a2 1b 8c c9 a7 dc be 9d 40 85 d1 eb b3 30 ea | 56 c0 aa c1 0c 1e 30 02 2d 3d a6 f2 04 1d 14 69 | 6d b1 c7 5c 5a 62 14 b7 a7 b0 4d b4 4a ea d7 8e | 92 28 ac 35 b4 c0 43 9c a2 b3 5b b7 49 ed fe 09 | 58 d4 4b a6 dd 4b ac 69 dc 3a 32 2b 1e e0 8a 39 | ae 70 61 ea 71 bb e0 10 48 b3 9a 5d a8 33 73 7a | e9 75 bd 48 dd 69 c9 c8 be a6 8c 92 7f 96 ad 37 | 04 3d 47 69 86 1c fb 25 12 87 50 73 a4 63 1a 75 | dc 73 f6 d1 8e ed 8a 90 43 3f ec 36 e2 fd c3 e9 | 29 00 00 24 c6 0f 04 68 5e 20 5e 64 7b fe 77 4f | 0f cb 3e 64 8c ad ed 27 06 6f 13 47 5c 0b 0d 8e | 1c d7 84 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fa 7c 50 0f e9 f1 70 67 4d 08 f0 45 | 40 25 4d e8 01 bd 9b 4f 00 00 00 1c 00 00 40 05 | cc 1b 7d 85 9d ec 77 c3 d4 a3 45 1a a2 36 2f 10 | c5 f4 8f 3e | libevent_free: release ptr-libevent@0x7fb384015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b5d0 | #169 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 7b 71 a0 e2 7f 3d 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #169 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #169 | rejected packet: | 36 7b 71 a0 e2 7f 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #169: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f4be0 | handling event EVENT_RETRANSMIT for parent state #241 | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #241 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #241 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49621.482028; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001607 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b5d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #241 | libevent_malloc: new ptr-libevent@0x7fb384015370 size 128 "road-eastnet-nonat-241" #241: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #241) | ed bf c0 ae d9 fd 74 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 7f 1d 53 5e bf 7c 50 89 9a 1b 66 7a f6 ac 57 | 1e 44 b6 4e f9 ce e0 60 9e 35 82 8c 12 e1 ec 87 | c3 32 1d d0 30 6f 24 b0 84 5b 58 a3 dd 46 7f 56 | 3a fc a0 86 c1 a5 f0 b8 b4 7f c2 24 a0 35 a3 8b | 46 8b ad d0 3a 85 a8 93 6d 92 12 5e c7 60 d3 02 | 9d 48 49 61 d0 53 cf 87 bc ba 4a 86 e9 1d 0e c4 | 8a 55 24 90 50 13 2a fe 86 c6 6d 09 e7 31 26 ca | d2 d8 c1 f1 76 8e 79 98 8c eb 73 50 64 00 6e af | 8a ae f2 36 6c c7 fa cd 65 22 6c 5b 48 98 da 47 | c0 bc 45 31 fc 5e 0f aa b4 b8 1d d3 be 55 8c ba | 12 b5 d1 65 9a 9f 14 76 d4 89 e3 78 f3 26 29 2e | 46 8d 9d 7c 77 7b 47 8f 64 31 0d 93 e5 f5 e2 8f | 76 81 eb ad 7e 90 fd 6f b1 86 5e 11 a2 e7 77 5f | c1 4e 81 30 92 43 c5 b4 66 60 7f 33 52 22 85 c1 | 6f 01 81 ec 5d 5f 91 b7 53 01 fe 18 96 c2 64 e9 | d4 ad d0 b7 b7 a3 ba e1 97 81 a4 d5 9e 61 d0 8e | 29 00 00 24 48 1f 7b 4e 8c 39 27 4c 54 7b 31 27 | 38 83 2b 38 ab a8 0f 41 0e 72 e0 b6 b5 f5 a8 48 | 24 b7 3e 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c d9 59 12 c5 45 19 36 85 eb ed 91 | 74 0a b9 7e c6 b2 17 c0 00 00 00 1c 00 00 40 05 | 8c de 28 49 d8 e8 ba a2 04 93 2a 1c a7 e3 0e 84 | b2 9d 1f bb | libevent_free: release ptr-libevent@0x7fb37804b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f4be0 | #241 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed bf c0 ae d9 fd 74 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #241 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #241 | rejected packet: | ed bf c0 ae d9 fd 74 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #241: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.057 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #57 | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #57 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #57 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49621.510549; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.002709 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af8e80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #57 | libevent_malloc: new ptr-libevent@0x7fb37804b7c0 size 128 "road-eastnet-nonat-57" #57: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #57) | dc 73 20 b1 64 22 3b 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 2f 93 7c 8a da 22 fa 03 a0 fd 43 de d5 8f 84 | 5a 41 29 20 95 01 7c 7c 28 a1 27 22 f2 08 de cf | e0 98 16 08 1c e5 25 a6 bd bd 17 32 15 8e 0a 84 | f3 a2 7e 8a 0b 23 85 bf 7a b1 94 6d 13 0e bc 89 | 00 57 96 19 37 39 1b 02 a4 75 0f 94 90 d1 10 4b | e3 d2 66 0a 4f b7 c6 79 75 d4 b5 7d e4 36 1f c8 | 04 58 22 28 f1 96 40 a5 11 63 03 12 07 da 6e c4 | d6 87 58 17 eb bc 28 31 1f 88 9d a5 0c ef e1 d5 | b2 c3 d0 ee 08 43 a9 fb b1 8f de 78 3c c7 ae 7f | e9 04 ce d2 ab ca 37 0c f1 2a 72 1c 60 e7 51 7f | f2 49 54 44 b1 5f 43 7b 10 10 64 5c c3 44 75 d6 | 07 11 18 89 6c 1c 54 ef 0a c3 7f 69 cd 21 c7 ca | 32 33 4c f8 00 03 d2 d4 0f 41 96 9b 82 7d 76 81 | 10 2f 53 dd cd 91 0b 3d ff 38 8f 40 80 5c 77 b7 | 3d 66 a7 7b a1 8f 9e 2d 33 51 5c 72 92 e6 a3 7a | 40 cc ae 39 5f df 20 2b 13 8b bd 4c 81 23 66 a3 | 29 00 00 24 ad 63 ea 8e 7a 7b c2 d1 15 38 47 f0 | b3 a0 1a e0 85 11 f2 24 75 cc 3c d8 47 12 da f1 | 4a 24 d2 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 1b 4d 24 72 19 56 63 62 33 64 a7 | 66 22 df c0 bd 29 cc 1c 00 00 00 1c 00 00 40 05 | 7a aa 57 0f 26 4b 8b c1 eb 1a a3 08 c1 cf b1 49 | 59 b9 d4 8a | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | #57 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 73 20 b1 64 22 3b 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #57 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #57 | rejected packet: | dc 73 20 b1 64 22 3b 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #57: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.07 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a43dd0 | handling event EVENT_RETRANSMIT for parent state #170 | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #170 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #170 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49621.549056; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007014 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #170 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 "road-eastnet-nonat-170" #170: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #170) | 0e 3d 5a e4 33 67 ae f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 3a 08 5b b2 3f a4 8e df 9b c0 eb a8 ff 32 50 | b7 58 7d 7d 4a 10 8c 9a ad 53 11 df 0e 8d 39 fb | 8a c0 5f d6 8f ee 32 b4 c6 d6 4c 41 39 dc c8 7f | a6 9c 35 ef 09 08 ca f8 2d 7d 3c 76 aa 39 58 43 | 35 eb 36 d9 ef 09 c3 c6 d0 ab 11 b8 34 40 ff 55 | c8 35 93 0b bc c0 66 e0 d9 9f c1 89 c0 9b 98 09 | c8 0d 44 3a d6 3d e2 b0 52 69 78 44 4a 24 b0 ad | 80 aa 61 eb 53 d9 1a 0a 53 30 0a eb d5 8c f7 f3 | ca 01 74 12 22 ff f3 9d 01 97 d0 63 da 1b b6 a1 | 02 35 c9 78 38 c4 96 f6 23 08 55 58 52 01 18 8c | 46 ea 56 a8 65 c1 e7 43 3b b8 d3 07 66 36 b4 14 | 25 9e f5 4d 86 46 ab 55 94 68 c7 67 da 70 2b 06 | a8 71 55 97 18 18 f9 3a 98 e0 35 83 6a 8d aa b1 | bc e1 50 ed 72 ba 83 3d 44 b6 97 eb 32 ff 41 57 | 48 97 03 67 e5 b8 1f 12 59 d4 1e 23 84 44 9b 29 | 9a 72 cd 57 ba 76 df 2f d8 46 ae e3 a7 ac 2c 37 | 29 00 00 24 f5 be bd 85 ea bf a8 35 5e 2e fb 98 | 21 e3 d9 77 11 2b 7a 24 c1 b5 1e 2f 89 52 5c d3 | bf 7f 74 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a ca 79 b0 52 c7 26 24 58 ba d7 c8 | 58 6a 36 93 64 5a 0d 23 00 00 00 1c 00 00 40 05 | 2e 8d 3a 82 9a 56 9c b7 68 e2 e0 45 0d 65 b1 99 | f9 22 bb fc | libevent_free: release ptr-libevent@0x7fb34c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a43dd0 | #170 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 3d 5a e4 33 67 ae f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #170 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #170 | rejected packet: | 0e 3d 5a e4 33 67 ae f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #170: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0674 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-249" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-249' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #249 at 0x557d46b27d00 | State DB: adding IKEv2 state #249 in UNDEFINED | pstats #249 ikev2.ike started | Message ID: init #249: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #249: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #249; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-249" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-249" IKE SA #249 "road-eastnet-nonat-249" "road-eastnet-nonat-249" #249: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-249 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-249": constructed local IKE proposals for road-eastnet-nonat-249 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 249 for state #249 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a43dd0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #249 | libevent_malloc: new ptr-libevent@0x7fb34c01d920 size 128 | #249 spent 0.199 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-249" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.311 milliseconds in whack | crypto helper 6 resuming | crypto helper 6 starting work-order 249 for state #249 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 249 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 249 time elapsed 0.000999 seconds | (#249) spent 1.01 milliseconds in crypto helper computing work-order 249: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 249 for state #249 to event queue | scheduling resume sending helper answer for #249 | libevent_malloc: new ptr-libevent@0x7fb36c04b7c0 size 128 | crypto helper 6 waiting (nothing to do) | timer_event_cb: processing event@0x557d46a7a350 | handling event EVENT_RETRANSMIT for parent state #215 | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #215 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #215 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49621.556166; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002979 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f4be0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #215 | libevent_malloc: new ptr-libevent@0x7fb37002a950 size 128 "road-eastnet-nonat-215" #215: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #215) | c5 c0 dd cc b6 af 51 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 5c 66 6c 45 6f a8 d2 4f 25 98 20 11 a6 a1 bb | 37 55 34 73 15 5d a4 49 35 cd f6 0a 9e e7 f3 5c | ad 42 56 ef b0 f4 fa f6 d5 ba 84 d6 dc e0 5f 55 | dc 55 56 f2 be 03 fe 4f 4a b4 66 3c 99 cb 71 e7 | b6 73 b2 44 ce 0d f7 96 90 78 2f 50 92 28 ba f9 | 22 e7 15 cf fa c8 47 f5 0c 38 c1 8a 24 5b 39 a8 | ac 47 31 ea aa c2 b1 57 78 79 5e 0b a7 a0 33 1b | 86 d9 45 31 c0 29 bb 67 d1 68 a7 f5 10 84 25 ff | 4c 83 f7 42 1d c4 e6 b7 53 b1 ed 6d 1b f7 86 9b | 3e cc 2d ee 22 b8 61 e0 e7 95 7c e8 c8 d8 b2 10 | 06 d9 50 52 8e 07 0b 4b 94 83 c7 4b 90 09 3a d9 | 8a 35 2d 83 36 bb 75 45 45 1c cf c0 11 7f 85 8d | ec e0 a4 ca 58 99 97 8b 10 af 58 2d b7 9b a7 f0 | a5 cb ea 38 04 fe 36 b9 b4 81 1d 8f 85 c7 76 a8 | d9 30 86 6d bd 32 3b 6b 02 28 ec 10 b1 28 43 17 | 56 d4 9e 0c 76 ce cc 71 e8 70 44 59 5e b3 3a a2 | 29 00 00 24 21 81 d6 ee 95 75 07 f2 b0 ff 0f d3 | a2 c0 2b d7 de b5 1b 67 08 ca 6e a7 a2 d0 6b ed | 6d c9 d5 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c 19 de 62 93 d0 a4 3d 26 c7 25 16 | 8c 72 93 29 4a 06 74 1d 00 00 00 1c 00 00 40 05 | 5e 68 d5 fe 16 1c 49 30 75 2d c6 7b 65 a2 b6 24 | 10 76 bd 1f | libevent_free: release ptr-libevent@0x7fb33802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7a350 | #215 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #249 | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 249 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #249 | **emit ISAKMP Message: | initiator cookie: | ad 80 10 70 da e5 b7 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-249 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3c 1c 07 0c da 8a af 5e 89 e6 75 e4 e2 6b 94 81 | ikev2 g^x 88 bb cc 32 0e 51 16 82 66 1f 3f 42 b2 39 20 4f | ikev2 g^x 72 37 07 9a fd 40 87 70 79 6c 98 3b 3f ae 9c 8b | ikev2 g^x ce 68 05 66 50 64 85 b6 97 7b 54 39 f1 30 aa a3 | ikev2 g^x 04 6c 7c 88 ec 3c d1 1c d3 b4 4e a1 ee ab a5 d5 | ikev2 g^x 77 d7 c7 96 43 3f c9 ba 18 4d e2 bf ce 40 6d b9 | ikev2 g^x 2e 6f 43 a4 09 5e 6a 0a 57 fe 2f e8 72 ab e9 6e | ikev2 g^x d3 23 65 2e 56 3d 4f 3b 55 96 b0 62 91 f8 d1 e0 | ikev2 g^x 2e e0 00 1a 25 63 9c 6e 63 ad 31 ed ac d2 4b 58 | ikev2 g^x e3 5c 40 70 04 55 4c 39 0d 41 92 a2 3d 54 25 26 | ikev2 g^x d7 ef 2a e6 88 54 16 3c 17 a5 5d ae da e8 b9 49 | ikev2 g^x 9e f9 ac d6 d0 b5 d1 4c 32 7f 53 80 13 ce 13 ff | ikev2 g^x c1 9e 7b 3a 03 2e b8 d1 5e 50 be f8 6c db 78 af | ikev2 g^x c8 42 2d 25 43 1f 70 34 56 a4 16 57 bf 31 c6 30 | ikev2 g^x d5 f1 f9 72 d0 f9 83 35 68 6b 2a 69 4e 20 b1 d3 | ikev2 g^x f4 3c 9d 15 41 2d 80 5e c6 a3 cc c1 23 a7 f8 c0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce cf 2f e4 f6 cd 34 13 11 b4 5d 4f e0 11 dc f5 73 | IKEv2 nonce 81 ae 1d 25 a9 7b e9 47 0f d3 b0 6c 5e dc e5 75 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ad 80 10 70 da e5 b7 50 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f9 | natd_hash: port= 01 f4 | natd_hash: hash= 17 3d 29 fe a9 de 26 71 da 28 d8 ce 9c 91 f7 26 | natd_hash: hash= 3e 7d 46 03 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 17 3d 29 fe a9 de 26 71 da 28 d8 ce 9c 91 f7 26 | Notify data 3e 7d 46 03 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ad 80 10 70 da e5 b7 50 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 93 a3 dc d9 83 9b 6f 85 6e d1 32 ad 49 d5 89 75 | natd_hash: hash= f9 55 83 e1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 93 a3 dc d9 83 9b 6f 85 6e d1 32 ad 49 d5 89 75 | Notify data f9 55 83 e1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #249 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #249: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #249 to 4294967295 after switching state | Message ID: IKE #249 skipping update_recv as MD is fake | Message ID: sent #249 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-249" #249: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.249:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #249) | ad 80 10 70 da e5 b7 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 1c 07 0c da 8a af 5e 89 e6 75 e4 e2 6b 94 81 | 88 bb cc 32 0e 51 16 82 66 1f 3f 42 b2 39 20 4f | 72 37 07 9a fd 40 87 70 79 6c 98 3b 3f ae 9c 8b | ce 68 05 66 50 64 85 b6 97 7b 54 39 f1 30 aa a3 | 04 6c 7c 88 ec 3c d1 1c d3 b4 4e a1 ee ab a5 d5 | 77 d7 c7 96 43 3f c9 ba 18 4d e2 bf ce 40 6d b9 | 2e 6f 43 a4 09 5e 6a 0a 57 fe 2f e8 72 ab e9 6e | d3 23 65 2e 56 3d 4f 3b 55 96 b0 62 91 f8 d1 e0 | 2e e0 00 1a 25 63 9c 6e 63 ad 31 ed ac d2 4b 58 | e3 5c 40 70 04 55 4c 39 0d 41 92 a2 3d 54 25 26 | d7 ef 2a e6 88 54 16 3c 17 a5 5d ae da e8 b9 49 | 9e f9 ac d6 d0 b5 d1 4c 32 7f 53 80 13 ce 13 ff | c1 9e 7b 3a 03 2e b8 d1 5e 50 be f8 6c db 78 af | c8 42 2d 25 43 1f 70 34 56 a4 16 57 bf 31 c6 30 | d5 f1 f9 72 d0 f9 83 35 68 6b 2a 69 4e 20 b1 d3 | f4 3c 9d 15 41 2d 80 5e c6 a3 cc c1 23 a7 f8 c0 | 29 00 00 24 cf 2f e4 f6 cd 34 13 11 b4 5d 4f e0 | 11 dc f5 73 81 ae 1d 25 a9 7b e9 47 0f d3 b0 6c | 5e dc e5 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 3d 29 fe a9 de 26 71 da 28 d8 ce | 9c 91 f7 26 3e 7d 46 03 00 00 00 1c 00 00 40 05 | 93 a3 dc d9 83 9b 6f 85 6e d1 32 ad 49 d5 89 75 | f9 55 83 e1 | state #249 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c01d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a43dd0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a43dd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #249 | libevent_malloc: new ptr-libevent@0x7fb34c01d920 size 128 | #249 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49621.557016 | resume sending helper answer for #249 suppresed complete_v2_state_transition() and stole MD | #249 spent 0.63 milliseconds in resume sending helper answer | stop processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c04b7c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 c0 dd cc b6 af 51 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #215 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #215 | rejected packet: | c5 c0 dd cc b6 af 51 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #215: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0806 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 80 10 70 da e5 b7 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #249 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #249 | rejected packet: | ad 80 10 70 da e5 b7 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #249: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0705 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1c450 | handling event EVENT_RETRANSMIT for parent state #233 | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #233 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #233 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49621.583334; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.006197 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7a350 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #233 | libevent_malloc: new ptr-libevent@0x7fb36c04b7c0 size 128 "road-eastnet-nonat-233" #233: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #233) | 77 22 f4 9c 3e 1f 99 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b ec 2a 3f 06 d1 8b 5a e8 a0 a7 30 dd 97 56 a8 | fc 83 ab 1c 41 f5 e8 c3 f3 53 9d 30 18 0d be a8 | 6b a6 4b 53 32 26 a8 d4 bc df 11 84 c3 51 c0 79 | eb 6a aa 97 40 5a 35 1b a4 6a 1c c4 04 e6 8f 18 | 55 5f 5f c2 af ea 6a 6c 05 59 de 4e 19 d5 22 46 | 8f 6c 32 5b 58 46 45 5f 0c 50 78 8c 5e 88 c7 73 | e0 06 97 88 0d 6e 77 b6 da 57 bc be e2 24 fb f2 | bc 09 06 c5 c0 aa 19 66 66 6f 88 a3 1d 28 43 e3 | 36 51 8c 80 0a 70 81 d2 c6 66 0e c8 9f c6 17 19 | b8 81 ac 81 1a 75 2c b9 dc 5b 7e 21 7e 73 b2 27 | 88 a7 6d 88 e3 28 4e 9c 2a a6 e3 b1 c2 84 18 fe | a8 bd 00 37 6c ea ee 13 7b 00 0f 0a d1 ff 5f 9e | d5 9b e4 25 b2 e5 a0 5b a7 8c 8c 3d 30 b8 3c 2d | d7 5a cb be 36 80 67 eb 87 97 e6 10 f7 e4 20 c7 | b9 ae bd af 99 ea 2b 87 69 7f 4e 89 2a ed a5 67 | 99 05 49 1e d6 46 c3 74 7b 66 be bf b6 f1 d6 cc | 29 00 00 24 c5 f3 2f 2c 84 76 05 a0 25 7b 18 6c | b7 6d f8 2f 27 cc e2 71 11 4d 56 a5 c7 36 d6 2c | 0b df 39 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 f4 1a 0b 18 23 e3 b7 72 f4 2b e8 | 42 64 3b ae 76 1f 34 42 00 00 00 1c 00 00 40 05 | 5e 56 c8 b1 db 9e 88 e1 bd b5 14 1e 2e de bc 55 | b2 28 a2 2d | libevent_free: release ptr-libevent@0x7fb37c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c450 | #233 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 22 f4 9c 3e 1f 99 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #233 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #233 | rejected packet: | 77 22 f4 9c 3e 1f 99 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #233: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd40 | handling event EVENT_RETRANSMIT for parent state #245 | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #245 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #245 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49621.595688; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500284 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c450 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #245 | libevent_malloc: new ptr-libevent@0x7fb37c0407f0 size 128 "road-eastnet-nonat-245" #245: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #245) | 15 95 fb a9 f3 2d 54 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 07 75 44 62 b4 90 36 f0 1f 9d c1 5d 1b f7 db | 07 17 dd 42 63 05 02 d3 cf 19 39 61 be b0 c7 13 | b1 14 a4 a5 b8 a1 23 ab 35 be c3 4c de 16 3f 73 | 4f a1 df 22 33 3b cb 49 9e 26 36 44 30 39 b1 65 | 42 b6 93 29 4a f4 de 14 94 ba c8 61 f8 84 44 5d | 84 ad c9 32 19 82 79 9b 9b e9 75 42 04 bf 32 59 | 46 4e b6 9b ee 27 62 a3 18 81 ea 6a 95 c0 2b da | f4 8a 3a 0c 58 60 40 77 5e 77 85 02 1a 93 66 69 | 9d df f5 b9 a5 ac 45 4a 0d c0 94 39 1f d8 c9 eb | f6 d6 d7 0e d5 20 a4 de 35 3e cb b1 5a 3e 07 b8 | 15 10 06 8b 76 b5 1a ee 6d 90 d8 56 e7 da d7 5c | f6 12 4e f3 18 b2 7d 97 43 2c 6c d6 56 7e a8 7d | 7a cc 89 83 61 47 f5 78 b4 bb 7a cf 96 f5 41 2c | bd 99 b7 5f 2f 94 22 34 ed af 72 69 47 9d b0 d6 | ba d6 46 d7 20 70 b9 2b 04 c8 60 1d 2d 34 a0 00 | f0 50 7a 8d 2d 98 72 24 0c bf 1e e2 f2 65 16 ca | 29 00 00 24 78 20 60 94 4c f0 10 8a 14 01 4a 36 | 9d 71 3a 32 dc 84 92 f3 9e ca b0 c6 c6 47 0c 0e | 5c 4a 16 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 94 6f 42 13 dc 75 9d 65 6a 04 f1 | 12 0b d5 9b e2 af 9f 6d 00 00 00 1c 00 00 40 05 | dd ae 8a 7b 09 c8 82 03 b9 81 1c f4 27 30 35 7a | 2b 8b 29 2f | libevent_free: release ptr-libevent@0x7fb384032b00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd40 | #245 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 95 fb a9 f3 2d 54 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #245 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #245 | rejected packet: | 15 95 fb a9 f3 2d 54 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #245: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a15810 | handling event EVENT_RETRANSMIT for parent state #58 | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #58 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #58 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49621.597005; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005943 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd40 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #58 | libevent_malloc: new ptr-libevent@0x7fb384032b00 size 128 "road-eastnet-nonat-58" #58: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #58) | 0b a9 81 95 1f 0d 8e 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f b0 e3 df ce d1 d0 b9 30 6e 16 b3 e7 cf 92 e5 | a6 70 0e 23 5e 02 05 19 f5 b5 1a 04 6c 5e 7d a2 | 79 25 aa 0e 70 2a 25 1f 1c 02 b5 fc b9 3e 75 ad | e7 1e f1 8c 9c 7f 92 92 1d dc b1 ca 6d cf 53 ac | b8 0b 70 9b 2c 6a e7 8d 07 95 ae e1 37 ab ac 14 | 91 d8 79 4c ef 08 d0 d9 b0 55 82 09 5f 15 d9 df | e8 2c 4e cb ea a0 59 1c 81 c7 f6 39 0a 52 62 8e | 4b 57 28 22 1f d7 52 eb ec 16 d8 46 16 0a 27 88 | c7 c5 f7 e2 87 71 a1 2d 5e 9c 25 83 70 f1 a8 0c | df 63 58 3a 6f ba 9a fc 71 ac 13 82 0c ff 96 f7 | b2 3e 0f af a2 df f1 69 8f db ce 47 13 89 8f fd | ce 0a 15 3f 64 ea 8f f4 c7 b7 5e 3b b0 17 0a 90 | ef 23 ff a9 81 27 7d 7c ee 7a 36 7f 56 c1 b8 52 | 77 69 e0 69 4b 05 7c e7 a7 d2 48 f2 eb ac 08 c4 | 5f 9f b5 9e fc d5 98 d0 41 7f 9b ec 07 64 d8 f7 | 80 37 a2 97 6c ab e1 aa b4 48 78 11 a3 f3 d8 0a | 29 00 00 24 dd 82 37 0e 6e 7f fd 43 0e f6 0a 6a | 68 bc 25 88 0a 9e 3e 74 64 09 ae e7 87 f2 db fe | 06 d2 df 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 02 ef 4d 47 45 3b d6 d5 d7 fa ad | b5 dd 5d f9 98 95 75 30 00 00 00 1c 00 00 40 05 | 0c 06 c0 09 b1 a9 53 e2 00 18 ae 12 95 c7 71 d4 | 78 09 4b e3 | libevent_free: release ptr-libevent@0x7fb3440180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a15810 | #58 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b a9 81 95 1f 0d 8e 78 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #58 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #58 | rejected packet: | 0b a9 81 95 1f 0d 8e 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #58: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0571 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a84000 | handling event EVENT_RETRANSMIT for parent state #171 | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #171 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #171 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49621.616295; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004217 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a15810 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #171 | libevent_malloc: new ptr-libevent@0x7fb3440180b0 size 128 "road-eastnet-nonat-171" #171: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #171) | 60 ea a0 b8 11 41 67 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 a6 a0 3d a3 d3 f7 3a 92 38 69 11 fc c0 0a e6 | ae 99 13 7e 46 80 4c 8f eb cb 1b a4 6d 5c fc 08 | ec 45 f4 48 c3 e3 73 a8 1a d3 f7 7f 3a 28 95 0f | b3 2e 82 89 be a5 d3 a6 ab 70 83 ad 3e e2 73 a1 | 73 7c b9 be d5 96 dd de 07 cc fe da 6e 65 6b 76 | 25 27 16 21 7c ef 70 24 a4 77 29 aa 15 d7 7b a8 | 16 72 3e d5 01 58 3c 97 7b 78 28 15 2b 7d 70 03 | 64 96 9b 75 19 62 f5 2d d6 23 a9 0d ca a5 9a 70 | a6 bd cc 03 9b 58 60 ee fc 9f 9e d6 00 fa 23 02 | 63 d3 b6 b9 2c b8 b0 66 04 8e 85 03 2d 8a 3b 14 | f1 66 74 61 f6 ab 2b 8f f8 31 4b 0b da 07 ed 98 | a3 08 1a 85 f1 f2 be 38 18 37 9b 13 eb 17 a9 c3 | c0 a5 db c8 dd 9c 88 27 54 50 ba 9a 47 c0 2c 00 | d1 c4 c3 04 be b5 8f d9 f7 25 9c ae 45 27 ee 47 | a2 c2 11 cc 79 aa fd 06 ae ea 3a 65 e0 36 c3 05 | dd d3 e2 dd c1 bd 1f da b7 d1 ff 87 93 0f c5 00 | 29 00 00 24 f4 77 f4 2a e1 ad 87 d1 e0 b8 f3 03 | 93 45 a7 36 54 7e 24 81 6c 5d 13 c9 3a 4c ab c2 | 28 19 06 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 9a 54 5d 74 7c 3e 57 ce 44 f1 6a | b5 dc 40 d6 fc 98 8f 10 00 00 00 1c 00 00 40 05 | ab ff fc 00 2d 34 de 32 ad 3a 53 9d f5 35 ab 6e | 4f ce 82 8b | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a84000 | #171 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 60 ea a0 b8 11 41 67 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #171 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #171 | rejected packet: | 60 ea a0 b8 11 41 67 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #171: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #242 | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #242 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #242 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49621.650378; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00794 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #242 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 "road-eastnet-nonat-242" #242: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #242) | bb 4d 15 84 4a d1 63 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be b8 bd 73 36 69 de db bd 2c 4d 3f 4c ae 08 43 | b3 f3 d7 53 b9 34 af 4a b1 04 e1 e2 27 f6 b2 b1 | 3e 96 98 76 a6 00 83 11 2e 07 de 5b 47 a6 5a a5 | 8f 0c 87 f8 e6 f5 c8 d5 f0 ce bf 70 a9 e4 7d f9 | c0 99 10 3b ec 9c 30 58 7b 73 32 96 65 b5 9d 37 | 48 ba 52 b0 1b 39 cd 58 16 bc 06 a4 25 89 da 22 | ca c6 85 48 e1 fd 54 81 b4 f6 46 e3 a3 cc 04 fd | ed 22 5b c4 4b c5 12 3d 87 53 9d f3 99 49 26 6d | e0 15 46 62 13 40 fa fc 54 c0 0d bd 54 60 26 93 | aa dc 01 46 3c 92 65 7b 4e 15 bf 35 9f 0d 1e ef | 63 43 fe c2 e1 31 5d 4e e4 23 fe ab 39 17 60 89 | ab b5 9b 1d 6d ed 49 c1 f4 3e 50 67 a1 09 05 d9 | c3 d6 c1 46 1e 9a db 86 ae f2 48 84 9e 9d 6d f5 | 1a 55 ad e2 9f 23 3f a2 29 49 4a 81 a2 25 2b 78 | b3 0b 2d 2a ec 81 b7 72 6f 93 e3 8b ce 4c b6 e9 | 10 ec a2 f6 93 c8 51 54 e2 4d 42 c5 bb 12 0b c1 | 29 00 00 24 43 16 25 02 5f 89 fd c4 95 04 8f 29 | f5 97 17 77 c9 2f ab bf 71 ef e8 74 04 bd c8 92 | df d9 0b 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 dc d6 bb 84 20 bd 3d 97 6d a1 71 | 60 d0 7a 61 e2 12 2c 58 00 00 00 1c 00 00 40 05 | 6c 10 68 84 3a c9 9c f7 49 94 4f 1d 42 c4 e8 ff | 34 65 7d fa | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #242 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aeb500 | handling event EVENT_RETRANSMIT for parent state #216 | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #216 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #216 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49621.650562; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.008684 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #216 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 "road-eastnet-nonat-216" #216: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #216) | e7 ef a7 cc e6 d3 f6 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 f0 d1 10 02 25 ff 09 54 9a 27 0a d6 e1 75 e9 | 4b 25 09 80 13 1a bd 53 71 22 e7 a5 75 81 d1 8a | 25 47 40 c6 b3 5d 03 6d 9e 83 d1 92 a9 46 5d 4b | 0d 28 c0 ae 0f 26 63 48 22 7d dc 47 5b d5 77 07 | 29 79 06 04 6b 6b 34 8f 3e bd d3 ec 63 f9 78 20 | 47 7a 08 c2 44 b5 60 c5 73 9a 3e 6a 29 e5 d6 96 | 62 d8 90 b5 3b c6 8d 28 1b e2 87 89 6b 14 69 c3 | 86 f7 90 a6 77 5f 07 46 5b 86 a4 37 e5 80 d5 e7 | e9 b6 1c 3b fa 48 83 e6 86 71 bb 22 3d c4 ff 70 | 08 57 53 75 69 80 73 34 3e 38 54 52 61 ad 52 b2 | 0c fc ac 12 69 16 4e 5c 14 e0 22 a5 7c 1b 1c 49 | 5d 41 d4 29 4c a2 8d 47 62 eb 64 7a 68 a3 77 fb | 8e a3 71 52 dc 60 0e ae 77 65 2b 4f c0 c2 80 7f | 93 d4 83 22 60 eb f0 ba 08 6e ef a3 c7 ae 6d c8 | ec 04 d3 0d a9 20 db 31 6f de c9 65 e4 0b a9 11 | a7 ab 82 ef 2d c1 74 f2 d3 be 19 9c 04 b0 c9 04 | 29 00 00 24 95 80 09 e7 7a 52 78 28 1a 48 0b 4c | 98 2f 28 0b b9 93 53 be d8 60 a3 a7 18 da 10 17 | 4f 70 e3 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 7b e5 1c 98 48 0c 58 81 2b 7b fc | 78 24 fa 6c 15 2c ab c0 00 00 00 1c 00 00 40 05 | 11 88 73 d8 fc 53 52 81 2d 03 8d 95 6f 83 2f ef | fe a8 7c ee | libevent_free: release ptr-libevent@0x7fb3480407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aeb500 | #216 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 4d 15 84 4a d1 63 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #242 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #242 | rejected packet: | bb 4d 15 84 4a d1 63 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #242: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 ef a7 cc e6 d3 f6 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #216 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #216 | rejected packet: | e7 ef a7 cc e6 d3 f6 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #216: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0543 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-250" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-250' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #250 at 0x557d46b292c0 | State DB: adding IKEv2 state #250 in UNDEFINED | pstats #250 ikev2.ike started | Message ID: init #250: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #250: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #250; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-250" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-250" IKE SA #250 "road-eastnet-nonat-250" "road-eastnet-nonat-250" #250: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-250 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-250": constructed local IKE proposals for road-eastnet-nonat-250 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 250 for state #250 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aeb500 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #250 | libevent_malloc: new ptr-libevent@0x7fb3480407f0 size 128 | #250 spent 0.163 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-250" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.243 milliseconds in whack | crypto helper 11 resuming | crypto helper 11 starting work-order 250 for state #250 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 250 | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 250 time elapsed 0.00119 seconds | (#250) spent 1.02 milliseconds in crypto helper computing work-order 250: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 250 for state #250 to event queue | scheduling resume sending helper answer for #250 | libevent_malloc: new ptr-libevent@0x7fb36004b7c0 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #250 | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 250 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #250 | **emit ISAKMP Message: | initiator cookie: | 17 2a 9d c4 13 ac 7b ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-250 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8f a0 94 c6 2f 84 36 04 eb 6b 9e d3 d8 c3 41 dd | ikev2 g^x 36 5b 9a 4c 3e c4 08 57 57 9d d2 59 b6 8f 5a a0 | ikev2 g^x 97 64 4c 58 37 53 a6 c4 b2 5a d7 28 c7 0c 91 ed | ikev2 g^x be a1 6c 6f 57 ab d6 36 57 9a ec 6e 81 e7 d9 ec | ikev2 g^x 00 31 e4 c2 56 03 3a 6a 1d 88 e8 70 93 fc 2c 64 | ikev2 g^x 28 be 05 43 75 db 83 1a 2d e0 38 f0 97 bc d9 f4 | ikev2 g^x 8f af 26 f3 55 d2 01 81 1a 51 e6 93 66 74 0d 48 | ikev2 g^x f0 8b f8 85 50 76 3e 80 0e 67 70 24 1d ad 6e ea | ikev2 g^x 72 9d 01 c4 5f 99 0d ea 29 5d 36 37 89 d4 98 07 | ikev2 g^x 88 15 ab 7a c4 c5 62 ba fc 8c d5 56 64 df 3c 82 | ikev2 g^x 9a 54 de 55 20 6b b2 85 89 5d a1 07 c2 57 11 bd | ikev2 g^x f6 1f f1 5d 9f 5c 8b 9a c0 e9 98 82 3c 9e 57 da | ikev2 g^x 35 cf a5 fa b1 00 d7 17 27 e9 41 21 aa 94 96 cb | ikev2 g^x a7 a3 73 c1 a5 31 48 fa 19 d0 03 ff 95 c4 5d f6 | ikev2 g^x f5 17 61 a5 35 90 af 0b d1 1b d3 73 e5 de 34 00 | ikev2 g^x 63 00 cf f1 60 d4 f0 c0 3e 0d 02 7c 00 ab ce 51 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c8 41 60 b9 9e 92 4a 7d d2 ef 9f 8c 7b 43 49 a0 | IKEv2 nonce e3 71 1b 9d 34 81 8d 16 42 5a ed 22 3b 97 7d 1f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 17 2a 9d c4 13 ac 7b ff | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 fa | natd_hash: port= 01 f4 | natd_hash: hash= 00 44 92 04 c0 13 80 0a cd 61 73 30 d2 9c c0 ea | natd_hash: hash= 6c 30 db 12 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 00 44 92 04 c0 13 80 0a cd 61 73 30 d2 9c c0 ea | Notify data 6c 30 db 12 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 17 2a 9d c4 13 ac 7b ff | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 76 73 9b 47 5d 14 7f b7 af f1 ed 94 26 55 3a fd | natd_hash: hash= 56 a2 76 70 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 76 73 9b 47 5d 14 7f b7 af f1 ed 94 26 55 3a fd | Notify data 56 a2 76 70 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #250 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #250: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #250 to 4294967295 after switching state | Message ID: IKE #250 skipping update_recv as MD is fake | Message ID: sent #250 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-250" #250: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.250:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #250) | 17 2a 9d c4 13 ac 7b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f a0 94 c6 2f 84 36 04 eb 6b 9e d3 d8 c3 41 dd | 36 5b 9a 4c 3e c4 08 57 57 9d d2 59 b6 8f 5a a0 | 97 64 4c 58 37 53 a6 c4 b2 5a d7 28 c7 0c 91 ed | be a1 6c 6f 57 ab d6 36 57 9a ec 6e 81 e7 d9 ec | 00 31 e4 c2 56 03 3a 6a 1d 88 e8 70 93 fc 2c 64 | 28 be 05 43 75 db 83 1a 2d e0 38 f0 97 bc d9 f4 | 8f af 26 f3 55 d2 01 81 1a 51 e6 93 66 74 0d 48 | f0 8b f8 85 50 76 3e 80 0e 67 70 24 1d ad 6e ea | 72 9d 01 c4 5f 99 0d ea 29 5d 36 37 89 d4 98 07 | 88 15 ab 7a c4 c5 62 ba fc 8c d5 56 64 df 3c 82 | 9a 54 de 55 20 6b b2 85 89 5d a1 07 c2 57 11 bd | f6 1f f1 5d 9f 5c 8b 9a c0 e9 98 82 3c 9e 57 da | 35 cf a5 fa b1 00 d7 17 27 e9 41 21 aa 94 96 cb | a7 a3 73 c1 a5 31 48 fa 19 d0 03 ff 95 c4 5d f6 | f5 17 61 a5 35 90 af 0b d1 1b d3 73 e5 de 34 00 | 63 00 cf f1 60 d4 f0 c0 3e 0d 02 7c 00 ab ce 51 | 29 00 00 24 c8 41 60 b9 9e 92 4a 7d d2 ef 9f 8c | 7b 43 49 a0 e3 71 1b 9d 34 81 8d 16 42 5a ed 22 | 3b 97 7d 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 44 92 04 c0 13 80 0a cd 61 73 30 | d2 9c c0 ea 6c 30 db 12 00 00 00 1c 00 00 40 05 | 76 73 9b 47 5d 14 7f b7 af f1 ed 94 26 55 3a fd | 56 a2 76 70 | state #250 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3480407f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aeb500 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aeb500 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #250 | libevent_malloc: new ptr-libevent@0x7fb3480407f0 size 128 | #250 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49621.658116 | resume sending helper answer for #250 suppresed complete_v2_state_transition() and stole MD | #250 spent 0.475 milliseconds in resume sending helper answer | stop processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36004b7c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 2a 9d c4 13 ac 7b ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #250 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #250 | rejected packet: | 17 2a 9d c4 13 ac 7b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #250: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34000d120 | handling event EVENT_RETRANSMIT for parent state #59 | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #59 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #59 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49621.662178; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008707 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae0780 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #59 | libevent_malloc: new ptr-libevent@0x7fb36004b7c0 size 128 "road-eastnet-nonat-59" #59: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #59) | 97 6c 3a 75 a9 04 c6 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 c8 5b 92 1f 75 89 eb 0e 2e 34 19 de c9 7d 34 | 18 5b 4b 86 10 db bf e2 6c 1e 94 2d 7a 7d c9 7a | a0 2b b5 06 7b 90 f1 d3 cd af 0e 61 7b ec c3 64 | de a5 53 e3 bf 5e 51 d1 84 95 1f 6e cb 81 61 93 | ad 42 3a 9f 1e 3a 65 25 36 02 e8 9c 31 54 18 98 | 6f 55 90 5b bf 33 e8 09 e2 db 7f a5 0d 28 2f b0 | 76 e2 e4 a4 df b5 68 69 d1 19 fe bd 73 f2 f2 54 | 46 48 bd 1c fd b1 5e e2 cc c0 6c c9 e5 04 1c 0c | 40 92 81 c8 73 67 1a af d8 5e 9b 4f 61 bb 61 8c | a9 de 42 09 33 14 9f 91 4f 50 01 94 4d 87 81 f8 | a7 b9 37 9b 88 d2 60 21 55 19 56 c4 fc 7d e4 11 | 28 74 cf ae 93 f1 51 10 2e 23 31 34 07 b8 e7 37 | a3 5e 4c 95 61 50 f9 d4 96 86 63 2e 49 88 c6 44 | 13 5e 5b c4 2d 0c 65 06 af 27 76 b6 3c bb 87 1b | d8 ae 43 ad 30 39 b0 94 f9 53 b3 ee d3 35 1d 60 | 44 54 ef 8a f8 7d 13 88 d2 f8 8c df 8f 77 8c e4 | 29 00 00 24 b8 98 0c 82 63 7c e1 4a 6e 4e 96 76 | c9 de 50 23 14 2c 80 d9 d0 99 72 c2 8b e9 f8 32 | 80 1a 11 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 09 60 c9 a8 1a 7b a4 38 cc f7 74 | 87 5e fa dc 42 53 d3 c5 00 00 00 1c 00 00 40 05 | a9 7a 6a af 06 6a 57 69 21 03 39 50 4a 98 de 11 | 5d 3e 78 2b | libevent_free: release ptr-libevent@0x7fb340012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000d120 | #59 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 6c 3a 75 a9 04 c6 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #59 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #59 | rejected packet: | 97 6c 3a 75 a9 04 c6 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #59: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0693 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a986c0 | handling event EVENT_RETRANSMIT for parent state #172 | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #172 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #172 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49621.685529; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005712 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #172 | libevent_malloc: new ptr-libevent@0x7fb340012840 size 128 "road-eastnet-nonat-172" #172: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #172) | 47 43 39 2e 38 d9 e4 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 65 17 b4 48 89 eb 1e b2 78 b8 1e 15 3a 4a a1 | a2 3a fd 43 76 59 59 a1 75 7a 16 45 66 68 dc 97 | f3 bc ee bc d4 e0 57 41 47 eb 59 3e b3 f4 36 c1 | 10 8f 59 fc 57 3a 37 29 71 bf ce 33 91 c2 37 65 | 5c 9c 9f 71 6e b0 1d 6c 6c ed 90 b3 bd fc 22 6b | 94 91 98 6d a1 2f c5 a8 ca 58 04 fa 18 79 03 0a | 3e 27 a9 a6 f4 08 b2 f5 32 35 e8 b7 83 a3 4b c7 | 82 d2 5d ed b4 7c af 9d be b8 23 49 75 bb 7f 62 | 0e b3 38 1c ec 9d 39 3b f4 04 b7 d0 93 52 70 e6 | 23 bb 4d 7f 7c 2a 5e ec cb 0d 74 24 7b 07 99 42 | 6c 43 eb 64 ec ce f6 41 88 91 d0 50 22 25 43 54 | aa b8 db 3d b2 e3 bd ee 47 71 69 be 83 a3 d8 90 | 99 79 30 84 6a ac 04 1b 20 13 06 10 f1 e1 43 b3 | 50 14 89 62 82 b4 57 81 1e 80 23 23 72 24 b5 3b | 66 27 db 5a d9 e0 9f 07 96 df 6b d0 43 88 1d 6c | 19 73 59 ba d5 80 1f b5 38 2f da 5f 85 a1 ce d0 | 29 00 00 24 54 d0 27 67 15 cd c6 d9 d3 f4 1c e0 | 4e b2 db 81 71 2f 53 78 96 2e b8 d9 e9 fc be ad | 28 73 0e 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 71 7f 76 8f b4 09 cb 9b d9 d3 22 | dc b5 61 93 71 75 88 d5 00 00 00 1c 00 00 40 05 | df a3 69 ab bf ad 58 61 9f ed 54 03 7c e8 ac 70 | c8 e7 d2 fb | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a986c0 | #172 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 43 39 2e 38 d9 e4 43 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #172 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #172 | rejected packet: | 47 43 39 2e 38 d9 e4 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #172: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #60 | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #60 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #60 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49621.723842; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007803 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a986c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #60 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 "road-eastnet-nonat-60" #60: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #60) | 25 9c c0 c5 c2 ae 29 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 2c 75 39 d4 fe e8 bb 01 36 72 a5 b5 e5 a5 81 | c7 38 4b e5 4a ae c6 e0 64 23 ae a4 00 42 bd c1 | 2e 59 84 56 2c d7 14 24 66 d8 ee 01 96 14 85 e4 | 4a 5d 41 c9 bd f2 52 f7 81 ad 7f d6 d0 a1 27 d2 | 97 41 8d b3 c0 bc 77 ec 23 18 fe 60 e2 a8 0c 93 | 13 c8 08 44 38 cf 40 53 40 99 23 6d f6 02 db 2a | 6e 32 b0 2c 67 33 6c a2 f1 af da 97 e3 24 99 d0 | 08 b1 cf 27 91 4b c8 a0 67 76 74 84 3e e8 94 b8 | 9c 46 bf ee d2 a1 d1 93 0c c9 20 9b fb 9c cc 69 | d2 c3 9f 9f 32 ce e3 cd 1e a4 06 0c ce ad 3b b5 | 3d 52 01 2e 64 72 a4 a5 0d 13 96 53 80 55 c3 af | c7 4a a9 17 ce 71 79 67 8d 48 4c a9 b8 00 02 38 | 2d 7c a0 0b 36 f5 68 34 0f dd 83 6f 1d d1 e9 b9 | 9a 43 52 12 d9 b1 6e ac 6a 5e ac d3 3c 20 66 93 | 6b 7e 85 4c aa e5 92 08 98 a1 8b 28 75 13 39 85 | b8 6c 05 ff ad 0d f2 e7 73 79 5c 18 65 6b dd 7e | 29 00 00 24 a0 1d b4 bd 19 70 24 f8 23 e6 87 dc | 50 af bd f2 95 21 f1 1c 7f 4c 51 8f f3 4c 1a 81 | a9 6f fb c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d6 a7 42 56 6b af 55 7e 9e 1f c2 40 | ba 0d 74 ad 6e b0 b4 2e 00 00 00 1c 00 00 40 05 | 49 f8 c3 9d b1 df 49 97 21 c8 2e 46 27 7c d9 25 | e7 f0 a2 de | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #60 spent 0.215 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 9c c0 c5 c2 ae 29 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #60 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #60 | rejected packet: | 25 9c c0 c5 c2 ae 29 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #60: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.088 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8cc0 | handling event EVENT_RETRANSMIT for parent state #234 | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #234 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #234 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49621.724213; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.006052 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #234 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 "road-eastnet-nonat-234" #234: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #234) | f2 fd b6 5b dd 65 ca 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 84 9f 8e f2 4d ae 28 c3 a6 33 85 a7 41 17 2e | a7 fb 37 ec dc 5e da 22 ed a7 d6 7f e1 29 5e 3a | c1 0a e8 67 19 e8 ac d8 ab c4 ce 43 3f 4e 0f bb | 7c 98 41 2b 6f 77 ca d9 32 a6 af f9 98 cd dd 12 | d9 37 bd e9 25 be 75 b5 bd 5e e0 83 6f 45 f8 da | 18 94 6a f4 88 bf 0e 4d e2 07 2b 36 d8 6f 3a 20 | 7f 78 6a 85 8a e5 3c dd 81 bb 63 90 5e cb bc ba | da ba 10 8a c6 0e 8a aa 71 5a 96 4e 6c 70 41 b3 | b5 ed c1 a3 26 f6 9d 2f 3e 30 60 a8 7a d4 51 c7 | c1 d0 6f 12 78 fa f6 7a 64 88 82 80 72 24 ff 23 | 06 91 a9 95 a1 36 33 ce f2 c2 55 d0 b5 3c 49 79 | 6f 7f 3e 42 f0 3e 13 68 8b e1 82 c2 f7 ef 92 e7 | 73 e6 b2 0b c7 04 76 33 01 80 30 de 76 f1 e6 56 | a7 c5 01 91 93 65 f4 09 85 c4 02 fa 63 8b e5 e6 | 21 78 9f 81 bf e4 b0 d6 2d 62 90 d2 7c 1e 4b d9 | ae 42 db a5 3c 94 61 a1 2c 3b 37 25 2d 53 32 5c | 29 00 00 24 9d 5d 40 b5 2d ec 67 ae 83 64 17 c2 | 32 3b d8 b9 21 ed 79 bc f4 91 0a 50 e4 b3 2c c0 | f4 72 58 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 89 bc a1 a0 be dd 06 e7 d6 84 21 | 72 6a c6 f8 b6 a8 a1 51 00 00 00 1c 00 00 40 05 | 53 6b 47 d7 1e 7d 4e e3 0d 3e 41 f7 75 f0 92 15 | 7c 13 7e ba | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8cc0 | #234 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 fd b6 5b dd 65 ca 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #234 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #234 | rejected packet: | f2 fd b6 5b dd 65 ca 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #234: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0785 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0d4c0 | handling event EVENT_RETRANSMIT for parent state #246 | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #246 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #246 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49621.728627; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500392 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8cc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #246 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 "road-eastnet-nonat-246" #246: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #246) | a0 25 29 39 44 0f 25 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 89 2d 00 d4 20 29 db cd 68 77 f7 b8 f4 ff 24 | 1d 5c 36 95 62 d1 6b 2e 7a df 4b 3c 19 93 58 6c | ce e3 80 e5 ca a3 cf cd d3 d9 a2 b5 58 7c 6c 24 | e1 80 e9 fc d5 84 ae 0d 7e ea e8 9d e7 06 ab 00 | 72 40 cb c2 16 e6 8b f6 4d 5d d8 7e 9f 89 2b e1 | 0d a8 b1 ac 98 7a 10 80 97 71 ec 1f c2 1c 60 a0 | 4a 47 2e 26 d4 f8 3f c5 e0 4a c3 e3 ec a5 f8 3d | e3 be 62 c2 d3 a8 de ed 5f db cd 09 f3 df 3a 1b | 2f ae d7 5b 61 a7 b7 f8 35 c0 11 77 df e4 3c 50 | b9 e3 f0 3f 49 55 b1 46 c2 af 2d 77 f7 83 81 bc | 3d 89 16 cb 06 4f 2b 0b 77 6a cd 08 70 dd b2 5e | 34 34 1a 43 20 61 50 18 62 59 04 5a 1c 76 f2 1a | c5 6a 20 de 8a f0 5f 77 96 4b dc b9 ab a2 15 f3 | e6 86 a6 63 09 55 5d af 9f e1 30 a3 28 2a 95 86 | 24 6f f2 be f6 80 d7 fc 17 1b db 4c 69 eb f3 36 | e3 f0 06 e4 5d c6 62 de 3e 20 88 cc a6 63 59 4c | 29 00 00 24 ac df 8c 0e a5 90 d3 52 1f a2 e9 1c | c5 97 45 07 c2 87 cc 4e 1a 76 e7 94 30 33 9e 66 | b7 ac 45 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec f9 d9 bf 03 4f f2 a2 1a a6 75 4a | e9 f5 fc 17 1c 38 34 10 00 00 00 1c 00 00 40 05 | fd 95 24 c3 10 0c 51 95 0e 6e a3 ad 3b a1 a5 1a | 2c 16 a1 31 | libevent_free: release ptr-libevent@0x7fb34803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | #246 spent 0.184 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 25 29 39 44 0f 25 eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #246 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #246 | rejected packet: | a0 25 29 39 44 0f 25 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #246: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad5900 | handling event EVENT_RETRANSMIT for parent state #173 | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #173 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #173 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49621.748136; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006381 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #173 | libevent_malloc: new ptr-libevent@0x7fb34803b0b0 size 128 "road-eastnet-nonat-173" #173: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #173) | a3 dc 1a aa b2 53 81 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 50 c6 a8 2b 15 44 29 7d 0a e3 39 95 9c 54 98 | 15 94 31 dc b2 f4 dc 06 12 a0 ff 21 13 48 30 95 | af bf 2b b8 09 10 1f 12 f1 ba 4e d2 4d c9 b1 a8 | 05 1a 20 e3 76 d4 0d 6b 38 00 2d 67 2b 07 73 be | a7 20 4c aa b8 f7 39 95 13 6d ae b6 ef 79 3a 33 | 8d e1 63 74 10 aa 27 63 ae 0f b0 2c 9f a5 74 21 | 20 ef 3b da 07 cd e1 2a ac 84 10 e1 eb 87 c2 5c | 8c 49 b1 a8 55 4a 0b c6 97 48 c7 fa 85 87 f0 7a | d7 45 9c 5f 2a c6 38 4c 4e a1 54 1f 2a b5 2e 49 | c6 5b 7a b8 69 98 a8 6a 03 80 1c 7f 20 55 e9 fd | 67 3c d3 ce e1 0d bb 8d 6b d2 95 4c af 6b 27 f3 | df f3 c1 d1 42 37 39 82 9f 58 eb 0d c5 ad bb 97 | 84 ff 4d 8a ba d9 60 19 d6 8e a0 cf fa 4d d0 49 | 61 07 20 ea f9 3b 35 e5 ef 25 c3 9f 36 d2 2d 11 | 5f 51 ff fc 25 f0 0e 63 2f a3 a3 cd af f0 c5 be | 34 51 97 11 a8 5a bf 5a f6 22 be 55 c5 08 d3 d9 | 29 00 00 24 12 84 f7 8f dc 17 04 fd a9 ee 45 ef | 2f aa ad ed 39 8e cd ff 76 be dc 7b d9 a9 2b e6 | 08 21 dc 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 b7 38 fa 70 81 30 71 1e 17 26 ac | fb ca c9 c3 02 40 69 eb 00 00 00 1c 00 00 40 05 | 47 2a 00 7e f6 06 aa e7 bc a5 be 89 f2 8d 4b b1 | 1c ba 94 b3 | libevent_free: release ptr-libevent@0x7fb34c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad5900 | #173 spent 0.211 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 dc 1a aa b2 53 81 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #173 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #173 | rejected packet: | a3 dc 1a aa b2 53 81 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #173: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0893 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-251" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-251' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #251 at 0x557d46b2a880 | State DB: adding IKEv2 state #251 in UNDEFINED | pstats #251 ikev2.ike started | Message ID: init #251: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #251: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #251; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-251" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-251" IKE SA #251 "road-eastnet-nonat-251" "road-eastnet-nonat-251" #251: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-251 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-251": constructed local IKE proposals for road-eastnet-nonat-251 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 251 for state #251 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad5900 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #251 | libevent_malloc: new ptr-libevent@0x7fb34c0300e0 size 128 | #251 spent 0.177 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-251" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.267 milliseconds in whack | crypto helper 16 resuming | crypto helper 16 starting work-order 251 for state #251 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 251 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 251 time elapsed 0.000946 seconds | (#251) spent 0.956 milliseconds in crypto helper computing work-order 251: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 251 for state #251 to event queue | scheduling resume sending helper answer for #251 | libevent_malloc: new ptr-libevent@0x7fb36404b5a0 size 128 | libevent_realloc: release ptr-libevent@0x557d46a7e580 | libevent_realloc: new ptr-libevent@0x557d46b2c9f0 size 4096 | crypto helper 16 waiting (nothing to do) | processing resume sending helper answer for #251 | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 251 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #251 | **emit ISAKMP Message: | initiator cookie: | df 3f 41 8a f3 53 d1 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-251 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 05 be c7 da 7c e0 83 1f ee 21 fb 97 63 3a 34 59 | ikev2 g^x 37 0f 13 08 a4 ea d7 d0 84 7f b3 4c 1b d7 fd 64 | ikev2 g^x d7 1b c4 39 0b a3 dc 8b fa 1d 0e 6a 81 2a 3e 09 | ikev2 g^x 69 77 47 fe 6f e7 1c 9d 41 07 43 05 b4 26 e9 60 | ikev2 g^x f3 29 4e c8 f2 da 1b 32 bb 97 33 75 2b 11 a0 c6 | ikev2 g^x 90 b8 73 b2 56 c1 80 3f f7 61 34 26 98 51 70 a5 | ikev2 g^x 88 c0 d8 c1 f3 4f b0 3f 75 1e 72 b1 d1 25 9a 2c | ikev2 g^x fb 27 8d d4 bd e9 f9 05 8f 56 62 b1 eb 23 67 7e | ikev2 g^x 83 41 57 f8 72 a3 e1 9d d8 36 e3 98 b1 13 30 a8 | ikev2 g^x a1 41 78 93 e9 2c e0 32 39 cd 75 d2 0c 43 c2 5b | ikev2 g^x 87 04 ee b5 1e 82 ed bc 9a dc ae f7 d5 db 76 da | ikev2 g^x 37 c9 35 0d 18 56 2e 1c 38 d4 6f a6 b2 28 96 31 | ikev2 g^x 03 0b 4f 71 60 58 12 2e e6 e1 cb 0c 0e 82 e2 ad | ikev2 g^x 8c 61 3a e3 4a ba d8 15 fc ef ca e2 63 cc 17 43 | ikev2 g^x fc 08 79 fe 35 fa e0 53 4c ee 7c 11 7e 46 1e 11 | ikev2 g^x a2 1a 41 cb e0 70 0b 67 d9 3b 63 7b ce 2c 58 e9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 42 a0 3c df af e9 94 45 ab 83 0c a2 5d 7d 94 01 | IKEv2 nonce 25 5c 79 6e 69 bd 19 b2 b1 d1 a1 50 35 69 ea d4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= df 3f 41 8a f3 53 d1 34 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 fb | natd_hash: port= 01 f4 | natd_hash: hash= be 44 4c d9 6f 7f 41 ca 31 72 e4 37 ba 88 35 fa | natd_hash: hash= ba 64 3a 13 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data be 44 4c d9 6f 7f 41 ca 31 72 e4 37 ba 88 35 fa | Notify data ba 64 3a 13 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= df 3f 41 8a f3 53 d1 34 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c3 fb 91 09 59 3d 6b 06 7b be 35 78 ae 35 d3 44 | natd_hash: hash= 75 ba f4 a9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c3 fb 91 09 59 3d 6b 06 7b be 35 78 ae 35 d3 44 | Notify data 75 ba f4 a9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #251 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #251: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #251 to 4294967295 after switching state | Message ID: IKE #251 skipping update_recv as MD is fake | Message ID: sent #251 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-251" #251: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.251:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #251) | df 3f 41 8a f3 53 d1 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 be c7 da 7c e0 83 1f ee 21 fb 97 63 3a 34 59 | 37 0f 13 08 a4 ea d7 d0 84 7f b3 4c 1b d7 fd 64 | d7 1b c4 39 0b a3 dc 8b fa 1d 0e 6a 81 2a 3e 09 | 69 77 47 fe 6f e7 1c 9d 41 07 43 05 b4 26 e9 60 | f3 29 4e c8 f2 da 1b 32 bb 97 33 75 2b 11 a0 c6 | 90 b8 73 b2 56 c1 80 3f f7 61 34 26 98 51 70 a5 | 88 c0 d8 c1 f3 4f b0 3f 75 1e 72 b1 d1 25 9a 2c | fb 27 8d d4 bd e9 f9 05 8f 56 62 b1 eb 23 67 7e | 83 41 57 f8 72 a3 e1 9d d8 36 e3 98 b1 13 30 a8 | a1 41 78 93 e9 2c e0 32 39 cd 75 d2 0c 43 c2 5b | 87 04 ee b5 1e 82 ed bc 9a dc ae f7 d5 db 76 da | 37 c9 35 0d 18 56 2e 1c 38 d4 6f a6 b2 28 96 31 | 03 0b 4f 71 60 58 12 2e e6 e1 cb 0c 0e 82 e2 ad | 8c 61 3a e3 4a ba d8 15 fc ef ca e2 63 cc 17 43 | fc 08 79 fe 35 fa e0 53 4c ee 7c 11 7e 46 1e 11 | a2 1a 41 cb e0 70 0b 67 d9 3b 63 7b ce 2c 58 e9 | 29 00 00 24 42 a0 3c df af e9 94 45 ab 83 0c a2 | 5d 7d 94 01 25 5c 79 6e 69 bd 19 b2 b1 d1 a1 50 | 35 69 ea d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be 44 4c d9 6f 7f 41 ca 31 72 e4 37 | ba 88 35 fa ba 64 3a 13 00 00 00 1c 00 00 40 05 | c3 fb 91 09 59 3d 6b 06 7b be 35 78 ae 35 d3 44 | 75 ba f4 a9 | state #251 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c0300e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad5900 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad5900 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #251 | libevent_malloc: new ptr-libevent@0x7fb34c0300e0 size 128 | #251 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49621.77061 | resume sending helper answer for #251 suppresed complete_v2_state_transition() and stole MD | #251 spent 0.477 milliseconds in resume sending helper answer | stop processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36404b5a0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 3f 41 8a f3 53 d1 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #251 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #251 | rejected packet: | df 3f 41 8a f3 53 d1 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #251: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a63210 | handling event EVENT_RETRANSMIT for parent state #217 | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #217 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #217 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49621.77582; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.022779 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae9fc0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #217 | libevent_malloc: new ptr-libevent@0x7fb36404b5a0 size 128 "road-eastnet-nonat-217" #217: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #217) | d2 36 bf 64 89 a3 fd 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 f4 5b dc ca 6a f6 be c1 c2 c8 63 19 fb 3a 1f | 70 dc de 5b 54 b8 eb 8d 2b 5e fc c2 60 b3 0c b8 | 9b c4 53 f6 87 96 b1 7e c0 8d e1 b0 c0 a3 08 59 | f8 18 05 78 a7 5e f9 f4 d8 1f 45 f9 8a db 9c 99 | 0e 07 3e 2a ba bb 8c 14 d2 d8 55 43 f4 c4 74 29 | 81 f6 ff c1 34 b9 34 a3 97 b9 37 cc 81 87 17 91 | 44 f4 e5 3a 28 aa cc 0c 3a 69 40 14 f6 3b 92 b7 | db 83 50 42 f0 36 82 ac f1 19 7e 5c 4e 90 c6 ec | cf fd 70 a2 a6 79 e2 bb b0 2b b1 df 8d e0 62 86 | 52 eb e4 a9 60 bc ec b9 d7 99 33 ce 9f d2 75 d6 | ea 82 29 7d d5 df f1 81 05 f9 8d d7 ff 39 0b 3b | 2c fe 6f 59 ae d2 c3 c5 12 3f 62 54 ed fc 61 4f | c2 74 90 8a b6 79 a0 b5 31 fc 8c d5 cb 45 21 48 | b0 1d 10 ec cf 2a b3 30 35 95 3b 32 3a 79 8c 33 | ab 0a b9 7d 4f 43 6c 9b d9 20 e5 7e 28 a9 95 05 | ed 38 6d f0 1a 10 8c 41 cd 59 c0 e4 ec 28 25 e4 | 29 00 00 24 50 f4 8b cc 88 78 9a 77 ca 06 50 f2 | 60 9a 06 39 64 9a 92 2a 1d 6a 83 ae 2a 35 88 82 | 1c 3d 43 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf a3 05 4d ff 0f f5 da 0b f8 e7 54 | e5 88 17 6e 1b 78 5e cb 00 00 00 1c 00 00 40 05 | 9b 1b 06 2c 11 9c 55 41 9d b0 16 46 62 0b cd 66 | 9f 92 84 50 | libevent_free: release ptr-libevent@0x7fb35c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a63210 | #217 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 36 bf 64 89 a3 fd 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #217 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #217 | rejected packet: | d2 36 bf 64 89 a3 fd 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #217: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.073 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7e4d0 | handling event EVENT_RETRANSMIT for parent state #61 | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #61 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #61 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49621.782192; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005991 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a63210 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #61 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 "road-eastnet-nonat-61" #61: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #61) | f7 bc 52 c3 08 41 7d fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 a3 fc 88 6c c9 17 99 e8 c8 f4 84 4b dd e6 d6 | a2 3c cb b6 7d b8 4b 73 4d d1 4a 52 0a 17 63 b0 | ce a1 f6 5b 22 20 08 31 0e da ec fd b8 c2 13 f9 | b7 0d 78 21 3f 05 bc f7 2c 5a 0e b5 1a 70 bf 53 | b0 72 5e 64 9f c9 e5 f6 6b aa f3 db 8b b8 b8 b3 | f6 f8 ae 22 20 f7 35 9c 39 6d 5a ba 98 af 4b 1d | 6d d4 8e 29 87 bb 7a 2b 6b 4a b8 79 51 26 39 b0 | 6a 6c be 49 5f 57 bf 03 7a 6e 7f ac 45 f9 af fb | a3 06 52 bf 07 ef a5 db 3d b8 9b 73 f0 8e b1 76 | 2b 5d b7 93 de 9f 59 44 c1 67 8a 9a a5 50 66 6c | 27 3e 5e 44 b1 e9 13 dc 81 57 82 47 20 a2 32 79 | d4 b0 d6 87 f1 f1 20 bf e9 93 fc 11 dd 5e 42 b0 | a4 4f 0e f8 93 a1 1c a5 59 56 db 69 8d ca d0 53 | 78 b2 af e6 28 15 c5 c9 00 fd bf f0 33 a6 bf 2d | 7e 87 d7 d1 a0 82 65 91 eb 3c cf d0 6f fb 0e 4b | 57 a1 5c 8a 3f 3c 13 19 f1 bc 6c 89 96 42 e0 e9 | 29 00 00 24 30 62 04 12 b8 d1 41 8a 1d 82 4c c7 | f3 e8 92 81 d6 0e cc 31 5a f2 7c 04 56 a0 26 04 | e6 c5 8a 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 04 89 46 c0 2a 68 09 d3 b8 a6 1e | 7d d4 48 56 88 7a 56 d6 00 00 00 1c 00 00 40 05 | bb 1e 0b f8 57 9c 2b 42 0a de e4 96 f3 8b 61 81 | fa a3 7d bc | libevent_free: release ptr-libevent@0x7fb374024f80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | #61 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 bc 52 c3 08 41 7d fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #61 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #61 | rejected packet: | f7 bc 52 c3 08 41 7d fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #61: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0705 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a88140 | handling event EVENT_RETRANSMIT for parent state #243 | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #243 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #243 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49621.785548; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.998214 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #243 | libevent_malloc: new ptr-libevent@0x7fb374024f80 size 128 "road-eastnet-nonat-243" #243: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #243) | 39 d2 8c 3c d9 9b d0 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 7c 7b 28 d8 43 9d a6 57 48 f3 56 58 a9 96 02 | 89 eb 92 ba df fe 7c b4 93 87 0a 15 04 96 3d d9 | 97 4f ed fb da 47 e0 91 75 a8 ae 92 a4 07 c6 b2 | 54 7e 3f f7 5a ab 2d 86 ec bf b6 60 fc b0 e0 42 | 42 76 7a 8f aa 4f aa 15 dc 06 c4 c5 a6 64 c4 cb | cc bb 4c d4 38 55 bd b1 4e f2 bf cc 48 b4 72 4f | 87 59 b4 0f 7e ed 03 f1 41 ee a8 6e 5e c8 2d 73 | 30 2b 8d ba 0f 00 07 b3 03 3d 8c 71 2e 4d 64 94 | 7c 2a 25 17 eb 7f f4 7c 3d ac 47 e3 e8 64 b3 1d | 93 52 33 b4 60 d2 91 0a df 53 00 a1 04 e7 82 d1 | ba cb 66 13 49 96 51 fe 75 53 10 a1 e8 ed 85 c1 | 24 57 8f 5c 2d ab 6e 1a d8 d2 18 48 42 bf 96 fc | f2 c5 7f a1 3d 7c 8d 10 dd 4d fc 0c 94 ce 13 b9 | f3 c9 49 d3 a2 9b 04 c3 51 ef 2c 4a 1d 70 85 00 | f9 d1 0e 6b 0b 48 a0 fc 89 8f e7 8e 83 74 57 7a | c9 0c 8d f3 c6 50 96 a3 99 76 7c eb ac 17 30 58 | 29 00 00 24 35 b2 35 5f d9 02 63 3b 19 19 86 78 | 0e 3a e9 6c 99 53 dc 00 7c 7f ad 46 fe dc 4c 82 | 97 17 87 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 31 4b 64 ab 4a 78 81 95 90 fa 46 | 73 84 e5 27 1c 47 ef db 00 00 00 1c 00 00 40 05 | 94 bc 64 25 b1 da 5d db 67 02 68 07 a8 c5 47 cd | f9 c3 f5 ed | libevent_free: release ptr-libevent@0x7fb38001abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a88140 | #243 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 39 d2 8c 3c d9 9b d0 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #243 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #243 | rejected packet: | 39 d2 8c 3c d9 9b d0 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #243: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.068 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #174 | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #174 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #174 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49621.821669; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00937 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a88140 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #174 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 "road-eastnet-nonat-174" #174: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #174) | 91 36 4b 21 8c e3 c8 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 dd c5 98 91 80 2f bf e7 2b 43 43 70 f9 1c a2 | 78 b6 0b 56 89 c7 17 d8 c4 a4 ed 43 14 68 00 55 | ee dd ad 6d 8a 38 ba ad d9 23 b7 9e bb 3d 86 07 | ed 16 db de b0 44 67 be ba 65 0e 96 fd 54 eb cc | d4 d8 f1 83 4a 85 62 b4 81 ea c9 6f d6 2b 35 08 | 27 1d 44 b3 72 05 f6 d5 ee 0e c6 0c ad 30 dd 17 | d5 9d 92 9d 6e 7c 3d b9 06 e4 e1 7a b8 af 86 7e | 60 5c 18 1e 77 1f a3 0b 6c 39 63 8e 3b e2 37 7b | 90 c4 a3 0b 91 18 0b 29 93 4d 27 18 cf a4 37 53 | b6 2a 69 e7 1d 14 6c 93 05 8e 44 d8 16 2f a7 9f | 79 72 c5 dc 33 34 fc 0e b4 98 f8 e3 05 25 fe de | b4 63 51 46 dc 88 2d 12 37 aa 30 40 1c da d8 aa | d1 04 09 9e 82 a0 ef 0f 6a 96 1b 9b 72 30 77 32 | 93 8b f7 e8 2a a0 a2 dd 84 00 ba 24 75 30 17 4b | 8e 71 da c7 7b bd 41 ab b9 40 da db 82 29 9b 27 | d8 26 4c cc a8 73 89 de dd ff 26 53 c5 6f 01 3f | 29 00 00 24 cd b7 f1 c7 48 65 7b d0 51 fe 51 f7 | 71 0f cd 4b 00 33 35 86 2b 0b ad 56 3c d5 7d aa | 0f f5 4e e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 08 52 e7 44 c5 f0 65 19 f6 45 55 | b4 2d dd 6f 21 a4 bb e8 00 00 00 1c 00 00 40 05 | 78 4d 37 08 7f b6 6b 98 3a f8 5f d9 3e 81 c3 c7 | 93 cf d6 90 | libevent_free: release ptr-libevent@0x7fb374040670 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #174 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 36 4b 21 8c e3 c8 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #174 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #174 | rejected packet: | 91 36 4b 21 8c e3 c8 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #174: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0691 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc00 | handling event EVENT_RETRANSMIT for parent state #62 | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #62 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #62 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49621.850847; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009217 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #62 | libevent_malloc: new ptr-libevent@0x7fb374040670 size 128 "road-eastnet-nonat-62" #62: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #62) | a4 88 8e 77 b1 f4 8c bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 16 5e 67 aa cb b3 98 fe b6 e6 44 1a 07 e2 be | 44 c7 a0 47 e1 e7 ec b4 60 c9 7d b0 5b 56 2d 1b | e4 9a 0e 63 18 22 7a fa a9 c7 63 82 b0 af 0b 0d | 77 29 15 f5 8e 1b 69 90 f4 7c 19 86 79 0a 5f e8 | f6 12 ff 9f 31 22 5c e3 f7 e6 5c 40 a8 f4 37 ed | 38 af f3 38 7f df 64 d9 95 08 2b d7 e3 b5 1f 60 | 26 37 fe 9a 98 33 04 94 0b 0e 07 08 c5 5e 7d f8 | c0 0f 76 eb 24 9a 96 24 01 c7 9b fd dc 2c ed 1c | 7f 8c f6 fb 9d b0 c1 a4 53 e2 53 da 53 65 1f 9e | 4e d5 a4 5d a2 34 99 86 95 17 7b b9 d0 eb c5 9a | 7a c4 fd c2 ec 45 e1 8d 1b 55 bb 91 5f 61 39 83 | ed 3e fd ec 0b 7f cf a5 d0 34 4d 78 f0 19 f9 dd | 25 c0 20 38 67 61 04 4f 0d 51 42 43 cb 7c 44 01 | 6b 99 d1 a6 d3 b1 5e 29 d8 c7 53 4a 9e 9d fe 70 | 66 03 05 bd 1d 96 be 53 72 9a fa 30 50 08 24 ae | eb 69 31 f0 f7 2f d9 1c ab 9d 37 cd ad 7a ed 6a | 29 00 00 24 0c 26 e7 cd 38 ca 58 e6 02 58 43 30 | ae e2 2c 6c 6d 36 d5 ae 9b 11 96 a7 26 d9 7a c2 | 05 18 d0 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 28 4f 82 49 71 8c 73 8e 61 ba dd | 8f a7 28 9b 76 c2 13 ce 00 00 00 1c 00 00 40 05 | 01 46 1c d3 66 df 29 38 51 83 6e 7c d6 51 6d 46 | 6c 4e be 2f | libevent_free: release ptr-libevent@0x7fb3780300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc00 | #62 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 88 8e 77 b1 f4 8c bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #62 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #62 | rejected packet: | a4 88 8e 77 b1 f4 8c bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #62: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0721 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56e30 | handling event EVENT_RETRANSMIT for parent state #247 | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #247 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #247 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49621.854199; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501175 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #247 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 "road-eastnet-nonat-247" #247: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #247) | 5d 14 02 50 68 e1 05 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 49 8a 2d d4 33 c0 d7 bc cf 08 ab af 13 85 8e | 9a 12 a5 cd 3b 66 31 91 51 03 92 de 96 84 44 92 | 2f 58 74 2e ab 28 ea 0d 4e f8 e3 ae 21 e6 45 c8 | 43 4c d5 50 a9 19 c3 44 67 b2 10 6b 79 6d 94 47 | fa 38 4e 33 78 ee e7 d3 9c 31 e4 3a 0a 97 fc f9 | af cb 80 37 57 a0 1b c2 09 c2 31 8b fc c7 0b 20 | de c6 8f fd b8 6b 84 a5 39 ac f6 54 bc 56 ef 0f | 64 4c b3 c3 15 1d ff 22 52 dd 24 dc a2 84 2b db | e1 cf 6b 7a 77 75 72 44 46 ba 71 64 0d 1e 05 41 | 6b 10 ff 59 ad 5c e4 40 01 51 72 36 a2 b0 08 e3 | a6 82 a9 79 20 45 b1 f4 1e 13 22 a0 f1 4f 23 23 | 9c e9 d5 77 c7 56 3c 45 ca 5c a9 1c b1 68 03 08 | a1 eb f6 b1 e5 5b 6c d6 3f 31 2a ba a0 3e 1f d2 | a5 29 ae bf 59 de 0d b4 a3 d2 df a5 98 9f 76 2c | 4f cf 7a 3e 6d ac 96 b0 e7 e5 ce f6 05 40 9c 9b | 09 66 cd 5d b1 dd cb f0 23 07 ad be 0d 42 b6 2e | 29 00 00 24 ef c2 8a a6 2e c6 51 78 10 63 06 58 | ba ed 73 0f a8 fa 21 72 a3 1c 39 ab 2c 37 74 08 | 1a c5 f7 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 eb f7 f6 58 75 8d be 43 b7 49 b8 | cd 30 58 5c 95 8f b2 8d 00 00 00 1c 00 00 40 05 | 15 66 60 c0 d3 3c e7 68 f4 56 38 e9 31 35 3c 02 | ee cd 1d 4a | libevent_free: release ptr-libevent@0x7fb3680251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56e30 | #247 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d 14 02 50 68 e1 05 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #247 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #247 | rejected packet: | 5d 14 02 50 68 e1 05 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #247: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #235 | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #235 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #235 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49621.897148; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00266 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56e30 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #235 | libevent_malloc: new ptr-libevent@0x7fb3680251c0 size 128 "road-eastnet-nonat-235" #235: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #235) | 7e 07 6a 55 b2 86 f9 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 15 b0 98 97 a3 9b e7 91 af 63 8f 32 c2 f0 a6 | 5a 92 40 40 d6 e9 e6 fc ec 5f 9d 94 27 3d 04 cc | 99 dc 7e ac 23 a0 7a 25 ef 03 33 84 5f 4e 3e 44 | ab 45 fc 51 2f 77 0e 04 9c 57 58 3e e3 c4 95 ac | 99 c6 cf 74 8b ee 49 3f 97 64 5a ae 23 26 21 49 | 82 68 17 68 04 08 36 f9 22 38 ec 23 ce 8f 41 44 | bf d0 3d c1 f8 23 b3 6a aa 39 20 ad 4f 3f f3 2b | 3d f9 49 23 b6 22 6b 6a 39 8a 61 bb b3 33 4a 8f | 12 ce 51 75 41 2f c2 97 7c 24 15 e6 c7 4c 0b 5a | 7e 98 8c f9 eb 79 4c 87 18 6e 22 0f ce f5 5a f4 | 97 f7 88 3c 20 6b 59 a3 22 56 0b 5d ff 73 43 0c | d0 ab c4 fb b1 97 4e c1 93 9b 6a 7d 3a c0 41 34 | 56 74 13 c4 02 0c 52 4b 7f 7c ed c1 a7 58 84 db | 34 3e fa dc e2 91 c8 b6 c5 5f f0 1a 94 9c 21 62 | 9c 24 2a b8 60 58 3a 4f ea 5e 65 e5 c2 96 45 62 | b2 a3 11 26 4c 94 9a fb e2 2b 93 1c 4f 08 c6 66 | 29 00 00 24 0c f1 17 b1 15 6c 67 72 28 b0 8f 38 | fd 2e 9a ff fb 4a d4 a7 a7 b2 00 ff 88 fe ef 90 | e3 f8 e6 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 78 bf 00 5e f0 c9 41 6d 35 37 22 | b0 4c f8 53 8c eb 59 4e 00 00 00 1c 00 00 40 05 | 6e 5c 6f da 69 07 20 20 73 2e b2 7c a0 00 c1 c2 | 79 44 3d 62 | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #235 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aecb40 | handling event EVENT_RETRANSMIT for parent state #175 | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #175 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #175 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49621.897343; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005424 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #175 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 "road-eastnet-nonat-175" #175: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #175) | 12 29 28 fb 65 9c c2 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 ef d9 b0 55 d5 14 e7 83 ea 0c 0f eb c0 4d b2 | 18 36 c3 0d 3c 5f 0d a0 d7 f5 a9 e8 30 23 62 2f | 3d 90 5e 25 d3 54 b3 8c d3 ab 1c d3 33 34 03 78 | 85 cd 74 0f 8e 35 c2 5d e8 af fd 9d 00 2e ac e4 | 84 d5 07 fd 55 8c 43 bf 89 61 dc 61 43 3c cd 62 | c3 a0 1f 02 31 0b 07 a5 78 c5 10 08 e8 a4 7f 16 | 2c ae 5c 93 2d 6e c4 24 f5 3a 2e c6 c8 6f 2e ed | e3 0a 8d 68 b0 44 75 d4 95 53 f7 73 cd 7d 6e 84 | d1 e9 9a 86 1e 26 9e 3c d7 df ee 11 ad 66 97 c8 | d5 8e 03 f4 d8 ef b9 76 f2 13 a1 73 f1 c4 5a 4e | 4f 30 eb 7b 7a f1 c0 eb 65 91 cf a9 f3 ae 0d 25 | 9b ee 1e 21 c2 ad 7e f5 01 73 92 f7 51 aa 80 fe | 91 d2 a8 9c 23 90 be c1 3c 6a f1 41 0c 91 0d 9d | 20 55 1f c9 0c b7 77 36 a0 ac 09 f3 01 de b4 91 | 94 8a 20 8c 1f ad 5f d7 63 70 2d 9a bd f2 8c e9 | fc ac 2d 5f 45 8f 88 b9 47 ef 43 3d 71 ea 60 f1 | 29 00 00 24 97 30 3a 8f 02 71 88 b4 dc ed 53 7a | 89 3f 00 b1 2f 4a 80 0e 10 53 03 26 85 ad 54 ab | da 16 12 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 ca 83 64 e4 50 88 08 79 37 9f 8c | 5a be 7c 44 1e d9 01 29 00 00 00 1c 00 00 40 05 | 4a 03 e5 d4 1c 09 77 92 d5 8c 25 e7 2e 76 d9 45 | 5b fb 35 ac | libevent_free: release ptr-libevent@0x7fb35c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb40 | #175 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 07 6a 55 b2 86 f9 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #235 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #235 | rejected packet: | 7e 07 6a 55 b2 86 f9 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #235: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 12 29 28 fb 65 9c c2 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #175 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #175 | rejected packet: | 12 29 28 fb 65 9c c2 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #175: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.056 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-252" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-252' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | creating state object #252 at 0x557d46b2be40 | State DB: adding IKEv2 state #252 in UNDEFINED | pstats #252 ikev2.ike started | Message ID: init #252: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #252: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #252; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: connection "road-eastnet-nonat-252" (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | dup_any(fd@-1) -> fd@-1 (in ikev2_parent_outI1() at ikev2_parent.c:551) | Queuing pending IPsec SA negotiating with 192.1.2.23 "road-eastnet-nonat-252" IKE SA #252 "road-eastnet-nonat-252" "road-eastnet-nonat-252" #252: initiating v2 parent SA | constructing local IKE proposals for road-eastnet-nonat-252 (IKE SA initiator selecting KE) | converting ike_info AES_CBC-HMAC_SHA1-MODP2048 to ikev2 ... | forcing IKEv2 PROTO_v2_IKE aes ENCRYPT transform high-to-low key lengths: 256 128 | ... ikev2_proposal: 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 "road-eastnet-nonat-252": constructed local IKE proposals for road-eastnet-nonat-252 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 252 for state #252 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aecb40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #252 | libevent_malloc: new ptr-libevent@0x7fb35c0407f0 size 128 | #252 spent 0.159 milliseconds in ikev2_parent_outI1() | processing: RESET whack log_fd (was fd@16) (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | RESET processing: connection "road-eastnet-nonat-252" (in ikev2_parent_outI1() at ikev2_parent.c:610) | processing: STOP connection NULL (in initiate_a_connection() at initiate.c:349) | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.245 milliseconds in whack | crypto helper 4 resuming | crypto helper 4 starting work-order 252 for state #252 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 252 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 252 time elapsed 0.000988 seconds | (#252) spent 0.994 milliseconds in crypto helper computing work-order 252: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 252 for state #252 to event queue | scheduling resume sending helper answer for #252 | libevent_malloc: new ptr-libevent@0x7fb35804b7c0 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #252 | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 252 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #252 | **emit ISAKMP Message: | initiator cookie: | 50 58 54 7e 04 4a db ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-252 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 77 00 2c be 68 01 bb 0f 58 1a 16 c9 1d 14 15 83 | ikev2 g^x 19 e0 b8 46 87 82 81 55 0f dc 16 6a 8b 3d e4 4d | ikev2 g^x 0c e9 b2 bb 22 a5 95 09 ff 11 50 af 23 66 83 f2 | ikev2 g^x 31 7e 02 6d d7 48 dc 83 9d bb 70 c0 3a 92 f4 c0 | ikev2 g^x 9a e6 0b 57 02 38 84 8a 91 5b b5 ae 3c f3 73 1a | ikev2 g^x a4 24 27 15 5b c6 51 0e da 95 77 0a bb 05 7d 91 | ikev2 g^x af 25 45 22 0e b2 f2 4f fd 42 9b d1 98 1f 5e 0f | ikev2 g^x dd f0 f2 19 b9 ea ba ee 11 21 ee b6 0c 0f c9 55 | ikev2 g^x 03 18 8b f7 b4 d9 1d 6b 99 70 65 d0 5f 1e dc 40 | ikev2 g^x 4c 0a 83 ea e9 69 a1 18 51 d4 d2 fe 11 46 10 47 | ikev2 g^x b7 70 71 e5 e6 a8 cb f1 92 74 f2 25 34 f1 2a 20 | ikev2 g^x 05 8b f0 31 b4 4d ec 75 25 71 1f 16 3f cb 5c 38 | ikev2 g^x 5c 6a 40 df be e7 8c 81 eb 7e b2 34 69 d7 27 e3 | ikev2 g^x f2 93 a6 4e c8 e4 03 ff 2e ce ce ed 7f ee 01 95 | ikev2 g^x 24 0e cb ce 0e 6f 39 0e 07 c6 d8 ca 80 7d 23 cb | ikev2 g^x 6a 28 32 82 38 d2 86 f0 3f 31 6d 12 83 e3 4e 38 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 18 de 08 18 c8 a2 29 e1 d8 0d de 97 0b 9b 22 3a | IKEv2 nonce 3d 4c 80 05 7e b8 73 ae 1d 84 d5 68 cf f8 f7 ff | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 50 58 54 7e 04 4a db ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 fc | natd_hash: port= 01 f4 | natd_hash: hash= fc 65 87 e0 56 8f 33 84 b6 65 68 e9 21 de 15 28 | natd_hash: hash= 76 56 f7 ec | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fc 65 87 e0 56 8f 33 84 b6 65 68 e9 21 de 15 28 | Notify data 76 56 f7 ec | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 50 58 54 7e 04 4a db ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9e 72 e4 22 38 66 37 d3 ad ef a1 2e a9 f7 f8 37 | natd_hash: hash= 54 d6 26 3e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9e 72 e4 22 38 66 37 d3 ad ef a1 2e a9 f7 f8 37 | Notify data 54 d6 26 3e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #252 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #252: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #252 to 4294967295 after switching state | Message ID: IKE #252 skipping update_recv as MD is fake | Message ID: sent #252 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-252" #252: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.252:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #252) | 50 58 54 7e 04 4a db ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 00 2c be 68 01 bb 0f 58 1a 16 c9 1d 14 15 83 | 19 e0 b8 46 87 82 81 55 0f dc 16 6a 8b 3d e4 4d | 0c e9 b2 bb 22 a5 95 09 ff 11 50 af 23 66 83 f2 | 31 7e 02 6d d7 48 dc 83 9d bb 70 c0 3a 92 f4 c0 | 9a e6 0b 57 02 38 84 8a 91 5b b5 ae 3c f3 73 1a | a4 24 27 15 5b c6 51 0e da 95 77 0a bb 05 7d 91 | af 25 45 22 0e b2 f2 4f fd 42 9b d1 98 1f 5e 0f | dd f0 f2 19 b9 ea ba ee 11 21 ee b6 0c 0f c9 55 | 03 18 8b f7 b4 d9 1d 6b 99 70 65 d0 5f 1e dc 40 | 4c 0a 83 ea e9 69 a1 18 51 d4 d2 fe 11 46 10 47 | b7 70 71 e5 e6 a8 cb f1 92 74 f2 25 34 f1 2a 20 | 05 8b f0 31 b4 4d ec 75 25 71 1f 16 3f cb 5c 38 | 5c 6a 40 df be e7 8c 81 eb 7e b2 34 69 d7 27 e3 | f2 93 a6 4e c8 e4 03 ff 2e ce ce ed 7f ee 01 95 | 24 0e cb ce 0e 6f 39 0e 07 c6 d8 ca 80 7d 23 cb | 6a 28 32 82 38 d2 86 f0 3f 31 6d 12 83 e3 4e 38 | 29 00 00 24 18 de 08 18 c8 a2 29 e1 d8 0d de 97 | 0b 9b 22 3a 3d 4c 80 05 7e b8 73 ae 1d 84 d5 68 | cf f8 f7 ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 65 87 e0 56 8f 33 84 b6 65 68 e9 | 21 de 15 28 76 56 f7 ec 00 00 00 1c 00 00 40 05 | 9e 72 e4 22 38 66 37 d3 ad ef a1 2e a9 f7 f8 37 | 54 d6 26 3e | state #252 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c0407f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aecb40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #252 | libevent_malloc: new ptr-libevent@0x7fb35c0407f0 size 128 | #252 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49621.900514 | resume sending helper answer for #252 suppresed complete_v2_state_transition() and stole MD | #252 spent 0.472 milliseconds in resume sending helper answer | stop processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35804b7c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 58 54 7e 04 4a db ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #252 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #252 | rejected packet: | 50 58 54 7e 04 4a db ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #252: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469defe0 | handling event EVENT_RETRANSMIT for parent state #63 | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #63 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #63 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49621.917185; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.012778 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af3800 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #63 | libevent_malloc: new ptr-libevent@0x7fb35804b7c0 size 128 "road-eastnet-nonat-63" #63: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #63) | 43 a8 4d 01 ec 36 de 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa e2 93 e3 30 a1 06 ee b4 85 58 c9 2f 9d d0 1a | ad 38 32 dc 30 89 d1 a0 98 57 8d 01 77 84 b3 55 | 47 fd ae cc e0 a9 2a 35 58 f1 6a 27 c8 b7 88 d3 | c3 78 1e 95 37 0b 81 ee cb 00 02 38 fb 0c bc ff | 55 19 c6 c0 be 69 d1 78 c8 9a ae e0 96 6c 3f 9b | 54 61 8c 4b 6b 45 ac 74 a1 6d f1 1d de 9e c2 52 | 40 62 38 7c 4d c1 06 5c f5 e4 71 d5 c6 8f eb 8d | a1 58 7d a8 05 d7 f2 d1 12 1f d4 be 60 08 06 1f | 2a 4d 28 f0 ba 0e 77 13 d0 8f 4c 08 fc 37 3f 98 | 37 6b f8 7a b1 44 d3 8b 12 01 3a e0 ab 1c 6f 72 | d8 5a cc 1f f0 ef fd b0 38 cb c0 2b 70 72 dd 77 | 20 94 89 cc 24 42 7c 89 06 09 17 e9 b7 42 85 43 | b5 81 b7 cc a1 a3 3a 6b b1 18 c1 ec 8a 13 0d f9 | 71 43 3d 9a 1f 64 16 b7 2b bd 29 ea 9f 4f 17 43 | a8 18 9f fc 5b 56 59 fa 46 4c 5d 82 89 28 f2 04 | 51 6c b3 97 3a a5 95 f1 fd 87 8b 14 08 ce a0 6b | 29 00 00 24 42 95 7e 08 3c e5 ab b4 d2 f9 ef 7f | d8 0c 96 cd c4 ca c3 e4 35 0f 70 37 5f 05 86 60 | 4b 19 91 ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 ed eb 0b 29 2b d1 a0 42 dd cd 92 | 88 75 fb d1 70 51 78 cf 00 00 00 1c 00 00 40 05 | a8 06 2d d1 ac 32 5a b6 7e b8 ae d6 ec a9 34 27 | 7d 9e 90 d0 | libevent_free: release ptr-libevent@0x7fb37c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469defe0 | #63 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 a8 4d 01 ec 36 de 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #63 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #63 | rejected packet: | 43 a8 4d 01 ec 36 de 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #63: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0679 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47ed0 | handling event EVENT_RETRANSMIT for parent state #218 | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #218 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #218 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49621.925582; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005471 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ecc0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #218 | libevent_malloc: new ptr-libevent@0x7fb37c0300e0 size 128 "road-eastnet-nonat-218" #218: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #218) | fc 84 28 e6 d0 d4 a3 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 d7 19 e0 b8 a7 81 99 33 01 41 39 ef 55 14 82 | 36 e8 1e 6f 78 81 cb 8b ba 30 50 9b f0 49 c2 8d | 4d b2 2b 95 f1 d8 28 60 35 5d 42 53 4d 43 c7 8c | 4f 74 15 45 95 27 14 77 eb 50 5d 4a f6 fd be ee | 3c 1a 88 ee 70 83 66 98 31 0a fd ad 4a 03 b5 37 | 5d 2e 93 bd 7a be 39 56 60 d9 aa 84 79 74 3d 0e | dc e3 b7 0b 24 c5 94 3d 31 8b f6 0e 82 f6 06 b8 | 26 12 7e 3f 3e d6 7d b6 51 ee ad b2 d2 ab 27 77 | 53 f8 1e d7 91 5f 2a 81 5e 4e 7d 22 21 5e 55 9c | c3 53 13 8f 2a fb e3 93 47 36 6a 2c 3e 5b e2 b0 | 72 17 1d b0 34 33 da 2e 57 d4 77 d4 d7 37 4b 04 | e0 fd 56 ba 03 09 e0 ee 03 55 18 7a 06 0c cf 4c | 2a 51 58 97 6d b9 c7 55 61 75 dd e7 d8 0d 3a 1d | 49 6c f2 e4 06 70 89 d9 24 cc ed 33 51 12 2c eb | 69 6c 48 51 d3 c5 03 79 af 69 1b 7c 09 b9 68 90 | b7 fa 26 e6 18 f8 80 d5 96 f3 c9 3f f4 18 bb d2 | 29 00 00 24 11 b2 a5 5c a6 46 80 f9 3d 23 f2 ab | ce 5d 83 0a f1 1a 01 82 7c 29 4c e1 e5 d0 ae 3c | 95 98 eb 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4f 29 50 5e 23 8d 7d 6b 34 9f ff eb | 11 dc 43 b6 12 c1 95 47 00 00 00 1c 00 00 40 05 | a7 99 e5 52 4c 36 7b 61 4e b2 63 45 25 bf 82 23 | 34 fa af bb | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47ed0 | #218 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 84 28 e6 d0 d4 a3 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #218 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #218 | rejected packet: | fc 84 28 e6 d0 d4 a3 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #218: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47f10 | handling event EVENT_RETRANSMIT for parent state #248 | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #248 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #248 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49621.964957; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500521 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47ed0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #248 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 "road-eastnet-nonat-248" #248: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #248) | 0a 60 4f 04 ec 5d f9 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b 96 4e 6b 1a 47 f3 29 f4 97 63 43 e3 c7 7c c2 | b5 40 35 82 f8 ae 61 14 ae 37 68 84 b3 6c 17 bd | e2 38 fa 08 01 a0 06 e7 9f 6c ca f7 e0 61 70 92 | 35 69 98 cb 13 b9 35 de 14 7b 48 01 ca 16 d2 a3 | 8a 8d f7 e5 16 28 68 18 42 b1 0f f2 66 75 2f 1f | 92 e4 b0 69 36 a2 b4 75 60 ca a5 a2 69 6d e6 5d | 46 24 17 68 8a bc 97 e8 9e ee 7a 06 d8 89 ea da | 29 95 98 02 98 06 f1 21 8f de de a8 b1 db 6b e4 | 16 54 6a d8 f1 bf 06 c3 2a de 4c 0f 1e 69 c7 60 | 71 82 15 35 09 a6 80 73 54 ab 5a 82 af 1b da 3b | c5 0a 69 1d 72 1d bd 02 fa 14 6a b4 37 14 ab b1 | 6c ef 68 fb 08 a8 b0 c6 58 93 07 45 93 1f 0d 53 | 5a 7c 44 c6 e8 cb d0 e7 6c 54 5d c1 89 3a e8 2b | e2 33 79 6e fa fd a1 8c dd 41 32 f8 12 7c 52 d0 | ef b1 cc 9f e3 23 da b6 ea 6c dc 48 7a 7e 45 73 | a1 ca 75 fd a6 b2 28 b4 4d de 48 05 30 76 df f1 | 29 00 00 24 da d0 88 5b 97 8e 08 a8 b2 aa 35 1a | a0 f5 0d fa 05 bb 67 43 a9 98 40 73 a9 62 0f f1 | 91 cf ba 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 42 31 df 79 b8 d9 7f 21 24 fd aa | 74 f3 12 b0 e3 0d 96 52 00 00 00 1c 00 00 40 05 | 1d 11 c7 78 91 0f ef bb 0b 1a 85 c0 59 35 e2 cd | c1 30 49 b7 | libevent_free: release ptr-libevent@0x7fb37801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47f10 | #248 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0a 60 4f 04 ec 5d f9 e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #248 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #248 | rejected packet: | 0a 60 4f 04 ec 5d f9 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #248: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa0940 | handling event EVENT_RETRANSMIT for parent state #244 | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #244 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #244 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49621.96931; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000873 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #244 | libevent_malloc: new ptr-libevent@0x7fb37801d920 size 128 "road-eastnet-nonat-244" #244: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #244) | 4b f1 49 87 f9 a6 76 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 99 c6 ce 30 f7 89 45 59 4d 59 48 bc e8 db b7 | 6e 51 73 db f1 50 f0 84 78 35 a5 96 97 1e cf a2 | ba 46 c2 c3 3c f1 3a 6e 96 bf 5f af 7c b4 86 ff | c1 77 25 46 ad 5b ec 41 ea 88 d5 b2 00 e8 44 78 | 0e 9f 1e 30 ef 44 2c 78 1a e7 51 e7 d9 ad 9d e1 | 0d 69 bb c8 c6 a9 e9 4f 0c d7 5e 29 38 5c 8e e0 | 8e 7c a8 b7 93 d1 97 5f 38 52 c5 7b 09 49 6a 76 | 8a 53 22 ab 09 ab d7 9d 44 f6 cf 05 91 df 27 29 | 68 68 78 b8 7a 10 b4 e5 9b cb 01 8d f1 35 fc c7 | 7f 8f 0c 26 0d 68 38 58 4d f7 b1 9e 96 4e 4d c2 | 24 dc 6f 1f 81 ff 16 30 89 d9 d3 07 46 98 c4 17 | fc 99 c1 d0 c2 70 9e d5 7c 43 6d 12 f3 10 9e 43 | 41 f8 15 2e de ff 3f c8 97 02 5f 67 73 89 79 ac | 6a 34 e1 ed 55 83 46 98 af 4b eb 61 ab ed 9c 2f | 3c d3 92 2f df 77 9f 98 51 e0 24 45 80 51 7a 35 | d5 76 40 ee 59 99 54 8f 46 a1 fc 48 cb 2a 6a 64 | 29 00 00 24 23 47 a6 9f de 30 3b be 65 32 63 50 | 62 d5 89 0b d7 3d ea 19 da 4e 55 f9 53 26 8c d3 | 8a e5 35 df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 5e c3 f3 c5 40 cc e2 50 93 80 f8 | 58 99 fe 09 2c 8c 43 58 00 00 00 1c 00 00 40 05 | 42 a9 a5 4e 6c 3d 71 a6 0f 5e 70 c5 17 4e 52 56 | 03 54 70 77 | libevent_free: release ptr-libevent@0x7fb3380300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa0940 | #244 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b f1 49 87 f9 a6 76 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #244 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #244 | rejected packet: | 4b f1 49 87 f9 a6 76 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #244: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000d120 | handling event EVENT_RETRANSMIT for parent state #176 | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #176 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #176 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49621.971627; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004601 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa0940 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #176 | libevent_malloc: new ptr-libevent@0x7fb3380300e0 size 128 "road-eastnet-nonat-176" #176: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #176) | a4 22 94 6b b7 90 01 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 06 20 a9 49 fb 93 2b 74 d8 83 cb 06 8c 55 7f 57 | 5d f1 cc 70 90 ee ee 41 59 8d d1 e4 58 c0 02 89 | 12 8f 04 73 87 28 bc ec 0e 96 08 f0 49 03 74 3b | 4f eb c4 d0 c6 21 f7 38 1b 92 1e f3 ba 46 7f 28 | b7 fb 3b 9f fa d9 3a 39 83 bb a2 23 67 98 f1 b5 | a1 a5 1f cd 74 bb 92 db b0 18 17 3e 12 cd 1b ef | c7 08 37 6b 02 81 e5 23 06 48 6f 12 26 7a 04 03 | 41 41 ce c5 75 5e 67 35 c5 ce e1 ac d5 40 0e 48 | 02 a1 2b 2d 14 1a 42 85 97 cf d2 fc 57 8d 5d de | 6b d9 22 6f 79 7d c3 c2 dd 65 20 aa 1d 5b 57 40 | a0 1a 0e 1e 45 35 58 17 0b 20 5c b0 ba 44 7d db | a2 bd 64 77 9a d5 0b a1 b5 5c 94 07 3a 31 f0 5b | 14 75 f7 58 da e1 d3 e6 78 67 58 17 31 77 19 91 | 11 0f cf 7e 64 09 ce c1 12 cf d6 40 b9 60 dd 56 | e1 a2 ed 56 fd 45 7f 51 84 03 0b 96 6c a0 15 97 | 40 65 89 e3 a9 b7 e3 e5 5a 24 e4 6f 77 a5 63 fc | 29 00 00 24 bc 2f bb 65 01 f5 95 86 7b 82 6d a7 | 33 bf 89 13 08 c1 15 eb 66 27 ad 6e 9d 4d 82 1c | fe 4f 3f 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 44 db b2 76 4d c5 a9 b2 17 20 52 | 87 84 27 9b ed 5c 63 75 00 00 00 1c 00 00 40 05 | 53 a7 06 a0 b6 ee 02 94 c4 3e c2 3c 5b 31 75 91 | 62 98 b0 aa | libevent_free: release ptr-libevent@0x7fb360012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000d120 | #176 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 22 94 6b b7 90 01 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #176 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #176 | rejected packet: | a4 22 94 6b b7 90 01 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #176: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a276e0 | handling event EVENT_RETRANSMIT for parent state #64 | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #64 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #64 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49621.97593; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006155 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #64 | libevent_malloc: new ptr-libevent@0x7fb360012840 size 128 "road-eastnet-nonat-64" #64: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #64) | 28 7e be 04 bb c7 3c e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 7e 43 6c c6 61 f7 8d 74 52 44 4a 1c ca e7 9e | ac 14 d9 31 6d 60 9d f4 ba 6e c2 e0 7b d5 53 a3 | 16 85 f9 c3 ce f8 f1 6f bf 00 c2 bc 5a d4 f5 80 | d8 8f 02 50 d5 75 7e 2e dc 8c e1 ab a9 5d a2 cc | da fa 4e bf fb 7e 0d a9 06 25 1f 41 e3 0d cd 1b | 1a a7 53 a9 ce 79 cd b5 77 9b b8 2e 89 66 fa cb | ad fc 1f a1 86 e2 14 75 9e d9 ee bd ba f9 9f 7c | e4 64 68 99 18 9c 70 2b 82 20 55 55 75 56 88 5d | d8 d5 c7 f6 4d e5 dc 25 37 08 b7 1b d0 a6 99 40 | 0a 49 58 f6 83 1c 88 a0 08 dc b3 c1 aa ed 91 6f | c6 a5 be 4d 6b b9 bb 18 cf 12 ba 0d 71 89 70 ef | 66 fa c4 5b 33 09 3f ff 55 ca 19 24 9a 74 4d 4c | d1 a6 e0 57 41 7a 44 3f b8 12 3a 3f 06 a7 52 cd | 97 1c e0 a8 3c be fa 81 97 1d d6 2b 3f 0b c8 9f | b8 ad e1 63 a0 10 8f f1 ce 62 64 83 9e 28 1c 57 | ba 8c 77 7e 6f fe 44 22 ea fc fc 43 05 9a a7 9f | 29 00 00 24 d6 fa 6f 28 11 8e 89 70 36 5a 3b d2 | 30 2c 96 5f 7f e3 aa dc e7 9f 74 e4 9d 9a 67 37 | a5 4e 3a 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 34 45 e6 51 f4 83 8b a3 3b 13 c9 | fe 48 d2 4a 75 21 a9 ed 00 00 00 1c 00 00 40 05 | 1b 38 c5 d0 41 1e ff f1 67 34 2b 17 6a 69 bf 2e | 0c d6 b9 4f | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a276e0 | #64 spent 0.128 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 7e be 04 bb c7 3c e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #64 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #64 | rejected packet: | 28 7e be 04 bb c7 3c e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #64: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afd000 | handling event EVENT_RETRANSMIT for parent state #236 | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #236 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #236 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49622.031226; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.010215 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a276e0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #236 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 "road-eastnet-nonat-236" #236: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #236) | 4f c5 63 73 3b b2 d7 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 5b 06 ee 84 fa 79 7f e6 43 db d2 0d 8b cd f5 | 59 c7 e2 83 26 7e 92 07 02 e5 75 02 5a 6a f0 b8 | 61 d3 80 1a 18 f6 6c 41 f4 8b 1c 06 f8 08 1d ec | 22 4e 32 49 5f 33 c9 49 bb d4 b4 9a 8b 9e f4 b7 | ce cc cf cb 5d b3 17 75 80 5e 65 75 ed 96 58 92 | ba 35 70 a7 18 25 e3 2d 24 94 8c 18 40 c5 8f 8e | 52 27 34 ad d5 17 cd 88 62 97 c4 7d b7 05 9c fd | 87 2b 85 fb 44 37 03 91 16 87 52 0a e0 03 40 76 | 05 68 d4 2b 81 46 59 09 54 29 07 bd 68 5b bc 5c | 8c 95 6c ea 24 20 a3 81 a2 b7 51 34 bf 49 44 7c | d1 b4 84 70 99 94 3b 26 25 f6 f8 e9 a2 1d 40 46 | 82 c9 ad f3 5f 36 60 f9 1a 16 eb 90 3e 33 04 f7 | 6d 37 8a a4 9b 0b b3 e7 22 8c ca b9 99 a2 ef 47 | df af 33 fd 94 a4 95 ab c9 0d 75 62 b8 13 05 a5 | 03 c9 74 d6 f5 9e 6f a1 90 65 6c b2 72 e9 df f5 | 5d 19 cb 15 48 a4 79 d7 52 7c ec ab 28 6e 6d 0a | 29 00 00 24 28 83 19 a9 be e7 a3 f6 92 20 74 48 | e6 d2 29 74 96 b0 77 d3 bd 1e ee 26 dd 0d 67 63 | ff bc dc bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 3a ff 41 6e c5 dd cc 76 37 c9 88 | fe 40 cf a9 30 61 ac fb 00 00 00 1c 00 00 40 05 | e2 5c 52 8d c8 02 86 2e 47 16 0b 04 4f 16 65 56 | c3 38 ce 94 | libevent_free: release ptr-libevent@0x7fb36c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afd000 | #236 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f c5 63 73 3b b2 d7 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #236 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #236 | rejected packet: | 4f c5 63 73 3b b2 d7 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #236: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0758 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ec960 | handling event EVENT_RETRANSMIT for parent state #219 | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #219 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #219 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49622.04321; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.007795 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afd000 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #219 | libevent_malloc: new ptr-libevent@0x7fb36c0407f0 size 128 "road-eastnet-nonat-219" #219: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #219) | 7d 80 b0 77 1f 48 77 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 87 5e 24 5c db 31 0a 96 84 9d 90 05 c1 73 ea | 13 fd da 1a eb 02 9b 1b a2 ef f5 1e 7d d5 07 48 | 63 2b 15 ef 39 49 2f 72 57 96 fc d0 52 b7 b4 5b | b9 8f 1f 7d 66 98 1a 54 e8 35 20 c8 da d6 6b 14 | 12 96 09 73 f0 2a 18 19 ad 4f ad c0 e9 02 7d bf | 91 ef d7 b5 3d bf 72 91 c2 b3 4a 21 80 f5 15 86 | f5 a2 c4 99 67 47 6c 96 fc e1 53 b9 1a ff ad 2e | 5a 73 b4 6f 29 39 2a 43 c9 46 c0 b4 6f 20 2e 1e | 67 a0 45 fd 13 c6 d4 73 ef 07 78 d4 9f 67 9c 74 | b8 b8 8b 57 22 93 1b 6e 1c 48 7c 01 8f e1 37 24 | ca 0b 69 5d 4d 5a 11 fe 79 69 f3 19 5f e1 13 01 | 72 da c7 1d 2e 2d 95 6b 1a 0c 79 15 cc 16 3b c9 | df 53 b2 62 55 3b 89 98 3a 35 b4 a3 d8 f7 72 66 | 5a 4a cd 05 1d 45 02 1c a4 80 ce 7b 71 ea 76 a3 | 4c 87 0d 5f a5 5d 61 29 09 d4 52 68 95 1e 6d d6 | 81 6a 00 e1 92 ed bb e5 1a 97 43 9e cf 2e 23 af | 29 00 00 24 3d 29 6e 63 66 7a 35 4b 56 6e f9 8b | 96 51 14 3b cc a7 be 10 65 46 ea 6e 67 b7 cd b3 | c7 62 bc 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 d7 c1 a6 5e c6 d2 33 1c 31 12 89 | 58 68 2a 17 e1 05 d4 0f 00 00 00 1c 00 00 40 05 | 8f 01 0b 19 90 57 cd de dd b3 66 c4 60 3d 67 fe | 89 ed 52 b0 | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ec960 | #219 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #65 | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #65 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #65 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49622.043396; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008884 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ed00 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #65 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 "road-eastnet-nonat-65" #65: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #65) | ef 12 90 5c 48 7d 35 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 1d 09 25 1e 78 f1 ab 15 10 4e 97 1c df 6e dc | ea a4 f2 51 40 2c fc 70 83 3b d1 14 8e 0e 9b f0 | ed 07 86 8f 8c 86 61 7e ec 48 49 64 93 36 5d 3e | 17 1f e8 61 4f 64 88 6f dc 05 20 78 89 b7 e5 6b | 2c bb be 5b d1 73 00 a1 4f 26 6a 56 a9 d6 41 92 | 2d 76 96 98 ed 1d 08 e4 99 fe 2c 5e 06 f5 6b bd | 7e 5c 39 22 bf ae a8 e1 92 1c 13 3f 1d 70 c4 80 | 07 a5 77 ff 91 5d 4b 48 ee 7b fd 40 d0 32 19 b5 | 09 de 90 f8 5a 03 1b 2a 6a c3 ef 64 b2 ec 44 55 | 99 02 c6 b9 5e db b2 cd f2 ce d4 a6 86 55 55 7c | 29 4f 4b ce 6a 0b b1 f7 34 a8 01 90 c9 f9 c3 1c | 81 d7 a5 bb 19 5a 7d e2 de 08 df 1d b2 6d 5a f1 | 1e a2 87 2c 96 1b c7 cb 00 ed 5b 85 f3 b5 ad fb | 85 9e 29 58 fd ca dd fe cc ef 21 ce b6 4c a2 4d | d7 d2 d7 9a 36 aa ca e6 4f 15 82 d8 a4 cd 14 4f | 08 9f 68 62 be 95 a7 c1 d4 3f 0f 63 b9 f6 80 56 | 29 00 00 24 56 09 76 96 73 f6 7a d5 b4 ac d9 d3 | f5 d3 52 17 38 15 85 8c 5c 9b 9d d9 ed a7 ee 26 | 3a e8 6f 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 23 18 fa b0 e0 93 30 87 95 e8 a3 | 79 bf 51 a0 e1 20 e5 2d 00 00 00 1c 00 00 40 05 | 26 a2 95 ca b7 c9 12 03 be 34 1f 1e 21 7b 79 10 | 86 6d e0 e7 | libevent_free: release ptr-libevent@0x7fb3600251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #65 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 80 b0 77 1f 48 77 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #219 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #219 | rejected packet: | 7d 80 b0 77 1f 48 77 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #219: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 12 90 5c 48 7d 35 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #65 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #65 | rejected packet: | ef 12 90 5c 48 7d 35 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #65: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | accept(whackctlfd, (struct sockaddr *)&whackaddr, &whackaddrlen) -> fd@16 (in whack_handle() at rcv_whack.c:721) | FOR_EACH_CONNECTION_... in conn_by_name initiating all conns with alias='road-eastnet-nonat-253' | FOR_EACH_CONNECTION_... in foreach_connection_by_alias | close_any(fd@16) (in whack_process() at rcv_whack.c:700) | spent 0.109 milliseconds in whack | timer_event_cb: processing event@0x557d46a43dd0 | handling event EVENT_RETRANSMIT for parent state #249 | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #249 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #249 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49622.057709; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500693 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #249 | libevent_malloc: new ptr-libevent@0x7fb3600251c0 size 128 "road-eastnet-nonat-249" #249: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #249) | ad 80 10 70 da e5 b7 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 1c 07 0c da 8a af 5e 89 e6 75 e4 e2 6b 94 81 | 88 bb cc 32 0e 51 16 82 66 1f 3f 42 b2 39 20 4f | 72 37 07 9a fd 40 87 70 79 6c 98 3b 3f ae 9c 8b | ce 68 05 66 50 64 85 b6 97 7b 54 39 f1 30 aa a3 | 04 6c 7c 88 ec 3c d1 1c d3 b4 4e a1 ee ab a5 d5 | 77 d7 c7 96 43 3f c9 ba 18 4d e2 bf ce 40 6d b9 | 2e 6f 43 a4 09 5e 6a 0a 57 fe 2f e8 72 ab e9 6e | d3 23 65 2e 56 3d 4f 3b 55 96 b0 62 91 f8 d1 e0 | 2e e0 00 1a 25 63 9c 6e 63 ad 31 ed ac d2 4b 58 | e3 5c 40 70 04 55 4c 39 0d 41 92 a2 3d 54 25 26 | d7 ef 2a e6 88 54 16 3c 17 a5 5d ae da e8 b9 49 | 9e f9 ac d6 d0 b5 d1 4c 32 7f 53 80 13 ce 13 ff | c1 9e 7b 3a 03 2e b8 d1 5e 50 be f8 6c db 78 af | c8 42 2d 25 43 1f 70 34 56 a4 16 57 bf 31 c6 30 | d5 f1 f9 72 d0 f9 83 35 68 6b 2a 69 4e 20 b1 d3 | f4 3c 9d 15 41 2d 80 5e c6 a3 cc c1 23 a7 f8 c0 | 29 00 00 24 cf 2f e4 f6 cd 34 13 11 b4 5d 4f e0 | 11 dc f5 73 81 ae 1d 25 a9 7b e9 47 0f d3 b0 6c | 5e dc e5 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 3d 29 fe a9 de 26 71 da 28 d8 ce | 9c 91 f7 26 3e 7d 46 03 00 00 00 1c 00 00 40 05 | 93 a3 dc d9 83 9b 6f 85 6e d1 32 ad 49 d5 89 75 | f9 55 83 e1 | libevent_free: release ptr-libevent@0x7fb34c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a43dd0 | #249 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 80 10 70 da e5 b7 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #249 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #249 | rejected packet: | ad 80 10 70 da e5 b7 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #249: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #177 | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #177 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #177 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49622.060397; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006258 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a43dd0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #177 | libevent_malloc: new ptr-libevent@0x7fb34c01d920 size 128 "road-eastnet-nonat-177" #177: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #177) | 18 be 44 9b 6e ed 30 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 07 e3 cb ba 41 f5 29 89 53 b2 f3 1e 5e 07 87 | e1 d5 ed d4 f7 64 97 f7 8a 96 5e a4 19 72 f5 99 | db af d0 a6 4b 51 f7 55 92 f6 5e e0 30 09 2c b6 | 43 a0 4f d7 6f e1 d3 20 57 34 04 7c 3d 9a 99 83 | f9 a3 8a 6a fe fe a9 91 f2 83 44 a1 2d af 4b ef | b0 18 e4 e4 62 e5 83 a7 cf b5 7d ca 15 6b 57 02 | c4 53 c6 7f f4 9f 1d 3d 3b b0 8c b2 2b 17 6d 36 | 19 38 bf 55 ce 8a 72 4f 20 1b a4 9c a2 84 da e5 | 7c f0 4b de 9a 22 9d 10 b8 0c f6 b5 af 79 8d d9 | c7 ca 65 16 d7 e0 a1 a8 7f e6 15 6a 53 ef 5b f4 | a2 b4 0d 9c 61 31 ea 4a 75 b2 62 d9 d6 fe 75 27 | 38 c2 d0 97 b9 a4 b7 2c 60 e6 08 ea 3f 0a 15 59 | f6 77 c4 7c d1 46 84 4f f2 09 1e c0 00 e1 c8 65 | bf 5e 6f 2d 94 6e 4c d7 96 38 7b ba 94 5a e8 e2 | 2f d6 8c 88 2d de 4f ca 52 aa 70 7a c4 e8 89 b2 | cf 3d 59 65 f1 b7 65 b1 ff 08 3f df 87 d6 e3 b4 | 29 00 00 24 06 53 6b 3a e9 83 68 db aa 70 45 4d | fe 90 0e f2 c3 a1 be 18 1d d8 e7 bb b9 75 13 f1 | bb b6 76 91 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 1b 1a a2 88 2e 9b 85 cb bf 3f e0 | 58 f8 7a 1a ca d0 ae de 00 00 00 1c 00 00 40 05 | 46 28 df e2 d1 63 c9 0b 29 af bd b8 e5 56 e6 b6 | 34 92 84 18 | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #177 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 18 be 44 9b 6e ed 30 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #177 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #177 | rejected packet: | 18 be 44 9b 6e ed 30 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #177: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1c450 | handling event EVENT_RETRANSMIT for parent state #245 | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #245 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #245 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49622.096743; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001339 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #245 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 "road-eastnet-nonat-245" #245: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #245) | 15 95 fb a9 f3 2d 54 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 07 75 44 62 b4 90 36 f0 1f 9d c1 5d 1b f7 db | 07 17 dd 42 63 05 02 d3 cf 19 39 61 be b0 c7 13 | b1 14 a4 a5 b8 a1 23 ab 35 be c3 4c de 16 3f 73 | 4f a1 df 22 33 3b cb 49 9e 26 36 44 30 39 b1 65 | 42 b6 93 29 4a f4 de 14 94 ba c8 61 f8 84 44 5d | 84 ad c9 32 19 82 79 9b 9b e9 75 42 04 bf 32 59 | 46 4e b6 9b ee 27 62 a3 18 81 ea 6a 95 c0 2b da | f4 8a 3a 0c 58 60 40 77 5e 77 85 02 1a 93 66 69 | 9d df f5 b9 a5 ac 45 4a 0d c0 94 39 1f d8 c9 eb | f6 d6 d7 0e d5 20 a4 de 35 3e cb b1 5a 3e 07 b8 | 15 10 06 8b 76 b5 1a ee 6d 90 d8 56 e7 da d7 5c | f6 12 4e f3 18 b2 7d 97 43 2c 6c d6 56 7e a8 7d | 7a cc 89 83 61 47 f5 78 b4 bb 7a cf 96 f5 41 2c | bd 99 b7 5f 2f 94 22 34 ed af 72 69 47 9d b0 d6 | ba d6 46 d7 20 70 b9 2b 04 c8 60 1d 2d 34 a0 00 | f0 50 7a 8d 2d 98 72 24 0c bf 1e e2 f2 65 16 ca | 29 00 00 24 78 20 60 94 4c f0 10 8a 14 01 4a 36 | 9d 71 3a 32 dc 84 92 f3 9e ca b0 c6 c6 47 0c 0e | 5c 4a 16 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 94 6f 42 13 dc 75 9d 65 6a 04 f1 | 12 0b d5 9b e2 af 9f 6d 00 00 00 1c 00 00 40 05 | dd ae 8a 7b 09 c8 82 03 b9 81 1c f4 27 30 35 7a | 2b 8b 29 2f | libevent_free: release ptr-libevent@0x7fb37c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c450 | #245 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 95 fb a9 f3 2d 54 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #245 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #245 | rejected packet: | 15 95 fb a9 f3 2d 54 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #245: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.059 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd80 | handling event EVENT_RETRANSMIT for parent state #66 | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #66 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #66 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49622.106088; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009614 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c450 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #66 | libevent_malloc: new ptr-libevent@0x7fb37c0407f0 size 128 "road-eastnet-nonat-66" #66: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #66) | 64 fc 26 82 c6 65 9b e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 5c 42 12 a8 cf 54 30 35 41 88 3e 73 38 e5 58 | 88 e1 84 4c b4 74 fd b0 fa c4 88 6f 83 90 67 ee | ea 08 5d 03 f5 21 c1 48 f4 fa d9 68 de f8 02 e9 | 20 8c 8f 00 bb e0 27 04 09 fe 8d f2 a1 9c cf 02 | 35 98 ce 70 23 87 ee fc 94 cd 0c 7b 9f 06 08 77 | f2 7f c2 13 7f e1 04 f8 2f 23 ef 1d fb 54 4c 0d | ac 20 e0 c8 bd 84 3e ce b6 49 37 85 56 01 f1 9b | ac 54 85 9c fd 7d 5d 63 30 bd f9 4d d5 7a c1 a0 | 6c 64 e9 25 18 ed 7b 3f 1a a2 52 c0 47 b8 c4 ff | 46 70 76 9b eb db 63 e5 d9 0f fb e2 44 f2 65 5e | ab 82 c1 e9 45 5a aa 38 88 06 f2 1d 2e 7b 75 16 | bf 94 df 07 bd 89 cd 9e ba b0 6c 38 fc 80 69 75 | 55 88 bd 23 1e bc ab 76 6d 9e ce 05 ea ee d0 f1 | 1a bd 0c b1 86 63 56 69 8c 5f 2e 8a f5 e2 c1 97 | 10 bc e7 eb 71 fb 81 cd 25 de 9b 6d 12 04 dd ce | 36 90 99 3b a3 2d 73 4a 99 7b f0 18 dc 83 2b 7d | 29 00 00 24 64 f2 bd 07 f3 b0 6e 75 d4 40 2c d9 | f4 e5 3f 9a 4d aa 41 b2 3f a1 6e 03 4f 7d 3f ec | 58 37 55 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d dc 62 51 f8 7c c3 1c 6d 46 26 31 | c0 6e bd 6d 19 0c cf 42 00 00 00 1c 00 00 40 05 | 76 be 2b c3 74 ff 88 3d a8 f9 74 84 97 f5 dc 48 | 6c 56 c4 9c | libevent_free: release ptr-libevent@0x7fb35c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd80 | #66 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 fc 26 82 c6 65 9b e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #66 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #66 | rejected packet: | 64 fc 26 82 c6 65 9b e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #66: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a70b10 | handling event EVENT_RETRANSMIT for parent state #220 | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #220 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #220 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49622.144798; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.023933 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #220 | libevent_malloc: new ptr-libevent@0x7fb35c02a950 size 128 "road-eastnet-nonat-220" #220: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #220) | 46 e4 bb be 2e c2 5d 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 39 4d 80 66 08 94 81 6d ee b8 9e f9 65 a1 19 | 54 a6 0a fc 14 3b 49 4b a5 b0 75 d5 8f f4 dc f0 | 1b a7 3c f6 bb e2 05 ae e7 81 f3 39 80 b8 01 f9 | 77 d5 d3 86 7b 99 e2 d3 05 f7 72 fa 5c f1 d2 51 | b2 76 8c 56 54 09 b2 f0 63 f0 63 23 b4 3d 48 f6 | f1 7c 7c 9e fe e8 97 61 67 eb 6f f5 a8 99 0f d8 | f0 a4 2a 65 98 03 64 d4 51 ad 7e ce 83 6c 68 5a | 24 81 05 98 d2 e5 16 4b 8b 3e c7 e6 5d cd e2 fb | a8 b3 8a 3b d0 a3 7d ce 4c 78 67 e6 b6 09 60 ba | f9 1c b9 ed ac 41 f4 ed a2 6c 61 ed 1a 8b 86 32 | f9 bb e7 03 fa 79 52 88 d5 55 24 b9 5c 26 d9 4f | 84 6f 26 7a 2c f2 0f 72 55 f3 04 53 6d 42 03 19 | 2c 35 89 e8 72 3a 30 cc ba be ce f2 4a 96 71 78 | 63 64 85 27 33 b9 dc 2a 58 25 92 09 0e 9f ab 45 | ad 24 0f 92 22 24 6c f4 98 77 7a 79 50 d8 2c a5 | 5a fb ac f5 20 e9 5a 93 8b 11 3b 04 5b 8e 94 e7 | 29 00 00 24 b8 3d f3 f9 87 d9 e7 9e 4b f1 71 60 | 7a f6 ea f9 0f a9 84 5d c0 c1 a6 93 b2 00 5b f0 | d8 3e 37 a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f9 77 af d4 23 66 f6 eb 62 8a 75 68 | f1 14 74 bf 89 18 b5 2c 00 00 00 1c 00 00 40 05 | 75 8f 21 77 9e bf 74 11 1b b7 a1 b1 db ce 3f 91 | e1 e1 a3 e9 | libevent_free: release ptr-libevent@0x7fb3700180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b10 | #220 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 e4 bb be 2e c2 5d 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #220 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #220 | rejected packet: | 46 e4 bb be 2e c2 5d 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #220: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab7a80 | handling event EVENT_RETRANSMIT for parent state #178 | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #178 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #178 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49622.148102; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006171 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #178 | libevent_malloc: new ptr-libevent@0x7fb3700180b0 size 128 "road-eastnet-nonat-178" #178: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #178) | ca 8e d5 21 04 56 f5 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 67 d8 60 5f 40 63 92 f2 6d b4 ba f5 02 b8 ef | 38 7a 12 cd 11 ce 9d 9b 17 62 5f df 94 e9 07 b5 | 67 9d c2 aa a5 fe a1 11 f4 ad b8 0d 63 27 26 1e | d8 17 fe 6f e7 68 09 0e 02 53 a4 bf 49 a0 db 19 | df 91 5e e9 b7 6f eb 81 53 29 3b eb 8c 48 64 ce | 19 01 46 02 e1 7d 00 12 d7 22 72 65 96 38 74 47 | fc 95 5b de f7 59 12 e1 89 c8 7c b4 26 93 4b 67 | 78 1e d0 18 c0 19 90 65 2b 34 10 55 57 cb 01 6d | c4 3f b5 2b 33 1e 80 2e 70 90 f3 a0 65 bd de 46 | 7d 2e 31 80 28 5c 82 45 70 58 e1 27 1c 57 b4 3b | 35 12 78 64 02 e3 69 39 84 d2 f4 a5 19 f1 96 0b | b4 1f 01 e4 be d8 4f ee 70 c6 2d 15 1b 96 dd 0a | 64 1f 43 c4 0e c9 83 9e ef 67 e0 c2 2c f3 12 d0 | 79 5e f6 25 ee e3 f8 a3 fa 94 d3 a2 a3 89 7b 98 | 74 09 e9 86 33 de 66 6c 13 2b 07 44 f9 44 67 9b | 43 01 93 ea 4d 3f aa bd f6 c6 55 44 dd 66 4b d4 | 29 00 00 24 2e 3d 1e d2 58 00 63 7b ef e7 79 ba | 26 0d 83 e4 01 3b ff 2b eb 29 12 83 06 3e 6a dc | 34 f9 2f 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 2f 67 46 e9 ec d0 44 c4 cc 2f 43 | d4 84 bf d5 2b 37 9d e7 00 00 00 1c 00 00 40 05 | 39 35 73 9e a6 30 0e 5d 9d 4e 3c 93 77 b7 78 c9 | 08 75 bf c2 | libevent_free: release ptr-libevent@0x7fb34c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab7a80 | #178 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca 8e d5 21 04 56 f5 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #178 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #178 | rejected packet: | ca 8e d5 21 04 56 f5 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #178: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c00d120 | handling event EVENT_RETRANSMIT for parent state #237 | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #237 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #237 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49622.149553; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00393 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab7a80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #237 | libevent_malloc: new ptr-libevent@0x7fb34c0180b0 size 128 "road-eastnet-nonat-237" #237: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #237) | 4f 30 a3 80 9f 9f 65 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 80 47 96 1c c9 51 f1 0b e5 85 bc ba 8d d8 2f | 7e 2e aa 44 d1 4d 1c a5 32 20 f2 ef d0 59 1d c7 | a5 77 ca 5e 02 89 87 a6 bb c0 e0 54 5b b5 84 79 | 29 9f bb 42 c6 20 c7 56 ce cc 84 c6 1e c1 d2 f4 | 13 76 c9 2e e4 05 e9 37 e6 bd 6f 35 dc f2 cd db | 35 16 6c ad 20 92 a2 8f 48 33 b4 20 26 8f 59 2d | 4c d4 d1 24 86 23 46 ee 6e c6 b6 24 d5 4f 00 17 | 52 61 b1 bb 85 d2 0d d3 70 1d c1 d8 3c 26 6e b6 | 77 3b f1 af 93 e8 cc 5f cb 1e 13 01 93 4d 4b b3 | 72 06 cc a6 aa 05 5c 87 d3 9f 0b a2 d6 36 1e 41 | 74 1d 84 0c 84 17 40 09 ae 80 b1 14 f6 05 f4 d7 | 5d 5f bd 62 54 0a 41 03 07 59 f0 77 45 28 e1 78 | 15 ba 85 f9 68 5c c5 ec 72 3c 38 3b 02 ac c0 42 | c6 0b db 17 1d c8 55 9c ae 19 48 78 01 ba db 02 | d5 a9 df ad 4f 67 c1 5c 0b ad 91 db 71 af d7 d7 | 81 9f c3 2e 7e 4d 1a 85 96 12 81 67 a7 1b 56 fa | 29 00 00 24 e8 e3 42 9e a6 0b 6b 38 33 d4 39 b2 | ba a4 24 74 62 c1 99 66 60 77 d8 65 6c a2 d4 f2 | 70 50 e9 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 8a 35 95 f7 6d e2 2a d4 81 0f d3 | 67 1d 3d 86 23 6d 84 2e 00 00 00 1c 00 00 40 05 | 36 30 d8 35 65 36 0c cb 2b 9c c9 7a 14 59 39 58 | c5 b8 4c 54 | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c00d120 | #237 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 30 a3 80 9f 9f 65 f0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #237 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #237 | rejected packet: | 4f 30 a3 80 9f 9f 65 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #237: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aeb500 | handling event EVENT_RETRANSMIT for parent state #250 | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #250 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #250 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49622.158864; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500748 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #250 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 "road-eastnet-nonat-250" #250: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #250) | 17 2a 9d c4 13 ac 7b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f a0 94 c6 2f 84 36 04 eb 6b 9e d3 d8 c3 41 dd | 36 5b 9a 4c 3e c4 08 57 57 9d d2 59 b6 8f 5a a0 | 97 64 4c 58 37 53 a6 c4 b2 5a d7 28 c7 0c 91 ed | be a1 6c 6f 57 ab d6 36 57 9a ec 6e 81 e7 d9 ec | 00 31 e4 c2 56 03 3a 6a 1d 88 e8 70 93 fc 2c 64 | 28 be 05 43 75 db 83 1a 2d e0 38 f0 97 bc d9 f4 | 8f af 26 f3 55 d2 01 81 1a 51 e6 93 66 74 0d 48 | f0 8b f8 85 50 76 3e 80 0e 67 70 24 1d ad 6e ea | 72 9d 01 c4 5f 99 0d ea 29 5d 36 37 89 d4 98 07 | 88 15 ab 7a c4 c5 62 ba fc 8c d5 56 64 df 3c 82 | 9a 54 de 55 20 6b b2 85 89 5d a1 07 c2 57 11 bd | f6 1f f1 5d 9f 5c 8b 9a c0 e9 98 82 3c 9e 57 da | 35 cf a5 fa b1 00 d7 17 27 e9 41 21 aa 94 96 cb | a7 a3 73 c1 a5 31 48 fa 19 d0 03 ff 95 c4 5d f6 | f5 17 61 a5 35 90 af 0b d1 1b d3 73 e5 de 34 00 | 63 00 cf f1 60 d4 f0 c0 3e 0d 02 7c 00 ab ce 51 | 29 00 00 24 c8 41 60 b9 9e 92 4a 7d d2 ef 9f 8c | 7b 43 49 a0 e3 71 1b 9d 34 81 8d 16 42 5a ed 22 | 3b 97 7d 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 44 92 04 c0 13 80 0a cd 61 73 30 | d2 9c c0 ea 6c 30 db 12 00 00 00 1c 00 00 40 05 | 76 73 9b 47 5d 14 7f b7 af f1 ed 94 26 55 3a fd | 56 a2 76 70 | libevent_free: release ptr-libevent@0x7fb3480407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aeb500 | #250 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 2a 9d c4 13 ac 7b ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #250 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #250 | rejected packet: | 17 2a 9d c4 13 ac 7b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #250: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0676 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37000d120 | handling event EVENT_RETRANSMIT for parent state #67 | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #67 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #67 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49622.166235; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006388 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aeb500 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #67 | libevent_malloc: new ptr-libevent@0x7fb3480407f0 size 128 "road-eastnet-nonat-67" #67: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #67) | d5 dc 19 08 bd ef 9f dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 15 d2 0d 8c 5c 68 38 3d 2d 2f ab 03 65 12 47 | 3e b1 d3 f9 3a 86 7c eb 4f 39 8c ad 4d 38 70 41 | d1 7d 9c 72 4f 83 e4 6c 89 f6 b0 17 b5 42 16 02 | 98 46 bb 9b ed 5c 3f ac 09 0d be a1 fd 38 36 65 | 29 1c 76 c9 62 fc be 23 07 ff 11 92 31 9b 27 f0 | d5 89 d4 07 37 e6 d9 c5 11 e2 68 cc f6 fa 8f ad | d4 d7 3d 81 a6 50 a2 3b 0c 6d a4 dc e7 02 2c 0e | b0 92 5d 4d d1 8c bc b1 d3 8b 8b 57 d6 a3 1b fb | 45 de 41 0c 4c 00 09 3b b7 02 6a 18 be d3 e2 bf | 60 42 87 71 10 49 5d 99 2a 98 69 45 a3 b9 8a 57 | c3 e1 71 dc 21 28 e6 7b 37 29 eb da 68 00 eb 12 | 52 79 13 c3 54 c6 f4 5a 0f 77 f8 92 a7 c4 70 9c | 42 51 17 18 c9 d7 b0 85 26 54 bb 62 a6 c6 48 68 | 6f 63 77 09 be 06 39 71 28 8e 68 84 3f f2 9b 78 | 53 a2 0d 5b a4 87 76 9f e3 e1 57 84 7f 83 44 ad | 59 6d db cc b7 ca a2 5b d9 9b 67 9f f8 59 1b 8c | 29 00 00 24 ea 05 1a 8b a3 08 e1 05 bd ec 39 06 | dc 75 19 c7 61 25 8f 0d bb ee a8 4f 1e a0 d7 a0 | e4 5f a7 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c a1 13 b6 f8 7a c8 5e ab 0d 26 ff | 9e 2c 49 6a b7 74 41 36 00 00 00 1c 00 00 40 05 | 1e 6d d9 18 71 66 9b 77 ce ef 92 9d c1 b1 8d 12 | ab 9b 0c 2a | libevent_free: release ptr-libevent@0x7fb370012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37000d120 | #67 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 dc 19 08 bd ef 9f dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #67 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #67 | rejected packet: | d5 dc 19 08 bd ef 9f dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #67: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_RETRANSMIT for parent state #238 | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #238 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #238 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49622.225628; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.009866 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37000d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #238 | libevent_malloc: new ptr-libevent@0x7fb370012840 size 128 "road-eastnet-nonat-238" #238: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #238) | f6 ab 39 cf c5 7d 06 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af d3 7b 83 d9 03 ff 12 c8 97 56 ab b2 14 10 e0 | 48 f1 3b e3 4f 64 7a 9a 9e ba 3d 1c 59 ad a8 95 | bd 51 64 ba be 30 e1 34 45 a4 34 1f 3e df 3f d6 | 86 b0 59 41 db 94 3d 0d e6 62 59 ee 2c dc c0 b6 | 14 1d 3c ee 48 4c 83 08 18 f6 26 a9 cc aa db a7 | 11 c4 2a 15 e2 1f 73 e6 9e 15 53 88 2a 78 32 86 | e7 60 9e db ba 38 76 7a 13 5c c5 ac fd 1c e1 b3 | d9 b0 34 80 53 e2 98 a7 ba 07 c7 e0 29 79 99 fa | 34 4e 3c 41 8c 32 8f 62 7b 0b 06 3e 96 0f e4 ec | 50 ea 8b 72 ce 3c a2 48 3d 50 a6 bf fa b9 6f 49 | 42 35 90 06 bb 42 36 54 c0 36 66 cb e8 62 33 36 | 54 3c 66 18 ff f4 71 a8 dc 58 87 96 fa c3 1b c5 | dd a8 8d cc aa e7 e2 09 78 51 8e a8 fa 1a ff ca | 8e a6 7b eb 75 ad 7d 26 12 45 b0 78 8a db a7 e1 | 91 4e 5d 71 95 e7 03 95 d9 44 14 28 62 b8 ce bc | 33 38 e8 30 35 30 6f c6 da 40 e4 e4 28 6a f5 3c | 29 00 00 24 e9 54 88 95 a6 38 9d 64 f1 e3 1e dc | e9 d3 25 19 54 a9 08 d5 30 10 d0 0d 46 91 20 94 | d2 ec 4b e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 09 df c5 c7 bf ac 94 7a a2 81 0c | 76 04 c4 df 2b 4d 28 f9 00 00 00 1c 00 00 40 05 | 49 c2 83 19 04 1a b6 87 e7 32 12 a0 0a 0c 4f 92 | e7 02 e1 ed | libevent_free: release ptr-libevent@0x7fb34400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | #238 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 ab 39 cf c5 7d 06 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #238 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #238 | rejected packet: | f6 ab 39 cf c5 7d 06 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #238: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0678 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5da90 | handling event EVENT_RETRANSMIT for parent state #179 | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #179 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #179 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49622.228114; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.015984 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #179 | libevent_malloc: new ptr-libevent@0x7fb34400cf80 size 128 "road-eastnet-nonat-179" #179: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #179) | b7 0c 53 b0 d6 55 ba e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 e7 aa 3a d2 93 3a b1 f3 2d ef 15 4a db bc fb | 18 f2 f0 2f d7 d8 6d f1 e0 2e 7d 29 59 b1 d6 21 | e4 35 ac b2 5c fa 8c 68 d7 56 48 2c 90 1a 63 31 | 37 9f fa 36 a0 bf f8 7e a9 36 73 05 48 39 6c 08 | e9 ae 8d 6f c7 ab 9c 0b dc b9 88 2c 91 ea 94 a4 | 59 7b a5 d7 8e b8 d2 97 70 12 0b 31 b0 2a d1 31 | eb e4 69 dc 81 ca 29 66 be 80 6d 1a c2 c0 f9 06 | 99 5a 19 63 89 a6 4b 85 38 ed a4 d0 df b0 06 34 | 93 de d4 51 e8 02 b6 ef 9c b9 23 ed 94 d4 3f 30 | ed 82 5a 99 89 3b af 7c 11 96 d9 f0 92 93 d2 4f | 04 c6 5c f3 49 5b 49 5d bc f7 66 01 86 c2 c8 a2 | d8 ee 9a a2 a9 a0 e8 45 16 a7 7f a0 45 50 f6 f0 | 8b 1c 98 0a f0 a8 07 43 b8 bc ec e9 38 ec 58 b8 | 3b 0d b2 96 d1 71 70 f7 1c 22 9f 03 fc f8 39 95 | 81 cb 62 38 1d 55 75 60 24 db a4 45 80 e8 81 2f | df c7 ac c2 4c be 19 14 89 79 da 68 5f ad f7 81 | 29 00 00 24 af 43 c4 7a 3d 3b b5 29 a0 89 4a e7 | b1 1d 19 14 88 65 8d 60 36 ce d7 11 01 48 56 1b | 05 16 7d 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 78 e7 1d 9d 7c 1d 2a b3 39 b5 dd | b4 d7 38 76 a1 49 48 f7 00 00 00 1c 00 00 40 05 | 86 2a 8d 44 0e a3 13 1a 2d e3 72 66 a4 35 f9 18 | 8b 41 6c dc | libevent_free: release ptr-libevent@0x7fb36c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5da90 | #179 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 0c 53 b0 d6 55 ba e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #179 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #179 | rejected packet: | b7 0c 53 b0 d6 55 ba e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #179: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8cc0 | handling event EVENT_RETRANSMIT for parent state #246 | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #246 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #246 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49622.229665; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00143 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5da90 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #246 | libevent_malloc: new ptr-libevent@0x7fb36c0300e0 size 128 "road-eastnet-nonat-246" #246: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #246) | a0 25 29 39 44 0f 25 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 89 2d 00 d4 20 29 db cd 68 77 f7 b8 f4 ff 24 | 1d 5c 36 95 62 d1 6b 2e 7a df 4b 3c 19 93 58 6c | ce e3 80 e5 ca a3 cf cd d3 d9 a2 b5 58 7c 6c 24 | e1 80 e9 fc d5 84 ae 0d 7e ea e8 9d e7 06 ab 00 | 72 40 cb c2 16 e6 8b f6 4d 5d d8 7e 9f 89 2b e1 | 0d a8 b1 ac 98 7a 10 80 97 71 ec 1f c2 1c 60 a0 | 4a 47 2e 26 d4 f8 3f c5 e0 4a c3 e3 ec a5 f8 3d | e3 be 62 c2 d3 a8 de ed 5f db cd 09 f3 df 3a 1b | 2f ae d7 5b 61 a7 b7 f8 35 c0 11 77 df e4 3c 50 | b9 e3 f0 3f 49 55 b1 46 c2 af 2d 77 f7 83 81 bc | 3d 89 16 cb 06 4f 2b 0b 77 6a cd 08 70 dd b2 5e | 34 34 1a 43 20 61 50 18 62 59 04 5a 1c 76 f2 1a | c5 6a 20 de 8a f0 5f 77 96 4b dc b9 ab a2 15 f3 | e6 86 a6 63 09 55 5d af 9f e1 30 a3 28 2a 95 86 | 24 6f f2 be f6 80 d7 fc 17 1b db 4c 69 eb f3 36 | e3 f0 06 e4 5d c6 62 de 3e 20 88 cc a6 63 59 4c | 29 00 00 24 ac df 8c 0e a5 90 d3 52 1f a2 e9 1c | c5 97 45 07 c2 87 cc 4e 1a 76 e7 94 30 33 9e 66 | b7 ac 45 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec f9 d9 bf 03 4f f2 a2 1a a6 75 4a | e9 f5 fc 17 1c 38 34 10 00 00 00 1c 00 00 40 05 | fd 95 24 c3 10 0c 51 95 0e 6e a3 ad 3b a1 a5 1a | 2c 16 a1 31 | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8cc0 | #246 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 25 29 39 44 0f 25 eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #246 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #246 | rejected packet: | a0 25 29 39 44 0f 25 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #246: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a92f80 | handling event EVENT_RETRANSMIT for parent state #221 | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #221 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #221 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49622.244144; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004129 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8cc0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #221 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 "road-eastnet-nonat-221" #221: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #221) | 90 8f bf e7 cf b7 65 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 72 44 57 63 97 26 0b d0 33 1e c1 f5 c9 36 d4 | f7 1a 62 3c a3 39 42 e3 c4 ee 5b 04 7a e2 93 d5 | 0f 83 78 28 fb 94 39 4c 7a cc c9 c9 ad ce 5e 59 | 68 4d ba 18 1e 4a 63 94 c5 70 f6 5d b4 77 65 58 | 10 84 fe ef 60 83 64 5b f2 89 50 99 ac e1 51 8a | d7 74 3b 5d 70 17 cd 8b 95 39 65 4b aa 2f 20 67 | bc c1 06 22 2c 60 51 a7 d1 25 ba e3 e5 7c 2a 24 | 9f dc 2e 8b 87 d8 be dd e2 1f 7f 7d 88 f1 33 ff | db 8b ce 43 0a 9d db 20 79 1b 34 f9 9e 77 87 58 | 03 3d 5b 8a b0 e8 e3 38 e6 81 79 10 ab 3d b2 02 | af 63 97 ff 1b 89 ab 73 45 c7 84 d1 96 d1 2b 2c | 45 33 cc 2a 87 09 9b 3c 40 ce 87 0c 1b b1 51 a1 | 8d 74 42 7d fd e9 3f de a9 93 ef 77 e9 c1 c8 91 | 38 fa 26 85 5e 1b 88 91 35 9e 5f 73 34 d8 96 fe | 85 b3 52 f7 42 b5 7d 56 e8 9e bb f2 e5 07 db 70 | 5b 28 4b 5d 8e 85 f0 35 5c f8 45 ae 02 de 27 d9 | 29 00 00 24 cd 4c af b1 99 23 18 29 29 9d f9 32 | c6 a6 09 22 63 0a d9 08 58 b2 a1 77 c9 06 48 e1 | 9c 8b 9e bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 fb 28 ad 15 31 02 8e bd d8 0f 80 | 1c 8f fa a7 e9 1f 34 e3 00 00 00 1c 00 00 40 05 | c4 70 86 36 d0 0a de 28 47 ec ca 4b f0 c7 6b 67 | c3 4a 0b 4c | libevent_free: release ptr-libevent@0x7fb34c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f80 | #221 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 8f bf e7 cf b7 65 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #221 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #221 | rejected packet: | 90 8f bf e7 cf b7 65 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #221: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.071 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #68 | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #68 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #68 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49622.262386; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008368 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #68 | libevent_malloc: new ptr-libevent@0x7fb34c03b0b0 size 128 "road-eastnet-nonat-68" #68: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #68) | 70 75 31 66 aa 5c 9c e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 5d b8 31 5b 51 c7 81 22 c3 12 8e cd 03 2f 05 | f3 e7 e9 e0 56 07 0e 19 4f f3 59 f8 5f 92 30 b5 | 72 b6 ae 5a 15 67 03 c0 c9 25 86 6f b6 cd 52 32 | 93 89 9d 85 44 28 f4 e9 22 34 65 fb b6 28 63 5f | 80 98 37 5a 06 27 0e fb ee f6 cc 60 03 1e c8 99 | 96 20 20 2b e8 6a b0 1d 57 83 e1 9f d1 09 80 29 | 2a 2a 69 37 ce 92 30 79 1a 45 aa a3 bd 30 cd 8b | 23 97 c9 73 f8 32 ee fe d7 1e 67 73 bd 11 db 26 | 12 e8 63 a6 c5 a1 37 4f 2f 5c 98 66 44 92 9a da | 46 ed 57 a3 46 50 a7 e5 d9 ec 61 b3 fb 59 43 1f | 96 83 9a 55 36 c4 68 5f a7 ee f4 08 c7 30 31 52 | b8 7e 06 a5 b1 e2 2e 1a 2b de 01 96 c6 3e f1 89 | d8 1f b9 ac 77 f1 c6 91 93 f5 70 bc 2f 41 d6 e3 | ff da e8 8a 1d 5f de 22 6f 38 d0 51 a3 b4 49 ef | d5 06 ff ea 4d f6 71 eb 33 f8 fd c7 e6 95 54 de | 64 89 15 37 cd bd bf d2 74 6c 8e f3 c4 d1 b1 ad | 29 00 00 24 8c 8f d0 a2 59 9b be 88 0a db 9c c0 | a3 eb 04 0d aa d5 13 33 65 39 12 37 76 6e 7e e3 | e3 60 8c 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 a4 28 dd c4 89 9a c5 51 2a d8 15 | 55 6e c2 5e f1 52 b9 d0 00 00 00 1c 00 00 40 05 | ac d9 33 90 76 69 a3 40 a6 e4 ee bb 11 92 b7 71 | 1e 90 c3 02 | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #68 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 75 31 66 aa 5c 9c e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #68 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #68 | rejected packet: | 70 75 31 66 aa 5c 9c e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #68: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad5900 | handling event EVENT_RETRANSMIT for parent state #251 | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #251 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #251 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49622.271724; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501114 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #251 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 "road-eastnet-nonat-251" #251: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #251) | df 3f 41 8a f3 53 d1 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 be c7 da 7c e0 83 1f ee 21 fb 97 63 3a 34 59 | 37 0f 13 08 a4 ea d7 d0 84 7f b3 4c 1b d7 fd 64 | d7 1b c4 39 0b a3 dc 8b fa 1d 0e 6a 81 2a 3e 09 | 69 77 47 fe 6f e7 1c 9d 41 07 43 05 b4 26 e9 60 | f3 29 4e c8 f2 da 1b 32 bb 97 33 75 2b 11 a0 c6 | 90 b8 73 b2 56 c1 80 3f f7 61 34 26 98 51 70 a5 | 88 c0 d8 c1 f3 4f b0 3f 75 1e 72 b1 d1 25 9a 2c | fb 27 8d d4 bd e9 f9 05 8f 56 62 b1 eb 23 67 7e | 83 41 57 f8 72 a3 e1 9d d8 36 e3 98 b1 13 30 a8 | a1 41 78 93 e9 2c e0 32 39 cd 75 d2 0c 43 c2 5b | 87 04 ee b5 1e 82 ed bc 9a dc ae f7 d5 db 76 da | 37 c9 35 0d 18 56 2e 1c 38 d4 6f a6 b2 28 96 31 | 03 0b 4f 71 60 58 12 2e e6 e1 cb 0c 0e 82 e2 ad | 8c 61 3a e3 4a ba d8 15 fc ef ca e2 63 cc 17 43 | fc 08 79 fe 35 fa e0 53 4c ee 7c 11 7e 46 1e 11 | a2 1a 41 cb e0 70 0b 67 d9 3b 63 7b ce 2c 58 e9 | 29 00 00 24 42 a0 3c df af e9 94 45 ab 83 0c a2 | 5d 7d 94 01 25 5c 79 6e 69 bd 19 b2 b1 d1 a1 50 | 35 69 ea d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be 44 4c d9 6f 7f 41 ca 31 72 e4 37 | ba 88 35 fa ba 64 3a 13 00 00 00 1c 00 00 40 05 | c3 fb 91 09 59 3d 6b 06 7b be 35 78 ae 35 d3 44 | 75 ba f4 a9 | libevent_free: release ptr-libevent@0x7fb34c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad5900 | #251 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 3f 41 8a f3 53 d1 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #251 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #251 | rejected packet: | df 3f 41 8a f3 53 d1 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #251: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecac0 | handling event EVENT_RETRANSMIT for parent state #180 | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #180 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #180 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49622.313128; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004889 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad5900 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #180 | libevent_malloc: new ptr-libevent@0x7fb34c0300e0 size 128 "road-eastnet-nonat-180" #180: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #180) | fe 73 72 02 92 15 d8 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 07 70 60 c7 56 30 74 c1 b3 ab 81 1b b5 12 a6 | 5b b3 64 05 c5 bb 30 3a 1e 92 5a 22 82 67 57 cb | ec df cc 78 63 1b 82 f2 76 a9 50 bd 80 d2 65 3a | b4 e2 7b 0a a1 1e b4 05 49 bc 96 6f 1f f1 51 36 | c7 6c ca c1 27 98 ee 50 22 95 3e cb c3 ea ef b5 | b6 40 b3 fc db 2f 79 46 a9 ac d5 8e 6f 0a 3a 8d | 7e 51 bf 5f 98 c8 56 24 ad e5 63 d9 fa 96 3f ce | b0 c6 79 3b 61 48 6d fd d7 15 2a 6b 8d 91 68 52 | a6 e1 08 45 fe 40 cd 13 6b e8 f0 74 af 74 46 b5 | 90 2f 5d d8 88 37 08 fa 12 4d 78 ce 41 b7 64 80 | a2 4d 76 43 ea e0 49 cc c2 cc 44 b2 cd 61 27 7e | 3d 40 9b 0b ff 59 99 9d a8 52 49 ee d5 dd 07 2e | 2d 3b 1d 7b e9 b4 f8 d7 66 08 0c c9 41 1c 3c eb | ca 7b 16 c5 f5 de ae 99 52 e3 17 c8 ed 61 56 a0 | 61 ae ef c8 11 73 22 d7 35 ab 44 d5 09 26 21 e1 | 09 c4 17 ac b7 7a 6c 9f bd 3c 11 d1 18 1d 51 88 | 29 00 00 24 9d 80 d3 ad d5 e1 1c 51 35 bd a3 6a | 04 d1 ff 4c 54 9f ed 38 00 a0 89 9d 6d 48 6f b5 | c4 22 6c 99 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 22 7d cd 9d 96 05 69 33 a1 7c ff | fb a1 ed a2 be 25 c7 02 00 00 00 1c 00 00 40 05 | cd 91 7d 35 4a 67 75 33 41 31 18 ee 7e 93 4a 7e | ae 98 50 4f | libevent_free: release ptr-libevent@0x7fb3500251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecac0 | #180 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 73 72 02 92 15 d8 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #180 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #180 | rejected packet: | fe 73 72 02 92 15 d8 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #180: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #239 | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #239 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #239 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49622.323532; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.021041 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecac0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #239 | libevent_malloc: new ptr-libevent@0x7fb3500251c0 size 128 "road-eastnet-nonat-239" #239: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #239) | b9 4e df 3e 84 90 25 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea ef 5f 41 79 0b fe 19 84 c3 03 27 cb e7 22 b5 | 4b 8d ad 5a dd 57 ea a0 d4 aa e3 61 84 72 47 6a | 4d 42 f7 0c 18 4a 15 88 92 91 45 67 3d 64 ce a8 | f0 3e 2a 18 f5 33 74 78 5b 6d 2d ad 60 68 a7 2c | 42 44 24 a7 49 23 19 0c fa 8d 52 0c 5c f4 c5 65 | 9c 02 7d 4d 52 90 91 ba 69 4d a0 bb 25 6e ec 3a | e9 30 9b 1f f4 e8 ec d1 8d 6a 8c 3f 41 9e 38 b3 | 41 e7 4e 00 b5 c6 ea 1b 8f 24 c7 a8 c4 ec 84 ef | e4 cf 76 d1 2b eb 8f 91 66 1a d6 b3 71 c5 5b 71 | c2 ce 48 72 d6 b0 0f 07 ef 9a 8e fd 8a 44 8d eb | 79 c7 74 c1 a0 f8 4b 78 8d 62 3e 5a d2 f7 58 20 | ab d5 b3 52 66 2e d1 5e a8 11 59 26 5b 03 c4 c7 | 72 cc b1 7b df 43 62 14 05 c3 52 d4 b9 35 c7 18 | ab d1 fe d6 f2 c4 bf d0 34 85 da 05 d8 1c 9e bd | 53 20 10 e1 51 57 70 e6 78 d1 56 9f cf b4 da 8d | 2c 7b cb 52 64 97 83 25 dd f7 88 42 c4 42 ba 2b | 29 00 00 24 60 20 cc a1 fe 49 9c e3 77 c9 2c 1b | 58 3a e0 e5 74 37 cc 08 7f e8 2c 53 5a 76 29 4f | ad de 78 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 5b b0 88 0f ba 91 5e f1 72 ec fe | c8 60 42 a1 68 5e 5f c0 00 00 00 1c 00 00 40 05 | 4c 5b ce 23 3c 60 29 97 fc d7 dc 03 c2 55 73 9c | d8 91 a1 ef | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #239 spent 0.455 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #69 | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #69 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #69 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49622.325603; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007029 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #69 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 "road-eastnet-nonat-69" #69: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #69) | f2 a5 7f fe 4a 34 bb 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 e4 3b 13 88 fe 14 57 37 ea f2 64 67 d0 00 fc | 08 06 ee d2 9e 18 57 6d 24 e0 9d ec 05 43 cc ba | 46 84 14 09 e9 e2 59 69 78 ab 8d 44 b4 c5 40 3a | a2 89 7d 06 7b bd cc e4 70 62 31 9f 43 8b b5 bc | 3c 9f 69 fb 1f f5 22 54 18 e5 72 15 5a 48 ee 5c | c3 f3 42 0b 25 4e 7f 00 ca 3e e9 db 4e ab 7a 2a | 5e 8e 14 a5 6c b8 fa ac c8 1b f3 01 fc 2e 88 fc | de 9d 1f b4 30 64 da 79 40 14 b9 cb 57 7b 44 a9 | 8b 4d e2 fe 10 ef 78 5b 95 32 a7 75 3e 68 a2 02 | 50 a9 63 99 4c de c2 a2 55 8e e7 c1 4c 9d ba d5 | 23 4b 1b 11 eb 5b d1 0e 0a 69 30 ae 96 7b a4 e6 | d5 07 c0 08 e9 6f 21 3e f5 fc eb 69 b8 6d f7 0c | e4 6a a2 62 87 f1 46 98 bb 82 fd ef c3 b7 37 d9 | 4f 4d 06 a6 46 29 3d cf 6d 59 1a 7a 7d 4c 43 d4 | 05 3e e7 70 e1 23 3b 86 eb 4e 8f 26 e0 cf 97 cf | 6f 21 b0 32 5e 71 a6 25 0b f1 15 b5 06 82 51 60 | 29 00 00 24 ca 10 ed 53 1e ff c5 43 38 73 0a 51 | c6 98 7c 29 17 9d 86 f8 04 d8 2e 0c fa 41 a7 af | 38 8b 0b 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 9a cb 7f 17 aa e7 97 ca 43 a3 43 | c3 e4 41 43 e3 4b 2a 3e 00 00 00 1c 00 00 40 05 | 50 72 12 31 6b fb 9c 33 88 e7 6f 1a 9e 5d 70 fe | 3b 28 e9 92 | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #69 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 4e df 3e 84 90 25 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #239 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #239 | rejected packet: | b9 4e df 3e 84 90 25 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #239: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 a5 7f fe 4a 34 bb 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #69 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #69 | rejected packet: | f2 a5 7f fe 4a 34 bb 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #69: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0566 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab2380 | handling event EVENT_RETRANSMIT for parent state #222 | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #222 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #222 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49622.346956; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005324 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #222 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 "road-eastnet-nonat-222" #222: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #222) | eb 26 f4 19 1a 54 68 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 a4 6e 20 fd 50 2f 35 57 aa de 4a f5 e5 f9 4f | ca f6 bf 35 d5 20 df 61 18 72 c7 7b 3b d6 89 fe | 57 a2 45 9e 67 3f 8a f7 1b bb 33 5b 2f 19 93 13 | 4d bc bb d5 5a 76 0b 8c 08 e4 e4 47 2d c3 07 c6 | df c3 86 a0 6b 90 b3 31 74 8b 42 bf c4 10 0e bf | 13 cf 0b 76 db 86 6a 9f 8c f0 b4 0e c7 08 95 7e | ce 41 5e 4a 31 5c bb fb 47 19 b3 63 fb 4f ca f3 | 07 c7 1d d9 7a 1b f2 0d 5e dd f5 ac 4b 35 32 4a | fb 08 38 da 83 ea de 30 e1 52 16 cd fe ea bf b3 | 88 b6 b0 c4 6f 9e 4d bb 67 f6 e4 a0 eb 71 82 6a | ad 65 be 80 db 5a 69 3b 90 3a 58 e9 30 d6 fe 7a | f6 9b 28 5c 13 9f 6a 77 4f c9 8b bc 07 b5 a1 d9 | 2b de 81 5d 47 e4 3c c1 b1 a8 f5 bc 8d 40 df 63 | b5 80 17 f2 8c 1f b1 78 d7 35 f2 4c 44 06 cc 65 | 15 11 55 93 d9 f0 56 8f ad b9 7e 2b 7d cb da 6d | 9c ab 97 02 8c 9c fc 9d 3d c3 47 69 0f ac 56 88 | 29 00 00 24 77 e8 83 df 75 f1 9b ea 8f aa ae 8f | cc 39 a6 6f 03 de be 68 b3 66 64 be 5d 42 33 fc | 61 2a ce bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 87 6a 56 c8 8d 7a 5a c9 70 42 a3 | 93 38 10 ea 25 8a 09 bf 00 00 00 1c 00 00 40 05 | d9 43 32 2c d8 2a fd ec 96 bd 92 a4 54 e0 a9 82 | 8b 73 b6 b2 | libevent_free: release ptr-libevent@0x7fb344046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab2380 | #222 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 26 f4 19 1a 54 68 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #222 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #222 | rejected packet: | eb 26 f4 19 1a 54 68 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #222: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0752 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc00 | handling event EVENT_RETRANSMIT for parent state #247 | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #247 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #247 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49622.355353; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002329 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab2380 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #247 | libevent_malloc: new ptr-libevent@0x7fb344046040 size 128 "road-eastnet-nonat-247" #247: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #247) | 5d 14 02 50 68 e1 05 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 49 8a 2d d4 33 c0 d7 bc cf 08 ab af 13 85 8e | 9a 12 a5 cd 3b 66 31 91 51 03 92 de 96 84 44 92 | 2f 58 74 2e ab 28 ea 0d 4e f8 e3 ae 21 e6 45 c8 | 43 4c d5 50 a9 19 c3 44 67 b2 10 6b 79 6d 94 47 | fa 38 4e 33 78 ee e7 d3 9c 31 e4 3a 0a 97 fc f9 | af cb 80 37 57 a0 1b c2 09 c2 31 8b fc c7 0b 20 | de c6 8f fd b8 6b 84 a5 39 ac f6 54 bc 56 ef 0f | 64 4c b3 c3 15 1d ff 22 52 dd 24 dc a2 84 2b db | e1 cf 6b 7a 77 75 72 44 46 ba 71 64 0d 1e 05 41 | 6b 10 ff 59 ad 5c e4 40 01 51 72 36 a2 b0 08 e3 | a6 82 a9 79 20 45 b1 f4 1e 13 22 a0 f1 4f 23 23 | 9c e9 d5 77 c7 56 3c 45 ca 5c a9 1c b1 68 03 08 | a1 eb f6 b1 e5 5b 6c d6 3f 31 2a ba a0 3e 1f d2 | a5 29 ae bf 59 de 0d b4 a3 d2 df a5 98 9f 76 2c | 4f cf 7a 3e 6d ac 96 b0 e7 e5 ce f6 05 40 9c 9b | 09 66 cd 5d b1 dd cb f0 23 07 ad be 0d 42 b6 2e | 29 00 00 24 ef c2 8a a6 2e c6 51 78 10 63 06 58 | ba ed 73 0f a8 fa 21 72 a3 1c 39 ab 2c 37 74 08 | 1a c5 f7 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 eb f7 f6 58 75 8d be 43 b7 49 b8 | cd 30 58 5c 95 8f b2 8d 00 00 00 1c 00 00 40 05 | 15 66 60 c0 d3 3c e7 68 f4 56 38 e9 31 35 3c 02 | ee cd 1d 4a | libevent_free: release ptr-libevent@0x7fb3780300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc00 | #247 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d 14 02 50 68 e1 05 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #247 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #247 | rejected packet: | 5d 14 02 50 68 e1 05 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #247: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a03d30 | handling event EVENT_RETRANSMIT for parent state #70 | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #70 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #70 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49622.386964; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00854 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc00 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #70 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 "road-eastnet-nonat-70" #70: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #70) | 80 24 74 22 d5 0f 52 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 68 71 3c 0e 60 a8 bb a5 bd cc ef ef 0c eb f4 | 82 28 4b 5e 34 f6 13 aa c3 d7 89 31 ad 91 46 ac | 15 dc aa e6 7a e7 0b 3f 82 69 6e e1 56 f0 c8 52 | de 05 0d fd 08 00 ee cd cc b6 87 fe a0 b0 ff e6 | 05 55 e6 b7 5e 20 53 79 90 12 ce ff 82 cf ad 41 | 3f a9 51 ad f1 8c d6 57 77 1c ef 27 f0 57 e1 8c | 97 cb b6 ce ff c0 f1 f4 a5 49 d9 74 1f 1d 74 75 | 54 be f3 af 4b 6b 43 9d 43 d4 e5 05 71 04 36 2c | c7 7c 5d f8 30 fc 44 25 48 9e 9e 82 91 e8 e4 34 | 70 26 3e 95 67 c5 a4 cb 36 d4 25 b1 2b 4a 77 2f | ae 15 52 3f 18 49 f9 47 bb a7 d2 0a ef 99 db 3d | 39 af f3 91 da 08 e3 b3 1f e4 ed 82 f5 26 e3 03 | 98 c1 58 ff ba 18 2d c8 81 ea 83 51 70 26 1e 19 | 23 60 13 98 08 43 34 78 7d 3c 93 d1 af b4 fb fe | d5 41 09 8b c9 2b 05 f4 1c a3 62 cd 21 e3 82 7b | 55 52 fe 90 11 4a 62 6c 99 8c d7 30 a6 21 f0 d1 | 29 00 00 24 e3 da 6d 7f a1 8b eb f9 61 52 ce 97 | 54 be ad 07 4c e8 1e 18 ff 49 38 58 56 77 f6 8a | c3 33 cb 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 9f 21 cd 26 5d 21 04 f0 de c9 2f | 2e 65 dc 8c 6b f1 6c dd 00 00 00 1c 00 00 40 05 | 7b 41 25 4c 4c ca db 2b 78 bf 1e 87 08 ff 47 0c | c4 b0 37 95 | libevent_free: release ptr-libevent@0x7fb388038370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a03d30 | #70 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #181 | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #181 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #181 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49622.387159; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.008476 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ed40 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #181 | libevent_malloc: new ptr-libevent@0x7fb388038370 size 128 "road-eastnet-nonat-181" #181: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #181) | 87 ea 0d a4 c5 cc c9 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 96 2b 80 67 25 14 db 43 a4 69 96 1f d6 7f 44 | 16 0f d8 a3 fa cd 04 6f 4e 52 d1 61 93 e5 7d 61 | 78 3a 71 d4 ab 07 09 6a 8d e4 9e 59 3a 16 71 d0 | 6a fd 27 9b 67 10 88 a3 7b 06 8c 1d bd 77 73 97 | cb 10 8a 01 63 6c f3 e0 d9 84 4d f6 7b 2b fb e5 | 64 39 42 1e 6a 5d e5 a2 c0 54 6b 84 eb 36 36 98 | a7 bb 04 c5 ca 92 0e 5f af 5a 95 43 e3 52 3f ff | 54 f4 17 a7 9b 5c ce c8 79 5b 79 1b f8 16 5e d7 | 38 2d 41 ad 74 20 7d b3 0e 73 6b 2e d6 c4 34 48 | 1d 4c 33 fc 1f 31 06 e5 ef d9 8a ee a4 d3 10 13 | 9f f3 13 d6 08 5c dd 5e f3 41 90 99 dc 19 c1 90 | 0b 1a f0 8f 10 ca 00 81 f3 4c 0b 20 a3 62 92 ed | 2c 01 0a 11 e9 9d cb 11 95 e0 55 b1 08 02 a2 07 | 35 a8 d1 5c 3e 00 4b 4e 53 71 3f 8a 08 82 11 91 | 21 25 67 71 35 af ba 8c 78 51 c7 49 62 d2 6d 39 | 87 19 14 5e e7 83 0f e7 70 65 a7 bd b3 6a 59 43 | 29 00 00 24 f0 e0 42 a6 e3 a5 05 54 c9 6b cd 2c | d1 4e 0f ea 18 76 ac 9e 15 69 24 da 67 51 76 47 | 7a b9 31 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 1c 40 9b 6a 7c 59 59 f4 5a 8b 5d | d3 44 cd 77 5a a2 8f ab 00 00 00 1c 00 00 40 05 | c9 f4 ff 9a 5d 3b 38 1b 8f 98 0f 89 fb a2 c8 0e | aa 7e 43 ef | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #181 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 24 74 22 d5 0f 52 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #70 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #70 | rejected packet: | 80 24 74 22 d5 0f 52 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #70: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 ea 0d a4 c5 cc c9 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #181 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #181 | rejected packet: | 87 ea 0d a4 c5 cc c9 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #181: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0555 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90400 | handling event EVENT_RETRANSMIT for parent state #240 | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #240 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #240 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49622.399038; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.006924 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #240 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 "road-eastnet-nonat-240" #240: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #240) | 52 3d c4 7d aa 75 f9 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 b8 f7 97 d2 8e a4 26 e4 de 50 11 3b 27 c2 bf | 82 42 f8 30 a7 cf e7 f1 22 7e 96 6e 08 55 b8 5b | 99 ce ba b9 bc a4 b9 85 84 1c 35 bd 81 0b 36 0d | b0 03 99 1c 13 93 72 39 72 77 b7 23 f3 36 8a 70 | 77 80 87 4b 02 4d f9 86 a0 7e c1 4d a8 f2 4c 39 | d7 80 8b 66 22 e6 a4 de 4b 09 73 0d 3d 7c b2 2f | 50 8d 5f 1f 57 2a bd 9f ac c8 a9 74 90 54 67 b7 | 8f c8 3d 39 71 39 c6 de 18 02 eb c5 ea 94 b8 db | 08 c3 39 15 f9 0b b0 93 02 0a 8a a7 ec 92 53 e4 | 1e 2b 04 08 46 40 50 55 30 ed 5b e2 89 d0 46 9a | af 8e 24 41 aa aa b9 1a e4 ce 8c fe 9d a8 de b8 | f4 9b 8a 9d 2c 1b bf b8 d5 b4 e2 72 19 89 07 85 | 8b d5 73 d5 4b b2 72 a1 17 f2 16 b2 06 c3 69 10 | 03 64 01 f6 2e ee b3 bb 12 bf 7f 2a 4b 56 f5 04 | 51 3d ee 1a 3c 36 62 a8 15 0b 0b b5 26 c4 ba ef | d2 cb 15 c8 7e 83 38 88 e7 bf 96 1b 07 79 a7 4b | 29 00 00 24 eb a6 92 08 8f 76 ab e5 c4 52 e9 41 | 1d 77 03 c7 35 5c e5 3a 95 58 fe 07 d6 1d ad f0 | 56 12 6d d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 c9 c0 38 06 3a 92 7e a1 78 c0 15 | 6c a9 8e 74 3a a1 8f 67 00 00 00 1c 00 00 40 05 | 56 20 31 94 4b 81 36 39 3c f9 b9 11 bf 66 a1 27 | 0d 62 c5 10 | libevent_free: release ptr-libevent@0x7fb3580300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90400 | #240 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 3d c4 7d aa 75 f9 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #240 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #240 | rejected packet: | 52 3d c4 7d aa 75 f9 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #240: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb40 | handling event EVENT_RETRANSMIT for parent state #252 | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #252 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #252 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49622.403105; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.502591 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90400 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #252 | libevent_malloc: new ptr-libevent@0x7fb3580300e0 size 128 "road-eastnet-nonat-252" #252: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #252) | 50 58 54 7e 04 4a db ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 00 2c be 68 01 bb 0f 58 1a 16 c9 1d 14 15 83 | 19 e0 b8 46 87 82 81 55 0f dc 16 6a 8b 3d e4 4d | 0c e9 b2 bb 22 a5 95 09 ff 11 50 af 23 66 83 f2 | 31 7e 02 6d d7 48 dc 83 9d bb 70 c0 3a 92 f4 c0 | 9a e6 0b 57 02 38 84 8a 91 5b b5 ae 3c f3 73 1a | a4 24 27 15 5b c6 51 0e da 95 77 0a bb 05 7d 91 | af 25 45 22 0e b2 f2 4f fd 42 9b d1 98 1f 5e 0f | dd f0 f2 19 b9 ea ba ee 11 21 ee b6 0c 0f c9 55 | 03 18 8b f7 b4 d9 1d 6b 99 70 65 d0 5f 1e dc 40 | 4c 0a 83 ea e9 69 a1 18 51 d4 d2 fe 11 46 10 47 | b7 70 71 e5 e6 a8 cb f1 92 74 f2 25 34 f1 2a 20 | 05 8b f0 31 b4 4d ec 75 25 71 1f 16 3f cb 5c 38 | 5c 6a 40 df be e7 8c 81 eb 7e b2 34 69 d7 27 e3 | f2 93 a6 4e c8 e4 03 ff 2e ce ce ed 7f ee 01 95 | 24 0e cb ce 0e 6f 39 0e 07 c6 d8 ca 80 7d 23 cb | 6a 28 32 82 38 d2 86 f0 3f 31 6d 12 83 e3 4e 38 | 29 00 00 24 18 de 08 18 c8 a2 29 e1 d8 0d de 97 | 0b 9b 22 3a 3d 4c 80 05 7e b8 73 ae 1d 84 d5 68 | cf f8 f7 ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 65 87 e0 56 8f 33 84 b6 65 68 e9 | 21 de 15 28 76 56 f7 ec 00 00 00 1c 00 00 40 05 | 9e 72 e4 22 38 66 37 d3 ad ef a1 2e a9 f7 f8 37 | 54 d6 26 3e | libevent_free: release ptr-libevent@0x7fb35c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb40 | #252 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 58 54 7e 04 4a db ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #252 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #252 | rejected packet: | 50 58 54 7e 04 4a db ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #252: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4bfd0 | handling event EVENT_RETRANSMIT for parent state #71 | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #71 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #71 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49622.443487; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004981 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb40 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #71 | libevent_malloc: new ptr-libevent@0x7fb35c0407f0 size 128 "road-eastnet-nonat-71" #71: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #71) | 95 1a 0e bc b8 89 e9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 b7 52 d3 88 4c 72 94 29 6d 07 48 59 53 9a 94 | c0 d8 40 dd 8b 33 cc b5 e7 5f 10 c4 f9 b5 b0 62 | 0e 7e dc 7c c0 5d c2 c0 b8 2a 1e ee d8 c7 67 c5 | 6e 7a 2e c8 c8 78 d1 01 66 2d d2 7e a8 80 78 39 | ed 64 bc 65 47 6b 53 20 db f8 49 7d 75 df ac 21 | 43 37 22 43 cf 85 a4 b5 c6 f2 cc 18 4e ff c1 67 | d6 fb 3b b4 2a 72 36 3e af 12 4f 93 13 35 59 a3 | 8d fd 4c ac bd 7c e1 d6 8a 63 b4 aa 9a 01 66 5d | 44 4d c8 c6 a5 27 c2 50 76 c4 0f 7a ea 30 2c 2e | c8 fd c2 09 eb 13 95 a3 62 05 52 05 99 27 2d 5d | 04 8a cb d5 bd f0 da af b1 fd a8 57 4b 25 12 cd | 81 31 3f 97 9d 49 d1 70 50 67 35 65 ba 2d c4 ae | a9 91 18 06 72 21 47 2c 8e e0 a3 db 1b a2 3f 13 | 0f a8 f6 3e 94 d7 36 d8 17 22 ad cd f5 cd f3 43 | 86 8f ec 5e a8 71 d9 dd 87 6e d8 e4 58 cb 3c 76 | ee 77 2a 83 0c e5 de 50 b0 fc 77 61 13 ac a0 07 | 29 00 00 24 12 6c 20 e2 d1 b6 94 1d 42 66 63 a9 | 4b 6f 5d 9a 24 6f cd 6b 53 ff a3 87 80 0a b8 8b | a0 96 5f 5a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d bc a1 51 aa 8f 7f ab dc e5 06 f0 | 38 bb 8c 63 92 8e b2 f3 00 00 00 1c 00 00 40 05 | c9 d4 4d 25 1c 7e db b6 b8 a8 68 63 26 d6 45 14 | b5 8e ec 75 | libevent_free: release ptr-libevent@0x7fb3700251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4bfd0 | #71 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 1a 0e bc b8 89 e9 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #71 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #71 | rejected packet: | 95 1a 0e bc b8 89 e9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #71: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.058 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa5fc0 | handling event EVENT_RETRANSMIT for parent state #223 | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #223 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #223 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49622.451821; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005693 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4bfd0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #223 | libevent_malloc: new ptr-libevent@0x7fb3700251c0 size 128 "road-eastnet-nonat-223" #223: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #223) | 7a 51 ea 00 7b 14 8e 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e c0 c4 41 9a 95 cc 81 e9 60 68 ab 45 9c 08 20 | b4 5a a9 9d 67 49 a7 46 aa 2b 2c 92 19 0c 98 42 | fe fb 4d 10 39 99 af 92 9d b6 2e 88 4d d0 11 c1 | cc 58 dc fa d8 45 59 75 a4 74 03 ef 28 b6 b2 df | 65 14 7b c4 56 cb 7e 8e c8 a4 2d ad 67 70 a7 55 | 5c 9f d8 c8 c5 46 4c 1e 63 7d 5e ab 57 ab 59 40 | f4 a8 4b fe 89 d6 bf 01 54 f9 46 07 86 f8 bc 75 | ef 26 9f 79 f2 7c 5a c2 f7 65 21 b4 f5 f9 18 0f | 7d 48 47 25 7b 23 3b 60 c4 8a 45 86 e2 31 42 68 | 91 5b 9e 0c 6c bd d5 91 7e aa 25 22 d3 ee bf b3 | c7 ca 4c a5 a7 05 79 a5 99 a0 88 70 14 6f be 39 | bf 8f 50 de 92 0a f3 4f c2 47 ed ec a9 88 76 bd | f2 c3 85 8c 4a 5e bf dc 44 3e af ee 45 cf 06 99 | e5 de 11 6a 2b 48 7c 22 42 d6 dd 11 a6 82 39 4f | 9c 24 2f 97 4c 87 c3 35 46 b2 19 ca 91 0d f2 ce | c9 8b b5 a0 e0 d7 a9 24 95 51 89 2f 04 0b 43 0c | 29 00 00 24 82 03 c4 08 4c 73 33 ac 95 33 24 a4 | 7a b6 82 c3 62 e4 f0 a1 f5 68 f8 16 c8 95 15 db | 31 e3 65 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 01 2d a5 d7 3f aa d5 34 53 23 34 | 04 fb 26 40 92 12 55 4e 00 00 00 1c 00 00 40 05 | a6 35 a0 ce 14 8d c6 b8 e2 da 44 eb d4 cc fd 65 | 95 2a 9c c1 | libevent_free: release ptr-libevent@0x7fb35c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | #223 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a 51 ea 00 7b 14 8e 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #223 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #223 | rejected packet: | 7a 51 ea 00 7b 14 8e 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #223: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #182 | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #182 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #182 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49622.457785; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006046 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #182 | libevent_malloc: new ptr-libevent@0x7fb35c0300e0 size 128 "road-eastnet-nonat-182" #182: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #182) | 8e 7e 13 89 c5 5d f7 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 e9 75 54 2d e8 42 37 37 23 34 72 75 33 ca 7f | b2 72 0c b6 c2 49 71 7a 03 e3 1d 07 58 b0 51 38 | 61 45 b2 16 d2 ad 2f f3 7c 0e 1f f4 c5 05 13 4c | d6 98 4b 66 e1 54 c0 73 13 91 4a f2 b3 d9 63 4c | 05 4b dc 71 47 da 12 a0 d3 dd 69 f7 37 06 e9 cd | 0a 8b 52 94 8a 6d da 5b 07 14 54 d3 97 43 1d a2 | ab 36 1f dc b8 97 c0 22 40 d5 44 3f fd 99 bd 8a | 9c f3 b8 47 00 bf 43 3d ae b2 e8 4a 6b 45 ec 0f | 5f e8 9a 25 7c ca 9d 80 f8 42 ce d3 9c bf c6 35 | 83 b9 bc 3b e5 0c da 92 14 98 a7 1a ce 79 b0 48 | 82 a8 51 c4 ec a8 10 1d b7 45 e5 80 dc 95 d7 16 | 44 79 9a ed 89 ab 16 cf 11 d5 7e 53 46 f0 d9 00 | eb 07 b7 8a d9 e3 ff b1 2b 68 df 33 18 af 5f 4c | 9c 70 63 04 6b ff 29 aa a6 e4 41 5f 2d 42 80 3a | 0d 17 98 f8 4e ea 6a f2 2b f3 0d 26 ff 27 2a a7 | a3 13 57 12 6f 11 b8 dd 58 53 1d d0 16 a0 b0 ee | 29 00 00 24 65 07 2e e4 49 be 52 f9 c6 9f 8e 3b | 7c a2 61 d2 67 51 00 51 49 02 4e 77 4c 09 9c a2 | 72 c6 03 a7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 04 ff 12 2b f3 10 13 86 f3 c1 ff | 09 98 25 be d2 68 ad 5e 00 00 00 1c 00 00 40 05 | d9 6b 4d a2 91 b8 eb 60 71 cf 0d f0 f9 f0 84 45 | 87 2d 57 76 | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #182 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 7e 13 89 c5 5d f7 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #182 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #182 | rejected packet: | 8e 7e 13 89 c5 5d f7 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #182: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0641 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47ed0 | handling event EVENT_RETRANSMIT for parent state #248 | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #248 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #248 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49622.46611; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001674 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #248 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-248" #248: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #248) | 0a 60 4f 04 ec 5d f9 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b 96 4e 6b 1a 47 f3 29 f4 97 63 43 e3 c7 7c c2 | b5 40 35 82 f8 ae 61 14 ae 37 68 84 b3 6c 17 bd | e2 38 fa 08 01 a0 06 e7 9f 6c ca f7 e0 61 70 92 | 35 69 98 cb 13 b9 35 de 14 7b 48 01 ca 16 d2 a3 | 8a 8d f7 e5 16 28 68 18 42 b1 0f f2 66 75 2f 1f | 92 e4 b0 69 36 a2 b4 75 60 ca a5 a2 69 6d e6 5d | 46 24 17 68 8a bc 97 e8 9e ee 7a 06 d8 89 ea da | 29 95 98 02 98 06 f1 21 8f de de a8 b1 db 6b e4 | 16 54 6a d8 f1 bf 06 c3 2a de 4c 0f 1e 69 c7 60 | 71 82 15 35 09 a6 80 73 54 ab 5a 82 af 1b da 3b | c5 0a 69 1d 72 1d bd 02 fa 14 6a b4 37 14 ab b1 | 6c ef 68 fb 08 a8 b0 c6 58 93 07 45 93 1f 0d 53 | 5a 7c 44 c6 e8 cb d0 e7 6c 54 5d c1 89 3a e8 2b | e2 33 79 6e fa fd a1 8c dd 41 32 f8 12 7c 52 d0 | ef b1 cc 9f e3 23 da b6 ea 6c dc 48 7a 7e 45 73 | a1 ca 75 fd a6 b2 28 b4 4d de 48 05 30 76 df f1 | 29 00 00 24 da d0 88 5b 97 8e 08 a8 b2 aa 35 1a | a0 f5 0d fa 05 bb 67 43 a9 98 40 73 a9 62 0f f1 | 91 cf ba 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 42 31 df 79 b8 d9 7f 21 24 fd aa | 74 f3 12 b0 e3 0d 96 52 00 00 00 1c 00 00 40 05 | 1d 11 c7 78 91 0f ef bb 0b 1a 85 c0 59 35 e2 cd | c1 30 49 b7 | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47ed0 | #248 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0a 60 4f 04 ec 5d f9 e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #248 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #248 | rejected packet: | 0a 60 4f 04 ec 5d f9 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #248: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b5d0 | handling event EVENT_RETRANSMIT for parent state #241 | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #241 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #241 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49622.482445; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002024 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47ed0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #241 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 "road-eastnet-nonat-241" #241: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #241) | ed bf c0 ae d9 fd 74 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 7f 1d 53 5e bf 7c 50 89 9a 1b 66 7a f6 ac 57 | 1e 44 b6 4e f9 ce e0 60 9e 35 82 8c 12 e1 ec 87 | c3 32 1d d0 30 6f 24 b0 84 5b 58 a3 dd 46 7f 56 | 3a fc a0 86 c1 a5 f0 b8 b4 7f c2 24 a0 35 a3 8b | 46 8b ad d0 3a 85 a8 93 6d 92 12 5e c7 60 d3 02 | 9d 48 49 61 d0 53 cf 87 bc ba 4a 86 e9 1d 0e c4 | 8a 55 24 90 50 13 2a fe 86 c6 6d 09 e7 31 26 ca | d2 d8 c1 f1 76 8e 79 98 8c eb 73 50 64 00 6e af | 8a ae f2 36 6c c7 fa cd 65 22 6c 5b 48 98 da 47 | c0 bc 45 31 fc 5e 0f aa b4 b8 1d d3 be 55 8c ba | 12 b5 d1 65 9a 9f 14 76 d4 89 e3 78 f3 26 29 2e | 46 8d 9d 7c 77 7b 47 8f 64 31 0d 93 e5 f5 e2 8f | 76 81 eb ad 7e 90 fd 6f b1 86 5e 11 a2 e7 77 5f | c1 4e 81 30 92 43 c5 b4 66 60 7f 33 52 22 85 c1 | 6f 01 81 ec 5d 5f 91 b7 53 01 fe 18 96 c2 64 e9 | d4 ad d0 b7 b7 a3 ba e1 97 81 a4 d5 9e 61 d0 8e | 29 00 00 24 48 1f 7b 4e 8c 39 27 4c 54 7b 31 27 | 38 83 2b 38 ab a8 0f 41 0e 72 e0 b6 b5 f5 a8 48 | 24 b7 3e 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c d9 59 12 c5 45 19 36 85 eb ed 91 | 74 0a b9 7e c6 b2 17 c0 00 00 00 1c 00 00 40 05 | 8c de 28 49 d8 e8 ba a2 04 93 2a 1c a7 e3 0e 84 | b2 9d 1f bb | libevent_free: release ptr-libevent@0x7fb384015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b5d0 | #241 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed bf c0 ae d9 fd 74 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #241 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #241 | rejected packet: | ed bf c0 ae d9 fd 74 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #241: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac69c0 | handling event EVENT_RETRANSMIT for parent state #72 | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #72 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #72 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49622.509775; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006599 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b5d0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #72 | libevent_malloc: new ptr-libevent@0x7fb384015370 size 128 "road-eastnet-nonat-72" #72: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #72) | 66 13 43 d6 1b b9 0c ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 b1 4f d1 eb 26 94 0a e8 d2 78 fe d2 e8 05 7d | 72 29 9f e5 e1 94 c3 7f a9 6a ca 75 12 4e 13 6e | e4 11 a5 e1 89 1e 08 5a 0d 5f 6b 49 0c e7 ba a3 | db 19 75 da a7 48 e8 e9 64 d4 80 8e 45 f5 82 09 | 04 17 24 14 78 b4 6e bb 71 57 6f 3e 18 4c d6 76 | a4 ec 50 14 2c c8 4e c9 04 89 23 f1 0a 7f 62 28 | 45 8e 70 27 19 66 b0 68 5f c8 be 34 a7 7e 02 24 | 87 3b ee fe 4b 57 85 64 69 04 b9 42 92 f3 d5 c0 | fe 76 05 b0 05 50 57 66 f6 f8 0b 76 74 c3 53 a1 | 05 f6 81 e4 08 d7 39 f0 53 40 e0 f4 aa 4c ff a6 | 90 72 89 fb 79 82 71 5c b3 e4 6d 43 97 e8 51 8b | ba 0a c8 eb e3 46 09 21 84 b9 ea ef 0d 8d d4 64 | 4c bf f8 b1 9c cd 8a 27 78 9c ef 52 df a6 5e b4 | 15 f4 af e2 3a 17 55 a8 8a cb 58 8c 66 bc a1 fb | 21 eb f8 38 a5 f6 b0 fd 47 53 aa ad 2e e9 17 ad | 29 40 34 3f b5 2c 48 93 29 5b c3 81 a9 9a f6 f7 | 29 00 00 24 d2 7d 93 13 5f e4 cd 1b 68 e9 96 b6 | 73 3d 25 76 63 d4 92 1a 4f 51 ac b1 63 90 04 8e | 34 c5 00 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c4 6c df 39 39 e8 cd 3f 26 eb f0 86 | 8a 8d 3e 3d 91 1f 2d ed 00 00 00 1c 00 00 40 05 | 4c 1b 62 1c 4c 06 92 d2 01 38 c8 0e 4f 7e fd bc | 86 e6 84 ff | libevent_free: release ptr-libevent@0x7fb36c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac69c0 | #72 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 13 43 d6 1b b9 0c ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #72 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #72 | rejected packet: | 66 13 43 d6 1b b9 0c ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #72: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abe740 | handling event EVENT_RETRANSMIT for parent state #183 | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #183 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #183 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49622.52511; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.01047 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac69c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #183 | libevent_malloc: new ptr-libevent@0x7fb36c035930 size 128 "road-eastnet-nonat-183" #183: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #183) | d6 e6 54 26 a5 51 49 90 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b d3 2c d5 46 1e bb 45 3e b1 07 9c 29 85 98 93 | ee 36 97 24 0c 65 6e 72 03 fd eb 26 66 8a 4d 99 | 30 4c 18 3c 80 72 a6 76 e5 f3 36 3a 07 42 32 c2 | 39 e8 9d 5f ec e0 51 20 28 56 14 b3 ac 67 3c fa | 98 5a 37 73 bb 28 df c4 30 da b1 be 2e 7d cf b5 | aa 2a 51 9d a6 55 f1 d6 02 88 71 ea 44 18 ea 39 | 96 0e 47 c9 6e 26 f7 c4 74 bc 17 b7 c1 ce f4 36 | 36 cb e7 f5 29 fd 74 37 cc 31 1f ce 2f ee 7a 23 | fd da 91 35 f0 f9 ff ec 58 26 8a a2 2f d2 81 0d | a1 17 24 44 c9 5f 1e 77 b9 2b 2f 5a f9 47 ce 83 | a8 fd f0 5f 20 8d e8 9e 6f 25 55 3c b9 c3 9c 82 | 64 c6 bd 5c b0 07 c1 4a d5 fd 91 20 b3 b1 5d bd | 38 8e ad d0 f3 fd d6 24 13 d0 4b 1a eb b6 e2 f9 | 08 8d ad d1 8e e2 f0 e9 c7 8d cc 8b a6 0c 02 89 | 89 a8 da 17 42 b0 bd b2 29 34 67 25 c6 68 61 cb | 05 67 1d b0 18 99 57 3e 48 e0 4d 27 90 f1 05 8d | 29 00 00 24 fb 03 08 25 8e 6d 3a 5f 6f 85 88 7b | 77 f7 13 2b 6d 57 c0 a9 57 85 b0 8d 7b f6 0e 38 | 56 d2 56 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 0a 8e a5 81 0b e2 cf 5a 0e 0b 81 | 8d 82 2c 01 80 91 75 34 00 00 00 1c 00 00 40 05 | bf 20 fb 11 3c 6a fd 35 31 59 61 81 c5 7f e8 2f | e6 90 5e b8 | libevent_free: release ptr-libevent@0x7fb34c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe740 | #183 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 e6 54 26 a5 51 49 90 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #183 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #183 | rejected packet: | d6 e6 54 26 a5 51 49 90 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #183: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #249 | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #249 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #249 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49622.559587; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002571 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe740 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #249 | libevent_malloc: new ptr-libevent@0x7fb34c0251c0 size 128 "road-eastnet-nonat-249" #249: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #249) | ad 80 10 70 da e5 b7 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 1c 07 0c da 8a af 5e 89 e6 75 e4 e2 6b 94 81 | 88 bb cc 32 0e 51 16 82 66 1f 3f 42 b2 39 20 4f | 72 37 07 9a fd 40 87 70 79 6c 98 3b 3f ae 9c 8b | ce 68 05 66 50 64 85 b6 97 7b 54 39 f1 30 aa a3 | 04 6c 7c 88 ec 3c d1 1c d3 b4 4e a1 ee ab a5 d5 | 77 d7 c7 96 43 3f c9 ba 18 4d e2 bf ce 40 6d b9 | 2e 6f 43 a4 09 5e 6a 0a 57 fe 2f e8 72 ab e9 6e | d3 23 65 2e 56 3d 4f 3b 55 96 b0 62 91 f8 d1 e0 | 2e e0 00 1a 25 63 9c 6e 63 ad 31 ed ac d2 4b 58 | e3 5c 40 70 04 55 4c 39 0d 41 92 a2 3d 54 25 26 | d7 ef 2a e6 88 54 16 3c 17 a5 5d ae da e8 b9 49 | 9e f9 ac d6 d0 b5 d1 4c 32 7f 53 80 13 ce 13 ff | c1 9e 7b 3a 03 2e b8 d1 5e 50 be f8 6c db 78 af | c8 42 2d 25 43 1f 70 34 56 a4 16 57 bf 31 c6 30 | d5 f1 f9 72 d0 f9 83 35 68 6b 2a 69 4e 20 b1 d3 | f4 3c 9d 15 41 2d 80 5e c6 a3 cc c1 23 a7 f8 c0 | 29 00 00 24 cf 2f e4 f6 cd 34 13 11 b4 5d 4f e0 | 11 dc f5 73 81 ae 1d 25 a9 7b e9 47 0f d3 b0 6c | 5e dc e5 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 3d 29 fe a9 de 26 71 da 28 d8 ce | 9c 91 f7 26 3e 7d 46 03 00 00 00 1c 00 00 40 05 | 93 a3 dc d9 83 9b 6f 85 6e d1 32 ad 49 d5 89 75 | f9 55 83 e1 | libevent_free: release ptr-libevent@0x7fb3600251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #249 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 80 10 70 da e5 b7 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #249 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #249 | rejected packet: | ad 80 10 70 da e5 b7 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #249: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0677 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f0aa0 | handling event EVENT_RETRANSMIT for parent state #73 | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #73 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #73 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49622.579941; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006785 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #73 | libevent_malloc: new ptr-libevent@0x7fb3600251c0 size 128 "road-eastnet-nonat-73" #73: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #73) | 1b d1 f7 22 4f 1d be c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 17 af cb 15 dc ab b1 a5 7f 34 62 4e 0f 28 9a | 18 48 48 5b 8a 7c 0e f9 96 fe 06 d5 63 de 59 f8 | 49 35 b4 79 b1 9f 27 0d e0 5d f1 56 f3 be 3d 0b | 2c 98 27 ba b0 9f 63 a4 e7 98 a1 c0 ce b7 fa 57 | bc af 56 22 b4 0b 08 17 91 1f 28 fd 21 7d b9 47 | be 94 09 11 9d 2a ae 62 55 90 ec cd fb 6d 33 53 | dc 6e 16 d9 31 7b 9a c8 fd c1 75 61 52 f6 98 91 | 94 9a f3 05 36 de 11 ce 66 87 ce 7a d3 f8 fd 04 | 0b ba 01 fd 05 22 ef 85 db 52 65 4a 74 05 92 71 | be df ba dc 65 01 21 6c d5 86 65 2b 9a e5 83 35 | a5 c8 2d 49 2e 69 13 a9 18 d4 42 31 7e 26 5b 88 | 7c 6f cd 46 42 cb fc 6c 40 14 2b 57 0e e7 97 72 | 5b db 5d 77 72 cd 54 3e 63 fa 42 39 c6 a7 84 0d | 90 25 f3 6f 23 cf 8e 04 75 0a 41 85 e3 ef 88 28 | 25 3f 56 c1 9a ec 95 fb a0 fa ac 95 ac 16 97 71 | 2e b2 fb 1e 8b 8f a8 12 b2 0a 1f 31 5e c4 d7 fa | 29 00 00 24 93 de fa 16 34 ae c4 6f 1c b0 6f ba | 95 0e 80 10 81 5f 54 52 00 a9 bf 63 44 18 a5 30 | 6d af 4e 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 5e 43 5b b5 69 a0 f9 16 98 c0 46 | f4 de 55 67 f2 0c 20 b2 00 00 00 1c 00 00 40 05 | 50 cf 48 cc c9 4e 77 06 66 f1 57 3b 42 c0 94 82 | a3 eb c2 6e | libevent_free: release ptr-libevent@0x7fb3600180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f0aa0 | #73 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b d1 f7 22 4f 1d be c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #73 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #73 | rejected packet: | 1b d1 f7 22 4f 1d be c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #73: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0672 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7fec0 | handling event EVENT_RETRANSMIT for parent state #184 | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #184 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #184 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49622.584917; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006138 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab00 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #184 | libevent_malloc: new ptr-libevent@0x7fb3600180b0 size 128 "road-eastnet-nonat-184" #184: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #184) | 71 40 97 9a 99 00 ff cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 9e 33 f9 05 c0 53 fb 65 12 d0 fd a6 93 df f1 | 7d bc 07 5e 94 4b 97 6f 27 67 0f f1 85 c0 12 45 | 70 43 01 96 7d 01 69 81 8a b0 0b 08 d1 40 54 69 | 08 7f 69 f8 31 5e 9b 37 c2 56 46 05 8a 2c 74 cd | 73 c4 b5 39 bb 8c 81 c4 97 49 18 2c ce 17 a4 56 | a5 b1 98 b5 93 fe 6b bc c2 93 00 1a 7a aa e8 f7 | 9e 16 d8 e6 36 67 49 7e af 2f 60 eb cd f3 b7 6a | 60 d2 41 2c 2b 50 9f c8 44 40 ce 80 81 98 cf 17 | 31 53 e1 d5 34 76 90 8f 6f 17 46 44 c2 a9 25 1a | bb c8 2b 12 0a 1a 41 c9 b5 0e b1 65 5f 47 47 f0 | bf a6 e5 e4 cc d3 34 bc 81 ca de 84 80 2f 52 78 | 36 7b 26 1f 30 98 4d d6 d7 8c 77 eb b9 19 2a e8 | 7d a0 5e 92 74 2d 37 d4 17 8f 23 ce 1e cd 45 d9 | cf f5 6b 81 d5 e3 95 2b bc 84 3e 19 7f 4a db 38 | c7 46 31 2c ab 66 d6 cd 71 a0 bf 63 ef a6 eb 59 | 13 88 4c 39 34 56 d9 d0 92 f8 f4 65 45 ad 6a 55 | 29 00 00 24 b3 65 f5 f0 87 cd d5 8a 91 5d ad e3 | f8 32 68 b3 e0 0d 46 b4 25 a3 92 64 33 fb 91 6e | c0 dc 6f 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 f2 a2 9a 11 9e a6 4a 33 e0 87 52 | 8a c6 6f 7b 74 99 45 a9 00 00 00 1c 00 00 40 05 | 98 85 7b 6c 79 cd cc f7 14 5f 2b 56 dd 51 39 9c | f7 d7 a1 50 | libevent_free: release ptr-libevent@0x7fb34402a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7fec0 | #184 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 40 97 9a 99 00 ff cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #184 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #184 | rejected packet: | 71 40 97 9a 99 00 ff cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #184: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0674 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #224 | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #224 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #224 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49622.617267; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002894 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7fec0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #224 | libevent_malloc: new ptr-libevent@0x7fb34402a950 size 128 "road-eastnet-nonat-224" #224: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #224) | df 89 b3 52 1f 0f f1 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 96 f9 c5 cf 52 6e 98 60 ae 95 1a e5 7e 1a 31 | 50 be ef 8d 41 26 11 5a 53 58 33 b0 a8 71 a8 6c | e8 76 92 5b e2 75 f3 94 63 68 60 f5 a8 87 0f b1 | 85 e3 57 f0 0a 68 7c 03 0c 38 78 58 ee f2 b7 98 | 27 f8 ff c8 7f ae 35 5b f2 27 8d 00 b6 82 75 2b | 3b 8a 79 42 25 39 44 44 74 88 57 0d 59 d9 ac 5f | 3a a3 28 54 30 c8 14 8d d4 ac c4 45 3f f7 ef e3 | 1f eb 55 97 53 44 9f 09 90 a7 a8 b1 9f 93 b7 ec | 77 b6 57 89 c8 dc e6 37 8a a8 71 f3 b4 89 24 f8 | 4d 88 b5 f8 54 45 64 00 76 98 8f 87 5f 00 73 6a | f6 f0 80 19 81 11 66 a0 99 ea 82 6c 63 da b4 a5 | 98 93 6c 76 ef 6c 97 72 9f 10 64 96 91 57 93 6d | a1 3f 92 89 58 38 d2 cf 72 5f 0f 1e 71 7d 51 50 | af 30 4c 3a ad 78 8a 2d 7e 0c 42 b8 89 96 d8 fc | a1 5f f4 b6 9f 10 b4 87 26 b0 a3 fb 36 06 d9 24 | c5 ea bd 98 29 fe 3b d7 81 37 c6 01 f7 9b f8 78 | 29 00 00 24 c7 58 00 d8 91 d9 da 4a 3e 8b 1d 2d | a3 43 99 18 27 ab 56 0f 2a b9 54 4e 52 a3 14 24 | 6c 73 a2 b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 40 3a 6a 95 ab 61 8d 6b 1f 3b c7 26 | b3 ad 90 46 7f 26 ab 97 00 00 00 1c 00 00 40 05 | 80 ec 8b 4c 52 09 6e c6 12 ca 33 07 bd aa 68 3f | 33 bf 9b d1 | libevent_free: release ptr-libevent@0x7fb35c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #224 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 89 b3 52 1f 0f f1 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #224 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #224 | rejected packet: | df 89 b3 52 1f 0f f1 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #224: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0669 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a18370 | handling event EVENT_RETRANSMIT for parent state #74 | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #74 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #74 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49622.647765; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006449 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #74 | libevent_malloc: new ptr-libevent@0x7fb35c01d920 size 128 "road-eastnet-nonat-74" #74: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #74) | 74 9c fc 4a 6a e3 e3 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 4c a1 32 c0 37 d8 5b 48 9c e5 d1 93 92 0c 53 | 2d 7a c8 b1 df 24 d3 9a 3f 8c d4 c5 68 47 a3 a6 | 97 97 ce bb 01 47 69 1c 80 a7 65 98 e9 23 03 f4 | d4 b7 9b 7e d3 4c aa b4 56 9e 09 14 71 47 28 7f | c7 55 55 ab d5 8e 75 f5 9a f4 57 8c 05 da 66 0a | 40 9c be 25 a4 ef c7 bf 8b 81 b2 07 d2 0a 7d 79 | a8 74 67 c4 01 41 ba 6b 27 91 81 d4 a9 3f 71 a7 | d8 a9 d4 20 88 c0 67 ed 9a eb cb 95 5d 27 cd ae | 65 ee b7 22 c0 dd 63 86 9c 71 c8 d0 62 02 64 6a | 57 b2 8d 13 05 28 bc e0 52 39 21 a1 da 4e f2 d4 | b5 8a d4 4a 90 a1 15 ec 76 63 23 1b 27 bd 31 af | 95 a2 f3 5b 2d 4e d4 42 7c 32 a2 bf 50 28 83 76 | 27 c1 4e 56 b2 c9 33 07 a5 ee bf 65 36 77 b7 43 | c5 de f7 7c c7 52 fc 27 15 dc 50 6e c0 2f d7 72 | 5a 3b a4 4a 5b f6 13 1e 38 47 4d 77 c3 69 47 89 | 95 21 ff 50 2d c1 83 a3 1a 90 31 a7 2f c0 c1 a5 | 29 00 00 24 5c 46 aa ed 6c 5c 2a de e4 4c 0f 0d | ff be a8 c1 d6 16 7f 78 81 97 e2 33 fc 98 55 93 | 9e 14 cc 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 26 fa 02 ef ac 51 67 96 4e b3 ca | 7c 6c ba e3 fb 9a 52 77 00 00 00 1c 00 00 40 05 | 65 ee a5 86 f4 0e 73 b1 a9 eb cb 64 18 5a 0c a9 | fd 3d e5 eb | libevent_free: release ptr-libevent@0x7fb37c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a18370 | #74 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 9c fc 4a 6a e3 e3 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #74 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #74 | rejected packet: | 74 9c fc 4a 6a e3 e3 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #74: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.067 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a84000 | handling event EVENT_RETRANSMIT for parent state #242 | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #242 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #242 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49622.652107; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.009669 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab40 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #242 | libevent_malloc: new ptr-libevent@0x7fb37c03b0b0 size 128 "road-eastnet-nonat-242" #242: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #242) | bb 4d 15 84 4a d1 63 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be b8 bd 73 36 69 de db bd 2c 4d 3f 4c ae 08 43 | b3 f3 d7 53 b9 34 af 4a b1 04 e1 e2 27 f6 b2 b1 | 3e 96 98 76 a6 00 83 11 2e 07 de 5b 47 a6 5a a5 | 8f 0c 87 f8 e6 f5 c8 d5 f0 ce bf 70 a9 e4 7d f9 | c0 99 10 3b ec 9c 30 58 7b 73 32 96 65 b5 9d 37 | 48 ba 52 b0 1b 39 cd 58 16 bc 06 a4 25 89 da 22 | ca c6 85 48 e1 fd 54 81 b4 f6 46 e3 a3 cc 04 fd | ed 22 5b c4 4b c5 12 3d 87 53 9d f3 99 49 26 6d | e0 15 46 62 13 40 fa fc 54 c0 0d bd 54 60 26 93 | aa dc 01 46 3c 92 65 7b 4e 15 bf 35 9f 0d 1e ef | 63 43 fe c2 e1 31 5d 4e e4 23 fe ab 39 17 60 89 | ab b5 9b 1d 6d ed 49 c1 f4 3e 50 67 a1 09 05 d9 | c3 d6 c1 46 1e 9a db 86 ae f2 48 84 9e 9d 6d f5 | 1a 55 ad e2 9f 23 3f a2 29 49 4a 81 a2 25 2b 78 | b3 0b 2d 2a ec 81 b7 72 6f 93 e3 8b ce 4c b6 e9 | 10 ec a2 f6 93 c8 51 54 e2 4d 42 c5 bb 12 0b c1 | 29 00 00 24 43 16 25 02 5f 89 fd c4 95 04 8f 29 | f5 97 17 77 c9 2f ab bf 71 ef e8 74 04 bd c8 92 | df d9 0b 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 dc d6 bb 84 20 bd 3d 97 6d a1 71 | 60 d0 7a 61 e2 12 2c 58 00 00 00 1c 00 00 40 05 | 6c 10 68 84 3a c9 9c f7 49 94 4f 1d 42 c4 e8 ff | 34 65 7d fa | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a84000 | #242 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 4d 15 84 4a d1 63 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #242 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #242 | rejected packet: | bb 4d 15 84 4a d1 63 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #242: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf10 | handling event EVENT_RETRANSMIT for parent state #185 | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #185 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #185 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49622.653617; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007733 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #185 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 "road-eastnet-nonat-185" #185: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #185) | 94 c0 c2 c7 3b 30 ec 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 10 80 e8 ac 1b 57 a4 b7 f2 12 9c c9 c8 96 12 | d8 b4 37 f7 f8 c8 3c b7 f2 86 fb 6d bc 61 da 40 | 39 a4 09 f0 8f 66 50 7a 6b 75 22 97 37 a4 94 4e | a8 5c 5f 80 9b d3 2e fd ee fe 03 91 38 cd a2 e4 | 3e 5d b4 2b f3 14 af ae 26 82 7e 4b 88 39 37 81 | 82 aa 3c c6 ab ba 4d b3 20 34 8d 80 3d de a0 ad | 42 64 df 60 e3 cc 41 7d eb 1f a9 4c f0 d1 47 57 | 07 35 a5 e9 25 89 b5 0e 8b 91 92 1f 2f 09 b9 ab | 46 f1 69 33 6d d8 ef 90 01 9f 20 97 28 19 d8 4c | ce 9d c5 c8 74 d2 ec a5 dd e6 34 68 1e 8b 44 b9 | 5e 3c 90 76 95 68 8e 41 20 32 dd ca 48 f2 30 6e | af 87 2d 28 a1 ad c2 a1 66 51 1d 16 88 02 4d 4b | 75 a2 59 e4 ff 63 fb 70 3e 65 bb 8f d3 36 fc 97 | bb a3 6c c7 eb b7 6a f4 47 9b e0 12 1b e1 cc 32 | 68 f4 57 ff 85 75 10 4d 46 e9 36 6a ae db 06 a6 | 0f 02 20 5f 93 d8 c0 d3 99 19 3c 12 5e d8 75 16 | 29 00 00 24 d5 ca 6a 54 4d eb c2 30 7e c2 c0 88 | f4 64 53 65 cf cb b4 99 9a a7 3b 19 af 88 ec 6a | ae 0e 11 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a b7 31 38 16 04 07 33 64 be 6b 23 | be e3 1c e2 4f 4e 6e d8 00 00 00 1c 00 00 40 05 | c2 92 61 e3 4d 3a b1 c0 20 50 44 2b db 6e 80 18 | c6 ee 39 60 | libevent_free: release ptr-libevent@0x7fb34401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf10 | #185 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 c0 c2 c7 3b 30 ec 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #185 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #185 | rejected packet: | 94 c0 c2 c7 3b 30 ec 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #185: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0568 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c00d120 | handling event EVENT_RETRANSMIT for parent state #250 | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #250 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #250 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49622.660206; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00209 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #250 | libevent_malloc: new ptr-libevent@0x7fb34401d920 size 128 "road-eastnet-nonat-250" #250: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #250) | 17 2a 9d c4 13 ac 7b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f a0 94 c6 2f 84 36 04 eb 6b 9e d3 d8 c3 41 dd | 36 5b 9a 4c 3e c4 08 57 57 9d d2 59 b6 8f 5a a0 | 97 64 4c 58 37 53 a6 c4 b2 5a d7 28 c7 0c 91 ed | be a1 6c 6f 57 ab d6 36 57 9a ec 6e 81 e7 d9 ec | 00 31 e4 c2 56 03 3a 6a 1d 88 e8 70 93 fc 2c 64 | 28 be 05 43 75 db 83 1a 2d e0 38 f0 97 bc d9 f4 | 8f af 26 f3 55 d2 01 81 1a 51 e6 93 66 74 0d 48 | f0 8b f8 85 50 76 3e 80 0e 67 70 24 1d ad 6e ea | 72 9d 01 c4 5f 99 0d ea 29 5d 36 37 89 d4 98 07 | 88 15 ab 7a c4 c5 62 ba fc 8c d5 56 64 df 3c 82 | 9a 54 de 55 20 6b b2 85 89 5d a1 07 c2 57 11 bd | f6 1f f1 5d 9f 5c 8b 9a c0 e9 98 82 3c 9e 57 da | 35 cf a5 fa b1 00 d7 17 27 e9 41 21 aa 94 96 cb | a7 a3 73 c1 a5 31 48 fa 19 d0 03 ff 95 c4 5d f6 | f5 17 61 a5 35 90 af 0b d1 1b d3 73 e5 de 34 00 | 63 00 cf f1 60 d4 f0 c0 3e 0d 02 7c 00 ab ce 51 | 29 00 00 24 c8 41 60 b9 9e 92 4a 7d d2 ef 9f 8c | 7b 43 49 a0 e3 71 1b 9d 34 81 8d 16 42 5a ed 22 | 3b 97 7d 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 44 92 04 c0 13 80 0a cd 61 73 30 | d2 9c c0 ea 6c 30 db 12 00 00 00 1c 00 00 40 05 | 76 73 9b 47 5d 14 7f b7 af f1 ed 94 26 55 3a fd | 56 a2 76 70 | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c00d120 | #250 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 2a 9d c4 13 ac 7b ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #250 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #250 | rejected packet: | 17 2a 9d c4 13 ac 7b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #250: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0551 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae4880 | handling event EVENT_RETRANSMIT for parent state #186 | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #186 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #186 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49622.736563; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.008245 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #186 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 "road-eastnet-nonat-186" #186: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #186) | 89 a9 38 aa a6 c0 30 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc fc 7f 3d ba 5a de bc 76 c2 c4 f8 68 37 1f ff | ca 8e ea 53 55 b1 47 97 0b 37 3b 65 fa 61 e7 dd | 35 17 7f ab 01 8e 38 9f 4b 7f 31 31 92 f1 ba bb | d0 06 33 61 10 0b fa 86 b8 ef 01 c3 cf b1 bb 29 | 2f 2d 37 13 10 34 87 1c 1a 2a fa 97 52 ab 57 63 | 92 bf 2b 4d 93 56 f2 e9 12 3c 46 24 50 0a 19 24 | b2 fa e0 6c 1d 91 6c 12 4e 27 c3 47 94 7d 6e 37 | 39 fc 81 56 89 ca 68 6b ce 06 f5 e3 55 1e 76 a1 | 72 bf 58 f7 9a b2 03 67 a0 61 c5 e9 74 36 67 70 | b9 96 14 a2 56 cb b9 33 ac 90 e3 4f 5c 75 ef 3c | 0e 13 a9 08 94 45 0a e0 b9 1a 9c 47 5c ef 62 4f | 55 46 d5 a5 09 5b 68 73 3a 25 4c 57 99 05 2a 57 | 57 52 51 7e 0f b6 14 9f 14 b0 d1 cf 63 29 63 a1 | 49 60 4a 12 aa 1e 1e 0f 3e 32 25 9c d8 71 75 aa | 14 8e 9d fc 55 96 cf 4d 35 00 a5 a7 02 46 8a b7 | 5a f6 88 8a 4d 78 6c e2 1c 82 47 88 0b 3b 1c 06 | 29 00 00 24 d4 45 d6 30 bc fb 2b aa 5c 8e f3 b7 | 0c 17 f8 b2 59 80 d2 e0 0c b8 b9 7f 67 b9 de e9 | d9 5a 25 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 68 b4 19 b5 e8 c7 d6 3c c7 30 38 | 5a e1 45 af bf 1b f1 0b 00 00 00 1c 00 00 40 05 | db 71 7b 2e 3b 5f 62 cf 6c 1d 8c 60 1b 08 38 c5 | 84 d6 4e b5 | libevent_free: release ptr-libevent@0x7fb3700407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae4880 | #186 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 a9 38 aa a6 c0 30 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #186 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #186 | rejected packet: | 89 a9 38 aa a6 c0 30 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #186: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338005860 | handling event EVENT_RETRANSMIT for parent state #225 | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #225 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #225 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49622.766906; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.014454 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae4880 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #225 | libevent_malloc: new ptr-libevent@0x7fb3700407f0 size 128 "road-eastnet-nonat-225" #225: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #225) | 1c 46 35 b1 a5 15 7d 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae fb 41 53 6b 81 0b c3 2d 10 6f c4 43 42 9b b5 | 58 ae de 87 ce bb b8 82 21 69 b3 17 de bc f9 c2 | a6 34 e7 7f 32 f0 7d a7 6c 08 3e 2b 62 ab 16 a0 | 49 34 97 75 bc a1 e7 57 c6 b6 15 50 f3 8a f1 c4 | e3 18 e0 09 c0 26 64 c1 d3 38 7d 95 30 90 58 4d | 99 27 bc 98 4e c8 b5 39 36 2c 46 50 c2 b8 f6 07 | a6 3c 00 2b 8d 8c 50 f6 a6 08 bd fd 79 68 91 be | 81 69 f3 24 98 59 43 c8 78 e1 dc 86 d2 16 6e a3 | 6a de dc a4 19 ff e6 d6 63 67 69 75 d8 ae 52 31 | c3 a7 ea ea 95 69 03 74 0f ef e1 6f 99 0c 56 d4 | 62 d0 1b 8d 8f 7c ad 94 ab 7c 03 43 80 8a 6e bb | 36 aa d3 44 03 e6 5c 20 d3 4b 45 e5 a2 5c 00 25 | 37 ab 32 ce e0 ae 35 8e 13 d7 03 37 11 57 20 f8 | ae 87 85 bc 10 d5 2c 64 54 e7 c4 49 10 99 df 04 | 79 9e f4 43 41 4b 6a 31 13 21 e7 cf d7 1a da 5b | 4b c0 6d 43 c6 e7 f0 86 e7 2a 75 03 ec 4c de 27 | 29 00 00 24 27 0f 48 fe da 9f b7 b6 f5 85 2e 21 | 09 ff e1 4d 05 12 3c c0 4b 2e ad df df d0 69 83 | 11 81 8e 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 11 33 1d 86 3c cb d4 6f 7e 68 c8 | 95 dd 6a 6a 4f 3e eb 1f 00 00 00 1c 00 00 40 05 | 41 16 5c d3 40 8f 72 70 a4 ea ff c4 c5 31 7c 04 | 7c 81 7f e0 | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338005860 | #225 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c 46 35 b1 a5 15 7d 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #225 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #225 | rejected packet: | 1c 46 35 b1 a5 15 7d 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #225: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a74cd0 | handling event EVENT_RETRANSMIT for parent state #75 | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #75 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #75 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49622.768258; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.011032 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #75 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-75" #75: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #75) | d6 96 43 68 6a ec ab 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b e7 f0 1b 8c 0a 12 dd d6 e5 bf 02 28 26 dd ac | 6b 5a 27 84 cc 5b e1 51 a5 48 25 1e 64 a9 f9 15 | a7 cf bd df a0 ad 76 b9 f4 06 07 4e 82 21 11 6b | 26 3f e9 d5 c8 28 2c a1 f2 de e8 cf 1b 66 10 aa | 48 33 36 9a e1 15 5a 5f 6d a7 50 58 f0 d8 c9 11 | b2 31 61 66 dc 13 e3 c7 ff 39 58 4c c1 88 d6 62 | 58 b9 1d ad d3 89 b6 21 d6 53 4e 88 4f 41 13 08 | 17 e6 d6 6a c0 94 05 0a ca 81 fd 84 5a f1 98 1e | b0 e9 8c 00 0a 4a 9c 8f 68 9e 7b 0d 09 60 4d 06 | b0 a8 a6 4f 85 49 38 bb ac 0a 4e 89 c8 a9 1a ef | 21 bd 3e 11 8d 34 77 94 db 0a 8d 1b 25 93 bc 6d | 26 8e 7b 5a 1c a6 da 04 b8 b9 68 16 5d 98 25 e7 | 4f 1c fe b2 4a 85 cb fd 7d 24 86 89 1b f6 19 0f | c0 e3 71 1b 57 41 f6 79 be 0c 81 b2 d6 8d b1 21 | 0e f7 f7 b1 1e d7 c5 ff e7 e6 4b 6a 5e 29 e6 f5 | 33 d7 87 e4 a6 ee a9 a9 4b 11 cd 2e d2 b6 0a d2 | 29 00 00 24 80 4b a3 25 3b 73 08 25 20 19 cd 1b | 6b 4a 3a cd 29 5e ac 55 94 fe 42 a8 a3 13 30 97 | 0f 50 65 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 04 fe 2e 3e a3 d6 9c 0e cd 5a 49 | b4 f8 ac 71 05 8a 92 ef 00 00 00 1c 00 00 40 05 | 56 54 de 54 0a a0 dc 64 96 23 cc 19 a1 e6 37 21 | c0 78 fa 6f | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a74cd0 | #75 spent 0.183 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 96 43 68 6a ec ab 11 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #75 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #75 | rejected packet: | d6 96 43 68 6a ec ab 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #75: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0839 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #251 | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #251 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #251 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49622.772663; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002053 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a74cd0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #251 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 "road-eastnet-nonat-251" #251: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #251) | df 3f 41 8a f3 53 d1 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 be c7 da 7c e0 83 1f ee 21 fb 97 63 3a 34 59 | 37 0f 13 08 a4 ea d7 d0 84 7f b3 4c 1b d7 fd 64 | d7 1b c4 39 0b a3 dc 8b fa 1d 0e 6a 81 2a 3e 09 | 69 77 47 fe 6f e7 1c 9d 41 07 43 05 b4 26 e9 60 | f3 29 4e c8 f2 da 1b 32 bb 97 33 75 2b 11 a0 c6 | 90 b8 73 b2 56 c1 80 3f f7 61 34 26 98 51 70 a5 | 88 c0 d8 c1 f3 4f b0 3f 75 1e 72 b1 d1 25 9a 2c | fb 27 8d d4 bd e9 f9 05 8f 56 62 b1 eb 23 67 7e | 83 41 57 f8 72 a3 e1 9d d8 36 e3 98 b1 13 30 a8 | a1 41 78 93 e9 2c e0 32 39 cd 75 d2 0c 43 c2 5b | 87 04 ee b5 1e 82 ed bc 9a dc ae f7 d5 db 76 da | 37 c9 35 0d 18 56 2e 1c 38 d4 6f a6 b2 28 96 31 | 03 0b 4f 71 60 58 12 2e e6 e1 cb 0c 0e 82 e2 ad | 8c 61 3a e3 4a ba d8 15 fc ef ca e2 63 cc 17 43 | fc 08 79 fe 35 fa e0 53 4c ee 7c 11 7e 46 1e 11 | a2 1a 41 cb e0 70 0b 67 d9 3b 63 7b ce 2c 58 e9 | 29 00 00 24 42 a0 3c df af e9 94 45 ab 83 0c a2 | 5d 7d 94 01 25 5c 79 6e 69 bd 19 b2 b1 d1 a1 50 | 35 69 ea d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be 44 4c d9 6f 7f 41 ca 31 72 e4 37 | ba 88 35 fa ba 64 3a 13 00 00 00 1c 00 00 40 05 | c3 fb 91 09 59 3d 6b 06 7b be 35 78 ae 35 d3 44 | 75 ba f4 a9 | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #251 spent 0.207 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 3f 41 8a f3 53 d1 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #251 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #251 | rejected packet: | df 3f 41 8a f3 53 d1 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #251: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0868 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7e4d0 | handling event EVENT_RETRANSMIT for parent state #243 | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #243 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #243 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49622.787159; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.999825 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #243 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 "road-eastnet-nonat-243" #243: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #243) | 39 d2 8c 3c d9 9b d0 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 7c 7b 28 d8 43 9d a6 57 48 f3 56 58 a9 96 02 | 89 eb 92 ba df fe 7c b4 93 87 0a 15 04 96 3d d9 | 97 4f ed fb da 47 e0 91 75 a8 ae 92 a4 07 c6 b2 | 54 7e 3f f7 5a ab 2d 86 ec bf b6 60 fc b0 e0 42 | 42 76 7a 8f aa 4f aa 15 dc 06 c4 c5 a6 64 c4 cb | cc bb 4c d4 38 55 bd b1 4e f2 bf cc 48 b4 72 4f | 87 59 b4 0f 7e ed 03 f1 41 ee a8 6e 5e c8 2d 73 | 30 2b 8d ba 0f 00 07 b3 03 3d 8c 71 2e 4d 64 94 | 7c 2a 25 17 eb 7f f4 7c 3d ac 47 e3 e8 64 b3 1d | 93 52 33 b4 60 d2 91 0a df 53 00 a1 04 e7 82 d1 | ba cb 66 13 49 96 51 fe 75 53 10 a1 e8 ed 85 c1 | 24 57 8f 5c 2d ab 6e 1a d8 d2 18 48 42 bf 96 fc | f2 c5 7f a1 3d 7c 8d 10 dd 4d fc 0c 94 ce 13 b9 | f3 c9 49 d3 a2 9b 04 c3 51 ef 2c 4a 1d 70 85 00 | f9 d1 0e 6b 0b 48 a0 fc 89 8f e7 8e 83 74 57 7a | c9 0c 8d f3 c6 50 96 a3 99 76 7c eb ac 17 30 58 | 29 00 00 24 35 b2 35 5f d9 02 63 3b 19 19 86 78 | 0e 3a e9 6c 99 53 dc 00 7c 7f ad 46 fe dc 4c 82 | 97 17 87 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 31 4b 64 ab 4a 78 81 95 90 fa 46 | 73 84 e5 27 1c 47 ef db 00 00 00 1c 00 00 40 05 | 94 bc 64 25 b1 da 5d db 67 02 68 07 a8 c5 47 cd | f9 c3 f5 ed | libevent_free: release ptr-libevent@0x7fb374024f80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | #243 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 39 d2 8c 3c d9 9b d0 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #243 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #243 | rejected packet: | 39 d2 8c 3c d9 9b d0 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #243: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fd070 | handling event EVENT_RETRANSMIT for parent state #187 | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #187 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #187 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49622.807512; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.01328 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #187 | libevent_malloc: new ptr-libevent@0x7fb374024f80 size 128 "road-eastnet-nonat-187" #187: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #187) | e7 c9 b3 98 5a b5 d8 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 8c 48 13 ec 18 80 1b 32 77 ec 9e 3b 86 33 3b | 02 ed ce 45 9e d1 07 07 3e bc 97 2e 75 42 14 66 | 03 ce bf d6 11 7b 13 df d2 31 59 70 fe 3e 83 b2 | 64 79 15 03 06 38 db 20 68 31 b1 be e0 b0 81 7d | 4e ac bf 91 07 33 90 db 11 13 bd 16 b3 19 bb 2f | bd 78 ea 08 d7 04 61 29 46 e0 b0 be 88 fb b6 99 | 78 ba 8a fa f7 9f 36 82 a5 d0 b5 cc 15 77 46 bf | 6f 96 e3 0e c4 42 db ac 87 dc 33 da 45 8d 53 39 | 47 ad bd 32 b7 e2 e1 e0 66 2c 6d db 19 28 b7 a9 | b4 a9 eb 1e eb 6f ee c7 40 8b 38 5d 63 81 df 4c | ca 8e 71 2d f6 ed 35 fe b2 fe 7e cb 56 c2 0b db | 35 33 69 6f 1e 16 e5 63 9f 75 fa ec 8a 49 49 95 | 1a f3 8c 29 d9 10 61 09 99 f1 00 c7 a8 23 e7 4f | 74 f2 03 0e 72 27 59 cb 0b e6 eb fe 8d cd 75 0f | 66 f2 35 88 c0 48 17 b6 36 94 37 a8 a7 99 a0 7a | 46 3f c8 7b 62 bc 09 7b 66 12 f0 77 17 2a c3 df | 29 00 00 24 92 ee 3c 64 04 c9 f4 27 93 49 ca cc | 80 d7 5b 2f 40 c6 99 75 47 bf 36 6e b0 fd dd e8 | 14 05 72 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e d3 6f 6b 08 b5 24 1b c7 b0 97 c1 | 57 a8 5f 57 16 36 48 8c 00 00 00 1c 00 00 40 05 | 70 ae b7 c1 13 54 ea fb c0 86 88 d6 98 09 04 e8 | dd f9 c2 0b | libevent_free: release ptr-libevent@0x7fb34c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fd070 | #187 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 c9 b3 98 5a b5 d8 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #187 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #187 | rejected packet: | e7 c9 b3 98 5a b5 d8 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #187: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acc140 | handling event EVENT_RETRANSMIT for parent state #76 | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #76 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #76 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49622.833876; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006852 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #76 | libevent_malloc: new ptr-libevent@0x7fb34c0407f0 size 128 "road-eastnet-nonat-76" #76: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #76) | 08 23 b8 f6 73 09 18 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 b3 88 98 c3 00 3b ee 78 d3 a9 62 79 c8 5e 50 | ca be d3 60 b9 ac ef b3 70 f2 72 51 6e d0 6f e7 | 76 2f 02 45 ea 0c 3e b7 a1 fa 9a de 13 7f 48 f6 | 9a 0d 43 96 53 05 8a 3f 59 81 18 a2 54 08 83 e6 | b2 23 5b f0 fb 8a 5c 92 dc 0e cf 01 e1 94 34 22 | c2 e0 dc ae e5 0d ab a5 e1 89 bb 62 bf 90 17 bf | 34 96 56 44 a4 0c 23 a8 83 ef d0 4c 0b 33 57 7c | 55 bb 56 dc a3 43 8f 68 ba 01 38 40 7f c5 c5 3f | 05 89 dc 6e 0f 54 d6 e4 1f 39 ed af 78 c0 40 5e | de 96 c5 64 7e 4a 03 ee be b0 cb 81 ef de ed 18 | d9 e4 a5 05 6d 9a 00 f2 6a ea 28 7f 9c 2d 97 a0 | 10 8c cf d6 69 56 ba cb c7 fa 65 c6 5b b9 83 ba | f4 70 1e a9 02 08 4b 23 06 c6 59 e2 2c c1 32 a4 | 3b f4 b6 34 0c f2 27 38 ff 60 3f ff db da aa 0d | 54 69 d6 85 b5 50 9d 06 87 5b 28 9b f1 40 e5 16 | 60 3a e9 e8 52 ec 8a 8f b6 c8 a1 d2 cd ff f5 a1 | 29 00 00 24 15 3e 8d 58 5c 16 4e 6b 9c 08 25 92 | 8d ef 80 f2 25 ea cd 1e ba c6 95 f9 1b a7 f2 dd | 45 1d 12 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 8b 52 aa 3c 87 b6 df df 8c 81 fe | ec 85 60 df 06 8e 81 b3 00 00 00 1c 00 00 40 05 | 54 01 aa b8 56 eb 7a 7b 30 98 73 ed 67 e2 36 06 | bd 7f 30 ed | libevent_free: release ptr-libevent@0x7fb3440300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acc140 | #76 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 23 b8 f6 73 09 18 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #76 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #76 | rejected packet: | 08 23 b8 f6 73 09 18 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #76: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0952 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a89740 | handling event EVENT_RETRANSMIT for parent state #226 | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #226 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #226 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49622.881244; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.008563 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acc140 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #226 | libevent_malloc: new ptr-libevent@0x7fb3440300e0 size 128 "road-eastnet-nonat-226" #226: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #226) | df 8a 99 41 35 8f 22 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 39 0d ed 10 1f e3 0e ea ca 85 c3 5a 17 31 22 | 97 9f 06 33 b0 59 ed 25 d5 cd 46 5c e1 b7 68 7b | 60 f5 73 ac 22 e6 10 7a c8 3f 64 54 b7 2c c9 ba | 36 26 b8 60 a9 a1 e6 a3 6e 44 7f 00 0c 75 49 7e | c6 17 73 3d c6 70 48 38 43 a2 56 d7 f5 0c 3f 3f | 3f 97 93 c5 a1 2b c4 07 4f 49 5c fa 0d e2 93 83 | 1d 93 5e ee cb e1 2d 5d 17 f0 04 37 84 12 a1 e4 | ea a7 ca c8 ca 5c 70 fb 0f d5 b4 aa ca 0a eb f9 | b6 b5 03 c1 29 21 80 90 c2 2f 2a fe 6c ab e2 c4 | da df fe dd 41 56 bd 81 ee 73 c7 0a e6 2a 84 64 | 7e c8 7b 2b 7f 3e cd 94 23 75 81 89 67 c2 03 bf | 33 3e d9 d2 a5 ec 73 d5 af 8a 02 94 e8 dd 1e 6c | 57 45 a8 23 17 bc 83 80 e2 7d fe e3 0d bf 65 a8 | 6f 93 8d 7c 46 a5 58 a7 45 54 b1 bb ae e2 cb 5a | 09 4c cd b3 40 87 10 07 3f c6 8e 21 cf 42 d3 a0 | 05 bf ba f5 eb 01 2d 75 a7 76 4b e5 7b 42 b7 8d | 29 00 00 24 c0 94 06 00 9d 87 40 a0 ec d8 4c ee | 0c 16 0e a6 24 3d 43 67 f1 e5 1b a0 19 81 a3 5d | 35 48 05 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd dc 27 ce 4f 2a 14 a6 0d 4a 3f dc | 07 9c 36 b1 1b e9 59 bb 00 00 00 1c 00 00 40 05 | e3 eb a3 4f 44 c3 b7 5b e6 19 f6 7f 9a 7d 29 4c | 6a 02 ce 75 | libevent_free: release ptr-libevent@0x7fb38401cc10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a89740 | #226 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 8a 99 41 35 8f 22 b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #226 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #226 | rejected packet: | df 8a 99 41 35 8f 22 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #226: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac3ec0 | handling event EVENT_RETRANSMIT for parent state #77 | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #77 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #77 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49622.894588; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006139 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a89740 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #77 | libevent_malloc: new ptr-libevent@0x7fb38401cc10 size 128 "road-eastnet-nonat-77" #77: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #77) | 4f f7 57 30 7e 30 db a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 14 f0 66 5e 0a 53 d9 86 47 70 5a 8a 73 bc cb | 52 bc 3f 13 31 b6 9a 6b ff ca f8 2e b7 f0 48 d4 | 77 e7 4c 8e 73 e9 11 6d 0b d9 88 30 75 88 11 48 | 3e 3b 98 fa 3c 66 3a 0b 64 a6 08 cb b7 12 5b 20 | d5 1b 40 67 18 3f 33 02 0f 4c 76 b1 96 fb 38 53 | 46 2f 32 4f 32 aa f2 f1 c1 7e 1b a3 93 84 38 d3 | 1e e6 5e 44 4e 6a 52 d2 5d 7c 9d 39 17 98 69 cc | ec 36 94 6b e8 33 1d ce 1b 8f 5c 7f dd d4 89 82 | 85 a6 1d ff 6c 9b 05 f9 47 a5 19 cd c4 fd 29 1a | 81 51 1f 14 ac 62 dd 33 b1 29 91 3b e8 1b 12 6e | ed 37 99 ae 6f 7a c8 95 71 30 61 a1 ef a5 33 55 | ef 40 50 d8 41 20 80 d2 32 15 fe 53 0a 4d 72 3e | a0 4f 5d 9d 14 7f 1b d9 8a 58 bc 3b 06 b1 c0 d6 | 7a 44 d2 2e f1 5d e3 62 b2 7b f9 e3 44 aa 80 9c | 12 99 76 f5 03 a4 33 27 55 fb 36 b5 80 18 d9 30 | de 03 51 b8 74 0a cb fb 17 be 0d a8 1c 8a af f0 | 29 00 00 24 70 06 ac 37 52 b8 ec 28 7d 6d 81 11 | 1b 1b 6d ce ed 39 8f ce a3 eb 17 d2 32 09 4a 8f | f1 a8 0e 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 42 86 64 cb f7 df d8 ee 6f 6b 28 | 69 76 6e 6d 07 28 e7 b4 00 00 00 1c 00 00 40 05 | cd 8e d4 a4 9f b1 74 d8 7d 8d 61 97 d8 57 39 f7 | 36 5a 1d 66 | libevent_free: release ptr-libevent@0x7fb384027b30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | #77 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f f7 57 30 7e 30 db a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #77 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #77 | rejected packet: | 4f f7 57 30 7e 30 db a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #77: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.067 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90400 | handling event EVENT_RETRANSMIT for parent state #252 | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #252 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #252 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49622.904943; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.004429 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #252 | libevent_malloc: new ptr-libevent@0x7fb384027b30 size 128 "road-eastnet-nonat-252" #252: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #252) | 50 58 54 7e 04 4a db ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 00 2c be 68 01 bb 0f 58 1a 16 c9 1d 14 15 83 | 19 e0 b8 46 87 82 81 55 0f dc 16 6a 8b 3d e4 4d | 0c e9 b2 bb 22 a5 95 09 ff 11 50 af 23 66 83 f2 | 31 7e 02 6d d7 48 dc 83 9d bb 70 c0 3a 92 f4 c0 | 9a e6 0b 57 02 38 84 8a 91 5b b5 ae 3c f3 73 1a | a4 24 27 15 5b c6 51 0e da 95 77 0a bb 05 7d 91 | af 25 45 22 0e b2 f2 4f fd 42 9b d1 98 1f 5e 0f | dd f0 f2 19 b9 ea ba ee 11 21 ee b6 0c 0f c9 55 | 03 18 8b f7 b4 d9 1d 6b 99 70 65 d0 5f 1e dc 40 | 4c 0a 83 ea e9 69 a1 18 51 d4 d2 fe 11 46 10 47 | b7 70 71 e5 e6 a8 cb f1 92 74 f2 25 34 f1 2a 20 | 05 8b f0 31 b4 4d ec 75 25 71 1f 16 3f cb 5c 38 | 5c 6a 40 df be e7 8c 81 eb 7e b2 34 69 d7 27 e3 | f2 93 a6 4e c8 e4 03 ff 2e ce ce ed 7f ee 01 95 | 24 0e cb ce 0e 6f 39 0e 07 c6 d8 ca 80 7d 23 cb | 6a 28 32 82 38 d2 86 f0 3f 31 6d 12 83 e3 4e 38 | 29 00 00 24 18 de 08 18 c8 a2 29 e1 d8 0d de 97 | 0b 9b 22 3a 3d 4c 80 05 7e b8 73 ae 1d 84 d5 68 | cf f8 f7 ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 65 87 e0 56 8f 33 84 b6 65 68 e9 | 21 de 15 28 76 56 f7 ec 00 00 00 1c 00 00 40 05 | 9e 72 e4 22 38 66 37 d3 ad ef a1 2e a9 f7 f8 37 | 54 d6 26 3e | libevent_free: release ptr-libevent@0x7fb3580300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90400 | #252 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 58 54 7e 04 4a db ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #252 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #252 | rejected packet: | 50 58 54 7e 04 4a db ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #252: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acd680 | handling event EVENT_RETRANSMIT for parent state #188 | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #188 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #188 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49622.915815; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006389 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90400 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #188 | libevent_malloc: new ptr-libevent@0x7fb3580300e0 size 128 "road-eastnet-nonat-188" #188: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #188) | f8 92 2e dc 48 c8 64 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 8c 6e 8b 73 15 ff 0e bb aa f8 24 68 da ef 6a | 1c 01 19 e8 a2 a3 5e f6 5a 71 31 aa 3c b1 c4 41 | 27 8d 2a 58 b3 aa 09 ec ab 9b 79 a4 37 2c 57 bc | 33 2a 63 cb 88 61 ff 6f 57 a5 f5 2c 3b 28 ff c0 | e2 03 fe e0 d7 c3 cd af a3 47 59 59 0e 58 bb 20 | d6 dc 5a 4c 31 47 b6 5a 25 02 b2 63 30 de fe 0f | aa 00 d1 fa e6 0a 07 a2 95 d3 2a cc eb a7 d4 64 | 92 40 37 20 3b f0 9c 95 06 bf 89 fe 4e 9c 75 93 | be 49 6d 83 74 cb 43 a9 68 b0 b3 1b 6c 7e b1 7d | 71 1f eb 81 78 ef b8 84 cd 25 a3 cb 59 97 64 95 | 1c 19 a1 95 2c 31 c2 d1 08 08 8a 2a 38 f4 5e 06 | d0 60 01 b7 7e f7 37 07 7c 57 50 f7 20 78 35 94 | 90 2f 3d b8 01 db 62 a4 93 0c bc 99 72 08 c3 2a | 65 b1 ef fc 8b 00 29 6d 1d eb d8 05 c6 bd 18 34 | 85 96 91 a6 8d 87 95 d6 03 d2 b7 ec 1a a3 0e 66 | 18 52 9c 51 fa 27 d5 c0 2b 40 de 51 c6 17 5c e3 | 29 00 00 24 32 b3 09 c7 6d 35 ae 79 0b a9 93 c1 | 25 b3 85 c2 02 53 dd a2 dc f7 0c 55 f9 9f 55 72 | 45 99 28 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 05 c4 f8 2b d0 22 47 d6 02 77 fd | 96 35 b9 b3 1b 70 08 41 00 00 00 1c 00 00 40 05 | f1 47 98 30 50 7a f1 c9 d1 56 2e ed 54 8a b8 d4 | be 9f b3 89 | libevent_free: release ptr-libevent@0x7fb36002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acd680 | #188 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 92 2e dc 48 c8 64 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #188 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #188 | rejected packet: | f8 92 2e dc 48 c8 64 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #188: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a100f0 | handling event EVENT_RETRANSMIT for parent state #78 | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #78 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #78 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49622.956136; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007232 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acd680 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #78 | libevent_malloc: new ptr-libevent@0x7fb36002a950 size 128 "road-eastnet-nonat-78" #78: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #78) | a4 c9 07 ac 54 d6 e0 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 5b 1c ec 96 24 e8 86 d8 c5 db 68 a4 e8 84 cc | f4 a2 ed 99 bf 5e 8a c5 ce b3 9d 08 41 58 29 f0 | dd 3a 5a 77 6f 59 d0 63 db 3e 63 03 3b 94 a8 82 | ea c5 b5 55 dc 2c ec 77 5f 63 ff ce 1a d3 98 5f | ea ba 50 e4 20 9b 1b 0b de 70 1d 72 5e 41 20 22 | dd 96 8b a8 2c 90 f1 b3 79 70 7b 0b d2 f5 29 64 | 24 96 41 c0 b2 23 eb 70 92 6c 66 1d 59 a6 82 09 | 57 e0 df 9e 1d 1d 55 b5 06 9b 7f 66 07 cc cc ff | f3 52 44 fb 3d f1 4f 79 5c 0c 51 85 cc cb 4f 32 | 4d 99 ed e1 7c 32 81 a7 49 c4 5e 9c f7 c7 98 e6 | 2c 03 b7 c8 ab bf 01 d1 70 a5 d7 0f 97 f6 d8 06 | e8 43 56 25 d8 da 9c 66 8b 84 9d ed 34 99 f3 6a | ab 13 48 0a 68 c6 9c 38 c0 da 1e ec 9d bd 23 04 | 56 2e b0 d9 0e 5f 21 85 8d b7 b7 e4 3f 8c e4 76 | 68 1b d3 cc a6 1f 24 7c 46 61 29 b6 47 f3 ad 62 | ed ad e7 10 a5 af 19 f0 76 6b ea 90 57 9b 3b 13 | 29 00 00 24 e3 1c 8b 3a ff 4e 05 3e c1 af db 58 | 7b 8f 74 6d 20 c2 73 1e 04 d3 ec 5f 05 cc 9d e9 | 4b 1e 83 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f c3 34 65 1f ff 78 b6 0e ee cd 35 | 94 8b f4 3a 81 46 94 12 00 00 00 1c 00 00 40 05 | f3 90 ab 75 b4 45 e0 98 82 06 c5 91 b7 b5 12 83 | 38 ae 55 ca | libevent_free: release ptr-libevent@0x7fb37802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a100f0 | #78 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 c9 07 ac 54 d6 e0 33 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #78 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #78 | rejected packet: | a4 c9 07 ac 54 d6 e0 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #78: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0684 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47f10 | handling event EVENT_RETRANSMIT for parent state #244 | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #244 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #244 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49622.970636; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002199 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #244 | libevent_malloc: new ptr-libevent@0x7fb37802a950 size 128 "road-eastnet-nonat-244" #244: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #244) | 4b f1 49 87 f9 a6 76 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 99 c6 ce 30 f7 89 45 59 4d 59 48 bc e8 db b7 | 6e 51 73 db f1 50 f0 84 78 35 a5 96 97 1e cf a2 | ba 46 c2 c3 3c f1 3a 6e 96 bf 5f af 7c b4 86 ff | c1 77 25 46 ad 5b ec 41 ea 88 d5 b2 00 e8 44 78 | 0e 9f 1e 30 ef 44 2c 78 1a e7 51 e7 d9 ad 9d e1 | 0d 69 bb c8 c6 a9 e9 4f 0c d7 5e 29 38 5c 8e e0 | 8e 7c a8 b7 93 d1 97 5f 38 52 c5 7b 09 49 6a 76 | 8a 53 22 ab 09 ab d7 9d 44 f6 cf 05 91 df 27 29 | 68 68 78 b8 7a 10 b4 e5 9b cb 01 8d f1 35 fc c7 | 7f 8f 0c 26 0d 68 38 58 4d f7 b1 9e 96 4e 4d c2 | 24 dc 6f 1f 81 ff 16 30 89 d9 d3 07 46 98 c4 17 | fc 99 c1 d0 c2 70 9e d5 7c 43 6d 12 f3 10 9e 43 | 41 f8 15 2e de ff 3f c8 97 02 5f 67 73 89 79 ac | 6a 34 e1 ed 55 83 46 98 af 4b eb 61 ab ed 9c 2f | 3c d3 92 2f df 77 9f 98 51 e0 24 45 80 51 7a 35 | d5 76 40 ee 59 99 54 8f 46 a1 fc 48 cb 2a 6a 64 | 29 00 00 24 23 47 a6 9f de 30 3b be 65 32 63 50 | 62 d5 89 0b d7 3d ea 19 da 4e 55 f9 53 26 8c d3 | 8a e5 35 df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 5e c3 f3 c5 40 cc e2 50 93 80 f8 | 58 99 fe 09 2c 8c 43 58 00 00 00 1c 00 00 40 05 | 42 a9 a5 4e 6c 3d 71 a6 0f 5e 70 c5 17 4e 52 56 | 03 54 70 77 | libevent_free: release ptr-libevent@0x7fb37801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47f10 | #244 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b f1 49 87 f9 a6 76 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #244 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #244 | rejected packet: | 4b f1 49 87 f9 a6 76 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #244: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0477 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afcfc0 | handling event EVENT_RETRANSMIT for parent state #227 | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #227 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #227 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49622.985981; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.007334 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #227 | libevent_malloc: new ptr-libevent@0x7fb37801d920 size 128 "road-eastnet-nonat-227" #227: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #227) | c5 c2 6a 83 d2 66 bb b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 5b f4 b6 58 9a 18 76 c3 e1 6e 19 2a 39 ae a1 | 62 ea 44 d1 30 52 4d 8a 54 61 7d 23 98 f8 8d d5 | 84 3b 68 fd c2 f3 21 b9 78 0c dc e3 83 0f 8e 04 | 74 b0 67 51 d8 1a 83 67 df 2f 54 ee 3c eb 78 8c | dc ab 5e ad 88 89 74 dd b8 42 f8 3b 65 bb c7 d6 | 58 b5 ad 0a ef 24 29 f4 ee 94 22 81 71 d7 21 71 | cf 9a 96 87 e9 3e 34 bd 96 10 75 82 fd 44 7e e5 | d5 b4 6d be 50 02 22 60 ae ae 61 82 1e 48 c4 e8 | fb e2 e4 71 81 50 e1 9c 82 80 8f 59 e3 b5 cd 3d | 6c 63 88 9c 58 f3 61 37 6d 11 4f 91 c3 dc 04 d5 | 78 82 60 cb 5e 0d 1d a4 89 4d 74 78 d6 b1 e9 18 | bf 79 a1 1a 16 e0 b4 3d 00 ec 02 c0 3f 69 19 a5 | ad 3d e3 6c cb 66 a6 b9 ff c5 30 88 8f f5 e7 a8 | f5 33 4d 86 13 42 87 b3 82 49 90 36 bb 5e e9 47 | c4 bf c9 a4 e4 1a 35 38 6a 04 9b 4b 05 29 61 c8 | cf c0 72 4f 16 6a 7e 8b 6f 02 0b ab 68 bf 34 71 | 29 00 00 24 73 17 4e 35 59 6e 44 c0 fd cd 46 68 | 7d aa 47 75 fe fd 8d d7 e4 53 d6 a0 cb 05 84 4f | 51 ed 61 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 60 9b b9 46 e5 98 89 ad c1 cb e5 | e9 7b 12 83 3d 55 5a fc 00 00 00 1c 00 00 40 05 | 0c dc fe 43 8b 17 32 a8 d8 5e bc 45 b2 f1 c1 93 | bc b6 5b dc | libevent_free: release ptr-libevent@0x7fb374045df0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afcfc0 | #227 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 c2 6a 83 d2 66 bb b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #227 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #227 | rejected packet: | c5 c2 6a 83 d2 66 bb b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #227: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0691 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acec40 | handling event EVENT_RETRANSMIT for parent state #79 | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #79 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #79 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49623.019326; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005848 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afcfc0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #79 | libevent_malloc: new ptr-libevent@0x7fb374045df0 size 128 "road-eastnet-nonat-79" #79: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #79) | cb 0e 87 22 6d 04 19 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 8d fa 75 ee f5 0c 34 b3 09 04 c3 a6 70 35 18 | 8c e8 6b 6c 5c 5b 2d 90 26 5a 5e f9 d4 07 05 c2 | f5 73 64 12 f5 c2 51 38 6d 89 1a 0c 01 ef 01 94 | 08 08 2e cb 41 34 b4 4a 2f f7 ed 3c c1 7e 04 ba | 4c cb 90 52 00 84 c7 1d 71 85 6e 14 f7 d6 ba c6 | 6a 98 c9 b3 82 dd 58 3d c8 6f 45 92 9b e7 64 4a | 6e c9 47 ec bd a8 a4 79 ac 0e 9c ec e9 38 db 99 | d6 25 d7 25 8b 64 97 e5 d5 6a 07 ae 6b 9a 25 6c | ea 70 9f 4a 9e ba a1 e7 d8 d9 69 c1 2c a9 28 e5 | 2c 51 5f 2a f8 17 0e 3b 43 9f 77 5e 3a 59 4f 18 | 6f 20 ad 6e aa 63 b5 82 47 75 97 d0 4a 75 bf 68 | 0b ac a2 f9 6c 9d b8 21 cd c5 79 8b 66 f4 0e 4b | 32 8b f9 5e de 93 2f 2f 11 cf e9 f6 3a 2b 4b 7a | bd 3c a3 27 78 6d f5 6c 33 13 d9 14 f8 0e 44 d7 | 3e 91 89 43 f4 2f 9b b6 ab 6d 76 71 13 52 45 fd | 0e 5e 7c 72 38 35 d5 eb 86 2e 14 37 c5 c9 56 83 | 29 00 00 24 5a 77 8f b1 9a 0e 27 f5 13 b5 b3 3b | 54 a7 64 e6 f0 cd 7e 6d c0 5a 2d 35 86 f1 cb 9d | 32 23 be bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 31 42 b5 5a b6 78 6b 4f 08 f8 04 | 13 cc 8c 45 a7 cd ab bc 00 00 00 1c 00 00 40 05 | 2d 9f b7 7e f4 d4 af ae b0 e9 56 0d ae 10 83 85 | d2 ea 45 54 | libevent_free: release ptr-libevent@0x7fb37c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acec40 | #79 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cb 0e 87 22 6d 04 19 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #79 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #79 | rejected packet: | cb 0e 87 22 6d 04 19 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #79: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0681 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8ee40 | handling event EVENT_RETRANSMIT for parent state #189 | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #189 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #189 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49623.030675; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007781 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acec40 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #189 | libevent_malloc: new ptr-libevent@0x7fb37c02a950 size 128 "road-eastnet-nonat-189" #189: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #189) | 86 0c af cf d7 4f f0 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 da a6 92 01 b3 1e 2d 01 6d b4 b0 5b c8 86 63 | fa d3 04 1f 4a 5d 42 51 c6 fa 83 7f 52 a9 5c 5f | 29 a2 a6 67 ca c4 cb cd f8 82 1e 41 60 3e d2 fa | be e5 64 f3 5e f3 de 1c 66 73 04 70 83 c5 c9 fa | d9 0c 95 4f d8 7c 96 92 62 c0 89 3f a6 f5 e5 1c | 1d 8a 04 ae 7f 59 7e f9 0a 02 65 1e e5 50 67 cc | 8a fa 7a d2 bf b6 8d 22 68 80 58 92 0d 46 32 32 | ac 55 d1 c6 9f 27 eb 86 dd 30 64 7d 70 38 1f e2 | 82 2f 8e ad e7 06 c8 10 a8 89 ac cd 34 d4 ef 54 | d9 fa ef 60 3c 01 17 c1 e0 90 2b 1d 49 9b 9e e6 | 59 07 02 91 fb ba 4f 73 08 2f de a1 3c 70 c1 7b | f2 11 29 b4 eb 0f 6e 10 04 0d 03 e4 29 ad b5 0b | 6b 4b aa f3 91 cc 9d d5 fa 2e 4d ea 3f 0e 7e 09 | 29 dd 22 a7 1f e8 ee 73 1f 35 15 51 78 6d 86 ea | cd eb 92 50 fc 79 44 24 ff 9f f8 19 89 f2 31 2b | 2f 82 13 db f2 4a 67 b7 c4 2a 16 2f d5 d4 31 ee | 29 00 00 24 ab 6b 1b 01 ee 77 53 c6 2a de 6e a0 | bf 1d e9 b5 56 76 a7 4b d5 a7 a9 e9 a7 01 9e 47 | cc 4b 2a 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 a4 06 85 0c 28 ca 55 e9 70 4f 7f | 1a ca eb c6 50 e4 53 f0 00 00 00 1c 00 00 40 05 | 2a 84 d0 22 8e e3 5b 68 a0 3f 20 22 83 cb 94 15 | 67 d9 c0 48 | libevent_free: release ptr-libevent@0x7fb36c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee40 | #189 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 0c af cf d7 4f f0 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #189 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #189 | rejected packet: | 86 0c af cf d7 4f f0 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #189: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afd040 | handling event EVENT_RETRANSMIT for parent state #228 | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #228 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #228 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49623.079045; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004687 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee40 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #228 | libevent_malloc: new ptr-libevent@0x7fb36c0251c0 size 128 "road-eastnet-nonat-228" #228: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #228) | d5 f0 72 59 9f 13 94 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 4d 11 72 16 86 29 05 39 41 97 2f ff 33 6b a3 | e2 5f 51 ee 71 23 04 d6 72 0c fb dd 15 ef 6d c8 | 1d b7 c6 17 96 9b 3b 82 3f 74 55 80 22 53 76 ea | 2b 12 aa ae d8 aa 3b e7 03 c1 8e 79 97 e5 92 eb | b7 6d 0d a0 78 62 d0 f2 27 fb a0 42 72 ed d8 cd | 0b b4 e6 0c 99 75 b7 07 dd f8 fc 47 fd 38 1d bf | fc 96 ec 5d d0 ea 7b a2 99 77 8a 86 42 74 89 83 | 1d d8 30 c9 41 1c 6d 04 55 5a e4 6a 7f a2 48 37 | 02 c7 31 e3 a7 ef f2 c3 5f 9e 83 8d 0c 35 c9 0e | e5 2e 96 42 63 e4 ee 14 f2 43 a8 13 d6 19 12 1c | 71 11 80 4d 71 0f 19 3b 63 b8 05 30 82 8b 88 80 | bc 55 78 f9 8c 98 4b c3 03 95 ca f9 2f 2c ae 8f | 75 58 72 ba 8e 10 73 eb 12 6f 65 4a c0 7e 83 a9 | 2f 5f f5 39 44 b0 f3 71 90 fa 59 65 c5 77 f4 ce | b1 2f 6d f7 a7 ee d0 bc fc b5 7f 3e 18 f7 e0 77 | 4c 26 72 38 ff 07 80 23 0f 43 31 54 b4 87 d0 e8 | 29 00 00 24 53 c7 ad d5 ed 06 63 64 b1 b9 04 17 | 96 5d 45 22 6a eb a8 60 3b 32 23 a5 f3 37 e3 7f | 1e aa 66 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 e7 5c 74 6b 3c 37 c1 41 0f fa b6 | 88 19 1c 11 1d 3e 7c 16 00 00 00 1c 00 00 40 05 | e2 48 33 be 38 78 72 f6 d1 00 6b 61 a1 72 02 86 | 37 c7 48 ae | libevent_free: release ptr-libevent@0x7fb3600407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afd040 | #228 spent 0.213 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 f0 72 59 9f 13 94 bf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #228 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #228 | rejected packet: | d5 f0 72 59 9f 13 94 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #228: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0892 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9b1c0 | handling event EVENT_RETRANSMIT for parent state #80 | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #80 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #80 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49623.08046; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005056 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afd040 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #80 | libevent_malloc: new ptr-libevent@0x7fb3600407f0 size 128 "road-eastnet-nonat-80" #80: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #80) | aa bd f3 45 40 fd 66 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a f9 52 fe 2c 07 55 9a 9f 75 be 2d bb 6b aa b0 | 07 01 f4 20 39 c9 c6 12 04 59 16 f7 53 ca 23 cf | b2 a3 d6 d7 cd d3 78 95 1e ae 2c b7 17 84 30 6c | 9a 6e 0d 1b ef 48 24 1d f1 c9 12 65 61 88 44 c9 | 4b 27 23 9a 65 49 0a 11 49 89 68 1f 69 8b cd 8d | e9 1c 22 5e 52 f0 a3 c1 f7 8e 10 9b 8e 27 61 b3 | aa d7 5b 30 40 8f 25 2e 0d 7c bd dc 0e 4d aa 95 | b6 5a 44 77 7b 33 24 ed 5e bf f2 78 c5 d8 1e 5c | 38 0e af a8 70 85 81 7a 43 7a de 45 73 d1 23 0a | 21 50 82 2c fb 48 a9 b6 ed 4a 3a 01 52 3d 91 cf | 62 7a 95 ef ff 5d 9f b3 85 63 dc f5 46 12 fc e4 | ac 22 23 7e 8e 79 eb cb 39 31 bb de 91 1f fd 9c | 95 3c fe ca 99 40 e4 17 71 ad 8e 05 ed f6 14 9e | 6b 26 3c 1c 13 2f 5a 94 9d 9c cd 71 11 6d bb c9 | 9a 84 65 ba e1 3d ae 2e 2c 88 f5 b9 e4 60 97 3a | ad 9a 6f f8 77 43 67 40 a8 7b be e5 9d 13 c4 6d | 29 00 00 24 53 2a 2d 72 a4 0b ac f1 46 3b 88 60 | a1 1f 05 e7 3a 9a 78 ce 7e 03 67 44 f4 b3 91 7b | 4e 29 6b 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 ed 0c 1a de d8 39 29 7d 81 95 16 | 89 64 a4 1b c6 93 47 b1 00 00 00 1c 00 00 40 05 | 41 2d b0 0c 88 62 05 80 34 d7 2b cd 52 bc d2 c8 | ff 29 c4 37 | libevent_free: release ptr-libevent@0x7fb37402ff60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9b1c0 | #80 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | aa bd f3 45 40 fd 66 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #80 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #80 | rejected packet: | aa bd f3 45 40 fd 66 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #80: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #245 | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #245 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #245 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49623.097775; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002371 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9b1c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #245 | libevent_malloc: new ptr-libevent@0x7fb37402ff60 size 128 "road-eastnet-nonat-245" #245: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #245) | 15 95 fb a9 f3 2d 54 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 07 75 44 62 b4 90 36 f0 1f 9d c1 5d 1b f7 db | 07 17 dd 42 63 05 02 d3 cf 19 39 61 be b0 c7 13 | b1 14 a4 a5 b8 a1 23 ab 35 be c3 4c de 16 3f 73 | 4f a1 df 22 33 3b cb 49 9e 26 36 44 30 39 b1 65 | 42 b6 93 29 4a f4 de 14 94 ba c8 61 f8 84 44 5d | 84 ad c9 32 19 82 79 9b 9b e9 75 42 04 bf 32 59 | 46 4e b6 9b ee 27 62 a3 18 81 ea 6a 95 c0 2b da | f4 8a 3a 0c 58 60 40 77 5e 77 85 02 1a 93 66 69 | 9d df f5 b9 a5 ac 45 4a 0d c0 94 39 1f d8 c9 eb | f6 d6 d7 0e d5 20 a4 de 35 3e cb b1 5a 3e 07 b8 | 15 10 06 8b 76 b5 1a ee 6d 90 d8 56 e7 da d7 5c | f6 12 4e f3 18 b2 7d 97 43 2c 6c d6 56 7e a8 7d | 7a cc 89 83 61 47 f5 78 b4 bb 7a cf 96 f5 41 2c | bd 99 b7 5f 2f 94 22 34 ed af 72 69 47 9d b0 d6 | ba d6 46 d7 20 70 b9 2b 04 c8 60 1d 2d 34 a0 00 | f0 50 7a 8d 2d 98 72 24 0c bf 1e e2 f2 65 16 ca | 29 00 00 24 78 20 60 94 4c f0 10 8a 14 01 4a 36 | 9d 71 3a 32 dc 84 92 f3 9e ca b0 c6 c6 47 0c 0e | 5c 4a 16 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 94 6f 42 13 dc 75 9d 65 6a 04 f1 | 12 0b d5 9b e2 af 9f 6d 00 00 00 1c 00 00 40 05 | dd ae 8a 7b 09 c8 82 03 b9 81 1c f4 27 30 35 7a | 2b 8b 29 2f | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #245 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 95 fb a9 f3 2d 54 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #245 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #245 | rejected packet: | 15 95 fb a9 f3 2d 54 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #245: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46af0c80 | handling event EVENT_RETRANSMIT for parent state #190 | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #190 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #190 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49623.145112; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.018435 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #190 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 "road-eastnet-nonat-190" #190: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #190) | da 8a 0c 65 e6 2b 3c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 54 17 f8 a5 01 f3 68 22 77 c6 18 00 12 b3 14 | 54 3d f4 b3 34 1e fd 72 0e 4d ab df e8 2f e1 56 | d7 6e 5a 40 eb 22 8c 08 69 45 e9 fd 19 98 3c aa | 8d 83 ce d6 37 74 60 c8 87 61 28 d5 63 be 48 e9 | ac f9 f7 e4 f2 02 da 1e ec 22 1e 5a d2 5a 2b 8a | 3b 57 71 3a 73 29 7d d1 21 cb fe 25 7a 4a 44 7a | d3 e0 2e 8b b0 82 19 e0 d0 d4 ad 62 8a eb ad 5f | cd 5f 01 c2 97 9c ca 0a 84 fd e9 c6 24 7d a2 13 | 18 78 86 de 18 44 7c 6e 03 a7 c1 8c f5 10 72 e4 | 18 35 f0 48 fd 3b 9d 06 d6 b2 cc 32 8d c8 ab 02 | 22 2a e1 65 5c 07 67 dd 84 00 eb 6c 69 e6 d9 74 | 15 08 fb 78 e2 63 d8 e3 71 dc a5 a7 be b4 49 92 | ca 4f af 55 e1 5d c5 43 c7 03 58 76 b8 41 c6 a2 | f8 e5 96 26 df 8f 3c ed b5 1d 45 31 66 bd 99 75 | c9 f2 c5 21 dc 35 1b 0a 99 75 5d 5c a4 07 02 4f | 98 82 da 07 a8 27 6d 15 d8 05 50 39 0a b9 0a 99 | 29 00 00 24 f4 39 3c cf b3 b2 13 92 d2 3b 37 9f | 62 32 43 c3 74 37 47 22 30 dc 01 af 01 09 20 fa | 09 9a 8b e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6f a0 3a 65 d8 4c 58 fb ee 8d a7 57 | 94 7e 0d f0 9d 14 5d c2 00 00 00 1c 00 00 40 05 | c2 56 8a f7 34 3a b7 10 07 49 00 4f af 85 84 af | 10 cb 7b 4a | libevent_free: release ptr-libevent@0x7fb378046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af0c80 | #190 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #81 | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #81 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #81 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49623.145261; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006311 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af0c80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #81 | libevent_malloc: new ptr-libevent@0x7fb378046040 size 128 "road-eastnet-nonat-81" #81: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #81) | 66 17 84 1d 01 f5 89 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 79 cf 2e c9 58 5a cf 22 0f e4 95 f3 b3 ec e3 | d7 ab 2d 5f 01 54 3c c5 38 6c 9c d3 40 e3 80 92 | e9 89 68 26 a0 e4 bb a0 7a eb 4c f1 e4 9f 20 12 | 58 2a 4c f1 f2 df 9a 6d 19 39 bd 12 58 10 e1 11 | 60 c9 9d ed 18 33 de 94 c1 bb 5d 21 df 07 9b 4e | 1e ae ec 4e 5f 9a 7f b4 b3 f8 3c 10 c2 09 ea 68 | 5d bc a9 fd 8a bb 40 95 8d 3b d1 39 da 16 f8 a8 | 93 df 32 68 37 e0 b9 31 f0 a7 f2 55 d6 2d bc ef | ef 45 3f e8 34 12 fc 98 2a dc 19 03 8b dc 1f 09 | cd 02 40 97 95 a7 39 71 09 ba 54 e3 53 28 2c b9 | 98 bb af 3a 25 6b e9 e7 4c 76 46 d1 aa 9d 3b 59 | 03 52 8a 61 f9 f7 83 33 a1 6c a0 29 48 f7 36 48 | 3a 5a f9 b5 72 5e fe 9f e0 84 df 16 32 28 ce ca | c6 27 c5 b5 d7 f3 93 db 10 54 fb f4 c3 70 76 d4 | 5f 00 b9 4c 0d 91 91 e7 a8 18 4b 2b 7f cf a5 4e | 76 2e 5b 38 e2 0b 32 aa 89 74 93 4b e3 81 6f 21 | 29 00 00 24 78 b9 6f 78 8b 1e bb 84 c4 a1 7c 02 | 08 74 d8 82 11 75 a1 52 cd 59 45 9e 38 4d d2 1d | 56 1f 81 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 31 12 3e 08 55 9e 26 f3 2f be 08 | b5 7f 7c 7d c5 5f 44 c0 00 00 00 1c 00 00 40 05 | 16 fd af 38 8b 2a c1 77 ea 51 ea 68 dc 9b f5 3d | 6a 08 67 b3 | libevent_free: release ptr-libevent@0x7fb34c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | #81 spent 0.0908 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 8a 0c 65 e6 2b 3c 3b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #190 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #190 | rejected packet: | da 8a 0c 65 e6 2b 3c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #190: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0599 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 17 84 1d 01 f5 89 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #81 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #81 | rejected packet: | 66 17 84 1d 01 f5 89 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #81: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0506 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a86b80 | handling event EVENT_RETRANSMIT for parent state #229 | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #229 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #229 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49623.198618; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.007714 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #229 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 "road-eastnet-nonat-229" #229: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #229) | 20 97 6e 08 83 53 46 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 59 ef 6c f0 3c e5 e0 cc 33 49 bc 05 30 a4 2e 63 | 40 b9 24 1d 30 3f 19 68 ce 4b ca f6 ef 1a a6 a9 | 5d 39 1c 86 c0 9f ab 47 fc 91 e7 41 3f 1d 89 da | 32 34 23 b2 92 45 82 aa b6 a2 b3 81 08 5d d4 d6 | 1a c6 db 13 96 83 8f db 02 0b e9 7b b2 14 62 aa | e1 68 37 82 79 1d ad b1 57 7f 25 a7 73 b7 37 87 | 5f 18 8b b1 9d a8 83 da d0 1c d4 ab 43 2e 39 e8 | 66 1a a5 36 6d 58 db 88 48 18 f4 d1 6a aa ea a2 | d4 61 12 6e 9d 66 34 26 cc 34 20 9e ee d3 7c 0e | b5 c3 c0 49 b9 a1 7d aa 84 e0 16 0d 30 3d 39 8b | 45 8b ca 2d 9a b8 31 03 33 bc e7 3c 1d 38 7b ad | c5 f3 f6 f7 be e9 2c 8c 87 60 cc eb a3 f8 ab f2 | a1 ec 16 ca f8 6c 96 69 77 3b 56 28 d0 57 05 dd | fa 6d 9c 0b 58 57 29 b7 d8 9e 77 ff a1 d9 ae 60 | 7b 96 73 6a b9 b8 7b 60 c3 f5 35 8e 8a fc 09 4d | 37 4c b1 4a c0 bc c4 90 71 ce a8 9f 0b 83 84 f7 | 29 00 00 24 bf ef 58 c8 50 05 c6 7d 73 f4 dc fa | 25 60 4d 48 2b 2d d1 e6 80 96 87 ef d5 27 62 2c | 4a bf b7 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 5b b6 cd 13 a1 fb 02 f0 d8 20 b7 | ee bd 8b 90 01 a4 d0 34 00 00 00 1c 00 00 40 05 | f3 e5 ac c7 45 89 3a 77 ae 9e aa 53 4d 4c 6f 3c | 03 52 b3 50 | libevent_free: release ptr-libevent@0x7fb38801abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a86b80 | #229 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 97 6e 08 83 53 46 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #229 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #229 | rejected packet: | 20 97 6e 08 83 53 46 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #229: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad0280 | handling event EVENT_RETRANSMIT for parent state #82 | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #82 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #82 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49623.215145; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.010356 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a86b80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #82 | libevent_malloc: new ptr-libevent@0x7fb38801abe0 size 128 "road-eastnet-nonat-82" #82: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #82) | 0d 59 4a 91 cd 0d a8 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d de 62 a5 d0 5e bf 56 63 0e 91 36 97 7a 1e b1 | b4 16 cc 30 41 76 2c 4d 4b 72 e2 c2 b2 a1 f9 60 | dd 93 5e 0e 34 f7 25 c7 9f 53 30 68 3a c2 8d 97 | 4c 9d fc 02 66 0b d5 60 41 52 07 34 69 fd 84 a5 | ec 72 09 87 c6 8f 05 fb 8f 4e 6b ba 77 83 dc 16 | 60 81 0d a8 71 f3 cf c7 95 36 23 35 f7 97 ca 50 | b2 db d3 48 30 34 aa be 9a a2 37 9b 39 19 60 98 | ac 8b 67 73 12 da 16 80 58 c0 2a 80 56 eb 21 9f | 3c 3d 73 57 e9 89 d6 8c 3d 04 dc a8 2c a0 35 72 | 3a b3 ec 9f 41 04 d4 7f d9 68 36 d5 13 cd 39 04 | 57 48 05 ca 9e f9 64 20 0d 91 1f 4e 5d ee 28 d1 | 38 36 5d 35 10 47 60 e0 25 2a b4 90 4f 2b 22 f8 | 94 db c6 d0 bc a1 a8 ee 23 9e 12 7c 06 be 13 c9 | e4 f8 bb 10 03 1f 37 ab 38 d2 32 58 2a 26 f3 33 | 1c 60 32 46 6c a1 0e 88 78 61 ec 6b c9 dd e6 45 | 58 22 90 cf 6d f9 2b cd d5 02 5b 51 ea 18 fb dc | 29 00 00 24 61 df db a2 1d df 12 0c 5e ab 31 16 | 03 92 3a 6f 24 ce 35 05 3e f5 da 2f 7c 0d 1e 54 | bb d5 49 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 70 c6 55 5e 2d 9d b0 0a d9 87 23 | 4b f7 4f fa 28 d8 1e 81 00 00 00 1c 00 00 40 05 | 40 ed 3d f8 bd 8d 40 9e 57 65 9a d5 21 53 67 44 | eb 0f 4b 38 | libevent_free: release ptr-libevent@0x7fb37c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad0280 | #82 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 59 4a 91 cd 0d a8 c9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #82 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #82 | rejected packet: | 0d 59 4a 91 cd 0d a8 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #82: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5da90 | handling event EVENT_RETRANSMIT for parent state #246 | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #246 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #246 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49623.230507; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002272 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad0280 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #246 | libevent_malloc: new ptr-libevent@0x7fb37c035930 size 128 "road-eastnet-nonat-246" #246: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #246) | a0 25 29 39 44 0f 25 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 89 2d 00 d4 20 29 db cd 68 77 f7 b8 f4 ff 24 | 1d 5c 36 95 62 d1 6b 2e 7a df 4b 3c 19 93 58 6c | ce e3 80 e5 ca a3 cf cd d3 d9 a2 b5 58 7c 6c 24 | e1 80 e9 fc d5 84 ae 0d 7e ea e8 9d e7 06 ab 00 | 72 40 cb c2 16 e6 8b f6 4d 5d d8 7e 9f 89 2b e1 | 0d a8 b1 ac 98 7a 10 80 97 71 ec 1f c2 1c 60 a0 | 4a 47 2e 26 d4 f8 3f c5 e0 4a c3 e3 ec a5 f8 3d | e3 be 62 c2 d3 a8 de ed 5f db cd 09 f3 df 3a 1b | 2f ae d7 5b 61 a7 b7 f8 35 c0 11 77 df e4 3c 50 | b9 e3 f0 3f 49 55 b1 46 c2 af 2d 77 f7 83 81 bc | 3d 89 16 cb 06 4f 2b 0b 77 6a cd 08 70 dd b2 5e | 34 34 1a 43 20 61 50 18 62 59 04 5a 1c 76 f2 1a | c5 6a 20 de 8a f0 5f 77 96 4b dc b9 ab a2 15 f3 | e6 86 a6 63 09 55 5d af 9f e1 30 a3 28 2a 95 86 | 24 6f f2 be f6 80 d7 fc 17 1b db 4c 69 eb f3 36 | e3 f0 06 e4 5d c6 62 de 3e 20 88 cc a6 63 59 4c | 29 00 00 24 ac df 8c 0e a5 90 d3 52 1f a2 e9 1c | c5 97 45 07 c2 87 cc 4e 1a 76 e7 94 30 33 9e 66 | b7 ac 45 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec f9 d9 bf 03 4f f2 a2 1a a6 75 4a | e9 f5 fc 17 1c 38 34 10 00 00 00 1c 00 00 40 05 | fd 95 24 c3 10 0c 51 95 0e 6e a3 ad 3b a1 a5 1a | 2c 16 a1 31 | libevent_free: release ptr-libevent@0x7fb36c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5da90 | #246 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #191 | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #191 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #191 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49623.230699; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004243 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5da90 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #191 | libevent_malloc: new ptr-libevent@0x7fb36c0300e0 size 128 "road-eastnet-nonat-191" #191: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #191) | 85 8f 6a 80 de be 76 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 47 0f 49 e8 87 b7 e4 13 ff fb 5d 9a 22 17 d1 | a7 da b3 32 4a c2 68 c6 3d 29 6b b9 0a 47 72 fb | 44 ba cf 07 42 83 b0 15 52 d5 79 a1 0a cc fd 8c | 03 5d 92 9f bc f2 7f 7a 58 36 93 f8 ff cd 46 92 | 33 75 4c e4 12 5e a1 f8 b3 1e 61 09 80 4a a1 c5 | 5a c7 19 d2 44 74 1d 5d 1d 57 21 f5 83 fe 20 06 | 89 ca 32 09 05 22 51 7a bb d7 0f b2 89 a9 0b 74 | 7c f9 0e 07 47 37 47 69 61 d8 9b ef fb c6 bb 4f | 6f e9 47 2c 3e ce 0c c7 87 a3 c6 a6 6c 56 d1 3e | ff a6 a9 4b d0 b7 79 88 c1 3f b4 9e fc 37 5c 19 | 1d 93 d7 b8 ac 50 69 85 b1 c4 53 e5 5e cc 86 e1 | 99 0a 5b e0 3c 4f fe 9e c8 dd 39 c2 94 6f 36 d5 | 9a 4e 4e dd b3 93 c7 8c d1 85 48 7f 16 2c 4f fb | 42 93 63 f4 95 ff 92 cb fb d6 5a 99 77 ab b8 13 | 67 d4 bf 16 1e 20 38 f7 7c 3d 2c 7c ef 50 6c 66 | 06 df 76 dd 94 55 30 cb 6c f9 4c e3 a8 ba 0c 19 | 29 00 00 24 f0 4e f3 f0 90 16 59 02 63 21 11 a3 | 11 30 40 08 3c fe e4 63 ec 70 ae b0 94 4f 51 4b | 97 b6 49 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c cc b1 ee ce 47 be 7b b0 c4 63 84 | 75 d0 08 1a f9 42 67 0a 00 00 00 1c 00 00 40 05 | 29 7b 9f b8 2f b5 a8 ce c6 6c 30 7d a4 05 33 b3 | 99 4c ae 49 | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | #191 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 25 29 39 44 0f 25 eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #246 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #246 | rejected packet: | a0 25 29 39 44 0f 25 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #246: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 8f 6a 80 de be 76 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #191 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #191 | rejected packet: | 85 8f 6a 80 de be 76 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #191: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0555 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a68890 | handling event EVENT_RETRANSMIT for parent state #83 | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #83 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #83 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49623.271065; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006799 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #83 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 "road-eastnet-nonat-83" #83: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #83) | e6 2b 97 c6 d1 4c 13 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 e0 14 c2 4a 13 d8 77 12 b1 93 fe 09 ee 1d 88 | 31 85 5e 91 48 ad b1 20 71 3f cb af eb 92 c7 d3 | e3 3b dc e2 9e c2 45 29 c9 59 6d 7a 62 12 34 26 | 8c eb c3 61 ed 07 95 b3 f8 74 eb 61 63 eb 1c b2 | 60 84 c3 e0 69 12 37 aa 40 a9 ee 46 d3 1a 26 fd | 77 29 43 bd fd b4 e3 3b c7 a8 7e e9 e3 51 f4 e6 | b9 4a 57 59 1d 18 ef df e9 5a be 77 08 df e7 55 | 46 7f 6c 4f 13 29 e4 bb ef bd 6c fb 60 8b fc 62 | e9 ba c0 54 d3 2b 44 c6 2f 29 d7 34 b4 6b 61 c0 | c9 cb 1e cb a6 25 28 61 95 9e 2c f5 86 69 f9 7c | b8 7c 34 c0 e0 ed f4 f7 82 f9 b3 c4 8e 1a 55 fb | d8 ed 0f e9 ed ff da 76 3e bb 0b ca e5 d5 7e 00 | 28 52 cc 3e d7 7f e9 d9 c5 bd e9 a7 17 e5 95 51 | 9f 9f 95 b4 65 d9 e7 b3 d2 a5 c2 fe 86 92 6e 23 | 5c 06 60 94 75 50 49 bf 5b 48 f5 bd b4 b4 de 5e | dd 11 02 11 73 fd f3 0f cb 43 d1 ff 6c 2f 1d fa | 29 00 00 24 d9 ea 5f 5d e7 8b 27 ca 82 31 28 fd | 7a 4f 51 83 32 9a 18 8a 6e 2a 8b d4 95 e6 d6 b1 | 0f 0b a2 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf 83 ee f4 b4 fb 0f 43 eb c7 c4 87 | aa a0 5e 5c f1 0e 63 f4 00 00 00 1c 00 00 40 05 | 05 b9 81 d9 1f fe b2 68 6c 59 f2 c5 07 41 cc 9a | 8a 8b 10 9b | libevent_free: release ptr-libevent@0x7fb374014820 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a68890 | #83 spent 0.18 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 2b 97 c6 d1 4c 13 c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #83 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #83 | rejected packet: | e6 2b 97 c6 d1 4c 13 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #83: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.076 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3980 | handling event EVENT_RETRANSMIT for parent state #230 | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #230 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #230 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49623.273445; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00418 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a68890 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #230 | libevent_malloc: new ptr-libevent@0x7fb374014820 size 128 "road-eastnet-nonat-230" #230: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #230) | 69 22 82 19 d7 c8 c9 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 71 02 af b0 7d 99 80 ca 0a ed d4 9f 12 56 05 | 6a 75 f1 ff 5b 89 24 b2 2d d4 89 b9 fc ea 10 f2 | df 8b 07 6c 92 3c 32 d6 01 3c 1f 7c 77 2b 56 de | 1e a1 3c 62 24 a6 4e 3c 9e 57 23 35 a7 0e 3a c6 | fa 5e 05 ee c7 8d 32 41 ce 29 80 63 51 1d 1e 52 | 10 94 62 f2 6f 5b c8 e5 23 77 b3 5f 63 5e f3 42 | a7 b1 47 2a 85 90 69 04 a8 c1 76 53 9f c5 2d 06 | 66 93 5b f5 d4 f1 c7 6c 23 0b 21 57 da 55 b4 10 | b4 68 7f 72 aa 6f fd bf fc 43 d5 6e 02 91 b0 ea | ca b7 fc 32 ec e5 bd 79 74 66 56 52 a1 e5 b7 e9 | d9 32 42 bc f6 01 cc 69 66 87 01 cd 32 29 bd 73 | ff aa f2 68 30 ae 30 af 09 b3 2b 2d 0b 90 c5 d7 | e7 b1 60 17 46 74 a0 50 98 f9 06 d2 06 37 1f b3 | 0c 89 d8 99 c7 ac a0 2a 5a 19 c6 cc 6e e1 77 ee | 98 e6 45 5b c8 98 8d c9 0d d9 64 39 5b ba a1 36 | 39 81 f2 e5 39 16 cf c0 fa 26 3f 76 ff 4a de 8f | 29 00 00 24 ca 6b 45 b5 ad 3a dc fb 46 3f ff f9 | b7 9e 2a f6 cb 7b a0 93 c0 ff b4 97 10 4e 36 19 | c5 61 7a bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f fa a5 ce 96 35 1e 80 97 f9 81 69 | 6c 9b 29 c3 b6 c2 c3 05 00 00 00 1c 00 00 40 05 | 7e 27 b2 4c db 32 1f 5b c7 5c 32 4b 9f eb 6e df | 20 af 51 69 | libevent_free: release ptr-libevent@0x7fb37003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3980 | #230 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 22 82 19 d7 c8 c9 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #230 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #230 | rejected packet: | 69 22 82 19 d7 c8 c9 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #230: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0702 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a69e50 | handling event EVENT_RETRANSMIT for parent state #192 | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #192 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #192 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49623.303249; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006654 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3980 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #192 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 "road-eastnet-nonat-192" #192: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #192) | c8 ff f4 e6 c7 17 a0 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 d3 4a 60 f3 6b 7c bf bf ce 75 aa 6b ec f0 aa | 6f fd 60 63 46 fe 0f ab c7 68 02 df c4 c6 ca 90 | 76 3b 3d fe 56 bf ba a8 ba d0 ca f7 0b 74 9f c5 | d1 05 87 00 01 63 f1 b2 af 9b 1a 75 92 cd 23 75 | 4b c9 10 79 b9 97 80 8d 36 ac 73 a4 c7 b8 fd cc | b1 38 24 08 46 20 a1 f7 27 44 94 85 0d d1 c0 73 | 03 9e 85 e9 52 56 70 2c 82 87 11 d5 67 bd 17 0b | b7 79 e5 dd 43 5b 11 13 e5 80 26 ae 8c 3b 5c 3e | 39 de 54 5e 94 90 b6 94 bf 91 dc dc 3a b0 dc 33 | c2 af e8 1e 41 35 52 7c 14 9d d3 2a 93 8c 0c 2f | 4c dd 47 e3 33 95 7f 32 01 a2 12 1d 55 d6 96 ba | 80 04 ad 84 ae 69 4d 77 46 16 b8 c1 14 67 ff 90 | 15 d3 6f 27 f5 ca 1c 28 65 98 cb 29 af 5a 3d 4d | 38 de 5a e8 93 6e 36 0e 60 ea e1 05 60 eb 23 cb | 78 44 37 ea 66 63 22 ea 85 48 d4 a0 76 12 75 a9 | 2c 64 ca f2 05 fb 36 e8 35 db d2 9f 91 a5 c4 20 | 29 00 00 24 a1 c2 f0 6b 73 a0 8d a3 3d b9 fc 65 | 4f d9 ed 3c 9f 8f 87 98 60 fa 1e 4a fb c7 f1 6c | 8c d3 14 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 12 d3 2e 8d 56 f4 3c 1b 6c 80 b7 | a9 e2 20 50 4b 37 dd 45 00 00 00 1c 00 00 40 05 | c6 22 26 cb ae fa 29 03 74 5f 21 c6 81 1a 29 8b | 43 e3 ee ee | libevent_free: release ptr-libevent@0x7fb378012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a69e50 | #192 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 ff f4 e6 c7 17 a0 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #192 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #192 | rejected packet: | c8 ff f4 e6 c7 17 a0 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #192: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0681 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac2900 | handling event EVENT_RETRANSMIT for parent state #84 | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #84 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #84 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49623.332618; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007661 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a69e50 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #84 | libevent_malloc: new ptr-libevent@0x7fb378012840 size 128 "road-eastnet-nonat-84" #84: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #84) | 1f 2f b6 8b 51 48 06 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 1f 67 e9 76 20 6a 2b f7 ad 13 77 97 e1 68 87 | e9 75 71 19 c9 83 f3 73 fb 25 68 00 8c ff f8 c9 | 1d 39 8c aa 48 91 67 ae d7 68 2a 58 40 8a 8f c7 | 80 6c 8a 0d 2c 34 0e dd 31 f9 0d 20 54 ae b8 ad | f3 e5 66 87 27 c1 b9 3b f7 7e 5f 91 9e 13 72 c4 | fb 1c ec 84 d9 28 50 4e 83 04 2b 64 28 38 b2 c3 | 26 3d 3f fe b0 3a 31 93 a2 da 74 58 0f e3 c4 e7 | 1b d4 4a 7b 98 e4 bf 2d 17 77 1c c7 60 c6 cd f4 | a4 b3 3e 33 44 58 50 ab 79 af 8a 67 8e c3 a4 76 | 74 f4 47 b0 6e 53 b7 1d 0a 98 f8 36 13 56 c4 89 | c8 ca cc fb f1 a4 98 cd 59 ff 4a e3 78 5d 3c 67 | 86 c4 70 68 e1 a0 3e 7b 7f c1 2f 3d a4 0d c2 c5 | bd ed 93 ba 2d ff bd 57 2f b9 ac d7 dc 77 9f ae | 61 e7 8a 25 fb 95 fa b6 ae 27 5d f2 7d 25 5c 37 | cd dc a1 e7 01 66 ba 0c 28 2e 4b 30 85 a4 73 58 | f5 b4 a3 77 ea dd 82 87 c2 5d 3f 72 7d 74 36 cc | 29 00 00 24 76 ac e1 c3 58 b8 41 7b 54 b2 2a 6d | c8 c8 51 a4 ca 16 83 ce 76 9e a1 e9 43 b8 d3 34 | c3 53 e0 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f 3a 1a f8 04 5d 3c b5 2b e1 4e ab | 33 49 9d 7d 4f 74 a2 8f 00 00 00 1c 00 00 40 05 | 1b c4 6f 3a e9 14 b6 7b 2a e7 ad b0 65 58 df 39 | fd 38 92 37 | libevent_free: release ptr-libevent@0x7fb380027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac2900 | #84 spent 0.184 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 2f b6 8b 51 48 06 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #84 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #84 | rejected packet: | 1f 2f b6 8b 51 48 06 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #84: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0771 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab2380 | handling event EVENT_RETRANSMIT for parent state #247 | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #247 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #247 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49623.357014; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00399 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac2900 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #247 | libevent_malloc: new ptr-libevent@0x7fb380027c10 size 128 "road-eastnet-nonat-247" #247: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #247) | 5d 14 02 50 68 e1 05 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 49 8a 2d d4 33 c0 d7 bc cf 08 ab af 13 85 8e | 9a 12 a5 cd 3b 66 31 91 51 03 92 de 96 84 44 92 | 2f 58 74 2e ab 28 ea 0d 4e f8 e3 ae 21 e6 45 c8 | 43 4c d5 50 a9 19 c3 44 67 b2 10 6b 79 6d 94 47 | fa 38 4e 33 78 ee e7 d3 9c 31 e4 3a 0a 97 fc f9 | af cb 80 37 57 a0 1b c2 09 c2 31 8b fc c7 0b 20 | de c6 8f fd b8 6b 84 a5 39 ac f6 54 bc 56 ef 0f | 64 4c b3 c3 15 1d ff 22 52 dd 24 dc a2 84 2b db | e1 cf 6b 7a 77 75 72 44 46 ba 71 64 0d 1e 05 41 | 6b 10 ff 59 ad 5c e4 40 01 51 72 36 a2 b0 08 e3 | a6 82 a9 79 20 45 b1 f4 1e 13 22 a0 f1 4f 23 23 | 9c e9 d5 77 c7 56 3c 45 ca 5c a9 1c b1 68 03 08 | a1 eb f6 b1 e5 5b 6c d6 3f 31 2a ba a0 3e 1f d2 | a5 29 ae bf 59 de 0d b4 a3 d2 df a5 98 9f 76 2c | 4f cf 7a 3e 6d ac 96 b0 e7 e5 ce f6 05 40 9c 9b | 09 66 cd 5d b1 dd cb f0 23 07 ad be 0d 42 b6 2e | 29 00 00 24 ef c2 8a a6 2e c6 51 78 10 63 06 58 | ba ed 73 0f a8 fa 21 72 a3 1c 39 ab 2c 37 74 08 | 1a c5 f7 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 eb f7 f6 58 75 8d be 43 b7 49 b8 | cd 30 58 5c 95 8f b2 8d 00 00 00 1c 00 00 40 05 | 15 66 60 c0 d3 3c e7 68 f4 56 38 e9 31 35 3c 02 | ee cd 1d 4a | libevent_free: release ptr-libevent@0x7fb344046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab2380 | #247 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d 14 02 50 68 e1 05 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #247 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #247 | rejected packet: | 5d 14 02 50 68 e1 05 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #247: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0741 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28af0 | handling event EVENT_RETRANSMIT for parent state #231 | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #231 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #231 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49623.381399; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002856 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab2380 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #231 | libevent_malloc: new ptr-libevent@0x7fb344046040 size 128 "road-eastnet-nonat-231" #231: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #231) | ec d8 99 0e 50 36 87 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea c5 d9 ea 48 9d 9d db e4 72 21 b2 eb fe e0 0a | 9b e5 ce 23 20 eb ad 65 b0 89 ca 3d 24 ef 66 7d | d9 a3 7a c2 3d 05 aa 43 9f 45 1a 14 d9 e7 ad 4c | 1c 30 1e e4 db 2e f5 09 08 f0 6c 1f 45 18 25 f3 | 98 35 42 0b 1b fc c0 95 3b d0 88 ca bf 43 11 51 | ba ac ee 62 bc ef 20 2d 09 0b 30 2b b3 a9 30 69 | 22 9f f7 e5 19 cc d8 4a 41 18 b5 2a 03 31 91 4d | d9 f3 33 5c b6 61 8b 80 4c 0b 65 d5 6f 4b 62 d8 | e0 38 d3 a6 32 83 92 b3 ca df 09 07 0d f6 33 d7 | b9 f9 01 8c 3b d1 ff 19 bf 3d d5 72 dd d6 67 1d | 24 a4 3b 88 00 71 46 68 47 66 c6 d8 6d 38 1a ca | 01 20 d4 7a e4 46 1b 52 ab ad 61 81 76 76 13 bf | 76 df 80 04 67 b5 86 86 0e 85 a0 4b 41 5b e3 0b | 3c 1a 51 b5 b4 55 ce 12 56 93 02 32 82 c4 86 69 | a7 eb 80 c4 8e 9a 08 dd 86 61 45 1e 8a 33 7c 03 | 7e 20 42 a9 8c 8c 89 72 43 a6 59 29 92 30 fd 49 | 29 00 00 24 b3 7b 27 54 be 06 93 cc 3c 78 ad 44 | 9e 7e c7 5b aa 5c 64 c5 5c 99 5a 37 63 dc 53 a7 | 33 95 f4 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 2a 24 2a a3 f9 b8 d4 c1 28 f7 1a | f6 32 c3 8a 97 33 de f4 00 00 00 1c 00 00 40 05 | e6 68 a7 21 48 f4 d3 88 6e c3 71 dc ea d3 53 aa | 0b f4 bb 84 | libevent_free: release ptr-libevent@0x7fb37404b530 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28af0 | #231 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec d8 99 0e 50 36 87 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #231 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #231 | rejected packet: | ec d8 99 0e 50 36 87 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #231: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.071 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa1f00 | handling event EVENT_RETRANSMIT for parent state #193 | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #193 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #193 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49623.395171; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.011493 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe5c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #193 | libevent_malloc: new ptr-libevent@0x7fb37404b530 size 128 "road-eastnet-nonat-193" #193: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #193) | 09 06 18 28 25 97 f6 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d fb a2 00 c4 81 91 0e b9 c0 41 7e a3 8e d5 a7 | 8f f9 71 10 26 95 10 e6 4e 8b 4b cc bc fc 28 8b | b7 f8 db 09 cb 68 57 d8 0f d5 cb 0f b4 d7 8f 3d | bd 12 fa dc 76 89 b1 cd af d1 36 87 37 88 94 35 | dc 1d 71 91 3b f3 e1 80 cc f2 f0 d3 3a 4d 9e 94 | 07 3c 65 6d 3e 40 ff 84 75 64 e8 1b b1 8c 09 6d | 19 40 40 a9 6d 88 cd b7 e8 19 c9 3d e5 92 7e 64 | de 57 bb db cd d4 22 17 89 b5 3e 22 3c e2 24 0b | 14 89 5a 96 bd 20 3b aa d7 bd af 6b d4 f2 98 3c | 51 d6 02 8a 1a 1e 91 da fa 7c 17 97 ea 62 5d 5c | 64 1a ef 72 b1 d0 d3 26 fb a0 cf 97 96 42 ef 85 | 1f 2a 66 aa 06 10 71 63 af 7d da 60 c1 c8 13 08 | 97 23 c5 07 eb 43 86 64 05 41 06 20 ee 9b 27 00 | 30 a6 42 a7 c6 f6 78 37 51 13 98 31 24 47 eb e1 | 16 0f ee 4e 11 f9 96 b6 72 84 dc 21 2b 6e e3 77 | 3a 73 af fe 81 a3 c6 e9 eb 76 cf a2 f6 45 8e f3 | 29 00 00 24 ca 9d 5e 32 ed 0b e6 19 dc 2f e8 6f | 8e a5 0f 9f 9c 08 6d f3 68 e8 0a 59 74 47 ad 67 | e3 bf 67 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c 89 f1 95 94 6f 28 52 1d 00 7f 87 | cf b9 fb 25 a2 94 8b 5c 00 00 00 1c 00 00 40 05 | cf 55 4f 40 25 07 37 da af 22 52 57 b9 8b da a2 | e2 e1 f8 6b | libevent_free: release ptr-libevent@0x7fb3740356e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa1f00 | #193 spent 0.182 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 09 06 18 28 25 97 f6 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #193 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #193 | rejected packet: | 09 06 18 28 25 97 f6 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #193: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0835 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f7760 | handling event EVENT_RETRANSMIT for parent state #85 | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #85 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #85 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49623.396569; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.011115 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa1f00 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #85 | libevent_malloc: new ptr-libevent@0x7fb3740356e0 size 128 "road-eastnet-nonat-85" #85: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #85) | b7 4f d7 db a6 e2 bd 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 c8 89 a4 0b 04 f2 b9 62 f8 58 f1 1c 0c 91 1a | aa 25 df 1a e7 a5 32 9d 0b b5 9b 93 ab d7 64 b6 | 7e 0d ee f0 b5 83 e8 90 d8 94 b7 d1 ea 05 1c 4f | 85 63 ef bf 80 da 59 c5 18 c9 fd 82 f7 cd 12 c7 | ec b4 9e 35 b0 0c 13 ac 89 c3 d8 6c 14 b9 3b f7 | 41 eb 65 45 c9 66 0a f2 c7 e9 1b 09 a2 d5 ad 2e | 24 aa 0a a8 48 81 8f bc 8d df 3f 90 a2 d2 26 b2 | 84 b7 2d b6 67 ac 5a fa 85 04 e2 96 e3 0b 1d f3 | b9 b5 0f f0 5b d4 c6 d3 b2 9b d4 ad e6 94 18 68 | bf f6 64 ed 26 d4 b7 68 7f a4 94 0e af 4c 0c b4 | 64 91 32 f4 da 5b 38 c2 84 b3 fe 0e e5 1b 3f a5 | 6b 83 a5 f2 b9 7d 21 72 89 70 28 f2 d4 86 bb fd | 03 43 fe f4 4e 6c 9c 49 29 03 b2 15 2f 72 ba 73 | 18 d4 39 82 08 55 da c3 e4 86 cb d0 04 31 94 6a | f5 7b 4a de 4d 49 5a 6d 51 3e 71 b4 0d e8 2e 33 | 9f 26 4a 91 c4 9b 06 1a 88 4b 6e 77 93 8a 7d ed | 29 00 00 24 af e3 01 7b 71 cd 34 07 4b 0a a0 9b | 85 75 4e ed b9 b3 c5 7d 83 a1 ee 6b 3c aa 39 e2 | 0b 8b fa b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 41 7b 44 0a d6 6d 6a b0 b1 8e ad | b0 c3 33 77 45 ba 39 18 00 00 00 1c 00 00 40 05 | 63 0f 1e f2 8f 76 1d 60 09 1e 0d 94 28 78 d8 b0 | 16 5a de 8a | libevent_free: release ptr-libevent@0x7fb35c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f7760 | #85 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 4f d7 db a6 e2 bd 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #85 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #85 | rejected packet: | b7 4f d7 db a6 e2 bd 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #85: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0828 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #86 | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #86 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #86 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49623.460237; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005865 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe600 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #86 | libevent_malloc: new ptr-libevent@0x7fb35c03b0b0 size 128 "road-eastnet-nonat-86" #86: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #86) | bc cc 1d a8 6f 14 2f d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 02 f4 30 81 01 a2 84 c7 c8 75 14 73 a0 b4 f1 | ce 00 5c 2a 70 74 58 bb 3e a0 6e e2 4f 0a 9f 83 | 08 76 97 6b fa 62 74 7d db ae df 90 de 69 8c b2 | 0e 6c a5 3a 87 61 1a 3a 8f 5d a0 5a ba ab 91 5a | 1c 85 49 b3 c5 25 e7 4c 6e 03 2b ac 66 42 56 f1 | d7 31 b5 bb 5b 45 b9 dd 90 6d ee 07 cc 7c f5 62 | 74 01 c5 67 95 ba 42 bf 74 f6 d2 a1 03 af 1b fd | e4 7f bc c7 c5 75 0a a8 6e 5c 9e 6c 4f 5b c1 73 | df 6f 2d 86 ef d9 7b 7f 50 00 74 9f 02 e6 99 af | 69 db f9 f3 80 3c 99 58 33 58 03 46 c0 6e d1 8c | d1 aa bb ba e8 f4 a9 85 5b aa 0d 22 6e e9 62 24 | 0d 2c d4 54 19 e8 97 d8 e7 d3 1e 75 fe 1d 11 bb | 8a ef b3 15 49 d2 bd 11 ce 93 3c 78 52 c8 0e 77 | 1d b3 5a f2 76 6d 63 9a e0 92 62 06 a0 bc 29 93 | a6 78 17 fe 37 4a 17 27 33 46 cd 3f 1c 77 4a d6 | df 68 38 cd 2b 58 7b 28 94 f9 86 34 46 7d e4 ec | 29 00 00 24 3f 6f 33 90 58 31 9c 9e c4 12 e4 33 | 9b 9e 11 d9 fa de 80 3a 9a 7c 3d 2b 3e 4c e8 aa | 92 49 b7 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 27 7b 26 e6 59 48 3b 7c 9f 7a cf | bb 52 6d 94 e2 1f 43 00 00 00 00 1c 00 00 40 05 | 49 8d b2 ff d2 6f bf 71 ec 03 78 4c 49 00 83 b0 | 23 90 3a 8b | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #86 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc cc 1d a8 6f 14 2f d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #86 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #86 | rejected packet: | bc cc 1d a8 6f 14 2f d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #86: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0673 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5af90 | handling event EVENT_RETRANSMIT for parent state #194 | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #194 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #194 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49623.461586; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.009509 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #194 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 "road-eastnet-nonat-194" #194: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #194) | fb a9 4a 68 01 02 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad aa 66 9d b6 64 e0 b9 0d 37 a2 d5 08 fd 46 b0 | f7 b3 8b 64 d2 0b f9 59 d3 20 8f d2 23 52 ab 2e | d6 99 18 d2 2f 54 8c e7 99 6c 8c 9d cd ff 9d 5a | 44 41 3e 80 ea ff 21 1e 5c 82 8a bc ec 41 36 14 | dd 8d af 05 d5 6f c4 3b eb c0 61 1c 5d 0d 70 dd | 40 c9 d4 1f 8a d2 d8 76 8a b9 bd f7 f3 8d f9 d9 | da 19 38 58 8d de a2 45 b1 7d bb f4 44 36 75 08 | 1e 19 e1 7e 40 21 fc 21 30 c5 e3 bd 20 8d d8 be | bf bc a6 60 a1 d6 d8 51 07 69 fd 62 da 68 85 ce | 37 74 1e f7 ae d2 77 4a f2 bc 1e 10 5e ed ca 3e | bf 36 bc 15 0b 03 92 f4 43 13 b4 d6 80 6a 65 a5 | da 3f fd 89 e4 f3 95 6e ad 5c 51 06 e7 4d 88 1f | 8e b3 8c 1c 17 69 df 75 37 d0 1f f8 06 a4 4e 15 | d4 9e 45 dc a2 0b 41 4c 07 55 90 db 32 9b e2 82 | 2b f7 f7 40 85 e7 33 60 11 d2 9c 0f 8b 18 ca 0d | 1e 7e c6 7b e1 da d7 c5 9b 44 c8 e8 12 48 03 39 | 29 00 00 24 a9 61 02 67 eb 1a 8f ba e2 2e bf 6e | fa 3f 6f bb 4e c3 80 0d df 43 7e 7d a3 f5 81 cc | f3 7a bb 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 5d 39 f5 08 60 5b 2c d2 7c 9c f1 | a9 84 d1 dc ab 40 bc 42 00 00 00 1c 00 00 40 05 | dc 98 c1 28 2a 8c a1 5f e1 55 35 3c e4 55 00 85 | a7 4e ac da | libevent_free: release ptr-libevent@0x7fb35801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5af90 | #194 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb a9 4a 68 01 02 ca 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #194 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #194 | rejected packet: | fb a9 4a 68 01 02 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #194: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #248 | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #248 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #248 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49623.467887; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003451 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5af90 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #248 | libevent_malloc: new ptr-libevent@0x7fb35801d920 size 128 "road-eastnet-nonat-248" #248: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #248) | 0a 60 4f 04 ec 5d f9 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b 96 4e 6b 1a 47 f3 29 f4 97 63 43 e3 c7 7c c2 | b5 40 35 82 f8 ae 61 14 ae 37 68 84 b3 6c 17 bd | e2 38 fa 08 01 a0 06 e7 9f 6c ca f7 e0 61 70 92 | 35 69 98 cb 13 b9 35 de 14 7b 48 01 ca 16 d2 a3 | 8a 8d f7 e5 16 28 68 18 42 b1 0f f2 66 75 2f 1f | 92 e4 b0 69 36 a2 b4 75 60 ca a5 a2 69 6d e6 5d | 46 24 17 68 8a bc 97 e8 9e ee 7a 06 d8 89 ea da | 29 95 98 02 98 06 f1 21 8f de de a8 b1 db 6b e4 | 16 54 6a d8 f1 bf 06 c3 2a de 4c 0f 1e 69 c7 60 | 71 82 15 35 09 a6 80 73 54 ab 5a 82 af 1b da 3b | c5 0a 69 1d 72 1d bd 02 fa 14 6a b4 37 14 ab b1 | 6c ef 68 fb 08 a8 b0 c6 58 93 07 45 93 1f 0d 53 | 5a 7c 44 c6 e8 cb d0 e7 6c 54 5d c1 89 3a e8 2b | e2 33 79 6e fa fd a1 8c dd 41 32 f8 12 7c 52 d0 | ef b1 cc 9f e3 23 da b6 ea 6c dc 48 7a 7e 45 73 | a1 ca 75 fd a6 b2 28 b4 4d de 48 05 30 76 df f1 | 29 00 00 24 da d0 88 5b 97 8e 08 a8 b2 aa 35 1a | a0 f5 0d fa 05 bb 67 43 a9 98 40 73 a9 62 0f f1 | 91 cf ba 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 42 31 df 79 b8 d9 7f 21 24 fd aa | 74 f3 12 b0 e3 0d 96 52 00 00 00 1c 00 00 40 05 | 1d 11 c7 78 91 0f ef bb 0b 1a 85 c0 59 35 e2 cd | c1 30 49 b7 | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #248 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469f8d60 | handling event EVENT_RETRANSMIT for parent state #232 | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #232 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #232 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49623.468073; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004361 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #232 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-232" #232: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #232) | 24 ac 89 77 7f d4 00 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d e3 39 fa 31 96 0e da 0d 87 de fe bc da ee 7b | f9 35 54 93 66 77 87 a0 67 c2 b4 11 e6 0a 7a 53 | b3 1d a8 6c 5c b3 d5 5b f1 71 74 80 47 74 8f eb | 25 fb 81 fc 67 2b 6d fc c2 93 27 e4 ad 7c e4 44 | 62 ee e5 d7 4d 6f 45 7a fb 56 b0 33 e4 c0 e1 a0 | 0d 2e c4 d7 7c a8 3d 9c d0 51 2f 55 54 40 46 36 | 1c 6c 65 82 d9 49 b2 d4 69 f8 3b 26 10 eb 42 4c | 23 39 f8 bc c3 39 9a c3 11 d4 4e 97 4e b9 f8 a2 | 8b 74 d5 f0 11 c2 a0 7d ca dd 76 40 1b 01 76 b0 | a4 bf 05 91 b6 25 97 e5 e6 51 ee 64 fa 3b 0a c5 | a6 9c c8 8d fc dc 9a b7 88 e8 5a 4a 57 96 98 00 | db 6d 9a cd 76 5b a7 49 16 56 06 32 a5 f0 51 87 | 36 26 1d 21 19 29 89 68 02 06 6d 37 2b a0 74 d8 | 14 94 a7 12 8f 7a e7 ad 72 26 fb ca e9 57 f6 ae | 40 e1 77 ae bd 14 78 69 df f7 02 98 cb 60 f6 4b | ad ea 83 90 fd 04 b0 25 b3 92 71 37 ed 5d 75 e1 | 29 00 00 24 aa 59 21 22 32 5d 1b 0e 90 4a a6 80 | 93 f2 d5 94 dc dc 41 5c 7e 9b 58 30 e5 e0 1c a2 | 9a c8 ed 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 58 75 66 d7 36 51 ed 56 98 88 32 | c1 e3 29 ac 35 46 df e2 00 00 00 1c 00 00 40 05 | 0c 44 36 93 b4 a9 f5 59 b8 d7 76 83 b8 b4 fd 37 | 81 aa c4 e2 | libevent_free: release ptr-libevent@0x7fb36804b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8d60 | #232 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0a 60 4f 04 ec 5d f9 e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #248 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #248 | rejected packet: | 0a 60 4f 04 ec 5d f9 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #248: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 ac 89 77 7f d4 00 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #232 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #232 | rejected packet: | 24 ac 89 77 7f d4 00 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #232: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0536 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28ab0 | handling event EVENT_RETRANSMIT for parent state #87 | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #87 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #87 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49623.52242; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006304 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24680 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #87 | libevent_malloc: new ptr-libevent@0x7fb36804b7c0 size 128 "road-eastnet-nonat-87" #87: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #87) | a2 df 19 46 98 d4 bb 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de ac a7 56 a2 bc 95 5a 6c 57 c8 2b e0 20 68 16 | a2 ff 5a bd 83 94 6a 4d 58 8c b2 a4 d4 76 ed fc | 0f 4a 9b b9 df 7c 6c 34 8f 70 fd e9 a0 17 cd ff | 42 ae c6 35 53 50 df 4f 92 fb b8 ae 34 b4 21 4a | 96 f4 d2 6a f3 c3 2c b1 14 ce 42 da 82 6b e3 0d | db 7a 9e a9 08 f5 73 b2 1d 45 e9 bc fe 79 e6 2d | 2f 0a 64 4b ee 86 b7 4b 3f 77 d9 fd c5 b0 bd d9 | f0 f9 4a 67 c3 b1 50 bb ba e6 76 27 0e 9b 80 ac | ac a5 3d ed e4 7f 3e ce 9b 7e 70 ae 76 56 31 41 | 17 98 86 1f 1f 85 2b 2b b2 36 28 19 25 14 37 3e | bb a6 a5 e3 f0 64 b9 9c 0b af e9 c8 fc dd 9d 10 | 05 4f 6e 73 4c 08 a1 b5 54 a0 ae e0 d5 30 bc af | af 63 ef 9e e4 70 09 3a 1e 60 6f c5 bb 77 c5 0b | 60 c8 18 55 dd 77 cc 86 3f 7c 34 56 80 93 c4 30 | 61 51 d7 11 b2 4d 6f 17 c0 8c 7f d5 08 fa 5f 63 | d7 b3 cd 14 9f 3a 9d 07 13 ee 34 e9 84 52 68 1b | 29 00 00 24 8b f5 b9 e8 72 8a d8 5e 1a d6 70 1a | a6 5f 3d 02 9f 40 bc e8 9c c3 88 16 89 ec af ca | b1 90 6f 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 83 d5 c2 93 bc 76 7b c0 f5 6a f5 | c6 03 a7 0c 52 da b8 7c 00 00 00 1c 00 00 40 05 | 9f 00 07 ca 6e 64 62 64 56 d5 c5 aa 95 9f c8 6b | 83 2b 36 93 | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28ab0 | #87 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 df 19 46 98 d4 bb 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #87 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #87 | rejected packet: | a2 df 19 46 98 d4 bb 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #87: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abe740 | handling event EVENT_RETRANSMIT for parent state #249 | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #249 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #249 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49623.56313; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.006114 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28ab0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #249 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 "road-eastnet-nonat-249" #249: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #249) | ad 80 10 70 da e5 b7 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 1c 07 0c da 8a af 5e 89 e6 75 e4 e2 6b 94 81 | 88 bb cc 32 0e 51 16 82 66 1f 3f 42 b2 39 20 4f | 72 37 07 9a fd 40 87 70 79 6c 98 3b 3f ae 9c 8b | ce 68 05 66 50 64 85 b6 97 7b 54 39 f1 30 aa a3 | 04 6c 7c 88 ec 3c d1 1c d3 b4 4e a1 ee ab a5 d5 | 77 d7 c7 96 43 3f c9 ba 18 4d e2 bf ce 40 6d b9 | 2e 6f 43 a4 09 5e 6a 0a 57 fe 2f e8 72 ab e9 6e | d3 23 65 2e 56 3d 4f 3b 55 96 b0 62 91 f8 d1 e0 | 2e e0 00 1a 25 63 9c 6e 63 ad 31 ed ac d2 4b 58 | e3 5c 40 70 04 55 4c 39 0d 41 92 a2 3d 54 25 26 | d7 ef 2a e6 88 54 16 3c 17 a5 5d ae da e8 b9 49 | 9e f9 ac d6 d0 b5 d1 4c 32 7f 53 80 13 ce 13 ff | c1 9e 7b 3a 03 2e b8 d1 5e 50 be f8 6c db 78 af | c8 42 2d 25 43 1f 70 34 56 a4 16 57 bf 31 c6 30 | d5 f1 f9 72 d0 f9 83 35 68 6b 2a 69 4e 20 b1 d3 | f4 3c 9d 15 41 2d 80 5e c6 a3 cc c1 23 a7 f8 c0 | 29 00 00 24 cf 2f e4 f6 cd 34 13 11 b4 5d 4f e0 | 11 dc f5 73 81 ae 1d 25 a9 7b e9 47 0f d3 b0 6c | 5e dc e5 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 3d 29 fe a9 de 26 71 da 28 d8 ce | 9c 91 f7 26 3e 7d 46 03 00 00 00 1c 00 00 40 05 | 93 a3 dc d9 83 9b 6f 85 6e d1 32 ad 49 d5 89 75 | f9 55 83 e1 | libevent_free: release ptr-libevent@0x7fb34c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe740 | #249 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 80 10 70 da e5 b7 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #249 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #249 | rejected packet: | ad 80 10 70 da e5 b7 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #249: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0662 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3fc10 | handling event EVENT_RETRANSMIT for parent state #195 | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #195 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #195 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49623.56613; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005425 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe740 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #195 | libevent_malloc: new ptr-libevent@0x7fb34c0251c0 size 128 "road-eastnet-nonat-195" #195: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #195) | 37 e6 90 db 14 bc bf 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 53 c9 77 b4 f3 d5 4d 42 00 37 51 2c 1c 68 3c | f1 54 0f 7a 55 d8 cb dc 59 bb 2f b5 96 8c 4e d4 | 85 27 5a ea f2 a7 4d 9e 5a 6b ee c6 28 a0 d2 57 | 71 7a 7b 0b 80 39 ac 27 cd 87 0d ef e4 ef af 3a | d6 b3 f6 12 c5 5f 2f d9 cd fb 17 d4 43 5e 16 c4 | 87 67 d1 70 07 84 e5 8e 71 91 de 30 59 cc e6 ee | 34 fb c0 51 e2 87 5b 7e 3f 08 db 50 ff 54 7a b1 | bd cb 77 92 50 41 31 65 47 73 69 2a fd d6 77 f3 | b0 89 f6 8e e2 6a 07 fc af 84 ca d3 f2 87 73 27 | c4 cf 2d 21 63 f5 8f 71 28 70 95 02 a0 27 ac 78 | a4 bb 1e 75 dc be 0d b4 ad 92 30 f8 7c 7f 5d 71 | a5 c9 9d 8b 71 f5 b5 68 db 9c 63 56 82 3f 35 f1 | f2 81 65 6a 20 3e b0 68 92 e4 10 6f a0 15 ab a8 | 72 4d 4d 54 b6 ef 0b 2d 62 75 65 6d be 42 39 3d | c4 80 ed ba e2 23 03 5c 4c 11 92 92 a4 9b 70 7c | cd 9d 5e 6a ce f4 42 ce b7 88 b0 01 79 41 f3 ce | 29 00 00 24 9e 21 2f 19 56 de ef 57 88 5d 72 9d | d0 e9 ed cf f1 53 49 64 11 8c ea d8 bc d7 7f b1 | 97 11 98 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be a1 e0 42 82 c4 3c a5 9f 98 67 8d | 2c 4b 8d ec 3b 56 95 d6 00 00 00 1c 00 00 40 05 | 9b 76 ec e0 3b 32 32 e4 22 87 e5 16 97 1d 20 83 | b5 a4 81 66 | libevent_free: release ptr-libevent@0x7fb34001a190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3fc10 | #195 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 e6 90 db 14 bc bf 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #195 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #195 | rejected packet: | 37 e6 90 db 14 bc bf 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #195: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7a350 | handling event EVENT_RETRANSMIT for parent state #233 | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #233 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #233 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49623.584477; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00734 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3fc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #233 | libevent_malloc: new ptr-libevent@0x7fb34001a190 size 128 "road-eastnet-nonat-233" #233: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #233) | 77 22 f4 9c 3e 1f 99 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b ec 2a 3f 06 d1 8b 5a e8 a0 a7 30 dd 97 56 a8 | fc 83 ab 1c 41 f5 e8 c3 f3 53 9d 30 18 0d be a8 | 6b a6 4b 53 32 26 a8 d4 bc df 11 84 c3 51 c0 79 | eb 6a aa 97 40 5a 35 1b a4 6a 1c c4 04 e6 8f 18 | 55 5f 5f c2 af ea 6a 6c 05 59 de 4e 19 d5 22 46 | 8f 6c 32 5b 58 46 45 5f 0c 50 78 8c 5e 88 c7 73 | e0 06 97 88 0d 6e 77 b6 da 57 bc be e2 24 fb f2 | bc 09 06 c5 c0 aa 19 66 66 6f 88 a3 1d 28 43 e3 | 36 51 8c 80 0a 70 81 d2 c6 66 0e c8 9f c6 17 19 | b8 81 ac 81 1a 75 2c b9 dc 5b 7e 21 7e 73 b2 27 | 88 a7 6d 88 e3 28 4e 9c 2a a6 e3 b1 c2 84 18 fe | a8 bd 00 37 6c ea ee 13 7b 00 0f 0a d1 ff 5f 9e | d5 9b e4 25 b2 e5 a0 5b a7 8c 8c 3d 30 b8 3c 2d | d7 5a cb be 36 80 67 eb 87 97 e6 10 f7 e4 20 c7 | b9 ae bd af 99 ea 2b 87 69 7f 4e 89 2a ed a5 67 | 99 05 49 1e d6 46 c3 74 7b 66 be bf b6 f1 d6 cc | 29 00 00 24 c5 f3 2f 2c 84 76 05 a0 25 7b 18 6c | b7 6d f8 2f 27 cc e2 71 11 4d 56 a5 c7 36 d6 2c | 0b df 39 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 f4 1a 0b 18 23 e3 b7 72 f4 2b e8 | 42 64 3b ae 76 1f 34 42 00 00 00 1c 00 00 40 05 | 5e 56 c8 b1 db 9e 88 e1 bd b5 14 1e 2e de bc 55 | b2 28 a2 2d | libevent_free: release ptr-libevent@0x7fb36c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7a350 | #233 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 22 f4 9c 3e 1f 99 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #233 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #233 | rejected packet: | 77 22 f4 9c 3e 1f 99 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #233: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a30d70 | handling event EVENT_RETRANSMIT for parent state #88 | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #88 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #88 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49623.590874; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007493 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7a350 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #88 | libevent_malloc: new ptr-libevent@0x7fb36c04b7c0 size 128 "road-eastnet-nonat-88" #88: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #88) | 4f b4 b9 96 90 ac 87 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 55 7d 2b ef 81 b7 ac 80 5f 94 f2 45 3d 30 4f | 1d db a2 af 47 67 b7 7c be e3 bc 36 9a 72 1e e6 | 4f 47 07 85 4a dc c2 8c 23 63 be 8e ef c5 79 8f | 9f 5c 4f 9d 4f 85 09 c3 d7 cd 09 d7 9c 93 a4 d2 | cb 1f 73 cb f5 4a 96 ce 2b f9 75 2e 3c f9 67 24 | b7 40 01 a2 9a 5a 3a b5 1b 81 51 3d 6c dd 22 93 | a7 84 80 70 90 68 0a 70 88 ae 95 b6 8d ea e4 d4 | 54 cf 85 55 04 a4 94 5d cc ba 3d e2 31 46 75 ff | 7c 75 77 1a 1b 6c e0 fd b6 75 6b 40 9a b7 ac 36 | 39 45 a5 48 a8 96 90 52 cb 62 b2 ca a6 08 23 37 | d2 f9 be 02 8c 54 29 91 80 43 1c 2d 5f 25 44 25 | ff e7 b9 7d 14 3d 11 4a a3 ab 8e 4f b9 9b a1 4d | 91 68 13 50 1e 3b 88 4e ac 27 30 6a c7 2b ef cb | 81 87 56 8d dd bd 93 b9 d2 77 ea ab 8e f7 84 26 | 38 de 93 6d 11 fc f2 e4 c4 b3 df 42 49 8c 39 27 | 12 40 d4 6f db 31 51 71 3a c5 b3 bf 78 b4 72 ae | 29 00 00 24 d0 42 a3 31 c3 ed 67 67 3c 0c 74 87 | e1 18 ba c3 96 b7 23 3a c3 28 fa 83 32 6a f8 22 | c5 3d ce 47 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 13 5d 9d 57 2e de f0 16 54 40 11 | ce e4 63 b7 5f de e1 17 00 00 00 1c 00 00 40 05 | 73 d1 3a 60 f3 dc 99 f7 0c 4b 4c 3e d1 f1 65 ae | 8d f5 93 01 | libevent_free: release ptr-libevent@0x7fb34c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a30d70 | #88 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f b4 b9 96 90 ac 87 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #88 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #88 | rejected packet: | 4f b4 b9 96 90 ac 87 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #88: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0a980 | handling event EVENT_RETRANSMIT for parent state #196 | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #196 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #196 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49623.646228; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00919 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b246c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #196 | libevent_malloc: new ptr-libevent@0x7fb34c035930 size 128 "road-eastnet-nonat-196" #196: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #196) | 56 d5 c7 24 09 fd 90 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 8f 70 c3 ed 41 cd d6 d2 1b f8 2a 49 7b d2 65 | 1d 48 5c 44 f7 09 ac 3e 9c 08 81 f6 b3 65 8e 9b | 4e f9 50 8c c8 e7 7b 20 7c 22 4e ca 64 9d 3b 78 | 6f 58 b3 9e 1c 75 62 70 7c 61 ef 34 cb 86 a6 1c | 58 51 2c 23 30 92 4a 45 b4 b8 ae 94 76 05 b8 97 | 44 53 83 e4 01 1b 12 69 e8 13 a8 21 92 4d 3c f0 | 3d 68 d7 2a 32 bb e5 1c b4 56 88 6b 46 1e 40 2b | 43 ea 27 d3 55 2f cf 9a 31 8f 09 d3 05 58 fd 61 | 42 c4 db 9a 42 0a 57 3b 19 4b c6 5f d6 ea 27 6a | 7f bf 49 6f e7 37 63 cd b0 56 7c d1 00 23 b6 75 | b5 9d 85 99 73 08 5b 3f 63 22 53 47 75 51 36 9e | 7d c3 2d 34 ef d2 c8 dc ed 30 18 e1 fc d9 f1 f0 | 6e d9 74 09 8b e8 94 06 ae aa 96 8e cd d8 85 a8 | 1d 1c c6 45 d2 df a8 88 f7 4f 9f 49 92 80 ca a3 | 24 f7 b2 76 f6 e9 c7 34 75 8f 12 25 2f 88 bf 00 | af 80 e2 a0 d5 42 a1 0f 8a 93 9d 2c 68 e7 dc 08 | 29 00 00 24 ed 57 45 ce d5 85 17 38 4f bc 48 45 | b8 48 4b 6f c9 94 96 34 41 c5 a0 9e ee f3 85 65 | 17 35 60 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 33 d1 79 b1 42 18 cd cb 66 ed 21 | 50 1a 62 22 98 16 96 33 00 00 00 1c 00 00 40 05 | 37 d9 a8 f6 16 ad 1f 94 88 50 6d 18 f9 5d 91 a6 | 7a d6 46 08 | libevent_free: release ptr-libevent@0x7fb38802d3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0a980 | #196 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 d5 c7 24 09 fd 90 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #196 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #196 | rejected packet: | 56 d5 c7 24 09 fd 90 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #196: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0666 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2e150 | handling event EVENT_RETRANSMIT for parent state #89 | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #89 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #89 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49623.654613; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.0053 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0a980 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #89 | libevent_malloc: new ptr-libevent@0x7fb38802d3a0 size 128 "road-eastnet-nonat-89" #89: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #89) | 9d 5f d8 02 80 b8 e7 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 e3 b9 05 71 34 7d 24 1f b0 78 15 60 77 1c 08 | 9e 6a 97 b0 4c 89 e3 5a dc c3 13 ad 84 6a 5e aa | fd ca 45 35 ba 35 de 44 be ce 11 ea 86 29 6c 73 | 0b 7f 74 63 63 d2 81 70 21 25 9e 55 c0 3c 14 62 | da 13 e5 79 f3 ac 65 c2 4c 57 6a e3 37 8f 5c 04 | 8a 01 65 69 49 a9 46 40 f2 f3 a8 b3 1a af d6 79 | f9 34 6f 04 49 9e f3 10 ca 6b d5 6f d3 e5 36 7a | c9 32 cd 69 df 91 08 6d 35 ec 78 52 d9 57 09 e3 | f5 63 af 57 d7 93 38 af ff 2c e8 36 87 e0 92 43 | f0 f6 97 f6 50 a5 d2 4c 16 d1 d2 d2 96 90 50 82 | 09 99 3b fa 59 66 b4 48 e1 b1 0d 01 76 3d b4 c2 | b2 4d a5 5c 8a c7 cb a9 bb 09 56 bf 65 e9 da 28 | 24 dc 22 59 97 49 92 d0 c5 d3 9b 2b da 0b d5 26 | df 68 b6 c9 f1 0d 58 08 b0 7e 26 ce 7d 24 b1 d2 | a7 c4 2d 42 0c 8d 57 57 7b 42 5d d8 f7 b9 c8 ba | e6 b0 9d 60 5a 01 d8 33 e3 a6 9f f1 3b 81 e4 a8 | 29 00 00 24 50 a5 b1 4c 6d 18 8a 79 34 52 af 57 | 9c b8 99 4d b9 e7 5c 74 bb 7f a4 8c e5 f5 2c a5 | 8d 6b 1d 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 41 ee 04 aa 3d b0 21 0a d0 67 73 | 50 8d e2 01 ce 26 f9 77 00 00 00 1c 00 00 40 05 | 7b 60 8a 47 58 c7 18 57 64 ec a9 8e 15 07 49 b1 | ed 9e c4 1b | libevent_free: release ptr-libevent@0x7fb35800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2e150 | #89 spent 0.239 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d 5f d8 02 80 b8 e7 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #89 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #89 | rejected packet: | 9d 5f d8 02 80 b8 e7 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #89: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0971 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf10 | handling event EVENT_RETRANSMIT for parent state #250 | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #250 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #250 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49623.662177; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004061 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2e150 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #250 | libevent_malloc: new ptr-libevent@0x7fb35800cf80 size 128 "road-eastnet-nonat-250" #250: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #250) | 17 2a 9d c4 13 ac 7b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f a0 94 c6 2f 84 36 04 eb 6b 9e d3 d8 c3 41 dd | 36 5b 9a 4c 3e c4 08 57 57 9d d2 59 b6 8f 5a a0 | 97 64 4c 58 37 53 a6 c4 b2 5a d7 28 c7 0c 91 ed | be a1 6c 6f 57 ab d6 36 57 9a ec 6e 81 e7 d9 ec | 00 31 e4 c2 56 03 3a 6a 1d 88 e8 70 93 fc 2c 64 | 28 be 05 43 75 db 83 1a 2d e0 38 f0 97 bc d9 f4 | 8f af 26 f3 55 d2 01 81 1a 51 e6 93 66 74 0d 48 | f0 8b f8 85 50 76 3e 80 0e 67 70 24 1d ad 6e ea | 72 9d 01 c4 5f 99 0d ea 29 5d 36 37 89 d4 98 07 | 88 15 ab 7a c4 c5 62 ba fc 8c d5 56 64 df 3c 82 | 9a 54 de 55 20 6b b2 85 89 5d a1 07 c2 57 11 bd | f6 1f f1 5d 9f 5c 8b 9a c0 e9 98 82 3c 9e 57 da | 35 cf a5 fa b1 00 d7 17 27 e9 41 21 aa 94 96 cb | a7 a3 73 c1 a5 31 48 fa 19 d0 03 ff 95 c4 5d f6 | f5 17 61 a5 35 90 af 0b d1 1b d3 73 e5 de 34 00 | 63 00 cf f1 60 d4 f0 c0 3e 0d 02 7c 00 ab ce 51 | 29 00 00 24 c8 41 60 b9 9e 92 4a 7d d2 ef 9f 8c | 7b 43 49 a0 e3 71 1b 9d 34 81 8d 16 42 5a ed 22 | 3b 97 7d 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 44 92 04 c0 13 80 0a cd 61 73 30 | d2 9c c0 ea 6c 30 db 12 00 00 00 1c 00 00 40 05 | 76 73 9b 47 5d 14 7f b7 af f1 ed 94 26 55 3a fd | 56 a2 76 70 | libevent_free: release ptr-libevent@0x7fb34401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf10 | #250 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 2a 9d c4 13 ac 7b ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #250 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #250 | rejected packet: | 17 2a 9d c4 13 ac 7b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #250: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #234 | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #234 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #234 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49623.726113; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.007952 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #234 | libevent_malloc: new ptr-libevent@0x7fb34401d920 size 128 "road-eastnet-nonat-234" #234: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #234) | f2 fd b6 5b dd 65 ca 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 84 9f 8e f2 4d ae 28 c3 a6 33 85 a7 41 17 2e | a7 fb 37 ec dc 5e da 22 ed a7 d6 7f e1 29 5e 3a | c1 0a e8 67 19 e8 ac d8 ab c4 ce 43 3f 4e 0f bb | 7c 98 41 2b 6f 77 ca d9 32 a6 af f9 98 cd dd 12 | d9 37 bd e9 25 be 75 b5 bd 5e e0 83 6f 45 f8 da | 18 94 6a f4 88 bf 0e 4d e2 07 2b 36 d8 6f 3a 20 | 7f 78 6a 85 8a e5 3c dd 81 bb 63 90 5e cb bc ba | da ba 10 8a c6 0e 8a aa 71 5a 96 4e 6c 70 41 b3 | b5 ed c1 a3 26 f6 9d 2f 3e 30 60 a8 7a d4 51 c7 | c1 d0 6f 12 78 fa f6 7a 64 88 82 80 72 24 ff 23 | 06 91 a9 95 a1 36 33 ce f2 c2 55 d0 b5 3c 49 79 | 6f 7f 3e 42 f0 3e 13 68 8b e1 82 c2 f7 ef 92 e7 | 73 e6 b2 0b c7 04 76 33 01 80 30 de 76 f1 e6 56 | a7 c5 01 91 93 65 f4 09 85 c4 02 fa 63 8b e5 e6 | 21 78 9f 81 bf e4 b0 d6 2d 62 90 d2 7c 1e 4b d9 | ae 42 db a5 3c 94 61 a1 2c 3b 37 25 2d 53 32 5c | 29 00 00 24 9d 5d 40 b5 2d ec 67 ae 83 64 17 c2 | 32 3b d8 b9 21 ed 79 bc f4 91 0a 50 e4 b3 2c c0 | f4 72 58 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 89 bc a1 a0 be dd 06 e7 d6 84 21 | 72 6a c6 f8 b6 a8 a1 51 00 00 00 1c 00 00 40 05 | 53 6b 47 d7 1e 7d 4e e3 0d 3e 41 f7 75 f0 92 15 | 7c 13 7e ba | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #234 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 fd b6 5b dd 65 ca 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #234 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #234 | rejected packet: | f2 fd b6 5b dd 65 ca 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #234: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.073 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab90c0 | handling event EVENT_RETRANSMIT for parent state #90 | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #90 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #90 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49623.742107; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006455 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #90 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 "road-eastnet-nonat-90" #90: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #90) | 26 95 92 02 0c 74 14 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 ed e3 a8 eb 0c e2 00 1e b8 30 77 f5 0e ad ce | 65 c1 45 a9 f8 d6 59 16 4d 14 6e d4 77 5e 81 5d | e4 5a fa df cb d1 e9 b4 fb 7a 1b 94 96 f5 cd a1 | 92 48 08 b0 94 02 60 49 2d a3 e6 bd 87 20 3a b6 | b3 a4 42 54 6e e3 59 4f 33 f7 d9 14 23 f3 be 46 | 0e 6a b0 16 f3 25 4c 11 1c 90 dd a1 d3 04 dc 69 | 8d 39 0c 51 5f 83 72 cb 93 87 70 c9 f5 3d e0 2a | c5 11 3c 75 bc 46 e8 c6 f5 45 c5 bc bb 53 d8 9c | 7a ab 11 6e 8b 56 f1 6e cd 93 8a 23 e4 3d ba 8e | f3 e8 36 9d 53 65 3b 19 f4 e3 cc f3 54 92 3e af | 1e ea f7 7a 71 af d2 c7 14 e2 2f f0 39 fe 17 bf | 5f 5e bd 3d 44 b3 a2 13 36 c4 88 da f8 e8 06 a9 | 63 d0 49 96 b9 8b b5 05 47 2d f0 7c f0 b7 4b a3 | d9 0f 59 ad 42 e6 a2 62 85 25 36 ae 56 68 a9 08 | 18 48 13 b3 3d 8c 24 fd 03 b0 13 b0 fc 3c f6 fc | 7b 2f 36 dc 82 d7 51 c4 8b bc 56 3e 48 7c ce 7f | 29 00 00 24 7b f2 d7 97 09 c8 65 d1 69 47 34 b1 | 55 8b 56 a2 4a 71 ee 64 d5 6c 65 05 c4 2c 51 b4 | b0 ab 0f 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 4b f3 32 75 d7 ef f4 06 67 91 40 | 71 93 9a 6d f5 fe b0 cc 00 00 00 1c 00 00 40 05 | 99 8e 72 1b 4f e3 a6 e8 23 e7 c4 0e ce 5c a4 3c | cd e1 15 1b | libevent_free: release ptr-libevent@0x7fb36403ae90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab90c0 | #90 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 95 92 02 0c 74 14 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #90 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #90 | rejected packet: | 26 95 92 02 0c 74 14 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #90: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f61a0 | handling event EVENT_RETRANSMIT for parent state #197 | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #197 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #197 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49623.745463; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.025959 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab90c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #197 | libevent_malloc: new ptr-libevent@0x7fb36403ae90 size 128 "road-eastnet-nonat-197" #197: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #197) | 76 fd 06 22 f8 72 39 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff 68 ad 96 cd 76 be 78 ca de ba cf 7d b8 d2 27 | eb 47 3d ab 5c da 69 f4 c0 aa ef 37 1d c8 bc 64 | b3 77 c8 06 c7 c1 ca 6e ba 13 a5 88 a0 2f 7d 28 | 77 76 19 e0 b9 08 19 f4 ea 19 57 8a 4a c5 51 64 | b2 b3 06 1d b7 55 89 e3 2f 55 c2 0a 68 16 ae bf | bc 84 d6 24 e3 0d 3a 6d 7f b0 26 cf fc 83 69 6f | 06 6c 19 78 05 aa 1a a7 a3 53 01 3e 4f 01 0c e2 | b6 b8 5e d8 44 74 c4 4a 7b 03 78 a3 0d 18 93 01 | ca 83 a7 98 02 8f 9a c5 fb 52 4a 95 fa 85 65 9f | 48 a4 30 21 ca 8f d8 e0 98 f5 f9 49 2a 0a 5a b1 | e0 a0 a3 25 65 8b 86 36 1d 17 ff 3c 76 35 24 e3 | b6 f7 d8 e5 22 2f 0d 80 58 07 89 c1 b8 b9 b6 a3 | ac a9 f3 74 55 c9 1c c7 ef 2f b9 00 be f9 d3 c9 | 30 e9 ef 92 c0 ce 36 02 ea 19 c8 d7 f7 c5 6a 1c | b8 72 5b 69 21 d3 b8 ca 13 78 68 f5 5e 6f 80 64 | 1c aa ea 24 03 ee 29 9b c1 bb 83 e4 a6 7c 10 08 | 29 00 00 24 74 4f 18 14 83 36 22 20 12 7b 44 86 | f2 c1 e1 0b 40 a8 83 e6 1a 42 e2 88 a2 98 21 31 | 2c b2 85 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 2f 89 09 b5 52 02 b8 23 bc 44 51 | 94 1d 2d 47 4e ed 65 d6 00 00 00 1c 00 00 40 05 | 73 fc 3d fb 5c fa a5 ca c9 53 fd 67 5c 67 b8 86 | 11 c4 a6 88 | libevent_free: release ptr-libevent@0x7fb350046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f61a0 | #197 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 fd 06 22 f8 72 39 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #197 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #197 | rejected packet: | 76 fd 06 22 f8 72 39 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #197: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0691 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a74cd0 | handling event EVENT_RETRANSMIT for parent state #251 | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #251 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #251 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49623.774274; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003664 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #251 | libevent_malloc: new ptr-libevent@0x7fb350046040 size 128 "road-eastnet-nonat-251" #251: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #251) | df 3f 41 8a f3 53 d1 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 be c7 da 7c e0 83 1f ee 21 fb 97 63 3a 34 59 | 37 0f 13 08 a4 ea d7 d0 84 7f b3 4c 1b d7 fd 64 | d7 1b c4 39 0b a3 dc 8b fa 1d 0e 6a 81 2a 3e 09 | 69 77 47 fe 6f e7 1c 9d 41 07 43 05 b4 26 e9 60 | f3 29 4e c8 f2 da 1b 32 bb 97 33 75 2b 11 a0 c6 | 90 b8 73 b2 56 c1 80 3f f7 61 34 26 98 51 70 a5 | 88 c0 d8 c1 f3 4f b0 3f 75 1e 72 b1 d1 25 9a 2c | fb 27 8d d4 bd e9 f9 05 8f 56 62 b1 eb 23 67 7e | 83 41 57 f8 72 a3 e1 9d d8 36 e3 98 b1 13 30 a8 | a1 41 78 93 e9 2c e0 32 39 cd 75 d2 0c 43 c2 5b | 87 04 ee b5 1e 82 ed bc 9a dc ae f7 d5 db 76 da | 37 c9 35 0d 18 56 2e 1c 38 d4 6f a6 b2 28 96 31 | 03 0b 4f 71 60 58 12 2e e6 e1 cb 0c 0e 82 e2 ad | 8c 61 3a e3 4a ba d8 15 fc ef ca e2 63 cc 17 43 | fc 08 79 fe 35 fa e0 53 4c ee 7c 11 7e 46 1e 11 | a2 1a 41 cb e0 70 0b 67 d9 3b 63 7b ce 2c 58 e9 | 29 00 00 24 42 a0 3c df af e9 94 45 ab 83 0c a2 | 5d 7d 94 01 25 5c 79 6e 69 bd 19 b2 b1 d1 a1 50 | 35 69 ea d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be 44 4c d9 6f 7f 41 ca 31 72 e4 37 | ba 88 35 fa ba 64 3a 13 00 00 00 1c 00 00 40 05 | c3 fb 91 09 59 3d 6b 06 7b be 35 78 ae 35 d3 44 | 75 ba f4 a9 | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a74cd0 | #251 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 3f 41 8a f3 53 d1 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #251 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #251 | rejected packet: | df 3f 41 8a f3 53 d1 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #251: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0685 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fa300 | handling event EVENT_RETRANSMIT for parent state #91 | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #91 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #91 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49623.819631; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005261 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a74cd0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #91 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 "road-eastnet-nonat-91" #91: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #91) | a6 f1 37 27 17 86 c6 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 6a 94 73 f6 c2 01 42 8c 6e f6 05 6f 1c e2 ee | 38 45 16 e5 f6 17 c9 fc 07 cc bc 0b 02 da 35 c8 | 5a ca 9d 87 29 53 47 69 49 7f 31 f0 fb ce e2 59 | 00 57 9b 32 9e 1f da 4b f7 41 b5 05 14 af c4 d7 | 09 7f 69 01 a0 cd 93 57 e5 a7 fd 93 a9 9e c3 fc | b0 af f5 37 11 6f 2b 38 a8 2a 8b 37 b3 e6 bc bf | 0c 06 37 86 ca f2 b6 b0 ed 1e 3f d6 8a f0 0b f9 | e8 80 df 35 d6 a2 36 c0 a2 dc a4 1a ca 7d d9 0b | 6f fc 29 fc 92 12 f8 05 c1 88 8e 81 27 4a 61 62 | c3 16 fc 6e 5e a6 59 bf d1 b1 ad d5 92 05 c4 60 | 2f 54 a3 71 e0 ec ca 5d 37 16 ec 5f ec 37 29 2d | 46 5a 04 10 84 ad 36 aa 07 ca f2 60 8b 7c ac f8 | ac e2 8b a3 69 23 74 f2 d2 2d c5 0d 51 9b 2c 7f | 42 45 54 c3 ec 3d 44 63 f0 0a ec ff b3 69 48 ee | 22 28 aa af 72 8c cd ca 9e 3c dd f6 ac 2b 6f b7 | a1 90 21 32 ae b8 23 39 1e cc fe 3e d6 b6 21 70 | 29 00 00 24 29 05 58 2b f0 ba fb 18 77 b3 53 8d | 8b 05 bb 0a 8a c5 e8 dc 24 17 58 d9 a6 60 c9 1d | bc c9 21 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 d0 cc 50 f7 83 7e b1 80 37 a7 4b | da df 68 8f 62 b7 e5 89 00 00 00 1c 00 00 40 05 | 8a 41 f9 2e 73 42 40 08 8e 79 f6 3e 7a 3f 48 7e | 67 86 16 af | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fa300 | #91 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 f1 37 27 17 86 c6 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #91 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #91 | rejected packet: | a6 f1 37 27 17 86 c6 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #91: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0755 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf80 | handling event EVENT_RETRANSMIT for parent state #198 | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #198 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #198 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49623.832005; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00772 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fa300 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #198 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 "road-eastnet-nonat-198" #198: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #198) | 38 c2 c3 e5 3e e5 82 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 61 f7 55 c5 c4 5e d0 83 66 79 06 76 ff 91 2f 9b | 12 d0 24 44 db b1 bb 60 15 c5 59 2d d1 18 5f af | af eb bb bf af 0f d5 a7 6d 21 23 3c 7a d5 2f 3a | b3 ef ca 8b 4c db ec bc f0 8c 19 8a b2 60 93 64 | a7 e9 05 44 28 9e 74 5d d9 95 66 66 f7 e5 b4 1f | d5 4f c6 33 f7 6e 5b 80 b4 15 1d 1d 0e 0a 1d ec | d1 57 f6 0c 8a 85 f5 7e b6 52 c9 40 29 cb 30 96 | b6 70 b8 b9 59 b7 f3 5d 39 15 1c 09 f2 d7 22 1a | 2f a6 71 e7 c2 13 1a 03 5a ae 65 2f 9f ab 09 6a | f8 76 83 82 4d 45 c3 9c c4 22 81 0b 0c de 1f 60 | c4 83 6f 80 69 4d fb 9f c9 f8 93 ff f8 9f 02 54 | a0 9a b8 b4 d0 4b 39 8e 82 eb a2 4d fd 53 0b 42 | 08 c3 3b 83 a3 55 58 9c 32 8d d4 50 90 35 7f 36 | 30 25 cb 7b da d7 20 59 55 75 68 f3 54 82 bd 15 | 66 45 d1 d6 73 76 d2 e1 4b 15 1f c3 2a 8d b1 0b | e3 7d 9a 2f f6 14 5c e9 eb 5c bb c0 32 a0 bd c5 | 29 00 00 24 88 f3 29 1f 7c 05 5c 84 29 93 1b 9b | 8b f1 e4 5b 97 f1 d8 9e b8 85 d9 30 2a 5f 45 e2 | 98 31 41 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 05 30 82 a4 eb e3 d3 07 9b b1 ad | f0 ee 15 a7 e9 bb 27 63 00 00 00 1c 00 00 40 05 | 88 8a 68 49 cd fa 13 38 3a 2a 49 e8 1c 37 c8 41 | 63 44 84 75 | libevent_free: release ptr-libevent@0x7fb34003b010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf80 | #198 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 c2 c3 e5 3e e5 82 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #198 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #198 | rejected packet: | 38 c2 c3 e5 3e e5 82 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #198: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0764 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56e30 | handling event EVENT_RETRANSMIT for parent state #235 | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #235 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #235 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49623.898518; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00403 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #235 | libevent_malloc: new ptr-libevent@0x7fb34003b010 size 128 "road-eastnet-nonat-235" #235: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #235) | 7e 07 6a 55 b2 86 f9 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 15 b0 98 97 a3 9b e7 91 af 63 8f 32 c2 f0 a6 | 5a 92 40 40 d6 e9 e6 fc ec 5f 9d 94 27 3d 04 cc | 99 dc 7e ac 23 a0 7a 25 ef 03 33 84 5f 4e 3e 44 | ab 45 fc 51 2f 77 0e 04 9c 57 58 3e e3 c4 95 ac | 99 c6 cf 74 8b ee 49 3f 97 64 5a ae 23 26 21 49 | 82 68 17 68 04 08 36 f9 22 38 ec 23 ce 8f 41 44 | bf d0 3d c1 f8 23 b3 6a aa 39 20 ad 4f 3f f3 2b | 3d f9 49 23 b6 22 6b 6a 39 8a 61 bb b3 33 4a 8f | 12 ce 51 75 41 2f c2 97 7c 24 15 e6 c7 4c 0b 5a | 7e 98 8c f9 eb 79 4c 87 18 6e 22 0f ce f5 5a f4 | 97 f7 88 3c 20 6b 59 a3 22 56 0b 5d ff 73 43 0c | d0 ab c4 fb b1 97 4e c1 93 9b 6a 7d 3a c0 41 34 | 56 74 13 c4 02 0c 52 4b 7f 7c ed c1 a7 58 84 db | 34 3e fa dc e2 91 c8 b6 c5 5f f0 1a 94 9c 21 62 | 9c 24 2a b8 60 58 3a 4f ea 5e 65 e5 c2 96 45 62 | b2 a3 11 26 4c 94 9a fb e2 2b 93 1c 4f 08 c6 66 | 29 00 00 24 0c f1 17 b1 15 6c 67 72 28 b0 8f 38 | fd 2e 9a ff fb 4a d4 a7 a7 b2 00 ff 88 fe ef 90 | e3 f8 e6 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 78 bf 00 5e f0 c9 41 6d 35 37 22 | b0 4c f8 53 8c eb 59 4e 00 00 00 1c 00 00 40 05 | 6e 5c 6f da 69 07 20 20 73 2e b2 7c a0 00 c1 c2 | 79 44 3d 62 | libevent_free: release ptr-libevent@0x7fb3680251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56e30 | #235 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 07 6a 55 b2 86 f9 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #235 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #235 | rejected packet: | 7e 07 6a 55 b2 86 f9 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #235: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0476 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c00d120 | handling event EVENT_RETRANSMIT for parent state #92 | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #92 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #92 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49623.900805; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006349 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56e30 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #92 | libevent_malloc: new ptr-libevent@0x7fb3680251c0 size 128 "road-eastnet-nonat-92" #92: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #92) | 07 61 83 69 17 8d a7 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 13 06 9b 22 b9 09 02 07 4e 56 e2 9a 05 b7 70 | b7 25 ba 3c e0 d7 4b 41 68 60 e2 84 fa 7d 2e 53 | 6d 05 81 6c 1d a6 11 6c f3 c1 91 94 93 3c 04 e1 | 47 48 3f a6 f9 c1 bd d3 55 1c 44 87 99 6c 2b ee | 1a fc ef da ca ee 71 5f 90 30 42 cf 28 4f 89 1f | 86 f8 61 c0 95 c8 84 9c 1c 5f 1c 12 41 c6 05 de | 97 e9 89 32 6b 06 59 ff 06 2b 2f 06 a3 7f d2 ee | 73 0b 6d 38 c1 ed f4 4b b5 20 b3 c7 2c 91 97 4e | e0 5f 39 be 43 66 47 ab c5 cc 93 72 f7 60 85 3f | db 39 5c a4 81 f1 02 ef e4 62 a4 fe 72 6e 67 a1 | 96 94 e2 5d 70 64 80 e3 dc 1a 37 fd 9b e4 85 ab | 94 44 5e 2f e2 eb 91 bf ec 37 e1 84 2a 65 44 ca | 1a 08 22 fa 52 cb 8e 26 f3 0a e0 f3 e8 ed d0 ab | dc 5c 23 93 37 b0 3f ec 3e d7 3b 37 ac 5f 12 98 | 95 79 c8 ae bc 21 83 a1 90 e1 8c a5 2a 7f b7 ff | e0 96 4f 2b 8d 89 b3 7b 60 e0 d7 14 33 e7 9c 37 | 29 00 00 24 0e 70 86 57 dd 9d d2 8d 77 a4 03 8e | d4 ef 6c f9 5f 5e da 54 db 62 42 7e 49 f6 2b 1b | b6 ad f3 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 b0 5c 2e fc f8 56 4b e1 e9 3b 08 | c9 71 30 03 41 fd 60 2e 00 00 00 1c 00 00 40 05 | f0 af c3 ce dd eb 90 e8 cb ac 91 a5 38 a0 f8 72 | 06 9d 9d 60 | libevent_free: release ptr-libevent@0x7fb36c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00d120 | #92 spent 0.0892 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 61 83 69 17 8d a7 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #92 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #92 | rejected packet: | 07 61 83 69 17 8d a7 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #92: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac3ec0 | handling event EVENT_RETRANSMIT for parent state #252 | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #252 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #252 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49623.906036; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.005522 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #252 | libevent_malloc: new ptr-libevent@0x7fb36c012840 size 128 "road-eastnet-nonat-252" #252: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #252) | 50 58 54 7e 04 4a db ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 00 2c be 68 01 bb 0f 58 1a 16 c9 1d 14 15 83 | 19 e0 b8 46 87 82 81 55 0f dc 16 6a 8b 3d e4 4d | 0c e9 b2 bb 22 a5 95 09 ff 11 50 af 23 66 83 f2 | 31 7e 02 6d d7 48 dc 83 9d bb 70 c0 3a 92 f4 c0 | 9a e6 0b 57 02 38 84 8a 91 5b b5 ae 3c f3 73 1a | a4 24 27 15 5b c6 51 0e da 95 77 0a bb 05 7d 91 | af 25 45 22 0e b2 f2 4f fd 42 9b d1 98 1f 5e 0f | dd f0 f2 19 b9 ea ba ee 11 21 ee b6 0c 0f c9 55 | 03 18 8b f7 b4 d9 1d 6b 99 70 65 d0 5f 1e dc 40 | 4c 0a 83 ea e9 69 a1 18 51 d4 d2 fe 11 46 10 47 | b7 70 71 e5 e6 a8 cb f1 92 74 f2 25 34 f1 2a 20 | 05 8b f0 31 b4 4d ec 75 25 71 1f 16 3f cb 5c 38 | 5c 6a 40 df be e7 8c 81 eb 7e b2 34 69 d7 27 e3 | f2 93 a6 4e c8 e4 03 ff 2e ce ce ed 7f ee 01 95 | 24 0e cb ce 0e 6f 39 0e 07 c6 d8 ca 80 7d 23 cb | 6a 28 32 82 38 d2 86 f0 3f 31 6d 12 83 e3 4e 38 | 29 00 00 24 18 de 08 18 c8 a2 29 e1 d8 0d de 97 | 0b 9b 22 3a 3d 4c 80 05 7e b8 73 ae 1d 84 d5 68 | cf f8 f7 ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 65 87 e0 56 8f 33 84 b6 65 68 e9 | 21 de 15 28 76 56 f7 ec 00 00 00 1c 00 00 40 05 | 9e 72 e4 22 38 66 37 d3 ad ef a1 2e a9 f7 f8 37 | 54 d6 26 3e | libevent_free: release ptr-libevent@0x7fb384027b30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | #252 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 58 54 7e 04 4a db ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #252 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #252 | rejected packet: | 50 58 54 7e 04 4a db ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #252: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a027b0 | handling event EVENT_RETRANSMIT for parent state #199 | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #199 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #199 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49623.945913; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.010249 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #199 | libevent_malloc: new ptr-libevent@0x7fb384027b30 size 128 "road-eastnet-nonat-199" #199: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #199) | 27 d1 6c c4 4c 84 e3 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 f7 e5 ae 44 da 7b a1 b1 3e 44 fb ef 82 32 77 | a0 c2 72 43 50 19 7e 5e c7 1d 24 fa 9d 99 ff 71 | 44 54 82 8e cd bf 0f 40 ad 0d 4a 27 75 78 aa 64 | 63 e6 66 6d e9 bf 1f 5a 74 65 bf 0f ba 29 57 51 | 0a 44 9c 16 52 28 db 48 f9 d7 ab e8 1e 98 b5 a0 | ff 9d 9d 22 6a 26 d5 06 1f b5 07 29 59 d7 ec 33 | 10 b5 a0 31 95 73 ec 20 a2 11 23 56 06 d8 ad a2 | 6d 0f c8 00 64 2f 99 96 5d d2 5b a5 dd 2c 34 78 | ce 80 35 74 5d 74 56 55 47 bf 15 c1 84 c7 0f 64 | a6 70 c6 99 14 c9 d9 b3 02 6a 70 83 2d ca 4f aa | b9 b4 39 e1 b3 2e 81 8c 26 1f 8e f8 1a b1 b1 4b | b0 9b 0a c4 8c 38 2e 14 24 c9 96 c5 ae 69 55 cb | f9 3b a1 e1 2b 54 42 88 42 2f d5 f9 04 ab 91 7e | 86 11 e3 bd 2a 54 c0 da 96 34 89 6a 25 46 14 93 | 51 fb 1f 2b bf 29 76 41 f2 16 a8 f5 e3 fb 49 39 | 86 d5 c2 41 0f 92 03 df 3b a9 75 b2 e3 1f cd 5c | 29 00 00 24 ce b1 60 ec b2 6d 5b aa dc 41 a3 c6 | 5b 6b 71 42 8d 0b d4 85 d2 79 6d f3 81 c0 ff 8a | e8 8f f9 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b6 28 45 f6 47 a9 89 2b f2 e1 02 | ea 34 3a fc e5 a7 2b f1 00 00 00 1c 00 00 40 05 | a9 d3 87 ec eb bf 81 b0 18 6d 86 a6 a8 63 05 fc | 1c 93 4f b5 | libevent_free: release ptr-libevent@0x7fb3680407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a027b0 | #199 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 d1 6c c4 4c 84 e3 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #199 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #199 | rejected packet: | 27 d1 6c c4 4c 84 e3 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #199: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0725 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1af10 | handling event EVENT_RETRANSMIT for parent state #93 | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #93 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #93 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49624.024502; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008145 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1ae40 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #93 | libevent_malloc: new ptr-libevent@0x7fb3680407f0 size 128 "road-eastnet-nonat-93" #93: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #93) | 8f 2b 82 41 be 50 7f e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cd 43 20 82 ea 0d 92 4d b7 6f 10 e5 73 62 a1 74 | 5f 8b b1 bd e8 48 72 86 0f fc f7 f4 6d aa 74 9c | c6 32 cc 9c 2e 89 27 81 1a 44 1a e2 a0 dc ee ce | 11 9a 86 db b2 0d 84 8c a7 35 4b a3 54 44 ff a5 | 46 90 60 08 6b 0b b2 6e 30 fe 4a 71 80 d7 a0 82 | 42 f8 84 b3 d1 ca 25 4a c6 d4 78 a8 df 7e e5 c9 | 03 e0 84 12 8e f0 91 14 81 e1 1e 7d 14 d0 21 c6 | 0b a7 bd a5 91 4d 74 5f a5 49 fb 47 92 a4 f6 f2 | 46 b5 1e 26 6d f1 8f 2b 0f f1 aa b1 98 3a 25 3a | b5 d3 2a 4c bc bb 1d f8 fd dc 58 f3 d0 d8 1b 32 | 38 77 9b c8 3c 93 48 af 2e 17 ec f8 87 96 76 0f | 85 58 80 2d fe e0 ad 94 9a 85 9c 5e 26 2b ed 2c | f6 a6 2f 18 05 50 d7 9c 67 0d fc 1d 16 0d 73 cf | e1 da cd 32 28 a8 c7 82 3a 82 36 71 d2 89 fb 29 | 72 68 23 fe 3a 1e 23 55 bf ae 58 43 08 3b 0f b5 | 11 45 c9 10 6a 4c 49 3d 66 da 53 be f8 72 a4 ba | 29 00 00 24 38 5c 7f a9 1f f6 b2 d3 ed 46 5d a7 | 91 ec df cb c1 74 f9 14 df e8 fc 11 90 67 a3 a7 | 1e 7f 11 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c cc 1f b2 cd 2b 6c 7e 5b 50 dd 93 | 55 b1 e2 f6 27 0b bd 36 00 00 00 1c 00 00 40 05 | b6 37 a4 32 e9 5e 9f 19 d6 7a 97 0a 5b 76 69 49 | 01 0d 5c 45 | libevent_free: release ptr-libevent@0x7fb348035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1af10 | #93 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 2b 82 41 be 50 7f e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #93 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #93 | rejected packet: | 8f 2b 82 41 be 50 7f e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #93: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a276e0 | handling event EVENT_RETRANSMIT for parent state #236 | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #236 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #236 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49624.03277; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.011759 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1af10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #236 | libevent_malloc: new ptr-libevent@0x7fb348035930 size 128 "road-eastnet-nonat-236" #236: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #236) | 4f c5 63 73 3b b2 d7 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 5b 06 ee 84 fa 79 7f e6 43 db d2 0d 8b cd f5 | 59 c7 e2 83 26 7e 92 07 02 e5 75 02 5a 6a f0 b8 | 61 d3 80 1a 18 f6 6c 41 f4 8b 1c 06 f8 08 1d ec | 22 4e 32 49 5f 33 c9 49 bb d4 b4 9a 8b 9e f4 b7 | ce cc cf cb 5d b3 17 75 80 5e 65 75 ed 96 58 92 | ba 35 70 a7 18 25 e3 2d 24 94 8c 18 40 c5 8f 8e | 52 27 34 ad d5 17 cd 88 62 97 c4 7d b7 05 9c fd | 87 2b 85 fb 44 37 03 91 16 87 52 0a e0 03 40 76 | 05 68 d4 2b 81 46 59 09 54 29 07 bd 68 5b bc 5c | 8c 95 6c ea 24 20 a3 81 a2 b7 51 34 bf 49 44 7c | d1 b4 84 70 99 94 3b 26 25 f6 f8 e9 a2 1d 40 46 | 82 c9 ad f3 5f 36 60 f9 1a 16 eb 90 3e 33 04 f7 | 6d 37 8a a4 9b 0b b3 e7 22 8c ca b9 99 a2 ef 47 | df af 33 fd 94 a4 95 ab c9 0d 75 62 b8 13 05 a5 | 03 c9 74 d6 f5 9e 6f a1 90 65 6c b2 72 e9 df f5 | 5d 19 cb 15 48 a4 79 d7 52 7c ec ab 28 6e 6d 0a | 29 00 00 24 28 83 19 a9 be e7 a3 f6 92 20 74 48 | e6 d2 29 74 96 b0 77 d3 bd 1e ee 26 dd 0d 67 63 | ff bc dc bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 3a ff 41 6e c5 dd cc 76 37 c9 88 | fe 40 cf a9 30 61 ac fb 00 00 00 1c 00 00 40 05 | e2 5c 52 8d c8 02 86 2e 47 16 0b 04 4f 16 65 56 | c3 38 ce 94 | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a276e0 | #236 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f c5 63 73 3b b2 d7 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #236 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #236 | rejected packet: | 4f c5 63 73 3b b2 d7 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #236: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a272b0 | handling event EVENT_RETRANSMIT for parent state #200 | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #200 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #200 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49624.038033; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.010616 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a276e0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #200 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 "road-eastnet-nonat-200" #200: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #200) | 75 f9 3c ee 3d 43 50 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d d7 f4 2c e9 d8 b4 58 bc f6 5c 68 d0 e8 20 d2 | 70 0a 56 63 f6 74 43 04 b4 cd d8 23 88 fe c7 f6 | 1e d9 bd ee 25 c8 67 c7 2d b9 d9 c6 54 ca cd 9c | 4d 78 05 42 6a b4 88 a1 71 4e fd 59 90 2e 53 a1 | 4c c1 78 ca ca ed 13 0b 48 7e 72 f2 de cc bf 74 | d8 13 14 01 89 5b 3d f3 26 5d 17 ef 74 28 fa a9 | a5 86 f8 17 01 9e 46 6d 69 c4 ce 7b 85 c2 8b f2 | 6a 40 21 88 6b 4c 0d e0 b2 55 9a f1 b6 c4 a5 34 | 5e ea a9 16 4b 7b 22 02 6e b5 62 bf 0e 13 c4 75 | 5a f6 47 5c d0 c2 01 a3 46 b7 b7 ca c6 5e f6 e3 | 79 8e 25 ba 76 6d ee 11 df 8f 10 22 5f 50 31 f4 | b3 77 76 36 47 ec 67 35 64 4d 22 bd 77 3c 61 d0 | 1c 1c ab b4 d6 cf e4 0f 57 21 d8 30 aa 58 f6 84 | a1 48 51 27 85 8c 83 cc 89 77 d2 37 58 0f 1d e2 | 1d d9 35 ce 76 2e 8b 0d 16 1d 75 c0 13 c5 08 c0 | 3c d5 3b aa 74 68 e3 69 d7 c9 6b 6b d6 2e 6c a1 | 29 00 00 24 0e 33 98 69 ac 19 40 8d 23 0b bc 95 | 8f 5a 8e 62 b3 f7 97 e2 1f 4f da 87 39 88 58 8e | fe 30 e9 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 45 f2 7a b7 3f 1c 77 84 16 29 66 | 7f d3 6a c0 22 39 cf e5 00 00 00 1c 00 00 40 05 | a7 72 f7 48 87 f0 01 9a b9 14 bf 98 e7 f8 65 3b | c7 d8 2f ed | libevent_free: release ptr-libevent@0x7fb348046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a272b0 | #200 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 f9 3c ee 3d 43 50 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #200 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #200 | rejected packet: | 75 f9 3c ee 3d 43 50 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #200: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #201 | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #201 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #201 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49624.09734; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003958 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1ae80 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #201 | libevent_malloc: new ptr-libevent@0x7fb348046040 size 128 "road-eastnet-nonat-201" #201: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #201) | 5f 8c 2f 98 2a b9 f9 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 72 1b 4b d5 18 dd 2d 5a 73 d0 41 7c 7e 89 a9 | 19 f8 4b 62 c1 9f f8 9d ff 76 0b e2 1f 44 b2 65 | 43 ea 94 88 bf 44 69 e7 07 70 c1 dc 59 58 cc ff | 59 19 82 57 fc 1c 37 9e a0 3e e4 f1 e5 85 09 b8 | cc 92 31 ca fd aa 7e e0 16 48 4f 93 4f 42 e6 41 | c6 d3 52 7b 4e f3 0c 48 a9 04 ea f5 d3 65 18 f4 | 8a 3e 8f 3d 66 71 a1 fb 46 fb e6 68 d4 de 30 4a | 77 d7 f7 51 80 44 5e 85 cb 41 c1 dc 19 46 1a 15 | 01 41 bb 17 40 1e c9 5b 1b 21 a1 10 c3 62 4c 55 | fa d0 3d 43 4e f3 0e a9 19 fd a5 f4 e9 a2 ac b4 | 40 11 51 f5 60 d4 30 87 a9 01 d5 04 88 71 af 01 | 0d f5 ab c7 33 ac d8 6a 80 db b1 bc 74 30 96 9e | f3 e1 bc b7 79 7c 12 ad fa 75 5d d2 23 fd a0 f7 | 3c 1c 0b d2 90 e2 83 a1 35 0f 5a b5 72 3d 6d 57 | 77 a3 af 0c 6a cb c1 58 a8 44 91 03 d0 f1 c3 69 | 53 0b 4f 4c fa 84 4b 60 c6 19 9c a4 39 a4 5b 44 | 29 00 00 24 ae be 08 16 b0 5a 8a 2b 33 7f 9f 5f | cb b1 1f 0b c0 df 08 67 ec 99 94 2a ad 60 2a 4f | 52 2c d3 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 75 8b 84 8e ba 07 72 da 16 0b 96 | fb 30 39 ca 67 c0 9f 42 00 00 00 1c 00 00 40 05 | 88 1b f0 23 47 26 b3 be 92 d6 69 de 00 cf 4d 8d | 78 92 34 e3 | libevent_free: release ptr-libevent@0x7fb3440407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #201 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f 8c 2f 98 2a b9 f9 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #201 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #201 | rejected packet: | 5f 8c 2f 98 2a b9 f9 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #201: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a32290 | handling event EVENT_RETRANSMIT for parent state #94 | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #94 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #94 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49624.132924; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.022278 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #94 | libevent_malloc: new ptr-libevent@0x7fb3440407f0 size 128 "road-eastnet-nonat-94" #94: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #94) | c4 af dc f4 22 ca 1a 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b8 0d 8e 0d 24 fa 48 9f 6f 70 45 44 af 29 03 81 | fb 75 7f 29 b1 65 5b 6b f3 dc dc e0 d1 ea 65 d0 | 45 a3 5f 01 d6 e7 51 37 b4 25 82 eb 71 98 d8 b2 | 75 57 7a 0e db af 40 2b 1a 10 c2 e4 b7 7e 18 39 | 54 3c 4a ec 4d d5 3a 2e ab bd e0 80 1e 0f e2 b5 | e4 a9 bf ef 3b ba fe af b1 7b cb 8a 16 e9 8c 65 | 20 92 b8 a2 66 75 85 84 5a e4 4c c5 4e 4c dd 10 | 51 c2 7a 85 78 58 a1 10 d6 cf c5 6b e8 22 f2 d1 | 41 df 6b 5c 73 f6 87 2e 17 45 1b 75 b8 bd 3d 9e | d2 3e d8 cd d1 d8 9e 58 23 f3 68 0b e1 b8 89 69 | 76 b7 7e 92 6a 4a 5b 2c 36 99 61 9d bb 09 19 68 | e0 83 4b 97 a3 48 26 96 74 a7 da 5f 7d b7 55 9e | e3 e8 68 32 6b 6e 35 3d 26 d7 4f 19 6d d6 44 17 | 3d 23 4c ff 1c ff e3 77 85 72 fa 85 64 76 2e ac | 5a 7b 31 bf 7b 44 eb 9a f4 5c 9d 72 ec 95 e5 4e | fc 10 63 57 5f 09 74 f6 c6 17 bc 05 7d ea 5c 13 | 29 00 00 24 c5 77 30 ba 9e 22 45 4a 1a af ea 19 | 02 b6 fb 3a f7 c7 ff 86 e4 75 07 62 09 1a 17 15 | a7 99 2d 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d bd d3 d9 55 1d 16 4d 34 06 fd 91 | 92 b6 52 35 3e d3 c6 4f 00 00 00 1c 00 00 40 05 | 83 77 03 33 97 20 84 34 b1 e3 aa 6c 05 af 74 6e | f0 8d d0 a3 | libevent_free: release ptr-libevent@0x7fb37c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a32290 | #94 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 af dc f4 22 ca 1a 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #94 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #94 | rejected packet: | c4 af dc f4 22 ca 1a 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #94: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab7a80 | handling event EVENT_RETRANSMIT for parent state #237 | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #237 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #237 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49624.150315; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004692 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a32290 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #237 | libevent_malloc: new ptr-libevent@0x7fb37c009640 size 128 "road-eastnet-nonat-237" #237: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #237) | 4f 30 a3 80 9f 9f 65 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 80 47 96 1c c9 51 f1 0b e5 85 bc ba 8d d8 2f | 7e 2e aa 44 d1 4d 1c a5 32 20 f2 ef d0 59 1d c7 | a5 77 ca 5e 02 89 87 a6 bb c0 e0 54 5b b5 84 79 | 29 9f bb 42 c6 20 c7 56 ce cc 84 c6 1e c1 d2 f4 | 13 76 c9 2e e4 05 e9 37 e6 bd 6f 35 dc f2 cd db | 35 16 6c ad 20 92 a2 8f 48 33 b4 20 26 8f 59 2d | 4c d4 d1 24 86 23 46 ee 6e c6 b6 24 d5 4f 00 17 | 52 61 b1 bb 85 d2 0d d3 70 1d c1 d8 3c 26 6e b6 | 77 3b f1 af 93 e8 cc 5f cb 1e 13 01 93 4d 4b b3 | 72 06 cc a6 aa 05 5c 87 d3 9f 0b a2 d6 36 1e 41 | 74 1d 84 0c 84 17 40 09 ae 80 b1 14 f6 05 f4 d7 | 5d 5f bd 62 54 0a 41 03 07 59 f0 77 45 28 e1 78 | 15 ba 85 f9 68 5c c5 ec 72 3c 38 3b 02 ac c0 42 | c6 0b db 17 1d c8 55 9c ae 19 48 78 01 ba db 02 | d5 a9 df ad 4f 67 c1 5c 0b ad 91 db 71 af d7 d7 | 81 9f c3 2e 7e 4d 1a 85 96 12 81 67 a7 1b 56 fa | 29 00 00 24 e8 e3 42 9e a6 0b 6b 38 33 d4 39 b2 | ba a4 24 74 62 c1 99 66 60 77 d8 65 6c a2 d4 f2 | 70 50 e9 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 8a 35 95 f7 6d e2 2a d4 81 0f d3 | 67 1d 3d 86 23 6d 84 2e 00 00 00 1c 00 00 40 05 | 36 30 d8 35 65 36 0c cb 2b 9c c9 7a 14 59 39 58 | c5 b8 4c 54 | libevent_free: release ptr-libevent@0x7fb34c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab7a80 | #237 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 30 a3 80 9f 9f 65 f0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #237 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #237 | rejected packet: | 4f 30 a3 80 9f 9f 65 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #237: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61bd0 | handling event EVENT_RETRANSMIT for parent state #202 | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #202 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #202 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49624.190659; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005283 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab7a80 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #202 | libevent_malloc: new ptr-libevent@0x7fb34c0180b0 size 128 "road-eastnet-nonat-202" #202: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #202) | 98 0c a0 3b 8e c3 04 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 4a de 90 9e 09 12 3c c9 7a 03 ab 1b f1 18 11 | 66 c3 f7 79 15 3a 95 02 ba e1 c3 e1 f6 5a 7b 34 | 8e de 4d 10 9a e1 70 a5 55 9d f4 c1 17 92 7c df | 68 e1 17 a5 99 1c fb 35 b9 25 cd 23 53 a8 26 d2 | b4 87 e9 2f e3 5a ea 45 0a 90 48 f4 6a 56 94 50 | e4 57 95 d6 52 83 af 6a c6 31 70 b1 c4 d3 c8 6b | cf c5 42 e4 73 01 2f be 13 4a 08 6e a7 91 68 14 | ad a5 a0 e4 14 1f a0 f2 00 98 4c ce c7 d5 c0 b6 | 15 77 5c 51 52 78 e1 34 5c df ff 32 7c 7c eb 4c | 74 06 ff d8 24 f4 34 27 4b f7 4d 5c de 29 22 32 | 61 0e 41 b1 a4 d1 44 ff 96 54 64 39 71 47 b7 07 | 8b 2d f1 7b c7 ff 29 67 2b 47 cf 64 2a ba 75 f5 | b7 8f 94 01 0c 73 d3 d0 a0 ca 7b 5c 80 ff e9 5a | df 27 66 99 d5 41 03 93 26 82 2e 43 c1 d3 4e 98 | 2a e1 9f 1a 15 c9 bf 3d d7 73 59 c0 eb c5 7f 3c | 4c 61 b0 05 20 29 0a b9 6b bf 44 e2 c1 1a 84 6d | 29 00 00 24 99 ea 46 58 fc ef 28 85 a0 72 43 c8 | 36 86 2f 35 31 69 ef db 0d c0 f1 46 4d af df db | 48 57 6f 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 23 33 21 68 f3 9f d6 75 73 74 16 | 0f 96 1b 0a 5a 2e 12 b4 00 00 00 1c 00 00 40 05 | 9b b4 ff f5 5e e8 7e 5a 50 28 47 10 22 d7 72 89 | 2b d0 c4 98 | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61bd0 | #202 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 0c a0 3b 8e c3 04 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #202 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #202 | rejected packet: | 98 0c a0 3b 8e c3 04 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #202: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0714 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37000d120 | handling event EVENT_RETRANSMIT for parent state #238 | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #238 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #238 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49624.22746; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.011698 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #238 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 "road-eastnet-nonat-238" #238: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #238) | f6 ab 39 cf c5 7d 06 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af d3 7b 83 d9 03 ff 12 c8 97 56 ab b2 14 10 e0 | 48 f1 3b e3 4f 64 7a 9a 9e ba 3d 1c 59 ad a8 95 | bd 51 64 ba be 30 e1 34 45 a4 34 1f 3e df 3f d6 | 86 b0 59 41 db 94 3d 0d e6 62 59 ee 2c dc c0 b6 | 14 1d 3c ee 48 4c 83 08 18 f6 26 a9 cc aa db a7 | 11 c4 2a 15 e2 1f 73 e6 9e 15 53 88 2a 78 32 86 | e7 60 9e db ba 38 76 7a 13 5c c5 ac fd 1c e1 b3 | d9 b0 34 80 53 e2 98 a7 ba 07 c7 e0 29 79 99 fa | 34 4e 3c 41 8c 32 8f 62 7b 0b 06 3e 96 0f e4 ec | 50 ea 8b 72 ce 3c a2 48 3d 50 a6 bf fa b9 6f 49 | 42 35 90 06 bb 42 36 54 c0 36 66 cb e8 62 33 36 | 54 3c 66 18 ff f4 71 a8 dc 58 87 96 fa c3 1b c5 | dd a8 8d cc aa e7 e2 09 78 51 8e a8 fa 1a ff ca | 8e a6 7b eb 75 ad 7d 26 12 45 b0 78 8a db a7 e1 | 91 4e 5d 71 95 e7 03 95 d9 44 14 28 62 b8 ce bc | 33 38 e8 30 35 30 6f c6 da 40 e4 e4 28 6a f5 3c | 29 00 00 24 e9 54 88 95 a6 38 9d 64 f1 e3 1e dc | e9 d3 25 19 54 a9 08 d5 30 10 d0 0d 46 91 20 94 | d2 ec 4b e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 09 df c5 c7 bf ac 94 7a a2 81 0c | 76 04 c4 df 2b 4d 28 f9 00 00 00 1c 00 00 40 05 | 49 c2 83 19 04 1a b6 87 e7 32 12 a0 0a 0c 4f 92 | e7 02 e1 ed | libevent_free: release ptr-libevent@0x7fb370012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37000d120 | #238 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 ab 39 cf c5 7d 06 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #238 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #238 | rejected packet: | f6 ab 39 cf c5 7d 06 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #238: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0518 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #95 | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #95 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #95 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49624.237749; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006292 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37000d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #95 | libevent_malloc: new ptr-libevent@0x7fb370012840 size 128 "road-eastnet-nonat-95" #95: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #95) | 04 bb 1c 2b 41 e0 8a 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 79 b0 02 7c 1a 3a 07 ca 11 d1 03 7a 77 85 cb | ae ba 70 1b ee 9d e4 3c fb 83 b0 cf 85 ea f6 b1 | 44 27 5d 05 92 dc 5f 4f 10 d0 a1 c9 ef dd c6 ab | ac a1 db c0 15 56 b1 c8 1f 3b 2a 1e 0e 90 2f d7 | 1a 17 b9 f7 eb 61 37 1e 43 cf 9e 15 29 73 84 5a | a5 ef e1 fb 94 7f 43 bb 78 59 95 64 2c 87 b9 4b | 2e 15 ae fc 6c ec ab 40 45 3d 2f f3 c8 00 44 83 | 12 a7 e2 b8 59 bb 92 ce 59 8c ba f6 68 47 32 55 | e8 20 37 e3 3d d3 1b 3c 4e 84 f3 ae 58 53 16 45 | 58 97 74 47 9d a2 44 2f 81 9e ee 5c e8 ce 37 e9 | 5c 14 3e 89 c4 f1 89 ca 70 e0 1d 7a a9 38 f6 40 | 66 fb 41 8c 9b be 2c ea fc cd 2c ca 26 30 dd f0 | b1 29 6c c0 a6 b8 e6 ad e2 7b ae 2b 83 8b e5 9d | 01 26 d8 0c 5a 11 5f 25 a6 3e 25 b6 0f 26 26 34 | 01 b9 a7 4b b7 42 77 99 87 64 20 bd 67 77 cc 7e | b2 79 54 9b 12 25 7f ea ef 16 57 4a f6 24 75 7e | 29 00 00 24 fc b1 a7 58 88 f4 1b 4f aa 0e 2d d3 | a4 65 ca 66 dc 36 b5 47 7f 16 51 11 a3 c3 71 08 | 58 80 43 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ca 3c bb 33 78 12 9a 1b 10 5c d5 8f | d8 1f d4 ad ee 67 79 04 00 00 00 1c 00 00 40 05 | 61 56 68 61 76 b1 38 9f d6 2b 7a dd 4f cb 90 80 | 12 f2 80 83 | libevent_free: release ptr-libevent@0x7fb348009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #95 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 bb 1c 2b 41 e0 8a 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #95 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #95 | rejected packet: | 04 bb 1c 2b 41 e0 8a 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #95: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0594 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35000d120 | handling event EVENT_RETRANSMIT for parent state #203 | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #203 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #203 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49624.270214; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005051 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #203 | libevent_malloc: new ptr-libevent@0x7fb348009640 size 128 "road-eastnet-nonat-203" #203: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #203) | 02 57 d9 3d 13 25 98 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 1c fb 0e 8f 43 ac f5 0b 5f c4 59 e2 84 8d ff | 93 42 c3 e3 19 35 29 34 62 44 7f 8b b9 60 94 1a | 68 20 33 36 7e 07 ef b9 9d 1a c3 c4 e5 e3 be 6f | df 48 47 f9 cf 7a 23 fa b8 b9 0f be e3 51 16 88 | 65 2c 32 42 a7 de 33 7a 8d 00 20 5f 8c 23 cc 9e | fd 93 18 91 08 48 46 f6 9e a4 63 04 36 57 fb 82 | db a9 f0 b9 fc 47 88 c1 af a0 52 b6 f2 77 4a 78 | 7b 45 5f 81 61 4c a8 5c 40 e9 6e 59 e6 65 a5 7d | 8f 67 9e 58 05 f0 0e f3 10 e5 4c 4f bd 20 a3 7c | 88 1e 84 95 b7 f3 51 db 65 68 67 47 f1 73 c2 67 | 48 a3 dc a1 e1 3f e7 d7 4c f9 dc 2e f5 e0 7c 72 | 3d 2f 82 8d c1 ef e8 9c 9c 82 12 27 e5 0a e4 bb | af 79 89 91 83 59 68 9b 2f 98 3b 89 0a 25 be 74 | c0 0f b6 99 3d 8f b4 39 9b 96 c4 d8 6a 5d 53 81 | 43 9d 7a a3 69 c9 61 8c c0 23 f3 33 21 de 95 0e | 53 97 be e9 2a e9 9e 71 b5 e7 b9 2b cb 16 40 76 | 29 00 00 24 ad 22 cd 07 aa fe 98 d8 02 52 a4 3c | 95 12 5a d9 ed 8e 49 c5 19 c8 cb b1 88 c1 88 b9 | c9 3f 70 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 60 71 59 6f 4c 24 43 8a 9c 00 7b | c3 3a 97 05 f3 23 35 42 00 00 00 1c 00 00 40 05 | 0d db 79 a2 0f bb d9 bd 26 88 9d ac d1 d3 87 df | 66 b4 d9 d4 | libevent_free: release ptr-libevent@0x7fb350012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35000d120 | #203 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 57 d9 3d 13 25 98 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #203 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #203 | rejected packet: | 02 57 d9 3d 13 25 98 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #203: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecac0 | handling event EVENT_RETRANSMIT for parent state #239 | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #239 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #239 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49624.32457; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.022079 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35000d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #239 | libevent_malloc: new ptr-libevent@0x7fb350012840 size 128 "road-eastnet-nonat-239" #239: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #239) | b9 4e df 3e 84 90 25 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea ef 5f 41 79 0b fe 19 84 c3 03 27 cb e7 22 b5 | 4b 8d ad 5a dd 57 ea a0 d4 aa e3 61 84 72 47 6a | 4d 42 f7 0c 18 4a 15 88 92 91 45 67 3d 64 ce a8 | f0 3e 2a 18 f5 33 74 78 5b 6d 2d ad 60 68 a7 2c | 42 44 24 a7 49 23 19 0c fa 8d 52 0c 5c f4 c5 65 | 9c 02 7d 4d 52 90 91 ba 69 4d a0 bb 25 6e ec 3a | e9 30 9b 1f f4 e8 ec d1 8d 6a 8c 3f 41 9e 38 b3 | 41 e7 4e 00 b5 c6 ea 1b 8f 24 c7 a8 c4 ec 84 ef | e4 cf 76 d1 2b eb 8f 91 66 1a d6 b3 71 c5 5b 71 | c2 ce 48 72 d6 b0 0f 07 ef 9a 8e fd 8a 44 8d eb | 79 c7 74 c1 a0 f8 4b 78 8d 62 3e 5a d2 f7 58 20 | ab d5 b3 52 66 2e d1 5e a8 11 59 26 5b 03 c4 c7 | 72 cc b1 7b df 43 62 14 05 c3 52 d4 b9 35 c7 18 | ab d1 fe d6 f2 c4 bf d0 34 85 da 05 d8 1c 9e bd | 53 20 10 e1 51 57 70 e6 78 d1 56 9f cf b4 da 8d | 2c 7b cb 52 64 97 83 25 dd f7 88 42 c4 42 ba 2b | 29 00 00 24 60 20 cc a1 fe 49 9c e3 77 c9 2c 1b | 58 3a e0 e5 74 37 cc 08 7f e8 2c 53 5a 76 29 4f | ad de 78 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 5b b0 88 0f ba 91 5e f1 72 ec fe | c8 60 42 a1 68 5e 5f c0 00 00 00 1c 00 00 40 05 | 4c 5b ce 23 3c 60 29 97 fc d7 dc 03 c2 55 73 9c | d8 91 a1 ef | libevent_free: release ptr-libevent@0x7fb3500251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecac0 | #239 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 4e df 3e 84 90 25 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #239 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #239 | rejected packet: | b9 4e df 3e 84 90 25 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #239: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47e90 | handling event EVENT_RETRANSMIT for parent state #96 | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #96 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #96 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49624.342903; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006303 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecac0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #96 | libevent_malloc: new ptr-libevent@0x7fb3500251c0 size 128 "road-eastnet-nonat-96" #96: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #96) | 4d 94 02 39 3c 71 1f ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 27 e8 d9 3b fa 4a fd 06 7e 6c e7 d4 28 0e 9b | df ea 6a b2 fc 9c 70 c8 54 bf db 6f b0 0a 35 03 | f4 08 a8 1f a5 9d 3d d9 36 ba b8 d7 c7 a5 02 b2 | bf b0 56 c5 e8 85 3a 3f 3e 64 27 86 e6 32 36 9e | e3 cb 8f 61 07 7c f1 f7 b9 98 01 dc 75 bf ec 8e | e7 f3 67 03 e1 e0 44 02 7f 11 18 67 70 37 2d 5e | 1b 6f 89 19 20 17 f1 e7 a8 e9 33 cb ea 00 46 56 | 49 ba cc 5d 15 50 da 98 ff 9c 3f 56 7f 50 23 17 | 4f 39 25 c0 2c 24 4b 31 aa 08 bf c3 fa 73 75 f8 | 66 d4 df a2 81 2f b6 b1 85 b3 e1 b9 2c ba cc f0 | 05 a5 8e 76 4a d0 1e 4a 24 c4 b4 b6 c2 9f 5a c8 | d7 f7 62 5f e5 ae 58 69 f5 08 1a e6 3f f8 45 99 | 93 41 5e 16 d1 fa c4 dc dc 43 aa 67 19 5f 0d 6b | d0 93 a7 d0 e0 42 60 37 df bb b8 67 3d be 3f 73 | 01 ab df b7 44 63 b3 2e 2f eb b6 11 c7 6c 12 e1 | 09 64 f6 e9 82 4b 4a d1 f8 5c 86 44 cf 9c 7b 84 | 29 00 00 24 fb b6 a6 14 5d d4 9f d4 3b de f1 45 | f6 4a ea e3 bf d0 33 9e b1 50 af 7d ca 56 7c e5 | 77 5f 83 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 32 ad 1c 75 03 32 df 0c 2b d0 a0 | cb f7 34 b2 23 e4 90 14 00 00 00 1c 00 00 40 05 | 3d 4e a8 fd 45 70 26 15 be c0 96 dc 33 de 8f ea | e2 1a 12 a7 | libevent_free: release ptr-libevent@0x7fb36401f860 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47e90 | #96 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d 94 02 39 3c 71 1f ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #96 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #96 | rejected packet: | 4d 94 02 39 3c 71 1f ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #96: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aacc80 | handling event EVENT_RETRANSMIT for parent state #204 | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #204 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #204 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49624.375282; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.010347 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47e90 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #204 | libevent_malloc: new ptr-libevent@0x7fb36401f860 size 128 "road-eastnet-nonat-204" #204: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #204) | 26 9b 30 ce 1c 69 a2 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 5c 6f c5 e4 37 b5 85 8b 88 c9 38 4a 33 67 e3 | b5 76 e8 6e 58 ca 85 66 b2 6e bc 01 cc 91 d2 fa | e1 db ef 4b 77 17 f5 08 16 0c 8c d0 2e 39 5b 3d | 15 8c a2 f2 d6 7b 21 20 d2 5d b0 fc e4 ac 76 97 | 30 50 2e 26 71 1a 34 95 4e 65 5f 33 21 89 a5 4a | 55 91 fa cb b0 1c 50 2f 03 b1 71 df 7e 93 5d 3f | 83 d0 25 32 6e 4a 7a e8 b7 9c c4 2c bc 70 88 ca | 1a 12 c7 c4 81 cf af 5b 96 ed ff 17 ee ac bf bc | 7e ee e8 ea bf 0e 25 06 f6 11 f2 0c fc 01 f3 a1 | a3 a5 0f 39 3b 0e 4e 24 40 89 5e e7 dc 14 70 db | b0 59 4e 88 e4 58 74 9d 4c 35 67 80 45 58 10 7b | 90 72 ed 6b 8c 09 3f 83 31 52 aa d0 a7 ad e8 5e | 62 2d e8 c2 d2 5f d4 fe 77 1a 24 07 0f a0 1b 7f | b1 31 3d fc 2d 59 58 95 dc 6b 56 ff a8 81 81 ca | bd 63 b1 a6 f3 e4 7a e1 08 85 c1 19 90 12 c0 7e | 58 38 76 3a 98 a3 e6 81 1a a9 a3 c2 1d 81 96 94 | 29 00 00 24 f4 44 35 a4 a3 93 f6 e1 66 d4 43 db | 1b ee 9d af 99 ba 18 1d 96 99 f1 ca 00 4e 65 c8 | 19 9f df 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 dc 32 bc d5 a3 92 90 2d a7 77 26 | 1c 78 dd c4 9b 23 7d 3e 00 00 00 1c 00 00 40 05 | 5b a2 10 3c 9e 91 f8 b5 af bf b9 e6 23 08 5d a3 | 6c 17 22 88 | libevent_free: release ptr-libevent@0x7fb3780407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aacc80 | #204 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 9b 30 ce 1c 69 a2 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #204 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #204 | rejected packet: | 26 9b 30 ce 1c 69 a2 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #204: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0474 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #240 | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #240 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #240 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49624.399569; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.007455 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aacc80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #240 | libevent_malloc: new ptr-libevent@0x7fb3780407f0 size 128 "road-eastnet-nonat-240" #240: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #240) | 52 3d c4 7d aa 75 f9 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 b8 f7 97 d2 8e a4 26 e4 de 50 11 3b 27 c2 bf | 82 42 f8 30 a7 cf e7 f1 22 7e 96 6e 08 55 b8 5b | 99 ce ba b9 bc a4 b9 85 84 1c 35 bd 81 0b 36 0d | b0 03 99 1c 13 93 72 39 72 77 b7 23 f3 36 8a 70 | 77 80 87 4b 02 4d f9 86 a0 7e c1 4d a8 f2 4c 39 | d7 80 8b 66 22 e6 a4 de 4b 09 73 0d 3d 7c b2 2f | 50 8d 5f 1f 57 2a bd 9f ac c8 a9 74 90 54 67 b7 | 8f c8 3d 39 71 39 c6 de 18 02 eb c5 ea 94 b8 db | 08 c3 39 15 f9 0b b0 93 02 0a 8a a7 ec 92 53 e4 | 1e 2b 04 08 46 40 50 55 30 ed 5b e2 89 d0 46 9a | af 8e 24 41 aa aa b9 1a e4 ce 8c fe 9d a8 de b8 | f4 9b 8a 9d 2c 1b bf b8 d5 b4 e2 72 19 89 07 85 | 8b d5 73 d5 4b b2 72 a1 17 f2 16 b2 06 c3 69 10 | 03 64 01 f6 2e ee b3 bb 12 bf 7f 2a 4b 56 f5 04 | 51 3d ee 1a 3c 36 62 a8 15 0b 0b b5 26 c4 ba ef | d2 cb 15 c8 7e 83 38 88 e7 bf 96 1b 07 79 a7 4b | 29 00 00 24 eb a6 92 08 8f 76 ab e5 c4 52 e9 41 | 1d 77 03 c7 35 5c e5 3a 95 58 fe 07 d6 1d ad f0 | 56 12 6d d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 c9 c0 38 06 3a 92 7e a1 78 c0 15 | 6c a9 8e 74 3a a1 8f 67 00 00 00 1c 00 00 40 05 | 56 20 31 94 4b 81 36 39 3c f9 b9 11 bf 66 a1 27 | 0d 62 c5 10 | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #240 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 3d c4 7d aa 75 f9 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #240 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #240 | rejected packet: | 52 3d c4 7d aa 75 f9 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #240: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9f380 | handling event EVENT_RETRANSMIT for parent state #97 | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #97 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #97 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49624.446905; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00668 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #97 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 "road-eastnet-nonat-97" #97: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #97) | 7c 9c 8d d2 c5 3c 3b 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 98 e5 dd bd 5b c0 22 fb 24 a8 9d 4b ca 6c 72 | 78 61 7f 8f 02 15 b8 56 b3 c2 d4 89 90 42 e9 ae | b3 56 28 83 de be c5 dc f3 99 87 bf 7c 20 cf 1e | 80 26 a3 f6 7f d4 66 5c a2 37 d4 2d 88 37 5b ee | 37 eb f6 f3 73 47 4e f2 3e 1b de e1 36 54 bd 6f | 97 78 ce cb 16 0a da 34 fa 11 bc e7 e5 27 11 6b | 72 0d 9c de de 06 66 d8 74 64 a9 64 0b 12 b1 e7 | 15 84 3a 8c d9 6a d5 46 6c 00 4b f9 69 74 47 d1 | f3 79 bc d4 c9 0f 58 86 00 a5 0b 46 4c d7 20 78 | 99 ce 0d 0d cd 99 98 27 cc ce 50 e5 63 fc 25 ec | 4a 78 c1 76 a6 35 df cd 30 8a 57 10 1a b9 c6 85 | f5 05 46 77 76 2a ba 40 b5 da 98 c0 91 e5 03 c9 | 47 7d 79 56 d6 82 48 c6 a2 b4 f6 fc f6 16 30 98 | d9 b0 79 c5 33 a4 80 eb bb 99 51 9a 3b 3b ae a3 | 9b a3 5f 5f ce 23 78 fd 36 29 21 9b 24 8f 30 93 | 1f 0b 71 91 41 28 b6 d5 e2 dd ce 67 83 67 83 41 | 29 00 00 24 4a 40 88 f3 3a ca ff 58 9b 48 04 9a | a8 d0 f5 15 e8 12 b6 3b 4a 95 b2 73 79 da d4 a0 | df 94 6f b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 5b 76 c7 df cc 29 e7 8f 6d d6 7a | e3 d4 c1 e2 a2 33 fe 59 00 00 00 1c 00 00 40 05 | 63 90 91 6f c8 44 50 2a ff 12 5c 17 cd fa e6 2d | 07 cd 17 d6 | libevent_free: release ptr-libevent@0x7fb36402ffd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9f380 | #97 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 9c 8d d2 c5 3c 3b 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #97 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #97 | rejected packet: | 7c 9c 8d d2 c5 3c 3b 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #97: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0662 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47ed0 | handling event EVENT_RETRANSMIT for parent state #241 | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #241 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #241 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49624.483257; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002836 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9f380 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #241 | libevent_malloc: new ptr-libevent@0x7fb36402ffd0 size 128 "road-eastnet-nonat-241" #241: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #241) | ed bf c0 ae d9 fd 74 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 7f 1d 53 5e bf 7c 50 89 9a 1b 66 7a f6 ac 57 | 1e 44 b6 4e f9 ce e0 60 9e 35 82 8c 12 e1 ec 87 | c3 32 1d d0 30 6f 24 b0 84 5b 58 a3 dd 46 7f 56 | 3a fc a0 86 c1 a5 f0 b8 b4 7f c2 24 a0 35 a3 8b | 46 8b ad d0 3a 85 a8 93 6d 92 12 5e c7 60 d3 02 | 9d 48 49 61 d0 53 cf 87 bc ba 4a 86 e9 1d 0e c4 | 8a 55 24 90 50 13 2a fe 86 c6 6d 09 e7 31 26 ca | d2 d8 c1 f1 76 8e 79 98 8c eb 73 50 64 00 6e af | 8a ae f2 36 6c c7 fa cd 65 22 6c 5b 48 98 da 47 | c0 bc 45 31 fc 5e 0f aa b4 b8 1d d3 be 55 8c ba | 12 b5 d1 65 9a 9f 14 76 d4 89 e3 78 f3 26 29 2e | 46 8d 9d 7c 77 7b 47 8f 64 31 0d 93 e5 f5 e2 8f | 76 81 eb ad 7e 90 fd 6f b1 86 5e 11 a2 e7 77 5f | c1 4e 81 30 92 43 c5 b4 66 60 7f 33 52 22 85 c1 | 6f 01 81 ec 5d 5f 91 b7 53 01 fe 18 96 c2 64 e9 | d4 ad d0 b7 b7 a3 ba e1 97 81 a4 d5 9e 61 d0 8e | 29 00 00 24 48 1f 7b 4e 8c 39 27 4c 54 7b 31 27 | 38 83 2b 38 ab a8 0f 41 0e 72 e0 b6 b5 f5 a8 48 | 24 b7 3e 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c d9 59 12 c5 45 19 36 85 eb ed 91 | 74 0a b9 7e c6 b2 17 c0 00 00 00 1c 00 00 40 05 | 8c de 28 49 d8 e8 ba a2 04 93 2a 1c a7 e3 0e 84 | b2 9d 1f bb | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47ed0 | #241 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed bf c0 ae d9 fd 74 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #241 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #241 | rejected packet: | ed bf c0 ae d9 fd 74 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #241: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a30d30 | handling event EVENT_RETRANSMIT for parent state #98 | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #98 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #98 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49624.531604; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007487 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47ed0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #98 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 "road-eastnet-nonat-98" #98: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #98) | 36 f6 17 30 89 34 87 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e de 22 15 b8 37 99 8a 19 60 74 d9 cc fb 93 74 | 46 52 5b 4c b2 15 42 20 b8 92 87 ba 2d f3 d7 43 | b5 37 b0 ea 4d f5 7a 45 62 c7 3f 47 fb 44 64 d3 | e1 f9 e0 4b e7 fb 3e 3d b1 04 53 7b 67 35 99 55 | 77 f9 c2 de 1c 5e 4e 46 02 3b e5 0c e9 31 90 64 | 6e cb e0 dd 1a 59 99 ef 3d a7 c1 9b 74 f9 45 3f | 99 cd de c7 d0 13 5f 2b 11 ac cd ff c9 47 2e 86 | 69 0d e8 ec 31 64 37 7f 01 74 30 f7 db 0e d0 fb | 8b 6d 9d cc 98 7f 1a b4 87 7d bf 2e 19 53 89 24 | 00 4f 0a 93 5d 06 c9 01 d3 dd 9f 4d 48 ee ba 48 | 79 5c 5f f3 cb 01 ba a7 ec 71 ed fd 64 af 41 a6 | ff 80 dd aa 0c ae 06 5c 0b a3 1c 56 84 5b 6c 26 | fd ff b3 07 94 15 1d 68 35 03 8e 60 07 84 12 f9 | ee d9 d1 91 a2 f4 75 f6 9e 29 11 0a 54 bc 2f 41 | 2c ea 22 ab ab 32 6a 0c 62 23 b1 4a 4b 29 bb 22 | de a9 03 f4 17 e0 39 72 79 31 e0 0a 30 fa 14 a0 | 29 00 00 24 dc e2 b9 cb c5 4c 15 ab 06 6c 97 a6 | 72 6b 55 8f 7d 14 aa 13 19 ae 9e 9d 27 a3 3a 17 | 86 0f 7c a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 94 a8 82 2a 1f 7d 1b 29 07 9f 80 | 75 97 d7 a2 ab 24 e8 8d 00 00 00 1c 00 00 40 05 | b8 4f 85 79 77 db f6 74 dd c9 e6 fd e8 91 c3 41 | 66 c0 f7 3b | libevent_free: release ptr-libevent@0x7fb37800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a30d30 | #98 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 f6 17 30 89 34 87 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #98 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #98 | rejected packet: | 36 f6 17 30 89 34 87 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #98: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0758 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a73690 | handling event EVENT_RETRANSMIT for parent state #205 | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #205 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #205 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49624.556349; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.022063 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a30d30 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #205 | libevent_malloc: new ptr-libevent@0x7fb37800cf80 size 128 "road-eastnet-nonat-205" #205: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #205) | 96 a5 4d 09 36 59 36 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 af 72 1b a0 98 9e 50 b5 1c 2a f4 25 37 46 6d | 29 08 48 dc 3a 43 a8 47 58 90 05 63 32 ed 1e 67 | 1c d6 5d a6 5c c9 d2 88 4d 23 9d 29 85 6c bc 34 | b6 39 47 15 78 35 07 0e dc 99 e1 b1 20 70 65 8b | 00 6c f0 e9 44 5b 08 c2 17 e1 6b 72 9c af 6c 5b | a9 60 97 0c ec 66 17 57 bd 76 76 97 27 d0 77 4a | 2a 55 71 50 75 d7 68 7b d8 80 b2 7a 09 02 08 2b | 09 0a ee 89 61 3b 8a 2f 12 7c cc 05 74 ec 11 d1 | 9b a1 09 08 7c 39 7a ee 4d 88 62 16 e2 82 1b b3 | d9 8f 53 7a 4b 48 dd 7d 8c 47 a4 25 61 2b 5a 2a | 2f 93 a5 82 b2 4d a6 fe b3 ac 51 3e da 8f 23 63 | f4 2a 7e 1b 28 f1 63 98 1b 09 f8 46 7c 59 0e 77 | 0b 32 ae 4e 95 8f da e9 a4 30 df 08 42 58 09 74 | 83 d9 4e 39 cd 7e 3b e6 37 1b b5 f8 2d 02 a3 8b | db d0 44 1c b8 65 c5 60 b6 1d bd 0a 87 21 84 61 | fa 21 34 4e 05 0a 9f 1b ec 7d 07 6c c5 18 67 d9 | 29 00 00 24 6c 40 f7 85 3a 61 11 e1 6e 44 7b 14 | a7 18 59 d8 8f ce 04 ee 70 39 7f 15 26 c1 43 92 | dc 05 98 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 dd f4 0a 58 0e d8 12 1e dc 08 fa | c5 ab bd a9 a1 ef e0 c4 00 00 00 1c 00 00 40 05 | 38 8d 68 ba 0f a0 5d 58 b7 93 ab fe 9b f6 26 59 | 71 96 1a e7 | libevent_free: release ptr-libevent@0x7fb34403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a73690 | #205 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 a5 4d 09 36 59 36 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #205 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #205 | rejected packet: | 96 a5 4d 09 36 59 36 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #205: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0697 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7b910 | handling event EVENT_RETRANSMIT for parent state #99 | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #99 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #99 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49624.626734; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006905 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a73690 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #99 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 "road-eastnet-nonat-99" #99: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #99) | 20 f2 8d 71 65 ac 47 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 55 64 d8 ad 81 88 80 21 0e 25 1a b1 6c d3 13 | 60 47 54 9f 37 b3 3b e4 ef 17 20 61 85 67 62 f1 | 02 df 28 57 14 6d e3 be a6 7d d0 60 0f d8 35 56 | 23 d8 87 e9 4a f8 7b 29 e9 15 5f 82 0d 90 dd 56 | 5d 5a 2c 1a fd 14 77 42 8f 36 df a6 c7 9c d4 1a | 4f 67 c2 2e a6 a1 f6 1c 58 4b f8 cb b3 cd ce 08 | 48 62 dd 58 41 3a 14 29 9a 8c dd db 6a 06 47 a4 | 6c b7 ae b7 e4 5d db e5 9d e5 08 8e 17 5b 65 be | 17 aa 8e 73 be 9c 01 fb 31 11 79 f8 7d b5 ee ca | 7b e0 59 52 95 92 4d d8 40 43 34 f1 14 b9 84 18 | 60 68 b3 da 39 48 0e 5b 21 3c 0f 30 5d 85 b9 b8 | 1e e9 36 ff 36 9e aa 51 52 b1 5e 1d 27 fe 89 5d | cd 1e 0d 8d d6 a1 c3 a1 84 3f ea 32 11 45 0d 67 | 3f e2 4b 56 64 56 35 98 b6 f3 83 f0 90 30 0e 75 | b7 c7 9b 32 1d 5c 5f 2d d9 a9 92 93 d5 c6 6e 2b | ba f3 5c d6 20 4b dd 47 18 da e4 05 c0 7c 3e d8 | 29 00 00 24 0e 55 53 da 51 ef 9c 5f c5 b0 f0 9b | 78 63 11 53 43 43 64 d7 34 99 64 b7 14 ad 81 b4 | bb 55 f4 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 cf c4 07 93 b6 10 89 13 8b 25 5a | 5c dd 08 90 5b 56 28 b0 00 00 00 1c 00 00 40 05 | 9d 1e cf 39 e1 37 a4 6a 40 83 a9 41 54 1a 0d 5f | 91 61 32 ea | libevent_free: release ptr-libevent@0x7fb37803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7b910 | #99 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 f2 8d 71 65 ac 47 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #99 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #99 | rejected packet: | 20 f2 8d 71 65 ac 47 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #99: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acab40 | handling event EVENT_RETRANSMIT for parent state #242 | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #242 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #242 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49624.654105; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.011667 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7b910 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #242 | libevent_malloc: new ptr-libevent@0x7fb37803b0b0 size 128 "road-eastnet-nonat-242" #242: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #242) | bb 4d 15 84 4a d1 63 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be b8 bd 73 36 69 de db bd 2c 4d 3f 4c ae 08 43 | b3 f3 d7 53 b9 34 af 4a b1 04 e1 e2 27 f6 b2 b1 | 3e 96 98 76 a6 00 83 11 2e 07 de 5b 47 a6 5a a5 | 8f 0c 87 f8 e6 f5 c8 d5 f0 ce bf 70 a9 e4 7d f9 | c0 99 10 3b ec 9c 30 58 7b 73 32 96 65 b5 9d 37 | 48 ba 52 b0 1b 39 cd 58 16 bc 06 a4 25 89 da 22 | ca c6 85 48 e1 fd 54 81 b4 f6 46 e3 a3 cc 04 fd | ed 22 5b c4 4b c5 12 3d 87 53 9d f3 99 49 26 6d | e0 15 46 62 13 40 fa fc 54 c0 0d bd 54 60 26 93 | aa dc 01 46 3c 92 65 7b 4e 15 bf 35 9f 0d 1e ef | 63 43 fe c2 e1 31 5d 4e e4 23 fe ab 39 17 60 89 | ab b5 9b 1d 6d ed 49 c1 f4 3e 50 67 a1 09 05 d9 | c3 d6 c1 46 1e 9a db 86 ae f2 48 84 9e 9d 6d f5 | 1a 55 ad e2 9f 23 3f a2 29 49 4a 81 a2 25 2b 78 | b3 0b 2d 2a ec 81 b7 72 6f 93 e3 8b ce 4c b6 e9 | 10 ec a2 f6 93 c8 51 54 e2 4d 42 c5 bb 12 0b c1 | 29 00 00 24 43 16 25 02 5f 89 fd c4 95 04 8f 29 | f5 97 17 77 c9 2f ab bf 71 ef e8 74 04 bd c8 92 | df d9 0b 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 dc d6 bb 84 20 bd 3d 97 6d a1 71 | 60 d0 7a 61 e2 12 2c 58 00 00 00 1c 00 00 40 05 | 6c 10 68 84 3a c9 9c f7 49 94 4f 1d 42 c4 e8 ff | 34 65 7d fa | libevent_free: release ptr-libevent@0x7fb37c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab40 | #242 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34800d120 | handling event EVENT_RETRANSMIT for parent state #206 | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #206 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #206 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49624.654298; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00681 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab40 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #206 | libevent_malloc: new ptr-libevent@0x7fb37c03b0b0 size 128 "road-eastnet-nonat-206" #206: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #206) | 01 b3 28 e7 e1 8b 13 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 fa e3 24 f9 a6 bc f3 21 1e 37 1a 6d f4 9a 7b | 77 24 5e 56 24 67 7b 74 f9 64 dc d8 1a b5 59 69 | d9 52 b7 b7 59 74 06 38 08 06 47 89 aa a8 f6 76 | 67 bf d4 4c 77 38 3b a1 63 60 dc 2b e4 fd cd 8b | 9a 4a 0c c7 7b 27 52 84 4e da 22 90 8d d5 51 6e | 00 c5 39 c6 ed 97 f2 c6 62 d9 ba 39 61 32 bb b8 | 11 91 00 ac cd 59 52 93 9f 38 fd 04 59 e4 ef 16 | eb bf 19 45 a5 bc 57 3a 53 a0 af 42 99 76 fa 1f | bd f3 4c 0f c8 d9 db e2 c0 a7 a6 04 31 f7 f9 f3 | 77 5c f7 e0 36 17 0a 5b 7e 68 29 02 15 2c e5 8a | 69 a2 34 36 51 a6 dc bd 4c c4 84 48 fa dd 5f b4 | 73 4d 7d 2b ff 7e df 63 45 9b 17 c7 95 9a 49 c4 | 94 db d0 f3 cd fa 37 d8 ec f4 8c 44 3e 14 f3 a8 | 13 2a dc fa 14 d8 cb 5f 5e 17 3a bf 2d 92 c3 14 | 49 5a 16 33 0a 40 13 9b 4f 56 1a aa ae 2b 43 6f | 7d 54 d1 07 b7 2a 7c 54 16 74 51 00 fd 0a b4 02 | 29 00 00 24 44 53 3f fa 64 f7 0e 35 c1 fb 1d 6e | fa 42 52 34 05 1a a7 3b 67 a9 b1 fa 7a da c7 46 | 65 3a cf a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 ab 21 a3 8f 50 c0 c7 3c cf c9 b6 | d3 91 c9 10 6d b3 85 90 00 00 00 1c 00 00 40 05 | fa 90 51 e6 cc c6 e6 dc b8 75 a7 d9 1e dd 64 0c | e1 7b e8 fe | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800d120 | #206 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 4d 15 84 4a d1 63 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #242 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #242 | rejected packet: | bb 4d 15 84 4a d1 63 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #242: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 b3 28 e7 e1 8b 13 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #206 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #206 | rejected packet: | 01 b3 28 e7 e1 8b 13 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #206: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.054 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abfd80 | handling event EVENT_RETRANSMIT for parent state #100 | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #100 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #100 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49624.710647; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005072 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #100 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 "road-eastnet-nonat-100" #100: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #100) | e4 31 72 ce cb 4c 2e da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 02 70 26 8b f7 4c 10 d5 54 2d e1 56 87 42 60 | 52 43 18 58 d2 c6 63 79 e0 4c 7b 4a 2f b9 0e c8 | b1 65 1d 3e 6c a0 42 98 0c 60 fd b3 4d 30 f1 76 | 5e b7 85 03 42 2b d9 76 75 50 2e c4 69 94 03 7a | 6e c6 23 13 83 28 87 89 db 36 67 01 a4 44 23 73 | e4 b0 04 73 26 bb b0 01 8a 59 be 71 cf 90 5c 3a | 4f 3e 50 e0 98 79 eb 2c 62 ed 3b ff 05 2e f6 81 | 65 38 8c a4 51 39 05 8b 85 23 c5 f6 84 98 62 7d | 1d 2f 44 0d 73 e0 13 c3 51 be 3b 56 26 36 4c 79 | eb bc 2b 5e 2c 37 b2 d5 29 fa 64 f9 de 60 b9 ba | 73 c4 a9 28 1e 62 38 24 9d a3 96 c5 53 73 2c 7d | 0d 39 e6 12 54 ca 75 11 6f 12 17 8e e1 13 5d 45 | 12 9e c5 b7 6a ce 49 b5 ef 7b 55 be 70 ce 3a 18 | d9 f0 2c b9 2c 8a 17 6a 09 a2 d9 96 28 14 14 67 | 3e 3b 41 a6 c6 44 44 f5 69 48 d1 0a 41 9c 30 d6 | 74 2c 38 9d d2 1f 0a f9 85 a8 83 ce dd 7d a1 17 | 29 00 00 24 9b 63 67 5a a5 90 71 08 bf 01 2e 0d | 7a 17 c3 85 da c2 c9 b2 79 84 88 d1 44 e9 43 2f | de e8 87 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb bf 15 80 9f fe 69 e3 a2 7b 53 a0 | 71 05 30 05 2a 8e cb 5a 00 00 00 1c 00 00 40 05 | e0 55 02 95 04 d8 fc 5b b5 ab 42 28 79 3c 3e 17 | 70 aa 5d 58 | libevent_free: release ptr-libevent@0x7fb3380251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abfd80 | #100 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 31 72 ce cb 4c 2e da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #100 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #100 | rejected packet: | e4 31 72 ce cb 4c 2e da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #100: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf00 | handling event EVENT_RETRANSMIT for parent state #207 | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #207 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #207 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49624.780118; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.019592 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abfd80 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #207 | libevent_malloc: new ptr-libevent@0x7fb3380251c0 size 128 "road-eastnet-nonat-207" #207: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #207) | 98 86 9a c8 81 d3 6e e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 59 ae 25 5d aa 28 92 c6 18 2f bc 82 85 c2 3b | ef 2d af ff 7a e6 4d 2d 70 93 a0 de ce 52 57 5f | cf 57 26 3f 1c a7 0f b2 96 d8 25 c6 cb c3 1d 15 | 8e 04 6c c9 e5 de a9 9f 48 ec bf 8a ac af 55 b7 | 16 4e ac b3 75 43 96 89 7c 9a 69 70 08 ac 14 3e | 96 4b 5a 70 2a 29 e5 8b 07 f0 5c cb ed e2 91 b3 | 9b d7 77 9b 28 c0 fb 49 4d 80 b8 6a 5f 4b e2 be | 9f 93 81 d7 4b ea 7b e4 89 24 53 bc a4 06 8a 63 | ae f3 eb f3 e4 35 75 5b 3f a9 62 83 5c be e9 3f | da 2a 80 0c d1 89 a8 df 56 22 c5 4a 79 92 72 a5 | 3c 63 0a 48 54 25 a3 65 43 13 ce a4 3e 09 f7 a7 | 13 60 08 7a 31 57 5f 3e ec 21 89 2d 48 e6 b5 d0 | 55 c4 14 94 07 66 75 e1 7b b7 31 ad 1e 44 cd 2a | 84 8d 3f db f4 29 57 19 60 3f fa 98 86 72 4b e8 | c5 e2 25 d0 6a 0d c6 7c 2e b9 5b 59 7f 50 39 10 | 7f 2b dd a7 68 a0 e6 07 75 6e ff 62 1d 5c 80 75 | 29 00 00 24 e2 c5 0f b4 00 31 2d 18 4e d6 58 87 | 9d 2e 37 b9 b3 22 c5 5a fd 1c 75 2e 4d 23 6a 09 | d6 2f 3b 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 0a 15 af 31 57 a5 69 ec 8c db 25 | c8 27 a9 b0 00 8f 48 7f 00 00 00 1c 00 00 40 05 | af fe 48 1b 76 51 69 26 e1 f2 f5 ea 64 9f 61 35 | 72 2e c3 f3 | libevent_free: release ptr-libevent@0x7fb38402d380 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf00 | #207 spent 0.186 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 86 9a c8 81 d3 6e e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #207 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #207 | rejected packet: | 98 86 9a c8 81 d3 6e e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #207: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.048 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #243 | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #243 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #243 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49624.788474; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00114 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf00 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #243 | libevent_malloc: new ptr-libevent@0x7fb38402d380 size 128 "road-eastnet-nonat-243" #243: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #243) | 39 d2 8c 3c d9 9b d0 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 7c 7b 28 d8 43 9d a6 57 48 f3 56 58 a9 96 02 | 89 eb 92 ba df fe 7c b4 93 87 0a 15 04 96 3d d9 | 97 4f ed fb da 47 e0 91 75 a8 ae 92 a4 07 c6 b2 | 54 7e 3f f7 5a ab 2d 86 ec bf b6 60 fc b0 e0 42 | 42 76 7a 8f aa 4f aa 15 dc 06 c4 c5 a6 64 c4 cb | cc bb 4c d4 38 55 bd b1 4e f2 bf cc 48 b4 72 4f | 87 59 b4 0f 7e ed 03 f1 41 ee a8 6e 5e c8 2d 73 | 30 2b 8d ba 0f 00 07 b3 03 3d 8c 71 2e 4d 64 94 | 7c 2a 25 17 eb 7f f4 7c 3d ac 47 e3 e8 64 b3 1d | 93 52 33 b4 60 d2 91 0a df 53 00 a1 04 e7 82 d1 | ba cb 66 13 49 96 51 fe 75 53 10 a1 e8 ed 85 c1 | 24 57 8f 5c 2d ab 6e 1a d8 d2 18 48 42 bf 96 fc | f2 c5 7f a1 3d 7c 8d 10 dd 4d fc 0c 94 ce 13 b9 | f3 c9 49 d3 a2 9b 04 c3 51 ef 2c 4a 1d 70 85 00 | f9 d1 0e 6b 0b 48 a0 fc 89 8f e7 8e 83 74 57 7a | c9 0c 8d f3 c6 50 96 a3 99 76 7c eb ac 17 30 58 | 29 00 00 24 35 b2 35 5f d9 02 63 3b 19 19 86 78 | 0e 3a e9 6c 99 53 dc 00 7c 7f ad 46 fe dc 4c 82 | 97 17 87 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 31 4b 64 ab 4a 78 81 95 90 fa 46 | 73 84 e5 27 1c 47 ef db 00 00 00 1c 00 00 40 05 | 94 bc 64 25 b1 da 5d db 67 02 68 07 a8 c5 47 cd | f9 c3 f5 ed | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #243 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 39 d2 8c 3c d9 9b d0 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #243 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #243 | rejected packet: | 39 d2 8c 3c d9 9b d0 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #243: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8e0 | handling event EVENT_RETRANSMIT for parent state #101 | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #101 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #101 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49624.807154; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.017425 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #101 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 "road-eastnet-nonat-101" #101: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #101) | a4 e5 70 36 3e 53 78 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 47 67 da db 52 1d 6f 38 4e a0 14 fb a3 22 ee | a5 bd 87 bb f4 50 cd e1 5f f4 bb 7f 5e 01 20 78 | 03 d2 5e e5 f5 4c 45 4d 90 0b ab 1e a9 68 0d a2 | 63 8b 82 0b 63 5a be b1 7a 7f 0a d0 8f 73 00 89 | 01 d6 0d 8e e0 01 de 09 aa b1 2b c9 2a 85 99 3e | e4 12 33 b6 ff a4 02 5b a4 0f a9 0e 49 92 c4 c4 | 91 bb bd cc bc 4e ec 81 b6 b6 b8 9c 4a 4e 40 d2 | 5e b4 c5 bc f7 4c 25 7f b5 8f df 4b 29 de 24 b5 | 99 9e 0e bd 10 eb 77 c5 31 71 d3 38 c7 ae 1b 45 | a1 15 8f 53 f2 46 e1 e0 f3 7d cd 3a fa d7 ce cc | 71 fa 98 05 20 5e 2b 57 e0 1e 93 66 04 94 47 68 | b5 fc da d4 67 d1 27 06 e7 0b 81 26 9b 06 3d 8a | 68 ab 7d 23 5f b3 75 b4 20 05 d5 0a d7 9f 47 f8 | cc 49 2f 28 05 85 5c 22 76 a9 df c7 57 38 c2 59 | 85 34 bf b9 39 30 70 bd fe 4d 41 14 30 36 f4 a7 | a4 75 83 53 e7 c0 5a e0 b5 e5 07 a1 66 16 4d c3 | 29 00 00 24 08 f8 1e 60 51 22 a7 7a 61 74 80 8a | 8a 13 29 1d 07 8a 7f 81 27 3b e2 db 98 17 8f 37 | 46 82 14 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 37 fb 68 83 f3 3a 11 a5 17 fb 1f | 7d e8 ab 39 06 f5 fb 7f 00 00 00 1c 00 00 40 05 | 98 33 35 18 bc 62 08 ee 27 45 3b 5b 93 d4 b0 de | 01 b6 d3 96 | libevent_free: release ptr-libevent@0x7fb3600300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8e0 | #101 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 e5 70 36 3e 53 78 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #101 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #101 | rejected packet: | a4 e5 70 36 3e 53 78 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #101: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #102 | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #102 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #102 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49624.85941; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005842 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1aec0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #102 | libevent_malloc: new ptr-libevent@0x7fb3600300e0 size 128 "road-eastnet-nonat-102" #102: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #102) | 27 a9 08 a7 62 f6 e2 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 3c 29 a0 c9 87 b4 80 a8 37 0b 02 31 7e 05 06 | 02 b7 61 4c 60 0e af ef 4b 5c b9 dc 19 0b 5d d9 | 85 a8 a5 ba 16 2d 92 a5 e8 44 5d 48 48 06 cf a5 | c8 1d 53 0f c9 1c 2d 7b a3 b3 51 75 2d 98 e2 85 | e1 14 fe ce 69 6e ee 85 ba cc ab 6a ed ac 29 a6 | 04 6d ec cb be 61 e5 98 b4 1e dc 38 dc 20 70 bb | 52 99 a2 ac 6c 5b d5 dd f6 c6 54 38 29 d3 1c 88 | 10 77 53 7e af 0b 17 62 42 90 de ab 20 33 28 bc | 91 f7 eb 8f 86 fb 2e 6b 0f 94 c5 1b d9 40 a4 9e | 85 bd 8a 30 d0 a6 6c 09 f4 53 70 9d 11 c9 76 49 | 32 46 6a 4a 93 73 a4 59 28 e7 d5 c6 a2 40 d9 fe | c5 0c 7c 9f 70 ed 22 06 0b e5 2d 6e 16 d1 d2 84 | dd d9 af a3 b3 06 49 42 9f 97 37 00 03 72 48 b5 | 2c 38 f9 d2 b0 86 d6 8d ff f1 cb a6 a2 01 50 8e | d5 f2 44 23 56 23 e0 80 83 60 74 3c 92 0d 5e fb | ab 02 db 75 25 b6 fb 54 b8 2c cc 93 7e 04 7e 47 | 29 00 00 24 02 3b 00 99 07 4d 65 f7 7a c6 71 3b | f3 f6 94 93 e2 10 88 59 58 b9 a5 ba 96 a3 b3 bb | 2e a4 a0 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f0 3d eb e8 fa 43 c6 b4 69 3b f8 | f6 b0 ac 09 3e c3 01 6c 00 00 00 1c 00 00 40 05 | 27 e7 8a b1 d1 bb a4 87 76 d6 0f f9 d8 03 fa 51 | 25 22 7e d6 | libevent_free: release ptr-libevent@0x7fb35803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #102 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 a9 08 a7 62 f6 e2 d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #102 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #102 | rejected packet: | 27 a9 08 a7 62 f6 e2 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #102: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a77850 | handling event EVENT_RETRANSMIT for parent state #208 | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #208 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #208 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49624.886448; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005172 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #208 | libevent_malloc: new ptr-libevent@0x7fb35803b0b0 size 128 "road-eastnet-nonat-208" #208: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #208) | 8f 5c 5f 4e 3a f5 16 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 92 7c 11 dd 8e a5 d7 54 92 a0 06 d5 10 ac 42 | 6b 15 ed 47 e9 69 c6 dc ee be 05 fb f7 98 ca cc | 76 c8 1e 19 2f 4d 8b 90 94 87 44 8e 66 b4 d8 02 | 68 05 60 b8 e3 7d 75 b7 4a 7c ab de a8 fd 41 6e | d6 76 9e 53 12 c0 6c 1d 7a 52 1e 69 01 3b 4b c1 | e7 6b 22 d6 c7 2e 90 0a 6b 5b 89 db 1a 6d af 36 | b5 41 be bc 9c 90 ed 64 78 a2 9b 4a 8f 0d 28 7e | 60 aa 46 05 6e d0 b2 52 c1 92 88 e6 04 b2 49 48 | c1 79 f2 f3 15 c9 58 54 7e a8 48 76 87 71 8d 7e | d5 41 8a 58 60 e1 22 51 b6 c8 da 62 23 cd 7f 72 | ed db 2b 44 40 79 52 36 a1 7b 1f f4 ce 24 ba 47 | 7a c2 df 3d 0b 70 e1 d1 d8 6a b0 33 7a 8b a6 83 | 44 26 40 e1 a6 53 73 33 8b d6 96 05 57 d5 68 55 | da 59 03 a3 8b 2e 16 30 b2 69 8f 5c 37 5b 88 82 | f8 0d 7c f2 a3 34 16 b2 3a a4 64 ba aa 6e 09 cf | de ff 28 7b 22 28 98 ba a1 44 cc d7 e1 ec e2 fc | 29 00 00 24 6d f9 31 58 db 7e 5c 23 da 78 97 04 | 9a 1c fc fa 9f 9f da b9 38 4a 1a f0 e7 71 5f 51 | b4 ee 4f 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 c6 9e d7 bc 34 04 8f 07 db d5 e1 | 11 54 7a 15 87 49 41 6f 00 00 00 1c 00 00 40 05 | da 8d 6c 65 d7 12 37 8a 51 87 98 29 74 33 3a f5 | 86 ee 4b 0a | libevent_free: release ptr-libevent@0x7fb370035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a77850 | #208 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 5c 5f 4e 3a f5 16 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #208 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #208 | rejected packet: | 8f 5c 5f 4e 3a f5 16 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #208: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0712 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa34c0 | handling event EVENT_RETRANSMIT for parent state #103 | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #103 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #103 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49624.935821; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007976 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a77850 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #103 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 "road-eastnet-nonat-103" #103: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #103) | 20 80 ad df 5a 9a 13 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d a9 30 94 a8 d4 ad b7 ab 41 10 cf dd 34 d7 45 | db 9e 99 58 0d 72 d8 74 bd 3c 1d 4a 98 9b ff 38 | 08 61 4e c7 a6 75 c7 cd ff 21 41 e1 5d c2 9d c6 | 7c 47 d1 97 8a 16 0e 0e 3c 96 7a d8 10 82 5b 8a | 00 b3 29 44 ad 13 12 a6 fb af 01 2d 66 5c e1 02 | 4b 01 af e5 ba 61 e3 fe 71 46 2a af 0d 0d 2a 26 | f8 12 e9 10 f0 8f ca f1 fd 82 c7 ea fa 46 02 26 | b6 95 72 2c b1 d7 c7 46 5a e6 4a 07 87 39 fe e7 | c6 a1 7d 2d 52 a4 c7 a2 b5 e7 2f 2b 1d 48 eb d9 | 7c e8 c4 cb da 19 e0 04 20 53 7b 3c 73 86 a7 70 | c7 09 d6 f9 52 be 12 99 31 58 c4 f8 6c 8b 22 3a | c5 da 0c e1 bd 65 73 c3 27 14 e7 0f ae a0 e8 45 | 58 e0 c3 02 1b 48 ee 20 03 b9 0c ec ad e0 21 05 | 1b 38 52 4b dd 92 f0 58 d2 29 eb 4e be 57 49 4d | 5d 0f a4 01 4b 76 95 2b 60 de d3 82 01 e6 15 d8 | 32 f5 60 60 88 d1 83 bc a6 c2 db 62 29 b3 d7 5e | 29 00 00 24 fb ef 9e 44 e4 82 6e 41 3f 46 3a c8 | d1 69 b9 34 c6 14 27 a3 23 52 4c 58 0c 66 b4 10 | 6a d0 69 ee 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 a3 d6 8d 6e 26 8b a3 26 28 d5 ff | 4a 28 a8 bb 6f af 66 22 00 00 00 1c 00 00 40 05 | e5 6e de 91 25 32 b5 3b 38 9d 70 ef 64 14 11 f9 | c0 c1 79 e6 | libevent_free: release ptr-libevent@0x7fb380022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa34c0 | #103 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 80 ad df 5a 9a 13 26 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #103 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #103 | rejected packet: | 20 80 ad df 5a 9a 13 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #103: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0717 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #244 | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #244 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #244 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49624.972548; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004111 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa34c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #244 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 "road-eastnet-nonat-244" #244: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #244) | 4b f1 49 87 f9 a6 76 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 99 c6 ce 30 f7 89 45 59 4d 59 48 bc e8 db b7 | 6e 51 73 db f1 50 f0 84 78 35 a5 96 97 1e cf a2 | ba 46 c2 c3 3c f1 3a 6e 96 bf 5f af 7c b4 86 ff | c1 77 25 46 ad 5b ec 41 ea 88 d5 b2 00 e8 44 78 | 0e 9f 1e 30 ef 44 2c 78 1a e7 51 e7 d9 ad 9d e1 | 0d 69 bb c8 c6 a9 e9 4f 0c d7 5e 29 38 5c 8e e0 | 8e 7c a8 b7 93 d1 97 5f 38 52 c5 7b 09 49 6a 76 | 8a 53 22 ab 09 ab d7 9d 44 f6 cf 05 91 df 27 29 | 68 68 78 b8 7a 10 b4 e5 9b cb 01 8d f1 35 fc c7 | 7f 8f 0c 26 0d 68 38 58 4d f7 b1 9e 96 4e 4d c2 | 24 dc 6f 1f 81 ff 16 30 89 d9 d3 07 46 98 c4 17 | fc 99 c1 d0 c2 70 9e d5 7c 43 6d 12 f3 10 9e 43 | 41 f8 15 2e de ff 3f c8 97 02 5f 67 73 89 79 ac | 6a 34 e1 ed 55 83 46 98 af 4b eb 61 ab ed 9c 2f | 3c d3 92 2f df 77 9f 98 51 e0 24 45 80 51 7a 35 | d5 76 40 ee 59 99 54 8f 46 a1 fc 48 cb 2a 6a 64 | 29 00 00 24 23 47 a6 9f de 30 3b be 65 32 63 50 | 62 d5 89 0b d7 3d ea 19 da 4e 55 f9 53 26 8c d3 | 8a e5 35 df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 5e c3 f3 c5 40 cc e2 50 93 80 f8 | 58 99 fe 09 2c 8c 43 58 00 00 00 1c 00 00 40 05 | 42 a9 a5 4e 6c 3d 71 a6 0f 5e 70 c5 17 4e 52 56 | 03 54 70 77 | libevent_free: release ptr-libevent@0x7fb37802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #244 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b f1 49 87 f9 a6 76 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #244 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #244 | rejected packet: | 4b f1 49 87 f9 a6 76 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #244: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0916 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f2060 | handling event EVENT_RETRANSMIT for parent state #209 | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #209 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #209 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49624.986259; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00951 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #209 | libevent_malloc: new ptr-libevent@0x7fb37802a950 size 128 "road-eastnet-nonat-209" #209: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #209) | 94 c0 53 32 b7 6b d2 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa aa 8f b6 87 c3 5d 98 e8 47 9c 34 3c ba fd c2 | 26 06 ee 61 85 3c e9 e8 7d e0 7a e3 30 dc 26 ae | 92 30 41 01 44 74 f7 33 20 3e 9d c4 91 ce 67 c8 | 16 8f 2d 63 7e 65 88 2d 42 e0 e7 51 27 b9 54 c3 | cb 64 94 8c 44 0b bb aa 89 37 4f 4c 19 3a 97 c2 | a7 78 bb a9 b6 bc c5 9a 0d 18 1b 6f 6c 81 28 5f | 96 22 7f 4e e9 03 4f f8 d6 4d 77 d5 fe b9 d2 6d | cd 7d 32 95 3a ae 28 68 07 70 28 76 ea 67 8a a4 | 02 0f 70 b8 39 d5 ef 06 00 8a 9d f6 62 11 fb 55 | 5d 2a 4e 92 67 d8 83 81 5c e2 b4 e7 58 f2 f1 29 | e2 e9 12 6d a8 99 db 90 fa c3 c7 67 22 60 c4 0d | b5 aa 8e 50 88 98 a0 7e 46 1d 18 c2 ea bc 90 f9 | 2c 89 53 10 11 da ca 7e 79 27 58 0a 97 be f4 b6 | df 47 81 cd fc cb 51 b6 90 69 20 0a b1 64 c6 52 | f3 67 4f b9 89 27 0d 82 44 e6 02 ff 6a 0a a5 77 | bc 54 13 6b 28 ab 23 fb 03 b0 ab d8 e9 7c 16 89 | 29 00 00 24 32 f5 dd 6d be 9b 09 7c 2d 16 66 7c | 9d 31 58 f8 20 f4 30 10 2d 04 04 00 c5 24 46 19 | 07 98 5b 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 be 30 60 49 91 51 94 d8 39 4f be | 6e 81 91 5e 2f 8c 88 7e 00 00 00 1c 00 00 40 05 | 2d 19 47 e1 25 d9 8a e8 d3 7e a2 ad 7d 2a 38 10 | 8b 55 bc a7 | libevent_free: release ptr-libevent@0x7fb340040790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f2060 | #209 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 c0 53 32 b7 6b d2 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #209 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #209 | rejected packet: | 94 c0 53 32 b7 6b d2 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #209: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2f770 | handling event EVENT_RETRANSMIT for parent state #104 | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #104 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #104 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49625.02462; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.014385 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11600 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #104 | libevent_malloc: new ptr-libevent@0x7fb340040790 size 128 "road-eastnet-nonat-104" #104: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #104) | c8 97 67 f1 1b 46 da 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 e4 3d 30 95 de e5 8c 73 da 01 a0 e2 a0 c0 5e | ab 07 43 87 84 24 88 49 ca d1 13 72 cc 7b 38 93 | 5a ab ff 3c 3d d2 b7 a9 16 19 a5 56 5c 01 9f 05 | 2f 70 be 2d 9d 04 2c f7 80 b3 5f 24 70 c4 0d 58 | b9 f4 31 d3 bd 25 62 64 07 37 4c 59 6f a0 74 90 | e2 15 77 64 4c 06 2d 41 bc 70 c3 30 0a 01 9b df | a0 88 42 69 26 57 a1 25 9a c0 ee 4c ee 57 50 5f | 0c 95 2a a5 72 cb d8 81 34 25 75 ee 4d 04 23 27 | e9 da 7c 36 60 32 11 97 39 d8 f4 3f 96 13 6c 72 | 19 1d 43 e4 f0 4a 92 88 29 4c 84 63 63 7d 3a aa | 3f 23 85 5a 73 71 01 2f 63 e6 b3 a0 2d 7f 75 e1 | e9 d4 1c 1a 83 67 2e 29 49 85 8a a1 31 04 a5 31 | 1b e6 35 a4 14 80 ac 17 6c 11 db 3d c3 88 57 d2 | 55 c5 b6 4e 2c 2b 58 d9 50 1f f2 54 b6 50 63 00 | d4 ad 6c 3c 60 cd 52 3b 9b 0f 69 cc f2 8f 29 dc | 29 5e 75 22 60 a0 c9 59 5b 00 1a 98 02 fb 23 0f | 29 00 00 24 16 fd b9 d2 33 64 36 d1 f0 bb fa 0d | d8 4a 7e 7c 2a 2e d1 92 40 9f bf f6 34 ac 7a 15 | 2b 49 c7 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 28 db 0c 20 22 dd ba ac 9b fa 10 | b6 bd 27 81 bf 6a a0 a8 00 00 00 1c 00 00 40 05 | 90 9a 71 02 e5 61 58 ec fb 0f 5f 95 cd f2 2e 99 | e5 4b 54 60 | libevent_free: release ptr-libevent@0x7fb380038370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2f770 | #104 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 97 67 f1 1b 46 da 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #104 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #104 | rejected packet: | c8 97 67 f1 1b 46 da 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #104: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a67330 | handling event EVENT_RETRANSMIT for parent state #210 | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #210 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #210 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49625.060958; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.009019 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11640 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #210 | libevent_malloc: new ptr-libevent@0x7fb380038370 size 128 "road-eastnet-nonat-210" #210: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #210) | aa f0 6c 1e 8f b0 d8 5f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 2f d8 9e b6 32 84 b3 62 ee 33 24 ed 0e fd d4 | fb 0e fa b0 5a fb 4d c1 44 66 ed 6c d9 22 6b 05 | 5a 31 76 75 51 2d 58 63 68 30 79 28 a1 8c f7 58 | 78 1f ed 9b 41 29 7f de 5e 35 7e 32 cc 4f eb 97 | f3 d2 34 17 b1 d4 d0 fd f0 52 da 3a 73 a4 1f 58 | 68 7e 43 79 1c f9 07 46 32 fb 81 59 a1 8b 36 99 | 63 59 69 2b 65 b6 49 f0 2c 89 5f 6f 77 04 35 7e | de cb d9 d5 71 0b 78 b5 5b 65 ab a6 ce 91 19 fa | 51 58 77 c1 4e 94 ff 17 29 dc 29 f8 bd 1c c5 36 | 82 f3 20 0b 04 da 30 59 b0 d1 05 3e 3f aa ef 6a | 84 97 f2 ea a5 27 2e 15 1e f4 66 a5 d9 21 ce 67 | e8 bd 44 de 20 df 28 17 c9 3c 33 10 eb 28 78 7e | 45 57 17 c5 4c aa eb a9 d1 47 13 10 17 f0 99 19 | db 6b d3 97 fa 92 c7 c8 43 99 f3 77 fc f5 56 ad | 75 cc 5d 24 35 8b 29 95 64 a0 e4 4c e0 27 1c 2a | fb fd b3 6d 87 9d 4a e7 f3 e4 fa 49 6c 90 9e db | 29 00 00 24 b7 0e 02 eb 9f 32 9f 45 44 47 90 9f | 97 de 23 e8 e1 c4 97 88 69 d1 3d 46 ce 63 23 0a | 5b 61 d3 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 f2 e2 75 79 7b 92 3c e8 e4 c1 f3 | d5 ae c0 9c c7 8c de 57 00 00 00 1c 00 00 40 05 | a7 24 70 f0 1a 13 21 fc 21 f0 f5 1e 72 fd 1a 35 | c3 6c 26 99 | libevent_free: release ptr-libevent@0x7fb3700300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a67330 | #210 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | aa f0 6c 1e 8f b0 d8 5f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #210 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #210 | rejected packet: | aa f0 6c 1e 8f b0 d8 5f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #210: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.079 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1c490 | handling event EVENT_RETRANSMIT for parent state #105 | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #105 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #105 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49625.097526; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005151 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a67330 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #105 | libevent_malloc: new ptr-libevent@0x7fb3700300e0 size 128 "road-eastnet-nonat-105" #105: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #105) | f1 44 62 e8 b2 96 b0 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 2c 0f 43 7a b6 95 d2 da 02 c7 c3 b7 c1 84 3a | 45 85 a1 11 41 47 db 34 2a fb b4 18 d1 bf ea 06 | 1a 10 f5 e2 f0 2e 22 4f eb 14 58 fa 5c 28 c5 97 | e2 ae 87 b0 f4 b2 19 f2 c0 72 df 2a 2b df 2e 30 | f5 e9 e3 d6 5a 85 fc e6 1c 1c 2d 36 25 55 ff d7 | e9 f8 4f e9 95 2f bf 23 70 c4 27 2f 59 aa 5a d4 | 00 1b f9 ac 9d 1b 73 43 66 d9 a7 24 55 56 33 f4 | df 70 86 46 09 22 db 6f ad cb 9a 9a bd 6e 03 ac | ab d8 ee 40 d0 e9 4f 4e ad 4c 58 0f 93 e2 e1 c8 | a2 ad 19 24 8d ca 10 9a 44 cb e8 b8 40 12 de e1 | 29 64 1e 40 f8 bf aa 87 bb 84 b2 5f 6f 0d 9d b9 | 12 51 1b 65 f4 ee e0 55 a1 dc 96 99 27 5b 4c a9 | 9a e4 cf 90 e8 fa 83 39 ff df 24 19 f2 75 1e b2 | 3a c5 5a ee 20 09 c9 38 60 08 ab 53 42 3f a9 0e | 51 ea 72 b2 25 2b b8 e3 e2 f5 9e 45 c1 0c 4c 33 | 68 83 d9 f1 9b 1b 60 f3 f4 29 c3 90 eb 9c dd 59 | 29 00 00 24 b7 9a f1 29 40 44 aa 07 d6 8e b0 7b | 73 1b 3f b3 0a e3 ed 21 f1 bb 89 35 39 a9 d4 99 | a7 53 6e 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 95 3e 47 a9 bf e3 9c 92 80 50 73 | b0 a9 03 26 40 9a 45 50 00 00 00 1c 00 00 40 05 | c6 93 aa 3b 5e af 6b 75 f9 54 eb f4 c6 61 f4 b6 | b4 32 51 f3 | libevent_free: release ptr-libevent@0x7fb35403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c490 | #105 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f1 44 62 e8 b2 96 b0 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #105 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #105 | rejected packet: | f1 44 62 e8 b2 96 b0 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #105: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0687 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9b1c0 | handling event EVENT_RETRANSMIT for parent state #245 | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #245 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #245 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49625.098438; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003034 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c490 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #245 | libevent_malloc: new ptr-libevent@0x7fb35403b0b0 size 128 "road-eastnet-nonat-245" #245: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #245) | 15 95 fb a9 f3 2d 54 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 07 75 44 62 b4 90 36 f0 1f 9d c1 5d 1b f7 db | 07 17 dd 42 63 05 02 d3 cf 19 39 61 be b0 c7 13 | b1 14 a4 a5 b8 a1 23 ab 35 be c3 4c de 16 3f 73 | 4f a1 df 22 33 3b cb 49 9e 26 36 44 30 39 b1 65 | 42 b6 93 29 4a f4 de 14 94 ba c8 61 f8 84 44 5d | 84 ad c9 32 19 82 79 9b 9b e9 75 42 04 bf 32 59 | 46 4e b6 9b ee 27 62 a3 18 81 ea 6a 95 c0 2b da | f4 8a 3a 0c 58 60 40 77 5e 77 85 02 1a 93 66 69 | 9d df f5 b9 a5 ac 45 4a 0d c0 94 39 1f d8 c9 eb | f6 d6 d7 0e d5 20 a4 de 35 3e cb b1 5a 3e 07 b8 | 15 10 06 8b 76 b5 1a ee 6d 90 d8 56 e7 da d7 5c | f6 12 4e f3 18 b2 7d 97 43 2c 6c d6 56 7e a8 7d | 7a cc 89 83 61 47 f5 78 b4 bb 7a cf 96 f5 41 2c | bd 99 b7 5f 2f 94 22 34 ed af 72 69 47 9d b0 d6 | ba d6 46 d7 20 70 b9 2b 04 c8 60 1d 2d 34 a0 00 | f0 50 7a 8d 2d 98 72 24 0c bf 1e e2 f2 65 16 ca | 29 00 00 24 78 20 60 94 4c f0 10 8a 14 01 4a 36 | 9d 71 3a 32 dc 84 92 f3 9e ca b0 c6 c6 47 0c 0e | 5c 4a 16 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 94 6f 42 13 dc 75 9d 65 6a 04 f1 | 12 0b d5 9b e2 af 9f 6d 00 00 00 1c 00 00 40 05 | dd ae 8a 7b 09 c8 82 03 b9 81 1c f4 27 30 35 7a | 2b 8b 29 2f | libevent_free: release ptr-libevent@0x7fb37402ff60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9b1c0 | #245 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 95 fb a9 f3 2d 54 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #245 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #245 | rejected packet: | 15 95 fb a9 f3 2d 54 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #245: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0584 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0eb30 | handling event EVENT_RETRANSMIT for parent state #106 | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #106 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #106 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49625.182904; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008259 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9b1c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #106 | libevent_malloc: new ptr-libevent@0x7fb37402ff60 size 128 "road-eastnet-nonat-106" #106: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #106) | fe df 65 eb e2 ca b1 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad da 7e a9 45 cb 20 7d e8 1c 81 82 05 64 57 6e | 75 d8 44 d1 29 49 80 30 70 57 33 94 8e d0 1f 14 | bc ae 59 d5 21 a0 94 8f 2c d7 0e ae 64 85 ee 4d | 50 69 c0 d8 4e 47 ef 8f 3a 2d ef b1 7b 6b a7 c8 | 8d 12 00 9d cb 02 d1 fa 1a e5 8c 51 be 6d 05 c8 | be 42 ed 64 5d 5d eb 43 74 14 7b 2e df 96 fd f0 | be d2 f5 e5 50 93 03 3d e5 7a 2c d8 01 5a 9b de | a0 3b d7 ce 9a ef 2b 39 02 de 74 61 50 3b eb 81 | 05 67 4f 23 be 3a 8e 5c be 32 5b 04 eb 4a 0a 52 | c4 c5 a5 9b 90 ef 60 8e e0 0b c4 2e df 2e 03 08 | 7d 0d 7d 77 85 98 9e 4b 28 0a fe 25 1d a7 29 db | 4e a8 1b 4a ee 35 1d 2c ba 8d 50 15 cc 00 fd b8 | 76 4c 44 ae c6 c8 10 0a ab 0a 64 76 0a 4d ee 2e | 50 89 e6 58 b8 26 b4 69 a0 66 8e 81 ad 9d da 80 | f3 00 a8 93 0e 88 6f 79 09 79 fc 16 36 77 35 c1 | 3d 72 2e 00 31 12 9c f8 70 79 c2 64 a5 05 9a 24 | 29 00 00 24 a4 51 db a3 25 2a 8b 08 e6 f6 81 86 | 04 5c da 12 5e 8f 68 4a 8c ec ef 5b e1 08 6f b7 | 57 a9 96 c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 f9 ad bd d7 95 65 27 17 8c 87 a1 | c4 9b a8 f7 4c 6b d7 13 00 00 00 1c 00 00 40 05 | 1a ac 1c ef 71 2b dc a9 6f 07 a5 2c d5 55 fb 6b | d6 5b 32 77 | libevent_free: release ptr-libevent@0x7fb3640406e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0eb30 | #106 spent 0.184 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe df 65 eb e2 ca b1 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #106 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #106 | rejected packet: | fe df 65 eb e2 ca b1 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #106: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0768 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a70b50 | handling event EVENT_RETRANSMIT for parent state #211 | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #211 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #211 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49625.190136; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.014398 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11680 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #211 | libevent_malloc: new ptr-libevent@0x7fb3640406e0 size 128 "road-eastnet-nonat-211" #211: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #211) | 53 9a 08 81 c1 f5 e1 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef 09 3e 48 73 4c 9b c2 57 71 c3 fe a1 82 75 e5 | f2 fc 00 52 66 b2 69 a1 98 d7 a1 43 e2 9d 75 cc | 9d b4 06 fc 88 d6 44 63 90 41 43 c2 45 55 dc 1a | 12 ee 32 35 ef 1c ea 74 ac df 20 43 5d 1c 90 c2 | e0 80 56 a4 79 bd f8 c0 a8 96 3b 25 fa 43 51 16 | 7e ae 16 08 0c ee 53 be c7 29 52 25 44 6d fa 34 | 69 9f 31 ba 70 30 84 e6 d5 99 f5 2e ee 13 fd e4 | 65 1c ef 89 6e 83 29 44 bd 4f 23 ac ed 0f c3 ea | db 20 3d 79 09 22 a5 94 a4 f8 6d ce bf 13 df 61 | d3 3f 02 e7 af bb ce de f0 b1 2a fb 97 3e 5d 05 | 56 5c 13 18 20 58 3e 43 ac b1 9e 74 31 3c 13 bc | 7c 7a 3a eb be df d5 2e e9 60 5f 5a 7e af 73 b1 | 92 1c d6 e2 be f1 a5 75 8e 08 54 b0 2b e1 2c 5a | 6f 54 93 f5 5b 16 d8 ba 78 77 2e f6 39 16 6f 65 | 5e 98 fb 40 29 ab 34 cf 31 b1 1c 43 74 9c 6b 56 | 46 0a 1c e2 58 fe 1e 51 fc 87 18 4b d7 84 46 cc | 29 00 00 24 ac f5 37 f2 09 3e be 57 f0 76 41 01 | 45 fc a2 49 1d 14 8a 0e 25 fc 49 cd 6b 6f 69 01 | e7 4f 36 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 6c d6 1b 30 f3 11 7c 9a 75 f0 de | fa 6c c9 cc a4 62 9e ac 00 00 00 1c 00 00 40 05 | 73 92 bd e7 98 2e a4 8f a5 8d 6a 24 e0 26 ee e5 | ed 8e de 68 | libevent_free: release ptr-libevent@0x7fb35001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b50 | #211 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 9a 08 81 c1 f5 e1 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #211 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #211 | rejected packet: | 53 9a 08 81 c1 f5 e1 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #211: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.077 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad0280 | handling event EVENT_RETRANSMIT for parent state #246 | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #246 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #246 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49625.231505; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00327 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b50 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #246 | libevent_malloc: new ptr-libevent@0x7fb35001d920 size 128 "road-eastnet-nonat-246" #246: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #246) | a0 25 29 39 44 0f 25 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 89 2d 00 d4 20 29 db cd 68 77 f7 b8 f4 ff 24 | 1d 5c 36 95 62 d1 6b 2e 7a df 4b 3c 19 93 58 6c | ce e3 80 e5 ca a3 cf cd d3 d9 a2 b5 58 7c 6c 24 | e1 80 e9 fc d5 84 ae 0d 7e ea e8 9d e7 06 ab 00 | 72 40 cb c2 16 e6 8b f6 4d 5d d8 7e 9f 89 2b e1 | 0d a8 b1 ac 98 7a 10 80 97 71 ec 1f c2 1c 60 a0 | 4a 47 2e 26 d4 f8 3f c5 e0 4a c3 e3 ec a5 f8 3d | e3 be 62 c2 d3 a8 de ed 5f db cd 09 f3 df 3a 1b | 2f ae d7 5b 61 a7 b7 f8 35 c0 11 77 df e4 3c 50 | b9 e3 f0 3f 49 55 b1 46 c2 af 2d 77 f7 83 81 bc | 3d 89 16 cb 06 4f 2b 0b 77 6a cd 08 70 dd b2 5e | 34 34 1a 43 20 61 50 18 62 59 04 5a 1c 76 f2 1a | c5 6a 20 de 8a f0 5f 77 96 4b dc b9 ab a2 15 f3 | e6 86 a6 63 09 55 5d af 9f e1 30 a3 28 2a 95 86 | 24 6f f2 be f6 80 d7 fc 17 1b db 4c 69 eb f3 36 | e3 f0 06 e4 5d c6 62 de 3e 20 88 cc a6 63 59 4c | 29 00 00 24 ac df 8c 0e a5 90 d3 52 1f a2 e9 1c | c5 97 45 07 c2 87 cc 4e 1a 76 e7 94 30 33 9e 66 | b7 ac 45 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec f9 d9 bf 03 4f f2 a2 1a a6 75 4a | e9 f5 fc 17 1c 38 34 10 00 00 00 1c 00 00 40 05 | fd 95 24 c3 10 0c 51 95 0e 6e a3 ad 3b a1 a5 1a | 2c 16 a1 31 | libevent_free: release ptr-libevent@0x7fb37c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad0280 | #246 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 25 29 39 44 0f 25 eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #246 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #246 | rejected packet: | a0 25 29 39 44 0f 25 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #246: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fbb00 | handling event EVENT_RETRANSMIT for parent state #107 | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #107 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #107 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49625.25585; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009562 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad0280 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #107 | libevent_malloc: new ptr-libevent@0x7fb37c035930 size 128 "road-eastnet-nonat-107" #107: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #107) | ac 4e b3 f4 ed 6e 1b 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 73 84 90 b0 a1 c9 25 a6 16 5e 4b 67 ce 07 6b | 92 04 d0 37 9e 07 4b 09 02 c2 78 f5 a4 a2 15 3a | 81 d0 8e e8 00 40 7b 2f 93 05 4b f1 72 7f 82 62 | 11 07 a0 1f 82 07 75 ea 96 ea 88 0b 0d 07 25 f0 | 53 bc 84 a7 a4 75 94 5f 48 4e 4a 60 2b e3 6f 76 | 92 f7 9d 74 6e 3f f1 39 f4 ea a5 df f6 6b e2 19 | 19 b6 60 26 c6 fe d4 1c bc ad 80 f2 46 47 46 93 | 4a da 3f 4a 2e 08 aa d8 dd f9 58 37 f0 1b 68 77 | ce 96 bc c9 19 65 a5 66 67 6f a9 fc 8b f9 e5 15 | 20 ed ca 26 5a cf 00 8e 65 d8 10 df c9 2f 55 c3 | 64 dc 1d 41 fa 8c 1a 44 06 90 c6 59 bf c3 6e 3f | fb f3 89 2e c3 0c 98 20 fe c3 39 08 86 b8 6d 84 | 72 50 7b 56 51 ac 06 e0 20 77 cc 21 04 85 51 fd | 65 1e 59 7f 79 5a a9 9c 4e fa 78 0d d8 f6 cf 3c | cd 73 f9 1e 3d 38 88 98 9e 60 ec bd 06 0d 2d 0c | 39 4f f8 8a 60 2e a2 ac 6c bc 30 73 f0 bc 87 4c | 29 00 00 24 2b ab 2f 68 f7 5a dc 67 d2 bf 24 50 | 1d 74 5b c9 72 db b8 cd 99 25 80 eb 1e bb 50 81 | 94 b2 ae 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 39 55 8e 98 9a a9 9a 86 88 c5 10 | 1f 60 cd 0e 59 85 0d 5e 00 00 00 1c 00 00 40 05 | 18 34 33 25 63 a4 39 e3 ca 5d cd 23 8f 87 c0 51 | 02 99 ff a0 | libevent_free: release ptr-libevent@0x7fb37000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fbb00 | #107 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac 4e b3 f4 ed 6e 1b 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #107 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #107 | rejected packet: | ac 4e b3 f4 ed 6e 1b 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #107: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0702 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23150 | handling event EVENT_RETRANSMIT for parent state #212 | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #212 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #212 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49625.300219; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007674 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fbb00 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #212 | libevent_malloc: new ptr-libevent@0x7fb37000cf80 size 128 "road-eastnet-nonat-212" #212: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #212) | 94 ac 86 b7 f8 83 d4 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 79 5c 0c 28 90 8c ef 02 3c d8 f8 1a 0b d6 b1 | 04 69 40 2f 72 b0 4d 73 12 19 ce 98 f8 6f 0b 9f | b9 13 67 6a 06 b8 41 b4 12 d3 3b 5e 00 45 d7 98 | a9 e1 2d 0a c7 48 98 e8 4f 26 89 26 1d eb 0f 63 | d1 cd 01 b0 ac c0 e6 9c c4 d5 af f4 d2 0a f8 fc | 50 8b 97 23 e0 8c a0 c2 04 25 1e a8 35 a0 f0 95 | 6e 38 07 0c ab 5c e3 d8 94 8f 44 fe f3 fe 9f 14 | 8e b7 78 55 0b 6e 31 2e c3 a7 48 da be 5b b7 47 | 21 9c c6 d3 74 d7 58 d3 13 78 3e ed 28 44 9b 87 | a8 e3 a1 e6 89 b5 03 ef 3b fe d5 17 e8 f9 73 04 | 1c 9e 5a c3 69 56 f2 c1 24 33 17 fd 7d 0d ed e7 | 7d 2c 20 7c 0b 8e 94 c1 2e c1 1b fa 0b 32 e2 6f | 8a b2 5d b4 79 8d 9a 89 ea a8 6f 97 71 92 fa f9 | bc 34 75 15 ab ea 61 f5 3d 74 25 af 37 7b 97 2f | 19 3e 0a b6 c1 50 67 1c b8 51 37 9b 9a b3 26 67 | c4 f2 b4 e7 06 7e 5d 5b 28 22 1e 8e 7e da b7 8b | 29 00 00 24 5c 64 5d 43 88 c1 08 90 f5 2a 0e 23 | 99 a9 ce 32 1e 4e 34 e5 9c b5 04 95 ad 56 32 fb | 31 cf fd 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 0d b1 e5 c0 7d 3f 73 e9 5f 1b 2c | de e5 07 26 54 11 d9 1b 00 00 00 1c 00 00 40 05 | 08 da df 20 35 aa 7d dd ef ff 4a 4d 21 f5 f2 fb | f9 b4 9f 22 | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23150 | #212 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 ac 86 b7 f8 83 d4 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #212 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #212 | rejected packet: | 94 ac 86 b7 f8 83 d4 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #212: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a647d0 | handling event EVENT_RETRANSMIT for parent state #108 | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #108 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #108 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49625.344108; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.012963 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23150 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #108 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 "road-eastnet-nonat-108" #108: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #108) | b6 36 fb 7e 9b 39 08 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 8f 7e 30 55 17 55 d0 7b cc 1e 1e d2 0b 4a cb | f4 10 86 26 73 3d 12 d5 07 43 0f 11 e4 f8 f6 27 | 0b a5 f1 36 07 fc f3 05 3c 23 da bb fc 30 83 87 | 4d 41 58 5e 99 3a a9 ce 46 15 98 87 9b 24 d7 8f | 4b 59 7f b7 31 2a 48 e9 80 ab 05 c8 c6 49 95 79 | 0d 98 4a 2c 3d fe d3 d5 57 7f be e0 6f 80 49 7e | 12 83 14 1f 0d 26 16 aa cd e1 d8 a5 e8 e4 d2 0b | 8c a3 fb db 9a 33 4c 54 d3 db d0 4d 8d 8e a8 6d | 02 98 c7 65 a7 c6 72 0c be 01 bc 52 89 54 3a 59 | 6c 0b 5d c0 31 d7 63 e7 46 02 b3 0a b3 c7 5c de | 0f 7c c0 40 9f a9 b4 60 e4 65 87 1b d1 de 9c 27 | 3d df 5c 7f 27 8d e9 84 86 44 ce 9d 88 43 1a 58 | 28 56 bd 9e df a0 81 8f 79 ba 7e dd 69 15 d8 10 | e7 15 0f da 12 84 35 19 8e 2f 46 d3 83 f4 76 51 | 58 93 90 90 80 38 02 b8 02 db 96 cc e8 5b bf 28 | 0c 19 e8 c4 f6 ae 03 e7 2c 85 d1 50 dc 63 a6 cc | 29 00 00 24 6f 78 95 93 53 4c be 35 be d7 12 7f | aa e5 be 16 ad 5c 36 ac 46 40 9b c8 37 9c 91 65 | 00 a5 4b a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 98 20 9c 05 26 c6 0c 16 0d f3 71 | 8e b0 d2 f3 4f 39 a2 61 00 00 00 1c 00 00 40 05 | 96 4b e6 dc 37 23 61 90 08 5b 41 4a ab 35 e9 fe | 61 65 2c 1d | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a647d0 | #108 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b6 36 fb 7e 9b 39 08 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #108 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #108 | rejected packet: | b6 36 fb 7e 9b 39 08 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #108: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac2900 | handling event EVENT_RETRANSMIT for parent state #247 | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #247 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #247 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49625.358109; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005085 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a647d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #247 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 "road-eastnet-nonat-247" #247: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #247) | 5d 14 02 50 68 e1 05 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 49 8a 2d d4 33 c0 d7 bc cf 08 ab af 13 85 8e | 9a 12 a5 cd 3b 66 31 91 51 03 92 de 96 84 44 92 | 2f 58 74 2e ab 28 ea 0d 4e f8 e3 ae 21 e6 45 c8 | 43 4c d5 50 a9 19 c3 44 67 b2 10 6b 79 6d 94 47 | fa 38 4e 33 78 ee e7 d3 9c 31 e4 3a 0a 97 fc f9 | af cb 80 37 57 a0 1b c2 09 c2 31 8b fc c7 0b 20 | de c6 8f fd b8 6b 84 a5 39 ac f6 54 bc 56 ef 0f | 64 4c b3 c3 15 1d ff 22 52 dd 24 dc a2 84 2b db | e1 cf 6b 7a 77 75 72 44 46 ba 71 64 0d 1e 05 41 | 6b 10 ff 59 ad 5c e4 40 01 51 72 36 a2 b0 08 e3 | a6 82 a9 79 20 45 b1 f4 1e 13 22 a0 f1 4f 23 23 | 9c e9 d5 77 c7 56 3c 45 ca 5c a9 1c b1 68 03 08 | a1 eb f6 b1 e5 5b 6c d6 3f 31 2a ba a0 3e 1f d2 | a5 29 ae bf 59 de 0d b4 a3 d2 df a5 98 9f 76 2c | 4f cf 7a 3e 6d ac 96 b0 e7 e5 ce f6 05 40 9c 9b | 09 66 cd 5d b1 dd cb f0 23 07 ad be 0d 42 b6 2e | 29 00 00 24 ef c2 8a a6 2e c6 51 78 10 63 06 58 | ba ed 73 0f a8 fa 21 72 a3 1c 39 ab 2c 37 74 08 | 1a c5 f7 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 eb f7 f6 58 75 8d be 43 b7 49 b8 | cd 30 58 5c 95 8f b2 8d 00 00 00 1c 00 00 40 05 | 15 66 60 c0 d3 3c e7 68 f4 56 38 e9 31 35 3c 02 | ee cd 1d 4a | libevent_free: release ptr-libevent@0x7fb380027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac2900 | #247 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d 14 02 50 68 e1 05 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #247 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #247 | rejected packet: | 5d 14 02 50 68 e1 05 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #247: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0589 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e7260 | handling event EVENT_RETRANSMIT for parent state #213 | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #213 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #213 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49625.397115; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.016911 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac2900 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #213 | libevent_malloc: new ptr-libevent@0x7fb380027c10 size 128 "road-eastnet-nonat-213" #213: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #213) | 4a f6 d6 f4 f7 c1 a9 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 87 92 0f fd 56 61 cf 88 27 07 68 fb 27 94 14 | ab 6f 99 e6 75 dc 26 2f 1e 93 7a c8 7f ed e5 7d | 6b b9 9d 92 4b e7 28 92 86 1e 95 f5 3a f0 df 50 | 69 19 a3 90 28 b6 f5 2d 21 d9 e8 a3 e1 5b a3 90 | 3f a9 b0 a1 2a 68 b5 63 77 3b aa 0b 6a 92 36 d6 | 32 61 b7 e6 8e cd 51 f2 78 e2 77 58 13 92 00 bb | 90 bd cb b3 98 f4 c1 b4 f9 bd 9c 07 84 cd 8b 44 | 56 64 bd 56 88 30 16 b1 de 15 4b 10 e0 33 82 0c | 53 be e7 f5 bb 24 10 e7 6d a3 b2 a5 08 f8 45 52 | 21 5c 7f a2 a6 ba 7c c6 84 2d 67 10 b4 86 8f 9c | f0 28 12 88 fb c8 52 6a e2 26 a6 a9 6d 8d 51 de | 96 9d d4 31 fb 52 b9 5a 75 dd 19 ef dd 61 8f 1b | 4b 84 99 e3 45 d4 ee 63 d4 75 8b e1 c7 c9 46 a5 | 75 72 66 74 64 ad ff 53 8e cd 6a 8d e1 aa 8b e0 | 68 cf 60 1e 6d 53 aa b5 21 a7 9f 74 3a 51 a3 ac | e3 62 94 51 c3 8c 9b b8 34 1f 9f 73 40 9a 49 cb | 29 00 00 24 b5 56 f5 24 67 7b ee bc b9 fe c7 48 | 4d 15 0a a4 8c 8b d0 3d 4d d5 8d 67 be 58 a4 6d | 51 fe 0b 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 44 29 1f 54 8d f8 98 7c 02 ef 5a | ae 02 c1 10 4c 75 c9 6b 00 00 00 1c 00 00 40 05 | bc 12 92 95 d4 1b f9 ad 5d 6a 71 41 82 c9 bd c2 | 29 69 a1 81 | libevent_free: release ptr-libevent@0x7fb370046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e7260 | #213 spent 0.183 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a f6 d6 f4 f7 c1 a9 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #213 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #213 | rejected packet: | 4a f6 d6 f4 f7 c1 a9 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #213: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0761 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45350 | handling event EVENT_RETRANSMIT for parent state #109 | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #109 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #109 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49625.412521; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005808 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad4340 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #109 | libevent_malloc: new ptr-libevent@0x7fb370046040 size 128 "road-eastnet-nonat-109" #109: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #109) | 53 c2 aa ad 50 91 d9 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 1a 23 bb a3 ce 6a 0d 92 7a aa 8d 69 c7 99 27 | db f2 23 5c cd 5e 2d f6 c4 13 c1 c7 87 46 ed 75 | d8 b9 55 72 40 32 53 f1 21 db f3 6d 45 6a d9 b4 | 9c 06 b1 28 c5 00 1e e2 70 2c 2a 1a f0 fa 65 1b | a8 db b9 2c 83 95 23 c4 4d 60 4b a3 fc 58 c6 c8 | a8 b0 c1 e8 32 2c d3 70 a2 4d cb c8 7c 80 17 90 | c1 c1 fd 82 03 1f 32 d8 5e cd ad 60 ce c1 24 ab | 82 68 88 db 79 b3 aa 37 ff 36 d4 a3 82 06 b7 59 | 0c 4c 61 6f 22 1c 48 b3 94 8b 71 14 8f 57 c8 03 | 31 41 b9 e3 a9 ea 8f 4d 51 15 4a 4c 5f 30 c2 c4 | 40 3e 6a 9e 7d 33 6d fb 91 1c b2 be 1e 33 35 f6 | 1a db ff 1e 8c 4e e8 12 71 d7 94 88 49 d8 37 d9 | cb 52 5b 22 87 0a c9 2f a4 1d 52 36 85 74 38 7e | de e2 44 79 f2 36 18 5e 82 cf d4 fb db 3f c9 35 | 36 d8 7b 5d 04 fb fa a4 fe b5 87 c5 e7 4e 90 d6 | 9f 17 87 48 32 5d ec 5c f7 e6 e2 39 17 1c 9c 2a | 29 00 00 24 8f bd ba cb 6b fc de c1 80 b9 fe c3 | b3 e0 ad b2 e9 fa 37 77 43 04 c6 81 1a 91 41 eb | 20 40 b9 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f d2 7c ae 7e 39 2b fb 54 2c 44 94 | 2e c2 37 67 8d e5 fe 8b 00 00 00 1c 00 00 40 05 | 12 b6 58 87 f0 a8 b9 d4 aa ae 6f 5a ed df 76 d7 | 1d 86 02 2c | libevent_free: release ptr-libevent@0x7fb37c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45350 | #109 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 c2 aa ad 50 91 d9 00 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #109 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #109 | rejected packet: | 53 c2 aa ad 50 91 d9 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #109: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5af90 | handling event EVENT_RETRANSMIT for parent state #248 | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #248 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #248 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49625.475114; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.010678 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45350 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #248 | libevent_malloc: new ptr-libevent@0x7fb37c01d920 size 128 "road-eastnet-nonat-248" #248: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #248) | 0a 60 4f 04 ec 5d f9 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b 96 4e 6b 1a 47 f3 29 f4 97 63 43 e3 c7 7c c2 | b5 40 35 82 f8 ae 61 14 ae 37 68 84 b3 6c 17 bd | e2 38 fa 08 01 a0 06 e7 9f 6c ca f7 e0 61 70 92 | 35 69 98 cb 13 b9 35 de 14 7b 48 01 ca 16 d2 a3 | 8a 8d f7 e5 16 28 68 18 42 b1 0f f2 66 75 2f 1f | 92 e4 b0 69 36 a2 b4 75 60 ca a5 a2 69 6d e6 5d | 46 24 17 68 8a bc 97 e8 9e ee 7a 06 d8 89 ea da | 29 95 98 02 98 06 f1 21 8f de de a8 b1 db 6b e4 | 16 54 6a d8 f1 bf 06 c3 2a de 4c 0f 1e 69 c7 60 | 71 82 15 35 09 a6 80 73 54 ab 5a 82 af 1b da 3b | c5 0a 69 1d 72 1d bd 02 fa 14 6a b4 37 14 ab b1 | 6c ef 68 fb 08 a8 b0 c6 58 93 07 45 93 1f 0d 53 | 5a 7c 44 c6 e8 cb d0 e7 6c 54 5d c1 89 3a e8 2b | e2 33 79 6e fa fd a1 8c dd 41 32 f8 12 7c 52 d0 | ef b1 cc 9f e3 23 da b6 ea 6c dc 48 7a 7e 45 73 | a1 ca 75 fd a6 b2 28 b4 4d de 48 05 30 76 df f1 | 29 00 00 24 da d0 88 5b 97 8e 08 a8 b2 aa 35 1a | a0 f5 0d fa 05 bb 67 43 a9 98 40 73 a9 62 0f f1 | 91 cf ba 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 42 31 df 79 b8 d9 7f 21 24 fd aa | 74 f3 12 b0 e3 0d 96 52 00 00 00 1c 00 00 40 05 | 1d 11 c7 78 91 0f ef bb 0b 1a 85 c0 59 35 e2 cd | c1 30 49 b7 | libevent_free: release ptr-libevent@0x7fb35801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5af90 | #248 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #214 | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #214 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #214 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49625.475315; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005821 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5af90 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #214 | libevent_malloc: new ptr-libevent@0x7fb35801d920 size 128 "road-eastnet-nonat-214" #214: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #214) | 4f 29 16 ab 3e 1b 1d 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 9a ad a4 54 39 e9 04 15 a2 a4 f0 c8 dc 49 94 | 47 5a 04 64 04 57 79 8f 63 87 e7 ae b7 39 62 ec | 47 13 85 3d 4e a0 14 32 15 25 a6 7d a4 f2 aa aa | 67 17 a5 b2 08 db fc bd dc 96 aa 21 e7 a5 f2 3b | 34 82 35 14 fb 4a be 16 a9 a7 92 42 29 b2 17 4d | 52 27 87 ea b1 3a fa 6c 11 62 48 2f 81 f0 58 f6 | 6c 8b 54 c6 3c a7 1a eb fd 0e 51 2e 43 a1 67 7f | 52 b6 51 7f f1 6a 5e 3d a1 55 84 4d aa 64 fa dd | d4 68 19 0a 1c f1 aa ed d1 aa 12 27 11 44 c1 42 | 4c 3e ce c4 42 e7 8a 9f 52 d8 86 65 33 7c 9a 6a | ee 61 16 79 e0 6f bf 94 55 b9 32 ad 6e 68 90 17 | bb 0e f5 75 b4 7f bb 34 59 92 4e 2a eb db ac 26 | 62 0d 79 8b 29 38 a9 d3 9a dc 81 9e 5b 01 b1 77 | b2 97 be 93 40 8c 22 a8 ed c3 3b 34 e3 61 26 ff | 40 f0 34 c1 02 20 28 94 a9 ac e5 14 88 22 c0 0f | 0a ad af f1 ac 83 5f 84 02 43 33 bf d4 08 dc 06 | 29 00 00 24 dc 16 0d 02 e8 ab 94 84 4c 26 85 d4 | 77 69 31 1b 43 d5 c1 b1 2c a0 69 25 59 ad 36 b7 | 5c 40 16 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 ae d6 cb 98 74 13 91 af 99 ac 97 | 02 1b 9a 5a 71 bb 20 28 00 00 00 1c 00 00 40 05 | 20 56 0b 1b ec fa 37 e0 47 28 94 e0 2b 28 be ff | 21 7d 56 5a | libevent_free: release ptr-libevent@0x7fb35c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #214 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0a 60 4f 04 ec 5d f9 e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #248 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #248 | rejected packet: | 0a 60 4f 04 ec 5d f9 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #248: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0706 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 29 16 ab 3e 1b 1d 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #214 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #214 | rejected packet: | 4f 29 16 ab 3e 1b 1d 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #214: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0649 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #110 | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #110 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #110 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49625.517381; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007607 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #110 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 "road-eastnet-nonat-110" #110: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #110) | 3a df d4 0d 3f 72 b9 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 51 e2 9f 86 58 b1 8c 95 ac 68 08 4c 4a f6 70 | ad a1 89 82 51 9f 97 f7 49 8c 33 6b 14 6a e8 d8 | 5d 56 92 c8 3c 2c 40 17 32 2d 8f e8 79 30 ee 40 | f9 ba 9e a6 39 a8 9f 6a 60 30 36 fa 91 73 4e bf | e6 d5 bf ce 9d 89 72 4d e1 c3 4f 68 a3 0e 2d 22 | 55 9f 70 0b d2 5a 8e 49 bb 26 55 db 7b 06 39 59 | 26 09 73 11 d4 24 0c 12 fd 4f 4c 65 6c 3c af 90 | 8b 17 1f a8 52 96 38 96 91 03 13 81 89 15 d8 cf | 89 39 0b 98 8d cb b9 22 57 8d d7 cd 73 bd 42 b5 | c1 8a b1 55 88 ee 90 bf 86 98 c5 68 56 01 34 02 | ea ea cd ee 0d 3a 71 7c d0 06 82 a7 ca 34 05 ec | e1 16 4c 22 f3 b3 ca 01 1c d1 2d c9 10 65 0e d7 | 83 4d bc 53 a1 a2 68 8a 44 da c7 16 6f 1e 28 70 | e8 f3 08 87 27 18 70 75 bc 4e bd 4f 1d 1a 9f 84 | ef 78 e6 04 c6 13 ce e5 f8 3c cb 1e ba 12 8a 0a | 59 36 fd 3c 70 1f 1b ce d5 b3 7d ea 00 09 cd 9d | 29 00 00 24 58 d9 16 9f 6f 84 74 3f e6 2f bd ae | 97 8a 68 2c 39 11 78 2c 3d 3c 5e 7b f6 a4 c9 df | f7 87 68 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f6 22 5f bf 4c e5 cb 6e 52 c3 e8 | bb 73 1b e3 52 cd b5 da 00 00 00 1c 00 00 40 05 | 55 f2 83 9d d0 ff 8f 70 ef 45 0c 6f 49 6d a9 68 | 5e 51 a7 34 | libevent_free: release ptr-libevent@0x7fb34002a900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | #110 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a df d4 0d 3f 72 b9 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #110 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #110 | rejected packet: | 3a df d4 0d 3f 72 b9 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #110: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0586 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f4be0 | handling event EVENT_RETRANSMIT for parent state #215 | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #215 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #215 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49625.55788; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004693 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #215 | libevent_malloc: new ptr-libevent@0x7fb34002a900 size 128 "road-eastnet-nonat-215" #215: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #215) | c5 c0 dd cc b6 af 51 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 5c 66 6c 45 6f a8 d2 4f 25 98 20 11 a6 a1 bb | 37 55 34 73 15 5d a4 49 35 cd f6 0a 9e e7 f3 5c | ad 42 56 ef b0 f4 fa f6 d5 ba 84 d6 dc e0 5f 55 | dc 55 56 f2 be 03 fe 4f 4a b4 66 3c 99 cb 71 e7 | b6 73 b2 44 ce 0d f7 96 90 78 2f 50 92 28 ba f9 | 22 e7 15 cf fa c8 47 f5 0c 38 c1 8a 24 5b 39 a8 | ac 47 31 ea aa c2 b1 57 78 79 5e 0b a7 a0 33 1b | 86 d9 45 31 c0 29 bb 67 d1 68 a7 f5 10 84 25 ff | 4c 83 f7 42 1d c4 e6 b7 53 b1 ed 6d 1b f7 86 9b | 3e cc 2d ee 22 b8 61 e0 e7 95 7c e8 c8 d8 b2 10 | 06 d9 50 52 8e 07 0b 4b 94 83 c7 4b 90 09 3a d9 | 8a 35 2d 83 36 bb 75 45 45 1c cf c0 11 7f 85 8d | ec e0 a4 ca 58 99 97 8b 10 af 58 2d b7 9b a7 f0 | a5 cb ea 38 04 fe 36 b9 b4 81 1d 8f 85 c7 76 a8 | d9 30 86 6d bd 32 3b 6b 02 28 ec 10 b1 28 43 17 | 56 d4 9e 0c 76 ce cc 71 e8 70 44 59 5e b3 3a a2 | 29 00 00 24 21 81 d6 ee 95 75 07 f2 b0 ff 0f d3 | a2 c0 2b d7 de b5 1b 67 08 ca 6e a7 a2 d0 6b ed | 6d c9 d5 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c 19 de 62 93 d0 a4 3d 26 c7 25 16 | 8c 72 93 29 4a 06 74 1d 00 00 00 1c 00 00 40 05 | 5e 68 d5 fe 16 1c 49 30 75 2d c6 7b 65 a2 b6 24 | 10 76 bd 1f | libevent_free: release ptr-libevent@0x7fb37002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f4be0 | #215 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 c0 dd cc b6 af 51 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #215 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #215 | rejected packet: | c5 c0 dd cc b6 af 51 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #215: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28ab0 | handling event EVENT_RETRANSMIT for parent state #249 | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #249 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #249 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49625.565591; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.008575 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad4380 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #249 | libevent_malloc: new ptr-libevent@0x7fb37002a950 size 128 "road-eastnet-nonat-249" #249: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #249) | ad 80 10 70 da e5 b7 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 1c 07 0c da 8a af 5e 89 e6 75 e4 e2 6b 94 81 | 88 bb cc 32 0e 51 16 82 66 1f 3f 42 b2 39 20 4f | 72 37 07 9a fd 40 87 70 79 6c 98 3b 3f ae 9c 8b | ce 68 05 66 50 64 85 b6 97 7b 54 39 f1 30 aa a3 | 04 6c 7c 88 ec 3c d1 1c d3 b4 4e a1 ee ab a5 d5 | 77 d7 c7 96 43 3f c9 ba 18 4d e2 bf ce 40 6d b9 | 2e 6f 43 a4 09 5e 6a 0a 57 fe 2f e8 72 ab e9 6e | d3 23 65 2e 56 3d 4f 3b 55 96 b0 62 91 f8 d1 e0 | 2e e0 00 1a 25 63 9c 6e 63 ad 31 ed ac d2 4b 58 | e3 5c 40 70 04 55 4c 39 0d 41 92 a2 3d 54 25 26 | d7 ef 2a e6 88 54 16 3c 17 a5 5d ae da e8 b9 49 | 9e f9 ac d6 d0 b5 d1 4c 32 7f 53 80 13 ce 13 ff | c1 9e 7b 3a 03 2e b8 d1 5e 50 be f8 6c db 78 af | c8 42 2d 25 43 1f 70 34 56 a4 16 57 bf 31 c6 30 | d5 f1 f9 72 d0 f9 83 35 68 6b 2a 69 4e 20 b1 d3 | f4 3c 9d 15 41 2d 80 5e c6 a3 cc c1 23 a7 f8 c0 | 29 00 00 24 cf 2f e4 f6 cd 34 13 11 b4 5d 4f e0 | 11 dc f5 73 81 ae 1d 25 a9 7b e9 47 0f d3 b0 6c | 5e dc e5 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 3d 29 fe a9 de 26 71 da 28 d8 ce | 9c 91 f7 26 3e 7d 46 03 00 00 00 1c 00 00 40 05 | 93 a3 dc d9 83 9b 6f 85 6e d1 32 ad 49 d5 89 75 | f9 55 83 e1 | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28ab0 | #249 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 80 10 70 da e5 b7 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #249 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #249 | rejected packet: | ad 80 10 70 da e5 b7 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #249: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0603 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cbd0 | handling event EVENT_RETRANSMIT for parent state #111 | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #111 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #111 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49625.585926; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006522 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28ab0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #111 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 "road-eastnet-nonat-111" #111: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #111) | db b9 51 1a 0a cf 53 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 96 48 dc 9a 43 6a d5 ae 03 52 b4 84 8e 3e 89 | 00 f6 64 fe 26 5b b6 db 11 e1 9c 06 8a 4f 1d 0d | cd 6f a7 c8 64 23 7a a7 23 6f 45 51 c6 b1 a2 cd | 04 59 b4 88 b4 33 b7 f5 29 c7 d8 52 6d 1c cb a8 | 42 75 af 22 25 ca 35 12 a4 f6 ac 0c 2b 80 3f 01 | bd fa ce f1 3e 58 78 41 9a d7 72 cc 7c 4c b5 a2 | 56 ce 00 40 9d 2a 87 6a d3 b8 b7 fb 45 19 d9 27 | 33 38 86 30 4d 76 55 5a 60 ea 7e 6f 94 b2 e8 37 | d0 79 a6 3c 48 bb 9f d4 de 11 46 70 8b ed 34 0e | 15 56 a1 c3 7c 1c f5 7b 9a 67 eb 7c ed e1 17 20 | 66 f5 ab 00 0b 09 22 9e 86 9e ea d1 22 bb 69 09 | 19 11 1b ae 5d 6f a7 6f aa f4 bc 2d bf a0 df 13 | 3d bb c4 b2 54 23 e0 47 22 8c a9 37 14 2d 77 13 | 46 7b e2 07 7c 12 26 7e 27 76 b7 f9 5b 81 4d b4 | 81 97 8e fa 60 cb 4d fd c3 c9 15 c0 dd 03 c9 a5 | 4e ed a7 b5 aa a5 47 31 bc c5 72 e4 a7 3b 8a 6d | 29 00 00 24 dd ff c8 1b e8 28 de a6 83 fb aa 57 | 7e 6e 8e c5 12 ea 53 ce c6 ab e5 e4 50 89 14 5a | d7 45 05 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 7b fa 07 36 ff 6e 35 97 9c d7 f0 | 58 a3 9d ce 15 df 78 68 00 00 00 1c 00 00 40 05 | 32 ea 3f b0 b0 6d 1e bd 58 89 67 45 00 2c 5a 38 | ea f9 ac 8b | libevent_free: release ptr-libevent@0x7fb3400250b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cbd0 | #111 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db b9 51 1a 0a cf 53 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #111 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #111 | rejected packet: | db b9 51 1a 0a cf 53 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #111: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0671 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c780 | handling event EVENT_RETRANSMIT for parent state #112 | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #112 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #112 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49625.64931; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009504 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cbd0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #112 | libevent_malloc: new ptr-libevent@0x7fb3400250b0 size 128 "road-eastnet-nonat-112" #112: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #112) | 47 d5 03 db 13 27 2f b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 0e 6c 25 08 df e6 da 49 14 54 03 50 04 cf 48 | 95 75 ae 2d bc 03 6f 48 b8 d7 01 38 b0 30 90 fc | ff e3 c7 81 96 6b 61 34 0c 60 d4 12 f5 e2 2d fc | 51 c2 f0 8d 66 50 fb 99 8e e7 b2 7a 6c 96 47 68 | b2 95 cc 13 0e 51 31 7d 67 b6 95 35 7a 36 fb 65 | 99 b0 0f 89 29 13 5d 90 12 37 2d 11 35 2d b1 44 | 94 62 9d e9 25 b3 9d a0 a4 a6 21 f1 2f 1e cd 7c | e1 45 a8 9a 87 d2 53 e3 a2 32 e1 24 cf d4 84 b6 | d5 f2 14 94 09 c7 86 4b f6 5c 13 c3 cd 16 8e 96 | 09 f6 db 84 7c 68 6c 48 a7 94 92 3a 1f dd 75 5e | 2c 36 f1 6f 81 03 42 93 73 6d a8 a1 de b3 ee 78 | 53 dc 84 4e 49 9c c8 3c d2 8e 9e 10 6c e7 28 b0 | 11 a3 fb e6 6e 4d e5 e0 87 56 00 b9 8b bd 7a 34 | c7 01 93 2c df ea 24 e3 c0 b7 3c 4f 9c fd 99 11 | 44 90 bc 5c 8f 0c c6 10 b3 66 24 ea 61 81 fc 7a | 33 5f 5b b7 cd 2f 8e 95 d1 b4 0b d4 4c f2 ce 45 | 29 00 00 24 e0 34 a3 40 45 a9 39 5f c9 a9 a0 f5 | 90 bc 5f 96 21 2e 5a ab 31 ef 27 59 8c 9d b8 53 | c4 51 4a f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 19 b7 b4 22 31 1f 00 af ac cd cc | 10 5d a8 e7 0a 7e 75 3d 00 00 00 1c 00 00 40 05 | 93 2a 52 65 d2 92 1c 7e fa c3 8c df bd 81 85 07 | 8f 9c 4c 85 | libevent_free: release ptr-libevent@0x7fb3480300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c780 | #112 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 d5 03 db 13 27 2f b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #112 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #112 | rejected packet: | 47 d5 03 db 13 27 2f b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #112: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0728 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #216 | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #216 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #216 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49625.651679; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.009801 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c780 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #216 | libevent_malloc: new ptr-libevent@0x7fb3480300e0 size 128 "road-eastnet-nonat-216" #216: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #216) | e7 ef a7 cc e6 d3 f6 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 f0 d1 10 02 25 ff 09 54 9a 27 0a d6 e1 75 e9 | 4b 25 09 80 13 1a bd 53 71 22 e7 a5 75 81 d1 8a | 25 47 40 c6 b3 5d 03 6d 9e 83 d1 92 a9 46 5d 4b | 0d 28 c0 ae 0f 26 63 48 22 7d dc 47 5b d5 77 07 | 29 79 06 04 6b 6b 34 8f 3e bd d3 ec 63 f9 78 20 | 47 7a 08 c2 44 b5 60 c5 73 9a 3e 6a 29 e5 d6 96 | 62 d8 90 b5 3b c6 8d 28 1b e2 87 89 6b 14 69 c3 | 86 f7 90 a6 77 5f 07 46 5b 86 a4 37 e5 80 d5 e7 | e9 b6 1c 3b fa 48 83 e6 86 71 bb 22 3d c4 ff 70 | 08 57 53 75 69 80 73 34 3e 38 54 52 61 ad 52 b2 | 0c fc ac 12 69 16 4e 5c 14 e0 22 a5 7c 1b 1c 49 | 5d 41 d4 29 4c a2 8d 47 62 eb 64 7a 68 a3 77 fb | 8e a3 71 52 dc 60 0e ae 77 65 2b 4f c0 c2 80 7f | 93 d4 83 22 60 eb f0 ba 08 6e ef a3 c7 ae 6d c8 | ec 04 d3 0d a9 20 db 31 6f de c9 65 e4 0b a9 11 | a7 ab 82 ef 2d c1 74 f2 d3 be 19 9c 04 b0 c9 04 | 29 00 00 24 95 80 09 e7 7a 52 78 28 1a 48 0b 4c | 98 2f 28 0b b9 93 53 be d8 60 a3 a7 18 da 10 17 | 4f 70 e3 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 7b e5 1c 98 48 0c 58 81 2b 7b fc | 78 24 fa 6c 15 2c ab c0 00 00 00 1c 00 00 40 05 | 11 88 73 d8 fc 53 52 81 2d 03 8d 95 6f 83 2f ef | fe a8 7c ee | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #216 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 ef a7 cc e6 d3 f6 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #216 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #216 | rejected packet: | e7 ef a7 cc e6 d3 f6 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #216: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0678 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2e150 | handling event EVENT_RETRANSMIT for parent state #250 | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #250 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #250 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49625.66411; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005994 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #250 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 "road-eastnet-nonat-250" #250: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #250) | 17 2a 9d c4 13 ac 7b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f a0 94 c6 2f 84 36 04 eb 6b 9e d3 d8 c3 41 dd | 36 5b 9a 4c 3e c4 08 57 57 9d d2 59 b6 8f 5a a0 | 97 64 4c 58 37 53 a6 c4 b2 5a d7 28 c7 0c 91 ed | be a1 6c 6f 57 ab d6 36 57 9a ec 6e 81 e7 d9 ec | 00 31 e4 c2 56 03 3a 6a 1d 88 e8 70 93 fc 2c 64 | 28 be 05 43 75 db 83 1a 2d e0 38 f0 97 bc d9 f4 | 8f af 26 f3 55 d2 01 81 1a 51 e6 93 66 74 0d 48 | f0 8b f8 85 50 76 3e 80 0e 67 70 24 1d ad 6e ea | 72 9d 01 c4 5f 99 0d ea 29 5d 36 37 89 d4 98 07 | 88 15 ab 7a c4 c5 62 ba fc 8c d5 56 64 df 3c 82 | 9a 54 de 55 20 6b b2 85 89 5d a1 07 c2 57 11 bd | f6 1f f1 5d 9f 5c 8b 9a c0 e9 98 82 3c 9e 57 da | 35 cf a5 fa b1 00 d7 17 27 e9 41 21 aa 94 96 cb | a7 a3 73 c1 a5 31 48 fa 19 d0 03 ff 95 c4 5d f6 | f5 17 61 a5 35 90 af 0b d1 1b d3 73 e5 de 34 00 | 63 00 cf f1 60 d4 f0 c0 3e 0d 02 7c 00 ab ce 51 | 29 00 00 24 c8 41 60 b9 9e 92 4a 7d d2 ef 9f 8c | 7b 43 49 a0 e3 71 1b 9d 34 81 8d 16 42 5a ed 22 | 3b 97 7d 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 44 92 04 c0 13 80 0a cd 61 73 30 | d2 9c c0 ea 6c 30 db 12 00 00 00 1c 00 00 40 05 | 76 73 9b 47 5d 14 7f b7 af f1 ed 94 26 55 3a fd | 56 a2 76 70 | libevent_free: release ptr-libevent@0x7fb35800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2e150 | #250 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 2a 9d c4 13 ac 7b ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #250 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #250 | rejected packet: | 17 2a 9d c4 13 ac 7b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #250: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a49450 | handling event EVENT_RETRANSMIT for parent state #113 | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #113 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #113 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49625.718396; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009688 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2e150 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #113 | libevent_malloc: new ptr-libevent@0x7fb35800cf80 size 128 "road-eastnet-nonat-113" #113: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #113) | 65 aa 2d d8 a6 29 20 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df aa fe 5d 18 fa cf 0f ff 28 95 2b df 41 5e e5 | 93 b1 5d 05 b9 f8 45 e3 a0 1d 39 ec fc 7d ae 4b | 05 3f bf 03 bf 80 a9 6e 8e fd 3b e8 32 58 c8 f7 | c6 df 30 b6 09 5f 2a 57 25 11 cb 3c da a5 01 9d | ba 5a dd a7 bc 6b 95 4a 6d df f0 56 fa 5d b6 d5 | 32 bd cc 28 5e b5 ff 1a d9 af f1 6d a9 3a c6 a5 | ab a2 21 23 63 1f 7a d5 a9 f2 d8 6e 34 2c c0 14 | b5 44 80 cc 01 b8 bc 1d 88 15 f0 56 5b 9e 16 11 | 53 49 7c 46 a4 d6 df 15 cc 76 08 99 30 8d bd 16 | fc 22 5e e2 91 1e 29 90 27 cb 4a a1 bb fb df c0 | e1 57 58 ac 38 1b 6a 91 9c 4e c8 14 95 91 e6 23 | a6 57 8f 86 03 7d ff ac 75 e9 09 5f f5 40 29 9b | 12 ab c4 82 96 27 04 ff 62 2b 29 96 91 b3 9d b0 | 86 8f c7 9d 9e d4 5c a2 76 cf a2 55 cf 18 d5 47 | 6a bc c0 f7 de 25 72 ff 89 ad a0 ee b6 9c 33 78 | 04 18 e5 3b 76 6f 93 07 22 6f ad 6a 13 43 4b d1 | 29 00 00 24 24 d3 7a 96 b8 4b b9 c8 77 6f a9 e8 | 8c 18 33 84 b7 52 88 cd 9d a3 3f f7 dd 42 d5 3a | e4 24 11 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 39 d7 c2 57 ac 0e 5c ea ab f6 c3 | 2b 95 40 5a 3d 34 d1 e0 00 00 00 1c 00 00 40 05 | e1 b8 84 36 a4 5f d1 6d 3f 9f 07 dc 0f 94 99 b2 | ea cc 3a 90 | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a49450 | #113 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 aa 2d d8 a6 29 20 d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #113 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #113 | rejected packet: | 65 aa 2d d8 a6 29 20 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #113: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0746 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24700 | handling event EVENT_RETRANSMIT for parent state #251 | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #251 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #251 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49625.775791; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005181 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a49450 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #251 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 "road-eastnet-nonat-251" #251: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #251) | df 3f 41 8a f3 53 d1 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 be c7 da 7c e0 83 1f ee 21 fb 97 63 3a 34 59 | 37 0f 13 08 a4 ea d7 d0 84 7f b3 4c 1b d7 fd 64 | d7 1b c4 39 0b a3 dc 8b fa 1d 0e 6a 81 2a 3e 09 | 69 77 47 fe 6f e7 1c 9d 41 07 43 05 b4 26 e9 60 | f3 29 4e c8 f2 da 1b 32 bb 97 33 75 2b 11 a0 c6 | 90 b8 73 b2 56 c1 80 3f f7 61 34 26 98 51 70 a5 | 88 c0 d8 c1 f3 4f b0 3f 75 1e 72 b1 d1 25 9a 2c | fb 27 8d d4 bd e9 f9 05 8f 56 62 b1 eb 23 67 7e | 83 41 57 f8 72 a3 e1 9d d8 36 e3 98 b1 13 30 a8 | a1 41 78 93 e9 2c e0 32 39 cd 75 d2 0c 43 c2 5b | 87 04 ee b5 1e 82 ed bc 9a dc ae f7 d5 db 76 da | 37 c9 35 0d 18 56 2e 1c 38 d4 6f a6 b2 28 96 31 | 03 0b 4f 71 60 58 12 2e e6 e1 cb 0c 0e 82 e2 ad | 8c 61 3a e3 4a ba d8 15 fc ef ca e2 63 cc 17 43 | fc 08 79 fe 35 fa e0 53 4c ee 7c 11 7e 46 1e 11 | a2 1a 41 cb e0 70 0b 67 d9 3b 63 7b ce 2c 58 e9 | 29 00 00 24 42 a0 3c df af e9 94 45 ab 83 0c a2 | 5d 7d 94 01 25 5c 79 6e 69 bd 19 b2 b1 d1 a1 50 | 35 69 ea d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be 44 4c d9 6f 7f 41 ca 31 72 e4 37 | ba 88 35 fa ba 64 3a 13 00 00 00 1c 00 00 40 05 | c3 fb 91 09 59 3d 6b 06 7b be 35 78 ae 35 d3 44 | 75 ba f4 a9 | libevent_free: release ptr-libevent@0x7fb350046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24700 | #251 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 3f 41 8a f3 53 d1 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #251 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #251 | rejected packet: | df 3f 41 8a f3 53 d1 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #251: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0479 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae9fc0 | handling event EVENT_RETRANSMIT for parent state #217 | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #217 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #217 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49625.777093; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.024052 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #217 | libevent_malloc: new ptr-libevent@0x7fb350046040 size 128 "road-eastnet-nonat-217" #217: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #217) | d2 36 bf 64 89 a3 fd 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 f4 5b dc ca 6a f6 be c1 c2 c8 63 19 fb 3a 1f | 70 dc de 5b 54 b8 eb 8d 2b 5e fc c2 60 b3 0c b8 | 9b c4 53 f6 87 96 b1 7e c0 8d e1 b0 c0 a3 08 59 | f8 18 05 78 a7 5e f9 f4 d8 1f 45 f9 8a db 9c 99 | 0e 07 3e 2a ba bb 8c 14 d2 d8 55 43 f4 c4 74 29 | 81 f6 ff c1 34 b9 34 a3 97 b9 37 cc 81 87 17 91 | 44 f4 e5 3a 28 aa cc 0c 3a 69 40 14 f6 3b 92 b7 | db 83 50 42 f0 36 82 ac f1 19 7e 5c 4e 90 c6 ec | cf fd 70 a2 a6 79 e2 bb b0 2b b1 df 8d e0 62 86 | 52 eb e4 a9 60 bc ec b9 d7 99 33 ce 9f d2 75 d6 | ea 82 29 7d d5 df f1 81 05 f9 8d d7 ff 39 0b 3b | 2c fe 6f 59 ae d2 c3 c5 12 3f 62 54 ed fc 61 4f | c2 74 90 8a b6 79 a0 b5 31 fc 8c d5 cb 45 21 48 | b0 1d 10 ec cf 2a b3 30 35 95 3b 32 3a 79 8c 33 | ab 0a b9 7d 4f 43 6c 9b d9 20 e5 7e 28 a9 95 05 | ed 38 6d f0 1a 10 8c 41 cd 59 c0 e4 ec 28 25 e4 | 29 00 00 24 50 f4 8b cc 88 78 9a 77 ca 06 50 f2 | 60 9a 06 39 64 9a 92 2a 1d 6a 83 ae 2a 35 88 82 | 1c 3d 43 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf a3 05 4d ff 0f f5 da 0b f8 e7 54 | e5 88 17 6e 1b 78 5e cb 00 00 00 1c 00 00 40 05 | 9b 1b 06 2c 11 9c 55 41 9d b0 16 46 62 0b cd 66 | 9f 92 84 50 | libevent_free: release ptr-libevent@0x7fb36404b5a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae9fc0 | #217 spent 0.197 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 36 bf 64 89 a3 fd 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #217 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #217 | rejected packet: | d2 36 bf 64 89 a3 fd 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #217: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0816 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23110 | handling event EVENT_RETRANSMIT for parent state #114 | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #114 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #114 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49625.780476; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008042 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae9fc0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #114 | libevent_malloc: new ptr-libevent@0x7fb36404b5a0 size 128 "road-eastnet-nonat-114" #114: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #114) | d6 76 3e 2a df 8d 49 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 89 bc e4 ca cf 42 9f 8c 3e 0c bd bc ae 4f 3b | d3 c7 ce d3 ca 55 eb 39 04 eb 76 8e a9 75 7d e3 | b6 18 fe 44 5f 1c ef b7 b7 41 cc 4d 34 22 30 65 | 06 59 1e ef 39 63 eb fe 02 26 56 aa 64 57 8d 53 | 7a 80 31 9c 0a f7 30 cf 50 cb a2 17 9f 63 45 27 | 3c d2 e0 b9 54 07 a2 b1 46 40 09 3b 94 40 bf f1 | 40 f9 b6 13 93 c3 4e d6 d8 b1 db 99 2b ea b1 51 | cb eb aa 9a ed ac 6d b8 6b 55 e2 2f 64 52 21 e2 | 9d 13 28 a8 e7 03 1f ba 1a 35 29 e1 bf bc 71 81 | 00 b3 30 d7 67 e8 0d 4c f0 57 7f 78 f9 6a af a6 | f5 69 67 2d 44 65 18 2d d8 cb 15 95 95 67 b6 a2 | 53 6a 9c 3b 84 13 f8 02 23 28 ee d8 85 45 e3 f6 | 5a a4 85 e6 1c 98 88 9c 1f 95 20 64 13 9f 49 1c | 78 c0 c0 ca f6 15 03 7c ad a7 9e 6d 64 5a 3a 90 | 22 4b eb 71 cf 24 e9 b9 6a 4d d7 77 ec 73 7e 9d | b2 6f c8 a4 49 bf 18 63 90 cf af e1 1e da 29 bc | 29 00 00 24 73 ab 08 be 9c 8c 4d 6d 6c 17 9d b7 | 72 a8 6d 05 77 58 95 9d b6 49 34 83 b7 04 21 62 | 34 da 48 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 91 b3 8b e1 5d a7 b1 99 b7 4d e6 | 18 7a 40 70 0a cf e4 42 00 00 00 1c 00 00 40 05 | 2c bf 9c 44 68 90 73 42 ea f8 95 cd ea 90 69 66 | 03 01 a9 72 | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23110 | #114 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 76 3e 2a df 8d 49 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #114 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #114 | rejected packet: | d6 76 3e 2a df 8d 49 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #114: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0816 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #115 | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #115 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #115 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49625.842914; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006165 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23110 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #115 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 "road-eastnet-nonat-115" #115: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #115) | c4 57 de ea ab 7c 97 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d 60 64 b4 6d 6b ab d1 46 47 bf d9 bb b3 15 d9 | 76 6a d8 89 d3 b0 5a 81 28 ba 1d 93 76 a5 80 bb | 38 99 6f de 11 f7 c8 2c 23 bb 14 6a 9f 0d a9 47 | 32 e4 6d d5 c4 32 60 81 49 22 36 5b 90 09 c7 0c | 27 45 32 0f 98 73 ed a3 58 24 f6 91 48 ba e7 1f | da 48 cc 0b e5 09 56 9d bd e9 fe a4 8f 0e 2b 69 | 4d 35 1f 28 bf 51 97 13 c0 2e 28 0e de c2 67 89 | 74 f0 15 44 d8 28 5b 7f f9 a9 ff b2 03 37 cf 2c | 3b 6e e1 4e 7e c7 1c 07 07 33 f5 e7 ff 50 1f 8d | 31 38 08 fc a1 18 db f4 32 10 6d f3 26 bd 9e d9 | db 50 5b 6d 6b 19 89 41 88 e3 7e 3b 01 55 72 67 | 91 73 3c 48 31 9d dd 55 e1 1b 9a a9 f9 5f 58 30 | 2e b7 6d 0e 83 a7 65 f9 86 ec 70 47 1e 65 85 e1 | e6 c5 21 98 7e 5c d4 94 dd 2a 93 5a 70 ed 80 a7 | 59 4c 40 1d 45 f5 3b 9b ad 67 94 6a 65 cc 62 c5 | 57 fb 85 e6 12 1e d8 43 f4 ef fe f0 cc a4 02 e0 | 29 00 00 24 34 89 d0 cd bb 68 33 bb 66 4c 49 99 | 21 34 57 e7 67 32 62 7f b0 e9 7c 89 a8 87 a7 1b | 14 49 2b 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 7a 1e c7 ed 14 54 ea ac f9 9a 4e | af 78 6e 32 16 f1 84 2f 00 00 00 1c 00 00 40 05 | 1a 60 d9 ab c3 38 58 4e 6c 49 b7 eb b4 e1 91 a6 | 90 ea 24 0f | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #115 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 57 de ea ab 7c 97 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #115 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #115 | rejected packet: | c4 57 de ea ab 7c 97 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #115: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.051 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c00d120 | handling event EVENT_RETRANSMIT for parent state #252 | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #252 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #252 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49625.907273; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006759 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #252 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 "road-eastnet-nonat-252" #252: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #252) | 50 58 54 7e 04 4a db ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 00 2c be 68 01 bb 0f 58 1a 16 c9 1d 14 15 83 | 19 e0 b8 46 87 82 81 55 0f dc 16 6a 8b 3d e4 4d | 0c e9 b2 bb 22 a5 95 09 ff 11 50 af 23 66 83 f2 | 31 7e 02 6d d7 48 dc 83 9d bb 70 c0 3a 92 f4 c0 | 9a e6 0b 57 02 38 84 8a 91 5b b5 ae 3c f3 73 1a | a4 24 27 15 5b c6 51 0e da 95 77 0a bb 05 7d 91 | af 25 45 22 0e b2 f2 4f fd 42 9b d1 98 1f 5e 0f | dd f0 f2 19 b9 ea ba ee 11 21 ee b6 0c 0f c9 55 | 03 18 8b f7 b4 d9 1d 6b 99 70 65 d0 5f 1e dc 40 | 4c 0a 83 ea e9 69 a1 18 51 d4 d2 fe 11 46 10 47 | b7 70 71 e5 e6 a8 cb f1 92 74 f2 25 34 f1 2a 20 | 05 8b f0 31 b4 4d ec 75 25 71 1f 16 3f cb 5c 38 | 5c 6a 40 df be e7 8c 81 eb 7e b2 34 69 d7 27 e3 | f2 93 a6 4e c8 e4 03 ff 2e ce ce ed 7f ee 01 95 | 24 0e cb ce 0e 6f 39 0e 07 c6 d8 ca 80 7d 23 cb | 6a 28 32 82 38 d2 86 f0 3f 31 6d 12 83 e3 4e 38 | 29 00 00 24 18 de 08 18 c8 a2 29 e1 d8 0d de 97 | 0b 9b 22 3a 3d 4c 80 05 7e b8 73 ae 1d 84 d5 68 | cf f8 f7 ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 65 87 e0 56 8f 33 84 b6 65 68 e9 | 21 de 15 28 76 56 f7 ec 00 00 00 1c 00 00 40 05 | 9e 72 e4 22 38 66 37 d3 ad ef a1 2e a9 f7 f8 37 | 54 d6 26 3e | libevent_free: release ptr-libevent@0x7fb36c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00d120 | #252 spent 0.184 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 58 54 7e 04 4a db ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #252 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #252 | rejected packet: | 50 58 54 7e 04 4a db ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #252: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0799 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc40 | handling event EVENT_RETRANSMIT for parent state #116 | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #116 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #116 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49625.910705; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008053 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #116 | libevent_malloc: new ptr-libevent@0x7fb36c012840 size 128 "road-eastnet-nonat-116" #116: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #116) | b2 c1 8f cb f7 6a 1e a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 10 14 ae 52 93 c7 02 e8 52 e1 37 d5 de 46 8c | fd 60 c1 85 87 df bb 73 86 74 dd ca 8d 28 84 e8 | ae a4 cc 28 e4 8d 32 74 8d 1a ce d7 d3 d2 af b0 | 17 d9 f0 1f a3 6b 80 67 ac 90 16 e8 bd 63 76 cd | 29 1d 99 79 32 0a f9 72 a3 b1 6c a3 80 e8 98 c7 | 50 db 8b a2 a3 d2 f5 f7 af ea cb e0 92 9e 24 f1 | ee d0 e5 d9 31 06 c1 bd 2c 7e d3 0a 21 44 11 df | a4 42 5a ee bb 8a 79 72 e4 f3 c9 99 7b df 25 70 | 3c 49 19 99 e1 b4 65 cb cf 1f dc af da 2b bd 09 | 11 55 b0 c8 e4 15 8c 50 3c c0 c3 00 8c 8c 4c ab | 69 1b ad 8f b8 1a e0 31 01 be 05 d6 f9 1d 43 66 | f1 fd 89 96 83 b0 fe 81 90 88 96 0a aa b0 30 a0 | 85 c7 97 d5 26 67 92 b8 99 15 c1 d7 75 f8 4b 96 | 28 a4 71 fb e3 bc ab 36 e6 56 13 b6 1e 48 b3 3d | 9c e0 fd 0d 74 f8 ef 54 b8 1f 40 6b e3 af 77 76 | c8 a0 52 42 e3 01 29 91 49 f3 39 82 3e 75 b6 74 | 29 00 00 24 f8 40 4d b3 f4 26 54 f3 cf b0 a0 c8 | 54 6e 9f a9 95 bb 15 87 06 e3 63 86 66 7d 8a 82 | ee 67 c6 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 63 f6 16 ae 7e d5 6c 46 12 68 8c | 69 38 5c 9a 54 a3 19 f3 00 00 00 1c 00 00 40 05 | 9e 9c 34 46 1f 45 a3 36 da 24 a6 33 3a 00 62 20 | 5b e0 e0 ea | libevent_free: release ptr-libevent@0x7fb3540251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc40 | #116 spent 0.189 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 c1 8f cb f7 6a 1e a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #116 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #116 | rejected packet: | b2 c1 8f cb f7 6a 1e a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #116: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0766 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ecc0 | handling event EVENT_RETRANSMIT for parent state #218 | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #218 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #218 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49625.926167; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006056 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc40 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #218 | libevent_malloc: new ptr-libevent@0x7fb3540251c0 size 128 "road-eastnet-nonat-218" #218: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #218) | fc 84 28 e6 d0 d4 a3 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 d7 19 e0 b8 a7 81 99 33 01 41 39 ef 55 14 82 | 36 e8 1e 6f 78 81 cb 8b ba 30 50 9b f0 49 c2 8d | 4d b2 2b 95 f1 d8 28 60 35 5d 42 53 4d 43 c7 8c | 4f 74 15 45 95 27 14 77 eb 50 5d 4a f6 fd be ee | 3c 1a 88 ee 70 83 66 98 31 0a fd ad 4a 03 b5 37 | 5d 2e 93 bd 7a be 39 56 60 d9 aa 84 79 74 3d 0e | dc e3 b7 0b 24 c5 94 3d 31 8b f6 0e 82 f6 06 b8 | 26 12 7e 3f 3e d6 7d b6 51 ee ad b2 d2 ab 27 77 | 53 f8 1e d7 91 5f 2a 81 5e 4e 7d 22 21 5e 55 9c | c3 53 13 8f 2a fb e3 93 47 36 6a 2c 3e 5b e2 b0 | 72 17 1d b0 34 33 da 2e 57 d4 77 d4 d7 37 4b 04 | e0 fd 56 ba 03 09 e0 ee 03 55 18 7a 06 0c cf 4c | 2a 51 58 97 6d b9 c7 55 61 75 dd e7 d8 0d 3a 1d | 49 6c f2 e4 06 70 89 d9 24 cc ed 33 51 12 2c eb | 69 6c 48 51 d3 c5 03 79 af 69 1b 7c 09 b9 68 90 | b7 fa 26 e6 18 f8 80 d5 96 f3 c9 3f f4 18 bb d2 | 29 00 00 24 11 b2 a5 5c a6 46 80 f9 3d 23 f2 ab | ce 5d 83 0a f1 1a 01 82 7c 29 4c e1 e5 d0 ae 3c | 95 98 eb 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4f 29 50 5e 23 8d 7d 6b 34 9f ff eb | 11 dc 43 b6 12 c1 95 47 00 00 00 1c 00 00 40 05 | a7 99 e5 52 4c 36 7b 61 4e b2 63 45 25 bf 82 23 | 34 fa af bb | libevent_free: release ptr-libevent@0x7fb37c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ecc0 | #218 spent 0.232 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 84 28 e6 d0 d4 a3 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #218 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #218 | rejected packet: | fc 84 28 e6 d0 d4 a3 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #218: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0787 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_RETRANSMIT for parent state #117 | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #117 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #117 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49625.971614; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008892 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ecc0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #117 | libevent_malloc: new ptr-libevent@0x7fb37c0300e0 size 128 "road-eastnet-nonat-117" #117: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #117) | 4a b5 59 cb ed d6 a3 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 62 d1 99 4b 20 24 18 5d d2 31 2a 1c e6 82 aa | d2 1a 74 70 f8 1e f2 71 00 48 0a 80 0d 91 e6 e0 | e0 7b 66 1e 0f a2 c5 f3 2e cc 8d 72 40 de 7d 14 | e0 b7 d4 a2 80 96 97 77 ac ba 2b fb 1f 79 f2 32 | 8b a5 84 65 3d e1 3e 2e 60 82 26 3f 6d cf 4b 43 | 84 0b 96 d0 d5 70 61 64 4c 71 e0 b1 63 e8 0c 82 | 17 82 85 c0 c3 eb d9 cf 4e b8 f4 b1 87 57 e5 c1 | 06 2a d8 41 87 ab aa ec 3f f6 5e ac 9b 45 ab a8 | 0b e4 13 8d 76 0c 8c 2b 1f d4 61 19 ad 16 37 d8 | d0 65 3e 14 53 34 26 1a a6 5e 31 57 79 20 50 43 | 71 29 f3 4a 86 68 0e 08 74 59 1e 0f 6e 37 0c 10 | b2 e1 5f 52 67 c2 35 e3 ff 31 9d c5 bb 7f 45 96 | 61 58 38 40 0e b5 86 40 8f 24 ab 5a 52 cc 83 a1 | 23 61 7d 29 78 a8 96 57 13 15 75 48 5f 5a 5b 21 | 7b dd 4e 50 1d 23 67 01 84 5f f8 e7 69 4f 16 1a | 7e b5 9f 38 da 45 67 22 75 50 ab b6 62 cc cb 76 | 29 00 00 24 c3 7a 28 6c 12 59 4b e7 9f 08 e5 89 | 61 e9 dd c1 64 c5 cd 33 70 a1 b8 fb a5 4b b4 8c | 0b 78 ad a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 90 26 e7 b8 63 3c dc 5c 03 43 0c | 57 b3 5f a9 02 48 0a b5 00 00 00 1c 00 00 40 05 | 75 50 aa 52 d7 4b 1d bd 0c f6 2a 37 d5 af e8 8d | 12 a0 66 45 | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | #117 spent 0.236 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a b5 59 cb ed d6 a3 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #117 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #117 | rejected packet: | 4a b5 59 cb ed d6 a3 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #117: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.104 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae8980 | handling event EVENT_RETRANSMIT for parent state #118 | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #118 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #118 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49626.031954; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008209 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #118 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 "road-eastnet-nonat-118" #118: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #118) | 8e a7 a4 7e e9 0a bc a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a ec c5 01 c5 e9 b5 94 ac 43 67 db 08 47 bd 0c | 54 49 81 74 3a 3b f9 51 2c 6b 48 98 c1 d5 7c ee | 4b 95 1c 5e 71 e6 0b 08 a0 85 de c0 1d ef b9 d0 | 5c f8 32 2b 5d f8 44 47 b6 dc c5 4b 50 10 f9 77 | 99 80 83 bc 5c bf 6a 79 a5 41 39 97 c6 b0 17 4c | 84 d1 fa 16 7a 7a 3e e5 51 2d fc 5d b0 66 e1 6f | 66 c6 ed f3 a4 54 56 06 ac 5d ee b2 4b 4a 38 5f | aa 09 29 91 e5 8c 9b 64 60 8e 7c f6 86 7a 07 43 | f1 93 d1 26 4a 28 da b7 0c a1 1a 0c 4c d6 c5 1f | ee f5 92 b2 e4 15 93 35 4c 07 88 be ec 21 4e 23 | f9 ed 56 db b0 43 b1 c7 7d 57 a1 20 bb 88 d2 9a | 23 9e be ef e2 0d b6 dc 67 12 32 69 0b ef 17 5f | 45 8b bf 08 ff c1 84 fb d6 41 58 81 ba c4 68 e8 | 6d 5c 50 c4 fa 14 2d 1e b6 d3 3f da 53 ee 59 40 | e0 c2 e3 5e 46 f4 96 f5 35 c7 87 50 c6 81 32 4e | 30 f8 e6 fa a0 f5 a3 88 f0 51 68 02 71 eb f4 fa | 29 00 00 24 fc fa 6f 0b ed d7 fd 9b f1 eb 70 56 | 1f a0 0f 98 c6 28 ab da a8 c2 09 53 33 ea a7 33 | 5c 74 50 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e 87 94 32 ac f3 4e 0f e0 49 b5 2d | ec 68 6c 45 41 83 dc 40 00 00 00 1c 00 00 40 05 | e8 e9 7b b7 56 9d 8b dd 59 77 e6 95 c2 ea 88 7c | d5 64 a3 dc | libevent_free: release ptr-libevent@0x7fb3500407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae8980 | #118 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e a7 a4 7e e9 0a bc a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #118 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #118 | rejected packet: | 8e a7 a4 7e e9 0a bc a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #118: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afd000 | handling event EVENT_RETRANSMIT for parent state #219 | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #219 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #219 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49626.044309; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.008894 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae8980 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #219 | libevent_malloc: new ptr-libevent@0x7fb3500407f0 size 128 "road-eastnet-nonat-219" #219: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #219) | 7d 80 b0 77 1f 48 77 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 87 5e 24 5c db 31 0a 96 84 9d 90 05 c1 73 ea | 13 fd da 1a eb 02 9b 1b a2 ef f5 1e 7d d5 07 48 | 63 2b 15 ef 39 49 2f 72 57 96 fc d0 52 b7 b4 5b | b9 8f 1f 7d 66 98 1a 54 e8 35 20 c8 da d6 6b 14 | 12 96 09 73 f0 2a 18 19 ad 4f ad c0 e9 02 7d bf | 91 ef d7 b5 3d bf 72 91 c2 b3 4a 21 80 f5 15 86 | f5 a2 c4 99 67 47 6c 96 fc e1 53 b9 1a ff ad 2e | 5a 73 b4 6f 29 39 2a 43 c9 46 c0 b4 6f 20 2e 1e | 67 a0 45 fd 13 c6 d4 73 ef 07 78 d4 9f 67 9c 74 | b8 b8 8b 57 22 93 1b 6e 1c 48 7c 01 8f e1 37 24 | ca 0b 69 5d 4d 5a 11 fe 79 69 f3 19 5f e1 13 01 | 72 da c7 1d 2e 2d 95 6b 1a 0c 79 15 cc 16 3b c9 | df 53 b2 62 55 3b 89 98 3a 35 b4 a3 d8 f7 72 66 | 5a 4a cd 05 1d 45 02 1c a4 80 ce 7b 71 ea 76 a3 | 4c 87 0d 5f a5 5d 61 29 09 d4 52 68 95 1e 6d d6 | 81 6a 00 e1 92 ed bb e5 1a 97 43 9e cf 2e 23 af | 29 00 00 24 3d 29 6e 63 66 7a 35 4b 56 6e f9 8b | 96 51 14 3b cc a7 be 10 65 46 ea 6e 67 b7 cd b3 | c7 62 bc 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 d7 c1 a6 5e c6 d2 33 1c 31 12 89 | 58 68 2a 17 e1 05 d4 0f 00 00 00 1c 00 00 40 05 | 8f 01 0b 19 90 57 cd de dd b3 66 c4 60 3d 67 fe | 89 ed 52 b0 | libevent_free: release ptr-libevent@0x7fb36c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afd000 | #219 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 80 b0 77 1f 48 77 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #219 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #219 | rejected packet: | 7d 80 b0 77 1f 48 77 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #219: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0697 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #119 | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #119 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #119 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49626.090695; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006368 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afd000 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #119 | libevent_malloc: new ptr-libevent@0x7fb36c0407f0 size 128 "road-eastnet-nonat-119" #119: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #119) | ec af 1e 58 4f bc 16 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee 25 46 13 3c ef fe 01 ba 63 b1 50 ca a7 dd f5 | 7a b0 49 43 35 e3 74 57 d0 52 bc 3a b2 ee 6b 2d | 57 80 2f df 71 ea 94 b3 0a 0c 7b 41 50 c2 f6 7a | 6e 96 5b 3d 0d 51 9a 0b a0 fa d0 8d d8 98 f0 45 | d5 fa eb 0a f5 ea 33 8d ee 1d 3f cb 09 35 dc f7 | 0d a7 89 25 f9 a6 f9 a3 0f 9a 3d b0 bb 98 db 2a | 8f f4 ad 7f 6a ae b3 bd df 23 e8 8d 52 72 79 9f | 3d 34 85 f2 e2 b4 d7 cc 39 ee a0 dc 64 4f fa 2a | a9 30 c6 c2 7a 7a 1d cd 26 c0 0f 55 58 ed 9d 22 | c6 a1 9c 81 01 bd 16 3d 36 47 70 a1 46 0d 07 ca | 5c 2f 9d 3c 24 d8 e7 19 57 44 18 a0 58 ed b0 c8 | 65 f2 98 6e 64 04 01 87 4d c3 6e 78 76 c5 fa ee | ff 60 94 9e 6a fc 5b 5e 1a 15 3a a6 4d fe ba 28 | 39 70 2d 49 9e b7 11 89 3d 89 a8 26 59 f3 51 ef | 05 36 27 99 84 62 16 13 24 49 d2 7d b9 18 a2 21 | 0f 0d 2a 9a 79 02 d0 e1 a1 af ee 7c 84 e5 76 9a | 29 00 00 24 93 ff 34 01 41 de 6e 58 b7 82 d5 c2 | 8a 60 ef 17 fc 48 d2 4e 23 80 6e 54 cf 7a 62 03 | 64 73 a8 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 43 1b c4 4b b2 17 2e 38 4e 57 6d | 6b 77 1d 82 1a c2 9c 87 00 00 00 1c 00 00 40 05 | f7 09 55 f2 00 b0 ce 9f d1 9c 54 d7 51 50 ae 6b | e8 b4 0e d9 | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #119 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec af 1e 58 4f bc 16 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #119 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #119 | rejected packet: | ec af 1e 58 4f bc 16 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #119: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd80 | handling event EVENT_RETRANSMIT for parent state #220 | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #220 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #220 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49626.146188; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.025323 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #220 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 "road-eastnet-nonat-220" #220: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #220) | 46 e4 bb be 2e c2 5d 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 39 4d 80 66 08 94 81 6d ee b8 9e f9 65 a1 19 | 54 a6 0a fc 14 3b 49 4b a5 b0 75 d5 8f f4 dc f0 | 1b a7 3c f6 bb e2 05 ae e7 81 f3 39 80 b8 01 f9 | 77 d5 d3 86 7b 99 e2 d3 05 f7 72 fa 5c f1 d2 51 | b2 76 8c 56 54 09 b2 f0 63 f0 63 23 b4 3d 48 f6 | f1 7c 7c 9e fe e8 97 61 67 eb 6f f5 a8 99 0f d8 | f0 a4 2a 65 98 03 64 d4 51 ad 7e ce 83 6c 68 5a | 24 81 05 98 d2 e5 16 4b 8b 3e c7 e6 5d cd e2 fb | a8 b3 8a 3b d0 a3 7d ce 4c 78 67 e6 b6 09 60 ba | f9 1c b9 ed ac 41 f4 ed a2 6c 61 ed 1a 8b 86 32 | f9 bb e7 03 fa 79 52 88 d5 55 24 b9 5c 26 d9 4f | 84 6f 26 7a 2c f2 0f 72 55 f3 04 53 6d 42 03 19 | 2c 35 89 e8 72 3a 30 cc ba be ce f2 4a 96 71 78 | 63 64 85 27 33 b9 dc 2a 58 25 92 09 0e 9f ab 45 | ad 24 0f 92 22 24 6c f4 98 77 7a 79 50 d8 2c a5 | 5a fb ac f5 20 e9 5a 93 8b 11 3b 04 5b 8e 94 e7 | 29 00 00 24 b8 3d f3 f9 87 d9 e7 9e 4b f1 71 60 | 7a f6 ea f9 0f a9 84 5d c0 c1 a6 93 b2 00 5b f0 | d8 3e 37 a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f9 77 af d4 23 66 f6 eb 62 8a 75 68 | f1 14 74 bf 89 18 b5 2c 00 00 00 1c 00 00 40 05 | 75 8f 21 77 9e bf 74 11 1b b7 a1 b1 db ce 3f 91 | e1 e1 a3 e9 | libevent_free: release ptr-libevent@0x7fb35c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd80 | #220 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 e4 bb be 2e c2 5d 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #220 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #220 | rejected packet: | 46 e4 bb be 2e c2 5d 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #220: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4ebd0 | handling event EVENT_RETRANSMIT for parent state #120 | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #120 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #120 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49626.159848; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00841 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #120 | libevent_malloc: new ptr-libevent@0x7fb35c02a950 size 128 "road-eastnet-nonat-120" #120: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #120) | 87 fa a7 32 05 23 14 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec 6c 11 66 a6 95 d9 e6 e2 88 b9 98 2a 60 c1 38 | c4 e7 6d c7 8d 08 5f c7 b2 af 28 df 28 55 74 6b | 75 22 9e ab 67 eb 95 72 f6 3e 95 b3 15 85 4f d6 | c1 c3 2d 9e 07 29 16 41 13 5e bb cf c0 e6 4f 24 | 10 cc 57 fd 9c ba 63 ce ec 86 10 c7 d4 7c 34 a8 | a5 5b fd 1f 33 3b a2 f8 03 46 9a 66 74 53 5d 27 | bd d8 93 4e 14 8b 45 9a 6d ce b3 cb 29 f0 cc 6c | 0a 42 f4 3b 31 46 fc ae db a9 72 48 29 6a 06 1a | 3f 35 fb 97 be 23 c9 c4 df 59 9b d7 24 09 d8 73 | f7 9d 98 e5 b5 21 68 b6 e2 c9 13 2b 11 7a 73 1b | e9 35 93 72 82 45 b9 27 a7 9d a4 9d 09 5e 20 78 | 29 0e a5 bd 44 31 dd 75 00 a1 c2 9f 09 4f 24 eb | 16 42 da bf 3a 12 d4 84 33 67 7f 85 66 00 36 74 | 79 21 73 94 9b df b2 a9 01 30 1b db 75 7a 3d 46 | 6c 6c eb ca 16 ae 1a 85 9f eb e5 ef 46 e7 91 51 | ee 18 48 f1 20 6b 2b c6 77 fb 41 ba bd 6b 56 4e | 29 00 00 24 6f c3 ef a5 ff 17 51 3e dd e4 5e c3 | e4 15 2b 4d c5 b5 58 85 08 f4 21 f4 d7 43 b1 43 | 4c 64 51 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 47 24 d0 22 75 93 6e dd 7d f7 25 | 7b 0d 80 0a 15 3a a3 09 00 00 00 1c 00 00 40 05 | 8f c4 23 24 1b 0a 54 8e c8 2f b2 b8 ec 80 e9 f3 | ca 99 ed fd | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | #120 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 fa a7 32 05 23 14 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #120 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #120 | rejected packet: | 87 fa a7 32 05 23 14 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #120: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0693 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c7c0 | handling event EVENT_RETRANSMIT for parent state #121 | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #121 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #121 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49626.23212; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.013319 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #121 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 "road-eastnet-nonat-121" #121: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #121) | 1a c4 23 3a 2f fb 8d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 72 b0 fb 70 4e c0 8d 7d 37 18 c1 ce 4c 8b 63 | 3b ed bd b3 7c e2 68 d0 e4 78 d3 ff 67 2f 87 6b | 58 6e aa 28 e2 71 48 9f 9e 55 8d d7 f0 fa a8 2d | cf d6 ae d1 2d 00 58 7f 1d 28 13 c8 1c b2 dd 2d | 0b 8c e4 ed 5c aa b6 84 75 0e 0c f4 87 20 ea a7 | 6f 81 08 6f ca 1d ea a5 cc 8b 1d 07 3a 98 ee 34 | 92 f7 0d 60 c7 27 69 9a 54 db 7b c6 0a ed 9e 6e | 48 c9 2d 78 78 eb 23 a8 d4 08 fd 81 af 22 ee 61 | 94 de e2 4a 3e 31 5e 98 b3 8e 80 72 e5 9a 23 e5 | 36 5f 19 09 16 90 75 46 fe 81 ca 01 97 f5 9d b9 | ee 86 b8 f1 4d 40 49 77 bf ea d6 8d cf e1 3f ed | ea d1 6f a1 94 f1 b6 1e ce cf 58 8f 34 28 d9 e9 | 91 30 27 07 3d a8 1a 9e 1f 56 eb 39 c7 99 10 18 | f7 a0 93 02 25 a4 35 d3 3b 85 c6 a5 d4 ee 05 5a | 0a 2e cd 8b 56 c3 43 2f ad b6 de d6 76 50 8d 8d | 31 49 b6 ba ff a2 3a 1a 19 8e 58 36 38 db d0 39 | 29 00 00 24 ce 58 3c f3 71 03 62 3b f7 b4 bf 47 | 86 b0 47 20 d2 a4 5f 23 42 6a 81 bd c0 a6 20 e9 | 9a 46 27 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 ab b4 fc 6a e4 2a a5 95 ca 3f ba | 4a 7b 1d be 72 ff 8c 93 00 00 00 1c 00 00 40 05 | 7e 13 e9 d3 7d bc 8a 17 e1 3e 93 a5 d0 ee 9b cd | 6e 9a 4b 6b | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | #121 spent 0.175 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a c4 23 3a 2f fb 8d 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #121 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #121 | rejected packet: | 1a c4 23 3a 2f fb 8d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #121: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0755 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8cc0 | handling event EVENT_RETRANSMIT for parent state #221 | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #221 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #221 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49626.245488; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005473 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #221 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 "road-eastnet-nonat-221" #221: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #221) | 90 8f bf e7 cf b7 65 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 72 44 57 63 97 26 0b d0 33 1e c1 f5 c9 36 d4 | f7 1a 62 3c a3 39 42 e3 c4 ee 5b 04 7a e2 93 d5 | 0f 83 78 28 fb 94 39 4c 7a cc c9 c9 ad ce 5e 59 | 68 4d ba 18 1e 4a 63 94 c5 70 f6 5d b4 77 65 58 | 10 84 fe ef 60 83 64 5b f2 89 50 99 ac e1 51 8a | d7 74 3b 5d 70 17 cd 8b 95 39 65 4b aa 2f 20 67 | bc c1 06 22 2c 60 51 a7 d1 25 ba e3 e5 7c 2a 24 | 9f dc 2e 8b 87 d8 be dd e2 1f 7f 7d 88 f1 33 ff | db 8b ce 43 0a 9d db 20 79 1b 34 f9 9e 77 87 58 | 03 3d 5b 8a b0 e8 e3 38 e6 81 79 10 ab 3d b2 02 | af 63 97 ff 1b 89 ab 73 45 c7 84 d1 96 d1 2b 2c | 45 33 cc 2a 87 09 9b 3c 40 ce 87 0c 1b b1 51 a1 | 8d 74 42 7d fd e9 3f de a9 93 ef 77 e9 c1 c8 91 | 38 fa 26 85 5e 1b 88 91 35 9e 5f 73 34 d8 96 fe | 85 b3 52 f7 42 b5 7d 56 e8 9e bb f2 e5 07 db 70 | 5b 28 4b 5d 8e 85 f0 35 5c f8 45 ae 02 de 27 d9 | 29 00 00 24 cd 4c af b1 99 23 18 29 29 9d f9 32 | c6 a6 09 22 63 0a d9 08 58 b2 a1 77 c9 06 48 e1 | 9c 8b 9e bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 fb 28 ad 15 31 02 8e bd d8 0f 80 | 1c 8f fa a7 e9 1f 34 e3 00 00 00 1c 00 00 40 05 | c4 70 86 36 d0 0a de 28 47 ec ca 4b f0 c7 6b 67 | c3 4a 0b 4c | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8cc0 | #221 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 8f bf e7 cf b7 65 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #221 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #221 | rejected packet: | 90 8f bf e7 cf b7 65 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #221: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0479 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3940 | handling event EVENT_RETRANSMIT for parent state #122 | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #122 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #122 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49626.287784; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006656 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8cc0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #122 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 "road-eastnet-nonat-122" #122: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #122) | 14 66 d6 bd ae 2b be a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 a1 e9 e4 be 1e 51 8a 55 59 79 73 21 36 56 e2 | 77 7a 08 bd 06 ab d4 92 e5 dc ae f7 64 76 23 ff | f4 fc 6d 61 73 31 e1 d2 4f df c1 6b b7 79 5a 65 | a0 cc f6 e0 aa a2 1e 56 c9 61 f0 64 10 6e 71 e4 | de d3 38 6f 01 f0 ef d1 f6 56 f5 aa fb d5 dc 96 | f9 0b be 72 ef 23 60 6a 39 4c 10 fa 40 46 a5 4f | 9d 4e 1b 63 94 dd bb 2e 79 61 b0 23 01 f5 74 e7 | c5 3f 64 7f 13 8b 72 4d bd da 91 fc 61 61 ef f0 | e7 bf ad 46 59 ed ad 05 2c f7 04 21 03 71 4c c7 | 7f 1d ad ca ef 53 b4 42 e8 7b 9b 3d 7a 70 68 63 | f6 3b fc 00 63 e2 d1 50 20 42 35 cc 18 3b ef e3 | 5c 49 2e b5 43 b5 11 94 a2 42 32 89 ab 4a 75 44 | 28 03 13 02 78 a8 b9 d4 86 df f7 69 0e 5b f1 03 | 59 e8 3f 87 be c1 4f 01 d7 b7 0b 01 72 03 2c 0c | c5 51 b7 34 27 69 20 c2 1e 3c 1a 82 2c 40 e7 31 | 94 67 b7 79 04 1c c9 e0 fd 58 15 b5 e2 95 d3 0d | 29 00 00 24 7c 10 f9 fd 3b aa 03 0a 4e 70 88 76 | 8d 21 8d 7a 77 a3 25 87 bf 2c 07 91 c2 03 c6 70 | 6f 0a b2 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 62 3b d9 22 f1 42 3b 85 55 78 b5 | c8 14 63 8d 0b 44 d6 d6 00 00 00 1c 00 00 40 05 | 1b ba f6 9b c4 53 50 8e 11 46 cb 49 4f 65 db eb | 69 7d d4 7c | libevent_free: release ptr-libevent@0x7fb358035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3940 | #122 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 66 d6 bd ae 2b be a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #122 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #122 | rejected packet: | 14 66 d6 bd ae 2b be a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #122: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0476 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #222 | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #222 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #222 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49626.348109; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006477 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3940 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #222 | libevent_malloc: new ptr-libevent@0x7fb358035930 size 128 "road-eastnet-nonat-222" #222: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #222) | eb 26 f4 19 1a 54 68 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 a4 6e 20 fd 50 2f 35 57 aa de 4a f5 e5 f9 4f | ca f6 bf 35 d5 20 df 61 18 72 c7 7b 3b d6 89 fe | 57 a2 45 9e 67 3f 8a f7 1b bb 33 5b 2f 19 93 13 | 4d bc bb d5 5a 76 0b 8c 08 e4 e4 47 2d c3 07 c6 | df c3 86 a0 6b 90 b3 31 74 8b 42 bf c4 10 0e bf | 13 cf 0b 76 db 86 6a 9f 8c f0 b4 0e c7 08 95 7e | ce 41 5e 4a 31 5c bb fb 47 19 b3 63 fb 4f ca f3 | 07 c7 1d d9 7a 1b f2 0d 5e dd f5 ac 4b 35 32 4a | fb 08 38 da 83 ea de 30 e1 52 16 cd fe ea bf b3 | 88 b6 b0 c4 6f 9e 4d bb 67 f6 e4 a0 eb 71 82 6a | ad 65 be 80 db 5a 69 3b 90 3a 58 e9 30 d6 fe 7a | f6 9b 28 5c 13 9f 6a 77 4f c9 8b bc 07 b5 a1 d9 | 2b de 81 5d 47 e4 3c c1 b1 a8 f5 bc 8d 40 df 63 | b5 80 17 f2 8c 1f b1 78 d7 35 f2 4c 44 06 cc 65 | 15 11 55 93 d9 f0 56 8f ad b9 7e 2b 7d cb da 6d | 9c ab 97 02 8c 9c fc 9d 3d c3 47 69 0f ac 56 88 | 29 00 00 24 77 e8 83 df 75 f1 9b ea 8f aa ae 8f | cc 39 a6 6f 03 de be 68 b3 66 64 be 5d 42 33 fc | 61 2a ce bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 87 6a 56 c8 8d 7a 5a c9 70 42 a3 | 93 38 10 ea 25 8a 09 bf 00 00 00 1c 00 00 40 05 | d9 43 32 2c d8 2a fd ec 96 bd 92 a4 54 e0 a9 82 | 8b 73 b6 b2 | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #222 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 26 f4 19 1a 54 68 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #222 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #222 | rejected packet: | eb 26 f4 19 1a 54 68 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #222: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0655 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab0dc0 | handling event EVENT_RETRANSMIT for parent state #123 | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #123 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #123 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49626.35044; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006722 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #123 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 "road-eastnet-nonat-123" #123: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #123) | 6c 7d b3 a1 76 62 7d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 56 4f 8e 37 33 e9 f0 f8 7f b8 e1 b3 f9 a8 fa | b7 62 0a da df 31 2b 33 3e c3 84 d4 70 c9 16 31 | 80 ac 1c 22 4c fb 0e d9 48 14 9a 6c 58 8b b2 b1 | ab d6 de 52 1b e7 85 36 94 02 66 e4 ea 4b 3e bb | cb 9a 60 cd b2 64 9c 54 4c 58 05 94 9a 41 90 e5 | 3d f7 e6 13 47 7c 5c ae 9e ed 2f 47 46 7c b6 ec | 64 99 4c 90 1f 2b 27 83 ee 7d 0c 95 53 61 78 0e | fc 0d ee f9 69 83 ad f2 29 e6 77 fd 16 29 ec c4 | 55 89 e7 07 dc 10 66 d5 0f fd 31 a1 54 12 3e c7 | b1 16 f6 98 63 b4 d5 90 8d e3 ff 44 b5 31 8e 32 | c1 26 fd ff 42 9b c5 01 50 0b be e0 4e 8b d1 4e | 1e cc 49 12 14 c5 7d a4 df 96 fd 82 a1 fa 2c 84 | 20 3e 8f a2 9b 0b 00 ca 45 cd 8b a5 8a 1e 6a fa | 02 7f 67 67 3a 15 da 2b 32 2d 18 bd 05 df 1f 49 | 13 dc cd f2 4e 24 ac 3e c3 6e b4 5b 9b c7 3e 7b | f3 b3 b6 54 f0 4f 36 43 d8 39 48 ea ae 56 03 eb | 29 00 00 24 9d 71 0d 4c e1 28 99 bb a1 c2 a8 97 | 82 df 6e a7 59 50 e5 e7 83 d9 52 2c 3a b5 f8 0a | ab 34 6b 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd f0 b7 a5 ab c1 1e 9f 00 5e 1f f4 | 01 11 d6 41 8c c8 44 db 00 00 00 1c 00 00 40 05 | 74 ad b7 af a3 7a 6a 08 ff e9 f2 f1 74 4e c9 b2 | f6 ce db 1e | libevent_free: release ptr-libevent@0x7fb380043300 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab0dc0 | #123 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 7d b3 a1 76 62 7d ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #123 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #123 | rejected packet: | 6c 7d b3 a1 76 62 7d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #123: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.072 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #124 | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #124 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #124 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49626.41582; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006176 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab0dc0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #124 | libevent_malloc: new ptr-libevent@0x7fb380043300 size 128 "road-eastnet-nonat-124" #124: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #124) | 8e 52 ee 7a 33 75 3f 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 57 9a 04 43 62 52 e5 fc b5 c2 fe cc ad 34 2f | 82 f3 00 f6 ee 21 08 77 c9 b1 bb 69 fe 78 0f 21 | bf 36 0c 3c d2 28 d9 56 83 ae 1a 8d 60 fc ba 85 | 54 56 0c 31 1b 34 8f 99 3a cf de 75 87 a0 b6 a4 | d8 62 39 46 a5 f4 50 6b 49 13 47 6a b8 07 fd 9b | a0 24 9b 8e 36 86 71 8d 3a 86 06 ec 43 9f d0 fa | fb 5f d7 26 3c ad 44 31 62 f2 eb 50 ab 84 4b c8 | 92 d2 94 d1 cf 28 72 53 f0 98 5e 24 79 26 3e b6 | 8a 49 4d a1 69 34 ff 0b 63 f0 6a 98 fb 9b 9e fc | 07 2e cd bb 5b c5 49 f8 a9 bd 52 eb e2 d4 29 6f | e4 1e 81 a0 d3 65 f5 f3 07 20 20 0d 39 fe 60 11 | 31 d5 df 57 2f d9 ac 24 3b 95 8a 93 3c 37 3c fe | 00 f5 ae e3 8b 73 07 19 bf 7a 74 b9 19 54 31 a8 | c6 05 b4 3c c9 b4 f2 d1 4f 8d c4 e7 6c 6b d7 8c | a7 72 14 8c da 9f 42 94 91 f0 27 3c ef a5 63 c0 | 4b e5 9c 5d a2 4a 47 0f 02 ed 81 c6 7a 36 ca c0 | 29 00 00 24 35 37 ad 9e 25 61 50 57 d7 60 4e 9e | 7c 24 2e 8d b9 f6 52 07 e6 cf b3 cb 88 5a c5 03 | c4 c6 aa c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 73 0e 7d 3a 1d a8 f9 ef 84 7c a6 | 0b 05 4a f4 88 18 b0 42 00 00 00 1c 00 00 40 05 | 95 90 15 33 51 5d ad 36 64 2a 62 55 cb ba 4d 6f | 9b 17 ee 8d | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #124 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 52 ee 7a 33 75 3f 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #124 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #124 | rejected packet: | 8e 52 ee 7a 33 75 3f 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #124: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4bfd0 | handling event EVENT_RETRANSMIT for parent state #223 | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #223 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #223 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49626.45318; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007052 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #223 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 "road-eastnet-nonat-223" #223: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #223) | 7a 51 ea 00 7b 14 8e 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e c0 c4 41 9a 95 cc 81 e9 60 68 ab 45 9c 08 20 | b4 5a a9 9d 67 49 a7 46 aa 2b 2c 92 19 0c 98 42 | fe fb 4d 10 39 99 af 92 9d b6 2e 88 4d d0 11 c1 | cc 58 dc fa d8 45 59 75 a4 74 03 ef 28 b6 b2 df | 65 14 7b c4 56 cb 7e 8e c8 a4 2d ad 67 70 a7 55 | 5c 9f d8 c8 c5 46 4c 1e 63 7d 5e ab 57 ab 59 40 | f4 a8 4b fe 89 d6 bf 01 54 f9 46 07 86 f8 bc 75 | ef 26 9f 79 f2 7c 5a c2 f7 65 21 b4 f5 f9 18 0f | 7d 48 47 25 7b 23 3b 60 c4 8a 45 86 e2 31 42 68 | 91 5b 9e 0c 6c bd d5 91 7e aa 25 22 d3 ee bf b3 | c7 ca 4c a5 a7 05 79 a5 99 a0 88 70 14 6f be 39 | bf 8f 50 de 92 0a f3 4f c2 47 ed ec a9 88 76 bd | f2 c3 85 8c 4a 5e bf dc 44 3e af ee 45 cf 06 99 | e5 de 11 6a 2b 48 7c 22 42 d6 dd 11 a6 82 39 4f | 9c 24 2f 97 4c 87 c3 35 46 b2 19 ca 91 0d f2 ce | c9 8b b5 a0 e0 d7 a9 24 95 51 89 2f 04 0b 43 0c | 29 00 00 24 82 03 c4 08 4c 73 33 ac 95 33 24 a4 | 7a b6 82 c3 62 e4 f0 a1 f5 68 f8 16 c8 95 15 db | 31 e3 65 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 01 2d a5 d7 3f aa d5 34 53 23 34 | 04 fb 26 40 92 12 55 4e 00 00 00 1c 00 00 40 05 | a6 35 a0 ce 14 8d c6 b8 e2 da 44 eb d4 cc fd 65 | 95 2a 9c c1 | libevent_free: release ptr-libevent@0x7fb3700251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4bfd0 | #223 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a 51 ea 00 7b 14 8e 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #223 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #223 | rejected packet: | 7a 51 ea 00 7b 14 8e 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #223: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a94540 | handling event EVENT_RETRANSMIT for parent state #125 | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #125 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #125 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49626.481521; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005463 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4bfd0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #125 | libevent_malloc: new ptr-libevent@0x7fb3700251c0 size 128 "road-eastnet-nonat-125" #125: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #125) | f8 42 71 02 91 3f e5 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 9e 73 35 93 13 e2 cc 9b bb 37 d3 75 99 15 b9 | c8 4a ce 55 d3 69 e2 90 ce b4 49 6a 8b 41 15 d7 | f2 46 e0 27 62 0c f2 50 c4 fb 7a 1e 5f c1 57 37 | ab d6 7e 39 28 cf 50 b1 15 3d a6 21 69 94 78 9b | 54 78 01 d1 17 2e a1 fd 93 52 02 9b 3c fa 9a 7e | f8 6f 1b 35 4d b8 9a ab 6d e7 64 f6 f2 1a 64 ed | d4 92 58 2f 44 f7 44 27 44 49 1f 1e 22 3d 31 b1 | 50 2c 4d bf f2 3d 61 05 62 ba 25 68 46 81 35 68 | ee 83 cc 8e 2f 04 b6 7e f4 22 67 88 a2 a7 7a f7 | d0 39 1f 83 7d bc f9 79 5c 9d a8 05 2d 41 b5 ef | cc 86 a3 2b c2 79 2a 6d ea bc cb e6 b2 db 61 3a | 30 32 b0 ff 93 a0 20 c1 58 b9 6f 0c 98 fb c0 64 | d2 03 d7 d7 ac 87 bc 66 28 b7 cc 94 87 ea 24 29 | 58 cf 8f 26 39 81 cd e2 dc 0f e9 13 b2 ad b9 3b | 9a e1 c6 4a a2 fb 0d d5 e3 d1 b9 df 52 b9 c6 69 | 37 c0 e4 dc a2 a0 32 29 a3 ce 29 ec cc 5f 70 82 | 29 00 00 24 10 12 73 da 9a 48 c8 49 81 7a 15 0b | 6c a0 98 5f 53 25 0d 7d 05 70 86 c7 7b b0 fa 34 | 5d 40 8d 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 88 74 d5 c4 71 1e 67 79 c5 82 86 | 3b ab 9f 01 a1 7f ec b6 00 00 00 1c 00 00 40 05 | cc 1e cf e5 ba 96 b4 e9 50 32 59 97 59 23 89 39 | 4f 1c 94 28 | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94540 | #125 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 42 71 02 91 3f e5 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #125 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #125 | rejected packet: | f8 42 71 02 91 3f e5 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #125: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0674 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aaf800 | handling event EVENT_RETRANSMIT for parent state #126 | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #126 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #126 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49626.557905; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005571 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94540 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #126 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 "road-eastnet-nonat-126" #126: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #126) | e8 37 9e 74 e5 40 14 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 2e 1b 05 80 5b 31 08 d1 66 2e 5c f6 e3 82 b6 | cf 5f b9 6a dd 55 f8 75 d5 3d b8 5c bd 4f c2 50 | 0a c1 a5 ba ac d3 ed a9 a2 26 e9 cf 5d c3 e4 66 | fe 0f 85 c2 a3 49 2f d8 4a 79 55 9a fa 0f f5 79 | a1 74 22 f0 7e 0f 09 7b 62 ab a2 9e b4 ea 39 68 | 42 b2 f9 25 9e 6d 73 5b 0f 09 1e ea 93 29 57 3e | 0b 28 34 22 62 d9 38 bd 99 bc 2b d5 1f 39 74 2e | a0 e4 e1 6b 64 87 fc 4f 05 cf 11 87 31 49 19 0e | 81 e6 fe 59 5e 93 b2 b8 96 16 02 eb 5c 73 68 d5 | 8f 57 c4 c3 f1 4b 35 e7 45 9d 6f ab 95 16 38 da | 48 f9 98 9a 6a b3 e3 05 7e d3 b1 16 a3 ba 0c e1 | 94 2d b8 d2 c3 17 d4 a2 cf ba 7e e1 17 95 db f9 | 30 a3 18 b6 15 c5 b0 4b 3c 79 61 0d 1e 89 51 db | 9f 34 0b 87 9c ce 8f 37 05 a4 88 d5 17 64 46 6f | 94 21 dd 40 17 99 04 39 5f 44 53 61 87 2c 68 27 | 48 25 14 cc 6b a9 f6 c2 49 c7 4e ae 4c 5d 8d 5b | 29 00 00 24 d1 b1 6b 78 78 5e 9b dd d4 c3 b9 87 | 6c a1 e5 10 d6 78 32 5b 72 67 12 c8 56 ea b2 20 | 83 0f e6 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 48 05 b5 88 11 05 1e fc 96 b7 8b | c4 84 87 55 48 6d 71 7e 00 00 00 1c 00 00 40 05 | a7 78 89 b5 72 dc 59 97 b9 1b 86 02 9b 2c 28 d0 | 8e b7 7c 05 | libevent_free: release ptr-libevent@0x7fb34001f920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aaf800 | #126 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 37 9e 74 e5 40 14 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #126 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #126 | rejected packet: | e8 37 9e 74 e5 40 14 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #126: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0709 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7fec0 | handling event EVENT_RETRANSMIT for parent state #224 | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #224 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #224 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49626.617308; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.002935 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aaf800 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #224 | libevent_malloc: new ptr-libevent@0x7fb34001f920 size 128 "road-eastnet-nonat-224" #224: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #224) | df 89 b3 52 1f 0f f1 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 96 f9 c5 cf 52 6e 98 60 ae 95 1a e5 7e 1a 31 | 50 be ef 8d 41 26 11 5a 53 58 33 b0 a8 71 a8 6c | e8 76 92 5b e2 75 f3 94 63 68 60 f5 a8 87 0f b1 | 85 e3 57 f0 0a 68 7c 03 0c 38 78 58 ee f2 b7 98 | 27 f8 ff c8 7f ae 35 5b f2 27 8d 00 b6 82 75 2b | 3b 8a 79 42 25 39 44 44 74 88 57 0d 59 d9 ac 5f | 3a a3 28 54 30 c8 14 8d d4 ac c4 45 3f f7 ef e3 | 1f eb 55 97 53 44 9f 09 90 a7 a8 b1 9f 93 b7 ec | 77 b6 57 89 c8 dc e6 37 8a a8 71 f3 b4 89 24 f8 | 4d 88 b5 f8 54 45 64 00 76 98 8f 87 5f 00 73 6a | f6 f0 80 19 81 11 66 a0 99 ea 82 6c 63 da b4 a5 | 98 93 6c 76 ef 6c 97 72 9f 10 64 96 91 57 93 6d | a1 3f 92 89 58 38 d2 cf 72 5f 0f 1e 71 7d 51 50 | af 30 4c 3a ad 78 8a 2d 7e 0c 42 b8 89 96 d8 fc | a1 5f f4 b6 9f 10 b4 87 26 b0 a3 fb 36 06 d9 24 | c5 ea bd 98 29 fe 3b d7 81 37 c6 01 f7 9b f8 78 | 29 00 00 24 c7 58 00 d8 91 d9 da 4a 3e 8b 1d 2d | a3 43 99 18 27 ab 56 0f 2a b9 54 4e 52 a3 14 24 | 6c 73 a2 b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 40 3a 6a 95 ab 61 8d 6b 1f 3b c7 26 | b3 ad 90 46 7f 26 ab 97 00 00 00 1c 00 00 40 05 | 80 ec 8b 4c 52 09 6e c6 12 ca 33 07 bd aa 68 3f | 33 bf 9b d1 | libevent_free: release ptr-libevent@0x7fb34402a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7fec0 | #224 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 89 b3 52 1f 0f f1 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #224 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #224 | rejected packet: | df 89 b3 52 1f 0f f1 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #224: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a60690 | handling event EVENT_RETRANSMIT for parent state #127 | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #127 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #127 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49626.652654; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008091 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7fec0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #127 | libevent_malloc: new ptr-libevent@0x7fb34402a950 size 128 "road-eastnet-nonat-127" #127: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #127) | 63 d9 7e 94 07 33 4b 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 5b 4a 46 df 60 33 0f 95 de e0 db c8 23 3c 72 | 78 4a 11 2d af 6a 95 71 57 bb 1d b2 0d c1 6e 56 | 18 59 e0 13 b5 5d 90 db b2 9a 12 87 33 39 67 e9 | 2a 2f bf ff 22 ca 7b ca ba cd 4e 56 00 bb 9c b4 | 81 b8 dd 6f 82 ec c7 49 d2 fc 91 38 84 1c a6 e9 | d6 e7 21 dd e8 11 d8 38 94 4d 8d 43 29 97 aa c4 | 81 24 9f fc d5 c9 48 0f a7 fe 34 f9 6d 30 3e 1f | 7a 4f f5 5e d9 cc da 01 80 42 b1 dc 13 04 fb 2f | cb ae 40 53 b9 7a ac 75 1a e1 0f 4b 6c 39 b0 ff | 2b d7 8e 64 87 22 57 2b a9 3e db 52 7f 0f 13 61 | 69 1f 61 e7 d0 1e 23 3d f6 9d 28 2b 3f e5 f0 23 | 95 70 12 d6 55 37 d1 5b 40 5e db 9b 46 bb 6c 24 | 88 d7 92 17 91 7b 88 03 03 b9 b9 93 f8 4d f8 75 | f3 71 3b 2a a2 b6 bc ae e3 8d ee 63 ed ee d1 97 | a9 a0 39 37 70 8d 13 eb 74 48 45 78 0b 87 f6 b1 | 15 7d 71 1f 58 45 48 e4 7a 5a b6 44 5f 0b 02 01 | 29 00 00 24 18 52 6f 35 05 34 eb 05 2a 3b d4 f4 | de e8 63 2a a6 7a 78 01 4b 37 13 8c b7 e1 00 ae | 6b 38 e3 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 57 41 80 41 67 da fb a0 6b fa cf | 8b d9 9a b2 68 5d 7b 8a 00 00 00 1c 00 00 40 05 | f9 e3 24 ce 79 a6 67 62 c8 57 cc ee 7e 1e 81 c5 | 41 7c 30 2d | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a60690 | #127 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 d9 7e 94 07 33 4b 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #127 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #127 | rejected packet: | 63 d9 7e 94 07 33 4b 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #127: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac1340 | handling event EVENT_RETRANSMIT for parent state #128 | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #128 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #128 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49626.743036; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006198 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a60690 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #128 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 "road-eastnet-nonat-128" #128: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #128) | 77 d1 59 6d 55 cb 18 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 01 e0 bd 82 fe e0 91 d9 ed 2a 7b 41 58 aa d2 | c1 83 b5 d4 08 da f3 c7 61 8a cf 68 fe 9a 21 e3 | 57 03 c4 31 d0 d0 ec 56 cc 27 d9 52 cc f2 63 0f | a0 ad 50 12 a9 19 98 c4 cb 8f 93 9b 57 4e ae 53 | 05 9f f7 4f 18 99 38 38 06 c2 82 4a ed ef 9d cc | 7b 44 9f 1c 19 10 74 71 d4 89 98 82 e7 d0 72 33 | aa 5f 8b bd da a0 8b 0a 73 9d 51 cb d2 a3 14 69 | d1 4b 0c 71 9d 71 26 5d bf 23 7a 67 5d 15 2b a2 | ce b7 8c 37 a6 d1 63 b0 6b dc f1 b5 b5 72 45 86 | c8 59 1a 35 a1 54 36 81 14 ea b5 34 cc 86 95 36 | de 73 da 51 28 93 ec 98 2d 7a d9 01 e1 1c 11 2d | 35 8e 59 23 0d de 42 1b 00 c8 28 40 ea c4 bc 1a | 0b 22 97 22 23 59 28 f2 30 da 60 85 07 fb be 9a | 26 22 87 03 aa 66 5a 47 26 21 89 bb a9 0e 6a fe | 60 1c 6c 90 e2 96 28 ae 41 e9 23 65 8c f4 23 57 | 72 00 10 88 06 ca 67 04 cf 4b c7 04 50 60 fe 2f | 29 00 00 24 3b ae 04 a3 29 53 44 16 26 36 89 01 | ad 8c c7 bd 38 5d c9 f9 a5 cd 29 aa 82 21 0f 5e | 4f 91 67 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 73 cd 7c c3 ca 92 54 ff 7d 3a 5c | 01 84 d2 b8 f1 a4 c9 bd 00 00 00 1c 00 00 40 05 | ec 18 dc 66 2d cf 71 2e 85 c0 4a 75 63 a1 b7 19 | b3 41 97 a0 | libevent_free: release ptr-libevent@0x7fb344035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac1340 | #128 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 d1 59 6d 55 cb 18 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #128 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #128 | rejected packet: | 77 d1 59 6d 55 cb 18 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #128: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae4880 | handling event EVENT_RETRANSMIT for parent state #225 | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #225 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #225 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49626.766644; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.014192 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac1340 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #225 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 "road-eastnet-nonat-225" #225: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #225) | 1c 46 35 b1 a5 15 7d 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae fb 41 53 6b 81 0b c3 2d 10 6f c4 43 42 9b b5 | 58 ae de 87 ce bb b8 82 21 69 b3 17 de bc f9 c2 | a6 34 e7 7f 32 f0 7d a7 6c 08 3e 2b 62 ab 16 a0 | 49 34 97 75 bc a1 e7 57 c6 b6 15 50 f3 8a f1 c4 | e3 18 e0 09 c0 26 64 c1 d3 38 7d 95 30 90 58 4d | 99 27 bc 98 4e c8 b5 39 36 2c 46 50 c2 b8 f6 07 | a6 3c 00 2b 8d 8c 50 f6 a6 08 bd fd 79 68 91 be | 81 69 f3 24 98 59 43 c8 78 e1 dc 86 d2 16 6e a3 | 6a de dc a4 19 ff e6 d6 63 67 69 75 d8 ae 52 31 | c3 a7 ea ea 95 69 03 74 0f ef e1 6f 99 0c 56 d4 | 62 d0 1b 8d 8f 7c ad 94 ab 7c 03 43 80 8a 6e bb | 36 aa d3 44 03 e6 5c 20 d3 4b 45 e5 a2 5c 00 25 | 37 ab 32 ce e0 ae 35 8e 13 d7 03 37 11 57 20 f8 | ae 87 85 bc 10 d5 2c 64 54 e7 c4 49 10 99 df 04 | 79 9e f4 43 41 4b 6a 31 13 21 e7 cf d7 1a da 5b | 4b c0 6d 43 c6 e7 f0 86 e7 2a 75 03 ec 4c de 27 | 29 00 00 24 27 0f 48 fe da 9f b7 b6 f5 85 2e 21 | 09 ff e1 4d 05 12 3c c0 4b 2e ad df df d0 69 83 | 11 81 8e 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 11 33 1d 86 3c cb d4 6f 7e 68 c8 | 95 dd 6a 6a 4f 3e eb 1f 00 00 00 1c 00 00 40 05 | 41 16 5c d3 40 8f 72 70 a4 ea ff c4 c5 31 7c 04 | 7c 81 7f e0 | libevent_free: release ptr-libevent@0x7fb3700407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae4880 | #225 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c 46 35 b1 a5 15 7d 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #225 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #225 | rejected packet: | 1c 46 35 b1 a5 15 7d 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #225: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6e010 | handling event EVENT_RETRANSMIT for parent state #129 | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #129 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #129 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49626.82738; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00748 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae4880 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #129 | libevent_malloc: new ptr-libevent@0x7fb3700407f0 size 128 "road-eastnet-nonat-129" #129: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #129) | 72 fb d4 3a 3d 31 ef 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 72 cd 05 8b 1a e1 a8 66 68 a3 88 d4 37 ab 29 | 8d ca b6 b0 86 38 49 65 ce de c8 b0 39 b5 e5 f9 | 49 66 a0 ac 83 68 f5 08 38 44 61 fc b4 c4 e3 93 | 86 b2 c8 75 e1 f1 8d 43 35 de 04 cc bd e4 ef a7 | 8b 7d df 6d 22 63 24 bb ce 8f 77 d1 43 ca 6b c6 | 70 cf 4e 81 02 44 0d 39 85 28 ca ae 69 3d 8b 1d | 8e 2a f9 28 37 54 47 1b 7f 1e 6c c3 e7 ca 7d c5 | 5d eb 2d b5 ee 04 65 71 a3 9b 69 bf 7f 5f e0 e8 | b1 ac e6 e0 77 7c 27 c0 f7 96 26 05 ab 95 ca fd | fa ef 5c 22 dc 42 3f 47 3c 21 7c b3 45 c2 0f 2d | 47 18 59 0f e9 05 83 ad b3 18 86 6e 4c 0f 6a 6f | a2 bf 54 51 83 2a 64 42 06 32 16 00 c7 cc 1b e9 | 3e b9 e5 cf 6c 0f 2e 6b fd eb c0 0a 44 95 18 9e | 2c d3 00 4b bf 67 5f 7a f5 b4 f7 f7 d7 fd a9 64 | 98 77 b8 cc 18 a8 1d 3e 8f 95 27 46 f6 67 44 7b | 96 ba b1 ae ad ee 56 93 ac c5 ad 91 dc 2a d2 ba | 29 00 00 24 64 51 a8 77 1e c3 b2 0e 1e 7b 14 6a | 5f 64 3b ca 18 8a 91 d8 b8 bf ce 82 b9 6f e1 5d | aa 66 20 12 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f cd a9 5a 90 93 b1 13 f3 88 1c ea | 0f f5 0f 31 39 58 6f be 00 00 00 1c 00 00 40 05 | 0e bb c8 26 22 69 20 e6 e2 bf a8 b0 a2 3b 98 e4 | e2 fb 7b 71 | libevent_free: release ptr-libevent@0x7fb36800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6e010 | #129 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 fb d4 3a 3d 31 ef 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #129 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #129 | rejected packet: | 72 fb d4 3a 3d 31 ef 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #129: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0649 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acc140 | handling event EVENT_RETRANSMIT for parent state #226 | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #226 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #226 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49626.882193; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.009512 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6e010 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #226 | libevent_malloc: new ptr-libevent@0x7fb36800cf80 size 128 "road-eastnet-nonat-226" #226: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #226) | df 8a 99 41 35 8f 22 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 39 0d ed 10 1f e3 0e ea ca 85 c3 5a 17 31 22 | 97 9f 06 33 b0 59 ed 25 d5 cd 46 5c e1 b7 68 7b | 60 f5 73 ac 22 e6 10 7a c8 3f 64 54 b7 2c c9 ba | 36 26 b8 60 a9 a1 e6 a3 6e 44 7f 00 0c 75 49 7e | c6 17 73 3d c6 70 48 38 43 a2 56 d7 f5 0c 3f 3f | 3f 97 93 c5 a1 2b c4 07 4f 49 5c fa 0d e2 93 83 | 1d 93 5e ee cb e1 2d 5d 17 f0 04 37 84 12 a1 e4 | ea a7 ca c8 ca 5c 70 fb 0f d5 b4 aa ca 0a eb f9 | b6 b5 03 c1 29 21 80 90 c2 2f 2a fe 6c ab e2 c4 | da df fe dd 41 56 bd 81 ee 73 c7 0a e6 2a 84 64 | 7e c8 7b 2b 7f 3e cd 94 23 75 81 89 67 c2 03 bf | 33 3e d9 d2 a5 ec 73 d5 af 8a 02 94 e8 dd 1e 6c | 57 45 a8 23 17 bc 83 80 e2 7d fe e3 0d bf 65 a8 | 6f 93 8d 7c 46 a5 58 a7 45 54 b1 bb ae e2 cb 5a | 09 4c cd b3 40 87 10 07 3f c6 8e 21 cf 42 d3 a0 | 05 bf ba f5 eb 01 2d 75 a7 76 4b e5 7b 42 b7 8d | 29 00 00 24 c0 94 06 00 9d 87 40 a0 ec d8 4c ee | 0c 16 0e a6 24 3d 43 67 f1 e5 1b a0 19 81 a3 5d | 35 48 05 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd dc 27 ce 4f 2a 14 a6 0d 4a 3f dc | 07 9c 36 b1 1b e9 59 bb 00 00 00 1c 00 00 40 05 | e3 eb a3 4f 44 c3 b7 5b e6 19 f6 7f 9a 7d 29 4c | 6a 02 ce 75 | libevent_free: release ptr-libevent@0x7fb3440300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acc140 | #226 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 8a 99 41 35 8f 22 b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #226 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #226 | rejected packet: | df 8a 99 41 35 8f 22 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #226: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0731 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a903c0 | handling event EVENT_RETRANSMIT for parent state #130 | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #130 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #130 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49626.896833; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005179 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acc140 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #130 | libevent_malloc: new ptr-libevent@0x7fb3440300e0 size 128 "road-eastnet-nonat-130" #130: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #130) | 85 43 6a ad 59 7d ce ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 ae b5 ed fb fd 70 00 13 8d 64 ee 46 d1 86 03 | 85 09 b4 b0 21 e1 75 08 18 f5 01 a5 ce d9 28 32 | 42 84 d9 a2 5d 29 4b 02 ec 24 a8 1c 76 d6 11 b3 | b7 ca cc 7d bb 8a 73 62 20 57 c8 ee 7d 78 9e 1d | 7a d7 f6 f5 3d b0 f3 26 b5 f8 7e 6c 34 29 9d e1 | 66 87 a7 94 04 46 39 e6 b7 02 1f 92 b6 19 a4 2b | 93 1f ea 2c 8d 99 b7 50 6f cd f0 d6 4b e1 d1 c9 | 7e 98 1d 25 8f 0a 2c a3 9a 8f 46 07 29 ef b1 91 | 6c b5 e6 a3 11 c5 c9 c8 5f a8 7f 93 e8 c3 28 29 | 1d 87 06 30 a9 b3 18 af 13 99 e2 ea 6d ca d3 37 | f0 97 8e c5 32 05 cc 70 9c 35 a3 ab 7d bb 03 4c | 6f 27 f2 98 7e 64 26 7d a4 db 20 0f 0c 9d fa ef | 62 00 52 b0 8e 30 a4 8a e8 bb 41 07 76 b9 71 f2 | 63 f8 6e da 4f 74 79 ae c9 5c 70 e4 82 06 94 fd | 62 5b ee db c2 84 ae ea bf 8a 91 a6 ef 57 d0 e7 | d1 ef 3e 19 e8 2e 02 37 b6 05 eb 7c 5d f3 b5 d0 | 29 00 00 24 6c 1f 45 88 1e 42 31 9a b9 27 19 26 | 95 8c 4f c4 41 99 09 32 1c bf f6 27 de 6a fb 55 | 00 73 7a e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 41 0f ce 80 1a 0e 57 d0 34 7b d4 | 5a 51 a5 89 80 d3 8f c9 00 00 00 1c 00 00 40 05 | 7f 09 ba 77 a9 79 98 e7 5b 47 dc 5e 0f 55 ef 6e | 76 2d 29 18 | libevent_free: release ptr-libevent@0x7fb34c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a903c0 | #130 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 43 6a ad 59 7d ce ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #130 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #130 | rejected packet: | 85 43 6a ad 59 7d ce ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #130: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0692 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45310 | handling event EVENT_RETRANSMIT for parent state #131 | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #131 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #131 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49626.967199; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005783 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a903c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #131 | libevent_malloc: new ptr-libevent@0x7fb34c02a950 size 128 "road-eastnet-nonat-131" #131: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #131) | ad 34 7c 82 56 8e 42 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 46 e3 f8 a7 ca 79 f1 93 d8 0a 34 f9 91 ea 90 | 77 1f 83 03 4d 56 b1 a2 80 fd 5f 11 9a a9 0e 07 | 36 d2 ed 03 17 79 a3 f7 12 9f 05 ea 25 52 aa 39 | 69 97 15 3f 13 ff 62 78 88 a8 12 45 6d 5a 25 bd | 48 89 e9 ef 1f ad 28 87 00 42 ce a4 5f 7b 92 dc | 5d 1c f0 bb 25 31 dd e0 95 17 e2 9c e6 0b 50 26 | d7 14 f3 fe 1e d8 81 cc 32 fc 47 d4 65 1e 3b 75 | 32 54 1f 31 95 11 57 b2 4c 02 a6 33 ce 14 e9 e2 | e8 05 1b 1c cb 66 89 aa 6f 57 54 90 f2 c1 cf bd | a5 b3 7a c8 ef 67 d8 5e 26 3c 19 61 97 89 69 83 | 4b df 7e 44 0f 87 25 bc 6c 4f d8 49 5f 35 7f 1f | 6e 25 45 69 17 ee 43 65 f2 ee f7 63 5d 98 79 9e | fc c9 a2 e1 68 04 58 49 4b 9f c5 76 64 08 49 29 | 17 3a 17 1d 87 31 e4 d7 77 de 85 c2 0a d4 26 0f | 9f f4 0b fc 3f 26 bf f9 03 95 99 d3 57 10 6f ed | 92 8e 36 88 87 df d0 52 c8 ab 1d e3 6f cc ae 49 | 29 00 00 24 3c 10 ae 50 61 d8 53 b3 d3 e2 21 42 | 85 3a 07 db 01 3a f5 3e 94 0e a7 09 dd b2 ae 2b | e1 07 91 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 36 c8 4a f5 a5 90 83 e4 ec b2 3e | 44 38 46 9b 6e 4b f9 11 00 00 00 1c 00 00 40 05 | 1e 37 ad 88 e1 0a 42 8f 3f c7 b2 8c f4 b1 3f 27 | c4 6f 80 e6 | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45310 | #131 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 34 7c 82 56 8e 42 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #131 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #131 | rejected packet: | ad 34 7c 82 56 8e 42 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #131: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47f10 | handling event EVENT_RETRANSMIT for parent state #227 | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #227 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #227 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49626.985495; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006848 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45310 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #227 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 "road-eastnet-nonat-227" #227: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #227) | c5 c2 6a 83 d2 66 bb b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 5b f4 b6 58 9a 18 76 c3 e1 6e 19 2a 39 ae a1 | 62 ea 44 d1 30 52 4d 8a 54 61 7d 23 98 f8 8d d5 | 84 3b 68 fd c2 f3 21 b9 78 0c dc e3 83 0f 8e 04 | 74 b0 67 51 d8 1a 83 67 df 2f 54 ee 3c eb 78 8c | dc ab 5e ad 88 89 74 dd b8 42 f8 3b 65 bb c7 d6 | 58 b5 ad 0a ef 24 29 f4 ee 94 22 81 71 d7 21 71 | cf 9a 96 87 e9 3e 34 bd 96 10 75 82 fd 44 7e e5 | d5 b4 6d be 50 02 22 60 ae ae 61 82 1e 48 c4 e8 | fb e2 e4 71 81 50 e1 9c 82 80 8f 59 e3 b5 cd 3d | 6c 63 88 9c 58 f3 61 37 6d 11 4f 91 c3 dc 04 d5 | 78 82 60 cb 5e 0d 1d a4 89 4d 74 78 d6 b1 e9 18 | bf 79 a1 1a 16 e0 b4 3d 00 ec 02 c0 3f 69 19 a5 | ad 3d e3 6c cb 66 a6 b9 ff c5 30 88 8f f5 e7 a8 | f5 33 4d 86 13 42 87 b3 82 49 90 36 bb 5e e9 47 | c4 bf c9 a4 e4 1a 35 38 6a 04 9b 4b 05 29 61 c8 | cf c0 72 4f 16 6a 7e 8b 6f 02 0b ab 68 bf 34 71 | 29 00 00 24 73 17 4e 35 59 6e 44 c0 fd cd 46 68 | 7d aa 47 75 fe fd 8d d7 e4 53 d6 a0 cb 05 84 4f | 51 ed 61 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 60 9b b9 46 e5 98 89 ad c1 cb e5 | e9 7b 12 83 3d 55 5a fc 00 00 00 1c 00 00 40 05 | 0c dc fe 43 8b 17 32 a8 d8 5e bc 45 b2 f1 c1 93 | bc b6 5b dc | libevent_free: release ptr-libevent@0x7fb37801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47f10 | #227 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 c2 6a 83 d2 66 bb b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #227 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #227 | rejected packet: | c5 c2 6a 83 d2 66 bb b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #227: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46906b40 | handling event EVENT_RETRANSMIT for parent state #132 | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #132 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #132 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49627.030831; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006621 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #132 | libevent_malloc: new ptr-libevent@0x7fb37801d920 size 128 "road-eastnet-nonat-132" #132: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #132) | 8f fb fe 61 19 e1 9c b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 1f 4f d1 68 44 b0 da 10 cc a3 65 0b 05 29 46 | a5 ef 62 34 d2 17 30 f6 7e b7 1c 3d c0 61 fd c8 | 25 96 8a e1 67 57 19 a7 8f 6a aa 6e 4c 1e 1c bb | 2a 10 04 d7 17 65 58 ce 83 ac 91 4f 48 71 e3 8d | af 3f 22 d8 df 00 4a d4 1b df 76 a7 ad 26 ba ba | 91 be fb 08 a9 70 66 2f 99 bf ef e8 c6 21 cc c0 | ed 1d fb 20 f6 60 07 53 22 da 88 1b 1d 11 4a 37 | e6 c8 75 11 02 89 b4 55 ec 0c 8b 31 52 06 0f 18 | 81 e2 42 d3 fe 87 7f dc c5 02 18 bb 87 cb 91 7a | 01 aa 5e f6 49 fd e3 ed df 8b 65 4a 5d 0c dc 05 | 45 9e f7 6f 6c 11 d8 bd 19 75 3d 5b 55 32 77 3d | 44 4c 11 8d 32 50 da 6e 0a 86 ef 69 5f 2a bb 9d | b7 76 10 6b da 52 00 cf e9 de 40 71 fd 9c 21 a3 | 2a ac 7a 1a 3b 67 9b 88 e6 1e 25 7c 3a 6e 9c 54 | 4b 96 e9 1a 08 38 3b 3b 27 21 e9 0c 79 a6 d9 1c | 14 07 fc c1 42 9e 29 79 0d 68 f7 e2 3d 93 ce 38 | 29 00 00 24 92 fc 82 18 58 23 4b 06 62 ee b8 b2 | f1 d5 54 0c 3d b0 88 33 58 36 a6 39 d7 5f 04 ee | ca 34 01 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 e7 04 0b 0d 59 5a cd 8a 54 e3 8a | 4e 81 3b 76 de 25 c1 57 00 00 00 1c 00 00 40 05 | c3 b5 61 af 5d 2d 46 0f c8 2c 48 99 41 b8 6c e0 | 5b 12 cb e3 | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46906b40 | #132 spent 0.176 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f fb fe 61 19 e1 9c b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #132 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #132 | rejected packet: | 8f fb fe 61 19 e1 9c b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #132: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0714 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8ee40 | handling event EVENT_RETRANSMIT for parent state #228 | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #228 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #228 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49627.0792; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004842 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46906b40 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #228 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 "road-eastnet-nonat-228" #228: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #228) | d5 f0 72 59 9f 13 94 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 4d 11 72 16 86 29 05 39 41 97 2f ff 33 6b a3 | e2 5f 51 ee 71 23 04 d6 72 0c fb dd 15 ef 6d c8 | 1d b7 c6 17 96 9b 3b 82 3f 74 55 80 22 53 76 ea | 2b 12 aa ae d8 aa 3b e7 03 c1 8e 79 97 e5 92 eb | b7 6d 0d a0 78 62 d0 f2 27 fb a0 42 72 ed d8 cd | 0b b4 e6 0c 99 75 b7 07 dd f8 fc 47 fd 38 1d bf | fc 96 ec 5d d0 ea 7b a2 99 77 8a 86 42 74 89 83 | 1d d8 30 c9 41 1c 6d 04 55 5a e4 6a 7f a2 48 37 | 02 c7 31 e3 a7 ef f2 c3 5f 9e 83 8d 0c 35 c9 0e | e5 2e 96 42 63 e4 ee 14 f2 43 a8 13 d6 19 12 1c | 71 11 80 4d 71 0f 19 3b 63 b8 05 30 82 8b 88 80 | bc 55 78 f9 8c 98 4b c3 03 95 ca f9 2f 2c ae 8f | 75 58 72 ba 8e 10 73 eb 12 6f 65 4a c0 7e 83 a9 | 2f 5f f5 39 44 b0 f3 71 90 fa 59 65 c5 77 f4 ce | b1 2f 6d f7 a7 ee d0 bc fc b5 7f 3e 18 f7 e0 77 | 4c 26 72 38 ff 07 80 23 0f 43 31 54 b4 87 d0 e8 | 29 00 00 24 53 c7 ad d5 ed 06 63 64 b1 b9 04 17 | 96 5d 45 22 6a eb a8 60 3b 32 23 a5 f3 37 e3 7f | 1e aa 66 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 e7 5c 74 6b 3c 37 c1 41 0f fa b6 | 88 19 1c 11 1d 3e 7c 16 00 00 00 1c 00 00 40 05 | e2 48 33 be 38 78 72 f6 d1 00 6b 61 a1 72 02 86 | 37 c7 48 ae | libevent_free: release ptr-libevent@0x7fb36c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee40 | #228 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 f0 72 59 9f 13 94 bf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #228 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #228 | rejected packet: | d5 f0 72 59 9f 13 94 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #228: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0688 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56e70 | handling event EVENT_RETRANSMIT for parent state #133 | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #133 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #133 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49627.094567; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006919 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee40 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #133 | libevent_malloc: new ptr-libevent@0x7fb36c0251c0 size 128 "road-eastnet-nonat-133" #133: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #133) | 93 2c 91 72 20 8c aa 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c d8 f9 2c 2b a0 b1 31 57 35 e0 04 75 fa ff 27 | 53 64 2e 54 ea 38 e0 ef 52 11 3d 36 64 b6 af 29 | 51 f7 3a cb 03 fb a8 9c 8c 4c bb 74 63 76 7d d1 | a9 88 c4 5e 87 dd 7f 20 3b 30 84 84 16 86 c9 65 | d1 47 a8 28 8d 73 90 06 c4 7f 57 27 02 dd dc 34 | 3e 36 07 bc f4 b2 13 c9 ca 56 ee e3 b6 fc 0e 46 | 17 c4 47 02 3c 22 35 e8 99 a1 3a f2 88 57 e2 b2 | 76 46 aa bb c5 86 a7 a3 5d df 02 48 a4 96 00 22 | 34 1a 70 44 11 10 cb ff f2 1d 21 21 00 41 5a a7 | a1 5f 54 12 46 7f 51 02 26 94 4f 54 f8 0e be ce | 2f 5a 2b 9b 25 dc a0 31 41 2a dd d5 76 31 f7 83 | c2 70 58 eb 31 ba 5b 36 57 70 32 a0 20 3d ec e9 | 48 52 21 d4 39 1a 79 f6 31 e1 9a c8 d2 b3 fd 12 | 8c 10 74 fe 54 6f eb b1 c3 58 8e 49 2a 38 98 47 | 38 39 a8 64 1a 71 f1 c2 47 f8 d0 db da e6 75 10 | 1b a2 b7 e4 c4 eb b7 43 ca b9 9e 23 21 75 e9 b6 | 29 00 00 24 2f d1 c4 74 6b fd 49 84 52 1d 9d 1d | ec af 19 02 47 e5 8f b7 c6 73 48 d2 a9 91 58 b2 | b6 74 d3 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 b3 b4 a5 c4 da 26 36 c8 2a e5 e1 | 3e af ad 98 58 9a bf c4 00 00 00 1c 00 00 40 05 | 31 45 bd 61 73 08 cb 41 73 c4 72 6c eb e0 15 88 | 84 49 78 a3 | libevent_free: release ptr-libevent@0x7fb368046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56e70 | #133 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 93 2c 91 72 20 8c aa 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #133 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #133 | rejected packet: | 93 2c 91 72 20 8c aa 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #133: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0479 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad9ac0 | handling event EVENT_RETRANSMIT for parent state #134 | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #134 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #134 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49627.152855; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005373 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad43c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #134 | libevent_malloc: new ptr-libevent@0x7fb368046040 size 128 "road-eastnet-nonat-134" #134: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #134) | 80 c9 f7 0f 34 43 e8 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 45 e5 b7 ab 0c a4 4c 5f b2 54 d8 39 c5 f7 ae | a7 a1 c9 5c 2b 5a 97 72 d3 14 80 31 3f b5 24 0d | cb 02 f5 57 a3 d0 5f 51 b9 29 93 ae b9 a3 6f 26 | d5 1f 2c 2d f7 c7 46 60 60 aa 8f 11 69 88 d5 d6 | 7f c3 44 3b 7a f5 6e 59 77 4f a4 43 34 c4 26 e5 | ae dc 49 7d 8b cd 2b ab 18 68 bd 39 90 28 6c 4a | 23 91 a3 0e 3f fb 01 de 41 7d 06 32 ac 44 1c 44 | 83 e0 6e 5a 17 ec 28 70 e3 9f 5e 65 cd d5 6a 13 | f4 b1 48 8a 51 f8 b7 54 21 1a 5d da c7 53 38 a4 | e5 03 02 af 81 ae 46 39 d4 15 23 f5 a8 b9 79 ca | ed 1c 97 81 a2 68 bb 3f 5d 13 76 91 c8 b3 35 4a | a1 e6 8f 6f 10 12 49 6f 3e bb 3b bc 07 2d 62 f9 | 63 5c f1 5a ec c4 50 49 e3 cf a2 cc 8f 61 b4 4c | 09 95 92 ca 4c 19 06 a3 80 ad 6b cf ef 46 70 41 | 9a 5d 9d 72 62 c3 a0 af ac b6 f0 ed e6 2e a4 c8 | 97 d4 46 3b dc 90 f1 11 ff c1 1a f7 bc 4d b4 b1 | 29 00 00 24 d7 88 26 03 5a 89 cf 88 bf 43 40 13 | b0 8c b4 f5 85 1c 5d f5 ed 6d ea f7 d0 1d 42 5d | 64 c8 0e 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 5d 43 f9 e4 68 67 0d 96 3e 2a d1 | 87 17 c9 81 16 11 d8 11 00 00 00 1c 00 00 40 05 | 17 79 69 7c c9 bf 1a b4 97 b1 98 46 4c 85 68 c7 | a4 36 11 6c | libevent_free: release ptr-libevent@0x7fb36003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad9ac0 | #134 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 c9 f7 0f 34 43 e8 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #134 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #134 | rejected packet: | 80 c9 f7 0f 34 43 e8 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #134: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0974 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #229 | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #229 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #229 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49627.199234; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00833 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad9ac0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #229 | libevent_malloc: new ptr-libevent@0x7fb36003b0b0 size 128 "road-eastnet-nonat-229" #229: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #229) | 20 97 6e 08 83 53 46 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 59 ef 6c f0 3c e5 e0 cc 33 49 bc 05 30 a4 2e 63 | 40 b9 24 1d 30 3f 19 68 ce 4b ca f6 ef 1a a6 a9 | 5d 39 1c 86 c0 9f ab 47 fc 91 e7 41 3f 1d 89 da | 32 34 23 b2 92 45 82 aa b6 a2 b3 81 08 5d d4 d6 | 1a c6 db 13 96 83 8f db 02 0b e9 7b b2 14 62 aa | e1 68 37 82 79 1d ad b1 57 7f 25 a7 73 b7 37 87 | 5f 18 8b b1 9d a8 83 da d0 1c d4 ab 43 2e 39 e8 | 66 1a a5 36 6d 58 db 88 48 18 f4 d1 6a aa ea a2 | d4 61 12 6e 9d 66 34 26 cc 34 20 9e ee d3 7c 0e | b5 c3 c0 49 b9 a1 7d aa 84 e0 16 0d 30 3d 39 8b | 45 8b ca 2d 9a b8 31 03 33 bc e7 3c 1d 38 7b ad | c5 f3 f6 f7 be e9 2c 8c 87 60 cc eb a3 f8 ab f2 | a1 ec 16 ca f8 6c 96 69 77 3b 56 28 d0 57 05 dd | fa 6d 9c 0b 58 57 29 b7 d8 9e 77 ff a1 d9 ae 60 | 7b 96 73 6a b9 b8 7b 60 c3 f5 35 8e 8a fc 09 4d | 37 4c b1 4a c0 bc c4 90 71 ce a8 9f 0b 83 84 f7 | 29 00 00 24 bf ef 58 c8 50 05 c6 7d 73 f4 dc fa | 25 60 4d 48 2b 2d d1 e6 80 96 87 ef d5 27 62 2c | 4a bf b7 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 5b b6 cd 13 a1 fb 02 f0 d8 20 b7 | ee bd 8b 90 01 a4 d0 34 00 00 00 1c 00 00 40 05 | f3 e5 ac c7 45 89 3a 77 ae 9e aa 53 4d 4c 6f 3c | 03 52 b3 50 | libevent_free: release ptr-libevent@0x7fb34c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | #229 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 97 6e 08 83 53 46 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #229 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #229 | rejected packet: | 20 97 6e 08 83 53 46 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #229: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0697 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ffbf0 | handling event EVENT_RETRANSMIT for parent state #135 | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #135 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #135 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49627.212596; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005039 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #135 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 "road-eastnet-nonat-135" #135: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #135) | 6f cc 42 0b fb 9b 4b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 27 90 6c a9 76 2a c4 50 c5 bf 04 2d 39 82 d0 | f1 4e e9 ff 6c d4 67 d5 6a f7 c3 33 36 2d 41 eb | 01 b8 52 cf 33 75 55 83 36 e9 3b 1e e0 f5 4c 33 | f6 13 14 fe 0b 40 f0 7a 1d e6 e9 63 2c 7f 9b 3f | 43 d7 8b 49 de 08 d9 f7 cb b8 85 8d 24 76 ea 07 | 74 e0 eb 3b 7b 61 bd 6e d0 81 bc 30 2d b1 a8 bc | 95 7a c1 8e 91 81 20 78 4b 9d 5f 4b 55 88 98 a7 | 4c 89 7d 2e c5 f4 b0 76 31 ac d8 73 5d 09 ed 2d | bb 07 67 90 bf 59 f1 9b 89 79 b4 48 ab 68 0b 4b | a7 49 da 7c 24 b3 1c f9 17 8c 28 77 5a 6e 44 15 | 7d 9f 86 31 20 2d 95 04 ee 8e 03 70 03 dc 14 11 | e5 4b 44 1d be 0a 83 04 0b 7e 48 68 b0 0f 04 64 | 81 84 d0 41 fd 8b 49 2c f9 af ea 95 2c f3 49 aa | 7c 3c d3 83 ef 0f 20 1f 8b 15 3b 94 9d 57 0f 83 | e9 c9 85 72 a3 81 40 26 3d 9e 4f 4c 25 2e 6f de | 2e 5c c2 5b 74 8c 58 60 bd 5e 06 db 51 f6 b7 a3 | 29 00 00 24 4f 27 a7 6e b5 c8 d8 49 72 0f 78 be | 0c 3a 88 f4 37 97 d5 4f 51 27 f0 3f 45 0a b8 19 | ba c2 3b 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 5e 90 14 7c 0c 3f fe 72 ae db a0 | 43 97 c2 6c fa c9 b7 b1 00 00 00 1c 00 00 40 05 | 6c 85 24 93 7d cc 8d 2c 5e c0 f8 bf 19 38 1d 99 | 5f b9 fd e3 | libevent_free: release ptr-libevent@0x7fb36c046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ffbf0 | #135 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f cc 42 0b fb 9b 4b 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #135 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #135 | rejected packet: | 6f cc 42 0b fb 9b 4b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #135: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0492 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a68890 | handling event EVENT_RETRANSMIT for parent state #230 | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #230 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #230 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49627.273894; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004629 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aee080 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #230 | libevent_malloc: new ptr-libevent@0x7fb36c046040 size 128 "road-eastnet-nonat-230" #230: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #230) | 69 22 82 19 d7 c8 c9 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 71 02 af b0 7d 99 80 ca 0a ed d4 9f 12 56 05 | 6a 75 f1 ff 5b 89 24 b2 2d d4 89 b9 fc ea 10 f2 | df 8b 07 6c 92 3c 32 d6 01 3c 1f 7c 77 2b 56 de | 1e a1 3c 62 24 a6 4e 3c 9e 57 23 35 a7 0e 3a c6 | fa 5e 05 ee c7 8d 32 41 ce 29 80 63 51 1d 1e 52 | 10 94 62 f2 6f 5b c8 e5 23 77 b3 5f 63 5e f3 42 | a7 b1 47 2a 85 90 69 04 a8 c1 76 53 9f c5 2d 06 | 66 93 5b f5 d4 f1 c7 6c 23 0b 21 57 da 55 b4 10 | b4 68 7f 72 aa 6f fd bf fc 43 d5 6e 02 91 b0 ea | ca b7 fc 32 ec e5 bd 79 74 66 56 52 a1 e5 b7 e9 | d9 32 42 bc f6 01 cc 69 66 87 01 cd 32 29 bd 73 | ff aa f2 68 30 ae 30 af 09 b3 2b 2d 0b 90 c5 d7 | e7 b1 60 17 46 74 a0 50 98 f9 06 d2 06 37 1f b3 | 0c 89 d8 99 c7 ac a0 2a 5a 19 c6 cc 6e e1 77 ee | 98 e6 45 5b c8 98 8d c9 0d d9 64 39 5b ba a1 36 | 39 81 f2 e5 39 16 cf c0 fa 26 3f 76 ff 4a de 8f | 29 00 00 24 ca 6b 45 b5 ad 3a dc fb 46 3f ff f9 | b7 9e 2a f6 cb 7b a0 93 c0 ff b4 97 10 4e 36 19 | c5 61 7a bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f fa a5 ce 96 35 1e 80 97 f9 81 69 | 6c 9b 29 c3 b6 c2 c3 05 00 00 00 1c 00 00 40 05 | 7e 27 b2 4c db 32 1f 5b c7 5c 32 4b 9f eb 6e df | 20 af 51 69 | libevent_free: release ptr-libevent@0x7fb374014820 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a68890 | #230 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 22 82 19 d7 c8 c9 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #230 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #230 | rejected packet: | 69 22 82 19 d7 c8 c9 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #230: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.066 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b06800 | handling event EVENT_RETRANSMIT for parent state #136 | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #136 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #136 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49627.278273; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005467 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a68890 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #136 | libevent_malloc: new ptr-libevent@0x7fb374014820 size 128 "road-eastnet-nonat-136" #136: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #136) | d6 c8 9e 97 21 46 fb d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 a9 84 13 62 aa bd 1d ad 3e 60 88 dc a9 35 5e | 57 2f a4 3a d3 ae c1 11 b0 24 19 68 c2 75 c1 4f | 59 cf f8 40 bb af 7e d1 b9 71 42 ce c6 09 6e 74 | 9e f2 29 0d 91 21 24 74 6d 2f 10 75 65 f8 b8 44 | e9 15 55 bb 2b 6f 25 4c 58 9b 0b 45 c2 40 5a 9f | ff e2 b3 e2 f7 0d c5 79 1b 00 36 3a 21 20 e7 06 | d4 05 ab e6 7f 0e 4f 26 f4 28 cb d2 12 3f 60 75 | e8 8c 1f 18 e0 09 73 82 2e 56 2f fe 00 1a 31 26 | 0b 05 07 a6 fc 87 93 26 a9 c2 69 7c 30 9c 7a 89 | e9 2a 6b aa c2 98 8a d1 cc 85 ab 8a 1d b6 6c 3a | 46 51 76 9a 2b ea bd 4c 92 d8 c8 5c 56 7a b8 5f | 71 f6 c7 f5 f4 4e c8 ce cc 9b 6f 50 15 3b 30 b5 | cc 32 0c 15 e6 9e 78 33 f4 30 d7 c5 bc a6 29 97 | 00 2f a4 12 c0 82 9e 84 f0 b8 38 05 f1 51 00 d1 | 48 64 6a f9 cc d7 36 54 45 d6 ee 3e 02 d0 d5 50 | ec e5 a0 1a 70 ee 96 eb 78 4d 45 6b e4 50 2d ed | 29 00 00 24 24 22 aa ae c7 66 c9 3a 20 66 58 4a | 54 df 58 65 c1 5d d7 a3 b2 c7 e8 e8 de 15 89 70 | 84 48 bb d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 7f 22 d9 ee cc a0 1b 0a 4c ff 84 | da dc a7 a5 32 ec b3 c6 00 00 00 1c 00 00 40 05 | e4 4f b8 48 f2 80 69 e7 b9 85 06 aa 82 75 ce d9 | b4 81 0b 76 | libevent_free: release ptr-libevent@0x7fb360046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b06800 | #136 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 c8 9e 97 21 46 fb d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #136 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #136 | rejected packet: | d6 c8 9e 97 21 46 fb d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #136: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0687 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46af6380 | handling event EVENT_RETRANSMIT for parent state #137 | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #137 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #137 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49627.347674; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006193 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b06800 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #137 | libevent_malloc: new ptr-libevent@0x7fb360046040 size 128 "road-eastnet-nonat-137" #137: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #137) | 71 ba fb 1f 95 88 29 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 75 6d 4d 0f bb db 8d 24 d0 ba 5f 79 5b 88 be | 94 ae ea 89 7e 95 49 22 fa 6f 0d 51 90 a6 60 1f | 08 fe 3b 9a b1 a8 b5 c8 e8 a5 d1 c2 b6 3a f6 5c | 07 25 e1 53 6d cd f9 d3 3f 17 7a b9 97 ee 73 6b | da 87 59 77 74 9c 5c 05 a7 16 5c 85 33 f2 d8 f0 | a7 84 4c 20 01 fc 53 bf 21 28 ba 99 79 44 ea b7 | b7 e2 9a c6 4e 09 9d 5a 41 46 ff 69 36 bd 47 3d | 68 59 0e 87 0c b2 db 9d ef 27 b1 ef a7 c3 7d 74 | d1 bf 63 41 fd 34 70 c8 08 69 9e 0d 21 dd b6 ca | 61 47 c8 f6 20 99 94 42 4a b6 3c e4 c1 6f 59 47 | 32 7f e7 88 96 d9 c5 8f 82 9f aa 9b 0b 9e 03 53 | 65 a9 c8 5c d7 fe be da 56 44 27 26 98 d6 9a ae | 35 b2 bc fb a7 4d 1f ae ae 76 fb c2 8c 86 63 40 | 59 88 a0 8b a9 0e 3a 8f 10 76 ad e8 54 d2 9e 91 | 7a bc 03 79 61 0b 83 53 4c 4e 2d 22 ca 69 54 24 | ae 77 e1 5c 6b 3a ff ee 1f 59 52 e0 9c 51 48 2c | 29 00 00 24 f7 ec 22 b0 d2 45 cb de 11 9d 88 dc | d9 c8 87 82 94 72 01 b4 91 d8 41 1f 07 fb 13 21 | 60 9f a8 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ee b9 3b 05 6b fc 34 5a 00 ef 69 | 58 dc d5 6e 13 53 c2 0c 00 00 00 1c 00 00 40 05 | 42 f2 83 df 2f 64 fb 42 98 b0 17 b3 99 82 89 4f | 79 b2 42 ca | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af6380 | #137 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 ba fb 1f 95 88 29 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #137 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #137 | rejected packet: | 71 ba fb 1f 95 88 29 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #137: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab2380 | handling event EVENT_RETRANSMIT for parent state #231 | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #231 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #231 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49627.382024; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003481 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af6380 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #231 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 "road-eastnet-nonat-231" #231: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #231) | ec d8 99 0e 50 36 87 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea c5 d9 ea 48 9d 9d db e4 72 21 b2 eb fe e0 0a | 9b e5 ce 23 20 eb ad 65 b0 89 ca 3d 24 ef 66 7d | d9 a3 7a c2 3d 05 aa 43 9f 45 1a 14 d9 e7 ad 4c | 1c 30 1e e4 db 2e f5 09 08 f0 6c 1f 45 18 25 f3 | 98 35 42 0b 1b fc c0 95 3b d0 88 ca bf 43 11 51 | ba ac ee 62 bc ef 20 2d 09 0b 30 2b b3 a9 30 69 | 22 9f f7 e5 19 cc d8 4a 41 18 b5 2a 03 31 91 4d | d9 f3 33 5c b6 61 8b 80 4c 0b 65 d5 6f 4b 62 d8 | e0 38 d3 a6 32 83 92 b3 ca df 09 07 0d f6 33 d7 | b9 f9 01 8c 3b d1 ff 19 bf 3d d5 72 dd d6 67 1d | 24 a4 3b 88 00 71 46 68 47 66 c6 d8 6d 38 1a ca | 01 20 d4 7a e4 46 1b 52 ab ad 61 81 76 76 13 bf | 76 df 80 04 67 b5 86 86 0e 85 a0 4b 41 5b e3 0b | 3c 1a 51 b5 b4 55 ce 12 56 93 02 32 82 c4 86 69 | a7 eb 80 c4 8e 9a 08 dd 86 61 45 1e 8a 33 7c 03 | 7e 20 42 a9 8c 8c 89 72 43 a6 59 29 92 30 fd 49 | 29 00 00 24 b3 7b 27 54 be 06 93 cc 3c 78 ad 44 | 9e 7e c7 5b aa 5c 64 c5 5c 99 5a 37 63 dc 53 a7 | 33 95 f4 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 2a 24 2a a3 f9 b8 d4 c1 28 f7 1a | f6 32 c3 8a 97 33 de f4 00 00 00 1c 00 00 40 05 | e6 68 a7 21 48 f4 d3 88 6e c3 71 dc ea d3 53 aa | 0b f4 bb 84 | libevent_free: release ptr-libevent@0x7fb344046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab2380 | #231 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec d8 99 0e 50 36 87 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #231 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #231 | rejected packet: | ec d8 99 0e 50 36 87 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #231: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a42790 | handling event EVENT_RETRANSMIT for parent state #138 | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #138 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #138 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49627.419403; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004943 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab2380 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #138 | libevent_malloc: new ptr-libevent@0x7fb344046040 size 128 "road-eastnet-nonat-138" #138: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #138) | 9e 04 07 cd 3c 90 2d 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 26 9c 69 c2 fb a0 0a d4 c6 8a e3 3a 35 d9 72 | c4 6d dc 97 97 46 4f 49 45 f3 89 7c 26 93 32 59 | 0e 55 34 82 9b 12 80 e6 60 cd 9e 59 15 f7 7d 65 | 53 e2 d3 d8 c2 ed 2c ad 8a b3 a9 0f 4d 3e ac 86 | 1c 67 54 95 04 00 bf 86 4e 8b bf af 44 15 eb 62 | ea cc 94 5a 6b 1a 81 0f 38 cc a4 0b 8b 3e f7 1f | ed 1b ee bf 3c b7 b3 6b c3 78 66 29 1f dc 55 cd | cd 9e c4 55 82 0d 26 16 81 1d 3b 87 44 bb 54 ef | 02 0c 05 f7 04 a0 83 3c c1 fe 2c d3 4e 3d ca 62 | 71 e8 db ac f9 9d 90 a6 0d 1e d9 94 f5 c3 29 22 | f5 2c d8 67 db 54 e1 d3 df b5 df 85 0d 36 cf 0c | 0f 08 0d 38 84 31 cd 9b 35 a0 fd df e8 86 86 f3 | a8 84 f3 56 c8 9a eb 02 1a c2 37 30 b1 0d 51 72 | 6c ba 2c ab f4 fb 66 85 22 97 66 d7 6b a3 32 2b | 57 22 c0 38 a7 76 1b d3 ea e0 94 87 f8 5d 23 88 | 1d 92 5d 32 0c 98 0b 93 d1 e9 b6 e4 2e 67 5c f1 | 29 00 00 24 e6 24 a9 20 36 d0 44 65 2c ba 3d 80 | 21 f7 06 3f 8d eb de 66 e7 ca a9 01 80 86 00 a0 | 79 48 c1 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 af 88 b2 43 70 03 fc c5 39 dd 7b 65 | af e5 61 63 70 8d 5a 32 00 00 00 1c 00 00 40 05 | 84 c7 81 66 9c 3a cd fa d9 98 02 0d f2 5f b1 72 | 68 cd 62 b2 | libevent_free: release ptr-libevent@0x7fb36c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a42790 | #138 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e 04 07 cd 3c 90 2d 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #138 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #138 | rejected packet: | 9e 04 07 cd 3c 90 2d 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #138: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0689 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #232 | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #232 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #232 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49627.467828; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004116 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a42790 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #232 | libevent_malloc: new ptr-libevent@0x7fb36c0180b0 size 128 "road-eastnet-nonat-232" #232: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #232) | 24 ac 89 77 7f d4 00 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d e3 39 fa 31 96 0e da 0d 87 de fe bc da ee 7b | f9 35 54 93 66 77 87 a0 67 c2 b4 11 e6 0a 7a 53 | b3 1d a8 6c 5c b3 d5 5b f1 71 74 80 47 74 8f eb | 25 fb 81 fc 67 2b 6d fc c2 93 27 e4 ad 7c e4 44 | 62 ee e5 d7 4d 6f 45 7a fb 56 b0 33 e4 c0 e1 a0 | 0d 2e c4 d7 7c a8 3d 9c d0 51 2f 55 54 40 46 36 | 1c 6c 65 82 d9 49 b2 d4 69 f8 3b 26 10 eb 42 4c | 23 39 f8 bc c3 39 9a c3 11 d4 4e 97 4e b9 f8 a2 | 8b 74 d5 f0 11 c2 a0 7d ca dd 76 40 1b 01 76 b0 | a4 bf 05 91 b6 25 97 e5 e6 51 ee 64 fa 3b 0a c5 | a6 9c c8 8d fc dc 9a b7 88 e8 5a 4a 57 96 98 00 | db 6d 9a cd 76 5b a7 49 16 56 06 32 a5 f0 51 87 | 36 26 1d 21 19 29 89 68 02 06 6d 37 2b a0 74 d8 | 14 94 a7 12 8f 7a e7 ad 72 26 fb ca e9 57 f6 ae | 40 e1 77 ae bd 14 78 69 df f7 02 98 cb 60 f6 4b | ad ea 83 90 fd 04 b0 25 b3 92 71 37 ed 5d 75 e1 | 29 00 00 24 aa 59 21 22 32 5d 1b 0e 90 4a a6 80 | 93 f2 d5 94 dc dc 41 5c 7e 9b 58 30 e5 e0 1c a2 | 9a c8 ed 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 58 75 66 d7 36 51 ed 56 98 88 32 | c1 e3 29 ac 35 46 df e2 00 00 00 1c 00 00 40 05 | 0c 44 36 93 b4 a9 f5 59 b8 d7 76 83 b8 b4 fd 37 | 81 aa c4 e2 | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #232 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 ac 89 77 7f d4 00 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #232 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #232 | rejected packet: | 24 ac 89 77 7f d4 00 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #232: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0794 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a34e10 | handling event EVENT_RETRANSMIT for parent state #139 | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #139 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #139 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49627.48757; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006723 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #139 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-139" #139: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #139) | 98 4d 89 18 32 14 8f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb bc f6 61 86 12 c3 bf 44 ad ab c8 f8 6d 1d 7a | 8e 0b a1 af 30 f0 3a 9c 0b 72 59 7b 0e cc 41 e5 | 8e 8e a0 7e 30 1e 50 82 23 bf b6 e1 69 ee be 0d | cc 36 07 e5 53 86 7d cf f5 63 8d 89 06 e8 7e 7e | 8f 2c 9d a8 ed 05 f6 a5 d3 42 db b5 95 59 0b 32 | 04 71 41 13 63 f9 4a 4c 42 0e 00 d5 c5 99 ba ab | 17 4c ce 49 6c 52 88 21 1f b3 2a 6c 8d cc 9d ad | 58 96 b7 c5 a6 44 e9 2c bb f7 31 ef f0 0b f9 1c | 1b 4e 21 f5 a2 ea 26 1f 03 aa b4 4e 34 e2 87 84 | cf 38 c7 5e ef db 85 1f 03 a7 73 48 68 be 7e b1 | 00 74 8f e9 65 a8 0b 8a 27 e7 a0 51 5b c9 e3 2d | 64 f7 22 1b 1e b7 6f af e1 0f 11 f6 9b 82 c4 de | 33 fe da 26 0e d7 f8 c3 43 49 4f e1 38 7e 8a 70 | 40 40 85 6b ea cf c0 b6 a0 c2 ac 2b eb 0c 58 ce | 0e cd 1f 9c 72 bb e0 55 da 15 7c 5d ad 4e 80 77 | d9 86 7e 35 e9 dd 73 d2 de c2 f2 ae 3e 6a 77 fd | 29 00 00 24 ce a2 61 71 0b 59 18 45 32 ff fc 20 | d2 f9 be 9d 52 e8 20 ba 16 46 42 c2 a8 74 a7 11 | 49 eb 52 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 5e 21 46 6e c2 25 7d 16 7d 1e 10 | d1 b7 00 9d a8 c1 7e fa 00 00 00 1c 00 00 40 05 | 95 96 61 58 5f 24 29 d9 13 26 c9 57 d8 b0 16 e2 | 35 e6 bc 7d | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a34e10 | #139 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 4d 89 18 32 14 8f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #139 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #139 | rejected packet: | 98 4d 89 18 32 14 8f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #139: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90440 | handling event EVENT_RETRANSMIT for parent state #140 | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #140 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #140 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49627.550927; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005536 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a34e10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #140 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 "road-eastnet-nonat-140" #140: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #140) | 7b af c7 ac 06 7e 5a 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 03 39 d2 09 32 a1 ff 81 2d 15 dc 96 08 01 c1 | 8e 0a 6e 33 a6 3e 74 05 5c 15 33 12 1d f7 12 20 | db f5 3e 24 ba 17 01 dc a0 95 5b 2c 7b 77 c2 3e | 02 67 33 d7 d6 86 dc 63 50 16 65 87 a1 a9 2b c2 | 68 87 45 fa 03 db 21 3c 23 cd d5 14 5d 40 bf 10 | 6f 14 34 95 51 53 c7 d5 77 b9 67 66 94 9a cd 21 | 08 bb de 59 ba ca 48 d5 21 97 e5 28 87 2d fd 83 | d2 62 24 c7 7c f8 ac 68 7a f8 c3 7f 7d 8d 72 d0 | 9d 64 ef 67 4b f1 5c 24 57 ca c2 b1 9f b6 11 d3 | 07 3e 55 51 fc 73 7a 83 2c 11 87 97 33 3d 5c cd | 48 68 02 58 27 c2 fe 9a f6 51 01 87 b5 32 4d fc | 09 2c 09 a0 1f 82 25 e8 47 96 80 8e 9d 80 b5 a7 | 86 8d 11 ad 04 69 30 3a 7c 49 92 c3 9e 7f 81 14 | 42 d8 62 ef 10 0a 21 b2 bb b9 42 01 9c 86 19 33 | dd 9b 24 b9 8a d5 68 9d ee 00 85 c1 cc df b7 34 | d9 c8 e4 31 8c bd d3 67 7d ad 51 86 db 69 96 5d | 29 00 00 24 f8 43 b0 82 a0 04 df 35 49 ed 46 83 | 05 44 45 f4 4f f6 f3 e1 63 59 5a aa 3f 59 d1 20 | a6 81 b5 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a 8e a2 d1 63 df 73 41 77 f0 6a b9 | 17 c7 13 b6 69 6d 12 29 00 00 00 1c 00 00 40 05 | a8 9c d4 0d d7 3c af a8 56 f5 ab f4 4f 7a 90 fd | 96 a4 e3 47 | libevent_free: release ptr-libevent@0x7fb34801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90440 | #140 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7b af c7 ac 06 7e 5a 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #140 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #140 | rejected packet: | 7b af c7 ac 06 7e 5a 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #140: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3fc10 | handling event EVENT_RETRANSMIT for parent state #233 | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #233 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #233 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49627.584266; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007129 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90440 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #233 | libevent_malloc: new ptr-libevent@0x7fb34801d920 size 128 "road-eastnet-nonat-233" #233: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #233) | 77 22 f4 9c 3e 1f 99 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b ec 2a 3f 06 d1 8b 5a e8 a0 a7 30 dd 97 56 a8 | fc 83 ab 1c 41 f5 e8 c3 f3 53 9d 30 18 0d be a8 | 6b a6 4b 53 32 26 a8 d4 bc df 11 84 c3 51 c0 79 | eb 6a aa 97 40 5a 35 1b a4 6a 1c c4 04 e6 8f 18 | 55 5f 5f c2 af ea 6a 6c 05 59 de 4e 19 d5 22 46 | 8f 6c 32 5b 58 46 45 5f 0c 50 78 8c 5e 88 c7 73 | e0 06 97 88 0d 6e 77 b6 da 57 bc be e2 24 fb f2 | bc 09 06 c5 c0 aa 19 66 66 6f 88 a3 1d 28 43 e3 | 36 51 8c 80 0a 70 81 d2 c6 66 0e c8 9f c6 17 19 | b8 81 ac 81 1a 75 2c b9 dc 5b 7e 21 7e 73 b2 27 | 88 a7 6d 88 e3 28 4e 9c 2a a6 e3 b1 c2 84 18 fe | a8 bd 00 37 6c ea ee 13 7b 00 0f 0a d1 ff 5f 9e | d5 9b e4 25 b2 e5 a0 5b a7 8c 8c 3d 30 b8 3c 2d | d7 5a cb be 36 80 67 eb 87 97 e6 10 f7 e4 20 c7 | b9 ae bd af 99 ea 2b 87 69 7f 4e 89 2a ed a5 67 | 99 05 49 1e d6 46 c3 74 7b 66 be bf b6 f1 d6 cc | 29 00 00 24 c5 f3 2f 2c 84 76 05 a0 25 7b 18 6c | b7 6d f8 2f 27 cc e2 71 11 4d 56 a5 c7 36 d6 2c | 0b df 39 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 f4 1a 0b 18 23 e3 b7 72 f4 2b e8 | 42 64 3b ae 76 1f 34 42 00 00 00 1c 00 00 40 05 | 5e 56 c8 b1 db 9e 88 e1 bd b5 14 1e 2e de bc 55 | b2 28 a2 2d | libevent_free: release ptr-libevent@0x7fb34001a190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3fc10 | #233 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 22 f4 9c 3e 1f 99 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #233 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #233 | rejected packet: | 77 22 f4 9c 3e 1f 99 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #233: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0a940 | handling event EVENT_RETRANSMIT for parent state #141 | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #141 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #141 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49627.61255; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004824 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3fc10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #141 | libevent_malloc: new ptr-libevent@0x7fb34001a190 size 128 "road-eastnet-nonat-141" #141: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #141) | c7 a4 5e d6 85 96 e8 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 5c 64 85 22 7f 26 67 9b 1d d2 dc 77 48 35 3a | d4 3f ae a5 de d9 02 e1 be b1 54 1d 8f 3c 81 66 | 72 af 44 35 86 52 1f 94 d8 67 4f d5 3d aa 9a 28 | b8 7d b2 44 cd ad e4 36 73 fc b7 ff a8 f3 fa 52 | bc bb ec ae b0 14 24 28 e8 98 61 c7 6e 10 46 be | 9e 1b d1 62 7d 6b 63 8d 57 98 39 e0 7a 2b d7 fb | 08 85 91 84 64 96 ca 9e 7d d6 44 71 24 e2 7b d9 | 4e df 37 ef 69 35 3e bf d9 e6 0c fe 44 26 04 4e | f0 05 82 74 b2 9b 24 5e e9 a2 22 8d 25 f4 83 56 | 66 7a 36 9b c2 83 bb 7e 03 9c 77 3b 87 eb 41 c7 | 94 78 c3 88 92 ee d7 85 b7 c9 76 9d e6 b0 56 99 | 3c 23 e2 55 4e f4 22 8d 17 30 9c c5 cd a0 fa a5 | 54 c0 8e f4 5a 2c 24 46 f9 7c 1e 86 1f 7b 3c ed | d6 ba ae a7 70 a2 9b 24 e8 02 bd 30 c2 66 66 44 | 25 e0 d1 5b fc c6 60 e2 9a 7f 9c 7f d3 c2 d2 0d | 71 6b ce d7 9c d1 77 52 aa 1f 4c 8a aa 84 99 be | 29 00 00 24 77 e9 14 43 da cb a0 62 0a e5 af ee | ca 47 6a 87 48 66 6e 70 1f 90 c9 e8 b5 aa eb 33 | 74 97 4a b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 5f b0 2c dc 05 ab ba 7d 8f a9 67 | 57 cd cc b4 50 46 52 bd 00 00 00 1c 00 00 40 05 | 25 fc 66 29 f4 e3 aa bf a8 61 5f 67 dd d5 39 f5 | bb 8c 0c c1 | libevent_free: release ptr-libevent@0x7fb35c046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0a940 | #141 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 a4 5e d6 85 96 e8 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #141 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #141 | rejected packet: | c7 a4 5e d6 85 96 e8 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #141: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a50110 | handling event EVENT_RETRANSMIT for parent state #142 | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #142 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #142 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49627.676912; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007199 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0a940 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #142 | libevent_malloc: new ptr-libevent@0x7fb35c046040 size 128 "road-eastnet-nonat-142" #142: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #142) | 41 39 64 14 10 77 e9 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc f2 be 7b 98 10 67 76 c4 71 20 94 23 de f4 7b | f8 c4 af 24 ce 1c a4 2e 78 f9 2e 3f 92 4d 95 da | b0 24 e9 98 5b 94 79 3a a7 65 db 91 8d 98 6f 60 | 39 37 f9 9a 0b 2c 5f 0f 2f ab bc 06 c4 26 ad 3a | cb 21 02 45 52 b2 d1 fd f5 7c fc a1 d2 ea 0e b1 | ba 62 e9 1e b2 ad cc 0d 27 c3 3b 69 ca 23 50 32 | eb 22 0c cc d3 fb 5f db 9c 9b 31 50 db f4 03 47 | 71 96 ad b4 c6 fc 17 71 7e b3 b0 ab 55 4f e2 51 | da 27 48 0f fb 5a 5c 14 f2 9f a1 0b bc 57 8c f8 | af d3 b0 d4 6a 72 47 34 c3 ab 52 90 fc 49 ad 86 | 46 90 a0 10 2b fd 92 3d 6b 38 ac d2 f1 fb fa a7 | 40 39 9e cd 87 10 91 66 2e ab 47 10 a6 88 c0 52 | d8 c9 3f b4 b3 d0 6c 91 b2 0e 49 7c 2a dc 94 d8 | 21 4c c9 df 3c b1 a2 d4 d4 f0 4b 25 d9 08 87 46 | 22 c7 0a 5a cc 6c a2 0b 4a 09 99 09 fb f2 2e 33 | 66 ad 2f c0 16 9e 3c 6f 99 46 27 79 f7 75 88 d3 | 29 00 00 24 1d 1b 1c 65 cb f5 ff f0 c9 00 69 e9 | d1 b3 22 15 24 4a 7b cc a6 4c 2e 0b ef 42 21 b2 | d1 d6 06 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 3a fc 83 97 ab 17 41 58 12 a1 f9 | 48 2f 13 f0 7a 91 16 3d 00 00 00 1c 00 00 40 05 | 13 50 5d f0 78 ea 60 59 51 2f a8 23 2c 7c d0 1f | 4c a0 b1 5b | libevent_free: release ptr-libevent@0x557d469e1b60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a50110 | #142 spent 0.206 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 39 64 14 10 77 e9 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #142 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #142 | rejected packet: | 41 39 64 14 10 77 e9 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #142: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf10 | handling event EVENT_RETRANSMIT for parent state #234 | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #234 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #234 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49627.726315; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.008154 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a50110 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #234 | libevent_malloc: new ptr-libevent@0x557d469e1b60 size 128 "road-eastnet-nonat-234" #234: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #234) | f2 fd b6 5b dd 65 ca 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 84 9f 8e f2 4d ae 28 c3 a6 33 85 a7 41 17 2e | a7 fb 37 ec dc 5e da 22 ed a7 d6 7f e1 29 5e 3a | c1 0a e8 67 19 e8 ac d8 ab c4 ce 43 3f 4e 0f bb | 7c 98 41 2b 6f 77 ca d9 32 a6 af f9 98 cd dd 12 | d9 37 bd e9 25 be 75 b5 bd 5e e0 83 6f 45 f8 da | 18 94 6a f4 88 bf 0e 4d e2 07 2b 36 d8 6f 3a 20 | 7f 78 6a 85 8a e5 3c dd 81 bb 63 90 5e cb bc ba | da ba 10 8a c6 0e 8a aa 71 5a 96 4e 6c 70 41 b3 | b5 ed c1 a3 26 f6 9d 2f 3e 30 60 a8 7a d4 51 c7 | c1 d0 6f 12 78 fa f6 7a 64 88 82 80 72 24 ff 23 | 06 91 a9 95 a1 36 33 ce f2 c2 55 d0 b5 3c 49 79 | 6f 7f 3e 42 f0 3e 13 68 8b e1 82 c2 f7 ef 92 e7 | 73 e6 b2 0b c7 04 76 33 01 80 30 de 76 f1 e6 56 | a7 c5 01 91 93 65 f4 09 85 c4 02 fa 63 8b e5 e6 | 21 78 9f 81 bf e4 b0 d6 2d 62 90 d2 7c 1e 4b d9 | ae 42 db a5 3c 94 61 a1 2c 3b 37 25 2d 53 32 5c | 29 00 00 24 9d 5d 40 b5 2d ec 67 ae 83 64 17 c2 | 32 3b d8 b9 21 ed 79 bc f4 91 0a 50 e4 b3 2c c0 | f4 72 58 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 89 bc a1 a0 be dd 06 e7 d6 84 21 | 72 6a c6 f8 b6 a8 a1 51 00 00 00 1c 00 00 40 05 | 53 6b 47 d7 1e 7d 4e e3 0d 3e 41 f7 75 f0 92 15 | 7c 13 7e ba | libevent_free: release ptr-libevent@0x7fb34401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf10 | #234 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 fd b6 5b dd 65 ca 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #234 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #234 | rejected packet: | f2 fd b6 5b dd 65 ca 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #234: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf50 | handling event EVENT_RETRANSMIT for parent state #143 | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #143 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #143 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49627.752603; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.010452 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #143 | libevent_malloc: new ptr-libevent@0x7fb34401d920 size 128 "road-eastnet-nonat-143" #143: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #143) | fe 08 8f c1 30 76 36 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 59 10 0a 33 69 60 29 ec cb 88 e8 3a c1 e5 55 | 26 67 1a ec 62 9e 8e 22 6f b0 d9 0b 9d f1 88 4a | e6 aa 92 54 ef 0d ca 48 fc de 93 8e cc 1b be 9e | 2a 5e f3 2a 08 3f 42 43 4c 7d 9b 8f 28 00 df 48 | e8 21 87 a4 f6 50 fb f0 b0 17 a4 67 51 7c 94 f5 | bf 3d 99 c9 85 3f 6a 47 12 df 61 eb 04 e7 9a 6c | b7 d5 b3 00 34 48 70 01 04 f1 38 e6 2a 1b 58 fe | 45 c8 88 15 fe fd f8 a1 17 d4 b0 e0 da 11 1c 39 | ad d0 8c b8 02 34 e9 cc d8 17 f6 f2 94 8e c1 9b | bc 9e 9d 32 92 5b 2a 34 cd 6a fb 2e 20 96 68 57 | 5b d5 8b 51 c6 02 26 d3 9c 0f 2f 12 c2 48 e7 4a | 4a 0b 12 1b 9e 56 b5 85 4d d5 b2 31 1e ed 3e 7b | 36 b4 c3 2a eb a3 dd fa 18 8b db b6 6e 6f 26 25 | d4 07 3d fa df 09 23 4b f0 61 a0 e2 e7 88 89 b7 | 4a 08 a7 b8 23 da c7 50 cb 24 82 e1 9d bc ac 0c | ad 50 25 66 22 31 ab bb bb 61 7d f2 14 fa 8e 17 | 29 00 00 24 5c 1f 93 ac 9c d9 6d bc 1c 83 06 35 | 6d 1c ce da 8c 6b 1d 7b a8 23 6f c9 2c 64 35 22 | c8 0a 79 63 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 3f e0 89 56 6b 89 d9 2f e3 34 a5 | 92 0a 7f a5 70 51 be 33 00 00 00 1c 00 00 40 05 | 8d 31 d1 99 a4 16 d7 c5 96 20 51 29 c7 9b 80 8c | b7 4b 38 13 | libevent_free: release ptr-libevent@0x7fb3500180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf50 | #143 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 08 8f c1 30 76 36 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #143 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #143 | rejected packet: | fe 08 8f c1 30 76 36 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #143: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_RETRANSMIT for parent state #144 | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #144 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #144 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49627.829919; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005336 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf50 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #144 | libevent_malloc: new ptr-libevent@0x7fb3500180b0 size 128 "road-eastnet-nonat-144" #144: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #144) | 95 f5 7e 43 50 83 91 f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 af 0d 3c f0 04 33 31 65 f6 8e 0a e2 6d 8f 2b | 3a 54 de b3 ca 0f b9 57 94 b3 82 c2 80 38 37 42 | 7f 12 9e 2e 71 85 9b 4b b8 30 72 8d 13 66 8d 18 | cc b4 6c 82 a9 1c ff 5f bc 21 44 b4 04 e3 03 9f | 86 65 ce c2 4c 9e c7 42 cb 55 d7 40 69 8e 4e 35 | 08 db 41 09 bf 5b 9f e9 29 80 fb 24 8c ee 8a 18 | 98 d5 9e 29 b1 2e 48 fa a4 54 8d 89 c7 a3 3f 0e | fc 43 c8 e1 70 19 e6 79 93 90 9a 7f 29 dc 10 54 | 5c 05 ee 55 8b da f3 4a d4 d1 7a 22 56 b9 55 f2 | 83 7d ee 0a 7b 20 d8 88 a4 b2 35 e6 85 84 6e ea | 73 63 0f 8a e4 f5 ba b9 cf c5 6d ef 42 bc 1c 31 | 91 cc e3 6a cc 1c 24 a0 43 43 cd 4a d2 99 1f d0 | 12 0e 0b 61 86 58 8a 2a 98 ff 0e 20 62 f2 a9 6f | 84 85 8e 3d 34 eb 58 ea 76 88 a9 8b bd 38 f7 19 | 7f 52 1e a6 e1 d5 d4 4f 95 6d fa 80 6a e1 f8 3e | c4 ca 0c d0 70 40 4c 9c cb 3a a3 28 2b c3 1c ff | 29 00 00 24 1f 01 c0 5a 0d f1 22 7b f9 16 68 fa | 7d 4a 59 bf c4 b6 f1 ab 98 c0 67 1a 42 27 bf 9d | d6 b1 35 d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 96 0c ca 76 1c 4b 86 73 02 f4 3a | a5 21 4a 8f fe b4 03 ee 00 00 00 1c 00 00 40 05 | 86 67 99 5d 30 be 3d 57 d4 ea af 87 c1 18 21 08 | 32 c4 b1 0f | libevent_free: release ptr-libevent@0x7fb35401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | #144 spent 0.214 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 f5 7e 43 50 83 91 f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #144 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #144 | rejected packet: | 95 f5 7e 43 50 83 91 f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #144: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0787 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf80 | handling event EVENT_RETRANSMIT for parent state #235 | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #235 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #235 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49627.898493; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004005 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #235 | libevent_malloc: new ptr-libevent@0x7fb35401d920 size 128 "road-eastnet-nonat-235" #235: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #235) | 7e 07 6a 55 b2 86 f9 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 15 b0 98 97 a3 9b e7 91 af 63 8f 32 c2 f0 a6 | 5a 92 40 40 d6 e9 e6 fc ec 5f 9d 94 27 3d 04 cc | 99 dc 7e ac 23 a0 7a 25 ef 03 33 84 5f 4e 3e 44 | ab 45 fc 51 2f 77 0e 04 9c 57 58 3e e3 c4 95 ac | 99 c6 cf 74 8b ee 49 3f 97 64 5a ae 23 26 21 49 | 82 68 17 68 04 08 36 f9 22 38 ec 23 ce 8f 41 44 | bf d0 3d c1 f8 23 b3 6a aa 39 20 ad 4f 3f f3 2b | 3d f9 49 23 b6 22 6b 6a 39 8a 61 bb b3 33 4a 8f | 12 ce 51 75 41 2f c2 97 7c 24 15 e6 c7 4c 0b 5a | 7e 98 8c f9 eb 79 4c 87 18 6e 22 0f ce f5 5a f4 | 97 f7 88 3c 20 6b 59 a3 22 56 0b 5d ff 73 43 0c | d0 ab c4 fb b1 97 4e c1 93 9b 6a 7d 3a c0 41 34 | 56 74 13 c4 02 0c 52 4b 7f 7c ed c1 a7 58 84 db | 34 3e fa dc e2 91 c8 b6 c5 5f f0 1a 94 9c 21 62 | 9c 24 2a b8 60 58 3a 4f ea 5e 65 e5 c2 96 45 62 | b2 a3 11 26 4c 94 9a fb e2 2b 93 1c 4f 08 c6 66 | 29 00 00 24 0c f1 17 b1 15 6c 67 72 28 b0 8f 38 | fd 2e 9a ff fb 4a d4 a7 a7 b2 00 ff 88 fe ef 90 | e3 f8 e6 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 78 bf 00 5e f0 c9 41 6d 35 37 22 | b0 4c f8 53 8c eb 59 4e 00 00 00 1c 00 00 40 05 | 6e 5c 6f da 69 07 20 20 73 2e b2 7c a0 00 c1 c2 | 79 44 3d 62 | libevent_free: release ptr-libevent@0x7fb34003b010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf80 | #235 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 07 6a 55 b2 86 f9 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #235 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #235 | rejected packet: | 7e 07 6a 55 b2 86 f9 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #235: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0762 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e5ca0 | handling event EVENT_RETRANSMIT for parent state #145 | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #145 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #145 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49627.910863; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005528 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #145 | libevent_malloc: new ptr-libevent@0x7fb34003b010 size 128 "road-eastnet-nonat-145" #145: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #145) | a6 a1 9f 1d 3f 3a 29 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 ad 76 df ba ca 18 92 b9 50 e2 27 a3 57 3f f5 | d7 ce ae 5d 80 a9 09 c6 8a 53 e3 ab 22 af 0e a7 | 88 2e e6 ed 37 ce 02 dd 03 71 9a aa 64 d1 00 5c | 54 65 05 0e 62 cb 77 34 78 e8 1d 0f 3c 6f 76 4f | d8 fc 9f c4 10 87 e5 9a b0 72 db 0a 63 63 0e ec | a2 67 9d 72 98 db 53 5f a6 6f e8 b3 98 59 aa 3b | 88 1a a2 8d d0 7f c4 94 06 61 c1 99 f9 c0 e1 fc | 19 b1 6a 14 b7 fd 63 fd d3 3b 83 b6 f1 f8 68 d2 | 13 f3 e6 28 90 fe d0 d0 88 c6 ca e3 4e 56 e1 09 | b8 4b c6 48 c4 d4 00 e6 af d0 6c fa ac 01 46 d9 | 68 30 67 9c 6d 90 ca de 4f 57 74 b7 7a b8 1b 41 | a9 90 f5 03 0d 89 d9 ac 42 f8 f9 ae 19 2a 88 37 | d2 a9 69 9e 81 b2 1c 52 07 de 0f fa d0 69 b1 a8 | 12 38 cf d3 2e 09 65 b8 1c da 6e 0b 4d 41 c0 65 | 80 dc 01 75 47 41 de 6c 83 4d 93 25 86 5c 1b c8 | f3 08 39 71 bd f1 c4 fe f5 43 e7 4c 77 94 d2 cc | 29 00 00 24 03 a8 59 45 29 a4 02 15 24 82 5a 54 | 64 ac fd bc 55 59 ba ca b7 e9 80 0d f2 9c bd f0 | d3 a5 de f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 e0 ba e6 72 d8 87 8f de 74 38 1d | 19 eb b3 76 79 6b d3 38 00 00 00 1c 00 00 40 05 | 6f 55 64 02 f2 84 7e 5a 25 36 99 f3 de 2c 7f 97 | 3a 54 f2 52 | libevent_free: release ptr-libevent@0x7fb354046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e5ca0 | #145 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 a1 9f 1d 3f 3a 29 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #145 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #145 | rejected packet: | a6 a1 9f 1d 3f 3a 29 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #145: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0696 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a672d0 | handling event EVENT_RETRANSMIT for parent state #146 | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #146 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #146 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49627.98326; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.011728 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aee0c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #146 | libevent_malloc: new ptr-libevent@0x7fb354046040 size 128 "road-eastnet-nonat-146" #146: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #146) | 44 6c 8c 11 77 9b c1 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b e4 4b 01 63 76 c0 7a c8 2d 36 69 32 60 94 ea | 6d 55 57 2b 4e ff 0e 39 b8 87 ae 9d 5d a1 84 c3 | fd 7e 75 5e b5 db f9 c0 f2 b4 77 67 0c bc 83 d2 | b3 2c 18 7b 18 da 84 81 dc 1d 09 bc ef cb 96 0b | 54 3e 13 a5 2c e8 26 52 c4 b3 5b d7 9c b8 e6 22 | f7 8d 8e 88 21 d1 87 46 36 62 d4 63 42 41 4c 1f | 8f 43 21 27 b3 df 00 21 d1 8d 41 5a e5 9f 04 8b | ff c6 a4 97 a5 12 34 cb aa c2 51 13 9f 26 59 55 | a5 7b 2f 9e 53 52 08 32 a2 06 5f 18 aa a0 ac 8a | 4c 25 e1 2e cb 23 eb 05 33 52 1c b1 e7 32 06 d0 | 42 ed ad 95 48 c5 eb 3d 1a cb f5 6d dc 2f a2 a8 | 4e 15 75 28 ce 0c d4 fb 09 18 56 79 e6 17 c1 dd | e4 ed 35 be 6f e9 12 84 6e 1e 87 b9 38 ca fc f5 | d4 85 cf 4e a3 1f db 6c 1f e5 f2 54 ba 88 10 cb | 4e bc 46 9b 79 cb 0a 36 af 61 69 14 f8 97 5e 9d | 27 b8 f4 1b 36 1d 0b 8b f0 e7 f8 06 78 36 dc d7 | 29 00 00 24 79 24 14 13 36 a3 2b 17 a4 40 30 01 | 57 eb a4 ff f9 15 14 cb 86 dc 31 a7 64 7c e3 06 | ae fb 59 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 46 87 8a 4c 47 2e ae ab e2 03 f4 | cf 0f 35 fc df 03 af ad 00 00 00 1c 00 00 40 05 | 7f ed fa 9e 74 b9 38 c0 e7 89 49 8c f1 a3 30 c7 | bc 00 44 f5 | libevent_free: release ptr-libevent@0x7fb338012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a672d0 | #146 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 6c 8c 11 77 9b c1 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #146 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #146 | rejected packet: | 44 6c 8c 11 77 9b c1 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #146: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1af10 | handling event EVENT_RETRANSMIT for parent state #236 | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #236 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #236 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49628.032622; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.011611 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a672d0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #236 | libevent_malloc: new ptr-libevent@0x7fb338012840 size 128 "road-eastnet-nonat-236" #236: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #236) | 4f c5 63 73 3b b2 d7 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 5b 06 ee 84 fa 79 7f e6 43 db d2 0d 8b cd f5 | 59 c7 e2 83 26 7e 92 07 02 e5 75 02 5a 6a f0 b8 | 61 d3 80 1a 18 f6 6c 41 f4 8b 1c 06 f8 08 1d ec | 22 4e 32 49 5f 33 c9 49 bb d4 b4 9a 8b 9e f4 b7 | ce cc cf cb 5d b3 17 75 80 5e 65 75 ed 96 58 92 | ba 35 70 a7 18 25 e3 2d 24 94 8c 18 40 c5 8f 8e | 52 27 34 ad d5 17 cd 88 62 97 c4 7d b7 05 9c fd | 87 2b 85 fb 44 37 03 91 16 87 52 0a e0 03 40 76 | 05 68 d4 2b 81 46 59 09 54 29 07 bd 68 5b bc 5c | 8c 95 6c ea 24 20 a3 81 a2 b7 51 34 bf 49 44 7c | d1 b4 84 70 99 94 3b 26 25 f6 f8 e9 a2 1d 40 46 | 82 c9 ad f3 5f 36 60 f9 1a 16 eb 90 3e 33 04 f7 | 6d 37 8a a4 9b 0b b3 e7 22 8c ca b9 99 a2 ef 47 | df af 33 fd 94 a4 95 ab c9 0d 75 62 b8 13 05 a5 | 03 c9 74 d6 f5 9e 6f a1 90 65 6c b2 72 e9 df f5 | 5d 19 cb 15 48 a4 79 d7 52 7c ec ab 28 6e 6d 0a | 29 00 00 24 28 83 19 a9 be e7 a3 f6 92 20 74 48 | e6 d2 29 74 96 b0 77 d3 bd 1e ee 26 dd 0d 67 63 | ff bc dc bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 3a ff 41 6e c5 dd cc 76 37 c9 88 | fe 40 cf a9 30 61 ac fb 00 00 00 1c 00 00 40 05 | e2 5c 52 8d c8 02 86 2e 47 16 0b 04 4f 16 65 56 | c3 38 ce 94 | libevent_free: release ptr-libevent@0x7fb348035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1af10 | #236 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f c5 63 73 3b b2 d7 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #236 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #236 | rejected packet: | 4f c5 63 73 3b b2 d7 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #236: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0ea80 | handling event EVENT_RETRANSMIT for parent state #147 | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #147 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #147 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49628.040922; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005764 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1af10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #147 | libevent_malloc: new ptr-libevent@0x7fb348035930 size 128 "road-eastnet-nonat-147" #147: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #147) | c9 49 59 84 c8 e5 a9 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 23 1f ef d0 ab 86 83 db 3a 42 1d 72 53 7f 1d | 10 99 05 4a 99 4f 3f 9a 98 88 bd df 90 bb 6b e6 | 5a 0a ce 6c 41 04 da 58 5d c4 4f ac da 97 26 a7 | 11 32 a8 06 1f e1 87 a2 42 1e e6 6a 0c 68 08 40 | f5 b9 1e 41 1b cf 5c 75 a8 60 06 b2 5f cf d9 87 | 6b e4 af 8e 02 f2 fa 22 10 06 d6 15 19 bb fa f0 | 66 24 d5 79 4a bf 96 b3 63 ad e6 0f 0b 5c f6 47 | 01 64 bd d8 46 3f e5 ea a4 26 5d e5 06 c2 a7 0f | 35 e2 b0 0a 2c 32 20 be 52 14 9d b5 0e ec 56 cf | b3 f0 bf 5e 01 73 a8 04 a0 e0 5c 8a fe 29 b1 7f | 37 66 a5 5b ec c8 06 fb 07 01 0f 4c 5e 63 33 d2 | 2f d4 5c 61 3e 3f 82 73 d1 fb c8 86 80 bb eb c9 | 28 2b cc 48 8d 11 24 24 01 fe 7a 40 83 2b 75 31 | d3 44 40 97 d2 ba 07 04 c5 0b 99 12 41 24 f8 ad | ae 7e f2 a1 cb 5b d9 cd e9 53 59 dd 6f dc 6a 90 | 39 c5 d7 b8 42 59 e8 06 c8 85 08 f1 c6 2d 85 3e | 29 00 00 24 56 cc b0 4f af 68 49 01 85 6b 57 3a | 2e bf 2e 45 7c 71 09 75 a1 1e fe 83 ec 88 f6 fe | d7 b8 8a 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 3a 80 78 a8 ce 4e 37 f2 7e 4e 6e | c2 ec 51 b5 d8 d3 ef c5 00 00 00 1c 00 00 40 05 | 80 dd aa b7 d6 9c 8d 45 3b 70 75 ca 6b f3 11 7a | 54 5b 54 8d | libevent_free: release ptr-libevent@0x7fb36c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0ea80 | #147 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c9 49 59 84 c8 e5 a9 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #147 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #147 | rejected packet: | c9 49 59 84 c8 e5 a9 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #147: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0eac0 | handling event EVENT_RETRANSMIT for parent state #148 | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #148 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #148 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49628.102242; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004732 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0ea80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #148 | libevent_malloc: new ptr-libevent@0x7fb36c03b0b0 size 128 "road-eastnet-nonat-148" #148: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #148) | 7c 0d 88 21 0c f2 96 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 04 bc 64 c4 a9 25 09 2d 75 95 3b 11 b4 ff 15 | 97 7a 18 93 a6 88 e9 2c b9 6a 56 2f 0c f9 8a d8 | e8 e9 8c f3 6e a2 1a 4d de 32 b3 62 b7 1f cf 21 | 58 10 7d f4 24 b5 81 70 c7 68 14 37 9d fd 00 6b | b4 bb f2 40 cc b3 6b 23 df e5 3d 42 b5 d1 d7 42 | c0 5c ac 6a f7 66 60 50 9f bf be d5 78 f9 b4 31 | b1 86 de 30 ed 54 6a fc f4 65 4d b6 71 b3 0e 10 | 8b ff f6 ba 06 b3 35 4f f4 27 dc 02 7d 26 88 9b | ce 4c 6b f4 f0 e1 8d 43 1e f3 4c 5f ec 71 b9 2c | e9 3b 85 fd 08 23 e1 df 81 46 1d 11 72 44 8f d9 | 74 89 1c 9f d5 79 90 5f cf 86 54 f4 23 c9 c4 31 | af 2e 84 a4 ff ec cf b7 ba 60 46 0a 15 eb 88 9e | 1a 9f 61 a8 80 c2 60 68 d5 be 6e 09 41 6f c1 fc | 1b 37 54 8c 93 b5 3d fd bd 96 aa 9b bc 05 8d 2f | 00 4c 54 bb 3b 96 94 4f 45 ac 6c 6e b1 21 ad e3 | 8b d3 f2 47 fe 35 bf 98 09 a6 a6 c8 c9 12 c2 70 | 29 00 00 24 b1 81 e7 c9 15 f6 0b 96 d5 74 cc 65 | 51 5c df 58 13 0b 15 8c 15 4d e2 64 8b 9f d6 7a | 91 6a aa 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 56 10 9c c6 bc 82 78 34 d0 03 57 | 7a d1 bd 45 e3 1a b3 5c 00 00 00 1c 00 00 40 05 | 74 be 93 cb aa 1f 0e 04 cc 93 49 b7 b1 e0 d6 3d | b3 9a 6d 48 | libevent_free: release ptr-libevent@0x7fb3540300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0eac0 | #148 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 0d 88 21 0c f2 96 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #148 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #148 | rejected packet: | 7c 0d 88 21 0c f2 96 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #148: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.079 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a32290 | handling event EVENT_RETRANSMIT for parent state #237 | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #237 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #237 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49628.150584; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004961 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0eac0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #237 | libevent_malloc: new ptr-libevent@0x7fb3540300e0 size 128 "road-eastnet-nonat-237" #237: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #237) | 4f 30 a3 80 9f 9f 65 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 80 47 96 1c c9 51 f1 0b e5 85 bc ba 8d d8 2f | 7e 2e aa 44 d1 4d 1c a5 32 20 f2 ef d0 59 1d c7 | a5 77 ca 5e 02 89 87 a6 bb c0 e0 54 5b b5 84 79 | 29 9f bb 42 c6 20 c7 56 ce cc 84 c6 1e c1 d2 f4 | 13 76 c9 2e e4 05 e9 37 e6 bd 6f 35 dc f2 cd db | 35 16 6c ad 20 92 a2 8f 48 33 b4 20 26 8f 59 2d | 4c d4 d1 24 86 23 46 ee 6e c6 b6 24 d5 4f 00 17 | 52 61 b1 bb 85 d2 0d d3 70 1d c1 d8 3c 26 6e b6 | 77 3b f1 af 93 e8 cc 5f cb 1e 13 01 93 4d 4b b3 | 72 06 cc a6 aa 05 5c 87 d3 9f 0b a2 d6 36 1e 41 | 74 1d 84 0c 84 17 40 09 ae 80 b1 14 f6 05 f4 d7 | 5d 5f bd 62 54 0a 41 03 07 59 f0 77 45 28 e1 78 | 15 ba 85 f9 68 5c c5 ec 72 3c 38 3b 02 ac c0 42 | c6 0b db 17 1d c8 55 9c ae 19 48 78 01 ba db 02 | d5 a9 df ad 4f 67 c1 5c 0b ad 91 db 71 af d7 d7 | 81 9f c3 2e 7e 4d 1a 85 96 12 81 67 a7 1b 56 fa | 29 00 00 24 e8 e3 42 9e a6 0b 6b 38 33 d4 39 b2 | ba a4 24 74 62 c1 99 66 60 77 d8 65 6c a2 d4 f2 | 70 50 e9 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 8a 35 95 f7 6d e2 2a d4 81 0f d3 | 67 1d 3d 86 23 6d 84 2e 00 00 00 1c 00 00 40 05 | 36 30 d8 35 65 36 0c cb 2b 9c c9 7a 14 59 39 58 | c5 b8 4c 54 | libevent_free: release ptr-libevent@0x7fb37c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a32290 | #237 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 30 a3 80 9f 9f 65 f0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #237 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #237 | rejected packet: | 4f 30 a3 80 9f 9f 65 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #237: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a011f0 | handling event EVENT_RETRANSMIT for parent state #149 | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #149 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #149 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49628.169908; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005199 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a32290 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #149 | libevent_malloc: new ptr-libevent@0x7fb37c009640 size 128 "road-eastnet-nonat-149" #149: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #149) | ec 1b 62 37 44 a3 17 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 08 91 37 b8 3d c4 a5 fb 8f 59 2b cb c4 ee a3 | 59 01 01 81 cd 69 2d 85 93 60 f7 65 1f 64 aa eb | 93 60 17 84 59 2d ec 44 26 cf 20 fe db 7e d9 f6 | 7d a2 69 c3 4c ed d8 f3 0a 6b d4 5b e7 47 78 e3 | 80 3c 2c 01 cd d6 a8 65 7e cc 13 22 72 38 45 64 | 17 76 db 68 fd 9e 02 c1 4e e0 91 4f 14 0c 06 72 | 4e df 03 59 bc 72 4f af 9f 27 39 bd 57 c8 9d e1 | 90 f7 3b a1 d1 79 66 94 af 42 c3 62 cd d5 2d cd | ac 6c ea d6 94 1b f4 91 4d ad 49 21 48 4b 36 1c | 53 18 c6 23 73 5e 40 ed e6 7e 6a 25 d8 dd ef 07 | 7d 88 f4 a9 e1 ff e9 29 7d 10 cf 47 92 a2 72 35 | 95 c9 53 7e 8d f1 bb ba 54 1d 40 b5 a0 d1 1e d9 | 0b 86 d8 2d 01 1a 34 e1 77 f0 c8 57 84 a9 f4 dc | 35 1f 8e bc 5d f2 ca 58 ec a1 ad a9 cd 45 4a 2d | 23 38 26 ab df a9 05 75 cd 84 d4 66 7c be 9c f9 | 7f e7 96 6a 2b a4 d6 b4 04 50 ef ba e8 3c eb 60 | 29 00 00 24 f6 11 7c 5d 38 85 36 80 dd ed f7 d5 | 65 1c 39 a3 95 3d e4 a2 88 84 cf 2f 03 e4 0d 86 | 6f f9 18 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 49 c3 fc 0d 4b 5b dd c8 8b e4 44 | 1a 6a 18 02 f4 d1 ea f3 00 00 00 1c 00 00 40 05 | 4e f4 0c 8d 48 4d 9f e4 0b 19 05 64 48 99 98 79 | d2 ff 3d 6d | libevent_free: release ptr-libevent@0x7fb34c046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a011f0 | #149 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 1b 62 37 44 a3 17 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #149 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #149 | rejected packet: | ec 1b 62 37 44 a3 17 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #149: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.049 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61bd0 | handling event EVENT_RETRANSMIT for parent state #238 | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #238 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #238 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49628.228199; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.012437 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aee100 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #238 | libevent_malloc: new ptr-libevent@0x7fb34c046040 size 128 "road-eastnet-nonat-238" #238: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #238) | f6 ab 39 cf c5 7d 06 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af d3 7b 83 d9 03 ff 12 c8 97 56 ab b2 14 10 e0 | 48 f1 3b e3 4f 64 7a 9a 9e ba 3d 1c 59 ad a8 95 | bd 51 64 ba be 30 e1 34 45 a4 34 1f 3e df 3f d6 | 86 b0 59 41 db 94 3d 0d e6 62 59 ee 2c dc c0 b6 | 14 1d 3c ee 48 4c 83 08 18 f6 26 a9 cc aa db a7 | 11 c4 2a 15 e2 1f 73 e6 9e 15 53 88 2a 78 32 86 | e7 60 9e db ba 38 76 7a 13 5c c5 ac fd 1c e1 b3 | d9 b0 34 80 53 e2 98 a7 ba 07 c7 e0 29 79 99 fa | 34 4e 3c 41 8c 32 8f 62 7b 0b 06 3e 96 0f e4 ec | 50 ea 8b 72 ce 3c a2 48 3d 50 a6 bf fa b9 6f 49 | 42 35 90 06 bb 42 36 54 c0 36 66 cb e8 62 33 36 | 54 3c 66 18 ff f4 71 a8 dc 58 87 96 fa c3 1b c5 | dd a8 8d cc aa e7 e2 09 78 51 8e a8 fa 1a ff ca | 8e a6 7b eb 75 ad 7d 26 12 45 b0 78 8a db a7 e1 | 91 4e 5d 71 95 e7 03 95 d9 44 14 28 62 b8 ce bc | 33 38 e8 30 35 30 6f c6 da 40 e4 e4 28 6a f5 3c | 29 00 00 24 e9 54 88 95 a6 38 9d 64 f1 e3 1e dc | e9 d3 25 19 54 a9 08 d5 30 10 d0 0d 46 91 20 94 | d2 ec 4b e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 09 df c5 c7 bf ac 94 7a a2 81 0c | 76 04 c4 df 2b 4d 28 f9 00 00 00 1c 00 00 40 05 | 49 c2 83 19 04 1a b6 87 e7 32 12 a0 0a 0c 4f 92 | e7 02 e1 ed | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61bd0 | #238 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 ab 39 cf c5 7d 06 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #238 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #238 | rejected packet: | f6 ab 39 cf c5 7d 06 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #238: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0515 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aef6c0 | handling event EVENT_RETRANSMIT for parent state #150 | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #150 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #150 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49628.23351; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005804 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #150 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 "road-eastnet-nonat-150" #150: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #150) | 8a b6 09 5a 0a 8f be 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 2e 98 c4 69 1c 50 37 00 a8 8c d0 f1 d2 8c 28 | 94 f1 69 8e be e8 36 fe 99 97 d5 0c 37 4e 1b 26 | 9e e0 4e bd 73 a0 79 f4 5a 6b f2 8d 96 4f 03 3e | 0e 75 44 c8 2c a3 81 79 2e 0b 2e 8f 7d 7f dc f9 | 3f db 53 4d 6e 68 53 6c 49 99 36 00 d7 4f 7e e1 | 7e a7 57 fb ab 9f e1 d6 e7 24 3b 02 1f 12 10 de | 15 c5 08 ce f3 51 03 84 19 e7 47 83 1a 2e 38 c2 | 45 5b ab 60 7e 25 f4 92 0b eb 31 c2 32 59 f7 71 | 30 c7 ef cb 28 48 6e e3 c6 10 bc 9c 64 1e 68 59 | ee 88 40 85 37 40 80 12 7d 99 b2 33 c0 da 4b fb | 3a 39 ae b6 0e 0b 59 93 7d 9a d6 ee 50 27 09 f4 | a0 3a c3 63 a9 ac e9 9b 13 ed 9f a6 df 4f 55 3a | 82 36 63 e6 11 77 4d 54 ff a6 ad fe 0f 97 d9 c1 | 30 72 88 21 1f 78 34 56 b8 51 de f7 62 00 f9 29 | 66 5f d3 86 45 83 9d 48 c9 24 49 11 29 28 62 bd | 6e 8b 60 b5 72 8e cb ea 93 0b fd cb 0c 58 7b 88 | 29 00 00 24 36 30 98 85 8b 67 65 29 82 81 da 88 | 70 5a df 1d 0c c2 0c e8 b9 29 94 59 0f 89 5b 4b | 52 bc 0b a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 25 ba 47 28 1c 0e 38 fd e4 d3 0a | c8 ae 66 94 c0 bd 04 2b 00 00 00 1c 00 00 40 05 | 5a 15 ef 3e 5b 63 8d c2 17 ab ae 76 63 67 33 8b | f3 ee 4c d4 | libevent_free: release ptr-libevent@0x7fb3400357c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aef6c0 | #150 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a b6 09 5a 0a 8f be 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #150 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #150 | rejected packet: | 8a b6 09 5a 0a 8f be 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #150: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0903 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a205f0 | handling event EVENT_RETRANSMIT for parent state #151 | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #151 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #151 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49628.300893; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005999 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aef6c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #151 | libevent_malloc: new ptr-libevent@0x7fb3400357c0 size 128 "road-eastnet-nonat-151" #151: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #151) | d6 d5 c3 1b 58 0f 5c 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 37 31 25 ac 2b c6 c6 54 4a 25 58 cc 38 99 e0 | ed 33 16 21 c3 45 6a eb 3b a9 cb 98 85 d1 bc b2 | fb 43 f8 dc 85 42 20 a9 d4 7c dc c0 4c df 30 b1 | 6f cb 58 0b 5e 23 e6 14 ea 93 76 de 25 96 78 81 | 99 69 10 aa a3 9f ec 08 71 07 18 69 73 22 c9 ac | 3c e3 bf f1 09 8a 27 19 15 60 45 3d 4e 4f f3 e6 | c0 ab 4b c7 bb fb 2d 92 26 ca 7f de c4 f9 dd 4a | fa 18 2a 06 8c 14 94 9f a3 5d e6 b2 6b b0 ef e2 | 03 7f 7e f8 41 9d 8b 81 6b ea 4b 0b 45 f7 4c 93 | 70 05 72 9a ed 29 ed 3c 18 ca 66 2f d4 84 e6 4b | c1 2d 49 d6 3e cb 03 40 00 76 c7 f7 62 87 c5 1b | 85 d6 9d d1 8f 62 a3 ce 21 63 7a e5 94 35 85 13 | e3 c0 a5 2d 68 e8 0d 1f 37 ec 8c 55 12 d8 2a 1f | 06 81 5f d0 f4 ed e5 b1 5f c7 61 8a f0 5a 81 39 | 9f 6d e8 7f 5c 42 26 99 4f 51 2b 10 a9 6b b8 4c | a4 af 1c 69 f6 99 03 59 f6 8d eb d2 5c c8 04 4e | 29 00 00 24 3f 57 34 15 0e f6 1f 97 00 4e ca 13 | c7 48 27 43 fb 8e ac 87 27 dd cc da bb e1 5d 76 | d8 9b a6 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 1e a1 42 f7 31 41 ef 44 00 e7 a6 | 3d d6 a8 bb 50 6c 59 e3 00 00 00 1c 00 00 40 05 | 29 1a ff ca 49 77 f5 cd 99 41 a4 64 5f 6e 4a e7 | 0f a2 34 de | libevent_free: release ptr-libevent@0x7fb364017f20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a205f0 | #151 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 d5 c3 1b 58 0f 5c 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #151 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #151 | rejected packet: | d6 d5 c3 1b 58 0f 5c 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #151: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0491 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35000d120 | handling event EVENT_RETRANSMIT for parent state #239 | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #239 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #239 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49628.325167; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.022676 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c40 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #239 | libevent_malloc: new ptr-libevent@0x7fb364017f20 size 128 "road-eastnet-nonat-239" #239: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #239) | b9 4e df 3e 84 90 25 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea ef 5f 41 79 0b fe 19 84 c3 03 27 cb e7 22 b5 | 4b 8d ad 5a dd 57 ea a0 d4 aa e3 61 84 72 47 6a | 4d 42 f7 0c 18 4a 15 88 92 91 45 67 3d 64 ce a8 | f0 3e 2a 18 f5 33 74 78 5b 6d 2d ad 60 68 a7 2c | 42 44 24 a7 49 23 19 0c fa 8d 52 0c 5c f4 c5 65 | 9c 02 7d 4d 52 90 91 ba 69 4d a0 bb 25 6e ec 3a | e9 30 9b 1f f4 e8 ec d1 8d 6a 8c 3f 41 9e 38 b3 | 41 e7 4e 00 b5 c6 ea 1b 8f 24 c7 a8 c4 ec 84 ef | e4 cf 76 d1 2b eb 8f 91 66 1a d6 b3 71 c5 5b 71 | c2 ce 48 72 d6 b0 0f 07 ef 9a 8e fd 8a 44 8d eb | 79 c7 74 c1 a0 f8 4b 78 8d 62 3e 5a d2 f7 58 20 | ab d5 b3 52 66 2e d1 5e a8 11 59 26 5b 03 c4 c7 | 72 cc b1 7b df 43 62 14 05 c3 52 d4 b9 35 c7 18 | ab d1 fe d6 f2 c4 bf d0 34 85 da 05 d8 1c 9e bd | 53 20 10 e1 51 57 70 e6 78 d1 56 9f cf b4 da 8d | 2c 7b cb 52 64 97 83 25 dd f7 88 42 c4 42 ba 2b | 29 00 00 24 60 20 cc a1 fe 49 9c e3 77 c9 2c 1b | 58 3a e0 e5 74 37 cc 08 7f e8 2c 53 5a 76 29 4f | ad de 78 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 5b b0 88 0f ba 91 5e f1 72 ec fe | c8 60 42 a1 68 5e 5f c0 00 00 00 1c 00 00 40 05 | 4c 5b ce 23 3c 60 29 97 fc d7 dc 03 c2 55 73 9c | d8 91 a1 ef | libevent_free: release ptr-libevent@0x7fb350012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35000d120 | #239 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 4e df 3e 84 90 25 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #239 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #239 | rejected packet: | b9 4e df 3e 84 90 25 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #239: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #152 | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #152 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #152 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49628.370447; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.013937 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35000d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #152 | libevent_malloc: new ptr-libevent@0x7fb350012840 size 128 "road-eastnet-nonat-152" #152: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #152) | c7 e3 df ec 9e c4 62 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a7 d8 bf 29 24 11 1c ce c6 eb 11 96 dd 30 8f aa | 0c 4c 70 ce 87 a4 df 43 d2 6c ba d5 f0 3b d8 41 | 39 bd 2b 1a 59 08 f6 28 59 f9 b3 0f e5 b5 40 32 | 97 af 83 49 1b 9c e1 41 6c 19 d9 81 bd 62 6f 16 | 88 77 9c c6 99 70 f5 87 ca bd 33 9d e4 05 6b 5b | c0 98 a4 04 59 99 ff a8 0d 45 13 de 94 59 78 3e | 9f 29 e2 f0 6e 7e b9 fe f0 0d e5 7f 5b 4c 01 84 | ef a7 c0 48 17 b5 cf 69 2f 9d 37 d6 9e 2c 49 b7 | 21 74 f9 23 52 39 e5 70 37 49 22 ad bf 6a ae c7 | 00 73 99 52 14 5a 01 1d ec dc e2 c6 b8 f0 0e df | bb 4f 3c 66 48 6a d8 f8 3d dd ce 84 36 d7 fe 75 | b0 8b 40 6c b7 0a 71 a4 a1 89 ca 62 6c e9 05 72 | 42 a3 a2 98 b2 36 46 5e b4 83 55 6f f7 d0 07 bb | be 2a 0c 02 1c 0f 1c ef 21 73 11 f7 92 da ee 38 | b3 d6 c9 03 8b 2f b8 eb 38 2b 9f 1a 71 81 4d 22 | 5e d5 1f 81 77 a6 9c 34 d3 30 8a 8b 41 61 5e 1b | 29 00 00 24 29 e4 ca ab 2a 30 18 fc 26 46 3c 50 | 1a f5 21 d0 52 38 f5 d5 7b 74 90 b3 b6 ed 01 58 | e0 d9 32 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 38 7f 4c 40 24 5c 70 b7 73 9c 98 | de a9 9b f3 50 76 96 bb 00 00 00 1c 00 00 40 05 | 28 07 96 1e 77 dd a7 3a bc 86 9b 87 bc da 1a a0 | d3 4f e8 fc | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #152 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 e3 df ec 9e c4 62 b6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #152 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #152 | rejected packet: | c7 e3 df ec 9e c4 62 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #152: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aacc80 | handling event EVENT_RETRANSMIT for parent state #240 | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #240 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #240 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49628.39979; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007676 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #240 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-240" #240: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #240) | 52 3d c4 7d aa 75 f9 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 b8 f7 97 d2 8e a4 26 e4 de 50 11 3b 27 c2 bf | 82 42 f8 30 a7 cf e7 f1 22 7e 96 6e 08 55 b8 5b | 99 ce ba b9 bc a4 b9 85 84 1c 35 bd 81 0b 36 0d | b0 03 99 1c 13 93 72 39 72 77 b7 23 f3 36 8a 70 | 77 80 87 4b 02 4d f9 86 a0 7e c1 4d a8 f2 4c 39 | d7 80 8b 66 22 e6 a4 de 4b 09 73 0d 3d 7c b2 2f | 50 8d 5f 1f 57 2a bd 9f ac c8 a9 74 90 54 67 b7 | 8f c8 3d 39 71 39 c6 de 18 02 eb c5 ea 94 b8 db | 08 c3 39 15 f9 0b b0 93 02 0a 8a a7 ec 92 53 e4 | 1e 2b 04 08 46 40 50 55 30 ed 5b e2 89 d0 46 9a | af 8e 24 41 aa aa b9 1a e4 ce 8c fe 9d a8 de b8 | f4 9b 8a 9d 2c 1b bf b8 d5 b4 e2 72 19 89 07 85 | 8b d5 73 d5 4b b2 72 a1 17 f2 16 b2 06 c3 69 10 | 03 64 01 f6 2e ee b3 bb 12 bf 7f 2a 4b 56 f5 04 | 51 3d ee 1a 3c 36 62 a8 15 0b 0b b5 26 c4 ba ef | d2 cb 15 c8 7e 83 38 88 e7 bf 96 1b 07 79 a7 4b | 29 00 00 24 eb a6 92 08 8f 76 ab e5 c4 52 e9 41 | 1d 77 03 c7 35 5c e5 3a 95 58 fe 07 d6 1d ad f0 | 56 12 6d d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 c9 c0 38 06 3a 92 7e a1 78 c0 15 | 6c a9 8e 74 3a a1 8f 67 00 00 00 1c 00 00 40 05 | 56 20 31 94 4b 81 36 39 3c f9 b9 11 bf 66 a1 27 | 0d 62 c5 10 | libevent_free: release ptr-libevent@0x7fb3780407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aacc80 | #240 spent 0.184 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 3d c4 7d aa 75 f9 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #240 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #240 | rejected packet: | 52 3d c4 7d aa 75 f9 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #240: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #153 | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #153 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #153 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49628.426227; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005885 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aacc80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #153 | libevent_malloc: new ptr-libevent@0x7fb3780407f0 size 128 "road-eastnet-nonat-153" #153: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #153) | ed 10 7e d3 7b 33 74 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 23 2b fa a2 7a a7 c0 a4 0c c7 9f 58 c4 e7 e8 | 70 a1 a8 0f 51 5f a2 04 f4 14 9f d7 e2 33 9b d1 | 70 a9 9d e5 73 3e d4 0c 84 28 f3 47 b9 3c 03 49 | 98 c3 54 58 79 2a 6a d2 f7 19 34 3f ea 9b 09 66 | 26 4b 77 9a 2e 2d 06 7d b1 99 09 62 d6 ef 52 44 | 03 d0 e7 2e 96 a1 8d 5c ea 4e a7 ca 7e fb ac a0 | 2f ea 86 d8 ac 11 f8 20 6b 77 af c2 6c 84 38 e7 | 8a b3 d4 12 59 8f 14 90 f8 a1 09 66 1f 57 d8 3c | 73 c4 11 8b a8 7f b3 1e 97 ed 1c 65 90 26 33 5b | 30 76 3b 3b d5 b4 96 62 cb 7d 86 9d ad 4a 9e e5 | 2b b2 c9 9e 69 f5 8a e4 08 29 24 90 1c 8f 81 c4 | d0 5a 30 f4 83 2c f9 11 5c 07 b1 f7 f6 7a 22 ac | 46 53 33 91 c1 25 ad 6c f8 ee d4 49 b1 09 fc 61 | 27 91 e2 9d 17 78 bb a6 45 04 eb ad 01 76 59 27 | df 49 c6 69 61 22 0d b2 77 f2 e5 49 0e d0 19 37 | f9 e3 3c 5d ab 0d ee 24 0e 3a 1b 87 b3 59 f2 dd | 29 00 00 24 11 3e 89 f2 e4 5a b4 91 6f f3 6f e0 | 10 78 d4 00 e7 63 f4 34 67 6a f8 b4 dc 99 94 12 | b9 1e 59 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cc 1e 02 bf 67 12 0b 49 15 df fb a0 | 1b e0 2a 30 f1 cf bd 20 00 00 00 1c 00 00 40 05 | ce 1d 48 38 8b bc 75 71 1c ff 01 f5 d1 af 95 90 | 14 3b df 16 | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #153 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 10 7e d3 7b 33 74 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #153 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #153 | rejected packet: | ed 10 7e d3 7b 33 74 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #153: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9f380 | handling event EVENT_RETRANSMIT for parent state #241 | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #241 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #241 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49628.48358; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003159 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #241 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 "road-eastnet-nonat-241" #241: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #241) | ed bf c0 ae d9 fd 74 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 7f 1d 53 5e bf 7c 50 89 9a 1b 66 7a f6 ac 57 | 1e 44 b6 4e f9 ce e0 60 9e 35 82 8c 12 e1 ec 87 | c3 32 1d d0 30 6f 24 b0 84 5b 58 a3 dd 46 7f 56 | 3a fc a0 86 c1 a5 f0 b8 b4 7f c2 24 a0 35 a3 8b | 46 8b ad d0 3a 85 a8 93 6d 92 12 5e c7 60 d3 02 | 9d 48 49 61 d0 53 cf 87 bc ba 4a 86 e9 1d 0e c4 | 8a 55 24 90 50 13 2a fe 86 c6 6d 09 e7 31 26 ca | d2 d8 c1 f1 76 8e 79 98 8c eb 73 50 64 00 6e af | 8a ae f2 36 6c c7 fa cd 65 22 6c 5b 48 98 da 47 | c0 bc 45 31 fc 5e 0f aa b4 b8 1d d3 be 55 8c ba | 12 b5 d1 65 9a 9f 14 76 d4 89 e3 78 f3 26 29 2e | 46 8d 9d 7c 77 7b 47 8f 64 31 0d 93 e5 f5 e2 8f | 76 81 eb ad 7e 90 fd 6f b1 86 5e 11 a2 e7 77 5f | c1 4e 81 30 92 43 c5 b4 66 60 7f 33 52 22 85 c1 | 6f 01 81 ec 5d 5f 91 b7 53 01 fe 18 96 c2 64 e9 | d4 ad d0 b7 b7 a3 ba e1 97 81 a4 d5 9e 61 d0 8e | 29 00 00 24 48 1f 7b 4e 8c 39 27 4c 54 7b 31 27 | 38 83 2b 38 ab a8 0f 41 0e 72 e0 b6 b5 f5 a8 48 | 24 b7 3e 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c d9 59 12 c5 45 19 36 85 eb ed 91 | 74 0a b9 7e c6 b2 17 c0 00 00 00 1c 00 00 40 05 | 8c de 28 49 d8 e8 ba a2 04 93 2a 1c a7 e3 0e 84 | b2 9d 1f bb | libevent_free: release ptr-libevent@0x7fb36402ffd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9f380 | #241 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed bf c0 ae d9 fd 74 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #241 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #241 | rejected packet: | ed bf c0 ae d9 fd 74 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #241: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0749 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b026c0 | handling event EVENT_RETRANSMIT for parent state #154 | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #154 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #154 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49628.500958; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.018934 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9f380 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #154 | libevent_malloc: new ptr-libevent@0x7fb36402ffd0 size 128 "road-eastnet-nonat-154" #154: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #154) | 58 44 d0 f4 a9 dc 50 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 19 a5 f0 13 d1 8a b9 49 96 a8 fe 61 6f 4c e6 | ed 98 cc 8a 65 9d e4 af 10 e6 cf 62 f8 4a ff 02 | 90 85 dd 9e 23 5d 3e 90 f8 fe da b0 af 0e f7 4d | 4a 05 63 a1 69 db d1 01 e1 b1 0c 86 c9 3e 7d 9b | a4 2a 0f 98 09 40 36 8c 8d db ff 98 96 15 32 bf | 21 16 30 40 ae ae fb 4d 47 43 6a 1d c4 ee 0d b8 | 26 d3 b2 3f 2c ab f7 f8 0e a5 40 0f 3a fc 7c 80 | cc 8b 34 d2 f1 7f 26 73 45 a4 a9 ed 44 96 56 b1 | 73 9b 2b 0c 92 10 cb f0 48 16 48 7a 38 20 64 1d | 96 ee 19 8c 5c 7f a1 2d 3c cf aa b0 87 20 50 5a | d7 fe ed 1e da e9 09 e6 09 9a 75 a1 17 60 9e 3f | eb eb 3b 4a e8 5b e7 e1 61 2b a2 e0 ec 37 4d 19 | 5f 61 62 98 dd f9 aa d9 4b 8e bd 76 64 f0 89 37 | 39 0c 99 e6 f2 9b c5 88 8a eb 5b 10 1d 66 5f 10 | c6 5a 71 1c 22 22 ac a4 dd 72 16 46 60 ff 04 a0 | 8f 7a b8 da e1 39 b2 3e 50 39 72 e6 6a 86 81 1e | 29 00 00 24 8a 71 f4 36 cf 99 83 f2 20 30 a8 af | 91 e1 58 d7 2f 81 0b 43 f4 5f a3 87 48 cc 52 31 | 9b 27 40 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 21 57 f3 9f 4c 07 c6 03 b1 b0 7f | 5c 7f 90 aa ef 12 66 a4 00 00 00 1c 00 00 40 05 | de 38 70 15 e3 5a 3a 70 b8 42 a9 af 5d 6c a1 ee | f3 f1 65 20 | libevent_free: release ptr-libevent@0x7fb388048a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b026c0 | #154 spent 0.559 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 44 d0 f4 a9 dc 50 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #154 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #154 | rejected packet: | 58 44 d0 f4 a9 dc 50 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #154: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abe780 | handling event EVENT_RETRANSMIT for parent state #155 | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #155 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #155 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49628.551717; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006652 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b026c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #155 | libevent_malloc: new ptr-libevent@0x7fb388048a80 size 128 "road-eastnet-nonat-155" #155: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #155) | ba 2d 75 59 38 9a 40 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 2d 8b bd fb e0 3e 63 93 cb 94 a3 59 ba 66 52 | 15 4e 4f 76 34 6f 63 6c 04 46 3b 73 fd d8 a5 8e | 35 33 06 7a 8c 2a 4d a0 d2 b7 a5 ef 60 5a a8 23 | ae c6 93 50 9f f0 c3 f5 06 df 4c 45 c0 4d 3b 90 | 71 b1 18 44 3a bb 92 05 e2 cb 38 9c 05 04 9c e5 | 33 86 8c 22 6f 05 07 53 37 10 99 50 e7 0b 25 55 | 89 9d 75 47 09 a1 92 af c6 86 5d 17 e6 b3 28 20 | 26 34 0c 4e a0 b6 47 51 4c df 53 f2 97 03 03 a6 | 89 4b b3 92 4a ab b5 e2 4b 58 52 5d fc 27 cb e8 | 64 f4 d9 2f f4 95 21 72 e7 fe 03 93 84 af de ff | 1c 75 39 21 b3 f9 de 3e e2 ac 5f bb e7 9f 0c bd | 32 99 99 15 33 bb 7d f8 f9 aa 92 5a 38 4d 6d 97 | 0e 69 3d a1 d8 b7 8f 44 ed 36 63 50 f7 7e 74 d2 | 45 dc 02 6e 87 72 5d 06 c1 0c 87 2a 42 4a 0c 96 | e5 33 b2 8a 28 de 43 7b 5c 89 da 84 03 93 af 07 | 0f 41 63 be 8b 32 2d a1 13 d7 f4 a0 78 5d 7b 02 | 29 00 00 24 1b 6f 61 ca 07 05 56 47 f0 44 a9 2b | df 2e 5b cb e9 85 db 0d bf 4e 16 8e a5 b1 b6 3b | d1 6b b0 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 9d 23 9a a7 98 84 7a 80 70 0e 3e | c4 f1 43 a7 4e 6b 6b 59 00 00 00 1c 00 00 40 05 | 2e 42 b0 ef a0 75 a1 7c 37 dd 50 d1 c0 f7 e8 21 | 72 07 2b e7 | libevent_free: release ptr-libevent@0x7fb3500300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe780 | #155 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 2d 75 59 38 9a 40 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #155 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #155 | rejected packet: | ba 2d 75 59 38 9a 40 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #155: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0669 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7a390 | handling event EVENT_RETRANSMIT for parent state #156 | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #156 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #156 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49628.616084; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005527 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe780 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #156 | libevent_malloc: new ptr-libevent@0x7fb3500300e0 size 128 "road-eastnet-nonat-156" #156: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #156) | dd 32 b7 34 a5 67 d1 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 58 47 50 60 00 e3 2a ab 04 ac a5 14 a4 e1 f8 | 89 44 71 9e b6 e2 f8 e1 89 a3 38 1e eb a4 57 9b | c0 92 a7 d8 d8 8c 0f 8c f9 d0 36 f7 8d 04 cc a1 | 61 5a bc bb 35 d5 16 ad 1c 27 3b fa 1b a3 4f 77 | 4e 80 47 b0 e1 83 82 b2 b5 df c4 bc d9 8d 01 04 | 4e b5 a6 60 d4 4f b3 0f 13 49 05 d9 85 5d f8 18 | 24 40 91 d1 3d 7e 6a 98 45 d7 dd 05 70 e0 c6 57 | c1 84 e8 77 d6 e2 7f 57 50 49 e0 f2 9f b0 43 93 | be 02 be f3 99 3a 02 72 36 17 a3 a7 b6 d3 1e 0b | e7 53 c6 c9 cc d5 25 75 87 c0 73 6c 5f 57 27 d6 | 52 91 24 4a 97 d3 d6 0e af 8d 6c 52 24 2d ea 91 | a1 73 e1 9e 71 14 d1 4f eb 25 67 a3 b8 12 64 b9 | 8a 15 3f 88 bc 65 32 65 96 0c ff f7 b9 a7 84 11 | bd 40 10 e1 dc 1a 04 fe 8c 35 23 2a ec b7 33 72 | 4b f4 4a e9 9d f1 da a3 b6 9c fe 09 27 14 3a 79 | 5d 82 c7 e0 9b d4 a3 ce 53 68 f7 6f b3 06 c9 71 | 29 00 00 24 b7 44 fe 38 00 43 d3 2b ff 97 13 ca | 89 7c c3 ed e0 15 4d 76 12 7b b9 2f 48 9b b5 b3 | 8b 4d ce 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 13 6e 65 76 b7 ef f6 88 e7 f3 9e | f3 f9 5a bb 01 8b 91 4f 00 00 00 1c 00 00 40 05 | 4f 93 4d ef 0e 69 28 8b f3 02 75 93 a5 b3 16 9b | e0 c9 4b 18 | libevent_free: release ptr-libevent@0x7fb37401f7f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7a390 | #156 spent 0.176 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd 32 b7 34 a5 67 d1 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #156 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #156 | rejected packet: | dd 32 b7 34 a5 67 d1 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #156: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0732 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7b910 | handling event EVENT_RETRANSMIT for parent state #242 | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #242 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #242 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49628.654471; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.012033 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7a390 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #242 | libevent_malloc: new ptr-libevent@0x7fb37401f7f0 size 128 "road-eastnet-nonat-242" #242: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #242) | bb 4d 15 84 4a d1 63 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be b8 bd 73 36 69 de db bd 2c 4d 3f 4c ae 08 43 | b3 f3 d7 53 b9 34 af 4a b1 04 e1 e2 27 f6 b2 b1 | 3e 96 98 76 a6 00 83 11 2e 07 de 5b 47 a6 5a a5 | 8f 0c 87 f8 e6 f5 c8 d5 f0 ce bf 70 a9 e4 7d f9 | c0 99 10 3b ec 9c 30 58 7b 73 32 96 65 b5 9d 37 | 48 ba 52 b0 1b 39 cd 58 16 bc 06 a4 25 89 da 22 | ca c6 85 48 e1 fd 54 81 b4 f6 46 e3 a3 cc 04 fd | ed 22 5b c4 4b c5 12 3d 87 53 9d f3 99 49 26 6d | e0 15 46 62 13 40 fa fc 54 c0 0d bd 54 60 26 93 | aa dc 01 46 3c 92 65 7b 4e 15 bf 35 9f 0d 1e ef | 63 43 fe c2 e1 31 5d 4e e4 23 fe ab 39 17 60 89 | ab b5 9b 1d 6d ed 49 c1 f4 3e 50 67 a1 09 05 d9 | c3 d6 c1 46 1e 9a db 86 ae f2 48 84 9e 9d 6d f5 | 1a 55 ad e2 9f 23 3f a2 29 49 4a 81 a2 25 2b 78 | b3 0b 2d 2a ec 81 b7 72 6f 93 e3 8b ce 4c b6 e9 | 10 ec a2 f6 93 c8 51 54 e2 4d 42 c5 bb 12 0b c1 | 29 00 00 24 43 16 25 02 5f 89 fd c4 95 04 8f 29 | f5 97 17 77 c9 2f ab bf 71 ef e8 74 04 bd c8 92 | df d9 0b 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 dc d6 bb 84 20 bd 3d 97 6d a1 71 | 60 d0 7a 61 e2 12 2c 58 00 00 00 1c 00 00 40 05 | 6c 10 68 84 3a c9 9c f7 49 94 4f 1d 42 c4 e8 ff | 34 65 7d fa | libevent_free: release ptr-libevent@0x7fb37803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7b910 | #242 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 4d 15 84 4a d1 63 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #242 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #242 | rejected packet: | bb 4d 15 84 4a d1 63 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #242: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61c10 | handling event EVENT_RETRANSMIT for parent state #157 | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #157 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #157 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49628.686815; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.011669 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7b910 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #157 | libevent_malloc: new ptr-libevent@0x7fb37803b0b0 size 128 "road-eastnet-nonat-157" #157: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #157) | 58 3c 05 73 d3 10 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 16 05 06 2f 3b 22 9e 88 08 ab fe 29 25 f8 32 23 | d0 15 af d8 5f 65 e8 be c6 03 98 0f 18 e5 00 77 | 99 86 03 c7 fc 1b e8 83 43 61 ba 00 0c dc 29 59 | 0d fd 85 a1 75 5e f3 f7 d2 64 26 3b e1 11 43 3a | 94 43 08 73 30 5e 1d 91 aa 8f 9d c1 5c 52 ae c1 | 1d 90 3b cb 44 47 58 f3 40 38 01 58 63 65 29 32 | b6 4a 78 a5 71 58 c1 30 ea 73 8e 14 71 72 8e df | ee 45 ee f6 d2 a7 99 89 1c 7b fc 81 aa fe 75 bb | 36 cb a8 81 eb 73 7b eb 5a e7 fa 6d e5 b4 95 b2 | be 54 f3 23 c2 44 23 4a b5 30 87 1d 26 24 c6 c4 | 6b d1 5d 1a 24 7a 69 b5 9b 7f 97 17 e0 18 0f 6f | 1f f9 f1 e8 6c 46 2c d8 28 aa 7c 1d ec ed d6 d3 | b6 eb c6 eb 3b 55 59 5b 10 23 06 f1 f2 aa 19 3c | 8e ca 99 c8 e5 ba 47 04 47 84 62 13 96 06 08 0d | 88 7a a1 63 08 7b df 84 fd 48 36 29 3e 5c 44 7d | 05 23 1e 33 96 d8 b6 34 ea b3 94 6e cc d2 07 97 | 29 00 00 24 a9 6f a2 6f e4 cf 6b 0e 7b b9 69 24 | 56 3d ee de fe c6 39 89 8e 14 c9 0f 9e 2f 60 95 | f7 4e c6 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 bf ce be 86 a6 d7 14 f3 ba 0e 49 | ee d2 d5 26 4c 2e 13 18 00 00 00 1c 00 00 40 05 | 0a 36 59 95 a8 fb 5c 3b ea 04 70 de 29 72 15 40 | a3 00 f6 34 | libevent_free: release ptr-libevent@0x7fb36801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61c10 | #157 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 3c 05 73 d3 10 8c 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #157 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #157 | rejected packet: | 58 3c 05 73 d3 10 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #157: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0484 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #158 | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #158 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #158 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49628.743113; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00471 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61c10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #158 | libevent_malloc: new ptr-libevent@0x7fb36801d920 size 128 "road-eastnet-nonat-158" #158: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #158) | e6 a0 1a 4e 16 85 73 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d fe 92 1d 51 a7 6d 12 34 05 5b 88 3c 14 89 6b | 35 8c a3 94 b4 c5 44 d8 4b 8c 87 4c af 0d 5e 27 | cd 39 40 ee d3 b1 d8 0b a2 08 8c 95 70 dc 7c 67 | 00 94 18 0b cc 36 ba 02 42 ac 1b 6e 83 e8 f3 b5 | 91 59 9d ad e6 9f 36 2d a8 98 92 82 b5 58 8d 17 | e8 c3 14 93 e3 79 91 5b e9 d6 f6 a5 7b ab 15 3e | 02 89 3b e3 40 68 94 7c a5 09 b7 59 3e c5 6a 99 | 03 29 08 a9 4d cb 54 e8 24 b9 ad 4e d9 ec 0b 15 | 00 2a bb 1a df 73 04 f9 ab 12 4b db 50 44 e0 e2 | 22 35 8e 9a 3a 55 04 43 31 37 ac 1b 04 2e 40 6f | a3 ce 4b 7d 81 aa 0c 4f 00 20 e7 14 67 8a 92 03 | be 6c 2c b0 1e 89 ff eb d0 66 ac db b5 5f 07 46 | 34 4e 75 3e 19 4d d5 e5 2d 16 89 cc 75 86 80 6f | 3f aa e7 c1 07 a0 f4 7f 40 db 1c df 1d 97 4e 83 | 99 fc 4e 29 fa a7 c5 07 07 e9 c0 d9 34 f7 42 65 | b3 46 1d 34 7e 34 fc b8 2a d6 72 9b 56 fa c8 74 | 29 00 00 24 93 3e 30 9d 56 73 68 ed 32 94 90 87 | db 7b 56 ae fd bb a5 6c 98 47 2c cb b8 9c 69 c6 | ac 01 dc 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 af 5c ca 3f 10 b2 e1 eb 3b d6 06 3e | 82 97 94 30 e1 e8 70 cd 00 00 00 1c 00 00 40 05 | bb 02 3a cc bb 31 72 ec b9 81 77 29 32 3e e8 21 | a2 17 d3 ee | libevent_free: release ptr-libevent@0x7fb38800a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #158 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 a0 1a 4e 16 85 73 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #158 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #158 | rejected packet: | e6 a0 1a 4e 16 85 73 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #158: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0722 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf00 | handling event EVENT_RETRANSMIT for parent state #243 | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #243 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #243 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49628.788482; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.001148 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #243 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 "road-eastnet-nonat-243" #243: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #243) | 39 d2 8c 3c d9 9b d0 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 7c 7b 28 d8 43 9d a6 57 48 f3 56 58 a9 96 02 | 89 eb 92 ba df fe 7c b4 93 87 0a 15 04 96 3d d9 | 97 4f ed fb da 47 e0 91 75 a8 ae 92 a4 07 c6 b2 | 54 7e 3f f7 5a ab 2d 86 ec bf b6 60 fc b0 e0 42 | 42 76 7a 8f aa 4f aa 15 dc 06 c4 c5 a6 64 c4 cb | cc bb 4c d4 38 55 bd b1 4e f2 bf cc 48 b4 72 4f | 87 59 b4 0f 7e ed 03 f1 41 ee a8 6e 5e c8 2d 73 | 30 2b 8d ba 0f 00 07 b3 03 3d 8c 71 2e 4d 64 94 | 7c 2a 25 17 eb 7f f4 7c 3d ac 47 e3 e8 64 b3 1d | 93 52 33 b4 60 d2 91 0a df 53 00 a1 04 e7 82 d1 | ba cb 66 13 49 96 51 fe 75 53 10 a1 e8 ed 85 c1 | 24 57 8f 5c 2d ab 6e 1a d8 d2 18 48 42 bf 96 fc | f2 c5 7f a1 3d 7c 8d 10 dd 4d fc 0c 94 ce 13 b9 | f3 c9 49 d3 a2 9b 04 c3 51 ef 2c 4a 1d 70 85 00 | f9 d1 0e 6b 0b 48 a0 fc 89 8f e7 8e 83 74 57 7a | c9 0c 8d f3 c6 50 96 a3 99 76 7c eb ac 17 30 58 | 29 00 00 24 35 b2 35 5f d9 02 63 3b 19 19 86 78 | 0e 3a e9 6c 99 53 dc 00 7c 7f ad 46 fe dc 4c 82 | 97 17 87 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 31 4b 64 ab 4a 78 81 95 90 fa 46 | 73 84 e5 27 1c 47 ef db 00 00 00 1c 00 00 40 05 | 94 bc 64 25 b1 da 5d db 67 02 68 07 a8 c5 47 cd | f9 c3 f5 ed | libevent_free: release ptr-libevent@0x7fb38402d380 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf00 | #243 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 39 d2 8c 3c d9 9b d0 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #243 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #243 | rejected packet: | 39 d2 8c 3c d9 9b d0 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #243: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a89700 | handling event EVENT_RETRANSMIT for parent state #159 | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #159 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #159 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49628.818858; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.017023 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf00 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #159 | libevent_malloc: new ptr-libevent@0x7fb38402d380 size 128 "road-eastnet-nonat-159" #159: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #159) | 9d f6 62 77 51 33 7c 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 a4 0d 7c 3f bb 62 60 89 5b f7 52 ab d7 ca 61 | c6 32 47 69 10 70 7b 4b b6 2a 70 55 d5 38 a9 c2 | 06 fe 6f 0d a3 c3 18 2d 09 43 b4 f7 9b ba 82 ec | 93 e7 fe 37 c0 9d ff 14 eb fc f4 a5 4f eb f2 e9 | 81 40 d5 d7 0d b6 64 ad 86 89 bc 12 73 da 31 6d | 21 c9 f1 76 ef e5 fa c1 2f 00 73 7b 29 f7 14 d0 | cc 33 12 7b be c7 0b 95 25 c7 3c c9 94 8d 40 b3 | 24 76 27 7e c2 06 53 7c 39 6a 80 69 0a b2 fa aa | 13 ac 6b d9 25 77 ea de 54 91 5a 44 b0 3f bb f5 | d7 05 e4 68 6e f2 57 14 f5 2f 93 5c 8b e1 18 57 | a7 aa 40 49 0b b7 ce d1 00 80 ba 6e 5e cc 5b a3 | 7d 08 af 9a a8 cd d2 ac df 34 27 c2 04 7d d9 9f | e2 bf b9 fd 43 84 3d e1 23 56 2b 91 01 a7 94 b9 | 39 80 83 eb c5 4c de ac 80 1d 05 1e 22 14 a6 fb | 08 b1 be 3f 9b 24 b0 c4 63 eb 31 8d 24 20 37 93 | 7d fa a5 c0 26 eb c3 7c ae e2 24 2a 4f 31 bf c0 | 29 00 00 24 93 99 a4 63 0d 72 bd 0a 86 bd f8 14 | bb 6c 2c e3 e4 66 d1 1e e3 70 5a 2a 46 97 fd 74 | 37 df 1f 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 4a e8 13 db 7e 81 08 43 48 ab 41 | d6 8f 57 84 74 b1 75 e1 00 00 00 1c 00 00 40 05 | 43 72 1d eb 44 7d 24 cc 39 78 4a ec 22 c2 1a 4e | 3d 2f 0c bd | libevent_free: release ptr-libevent@0x7fb34802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a89700 | #159 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d f6 62 77 51 33 7c 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #159 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #159 | rejected packet: | 9d f6 62 77 51 33 7c 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #159: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0678 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35400d120 | handling event EVENT_RETRANSMIT for parent state #160 | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #160 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #160 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49628.874228; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006543 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a89700 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #160 | libevent_malloc: new ptr-libevent@0x7fb34802a950 size 128 "road-eastnet-nonat-160" #160: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #160) | ec 91 fb f1 0c bb 28 b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 30 17 61 87 0e 49 c3 b5 8e 06 e9 0f 8d 98 6f | af 06 7c a8 d8 5f dc 88 0a 69 f2 9d 79 59 e2 95 | a1 fb db 6f 1f 95 32 7b b7 f9 9f f9 87 3d 1e fd | 84 a3 dc 5e 41 59 c7 3d 40 a9 2a 90 d5 3d ec a5 | 70 8f 09 86 de c0 6f f0 8b 3d 45 2f a8 92 74 65 | dc 5a 07 23 6d 89 30 20 25 5a 37 b2 af 30 d2 98 | c2 6a 98 57 d0 a0 8f ff e2 c6 37 8c 7f c8 5e c3 | 9d 98 d2 5d 5e 70 59 77 03 8a bf 2a a1 c0 c1 c0 | 77 97 84 ec 45 c7 38 00 39 c5 2e 6a 0f 64 17 e5 | 6e 90 68 05 f5 f6 24 a7 89 fc 3d ac 97 b9 b8 8e | 69 68 d2 76 c0 8b ed 21 84 18 d2 89 99 90 e5 b1 | e9 a1 7c 9d 78 af 48 90 e7 1b 1a 7c 29 30 21 6e | 39 f7 cd b5 93 ab 03 d1 25 14 24 ad 0e 2c 3a 55 | 23 bf 0e 11 13 d6 6c 92 56 a2 2e ac 22 4b 36 72 | 62 e4 c0 2c 6e a1 80 10 e9 1f 33 37 5b 82 aa ab | bc d0 55 fd fd 61 98 d4 55 8c e5 05 44 59 3d 11 | 29 00 00 24 5a 7f a2 3e 7b 7f ae 84 88 a2 b0 db | 20 96 18 8a e9 32 7e 19 52 af 25 1a 74 e6 9f 5e | 17 1f 26 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 25 02 d7 0c d0 85 e5 86 af b4 01 | ce 64 18 db 06 ad 6a 73 00 00 00 1c 00 00 40 05 | 33 04 36 eb ae 2e 87 8f ec 4d 9c 69 20 d1 b8 6e | 57 bb 48 2f | libevent_free: release ptr-libevent@0x7fb354012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400d120 | #160 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 91 fb f1 0c bb 28 b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #160 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #160 | rejected packet: | ec 91 fb f1 0c bb 28 b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #160: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #161 | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #161 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #161 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49628.941583; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.011629 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #161 | libevent_malloc: new ptr-libevent@0x7fb354012840 size 128 "road-eastnet-nonat-161" #161: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #161) | 0e 21 c5 28 e0 11 16 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 b1 7e f7 73 9d 3d 0b 9c d2 8e 29 c6 08 34 06 | 2d dc ae 10 7c 53 33 af cd 18 8c 8c 37 fc eb 71 | 2c 3b de 0f 76 b3 63 bc 1c 05 f0 af 4b 44 5e c7 | 23 d4 29 d3 16 0f fb 8c 12 fb 18 1d 9e 65 94 73 | c1 7f 44 d2 39 97 a4 57 24 65 09 c9 9f 95 0f 07 | 98 bb c4 fc e8 f9 84 20 79 d3 9b da f2 f3 7b ff | 76 4d 74 89 ed 7a aa a4 38 3a 39 de f9 ec 60 48 | 7f 57 eb 50 ff 9b 33 98 7d 3b 5f cc 64 ba 1b 81 | 67 2a 02 26 ec 3f 45 a5 fe c6 9b 0d 1d 37 b0 40 | 01 1f 97 01 e8 87 5e 53 40 bf fb d3 7e 9e 2e b3 | 15 ba fc 8b b1 4a 7e fa af 94 c4 67 c0 2c 29 d2 | 74 fe d7 24 50 34 48 da f7 a1 54 c5 1c 2b 5a 35 | 33 a6 86 42 a8 e3 25 9b e3 fe 4c de 22 93 ae dd | c7 11 a7 9f 05 b4 87 2f a1 b9 2b f6 21 37 9c 8e | 50 21 6a 50 8e bd 1d 5f a1 42 92 50 68 2f 4e 9a | 54 04 e8 cc b9 5f 82 df 48 23 c8 76 49 63 f0 50 | 29 00 00 24 b8 74 18 e1 c4 b4 30 2e a4 31 94 25 | 46 e1 dc 47 b5 0b e4 ae a0 1d 11 3a f1 77 67 fa | 52 d5 2a a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 94 bf 28 28 ea 74 13 ca 7d 07 ba | 5d 79 38 7b d7 5d 40 d3 00 00 00 1c 00 00 40 05 | aa 2f 88 27 56 8a 2e 19 5d ff 44 bb aa 2d 48 42 | c7 75 31 6a | libevent_free: release ptr-libevent@0x7fb36c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #161 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 21 c5 28 e0 11 16 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #161 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #161 | rejected packet: | 0e 21 c5 28 e0 11 16 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #161: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa34c0 | handling event EVENT_RETRANSMIT for parent state #244 | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #244 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #244 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49628.972921; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004484 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #244 | libevent_malloc: new ptr-libevent@0x7fb36c00cf80 size 128 "road-eastnet-nonat-244" #244: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #244) | 4b f1 49 87 f9 a6 76 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 99 c6 ce 30 f7 89 45 59 4d 59 48 bc e8 db b7 | 6e 51 73 db f1 50 f0 84 78 35 a5 96 97 1e cf a2 | ba 46 c2 c3 3c f1 3a 6e 96 bf 5f af 7c b4 86 ff | c1 77 25 46 ad 5b ec 41 ea 88 d5 b2 00 e8 44 78 | 0e 9f 1e 30 ef 44 2c 78 1a e7 51 e7 d9 ad 9d e1 | 0d 69 bb c8 c6 a9 e9 4f 0c d7 5e 29 38 5c 8e e0 | 8e 7c a8 b7 93 d1 97 5f 38 52 c5 7b 09 49 6a 76 | 8a 53 22 ab 09 ab d7 9d 44 f6 cf 05 91 df 27 29 | 68 68 78 b8 7a 10 b4 e5 9b cb 01 8d f1 35 fc c7 | 7f 8f 0c 26 0d 68 38 58 4d f7 b1 9e 96 4e 4d c2 | 24 dc 6f 1f 81 ff 16 30 89 d9 d3 07 46 98 c4 17 | fc 99 c1 d0 c2 70 9e d5 7c 43 6d 12 f3 10 9e 43 | 41 f8 15 2e de ff 3f c8 97 02 5f 67 73 89 79 ac | 6a 34 e1 ed 55 83 46 98 af 4b eb 61 ab ed 9c 2f | 3c d3 92 2f df 77 9f 98 51 e0 24 45 80 51 7a 35 | d5 76 40 ee 59 99 54 8f 46 a1 fc 48 cb 2a 6a 64 | 29 00 00 24 23 47 a6 9f de 30 3b be 65 32 63 50 | 62 d5 89 0b d7 3d ea 19 da 4e 55 f9 53 26 8c d3 | 8a e5 35 df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 5e c3 f3 c5 40 cc e2 50 93 80 f8 | 58 99 fe 09 2c 8c 43 58 00 00 00 1c 00 00 40 05 | 42 a9 a5 4e 6c 3d 71 a6 0f 5e 70 c5 17 4e 52 56 | 03 54 70 77 | libevent_free: release ptr-libevent@0x7fb380022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa34c0 | #244 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b f1 49 87 f9 a6 76 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #244 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #244 | rejected packet: | 4b f1 49 87 f9 a6 76 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #244: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0502 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8d840 | handling event EVENT_RETRANSMIT for parent state #162 | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #162 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #162 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49629.013208; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005657 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa34c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #162 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 "road-eastnet-nonat-162" #162: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #162) | 3b bf da 45 10 1c 63 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 2a 00 6f 37 4b f5 08 dc 2d d5 a4 5f d7 a7 d8 | a8 4d 31 bb 56 e7 51 71 5b 5d fc c8 0e 08 fb e2 | c0 7c 0d 9e fa 59 01 dc 52 d2 c1 e7 2f 1a e5 b4 | 5b d5 c8 45 b5 dd 91 a9 d5 c3 73 76 9d 7e fd b8 | f9 df d1 f8 01 94 2b 6f e5 9a 29 12 9e de 27 97 | 71 f3 e6 1b 74 76 a7 3a 8c e6 a9 61 00 52 7e f7 | c9 6f 55 40 33 0a 80 4c aa c5 55 f4 4e 14 8a a7 | 71 a6 78 3d d0 59 58 77 2f 99 7c 4c c3 1e 74 08 | f9 85 d0 5e 65 f5 6a 31 d7 63 2d f9 e8 59 8b 16 | 32 89 82 d2 3f 02 ed 88 92 cb b0 35 d8 db 40 15 | 72 43 38 f2 76 11 5a 75 77 0e 67 e7 50 ab d6 be | 45 bd 9e 45 2f 01 23 b3 e6 91 d2 ea db c5 26 44 | 62 95 26 52 cc d7 f4 4b d1 06 28 b1 bb 01 1a 47 | 2c 16 e5 b8 18 7a 69 d5 78 76 2f ea 81 85 bf fa | 27 ed 91 6a 8a 48 18 3c 3f 20 85 89 ae e6 4e 97 | 89 5c 72 59 c7 16 4a 7b 0a b0 0c 8e 44 0c ca 39 | 29 00 00 24 95 de a1 84 1b 6b 5e e8 be 4d c4 44 | d7 89 7f ff f7 3c d6 b5 51 9e bf df 42 03 ca bf | 75 41 b7 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 45 b2 30 32 2f 26 ad dc fc 75 7c | 7f bc 91 0d 37 21 2d 1b 00 00 00 1c 00 00 40 05 | b1 72 3a ba 32 f9 7a 15 ec b8 bb 62 7e ea 84 2a | af f4 56 24 | libevent_free: release ptr-libevent@0x7fb3680300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8d840 | #162 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b bf da 45 10 1c 63 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #162 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #162 | rejected packet: | 3b bf da 45 10 1c 63 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #162: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0672 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #163 | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #163 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #163 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49629.080639; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.012096 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8d840 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #163 | libevent_malloc: new ptr-libevent@0x7fb3680300e0 size 128 "road-eastnet-nonat-163" #163: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #163) | b1 c1 5c f9 4d 0c 91 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 d1 ee ef 57 4d b8 a5 18 99 63 b7 ad a0 31 43 | d2 4c 84 95 c1 56 d8 c2 a0 e0 21 45 55 6c 89 41 | 0a ee 26 bb ae 9b 55 18 51 40 94 3e b5 e8 52 b3 | f5 21 f9 c6 39 17 43 69 05 cf af ff e3 2c 05 76 | 7f cc d0 9f 70 3b df 95 16 de 0c 79 98 56 e5 a0 | 35 3e 81 89 f8 f4 57 f4 b0 38 84 5c 5c 95 c5 75 | db 5d ff 22 a3 04 68 2a 25 a8 ca 43 e9 88 c1 c7 | f1 52 93 65 ec 22 3d 52 6b b8 00 65 57 c2 e3 a8 | 9e 23 a1 b2 55 fc 9b 13 25 aa af 20 21 98 a7 a2 | 67 94 3b 2e 91 84 12 14 99 be b3 af 12 1e 8a 45 | f6 79 09 3e 9e e8 3f fa a3 e8 99 22 6f d9 b8 e7 | 13 bd 62 da a2 36 db a1 c0 b9 40 6d 4f e4 fd e0 | be a7 dc c7 36 bf 14 ea 84 eb 4f 8e 85 9d 9c de | 91 8b 80 a4 7b dc e6 20 7f bc ce 40 33 ff 25 de | 32 53 56 b7 10 56 66 76 3f 7a e3 c4 c5 0e a7 df | 21 e3 47 1d 5c 2e 41 54 d0 87 c6 c9 9f 14 d5 5a | 29 00 00 24 cf 96 ac 26 a7 c4 21 b6 9b dc fc 7a | 6b 63 82 8c ca 2e ba 40 54 d7 a8 1f 94 42 b0 f9 | 02 a1 4a 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 05 f9 8b c8 3a 1a ac 16 65 f3 b7 | 0f 08 b9 7b 40 ca e7 92 00 00 00 1c 00 00 40 05 | 34 4b bc c5 91 2d b9 5e a5 87 8c 3c 9e 2e e2 11 | d1 e0 38 4e | libevent_free: release ptr-libevent@0x7fb36402a780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #163 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 c1 5c f9 4d 0c 91 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #163 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #163 | rejected packet: | b1 c1 5c f9 4d 0c 91 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #163: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0715 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1c490 | handling event EVENT_RETRANSMIT for parent state #245 | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #245 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #245 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49629.099113; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003709 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #245 | libevent_malloc: new ptr-libevent@0x7fb36402a780 size 128 "road-eastnet-nonat-245" #245: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #245) | 15 95 fb a9 f3 2d 54 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 07 75 44 62 b4 90 36 f0 1f 9d c1 5d 1b f7 db | 07 17 dd 42 63 05 02 d3 cf 19 39 61 be b0 c7 13 | b1 14 a4 a5 b8 a1 23 ab 35 be c3 4c de 16 3f 73 | 4f a1 df 22 33 3b cb 49 9e 26 36 44 30 39 b1 65 | 42 b6 93 29 4a f4 de 14 94 ba c8 61 f8 84 44 5d | 84 ad c9 32 19 82 79 9b 9b e9 75 42 04 bf 32 59 | 46 4e b6 9b ee 27 62 a3 18 81 ea 6a 95 c0 2b da | f4 8a 3a 0c 58 60 40 77 5e 77 85 02 1a 93 66 69 | 9d df f5 b9 a5 ac 45 4a 0d c0 94 39 1f d8 c9 eb | f6 d6 d7 0e d5 20 a4 de 35 3e cb b1 5a 3e 07 b8 | 15 10 06 8b 76 b5 1a ee 6d 90 d8 56 e7 da d7 5c | f6 12 4e f3 18 b2 7d 97 43 2c 6c d6 56 7e a8 7d | 7a cc 89 83 61 47 f5 78 b4 bb 7a cf 96 f5 41 2c | bd 99 b7 5f 2f 94 22 34 ed af 72 69 47 9d b0 d6 | ba d6 46 d7 20 70 b9 2b 04 c8 60 1d 2d 34 a0 00 | f0 50 7a 8d 2d 98 72 24 0c bf 1e e2 f2 65 16 ca | 29 00 00 24 78 20 60 94 4c f0 10 8a 14 01 4a 36 | 9d 71 3a 32 dc 84 92 f3 9e ca b0 c6 c6 47 0c 0e | 5c 4a 16 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 94 6f 42 13 dc 75 9d 65 6a 04 f1 | 12 0b d5 9b e2 af 9f 6d 00 00 00 1c 00 00 40 05 | dd ae 8a 7b 09 c8 82 03 b9 81 1c f4 27 30 35 7a | 2b 8b 29 2f | libevent_free: release ptr-libevent@0x7fb35403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c490 | #245 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 95 fb a9 f3 2d 54 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #245 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #245 | rejected packet: | 15 95 fb a9 f3 2d 54 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #245: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0714 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a67370 | handling event EVENT_RETRANSMIT for parent state #164 | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #164 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #164 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49629.141137; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.0096 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c490 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #164 | libevent_malloc: new ptr-libevent@0x7fb35403b0b0 size 128 "road-eastnet-nonat-164" #164: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #164) | 44 ec da ac e4 4e 81 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 94 19 dd 63 76 e7 8b e4 83 63 43 89 b2 25 2d | cf 02 f9 4f bb e0 9f 71 73 45 f7 70 9f f0 9c 56 | 36 6b be c1 42 fc 0e 64 e7 c2 6d 24 a0 c6 36 60 | f7 b6 44 63 1f f0 38 ff c1 f7 6f 09 6f 4b 15 6f | 4b a9 13 86 3c 04 b4 e0 2d 41 b8 5f 44 ac d3 1c | 62 7f f8 b0 79 c8 65 ec 61 21 a8 52 27 b3 79 db | 53 67 7e 4f 89 b2 45 b9 ee 3a 63 76 a6 cd 73 36 | 58 41 37 8e 8c 8a ef d6 60 54 ff 74 54 a2 07 6a | 56 54 10 22 af 8e 9e 38 af 48 a8 f2 42 f1 a6 05 | c8 55 0c 92 44 27 a3 4d be a5 b4 50 92 f3 bb 45 | b6 87 15 6c 92 a5 f1 21 ba 44 19 05 5c 4c f2 dd | 7d 64 1c 49 e3 61 8b 21 2c ef 63 14 91 93 e6 e8 | 84 82 9f 30 40 50 49 82 eb b8 19 d0 b6 4a c4 be | 05 18 e6 9d 08 3f bb c7 7a 98 44 e5 42 f9 eb fa | fc 80 53 22 fc 7c b9 e3 92 39 dd 88 61 10 2d 74 | 06 8e 96 3a 48 45 58 41 40 85 53 83 03 19 1d 49 | 29 00 00 24 e5 04 5f 5d b9 93 eb b6 f3 88 8f 81 | b6 50 c2 5a e0 91 27 94 ef 3b 1e 82 c9 33 1d 99 | 72 cc f9 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 cd 86 69 c3 fa 02 39 bf fc f5 08 | 1b bd f9 dc 60 39 91 12 00 00 00 1c 00 00 40 05 | 76 11 49 93 b0 52 97 cc bc 0b 84 d2 15 33 08 b4 | 9a f9 d3 5b | libevent_free: release ptr-libevent@0x7fb37c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a67370 | #164 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ec da ac e4 4e 81 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #164 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #164 | rejected packet: | 44 ec da ac e4 4e 81 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #164: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aeb540 | handling event EVENT_RETRANSMIT for parent state #165 | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #165 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #165 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49629.202495; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004023 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #165 | libevent_malloc: new ptr-libevent@0x7fb37c04b7c0 size 128 "road-eastnet-nonat-165" #165: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #165) | 84 89 ec 12 36 85 f6 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 64 07 de ac 8a b1 da f5 cd 1e 8a 72 06 02 07 | b4 71 02 7a d1 b4 70 86 ed 7c e5 04 db 06 11 b0 | 70 66 08 44 59 b7 49 22 d3 ba f4 ee ab fa 59 73 | b1 06 c3 8e 52 a6 3b 08 b7 93 04 a1 45 f3 91 38 | 82 d7 95 0c b3 fe bf fd 60 7f 15 7a b2 c9 6e 96 | 31 f3 92 9f 9b d4 51 14 46 6d a7 f8 2c 3c c3 fe | 86 c5 71 52 b8 28 62 77 5e 36 d1 7b 6a db 03 2c | f5 d4 3e 3d 1f 4e cb e7 cf b8 d2 9f e6 10 67 e1 | a3 1a 3a 9b e2 59 8a f3 f7 c0 58 cc fc 02 e0 b1 | da aa 4f e9 d2 86 5e 94 d6 73 96 ea 14 32 c4 4e | 3d c9 38 94 c5 47 af 83 6c ee e9 2a a3 8b e4 12 | f9 91 c1 53 48 67 8c 42 6e c0 7e 45 20 2e 6a a6 | d3 98 3e 6d d1 40 3d 9d 84 9f 54 62 49 b6 f8 67 | 32 fb 70 e2 78 08 b2 de c4 3e 70 08 0b 45 41 d7 | 34 49 14 7d a4 bf 53 d6 45 c5 fb 03 1e ef d6 06 | 6f 22 f9 f9 7c 4f e3 63 ea 02 1e 63 6e 3d 4d 36 | 29 00 00 24 a3 25 18 45 df 55 70 c4 52 41 87 e0 | ac 0c cb c2 e9 c1 36 19 df a3 78 76 61 ca c0 73 | a3 74 0a f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 2e 20 30 11 5b 47 b9 0d c9 d3 63 | b9 57 85 b4 89 e5 03 11 00 00 00 1c 00 00 40 05 | 69 81 91 3b c9 31 0b 05 42 34 36 76 be 6a 34 94 | 71 f5 f0 25 | libevent_free: release ptr-libevent@0x7fb36c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aeb540 | #165 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 89 ec 12 36 85 f6 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #165 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #165 | rejected packet: | 84 89 ec 12 36 85 f6 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #165: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a70b50 | handling event EVENT_RETRANSMIT for parent state #246 | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #246 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #246 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49629.231841; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003606 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aeb540 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #246 | libevent_malloc: new ptr-libevent@0x7fb36c01d920 size 128 "road-eastnet-nonat-246" #246: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #246) | a0 25 29 39 44 0f 25 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 89 2d 00 d4 20 29 db cd 68 77 f7 b8 f4 ff 24 | 1d 5c 36 95 62 d1 6b 2e 7a df 4b 3c 19 93 58 6c | ce e3 80 e5 ca a3 cf cd d3 d9 a2 b5 58 7c 6c 24 | e1 80 e9 fc d5 84 ae 0d 7e ea e8 9d e7 06 ab 00 | 72 40 cb c2 16 e6 8b f6 4d 5d d8 7e 9f 89 2b e1 | 0d a8 b1 ac 98 7a 10 80 97 71 ec 1f c2 1c 60 a0 | 4a 47 2e 26 d4 f8 3f c5 e0 4a c3 e3 ec a5 f8 3d | e3 be 62 c2 d3 a8 de ed 5f db cd 09 f3 df 3a 1b | 2f ae d7 5b 61 a7 b7 f8 35 c0 11 77 df e4 3c 50 | b9 e3 f0 3f 49 55 b1 46 c2 af 2d 77 f7 83 81 bc | 3d 89 16 cb 06 4f 2b 0b 77 6a cd 08 70 dd b2 5e | 34 34 1a 43 20 61 50 18 62 59 04 5a 1c 76 f2 1a | c5 6a 20 de 8a f0 5f 77 96 4b dc b9 ab a2 15 f3 | e6 86 a6 63 09 55 5d af 9f e1 30 a3 28 2a 95 86 | 24 6f f2 be f6 80 d7 fc 17 1b db 4c 69 eb f3 36 | e3 f0 06 e4 5d c6 62 de 3e 20 88 cc a6 63 59 4c | 29 00 00 24 ac df 8c 0e a5 90 d3 52 1f a2 e9 1c | c5 97 45 07 c2 87 cc 4e 1a 76 e7 94 30 33 9e 66 | b7 ac 45 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec f9 d9 bf 03 4f f2 a2 1a a6 75 4a | e9 f5 fc 17 1c 38 34 10 00 00 00 1c 00 00 40 05 | fd 95 24 c3 10 0c 51 95 0e 6e a3 ad 3b a1 a5 1a | 2c 16 a1 31 | libevent_free: release ptr-libevent@0x7fb35001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b50 | #246 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 25 29 39 44 0f 25 eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #246 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #246 | rejected packet: | a0 25 29 39 44 0f 25 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #246: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ddbf0 | handling event EVENT_RETRANSMIT for parent state #166 | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #166 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #166 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49629.267185; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005272 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b50 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #166 | libevent_malloc: new ptr-libevent@0x7fb35001d920 size 128 "road-eastnet-nonat-166" #166: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #166) | d7 12 9c be 9a d9 20 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b c9 02 ed 54 28 bb 69 3a fa da 89 fc 4e 39 8f | a4 d9 5e 2f e7 5a f0 78 e4 4f 3d 81 ef 79 61 1f | a3 10 38 af aa 4b f6 ef 84 82 56 19 cd b4 c3 5b | aa a8 08 49 1f b4 b8 b1 4e cd 8c 0c 86 09 40 1d | 3a ac 4d 85 be 4c 1d e8 f2 bd e7 23 97 c2 da f8 | 65 82 fb 26 55 00 06 12 19 2c fe d3 7b c4 ff 31 | 3f 92 30 47 40 04 59 ba c0 27 99 b0 dd 45 22 cb | 97 1b 7a c0 ab ef 56 9c f3 d7 45 a0 a5 37 a3 b2 | 58 e2 9e 19 5e 81 d9 fa 7b fe 78 35 15 83 01 42 | 24 2c 5a ee 4f 05 09 f4 1d dd c3 06 45 d3 ea 94 | 81 04 37 3a 2a 09 3c 79 d8 7b 16 c9 e4 4e 70 57 | ac 53 d9 f3 76 57 6b 10 ff a1 91 96 c5 09 1d b2 | 37 da 15 c6 76 39 0e 79 8e b4 e3 6b b6 34 b5 ee | 59 40 13 d1 7e a5 f4 50 26 80 c7 4d 2f bd 97 83 | 7b 42 78 41 a6 62 d7 58 6e e8 20 3d f8 07 e4 57 | 49 7e 0c 32 68 81 0c ed 46 bc 7b e3 e1 f5 77 38 | 29 00 00 24 a6 0c 32 e7 5a d1 b5 ca 07 42 9a 49 | 78 63 23 e6 6a be e5 1f b9 dd 49 81 36 5a 86 c7 | 6b 23 86 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 81 0a 2e 3d e5 a2 7d c2 7a 52 36 | 53 f5 16 ff 78 27 b0 06 00 00 00 1c 00 00 40 05 | 82 68 99 97 5e 62 33 7b 33 19 33 98 83 8d 7f b1 | f3 01 32 b7 | libevent_free: release ptr-libevent@0x7fb37004b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ddbf0 | #166 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 12 9c be 9a d9 20 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #166 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #166 | rejected packet: | d7 12 9c be 9a d9 20 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #166: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #167 | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #167 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #167 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49629.334549; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00729 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25cc0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #167 | libevent_malloc: new ptr-libevent@0x7fb37004b7c0 size 128 "road-eastnet-nonat-167" #167: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #167) | d1 34 e0 8f fb 7c 13 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 06 19 19 47 f8 53 ed d0 cd 1b 23 74 a8 df 03 3c | 9b a0 ef 95 f1 ce f6 ae 26 37 05 42 40 f8 1b 11 | 25 b6 88 f4 08 21 89 99 64 30 46 35 2b e5 72 51 | 22 12 a5 4d 09 28 30 73 8d 80 f8 3e 6a c2 3d d6 | 8d b5 a5 60 de 1d e9 8e c3 96 be eb 9a e4 82 44 | cd c0 61 18 61 45 71 3d 05 11 06 a9 ca 4e 06 4e | cb 22 e9 93 7b 78 bf 7f 83 42 10 73 45 d5 b3 1b | 92 fd 26 c3 64 99 f5 61 c8 1f 64 c2 09 10 74 12 | fd fe 01 de ac 29 c7 4b 49 1a d9 8d 7a bd 94 f7 | 39 58 38 2e ae 17 b2 73 1d e4 a7 77 fc bf 85 3c | 63 5b 1a 29 48 e8 aa 07 3f e9 82 92 50 e7 72 9f | 9a d8 a5 97 f7 0c 72 e2 e7 b6 cb 0c ff 4e 38 9e | 6d f9 d9 e0 8f df a4 4e 9c de 86 ff 7f 6f 46 07 | 19 30 44 7c c3 76 d0 df 68 7b cd 98 75 c7 57 02 | 52 bd 7f a1 c9 22 2c 83 36 62 ea 42 c7 31 3b 8a | 30 42 3c 51 50 0b 14 55 d5 43 19 16 fa 0b 4c a5 | 29 00 00 24 15 4a d1 bb d8 87 b7 c2 1d 20 84 6d | 4c 8a c4 e7 5d 03 8e 8f 16 37 df e9 c3 77 de 41 | b9 4c a3 ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 52 6d ba 0b 84 f5 59 4b dd eb 25 | 53 bb c6 97 e9 c5 42 9c 00 00 00 1c 00 00 40 05 | f4 8a 9c 13 b7 e1 a4 8b 85 79 9e 14 f1 e3 5c 5f | 69 af 71 4a | libevent_free: release ptr-libevent@0x7fb358009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | #167 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d1 34 e0 8f fb 7c 13 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #167 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #167 | rejected packet: | d1 34 e0 8f fb 7c 13 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #167: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0678 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a647d0 | handling event EVENT_RETRANSMIT for parent state #247 | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #247 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #247 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49629.358907; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005883 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #247 | libevent_malloc: new ptr-libevent@0x7fb358009640 size 128 "road-eastnet-nonat-247" #247: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #247) | 5d 14 02 50 68 e1 05 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 49 8a 2d d4 33 c0 d7 bc cf 08 ab af 13 85 8e | 9a 12 a5 cd 3b 66 31 91 51 03 92 de 96 84 44 92 | 2f 58 74 2e ab 28 ea 0d 4e f8 e3 ae 21 e6 45 c8 | 43 4c d5 50 a9 19 c3 44 67 b2 10 6b 79 6d 94 47 | fa 38 4e 33 78 ee e7 d3 9c 31 e4 3a 0a 97 fc f9 | af cb 80 37 57 a0 1b c2 09 c2 31 8b fc c7 0b 20 | de c6 8f fd b8 6b 84 a5 39 ac f6 54 bc 56 ef 0f | 64 4c b3 c3 15 1d ff 22 52 dd 24 dc a2 84 2b db | e1 cf 6b 7a 77 75 72 44 46 ba 71 64 0d 1e 05 41 | 6b 10 ff 59 ad 5c e4 40 01 51 72 36 a2 b0 08 e3 | a6 82 a9 79 20 45 b1 f4 1e 13 22 a0 f1 4f 23 23 | 9c e9 d5 77 c7 56 3c 45 ca 5c a9 1c b1 68 03 08 | a1 eb f6 b1 e5 5b 6c d6 3f 31 2a ba a0 3e 1f d2 | a5 29 ae bf 59 de 0d b4 a3 d2 df a5 98 9f 76 2c | 4f cf 7a 3e 6d ac 96 b0 e7 e5 ce f6 05 40 9c 9b | 09 66 cd 5d b1 dd cb f0 23 07 ad be 0d 42 b6 2e | 29 00 00 24 ef c2 8a a6 2e c6 51 78 10 63 06 58 | ba ed 73 0f a8 fa 21 72 a3 1c 39 ab 2c 37 74 08 | 1a c5 f7 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 eb f7 f6 58 75 8d be 43 b7 49 b8 | cd 30 58 5c 95 8f b2 8d 00 00 00 1c 00 00 40 05 | 15 66 60 c0 d3 3c e7 68 f4 56 38 e9 31 35 3c 02 | ee cd 1d 4a | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a647d0 | #247 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d 14 02 50 68 e1 05 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #247 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #247 | rejected packet: | 5d 14 02 50 68 e1 05 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #247: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0683 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b07dc0 | handling event EVENT_RETRANSMIT for parent state #168 | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #168 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #168 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49629.40927; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.012279 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a647d0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #168 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 "road-eastnet-nonat-168" #168: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #168) | b9 02 4f a9 68 0f a0 fe 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 38 63 d7 fd 7e 45 ef 72 03 13 6e 35 cd 53 26 | dd fc 38 ee df 06 1b 11 d5 c4 09 34 ea 9e 52 e9 | 90 99 59 42 6e 45 cc 92 f7 0d d9 7f 81 1b 1c 4d | 72 ce 0d 51 93 0e f8 d3 b9 70 d1 ad 64 8a 6a e2 | a3 1d 17 ed 1c a1 e4 c2 92 7b 01 e5 0d a5 15 1e | c9 45 f6 10 06 37 94 e2 37 85 e0 bc d4 3b da fb | 39 7d 59 09 ad a9 c4 e3 7a c2 37 5d ed ee 68 e8 | b1 63 07 9f 75 29 29 20 65 07 02 b1 8b 8b 01 b0 | 2b 52 3c a4 c8 5c 27 70 49 1c a9 4a ee d4 27 a2 | d7 44 e4 1a a5 20 37 9f 74 66 e1 72 a9 aa a5 00 | ec 99 a9 b7 19 84 18 49 d0 9b 4f 00 03 95 50 90 | b6 93 61 e2 6b 86 3b a3 1f 9e fe be b9 00 11 4e | d0 ee 6d 6d 92 bc 2a 22 db 5c 6c ba d6 ed 5d 3e | 26 d4 a4 f0 75 e3 70 55 39 8d c3 1c 3c 5e 40 3f | 06 f2 7d 36 24 34 4a 10 84 8b e4 b1 b8 1a 47 88 | b9 e7 73 06 47 d4 d0 41 aa 50 1b af 0e 28 2a e0 | 29 00 00 24 3f 02 e6 1c 86 66 81 19 d2 36 b7 e8 | e6 9a a6 e7 5e 78 b6 e8 13 75 aa 57 3b a6 be 37 | b8 21 ac c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 8a 57 55 a3 9f b5 8e 63 74 0d de | 85 a9 a1 c8 2f d9 1c 61 00 00 00 1c 00 00 40 05 | 7a 31 f7 15 f8 cd 69 10 6a f0 ab d3 a9 c2 c3 c7 | 07 31 9b 08 | libevent_free: release ptr-libevent@0x7fb364045e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b07dc0 | #168 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 02 4f a9 68 0f a0 fe | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #168 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #168 | rejected packet: | b9 02 4f a9 68 0f a0 fe 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #168: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0667 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45350 | handling event EVENT_RETRANSMIT for parent state #248 | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #248 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #248 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49629.475631; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.011195 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #248 | libevent_malloc: new ptr-libevent@0x7fb364045e60 size 128 "road-eastnet-nonat-248" #248: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #248) | 0a 60 4f 04 ec 5d f9 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b 96 4e 6b 1a 47 f3 29 f4 97 63 43 e3 c7 7c c2 | b5 40 35 82 f8 ae 61 14 ae 37 68 84 b3 6c 17 bd | e2 38 fa 08 01 a0 06 e7 9f 6c ca f7 e0 61 70 92 | 35 69 98 cb 13 b9 35 de 14 7b 48 01 ca 16 d2 a3 | 8a 8d f7 e5 16 28 68 18 42 b1 0f f2 66 75 2f 1f | 92 e4 b0 69 36 a2 b4 75 60 ca a5 a2 69 6d e6 5d | 46 24 17 68 8a bc 97 e8 9e ee 7a 06 d8 89 ea da | 29 95 98 02 98 06 f1 21 8f de de a8 b1 db 6b e4 | 16 54 6a d8 f1 bf 06 c3 2a de 4c 0f 1e 69 c7 60 | 71 82 15 35 09 a6 80 73 54 ab 5a 82 af 1b da 3b | c5 0a 69 1d 72 1d bd 02 fa 14 6a b4 37 14 ab b1 | 6c ef 68 fb 08 a8 b0 c6 58 93 07 45 93 1f 0d 53 | 5a 7c 44 c6 e8 cb d0 e7 6c 54 5d c1 89 3a e8 2b | e2 33 79 6e fa fd a1 8c dd 41 32 f8 12 7c 52 d0 | ef b1 cc 9f e3 23 da b6 ea 6c dc 48 7a 7e 45 73 | a1 ca 75 fd a6 b2 28 b4 4d de 48 05 30 76 df f1 | 29 00 00 24 da d0 88 5b 97 8e 08 a8 b2 aa 35 1a | a0 f5 0d fa 05 bb 67 43 a9 98 40 73 a9 62 0f f1 | 91 cf ba 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 42 31 df 79 b8 d9 7f 21 24 fd aa | 74 f3 12 b0 e3 0d 96 52 00 00 00 1c 00 00 40 05 | 1d 11 c7 78 91 0f ef bb 0b 1a 85 c0 59 35 e2 cd | c1 30 49 b7 | libevent_free: release ptr-libevent@0x7fb37c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45350 | #248 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0a 60 4f 04 ec 5d f9 e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #248 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #248 | rejected packet: | 0a 60 4f 04 ec 5d f9 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #248: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0695 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b610 | handling event EVENT_RETRANSMIT for parent state #169 | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #169 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #169 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49629.480985; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003264 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45350 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #169 | libevent_malloc: new ptr-libevent@0x7fb37c01d920 size 128 "road-eastnet-nonat-169" #169: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #169) | 36 7b 71 a0 e2 7f 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 4f 45 f4 ab d7 36 ef 76 4d 44 de 6d 62 2d ae | 4e 5c 7f da 0a b2 48 be 78 ae 6d be 58 68 4b a4 | 8f 2f d2 29 68 46 25 1b 12 f9 92 02 9c d7 87 f1 | eb d6 eb 82 f8 34 c7 6d 1b 97 bd 5a 16 3f 5c d9 | 45 ff a3 65 05 29 38 16 83 1c 73 b0 0d 2c 32 2c | fa dc 03 8b a8 c2 e4 3a 68 19 c8 6f 81 6b a9 c7 | f3 1e d3 85 90 6b 23 38 49 5d e8 b8 1a 99 c6 3a | 6a a2 1b 8c c9 a7 dc be 9d 40 85 d1 eb b3 30 ea | 56 c0 aa c1 0c 1e 30 02 2d 3d a6 f2 04 1d 14 69 | 6d b1 c7 5c 5a 62 14 b7 a7 b0 4d b4 4a ea d7 8e | 92 28 ac 35 b4 c0 43 9c a2 b3 5b b7 49 ed fe 09 | 58 d4 4b a6 dd 4b ac 69 dc 3a 32 2b 1e e0 8a 39 | ae 70 61 ea 71 bb e0 10 48 b3 9a 5d a8 33 73 7a | e9 75 bd 48 dd 69 c9 c8 be a6 8c 92 7f 96 ad 37 | 04 3d 47 69 86 1c fb 25 12 87 50 73 a4 63 1a 75 | dc 73 f6 d1 8e ed 8a 90 43 3f ec 36 e2 fd c3 e9 | 29 00 00 24 c6 0f 04 68 5e 20 5e 64 7b fe 77 4f | 0f cb 3e 64 8c ad ed 27 06 6f 13 47 5c 0b 0d 8e | 1c d7 84 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fa 7c 50 0f e9 f1 70 67 4d 08 f0 45 | 40 25 4d e8 01 bd 9b 4f 00 00 00 1c 00 00 40 05 | cc 1b 7d 85 9d ec 77 c3 d4 a3 45 1a a2 36 2f 10 | c5 f4 8f 3e | libevent_free: release ptr-libevent@0x7fb34c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b610 | #169 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 7b 71 a0 e2 7f 3d 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #169 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #169 | rejected packet: | 36 7b 71 a0 e2 7f 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #169: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0731 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #170 | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #170 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #170 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49629.548419; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006377 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b610 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #170 | libevent_malloc: new ptr-libevent@0x7fb34c00cf80 size 128 "road-eastnet-nonat-170" #170: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #170) | 0e 3d 5a e4 33 67 ae f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 3a 08 5b b2 3f a4 8e df 9b c0 eb a8 ff 32 50 | b7 58 7d 7d 4a 10 8c 9a ad 53 11 df 0e 8d 39 fb | 8a c0 5f d6 8f ee 32 b4 c6 d6 4c 41 39 dc c8 7f | a6 9c 35 ef 09 08 ca f8 2d 7d 3c 76 aa 39 58 43 | 35 eb 36 d9 ef 09 c3 c6 d0 ab 11 b8 34 40 ff 55 | c8 35 93 0b bc c0 66 e0 d9 9f c1 89 c0 9b 98 09 | c8 0d 44 3a d6 3d e2 b0 52 69 78 44 4a 24 b0 ad | 80 aa 61 eb 53 d9 1a 0a 53 30 0a eb d5 8c f7 f3 | ca 01 74 12 22 ff f3 9d 01 97 d0 63 da 1b b6 a1 | 02 35 c9 78 38 c4 96 f6 23 08 55 58 52 01 18 8c | 46 ea 56 a8 65 c1 e7 43 3b b8 d3 07 66 36 b4 14 | 25 9e f5 4d 86 46 ab 55 94 68 c7 67 da 70 2b 06 | a8 71 55 97 18 18 f9 3a 98 e0 35 83 6a 8d aa b1 | bc e1 50 ed 72 ba 83 3d 44 b6 97 eb 32 ff 41 57 | 48 97 03 67 e5 b8 1f 12 59 d4 1e 23 84 44 9b 29 | 9a 72 cd 57 ba 76 df 2f d8 46 ae e3 a7 ac 2c 37 | 29 00 00 24 f5 be bd 85 ea bf a8 35 5e 2e fb 98 | 21 e3 d9 77 11 2b 7a 24 c1 b5 1e 2f 89 52 5c d3 | bf 7f 74 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a ca 79 b0 52 c7 26 24 58 ba d7 c8 | 58 6a 36 93 64 5a 0d 23 00 00 00 1c 00 00 40 05 | 2e 8d 3a 82 9a 56 9c b7 68 e2 e0 45 0d 65 b1 99 | f9 22 bb fc | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | #170 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 3d 5a e4 33 67 ae f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #170 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #170 | rejected packet: | 0e 3d 5a e4 33 67 ae f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #170: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad4380 | handling event EVENT_RETRANSMIT for parent state #249 | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #249 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #249 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49629.565757; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.008741 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #249 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 "road-eastnet-nonat-249" #249: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #249) | ad 80 10 70 da e5 b7 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 1c 07 0c da 8a af 5e 89 e6 75 e4 e2 6b 94 81 | 88 bb cc 32 0e 51 16 82 66 1f 3f 42 b2 39 20 4f | 72 37 07 9a fd 40 87 70 79 6c 98 3b 3f ae 9c 8b | ce 68 05 66 50 64 85 b6 97 7b 54 39 f1 30 aa a3 | 04 6c 7c 88 ec 3c d1 1c d3 b4 4e a1 ee ab a5 d5 | 77 d7 c7 96 43 3f c9 ba 18 4d e2 bf ce 40 6d b9 | 2e 6f 43 a4 09 5e 6a 0a 57 fe 2f e8 72 ab e9 6e | d3 23 65 2e 56 3d 4f 3b 55 96 b0 62 91 f8 d1 e0 | 2e e0 00 1a 25 63 9c 6e 63 ad 31 ed ac d2 4b 58 | e3 5c 40 70 04 55 4c 39 0d 41 92 a2 3d 54 25 26 | d7 ef 2a e6 88 54 16 3c 17 a5 5d ae da e8 b9 49 | 9e f9 ac d6 d0 b5 d1 4c 32 7f 53 80 13 ce 13 ff | c1 9e 7b 3a 03 2e b8 d1 5e 50 be f8 6c db 78 af | c8 42 2d 25 43 1f 70 34 56 a4 16 57 bf 31 c6 30 | d5 f1 f9 72 d0 f9 83 35 68 6b 2a 69 4e 20 b1 d3 | f4 3c 9d 15 41 2d 80 5e c6 a3 cc c1 23 a7 f8 c0 | 29 00 00 24 cf 2f e4 f6 cd 34 13 11 b4 5d 4f e0 | 11 dc f5 73 81 ae 1d 25 a9 7b e9 47 0f d3 b0 6c | 5e dc e5 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 3d 29 fe a9 de 26 71 da 28 d8 ce | 9c 91 f7 26 3e 7d 46 03 00 00 00 1c 00 00 40 05 | 93 a3 dc d9 83 9b 6f 85 6e d1 32 ad 49 d5 89 75 | f9 55 83 e1 | libevent_free: release ptr-libevent@0x7fb37002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad4380 | #249 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 80 10 70 da e5 b7 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #249 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #249 | rejected packet: | ad 80 10 70 da e5 b7 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #249: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0672 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a15810 | handling event EVENT_RETRANSMIT for parent state #171 | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #171 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #171 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49629.617106; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005028 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad4380 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #171 | libevent_malloc: new ptr-libevent@0x7fb37002a950 size 128 "road-eastnet-nonat-171" #171: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #171) | 60 ea a0 b8 11 41 67 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 a6 a0 3d a3 d3 f7 3a 92 38 69 11 fc c0 0a e6 | ae 99 13 7e 46 80 4c 8f eb cb 1b a4 6d 5c fc 08 | ec 45 f4 48 c3 e3 73 a8 1a d3 f7 7f 3a 28 95 0f | b3 2e 82 89 be a5 d3 a6 ab 70 83 ad 3e e2 73 a1 | 73 7c b9 be d5 96 dd de 07 cc fe da 6e 65 6b 76 | 25 27 16 21 7c ef 70 24 a4 77 29 aa 15 d7 7b a8 | 16 72 3e d5 01 58 3c 97 7b 78 28 15 2b 7d 70 03 | 64 96 9b 75 19 62 f5 2d d6 23 a9 0d ca a5 9a 70 | a6 bd cc 03 9b 58 60 ee fc 9f 9e d6 00 fa 23 02 | 63 d3 b6 b9 2c b8 b0 66 04 8e 85 03 2d 8a 3b 14 | f1 66 74 61 f6 ab 2b 8f f8 31 4b 0b da 07 ed 98 | a3 08 1a 85 f1 f2 be 38 18 37 9b 13 eb 17 a9 c3 | c0 a5 db c8 dd 9c 88 27 54 50 ba 9a 47 c0 2c 00 | d1 c4 c3 04 be b5 8f d9 f7 25 9c ae 45 27 ee 47 | a2 c2 11 cc 79 aa fd 06 ae ea 3a 65 e0 36 c3 05 | dd d3 e2 dd c1 bd 1f da b7 d1 ff 87 93 0f c5 00 | 29 00 00 24 f4 77 f4 2a e1 ad 87 d1 e0 b8 f3 03 | 93 45 a7 36 54 7e 24 81 6c 5d 13 c9 3a 4c ab c2 | 28 19 06 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 9a 54 5d 74 7c 3e 57 ce 44 f1 6a | b5 dc 40 d6 fc 98 8f 10 00 00 00 1c 00 00 40 05 | ab ff fc 00 2d 34 de 32 ad 3a 53 9d f5 35 ab 6e | 4f ce 82 8b | libevent_free: release ptr-libevent@0x7fb3440180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a15810 | #171 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 60 ea a0 b8 11 41 67 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #171 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #171 | rejected packet: | 60 ea a0 b8 11 41 67 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #171: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #250 | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #250 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #250 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49629.66446; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006344 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a15810 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #250 | libevent_malloc: new ptr-libevent@0x7fb3440180b0 size 128 "road-eastnet-nonat-250" #250: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #250) | 17 2a 9d c4 13 ac 7b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f a0 94 c6 2f 84 36 04 eb 6b 9e d3 d8 c3 41 dd | 36 5b 9a 4c 3e c4 08 57 57 9d d2 59 b6 8f 5a a0 | 97 64 4c 58 37 53 a6 c4 b2 5a d7 28 c7 0c 91 ed | be a1 6c 6f 57 ab d6 36 57 9a ec 6e 81 e7 d9 ec | 00 31 e4 c2 56 03 3a 6a 1d 88 e8 70 93 fc 2c 64 | 28 be 05 43 75 db 83 1a 2d e0 38 f0 97 bc d9 f4 | 8f af 26 f3 55 d2 01 81 1a 51 e6 93 66 74 0d 48 | f0 8b f8 85 50 76 3e 80 0e 67 70 24 1d ad 6e ea | 72 9d 01 c4 5f 99 0d ea 29 5d 36 37 89 d4 98 07 | 88 15 ab 7a c4 c5 62 ba fc 8c d5 56 64 df 3c 82 | 9a 54 de 55 20 6b b2 85 89 5d a1 07 c2 57 11 bd | f6 1f f1 5d 9f 5c 8b 9a c0 e9 98 82 3c 9e 57 da | 35 cf a5 fa b1 00 d7 17 27 e9 41 21 aa 94 96 cb | a7 a3 73 c1 a5 31 48 fa 19 d0 03 ff 95 c4 5d f6 | f5 17 61 a5 35 90 af 0b d1 1b d3 73 e5 de 34 00 | 63 00 cf f1 60 d4 f0 c0 3e 0d 02 7c 00 ab ce 51 | 29 00 00 24 c8 41 60 b9 9e 92 4a 7d d2 ef 9f 8c | 7b 43 49 a0 e3 71 1b 9d 34 81 8d 16 42 5a ed 22 | 3b 97 7d 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 44 92 04 c0 13 80 0a cd 61 73 30 | d2 9c c0 ea 6c 30 db 12 00 00 00 1c 00 00 40 05 | 76 73 9b 47 5d 14 7f b7 af f1 ed 94 26 55 3a fd | 56 a2 76 70 | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #250 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 2a 9d c4 13 ac 7b ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #250 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #250 | rejected packet: | 17 2a 9d c4 13 ac 7b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #250: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34000d120 | handling event EVENT_RETRANSMIT for parent state #172 | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #172 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #172 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49629.685813; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005996 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #172 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 "road-eastnet-nonat-172" #172: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #172) | 47 43 39 2e 38 d9 e4 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 65 17 b4 48 89 eb 1e b2 78 b8 1e 15 3a 4a a1 | a2 3a fd 43 76 59 59 a1 75 7a 16 45 66 68 dc 97 | f3 bc ee bc d4 e0 57 41 47 eb 59 3e b3 f4 36 c1 | 10 8f 59 fc 57 3a 37 29 71 bf ce 33 91 c2 37 65 | 5c 9c 9f 71 6e b0 1d 6c 6c ed 90 b3 bd fc 22 6b | 94 91 98 6d a1 2f c5 a8 ca 58 04 fa 18 79 03 0a | 3e 27 a9 a6 f4 08 b2 f5 32 35 e8 b7 83 a3 4b c7 | 82 d2 5d ed b4 7c af 9d be b8 23 49 75 bb 7f 62 | 0e b3 38 1c ec 9d 39 3b f4 04 b7 d0 93 52 70 e6 | 23 bb 4d 7f 7c 2a 5e ec cb 0d 74 24 7b 07 99 42 | 6c 43 eb 64 ec ce f6 41 88 91 d0 50 22 25 43 54 | aa b8 db 3d b2 e3 bd ee 47 71 69 be 83 a3 d8 90 | 99 79 30 84 6a ac 04 1b 20 13 06 10 f1 e1 43 b3 | 50 14 89 62 82 b4 57 81 1e 80 23 23 72 24 b5 3b | 66 27 db 5a d9 e0 9f 07 96 df 6b d0 43 88 1d 6c | 19 73 59 ba d5 80 1f b5 38 2f da 5f 85 a1 ce d0 | 29 00 00 24 54 d0 27 67 15 cd c6 d9 d3 f4 1c e0 | 4e b2 db 81 71 2f 53 78 96 2e b8 d9 e9 fc be ad | 28 73 0e 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 71 7f 76 8f b4 09 cb 9b d9 d3 22 | dc b5 61 93 71 75 88 d5 00 00 00 1c 00 00 40 05 | df a3 69 ab bf ad 58 61 9f ed 54 03 7c e8 ac 70 | c8 e7 d2 fb | libevent_free: release ptr-libevent@0x7fb340012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000d120 | #172 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 43 39 2e 38 d9 e4 43 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #172 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #172 | rejected packet: | 47 43 39 2e 38 d9 e4 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #172: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0d4c0 | handling event EVENT_RETRANSMIT for parent state #173 | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #173 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #173 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49629.74911; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007355 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #173 | libevent_malloc: new ptr-libevent@0x7fb340012840 size 128 "road-eastnet-nonat-173" #173: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #173) | a3 dc 1a aa b2 53 81 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 50 c6 a8 2b 15 44 29 7d 0a e3 39 95 9c 54 98 | 15 94 31 dc b2 f4 dc 06 12 a0 ff 21 13 48 30 95 | af bf 2b b8 09 10 1f 12 f1 ba 4e d2 4d c9 b1 a8 | 05 1a 20 e3 76 d4 0d 6b 38 00 2d 67 2b 07 73 be | a7 20 4c aa b8 f7 39 95 13 6d ae b6 ef 79 3a 33 | 8d e1 63 74 10 aa 27 63 ae 0f b0 2c 9f a5 74 21 | 20 ef 3b da 07 cd e1 2a ac 84 10 e1 eb 87 c2 5c | 8c 49 b1 a8 55 4a 0b c6 97 48 c7 fa 85 87 f0 7a | d7 45 9c 5f 2a c6 38 4c 4e a1 54 1f 2a b5 2e 49 | c6 5b 7a b8 69 98 a8 6a 03 80 1c 7f 20 55 e9 fd | 67 3c d3 ce e1 0d bb 8d 6b d2 95 4c af 6b 27 f3 | df f3 c1 d1 42 37 39 82 9f 58 eb 0d c5 ad bb 97 | 84 ff 4d 8a ba d9 60 19 d6 8e a0 cf fa 4d d0 49 | 61 07 20 ea f9 3b 35 e5 ef 25 c3 9f 36 d2 2d 11 | 5f 51 ff fc 25 f0 0e 63 2f a3 a3 cd af f0 c5 be | 34 51 97 11 a8 5a bf 5a f6 22 be 55 c5 08 d3 d9 | 29 00 00 24 12 84 f7 8f dc 17 04 fd a9 ee 45 ef | 2f aa ad ed 39 8e cd ff 76 be dc 7b d9 a9 2b e6 | 08 21 dc 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 b7 38 fa 70 81 30 71 1e 17 26 ac | fb ca c9 c3 02 40 69 eb 00 00 00 1c 00 00 40 05 | 47 2a 00 7e f6 06 aa e7 bc a5 be 89 f2 8d 4b b1 | 1c ba 94 b3 | libevent_free: release ptr-libevent@0x7fb34803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | #173 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 dc 1a aa b2 53 81 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #173 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #173 | rejected packet: | a3 dc 1a aa b2 53 81 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #173: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a49450 | handling event EVENT_RETRANSMIT for parent state #251 | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #251 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #251 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49629.77554; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00493 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #251 | libevent_malloc: new ptr-libevent@0x7fb34803b0b0 size 128 "road-eastnet-nonat-251" #251: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #251) | df 3f 41 8a f3 53 d1 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 be c7 da 7c e0 83 1f ee 21 fb 97 63 3a 34 59 | 37 0f 13 08 a4 ea d7 d0 84 7f b3 4c 1b d7 fd 64 | d7 1b c4 39 0b a3 dc 8b fa 1d 0e 6a 81 2a 3e 09 | 69 77 47 fe 6f e7 1c 9d 41 07 43 05 b4 26 e9 60 | f3 29 4e c8 f2 da 1b 32 bb 97 33 75 2b 11 a0 c6 | 90 b8 73 b2 56 c1 80 3f f7 61 34 26 98 51 70 a5 | 88 c0 d8 c1 f3 4f b0 3f 75 1e 72 b1 d1 25 9a 2c | fb 27 8d d4 bd e9 f9 05 8f 56 62 b1 eb 23 67 7e | 83 41 57 f8 72 a3 e1 9d d8 36 e3 98 b1 13 30 a8 | a1 41 78 93 e9 2c e0 32 39 cd 75 d2 0c 43 c2 5b | 87 04 ee b5 1e 82 ed bc 9a dc ae f7 d5 db 76 da | 37 c9 35 0d 18 56 2e 1c 38 d4 6f a6 b2 28 96 31 | 03 0b 4f 71 60 58 12 2e e6 e1 cb 0c 0e 82 e2 ad | 8c 61 3a e3 4a ba d8 15 fc ef ca e2 63 cc 17 43 | fc 08 79 fe 35 fa e0 53 4c ee 7c 11 7e 46 1e 11 | a2 1a 41 cb e0 70 0b 67 d9 3b 63 7b ce 2c 58 e9 | 29 00 00 24 42 a0 3c df af e9 94 45 ab 83 0c a2 | 5d 7d 94 01 25 5c 79 6e 69 bd 19 b2 b1 d1 a1 50 | 35 69 ea d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be 44 4c d9 6f 7f 41 ca 31 72 e4 37 | ba 88 35 fa ba 64 3a 13 00 00 00 1c 00 00 40 05 | c3 fb 91 09 59 3d 6b 06 7b be 35 78 ae 35 d3 44 | 75 ba f4 a9 | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a49450 | #251 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 3f 41 8a f3 53 d1 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #251 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #251 | rejected packet: | df 3f 41 8a f3 53 d1 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #251: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a88140 | handling event EVENT_RETRANSMIT for parent state #174 | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #174 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #174 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49629.821892; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009593 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a49450 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #174 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 "road-eastnet-nonat-174" #174: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #174) | 91 36 4b 21 8c e3 c8 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 dd c5 98 91 80 2f bf e7 2b 43 43 70 f9 1c a2 | 78 b6 0b 56 89 c7 17 d8 c4 a4 ed 43 14 68 00 55 | ee dd ad 6d 8a 38 ba ad d9 23 b7 9e bb 3d 86 07 | ed 16 db de b0 44 67 be ba 65 0e 96 fd 54 eb cc | d4 d8 f1 83 4a 85 62 b4 81 ea c9 6f d6 2b 35 08 | 27 1d 44 b3 72 05 f6 d5 ee 0e c6 0c ad 30 dd 17 | d5 9d 92 9d 6e 7c 3d b9 06 e4 e1 7a b8 af 86 7e | 60 5c 18 1e 77 1f a3 0b 6c 39 63 8e 3b e2 37 7b | 90 c4 a3 0b 91 18 0b 29 93 4d 27 18 cf a4 37 53 | b6 2a 69 e7 1d 14 6c 93 05 8e 44 d8 16 2f a7 9f | 79 72 c5 dc 33 34 fc 0e b4 98 f8 e3 05 25 fe de | b4 63 51 46 dc 88 2d 12 37 aa 30 40 1c da d8 aa | d1 04 09 9e 82 a0 ef 0f 6a 96 1b 9b 72 30 77 32 | 93 8b f7 e8 2a a0 a2 dd 84 00 ba 24 75 30 17 4b | 8e 71 da c7 7b bd 41 ab b9 40 da db 82 29 9b 27 | d8 26 4c cc a8 73 89 de dd ff 26 53 c5 6f 01 3f | 29 00 00 24 cd b7 f1 c7 48 65 7b d0 51 fe 51 f7 | 71 0f cd 4b 00 33 35 86 2b 0b ad 56 3c d5 7d aa | 0f f5 4e e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 08 52 e7 44 c5 f0 65 19 f6 45 55 | b4 2d dd 6f 21 a4 bb e8 00 00 00 1c 00 00 40 05 | 78 4d 37 08 7f b6 6b 98 3a f8 5f d9 3e 81 c3 c7 | 93 cf d6 90 | libevent_free: release ptr-libevent@0x7fb38001abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a88140 | #174 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 36 4b 21 8c e3 c8 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #174 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #174 | rejected packet: | 91 36 4b 21 8c e3 c8 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #174: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #175 | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #175 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #175 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49629.898841; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006922 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a88140 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #175 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 "road-eastnet-nonat-175" #175: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #175) | 12 29 28 fb 65 9c c2 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 ef d9 b0 55 d5 14 e7 83 ea 0c 0f eb c0 4d b2 | 18 36 c3 0d 3c 5f 0d a0 d7 f5 a9 e8 30 23 62 2f | 3d 90 5e 25 d3 54 b3 8c d3 ab 1c d3 33 34 03 78 | 85 cd 74 0f 8e 35 c2 5d e8 af fd 9d 00 2e ac e4 | 84 d5 07 fd 55 8c 43 bf 89 61 dc 61 43 3c cd 62 | c3 a0 1f 02 31 0b 07 a5 78 c5 10 08 e8 a4 7f 16 | 2c ae 5c 93 2d 6e c4 24 f5 3a 2e c6 c8 6f 2e ed | e3 0a 8d 68 b0 44 75 d4 95 53 f7 73 cd 7d 6e 84 | d1 e9 9a 86 1e 26 9e 3c d7 df ee 11 ad 66 97 c8 | d5 8e 03 f4 d8 ef b9 76 f2 13 a1 73 f1 c4 5a 4e | 4f 30 eb 7b 7a f1 c0 eb 65 91 cf a9 f3 ae 0d 25 | 9b ee 1e 21 c2 ad 7e f5 01 73 92 f7 51 aa 80 fe | 91 d2 a8 9c 23 90 be c1 3c 6a f1 41 0c 91 0d 9d | 20 55 1f c9 0c b7 77 36 a0 ac 09 f3 01 de b4 91 | 94 8a 20 8c 1f ad 5f d7 63 70 2d 9a bd f2 8c e9 | fc ac 2d 5f 45 8f 88 b9 47 ef 43 3d 71 ea 60 f1 | 29 00 00 24 97 30 3a 8f 02 71 88 b4 dc ed 53 7a | 89 3f 00 b1 2f 4a 80 0e 10 53 03 26 85 ad 54 ab | da 16 12 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 ca 83 64 e4 50 88 08 79 37 9f 8c | 5a be 7c 44 1e d9 01 29 00 00 00 1c 00 00 40 05 | 4a 03 e5 d4 1c 09 77 92 d5 8c 25 e7 2e 76 d9 45 | 5b fb 35 ac | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #175 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 12 29 28 fb 65 9c c2 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #175 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #175 | rejected packet: | 12 29 28 fb 65 9c c2 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #175: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0707 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #252 | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #252 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #252 keying attempt 1 of 0; retransmit 5 | retransmits: current time 49629.908204; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00769 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #252 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 "road-eastnet-nonat-252" #252: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #252) | 50 58 54 7e 04 4a db ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 00 2c be 68 01 bb 0f 58 1a 16 c9 1d 14 15 83 | 19 e0 b8 46 87 82 81 55 0f dc 16 6a 8b 3d e4 4d | 0c e9 b2 bb 22 a5 95 09 ff 11 50 af 23 66 83 f2 | 31 7e 02 6d d7 48 dc 83 9d bb 70 c0 3a 92 f4 c0 | 9a e6 0b 57 02 38 84 8a 91 5b b5 ae 3c f3 73 1a | a4 24 27 15 5b c6 51 0e da 95 77 0a bb 05 7d 91 | af 25 45 22 0e b2 f2 4f fd 42 9b d1 98 1f 5e 0f | dd f0 f2 19 b9 ea ba ee 11 21 ee b6 0c 0f c9 55 | 03 18 8b f7 b4 d9 1d 6b 99 70 65 d0 5f 1e dc 40 | 4c 0a 83 ea e9 69 a1 18 51 d4 d2 fe 11 46 10 47 | b7 70 71 e5 e6 a8 cb f1 92 74 f2 25 34 f1 2a 20 | 05 8b f0 31 b4 4d ec 75 25 71 1f 16 3f cb 5c 38 | 5c 6a 40 df be e7 8c 81 eb 7e b2 34 69 d7 27 e3 | f2 93 a6 4e c8 e4 03 ff 2e ce ce ed 7f ee 01 95 | 24 0e cb ce 0e 6f 39 0e 07 c6 d8 ca 80 7d 23 cb | 6a 28 32 82 38 d2 86 f0 3f 31 6d 12 83 e3 4e 38 | 29 00 00 24 18 de 08 18 c8 a2 29 e1 d8 0d de 97 | 0b 9b 22 3a 3d 4c 80 05 7e b8 73 ae 1d 84 d5 68 | cf f8 f7 ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 65 87 e0 56 8f 33 84 b6 65 68 e9 | 21 de 15 28 76 56 f7 ec 00 00 00 1c 00 00 40 05 | 9e 72 e4 22 38 66 37 d3 ad ef a1 2e a9 f7 f8 37 | 54 d6 26 3e | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #252 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 58 54 7e 04 4a db ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #252 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #252 | rejected packet: | 50 58 54 7e 04 4a db ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #252: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa0940 | handling event EVENT_RETRANSMIT for parent state #176 | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #176 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #176 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49629.971568; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004542 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #176 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 "road-eastnet-nonat-176" #176: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #176) | a4 22 94 6b b7 90 01 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 06 20 a9 49 fb 93 2b 74 d8 83 cb 06 8c 55 7f 57 | 5d f1 cc 70 90 ee ee 41 59 8d d1 e4 58 c0 02 89 | 12 8f 04 73 87 28 bc ec 0e 96 08 f0 49 03 74 3b | 4f eb c4 d0 c6 21 f7 38 1b 92 1e f3 ba 46 7f 28 | b7 fb 3b 9f fa d9 3a 39 83 bb a2 23 67 98 f1 b5 | a1 a5 1f cd 74 bb 92 db b0 18 17 3e 12 cd 1b ef | c7 08 37 6b 02 81 e5 23 06 48 6f 12 26 7a 04 03 | 41 41 ce c5 75 5e 67 35 c5 ce e1 ac d5 40 0e 48 | 02 a1 2b 2d 14 1a 42 85 97 cf d2 fc 57 8d 5d de | 6b d9 22 6f 79 7d c3 c2 dd 65 20 aa 1d 5b 57 40 | a0 1a 0e 1e 45 35 58 17 0b 20 5c b0 ba 44 7d db | a2 bd 64 77 9a d5 0b a1 b5 5c 94 07 3a 31 f0 5b | 14 75 f7 58 da e1 d3 e6 78 67 58 17 31 77 19 91 | 11 0f cf 7e 64 09 ce c1 12 cf d6 40 b9 60 dd 56 | e1 a2 ed 56 fd 45 7f 51 84 03 0b 96 6c a0 15 97 | 40 65 89 e3 a9 b7 e3 e5 5a 24 e4 6f 77 a5 63 fc | 29 00 00 24 bc 2f bb 65 01 f5 95 86 7b 82 6d a7 | 33 bf 89 13 08 c1 15 eb 66 27 ad 6e 9d 4d 82 1c | fe 4f 3f 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 44 db b2 76 4d c5 a9 b2 17 20 52 | 87 84 27 9b ed 5c 63 75 00 00 00 1c 00 00 40 05 | 53 a7 06 a0 b6 ee 02 94 c4 3e c2 3c 5b 31 75 91 | 62 98 b0 aa | libevent_free: release ptr-libevent@0x7fb3380300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa0940 | #176 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 22 94 6b b7 90 01 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #176 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #176 | rejected packet: | a4 22 94 6b b7 90 01 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #176: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0579 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a43dd0 | handling event EVENT_RETRANSMIT for parent state #177 | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #177 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #177 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49630.060913; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006774 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa0940 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #177 | libevent_malloc: new ptr-libevent@0x7fb3380300e0 size 128 "road-eastnet-nonat-177" #177: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #177) | 18 be 44 9b 6e ed 30 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 07 e3 cb ba 41 f5 29 89 53 b2 f3 1e 5e 07 87 | e1 d5 ed d4 f7 64 97 f7 8a 96 5e a4 19 72 f5 99 | db af d0 a6 4b 51 f7 55 92 f6 5e e0 30 09 2c b6 | 43 a0 4f d7 6f e1 d3 20 57 34 04 7c 3d 9a 99 83 | f9 a3 8a 6a fe fe a9 91 f2 83 44 a1 2d af 4b ef | b0 18 e4 e4 62 e5 83 a7 cf b5 7d ca 15 6b 57 02 | c4 53 c6 7f f4 9f 1d 3d 3b b0 8c b2 2b 17 6d 36 | 19 38 bf 55 ce 8a 72 4f 20 1b a4 9c a2 84 da e5 | 7c f0 4b de 9a 22 9d 10 b8 0c f6 b5 af 79 8d d9 | c7 ca 65 16 d7 e0 a1 a8 7f e6 15 6a 53 ef 5b f4 | a2 b4 0d 9c 61 31 ea 4a 75 b2 62 d9 d6 fe 75 27 | 38 c2 d0 97 b9 a4 b7 2c 60 e6 08 ea 3f 0a 15 59 | f6 77 c4 7c d1 46 84 4f f2 09 1e c0 00 e1 c8 65 | bf 5e 6f 2d 94 6e 4c d7 96 38 7b ba 94 5a e8 e2 | 2f d6 8c 88 2d de 4f ca 52 aa 70 7a c4 e8 89 b2 | cf 3d 59 65 f1 b7 65 b1 ff 08 3f df 87 d6 e3 b4 | 29 00 00 24 06 53 6b 3a e9 83 68 db aa 70 45 4d | fe 90 0e f2 c3 a1 be 18 1d d8 e7 bb b9 75 13 f1 | bb b6 76 91 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 1b 1a a2 88 2e 9b 85 cb bf 3f e0 | 58 f8 7a 1a ca d0 ae de 00 00 00 1c 00 00 40 05 | 46 28 df e2 d1 63 c9 0b 29 af bd b8 e5 56 e6 b6 | 34 92 84 18 | libevent_free: release ptr-libevent@0x7fb34c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a43dd0 | #177 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 18 be 44 9b 6e ed 30 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #177 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #177 | rejected packet: | 18 be 44 9b 6e ed 30 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #177: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0471 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a70b10 | handling event EVENT_RETRANSMIT for parent state #178 | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #178 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #178 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49630.149248; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007317 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a43dd0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #178 | libevent_malloc: new ptr-libevent@0x7fb34c01d920 size 128 "road-eastnet-nonat-178" #178: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #178) | ca 8e d5 21 04 56 f5 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 67 d8 60 5f 40 63 92 f2 6d b4 ba f5 02 b8 ef | 38 7a 12 cd 11 ce 9d 9b 17 62 5f df 94 e9 07 b5 | 67 9d c2 aa a5 fe a1 11 f4 ad b8 0d 63 27 26 1e | d8 17 fe 6f e7 68 09 0e 02 53 a4 bf 49 a0 db 19 | df 91 5e e9 b7 6f eb 81 53 29 3b eb 8c 48 64 ce | 19 01 46 02 e1 7d 00 12 d7 22 72 65 96 38 74 47 | fc 95 5b de f7 59 12 e1 89 c8 7c b4 26 93 4b 67 | 78 1e d0 18 c0 19 90 65 2b 34 10 55 57 cb 01 6d | c4 3f b5 2b 33 1e 80 2e 70 90 f3 a0 65 bd de 46 | 7d 2e 31 80 28 5c 82 45 70 58 e1 27 1c 57 b4 3b | 35 12 78 64 02 e3 69 39 84 d2 f4 a5 19 f1 96 0b | b4 1f 01 e4 be d8 4f ee 70 c6 2d 15 1b 96 dd 0a | 64 1f 43 c4 0e c9 83 9e ef 67 e0 c2 2c f3 12 d0 | 79 5e f6 25 ee e3 f8 a3 fa 94 d3 a2 a3 89 7b 98 | 74 09 e9 86 33 de 66 6c 13 2b 07 44 f9 44 67 9b | 43 01 93 ea 4d 3f aa bd f6 c6 55 44 dd 66 4b d4 | 29 00 00 24 2e 3d 1e d2 58 00 63 7b ef e7 79 ba | 26 0d 83 e4 01 3b ff 2b eb 29 12 83 06 3e 6a dc | 34 f9 2f 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 2f 67 46 e9 ec d0 44 c4 cc 2f 43 | d4 84 bf d5 2b 37 9d e7 00 00 00 1c 00 00 40 05 | 39 35 73 9e a6 30 0e 5d 9d 4e 3c 93 77 b7 78 c9 | 08 75 bf c2 | libevent_free: release ptr-libevent@0x7fb3700180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b10 | #178 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca 8e d5 21 04 56 f5 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #178 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #178 | rejected packet: | ca 8e d5 21 04 56 f5 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #178: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_RETRANSMIT for parent state #179 | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #179 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #179 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49630.22862; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.01649 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #179 | libevent_malloc: new ptr-libevent@0x7fb3700180b0 size 128 "road-eastnet-nonat-179" #179: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #179) | b7 0c 53 b0 d6 55 ba e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 e7 aa 3a d2 93 3a b1 f3 2d ef 15 4a db bc fb | 18 f2 f0 2f d7 d8 6d f1 e0 2e 7d 29 59 b1 d6 21 | e4 35 ac b2 5c fa 8c 68 d7 56 48 2c 90 1a 63 31 | 37 9f fa 36 a0 bf f8 7e a9 36 73 05 48 39 6c 08 | e9 ae 8d 6f c7 ab 9c 0b dc b9 88 2c 91 ea 94 a4 | 59 7b a5 d7 8e b8 d2 97 70 12 0b 31 b0 2a d1 31 | eb e4 69 dc 81 ca 29 66 be 80 6d 1a c2 c0 f9 06 | 99 5a 19 63 89 a6 4b 85 38 ed a4 d0 df b0 06 34 | 93 de d4 51 e8 02 b6 ef 9c b9 23 ed 94 d4 3f 30 | ed 82 5a 99 89 3b af 7c 11 96 d9 f0 92 93 d2 4f | 04 c6 5c f3 49 5b 49 5d bc f7 66 01 86 c2 c8 a2 | d8 ee 9a a2 a9 a0 e8 45 16 a7 7f a0 45 50 f6 f0 | 8b 1c 98 0a f0 a8 07 43 b8 bc ec e9 38 ec 58 b8 | 3b 0d b2 96 d1 71 70 f7 1c 22 9f 03 fc f8 39 95 | 81 cb 62 38 1d 55 75 60 24 db a4 45 80 e8 81 2f | df c7 ac c2 4c be 19 14 89 79 da 68 5f ad f7 81 | 29 00 00 24 af 43 c4 7a 3d 3b b5 29 a0 89 4a e7 | b1 1d 19 14 88 65 8d 60 36 ce d7 11 01 48 56 1b | 05 16 7d 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 78 e7 1d 9d 7c 1d 2a b3 39 b5 dd | b4 d7 38 76 a1 49 48 f7 00 00 00 1c 00 00 40 05 | 86 2a 8d 44 0e a3 13 1a 2d e3 72 66 a4 35 f9 18 | 8b 41 6c dc | libevent_free: release ptr-libevent@0x7fb34400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | #179 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 0c 53 b0 d6 55 ba e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #179 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #179 | rejected packet: | b7 0c 53 b0 d6 55 ba e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #179: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad5900 | handling event EVENT_RETRANSMIT for parent state #180 | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #180 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #180 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49630.314003; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005764 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #180 | libevent_malloc: new ptr-libevent@0x7fb34400cf80 size 128 "road-eastnet-nonat-180" #180: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #180) | fe 73 72 02 92 15 d8 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 07 70 60 c7 56 30 74 c1 b3 ab 81 1b b5 12 a6 | 5b b3 64 05 c5 bb 30 3a 1e 92 5a 22 82 67 57 cb | ec df cc 78 63 1b 82 f2 76 a9 50 bd 80 d2 65 3a | b4 e2 7b 0a a1 1e b4 05 49 bc 96 6f 1f f1 51 36 | c7 6c ca c1 27 98 ee 50 22 95 3e cb c3 ea ef b5 | b6 40 b3 fc db 2f 79 46 a9 ac d5 8e 6f 0a 3a 8d | 7e 51 bf 5f 98 c8 56 24 ad e5 63 d9 fa 96 3f ce | b0 c6 79 3b 61 48 6d fd d7 15 2a 6b 8d 91 68 52 | a6 e1 08 45 fe 40 cd 13 6b e8 f0 74 af 74 46 b5 | 90 2f 5d d8 88 37 08 fa 12 4d 78 ce 41 b7 64 80 | a2 4d 76 43 ea e0 49 cc c2 cc 44 b2 cd 61 27 7e | 3d 40 9b 0b ff 59 99 9d a8 52 49 ee d5 dd 07 2e | 2d 3b 1d 7b e9 b4 f8 d7 66 08 0c c9 41 1c 3c eb | ca 7b 16 c5 f5 de ae 99 52 e3 17 c8 ed 61 56 a0 | 61 ae ef c8 11 73 22 d7 35 ab 44 d5 09 26 21 e1 | 09 c4 17 ac b7 7a 6c 9f bd 3c 11 d1 18 1d 51 88 | 29 00 00 24 9d 80 d3 ad d5 e1 1c 51 35 bd a3 6a | 04 d1 ff 4c 54 9f ed 38 00 a0 89 9d 6d 48 6f b5 | c4 22 6c 99 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 22 7d cd 9d 96 05 69 33 a1 7c ff | fb a1 ed a2 be 25 c7 02 00 00 00 1c 00 00 40 05 | cd 91 7d 35 4a 67 75 33 41 31 18 ee 7e 93 4a 7e | ae 98 50 4f | libevent_free: release ptr-libevent@0x7fb34c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad5900 | #180 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 73 72 02 92 15 d8 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #180 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #180 | rejected packet: | fe 73 72 02 92 15 d8 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #180: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0459 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ed40 | handling event EVENT_RETRANSMIT for parent state #181 | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #181 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #181 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49630.386314; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007631 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad5900 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #181 | libevent_malloc: new ptr-libevent@0x7fb34c0300e0 size 128 "road-eastnet-nonat-181" #181: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #181) | 87 ea 0d a4 c5 cc c9 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 96 2b 80 67 25 14 db 43 a4 69 96 1f d6 7f 44 | 16 0f d8 a3 fa cd 04 6f 4e 52 d1 61 93 e5 7d 61 | 78 3a 71 d4 ab 07 09 6a 8d e4 9e 59 3a 16 71 d0 | 6a fd 27 9b 67 10 88 a3 7b 06 8c 1d bd 77 73 97 | cb 10 8a 01 63 6c f3 e0 d9 84 4d f6 7b 2b fb e5 | 64 39 42 1e 6a 5d e5 a2 c0 54 6b 84 eb 36 36 98 | a7 bb 04 c5 ca 92 0e 5f af 5a 95 43 e3 52 3f ff | 54 f4 17 a7 9b 5c ce c8 79 5b 79 1b f8 16 5e d7 | 38 2d 41 ad 74 20 7d b3 0e 73 6b 2e d6 c4 34 48 | 1d 4c 33 fc 1f 31 06 e5 ef d9 8a ee a4 d3 10 13 | 9f f3 13 d6 08 5c dd 5e f3 41 90 99 dc 19 c1 90 | 0b 1a f0 8f 10 ca 00 81 f3 4c 0b 20 a3 62 92 ed | 2c 01 0a 11 e9 9d cb 11 95 e0 55 b1 08 02 a2 07 | 35 a8 d1 5c 3e 00 4b 4e 53 71 3f 8a 08 82 11 91 | 21 25 67 71 35 af ba 8c 78 51 c7 49 62 d2 6d 39 | 87 19 14 5e e7 83 0f e7 70 65 a7 bd b3 6a 59 43 | 29 00 00 24 f0 e0 42 a6 e3 a5 05 54 c9 6b cd 2c | d1 4e 0f ea 18 76 ac 9e 15 69 24 da 67 51 76 47 | 7a b9 31 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 1c 40 9b 6a 7c 59 59 f4 5a 8b 5d | d3 44 cd 77 5a a2 8f ab 00 00 00 1c 00 00 40 05 | c9 f4 ff 9a 5d 3b 38 1b 8f 98 0f 89 fb a2 c8 0e | aa 7e 43 ef | libevent_free: release ptr-libevent@0x7fb388038370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ed40 | #181 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 ea 0d a4 c5 cc c9 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #181 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #181 | rejected packet: | 87 ea 0d a4 c5 cc c9 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #181: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0684 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa5fc0 | handling event EVENT_RETRANSMIT for parent state #182 | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #182 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #182 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49630.457674; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005935 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c400 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #182 | libevent_malloc: new ptr-libevent@0x7fb388038370 size 128 "road-eastnet-nonat-182" #182: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #182) | 8e 7e 13 89 c5 5d f7 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 e9 75 54 2d e8 42 37 37 23 34 72 75 33 ca 7f | b2 72 0c b6 c2 49 71 7a 03 e3 1d 07 58 b0 51 38 | 61 45 b2 16 d2 ad 2f f3 7c 0e 1f f4 c5 05 13 4c | d6 98 4b 66 e1 54 c0 73 13 91 4a f2 b3 d9 63 4c | 05 4b dc 71 47 da 12 a0 d3 dd 69 f7 37 06 e9 cd | 0a 8b 52 94 8a 6d da 5b 07 14 54 d3 97 43 1d a2 | ab 36 1f dc b8 97 c0 22 40 d5 44 3f fd 99 bd 8a | 9c f3 b8 47 00 bf 43 3d ae b2 e8 4a 6b 45 ec 0f | 5f e8 9a 25 7c ca 9d 80 f8 42 ce d3 9c bf c6 35 | 83 b9 bc 3b e5 0c da 92 14 98 a7 1a ce 79 b0 48 | 82 a8 51 c4 ec a8 10 1d b7 45 e5 80 dc 95 d7 16 | 44 79 9a ed 89 ab 16 cf 11 d5 7e 53 46 f0 d9 00 | eb 07 b7 8a d9 e3 ff b1 2b 68 df 33 18 af 5f 4c | 9c 70 63 04 6b ff 29 aa a6 e4 41 5f 2d 42 80 3a | 0d 17 98 f8 4e ea 6a f2 2b f3 0d 26 ff 27 2a a7 | a3 13 57 12 6f 11 b8 dd 58 53 1d d0 16 a0 b0 ee | 29 00 00 24 65 07 2e e4 49 be 52 f9 c6 9f 8e 3b | 7c a2 61 d2 67 51 00 51 49 02 4e 77 4c 09 9c a2 | 72 c6 03 a7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 04 ff 12 2b f3 10 13 86 f3 c1 ff | 09 98 25 be d2 68 ad 5e 00 00 00 1c 00 00 40 05 | d9 6b 4d a2 91 b8 eb 60 71 cf 0d f0 f9 f0 84 45 | 87 2d 57 76 | libevent_free: release ptr-libevent@0x7fb35c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | #182 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 7e 13 89 c5 5d f7 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #182 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #182 | rejected packet: | 8e 7e 13 89 c5 5d f7 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #182: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac69c0 | handling event EVENT_RETRANSMIT for parent state #183 | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #183 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #183 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49630.526031; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.011391 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #183 | libevent_malloc: new ptr-libevent@0x7fb35c0300e0 size 128 "road-eastnet-nonat-183" #183: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #183) | d6 e6 54 26 a5 51 49 90 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b d3 2c d5 46 1e bb 45 3e b1 07 9c 29 85 98 93 | ee 36 97 24 0c 65 6e 72 03 fd eb 26 66 8a 4d 99 | 30 4c 18 3c 80 72 a6 76 e5 f3 36 3a 07 42 32 c2 | 39 e8 9d 5f ec e0 51 20 28 56 14 b3 ac 67 3c fa | 98 5a 37 73 bb 28 df c4 30 da b1 be 2e 7d cf b5 | aa 2a 51 9d a6 55 f1 d6 02 88 71 ea 44 18 ea 39 | 96 0e 47 c9 6e 26 f7 c4 74 bc 17 b7 c1 ce f4 36 | 36 cb e7 f5 29 fd 74 37 cc 31 1f ce 2f ee 7a 23 | fd da 91 35 f0 f9 ff ec 58 26 8a a2 2f d2 81 0d | a1 17 24 44 c9 5f 1e 77 b9 2b 2f 5a f9 47 ce 83 | a8 fd f0 5f 20 8d e8 9e 6f 25 55 3c b9 c3 9c 82 | 64 c6 bd 5c b0 07 c1 4a d5 fd 91 20 b3 b1 5d bd | 38 8e ad d0 f3 fd d6 24 13 d0 4b 1a eb b6 e2 f9 | 08 8d ad d1 8e e2 f0 e9 c7 8d cc 8b a6 0c 02 89 | 89 a8 da 17 42 b0 bd b2 29 34 67 25 c6 68 61 cb | 05 67 1d b0 18 99 57 3e 48 e0 4d 27 90 f1 05 8d | 29 00 00 24 fb 03 08 25 8e 6d 3a 5f 6f 85 88 7b | 77 f7 13 2b 6d 57 c0 a9 57 85 b0 8d 7b f6 0e 38 | 56 d2 56 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 0a 8e a5 81 0b e2 cf 5a 0e 0b 81 | 8d 82 2c 01 80 91 75 34 00 00 00 1c 00 00 40 05 | bf 20 fb 11 3c 6a fd 35 31 59 61 81 c5 7f e8 2f | e6 90 5e b8 | libevent_free: release ptr-libevent@0x7fb36c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac69c0 | #183 spent 0.181 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 e6 54 26 a5 51 49 90 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #183 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #183 | rejected packet: | d6 e6 54 26 a5 51 49 90 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #183: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0709 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acab00 | handling event EVENT_RETRANSMIT for parent state #184 | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #184 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #184 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49630.584438; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005659 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac69c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #184 | libevent_malloc: new ptr-libevent@0x7fb36c035930 size 128 "road-eastnet-nonat-184" #184: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #184) | 71 40 97 9a 99 00 ff cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 9e 33 f9 05 c0 53 fb 65 12 d0 fd a6 93 df f1 | 7d bc 07 5e 94 4b 97 6f 27 67 0f f1 85 c0 12 45 | 70 43 01 96 7d 01 69 81 8a b0 0b 08 d1 40 54 69 | 08 7f 69 f8 31 5e 9b 37 c2 56 46 05 8a 2c 74 cd | 73 c4 b5 39 bb 8c 81 c4 97 49 18 2c ce 17 a4 56 | a5 b1 98 b5 93 fe 6b bc c2 93 00 1a 7a aa e8 f7 | 9e 16 d8 e6 36 67 49 7e af 2f 60 eb cd f3 b7 6a | 60 d2 41 2c 2b 50 9f c8 44 40 ce 80 81 98 cf 17 | 31 53 e1 d5 34 76 90 8f 6f 17 46 44 c2 a9 25 1a | bb c8 2b 12 0a 1a 41 c9 b5 0e b1 65 5f 47 47 f0 | bf a6 e5 e4 cc d3 34 bc 81 ca de 84 80 2f 52 78 | 36 7b 26 1f 30 98 4d d6 d7 8c 77 eb b9 19 2a e8 | 7d a0 5e 92 74 2d 37 d4 17 8f 23 ce 1e cd 45 d9 | cf f5 6b 81 d5 e3 95 2b bc 84 3e 19 7f 4a db 38 | c7 46 31 2c ab 66 d6 cd 71 a0 bf 63 ef a6 eb 59 | 13 88 4c 39 34 56 d9 d0 92 f8 f4 65 45 ad 6a 55 | 29 00 00 24 b3 65 f5 f0 87 cd d5 8a 91 5d ad e3 | f8 32 68 b3 e0 0d 46 b4 25 a3 92 64 33 fb 91 6e | c0 dc 6f 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 f2 a2 9a 11 9e a6 4a 33 e0 87 52 | 8a c6 6f 7b 74 99 45 a9 00 00 00 1c 00 00 40 05 | 98 85 7b 6c 79 cd cc f7 14 5f 2b 56 dd 51 39 9c | f7 d7 a1 50 | libevent_free: release ptr-libevent@0x7fb3600180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab00 | #184 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 40 97 9a 99 00 ff cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #184 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #184 | rejected packet: | 71 40 97 9a 99 00 ff cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #184: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a84000 | handling event EVENT_RETRANSMIT for parent state #185 | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #185 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #185 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49630.653747; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007863 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab00 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #185 | libevent_malloc: new ptr-libevent@0x7fb3600180b0 size 128 "road-eastnet-nonat-185" #185: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #185) | 94 c0 c2 c7 3b 30 ec 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 10 80 e8 ac 1b 57 a4 b7 f2 12 9c c9 c8 96 12 | d8 b4 37 f7 f8 c8 3c b7 f2 86 fb 6d bc 61 da 40 | 39 a4 09 f0 8f 66 50 7a 6b 75 22 97 37 a4 94 4e | a8 5c 5f 80 9b d3 2e fd ee fe 03 91 38 cd a2 e4 | 3e 5d b4 2b f3 14 af ae 26 82 7e 4b 88 39 37 81 | 82 aa 3c c6 ab ba 4d b3 20 34 8d 80 3d de a0 ad | 42 64 df 60 e3 cc 41 7d eb 1f a9 4c f0 d1 47 57 | 07 35 a5 e9 25 89 b5 0e 8b 91 92 1f 2f 09 b9 ab | 46 f1 69 33 6d d8 ef 90 01 9f 20 97 28 19 d8 4c | ce 9d c5 c8 74 d2 ec a5 dd e6 34 68 1e 8b 44 b9 | 5e 3c 90 76 95 68 8e 41 20 32 dd ca 48 f2 30 6e | af 87 2d 28 a1 ad c2 a1 66 51 1d 16 88 02 4d 4b | 75 a2 59 e4 ff 63 fb 70 3e 65 bb 8f d3 36 fc 97 | bb a3 6c c7 eb b7 6a f4 47 9b e0 12 1b e1 cc 32 | 68 f4 57 ff 85 75 10 4d 46 e9 36 6a ae db 06 a6 | 0f 02 20 5f 93 d8 c0 d3 99 19 3c 12 5e d8 75 16 | 29 00 00 24 d5 ca 6a 54 4d eb c2 30 7e c2 c0 88 | f4 64 53 65 cf cb b4 99 9a a7 3b 19 af 88 ec 6a | ae 0e 11 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a b7 31 38 16 04 07 33 64 be 6b 23 | be e3 1c e2 4f 4e 6e d8 00 00 00 1c 00 00 40 05 | c2 92 61 e3 4d 3a b1 c0 20 50 44 2b db 6e 80 18 | c6 ee 39 60 | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a84000 | #185 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 c0 c2 c7 3b 30 ec 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #185 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #185 | rejected packet: | 94 c0 c2 c7 3b 30 ec 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #185: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0476 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c00d120 | handling event EVENT_RETRANSMIT for parent state #186 | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #186 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #186 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49630.737061; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008743 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #186 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 "road-eastnet-nonat-186" #186: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #186) | 89 a9 38 aa a6 c0 30 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc fc 7f 3d ba 5a de bc 76 c2 c4 f8 68 37 1f ff | ca 8e ea 53 55 b1 47 97 0b 37 3b 65 fa 61 e7 dd | 35 17 7f ab 01 8e 38 9f 4b 7f 31 31 92 f1 ba bb | d0 06 33 61 10 0b fa 86 b8 ef 01 c3 cf b1 bb 29 | 2f 2d 37 13 10 34 87 1c 1a 2a fa 97 52 ab 57 63 | 92 bf 2b 4d 93 56 f2 e9 12 3c 46 24 50 0a 19 24 | b2 fa e0 6c 1d 91 6c 12 4e 27 c3 47 94 7d 6e 37 | 39 fc 81 56 89 ca 68 6b ce 06 f5 e3 55 1e 76 a1 | 72 bf 58 f7 9a b2 03 67 a0 61 c5 e9 74 36 67 70 | b9 96 14 a2 56 cb b9 33 ac 90 e3 4f 5c 75 ef 3c | 0e 13 a9 08 94 45 0a e0 b9 1a 9c 47 5c ef 62 4f | 55 46 d5 a5 09 5b 68 73 3a 25 4c 57 99 05 2a 57 | 57 52 51 7e 0f b6 14 9f 14 b0 d1 cf 63 29 63 a1 | 49 60 4a 12 aa 1e 1e 0f 3e 32 25 9c d8 71 75 aa | 14 8e 9d fc 55 96 cf 4d 35 00 a5 a7 02 46 8a b7 | 5a f6 88 8a 4d 78 6c e2 1c 82 47 88 0b 3b 1c 06 | 29 00 00 24 d4 45 d6 30 bc fb 2b aa 5c 8e f3 b7 | 0c 17 f8 b2 59 80 d2 e0 0c b8 b9 7f 67 b9 de e9 | d9 5a 25 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 68 b4 19 b5 e8 c7 d6 3c c7 30 38 | 5a e1 45 af bf 1b f1 0b 00 00 00 1c 00 00 40 05 | db 71 7b 2e 3b 5f 62 cf 6c 1d 8c 60 1b 08 38 c5 | 84 d6 4e b5 | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c00d120 | #186 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 a9 38 aa a6 c0 30 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #186 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #186 | rejected packet: | 89 a9 38 aa a6 c0 30 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #186: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7e4d0 | handling event EVENT_RETRANSMIT for parent state #187 | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #187 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #187 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49630.807454; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.013222 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #187 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 "road-eastnet-nonat-187" #187: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #187) | e7 c9 b3 98 5a b5 d8 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 8c 48 13 ec 18 80 1b 32 77 ec 9e 3b 86 33 3b | 02 ed ce 45 9e d1 07 07 3e bc 97 2e 75 42 14 66 | 03 ce bf d6 11 7b 13 df d2 31 59 70 fe 3e 83 b2 | 64 79 15 03 06 38 db 20 68 31 b1 be e0 b0 81 7d | 4e ac bf 91 07 33 90 db 11 13 bd 16 b3 19 bb 2f | bd 78 ea 08 d7 04 61 29 46 e0 b0 be 88 fb b6 99 | 78 ba 8a fa f7 9f 36 82 a5 d0 b5 cc 15 77 46 bf | 6f 96 e3 0e c4 42 db ac 87 dc 33 da 45 8d 53 39 | 47 ad bd 32 b7 e2 e1 e0 66 2c 6d db 19 28 b7 a9 | b4 a9 eb 1e eb 6f ee c7 40 8b 38 5d 63 81 df 4c | ca 8e 71 2d f6 ed 35 fe b2 fe 7e cb 56 c2 0b db | 35 33 69 6f 1e 16 e5 63 9f 75 fa ec 8a 49 49 95 | 1a f3 8c 29 d9 10 61 09 99 f1 00 c7 a8 23 e7 4f | 74 f2 03 0e 72 27 59 cb 0b e6 eb fe 8d cd 75 0f | 66 f2 35 88 c0 48 17 b6 36 94 37 a8 a7 99 a0 7a | 46 3f c8 7b 62 bc 09 7b 66 12 f0 77 17 2a c3 df | 29 00 00 24 92 ee 3c 64 04 c9 f4 27 93 49 ca cc | 80 d7 5b 2f 40 c6 99 75 47 bf 36 6e b0 fd dd e8 | 14 05 72 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e d3 6f 6b 08 b5 24 1b c7 b0 97 c1 | 57 a8 5f 57 16 36 48 8c 00 00 00 1c 00 00 40 05 | 70 ae b7 c1 13 54 ea fb c0 86 88 d6 98 09 04 e8 | dd f9 c2 0b | libevent_free: release ptr-libevent@0x7fb374024f80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | #187 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 c9 b3 98 5a b5 d8 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #187 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #187 | rejected packet: | e7 c9 b3 98 5a b5 d8 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #187: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90400 | handling event EVENT_RETRANSMIT for parent state #188 | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #188 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #188 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49630.921121; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.011695 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #188 | libevent_malloc: new ptr-libevent@0x7fb374024f80 size 128 "road-eastnet-nonat-188" #188: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #188) | f8 92 2e dc 48 c8 64 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 8c 6e 8b 73 15 ff 0e bb aa f8 24 68 da ef 6a | 1c 01 19 e8 a2 a3 5e f6 5a 71 31 aa 3c b1 c4 41 | 27 8d 2a 58 b3 aa 09 ec ab 9b 79 a4 37 2c 57 bc | 33 2a 63 cb 88 61 ff 6f 57 a5 f5 2c 3b 28 ff c0 | e2 03 fe e0 d7 c3 cd af a3 47 59 59 0e 58 bb 20 | d6 dc 5a 4c 31 47 b6 5a 25 02 b2 63 30 de fe 0f | aa 00 d1 fa e6 0a 07 a2 95 d3 2a cc eb a7 d4 64 | 92 40 37 20 3b f0 9c 95 06 bf 89 fe 4e 9c 75 93 | be 49 6d 83 74 cb 43 a9 68 b0 b3 1b 6c 7e b1 7d | 71 1f eb 81 78 ef b8 84 cd 25 a3 cb 59 97 64 95 | 1c 19 a1 95 2c 31 c2 d1 08 08 8a 2a 38 f4 5e 06 | d0 60 01 b7 7e f7 37 07 7c 57 50 f7 20 78 35 94 | 90 2f 3d b8 01 db 62 a4 93 0c bc 99 72 08 c3 2a | 65 b1 ef fc 8b 00 29 6d 1d eb d8 05 c6 bd 18 34 | 85 96 91 a6 8d 87 95 d6 03 d2 b7 ec 1a a3 0e 66 | 18 52 9c 51 fa 27 d5 c0 2b 40 de 51 c6 17 5c e3 | 29 00 00 24 32 b3 09 c7 6d 35 ae 79 0b a9 93 c1 | 25 b3 85 c2 02 53 dd a2 dc f7 0c 55 f9 9f 55 72 | 45 99 28 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 05 c4 f8 2b d0 22 47 d6 02 77 fd | 96 35 b9 b3 1b 70 08 41 00 00 00 1c 00 00 40 05 | f1 47 98 30 50 7a f1 c9 d1 56 2e ed 54 8a b8 d4 | be 9f b3 89 | libevent_free: release ptr-libevent@0x7fb3580300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90400 | #188 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 92 2e dc 48 c8 64 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #188 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #188 | rejected packet: | f8 92 2e dc 48 c8 64 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #188: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0674 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acec40 | handling event EVENT_RETRANSMIT for parent state #189 | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #189 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #189 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49631.030556; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007662 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90400 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #189 | libevent_malloc: new ptr-libevent@0x7fb3580300e0 size 128 "road-eastnet-nonat-189" #189: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #189) | 86 0c af cf d7 4f f0 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 da a6 92 01 b3 1e 2d 01 6d b4 b0 5b c8 86 63 | fa d3 04 1f 4a 5d 42 51 c6 fa 83 7f 52 a9 5c 5f | 29 a2 a6 67 ca c4 cb cd f8 82 1e 41 60 3e d2 fa | be e5 64 f3 5e f3 de 1c 66 73 04 70 83 c5 c9 fa | d9 0c 95 4f d8 7c 96 92 62 c0 89 3f a6 f5 e5 1c | 1d 8a 04 ae 7f 59 7e f9 0a 02 65 1e e5 50 67 cc | 8a fa 7a d2 bf b6 8d 22 68 80 58 92 0d 46 32 32 | ac 55 d1 c6 9f 27 eb 86 dd 30 64 7d 70 38 1f e2 | 82 2f 8e ad e7 06 c8 10 a8 89 ac cd 34 d4 ef 54 | d9 fa ef 60 3c 01 17 c1 e0 90 2b 1d 49 9b 9e e6 | 59 07 02 91 fb ba 4f 73 08 2f de a1 3c 70 c1 7b | f2 11 29 b4 eb 0f 6e 10 04 0d 03 e4 29 ad b5 0b | 6b 4b aa f3 91 cc 9d d5 fa 2e 4d ea 3f 0e 7e 09 | 29 dd 22 a7 1f e8 ee 73 1f 35 15 51 78 6d 86 ea | cd eb 92 50 fc 79 44 24 ff 9f f8 19 89 f2 31 2b | 2f 82 13 db f2 4a 67 b7 c4 2a 16 2f d5 d4 31 ee | 29 00 00 24 ab 6b 1b 01 ee 77 53 c6 2a de 6e a0 | bf 1d e9 b5 56 76 a7 4b d5 a7 a9 e9 a7 01 9e 47 | cc 4b 2a 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 a4 06 85 0c 28 ca 55 e9 70 4f 7f | 1a ca eb c6 50 e4 53 f0 00 00 00 1c 00 00 40 05 | 2a 84 d0 22 8e e3 5b 68 a0 3f 20 22 83 cb 94 15 | 67 d9 c0 48 | libevent_free: release ptr-libevent@0x7fb37c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acec40 | #189 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 0c af cf d7 4f f0 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #189 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #189 | rejected packet: | 86 0c af cf d7 4f f0 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #189: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #190 | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #190 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #190 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49631.145898; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.019221 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acec40 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #190 | libevent_malloc: new ptr-libevent@0x7fb37c02a950 size 128 "road-eastnet-nonat-190" #190: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #190) | da 8a 0c 65 e6 2b 3c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 54 17 f8 a5 01 f3 68 22 77 c6 18 00 12 b3 14 | 54 3d f4 b3 34 1e fd 72 0e 4d ab df e8 2f e1 56 | d7 6e 5a 40 eb 22 8c 08 69 45 e9 fd 19 98 3c aa | 8d 83 ce d6 37 74 60 c8 87 61 28 d5 63 be 48 e9 | ac f9 f7 e4 f2 02 da 1e ec 22 1e 5a d2 5a 2b 8a | 3b 57 71 3a 73 29 7d d1 21 cb fe 25 7a 4a 44 7a | d3 e0 2e 8b b0 82 19 e0 d0 d4 ad 62 8a eb ad 5f | cd 5f 01 c2 97 9c ca 0a 84 fd e9 c6 24 7d a2 13 | 18 78 86 de 18 44 7c 6e 03 a7 c1 8c f5 10 72 e4 | 18 35 f0 48 fd 3b 9d 06 d6 b2 cc 32 8d c8 ab 02 | 22 2a e1 65 5c 07 67 dd 84 00 eb 6c 69 e6 d9 74 | 15 08 fb 78 e2 63 d8 e3 71 dc a5 a7 be b4 49 92 | ca 4f af 55 e1 5d c5 43 c7 03 58 76 b8 41 c6 a2 | f8 e5 96 26 df 8f 3c ed b5 1d 45 31 66 bd 99 75 | c9 f2 c5 21 dc 35 1b 0a 99 75 5d 5c a4 07 02 4f | 98 82 da 07 a8 27 6d 15 d8 05 50 39 0a b9 0a 99 | 29 00 00 24 f4 39 3c cf b3 b2 13 92 d2 3b 37 9f | 62 32 43 c3 74 37 47 22 30 dc 01 af 01 09 20 fa | 09 9a 8b e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6f a0 3a 65 d8 4c 58 fb ee 8d a7 57 | 94 7e 0d f0 9d 14 5d c2 00 00 00 1c 00 00 40 05 | c2 56 8a f7 34 3a b7 10 07 49 00 4f af 85 84 af | 10 cb 7b 4a | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #190 spent 0.418 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 8a 0c 65 e6 2b 3c 3b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #190 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #190 | rejected packet: | da 8a 0c 65 e6 2b 3c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #190: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5da90 | handling event EVENT_RETRANSMIT for parent state #191 | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #191 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #191 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49631.230507; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004051 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #191 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 "road-eastnet-nonat-191" #191: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #191) | 85 8f 6a 80 de be 76 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 47 0f 49 e8 87 b7 e4 13 ff fb 5d 9a 22 17 d1 | a7 da b3 32 4a c2 68 c6 3d 29 6b b9 0a 47 72 fb | 44 ba cf 07 42 83 b0 15 52 d5 79 a1 0a cc fd 8c | 03 5d 92 9f bc f2 7f 7a 58 36 93 f8 ff cd 46 92 | 33 75 4c e4 12 5e a1 f8 b3 1e 61 09 80 4a a1 c5 | 5a c7 19 d2 44 74 1d 5d 1d 57 21 f5 83 fe 20 06 | 89 ca 32 09 05 22 51 7a bb d7 0f b2 89 a9 0b 74 | 7c f9 0e 07 47 37 47 69 61 d8 9b ef fb c6 bb 4f | 6f e9 47 2c 3e ce 0c c7 87 a3 c6 a6 6c 56 d1 3e | ff a6 a9 4b d0 b7 79 88 c1 3f b4 9e fc 37 5c 19 | 1d 93 d7 b8 ac 50 69 85 b1 c4 53 e5 5e cc 86 e1 | 99 0a 5b e0 3c 4f fe 9e c8 dd 39 c2 94 6f 36 d5 | 9a 4e 4e dd b3 93 c7 8c d1 85 48 7f 16 2c 4f fb | 42 93 63 f4 95 ff 92 cb fb d6 5a 99 77 ab b8 13 | 67 d4 bf 16 1e 20 38 f7 7c 3d 2c 7c ef 50 6c 66 | 06 df 76 dd 94 55 30 cb 6c f9 4c e3 a8 ba 0c 19 | 29 00 00 24 f0 4e f3 f0 90 16 59 02 63 21 11 a3 | 11 30 40 08 3c fe e4 63 ec 70 ae b0 94 4f 51 4b | 97 b6 49 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c cc b1 ee ce 47 be 7b b0 c4 63 84 | 75 d0 08 1a f9 42 67 0a 00 00 00 1c 00 00 40 05 | 29 7b 9f b8 2f b5 a8 ce c6 6c 30 7d a4 05 33 b3 | 99 4c ae 49 | libevent_free: release ptr-libevent@0x7fb36c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5da90 | #191 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 8f 6a 80 de be 76 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #191 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #191 | rejected packet: | 85 8f 6a 80 de be 76 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #191: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3980 | handling event EVENT_RETRANSMIT for parent state #192 | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #192 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #192 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49631.303814; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007219 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5da90 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #192 | libevent_malloc: new ptr-libevent@0x7fb36c0300e0 size 128 "road-eastnet-nonat-192" #192: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #192) | c8 ff f4 e6 c7 17 a0 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 d3 4a 60 f3 6b 7c bf bf ce 75 aa 6b ec f0 aa | 6f fd 60 63 46 fe 0f ab c7 68 02 df c4 c6 ca 90 | 76 3b 3d fe 56 bf ba a8 ba d0 ca f7 0b 74 9f c5 | d1 05 87 00 01 63 f1 b2 af 9b 1a 75 92 cd 23 75 | 4b c9 10 79 b9 97 80 8d 36 ac 73 a4 c7 b8 fd cc | b1 38 24 08 46 20 a1 f7 27 44 94 85 0d d1 c0 73 | 03 9e 85 e9 52 56 70 2c 82 87 11 d5 67 bd 17 0b | b7 79 e5 dd 43 5b 11 13 e5 80 26 ae 8c 3b 5c 3e | 39 de 54 5e 94 90 b6 94 bf 91 dc dc 3a b0 dc 33 | c2 af e8 1e 41 35 52 7c 14 9d d3 2a 93 8c 0c 2f | 4c dd 47 e3 33 95 7f 32 01 a2 12 1d 55 d6 96 ba | 80 04 ad 84 ae 69 4d 77 46 16 b8 c1 14 67 ff 90 | 15 d3 6f 27 f5 ca 1c 28 65 98 cb 29 af 5a 3d 4d | 38 de 5a e8 93 6e 36 0e 60 ea e1 05 60 eb 23 cb | 78 44 37 ea 66 63 22 ea 85 48 d4 a0 76 12 75 a9 | 2c 64 ca f2 05 fb 36 e8 35 db d2 9f 91 a5 c4 20 | 29 00 00 24 a1 c2 f0 6b 73 a0 8d a3 3d b9 fc 65 | 4f d9 ed 3c 9f 8f 87 98 60 fa 1e 4a fb c7 f1 6c | 8c d3 14 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 12 d3 2e 8d 56 f4 3c 1b 6c 80 b7 | a9 e2 20 50 4b 37 dd 45 00 00 00 1c 00 00 40 05 | c6 22 26 cb ae fa 29 03 74 5f 21 c6 81 1a 29 8b | 43 e3 ee ee | libevent_free: release ptr-libevent@0x7fb37003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3980 | #192 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 ff f4 e6 c7 17 a0 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #192 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #192 | rejected packet: | c8 ff f4 e6 c7 17 a0 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #192: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe5c0 | handling event EVENT_RETRANSMIT for parent state #193 | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #193 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #193 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49631.396112; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.012434 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3980 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #193 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 "road-eastnet-nonat-193" #193: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #193) | 09 06 18 28 25 97 f6 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d fb a2 00 c4 81 91 0e b9 c0 41 7e a3 8e d5 a7 | 8f f9 71 10 26 95 10 e6 4e 8b 4b cc bc fc 28 8b | b7 f8 db 09 cb 68 57 d8 0f d5 cb 0f b4 d7 8f 3d | bd 12 fa dc 76 89 b1 cd af d1 36 87 37 88 94 35 | dc 1d 71 91 3b f3 e1 80 cc f2 f0 d3 3a 4d 9e 94 | 07 3c 65 6d 3e 40 ff 84 75 64 e8 1b b1 8c 09 6d | 19 40 40 a9 6d 88 cd b7 e8 19 c9 3d e5 92 7e 64 | de 57 bb db cd d4 22 17 89 b5 3e 22 3c e2 24 0b | 14 89 5a 96 bd 20 3b aa d7 bd af 6b d4 f2 98 3c | 51 d6 02 8a 1a 1e 91 da fa 7c 17 97 ea 62 5d 5c | 64 1a ef 72 b1 d0 d3 26 fb a0 cf 97 96 42 ef 85 | 1f 2a 66 aa 06 10 71 63 af 7d da 60 c1 c8 13 08 | 97 23 c5 07 eb 43 86 64 05 41 06 20 ee 9b 27 00 | 30 a6 42 a7 c6 f6 78 37 51 13 98 31 24 47 eb e1 | 16 0f ee 4e 11 f9 96 b6 72 84 dc 21 2b 6e e3 77 | 3a 73 af fe 81 a3 c6 e9 eb 76 cf a2 f6 45 8e f3 | 29 00 00 24 ca 9d 5e 32 ed 0b e6 19 dc 2f e8 6f | 8e a5 0f 9f 9c 08 6d f3 68 e8 0a 59 74 47 ad 67 | e3 bf 67 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c 89 f1 95 94 6f 28 52 1d 00 7f 87 | cf b9 fb 25 a2 94 8b 5c 00 00 00 1c 00 00 40 05 | cf 55 4f 40 25 07 37 da af 22 52 57 b9 8b da a2 | e2 e1 f8 6b | libevent_free: release ptr-libevent@0x7fb37404b530 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe5c0 | #193 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 09 06 18 28 25 97 f6 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #193 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #193 | rejected packet: | 09 06 18 28 25 97 f6 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #193: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0709 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #194 | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #194 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #194 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49631.461505; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009428 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe5c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #194 | libevent_malloc: new ptr-libevent@0x7fb37404b530 size 128 "road-eastnet-nonat-194" #194: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #194) | fb a9 4a 68 01 02 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad aa 66 9d b6 64 e0 b9 0d 37 a2 d5 08 fd 46 b0 | f7 b3 8b 64 d2 0b f9 59 d3 20 8f d2 23 52 ab 2e | d6 99 18 d2 2f 54 8c e7 99 6c 8c 9d cd ff 9d 5a | 44 41 3e 80 ea ff 21 1e 5c 82 8a bc ec 41 36 14 | dd 8d af 05 d5 6f c4 3b eb c0 61 1c 5d 0d 70 dd | 40 c9 d4 1f 8a d2 d8 76 8a b9 bd f7 f3 8d f9 d9 | da 19 38 58 8d de a2 45 b1 7d bb f4 44 36 75 08 | 1e 19 e1 7e 40 21 fc 21 30 c5 e3 bd 20 8d d8 be | bf bc a6 60 a1 d6 d8 51 07 69 fd 62 da 68 85 ce | 37 74 1e f7 ae d2 77 4a f2 bc 1e 10 5e ed ca 3e | bf 36 bc 15 0b 03 92 f4 43 13 b4 d6 80 6a 65 a5 | da 3f fd 89 e4 f3 95 6e ad 5c 51 06 e7 4d 88 1f | 8e b3 8c 1c 17 69 df 75 37 d0 1f f8 06 a4 4e 15 | d4 9e 45 dc a2 0b 41 4c 07 55 90 db 32 9b e2 82 | 2b f7 f7 40 85 e7 33 60 11 d2 9c 0f 8b 18 ca 0d | 1e 7e c6 7b e1 da d7 c5 9b 44 c8 e8 12 48 03 39 | 29 00 00 24 a9 61 02 67 eb 1a 8f ba e2 2e bf 6e | fa 3f 6f bb 4e c3 80 0d df 43 7e 7d a3 f5 81 cc | f3 7a bb 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 5d 39 f5 08 60 5b 2c d2 7c 9c f1 | a9 84 d1 dc ab 40 bc 42 00 00 00 1c 00 00 40 05 | dc 98 c1 28 2a 8c a1 5f e1 55 35 3c e4 55 00 85 | a7 4e ac da | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #194 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb a9 4a 68 01 02 ca 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #194 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #194 | rejected packet: | fb a9 4a 68 01 02 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #194: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0565 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abe740 | handling event EVENT_RETRANSMIT for parent state #195 | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #195 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #195 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49631.566891; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006186 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #195 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 "road-eastnet-nonat-195" #195: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #195) | 37 e6 90 db 14 bc bf 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 53 c9 77 b4 f3 d5 4d 42 00 37 51 2c 1c 68 3c | f1 54 0f 7a 55 d8 cb dc 59 bb 2f b5 96 8c 4e d4 | 85 27 5a ea f2 a7 4d 9e 5a 6b ee c6 28 a0 d2 57 | 71 7a 7b 0b 80 39 ac 27 cd 87 0d ef e4 ef af 3a | d6 b3 f6 12 c5 5f 2f d9 cd fb 17 d4 43 5e 16 c4 | 87 67 d1 70 07 84 e5 8e 71 91 de 30 59 cc e6 ee | 34 fb c0 51 e2 87 5b 7e 3f 08 db 50 ff 54 7a b1 | bd cb 77 92 50 41 31 65 47 73 69 2a fd d6 77 f3 | b0 89 f6 8e e2 6a 07 fc af 84 ca d3 f2 87 73 27 | c4 cf 2d 21 63 f5 8f 71 28 70 95 02 a0 27 ac 78 | a4 bb 1e 75 dc be 0d b4 ad 92 30 f8 7c 7f 5d 71 | a5 c9 9d 8b 71 f5 b5 68 db 9c 63 56 82 3f 35 f1 | f2 81 65 6a 20 3e b0 68 92 e4 10 6f a0 15 ab a8 | 72 4d 4d 54 b6 ef 0b 2d 62 75 65 6d be 42 39 3d | c4 80 ed ba e2 23 03 5c 4c 11 92 92 a4 9b 70 7c | cd 9d 5e 6a ce f4 42 ce b7 88 b0 01 79 41 f3 ce | 29 00 00 24 9e 21 2f 19 56 de ef 57 88 5d 72 9d | d0 e9 ed cf f1 53 49 64 11 8c ea d8 bc d7 7f b1 | 97 11 98 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be a1 e0 42 82 c4 3c a5 9f 98 67 8d | 2c 4b 8d ec 3b 56 95 d6 00 00 00 1c 00 00 40 05 | 9b 76 ec e0 3b 32 32 e4 22 87 e5 16 97 1d 20 83 | b5 a4 81 66 | libevent_free: release ptr-libevent@0x7fb34c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe740 | #195 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 e6 90 db 14 bc bf 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #195 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #195 | rejected packet: | 37 e6 90 db 14 bc bf 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #195: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0538 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b246c0 | handling event EVENT_RETRANSMIT for parent state #196 | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #196 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #196 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49631.647222; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.010184 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe740 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #196 | libevent_malloc: new ptr-libevent@0x7fb34c0251c0 size 128 "road-eastnet-nonat-196" #196: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #196) | 56 d5 c7 24 09 fd 90 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 8f 70 c3 ed 41 cd d6 d2 1b f8 2a 49 7b d2 65 | 1d 48 5c 44 f7 09 ac 3e 9c 08 81 f6 b3 65 8e 9b | 4e f9 50 8c c8 e7 7b 20 7c 22 4e ca 64 9d 3b 78 | 6f 58 b3 9e 1c 75 62 70 7c 61 ef 34 cb 86 a6 1c | 58 51 2c 23 30 92 4a 45 b4 b8 ae 94 76 05 b8 97 | 44 53 83 e4 01 1b 12 69 e8 13 a8 21 92 4d 3c f0 | 3d 68 d7 2a 32 bb e5 1c b4 56 88 6b 46 1e 40 2b | 43 ea 27 d3 55 2f cf 9a 31 8f 09 d3 05 58 fd 61 | 42 c4 db 9a 42 0a 57 3b 19 4b c6 5f d6 ea 27 6a | 7f bf 49 6f e7 37 63 cd b0 56 7c d1 00 23 b6 75 | b5 9d 85 99 73 08 5b 3f 63 22 53 47 75 51 36 9e | 7d c3 2d 34 ef d2 c8 dc ed 30 18 e1 fc d9 f1 f0 | 6e d9 74 09 8b e8 94 06 ae aa 96 8e cd d8 85 a8 | 1d 1c c6 45 d2 df a8 88 f7 4f 9f 49 92 80 ca a3 | 24 f7 b2 76 f6 e9 c7 34 75 8f 12 25 2f 88 bf 00 | af 80 e2 a0 d5 42 a1 0f 8a 93 9d 2c 68 e7 dc 08 | 29 00 00 24 ed 57 45 ce d5 85 17 38 4f bc 48 45 | b8 48 4b 6f c9 94 96 34 41 c5 a0 9e ee f3 85 65 | 17 35 60 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 33 d1 79 b1 42 18 cd cb 66 ed 21 | 50 1a 62 22 98 16 96 33 00 00 00 1c 00 00 40 05 | 37 d9 a8 f6 16 ad 1f 94 88 50 6d 18 f9 5d 91 a6 | 7a d6 46 08 | libevent_free: release ptr-libevent@0x7fb34c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b246c0 | #196 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 d5 c7 24 09 fd 90 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #196 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #196 | rejected packet: | 56 d5 c7 24 09 fd 90 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #196: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab90c0 | handling event EVENT_RETRANSMIT for parent state #197 | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #197 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #197 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49631.745546; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.026042 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b246c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #197 | libevent_malloc: new ptr-libevent@0x7fb34c035930 size 128 "road-eastnet-nonat-197" #197: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #197) | 76 fd 06 22 f8 72 39 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff 68 ad 96 cd 76 be 78 ca de ba cf 7d b8 d2 27 | eb 47 3d ab 5c da 69 f4 c0 aa ef 37 1d c8 bc 64 | b3 77 c8 06 c7 c1 ca 6e ba 13 a5 88 a0 2f 7d 28 | 77 76 19 e0 b9 08 19 f4 ea 19 57 8a 4a c5 51 64 | b2 b3 06 1d b7 55 89 e3 2f 55 c2 0a 68 16 ae bf | bc 84 d6 24 e3 0d 3a 6d 7f b0 26 cf fc 83 69 6f | 06 6c 19 78 05 aa 1a a7 a3 53 01 3e 4f 01 0c e2 | b6 b8 5e d8 44 74 c4 4a 7b 03 78 a3 0d 18 93 01 | ca 83 a7 98 02 8f 9a c5 fb 52 4a 95 fa 85 65 9f | 48 a4 30 21 ca 8f d8 e0 98 f5 f9 49 2a 0a 5a b1 | e0 a0 a3 25 65 8b 86 36 1d 17 ff 3c 76 35 24 e3 | b6 f7 d8 e5 22 2f 0d 80 58 07 89 c1 b8 b9 b6 a3 | ac a9 f3 74 55 c9 1c c7 ef 2f b9 00 be f9 d3 c9 | 30 e9 ef 92 c0 ce 36 02 ea 19 c8 d7 f7 c5 6a 1c | b8 72 5b 69 21 d3 b8 ca 13 78 68 f5 5e 6f 80 64 | 1c aa ea 24 03 ee 29 9b c1 bb 83 e4 a6 7c 10 08 | 29 00 00 24 74 4f 18 14 83 36 22 20 12 7b 44 86 | f2 c1 e1 0b 40 a8 83 e6 1a 42 e2 88 a2 98 21 31 | 2c b2 85 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 2f 89 09 b5 52 02 b8 23 bc 44 51 | 94 1d 2d 47 4e ed 65 d6 00 00 00 1c 00 00 40 05 | 73 fc 3d fb 5c fa a5 ca c9 53 fd 67 5c 67 b8 86 | 11 c4 a6 88 | libevent_free: release ptr-libevent@0x7fb36403ae90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab90c0 | #197 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 fd 06 22 f8 72 39 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #197 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #197 | rejected packet: | 76 fd 06 22 f8 72 39 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #197: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fa300 | handling event EVENT_RETRANSMIT for parent state #198 | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #198 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #198 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49631.831933; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007648 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab90c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #198 | libevent_malloc: new ptr-libevent@0x7fb36403ae90 size 128 "road-eastnet-nonat-198" #198: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #198) | 38 c2 c3 e5 3e e5 82 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 61 f7 55 c5 c4 5e d0 83 66 79 06 76 ff 91 2f 9b | 12 d0 24 44 db b1 bb 60 15 c5 59 2d d1 18 5f af | af eb bb bf af 0f d5 a7 6d 21 23 3c 7a d5 2f 3a | b3 ef ca 8b 4c db ec bc f0 8c 19 8a b2 60 93 64 | a7 e9 05 44 28 9e 74 5d d9 95 66 66 f7 e5 b4 1f | d5 4f c6 33 f7 6e 5b 80 b4 15 1d 1d 0e 0a 1d ec | d1 57 f6 0c 8a 85 f5 7e b6 52 c9 40 29 cb 30 96 | b6 70 b8 b9 59 b7 f3 5d 39 15 1c 09 f2 d7 22 1a | 2f a6 71 e7 c2 13 1a 03 5a ae 65 2f 9f ab 09 6a | f8 76 83 82 4d 45 c3 9c c4 22 81 0b 0c de 1f 60 | c4 83 6f 80 69 4d fb 9f c9 f8 93 ff f8 9f 02 54 | a0 9a b8 b4 d0 4b 39 8e 82 eb a2 4d fd 53 0b 42 | 08 c3 3b 83 a3 55 58 9c 32 8d d4 50 90 35 7f 36 | 30 25 cb 7b da d7 20 59 55 75 68 f3 54 82 bd 15 | 66 45 d1 d6 73 76 d2 e1 4b 15 1f c3 2a 8d b1 0b | e3 7d 9a 2f f6 14 5c e9 eb 5c bb c0 32 a0 bd c5 | 29 00 00 24 88 f3 29 1f 7c 05 5c 84 29 93 1b 9b | 8b f1 e4 5b 97 f1 d8 9e b8 85 d9 30 2a 5f 45 e2 | 98 31 41 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 05 30 82 a4 eb e3 d3 07 9b b1 ad | f0 ee 15 a7 e9 bb 27 63 00 00 00 1c 00 00 40 05 | 88 8a 68 49 cd fa 13 38 3a 2a 49 e8 1c 37 c8 41 | 63 44 84 75 | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fa300 | #198 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 c2 c3 e5 3e e5 82 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #198 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #198 | rejected packet: | 38 c2 c3 e5 3e e5 82 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #198: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0771 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac3ec0 | handling event EVENT_RETRANSMIT for parent state #199 | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #199 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #199 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49631.94811; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.012446 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fa300 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #199 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 "road-eastnet-nonat-199" #199: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #199) | 27 d1 6c c4 4c 84 e3 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 f7 e5 ae 44 da 7b a1 b1 3e 44 fb ef 82 32 77 | a0 c2 72 43 50 19 7e 5e c7 1d 24 fa 9d 99 ff 71 | 44 54 82 8e cd bf 0f 40 ad 0d 4a 27 75 78 aa 64 | 63 e6 66 6d e9 bf 1f 5a 74 65 bf 0f ba 29 57 51 | 0a 44 9c 16 52 28 db 48 f9 d7 ab e8 1e 98 b5 a0 | ff 9d 9d 22 6a 26 d5 06 1f b5 07 29 59 d7 ec 33 | 10 b5 a0 31 95 73 ec 20 a2 11 23 56 06 d8 ad a2 | 6d 0f c8 00 64 2f 99 96 5d d2 5b a5 dd 2c 34 78 | ce 80 35 74 5d 74 56 55 47 bf 15 c1 84 c7 0f 64 | a6 70 c6 99 14 c9 d9 b3 02 6a 70 83 2d ca 4f aa | b9 b4 39 e1 b3 2e 81 8c 26 1f 8e f8 1a b1 b1 4b | b0 9b 0a c4 8c 38 2e 14 24 c9 96 c5 ae 69 55 cb | f9 3b a1 e1 2b 54 42 88 42 2f d5 f9 04 ab 91 7e | 86 11 e3 bd 2a 54 c0 da 96 34 89 6a 25 46 14 93 | 51 fb 1f 2b bf 29 76 41 f2 16 a8 f5 e3 fb 49 39 | 86 d5 c2 41 0f 92 03 df 3b a9 75 b2 e3 1f cd 5c | 29 00 00 24 ce b1 60 ec b2 6d 5b aa dc 41 a3 c6 | 5b 6b 71 42 8d 0b d4 85 d2 79 6d f3 81 c0 ff 8a | e8 8f f9 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b6 28 45 f6 47 a9 89 2b f2 e1 02 | ea 34 3a fc e5 a7 2b f1 00 00 00 1c 00 00 40 05 | a9 d3 87 ec eb bf 81 b0 18 6d 86 a6 a8 63 05 fc | 1c 93 4f b5 | libevent_free: release ptr-libevent@0x7fb384027b30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | #199 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 d1 6c c4 4c 84 e3 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #199 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #199 | rejected packet: | 27 d1 6c c4 4c 84 e3 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #199: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a276e0 | handling event EVENT_RETRANSMIT for parent state #200 | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #200 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #200 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49632.037467; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.01005 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #200 | libevent_malloc: new ptr-libevent@0x7fb384027b30 size 128 "road-eastnet-nonat-200" #200: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #200) | 75 f9 3c ee 3d 43 50 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d d7 f4 2c e9 d8 b4 58 bc f6 5c 68 d0 e8 20 d2 | 70 0a 56 63 f6 74 43 04 b4 cd d8 23 88 fe c7 f6 | 1e d9 bd ee 25 c8 67 c7 2d b9 d9 c6 54 ca cd 9c | 4d 78 05 42 6a b4 88 a1 71 4e fd 59 90 2e 53 a1 | 4c c1 78 ca ca ed 13 0b 48 7e 72 f2 de cc bf 74 | d8 13 14 01 89 5b 3d f3 26 5d 17 ef 74 28 fa a9 | a5 86 f8 17 01 9e 46 6d 69 c4 ce 7b 85 c2 8b f2 | 6a 40 21 88 6b 4c 0d e0 b2 55 9a f1 b6 c4 a5 34 | 5e ea a9 16 4b 7b 22 02 6e b5 62 bf 0e 13 c4 75 | 5a f6 47 5c d0 c2 01 a3 46 b7 b7 ca c6 5e f6 e3 | 79 8e 25 ba 76 6d ee 11 df 8f 10 22 5f 50 31 f4 | b3 77 76 36 47 ec 67 35 64 4d 22 bd 77 3c 61 d0 | 1c 1c ab b4 d6 cf e4 0f 57 21 d8 30 aa 58 f6 84 | a1 48 51 27 85 8c 83 cc 89 77 d2 37 58 0f 1d e2 | 1d d9 35 ce 76 2e 8b 0d 16 1d 75 c0 13 c5 08 c0 | 3c d5 3b aa 74 68 e3 69 d7 c9 6b 6b d6 2e 6c a1 | 29 00 00 24 0e 33 98 69 ac 19 40 8d 23 0b bc 95 | 8f 5a 8e 62 b3 f7 97 e2 1f 4f da 87 39 88 58 8e | fe 30 e9 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 45 f2 7a b7 3f 1c 77 84 16 29 66 | 7f d3 6a c0 22 39 cf e5 00 00 00 1c 00 00 40 05 | a7 72 f7 48 87 f0 01 9a b9 14 bf 98 e7 f8 65 3b | c7 d8 2f ed | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a276e0 | #200 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 f9 3c ee 3d 43 50 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #200 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #200 | rejected packet: | 75 f9 3c ee 3d 43 50 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #200: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1ae80 | handling event EVENT_RETRANSMIT for parent state #201 | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #201 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #201 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49632.097753; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004371 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a276e0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #201 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 "road-eastnet-nonat-201" #201: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #201) | 5f 8c 2f 98 2a b9 f9 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 72 1b 4b d5 18 dd 2d 5a 73 d0 41 7c 7e 89 a9 | 19 f8 4b 62 c1 9f f8 9d ff 76 0b e2 1f 44 b2 65 | 43 ea 94 88 bf 44 69 e7 07 70 c1 dc 59 58 cc ff | 59 19 82 57 fc 1c 37 9e a0 3e e4 f1 e5 85 09 b8 | cc 92 31 ca fd aa 7e e0 16 48 4f 93 4f 42 e6 41 | c6 d3 52 7b 4e f3 0c 48 a9 04 ea f5 d3 65 18 f4 | 8a 3e 8f 3d 66 71 a1 fb 46 fb e6 68 d4 de 30 4a | 77 d7 f7 51 80 44 5e 85 cb 41 c1 dc 19 46 1a 15 | 01 41 bb 17 40 1e c9 5b 1b 21 a1 10 c3 62 4c 55 | fa d0 3d 43 4e f3 0e a9 19 fd a5 f4 e9 a2 ac b4 | 40 11 51 f5 60 d4 30 87 a9 01 d5 04 88 71 af 01 | 0d f5 ab c7 33 ac d8 6a 80 db b1 bc 74 30 96 9e | f3 e1 bc b7 79 7c 12 ad fa 75 5d d2 23 fd a0 f7 | 3c 1c 0b d2 90 e2 83 a1 35 0f 5a b5 72 3d 6d 57 | 77 a3 af 0c 6a cb c1 58 a8 44 91 03 d0 f1 c3 69 | 53 0b 4f 4c fa 84 4b 60 c6 19 9c a4 39 a4 5b 44 | 29 00 00 24 ae be 08 16 b0 5a 8a 2b 33 7f 9f 5f | cb b1 1f 0b c0 df 08 67 ec 99 94 2a ad 60 2a 4f | 52 2c d3 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 75 8b 84 8e ba 07 72 da 16 0b 96 | fb 30 39 ca 67 c0 9f 42 00 00 00 1c 00 00 40 05 | 88 1b f0 23 47 26 b3 be 92 d6 69 de 00 cf 4d 8d | 78 92 34 e3 | libevent_free: release ptr-libevent@0x7fb348046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1ae80 | #201 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f 8c 2f 98 2a b9 f9 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #201 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #201 | rejected packet: | 5f 8c 2f 98 2a b9 f9 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #201: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab7a80 | handling event EVENT_RETRANSMIT for parent state #202 | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #202 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #202 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49632.191108; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005732 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1ae80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #202 | libevent_malloc: new ptr-libevent@0x7fb348046040 size 128 "road-eastnet-nonat-202" #202: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #202) | 98 0c a0 3b 8e c3 04 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 4a de 90 9e 09 12 3c c9 7a 03 ab 1b f1 18 11 | 66 c3 f7 79 15 3a 95 02 ba e1 c3 e1 f6 5a 7b 34 | 8e de 4d 10 9a e1 70 a5 55 9d f4 c1 17 92 7c df | 68 e1 17 a5 99 1c fb 35 b9 25 cd 23 53 a8 26 d2 | b4 87 e9 2f e3 5a ea 45 0a 90 48 f4 6a 56 94 50 | e4 57 95 d6 52 83 af 6a c6 31 70 b1 c4 d3 c8 6b | cf c5 42 e4 73 01 2f be 13 4a 08 6e a7 91 68 14 | ad a5 a0 e4 14 1f a0 f2 00 98 4c ce c7 d5 c0 b6 | 15 77 5c 51 52 78 e1 34 5c df ff 32 7c 7c eb 4c | 74 06 ff d8 24 f4 34 27 4b f7 4d 5c de 29 22 32 | 61 0e 41 b1 a4 d1 44 ff 96 54 64 39 71 47 b7 07 | 8b 2d f1 7b c7 ff 29 67 2b 47 cf 64 2a ba 75 f5 | b7 8f 94 01 0c 73 d3 d0 a0 ca 7b 5c 80 ff e9 5a | df 27 66 99 d5 41 03 93 26 82 2e 43 c1 d3 4e 98 | 2a e1 9f 1a 15 c9 bf 3d d7 73 59 c0 eb c5 7f 3c | 4c 61 b0 05 20 29 0a b9 6b bf 44 e2 c1 1a 84 6d | 29 00 00 24 99 ea 46 58 fc ef 28 85 a0 72 43 c8 | 36 86 2f 35 31 69 ef db 0d c0 f1 46 4d af df db | 48 57 6f 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 23 33 21 68 f3 9f d6 75 73 74 16 | 0f 96 1b 0a 5a 2e 12 b4 00 00 00 1c 00 00 40 05 | 9b b4 ff f5 5e e8 7e 5a 50 28 47 10 22 d7 72 89 | 2b d0 c4 98 | libevent_free: release ptr-libevent@0x7fb34c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab7a80 | #202 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 0c a0 3b 8e c3 04 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #202 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #202 | rejected packet: | 98 0c a0 3b 8e c3 04 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #202: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #203 | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #203 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #203 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49632.270474; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005311 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab7a80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #203 | libevent_malloc: new ptr-libevent@0x7fb34c0180b0 size 128 "road-eastnet-nonat-203" #203: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #203) | 02 57 d9 3d 13 25 98 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 1c fb 0e 8f 43 ac f5 0b 5f c4 59 e2 84 8d ff | 93 42 c3 e3 19 35 29 34 62 44 7f 8b b9 60 94 1a | 68 20 33 36 7e 07 ef b9 9d 1a c3 c4 e5 e3 be 6f | df 48 47 f9 cf 7a 23 fa b8 b9 0f be e3 51 16 88 | 65 2c 32 42 a7 de 33 7a 8d 00 20 5f 8c 23 cc 9e | fd 93 18 91 08 48 46 f6 9e a4 63 04 36 57 fb 82 | db a9 f0 b9 fc 47 88 c1 af a0 52 b6 f2 77 4a 78 | 7b 45 5f 81 61 4c a8 5c 40 e9 6e 59 e6 65 a5 7d | 8f 67 9e 58 05 f0 0e f3 10 e5 4c 4f bd 20 a3 7c | 88 1e 84 95 b7 f3 51 db 65 68 67 47 f1 73 c2 67 | 48 a3 dc a1 e1 3f e7 d7 4c f9 dc 2e f5 e0 7c 72 | 3d 2f 82 8d c1 ef e8 9c 9c 82 12 27 e5 0a e4 bb | af 79 89 91 83 59 68 9b 2f 98 3b 89 0a 25 be 74 | c0 0f b6 99 3d 8f b4 39 9b 96 c4 d8 6a 5d 53 81 | 43 9d 7a a3 69 c9 61 8c c0 23 f3 33 21 de 95 0e | 53 97 be e9 2a e9 9e 71 b5 e7 b9 2b cb 16 40 76 | 29 00 00 24 ad 22 cd 07 aa fe 98 d8 02 52 a4 3c | 95 12 5a d9 ed 8e 49 c5 19 c8 cb b1 88 c1 88 b9 | c9 3f 70 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 60 71 59 6f 4c 24 43 8a 9c 00 7b | c3 3a 97 05 f3 23 35 42 00 00 00 1c 00 00 40 05 | 0d db 79 a2 0f bb d9 bd 26 88 9d ac d1 d3 87 df | 66 b4 d9 d4 | libevent_free: release ptr-libevent@0x7fb348009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #203 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 57 d9 3d 13 25 98 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #203 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #203 | rejected packet: | 02 57 d9 3d 13 25 98 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #203: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0481 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aaa100 | handling event EVENT_RETRANSMIT for parent state #1 | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #1 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #1 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49632.278774; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.016056 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #1 | libevent_malloc: new ptr-libevent@0x7fb348009640 size 128 "road-eastnet-nonat-1" #1: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #1) | 6c 47 a0 1e 4e 7a e8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 72 0a 33 22 17 06 fc fa 28 91 b3 4f 57 56 e3 | ee 34 d7 20 66 52 7a 35 d8 92 bd 3b 01 15 87 45 | 58 9b 73 12 6d c9 2d 63 ff 30 68 a3 01 b0 11 62 | 0d 6a c8 7a 26 90 7a 07 0b 27 d1 49 b8 5c b5 22 | a1 78 8f 5c ca 62 0b 66 89 cf a4 d3 28 f3 60 65 | c4 0b 09 ab 6c 65 0c 24 ce 5f 6b 9e 2d 74 21 c1 | cc dd a3 d2 b1 b2 d7 b0 e3 c8 e7 e0 b1 08 40 98 | ea 60 7f cb f6 03 0b de 16 74 c6 45 5a 5d fd 06 | 19 e0 e9 1d 81 07 89 02 31 28 9a 67 2f ad 6e 4a | 5d d5 b0 90 bd e1 d1 0c 6f c0 ca db 12 8a 57 f5 | 47 c8 09 2a 1b de 2b dc d0 ab ee bf fc be 4f ae | f0 8e 4b a7 a7 58 e9 98 9f 49 09 09 2b 4d 67 80 | 28 41 88 84 93 b4 f0 c4 d7 78 27 c0 fe b8 4a 13 | 52 ab 44 91 d1 9f f2 59 6f dd 35 3c 1e 70 9c d8 | 9d ab 34 6f 48 48 c0 46 69 91 44 bd 80 07 2d e1 | 42 55 8f bd 8c 53 47 7c 85 94 0c 8c ae 5e 19 a4 | 29 00 00 24 e7 5a 07 18 3f 34 30 d2 f0 5d 94 65 | 65 0d d9 4a 64 02 60 6e 32 ba 95 35 8b ff 59 40 | 3a 8b 9e 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 00 78 5c 8b 16 a5 c0 7d 51 c3 29 | 54 44 32 39 1b 8f 23 e8 00 00 00 1c 00 00 40 05 | 68 e9 c0 40 f1 97 39 51 93 0a 30 e5 6a bd eb d1 | f4 d9 bb 8c | libevent_free: release ptr-libevent@0x7fb38403da90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aaa100 | #1 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 47 a0 1e 4e 7a e8 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #1 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #1 | rejected packet: | 6c 47 a0 1e 4e 7a e8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #1: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47e90 | handling event EVENT_RETRANSMIT for parent state #204 | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #204 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #204 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49632.37621; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.011275 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aaa100 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #204 | libevent_malloc: new ptr-libevent@0x7fb38403da90 size 128 "road-eastnet-nonat-204" #204: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #204) | 26 9b 30 ce 1c 69 a2 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 5c 6f c5 e4 37 b5 85 8b 88 c9 38 4a 33 67 e3 | b5 76 e8 6e 58 ca 85 66 b2 6e bc 01 cc 91 d2 fa | e1 db ef 4b 77 17 f5 08 16 0c 8c d0 2e 39 5b 3d | 15 8c a2 f2 d6 7b 21 20 d2 5d b0 fc e4 ac 76 97 | 30 50 2e 26 71 1a 34 95 4e 65 5f 33 21 89 a5 4a | 55 91 fa cb b0 1c 50 2f 03 b1 71 df 7e 93 5d 3f | 83 d0 25 32 6e 4a 7a e8 b7 9c c4 2c bc 70 88 ca | 1a 12 c7 c4 81 cf af 5b 96 ed ff 17 ee ac bf bc | 7e ee e8 ea bf 0e 25 06 f6 11 f2 0c fc 01 f3 a1 | a3 a5 0f 39 3b 0e 4e 24 40 89 5e e7 dc 14 70 db | b0 59 4e 88 e4 58 74 9d 4c 35 67 80 45 58 10 7b | 90 72 ed 6b 8c 09 3f 83 31 52 aa d0 a7 ad e8 5e | 62 2d e8 c2 d2 5f d4 fe 77 1a 24 07 0f a0 1b 7f | b1 31 3d fc 2d 59 58 95 dc 6b 56 ff a8 81 81 ca | bd 63 b1 a6 f3 e4 7a e1 08 85 c1 19 90 12 c0 7e | 58 38 76 3a 98 a3 e6 81 1a a9 a3 c2 1d 81 96 94 | 29 00 00 24 f4 44 35 a4 a3 93 f6 e1 66 d4 43 db | 1b ee 9d af 99 ba 18 1d 96 99 f1 ca 00 4e 65 c8 | 19 9f df 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 dc 32 bc d5 a3 92 90 2d a7 77 26 | 1c 78 dd c4 9b 23 7d 3e 00 00 00 1c 00 00 40 05 | 5b a2 10 3c 9e 91 f8 b5 af bf b9 e6 23 08 5d a3 | 6c 17 22 88 | libevent_free: release ptr-libevent@0x7fb36401f860 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47e90 | #204 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 9b 30 ce 1c 69 a2 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #204 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #204 | rejected packet: | 26 9b 30 ce 1c 69 a2 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #204: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a24730 | handling event EVENT_RETRANSMIT for parent state #2 | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #2 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #2 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49632.533666; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.012508 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47e90 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #2 | libevent_malloc: new ptr-libevent@0x7fb36401f860 size 128 "road-eastnet-nonat-2" #2: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #2) | 1a 6c de c8 74 c5 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e e6 40 8d 01 9a df ee a1 21 ef 7c 27 51 b1 50 | 11 ab 49 b8 aa be 06 6f 98 06 4f a8 49 fc 42 fd | ea ae 86 e5 22 2c b5 91 3d 9f 17 1f 02 b9 b9 8d | 62 48 db a9 bf 68 b6 2a 81 1e f5 ea 96 5e fc 90 | a8 90 23 f2 fa 81 8e 8c d6 45 a8 56 67 da 61 6d | ec 8f 6b 5d aa 73 41 20 29 44 b2 20 1c ab 68 57 | 66 6f ca 43 df ea 03 70 f7 0e 47 cb 21 da 37 fa | b6 1e 94 d5 b1 5e b7 96 a4 f5 5a 22 ff b7 b7 1e | 62 65 38 93 8b 8d 44 bd 9f ea 0f 68 70 be 74 db | b6 35 f8 53 58 61 01 df be e6 bf 45 b0 94 55 ae | 5d 6b 51 98 47 dd 93 18 5c 30 93 96 42 3e 47 91 | 90 01 1e 32 64 de ec ce 38 b5 ab f8 4a 4f 0c ed | d8 fd 0a f1 53 ed ad 6b 9e c5 db 7f 6d 9f 1b e5 | 0c 7b f2 2f 6f ec 10 d1 5b 4b 71 ee 47 5f b6 1f | b0 01 08 5f 12 c2 5d 47 67 6d 8f ee c4 bf 47 5b | 6c 71 d5 40 dd 10 ef f5 69 2a fd 09 2a aa 47 a4 | 29 00 00 24 31 10 28 eb fd d1 21 19 30 13 d3 a7 | cd be e5 7b ca b3 e1 fc 00 55 31 87 01 f1 62 07 | 15 72 f6 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 6d fc d3 8f 25 27 03 1f 7a b6 de | f8 04 ad d3 88 d5 17 aa 00 00 00 1c 00 00 40 05 | 09 59 07 05 b4 e1 f1 0d 32 74 62 04 62 1e 48 d0 | 7d 5b 7f 5e | libevent_free: release ptr-libevent@0x7fb36802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a24730 | #2 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 6c de c8 74 c5 fb 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #2 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #2 | rejected packet: | 1a 6c de c8 74 c5 fb 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #2: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a30d30 | handling event EVENT_RETRANSMIT for parent state #205 | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #205 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #205 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49632.558141; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.023855 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c440 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #205 | libevent_malloc: new ptr-libevent@0x7fb36802a950 size 128 "road-eastnet-nonat-205" #205: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #205) | 96 a5 4d 09 36 59 36 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 af 72 1b a0 98 9e 50 b5 1c 2a f4 25 37 46 6d | 29 08 48 dc 3a 43 a8 47 58 90 05 63 32 ed 1e 67 | 1c d6 5d a6 5c c9 d2 88 4d 23 9d 29 85 6c bc 34 | b6 39 47 15 78 35 07 0e dc 99 e1 b1 20 70 65 8b | 00 6c f0 e9 44 5b 08 c2 17 e1 6b 72 9c af 6c 5b | a9 60 97 0c ec 66 17 57 bd 76 76 97 27 d0 77 4a | 2a 55 71 50 75 d7 68 7b d8 80 b2 7a 09 02 08 2b | 09 0a ee 89 61 3b 8a 2f 12 7c cc 05 74 ec 11 d1 | 9b a1 09 08 7c 39 7a ee 4d 88 62 16 e2 82 1b b3 | d9 8f 53 7a 4b 48 dd 7d 8c 47 a4 25 61 2b 5a 2a | 2f 93 a5 82 b2 4d a6 fe b3 ac 51 3e da 8f 23 63 | f4 2a 7e 1b 28 f1 63 98 1b 09 f8 46 7c 59 0e 77 | 0b 32 ae 4e 95 8f da e9 a4 30 df 08 42 58 09 74 | 83 d9 4e 39 cd 7e 3b e6 37 1b b5 f8 2d 02 a3 8b | db d0 44 1c b8 65 c5 60 b6 1d bd 0a 87 21 84 61 | fa 21 34 4e 05 0a 9f 1b ec 7d 07 6c c5 18 67 d9 | 29 00 00 24 6c 40 f7 85 3a 61 11 e1 6e 44 7b 14 | a7 18 59 d8 8f ce 04 ee 70 39 7f 15 26 c1 43 92 | dc 05 98 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 dd f4 0a 58 0e d8 12 1e dc 08 fa | c5 ab bd a9 a1 ef e0 c4 00 00 00 1c 00 00 40 05 | 38 8d 68 ba 0f a0 5d 58 b7 93 ab fe 9b f6 26 59 | 71 96 1a e7 | libevent_free: release ptr-libevent@0x7fb37800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a30d30 | #205 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 a5 4d 09 36 59 36 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #205 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #205 | rejected packet: | 96 a5 4d 09 36 59 36 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #205: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0647 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acab40 | handling event EVENT_RETRANSMIT for parent state #206 | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #206 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #206 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49632.655106; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007618 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a30d30 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #206 | libevent_malloc: new ptr-libevent@0x7fb37800cf80 size 128 "road-eastnet-nonat-206" #206: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #206) | 01 b3 28 e7 e1 8b 13 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 fa e3 24 f9 a6 bc f3 21 1e 37 1a 6d f4 9a 7b | 77 24 5e 56 24 67 7b 74 f9 64 dc d8 1a b5 59 69 | d9 52 b7 b7 59 74 06 38 08 06 47 89 aa a8 f6 76 | 67 bf d4 4c 77 38 3b a1 63 60 dc 2b e4 fd cd 8b | 9a 4a 0c c7 7b 27 52 84 4e da 22 90 8d d5 51 6e | 00 c5 39 c6 ed 97 f2 c6 62 d9 ba 39 61 32 bb b8 | 11 91 00 ac cd 59 52 93 9f 38 fd 04 59 e4 ef 16 | eb bf 19 45 a5 bc 57 3a 53 a0 af 42 99 76 fa 1f | bd f3 4c 0f c8 d9 db e2 c0 a7 a6 04 31 f7 f9 f3 | 77 5c f7 e0 36 17 0a 5b 7e 68 29 02 15 2c e5 8a | 69 a2 34 36 51 a6 dc bd 4c c4 84 48 fa dd 5f b4 | 73 4d 7d 2b ff 7e df 63 45 9b 17 c7 95 9a 49 c4 | 94 db d0 f3 cd fa 37 d8 ec f4 8c 44 3e 14 f3 a8 | 13 2a dc fa 14 d8 cb 5f 5e 17 3a bf 2d 92 c3 14 | 49 5a 16 33 0a 40 13 9b 4f 56 1a aa ae 2b 43 6f | 7d 54 d1 07 b7 2a 7c 54 16 74 51 00 fd 0a b4 02 | 29 00 00 24 44 53 3f fa 64 f7 0e 35 c1 fb 1d 6e | fa 42 52 34 05 1a a7 3b 67 a9 b1 fa 7a da c7 46 | 65 3a cf a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 ab 21 a3 8f 50 c0 c7 3c cf c9 b6 | d3 91 c9 10 6d b3 85 90 00 00 00 1c 00 00 40 05 | fa 90 51 e6 cc c6 e6 dc b8 75 a7 d9 1e dd 64 0c | e1 7b e8 fe | libevent_free: release ptr-libevent@0x7fb37c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab40 | #206 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 b3 28 e7 e1 8b 13 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #206 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #206 | rejected packet: | 01 b3 28 e7 e1 8b 13 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #206: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0583 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #3 | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #3 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #3 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49632.682132; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.013189 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab40 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #3 | libevent_malloc: new ptr-libevent@0x7fb37c03b0b0 size 128 "road-eastnet-nonat-3" #3: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #3) | 81 44 b6 c8 2a 40 ce 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 54 15 6a 8c 9d d0 48 d6 59 e5 e2 2e a9 83 c3 | a8 ba 16 88 07 d6 11 91 3a 48 ca 9a fe dc 40 cc | 29 63 c0 dc 38 80 92 c8 fd f6 81 d3 d8 66 94 3d | c5 2d e7 b1 2b da e7 bc 78 d1 e4 dc 9a 41 8c 14 | c6 fb cd 2a 97 af ef ad 23 32 6d 6d f8 fa b5 27 | 9e 41 35 14 10 3b f6 98 c8 8f d3 aa de fa 55 91 | cb c5 c0 43 8b 3e 66 29 8a ce 63 ed 04 d9 5e 36 | d1 ee b2 55 32 92 26 8a 60 a1 e6 8a c1 81 34 3b | fe bb 92 45 5e 07 2a fa 53 4e 52 04 9a fe 49 14 | 7b 7a a1 34 68 ab 79 c6 b1 5b 9e 7d ee f2 e3 2b | b4 f7 cd 72 14 0a 7e 40 88 1b b7 27 4f cc 0e 08 | a7 a7 14 77 d4 62 20 1a 96 bd a4 9c 9c c7 ed e3 | be 59 87 38 e7 1a a8 83 a8 52 47 62 89 d6 f0 d1 | ce 49 83 2a 83 87 c7 c7 2e 90 40 05 a6 4e c5 26 | bd c4 1e e7 34 ac 09 b9 70 d9 7f 32 91 1c d9 7b | 01 ed eb 14 c7 ff 07 8b 68 87 79 fe ab f8 54 a7 | 29 00 00 24 af 67 2a 08 9a 9a ad ff 86 6c 03 06 | 6f 2f 6b af d5 26 d4 77 40 17 03 25 58 a0 84 c4 | 14 b9 e1 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 4b 9f 22 64 ba ce 64 1d b6 f5 ba | 24 33 ca 6e b0 87 4a 02 00 00 00 1c 00 00 40 05 | 8e b1 42 d9 c7 63 9c 7b 3d 57 a7 c1 0c 5d 8c 4c | 33 59 3d db | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | #3 spent 0.218 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 81 44 b6 c8 2a 40 ce 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #3 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #3 | rejected packet: | 81 44 b6 c8 2a 40 ce 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #3: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0889 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abfd80 | handling event EVENT_RETRANSMIT for parent state #207 | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #207 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #207 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49632.780629; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.020103 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #207 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 "road-eastnet-nonat-207" #207: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #207) | 98 86 9a c8 81 d3 6e e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 59 ae 25 5d aa 28 92 c6 18 2f bc 82 85 c2 3b | ef 2d af ff 7a e6 4d 2d 70 93 a0 de ce 52 57 5f | cf 57 26 3f 1c a7 0f b2 96 d8 25 c6 cb c3 1d 15 | 8e 04 6c c9 e5 de a9 9f 48 ec bf 8a ac af 55 b7 | 16 4e ac b3 75 43 96 89 7c 9a 69 70 08 ac 14 3e | 96 4b 5a 70 2a 29 e5 8b 07 f0 5c cb ed e2 91 b3 | 9b d7 77 9b 28 c0 fb 49 4d 80 b8 6a 5f 4b e2 be | 9f 93 81 d7 4b ea 7b e4 89 24 53 bc a4 06 8a 63 | ae f3 eb f3 e4 35 75 5b 3f a9 62 83 5c be e9 3f | da 2a 80 0c d1 89 a8 df 56 22 c5 4a 79 92 72 a5 | 3c 63 0a 48 54 25 a3 65 43 13 ce a4 3e 09 f7 a7 | 13 60 08 7a 31 57 5f 3e ec 21 89 2d 48 e6 b5 d0 | 55 c4 14 94 07 66 75 e1 7b b7 31 ad 1e 44 cd 2a | 84 8d 3f db f4 29 57 19 60 3f fa 98 86 72 4b e8 | c5 e2 25 d0 6a 0d c6 7c 2e b9 5b 59 7f 50 39 10 | 7f 2b dd a7 68 a0 e6 07 75 6e ff 62 1d 5c 80 75 | 29 00 00 24 e2 c5 0f b4 00 31 2d 18 4e d6 58 87 | 9d 2e 37 b9 b3 22 c5 5a fd 1c 75 2e 4d 23 6a 09 | d6 2f 3b 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 0a 15 af 31 57 a5 69 ec 8c db 25 | c8 27 a9 b0 00 8f 48 7f 00 00 00 1c 00 00 40 05 | af fe 48 1b 76 51 69 26 e1 f2 f5 ea 64 9f 61 35 | 72 2e c3 f3 | libevent_free: release ptr-libevent@0x7fb3380251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abfd80 | #207 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 86 9a c8 81 d3 6e e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #207 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #207 | rejected packet: | 98 86 9a c8 81 d3 6e e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #207: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad6ec0 | handling event EVENT_RETRANSMIT for parent state #4 | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #4 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #4 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49632.818971; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005463 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abfd80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #4 | libevent_malloc: new ptr-libevent@0x7fb3380251c0 size 128 "road-eastnet-nonat-4" #4: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #4) | 9f e3 9d 02 77 44 b7 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 12 be 82 37 05 d2 52 25 54 17 1c 7e a4 e7 a1 | 7e a3 9e 01 f0 c9 5e f6 79 14 37 d9 ec ef 3e 7b | d6 12 38 d8 73 16 9f 73 2c 17 04 25 c3 08 1e 06 | d4 99 19 15 32 45 9a a7 b4 d5 ad 96 4d 41 dc 91 | 4d c8 05 99 28 4b a0 e8 08 9f f7 76 6e 87 6e f0 | e8 58 e3 c1 70 13 6f 8d cd 7f 4b 91 ab b0 98 2b | 80 11 c8 ef d5 8f f3 5b b1 1f e0 43 de 0c 0e b1 | 13 32 29 e5 dd ca fb b5 e8 02 d1 3b 1d 9e 4d 95 | 8d f8 b1 fd 7f db 1b 37 33 cf 99 72 de f0 e3 79 | 73 e7 61 a0 9f 73 96 2a c8 d9 3f f2 5e 93 fa f5 | 10 3a 62 6a 38 cd 93 3a 9f a8 56 7d f2 c3 ee 21 | b5 e7 1b 68 51 3a 6c 80 5b ad 50 8d 16 63 1e 8c | 65 d8 ef 12 42 db b7 45 7e c0 09 e7 f6 56 5d da | d8 52 c7 89 46 5c ed c7 24 ca 60 5c ff 30 28 b2 | a1 94 8c ec d2 08 2c a4 8a 1d a2 db fd 97 89 ac | cf d6 3b e3 0f 35 26 7e 4f b9 c8 b0 82 f2 80 6e | 29 00 00 24 ff 8a 31 04 ed 0e 73 16 f9 33 92 87 | 63 96 e9 90 5e 3a 90 66 d0 c2 86 27 40 23 58 23 | 51 d5 8c f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e 57 40 bb 9d 01 b2 e8 79 26 d3 b2 | 9e 9a c3 98 03 95 6b f7 00 00 00 1c 00 00 40 05 | 19 68 23 54 27 85 e7 5a 70 ec 13 67 75 7a 20 68 | 80 f1 f5 99 | libevent_free: release ptr-libevent@0x7fb37403ae20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | #4 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9f e3 9d 02 77 44 b7 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #4 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #4 | rejected packet: | 9f e3 9d 02 77 44 b7 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #4: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #208 | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #208 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #208 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49632.887109; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005833 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #208 | libevent_malloc: new ptr-libevent@0x7fb37403ae20 size 128 "road-eastnet-nonat-208" #208: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #208) | 8f 5c 5f 4e 3a f5 16 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 92 7c 11 dd 8e a5 d7 54 92 a0 06 d5 10 ac 42 | 6b 15 ed 47 e9 69 c6 dc ee be 05 fb f7 98 ca cc | 76 c8 1e 19 2f 4d 8b 90 94 87 44 8e 66 b4 d8 02 | 68 05 60 b8 e3 7d 75 b7 4a 7c ab de a8 fd 41 6e | d6 76 9e 53 12 c0 6c 1d 7a 52 1e 69 01 3b 4b c1 | e7 6b 22 d6 c7 2e 90 0a 6b 5b 89 db 1a 6d af 36 | b5 41 be bc 9c 90 ed 64 78 a2 9b 4a 8f 0d 28 7e | 60 aa 46 05 6e d0 b2 52 c1 92 88 e6 04 b2 49 48 | c1 79 f2 f3 15 c9 58 54 7e a8 48 76 87 71 8d 7e | d5 41 8a 58 60 e1 22 51 b6 c8 da 62 23 cd 7f 72 | ed db 2b 44 40 79 52 36 a1 7b 1f f4 ce 24 ba 47 | 7a c2 df 3d 0b 70 e1 d1 d8 6a b0 33 7a 8b a6 83 | 44 26 40 e1 a6 53 73 33 8b d6 96 05 57 d5 68 55 | da 59 03 a3 8b 2e 16 30 b2 69 8f 5c 37 5b 88 82 | f8 0d 7c f2 a3 34 16 b2 3a a4 64 ba aa 6e 09 cf | de ff 28 7b 22 28 98 ba a1 44 cc d7 e1 ec e2 fc | 29 00 00 24 6d f9 31 58 db 7e 5c 23 da 78 97 04 | 9a 1c fc fa 9f 9f da b9 38 4a 1a f0 e7 71 5f 51 | b4 ee 4f 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 c6 9e d7 bc 34 04 8f 07 db d5 e1 | 11 54 7a 15 87 49 41 6f 00 00 00 1c 00 00 40 05 | da 8d 6c 65 d7 12 37 8a 51 87 98 29 74 33 3a f5 | 86 ee 4b 0a | libevent_free: release ptr-libevent@0x7fb35803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #208 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 5c 5f 4e 3a f5 16 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #208 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #208 | rejected packet: | 8f 5c 5f 4e 3a f5 16 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #208: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad8480 | handling event EVENT_RETRANSMIT for parent state #5 | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #5 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #5 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49632.954106; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.023735 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #5 | libevent_malloc: new ptr-libevent@0x7fb35803b0b0 size 128 "road-eastnet-nonat-5" #5: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #5) | 83 a8 82 4c 6a b9 9b 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 f2 6a ba 4d 4c f4 ca d6 76 c6 37 a4 fc c6 08 | 03 3e 5e e8 b3 56 67 2c ed e0 33 33 68 d8 a5 17 | c5 ad 89 58 8b 66 c2 c6 28 95 15 86 95 42 17 c5 | 43 6b d6 1b 90 e3 ce 5a 73 0f aa 25 80 ef 21 ed | 95 16 dc 62 db 9c 9c f1 05 8d 7b ad 88 fd 8e 82 | 62 66 a4 5c 00 db 53 d1 2c ac b4 13 62 a5 17 eb | 3f 3a 4e bc 42 77 a1 e8 e1 8a 0f 63 81 66 10 64 | 10 0d 86 9e 89 34 85 5c 5f 55 4a cb 5a 29 86 16 | 42 90 ac 93 0b a7 fb e8 a5 4a 23 43 d7 02 e6 fe | c6 7b a9 b3 68 72 59 2e 24 fd 0c 7f 98 b0 6f 9f | bb aa 48 ce f6 ec 36 99 c2 bc 70 c4 81 9e 1c 55 | 65 47 9c 55 e0 d5 f3 7e 77 c4 a5 f3 6e 82 b5 1c | 5c 56 a1 3a b8 57 69 f9 25 e2 ae ed 66 c5 c1 3d | f8 ca 2e 2b 1c 6e 27 f2 e3 ed 73 79 be b7 90 0f | cb 45 38 5f bb 3a e3 c2 44 15 72 9c 24 d0 bd 4e | fa c4 ea 53 31 95 57 c9 dc a4 ff 15 7a 28 e4 1a | 29 00 00 24 13 3d aa 25 dd 95 48 ab fd a8 d2 56 | 6c 28 74 71 5d 45 11 19 10 09 0a f3 46 e9 c4 b3 | 56 85 8c 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bb 69 2e cb ee d3 68 5b 1c f0 7d a0 | 26 ce 80 e4 bd 02 f5 15 00 00 00 1c 00 00 40 05 | 1b de 40 93 48 c5 33 61 5d a6 1a 99 ad 20 57 85 | b1 bf 8b 0c | libevent_free: release ptr-libevent@0x7fb36803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad8480 | #5 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 a8 82 4c 6a b9 9b 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #5 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #5 | rejected packet: | 83 a8 82 4c 6a b9 9b 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #5: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #209 | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #209 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #209 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49632.986451; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009702 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad8480 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #209 | libevent_malloc: new ptr-libevent@0x7fb36803b0b0 size 128 "road-eastnet-nonat-209" #209: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #209) | 94 c0 53 32 b7 6b d2 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa aa 8f b6 87 c3 5d 98 e8 47 9c 34 3c ba fd c2 | 26 06 ee 61 85 3c e9 e8 7d e0 7a e3 30 dc 26 ae | 92 30 41 01 44 74 f7 33 20 3e 9d c4 91 ce 67 c8 | 16 8f 2d 63 7e 65 88 2d 42 e0 e7 51 27 b9 54 c3 | cb 64 94 8c 44 0b bb aa 89 37 4f 4c 19 3a 97 c2 | a7 78 bb a9 b6 bc c5 9a 0d 18 1b 6f 6c 81 28 5f | 96 22 7f 4e e9 03 4f f8 d6 4d 77 d5 fe b9 d2 6d | cd 7d 32 95 3a ae 28 68 07 70 28 76 ea 67 8a a4 | 02 0f 70 b8 39 d5 ef 06 00 8a 9d f6 62 11 fb 55 | 5d 2a 4e 92 67 d8 83 81 5c e2 b4 e7 58 f2 f1 29 | e2 e9 12 6d a8 99 db 90 fa c3 c7 67 22 60 c4 0d | b5 aa 8e 50 88 98 a0 7e 46 1d 18 c2 ea bc 90 f9 | 2c 89 53 10 11 da ca 7e 79 27 58 0a 97 be f4 b6 | df 47 81 cd fc cb 51 b6 90 69 20 0a b1 64 c6 52 | f3 67 4f b9 89 27 0d 82 44 e6 02 ff 6a 0a a5 77 | bc 54 13 6b 28 ab 23 fb 03 b0 ab d8 e9 7c 16 89 | 29 00 00 24 32 f5 dd 6d be 9b 09 7c 2d 16 66 7c | 9d 31 58 f8 20 f4 30 10 2d 04 04 00 c5 24 46 19 | 07 98 5b 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 be 30 60 49 91 51 94 d8 39 4f be | 6e 81 91 5e 2f 8c 88 7e 00 00 00 1c 00 00 40 05 | 2d 19 47 e1 25 d9 8a e8 d3 7e a2 ad 7d 2a 38 10 | 8b 55 bc a7 | libevent_free: release ptr-libevent@0x7fb37802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #209 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 c0 53 32 b7 6b d2 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #209 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #209 | rejected packet: | 94 c0 53 32 b7 6b d2 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #209: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b650 | handling event EVENT_RETRANSMIT for parent state #6 | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #6 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #6 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49633.024795; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.013828 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #6 | libevent_malloc: new ptr-libevent@0x7fb37802a950 size 128 "road-eastnet-nonat-6" #6: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #6) | 2c 27 82 3a c6 31 e5 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f e3 1c 46 2f 61 c1 a4 57 04 b2 32 f2 da 47 30 | c5 f1 b2 8c 52 8c bd 20 1e 07 9a 1f 74 e3 50 fd | 03 ad cd d6 6e b2 e0 ed 18 de c6 cf db 53 d8 91 | 57 59 05 93 13 39 ca c4 cd bf 1d c1 99 f1 ea ab | d7 0d 4d 84 1a b9 23 c8 19 a7 00 fc 45 cd 28 de | 1b 23 11 46 b2 a5 20 88 7d a8 2e 93 69 c4 77 be | 7d 08 db 5c 91 33 d0 aa e2 d7 27 ba c6 03 59 3c | 8a b9 c7 4b aa b0 c2 31 f9 3d af 03 a0 d0 38 f5 | 81 cf 2e 3b 37 ea b5 50 38 0b b5 3b be c1 ac 52 | d4 bd 41 74 e3 b0 cc da 00 70 a4 c8 a9 ae 2b 0c | 84 70 b9 c2 c8 dd e4 ca c8 d6 7a 14 75 f2 9f ca | f3 8a 9e fb 56 2f 7b 5f 34 ab 29 a4 eb 5d 7a 01 | af 1d 55 9d 0e 4d 00 2f f9 2a c8 90 cf 50 fe a3 | 20 3f bc dc b3 d6 01 f7 dd dc c1 b1 72 f5 58 73 | b8 72 e4 a9 88 17 39 c5 a4 43 c8 df b5 2f 8d cd | 75 f3 2c cf e2 85 8e ce 7f c9 07 83 41 8f 33 7b | 29 00 00 24 aa 55 22 5c 95 3a 98 8a 23 4e 55 f5 | f2 5b 2d e6 0f d6 a3 fc b7 39 7f a3 84 04 6c 99 | b3 1f 01 c8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd d8 7d b0 3b ed a4 77 8e 72 bc 87 | 11 c3 4a b5 09 51 99 2e 00 00 00 1c 00 00 40 05 | 3b ee 43 00 bb c4 11 7e a6 6d 91 83 5e ff b0 fd | ab 20 73 91 | libevent_free: release ptr-libevent@0x7fb380032bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b650 | #6 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c 27 82 3a c6 31 e5 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #6 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #6 | rejected packet: | 2c 27 82 3a c6 31 e5 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #6: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11640 | handling event EVENT_RETRANSMIT for parent state #210 | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #210 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #210 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49633.061137; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009198 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b650 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #210 | libevent_malloc: new ptr-libevent@0x7fb380032bf0 size 128 "road-eastnet-nonat-210" #210: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #210) | aa f0 6c 1e 8f b0 d8 5f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 2f d8 9e b6 32 84 b3 62 ee 33 24 ed 0e fd d4 | fb 0e fa b0 5a fb 4d c1 44 66 ed 6c d9 22 6b 05 | 5a 31 76 75 51 2d 58 63 68 30 79 28 a1 8c f7 58 | 78 1f ed 9b 41 29 7f de 5e 35 7e 32 cc 4f eb 97 | f3 d2 34 17 b1 d4 d0 fd f0 52 da 3a 73 a4 1f 58 | 68 7e 43 79 1c f9 07 46 32 fb 81 59 a1 8b 36 99 | 63 59 69 2b 65 b6 49 f0 2c 89 5f 6f 77 04 35 7e | de cb d9 d5 71 0b 78 b5 5b 65 ab a6 ce 91 19 fa | 51 58 77 c1 4e 94 ff 17 29 dc 29 f8 bd 1c c5 36 | 82 f3 20 0b 04 da 30 59 b0 d1 05 3e 3f aa ef 6a | 84 97 f2 ea a5 27 2e 15 1e f4 66 a5 d9 21 ce 67 | e8 bd 44 de 20 df 28 17 c9 3c 33 10 eb 28 78 7e | 45 57 17 c5 4c aa eb a9 d1 47 13 10 17 f0 99 19 | db 6b d3 97 fa 92 c7 c8 43 99 f3 77 fc f5 56 ad | 75 cc 5d 24 35 8b 29 95 64 a0 e4 4c e0 27 1c 2a | fb fd b3 6d 87 9d 4a e7 f3 e4 fa 49 6c 90 9e db | 29 00 00 24 b7 0e 02 eb 9f 32 9f 45 44 47 90 9f | 97 de 23 e8 e1 c4 97 88 69 d1 3d 46 ce 63 23 0a | 5b 61 d3 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 f2 e2 75 79 7b 92 3c e8 e4 c1 f3 | d5 ae c0 9c c7 8c de 57 00 00 00 1c 00 00 40 05 | a7 24 70 f0 1a 13 21 fc 21 f0 f5 1e 72 fd 1a 35 | c3 6c 26 99 | libevent_free: release ptr-libevent@0x7fb380038370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11640 | #210 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | aa f0 6c 1e 8f b0 d8 5f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #210 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #210 | rejected packet: | aa f0 6c 1e 8f b0 d8 5f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #210: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46950 | handling event EVENT_RETRANSMIT for parent state #7 | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #7 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #7 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49633.12649; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009787 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11640 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #7 | libevent_malloc: new ptr-libevent@0x7fb380038370 size 128 "road-eastnet-nonat-7" #7: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #7) | df 0f 9a c7 72 fc c7 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 16 59 37 af 9b 5a d1 22 e5 b7 89 f5 29 0b b4 | f8 e5 4b 2e 70 7a c8 bc f1 ab 2a 61 eb 02 ca fa | a3 75 2e 7e 2d d5 25 c9 fa fb 53 11 81 f8 e7 7c | 35 1a 09 cf c2 a1 7a e6 ba 83 f5 ea 71 c2 29 ca | 29 da 7e bf 99 10 95 66 d2 23 d8 4f 49 2f bd 63 | 11 b8 e1 71 39 92 a3 a7 60 6b 7a e8 94 6f c6 09 | 3e 44 50 a7 14 dd 81 7d 4c 7f 80 8c 35 65 97 9c | b1 11 76 e7 2a ca 44 b5 84 ae 8b 5a 9b fd ff 0d | 19 d8 e9 75 5a 70 67 71 dc 0e 22 08 1b 97 e2 25 | ad 6c 4c 80 de ff 3e 29 34 2a 32 fa 3b 41 ab 38 | c8 2c a4 db 1f 4a 62 fb 24 ff ed 13 44 3e 4c cb | a1 99 52 bb 30 b7 29 d8 9d 52 b8 4d 90 9d ab aa | c0 57 68 4e 57 cb d7 d7 cc 96 2c bc 75 0c 87 f5 | 9c 71 0b 3a 29 74 b7 e2 7f 5e 8b 9f 17 4e 89 84 | da f8 88 1c 69 02 1c 1f 41 83 de df 0e 7e 58 56 | 61 84 83 da 8c c8 98 f6 a7 9f db ce b7 aa a6 bc | 29 00 00 24 9d 55 08 62 c0 73 1e 47 79 75 2c 10 | 4a ab 88 17 80 18 91 8e 0d 3b 8f 21 a0 4a c9 52 | dc 93 16 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e cd 5f ad 94 80 bb 48 49 e9 a2 c8 | 76 8b 7e e8 6f 59 19 d9 00 00 00 1c 00 00 40 05 | 2f 3e df 6a 16 4a bb 95 81 15 e0 c0 73 52 29 fa | 60 85 d2 fd | libevent_free: release ptr-libevent@0x7fb3580180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46950 | #7 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 0f 9a c7 72 fc c7 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #7 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #7 | rejected packet: | df 0f 9a c7 72 fc c7 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #7: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11680 | handling event EVENT_RETRANSMIT for parent state #211 | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #211 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #211 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49633.191107; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.015369 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46950 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #211 | libevent_malloc: new ptr-libevent@0x7fb3580180b0 size 128 "road-eastnet-nonat-211" #211: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #211) | 53 9a 08 81 c1 f5 e1 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef 09 3e 48 73 4c 9b c2 57 71 c3 fe a1 82 75 e5 | f2 fc 00 52 66 b2 69 a1 98 d7 a1 43 e2 9d 75 cc | 9d b4 06 fc 88 d6 44 63 90 41 43 c2 45 55 dc 1a | 12 ee 32 35 ef 1c ea 74 ac df 20 43 5d 1c 90 c2 | e0 80 56 a4 79 bd f8 c0 a8 96 3b 25 fa 43 51 16 | 7e ae 16 08 0c ee 53 be c7 29 52 25 44 6d fa 34 | 69 9f 31 ba 70 30 84 e6 d5 99 f5 2e ee 13 fd e4 | 65 1c ef 89 6e 83 29 44 bd 4f 23 ac ed 0f c3 ea | db 20 3d 79 09 22 a5 94 a4 f8 6d ce bf 13 df 61 | d3 3f 02 e7 af bb ce de f0 b1 2a fb 97 3e 5d 05 | 56 5c 13 18 20 58 3e 43 ac b1 9e 74 31 3c 13 bc | 7c 7a 3a eb be df d5 2e e9 60 5f 5a 7e af 73 b1 | 92 1c d6 e2 be f1 a5 75 8e 08 54 b0 2b e1 2c 5a | 6f 54 93 f5 5b 16 d8 ba 78 77 2e f6 39 16 6f 65 | 5e 98 fb 40 29 ab 34 cf 31 b1 1c 43 74 9c 6b 56 | 46 0a 1c e2 58 fe 1e 51 fc 87 18 4b d7 84 46 cc | 29 00 00 24 ac f5 37 f2 09 3e be 57 f0 76 41 01 | 45 fc a2 49 1d 14 8a 0e 25 fc 49 cd 6b 6f 69 01 | e7 4f 36 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 6c d6 1b 30 f3 11 7c 9a 75 f0 de | fa 6c c9 cc a4 62 9e ac 00 00 00 1c 00 00 40 05 | 73 92 bd e7 98 2e a4 8f a5 8d 6a 24 e0 26 ee e5 | ed 8e de 68 | libevent_free: release ptr-libevent@0x7fb3640406e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11680 | #211 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 9a 08 81 c1 f5 e1 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #211 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #211 | rejected packet: | 53 9a 08 81 c1 f5 e1 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #211: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0668 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad17c0 | handling event EVENT_RETRANSMIT for parent state #8 | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #8 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #8 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49633.229455; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.014004 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11680 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #8 | libevent_malloc: new ptr-libevent@0x7fb3640406e0 size 128 "road-eastnet-nonat-8" #8: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #8) | fc e4 b0 97 be 19 e9 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb d7 b3 51 4b 56 31 da 19 b8 5b 11 80 3b 41 1d | db f2 28 3e 72 37 5d 51 ba b2 d1 db 84 a6 bb ce | 1e df 68 85 ad 45 d9 42 b6 3f f1 bf ca c0 f5 c2 | 41 11 18 ed 51 a4 a9 fb cb 5c 4b aa 1e 3a 47 5b | 44 a6 6a b6 94 62 27 08 46 1d 7b c4 ed 7e 13 6a | ca 75 f3 53 1a b4 5c e1 d0 26 6f 40 15 2a cf 5a | f0 64 c4 e8 99 40 1c 70 04 b2 00 e7 d0 a3 f5 96 | 6f ea 9b 0f 3f 68 a1 38 bf d5 ee 9b d4 28 95 59 | 43 fb 48 c8 ce 17 ed f6 a6 07 54 e9 76 3f ee 31 | e6 e0 4a 4a d9 1d 0e e2 d0 7f ee 9c f3 8f a5 65 | 31 c9 6f 45 ef 29 7c e4 98 48 e7 74 36 9b 60 48 | d3 f3 57 f0 4c b4 e7 0c b5 86 17 23 2a 25 88 1a | fd 48 0b e6 cd dd cd 71 67 f2 f0 ef a5 6a 24 ce | 8d d1 03 48 9c cf 4e e9 3a a8 3d 43 bb 43 cc 87 | 8b c7 29 54 b9 be 7f 2d 59 4b b6 ed 8e 48 bd b3 | 3d c6 30 ad ce 82 73 65 33 71 0d 41 0a f1 8b 76 | 29 00 00 24 ca f3 cf 9b f4 48 aa 70 c1 ee a6 ea | 0d e2 1f 7c 7a 99 db 08 31 a2 ad 99 ee 01 2c 76 | 68 be 3a 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d b5 e6 39 e3 40 62 d7 8a aa fc 72 | 51 01 50 53 91 71 a4 51 00 00 00 1c 00 00 40 05 | 09 30 f5 72 c0 48 d1 9e 95 11 78 b6 cb 80 4b c0 | 24 25 44 07 | libevent_free: release ptr-libevent@0x7fb35402a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad17c0 | #8 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc e4 b0 97 be 19 e9 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #8 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #8 | rejected packet: | fc e4 b0 97 be 19 e9 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #8: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fbb00 | handling event EVENT_RETRANSMIT for parent state #212 | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #212 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #212 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49633.300834; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008289 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad17c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #212 | libevent_malloc: new ptr-libevent@0x7fb35402a950 size 128 "road-eastnet-nonat-212" #212: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #212) | 94 ac 86 b7 f8 83 d4 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 79 5c 0c 28 90 8c ef 02 3c d8 f8 1a 0b d6 b1 | 04 69 40 2f 72 b0 4d 73 12 19 ce 98 f8 6f 0b 9f | b9 13 67 6a 06 b8 41 b4 12 d3 3b 5e 00 45 d7 98 | a9 e1 2d 0a c7 48 98 e8 4f 26 89 26 1d eb 0f 63 | d1 cd 01 b0 ac c0 e6 9c c4 d5 af f4 d2 0a f8 fc | 50 8b 97 23 e0 8c a0 c2 04 25 1e a8 35 a0 f0 95 | 6e 38 07 0c ab 5c e3 d8 94 8f 44 fe f3 fe 9f 14 | 8e b7 78 55 0b 6e 31 2e c3 a7 48 da be 5b b7 47 | 21 9c c6 d3 74 d7 58 d3 13 78 3e ed 28 44 9b 87 | a8 e3 a1 e6 89 b5 03 ef 3b fe d5 17 e8 f9 73 04 | 1c 9e 5a c3 69 56 f2 c1 24 33 17 fd 7d 0d ed e7 | 7d 2c 20 7c 0b 8e 94 c1 2e c1 1b fa 0b 32 e2 6f | 8a b2 5d b4 79 8d 9a 89 ea a8 6f 97 71 92 fa f9 | bc 34 75 15 ab ea 61 f5 3d 74 25 af 37 7b 97 2f | 19 3e 0a b6 c1 50 67 1c b8 51 37 9b 9a b3 26 67 | c4 f2 b4 e7 06 7e 5d 5b 28 22 1e 8e 7e da b7 8b | 29 00 00 24 5c 64 5d 43 88 c1 08 90 f5 2a 0e 23 | 99 a9 ce 32 1e 4e 34 e5 9c b5 04 95 ad 56 32 fb | 31 cf fd 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 0d b1 e5 c0 7d 3f 73 e9 5f 1b 2c | de e5 07 26 54 11 d9 1b 00 00 00 1c 00 00 40 05 | 08 da df 20 35 aa 7d dd ef ff 4a 4d 21 f5 f2 fb | f9 b4 9f 22 | libevent_free: release ptr-libevent@0x7fb37000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fbb00 | #212 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 ac 86 b7 f8 83 d4 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #212 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #212 | rejected packet: | 94 ac 86 b7 f8 83 d4 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #212: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0459 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1da10 | handling event EVENT_RETRANSMIT for parent state #9 | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #9 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #9 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49633.333153; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.015851 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fbb00 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #9 | libevent_malloc: new ptr-libevent@0x7fb37000cf80 size 128 "road-eastnet-nonat-9" #9: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #9) | 42 d4 37 7c 6c a2 32 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b e7 ee 8b 3f 67 fc 59 f9 cf cd 11 31 95 6f 6f | 1a 68 46 c3 76 29 7e 71 e4 25 40 18 dc 88 c2 53 | ee 88 a1 08 66 15 f3 28 c2 cb 4a e2 b5 75 33 59 | 55 79 a1 88 5f 78 4f 18 38 8e ae 5c 13 15 13 df | ba 4a 47 c9 50 41 88 b6 f1 7a 74 8c 60 ff 93 b2 | 20 68 e4 46 db 20 8c 30 74 ea 04 10 5a 30 ea 94 | 23 ad e3 f6 b8 fd ef 4b 90 8b 27 14 bc c0 83 ef | 74 2c ab 49 65 76 af 73 fb 43 7c f1 ae d1 dd 3f | cd c7 7b 68 fb f4 41 39 5c 57 ef 8f 92 ea 9a 47 | 45 2a 1a ac 29 88 a1 89 ea a8 1a 7b a4 32 e3 9e | 8d f2 ad cb d1 f4 4e b8 a3 dd 79 49 05 1f 03 30 | 8a 93 8b ac 8f aa 22 b8 9b 89 24 78 34 56 75 f6 | e9 af c1 e4 36 df ba ca 6c 64 ef d5 97 79 d5 33 | 78 61 be 8d 16 b6 42 4a 4c 79 ee 04 84 ce 68 09 | e7 e6 62 4d 5a 49 5e d0 0c 5b 80 69 ff fd 56 0f | 18 1b 5a c8 54 c8 76 c4 ef 5e 74 08 bd 6d 13 c8 | 29 00 00 24 56 5b 42 39 e6 4b 00 04 2e 83 3d 83 | 1e c8 b4 ab 97 9b 33 06 82 c0 a9 36 06 ea b4 2d | 23 5d c5 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 a8 01 3e 09 4e 61 7c 63 45 b6 fc | 6b 13 a6 83 ef 8b fa 92 00 00 00 1c 00 00 40 05 | 4f 50 e4 89 50 50 84 2d e7 09 2b 9f ac 1d 9b 91 | c6 7c af 4c | libevent_free: release ptr-libevent@0x7fb37c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1da10 | #9 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 d4 37 7c 6c a2 32 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #9 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #9 | rejected packet: | 42 d4 37 7c 6c a2 32 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #9: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac2900 | handling event EVENT_RETRANSMIT for parent state #213 | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #213 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #213 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49633.397416; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.017212 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1da10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #213 | libevent_malloc: new ptr-libevent@0x7fb37c00cf80 size 128 "road-eastnet-nonat-213" #213: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #213) | 4a f6 d6 f4 f7 c1 a9 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 87 92 0f fd 56 61 cf 88 27 07 68 fb 27 94 14 | ab 6f 99 e6 75 dc 26 2f 1e 93 7a c8 7f ed e5 7d | 6b b9 9d 92 4b e7 28 92 86 1e 95 f5 3a f0 df 50 | 69 19 a3 90 28 b6 f5 2d 21 d9 e8 a3 e1 5b a3 90 | 3f a9 b0 a1 2a 68 b5 63 77 3b aa 0b 6a 92 36 d6 | 32 61 b7 e6 8e cd 51 f2 78 e2 77 58 13 92 00 bb | 90 bd cb b3 98 f4 c1 b4 f9 bd 9c 07 84 cd 8b 44 | 56 64 bd 56 88 30 16 b1 de 15 4b 10 e0 33 82 0c | 53 be e7 f5 bb 24 10 e7 6d a3 b2 a5 08 f8 45 52 | 21 5c 7f a2 a6 ba 7c c6 84 2d 67 10 b4 86 8f 9c | f0 28 12 88 fb c8 52 6a e2 26 a6 a9 6d 8d 51 de | 96 9d d4 31 fb 52 b9 5a 75 dd 19 ef dd 61 8f 1b | 4b 84 99 e3 45 d4 ee 63 d4 75 8b e1 c7 c9 46 a5 | 75 72 66 74 64 ad ff 53 8e cd 6a 8d e1 aa 8b e0 | 68 cf 60 1e 6d 53 aa b5 21 a7 9f 74 3a 51 a3 ac | e3 62 94 51 c3 8c 9b b8 34 1f 9f 73 40 9a 49 cb | 29 00 00 24 b5 56 f5 24 67 7b ee bc b9 fe c7 48 | 4d 15 0a a4 8c 8b d0 3d 4d d5 8d 67 be 58 a4 6d | 51 fe 0b 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 44 29 1f 54 8d f8 98 7c 02 ef 5a | ae 02 c1 10 4c 75 c9 6b 00 00 00 1c 00 00 40 05 | bc 12 92 95 d4 1b f9 ad 5d 6a 71 41 82 c9 bd c2 | 29 69 a1 81 | libevent_free: release ptr-libevent@0x7fb380027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac2900 | #213 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a f6 d6 f4 f7 c1 a9 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #213 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #213 | rejected packet: | 4a f6 d6 f4 f7 c1 a9 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #213: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8ee00 | handling event EVENT_RETRANSMIT for parent state #10 | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #10 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #10 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49633.435728; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.018905 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac2900 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #10 | libevent_malloc: new ptr-libevent@0x7fb380027c10 size 128 "road-eastnet-nonat-10" #10: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #10) | 6b e4 01 c3 ed 3e ed 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2b 6a 85 96 38 f3 d3 4e 55 03 ae f3 d4 0f ad 38 | 83 2b 8b 92 04 a5 95 20 97 dc f8 34 30 38 91 0d | b9 c4 11 ab e9 a9 94 d4 16 5b f1 c4 91 68 3e fa | fb b4 36 73 13 7d c7 d0 75 c4 f9 ef fd 92 5b cc | aa e4 77 57 96 44 12 f0 38 b5 1d ad 33 4d 65 c3 | 93 63 ce 14 d7 d8 25 ef f8 0d ae dd 78 dc 8e b7 | 7e c2 3d a5 d5 d3 09 2b ad 9d bd a9 6f 55 df a1 | 6f b4 2e cf 9f fe 7e ae 25 58 a2 81 78 bb f7 29 | dd 53 e8 91 13 65 1e 1e 60 9c d0 15 9f bb 76 ed | ab 75 ce 2a 44 05 fa b1 a3 a7 39 d0 53 b7 7f 4f | e0 b7 8f a6 98 8c 07 ab a8 32 37 42 0c 8c 3d a7 | fc 6c 53 ac 60 2a 04 67 31 66 47 13 4f bc 34 8c | 30 51 26 7c 6a 36 76 70 15 29 7e 23 fc ac 0e 32 | 57 5c bb d9 b8 c0 27 61 5e fd 8f bc 73 83 16 ba | bf 42 32 51 56 3e 21 8b 6d 4a af 80 6d 52 1f d5 | 84 cd 2e ff dc c3 b8 a0 b2 26 7e 0c b7 e0 d0 d6 | 29 00 00 24 23 a8 6c e8 37 a1 47 09 f8 10 83 5c | 3f e5 80 de e6 d0 ee 9e 1f f2 6d 6a 1a c1 8c be | 9a 4a a5 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 14 ac ca 29 d0 75 c4 40 2c aa 37 | f4 15 d0 3b ed 2d a9 e1 00 00 00 1c 00 00 40 05 | 85 e0 a4 b5 9f 75 13 0f 6d a9 52 94 7d fa 0b 2d | 65 f2 06 03 | libevent_free: release ptr-libevent@0x7fb368035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee00 | #10 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b e4 01 c3 ed 3e ed 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #10 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #10 | rejected packet: | 6b e4 01 c3 ed 3e ed 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #10: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5af90 | handling event EVENT_RETRANSMIT for parent state #214 | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #214 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #214 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49633.475993; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006499 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee00 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #214 | libevent_malloc: new ptr-libevent@0x7fb368035930 size 128 "road-eastnet-nonat-214" #214: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #214) | 4f 29 16 ab 3e 1b 1d 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 9a ad a4 54 39 e9 04 15 a2 a4 f0 c8 dc 49 94 | 47 5a 04 64 04 57 79 8f 63 87 e7 ae b7 39 62 ec | 47 13 85 3d 4e a0 14 32 15 25 a6 7d a4 f2 aa aa | 67 17 a5 b2 08 db fc bd dc 96 aa 21 e7 a5 f2 3b | 34 82 35 14 fb 4a be 16 a9 a7 92 42 29 b2 17 4d | 52 27 87 ea b1 3a fa 6c 11 62 48 2f 81 f0 58 f6 | 6c 8b 54 c6 3c a7 1a eb fd 0e 51 2e 43 a1 67 7f | 52 b6 51 7f f1 6a 5e 3d a1 55 84 4d aa 64 fa dd | d4 68 19 0a 1c f1 aa ed d1 aa 12 27 11 44 c1 42 | 4c 3e ce c4 42 e7 8a 9f 52 d8 86 65 33 7c 9a 6a | ee 61 16 79 e0 6f bf 94 55 b9 32 ad 6e 68 90 17 | bb 0e f5 75 b4 7f bb 34 59 92 4e 2a eb db ac 26 | 62 0d 79 8b 29 38 a9 d3 9a dc 81 9e 5b 01 b1 77 | b2 97 be 93 40 8c 22 a8 ed c3 3b 34 e3 61 26 ff | 40 f0 34 c1 02 20 28 94 a9 ac e5 14 88 22 c0 0f | 0a ad af f1 ac 83 5f 84 02 43 33 bf d4 08 dc 06 | 29 00 00 24 dc 16 0d 02 e8 ab 94 84 4c 26 85 d4 | 77 69 31 1b 43 d5 c1 b1 2c a0 69 25 59 ad 36 b7 | 5c 40 16 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 ae d6 cb 98 74 13 91 af 99 ac 97 | 02 1b 9a 5a 71 bb 20 28 00 00 00 1c 00 00 40 05 | 20 56 0b 1b ec fa 37 e0 47 28 94 e0 2b 28 be ff | 21 7d 56 5a | libevent_free: release ptr-libevent@0x7fb35801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5af90 | #214 spent 0.175 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 29 16 ab 3e 1b 1d 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #214 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #214 | rejected packet: | 4f 29 16 ab 3e 1b 1d 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #214: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0592 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #215 | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #215 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #215 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49633.557396; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004209 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5af90 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #215 | libevent_malloc: new ptr-libevent@0x7fb35801d920 size 128 "road-eastnet-nonat-215" #215: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #215) | c5 c0 dd cc b6 af 51 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 5c 66 6c 45 6f a8 d2 4f 25 98 20 11 a6 a1 bb | 37 55 34 73 15 5d a4 49 35 cd f6 0a 9e e7 f3 5c | ad 42 56 ef b0 f4 fa f6 d5 ba 84 d6 dc e0 5f 55 | dc 55 56 f2 be 03 fe 4f 4a b4 66 3c 99 cb 71 e7 | b6 73 b2 44 ce 0d f7 96 90 78 2f 50 92 28 ba f9 | 22 e7 15 cf fa c8 47 f5 0c 38 c1 8a 24 5b 39 a8 | ac 47 31 ea aa c2 b1 57 78 79 5e 0b a7 a0 33 1b | 86 d9 45 31 c0 29 bb 67 d1 68 a7 f5 10 84 25 ff | 4c 83 f7 42 1d c4 e6 b7 53 b1 ed 6d 1b f7 86 9b | 3e cc 2d ee 22 b8 61 e0 e7 95 7c e8 c8 d8 b2 10 | 06 d9 50 52 8e 07 0b 4b 94 83 c7 4b 90 09 3a d9 | 8a 35 2d 83 36 bb 75 45 45 1c cf c0 11 7f 85 8d | ec e0 a4 ca 58 99 97 8b 10 af 58 2d b7 9b a7 f0 | a5 cb ea 38 04 fe 36 b9 b4 81 1d 8f 85 c7 76 a8 | d9 30 86 6d bd 32 3b 6b 02 28 ec 10 b1 28 43 17 | 56 d4 9e 0c 76 ce cc 71 e8 70 44 59 5e b3 3a a2 | 29 00 00 24 21 81 d6 ee 95 75 07 f2 b0 ff 0f d3 | a2 c0 2b d7 de b5 1b 67 08 ca 6e a7 a2 d0 6b ed | 6d c9 d5 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c 19 de 62 93 d0 a4 3d 26 c7 25 16 | 8c 72 93 29 4a 06 74 1d 00 00 00 1c 00 00 40 05 | 5e 68 d5 fe 16 1c 49 30 75 2d c6 7b 65 a2 b6 24 | 10 76 bd 1f | libevent_free: release ptr-libevent@0x7fb34002a900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | #215 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 c0 dd cc b6 af 51 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #215 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #215 | rejected packet: | c5 c0 dd cc b6 af 51 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #215: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #11 | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #11 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #11 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49633.560744; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.020205 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #11 | libevent_malloc: new ptr-libevent@0x7fb34002a900 size 128 "road-eastnet-nonat-11" #11: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #11) | c8 da f8 5c 6a b5 39 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 9a 4c 70 8e 88 d1 64 8d ca 55 b5 43 ac 3e 50 | 7f 03 c2 7c 99 61 59 48 6a 23 b9 2d d3 3a 08 ba | 31 66 90 b0 52 32 93 73 23 bd 35 f2 7d dc a9 8f | 88 4e 43 5d 55 55 8f 7b a2 ea ce 35 e9 07 bb 71 | 1f 5d f0 9c c9 20 a4 7c c9 a5 33 c5 b0 c5 fd 99 | f9 36 f9 d6 da 33 fa e1 2d e1 b8 55 01 35 5b d0 | b9 e1 af af a6 38 ef b1 36 65 8c 44 00 8a 8f f0 | cb 31 ec d5 89 23 22 d8 6f 57 3d 9d af 74 08 ea | 86 b5 7c 8c 76 9b 8d 04 5b 27 f9 7a 8d ed d8 36 | 77 1c 37 9a 9e c6 40 9c bb 1e 24 77 dc 4c b2 dc | 76 0c 2f 2d 23 9c f1 63 a5 64 8f c0 7e 6e 08 97 | 35 1b 8e 35 d5 a9 e6 fc d1 af 35 f0 b0 21 d4 42 | 5d 1b 4e c6 75 04 f0 3a f4 cc 11 09 3f ff 2d c6 | bf fa 44 99 e7 46 de 13 f5 47 98 02 47 dd 33 15 | 52 36 1a 46 d4 d8 ce dd 1a ad eb 4f 6b 1d 9e 82 | 8f b0 52 7f b0 b6 aa 8b 85 c1 d8 ed 73 6b 09 85 | 29 00 00 24 71 b3 70 95 41 f1 8a 3d 3f e8 5d 7c | 6b 52 d9 59 47 90 bd 2c 17 95 9e 28 b0 5d 83 17 | df a2 84 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 c8 ac c9 12 67 90 a0 d8 a9 94 84 | cc d4 e1 68 d0 49 e5 0f 00 00 00 1c 00 00 40 05 | a0 0d 8b f9 78 72 8b b9 69 a6 ab 0f 8f 46 28 db | d3 de 3a b5 | libevent_free: release ptr-libevent@0x7fb3540407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | #11 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 da f8 5c 6a b5 39 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #11 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #11 | rejected packet: | c8 da f8 5c 6a b5 39 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #11: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c780 | handling event EVENT_RETRANSMIT for parent state #216 | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #216 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #216 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49633.652109; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.010231 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #216 | libevent_malloc: new ptr-libevent@0x7fb3540407f0 size 128 "road-eastnet-nonat-216" #216: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #216) | e7 ef a7 cc e6 d3 f6 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 f0 d1 10 02 25 ff 09 54 9a 27 0a d6 e1 75 e9 | 4b 25 09 80 13 1a bd 53 71 22 e7 a5 75 81 d1 8a | 25 47 40 c6 b3 5d 03 6d 9e 83 d1 92 a9 46 5d 4b | 0d 28 c0 ae 0f 26 63 48 22 7d dc 47 5b d5 77 07 | 29 79 06 04 6b 6b 34 8f 3e bd d3 ec 63 f9 78 20 | 47 7a 08 c2 44 b5 60 c5 73 9a 3e 6a 29 e5 d6 96 | 62 d8 90 b5 3b c6 8d 28 1b e2 87 89 6b 14 69 c3 | 86 f7 90 a6 77 5f 07 46 5b 86 a4 37 e5 80 d5 e7 | e9 b6 1c 3b fa 48 83 e6 86 71 bb 22 3d c4 ff 70 | 08 57 53 75 69 80 73 34 3e 38 54 52 61 ad 52 b2 | 0c fc ac 12 69 16 4e 5c 14 e0 22 a5 7c 1b 1c 49 | 5d 41 d4 29 4c a2 8d 47 62 eb 64 7a 68 a3 77 fb | 8e a3 71 52 dc 60 0e ae 77 65 2b 4f c0 c2 80 7f | 93 d4 83 22 60 eb f0 ba 08 6e ef a3 c7 ae 6d c8 | ec 04 d3 0d a9 20 db 31 6f de c9 65 e4 0b a9 11 | a7 ab 82 ef 2d c1 74 f2 d3 be 19 9c 04 b0 c9 04 | 29 00 00 24 95 80 09 e7 7a 52 78 28 1a 48 0b 4c | 98 2f 28 0b b9 93 53 be d8 60 a3 a7 18 da 10 17 | 4f 70 e3 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 7b e5 1c 98 48 0c 58 81 2b 7b fc | 78 24 fa 6c 15 2c ab c0 00 00 00 1c 00 00 40 05 | 11 88 73 d8 fc 53 52 81 2d 03 8d 95 6f 83 2f ef | fe a8 7c ee | libevent_free: release ptr-libevent@0x7fb3480300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c780 | #216 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 ef a7 cc e6 d3 f6 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #216 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #216 | rejected packet: | e7 ef a7 cc e6 d3 f6 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #216: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cc10 | handling event EVENT_RETRANSMIT for parent state #12 | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #12 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #12 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49633.675098; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.021895 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c780 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #12 | libevent_malloc: new ptr-libevent@0x7fb3480300e0 size 128 "road-eastnet-nonat-12" #12: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #12) | e6 90 0f 5b 12 9e fb 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 8d ca d0 bf fc d0 53 2f c8 94 c7 75 f0 b7 3b | 06 8d af 15 08 3d 4d 43 8a f2 0e 43 03 74 47 ab | c5 f6 5e c6 9d af 64 6c 5f 50 aa bb 63 91 17 7c | de 19 d6 a8 3d b9 0e 6f 98 77 91 78 cd c6 0f f1 | 83 bd 49 b7 4d 19 90 e6 2f f7 8d c2 99 5e 0c 41 | a4 92 59 8c f3 bc 56 51 55 c4 fc 8d 06 b4 b2 46 | fe 62 b5 0f 4e f1 c7 d9 31 4c e1 f7 06 2d 45 f5 | a0 d5 f5 94 55 0e 2f 00 35 d8 fb d6 3c 6a b6 b5 | 4d 93 6e 6b 9b 52 5b 1c 59 3e d0 a9 2b 70 a2 ec | b5 2f 18 f2 51 cd 4a e5 eb b3 21 70 eb 17 7e fb | 54 5e a1 de 02 46 1e 7f ed c7 44 7e dc 6d 9e 84 | 08 46 48 8f 2c 45 f3 c2 00 ca b5 46 fd 56 d4 bf | b0 41 68 33 e0 2a 67 86 f6 4d 18 8b 90 8d 3e 6b | c2 91 48 4f de cb 41 cd 2e 17 3b f1 b9 af ca 73 | 4b 2f d1 11 2b 7a 96 60 de b9 66 93 28 70 95 94 | 75 11 24 ea 0b a4 9a 4f 1b d9 88 31 b6 8a fe 22 | 29 00 00 24 52 e1 94 79 21 2a ea cc 69 4a af 5a | 5d ef 62 83 14 35 3b dc 33 a8 4c d8 5d ab 20 41 | 8b a5 be 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 aa 63 73 f1 76 ab f8 1b 79 46 f7 | 09 75 6d 3c 97 fc 7d df 00 00 00 1c 00 00 40 05 | db 6d 58 42 c9 d1 b0 49 17 a0 1e 30 4f f9 7e 58 | 72 29 56 37 | libevent_free: release ptr-libevent@0x7fb3780180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cc10 | #12 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 90 0f 5b 12 9e fb 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #12 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #12 | rejected packet: | e6 90 0f 5b 12 9e fb 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #12: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24700 | handling event EVENT_RETRANSMIT for parent state #217 | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #217 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #217 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49633.776483; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.023442 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cc10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #217 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 "road-eastnet-nonat-217" #217: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #217) | d2 36 bf 64 89 a3 fd 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 f4 5b dc ca 6a f6 be c1 c2 c8 63 19 fb 3a 1f | 70 dc de 5b 54 b8 eb 8d 2b 5e fc c2 60 b3 0c b8 | 9b c4 53 f6 87 96 b1 7e c0 8d e1 b0 c0 a3 08 59 | f8 18 05 78 a7 5e f9 f4 d8 1f 45 f9 8a db 9c 99 | 0e 07 3e 2a ba bb 8c 14 d2 d8 55 43 f4 c4 74 29 | 81 f6 ff c1 34 b9 34 a3 97 b9 37 cc 81 87 17 91 | 44 f4 e5 3a 28 aa cc 0c 3a 69 40 14 f6 3b 92 b7 | db 83 50 42 f0 36 82 ac f1 19 7e 5c 4e 90 c6 ec | cf fd 70 a2 a6 79 e2 bb b0 2b b1 df 8d e0 62 86 | 52 eb e4 a9 60 bc ec b9 d7 99 33 ce 9f d2 75 d6 | ea 82 29 7d d5 df f1 81 05 f9 8d d7 ff 39 0b 3b | 2c fe 6f 59 ae d2 c3 c5 12 3f 62 54 ed fc 61 4f | c2 74 90 8a b6 79 a0 b5 31 fc 8c d5 cb 45 21 48 | b0 1d 10 ec cf 2a b3 30 35 95 3b 32 3a 79 8c 33 | ab 0a b9 7d 4f 43 6c 9b d9 20 e5 7e 28 a9 95 05 | ed 38 6d f0 1a 10 8c 41 cd 59 c0 e4 ec 28 25 e4 | 29 00 00 24 50 f4 8b cc 88 78 9a 77 ca 06 50 f2 | 60 9a 06 39 64 9a 92 2a 1d 6a 83 ae 2a 35 88 82 | 1c 3d 43 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf a3 05 4d ff 0f f5 da 0b f8 e7 54 | e5 88 17 6e 1b 78 5e cb 00 00 00 1c 00 00 40 05 | 9b 1b 06 2c 11 9c 55 41 9d b0 16 46 62 0b cd 66 | 9f 92 84 50 | libevent_free: release ptr-libevent@0x7fb350046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24700 | #217 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 36 bf 64 89 a3 fd 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #217 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #217 | rejected packet: | d2 36 bf 64 89 a3 fd 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #217: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #13 | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #13 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #13 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49633.779846; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.017168 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #13 | libevent_malloc: new ptr-libevent@0x7fb350046040 size 128 "road-eastnet-nonat-13" #13: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #13) | 49 f7 1e 6a 42 26 33 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 71 af 86 f4 71 f9 bb e4 0d 2b 45 d7 29 39 05 | b7 87 ba 66 cb fb 2a f9 a1 bd 3d 61 b3 93 ac e4 | c3 99 b0 f5 02 62 ee dd 97 cd f6 04 fc 6c e4 91 | fc 5c 11 ba 5a 79 b1 78 a2 d0 e7 22 4a 47 b5 e0 | 1b 08 7f a6 c3 8e ce 71 40 0d 06 f3 62 f6 df f1 | 5d 7c 5b e2 d5 cd 0f 4d e6 c6 f8 d8 22 4f 95 11 | 69 b0 4c 7b c2 82 8e f9 ea f5 33 82 00 b3 c7 cc | c1 9e 50 02 8e 45 ef af 1a f9 8b 37 72 41 32 b8 | 47 f2 be df 3f 94 e4 a3 17 d5 55 32 fb 1f 2d d2 | 75 88 9c 98 42 60 51 41 31 79 19 3b ff ef b8 2a | 8e 39 2b ea 32 11 93 14 1c d3 9c 70 36 49 9b d1 | ea 38 9f 9a 6a 33 49 23 7d e2 c2 d5 b0 8d 83 b6 | ef a7 10 c8 a2 18 a7 4e 8b 07 bd 67 b5 96 c1 6a | d6 9d 73 c7 60 9d 60 25 5d 63 21 25 68 0e 24 b3 | 8f 19 40 42 2e 27 e9 30 d9 f9 1b 80 8f 2d ab dd | 1e f0 98 f5 b2 55 9b 6b 06 84 0f fe 26 32 f1 f7 | 29 00 00 24 dd b6 a9 bb fd 56 26 b2 23 d7 97 2f | 99 f7 92 2e ca d6 19 06 93 b1 8e 77 8d b7 a4 a3 | 73 9b 88 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 83 1c 22 e0 45 23 6f 5f d0 4f 89 | cf 59 8e 77 1e 0a 0b d7 00 00 00 1c 00 00 40 05 | e8 12 13 20 8d f1 d3 89 00 ae 66 0d fd eb 92 63 | f1 cf 85 56 | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #13 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 f7 1e 6a 42 26 33 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #13 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #13 | rejected packet: | 49 f7 1e 6a 42 26 33 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #13: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0705 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3a590 | handling event EVENT_RETRANSMIT for parent state #14 | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #14 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #14 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49633.864246; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.011358 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #14 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 "road-eastnet-nonat-14" #14: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #14) | c3 13 eb 28 05 44 3c c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 9d 4b 57 65 9b 44 ef 02 5a 55 12 34 bd 3e fa | 1d 1d 02 b8 47 b4 07 d2 1c 40 a7 d2 b5 27 54 0d | 81 c5 8d d2 b0 f1 46 e6 2b f6 3a de 28 5d 98 ae | 72 2f 81 53 d7 e7 b2 d9 8d 92 9d 09 f6 b7 ce cc | 3e 71 cd 6b bc 9b 98 ad b9 25 11 78 67 a8 99 c6 | d0 09 70 45 b3 4c 5d bb c4 08 3e 65 01 7c 91 1b | 71 62 4d 8f 21 92 6e 0d cc 31 2a e5 1d 4d 2c 13 | a8 c8 3c 02 8d 36 79 d7 6c 16 bc 07 ba a2 3a 87 | 13 5a 36 f7 58 04 34 60 a3 2f 3a 9f 7c 23 64 3e | 35 e2 e2 a2 79 4c 9f fc 94 b5 56 35 03 c7 fc 3a | cf 61 0a a2 ca 12 f9 93 6a 8b f6 7c 71 75 e0 48 | 38 16 70 bd 8e 4a bd d6 cf f6 8e 6b de fc 4a f7 | 37 83 73 dd be 05 96 b0 07 8a ee 94 33 ed 86 17 | 8e 84 02 b1 3c 02 91 6e df 44 9a 23 83 12 9c 66 | e4 27 4d ff 2c b0 4c 89 bc bc 90 88 ea ad 2f 69 | 0e ca 37 3b 42 e0 ad 13 24 ad bb e5 a5 03 12 10 | 29 00 00 24 cb 20 8c 9f 6a 8c dd ed 7f 5a c1 49 | 4c ab 23 eb 51 b5 51 02 d0 17 95 d7 22 4b 61 df | 15 62 c3 64 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e 81 d0 17 a6 30 05 4d 92 15 c2 f3 | f4 8b 67 24 b4 9e ba 2d 00 00 00 1c 00 00 40 05 | 8a 85 97 fb 20 dc 58 d7 a0 fe fa ad 9b 31 ea 8a | c5 2b 9c 59 | libevent_free: release ptr-libevent@0x7fb354009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3a590 | #14 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c3 13 eb 28 05 44 3c c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #14 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #14 | rejected packet: | c3 13 eb 28 05 44 3c c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #14: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0681 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc40 | handling event EVENT_RETRANSMIT for parent state #218 | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #218 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #218 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49633.926624; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006513 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #218 | libevent_malloc: new ptr-libevent@0x7fb354009640 size 128 "road-eastnet-nonat-218" #218: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #218) | fc 84 28 e6 d0 d4 a3 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 d7 19 e0 b8 a7 81 99 33 01 41 39 ef 55 14 82 | 36 e8 1e 6f 78 81 cb 8b ba 30 50 9b f0 49 c2 8d | 4d b2 2b 95 f1 d8 28 60 35 5d 42 53 4d 43 c7 8c | 4f 74 15 45 95 27 14 77 eb 50 5d 4a f6 fd be ee | 3c 1a 88 ee 70 83 66 98 31 0a fd ad 4a 03 b5 37 | 5d 2e 93 bd 7a be 39 56 60 d9 aa 84 79 74 3d 0e | dc e3 b7 0b 24 c5 94 3d 31 8b f6 0e 82 f6 06 b8 | 26 12 7e 3f 3e d6 7d b6 51 ee ad b2 d2 ab 27 77 | 53 f8 1e d7 91 5f 2a 81 5e 4e 7d 22 21 5e 55 9c | c3 53 13 8f 2a fb e3 93 47 36 6a 2c 3e 5b e2 b0 | 72 17 1d b0 34 33 da 2e 57 d4 77 d4 d7 37 4b 04 | e0 fd 56 ba 03 09 e0 ee 03 55 18 7a 06 0c cf 4c | 2a 51 58 97 6d b9 c7 55 61 75 dd e7 d8 0d 3a 1d | 49 6c f2 e4 06 70 89 d9 24 cc ed 33 51 12 2c eb | 69 6c 48 51 d3 c5 03 79 af 69 1b 7c 09 b9 68 90 | b7 fa 26 e6 18 f8 80 d5 96 f3 c9 3f f4 18 bb d2 | 29 00 00 24 11 b2 a5 5c a6 46 80 f9 3d 23 f2 ab | ce 5d 83 0a f1 1a 01 82 7c 29 4c e1 e5 d0 ae 3c | 95 98 eb 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4f 29 50 5e 23 8d 7d 6b 34 9f ff eb | 11 dc 43 b6 12 c1 95 47 00 00 00 1c 00 00 40 05 | a7 99 e5 52 4c 36 7b 61 4e b2 63 45 25 bf 82 23 | 34 fa af bb | libevent_free: release ptr-libevent@0x7fb3540251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc40 | #218 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 84 28 e6 d0 d4 a3 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #218 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #218 | rejected packet: | fc 84 28 e6 d0 d4 a3 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #218: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a12c70 | handling event EVENT_RETRANSMIT for parent state #15 | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #15 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #15 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49633.958979; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009786 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc40 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #15 | libevent_malloc: new ptr-libevent@0x7fb3540251c0 size 128 "road-eastnet-nonat-15" #15: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #15) | 26 a2 6e 3b 12 a8 59 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 6b 03 2b 64 b1 a2 70 7f 8d ca f2 6f 54 de 1b | 11 e2 1d 10 c1 2b 3c 5f 6d e7 ca 6d ea a7 28 53 | d6 4f 75 27 52 bc 43 63 3a ab 63 49 ff c4 e6 b2 | 78 96 18 25 61 28 7f 9b 98 22 5e da 00 8c e8 eb | 6c 4d 9e 76 25 8b 7a 47 ab 33 22 55 42 23 3f c1 | 32 ba e7 e4 c9 4a 5f 0d 8b 0d 29 12 b2 18 5b ef | 5f af 09 c8 a4 7c fe 53 bc 8e 96 c3 8e be 32 ff | 43 00 6d 58 cd 42 72 b2 1b fc 90 55 08 bf 9d 89 | 5e b3 d9 d7 ab 1d c3 3d 09 0d c3 a0 b4 39 9a 0c | ea 26 37 38 25 17 00 86 5a bc 7b e6 34 6a b8 82 | f3 f9 2d 18 8b 60 8a e1 44 59 97 9d 3d 8f e9 c5 | f8 41 9b cd 41 cb 5c 6e 45 99 77 f2 5a 87 7b f0 | 1d 7f 22 98 41 7d c2 e4 77 82 d2 02 ca 3f 14 b4 | ed 6e 31 66 40 7e 40 f0 ba 85 c9 d3 8f 47 3c 65 | b9 d2 a6 cf 54 28 00 31 9f 56 44 5d 75 4a b4 99 | 1b dd 03 d3 13 f1 55 d7 db 2e bc 45 cf 65 35 32 | 29 00 00 24 67 e3 6e 73 a7 21 14 7b f9 65 b0 3b | c5 ad 46 44 e6 80 5b 79 23 9d d2 69 99 df e6 8a | c8 33 da 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 9d 30 3b 19 a7 57 ef 03 62 55 06 | 80 94 c0 4d a8 e2 a5 61 00 00 00 1c 00 00 40 05 | d9 d1 f1 c9 94 93 28 e9 a6 95 bd a3 15 8f 8e 30 | 15 95 ff 3f | libevent_free: release ptr-libevent@0x7fb388032bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a12c70 | #15 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 a2 6e 3b 12 a8 59 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #15 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #15 | rejected packet: | 26 a2 6e 3b 12 a8 59 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #15: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae8980 | handling event EVENT_RETRANSMIT for parent state #219 | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #219 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #219 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49634.044368; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008953 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c480 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #219 | libevent_malloc: new ptr-libevent@0x7fb388032bf0 size 128 "road-eastnet-nonat-219" #219: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #219) | 7d 80 b0 77 1f 48 77 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 87 5e 24 5c db 31 0a 96 84 9d 90 05 c1 73 ea | 13 fd da 1a eb 02 9b 1b a2 ef f5 1e 7d d5 07 48 | 63 2b 15 ef 39 49 2f 72 57 96 fc d0 52 b7 b4 5b | b9 8f 1f 7d 66 98 1a 54 e8 35 20 c8 da d6 6b 14 | 12 96 09 73 f0 2a 18 19 ad 4f ad c0 e9 02 7d bf | 91 ef d7 b5 3d bf 72 91 c2 b3 4a 21 80 f5 15 86 | f5 a2 c4 99 67 47 6c 96 fc e1 53 b9 1a ff ad 2e | 5a 73 b4 6f 29 39 2a 43 c9 46 c0 b4 6f 20 2e 1e | 67 a0 45 fd 13 c6 d4 73 ef 07 78 d4 9f 67 9c 74 | b8 b8 8b 57 22 93 1b 6e 1c 48 7c 01 8f e1 37 24 | ca 0b 69 5d 4d 5a 11 fe 79 69 f3 19 5f e1 13 01 | 72 da c7 1d 2e 2d 95 6b 1a 0c 79 15 cc 16 3b c9 | df 53 b2 62 55 3b 89 98 3a 35 b4 a3 d8 f7 72 66 | 5a 4a cd 05 1d 45 02 1c a4 80 ce 7b 71 ea 76 a3 | 4c 87 0d 5f a5 5d 61 29 09 d4 52 68 95 1e 6d d6 | 81 6a 00 e1 92 ed bb e5 1a 97 43 9e cf 2e 23 af | 29 00 00 24 3d 29 6e 63 66 7a 35 4b 56 6e f9 8b | 96 51 14 3b cc a7 be 10 65 46 ea 6e 67 b7 cd b3 | c7 62 bc 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 d7 c1 a6 5e c6 d2 33 1c 31 12 89 | 58 68 2a 17 e1 05 d4 0f 00 00 00 1c 00 00 40 05 | 8f 01 0b 19 90 57 cd de dd b3 66 c4 60 3d 67 fe | 89 ed 52 b0 | libevent_free: release ptr-libevent@0x7fb3500407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae8980 | #219 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 80 b0 77 1f 48 77 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #219 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #219 | rejected packet: | 7d 80 b0 77 1f 48 77 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #219: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac7f80 | handling event EVENT_RETRANSMIT for parent state #16 | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #16 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #16 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49634.111688; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009254 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae8980 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #16 | libevent_malloc: new ptr-libevent@0x7fb3500407f0 size 128 "road-eastnet-nonat-16" #16: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #16) | 6b 57 6c f9 94 8d 37 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 79 95 56 0f 3a d5 d4 38 4f 8b a1 27 c3 02 1b | 5e 3a 85 e1 08 09 e6 fc a8 62 0f 43 42 55 29 b8 | e4 f9 04 77 e0 10 6e f0 87 0e 34 48 79 7d 7a e8 | ca f4 cc cc 99 09 3c b6 c2 35 0f bc 7b 2d 41 d5 | dd f7 e4 e1 a4 f1 02 00 be 44 4b 47 7e b4 a8 a2 | 62 b7 14 ca 2d 3c f6 2d ca f0 71 35 95 46 55 c7 | 1c ba 8e 83 ee 6a 95 4e 0b 06 27 00 95 fd 56 5f | a2 f2 d6 ed a0 30 96 bf 3e 03 94 41 ed 51 4c 15 | 54 db 62 3c 9c 56 76 98 56 78 f9 0d a3 f4 ac 74 | a4 8d 21 e9 c2 d6 c6 f2 bf cc ab 95 d5 b5 69 db | 99 07 4a 4f 0a fb b6 0d 07 d8 b8 7a ef c0 3c c0 | fa 7f 1c 08 05 55 7f 42 6a 4f 4e 4e 1f 35 3a 92 | 3a 9a 25 4f 7a 92 43 f1 5a 60 e4 7c d0 47 d1 12 | 01 ce a1 b9 b7 b6 c9 00 28 c2 19 89 84 44 e5 78 | 95 8c db 08 69 6a 49 44 32 07 7d 96 fb 06 00 43 | c3 4e a1 ee cd 85 94 29 a6 9f 2d d7 39 41 3b c9 | 29 00 00 24 85 0d a1 fb 37 74 4a 69 68 3b 97 74 | ca a6 8b 60 be e5 4d eb 21 82 d1 c7 17 0f 24 83 | fe 05 13 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 42 5d 5a fd 9e 39 f4 1d d5 d8 fc | 51 9a 83 f2 5f a0 b0 5a 00 00 00 1c 00 00 40 05 | 36 95 c1 ea ee d0 12 21 b4 68 71 46 60 49 f3 80 | 34 92 b4 f4 | libevent_free: release ptr-libevent@0x7fb360035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac7f80 | #16 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b 57 6c f9 94 8d 37 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #16 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #16 | rejected packet: | 6b 57 6c f9 94 8d 37 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #16: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #220 | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #220 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #220 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49634.146962; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.026097 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac7f80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #220 | libevent_malloc: new ptr-libevent@0x7fb360035930 size 128 "road-eastnet-nonat-220" #220: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #220) | 46 e4 bb be 2e c2 5d 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 39 4d 80 66 08 94 81 6d ee b8 9e f9 65 a1 19 | 54 a6 0a fc 14 3b 49 4b a5 b0 75 d5 8f f4 dc f0 | 1b a7 3c f6 bb e2 05 ae e7 81 f3 39 80 b8 01 f9 | 77 d5 d3 86 7b 99 e2 d3 05 f7 72 fa 5c f1 d2 51 | b2 76 8c 56 54 09 b2 f0 63 f0 63 23 b4 3d 48 f6 | f1 7c 7c 9e fe e8 97 61 67 eb 6f f5 a8 99 0f d8 | f0 a4 2a 65 98 03 64 d4 51 ad 7e ce 83 6c 68 5a | 24 81 05 98 d2 e5 16 4b 8b 3e c7 e6 5d cd e2 fb | a8 b3 8a 3b d0 a3 7d ce 4c 78 67 e6 b6 09 60 ba | f9 1c b9 ed ac 41 f4 ed a2 6c 61 ed 1a 8b 86 32 | f9 bb e7 03 fa 79 52 88 d5 55 24 b9 5c 26 d9 4f | 84 6f 26 7a 2c f2 0f 72 55 f3 04 53 6d 42 03 19 | 2c 35 89 e8 72 3a 30 cc ba be ce f2 4a 96 71 78 | 63 64 85 27 33 b9 dc 2a 58 25 92 09 0e 9f ab 45 | ad 24 0f 92 22 24 6c f4 98 77 7a 79 50 d8 2c a5 | 5a fb ac f5 20 e9 5a 93 8b 11 3b 04 5b 8e 94 e7 | 29 00 00 24 b8 3d f3 f9 87 d9 e7 9e 4b f1 71 60 | 7a f6 ea f9 0f a9 84 5d c0 c1 a6 93 b2 00 5b f0 | d8 3e 37 a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f9 77 af d4 23 66 f6 eb 62 8a 75 68 | f1 14 74 bf 89 18 b5 2c 00 00 00 1c 00 00 40 05 | 75 8f 21 77 9e bf 74 11 1b b7 a1 b1 db ce 3f 91 | e1 e1 a3 e9 | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #220 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 e4 bb be 2e c2 5d 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #220 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #220 | rejected packet: | 46 e4 bb be 2e c2 5d 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #220: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0454 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c7c0 | handling event EVENT_RETRANSMIT for parent state #221 | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #221 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #221 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49634.24543; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005415 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #221 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 "road-eastnet-nonat-221" #221: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #221) | 90 8f bf e7 cf b7 65 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 72 44 57 63 97 26 0b d0 33 1e c1 f5 c9 36 d4 | f7 1a 62 3c a3 39 42 e3 c4 ee 5b 04 7a e2 93 d5 | 0f 83 78 28 fb 94 39 4c 7a cc c9 c9 ad ce 5e 59 | 68 4d ba 18 1e 4a 63 94 c5 70 f6 5d b4 77 65 58 | 10 84 fe ef 60 83 64 5b f2 89 50 99 ac e1 51 8a | d7 74 3b 5d 70 17 cd 8b 95 39 65 4b aa 2f 20 67 | bc c1 06 22 2c 60 51 a7 d1 25 ba e3 e5 7c 2a 24 | 9f dc 2e 8b 87 d8 be dd e2 1f 7f 7d 88 f1 33 ff | db 8b ce 43 0a 9d db 20 79 1b 34 f9 9e 77 87 58 | 03 3d 5b 8a b0 e8 e3 38 e6 81 79 10 ab 3d b2 02 | af 63 97 ff 1b 89 ab 73 45 c7 84 d1 96 d1 2b 2c | 45 33 cc 2a 87 09 9b 3c 40 ce 87 0c 1b b1 51 a1 | 8d 74 42 7d fd e9 3f de a9 93 ef 77 e9 c1 c8 91 | 38 fa 26 85 5e 1b 88 91 35 9e 5f 73 34 d8 96 fe | 85 b3 52 f7 42 b5 7d 56 e8 9e bb f2 e5 07 db 70 | 5b 28 4b 5d 8e 85 f0 35 5c f8 45 ae 02 de 27 d9 | 29 00 00 24 cd 4c af b1 99 23 18 29 29 9d f9 32 | c6 a6 09 22 63 0a d9 08 58 b2 a1 77 c9 06 48 e1 | 9c 8b 9e bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 fb 28 ad 15 31 02 8e bd d8 0f 80 | 1c 8f fa a7 e9 1f 34 e3 00 00 00 1c 00 00 40 05 | c4 70 86 36 d0 0a de 28 47 ec ca 4b f0 c7 6b 67 | c3 4a 0b 4c | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | #221 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 8f bf e7 cf b7 65 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #221 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #221 | rejected packet: | 90 8f bf e7 cf b7 65 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #221: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0682 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e8820 | handling event EVENT_RETRANSMIT for parent state #17 | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #17 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #17 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49634.253808; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.014164 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #17 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 "road-eastnet-nonat-17" #17: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #17) | 95 d9 df c6 2f 4d 0c 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 5e 55 de a7 df 8c 8d ec f1 a6 b3 e1 a3 c9 2d | 5c 34 98 9a bf 18 3c 5f 5f 84 6f cc 00 89 2f b6 | 2e 0d 8a f0 e8 8a 33 b9 9f e3 4d bb 6f 5d 7f 7f | 55 e8 00 b1 58 6d 0f 17 37 b6 dc aa e5 63 e1 98 | c3 81 a6 04 b7 5c e1 a6 b2 29 9c 5a 0a 92 22 a4 | dd 4c 33 c2 4e 6f 90 29 c5 be 39 30 e7 2e 62 6c | 05 d7 89 8e 0f da b5 53 da 3f 31 31 12 b0 4c a7 | e6 a2 e9 57 ae d6 ea 04 d8 8b 73 ef 0e 9c 95 4e | 4b da 65 9c ef 6c 55 46 7d 0a 54 0c 93 37 db 94 | 63 8b a7 e9 ec 58 ed b4 f2 15 0c b0 9d 7b 2c 0d | 1e e8 20 04 e7 f0 90 d5 81 ce 8a 1d d9 30 60 b1 | c6 44 b1 01 fa 02 ef 06 8d 26 a1 09 a3 ce f8 2b | cd fc 0a 07 b0 8e b6 9d e8 6f 0c f0 b6 d6 40 9f | 58 4b a3 1f 87 35 a9 b2 45 93 43 35 38 68 86 6f | ea 62 4d 90 7e b9 e7 0c 07 f5 2a d5 71 68 12 96 | 09 17 2e 55 3e a1 6c 35 b5 20 1e 2a bf 27 6e 02 | 29 00 00 24 bf 2e 79 82 7e c6 1a 66 e2 b9 4b 2e | f8 c7 dc 78 b4 81 b9 5d 2e e5 4c 2c 27 2c b6 31 | c3 63 bf d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 f5 2d 98 10 e8 c0 4d c4 df 42 b6 | b0 c6 0b 95 91 b6 b4 67 00 00 00 1c 00 00 40 05 | 6f dc f7 24 ac 26 1a a6 48 cc ee 5d 39 06 66 40 | 4c d6 6b fc | libevent_free: release ptr-libevent@0x7fb388043300 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e8820 | #17 spent 0.216 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 d9 df c6 2f 4d 0c 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #17 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #17 | rejected packet: | 95 d9 df c6 2f 4d 0c 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #17: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.103 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7e490 | handling event EVENT_RETRANSMIT for parent state #18 | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #18 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #18 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49634.337305; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008138 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12bc0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #18 | libevent_malloc: new ptr-libevent@0x7fb388043300 size 128 "road-eastnet-nonat-18" #18: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #18) | fb 32 f3 fa 98 61 11 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 1b 0e e3 36 19 71 f2 00 c4 a6 18 1e bb 4a b9 | 3f d0 79 e4 4c 35 e5 1e 56 1e d1 56 df b2 32 fa | cb c3 c2 d3 4a 94 0b 28 4c 8e ed f1 14 00 ce ed | b6 d4 73 ac db 94 04 97 4d da 90 7f 61 f0 d2 4f | 60 04 42 6d 98 5c e4 05 d2 7d 05 4f 2d 99 94 a5 | 24 07 67 86 b6 21 b9 09 3a ea 16 cd cc b4 37 10 | 72 43 f6 be 6d 76 63 9b 24 f5 23 e6 b1 48 bc f9 | f2 cf d4 72 32 75 ee 93 a2 3d a2 fc 4d 35 5b 06 | 2a 31 6e 66 38 b7 b9 5b ce 6b 7a 5c 24 6c c6 91 | 21 f8 32 cc e1 e9 56 aa 56 2c 50 74 9d 0e c3 9c | b6 78 ee 5d a7 11 af c5 d5 50 6d b5 f0 a5 9d 4e | 3f d5 dc b9 6a 00 2b e1 dd 5f 8a e9 31 c5 30 8b | ee 43 f2 79 32 71 d6 e9 6e 27 23 22 2e 49 e0 0f | a1 32 43 40 65 d3 35 9f 97 aa f2 5c 61 69 29 93 | 3e f9 84 1e 9a f8 ea a4 2a 81 be 45 2f 6a 95 39 | a8 bb 2b 71 c2 45 83 fa e9 8d 63 1f 25 98 d1 4c | 29 00 00 24 64 09 7d 4a c3 95 64 a7 f6 f8 ca 35 | d6 3a 22 ea 52 84 43 22 db d2 95 2f 1d 96 44 f9 | 61 f7 89 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 f9 c7 a2 f7 e0 10 e9 b6 c5 14 f2 | 0e d4 f3 ff 41 9a 2e 34 00 00 00 1c 00 00 40 05 | be 8c d9 50 c4 e0 70 2a 58 15 0e 32 3f df db 0d | 01 81 6c d8 | libevent_free: release ptr-libevent@0x7fb36001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e490 | #18 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 32 f3 fa 98 61 11 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #18 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #18 | rejected packet: | fb 32 f3 fa 98 61 11 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #18: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0724 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3940 | handling event EVENT_RETRANSMIT for parent state #222 | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #222 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #222 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49634.348659; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007027 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e490 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #222 | libevent_malloc: new ptr-libevent@0x7fb36001d920 size 128 "road-eastnet-nonat-222" #222: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #222) | eb 26 f4 19 1a 54 68 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 a4 6e 20 fd 50 2f 35 57 aa de 4a f5 e5 f9 4f | ca f6 bf 35 d5 20 df 61 18 72 c7 7b 3b d6 89 fe | 57 a2 45 9e 67 3f 8a f7 1b bb 33 5b 2f 19 93 13 | 4d bc bb d5 5a 76 0b 8c 08 e4 e4 47 2d c3 07 c6 | df c3 86 a0 6b 90 b3 31 74 8b 42 bf c4 10 0e bf | 13 cf 0b 76 db 86 6a 9f 8c f0 b4 0e c7 08 95 7e | ce 41 5e 4a 31 5c bb fb 47 19 b3 63 fb 4f ca f3 | 07 c7 1d d9 7a 1b f2 0d 5e dd f5 ac 4b 35 32 4a | fb 08 38 da 83 ea de 30 e1 52 16 cd fe ea bf b3 | 88 b6 b0 c4 6f 9e 4d bb 67 f6 e4 a0 eb 71 82 6a | ad 65 be 80 db 5a 69 3b 90 3a 58 e9 30 d6 fe 7a | f6 9b 28 5c 13 9f 6a 77 4f c9 8b bc 07 b5 a1 d9 | 2b de 81 5d 47 e4 3c c1 b1 a8 f5 bc 8d 40 df 63 | b5 80 17 f2 8c 1f b1 78 d7 35 f2 4c 44 06 cc 65 | 15 11 55 93 d9 f0 56 8f ad b9 7e 2b 7d cb da 6d | 9c ab 97 02 8c 9c fc 9d 3d c3 47 69 0f ac 56 88 | 29 00 00 24 77 e8 83 df 75 f1 9b ea 8f aa ae 8f | cc 39 a6 6f 03 de be 68 b3 66 64 be 5d 42 33 fc | 61 2a ce bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 87 6a 56 c8 8d 7a 5a c9 70 42 a3 | 93 38 10 ea 25 8a 09 bf 00 00 00 1c 00 00 40 05 | d9 43 32 2c d8 2a fd ec 96 bd 92 a4 54 e0 a9 82 | 8b 73 b6 b2 | libevent_free: release ptr-libevent@0x7fb358035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3940 | #222 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 26 f4 19 1a 54 68 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #222 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #222 | rejected packet: | eb 26 f4 19 1a 54 68 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #222: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0694 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #223 | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #223 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #223 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49634.454096; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007968 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3940 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #223 | libevent_malloc: new ptr-libevent@0x7fb358035930 size 128 "road-eastnet-nonat-223" #223: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #223) | 7a 51 ea 00 7b 14 8e 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e c0 c4 41 9a 95 cc 81 e9 60 68 ab 45 9c 08 20 | b4 5a a9 9d 67 49 a7 46 aa 2b 2c 92 19 0c 98 42 | fe fb 4d 10 39 99 af 92 9d b6 2e 88 4d d0 11 c1 | cc 58 dc fa d8 45 59 75 a4 74 03 ef 28 b6 b2 df | 65 14 7b c4 56 cb 7e 8e c8 a4 2d ad 67 70 a7 55 | 5c 9f d8 c8 c5 46 4c 1e 63 7d 5e ab 57 ab 59 40 | f4 a8 4b fe 89 d6 bf 01 54 f9 46 07 86 f8 bc 75 | ef 26 9f 79 f2 7c 5a c2 f7 65 21 b4 f5 f9 18 0f | 7d 48 47 25 7b 23 3b 60 c4 8a 45 86 e2 31 42 68 | 91 5b 9e 0c 6c bd d5 91 7e aa 25 22 d3 ee bf b3 | c7 ca 4c a5 a7 05 79 a5 99 a0 88 70 14 6f be 39 | bf 8f 50 de 92 0a f3 4f c2 47 ed ec a9 88 76 bd | f2 c3 85 8c 4a 5e bf dc 44 3e af ee 45 cf 06 99 | e5 de 11 6a 2b 48 7c 22 42 d6 dd 11 a6 82 39 4f | 9c 24 2f 97 4c 87 c3 35 46 b2 19 ca 91 0d f2 ce | c9 8b b5 a0 e0 d7 a9 24 95 51 89 2f 04 0b 43 0c | 29 00 00 24 82 03 c4 08 4c 73 33 ac 95 33 24 a4 | 7a b6 82 c3 62 e4 f0 a1 f5 68 f8 16 c8 95 15 db | 31 e3 65 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 01 2d a5 d7 3f aa d5 34 53 23 34 | 04 fb 26 40 92 12 55 4e 00 00 00 1c 00 00 40 05 | a6 35 a0 ce 14 8d c6 b8 e2 da 44 eb d4 cc fd 65 | 95 2a 9c c1 | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #223 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a 51 ea 00 7b 14 8e 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #223 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #223 | rejected packet: | 7a 51 ea 00 7b 14 8e 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #223: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0702 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a94500 | handling event EVENT_RETRANSMIT for parent state #19 | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #19 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #19 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49634.454375; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006736 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #19 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 "road-eastnet-nonat-19" #19: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #19) | 71 b7 8f 2a c9 ab 65 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 3e b3 71 5b 2a 7e 67 38 d7 ab 7a d2 03 90 2c | 27 b7 e6 d5 a7 20 27 79 5e 88 db 2d 02 14 e6 05 | 6f 07 f4 c1 2b 42 e9 2b 16 c7 24 00 68 97 23 09 | 9b 28 53 ba dc 36 46 57 40 1e 29 01 4a b7 49 a8 | 4d 9b c0 f6 6d 6c 59 7a d3 fe f7 05 02 d7 dc 3f | 33 37 fa 6e 66 82 3b 0b fc 41 01 e0 cf 12 33 b2 | a1 18 77 fd c8 36 dd ad 0b 8f 44 4a dc 2c 38 79 | 30 fa d4 bf 2a 29 27 db 37 30 a3 c6 e5 0f b5 2b | 3c 20 72 b8 f7 83 6c 1c 84 55 8f f3 1f 64 ae 19 | e5 47 9f 5e eb 0a e5 2c 75 55 6a e2 43 09 5c e9 | 24 9c 73 ae e6 a6 e7 07 f6 fe ad 11 3d af ab 94 | 47 55 a2 0e c7 5d 4b 0e 42 8f 1e 08 35 c6 12 3b | 76 58 3a e5 1d 69 62 62 bc c4 a4 b5 cb 6c d9 c9 | 2b 81 e2 3b e9 c6 13 78 c3 3f f3 38 91 f3 11 a1 | 04 e8 fa 3f 9f e8 f9 3d 60 98 07 62 99 3c 36 86 | 40 55 c7 f1 5a 42 4d 99 21 5e 58 f5 e4 8a cb d6 | 29 00 00 24 d1 01 c3 e5 0a d4 10 8b f6 20 25 e6 | de b5 f4 be cf de 7f f4 c1 d3 ec a5 70 52 4e 33 | 0b 30 f5 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 74 af f0 20 10 33 a5 14 d9 51 67 | 36 d9 37 b0 71 8d 2c dc 00 00 00 1c 00 00 40 05 | 0e 08 6a ae a9 27 97 90 41 13 4d a4 49 51 01 50 | a2 07 2e 34 | libevent_free: release ptr-libevent@0x7fb384043210 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94500 | #19 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 b7 8f 2a c9 ab 65 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #19 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #19 | rejected packet: | 71 b7 8f 2a c9 ab 65 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #19: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a97080 | handling event EVENT_RETRANSMIT for parent state #20 | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #20 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #20 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49634.539702; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006845 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94500 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #20 | libevent_malloc: new ptr-libevent@0x7fb384043210 size 128 "road-eastnet-nonat-20" #20: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #20) | 2a d8 6a 5c 08 dc 68 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad 76 8b c3 8a cd 7e 81 09 43 af dc 84 86 57 86 | ac 01 81 74 96 d6 08 70 58 d2 f7 10 2a f2 1e 9d | b0 95 95 b3 32 1e e8 01 5c d2 e7 39 14 67 2f fd | 6f cc fb 0b 1d bd c7 ac 37 fb c6 6d e0 84 f8 c8 | 00 c1 d6 0f 3b e2 a7 4b 51 a3 13 bb 3d f4 c2 99 | 9b 84 74 df c2 bf fa 13 e4 2a f9 e8 2d 4c 6c c5 | 8d e3 52 85 e9 f8 18 fc 4b 38 b9 82 e0 ab 65 b7 | ae a5 89 3c 88 ee 05 34 a9 d7 52 0c 03 2e a9 7e | e2 c7 7b c9 35 8f e6 9e 0b 55 49 71 ce bd 37 1f | 22 8f 48 76 19 75 9b c0 7a 62 4e 51 77 02 d7 bf | e0 ea 0a 67 41 41 2e 98 4f f3 cf 32 f2 ae 82 83 | 1f 56 7c 33 17 50 fa 76 01 41 f1 ba 05 90 db bd | 83 b9 cd 1b b8 6e f3 33 72 7e 47 f3 20 71 8f e7 | ec 91 f3 37 6a 94 11 a2 55 f0 09 1c 76 98 cd 56 | 66 be 33 43 a6 1c f5 8b 31 c4 e3 0a 7b 29 cc 17 | 3f 13 b8 73 4c 86 e0 b0 2a 03 32 6a 19 82 cb a2 | 29 00 00 24 47 97 3a 6f 12 05 22 fe fb dc 3c 25 | ff 91 0d 7a c8 4c ac f8 1f 7e d1 5f 41 39 e3 39 | e8 aa 43 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f 67 98 f7 05 c6 ee 5e 5b 5f e2 fa | ee a5 ba af 57 96 46 d2 00 00 00 1c 00 00 40 05 | 3e ef c3 bb 3d a5 88 fb 9f 3c 53 fd 3b c9 ea 45 | 6f 53 bd 02 | libevent_free: release ptr-libevent@0x7fb35000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a97080 | #20 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2a d8 6a 5c 08 dc 68 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #20 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #20 | rejected packet: | 2a d8 6a 5c 08 dc 68 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #20: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0709 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aaf800 | handling event EVENT_RETRANSMIT for parent state #224 | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #224 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #224 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49634.619118; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004745 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a97080 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #224 | libevent_malloc: new ptr-libevent@0x7fb35000cf80 size 128 "road-eastnet-nonat-224" #224: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #224) | df 89 b3 52 1f 0f f1 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 96 f9 c5 cf 52 6e 98 60 ae 95 1a e5 7e 1a 31 | 50 be ef 8d 41 26 11 5a 53 58 33 b0 a8 71 a8 6c | e8 76 92 5b e2 75 f3 94 63 68 60 f5 a8 87 0f b1 | 85 e3 57 f0 0a 68 7c 03 0c 38 78 58 ee f2 b7 98 | 27 f8 ff c8 7f ae 35 5b f2 27 8d 00 b6 82 75 2b | 3b 8a 79 42 25 39 44 44 74 88 57 0d 59 d9 ac 5f | 3a a3 28 54 30 c8 14 8d d4 ac c4 45 3f f7 ef e3 | 1f eb 55 97 53 44 9f 09 90 a7 a8 b1 9f 93 b7 ec | 77 b6 57 89 c8 dc e6 37 8a a8 71 f3 b4 89 24 f8 | 4d 88 b5 f8 54 45 64 00 76 98 8f 87 5f 00 73 6a | f6 f0 80 19 81 11 66 a0 99 ea 82 6c 63 da b4 a5 | 98 93 6c 76 ef 6c 97 72 9f 10 64 96 91 57 93 6d | a1 3f 92 89 58 38 d2 cf 72 5f 0f 1e 71 7d 51 50 | af 30 4c 3a ad 78 8a 2d 7e 0c 42 b8 89 96 d8 fc | a1 5f f4 b6 9f 10 b4 87 26 b0 a3 fb 36 06 d9 24 | c5 ea bd 98 29 fe 3b d7 81 37 c6 01 f7 9b f8 78 | 29 00 00 24 c7 58 00 d8 91 d9 da 4a 3e 8b 1d 2d | a3 43 99 18 27 ab 56 0f 2a b9 54 4e 52 a3 14 24 | 6c 73 a2 b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 40 3a 6a 95 ab 61 8d 6b 1f 3b c7 26 | b3 ad 90 46 7f 26 ab 97 00 00 00 1c 00 00 40 05 | 80 ec 8b 4c 52 09 6e c6 12 ca 33 07 bd aa 68 3f | 33 bf 9b d1 | libevent_free: release ptr-libevent@0x7fb34001f920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aaf800 | #224 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 89 b3 52 1f 0f f1 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #224 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #224 | rejected packet: | df 89 b3 52 1f 0f f1 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #224: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ced0 | handling event EVENT_RETRANSMIT for parent state #21 | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #21 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #21 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49634.652474; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008273 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aaf800 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #21 | libevent_malloc: new ptr-libevent@0x7fb34001f920 size 128 "road-eastnet-nonat-21" #21: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #21) | c1 e2 95 19 0d 6d aa c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 62 b7 cc 73 d3 9f c3 8b a1 e4 26 f8 ce 22 33 | 92 13 78 50 86 db 45 6a 88 c0 09 ba 4c 3a ed 8d | 07 a9 f3 c5 90 2e 12 14 58 94 56 71 46 c0 41 ae | 27 c0 08 e3 c4 02 5d ee 64 22 79 77 74 67 02 97 | 15 c4 99 75 53 da b8 d8 73 7b 03 dd 0e 63 e5 c8 | 2f a1 74 7d 1c 73 5d e6 89 77 c2 84 53 e8 81 35 | 14 8c 80 35 a3 ae 1e 09 89 8b c1 64 7d fd 4f 89 | 8f b7 6b da 51 0c c4 21 04 59 18 7c 8d 33 1a 85 | 98 29 76 e4 22 ac 91 00 31 d3 90 f1 d2 f4 f2 9a | 20 a3 6d 51 7b 67 e4 d8 4d 7c 9a fb 7c 63 7f d7 | c7 25 20 29 d5 e0 63 b5 f2 a7 5f d2 ec 98 84 3a | cb 95 85 f5 af 28 8d c4 5a 27 b6 9c 15 cc dd ed | f7 9f 6c d0 d0 af 5b 13 f0 d8 0f 7e 40 99 08 7d | 42 b3 e6 b5 93 1f 1e e1 85 38 e6 f0 e2 af 01 7d | 4f a1 b9 ef 5c 3f 42 c4 c2 ef e5 bc 70 ba 8e 68 | 71 82 c2 53 b9 56 35 3d c9 38 89 b6 a0 89 2b f3 | 29 00 00 24 b6 59 e5 4e ee 3f fd 49 7f 16 f6 82 | 11 23 a0 41 4a 5a b9 59 7b 13 06 de 98 79 ac e0 | 67 18 f7 dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 70 4a 79 4b fb 19 31 c0 36 bc 71 | 8e f3 57 13 5a bf 33 aa 00 00 00 1c 00 00 40 05 | 04 fc 29 44 06 78 d7 26 30 ef ba 81 66 98 ec 1d | 35 84 86 e1 | libevent_free: release ptr-libevent@0x7fb37402a710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ced0 | #21 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c1 e2 95 19 0d 6d aa c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #21 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #21 | rejected packet: | c1 e2 95 19 0d 6d aa c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #21: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a92f40 | handling event EVENT_RETRANSMIT for parent state #22 | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #22 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #22 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49634.737858; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009906 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ced0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #22 | libevent_malloc: new ptr-libevent@0x7fb37402a710 size 128 "road-eastnet-nonat-22" #22: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #22) | fb 94 21 58 38 c3 f9 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 fa b9 d7 68 fd 72 8f 42 0c d5 a2 f7 f4 9b 8a | d7 23 52 ca 6c 52 76 c9 13 29 10 22 e6 ec 59 2c | a8 f2 aa 73 f8 3e 6b 2a a1 80 14 ff a7 56 48 4f | 3e 9b c4 33 e8 9f 3f e1 00 d1 2f db 56 9e da 18 | 67 a2 e0 d7 98 13 63 9f 28 d8 20 03 fc d6 f3 6a | 0b 8c 23 20 ba 26 3e 63 f5 df a1 d6 76 bf 7c f8 | 52 9b 7b e3 ba 8b f9 13 50 1b 61 13 1c 98 cb 7a | 18 f4 0d 9c 45 e0 10 ca 68 77 fa c0 54 76 19 a8 | f4 83 b0 e9 4d 71 3e a8 7b e6 82 90 01 66 8f f4 | 47 f6 ec 2f 3d 48 64 9c f2 b5 21 50 b5 a6 c1 a0 | 91 f5 21 c6 ec 6a bd 95 39 08 03 b0 29 f0 d4 a1 | f0 7d 39 2b f5 47 de 25 f6 c5 56 6c a0 9c af 3d | e0 4f 7d d8 1e 86 d7 ac 96 7e 36 e6 1e 20 3d 6a | 91 0f b8 c5 68 62 9b 7a 5c 1e b4 57 88 ac 53 77 | e1 de dd ef 41 8c d3 d4 57 c9 16 9b e4 e9 05 4c | 74 12 06 2b a5 93 e5 02 33 46 72 d8 88 42 05 bd | 29 00 00 24 90 c9 d4 3c 5f 0b 25 0f f1 bc 52 9a | c3 5c 4d d3 31 89 58 99 a1 8a 08 b0 ed 9a e3 4f | 90 7f 17 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 cd b6 d8 9c a0 ac 4f 4b ba 38 63 | e9 a9 a0 ba 13 a5 50 1a 00 00 00 1c 00 00 40 05 | 2f e0 72 4a 02 ff fa 8e 97 a9 39 d6 93 d4 2c 35 | dd 9e 83 2a | libevent_free: release ptr-libevent@0x7fb38003dab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f40 | #22 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 94 21 58 38 c3 f9 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #22 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #22 | rejected packet: | fb 94 21 58 38 c3 f9 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #22: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0811 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac1340 | handling event EVENT_RETRANSMIT for parent state #225 | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #225 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #225 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49634.773371; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.020919 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f40 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #225 | libevent_malloc: new ptr-libevent@0x7fb38003dab0 size 128 "road-eastnet-nonat-225" #225: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #225) | 1c 46 35 b1 a5 15 7d 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae fb 41 53 6b 81 0b c3 2d 10 6f c4 43 42 9b b5 | 58 ae de 87 ce bb b8 82 21 69 b3 17 de bc f9 c2 | a6 34 e7 7f 32 f0 7d a7 6c 08 3e 2b 62 ab 16 a0 | 49 34 97 75 bc a1 e7 57 c6 b6 15 50 f3 8a f1 c4 | e3 18 e0 09 c0 26 64 c1 d3 38 7d 95 30 90 58 4d | 99 27 bc 98 4e c8 b5 39 36 2c 46 50 c2 b8 f6 07 | a6 3c 00 2b 8d 8c 50 f6 a6 08 bd fd 79 68 91 be | 81 69 f3 24 98 59 43 c8 78 e1 dc 86 d2 16 6e a3 | 6a de dc a4 19 ff e6 d6 63 67 69 75 d8 ae 52 31 | c3 a7 ea ea 95 69 03 74 0f ef e1 6f 99 0c 56 d4 | 62 d0 1b 8d 8f 7c ad 94 ab 7c 03 43 80 8a 6e bb | 36 aa d3 44 03 e6 5c 20 d3 4b 45 e5 a2 5c 00 25 | 37 ab 32 ce e0 ae 35 8e 13 d7 03 37 11 57 20 f8 | ae 87 85 bc 10 d5 2c 64 54 e7 c4 49 10 99 df 04 | 79 9e f4 43 41 4b 6a 31 13 21 e7 cf d7 1a da 5b | 4b c0 6d 43 c6 e7 f0 86 e7 2a 75 03 ec 4c de 27 | 29 00 00 24 27 0f 48 fe da 9f b7 b6 f5 85 2e 21 | 09 ff e1 4d 05 12 3c c0 4b 2e ad df df d0 69 83 | 11 81 8e 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 11 33 1d 86 3c cb d4 6f 7e 68 c8 | 95 dd 6a 6a 4f 3e eb 1f 00 00 00 1c 00 00 40 05 | 41 16 5c d3 40 8f 72 70 a4 ea ff c4 c5 31 7c 04 | 7c 81 7f e0 | libevent_free: release ptr-libevent@0x7fb344035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac1340 | #225 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c 46 35 b1 a5 15 7d 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #225 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #225 | rejected packet: | 1c 46 35 b1 a5 15 7d 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #225: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469ef4e0 | handling event EVENT_RETRANSMIT for parent state #23 | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #23 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #23 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49634.827729; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009525 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac1340 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #23 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 "road-eastnet-nonat-23" #23: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #23) | 11 64 2b cc 79 62 5e 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 73 2b eb f6 ef a5 89 1a 84 5f 77 86 97 95 f5 | 41 68 46 e7 c2 3a 4b 96 08 d9 dc ac 0c dd 5f 9b | 9c 2f fb 55 35 f0 7e cd 72 e1 cc 2d 6a fa 78 20 | 87 1a 7a 27 9f 9e c1 5d d5 9e 2c a0 07 0d 68 be | 9e e9 e9 2b 00 f9 05 41 09 d8 c4 31 fa 61 72 87 | 90 51 a0 68 b9 49 7c 1e 75 38 ea 5f 98 5e c2 d2 | 66 ca 13 be 66 2b cf da 9f 87 38 b0 7e a9 5b 2c | b6 4d 89 7d 77 c1 b9 97 25 e9 f9 03 6e 50 c9 f0 | 4a 7a ea 26 c5 82 77 fd 51 df 29 99 2b 7c 16 40 | 15 23 9e b1 86 5f 7e 14 de 76 c4 15 a3 9d c9 b4 | 9c 1b 90 c7 1e 57 7f 74 e2 ad 9a 3c 48 8f 70 44 | 85 18 d4 03 39 40 d0 15 5b 33 89 0a c2 cc bd 37 | e0 4e e5 f2 46 4f 47 44 cf d8 ce b3 b6 34 38 c5 | 35 57 26 ef 2d db be d0 db df 2a 42 e2 e1 8f 1d | 48 dc 28 b8 9a 19 2e b1 d2 17 f5 9d a6 50 4d 1a | 18 88 cf 51 7a 98 9f 7a 85 1b 6d 6e b4 28 52 31 | 29 00 00 24 7b 3d c1 32 8e 45 e7 94 6a 53 a8 c9 | d4 42 3b 62 4a d5 d1 ca c0 9b 8b 0f 34 82 fe 78 | 98 28 d2 99 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 90 87 c3 2a f9 31 e3 ce f5 bd a0 4a | 02 f7 6c fe 1a b5 f1 41 00 00 00 1c 00 00 40 05 | a7 5c 60 43 7b 55 16 31 7f 2f 25 27 9c df 44 42 | dd 9f 1f 73 | libevent_free: release ptr-libevent@0x7fb338035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469ef4e0 | #23 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 64 2b cc 79 62 5e 8e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #23 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #23 | rejected packet: | 11 64 2b cc 79 62 5e 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #23: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6e010 | handling event EVENT_RETRANSMIT for parent state #226 | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #226 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #226 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49634.884945; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.012264 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c00 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #226 | libevent_malloc: new ptr-libevent@0x7fb338035930 size 128 "road-eastnet-nonat-226" #226: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #226) | df 8a 99 41 35 8f 22 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 39 0d ed 10 1f e3 0e ea ca 85 c3 5a 17 31 22 | 97 9f 06 33 b0 59 ed 25 d5 cd 46 5c e1 b7 68 7b | 60 f5 73 ac 22 e6 10 7a c8 3f 64 54 b7 2c c9 ba | 36 26 b8 60 a9 a1 e6 a3 6e 44 7f 00 0c 75 49 7e | c6 17 73 3d c6 70 48 38 43 a2 56 d7 f5 0c 3f 3f | 3f 97 93 c5 a1 2b c4 07 4f 49 5c fa 0d e2 93 83 | 1d 93 5e ee cb e1 2d 5d 17 f0 04 37 84 12 a1 e4 | ea a7 ca c8 ca 5c 70 fb 0f d5 b4 aa ca 0a eb f9 | b6 b5 03 c1 29 21 80 90 c2 2f 2a fe 6c ab e2 c4 | da df fe dd 41 56 bd 81 ee 73 c7 0a e6 2a 84 64 | 7e c8 7b 2b 7f 3e cd 94 23 75 81 89 67 c2 03 bf | 33 3e d9 d2 a5 ec 73 d5 af 8a 02 94 e8 dd 1e 6c | 57 45 a8 23 17 bc 83 80 e2 7d fe e3 0d bf 65 a8 | 6f 93 8d 7c 46 a5 58 a7 45 54 b1 bb ae e2 cb 5a | 09 4c cd b3 40 87 10 07 3f c6 8e 21 cf 42 d3 a0 | 05 bf ba f5 eb 01 2d 75 a7 76 4b e5 7b 42 b7 8d | 29 00 00 24 c0 94 06 00 9d 87 40 a0 ec d8 4c ee | 0c 16 0e a6 24 3d 43 67 f1 e5 1b a0 19 81 a3 5d | 35 48 05 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd dc 27 ce 4f 2a 14 a6 0d 4a 3f dc | 07 9c 36 b1 1b e9 59 bb 00 00 00 1c 00 00 40 05 | e3 eb a3 4f 44 c3 b7 5b e6 19 f6 7f 9a 7d 29 4c | 6a 02 ce 75 | libevent_free: release ptr-libevent@0x7fb36800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6e010 | #226 spent 0.192 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 8a 99 41 35 8f 22 b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #226 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #226 | rejected packet: | df 8a 99 41 35 8f 22 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #226: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac5400 | handling event EVENT_RETRANSMIT for parent state #24 | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #24 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #24 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49634.9373; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.012641 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6e010 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #24 | libevent_malloc: new ptr-libevent@0x7fb36800cf80 size 128 "road-eastnet-nonat-24" #24: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #24) | a6 6a cf 12 4f 5d 80 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 64 6b 6f 54 02 19 88 ba 7c 08 ae f0 e8 ac 9d | c2 ca d4 17 41 fd 62 15 e6 80 a2 22 8c 15 09 a2 | e7 a1 72 ea 0a df 45 b3 25 d6 2f ad 4b 53 6c aa | 40 78 bc 47 40 56 b3 31 58 04 4d 38 c6 d0 b5 d8 | 7f 6f a2 f1 93 94 05 6c d0 31 6f f5 91 da 3d ba | e0 df 58 d8 a7 5c 43 d6 dc 3f 84 1b 95 82 7b 74 | 0c 41 0a 55 c5 c4 26 cf be bc a7 fe 25 56 32 c1 | 74 4d 01 af d9 1d ba 5f df c3 24 6e 66 7d 9c 22 | 84 1a 96 19 75 ab 7b e5 8d 21 ff f9 0c c5 57 de | 08 b9 a5 25 49 54 61 98 e2 43 6f b1 cb e2 3e 2a | f8 2c b2 cc ec bc 5e 41 c3 a9 95 de 3e ae 27 18 | 0c 51 55 28 d4 52 b5 1c e5 35 a1 75 a4 31 5a 74 | 09 2d 83 0a f9 22 55 04 79 c9 7a 03 c4 3f b9 27 | 7d 94 7e 25 32 de fa 8a ba c3 f8 47 1a 89 e0 04 | 1c 2a 74 59 3a 33 c6 78 c9 39 62 b5 5b 83 e0 ec | 74 d5 64 ba c0 ee 33 ea 4f ca fc f0 da aa dc 97 | 29 00 00 24 86 65 98 51 47 8e f6 4b 35 71 6a af | 55 7d 2d 69 5a 9e 6d 36 94 f6 45 50 b1 44 a3 6d | d2 78 d3 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 db bf 4d aa d7 35 0a 3b ec 97 e0 | 4c d5 57 e3 dd 13 4a e5 00 00 00 1c 00 00 40 05 | c7 67 96 20 f6 5f 6f 16 76 12 96 1c 43 e0 40 0f | 0e 23 33 02 | libevent_free: release ptr-libevent@0x7fb354035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac5400 | #24 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 6a cf 12 4f 5d 80 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #24 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #24 | rejected packet: | a6 6a cf 12 4f 5d 80 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #24: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45310 | handling event EVENT_RETRANSMIT for parent state #227 | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #227 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #227 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49634.986629; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007982 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac5400 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #227 | libevent_malloc: new ptr-libevent@0x7fb354035930 size 128 "road-eastnet-nonat-227" #227: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #227) | c5 c2 6a 83 d2 66 bb b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 5b f4 b6 58 9a 18 76 c3 e1 6e 19 2a 39 ae a1 | 62 ea 44 d1 30 52 4d 8a 54 61 7d 23 98 f8 8d d5 | 84 3b 68 fd c2 f3 21 b9 78 0c dc e3 83 0f 8e 04 | 74 b0 67 51 d8 1a 83 67 df 2f 54 ee 3c eb 78 8c | dc ab 5e ad 88 89 74 dd b8 42 f8 3b 65 bb c7 d6 | 58 b5 ad 0a ef 24 29 f4 ee 94 22 81 71 d7 21 71 | cf 9a 96 87 e9 3e 34 bd 96 10 75 82 fd 44 7e e5 | d5 b4 6d be 50 02 22 60 ae ae 61 82 1e 48 c4 e8 | fb e2 e4 71 81 50 e1 9c 82 80 8f 59 e3 b5 cd 3d | 6c 63 88 9c 58 f3 61 37 6d 11 4f 91 c3 dc 04 d5 | 78 82 60 cb 5e 0d 1d a4 89 4d 74 78 d6 b1 e9 18 | bf 79 a1 1a 16 e0 b4 3d 00 ec 02 c0 3f 69 19 a5 | ad 3d e3 6c cb 66 a6 b9 ff c5 30 88 8f f5 e7 a8 | f5 33 4d 86 13 42 87 b3 82 49 90 36 bb 5e e9 47 | c4 bf c9 a4 e4 1a 35 38 6a 04 9b 4b 05 29 61 c8 | cf c0 72 4f 16 6a 7e 8b 6f 02 0b ab 68 bf 34 71 | 29 00 00 24 73 17 4e 35 59 6e 44 c0 fd cd 46 68 | 7d aa 47 75 fe fd 8d d7 e4 53 d6 a0 cb 05 84 4f | 51 ed 61 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 60 9b b9 46 e5 98 89 ad c1 cb e5 | e9 7b 12 83 3d 55 5a fc 00 00 00 1c 00 00 40 05 | 0c dc fe 43 8b 17 32 a8 d8 5e bc 45 b2 f1 c1 93 | bc b6 5b dc | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45310 | #227 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 c2 6a 83 d2 66 bb b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #227 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #227 | rejected packet: | c5 c2 6a 83 d2 66 bb b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #227: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46910 | handling event EVENT_RETRANSMIT for parent state #25 | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #25 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #25 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49635.029994; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009115 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45310 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #25 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 "road-eastnet-nonat-25" #25: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #25) | 78 5e ec 19 c3 e9 2e 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 3a 20 04 5c a3 28 e0 27 26 70 8b 2f d3 d3 dd | 4a ad b8 1e 2e 37 87 d2 d3 a8 c4 9d c6 ee 0f a0 | 73 84 05 06 74 d6 4d 07 19 2b 12 8b 69 7a 83 b9 | 89 8c 88 b4 63 15 c8 b2 2d cc 49 7a 79 d1 07 bf | ee 4e b7 0b 0d 2d 3d 97 a7 24 aa 10 a0 e9 fc 77 | 06 e9 cd 21 f9 64 fc 4a 83 9d 5e f3 a2 9b 32 c3 | d3 50 6b 09 58 29 c8 67 c4 22 3b 38 ef 52 9f dd | 6e 41 e8 16 88 89 59 a6 9f 8d 30 13 4e 6f 06 5b | 1b 0e 62 f8 90 29 6e c8 e5 89 28 a2 ea ec 59 64 | 67 71 02 aa 61 49 46 0f fe 0a d1 4d 62 20 44 13 | 22 6b 41 1e 83 c0 52 5c 04 b5 86 ac e3 c4 87 52 | 79 53 63 6b c1 fd a7 16 e1 a2 b6 27 78 fe 10 69 | 79 cb f1 75 47 7f aa 61 41 c8 00 01 b4 6e 89 cf | 41 c5 e9 e7 92 08 38 fd 15 78 0a 2b 93 44 c9 ca | b1 70 2a 2b ec 91 fe 70 63 59 89 8e 57 c3 33 c3 | 54 24 a1 21 c8 2a c0 85 b2 60 de 71 38 dc 7c 22 | 29 00 00 24 e1 d5 1d 82 b2 16 85 fd 33 85 77 2b | fc 68 12 4a cf f8 6e 1b 7e ab 43 df ab 9a a1 84 | be 92 7e 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a 8e 47 d6 ba 1e 42 85 a7 7b 2f db | 65 2a 1e ef d5 42 ee 43 00 00 00 1c 00 00 40 05 | 5d 12 0d 5e 92 91 ee 2b 6d 12 02 e9 64 25 a1 22 | eb b7 d7 ed | libevent_free: release ptr-libevent@0x7fb364012740 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46910 | #25 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 5e ec 19 c3 e9 2e 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #25 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #25 | rejected packet: | 78 5e ec 19 c3 e9 2e 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #25: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46906b40 | handling event EVENT_RETRANSMIT for parent state #228 | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #228 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #228 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49635.080337; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005979 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46910 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #228 | libevent_malloc: new ptr-libevent@0x7fb364012740 size 128 "road-eastnet-nonat-228" #228: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #228) | d5 f0 72 59 9f 13 94 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 4d 11 72 16 86 29 05 39 41 97 2f ff 33 6b a3 | e2 5f 51 ee 71 23 04 d6 72 0c fb dd 15 ef 6d c8 | 1d b7 c6 17 96 9b 3b 82 3f 74 55 80 22 53 76 ea | 2b 12 aa ae d8 aa 3b e7 03 c1 8e 79 97 e5 92 eb | b7 6d 0d a0 78 62 d0 f2 27 fb a0 42 72 ed d8 cd | 0b b4 e6 0c 99 75 b7 07 dd f8 fc 47 fd 38 1d bf | fc 96 ec 5d d0 ea 7b a2 99 77 8a 86 42 74 89 83 | 1d d8 30 c9 41 1c 6d 04 55 5a e4 6a 7f a2 48 37 | 02 c7 31 e3 a7 ef f2 c3 5f 9e 83 8d 0c 35 c9 0e | e5 2e 96 42 63 e4 ee 14 f2 43 a8 13 d6 19 12 1c | 71 11 80 4d 71 0f 19 3b 63 b8 05 30 82 8b 88 80 | bc 55 78 f9 8c 98 4b c3 03 95 ca f9 2f 2c ae 8f | 75 58 72 ba 8e 10 73 eb 12 6f 65 4a c0 7e 83 a9 | 2f 5f f5 39 44 b0 f3 71 90 fa 59 65 c5 77 f4 ce | b1 2f 6d f7 a7 ee d0 bc fc b5 7f 3e 18 f7 e0 77 | 4c 26 72 38 ff 07 80 23 0f 43 31 54 b4 87 d0 e8 | 29 00 00 24 53 c7 ad d5 ed 06 63 64 b1 b9 04 17 | 96 5d 45 22 6a eb a8 60 3b 32 23 a5 f3 37 e3 7f | 1e aa 66 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 e7 5c 74 6b 3c 37 c1 41 0f fa b6 | 88 19 1c 11 1d 3e 7c 16 00 00 00 1c 00 00 40 05 | e2 48 33 be 38 78 72 f6 d1 00 6b 61 a1 72 02 86 | 37 c7 48 ae | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46906b40 | #228 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 f0 72 59 9f 13 94 bf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #228 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #228 | rejected packet: | d5 f0 72 59 9f 13 94 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #228: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0596 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350005860 | handling event EVENT_RETRANSMIT for parent state #26 | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #26 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #26 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49635.104683; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005531 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46906b40 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #26 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 "road-eastnet-nonat-26" #26: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #26) | f4 88 08 87 51 21 ca bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af d0 7b 56 fd 83 24 e2 7f 6d 07 5b 14 cf 37 08 | c2 df a1 e8 d0 3d d9 70 11 a2 f7 87 78 ef 74 57 | 42 80 b9 d0 66 00 01 7b 09 5e 7e 2a 26 27 6c f8 | 72 db 2f 73 3f 38 89 07 c7 29 09 0b 07 35 1d d7 | 5c 45 0c 9e 1b e1 95 53 4a ee ac 68 bd 09 aa 3d | 27 0f 50 02 03 b3 ad ea c4 c7 28 b1 bc b2 70 07 | fc b6 58 d4 ed 1b fe 1b 64 8b 86 a1 fe fc 72 d9 | f1 ba a9 eb 7d ce cd 2c b8 6e 00 33 4c be dd dd | 3d 98 b2 2e 58 56 f2 f2 80 02 eb 21 ee 6b bd 96 | 40 1f 33 62 77 0f c1 a2 eb f8 19 6e 1a 5e 18 e2 | c2 89 f7 17 30 91 11 29 f1 9d 22 c7 c8 11 a1 d6 | b3 ae 73 01 db d3 1a d2 95 3f af b3 66 e8 e4 3f | 7f 26 bd b3 f0 37 10 0c fa cc 87 cc 8d 67 d1 69 | 87 60 66 13 b3 cf ae b5 94 11 93 f7 71 af 4a e8 | 96 fa e6 46 bb bb 17 b4 9c 44 80 04 e3 4c ce 52 | 44 6c a3 c2 a0 6e 82 a5 21 5c cc c5 65 7c 81 dc | 29 00 00 24 8a 04 a2 be b1 ba fb 75 a9 90 e3 4a | e4 71 c4 43 1c fe 30 e6 85 0e 15 7e 50 52 02 a7 | d2 a1 ae dc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 98 32 7f b1 02 26 47 ea b2 9e 1c ce | 0f f8 7e 1c 87 59 f3 12 00 00 00 1c 00 00 40 05 | f0 af 8c 45 09 60 6e 14 7f 54 da 7f 84 35 07 83 | 60 40 27 0a | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350005860 | #26 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 88 08 87 51 21 ca bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #26 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #26 | rejected packet: | f4 88 08 87 51 21 ca bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #26: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #27 | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #27 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #27 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49635.180065; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.015817 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #27 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 "road-eastnet-nonat-27" #27: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #27) | dd bb 9e aa 71 2c a8 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa f5 f3 8a 2e ca 64 13 4e ef 73 e4 1f 3e 67 ad | a1 5c bf b8 82 2d 98 4b ba 2f 4b 9c 4a 49 f6 7b | 11 53 66 d7 f2 df c6 4d 6c e8 fe ca eb 65 f7 23 | 79 97 e3 ea 55 ca fa 7d 0e 42 d8 5c 14 c7 91 72 | a4 fc cd 45 56 42 b0 30 e3 75 4e 16 78 7d 09 4f | c2 b4 68 6b 47 a2 0e 20 da b0 6a 41 7f ac 79 d0 | d4 2d 42 99 fd 0a 3a e2 6d 7f 90 e8 4d 1a 00 b2 | e9 9e 2f 5f 8c ef b1 f3 83 5d 30 13 95 c4 ca 84 | fc 5b f8 fd 99 e0 ef 1a ad a3 e3 11 fc de 8e cc | 62 ac 46 25 e8 4f ae 15 57 eb 6c c5 d8 d5 81 b9 | c0 5f a7 29 95 52 01 a8 27 41 88 9f 21 51 57 97 | 0e c0 5b 72 b9 1f 72 3e c5 18 84 95 8f 3a f7 5b | 8e ab cb da 5c d8 78 8b 6b d1 3d 62 f9 12 53 ba | 86 1f 8f 29 ce 9f 76 76 1e 5f 01 99 06 da 91 72 | f3 a9 41 c1 f1 95 87 95 cf 5a fe 09 57 13 44 9d | 62 a4 a9 60 fa 79 cc f9 5d bf f3 2b 5c 5b b4 99 | 29 00 00 24 55 62 09 8a 44 b4 a9 1d d9 35 9c 9a | 78 93 87 c8 d6 2b f2 b0 a8 b2 26 80 5e 03 70 47 | 73 8a 49 c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ef ee 96 1f 62 1c cd f0 a1 f5 67 ee | 76 d8 b6 28 a5 c0 9f 1d 00 00 00 1c 00 00 40 05 | 69 41 25 fb 01 9f 0c 01 9b e6 f4 5d 86 8e 8e d0 | 2b 2d f0 b6 | libevent_free: release ptr-libevent@0x7fb364035750 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | #27 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd bb 9e aa 71 2c a8 bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #27 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #27 | rejected packet: | dd bb 9e aa 71 2c a8 bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #27: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad9ac0 | handling event EVENT_RETRANSMIT for parent state #229 | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #229 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #229 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49635.20035; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009446 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #229 | libevent_malloc: new ptr-libevent@0x7fb364035750 size 128 "road-eastnet-nonat-229" #229: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #229) | 20 97 6e 08 83 53 46 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 59 ef 6c f0 3c e5 e0 cc 33 49 bc 05 30 a4 2e 63 | 40 b9 24 1d 30 3f 19 68 ce 4b ca f6 ef 1a a6 a9 | 5d 39 1c 86 c0 9f ab 47 fc 91 e7 41 3f 1d 89 da | 32 34 23 b2 92 45 82 aa b6 a2 b3 81 08 5d d4 d6 | 1a c6 db 13 96 83 8f db 02 0b e9 7b b2 14 62 aa | e1 68 37 82 79 1d ad b1 57 7f 25 a7 73 b7 37 87 | 5f 18 8b b1 9d a8 83 da d0 1c d4 ab 43 2e 39 e8 | 66 1a a5 36 6d 58 db 88 48 18 f4 d1 6a aa ea a2 | d4 61 12 6e 9d 66 34 26 cc 34 20 9e ee d3 7c 0e | b5 c3 c0 49 b9 a1 7d aa 84 e0 16 0d 30 3d 39 8b | 45 8b ca 2d 9a b8 31 03 33 bc e7 3c 1d 38 7b ad | c5 f3 f6 f7 be e9 2c 8c 87 60 cc eb a3 f8 ab f2 | a1 ec 16 ca f8 6c 96 69 77 3b 56 28 d0 57 05 dd | fa 6d 9c 0b 58 57 29 b7 d8 9e 77 ff a1 d9 ae 60 | 7b 96 73 6a b9 b8 7b 60 c3 f5 35 8e 8a fc 09 4d | 37 4c b1 4a c0 bc c4 90 71 ce a8 9f 0b 83 84 f7 | 29 00 00 24 bf ef 58 c8 50 05 c6 7d 73 f4 dc fa | 25 60 4d 48 2b 2d d1 e6 80 96 87 ef d5 27 62 2c | 4a bf b7 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 5b b6 cd 13 a1 fb 02 f0 d8 20 b7 | ee bd 8b 90 01 a4 d0 34 00 00 00 1c 00 00 40 05 | f3 e5 ac c7 45 89 3a 77 ae 9e aa 53 4d 4c 6f 3c | 03 52 b3 50 | libevent_free: release ptr-libevent@0x7fb36003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad9ac0 | #229 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 97 6e 08 83 53 46 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #229 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #229 | rejected packet: | 20 97 6e 08 83 53 46 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #229: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0766 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46adb080 | handling event EVENT_RETRANSMIT for parent state #28 | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #28 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #28 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49635.233719; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006843 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad9ac0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #28 | libevent_malloc: new ptr-libevent@0x7fb36003b0b0 size 128 "road-eastnet-nonat-28" #28: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #28) | 8a 4b 73 21 31 f2 6a 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 df aa e5 83 52 1a b7 2d d0 6a 7e dc d8 a5 d6 | 60 61 e0 83 0f 2b 6a 2b b8 0c 87 3f 14 f7 2a a4 | 98 70 c5 3a a2 0f 1f 46 6a b1 86 1e e5 5c 59 31 | 32 22 91 5d a2 6a 04 29 2b 10 13 47 0d 40 ca 72 | cd e0 cf f3 84 ed 4f bf 99 02 d6 fe 28 30 e6 6c | 0e 7e ca 11 f9 11 9f a6 4c d1 42 ed 4a 0f de 1b | d1 6c 18 cd c5 6b d0 23 4a e0 04 a7 c5 ef 74 ac | 27 c8 ec 0e 1f 0d 3c 8b a9 02 76 2a 67 8e fc de | 50 4d 80 13 28 3f 33 79 17 2e 6d b4 b5 19 8a 07 | 87 4a ec 6e c5 3c fb 34 d8 bf 04 77 90 53 b4 91 | 82 d0 d4 cb ca fc 05 22 43 e7 d4 8d 52 a6 ff 42 | 3e 8b bc 55 2d a6 ee 39 af 98 64 0e 18 a4 e9 08 | 5d d9 7e 8e 5f 00 df 4b 1b cc 49 d9 d0 64 64 c8 | 91 98 82 46 10 8e 0a 7c d6 f9 65 30 9e a6 47 1d | b8 47 35 3b c7 13 08 d5 39 45 15 b2 10 ce ee 48 | 7d d8 33 00 3c 55 6c 41 f3 1e 7b 0e 34 03 4f b7 | 29 00 00 24 ad 13 98 57 a2 9c 4e ec e1 0a 80 5c | a0 80 42 e1 ab 4f 47 32 a1 1d 36 58 8b 1c 71 8b | 25 4d b5 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 83 6c 60 48 f0 55 9f 8d d1 7e b1 | fd da e6 ac 8a a5 fd 2f 00 00 00 1c 00 00 40 05 | 4a 9c 1d b6 db 3c dd 9b 4a da 5d 6f ea e8 da 4e | 08 2e ae f5 | libevent_free: release ptr-libevent@0x7fb378035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adb080 | #28 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 4b 73 21 31 f2 6a 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #28 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #28 | rejected packet: | 8a 4b 73 21 31 f2 6a 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #28: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0669 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aee080 | handling event EVENT_RETRANSMIT for parent state #230 | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #230 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #230 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49635.275056; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005791 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adb080 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #230 | libevent_malloc: new ptr-libevent@0x7fb378035930 size 128 "road-eastnet-nonat-230" #230: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #230) | 69 22 82 19 d7 c8 c9 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 71 02 af b0 7d 99 80 ca 0a ed d4 9f 12 56 05 | 6a 75 f1 ff 5b 89 24 b2 2d d4 89 b9 fc ea 10 f2 | df 8b 07 6c 92 3c 32 d6 01 3c 1f 7c 77 2b 56 de | 1e a1 3c 62 24 a6 4e 3c 9e 57 23 35 a7 0e 3a c6 | fa 5e 05 ee c7 8d 32 41 ce 29 80 63 51 1d 1e 52 | 10 94 62 f2 6f 5b c8 e5 23 77 b3 5f 63 5e f3 42 | a7 b1 47 2a 85 90 69 04 a8 c1 76 53 9f c5 2d 06 | 66 93 5b f5 d4 f1 c7 6c 23 0b 21 57 da 55 b4 10 | b4 68 7f 72 aa 6f fd bf fc 43 d5 6e 02 91 b0 ea | ca b7 fc 32 ec e5 bd 79 74 66 56 52 a1 e5 b7 e9 | d9 32 42 bc f6 01 cc 69 66 87 01 cd 32 29 bd 73 | ff aa f2 68 30 ae 30 af 09 b3 2b 2d 0b 90 c5 d7 | e7 b1 60 17 46 74 a0 50 98 f9 06 d2 06 37 1f b3 | 0c 89 d8 99 c7 ac a0 2a 5a 19 c6 cc 6e e1 77 ee | 98 e6 45 5b c8 98 8d c9 0d d9 64 39 5b ba a1 36 | 39 81 f2 e5 39 16 cf c0 fa 26 3f 76 ff 4a de 8f | 29 00 00 24 ca 6b 45 b5 ad 3a dc fb 46 3f ff f9 | b7 9e 2a f6 cb 7b a0 93 c0 ff b4 97 10 4e 36 19 | c5 61 7a bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f fa a5 ce 96 35 1e 80 97 f9 81 69 | 6c 9b 29 c3 b6 c2 c3 05 00 00 00 1c 00 00 40 05 | 7e 27 b2 4c db 32 1f 5b c7 5c 32 4b 9f eb 6e df | 20 af 51 69 | libevent_free: release ptr-libevent@0x7fb36c046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aee080 | #230 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 22 82 19 d7 c8 c9 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #230 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #230 | rejected packet: | 69 22 82 19 d7 c8 c9 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #230: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46adc640 | handling event EVENT_RETRANSMIT for parent state #29 | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #29 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #29 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49635.30237; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009234 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aee080 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #29 | libevent_malloc: new ptr-libevent@0x7fb36c046040 size 128 "road-eastnet-nonat-29" #29: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #29) | 76 94 35 7f f9 86 66 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 c8 26 94 c9 ea 16 54 c7 a0 a7 ee 80 e9 d2 eb | c7 74 3d 70 a6 ce 1b 7f 47 b8 a9 22 6c e9 de 3e | 5e 1a da 80 d6 29 b5 60 85 8e c7 9a 07 14 0f 2e | 5e 85 13 8e 17 81 27 ae b9 44 36 2c 21 79 b7 4c | 9f fe 6e 8f 50 03 81 71 96 dc 7d 13 e0 2d e5 55 | 9d 35 cf 6e 26 2f 6c 88 8f fc 20 a1 7f b4 44 e0 | 98 88 95 7e ed 39 2c 67 fe ec 38 89 03 76 30 8b | 31 e8 7f 06 73 93 d0 0a 0d a2 5e e7 17 d8 ae 0f | 27 a8 77 dc e5 16 a6 b2 26 c7 b0 e5 80 71 68 10 | 38 5e 32 59 c0 68 b7 75 a8 13 99 bb ca 95 f9 78 | 1f 9b 7b 46 65 6b 90 b3 9b cd ca 91 c9 75 7e 4d | 2e 06 ee 10 f0 8c c2 89 1e c3 a8 05 28 9a e8 eb | 20 63 32 0f f1 3f 82 9c 83 27 56 48 7d 7c a9 e7 | f5 1b db 86 e5 b7 2b 70 8a da ea 00 2d 06 e8 11 | 3c 90 f7 22 75 39 1f c5 87 f2 55 24 18 21 90 81 | 04 ec 8f 65 74 d4 59 92 bb 69 88 b7 6d 42 21 28 | 29 00 00 24 36 a8 1f b0 73 93 1f c8 b8 98 90 7a | af 61 a7 3e 69 e8 46 34 d6 9e 89 22 1f 07 54 41 | cf b8 14 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 3a eb 7a 38 98 4c b3 ed b5 e4 e8 | 5b 3d 4d 17 15 a4 85 ff 00 00 00 1c 00 00 40 05 | c1 f9 34 11 26 e0 6f d6 1d 57 cb be 7c d0 71 cf | 3a bd fc a1 | libevent_free: release ptr-libevent@0x7fb3580407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adc640 | #29 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 94 35 7f f9 86 66 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #29 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #29 | rejected packet: | 76 94 35 7f f9 86 66 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #29: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0457 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46af6380 | handling event EVENT_RETRANSMIT for parent state #231 | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #231 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #231 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49635.382688; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004145 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adc640 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #231 | libevent_malloc: new ptr-libevent@0x7fb3580407f0 size 128 "road-eastnet-nonat-231" #231: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #231) | ec d8 99 0e 50 36 87 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea c5 d9 ea 48 9d 9d db e4 72 21 b2 eb fe e0 0a | 9b e5 ce 23 20 eb ad 65 b0 89 ca 3d 24 ef 66 7d | d9 a3 7a c2 3d 05 aa 43 9f 45 1a 14 d9 e7 ad 4c | 1c 30 1e e4 db 2e f5 09 08 f0 6c 1f 45 18 25 f3 | 98 35 42 0b 1b fc c0 95 3b d0 88 ca bf 43 11 51 | ba ac ee 62 bc ef 20 2d 09 0b 30 2b b3 a9 30 69 | 22 9f f7 e5 19 cc d8 4a 41 18 b5 2a 03 31 91 4d | d9 f3 33 5c b6 61 8b 80 4c 0b 65 d5 6f 4b 62 d8 | e0 38 d3 a6 32 83 92 b3 ca df 09 07 0d f6 33 d7 | b9 f9 01 8c 3b d1 ff 19 bf 3d d5 72 dd d6 67 1d | 24 a4 3b 88 00 71 46 68 47 66 c6 d8 6d 38 1a ca | 01 20 d4 7a e4 46 1b 52 ab ad 61 81 76 76 13 bf | 76 df 80 04 67 b5 86 86 0e 85 a0 4b 41 5b e3 0b | 3c 1a 51 b5 b4 55 ce 12 56 93 02 32 82 c4 86 69 | a7 eb 80 c4 8e 9a 08 dd 86 61 45 1e 8a 33 7c 03 | 7e 20 42 a9 8c 8c 89 72 43 a6 59 29 92 30 fd 49 | 29 00 00 24 b3 7b 27 54 be 06 93 cc 3c 78 ad 44 | 9e 7e c7 5b aa 5c 64 c5 5c 99 5a 37 63 dc 53 a7 | 33 95 f4 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 2a 24 2a a3 f9 b8 d4 c1 28 f7 1a | f6 32 c3 8a 97 33 de f4 00 00 00 1c 00 00 40 05 | e6 68 a7 21 48 f4 d3 88 6e c3 71 dc ea d3 53 aa | 0b f4 bb 84 | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af6380 | #231 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec d8 99 0e 50 36 87 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #231 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #231 | rejected packet: | ec d8 99 0e 50 36 87 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #231: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #30 | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #30 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #30 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49635.393955; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.017586 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af6380 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #30 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 "road-eastnet-nonat-30" #30: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #30) | eb 37 b2 e3 45 e6 a7 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 14 f4 3b 23 14 59 57 11 85 13 a2 12 2b b5 a3 ff | 27 d1 a6 d6 83 ba ed 6e 70 90 a1 d6 22 c0 f4 dc | 88 16 36 cb d1 72 72 bc de f4 41 0b 1b 89 09 42 | b9 3c f8 7c e9 f8 b9 9e 79 49 a8 2b 7f 1d 06 99 | c2 4a dd e8 2d e9 b4 cd ab 59 b3 cd 90 a2 ae 3c | dc 2b a8 89 42 be 2f 72 3b d2 e2 27 b4 65 50 d4 | 35 50 bc 83 c6 85 ec 49 08 26 e7 a9 0e b6 5e a5 | 85 8b 68 21 3e 90 ff 7d 8a b3 a3 ab 4e 47 64 32 | 27 11 da 90 e5 4b bc e9 16 11 6a bf 15 7e 85 08 | 28 9b e3 ef 08 8b 63 b8 f5 43 71 2f 4c 67 78 41 | b8 23 b8 9c 92 66 99 57 0d 3e 91 c2 06 23 98 e8 | 6d 98 00 38 76 9f e2 83 8a e1 b7 3f 0f fe 0a 46 | d4 29 95 ea ed 7c f2 88 a6 07 6b 92 26 ac 08 4f | 2f b2 56 84 37 68 ea c9 79 62 e3 b0 e5 14 a4 c8 | 94 04 78 6c 13 14 ae b3 aa ac 60 8d 12 46 30 65 | 4d f6 8a 38 3e 83 8d 9b ed 94 87 9f 15 c1 ab 90 | 29 00 00 24 3c c6 27 c6 e1 5b ef ef 28 05 b6 9a | 73 ea 46 41 c6 a4 e3 b1 86 51 d2 31 50 73 0b 09 | 13 5f 9d 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 2d bd fb cd 00 1b 4b be 47 ff 4c | 9b 30 9e df 04 ed 35 e5 00 00 00 1c 00 00 40 05 | f4 eb 1d 0f f6 3b e7 d6 54 0e 88 15 bd 63 45 57 | 71 e8 c0 52 | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #30 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 37 b2 e3 45 e6 a7 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #30 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #30 | rejected packet: | eb 37 b2 e3 45 e6 a7 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #30: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a42790 | handling event EVENT_RETRANSMIT for parent state #232 | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #232 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #232 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49635.468267; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004555 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #232 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 "road-eastnet-nonat-232" #232: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #232) | 24 ac 89 77 7f d4 00 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d e3 39 fa 31 96 0e da 0d 87 de fe bc da ee 7b | f9 35 54 93 66 77 87 a0 67 c2 b4 11 e6 0a 7a 53 | b3 1d a8 6c 5c b3 d5 5b f1 71 74 80 47 74 8f eb | 25 fb 81 fc 67 2b 6d fc c2 93 27 e4 ad 7c e4 44 | 62 ee e5 d7 4d 6f 45 7a fb 56 b0 33 e4 c0 e1 a0 | 0d 2e c4 d7 7c a8 3d 9c d0 51 2f 55 54 40 46 36 | 1c 6c 65 82 d9 49 b2 d4 69 f8 3b 26 10 eb 42 4c | 23 39 f8 bc c3 39 9a c3 11 d4 4e 97 4e b9 f8 a2 | 8b 74 d5 f0 11 c2 a0 7d ca dd 76 40 1b 01 76 b0 | a4 bf 05 91 b6 25 97 e5 e6 51 ee 64 fa 3b 0a c5 | a6 9c c8 8d fc dc 9a b7 88 e8 5a 4a 57 96 98 00 | db 6d 9a cd 76 5b a7 49 16 56 06 32 a5 f0 51 87 | 36 26 1d 21 19 29 89 68 02 06 6d 37 2b a0 74 d8 | 14 94 a7 12 8f 7a e7 ad 72 26 fb ca e9 57 f6 ae | 40 e1 77 ae bd 14 78 69 df f7 02 98 cb 60 f6 4b | ad ea 83 90 fd 04 b0 25 b3 92 71 37 ed 5d 75 e1 | 29 00 00 24 aa 59 21 22 32 5d 1b 0e 90 4a a6 80 | 93 f2 d5 94 dc dc 41 5c 7e 9b 58 30 e5 e0 1c a2 | 9a c8 ed 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 58 75 66 d7 36 51 ed 56 98 88 32 | c1 e3 29 ac 35 46 df e2 00 00 00 1c 00 00 40 05 | 0c 44 36 93 b4 a9 f5 59 b8 d7 76 83 b8 b4 fd 37 | 81 aa c4 e2 | libevent_free: release ptr-libevent@0x7fb36c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a42790 | #232 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 ac 89 77 7f d4 00 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #232 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #232 | rejected packet: | 24 ac 89 77 7f d4 00 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #232: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b09380 | handling event EVENT_RETRANSMIT for parent state #31 | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #31 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #31 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49635.47161; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.002376 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a42790 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #31 | libevent_malloc: new ptr-libevent@0x7fb36c0180b0 size 128 "road-eastnet-nonat-31" #31: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #31) | d5 d5 f7 7f 23 0d 4b 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 d8 4b a5 f9 d4 3a a9 51 97 2e 27 d1 cc 90 15 | e2 e2 8d 96 07 4d fd 40 9f 4f 7f 6f 35 0e 23 bc | 4a 6a 76 f9 9f 83 b0 54 30 ee b6 fc 0a 45 0c 73 | 2d e9 2a b2 ca 81 a2 ff 50 db 13 29 75 7d e9 7e | a9 33 06 c4 32 68 94 61 41 2b 8d f1 ff df 69 cc | e8 c4 b4 6d ef bc 3d c5 49 cc a7 2a fc 4c 98 e2 | 30 43 57 19 e1 0a 22 00 d7 07 6f aa ba 35 b2 14 | 36 27 5e 66 b6 08 a0 40 46 47 86 94 6d 23 bf ed | 9b 86 94 95 7d 7c df ed 26 58 08 d9 19 18 cf 17 | d2 31 cb 23 b8 00 65 a0 2d c7 80 be d9 c6 2d 9b | 2d 24 dd 1f 09 8c cb bd 5d a9 d7 7b 30 d7 87 68 | f3 c0 0e 20 8d c3 3f 32 80 d9 ab 29 26 00 09 ea | b0 b4 2f 7d 8f fc 22 1d 7c 39 80 08 04 22 2a 49 | f4 26 0e 59 4e ac 0e 0e 46 93 3b ba 87 01 a8 59 | ea 18 2f 09 70 d0 fb 69 f1 4a 19 c7 fd d5 be f0 | ff bb d7 7c ef dd e5 ed c9 a4 0a b6 e1 11 1b ed | 29 00 00 24 6a 1e b5 3b 00 37 08 50 6d 81 0e e2 | cf 1b 46 47 4b 2b 09 3d 6e 9a 95 9d 52 78 61 ae | d4 0d 66 80 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 91 23 cd ed e8 35 56 6f f7 85 4c | 49 64 a9 75 0a 07 1b 5f 00 00 00 1c 00 00 40 05 | a3 62 6c f7 52 92 b8 35 33 98 a9 6b 00 6d db 28 | 96 bc 0a b6 | libevent_free: release ptr-libevent@0x7fb358046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b09380 | #31 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 d5 f7 7f 23 0d 4b 11 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #31 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #31 | rejected packet: | d5 d5 f7 7f 23 0d 4b 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #31: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0603 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab6500 | handling event EVENT_RETRANSMIT for parent state #32 | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #32 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #32 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49635.550996; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00718 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b09380 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #32 | libevent_malloc: new ptr-libevent@0x7fb358046040 size 128 "road-eastnet-nonat-32" #32: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #32) | 91 2f 9d 69 76 5d 8a 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 54 17 4f f3 31 b1 0f c2 14 96 a0 49 f3 c5 20 | 38 78 7d e5 0a d8 95 bc 7a a9 a2 f1 ff ab 0d 66 | a2 fe 53 90 8e fe 51 43 04 57 01 9c e7 22 ca 9e | 98 aa 3b 0d 0d 5f ee 9d 1e 59 e6 04 c4 7f 07 84 | f1 a5 dc 31 6f fa b4 db 4a d9 1c 93 5d b0 7e 5d | 37 79 07 ab 3e 5c a3 de d6 8b a4 ac df 4b a7 7c | af 6f 03 fd 31 bd 7d c1 34 31 76 57 00 e4 23 e1 | 82 cb b8 38 12 59 cd 21 e3 0e 67 54 27 e1 6e 8f | 1e a1 dd 84 f8 ca 82 2a 39 9d 17 56 58 46 a3 3b | 7b 5d 3a 21 a2 b3 03 79 c6 bd 25 cc df a0 12 67 | b3 f4 5a c2 b0 73 2d 33 df 1c dc fa 26 25 56 72 | 59 7b 3c f0 d8 e2 d9 b0 57 2e 4a 8e ec 96 92 09 | 75 70 f6 57 59 ce 54 70 90 14 41 34 b1 57 0f 5d | 19 dd 8a a1 77 43 7e cf 1c ef 3e 0b 72 1e cc f4 | 78 66 2f 15 74 e8 33 6b d3 89 bb a9 fb bc fa 46 | 95 b5 88 f8 a3 91 1f 3a b1 92 bc 1e 84 a5 5b 07 | 29 00 00 24 2d 29 95 26 bc 23 fe d9 76 bb c2 d5 | 43 41 98 03 bf c6 eb 4a b9 6e a6 4e f6 f7 82 f1 | 09 94 9d 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 13 8b 5d 25 b5 3b 06 af a0 3f ac | be 9b 92 09 9d c4 50 7f 00 00 00 1c 00 00 40 05 | ef 32 45 23 d7 6a b0 96 66 7f 58 39 f6 19 a5 1f | 4b 49 56 02 | libevent_free: release ptr-libevent@0x7fb384038240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab6500 | #32 spent 0.194 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 2f 9d 69 76 5d 8a 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #32 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #32 | rejected packet: | 91 2f 9d 69 76 5d 8a 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #32: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90440 | handling event EVENT_RETRANSMIT for parent state #233 | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #233 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #233 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49635.585349; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008212 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab6500 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #233 | libevent_malloc: new ptr-libevent@0x7fb384038240 size 128 "road-eastnet-nonat-233" #233: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #233) | 77 22 f4 9c 3e 1f 99 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b ec 2a 3f 06 d1 8b 5a e8 a0 a7 30 dd 97 56 a8 | fc 83 ab 1c 41 f5 e8 c3 f3 53 9d 30 18 0d be a8 | 6b a6 4b 53 32 26 a8 d4 bc df 11 84 c3 51 c0 79 | eb 6a aa 97 40 5a 35 1b a4 6a 1c c4 04 e6 8f 18 | 55 5f 5f c2 af ea 6a 6c 05 59 de 4e 19 d5 22 46 | 8f 6c 32 5b 58 46 45 5f 0c 50 78 8c 5e 88 c7 73 | e0 06 97 88 0d 6e 77 b6 da 57 bc be e2 24 fb f2 | bc 09 06 c5 c0 aa 19 66 66 6f 88 a3 1d 28 43 e3 | 36 51 8c 80 0a 70 81 d2 c6 66 0e c8 9f c6 17 19 | b8 81 ac 81 1a 75 2c b9 dc 5b 7e 21 7e 73 b2 27 | 88 a7 6d 88 e3 28 4e 9c 2a a6 e3 b1 c2 84 18 fe | a8 bd 00 37 6c ea ee 13 7b 00 0f 0a d1 ff 5f 9e | d5 9b e4 25 b2 e5 a0 5b a7 8c 8c 3d 30 b8 3c 2d | d7 5a cb be 36 80 67 eb 87 97 e6 10 f7 e4 20 c7 | b9 ae bd af 99 ea 2b 87 69 7f 4e 89 2a ed a5 67 | 99 05 49 1e d6 46 c3 74 7b 66 be bf b6 f1 d6 cc | 29 00 00 24 c5 f3 2f 2c 84 76 05 a0 25 7b 18 6c | b7 6d f8 2f 27 cc e2 71 11 4d 56 a5 c7 36 d6 2c | 0b df 39 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 f4 1a 0b 18 23 e3 b7 72 f4 2b e8 | 42 64 3b ae 76 1f 34 42 00 00 00 1c 00 00 40 05 | 5e 56 c8 b1 db 9e 88 e1 bd b5 14 1e 2e de bc 55 | b2 28 a2 2d | libevent_free: release ptr-libevent@0x7fb34801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90440 | #233 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 22 f4 9c 3e 1f 99 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #233 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #233 | rejected packet: | 77 22 f4 9c 3e 1f 99 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #233: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a855c0 | handling event EVENT_RETRANSMIT for parent state #33 | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #33 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #33 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49635.616654; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005213 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90440 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #33 | libevent_malloc: new ptr-libevent@0x7fb34801d920 size 128 "road-eastnet-nonat-33" #33: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #33) | c7 46 be 2e 5d 25 78 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 fb 56 35 bc 7c 07 73 43 c0 53 96 f8 9b 69 93 | 49 fe be 57 af 79 18 68 5a 92 2b 2b a6 ed e4 23 | 35 6b 49 80 b0 8c 38 3d c5 a9 f4 61 c1 8b 08 4d | 96 53 f0 d9 1b 6c 56 bc 0d ea 97 5b b0 d7 0d 16 | 49 88 40 6d 71 9e 2d 30 fe 42 42 37 20 10 14 5c | 75 38 c4 da 71 b3 b1 3b a6 23 58 dc a3 9a e0 40 | ae dc 8e cf de 76 e6 55 4e 33 19 fe 18 08 f5 70 | 8e 50 6f 64 32 2f d6 7a 45 39 d0 ba 32 a4 1e ab | 2d 4d 83 e7 1f d4 28 47 30 da f7 2e a0 79 9c 09 | 2b 6b 46 2e c8 c1 e5 37 84 54 0b 0c 97 40 ae db | 52 08 f5 e5 d5 a9 49 2a c9 b8 1f f6 14 c7 78 d5 | 70 93 cb 5e 8c 96 b6 ac 74 c2 85 cf 89 ad 75 5d | fe 0b 68 86 21 96 4e 79 63 5a 81 98 b3 45 c5 f0 | b2 fd 49 e2 ff b2 a3 2c 96 3c ba 10 d8 3f 86 56 | e0 c6 d2 d5 d7 7d 5f 52 2a 95 0f 65 04 12 82 60 | e3 5b 42 b7 a8 9e 92 b0 fa 34 79 45 e1 34 ab c5 | 29 00 00 24 b8 c6 4b 62 72 20 c9 09 07 72 44 d0 | 79 00 e2 dc 8f 6b 83 e9 3d 67 2f d3 a6 5d 27 77 | 58 61 12 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 b6 d4 e5 76 6f b7 90 e8 c3 ad b3 | 49 49 44 7a b5 13 9b a6 00 00 00 1c 00 00 40 05 | 15 0a 54 d9 c3 ee ba ab b9 96 60 bb a3 40 4e fb | d5 1b 34 be | libevent_free: release ptr-libevent@0x7fb3440251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a855c0 | #33 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 46 be 2e 5d 25 78 37 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #33 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #33 | rejected packet: | c7 46 be 2e 5d 25 78 37 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #33: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5f0d0 | handling event EVENT_RETRANSMIT for parent state #34 | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #34 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #34 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49635.685021; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.010762 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a855c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #34 | libevent_malloc: new ptr-libevent@0x7fb3440251c0 size 128 "road-eastnet-nonat-34" #34: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #34) | 6d a4 8e 40 25 ac 37 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 f2 a8 cc bb ec 52 8f ff d3 4f 1e 29 f8 d2 55 | ab 15 48 e3 86 d2 3c 7c c1 31 02 4c e6 92 88 7e | 1c 57 68 2c 31 6d 99 d6 04 b4 80 d9 9e 5d d6 2f | 5a 7c 33 74 f6 a2 f4 af 71 14 01 00 45 ac 02 2c | ae fd dc f0 fb 16 b1 b8 bb b1 c9 b6 79 4a 45 9c | f4 6e 30 a0 38 dd b1 84 0e 3d b2 47 58 b0 ed c1 | 2c 5c e6 69 11 9f 94 94 7a 6d 4e 80 2c 22 d1 2d | b1 3c 47 06 4d 81 ee b9 c9 ba 0f 94 7b ed d2 71 | 8c 4b 77 a2 43 7f 68 8c 2b 66 69 53 94 cf 5a 27 | 05 7e 88 ec 42 d8 31 27 ae 04 92 bf 4a 26 5e 51 | 58 d6 5c 7a 0b 0b 73 c1 d6 39 9b da c3 56 61 4e | 3f 7e 4e 21 30 a1 53 bd c0 b7 f9 c7 e1 cc 61 3a | e9 b4 0e 5d 6b 1a 6c d3 c1 42 80 a0 b9 ee e4 20 | 50 5f 0b 18 55 d4 17 9c be 51 af c3 be 4e 5f 48 | b1 02 bd 4d 0a 84 45 32 17 0f c9 bf 50 68 f3 a6 | 11 69 ef 13 ba a2 fb dd c4 95 c8 b3 71 8c 02 9e | 29 00 00 24 20 3c 42 13 ea f1 47 8b ab 88 6c 38 | 29 a2 e3 60 5f 2e e8 36 7d 92 76 6d 48 1c fe a8 | 8c f2 3e 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 92 97 87 98 41 7a 2f 24 03 5c de | 5f 9b fc ff 10 46 f5 79 00 00 00 1c 00 00 40 05 | 10 63 6f 88 71 aa 1b 8a ba b8 d4 ac c9 e8 55 07 | 6b c5 63 c0 | libevent_free: release ptr-libevent@0x7fb37c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5f0d0 | #34 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d a4 8e 40 25 ac 37 c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #34 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #34 | rejected packet: | 6d a4 8e 40 25 ac 37 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #34: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a50110 | handling event EVENT_RETRANSMIT for parent state #234 | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #234 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #234 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49635.727363; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009202 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5f0d0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #234 | libevent_malloc: new ptr-libevent@0x7fb37c0251c0 size 128 "road-eastnet-nonat-234" #234: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #234) | f2 fd b6 5b dd 65 ca 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 84 9f 8e f2 4d ae 28 c3 a6 33 85 a7 41 17 2e | a7 fb 37 ec dc 5e da 22 ed a7 d6 7f e1 29 5e 3a | c1 0a e8 67 19 e8 ac d8 ab c4 ce 43 3f 4e 0f bb | 7c 98 41 2b 6f 77 ca d9 32 a6 af f9 98 cd dd 12 | d9 37 bd e9 25 be 75 b5 bd 5e e0 83 6f 45 f8 da | 18 94 6a f4 88 bf 0e 4d e2 07 2b 36 d8 6f 3a 20 | 7f 78 6a 85 8a e5 3c dd 81 bb 63 90 5e cb bc ba | da ba 10 8a c6 0e 8a aa 71 5a 96 4e 6c 70 41 b3 | b5 ed c1 a3 26 f6 9d 2f 3e 30 60 a8 7a d4 51 c7 | c1 d0 6f 12 78 fa f6 7a 64 88 82 80 72 24 ff 23 | 06 91 a9 95 a1 36 33 ce f2 c2 55 d0 b5 3c 49 79 | 6f 7f 3e 42 f0 3e 13 68 8b e1 82 c2 f7 ef 92 e7 | 73 e6 b2 0b c7 04 76 33 01 80 30 de 76 f1 e6 56 | a7 c5 01 91 93 65 f4 09 85 c4 02 fa 63 8b e5 e6 | 21 78 9f 81 bf e4 b0 d6 2d 62 90 d2 7c 1e 4b d9 | ae 42 db a5 3c 94 61 a1 2c 3b 37 25 2d 53 32 5c | 29 00 00 24 9d 5d 40 b5 2d ec 67 ae 83 64 17 c2 | 32 3b d8 b9 21 ed 79 bc f4 91 0a 50 e4 b3 2c c0 | f4 72 58 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 89 bc a1 a0 be dd 06 e7 d6 84 21 | 72 6a c6 f8 b6 a8 a1 51 00 00 00 1c 00 00 40 05 | 53 6b 47 d7 1e 7d 4e e3 0d 3e 41 f7 75 f0 92 15 | 7c 13 7e ba | libevent_free: release ptr-libevent@0x557d469e1b60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a50110 | #234 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 fd b6 5b dd 65 ca 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #234 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #234 | rejected packet: | f2 fd b6 5b dd 65 ca 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #234: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab39c0 | handling event EVENT_RETRANSMIT for parent state #35 | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #35 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #35 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49635.752715; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.01279 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a50110 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #35 | libevent_malloc: new ptr-libevent@0x557d469e1b60 size 128 "road-eastnet-nonat-35" #35: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #35) | ef 15 ea 36 a5 a5 5c 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 96 b3 aa c0 4d d9 88 e5 ac e1 94 c5 3f 96 d9 | b4 11 6c 13 85 3c 47 49 a4 e7 6c bf 49 2c f7 e6 | 82 c1 3a 00 a1 f9 46 f7 54 13 9f 65 48 18 8b 9f | e6 da f8 f3 07 a0 ac 41 d5 a9 3b e6 a7 7c a3 81 | db 32 9e 99 47 70 04 b0 f4 2d a4 b0 a4 3b e1 28 | 9f 63 a2 94 b7 1f 9e 68 18 47 6f ef 05 c0 65 15 | cc 6b 7e 6d 5e e8 2a 06 87 47 6c aa e2 89 a2 b1 | 87 d5 9a c7 5c f6 c5 c9 ef 9a f5 1e 14 44 ed f6 | 21 c2 10 91 92 32 f4 48 3d 48 76 7f da 54 41 70 | 3a 27 f3 0e a6 36 ab ef 51 4a ee 27 f3 fa b5 4a | 81 80 97 f8 12 4a 6b 6e 11 f7 41 fe d5 56 ec af | 7e dc 33 c0 77 e2 37 b5 3f fc b0 40 58 cb 92 b6 | 44 3d 99 0d 17 ae 15 bb a7 c0 2c 1d dc 42 f0 67 | d6 5a 17 88 ce 32 f6 da 90 65 b7 17 83 70 da 67 | c5 33 42 42 d7 1a 6c 70 ed 40 df e9 ee 39 2a 8f | f5 b4 db 3f e7 42 51 2e 4d a9 fe 76 ba 09 20 58 | 29 00 00 24 f0 8c e1 d2 ee 2f 9e 4d 17 8a 20 ca | cf 55 95 6a 83 c3 98 8f db 61 db bb f1 69 5e b0 | e6 61 e7 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 5c ea 28 17 8f c3 f5 57 90 ad 1e | 3a ae c2 e5 e1 92 7b 3c 00 00 00 1c 00 00 40 05 | cb 88 24 12 73 0e 41 cb fe 6b 7e d6 a5 c0 bb a2 | e1 60 1e c0 | libevent_free: release ptr-libevent@0x7fb340030080 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab39c0 | #35 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 15 ea 36 a5 a5 5c 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #35 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #35 | rejected packet: | ef 15 ea 36 a5 a5 5c 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #35: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_RETRANSMIT for parent state #36 | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #36 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #36 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49635.817108; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005908 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab39c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #36 | libevent_malloc: new ptr-libevent@0x7fb340030080 size 128 "road-eastnet-nonat-36" #36: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #36) | c4 93 27 79 3b f0 36 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 44 1e 02 70 5f fd 14 41 57 b4 33 c5 4d c1 bf | 56 a3 d0 f5 4b 1b 15 73 5b 56 52 91 f2 4c 9d dc | 3f 2d 5a 36 27 be 97 1b 2d 43 21 16 b5 25 60 73 | 31 d7 04 cb ac b3 fd 19 61 2f 36 91 05 d7 55 8c | 92 5d 99 4b ae f6 cf a1 6e 2e de fa cb a4 7e 7e | b4 08 08 4f 90 51 13 b7 5b cb 7e 2c db 61 c5 d9 | d2 2f 86 cb df 97 d1 5e d4 95 3b c2 71 e2 2b bf | 7b e5 e9 8b bd 5c de 24 ac 5a 8b 4a 5d 3b ff 1e | f8 f4 2b 7b 96 0c 02 8f ac d9 62 f7 21 fb 07 5e | 9d 3f 41 15 d1 79 65 31 2a 68 5a 1a 56 fc 9c 2a | 20 90 63 93 fd d9 59 08 0d 3a 51 cc ee 1b ca 83 | 3c 5f 8f 03 9c cf 6f 04 52 23 a8 cb 50 43 72 18 | 78 cb 0f 8d bf 67 75 81 61 d9 91 a3 5f f5 1e ad | 09 8c 98 32 17 11 19 f3 54 f2 c6 36 e6 24 63 e2 | 41 b5 39 5c af a7 57 20 af 37 ac c1 12 94 ec 3a | e0 ac a7 07 42 78 d2 32 96 5c a0 ed 7e 90 04 46 | 29 00 00 24 e4 05 e8 ad 6f 35 18 e8 9c ba 2a d7 | ba f9 eb 8c c3 7b 43 88 9a 23 1f e0 cb de a0 8e | 76 67 65 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab a4 b2 11 db 45 90 fb 99 ab 4d 81 | 85 c6 e5 03 d5 18 31 7d 00 00 00 1c 00 00 40 05 | 9e c9 75 d2 3b 5d 13 cd bd fe b5 96 1f 79 bf 21 | fa a0 06 d7 | libevent_free: release ptr-libevent@0x7fb37c046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | #36 spent 0.189 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 93 27 79 3b f0 36 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #36 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #36 | rejected packet: | c4 93 27 79 3b f0 36 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #36: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0578 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a54250 | handling event EVENT_RETRANSMIT for parent state #37 | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #37 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #37 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49635.890484; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006656 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #37 | libevent_malloc: new ptr-libevent@0x7fb37c046040 size 128 "road-eastnet-nonat-37" #37: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #37) | 17 02 22 e9 ab 5b 91 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f f0 24 04 15 84 3f 8d a0 47 69 89 53 1c 67 b8 | 33 2a a4 f5 84 95 fd 12 c4 95 3c eb 03 f8 76 46 | 15 20 9b c5 17 a5 48 da 05 b3 14 87 45 a5 03 ce | 15 45 04 84 4f ce c5 7f 7f d9 f6 69 e6 fa 2a ce | 98 6a 3f d1 cc fe 7f e2 41 fd 61 7b af af 30 7e | 0a 75 d2 92 05 56 ed e9 09 bd bc db cd 80 58 20 | 86 cc 39 bd f2 1c dd 9d 77 bb 28 c3 7e a4 97 11 | 86 79 5d 68 34 e4 33 4c b3 b1 ed 26 ab a1 c5 7d | dd f5 b8 0e 55 cd f4 1f ea 00 32 c8 4b fd 8f a5 | 71 8b 05 79 0a 34 41 68 bd c7 7d 96 51 77 5e 6b | d9 65 0d cf f7 34 f5 5b 4b bf 3e ae f6 63 25 2e | ea 9e 2a 3f 64 43 4d 0c 4a de f8 57 38 d7 5a c8 | 89 09 d3 81 3b 61 a8 5e 87 ab 34 9f c0 a6 2e 8e | a4 55 d9 e8 61 49 db 19 2f a0 89 a1 e6 24 e6 14 | 77 4b 63 b1 94 0b fe b9 37 07 5d a5 3f f4 4e 97 | 2a 98 e3 ca 6e 7f 3f a3 88 c3 da 3a c0 a1 79 c5 | 29 00 00 24 75 33 7f 61 eb 0d 1b f9 84 ec ca bb | af cf f0 96 3c 65 2f 09 ef 72 4a c4 05 f7 86 9b | fc 7f 3c 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 5d ed 76 d7 41 0c 3c 88 ec 15 de | 69 08 6f 06 52 19 de 0f 00 00 00 1c 00 00 40 05 | 52 bb 9d ab bf 18 49 c2 17 f2 d0 27 18 10 66 1c | c7 07 9d fe | libevent_free: release ptr-libevent@0x7fb388022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a54250 | #37 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 02 22 e9 ab 5b 91 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #37 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #37 | rejected packet: | 17 02 22 e9 ab 5b 91 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #37: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0641 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_RETRANSMIT for parent state #235 | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #235 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #235 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49635.899824; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005336 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a54250 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #235 | libevent_malloc: new ptr-libevent@0x7fb388022480 size 128 "road-eastnet-nonat-235" #235: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #235) | 7e 07 6a 55 b2 86 f9 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 15 b0 98 97 a3 9b e7 91 af 63 8f 32 c2 f0 a6 | 5a 92 40 40 d6 e9 e6 fc ec 5f 9d 94 27 3d 04 cc | 99 dc 7e ac 23 a0 7a 25 ef 03 33 84 5f 4e 3e 44 | ab 45 fc 51 2f 77 0e 04 9c 57 58 3e e3 c4 95 ac | 99 c6 cf 74 8b ee 49 3f 97 64 5a ae 23 26 21 49 | 82 68 17 68 04 08 36 f9 22 38 ec 23 ce 8f 41 44 | bf d0 3d c1 f8 23 b3 6a aa 39 20 ad 4f 3f f3 2b | 3d f9 49 23 b6 22 6b 6a 39 8a 61 bb b3 33 4a 8f | 12 ce 51 75 41 2f c2 97 7c 24 15 e6 c7 4c 0b 5a | 7e 98 8c f9 eb 79 4c 87 18 6e 22 0f ce f5 5a f4 | 97 f7 88 3c 20 6b 59 a3 22 56 0b 5d ff 73 43 0c | d0 ab c4 fb b1 97 4e c1 93 9b 6a 7d 3a c0 41 34 | 56 74 13 c4 02 0c 52 4b 7f 7c ed c1 a7 58 84 db | 34 3e fa dc e2 91 c8 b6 c5 5f f0 1a 94 9c 21 62 | 9c 24 2a b8 60 58 3a 4f ea 5e 65 e5 c2 96 45 62 | b2 a3 11 26 4c 94 9a fb e2 2b 93 1c 4f 08 c6 66 | 29 00 00 24 0c f1 17 b1 15 6c 67 72 28 b0 8f 38 | fd 2e 9a ff fb 4a d4 a7 a7 b2 00 ff 88 fe ef 90 | e3 f8 e6 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 78 bf 00 5e f0 c9 41 6d 35 37 22 | b0 4c f8 53 8c eb 59 4e 00 00 00 1c 00 00 40 05 | 6e 5c 6f da 69 07 20 20 73 2e b2 7c a0 00 c1 c2 | 79 44 3d 62 | libevent_free: release ptr-libevent@0x7fb35401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | #235 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 07 6a 55 b2 86 f9 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #235 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #235 | rejected packet: | 7e 07 6a 55 b2 86 f9 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #235: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d590 | handling event EVENT_RETRANSMIT for parent state #38 | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #38 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #38 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49635.975115; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.011083 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #38 | libevent_malloc: new ptr-libevent@0x7fb35401d920 size 128 "road-eastnet-nonat-38" #38: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #38) | 63 6f 4b 9c a2 38 4b f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 c6 a0 5e 80 62 3e 9a 9c 42 e1 05 80 df 04 bf | 1e b5 eb a5 bb ef bc 82 8b e6 75 a7 2e 01 28 64 | e4 76 b9 2e 24 4c bf de dc 13 dd 2b 71 c5 93 43 | 1b 46 d4 7e b2 da 9a 48 5b 59 35 a7 05 07 a3 e4 | 2d c6 06 3d 04 99 06 6d e6 f3 82 a2 e0 b0 3d 7e | 06 24 2a d6 83 0e 98 7d 98 49 2f 5f ab 8e 6a a0 | d8 9e 97 9f 3a b5 0b 41 09 f4 3d 1d 01 c6 79 69 | 84 a4 53 1f bd 4e 48 87 76 0d 6e 5e db cc c6 9f | 32 ff 46 70 0d 72 cf 06 98 99 df 58 29 5b 2c 8c | fb 98 a9 76 0f 25 88 9a f5 19 cc e3 5c 2b 68 1d | 01 4d 25 7a f1 7a 21 df b2 8f 9c 28 7d d1 ec da | 1d aa a1 0e 2a 91 6c fc cd c9 76 e7 51 08 7a ff | e5 ff f8 19 fa 3a 8e cc 1e 84 49 b9 c5 19 d0 a9 | d3 37 e2 20 31 e7 32 dd 71 90 7c 76 34 4e 29 57 | 1e 56 51 56 0c 5f 17 75 67 40 80 dc 44 27 6b 9a | c7 16 b2 3b 68 69 4b 25 42 5f 6c bd 14 34 a0 fd | 29 00 00 24 11 36 0f 5e a0 00 74 be 57 cf e9 ad | 0b 41 64 75 76 be 45 9c 57 4a dd ea fc 94 1e c3 | 3b 87 2f 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b 5e 04 97 03 6e 1a 6a 1c 69 28 d2 | a2 f5 94 bd 95 4c fa 5e 00 00 00 1c 00 00 40 05 | aa 31 5d 54 cf 5a 81 b9 1b cd fe 19 22 77 54 6d | f5 50 1b 4f | libevent_free: release ptr-libevent@0x7fb3480180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d590 | #38 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 6f 4b 9c a2 38 4b f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #38 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #38 | rejected packet: | 63 6f 4b 9c a2 38 4b f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #38: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a672d0 | handling event EVENT_RETRANSMIT for parent state #236 | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #236 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #236 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49636.033459; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.012448 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d590 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #236 | libevent_malloc: new ptr-libevent@0x7fb3480180b0 size 128 "road-eastnet-nonat-236" #236: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #236) | 4f c5 63 73 3b b2 d7 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 5b 06 ee 84 fa 79 7f e6 43 db d2 0d 8b cd f5 | 59 c7 e2 83 26 7e 92 07 02 e5 75 02 5a 6a f0 b8 | 61 d3 80 1a 18 f6 6c 41 f4 8b 1c 06 f8 08 1d ec | 22 4e 32 49 5f 33 c9 49 bb d4 b4 9a 8b 9e f4 b7 | ce cc cf cb 5d b3 17 75 80 5e 65 75 ed 96 58 92 | ba 35 70 a7 18 25 e3 2d 24 94 8c 18 40 c5 8f 8e | 52 27 34 ad d5 17 cd 88 62 97 c4 7d b7 05 9c fd | 87 2b 85 fb 44 37 03 91 16 87 52 0a e0 03 40 76 | 05 68 d4 2b 81 46 59 09 54 29 07 bd 68 5b bc 5c | 8c 95 6c ea 24 20 a3 81 a2 b7 51 34 bf 49 44 7c | d1 b4 84 70 99 94 3b 26 25 f6 f8 e9 a2 1d 40 46 | 82 c9 ad f3 5f 36 60 f9 1a 16 eb 90 3e 33 04 f7 | 6d 37 8a a4 9b 0b b3 e7 22 8c ca b9 99 a2 ef 47 | df af 33 fd 94 a4 95 ab c9 0d 75 62 b8 13 05 a5 | 03 c9 74 d6 f5 9e 6f a1 90 65 6c b2 72 e9 df f5 | 5d 19 cb 15 48 a4 79 d7 52 7c ec ab 28 6e 6d 0a | 29 00 00 24 28 83 19 a9 be e7 a3 f6 92 20 74 48 | e6 d2 29 74 96 b0 77 d3 bd 1e ee 26 dd 0d 67 63 | ff bc dc bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 3a ff 41 6e c5 dd cc 76 37 c9 88 | fe 40 cf a9 30 61 ac fb 00 00 00 1c 00 00 40 05 | e2 5c 52 8d c8 02 86 2e 47 16 0b 04 4f 16 65 56 | c3 38 ce 94 | libevent_free: release ptr-libevent@0x7fb338012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a672d0 | #236 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f c5 63 73 3b b2 d7 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #236 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #236 | rejected packet: | 4f c5 63 73 3b b2 d7 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #236: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6f550 | handling event EVENT_RETRANSMIT for parent state #39 | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #39 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #39 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49636.050851; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00556 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a672d0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #39 | libevent_malloc: new ptr-libevent@0x7fb338012840 size 128 "road-eastnet-nonat-39" #39: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #39) | 19 fb 2f c4 ac 44 fb 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e b1 09 86 9c 45 db 95 7b d2 00 66 c6 50 ec 38 | 85 24 bf d9 80 0e ac 2e 4c 6c 22 df ca 10 97 2e | 3e b3 c6 bc af 43 d2 f1 96 a9 4b 69 aa cd 6c e0 | 9b a6 4b b2 87 0e 1c ca 32 4c 46 ee 52 f9 70 fd | fe 31 27 8d 61 a4 9c 97 7a a3 30 46 a8 d5 6f 83 | a7 6a c3 e9 ff 23 17 48 fe 4f dd cf 4e a9 a1 5e | d7 78 c0 fe 7d d7 62 84 4a b2 9d ae 37 bc ab ed | d5 8c 32 96 61 41 3f 21 7c ca ab 28 b6 ad 04 a3 | c6 dc bc c3 e1 13 16 74 7a 42 5b e7 e2 a2 c1 8c | b7 73 45 24 dc 37 dd 6b f2 55 c7 4f 97 81 79 6f | 14 cb 11 1e b4 40 01 19 cd a9 dd 29 3f 6f e4 ee | 95 68 2f 56 df 0a 08 86 e6 cd 7f a3 7b 00 61 f4 | c5 7c bb 03 05 36 7a 30 d5 36 53 38 4c f8 39 18 | 08 9c f5 06 b6 85 f9 e9 1b ab 6e 6e 92 66 b2 2b | 43 5a 44 5b 6f f1 98 dd 01 3a 01 23 5e f7 bc 7d | 6e f5 05 b9 ec 45 1c 8c 77 33 f8 a3 1c 1e 8c 99 | 29 00 00 24 2f 9c d8 9a 10 ed a2 18 bd 6a 97 cb | 42 26 f8 54 76 a0 4d 6e 60 6c fb c1 ce 0f 53 f0 | 1f 6b 99 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 74 e0 c5 89 b2 32 b1 7d 7b 02 d3 | e0 e6 47 82 80 6f 9f 55 00 00 00 1c 00 00 40 05 | 2e a2 7a f5 ee f4 77 35 9e db 48 5d 65 9b e7 f5 | e4 1e af e9 | libevent_free: release ptr-libevent@0x7fb33803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6f550 | #39 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 19 fb 2f c4 ac 44 fb 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #39 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #39 | rejected packet: | 19 fb 2f c4 ac 44 fb 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #39: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0692 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a52c90 | handling event EVENT_RETRANSMIT for parent state #40 | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #40 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #40 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49636.119249; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008973 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6f550 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #40 | libevent_malloc: new ptr-libevent@0x7fb33803b0b0 size 128 "road-eastnet-nonat-40" #40: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #40) | f4 2d ea 23 2d fd 9f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 1a 9e 5c fb fb e3 3a 12 40 55 ea 02 66 64 cb | 69 42 9f 9e 73 38 34 f9 9b 29 99 d0 1f 2f 62 b0 | ff 78 90 10 b8 86 3f 49 a8 32 be f6 08 0d 11 29 | 94 2b 8b de b8 63 2c 35 79 92 00 39 68 56 d7 ad | 7e 9a a2 59 50 2b c4 f8 63 a3 0c 5d 5e 44 62 5b | fc 42 68 dd ca 56 4c 44 63 17 39 39 e0 00 1c 8f | c5 28 a6 4f 80 e9 f0 8c 5a ea 63 37 5f d7 0a a3 | b8 dc 6a fd 41 02 14 01 fa 2f 62 ae cb f1 1e 40 | 2f 20 1d 4c b4 7d c9 2c fa 60 f5 5e 61 26 a0 89 | b5 80 ba fe 31 f9 79 3e 12 33 cf 6c 99 9f 52 55 | 62 d6 02 f9 0e 35 e1 e7 8d 67 93 09 10 77 15 30 | 4a e9 d6 a0 31 50 fb be 13 05 50 dc f4 46 03 08 | 2f 95 1b 33 25 b1 ea 42 27 b1 8d 6c a6 26 e8 12 | 28 ee 49 16 a3 ec 76 ad 9e 1b cb d5 8a 26 5b 22 | 55 46 26 40 fb a4 30 9e 31 e9 07 5c 3b f7 53 4f | 4f ec 0e ee ad 7e 3f fc 05 9c b5 15 17 a2 62 3f | 29 00 00 24 28 3a b9 16 f5 d3 fa 3e 82 0e 6c a5 | b6 e0 32 27 f5 86 22 6d 8d 85 0f 17 f1 b4 a5 df | eb 51 66 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 e9 4b 4d 06 92 e2 ba cc 1d e9 b2 | 45 c8 92 47 34 22 29 80 00 00 00 1c 00 00 40 05 | 84 da 3f 80 5c a8 47 c1 08 aa 1f 48 69 9f 8f ac | 3e 3c 6c 93 | libevent_free: release ptr-libevent@0x7fb38803dab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a52c90 | #40 spent 0.222 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 2d ea 23 2d fd 9f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #40 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #40 | rejected packet: | f4 2d ea 23 2d fd 9f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #40: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0949 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0eac0 | handling event EVENT_RETRANSMIT for parent state #237 | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #237 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #237 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49636.151704; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006081 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a52c90 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #237 | libevent_malloc: new ptr-libevent@0x7fb38803dab0 size 128 "road-eastnet-nonat-237" #237: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #237) | 4f 30 a3 80 9f 9f 65 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 80 47 96 1c c9 51 f1 0b e5 85 bc ba 8d d8 2f | 7e 2e aa 44 d1 4d 1c a5 32 20 f2 ef d0 59 1d c7 | a5 77 ca 5e 02 89 87 a6 bb c0 e0 54 5b b5 84 79 | 29 9f bb 42 c6 20 c7 56 ce cc 84 c6 1e c1 d2 f4 | 13 76 c9 2e e4 05 e9 37 e6 bd 6f 35 dc f2 cd db | 35 16 6c ad 20 92 a2 8f 48 33 b4 20 26 8f 59 2d | 4c d4 d1 24 86 23 46 ee 6e c6 b6 24 d5 4f 00 17 | 52 61 b1 bb 85 d2 0d d3 70 1d c1 d8 3c 26 6e b6 | 77 3b f1 af 93 e8 cc 5f cb 1e 13 01 93 4d 4b b3 | 72 06 cc a6 aa 05 5c 87 d3 9f 0b a2 d6 36 1e 41 | 74 1d 84 0c 84 17 40 09 ae 80 b1 14 f6 05 f4 d7 | 5d 5f bd 62 54 0a 41 03 07 59 f0 77 45 28 e1 78 | 15 ba 85 f9 68 5c c5 ec 72 3c 38 3b 02 ac c0 42 | c6 0b db 17 1d c8 55 9c ae 19 48 78 01 ba db 02 | d5 a9 df ad 4f 67 c1 5c 0b ad 91 db 71 af d7 d7 | 81 9f c3 2e 7e 4d 1a 85 96 12 81 67 a7 1b 56 fa | 29 00 00 24 e8 e3 42 9e a6 0b 6b 38 33 d4 39 b2 | ba a4 24 74 62 c1 99 66 60 77 d8 65 6c a2 d4 f2 | 70 50 e9 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 8a 35 95 f7 6d e2 2a d4 81 0f d3 | 67 1d 3d 86 23 6d 84 2e 00 00 00 1c 00 00 40 05 | 36 30 d8 35 65 36 0c cb 2b 9c c9 7a 14 59 39 58 | c5 b8 4c 54 | libevent_free: release ptr-libevent@0x7fb3540300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0eac0 | #237 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 30 a3 80 9f 9f 65 f0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #237 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #237 | rejected packet: | 4f 30 a3 80 9f 9f 65 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #237: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0786 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a76210 | handling event EVENT_RETRANSMIT for parent state #41 | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #41 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #41 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49636.211306; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006761 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0eac0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #41 | libevent_malloc: new ptr-libevent@0x7fb3540300e0 size 128 "road-eastnet-nonat-41" #41: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #41) | 8c ff 26 ec fd d0 54 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 6e ec 95 3c 3a 16 99 41 58 58 6d 01 e2 00 52 | 61 4b c1 ec e1 3d d8 4e 54 c1 3f 99 6b 75 66 7c | 92 13 65 ae e7 70 46 75 9c c5 22 7e 39 16 2c 7c | ed 79 f7 7b 1e 03 31 32 5f 32 c2 43 74 2e 80 66 | 05 70 11 cc 43 ce 1e db 54 28 24 d1 42 b1 78 ad | e4 d1 e6 87 87 84 0f b3 11 50 a6 79 e1 08 7c 97 | 7e bd ba 46 ef f8 51 ce 68 86 83 2a 2c 29 00 29 | a5 58 88 f4 ed 2a f4 20 30 da 5d b1 69 45 2e 86 | 07 5f aa 0a 89 4a 6e 50 df 32 c3 37 59 a0 ba ad | 86 bd 19 1f 9a e2 19 57 1e fc 59 a2 20 ba a6 61 | df 8c b1 78 f4 73 20 28 d7 5d 27 a9 6d f4 51 05 | 00 85 1f 11 24 82 a0 ad b8 70 fc 6e 4d 99 a5 50 | dd 2e 79 4a 4c a1 78 07 7c f4 48 8d c5 cd ae 3d | 60 f1 3e 46 13 92 0c ad 34 dc 62 b8 45 01 1d 0e | 54 aa 15 f0 b8 36 03 5c 9a b5 ba b5 7c 77 32 6f | a5 95 b6 eb ec c2 d3 a2 c8 7a f9 23 04 ed b5 3b | 29 00 00 24 d2 1e ab ae e7 c2 8c f2 ef 74 c1 f0 | 3d f2 d7 f9 46 a9 e4 e0 b6 87 92 c1 10 9a fa bd | 74 9b e3 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 98 3f 00 de 9d 4b 8f 8e e4 88 e6 | cb 33 f8 3a c9 9d db 23 00 00 00 1c 00 00 40 05 | 7d 19 19 07 bb fc 4c f4 5b 43 3f 70 14 2d 10 a5 | 77 03 39 4f | libevent_free: release ptr-libevent@0x7fb38002d3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a76210 | #41 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c ff 26 ec fd d0 54 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #41 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #41 | rejected packet: | 8c ff 26 ec fd d0 54 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #41: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aee100 | handling event EVENT_RETRANSMIT for parent state #238 | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #238 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #238 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49636.229664; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.013902 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a76210 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #238 | libevent_malloc: new ptr-libevent@0x7fb38002d3a0 size 128 "road-eastnet-nonat-238" #238: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #238) | f6 ab 39 cf c5 7d 06 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af d3 7b 83 d9 03 ff 12 c8 97 56 ab b2 14 10 e0 | 48 f1 3b e3 4f 64 7a 9a 9e ba 3d 1c 59 ad a8 95 | bd 51 64 ba be 30 e1 34 45 a4 34 1f 3e df 3f d6 | 86 b0 59 41 db 94 3d 0d e6 62 59 ee 2c dc c0 b6 | 14 1d 3c ee 48 4c 83 08 18 f6 26 a9 cc aa db a7 | 11 c4 2a 15 e2 1f 73 e6 9e 15 53 88 2a 78 32 86 | e7 60 9e db ba 38 76 7a 13 5c c5 ac fd 1c e1 b3 | d9 b0 34 80 53 e2 98 a7 ba 07 c7 e0 29 79 99 fa | 34 4e 3c 41 8c 32 8f 62 7b 0b 06 3e 96 0f e4 ec | 50 ea 8b 72 ce 3c a2 48 3d 50 a6 bf fa b9 6f 49 | 42 35 90 06 bb 42 36 54 c0 36 66 cb e8 62 33 36 | 54 3c 66 18 ff f4 71 a8 dc 58 87 96 fa c3 1b c5 | dd a8 8d cc aa e7 e2 09 78 51 8e a8 fa 1a ff ca | 8e a6 7b eb 75 ad 7d 26 12 45 b0 78 8a db a7 e1 | 91 4e 5d 71 95 e7 03 95 d9 44 14 28 62 b8 ce bc | 33 38 e8 30 35 30 6f c6 da 40 e4 e4 28 6a f5 3c | 29 00 00 24 e9 54 88 95 a6 38 9d 64 f1 e3 1e dc | e9 d3 25 19 54 a9 08 d5 30 10 d0 0d 46 91 20 94 | d2 ec 4b e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 09 df c5 c7 bf ac 94 7a a2 81 0c | 76 04 c4 df 2b 4d 28 f9 00 00 00 1c 00 00 40 05 | 49 c2 83 19 04 1a b6 87 e7 32 12 a0 0a 0c 4f 92 | e7 02 e1 ed | libevent_free: release ptr-libevent@0x7fb34c046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aee100 | #238 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 ab 39 cf c5 7d 06 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #238 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #238 | rejected packet: | f6 ab 39 cf c5 7d 06 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #238: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0726 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae48c0 | handling event EVENT_RETRANSMIT for parent state #42 | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #42 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #42 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49636.295064; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006712 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aee100 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #42 | libevent_malloc: new ptr-libevent@0x7fb34c046040 size 128 "road-eastnet-nonat-42" #42: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #42) | 6d 45 59 82 ce 2c 77 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 19 87 21 99 aa 5a cb db ce 0f 02 f2 50 c9 ac 92 | 89 7c 70 85 a8 a7 33 4a c2 44 36 a5 03 8e 1f 50 | c8 86 2e d1 a1 d8 14 17 9c 7c a1 44 65 ba 61 77 | f0 62 19 6f f9 72 cc 36 22 03 c3 7d e3 8c 01 7c | 58 c0 91 2e 4f 24 ac cd af f7 da 61 3e 4b 43 c9 | b4 5d 67 e2 f1 65 be 23 88 f7 f4 e6 25 50 c9 e3 | 21 af 1c 45 62 8a 73 3a 98 47 b9 78 6f ee 87 26 | 3b 63 01 1e 58 61 99 0e 7a 91 7d 30 e0 59 53 0b | 92 57 66 fd a7 1f 2b 11 d7 59 95 9a 31 fc 95 b7 | 6b 6d 54 d3 d2 0f 8f 6e 22 a6 95 24 ad 69 c7 e4 | 30 99 2e f3 f9 ce 36 7f 2b 10 24 3b 8a de bf 7e | cb e6 f5 71 51 3c fe 08 40 b7 0a aa 06 06 b7 d2 | 69 fa d5 d4 16 ea b0 b1 e6 af 20 69 3c 12 1e 86 | 3a 05 a1 45 01 d3 59 e6 49 c9 c2 6a 69 6b a1 a1 | b0 18 e7 68 dc 1f 70 e8 33 59 8d 8e 1f 6a e1 13 | 5e 04 b2 02 62 fb f4 16 44 cd 9d 1e 33 84 73 83 | 29 00 00 24 98 90 54 f6 26 53 aa 96 7a 47 ff f3 | 5b dc e1 95 5c f0 6d 5d ed 6d 00 c6 1d e8 59 f1 | 2a 1c 8a 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 cb 92 0c 07 24 d9 90 48 22 d8 76 | e5 5b bc c8 39 99 d2 4d 00 00 00 1c 00 00 40 05 | cb e3 e2 5e 9a 09 f4 90 ee 73 df 07 77 16 6b 37 | da 99 3b e3 | libevent_free: release ptr-libevent@0x7fb3480251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae48c0 | #42 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 45 59 82 ce 2c 77 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #42 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #42 | rejected packet: | 6d 45 59 82 ce 2c 77 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #42: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25c40 | handling event EVENT_RETRANSMIT for parent state #239 | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #239 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #239 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49636.32635; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.023859 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae48c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #239 | libevent_malloc: new ptr-libevent@0x7fb3480251c0 size 128 "road-eastnet-nonat-239" #239: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #239) | b9 4e df 3e 84 90 25 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea ef 5f 41 79 0b fe 19 84 c3 03 27 cb e7 22 b5 | 4b 8d ad 5a dd 57 ea a0 d4 aa e3 61 84 72 47 6a | 4d 42 f7 0c 18 4a 15 88 92 91 45 67 3d 64 ce a8 | f0 3e 2a 18 f5 33 74 78 5b 6d 2d ad 60 68 a7 2c | 42 44 24 a7 49 23 19 0c fa 8d 52 0c 5c f4 c5 65 | 9c 02 7d 4d 52 90 91 ba 69 4d a0 bb 25 6e ec 3a | e9 30 9b 1f f4 e8 ec d1 8d 6a 8c 3f 41 9e 38 b3 | 41 e7 4e 00 b5 c6 ea 1b 8f 24 c7 a8 c4 ec 84 ef | e4 cf 76 d1 2b eb 8f 91 66 1a d6 b3 71 c5 5b 71 | c2 ce 48 72 d6 b0 0f 07 ef 9a 8e fd 8a 44 8d eb | 79 c7 74 c1 a0 f8 4b 78 8d 62 3e 5a d2 f7 58 20 | ab d5 b3 52 66 2e d1 5e a8 11 59 26 5b 03 c4 c7 | 72 cc b1 7b df 43 62 14 05 c3 52 d4 b9 35 c7 18 | ab d1 fe d6 f2 c4 bf d0 34 85 da 05 d8 1c 9e bd | 53 20 10 e1 51 57 70 e6 78 d1 56 9f cf b4 da 8d | 2c 7b cb 52 64 97 83 25 dd f7 88 42 c4 42 ba 2b | 29 00 00 24 60 20 cc a1 fe 49 9c e3 77 c9 2c 1b | 58 3a e0 e5 74 37 cc 08 7f e8 2c 53 5a 76 29 4f | ad de 78 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 5b b0 88 0f ba 91 5e f1 72 ec fe | c8 60 42 a1 68 5e 5f c0 00 00 00 1c 00 00 40 05 | 4c 5b ce 23 3c 60 29 97 fc d7 dc 03 c2 55 73 9c | d8 91 a1 ef | libevent_free: release ptr-libevent@0x7fb364017f20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c40 | #239 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 4e df 3e 84 90 25 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #239 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #239 | rejected packet: | b9 4e df 3e 84 90 25 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #239: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbbc0 | handling event EVENT_RETRANSMIT for parent state #43 | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #43 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #43 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49636.375717; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.011761 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c40 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #43 | libevent_malloc: new ptr-libevent@0x7fb364017f20 size 128 "road-eastnet-nonat-43" #43: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #43) | cc ee 6c 19 e2 66 91 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 b3 dc 74 af 8b 5f 17 f2 a2 67 e8 55 b6 7f 2f | d6 4e 7a 73 eb 13 7d 78 44 82 5e 9f c0 c9 a7 ce | 19 55 10 32 8b 27 a5 29 28 74 fd 00 e6 f7 6a 74 | 56 7d 4b 3f aa d7 b5 46 cb 2d 3c a3 dc 3f bf 05 | 8d ef fa 60 0a d7 e7 b4 43 44 81 a1 10 dd db 69 | 30 53 16 90 a0 49 c9 94 16 9b 8e 16 05 cc a3 b0 | bb c8 6f 12 2c 69 ac ba c2 57 c1 0e 1d 24 c4 b7 | c5 6e 9f 50 e2 e4 26 8c 25 36 d7 6d d8 cd 2c bd | d4 0a 33 47 c9 6e 1d c8 6c 02 27 85 0b ac 4e d8 | 84 b3 28 76 fc c6 2f a9 af 4b b0 f5 08 9e 56 b5 | 24 d4 f4 cb 0a 9c 0d ce 12 fa 25 29 9d 95 d6 4a | 9a e8 aa eb d1 08 9a 51 c5 21 4d b3 dd e9 4f d9 | a6 74 14 2d 42 fa 5e 68 63 d0 8e 8d 34 39 23 04 | 84 91 4d 1d 1d 39 77 e7 bb f1 e3 79 e8 0b 4e 9f | 52 2d 52 8d 33 23 04 37 3b 2c 9b 0f 37 da 18 16 | 07 6b 4f 80 6f e8 48 15 68 23 83 ca b6 b1 12 eb | 29 00 00 24 d5 f8 b0 cb f4 3b d7 c6 a9 5b 1f ef | 6f 5a 34 02 07 02 b5 92 c9 43 df 42 45 9e 46 a4 | f2 42 44 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 70 b3 40 c0 d2 23 ad 4c 6d 70 f1 | 0b c9 5a 99 fd 55 fa c5 00 00 00 1c 00 00 40 05 | fc 9d 2b d9 20 f9 c1 0e d3 88 83 de d6 d0 5e 66 | 9c 2c 6f e5 | libevent_free: release ptr-libevent@0x7fb350035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbbc0 | #43 spent 0.184 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc ee 6c 19 e2 66 91 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #43 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #43 | rejected packet: | cc ee 6c 19 e2 66 91 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #43: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0794 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #240 | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #240 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #240 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49636.401139; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009025 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbbc0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #240 | libevent_malloc: new ptr-libevent@0x7fb350035930 size 128 "road-eastnet-nonat-240" #240: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #240) | 52 3d c4 7d aa 75 f9 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 b8 f7 97 d2 8e a4 26 e4 de 50 11 3b 27 c2 bf | 82 42 f8 30 a7 cf e7 f1 22 7e 96 6e 08 55 b8 5b | 99 ce ba b9 bc a4 b9 85 84 1c 35 bd 81 0b 36 0d | b0 03 99 1c 13 93 72 39 72 77 b7 23 f3 36 8a 70 | 77 80 87 4b 02 4d f9 86 a0 7e c1 4d a8 f2 4c 39 | d7 80 8b 66 22 e6 a4 de 4b 09 73 0d 3d 7c b2 2f | 50 8d 5f 1f 57 2a bd 9f ac c8 a9 74 90 54 67 b7 | 8f c8 3d 39 71 39 c6 de 18 02 eb c5 ea 94 b8 db | 08 c3 39 15 f9 0b b0 93 02 0a 8a a7 ec 92 53 e4 | 1e 2b 04 08 46 40 50 55 30 ed 5b e2 89 d0 46 9a | af 8e 24 41 aa aa b9 1a e4 ce 8c fe 9d a8 de b8 | f4 9b 8a 9d 2c 1b bf b8 d5 b4 e2 72 19 89 07 85 | 8b d5 73 d5 4b b2 72 a1 17 f2 16 b2 06 c3 69 10 | 03 64 01 f6 2e ee b3 bb 12 bf 7f 2a 4b 56 f5 04 | 51 3d ee 1a 3c 36 62 a8 15 0b 0b b5 26 c4 ba ef | d2 cb 15 c8 7e 83 38 88 e7 bf 96 1b 07 79 a7 4b | 29 00 00 24 eb a6 92 08 8f 76 ab e5 c4 52 e9 41 | 1d 77 03 c7 35 5c e5 3a 95 58 fe 07 d6 1d ad f0 | 56 12 6d d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 c9 c0 38 06 3a 92 7e a1 78 c0 15 | 6c a9 8e 74 3a a1 8f 67 00 00 00 1c 00 00 40 05 | 56 20 31 94 4b 81 36 39 3c f9 b9 11 bf 66 a1 27 | 0d 62 c5 10 | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #240 spent 0.25 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 3d c4 7d aa 75 f9 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #240 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #240 | rejected packet: | 52 3d c4 7d aa 75 f9 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #240: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.112 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #44 | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #44 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #44 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49636.438702; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006542 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #44 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-44" #44: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #44) | 2c a5 57 82 94 bb 0c bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f f1 d9 3a 5c ec da ab 46 a0 1a 50 8e c5 b2 4a | 63 93 0d d6 bb 0b cb a2 7b 64 4c d6 0d 5d 75 c0 | a4 fb 12 20 36 86 d2 5a 85 de 9f 1a 56 dd 51 88 | 1f dd 14 6d 54 37 65 2c 39 00 b9 0b d0 9a b8 93 | dd 72 9a 78 33 2f fe d8 37 67 48 08 b2 16 1f 29 | 2a f2 be 3c 42 f3 72 0d 31 7d f4 16 71 3f 2a 28 | a2 72 a2 07 56 93 05 b3 01 4f f8 0a 3d 17 c2 61 | 36 84 95 ef b4 4f 95 5b 93 28 0b 0c 46 73 8a 49 | 11 16 41 b2 73 0b 44 cf a4 af 2f d7 2a 7a 6d 3e | 45 30 bc f5 de 74 14 4c f1 52 50 35 c7 29 67 5d | 02 d9 88 3e 6a e4 83 d6 7c b8 69 a3 7c 7f 9b 8b | 37 21 48 68 00 9a 01 a3 9a d7 3b 02 8c 67 ac 11 | 42 36 9e 84 ad 85 da a3 35 c1 ee c3 6a 24 37 55 | cc 67 9a 57 48 6e 0b 5c b6 9c 4d 16 ed 25 57 02 | 16 2f e6 f6 ce 2a b1 ca e6 1e 1f f9 44 d1 46 60 | 1f 00 3a 24 c7 f4 7b 04 f3 08 7e 6f de 0b 6c 0f | 29 00 00 24 c3 85 c7 9f 53 c2 4b 6d 4a b2 71 6f | 5f 3f 70 d0 bf 0d 26 13 04 46 9b 8c 51 07 8b 19 | bb fc 96 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f 56 cd 95 dd 34 fe 03 70 04 69 b5 | 7b 30 2c 80 a8 67 5b f1 00 00 00 1c 00 00 40 05 | 20 cd 88 b3 c4 29 91 b7 4b 43 e6 f4 9f a3 71 4b | c5 83 8c 17 | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #44 spent 0.371 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c a5 57 82 94 bb 0c bd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #44 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #44 | rejected packet: | 2c a5 57 82 94 bb 0c bd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #44: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.161 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #241 | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #241 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #241 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49636.484582; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004161 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #241 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 "road-eastnet-nonat-241" #241: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #241) | ed bf c0 ae d9 fd 74 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 7f 1d 53 5e bf 7c 50 89 9a 1b 66 7a f6 ac 57 | 1e 44 b6 4e f9 ce e0 60 9e 35 82 8c 12 e1 ec 87 | c3 32 1d d0 30 6f 24 b0 84 5b 58 a3 dd 46 7f 56 | 3a fc a0 86 c1 a5 f0 b8 b4 7f c2 24 a0 35 a3 8b | 46 8b ad d0 3a 85 a8 93 6d 92 12 5e c7 60 d3 02 | 9d 48 49 61 d0 53 cf 87 bc ba 4a 86 e9 1d 0e c4 | 8a 55 24 90 50 13 2a fe 86 c6 6d 09 e7 31 26 ca | d2 d8 c1 f1 76 8e 79 98 8c eb 73 50 64 00 6e af | 8a ae f2 36 6c c7 fa cd 65 22 6c 5b 48 98 da 47 | c0 bc 45 31 fc 5e 0f aa b4 b8 1d d3 be 55 8c ba | 12 b5 d1 65 9a 9f 14 76 d4 89 e3 78 f3 26 29 2e | 46 8d 9d 7c 77 7b 47 8f 64 31 0d 93 e5 f5 e2 8f | 76 81 eb ad 7e 90 fd 6f b1 86 5e 11 a2 e7 77 5f | c1 4e 81 30 92 43 c5 b4 66 60 7f 33 52 22 85 c1 | 6f 01 81 ec 5d 5f 91 b7 53 01 fe 18 96 c2 64 e9 | d4 ad d0 b7 b7 a3 ba e1 97 81 a4 d5 9e 61 d0 8e | 29 00 00 24 48 1f 7b 4e 8c 39 27 4c 54 7b 31 27 | 38 83 2b 38 ab a8 0f 41 0e 72 e0 b6 b5 f5 a8 48 | 24 b7 3e 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c d9 59 12 c5 45 19 36 85 eb ed 91 | 74 0a b9 7e c6 b2 17 c0 00 00 00 1c 00 00 40 05 | 8c de 28 49 d8 e8 ba a2 04 93 2a 1c a7 e3 0e 84 | b2 9d 1f bb | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #241 spent 0.21 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed bf c0 ae d9 fd 74 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #241 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #241 | rejected packet: | ed bf c0 ae d9 fd 74 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #241: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.11 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abd200 | handling event EVENT_RETRANSMIT for parent state #45 | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #45 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #45 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49636.50806; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.012342 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #45 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 "road-eastnet-nonat-45" #45: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #45) | a3 bb a6 38 bf 16 36 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 bf 7f b3 da cb 24 f0 9d 9b d3 fd dc cf db 07 | e6 5b 40 74 f8 99 0f 8a 69 5b 21 df 39 e1 ee 66 | 6e d2 eb aa da ff dd cd ef 30 5f f7 58 03 e1 db | 0d 74 f6 29 93 ca f1 42 fd ad b9 96 9c 2f 50 32 | 58 c3 21 d3 aa 48 12 01 4c e3 13 6e 9b ee 2d 74 | 42 be dc c8 fd 3f 8a d7 32 bc c2 52 53 8d f7 2a | 84 67 44 c8 2e dc 1a b1 bb 7e 48 68 aa 07 71 d2 | ed bb 6e e8 36 32 f2 a5 31 45 4d 85 68 10 11 40 | f6 85 5c 6f 85 60 44 96 50 66 ff a4 e4 4d 79 e9 | 3c a7 0e 91 f7 05 c3 d3 85 48 8e e8 a2 59 53 66 | 1c c3 08 ca 90 69 7f b0 5f 9c 5b ec cd 7e 11 67 | 1a 0f 4b b0 b3 89 8c 73 6f 1c d6 27 19 18 73 72 | 31 f5 6c a7 f0 f8 1b 36 35 8a f6 30 2e d1 b7 af | a6 2e 5d 9a f5 83 05 7a b2 73 c7 24 06 c8 92 6b | 85 fe 7f 79 f1 ba 3f d3 86 28 f4 16 3a 94 56 af | 55 d5 d6 bc 89 52 4c e8 34 d8 86 d5 fe 13 15 fe | 29 00 00 24 a8 f8 bf 2a 70 d8 0d e9 bf c1 0f 00 | 25 da 1d db 8f ac 61 b5 e1 f0 75 9a 00 6d 79 0f | ff f5 3b 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 ff e8 4e 79 94 20 d9 00 0d 87 37 | ed 16 46 76 d8 43 be 32 00 00 00 1c 00 00 40 05 | 2d 67 24 20 12 0e 18 8c 34 32 0f 7c 4f 51 94 df | fd 23 b8 c6 | libevent_free: release ptr-libevent@0x7fb35003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abd200 | #45 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 bb a6 38 bf 16 36 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #45 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #45 | rejected packet: | a3 bb a6 38 bf 16 36 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #45: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0506 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35800d120 | handling event EVENT_RETRANSMIT for parent state #46 | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #46 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #46 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49636.595401; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007585 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abd200 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #46 | libevent_malloc: new ptr-libevent@0x7fb35003b0b0 size 128 "road-eastnet-nonat-46" #46: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #46) | b8 02 bd ab b2 01 5a b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 02 34 ab 29 73 17 93 9c d3 ac d4 2d a7 40 8f | 6c ab ce c1 cf 26 d8 e1 c0 a5 2f a8 7c e6 62 97 | 14 ae ce 27 9d 48 da 55 bb 1a 50 83 cd 98 7c 7e | 93 0d ef 6b a4 36 24 54 0e e8 77 76 0a 46 5c 28 | c7 d2 ff f1 d4 08 43 1a 21 66 26 cc ac 89 a4 fa | 9e 6f e1 5a 6f bb 4b ea 22 4d 9a 3d 2a 1c 97 d5 | e7 d2 d1 ac 8d d0 32 2d 42 98 eb fc 7f 55 28 65 | e5 b7 88 e1 ec b5 ba 0a 74 06 aa 48 51 b1 11 3b | 2f 1d 4c c7 49 ef 3c d0 65 a2 df 8e 59 96 65 b4 | 5b 67 18 f6 c6 dd c1 ba 8c 98 60 72 7f 9b 34 f1 | f4 df 07 a6 02 25 08 e0 ca 45 1c 4e 5a 84 92 f8 | 41 4b e2 11 63 dd 97 cd e2 1c a6 92 32 6d 9f 66 | 47 ba 05 95 3f 93 67 80 97 77 56 16 84 bf 6b d6 | e6 b0 76 58 be 43 b2 86 c2 1e 75 44 04 7d 93 a8 | 8c b0 a8 b8 83 ce 3c 1a d2 a1 85 f4 c7 9a 35 d1 | a2 ff 32 1f de 4b 99 be 80 8a 49 9b 41 45 2e a7 | 29 00 00 24 59 91 d6 77 3b 12 ba 32 8c e3 4b 3b | 93 6d 1e 3b 04 96 db ec 7e 0e 16 50 f1 18 04 aa | e6 1e e5 ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c a5 da 82 02 27 22 be 3c d8 f4 7e | 26 be f7 a0 40 5a a0 f6 00 00 00 1c 00 00 40 05 | 90 e6 40 68 17 4b f9 af 42 5a 03 6b 4d 68 d7 fb | 1b b9 9d a8 | libevent_free: release ptr-libevent@0x7fb358012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800d120 | #46 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 02 bd ab b2 01 5a b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #46 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #46 | rejected packet: | b8 02 bd ab b2 01 5a b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #46: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0704 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7a390 | handling event EVENT_RETRANSMIT for parent state #242 | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #242 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #242 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49636.655772; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.013334 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #242 | libevent_malloc: new ptr-libevent@0x7fb358012840 size 128 "road-eastnet-nonat-242" #242: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #242) | bb 4d 15 84 4a d1 63 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be b8 bd 73 36 69 de db bd 2c 4d 3f 4c ae 08 43 | b3 f3 d7 53 b9 34 af 4a b1 04 e1 e2 27 f6 b2 b1 | 3e 96 98 76 a6 00 83 11 2e 07 de 5b 47 a6 5a a5 | 8f 0c 87 f8 e6 f5 c8 d5 f0 ce bf 70 a9 e4 7d f9 | c0 99 10 3b ec 9c 30 58 7b 73 32 96 65 b5 9d 37 | 48 ba 52 b0 1b 39 cd 58 16 bc 06 a4 25 89 da 22 | ca c6 85 48 e1 fd 54 81 b4 f6 46 e3 a3 cc 04 fd | ed 22 5b c4 4b c5 12 3d 87 53 9d f3 99 49 26 6d | e0 15 46 62 13 40 fa fc 54 c0 0d bd 54 60 26 93 | aa dc 01 46 3c 92 65 7b 4e 15 bf 35 9f 0d 1e ef | 63 43 fe c2 e1 31 5d 4e e4 23 fe ab 39 17 60 89 | ab b5 9b 1d 6d ed 49 c1 f4 3e 50 67 a1 09 05 d9 | c3 d6 c1 46 1e 9a db 86 ae f2 48 84 9e 9d 6d f5 | 1a 55 ad e2 9f 23 3f a2 29 49 4a 81 a2 25 2b 78 | b3 0b 2d 2a ec 81 b7 72 6f 93 e3 8b ce 4c b6 e9 | 10 ec a2 f6 93 c8 51 54 e2 4d 42 c5 bb 12 0b c1 | 29 00 00 24 43 16 25 02 5f 89 fd c4 95 04 8f 29 | f5 97 17 77 c9 2f ab bf 71 ef e8 74 04 bd c8 92 | df d9 0b 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 dc d6 bb 84 20 bd 3d 97 6d a1 71 | 60 d0 7a 61 e2 12 2c 58 00 00 00 1c 00 00 40 05 | 6c 10 68 84 3a c9 9c f7 49 94 4f 1d 42 c4 e8 ff | 34 65 7d fa | libevent_free: release ptr-libevent@0x7fb37401f7f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7a390 | #242 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 4d 15 84 4a d1 63 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #242 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #242 | rejected packet: | bb 4d 15 84 4a d1 63 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #242: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae4840 | handling event EVENT_RETRANSMIT for parent state #47 | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #47 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #47 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49636.66311; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009175 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7a390 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #47 | libevent_malloc: new ptr-libevent@0x7fb37401f7f0 size 128 "road-eastnet-nonat-47" #47: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #47) | d1 80 96 dc 70 12 fd 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 89 48 be 2f 23 20 1a aa c0 f9 41 f1 9f b5 dc | 61 3b 4e 1d f2 94 aa 61 39 fa ff 9e ad da aa 8b | 79 a4 b0 75 86 17 be 8d f9 64 cd 5f 2c a3 74 02 | 5c d2 0b c0 e1 bc 40 a4 41 01 24 b6 16 65 80 b1 | 8d 5b f4 3e d9 78 1c 78 5b d0 4f 36 20 49 cf f5 | e6 39 8f 45 c4 05 3e 9a 58 8d 26 dc 13 63 31 38 | f0 e2 e6 6e a9 06 79 15 81 1d f5 b1 3e c3 40 32 | 5c c3 ef 40 73 34 78 3f 9f 9d fe 1e 7a 64 15 bd | f5 c1 66 e8 e7 57 72 db 6e e7 07 6d fc c3 84 15 | a7 9e a5 ae 49 06 60 b0 66 25 b2 60 5b c9 52 7b | 84 da 9e 07 cb 22 63 3f f7 e3 75 51 cd b7 f5 a9 | 00 8e ee 37 13 40 c4 a0 04 91 8b 4e b2 90 26 27 | 78 4c 50 15 9b df e6 81 a0 a4 86 f0 9c 4a d6 4e | 71 20 bc ef 14 af bb ba f8 7a 84 f5 e8 b4 d8 08 | bb e0 cf f0 c2 7a 1a fb 6d c0 80 83 cb fe 9c fe | 4d f9 6c 4a 79 4d c9 ec 6b b4 1f c4 42 35 86 05 | 29 00 00 24 45 2a 73 9c 59 88 24 30 1b 4c d7 76 | 91 c3 f5 9d 27 d4 d8 42 63 2d 46 4d bb 79 5b 50 | bd 3d d6 ba 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 44 84 40 30 da 67 e5 a7 75 a7 f1 | b3 01 a1 ea ef 36 29 e3 00 00 00 1c 00 00 40 05 | 02 24 d1 73 8e ed 3e 54 49 25 16 88 bd 9a 48 c6 | 35 3e 63 7f | libevent_free: release ptr-libevent@0x7fb3380407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae4840 | #47 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d1 80 96 dc 70 12 fd 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #47 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #47 | rejected packet: | d1 80 96 dc 70 12 fd 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #47: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0d500 | handling event EVENT_RETRANSMIT for parent state #48 | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #48 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #48 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49636.741489; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.018726 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae4840 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #48 | libevent_malloc: new ptr-libevent@0x7fb3380407f0 size 128 "road-eastnet-nonat-48" #48: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #48) | 92 07 42 48 2a e6 dd 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 27 70 ee fe 7b a5 6b c0 91 72 76 bf b9 26 41 | 8a c5 01 3c cd 8b 21 f3 23 df 5c 81 f1 ed a2 12 | a1 c4 5e 2f a7 b1 21 02 24 b9 30 c4 f5 c4 2d c4 | 90 7e 3e f0 c9 0b f2 18 3c 2b b9 91 3a da c1 6c | 57 28 75 1b 3a 0e e8 9b fc 4b ee 5c 39 98 fa 15 | be 81 4e e4 0c 6c a4 75 1b 83 45 74 98 dd 81 5b | 06 80 95 32 c0 f4 a2 4b 9d f4 17 33 73 16 94 48 | 16 60 93 ae 3d ce 3e d6 a3 61 16 51 cb 19 ec 02 | 00 f8 5a 99 f9 c4 14 2b 6a 99 61 a3 6a e4 c5 97 | ad 75 bb 6b 78 38 5a b9 44 bc 5c a3 2d 23 20 4c | 99 1b 88 95 1f b4 34 15 92 91 16 2b 1d 90 a8 32 | bd a4 79 83 a7 b0 92 15 f0 e3 c2 79 58 67 56 eb | 4d 0c 97 c3 3f ae 15 49 f9 9c d2 3e ec c3 17 b9 | bd 62 c7 73 21 fe 81 8b e3 b9 eb a9 ce c7 0f d3 | 3f 5d 5a 44 c2 b4 29 b6 b5 67 52 29 de ca c6 15 | 31 6c 15 9d 56 b1 be 81 9a 0d b9 07 79 05 6e c9 | 29 00 00 24 56 48 d0 40 29 5d 70 09 47 7a f3 f6 | 53 84 44 57 f6 31 5c 3b e1 9a 2b 92 5f 13 77 b9 | 29 81 06 a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee 92 e0 aa 95 98 e7 44 d2 2d 1e d8 | d0 35 7f 77 52 84 b9 c1 00 00 00 1c 00 00 40 05 | a2 97 dc 1e 35 5d 8b 7e f0 05 d9 9d 5b 9e 9f 7f | 26 7a 4a c3 | libevent_free: release ptr-libevent@0x7fb340045ed0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d500 | #48 spent 0.487 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 07 42 48 2a e6 dd 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #48 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #48 | rejected packet: | 92 07 42 48 2a e6 dd 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #48: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #243 | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #243 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #243 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49636.790099; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.002765 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d500 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #243 | libevent_malloc: new ptr-libevent@0x7fb340045ed0 size 128 "road-eastnet-nonat-243" #243: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #243) | 39 d2 8c 3c d9 9b d0 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 7c 7b 28 d8 43 9d a6 57 48 f3 56 58 a9 96 02 | 89 eb 92 ba df fe 7c b4 93 87 0a 15 04 96 3d d9 | 97 4f ed fb da 47 e0 91 75 a8 ae 92 a4 07 c6 b2 | 54 7e 3f f7 5a ab 2d 86 ec bf b6 60 fc b0 e0 42 | 42 76 7a 8f aa 4f aa 15 dc 06 c4 c5 a6 64 c4 cb | cc bb 4c d4 38 55 bd b1 4e f2 bf cc 48 b4 72 4f | 87 59 b4 0f 7e ed 03 f1 41 ee a8 6e 5e c8 2d 73 | 30 2b 8d ba 0f 00 07 b3 03 3d 8c 71 2e 4d 64 94 | 7c 2a 25 17 eb 7f f4 7c 3d ac 47 e3 e8 64 b3 1d | 93 52 33 b4 60 d2 91 0a df 53 00 a1 04 e7 82 d1 | ba cb 66 13 49 96 51 fe 75 53 10 a1 e8 ed 85 c1 | 24 57 8f 5c 2d ab 6e 1a d8 d2 18 48 42 bf 96 fc | f2 c5 7f a1 3d 7c 8d 10 dd 4d fc 0c 94 ce 13 b9 | f3 c9 49 d3 a2 9b 04 c3 51 ef 2c 4a 1d 70 85 00 | f9 d1 0e 6b 0b 48 a0 fc 89 8f e7 8e 83 74 57 7a | c9 0c 8d f3 c6 50 96 a3 99 76 7c eb ac 17 30 58 | 29 00 00 24 35 b2 35 5f d9 02 63 3b 19 19 86 78 | 0e 3a e9 6c 99 53 dc 00 7c 7f ad 46 fe dc 4c 82 | 97 17 87 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 31 4b 64 ab 4a 78 81 95 90 fa 46 | 73 84 e5 27 1c 47 ef db 00 00 00 1c 00 00 40 05 | 94 bc 64 25 b1 da 5d db 67 02 68 07 a8 c5 47 cd | f9 c3 f5 ed | libevent_free: release ptr-libevent@0x7fb38800a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #243 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 39 d2 8c 3c d9 9b d0 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #243 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #243 | rejected packet: | 39 d2 8c 3c d9 9b d0 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #243: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0594 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469e05a0 | handling event EVENT_RETRANSMIT for parent state #49 | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #49 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #49 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49636.796446; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.011264 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #49 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 "road-eastnet-nonat-49" #49: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #49) | 8b 45 5c f0 af 2f 9d ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 38 13 81 3a b9 33 6e f2 a1 41 ed b7 e9 17 cf | 38 df bd f2 c5 3d 78 1c 98 5b e5 97 39 7c 00 0a | 9b b9 2b 4e ee 4e 90 b7 3f 17 93 3b 49 e6 73 ac | f3 36 ea c0 f6 08 78 26 b2 58 4a a1 8f ff 26 a9 | a2 29 62 4b f6 47 e2 5d a0 f3 e8 a3 da 86 cc 66 | 5a 6a 1d 0c 47 30 d7 e6 6e 32 62 71 d7 d3 1b 25 | 92 10 eb e7 f4 a1 c6 b8 cf 48 2b c2 a1 ae c9 5f | 55 56 6d 5d 77 a7 5f aa 02 cf a8 ea bb 62 18 44 | 0f aa 1d 7d 23 c7 37 6d 72 2b 4a da 38 22 af af | 35 47 8a 4d fb f1 2e 0f fa 54 54 48 f4 2f 1b 4b | 5a 9a c8 ab f4 0a 9c 36 8e 9a 37 b6 3a a4 36 09 | f9 cb 85 a0 d5 4e 66 72 2d dc a7 8d 87 52 32 39 | 0d 6e ce 73 51 c4 9b ee a5 7a c3 e9 dd 43 0b 8d | c9 c7 df e3 c7 9a fc aa 8b 37 41 93 d2 be 3c 27 | 15 30 62 da 6c d3 07 29 68 48 b5 55 56 c4 17 4f | b5 8f 29 d1 f2 fb 9e ea 13 d1 f0 21 44 a0 36 ca | 29 00 00 24 0e e2 a8 92 f0 b5 63 29 61 a0 ee 39 | b4 45 f6 bb e0 ab b1 76 a4 84 16 9e da d2 be 94 | e8 6d f8 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 12 9b 83 c2 c3 d2 71 a5 38 21 6e | a0 97 8f 66 c6 b8 71 3b 00 00 00 1c 00 00 40 05 | d2 ce 05 69 62 ac 37 a7 c1 ab 75 f3 75 7a c1 3e | 4a 93 d7 88 | libevent_free: release ptr-libevent@0x7fb384048950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469e05a0 | #49 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 45 5c f0 af 2f 9d ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #49 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #49 | rejected packet: | 8b 45 5c f0 af 2f 9d ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #49: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aba600 | handling event EVENT_RETRANSMIT for parent state #50 | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #50 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #50 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49636.862768; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.010869 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c40 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #50 | libevent_malloc: new ptr-libevent@0x7fb384048950 size 128 "road-eastnet-nonat-50" #50: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #50) | 96 fd fa e4 3e 0e 84 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 85 b8 19 de 5c 0b b8 2d cb 54 cd 4a 1a dc 75 | 29 fd ca 47 94 14 29 17 31 bc e5 6f 6c f8 34 07 | 54 0a 45 19 2c 2a 6f 1c b9 dd 1e a6 5c 18 fd 5f | 81 44 c7 97 e9 8f a1 20 0b 20 67 50 dc 17 2d 25 | 1e 18 a7 76 43 da 58 3d a0 3c 42 3d 77 42 d1 eb | ed 35 62 7a 01 62 e1 32 87 10 6c d5 80 f8 d5 7a | e6 0d bc 8d d6 42 76 b9 2d fe 0d c3 eb e6 a9 0d | 0e 9f 06 5b af 9e 49 ff c0 94 83 2a d0 2d 71 88 | 4e 9a 35 ec c3 f5 8a a6 c6 22 6e 7e 16 d4 d9 e4 | d9 14 a9 a0 89 f2 18 8e be cf da c0 b4 27 62 b2 | 69 81 38 d5 cf 1b 18 ef 28 a2 d6 ab 45 93 46 f0 | b0 cf a6 b1 57 a8 1a d7 72 93 ec cd 51 ba 98 80 | 63 05 e1 50 59 41 cf a5 af 5d 7f 76 36 8e 63 f7 | e7 a8 78 3d b4 e5 4b 57 33 d8 0b ca bb 46 3b d1 | 5c 60 2c ab 89 51 2a 58 57 80 21 7f 56 14 26 65 | bd a7 02 e1 81 1f b6 ff ab b3 3c 36 3a 4d e7 be | 29 00 00 24 62 85 07 c7 f7 76 d5 f9 35 e6 84 85 | cf ff 39 b7 d3 8a fe b9 27 ad b1 ed 4e 28 c4 d4 | 73 2f 0f ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 6a 14 0a 8a ea 03 bd 41 dc ab fe | 15 04 7a 2b 71 ea 6d 09 00 00 00 1c 00 00 40 05 | 24 23 f0 d4 3c 33 30 25 f8 fc 46 79 64 b6 7b 59 | 6c 35 21 7f | libevent_free: release ptr-libevent@0x7fb35c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aba600 | #50 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 fd fa e4 3e 0e 84 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #50 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #50 | rejected packet: | 96 fd fa e4 3e 0e 84 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #50: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b05240 | handling event EVENT_RETRANSMIT for parent state #51 | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #51 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #51 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49636.942113; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.013506 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aba600 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #51 | libevent_malloc: new ptr-libevent@0x7fb35c035930 size 128 "road-eastnet-nonat-51" #51: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #51) | 4e ec 23 15 b1 7b 72 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb ca ad 90 d3 c3 42 ab 02 0a 3a 99 99 08 46 41 | e3 20 e2 b5 e7 92 8d 56 c0 f6 81 f6 d7 1f 61 ae | fb 7c 4e 49 1a 90 7d af 41 51 b1 4f a9 1c af 26 | 43 e3 44 1a 2b 54 c2 29 d3 73 8c a6 e2 ba 3d 02 | 79 ed 80 dd 4b 1e 56 a7 0d 93 2b 80 2d fa ef a7 | a5 07 28 e5 1d 36 9e 70 e3 83 04 4a 00 cd 83 0a | dd f1 6f 7b 41 89 16 39 86 45 b3 89 6b 38 63 99 | 64 d2 3b 37 57 db 5b aa 3c 09 dd b1 e9 2a 36 7d | 07 9a 1b 84 49 cb 9b 53 1f e3 16 45 5a 7e 7d 6a | b6 b2 5f ad 65 38 70 73 69 63 43 b9 48 24 d6 aa | 84 39 4e 67 2a d2 39 99 70 07 69 a7 7e 3b f3 d0 | 5d 4d 0d 43 76 2c 16 f2 ef 43 c1 03 3c a0 15 fa | 7b dd 0d 24 8d 60 85 f6 a5 c6 c1 eb e0 9b 23 f3 | 77 0d cd ab 79 52 59 61 60 d0 e6 6a b2 5f 84 3c | bc fe a3 56 10 78 f4 57 b0 c9 73 a2 9c 16 ae e5 | 21 a9 af 1c 86 05 49 d7 79 de ea 6f 42 c1 58 6c | 29 00 00 24 8a 81 ff 83 11 9d 7f 95 f4 0f 60 37 | ee c1 de 9d 9d 4a 24 6c a2 0d 2e aa 53 c1 6d 4e | 8c ed 61 8e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 84 7c cd 2e 5d e1 e4 b9 3d 91 59 | 8e 0e df bf 1a 34 00 37 00 00 00 1c 00 00 40 05 | 4f e7 ab 4c a7 2a fc d1 46 25 a0 98 d8 53 89 a8 | 24 a4 22 8e | libevent_free: release ptr-libevent@0x7fb338046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b05240 | #51 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e ec 23 15 b1 7b 72 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #51 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #51 | rejected packet: | 4e ec 23 15 b1 7b 72 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #51: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #244 | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #244 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #244 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49636.97342; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004983 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b05240 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #244 | libevent_malloc: new ptr-libevent@0x7fb338046040 size 128 "road-eastnet-nonat-244" #244: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #244) | 4b f1 49 87 f9 a6 76 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 99 c6 ce 30 f7 89 45 59 4d 59 48 bc e8 db b7 | 6e 51 73 db f1 50 f0 84 78 35 a5 96 97 1e cf a2 | ba 46 c2 c3 3c f1 3a 6e 96 bf 5f af 7c b4 86 ff | c1 77 25 46 ad 5b ec 41 ea 88 d5 b2 00 e8 44 78 | 0e 9f 1e 30 ef 44 2c 78 1a e7 51 e7 d9 ad 9d e1 | 0d 69 bb c8 c6 a9 e9 4f 0c d7 5e 29 38 5c 8e e0 | 8e 7c a8 b7 93 d1 97 5f 38 52 c5 7b 09 49 6a 76 | 8a 53 22 ab 09 ab d7 9d 44 f6 cf 05 91 df 27 29 | 68 68 78 b8 7a 10 b4 e5 9b cb 01 8d f1 35 fc c7 | 7f 8f 0c 26 0d 68 38 58 4d f7 b1 9e 96 4e 4d c2 | 24 dc 6f 1f 81 ff 16 30 89 d9 d3 07 46 98 c4 17 | fc 99 c1 d0 c2 70 9e d5 7c 43 6d 12 f3 10 9e 43 | 41 f8 15 2e de ff 3f c8 97 02 5f 67 73 89 79 ac | 6a 34 e1 ed 55 83 46 98 af 4b eb 61 ab ed 9c 2f | 3c d3 92 2f df 77 9f 98 51 e0 24 45 80 51 7a 35 | d5 76 40 ee 59 99 54 8f 46 a1 fc 48 cb 2a 6a 64 | 29 00 00 24 23 47 a6 9f de 30 3b be 65 32 63 50 | 62 d5 89 0b d7 3d ea 19 da 4e 55 f9 53 26 8c d3 | 8a e5 35 df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 5e c3 f3 c5 40 cc e2 50 93 80 f8 | 58 99 fe 09 2c 8c 43 58 00 00 00 1c 00 00 40 05 | 42 a9 a5 4e 6c 3d 71 a6 0f 5e 70 c5 17 4e 52 56 | 03 54 70 77 | libevent_free: release ptr-libevent@0x7fb36c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #244 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b f1 49 87 f9 a6 76 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #244 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #244 | rejected packet: | 4b f1 49 87 f9 a6 76 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #244: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a25d10 | handling event EVENT_RETRANSMIT for parent state #52 | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #52 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #52 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49637.00671; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007565 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #52 | libevent_malloc: new ptr-libevent@0x7fb36c00cf80 size 128 "road-eastnet-nonat-52" #52: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #52) | 3f 70 d8 3e f5 22 c6 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 a5 a2 fa 37 05 a0 83 be fb 7c 66 e8 09 2d 85 | 01 d0 84 ba 7e 80 ad 7e ed 7e 94 4b 5a d1 13 c1 | b1 3f 59 cf ac e4 bd 6c 95 59 bf de 9d 80 55 dd | 6c d4 7d e3 9f 38 7c 31 e7 3a f4 3d 5f ba 5a 68 | 83 7f 56 b6 a6 97 f9 9a 87 45 7b ad 59 c8 c8 c2 | 85 24 f6 8d 4c 54 59 44 37 96 77 29 ac 68 3f 6e | df da 66 fc fd e2 52 7f c0 d8 5a 6e 87 c7 d0 ea | dd 74 ac b4 2a 5c 26 2d 8f 9d 33 80 5d 13 86 23 | e5 74 ae 2d f0 58 19 74 bb 0c 9a fe 02 e9 ea 18 | 9b e9 68 5d 7c 72 e9 79 59 15 c2 74 d4 16 6f 97 | c0 92 81 74 a6 70 c8 c9 0a 8b 1e 5b 97 dd a0 5d | 10 4a 89 98 ee 3e 73 f8 ad 8e 0b 84 2b bb 87 07 | d3 19 10 ac f4 31 29 ae a0 fb 57 db 57 8e e8 3d | 7b 1c bf f9 0f c4 88 43 de 6a ac 3c e2 0b 51 3c | 47 b2 1e 04 99 56 29 39 94 ab 53 44 ad 54 e0 54 | 9d 52 e0 9a 6d 24 de d9 e3 52 91 a1 b5 19 19 fc | 29 00 00 24 bc 06 52 3b 0a a9 d6 55 15 a3 be 4e | de 77 6e 83 33 60 ab 6d e9 76 1e 6c cb ab 4d 19 | f5 ca 65 a4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 c4 b5 bf ec 75 31 9e 5d c6 9c 0c | 53 7b fb 92 b5 6c 20 70 00 00 00 1c 00 00 40 05 | 2a 93 28 00 9d ed cf 28 c2 1f ba 32 c1 4a e1 a2 | d1 c6 7c 44 | libevent_free: release ptr-libevent@0x7fb3840223a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a25d10 | #52 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f 70 d8 3e f5 22 c6 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #52 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #52 | rejected packet: | 3f 70 d8 3e f5 22 c6 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #52: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a82ac0 | handling event EVENT_RETRANSMIT for parent state #53 | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #53 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #53 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49637.081061; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005997 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a25d10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #53 | libevent_malloc: new ptr-libevent@0x7fb3840223a0 size 128 "road-eastnet-nonat-53" #53: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #53) | 22 bd 87 7d 85 b9 18 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 30 f1 21 57 e7 a6 a0 b1 5a 51 b3 c9 69 4a 15 | 0c ef ee d8 55 97 13 32 e2 cf 8d c8 f3 74 4c 97 | 22 ad ca ab 81 a4 a0 26 9d e6 3b e7 1c 2b d2 a1 | d6 72 47 dd ab 72 ec c1 cc d7 d9 8f d8 66 bc e6 | 53 77 a5 12 d5 84 8f 13 60 d3 99 01 c2 30 50 56 | 18 a7 45 bc dd f7 11 3f 14 e8 e1 27 67 4e d9 50 | bb c0 6c 1a d8 e9 1e 81 c4 fa a9 14 22 9d 32 b4 | e1 11 67 1b f4 56 6f d3 5b 27 83 19 34 08 ee 9b | f3 6b 24 bb c8 a8 09 ee 97 89 49 a0 fb 47 38 93 | ca a8 21 f6 da 4a ff ce b8 5a 83 17 3c fa b5 a4 | 1d 50 f4 b9 26 78 5e a6 78 30 f6 80 a4 cd 3e ae | ea 19 26 25 27 2f a8 b0 bc e9 8e dc 47 51 61 79 | 07 e7 6e 1f 82 d0 fe 19 b0 44 4b f8 92 c9 fb 82 | 83 56 b0 37 a7 92 bf 23 17 cb fb 8b 75 11 c5 e0 | 1d 95 a6 1f 6a 1b 78 a9 5c 16 4e 89 74 ff c7 5a | 43 0f 1f 26 45 20 46 36 e0 37 07 46 11 e2 7c fd | 29 00 00 24 1d d0 6e d2 14 3b 95 3d 7a f3 16 f0 | 13 a4 5c 97 24 08 af 2b 29 b2 1a e1 3b dc 59 4d | 62 47 73 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 de d2 d7 2b e1 3c 0c 4b a2 6a 97 | 5e 9e de 30 79 3d d7 e0 00 00 00 1c 00 00 40 05 | de 44 b7 78 c2 27 43 2d 86 e9 13 34 57 72 8f 74 | 48 51 21 6e | libevent_free: release ptr-libevent@0x7fb3780251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a82ac0 | #53 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 22 bd 87 7d 85 b9 18 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #53 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #53 | rejected packet: | 22 bd 87 7d 85 b9 18 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #53: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #245 | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #245 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #245 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49637.100354; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00495 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a82ac0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #245 | libevent_malloc: new ptr-libevent@0x7fb3780251c0 size 128 "road-eastnet-nonat-245" #245: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #245) | 15 95 fb a9 f3 2d 54 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 07 75 44 62 b4 90 36 f0 1f 9d c1 5d 1b f7 db | 07 17 dd 42 63 05 02 d3 cf 19 39 61 be b0 c7 13 | b1 14 a4 a5 b8 a1 23 ab 35 be c3 4c de 16 3f 73 | 4f a1 df 22 33 3b cb 49 9e 26 36 44 30 39 b1 65 | 42 b6 93 29 4a f4 de 14 94 ba c8 61 f8 84 44 5d | 84 ad c9 32 19 82 79 9b 9b e9 75 42 04 bf 32 59 | 46 4e b6 9b ee 27 62 a3 18 81 ea 6a 95 c0 2b da | f4 8a 3a 0c 58 60 40 77 5e 77 85 02 1a 93 66 69 | 9d df f5 b9 a5 ac 45 4a 0d c0 94 39 1f d8 c9 eb | f6 d6 d7 0e d5 20 a4 de 35 3e cb b1 5a 3e 07 b8 | 15 10 06 8b 76 b5 1a ee 6d 90 d8 56 e7 da d7 5c | f6 12 4e f3 18 b2 7d 97 43 2c 6c d6 56 7e a8 7d | 7a cc 89 83 61 47 f5 78 b4 bb 7a cf 96 f5 41 2c | bd 99 b7 5f 2f 94 22 34 ed af 72 69 47 9d b0 d6 | ba d6 46 d7 20 70 b9 2b 04 c8 60 1d 2d 34 a0 00 | f0 50 7a 8d 2d 98 72 24 0c bf 1e e2 f2 65 16 ca | 29 00 00 24 78 20 60 94 4c f0 10 8a 14 01 4a 36 | 9d 71 3a 32 dc 84 92 f3 9e ca b0 c6 c6 47 0c 0e | 5c 4a 16 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 94 6f 42 13 dc 75 9d 65 6a 04 f1 | 12 0b d5 9b e2 af 9f 6d 00 00 00 1c 00 00 40 05 | dd ae 8a 7b 09 c8 82 03 b9 81 1c f4 27 30 35 7a | 2b 8b 29 2f | libevent_free: release ptr-libevent@0x7fb36402a780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #245 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 95 fb a9 f3 2d 54 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #245 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #245 | rejected packet: | 15 95 fb a9 f3 2d 54 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #245: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a16db0 | handling event EVENT_RETRANSMIT for parent state #54 | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #54 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #54 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49637.160639; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006507 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #54 | libevent_malloc: new ptr-libevent@0x7fb36402a780 size 128 "road-eastnet-nonat-54" #54: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #54) | 4e 45 bc 88 5c 41 98 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 f4 91 14 5c ab 2e e9 80 6d af 62 f3 7d f3 c8 | 41 66 e7 43 38 9a c7 1b 1e f8 8c 7d f7 db 12 65 | 59 fd 3d ea 2d 58 b5 eb bc 29 cf 89 c5 08 e0 32 | af 71 20 82 0f be ca 31 6c 17 02 ca 88 1d 08 2b | 41 de be 4f db b6 e0 c9 ce b8 f5 78 72 16 5b d3 | af b2 62 71 28 3f 0e a5 9b 79 4c c6 6b 64 ea 6c | 30 86 90 45 62 e9 86 e5 b2 f0 de b0 25 c7 2c 5e | 72 55 be b3 8f b3 05 2b 3b 6d 68 2a 44 c2 cc ec | 6b 1d 92 df 89 1a 9d f7 c1 18 8f 4d 34 ce b2 72 | dc 24 61 bd 37 65 28 f1 26 42 c6 a1 48 90 50 40 | 60 3f 78 ce 04 9c 3d ba 18 4e dd 4c d6 82 6e 51 | 67 48 49 62 37 f2 ed 52 4d b8 26 ec b0 85 3e 94 | ba a6 36 bb c9 80 6e e3 33 72 02 87 28 51 f7 0e | b2 b1 8f 9a df 7c ac 13 32 02 9e b4 45 75 85 e3 | 86 3b 1f 81 8b 2b 4d 2b b9 af 80 14 c8 c0 37 3b | 75 10 32 13 c6 74 a7 41 62 92 b3 87 9f e2 ed 2a | 29 00 00 24 f9 a0 5c 35 4a 9e bd 0e 0d 94 7a f9 | 8f b8 01 dd 15 88 70 42 78 10 83 16 a2 ba 62 6b | bf 0e 5b 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b f1 3a 2c 8b e8 c9 68 86 e1 0f be | 41 4d 1c 16 cf d5 b6 01 00 00 00 1c 00 00 40 05 | 84 fa 3c 0d 93 21 b5 34 8e ca ca 4a 93 ec 16 d0 | 28 a4 5e 28 | libevent_free: release ptr-libevent@0x7fb380048a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a16db0 | #54 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4e 45 bc 88 5c 41 98 f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #54 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #54 | rejected packet: | 4e 45 bc 88 5c 41 98 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #54: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.073 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aeb540 | handling event EVENT_RETRANSMIT for parent state #246 | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #246 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #246 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49637.232996; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004761 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af78c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #246 | libevent_malloc: new ptr-libevent@0x7fb380048a80 size 128 "road-eastnet-nonat-246" #246: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #246) | a0 25 29 39 44 0f 25 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 89 2d 00 d4 20 29 db cd 68 77 f7 b8 f4 ff 24 | 1d 5c 36 95 62 d1 6b 2e 7a df 4b 3c 19 93 58 6c | ce e3 80 e5 ca a3 cf cd d3 d9 a2 b5 58 7c 6c 24 | e1 80 e9 fc d5 84 ae 0d 7e ea e8 9d e7 06 ab 00 | 72 40 cb c2 16 e6 8b f6 4d 5d d8 7e 9f 89 2b e1 | 0d a8 b1 ac 98 7a 10 80 97 71 ec 1f c2 1c 60 a0 | 4a 47 2e 26 d4 f8 3f c5 e0 4a c3 e3 ec a5 f8 3d | e3 be 62 c2 d3 a8 de ed 5f db cd 09 f3 df 3a 1b | 2f ae d7 5b 61 a7 b7 f8 35 c0 11 77 df e4 3c 50 | b9 e3 f0 3f 49 55 b1 46 c2 af 2d 77 f7 83 81 bc | 3d 89 16 cb 06 4f 2b 0b 77 6a cd 08 70 dd b2 5e | 34 34 1a 43 20 61 50 18 62 59 04 5a 1c 76 f2 1a | c5 6a 20 de 8a f0 5f 77 96 4b dc b9 ab a2 15 f3 | e6 86 a6 63 09 55 5d af 9f e1 30 a3 28 2a 95 86 | 24 6f f2 be f6 80 d7 fc 17 1b db 4c 69 eb f3 36 | e3 f0 06 e4 5d c6 62 de 3e 20 88 cc a6 63 59 4c | 29 00 00 24 ac df 8c 0e a5 90 d3 52 1f a2 e9 1c | c5 97 45 07 c2 87 cc 4e 1a 76 e7 94 30 33 9e 66 | b7 ac 45 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec f9 d9 bf 03 4f f2 a2 1a a6 75 4a | e9 f5 fc 17 1c 38 34 10 00 00 00 1c 00 00 40 05 | fd 95 24 c3 10 0c 51 95 0e 6e a3 ad 3b a1 a5 1a | 2c 16 a1 31 | libevent_free: release ptr-libevent@0x7fb36c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aeb540 | #246 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 25 29 39 44 0f 25 eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #246 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #246 | rejected packet: | a0 25 29 39 44 0f 25 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #246: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a72150 | handling event EVENT_RETRANSMIT for parent state #55 | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #55 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #55 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49637.322333; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007589 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aeb540 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #55 | libevent_malloc: new ptr-libevent@0x7fb36c01d920 size 128 "road-eastnet-nonat-55" #55: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #55) | 3d db 2e dd 07 aa ba 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e 71 91 32 93 9e d9 77 ef 53 94 b9 d3 5b 34 5a | fe 84 a7 6b 7a 00 f9 5d 90 9e 95 ec 98 7e 50 90 | 6f 0f ae d2 9f 29 ef dd 60 22 99 95 c1 b0 c0 54 | a7 26 de ae fa 13 60 60 4e 33 18 74 d6 1f 83 02 | 06 b2 59 fa 7c 17 46 c9 2a 0a 3f 67 46 5b 6e d7 | 09 8c 97 98 d9 8f c1 fc 1c ec 49 28 fb cb 2a 4f | 78 96 26 a0 14 e4 f8 b2 87 ff f8 94 08 22 94 74 | 80 62 7b 3c 7f 07 b1 d4 49 9b 9c af da 12 43 95 | 22 ed c4 32 82 8f fd 22 2e 14 7f a3 9e 9a 0a 95 | 1c ac 99 95 6e eb ff 73 9e fa c4 9b c2 7f 18 d1 | a6 f5 7d a7 31 3b 50 d9 03 2b 9b 6a 48 7d 39 5a | 55 2b 5f c8 64 07 45 ea 51 98 d9 85 73 51 e2 22 | 6a fe cb 2c f3 b0 0b 08 b0 e7 70 07 6e 79 7c 1c | 6c d7 90 19 69 d2 44 49 0a 0f 6a 33 f1 60 ee 72 | 89 92 e0 5a 96 45 5d c4 8c 2b 42 de 01 b6 de 4f | b8 41 dc e7 4d 6a e5 69 01 12 96 be b3 ca 0c ef | 29 00 00 24 34 26 bc 6d 2a b2 15 83 73 e7 09 34 | 40 d7 8e 8c 63 fe fd 1b d2 38 8c 24 da 45 67 bf | a5 9b 8a 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 45 13 d7 91 8d b2 95 9c 7e b4 17 | 75 e1 5c f2 7c 3c ca 26 00 00 00 1c 00 00 40 05 | d0 0d a6 5e 1b c4 3a dd c0 34 b3 e5 87 cb 47 3a | 73 94 3b 44 | libevent_free: release ptr-libevent@0x7fb388027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a72150 | #55 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d db 2e dd 07 aa ba 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #55 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #55 | rejected packet: | 3d db 2e dd 07 aa ba 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #55: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #247 | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #247 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #247 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49637.35963; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006606 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a72150 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #247 | libevent_malloc: new ptr-libevent@0x7fb388027c10 size 128 "road-eastnet-nonat-247" #247: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #247) | 5d 14 02 50 68 e1 05 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 49 8a 2d d4 33 c0 d7 bc cf 08 ab af 13 85 8e | 9a 12 a5 cd 3b 66 31 91 51 03 92 de 96 84 44 92 | 2f 58 74 2e ab 28 ea 0d 4e f8 e3 ae 21 e6 45 c8 | 43 4c d5 50 a9 19 c3 44 67 b2 10 6b 79 6d 94 47 | fa 38 4e 33 78 ee e7 d3 9c 31 e4 3a 0a 97 fc f9 | af cb 80 37 57 a0 1b c2 09 c2 31 8b fc c7 0b 20 | de c6 8f fd b8 6b 84 a5 39 ac f6 54 bc 56 ef 0f | 64 4c b3 c3 15 1d ff 22 52 dd 24 dc a2 84 2b db | e1 cf 6b 7a 77 75 72 44 46 ba 71 64 0d 1e 05 41 | 6b 10 ff 59 ad 5c e4 40 01 51 72 36 a2 b0 08 e3 | a6 82 a9 79 20 45 b1 f4 1e 13 22 a0 f1 4f 23 23 | 9c e9 d5 77 c7 56 3c 45 ca 5c a9 1c b1 68 03 08 | a1 eb f6 b1 e5 5b 6c d6 3f 31 2a ba a0 3e 1f d2 | a5 29 ae bf 59 de 0d b4 a3 d2 df a5 98 9f 76 2c | 4f cf 7a 3e 6d ac 96 b0 e7 e5 ce f6 05 40 9c 9b | 09 66 cd 5d b1 dd cb f0 23 07 ad be 0d 42 b6 2e | 29 00 00 24 ef c2 8a a6 2e c6 51 78 10 63 06 58 | ba ed 73 0f a8 fa 21 72 a3 1c 39 ab 2c 37 74 08 | 1a c5 f7 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 eb f7 f6 58 75 8d be 43 b7 49 b8 | cd 30 58 5c 95 8f b2 8d 00 00 00 1c 00 00 40 05 | 15 66 60 c0 d3 3c e7 68 f4 56 38 e9 31 35 3c 02 | ee cd 1d 4a | libevent_free: release ptr-libevent@0x7fb358009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | #247 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d 14 02 50 68 e1 05 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #247 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #247 | rejected packet: | 5d 14 02 50 68 e1 05 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #247: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56dd0 | handling event EVENT_RETRANSMIT for parent state #56 | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #56 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #56 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49637.412931; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00647 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #56 | libevent_malloc: new ptr-libevent@0x7fb358009640 size 128 "road-eastnet-nonat-56" #56: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #56) | a2 38 96 b9 83 17 2c 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c 86 44 cb cd d5 e6 ca 09 de cc 09 a4 86 65 dc | 8e 5e 46 71 c3 c7 a8 ed be 75 06 f3 62 76 ba da | ce e9 f2 5f 5c 9e e4 0c 00 41 ba fd 53 1c 48 95 | 4a ae 4f cc 78 85 9f f0 fa 4c 13 7a c5 dc 96 cf | 8c 8f e9 26 db 93 6d c0 e4 2b 06 79 49 8a 1c 86 | 23 8a 00 51 5e 48 57 fe 2b c6 2d 2e cc 90 37 77 | 16 54 2d 1c 52 6e 88 f9 06 69 91 14 40 a3 3e 1f | 64 d7 73 f6 42 da 0d 73 5f 6b eb 89 ee 97 cd 6c | fd 1d 89 b8 17 39 77 3f b0 8b a8 13 2f f9 45 f4 | e3 ec 7f a4 35 be 17 3d c6 80 db be df d2 e9 bc | 39 46 6a e1 d0 06 ce 65 d8 13 18 bc e7 ef 70 ba | 17 09 9b 7f c9 d6 90 ff cb 53 6a 15 26 bc 84 d0 | 3c 63 f9 85 08 c0 bf 6b 92 00 26 8e 7e 39 47 fa | 15 93 5e ae af a3 95 34 bf f7 9a 05 60 79 f9 78 | fe 1c 09 6f 2a d7 a8 e6 dd 20 f6 bd f3 b0 a8 de | 56 b0 c1 b0 a8 8e c2 c9 51 e8 12 8c 23 35 5a 34 | 29 00 00 24 d3 9d 92 33 15 50 42 07 cb e2 93 fb | fa f0 4d 62 ce 86 f8 78 f6 e4 5a c4 46 ff 05 fd | 2d fe b5 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 f6 95 c7 6a 67 27 fa d2 0e 4e 26 | b1 fb ce d1 96 08 1b d4 00 00 00 1c 00 00 40 05 | 86 3b a6 fc 26 15 66 79 c8 2d 3b 9c 75 89 43 54 | 51 cf ae 75 | libevent_free: release ptr-libevent@0x7fb3680180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56dd0 | #56 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 38 96 b9 83 17 2c 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #56 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #56 | rejected packet: | a2 38 96 b9 83 17 2c 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #56: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0754 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b07dc0 | handling event EVENT_RETRANSMIT for parent state #248 | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #248 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #248 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49637.47726; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.012824 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56dd0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #248 | libevent_malloc: new ptr-libevent@0x7fb3680180b0 size 128 "road-eastnet-nonat-248" #248: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #248) | 0a 60 4f 04 ec 5d f9 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b 96 4e 6b 1a 47 f3 29 f4 97 63 43 e3 c7 7c c2 | b5 40 35 82 f8 ae 61 14 ae 37 68 84 b3 6c 17 bd | e2 38 fa 08 01 a0 06 e7 9f 6c ca f7 e0 61 70 92 | 35 69 98 cb 13 b9 35 de 14 7b 48 01 ca 16 d2 a3 | 8a 8d f7 e5 16 28 68 18 42 b1 0f f2 66 75 2f 1f | 92 e4 b0 69 36 a2 b4 75 60 ca a5 a2 69 6d e6 5d | 46 24 17 68 8a bc 97 e8 9e ee 7a 06 d8 89 ea da | 29 95 98 02 98 06 f1 21 8f de de a8 b1 db 6b e4 | 16 54 6a d8 f1 bf 06 c3 2a de 4c 0f 1e 69 c7 60 | 71 82 15 35 09 a6 80 73 54 ab 5a 82 af 1b da 3b | c5 0a 69 1d 72 1d bd 02 fa 14 6a b4 37 14 ab b1 | 6c ef 68 fb 08 a8 b0 c6 58 93 07 45 93 1f 0d 53 | 5a 7c 44 c6 e8 cb d0 e7 6c 54 5d c1 89 3a e8 2b | e2 33 79 6e fa fd a1 8c dd 41 32 f8 12 7c 52 d0 | ef b1 cc 9f e3 23 da b6 ea 6c dc 48 7a 7e 45 73 | a1 ca 75 fd a6 b2 28 b4 4d de 48 05 30 76 df f1 | 29 00 00 24 da d0 88 5b 97 8e 08 a8 b2 aa 35 1a | a0 f5 0d fa 05 bb 67 43 a9 98 40 73 a9 62 0f f1 | 91 cf ba 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 42 31 df 79 b8 d9 7f 21 24 fd aa | 74 f3 12 b0 e3 0d 96 52 00 00 00 1c 00 00 40 05 | 1d 11 c7 78 91 0f ef bb 0b 1a 85 c0 59 35 e2 cd | c1 30 49 b7 | libevent_free: release ptr-libevent@0x7fb364045e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b07dc0 | #248 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0a 60 4f 04 ec 5d f9 e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #248 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #248 | rejected packet: | 0a 60 4f 04 ec 5d f9 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #248: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0728 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46af8e80 | handling event EVENT_RETRANSMIT for parent state #57 | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #57 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #57 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49637.510634; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.002794 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #57 | libevent_malloc: new ptr-libevent@0x7fb364045e60 size 128 "road-eastnet-nonat-57" #57: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #57) | dc 73 20 b1 64 22 3b 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 2f 93 7c 8a da 22 fa 03 a0 fd 43 de d5 8f 84 | 5a 41 29 20 95 01 7c 7c 28 a1 27 22 f2 08 de cf | e0 98 16 08 1c e5 25 a6 bd bd 17 32 15 8e 0a 84 | f3 a2 7e 8a 0b 23 85 bf 7a b1 94 6d 13 0e bc 89 | 00 57 96 19 37 39 1b 02 a4 75 0f 94 90 d1 10 4b | e3 d2 66 0a 4f b7 c6 79 75 d4 b5 7d e4 36 1f c8 | 04 58 22 28 f1 96 40 a5 11 63 03 12 07 da 6e c4 | d6 87 58 17 eb bc 28 31 1f 88 9d a5 0c ef e1 d5 | b2 c3 d0 ee 08 43 a9 fb b1 8f de 78 3c c7 ae 7f | e9 04 ce d2 ab ca 37 0c f1 2a 72 1c 60 e7 51 7f | f2 49 54 44 b1 5f 43 7b 10 10 64 5c c3 44 75 d6 | 07 11 18 89 6c 1c 54 ef 0a c3 7f 69 cd 21 c7 ca | 32 33 4c f8 00 03 d2 d4 0f 41 96 9b 82 7d 76 81 | 10 2f 53 dd cd 91 0b 3d ff 38 8f 40 80 5c 77 b7 | 3d 66 a7 7b a1 8f 9e 2d 33 51 5c 72 92 e6 a3 7a | 40 cc ae 39 5f df 20 2b 13 8b bd 4c 81 23 66 a3 | 29 00 00 24 ad 63 ea 8e 7a 7b c2 d1 15 38 47 f0 | b3 a0 1a e0 85 11 f2 24 75 cc 3c d8 47 12 da f1 | 4a 24 d2 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 1b 4d 24 72 19 56 63 62 33 64 a7 | 66 22 df c0 bd 29 cc 1c 00 00 00 1c 00 00 40 05 | 7a aa 57 0f 26 4b 8b c1 eb 1a a3 08 c1 cf b1 49 | 59 b9 d4 8a | libevent_free: release ptr-libevent@0x7fb37804b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af8e80 | #57 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 73 20 b1 64 22 3b 0f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #57 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #57 | rejected packet: | dc 73 20 b1 64 22 3b 0f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #57: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0666 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #249 | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #249 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #249 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49637.567038; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.010022 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af8e80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #249 | libevent_malloc: new ptr-libevent@0x7fb37804b7c0 size 128 "road-eastnet-nonat-249" #249: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #249) | ad 80 10 70 da e5 b7 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 1c 07 0c da 8a af 5e 89 e6 75 e4 e2 6b 94 81 | 88 bb cc 32 0e 51 16 82 66 1f 3f 42 b2 39 20 4f | 72 37 07 9a fd 40 87 70 79 6c 98 3b 3f ae 9c 8b | ce 68 05 66 50 64 85 b6 97 7b 54 39 f1 30 aa a3 | 04 6c 7c 88 ec 3c d1 1c d3 b4 4e a1 ee ab a5 d5 | 77 d7 c7 96 43 3f c9 ba 18 4d e2 bf ce 40 6d b9 | 2e 6f 43 a4 09 5e 6a 0a 57 fe 2f e8 72 ab e9 6e | d3 23 65 2e 56 3d 4f 3b 55 96 b0 62 91 f8 d1 e0 | 2e e0 00 1a 25 63 9c 6e 63 ad 31 ed ac d2 4b 58 | e3 5c 40 70 04 55 4c 39 0d 41 92 a2 3d 54 25 26 | d7 ef 2a e6 88 54 16 3c 17 a5 5d ae da e8 b9 49 | 9e f9 ac d6 d0 b5 d1 4c 32 7f 53 80 13 ce 13 ff | c1 9e 7b 3a 03 2e b8 d1 5e 50 be f8 6c db 78 af | c8 42 2d 25 43 1f 70 34 56 a4 16 57 bf 31 c6 30 | d5 f1 f9 72 d0 f9 83 35 68 6b 2a 69 4e 20 b1 d3 | f4 3c 9d 15 41 2d 80 5e c6 a3 cc c1 23 a7 f8 c0 | 29 00 00 24 cf 2f e4 f6 cd 34 13 11 b4 5d 4f e0 | 11 dc f5 73 81 ae 1d 25 a9 7b e9 47 0f d3 b0 6c | 5e dc e5 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 3d 29 fe a9 de 26 71 da 28 d8 ce | 9c 91 f7 26 3e 7d 46 03 00 00 00 1c 00 00 40 05 | 93 a3 dc d9 83 9b 6f 85 6e d1 32 ad 49 d5 89 75 | f9 55 83 e1 | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | #249 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 80 10 70 da e5 b7 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #249 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #249 | rejected packet: | ad 80 10 70 da e5 b7 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #249: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd40 | handling event EVENT_RETRANSMIT for parent state #58 | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #58 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #58 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49637.596321; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005259 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #58 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 "road-eastnet-nonat-58" #58: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #58) | 0b a9 81 95 1f 0d 8e 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f b0 e3 df ce d1 d0 b9 30 6e 16 b3 e7 cf 92 e5 | a6 70 0e 23 5e 02 05 19 f5 b5 1a 04 6c 5e 7d a2 | 79 25 aa 0e 70 2a 25 1f 1c 02 b5 fc b9 3e 75 ad | e7 1e f1 8c 9c 7f 92 92 1d dc b1 ca 6d cf 53 ac | b8 0b 70 9b 2c 6a e7 8d 07 95 ae e1 37 ab ac 14 | 91 d8 79 4c ef 08 d0 d9 b0 55 82 09 5f 15 d9 df | e8 2c 4e cb ea a0 59 1c 81 c7 f6 39 0a 52 62 8e | 4b 57 28 22 1f d7 52 eb ec 16 d8 46 16 0a 27 88 | c7 c5 f7 e2 87 71 a1 2d 5e 9c 25 83 70 f1 a8 0c | df 63 58 3a 6f ba 9a fc 71 ac 13 82 0c ff 96 f7 | b2 3e 0f af a2 df f1 69 8f db ce 47 13 89 8f fd | ce 0a 15 3f 64 ea 8f f4 c7 b7 5e 3b b0 17 0a 90 | ef 23 ff a9 81 27 7d 7c ee 7a 36 7f 56 c1 b8 52 | 77 69 e0 69 4b 05 7c e7 a7 d2 48 f2 eb ac 08 c4 | 5f 9f b5 9e fc d5 98 d0 41 7f 9b ec 07 64 d8 f7 | 80 37 a2 97 6c ab e1 aa b4 48 78 11 a3 f3 d8 0a | 29 00 00 24 dd 82 37 0e 6e 7f fd 43 0e f6 0a 6a | 68 bc 25 88 0a 9e 3e 74 64 09 ae e7 87 f2 db fe | 06 d2 df 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 02 ef 4d 47 45 3b d6 d5 d7 fa ad | b5 dd 5d f9 98 95 75 30 00 00 00 1c 00 00 40 05 | 0c 06 c0 09 b1 a9 53 e2 00 18 ae 12 95 c7 71 d4 | 78 09 4b e3 | libevent_free: release ptr-libevent@0x7fb384032b00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd40 | #58 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b a9 81 95 1f 0d 8e 78 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #58 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #58 | rejected packet: | 0b a9 81 95 1f 0d 8e 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #58: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae0780 | handling event EVENT_RETRANSMIT for parent state #59 | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #59 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #59 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49637.662592; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009121 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd40 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #59 | libevent_malloc: new ptr-libevent@0x7fb384032b00 size 128 "road-eastnet-nonat-59" #59: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #59) | 97 6c 3a 75 a9 04 c6 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 c8 5b 92 1f 75 89 eb 0e 2e 34 19 de c9 7d 34 | 18 5b 4b 86 10 db bf e2 6c 1e 94 2d 7a 7d c9 7a | a0 2b b5 06 7b 90 f1 d3 cd af 0e 61 7b ec c3 64 | de a5 53 e3 bf 5e 51 d1 84 95 1f 6e cb 81 61 93 | ad 42 3a 9f 1e 3a 65 25 36 02 e8 9c 31 54 18 98 | 6f 55 90 5b bf 33 e8 09 e2 db 7f a5 0d 28 2f b0 | 76 e2 e4 a4 df b5 68 69 d1 19 fe bd 73 f2 f2 54 | 46 48 bd 1c fd b1 5e e2 cc c0 6c c9 e5 04 1c 0c | 40 92 81 c8 73 67 1a af d8 5e 9b 4f 61 bb 61 8c | a9 de 42 09 33 14 9f 91 4f 50 01 94 4d 87 81 f8 | a7 b9 37 9b 88 d2 60 21 55 19 56 c4 fc 7d e4 11 | 28 74 cf ae 93 f1 51 10 2e 23 31 34 07 b8 e7 37 | a3 5e 4c 95 61 50 f9 d4 96 86 63 2e 49 88 c6 44 | 13 5e 5b c4 2d 0c 65 06 af 27 76 b6 3c bb 87 1b | d8 ae 43 ad 30 39 b0 94 f9 53 b3 ee d3 35 1d 60 | 44 54 ef 8a f8 7d 13 88 d2 f8 8c df 8f 77 8c e4 | 29 00 00 24 b8 98 0c 82 63 7c e1 4a 6e 4e 96 76 | c9 de 50 23 14 2c 80 d9 d0 99 72 c2 8b e9 f8 32 | 80 1a 11 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 09 60 c9 a8 1a 7b a4 38 cc f7 74 | 87 5e fa dc 42 53 d3 c5 00 00 00 1c 00 00 40 05 | a9 7a 6a af 06 6a 57 69 21 03 39 50 4a 98 de 11 | 5d 3e 78 2b | libevent_free: release ptr-libevent@0x7fb36004b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae0780 | #59 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 6c 3a 75 a9 04 c6 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #59 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #59 | rejected packet: | 97 6c 3a 75 a9 04 c6 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #59: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a15810 | handling event EVENT_RETRANSMIT for parent state #250 | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #250 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #250 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49637.665888; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007772 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae0780 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #250 | libevent_malloc: new ptr-libevent@0x7fb36004b7c0 size 128 "road-eastnet-nonat-250" #250: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #250) | 17 2a 9d c4 13 ac 7b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f a0 94 c6 2f 84 36 04 eb 6b 9e d3 d8 c3 41 dd | 36 5b 9a 4c 3e c4 08 57 57 9d d2 59 b6 8f 5a a0 | 97 64 4c 58 37 53 a6 c4 b2 5a d7 28 c7 0c 91 ed | be a1 6c 6f 57 ab d6 36 57 9a ec 6e 81 e7 d9 ec | 00 31 e4 c2 56 03 3a 6a 1d 88 e8 70 93 fc 2c 64 | 28 be 05 43 75 db 83 1a 2d e0 38 f0 97 bc d9 f4 | 8f af 26 f3 55 d2 01 81 1a 51 e6 93 66 74 0d 48 | f0 8b f8 85 50 76 3e 80 0e 67 70 24 1d ad 6e ea | 72 9d 01 c4 5f 99 0d ea 29 5d 36 37 89 d4 98 07 | 88 15 ab 7a c4 c5 62 ba fc 8c d5 56 64 df 3c 82 | 9a 54 de 55 20 6b b2 85 89 5d a1 07 c2 57 11 bd | f6 1f f1 5d 9f 5c 8b 9a c0 e9 98 82 3c 9e 57 da | 35 cf a5 fa b1 00 d7 17 27 e9 41 21 aa 94 96 cb | a7 a3 73 c1 a5 31 48 fa 19 d0 03 ff 95 c4 5d f6 | f5 17 61 a5 35 90 af 0b d1 1b d3 73 e5 de 34 00 | 63 00 cf f1 60 d4 f0 c0 3e 0d 02 7c 00 ab ce 51 | 29 00 00 24 c8 41 60 b9 9e 92 4a 7d d2 ef 9f 8c | 7b 43 49 a0 e3 71 1b 9d 34 81 8d 16 42 5a ed 22 | 3b 97 7d 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 44 92 04 c0 13 80 0a cd 61 73 30 | d2 9c c0 ea 6c 30 db 12 00 00 00 1c 00 00 40 05 | 76 73 9b 47 5d 14 7f b7 af f1 ed 94 26 55 3a fd | 56 a2 76 70 | libevent_free: release ptr-libevent@0x7fb3440180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a15810 | #250 spent 0.0918 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 2a 9d c4 13 ac 7b ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #250 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #250 | rejected packet: | 17 2a 9d c4 13 ac 7b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #250: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a986c0 | handling event EVENT_RETRANSMIT for parent state #60 | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #60 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #60 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49637.724102; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008063 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a15810 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #60 | libevent_malloc: new ptr-libevent@0x7fb3440180b0 size 128 "road-eastnet-nonat-60" #60: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #60) | 25 9c c0 c5 c2 ae 29 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 2c 75 39 d4 fe e8 bb 01 36 72 a5 b5 e5 a5 81 | c7 38 4b e5 4a ae c6 e0 64 23 ae a4 00 42 bd c1 | 2e 59 84 56 2c d7 14 24 66 d8 ee 01 96 14 85 e4 | 4a 5d 41 c9 bd f2 52 f7 81 ad 7f d6 d0 a1 27 d2 | 97 41 8d b3 c0 bc 77 ec 23 18 fe 60 e2 a8 0c 93 | 13 c8 08 44 38 cf 40 53 40 99 23 6d f6 02 db 2a | 6e 32 b0 2c 67 33 6c a2 f1 af da 97 e3 24 99 d0 | 08 b1 cf 27 91 4b c8 a0 67 76 74 84 3e e8 94 b8 | 9c 46 bf ee d2 a1 d1 93 0c c9 20 9b fb 9c cc 69 | d2 c3 9f 9f 32 ce e3 cd 1e a4 06 0c ce ad 3b b5 | 3d 52 01 2e 64 72 a4 a5 0d 13 96 53 80 55 c3 af | c7 4a a9 17 ce 71 79 67 8d 48 4c a9 b8 00 02 38 | 2d 7c a0 0b 36 f5 68 34 0f dd 83 6f 1d d1 e9 b9 | 9a 43 52 12 d9 b1 6e ac 6a 5e ac d3 3c 20 66 93 | 6b 7e 85 4c aa e5 92 08 98 a1 8b 28 75 13 39 85 | b8 6c 05 ff ad 0d f2 e7 73 79 5c 18 65 6b dd 7e | 29 00 00 24 a0 1d b4 bd 19 70 24 f8 23 e6 87 dc | 50 af bd f2 95 21 f1 1c 7f 4c 51 8f f3 4c 1a 81 | a9 6f fb c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d6 a7 42 56 6b af 55 7e 9e 1f c2 40 | ba 0d 74 ad 6e b0 b4 2e 00 00 00 1c 00 00 40 05 | 49 f8 c3 9d b1 df 49 97 21 c8 2e 46 27 7c d9 25 | e7 f0 a2 de | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a986c0 | #60 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 9c c0 c5 c2 ae 29 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #60 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #60 | rejected packet: | 25 9c c0 c5 c2 ae 29 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #60: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0d4c0 | handling event EVENT_RETRANSMIT for parent state #251 | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #251 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #251 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49637.776402; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005792 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a986c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #251 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 "road-eastnet-nonat-251" #251: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #251) | df 3f 41 8a f3 53 d1 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 be c7 da 7c e0 83 1f ee 21 fb 97 63 3a 34 59 | 37 0f 13 08 a4 ea d7 d0 84 7f b3 4c 1b d7 fd 64 | d7 1b c4 39 0b a3 dc 8b fa 1d 0e 6a 81 2a 3e 09 | 69 77 47 fe 6f e7 1c 9d 41 07 43 05 b4 26 e9 60 | f3 29 4e c8 f2 da 1b 32 bb 97 33 75 2b 11 a0 c6 | 90 b8 73 b2 56 c1 80 3f f7 61 34 26 98 51 70 a5 | 88 c0 d8 c1 f3 4f b0 3f 75 1e 72 b1 d1 25 9a 2c | fb 27 8d d4 bd e9 f9 05 8f 56 62 b1 eb 23 67 7e | 83 41 57 f8 72 a3 e1 9d d8 36 e3 98 b1 13 30 a8 | a1 41 78 93 e9 2c e0 32 39 cd 75 d2 0c 43 c2 5b | 87 04 ee b5 1e 82 ed bc 9a dc ae f7 d5 db 76 da | 37 c9 35 0d 18 56 2e 1c 38 d4 6f a6 b2 28 96 31 | 03 0b 4f 71 60 58 12 2e e6 e1 cb 0c 0e 82 e2 ad | 8c 61 3a e3 4a ba d8 15 fc ef ca e2 63 cc 17 43 | fc 08 79 fe 35 fa e0 53 4c ee 7c 11 7e 46 1e 11 | a2 1a 41 cb e0 70 0b 67 d9 3b 63 7b ce 2c 58 e9 | 29 00 00 24 42 a0 3c df af e9 94 45 ab 83 0c a2 | 5d 7d 94 01 25 5c 79 6e 69 bd 19 b2 b1 d1 a1 50 | 35 69 ea d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be 44 4c d9 6f 7f 41 ca 31 72 e4 37 | ba 88 35 fa ba 64 3a 13 00 00 00 1c 00 00 40 05 | c3 fb 91 09 59 3d 6b 06 7b be 35 78 ae 35 d3 44 | 75 ba f4 a9 | libevent_free: release ptr-libevent@0x7fb34803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | #251 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 3f 41 8a f3 53 d1 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #251 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #251 | rejected packet: | df 3f 41 8a f3 53 d1 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #251: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a63210 | handling event EVENT_RETRANSMIT for parent state #61 | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #61 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #61 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49637.782662; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006461 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #61 | libevent_malloc: new ptr-libevent@0x7fb34803b0b0 size 128 "road-eastnet-nonat-61" #61: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #61) | f7 bc 52 c3 08 41 7d fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 a3 fc 88 6c c9 17 99 e8 c8 f4 84 4b dd e6 d6 | a2 3c cb b6 7d b8 4b 73 4d d1 4a 52 0a 17 63 b0 | ce a1 f6 5b 22 20 08 31 0e da ec fd b8 c2 13 f9 | b7 0d 78 21 3f 05 bc f7 2c 5a 0e b5 1a 70 bf 53 | b0 72 5e 64 9f c9 e5 f6 6b aa f3 db 8b b8 b8 b3 | f6 f8 ae 22 20 f7 35 9c 39 6d 5a ba 98 af 4b 1d | 6d d4 8e 29 87 bb 7a 2b 6b 4a b8 79 51 26 39 b0 | 6a 6c be 49 5f 57 bf 03 7a 6e 7f ac 45 f9 af fb | a3 06 52 bf 07 ef a5 db 3d b8 9b 73 f0 8e b1 76 | 2b 5d b7 93 de 9f 59 44 c1 67 8a 9a a5 50 66 6c | 27 3e 5e 44 b1 e9 13 dc 81 57 82 47 20 a2 32 79 | d4 b0 d6 87 f1 f1 20 bf e9 93 fc 11 dd 5e 42 b0 | a4 4f 0e f8 93 a1 1c a5 59 56 db 69 8d ca d0 53 | 78 b2 af e6 28 15 c5 c9 00 fd bf f0 33 a6 bf 2d | 7e 87 d7 d1 a0 82 65 91 eb 3c cf d0 6f fb 0e 4b | 57 a1 5c 8a 3f 3c 13 19 f1 bc 6c 89 96 42 e0 e9 | 29 00 00 24 30 62 04 12 b8 d1 41 8a 1d 82 4c c7 | f3 e8 92 81 d6 0e cc 31 5a f2 7c 04 56 a0 26 04 | e6 c5 8a 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 04 89 46 c0 2a 68 09 d3 b8 a6 1e | 7d d4 48 56 88 7a 56 d6 00 00 00 1c 00 00 40 05 | bb 1e 0b f8 57 9c 2b 42 0a de e4 96 f3 8b 61 81 | fa a3 7d bc | libevent_free: release ptr-libevent@0x7fb35c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a63210 | #61 spent 0.0977 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 bc 52 c3 08 41 7d fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #61 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #61 | rejected packet: | f7 bc 52 c3 08 41 7d fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #61: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #62 | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #62 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #62 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49637.850931; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009301 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a63210 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #62 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 "road-eastnet-nonat-62" #62: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #62) | a4 88 8e 77 b1 f4 8c bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 16 5e 67 aa cb b3 98 fe b6 e6 44 1a 07 e2 be | 44 c7 a0 47 e1 e7 ec b4 60 c9 7d b0 5b 56 2d 1b | e4 9a 0e 63 18 22 7a fa a9 c7 63 82 b0 af 0b 0d | 77 29 15 f5 8e 1b 69 90 f4 7c 19 86 79 0a 5f e8 | f6 12 ff 9f 31 22 5c e3 f7 e6 5c 40 a8 f4 37 ed | 38 af f3 38 7f df 64 d9 95 08 2b d7 e3 b5 1f 60 | 26 37 fe 9a 98 33 04 94 0b 0e 07 08 c5 5e 7d f8 | c0 0f 76 eb 24 9a 96 24 01 c7 9b fd dc 2c ed 1c | 7f 8c f6 fb 9d b0 c1 a4 53 e2 53 da 53 65 1f 9e | 4e d5 a4 5d a2 34 99 86 95 17 7b b9 d0 eb c5 9a | 7a c4 fd c2 ec 45 e1 8d 1b 55 bb 91 5f 61 39 83 | ed 3e fd ec 0b 7f cf a5 d0 34 4d 78 f0 19 f9 dd | 25 c0 20 38 67 61 04 4f 0d 51 42 43 cb 7c 44 01 | 6b 99 d1 a6 d3 b1 5e 29 d8 c7 53 4a 9e 9d fe 70 | 66 03 05 bd 1d 96 be 53 72 9a fa 30 50 08 24 ae | eb 69 31 f0 f7 2f d9 1c ab 9d 37 cd ad 7a ed 6a | 29 00 00 24 0c 26 e7 cd 38 ca 58 e6 02 58 43 30 | ae e2 2c 6c 6d 36 d5 ae 9b 11 96 a7 26 d9 7a c2 | 05 18 d0 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 28 4f 82 49 71 8c 73 8e 61 ba dd | 8f a7 28 9b 76 c2 13 ce 00 00 00 1c 00 00 40 05 | 01 46 1c d3 66 df 29 38 51 83 6e 7c d6 51 6d 46 | 6c 4e be 2f | libevent_free: release ptr-libevent@0x7fb374040670 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #62 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 88 8e 77 b1 f4 8c bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #62 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #62 | rejected packet: | a4 88 8e 77 b1 f4 8c bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #62: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.077 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #252 | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #252 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #252 keying attempt 1 of 0; retransmit 6 | retransmits: current time 49637.910249; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.009735 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #252 | libevent_malloc: new ptr-libevent@0x7fb374040670 size 128 "road-eastnet-nonat-252" #252: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #252) | 50 58 54 7e 04 4a db ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 00 2c be 68 01 bb 0f 58 1a 16 c9 1d 14 15 83 | 19 e0 b8 46 87 82 81 55 0f dc 16 6a 8b 3d e4 4d | 0c e9 b2 bb 22 a5 95 09 ff 11 50 af 23 66 83 f2 | 31 7e 02 6d d7 48 dc 83 9d bb 70 c0 3a 92 f4 c0 | 9a e6 0b 57 02 38 84 8a 91 5b b5 ae 3c f3 73 1a | a4 24 27 15 5b c6 51 0e da 95 77 0a bb 05 7d 91 | af 25 45 22 0e b2 f2 4f fd 42 9b d1 98 1f 5e 0f | dd f0 f2 19 b9 ea ba ee 11 21 ee b6 0c 0f c9 55 | 03 18 8b f7 b4 d9 1d 6b 99 70 65 d0 5f 1e dc 40 | 4c 0a 83 ea e9 69 a1 18 51 d4 d2 fe 11 46 10 47 | b7 70 71 e5 e6 a8 cb f1 92 74 f2 25 34 f1 2a 20 | 05 8b f0 31 b4 4d ec 75 25 71 1f 16 3f cb 5c 38 | 5c 6a 40 df be e7 8c 81 eb 7e b2 34 69 d7 27 e3 | f2 93 a6 4e c8 e4 03 ff 2e ce ce ed 7f ee 01 95 | 24 0e cb ce 0e 6f 39 0e 07 c6 d8 ca 80 7d 23 cb | 6a 28 32 82 38 d2 86 f0 3f 31 6d 12 83 e3 4e 38 | 29 00 00 24 18 de 08 18 c8 a2 29 e1 d8 0d de 97 | 0b 9b 22 3a 3d 4c 80 05 7e b8 73 ae 1d 84 d5 68 | cf f8 f7 ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 65 87 e0 56 8f 33 84 b6 65 68 e9 | 21 de 15 28 76 56 f7 ec 00 00 00 1c 00 00 40 05 | 9e 72 e4 22 38 66 37 d3 ad ef a1 2e a9 f7 f8 37 | 54 d6 26 3e | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #252 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 58 54 7e 04 4a db ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #252 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #252 | rejected packet: | 50 58 54 7e 04 4a db ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #252: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0687 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46af3800 | handling event EVENT_RETRANSMIT for parent state #63 | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #63 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #63 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49637.917625; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.013218 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #63 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 "road-eastnet-nonat-63" #63: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #63) | 43 a8 4d 01 ec 36 de 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa e2 93 e3 30 a1 06 ee b4 85 58 c9 2f 9d d0 1a | ad 38 32 dc 30 89 d1 a0 98 57 8d 01 77 84 b3 55 | 47 fd ae cc e0 a9 2a 35 58 f1 6a 27 c8 b7 88 d3 | c3 78 1e 95 37 0b 81 ee cb 00 02 38 fb 0c bc ff | 55 19 c6 c0 be 69 d1 78 c8 9a ae e0 96 6c 3f 9b | 54 61 8c 4b 6b 45 ac 74 a1 6d f1 1d de 9e c2 52 | 40 62 38 7c 4d c1 06 5c f5 e4 71 d5 c6 8f eb 8d | a1 58 7d a8 05 d7 f2 d1 12 1f d4 be 60 08 06 1f | 2a 4d 28 f0 ba 0e 77 13 d0 8f 4c 08 fc 37 3f 98 | 37 6b f8 7a b1 44 d3 8b 12 01 3a e0 ab 1c 6f 72 | d8 5a cc 1f f0 ef fd b0 38 cb c0 2b 70 72 dd 77 | 20 94 89 cc 24 42 7c 89 06 09 17 e9 b7 42 85 43 | b5 81 b7 cc a1 a3 3a 6b b1 18 c1 ec 8a 13 0d f9 | 71 43 3d 9a 1f 64 16 b7 2b bd 29 ea 9f 4f 17 43 | a8 18 9f fc 5b 56 59 fa 46 4c 5d 82 89 28 f2 04 | 51 6c b3 97 3a a5 95 f1 fd 87 8b 14 08 ce a0 6b | 29 00 00 24 42 95 7e 08 3c e5 ab b4 d2 f9 ef 7f | d8 0c 96 cd c4 ca c3 e4 35 0f 70 37 5f 05 86 60 | 4b 19 91 ea 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 ed eb 0b 29 2b d1 a0 42 dd cd 92 | 88 75 fb d1 70 51 78 cf 00 00 00 1c 00 00 40 05 | a8 06 2d d1 ac 32 5a b6 7e b8 ae d6 ec a9 34 27 | 7d 9e 90 d0 | libevent_free: release ptr-libevent@0x7fb35804b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af3800 | #63 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 a8 4d 01 ec 36 de 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #63 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #63 | rejected packet: | 43 a8 4d 01 ec 36 de 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #63: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000d120 | handling event EVENT_RETRANSMIT for parent state #64 | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #64 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #64 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49637.975923; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006148 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af3800 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #64 | libevent_malloc: new ptr-libevent@0x7fb35804b7c0 size 128 "road-eastnet-nonat-64" #64: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #64) | 28 7e be 04 bb c7 3c e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 7e 43 6c c6 61 f7 8d 74 52 44 4a 1c ca e7 9e | ac 14 d9 31 6d 60 9d f4 ba 6e c2 e0 7b d5 53 a3 | 16 85 f9 c3 ce f8 f1 6f bf 00 c2 bc 5a d4 f5 80 | d8 8f 02 50 d5 75 7e 2e dc 8c e1 ab a9 5d a2 cc | da fa 4e bf fb 7e 0d a9 06 25 1f 41 e3 0d cd 1b | 1a a7 53 a9 ce 79 cd b5 77 9b b8 2e 89 66 fa cb | ad fc 1f a1 86 e2 14 75 9e d9 ee bd ba f9 9f 7c | e4 64 68 99 18 9c 70 2b 82 20 55 55 75 56 88 5d | d8 d5 c7 f6 4d e5 dc 25 37 08 b7 1b d0 a6 99 40 | 0a 49 58 f6 83 1c 88 a0 08 dc b3 c1 aa ed 91 6f | c6 a5 be 4d 6b b9 bb 18 cf 12 ba 0d 71 89 70 ef | 66 fa c4 5b 33 09 3f ff 55 ca 19 24 9a 74 4d 4c | d1 a6 e0 57 41 7a 44 3f b8 12 3a 3f 06 a7 52 cd | 97 1c e0 a8 3c be fa 81 97 1d d6 2b 3f 0b c8 9f | b8 ad e1 63 a0 10 8f f1 ce 62 64 83 9e 28 1c 57 | ba 8c 77 7e 6f fe 44 22 ea fc fc 43 05 9a a7 9f | 29 00 00 24 d6 fa 6f 28 11 8e 89 70 36 5a 3b d2 | 30 2c 96 5f 7f e3 aa dc e7 9f 74 e4 9d 9a 67 37 | a5 4e 3a 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 34 45 e6 51 f4 83 8b a3 3b 13 c9 | fe 48 d2 4a 75 21 a9 ed 00 00 00 1c 00 00 40 05 | 1b 38 c5 d0 41 1e ff f1 67 34 2b 17 6a 69 bf 2e | 0c d6 b9 4f | libevent_free: release ptr-libevent@0x7fb360012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000d120 | #64 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 7e be 04 bb c7 3c e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #64 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #64 | rejected packet: | 28 7e be 04 bb c7 3c e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #64: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0572 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ed00 | handling event EVENT_RETRANSMIT for parent state #65 | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #65 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #65 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49638.043287; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008775 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #65 | libevent_malloc: new ptr-libevent@0x7fb360012840 size 128 "road-eastnet-nonat-65" #65: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #65) | ef 12 90 5c 48 7d 35 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 1d 09 25 1e 78 f1 ab 15 10 4e 97 1c df 6e dc | ea a4 f2 51 40 2c fc 70 83 3b d1 14 8e 0e 9b f0 | ed 07 86 8f 8c 86 61 7e ec 48 49 64 93 36 5d 3e | 17 1f e8 61 4f 64 88 6f dc 05 20 78 89 b7 e5 6b | 2c bb be 5b d1 73 00 a1 4f 26 6a 56 a9 d6 41 92 | 2d 76 96 98 ed 1d 08 e4 99 fe 2c 5e 06 f5 6b bd | 7e 5c 39 22 bf ae a8 e1 92 1c 13 3f 1d 70 c4 80 | 07 a5 77 ff 91 5d 4b 48 ee 7b fd 40 d0 32 19 b5 | 09 de 90 f8 5a 03 1b 2a 6a c3 ef 64 b2 ec 44 55 | 99 02 c6 b9 5e db b2 cd f2 ce d4 a6 86 55 55 7c | 29 4f 4b ce 6a 0b b1 f7 34 a8 01 90 c9 f9 c3 1c | 81 d7 a5 bb 19 5a 7d e2 de 08 df 1d b2 6d 5a f1 | 1e a2 87 2c 96 1b c7 cb 00 ed 5b 85 f3 b5 ad fb | 85 9e 29 58 fd ca dd fe cc ef 21 ce b6 4c a2 4d | d7 d2 d7 9a 36 aa ca e6 4f 15 82 d8 a4 cd 14 4f | 08 9f 68 62 be 95 a7 c1 d4 3f 0f 63 b9 f6 80 56 | 29 00 00 24 56 09 76 96 73 f6 7a d5 b4 ac d9 d3 | f5 d3 52 17 38 15 85 8c 5c 9b 9d d9 ed a7 ee 26 | 3a e8 6f 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 23 18 fa b0 e0 93 30 87 95 e8 a3 | 79 bf 51 a0 e1 20 e5 2d 00 00 00 1c 00 00 40 05 | 26 a2 95 ca b7 c9 12 03 be 34 1f 1e 21 7b 79 10 | 86 6d e0 e7 | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ed00 | #65 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ef 12 90 5c 48 7d 35 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #65 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #65 | rejected packet: | ef 12 90 5c 48 7d 35 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #65: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1c450 | handling event EVENT_RETRANSMIT for parent state #66 | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #66 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #66 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49638.105579; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009105 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ed00 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #66 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 "road-eastnet-nonat-66" #66: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #66) | 64 fc 26 82 c6 65 9b e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 5c 42 12 a8 cf 54 30 35 41 88 3e 73 38 e5 58 | 88 e1 84 4c b4 74 fd b0 fa c4 88 6f 83 90 67 ee | ea 08 5d 03 f5 21 c1 48 f4 fa d9 68 de f8 02 e9 | 20 8c 8f 00 bb e0 27 04 09 fe 8d f2 a1 9c cf 02 | 35 98 ce 70 23 87 ee fc 94 cd 0c 7b 9f 06 08 77 | f2 7f c2 13 7f e1 04 f8 2f 23 ef 1d fb 54 4c 0d | ac 20 e0 c8 bd 84 3e ce b6 49 37 85 56 01 f1 9b | ac 54 85 9c fd 7d 5d 63 30 bd f9 4d d5 7a c1 a0 | 6c 64 e9 25 18 ed 7b 3f 1a a2 52 c0 47 b8 c4 ff | 46 70 76 9b eb db 63 e5 d9 0f fb e2 44 f2 65 5e | ab 82 c1 e9 45 5a aa 38 88 06 f2 1d 2e 7b 75 16 | bf 94 df 07 bd 89 cd 9e ba b0 6c 38 fc 80 69 75 | 55 88 bd 23 1e bc ab 76 6d 9e ce 05 ea ee d0 f1 | 1a bd 0c b1 86 63 56 69 8c 5f 2e 8a f5 e2 c1 97 | 10 bc e7 eb 71 fb 81 cd 25 de 9b 6d 12 04 dd ce | 36 90 99 3b a3 2d 73 4a 99 7b f0 18 dc 83 2b 7d | 29 00 00 24 64 f2 bd 07 f3 b0 6e 75 d4 40 2c d9 | f4 e5 3f 9a 4d aa 41 b2 3f a1 6e 03 4f 7d 3f ec | 58 37 55 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d dc 62 51 f8 7c c3 1c 6d 46 26 31 | c0 6e bd 6d 19 0c cf 42 00 00 00 1c 00 00 40 05 | 76 be 2b c3 74 ff 88 3d a8 f9 74 84 97 f5 dc 48 | 6c 56 c4 9c | libevent_free: release ptr-libevent@0x7fb37c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c450 | #66 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 fc 26 82 c6 65 9b e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #66 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #66 | rejected packet: | 64 fc 26 82 c6 65 9b e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #66: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.124 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aeb500 | handling event EVENT_RETRANSMIT for parent state #67 | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #67 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #67 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49638.167046; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007199 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c450 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #67 | libevent_malloc: new ptr-libevent@0x7fb37c0407f0 size 128 "road-eastnet-nonat-67" #67: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #67) | d5 dc 19 08 bd ef 9f dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 15 d2 0d 8c 5c 68 38 3d 2d 2f ab 03 65 12 47 | 3e b1 d3 f9 3a 86 7c eb 4f 39 8c ad 4d 38 70 41 | d1 7d 9c 72 4f 83 e4 6c 89 f6 b0 17 b5 42 16 02 | 98 46 bb 9b ed 5c 3f ac 09 0d be a1 fd 38 36 65 | 29 1c 76 c9 62 fc be 23 07 ff 11 92 31 9b 27 f0 | d5 89 d4 07 37 e6 d9 c5 11 e2 68 cc f6 fa 8f ad | d4 d7 3d 81 a6 50 a2 3b 0c 6d a4 dc e7 02 2c 0e | b0 92 5d 4d d1 8c bc b1 d3 8b 8b 57 d6 a3 1b fb | 45 de 41 0c 4c 00 09 3b b7 02 6a 18 be d3 e2 bf | 60 42 87 71 10 49 5d 99 2a 98 69 45 a3 b9 8a 57 | c3 e1 71 dc 21 28 e6 7b 37 29 eb da 68 00 eb 12 | 52 79 13 c3 54 c6 f4 5a 0f 77 f8 92 a7 c4 70 9c | 42 51 17 18 c9 d7 b0 85 26 54 bb 62 a6 c6 48 68 | 6f 63 77 09 be 06 39 71 28 8e 68 84 3f f2 9b 78 | 53 a2 0d 5b a4 87 76 9f e3 e1 57 84 7f 83 44 ad | 59 6d db cc b7 ca a2 5b d9 9b 67 9f f8 59 1b 8c | 29 00 00 24 ea 05 1a 8b a3 08 e1 05 bd ec 39 06 | dc 75 19 c7 61 25 8f 0d bb ee a8 4f 1e a0 d7 a0 | e4 5f a7 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c a1 13 b6 f8 7a c8 5e ab 0d 26 ff | 9e 2c 49 6a b7 74 41 36 00 00 00 1c 00 00 40 05 | 1e 6d d9 18 71 66 9b 77 ce ef 92 9d c1 b1 8d 12 | ab 9b 0c 2a | libevent_free: release ptr-libevent@0x7fb3480407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aeb500 | #67 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 dc 19 08 bd ef 9f dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #67 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #67 | rejected packet: | d5 dc 19 08 bd ef 9f dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #67: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a92f80 | handling event EVENT_RETRANSMIT for parent state #68 | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #68 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #68 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49638.262441; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008423 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aeb500 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #68 | libevent_malloc: new ptr-libevent@0x7fb3480407f0 size 128 "road-eastnet-nonat-68" #68: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #68) | 70 75 31 66 aa 5c 9c e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 5d b8 31 5b 51 c7 81 22 c3 12 8e cd 03 2f 05 | f3 e7 e9 e0 56 07 0e 19 4f f3 59 f8 5f 92 30 b5 | 72 b6 ae 5a 15 67 03 c0 c9 25 86 6f b6 cd 52 32 | 93 89 9d 85 44 28 f4 e9 22 34 65 fb b6 28 63 5f | 80 98 37 5a 06 27 0e fb ee f6 cc 60 03 1e c8 99 | 96 20 20 2b e8 6a b0 1d 57 83 e1 9f d1 09 80 29 | 2a 2a 69 37 ce 92 30 79 1a 45 aa a3 bd 30 cd 8b | 23 97 c9 73 f8 32 ee fe d7 1e 67 73 bd 11 db 26 | 12 e8 63 a6 c5 a1 37 4f 2f 5c 98 66 44 92 9a da | 46 ed 57 a3 46 50 a7 e5 d9 ec 61 b3 fb 59 43 1f | 96 83 9a 55 36 c4 68 5f a7 ee f4 08 c7 30 31 52 | b8 7e 06 a5 b1 e2 2e 1a 2b de 01 96 c6 3e f1 89 | d8 1f b9 ac 77 f1 c6 91 93 f5 70 bc 2f 41 d6 e3 | ff da e8 8a 1d 5f de 22 6f 38 d0 51 a3 b4 49 ef | d5 06 ff ea 4d f6 71 eb 33 f8 fd c7 e6 95 54 de | 64 89 15 37 cd bd bf d2 74 6c 8e f3 c4 d1 b1 ad | 29 00 00 24 8c 8f d0 a2 59 9b be 88 0a db 9c c0 | a3 eb 04 0d aa d5 13 33 65 39 12 37 76 6e 7e e3 | e3 60 8c 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 a4 28 dd c4 89 9a c5 51 2a d8 15 | 55 6e c2 5e f1 52 b9 d0 00 00 00 1c 00 00 40 05 | ac d9 33 90 76 69 a3 40 a6 e4 ee bb 11 92 b7 71 | 1e 90 c3 02 | libevent_free: release ptr-libevent@0x7fb34c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f80 | #68 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 75 31 66 aa 5c 9c e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #68 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #68 | rejected packet: | 70 75 31 66 aa 5c 9c e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #68: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0816 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #69 | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #69 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #69 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49638.323851; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005277 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #69 | libevent_malloc: new ptr-libevent@0x7fb34c03b0b0 size 128 "road-eastnet-nonat-69" #69: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #69) | f2 a5 7f fe 4a 34 bb 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 e4 3b 13 88 fe 14 57 37 ea f2 64 67 d0 00 fc | 08 06 ee d2 9e 18 57 6d 24 e0 9d ec 05 43 cc ba | 46 84 14 09 e9 e2 59 69 78 ab 8d 44 b4 c5 40 3a | a2 89 7d 06 7b bd cc e4 70 62 31 9f 43 8b b5 bc | 3c 9f 69 fb 1f f5 22 54 18 e5 72 15 5a 48 ee 5c | c3 f3 42 0b 25 4e 7f 00 ca 3e e9 db 4e ab 7a 2a | 5e 8e 14 a5 6c b8 fa ac c8 1b f3 01 fc 2e 88 fc | de 9d 1f b4 30 64 da 79 40 14 b9 cb 57 7b 44 a9 | 8b 4d e2 fe 10 ef 78 5b 95 32 a7 75 3e 68 a2 02 | 50 a9 63 99 4c de c2 a2 55 8e e7 c1 4c 9d ba d5 | 23 4b 1b 11 eb 5b d1 0e 0a 69 30 ae 96 7b a4 e6 | d5 07 c0 08 e9 6f 21 3e f5 fc eb 69 b8 6d f7 0c | e4 6a a2 62 87 f1 46 98 bb 82 fd ef c3 b7 37 d9 | 4f 4d 06 a6 46 29 3d cf 6d 59 1a 7a 7d 4c 43 d4 | 05 3e e7 70 e1 23 3b 86 eb 4e 8f 26 e0 cf 97 cf | 6f 21 b0 32 5e 71 a6 25 0b f1 15 b5 06 82 51 60 | 29 00 00 24 ca 10 ed 53 1e ff c5 43 38 73 0a 51 | c6 98 7c 29 17 9d 86 f8 04 d8 2e 0c fa 41 a7 af | 38 8b 0b 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 9a cb 7f 17 aa e7 97 ca 43 a3 43 | c3 e4 41 43 e3 4b 2a 3e 00 00 00 1c 00 00 40 05 | 50 72 12 31 6b fb 9c 33 88 e7 6f 1a 9e 5d 70 fe | 3b 28 e9 92 | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #69 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 a5 7f fe 4a 34 bb 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #69 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #69 | rejected packet: | f2 a5 7f fe 4a 34 bb 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #69: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc00 | handling event EVENT_RETRANSMIT for parent state #70 | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #70 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #70 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49638.387099; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008675 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #70 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 "road-eastnet-nonat-70" #70: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #70) | 80 24 74 22 d5 0f 52 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 68 71 3c 0e 60 a8 bb a5 bd cc ef ef 0c eb f4 | 82 28 4b 5e 34 f6 13 aa c3 d7 89 31 ad 91 46 ac | 15 dc aa e6 7a e7 0b 3f 82 69 6e e1 56 f0 c8 52 | de 05 0d fd 08 00 ee cd cc b6 87 fe a0 b0 ff e6 | 05 55 e6 b7 5e 20 53 79 90 12 ce ff 82 cf ad 41 | 3f a9 51 ad f1 8c d6 57 77 1c ef 27 f0 57 e1 8c | 97 cb b6 ce ff c0 f1 f4 a5 49 d9 74 1f 1d 74 75 | 54 be f3 af 4b 6b 43 9d 43 d4 e5 05 71 04 36 2c | c7 7c 5d f8 30 fc 44 25 48 9e 9e 82 91 e8 e4 34 | 70 26 3e 95 67 c5 a4 cb 36 d4 25 b1 2b 4a 77 2f | ae 15 52 3f 18 49 f9 47 bb a7 d2 0a ef 99 db 3d | 39 af f3 91 da 08 e3 b3 1f e4 ed 82 f5 26 e3 03 | 98 c1 58 ff ba 18 2d c8 81 ea 83 51 70 26 1e 19 | 23 60 13 98 08 43 34 78 7d 3c 93 d1 af b4 fb fe | d5 41 09 8b c9 2b 05 f4 1c a3 62 cd 21 e3 82 7b | 55 52 fe 90 11 4a 62 6c 99 8c d7 30 a6 21 f0 d1 | 29 00 00 24 e3 da 6d 7f a1 8b eb f9 61 52 ce 97 | 54 be ad 07 4c e8 1e 18 ff 49 38 58 56 77 f6 8a | c3 33 cb 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 9f 21 cd 26 5d 21 04 f0 de c9 2f | 2e 65 dc 8c 6b f1 6c dd 00 00 00 1c 00 00 40 05 | 7b 41 25 4c 4c ca db 2b 78 bf 1e 87 08 ff 47 0c | c4 b0 37 95 | libevent_free: release ptr-libevent@0x7fb3780300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc00 | #70 spent 0.176 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 24 74 22 d5 0f 52 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #70 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #70 | rejected packet: | 80 24 74 22 d5 0f 52 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #70: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0285 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb40 | handling event EVENT_RETRANSMIT for parent state #71 | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #71 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #71 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49638.443449; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004943 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc00 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #71 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 "road-eastnet-nonat-71" #71: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #71) | 95 1a 0e bc b8 89 e9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 b7 52 d3 88 4c 72 94 29 6d 07 48 59 53 9a 94 | c0 d8 40 dd 8b 33 cc b5 e7 5f 10 c4 f9 b5 b0 62 | 0e 7e dc 7c c0 5d c2 c0 b8 2a 1e ee d8 c7 67 c5 | 6e 7a 2e c8 c8 78 d1 01 66 2d d2 7e a8 80 78 39 | ed 64 bc 65 47 6b 53 20 db f8 49 7d 75 df ac 21 | 43 37 22 43 cf 85 a4 b5 c6 f2 cc 18 4e ff c1 67 | d6 fb 3b b4 2a 72 36 3e af 12 4f 93 13 35 59 a3 | 8d fd 4c ac bd 7c e1 d6 8a 63 b4 aa 9a 01 66 5d | 44 4d c8 c6 a5 27 c2 50 76 c4 0f 7a ea 30 2c 2e | c8 fd c2 09 eb 13 95 a3 62 05 52 05 99 27 2d 5d | 04 8a cb d5 bd f0 da af b1 fd a8 57 4b 25 12 cd | 81 31 3f 97 9d 49 d1 70 50 67 35 65 ba 2d c4 ae | a9 91 18 06 72 21 47 2c 8e e0 a3 db 1b a2 3f 13 | 0f a8 f6 3e 94 d7 36 d8 17 22 ad cd f5 cd f3 43 | 86 8f ec 5e a8 71 d9 dd 87 6e d8 e4 58 cb 3c 76 | ee 77 2a 83 0c e5 de 50 b0 fc 77 61 13 ac a0 07 | 29 00 00 24 12 6c 20 e2 d1 b6 94 1d 42 66 63 a9 | 4b 6f 5d 9a 24 6f cd 6b 53 ff a3 87 80 0a b8 8b | a0 96 5f 5a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d bc a1 51 aa 8f 7f ab dc e5 06 f0 | 38 bb 8c 63 92 8e b2 f3 00 00 00 1c 00 00 40 05 | c9 d4 4d 25 1c 7e db b6 b8 a8 68 63 26 d6 45 14 | b5 8e ec 75 | libevent_free: release ptr-libevent@0x7fb35c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb40 | #71 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 1a 0e bc b8 89 e9 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #71 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #71 | rejected packet: | 95 1a 0e bc b8 89 e9 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #71: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b5d0 | handling event EVENT_RETRANSMIT for parent state #72 | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #72 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #72 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49638.509809; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006633 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb40 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #72 | libevent_malloc: new ptr-libevent@0x7fb35c0407f0 size 128 "road-eastnet-nonat-72" #72: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #72) | 66 13 43 d6 1b b9 0c ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 b1 4f d1 eb 26 94 0a e8 d2 78 fe d2 e8 05 7d | 72 29 9f e5 e1 94 c3 7f a9 6a ca 75 12 4e 13 6e | e4 11 a5 e1 89 1e 08 5a 0d 5f 6b 49 0c e7 ba a3 | db 19 75 da a7 48 e8 e9 64 d4 80 8e 45 f5 82 09 | 04 17 24 14 78 b4 6e bb 71 57 6f 3e 18 4c d6 76 | a4 ec 50 14 2c c8 4e c9 04 89 23 f1 0a 7f 62 28 | 45 8e 70 27 19 66 b0 68 5f c8 be 34 a7 7e 02 24 | 87 3b ee fe 4b 57 85 64 69 04 b9 42 92 f3 d5 c0 | fe 76 05 b0 05 50 57 66 f6 f8 0b 76 74 c3 53 a1 | 05 f6 81 e4 08 d7 39 f0 53 40 e0 f4 aa 4c ff a6 | 90 72 89 fb 79 82 71 5c b3 e4 6d 43 97 e8 51 8b | ba 0a c8 eb e3 46 09 21 84 b9 ea ef 0d 8d d4 64 | 4c bf f8 b1 9c cd 8a 27 78 9c ef 52 df a6 5e b4 | 15 f4 af e2 3a 17 55 a8 8a cb 58 8c 66 bc a1 fb | 21 eb f8 38 a5 f6 b0 fd 47 53 aa ad 2e e9 17 ad | 29 40 34 3f b5 2c 48 93 29 5b c3 81 a9 9a f6 f7 | 29 00 00 24 d2 7d 93 13 5f e4 cd 1b 68 e9 96 b6 | 73 3d 25 76 63 d4 92 1a 4f 51 ac b1 63 90 04 8e | 34 c5 00 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c4 6c df 39 39 e8 cd 3f 26 eb f0 86 | 8a 8d 3e 3d 91 1f 2d ed 00 00 00 1c 00 00 40 05 | 4c 1b 62 1c 4c 06 92 d2 01 38 c8 0e 4f 7e fd bc | 86 e6 84 ff | libevent_free: release ptr-libevent@0x7fb384015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b5d0 | #72 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 13 43 d6 1b b9 0c ba | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #72 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #72 | rejected packet: | 66 13 43 d6 1b b9 0c ba 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #72: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #73 | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #73 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #73 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49638.580109; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006953 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b5d0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #73 | libevent_malloc: new ptr-libevent@0x7fb384015370 size 128 "road-eastnet-nonat-73" #73: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #73) | 1b d1 f7 22 4f 1d be c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 17 af cb 15 dc ab b1 a5 7f 34 62 4e 0f 28 9a | 18 48 48 5b 8a 7c 0e f9 96 fe 06 d5 63 de 59 f8 | 49 35 b4 79 b1 9f 27 0d e0 5d f1 56 f3 be 3d 0b | 2c 98 27 ba b0 9f 63 a4 e7 98 a1 c0 ce b7 fa 57 | bc af 56 22 b4 0b 08 17 91 1f 28 fd 21 7d b9 47 | be 94 09 11 9d 2a ae 62 55 90 ec cd fb 6d 33 53 | dc 6e 16 d9 31 7b 9a c8 fd c1 75 61 52 f6 98 91 | 94 9a f3 05 36 de 11 ce 66 87 ce 7a d3 f8 fd 04 | 0b ba 01 fd 05 22 ef 85 db 52 65 4a 74 05 92 71 | be df ba dc 65 01 21 6c d5 86 65 2b 9a e5 83 35 | a5 c8 2d 49 2e 69 13 a9 18 d4 42 31 7e 26 5b 88 | 7c 6f cd 46 42 cb fc 6c 40 14 2b 57 0e e7 97 72 | 5b db 5d 77 72 cd 54 3e 63 fa 42 39 c6 a7 84 0d | 90 25 f3 6f 23 cf 8e 04 75 0a 41 85 e3 ef 88 28 | 25 3f 56 c1 9a ec 95 fb a0 fa ac 95 ac 16 97 71 | 2e b2 fb 1e 8b 8f a8 12 b2 0a 1f 31 5e c4 d7 fa | 29 00 00 24 93 de fa 16 34 ae c4 6f 1c b0 6f ba | 95 0e 80 10 81 5f 54 52 00 a9 bf 63 44 18 a5 30 | 6d af 4e 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 5e 43 5b b5 69 a0 f9 16 98 c0 46 | f4 de 55 67 f2 0c 20 b2 00 00 00 1c 00 00 40 05 | 50 cf 48 cc c9 4e 77 06 66 f1 57 3b 42 c0 94 82 | a3 eb c2 6e | libevent_free: release ptr-libevent@0x7fb3600251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #73 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b d1 f7 22 4f 1d be c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #73 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #73 | rejected packet: | 1b d1 f7 22 4f 1d be c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #73: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0472 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #74 | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #74 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #74 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49638.647436; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00612 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #74 | libevent_malloc: new ptr-libevent@0x7fb3600251c0 size 128 "road-eastnet-nonat-74" #74: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #74) | 74 9c fc 4a 6a e3 e3 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 4c a1 32 c0 37 d8 5b 48 9c e5 d1 93 92 0c 53 | 2d 7a c8 b1 df 24 d3 9a 3f 8c d4 c5 68 47 a3 a6 | 97 97 ce bb 01 47 69 1c 80 a7 65 98 e9 23 03 f4 | d4 b7 9b 7e d3 4c aa b4 56 9e 09 14 71 47 28 7f | c7 55 55 ab d5 8e 75 f5 9a f4 57 8c 05 da 66 0a | 40 9c be 25 a4 ef c7 bf 8b 81 b2 07 d2 0a 7d 79 | a8 74 67 c4 01 41 ba 6b 27 91 81 d4 a9 3f 71 a7 | d8 a9 d4 20 88 c0 67 ed 9a eb cb 95 5d 27 cd ae | 65 ee b7 22 c0 dd 63 86 9c 71 c8 d0 62 02 64 6a | 57 b2 8d 13 05 28 bc e0 52 39 21 a1 da 4e f2 d4 | b5 8a d4 4a 90 a1 15 ec 76 63 23 1b 27 bd 31 af | 95 a2 f3 5b 2d 4e d4 42 7c 32 a2 bf 50 28 83 76 | 27 c1 4e 56 b2 c9 33 07 a5 ee bf 65 36 77 b7 43 | c5 de f7 7c c7 52 fc 27 15 dc 50 6e c0 2f d7 72 | 5a 3b a4 4a 5b f6 13 1e 38 47 4d 77 c3 69 47 89 | 95 21 ff 50 2d c1 83 a3 1a 90 31 a7 2f c0 c1 a5 | 29 00 00 24 5c 46 aa ed 6c 5c 2a de e4 4c 0f 0d | ff be a8 c1 d6 16 7f 78 81 97 e2 33 fc 98 55 93 | 9e 14 cc 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 26 fa 02 ef ac 51 67 96 4e b3 ca | 7c 6c ba e3 fb 9a 52 77 00 00 00 1c 00 00 40 05 | 65 ee a5 86 f4 0e 73 b1 a9 eb cb 64 18 5a 0c a9 | fd 3d e5 eb | libevent_free: release ptr-libevent@0x7fb35c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #74 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 9c fc 4a 6a e3 e3 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #74 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #74 | rejected packet: | 74 9c fc 4a 6a e3 e3 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #74: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338005860 | handling event EVENT_RETRANSMIT for parent state #75 | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #75 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #75 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49638.7688; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.011574 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #75 | libevent_malloc: new ptr-libevent@0x7fb35c01d920 size 128 "road-eastnet-nonat-75" #75: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #75) | d6 96 43 68 6a ec ab 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b e7 f0 1b 8c 0a 12 dd d6 e5 bf 02 28 26 dd ac | 6b 5a 27 84 cc 5b e1 51 a5 48 25 1e 64 a9 f9 15 | a7 cf bd df a0 ad 76 b9 f4 06 07 4e 82 21 11 6b | 26 3f e9 d5 c8 28 2c a1 f2 de e8 cf 1b 66 10 aa | 48 33 36 9a e1 15 5a 5f 6d a7 50 58 f0 d8 c9 11 | b2 31 61 66 dc 13 e3 c7 ff 39 58 4c c1 88 d6 62 | 58 b9 1d ad d3 89 b6 21 d6 53 4e 88 4f 41 13 08 | 17 e6 d6 6a c0 94 05 0a ca 81 fd 84 5a f1 98 1e | b0 e9 8c 00 0a 4a 9c 8f 68 9e 7b 0d 09 60 4d 06 | b0 a8 a6 4f 85 49 38 bb ac 0a 4e 89 c8 a9 1a ef | 21 bd 3e 11 8d 34 77 94 db 0a 8d 1b 25 93 bc 6d | 26 8e 7b 5a 1c a6 da 04 b8 b9 68 16 5d 98 25 e7 | 4f 1c fe b2 4a 85 cb fd 7d 24 86 89 1b f6 19 0f | c0 e3 71 1b 57 41 f6 79 be 0c 81 b2 d6 8d b1 21 | 0e f7 f7 b1 1e d7 c5 ff e7 e6 4b 6a 5e 29 e6 f5 | 33 d7 87 e4 a6 ee a9 a9 4b 11 cd 2e d2 b6 0a d2 | 29 00 00 24 80 4b a3 25 3b 73 08 25 20 19 cd 1b | 6b 4a 3a cd 29 5e ac 55 94 fe 42 a8 a3 13 30 97 | 0f 50 65 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 04 fe 2e 3e a3 d6 9c 0e cd 5a 49 | b4 f8 ac 71 05 8a 92 ef 00 00 00 1c 00 00 40 05 | 56 54 de 54 0a a0 dc 64 96 23 cc 19 a1 e6 37 21 | c0 78 fa 6f | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338005860 | #75 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 96 43 68 6a ec ab 11 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #75 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #75 | rejected packet: | d6 96 43 68 6a ec ab 11 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #75: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acab80 | handling event EVENT_RETRANSMIT for parent state #76 | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #76 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #76 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49638.834113; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007089 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #76 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-76" #76: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #76) | 08 23 b8 f6 73 09 18 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 b3 88 98 c3 00 3b ee 78 d3 a9 62 79 c8 5e 50 | ca be d3 60 b9 ac ef b3 70 f2 72 51 6e d0 6f e7 | 76 2f 02 45 ea 0c 3e b7 a1 fa 9a de 13 7f 48 f6 | 9a 0d 43 96 53 05 8a 3f 59 81 18 a2 54 08 83 e6 | b2 23 5b f0 fb 8a 5c 92 dc 0e cf 01 e1 94 34 22 | c2 e0 dc ae e5 0d ab a5 e1 89 bb 62 bf 90 17 bf | 34 96 56 44 a4 0c 23 a8 83 ef d0 4c 0b 33 57 7c | 55 bb 56 dc a3 43 8f 68 ba 01 38 40 7f c5 c5 3f | 05 89 dc 6e 0f 54 d6 e4 1f 39 ed af 78 c0 40 5e | de 96 c5 64 7e 4a 03 ee be b0 cb 81 ef de ed 18 | d9 e4 a5 05 6d 9a 00 f2 6a ea 28 7f 9c 2d 97 a0 | 10 8c cf d6 69 56 ba cb c7 fa 65 c6 5b b9 83 ba | f4 70 1e a9 02 08 4b 23 06 c6 59 e2 2c c1 32 a4 | 3b f4 b6 34 0c f2 27 38 ff 60 3f ff db da aa 0d | 54 69 d6 85 b5 50 9d 06 87 5b 28 9b f1 40 e5 16 | 60 3a e9 e8 52 ec 8a 8f b6 c8 a1 d2 cd ff f5 a1 | 29 00 00 24 15 3e 8d 58 5c 16 4e 6b 9c 08 25 92 | 8d ef 80 f2 25 ea cd 1e ba c6 95 f9 1b a7 f2 dd | 45 1d 12 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 8b 52 aa 3c 87 b6 df df 8c 81 fe | ec 85 60 df 06 8e 81 b3 00 00 00 1c 00 00 40 05 | 54 01 aa b8 56 eb 7a 7b 30 98 73 ed 67 e2 36 06 | bd 7f 30 ed | libevent_free: release ptr-libevent@0x7fb34c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab80 | #76 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 23 b8 f6 73 09 18 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #76 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #76 | rejected packet: | 08 23 b8 f6 73 09 18 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #76: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a89740 | handling event EVENT_RETRANSMIT for parent state #77 | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #77 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #77 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49638.894457; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006008 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #77 | libevent_malloc: new ptr-libevent@0x7fb34c0407f0 size 128 "road-eastnet-nonat-77" #77: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #77) | 4f f7 57 30 7e 30 db a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 14 f0 66 5e 0a 53 d9 86 47 70 5a 8a 73 bc cb | 52 bc 3f 13 31 b6 9a 6b ff ca f8 2e b7 f0 48 d4 | 77 e7 4c 8e 73 e9 11 6d 0b d9 88 30 75 88 11 48 | 3e 3b 98 fa 3c 66 3a 0b 64 a6 08 cb b7 12 5b 20 | d5 1b 40 67 18 3f 33 02 0f 4c 76 b1 96 fb 38 53 | 46 2f 32 4f 32 aa f2 f1 c1 7e 1b a3 93 84 38 d3 | 1e e6 5e 44 4e 6a 52 d2 5d 7c 9d 39 17 98 69 cc | ec 36 94 6b e8 33 1d ce 1b 8f 5c 7f dd d4 89 82 | 85 a6 1d ff 6c 9b 05 f9 47 a5 19 cd c4 fd 29 1a | 81 51 1f 14 ac 62 dd 33 b1 29 91 3b e8 1b 12 6e | ed 37 99 ae 6f 7a c8 95 71 30 61 a1 ef a5 33 55 | ef 40 50 d8 41 20 80 d2 32 15 fe 53 0a 4d 72 3e | a0 4f 5d 9d 14 7f 1b d9 8a 58 bc 3b 06 b1 c0 d6 | 7a 44 d2 2e f1 5d e3 62 b2 7b f9 e3 44 aa 80 9c | 12 99 76 f5 03 a4 33 27 55 fb 36 b5 80 18 d9 30 | de 03 51 b8 74 0a cb fb 17 be 0d a8 1c 8a af f0 | 29 00 00 24 70 06 ac 37 52 b8 ec 28 7d 6d 81 11 | 1b 1b 6d ce ed 39 8f ce a3 eb 17 d2 32 09 4a 8f | f1 a8 0e 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 42 86 64 cb f7 df d8 ee 6f 6b 28 | 69 76 6e 6d 07 28 e7 b4 00 00 00 1c 00 00 40 05 | cd 8e d4 a4 9f b1 74 d8 7d 8d 61 97 d8 57 39 f7 | 36 5a 1d 66 | libevent_free: release ptr-libevent@0x7fb38401cc10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a89740 | #77 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f f7 57 30 7e 30 db a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #77 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #77 | rejected packet: | 4f f7 57 30 7e 30 db a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #77: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acd680 | handling event EVENT_RETRANSMIT for parent state #78 | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #78 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #78 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49638.956803; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007899 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a89740 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #78 | libevent_malloc: new ptr-libevent@0x7fb38401cc10 size 128 "road-eastnet-nonat-78" #78: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #78) | a4 c9 07 ac 54 d6 e0 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 5b 1c ec 96 24 e8 86 d8 c5 db 68 a4 e8 84 cc | f4 a2 ed 99 bf 5e 8a c5 ce b3 9d 08 41 58 29 f0 | dd 3a 5a 77 6f 59 d0 63 db 3e 63 03 3b 94 a8 82 | ea c5 b5 55 dc 2c ec 77 5f 63 ff ce 1a d3 98 5f | ea ba 50 e4 20 9b 1b 0b de 70 1d 72 5e 41 20 22 | dd 96 8b a8 2c 90 f1 b3 79 70 7b 0b d2 f5 29 64 | 24 96 41 c0 b2 23 eb 70 92 6c 66 1d 59 a6 82 09 | 57 e0 df 9e 1d 1d 55 b5 06 9b 7f 66 07 cc cc ff | f3 52 44 fb 3d f1 4f 79 5c 0c 51 85 cc cb 4f 32 | 4d 99 ed e1 7c 32 81 a7 49 c4 5e 9c f7 c7 98 e6 | 2c 03 b7 c8 ab bf 01 d1 70 a5 d7 0f 97 f6 d8 06 | e8 43 56 25 d8 da 9c 66 8b 84 9d ed 34 99 f3 6a | ab 13 48 0a 68 c6 9c 38 c0 da 1e ec 9d bd 23 04 | 56 2e b0 d9 0e 5f 21 85 8d b7 b7 e4 3f 8c e4 76 | 68 1b d3 cc a6 1f 24 7c 46 61 29 b6 47 f3 ad 62 | ed ad e7 10 a5 af 19 f0 76 6b ea 90 57 9b 3b 13 | 29 00 00 24 e3 1c 8b 3a ff 4e 05 3e c1 af db 58 | 7b 8f 74 6d 20 c2 73 1e 04 d3 ec 5f 05 cc 9d e9 | 4b 1e 83 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f c3 34 65 1f ff 78 b6 0e ee cd 35 | 94 8b f4 3a 81 46 94 12 00 00 00 1c 00 00 40 05 | f3 90 ab 75 b4 45 e0 98 82 06 c5 91 b7 b5 12 83 | 38 ae 55 ca | libevent_free: release ptr-libevent@0x7fb36002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acd680 | #78 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 c9 07 ac 54 d6 e0 33 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #78 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #78 | rejected packet: | a4 c9 07 ac 54 d6 e0 33 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #78: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0682 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afcfc0 | handling event EVENT_RETRANSMIT for parent state #79 | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #79 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #79 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49639.02018; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006702 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acd680 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #79 | libevent_malloc: new ptr-libevent@0x7fb36002a950 size 128 "road-eastnet-nonat-79" #79: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #79) | cb 0e 87 22 6d 04 19 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 8d fa 75 ee f5 0c 34 b3 09 04 c3 a6 70 35 18 | 8c e8 6b 6c 5c 5b 2d 90 26 5a 5e f9 d4 07 05 c2 | f5 73 64 12 f5 c2 51 38 6d 89 1a 0c 01 ef 01 94 | 08 08 2e cb 41 34 b4 4a 2f f7 ed 3c c1 7e 04 ba | 4c cb 90 52 00 84 c7 1d 71 85 6e 14 f7 d6 ba c6 | 6a 98 c9 b3 82 dd 58 3d c8 6f 45 92 9b e7 64 4a | 6e c9 47 ec bd a8 a4 79 ac 0e 9c ec e9 38 db 99 | d6 25 d7 25 8b 64 97 e5 d5 6a 07 ae 6b 9a 25 6c | ea 70 9f 4a 9e ba a1 e7 d8 d9 69 c1 2c a9 28 e5 | 2c 51 5f 2a f8 17 0e 3b 43 9f 77 5e 3a 59 4f 18 | 6f 20 ad 6e aa 63 b5 82 47 75 97 d0 4a 75 bf 68 | 0b ac a2 f9 6c 9d b8 21 cd c5 79 8b 66 f4 0e 4b | 32 8b f9 5e de 93 2f 2f 11 cf e9 f6 3a 2b 4b 7a | bd 3c a3 27 78 6d f5 6c 33 13 d9 14 f8 0e 44 d7 | 3e 91 89 43 f4 2f 9b b6 ab 6d 76 71 13 52 45 fd | 0e 5e 7c 72 38 35 d5 eb 86 2e 14 37 c5 c9 56 83 | 29 00 00 24 5a 77 8f b1 9a 0e 27 f5 13 b5 b3 3b | 54 a7 64 e6 f0 cd 7e 6d c0 5a 2d 35 86 f1 cb 9d | 32 23 be bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 31 42 b5 5a b6 78 6b 4f 08 f8 04 | 13 cc 8c 45 a7 cd ab bc 00 00 00 1c 00 00 40 05 | 2d 9f b7 7e f4 d4 af ae b0 e9 56 0d ae 10 83 85 | d2 ea 45 54 | libevent_free: release ptr-libevent@0x7fb374045df0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afcfc0 | #79 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cb 0e 87 22 6d 04 19 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #79 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #79 | rejected packet: | cb 0e 87 22 6d 04 19 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #79: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afd040 | handling event EVENT_RETRANSMIT for parent state #80 | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #80 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #80 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49639.08048; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005076 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afcfc0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #80 | libevent_malloc: new ptr-libevent@0x7fb374045df0 size 128 "road-eastnet-nonat-80" #80: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #80) | aa bd f3 45 40 fd 66 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a f9 52 fe 2c 07 55 9a 9f 75 be 2d bb 6b aa b0 | 07 01 f4 20 39 c9 c6 12 04 59 16 f7 53 ca 23 cf | b2 a3 d6 d7 cd d3 78 95 1e ae 2c b7 17 84 30 6c | 9a 6e 0d 1b ef 48 24 1d f1 c9 12 65 61 88 44 c9 | 4b 27 23 9a 65 49 0a 11 49 89 68 1f 69 8b cd 8d | e9 1c 22 5e 52 f0 a3 c1 f7 8e 10 9b 8e 27 61 b3 | aa d7 5b 30 40 8f 25 2e 0d 7c bd dc 0e 4d aa 95 | b6 5a 44 77 7b 33 24 ed 5e bf f2 78 c5 d8 1e 5c | 38 0e af a8 70 85 81 7a 43 7a de 45 73 d1 23 0a | 21 50 82 2c fb 48 a9 b6 ed 4a 3a 01 52 3d 91 cf | 62 7a 95 ef ff 5d 9f b3 85 63 dc f5 46 12 fc e4 | ac 22 23 7e 8e 79 eb cb 39 31 bb de 91 1f fd 9c | 95 3c fe ca 99 40 e4 17 71 ad 8e 05 ed f6 14 9e | 6b 26 3c 1c 13 2f 5a 94 9d 9c cd 71 11 6d bb c9 | 9a 84 65 ba e1 3d ae 2e 2c 88 f5 b9 e4 60 97 3a | ad 9a 6f f8 77 43 67 40 a8 7b be e5 9d 13 c4 6d | 29 00 00 24 53 2a 2d 72 a4 0b ac f1 46 3b 88 60 | a1 1f 05 e7 3a 9a 78 ce 7e 03 67 44 f4 b3 91 7b | 4e 29 6b 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 ed 0c 1a de d8 39 29 7d 81 95 16 | 89 64 a4 1b c6 93 47 b1 00 00 00 1c 00 00 40 05 | 41 2d b0 0c 88 62 05 80 34 d7 2b cd 52 bc d2 c8 | ff 29 c4 37 | libevent_free: release ptr-libevent@0x7fb3600407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afd040 | #80 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | aa bd f3 45 40 fd 66 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #80 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #80 | rejected packet: | aa bd f3 45 40 fd 66 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #80: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0573 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46af0c80 | handling event EVENT_RETRANSMIT for parent state #81 | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #81 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #81 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49639.145823; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006873 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afd040 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #81 | libevent_malloc: new ptr-libevent@0x7fb3600407f0 size 128 "road-eastnet-nonat-81" #81: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #81) | 66 17 84 1d 01 f5 89 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 79 cf 2e c9 58 5a cf 22 0f e4 95 f3 b3 ec e3 | d7 ab 2d 5f 01 54 3c c5 38 6c 9c d3 40 e3 80 92 | e9 89 68 26 a0 e4 bb a0 7a eb 4c f1 e4 9f 20 12 | 58 2a 4c f1 f2 df 9a 6d 19 39 bd 12 58 10 e1 11 | 60 c9 9d ed 18 33 de 94 c1 bb 5d 21 df 07 9b 4e | 1e ae ec 4e 5f 9a 7f b4 b3 f8 3c 10 c2 09 ea 68 | 5d bc a9 fd 8a bb 40 95 8d 3b d1 39 da 16 f8 a8 | 93 df 32 68 37 e0 b9 31 f0 a7 f2 55 d6 2d bc ef | ef 45 3f e8 34 12 fc 98 2a dc 19 03 8b dc 1f 09 | cd 02 40 97 95 a7 39 71 09 ba 54 e3 53 28 2c b9 | 98 bb af 3a 25 6b e9 e7 4c 76 46 d1 aa 9d 3b 59 | 03 52 8a 61 f9 f7 83 33 a1 6c a0 29 48 f7 36 48 | 3a 5a f9 b5 72 5e fe 9f e0 84 df 16 32 28 ce ca | c6 27 c5 b5 d7 f3 93 db 10 54 fb f4 c3 70 76 d4 | 5f 00 b9 4c 0d 91 91 e7 a8 18 4b 2b 7f cf a5 4e | 76 2e 5b 38 e2 0b 32 aa 89 74 93 4b e3 81 6f 21 | 29 00 00 24 78 b9 6f 78 8b 1e bb 84 c4 a1 7c 02 | 08 74 d8 82 11 75 a1 52 cd 59 45 9e 38 4d d2 1d | 56 1f 81 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 31 12 3e 08 55 9e 26 f3 2f be 08 | b5 7f 7c 7d c5 5f 44 c0 00 00 00 1c 00 00 40 05 | 16 fd af 38 8b 2a c1 77 ea 51 ea 68 dc 9b f5 3d | 6a 08 67 b3 | libevent_free: release ptr-libevent@0x7fb378046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af0c80 | #81 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 17 84 1d 01 f5 89 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #81 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #81 | rejected packet: | 66 17 84 1d 01 f5 89 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #81: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a86b80 | handling event EVENT_RETRANSMIT for parent state #82 | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #82 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #82 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49639.216104; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.011315 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af0c80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #82 | libevent_malloc: new ptr-libevent@0x7fb378046040 size 128 "road-eastnet-nonat-82" #82: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #82) | 0d 59 4a 91 cd 0d a8 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d de 62 a5 d0 5e bf 56 63 0e 91 36 97 7a 1e b1 | b4 16 cc 30 41 76 2c 4d 4b 72 e2 c2 b2 a1 f9 60 | dd 93 5e 0e 34 f7 25 c7 9f 53 30 68 3a c2 8d 97 | 4c 9d fc 02 66 0b d5 60 41 52 07 34 69 fd 84 a5 | ec 72 09 87 c6 8f 05 fb 8f 4e 6b ba 77 83 dc 16 | 60 81 0d a8 71 f3 cf c7 95 36 23 35 f7 97 ca 50 | b2 db d3 48 30 34 aa be 9a a2 37 9b 39 19 60 98 | ac 8b 67 73 12 da 16 80 58 c0 2a 80 56 eb 21 9f | 3c 3d 73 57 e9 89 d6 8c 3d 04 dc a8 2c a0 35 72 | 3a b3 ec 9f 41 04 d4 7f d9 68 36 d5 13 cd 39 04 | 57 48 05 ca 9e f9 64 20 0d 91 1f 4e 5d ee 28 d1 | 38 36 5d 35 10 47 60 e0 25 2a b4 90 4f 2b 22 f8 | 94 db c6 d0 bc a1 a8 ee 23 9e 12 7c 06 be 13 c9 | e4 f8 bb 10 03 1f 37 ab 38 d2 32 58 2a 26 f3 33 | 1c 60 32 46 6c a1 0e 88 78 61 ec 6b c9 dd e6 45 | 58 22 90 cf 6d f9 2b cd d5 02 5b 51 ea 18 fb dc | 29 00 00 24 61 df db a2 1d df 12 0c 5e ab 31 16 | 03 92 3a 6f 24 ce 35 05 3e f5 da 2f 7c 0d 1e 54 | bb d5 49 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 70 c6 55 5e 2d 9d b0 0a d9 87 23 | 4b f7 4f fa 28 d8 1e 81 00 00 00 1c 00 00 40 05 | 40 ed 3d f8 bd 8d 40 9e 57 65 9a d5 21 53 67 44 | eb 0f 4b 38 | libevent_free: release ptr-libevent@0x7fb38801abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a86b80 | #82 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 59 4a 91 cd 0d a8 c9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #82 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #82 | rejected packet: | 0d 59 4a 91 cd 0d a8 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #82: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #83 | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #83 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #83 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49639.270455; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006189 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a86b80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #83 | libevent_malloc: new ptr-libevent@0x7fb38801abe0 size 128 "road-eastnet-nonat-83" #83: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #83) | e6 2b 97 c6 d1 4c 13 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 e0 14 c2 4a 13 d8 77 12 b1 93 fe 09 ee 1d 88 | 31 85 5e 91 48 ad b1 20 71 3f cb af eb 92 c7 d3 | e3 3b dc e2 9e c2 45 29 c9 59 6d 7a 62 12 34 26 | 8c eb c3 61 ed 07 95 b3 f8 74 eb 61 63 eb 1c b2 | 60 84 c3 e0 69 12 37 aa 40 a9 ee 46 d3 1a 26 fd | 77 29 43 bd fd b4 e3 3b c7 a8 7e e9 e3 51 f4 e6 | b9 4a 57 59 1d 18 ef df e9 5a be 77 08 df e7 55 | 46 7f 6c 4f 13 29 e4 bb ef bd 6c fb 60 8b fc 62 | e9 ba c0 54 d3 2b 44 c6 2f 29 d7 34 b4 6b 61 c0 | c9 cb 1e cb a6 25 28 61 95 9e 2c f5 86 69 f9 7c | b8 7c 34 c0 e0 ed f4 f7 82 f9 b3 c4 8e 1a 55 fb | d8 ed 0f e9 ed ff da 76 3e bb 0b ca e5 d5 7e 00 | 28 52 cc 3e d7 7f e9 d9 c5 bd e9 a7 17 e5 95 51 | 9f 9f 95 b4 65 d9 e7 b3 d2 a5 c2 fe 86 92 6e 23 | 5c 06 60 94 75 50 49 bf 5b 48 f5 bd b4 b4 de 5e | dd 11 02 11 73 fd f3 0f cb 43 d1 ff 6c 2f 1d fa | 29 00 00 24 d9 ea 5f 5d e7 8b 27 ca 82 31 28 fd | 7a 4f 51 83 32 9a 18 8a 6e 2a 8b d4 95 e6 d6 b1 | 0f 0b a2 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cf 83 ee f4 b4 fb 0f 43 eb c7 c4 87 | aa a0 5e 5c f1 0e 63 f4 00 00 00 1c 00 00 40 05 | 05 b9 81 d9 1f fe b2 68 6c 59 f2 c5 07 41 cc 9a | 8a 8b 10 9b | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | #83 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 2b 97 c6 d1 4c 13 c0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #83 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #83 | rejected packet: | e6 2b 97 c6 d1 4c 13 c0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #83: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0733 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a69e50 | handling event EVENT_RETRANSMIT for parent state #84 | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #84 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #84 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49639.33285; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007893 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #84 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 "road-eastnet-nonat-84" #84: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #84) | 1f 2f b6 8b 51 48 06 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 1f 67 e9 76 20 6a 2b f7 ad 13 77 97 e1 68 87 | e9 75 71 19 c9 83 f3 73 fb 25 68 00 8c ff f8 c9 | 1d 39 8c aa 48 91 67 ae d7 68 2a 58 40 8a 8f c7 | 80 6c 8a 0d 2c 34 0e dd 31 f9 0d 20 54 ae b8 ad | f3 e5 66 87 27 c1 b9 3b f7 7e 5f 91 9e 13 72 c4 | fb 1c ec 84 d9 28 50 4e 83 04 2b 64 28 38 b2 c3 | 26 3d 3f fe b0 3a 31 93 a2 da 74 58 0f e3 c4 e7 | 1b d4 4a 7b 98 e4 bf 2d 17 77 1c c7 60 c6 cd f4 | a4 b3 3e 33 44 58 50 ab 79 af 8a 67 8e c3 a4 76 | 74 f4 47 b0 6e 53 b7 1d 0a 98 f8 36 13 56 c4 89 | c8 ca cc fb f1 a4 98 cd 59 ff 4a e3 78 5d 3c 67 | 86 c4 70 68 e1 a0 3e 7b 7f c1 2f 3d a4 0d c2 c5 | bd ed 93 ba 2d ff bd 57 2f b9 ac d7 dc 77 9f ae | 61 e7 8a 25 fb 95 fa b6 ae 27 5d f2 7d 25 5c 37 | cd dc a1 e7 01 66 ba 0c 28 2e 4b 30 85 a4 73 58 | f5 b4 a3 77 ea dd 82 87 c2 5d 3f 72 7d 74 36 cc | 29 00 00 24 76 ac e1 c3 58 b8 41 7b 54 b2 2a 6d | c8 c8 51 a4 ca 16 83 ce 76 9e a1 e9 43 b8 d3 34 | c3 53 e0 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f 3a 1a f8 04 5d 3c b5 2b e1 4e ab | 33 49 9d 7d 4f 74 a2 8f 00 00 00 1c 00 00 40 05 | 1b c4 6f 3a e9 14 b6 7b 2a e7 ad b0 65 58 df 39 | fd 38 92 37 | libevent_free: release ptr-libevent@0x7fb378012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a69e50 | #84 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f 2f b6 8b 51 48 06 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #84 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #84 | rejected packet: | 1f 2f b6 8b 51 48 06 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #84: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0478 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa1f00 | handling event EVENT_RETRANSMIT for parent state #85 | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #85 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #85 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49639.397108; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.011654 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a69e50 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #85 | libevent_malloc: new ptr-libevent@0x7fb378012840 size 128 "road-eastnet-nonat-85" #85: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #85) | b7 4f d7 db a6 e2 bd 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 c8 89 a4 0b 04 f2 b9 62 f8 58 f1 1c 0c 91 1a | aa 25 df 1a e7 a5 32 9d 0b b5 9b 93 ab d7 64 b6 | 7e 0d ee f0 b5 83 e8 90 d8 94 b7 d1 ea 05 1c 4f | 85 63 ef bf 80 da 59 c5 18 c9 fd 82 f7 cd 12 c7 | ec b4 9e 35 b0 0c 13 ac 89 c3 d8 6c 14 b9 3b f7 | 41 eb 65 45 c9 66 0a f2 c7 e9 1b 09 a2 d5 ad 2e | 24 aa 0a a8 48 81 8f bc 8d df 3f 90 a2 d2 26 b2 | 84 b7 2d b6 67 ac 5a fa 85 04 e2 96 e3 0b 1d f3 | b9 b5 0f f0 5b d4 c6 d3 b2 9b d4 ad e6 94 18 68 | bf f6 64 ed 26 d4 b7 68 7f a4 94 0e af 4c 0c b4 | 64 91 32 f4 da 5b 38 c2 84 b3 fe 0e e5 1b 3f a5 | 6b 83 a5 f2 b9 7d 21 72 89 70 28 f2 d4 86 bb fd | 03 43 fe f4 4e 6c 9c 49 29 03 b2 15 2f 72 ba 73 | 18 d4 39 82 08 55 da c3 e4 86 cb d0 04 31 94 6a | f5 7b 4a de 4d 49 5a 6d 51 3e 71 b4 0d e8 2e 33 | 9f 26 4a 91 c4 9b 06 1a 88 4b 6e 77 93 8a 7d ed | 29 00 00 24 af e3 01 7b 71 cd 34 07 4b 0a a0 9b | 85 75 4e ed b9 b3 c5 7d 83 a1 ee 6b 3c aa 39 e2 | 0b 8b fa b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 41 7b 44 0a d6 6d 6a b0 b1 8e ad | b0 c3 33 77 45 ba 39 18 00 00 00 1c 00 00 40 05 | 63 0f 1e f2 8f 76 1d 60 09 1e 0d 94 28 78 d8 b0 | 16 5a de 8a | libevent_free: release ptr-libevent@0x7fb3740356e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa1f00 | #85 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 4f d7 db a6 e2 bd 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #85 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #85 | rejected packet: | b7 4f d7 db a6 e2 bd 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #85: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0641 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe600 | handling event EVENT_RETRANSMIT for parent state #86 | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #86 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #86 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49639.460472; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.0061 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa1f00 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #86 | libevent_malloc: new ptr-libevent@0x7fb3740356e0 size 128 "road-eastnet-nonat-86" #86: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #86) | bc cc 1d a8 6f 14 2f d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 02 f4 30 81 01 a2 84 c7 c8 75 14 73 a0 b4 f1 | ce 00 5c 2a 70 74 58 bb 3e a0 6e e2 4f 0a 9f 83 | 08 76 97 6b fa 62 74 7d db ae df 90 de 69 8c b2 | 0e 6c a5 3a 87 61 1a 3a 8f 5d a0 5a ba ab 91 5a | 1c 85 49 b3 c5 25 e7 4c 6e 03 2b ac 66 42 56 f1 | d7 31 b5 bb 5b 45 b9 dd 90 6d ee 07 cc 7c f5 62 | 74 01 c5 67 95 ba 42 bf 74 f6 d2 a1 03 af 1b fd | e4 7f bc c7 c5 75 0a a8 6e 5c 9e 6c 4f 5b c1 73 | df 6f 2d 86 ef d9 7b 7f 50 00 74 9f 02 e6 99 af | 69 db f9 f3 80 3c 99 58 33 58 03 46 c0 6e d1 8c | d1 aa bb ba e8 f4 a9 85 5b aa 0d 22 6e e9 62 24 | 0d 2c d4 54 19 e8 97 d8 e7 d3 1e 75 fe 1d 11 bb | 8a ef b3 15 49 d2 bd 11 ce 93 3c 78 52 c8 0e 77 | 1d b3 5a f2 76 6d 63 9a e0 92 62 06 a0 bc 29 93 | a6 78 17 fe 37 4a 17 27 33 46 cd 3f 1c 77 4a d6 | df 68 38 cd 2b 58 7b 28 94 f9 86 34 46 7d e4 ec | 29 00 00 24 3f 6f 33 90 58 31 9c 9e c4 12 e4 33 | 9b 9e 11 d9 fa de 80 3a 9a 7c 3d 2b 3e 4c e8 aa | 92 49 b7 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 27 7b 26 e6 59 48 3b 7c 9f 7a cf | bb 52 6d 94 e2 1f 43 00 00 00 00 1c 00 00 40 05 | 49 8d b2 ff d2 6f bf 71 ec 03 78 4c 49 00 83 b0 | 23 90 3a 8b | libevent_free: release ptr-libevent@0x7fb35c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe600 | #86 spent 0.0969 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc cc 1d a8 6f 14 2f d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #86 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #86 | rejected packet: | bc cc 1d a8 6f 14 2f d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #86: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0453 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24680 | handling event EVENT_RETRANSMIT for parent state #87 | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #87 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #87 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49639.522754; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006638 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe600 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #87 | libevent_malloc: new ptr-libevent@0x7fb35c03b0b0 size 128 "road-eastnet-nonat-87" #87: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #87) | a2 df 19 46 98 d4 bb 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de ac a7 56 a2 bc 95 5a 6c 57 c8 2b e0 20 68 16 | a2 ff 5a bd 83 94 6a 4d 58 8c b2 a4 d4 76 ed fc | 0f 4a 9b b9 df 7c 6c 34 8f 70 fd e9 a0 17 cd ff | 42 ae c6 35 53 50 df 4f 92 fb b8 ae 34 b4 21 4a | 96 f4 d2 6a f3 c3 2c b1 14 ce 42 da 82 6b e3 0d | db 7a 9e a9 08 f5 73 b2 1d 45 e9 bc fe 79 e6 2d | 2f 0a 64 4b ee 86 b7 4b 3f 77 d9 fd c5 b0 bd d9 | f0 f9 4a 67 c3 b1 50 bb ba e6 76 27 0e 9b 80 ac | ac a5 3d ed e4 7f 3e ce 9b 7e 70 ae 76 56 31 41 | 17 98 86 1f 1f 85 2b 2b b2 36 28 19 25 14 37 3e | bb a6 a5 e3 f0 64 b9 9c 0b af e9 c8 fc dd 9d 10 | 05 4f 6e 73 4c 08 a1 b5 54 a0 ae e0 d5 30 bc af | af 63 ef 9e e4 70 09 3a 1e 60 6f c5 bb 77 c5 0b | 60 c8 18 55 dd 77 cc 86 3f 7c 34 56 80 93 c4 30 | 61 51 d7 11 b2 4d 6f 17 c0 8c 7f d5 08 fa 5f 63 | d7 b3 cd 14 9f 3a 9d 07 13 ee 34 e9 84 52 68 1b | 29 00 00 24 8b f5 b9 e8 72 8a d8 5e 1a d6 70 1a | a6 5f 3d 02 9f 40 bc e8 9c c3 88 16 89 ec af ca | b1 90 6f 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 85 83 d5 c2 93 bc 76 7b c0 f5 6a f5 | c6 03 a7 0c 52 da b8 7c 00 00 00 1c 00 00 40 05 | 9f 00 07 ca 6e 64 62 64 56 d5 c5 aa 95 9f c8 6b | 83 2b 36 93 | libevent_free: release ptr-libevent@0x7fb36804b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24680 | #87 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 df 19 46 98 d4 bb 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #87 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #87 | rejected packet: | a2 df 19 46 98 d4 bb 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #87: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7a350 | handling event EVENT_RETRANSMIT for parent state #88 | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #88 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #88 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49639.591116; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007735 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24680 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #88 | libevent_malloc: new ptr-libevent@0x7fb36804b7c0 size 128 "road-eastnet-nonat-88" #88: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #88) | 4f b4 b9 96 90 ac 87 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 55 7d 2b ef 81 b7 ac 80 5f 94 f2 45 3d 30 4f | 1d db a2 af 47 67 b7 7c be e3 bc 36 9a 72 1e e6 | 4f 47 07 85 4a dc c2 8c 23 63 be 8e ef c5 79 8f | 9f 5c 4f 9d 4f 85 09 c3 d7 cd 09 d7 9c 93 a4 d2 | cb 1f 73 cb f5 4a 96 ce 2b f9 75 2e 3c f9 67 24 | b7 40 01 a2 9a 5a 3a b5 1b 81 51 3d 6c dd 22 93 | a7 84 80 70 90 68 0a 70 88 ae 95 b6 8d ea e4 d4 | 54 cf 85 55 04 a4 94 5d cc ba 3d e2 31 46 75 ff | 7c 75 77 1a 1b 6c e0 fd b6 75 6b 40 9a b7 ac 36 | 39 45 a5 48 a8 96 90 52 cb 62 b2 ca a6 08 23 37 | d2 f9 be 02 8c 54 29 91 80 43 1c 2d 5f 25 44 25 | ff e7 b9 7d 14 3d 11 4a a3 ab 8e 4f b9 9b a1 4d | 91 68 13 50 1e 3b 88 4e ac 27 30 6a c7 2b ef cb | 81 87 56 8d dd bd 93 b9 d2 77 ea ab 8e f7 84 26 | 38 de 93 6d 11 fc f2 e4 c4 b3 df 42 49 8c 39 27 | 12 40 d4 6f db 31 51 71 3a c5 b3 bf 78 b4 72 ae | 29 00 00 24 d0 42 a3 31 c3 ed 67 67 3c 0c 74 87 | e1 18 ba c3 96 b7 23 3a c3 28 fa 83 32 6a f8 22 | c5 3d ce 47 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 13 5d 9d 57 2e de f0 16 54 40 11 | ce e4 63 b7 5f de e1 17 00 00 00 1c 00 00 40 05 | 73 d1 3a 60 f3 dc 99 f7 0c 4b 4c 3e d1 f1 65 ae | 8d f5 93 01 | libevent_free: release ptr-libevent@0x7fb36c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7a350 | #88 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f b4 b9 96 90 ac 87 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #88 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #88 | rejected packet: | 4f b4 b9 96 90 ac 87 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #88: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0a980 | handling event EVENT_RETRANSMIT for parent state #89 | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #89 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #89 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49639.654498; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005185 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7a350 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #89 | libevent_malloc: new ptr-libevent@0x7fb36c04b7c0 size 128 "road-eastnet-nonat-89" #89: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #89) | 9d 5f d8 02 80 b8 e7 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 e3 b9 05 71 34 7d 24 1f b0 78 15 60 77 1c 08 | 9e 6a 97 b0 4c 89 e3 5a dc c3 13 ad 84 6a 5e aa | fd ca 45 35 ba 35 de 44 be ce 11 ea 86 29 6c 73 | 0b 7f 74 63 63 d2 81 70 21 25 9e 55 c0 3c 14 62 | da 13 e5 79 f3 ac 65 c2 4c 57 6a e3 37 8f 5c 04 | 8a 01 65 69 49 a9 46 40 f2 f3 a8 b3 1a af d6 79 | f9 34 6f 04 49 9e f3 10 ca 6b d5 6f d3 e5 36 7a | c9 32 cd 69 df 91 08 6d 35 ec 78 52 d9 57 09 e3 | f5 63 af 57 d7 93 38 af ff 2c e8 36 87 e0 92 43 | f0 f6 97 f6 50 a5 d2 4c 16 d1 d2 d2 96 90 50 82 | 09 99 3b fa 59 66 b4 48 e1 b1 0d 01 76 3d b4 c2 | b2 4d a5 5c 8a c7 cb a9 bb 09 56 bf 65 e9 da 28 | 24 dc 22 59 97 49 92 d0 c5 d3 9b 2b da 0b d5 26 | df 68 b6 c9 f1 0d 58 08 b0 7e 26 ce 7d 24 b1 d2 | a7 c4 2d 42 0c 8d 57 57 7b 42 5d d8 f7 b9 c8 ba | e6 b0 9d 60 5a 01 d8 33 e3 a6 9f f1 3b 81 e4 a8 | 29 00 00 24 50 a5 b1 4c 6d 18 8a 79 34 52 af 57 | 9c b8 99 4d b9 e7 5c 74 bb 7f a4 8c e5 f5 2c a5 | 8d 6b 1d 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 41 ee 04 aa 3d b0 21 0a d0 67 73 | 50 8d e2 01 ce 26 f9 77 00 00 00 1c 00 00 40 05 | 7b 60 8a 47 58 c7 18 57 64 ec a9 8e 15 07 49 b1 | ed 9e c4 1b | libevent_free: release ptr-libevent@0x7fb38802d3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0a980 | #89 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d 5f d8 02 80 b8 e7 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #89 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #89 | rejected packet: | 9d 5f d8 02 80 b8 e7 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #89: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #90 | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #90 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #90 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49639.742889; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007237 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0a980 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #90 | libevent_malloc: new ptr-libevent@0x7fb38802d3a0 size 128 "road-eastnet-nonat-90" #90: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #90) | 26 95 92 02 0c 74 14 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 ed e3 a8 eb 0c e2 00 1e b8 30 77 f5 0e ad ce | 65 c1 45 a9 f8 d6 59 16 4d 14 6e d4 77 5e 81 5d | e4 5a fa df cb d1 e9 b4 fb 7a 1b 94 96 f5 cd a1 | 92 48 08 b0 94 02 60 49 2d a3 e6 bd 87 20 3a b6 | b3 a4 42 54 6e e3 59 4f 33 f7 d9 14 23 f3 be 46 | 0e 6a b0 16 f3 25 4c 11 1c 90 dd a1 d3 04 dc 69 | 8d 39 0c 51 5f 83 72 cb 93 87 70 c9 f5 3d e0 2a | c5 11 3c 75 bc 46 e8 c6 f5 45 c5 bc bb 53 d8 9c | 7a ab 11 6e 8b 56 f1 6e cd 93 8a 23 e4 3d ba 8e | f3 e8 36 9d 53 65 3b 19 f4 e3 cc f3 54 92 3e af | 1e ea f7 7a 71 af d2 c7 14 e2 2f f0 39 fe 17 bf | 5f 5e bd 3d 44 b3 a2 13 36 c4 88 da f8 e8 06 a9 | 63 d0 49 96 b9 8b b5 05 47 2d f0 7c f0 b7 4b a3 | d9 0f 59 ad 42 e6 a2 62 85 25 36 ae 56 68 a9 08 | 18 48 13 b3 3d 8c 24 fd 03 b0 13 b0 fc 3c f6 fc | 7b 2f 36 dc 82 d7 51 c4 8b bc 56 3e 48 7c ce 7f | 29 00 00 24 7b f2 d7 97 09 c8 65 d1 69 47 34 b1 | 55 8b 56 a2 4a 71 ee 64 d5 6c 65 05 c4 2c 51 b4 | b0 ab 0f 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 4b f3 32 75 d7 ef f4 06 67 91 40 | 71 93 9a 6d f5 fe b0 cc 00 00 00 1c 00 00 40 05 | 99 8e 72 1b 4f e3 a6 e8 23 e7 c4 0e ce 5c a4 3c | cd e1 15 1b | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #90 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 95 92 02 0c 74 14 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #90 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #90 | rejected packet: | 26 95 92 02 0c 74 14 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #90: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0886 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a74cd0 | handling event EVENT_RETRANSMIT for parent state #91 | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #91 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #91 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49639.820268; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005898 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #91 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 "road-eastnet-nonat-91" #91: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #91) | a6 f1 37 27 17 86 c6 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 6a 94 73 f6 c2 01 42 8c 6e f6 05 6f 1c e2 ee | 38 45 16 e5 f6 17 c9 fc 07 cc bc 0b 02 da 35 c8 | 5a ca 9d 87 29 53 47 69 49 7f 31 f0 fb ce e2 59 | 00 57 9b 32 9e 1f da 4b f7 41 b5 05 14 af c4 d7 | 09 7f 69 01 a0 cd 93 57 e5 a7 fd 93 a9 9e c3 fc | b0 af f5 37 11 6f 2b 38 a8 2a 8b 37 b3 e6 bc bf | 0c 06 37 86 ca f2 b6 b0 ed 1e 3f d6 8a f0 0b f9 | e8 80 df 35 d6 a2 36 c0 a2 dc a4 1a ca 7d d9 0b | 6f fc 29 fc 92 12 f8 05 c1 88 8e 81 27 4a 61 62 | c3 16 fc 6e 5e a6 59 bf d1 b1 ad d5 92 05 c4 60 | 2f 54 a3 71 e0 ec ca 5d 37 16 ec 5f ec 37 29 2d | 46 5a 04 10 84 ad 36 aa 07 ca f2 60 8b 7c ac f8 | ac e2 8b a3 69 23 74 f2 d2 2d c5 0d 51 9b 2c 7f | 42 45 54 c3 ec 3d 44 63 f0 0a ec ff b3 69 48 ee | 22 28 aa af 72 8c cd ca 9e 3c dd f6 ac 2b 6f b7 | a1 90 21 32 ae b8 23 39 1e cc fe 3e d6 b6 21 70 | 29 00 00 24 29 05 58 2b f0 ba fb 18 77 b3 53 8d | 8b 05 bb 0a 8a c5 e8 dc 24 17 58 d9 a6 60 c9 1d | bc c9 21 d8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 d0 cc 50 f7 83 7e b1 80 37 a7 4b | da df 68 8f 62 b7 e5 89 00 00 00 1c 00 00 40 05 | 8a 41 f9 2e 73 42 40 08 8e 79 f6 3e 7a 3f 48 7e | 67 86 16 af | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a74cd0 | #91 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 f1 37 27 17 86 c6 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #91 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #91 | rejected packet: | a6 f1 37 27 17 86 c6 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #91: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56e30 | handling event EVENT_RETRANSMIT for parent state #92 | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #92 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #92 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49639.900596; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00614 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a74cd0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #92 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 "road-eastnet-nonat-92" #92: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #92) | 07 61 83 69 17 8d a7 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 13 06 9b 22 b9 09 02 07 4e 56 e2 9a 05 b7 70 | b7 25 ba 3c e0 d7 4b 41 68 60 e2 84 fa 7d 2e 53 | 6d 05 81 6c 1d a6 11 6c f3 c1 91 94 93 3c 04 e1 | 47 48 3f a6 f9 c1 bd d3 55 1c 44 87 99 6c 2b ee | 1a fc ef da ca ee 71 5f 90 30 42 cf 28 4f 89 1f | 86 f8 61 c0 95 c8 84 9c 1c 5f 1c 12 41 c6 05 de | 97 e9 89 32 6b 06 59 ff 06 2b 2f 06 a3 7f d2 ee | 73 0b 6d 38 c1 ed f4 4b b5 20 b3 c7 2c 91 97 4e | e0 5f 39 be 43 66 47 ab c5 cc 93 72 f7 60 85 3f | db 39 5c a4 81 f1 02 ef e4 62 a4 fe 72 6e 67 a1 | 96 94 e2 5d 70 64 80 e3 dc 1a 37 fd 9b e4 85 ab | 94 44 5e 2f e2 eb 91 bf ec 37 e1 84 2a 65 44 ca | 1a 08 22 fa 52 cb 8e 26 f3 0a e0 f3 e8 ed d0 ab | dc 5c 23 93 37 b0 3f ec 3e d7 3b 37 ac 5f 12 98 | 95 79 c8 ae bc 21 83 a1 90 e1 8c a5 2a 7f b7 ff | e0 96 4f 2b 8d 89 b3 7b 60 e0 d7 14 33 e7 9c 37 | 29 00 00 24 0e 70 86 57 dd 9d d2 8d 77 a4 03 8e | d4 ef 6c f9 5f 5e da 54 db 62 42 7e 49 f6 2b 1b | b6 ad f3 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 b0 5c 2e fc f8 56 4b e1 e9 3b 08 | c9 71 30 03 41 fd 60 2e 00 00 00 1c 00 00 40 05 | f0 af c3 ce dd eb 90 e8 cb ac 91 a5 38 a0 f8 72 | 06 9d 9d 60 | libevent_free: release ptr-libevent@0x7fb3680251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56e30 | #92 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 61 83 69 17 8d a7 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #92 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #92 | rejected packet: | 07 61 83 69 17 8d a7 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #92: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0504 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_SHUNT_SCAN | expiring aged bare shunts from shunt table | spent 0.00318 milliseconds in global timer EVENT_SHUNT_SCAN | timer_event_cb: processing event@0x557d46b1ae40 | handling event EVENT_RETRANSMIT for parent state #93 | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #93 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #93 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49640.025056; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008699 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56e30 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #93 | libevent_malloc: new ptr-libevent@0x7fb3680251c0 size 128 "road-eastnet-nonat-93" #93: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #93) | 8f 2b 82 41 be 50 7f e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cd 43 20 82 ea 0d 92 4d b7 6f 10 e5 73 62 a1 74 | 5f 8b b1 bd e8 48 72 86 0f fc f7 f4 6d aa 74 9c | c6 32 cc 9c 2e 89 27 81 1a 44 1a e2 a0 dc ee ce | 11 9a 86 db b2 0d 84 8c a7 35 4b a3 54 44 ff a5 | 46 90 60 08 6b 0b b2 6e 30 fe 4a 71 80 d7 a0 82 | 42 f8 84 b3 d1 ca 25 4a c6 d4 78 a8 df 7e e5 c9 | 03 e0 84 12 8e f0 91 14 81 e1 1e 7d 14 d0 21 c6 | 0b a7 bd a5 91 4d 74 5f a5 49 fb 47 92 a4 f6 f2 | 46 b5 1e 26 6d f1 8f 2b 0f f1 aa b1 98 3a 25 3a | b5 d3 2a 4c bc bb 1d f8 fd dc 58 f3 d0 d8 1b 32 | 38 77 9b c8 3c 93 48 af 2e 17 ec f8 87 96 76 0f | 85 58 80 2d fe e0 ad 94 9a 85 9c 5e 26 2b ed 2c | f6 a6 2f 18 05 50 d7 9c 67 0d fc 1d 16 0d 73 cf | e1 da cd 32 28 a8 c7 82 3a 82 36 71 d2 89 fb 29 | 72 68 23 fe 3a 1e 23 55 bf ae 58 43 08 3b 0f b5 | 11 45 c9 10 6a 4c 49 3d 66 da 53 be f8 72 a4 ba | 29 00 00 24 38 5c 7f a9 1f f6 b2 d3 ed 46 5d a7 | 91 ec df cb c1 74 f9 14 df e8 fc 11 90 67 a3 a7 | 1e 7f 11 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c cc 1f b2 cd 2b 6c 7e 5b 50 dd 93 | 55 b1 e2 f6 27 0b bd 36 00 00 00 1c 00 00 40 05 | b6 37 a4 32 e9 5e 9f 19 d6 7a 97 0a 5b 76 69 49 | 01 0d 5c 45 | libevent_free: release ptr-libevent@0x7fb3680407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1ae40 | #93 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 2b 82 41 be 50 7f e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #93 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #93 | rejected packet: | 8f 2b 82 41 be 50 7f e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #93: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #94 | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #94 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #94 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49640.132421; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.021775 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1ae40 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #94 | libevent_malloc: new ptr-libevent@0x7fb3680407f0 size 128 "road-eastnet-nonat-94" #94: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #94) | c4 af dc f4 22 ca 1a 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b8 0d 8e 0d 24 fa 48 9f 6f 70 45 44 af 29 03 81 | fb 75 7f 29 b1 65 5b 6b f3 dc dc e0 d1 ea 65 d0 | 45 a3 5f 01 d6 e7 51 37 b4 25 82 eb 71 98 d8 b2 | 75 57 7a 0e db af 40 2b 1a 10 c2 e4 b7 7e 18 39 | 54 3c 4a ec 4d d5 3a 2e ab bd e0 80 1e 0f e2 b5 | e4 a9 bf ef 3b ba fe af b1 7b cb 8a 16 e9 8c 65 | 20 92 b8 a2 66 75 85 84 5a e4 4c c5 4e 4c dd 10 | 51 c2 7a 85 78 58 a1 10 d6 cf c5 6b e8 22 f2 d1 | 41 df 6b 5c 73 f6 87 2e 17 45 1b 75 b8 bd 3d 9e | d2 3e d8 cd d1 d8 9e 58 23 f3 68 0b e1 b8 89 69 | 76 b7 7e 92 6a 4a 5b 2c 36 99 61 9d bb 09 19 68 | e0 83 4b 97 a3 48 26 96 74 a7 da 5f 7d b7 55 9e | e3 e8 68 32 6b 6e 35 3d 26 d7 4f 19 6d d6 44 17 | 3d 23 4c ff 1c ff e3 77 85 72 fa 85 64 76 2e ac | 5a 7b 31 bf 7b 44 eb 9a f4 5c 9d 72 ec 95 e5 4e | fc 10 63 57 5f 09 74 f6 c6 17 bc 05 7d ea 5c 13 | 29 00 00 24 c5 77 30 ba 9e 22 45 4a 1a af ea 19 | 02 b6 fb 3a f7 c7 ff 86 e4 75 07 62 09 1a 17 15 | a7 99 2d 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d bd d3 d9 55 1d 16 4d 34 06 fd 91 | 92 b6 52 35 3e d3 c6 4f 00 00 00 1c 00 00 40 05 | 83 77 03 33 97 20 84 34 b1 e3 aa 6c 05 af 74 6e | f0 8d d0 a3 | libevent_free: release ptr-libevent@0x7fb3440407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #94 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 af dc f4 22 ca 1a 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #94 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #94 | rejected packet: | c4 af dc f4 22 ca 1a 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #94: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37000d120 | handling event EVENT_RETRANSMIT for parent state #95 | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #95 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #95 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49640.237881; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006424 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #95 | libevent_malloc: new ptr-libevent@0x7fb3440407f0 size 128 "road-eastnet-nonat-95" #95: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #95) | 04 bb 1c 2b 41 e0 8a 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 79 b0 02 7c 1a 3a 07 ca 11 d1 03 7a 77 85 cb | ae ba 70 1b ee 9d e4 3c fb 83 b0 cf 85 ea f6 b1 | 44 27 5d 05 92 dc 5f 4f 10 d0 a1 c9 ef dd c6 ab | ac a1 db c0 15 56 b1 c8 1f 3b 2a 1e 0e 90 2f d7 | 1a 17 b9 f7 eb 61 37 1e 43 cf 9e 15 29 73 84 5a | a5 ef e1 fb 94 7f 43 bb 78 59 95 64 2c 87 b9 4b | 2e 15 ae fc 6c ec ab 40 45 3d 2f f3 c8 00 44 83 | 12 a7 e2 b8 59 bb 92 ce 59 8c ba f6 68 47 32 55 | e8 20 37 e3 3d d3 1b 3c 4e 84 f3 ae 58 53 16 45 | 58 97 74 47 9d a2 44 2f 81 9e ee 5c e8 ce 37 e9 | 5c 14 3e 89 c4 f1 89 ca 70 e0 1d 7a a9 38 f6 40 | 66 fb 41 8c 9b be 2c ea fc cd 2c ca 26 30 dd f0 | b1 29 6c c0 a6 b8 e6 ad e2 7b ae 2b 83 8b e5 9d | 01 26 d8 0c 5a 11 5f 25 a6 3e 25 b6 0f 26 26 34 | 01 b9 a7 4b b7 42 77 99 87 64 20 bd 67 77 cc 7e | b2 79 54 9b 12 25 7f ea ef 16 57 4a f6 24 75 7e | 29 00 00 24 fc b1 a7 58 88 f4 1b 4f aa 0e 2d d3 | a4 65 ca 66 dc 36 b5 47 7f 16 51 11 a3 c3 71 08 | 58 80 43 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ca 3c bb 33 78 12 9a 1b 10 5c d5 8f | d8 1f d4 ad ee 67 79 04 00 00 00 1c 00 00 40 05 | 61 56 68 61 76 b1 38 9f d6 2b 7a dd 4f cb 90 80 | 12 f2 80 83 | libevent_free: release ptr-libevent@0x7fb370012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37000d120 | #95 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 bb 1c 2b 41 e0 8a 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #95 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #95 | rejected packet: | 04 bb 1c 2b 41 e0 8a 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #95: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0474 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecac0 | handling event EVENT_RETRANSMIT for parent state #96 | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #96 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #96 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49640.342293; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005693 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37000d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #96 | libevent_malloc: new ptr-libevent@0x7fb370012840 size 128 "road-eastnet-nonat-96" #96: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #96) | 4d 94 02 39 3c 71 1f ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf 27 e8 d9 3b fa 4a fd 06 7e 6c e7 d4 28 0e 9b | df ea 6a b2 fc 9c 70 c8 54 bf db 6f b0 0a 35 03 | f4 08 a8 1f a5 9d 3d d9 36 ba b8 d7 c7 a5 02 b2 | bf b0 56 c5 e8 85 3a 3f 3e 64 27 86 e6 32 36 9e | e3 cb 8f 61 07 7c f1 f7 b9 98 01 dc 75 bf ec 8e | e7 f3 67 03 e1 e0 44 02 7f 11 18 67 70 37 2d 5e | 1b 6f 89 19 20 17 f1 e7 a8 e9 33 cb ea 00 46 56 | 49 ba cc 5d 15 50 da 98 ff 9c 3f 56 7f 50 23 17 | 4f 39 25 c0 2c 24 4b 31 aa 08 bf c3 fa 73 75 f8 | 66 d4 df a2 81 2f b6 b1 85 b3 e1 b9 2c ba cc f0 | 05 a5 8e 76 4a d0 1e 4a 24 c4 b4 b6 c2 9f 5a c8 | d7 f7 62 5f e5 ae 58 69 f5 08 1a e6 3f f8 45 99 | 93 41 5e 16 d1 fa c4 dc dc 43 aa 67 19 5f 0d 6b | d0 93 a7 d0 e0 42 60 37 df bb b8 67 3d be 3f 73 | 01 ab df b7 44 63 b3 2e 2f eb b6 11 c7 6c 12 e1 | 09 64 f6 e9 82 4b 4a d1 f8 5c 86 44 cf 9c 7b 84 | 29 00 00 24 fb b6 a6 14 5d d4 9f d4 3b de f1 45 | f6 4a ea e3 bf d0 33 9e b1 50 af 7d ca 56 7c e5 | 77 5f 83 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 32 ad 1c 75 03 32 df 0c 2b d0 a0 | cb f7 34 b2 23 e4 90 14 00 00 00 1c 00 00 40 05 | 3d 4e a8 fd 45 70 26 15 be c0 96 dc 33 de 8f ea | e2 1a 12 a7 | libevent_free: release ptr-libevent@0x7fb3500251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecac0 | #96 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d 94 02 39 3c 71 1f ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #96 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #96 | rejected packet: | 4d 94 02 39 3c 71 1f ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #96: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #97 | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #97 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #97 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49640.446651; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006426 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecac0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #97 | libevent_malloc: new ptr-libevent@0x7fb3500251c0 size 128 "road-eastnet-nonat-97" #97: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #97) | 7c 9c 8d d2 c5 3c 3b 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 98 e5 dd bd 5b c0 22 fb 24 a8 9d 4b ca 6c 72 | 78 61 7f 8f 02 15 b8 56 b3 c2 d4 89 90 42 e9 ae | b3 56 28 83 de be c5 dc f3 99 87 bf 7c 20 cf 1e | 80 26 a3 f6 7f d4 66 5c a2 37 d4 2d 88 37 5b ee | 37 eb f6 f3 73 47 4e f2 3e 1b de e1 36 54 bd 6f | 97 78 ce cb 16 0a da 34 fa 11 bc e7 e5 27 11 6b | 72 0d 9c de de 06 66 d8 74 64 a9 64 0b 12 b1 e7 | 15 84 3a 8c d9 6a d5 46 6c 00 4b f9 69 74 47 d1 | f3 79 bc d4 c9 0f 58 86 00 a5 0b 46 4c d7 20 78 | 99 ce 0d 0d cd 99 98 27 cc ce 50 e5 63 fc 25 ec | 4a 78 c1 76 a6 35 df cd 30 8a 57 10 1a b9 c6 85 | f5 05 46 77 76 2a ba 40 b5 da 98 c0 91 e5 03 c9 | 47 7d 79 56 d6 82 48 c6 a2 b4 f6 fc f6 16 30 98 | d9 b0 79 c5 33 a4 80 eb bb 99 51 9a 3b 3b ae a3 | 9b a3 5f 5f ce 23 78 fd 36 29 21 9b 24 8f 30 93 | 1f 0b 71 91 41 28 b6 d5 e2 dd ce 67 83 67 83 41 | 29 00 00 24 4a 40 88 f3 3a ca ff 58 9b 48 04 9a | a8 d0 f5 15 e8 12 b6 3b 4a 95 b2 73 79 da d4 a0 | df 94 6f b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 5b 76 c7 df cc 29 e7 8f 6d d6 7a | e3 d4 c1 e2 a2 33 fe 59 00 00 00 1c 00 00 40 05 | 63 90 91 6f c8 44 50 2a ff 12 5c 17 cd fa e6 2d | 07 cd 17 d6 | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #97 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 9c 8d d2 c5 3c 3b 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #97 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #97 | rejected packet: | 7c 9c 8d d2 c5 3c 3b 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #97: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0569 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47ed0 | handling event EVENT_RETRANSMIT for parent state #98 | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #98 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #98 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49640.532023; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007906 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #98 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 "road-eastnet-nonat-98" #98: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #98) | 36 f6 17 30 89 34 87 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e de 22 15 b8 37 99 8a 19 60 74 d9 cc fb 93 74 | 46 52 5b 4c b2 15 42 20 b8 92 87 ba 2d f3 d7 43 | b5 37 b0 ea 4d f5 7a 45 62 c7 3f 47 fb 44 64 d3 | e1 f9 e0 4b e7 fb 3e 3d b1 04 53 7b 67 35 99 55 | 77 f9 c2 de 1c 5e 4e 46 02 3b e5 0c e9 31 90 64 | 6e cb e0 dd 1a 59 99 ef 3d a7 c1 9b 74 f9 45 3f | 99 cd de c7 d0 13 5f 2b 11 ac cd ff c9 47 2e 86 | 69 0d e8 ec 31 64 37 7f 01 74 30 f7 db 0e d0 fb | 8b 6d 9d cc 98 7f 1a b4 87 7d bf 2e 19 53 89 24 | 00 4f 0a 93 5d 06 c9 01 d3 dd 9f 4d 48 ee ba 48 | 79 5c 5f f3 cb 01 ba a7 ec 71 ed fd 64 af 41 a6 | ff 80 dd aa 0c ae 06 5c 0b a3 1c 56 84 5b 6c 26 | fd ff b3 07 94 15 1d 68 35 03 8e 60 07 84 12 f9 | ee d9 d1 91 a2 f4 75 f6 9e 29 11 0a 54 bc 2f 41 | 2c ea 22 ab ab 32 6a 0c 62 23 b1 4a 4b 29 bb 22 | de a9 03 f4 17 e0 39 72 79 31 e0 0a 30 fa 14 a0 | 29 00 00 24 dc e2 b9 cb c5 4c 15 ab 06 6c 97 a6 | 72 6b 55 8f 7d 14 aa 13 19 ae 9e 9d 27 a3 3a 17 | 86 0f 7c a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 94 a8 82 2a 1f 7d 1b 29 07 9f 80 | 75 97 d7 a2 ab 24 e8 8d 00 00 00 1c 00 00 40 05 | b8 4f 85 79 77 db f6 74 dd c9 e6 fd e8 91 c3 41 | 66 c0 f7 3b | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47ed0 | #98 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 f6 17 30 89 34 87 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #98 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #98 | rejected packet: | 36 f6 17 30 89 34 87 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #98: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a73690 | handling event EVENT_RETRANSMIT for parent state #99 | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #99 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #99 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49640.626375; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006546 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47ed0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #99 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 "road-eastnet-nonat-99" #99: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #99) | 20 f2 8d 71 65 ac 47 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 55 64 d8 ad 81 88 80 21 0e 25 1a b1 6c d3 13 | 60 47 54 9f 37 b3 3b e4 ef 17 20 61 85 67 62 f1 | 02 df 28 57 14 6d e3 be a6 7d d0 60 0f d8 35 56 | 23 d8 87 e9 4a f8 7b 29 e9 15 5f 82 0d 90 dd 56 | 5d 5a 2c 1a fd 14 77 42 8f 36 df a6 c7 9c d4 1a | 4f 67 c2 2e a6 a1 f6 1c 58 4b f8 cb b3 cd ce 08 | 48 62 dd 58 41 3a 14 29 9a 8c dd db 6a 06 47 a4 | 6c b7 ae b7 e4 5d db e5 9d e5 08 8e 17 5b 65 be | 17 aa 8e 73 be 9c 01 fb 31 11 79 f8 7d b5 ee ca | 7b e0 59 52 95 92 4d d8 40 43 34 f1 14 b9 84 18 | 60 68 b3 da 39 48 0e 5b 21 3c 0f 30 5d 85 b9 b8 | 1e e9 36 ff 36 9e aa 51 52 b1 5e 1d 27 fe 89 5d | cd 1e 0d 8d d6 a1 c3 a1 84 3f ea 32 11 45 0d 67 | 3f e2 4b 56 64 56 35 98 b6 f3 83 f0 90 30 0e 75 | b7 c7 9b 32 1d 5c 5f 2d d9 a9 92 93 d5 c6 6e 2b | ba f3 5c d6 20 4b dd 47 18 da e4 05 c0 7c 3e d8 | 29 00 00 24 0e 55 53 da 51 ef 9c 5f c5 b0 f0 9b | 78 63 11 53 43 43 64 d7 34 99 64 b7 14 ad 81 b4 | bb 55 f4 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 cf c4 07 93 b6 10 89 13 8b 25 5a | 5c dd 08 90 5b 56 28 b0 00 00 00 1c 00 00 40 05 | 9d 1e cf 39 e1 37 a4 6a 40 83 a9 41 54 1a 0d 5f | 91 61 32 ea | libevent_free: release ptr-libevent@0x7fb34403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a73690 | #99 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 f2 8d 71 65 ac 47 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #99 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #99 | rejected packet: | 20 f2 8d 71 65 ac 47 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #99: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34800d120 | handling event EVENT_RETRANSMIT for parent state #100 | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #100 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #100 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49640.710711; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005136 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a73690 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #100 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 "road-eastnet-nonat-100" #100: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #100) | e4 31 72 ce cb 4c 2e da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 02 70 26 8b f7 4c 10 d5 54 2d e1 56 87 42 60 | 52 43 18 58 d2 c6 63 79 e0 4c 7b 4a 2f b9 0e c8 | b1 65 1d 3e 6c a0 42 98 0c 60 fd b3 4d 30 f1 76 | 5e b7 85 03 42 2b d9 76 75 50 2e c4 69 94 03 7a | 6e c6 23 13 83 28 87 89 db 36 67 01 a4 44 23 73 | e4 b0 04 73 26 bb b0 01 8a 59 be 71 cf 90 5c 3a | 4f 3e 50 e0 98 79 eb 2c 62 ed 3b ff 05 2e f6 81 | 65 38 8c a4 51 39 05 8b 85 23 c5 f6 84 98 62 7d | 1d 2f 44 0d 73 e0 13 c3 51 be 3b 56 26 36 4c 79 | eb bc 2b 5e 2c 37 b2 d5 29 fa 64 f9 de 60 b9 ba | 73 c4 a9 28 1e 62 38 24 9d a3 96 c5 53 73 2c 7d | 0d 39 e6 12 54 ca 75 11 6f 12 17 8e e1 13 5d 45 | 12 9e c5 b7 6a ce 49 b5 ef 7b 55 be 70 ce 3a 18 | d9 f0 2c b9 2c 8a 17 6a 09 a2 d9 96 28 14 14 67 | 3e 3b 41 a6 c6 44 44 f5 69 48 d1 0a 41 9c 30 d6 | 74 2c 38 9d d2 1f 0a f9 85 a8 83 ce dd 7d a1 17 | 29 00 00 24 9b 63 67 5a a5 90 71 08 bf 01 2e 0d | 7a 17 c3 85 da c2 c9 b2 79 84 88 d1 44 e9 43 2f | de e8 87 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb bf 15 80 9f fe 69 e3 a2 7b 53 a0 | 71 05 30 05 2a 8e cb 5a 00 00 00 1c 00 00 40 05 | e0 55 02 95 04 d8 fc 5b b5 ab 42 28 79 3c 3e 17 | 70 aa 5d 58 | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800d120 | #100 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 31 72 ce cb 4c 2e da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #100 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #100 | rejected packet: | e4 31 72 ce cb 4c 2e da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #100: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0457 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #101 | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #101 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #101 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49640.808085; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.018356 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #101 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 "road-eastnet-nonat-101" #101: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #101) | a4 e5 70 36 3e 53 78 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed 47 67 da db 52 1d 6f 38 4e a0 14 fb a3 22 ee | a5 bd 87 bb f4 50 cd e1 5f f4 bb 7f 5e 01 20 78 | 03 d2 5e e5 f5 4c 45 4d 90 0b ab 1e a9 68 0d a2 | 63 8b 82 0b 63 5a be b1 7a 7f 0a d0 8f 73 00 89 | 01 d6 0d 8e e0 01 de 09 aa b1 2b c9 2a 85 99 3e | e4 12 33 b6 ff a4 02 5b a4 0f a9 0e 49 92 c4 c4 | 91 bb bd cc bc 4e ec 81 b6 b6 b8 9c 4a 4e 40 d2 | 5e b4 c5 bc f7 4c 25 7f b5 8f df 4b 29 de 24 b5 | 99 9e 0e bd 10 eb 77 c5 31 71 d3 38 c7 ae 1b 45 | a1 15 8f 53 f2 46 e1 e0 f3 7d cd 3a fa d7 ce cc | 71 fa 98 05 20 5e 2b 57 e0 1e 93 66 04 94 47 68 | b5 fc da d4 67 d1 27 06 e7 0b 81 26 9b 06 3d 8a | 68 ab 7d 23 5f b3 75 b4 20 05 d5 0a d7 9f 47 f8 | cc 49 2f 28 05 85 5c 22 76 a9 df c7 57 38 c2 59 | 85 34 bf b9 39 30 70 bd fe 4d 41 14 30 36 f4 a7 | a4 75 83 53 e7 c0 5a e0 b5 e5 07 a1 66 16 4d c3 | 29 00 00 24 08 f8 1e 60 51 22 a7 7a 61 74 80 8a | 8a 13 29 1d 07 8a 7f 81 27 3b e2 db 98 17 8f 37 | 46 82 14 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 37 fb 68 83 f3 3a 11 a5 17 fb 1f | 7d e8 ab 39 06 f5 fb 7f 00 00 00 1c 00 00 40 05 | 98 33 35 18 bc 62 08 ee 27 45 3b 5b 93 d4 b0 de | 01 b6 d3 96 | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #101 spent 0.194 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 e5 70 36 3e 53 78 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #101 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #101 | rejected packet: | a4 e5 70 36 3e 53 78 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #101: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1aec0 | handling event EVENT_RETRANSMIT for parent state #102 | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #102 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #102 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49640.859473; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005905 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #102 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 "road-eastnet-nonat-102" #102: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #102) | 27 a9 08 a7 62 f6 e2 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 3c 29 a0 c9 87 b4 80 a8 37 0b 02 31 7e 05 06 | 02 b7 61 4c 60 0e af ef 4b 5c b9 dc 19 0b 5d d9 | 85 a8 a5 ba 16 2d 92 a5 e8 44 5d 48 48 06 cf a5 | c8 1d 53 0f c9 1c 2d 7b a3 b3 51 75 2d 98 e2 85 | e1 14 fe ce 69 6e ee 85 ba cc ab 6a ed ac 29 a6 | 04 6d ec cb be 61 e5 98 b4 1e dc 38 dc 20 70 bb | 52 99 a2 ac 6c 5b d5 dd f6 c6 54 38 29 d3 1c 88 | 10 77 53 7e af 0b 17 62 42 90 de ab 20 33 28 bc | 91 f7 eb 8f 86 fb 2e 6b 0f 94 c5 1b d9 40 a4 9e | 85 bd 8a 30 d0 a6 6c 09 f4 53 70 9d 11 c9 76 49 | 32 46 6a 4a 93 73 a4 59 28 e7 d5 c6 a2 40 d9 fe | c5 0c 7c 9f 70 ed 22 06 0b e5 2d 6e 16 d1 d2 84 | dd d9 af a3 b3 06 49 42 9f 97 37 00 03 72 48 b5 | 2c 38 f9 d2 b0 86 d6 8d ff f1 cb a6 a2 01 50 8e | d5 f2 44 23 56 23 e0 80 83 60 74 3c 92 0d 5e fb | ab 02 db 75 25 b6 fb 54 b8 2c cc 93 7e 04 7e 47 | 29 00 00 24 02 3b 00 99 07 4d 65 f7 7a c6 71 3b | f3 f6 94 93 e2 10 88 59 58 b9 a5 ba 96 a3 b3 bb | 2e a4 a0 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f0 3d eb e8 fa 43 c6 b4 69 3b f8 | f6 b0 ac 09 3e c3 01 6c 00 00 00 1c 00 00 40 05 | 27 e7 8a b1 d1 bb a4 87 76 d6 0f f9 d8 03 fa 51 | 25 22 7e d6 | libevent_free: release ptr-libevent@0x7fb3600300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1aec0 | #102 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 a9 08 a7 62 f6 e2 d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #102 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #102 | rejected packet: | 27 a9 08 a7 62 f6 e2 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #102: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a77850 | handling event EVENT_RETRANSMIT for parent state #103 | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #103 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #103 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49640.935801; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007956 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1aec0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #103 | libevent_malloc: new ptr-libevent@0x7fb3600300e0 size 128 "road-eastnet-nonat-103" #103: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #103) | 20 80 ad df 5a 9a 13 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d a9 30 94 a8 d4 ad b7 ab 41 10 cf dd 34 d7 45 | db 9e 99 58 0d 72 d8 74 bd 3c 1d 4a 98 9b ff 38 | 08 61 4e c7 a6 75 c7 cd ff 21 41 e1 5d c2 9d c6 | 7c 47 d1 97 8a 16 0e 0e 3c 96 7a d8 10 82 5b 8a | 00 b3 29 44 ad 13 12 a6 fb af 01 2d 66 5c e1 02 | 4b 01 af e5 ba 61 e3 fe 71 46 2a af 0d 0d 2a 26 | f8 12 e9 10 f0 8f ca f1 fd 82 c7 ea fa 46 02 26 | b6 95 72 2c b1 d7 c7 46 5a e6 4a 07 87 39 fe e7 | c6 a1 7d 2d 52 a4 c7 a2 b5 e7 2f 2b 1d 48 eb d9 | 7c e8 c4 cb da 19 e0 04 20 53 7b 3c 73 86 a7 70 | c7 09 d6 f9 52 be 12 99 31 58 c4 f8 6c 8b 22 3a | c5 da 0c e1 bd 65 73 c3 27 14 e7 0f ae a0 e8 45 | 58 e0 c3 02 1b 48 ee 20 03 b9 0c ec ad e0 21 05 | 1b 38 52 4b dd 92 f0 58 d2 29 eb 4e be 57 49 4d | 5d 0f a4 01 4b 76 95 2b 60 de d3 82 01 e6 15 d8 | 32 f5 60 60 88 d1 83 bc a6 c2 db 62 29 b3 d7 5e | 29 00 00 24 fb ef 9e 44 e4 82 6e 41 3f 46 3a c8 | d1 69 b9 34 c6 14 27 a3 23 52 4c 58 0c 66 b4 10 | 6a d0 69 ee 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 a3 d6 8d 6e 26 8b a3 26 28 d5 ff | 4a 28 a8 bb 6f af 66 22 00 00 00 1c 00 00 40 05 | e5 6e de 91 25 32 b5 3b 38 9d 70 ef 64 14 11 f9 | c0 c1 79 e6 | libevent_free: release ptr-libevent@0x7fb370035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a77850 | #103 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 80 ad df 5a 9a 13 26 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #103 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #103 | rejected packet: | 20 80 ad df 5a 9a 13 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #103: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.058 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11600 | handling event EVENT_RETRANSMIT for parent state #104 | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #104 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #104 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49641.025111; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.014876 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a77850 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #104 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 "road-eastnet-nonat-104" #104: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #104) | c8 97 67 f1 1b 46 da 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 e4 3d 30 95 de e5 8c 73 da 01 a0 e2 a0 c0 5e | ab 07 43 87 84 24 88 49 ca d1 13 72 cc 7b 38 93 | 5a ab ff 3c 3d d2 b7 a9 16 19 a5 56 5c 01 9f 05 | 2f 70 be 2d 9d 04 2c f7 80 b3 5f 24 70 c4 0d 58 | b9 f4 31 d3 bd 25 62 64 07 37 4c 59 6f a0 74 90 | e2 15 77 64 4c 06 2d 41 bc 70 c3 30 0a 01 9b df | a0 88 42 69 26 57 a1 25 9a c0 ee 4c ee 57 50 5f | 0c 95 2a a5 72 cb d8 81 34 25 75 ee 4d 04 23 27 | e9 da 7c 36 60 32 11 97 39 d8 f4 3f 96 13 6c 72 | 19 1d 43 e4 f0 4a 92 88 29 4c 84 63 63 7d 3a aa | 3f 23 85 5a 73 71 01 2f 63 e6 b3 a0 2d 7f 75 e1 | e9 d4 1c 1a 83 67 2e 29 49 85 8a a1 31 04 a5 31 | 1b e6 35 a4 14 80 ac 17 6c 11 db 3d c3 88 57 d2 | 55 c5 b6 4e 2c 2b 58 d9 50 1f f2 54 b6 50 63 00 | d4 ad 6c 3c 60 cd 52 3b 9b 0f 69 cc f2 8f 29 dc | 29 5e 75 22 60 a0 c9 59 5b 00 1a 98 02 fb 23 0f | 29 00 00 24 16 fd b9 d2 33 64 36 d1 f0 bb fa 0d | d8 4a 7e 7c 2a 2e d1 92 40 9f bf f6 34 ac 7a 15 | 2b 49 c7 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 28 db 0c 20 22 dd ba ac 9b fa 10 | b6 bd 27 81 bf 6a a0 a8 00 00 00 1c 00 00 40 05 | 90 9a 71 02 e5 61 58 ec fb 0f 5f 95 cd f2 2e 99 | e5 4b 54 60 | libevent_free: release ptr-libevent@0x7fb340040790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11600 | #104 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 97 67 f1 1b 46 da 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #104 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #104 | rejected packet: | c8 97 67 f1 1b 46 da 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #104: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0724 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a67330 | handling event EVENT_RETRANSMIT for parent state #105 | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #105 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #105 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49641.097497; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005122 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11600 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #105 | libevent_malloc: new ptr-libevent@0x7fb340040790 size 128 "road-eastnet-nonat-105" #105: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #105) | f1 44 62 e8 b2 96 b0 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 2c 0f 43 7a b6 95 d2 da 02 c7 c3 b7 c1 84 3a | 45 85 a1 11 41 47 db 34 2a fb b4 18 d1 bf ea 06 | 1a 10 f5 e2 f0 2e 22 4f eb 14 58 fa 5c 28 c5 97 | e2 ae 87 b0 f4 b2 19 f2 c0 72 df 2a 2b df 2e 30 | f5 e9 e3 d6 5a 85 fc e6 1c 1c 2d 36 25 55 ff d7 | e9 f8 4f e9 95 2f bf 23 70 c4 27 2f 59 aa 5a d4 | 00 1b f9 ac 9d 1b 73 43 66 d9 a7 24 55 56 33 f4 | df 70 86 46 09 22 db 6f ad cb 9a 9a bd 6e 03 ac | ab d8 ee 40 d0 e9 4f 4e ad 4c 58 0f 93 e2 e1 c8 | a2 ad 19 24 8d ca 10 9a 44 cb e8 b8 40 12 de e1 | 29 64 1e 40 f8 bf aa 87 bb 84 b2 5f 6f 0d 9d b9 | 12 51 1b 65 f4 ee e0 55 a1 dc 96 99 27 5b 4c a9 | 9a e4 cf 90 e8 fa 83 39 ff df 24 19 f2 75 1e b2 | 3a c5 5a ee 20 09 c9 38 60 08 ab 53 42 3f a9 0e | 51 ea 72 b2 25 2b b8 e3 e2 f5 9e 45 c1 0c 4c 33 | 68 83 d9 f1 9b 1b 60 f3 f4 29 c3 90 eb 9c dd 59 | 29 00 00 24 b7 9a f1 29 40 44 aa 07 d6 8e b0 7b | 73 1b 3f b3 0a e3 ed 21 f1 bb 89 35 39 a9 d4 99 | a7 53 6e 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 95 3e 47 a9 bf e3 9c 92 80 50 73 | b0 a9 03 26 40 9a 45 50 00 00 00 1c 00 00 40 05 | c6 93 aa 3b 5e af 6b 75 f9 54 eb f4 c6 61 f4 b6 | b4 32 51 f3 | libevent_free: release ptr-libevent@0x7fb3700300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a67330 | #105 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f1 44 62 e8 b2 96 b0 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #105 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #105 | rejected packet: | f1 44 62 e8 b2 96 b0 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #105: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0677 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9b1c0 | handling event EVENT_RETRANSMIT for parent state #106 | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #106 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #106 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49641.18287; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008225 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a67330 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #106 | libevent_malloc: new ptr-libevent@0x7fb3700300e0 size 128 "road-eastnet-nonat-106" #106: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #106) | fe df 65 eb e2 ca b1 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad da 7e a9 45 cb 20 7d e8 1c 81 82 05 64 57 6e | 75 d8 44 d1 29 49 80 30 70 57 33 94 8e d0 1f 14 | bc ae 59 d5 21 a0 94 8f 2c d7 0e ae 64 85 ee 4d | 50 69 c0 d8 4e 47 ef 8f 3a 2d ef b1 7b 6b a7 c8 | 8d 12 00 9d cb 02 d1 fa 1a e5 8c 51 be 6d 05 c8 | be 42 ed 64 5d 5d eb 43 74 14 7b 2e df 96 fd f0 | be d2 f5 e5 50 93 03 3d e5 7a 2c d8 01 5a 9b de | a0 3b d7 ce 9a ef 2b 39 02 de 74 61 50 3b eb 81 | 05 67 4f 23 be 3a 8e 5c be 32 5b 04 eb 4a 0a 52 | c4 c5 a5 9b 90 ef 60 8e e0 0b c4 2e df 2e 03 08 | 7d 0d 7d 77 85 98 9e 4b 28 0a fe 25 1d a7 29 db | 4e a8 1b 4a ee 35 1d 2c ba 8d 50 15 cc 00 fd b8 | 76 4c 44 ae c6 c8 10 0a ab 0a 64 76 0a 4d ee 2e | 50 89 e6 58 b8 26 b4 69 a0 66 8e 81 ad 9d da 80 | f3 00 a8 93 0e 88 6f 79 09 79 fc 16 36 77 35 c1 | 3d 72 2e 00 31 12 9c f8 70 79 c2 64 a5 05 9a 24 | 29 00 00 24 a4 51 db a3 25 2a 8b 08 e6 f6 81 86 | 04 5c da 12 5e 8f 68 4a 8c ec ef 5b e1 08 6f b7 | 57 a9 96 c5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 f9 ad bd d7 95 65 27 17 8c 87 a1 | c4 9b a8 f7 4c 6b d7 13 00 00 00 1c 00 00 40 05 | 1a ac 1c ef 71 2b dc a9 6f 07 a5 2c d5 55 fb 6b | d6 5b 32 77 | libevent_free: release ptr-libevent@0x7fb37402ff60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9b1c0 | #106 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe df 65 eb e2 ca b1 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #106 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #106 | rejected packet: | fe df 65 eb e2 ca b1 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #106: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad0280 | handling event EVENT_RETRANSMIT for parent state #107 | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #107 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #107 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49641.256155; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009867 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9b1c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #107 | libevent_malloc: new ptr-libevent@0x7fb37402ff60 size 128 "road-eastnet-nonat-107" #107: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #107) | ac 4e b3 f4 ed 6e 1b 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 73 84 90 b0 a1 c9 25 a6 16 5e 4b 67 ce 07 6b | 92 04 d0 37 9e 07 4b 09 02 c2 78 f5 a4 a2 15 3a | 81 d0 8e e8 00 40 7b 2f 93 05 4b f1 72 7f 82 62 | 11 07 a0 1f 82 07 75 ea 96 ea 88 0b 0d 07 25 f0 | 53 bc 84 a7 a4 75 94 5f 48 4e 4a 60 2b e3 6f 76 | 92 f7 9d 74 6e 3f f1 39 f4 ea a5 df f6 6b e2 19 | 19 b6 60 26 c6 fe d4 1c bc ad 80 f2 46 47 46 93 | 4a da 3f 4a 2e 08 aa d8 dd f9 58 37 f0 1b 68 77 | ce 96 bc c9 19 65 a5 66 67 6f a9 fc 8b f9 e5 15 | 20 ed ca 26 5a cf 00 8e 65 d8 10 df c9 2f 55 c3 | 64 dc 1d 41 fa 8c 1a 44 06 90 c6 59 bf c3 6e 3f | fb f3 89 2e c3 0c 98 20 fe c3 39 08 86 b8 6d 84 | 72 50 7b 56 51 ac 06 e0 20 77 cc 21 04 85 51 fd | 65 1e 59 7f 79 5a a9 9c 4e fa 78 0d d8 f6 cf 3c | cd 73 f9 1e 3d 38 88 98 9e 60 ec bd 06 0d 2d 0c | 39 4f f8 8a 60 2e a2 ac 6c bc 30 73 f0 bc 87 4c | 29 00 00 24 2b ab 2f 68 f7 5a dc 67 d2 bf 24 50 | 1d 74 5b c9 72 db b8 cd 99 25 80 eb 1e bb 50 81 | 94 b2 ae 95 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 39 55 8e 98 9a a9 9a 86 88 c5 10 | 1f 60 cd 0e 59 85 0d 5e 00 00 00 1c 00 00 40 05 | 18 34 33 25 63 a4 39 e3 ca 5d cd 23 8f 87 c0 51 | 02 99 ff a0 | libevent_free: release ptr-libevent@0x7fb37c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad0280 | #107 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac 4e b3 f4 ed 6e 1b 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #107 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #107 | rejected packet: | ac 4e b3 f4 ed 6e 1b 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #107: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23150 | handling event EVENT_RETRANSMIT for parent state #108 | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #108 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #108 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49641.344489; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.013344 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad0280 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #108 | libevent_malloc: new ptr-libevent@0x7fb37c035930 size 128 "road-eastnet-nonat-108" #108: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #108) | b6 36 fb 7e 9b 39 08 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 8f 7e 30 55 17 55 d0 7b cc 1e 1e d2 0b 4a cb | f4 10 86 26 73 3d 12 d5 07 43 0f 11 e4 f8 f6 27 | 0b a5 f1 36 07 fc f3 05 3c 23 da bb fc 30 83 87 | 4d 41 58 5e 99 3a a9 ce 46 15 98 87 9b 24 d7 8f | 4b 59 7f b7 31 2a 48 e9 80 ab 05 c8 c6 49 95 79 | 0d 98 4a 2c 3d fe d3 d5 57 7f be e0 6f 80 49 7e | 12 83 14 1f 0d 26 16 aa cd e1 d8 a5 e8 e4 d2 0b | 8c a3 fb db 9a 33 4c 54 d3 db d0 4d 8d 8e a8 6d | 02 98 c7 65 a7 c6 72 0c be 01 bc 52 89 54 3a 59 | 6c 0b 5d c0 31 d7 63 e7 46 02 b3 0a b3 c7 5c de | 0f 7c c0 40 9f a9 b4 60 e4 65 87 1b d1 de 9c 27 | 3d df 5c 7f 27 8d e9 84 86 44 ce 9d 88 43 1a 58 | 28 56 bd 9e df a0 81 8f 79 ba 7e dd 69 15 d8 10 | e7 15 0f da 12 84 35 19 8e 2f 46 d3 83 f4 76 51 | 58 93 90 90 80 38 02 b8 02 db 96 cc e8 5b bf 28 | 0c 19 e8 c4 f6 ae 03 e7 2c 85 d1 50 dc 63 a6 cc | 29 00 00 24 6f 78 95 93 53 4c be 35 be d7 12 7f | aa e5 be 16 ad 5c 36 ac 46 40 9b c8 37 9c 91 65 | 00 a5 4b a8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 98 20 9c 05 26 c6 0c 16 0d f3 71 | 8e b0 d2 f3 4f 39 a2 61 00 00 00 1c 00 00 40 05 | 96 4b e6 dc 37 23 61 90 08 5b 41 4a ab 35 e9 fe | 61 65 2c 1d | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23150 | #108 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b6 36 fb 7e 9b 39 08 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #108 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #108 | rejected packet: | b6 36 fb 7e 9b 39 08 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #108: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad4340 | handling event EVENT_RETRANSMIT for parent state #109 | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #109 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #109 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49641.41282; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006107 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23150 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #109 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 "road-eastnet-nonat-109" #109: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #109) | 53 c2 aa ad 50 91 d9 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 1a 23 bb a3 ce 6a 0d 92 7a aa 8d 69 c7 99 27 | db f2 23 5c cd 5e 2d f6 c4 13 c1 c7 87 46 ed 75 | d8 b9 55 72 40 32 53 f1 21 db f3 6d 45 6a d9 b4 | 9c 06 b1 28 c5 00 1e e2 70 2c 2a 1a f0 fa 65 1b | a8 db b9 2c 83 95 23 c4 4d 60 4b a3 fc 58 c6 c8 | a8 b0 c1 e8 32 2c d3 70 a2 4d cb c8 7c 80 17 90 | c1 c1 fd 82 03 1f 32 d8 5e cd ad 60 ce c1 24 ab | 82 68 88 db 79 b3 aa 37 ff 36 d4 a3 82 06 b7 59 | 0c 4c 61 6f 22 1c 48 b3 94 8b 71 14 8f 57 c8 03 | 31 41 b9 e3 a9 ea 8f 4d 51 15 4a 4c 5f 30 c2 c4 | 40 3e 6a 9e 7d 33 6d fb 91 1c b2 be 1e 33 35 f6 | 1a db ff 1e 8c 4e e8 12 71 d7 94 88 49 d8 37 d9 | cb 52 5b 22 87 0a c9 2f a4 1d 52 36 85 74 38 7e | de e2 44 79 f2 36 18 5e 82 cf d4 fb db 3f c9 35 | 36 d8 7b 5d 04 fb fa a4 fe b5 87 c5 e7 4e 90 d6 | 9f 17 87 48 32 5d ec 5c f7 e6 e2 39 17 1c 9c 2a | 29 00 00 24 8f bd ba cb 6b fc de c1 80 b9 fe c3 | b3 e0 ad b2 e9 fa 37 77 43 04 c6 81 1a 91 41 eb | 20 40 b9 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f d2 7c ae 7e 39 2b fb 54 2c 44 94 | 2e c2 37 67 8d e5 fe 8b 00 00 00 1c 00 00 40 05 | 12 b6 58 87 f0 a8 b9 d4 aa ae 6f 5a ed df 76 d7 | 1d 86 02 2c | libevent_free: release ptr-libevent@0x7fb370046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad4340 | #109 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 c2 aa ad 50 91 d9 00 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #109 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #109 | rejected packet: | 53 c2 aa ad 50 91 d9 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #109: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #110 | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #110 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #110 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49641.51815; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008376 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad4340 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #110 | libevent_malloc: new ptr-libevent@0x7fb370046040 size 128 "road-eastnet-nonat-110" #110: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #110) | 3a df d4 0d 3f 72 b9 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 51 e2 9f 86 58 b1 8c 95 ac 68 08 4c 4a f6 70 | ad a1 89 82 51 9f 97 f7 49 8c 33 6b 14 6a e8 d8 | 5d 56 92 c8 3c 2c 40 17 32 2d 8f e8 79 30 ee 40 | f9 ba 9e a6 39 a8 9f 6a 60 30 36 fa 91 73 4e bf | e6 d5 bf ce 9d 89 72 4d e1 c3 4f 68 a3 0e 2d 22 | 55 9f 70 0b d2 5a 8e 49 bb 26 55 db 7b 06 39 59 | 26 09 73 11 d4 24 0c 12 fd 4f 4c 65 6c 3c af 90 | 8b 17 1f a8 52 96 38 96 91 03 13 81 89 15 d8 cf | 89 39 0b 98 8d cb b9 22 57 8d d7 cd 73 bd 42 b5 | c1 8a b1 55 88 ee 90 bf 86 98 c5 68 56 01 34 02 | ea ea cd ee 0d 3a 71 7c d0 06 82 a7 ca 34 05 ec | e1 16 4c 22 f3 b3 ca 01 1c d1 2d c9 10 65 0e d7 | 83 4d bc 53 a1 a2 68 8a 44 da c7 16 6f 1e 28 70 | e8 f3 08 87 27 18 70 75 bc 4e bd 4f 1d 1a 9f 84 | ef 78 e6 04 c6 13 ce e5 f8 3c cb 1e ba 12 8a 0a | 59 36 fd 3c 70 1f 1b ce d5 b3 7d ea 00 09 cd 9d | 29 00 00 24 58 d9 16 9f 6f 84 74 3f e6 2f bd ae | 97 8a 68 2c 39 11 78 2c 3d 3c 5e 7b f6 a4 c9 df | f7 87 68 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 f6 22 5f bf 4c e5 cb 6e 52 c3 e8 | bb 73 1b e3 52 cd b5 da 00 00 00 1c 00 00 40 05 | 55 f2 83 9d d0 ff 8f 70 ef 45 0c 6f 49 6d a9 68 | 5e 51 a7 34 | libevent_free: release ptr-libevent@0x7fb35c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #110 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3a df d4 0d 3f 72 b9 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #110 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #110 | rejected packet: | 3a df d4 0d 3f 72 b9 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #110: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28ab0 | handling event EVENT_RETRANSMIT for parent state #111 | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #111 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #111 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49641.585483; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006079 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #111 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 "road-eastnet-nonat-111" #111: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #111) | db b9 51 1a 0a cf 53 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 96 48 dc 9a 43 6a d5 ae 03 52 b4 84 8e 3e 89 | 00 f6 64 fe 26 5b b6 db 11 e1 9c 06 8a 4f 1d 0d | cd 6f a7 c8 64 23 7a a7 23 6f 45 51 c6 b1 a2 cd | 04 59 b4 88 b4 33 b7 f5 29 c7 d8 52 6d 1c cb a8 | 42 75 af 22 25 ca 35 12 a4 f6 ac 0c 2b 80 3f 01 | bd fa ce f1 3e 58 78 41 9a d7 72 cc 7c 4c b5 a2 | 56 ce 00 40 9d 2a 87 6a d3 b8 b7 fb 45 19 d9 27 | 33 38 86 30 4d 76 55 5a 60 ea 7e 6f 94 b2 e8 37 | d0 79 a6 3c 48 bb 9f d4 de 11 46 70 8b ed 34 0e | 15 56 a1 c3 7c 1c f5 7b 9a 67 eb 7c ed e1 17 20 | 66 f5 ab 00 0b 09 22 9e 86 9e ea d1 22 bb 69 09 | 19 11 1b ae 5d 6f a7 6f aa f4 bc 2d bf a0 df 13 | 3d bb c4 b2 54 23 e0 47 22 8c a9 37 14 2d 77 13 | 46 7b e2 07 7c 12 26 7e 27 76 b7 f9 5b 81 4d b4 | 81 97 8e fa 60 cb 4d fd c3 c9 15 c0 dd 03 c9 a5 | 4e ed a7 b5 aa a5 47 31 bc c5 72 e4 a7 3b 8a 6d | 29 00 00 24 dd ff c8 1b e8 28 de a6 83 fb aa 57 | 7e 6e 8e c5 12 ea 53 ce c6 ab e5 e4 50 89 14 5a | d7 45 05 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 7b fa 07 36 ff 6e 35 97 9c d7 f0 | 58 a3 9d ce 15 df 78 68 00 00 00 1c 00 00 40 05 | 32 ea 3f b0 b0 6d 1e bd 58 89 67 45 00 2c 5a 38 | ea f9 ac 8b | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28ab0 | #111 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db b9 51 1a 0a cf 53 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #111 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #111 | rejected packet: | db b9 51 1a 0a cf 53 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #111: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cbd0 | handling event EVENT_RETRANSMIT for parent state #112 | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #112 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #112 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49641.649781; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009975 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28ab0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #112 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 "road-eastnet-nonat-112" #112: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #112) | 47 d5 03 db 13 27 2f b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 0e 6c 25 08 df e6 da 49 14 54 03 50 04 cf 48 | 95 75 ae 2d bc 03 6f 48 b8 d7 01 38 b0 30 90 fc | ff e3 c7 81 96 6b 61 34 0c 60 d4 12 f5 e2 2d fc | 51 c2 f0 8d 66 50 fb 99 8e e7 b2 7a 6c 96 47 68 | b2 95 cc 13 0e 51 31 7d 67 b6 95 35 7a 36 fb 65 | 99 b0 0f 89 29 13 5d 90 12 37 2d 11 35 2d b1 44 | 94 62 9d e9 25 b3 9d a0 a4 a6 21 f1 2f 1e cd 7c | e1 45 a8 9a 87 d2 53 e3 a2 32 e1 24 cf d4 84 b6 | d5 f2 14 94 09 c7 86 4b f6 5c 13 c3 cd 16 8e 96 | 09 f6 db 84 7c 68 6c 48 a7 94 92 3a 1f dd 75 5e | 2c 36 f1 6f 81 03 42 93 73 6d a8 a1 de b3 ee 78 | 53 dc 84 4e 49 9c c8 3c d2 8e 9e 10 6c e7 28 b0 | 11 a3 fb e6 6e 4d e5 e0 87 56 00 b9 8b bd 7a 34 | c7 01 93 2c df ea 24 e3 c0 b7 3c 4f 9c fd 99 11 | 44 90 bc 5c 8f 0c c6 10 b3 66 24 ea 61 81 fc 7a | 33 5f 5b b7 cd 2f 8e 95 d1 b4 0b d4 4c f2 ce 45 | 29 00 00 24 e0 34 a3 40 45 a9 39 5f c9 a9 a0 f5 | 90 bc 5f 96 21 2e 5a ab 31 ef 27 59 8c 9d b8 53 | c4 51 4a f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 19 b7 b4 22 31 1f 00 af ac cd cc | 10 5d a8 e7 0a 7e 75 3d 00 00 00 1c 00 00 40 05 | 93 2a 52 65 d2 92 1c 7e fa c3 8c df bd 81 85 07 | 8f 9c 4c 85 | libevent_free: release ptr-libevent@0x7fb3400250b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cbd0 | #112 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 d5 03 db 13 27 2f b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #112 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #112 | rejected packet: | 47 d5 03 db 13 27 2f b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #112: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2e150 | handling event EVENT_RETRANSMIT for parent state #113 | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #113 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #113 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49641.719129; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.010421 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cbd0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #113 | libevent_malloc: new ptr-libevent@0x7fb3400250b0 size 128 "road-eastnet-nonat-113" #113: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #113) | 65 aa 2d d8 a6 29 20 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df aa fe 5d 18 fa cf 0f ff 28 95 2b df 41 5e e5 | 93 b1 5d 05 b9 f8 45 e3 a0 1d 39 ec fc 7d ae 4b | 05 3f bf 03 bf 80 a9 6e 8e fd 3b e8 32 58 c8 f7 | c6 df 30 b6 09 5f 2a 57 25 11 cb 3c da a5 01 9d | ba 5a dd a7 bc 6b 95 4a 6d df f0 56 fa 5d b6 d5 | 32 bd cc 28 5e b5 ff 1a d9 af f1 6d a9 3a c6 a5 | ab a2 21 23 63 1f 7a d5 a9 f2 d8 6e 34 2c c0 14 | b5 44 80 cc 01 b8 bc 1d 88 15 f0 56 5b 9e 16 11 | 53 49 7c 46 a4 d6 df 15 cc 76 08 99 30 8d bd 16 | fc 22 5e e2 91 1e 29 90 27 cb 4a a1 bb fb df c0 | e1 57 58 ac 38 1b 6a 91 9c 4e c8 14 95 91 e6 23 | a6 57 8f 86 03 7d ff ac 75 e9 09 5f f5 40 29 9b | 12 ab c4 82 96 27 04 ff 62 2b 29 96 91 b3 9d b0 | 86 8f c7 9d 9e d4 5c a2 76 cf a2 55 cf 18 d5 47 | 6a bc c0 f7 de 25 72 ff 89 ad a0 ee b6 9c 33 78 | 04 18 e5 3b 76 6f 93 07 22 6f ad 6a 13 43 4b d1 | 29 00 00 24 24 d3 7a 96 b8 4b b9 c8 77 6f a9 e8 | 8c 18 33 84 b7 52 88 cd 9d a3 3f f7 dd 42 d5 3a | e4 24 11 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 39 d7 c2 57 ac 0e 5c ea ab f6 c3 | 2b 95 40 5a 3d 34 d1 e0 00 00 00 1c 00 00 40 05 | e1 b8 84 36 a4 5f d1 6d 3f 9f 07 dc 0f 94 99 b2 | ea cc 3a 90 | libevent_free: release ptr-libevent@0x7fb35800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2e150 | #113 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 aa 2d d8 a6 29 20 d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #113 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #113 | rejected packet: | 65 aa 2d d8 a6 29 20 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #113: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae9fc0 | handling event EVENT_RETRANSMIT for parent state #114 | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #114 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #114 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49641.781447; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009013 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2e150 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #114 | libevent_malloc: new ptr-libevent@0x7fb35800cf80 size 128 "road-eastnet-nonat-114" #114: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #114) | d6 76 3e 2a df 8d 49 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 89 bc e4 ca cf 42 9f 8c 3e 0c bd bc ae 4f 3b | d3 c7 ce d3 ca 55 eb 39 04 eb 76 8e a9 75 7d e3 | b6 18 fe 44 5f 1c ef b7 b7 41 cc 4d 34 22 30 65 | 06 59 1e ef 39 63 eb fe 02 26 56 aa 64 57 8d 53 | 7a 80 31 9c 0a f7 30 cf 50 cb a2 17 9f 63 45 27 | 3c d2 e0 b9 54 07 a2 b1 46 40 09 3b 94 40 bf f1 | 40 f9 b6 13 93 c3 4e d6 d8 b1 db 99 2b ea b1 51 | cb eb aa 9a ed ac 6d b8 6b 55 e2 2f 64 52 21 e2 | 9d 13 28 a8 e7 03 1f ba 1a 35 29 e1 bf bc 71 81 | 00 b3 30 d7 67 e8 0d 4c f0 57 7f 78 f9 6a af a6 | f5 69 67 2d 44 65 18 2d d8 cb 15 95 95 67 b6 a2 | 53 6a 9c 3b 84 13 f8 02 23 28 ee d8 85 45 e3 f6 | 5a a4 85 e6 1c 98 88 9c 1f 95 20 64 13 9f 49 1c | 78 c0 c0 ca f6 15 03 7c ad a7 9e 6d 64 5a 3a 90 | 22 4b eb 71 cf 24 e9 b9 6a 4d d7 77 ec 73 7e 9d | b2 6f c8 a4 49 bf 18 63 90 cf af e1 1e da 29 bc | 29 00 00 24 73 ab 08 be 9c 8c 4d 6d 6c 17 9d b7 | 72 a8 6d 05 77 58 95 9d b6 49 34 83 b7 04 21 62 | 34 da 48 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 91 b3 8b e1 5d a7 b1 99 b7 4d e6 | 18 7a 40 70 0a cf e4 42 00 00 00 1c 00 00 40 05 | 2c bf 9c 44 68 90 73 42 ea f8 95 cd ea 90 69 66 | 03 01 a9 72 | libevent_free: release ptr-libevent@0x7fb36404b5a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae9fc0 | #114 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 76 3e 2a df 8d 49 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #114 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #114 | rejected packet: | d6 76 3e 2a df 8d 49 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #114: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23110 | handling event EVENT_RETRANSMIT for parent state #115 | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #115 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #115 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49641.842816; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006067 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae9fc0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #115 | libevent_malloc: new ptr-libevent@0x7fb36404b5a0 size 128 "road-eastnet-nonat-115" #115: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #115) | c4 57 de ea ab 7c 97 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d 60 64 b4 6d 6b ab d1 46 47 bf d9 bb b3 15 d9 | 76 6a d8 89 d3 b0 5a 81 28 ba 1d 93 76 a5 80 bb | 38 99 6f de 11 f7 c8 2c 23 bb 14 6a 9f 0d a9 47 | 32 e4 6d d5 c4 32 60 81 49 22 36 5b 90 09 c7 0c | 27 45 32 0f 98 73 ed a3 58 24 f6 91 48 ba e7 1f | da 48 cc 0b e5 09 56 9d bd e9 fe a4 8f 0e 2b 69 | 4d 35 1f 28 bf 51 97 13 c0 2e 28 0e de c2 67 89 | 74 f0 15 44 d8 28 5b 7f f9 a9 ff b2 03 37 cf 2c | 3b 6e e1 4e 7e c7 1c 07 07 33 f5 e7 ff 50 1f 8d | 31 38 08 fc a1 18 db f4 32 10 6d f3 26 bd 9e d9 | db 50 5b 6d 6b 19 89 41 88 e3 7e 3b 01 55 72 67 | 91 73 3c 48 31 9d dd 55 e1 1b 9a a9 f9 5f 58 30 | 2e b7 6d 0e 83 a7 65 f9 86 ec 70 47 1e 65 85 e1 | e6 c5 21 98 7e 5c d4 94 dd 2a 93 5a 70 ed 80 a7 | 59 4c 40 1d 45 f5 3b 9b ad 67 94 6a 65 cc 62 c5 | 57 fb 85 e6 12 1e d8 43 f4 ef fe f0 cc a4 02 e0 | 29 00 00 24 34 89 d0 cd bb 68 33 bb 66 4c 49 99 | 21 34 57 e7 67 32 62 7f b0 e9 7c 89 a8 87 a7 1b | 14 49 2b 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 7a 1e c7 ed 14 54 ea ac f9 9a 4e | af 78 6e 32 16 f1 84 2f 00 00 00 1c 00 00 40 05 | 1a 60 d9 ab c3 38 58 4e 6c 49 b7 eb b4 e1 91 a6 | 90 ea 24 0f | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23110 | #115 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 57 de ea ab 7c 97 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #115 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #115 | rejected packet: | c4 57 de ea ab 7c 97 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #115: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c00d120 | handling event EVENT_RETRANSMIT for parent state #116 | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #116 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #116 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49641.912147; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009495 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23110 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #116 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 "road-eastnet-nonat-116" #116: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #116) | b2 c1 8f cb f7 6a 1e a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b0 10 14 ae 52 93 c7 02 e8 52 e1 37 d5 de 46 8c | fd 60 c1 85 87 df bb 73 86 74 dd ca 8d 28 84 e8 | ae a4 cc 28 e4 8d 32 74 8d 1a ce d7 d3 d2 af b0 | 17 d9 f0 1f a3 6b 80 67 ac 90 16 e8 bd 63 76 cd | 29 1d 99 79 32 0a f9 72 a3 b1 6c a3 80 e8 98 c7 | 50 db 8b a2 a3 d2 f5 f7 af ea cb e0 92 9e 24 f1 | ee d0 e5 d9 31 06 c1 bd 2c 7e d3 0a 21 44 11 df | a4 42 5a ee bb 8a 79 72 e4 f3 c9 99 7b df 25 70 | 3c 49 19 99 e1 b4 65 cb cf 1f dc af da 2b bd 09 | 11 55 b0 c8 e4 15 8c 50 3c c0 c3 00 8c 8c 4c ab | 69 1b ad 8f b8 1a e0 31 01 be 05 d6 f9 1d 43 66 | f1 fd 89 96 83 b0 fe 81 90 88 96 0a aa b0 30 a0 | 85 c7 97 d5 26 67 92 b8 99 15 c1 d7 75 f8 4b 96 | 28 a4 71 fb e3 bc ab 36 e6 56 13 b6 1e 48 b3 3d | 9c e0 fd 0d 74 f8 ef 54 b8 1f 40 6b e3 af 77 76 | c8 a0 52 42 e3 01 29 91 49 f3 39 82 3e 75 b6 74 | 29 00 00 24 f8 40 4d b3 f4 26 54 f3 cf b0 a0 c8 | 54 6e 9f a9 95 bb 15 87 06 e3 63 86 66 7d 8a 82 | ee 67 c6 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 63 f6 16 ae 7e d5 6c 46 12 68 8c | 69 38 5c 9a 54 a3 19 f3 00 00 00 1c 00 00 40 05 | 9e 9c 34 46 1f 45 a3 36 da 24 a6 33 3a 00 62 20 | 5b e0 e0 ea | libevent_free: release ptr-libevent@0x7fb36c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00d120 | #116 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 c1 8f cb f7 6a 1e a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #116 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #116 | rejected packet: | b2 c1 8f cb f7 6a 1e a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #116: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ecc0 | handling event EVENT_RETRANSMIT for parent state #117 | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #117 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #117 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49641.971428; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008706 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #117 | libevent_malloc: new ptr-libevent@0x7fb36c012840 size 128 "road-eastnet-nonat-117" #117: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #117) | 4a b5 59 cb ed d6 a3 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 62 d1 99 4b 20 24 18 5d d2 31 2a 1c e6 82 aa | d2 1a 74 70 f8 1e f2 71 00 48 0a 80 0d 91 e6 e0 | e0 7b 66 1e 0f a2 c5 f3 2e cc 8d 72 40 de 7d 14 | e0 b7 d4 a2 80 96 97 77 ac ba 2b fb 1f 79 f2 32 | 8b a5 84 65 3d e1 3e 2e 60 82 26 3f 6d cf 4b 43 | 84 0b 96 d0 d5 70 61 64 4c 71 e0 b1 63 e8 0c 82 | 17 82 85 c0 c3 eb d9 cf 4e b8 f4 b1 87 57 e5 c1 | 06 2a d8 41 87 ab aa ec 3f f6 5e ac 9b 45 ab a8 | 0b e4 13 8d 76 0c 8c 2b 1f d4 61 19 ad 16 37 d8 | d0 65 3e 14 53 34 26 1a a6 5e 31 57 79 20 50 43 | 71 29 f3 4a 86 68 0e 08 74 59 1e 0f 6e 37 0c 10 | b2 e1 5f 52 67 c2 35 e3 ff 31 9d c5 bb 7f 45 96 | 61 58 38 40 0e b5 86 40 8f 24 ab 5a 52 cc 83 a1 | 23 61 7d 29 78 a8 96 57 13 15 75 48 5f 5a 5b 21 | 7b dd 4e 50 1d 23 67 01 84 5f f8 e7 69 4f 16 1a | 7e b5 9f 38 da 45 67 22 75 50 ab b6 62 cc cb 76 | 29 00 00 24 c3 7a 28 6c 12 59 4b e7 9f 08 e5 89 | 61 e9 dd c1 64 c5 cd 33 70 a1 b8 fb a5 4b b4 8c | 0b 78 ad a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 90 26 e7 b8 63 3c dc 5c 03 43 0c | 57 b3 5f a9 02 48 0a b5 00 00 00 1c 00 00 40 05 | 75 50 aa 52 d7 4b 1d bd 0c f6 2a 37 d5 af e8 8d | 12 a0 66 45 | libevent_free: release ptr-libevent@0x7fb37c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ecc0 | #117 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a b5 59 cb ed d6 a3 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #117 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #117 | rejected packet: | 4a b5 59 cb ed d6 a3 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #117: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.056 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_RETRANSMIT for parent state #118 | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #118 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #118 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49642.031739; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007994 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ecc0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #118 | libevent_malloc: new ptr-libevent@0x7fb37c0300e0 size 128 "road-eastnet-nonat-118" #118: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #118) | 8e a7 a4 7e e9 0a bc a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a ec c5 01 c5 e9 b5 94 ac 43 67 db 08 47 bd 0c | 54 49 81 74 3a 3b f9 51 2c 6b 48 98 c1 d5 7c ee | 4b 95 1c 5e 71 e6 0b 08 a0 85 de c0 1d ef b9 d0 | 5c f8 32 2b 5d f8 44 47 b6 dc c5 4b 50 10 f9 77 | 99 80 83 bc 5c bf 6a 79 a5 41 39 97 c6 b0 17 4c | 84 d1 fa 16 7a 7a 3e e5 51 2d fc 5d b0 66 e1 6f | 66 c6 ed f3 a4 54 56 06 ac 5d ee b2 4b 4a 38 5f | aa 09 29 91 e5 8c 9b 64 60 8e 7c f6 86 7a 07 43 | f1 93 d1 26 4a 28 da b7 0c a1 1a 0c 4c d6 c5 1f | ee f5 92 b2 e4 15 93 35 4c 07 88 be ec 21 4e 23 | f9 ed 56 db b0 43 b1 c7 7d 57 a1 20 bb 88 d2 9a | 23 9e be ef e2 0d b6 dc 67 12 32 69 0b ef 17 5f | 45 8b bf 08 ff c1 84 fb d6 41 58 81 ba c4 68 e8 | 6d 5c 50 c4 fa 14 2d 1e b6 d3 3f da 53 ee 59 40 | e0 c2 e3 5e 46 f4 96 f5 35 c7 87 50 c6 81 32 4e | 30 f8 e6 fa a0 f5 a3 88 f0 51 68 02 71 eb f4 fa | 29 00 00 24 fc fa 6f 0b ed d7 fd 9b f1 eb 70 56 | 1f a0 0f 98 c6 28 ab da a8 c2 09 53 33 ea a7 33 | 5c 74 50 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e 87 94 32 ac f3 4e 0f e0 49 b5 2d | ec 68 6c 45 41 83 dc 40 00 00 00 1c 00 00 40 05 | e8 e9 7b b7 56 9d 8b dd 59 77 e6 95 c2 ea 88 7c | d5 64 a3 dc | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | #118 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e a7 a4 7e e9 0a bc a4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #118 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #118 | rejected packet: | 8e a7 a4 7e e9 0a bc a4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #118: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0703 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afd000 | handling event EVENT_RETRANSMIT for parent state #119 | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #119 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #119 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49642.091125; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006798 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #119 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 "road-eastnet-nonat-119" #119: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #119) | ec af 1e 58 4f bc 16 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee 25 46 13 3c ef fe 01 ba 63 b1 50 ca a7 dd f5 | 7a b0 49 43 35 e3 74 57 d0 52 bc 3a b2 ee 6b 2d | 57 80 2f df 71 ea 94 b3 0a 0c 7b 41 50 c2 f6 7a | 6e 96 5b 3d 0d 51 9a 0b a0 fa d0 8d d8 98 f0 45 | d5 fa eb 0a f5 ea 33 8d ee 1d 3f cb 09 35 dc f7 | 0d a7 89 25 f9 a6 f9 a3 0f 9a 3d b0 bb 98 db 2a | 8f f4 ad 7f 6a ae b3 bd df 23 e8 8d 52 72 79 9f | 3d 34 85 f2 e2 b4 d7 cc 39 ee a0 dc 64 4f fa 2a | a9 30 c6 c2 7a 7a 1d cd 26 c0 0f 55 58 ed 9d 22 | c6 a1 9c 81 01 bd 16 3d 36 47 70 a1 46 0d 07 ca | 5c 2f 9d 3c 24 d8 e7 19 57 44 18 a0 58 ed b0 c8 | 65 f2 98 6e 64 04 01 87 4d c3 6e 78 76 c5 fa ee | ff 60 94 9e 6a fc 5b 5e 1a 15 3a a6 4d fe ba 28 | 39 70 2d 49 9e b7 11 89 3d 89 a8 26 59 f3 51 ef | 05 36 27 99 84 62 16 13 24 49 d2 7d b9 18 a2 21 | 0f 0d 2a 9a 79 02 d0 e1 a1 af ee 7c 84 e5 76 9a | 29 00 00 24 93 ff 34 01 41 de 6e 58 b7 82 d5 c2 | 8a 60 ef 17 fc 48 d2 4e 23 80 6e 54 cf 7a 62 03 | 64 73 a8 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b 43 1b c4 4b b2 17 2e 38 4e 57 6d | 6b 77 1d 82 1a c2 9c 87 00 00 00 1c 00 00 40 05 | f7 09 55 f2 00 b0 ce 9f d1 9c 54 d7 51 50 ae 6b | e8 b4 0e d9 | libevent_free: release ptr-libevent@0x7fb36c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afd000 | #119 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec af 1e 58 4f bc 16 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #119 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #119 | rejected packet: | ec af 1e 58 4f bc 16 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #119: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd80 | handling event EVENT_RETRANSMIT for parent state #120 | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #120 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #120 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49642.159485; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008047 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afd000 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #120 | libevent_malloc: new ptr-libevent@0x7fb36c0407f0 size 128 "road-eastnet-nonat-120" #120: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #120) | 87 fa a7 32 05 23 14 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec 6c 11 66 a6 95 d9 e6 e2 88 b9 98 2a 60 c1 38 | c4 e7 6d c7 8d 08 5f c7 b2 af 28 df 28 55 74 6b | 75 22 9e ab 67 eb 95 72 f6 3e 95 b3 15 85 4f d6 | c1 c3 2d 9e 07 29 16 41 13 5e bb cf c0 e6 4f 24 | 10 cc 57 fd 9c ba 63 ce ec 86 10 c7 d4 7c 34 a8 | a5 5b fd 1f 33 3b a2 f8 03 46 9a 66 74 53 5d 27 | bd d8 93 4e 14 8b 45 9a 6d ce b3 cb 29 f0 cc 6c | 0a 42 f4 3b 31 46 fc ae db a9 72 48 29 6a 06 1a | 3f 35 fb 97 be 23 c9 c4 df 59 9b d7 24 09 d8 73 | f7 9d 98 e5 b5 21 68 b6 e2 c9 13 2b 11 7a 73 1b | e9 35 93 72 82 45 b9 27 a7 9d a4 9d 09 5e 20 78 | 29 0e a5 bd 44 31 dd 75 00 a1 c2 9f 09 4f 24 eb | 16 42 da bf 3a 12 d4 84 33 67 7f 85 66 00 36 74 | 79 21 73 94 9b df b2 a9 01 30 1b db 75 7a 3d 46 | 6c 6c eb ca 16 ae 1a 85 9f eb e5 ef 46 e7 91 51 | ee 18 48 f1 20 6b 2b c6 77 fb 41 ba bd 6b 56 4e | 29 00 00 24 6f c3 ef a5 ff 17 51 3e dd e4 5e c3 | e4 15 2b 4d c5 b5 58 85 08 f4 21 f4 d7 43 b1 43 | 4c 64 51 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 47 24 d0 22 75 93 6e dd 7d f7 25 | 7b 0d 80 0a 15 3a a3 09 00 00 00 1c 00 00 40 05 | 8f c4 23 24 1b 0a 54 8e c8 2f b2 b8 ec 80 e9 f3 | ca 99 ed fd | libevent_free: release ptr-libevent@0x7fb35c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd80 | #120 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 fa a7 32 05 23 14 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #120 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #120 | rejected packet: | 87 fa a7 32 05 23 14 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #120: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0477 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4ebd0 | handling event EVENT_RETRANSMIT for parent state #121 | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #121 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #121 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49642.23278; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.013979 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #121 | libevent_malloc: new ptr-libevent@0x7fb35c02a950 size 128 "road-eastnet-nonat-121" #121: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #121) | 1a c4 23 3a 2f fb 8d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 72 b0 fb 70 4e c0 8d 7d 37 18 c1 ce 4c 8b 63 | 3b ed bd b3 7c e2 68 d0 e4 78 d3 ff 67 2f 87 6b | 58 6e aa 28 e2 71 48 9f 9e 55 8d d7 f0 fa a8 2d | cf d6 ae d1 2d 00 58 7f 1d 28 13 c8 1c b2 dd 2d | 0b 8c e4 ed 5c aa b6 84 75 0e 0c f4 87 20 ea a7 | 6f 81 08 6f ca 1d ea a5 cc 8b 1d 07 3a 98 ee 34 | 92 f7 0d 60 c7 27 69 9a 54 db 7b c6 0a ed 9e 6e | 48 c9 2d 78 78 eb 23 a8 d4 08 fd 81 af 22 ee 61 | 94 de e2 4a 3e 31 5e 98 b3 8e 80 72 e5 9a 23 e5 | 36 5f 19 09 16 90 75 46 fe 81 ca 01 97 f5 9d b9 | ee 86 b8 f1 4d 40 49 77 bf ea d6 8d cf e1 3f ed | ea d1 6f a1 94 f1 b6 1e ce cf 58 8f 34 28 d9 e9 | 91 30 27 07 3d a8 1a 9e 1f 56 eb 39 c7 99 10 18 | f7 a0 93 02 25 a4 35 d3 3b 85 c6 a5 d4 ee 05 5a | 0a 2e cd 8b 56 c3 43 2f ad b6 de d6 76 50 8d 8d | 31 49 b6 ba ff a2 3a 1a 19 8e 58 36 38 db d0 39 | 29 00 00 24 ce 58 3c f3 71 03 62 3b f7 b4 bf 47 | 86 b0 47 20 d2 a4 5f 23 42 6a 81 bd c0 a6 20 e9 | 9a 46 27 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 ab b4 fc 6a e4 2a a5 95 ca 3f ba | 4a 7b 1d be 72 ff 8c 93 00 00 00 1c 00 00 40 05 | 7e 13 e9 d3 7d bc 8a 17 e1 3e 93 a5 d0 ee 9b cd | 6e 9a 4b 6b | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | #121 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a c4 23 3a 2f fb 8d 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #121 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #121 | rejected packet: | 1a c4 23 3a 2f fb 8d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #121: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8cc0 | handling event EVENT_RETRANSMIT for parent state #122 | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #122 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #122 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49642.288091; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006963 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #122 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 "road-eastnet-nonat-122" #122: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #122) | 14 66 d6 bd ae 2b be a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b5 a1 e9 e4 be 1e 51 8a 55 59 79 73 21 36 56 e2 | 77 7a 08 bd 06 ab d4 92 e5 dc ae f7 64 76 23 ff | f4 fc 6d 61 73 31 e1 d2 4f df c1 6b b7 79 5a 65 | a0 cc f6 e0 aa a2 1e 56 c9 61 f0 64 10 6e 71 e4 | de d3 38 6f 01 f0 ef d1 f6 56 f5 aa fb d5 dc 96 | f9 0b be 72 ef 23 60 6a 39 4c 10 fa 40 46 a5 4f | 9d 4e 1b 63 94 dd bb 2e 79 61 b0 23 01 f5 74 e7 | c5 3f 64 7f 13 8b 72 4d bd da 91 fc 61 61 ef f0 | e7 bf ad 46 59 ed ad 05 2c f7 04 21 03 71 4c c7 | 7f 1d ad ca ef 53 b4 42 e8 7b 9b 3d 7a 70 68 63 | f6 3b fc 00 63 e2 d1 50 20 42 35 cc 18 3b ef e3 | 5c 49 2e b5 43 b5 11 94 a2 42 32 89 ab 4a 75 44 | 28 03 13 02 78 a8 b9 d4 86 df f7 69 0e 5b f1 03 | 59 e8 3f 87 be c1 4f 01 d7 b7 0b 01 72 03 2c 0c | c5 51 b7 34 27 69 20 c2 1e 3c 1a 82 2c 40 e7 31 | 94 67 b7 79 04 1c c9 e0 fd 58 15 b5 e2 95 d3 0d | 29 00 00 24 7c 10 f9 fd 3b aa 03 0a 4e 70 88 76 | 8d 21 8d 7a 77 a3 25 87 bf 2c 07 91 c2 03 c6 70 | 6f 0a b2 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 62 3b d9 22 f1 42 3b 85 55 78 b5 | c8 14 63 8d 0b 44 d6 d6 00 00 00 1c 00 00 40 05 | 1b ba f6 9b c4 53 50 8e 11 46 cb 49 4f 65 db eb | 69 7d d4 7c | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8cc0 | #122 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 66 d6 bd ae 2b be a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #122 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #122 | rejected packet: | 14 66 d6 bd ae 2b be a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #122: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0456 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #123 | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #123 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #123 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49642.350396; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006678 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8cc0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #123 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 "road-eastnet-nonat-123" #123: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #123) | 6c 7d b3 a1 76 62 7d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 56 4f 8e 37 33 e9 f0 f8 7f b8 e1 b3 f9 a8 fa | b7 62 0a da df 31 2b 33 3e c3 84 d4 70 c9 16 31 | 80 ac 1c 22 4c fb 0e d9 48 14 9a 6c 58 8b b2 b1 | ab d6 de 52 1b e7 85 36 94 02 66 e4 ea 4b 3e bb | cb 9a 60 cd b2 64 9c 54 4c 58 05 94 9a 41 90 e5 | 3d f7 e6 13 47 7c 5c ae 9e ed 2f 47 46 7c b6 ec | 64 99 4c 90 1f 2b 27 83 ee 7d 0c 95 53 61 78 0e | fc 0d ee f9 69 83 ad f2 29 e6 77 fd 16 29 ec c4 | 55 89 e7 07 dc 10 66 d5 0f fd 31 a1 54 12 3e c7 | b1 16 f6 98 63 b4 d5 90 8d e3 ff 44 b5 31 8e 32 | c1 26 fd ff 42 9b c5 01 50 0b be e0 4e 8b d1 4e | 1e cc 49 12 14 c5 7d a4 df 96 fd 82 a1 fa 2c 84 | 20 3e 8f a2 9b 0b 00 ca 45 cd 8b a5 8a 1e 6a fa | 02 7f 67 67 3a 15 da 2b 32 2d 18 bd 05 df 1f 49 | 13 dc cd f2 4e 24 ac 3e c3 6e b4 5b 9b c7 3e 7b | f3 b3 b6 54 f0 4f 36 43 d8 39 48 ea ae 56 03 eb | 29 00 00 24 9d 71 0d 4c e1 28 99 bb a1 c2 a8 97 | 82 df 6e a7 59 50 e5 e7 83 d9 52 2c 3a b5 f8 0a | ab 34 6b 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd f0 b7 a5 ab c1 1e 9f 00 5e 1f f4 | 01 11 d6 41 8c c8 44 db 00 00 00 1c 00 00 40 05 | 74 ad b7 af a3 7a 6a 08 ff e9 f2 f1 74 4e c9 b2 | f6 ce db 1e | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #123 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 7d b3 a1 76 62 7d ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #123 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #123 | rejected packet: | 6c 7d b3 a1 76 62 7d ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #123: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab0dc0 | handling event EVENT_RETRANSMIT for parent state #124 | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #124 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #124 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49642.415707; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006063 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #124 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 "road-eastnet-nonat-124" #124: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #124) | 8e 52 ee 7a 33 75 3f 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 57 9a 04 43 62 52 e5 fc b5 c2 fe cc ad 34 2f | 82 f3 00 f6 ee 21 08 77 c9 b1 bb 69 fe 78 0f 21 | bf 36 0c 3c d2 28 d9 56 83 ae 1a 8d 60 fc ba 85 | 54 56 0c 31 1b 34 8f 99 3a cf de 75 87 a0 b6 a4 | d8 62 39 46 a5 f4 50 6b 49 13 47 6a b8 07 fd 9b | a0 24 9b 8e 36 86 71 8d 3a 86 06 ec 43 9f d0 fa | fb 5f d7 26 3c ad 44 31 62 f2 eb 50 ab 84 4b c8 | 92 d2 94 d1 cf 28 72 53 f0 98 5e 24 79 26 3e b6 | 8a 49 4d a1 69 34 ff 0b 63 f0 6a 98 fb 9b 9e fc | 07 2e cd bb 5b c5 49 f8 a9 bd 52 eb e2 d4 29 6f | e4 1e 81 a0 d3 65 f5 f3 07 20 20 0d 39 fe 60 11 | 31 d5 df 57 2f d9 ac 24 3b 95 8a 93 3c 37 3c fe | 00 f5 ae e3 8b 73 07 19 bf 7a 74 b9 19 54 31 a8 | c6 05 b4 3c c9 b4 f2 d1 4f 8d c4 e7 6c 6b d7 8c | a7 72 14 8c da 9f 42 94 91 f0 27 3c ef a5 63 c0 | 4b e5 9c 5d a2 4a 47 0f 02 ed 81 c6 7a 36 ca c0 | 29 00 00 24 35 37 ad 9e 25 61 50 57 d7 60 4e 9e | 7c 24 2e 8d b9 f6 52 07 e6 cf b3 cb 88 5a c5 03 | c4 c6 aa c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 73 0e 7d 3a 1d a8 f9 ef 84 7c a6 | 0b 05 4a f4 88 18 b0 42 00 00 00 1c 00 00 40 05 | 95 90 15 33 51 5d ad 36 64 2a 62 55 cb ba 4d 6f | 9b 17 ee 8d | libevent_free: release ptr-libevent@0x7fb380043300 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab0dc0 | #124 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 52 ee 7a 33 75 3f 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #124 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #124 | rejected packet: | 8e 52 ee 7a 33 75 3f 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #124: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4bfd0 | handling event EVENT_RETRANSMIT for parent state #125 | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #125 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #125 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49642.482003; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005945 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab0dc0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #125 | libevent_malloc: new ptr-libevent@0x7fb380043300 size 128 "road-eastnet-nonat-125" #125: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #125) | f8 42 71 02 91 3f e5 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 9e 73 35 93 13 e2 cc 9b bb 37 d3 75 99 15 b9 | c8 4a ce 55 d3 69 e2 90 ce b4 49 6a 8b 41 15 d7 | f2 46 e0 27 62 0c f2 50 c4 fb 7a 1e 5f c1 57 37 | ab d6 7e 39 28 cf 50 b1 15 3d a6 21 69 94 78 9b | 54 78 01 d1 17 2e a1 fd 93 52 02 9b 3c fa 9a 7e | f8 6f 1b 35 4d b8 9a ab 6d e7 64 f6 f2 1a 64 ed | d4 92 58 2f 44 f7 44 27 44 49 1f 1e 22 3d 31 b1 | 50 2c 4d bf f2 3d 61 05 62 ba 25 68 46 81 35 68 | ee 83 cc 8e 2f 04 b6 7e f4 22 67 88 a2 a7 7a f7 | d0 39 1f 83 7d bc f9 79 5c 9d a8 05 2d 41 b5 ef | cc 86 a3 2b c2 79 2a 6d ea bc cb e6 b2 db 61 3a | 30 32 b0 ff 93 a0 20 c1 58 b9 6f 0c 98 fb c0 64 | d2 03 d7 d7 ac 87 bc 66 28 b7 cc 94 87 ea 24 29 | 58 cf 8f 26 39 81 cd e2 dc 0f e9 13 b2 ad b9 3b | 9a e1 c6 4a a2 fb 0d d5 e3 d1 b9 df 52 b9 c6 69 | 37 c0 e4 dc a2 a0 32 29 a3 ce 29 ec cc 5f 70 82 | 29 00 00 24 10 12 73 da 9a 48 c8 49 81 7a 15 0b | 6c a0 98 5f 53 25 0d 7d 05 70 86 c7 7b b0 fa 34 | 5d 40 8d 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 88 74 d5 c4 71 1e 67 79 c5 82 86 | 3b ab 9f 01 a1 7f ec b6 00 00 00 1c 00 00 40 05 | cc 1e cf e5 ba 96 b4 e9 50 32 59 97 59 23 89 39 | 4f 1c 94 28 | libevent_free: release ptr-libevent@0x7fb3700251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4bfd0 | #125 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 42 71 02 91 3f e5 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #125 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #125 | rejected packet: | f8 42 71 02 91 3f e5 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #125: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0691 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a94540 | handling event EVENT_RETRANSMIT for parent state #126 | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #126 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #126 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49642.558418; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006084 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4bfd0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #126 | libevent_malloc: new ptr-libevent@0x7fb3700251c0 size 128 "road-eastnet-nonat-126" #126: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #126) | e8 37 9e 74 e5 40 14 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 2e 1b 05 80 5b 31 08 d1 66 2e 5c f6 e3 82 b6 | cf 5f b9 6a dd 55 f8 75 d5 3d b8 5c bd 4f c2 50 | 0a c1 a5 ba ac d3 ed a9 a2 26 e9 cf 5d c3 e4 66 | fe 0f 85 c2 a3 49 2f d8 4a 79 55 9a fa 0f f5 79 | a1 74 22 f0 7e 0f 09 7b 62 ab a2 9e b4 ea 39 68 | 42 b2 f9 25 9e 6d 73 5b 0f 09 1e ea 93 29 57 3e | 0b 28 34 22 62 d9 38 bd 99 bc 2b d5 1f 39 74 2e | a0 e4 e1 6b 64 87 fc 4f 05 cf 11 87 31 49 19 0e | 81 e6 fe 59 5e 93 b2 b8 96 16 02 eb 5c 73 68 d5 | 8f 57 c4 c3 f1 4b 35 e7 45 9d 6f ab 95 16 38 da | 48 f9 98 9a 6a b3 e3 05 7e d3 b1 16 a3 ba 0c e1 | 94 2d b8 d2 c3 17 d4 a2 cf ba 7e e1 17 95 db f9 | 30 a3 18 b6 15 c5 b0 4b 3c 79 61 0d 1e 89 51 db | 9f 34 0b 87 9c ce 8f 37 05 a4 88 d5 17 64 46 6f | 94 21 dd 40 17 99 04 39 5f 44 53 61 87 2c 68 27 | 48 25 14 cc 6b a9 f6 c2 49 c7 4e ae 4c 5d 8d 5b | 29 00 00 24 d1 b1 6b 78 78 5e 9b dd d4 c3 b9 87 | 6c a1 e5 10 d6 78 32 5b 72 67 12 c8 56 ea b2 20 | 83 0f e6 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 48 05 b5 88 11 05 1e fc 96 b7 8b | c4 84 87 55 48 6d 71 7e 00 00 00 1c 00 00 40 05 | a7 78 89 b5 72 dc 59 97 b9 1b 86 02 9b 2c 28 d0 | 8e b7 7c 05 | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94540 | #126 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 37 9e 74 e5 40 14 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #126 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #126 | rejected packet: | e8 37 9e 74 e5 40 14 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #126: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7fec0 | handling event EVENT_RETRANSMIT for parent state #127 | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #127 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #127 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49642.653752; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009189 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94540 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #127 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 "road-eastnet-nonat-127" #127: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #127) | 63 d9 7e 94 07 33 4b 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 29 5b 4a 46 df 60 33 0f 95 de e0 db c8 23 3c 72 | 78 4a 11 2d af 6a 95 71 57 bb 1d b2 0d c1 6e 56 | 18 59 e0 13 b5 5d 90 db b2 9a 12 87 33 39 67 e9 | 2a 2f bf ff 22 ca 7b ca ba cd 4e 56 00 bb 9c b4 | 81 b8 dd 6f 82 ec c7 49 d2 fc 91 38 84 1c a6 e9 | d6 e7 21 dd e8 11 d8 38 94 4d 8d 43 29 97 aa c4 | 81 24 9f fc d5 c9 48 0f a7 fe 34 f9 6d 30 3e 1f | 7a 4f f5 5e d9 cc da 01 80 42 b1 dc 13 04 fb 2f | cb ae 40 53 b9 7a ac 75 1a e1 0f 4b 6c 39 b0 ff | 2b d7 8e 64 87 22 57 2b a9 3e db 52 7f 0f 13 61 | 69 1f 61 e7 d0 1e 23 3d f6 9d 28 2b 3f e5 f0 23 | 95 70 12 d6 55 37 d1 5b 40 5e db 9b 46 bb 6c 24 | 88 d7 92 17 91 7b 88 03 03 b9 b9 93 f8 4d f8 75 | f3 71 3b 2a a2 b6 bc ae e3 8d ee 63 ed ee d1 97 | a9 a0 39 37 70 8d 13 eb 74 48 45 78 0b 87 f6 b1 | 15 7d 71 1f 58 45 48 e4 7a 5a b6 44 5f 0b 02 01 | 29 00 00 24 18 52 6f 35 05 34 eb 05 2a 3b d4 f4 | de e8 63 2a a6 7a 78 01 4b 37 13 8c b7 e1 00 ae | 6b 38 e3 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 57 41 80 41 67 da fb a0 6b fa cf | 8b d9 9a b2 68 5d 7b 8a 00 00 00 1c 00 00 40 05 | f9 e3 24 ce 79 a6 67 62 c8 57 cc ee 7e 1e 81 c5 | 41 7c 30 2d | libevent_free: release ptr-libevent@0x7fb34402a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7fec0 | #127 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 d9 7e 94 07 33 4b 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #127 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #127 | rejected packet: | 63 d9 7e 94 07 33 4b 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #127: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a60690 | handling event EVENT_RETRANSMIT for parent state #128 | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #128 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #128 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49642.74409; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007252 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7fec0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #128 | libevent_malloc: new ptr-libevent@0x7fb34402a950 size 128 "road-eastnet-nonat-128" #128: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #128) | 77 d1 59 6d 55 cb 18 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 01 e0 bd 82 fe e0 91 d9 ed 2a 7b 41 58 aa d2 | c1 83 b5 d4 08 da f3 c7 61 8a cf 68 fe 9a 21 e3 | 57 03 c4 31 d0 d0 ec 56 cc 27 d9 52 cc f2 63 0f | a0 ad 50 12 a9 19 98 c4 cb 8f 93 9b 57 4e ae 53 | 05 9f f7 4f 18 99 38 38 06 c2 82 4a ed ef 9d cc | 7b 44 9f 1c 19 10 74 71 d4 89 98 82 e7 d0 72 33 | aa 5f 8b bd da a0 8b 0a 73 9d 51 cb d2 a3 14 69 | d1 4b 0c 71 9d 71 26 5d bf 23 7a 67 5d 15 2b a2 | ce b7 8c 37 a6 d1 63 b0 6b dc f1 b5 b5 72 45 86 | c8 59 1a 35 a1 54 36 81 14 ea b5 34 cc 86 95 36 | de 73 da 51 28 93 ec 98 2d 7a d9 01 e1 1c 11 2d | 35 8e 59 23 0d de 42 1b 00 c8 28 40 ea c4 bc 1a | 0b 22 97 22 23 59 28 f2 30 da 60 85 07 fb be 9a | 26 22 87 03 aa 66 5a 47 26 21 89 bb a9 0e 6a fe | 60 1c 6c 90 e2 96 28 ae 41 e9 23 65 8c f4 23 57 | 72 00 10 88 06 ca 67 04 cf 4b c7 04 50 60 fe 2f | 29 00 00 24 3b ae 04 a3 29 53 44 16 26 36 89 01 | ad 8c c7 bd 38 5d c9 f9 a5 cd 29 aa 82 21 0f 5e | 4f 91 67 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 73 cd 7c c3 ca 92 54 ff 7d 3a 5c | 01 84 d2 b8 f1 a4 c9 bd 00 00 00 1c 00 00 40 05 | ec 18 dc 66 2d cf 71 2e 85 c0 4a 75 63 a1 b7 19 | b3 41 97 a0 | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a60690 | #128 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 d1 59 6d 55 cb 18 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #128 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #128 | rejected packet: | 77 d1 59 6d 55 cb 18 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #128: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0591 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae4880 | handling event EVENT_RETRANSMIT for parent state #129 | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #129 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #129 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49642.828629; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008729 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a60690 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #129 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 "road-eastnet-nonat-129" #129: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #129) | 72 fb d4 3a 3d 31 ef 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 72 cd 05 8b 1a e1 a8 66 68 a3 88 d4 37 ab 29 | 8d ca b6 b0 86 38 49 65 ce de c8 b0 39 b5 e5 f9 | 49 66 a0 ac 83 68 f5 08 38 44 61 fc b4 c4 e3 93 | 86 b2 c8 75 e1 f1 8d 43 35 de 04 cc bd e4 ef a7 | 8b 7d df 6d 22 63 24 bb ce 8f 77 d1 43 ca 6b c6 | 70 cf 4e 81 02 44 0d 39 85 28 ca ae 69 3d 8b 1d | 8e 2a f9 28 37 54 47 1b 7f 1e 6c c3 e7 ca 7d c5 | 5d eb 2d b5 ee 04 65 71 a3 9b 69 bf 7f 5f e0 e8 | b1 ac e6 e0 77 7c 27 c0 f7 96 26 05 ab 95 ca fd | fa ef 5c 22 dc 42 3f 47 3c 21 7c b3 45 c2 0f 2d | 47 18 59 0f e9 05 83 ad b3 18 86 6e 4c 0f 6a 6f | a2 bf 54 51 83 2a 64 42 06 32 16 00 c7 cc 1b e9 | 3e b9 e5 cf 6c 0f 2e 6b fd eb c0 0a 44 95 18 9e | 2c d3 00 4b bf 67 5f 7a f5 b4 f7 f7 d7 fd a9 64 | 98 77 b8 cc 18 a8 1d 3e 8f 95 27 46 f6 67 44 7b | 96 ba b1 ae ad ee 56 93 ac c5 ad 91 dc 2a d2 ba | 29 00 00 24 64 51 a8 77 1e c3 b2 0e 1e 7b 14 6a | 5f 64 3b ca 18 8a 91 d8 b8 bf ce 82 b9 6f e1 5d | aa 66 20 12 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f cd a9 5a 90 93 b1 13 f3 88 1c ea | 0f f5 0f 31 39 58 6f be 00 00 00 1c 00 00 40 05 | 0e bb c8 26 22 69 20 e6 e2 bf a8 b0 a2 3b 98 e4 | e2 fb 7b 71 | libevent_free: release ptr-libevent@0x7fb3700407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae4880 | #129 spent 0.705 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 fb d4 3a 3d 31 ef 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #129 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #129 | rejected packet: | 72 fb d4 3a 3d 31 ef 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #129: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.289 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acc140 | handling event EVENT_RETRANSMIT for parent state #130 | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #130 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #130 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49642.897763; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006109 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae4880 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #130 | libevent_malloc: new ptr-libevent@0x7fb3700407f0 size 128 "road-eastnet-nonat-130" #130: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #130) | 85 43 6a ad 59 7d ce ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 ae b5 ed fb fd 70 00 13 8d 64 ee 46 d1 86 03 | 85 09 b4 b0 21 e1 75 08 18 f5 01 a5 ce d9 28 32 | 42 84 d9 a2 5d 29 4b 02 ec 24 a8 1c 76 d6 11 b3 | b7 ca cc 7d bb 8a 73 62 20 57 c8 ee 7d 78 9e 1d | 7a d7 f6 f5 3d b0 f3 26 b5 f8 7e 6c 34 29 9d e1 | 66 87 a7 94 04 46 39 e6 b7 02 1f 92 b6 19 a4 2b | 93 1f ea 2c 8d 99 b7 50 6f cd f0 d6 4b e1 d1 c9 | 7e 98 1d 25 8f 0a 2c a3 9a 8f 46 07 29 ef b1 91 | 6c b5 e6 a3 11 c5 c9 c8 5f a8 7f 93 e8 c3 28 29 | 1d 87 06 30 a9 b3 18 af 13 99 e2 ea 6d ca d3 37 | f0 97 8e c5 32 05 cc 70 9c 35 a3 ab 7d bb 03 4c | 6f 27 f2 98 7e 64 26 7d a4 db 20 0f 0c 9d fa ef | 62 00 52 b0 8e 30 a4 8a e8 bb 41 07 76 b9 71 f2 | 63 f8 6e da 4f 74 79 ae c9 5c 70 e4 82 06 94 fd | 62 5b ee db c2 84 ae ea bf 8a 91 a6 ef 57 d0 e7 | d1 ef 3e 19 e8 2e 02 37 b6 05 eb 7c 5d f3 b5 d0 | 29 00 00 24 6c 1f 45 88 1e 42 31 9a b9 27 19 26 | 95 8c 4f c4 41 99 09 32 1c bf f6 27 de 6a fb 55 | 00 73 7a e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 41 0f ce 80 1a 0e 57 d0 34 7b d4 | 5a 51 a5 89 80 d3 8f c9 00 00 00 1c 00 00 40 05 | 7f 09 ba 77 a9 79 98 e7 5b 47 dc 5e 0f 55 ef 6e | 76 2d 29 18 | libevent_free: release ptr-libevent@0x7fb3440300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acc140 | #130 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 43 6a ad 59 7d ce ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #130 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #130 | rejected packet: | 85 43 6a ad 59 7d ce ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #130: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0532 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a903c0 | handling event EVENT_RETRANSMIT for parent state #131 | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #131 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #131 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49642.969142; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007726 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acc140 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #131 | libevent_malloc: new ptr-libevent@0x7fb3440300e0 size 128 "road-eastnet-nonat-131" #131: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #131) | ad 34 7c 82 56 8e 42 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 46 e3 f8 a7 ca 79 f1 93 d8 0a 34 f9 91 ea 90 | 77 1f 83 03 4d 56 b1 a2 80 fd 5f 11 9a a9 0e 07 | 36 d2 ed 03 17 79 a3 f7 12 9f 05 ea 25 52 aa 39 | 69 97 15 3f 13 ff 62 78 88 a8 12 45 6d 5a 25 bd | 48 89 e9 ef 1f ad 28 87 00 42 ce a4 5f 7b 92 dc | 5d 1c f0 bb 25 31 dd e0 95 17 e2 9c e6 0b 50 26 | d7 14 f3 fe 1e d8 81 cc 32 fc 47 d4 65 1e 3b 75 | 32 54 1f 31 95 11 57 b2 4c 02 a6 33 ce 14 e9 e2 | e8 05 1b 1c cb 66 89 aa 6f 57 54 90 f2 c1 cf bd | a5 b3 7a c8 ef 67 d8 5e 26 3c 19 61 97 89 69 83 | 4b df 7e 44 0f 87 25 bc 6c 4f d8 49 5f 35 7f 1f | 6e 25 45 69 17 ee 43 65 f2 ee f7 63 5d 98 79 9e | fc c9 a2 e1 68 04 58 49 4b 9f c5 76 64 08 49 29 | 17 3a 17 1d 87 31 e4 d7 77 de 85 c2 0a d4 26 0f | 9f f4 0b fc 3f 26 bf f9 03 95 99 d3 57 10 6f ed | 92 8e 36 88 87 df d0 52 c8 ab 1d e3 6f cc ae 49 | 29 00 00 24 3c 10 ae 50 61 d8 53 b3 d3 e2 21 42 | 85 3a 07 db 01 3a f5 3e 94 0e a7 09 dd b2 ae 2b | e1 07 91 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 36 c8 4a f5 a5 90 83 e4 ec b2 3e | 44 38 46 9b 6e 4b f9 11 00 00 00 1c 00 00 40 05 | 1e 37 ad 88 e1 0a 42 8f 3f c7 b2 8c f4 b1 3f 27 | c4 6f 80 e6 | libevent_free: release ptr-libevent@0x7fb34c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a903c0 | #131 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 34 7c 82 56 8e 42 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #131 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #131 | rejected packet: | ad 34 7c 82 56 8e 42 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #131: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47f10 | handling event EVENT_RETRANSMIT for parent state #132 | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #132 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #132 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49643.03145; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00724 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a903c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #132 | libevent_malloc: new ptr-libevent@0x7fb34c02a950 size 128 "road-eastnet-nonat-132" #132: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #132) | 8f fb fe 61 19 e1 9c b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 1f 4f d1 68 44 b0 da 10 cc a3 65 0b 05 29 46 | a5 ef 62 34 d2 17 30 f6 7e b7 1c 3d c0 61 fd c8 | 25 96 8a e1 67 57 19 a7 8f 6a aa 6e 4c 1e 1c bb | 2a 10 04 d7 17 65 58 ce 83 ac 91 4f 48 71 e3 8d | af 3f 22 d8 df 00 4a d4 1b df 76 a7 ad 26 ba ba | 91 be fb 08 a9 70 66 2f 99 bf ef e8 c6 21 cc c0 | ed 1d fb 20 f6 60 07 53 22 da 88 1b 1d 11 4a 37 | e6 c8 75 11 02 89 b4 55 ec 0c 8b 31 52 06 0f 18 | 81 e2 42 d3 fe 87 7f dc c5 02 18 bb 87 cb 91 7a | 01 aa 5e f6 49 fd e3 ed df 8b 65 4a 5d 0c dc 05 | 45 9e f7 6f 6c 11 d8 bd 19 75 3d 5b 55 32 77 3d | 44 4c 11 8d 32 50 da 6e 0a 86 ef 69 5f 2a bb 9d | b7 76 10 6b da 52 00 cf e9 de 40 71 fd 9c 21 a3 | 2a ac 7a 1a 3b 67 9b 88 e6 1e 25 7c 3a 6e 9c 54 | 4b 96 e9 1a 08 38 3b 3b 27 21 e9 0c 79 a6 d9 1c | 14 07 fc c1 42 9e 29 79 0d 68 f7 e2 3d 93 ce 38 | 29 00 00 24 92 fc 82 18 58 23 4b 06 62 ee b8 b2 | f1 d5 54 0c 3d b0 88 33 58 36 a6 39 d7 5f 04 ee | ca 34 01 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 38 e7 04 0b 0d 59 5a cd 8a 54 e3 8a | 4e 81 3b 76 de 25 c1 57 00 00 00 1c 00 00 40 05 | c3 b5 61 af 5d 2d 46 0f c8 2c 48 99 41 b8 6c e0 | 5b 12 cb e3 | libevent_free: release ptr-libevent@0x7fb37801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47f10 | #132 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f fb fe 61 19 e1 9c b7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #132 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #132 | rejected packet: | 8f fb fe 61 19 e1 9c b7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #132: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8ee40 | handling event EVENT_RETRANSMIT for parent state #133 | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #133 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #133 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49643.095728; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00808 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #133 | libevent_malloc: new ptr-libevent@0x7fb37801d920 size 128 "road-eastnet-nonat-133" #133: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #133) | 93 2c 91 72 20 8c aa 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c d8 f9 2c 2b a0 b1 31 57 35 e0 04 75 fa ff 27 | 53 64 2e 54 ea 38 e0 ef 52 11 3d 36 64 b6 af 29 | 51 f7 3a cb 03 fb a8 9c 8c 4c bb 74 63 76 7d d1 | a9 88 c4 5e 87 dd 7f 20 3b 30 84 84 16 86 c9 65 | d1 47 a8 28 8d 73 90 06 c4 7f 57 27 02 dd dc 34 | 3e 36 07 bc f4 b2 13 c9 ca 56 ee e3 b6 fc 0e 46 | 17 c4 47 02 3c 22 35 e8 99 a1 3a f2 88 57 e2 b2 | 76 46 aa bb c5 86 a7 a3 5d df 02 48 a4 96 00 22 | 34 1a 70 44 11 10 cb ff f2 1d 21 21 00 41 5a a7 | a1 5f 54 12 46 7f 51 02 26 94 4f 54 f8 0e be ce | 2f 5a 2b 9b 25 dc a0 31 41 2a dd d5 76 31 f7 83 | c2 70 58 eb 31 ba 5b 36 57 70 32 a0 20 3d ec e9 | 48 52 21 d4 39 1a 79 f6 31 e1 9a c8 d2 b3 fd 12 | 8c 10 74 fe 54 6f eb b1 c3 58 8e 49 2a 38 98 47 | 38 39 a8 64 1a 71 f1 c2 47 f8 d0 db da e6 75 10 | 1b a2 b7 e4 c4 eb b7 43 ca b9 9e 23 21 75 e9 b6 | 29 00 00 24 2f d1 c4 74 6b fd 49 84 52 1d 9d 1d | ec af 19 02 47 e5 8f b7 c6 73 48 d2 a9 91 58 b2 | b6 74 d3 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 b3 b4 a5 c4 da 26 36 c8 2a e5 e1 | 3e af ad 98 58 9a bf c4 00 00 00 1c 00 00 40 05 | 31 45 bd 61 73 08 cb 41 73 c4 72 6c eb e0 15 88 | 84 49 78 a3 | libevent_free: release ptr-libevent@0x7fb36c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee40 | #133 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 93 2c 91 72 20 8c aa 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #133 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #133 | rejected packet: | 93 2c 91 72 20 8c aa 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #133: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad43c0 | handling event EVENT_RETRANSMIT for parent state #134 | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #134 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #134 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49643.154003; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006521 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee40 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #134 | libevent_malloc: new ptr-libevent@0x7fb36c0251c0 size 128 "road-eastnet-nonat-134" #134: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #134) | 80 c9 f7 0f 34 43 e8 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 45 e5 b7 ab 0c a4 4c 5f b2 54 d8 39 c5 f7 ae | a7 a1 c9 5c 2b 5a 97 72 d3 14 80 31 3f b5 24 0d | cb 02 f5 57 a3 d0 5f 51 b9 29 93 ae b9 a3 6f 26 | d5 1f 2c 2d f7 c7 46 60 60 aa 8f 11 69 88 d5 d6 | 7f c3 44 3b 7a f5 6e 59 77 4f a4 43 34 c4 26 e5 | ae dc 49 7d 8b cd 2b ab 18 68 bd 39 90 28 6c 4a | 23 91 a3 0e 3f fb 01 de 41 7d 06 32 ac 44 1c 44 | 83 e0 6e 5a 17 ec 28 70 e3 9f 5e 65 cd d5 6a 13 | f4 b1 48 8a 51 f8 b7 54 21 1a 5d da c7 53 38 a4 | e5 03 02 af 81 ae 46 39 d4 15 23 f5 a8 b9 79 ca | ed 1c 97 81 a2 68 bb 3f 5d 13 76 91 c8 b3 35 4a | a1 e6 8f 6f 10 12 49 6f 3e bb 3b bc 07 2d 62 f9 | 63 5c f1 5a ec c4 50 49 e3 cf a2 cc 8f 61 b4 4c | 09 95 92 ca 4c 19 06 a3 80 ad 6b cf ef 46 70 41 | 9a 5d 9d 72 62 c3 a0 af ac b6 f0 ed e6 2e a4 c8 | 97 d4 46 3b dc 90 f1 11 ff c1 1a f7 bc 4d b4 b1 | 29 00 00 24 d7 88 26 03 5a 89 cf 88 bf 43 40 13 | b0 8c b4 f5 85 1c 5d f5 ed 6d ea f7 d0 1d 42 5d | 64 c8 0e 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 5d 43 f9 e4 68 67 0d 96 3e 2a d1 | 87 17 c9 81 16 11 d8 11 00 00 00 1c 00 00 40 05 | 17 79 69 7c c9 bf 1a b4 97 b1 98 46 4c 85 68 c7 | a4 36 11 6c | libevent_free: release ptr-libevent@0x7fb368046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad43c0 | #134 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 c9 f7 0f 34 43 e8 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #134 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #134 | rejected packet: | 80 c9 f7 0f 34 43 e8 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #134: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #135 | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #135 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #135 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49643.213334; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005777 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad43c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #135 | libevent_malloc: new ptr-libevent@0x7fb368046040 size 128 "road-eastnet-nonat-135" #135: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #135) | 6f cc 42 0b fb 9b 4b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 27 90 6c a9 76 2a c4 50 c5 bf 04 2d 39 82 d0 | f1 4e e9 ff 6c d4 67 d5 6a f7 c3 33 36 2d 41 eb | 01 b8 52 cf 33 75 55 83 36 e9 3b 1e e0 f5 4c 33 | f6 13 14 fe 0b 40 f0 7a 1d e6 e9 63 2c 7f 9b 3f | 43 d7 8b 49 de 08 d9 f7 cb b8 85 8d 24 76 ea 07 | 74 e0 eb 3b 7b 61 bd 6e d0 81 bc 30 2d b1 a8 bc | 95 7a c1 8e 91 81 20 78 4b 9d 5f 4b 55 88 98 a7 | 4c 89 7d 2e c5 f4 b0 76 31 ac d8 73 5d 09 ed 2d | bb 07 67 90 bf 59 f1 9b 89 79 b4 48 ab 68 0b 4b | a7 49 da 7c 24 b3 1c f9 17 8c 28 77 5a 6e 44 15 | 7d 9f 86 31 20 2d 95 04 ee 8e 03 70 03 dc 14 11 | e5 4b 44 1d be 0a 83 04 0b 7e 48 68 b0 0f 04 64 | 81 84 d0 41 fd 8b 49 2c f9 af ea 95 2c f3 49 aa | 7c 3c d3 83 ef 0f 20 1f 8b 15 3b 94 9d 57 0f 83 | e9 c9 85 72 a3 81 40 26 3d 9e 4f 4c 25 2e 6f de | 2e 5c c2 5b 74 8c 58 60 bd 5e 06 db 51 f6 b7 a3 | 29 00 00 24 4f 27 a7 6e b5 c8 d8 49 72 0f 78 be | 0c 3a 88 f4 37 97 d5 4f 51 27 f0 3f 45 0a b8 19 | ba c2 3b 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 5e 90 14 7c 0c 3f fe 72 ae db a0 | 43 97 c2 6c fa c9 b7 b1 00 00 00 1c 00 00 40 05 | 6c 85 24 93 7d cc 8d 2c 5e c0 f8 bf 19 38 1d 99 | 5f b9 fd e3 | libevent_free: release ptr-libevent@0x7fb34c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | #135 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f cc 42 0b fb 9b 4b 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #135 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #135 | rejected packet: | 6f cc 42 0b fb 9b 4b 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #135: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a68890 | handling event EVENT_RETRANSMIT for parent state #136 | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #136 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #136 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49643.279647; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006841 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #136 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 "road-eastnet-nonat-136" #136: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #136) | d6 c8 9e 97 21 46 fb d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 a9 84 13 62 aa bd 1d ad 3e 60 88 dc a9 35 5e | 57 2f a4 3a d3 ae c1 11 b0 24 19 68 c2 75 c1 4f | 59 cf f8 40 bb af 7e d1 b9 71 42 ce c6 09 6e 74 | 9e f2 29 0d 91 21 24 74 6d 2f 10 75 65 f8 b8 44 | e9 15 55 bb 2b 6f 25 4c 58 9b 0b 45 c2 40 5a 9f | ff e2 b3 e2 f7 0d c5 79 1b 00 36 3a 21 20 e7 06 | d4 05 ab e6 7f 0e 4f 26 f4 28 cb d2 12 3f 60 75 | e8 8c 1f 18 e0 09 73 82 2e 56 2f fe 00 1a 31 26 | 0b 05 07 a6 fc 87 93 26 a9 c2 69 7c 30 9c 7a 89 | e9 2a 6b aa c2 98 8a d1 cc 85 ab 8a 1d b6 6c 3a | 46 51 76 9a 2b ea bd 4c 92 d8 c8 5c 56 7a b8 5f | 71 f6 c7 f5 f4 4e c8 ce cc 9b 6f 50 15 3b 30 b5 | cc 32 0c 15 e6 9e 78 33 f4 30 d7 c5 bc a6 29 97 | 00 2f a4 12 c0 82 9e 84 f0 b8 38 05 f1 51 00 d1 | 48 64 6a f9 cc d7 36 54 45 d6 ee 3e 02 d0 d5 50 | ec e5 a0 1a 70 ee 96 eb 78 4d 45 6b e4 50 2d ed | 29 00 00 24 24 22 aa ae c7 66 c9 3a 20 66 58 4a | 54 df 58 65 c1 5d d7 a3 b2 c7 e8 e8 de 15 89 70 | 84 48 bb d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 7f 22 d9 ee cc a0 1b 0a 4c ff 84 | da dc a7 a5 32 ec b3 c6 00 00 00 1c 00 00 40 05 | e4 4f b8 48 f2 80 69 e7 b9 85 06 aa 82 75 ce d9 | b4 81 0b 76 | libevent_free: release ptr-libevent@0x7fb374014820 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a68890 | #136 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 c8 9e 97 21 46 fb d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #136 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #136 | rejected packet: | d6 c8 9e 97 21 46 fb d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #136: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b06800 | handling event EVENT_RETRANSMIT for parent state #137 | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #137 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #137 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49643.34909; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007609 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a68890 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #137 | libevent_malloc: new ptr-libevent@0x7fb374014820 size 128 "road-eastnet-nonat-137" #137: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #137) | 71 ba fb 1f 95 88 29 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 75 6d 4d 0f bb db 8d 24 d0 ba 5f 79 5b 88 be | 94 ae ea 89 7e 95 49 22 fa 6f 0d 51 90 a6 60 1f | 08 fe 3b 9a b1 a8 b5 c8 e8 a5 d1 c2 b6 3a f6 5c | 07 25 e1 53 6d cd f9 d3 3f 17 7a b9 97 ee 73 6b | da 87 59 77 74 9c 5c 05 a7 16 5c 85 33 f2 d8 f0 | a7 84 4c 20 01 fc 53 bf 21 28 ba 99 79 44 ea b7 | b7 e2 9a c6 4e 09 9d 5a 41 46 ff 69 36 bd 47 3d | 68 59 0e 87 0c b2 db 9d ef 27 b1 ef a7 c3 7d 74 | d1 bf 63 41 fd 34 70 c8 08 69 9e 0d 21 dd b6 ca | 61 47 c8 f6 20 99 94 42 4a b6 3c e4 c1 6f 59 47 | 32 7f e7 88 96 d9 c5 8f 82 9f aa 9b 0b 9e 03 53 | 65 a9 c8 5c d7 fe be da 56 44 27 26 98 d6 9a ae | 35 b2 bc fb a7 4d 1f ae ae 76 fb c2 8c 86 63 40 | 59 88 a0 8b a9 0e 3a 8f 10 76 ad e8 54 d2 9e 91 | 7a bc 03 79 61 0b 83 53 4c 4e 2d 22 ca 69 54 24 | ae 77 e1 5c 6b 3a ff ee 1f 59 52 e0 9c 51 48 2c | 29 00 00 24 f7 ec 22 b0 d2 45 cb de 11 9d 88 dc | d9 c8 87 82 94 72 01 b4 91 d8 41 1f 07 fb 13 21 | 60 9f a8 fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df ee b9 3b 05 6b fc 34 5a 00 ef 69 | 58 dc d5 6e 13 53 c2 0c 00 00 00 1c 00 00 40 05 | 42 f2 83 df 2f 64 fb 42 98 b0 17 b3 99 82 89 4f | 79 b2 42 ca | libevent_free: release ptr-libevent@0x7fb360046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b06800 | #137 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 ba fb 1f 95 88 29 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #137 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #137 | rejected packet: | 71 ba fb 1f 95 88 29 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #137: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0457 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab2380 | handling event EVENT_RETRANSMIT for parent state #138 | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #138 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #138 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49643.420384; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005924 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b06800 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #138 | libevent_malloc: new ptr-libevent@0x7fb360046040 size 128 "road-eastnet-nonat-138" #138: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #138) | 9e 04 07 cd 3c 90 2d 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 26 9c 69 c2 fb a0 0a d4 c6 8a e3 3a 35 d9 72 | c4 6d dc 97 97 46 4f 49 45 f3 89 7c 26 93 32 59 | 0e 55 34 82 9b 12 80 e6 60 cd 9e 59 15 f7 7d 65 | 53 e2 d3 d8 c2 ed 2c ad 8a b3 a9 0f 4d 3e ac 86 | 1c 67 54 95 04 00 bf 86 4e 8b bf af 44 15 eb 62 | ea cc 94 5a 6b 1a 81 0f 38 cc a4 0b 8b 3e f7 1f | ed 1b ee bf 3c b7 b3 6b c3 78 66 29 1f dc 55 cd | cd 9e c4 55 82 0d 26 16 81 1d 3b 87 44 bb 54 ef | 02 0c 05 f7 04 a0 83 3c c1 fe 2c d3 4e 3d ca 62 | 71 e8 db ac f9 9d 90 a6 0d 1e d9 94 f5 c3 29 22 | f5 2c d8 67 db 54 e1 d3 df b5 df 85 0d 36 cf 0c | 0f 08 0d 38 84 31 cd 9b 35 a0 fd df e8 86 86 f3 | a8 84 f3 56 c8 9a eb 02 1a c2 37 30 b1 0d 51 72 | 6c ba 2c ab f4 fb 66 85 22 97 66 d7 6b a3 32 2b | 57 22 c0 38 a7 76 1b d3 ea e0 94 87 f8 5d 23 88 | 1d 92 5d 32 0c 98 0b 93 d1 e9 b6 e4 2e 67 5c f1 | 29 00 00 24 e6 24 a9 20 36 d0 44 65 2c ba 3d 80 | 21 f7 06 3f 8d eb de 66 e7 ca a9 01 80 86 00 a0 | 79 48 c1 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 af 88 b2 43 70 03 fc c5 39 dd 7b 65 | af e5 61 63 70 8d 5a 32 00 00 00 1c 00 00 40 05 | 84 c7 81 66 9c 3a cd fa d9 98 02 0d f2 5f b1 72 | 68 cd 62 b2 | libevent_free: release ptr-libevent@0x7fb344046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab2380 | #138 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e 04 07 cd 3c 90 2d 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #138 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #138 | rejected packet: | 9e 04 07 cd 3c 90 2d 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #138: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0519 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #139 | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #139 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #139 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49643.488796; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007949 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab2380 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #139 | libevent_malloc: new ptr-libevent@0x7fb344046040 size 128 "road-eastnet-nonat-139" #139: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #139) | 98 4d 89 18 32 14 8f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb bc f6 61 86 12 c3 bf 44 ad ab c8 f8 6d 1d 7a | 8e 0b a1 af 30 f0 3a 9c 0b 72 59 7b 0e cc 41 e5 | 8e 8e a0 7e 30 1e 50 82 23 bf b6 e1 69 ee be 0d | cc 36 07 e5 53 86 7d cf f5 63 8d 89 06 e8 7e 7e | 8f 2c 9d a8 ed 05 f6 a5 d3 42 db b5 95 59 0b 32 | 04 71 41 13 63 f9 4a 4c 42 0e 00 d5 c5 99 ba ab | 17 4c ce 49 6c 52 88 21 1f b3 2a 6c 8d cc 9d ad | 58 96 b7 c5 a6 44 e9 2c bb f7 31 ef f0 0b f9 1c | 1b 4e 21 f5 a2 ea 26 1f 03 aa b4 4e 34 e2 87 84 | cf 38 c7 5e ef db 85 1f 03 a7 73 48 68 be 7e b1 | 00 74 8f e9 65 a8 0b 8a 27 e7 a0 51 5b c9 e3 2d | 64 f7 22 1b 1e b7 6f af e1 0f 11 f6 9b 82 c4 de | 33 fe da 26 0e d7 f8 c3 43 49 4f e1 38 7e 8a 70 | 40 40 85 6b ea cf c0 b6 a0 c2 ac 2b eb 0c 58 ce | 0e cd 1f 9c 72 bb e0 55 da 15 7c 5d ad 4e 80 77 | d9 86 7e 35 e9 dd 73 d2 de c2 f2 ae 3e 6a 77 fd | 29 00 00 24 ce a2 61 71 0b 59 18 45 32 ff fc 20 | d2 f9 be 9d 52 e8 20 ba 16 46 42 c2 a8 74 a7 11 | 49 eb 52 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 5e 21 46 6e c2 25 7d 16 7d 1e 10 | d1 b7 00 9d a8 c1 7e fa 00 00 00 1c 00 00 40 05 | 95 96 61 58 5f 24 29 d9 13 26 c9 57 d8 b0 16 e2 | 35 e6 bc 7d | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #139 spent 0.391 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 4d 89 18 32 14 8f 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #139 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #139 | rejected packet: | 98 4d 89 18 32 14 8f 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #139: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.174 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a34e10 | handling event EVENT_RETRANSMIT for parent state #140 | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #140 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #140 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49643.551607; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006216 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #140 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-140" #140: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #140) | 7b af c7 ac 06 7e 5a 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 03 39 d2 09 32 a1 ff 81 2d 15 dc 96 08 01 c1 | 8e 0a 6e 33 a6 3e 74 05 5c 15 33 12 1d f7 12 20 | db f5 3e 24 ba 17 01 dc a0 95 5b 2c 7b 77 c2 3e | 02 67 33 d7 d6 86 dc 63 50 16 65 87 a1 a9 2b c2 | 68 87 45 fa 03 db 21 3c 23 cd d5 14 5d 40 bf 10 | 6f 14 34 95 51 53 c7 d5 77 b9 67 66 94 9a cd 21 | 08 bb de 59 ba ca 48 d5 21 97 e5 28 87 2d fd 83 | d2 62 24 c7 7c f8 ac 68 7a f8 c3 7f 7d 8d 72 d0 | 9d 64 ef 67 4b f1 5c 24 57 ca c2 b1 9f b6 11 d3 | 07 3e 55 51 fc 73 7a 83 2c 11 87 97 33 3d 5c cd | 48 68 02 58 27 c2 fe 9a f6 51 01 87 b5 32 4d fc | 09 2c 09 a0 1f 82 25 e8 47 96 80 8e 9d 80 b5 a7 | 86 8d 11 ad 04 69 30 3a 7c 49 92 c3 9e 7f 81 14 | 42 d8 62 ef 10 0a 21 b2 bb b9 42 01 9c 86 19 33 | dd 9b 24 b9 8a d5 68 9d ee 00 85 c1 cc df b7 34 | d9 c8 e4 31 8c bd d3 67 7d ad 51 86 db 69 96 5d | 29 00 00 24 f8 43 b0 82 a0 04 df 35 49 ed 46 83 | 05 44 45 f4 4f f6 f3 e1 63 59 5a aa 3f 59 d1 20 | a6 81 b5 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a 8e a2 d1 63 df 73 41 77 f0 6a b9 | 17 c7 13 b6 69 6d 12 29 00 00 00 1c 00 00 40 05 | a8 9c d4 0d d7 3c af a8 56 f5 ab f4 4f 7a 90 fd | 96 a4 e3 47 | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a34e10 | #140 spent 0.306 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7b af c7 ac 06 7e 5a 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #140 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #140 | rejected packet: | 7b af c7 ac 06 7e 5a 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #140: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.161 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3fc10 | handling event EVENT_RETRANSMIT for parent state #141 | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #141 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #141 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49643.614337; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006611 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a34e10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #141 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 "road-eastnet-nonat-141" #141: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #141) | c7 a4 5e d6 85 96 e8 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 5c 64 85 22 7f 26 67 9b 1d d2 dc 77 48 35 3a | d4 3f ae a5 de d9 02 e1 be b1 54 1d 8f 3c 81 66 | 72 af 44 35 86 52 1f 94 d8 67 4f d5 3d aa 9a 28 | b8 7d b2 44 cd ad e4 36 73 fc b7 ff a8 f3 fa 52 | bc bb ec ae b0 14 24 28 e8 98 61 c7 6e 10 46 be | 9e 1b d1 62 7d 6b 63 8d 57 98 39 e0 7a 2b d7 fb | 08 85 91 84 64 96 ca 9e 7d d6 44 71 24 e2 7b d9 | 4e df 37 ef 69 35 3e bf d9 e6 0c fe 44 26 04 4e | f0 05 82 74 b2 9b 24 5e e9 a2 22 8d 25 f4 83 56 | 66 7a 36 9b c2 83 bb 7e 03 9c 77 3b 87 eb 41 c7 | 94 78 c3 88 92 ee d7 85 b7 c9 76 9d e6 b0 56 99 | 3c 23 e2 55 4e f4 22 8d 17 30 9c c5 cd a0 fa a5 | 54 c0 8e f4 5a 2c 24 46 f9 7c 1e 86 1f 7b 3c ed | d6 ba ae a7 70 a2 9b 24 e8 02 bd 30 c2 66 66 44 | 25 e0 d1 5b fc c6 60 e2 9a 7f 9c 7f d3 c2 d2 0d | 71 6b ce d7 9c d1 77 52 aa 1f 4c 8a aa 84 99 be | 29 00 00 24 77 e9 14 43 da cb a0 62 0a e5 af ee | ca 47 6a 87 48 66 6e 70 1f 90 c9 e8 b5 aa eb 33 | 74 97 4a b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 5f b0 2c dc 05 ab ba 7d 8f a9 67 | 57 cd cc b4 50 46 52 bd 00 00 00 1c 00 00 40 05 | 25 fc 66 29 f4 e3 aa bf a8 61 5f 67 dd d5 39 f5 | bb 8c 0c c1 | libevent_free: release ptr-libevent@0x7fb34001a190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3fc10 | #141 spent 0.426 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 a4 5e d6 85 96 e8 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #141 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #141 | rejected packet: | c7 a4 5e d6 85 96 e8 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #141: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.203 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0a940 | handling event EVENT_RETRANSMIT for parent state #142 | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #142 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #142 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49643.678216; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008503 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3fc10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #142 | libevent_malloc: new ptr-libevent@0x7fb34001a190 size 128 "road-eastnet-nonat-142" #142: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #142) | 41 39 64 14 10 77 e9 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc f2 be 7b 98 10 67 76 c4 71 20 94 23 de f4 7b | f8 c4 af 24 ce 1c a4 2e 78 f9 2e 3f 92 4d 95 da | b0 24 e9 98 5b 94 79 3a a7 65 db 91 8d 98 6f 60 | 39 37 f9 9a 0b 2c 5f 0f 2f ab bc 06 c4 26 ad 3a | cb 21 02 45 52 b2 d1 fd f5 7c fc a1 d2 ea 0e b1 | ba 62 e9 1e b2 ad cc 0d 27 c3 3b 69 ca 23 50 32 | eb 22 0c cc d3 fb 5f db 9c 9b 31 50 db f4 03 47 | 71 96 ad b4 c6 fc 17 71 7e b3 b0 ab 55 4f e2 51 | da 27 48 0f fb 5a 5c 14 f2 9f a1 0b bc 57 8c f8 | af d3 b0 d4 6a 72 47 34 c3 ab 52 90 fc 49 ad 86 | 46 90 a0 10 2b fd 92 3d 6b 38 ac d2 f1 fb fa a7 | 40 39 9e cd 87 10 91 66 2e ab 47 10 a6 88 c0 52 | d8 c9 3f b4 b3 d0 6c 91 b2 0e 49 7c 2a dc 94 d8 | 21 4c c9 df 3c b1 a2 d4 d4 f0 4b 25 d9 08 87 46 | 22 c7 0a 5a cc 6c a2 0b 4a 09 99 09 fb f2 2e 33 | 66 ad 2f c0 16 9e 3c 6f 99 46 27 79 f7 75 88 d3 | 29 00 00 24 1d 1b 1c 65 cb f5 ff f0 c9 00 69 e9 | d1 b3 22 15 24 4a 7b cc a6 4c 2e 0b ef 42 21 b2 | d1 d6 06 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b 3a fc 83 97 ab 17 41 58 12 a1 f9 | 48 2f 13 f0 7a 91 16 3d 00 00 00 1c 00 00 40 05 | 13 50 5d f0 78 ea 60 59 51 2f a8 23 2c 7c d0 1f | 4c a0 b1 5b | libevent_free: release ptr-libevent@0x7fb35c046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0a940 | #142 spent 0.188 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 39 64 14 10 77 e9 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #142 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #142 | rejected packet: | 41 39 64 14 10 77 e9 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #142: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0825 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf10 | handling event EVENT_RETRANSMIT for parent state #143 | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #143 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #143 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49643.753672; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.011521 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0a940 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #143 | libevent_malloc: new ptr-libevent@0x7fb35c046040 size 128 "road-eastnet-nonat-143" #143: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #143) | fe 08 8f c1 30 76 36 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 59 10 0a 33 69 60 29 ec cb 88 e8 3a c1 e5 55 | 26 67 1a ec 62 9e 8e 22 6f b0 d9 0b 9d f1 88 4a | e6 aa 92 54 ef 0d ca 48 fc de 93 8e cc 1b be 9e | 2a 5e f3 2a 08 3f 42 43 4c 7d 9b 8f 28 00 df 48 | e8 21 87 a4 f6 50 fb f0 b0 17 a4 67 51 7c 94 f5 | bf 3d 99 c9 85 3f 6a 47 12 df 61 eb 04 e7 9a 6c | b7 d5 b3 00 34 48 70 01 04 f1 38 e6 2a 1b 58 fe | 45 c8 88 15 fe fd f8 a1 17 d4 b0 e0 da 11 1c 39 | ad d0 8c b8 02 34 e9 cc d8 17 f6 f2 94 8e c1 9b | bc 9e 9d 32 92 5b 2a 34 cd 6a fb 2e 20 96 68 57 | 5b d5 8b 51 c6 02 26 d3 9c 0f 2f 12 c2 48 e7 4a | 4a 0b 12 1b 9e 56 b5 85 4d d5 b2 31 1e ed 3e 7b | 36 b4 c3 2a eb a3 dd fa 18 8b db b6 6e 6f 26 25 | d4 07 3d fa df 09 23 4b f0 61 a0 e2 e7 88 89 b7 | 4a 08 a7 b8 23 da c7 50 cb 24 82 e1 9d bc ac 0c | ad 50 25 66 22 31 ab bb bb 61 7d f2 14 fa 8e 17 | 29 00 00 24 5c 1f 93 ac 9c d9 6d bc 1c 83 06 35 | 6d 1c ce da 8c 6b 1d 7b a8 23 6f c9 2c 64 35 22 | c8 0a 79 63 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 3f e0 89 56 6b 89 d9 2f e3 34 a5 | 92 0a 7f a5 70 51 be 33 00 00 00 1c 00 00 40 05 | 8d 31 d1 99 a4 16 d7 c5 96 20 51 29 c7 9b 80 8c | b7 4b 38 13 | libevent_free: release ptr-libevent@0x7fb34401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf10 | #143 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 08 8f c1 30 76 36 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #143 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #143 | rejected packet: | fe 08 8f c1 30 76 36 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #143: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf50 | handling event EVENT_RETRANSMIT for parent state #144 | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #144 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #144 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49643.831046; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006463 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #144 | libevent_malloc: new ptr-libevent@0x7fb34401d920 size 128 "road-eastnet-nonat-144" #144: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #144) | 95 f5 7e 43 50 83 91 f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 af 0d 3c f0 04 33 31 65 f6 8e 0a e2 6d 8f 2b | 3a 54 de b3 ca 0f b9 57 94 b3 82 c2 80 38 37 42 | 7f 12 9e 2e 71 85 9b 4b b8 30 72 8d 13 66 8d 18 | cc b4 6c 82 a9 1c ff 5f bc 21 44 b4 04 e3 03 9f | 86 65 ce c2 4c 9e c7 42 cb 55 d7 40 69 8e 4e 35 | 08 db 41 09 bf 5b 9f e9 29 80 fb 24 8c ee 8a 18 | 98 d5 9e 29 b1 2e 48 fa a4 54 8d 89 c7 a3 3f 0e | fc 43 c8 e1 70 19 e6 79 93 90 9a 7f 29 dc 10 54 | 5c 05 ee 55 8b da f3 4a d4 d1 7a 22 56 b9 55 f2 | 83 7d ee 0a 7b 20 d8 88 a4 b2 35 e6 85 84 6e ea | 73 63 0f 8a e4 f5 ba b9 cf c5 6d ef 42 bc 1c 31 | 91 cc e3 6a cc 1c 24 a0 43 43 cd 4a d2 99 1f d0 | 12 0e 0b 61 86 58 8a 2a 98 ff 0e 20 62 f2 a9 6f | 84 85 8e 3d 34 eb 58 ea 76 88 a9 8b bd 38 f7 19 | 7f 52 1e a6 e1 d5 d4 4f 95 6d fa 80 6a e1 f8 3e | c4 ca 0c d0 70 40 4c 9c cb 3a a3 28 2b c3 1c ff | 29 00 00 24 1f 01 c0 5a 0d f1 22 7b f9 16 68 fa | 7d 4a 59 bf c4 b6 f1 ab 98 c0 67 1a 42 27 bf 9d | d6 b1 35 d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 96 0c ca 76 1c 4b 86 73 02 f4 3a | a5 21 4a 8f fe b4 03 ee 00 00 00 1c 00 00 40 05 | 86 67 99 5d 30 be 3d 57 d4 ea af 87 c1 18 21 08 | 32 c4 b1 0f | libevent_free: release ptr-libevent@0x7fb3500180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf50 | #144 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 f5 7e 43 50 83 91 f9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #144 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #144 | rejected packet: | 95 f5 7e 43 50 83 91 f9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #144: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf80 | handling event EVENT_RETRANSMIT for parent state #145 | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #145 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #145 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49643.911449; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006114 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf50 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #145 | libevent_malloc: new ptr-libevent@0x7fb3500180b0 size 128 "road-eastnet-nonat-145" #145: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #145) | a6 a1 9f 1d 3f 3a 29 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 ad 76 df ba ca 18 92 b9 50 e2 27 a3 57 3f f5 | d7 ce ae 5d 80 a9 09 c6 8a 53 e3 ab 22 af 0e a7 | 88 2e e6 ed 37 ce 02 dd 03 71 9a aa 64 d1 00 5c | 54 65 05 0e 62 cb 77 34 78 e8 1d 0f 3c 6f 76 4f | d8 fc 9f c4 10 87 e5 9a b0 72 db 0a 63 63 0e ec | a2 67 9d 72 98 db 53 5f a6 6f e8 b3 98 59 aa 3b | 88 1a a2 8d d0 7f c4 94 06 61 c1 99 f9 c0 e1 fc | 19 b1 6a 14 b7 fd 63 fd d3 3b 83 b6 f1 f8 68 d2 | 13 f3 e6 28 90 fe d0 d0 88 c6 ca e3 4e 56 e1 09 | b8 4b c6 48 c4 d4 00 e6 af d0 6c fa ac 01 46 d9 | 68 30 67 9c 6d 90 ca de 4f 57 74 b7 7a b8 1b 41 | a9 90 f5 03 0d 89 d9 ac 42 f8 f9 ae 19 2a 88 37 | d2 a9 69 9e 81 b2 1c 52 07 de 0f fa d0 69 b1 a8 | 12 38 cf d3 2e 09 65 b8 1c da 6e 0b 4d 41 c0 65 | 80 dc 01 75 47 41 de 6c 83 4d 93 25 86 5c 1b c8 | f3 08 39 71 bd f1 c4 fe f5 43 e7 4c 77 94 d2 cc | 29 00 00 24 03 a8 59 45 29 a4 02 15 24 82 5a 54 | 64 ac fd bc 55 59 ba ca b7 e9 80 0d f2 9c bd f0 | d3 a5 de f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 e0 ba e6 72 d8 87 8f de 74 38 1d | 19 eb b3 76 79 6b d3 38 00 00 00 1c 00 00 40 05 | 6f 55 64 02 f2 84 7e 5a 25 36 99 f3 de 2c 7f 97 | 3a 54 f2 52 | libevent_free: release ptr-libevent@0x7fb34003b010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf80 | #145 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 a1 9f 1d 3f 3a 29 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #145 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #145 | rejected packet: | a6 a1 9f 1d 3f 3a 29 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #145: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aee0c0 | handling event EVENT_RETRANSMIT for parent state #146 | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #146 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #146 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49643.984944; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.013412 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #146 | libevent_malloc: new ptr-libevent@0x7fb34003b010 size 128 "road-eastnet-nonat-146" #146: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #146) | 44 6c 8c 11 77 9b c1 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b e4 4b 01 63 76 c0 7a c8 2d 36 69 32 60 94 ea | 6d 55 57 2b 4e ff 0e 39 b8 87 ae 9d 5d a1 84 c3 | fd 7e 75 5e b5 db f9 c0 f2 b4 77 67 0c bc 83 d2 | b3 2c 18 7b 18 da 84 81 dc 1d 09 bc ef cb 96 0b | 54 3e 13 a5 2c e8 26 52 c4 b3 5b d7 9c b8 e6 22 | f7 8d 8e 88 21 d1 87 46 36 62 d4 63 42 41 4c 1f | 8f 43 21 27 b3 df 00 21 d1 8d 41 5a e5 9f 04 8b | ff c6 a4 97 a5 12 34 cb aa c2 51 13 9f 26 59 55 | a5 7b 2f 9e 53 52 08 32 a2 06 5f 18 aa a0 ac 8a | 4c 25 e1 2e cb 23 eb 05 33 52 1c b1 e7 32 06 d0 | 42 ed ad 95 48 c5 eb 3d 1a cb f5 6d dc 2f a2 a8 | 4e 15 75 28 ce 0c d4 fb 09 18 56 79 e6 17 c1 dd | e4 ed 35 be 6f e9 12 84 6e 1e 87 b9 38 ca fc f5 | d4 85 cf 4e a3 1f db 6c 1f e5 f2 54 ba 88 10 cb | 4e bc 46 9b 79 cb 0a 36 af 61 69 14 f8 97 5e 9d | 27 b8 f4 1b 36 1d 0b 8b f0 e7 f8 06 78 36 dc d7 | 29 00 00 24 79 24 14 13 36 a3 2b 17 a4 40 30 01 | 57 eb a4 ff f9 15 14 cb 86 dc 31 a7 64 7c e3 06 | ae fb 59 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 46 87 8a 4c 47 2e ae ab e2 03 f4 | cf 0f 35 fc df 03 af ad 00 00 00 1c 00 00 40 05 | 7f ed fa 9e 74 b9 38 c0 e7 89 49 8c f1 a3 30 c7 | bc 00 44 f5 | libevent_free: release ptr-libevent@0x7fb354046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aee0c0 | #146 spent 0.448 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 6c 8c 11 77 9b c1 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #146 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #146 | rejected packet: | 44 6c 8c 11 77 9b c1 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #146: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1af10 | handling event EVENT_RETRANSMIT for parent state #147 | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #147 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #147 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49644.041778; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00662 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aee0c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #147 | libevent_malloc: new ptr-libevent@0x7fb354046040 size 128 "road-eastnet-nonat-147" #147: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #147) | c9 49 59 84 c8 e5 a9 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 55 23 1f ef d0 ab 86 83 db 3a 42 1d 72 53 7f 1d | 10 99 05 4a 99 4f 3f 9a 98 88 bd df 90 bb 6b e6 | 5a 0a ce 6c 41 04 da 58 5d c4 4f ac da 97 26 a7 | 11 32 a8 06 1f e1 87 a2 42 1e e6 6a 0c 68 08 40 | f5 b9 1e 41 1b cf 5c 75 a8 60 06 b2 5f cf d9 87 | 6b e4 af 8e 02 f2 fa 22 10 06 d6 15 19 bb fa f0 | 66 24 d5 79 4a bf 96 b3 63 ad e6 0f 0b 5c f6 47 | 01 64 bd d8 46 3f e5 ea a4 26 5d e5 06 c2 a7 0f | 35 e2 b0 0a 2c 32 20 be 52 14 9d b5 0e ec 56 cf | b3 f0 bf 5e 01 73 a8 04 a0 e0 5c 8a fe 29 b1 7f | 37 66 a5 5b ec c8 06 fb 07 01 0f 4c 5e 63 33 d2 | 2f d4 5c 61 3e 3f 82 73 d1 fb c8 86 80 bb eb c9 | 28 2b cc 48 8d 11 24 24 01 fe 7a 40 83 2b 75 31 | d3 44 40 97 d2 ba 07 04 c5 0b 99 12 41 24 f8 ad | ae 7e f2 a1 cb 5b d9 cd e9 53 59 dd 6f dc 6a 90 | 39 c5 d7 b8 42 59 e8 06 c8 85 08 f1 c6 2d 85 3e | 29 00 00 24 56 cc b0 4f af 68 49 01 85 6b 57 3a | 2e bf 2e 45 7c 71 09 75 a1 1e fe 83 ec 88 f6 fe | d7 b8 8a 0f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 3a 80 78 a8 ce 4e 37 f2 7e 4e 6e | c2 ec 51 b5 d8 d3 ef c5 00 00 00 1c 00 00 40 05 | 80 dd aa b7 d6 9c 8d 45 3b 70 75 ca 6b f3 11 7a | 54 5b 54 8d | libevent_free: release ptr-libevent@0x7fb348035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1af10 | #147 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c9 49 59 84 c8 e5 a9 fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #147 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #147 | rejected packet: | c9 49 59 84 c8 e5 a9 fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #147: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0474 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0ea80 | handling event EVENT_RETRANSMIT for parent state #148 | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #148 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #148 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49644.104079; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006569 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1af10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #148 | libevent_malloc: new ptr-libevent@0x7fb348035930 size 128 "road-eastnet-nonat-148" #148: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #148) | 7c 0d 88 21 0c f2 96 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 04 bc 64 c4 a9 25 09 2d 75 95 3b 11 b4 ff 15 | 97 7a 18 93 a6 88 e9 2c b9 6a 56 2f 0c f9 8a d8 | e8 e9 8c f3 6e a2 1a 4d de 32 b3 62 b7 1f cf 21 | 58 10 7d f4 24 b5 81 70 c7 68 14 37 9d fd 00 6b | b4 bb f2 40 cc b3 6b 23 df e5 3d 42 b5 d1 d7 42 | c0 5c ac 6a f7 66 60 50 9f bf be d5 78 f9 b4 31 | b1 86 de 30 ed 54 6a fc f4 65 4d b6 71 b3 0e 10 | 8b ff f6 ba 06 b3 35 4f f4 27 dc 02 7d 26 88 9b | ce 4c 6b f4 f0 e1 8d 43 1e f3 4c 5f ec 71 b9 2c | e9 3b 85 fd 08 23 e1 df 81 46 1d 11 72 44 8f d9 | 74 89 1c 9f d5 79 90 5f cf 86 54 f4 23 c9 c4 31 | af 2e 84 a4 ff ec cf b7 ba 60 46 0a 15 eb 88 9e | 1a 9f 61 a8 80 c2 60 68 d5 be 6e 09 41 6f c1 fc | 1b 37 54 8c 93 b5 3d fd bd 96 aa 9b bc 05 8d 2f | 00 4c 54 bb 3b 96 94 4f 45 ac 6c 6e b1 21 ad e3 | 8b d3 f2 47 fe 35 bf 98 09 a6 a6 c8 c9 12 c2 70 | 29 00 00 24 b1 81 e7 c9 15 f6 0b 96 d5 74 cc 65 | 51 5c df 58 13 0b 15 8c 15 4d e2 64 8b 9f d6 7a | 91 6a aa 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 56 10 9c c6 bc 82 78 34 d0 03 57 | 7a d1 bd 45 e3 1a b3 5c 00 00 00 1c 00 00 40 05 | 74 be 93 cb aa 1f 0e 04 cc 93 49 b7 b1 e0 d6 3d | b3 9a 6d 48 | libevent_free: release ptr-libevent@0x7fb36c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0ea80 | #148 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c 0d 88 21 0c f2 96 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #148 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #148 | rejected packet: | 7c 0d 88 21 0c f2 96 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #148: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0594 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a32290 | handling event EVENT_RETRANSMIT for parent state #149 | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #149 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #149 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49644.170421; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005712 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0ea80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #149 | libevent_malloc: new ptr-libevent@0x7fb36c03b0b0 size 128 "road-eastnet-nonat-149" #149: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #149) | ec 1b 62 37 44 a3 17 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 08 91 37 b8 3d c4 a5 fb 8f 59 2b cb c4 ee a3 | 59 01 01 81 cd 69 2d 85 93 60 f7 65 1f 64 aa eb | 93 60 17 84 59 2d ec 44 26 cf 20 fe db 7e d9 f6 | 7d a2 69 c3 4c ed d8 f3 0a 6b d4 5b e7 47 78 e3 | 80 3c 2c 01 cd d6 a8 65 7e cc 13 22 72 38 45 64 | 17 76 db 68 fd 9e 02 c1 4e e0 91 4f 14 0c 06 72 | 4e df 03 59 bc 72 4f af 9f 27 39 bd 57 c8 9d e1 | 90 f7 3b a1 d1 79 66 94 af 42 c3 62 cd d5 2d cd | ac 6c ea d6 94 1b f4 91 4d ad 49 21 48 4b 36 1c | 53 18 c6 23 73 5e 40 ed e6 7e 6a 25 d8 dd ef 07 | 7d 88 f4 a9 e1 ff e9 29 7d 10 cf 47 92 a2 72 35 | 95 c9 53 7e 8d f1 bb ba 54 1d 40 b5 a0 d1 1e d9 | 0b 86 d8 2d 01 1a 34 e1 77 f0 c8 57 84 a9 f4 dc | 35 1f 8e bc 5d f2 ca 58 ec a1 ad a9 cd 45 4a 2d | 23 38 26 ab df a9 05 75 cd 84 d4 66 7c be 9c f9 | 7f e7 96 6a 2b a4 d6 b4 04 50 ef ba e8 3c eb 60 | 29 00 00 24 f6 11 7c 5d 38 85 36 80 dd ed f7 d5 | 65 1c 39 a3 95 3d e4 a2 88 84 cf 2f 03 e4 0d 86 | 6f f9 18 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 49 c3 fc 0d 4b 5b dd c8 8b e4 44 | 1a 6a 18 02 f4 d1 ea f3 00 00 00 1c 00 00 40 05 | 4e f4 0c 8d 48 4d 9f e4 0b 19 05 64 48 99 98 79 | d2 ff 3d 6d | libevent_free: release ptr-libevent@0x7fb37c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a32290 | #149 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 1b 62 37 44 a3 17 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #149 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #149 | rejected packet: | ec 1b 62 37 44 a3 17 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #149: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61bd0 | handling event EVENT_RETRANSMIT for parent state #150 | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #150 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #150 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49644.234718; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007012 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a32290 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #150 | libevent_malloc: new ptr-libevent@0x7fb37c009640 size 128 "road-eastnet-nonat-150" #150: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #150) | 8a b6 09 5a 0a 8f be 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 2e 98 c4 69 1c 50 37 00 a8 8c d0 f1 d2 8c 28 | 94 f1 69 8e be e8 36 fe 99 97 d5 0c 37 4e 1b 26 | 9e e0 4e bd 73 a0 79 f4 5a 6b f2 8d 96 4f 03 3e | 0e 75 44 c8 2c a3 81 79 2e 0b 2e 8f 7d 7f dc f9 | 3f db 53 4d 6e 68 53 6c 49 99 36 00 d7 4f 7e e1 | 7e a7 57 fb ab 9f e1 d6 e7 24 3b 02 1f 12 10 de | 15 c5 08 ce f3 51 03 84 19 e7 47 83 1a 2e 38 c2 | 45 5b ab 60 7e 25 f4 92 0b eb 31 c2 32 59 f7 71 | 30 c7 ef cb 28 48 6e e3 c6 10 bc 9c 64 1e 68 59 | ee 88 40 85 37 40 80 12 7d 99 b2 33 c0 da 4b fb | 3a 39 ae b6 0e 0b 59 93 7d 9a d6 ee 50 27 09 f4 | a0 3a c3 63 a9 ac e9 9b 13 ed 9f a6 df 4f 55 3a | 82 36 63 e6 11 77 4d 54 ff a6 ad fe 0f 97 d9 c1 | 30 72 88 21 1f 78 34 56 b8 51 de f7 62 00 f9 29 | 66 5f d3 86 45 83 9d 48 c9 24 49 11 29 28 62 bd | 6e 8b 60 b5 72 8e cb ea 93 0b fd cb 0c 58 7b 88 | 29 00 00 24 36 30 98 85 8b 67 65 29 82 81 da 88 | 70 5a df 1d 0c c2 0c e8 b9 29 94 59 0f 89 5b 4b | 52 bc 0b a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 25 ba 47 28 1c 0e 38 fd e4 d3 0a | c8 ae 66 94 c0 bd 04 2b 00 00 00 1c 00 00 40 05 | 5a 15 ef 3e 5b 63 8d c2 17 ab ae 76 63 67 33 8b | f3 ee 4c d4 | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61bd0 | #150 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a b6 09 5a 0a 8f be 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #150 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #150 | rejected packet: | 8a b6 09 5a 0a 8f be 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #150: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aef6c0 | handling event EVENT_RETRANSMIT for parent state #151 | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #151 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #151 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49644.3021; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007206 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #151 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 "road-eastnet-nonat-151" #151: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #151) | d6 d5 c3 1b 58 0f 5c 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 37 31 25 ac 2b c6 c6 54 4a 25 58 cc 38 99 e0 | ed 33 16 21 c3 45 6a eb 3b a9 cb 98 85 d1 bc b2 | fb 43 f8 dc 85 42 20 a9 d4 7c dc c0 4c df 30 b1 | 6f cb 58 0b 5e 23 e6 14 ea 93 76 de 25 96 78 81 | 99 69 10 aa a3 9f ec 08 71 07 18 69 73 22 c9 ac | 3c e3 bf f1 09 8a 27 19 15 60 45 3d 4e 4f f3 e6 | c0 ab 4b c7 bb fb 2d 92 26 ca 7f de c4 f9 dd 4a | fa 18 2a 06 8c 14 94 9f a3 5d e6 b2 6b b0 ef e2 | 03 7f 7e f8 41 9d 8b 81 6b ea 4b 0b 45 f7 4c 93 | 70 05 72 9a ed 29 ed 3c 18 ca 66 2f d4 84 e6 4b | c1 2d 49 d6 3e cb 03 40 00 76 c7 f7 62 87 c5 1b | 85 d6 9d d1 8f 62 a3 ce 21 63 7a e5 94 35 85 13 | e3 c0 a5 2d 68 e8 0d 1f 37 ec 8c 55 12 d8 2a 1f | 06 81 5f d0 f4 ed e5 b1 5f c7 61 8a f0 5a 81 39 | 9f 6d e8 7f 5c 42 26 99 4f 51 2b 10 a9 6b b8 4c | a4 af 1c 69 f6 99 03 59 f6 8d eb d2 5c c8 04 4e | 29 00 00 24 3f 57 34 15 0e f6 1f 97 00 4e ca 13 | c7 48 27 43 fb 8e ac 87 27 dd cc da bb e1 5d 76 | d8 9b a6 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 1e a1 42 f7 31 41 ef 44 00 e7 a6 | 3d d6 a8 bb 50 6c 59 e3 00 00 00 1c 00 00 40 05 | 29 1a ff ca 49 77 f5 cd 99 41 a4 64 5f 6e 4a e7 | 0f a2 34 de | libevent_free: release ptr-libevent@0x7fb3400357c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aef6c0 | #151 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 d5 c3 1b 58 0f 5c 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #151 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #151 | rejected packet: | d6 d5 c3 1b 58 0f 5c 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #151: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35000d120 | handling event EVENT_RETRANSMIT for parent state #152 | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #152 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #152 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49644.371421; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.014911 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aef6c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #152 | libevent_malloc: new ptr-libevent@0x7fb3400357c0 size 128 "road-eastnet-nonat-152" #152: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #152) | c7 e3 df ec 9e c4 62 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a7 d8 bf 29 24 11 1c ce c6 eb 11 96 dd 30 8f aa | 0c 4c 70 ce 87 a4 df 43 d2 6c ba d5 f0 3b d8 41 | 39 bd 2b 1a 59 08 f6 28 59 f9 b3 0f e5 b5 40 32 | 97 af 83 49 1b 9c e1 41 6c 19 d9 81 bd 62 6f 16 | 88 77 9c c6 99 70 f5 87 ca bd 33 9d e4 05 6b 5b | c0 98 a4 04 59 99 ff a8 0d 45 13 de 94 59 78 3e | 9f 29 e2 f0 6e 7e b9 fe f0 0d e5 7f 5b 4c 01 84 | ef a7 c0 48 17 b5 cf 69 2f 9d 37 d6 9e 2c 49 b7 | 21 74 f9 23 52 39 e5 70 37 49 22 ad bf 6a ae c7 | 00 73 99 52 14 5a 01 1d ec dc e2 c6 b8 f0 0e df | bb 4f 3c 66 48 6a d8 f8 3d dd ce 84 36 d7 fe 75 | b0 8b 40 6c b7 0a 71 a4 a1 89 ca 62 6c e9 05 72 | 42 a3 a2 98 b2 36 46 5e b4 83 55 6f f7 d0 07 bb | be 2a 0c 02 1c 0f 1c ef 21 73 11 f7 92 da ee 38 | b3 d6 c9 03 8b 2f b8 eb 38 2b 9f 1a 71 81 4d 22 | 5e d5 1f 81 77 a6 9c 34 d3 30 8a 8b 41 61 5e 1b | 29 00 00 24 29 e4 ca ab 2a 30 18 fc 26 46 3c 50 | 1a f5 21 d0 52 38 f5 d5 7b 74 90 b3 b6 ed 01 58 | e0 d9 32 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 38 7f 4c 40 24 5c 70 b7 73 9c 98 | de a9 9b f3 50 76 96 bb 00 00 00 1c 00 00 40 05 | 28 07 96 1e 77 dd a7 3a bc 86 9b 87 bc da 1a a0 | d3 4f e8 fc | libevent_free: release ptr-libevent@0x7fb350012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35000d120 | #152 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 e3 df ec 9e c4 62 b6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #152 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #152 | rejected packet: | c7 e3 df ec 9e c4 62 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #152: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aacc80 | handling event EVENT_RETRANSMIT for parent state #153 | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #153 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #153 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49644.4277; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007358 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35000d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #153 | libevent_malloc: new ptr-libevent@0x7fb350012840 size 128 "road-eastnet-nonat-153" #153: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #153) | ed 10 7e d3 7b 33 74 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 23 2b fa a2 7a a7 c0 a4 0c c7 9f 58 c4 e7 e8 | 70 a1 a8 0f 51 5f a2 04 f4 14 9f d7 e2 33 9b d1 | 70 a9 9d e5 73 3e d4 0c 84 28 f3 47 b9 3c 03 49 | 98 c3 54 58 79 2a 6a d2 f7 19 34 3f ea 9b 09 66 | 26 4b 77 9a 2e 2d 06 7d b1 99 09 62 d6 ef 52 44 | 03 d0 e7 2e 96 a1 8d 5c ea 4e a7 ca 7e fb ac a0 | 2f ea 86 d8 ac 11 f8 20 6b 77 af c2 6c 84 38 e7 | 8a b3 d4 12 59 8f 14 90 f8 a1 09 66 1f 57 d8 3c | 73 c4 11 8b a8 7f b3 1e 97 ed 1c 65 90 26 33 5b | 30 76 3b 3b d5 b4 96 62 cb 7d 86 9d ad 4a 9e e5 | 2b b2 c9 9e 69 f5 8a e4 08 29 24 90 1c 8f 81 c4 | d0 5a 30 f4 83 2c f9 11 5c 07 b1 f7 f6 7a 22 ac | 46 53 33 91 c1 25 ad 6c f8 ee d4 49 b1 09 fc 61 | 27 91 e2 9d 17 78 bb a6 45 04 eb ad 01 76 59 27 | df 49 c6 69 61 22 0d b2 77 f2 e5 49 0e d0 19 37 | f9 e3 3c 5d ab 0d ee 24 0e 3a 1b 87 b3 59 f2 dd | 29 00 00 24 11 3e 89 f2 e4 5a b4 91 6f f3 6f e0 | 10 78 d4 00 e7 63 f4 34 67 6a f8 b4 dc 99 94 12 | b9 1e 59 e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cc 1e 02 bf 67 12 0b 49 15 df fb a0 | 1b e0 2a 30 f1 cf bd 20 00 00 00 1c 00 00 40 05 | ce 1d 48 38 8b bc 75 71 1c ff 01 f5 d1 af 95 90 | 14 3b df 16 | libevent_free: release ptr-libevent@0x7fb3780407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aacc80 | #153 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 10 7e d3 7b 33 74 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #153 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #153 | rejected packet: | ed 10 7e d3 7b 33 74 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #153: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9f380 | handling event EVENT_RETRANSMIT for parent state #154 | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #154 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #154 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49644.502031; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.020007 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aacc80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #154 | libevent_malloc: new ptr-libevent@0x7fb3780407f0 size 128 "road-eastnet-nonat-154" #154: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #154) | 58 44 d0 f4 a9 dc 50 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 19 a5 f0 13 d1 8a b9 49 96 a8 fe 61 6f 4c e6 | ed 98 cc 8a 65 9d e4 af 10 e6 cf 62 f8 4a ff 02 | 90 85 dd 9e 23 5d 3e 90 f8 fe da b0 af 0e f7 4d | 4a 05 63 a1 69 db d1 01 e1 b1 0c 86 c9 3e 7d 9b | a4 2a 0f 98 09 40 36 8c 8d db ff 98 96 15 32 bf | 21 16 30 40 ae ae fb 4d 47 43 6a 1d c4 ee 0d b8 | 26 d3 b2 3f 2c ab f7 f8 0e a5 40 0f 3a fc 7c 80 | cc 8b 34 d2 f1 7f 26 73 45 a4 a9 ed 44 96 56 b1 | 73 9b 2b 0c 92 10 cb f0 48 16 48 7a 38 20 64 1d | 96 ee 19 8c 5c 7f a1 2d 3c cf aa b0 87 20 50 5a | d7 fe ed 1e da e9 09 e6 09 9a 75 a1 17 60 9e 3f | eb eb 3b 4a e8 5b e7 e1 61 2b a2 e0 ec 37 4d 19 | 5f 61 62 98 dd f9 aa d9 4b 8e bd 76 64 f0 89 37 | 39 0c 99 e6 f2 9b c5 88 8a eb 5b 10 1d 66 5f 10 | c6 5a 71 1c 22 22 ac a4 dd 72 16 46 60 ff 04 a0 | 8f 7a b8 da e1 39 b2 3e 50 39 72 e6 6a 86 81 1e | 29 00 00 24 8a 71 f4 36 cf 99 83 f2 20 30 a8 af | 91 e1 58 d7 2f 81 0b 43 f4 5f a3 87 48 cc 52 31 | 9b 27 40 b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 21 57 f3 9f 4c 07 c6 03 b1 b0 7f | 5c 7f 90 aa ef 12 66 a4 00 00 00 1c 00 00 40 05 | de 38 70 15 e3 5a 3a 70 b8 42 a9 af 5d 6c a1 ee | f3 f1 65 20 | libevent_free: release ptr-libevent@0x7fb36402ffd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9f380 | #154 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 44 d0 f4 a9 dc 50 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #154 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #154 | rejected packet: | 58 44 d0 f4 a9 dc 50 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #154: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.079 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b026c0 | handling event EVENT_RETRANSMIT for parent state #155 | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #155 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #155 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49644.552441; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007376 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9f380 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #155 | libevent_malloc: new ptr-libevent@0x7fb36402ffd0 size 128 "road-eastnet-nonat-155" #155: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #155) | ba 2d 75 59 38 9a 40 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 2d 8b bd fb e0 3e 63 93 cb 94 a3 59 ba 66 52 | 15 4e 4f 76 34 6f 63 6c 04 46 3b 73 fd d8 a5 8e | 35 33 06 7a 8c 2a 4d a0 d2 b7 a5 ef 60 5a a8 23 | ae c6 93 50 9f f0 c3 f5 06 df 4c 45 c0 4d 3b 90 | 71 b1 18 44 3a bb 92 05 e2 cb 38 9c 05 04 9c e5 | 33 86 8c 22 6f 05 07 53 37 10 99 50 e7 0b 25 55 | 89 9d 75 47 09 a1 92 af c6 86 5d 17 e6 b3 28 20 | 26 34 0c 4e a0 b6 47 51 4c df 53 f2 97 03 03 a6 | 89 4b b3 92 4a ab b5 e2 4b 58 52 5d fc 27 cb e8 | 64 f4 d9 2f f4 95 21 72 e7 fe 03 93 84 af de ff | 1c 75 39 21 b3 f9 de 3e e2 ac 5f bb e7 9f 0c bd | 32 99 99 15 33 bb 7d f8 f9 aa 92 5a 38 4d 6d 97 | 0e 69 3d a1 d8 b7 8f 44 ed 36 63 50 f7 7e 74 d2 | 45 dc 02 6e 87 72 5d 06 c1 0c 87 2a 42 4a 0c 96 | e5 33 b2 8a 28 de 43 7b 5c 89 da 84 03 93 af 07 | 0f 41 63 be 8b 32 2d a1 13 d7 f4 a0 78 5d 7b 02 | 29 00 00 24 1b 6f 61 ca 07 05 56 47 f0 44 a9 2b | df 2e 5b cb e9 85 db 0d bf 4e 16 8e a5 b1 b6 3b | d1 6b b0 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 9d 23 9a a7 98 84 7a 80 70 0e 3e | c4 f1 43 a7 4e 6b 6b 59 00 00 00 1c 00 00 40 05 | 2e 42 b0 ef a0 75 a1 7c 37 dd 50 d1 c0 f7 e8 21 | 72 07 2b e7 | libevent_free: release ptr-libevent@0x7fb388048a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b026c0 | #155 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 2d 75 59 38 9a 40 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #155 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #155 | rejected packet: | ba 2d 75 59 38 9a 40 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #155: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0672 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abe780 | handling event EVENT_RETRANSMIT for parent state #156 | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #156 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #156 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49644.616805; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006248 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b026c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #156 | libevent_malloc: new ptr-libevent@0x7fb388048a80 size 128 "road-eastnet-nonat-156" #156: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #156) | dd 32 b7 34 a5 67 d1 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 18 58 47 50 60 00 e3 2a ab 04 ac a5 14 a4 e1 f8 | 89 44 71 9e b6 e2 f8 e1 89 a3 38 1e eb a4 57 9b | c0 92 a7 d8 d8 8c 0f 8c f9 d0 36 f7 8d 04 cc a1 | 61 5a bc bb 35 d5 16 ad 1c 27 3b fa 1b a3 4f 77 | 4e 80 47 b0 e1 83 82 b2 b5 df c4 bc d9 8d 01 04 | 4e b5 a6 60 d4 4f b3 0f 13 49 05 d9 85 5d f8 18 | 24 40 91 d1 3d 7e 6a 98 45 d7 dd 05 70 e0 c6 57 | c1 84 e8 77 d6 e2 7f 57 50 49 e0 f2 9f b0 43 93 | be 02 be f3 99 3a 02 72 36 17 a3 a7 b6 d3 1e 0b | e7 53 c6 c9 cc d5 25 75 87 c0 73 6c 5f 57 27 d6 | 52 91 24 4a 97 d3 d6 0e af 8d 6c 52 24 2d ea 91 | a1 73 e1 9e 71 14 d1 4f eb 25 67 a3 b8 12 64 b9 | 8a 15 3f 88 bc 65 32 65 96 0c ff f7 b9 a7 84 11 | bd 40 10 e1 dc 1a 04 fe 8c 35 23 2a ec b7 33 72 | 4b f4 4a e9 9d f1 da a3 b6 9c fe 09 27 14 3a 79 | 5d 82 c7 e0 9b d4 a3 ce 53 68 f7 6f b3 06 c9 71 | 29 00 00 24 b7 44 fe 38 00 43 d3 2b ff 97 13 ca | 89 7c c3 ed e0 15 4d 76 12 7b b9 2f 48 9b b5 b3 | 8b 4d ce 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 13 6e 65 76 b7 ef f6 88 e7 f3 9e | f3 f9 5a bb 01 8b 91 4f 00 00 00 1c 00 00 40 05 | 4f 93 4d ef 0e 69 28 8b f3 02 75 93 a5 b3 16 9b | e0 c9 4b 18 | libevent_free: release ptr-libevent@0x7fb3500300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe780 | #156 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd 32 b7 34 a5 67 d1 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #156 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #156 | rejected packet: | dd 32 b7 34 a5 67 d1 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #156: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0481 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7b910 | handling event EVENT_RETRANSMIT for parent state #157 | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #157 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #157 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49644.68811; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.012964 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe780 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #157 | libevent_malloc: new ptr-libevent@0x7fb3500300e0 size 128 "road-eastnet-nonat-157" #157: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #157) | 58 3c 05 73 d3 10 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 16 05 06 2f 3b 22 9e 88 08 ab fe 29 25 f8 32 23 | d0 15 af d8 5f 65 e8 be c6 03 98 0f 18 e5 00 77 | 99 86 03 c7 fc 1b e8 83 43 61 ba 00 0c dc 29 59 | 0d fd 85 a1 75 5e f3 f7 d2 64 26 3b e1 11 43 3a | 94 43 08 73 30 5e 1d 91 aa 8f 9d c1 5c 52 ae c1 | 1d 90 3b cb 44 47 58 f3 40 38 01 58 63 65 29 32 | b6 4a 78 a5 71 58 c1 30 ea 73 8e 14 71 72 8e df | ee 45 ee f6 d2 a7 99 89 1c 7b fc 81 aa fe 75 bb | 36 cb a8 81 eb 73 7b eb 5a e7 fa 6d e5 b4 95 b2 | be 54 f3 23 c2 44 23 4a b5 30 87 1d 26 24 c6 c4 | 6b d1 5d 1a 24 7a 69 b5 9b 7f 97 17 e0 18 0f 6f | 1f f9 f1 e8 6c 46 2c d8 28 aa 7c 1d ec ed d6 d3 | b6 eb c6 eb 3b 55 59 5b 10 23 06 f1 f2 aa 19 3c | 8e ca 99 c8 e5 ba 47 04 47 84 62 13 96 06 08 0d | 88 7a a1 63 08 7b df 84 fd 48 36 29 3e 5c 44 7d | 05 23 1e 33 96 d8 b6 34 ea b3 94 6e cc d2 07 97 | 29 00 00 24 a9 6f a2 6f e4 cf 6b 0e 7b b9 69 24 | 56 3d ee de fe c6 39 89 8e 14 c9 0f 9e 2f 60 95 | f7 4e c6 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 bf ce be 86 a6 d7 14 f3 ba 0e 49 | ee d2 d5 26 4c 2e 13 18 00 00 00 1c 00 00 40 05 | 0a 36 59 95 a8 fb 5c 3b ea 04 70 de 29 72 15 40 | a3 00 f6 34 | libevent_free: release ptr-libevent@0x7fb37803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7b910 | #157 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 58 3c 05 73 d3 10 8c 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #157 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #157 | rejected packet: | 58 3c 05 73 d3 10 8c 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #157: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61c10 | handling event EVENT_RETRANSMIT for parent state #158 | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #158 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #158 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49644.744461; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006058 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7b910 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #158 | libevent_malloc: new ptr-libevent@0x7fb37803b0b0 size 128 "road-eastnet-nonat-158" #158: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #158) | e6 a0 1a 4e 16 85 73 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d fe 92 1d 51 a7 6d 12 34 05 5b 88 3c 14 89 6b | 35 8c a3 94 b4 c5 44 d8 4b 8c 87 4c af 0d 5e 27 | cd 39 40 ee d3 b1 d8 0b a2 08 8c 95 70 dc 7c 67 | 00 94 18 0b cc 36 ba 02 42 ac 1b 6e 83 e8 f3 b5 | 91 59 9d ad e6 9f 36 2d a8 98 92 82 b5 58 8d 17 | e8 c3 14 93 e3 79 91 5b e9 d6 f6 a5 7b ab 15 3e | 02 89 3b e3 40 68 94 7c a5 09 b7 59 3e c5 6a 99 | 03 29 08 a9 4d cb 54 e8 24 b9 ad 4e d9 ec 0b 15 | 00 2a bb 1a df 73 04 f9 ab 12 4b db 50 44 e0 e2 | 22 35 8e 9a 3a 55 04 43 31 37 ac 1b 04 2e 40 6f | a3 ce 4b 7d 81 aa 0c 4f 00 20 e7 14 67 8a 92 03 | be 6c 2c b0 1e 89 ff eb d0 66 ac db b5 5f 07 46 | 34 4e 75 3e 19 4d d5 e5 2d 16 89 cc 75 86 80 6f | 3f aa e7 c1 07 a0 f4 7f 40 db 1c df 1d 97 4e 83 | 99 fc 4e 29 fa a7 c5 07 07 e9 c0 d9 34 f7 42 65 | b3 46 1d 34 7e 34 fc b8 2a d6 72 9b 56 fa c8 74 | 29 00 00 24 93 3e 30 9d 56 73 68 ed 32 94 90 87 | db 7b 56 ae fd bb a5 6c 98 47 2c cb b8 9c 69 c6 | ac 01 dc 09 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 af 5c ca 3f 10 b2 e1 eb 3b d6 06 3e | 82 97 94 30 e1 e8 70 cd 00 00 00 1c 00 00 40 05 | bb 02 3a cc bb 31 72 ec b9 81 77 29 32 3e e8 21 | a2 17 d3 ee | libevent_free: release ptr-libevent@0x7fb36801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61c10 | #158 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e6 a0 1a 4e 16 85 73 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #158 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #158 | rejected packet: | e6 a0 1a 4e 16 85 73 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #158: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0705 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf00 | handling event EVENT_RETRANSMIT for parent state #159 | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #159 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #159 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49644.819841; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.018006 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61c10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #159 | libevent_malloc: new ptr-libevent@0x7fb36801d920 size 128 "road-eastnet-nonat-159" #159: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #159) | 9d f6 62 77 51 33 7c 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 a4 0d 7c 3f bb 62 60 89 5b f7 52 ab d7 ca 61 | c6 32 47 69 10 70 7b 4b b6 2a 70 55 d5 38 a9 c2 | 06 fe 6f 0d a3 c3 18 2d 09 43 b4 f7 9b ba 82 ec | 93 e7 fe 37 c0 9d ff 14 eb fc f4 a5 4f eb f2 e9 | 81 40 d5 d7 0d b6 64 ad 86 89 bc 12 73 da 31 6d | 21 c9 f1 76 ef e5 fa c1 2f 00 73 7b 29 f7 14 d0 | cc 33 12 7b be c7 0b 95 25 c7 3c c9 94 8d 40 b3 | 24 76 27 7e c2 06 53 7c 39 6a 80 69 0a b2 fa aa | 13 ac 6b d9 25 77 ea de 54 91 5a 44 b0 3f bb f5 | d7 05 e4 68 6e f2 57 14 f5 2f 93 5c 8b e1 18 57 | a7 aa 40 49 0b b7 ce d1 00 80 ba 6e 5e cc 5b a3 | 7d 08 af 9a a8 cd d2 ac df 34 27 c2 04 7d d9 9f | e2 bf b9 fd 43 84 3d e1 23 56 2b 91 01 a7 94 b9 | 39 80 83 eb c5 4c de ac 80 1d 05 1e 22 14 a6 fb | 08 b1 be 3f 9b 24 b0 c4 63 eb 31 8d 24 20 37 93 | 7d fa a5 c0 26 eb c3 7c ae e2 24 2a 4f 31 bf c0 | 29 00 00 24 93 99 a4 63 0d 72 bd 0a 86 bd f8 14 | bb 6c 2c e3 e4 66 d1 1e e3 70 5a 2a 46 97 fd 74 | 37 df 1f 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 4a e8 13 db 7e 81 08 43 48 ab 41 | d6 8f 57 84 74 b1 75 e1 00 00 00 1c 00 00 40 05 | 43 72 1d eb 44 7d 24 cc 39 78 4a ec 22 c2 1a 4e | 3d 2f 0c bd | libevent_free: release ptr-libevent@0x7fb38402d380 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf00 | #159 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d f6 62 77 51 33 7c 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #159 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #159 | rejected packet: | 9d f6 62 77 51 33 7c 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #159: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0672 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a89700 | handling event EVENT_RETRANSMIT for parent state #160 | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #160 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #160 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49644.876186; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008501 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf00 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #160 | libevent_malloc: new ptr-libevent@0x7fb38402d380 size 128 "road-eastnet-nonat-160" #160: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #160) | ec 91 fb f1 0c bb 28 b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 30 17 61 87 0e 49 c3 b5 8e 06 e9 0f 8d 98 6f | af 06 7c a8 d8 5f dc 88 0a 69 f2 9d 79 59 e2 95 | a1 fb db 6f 1f 95 32 7b b7 f9 9f f9 87 3d 1e fd | 84 a3 dc 5e 41 59 c7 3d 40 a9 2a 90 d5 3d ec a5 | 70 8f 09 86 de c0 6f f0 8b 3d 45 2f a8 92 74 65 | dc 5a 07 23 6d 89 30 20 25 5a 37 b2 af 30 d2 98 | c2 6a 98 57 d0 a0 8f ff e2 c6 37 8c 7f c8 5e c3 | 9d 98 d2 5d 5e 70 59 77 03 8a bf 2a a1 c0 c1 c0 | 77 97 84 ec 45 c7 38 00 39 c5 2e 6a 0f 64 17 e5 | 6e 90 68 05 f5 f6 24 a7 89 fc 3d ac 97 b9 b8 8e | 69 68 d2 76 c0 8b ed 21 84 18 d2 89 99 90 e5 b1 | e9 a1 7c 9d 78 af 48 90 e7 1b 1a 7c 29 30 21 6e | 39 f7 cd b5 93 ab 03 d1 25 14 24 ad 0e 2c 3a 55 | 23 bf 0e 11 13 d6 6c 92 56 a2 2e ac 22 4b 36 72 | 62 e4 c0 2c 6e a1 80 10 e9 1f 33 37 5b 82 aa ab | bc d0 55 fd fd 61 98 d4 55 8c e5 05 44 59 3d 11 | 29 00 00 24 5a 7f a2 3e 7b 7f ae 84 88 a2 b0 db | 20 96 18 8a e9 32 7e 19 52 af 25 1a 74 e6 9f 5e | 17 1f 26 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 25 02 d7 0c d0 85 e5 86 af b4 01 | ce 64 18 db 06 ad 6a 73 00 00 00 1c 00 00 40 05 | 33 04 36 eb ae 2e 87 8f ec 4d 9c 69 20 d1 b8 6e | 57 bb 48 2f | libevent_free: release ptr-libevent@0x7fb34802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a89700 | #160 spent 0.0994 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec 91 fb f1 0c bb 28 b3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #160 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #160 | rejected packet: | ec 91 fb f1 0c bb 28 b3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #160: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35400d120 | handling event EVENT_RETRANSMIT for parent state #161 | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #161 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #161 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49644.942493; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.012539 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a89700 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #161 | libevent_malloc: new ptr-libevent@0x7fb34802a950 size 128 "road-eastnet-nonat-161" #161: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #161) | 0e 21 c5 28 e0 11 16 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 b1 7e f7 73 9d 3d 0b 9c d2 8e 29 c6 08 34 06 | 2d dc ae 10 7c 53 33 af cd 18 8c 8c 37 fc eb 71 | 2c 3b de 0f 76 b3 63 bc 1c 05 f0 af 4b 44 5e c7 | 23 d4 29 d3 16 0f fb 8c 12 fb 18 1d 9e 65 94 73 | c1 7f 44 d2 39 97 a4 57 24 65 09 c9 9f 95 0f 07 | 98 bb c4 fc e8 f9 84 20 79 d3 9b da f2 f3 7b ff | 76 4d 74 89 ed 7a aa a4 38 3a 39 de f9 ec 60 48 | 7f 57 eb 50 ff 9b 33 98 7d 3b 5f cc 64 ba 1b 81 | 67 2a 02 26 ec 3f 45 a5 fe c6 9b 0d 1d 37 b0 40 | 01 1f 97 01 e8 87 5e 53 40 bf fb d3 7e 9e 2e b3 | 15 ba fc 8b b1 4a 7e fa af 94 c4 67 c0 2c 29 d2 | 74 fe d7 24 50 34 48 da f7 a1 54 c5 1c 2b 5a 35 | 33 a6 86 42 a8 e3 25 9b e3 fe 4c de 22 93 ae dd | c7 11 a7 9f 05 b4 87 2f a1 b9 2b f6 21 37 9c 8e | 50 21 6a 50 8e bd 1d 5f a1 42 92 50 68 2f 4e 9a | 54 04 e8 cc b9 5f 82 df 48 23 c8 76 49 63 f0 50 | 29 00 00 24 b8 74 18 e1 c4 b4 30 2e a4 31 94 25 | 46 e1 dc 47 b5 0b e4 ae a0 1d 11 3a f1 77 67 fa | 52 d5 2a a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 94 bf 28 28 ea 74 13 ca 7d 07 ba | 5d 79 38 7b d7 5d 40 d3 00 00 00 1c 00 00 40 05 | aa 2f 88 27 56 8a 2e 19 5d ff 44 bb aa 2d 48 42 | c7 75 31 6a | libevent_free: release ptr-libevent@0x7fb354012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400d120 | #161 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 21 c5 28 e0 11 16 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #161 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #161 | rejected packet: | 0e 21 c5 28 e0 11 16 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #161: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa34c0 | handling event EVENT_RETRANSMIT for parent state #162 | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #162 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #162 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49645.014836; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007285 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #162 | libevent_malloc: new ptr-libevent@0x7fb354012840 size 128 "road-eastnet-nonat-162" #162: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #162) | 3b bf da 45 10 1c 63 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 2a 00 6f 37 4b f5 08 dc 2d d5 a4 5f d7 a7 d8 | a8 4d 31 bb 56 e7 51 71 5b 5d fc c8 0e 08 fb e2 | c0 7c 0d 9e fa 59 01 dc 52 d2 c1 e7 2f 1a e5 b4 | 5b d5 c8 45 b5 dd 91 a9 d5 c3 73 76 9d 7e fd b8 | f9 df d1 f8 01 94 2b 6f e5 9a 29 12 9e de 27 97 | 71 f3 e6 1b 74 76 a7 3a 8c e6 a9 61 00 52 7e f7 | c9 6f 55 40 33 0a 80 4c aa c5 55 f4 4e 14 8a a7 | 71 a6 78 3d d0 59 58 77 2f 99 7c 4c c3 1e 74 08 | f9 85 d0 5e 65 f5 6a 31 d7 63 2d f9 e8 59 8b 16 | 32 89 82 d2 3f 02 ed 88 92 cb b0 35 d8 db 40 15 | 72 43 38 f2 76 11 5a 75 77 0e 67 e7 50 ab d6 be | 45 bd 9e 45 2f 01 23 b3 e6 91 d2 ea db c5 26 44 | 62 95 26 52 cc d7 f4 4b d1 06 28 b1 bb 01 1a 47 | 2c 16 e5 b8 18 7a 69 d5 78 76 2f ea 81 85 bf fa | 27 ed 91 6a 8a 48 18 3c 3f 20 85 89 ae e6 4e 97 | 89 5c 72 59 c7 16 4a 7b 0a b0 0c 8e 44 0c ca 39 | 29 00 00 24 95 de a1 84 1b 6b 5e e8 be 4d c4 44 | d7 89 7f ff f7 3c d6 b5 51 9e bf df 42 03 ca bf | 75 41 b7 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 45 b2 30 32 2f 26 ad dc fc 75 7c | 7f bc 91 0d 37 21 2d 1b 00 00 00 1c 00 00 40 05 | b1 72 3a ba 32 f9 7a 15 ec b8 bb 62 7e ea 84 2a | af f4 56 24 | libevent_free: release ptr-libevent@0x7fb380022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa34c0 | #162 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3b bf da 45 10 1c 63 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #162 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #162 | rejected packet: | 3b bf da 45 10 1c 63 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #162: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8d840 | handling event EVENT_RETRANSMIT for parent state #163 | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #163 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #163 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49645.08212; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.013577 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa34c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #163 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 "road-eastnet-nonat-163" #163: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #163) | b1 c1 5c f9 4d 0c 91 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 d1 ee ef 57 4d b8 a5 18 99 63 b7 ad a0 31 43 | d2 4c 84 95 c1 56 d8 c2 a0 e0 21 45 55 6c 89 41 | 0a ee 26 bb ae 9b 55 18 51 40 94 3e b5 e8 52 b3 | f5 21 f9 c6 39 17 43 69 05 cf af ff e3 2c 05 76 | 7f cc d0 9f 70 3b df 95 16 de 0c 79 98 56 e5 a0 | 35 3e 81 89 f8 f4 57 f4 b0 38 84 5c 5c 95 c5 75 | db 5d ff 22 a3 04 68 2a 25 a8 ca 43 e9 88 c1 c7 | f1 52 93 65 ec 22 3d 52 6b b8 00 65 57 c2 e3 a8 | 9e 23 a1 b2 55 fc 9b 13 25 aa af 20 21 98 a7 a2 | 67 94 3b 2e 91 84 12 14 99 be b3 af 12 1e 8a 45 | f6 79 09 3e 9e e8 3f fa a3 e8 99 22 6f d9 b8 e7 | 13 bd 62 da a2 36 db a1 c0 b9 40 6d 4f e4 fd e0 | be a7 dc c7 36 bf 14 ea 84 eb 4f 8e 85 9d 9c de | 91 8b 80 a4 7b dc e6 20 7f bc ce 40 33 ff 25 de | 32 53 56 b7 10 56 66 76 3f 7a e3 c4 c5 0e a7 df | 21 e3 47 1d 5c 2e 41 54 d0 87 c6 c9 9f 14 d5 5a | 29 00 00 24 cf 96 ac 26 a7 c4 21 b6 9b dc fc 7a | 6b 63 82 8c ca 2e ba 40 54 d7 a8 1f 94 42 b0 f9 | 02 a1 4a 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 05 f9 8b c8 3a 1a ac 16 65 f3 b7 | 0f 08 b9 7b 40 ca e7 92 00 00 00 1c 00 00 40 05 | 34 4b bc c5 91 2d b9 5e a5 87 8c 3c 9e 2e e2 11 | d1 e0 38 4e | libevent_free: release ptr-libevent@0x7fb3680300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8d840 | #163 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 c1 5c f9 4d 0c 91 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #163 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #163 | rejected packet: | b1 c1 5c f9 4d 0c 91 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #163: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1c490 | handling event EVENT_RETRANSMIT for parent state #164 | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #164 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #164 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49645.142429; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.010892 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8d840 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #164 | libevent_malloc: new ptr-libevent@0x7fb3680300e0 size 128 "road-eastnet-nonat-164" #164: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #164) | 44 ec da ac e4 4e 81 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 94 19 dd 63 76 e7 8b e4 83 63 43 89 b2 25 2d | cf 02 f9 4f bb e0 9f 71 73 45 f7 70 9f f0 9c 56 | 36 6b be c1 42 fc 0e 64 e7 c2 6d 24 a0 c6 36 60 | f7 b6 44 63 1f f0 38 ff c1 f7 6f 09 6f 4b 15 6f | 4b a9 13 86 3c 04 b4 e0 2d 41 b8 5f 44 ac d3 1c | 62 7f f8 b0 79 c8 65 ec 61 21 a8 52 27 b3 79 db | 53 67 7e 4f 89 b2 45 b9 ee 3a 63 76 a6 cd 73 36 | 58 41 37 8e 8c 8a ef d6 60 54 ff 74 54 a2 07 6a | 56 54 10 22 af 8e 9e 38 af 48 a8 f2 42 f1 a6 05 | c8 55 0c 92 44 27 a3 4d be a5 b4 50 92 f3 bb 45 | b6 87 15 6c 92 a5 f1 21 ba 44 19 05 5c 4c f2 dd | 7d 64 1c 49 e3 61 8b 21 2c ef 63 14 91 93 e6 e8 | 84 82 9f 30 40 50 49 82 eb b8 19 d0 b6 4a c4 be | 05 18 e6 9d 08 3f bb c7 7a 98 44 e5 42 f9 eb fa | fc 80 53 22 fc 7c b9 e3 92 39 dd 88 61 10 2d 74 | 06 8e 96 3a 48 45 58 41 40 85 53 83 03 19 1d 49 | 29 00 00 24 e5 04 5f 5d b9 93 eb b6 f3 88 8f 81 | b6 50 c2 5a e0 91 27 94 ef 3b 1e 82 c9 33 1d 99 | 72 cc f9 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 91 cd 86 69 c3 fa 02 39 bf fc f5 08 | 1b bd f9 dc 60 39 91 12 00 00 00 1c 00 00 40 05 | 76 11 49 93 b0 52 97 cc bc 0b 84 d2 15 33 08 b4 | 9a f9 d3 5b | libevent_free: release ptr-libevent@0x7fb35403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c490 | #164 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ec da ac e4 4e 81 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #164 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #164 | rejected packet: | 44 ec da ac e4 4e 81 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #164: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.055 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25c80 | handling event EVENT_RETRANSMIT for parent state #165 | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #165 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #165 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49645.203789; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005317 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c490 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #165 | libevent_malloc: new ptr-libevent@0x7fb35403b0b0 size 128 "road-eastnet-nonat-165" #165: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #165) | 84 89 ec 12 36 85 f6 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 64 07 de ac 8a b1 da f5 cd 1e 8a 72 06 02 07 | b4 71 02 7a d1 b4 70 86 ed 7c e5 04 db 06 11 b0 | 70 66 08 44 59 b7 49 22 d3 ba f4 ee ab fa 59 73 | b1 06 c3 8e 52 a6 3b 08 b7 93 04 a1 45 f3 91 38 | 82 d7 95 0c b3 fe bf fd 60 7f 15 7a b2 c9 6e 96 | 31 f3 92 9f 9b d4 51 14 46 6d a7 f8 2c 3c c3 fe | 86 c5 71 52 b8 28 62 77 5e 36 d1 7b 6a db 03 2c | f5 d4 3e 3d 1f 4e cb e7 cf b8 d2 9f e6 10 67 e1 | a3 1a 3a 9b e2 59 8a f3 f7 c0 58 cc fc 02 e0 b1 | da aa 4f e9 d2 86 5e 94 d6 73 96 ea 14 32 c4 4e | 3d c9 38 94 c5 47 af 83 6c ee e9 2a a3 8b e4 12 | f9 91 c1 53 48 67 8c 42 6e c0 7e 45 20 2e 6a a6 | d3 98 3e 6d d1 40 3d 9d 84 9f 54 62 49 b6 f8 67 | 32 fb 70 e2 78 08 b2 de c4 3e 70 08 0b 45 41 d7 | 34 49 14 7d a4 bf 53 d6 45 c5 fb 03 1e ef d6 06 | 6f 22 f9 f9 7c 4f e3 63 ea 02 1e 63 6e 3d 4d 36 | 29 00 00 24 a3 25 18 45 df 55 70 c4 52 41 87 e0 | ac 0c cb c2 e9 c1 36 19 df a3 78 76 61 ca c0 73 | a3 74 0a f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 2e 20 30 11 5b 47 b9 0d c9 d3 63 | b9 57 85 b4 89 e5 03 11 00 00 00 1c 00 00 40 05 | 69 81 91 3b c9 31 0b 05 42 34 36 76 be 6a 34 94 | 71 f5 f0 25 | libevent_free: release ptr-libevent@0x7fb37c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c80 | #165 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 89 ec 12 36 85 f6 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #165 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #165 | rejected packet: | 84 89 ec 12 36 85 f6 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #165: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0733 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a70b50 | handling event EVENT_RETRANSMIT for parent state #166 | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #166 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #166 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49645.269156; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007243 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #166 | libevent_malloc: new ptr-libevent@0x7fb37c04b7c0 size 128 "road-eastnet-nonat-166" #166: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #166) | d7 12 9c be 9a d9 20 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b c9 02 ed 54 28 bb 69 3a fa da 89 fc 4e 39 8f | a4 d9 5e 2f e7 5a f0 78 e4 4f 3d 81 ef 79 61 1f | a3 10 38 af aa 4b f6 ef 84 82 56 19 cd b4 c3 5b | aa a8 08 49 1f b4 b8 b1 4e cd 8c 0c 86 09 40 1d | 3a ac 4d 85 be 4c 1d e8 f2 bd e7 23 97 c2 da f8 | 65 82 fb 26 55 00 06 12 19 2c fe d3 7b c4 ff 31 | 3f 92 30 47 40 04 59 ba c0 27 99 b0 dd 45 22 cb | 97 1b 7a c0 ab ef 56 9c f3 d7 45 a0 a5 37 a3 b2 | 58 e2 9e 19 5e 81 d9 fa 7b fe 78 35 15 83 01 42 | 24 2c 5a ee 4f 05 09 f4 1d dd c3 06 45 d3 ea 94 | 81 04 37 3a 2a 09 3c 79 d8 7b 16 c9 e4 4e 70 57 | ac 53 d9 f3 76 57 6b 10 ff a1 91 96 c5 09 1d b2 | 37 da 15 c6 76 39 0e 79 8e b4 e3 6b b6 34 b5 ee | 59 40 13 d1 7e a5 f4 50 26 80 c7 4d 2f bd 97 83 | 7b 42 78 41 a6 62 d7 58 6e e8 20 3d f8 07 e4 57 | 49 7e 0c 32 68 81 0c ed 46 bc 7b e3 e1 f5 77 38 | 29 00 00 24 a6 0c 32 e7 5a d1 b5 ca 07 42 9a 49 | 78 63 23 e6 6a be e5 1f b9 dd 49 81 36 5a 86 c7 | 6b 23 86 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 81 0a 2e 3d e5 a2 7d c2 7a 52 36 | 53 f5 16 ff 78 27 b0 06 00 00 00 1c 00 00 40 05 | 82 68 99 97 5e 62 33 7b 33 19 33 98 83 8d 7f b1 | f3 01 32 b7 | libevent_free: release ptr-libevent@0x7fb35001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b50 | #166 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 12 9c be 9a d9 20 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #166 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #166 | rejected packet: | d7 12 9c be 9a d9 20 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #166: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0702 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25cc0 | handling event EVENT_RETRANSMIT for parent state #167 | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #167 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #167 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49645.336128; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008869 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b50 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #167 | libevent_malloc: new ptr-libevent@0x7fb35001d920 size 128 "road-eastnet-nonat-167" #167: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #167) | d1 34 e0 8f fb 7c 13 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 06 19 19 47 f8 53 ed d0 cd 1b 23 74 a8 df 03 3c | 9b a0 ef 95 f1 ce f6 ae 26 37 05 42 40 f8 1b 11 | 25 b6 88 f4 08 21 89 99 64 30 46 35 2b e5 72 51 | 22 12 a5 4d 09 28 30 73 8d 80 f8 3e 6a c2 3d d6 | 8d b5 a5 60 de 1d e9 8e c3 96 be eb 9a e4 82 44 | cd c0 61 18 61 45 71 3d 05 11 06 a9 ca 4e 06 4e | cb 22 e9 93 7b 78 bf 7f 83 42 10 73 45 d5 b3 1b | 92 fd 26 c3 64 99 f5 61 c8 1f 64 c2 09 10 74 12 | fd fe 01 de ac 29 c7 4b 49 1a d9 8d 7a bd 94 f7 | 39 58 38 2e ae 17 b2 73 1d e4 a7 77 fc bf 85 3c | 63 5b 1a 29 48 e8 aa 07 3f e9 82 92 50 e7 72 9f | 9a d8 a5 97 f7 0c 72 e2 e7 b6 cb 0c ff 4e 38 9e | 6d f9 d9 e0 8f df a4 4e 9c de 86 ff 7f 6f 46 07 | 19 30 44 7c c3 76 d0 df 68 7b cd 98 75 c7 57 02 | 52 bd 7f a1 c9 22 2c 83 36 62 ea 42 c7 31 3b 8a | 30 42 3c 51 50 0b 14 55 d5 43 19 16 fa 0b 4c a5 | 29 00 00 24 15 4a d1 bb d8 87 b7 c2 1d 20 84 6d | 4c 8a c4 e7 5d 03 8e 8f 16 37 df e9 c3 77 de 41 | b9 4c a3 ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 52 6d ba 0b 84 f5 59 4b dd eb 25 | 53 bb c6 97 e9 c5 42 9c 00 00 00 1c 00 00 40 05 | f4 8a 9c 13 b7 e1 a4 8b 85 79 9e 14 f1 e3 5c 5f | 69 af 71 4a | libevent_free: release ptr-libevent@0x7fb37004b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25cc0 | #167 spent 0.212 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d1 34 e0 8f fb 7c 13 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #167 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #167 | rejected packet: | d1 34 e0 8f fb 7c 13 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #167: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0872 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a647d0 | handling event EVENT_RETRANSMIT for parent state #168 | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #168 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #168 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49645.410598; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.013607 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25cc0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #168 | libevent_malloc: new ptr-libevent@0x7fb37004b7c0 size 128 "road-eastnet-nonat-168" #168: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #168) | b9 02 4f a9 68 0f a0 fe 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 38 63 d7 fd 7e 45 ef 72 03 13 6e 35 cd 53 26 | dd fc 38 ee df 06 1b 11 d5 c4 09 34 ea 9e 52 e9 | 90 99 59 42 6e 45 cc 92 f7 0d d9 7f 81 1b 1c 4d | 72 ce 0d 51 93 0e f8 d3 b9 70 d1 ad 64 8a 6a e2 | a3 1d 17 ed 1c a1 e4 c2 92 7b 01 e5 0d a5 15 1e | c9 45 f6 10 06 37 94 e2 37 85 e0 bc d4 3b da fb | 39 7d 59 09 ad a9 c4 e3 7a c2 37 5d ed ee 68 e8 | b1 63 07 9f 75 29 29 20 65 07 02 b1 8b 8b 01 b0 | 2b 52 3c a4 c8 5c 27 70 49 1c a9 4a ee d4 27 a2 | d7 44 e4 1a a5 20 37 9f 74 66 e1 72 a9 aa a5 00 | ec 99 a9 b7 19 84 18 49 d0 9b 4f 00 03 95 50 90 | b6 93 61 e2 6b 86 3b a3 1f 9e fe be b9 00 11 4e | d0 ee 6d 6d 92 bc 2a 22 db 5c 6c ba d6 ed 5d 3e | 26 d4 a4 f0 75 e3 70 55 39 8d c3 1c 3c 5e 40 3f | 06 f2 7d 36 24 34 4a 10 84 8b e4 b1 b8 1a 47 88 | b9 e7 73 06 47 d4 d0 41 aa 50 1b af 0e 28 2a e0 | 29 00 00 24 3f 02 e6 1c 86 66 81 19 d2 36 b7 e8 | e6 9a a6 e7 5e 78 b6 e8 13 75 aa 57 3b a6 be 37 | b8 21 ac c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 8a 57 55 a3 9f b5 8e 63 74 0d de | 85 a9 a1 c8 2f d9 1c 61 00 00 00 1c 00 00 40 05 | 7a 31 f7 15 f8 cd 69 10 6a f0 ab d3 a9 c2 c3 c7 | 07 31 9b 08 | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a647d0 | #168 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 02 4f a9 68 0f a0 fe | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #168 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #168 | rejected packet: | b9 02 4f a9 68 0f a0 fe 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #168: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45350 | handling event EVENT_RETRANSMIT for parent state #169 | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #169 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #169 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49645.481946; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004225 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a647d0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #169 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 "road-eastnet-nonat-169" #169: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #169) | 36 7b 71 a0 e2 7f 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 4f 45 f4 ab d7 36 ef 76 4d 44 de 6d 62 2d ae | 4e 5c 7f da 0a b2 48 be 78 ae 6d be 58 68 4b a4 | 8f 2f d2 29 68 46 25 1b 12 f9 92 02 9c d7 87 f1 | eb d6 eb 82 f8 34 c7 6d 1b 97 bd 5a 16 3f 5c d9 | 45 ff a3 65 05 29 38 16 83 1c 73 b0 0d 2c 32 2c | fa dc 03 8b a8 c2 e4 3a 68 19 c8 6f 81 6b a9 c7 | f3 1e d3 85 90 6b 23 38 49 5d e8 b8 1a 99 c6 3a | 6a a2 1b 8c c9 a7 dc be 9d 40 85 d1 eb b3 30 ea | 56 c0 aa c1 0c 1e 30 02 2d 3d a6 f2 04 1d 14 69 | 6d b1 c7 5c 5a 62 14 b7 a7 b0 4d b4 4a ea d7 8e | 92 28 ac 35 b4 c0 43 9c a2 b3 5b b7 49 ed fe 09 | 58 d4 4b a6 dd 4b ac 69 dc 3a 32 2b 1e e0 8a 39 | ae 70 61 ea 71 bb e0 10 48 b3 9a 5d a8 33 73 7a | e9 75 bd 48 dd 69 c9 c8 be a6 8c 92 7f 96 ad 37 | 04 3d 47 69 86 1c fb 25 12 87 50 73 a4 63 1a 75 | dc 73 f6 d1 8e ed 8a 90 43 3f ec 36 e2 fd c3 e9 | 29 00 00 24 c6 0f 04 68 5e 20 5e 64 7b fe 77 4f | 0f cb 3e 64 8c ad ed 27 06 6f 13 47 5c 0b 0d 8e | 1c d7 84 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fa 7c 50 0f e9 f1 70 67 4d 08 f0 45 | 40 25 4d e8 01 bd 9b 4f 00 00 00 1c 00 00 40 05 | cc 1b 7d 85 9d ec 77 c3 d4 a3 45 1a a2 36 2f 10 | c5 f4 8f 3e | libevent_free: release ptr-libevent@0x7fb37c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45350 | #169 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 7b 71 a0 e2 7f 3d 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #169 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #169 | rejected packet: | 36 7b 71 a0 e2 7f 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #169: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0563 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b610 | handling event EVENT_RETRANSMIT for parent state #170 | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #170 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #170 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49645.549291; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007249 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45350 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #170 | libevent_malloc: new ptr-libevent@0x7fb37c01d920 size 128 "road-eastnet-nonat-170" #170: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #170) | 0e 3d 5a e4 33 67 ae f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 3a 08 5b b2 3f a4 8e df 9b c0 eb a8 ff 32 50 | b7 58 7d 7d 4a 10 8c 9a ad 53 11 df 0e 8d 39 fb | 8a c0 5f d6 8f ee 32 b4 c6 d6 4c 41 39 dc c8 7f | a6 9c 35 ef 09 08 ca f8 2d 7d 3c 76 aa 39 58 43 | 35 eb 36 d9 ef 09 c3 c6 d0 ab 11 b8 34 40 ff 55 | c8 35 93 0b bc c0 66 e0 d9 9f c1 89 c0 9b 98 09 | c8 0d 44 3a d6 3d e2 b0 52 69 78 44 4a 24 b0 ad | 80 aa 61 eb 53 d9 1a 0a 53 30 0a eb d5 8c f7 f3 | ca 01 74 12 22 ff f3 9d 01 97 d0 63 da 1b b6 a1 | 02 35 c9 78 38 c4 96 f6 23 08 55 58 52 01 18 8c | 46 ea 56 a8 65 c1 e7 43 3b b8 d3 07 66 36 b4 14 | 25 9e f5 4d 86 46 ab 55 94 68 c7 67 da 70 2b 06 | a8 71 55 97 18 18 f9 3a 98 e0 35 83 6a 8d aa b1 | bc e1 50 ed 72 ba 83 3d 44 b6 97 eb 32 ff 41 57 | 48 97 03 67 e5 b8 1f 12 59 d4 1e 23 84 44 9b 29 | 9a 72 cd 57 ba 76 df 2f d8 46 ae e3 a7 ac 2c 37 | 29 00 00 24 f5 be bd 85 ea bf a8 35 5e 2e fb 98 | 21 e3 d9 77 11 2b 7a 24 c1 b5 1e 2f 89 52 5c d3 | bf 7f 74 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a ca 79 b0 52 c7 26 24 58 ba d7 c8 | 58 6a 36 93 64 5a 0d 23 00 00 00 1c 00 00 40 05 | 2e 8d 3a 82 9a 56 9c b7 68 e2 e0 45 0d 65 b1 99 | f9 22 bb fc | libevent_free: release ptr-libevent@0x7fb34c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b610 | #170 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 3d 5a e4 33 67 ae f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #170 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #170 | rejected packet: | 0e 3d 5a e4 33 67 ae f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #170: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad4380 | handling event EVENT_RETRANSMIT for parent state #171 | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #171 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #171 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49645.618659; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006581 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b610 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #171 | libevent_malloc: new ptr-libevent@0x7fb34c00cf80 size 128 "road-eastnet-nonat-171" #171: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #171) | 60 ea a0 b8 11 41 67 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 a6 a0 3d a3 d3 f7 3a 92 38 69 11 fc c0 0a e6 | ae 99 13 7e 46 80 4c 8f eb cb 1b a4 6d 5c fc 08 | ec 45 f4 48 c3 e3 73 a8 1a d3 f7 7f 3a 28 95 0f | b3 2e 82 89 be a5 d3 a6 ab 70 83 ad 3e e2 73 a1 | 73 7c b9 be d5 96 dd de 07 cc fe da 6e 65 6b 76 | 25 27 16 21 7c ef 70 24 a4 77 29 aa 15 d7 7b a8 | 16 72 3e d5 01 58 3c 97 7b 78 28 15 2b 7d 70 03 | 64 96 9b 75 19 62 f5 2d d6 23 a9 0d ca a5 9a 70 | a6 bd cc 03 9b 58 60 ee fc 9f 9e d6 00 fa 23 02 | 63 d3 b6 b9 2c b8 b0 66 04 8e 85 03 2d 8a 3b 14 | f1 66 74 61 f6 ab 2b 8f f8 31 4b 0b da 07 ed 98 | a3 08 1a 85 f1 f2 be 38 18 37 9b 13 eb 17 a9 c3 | c0 a5 db c8 dd 9c 88 27 54 50 ba 9a 47 c0 2c 00 | d1 c4 c3 04 be b5 8f d9 f7 25 9c ae 45 27 ee 47 | a2 c2 11 cc 79 aa fd 06 ae ea 3a 65 e0 36 c3 05 | dd d3 e2 dd c1 bd 1f da b7 d1 ff 87 93 0f c5 00 | 29 00 00 24 f4 77 f4 2a e1 ad 87 d1 e0 b8 f3 03 | 93 45 a7 36 54 7e 24 81 6c 5d 13 c9 3a 4c ab c2 | 28 19 06 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 9a 54 5d 74 7c 3e 57 ce 44 f1 6a | b5 dc 40 d6 fc 98 8f 10 00 00 00 1c 00 00 40 05 | ab ff fc 00 2d 34 de 32 ad 3a 53 9d f5 35 ab 6e | 4f ce 82 8b | libevent_free: release ptr-libevent@0x7fb37002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad4380 | #171 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 60 ea a0 b8 11 41 67 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #171 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #171 | rejected packet: | 60 ea a0 b8 11 41 67 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #171: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #172 | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #172 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #172 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49645.68706; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007243 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad4380 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #172 | libevent_malloc: new ptr-libevent@0x7fb37002a950 size 128 "road-eastnet-nonat-172" #172: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #172) | 47 43 39 2e 38 d9 e4 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 58 65 17 b4 48 89 eb 1e b2 78 b8 1e 15 3a 4a a1 | a2 3a fd 43 76 59 59 a1 75 7a 16 45 66 68 dc 97 | f3 bc ee bc d4 e0 57 41 47 eb 59 3e b3 f4 36 c1 | 10 8f 59 fc 57 3a 37 29 71 bf ce 33 91 c2 37 65 | 5c 9c 9f 71 6e b0 1d 6c 6c ed 90 b3 bd fc 22 6b | 94 91 98 6d a1 2f c5 a8 ca 58 04 fa 18 79 03 0a | 3e 27 a9 a6 f4 08 b2 f5 32 35 e8 b7 83 a3 4b c7 | 82 d2 5d ed b4 7c af 9d be b8 23 49 75 bb 7f 62 | 0e b3 38 1c ec 9d 39 3b f4 04 b7 d0 93 52 70 e6 | 23 bb 4d 7f 7c 2a 5e ec cb 0d 74 24 7b 07 99 42 | 6c 43 eb 64 ec ce f6 41 88 91 d0 50 22 25 43 54 | aa b8 db 3d b2 e3 bd ee 47 71 69 be 83 a3 d8 90 | 99 79 30 84 6a ac 04 1b 20 13 06 10 f1 e1 43 b3 | 50 14 89 62 82 b4 57 81 1e 80 23 23 72 24 b5 3b | 66 27 db 5a d9 e0 9f 07 96 df 6b d0 43 88 1d 6c | 19 73 59 ba d5 80 1f b5 38 2f da 5f 85 a1 ce d0 | 29 00 00 24 54 d0 27 67 15 cd c6 d9 d3 f4 1c e0 | 4e b2 db 81 71 2f 53 78 96 2e b8 d9 e9 fc be ad | 28 73 0e 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 71 7f 76 8f b4 09 cb 9b d9 d3 22 | dc b5 61 93 71 75 88 d5 00 00 00 1c 00 00 40 05 | df a3 69 ab bf ad 58 61 9f ed 54 03 7c e8 ac 70 | c8 e7 d2 fb | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #172 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 43 39 2e 38 d9 e4 43 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #172 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #172 | rejected packet: | 47 43 39 2e 38 d9 e4 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #172: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0714 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34000d120 | handling event EVENT_RETRANSMIT for parent state #173 | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #173 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #173 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49645.750444; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008689 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #173 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 "road-eastnet-nonat-173" #173: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #173) | a3 dc 1a aa b2 53 81 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 50 c6 a8 2b 15 44 29 7d 0a e3 39 95 9c 54 98 | 15 94 31 dc b2 f4 dc 06 12 a0 ff 21 13 48 30 95 | af bf 2b b8 09 10 1f 12 f1 ba 4e d2 4d c9 b1 a8 | 05 1a 20 e3 76 d4 0d 6b 38 00 2d 67 2b 07 73 be | a7 20 4c aa b8 f7 39 95 13 6d ae b6 ef 79 3a 33 | 8d e1 63 74 10 aa 27 63 ae 0f b0 2c 9f a5 74 21 | 20 ef 3b da 07 cd e1 2a ac 84 10 e1 eb 87 c2 5c | 8c 49 b1 a8 55 4a 0b c6 97 48 c7 fa 85 87 f0 7a | d7 45 9c 5f 2a c6 38 4c 4e a1 54 1f 2a b5 2e 49 | c6 5b 7a b8 69 98 a8 6a 03 80 1c 7f 20 55 e9 fd | 67 3c d3 ce e1 0d bb 8d 6b d2 95 4c af 6b 27 f3 | df f3 c1 d1 42 37 39 82 9f 58 eb 0d c5 ad bb 97 | 84 ff 4d 8a ba d9 60 19 d6 8e a0 cf fa 4d d0 49 | 61 07 20 ea f9 3b 35 e5 ef 25 c3 9f 36 d2 2d 11 | 5f 51 ff fc 25 f0 0e 63 2f a3 a3 cd af f0 c5 be | 34 51 97 11 a8 5a bf 5a f6 22 be 55 c5 08 d3 d9 | 29 00 00 24 12 84 f7 8f dc 17 04 fd a9 ee 45 ef | 2f aa ad ed 39 8e cd ff 76 be dc 7b d9 a9 2b e6 | 08 21 dc 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 b7 38 fa 70 81 30 71 1e 17 26 ac | fb ca c9 c3 02 40 69 eb 00 00 00 1c 00 00 40 05 | 47 2a 00 7e f6 06 aa e7 bc a5 be 89 f2 8d 4b b1 | 1c ba 94 b3 | libevent_free: release ptr-libevent@0x7fb340012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000d120 | #173 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a3 dc 1a aa b2 53 81 db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #173 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #173 | rejected packet: | a3 dc 1a aa b2 53 81 db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #173: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0456 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a49450 | handling event EVENT_RETRANSMIT for parent state #174 | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #174 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #174 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49645.822739; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.01044 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #174 | libevent_malloc: new ptr-libevent@0x7fb340012840 size 128 "road-eastnet-nonat-174" #174: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #174) | 91 36 4b 21 8c e3 c8 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 dd c5 98 91 80 2f bf e7 2b 43 43 70 f9 1c a2 | 78 b6 0b 56 89 c7 17 d8 c4 a4 ed 43 14 68 00 55 | ee dd ad 6d 8a 38 ba ad d9 23 b7 9e bb 3d 86 07 | ed 16 db de b0 44 67 be ba 65 0e 96 fd 54 eb cc | d4 d8 f1 83 4a 85 62 b4 81 ea c9 6f d6 2b 35 08 | 27 1d 44 b3 72 05 f6 d5 ee 0e c6 0c ad 30 dd 17 | d5 9d 92 9d 6e 7c 3d b9 06 e4 e1 7a b8 af 86 7e | 60 5c 18 1e 77 1f a3 0b 6c 39 63 8e 3b e2 37 7b | 90 c4 a3 0b 91 18 0b 29 93 4d 27 18 cf a4 37 53 | b6 2a 69 e7 1d 14 6c 93 05 8e 44 d8 16 2f a7 9f | 79 72 c5 dc 33 34 fc 0e b4 98 f8 e3 05 25 fe de | b4 63 51 46 dc 88 2d 12 37 aa 30 40 1c da d8 aa | d1 04 09 9e 82 a0 ef 0f 6a 96 1b 9b 72 30 77 32 | 93 8b f7 e8 2a a0 a2 dd 84 00 ba 24 75 30 17 4b | 8e 71 da c7 7b bd 41 ab b9 40 da db 82 29 9b 27 | d8 26 4c cc a8 73 89 de dd ff 26 53 c5 6f 01 3f | 29 00 00 24 cd b7 f1 c7 48 65 7b d0 51 fe 51 f7 | 71 0f cd 4b 00 33 35 86 2b 0b ad 56 3c d5 7d aa | 0f f5 4e e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 08 52 e7 44 c5 f0 65 19 f6 45 55 | b4 2d dd 6f 21 a4 bb e8 00 00 00 1c 00 00 40 05 | 78 4d 37 08 7f b6 6b 98 3a f8 5f d9 3e 81 c3 c7 | 93 cf d6 90 | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a49450 | #174 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 36 4b 21 8c e3 c8 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #174 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #174 | rejected packet: | 91 36 4b 21 8c e3 c8 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #174: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a88140 | handling event EVENT_RETRANSMIT for parent state #175 | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #175 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #175 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49645.900075; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008156 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a49450 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #175 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 "road-eastnet-nonat-175" #175: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #175) | 12 29 28 fb 65 9c c2 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 ef d9 b0 55 d5 14 e7 83 ea 0c 0f eb c0 4d b2 | 18 36 c3 0d 3c 5f 0d a0 d7 f5 a9 e8 30 23 62 2f | 3d 90 5e 25 d3 54 b3 8c d3 ab 1c d3 33 34 03 78 | 85 cd 74 0f 8e 35 c2 5d e8 af fd 9d 00 2e ac e4 | 84 d5 07 fd 55 8c 43 bf 89 61 dc 61 43 3c cd 62 | c3 a0 1f 02 31 0b 07 a5 78 c5 10 08 e8 a4 7f 16 | 2c ae 5c 93 2d 6e c4 24 f5 3a 2e c6 c8 6f 2e ed | e3 0a 8d 68 b0 44 75 d4 95 53 f7 73 cd 7d 6e 84 | d1 e9 9a 86 1e 26 9e 3c d7 df ee 11 ad 66 97 c8 | d5 8e 03 f4 d8 ef b9 76 f2 13 a1 73 f1 c4 5a 4e | 4f 30 eb 7b 7a f1 c0 eb 65 91 cf a9 f3 ae 0d 25 | 9b ee 1e 21 c2 ad 7e f5 01 73 92 f7 51 aa 80 fe | 91 d2 a8 9c 23 90 be c1 3c 6a f1 41 0c 91 0d 9d | 20 55 1f c9 0c b7 77 36 a0 ac 09 f3 01 de b4 91 | 94 8a 20 8c 1f ad 5f d7 63 70 2d 9a bd f2 8c e9 | fc ac 2d 5f 45 8f 88 b9 47 ef 43 3d 71 ea 60 f1 | 29 00 00 24 97 30 3a 8f 02 71 88 b4 dc ed 53 7a | 89 3f 00 b1 2f 4a 80 0e 10 53 03 26 85 ad 54 ab | da 16 12 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 ca 83 64 e4 50 88 08 79 37 9f 8c | 5a be 7c 44 1e d9 01 29 00 00 00 1c 00 00 40 05 | 4a 03 e5 d4 1c 09 77 92 d5 8c 25 e7 2e 76 d9 45 | 5b fb 35 ac | libevent_free: release ptr-libevent@0x7fb38001abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a88140 | #175 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 12 29 28 fb 65 9c c2 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #175 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #175 | rejected packet: | 12 29 28 fb 65 9c c2 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #175: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0703 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #176 | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #176 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #176 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49645.972535; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005509 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a88140 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #176 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 "road-eastnet-nonat-176" #176: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #176) | a4 22 94 6b b7 90 01 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 06 20 a9 49 fb 93 2b 74 d8 83 cb 06 8c 55 7f 57 | 5d f1 cc 70 90 ee ee 41 59 8d d1 e4 58 c0 02 89 | 12 8f 04 73 87 28 bc ec 0e 96 08 f0 49 03 74 3b | 4f eb c4 d0 c6 21 f7 38 1b 92 1e f3 ba 46 7f 28 | b7 fb 3b 9f fa d9 3a 39 83 bb a2 23 67 98 f1 b5 | a1 a5 1f cd 74 bb 92 db b0 18 17 3e 12 cd 1b ef | c7 08 37 6b 02 81 e5 23 06 48 6f 12 26 7a 04 03 | 41 41 ce c5 75 5e 67 35 c5 ce e1 ac d5 40 0e 48 | 02 a1 2b 2d 14 1a 42 85 97 cf d2 fc 57 8d 5d de | 6b d9 22 6f 79 7d c3 c2 dd 65 20 aa 1d 5b 57 40 | a0 1a 0e 1e 45 35 58 17 0b 20 5c b0 ba 44 7d db | a2 bd 64 77 9a d5 0b a1 b5 5c 94 07 3a 31 f0 5b | 14 75 f7 58 da e1 d3 e6 78 67 58 17 31 77 19 91 | 11 0f cf 7e 64 09 ce c1 12 cf d6 40 b9 60 dd 56 | e1 a2 ed 56 fd 45 7f 51 84 03 0b 96 6c a0 15 97 | 40 65 89 e3 a9 b7 e3 e5 5a 24 e4 6f 77 a5 63 fc | 29 00 00 24 bc 2f bb 65 01 f5 95 86 7b 82 6d a7 | 33 bf 89 13 08 c1 15 eb 66 27 ad 6e 9d 4d 82 1c | fe 4f 3f 4d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 44 db b2 76 4d c5 a9 b2 17 20 52 | 87 84 27 9b ed 5c 63 75 00 00 00 1c 00 00 40 05 | 53 a7 06 a0 b6 ee 02 94 c4 3e c2 3c 5b 31 75 91 | 62 98 b0 aa | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #176 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 22 94 6b b7 90 01 fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #176 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #176 | rejected packet: | a4 22 94 6b b7 90 01 fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #176: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa0940 | handling event EVENT_RETRANSMIT for parent state #177 | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #177 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #177 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49646.061856; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007717 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #177 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 "road-eastnet-nonat-177" #177: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #177) | 18 be 44 9b 6e ed 30 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b 07 e3 cb ba 41 f5 29 89 53 b2 f3 1e 5e 07 87 | e1 d5 ed d4 f7 64 97 f7 8a 96 5e a4 19 72 f5 99 | db af d0 a6 4b 51 f7 55 92 f6 5e e0 30 09 2c b6 | 43 a0 4f d7 6f e1 d3 20 57 34 04 7c 3d 9a 99 83 | f9 a3 8a 6a fe fe a9 91 f2 83 44 a1 2d af 4b ef | b0 18 e4 e4 62 e5 83 a7 cf b5 7d ca 15 6b 57 02 | c4 53 c6 7f f4 9f 1d 3d 3b b0 8c b2 2b 17 6d 36 | 19 38 bf 55 ce 8a 72 4f 20 1b a4 9c a2 84 da e5 | 7c f0 4b de 9a 22 9d 10 b8 0c f6 b5 af 79 8d d9 | c7 ca 65 16 d7 e0 a1 a8 7f e6 15 6a 53 ef 5b f4 | a2 b4 0d 9c 61 31 ea 4a 75 b2 62 d9 d6 fe 75 27 | 38 c2 d0 97 b9 a4 b7 2c 60 e6 08 ea 3f 0a 15 59 | f6 77 c4 7c d1 46 84 4f f2 09 1e c0 00 e1 c8 65 | bf 5e 6f 2d 94 6e 4c d7 96 38 7b ba 94 5a e8 e2 | 2f d6 8c 88 2d de 4f ca 52 aa 70 7a c4 e8 89 b2 | cf 3d 59 65 f1 b7 65 b1 ff 08 3f df 87 d6 e3 b4 | 29 00 00 24 06 53 6b 3a e9 83 68 db aa 70 45 4d | fe 90 0e f2 c3 a1 be 18 1d d8 e7 bb b9 75 13 f1 | bb b6 76 91 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 1b 1a a2 88 2e 9b 85 cb bf 3f e0 | 58 f8 7a 1a ca d0 ae de 00 00 00 1c 00 00 40 05 | 46 28 df e2 d1 63 c9 0b 29 af bd b8 e5 56 e6 b6 | 34 92 84 18 | libevent_free: release ptr-libevent@0x7fb3380300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa0940 | #177 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 18 be 44 9b 6e ed 30 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #177 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #177 | rejected packet: | 18 be 44 9b 6e ed 30 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #177: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a43dd0 | handling event EVENT_RETRANSMIT for parent state #178 | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #178 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #178 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49646.151429; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009498 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa0940 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #178 | libevent_malloc: new ptr-libevent@0x7fb3380300e0 size 128 "road-eastnet-nonat-178" #178: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #178) | ca 8e d5 21 04 56 f5 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 67 d8 60 5f 40 63 92 f2 6d b4 ba f5 02 b8 ef | 38 7a 12 cd 11 ce 9d 9b 17 62 5f df 94 e9 07 b5 | 67 9d c2 aa a5 fe a1 11 f4 ad b8 0d 63 27 26 1e | d8 17 fe 6f e7 68 09 0e 02 53 a4 bf 49 a0 db 19 | df 91 5e e9 b7 6f eb 81 53 29 3b eb 8c 48 64 ce | 19 01 46 02 e1 7d 00 12 d7 22 72 65 96 38 74 47 | fc 95 5b de f7 59 12 e1 89 c8 7c b4 26 93 4b 67 | 78 1e d0 18 c0 19 90 65 2b 34 10 55 57 cb 01 6d | c4 3f b5 2b 33 1e 80 2e 70 90 f3 a0 65 bd de 46 | 7d 2e 31 80 28 5c 82 45 70 58 e1 27 1c 57 b4 3b | 35 12 78 64 02 e3 69 39 84 d2 f4 a5 19 f1 96 0b | b4 1f 01 e4 be d8 4f ee 70 c6 2d 15 1b 96 dd 0a | 64 1f 43 c4 0e c9 83 9e ef 67 e0 c2 2c f3 12 d0 | 79 5e f6 25 ee e3 f8 a3 fa 94 d3 a2 a3 89 7b 98 | 74 09 e9 86 33 de 66 6c 13 2b 07 44 f9 44 67 9b | 43 01 93 ea 4d 3f aa bd f6 c6 55 44 dd 66 4b d4 | 29 00 00 24 2e 3d 1e d2 58 00 63 7b ef e7 79 ba | 26 0d 83 e4 01 3b ff 2b eb 29 12 83 06 3e 6a dc | 34 f9 2f 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 2f 67 46 e9 ec d0 44 c4 cc 2f 43 | d4 84 bf d5 2b 37 9d e7 00 00 00 1c 00 00 40 05 | 39 35 73 9e a6 30 0e 5d 9d 4e 3c 93 77 b7 78 c9 | 08 75 bf c2 | libevent_free: release ptr-libevent@0x7fb34c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a43dd0 | #178 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca 8e d5 21 04 56 f5 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #178 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #178 | rejected packet: | ca 8e d5 21 04 56 f5 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #178: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a70b10 | handling event EVENT_RETRANSMIT for parent state #179 | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #179 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #179 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49646.229806; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.017676 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a43dd0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #179 | libevent_malloc: new ptr-libevent@0x7fb34c01d920 size 128 "road-eastnet-nonat-179" #179: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #179) | b7 0c 53 b0 d6 55 ba e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 e7 aa 3a d2 93 3a b1 f3 2d ef 15 4a db bc fb | 18 f2 f0 2f d7 d8 6d f1 e0 2e 7d 29 59 b1 d6 21 | e4 35 ac b2 5c fa 8c 68 d7 56 48 2c 90 1a 63 31 | 37 9f fa 36 a0 bf f8 7e a9 36 73 05 48 39 6c 08 | e9 ae 8d 6f c7 ab 9c 0b dc b9 88 2c 91 ea 94 a4 | 59 7b a5 d7 8e b8 d2 97 70 12 0b 31 b0 2a d1 31 | eb e4 69 dc 81 ca 29 66 be 80 6d 1a c2 c0 f9 06 | 99 5a 19 63 89 a6 4b 85 38 ed a4 d0 df b0 06 34 | 93 de d4 51 e8 02 b6 ef 9c b9 23 ed 94 d4 3f 30 | ed 82 5a 99 89 3b af 7c 11 96 d9 f0 92 93 d2 4f | 04 c6 5c f3 49 5b 49 5d bc f7 66 01 86 c2 c8 a2 | d8 ee 9a a2 a9 a0 e8 45 16 a7 7f a0 45 50 f6 f0 | 8b 1c 98 0a f0 a8 07 43 b8 bc ec e9 38 ec 58 b8 | 3b 0d b2 96 d1 71 70 f7 1c 22 9f 03 fc f8 39 95 | 81 cb 62 38 1d 55 75 60 24 db a4 45 80 e8 81 2f | df c7 ac c2 4c be 19 14 89 79 da 68 5f ad f7 81 | 29 00 00 24 af 43 c4 7a 3d 3b b5 29 a0 89 4a e7 | b1 1d 19 14 88 65 8d 60 36 ce d7 11 01 48 56 1b | 05 16 7d 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 78 e7 1d 9d 7c 1d 2a b3 39 b5 dd | b4 d7 38 76 a1 49 48 f7 00 00 00 1c 00 00 40 05 | 86 2a 8d 44 0e a3 13 1a 2d e3 72 66 a4 35 f9 18 | 8b 41 6c dc | libevent_free: release ptr-libevent@0x7fb3700180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b10 | #179 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b7 0c 53 b0 d6 55 ba e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #179 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #179 | rejected packet: | b7 0c 53 b0 d6 55 ba e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #179: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_RETRANSMIT for parent state #180 | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #180 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #180 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49646.315101; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006862 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #180 | libevent_malloc: new ptr-libevent@0x7fb3700180b0 size 128 "road-eastnet-nonat-180" #180: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #180) | fe 73 72 02 92 15 d8 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 07 70 60 c7 56 30 74 c1 b3 ab 81 1b b5 12 a6 | 5b b3 64 05 c5 bb 30 3a 1e 92 5a 22 82 67 57 cb | ec df cc 78 63 1b 82 f2 76 a9 50 bd 80 d2 65 3a | b4 e2 7b 0a a1 1e b4 05 49 bc 96 6f 1f f1 51 36 | c7 6c ca c1 27 98 ee 50 22 95 3e cb c3 ea ef b5 | b6 40 b3 fc db 2f 79 46 a9 ac d5 8e 6f 0a 3a 8d | 7e 51 bf 5f 98 c8 56 24 ad e5 63 d9 fa 96 3f ce | b0 c6 79 3b 61 48 6d fd d7 15 2a 6b 8d 91 68 52 | a6 e1 08 45 fe 40 cd 13 6b e8 f0 74 af 74 46 b5 | 90 2f 5d d8 88 37 08 fa 12 4d 78 ce 41 b7 64 80 | a2 4d 76 43 ea e0 49 cc c2 cc 44 b2 cd 61 27 7e | 3d 40 9b 0b ff 59 99 9d a8 52 49 ee d5 dd 07 2e | 2d 3b 1d 7b e9 b4 f8 d7 66 08 0c c9 41 1c 3c eb | ca 7b 16 c5 f5 de ae 99 52 e3 17 c8 ed 61 56 a0 | 61 ae ef c8 11 73 22 d7 35 ab 44 d5 09 26 21 e1 | 09 c4 17 ac b7 7a 6c 9f bd 3c 11 d1 18 1d 51 88 | 29 00 00 24 9d 80 d3 ad d5 e1 1c 51 35 bd a3 6a | 04 d1 ff 4c 54 9f ed 38 00 a0 89 9d 6d 48 6f b5 | c4 22 6c 99 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 22 7d cd 9d 96 05 69 33 a1 7c ff | fb a1 ed a2 be 25 c7 02 00 00 00 1c 00 00 40 05 | cd 91 7d 35 4a 67 75 33 41 31 18 ee 7e 93 4a 7e | ae 98 50 4f | libevent_free: release ptr-libevent@0x7fb34400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | #180 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 73 72 02 92 15 d8 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #180 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #180 | rejected packet: | fe 73 72 02 92 15 d8 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #180: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.089 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad5900 | handling event EVENT_RETRANSMIT for parent state #181 | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #181 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #181 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49646.387458; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008775 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #181 | libevent_malloc: new ptr-libevent@0x7fb34400cf80 size 128 "road-eastnet-nonat-181" #181: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #181) | 87 ea 0d a4 c5 cc c9 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 96 2b 80 67 25 14 db 43 a4 69 96 1f d6 7f 44 | 16 0f d8 a3 fa cd 04 6f 4e 52 d1 61 93 e5 7d 61 | 78 3a 71 d4 ab 07 09 6a 8d e4 9e 59 3a 16 71 d0 | 6a fd 27 9b 67 10 88 a3 7b 06 8c 1d bd 77 73 97 | cb 10 8a 01 63 6c f3 e0 d9 84 4d f6 7b 2b fb e5 | 64 39 42 1e 6a 5d e5 a2 c0 54 6b 84 eb 36 36 98 | a7 bb 04 c5 ca 92 0e 5f af 5a 95 43 e3 52 3f ff | 54 f4 17 a7 9b 5c ce c8 79 5b 79 1b f8 16 5e d7 | 38 2d 41 ad 74 20 7d b3 0e 73 6b 2e d6 c4 34 48 | 1d 4c 33 fc 1f 31 06 e5 ef d9 8a ee a4 d3 10 13 | 9f f3 13 d6 08 5c dd 5e f3 41 90 99 dc 19 c1 90 | 0b 1a f0 8f 10 ca 00 81 f3 4c 0b 20 a3 62 92 ed | 2c 01 0a 11 e9 9d cb 11 95 e0 55 b1 08 02 a2 07 | 35 a8 d1 5c 3e 00 4b 4e 53 71 3f 8a 08 82 11 91 | 21 25 67 71 35 af ba 8c 78 51 c7 49 62 d2 6d 39 | 87 19 14 5e e7 83 0f e7 70 65 a7 bd b3 6a 59 43 | 29 00 00 24 f0 e0 42 a6 e3 a5 05 54 c9 6b cd 2c | d1 4e 0f ea 18 76 ac 9e 15 69 24 da 67 51 76 47 | 7a b9 31 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d2 1c 40 9b 6a 7c 59 59 f4 5a 8b 5d | d3 44 cd 77 5a a2 8f ab 00 00 00 1c 00 00 40 05 | c9 f4 ff 9a 5d 3b 38 1b 8f 98 0f 89 fb a2 c8 0e | aa 7e 43 ef | libevent_free: release ptr-libevent@0x7fb34c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad5900 | #181 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 ea 0d a4 c5 cc c9 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #181 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #181 | rejected packet: | 87 ea 0d a4 c5 cc c9 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #181: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1c400 | handling event EVENT_RETRANSMIT for parent state #182 | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #182 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #182 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49646.458749; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00701 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad5900 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #182 | libevent_malloc: new ptr-libevent@0x7fb34c0300e0 size 128 "road-eastnet-nonat-182" #182: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #182) | 8e 7e 13 89 c5 5d f7 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 e9 75 54 2d e8 42 37 37 23 34 72 75 33 ca 7f | b2 72 0c b6 c2 49 71 7a 03 e3 1d 07 58 b0 51 38 | 61 45 b2 16 d2 ad 2f f3 7c 0e 1f f4 c5 05 13 4c | d6 98 4b 66 e1 54 c0 73 13 91 4a f2 b3 d9 63 4c | 05 4b dc 71 47 da 12 a0 d3 dd 69 f7 37 06 e9 cd | 0a 8b 52 94 8a 6d da 5b 07 14 54 d3 97 43 1d a2 | ab 36 1f dc b8 97 c0 22 40 d5 44 3f fd 99 bd 8a | 9c f3 b8 47 00 bf 43 3d ae b2 e8 4a 6b 45 ec 0f | 5f e8 9a 25 7c ca 9d 80 f8 42 ce d3 9c bf c6 35 | 83 b9 bc 3b e5 0c da 92 14 98 a7 1a ce 79 b0 48 | 82 a8 51 c4 ec a8 10 1d b7 45 e5 80 dc 95 d7 16 | 44 79 9a ed 89 ab 16 cf 11 d5 7e 53 46 f0 d9 00 | eb 07 b7 8a d9 e3 ff b1 2b 68 df 33 18 af 5f 4c | 9c 70 63 04 6b ff 29 aa a6 e4 41 5f 2d 42 80 3a | 0d 17 98 f8 4e ea 6a f2 2b f3 0d 26 ff 27 2a a7 | a3 13 57 12 6f 11 b8 dd 58 53 1d d0 16 a0 b0 ee | 29 00 00 24 65 07 2e e4 49 be 52 f9 c6 9f 8e 3b | 7c a2 61 d2 67 51 00 51 49 02 4e 77 4c 09 9c a2 | 72 c6 03 a7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d 04 ff 12 2b f3 10 13 86 f3 c1 ff | 09 98 25 be d2 68 ad 5e 00 00 00 1c 00 00 40 05 | d9 6b 4d a2 91 b8 eb 60 71 cf 0d f0 f9 f0 84 45 | 87 2d 57 76 | libevent_free: release ptr-libevent@0x7fb388038370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c400 | #182 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 7e 13 89 c5 5d f7 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #182 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #182 | rejected packet: | 8e 7e 13 89 c5 5d f7 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #182: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0454 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa5fc0 | handling event EVENT_RETRANSMIT for parent state #183 | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #183 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #183 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49646.527082; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.012442 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c400 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #183 | libevent_malloc: new ptr-libevent@0x7fb388038370 size 128 "road-eastnet-nonat-183" #183: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #183) | d6 e6 54 26 a5 51 49 90 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b d3 2c d5 46 1e bb 45 3e b1 07 9c 29 85 98 93 | ee 36 97 24 0c 65 6e 72 03 fd eb 26 66 8a 4d 99 | 30 4c 18 3c 80 72 a6 76 e5 f3 36 3a 07 42 32 c2 | 39 e8 9d 5f ec e0 51 20 28 56 14 b3 ac 67 3c fa | 98 5a 37 73 bb 28 df c4 30 da b1 be 2e 7d cf b5 | aa 2a 51 9d a6 55 f1 d6 02 88 71 ea 44 18 ea 39 | 96 0e 47 c9 6e 26 f7 c4 74 bc 17 b7 c1 ce f4 36 | 36 cb e7 f5 29 fd 74 37 cc 31 1f ce 2f ee 7a 23 | fd da 91 35 f0 f9 ff ec 58 26 8a a2 2f d2 81 0d | a1 17 24 44 c9 5f 1e 77 b9 2b 2f 5a f9 47 ce 83 | a8 fd f0 5f 20 8d e8 9e 6f 25 55 3c b9 c3 9c 82 | 64 c6 bd 5c b0 07 c1 4a d5 fd 91 20 b3 b1 5d bd | 38 8e ad d0 f3 fd d6 24 13 d0 4b 1a eb b6 e2 f9 | 08 8d ad d1 8e e2 f0 e9 c7 8d cc 8b a6 0c 02 89 | 89 a8 da 17 42 b0 bd b2 29 34 67 25 c6 68 61 cb | 05 67 1d b0 18 99 57 3e 48 e0 4d 27 90 f1 05 8d | 29 00 00 24 fb 03 08 25 8e 6d 3a 5f 6f 85 88 7b | 77 f7 13 2b 6d 57 c0 a9 57 85 b0 8d 7b f6 0e 38 | 56 d2 56 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 0a 8e a5 81 0b e2 cf 5a 0e 0b 81 | 8d 82 2c 01 80 91 75 34 00 00 00 1c 00 00 40 05 | bf 20 fb 11 3c 6a fd 35 31 59 61 81 c5 7f e8 2f | e6 90 5e b8 | libevent_free: release ptr-libevent@0x7fb35c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | #183 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 e6 54 26 a5 51 49 90 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #183 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #183 | rejected packet: | d6 e6 54 26 a5 51 49 90 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #183: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac69c0 | handling event EVENT_RETRANSMIT for parent state #184 | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #184 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #184 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49646.585376; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006597 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #184 | libevent_malloc: new ptr-libevent@0x7fb35c0300e0 size 128 "road-eastnet-nonat-184" #184: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #184) | 71 40 97 9a 99 00 ff cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 9e 33 f9 05 c0 53 fb 65 12 d0 fd a6 93 df f1 | 7d bc 07 5e 94 4b 97 6f 27 67 0f f1 85 c0 12 45 | 70 43 01 96 7d 01 69 81 8a b0 0b 08 d1 40 54 69 | 08 7f 69 f8 31 5e 9b 37 c2 56 46 05 8a 2c 74 cd | 73 c4 b5 39 bb 8c 81 c4 97 49 18 2c ce 17 a4 56 | a5 b1 98 b5 93 fe 6b bc c2 93 00 1a 7a aa e8 f7 | 9e 16 d8 e6 36 67 49 7e af 2f 60 eb cd f3 b7 6a | 60 d2 41 2c 2b 50 9f c8 44 40 ce 80 81 98 cf 17 | 31 53 e1 d5 34 76 90 8f 6f 17 46 44 c2 a9 25 1a | bb c8 2b 12 0a 1a 41 c9 b5 0e b1 65 5f 47 47 f0 | bf a6 e5 e4 cc d3 34 bc 81 ca de 84 80 2f 52 78 | 36 7b 26 1f 30 98 4d d6 d7 8c 77 eb b9 19 2a e8 | 7d a0 5e 92 74 2d 37 d4 17 8f 23 ce 1e cd 45 d9 | cf f5 6b 81 d5 e3 95 2b bc 84 3e 19 7f 4a db 38 | c7 46 31 2c ab 66 d6 cd 71 a0 bf 63 ef a6 eb 59 | 13 88 4c 39 34 56 d9 d0 92 f8 f4 65 45 ad 6a 55 | 29 00 00 24 b3 65 f5 f0 87 cd d5 8a 91 5d ad e3 | f8 32 68 b3 e0 0d 46 b4 25 a3 92 64 33 fb 91 6e | c0 dc 6f 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 f2 a2 9a 11 9e a6 4a 33 e0 87 52 | 8a c6 6f 7b 74 99 45 a9 00 00 00 1c 00 00 40 05 | 98 85 7b 6c 79 cd cc f7 14 5f 2b 56 dd 51 39 9c | f7 d7 a1 50 | libevent_free: release ptr-libevent@0x7fb36c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac69c0 | #184 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 40 97 9a 99 00 ff cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #184 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #184 | rejected packet: | 71 40 97 9a 99 00 ff cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #184: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acab00 | handling event EVENT_RETRANSMIT for parent state #185 | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #185 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #185 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49646.654753; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008869 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac69c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #185 | libevent_malloc: new ptr-libevent@0x7fb36c035930 size 128 "road-eastnet-nonat-185" #185: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #185) | 94 c0 c2 c7 3b 30 ec 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 10 80 e8 ac 1b 57 a4 b7 f2 12 9c c9 c8 96 12 | d8 b4 37 f7 f8 c8 3c b7 f2 86 fb 6d bc 61 da 40 | 39 a4 09 f0 8f 66 50 7a 6b 75 22 97 37 a4 94 4e | a8 5c 5f 80 9b d3 2e fd ee fe 03 91 38 cd a2 e4 | 3e 5d b4 2b f3 14 af ae 26 82 7e 4b 88 39 37 81 | 82 aa 3c c6 ab ba 4d b3 20 34 8d 80 3d de a0 ad | 42 64 df 60 e3 cc 41 7d eb 1f a9 4c f0 d1 47 57 | 07 35 a5 e9 25 89 b5 0e 8b 91 92 1f 2f 09 b9 ab | 46 f1 69 33 6d d8 ef 90 01 9f 20 97 28 19 d8 4c | ce 9d c5 c8 74 d2 ec a5 dd e6 34 68 1e 8b 44 b9 | 5e 3c 90 76 95 68 8e 41 20 32 dd ca 48 f2 30 6e | af 87 2d 28 a1 ad c2 a1 66 51 1d 16 88 02 4d 4b | 75 a2 59 e4 ff 63 fb 70 3e 65 bb 8f d3 36 fc 97 | bb a3 6c c7 eb b7 6a f4 47 9b e0 12 1b e1 cc 32 | 68 f4 57 ff 85 75 10 4d 46 e9 36 6a ae db 06 a6 | 0f 02 20 5f 93 d8 c0 d3 99 19 3c 12 5e d8 75 16 | 29 00 00 24 d5 ca 6a 54 4d eb c2 30 7e c2 c0 88 | f4 64 53 65 cf cb b4 99 9a a7 3b 19 af 88 ec 6a | ae 0e 11 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a b7 31 38 16 04 07 33 64 be 6b 23 | be e3 1c e2 4f 4e 6e d8 00 00 00 1c 00 00 40 05 | c2 92 61 e3 4d 3a b1 c0 20 50 44 2b db 6e 80 18 | c6 ee 39 60 | libevent_free: release ptr-libevent@0x7fb3600180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab00 | #185 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 c0 c2 c7 3b 30 ec 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #185 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #185 | rejected packet: | 94 c0 c2 c7 3b 30 ec 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #185: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a84000 | handling event EVENT_RETRANSMIT for parent state #186 | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #186 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #186 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49646.738102; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009784 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab00 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #186 | libevent_malloc: new ptr-libevent@0x7fb3600180b0 size 128 "road-eastnet-nonat-186" #186: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #186) | 89 a9 38 aa a6 c0 30 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc fc 7f 3d ba 5a de bc 76 c2 c4 f8 68 37 1f ff | ca 8e ea 53 55 b1 47 97 0b 37 3b 65 fa 61 e7 dd | 35 17 7f ab 01 8e 38 9f 4b 7f 31 31 92 f1 ba bb | d0 06 33 61 10 0b fa 86 b8 ef 01 c3 cf b1 bb 29 | 2f 2d 37 13 10 34 87 1c 1a 2a fa 97 52 ab 57 63 | 92 bf 2b 4d 93 56 f2 e9 12 3c 46 24 50 0a 19 24 | b2 fa e0 6c 1d 91 6c 12 4e 27 c3 47 94 7d 6e 37 | 39 fc 81 56 89 ca 68 6b ce 06 f5 e3 55 1e 76 a1 | 72 bf 58 f7 9a b2 03 67 a0 61 c5 e9 74 36 67 70 | b9 96 14 a2 56 cb b9 33 ac 90 e3 4f 5c 75 ef 3c | 0e 13 a9 08 94 45 0a e0 b9 1a 9c 47 5c ef 62 4f | 55 46 d5 a5 09 5b 68 73 3a 25 4c 57 99 05 2a 57 | 57 52 51 7e 0f b6 14 9f 14 b0 d1 cf 63 29 63 a1 | 49 60 4a 12 aa 1e 1e 0f 3e 32 25 9c d8 71 75 aa | 14 8e 9d fc 55 96 cf 4d 35 00 a5 a7 02 46 8a b7 | 5a f6 88 8a 4d 78 6c e2 1c 82 47 88 0b 3b 1c 06 | 29 00 00 24 d4 45 d6 30 bc fb 2b aa 5c 8e f3 b7 | 0c 17 f8 b2 59 80 d2 e0 0c b8 b9 7f 67 b9 de e9 | d9 5a 25 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 68 b4 19 b5 e8 c7 d6 3c c7 30 38 | 5a e1 45 af bf 1b f1 0b 00 00 00 1c 00 00 40 05 | db 71 7b 2e 3b 5f 62 cf 6c 1d 8c 60 1b 08 38 c5 | 84 d6 4e b5 | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a84000 | #186 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 a9 38 aa a6 c0 30 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #186 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #186 | rejected packet: | 89 a9 38 aa a6 c0 30 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #186: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c00d120 | handling event EVENT_RETRANSMIT for parent state #187 | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #187 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #187 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49646.808425; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.014193 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #187 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 "road-eastnet-nonat-187" #187: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #187) | e7 c9 b3 98 5a b5 d8 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 8c 48 13 ec 18 80 1b 32 77 ec 9e 3b 86 33 3b | 02 ed ce 45 9e d1 07 07 3e bc 97 2e 75 42 14 66 | 03 ce bf d6 11 7b 13 df d2 31 59 70 fe 3e 83 b2 | 64 79 15 03 06 38 db 20 68 31 b1 be e0 b0 81 7d | 4e ac bf 91 07 33 90 db 11 13 bd 16 b3 19 bb 2f | bd 78 ea 08 d7 04 61 29 46 e0 b0 be 88 fb b6 99 | 78 ba 8a fa f7 9f 36 82 a5 d0 b5 cc 15 77 46 bf | 6f 96 e3 0e c4 42 db ac 87 dc 33 da 45 8d 53 39 | 47 ad bd 32 b7 e2 e1 e0 66 2c 6d db 19 28 b7 a9 | b4 a9 eb 1e eb 6f ee c7 40 8b 38 5d 63 81 df 4c | ca 8e 71 2d f6 ed 35 fe b2 fe 7e cb 56 c2 0b db | 35 33 69 6f 1e 16 e5 63 9f 75 fa ec 8a 49 49 95 | 1a f3 8c 29 d9 10 61 09 99 f1 00 c7 a8 23 e7 4f | 74 f2 03 0e 72 27 59 cb 0b e6 eb fe 8d cd 75 0f | 66 f2 35 88 c0 48 17 b6 36 94 37 a8 a7 99 a0 7a | 46 3f c8 7b 62 bc 09 7b 66 12 f0 77 17 2a c3 df | 29 00 00 24 92 ee 3c 64 04 c9 f4 27 93 49 ca cc | 80 d7 5b 2f 40 c6 99 75 47 bf 36 6e b0 fd dd e8 | 14 05 72 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e d3 6f 6b 08 b5 24 1b c7 b0 97 c1 | 57 a8 5f 57 16 36 48 8c 00 00 00 1c 00 00 40 05 | 70 ae b7 c1 13 54 ea fb c0 86 88 d6 98 09 04 e8 | dd f9 c2 0b | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c00d120 | #187 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 c9 b3 98 5a b5 d8 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #187 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #187 | rejected packet: | e7 c9 b3 98 5a b5 d8 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #187: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7e4d0 | handling event EVENT_RETRANSMIT for parent state #188 | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #188 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #188 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49646.92281; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.013384 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #188 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 "road-eastnet-nonat-188" #188: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #188) | f8 92 2e dc 48 c8 64 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 8c 6e 8b 73 15 ff 0e bb aa f8 24 68 da ef 6a | 1c 01 19 e8 a2 a3 5e f6 5a 71 31 aa 3c b1 c4 41 | 27 8d 2a 58 b3 aa 09 ec ab 9b 79 a4 37 2c 57 bc | 33 2a 63 cb 88 61 ff 6f 57 a5 f5 2c 3b 28 ff c0 | e2 03 fe e0 d7 c3 cd af a3 47 59 59 0e 58 bb 20 | d6 dc 5a 4c 31 47 b6 5a 25 02 b2 63 30 de fe 0f | aa 00 d1 fa e6 0a 07 a2 95 d3 2a cc eb a7 d4 64 | 92 40 37 20 3b f0 9c 95 06 bf 89 fe 4e 9c 75 93 | be 49 6d 83 74 cb 43 a9 68 b0 b3 1b 6c 7e b1 7d | 71 1f eb 81 78 ef b8 84 cd 25 a3 cb 59 97 64 95 | 1c 19 a1 95 2c 31 c2 d1 08 08 8a 2a 38 f4 5e 06 | d0 60 01 b7 7e f7 37 07 7c 57 50 f7 20 78 35 94 | 90 2f 3d b8 01 db 62 a4 93 0c bc 99 72 08 c3 2a | 65 b1 ef fc 8b 00 29 6d 1d eb d8 05 c6 bd 18 34 | 85 96 91 a6 8d 87 95 d6 03 d2 b7 ec 1a a3 0e 66 | 18 52 9c 51 fa 27 d5 c0 2b 40 de 51 c6 17 5c e3 | 29 00 00 24 32 b3 09 c7 6d 35 ae 79 0b a9 93 c1 | 25 b3 85 c2 02 53 dd a2 dc f7 0c 55 f9 9f 55 72 | 45 99 28 f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 05 c4 f8 2b d0 22 47 d6 02 77 fd | 96 35 b9 b3 1b 70 08 41 00 00 00 1c 00 00 40 05 | f1 47 98 30 50 7a f1 c9 d1 56 2e ed 54 8a b8 d4 | be 9f b3 89 | libevent_free: release ptr-libevent@0x7fb374024f80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | #188 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 92 2e dc 48 c8 64 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #188 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #188 | rejected packet: | f8 92 2e dc 48 c8 64 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #188: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90400 | handling event EVENT_RETRANSMIT for parent state #189 | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #189 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #189 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49647.032125; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009231 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #189 | libevent_malloc: new ptr-libevent@0x7fb374024f80 size 128 "road-eastnet-nonat-189" #189: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #189) | 86 0c af cf d7 4f f0 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 da a6 92 01 b3 1e 2d 01 6d b4 b0 5b c8 86 63 | fa d3 04 1f 4a 5d 42 51 c6 fa 83 7f 52 a9 5c 5f | 29 a2 a6 67 ca c4 cb cd f8 82 1e 41 60 3e d2 fa | be e5 64 f3 5e f3 de 1c 66 73 04 70 83 c5 c9 fa | d9 0c 95 4f d8 7c 96 92 62 c0 89 3f a6 f5 e5 1c | 1d 8a 04 ae 7f 59 7e f9 0a 02 65 1e e5 50 67 cc | 8a fa 7a d2 bf b6 8d 22 68 80 58 92 0d 46 32 32 | ac 55 d1 c6 9f 27 eb 86 dd 30 64 7d 70 38 1f e2 | 82 2f 8e ad e7 06 c8 10 a8 89 ac cd 34 d4 ef 54 | d9 fa ef 60 3c 01 17 c1 e0 90 2b 1d 49 9b 9e e6 | 59 07 02 91 fb ba 4f 73 08 2f de a1 3c 70 c1 7b | f2 11 29 b4 eb 0f 6e 10 04 0d 03 e4 29 ad b5 0b | 6b 4b aa f3 91 cc 9d d5 fa 2e 4d ea 3f 0e 7e 09 | 29 dd 22 a7 1f e8 ee 73 1f 35 15 51 78 6d 86 ea | cd eb 92 50 fc 79 44 24 ff 9f f8 19 89 f2 31 2b | 2f 82 13 db f2 4a 67 b7 c4 2a 16 2f d5 d4 31 ee | 29 00 00 24 ab 6b 1b 01 ee 77 53 c6 2a de 6e a0 | bf 1d e9 b5 56 76 a7 4b d5 a7 a9 e9 a7 01 9e 47 | cc 4b 2a 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 a4 06 85 0c 28 ca 55 e9 70 4f 7f | 1a ca eb c6 50 e4 53 f0 00 00 00 1c 00 00 40 05 | 2a 84 d0 22 8e e3 5b 68 a0 3f 20 22 83 cb 94 15 | 67 d9 c0 48 | libevent_free: release ptr-libevent@0x7fb3580300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90400 | #189 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 0c af cf d7 4f f0 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #189 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #189 | rejected packet: | 86 0c af cf d7 4f f0 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #189: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acec40 | handling event EVENT_RETRANSMIT for parent state #190 | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #190 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #190 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49647.146539; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.019862 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90400 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #190 | libevent_malloc: new ptr-libevent@0x7fb3580300e0 size 128 "road-eastnet-nonat-190" #190: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #190) | da 8a 0c 65 e6 2b 3c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 54 17 f8 a5 01 f3 68 22 77 c6 18 00 12 b3 14 | 54 3d f4 b3 34 1e fd 72 0e 4d ab df e8 2f e1 56 | d7 6e 5a 40 eb 22 8c 08 69 45 e9 fd 19 98 3c aa | 8d 83 ce d6 37 74 60 c8 87 61 28 d5 63 be 48 e9 | ac f9 f7 e4 f2 02 da 1e ec 22 1e 5a d2 5a 2b 8a | 3b 57 71 3a 73 29 7d d1 21 cb fe 25 7a 4a 44 7a | d3 e0 2e 8b b0 82 19 e0 d0 d4 ad 62 8a eb ad 5f | cd 5f 01 c2 97 9c ca 0a 84 fd e9 c6 24 7d a2 13 | 18 78 86 de 18 44 7c 6e 03 a7 c1 8c f5 10 72 e4 | 18 35 f0 48 fd 3b 9d 06 d6 b2 cc 32 8d c8 ab 02 | 22 2a e1 65 5c 07 67 dd 84 00 eb 6c 69 e6 d9 74 | 15 08 fb 78 e2 63 d8 e3 71 dc a5 a7 be b4 49 92 | ca 4f af 55 e1 5d c5 43 c7 03 58 76 b8 41 c6 a2 | f8 e5 96 26 df 8f 3c ed b5 1d 45 31 66 bd 99 75 | c9 f2 c5 21 dc 35 1b 0a 99 75 5d 5c a4 07 02 4f | 98 82 da 07 a8 27 6d 15 d8 05 50 39 0a b9 0a 99 | 29 00 00 24 f4 39 3c cf b3 b2 13 92 d2 3b 37 9f | 62 32 43 c3 74 37 47 22 30 dc 01 af 01 09 20 fa | 09 9a 8b e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6f a0 3a 65 d8 4c 58 fb ee 8d a7 57 | 94 7e 0d f0 9d 14 5d c2 00 00 00 1c 00 00 40 05 | c2 56 8a f7 34 3a b7 10 07 49 00 4f af 85 84 af | 10 cb 7b 4a | libevent_free: release ptr-libevent@0x7fb37c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acec40 | #190 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 8a 0c 65 e6 2b 3c 3b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #190 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #190 | rejected packet: | da 8a 0c 65 e6 2b 3c 3b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #190: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0727 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #191 | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #191 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #191 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49647.23195; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005494 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acec40 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #191 | libevent_malloc: new ptr-libevent@0x7fb37c02a950 size 128 "road-eastnet-nonat-191" #191: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #191) | 85 8f 6a 80 de be 76 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 47 0f 49 e8 87 b7 e4 13 ff fb 5d 9a 22 17 d1 | a7 da b3 32 4a c2 68 c6 3d 29 6b b9 0a 47 72 fb | 44 ba cf 07 42 83 b0 15 52 d5 79 a1 0a cc fd 8c | 03 5d 92 9f bc f2 7f 7a 58 36 93 f8 ff cd 46 92 | 33 75 4c e4 12 5e a1 f8 b3 1e 61 09 80 4a a1 c5 | 5a c7 19 d2 44 74 1d 5d 1d 57 21 f5 83 fe 20 06 | 89 ca 32 09 05 22 51 7a bb d7 0f b2 89 a9 0b 74 | 7c f9 0e 07 47 37 47 69 61 d8 9b ef fb c6 bb 4f | 6f e9 47 2c 3e ce 0c c7 87 a3 c6 a6 6c 56 d1 3e | ff a6 a9 4b d0 b7 79 88 c1 3f b4 9e fc 37 5c 19 | 1d 93 d7 b8 ac 50 69 85 b1 c4 53 e5 5e cc 86 e1 | 99 0a 5b e0 3c 4f fe 9e c8 dd 39 c2 94 6f 36 d5 | 9a 4e 4e dd b3 93 c7 8c d1 85 48 7f 16 2c 4f fb | 42 93 63 f4 95 ff 92 cb fb d6 5a 99 77 ab b8 13 | 67 d4 bf 16 1e 20 38 f7 7c 3d 2c 7c ef 50 6c 66 | 06 df 76 dd 94 55 30 cb 6c f9 4c e3 a8 ba 0c 19 | 29 00 00 24 f0 4e f3 f0 90 16 59 02 63 21 11 a3 | 11 30 40 08 3c fe e4 63 ec 70 ae b0 94 4f 51 4b | 97 b6 49 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c cc b1 ee ce 47 be 7b b0 c4 63 84 | 75 d0 08 1a f9 42 67 0a 00 00 00 1c 00 00 40 05 | 29 7b 9f b8 2f b5 a8 ce c6 6c 30 7d a4 05 33 b3 | 99 4c ae 49 | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #191 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 8f 6a 80 de be 76 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #191 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #191 | rejected packet: | 85 8f 6a 80 de be 76 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #191: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0477 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5da90 | handling event EVENT_RETRANSMIT for parent state #192 | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #192 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #192 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49647.304271; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007676 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #192 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 "road-eastnet-nonat-192" #192: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #192) | c8 ff f4 e6 c7 17 a0 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 d3 4a 60 f3 6b 7c bf bf ce 75 aa 6b ec f0 aa | 6f fd 60 63 46 fe 0f ab c7 68 02 df c4 c6 ca 90 | 76 3b 3d fe 56 bf ba a8 ba d0 ca f7 0b 74 9f c5 | d1 05 87 00 01 63 f1 b2 af 9b 1a 75 92 cd 23 75 | 4b c9 10 79 b9 97 80 8d 36 ac 73 a4 c7 b8 fd cc | b1 38 24 08 46 20 a1 f7 27 44 94 85 0d d1 c0 73 | 03 9e 85 e9 52 56 70 2c 82 87 11 d5 67 bd 17 0b | b7 79 e5 dd 43 5b 11 13 e5 80 26 ae 8c 3b 5c 3e | 39 de 54 5e 94 90 b6 94 bf 91 dc dc 3a b0 dc 33 | c2 af e8 1e 41 35 52 7c 14 9d d3 2a 93 8c 0c 2f | 4c dd 47 e3 33 95 7f 32 01 a2 12 1d 55 d6 96 ba | 80 04 ad 84 ae 69 4d 77 46 16 b8 c1 14 67 ff 90 | 15 d3 6f 27 f5 ca 1c 28 65 98 cb 29 af 5a 3d 4d | 38 de 5a e8 93 6e 36 0e 60 ea e1 05 60 eb 23 cb | 78 44 37 ea 66 63 22 ea 85 48 d4 a0 76 12 75 a9 | 2c 64 ca f2 05 fb 36 e8 35 db d2 9f 91 a5 c4 20 | 29 00 00 24 a1 c2 f0 6b 73 a0 8d a3 3d b9 fc 65 | 4f d9 ed 3c 9f 8f 87 98 60 fa 1e 4a fb c7 f1 6c | 8c d3 14 3f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 12 d3 2e 8d 56 f4 3c 1b 6c 80 b7 | a9 e2 20 50 4b 37 dd 45 00 00 00 1c 00 00 40 05 | c6 22 26 cb ae fa 29 03 74 5f 21 c6 81 1a 29 8b | 43 e3 ee ee | libevent_free: release ptr-libevent@0x7fb36c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5da90 | #192 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c8 ff f4 e6 c7 17 a0 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #192 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #192 | rejected packet: | c8 ff f4 e6 c7 17 a0 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #192: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0673 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3980 | handling event EVENT_RETRANSMIT for parent state #193 | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #193 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #193 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49647.397692; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.014014 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5da90 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #193 | libevent_malloc: new ptr-libevent@0x7fb36c0300e0 size 128 "road-eastnet-nonat-193" #193: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #193) | 09 06 18 28 25 97 f6 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d fb a2 00 c4 81 91 0e b9 c0 41 7e a3 8e d5 a7 | 8f f9 71 10 26 95 10 e6 4e 8b 4b cc bc fc 28 8b | b7 f8 db 09 cb 68 57 d8 0f d5 cb 0f b4 d7 8f 3d | bd 12 fa dc 76 89 b1 cd af d1 36 87 37 88 94 35 | dc 1d 71 91 3b f3 e1 80 cc f2 f0 d3 3a 4d 9e 94 | 07 3c 65 6d 3e 40 ff 84 75 64 e8 1b b1 8c 09 6d | 19 40 40 a9 6d 88 cd b7 e8 19 c9 3d e5 92 7e 64 | de 57 bb db cd d4 22 17 89 b5 3e 22 3c e2 24 0b | 14 89 5a 96 bd 20 3b aa d7 bd af 6b d4 f2 98 3c | 51 d6 02 8a 1a 1e 91 da fa 7c 17 97 ea 62 5d 5c | 64 1a ef 72 b1 d0 d3 26 fb a0 cf 97 96 42 ef 85 | 1f 2a 66 aa 06 10 71 63 af 7d da 60 c1 c8 13 08 | 97 23 c5 07 eb 43 86 64 05 41 06 20 ee 9b 27 00 | 30 a6 42 a7 c6 f6 78 37 51 13 98 31 24 47 eb e1 | 16 0f ee 4e 11 f9 96 b6 72 84 dc 21 2b 6e e3 77 | 3a 73 af fe 81 a3 c6 e9 eb 76 cf a2 f6 45 8e f3 | 29 00 00 24 ca 9d 5e 32 ed 0b e6 19 dc 2f e8 6f | 8e a5 0f 9f 9c 08 6d f3 68 e8 0a 59 74 47 ad 67 | e3 bf 67 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0c 89 f1 95 94 6f 28 52 1d 00 7f 87 | cf b9 fb 25 a2 94 8b 5c 00 00 00 1c 00 00 40 05 | cf 55 4f 40 25 07 37 da af 22 52 57 b9 8b da a2 | e2 e1 f8 6b | libevent_free: release ptr-libevent@0x7fb37003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3980 | #193 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 09 06 18 28 25 97 f6 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #193 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #193 | rejected packet: | 09 06 18 28 25 97 f6 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #193: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.047 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe5c0 | handling event EVENT_RETRANSMIT for parent state #194 | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #194 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #194 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49647.462978; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.010901 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3980 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #194 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 "road-eastnet-nonat-194" #194: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #194) | fb a9 4a 68 01 02 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad aa 66 9d b6 64 e0 b9 0d 37 a2 d5 08 fd 46 b0 | f7 b3 8b 64 d2 0b f9 59 d3 20 8f d2 23 52 ab 2e | d6 99 18 d2 2f 54 8c e7 99 6c 8c 9d cd ff 9d 5a | 44 41 3e 80 ea ff 21 1e 5c 82 8a bc ec 41 36 14 | dd 8d af 05 d5 6f c4 3b eb c0 61 1c 5d 0d 70 dd | 40 c9 d4 1f 8a d2 d8 76 8a b9 bd f7 f3 8d f9 d9 | da 19 38 58 8d de a2 45 b1 7d bb f4 44 36 75 08 | 1e 19 e1 7e 40 21 fc 21 30 c5 e3 bd 20 8d d8 be | bf bc a6 60 a1 d6 d8 51 07 69 fd 62 da 68 85 ce | 37 74 1e f7 ae d2 77 4a f2 bc 1e 10 5e ed ca 3e | bf 36 bc 15 0b 03 92 f4 43 13 b4 d6 80 6a 65 a5 | da 3f fd 89 e4 f3 95 6e ad 5c 51 06 e7 4d 88 1f | 8e b3 8c 1c 17 69 df 75 37 d0 1f f8 06 a4 4e 15 | d4 9e 45 dc a2 0b 41 4c 07 55 90 db 32 9b e2 82 | 2b f7 f7 40 85 e7 33 60 11 d2 9c 0f 8b 18 ca 0d | 1e 7e c6 7b e1 da d7 c5 9b 44 c8 e8 12 48 03 39 | 29 00 00 24 a9 61 02 67 eb 1a 8f ba e2 2e bf 6e | fa 3f 6f bb 4e c3 80 0d df 43 7e 7d a3 f5 81 cc | f3 7a bb 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 5d 39 f5 08 60 5b 2c d2 7c 9c f1 | a9 84 d1 dc ab 40 bc 42 00 00 00 1c 00 00 40 05 | dc 98 c1 28 2a 8c a1 5f e1 55 35 3c e4 55 00 85 | a7 4e ac da | libevent_free: release ptr-libevent@0x7fb37404b530 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe5c0 | #194 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb a9 4a 68 01 02 ca 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #194 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #194 | rejected packet: | fb a9 4a 68 01 02 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #194: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #195 | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #195 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #195 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49647.567339; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006634 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe5c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #195 | libevent_malloc: new ptr-libevent@0x7fb37404b530 size 128 "road-eastnet-nonat-195" #195: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #195) | 37 e6 90 db 14 bc bf 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 53 c9 77 b4 f3 d5 4d 42 00 37 51 2c 1c 68 3c | f1 54 0f 7a 55 d8 cb dc 59 bb 2f b5 96 8c 4e d4 | 85 27 5a ea f2 a7 4d 9e 5a 6b ee c6 28 a0 d2 57 | 71 7a 7b 0b 80 39 ac 27 cd 87 0d ef e4 ef af 3a | d6 b3 f6 12 c5 5f 2f d9 cd fb 17 d4 43 5e 16 c4 | 87 67 d1 70 07 84 e5 8e 71 91 de 30 59 cc e6 ee | 34 fb c0 51 e2 87 5b 7e 3f 08 db 50 ff 54 7a b1 | bd cb 77 92 50 41 31 65 47 73 69 2a fd d6 77 f3 | b0 89 f6 8e e2 6a 07 fc af 84 ca d3 f2 87 73 27 | c4 cf 2d 21 63 f5 8f 71 28 70 95 02 a0 27 ac 78 | a4 bb 1e 75 dc be 0d b4 ad 92 30 f8 7c 7f 5d 71 | a5 c9 9d 8b 71 f5 b5 68 db 9c 63 56 82 3f 35 f1 | f2 81 65 6a 20 3e b0 68 92 e4 10 6f a0 15 ab a8 | 72 4d 4d 54 b6 ef 0b 2d 62 75 65 6d be 42 39 3d | c4 80 ed ba e2 23 03 5c 4c 11 92 92 a4 9b 70 7c | cd 9d 5e 6a ce f4 42 ce b7 88 b0 01 79 41 f3 ce | 29 00 00 24 9e 21 2f 19 56 de ef 57 88 5d 72 9d | d0 e9 ed cf f1 53 49 64 11 8c ea d8 bc d7 7f b1 | 97 11 98 9b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be a1 e0 42 82 c4 3c a5 9f 98 67 8d | 2c 4b 8d ec 3b 56 95 d6 00 00 00 1c 00 00 40 05 | 9b 76 ec e0 3b 32 32 e4 22 87 e5 16 97 1d 20 83 | b5 a4 81 66 | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #195 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 e6 90 db 14 bc bf 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #195 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #195 | rejected packet: | 37 e6 90 db 14 bc bf 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #195: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abe740 | handling event EVENT_RETRANSMIT for parent state #196 | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #196 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #196 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49647.648685; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.011647 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #196 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 "road-eastnet-nonat-196" #196: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #196) | 56 d5 c7 24 09 fd 90 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 8f 70 c3 ed 41 cd d6 d2 1b f8 2a 49 7b d2 65 | 1d 48 5c 44 f7 09 ac 3e 9c 08 81 f6 b3 65 8e 9b | 4e f9 50 8c c8 e7 7b 20 7c 22 4e ca 64 9d 3b 78 | 6f 58 b3 9e 1c 75 62 70 7c 61 ef 34 cb 86 a6 1c | 58 51 2c 23 30 92 4a 45 b4 b8 ae 94 76 05 b8 97 | 44 53 83 e4 01 1b 12 69 e8 13 a8 21 92 4d 3c f0 | 3d 68 d7 2a 32 bb e5 1c b4 56 88 6b 46 1e 40 2b | 43 ea 27 d3 55 2f cf 9a 31 8f 09 d3 05 58 fd 61 | 42 c4 db 9a 42 0a 57 3b 19 4b c6 5f d6 ea 27 6a | 7f bf 49 6f e7 37 63 cd b0 56 7c d1 00 23 b6 75 | b5 9d 85 99 73 08 5b 3f 63 22 53 47 75 51 36 9e | 7d c3 2d 34 ef d2 c8 dc ed 30 18 e1 fc d9 f1 f0 | 6e d9 74 09 8b e8 94 06 ae aa 96 8e cd d8 85 a8 | 1d 1c c6 45 d2 df a8 88 f7 4f 9f 49 92 80 ca a3 | 24 f7 b2 76 f6 e9 c7 34 75 8f 12 25 2f 88 bf 00 | af 80 e2 a0 d5 42 a1 0f 8a 93 9d 2c 68 e7 dc 08 | 29 00 00 24 ed 57 45 ce d5 85 17 38 4f bc 48 45 | b8 48 4b 6f c9 94 96 34 41 c5 a0 9e ee f3 85 65 | 17 35 60 ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 33 d1 79 b1 42 18 cd cb 66 ed 21 | 50 1a 62 22 98 16 96 33 00 00 00 1c 00 00 40 05 | 37 d9 a8 f6 16 ad 1f 94 88 50 6d 18 f9 5d 91 a6 | 7a d6 46 08 | libevent_free: release ptr-libevent@0x7fb34c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe740 | #196 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 d5 c7 24 09 fd 90 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #196 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #196 | rejected packet: | 56 d5 c7 24 09 fd 90 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #196: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b246c0 | handling event EVENT_RETRANSMIT for parent state #197 | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #197 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #197 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49647.747055; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.027551 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe740 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #197 | libevent_malloc: new ptr-libevent@0x7fb34c0251c0 size 128 "road-eastnet-nonat-197" #197: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #197) | 76 fd 06 22 f8 72 39 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff 68 ad 96 cd 76 be 78 ca de ba cf 7d b8 d2 27 | eb 47 3d ab 5c da 69 f4 c0 aa ef 37 1d c8 bc 64 | b3 77 c8 06 c7 c1 ca 6e ba 13 a5 88 a0 2f 7d 28 | 77 76 19 e0 b9 08 19 f4 ea 19 57 8a 4a c5 51 64 | b2 b3 06 1d b7 55 89 e3 2f 55 c2 0a 68 16 ae bf | bc 84 d6 24 e3 0d 3a 6d 7f b0 26 cf fc 83 69 6f | 06 6c 19 78 05 aa 1a a7 a3 53 01 3e 4f 01 0c e2 | b6 b8 5e d8 44 74 c4 4a 7b 03 78 a3 0d 18 93 01 | ca 83 a7 98 02 8f 9a c5 fb 52 4a 95 fa 85 65 9f | 48 a4 30 21 ca 8f d8 e0 98 f5 f9 49 2a 0a 5a b1 | e0 a0 a3 25 65 8b 86 36 1d 17 ff 3c 76 35 24 e3 | b6 f7 d8 e5 22 2f 0d 80 58 07 89 c1 b8 b9 b6 a3 | ac a9 f3 74 55 c9 1c c7 ef 2f b9 00 be f9 d3 c9 | 30 e9 ef 92 c0 ce 36 02 ea 19 c8 d7 f7 c5 6a 1c | b8 72 5b 69 21 d3 b8 ca 13 78 68 f5 5e 6f 80 64 | 1c aa ea 24 03 ee 29 9b c1 bb 83 e4 a6 7c 10 08 | 29 00 00 24 74 4f 18 14 83 36 22 20 12 7b 44 86 | f2 c1 e1 0b 40 a8 83 e6 1a 42 e2 88 a2 98 21 31 | 2c b2 85 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 2f 89 09 b5 52 02 b8 23 bc 44 51 | 94 1d 2d 47 4e ed 65 d6 00 00 00 1c 00 00 40 05 | 73 fc 3d fb 5c fa a5 ca c9 53 fd 67 5c 67 b8 86 | 11 c4 a6 88 | libevent_free: release ptr-libevent@0x7fb34c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b246c0 | #197 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 fd 06 22 f8 72 39 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #197 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #197 | rejected packet: | 76 fd 06 22 f8 72 39 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #197: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0667 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab90c0 | handling event EVENT_RETRANSMIT for parent state #198 | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #198 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #198 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49647.832454; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008169 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b246c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #198 | libevent_malloc: new ptr-libevent@0x7fb34c035930 size 128 "road-eastnet-nonat-198" #198: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #198) | 38 c2 c3 e5 3e e5 82 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 61 f7 55 c5 c4 5e d0 83 66 79 06 76 ff 91 2f 9b | 12 d0 24 44 db b1 bb 60 15 c5 59 2d d1 18 5f af | af eb bb bf af 0f d5 a7 6d 21 23 3c 7a d5 2f 3a | b3 ef ca 8b 4c db ec bc f0 8c 19 8a b2 60 93 64 | a7 e9 05 44 28 9e 74 5d d9 95 66 66 f7 e5 b4 1f | d5 4f c6 33 f7 6e 5b 80 b4 15 1d 1d 0e 0a 1d ec | d1 57 f6 0c 8a 85 f5 7e b6 52 c9 40 29 cb 30 96 | b6 70 b8 b9 59 b7 f3 5d 39 15 1c 09 f2 d7 22 1a | 2f a6 71 e7 c2 13 1a 03 5a ae 65 2f 9f ab 09 6a | f8 76 83 82 4d 45 c3 9c c4 22 81 0b 0c de 1f 60 | c4 83 6f 80 69 4d fb 9f c9 f8 93 ff f8 9f 02 54 | a0 9a b8 b4 d0 4b 39 8e 82 eb a2 4d fd 53 0b 42 | 08 c3 3b 83 a3 55 58 9c 32 8d d4 50 90 35 7f 36 | 30 25 cb 7b da d7 20 59 55 75 68 f3 54 82 bd 15 | 66 45 d1 d6 73 76 d2 e1 4b 15 1f c3 2a 8d b1 0b | e3 7d 9a 2f f6 14 5c e9 eb 5c bb c0 32 a0 bd c5 | 29 00 00 24 88 f3 29 1f 7c 05 5c 84 29 93 1b 9b | 8b f1 e4 5b 97 f1 d8 9e b8 85 d9 30 2a 5f 45 e2 | 98 31 41 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 05 30 82 a4 eb e3 d3 07 9b b1 ad | f0 ee 15 a7 e9 bb 27 63 00 00 00 1c 00 00 40 05 | 88 8a 68 49 cd fa 13 38 3a 2a 49 e8 1c 37 c8 41 | 63 44 84 75 | libevent_free: release ptr-libevent@0x7fb36403ae90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab90c0 | #198 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 c2 c3 e5 3e e5 82 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #198 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #198 | rejected packet: | 38 c2 c3 e5 3e e5 82 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #198: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fa300 | handling event EVENT_RETRANSMIT for parent state #199 | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #199 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #199 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49647.949871; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.014207 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab90c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #199 | libevent_malloc: new ptr-libevent@0x7fb36403ae90 size 128 "road-eastnet-nonat-199" #199: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #199) | 27 d1 6c c4 4c 84 e3 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 f7 e5 ae 44 da 7b a1 b1 3e 44 fb ef 82 32 77 | a0 c2 72 43 50 19 7e 5e c7 1d 24 fa 9d 99 ff 71 | 44 54 82 8e cd bf 0f 40 ad 0d 4a 27 75 78 aa 64 | 63 e6 66 6d e9 bf 1f 5a 74 65 bf 0f ba 29 57 51 | 0a 44 9c 16 52 28 db 48 f9 d7 ab e8 1e 98 b5 a0 | ff 9d 9d 22 6a 26 d5 06 1f b5 07 29 59 d7 ec 33 | 10 b5 a0 31 95 73 ec 20 a2 11 23 56 06 d8 ad a2 | 6d 0f c8 00 64 2f 99 96 5d d2 5b a5 dd 2c 34 78 | ce 80 35 74 5d 74 56 55 47 bf 15 c1 84 c7 0f 64 | a6 70 c6 99 14 c9 d9 b3 02 6a 70 83 2d ca 4f aa | b9 b4 39 e1 b3 2e 81 8c 26 1f 8e f8 1a b1 b1 4b | b0 9b 0a c4 8c 38 2e 14 24 c9 96 c5 ae 69 55 cb | f9 3b a1 e1 2b 54 42 88 42 2f d5 f9 04 ab 91 7e | 86 11 e3 bd 2a 54 c0 da 96 34 89 6a 25 46 14 93 | 51 fb 1f 2b bf 29 76 41 f2 16 a8 f5 e3 fb 49 39 | 86 d5 c2 41 0f 92 03 df 3b a9 75 b2 e3 1f cd 5c | 29 00 00 24 ce b1 60 ec b2 6d 5b aa dc 41 a3 c6 | 5b 6b 71 42 8d 0b d4 85 d2 79 6d f3 81 c0 ff 8a | e8 8f f9 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e b6 28 45 f6 47 a9 89 2b f2 e1 02 | ea 34 3a fc e5 a7 2b f1 00 00 00 1c 00 00 40 05 | a9 d3 87 ec eb bf 81 b0 18 6d 86 a6 a8 63 05 fc | 1c 93 4f b5 | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fa300 | #199 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 27 d1 6c c4 4c 84 e3 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #199 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #199 | rejected packet: | 27 d1 6c c4 4c 84 e3 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #199: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0729 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac3ec0 | handling event EVENT_RETRANSMIT for parent state #200 | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #200 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #200 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49648.039242; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.011825 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fa300 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #200 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 "road-eastnet-nonat-200" #200: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #200) | 75 f9 3c ee 3d 43 50 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d d7 f4 2c e9 d8 b4 58 bc f6 5c 68 d0 e8 20 d2 | 70 0a 56 63 f6 74 43 04 b4 cd d8 23 88 fe c7 f6 | 1e d9 bd ee 25 c8 67 c7 2d b9 d9 c6 54 ca cd 9c | 4d 78 05 42 6a b4 88 a1 71 4e fd 59 90 2e 53 a1 | 4c c1 78 ca ca ed 13 0b 48 7e 72 f2 de cc bf 74 | d8 13 14 01 89 5b 3d f3 26 5d 17 ef 74 28 fa a9 | a5 86 f8 17 01 9e 46 6d 69 c4 ce 7b 85 c2 8b f2 | 6a 40 21 88 6b 4c 0d e0 b2 55 9a f1 b6 c4 a5 34 | 5e ea a9 16 4b 7b 22 02 6e b5 62 bf 0e 13 c4 75 | 5a f6 47 5c d0 c2 01 a3 46 b7 b7 ca c6 5e f6 e3 | 79 8e 25 ba 76 6d ee 11 df 8f 10 22 5f 50 31 f4 | b3 77 76 36 47 ec 67 35 64 4d 22 bd 77 3c 61 d0 | 1c 1c ab b4 d6 cf e4 0f 57 21 d8 30 aa 58 f6 84 | a1 48 51 27 85 8c 83 cc 89 77 d2 37 58 0f 1d e2 | 1d d9 35 ce 76 2e 8b 0d 16 1d 75 c0 13 c5 08 c0 | 3c d5 3b aa 74 68 e3 69 d7 c9 6b 6b d6 2e 6c a1 | 29 00 00 24 0e 33 98 69 ac 19 40 8d 23 0b bc 95 | 8f 5a 8e 62 b3 f7 97 e2 1f 4f da 87 39 88 58 8e | fe 30 e9 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 45 f2 7a b7 3f 1c 77 84 16 29 66 | 7f d3 6a c0 22 39 cf e5 00 00 00 1c 00 00 40 05 | a7 72 f7 48 87 f0 01 9a b9 14 bf 98 e7 f8 65 3b | c7 d8 2f ed | libevent_free: release ptr-libevent@0x7fb384027b30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | #200 spent 0.539 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 f9 3c ee 3d 43 50 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #200 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #200 | rejected packet: | 75 f9 3c ee 3d 43 50 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #200: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a276e0 | handling event EVENT_RETRANSMIT for parent state #201 | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #201 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #201 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49648.098987; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005605 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #201 | libevent_malloc: new ptr-libevent@0x7fb384027b30 size 128 "road-eastnet-nonat-201" #201: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #201) | 5f 8c 2f 98 2a b9 f9 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 72 1b 4b d5 18 dd 2d 5a 73 d0 41 7c 7e 89 a9 | 19 f8 4b 62 c1 9f f8 9d ff 76 0b e2 1f 44 b2 65 | 43 ea 94 88 bf 44 69 e7 07 70 c1 dc 59 58 cc ff | 59 19 82 57 fc 1c 37 9e a0 3e e4 f1 e5 85 09 b8 | cc 92 31 ca fd aa 7e e0 16 48 4f 93 4f 42 e6 41 | c6 d3 52 7b 4e f3 0c 48 a9 04 ea f5 d3 65 18 f4 | 8a 3e 8f 3d 66 71 a1 fb 46 fb e6 68 d4 de 30 4a | 77 d7 f7 51 80 44 5e 85 cb 41 c1 dc 19 46 1a 15 | 01 41 bb 17 40 1e c9 5b 1b 21 a1 10 c3 62 4c 55 | fa d0 3d 43 4e f3 0e a9 19 fd a5 f4 e9 a2 ac b4 | 40 11 51 f5 60 d4 30 87 a9 01 d5 04 88 71 af 01 | 0d f5 ab c7 33 ac d8 6a 80 db b1 bc 74 30 96 9e | f3 e1 bc b7 79 7c 12 ad fa 75 5d d2 23 fd a0 f7 | 3c 1c 0b d2 90 e2 83 a1 35 0f 5a b5 72 3d 6d 57 | 77 a3 af 0c 6a cb c1 58 a8 44 91 03 d0 f1 c3 69 | 53 0b 4f 4c fa 84 4b 60 c6 19 9c a4 39 a4 5b 44 | 29 00 00 24 ae be 08 16 b0 5a 8a 2b 33 7f 9f 5f | cb b1 1f 0b c0 df 08 67 ec 99 94 2a ad 60 2a 4f | 52 2c d3 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 75 8b 84 8e ba 07 72 da 16 0b 96 | fb 30 39 ca 67 c0 9f 42 00 00 00 1c 00 00 40 05 | 88 1b f0 23 47 26 b3 be 92 d6 69 de 00 cf 4d 8d | 78 92 34 e3 | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a276e0 | #201 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f 8c 2f 98 2a b9 f9 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #201 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #201 | rejected packet: | 5f 8c 2f 98 2a b9 f9 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #201: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1ae80 | handling event EVENT_RETRANSMIT for parent state #202 | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #202 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #202 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49648.192385; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007009 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a276e0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #202 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 "road-eastnet-nonat-202" #202: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #202) | 98 0c a0 3b 8e c3 04 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 4a de 90 9e 09 12 3c c9 7a 03 ab 1b f1 18 11 | 66 c3 f7 79 15 3a 95 02 ba e1 c3 e1 f6 5a 7b 34 | 8e de 4d 10 9a e1 70 a5 55 9d f4 c1 17 92 7c df | 68 e1 17 a5 99 1c fb 35 b9 25 cd 23 53 a8 26 d2 | b4 87 e9 2f e3 5a ea 45 0a 90 48 f4 6a 56 94 50 | e4 57 95 d6 52 83 af 6a c6 31 70 b1 c4 d3 c8 6b | cf c5 42 e4 73 01 2f be 13 4a 08 6e a7 91 68 14 | ad a5 a0 e4 14 1f a0 f2 00 98 4c ce c7 d5 c0 b6 | 15 77 5c 51 52 78 e1 34 5c df ff 32 7c 7c eb 4c | 74 06 ff d8 24 f4 34 27 4b f7 4d 5c de 29 22 32 | 61 0e 41 b1 a4 d1 44 ff 96 54 64 39 71 47 b7 07 | 8b 2d f1 7b c7 ff 29 67 2b 47 cf 64 2a ba 75 f5 | b7 8f 94 01 0c 73 d3 d0 a0 ca 7b 5c 80 ff e9 5a | df 27 66 99 d5 41 03 93 26 82 2e 43 c1 d3 4e 98 | 2a e1 9f 1a 15 c9 bf 3d d7 73 59 c0 eb c5 7f 3c | 4c 61 b0 05 20 29 0a b9 6b bf 44 e2 c1 1a 84 6d | 29 00 00 24 99 ea 46 58 fc ef 28 85 a0 72 43 c8 | 36 86 2f 35 31 69 ef db 0d c0 f1 46 4d af df db | 48 57 6f 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 23 33 21 68 f3 9f d6 75 73 74 16 | 0f 96 1b 0a 5a 2e 12 b4 00 00 00 1c 00 00 40 05 | 9b b4 ff f5 5e e8 7e 5a 50 28 47 10 22 d7 72 89 | 2b d0 c4 98 | libevent_free: release ptr-libevent@0x7fb348046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1ae80 | #202 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 0c a0 3b 8e c3 04 dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #202 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #202 | rejected packet: | 98 0c a0 3b 8e c3 04 dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #202: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab7a80 | handling event EVENT_RETRANSMIT for parent state #203 | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #203 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #203 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49648.271762; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006599 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1ae80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #203 | libevent_malloc: new ptr-libevent@0x7fb348046040 size 128 "road-eastnet-nonat-203" #203: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #203) | 02 57 d9 3d 13 25 98 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 1c fb 0e 8f 43 ac f5 0b 5f c4 59 e2 84 8d ff | 93 42 c3 e3 19 35 29 34 62 44 7f 8b b9 60 94 1a | 68 20 33 36 7e 07 ef b9 9d 1a c3 c4 e5 e3 be 6f | df 48 47 f9 cf 7a 23 fa b8 b9 0f be e3 51 16 88 | 65 2c 32 42 a7 de 33 7a 8d 00 20 5f 8c 23 cc 9e | fd 93 18 91 08 48 46 f6 9e a4 63 04 36 57 fb 82 | db a9 f0 b9 fc 47 88 c1 af a0 52 b6 f2 77 4a 78 | 7b 45 5f 81 61 4c a8 5c 40 e9 6e 59 e6 65 a5 7d | 8f 67 9e 58 05 f0 0e f3 10 e5 4c 4f bd 20 a3 7c | 88 1e 84 95 b7 f3 51 db 65 68 67 47 f1 73 c2 67 | 48 a3 dc a1 e1 3f e7 d7 4c f9 dc 2e f5 e0 7c 72 | 3d 2f 82 8d c1 ef e8 9c 9c 82 12 27 e5 0a e4 bb | af 79 89 91 83 59 68 9b 2f 98 3b 89 0a 25 be 74 | c0 0f b6 99 3d 8f b4 39 9b 96 c4 d8 6a 5d 53 81 | 43 9d 7a a3 69 c9 61 8c c0 23 f3 33 21 de 95 0e | 53 97 be e9 2a e9 9e 71 b5 e7 b9 2b cb 16 40 76 | 29 00 00 24 ad 22 cd 07 aa fe 98 d8 02 52 a4 3c | 95 12 5a d9 ed 8e 49 c5 19 c8 cb b1 88 c1 88 b9 | c9 3f 70 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ed 60 71 59 6f 4c 24 43 8a 9c 00 7b | c3 3a 97 05 f3 23 35 42 00 00 00 1c 00 00 40 05 | 0d db 79 a2 0f bb d9 bd 26 88 9d ac d1 d3 87 df | 66 b4 d9 d4 | libevent_free: release ptr-libevent@0x7fb34c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab7a80 | #203 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 57 d9 3d 13 25 98 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #203 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #203 | rejected packet: | 02 57 d9 3d 13 25 98 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #203: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aaa100 | handling event EVENT_RETRANSMIT for parent state #204 | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #204 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #204 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49648.378145; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.01321 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab7a80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #204 | libevent_malloc: new ptr-libevent@0x7fb34c0180b0 size 128 "road-eastnet-nonat-204" #204: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #204) | 26 9b 30 ce 1c 69 a2 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 5c 6f c5 e4 37 b5 85 8b 88 c9 38 4a 33 67 e3 | b5 76 e8 6e 58 ca 85 66 b2 6e bc 01 cc 91 d2 fa | e1 db ef 4b 77 17 f5 08 16 0c 8c d0 2e 39 5b 3d | 15 8c a2 f2 d6 7b 21 20 d2 5d b0 fc e4 ac 76 97 | 30 50 2e 26 71 1a 34 95 4e 65 5f 33 21 89 a5 4a | 55 91 fa cb b0 1c 50 2f 03 b1 71 df 7e 93 5d 3f | 83 d0 25 32 6e 4a 7a e8 b7 9c c4 2c bc 70 88 ca | 1a 12 c7 c4 81 cf af 5b 96 ed ff 17 ee ac bf bc | 7e ee e8 ea bf 0e 25 06 f6 11 f2 0c fc 01 f3 a1 | a3 a5 0f 39 3b 0e 4e 24 40 89 5e e7 dc 14 70 db | b0 59 4e 88 e4 58 74 9d 4c 35 67 80 45 58 10 7b | 90 72 ed 6b 8c 09 3f 83 31 52 aa d0 a7 ad e8 5e | 62 2d e8 c2 d2 5f d4 fe 77 1a 24 07 0f a0 1b 7f | b1 31 3d fc 2d 59 58 95 dc 6b 56 ff a8 81 81 ca | bd 63 b1 a6 f3 e4 7a e1 08 85 c1 19 90 12 c0 7e | 58 38 76 3a 98 a3 e6 81 1a a9 a3 c2 1d 81 96 94 | 29 00 00 24 f4 44 35 a4 a3 93 f6 e1 66 d4 43 db | 1b ee 9d af 99 ba 18 1d 96 99 f1 ca 00 4e 65 c8 | 19 9f df 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 dc 32 bc d5 a3 92 90 2d a7 77 26 | 1c 78 dd c4 9b 23 7d 3e 00 00 00 1c 00 00 40 05 | 5b a2 10 3c 9e 91 f8 b5 af bf b9 e6 23 08 5d a3 | 6c 17 22 88 | libevent_free: release ptr-libevent@0x7fb38403da90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aaa100 | #204 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 9b 30 ce 1c 69 a2 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #204 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #204 | rejected packet: | 26 9b 30 ce 1c 69 a2 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #204: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1c440 | handling event EVENT_RETRANSMIT for parent state #205 | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #205 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #205 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49648.559569; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.025283 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aaa100 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #205 | libevent_malloc: new ptr-libevent@0x7fb38403da90 size 128 "road-eastnet-nonat-205" #205: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #205) | 96 a5 4d 09 36 59 36 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 af 72 1b a0 98 9e 50 b5 1c 2a f4 25 37 46 6d | 29 08 48 dc 3a 43 a8 47 58 90 05 63 32 ed 1e 67 | 1c d6 5d a6 5c c9 d2 88 4d 23 9d 29 85 6c bc 34 | b6 39 47 15 78 35 07 0e dc 99 e1 b1 20 70 65 8b | 00 6c f0 e9 44 5b 08 c2 17 e1 6b 72 9c af 6c 5b | a9 60 97 0c ec 66 17 57 bd 76 76 97 27 d0 77 4a | 2a 55 71 50 75 d7 68 7b d8 80 b2 7a 09 02 08 2b | 09 0a ee 89 61 3b 8a 2f 12 7c cc 05 74 ec 11 d1 | 9b a1 09 08 7c 39 7a ee 4d 88 62 16 e2 82 1b b3 | d9 8f 53 7a 4b 48 dd 7d 8c 47 a4 25 61 2b 5a 2a | 2f 93 a5 82 b2 4d a6 fe b3 ac 51 3e da 8f 23 63 | f4 2a 7e 1b 28 f1 63 98 1b 09 f8 46 7c 59 0e 77 | 0b 32 ae 4e 95 8f da e9 a4 30 df 08 42 58 09 74 | 83 d9 4e 39 cd 7e 3b e6 37 1b b5 f8 2d 02 a3 8b | db d0 44 1c b8 65 c5 60 b6 1d bd 0a 87 21 84 61 | fa 21 34 4e 05 0a 9f 1b ec 7d 07 6c c5 18 67 d9 | 29 00 00 24 6c 40 f7 85 3a 61 11 e1 6e 44 7b 14 | a7 18 59 d8 8f ce 04 ee 70 39 7f 15 26 c1 43 92 | dc 05 98 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 dd f4 0a 58 0e d8 12 1e dc 08 fa | c5 ab bd a9 a1 ef e0 c4 00 00 00 1c 00 00 40 05 | 38 8d 68 ba 0f a0 5d 58 b7 93 ab fe 9b f6 26 59 | 71 96 1a e7 | libevent_free: release ptr-libevent@0x7fb36802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c440 | #205 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 96 a5 4d 09 36 59 36 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #205 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #205 | rejected packet: | 96 a5 4d 09 36 59 36 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #205: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a30d30 | handling event EVENT_RETRANSMIT for parent state #206 | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #206 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #206 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49648.656902; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009414 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c440 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #206 | libevent_malloc: new ptr-libevent@0x7fb36802a950 size 128 "road-eastnet-nonat-206" #206: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #206) | 01 b3 28 e7 e1 8b 13 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 fa e3 24 f9 a6 bc f3 21 1e 37 1a 6d f4 9a 7b | 77 24 5e 56 24 67 7b 74 f9 64 dc d8 1a b5 59 69 | d9 52 b7 b7 59 74 06 38 08 06 47 89 aa a8 f6 76 | 67 bf d4 4c 77 38 3b a1 63 60 dc 2b e4 fd cd 8b | 9a 4a 0c c7 7b 27 52 84 4e da 22 90 8d d5 51 6e | 00 c5 39 c6 ed 97 f2 c6 62 d9 ba 39 61 32 bb b8 | 11 91 00 ac cd 59 52 93 9f 38 fd 04 59 e4 ef 16 | eb bf 19 45 a5 bc 57 3a 53 a0 af 42 99 76 fa 1f | bd f3 4c 0f c8 d9 db e2 c0 a7 a6 04 31 f7 f9 f3 | 77 5c f7 e0 36 17 0a 5b 7e 68 29 02 15 2c e5 8a | 69 a2 34 36 51 a6 dc bd 4c c4 84 48 fa dd 5f b4 | 73 4d 7d 2b ff 7e df 63 45 9b 17 c7 95 9a 49 c4 | 94 db d0 f3 cd fa 37 d8 ec f4 8c 44 3e 14 f3 a8 | 13 2a dc fa 14 d8 cb 5f 5e 17 3a bf 2d 92 c3 14 | 49 5a 16 33 0a 40 13 9b 4f 56 1a aa ae 2b 43 6f | 7d 54 d1 07 b7 2a 7c 54 16 74 51 00 fd 0a b4 02 | 29 00 00 24 44 53 3f fa 64 f7 0e 35 c1 fb 1d 6e | fa 42 52 34 05 1a a7 3b 67 a9 b1 fa 7a da c7 46 | 65 3a cf a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f4 ab 21 a3 8f 50 c0 c7 3c cf c9 b6 | d3 91 c9 10 6d b3 85 90 00 00 00 1c 00 00 40 05 | fa 90 51 e6 cc c6 e6 dc b8 75 a7 d9 1e dd 64 0c | e1 7b e8 fe | libevent_free: release ptr-libevent@0x7fb37800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a30d30 | #206 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 b3 28 e7 e1 8b 13 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #206 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #206 | rejected packet: | 01 b3 28 e7 e1 8b 13 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #206: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #207 | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #207 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #207 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49648.781331; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.020805 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a30d30 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #207 | libevent_malloc: new ptr-libevent@0x7fb37800cf80 size 128 "road-eastnet-nonat-207" #207: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #207) | 98 86 9a c8 81 d3 6e e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 59 ae 25 5d aa 28 92 c6 18 2f bc 82 85 c2 3b | ef 2d af ff 7a e6 4d 2d 70 93 a0 de ce 52 57 5f | cf 57 26 3f 1c a7 0f b2 96 d8 25 c6 cb c3 1d 15 | 8e 04 6c c9 e5 de a9 9f 48 ec bf 8a ac af 55 b7 | 16 4e ac b3 75 43 96 89 7c 9a 69 70 08 ac 14 3e | 96 4b 5a 70 2a 29 e5 8b 07 f0 5c cb ed e2 91 b3 | 9b d7 77 9b 28 c0 fb 49 4d 80 b8 6a 5f 4b e2 be | 9f 93 81 d7 4b ea 7b e4 89 24 53 bc a4 06 8a 63 | ae f3 eb f3 e4 35 75 5b 3f a9 62 83 5c be e9 3f | da 2a 80 0c d1 89 a8 df 56 22 c5 4a 79 92 72 a5 | 3c 63 0a 48 54 25 a3 65 43 13 ce a4 3e 09 f7 a7 | 13 60 08 7a 31 57 5f 3e ec 21 89 2d 48 e6 b5 d0 | 55 c4 14 94 07 66 75 e1 7b b7 31 ad 1e 44 cd 2a | 84 8d 3f db f4 29 57 19 60 3f fa 98 86 72 4b e8 | c5 e2 25 d0 6a 0d c6 7c 2e b9 5b 59 7f 50 39 10 | 7f 2b dd a7 68 a0 e6 07 75 6e ff 62 1d 5c 80 75 | 29 00 00 24 e2 c5 0f b4 00 31 2d 18 4e d6 58 87 | 9d 2e 37 b9 b3 22 c5 5a fd 1c 75 2e 4d 23 6a 09 | d6 2f 3b 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 0a 15 af 31 57 a5 69 ec 8c db 25 | c8 27 a9 b0 00 8f 48 7f 00 00 00 1c 00 00 40 05 | af fe 48 1b 76 51 69 26 e1 f2 f5 ea 64 9f 61 35 | 72 2e c3 f3 | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | #207 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 86 9a c8 81 d3 6e e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #207 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #207 | rejected packet: | 98 86 9a c8 81 d3 6e e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #207: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad6ec0 | handling event EVENT_RETRANSMIT for parent state #208 | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #208 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #208 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49648.888748; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007472 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #208 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 "road-eastnet-nonat-208" #208: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #208) | 8f 5c 5f 4e 3a f5 16 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 92 7c 11 dd 8e a5 d7 54 92 a0 06 d5 10 ac 42 | 6b 15 ed 47 e9 69 c6 dc ee be 05 fb f7 98 ca cc | 76 c8 1e 19 2f 4d 8b 90 94 87 44 8e 66 b4 d8 02 | 68 05 60 b8 e3 7d 75 b7 4a 7c ab de a8 fd 41 6e | d6 76 9e 53 12 c0 6c 1d 7a 52 1e 69 01 3b 4b c1 | e7 6b 22 d6 c7 2e 90 0a 6b 5b 89 db 1a 6d af 36 | b5 41 be bc 9c 90 ed 64 78 a2 9b 4a 8f 0d 28 7e | 60 aa 46 05 6e d0 b2 52 c1 92 88 e6 04 b2 49 48 | c1 79 f2 f3 15 c9 58 54 7e a8 48 76 87 71 8d 7e | d5 41 8a 58 60 e1 22 51 b6 c8 da 62 23 cd 7f 72 | ed db 2b 44 40 79 52 36 a1 7b 1f f4 ce 24 ba 47 | 7a c2 df 3d 0b 70 e1 d1 d8 6a b0 33 7a 8b a6 83 | 44 26 40 e1 a6 53 73 33 8b d6 96 05 57 d5 68 55 | da 59 03 a3 8b 2e 16 30 b2 69 8f 5c 37 5b 88 82 | f8 0d 7c f2 a3 34 16 b2 3a a4 64 ba aa 6e 09 cf | de ff 28 7b 22 28 98 ba a1 44 cc d7 e1 ec e2 fc | 29 00 00 24 6d f9 31 58 db 7e 5c 23 da 78 97 04 | 9a 1c fc fa 9f 9f da b9 38 4a 1a f0 e7 71 5f 51 | b4 ee 4f 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 c6 9e d7 bc 34 04 8f 07 db d5 e1 | 11 54 7a 15 87 49 41 6f 00 00 00 1c 00 00 40 05 | da 8d 6c 65 d7 12 37 8a 51 87 98 29 74 33 3a f5 | 86 ee 4b 0a | libevent_free: release ptr-libevent@0x7fb37403ae20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | #208 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8f 5c 5f 4e 3a f5 16 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #208 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #208 | rejected packet: | 8f 5c 5f 4e 3a f5 16 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #208: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0765 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad8480 | handling event EVENT_RETRANSMIT for parent state #209 | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #209 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #209 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49648.988117; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.011368 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #209 | libevent_malloc: new ptr-libevent@0x7fb37403ae20 size 128 "road-eastnet-nonat-209" #209: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #209) | 94 c0 53 32 b7 6b d2 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa aa 8f b6 87 c3 5d 98 e8 47 9c 34 3c ba fd c2 | 26 06 ee 61 85 3c e9 e8 7d e0 7a e3 30 dc 26 ae | 92 30 41 01 44 74 f7 33 20 3e 9d c4 91 ce 67 c8 | 16 8f 2d 63 7e 65 88 2d 42 e0 e7 51 27 b9 54 c3 | cb 64 94 8c 44 0b bb aa 89 37 4f 4c 19 3a 97 c2 | a7 78 bb a9 b6 bc c5 9a 0d 18 1b 6f 6c 81 28 5f | 96 22 7f 4e e9 03 4f f8 d6 4d 77 d5 fe b9 d2 6d | cd 7d 32 95 3a ae 28 68 07 70 28 76 ea 67 8a a4 | 02 0f 70 b8 39 d5 ef 06 00 8a 9d f6 62 11 fb 55 | 5d 2a 4e 92 67 d8 83 81 5c e2 b4 e7 58 f2 f1 29 | e2 e9 12 6d a8 99 db 90 fa c3 c7 67 22 60 c4 0d | b5 aa 8e 50 88 98 a0 7e 46 1d 18 c2 ea bc 90 f9 | 2c 89 53 10 11 da ca 7e 79 27 58 0a 97 be f4 b6 | df 47 81 cd fc cb 51 b6 90 69 20 0a b1 64 c6 52 | f3 67 4f b9 89 27 0d 82 44 e6 02 ff 6a 0a a5 77 | bc 54 13 6b 28 ab 23 fb 03 b0 ab d8 e9 7c 16 89 | 29 00 00 24 32 f5 dd 6d be 9b 09 7c 2d 16 66 7c | 9d 31 58 f8 20 f4 30 10 2d 04 04 00 c5 24 46 19 | 07 98 5b 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 be 30 60 49 91 51 94 d8 39 4f be | 6e 81 91 5e 2f 8c 88 7e 00 00 00 1c 00 00 40 05 | 2d 19 47 e1 25 d9 8a e8 d3 7e a2 ad 7d 2a 38 10 | 8b 55 bc a7 | libevent_free: release ptr-libevent@0x7fb36803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad8480 | #209 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 c0 53 32 b7 6b d2 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #209 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #209 | rejected packet: | 94 c0 53 32 b7 6b d2 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #209: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0655 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b650 | handling event EVENT_RETRANSMIT for parent state #210 | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #210 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #210 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49649.062532; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.010593 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad8480 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #210 | libevent_malloc: new ptr-libevent@0x7fb36803b0b0 size 128 "road-eastnet-nonat-210" #210: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #210) | aa f0 6c 1e 8f b0 d8 5f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 2f d8 9e b6 32 84 b3 62 ee 33 24 ed 0e fd d4 | fb 0e fa b0 5a fb 4d c1 44 66 ed 6c d9 22 6b 05 | 5a 31 76 75 51 2d 58 63 68 30 79 28 a1 8c f7 58 | 78 1f ed 9b 41 29 7f de 5e 35 7e 32 cc 4f eb 97 | f3 d2 34 17 b1 d4 d0 fd f0 52 da 3a 73 a4 1f 58 | 68 7e 43 79 1c f9 07 46 32 fb 81 59 a1 8b 36 99 | 63 59 69 2b 65 b6 49 f0 2c 89 5f 6f 77 04 35 7e | de cb d9 d5 71 0b 78 b5 5b 65 ab a6 ce 91 19 fa | 51 58 77 c1 4e 94 ff 17 29 dc 29 f8 bd 1c c5 36 | 82 f3 20 0b 04 da 30 59 b0 d1 05 3e 3f aa ef 6a | 84 97 f2 ea a5 27 2e 15 1e f4 66 a5 d9 21 ce 67 | e8 bd 44 de 20 df 28 17 c9 3c 33 10 eb 28 78 7e | 45 57 17 c5 4c aa eb a9 d1 47 13 10 17 f0 99 19 | db 6b d3 97 fa 92 c7 c8 43 99 f3 77 fc f5 56 ad | 75 cc 5d 24 35 8b 29 95 64 a0 e4 4c e0 27 1c 2a | fb fd b3 6d 87 9d 4a e7 f3 e4 fa 49 6c 90 9e db | 29 00 00 24 b7 0e 02 eb 9f 32 9f 45 44 47 90 9f | 97 de 23 e8 e1 c4 97 88 69 d1 3d 46 ce 63 23 0a | 5b 61 d3 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 f2 e2 75 79 7b 92 3c e8 e4 c1 f3 | d5 ae c0 9c c7 8c de 57 00 00 00 1c 00 00 40 05 | a7 24 70 f0 1a 13 21 fc 21 f0 f5 1e 72 fd 1a 35 | c3 6c 26 99 | libevent_free: release ptr-libevent@0x7fb380032bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b650 | #210 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | aa f0 6c 1e 8f b0 d8 5f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #210 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #210 | rejected packet: | aa f0 6c 1e 8f b0 d8 5f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #210: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0524 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46950 | handling event EVENT_RETRANSMIT for parent state #211 | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #211 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #211 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49649.193081; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.017343 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b650 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #211 | libevent_malloc: new ptr-libevent@0x7fb380032bf0 size 128 "road-eastnet-nonat-211" #211: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #211) | 53 9a 08 81 c1 f5 e1 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef 09 3e 48 73 4c 9b c2 57 71 c3 fe a1 82 75 e5 | f2 fc 00 52 66 b2 69 a1 98 d7 a1 43 e2 9d 75 cc | 9d b4 06 fc 88 d6 44 63 90 41 43 c2 45 55 dc 1a | 12 ee 32 35 ef 1c ea 74 ac df 20 43 5d 1c 90 c2 | e0 80 56 a4 79 bd f8 c0 a8 96 3b 25 fa 43 51 16 | 7e ae 16 08 0c ee 53 be c7 29 52 25 44 6d fa 34 | 69 9f 31 ba 70 30 84 e6 d5 99 f5 2e ee 13 fd e4 | 65 1c ef 89 6e 83 29 44 bd 4f 23 ac ed 0f c3 ea | db 20 3d 79 09 22 a5 94 a4 f8 6d ce bf 13 df 61 | d3 3f 02 e7 af bb ce de f0 b1 2a fb 97 3e 5d 05 | 56 5c 13 18 20 58 3e 43 ac b1 9e 74 31 3c 13 bc | 7c 7a 3a eb be df d5 2e e9 60 5f 5a 7e af 73 b1 | 92 1c d6 e2 be f1 a5 75 8e 08 54 b0 2b e1 2c 5a | 6f 54 93 f5 5b 16 d8 ba 78 77 2e f6 39 16 6f 65 | 5e 98 fb 40 29 ab 34 cf 31 b1 1c 43 74 9c 6b 56 | 46 0a 1c e2 58 fe 1e 51 fc 87 18 4b d7 84 46 cc | 29 00 00 24 ac f5 37 f2 09 3e be 57 f0 76 41 01 | 45 fc a2 49 1d 14 8a 0e 25 fc 49 cd 6b 6f 69 01 | e7 4f 36 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 6c d6 1b 30 f3 11 7c 9a 75 f0 de | fa 6c c9 cc a4 62 9e ac 00 00 00 1c 00 00 40 05 | 73 92 bd e7 98 2e a4 8f a5 8d 6a 24 e0 26 ee e5 | ed 8e de 68 | libevent_free: release ptr-libevent@0x7fb3580180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46950 | #211 spent 0.439 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 9a 08 81 c1 f5 e1 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #211 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #211 | rejected packet: | 53 9a 08 81 c1 f5 e1 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #211: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.215 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad17c0 | handling event EVENT_RETRANSMIT for parent state #212 | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #212 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #212 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49649.301975; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00943 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46950 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #212 | libevent_malloc: new ptr-libevent@0x7fb3580180b0 size 128 "road-eastnet-nonat-212" #212: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #212) | 94 ac 86 b7 f8 83 d4 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 79 5c 0c 28 90 8c ef 02 3c d8 f8 1a 0b d6 b1 | 04 69 40 2f 72 b0 4d 73 12 19 ce 98 f8 6f 0b 9f | b9 13 67 6a 06 b8 41 b4 12 d3 3b 5e 00 45 d7 98 | a9 e1 2d 0a c7 48 98 e8 4f 26 89 26 1d eb 0f 63 | d1 cd 01 b0 ac c0 e6 9c c4 d5 af f4 d2 0a f8 fc | 50 8b 97 23 e0 8c a0 c2 04 25 1e a8 35 a0 f0 95 | 6e 38 07 0c ab 5c e3 d8 94 8f 44 fe f3 fe 9f 14 | 8e b7 78 55 0b 6e 31 2e c3 a7 48 da be 5b b7 47 | 21 9c c6 d3 74 d7 58 d3 13 78 3e ed 28 44 9b 87 | a8 e3 a1 e6 89 b5 03 ef 3b fe d5 17 e8 f9 73 04 | 1c 9e 5a c3 69 56 f2 c1 24 33 17 fd 7d 0d ed e7 | 7d 2c 20 7c 0b 8e 94 c1 2e c1 1b fa 0b 32 e2 6f | 8a b2 5d b4 79 8d 9a 89 ea a8 6f 97 71 92 fa f9 | bc 34 75 15 ab ea 61 f5 3d 74 25 af 37 7b 97 2f | 19 3e 0a b6 c1 50 67 1c b8 51 37 9b 9a b3 26 67 | c4 f2 b4 e7 06 7e 5d 5b 28 22 1e 8e 7e da b7 8b | 29 00 00 24 5c 64 5d 43 88 c1 08 90 f5 2a 0e 23 | 99 a9 ce 32 1e 4e 34 e5 9c b5 04 95 ad 56 32 fb | 31 cf fd 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 0d b1 e5 c0 7d 3f 73 e9 5f 1b 2c | de e5 07 26 54 11 d9 1b 00 00 00 1c 00 00 40 05 | 08 da df 20 35 aa 7d dd ef ff 4a 4d 21 f5 f2 fb | f9 b4 9f 22 | libevent_free: release ptr-libevent@0x7fb35402a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad17c0 | #212 spent 0.195 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 94 ac 86 b7 f8 83 d4 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #212 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #212 | rejected packet: | 94 ac 86 b7 f8 83 d4 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #212: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0886 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1da10 | handling event EVENT_RETRANSMIT for parent state #213 | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #213 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #213 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49649.398463; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.018259 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad17c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #213 | libevent_malloc: new ptr-libevent@0x7fb35402a950 size 128 "road-eastnet-nonat-213" #213: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #213) | 4a f6 d6 f4 f7 c1 a9 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 87 92 0f fd 56 61 cf 88 27 07 68 fb 27 94 14 | ab 6f 99 e6 75 dc 26 2f 1e 93 7a c8 7f ed e5 7d | 6b b9 9d 92 4b e7 28 92 86 1e 95 f5 3a f0 df 50 | 69 19 a3 90 28 b6 f5 2d 21 d9 e8 a3 e1 5b a3 90 | 3f a9 b0 a1 2a 68 b5 63 77 3b aa 0b 6a 92 36 d6 | 32 61 b7 e6 8e cd 51 f2 78 e2 77 58 13 92 00 bb | 90 bd cb b3 98 f4 c1 b4 f9 bd 9c 07 84 cd 8b 44 | 56 64 bd 56 88 30 16 b1 de 15 4b 10 e0 33 82 0c | 53 be e7 f5 bb 24 10 e7 6d a3 b2 a5 08 f8 45 52 | 21 5c 7f a2 a6 ba 7c c6 84 2d 67 10 b4 86 8f 9c | f0 28 12 88 fb c8 52 6a e2 26 a6 a9 6d 8d 51 de | 96 9d d4 31 fb 52 b9 5a 75 dd 19 ef dd 61 8f 1b | 4b 84 99 e3 45 d4 ee 63 d4 75 8b e1 c7 c9 46 a5 | 75 72 66 74 64 ad ff 53 8e cd 6a 8d e1 aa 8b e0 | 68 cf 60 1e 6d 53 aa b5 21 a7 9f 74 3a 51 a3 ac | e3 62 94 51 c3 8c 9b b8 34 1f 9f 73 40 9a 49 cb | 29 00 00 24 b5 56 f5 24 67 7b ee bc b9 fe c7 48 | 4d 15 0a a4 8c 8b d0 3d 4d d5 8d 67 be 58 a4 6d | 51 fe 0b 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 44 29 1f 54 8d f8 98 7c 02 ef 5a | ae 02 c1 10 4c 75 c9 6b 00 00 00 1c 00 00 40 05 | bc 12 92 95 d4 1b f9 ad 5d 6a 71 41 82 c9 bd c2 | 29 69 a1 81 | libevent_free: release ptr-libevent@0x7fb37c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1da10 | #213 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a f6 d6 f4 f7 c1 a9 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #213 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #213 | rejected packet: | 4a f6 d6 f4 f7 c1 a9 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #213: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8ee00 | handling event EVENT_RETRANSMIT for parent state #214 | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #214 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #214 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49649.476887; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007393 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1da10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #214 | libevent_malloc: new ptr-libevent@0x7fb37c00cf80 size 128 "road-eastnet-nonat-214" #214: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #214) | 4f 29 16 ab 3e 1b 1d 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 9a ad a4 54 39 e9 04 15 a2 a4 f0 c8 dc 49 94 | 47 5a 04 64 04 57 79 8f 63 87 e7 ae b7 39 62 ec | 47 13 85 3d 4e a0 14 32 15 25 a6 7d a4 f2 aa aa | 67 17 a5 b2 08 db fc bd dc 96 aa 21 e7 a5 f2 3b | 34 82 35 14 fb 4a be 16 a9 a7 92 42 29 b2 17 4d | 52 27 87 ea b1 3a fa 6c 11 62 48 2f 81 f0 58 f6 | 6c 8b 54 c6 3c a7 1a eb fd 0e 51 2e 43 a1 67 7f | 52 b6 51 7f f1 6a 5e 3d a1 55 84 4d aa 64 fa dd | d4 68 19 0a 1c f1 aa ed d1 aa 12 27 11 44 c1 42 | 4c 3e ce c4 42 e7 8a 9f 52 d8 86 65 33 7c 9a 6a | ee 61 16 79 e0 6f bf 94 55 b9 32 ad 6e 68 90 17 | bb 0e f5 75 b4 7f bb 34 59 92 4e 2a eb db ac 26 | 62 0d 79 8b 29 38 a9 d3 9a dc 81 9e 5b 01 b1 77 | b2 97 be 93 40 8c 22 a8 ed c3 3b 34 e3 61 26 ff | 40 f0 34 c1 02 20 28 94 a9 ac e5 14 88 22 c0 0f | 0a ad af f1 ac 83 5f 84 02 43 33 bf d4 08 dc 06 | 29 00 00 24 dc 16 0d 02 e8 ab 94 84 4c 26 85 d4 | 77 69 31 1b 43 d5 c1 b1 2c a0 69 25 59 ad 36 b7 | 5c 40 16 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 ae d6 cb 98 74 13 91 af 99 ac 97 | 02 1b 9a 5a 71 bb 20 28 00 00 00 1c 00 00 40 05 | 20 56 0b 1b ec fa 37 e0 47 28 94 e0 2b 28 be ff | 21 7d 56 5a | libevent_free: release ptr-libevent@0x7fb368035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee00 | #214 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 29 16 ab 3e 1b 1d 7d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #214 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #214 | rejected packet: | 4f 29 16 ab 3e 1b 1d 7d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #214: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5af90 | handling event EVENT_RETRANSMIT for parent state #215 | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #215 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #215 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49649.559245; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006058 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee00 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #215 | libevent_malloc: new ptr-libevent@0x7fb368035930 size 128 "road-eastnet-nonat-215" #215: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #215) | c5 c0 dd cc b6 af 51 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 5c 66 6c 45 6f a8 d2 4f 25 98 20 11 a6 a1 bb | 37 55 34 73 15 5d a4 49 35 cd f6 0a 9e e7 f3 5c | ad 42 56 ef b0 f4 fa f6 d5 ba 84 d6 dc e0 5f 55 | dc 55 56 f2 be 03 fe 4f 4a b4 66 3c 99 cb 71 e7 | b6 73 b2 44 ce 0d f7 96 90 78 2f 50 92 28 ba f9 | 22 e7 15 cf fa c8 47 f5 0c 38 c1 8a 24 5b 39 a8 | ac 47 31 ea aa c2 b1 57 78 79 5e 0b a7 a0 33 1b | 86 d9 45 31 c0 29 bb 67 d1 68 a7 f5 10 84 25 ff | 4c 83 f7 42 1d c4 e6 b7 53 b1 ed 6d 1b f7 86 9b | 3e cc 2d ee 22 b8 61 e0 e7 95 7c e8 c8 d8 b2 10 | 06 d9 50 52 8e 07 0b 4b 94 83 c7 4b 90 09 3a d9 | 8a 35 2d 83 36 bb 75 45 45 1c cf c0 11 7f 85 8d | ec e0 a4 ca 58 99 97 8b 10 af 58 2d b7 9b a7 f0 | a5 cb ea 38 04 fe 36 b9 b4 81 1d 8f 85 c7 76 a8 | d9 30 86 6d bd 32 3b 6b 02 28 ec 10 b1 28 43 17 | 56 d4 9e 0c 76 ce cc 71 e8 70 44 59 5e b3 3a a2 | 29 00 00 24 21 81 d6 ee 95 75 07 f2 b0 ff 0f d3 | a2 c0 2b d7 de b5 1b 67 08 ca 6e a7 a2 d0 6b ed | 6d c9 d5 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c 19 de 62 93 d0 a4 3d 26 c7 25 16 | 8c 72 93 29 4a 06 74 1d 00 00 00 1c 00 00 40 05 | 5e 68 d5 fe 16 1c 49 30 75 2d c6 7b 65 a2 b6 24 | 10 76 bd 1f | libevent_free: release ptr-libevent@0x7fb35801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5af90 | #215 spent 0.234 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 c0 dd cc b6 af 51 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #215 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #215 | rejected packet: | c5 c0 dd cc b6 af 51 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #215: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.104 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #216 | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #216 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #216 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49649.653775; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.011897 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5af90 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #216 | libevent_malloc: new ptr-libevent@0x7fb35801d920 size 128 "road-eastnet-nonat-216" #216: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #216) | e7 ef a7 cc e6 d3 f6 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 f0 d1 10 02 25 ff 09 54 9a 27 0a d6 e1 75 e9 | 4b 25 09 80 13 1a bd 53 71 22 e7 a5 75 81 d1 8a | 25 47 40 c6 b3 5d 03 6d 9e 83 d1 92 a9 46 5d 4b | 0d 28 c0 ae 0f 26 63 48 22 7d dc 47 5b d5 77 07 | 29 79 06 04 6b 6b 34 8f 3e bd d3 ec 63 f9 78 20 | 47 7a 08 c2 44 b5 60 c5 73 9a 3e 6a 29 e5 d6 96 | 62 d8 90 b5 3b c6 8d 28 1b e2 87 89 6b 14 69 c3 | 86 f7 90 a6 77 5f 07 46 5b 86 a4 37 e5 80 d5 e7 | e9 b6 1c 3b fa 48 83 e6 86 71 bb 22 3d c4 ff 70 | 08 57 53 75 69 80 73 34 3e 38 54 52 61 ad 52 b2 | 0c fc ac 12 69 16 4e 5c 14 e0 22 a5 7c 1b 1c 49 | 5d 41 d4 29 4c a2 8d 47 62 eb 64 7a 68 a3 77 fb | 8e a3 71 52 dc 60 0e ae 77 65 2b 4f c0 c2 80 7f | 93 d4 83 22 60 eb f0 ba 08 6e ef a3 c7 ae 6d c8 | ec 04 d3 0d a9 20 db 31 6f de c9 65 e4 0b a9 11 | a7 ab 82 ef 2d c1 74 f2 d3 be 19 9c 04 b0 c9 04 | 29 00 00 24 95 80 09 e7 7a 52 78 28 1a 48 0b 4c | 98 2f 28 0b b9 93 53 be d8 60 a3 a7 18 da 10 17 | 4f 70 e3 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 7b e5 1c 98 48 0c 58 81 2b 7b fc | 78 24 fa 6c 15 2c ab c0 00 00 00 1c 00 00 40 05 | 11 88 73 d8 fc 53 52 81 2d 03 8d 95 6f 83 2f ef | fe a8 7c ee | libevent_free: release ptr-libevent@0x7fb3540407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | #216 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e7 ef a7 cc e6 d3 f6 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #216 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #216 | rejected packet: | e7 ef a7 cc e6 d3 f6 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #216: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cc10 | handling event EVENT_RETRANSMIT for parent state #217 | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #217 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #217 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49649.77825; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.025209 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #217 | libevent_malloc: new ptr-libevent@0x7fb3540407f0 size 128 "road-eastnet-nonat-217" #217: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #217) | d2 36 bf 64 89 a3 fd 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d3 f4 5b dc ca 6a f6 be c1 c2 c8 63 19 fb 3a 1f | 70 dc de 5b 54 b8 eb 8d 2b 5e fc c2 60 b3 0c b8 | 9b c4 53 f6 87 96 b1 7e c0 8d e1 b0 c0 a3 08 59 | f8 18 05 78 a7 5e f9 f4 d8 1f 45 f9 8a db 9c 99 | 0e 07 3e 2a ba bb 8c 14 d2 d8 55 43 f4 c4 74 29 | 81 f6 ff c1 34 b9 34 a3 97 b9 37 cc 81 87 17 91 | 44 f4 e5 3a 28 aa cc 0c 3a 69 40 14 f6 3b 92 b7 | db 83 50 42 f0 36 82 ac f1 19 7e 5c 4e 90 c6 ec | cf fd 70 a2 a6 79 e2 bb b0 2b b1 df 8d e0 62 86 | 52 eb e4 a9 60 bc ec b9 d7 99 33 ce 9f d2 75 d6 | ea 82 29 7d d5 df f1 81 05 f9 8d d7 ff 39 0b 3b | 2c fe 6f 59 ae d2 c3 c5 12 3f 62 54 ed fc 61 4f | c2 74 90 8a b6 79 a0 b5 31 fc 8c d5 cb 45 21 48 | b0 1d 10 ec cf 2a b3 30 35 95 3b 32 3a 79 8c 33 | ab 0a b9 7d 4f 43 6c 9b d9 20 e5 7e 28 a9 95 05 | ed 38 6d f0 1a 10 8c 41 cd 59 c0 e4 ec 28 25 e4 | 29 00 00 24 50 f4 8b cc 88 78 9a 77 ca 06 50 f2 | 60 9a 06 39 64 9a 92 2a 1d 6a 83 ae 2a 35 88 82 | 1c 3d 43 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf a3 05 4d ff 0f f5 da 0b f8 e7 54 | e5 88 17 6e 1b 78 5e cb 00 00 00 1c 00 00 40 05 | 9b 1b 06 2c 11 9c 55 41 9d b0 16 46 62 0b cd 66 | 9f 92 84 50 | libevent_free: release ptr-libevent@0x7fb3780180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cc10 | #217 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 36 bf 64 89 a3 fd 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #217 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #217 | rejected packet: | d2 36 bf 64 89 a3 fd 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #217: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3a590 | handling event EVENT_RETRANSMIT for parent state #218 | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #218 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #218 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49649.927618; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007507 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cc10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #218 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 "road-eastnet-nonat-218" #218: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #218) | fc 84 28 e6 d0 d4 a3 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 d7 19 e0 b8 a7 81 99 33 01 41 39 ef 55 14 82 | 36 e8 1e 6f 78 81 cb 8b ba 30 50 9b f0 49 c2 8d | 4d b2 2b 95 f1 d8 28 60 35 5d 42 53 4d 43 c7 8c | 4f 74 15 45 95 27 14 77 eb 50 5d 4a f6 fd be ee | 3c 1a 88 ee 70 83 66 98 31 0a fd ad 4a 03 b5 37 | 5d 2e 93 bd 7a be 39 56 60 d9 aa 84 79 74 3d 0e | dc e3 b7 0b 24 c5 94 3d 31 8b f6 0e 82 f6 06 b8 | 26 12 7e 3f 3e d6 7d b6 51 ee ad b2 d2 ab 27 77 | 53 f8 1e d7 91 5f 2a 81 5e 4e 7d 22 21 5e 55 9c | c3 53 13 8f 2a fb e3 93 47 36 6a 2c 3e 5b e2 b0 | 72 17 1d b0 34 33 da 2e 57 d4 77 d4 d7 37 4b 04 | e0 fd 56 ba 03 09 e0 ee 03 55 18 7a 06 0c cf 4c | 2a 51 58 97 6d b9 c7 55 61 75 dd e7 d8 0d 3a 1d | 49 6c f2 e4 06 70 89 d9 24 cc ed 33 51 12 2c eb | 69 6c 48 51 d3 c5 03 79 af 69 1b 7c 09 b9 68 90 | b7 fa 26 e6 18 f8 80 d5 96 f3 c9 3f f4 18 bb d2 | 29 00 00 24 11 b2 a5 5c a6 46 80 f9 3d 23 f2 ab | ce 5d 83 0a f1 1a 01 82 7c 29 4c e1 e5 d0 ae 3c | 95 98 eb 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4f 29 50 5e 23 8d 7d 6b 34 9f ff eb | 11 dc 43 b6 12 c1 95 47 00 00 00 1c 00 00 40 05 | a7 99 e5 52 4c 36 7b 61 4e b2 63 45 25 bf 82 23 | 34 fa af bb | libevent_free: release ptr-libevent@0x7fb354009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3a590 | #218 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fc 84 28 e6 d0 d4 a3 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #218 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #218 | rejected packet: | fc 84 28 e6 d0 d4 a3 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #218: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1c480 | handling event EVENT_RETRANSMIT for parent state #219 | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #219 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #219 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49650.046024; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.010609 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #219 | libevent_malloc: new ptr-libevent@0x7fb354009640 size 128 "road-eastnet-nonat-219" #219: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #219) | 7d 80 b0 77 1f 48 77 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d7 87 5e 24 5c db 31 0a 96 84 9d 90 05 c1 73 ea | 13 fd da 1a eb 02 9b 1b a2 ef f5 1e 7d d5 07 48 | 63 2b 15 ef 39 49 2f 72 57 96 fc d0 52 b7 b4 5b | b9 8f 1f 7d 66 98 1a 54 e8 35 20 c8 da d6 6b 14 | 12 96 09 73 f0 2a 18 19 ad 4f ad c0 e9 02 7d bf | 91 ef d7 b5 3d bf 72 91 c2 b3 4a 21 80 f5 15 86 | f5 a2 c4 99 67 47 6c 96 fc e1 53 b9 1a ff ad 2e | 5a 73 b4 6f 29 39 2a 43 c9 46 c0 b4 6f 20 2e 1e | 67 a0 45 fd 13 c6 d4 73 ef 07 78 d4 9f 67 9c 74 | b8 b8 8b 57 22 93 1b 6e 1c 48 7c 01 8f e1 37 24 | ca 0b 69 5d 4d 5a 11 fe 79 69 f3 19 5f e1 13 01 | 72 da c7 1d 2e 2d 95 6b 1a 0c 79 15 cc 16 3b c9 | df 53 b2 62 55 3b 89 98 3a 35 b4 a3 d8 f7 72 66 | 5a 4a cd 05 1d 45 02 1c a4 80 ce 7b 71 ea 76 a3 | 4c 87 0d 5f a5 5d 61 29 09 d4 52 68 95 1e 6d d6 | 81 6a 00 e1 92 ed bb e5 1a 97 43 9e cf 2e 23 af | 29 00 00 24 3d 29 6e 63 66 7a 35 4b 56 6e f9 8b | 96 51 14 3b cc a7 be 10 65 46 ea 6e 67 b7 cd b3 | c7 62 bc 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 65 d7 c1 a6 5e c6 d2 33 1c 31 12 89 | 58 68 2a 17 e1 05 d4 0f 00 00 00 1c 00 00 40 05 | 8f 01 0b 19 90 57 cd de dd b3 66 c4 60 3d 67 fe | 89 ed 52 b0 | libevent_free: release ptr-libevent@0x7fb388032bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c480 | #219 spent 0.654 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 80 b0 77 1f 48 77 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #219 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #219 | rejected packet: | 7d 80 b0 77 1f 48 77 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #219: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac7f80 | handling event EVENT_RETRANSMIT for parent state #220 | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #220 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #220 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49650.147952; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.027087 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c480 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #220 | libevent_malloc: new ptr-libevent@0x7fb388032bf0 size 128 "road-eastnet-nonat-220" #220: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #220) | 46 e4 bb be 2e c2 5d 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd 39 4d 80 66 08 94 81 6d ee b8 9e f9 65 a1 19 | 54 a6 0a fc 14 3b 49 4b a5 b0 75 d5 8f f4 dc f0 | 1b a7 3c f6 bb e2 05 ae e7 81 f3 39 80 b8 01 f9 | 77 d5 d3 86 7b 99 e2 d3 05 f7 72 fa 5c f1 d2 51 | b2 76 8c 56 54 09 b2 f0 63 f0 63 23 b4 3d 48 f6 | f1 7c 7c 9e fe e8 97 61 67 eb 6f f5 a8 99 0f d8 | f0 a4 2a 65 98 03 64 d4 51 ad 7e ce 83 6c 68 5a | 24 81 05 98 d2 e5 16 4b 8b 3e c7 e6 5d cd e2 fb | a8 b3 8a 3b d0 a3 7d ce 4c 78 67 e6 b6 09 60 ba | f9 1c b9 ed ac 41 f4 ed a2 6c 61 ed 1a 8b 86 32 | f9 bb e7 03 fa 79 52 88 d5 55 24 b9 5c 26 d9 4f | 84 6f 26 7a 2c f2 0f 72 55 f3 04 53 6d 42 03 19 | 2c 35 89 e8 72 3a 30 cc ba be ce f2 4a 96 71 78 | 63 64 85 27 33 b9 dc 2a 58 25 92 09 0e 9f ab 45 | ad 24 0f 92 22 24 6c f4 98 77 7a 79 50 d8 2c a5 | 5a fb ac f5 20 e9 5a 93 8b 11 3b 04 5b 8e 94 e7 | 29 00 00 24 b8 3d f3 f9 87 d9 e7 9e 4b f1 71 60 | 7a f6 ea f9 0f a9 84 5d c0 c1 a6 93 b2 00 5b f0 | d8 3e 37 a9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f9 77 af d4 23 66 f6 eb 62 8a 75 68 | f1 14 74 bf 89 18 b5 2c 00 00 00 1c 00 00 40 05 | 75 8f 21 77 9e bf 74 11 1b b7 a1 b1 db ce 3f 91 | e1 e1 a3 e9 | libevent_free: release ptr-libevent@0x7fb360035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac7f80 | #220 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 e4 bb be 2e c2 5d 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #220 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #220 | rejected packet: | 46 e4 bb be 2e c2 5d 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #220: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0181 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #221 | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #221 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #221 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49650.246331; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006316 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac7f80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #221 | libevent_malloc: new ptr-libevent@0x7fb360035930 size 128 "road-eastnet-nonat-221" #221: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #221) | 90 8f bf e7 cf b7 65 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 72 44 57 63 97 26 0b d0 33 1e c1 f5 c9 36 d4 | f7 1a 62 3c a3 39 42 e3 c4 ee 5b 04 7a e2 93 d5 | 0f 83 78 28 fb 94 39 4c 7a cc c9 c9 ad ce 5e 59 | 68 4d ba 18 1e 4a 63 94 c5 70 f6 5d b4 77 65 58 | 10 84 fe ef 60 83 64 5b f2 89 50 99 ac e1 51 8a | d7 74 3b 5d 70 17 cd 8b 95 39 65 4b aa 2f 20 67 | bc c1 06 22 2c 60 51 a7 d1 25 ba e3 e5 7c 2a 24 | 9f dc 2e 8b 87 d8 be dd e2 1f 7f 7d 88 f1 33 ff | db 8b ce 43 0a 9d db 20 79 1b 34 f9 9e 77 87 58 | 03 3d 5b 8a b0 e8 e3 38 e6 81 79 10 ab 3d b2 02 | af 63 97 ff 1b 89 ab 73 45 c7 84 d1 96 d1 2b 2c | 45 33 cc 2a 87 09 9b 3c 40 ce 87 0c 1b b1 51 a1 | 8d 74 42 7d fd e9 3f de a9 93 ef 77 e9 c1 c8 91 | 38 fa 26 85 5e 1b 88 91 35 9e 5f 73 34 d8 96 fe | 85 b3 52 f7 42 b5 7d 56 e8 9e bb f2 e5 07 db 70 | 5b 28 4b 5d 8e 85 f0 35 5c f8 45 ae 02 de 27 d9 | 29 00 00 24 cd 4c af b1 99 23 18 29 29 9d f9 32 | c6 a6 09 22 63 0a d9 08 58 b2 a1 77 c9 06 48 e1 | 9c 8b 9e bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 fb 28 ad 15 31 02 8e bd d8 0f 80 | 1c 8f fa a7 e9 1f 34 e3 00 00 00 1c 00 00 40 05 | c4 70 86 36 d0 0a de 28 47 ec ca 4b f0 c7 6b 67 | c3 4a 0b 4c | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #221 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 8f bf e7 cf b7 65 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #221 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #221 | rejected packet: | 90 8f bf e7 cf b7 65 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #221: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7e490 | handling event EVENT_RETRANSMIT for parent state #222 | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #222 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #222 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49650.349667; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008035 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #222 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 "road-eastnet-nonat-222" #222: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #222) | eb 26 f4 19 1a 54 68 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 a4 6e 20 fd 50 2f 35 57 aa de 4a f5 e5 f9 4f | ca f6 bf 35 d5 20 df 61 18 72 c7 7b 3b d6 89 fe | 57 a2 45 9e 67 3f 8a f7 1b bb 33 5b 2f 19 93 13 | 4d bc bb d5 5a 76 0b 8c 08 e4 e4 47 2d c3 07 c6 | df c3 86 a0 6b 90 b3 31 74 8b 42 bf c4 10 0e bf | 13 cf 0b 76 db 86 6a 9f 8c f0 b4 0e c7 08 95 7e | ce 41 5e 4a 31 5c bb fb 47 19 b3 63 fb 4f ca f3 | 07 c7 1d d9 7a 1b f2 0d 5e dd f5 ac 4b 35 32 4a | fb 08 38 da 83 ea de 30 e1 52 16 cd fe ea bf b3 | 88 b6 b0 c4 6f 9e 4d bb 67 f6 e4 a0 eb 71 82 6a | ad 65 be 80 db 5a 69 3b 90 3a 58 e9 30 d6 fe 7a | f6 9b 28 5c 13 9f 6a 77 4f c9 8b bc 07 b5 a1 d9 | 2b de 81 5d 47 e4 3c c1 b1 a8 f5 bc 8d 40 df 63 | b5 80 17 f2 8c 1f b1 78 d7 35 f2 4c 44 06 cc 65 | 15 11 55 93 d9 f0 56 8f ad b9 7e 2b 7d cb da 6d | 9c ab 97 02 8c 9c fc 9d 3d c3 47 69 0f ac 56 88 | 29 00 00 24 77 e8 83 df 75 f1 9b ea 8f aa ae 8f | cc 39 a6 6f 03 de be 68 b3 66 64 be 5d 42 33 fc | 61 2a ce bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 87 6a 56 c8 8d 7a 5a c9 70 42 a3 | 93 38 10 ea 25 8a 09 bf 00 00 00 1c 00 00 40 05 | d9 43 32 2c d8 2a fd ec 96 bd 92 a4 54 e0 a9 82 | 8b 73 b6 b2 | libevent_free: release ptr-libevent@0x7fb36001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e490 | #222 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb 26 f4 19 1a 54 68 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #222 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #222 | rejected packet: | eb 26 f4 19 1a 54 68 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #222: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0671 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3940 | handling event EVENT_RETRANSMIT for parent state #223 | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #223 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #223 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49650.455106; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008978 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e490 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #223 | libevent_malloc: new ptr-libevent@0x7fb36001d920 size 128 "road-eastnet-nonat-223" #223: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #223) | 7a 51 ea 00 7b 14 8e 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e c0 c4 41 9a 95 cc 81 e9 60 68 ab 45 9c 08 20 | b4 5a a9 9d 67 49 a7 46 aa 2b 2c 92 19 0c 98 42 | fe fb 4d 10 39 99 af 92 9d b6 2e 88 4d d0 11 c1 | cc 58 dc fa d8 45 59 75 a4 74 03 ef 28 b6 b2 df | 65 14 7b c4 56 cb 7e 8e c8 a4 2d ad 67 70 a7 55 | 5c 9f d8 c8 c5 46 4c 1e 63 7d 5e ab 57 ab 59 40 | f4 a8 4b fe 89 d6 bf 01 54 f9 46 07 86 f8 bc 75 | ef 26 9f 79 f2 7c 5a c2 f7 65 21 b4 f5 f9 18 0f | 7d 48 47 25 7b 23 3b 60 c4 8a 45 86 e2 31 42 68 | 91 5b 9e 0c 6c bd d5 91 7e aa 25 22 d3 ee bf b3 | c7 ca 4c a5 a7 05 79 a5 99 a0 88 70 14 6f be 39 | bf 8f 50 de 92 0a f3 4f c2 47 ed ec a9 88 76 bd | f2 c3 85 8c 4a 5e bf dc 44 3e af ee 45 cf 06 99 | e5 de 11 6a 2b 48 7c 22 42 d6 dd 11 a6 82 39 4f | 9c 24 2f 97 4c 87 c3 35 46 b2 19 ca 91 0d f2 ce | c9 8b b5 a0 e0 d7 a9 24 95 51 89 2f 04 0b 43 0c | 29 00 00 24 82 03 c4 08 4c 73 33 ac 95 33 24 a4 | 7a b6 82 c3 62 e4 f0 a1 f5 68 f8 16 c8 95 15 db | 31 e3 65 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 01 2d a5 d7 3f aa d5 34 53 23 34 | 04 fb 26 40 92 12 55 4e 00 00 00 1c 00 00 40 05 | a6 35 a0 ce 14 8d c6 b8 e2 da 44 eb d4 cc fd 65 | 95 2a 9c c1 | libevent_free: release ptr-libevent@0x7fb358035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3940 | #223 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a 51 ea 00 7b 14 8e 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #223 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #223 | rejected packet: | 7a 51 ea 00 7b 14 8e 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #223: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0487 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a97080 | handling event EVENT_RETRANSMIT for parent state #224 | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #224 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #224 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49650.620544; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006171 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3940 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #224 | libevent_malloc: new ptr-libevent@0x7fb358035930 size 128 "road-eastnet-nonat-224" #224: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #224) | df 89 b3 52 1f 0f f1 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 96 f9 c5 cf 52 6e 98 60 ae 95 1a e5 7e 1a 31 | 50 be ef 8d 41 26 11 5a 53 58 33 b0 a8 71 a8 6c | e8 76 92 5b e2 75 f3 94 63 68 60 f5 a8 87 0f b1 | 85 e3 57 f0 0a 68 7c 03 0c 38 78 58 ee f2 b7 98 | 27 f8 ff c8 7f ae 35 5b f2 27 8d 00 b6 82 75 2b | 3b 8a 79 42 25 39 44 44 74 88 57 0d 59 d9 ac 5f | 3a a3 28 54 30 c8 14 8d d4 ac c4 45 3f f7 ef e3 | 1f eb 55 97 53 44 9f 09 90 a7 a8 b1 9f 93 b7 ec | 77 b6 57 89 c8 dc e6 37 8a a8 71 f3 b4 89 24 f8 | 4d 88 b5 f8 54 45 64 00 76 98 8f 87 5f 00 73 6a | f6 f0 80 19 81 11 66 a0 99 ea 82 6c 63 da b4 a5 | 98 93 6c 76 ef 6c 97 72 9f 10 64 96 91 57 93 6d | a1 3f 92 89 58 38 d2 cf 72 5f 0f 1e 71 7d 51 50 | af 30 4c 3a ad 78 8a 2d 7e 0c 42 b8 89 96 d8 fc | a1 5f f4 b6 9f 10 b4 87 26 b0 a3 fb 36 06 d9 24 | c5 ea bd 98 29 fe 3b d7 81 37 c6 01 f7 9b f8 78 | 29 00 00 24 c7 58 00 d8 91 d9 da 4a 3e 8b 1d 2d | a3 43 99 18 27 ab 56 0f 2a b9 54 4e 52 a3 14 24 | 6c 73 a2 b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 40 3a 6a 95 ab 61 8d 6b 1f 3b c7 26 | b3 ad 90 46 7f 26 ab 97 00 00 00 1c 00 00 40 05 | 80 ec 8b 4c 52 09 6e c6 12 ca 33 07 bd aa 68 3f | 33 bf 9b d1 | libevent_free: release ptr-libevent@0x7fb35000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a97080 | #224 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 89 b3 52 1f 0f f1 c2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #224 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #224 | rejected packet: | df 89 b3 52 1f 0f f1 c2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #224: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a92f40 | handling event EVENT_RETRANSMIT for parent state #225 | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #225 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #225 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49650.774947; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.022495 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a97080 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #225 | libevent_malloc: new ptr-libevent@0x7fb35000cf80 size 128 "road-eastnet-nonat-225" #225: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #225) | 1c 46 35 b1 a5 15 7d 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae fb 41 53 6b 81 0b c3 2d 10 6f c4 43 42 9b b5 | 58 ae de 87 ce bb b8 82 21 69 b3 17 de bc f9 c2 | a6 34 e7 7f 32 f0 7d a7 6c 08 3e 2b 62 ab 16 a0 | 49 34 97 75 bc a1 e7 57 c6 b6 15 50 f3 8a f1 c4 | e3 18 e0 09 c0 26 64 c1 d3 38 7d 95 30 90 58 4d | 99 27 bc 98 4e c8 b5 39 36 2c 46 50 c2 b8 f6 07 | a6 3c 00 2b 8d 8c 50 f6 a6 08 bd fd 79 68 91 be | 81 69 f3 24 98 59 43 c8 78 e1 dc 86 d2 16 6e a3 | 6a de dc a4 19 ff e6 d6 63 67 69 75 d8 ae 52 31 | c3 a7 ea ea 95 69 03 74 0f ef e1 6f 99 0c 56 d4 | 62 d0 1b 8d 8f 7c ad 94 ab 7c 03 43 80 8a 6e bb | 36 aa d3 44 03 e6 5c 20 d3 4b 45 e5 a2 5c 00 25 | 37 ab 32 ce e0 ae 35 8e 13 d7 03 37 11 57 20 f8 | ae 87 85 bc 10 d5 2c 64 54 e7 c4 49 10 99 df 04 | 79 9e f4 43 41 4b 6a 31 13 21 e7 cf d7 1a da 5b | 4b c0 6d 43 c6 e7 f0 86 e7 2a 75 03 ec 4c de 27 | 29 00 00 24 27 0f 48 fe da 9f b7 b6 f5 85 2e 21 | 09 ff e1 4d 05 12 3c c0 4b 2e ad df df d0 69 83 | 11 81 8e 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 11 33 1d 86 3c cb d4 6f 7e 68 c8 | 95 dd 6a 6a 4f 3e eb 1f 00 00 00 1c 00 00 40 05 | 41 16 5c d3 40 8f 72 70 a4 ea ff c4 c5 31 7c 04 | 7c 81 7f e0 | libevent_free: release ptr-libevent@0x7fb38003dab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f40 | #225 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c 46 35 b1 a5 15 7d 21 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #225 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #225 | rejected packet: | 1c 46 35 b1 a5 15 7d 21 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #225: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12c00 | handling event EVENT_RETRANSMIT for parent state #226 | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #226 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #226 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49650.88528; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.012599 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f40 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #226 | libevent_malloc: new ptr-libevent@0x7fb38003dab0 size 128 "road-eastnet-nonat-226" #226: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #226) | df 8a 99 41 35 8f 22 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 39 0d ed 10 1f e3 0e ea ca 85 c3 5a 17 31 22 | 97 9f 06 33 b0 59 ed 25 d5 cd 46 5c e1 b7 68 7b | 60 f5 73 ac 22 e6 10 7a c8 3f 64 54 b7 2c c9 ba | 36 26 b8 60 a9 a1 e6 a3 6e 44 7f 00 0c 75 49 7e | c6 17 73 3d c6 70 48 38 43 a2 56 d7 f5 0c 3f 3f | 3f 97 93 c5 a1 2b c4 07 4f 49 5c fa 0d e2 93 83 | 1d 93 5e ee cb e1 2d 5d 17 f0 04 37 84 12 a1 e4 | ea a7 ca c8 ca 5c 70 fb 0f d5 b4 aa ca 0a eb f9 | b6 b5 03 c1 29 21 80 90 c2 2f 2a fe 6c ab e2 c4 | da df fe dd 41 56 bd 81 ee 73 c7 0a e6 2a 84 64 | 7e c8 7b 2b 7f 3e cd 94 23 75 81 89 67 c2 03 bf | 33 3e d9 d2 a5 ec 73 d5 af 8a 02 94 e8 dd 1e 6c | 57 45 a8 23 17 bc 83 80 e2 7d fe e3 0d bf 65 a8 | 6f 93 8d 7c 46 a5 58 a7 45 54 b1 bb ae e2 cb 5a | 09 4c cd b3 40 87 10 07 3f c6 8e 21 cf 42 d3 a0 | 05 bf ba f5 eb 01 2d 75 a7 76 4b e5 7b 42 b7 8d | 29 00 00 24 c0 94 06 00 9d 87 40 a0 ec d8 4c ee | 0c 16 0e a6 24 3d 43 67 f1 e5 1b a0 19 81 a3 5d | 35 48 05 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fd dc 27 ce 4f 2a 14 a6 0d 4a 3f dc | 07 9c 36 b1 1b e9 59 bb 00 00 00 1c 00 00 40 05 | e3 eb a3 4f 44 c3 b7 5b e6 19 f6 7f 9a 7d 29 4c | 6a 02 ce 75 | libevent_free: release ptr-libevent@0x7fb338035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c00 | #226 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 8a 99 41 35 8f 22 b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #226 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #226 | rejected packet: | df 8a 99 41 35 8f 22 b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #226: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0456 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac5400 | handling event EVENT_RETRANSMIT for parent state #227 | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #227 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #227 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49650.987657; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00901 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c00 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #227 | libevent_malloc: new ptr-libevent@0x7fb338035930 size 128 "road-eastnet-nonat-227" #227: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #227) | c5 c2 6a 83 d2 66 bb b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 5b f4 b6 58 9a 18 76 c3 e1 6e 19 2a 39 ae a1 | 62 ea 44 d1 30 52 4d 8a 54 61 7d 23 98 f8 8d d5 | 84 3b 68 fd c2 f3 21 b9 78 0c dc e3 83 0f 8e 04 | 74 b0 67 51 d8 1a 83 67 df 2f 54 ee 3c eb 78 8c | dc ab 5e ad 88 89 74 dd b8 42 f8 3b 65 bb c7 d6 | 58 b5 ad 0a ef 24 29 f4 ee 94 22 81 71 d7 21 71 | cf 9a 96 87 e9 3e 34 bd 96 10 75 82 fd 44 7e e5 | d5 b4 6d be 50 02 22 60 ae ae 61 82 1e 48 c4 e8 | fb e2 e4 71 81 50 e1 9c 82 80 8f 59 e3 b5 cd 3d | 6c 63 88 9c 58 f3 61 37 6d 11 4f 91 c3 dc 04 d5 | 78 82 60 cb 5e 0d 1d a4 89 4d 74 78 d6 b1 e9 18 | bf 79 a1 1a 16 e0 b4 3d 00 ec 02 c0 3f 69 19 a5 | ad 3d e3 6c cb 66 a6 b9 ff c5 30 88 8f f5 e7 a8 | f5 33 4d 86 13 42 87 b3 82 49 90 36 bb 5e e9 47 | c4 bf c9 a4 e4 1a 35 38 6a 04 9b 4b 05 29 61 c8 | cf c0 72 4f 16 6a 7e 8b 6f 02 0b ab 68 bf 34 71 | 29 00 00 24 73 17 4e 35 59 6e 44 c0 fd cd 46 68 | 7d aa 47 75 fe fd 8d d7 e4 53 d6 a0 cb 05 84 4f | 51 ed 61 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 60 9b b9 46 e5 98 89 ad c1 cb e5 | e9 7b 12 83 3d 55 5a fc 00 00 00 1c 00 00 40 05 | 0c dc fe 43 8b 17 32 a8 d8 5e bc 45 b2 f1 c1 93 | bc b6 5b dc | libevent_free: release ptr-libevent@0x7fb354035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac5400 | #227 spent 0.198 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 c2 6a 83 d2 66 bb b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #227 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #227 | rejected packet: | c5 c2 6a 83 d2 66 bb b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #227: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0923 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46910 | handling event EVENT_RETRANSMIT for parent state #228 | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #228 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #228 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49651.08212; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007762 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac5400 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #228 | libevent_malloc: new ptr-libevent@0x7fb354035930 size 128 "road-eastnet-nonat-228" #228: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #228) | d5 f0 72 59 9f 13 94 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 4d 11 72 16 86 29 05 39 41 97 2f ff 33 6b a3 | e2 5f 51 ee 71 23 04 d6 72 0c fb dd 15 ef 6d c8 | 1d b7 c6 17 96 9b 3b 82 3f 74 55 80 22 53 76 ea | 2b 12 aa ae d8 aa 3b e7 03 c1 8e 79 97 e5 92 eb | b7 6d 0d a0 78 62 d0 f2 27 fb a0 42 72 ed d8 cd | 0b b4 e6 0c 99 75 b7 07 dd f8 fc 47 fd 38 1d bf | fc 96 ec 5d d0 ea 7b a2 99 77 8a 86 42 74 89 83 | 1d d8 30 c9 41 1c 6d 04 55 5a e4 6a 7f a2 48 37 | 02 c7 31 e3 a7 ef f2 c3 5f 9e 83 8d 0c 35 c9 0e | e5 2e 96 42 63 e4 ee 14 f2 43 a8 13 d6 19 12 1c | 71 11 80 4d 71 0f 19 3b 63 b8 05 30 82 8b 88 80 | bc 55 78 f9 8c 98 4b c3 03 95 ca f9 2f 2c ae 8f | 75 58 72 ba 8e 10 73 eb 12 6f 65 4a c0 7e 83 a9 | 2f 5f f5 39 44 b0 f3 71 90 fa 59 65 c5 77 f4 ce | b1 2f 6d f7 a7 ee d0 bc fc b5 7f 3e 18 f7 e0 77 | 4c 26 72 38 ff 07 80 23 0f 43 31 54 b4 87 d0 e8 | 29 00 00 24 53 c7 ad d5 ed 06 63 64 b1 b9 04 17 | 96 5d 45 22 6a eb a8 60 3b 32 23 a5 f3 37 e3 7f | 1e aa 66 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 e7 5c 74 6b 3c 37 c1 41 0f fa b6 | 88 19 1c 11 1d 3e 7c 16 00 00 00 1c 00 00 40 05 | e2 48 33 be 38 78 72 f6 d1 00 6b 61 a1 72 02 86 | 37 c7 48 ae | libevent_free: release ptr-libevent@0x7fb364012740 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46910 | #228 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 f0 72 59 9f 13 94 bf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #228 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #228 | rejected packet: | d5 f0 72 59 9f 13 94 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #228: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.074 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #229 | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #229 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #229 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49651.201585; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.010681 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46910 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #229 | libevent_malloc: new ptr-libevent@0x7fb364012740 size 128 "road-eastnet-nonat-229" #229: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #229) | 20 97 6e 08 83 53 46 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 59 ef 6c f0 3c e5 e0 cc 33 49 bc 05 30 a4 2e 63 | 40 b9 24 1d 30 3f 19 68 ce 4b ca f6 ef 1a a6 a9 | 5d 39 1c 86 c0 9f ab 47 fc 91 e7 41 3f 1d 89 da | 32 34 23 b2 92 45 82 aa b6 a2 b3 81 08 5d d4 d6 | 1a c6 db 13 96 83 8f db 02 0b e9 7b b2 14 62 aa | e1 68 37 82 79 1d ad b1 57 7f 25 a7 73 b7 37 87 | 5f 18 8b b1 9d a8 83 da d0 1c d4 ab 43 2e 39 e8 | 66 1a a5 36 6d 58 db 88 48 18 f4 d1 6a aa ea a2 | d4 61 12 6e 9d 66 34 26 cc 34 20 9e ee d3 7c 0e | b5 c3 c0 49 b9 a1 7d aa 84 e0 16 0d 30 3d 39 8b | 45 8b ca 2d 9a b8 31 03 33 bc e7 3c 1d 38 7b ad | c5 f3 f6 f7 be e9 2c 8c 87 60 cc eb a3 f8 ab f2 | a1 ec 16 ca f8 6c 96 69 77 3b 56 28 d0 57 05 dd | fa 6d 9c 0b 58 57 29 b7 d8 9e 77 ff a1 d9 ae 60 | 7b 96 73 6a b9 b8 7b 60 c3 f5 35 8e 8a fc 09 4d | 37 4c b1 4a c0 bc c4 90 71 ce a8 9f 0b 83 84 f7 | 29 00 00 24 bf ef 58 c8 50 05 c6 7d 73 f4 dc fa | 25 60 4d 48 2b 2d d1 e6 80 96 87 ef d5 27 62 2c | 4a bf b7 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 5b b6 cd 13 a1 fb 02 f0 d8 20 b7 | ee bd 8b 90 01 a4 d0 34 00 00 00 1c 00 00 40 05 | f3 e5 ac c7 45 89 3a 77 ae 9e aa 53 4d 4c 6f 3c | 03 52 b3 50 | libevent_free: release ptr-libevent@0x7fb364035750 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | #229 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 97 6e 08 83 53 46 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #229 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #229 | rejected packet: | 20 97 6e 08 83 53 46 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #229: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46adb080 | handling event EVENT_RETRANSMIT for parent state #230 | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #230 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #230 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49651.275913; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006648 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #230 | libevent_malloc: new ptr-libevent@0x7fb364035750 size 128 "road-eastnet-nonat-230" #230: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #230) | 69 22 82 19 d7 c8 c9 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 71 02 af b0 7d 99 80 ca 0a ed d4 9f 12 56 05 | 6a 75 f1 ff 5b 89 24 b2 2d d4 89 b9 fc ea 10 f2 | df 8b 07 6c 92 3c 32 d6 01 3c 1f 7c 77 2b 56 de | 1e a1 3c 62 24 a6 4e 3c 9e 57 23 35 a7 0e 3a c6 | fa 5e 05 ee c7 8d 32 41 ce 29 80 63 51 1d 1e 52 | 10 94 62 f2 6f 5b c8 e5 23 77 b3 5f 63 5e f3 42 | a7 b1 47 2a 85 90 69 04 a8 c1 76 53 9f c5 2d 06 | 66 93 5b f5 d4 f1 c7 6c 23 0b 21 57 da 55 b4 10 | b4 68 7f 72 aa 6f fd bf fc 43 d5 6e 02 91 b0 ea | ca b7 fc 32 ec e5 bd 79 74 66 56 52 a1 e5 b7 e9 | d9 32 42 bc f6 01 cc 69 66 87 01 cd 32 29 bd 73 | ff aa f2 68 30 ae 30 af 09 b3 2b 2d 0b 90 c5 d7 | e7 b1 60 17 46 74 a0 50 98 f9 06 d2 06 37 1f b3 | 0c 89 d8 99 c7 ac a0 2a 5a 19 c6 cc 6e e1 77 ee | 98 e6 45 5b c8 98 8d c9 0d d9 64 39 5b ba a1 36 | 39 81 f2 e5 39 16 cf c0 fa 26 3f 76 ff 4a de 8f | 29 00 00 24 ca 6b 45 b5 ad 3a dc fb 46 3f ff f9 | b7 9e 2a f6 cb 7b a0 93 c0 ff b4 97 10 4e 36 19 | c5 61 7a bb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f fa a5 ce 96 35 1e 80 97 f9 81 69 | 6c 9b 29 c3 b6 c2 c3 05 00 00 00 1c 00 00 40 05 | 7e 27 b2 4c db 32 1f 5b c7 5c 32 4b 9f eb 6e df | 20 af 51 69 | libevent_free: release ptr-libevent@0x7fb378035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adb080 | #230 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 22 82 19 d7 c8 c9 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #230 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #230 | rejected packet: | 69 22 82 19 d7 c8 c9 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #230: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46adc640 | handling event EVENT_RETRANSMIT for parent state #231 | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #231 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #231 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49651.384318; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005775 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adb080 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #231 | libevent_malloc: new ptr-libevent@0x7fb378035930 size 128 "road-eastnet-nonat-231" #231: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #231) | ec d8 99 0e 50 36 87 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea c5 d9 ea 48 9d 9d db e4 72 21 b2 eb fe e0 0a | 9b e5 ce 23 20 eb ad 65 b0 89 ca 3d 24 ef 66 7d | d9 a3 7a c2 3d 05 aa 43 9f 45 1a 14 d9 e7 ad 4c | 1c 30 1e e4 db 2e f5 09 08 f0 6c 1f 45 18 25 f3 | 98 35 42 0b 1b fc c0 95 3b d0 88 ca bf 43 11 51 | ba ac ee 62 bc ef 20 2d 09 0b 30 2b b3 a9 30 69 | 22 9f f7 e5 19 cc d8 4a 41 18 b5 2a 03 31 91 4d | d9 f3 33 5c b6 61 8b 80 4c 0b 65 d5 6f 4b 62 d8 | e0 38 d3 a6 32 83 92 b3 ca df 09 07 0d f6 33 d7 | b9 f9 01 8c 3b d1 ff 19 bf 3d d5 72 dd d6 67 1d | 24 a4 3b 88 00 71 46 68 47 66 c6 d8 6d 38 1a ca | 01 20 d4 7a e4 46 1b 52 ab ad 61 81 76 76 13 bf | 76 df 80 04 67 b5 86 86 0e 85 a0 4b 41 5b e3 0b | 3c 1a 51 b5 b4 55 ce 12 56 93 02 32 82 c4 86 69 | a7 eb 80 c4 8e 9a 08 dd 86 61 45 1e 8a 33 7c 03 | 7e 20 42 a9 8c 8c 89 72 43 a6 59 29 92 30 fd 49 | 29 00 00 24 b3 7b 27 54 be 06 93 cc 3c 78 ad 44 | 9e 7e c7 5b aa 5c 64 c5 5c 99 5a 37 63 dc 53 a7 | 33 95 f4 b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 2a 24 2a a3 f9 b8 d4 c1 28 f7 1a | f6 32 c3 8a 97 33 de f4 00 00 00 1c 00 00 40 05 | e6 68 a7 21 48 f4 d3 88 6e c3 71 dc ea d3 53 aa | 0b f4 bb 84 | libevent_free: release ptr-libevent@0x7fb3580407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adc640 | #231 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ec d8 99 0e 50 36 87 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #231 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #231 | rejected packet: | ec d8 99 0e 50 36 87 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #231: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #232 | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #232 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #232 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49651.469743; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006031 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adc640 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #232 | libevent_malloc: new ptr-libevent@0x7fb3580407f0 size 128 "road-eastnet-nonat-232" #232: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #232) | 24 ac 89 77 7f d4 00 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d e3 39 fa 31 96 0e da 0d 87 de fe bc da ee 7b | f9 35 54 93 66 77 87 a0 67 c2 b4 11 e6 0a 7a 53 | b3 1d a8 6c 5c b3 d5 5b f1 71 74 80 47 74 8f eb | 25 fb 81 fc 67 2b 6d fc c2 93 27 e4 ad 7c e4 44 | 62 ee e5 d7 4d 6f 45 7a fb 56 b0 33 e4 c0 e1 a0 | 0d 2e c4 d7 7c a8 3d 9c d0 51 2f 55 54 40 46 36 | 1c 6c 65 82 d9 49 b2 d4 69 f8 3b 26 10 eb 42 4c | 23 39 f8 bc c3 39 9a c3 11 d4 4e 97 4e b9 f8 a2 | 8b 74 d5 f0 11 c2 a0 7d ca dd 76 40 1b 01 76 b0 | a4 bf 05 91 b6 25 97 e5 e6 51 ee 64 fa 3b 0a c5 | a6 9c c8 8d fc dc 9a b7 88 e8 5a 4a 57 96 98 00 | db 6d 9a cd 76 5b a7 49 16 56 06 32 a5 f0 51 87 | 36 26 1d 21 19 29 89 68 02 06 6d 37 2b a0 74 d8 | 14 94 a7 12 8f 7a e7 ad 72 26 fb ca e9 57 f6 ae | 40 e1 77 ae bd 14 78 69 df f7 02 98 cb 60 f6 4b | ad ea 83 90 fd 04 b0 25 b3 92 71 37 ed 5d 75 e1 | 29 00 00 24 aa 59 21 22 32 5d 1b 0e 90 4a a6 80 | 93 f2 d5 94 dc dc 41 5c 7e 9b 58 30 e5 e0 1c a2 | 9a c8 ed 70 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 58 75 66 d7 36 51 ed 56 98 88 32 | c1 e3 29 ac 35 46 df e2 00 00 00 1c 00 00 40 05 | 0c 44 36 93 b4 a9 f5 59 b8 d7 76 83 b8 b4 fd 37 | 81 aa c4 e2 | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #232 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 ac 89 77 7f d4 00 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #232 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #232 | rejected packet: | 24 ac 89 77 7f d4 00 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #232: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab6500 | handling event EVENT_RETRANSMIT for parent state #233 | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #233 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #233 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49651.587122; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009985 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #233 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 "road-eastnet-nonat-233" #233: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #233) | 77 22 f4 9c 3e 1f 99 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6b ec 2a 3f 06 d1 8b 5a e8 a0 a7 30 dd 97 56 a8 | fc 83 ab 1c 41 f5 e8 c3 f3 53 9d 30 18 0d be a8 | 6b a6 4b 53 32 26 a8 d4 bc df 11 84 c3 51 c0 79 | eb 6a aa 97 40 5a 35 1b a4 6a 1c c4 04 e6 8f 18 | 55 5f 5f c2 af ea 6a 6c 05 59 de 4e 19 d5 22 46 | 8f 6c 32 5b 58 46 45 5f 0c 50 78 8c 5e 88 c7 73 | e0 06 97 88 0d 6e 77 b6 da 57 bc be e2 24 fb f2 | bc 09 06 c5 c0 aa 19 66 66 6f 88 a3 1d 28 43 e3 | 36 51 8c 80 0a 70 81 d2 c6 66 0e c8 9f c6 17 19 | b8 81 ac 81 1a 75 2c b9 dc 5b 7e 21 7e 73 b2 27 | 88 a7 6d 88 e3 28 4e 9c 2a a6 e3 b1 c2 84 18 fe | a8 bd 00 37 6c ea ee 13 7b 00 0f 0a d1 ff 5f 9e | d5 9b e4 25 b2 e5 a0 5b a7 8c 8c 3d 30 b8 3c 2d | d7 5a cb be 36 80 67 eb 87 97 e6 10 f7 e4 20 c7 | b9 ae bd af 99 ea 2b 87 69 7f 4e 89 2a ed a5 67 | 99 05 49 1e d6 46 c3 74 7b 66 be bf b6 f1 d6 cc | 29 00 00 24 c5 f3 2f 2c 84 76 05 a0 25 7b 18 6c | b7 6d f8 2f 27 cc e2 71 11 4d 56 a5 c7 36 d6 2c | 0b df 39 d7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 32 f4 1a 0b 18 23 e3 b7 72 f4 2b e8 | 42 64 3b ae 76 1f 34 42 00 00 00 1c 00 00 40 05 | 5e 56 c8 b1 db 9e 88 e1 bd b5 14 1e 2e de bc 55 | b2 28 a2 2d | libevent_free: release ptr-libevent@0x7fb384038240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab6500 | #233 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 22 f4 9c 3e 1f 99 ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #233 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #233 | rejected packet: | 77 22 f4 9c 3e 1f 99 ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #233: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0655 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5f0d0 | handling event EVENT_RETRANSMIT for parent state #234 | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #234 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #234 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49651.728563; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.010402 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab6500 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #234 | libevent_malloc: new ptr-libevent@0x7fb384038240 size 128 "road-eastnet-nonat-234" #234: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #234) | f2 fd b6 5b dd 65 ca 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 84 9f 8e f2 4d ae 28 c3 a6 33 85 a7 41 17 2e | a7 fb 37 ec dc 5e da 22 ed a7 d6 7f e1 29 5e 3a | c1 0a e8 67 19 e8 ac d8 ab c4 ce 43 3f 4e 0f bb | 7c 98 41 2b 6f 77 ca d9 32 a6 af f9 98 cd dd 12 | d9 37 bd e9 25 be 75 b5 bd 5e e0 83 6f 45 f8 da | 18 94 6a f4 88 bf 0e 4d e2 07 2b 36 d8 6f 3a 20 | 7f 78 6a 85 8a e5 3c dd 81 bb 63 90 5e cb bc ba | da ba 10 8a c6 0e 8a aa 71 5a 96 4e 6c 70 41 b3 | b5 ed c1 a3 26 f6 9d 2f 3e 30 60 a8 7a d4 51 c7 | c1 d0 6f 12 78 fa f6 7a 64 88 82 80 72 24 ff 23 | 06 91 a9 95 a1 36 33 ce f2 c2 55 d0 b5 3c 49 79 | 6f 7f 3e 42 f0 3e 13 68 8b e1 82 c2 f7 ef 92 e7 | 73 e6 b2 0b c7 04 76 33 01 80 30 de 76 f1 e6 56 | a7 c5 01 91 93 65 f4 09 85 c4 02 fa 63 8b e5 e6 | 21 78 9f 81 bf e4 b0 d6 2d 62 90 d2 7c 1e 4b d9 | ae 42 db a5 3c 94 61 a1 2c 3b 37 25 2d 53 32 5c | 29 00 00 24 9d 5d 40 b5 2d ec 67 ae 83 64 17 c2 | 32 3b d8 b9 21 ed 79 bc f4 91 0a 50 e4 b3 2c c0 | f4 72 58 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 89 bc a1 a0 be dd 06 e7 d6 84 21 | 72 6a c6 f8 b6 a8 a1 51 00 00 00 1c 00 00 40 05 | 53 6b 47 d7 1e 7d 4e e3 0d 3e 41 f7 75 f0 92 15 | 7c 13 7e ba | libevent_free: release ptr-libevent@0x7fb37c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5f0d0 | #234 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 fd b6 5b dd 65 ca 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #234 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #234 | rejected packet: | f2 fd b6 5b dd 65 ca 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #234: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a54250 | handling event EVENT_RETRANSMIT for parent state #235 | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #235 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #235 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49651.900981; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006493 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5f0d0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #235 | libevent_malloc: new ptr-libevent@0x7fb37c0251c0 size 128 "road-eastnet-nonat-235" #235: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #235) | 7e 07 6a 55 b2 86 f9 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 15 b0 98 97 a3 9b e7 91 af 63 8f 32 c2 f0 a6 | 5a 92 40 40 d6 e9 e6 fc ec 5f 9d 94 27 3d 04 cc | 99 dc 7e ac 23 a0 7a 25 ef 03 33 84 5f 4e 3e 44 | ab 45 fc 51 2f 77 0e 04 9c 57 58 3e e3 c4 95 ac | 99 c6 cf 74 8b ee 49 3f 97 64 5a ae 23 26 21 49 | 82 68 17 68 04 08 36 f9 22 38 ec 23 ce 8f 41 44 | bf d0 3d c1 f8 23 b3 6a aa 39 20 ad 4f 3f f3 2b | 3d f9 49 23 b6 22 6b 6a 39 8a 61 bb b3 33 4a 8f | 12 ce 51 75 41 2f c2 97 7c 24 15 e6 c7 4c 0b 5a | 7e 98 8c f9 eb 79 4c 87 18 6e 22 0f ce f5 5a f4 | 97 f7 88 3c 20 6b 59 a3 22 56 0b 5d ff 73 43 0c | d0 ab c4 fb b1 97 4e c1 93 9b 6a 7d 3a c0 41 34 | 56 74 13 c4 02 0c 52 4b 7f 7c ed c1 a7 58 84 db | 34 3e fa dc e2 91 c8 b6 c5 5f f0 1a 94 9c 21 62 | 9c 24 2a b8 60 58 3a 4f ea 5e 65 e5 c2 96 45 62 | b2 a3 11 26 4c 94 9a fb e2 2b 93 1c 4f 08 c6 66 | 29 00 00 24 0c f1 17 b1 15 6c 67 72 28 b0 8f 38 | fd 2e 9a ff fb 4a d4 a7 a7 b2 00 ff 88 fe ef 90 | e3 f8 e6 b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 78 bf 00 5e f0 c9 41 6d 35 37 22 | b0 4c f8 53 8c eb 59 4e 00 00 00 1c 00 00 40 05 | 6e 5c 6f da 69 07 20 20 73 2e b2 7c a0 00 c1 c2 | 79 44 3d 62 | libevent_free: release ptr-libevent@0x7fb388022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a54250 | #235 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 07 6a 55 b2 86 f9 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #235 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #235 | rejected packet: | 7e 07 6a 55 b2 86 f9 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #235: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d590 | handling event EVENT_RETRANSMIT for parent state #236 | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #236 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #236 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49652.034365; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.013354 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a54250 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #236 | libevent_malloc: new ptr-libevent@0x7fb388022480 size 128 "road-eastnet-nonat-236" #236: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #236) | 4f c5 63 73 3b b2 d7 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 5b 06 ee 84 fa 79 7f e6 43 db d2 0d 8b cd f5 | 59 c7 e2 83 26 7e 92 07 02 e5 75 02 5a 6a f0 b8 | 61 d3 80 1a 18 f6 6c 41 f4 8b 1c 06 f8 08 1d ec | 22 4e 32 49 5f 33 c9 49 bb d4 b4 9a 8b 9e f4 b7 | ce cc cf cb 5d b3 17 75 80 5e 65 75 ed 96 58 92 | ba 35 70 a7 18 25 e3 2d 24 94 8c 18 40 c5 8f 8e | 52 27 34 ad d5 17 cd 88 62 97 c4 7d b7 05 9c fd | 87 2b 85 fb 44 37 03 91 16 87 52 0a e0 03 40 76 | 05 68 d4 2b 81 46 59 09 54 29 07 bd 68 5b bc 5c | 8c 95 6c ea 24 20 a3 81 a2 b7 51 34 bf 49 44 7c | d1 b4 84 70 99 94 3b 26 25 f6 f8 e9 a2 1d 40 46 | 82 c9 ad f3 5f 36 60 f9 1a 16 eb 90 3e 33 04 f7 | 6d 37 8a a4 9b 0b b3 e7 22 8c ca b9 99 a2 ef 47 | df af 33 fd 94 a4 95 ab c9 0d 75 62 b8 13 05 a5 | 03 c9 74 d6 f5 9e 6f a1 90 65 6c b2 72 e9 df f5 | 5d 19 cb 15 48 a4 79 d7 52 7c ec ab 28 6e 6d 0a | 29 00 00 24 28 83 19 a9 be e7 a3 f6 92 20 74 48 | e6 d2 29 74 96 b0 77 d3 bd 1e ee 26 dd 0d 67 63 | ff bc dc bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 88 3a ff 41 6e c5 dd cc 76 37 c9 88 | fe 40 cf a9 30 61 ac fb 00 00 00 1c 00 00 40 05 | e2 5c 52 8d c8 02 86 2e 47 16 0b 04 4f 16 65 56 | c3 38 ce 94 | libevent_free: release ptr-libevent@0x7fb3480180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d590 | #236 spent 0.0963 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f c5 63 73 3b b2 d7 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #236 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #236 | rejected packet: | 4f c5 63 73 3b b2 d7 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #236: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a52c90 | handling event EVENT_RETRANSMIT for parent state #237 | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #237 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #237 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49652.152705; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007082 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d590 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #237 | libevent_malloc: new ptr-libevent@0x7fb3480180b0 size 128 "road-eastnet-nonat-237" #237: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #237) | 4f 30 a3 80 9f 9f 65 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 62 80 47 96 1c c9 51 f1 0b e5 85 bc ba 8d d8 2f | 7e 2e aa 44 d1 4d 1c a5 32 20 f2 ef d0 59 1d c7 | a5 77 ca 5e 02 89 87 a6 bb c0 e0 54 5b b5 84 79 | 29 9f bb 42 c6 20 c7 56 ce cc 84 c6 1e c1 d2 f4 | 13 76 c9 2e e4 05 e9 37 e6 bd 6f 35 dc f2 cd db | 35 16 6c ad 20 92 a2 8f 48 33 b4 20 26 8f 59 2d | 4c d4 d1 24 86 23 46 ee 6e c6 b6 24 d5 4f 00 17 | 52 61 b1 bb 85 d2 0d d3 70 1d c1 d8 3c 26 6e b6 | 77 3b f1 af 93 e8 cc 5f cb 1e 13 01 93 4d 4b b3 | 72 06 cc a6 aa 05 5c 87 d3 9f 0b a2 d6 36 1e 41 | 74 1d 84 0c 84 17 40 09 ae 80 b1 14 f6 05 f4 d7 | 5d 5f bd 62 54 0a 41 03 07 59 f0 77 45 28 e1 78 | 15 ba 85 f9 68 5c c5 ec 72 3c 38 3b 02 ac c0 42 | c6 0b db 17 1d c8 55 9c ae 19 48 78 01 ba db 02 | d5 a9 df ad 4f 67 c1 5c 0b ad 91 db 71 af d7 d7 | 81 9f c3 2e 7e 4d 1a 85 96 12 81 67 a7 1b 56 fa | 29 00 00 24 e8 e3 42 9e a6 0b 6b 38 33 d4 39 b2 | ba a4 24 74 62 c1 99 66 60 77 d8 65 6c a2 d4 f2 | 70 50 e9 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 8a 35 95 f7 6d e2 2a d4 81 0f d3 | 67 1d 3d 86 23 6d 84 2e 00 00 00 1c 00 00 40 05 | 36 30 d8 35 65 36 0c cb 2b 9c c9 7a 14 59 39 58 | c5 b8 4c 54 | libevent_free: release ptr-libevent@0x7fb38803dab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a52c90 | #237 spent 0.198 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 30 a3 80 9f 9f 65 f0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #237 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #237 | rejected packet: | 4f 30 a3 80 9f 9f 65 f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #237: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0885 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a76210 | handling event EVENT_RETRANSMIT for parent state #238 | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #238 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #238 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49652.231152; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.01539 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a52c90 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #238 | libevent_malloc: new ptr-libevent@0x7fb38803dab0 size 128 "road-eastnet-nonat-238" #238: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #238) | f6 ab 39 cf c5 7d 06 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af d3 7b 83 d9 03 ff 12 c8 97 56 ab b2 14 10 e0 | 48 f1 3b e3 4f 64 7a 9a 9e ba 3d 1c 59 ad a8 95 | bd 51 64 ba be 30 e1 34 45 a4 34 1f 3e df 3f d6 | 86 b0 59 41 db 94 3d 0d e6 62 59 ee 2c dc c0 b6 | 14 1d 3c ee 48 4c 83 08 18 f6 26 a9 cc aa db a7 | 11 c4 2a 15 e2 1f 73 e6 9e 15 53 88 2a 78 32 86 | e7 60 9e db ba 38 76 7a 13 5c c5 ac fd 1c e1 b3 | d9 b0 34 80 53 e2 98 a7 ba 07 c7 e0 29 79 99 fa | 34 4e 3c 41 8c 32 8f 62 7b 0b 06 3e 96 0f e4 ec | 50 ea 8b 72 ce 3c a2 48 3d 50 a6 bf fa b9 6f 49 | 42 35 90 06 bb 42 36 54 c0 36 66 cb e8 62 33 36 | 54 3c 66 18 ff f4 71 a8 dc 58 87 96 fa c3 1b c5 | dd a8 8d cc aa e7 e2 09 78 51 8e a8 fa 1a ff ca | 8e a6 7b eb 75 ad 7d 26 12 45 b0 78 8a db a7 e1 | 91 4e 5d 71 95 e7 03 95 d9 44 14 28 62 b8 ce bc | 33 38 e8 30 35 30 6f c6 da 40 e4 e4 28 6a f5 3c | 29 00 00 24 e9 54 88 95 a6 38 9d 64 f1 e3 1e dc | e9 d3 25 19 54 a9 08 d5 30 10 d0 0d 46 91 20 94 | d2 ec 4b e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba 09 df c5 c7 bf ac 94 7a a2 81 0c | 76 04 c4 df 2b 4d 28 f9 00 00 00 1c 00 00 40 05 | 49 c2 83 19 04 1a b6 87 e7 32 12 a0 0a 0c 4f 92 | e7 02 e1 ed | libevent_free: release ptr-libevent@0x7fb38002d3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a76210 | #238 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 ab 39 cf c5 7d 06 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #238 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #238 | rejected packet: | f6 ab 39 cf c5 7d 06 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #238: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae48c0 | handling event EVENT_RETRANSMIT for parent state #239 | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #239 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #239 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49652.327513; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.025022 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a76210 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #239 | libevent_malloc: new ptr-libevent@0x7fb38002d3a0 size 128 "road-eastnet-nonat-239" #239: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #239) | b9 4e df 3e 84 90 25 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ea ef 5f 41 79 0b fe 19 84 c3 03 27 cb e7 22 b5 | 4b 8d ad 5a dd 57 ea a0 d4 aa e3 61 84 72 47 6a | 4d 42 f7 0c 18 4a 15 88 92 91 45 67 3d 64 ce a8 | f0 3e 2a 18 f5 33 74 78 5b 6d 2d ad 60 68 a7 2c | 42 44 24 a7 49 23 19 0c fa 8d 52 0c 5c f4 c5 65 | 9c 02 7d 4d 52 90 91 ba 69 4d a0 bb 25 6e ec 3a | e9 30 9b 1f f4 e8 ec d1 8d 6a 8c 3f 41 9e 38 b3 | 41 e7 4e 00 b5 c6 ea 1b 8f 24 c7 a8 c4 ec 84 ef | e4 cf 76 d1 2b eb 8f 91 66 1a d6 b3 71 c5 5b 71 | c2 ce 48 72 d6 b0 0f 07 ef 9a 8e fd 8a 44 8d eb | 79 c7 74 c1 a0 f8 4b 78 8d 62 3e 5a d2 f7 58 20 | ab d5 b3 52 66 2e d1 5e a8 11 59 26 5b 03 c4 c7 | 72 cc b1 7b df 43 62 14 05 c3 52 d4 b9 35 c7 18 | ab d1 fe d6 f2 c4 bf d0 34 85 da 05 d8 1c 9e bd | 53 20 10 e1 51 57 70 e6 78 d1 56 9f cf b4 da 8d | 2c 7b cb 52 64 97 83 25 dd f7 88 42 c4 42 ba 2b | 29 00 00 24 60 20 cc a1 fe 49 9c e3 77 c9 2c 1b | 58 3a e0 e5 74 37 cc 08 7f e8 2c 53 5a 76 29 4f | ad de 78 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 5b b0 88 0f ba 91 5e f1 72 ec fe | c8 60 42 a1 68 5e 5f c0 00 00 00 1c 00 00 40 05 | 4c 5b ce 23 3c 60 29 97 fc d7 dc 03 c2 55 73 9c | d8 91 a1 ef | libevent_free: release ptr-libevent@0x7fb3480251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae48c0 | #239 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 4e df 3e 84 90 25 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #239 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #239 | rejected packet: | b9 4e df 3e 84 90 25 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #239: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbbc0 | handling event EVENT_RETRANSMIT for parent state #240 | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #240 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #240 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49652.402824; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.01071 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae48c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #240 | libevent_malloc: new ptr-libevent@0x7fb3480251c0 size 128 "road-eastnet-nonat-240" #240: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #240) | 52 3d c4 7d aa 75 f9 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 b8 f7 97 d2 8e a4 26 e4 de 50 11 3b 27 c2 bf | 82 42 f8 30 a7 cf e7 f1 22 7e 96 6e 08 55 b8 5b | 99 ce ba b9 bc a4 b9 85 84 1c 35 bd 81 0b 36 0d | b0 03 99 1c 13 93 72 39 72 77 b7 23 f3 36 8a 70 | 77 80 87 4b 02 4d f9 86 a0 7e c1 4d a8 f2 4c 39 | d7 80 8b 66 22 e6 a4 de 4b 09 73 0d 3d 7c b2 2f | 50 8d 5f 1f 57 2a bd 9f ac c8 a9 74 90 54 67 b7 | 8f c8 3d 39 71 39 c6 de 18 02 eb c5 ea 94 b8 db | 08 c3 39 15 f9 0b b0 93 02 0a 8a a7 ec 92 53 e4 | 1e 2b 04 08 46 40 50 55 30 ed 5b e2 89 d0 46 9a | af 8e 24 41 aa aa b9 1a e4 ce 8c fe 9d a8 de b8 | f4 9b 8a 9d 2c 1b bf b8 d5 b4 e2 72 19 89 07 85 | 8b d5 73 d5 4b b2 72 a1 17 f2 16 b2 06 c3 69 10 | 03 64 01 f6 2e ee b3 bb 12 bf 7f 2a 4b 56 f5 04 | 51 3d ee 1a 3c 36 62 a8 15 0b 0b b5 26 c4 ba ef | d2 cb 15 c8 7e 83 38 88 e7 bf 96 1b 07 79 a7 4b | 29 00 00 24 eb a6 92 08 8f 76 ab e5 c4 52 e9 41 | 1d 77 03 c7 35 5c e5 3a 95 58 fe 07 d6 1d ad f0 | 56 12 6d d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 c9 c0 38 06 3a 92 7e a1 78 c0 15 | 6c a9 8e 74 3a a1 8f 67 00 00 00 1c 00 00 40 05 | 56 20 31 94 4b 81 36 39 3c f9 b9 11 bf 66 a1 27 | 0d 62 c5 10 | libevent_free: release ptr-libevent@0x7fb350035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbbc0 | #240 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 3d c4 7d aa 75 f9 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #240 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #240 | rejected packet: | 52 3d c4 7d aa 75 f9 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #240: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #241 | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #241 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #241 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49652.486211; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00579 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbbc0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #241 | libevent_malloc: new ptr-libevent@0x7fb350035930 size 128 "road-eastnet-nonat-241" #241: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #241) | ed bf c0 ae d9 fd 74 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 7f 1d 53 5e bf 7c 50 89 9a 1b 66 7a f6 ac 57 | 1e 44 b6 4e f9 ce e0 60 9e 35 82 8c 12 e1 ec 87 | c3 32 1d d0 30 6f 24 b0 84 5b 58 a3 dd 46 7f 56 | 3a fc a0 86 c1 a5 f0 b8 b4 7f c2 24 a0 35 a3 8b | 46 8b ad d0 3a 85 a8 93 6d 92 12 5e c7 60 d3 02 | 9d 48 49 61 d0 53 cf 87 bc ba 4a 86 e9 1d 0e c4 | 8a 55 24 90 50 13 2a fe 86 c6 6d 09 e7 31 26 ca | d2 d8 c1 f1 76 8e 79 98 8c eb 73 50 64 00 6e af | 8a ae f2 36 6c c7 fa cd 65 22 6c 5b 48 98 da 47 | c0 bc 45 31 fc 5e 0f aa b4 b8 1d d3 be 55 8c ba | 12 b5 d1 65 9a 9f 14 76 d4 89 e3 78 f3 26 29 2e | 46 8d 9d 7c 77 7b 47 8f 64 31 0d 93 e5 f5 e2 8f | 76 81 eb ad 7e 90 fd 6f b1 86 5e 11 a2 e7 77 5f | c1 4e 81 30 92 43 c5 b4 66 60 7f 33 52 22 85 c1 | 6f 01 81 ec 5d 5f 91 b7 53 01 fe 18 96 c2 64 e9 | d4 ad d0 b7 b7 a3 ba e1 97 81 a4 d5 9e 61 d0 8e | 29 00 00 24 48 1f 7b 4e 8c 39 27 4c 54 7b 31 27 | 38 83 2b 38 ab a8 0f 41 0e 72 e0 b6 b5 f5 a8 48 | 24 b7 3e 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c d9 59 12 c5 45 19 36 85 eb ed 91 | 74 0a b9 7e c6 b2 17 c0 00 00 00 1c 00 00 40 05 | 8c de 28 49 d8 e8 ba a2 04 93 2a 1c a7 e3 0e 84 | b2 9d 1f bb | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #241 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed bf c0 ae d9 fd 74 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #241 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #241 | rejected packet: | ed bf c0 ae d9 fd 74 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #241: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35800d120 | handling event EVENT_RETRANSMIT for parent state #242 | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #242 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #242 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49652.656689; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.014251 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #242 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 "road-eastnet-nonat-242" #242: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #242) | bb 4d 15 84 4a d1 63 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be b8 bd 73 36 69 de db bd 2c 4d 3f 4c ae 08 43 | b3 f3 d7 53 b9 34 af 4a b1 04 e1 e2 27 f6 b2 b1 | 3e 96 98 76 a6 00 83 11 2e 07 de 5b 47 a6 5a a5 | 8f 0c 87 f8 e6 f5 c8 d5 f0 ce bf 70 a9 e4 7d f9 | c0 99 10 3b ec 9c 30 58 7b 73 32 96 65 b5 9d 37 | 48 ba 52 b0 1b 39 cd 58 16 bc 06 a4 25 89 da 22 | ca c6 85 48 e1 fd 54 81 b4 f6 46 e3 a3 cc 04 fd | ed 22 5b c4 4b c5 12 3d 87 53 9d f3 99 49 26 6d | e0 15 46 62 13 40 fa fc 54 c0 0d bd 54 60 26 93 | aa dc 01 46 3c 92 65 7b 4e 15 bf 35 9f 0d 1e ef | 63 43 fe c2 e1 31 5d 4e e4 23 fe ab 39 17 60 89 | ab b5 9b 1d 6d ed 49 c1 f4 3e 50 67 a1 09 05 d9 | c3 d6 c1 46 1e 9a db 86 ae f2 48 84 9e 9d 6d f5 | 1a 55 ad e2 9f 23 3f a2 29 49 4a 81 a2 25 2b 78 | b3 0b 2d 2a ec 81 b7 72 6f 93 e3 8b ce 4c b6 e9 | 10 ec a2 f6 93 c8 51 54 e2 4d 42 c5 bb 12 0b c1 | 29 00 00 24 43 16 25 02 5f 89 fd c4 95 04 8f 29 | f5 97 17 77 c9 2f ab bf 71 ef e8 74 04 bd c8 92 | df d9 0b 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 dc d6 bb 84 20 bd 3d 97 6d a1 71 | 60 d0 7a 61 e2 12 2c 58 00 00 00 1c 00 00 40 05 | 6c 10 68 84 3a c9 9c f7 49 94 4f 1d 42 c4 e8 ff | 34 65 7d fa | libevent_free: release ptr-libevent@0x7fb358012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800d120 | #242 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 4d 15 84 4a d1 63 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #242 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #242 | rejected packet: | bb 4d 15 84 4a d1 63 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #242: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0d500 | handling event EVENT_RETRANSMIT for parent state #243 | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #243 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #243 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49652.792088; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004754 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #243 | libevent_malloc: new ptr-libevent@0x7fb358012840 size 128 "road-eastnet-nonat-243" #243: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #243) | 39 d2 8c 3c d9 9b d0 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 7c 7b 28 d8 43 9d a6 57 48 f3 56 58 a9 96 02 | 89 eb 92 ba df fe 7c b4 93 87 0a 15 04 96 3d d9 | 97 4f ed fb da 47 e0 91 75 a8 ae 92 a4 07 c6 b2 | 54 7e 3f f7 5a ab 2d 86 ec bf b6 60 fc b0 e0 42 | 42 76 7a 8f aa 4f aa 15 dc 06 c4 c5 a6 64 c4 cb | cc bb 4c d4 38 55 bd b1 4e f2 bf cc 48 b4 72 4f | 87 59 b4 0f 7e ed 03 f1 41 ee a8 6e 5e c8 2d 73 | 30 2b 8d ba 0f 00 07 b3 03 3d 8c 71 2e 4d 64 94 | 7c 2a 25 17 eb 7f f4 7c 3d ac 47 e3 e8 64 b3 1d | 93 52 33 b4 60 d2 91 0a df 53 00 a1 04 e7 82 d1 | ba cb 66 13 49 96 51 fe 75 53 10 a1 e8 ed 85 c1 | 24 57 8f 5c 2d ab 6e 1a d8 d2 18 48 42 bf 96 fc | f2 c5 7f a1 3d 7c 8d 10 dd 4d fc 0c 94 ce 13 b9 | f3 c9 49 d3 a2 9b 04 c3 51 ef 2c 4a 1d 70 85 00 | f9 d1 0e 6b 0b 48 a0 fc 89 8f e7 8e 83 74 57 7a | c9 0c 8d f3 c6 50 96 a3 99 76 7c eb ac 17 30 58 | 29 00 00 24 35 b2 35 5f d9 02 63 3b 19 19 86 78 | 0e 3a e9 6c 99 53 dc 00 7c 7f ad 46 fe dc 4c 82 | 97 17 87 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f 31 4b 64 ab 4a 78 81 95 90 fa 46 | 73 84 e5 27 1c 47 ef db 00 00 00 1c 00 00 40 05 | 94 bc 64 25 b1 da 5d db 67 02 68 07 a8 c5 47 cd | f9 c3 f5 ed | libevent_free: release ptr-libevent@0x7fb340045ed0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d500 | #243 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 39 d2 8c 3c d9 9b d0 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #243 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #243 | rejected packet: | 39 d2 8c 3c d9 9b d0 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #243: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b05240 | handling event EVENT_RETRANSMIT for parent state #244 | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #244 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #244 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49652.974501; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006064 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d500 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #244 | libevent_malloc: new ptr-libevent@0x7fb340045ed0 size 128 "road-eastnet-nonat-244" #244: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #244) | 4b f1 49 87 f9 a6 76 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 99 c6 ce 30 f7 89 45 59 4d 59 48 bc e8 db b7 | 6e 51 73 db f1 50 f0 84 78 35 a5 96 97 1e cf a2 | ba 46 c2 c3 3c f1 3a 6e 96 bf 5f af 7c b4 86 ff | c1 77 25 46 ad 5b ec 41 ea 88 d5 b2 00 e8 44 78 | 0e 9f 1e 30 ef 44 2c 78 1a e7 51 e7 d9 ad 9d e1 | 0d 69 bb c8 c6 a9 e9 4f 0c d7 5e 29 38 5c 8e e0 | 8e 7c a8 b7 93 d1 97 5f 38 52 c5 7b 09 49 6a 76 | 8a 53 22 ab 09 ab d7 9d 44 f6 cf 05 91 df 27 29 | 68 68 78 b8 7a 10 b4 e5 9b cb 01 8d f1 35 fc c7 | 7f 8f 0c 26 0d 68 38 58 4d f7 b1 9e 96 4e 4d c2 | 24 dc 6f 1f 81 ff 16 30 89 d9 d3 07 46 98 c4 17 | fc 99 c1 d0 c2 70 9e d5 7c 43 6d 12 f3 10 9e 43 | 41 f8 15 2e de ff 3f c8 97 02 5f 67 73 89 79 ac | 6a 34 e1 ed 55 83 46 98 af 4b eb 61 ab ed 9c 2f | 3c d3 92 2f df 77 9f 98 51 e0 24 45 80 51 7a 35 | d5 76 40 ee 59 99 54 8f 46 a1 fc 48 cb 2a 6a 64 | 29 00 00 24 23 47 a6 9f de 30 3b be 65 32 63 50 | 62 d5 89 0b d7 3d ea 19 da 4e 55 f9 53 26 8c d3 | 8a e5 35 df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 5e c3 f3 c5 40 cc e2 50 93 80 f8 | 58 99 fe 09 2c 8c 43 58 00 00 00 1c 00 00 40 05 | 42 a9 a5 4e 6c 3d 71 a6 0f 5e 70 c5 17 4e 52 56 | 03 54 70 77 | libevent_free: release ptr-libevent@0x7fb338046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b05240 | #244 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4b f1 49 87 f9 a6 76 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #244 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #244 | rejected packet: | 4b f1 49 87 f9 a6 76 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #244: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a82ac0 | handling event EVENT_RETRANSMIT for parent state #245 | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #245 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #245 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49653.10193; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006526 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b05240 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #245 | libevent_malloc: new ptr-libevent@0x7fb338046040 size 128 "road-eastnet-nonat-245" #245: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #245) | 15 95 fb a9 f3 2d 54 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 07 75 44 62 b4 90 36 f0 1f 9d c1 5d 1b f7 db | 07 17 dd 42 63 05 02 d3 cf 19 39 61 be b0 c7 13 | b1 14 a4 a5 b8 a1 23 ab 35 be c3 4c de 16 3f 73 | 4f a1 df 22 33 3b cb 49 9e 26 36 44 30 39 b1 65 | 42 b6 93 29 4a f4 de 14 94 ba c8 61 f8 84 44 5d | 84 ad c9 32 19 82 79 9b 9b e9 75 42 04 bf 32 59 | 46 4e b6 9b ee 27 62 a3 18 81 ea 6a 95 c0 2b da | f4 8a 3a 0c 58 60 40 77 5e 77 85 02 1a 93 66 69 | 9d df f5 b9 a5 ac 45 4a 0d c0 94 39 1f d8 c9 eb | f6 d6 d7 0e d5 20 a4 de 35 3e cb b1 5a 3e 07 b8 | 15 10 06 8b 76 b5 1a ee 6d 90 d8 56 e7 da d7 5c | f6 12 4e f3 18 b2 7d 97 43 2c 6c d6 56 7e a8 7d | 7a cc 89 83 61 47 f5 78 b4 bb 7a cf 96 f5 41 2c | bd 99 b7 5f 2f 94 22 34 ed af 72 69 47 9d b0 d6 | ba d6 46 d7 20 70 b9 2b 04 c8 60 1d 2d 34 a0 00 | f0 50 7a 8d 2d 98 72 24 0c bf 1e e2 f2 65 16 ca | 29 00 00 24 78 20 60 94 4c f0 10 8a 14 01 4a 36 | 9d 71 3a 32 dc 84 92 f3 9e ca b0 c6 c6 47 0c 0e | 5c 4a 16 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 94 6f 42 13 dc 75 9d 65 6a 04 f1 | 12 0b d5 9b e2 af 9f 6d 00 00 00 1c 00 00 40 05 | dd ae 8a 7b 09 c8 82 03 b9 81 1c f4 27 30 35 7a | 2b 8b 29 2f | libevent_free: release ptr-libevent@0x7fb3780251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a82ac0 | #245 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 95 fb a9 f3 2d 54 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #245 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #245 | rejected packet: | 15 95 fb a9 f3 2d 54 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #245: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0596 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46af78c0 | handling event EVENT_RETRANSMIT for parent state #246 | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #246 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #246 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49653.233324; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005089 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a82ac0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #246 | libevent_malloc: new ptr-libevent@0x7fb3780251c0 size 128 "road-eastnet-nonat-246" #246: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #246) | a0 25 29 39 44 0f 25 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 89 2d 00 d4 20 29 db cd 68 77 f7 b8 f4 ff 24 | 1d 5c 36 95 62 d1 6b 2e 7a df 4b 3c 19 93 58 6c | ce e3 80 e5 ca a3 cf cd d3 d9 a2 b5 58 7c 6c 24 | e1 80 e9 fc d5 84 ae 0d 7e ea e8 9d e7 06 ab 00 | 72 40 cb c2 16 e6 8b f6 4d 5d d8 7e 9f 89 2b e1 | 0d a8 b1 ac 98 7a 10 80 97 71 ec 1f c2 1c 60 a0 | 4a 47 2e 26 d4 f8 3f c5 e0 4a c3 e3 ec a5 f8 3d | e3 be 62 c2 d3 a8 de ed 5f db cd 09 f3 df 3a 1b | 2f ae d7 5b 61 a7 b7 f8 35 c0 11 77 df e4 3c 50 | b9 e3 f0 3f 49 55 b1 46 c2 af 2d 77 f7 83 81 bc | 3d 89 16 cb 06 4f 2b 0b 77 6a cd 08 70 dd b2 5e | 34 34 1a 43 20 61 50 18 62 59 04 5a 1c 76 f2 1a | c5 6a 20 de 8a f0 5f 77 96 4b dc b9 ab a2 15 f3 | e6 86 a6 63 09 55 5d af 9f e1 30 a3 28 2a 95 86 | 24 6f f2 be f6 80 d7 fc 17 1b db 4c 69 eb f3 36 | e3 f0 06 e4 5d c6 62 de 3e 20 88 cc a6 63 59 4c | 29 00 00 24 ac df 8c 0e a5 90 d3 52 1f a2 e9 1c | c5 97 45 07 c2 87 cc 4e 1a 76 e7 94 30 33 9e 66 | b7 ac 45 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec f9 d9 bf 03 4f f2 a2 1a a6 75 4a | e9 f5 fc 17 1c 38 34 10 00 00 00 1c 00 00 40 05 | fd 95 24 c3 10 0c 51 95 0e 6e a3 ad 3b a1 a5 1a | 2c 16 a1 31 | libevent_free: release ptr-libevent@0x7fb380048a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af78c0 | #246 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 25 29 39 44 0f 25 eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #246 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #246 | rejected packet: | a0 25 29 39 44 0f 25 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #246: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a72150 | handling event EVENT_RETRANSMIT for parent state #247 | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #247 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #247 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49653.360748; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007724 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af78c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #247 | libevent_malloc: new ptr-libevent@0x7fb380048a80 size 128 "road-eastnet-nonat-247" #247: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #247) | 5d 14 02 50 68 e1 05 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 49 8a 2d d4 33 c0 d7 bc cf 08 ab af 13 85 8e | 9a 12 a5 cd 3b 66 31 91 51 03 92 de 96 84 44 92 | 2f 58 74 2e ab 28 ea 0d 4e f8 e3 ae 21 e6 45 c8 | 43 4c d5 50 a9 19 c3 44 67 b2 10 6b 79 6d 94 47 | fa 38 4e 33 78 ee e7 d3 9c 31 e4 3a 0a 97 fc f9 | af cb 80 37 57 a0 1b c2 09 c2 31 8b fc c7 0b 20 | de c6 8f fd b8 6b 84 a5 39 ac f6 54 bc 56 ef 0f | 64 4c b3 c3 15 1d ff 22 52 dd 24 dc a2 84 2b db | e1 cf 6b 7a 77 75 72 44 46 ba 71 64 0d 1e 05 41 | 6b 10 ff 59 ad 5c e4 40 01 51 72 36 a2 b0 08 e3 | a6 82 a9 79 20 45 b1 f4 1e 13 22 a0 f1 4f 23 23 | 9c e9 d5 77 c7 56 3c 45 ca 5c a9 1c b1 68 03 08 | a1 eb f6 b1 e5 5b 6c d6 3f 31 2a ba a0 3e 1f d2 | a5 29 ae bf 59 de 0d b4 a3 d2 df a5 98 9f 76 2c | 4f cf 7a 3e 6d ac 96 b0 e7 e5 ce f6 05 40 9c 9b | 09 66 cd 5d b1 dd cb f0 23 07 ad be 0d 42 b6 2e | 29 00 00 24 ef c2 8a a6 2e c6 51 78 10 63 06 58 | ba ed 73 0f a8 fa 21 72 a3 1c 39 ab 2c 37 74 08 | 1a c5 f7 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 eb f7 f6 58 75 8d be 43 b7 49 b8 | cd 30 58 5c 95 8f b2 8d 00 00 00 1c 00 00 40 05 | 15 66 60 c0 d3 3c e7 68 f4 56 38 e9 31 35 3c 02 | ee cd 1d 4a | libevent_free: release ptr-libevent@0x7fb388027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a72150 | #247 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d 14 02 50 68 e1 05 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #247 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #247 | rejected packet: | 5d 14 02 50 68 e1 05 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #247: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56dd0 | handling event EVENT_RETRANSMIT for parent state #248 | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #248 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #248 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49653.47912; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.014684 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a72150 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #248 | libevent_malloc: new ptr-libevent@0x7fb388027c10 size 128 "road-eastnet-nonat-248" #248: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #248) | 0a 60 4f 04 ec 5d f9 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b 96 4e 6b 1a 47 f3 29 f4 97 63 43 e3 c7 7c c2 | b5 40 35 82 f8 ae 61 14 ae 37 68 84 b3 6c 17 bd | e2 38 fa 08 01 a0 06 e7 9f 6c ca f7 e0 61 70 92 | 35 69 98 cb 13 b9 35 de 14 7b 48 01 ca 16 d2 a3 | 8a 8d f7 e5 16 28 68 18 42 b1 0f f2 66 75 2f 1f | 92 e4 b0 69 36 a2 b4 75 60 ca a5 a2 69 6d e6 5d | 46 24 17 68 8a bc 97 e8 9e ee 7a 06 d8 89 ea da | 29 95 98 02 98 06 f1 21 8f de de a8 b1 db 6b e4 | 16 54 6a d8 f1 bf 06 c3 2a de 4c 0f 1e 69 c7 60 | 71 82 15 35 09 a6 80 73 54 ab 5a 82 af 1b da 3b | c5 0a 69 1d 72 1d bd 02 fa 14 6a b4 37 14 ab b1 | 6c ef 68 fb 08 a8 b0 c6 58 93 07 45 93 1f 0d 53 | 5a 7c 44 c6 e8 cb d0 e7 6c 54 5d c1 89 3a e8 2b | e2 33 79 6e fa fd a1 8c dd 41 32 f8 12 7c 52 d0 | ef b1 cc 9f e3 23 da b6 ea 6c dc 48 7a 7e 45 73 | a1 ca 75 fd a6 b2 28 b4 4d de 48 05 30 76 df f1 | 29 00 00 24 da d0 88 5b 97 8e 08 a8 b2 aa 35 1a | a0 f5 0d fa 05 bb 67 43 a9 98 40 73 a9 62 0f f1 | 91 cf ba 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 42 31 df 79 b8 d9 7f 21 24 fd aa | 74 f3 12 b0 e3 0d 96 52 00 00 00 1c 00 00 40 05 | 1d 11 c7 78 91 0f ef bb 0b 1a 85 c0 59 35 e2 cd | c1 30 49 b7 | libevent_free: release ptr-libevent@0x7fb3680180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56dd0 | #248 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0a 60 4f 04 ec 5d f9 e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #248 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #248 | rejected packet: | 0a 60 4f 04 ec 5d f9 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #248: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.071 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46af8e80 | handling event EVENT_RETRANSMIT for parent state #249 | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #249 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #249 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49653.567512; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.010496 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56dd0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #249 | libevent_malloc: new ptr-libevent@0x7fb3680180b0 size 128 "road-eastnet-nonat-249" #249: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #249) | ad 80 10 70 da e5 b7 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 1c 07 0c da 8a af 5e 89 e6 75 e4 e2 6b 94 81 | 88 bb cc 32 0e 51 16 82 66 1f 3f 42 b2 39 20 4f | 72 37 07 9a fd 40 87 70 79 6c 98 3b 3f ae 9c 8b | ce 68 05 66 50 64 85 b6 97 7b 54 39 f1 30 aa a3 | 04 6c 7c 88 ec 3c d1 1c d3 b4 4e a1 ee ab a5 d5 | 77 d7 c7 96 43 3f c9 ba 18 4d e2 bf ce 40 6d b9 | 2e 6f 43 a4 09 5e 6a 0a 57 fe 2f e8 72 ab e9 6e | d3 23 65 2e 56 3d 4f 3b 55 96 b0 62 91 f8 d1 e0 | 2e e0 00 1a 25 63 9c 6e 63 ad 31 ed ac d2 4b 58 | e3 5c 40 70 04 55 4c 39 0d 41 92 a2 3d 54 25 26 | d7 ef 2a e6 88 54 16 3c 17 a5 5d ae da e8 b9 49 | 9e f9 ac d6 d0 b5 d1 4c 32 7f 53 80 13 ce 13 ff | c1 9e 7b 3a 03 2e b8 d1 5e 50 be f8 6c db 78 af | c8 42 2d 25 43 1f 70 34 56 a4 16 57 bf 31 c6 30 | d5 f1 f9 72 d0 f9 83 35 68 6b 2a 69 4e 20 b1 d3 | f4 3c 9d 15 41 2d 80 5e c6 a3 cc c1 23 a7 f8 c0 | 29 00 00 24 cf 2f e4 f6 cd 34 13 11 b4 5d 4f e0 | 11 dc f5 73 81 ae 1d 25 a9 7b e9 47 0f d3 b0 6c | 5e dc e5 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 17 3d 29 fe a9 de 26 71 da 28 d8 ce | 9c 91 f7 26 3e 7d 46 03 00 00 00 1c 00 00 40 05 | 93 a3 dc d9 83 9b 6f 85 6e d1 32 ad 49 d5 89 75 | f9 55 83 e1 | libevent_free: release ptr-libevent@0x7fb37804b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af8e80 | #249 spent 0.32 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 80 10 70 da e5 b7 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #249 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #249 | rejected packet: | ad 80 10 70 da e5 b7 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #249: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae0780 | handling event EVENT_RETRANSMIT for parent state #250 | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #250 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #250 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49653.667047; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008931 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af8e80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #250 | libevent_malloc: new ptr-libevent@0x7fb37804b7c0 size 128 "road-eastnet-nonat-250" #250: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #250) | 17 2a 9d c4 13 ac 7b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f a0 94 c6 2f 84 36 04 eb 6b 9e d3 d8 c3 41 dd | 36 5b 9a 4c 3e c4 08 57 57 9d d2 59 b6 8f 5a a0 | 97 64 4c 58 37 53 a6 c4 b2 5a d7 28 c7 0c 91 ed | be a1 6c 6f 57 ab d6 36 57 9a ec 6e 81 e7 d9 ec | 00 31 e4 c2 56 03 3a 6a 1d 88 e8 70 93 fc 2c 64 | 28 be 05 43 75 db 83 1a 2d e0 38 f0 97 bc d9 f4 | 8f af 26 f3 55 d2 01 81 1a 51 e6 93 66 74 0d 48 | f0 8b f8 85 50 76 3e 80 0e 67 70 24 1d ad 6e ea | 72 9d 01 c4 5f 99 0d ea 29 5d 36 37 89 d4 98 07 | 88 15 ab 7a c4 c5 62 ba fc 8c d5 56 64 df 3c 82 | 9a 54 de 55 20 6b b2 85 89 5d a1 07 c2 57 11 bd | f6 1f f1 5d 9f 5c 8b 9a c0 e9 98 82 3c 9e 57 da | 35 cf a5 fa b1 00 d7 17 27 e9 41 21 aa 94 96 cb | a7 a3 73 c1 a5 31 48 fa 19 d0 03 ff 95 c4 5d f6 | f5 17 61 a5 35 90 af 0b d1 1b d3 73 e5 de 34 00 | 63 00 cf f1 60 d4 f0 c0 3e 0d 02 7c 00 ab ce 51 | 29 00 00 24 c8 41 60 b9 9e 92 4a 7d d2 ef 9f 8c | 7b 43 49 a0 e3 71 1b 9d 34 81 8d 16 42 5a ed 22 | 3b 97 7d 1f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 44 92 04 c0 13 80 0a cd 61 73 30 | d2 9c c0 ea 6c 30 db 12 00 00 00 1c 00 00 40 05 | 76 73 9b 47 5d 14 7f b7 af f1 ed 94 26 55 3a fd | 56 a2 76 70 | libevent_free: release ptr-libevent@0x7fb36004b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae0780 | #250 spent 0.348 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 17 2a 9d c4 13 ac 7b ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #250 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #250 | rejected packet: | 17 2a 9d c4 13 ac 7b ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #250: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a986c0 | handling event EVENT_RETRANSMIT for parent state #251 | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #251 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #251 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49653.77765; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00704 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae0780 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #251 | libevent_malloc: new ptr-libevent@0x7fb36004b7c0 size 128 "road-eastnet-nonat-251" #251: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #251) | df 3f 41 8a f3 53 d1 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 be c7 da 7c e0 83 1f ee 21 fb 97 63 3a 34 59 | 37 0f 13 08 a4 ea d7 d0 84 7f b3 4c 1b d7 fd 64 | d7 1b c4 39 0b a3 dc 8b fa 1d 0e 6a 81 2a 3e 09 | 69 77 47 fe 6f e7 1c 9d 41 07 43 05 b4 26 e9 60 | f3 29 4e c8 f2 da 1b 32 bb 97 33 75 2b 11 a0 c6 | 90 b8 73 b2 56 c1 80 3f f7 61 34 26 98 51 70 a5 | 88 c0 d8 c1 f3 4f b0 3f 75 1e 72 b1 d1 25 9a 2c | fb 27 8d d4 bd e9 f9 05 8f 56 62 b1 eb 23 67 7e | 83 41 57 f8 72 a3 e1 9d d8 36 e3 98 b1 13 30 a8 | a1 41 78 93 e9 2c e0 32 39 cd 75 d2 0c 43 c2 5b | 87 04 ee b5 1e 82 ed bc 9a dc ae f7 d5 db 76 da | 37 c9 35 0d 18 56 2e 1c 38 d4 6f a6 b2 28 96 31 | 03 0b 4f 71 60 58 12 2e e6 e1 cb 0c 0e 82 e2 ad | 8c 61 3a e3 4a ba d8 15 fc ef ca e2 63 cc 17 43 | fc 08 79 fe 35 fa e0 53 4c ee 7c 11 7e 46 1e 11 | a2 1a 41 cb e0 70 0b 67 d9 3b 63 7b ce 2c 58 e9 | 29 00 00 24 42 a0 3c df af e9 94 45 ab 83 0c a2 | 5d 7d 94 01 25 5c 79 6e 69 bd 19 b2 b1 d1 a1 50 | 35 69 ea d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be 44 4c d9 6f 7f 41 ca 31 72 e4 37 | ba 88 35 fa ba 64 3a 13 00 00 00 1c 00 00 40 05 | c3 fb 91 09 59 3d 6b 06 7b be 35 78 ae 35 d3 44 | 75 ba f4 a9 | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a986c0 | #251 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 3f 41 8a f3 53 d1 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #251 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #251 | rejected packet: | df 3f 41 8a f3 53 d1 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #251: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #252 | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #252 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #252 keying attempt 1 of 0; retransmit 7 | retransmits: current time 49653.91207; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.011556 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a986c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #252 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 "road-eastnet-nonat-252" #252: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #252) | 50 58 54 7e 04 4a db ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 00 2c be 68 01 bb 0f 58 1a 16 c9 1d 14 15 83 | 19 e0 b8 46 87 82 81 55 0f dc 16 6a 8b 3d e4 4d | 0c e9 b2 bb 22 a5 95 09 ff 11 50 af 23 66 83 f2 | 31 7e 02 6d d7 48 dc 83 9d bb 70 c0 3a 92 f4 c0 | 9a e6 0b 57 02 38 84 8a 91 5b b5 ae 3c f3 73 1a | a4 24 27 15 5b c6 51 0e da 95 77 0a bb 05 7d 91 | af 25 45 22 0e b2 f2 4f fd 42 9b d1 98 1f 5e 0f | dd f0 f2 19 b9 ea ba ee 11 21 ee b6 0c 0f c9 55 | 03 18 8b f7 b4 d9 1d 6b 99 70 65 d0 5f 1e dc 40 | 4c 0a 83 ea e9 69 a1 18 51 d4 d2 fe 11 46 10 47 | b7 70 71 e5 e6 a8 cb f1 92 74 f2 25 34 f1 2a 20 | 05 8b f0 31 b4 4d ec 75 25 71 1f 16 3f cb 5c 38 | 5c 6a 40 df be e7 8c 81 eb 7e b2 34 69 d7 27 e3 | f2 93 a6 4e c8 e4 03 ff 2e ce ce ed 7f ee 01 95 | 24 0e cb ce 0e 6f 39 0e 07 c6 d8 ca 80 7d 23 cb | 6a 28 32 82 38 d2 86 f0 3f 31 6d 12 83 e3 4e 38 | 29 00 00 24 18 de 08 18 c8 a2 29 e1 d8 0d de 97 | 0b 9b 22 3a 3d 4c 80 05 7e b8 73 ae 1d 84 d5 68 | cf f8 f7 ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 65 87 e0 56 8f 33 84 b6 65 68 e9 | 21 de 15 28 76 56 f7 ec 00 00 00 1c 00 00 40 05 | 9e 72 e4 22 38 66 37 d3 ad ef a1 2e a9 f7 f8 37 | 54 d6 26 3e | libevent_free: release ptr-libevent@0x7fb374040670 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #252 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 58 54 7e 04 4a db ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #252 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #252 | rejected packet: | 50 58 54 7e 04 4a db ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #252: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_PENDING_DDNS | FOR_EACH_CONNECTION_... in connection_check_ddns | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations | elapsed time in connection_check_ddns for hostname lookup 0.000038 | spent 0.042 milliseconds in global timer EVENT_PENDING_DDNS | processing global timer EVENT_SHUNT_SCAN | expiring aged bare shunts from shunt table | spent 0.00252 milliseconds in global timer EVENT_SHUNT_SCAN | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #1 | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #1 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #1 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49664.282148; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.01943 exceeds limit? YES "road-eastnet-nonat-1" #1: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-1" #1: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #253 at 0x557d46b2e070 | State DB: adding IKEv2 state #253 in UNDEFINED | pstats #253 ikev2.ike started | Message ID: init #253: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #253: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #253; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-1" #253: initiating v2 parent SA to replace #1 | using existing local IKE proposals for connection road-eastnet-nonat-1 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 253 for state #253 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aecb00 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #253 | libevent_malloc: new ptr-libevent@0x7fb374040670 size 128 | crypto helper 13 resuming | #253 spent 0.0743 milliseconds in ikev2_parent_outI1() | crypto helper 13 starting work-order 253 for state #253 | RESET processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 253 | start processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #1 ikev2.ike failed too-many-retransmits | pstats #1 ikev2.ike deleted too-many-retransmits | #1 spent 2.73 milliseconds in total | [RE]START processing: state #1 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-1" #1: deleting state (STATE_PARENT_I1) aged 64.022s and NOT sending notification | parent state #1: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #1 "road-eastnet-nonat-1" #1: deleting IKE SA for connection 'road-eastnet-nonat-1' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-1' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-1 | State DB: deleting IKEv2 state #1 in PARENT_I1 | parent state #1: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #1 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb348009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | in statetime_stop() and could not find #1 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 253 time elapsed 0.000598 seconds Initiating connection road-eastnet-nonat-1 which received a Delete/Notify but must remain up per local policy | (#253) spent 0.599 milliseconds in crypto helper computing work-order 253: ikev2_outI1 KE (pcr) | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 13 sending results from work-order 253 for state #253 to event queue | scheduling resume sending helper answer for #253 | libevent_malloc: new ptr-libevent@0x7fb35c04b7c0 size 128 | crypto helper 13 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-1" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-1' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-1" | stop processing: connection "road-eastnet-nonat-1" (in initiate_a_connection() at initiate.c:349) | spent 0.0806 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #253 | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 253 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #253 | **emit ISAKMP Message: | initiator cookie: | 54 6a b3 63 15 2d 54 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-1 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 45 a1 ec de cb a0 5d c1 1a bd 04 af 6b c8 65 41 | ikev2 g^x 5e 52 49 f5 a0 69 ab 28 22 ed fc 77 d0 a0 c1 09 | ikev2 g^x 24 c3 68 ac f8 52 b1 01 40 3f 24 70 5d fa bb e6 | ikev2 g^x 18 17 b8 60 62 5c 25 b7 91 1b 32 be a8 33 c7 03 | ikev2 g^x d3 9b 4d ca 93 cb 69 27 56 25 f1 0e f0 75 9b f1 | ikev2 g^x 6f a5 25 09 c0 56 aa ed be 25 e6 7b 20 95 b5 00 | ikev2 g^x 7f 1a 1b 09 1c 04 5e 80 38 55 80 90 08 7b dd ce | ikev2 g^x 4f 11 1a be 0d 38 69 ab e8 df ca 75 0d 3f c0 1b | ikev2 g^x 66 36 7e b8 6f b9 34 13 07 77 35 27 1b 68 f3 4e | ikev2 g^x 59 d6 7e de a5 ba 53 3b 79 89 bf fd cf 6b c9 05 | ikev2 g^x 32 48 47 96 e8 02 b8 8c 85 5e 07 cf ed 73 28 31 | ikev2 g^x 7f b0 4a 57 00 7a 0b 42 b6 34 c6 f8 0c c3 11 82 | ikev2 g^x b9 52 df 83 77 94 ac c4 6e d0 af 9f 9c 46 4a 9d | ikev2 g^x 6a 59 79 91 e9 aa 6f 46 f9 bf 64 56 57 97 6b ca | ikev2 g^x 02 fc e7 a2 5d cb d3 e6 be 89 40 eb 8b 5f bf bb | ikev2 g^x ea e1 78 af e4 9a d6 bc 8f 45 8e 59 45 6b cc 3f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5b 81 82 6a 34 1f 0c 89 b3 0b 07 6c d0 e3 bd fa | IKEv2 nonce b4 1c af f3 18 56 94 10 92 25 11 f0 48 f8 d2 cb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 54 6a b3 63 15 2d 54 6c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 01 | natd_hash: port= 01 f4 | natd_hash: hash= 62 79 2b 18 11 0c 23 de f4 d0 de e0 77 97 22 a5 | natd_hash: hash= 08 48 2f ff | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 62 79 2b 18 11 0c 23 de f4 d0 de e0 77 97 22 a5 | Notify data 08 48 2f ff | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 54 6a b3 63 15 2d 54 6c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c8 d4 47 db f6 e8 46 67 19 87 ae df 18 10 c7 ab | natd_hash: hash= 9f a6 71 f9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c8 d4 47 db f6 e8 46 67 19 87 ae df 18 10 c7 ab | Notify data 9f a6 71 f9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #253 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #253: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #253 to 4294967295 after switching state | Message ID: IKE #253 skipping update_recv as MD is fake | Message ID: sent #253 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-1" #253: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.1:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #253) | 54 6a b3 63 15 2d 54 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 a1 ec de cb a0 5d c1 1a bd 04 af 6b c8 65 41 | 5e 52 49 f5 a0 69 ab 28 22 ed fc 77 d0 a0 c1 09 | 24 c3 68 ac f8 52 b1 01 40 3f 24 70 5d fa bb e6 | 18 17 b8 60 62 5c 25 b7 91 1b 32 be a8 33 c7 03 | d3 9b 4d ca 93 cb 69 27 56 25 f1 0e f0 75 9b f1 | 6f a5 25 09 c0 56 aa ed be 25 e6 7b 20 95 b5 00 | 7f 1a 1b 09 1c 04 5e 80 38 55 80 90 08 7b dd ce | 4f 11 1a be 0d 38 69 ab e8 df ca 75 0d 3f c0 1b | 66 36 7e b8 6f b9 34 13 07 77 35 27 1b 68 f3 4e | 59 d6 7e de a5 ba 53 3b 79 89 bf fd cf 6b c9 05 | 32 48 47 96 e8 02 b8 8c 85 5e 07 cf ed 73 28 31 | 7f b0 4a 57 00 7a 0b 42 b6 34 c6 f8 0c c3 11 82 | b9 52 df 83 77 94 ac c4 6e d0 af 9f 9c 46 4a 9d | 6a 59 79 91 e9 aa 6f 46 f9 bf 64 56 57 97 6b ca | 02 fc e7 a2 5d cb d3 e6 be 89 40 eb 8b 5f bf bb | ea e1 78 af e4 9a d6 bc 8f 45 8e 59 45 6b cc 3f | 29 00 00 24 5b 81 82 6a 34 1f 0c 89 b3 0b 07 6c | d0 e3 bd fa b4 1c af f3 18 56 94 10 92 25 11 f0 | 48 f8 d2 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 79 2b 18 11 0c 23 de f4 d0 de e0 | 77 97 22 a5 08 48 2f ff 00 00 00 1c 00 00 40 05 | c8 d4 47 db f6 e8 46 67 19 87 ae df 18 10 c7 ab | 9f a6 71 f9 | state #253 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374040670 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aecb00 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #253 | libevent_malloc: new ptr-libevent@0x7fb374040670 size 128 | #253 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49664.283324 | resume sending helper answer for #253 suppresed complete_v2_state_transition() and stole MD | #253 spent 0.347 milliseconds in resume sending helper answer | stop processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c04b7c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 6a b3 63 15 2d 54 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #253 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #253 | rejected packet: | 54 6a b3 63 15 2d 54 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #253: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47e90 | handling event EVENT_RETRANSMIT for parent state #2 | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #2 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #2 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49664.534713; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.013555 exceeds limit? YES "road-eastnet-nonat-2" #2: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-2" #2: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #254 at 0x557d469d4b10 | State DB: adding IKEv2 state #254 in UNDEFINED | pstats #254 ikev2.ike started | Message ID: init #254: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #254: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #254; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-2" #254: initiating v2 parent SA to replace #2 | using existing local IKE proposals for connection road-eastnet-nonat-2 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 254 for state #254 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb348005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #254 | libevent_malloc: new ptr-libevent@0x7fb35c04b7c0 size 128 | #254 spent 0.0734 milliseconds in ikev2_parent_outI1() | RESET processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #2 ikev2.ike failed too-many-retransmits | crypto helper 17 resuming | crypto helper 17 starting work-order 254 for state #254 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 254 | pstats #2 ikev2.ike deleted too-many-retransmits | #2 spent 2.69 milliseconds in total | [RE]START processing: state #2 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-2" #2: deleting state (STATE_PARENT_I1) aged 64.033s and NOT sending notification | parent state #2: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #2 "road-eastnet-nonat-2" #2: deleting IKE SA for connection 'road-eastnet-nonat-2' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-2' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-2 | State DB: deleting IKEv2 state #2 in PARENT_I1 | parent state #2: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #2 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb36401f860 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47e90 | in statetime_stop() and could not find #2 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-2 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-2" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-2' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-2" | stop processing: connection "road-eastnet-nonat-2" (in initiate_a_connection() at initiate.c:349) | spent 0.0576 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 254 time elapsed 0.001955 seconds | (#254) spent 1.95 milliseconds in crypto helper computing work-order 254: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 254 for state #254 to event queue | scheduling resume sending helper answer for #254 | libevent_malloc: new ptr-libevent@0x7fb350048a10 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #254 | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 254 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #254 | **emit ISAKMP Message: | initiator cookie: | b9 c6 03 da 3d 1b ba 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-2 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ca 92 e7 94 15 6c 86 1d 96 e8 8f 04 2b 4c 31 1c | ikev2 g^x f2 c3 f1 85 7b fe b5 54 f7 1b c1 2a 4c 6d 01 5c | ikev2 g^x 34 19 7c 9d d1 b6 95 21 d0 08 d9 67 bb dc e0 e1 | ikev2 g^x 38 6b 59 b4 76 fc 39 ee a0 2d f2 f5 62 c4 0a 49 | ikev2 g^x 6b 3c f0 00 22 80 8c 1c 36 99 55 b9 ef cb 76 99 | ikev2 g^x 5c 12 4c 07 84 ad f5 48 ab 42 10 f5 2e d6 e5 5c | ikev2 g^x 9d d4 b0 9f 16 b4 b4 bb b3 53 f3 e9 cc 93 ad 3b | ikev2 g^x a8 c4 f0 7f 9d 9d e3 f4 df 44 9c 28 b2 72 cb b6 | ikev2 g^x 4b 6a f0 9c 2e 22 ce 4f d0 b2 c9 a3 7c 48 1e 03 | ikev2 g^x a8 3d 92 67 11 0c a8 c0 fd 76 08 be 4f 01 6d 12 | ikev2 g^x 3e 0b 87 da bc 3d 45 99 0f 30 cb 9d 8c 96 4d 32 | ikev2 g^x 07 37 42 c8 ca 8d d9 f2 2b 81 33 b1 a2 49 5c 82 | ikev2 g^x 69 0d 94 76 f5 ef d0 bf fa db a3 8e db 15 f4 34 | ikev2 g^x c3 81 4c 6a 47 45 9d c9 09 00 1e 8a 46 70 b4 51 | ikev2 g^x 30 c0 17 29 a6 05 17 9f 61 e3 d5 9e b5 26 aa b7 | ikev2 g^x f8 4d 8f 98 15 36 79 53 4c 2f e1 9e 49 63 a8 23 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b7 98 fa 02 fe fe ce ce 94 a2 bc d0 60 0d 7b 30 | IKEv2 nonce 0c f7 48 0b 72 92 ee ec 3d 65 36 1c 6e c0 df 60 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b9 c6 03 da 3d 1b ba 8f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 02 | natd_hash: port= 01 f4 | natd_hash: hash= 3a c0 39 9e 3d 58 28 13 41 2f 06 c7 b4 3e d7 c2 | natd_hash: hash= 8d 41 7c 7d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3a c0 39 9e 3d 58 28 13 41 2f 06 c7 b4 3e d7 c2 | Notify data 8d 41 7c 7d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b9 c6 03 da 3d 1b ba 8f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 08 0f dc c4 71 f2 0f bc 45 99 87 81 91 93 b1 3d | natd_hash: hash= 30 5f 17 8f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 08 0f dc c4 71 f2 0f bc 45 99 87 81 91 93 b1 3d | Notify data 30 5f 17 8f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #254 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #254: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #254 to 4294967295 after switching state | Message ID: IKE #254 skipping update_recv as MD is fake | Message ID: sent #254 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-2" #254: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.2:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #254) | b9 c6 03 da 3d 1b ba 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca 92 e7 94 15 6c 86 1d 96 e8 8f 04 2b 4c 31 1c | f2 c3 f1 85 7b fe b5 54 f7 1b c1 2a 4c 6d 01 5c | 34 19 7c 9d d1 b6 95 21 d0 08 d9 67 bb dc e0 e1 | 38 6b 59 b4 76 fc 39 ee a0 2d f2 f5 62 c4 0a 49 | 6b 3c f0 00 22 80 8c 1c 36 99 55 b9 ef cb 76 99 | 5c 12 4c 07 84 ad f5 48 ab 42 10 f5 2e d6 e5 5c | 9d d4 b0 9f 16 b4 b4 bb b3 53 f3 e9 cc 93 ad 3b | a8 c4 f0 7f 9d 9d e3 f4 df 44 9c 28 b2 72 cb b6 | 4b 6a f0 9c 2e 22 ce 4f d0 b2 c9 a3 7c 48 1e 03 | a8 3d 92 67 11 0c a8 c0 fd 76 08 be 4f 01 6d 12 | 3e 0b 87 da bc 3d 45 99 0f 30 cb 9d 8c 96 4d 32 | 07 37 42 c8 ca 8d d9 f2 2b 81 33 b1 a2 49 5c 82 | 69 0d 94 76 f5 ef d0 bf fa db a3 8e db 15 f4 34 | c3 81 4c 6a 47 45 9d c9 09 00 1e 8a 46 70 b4 51 | 30 c0 17 29 a6 05 17 9f 61 e3 d5 9e b5 26 aa b7 | f8 4d 8f 98 15 36 79 53 4c 2f e1 9e 49 63 a8 23 | 29 00 00 24 b7 98 fa 02 fe fe ce ce 94 a2 bc d0 | 60 0d 7b 30 0c f7 48 0b 72 92 ee ec 3d 65 36 1c | 6e c0 df 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3a c0 39 9e 3d 58 28 13 41 2f 06 c7 | b4 3e d7 c2 8d 41 7c 7d 00 00 00 1c 00 00 40 05 | 08 0f dc c4 71 f2 0f bc 45 99 87 81 91 93 b1 3d | 30 5f 17 8f | state #254 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c04b7c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb348005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #254 | libevent_malloc: new ptr-libevent@0x7fb35c04b7c0 size 128 | #254 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49664.537215 | resume sending helper answer for #254 suppresed complete_v2_state_transition() and stole MD | #254 spent 0.332 milliseconds in resume sending helper answer | stop processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb350048a10 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 c6 03 da 3d 1b ba 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #254 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #254 | rejected packet: | b9 c6 03 da 3d 1b ba 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 02 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #254: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acab40 | handling event EVENT_RETRANSMIT for parent state #3 | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #3 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #3 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49664.683497; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.014554 exceeds limit? YES "road-eastnet-nonat-3" #3: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-3" #3: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #255 at 0x557d469d5c40 | State DB: adding IKEv2 state #255 in UNDEFINED | pstats #255 ikev2.ike started | Message ID: init #255: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #255: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #255; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-3" #255: initiating v2 parent SA to replace #3 | using existing local IKE proposals for connection road-eastnet-nonat-3 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 255 for state #255 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47e90 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #255 | libevent_malloc: new ptr-libevent@0x7fb350048a10 size 128 | #255 spent 0.0635 milliseconds in ikev2_parent_outI1() | RESET processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #3 ikev2.ike failed too-many-retransmits | pstats #3 ikev2.ike deleted too-many-retransmits | #3 spent 2.7 milliseconds in total | [RE]START processing: state #3 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-3" #3: deleting state (STATE_PARENT_I1) aged 64.016s and NOT sending notification | parent state #3: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #3 "road-eastnet-nonat-3" #3: deleting IKE SA for connection 'road-eastnet-nonat-3' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-3' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 18 resuming | crypto helper 18 starting work-order 255 for state #255 | in connection_discard for connection road-eastnet-nonat-3 | State DB: deleting IKEv2 state #3 in PARENT_I1 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 255 | parent state #3: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #3 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb37c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab40 | in statetime_stop() and could not find #3 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-3 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-3" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-3' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-3" | stop processing: connection "road-eastnet-nonat-3" (in initiate_a_connection() at initiate.c:349) | spent 0.0565 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 255 time elapsed 0.000582 seconds | (#255) spent 0.581 milliseconds in crypto helper computing work-order 255: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 255 for state #255 to event queue | scheduling resume sending helper answer for #255 | libevent_malloc: new ptr-libevent@0x7fb354048a10 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #255 | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 255 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #255 | **emit ISAKMP Message: | initiator cookie: | b4 62 7d 49 a4 92 20 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-3 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b3 95 bd 0c ae 75 b5 e3 ef c4 cd 00 43 ea 3e 9a | ikev2 g^x 02 ba 07 e1 c1 bd 5d f0 a8 a6 51 3a 4a 21 e5 46 | ikev2 g^x 19 59 a0 93 a8 07 b1 7f 53 68 e9 d8 63 85 c8 12 | ikev2 g^x 71 98 74 63 ac c1 5d a5 39 9f c3 9e 95 82 52 3e | ikev2 g^x e1 41 18 21 d4 2e 9c 8d e0 71 8e d0 6d 4b 68 7e | ikev2 g^x 1c df fa cf ed ca 99 59 64 68 ed b3 9c 61 13 df | ikev2 g^x 2f ad b1 5a 3f dc 76 f5 58 69 91 b1 8b 83 c7 6f | ikev2 g^x 0b 08 55 fc ba 8b aa 73 16 1a 51 59 6d 0d 21 1f | ikev2 g^x bf 66 60 21 f1 49 bc 92 8c 9a be 6c 52 be 72 e6 | ikev2 g^x 19 b6 47 f8 33 cc b5 e6 ed 41 53 62 da 9d 6d 34 | ikev2 g^x fc ee 0f bf 23 f3 09 d7 96 22 fd c9 6e c0 31 60 | ikev2 g^x 95 22 90 57 96 ed 6a f6 05 50 b8 1b 34 71 5d dd | ikev2 g^x a7 c1 ab 82 e5 96 d7 d0 ac 36 1c 30 9d ee a7 97 | ikev2 g^x 6f 15 b5 89 4e c4 f6 f6 b5 08 23 bf cb 9e 75 f3 | ikev2 g^x f9 e0 ea 95 d8 eb 73 6d e3 2b 25 8d e5 17 c9 6e | ikev2 g^x f4 0f 23 e9 e4 7e dc 78 3c ae 82 7e 2a c2 1f 84 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 27 f0 79 05 ca 38 9d 60 17 70 37 05 8f c8 d2 c0 | IKEv2 nonce f8 4f 0f 05 b1 d0 9d 9d 43 88 90 d5 2d 20 4e 32 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b4 62 7d 49 a4 92 20 45 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 03 | natd_hash: port= 01 f4 | natd_hash: hash= 58 2d ab c5 84 ac e3 ea 3f b2 97 06 b2 08 24 4c | natd_hash: hash= 91 11 e0 2a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 58 2d ab c5 84 ac e3 ea 3f b2 97 06 b2 08 24 4c | Notify data 91 11 e0 2a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b4 62 7d 49 a4 92 20 45 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ca ca c2 3f 11 62 54 7a 69 58 46 70 0a 1d a0 10 | natd_hash: hash= 47 7f 3a 1d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ca ca c2 3f 11 62 54 7a 69 58 46 70 0a 1d a0 10 | Notify data 47 7f 3a 1d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #255 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #255: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #255 to 4294967295 after switching state | Message ID: IKE #255 skipping update_recv as MD is fake | Message ID: sent #255 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-3" #255: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.3:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #255) | b4 62 7d 49 a4 92 20 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 95 bd 0c ae 75 b5 e3 ef c4 cd 00 43 ea 3e 9a | 02 ba 07 e1 c1 bd 5d f0 a8 a6 51 3a 4a 21 e5 46 | 19 59 a0 93 a8 07 b1 7f 53 68 e9 d8 63 85 c8 12 | 71 98 74 63 ac c1 5d a5 39 9f c3 9e 95 82 52 3e | e1 41 18 21 d4 2e 9c 8d e0 71 8e d0 6d 4b 68 7e | 1c df fa cf ed ca 99 59 64 68 ed b3 9c 61 13 df | 2f ad b1 5a 3f dc 76 f5 58 69 91 b1 8b 83 c7 6f | 0b 08 55 fc ba 8b aa 73 16 1a 51 59 6d 0d 21 1f | bf 66 60 21 f1 49 bc 92 8c 9a be 6c 52 be 72 e6 | 19 b6 47 f8 33 cc b5 e6 ed 41 53 62 da 9d 6d 34 | fc ee 0f bf 23 f3 09 d7 96 22 fd c9 6e c0 31 60 | 95 22 90 57 96 ed 6a f6 05 50 b8 1b 34 71 5d dd | a7 c1 ab 82 e5 96 d7 d0 ac 36 1c 30 9d ee a7 97 | 6f 15 b5 89 4e c4 f6 f6 b5 08 23 bf cb 9e 75 f3 | f9 e0 ea 95 d8 eb 73 6d e3 2b 25 8d e5 17 c9 6e | f4 0f 23 e9 e4 7e dc 78 3c ae 82 7e 2a c2 1f 84 | 29 00 00 24 27 f0 79 05 ca 38 9d 60 17 70 37 05 | 8f c8 d2 c0 f8 4f 0f 05 b1 d0 9d 9d 43 88 90 d5 | 2d 20 4e 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 2d ab c5 84 ac e3 ea 3f b2 97 06 | b2 08 24 4c 91 11 e0 2a 00 00 00 1c 00 00 40 05 | ca ca c2 3f 11 62 54 7a 69 58 46 70 0a 1d a0 10 | 47 7f 3a 1d | state #255 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb350048a10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47e90 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47e90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #255 | libevent_malloc: new ptr-libevent@0x7fb350048a10 size 128 | #255 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49664.684595 | resume sending helper answer for #255 suppresed complete_v2_state_transition() and stole MD | #255 spent 0.313 milliseconds in resume sending helper answer | stop processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb354048a10 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 62 7d 49 a4 92 20 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #255 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #255 | rejected packet: | b4 62 7d 49 a4 92 20 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 03 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #255: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #253 | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #253 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #253 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49664.783829; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500505 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #253 | libevent_malloc: new ptr-libevent@0x7fb354048a10 size 128 "road-eastnet-nonat-1" #253: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #253) | 54 6a b3 63 15 2d 54 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 a1 ec de cb a0 5d c1 1a bd 04 af 6b c8 65 41 | 5e 52 49 f5 a0 69 ab 28 22 ed fc 77 d0 a0 c1 09 | 24 c3 68 ac f8 52 b1 01 40 3f 24 70 5d fa bb e6 | 18 17 b8 60 62 5c 25 b7 91 1b 32 be a8 33 c7 03 | d3 9b 4d ca 93 cb 69 27 56 25 f1 0e f0 75 9b f1 | 6f a5 25 09 c0 56 aa ed be 25 e6 7b 20 95 b5 00 | 7f 1a 1b 09 1c 04 5e 80 38 55 80 90 08 7b dd ce | 4f 11 1a be 0d 38 69 ab e8 df ca 75 0d 3f c0 1b | 66 36 7e b8 6f b9 34 13 07 77 35 27 1b 68 f3 4e | 59 d6 7e de a5 ba 53 3b 79 89 bf fd cf 6b c9 05 | 32 48 47 96 e8 02 b8 8c 85 5e 07 cf ed 73 28 31 | 7f b0 4a 57 00 7a 0b 42 b6 34 c6 f8 0c c3 11 82 | b9 52 df 83 77 94 ac c4 6e d0 af 9f 9c 46 4a 9d | 6a 59 79 91 e9 aa 6f 46 f9 bf 64 56 57 97 6b ca | 02 fc e7 a2 5d cb d3 e6 be 89 40 eb 8b 5f bf bb | ea e1 78 af e4 9a d6 bc 8f 45 8e 59 45 6b cc 3f | 29 00 00 24 5b 81 82 6a 34 1f 0c 89 b3 0b 07 6c | d0 e3 bd fa b4 1c af f3 18 56 94 10 92 25 11 f0 | 48 f8 d2 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 79 2b 18 11 0c 23 de f4 d0 de e0 | 77 97 22 a5 08 48 2f ff 00 00 00 1c 00 00 40 05 | c8 d4 47 db f6 e8 46 67 19 87 ae df 18 10 c7 ab | 9f a6 71 f9 | libevent_free: release ptr-libevent@0x7fb374040670 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #253 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 6a b3 63 15 2d 54 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #253 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #253 | rejected packet: | 54 6a b3 63 15 2d 54 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #253: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abfd80 | handling event EVENT_RETRANSMIT for parent state #4 | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #4 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #4 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49664.820135; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006627 exceeds limit? YES "road-eastnet-nonat-4" #4: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-4" #4: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #256 at 0x557d469d8810 | State DB: adding IKEv2 state #256 in UNDEFINED | pstats #256 ikev2.ike started | Message ID: init #256: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #256: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #256; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-4" #256: initiating v2 parent SA to replace #4 | using existing local IKE proposals for connection road-eastnet-nonat-4 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 256 for state #256 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aecb00 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #256 | libevent_malloc: new ptr-libevent@0x7fb374040670 size 128 | #256 spent 0.0687 milliseconds in ikev2_parent_outI1() | RESET processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #4 ikev2.ike failed too-many-retransmits | pstats #4 ikev2.ike deleted too-many-retransmits | #4 spent 2.63 milliseconds in total | [RE]START processing: state #4 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-4" #4: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #4: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #4 "road-eastnet-nonat-4" #4: deleting IKE SA for connection 'road-eastnet-nonat-4' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-4' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-4 | State DB: deleting IKEv2 state #4 in PARENT_I1 | parent state #4: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 7 resuming | crypto helper 7 starting work-order 256 for state #256 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 256 | stop processing: state #4 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3380251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abfd80 | in statetime_stop() and could not find #4 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-4 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-4" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-4' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-4" | stop processing: connection "road-eastnet-nonat-4" (in initiate_a_connection() at initiate.c:349) | spent 0.0553 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 256 time elapsed 0.00053 seconds | (#256) spent 0.534 milliseconds in crypto helper computing work-order 256: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 256 for state #256 to event queue | scheduling resume sending helper answer for #256 | libevent_malloc: new ptr-libevent@0x7fb348048a10 size 128 | crypto helper 7 waiting (nothing to do) | processing resume sending helper answer for #256 | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 256 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #256 | **emit ISAKMP Message: | initiator cookie: | af ff 14 5c e8 87 a5 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-4 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1a 1f 56 51 1c ec cd e5 db 48 26 c8 dc 41 fd 54 | ikev2 g^x a8 2a f3 18 64 e6 88 a2 77 94 ce b8 37 5b 43 37 | ikev2 g^x 15 71 aa 40 2b 14 32 13 87 73 76 ea dc 9c c2 0d | ikev2 g^x 5f 66 9f c3 96 de 76 09 50 94 85 73 09 16 fd 60 | ikev2 g^x e5 22 cf 96 3d 7f 8a d5 69 b3 f6 e0 d1 b6 2a b1 | ikev2 g^x 46 24 36 96 12 35 a6 66 31 6c fc 27 fd 14 5f 55 | ikev2 g^x dc 4d 24 0c d2 4a 10 86 34 a8 27 78 27 27 b0 f6 | ikev2 g^x f0 8d 2e 1b c6 a5 de fc 9e fb ab ed 9f 6c dc 3c | ikev2 g^x 42 c9 5c a1 4a e3 4a 45 da e8 44 a1 f6 8a 36 fd | ikev2 g^x f6 c8 42 59 48 f3 30 69 ad 20 74 c3 02 1b f3 f8 | ikev2 g^x 3b 14 80 5c e4 55 cc fa 49 75 80 37 c4 a0 eb 78 | ikev2 g^x 5a ba 01 b2 91 5d ef fc 1f 18 54 22 3c e6 ac 42 | ikev2 g^x 22 26 d6 93 0e 7d c7 67 e5 47 f0 ab 43 0b cd e4 | ikev2 g^x d0 9c fd 7d 64 aa cd 20 be f3 31 9f f9 fd e9 74 | ikev2 g^x f6 4d 79 65 aa 69 d2 c1 c0 27 e2 43 4d 23 a2 bd | ikev2 g^x 81 a0 4b 66 29 06 06 b0 e0 6b c0 d6 29 53 e1 5f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 68 30 70 dd 8d a8 3f ec 7e 36 6c 6a a3 ce 4b 67 | IKEv2 nonce 03 0b 93 d7 9a 32 93 85 56 0b 5c 0e c5 0b 8c 79 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= af ff 14 5c e8 87 a5 b8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 04 | natd_hash: port= 01 f4 | natd_hash: hash= 1e 28 6b 61 6f db 11 ce 62 1a 99 08 cd 34 ea 3b | natd_hash: hash= 0e 7b 2c f1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1e 28 6b 61 6f db 11 ce 62 1a 99 08 cd 34 ea 3b | Notify data 0e 7b 2c f1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= af ff 14 5c e8 87 a5 b8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f7 c5 67 63 b0 24 3f 1b e9 07 39 23 b4 29 1b da | natd_hash: hash= 4e b1 36 66 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f7 c5 67 63 b0 24 3f 1b e9 07 39 23 b4 29 1b da | Notify data 4e b1 36 66 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #256 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #256: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #256 to 4294967295 after switching state | Message ID: IKE #256 skipping update_recv as MD is fake | Message ID: sent #256 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-4" #256: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.4:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #256) | af ff 14 5c e8 87 a5 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 1f 56 51 1c ec cd e5 db 48 26 c8 dc 41 fd 54 | a8 2a f3 18 64 e6 88 a2 77 94 ce b8 37 5b 43 37 | 15 71 aa 40 2b 14 32 13 87 73 76 ea dc 9c c2 0d | 5f 66 9f c3 96 de 76 09 50 94 85 73 09 16 fd 60 | e5 22 cf 96 3d 7f 8a d5 69 b3 f6 e0 d1 b6 2a b1 | 46 24 36 96 12 35 a6 66 31 6c fc 27 fd 14 5f 55 | dc 4d 24 0c d2 4a 10 86 34 a8 27 78 27 27 b0 f6 | f0 8d 2e 1b c6 a5 de fc 9e fb ab ed 9f 6c dc 3c | 42 c9 5c a1 4a e3 4a 45 da e8 44 a1 f6 8a 36 fd | f6 c8 42 59 48 f3 30 69 ad 20 74 c3 02 1b f3 f8 | 3b 14 80 5c e4 55 cc fa 49 75 80 37 c4 a0 eb 78 | 5a ba 01 b2 91 5d ef fc 1f 18 54 22 3c e6 ac 42 | 22 26 d6 93 0e 7d c7 67 e5 47 f0 ab 43 0b cd e4 | d0 9c fd 7d 64 aa cd 20 be f3 31 9f f9 fd e9 74 | f6 4d 79 65 aa 69 d2 c1 c0 27 e2 43 4d 23 a2 bd | 81 a0 4b 66 29 06 06 b0 e0 6b c0 d6 29 53 e1 5f | 29 00 00 24 68 30 70 dd 8d a8 3f ec 7e 36 6c 6a | a3 ce 4b 67 03 0b 93 d7 9a 32 93 85 56 0b 5c 0e | c5 0b 8c 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 28 6b 61 6f db 11 ce 62 1a 99 08 | cd 34 ea 3b 0e 7b 2c f1 00 00 00 1c 00 00 40 05 | f7 c5 67 63 b0 24 3f 1b e9 07 39 23 b4 29 1b da | 4e b1 36 66 | state #256 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374040670 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aecb00 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #256 | libevent_malloc: new ptr-libevent@0x7fb374040670 size 128 | #256 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49664.821202 | resume sending helper answer for #256 suppresed complete_v2_state_transition() and stole MD | #256 spent 0.32 milliseconds in resume sending helper answer | stop processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb348048a10 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af ff 14 5c e8 87 a5 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #256 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #256 | rejected packet: | af ff 14 5c e8 87 a5 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 04 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #256: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0402 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #5 | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #5 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #5 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49664.955472; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.025101 exceeds limit? YES "road-eastnet-nonat-5" #5: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-5" #5: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #257 at 0x557d469db0d0 | State DB: adding IKEv2 state #257 in UNDEFINED | pstats #257 ikev2.ike started | Message ID: init #257: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #257: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #257; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-5" #257: initiating v2 parent SA to replace #5 | using existing local IKE proposals for connection road-eastnet-nonat-5 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 257 for state #257 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46abfd80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #257 | libevent_malloc: new ptr-libevent@0x7fb348048a10 size 128 | #257 spent 0.0966 milliseconds in ikev2_parent_outI1() | crypto helper 8 resuming | crypto helper 8 starting work-order 257 for state #257 | RESET processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 257 | start processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #5 ikev2.ike failed too-many-retransmits | pstats #5 ikev2.ike deleted too-many-retransmits | #5 spent 2.69 milliseconds in total | [RE]START processing: state #5 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-5" #5: deleting state (STATE_PARENT_I1) aged 64.028s and NOT sending notification | parent state #5: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #5 "road-eastnet-nonat-5" #5: deleting IKE SA for connection 'road-eastnet-nonat-5' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-5' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-5 | State DB: deleting IKEv2 state #5 in PARENT_I1 | parent state #5: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #5 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 257 time elapsed 0.001007 seconds | libevent_free: release ptr-libevent@0x7fb35803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | in statetime_stop() and could not find #5 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#257) spent 1.01 milliseconds in crypto helper computing work-order 257: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 257 for state #257 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #257 Initiating connection road-eastnet-nonat-5 which received a Delete/Notify but must remain up per local policy | libevent_malloc: new ptr-libevent@0x7fb34c048a10 size 128 | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 8 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-5" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-5' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-5" | stop processing: connection "road-eastnet-nonat-5" (in initiate_a_connection() at initiate.c:349) | spent 0.0849 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #257 | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 257 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #257 | **emit ISAKMP Message: | initiator cookie: | c0 a3 3d d0 6b df 36 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-5 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 13 d4 14 bb a4 26 08 82 2e 68 9d 43 5b 83 0c 36 | ikev2 g^x 1f 55 d2 1d bf 09 8f 68 0a 80 73 cf b9 a3 3e fb | ikev2 g^x 4d 3a 5e 68 e8 aa 15 71 f7 e6 60 e6 9e 7c a9 b9 | ikev2 g^x e4 7c a0 fd c4 92 d3 66 8d 75 86 7f 7f 0a c5 42 | ikev2 g^x be bb d7 8c fb b4 ab fa c5 83 64 ff dd e6 56 27 | ikev2 g^x af 9a f1 86 53 58 3b 72 b7 e4 76 4e c9 2a af 68 | ikev2 g^x 0c 7e 9d bf 26 26 ae 59 6b f6 99 f5 1c 3d 32 4e | ikev2 g^x 8e a7 43 0e b2 0c 7f 5d ea 3a c0 50 3e 6f 7e 61 | ikev2 g^x fc 39 14 9d d7 51 ad 13 b2 22 e7 6c 3e 75 0f f9 | ikev2 g^x 50 5f 45 31 fb b6 64 15 77 12 e2 82 5e ea a6 ae | ikev2 g^x e9 ef 71 7b ce a0 63 c0 ec ed c4 35 36 4d 8b ac | ikev2 g^x a2 1c 05 95 aa 9f 05 c7 da bb 7e 2c 1b be db 0a | ikev2 g^x e1 a0 b3 b2 bf 79 ee 31 3e 48 4e 05 00 26 ce 87 | ikev2 g^x 2f 0f 18 80 43 59 d6 73 3e f5 b2 95 2a 4d b8 2d | ikev2 g^x f4 60 f9 1a 76 3c f3 63 33 e3 37 34 73 88 ed 64 | ikev2 g^x 6c a7 75 12 ca d0 e5 a3 5b 68 0d 46 dd d7 61 2d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ee 5d 7d 66 4d 0b a2 50 89 9d 46 31 30 20 ae b6 | IKEv2 nonce b5 b0 95 a5 d1 00 de 3b e5 de 68 17 ec 12 56 79 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c0 a3 3d d0 6b df 36 74 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 05 | natd_hash: port= 01 f4 | natd_hash: hash= 72 5f 0f 32 08 df d5 f3 1e 89 e0 00 bf de 72 4a | natd_hash: hash= a1 a4 e7 89 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 72 5f 0f 32 08 df d5 f3 1e 89 e0 00 bf de 72 4a | Notify data a1 a4 e7 89 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c0 a3 3d d0 6b df 36 74 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 60 f8 1e fb ae 99 6b 12 d7 c7 12 5b 86 70 02 5c | natd_hash: hash= 5c f6 f1 68 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 60 f8 1e fb ae 99 6b 12 d7 c7 12 5b 86 70 02 5c | Notify data 5c f6 f1 68 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #257 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #257: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #257 to 4294967295 after switching state | Message ID: IKE #257 skipping update_recv as MD is fake | Message ID: sent #257 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-5" #257: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.5:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #257) | c0 a3 3d d0 6b df 36 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 d4 14 bb a4 26 08 82 2e 68 9d 43 5b 83 0c 36 | 1f 55 d2 1d bf 09 8f 68 0a 80 73 cf b9 a3 3e fb | 4d 3a 5e 68 e8 aa 15 71 f7 e6 60 e6 9e 7c a9 b9 | e4 7c a0 fd c4 92 d3 66 8d 75 86 7f 7f 0a c5 42 | be bb d7 8c fb b4 ab fa c5 83 64 ff dd e6 56 27 | af 9a f1 86 53 58 3b 72 b7 e4 76 4e c9 2a af 68 | 0c 7e 9d bf 26 26 ae 59 6b f6 99 f5 1c 3d 32 4e | 8e a7 43 0e b2 0c 7f 5d ea 3a c0 50 3e 6f 7e 61 | fc 39 14 9d d7 51 ad 13 b2 22 e7 6c 3e 75 0f f9 | 50 5f 45 31 fb b6 64 15 77 12 e2 82 5e ea a6 ae | e9 ef 71 7b ce a0 63 c0 ec ed c4 35 36 4d 8b ac | a2 1c 05 95 aa 9f 05 c7 da bb 7e 2c 1b be db 0a | e1 a0 b3 b2 bf 79 ee 31 3e 48 4e 05 00 26 ce 87 | 2f 0f 18 80 43 59 d6 73 3e f5 b2 95 2a 4d b8 2d | f4 60 f9 1a 76 3c f3 63 33 e3 37 34 73 88 ed 64 | 6c a7 75 12 ca d0 e5 a3 5b 68 0d 46 dd d7 61 2d | 29 00 00 24 ee 5d 7d 66 4d 0b a2 50 89 9d 46 31 | 30 20 ae b6 b5 b0 95 a5 d1 00 de 3b e5 de 68 17 | ec 12 56 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 5f 0f 32 08 df d5 f3 1e 89 e0 00 | bf de 72 4a a1 a4 e7 89 00 00 00 1c 00 00 40 05 | 60 f8 1e fb ae 99 6b 12 d7 c7 12 5b 86 70 02 5c | 5c f6 f1 68 | state #257 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb348048a10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46abfd80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abfd80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #257 | libevent_malloc: new ptr-libevent@0x7fb348048a10 size 128 | #257 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49664.957387 | resume sending helper answer for #257 suppresed complete_v2_state_transition() and stole MD | #257 spent 0.579 milliseconds in resume sending helper answer | stop processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c048a10 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c0 a3 3d d0 6b df 36 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #257 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #257 | rejected packet: | c0 a3 3d d0 6b df 36 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 05 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #257: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0692 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #6 | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #6 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #6 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49665.025612; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.014645 exceeds limit? YES "road-eastnet-nonat-6" #6: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-6" #6: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #258 at 0x557d469dbfa0 | State DB: adding IKEv2 state #258 in UNDEFINED | pstats #258 ikev2.ike started | Message ID: init #258: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #258: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #258; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-6" #258: initiating v2 parent SA to replace #6 | using existing local IKE proposals for connection road-eastnet-nonat-6 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 258 for state #258 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb33800d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #258 | libevent_malloc: new ptr-libevent@0x7fb34c048a10 size 128 | #258 spent 0.0722 milliseconds in ikev2_parent_outI1() | RESET processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 resuming | start processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #6 ikev2.ike failed too-many-retransmits | pstats #6 ikev2.ike deleted too-many-retransmits | #6 spent 2.64 milliseconds in total | crypto helper 12 starting work-order 258 for state #258 | [RE]START processing: state #6 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in delete_state() at state.c:879) | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 258 "road-eastnet-nonat-6" #6: deleting state (STATE_PARENT_I1) aged 64.016s and NOT sending notification | parent state #6: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #6 "road-eastnet-nonat-6" #6: deleting IKE SA for connection 'road-eastnet-nonat-6' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-6' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-6 | State DB: deleting IKEv2 state #6 in PARENT_I1 | parent state #6: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 258 time elapsed 0.000975 seconds | (#258) spent 0.983 milliseconds in crypto helper computing work-order 258: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 258 for state #258 to event queue | scheduling resume sending helper answer for #258 | stop processing: state #6 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_malloc: new ptr-libevent@0x7fb340048940 size 128 | libevent_free: release ptr-libevent@0x7fb37802a950 | crypto helper 12 waiting (nothing to do) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | in statetime_stop() and could not find #6 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-6 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-6" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-6' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-6" | stop processing: connection "road-eastnet-nonat-6" (in initiate_a_connection() at initiate.c:349) | spent 0.0803 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #258 | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 258 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #258 | **emit ISAKMP Message: | initiator cookie: | f2 0a ee 39 57 38 66 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-6 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e2 84 a5 7f 13 c6 d5 f4 de a1 59 9b a0 a0 80 f1 | ikev2 g^x 2f 8b 06 61 d1 0f de 44 77 49 a3 76 3f 11 11 d4 | ikev2 g^x ab 9b 3e 8d 7f a0 dc 2b 42 28 86 6f ac 5b b2 c2 | ikev2 g^x 4e 03 12 4c 72 0a d1 f2 0b 69 dc 3f 47 15 b3 66 | ikev2 g^x 0b ed 38 4d 89 9d b6 26 e5 44 a2 c8 18 05 1d ea | ikev2 g^x b9 5a 63 00 12 16 1b 15 c7 6e b8 4d 60 58 cc f0 | ikev2 g^x 35 6e d0 c1 0c 7a 3b 52 20 a4 ce 3e e5 c0 cc 56 | ikev2 g^x 65 b1 16 d6 43 c2 be ea b5 3f 07 6c 04 df 3c 27 | ikev2 g^x ca 5b 39 2e f2 76 09 d5 9a 31 cd f8 a0 9b 56 3c | ikev2 g^x 42 b3 87 82 b1 01 3e ef 89 15 5a 1d 00 90 84 19 | ikev2 g^x 5b 3d 7c ec 45 07 76 99 d3 04 39 db f5 94 ae 9f | ikev2 g^x 9a 24 93 91 e4 3f ad 43 d2 f2 74 b3 73 89 3f f4 | ikev2 g^x ac 15 1c 07 3d d0 3a 58 a4 bb b4 b2 b0 c3 65 db | ikev2 g^x c7 15 7a 2b b3 96 c2 16 55 b0 f5 86 dd bf d9 cf | ikev2 g^x 01 e1 ae 2e 78 f6 40 62 df cc 04 cf 9d bd 05 f9 | ikev2 g^x 5f ef 7a 44 a4 51 1c 3a 9b b4 7d 0d 94 46 3e a1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 25 6d bb 73 f8 76 14 9e e8 94 3a 77 d7 da 85 ed | IKEv2 nonce f6 46 fc 67 4e bb 29 38 0b 6c 4c 96 c6 a5 48 f7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f2 0a ee 39 57 38 66 6d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 06 | natd_hash: port= 01 f4 | natd_hash: hash= da 43 d0 a7 5e 1e 6a 3c 4c 0b bd b4 fc 0a 0a d4 | natd_hash: hash= c2 f3 96 56 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data da 43 d0 a7 5e 1e 6a 3c 4c 0b bd b4 fc 0a 0a d4 | Notify data c2 f3 96 56 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f2 0a ee 39 57 38 66 6d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 20 be 8b da 4d a1 7e 30 5a c5 49 1f 20 a4 27 d3 | natd_hash: hash= b3 85 6c 0e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 20 be 8b da 4d a1 7e 30 5a c5 49 1f 20 a4 27 d3 | Notify data b3 85 6c 0e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #258 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #258: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #258 to 4294967295 after switching state | Message ID: IKE #258 skipping update_recv as MD is fake | Message ID: sent #258 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-6" #258: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.6:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #258) | f2 0a ee 39 57 38 66 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 84 a5 7f 13 c6 d5 f4 de a1 59 9b a0 a0 80 f1 | 2f 8b 06 61 d1 0f de 44 77 49 a3 76 3f 11 11 d4 | ab 9b 3e 8d 7f a0 dc 2b 42 28 86 6f ac 5b b2 c2 | 4e 03 12 4c 72 0a d1 f2 0b 69 dc 3f 47 15 b3 66 | 0b ed 38 4d 89 9d b6 26 e5 44 a2 c8 18 05 1d ea | b9 5a 63 00 12 16 1b 15 c7 6e b8 4d 60 58 cc f0 | 35 6e d0 c1 0c 7a 3b 52 20 a4 ce 3e e5 c0 cc 56 | 65 b1 16 d6 43 c2 be ea b5 3f 07 6c 04 df 3c 27 | ca 5b 39 2e f2 76 09 d5 9a 31 cd f8 a0 9b 56 3c | 42 b3 87 82 b1 01 3e ef 89 15 5a 1d 00 90 84 19 | 5b 3d 7c ec 45 07 76 99 d3 04 39 db f5 94 ae 9f | 9a 24 93 91 e4 3f ad 43 d2 f2 74 b3 73 89 3f f4 | ac 15 1c 07 3d d0 3a 58 a4 bb b4 b2 b0 c3 65 db | c7 15 7a 2b b3 96 c2 16 55 b0 f5 86 dd bf d9 cf | 01 e1 ae 2e 78 f6 40 62 df cc 04 cf 9d bd 05 f9 | 5f ef 7a 44 a4 51 1c 3a 9b b4 7d 0d 94 46 3e a1 | 29 00 00 24 25 6d bb 73 f8 76 14 9e e8 94 3a 77 | d7 da 85 ed f6 46 fc 67 4e bb 29 38 0b 6c 4c 96 | c6 a5 48 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da 43 d0 a7 5e 1e 6a 3c 4c 0b bd b4 | fc 0a 0a d4 c2 f3 96 56 00 00 00 1c 00 00 40 05 | 20 be 8b da 4d a1 7e 30 5a c5 49 1f 20 a4 27 d3 | b3 85 6c 0e | state #258 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c048a10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb33800d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #258 | libevent_malloc: new ptr-libevent@0x7fb37802a950 size 128 | #258 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49665.027216 | resume sending helper answer for #258 suppresed complete_v2_state_transition() and stole MD | #258 spent 0.328 milliseconds in resume sending helper answer | stop processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb340048940 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 0a ee 39 57 38 66 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #258 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #258 | rejected packet: | f2 0a ee 39 57 38 66 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 06 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #258: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #254 | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #254 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #254 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49665.03738; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500165 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #254 | libevent_malloc: new ptr-libevent@0x7fb340048940 size 128 "road-eastnet-nonat-2" #254: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #254) | b9 c6 03 da 3d 1b ba 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca 92 e7 94 15 6c 86 1d 96 e8 8f 04 2b 4c 31 1c | f2 c3 f1 85 7b fe b5 54 f7 1b c1 2a 4c 6d 01 5c | 34 19 7c 9d d1 b6 95 21 d0 08 d9 67 bb dc e0 e1 | 38 6b 59 b4 76 fc 39 ee a0 2d f2 f5 62 c4 0a 49 | 6b 3c f0 00 22 80 8c 1c 36 99 55 b9 ef cb 76 99 | 5c 12 4c 07 84 ad f5 48 ab 42 10 f5 2e d6 e5 5c | 9d d4 b0 9f 16 b4 b4 bb b3 53 f3 e9 cc 93 ad 3b | a8 c4 f0 7f 9d 9d e3 f4 df 44 9c 28 b2 72 cb b6 | 4b 6a f0 9c 2e 22 ce 4f d0 b2 c9 a3 7c 48 1e 03 | a8 3d 92 67 11 0c a8 c0 fd 76 08 be 4f 01 6d 12 | 3e 0b 87 da bc 3d 45 99 0f 30 cb 9d 8c 96 4d 32 | 07 37 42 c8 ca 8d d9 f2 2b 81 33 b1 a2 49 5c 82 | 69 0d 94 76 f5 ef d0 bf fa db a3 8e db 15 f4 34 | c3 81 4c 6a 47 45 9d c9 09 00 1e 8a 46 70 b4 51 | 30 c0 17 29 a6 05 17 9f 61 e3 d5 9e b5 26 aa b7 | f8 4d 8f 98 15 36 79 53 4c 2f e1 9e 49 63 a8 23 | 29 00 00 24 b7 98 fa 02 fe fe ce ce 94 a2 bc d0 | 60 0d 7b 30 0c f7 48 0b 72 92 ee ec 3d 65 36 1c | 6e c0 df 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3a c0 39 9e 3d 58 28 13 41 2f 06 c7 | b4 3e d7 c2 8d 41 7c 7d 00 00 00 1c 00 00 40 05 | 08 0f dc c4 71 f2 0f bc 45 99 87 81 91 93 b1 3d | 30 5f 17 8f | libevent_free: release ptr-libevent@0x7fb35c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #254 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 c6 03 da 3d 1b ba 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #254 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #254 | rejected packet: | b9 c6 03 da 3d 1b ba 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #254: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11640 | handling event EVENT_RETRANSMIT for parent state #7 | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #7 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #7 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49665.127753; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.01105 exceeds limit? YES "road-eastnet-nonat-7" #7: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-7" #7: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #259 at 0x557d469dd0d0 | State DB: adding IKEv2 state #259 in UNDEFINED | pstats #259 ikev2.ike started | Message ID: init #259: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #259: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #259; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-7" #259: initiating v2 parent SA to replace #7 | using existing local IKE proposals for connection road-eastnet-nonat-7 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 259 for state #259 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb348005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #259 | libevent_malloc: new ptr-libevent@0x7fb35c04b7c0 size 128 | #259 spent 0.0724 milliseconds in ikev2_parent_outI1() | RESET processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #7 ikev2.ike failed too-many-retransmits | pstats #7 ikev2.ike deleted too-many-retransmits | #7 spent 2.61 milliseconds in total | [RE]START processing: state #7 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-7" #7: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #7: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #7 "road-eastnet-nonat-7" #7: deleting IKE SA for connection 'road-eastnet-nonat-7' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-7' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-7 | State DB: deleting IKEv2 state #7 in PARENT_I1 | parent state #7: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 5 resuming | crypto helper 5 starting work-order 259 for state #259 | stop processing: state #7 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 259 | libevent_free: release ptr-libevent@0x7fb380038370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11640 | in statetime_stop() and could not find #7 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-7 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-7" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-7' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-7" | stop processing: connection "road-eastnet-nonat-7" (in initiate_a_connection() at initiate.c:349) | spent 0.0572 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 259 time elapsed 0.000572 seconds | (#259) spent 0.573 milliseconds in crypto helper computing work-order 259: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 259 for state #259 to event queue | scheduling resume sending helper answer for #259 | libevent_malloc: new ptr-libevent@0x7fb344048a10 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #259 | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 259 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #259 | **emit ISAKMP Message: | initiator cookie: | 69 c4 5c 94 f6 f0 24 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-7 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fe b3 f9 68 3e 85 57 5d 74 26 b7 37 f5 c1 1c c8 | ikev2 g^x a9 30 6a e1 51 a4 0f d5 ca 35 4b e9 d0 ec d0 ea | ikev2 g^x 11 06 1a ad 0a 7c 08 a4 ce 70 10 ef b2 c9 82 43 | ikev2 g^x 06 fb 99 b0 99 d2 5d a2 87 5b cd a0 9b 7d 7a a3 | ikev2 g^x 30 f9 78 c0 d7 43 6f f3 cc 53 5a 43 25 d8 61 04 | ikev2 g^x 58 03 b6 71 c6 21 93 59 b3 7c 3f 84 50 6d 48 95 | ikev2 g^x ef b8 dc 96 69 dc 88 98 10 47 21 0a 3d 72 57 34 | ikev2 g^x e5 bd d9 b3 4a 55 2e bb 34 64 f1 be 1c 6f f2 7e | ikev2 g^x c5 4b 83 c8 2c d8 e9 41 02 95 ff 83 96 69 c2 56 | ikev2 g^x 98 1b 20 30 7a bc 8b ab ee 27 a0 89 22 93 25 c7 | ikev2 g^x d2 f1 b0 c8 12 06 e6 8d 9a d7 bd fc 06 14 66 23 | ikev2 g^x 65 ae e6 9e 37 44 0c f0 0e 0e 78 09 b8 a3 32 c3 | ikev2 g^x c6 25 1b 97 0b 77 db 90 b8 16 58 5f 15 d2 40 fe | ikev2 g^x 1c d0 5e e3 88 05 3b ef bc 19 2c a9 73 97 03 9a | ikev2 g^x 26 fc 47 8b 95 24 fe d4 39 f2 65 5a 9f ee 0c cf | ikev2 g^x 1a 9b 03 45 52 42 61 4d b6 e7 aa 2c 0c 37 c0 61 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c4 2f 3e 0e 76 3e 59 e7 3e 5c 53 28 43 02 fc a9 | IKEv2 nonce 7a 2b 47 13 2c c2 eb 53 3e b5 40 d1 94 dc e6 02 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 69 c4 5c 94 f6 f0 24 cf | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 07 | natd_hash: port= 01 f4 | natd_hash: hash= 11 85 30 eb 64 9e 84 09 e0 70 76 01 65 fa d3 ac | natd_hash: hash= 84 56 a3 b4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 11 85 30 eb 64 9e 84 09 e0 70 76 01 65 fa d3 ac | Notify data 84 56 a3 b4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 69 c4 5c 94 f6 f0 24 cf | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 64 83 da b1 99 b6 d9 28 72 08 34 2c 77 b4 36 a0 | natd_hash: hash= 74 09 78 83 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 64 83 da b1 99 b6 d9 28 72 08 34 2c 77 b4 36 a0 | Notify data 74 09 78 83 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #259 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #259: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #259 to 4294967295 after switching state | Message ID: IKE #259 skipping update_recv as MD is fake | Message ID: sent #259 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-7" #259: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.7:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #259) | 69 c4 5c 94 f6 f0 24 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe b3 f9 68 3e 85 57 5d 74 26 b7 37 f5 c1 1c c8 | a9 30 6a e1 51 a4 0f d5 ca 35 4b e9 d0 ec d0 ea | 11 06 1a ad 0a 7c 08 a4 ce 70 10 ef b2 c9 82 43 | 06 fb 99 b0 99 d2 5d a2 87 5b cd a0 9b 7d 7a a3 | 30 f9 78 c0 d7 43 6f f3 cc 53 5a 43 25 d8 61 04 | 58 03 b6 71 c6 21 93 59 b3 7c 3f 84 50 6d 48 95 | ef b8 dc 96 69 dc 88 98 10 47 21 0a 3d 72 57 34 | e5 bd d9 b3 4a 55 2e bb 34 64 f1 be 1c 6f f2 7e | c5 4b 83 c8 2c d8 e9 41 02 95 ff 83 96 69 c2 56 | 98 1b 20 30 7a bc 8b ab ee 27 a0 89 22 93 25 c7 | d2 f1 b0 c8 12 06 e6 8d 9a d7 bd fc 06 14 66 23 | 65 ae e6 9e 37 44 0c f0 0e 0e 78 09 b8 a3 32 c3 | c6 25 1b 97 0b 77 db 90 b8 16 58 5f 15 d2 40 fe | 1c d0 5e e3 88 05 3b ef bc 19 2c a9 73 97 03 9a | 26 fc 47 8b 95 24 fe d4 39 f2 65 5a 9f ee 0c cf | 1a 9b 03 45 52 42 61 4d b6 e7 aa 2c 0c 37 c0 61 | 29 00 00 24 c4 2f 3e 0e 76 3e 59 e7 3e 5c 53 28 | 43 02 fc a9 7a 2b 47 13 2c c2 eb 53 3e b5 40 d1 | 94 dc e6 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 85 30 eb 64 9e 84 09 e0 70 76 01 | 65 fa d3 ac 84 56 a3 b4 00 00 00 1c 00 00 40 05 | 64 83 da b1 99 b6 d9 28 72 08 34 2c 77 b4 36 a0 | 74 09 78 83 | state #259 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c04b7c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb348005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #259 | libevent_malloc: new ptr-libevent@0x7fb380038370 size 128 | #259 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49665.129157 | resume sending helper answer for #259 suppresed complete_v2_state_transition() and stole MD | #259 spent 0.577 milliseconds in resume sending helper answer | stop processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb344048a10 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 c4 5c 94 f6 f0 24 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #259 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #259 | rejected packet: | 69 c4 5c 94 f6 f0 24 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 07 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #259: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47e90 | handling event EVENT_RETRANSMIT for parent state #255 | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #255 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #255 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49665.185349; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500754 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11640 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #255 | libevent_malloc: new ptr-libevent@0x7fb344048a10 size 128 "road-eastnet-nonat-3" #255: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #255) | b4 62 7d 49 a4 92 20 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 95 bd 0c ae 75 b5 e3 ef c4 cd 00 43 ea 3e 9a | 02 ba 07 e1 c1 bd 5d f0 a8 a6 51 3a 4a 21 e5 46 | 19 59 a0 93 a8 07 b1 7f 53 68 e9 d8 63 85 c8 12 | 71 98 74 63 ac c1 5d a5 39 9f c3 9e 95 82 52 3e | e1 41 18 21 d4 2e 9c 8d e0 71 8e d0 6d 4b 68 7e | 1c df fa cf ed ca 99 59 64 68 ed b3 9c 61 13 df | 2f ad b1 5a 3f dc 76 f5 58 69 91 b1 8b 83 c7 6f | 0b 08 55 fc ba 8b aa 73 16 1a 51 59 6d 0d 21 1f | bf 66 60 21 f1 49 bc 92 8c 9a be 6c 52 be 72 e6 | 19 b6 47 f8 33 cc b5 e6 ed 41 53 62 da 9d 6d 34 | fc ee 0f bf 23 f3 09 d7 96 22 fd c9 6e c0 31 60 | 95 22 90 57 96 ed 6a f6 05 50 b8 1b 34 71 5d dd | a7 c1 ab 82 e5 96 d7 d0 ac 36 1c 30 9d ee a7 97 | 6f 15 b5 89 4e c4 f6 f6 b5 08 23 bf cb 9e 75 f3 | f9 e0 ea 95 d8 eb 73 6d e3 2b 25 8d e5 17 c9 6e | f4 0f 23 e9 e4 7e dc 78 3c ae 82 7e 2a c2 1f 84 | 29 00 00 24 27 f0 79 05 ca 38 9d 60 17 70 37 05 | 8f c8 d2 c0 f8 4f 0f 05 b1 d0 9d 9d 43 88 90 d5 | 2d 20 4e 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 2d ab c5 84 ac e3 ea 3f b2 97 06 | b2 08 24 4c 91 11 e0 2a 00 00 00 1c 00 00 40 05 | ca ca c2 3f 11 62 54 7a 69 58 46 70 0a 1d a0 10 | 47 7f 3a 1d | libevent_free: release ptr-libevent@0x7fb350048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47e90 | #255 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 62 7d 49 a4 92 20 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #255 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #255 | rejected packet: | b4 62 7d 49 a4 92 20 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #255: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0655 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11680 | handling event EVENT_RETRANSMIT for parent state #8 | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #8 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #8 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49665.230701; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.01525 exceeds limit? YES "road-eastnet-nonat-8" #8: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-8" #8: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #260 at 0x557d469de4c0 | State DB: adding IKEv2 state #260 in UNDEFINED | pstats #260 ikev2.ike started | Message ID: init #260: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #260: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #260; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-8" #260: initiating v2 parent SA to replace #8 | using existing local IKE proposals for connection road-eastnet-nonat-8 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 260 for state #260 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47e90 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #260 | libevent_malloc: new ptr-libevent@0x7fb350048a10 size 128 | crypto helper 3 resuming | crypto helper 3 starting work-order 260 for state #260 | #260 spent 0.0741 milliseconds in ikev2_parent_outI1() | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 260 | RESET processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #8 ikev2.ike failed too-many-retransmits | pstats #8 ikev2.ike deleted too-many-retransmits | #8 spent 2.52 milliseconds in total | [RE]START processing: state #8 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-8" #8: deleting state (STATE_PARENT_I1) aged 64.017s and NOT sending notification | parent state #8: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #8 "road-eastnet-nonat-8" #8: deleting IKE SA for connection 'road-eastnet-nonat-8' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-8' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-8 | State DB: deleting IKEv2 state #8 in PARENT_I1 | parent state #8: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 260 time elapsed 0.000569 seconds | (#260) spent 0.57 milliseconds in crypto helper computing work-order 260: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 260 for state #260 to event queue | scheduling resume sending helper answer for #260 | libevent_malloc: new ptr-libevent@0x7fb338048a10 size 128 | crypto helper 3 waiting (nothing to do) | stop processing: state #8 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3640406e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11680 | in statetime_stop() and could not find #8 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-8 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-8" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-8' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-8" | stop processing: connection "road-eastnet-nonat-8" (in initiate_a_connection() at initiate.c:349) | spent 0.057 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #260 | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 260 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #260 | **emit ISAKMP Message: | initiator cookie: | a8 de 56 29 b7 d6 fa 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-8 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 50 e3 e7 0b 5e 0a a2 78 28 90 d4 10 18 db 3b 08 | ikev2 g^x b2 da 89 a3 10 0a cf 73 47 c7 8b 62 54 ef 17 0b | ikev2 g^x 52 d6 fe 33 62 21 4b 61 30 79 d1 82 82 85 ea 34 | ikev2 g^x 5e 16 ec db dd eb 97 56 18 30 74 8c 1f 6e 05 89 | ikev2 g^x 21 09 2b 1f b9 bc b7 45 38 93 12 7a 5d 44 53 c4 | ikev2 g^x 90 d3 d5 13 c2 0f fd 6b 37 3e 25 38 05 ed f0 2b | ikev2 g^x cb 0f 13 a8 c7 9b fe 60 00 1a 65 af 42 72 d4 bd | ikev2 g^x f1 07 94 0e 72 26 91 81 83 ee ff ef 41 c2 92 80 | ikev2 g^x a0 7f b9 6c 1f d2 e5 4b 34 fe 68 33 41 4d c0 3b | ikev2 g^x fb 7e 82 89 76 4f ab b4 81 d9 20 1a 79 fa de 75 | ikev2 g^x 7d a8 cd 19 c4 08 7c dc 7d 50 74 8e 78 b5 b3 64 | ikev2 g^x 8b 8f bd fd e8 f9 24 be 78 a0 45 9f 10 40 3e e1 | ikev2 g^x 49 ba 58 e8 63 d1 38 81 0c 79 61 75 c1 98 81 43 | ikev2 g^x 9b e0 a1 0d fc da 35 4b 0e a9 e1 35 63 d5 73 64 | ikev2 g^x db 23 3e 1b a9 3a 4e c0 e5 7f 6a ab 90 f3 cd 49 | ikev2 g^x 1b bf e5 c9 ab 56 60 25 6c 22 94 4d da ff b4 bb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2b a8 af 62 73 94 e5 0a 7f 70 bf f7 73 9f 36 a9 | IKEv2 nonce cb 1b e2 09 0a 24 49 93 58 be a0 29 94 31 83 1c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a8 de 56 29 b7 d6 fa 80 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 08 | natd_hash: port= 01 f4 | natd_hash: hash= c7 87 5d ef 8f 65 c8 58 d0 3b 6f e5 c6 10 af 28 | natd_hash: hash= 1a 1c e2 ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c7 87 5d ef 8f 65 c8 58 d0 3b 6f e5 c6 10 af 28 | Notify data 1a 1c e2 ed | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a8 de 56 29 b7 d6 fa 80 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7a 28 e6 3f f8 c3 d1 0c 25 ff 6a 7c a9 a5 77 33 | natd_hash: hash= 24 34 82 26 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7a 28 e6 3f f8 c3 d1 0c 25 ff 6a 7c a9 a5 77 33 | Notify data 24 34 82 26 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #260 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #260: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #260 to 4294967295 after switching state | Message ID: IKE #260 skipping update_recv as MD is fake | Message ID: sent #260 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-8" #260: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.8:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #260) | a8 de 56 29 b7 d6 fa 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 e3 e7 0b 5e 0a a2 78 28 90 d4 10 18 db 3b 08 | b2 da 89 a3 10 0a cf 73 47 c7 8b 62 54 ef 17 0b | 52 d6 fe 33 62 21 4b 61 30 79 d1 82 82 85 ea 34 | 5e 16 ec db dd eb 97 56 18 30 74 8c 1f 6e 05 89 | 21 09 2b 1f b9 bc b7 45 38 93 12 7a 5d 44 53 c4 | 90 d3 d5 13 c2 0f fd 6b 37 3e 25 38 05 ed f0 2b | cb 0f 13 a8 c7 9b fe 60 00 1a 65 af 42 72 d4 bd | f1 07 94 0e 72 26 91 81 83 ee ff ef 41 c2 92 80 | a0 7f b9 6c 1f d2 e5 4b 34 fe 68 33 41 4d c0 3b | fb 7e 82 89 76 4f ab b4 81 d9 20 1a 79 fa de 75 | 7d a8 cd 19 c4 08 7c dc 7d 50 74 8e 78 b5 b3 64 | 8b 8f bd fd e8 f9 24 be 78 a0 45 9f 10 40 3e e1 | 49 ba 58 e8 63 d1 38 81 0c 79 61 75 c1 98 81 43 | 9b e0 a1 0d fc da 35 4b 0e a9 e1 35 63 d5 73 64 | db 23 3e 1b a9 3a 4e c0 e5 7f 6a ab 90 f3 cd 49 | 1b bf e5 c9 ab 56 60 25 6c 22 94 4d da ff b4 bb | 29 00 00 24 2b a8 af 62 73 94 e5 0a 7f 70 bf f7 | 73 9f 36 a9 cb 1b e2 09 0a 24 49 93 58 be a0 29 | 94 31 83 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 87 5d ef 8f 65 c8 58 d0 3b 6f e5 | c6 10 af 28 1a 1c e2 ed 00 00 00 1c 00 00 40 05 | 7a 28 e6 3f f8 c3 d1 0c 25 ff 6a 7c a9 a5 77 33 | 24 34 82 26 | state #260 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb350048a10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47e90 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47e90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #260 | libevent_malloc: new ptr-libevent@0x7fb3640406e0 size 128 | #260 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49665.231813 | resume sending helper answer for #260 suppresed complete_v2_state_transition() and stole MD | #260 spent 0.314 milliseconds in resume sending helper answer | stop processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb338048a10 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 de 56 29 b7 d6 fa 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #260 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #260 | rejected packet: | a8 de 56 29 b7 d6 fa 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 08 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #260: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0404 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acab40 | handling event EVENT_RETRANSMIT for parent state #253 | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #253 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #253 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49665.285006; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001682 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11680 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #253 | libevent_malloc: new ptr-libevent@0x7fb338048a10 size 128 "road-eastnet-nonat-1" #253: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #253) | 54 6a b3 63 15 2d 54 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 a1 ec de cb a0 5d c1 1a bd 04 af 6b c8 65 41 | 5e 52 49 f5 a0 69 ab 28 22 ed fc 77 d0 a0 c1 09 | 24 c3 68 ac f8 52 b1 01 40 3f 24 70 5d fa bb e6 | 18 17 b8 60 62 5c 25 b7 91 1b 32 be a8 33 c7 03 | d3 9b 4d ca 93 cb 69 27 56 25 f1 0e f0 75 9b f1 | 6f a5 25 09 c0 56 aa ed be 25 e6 7b 20 95 b5 00 | 7f 1a 1b 09 1c 04 5e 80 38 55 80 90 08 7b dd ce | 4f 11 1a be 0d 38 69 ab e8 df ca 75 0d 3f c0 1b | 66 36 7e b8 6f b9 34 13 07 77 35 27 1b 68 f3 4e | 59 d6 7e de a5 ba 53 3b 79 89 bf fd cf 6b c9 05 | 32 48 47 96 e8 02 b8 8c 85 5e 07 cf ed 73 28 31 | 7f b0 4a 57 00 7a 0b 42 b6 34 c6 f8 0c c3 11 82 | b9 52 df 83 77 94 ac c4 6e d0 af 9f 9c 46 4a 9d | 6a 59 79 91 e9 aa 6f 46 f9 bf 64 56 57 97 6b ca | 02 fc e7 a2 5d cb d3 e6 be 89 40 eb 8b 5f bf bb | ea e1 78 af e4 9a d6 bc 8f 45 8e 59 45 6b cc 3f | 29 00 00 24 5b 81 82 6a 34 1f 0c 89 b3 0b 07 6c | d0 e3 bd fa b4 1c af f3 18 56 94 10 92 25 11 f0 | 48 f8 d2 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 79 2b 18 11 0c 23 de f4 d0 de e0 | 77 97 22 a5 08 48 2f ff 00 00 00 1c 00 00 40 05 | c8 d4 47 db f6 e8 46 67 19 87 ae df 18 10 c7 ab | 9f a6 71 f9 | libevent_free: release ptr-libevent@0x7fb354048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab40 | #253 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 6a b3 63 15 2d 54 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #253 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #253 | rejected packet: | 54 6a b3 63 15 2d 54 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #253: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #256 | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #256 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #256 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49665.32129; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500088 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #256 | libevent_malloc: new ptr-libevent@0x7fb354048a10 size 128 "road-eastnet-nonat-4" #256: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #256) | af ff 14 5c e8 87 a5 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 1f 56 51 1c ec cd e5 db 48 26 c8 dc 41 fd 54 | a8 2a f3 18 64 e6 88 a2 77 94 ce b8 37 5b 43 37 | 15 71 aa 40 2b 14 32 13 87 73 76 ea dc 9c c2 0d | 5f 66 9f c3 96 de 76 09 50 94 85 73 09 16 fd 60 | e5 22 cf 96 3d 7f 8a d5 69 b3 f6 e0 d1 b6 2a b1 | 46 24 36 96 12 35 a6 66 31 6c fc 27 fd 14 5f 55 | dc 4d 24 0c d2 4a 10 86 34 a8 27 78 27 27 b0 f6 | f0 8d 2e 1b c6 a5 de fc 9e fb ab ed 9f 6c dc 3c | 42 c9 5c a1 4a e3 4a 45 da e8 44 a1 f6 8a 36 fd | f6 c8 42 59 48 f3 30 69 ad 20 74 c3 02 1b f3 f8 | 3b 14 80 5c e4 55 cc fa 49 75 80 37 c4 a0 eb 78 | 5a ba 01 b2 91 5d ef fc 1f 18 54 22 3c e6 ac 42 | 22 26 d6 93 0e 7d c7 67 e5 47 f0 ab 43 0b cd e4 | d0 9c fd 7d 64 aa cd 20 be f3 31 9f f9 fd e9 74 | f6 4d 79 65 aa 69 d2 c1 c0 27 e2 43 4d 23 a2 bd | 81 a0 4b 66 29 06 06 b0 e0 6b c0 d6 29 53 e1 5f | 29 00 00 24 68 30 70 dd 8d a8 3f ec 7e 36 6c 6a | a3 ce 4b 67 03 0b 93 d7 9a 32 93 85 56 0b 5c 0e | c5 0b 8c 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 28 6b 61 6f db 11 ce 62 1a 99 08 | cd 34 ea 3b 0e 7b 2c f1 00 00 00 1c 00 00 40 05 | f7 c5 67 63 b0 24 3f 1b e9 07 39 23 b4 29 1b da | 4e b1 36 66 | libevent_free: release ptr-libevent@0x7fb374040670 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #256 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af ff 14 5c e8 87 a5 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #256 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #256 | rejected packet: | af ff 14 5c e8 87 a5 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #256: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fbb00 | handling event EVENT_RETRANSMIT for parent state #9 | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #9 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #9 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49665.334562; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.01726 exceeds limit? YES "road-eastnet-nonat-9" #9: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-9" #9: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #261 at 0x557d469dfa80 | State DB: adding IKEv2 state #261 in UNDEFINED | pstats #261 ikev2.ike started | Message ID: init #261: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #261: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #261; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-9" #261: initiating v2 parent SA to replace #9 | using existing local IKE proposals for connection road-eastnet-nonat-9 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 261 for state #261 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aecb00 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #261 | libevent_malloc: new ptr-libevent@0x7fb374040670 size 128 | #261 spent 0.0684 milliseconds in ikev2_parent_outI1() | RESET processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #9 ikev2.ike failed too-many-retransmits | pstats #9 ikev2.ike deleted too-many-retransmits | crypto helper 1 resuming | #9 spent 2.48 milliseconds in total | crypto helper 1 starting work-order 261 for state #261 | [RE]START processing: state #9 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in delete_state() at state.c:879) | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 261 "road-eastnet-nonat-9" #9: deleting state (STATE_PARENT_I1) aged 64.019s and NOT sending notification | parent state #9: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #9 "road-eastnet-nonat-9" #9: deleting IKE SA for connection 'road-eastnet-nonat-9' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-9' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-9 | State DB: deleting IKEv2 state #9 in PARENT_I1 | parent state #9: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 261 time elapsed 0.000634 seconds | stop processing: state #9 from 192.1.2.23:500 (in delete_state() at state.c:1143) | (#261) spent 0.635 milliseconds in crypto helper computing work-order 261: ikev2_outI1 KE (pcr) | libevent_free: release ptr-libevent@0x7fb37000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fbb00 | in statetime_stop() and could not find #9 | crypto helper 1 sending results from work-order 261 for state #261 to event queue | scheduling resume sending helper answer for #261 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb388001840 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-9 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 1 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-9" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-9' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-9" | stop processing: connection "road-eastnet-nonat-9" (in initiate_a_connection() at initiate.c:349) | spent 0.0625 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #261 | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 261 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #261 | **emit ISAKMP Message: | initiator cookie: | 8b 59 1f 5e 29 ec 79 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-9 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a1 16 bb 69 7b 8c de a9 f0 aa 27 22 0c 50 1e 2b | ikev2 g^x c0 76 0c 79 99 31 2f f3 35 0b 93 05 6b 25 af d5 | ikev2 g^x 38 8a 63 51 f1 c7 93 6d 58 cf aa 10 dd 75 1f c8 | ikev2 g^x 55 42 4b ca 64 4b 8f 25 43 c0 98 a7 58 2f fe 43 | ikev2 g^x a0 fc e9 fe 8a 4f d9 62 8e db b8 54 42 5d 72 29 | ikev2 g^x 3d 08 a8 8c 4e d1 f1 b8 76 cf b0 d0 a2 dc ae 18 | ikev2 g^x 1b 5a 75 da 49 ca 9e c2 09 0d fb 74 50 88 ed a4 | ikev2 g^x d6 99 da c7 fb 22 1c 94 60 ac 50 76 4c a1 38 f1 | ikev2 g^x 43 ce 44 aa e7 39 3c 86 9e e1 41 54 48 c3 cb 31 | ikev2 g^x 48 d9 d1 19 bc cb 0b cc 7d 40 bf 96 af 1e df fb | ikev2 g^x 0f 62 79 6b f0 8e 05 4f 2e a0 3c cd 46 16 0c 86 | ikev2 g^x 49 e9 a6 e2 c2 86 c5 8e b2 14 0a be c1 f8 73 ee | ikev2 g^x bb d0 d9 50 52 32 c3 fa f2 3b b2 ca cc 8c 24 54 | ikev2 g^x 79 d5 c7 d3 1b 32 b7 28 de dd a1 c3 34 b8 54 c4 | ikev2 g^x ba 19 90 3e 1a d6 84 33 38 8c c1 45 94 fb 96 9e | ikev2 g^x 19 4c cd 4d d5 73 7e e1 8a 56 34 ce ca da 7f ec | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 09 67 1c 9d 6c 7a 1d eb 24 78 5e 1f a5 24 7e 35 | IKEv2 nonce ac a5 c4 f9 a0 f3 f8 63 91 47 e2 76 a1 4d 73 cb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8b 59 1f 5e 29 ec 79 97 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 09 | natd_hash: port= 01 f4 | natd_hash: hash= 62 76 e0 4e 77 d9 cf 89 73 cb 13 92 b0 28 c4 2a | natd_hash: hash= 76 4e 4e 20 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 62 76 e0 4e 77 d9 cf 89 73 cb 13 92 b0 28 c4 2a | Notify data 76 4e 4e 20 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8b 59 1f 5e 29 ec 79 97 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7b 1f d5 2f e3 dc 02 0a cf 5f 34 da 40 53 6d 9d | natd_hash: hash= 9b 7e 60 b7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7b 1f d5 2f e3 dc 02 0a cf 5f 34 da 40 53 6d 9d | Notify data 9b 7e 60 b7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #261 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #261: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #261 to 4294967295 after switching state | Message ID: IKE #261 skipping update_recv as MD is fake | Message ID: sent #261 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-9" #261: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.9:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #261) | 8b 59 1f 5e 29 ec 79 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 16 bb 69 7b 8c de a9 f0 aa 27 22 0c 50 1e 2b | c0 76 0c 79 99 31 2f f3 35 0b 93 05 6b 25 af d5 | 38 8a 63 51 f1 c7 93 6d 58 cf aa 10 dd 75 1f c8 | 55 42 4b ca 64 4b 8f 25 43 c0 98 a7 58 2f fe 43 | a0 fc e9 fe 8a 4f d9 62 8e db b8 54 42 5d 72 29 | 3d 08 a8 8c 4e d1 f1 b8 76 cf b0 d0 a2 dc ae 18 | 1b 5a 75 da 49 ca 9e c2 09 0d fb 74 50 88 ed a4 | d6 99 da c7 fb 22 1c 94 60 ac 50 76 4c a1 38 f1 | 43 ce 44 aa e7 39 3c 86 9e e1 41 54 48 c3 cb 31 | 48 d9 d1 19 bc cb 0b cc 7d 40 bf 96 af 1e df fb | 0f 62 79 6b f0 8e 05 4f 2e a0 3c cd 46 16 0c 86 | 49 e9 a6 e2 c2 86 c5 8e b2 14 0a be c1 f8 73 ee | bb d0 d9 50 52 32 c3 fa f2 3b b2 ca cc 8c 24 54 | 79 d5 c7 d3 1b 32 b7 28 de dd a1 c3 34 b8 54 c4 | ba 19 90 3e 1a d6 84 33 38 8c c1 45 94 fb 96 9e | 19 4c cd 4d d5 73 7e e1 8a 56 34 ce ca da 7f ec | 29 00 00 24 09 67 1c 9d 6c 7a 1d eb 24 78 5e 1f | a5 24 7e 35 ac a5 c4 f9 a0 f3 f8 63 91 47 e2 76 | a1 4d 73 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 76 e0 4e 77 d9 cf 89 73 cb 13 92 | b0 28 c4 2a 76 4e 4e 20 00 00 00 1c 00 00 40 05 | 7b 1f d5 2f e3 dc 02 0a cf 5f 34 da 40 53 6d 9d | 9b 7e 60 b7 | state #261 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374040670 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aecb00 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #261 | libevent_malloc: new ptr-libevent@0x7fb37000cf80 size 128 | #261 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49665.335788 | resume sending helper answer for #261 suppresed complete_v2_state_transition() and stole MD | #261 spent 0.327 milliseconds in resume sending helper answer | stop processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388001840 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 59 1f 5e 29 ec 79 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #261 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #261 | rejected packet: | 8b 59 1f 5e 29 ec 79 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 09 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #261: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac2900 | handling event EVENT_RETRANSMIT for parent state #10 | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #10 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #10 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49665.437019; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.020196 exceeds limit? YES "road-eastnet-nonat-10" #10: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-10" #10: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #262 at 0x557d469e1040 | State DB: adding IKEv2 state #262 in UNDEFINED | pstats #262 ikev2.ike started | Message ID: init #262: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #262: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #262; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-10" #262: initiating v2 parent SA to replace #10 | using existing local IKE proposals for connection road-eastnet-nonat-10 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 262 for state #262 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469fbb00 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #262 | libevent_malloc: new ptr-libevent@0x7fb388001840 size 128 | #262 spent 0.128 milliseconds in ikev2_parent_outI1() | RESET processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #10 ikev2.ike failed too-many-retransmits | pstats #10 ikev2.ike deleted too-many-retransmits | #10 spent 2.81 milliseconds in total | crypto helper 2 resuming | crypto helper 2 starting work-order 262 for state #262 | [RE]START processing: state #10 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in delete_state() at state.c:879) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 262 "road-eastnet-nonat-10" #10: deleting state (STATE_PARENT_I1) aged 64.023s and NOT sending notification | parent state #10: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #10 "road-eastnet-nonat-10" #10: deleting IKE SA for connection 'road-eastnet-nonat-10' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-10' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-10 | State DB: deleting IKEv2 state #10 in PARENT_I1 | parent state #10: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #10 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 262 time elapsed 0.001034 seconds | libevent_free: release ptr-libevent@0x7fb380027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac2900 | (#262) spent 1.02 milliseconds in crypto helper computing work-order 262: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 262 for state #262 to event queue | scheduling resume sending helper answer for #262 | libevent_malloc: new ptr-libevent@0x7fb3800044e0 size 128 | crypto helper 2 waiting (nothing to do) | in statetime_stop() and could not find #10 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-10 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-10" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-10' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-10" | stop processing: connection "road-eastnet-nonat-10" (in initiate_a_connection() at initiate.c:349) | spent 0.0586 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #262 | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 262 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #262 | **emit ISAKMP Message: | initiator cookie: | 6c b6 05 ad 53 aa 46 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-10 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c5 71 41 19 2f e2 7d 30 6b 4e a1 e7 5c d2 fe 4f | ikev2 g^x e0 61 ad 09 53 0e a0 57 08 e6 8a c7 a8 ab 86 63 | ikev2 g^x b8 6a 7f 66 41 dd b7 63 7a df 2e dc eb 44 db ac | ikev2 g^x 84 60 8a 30 6d a6 8e c8 9b e0 4a d0 70 9a 6f d7 | ikev2 g^x 2b c0 d7 cf ec 52 70 50 23 5f 91 08 50 21 38 8b | ikev2 g^x 76 60 df cc d7 e8 a2 a1 14 d7 95 47 31 84 95 aa | ikev2 g^x a3 81 92 3c a4 0d 4b 28 d7 90 8d 56 f9 3c bf bc | ikev2 g^x 84 88 bc cf 92 1a d8 6c 91 60 d7 c8 53 4c 8f 1b | ikev2 g^x 33 3d 36 12 cc 21 af 62 59 3d a6 91 f5 8f 40 b1 | ikev2 g^x 5e 20 75 cb 09 ce 69 22 f7 ce 4e 56 bd 5c 4e 69 | ikev2 g^x 85 a0 6f 08 1d 3c a0 71 93 00 3c 05 be a2 5e a3 | ikev2 g^x 18 1e 44 5a 4d ed 58 8b 10 8f 38 84 6b ea 6f 25 | ikev2 g^x 2a 8f 86 0f 8b b5 6e ce 72 db 55 37 c3 3e 68 45 | ikev2 g^x 52 fb fc c3 b0 3a 37 24 8c 65 c9 ec 5e 24 2b c3 | ikev2 g^x 69 bc 27 c7 b0 7f 81 12 a0 6d 38 e6 33 39 b8 2c | ikev2 g^x 2a b9 3c 7a 5e 19 74 c7 ec ac 4b b5 b2 ea 83 d8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a4 15 8c 3a a3 1b 1e b6 c4 22 d7 fc ab 68 38 21 | IKEv2 nonce 36 11 f7 0b d4 9b 74 fb 1e 21 f2 3a 1b 0d d1 83 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6c b6 05 ad 53 aa 46 a5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0a | natd_hash: port= 01 f4 | natd_hash: hash= f1 64 14 a1 e8 e4 eb 96 cf 02 78 71 fb d0 4f 54 | natd_hash: hash= fd 2f 47 94 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f1 64 14 a1 e8 e4 eb 96 cf 02 78 71 fb d0 4f 54 | Notify data fd 2f 47 94 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6c b6 05 ad 53 aa 46 a5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f3 5b 09 5c ae 75 15 23 50 5d 21 6a e9 8d 68 9d | natd_hash: hash= ed b0 04 c4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f3 5b 09 5c ae 75 15 23 50 5d 21 6a e9 8d 68 9d | Notify data ed b0 04 c4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #262 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #262: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #262 to 4294967295 after switching state | Message ID: IKE #262 skipping update_recv as MD is fake | Message ID: sent #262 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-10" #262: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.10:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #262) | 6c b6 05 ad 53 aa 46 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 71 41 19 2f e2 7d 30 6b 4e a1 e7 5c d2 fe 4f | e0 61 ad 09 53 0e a0 57 08 e6 8a c7 a8 ab 86 63 | b8 6a 7f 66 41 dd b7 63 7a df 2e dc eb 44 db ac | 84 60 8a 30 6d a6 8e c8 9b e0 4a d0 70 9a 6f d7 | 2b c0 d7 cf ec 52 70 50 23 5f 91 08 50 21 38 8b | 76 60 df cc d7 e8 a2 a1 14 d7 95 47 31 84 95 aa | a3 81 92 3c a4 0d 4b 28 d7 90 8d 56 f9 3c bf bc | 84 88 bc cf 92 1a d8 6c 91 60 d7 c8 53 4c 8f 1b | 33 3d 36 12 cc 21 af 62 59 3d a6 91 f5 8f 40 b1 | 5e 20 75 cb 09 ce 69 22 f7 ce 4e 56 bd 5c 4e 69 | 85 a0 6f 08 1d 3c a0 71 93 00 3c 05 be a2 5e a3 | 18 1e 44 5a 4d ed 58 8b 10 8f 38 84 6b ea 6f 25 | 2a 8f 86 0f 8b b5 6e ce 72 db 55 37 c3 3e 68 45 | 52 fb fc c3 b0 3a 37 24 8c 65 c9 ec 5e 24 2b c3 | 69 bc 27 c7 b0 7f 81 12 a0 6d 38 e6 33 39 b8 2c | 2a b9 3c 7a 5e 19 74 c7 ec ac 4b b5 b2 ea 83 d8 | 29 00 00 24 a4 15 8c 3a a3 1b 1e b6 c4 22 d7 fc | ab 68 38 21 36 11 f7 0b d4 9b 74 fb 1e 21 f2 3a | 1b 0d d1 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 64 14 a1 e8 e4 eb 96 cf 02 78 71 | fb d0 4f 54 fd 2f 47 94 00 00 00 1c 00 00 40 05 | f3 5b 09 5c ae 75 15 23 50 5d 21 6a e9 8d 68 9d | ed b0 04 c4 | state #262 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388001840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469fbb00 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fbb00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #262 | libevent_malloc: new ptr-libevent@0x7fb380027c10 size 128 | #262 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49665.438821 | resume sending helper answer for #262 suppresed complete_v2_state_transition() and stole MD | #262 spent 0.401 milliseconds in resume sending helper answer | stop processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3800044e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c b6 05 ad 53 aa 46 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #262 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #262 | rejected packet: | 6c b6 05 ad 53 aa 46 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0a fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #262: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abfd80 | handling event EVENT_RETRANSMIT for parent state #257 | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #257 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #257 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49665.458069; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500682 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac2900 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #257 | libevent_malloc: new ptr-libevent@0x7fb3800044e0 size 128 "road-eastnet-nonat-5" #257: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #257) | c0 a3 3d d0 6b df 36 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 d4 14 bb a4 26 08 82 2e 68 9d 43 5b 83 0c 36 | 1f 55 d2 1d bf 09 8f 68 0a 80 73 cf b9 a3 3e fb | 4d 3a 5e 68 e8 aa 15 71 f7 e6 60 e6 9e 7c a9 b9 | e4 7c a0 fd c4 92 d3 66 8d 75 86 7f 7f 0a c5 42 | be bb d7 8c fb b4 ab fa c5 83 64 ff dd e6 56 27 | af 9a f1 86 53 58 3b 72 b7 e4 76 4e c9 2a af 68 | 0c 7e 9d bf 26 26 ae 59 6b f6 99 f5 1c 3d 32 4e | 8e a7 43 0e b2 0c 7f 5d ea 3a c0 50 3e 6f 7e 61 | fc 39 14 9d d7 51 ad 13 b2 22 e7 6c 3e 75 0f f9 | 50 5f 45 31 fb b6 64 15 77 12 e2 82 5e ea a6 ae | e9 ef 71 7b ce a0 63 c0 ec ed c4 35 36 4d 8b ac | a2 1c 05 95 aa 9f 05 c7 da bb 7e 2c 1b be db 0a | e1 a0 b3 b2 bf 79 ee 31 3e 48 4e 05 00 26 ce 87 | 2f 0f 18 80 43 59 d6 73 3e f5 b2 95 2a 4d b8 2d | f4 60 f9 1a 76 3c f3 63 33 e3 37 34 73 88 ed 64 | 6c a7 75 12 ca d0 e5 a3 5b 68 0d 46 dd d7 61 2d | 29 00 00 24 ee 5d 7d 66 4d 0b a2 50 89 9d 46 31 | 30 20 ae b6 b5 b0 95 a5 d1 00 de 3b e5 de 68 17 | ec 12 56 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 5f 0f 32 08 df d5 f3 1e 89 e0 00 | bf de 72 4a a1 a4 e7 89 00 00 00 1c 00 00 40 05 | 60 f8 1e fb ae 99 6b 12 d7 c7 12 5b 86 70 02 5c | 5c f6 f1 68 | libevent_free: release ptr-libevent@0x7fb348048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abfd80 | #257 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c0 a3 3d d0 6b df 36 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #257 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #257 | rejected packet: | c0 a3 3d d0 6b df 36 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #257: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #258 | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #258 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #258 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49665.527421; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500205 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abfd80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #258 | libevent_malloc: new ptr-libevent@0x7fb348048a10 size 128 "road-eastnet-nonat-6" #258: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #258) | f2 0a ee 39 57 38 66 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 84 a5 7f 13 c6 d5 f4 de a1 59 9b a0 a0 80 f1 | 2f 8b 06 61 d1 0f de 44 77 49 a3 76 3f 11 11 d4 | ab 9b 3e 8d 7f a0 dc 2b 42 28 86 6f ac 5b b2 c2 | 4e 03 12 4c 72 0a d1 f2 0b 69 dc 3f 47 15 b3 66 | 0b ed 38 4d 89 9d b6 26 e5 44 a2 c8 18 05 1d ea | b9 5a 63 00 12 16 1b 15 c7 6e b8 4d 60 58 cc f0 | 35 6e d0 c1 0c 7a 3b 52 20 a4 ce 3e e5 c0 cc 56 | 65 b1 16 d6 43 c2 be ea b5 3f 07 6c 04 df 3c 27 | ca 5b 39 2e f2 76 09 d5 9a 31 cd f8 a0 9b 56 3c | 42 b3 87 82 b1 01 3e ef 89 15 5a 1d 00 90 84 19 | 5b 3d 7c ec 45 07 76 99 d3 04 39 db f5 94 ae 9f | 9a 24 93 91 e4 3f ad 43 d2 f2 74 b3 73 89 3f f4 | ac 15 1c 07 3d d0 3a 58 a4 bb b4 b2 b0 c3 65 db | c7 15 7a 2b b3 96 c2 16 55 b0 f5 86 dd bf d9 cf | 01 e1 ae 2e 78 f6 40 62 df cc 04 cf 9d bd 05 f9 | 5f ef 7a 44 a4 51 1c 3a 9b b4 7d 0d 94 46 3e a1 | 29 00 00 24 25 6d bb 73 f8 76 14 9e e8 94 3a 77 | d7 da 85 ed f6 46 fc 67 4e bb 29 38 0b 6c 4c 96 | c6 a5 48 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da 43 d0 a7 5e 1e 6a 3c 4c 0b bd b4 | fc 0a 0a d4 c2 f3 96 56 00 00 00 1c 00 00 40 05 | 20 be 8b da 4d a1 7e 30 5a c5 49 1f 20 a4 27 d3 | b3 85 6c 0e | libevent_free: release ptr-libevent@0x7fb37802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #258 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 0a ee 39 57 38 66 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #258 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #258 | rejected packet: | f2 0a ee 39 57 38 66 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #258: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #254 | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #254 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #254 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49665.538719; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001504 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #254 | libevent_malloc: new ptr-libevent@0x7fb37802a950 size 128 "road-eastnet-nonat-2" #254: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #254) | b9 c6 03 da 3d 1b ba 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca 92 e7 94 15 6c 86 1d 96 e8 8f 04 2b 4c 31 1c | f2 c3 f1 85 7b fe b5 54 f7 1b c1 2a 4c 6d 01 5c | 34 19 7c 9d d1 b6 95 21 d0 08 d9 67 bb dc e0 e1 | 38 6b 59 b4 76 fc 39 ee a0 2d f2 f5 62 c4 0a 49 | 6b 3c f0 00 22 80 8c 1c 36 99 55 b9 ef cb 76 99 | 5c 12 4c 07 84 ad f5 48 ab 42 10 f5 2e d6 e5 5c | 9d d4 b0 9f 16 b4 b4 bb b3 53 f3 e9 cc 93 ad 3b | a8 c4 f0 7f 9d 9d e3 f4 df 44 9c 28 b2 72 cb b6 | 4b 6a f0 9c 2e 22 ce 4f d0 b2 c9 a3 7c 48 1e 03 | a8 3d 92 67 11 0c a8 c0 fd 76 08 be 4f 01 6d 12 | 3e 0b 87 da bc 3d 45 99 0f 30 cb 9d 8c 96 4d 32 | 07 37 42 c8 ca 8d d9 f2 2b 81 33 b1 a2 49 5c 82 | 69 0d 94 76 f5 ef d0 bf fa db a3 8e db 15 f4 34 | c3 81 4c 6a 47 45 9d c9 09 00 1e 8a 46 70 b4 51 | 30 c0 17 29 a6 05 17 9f 61 e3 d5 9e b5 26 aa b7 | f8 4d 8f 98 15 36 79 53 4c 2f e1 9e 49 63 a8 23 | 29 00 00 24 b7 98 fa 02 fe fe ce ce 94 a2 bc d0 | 60 0d 7b 30 0c f7 48 0b 72 92 ee ec 3d 65 36 1c | 6e c0 df 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3a c0 39 9e 3d 58 28 13 41 2f 06 c7 | b4 3e d7 c2 8d 41 7c 7d 00 00 00 1c 00 00 40 05 | 08 0f dc c4 71 f2 0f bc 45 99 87 81 91 93 b1 3d | 30 5f 17 8f | libevent_free: release ptr-libevent@0x7fb340048940 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #254 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 c6 03 da 3d 1b ba 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #254 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #254 | rejected packet: | b9 c6 03 da 3d 1b ba 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #254: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0458 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #11 | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #11 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #11 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49665.562043; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.021504 exceeds limit? YES "road-eastnet-nonat-11" #11: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-11" #11: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #263 at 0x557d469e2600 | State DB: adding IKEv2 state #263 in UNDEFINED | pstats #263 ikev2.ike started | Message ID: init #263: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #263: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #263; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-11" #263: initiating v2 parent SA to replace #11 | using existing local IKE proposals for connection road-eastnet-nonat-11 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 263 for state #263 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46afe580 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #263 | libevent_malloc: new ptr-libevent@0x7fb340048940 size 128 | #263 spent 0.133 milliseconds in ikev2_parent_outI1() | RESET processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #11 ikev2.ike failed too-many-retransmits | pstats #11 ikev2.ike deleted too-many-retransmits | #11 spent 2.67 milliseconds in total | [RE]START processing: state #11 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-11" #11: deleting state (STATE_PARENT_I1) aged 64.023s and NOT sending notification | crypto helper 0 resuming | crypto helper 0 starting work-order 263 for state #263 | parent state #11: PARENT_I1(half-open IKE SA) => delete | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 263 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #11 "road-eastnet-nonat-11" #11: deleting IKE SA for connection 'road-eastnet-nonat-11' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-11' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-11 | State DB: deleting IKEv2 state #11 in PARENT_I1 | parent state #11: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #11 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb34002a900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | in statetime_stop() and could not find #11 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-11 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 263 time elapsed 0.000542 seconds | (#263) spent 0.551 milliseconds in crypto helper computing work-order 263: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 263 for state #263 to event queue | scheduling resume sending helper answer for #263 | libevent_malloc: new ptr-libevent@0x7fb3840060f0 size 128 | crypto helper 0 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-11" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-11' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-11" | stop processing: connection "road-eastnet-nonat-11" (in initiate_a_connection() at initiate.c:349) | spent 0.0791 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #263 | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 263 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #263 | **emit ISAKMP Message: | initiator cookie: | ca df fa 2e cc 97 0a e0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-11 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 39 35 4e f5 b3 06 6a 55 0c f2 3d 49 3f 7e 31 f9 | ikev2 g^x fb cf 08 8d 9e dd 74 b4 ae 16 46 b6 d3 2d d7 81 | ikev2 g^x a5 4c 1e 3c 51 d2 5c 80 19 32 ae 15 f6 f1 83 90 | ikev2 g^x 89 74 e1 7a 65 6e b3 e6 37 19 f8 4c fe 75 98 41 | ikev2 g^x ac 4f 10 33 24 18 c2 b3 2c d3 58 72 8c df 81 d4 | ikev2 g^x 59 38 86 31 ec e0 a1 c4 d1 46 91 6e e8 5d e0 23 | ikev2 g^x 68 ef 05 cb cd 03 0b e1 cd 09 50 09 e9 ff 48 e3 | ikev2 g^x 8e ec a4 98 4e a5 2a 21 fb 32 20 aa 01 94 37 a3 | ikev2 g^x 4a a0 06 10 8c 55 c7 ef f3 db 52 f2 2f 93 75 5e | ikev2 g^x 89 12 79 f7 25 8b 5c 7e 90 0c 79 f1 46 9c 39 dc | ikev2 g^x 62 04 8a 23 65 3e da dc e9 e6 17 7c 76 c0 74 b4 | ikev2 g^x 38 86 ca da 50 ae fc f8 de 6d 6d ce d9 7f cd c0 | ikev2 g^x 85 4e f8 c9 04 41 9d 47 8a 73 e9 b5 4a cc 14 ad | ikev2 g^x 16 95 76 51 b8 09 27 ef 06 ca 3a bb ff 24 77 42 | ikev2 g^x cc fc 6e a1 e6 2b bd 33 6d f5 6a df 58 56 a8 4b | ikev2 g^x 96 18 0e 2a e9 ec 68 a9 e4 55 e7 47 98 67 01 11 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1f 89 c4 e0 c8 b8 15 d0 01 8c 72 b7 b9 51 02 35 | IKEv2 nonce 29 86 83 18 da 61 92 fd 67 fb 67 7c 20 e3 84 67 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ca df fa 2e cc 97 0a e0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0b | natd_hash: port= 01 f4 | natd_hash: hash= 6c 89 6c b7 69 49 4f f4 6b c0 cb 25 85 ed a6 01 | natd_hash: hash= 12 ce 48 f3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6c 89 6c b7 69 49 4f f4 6b c0 cb 25 85 ed a6 01 | Notify data 12 ce 48 f3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ca df fa 2e cc 97 0a e0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1c d7 2d 11 fa 53 cc ec b9 10 e5 08 27 61 79 62 | natd_hash: hash= 96 79 33 55 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1c d7 2d 11 fa 53 cc ec b9 10 e5 08 27 61 79 62 | Notify data 96 79 33 55 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #263 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #263: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #263 to 4294967295 after switching state | Message ID: IKE #263 skipping update_recv as MD is fake | Message ID: sent #263 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-11" #263: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.11:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #263) | ca df fa 2e cc 97 0a e0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 35 4e f5 b3 06 6a 55 0c f2 3d 49 3f 7e 31 f9 | fb cf 08 8d 9e dd 74 b4 ae 16 46 b6 d3 2d d7 81 | a5 4c 1e 3c 51 d2 5c 80 19 32 ae 15 f6 f1 83 90 | 89 74 e1 7a 65 6e b3 e6 37 19 f8 4c fe 75 98 41 | ac 4f 10 33 24 18 c2 b3 2c d3 58 72 8c df 81 d4 | 59 38 86 31 ec e0 a1 c4 d1 46 91 6e e8 5d e0 23 | 68 ef 05 cb cd 03 0b e1 cd 09 50 09 e9 ff 48 e3 | 8e ec a4 98 4e a5 2a 21 fb 32 20 aa 01 94 37 a3 | 4a a0 06 10 8c 55 c7 ef f3 db 52 f2 2f 93 75 5e | 89 12 79 f7 25 8b 5c 7e 90 0c 79 f1 46 9c 39 dc | 62 04 8a 23 65 3e da dc e9 e6 17 7c 76 c0 74 b4 | 38 86 ca da 50 ae fc f8 de 6d 6d ce d9 7f cd c0 | 85 4e f8 c9 04 41 9d 47 8a 73 e9 b5 4a cc 14 ad | 16 95 76 51 b8 09 27 ef 06 ca 3a bb ff 24 77 42 | cc fc 6e a1 e6 2b bd 33 6d f5 6a df 58 56 a8 4b | 96 18 0e 2a e9 ec 68 a9 e4 55 e7 47 98 67 01 11 | 29 00 00 24 1f 89 c4 e0 c8 b8 15 d0 01 8c 72 b7 | b9 51 02 35 29 86 83 18 da 61 92 fd 67 fb 67 7c | 20 e3 84 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 89 6c b7 69 49 4f f4 6b c0 cb 25 | 85 ed a6 01 12 ce 48 f3 00 00 00 1c 00 00 40 05 | 1c d7 2d 11 fa 53 cc ec b9 10 e5 08 27 61 79 62 | 96 79 33 55 | state #263 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb340048940 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46afe580 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #263 | libevent_malloc: new ptr-libevent@0x7fb34002a900 size 128 | #263 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49665.563295 | resume sending helper answer for #263 suppresed complete_v2_state_transition() and stole MD | #263 spent 0.356 milliseconds in resume sending helper answer | stop processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3840060f0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca df fa 2e cc 97 0a e0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #263 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #263 | rejected packet: | ca df fa 2e cc 97 0a e0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0b fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #263: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #259 | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #259 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #259 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49665.629503; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500346 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #259 | libevent_malloc: new ptr-libevent@0x7fb3840060f0 size 128 "road-eastnet-nonat-7" #259: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #259) | 69 c4 5c 94 f6 f0 24 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe b3 f9 68 3e 85 57 5d 74 26 b7 37 f5 c1 1c c8 | a9 30 6a e1 51 a4 0f d5 ca 35 4b e9 d0 ec d0 ea | 11 06 1a ad 0a 7c 08 a4 ce 70 10 ef b2 c9 82 43 | 06 fb 99 b0 99 d2 5d a2 87 5b cd a0 9b 7d 7a a3 | 30 f9 78 c0 d7 43 6f f3 cc 53 5a 43 25 d8 61 04 | 58 03 b6 71 c6 21 93 59 b3 7c 3f 84 50 6d 48 95 | ef b8 dc 96 69 dc 88 98 10 47 21 0a 3d 72 57 34 | e5 bd d9 b3 4a 55 2e bb 34 64 f1 be 1c 6f f2 7e | c5 4b 83 c8 2c d8 e9 41 02 95 ff 83 96 69 c2 56 | 98 1b 20 30 7a bc 8b ab ee 27 a0 89 22 93 25 c7 | d2 f1 b0 c8 12 06 e6 8d 9a d7 bd fc 06 14 66 23 | 65 ae e6 9e 37 44 0c f0 0e 0e 78 09 b8 a3 32 c3 | c6 25 1b 97 0b 77 db 90 b8 16 58 5f 15 d2 40 fe | 1c d0 5e e3 88 05 3b ef bc 19 2c a9 73 97 03 9a | 26 fc 47 8b 95 24 fe d4 39 f2 65 5a 9f ee 0c cf | 1a 9b 03 45 52 42 61 4d b6 e7 aa 2c 0c 37 c0 61 | 29 00 00 24 c4 2f 3e 0e 76 3e 59 e7 3e 5c 53 28 | 43 02 fc a9 7a 2b 47 13 2c c2 eb 53 3e b5 40 d1 | 94 dc e6 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 85 30 eb 64 9e 84 09 e0 70 76 01 | 65 fa d3 ac 84 56 a3 b4 00 00 00 1c 00 00 40 05 | 64 83 da b1 99 b6 d9 28 72 08 34 2c 77 b4 36 a0 | 74 09 78 83 | libevent_free: release ptr-libevent@0x7fb380038370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #259 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 c4 5c 94 f6 f0 24 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #259 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #259 | rejected packet: | 69 c4 5c 94 f6 f0 24 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #259: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0483 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c780 | handling event EVENT_RETRANSMIT for parent state #12 | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #12 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #12 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49665.675782; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.022579 exceeds limit? YES "road-eastnet-nonat-12" #12: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-12" #12: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #264 at 0x557d469e3bc0 | State DB: adding IKEv2 state #264 in UNDEFINED | pstats #264 ikev2.ike started | Message ID: init #264: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #264: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #264; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-12" #264: initiating v2 parent SA to replace #12 | using existing local IKE proposals for connection road-eastnet-nonat-12 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 264 for state #264 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb348005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #264 | libevent_malloc: new ptr-libevent@0x7fb380038370 size 128 | #264 spent 0.0891 milliseconds in ikev2_parent_outI1() | RESET processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #12 ikev2.ike failed too-many-retransmits | pstats #12 ikev2.ike deleted too-many-retransmits | #12 spent 2.73 milliseconds in total | [RE]START processing: state #12 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-12" #12: deleting state (STATE_PARENT_I1) aged 64.024s and NOT sending notification | parent state #12: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #12 | crypto helper 9 resuming | crypto helper 9 starting work-order 264 for state #264 "road-eastnet-nonat-12" #12: deleting IKE SA for connection 'road-eastnet-nonat-12' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 264 | add revival: connection 'road-eastnet-nonat-12' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-12 | State DB: deleting IKEv2 state #12 in PARENT_I1 | parent state #12: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #12 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3480300e0 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 264 time elapsed 0.000586 seconds | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c780 | in statetime_stop() and could not find #12 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#264) spent 0.591 milliseconds in crypto helper computing work-order 264: ikev2_outI1 KE (pcr) | processing global timer EVENT_REVIVE_CONNS | crypto helper 9 sending results from work-order 264 for state #264 to event queue Initiating connection road-eastnet-nonat-12 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | scheduling resume sending helper answer for #264 | libevent_malloc: new ptr-libevent@0x7fb378008e30 size 128 | crypto helper 9 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-12" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-12' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-12" | stop processing: connection "road-eastnet-nonat-12" (in initiate_a_connection() at initiate.c:349) | spent 0.0655 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #264 | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 264 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #264 | **emit ISAKMP Message: | initiator cookie: | 8e fe 0e 1c bf 0e 6b 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-12 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x bc 85 0f 2d e4 cd 04 0b 17 96 14 35 20 98 98 7c | ikev2 g^x 43 94 0e c0 cb 2a ed cd 26 f3 f4 fd 71 0a b3 35 | ikev2 g^x 8d c8 ce 92 67 ce 39 72 cf 1d 58 73 86 98 2b a0 | ikev2 g^x 6f 55 7b 13 d0 1f 62 3b 93 93 85 3e 36 cd 86 27 | ikev2 g^x b4 c1 9a bd c4 db 39 19 44 28 ec a5 e9 1c 59 a2 | ikev2 g^x a7 fc b2 f8 f1 72 da 9c 2a b8 36 d3 61 88 51 dc | ikev2 g^x 4d 20 86 6a 14 25 ef 10 b3 1b 09 52 6d 00 f9 db | ikev2 g^x 75 0a 80 38 3b 18 7c 9c fd c8 c9 4e b1 e2 84 70 | ikev2 g^x a4 dd 3f 85 ce 8c cb 20 5c 6a 42 21 65 c4 fd 15 | ikev2 g^x 7a 47 92 65 67 69 9e be f3 7a e9 66 c9 56 bd d2 | ikev2 g^x 3c 4a 76 68 b7 3f ce 1d 64 64 a7 2c 71 37 b4 c4 | ikev2 g^x 53 38 1c 79 97 95 2a 69 1c 36 40 41 3d 05 9c ba | ikev2 g^x 4d 38 e3 a6 a7 6c e9 b1 59 1a 9f ab 80 0a d9 8e | ikev2 g^x ac 39 5a 0c e3 b3 9d c1 3d 5d 32 c8 42 00 f8 4c | ikev2 g^x 3a fb 9c 36 7f 16 43 4c 95 29 48 05 f2 b7 02 75 | ikev2 g^x 54 25 c2 90 a5 04 3b fa ca 77 9e 55 e7 39 19 34 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0b 7d f5 1c 67 a7 5b 6f d5 5f 23 1c de ee af 0f | IKEv2 nonce ed f9 a1 fa b5 71 92 a8 5a 39 25 fa 7d a0 ff 52 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8e fe 0e 1c bf 0e 6b 05 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0c | natd_hash: port= 01 f4 | natd_hash: hash= 8c 4e 74 d9 6a 11 61 e7 2b 9e b3 5d fa c6 10 84 | natd_hash: hash= a3 ff e4 72 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8c 4e 74 d9 6a 11 61 e7 2b 9e b3 5d fa c6 10 84 | Notify data a3 ff e4 72 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8e fe 0e 1c bf 0e 6b 05 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 61 d2 3a 09 fc 3f e9 c0 9a fa 15 52 e0 d4 39 3d | natd_hash: hash= 0f 2b c4 10 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 61 d2 3a 09 fc 3f e9 c0 9a fa 15 52 e0 d4 39 3d | Notify data 0f 2b c4 10 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #264 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #264: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #264 to 4294967295 after switching state | Message ID: IKE #264 skipping update_recv as MD is fake | Message ID: sent #264 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-12" #264: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.12:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #264) | 8e fe 0e 1c bf 0e 6b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 85 0f 2d e4 cd 04 0b 17 96 14 35 20 98 98 7c | 43 94 0e c0 cb 2a ed cd 26 f3 f4 fd 71 0a b3 35 | 8d c8 ce 92 67 ce 39 72 cf 1d 58 73 86 98 2b a0 | 6f 55 7b 13 d0 1f 62 3b 93 93 85 3e 36 cd 86 27 | b4 c1 9a bd c4 db 39 19 44 28 ec a5 e9 1c 59 a2 | a7 fc b2 f8 f1 72 da 9c 2a b8 36 d3 61 88 51 dc | 4d 20 86 6a 14 25 ef 10 b3 1b 09 52 6d 00 f9 db | 75 0a 80 38 3b 18 7c 9c fd c8 c9 4e b1 e2 84 70 | a4 dd 3f 85 ce 8c cb 20 5c 6a 42 21 65 c4 fd 15 | 7a 47 92 65 67 69 9e be f3 7a e9 66 c9 56 bd d2 | 3c 4a 76 68 b7 3f ce 1d 64 64 a7 2c 71 37 b4 c4 | 53 38 1c 79 97 95 2a 69 1c 36 40 41 3d 05 9c ba | 4d 38 e3 a6 a7 6c e9 b1 59 1a 9f ab 80 0a d9 8e | ac 39 5a 0c e3 b3 9d c1 3d 5d 32 c8 42 00 f8 4c | 3a fb 9c 36 7f 16 43 4c 95 29 48 05 f2 b7 02 75 | 54 25 c2 90 a5 04 3b fa ca 77 9e 55 e7 39 19 34 | 29 00 00 24 0b 7d f5 1c 67 a7 5b 6f d5 5f 23 1c | de ee af 0f ed f9 a1 fa b5 71 92 a8 5a 39 25 fa | 7d a0 ff 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 4e 74 d9 6a 11 61 e7 2b 9e b3 5d | fa c6 10 84 a3 ff e4 72 00 00 00 1c 00 00 40 05 | 61 d2 3a 09 fc 3f e9 c0 9a fa 15 52 e0 d4 39 3d | 0f 2b c4 10 | state #264 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380038370 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb348005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #264 | libevent_malloc: new ptr-libevent@0x7fb3480300e0 size 128 | #264 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49665.677105 | resume sending helper answer for #264 suppresed complete_v2_state_transition() and stole MD | #264 spent 0.446 milliseconds in resume sending helper answer | stop processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb378008e30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e fe 0e 1c bf 0e 6b 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #264 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #264 | rejected packet: | 8e fe 0e 1c bf 0e 6b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0c fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #264: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0599 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11640 | handling event EVENT_RETRANSMIT for parent state #255 | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #255 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #255 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49665.686336; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001741 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c780 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #255 | libevent_malloc: new ptr-libevent@0x7fb378008e30 size 128 "road-eastnet-nonat-3" #255: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #255) | b4 62 7d 49 a4 92 20 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 95 bd 0c ae 75 b5 e3 ef c4 cd 00 43 ea 3e 9a | 02 ba 07 e1 c1 bd 5d f0 a8 a6 51 3a 4a 21 e5 46 | 19 59 a0 93 a8 07 b1 7f 53 68 e9 d8 63 85 c8 12 | 71 98 74 63 ac c1 5d a5 39 9f c3 9e 95 82 52 3e | e1 41 18 21 d4 2e 9c 8d e0 71 8e d0 6d 4b 68 7e | 1c df fa cf ed ca 99 59 64 68 ed b3 9c 61 13 df | 2f ad b1 5a 3f dc 76 f5 58 69 91 b1 8b 83 c7 6f | 0b 08 55 fc ba 8b aa 73 16 1a 51 59 6d 0d 21 1f | bf 66 60 21 f1 49 bc 92 8c 9a be 6c 52 be 72 e6 | 19 b6 47 f8 33 cc b5 e6 ed 41 53 62 da 9d 6d 34 | fc ee 0f bf 23 f3 09 d7 96 22 fd c9 6e c0 31 60 | 95 22 90 57 96 ed 6a f6 05 50 b8 1b 34 71 5d dd | a7 c1 ab 82 e5 96 d7 d0 ac 36 1c 30 9d ee a7 97 | 6f 15 b5 89 4e c4 f6 f6 b5 08 23 bf cb 9e 75 f3 | f9 e0 ea 95 d8 eb 73 6d e3 2b 25 8d e5 17 c9 6e | f4 0f 23 e9 e4 7e dc 78 3c ae 82 7e 2a c2 1f 84 | 29 00 00 24 27 f0 79 05 ca 38 9d 60 17 70 37 05 | 8f c8 d2 c0 f8 4f 0f 05 b1 d0 9d 9d 43 88 90 d5 | 2d 20 4e 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 2d ab c5 84 ac e3 ea 3f b2 97 06 | b2 08 24 4c 91 11 e0 2a 00 00 00 1c 00 00 40 05 | ca ca c2 3f 11 62 54 7a 69 58 46 70 0a 1d a0 10 | 47 7f 3a 1d | libevent_free: release ptr-libevent@0x7fb344048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11640 | #255 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 62 7d 49 a4 92 20 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #255 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #255 | rejected packet: | b4 62 7d 49 a4 92 20 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #255: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.078 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47e90 | handling event EVENT_RETRANSMIT for parent state #260 | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #260 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #260 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49665.732701; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500888 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11640 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #260 | libevent_malloc: new ptr-libevent@0x7fb344048a10 size 128 "road-eastnet-nonat-8" #260: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #260) | a8 de 56 29 b7 d6 fa 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 e3 e7 0b 5e 0a a2 78 28 90 d4 10 18 db 3b 08 | b2 da 89 a3 10 0a cf 73 47 c7 8b 62 54 ef 17 0b | 52 d6 fe 33 62 21 4b 61 30 79 d1 82 82 85 ea 34 | 5e 16 ec db dd eb 97 56 18 30 74 8c 1f 6e 05 89 | 21 09 2b 1f b9 bc b7 45 38 93 12 7a 5d 44 53 c4 | 90 d3 d5 13 c2 0f fd 6b 37 3e 25 38 05 ed f0 2b | cb 0f 13 a8 c7 9b fe 60 00 1a 65 af 42 72 d4 bd | f1 07 94 0e 72 26 91 81 83 ee ff ef 41 c2 92 80 | a0 7f b9 6c 1f d2 e5 4b 34 fe 68 33 41 4d c0 3b | fb 7e 82 89 76 4f ab b4 81 d9 20 1a 79 fa de 75 | 7d a8 cd 19 c4 08 7c dc 7d 50 74 8e 78 b5 b3 64 | 8b 8f bd fd e8 f9 24 be 78 a0 45 9f 10 40 3e e1 | 49 ba 58 e8 63 d1 38 81 0c 79 61 75 c1 98 81 43 | 9b e0 a1 0d fc da 35 4b 0e a9 e1 35 63 d5 73 64 | db 23 3e 1b a9 3a 4e c0 e5 7f 6a ab 90 f3 cd 49 | 1b bf e5 c9 ab 56 60 25 6c 22 94 4d da ff b4 bb | 29 00 00 24 2b a8 af 62 73 94 e5 0a 7f 70 bf f7 | 73 9f 36 a9 cb 1b e2 09 0a 24 49 93 58 be a0 29 | 94 31 83 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 87 5d ef 8f 65 c8 58 d0 3b 6f e5 | c6 10 af 28 1a 1c e2 ed 00 00 00 1c 00 00 40 05 | 7a 28 e6 3f f8 c3 d1 0c 25 ff 6a 7c a9 a5 77 33 | 24 34 82 26 | libevent_free: release ptr-libevent@0x7fb3640406e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47e90 | #260 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 de 56 29 b7 d6 fa 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #260 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #260 | rejected packet: | a8 de 56 29 b7 d6 fa 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #260: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24700 | handling event EVENT_RETRANSMIT for parent state #13 | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #13 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #13 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49665.781127; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.018449 exceeds limit? YES "road-eastnet-nonat-13" #13: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-13" #13: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #265 at 0x557d469e5180 | State DB: adding IKEv2 state #265 in UNDEFINED | pstats #265 ikev2.ike started | Message ID: init #265: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #265: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #265; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-13" #265: initiating v2 parent SA to replace #13 | using existing local IKE proposals for connection road-eastnet-nonat-13 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 265 for state #265 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47e90 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #265 | libevent_malloc: new ptr-libevent@0x7fb3640406e0 size 128 | #265 spent 0.0679 milliseconds in ikev2_parent_outI1() | RESET processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #13 ikev2.ike failed too-many-retransmits | pstats #13 ikev2.ike deleted too-many-retransmits | crypto helper 10 resuming | crypto helper 10 starting work-order 265 for state #265 | #13 spent 2.67 milliseconds in total | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 265 | [RE]START processing: state #13 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-13" #13: deleting state (STATE_PARENT_I1) aged 64.020s and NOT sending notification | parent state #13: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #13 "road-eastnet-nonat-13" #13: deleting IKE SA for connection 'road-eastnet-nonat-13' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-13' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-13 | State DB: deleting IKEv2 state #13 in PARENT_I1 | parent state #13: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 265 time elapsed 0.000571 seconds | stop processing: state #13 from 192.1.2.23:500 (in delete_state() at state.c:1143) | (#265) spent 0.575 milliseconds in crypto helper computing work-order 265: ikev2_outI1 KE (pcr) | libevent_free: release ptr-libevent@0x7fb350046040 | crypto helper 10 sending results from work-order 265 for state #265 to event queue | scheduling resume sending helper answer for #265 | libevent_malloc: new ptr-libevent@0x7fb37c008e30 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24700 | crypto helper 10 waiting (nothing to do) | in statetime_stop() and could not find #13 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-13 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-13" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-13' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-13" | stop processing: connection "road-eastnet-nonat-13" (in initiate_a_connection() at initiate.c:349) | spent 0.0635 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #265 | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 265 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #265 | **emit ISAKMP Message: | initiator cookie: | 5e d6 2a e3 fc d6 88 0b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-13 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fa 2e 3a 15 7c f9 00 41 72 02 12 64 4c 6b 73 52 | ikev2 g^x bb 8d bc 96 e4 69 5a 27 ff 16 12 40 6d b3 e6 7d | ikev2 g^x 28 6d d8 d8 46 ae 55 b1 20 60 d0 f0 2c d7 5a 32 | ikev2 g^x f1 e8 5b 54 2b 16 ec 87 57 a5 e1 c1 08 80 a6 16 | ikev2 g^x a0 4f 0f 3b 62 e5 8c cb aa 65 e4 d5 87 37 d0 85 | ikev2 g^x 34 de df b2 ac 15 11 24 c5 c0 e2 ba 8e bf 6a 38 | ikev2 g^x 92 5b d1 dd 84 fb 29 ef cf 37 36 ed 82 a0 ef 7a | ikev2 g^x 79 c3 2b da 2f 96 ad 2b 46 50 67 74 44 c2 8f 22 | ikev2 g^x 65 99 b1 3a 1c fd 70 cc 25 39 6a 77 0a f9 8c f3 | ikev2 g^x 33 34 af 74 f2 1a 52 31 29 6f 53 43 ce 77 a1 c0 | ikev2 g^x 4e ad 32 24 24 86 73 ad 16 2d 19 8b 36 54 d6 8f | ikev2 g^x 96 95 e4 0b 0b df d1 24 22 12 35 73 ac 81 e7 c1 | ikev2 g^x af 88 20 ae e1 fa 41 09 f0 f6 2b 19 42 79 9e 92 | ikev2 g^x 6a 95 0b 69 19 21 ee ba 94 35 b0 07 aa 13 f3 40 | ikev2 g^x 4f 27 f7 e8 7d ea ae b3 14 bf 0c b2 8b a5 e7 1f | ikev2 g^x 2e 4a 4a 5e 40 8d d3 1a 30 c1 1d 13 0d 61 d3 15 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d2 1b cb fe 42 33 59 cd 17 75 9b cc f4 b0 0c 18 | IKEv2 nonce 45 31 71 9f e7 2e 80 d7 48 7b 93 7c d8 b3 ab 74 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5e d6 2a e3 fc d6 88 0b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0d | natd_hash: port= 01 f4 | natd_hash: hash= 20 77 56 b7 16 48 fa 98 9b c1 2d 60 a6 6c bc 07 | natd_hash: hash= 2c 3a ef 47 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 20 77 56 b7 16 48 fa 98 9b c1 2d 60 a6 6c bc 07 | Notify data 2c 3a ef 47 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5e d6 2a e3 fc d6 88 0b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 5a c9 c6 01 25 8a 31 37 7b d0 f2 6b d1 02 08 77 | natd_hash: hash= 0a b6 4e aa | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5a c9 c6 01 25 8a 31 37 7b d0 f2 6b d1 02 08 77 | Notify data 0a b6 4e aa | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #265 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #265: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #265 to 4294967295 after switching state | Message ID: IKE #265 skipping update_recv as MD is fake | Message ID: sent #265 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-13" #265: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.13:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #265) | 5e d6 2a e3 fc d6 88 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 2e 3a 15 7c f9 00 41 72 02 12 64 4c 6b 73 52 | bb 8d bc 96 e4 69 5a 27 ff 16 12 40 6d b3 e6 7d | 28 6d d8 d8 46 ae 55 b1 20 60 d0 f0 2c d7 5a 32 | f1 e8 5b 54 2b 16 ec 87 57 a5 e1 c1 08 80 a6 16 | a0 4f 0f 3b 62 e5 8c cb aa 65 e4 d5 87 37 d0 85 | 34 de df b2 ac 15 11 24 c5 c0 e2 ba 8e bf 6a 38 | 92 5b d1 dd 84 fb 29 ef cf 37 36 ed 82 a0 ef 7a | 79 c3 2b da 2f 96 ad 2b 46 50 67 74 44 c2 8f 22 | 65 99 b1 3a 1c fd 70 cc 25 39 6a 77 0a f9 8c f3 | 33 34 af 74 f2 1a 52 31 29 6f 53 43 ce 77 a1 c0 | 4e ad 32 24 24 86 73 ad 16 2d 19 8b 36 54 d6 8f | 96 95 e4 0b 0b df d1 24 22 12 35 73 ac 81 e7 c1 | af 88 20 ae e1 fa 41 09 f0 f6 2b 19 42 79 9e 92 | 6a 95 0b 69 19 21 ee ba 94 35 b0 07 aa 13 f3 40 | 4f 27 f7 e8 7d ea ae b3 14 bf 0c b2 8b a5 e7 1f | 2e 4a 4a 5e 40 8d d3 1a 30 c1 1d 13 0d 61 d3 15 | 29 00 00 24 d2 1b cb fe 42 33 59 cd 17 75 9b cc | f4 b0 0c 18 45 31 71 9f e7 2e 80 d7 48 7b 93 7c | d8 b3 ab 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 77 56 b7 16 48 fa 98 9b c1 2d 60 | a6 6c bc 07 2c 3a ef 47 00 00 00 1c 00 00 40 05 | 5a c9 c6 01 25 8a 31 37 7b d0 f2 6b d1 02 08 77 | 0a b6 4e aa | state #265 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3640406e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47e90 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47e90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #265 | libevent_malloc: new ptr-libevent@0x7fb350046040 size 128 | #265 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49665.782306 | resume sending helper answer for #265 suppresed complete_v2_state_transition() and stole MD | #265 spent 0.336 milliseconds in resume sending helper answer | stop processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c008e30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e d6 2a e3 fc d6 88 0b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #265 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #265 | rejected packet: | 5e d6 2a e3 fc d6 88 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0d fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #265: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0403 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acab40 | handling event EVENT_RETRANSMIT for parent state #256 | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #256 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #256 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49665.822492; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00129 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #256 | libevent_malloc: new ptr-libevent@0x7fb37c008e30 size 128 "road-eastnet-nonat-4" #256: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #256) | af ff 14 5c e8 87 a5 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 1f 56 51 1c ec cd e5 db 48 26 c8 dc 41 fd 54 | a8 2a f3 18 64 e6 88 a2 77 94 ce b8 37 5b 43 37 | 15 71 aa 40 2b 14 32 13 87 73 76 ea dc 9c c2 0d | 5f 66 9f c3 96 de 76 09 50 94 85 73 09 16 fd 60 | e5 22 cf 96 3d 7f 8a d5 69 b3 f6 e0 d1 b6 2a b1 | 46 24 36 96 12 35 a6 66 31 6c fc 27 fd 14 5f 55 | dc 4d 24 0c d2 4a 10 86 34 a8 27 78 27 27 b0 f6 | f0 8d 2e 1b c6 a5 de fc 9e fb ab ed 9f 6c dc 3c | 42 c9 5c a1 4a e3 4a 45 da e8 44 a1 f6 8a 36 fd | f6 c8 42 59 48 f3 30 69 ad 20 74 c3 02 1b f3 f8 | 3b 14 80 5c e4 55 cc fa 49 75 80 37 c4 a0 eb 78 | 5a ba 01 b2 91 5d ef fc 1f 18 54 22 3c e6 ac 42 | 22 26 d6 93 0e 7d c7 67 e5 47 f0 ab 43 0b cd e4 | d0 9c fd 7d 64 aa cd 20 be f3 31 9f f9 fd e9 74 | f6 4d 79 65 aa 69 d2 c1 c0 27 e2 43 4d 23 a2 bd | 81 a0 4b 66 29 06 06 b0 e0 6b c0 d6 29 53 e1 5f | 29 00 00 24 68 30 70 dd 8d a8 3f ec 7e 36 6c 6a | a3 ce 4b 67 03 0b 93 d7 9a 32 93 85 56 0b 5c 0e | c5 0b 8c 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 28 6b 61 6f db 11 ce 62 1a 99 08 | cd 34 ea 3b 0e 7b 2c f1 00 00 00 1c 00 00 40 05 | f7 c5 67 63 b0 24 3f 1b e9 07 39 23 b4 29 1b da | 4e b1 36 66 | libevent_free: release ptr-libevent@0x7fb354048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab40 | #256 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af ff 14 5c e8 87 a5 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #256 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #256 | rejected packet: | af ff 14 5c e8 87 a5 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #256: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #261 | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #261 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #261 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49665.836772; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500984 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #261 | libevent_malloc: new ptr-libevent@0x7fb354048a10 size 128 "road-eastnet-nonat-9" #261: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #261) | 8b 59 1f 5e 29 ec 79 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 16 bb 69 7b 8c de a9 f0 aa 27 22 0c 50 1e 2b | c0 76 0c 79 99 31 2f f3 35 0b 93 05 6b 25 af d5 | 38 8a 63 51 f1 c7 93 6d 58 cf aa 10 dd 75 1f c8 | 55 42 4b ca 64 4b 8f 25 43 c0 98 a7 58 2f fe 43 | a0 fc e9 fe 8a 4f d9 62 8e db b8 54 42 5d 72 29 | 3d 08 a8 8c 4e d1 f1 b8 76 cf b0 d0 a2 dc ae 18 | 1b 5a 75 da 49 ca 9e c2 09 0d fb 74 50 88 ed a4 | d6 99 da c7 fb 22 1c 94 60 ac 50 76 4c a1 38 f1 | 43 ce 44 aa e7 39 3c 86 9e e1 41 54 48 c3 cb 31 | 48 d9 d1 19 bc cb 0b cc 7d 40 bf 96 af 1e df fb | 0f 62 79 6b f0 8e 05 4f 2e a0 3c cd 46 16 0c 86 | 49 e9 a6 e2 c2 86 c5 8e b2 14 0a be c1 f8 73 ee | bb d0 d9 50 52 32 c3 fa f2 3b b2 ca cc 8c 24 54 | 79 d5 c7 d3 1b 32 b7 28 de dd a1 c3 34 b8 54 c4 | ba 19 90 3e 1a d6 84 33 38 8c c1 45 94 fb 96 9e | 19 4c cd 4d d5 73 7e e1 8a 56 34 ce ca da 7f ec | 29 00 00 24 09 67 1c 9d 6c 7a 1d eb 24 78 5e 1f | a5 24 7e 35 ac a5 c4 f9 a0 f3 f8 63 91 47 e2 76 | a1 4d 73 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 76 e0 4e 77 d9 cf 89 73 cb 13 92 | b0 28 c4 2a 76 4e 4e 20 00 00 00 1c 00 00 40 05 | 7b 1f d5 2f e3 dc 02 0a cf 5f 34 da 40 53 6d 9d | 9b 7e 60 b7 | libevent_free: release ptr-libevent@0x7fb37000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #261 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 59 1f 5e 29 ec 79 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #261 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #261 | rejected packet: | 8b 59 1f 5e 29 ec 79 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #261: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.074 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #14 | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #14 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #14 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49665.866134; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.013246 exceeds limit? YES "road-eastnet-nonat-14" #14: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-14" #14: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #266 at 0x557d469e6740 | State DB: adding IKEv2 state #266 in UNDEFINED | pstats #266 ikev2.ike started | Message ID: init #266: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #266: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #266; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-14" #266: initiating v2 parent SA to replace #14 | using existing local IKE proposals for connection road-eastnet-nonat-14 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 266 for state #266 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aecb00 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #266 | libevent_malloc: new ptr-libevent@0x7fb37000cf80 size 128 | #266 spent 0.131 milliseconds in ikev2_parent_outI1() | crypto helper 14 resuming | crypto helper 14 starting work-order 266 for state #266 | RESET processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 266 | start processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #14 ikev2.ike failed too-many-retransmits | pstats #14 ikev2.ike deleted too-many-retransmits | #14 spent 2.78 milliseconds in total | [RE]START processing: state #14 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-14" #14: deleting state (STATE_PARENT_I1) aged 64.015s and NOT sending notification | parent state #14: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #14 "road-eastnet-nonat-14" #14: deleting IKE SA for connection 'road-eastnet-nonat-14' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-14' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-14 | State DB: deleting IKEv2 state #14 in PARENT_I1 | parent state #14: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #14 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb344009640 | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 266 time elapsed 0.000637 seconds | (#266) spent 0.647 milliseconds in crypto helper computing work-order 266: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 266 for state #266 to event queue | scheduling resume sending helper answer for #266 | libevent_malloc: new ptr-libevent@0x7fb370008e30 size 128 | crypto helper 14 waiting (nothing to do) | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | in statetime_stop() and could not find #14 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-14 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-14" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-14' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-14" | stop processing: connection "road-eastnet-nonat-14" (in initiate_a_connection() at initiate.c:349) | spent 0.0751 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #266 | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 266 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #266 | **emit ISAKMP Message: | initiator cookie: | 6b cc e0 12 8b aa 91 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-14 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 77 c7 f6 72 9c a5 df d1 37 bd 8c a8 3d 12 ac f8 | ikev2 g^x 22 21 09 d5 08 f4 92 dd f1 6b 1f 81 7b 7f 3b 9d | ikev2 g^x 10 fa 77 c3 74 a7 03 4d 17 3b 47 94 f2 0e 9e 20 | ikev2 g^x ba c3 57 67 86 fd d2 e5 0d 53 bc 0e c2 cf a4 3a | ikev2 g^x ca 89 10 10 9a 9f 52 0e c5 60 b3 38 be 05 37 b4 | ikev2 g^x a3 6b 5d d8 04 66 d6 b5 93 93 8f 47 58 63 40 52 | ikev2 g^x 1b f8 2c cb 93 59 07 2b ad c7 18 ca a5 e9 24 fa | ikev2 g^x 41 de 1f 43 7f 1f 27 30 49 67 c7 c8 16 fd 61 a4 | ikev2 g^x 21 e9 05 98 46 f1 50 b6 8e 31 ad a9 2c 10 19 f5 | ikev2 g^x b9 ef 6b d3 e7 07 06 8e bf 18 8b 0a 77 f5 44 4b | ikev2 g^x 1c 00 21 d9 dc b3 66 3f a9 4b df cd cd bd 25 d2 | ikev2 g^x 2a cd 52 ad da b3 d3 bc be e7 d4 32 97 da 0f e8 | ikev2 g^x e2 29 51 0e 96 41 b4 ff 9b 20 c1 68 f8 22 6b 37 | ikev2 g^x bc 2d 7d 2a 13 01 a1 b3 05 fa c1 ea 1c 1f 45 97 | ikev2 g^x 4c 05 13 ad eb 35 15 0f f5 10 99 91 9b 3f 29 a1 | ikev2 g^x 29 e0 29 94 46 69 fe a4 f9 df d3 46 9b f7 d6 fc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 85 48 4e 62 cb aa ef f3 1e 98 d2 14 8e 36 5f 8a | IKEv2 nonce 20 c7 f8 35 5a c8 08 b9 4d a2 67 85 59 88 c1 3b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6b cc e0 12 8b aa 91 d2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0e | natd_hash: port= 01 f4 | natd_hash: hash= ae c1 7f 5b 24 ac dc 11 ec a1 5c 57 31 3f 4b 60 | natd_hash: hash= 7a 20 b0 c6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ae c1 7f 5b 24 ac dc 11 ec a1 5c 57 31 3f 4b 60 | Notify data 7a 20 b0 c6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6b cc e0 12 8b aa 91 d2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 71 38 17 79 8f 5d ce 34 6f 4c c4 ce cc 6f 78 37 | natd_hash: hash= 7e be 6c a5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 71 38 17 79 8f 5d ce 34 6f 4c c4 ce cc 6f 78 37 | Notify data 7e be 6c a5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #266 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #266: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #266 to 4294967295 after switching state | Message ID: IKE #266 skipping update_recv as MD is fake | Message ID: sent #266 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-14" #266: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.14:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #266) | 6b cc e0 12 8b aa 91 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 c7 f6 72 9c a5 df d1 37 bd 8c a8 3d 12 ac f8 | 22 21 09 d5 08 f4 92 dd f1 6b 1f 81 7b 7f 3b 9d | 10 fa 77 c3 74 a7 03 4d 17 3b 47 94 f2 0e 9e 20 | ba c3 57 67 86 fd d2 e5 0d 53 bc 0e c2 cf a4 3a | ca 89 10 10 9a 9f 52 0e c5 60 b3 38 be 05 37 b4 | a3 6b 5d d8 04 66 d6 b5 93 93 8f 47 58 63 40 52 | 1b f8 2c cb 93 59 07 2b ad c7 18 ca a5 e9 24 fa | 41 de 1f 43 7f 1f 27 30 49 67 c7 c8 16 fd 61 a4 | 21 e9 05 98 46 f1 50 b6 8e 31 ad a9 2c 10 19 f5 | b9 ef 6b d3 e7 07 06 8e bf 18 8b 0a 77 f5 44 4b | 1c 00 21 d9 dc b3 66 3f a9 4b df cd cd bd 25 d2 | 2a cd 52 ad da b3 d3 bc be e7 d4 32 97 da 0f e8 | e2 29 51 0e 96 41 b4 ff 9b 20 c1 68 f8 22 6b 37 | bc 2d 7d 2a 13 01 a1 b3 05 fa c1 ea 1c 1f 45 97 | 4c 05 13 ad eb 35 15 0f f5 10 99 91 9b 3f 29 a1 | 29 e0 29 94 46 69 fe a4 f9 df d3 46 9b f7 d6 fc | 29 00 00 24 85 48 4e 62 cb aa ef f3 1e 98 d2 14 | 8e 36 5f 8a 20 c7 f8 35 5a c8 08 b9 4d a2 67 85 | 59 88 c1 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae c1 7f 5b 24 ac dc 11 ec a1 5c 57 | 31 3f 4b 60 7a 20 b0 c6 00 00 00 1c 00 00 40 05 | 71 38 17 79 8f 5d ce 34 6f 4c c4 ce cc 6f 78 37 | 7e be 6c a5 | state #266 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37000cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aecb00 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #266 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #266 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49665.867564 | resume sending helper answer for #266 suppresed complete_v2_state_transition() and stole MD | #266 spent 0.449 milliseconds in resume sending helper answer | stop processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb370008e30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b cc e0 12 8b aa 91 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #266 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #266 | rejected packet: | 6b cc e0 12 8b aa 91 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0e fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #266: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0584 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fbb00 | handling event EVENT_RETRANSMIT for parent state #262 | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #262 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #262 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49665.939781; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50096 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #262 | libevent_malloc: new ptr-libevent@0x7fb370008e30 size 128 "road-eastnet-nonat-10" #262: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #262) | 6c b6 05 ad 53 aa 46 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 71 41 19 2f e2 7d 30 6b 4e a1 e7 5c d2 fe 4f | e0 61 ad 09 53 0e a0 57 08 e6 8a c7 a8 ab 86 63 | b8 6a 7f 66 41 dd b7 63 7a df 2e dc eb 44 db ac | 84 60 8a 30 6d a6 8e c8 9b e0 4a d0 70 9a 6f d7 | 2b c0 d7 cf ec 52 70 50 23 5f 91 08 50 21 38 8b | 76 60 df cc d7 e8 a2 a1 14 d7 95 47 31 84 95 aa | a3 81 92 3c a4 0d 4b 28 d7 90 8d 56 f9 3c bf bc | 84 88 bc cf 92 1a d8 6c 91 60 d7 c8 53 4c 8f 1b | 33 3d 36 12 cc 21 af 62 59 3d a6 91 f5 8f 40 b1 | 5e 20 75 cb 09 ce 69 22 f7 ce 4e 56 bd 5c 4e 69 | 85 a0 6f 08 1d 3c a0 71 93 00 3c 05 be a2 5e a3 | 18 1e 44 5a 4d ed 58 8b 10 8f 38 84 6b ea 6f 25 | 2a 8f 86 0f 8b b5 6e ce 72 db 55 37 c3 3e 68 45 | 52 fb fc c3 b0 3a 37 24 8c 65 c9 ec 5e 24 2b c3 | 69 bc 27 c7 b0 7f 81 12 a0 6d 38 e6 33 39 b8 2c | 2a b9 3c 7a 5e 19 74 c7 ec ac 4b b5 b2 ea 83 d8 | 29 00 00 24 a4 15 8c 3a a3 1b 1e b6 c4 22 d7 fc | ab 68 38 21 36 11 f7 0b d4 9b 74 fb 1e 21 f2 3a | 1b 0d d1 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 64 14 a1 e8 e4 eb 96 cf 02 78 71 | fb d0 4f 54 fd 2f 47 94 00 00 00 1c 00 00 40 05 | f3 5b 09 5c ae 75 15 23 50 5d 21 6a e9 8d 68 9d | ed b0 04 c4 | libevent_free: release ptr-libevent@0x7fb380027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fbb00 | #262 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c b6 05 ad 53 aa 46 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #262 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #262 | rejected packet: | 6c b6 05 ad 53 aa 46 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #262: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac2900 | handling event EVENT_RETRANSMIT for parent state #257 | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #257 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #257 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49665.959141; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001754 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fbb00 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #257 | libevent_malloc: new ptr-libevent@0x7fb380027c10 size 128 "road-eastnet-nonat-5" #257: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #257) | c0 a3 3d d0 6b df 36 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 d4 14 bb a4 26 08 82 2e 68 9d 43 5b 83 0c 36 | 1f 55 d2 1d bf 09 8f 68 0a 80 73 cf b9 a3 3e fb | 4d 3a 5e 68 e8 aa 15 71 f7 e6 60 e6 9e 7c a9 b9 | e4 7c a0 fd c4 92 d3 66 8d 75 86 7f 7f 0a c5 42 | be bb d7 8c fb b4 ab fa c5 83 64 ff dd e6 56 27 | af 9a f1 86 53 58 3b 72 b7 e4 76 4e c9 2a af 68 | 0c 7e 9d bf 26 26 ae 59 6b f6 99 f5 1c 3d 32 4e | 8e a7 43 0e b2 0c 7f 5d ea 3a c0 50 3e 6f 7e 61 | fc 39 14 9d d7 51 ad 13 b2 22 e7 6c 3e 75 0f f9 | 50 5f 45 31 fb b6 64 15 77 12 e2 82 5e ea a6 ae | e9 ef 71 7b ce a0 63 c0 ec ed c4 35 36 4d 8b ac | a2 1c 05 95 aa 9f 05 c7 da bb 7e 2c 1b be db 0a | e1 a0 b3 b2 bf 79 ee 31 3e 48 4e 05 00 26 ce 87 | 2f 0f 18 80 43 59 d6 73 3e f5 b2 95 2a 4d b8 2d | f4 60 f9 1a 76 3c f3 63 33 e3 37 34 73 88 ed 64 | 6c a7 75 12 ca d0 e5 a3 5b 68 0d 46 dd d7 61 2d | 29 00 00 24 ee 5d 7d 66 4d 0b a2 50 89 9d 46 31 | 30 20 ae b6 b5 b0 95 a5 d1 00 de 3b e5 de 68 17 | ec 12 56 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 5f 0f 32 08 df d5 f3 1e 89 e0 00 | bf de 72 4a a1 a4 e7 89 00 00 00 1c 00 00 40 05 | 60 f8 1e fb ae 99 6b 12 d7 c7 12 5b 86 70 02 5c | 5c f6 f1 68 | libevent_free: release ptr-libevent@0x7fb3800044e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac2900 | #257 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46abbc40 | handling event EVENT_RETRANSMIT for parent state #15 | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #15 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #15 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49665.959272; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010079 exceeds limit? YES "road-eastnet-nonat-15" #15: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-15" #15: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #267 at 0x557d469e7d00 | State DB: adding IKEv2 state #267 in UNDEFINED | pstats #267 ikev2.ike started | Message ID: init #267: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #267: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #267; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-15" #267: initiating v2 parent SA to replace #15 | using existing local IKE proposals for connection road-eastnet-nonat-15 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 267 for state #267 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ac2900 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #267 | libevent_malloc: new ptr-libevent@0x7fb3800044e0 size 128 | #267 spent 0.0694 milliseconds in ikev2_parent_outI1() | crypto helper 15 resuming | crypto helper 15 starting work-order 267 for state #267 | RESET processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 267 | start processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #15 ikev2.ike failed too-many-retransmits | pstats #15 ikev2.ike deleted too-many-retransmits | #15 spent 2.42 milliseconds in total | [RE]START processing: state #15 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-15" #15: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #15: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #15 "road-eastnet-nonat-15" #15: deleting IKE SA for connection 'road-eastnet-nonat-15' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-15' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-15 | State DB: deleting IKEv2 state #15 in PARENT_I1 | parent state #15: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #15 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3540251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc40 | in statetime_stop() and could not find #15 | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 267 time elapsed 0.000568 seconds | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#267) spent 0.578 milliseconds in crypto helper computing work-order 267: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 267 for state #267 to event queue | scheduling resume sending helper answer for #267 | libevent_malloc: new ptr-libevent@0x7fb37404b5c0 size 128 recvmsg: received truncated IKE packet (MSG_TRUNC) | crypto helper 15 waiting (nothing to do) | **parse ISAKMP Message (raw): | initiator cookie: | c0 a3 3d d0 6b df 36 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #257 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #257 | rejected packet: | c0 a3 3d d0 6b df 36 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 05 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #257: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0508 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-15 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-15" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-15' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-15" | stop processing: connection "road-eastnet-nonat-15" (in initiate_a_connection() at initiate.c:349) | spent 0.0646 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #267 | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 267 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #267 | **emit ISAKMP Message: | initiator cookie: | 6f db 88 0f fe 70 dc 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-15 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6e ec fe e4 22 11 a7 b5 a2 ee 25 53 3a 2f 1c 0a | ikev2 g^x 48 51 04 db 46 22 ad 6d 3c 60 e2 cb fb cc f5 7a | ikev2 g^x 6d 5e c9 24 ec d8 52 4f 96 5b 62 28 fb 9e eb fd | ikev2 g^x ac e9 f7 6f 4d 1a f9 74 24 29 e6 a2 80 a2 a7 c1 | ikev2 g^x b9 1c da 76 8c 9d 40 38 6a 26 13 d3 da 72 01 42 | ikev2 g^x b6 16 9c ca 09 1d 9b a9 90 70 fb 71 d1 ea b4 45 | ikev2 g^x 95 3b 5d b5 2c c1 00 ea bd 33 e0 43 00 b9 22 f4 | ikev2 g^x c9 60 90 dc b0 82 03 89 b0 c4 03 22 4b cf 7c 50 | ikev2 g^x 96 60 35 da 9c 4c f2 64 7d be b4 90 21 9b 54 ab | ikev2 g^x 96 09 b1 ee 1f 0d db 8e 22 4d 09 d6 43 6f c8 f1 | ikev2 g^x da 0c fd f4 69 33 b0 96 0f 1a 25 07 1d e6 1b 37 | ikev2 g^x 20 ff 37 b4 80 d9 a3 78 93 5a eb 5d 36 bd 9e 35 | ikev2 g^x 1e 0e a9 e8 13 eb 16 8f ff d5 26 ef c2 d5 47 45 | ikev2 g^x 91 9b e3 0e c5 08 1f 34 46 fe b0 3e f5 ce e1 c7 | ikev2 g^x 7c 47 c2 2d d2 f7 4c 06 62 a0 ae f2 e6 53 ff 73 | ikev2 g^x ee d6 e5 9b 28 8e f3 4d ef ad 40 41 9e 20 99 95 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6d 5a fb f5 8a b7 85 2e cf 37 31 c5 a8 e8 a7 22 | IKEv2 nonce a7 58 7e 34 8e 06 61 77 f0 7b 3b ce d2 d0 22 bd | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6f db 88 0f fe 70 dc 8d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0f | natd_hash: port= 01 f4 | natd_hash: hash= f5 b4 63 c8 b9 e3 2d fa 51 7c 79 27 ca 3c 7a c2 | natd_hash: hash= 0c 39 1a 2b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f5 b4 63 c8 b9 e3 2d fa 51 7c 79 27 ca 3c 7a c2 | Notify data 0c 39 1a 2b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6f db 88 0f fe 70 dc 8d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d9 fc ba 6b 91 d3 e0 ee c2 81 f3 1d 92 b2 24 2f | natd_hash: hash= bf 44 6b 65 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d9 fc ba 6b 91 d3 e0 ee c2 81 f3 1d 92 b2 24 2f | Notify data bf 44 6b 65 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #267 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #267: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #267 to 4294967295 after switching state | Message ID: IKE #267 skipping update_recv as MD is fake | Message ID: sent #267 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-15" #267: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.15:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #267) | 6f db 88 0f fe 70 dc 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e ec fe e4 22 11 a7 b5 a2 ee 25 53 3a 2f 1c 0a | 48 51 04 db 46 22 ad 6d 3c 60 e2 cb fb cc f5 7a | 6d 5e c9 24 ec d8 52 4f 96 5b 62 28 fb 9e eb fd | ac e9 f7 6f 4d 1a f9 74 24 29 e6 a2 80 a2 a7 c1 | b9 1c da 76 8c 9d 40 38 6a 26 13 d3 da 72 01 42 | b6 16 9c ca 09 1d 9b a9 90 70 fb 71 d1 ea b4 45 | 95 3b 5d b5 2c c1 00 ea bd 33 e0 43 00 b9 22 f4 | c9 60 90 dc b0 82 03 89 b0 c4 03 22 4b cf 7c 50 | 96 60 35 da 9c 4c f2 64 7d be b4 90 21 9b 54 ab | 96 09 b1 ee 1f 0d db 8e 22 4d 09 d6 43 6f c8 f1 | da 0c fd f4 69 33 b0 96 0f 1a 25 07 1d e6 1b 37 | 20 ff 37 b4 80 d9 a3 78 93 5a eb 5d 36 bd 9e 35 | 1e 0e a9 e8 13 eb 16 8f ff d5 26 ef c2 d5 47 45 | 91 9b e3 0e c5 08 1f 34 46 fe b0 3e f5 ce e1 c7 | 7c 47 c2 2d d2 f7 4c 06 62 a0 ae f2 e6 53 ff 73 | ee d6 e5 9b 28 8e f3 4d ef ad 40 41 9e 20 99 95 | 29 00 00 24 6d 5a fb f5 8a b7 85 2e cf 37 31 c5 | a8 e8 a7 22 a7 58 7e 34 8e 06 61 77 f0 7b 3b ce | d2 d0 22 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 b4 63 c8 b9 e3 2d fa 51 7c 79 27 | ca 3c 7a c2 0c 39 1a 2b 00 00 00 1c 00 00 40 05 | d9 fc ba 6b 91 d3 e0 ee c2 81 f3 1d 92 b2 24 2f | bf 44 6b 65 | state #267 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3800044e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ac2900 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac2900 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #267 | libevent_malloc: new ptr-libevent@0x7fb3540251c0 size 128 | #267 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49665.960412 | resume sending helper answer for #267 suppresed complete_v2_state_transition() and stole MD | #267 spent 0.32 milliseconds in resume sending helper answer | stop processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37404b5c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f db 88 0f fe 70 dc 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #267 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #267 | rejected packet: | 6f db 88 0f fe 70 dc 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0f fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #267: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0385 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abfd80 | handling event EVENT_RETRANSMIT for parent state #258 | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #258 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #258 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49666.028618; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001402 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc40 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #258 | libevent_malloc: new ptr-libevent@0x7fb37404b5c0 size 128 "road-eastnet-nonat-6" #258: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #258) | f2 0a ee 39 57 38 66 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 84 a5 7f 13 c6 d5 f4 de a1 59 9b a0 a0 80 f1 | 2f 8b 06 61 d1 0f de 44 77 49 a3 76 3f 11 11 d4 | ab 9b 3e 8d 7f a0 dc 2b 42 28 86 6f ac 5b b2 c2 | 4e 03 12 4c 72 0a d1 f2 0b 69 dc 3f 47 15 b3 66 | 0b ed 38 4d 89 9d b6 26 e5 44 a2 c8 18 05 1d ea | b9 5a 63 00 12 16 1b 15 c7 6e b8 4d 60 58 cc f0 | 35 6e d0 c1 0c 7a 3b 52 20 a4 ce 3e e5 c0 cc 56 | 65 b1 16 d6 43 c2 be ea b5 3f 07 6c 04 df 3c 27 | ca 5b 39 2e f2 76 09 d5 9a 31 cd f8 a0 9b 56 3c | 42 b3 87 82 b1 01 3e ef 89 15 5a 1d 00 90 84 19 | 5b 3d 7c ec 45 07 76 99 d3 04 39 db f5 94 ae 9f | 9a 24 93 91 e4 3f ad 43 d2 f2 74 b3 73 89 3f f4 | ac 15 1c 07 3d d0 3a 58 a4 bb b4 b2 b0 c3 65 db | c7 15 7a 2b b3 96 c2 16 55 b0 f5 86 dd bf d9 cf | 01 e1 ae 2e 78 f6 40 62 df cc 04 cf 9d bd 05 f9 | 5f ef 7a 44 a4 51 1c 3a 9b b4 7d 0d 94 46 3e a1 | 29 00 00 24 25 6d bb 73 f8 76 14 9e e8 94 3a 77 | d7 da 85 ed f6 46 fc 67 4e bb 29 38 0b 6c 4c 96 | c6 a5 48 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da 43 d0 a7 5e 1e 6a 3c 4c 0b bd b4 | fc 0a 0a d4 c2 f3 96 56 00 00 00 1c 00 00 40 05 | 20 be 8b da 4d a1 7e 30 5a c5 49 1f 20 a4 27 d3 | b3 85 6c 0e | libevent_free: release ptr-libevent@0x7fb348048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abfd80 | #258 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 0a ee 39 57 38 66 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #258 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #258 | rejected packet: | f2 0a ee 39 57 38 66 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #258: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #263 | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #263 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #263 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49666.06388; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500585 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abfd80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #263 | libevent_malloc: new ptr-libevent@0x7fb348048a10 size 128 "road-eastnet-nonat-11" #263: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #263) | ca df fa 2e cc 97 0a e0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 35 4e f5 b3 06 6a 55 0c f2 3d 49 3f 7e 31 f9 | fb cf 08 8d 9e dd 74 b4 ae 16 46 b6 d3 2d d7 81 | a5 4c 1e 3c 51 d2 5c 80 19 32 ae 15 f6 f1 83 90 | 89 74 e1 7a 65 6e b3 e6 37 19 f8 4c fe 75 98 41 | ac 4f 10 33 24 18 c2 b3 2c d3 58 72 8c df 81 d4 | 59 38 86 31 ec e0 a1 c4 d1 46 91 6e e8 5d e0 23 | 68 ef 05 cb cd 03 0b e1 cd 09 50 09 e9 ff 48 e3 | 8e ec a4 98 4e a5 2a 21 fb 32 20 aa 01 94 37 a3 | 4a a0 06 10 8c 55 c7 ef f3 db 52 f2 2f 93 75 5e | 89 12 79 f7 25 8b 5c 7e 90 0c 79 f1 46 9c 39 dc | 62 04 8a 23 65 3e da dc e9 e6 17 7c 76 c0 74 b4 | 38 86 ca da 50 ae fc f8 de 6d 6d ce d9 7f cd c0 | 85 4e f8 c9 04 41 9d 47 8a 73 e9 b5 4a cc 14 ad | 16 95 76 51 b8 09 27 ef 06 ca 3a bb ff 24 77 42 | cc fc 6e a1 e6 2b bd 33 6d f5 6a df 58 56 a8 4b | 96 18 0e 2a e9 ec 68 a9 e4 55 e7 47 98 67 01 11 | 29 00 00 24 1f 89 c4 e0 c8 b8 15 d0 01 8c 72 b7 | b9 51 02 35 29 86 83 18 da 61 92 fd 67 fb 67 7c | 20 e3 84 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 89 6c b7 69 49 4f f4 6b c0 cb 25 | 85 ed a6 01 12 ce 48 f3 00 00 00 1c 00 00 40 05 | 1c d7 2d 11 fa 53 cc ec b9 10 e5 08 27 61 79 62 | 96 79 33 55 | libevent_free: release ptr-libevent@0x7fb34002a900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #263 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca df fa 2e cc 97 0a e0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #263 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #263 | rejected packet: | ca df fa 2e cc 97 0a e0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #263: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae8980 | handling event EVENT_RETRANSMIT for parent state #16 | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #16 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #16 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49666.113396; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010962 exceeds limit? YES "road-eastnet-nonat-16" #16: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-16" #16: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #268 at 0x557d469e92c0 | State DB: adding IKEv2 state #268 in UNDEFINED | pstats #268 ikev2.ike started | Message ID: init #268: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #268: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #268; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-16" #268: initiating v2 parent SA to replace #16 | using existing local IKE proposals for connection road-eastnet-nonat-16 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 268 for state #268 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46afe580 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #268 | libevent_malloc: new ptr-libevent@0x7fb34002a900 size 128 | #268 spent 0.406 milliseconds in ikev2_parent_outI1() | RESET processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #16 ikev2.ike failed too-many-retransmits | pstats #16 ikev2.ike deleted too-many-retransmits | #16 spent 2.57 milliseconds in total | [RE]START processing: state #16 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in delete_state() at state.c:879) | crypto helper 19 resuming "road-eastnet-nonat-16" #16: deleting state (STATE_PARENT_I1) aged 64.013s and NOT sending notification | parent state #16: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #16 | crypto helper 19 starting work-order 268 for state #268 "road-eastnet-nonat-16" #16: deleting IKE SA for connection 'road-eastnet-nonat-16' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 268 | add revival: connection 'road-eastnet-nonat-16' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-16 | State DB: deleting IKEv2 state #16 in PARENT_I1 | parent state #16: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 268 time elapsed 0.003895 seconds | (#268) spent 3.84 milliseconds in crypto helper computing work-order 268: ikev2_outI1 KE (pcr) | stop processing: state #16 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3500407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae8980 | in statetime_stop() and could not find #16 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 19 sending results from work-order 268 for state #268 to event queue | scheduling resume sending helper answer for #268 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7fb36804b850 size 128 Initiating connection road-eastnet-nonat-16 which received a Delete/Notify but must remain up per local policy | crypto helper 19 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-16" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-16' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-16" | stop processing: connection "road-eastnet-nonat-16" (in initiate_a_connection() at initiate.c:349) | spent 0.201 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #268 | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 268 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #268 | **emit ISAKMP Message: | initiator cookie: | 52 eb eb 01 2e 07 ee 4b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-16 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f4 ef 40 5e f5 2a 5e 5a b8 76 94 37 37 12 d2 32 | ikev2 g^x 87 80 98 31 81 5e ec c8 c0 10 ea 13 f1 32 fd 22 | ikev2 g^x 5f da f7 72 2a 67 06 fa cf 7f d5 1a c1 ae f1 92 | ikev2 g^x 7b 53 ad 16 00 b6 90 61 58 94 dd 7e 4a 9f 32 98 | ikev2 g^x a2 2e 9b 12 92 70 47 ac 39 ac 02 84 c9 35 b9 57 | ikev2 g^x 66 95 1c 62 b4 f0 47 38 3f ec 43 4d cf 73 e8 45 | ikev2 g^x 9f d1 15 db ca 5d 1c f1 70 f1 97 a1 2b 7d 26 5e | ikev2 g^x 27 c8 08 1e 0d d7 2a 7e 36 db 89 18 87 f0 43 11 | ikev2 g^x e3 cf c8 31 7d 0e ae 6a 97 23 05 40 5d 11 ea 66 | ikev2 g^x a1 79 e8 97 cf 5c 5b 3a eb e7 1e c8 25 eb 2f 83 | ikev2 g^x 00 66 8b 3e 05 72 c5 6e 34 08 88 16 97 1a 13 a9 | ikev2 g^x db 9b 7b 48 0f 92 cf 65 2a 3e cf 88 08 c6 cf 54 | ikev2 g^x d9 1b 5a 78 a6 05 e8 73 bf 3a d4 a6 65 47 24 50 | ikev2 g^x 20 0c 6c 69 e0 29 4a aa 5a 89 69 c7 3c 4d 82 76 | ikev2 g^x 81 c9 87 1d 60 f0 a9 b6 29 2b 06 98 6d a9 24 c8 | ikev2 g^x 1d 5c 2b 40 de 5d 36 a1 45 5d 5e 8a 48 e6 0b 26 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f0 fa c9 ee f6 f5 97 a2 44 c5 ea 10 5b 58 db 61 | IKEv2 nonce 17 58 ca 3c df 15 b8 1a de 90 ef 49 16 34 e4 8c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 52 eb eb 01 2e 07 ee 4b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 10 | natd_hash: port= 01 f4 | natd_hash: hash= 64 2c 2a b2 6d be c9 76 69 fe e4 41 f1 72 73 59 | natd_hash: hash= 2e 97 3f f1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 64 2c 2a b2 6d be c9 76 69 fe e4 41 f1 72 73 59 | Notify data 2e 97 3f f1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 52 eb eb 01 2e 07 ee 4b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 31 f5 db e1 45 48 68 14 42 b0 53 d9 a4 6c d5 a0 | natd_hash: hash= 03 9b fe 80 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 31 f5 db e1 45 48 68 14 42 b0 53 d9 a4 6c d5 a0 | Notify data 03 9b fe 80 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #268 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #268: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #268 to 4294967295 after switching state | Message ID: IKE #268 skipping update_recv as MD is fake | Message ID: sent #268 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-16" #268: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.16:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #268) | 52 eb eb 01 2e 07 ee 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f4 ef 40 5e f5 2a 5e 5a b8 76 94 37 37 12 d2 32 | 87 80 98 31 81 5e ec c8 c0 10 ea 13 f1 32 fd 22 | 5f da f7 72 2a 67 06 fa cf 7f d5 1a c1 ae f1 92 | 7b 53 ad 16 00 b6 90 61 58 94 dd 7e 4a 9f 32 98 | a2 2e 9b 12 92 70 47 ac 39 ac 02 84 c9 35 b9 57 | 66 95 1c 62 b4 f0 47 38 3f ec 43 4d cf 73 e8 45 | 9f d1 15 db ca 5d 1c f1 70 f1 97 a1 2b 7d 26 5e | 27 c8 08 1e 0d d7 2a 7e 36 db 89 18 87 f0 43 11 | e3 cf c8 31 7d 0e ae 6a 97 23 05 40 5d 11 ea 66 | a1 79 e8 97 cf 5c 5b 3a eb e7 1e c8 25 eb 2f 83 | 00 66 8b 3e 05 72 c5 6e 34 08 88 16 97 1a 13 a9 | db 9b 7b 48 0f 92 cf 65 2a 3e cf 88 08 c6 cf 54 | d9 1b 5a 78 a6 05 e8 73 bf 3a d4 a6 65 47 24 50 | 20 0c 6c 69 e0 29 4a aa 5a 89 69 c7 3c 4d 82 76 | 81 c9 87 1d 60 f0 a9 b6 29 2b 06 98 6d a9 24 c8 | 1d 5c 2b 40 de 5d 36 a1 45 5d 5e 8a 48 e6 0b 26 | 29 00 00 24 f0 fa c9 ee f6 f5 97 a2 44 c5 ea 10 | 5b 58 db 61 17 58 ca 3c df 15 b8 1a de 90 ef 49 | 16 34 e4 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 2c 2a b2 6d be c9 76 69 fe e4 41 | f1 72 73 59 2e 97 3f f1 00 00 00 1c 00 00 40 05 | 31 f5 db e1 45 48 68 14 42 b0 53 d9 a4 6c d5 a0 | 03 9b fe 80 | state #268 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34002a900 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46afe580 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #268 | libevent_malloc: new ptr-libevent@0x7fb3500407f0 size 128 | #268 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49666.120279 | resume sending helper answer for #268 suppresed complete_v2_state_transition() and stole MD | #268 spent 1.56 milliseconds in resume sending helper answer | stop processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36804b850 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 eb eb 01 2e 07 ee 4b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #268 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #268 | rejected packet: | 52 eb eb 01 2e 07 ee 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 10 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #268: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.196 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #259 | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #259 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #259 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49666.130864; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001707 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae8980 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #259 | libevent_malloc: new ptr-libevent@0x7fb36804b850 size 128 "road-eastnet-nonat-7" #259: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #259) | 69 c4 5c 94 f6 f0 24 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe b3 f9 68 3e 85 57 5d 74 26 b7 37 f5 c1 1c c8 | a9 30 6a e1 51 a4 0f d5 ca 35 4b e9 d0 ec d0 ea | 11 06 1a ad 0a 7c 08 a4 ce 70 10 ef b2 c9 82 43 | 06 fb 99 b0 99 d2 5d a2 87 5b cd a0 9b 7d 7a a3 | 30 f9 78 c0 d7 43 6f f3 cc 53 5a 43 25 d8 61 04 | 58 03 b6 71 c6 21 93 59 b3 7c 3f 84 50 6d 48 95 | ef b8 dc 96 69 dc 88 98 10 47 21 0a 3d 72 57 34 | e5 bd d9 b3 4a 55 2e bb 34 64 f1 be 1c 6f f2 7e | c5 4b 83 c8 2c d8 e9 41 02 95 ff 83 96 69 c2 56 | 98 1b 20 30 7a bc 8b ab ee 27 a0 89 22 93 25 c7 | d2 f1 b0 c8 12 06 e6 8d 9a d7 bd fc 06 14 66 23 | 65 ae e6 9e 37 44 0c f0 0e 0e 78 09 b8 a3 32 c3 | c6 25 1b 97 0b 77 db 90 b8 16 58 5f 15 d2 40 fe | 1c d0 5e e3 88 05 3b ef bc 19 2c a9 73 97 03 9a | 26 fc 47 8b 95 24 fe d4 39 f2 65 5a 9f ee 0c cf | 1a 9b 03 45 52 42 61 4d b6 e7 aa 2c 0c 37 c0 61 | 29 00 00 24 c4 2f 3e 0e 76 3e 59 e7 3e 5c 53 28 | 43 02 fc a9 7a 2b 47 13 2c c2 eb 53 3e b5 40 d1 | 94 dc e6 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 85 30 eb 64 9e 84 09 e0 70 76 01 | 65 fa d3 ac 84 56 a3 b4 00 00 00 1c 00 00 40 05 | 64 83 da b1 99 b6 d9 28 72 08 34 2c 77 b4 36 a0 | 74 09 78 83 | libevent_free: release ptr-libevent@0x7fb3840060f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | #259 spent 0.676 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 c4 5c 94 f6 f0 24 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #259 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #259 | rejected packet: | 69 c4 5c 94 f6 f0 24 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #259: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.322 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #264 | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #264 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #264 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49666.178163; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501058 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #264 | libevent_malloc: new ptr-libevent@0x7fb3840060f0 size 128 "road-eastnet-nonat-12" #264: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #264) | 8e fe 0e 1c bf 0e 6b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 85 0f 2d e4 cd 04 0b 17 96 14 35 20 98 98 7c | 43 94 0e c0 cb 2a ed cd 26 f3 f4 fd 71 0a b3 35 | 8d c8 ce 92 67 ce 39 72 cf 1d 58 73 86 98 2b a0 | 6f 55 7b 13 d0 1f 62 3b 93 93 85 3e 36 cd 86 27 | b4 c1 9a bd c4 db 39 19 44 28 ec a5 e9 1c 59 a2 | a7 fc b2 f8 f1 72 da 9c 2a b8 36 d3 61 88 51 dc | 4d 20 86 6a 14 25 ef 10 b3 1b 09 52 6d 00 f9 db | 75 0a 80 38 3b 18 7c 9c fd c8 c9 4e b1 e2 84 70 | a4 dd 3f 85 ce 8c cb 20 5c 6a 42 21 65 c4 fd 15 | 7a 47 92 65 67 69 9e be f3 7a e9 66 c9 56 bd d2 | 3c 4a 76 68 b7 3f ce 1d 64 64 a7 2c 71 37 b4 c4 | 53 38 1c 79 97 95 2a 69 1c 36 40 41 3d 05 9c ba | 4d 38 e3 a6 a7 6c e9 b1 59 1a 9f ab 80 0a d9 8e | ac 39 5a 0c e3 b3 9d c1 3d 5d 32 c8 42 00 f8 4c | 3a fb 9c 36 7f 16 43 4c 95 29 48 05 f2 b7 02 75 | 54 25 c2 90 a5 04 3b fa ca 77 9e 55 e7 39 19 34 | 29 00 00 24 0b 7d f5 1c 67 a7 5b 6f d5 5f 23 1c | de ee af 0f ed f9 a1 fa b5 71 92 a8 5a 39 25 fa | 7d a0 ff 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 4e 74 d9 6a 11 61 e7 2b 9e b3 5d | fa c6 10 84 a3 ff e4 72 00 00 00 1c 00 00 40 05 | 61 d2 3a 09 fc 3f e9 c0 9a fa 15 52 e0 d4 39 3d | 0f 2b c4 10 | libevent_free: release ptr-libevent@0x7fb3480300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #264 spent 0.309 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e fe 0e 1c bf 0e 6b 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #264 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #264 | rejected packet: | 8e fe 0e 1c bf 0e 6b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #264: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.137 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11640 | handling event EVENT_RETRANSMIT for parent state #260 | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #260 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #260 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49666.23376; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001947 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #260 | libevent_malloc: new ptr-libevent@0x7fb3480300e0 size 128 "road-eastnet-nonat-8" #260: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #260) | a8 de 56 29 b7 d6 fa 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 e3 e7 0b 5e 0a a2 78 28 90 d4 10 18 db 3b 08 | b2 da 89 a3 10 0a cf 73 47 c7 8b 62 54 ef 17 0b | 52 d6 fe 33 62 21 4b 61 30 79 d1 82 82 85 ea 34 | 5e 16 ec db dd eb 97 56 18 30 74 8c 1f 6e 05 89 | 21 09 2b 1f b9 bc b7 45 38 93 12 7a 5d 44 53 c4 | 90 d3 d5 13 c2 0f fd 6b 37 3e 25 38 05 ed f0 2b | cb 0f 13 a8 c7 9b fe 60 00 1a 65 af 42 72 d4 bd | f1 07 94 0e 72 26 91 81 83 ee ff ef 41 c2 92 80 | a0 7f b9 6c 1f d2 e5 4b 34 fe 68 33 41 4d c0 3b | fb 7e 82 89 76 4f ab b4 81 d9 20 1a 79 fa de 75 | 7d a8 cd 19 c4 08 7c dc 7d 50 74 8e 78 b5 b3 64 | 8b 8f bd fd e8 f9 24 be 78 a0 45 9f 10 40 3e e1 | 49 ba 58 e8 63 d1 38 81 0c 79 61 75 c1 98 81 43 | 9b e0 a1 0d fc da 35 4b 0e a9 e1 35 63 d5 73 64 | db 23 3e 1b a9 3a 4e c0 e5 7f 6a ab 90 f3 cd 49 | 1b bf e5 c9 ab 56 60 25 6c 22 94 4d da ff b4 bb | 29 00 00 24 2b a8 af 62 73 94 e5 0a 7f 70 bf f7 | 73 9f 36 a9 cb 1b e2 09 0a 24 49 93 58 be a0 29 | 94 31 83 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 87 5d ef 8f 65 c8 58 d0 3b 6f e5 | c6 10 af 28 1a 1c e2 ed 00 00 00 1c 00 00 40 05 | 7a 28 e6 3f f8 c3 d1 0c 25 ff 6a 7c a9 a5 77 33 | 24 34 82 26 | libevent_free: release ptr-libevent@0x7fb344048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11640 | #260 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 de 56 29 b7 d6 fa 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #260 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #260 | rejected packet: | a8 de 56 29 b7 d6 fa 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #260: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0474 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c7c0 | handling event EVENT_RETRANSMIT for parent state #17 | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #17 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #17 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49666.255068; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.015424 exceeds limit? YES "road-eastnet-nonat-17" #17: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-17" #17: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #269 at 0x557d469ea880 | State DB: adding IKEv2 state #269 in UNDEFINED | pstats #269 ikev2.ike started | Message ID: init #269: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #269: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #269; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-17" #269: initiating v2 parent SA to replace #17 | using existing local IKE proposals for connection road-eastnet-nonat-17 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 269 for state #269 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b11640 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #269 | libevent_malloc: new ptr-libevent@0x7fb344048a10 size 128 | #269 spent 0.0932 milliseconds in ikev2_parent_outI1() | RESET processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #17 ikev2.ike failed too-many-retransmits | pstats #17 ikev2.ike deleted too-many-retransmits | #17 spent 2.81 milliseconds in total | [RE]START processing: state #17 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-17" #17: deleting state (STATE_PARENT_I1) aged 64.027s and NOT sending notification | parent state #17: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #17 "road-eastnet-nonat-17" #17: deleting IKE SA for connection 'road-eastnet-nonat-17' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-17' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 6 resuming | crypto helper 6 starting work-order 269 for state #269 | in connection_discard for connection road-eastnet-nonat-17 | State DB: deleting IKEv2 state #17 in PARENT_I1 | parent state #17: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 269 | stop processing: state #17 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | in statetime_stop() and could not find #17 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-17 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-17" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-17' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-17" | stop processing: connection "road-eastnet-nonat-17" (in initiate_a_connection() at initiate.c:349) | spent 0.0988 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 269 time elapsed 0.000846 seconds | (#269) spent 0.85 milliseconds in crypto helper computing work-order 269: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 269 for state #269 to event queue | scheduling resume sending helper answer for #269 | libevent_malloc: new ptr-libevent@0x7fb36c04b850 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #269 | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 269 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #269 | **emit ISAKMP Message: | initiator cookie: | 42 2b 66 77 50 7b f1 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-17 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f1 1a b0 80 05 00 53 b8 88 37 a8 0d e8 4e c0 81 | ikev2 g^x 57 b8 c1 99 be 60 6c 42 36 80 aa e8 7e 86 e2 1b | ikev2 g^x dc 47 d3 0f cf c7 46 a8 c8 47 ce ff 99 14 e6 14 | ikev2 g^x 37 44 15 18 25 7b d6 ca f2 0f 00 2d 17 01 df 08 | ikev2 g^x ac fe e9 d3 2b 32 d0 3c 75 39 46 f3 2a a6 98 c3 | ikev2 g^x 1d b7 82 4a b4 92 84 4b b3 2d b3 71 d7 06 52 b9 | ikev2 g^x 9c eb 15 89 b5 c8 16 c5 e1 29 05 f5 12 64 42 f4 | ikev2 g^x a0 b3 32 62 fe 43 4c 1c 4e 1e 53 37 a8 e8 52 23 | ikev2 g^x 53 0e 82 46 38 b3 95 ea 7e 47 ae 7b 38 c7 ec ac | ikev2 g^x 8c 74 78 5b e3 a1 ba 65 7c 63 27 19 55 d3 7e f5 | ikev2 g^x 2f 36 c3 b3 a1 0f 84 2a 85 17 e4 09 e8 35 c4 82 | ikev2 g^x 08 59 25 c5 6f 5d dc d6 ee 2f dc 6b 0a a2 5d f8 | ikev2 g^x d2 8d a0 b1 da 71 a0 b2 68 ba c7 d1 ba 7e e6 81 | ikev2 g^x d8 e3 b3 84 de 3a 47 64 3d 04 00 a0 60 be 1c 4f | ikev2 g^x 52 66 df 3f 77 fe 53 0c dd cd ed 75 7e 76 02 77 | ikev2 g^x cc 4e de 99 d4 98 4e 1e 30 09 c0 9e cb c6 a1 c0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b8 ee 66 5c df cb 58 d0 1b a4 60 c3 1b 92 52 a8 | IKEv2 nonce 29 57 57 d2 02 37 76 e3 2d 2f 31 c7 4b 37 7d fa | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 42 2b 66 77 50 7b f1 13 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 11 | natd_hash: port= 01 f4 | natd_hash: hash= 16 73 36 11 68 b5 eb 4b 5f e8 3f ce 5b fc b9 99 | natd_hash: hash= cc 0c 05 c7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 16 73 36 11 68 b5 eb 4b 5f e8 3f ce 5b fc b9 99 | Notify data cc 0c 05 c7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 42 2b 66 77 50 7b f1 13 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7f dd 18 35 5d 55 ec 33 76 f4 f0 dc 77 e6 e3 3b | natd_hash: hash= 97 a2 2b d9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7f dd 18 35 5d 55 ec 33 76 f4 f0 dc 77 e6 e3 3b | Notify data 97 a2 2b d9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #269 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #269: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #269 to 4294967295 after switching state | Message ID: IKE #269 skipping update_recv as MD is fake | Message ID: sent #269 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-17" #269: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.17:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #269) | 42 2b 66 77 50 7b f1 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 1a b0 80 05 00 53 b8 88 37 a8 0d e8 4e c0 81 | 57 b8 c1 99 be 60 6c 42 36 80 aa e8 7e 86 e2 1b | dc 47 d3 0f cf c7 46 a8 c8 47 ce ff 99 14 e6 14 | 37 44 15 18 25 7b d6 ca f2 0f 00 2d 17 01 df 08 | ac fe e9 d3 2b 32 d0 3c 75 39 46 f3 2a a6 98 c3 | 1d b7 82 4a b4 92 84 4b b3 2d b3 71 d7 06 52 b9 | 9c eb 15 89 b5 c8 16 c5 e1 29 05 f5 12 64 42 f4 | a0 b3 32 62 fe 43 4c 1c 4e 1e 53 37 a8 e8 52 23 | 53 0e 82 46 38 b3 95 ea 7e 47 ae 7b 38 c7 ec ac | 8c 74 78 5b e3 a1 ba 65 7c 63 27 19 55 d3 7e f5 | 2f 36 c3 b3 a1 0f 84 2a 85 17 e4 09 e8 35 c4 82 | 08 59 25 c5 6f 5d dc d6 ee 2f dc 6b 0a a2 5d f8 | d2 8d a0 b1 da 71 a0 b2 68 ba c7 d1 ba 7e e6 81 | d8 e3 b3 84 de 3a 47 64 3d 04 00 a0 60 be 1c 4f | 52 66 df 3f 77 fe 53 0c dd cd ed 75 7e 76 02 77 | cc 4e de 99 d4 98 4e 1e 30 09 c0 9e cb c6 a1 c0 | 29 00 00 24 b8 ee 66 5c df cb 58 d0 1b a4 60 c3 | 1b 92 52 a8 29 57 57 d2 02 37 76 e3 2d 2f 31 c7 | 4b 37 7d fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 73 36 11 68 b5 eb 4b 5f e8 3f ce | 5b fc b9 99 cc 0c 05 c7 00 00 00 1c 00 00 40 05 | 7f dd 18 35 5d 55 ec 33 76 f4 f0 dc 77 e6 e3 3b | 97 a2 2b d9 | state #269 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344048a10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b11640 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11640 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #269 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 | #269 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49666.256648 | resume sending helper answer for #269 suppresed complete_v2_state_transition() and stole MD | #269 spent 0.425 milliseconds in resume sending helper answer | stop processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c04b850 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 2b 66 77 50 7b f1 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #269 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #269 | rejected packet: | 42 2b 66 77 50 7b f1 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 11 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #269: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0592 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47e90 | handling event EVENT_RETRANSMIT for parent state #265 | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #265 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #265 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49666.282869; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500563 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #265 | libevent_malloc: new ptr-libevent@0x7fb36c04b850 size 128 "road-eastnet-nonat-13" #265: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #265) | 5e d6 2a e3 fc d6 88 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 2e 3a 15 7c f9 00 41 72 02 12 64 4c 6b 73 52 | bb 8d bc 96 e4 69 5a 27 ff 16 12 40 6d b3 e6 7d | 28 6d d8 d8 46 ae 55 b1 20 60 d0 f0 2c d7 5a 32 | f1 e8 5b 54 2b 16 ec 87 57 a5 e1 c1 08 80 a6 16 | a0 4f 0f 3b 62 e5 8c cb aa 65 e4 d5 87 37 d0 85 | 34 de df b2 ac 15 11 24 c5 c0 e2 ba 8e bf 6a 38 | 92 5b d1 dd 84 fb 29 ef cf 37 36 ed 82 a0 ef 7a | 79 c3 2b da 2f 96 ad 2b 46 50 67 74 44 c2 8f 22 | 65 99 b1 3a 1c fd 70 cc 25 39 6a 77 0a f9 8c f3 | 33 34 af 74 f2 1a 52 31 29 6f 53 43 ce 77 a1 c0 | 4e ad 32 24 24 86 73 ad 16 2d 19 8b 36 54 d6 8f | 96 95 e4 0b 0b df d1 24 22 12 35 73 ac 81 e7 c1 | af 88 20 ae e1 fa 41 09 f0 f6 2b 19 42 79 9e 92 | 6a 95 0b 69 19 21 ee ba 94 35 b0 07 aa 13 f3 40 | 4f 27 f7 e8 7d ea ae b3 14 bf 0c b2 8b a5 e7 1f | 2e 4a 4a 5e 40 8d d3 1a 30 c1 1d 13 0d 61 d3 15 | 29 00 00 24 d2 1b cb fe 42 33 59 cd 17 75 9b cc | f4 b0 0c 18 45 31 71 9f e7 2e 80 d7 48 7b 93 7c | d8 b3 ab 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 77 56 b7 16 48 fa 98 9b c1 2d 60 | a6 6c bc 07 2c 3a ef 47 00 00 00 1c 00 00 40 05 | 5a c9 c6 01 25 8a 31 37 7b d0 f2 6b d1 02 08 77 | 0a b6 4e aa | libevent_free: release ptr-libevent@0x7fb350046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47e90 | #265 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e d6 2a e3 fc d6 88 0b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #265 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #265 | rejected packet: | 5e d6 2a e3 fc d6 88 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #265: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11680 | handling event EVENT_RETRANSMIT for parent state #253 | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #253 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #253 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49666.28622; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002896 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47e90 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #253 | libevent_malloc: new ptr-libevent@0x7fb350046040 size 128 "road-eastnet-nonat-1" #253: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #253) | 54 6a b3 63 15 2d 54 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 a1 ec de cb a0 5d c1 1a bd 04 af 6b c8 65 41 | 5e 52 49 f5 a0 69 ab 28 22 ed fc 77 d0 a0 c1 09 | 24 c3 68 ac f8 52 b1 01 40 3f 24 70 5d fa bb e6 | 18 17 b8 60 62 5c 25 b7 91 1b 32 be a8 33 c7 03 | d3 9b 4d ca 93 cb 69 27 56 25 f1 0e f0 75 9b f1 | 6f a5 25 09 c0 56 aa ed be 25 e6 7b 20 95 b5 00 | 7f 1a 1b 09 1c 04 5e 80 38 55 80 90 08 7b dd ce | 4f 11 1a be 0d 38 69 ab e8 df ca 75 0d 3f c0 1b | 66 36 7e b8 6f b9 34 13 07 77 35 27 1b 68 f3 4e | 59 d6 7e de a5 ba 53 3b 79 89 bf fd cf 6b c9 05 | 32 48 47 96 e8 02 b8 8c 85 5e 07 cf ed 73 28 31 | 7f b0 4a 57 00 7a 0b 42 b6 34 c6 f8 0c c3 11 82 | b9 52 df 83 77 94 ac c4 6e d0 af 9f 9c 46 4a 9d | 6a 59 79 91 e9 aa 6f 46 f9 bf 64 56 57 97 6b ca | 02 fc e7 a2 5d cb d3 e6 be 89 40 eb 8b 5f bf bb | ea e1 78 af e4 9a d6 bc 8f 45 8e 59 45 6b cc 3f | 29 00 00 24 5b 81 82 6a 34 1f 0c 89 b3 0b 07 6c | d0 e3 bd fa b4 1c af f3 18 56 94 10 92 25 11 f0 | 48 f8 d2 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 79 2b 18 11 0c 23 de f4 d0 de e0 | 77 97 22 a5 08 48 2f ff 00 00 00 1c 00 00 40 05 | c8 d4 47 db f6 e8 46 67 19 87 ae df 18 10 c7 ab | 9f a6 71 f9 | libevent_free: release ptr-libevent@0x7fb338048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11680 | #253 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 6a b3 63 15 2d 54 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #253 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #253 | rejected packet: | 54 6a b3 63 15 2d 54 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #253: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.058 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acab40 | handling event EVENT_RETRANSMIT for parent state #261 | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #261 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #261 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49666.33754; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001752 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11680 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #261 | libevent_malloc: new ptr-libevent@0x7fb338048a10 size 128 "road-eastnet-nonat-9" #261: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #261) | 8b 59 1f 5e 29 ec 79 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 16 bb 69 7b 8c de a9 f0 aa 27 22 0c 50 1e 2b | c0 76 0c 79 99 31 2f f3 35 0b 93 05 6b 25 af d5 | 38 8a 63 51 f1 c7 93 6d 58 cf aa 10 dd 75 1f c8 | 55 42 4b ca 64 4b 8f 25 43 c0 98 a7 58 2f fe 43 | a0 fc e9 fe 8a 4f d9 62 8e db b8 54 42 5d 72 29 | 3d 08 a8 8c 4e d1 f1 b8 76 cf b0 d0 a2 dc ae 18 | 1b 5a 75 da 49 ca 9e c2 09 0d fb 74 50 88 ed a4 | d6 99 da c7 fb 22 1c 94 60 ac 50 76 4c a1 38 f1 | 43 ce 44 aa e7 39 3c 86 9e e1 41 54 48 c3 cb 31 | 48 d9 d1 19 bc cb 0b cc 7d 40 bf 96 af 1e df fb | 0f 62 79 6b f0 8e 05 4f 2e a0 3c cd 46 16 0c 86 | 49 e9 a6 e2 c2 86 c5 8e b2 14 0a be c1 f8 73 ee | bb d0 d9 50 52 32 c3 fa f2 3b b2 ca cc 8c 24 54 | 79 d5 c7 d3 1b 32 b7 28 de dd a1 c3 34 b8 54 c4 | ba 19 90 3e 1a d6 84 33 38 8c c1 45 94 fb 96 9e | 19 4c cd 4d d5 73 7e e1 8a 56 34 ce ca da 7f ec | 29 00 00 24 09 67 1c 9d 6c 7a 1d eb 24 78 5e 1f | a5 24 7e 35 ac a5 c4 f9 a0 f3 f8 63 91 47 e2 76 | a1 4d 73 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 76 e0 4e 77 d9 cf 89 73 cb 13 92 | b0 28 c4 2a 76 4e 4e 20 00 00 00 1c 00 00 40 05 | 7b 1f d5 2f e3 dc 02 0a cf 5f 34 da 40 53 6d 9d | 9b 7e 60 b7 | libevent_free: release ptr-libevent@0x7fb354048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab40 | #261 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 59 1f 5e 29 ec 79 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #261 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #261 | rejected packet: | 8b 59 1f 5e 29 ec 79 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #261: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12bc0 | handling event EVENT_RETRANSMIT for parent state #18 | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #18 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #18 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49666.338881; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009714 exceeds limit? YES "road-eastnet-nonat-18" #18: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-18" #18: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #270 at 0x557d469ebe40 | State DB: adding IKEv2 state #270 in UNDEFINED | pstats #270 ikev2.ike started | Message ID: init #270: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #270: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #270; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-18" #270: initiating v2 parent SA to replace #18 | using existing local IKE proposals for connection road-eastnet-nonat-18 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 270 for state #270 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46acab40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #270 | libevent_malloc: new ptr-libevent@0x7fb354048a10 size 128 | #270 spent 0.0826 milliseconds in ikev2_parent_outI1() | crypto helper 11 resuming | RESET processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 starting work-order 270 for state #270 | start processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 270 | pstats #18 ikev2.ike failed too-many-retransmits | pstats #18 ikev2.ike deleted too-many-retransmits | #18 spent 2.59 milliseconds in total | [RE]START processing: state #18 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-18" #18: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #18: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #18 "road-eastnet-nonat-18" #18: deleting IKE SA for connection 'road-eastnet-nonat-18' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-18' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-18 | State DB: deleting IKEv2 state #18 in PARENT_I1 | parent state #18: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #18 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 270 time elapsed 0.000684 seconds | libevent_free: release ptr-libevent@0x7fb388043300 | (#270) spent 0.691 milliseconds in crypto helper computing work-order 270: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12bc0 | in statetime_stop() and could not find #18 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 11 sending results from work-order 270 for state #270 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #270 Initiating connection road-eastnet-nonat-18 which received a Delete/Notify but must remain up per local policy | libevent_malloc: new ptr-libevent@0x7fb36004b850 size 128 | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 11 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-18" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-18' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-18" | stop processing: connection "road-eastnet-nonat-18" (in initiate_a_connection() at initiate.c:349) | spent 0.0681 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #270 | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 270 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #270 | **emit ISAKMP Message: | initiator cookie: | 98 aa bb 79 2f f5 b5 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-18 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8f 24 f6 25 5f fa 71 0f 39 53 f1 8f 92 58 3c 59 | ikev2 g^x 8e c2 2e 28 53 ea 0d 58 1c b1 76 25 4f 77 d3 40 | ikev2 g^x 6f 45 9c 78 a8 01 99 46 d7 6e 57 ac 51 cd 32 20 | ikev2 g^x 87 d7 3c c9 3f 5e e0 a6 46 8c bc bb d2 2a 3a 19 | ikev2 g^x 0d 30 25 7b 8c f0 eb f6 7f 48 bd 51 fc 7c 03 2d | ikev2 g^x 42 fb c9 54 0b f3 df 3f 56 f4 9e 74 f1 22 86 89 | ikev2 g^x d4 fe 7d ea 34 26 2a 49 b7 c2 c2 c5 bf 06 dd 36 | ikev2 g^x be de 23 aa bf 61 22 5f 62 e1 04 e4 81 81 b4 1a | ikev2 g^x 94 68 45 c7 43 f9 2b f7 9c c7 da c1 6c f9 e0 19 | ikev2 g^x 3d 12 26 17 de 58 8c 74 5a 7c d1 ae 99 12 b1 cc | ikev2 g^x 7c fd 41 5e df 12 73 ff fe 24 d4 ac e3 4a 14 3c | ikev2 g^x a7 57 18 de 1a f8 e3 60 98 66 b7 e2 de d9 ef 30 | ikev2 g^x 7b 0c d1 7a 6d 0b f9 31 66 84 79 8b 8b 50 77 51 | ikev2 g^x 23 58 84 77 80 ea dc 70 95 5b e4 15 8d 98 42 aa | ikev2 g^x fa 93 a8 7a d7 2a 0d 51 24 2f ee fa 92 74 05 47 | ikev2 g^x d0 38 43 8c 6f cb 3f 1f 04 0b e8 57 ca ea 33 7e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce dd 5a f6 1e bd fb cd ef 92 3b 56 16 bd 57 a2 0f | IKEv2 nonce d1 d5 f5 02 97 f4 10 bb 15 09 d8 8e c9 9b 97 60 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 98 aa bb 79 2f f5 b5 12 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 12 | natd_hash: port= 01 f4 | natd_hash: hash= 80 15 18 7d df ec 83 30 72 5b 68 c2 08 e3 c3 a4 | natd_hash: hash= d5 a2 af 25 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 80 15 18 7d df ec 83 30 72 5b 68 c2 08 e3 c3 a4 | Notify data d5 a2 af 25 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 98 aa bb 79 2f f5 b5 12 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= b3 09 33 34 02 38 11 d4 03 64 9d 03 c3 5d 2b 94 | natd_hash: hash= 2e 30 63 d3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b3 09 33 34 02 38 11 d4 03 64 9d 03 c3 5d 2b 94 | Notify data 2e 30 63 d3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #270 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #270: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #270 to 4294967295 after switching state | Message ID: IKE #270 skipping update_recv as MD is fake | Message ID: sent #270 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-18" #270: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.18:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #270) | 98 aa bb 79 2f f5 b5 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 24 f6 25 5f fa 71 0f 39 53 f1 8f 92 58 3c 59 | 8e c2 2e 28 53 ea 0d 58 1c b1 76 25 4f 77 d3 40 | 6f 45 9c 78 a8 01 99 46 d7 6e 57 ac 51 cd 32 20 | 87 d7 3c c9 3f 5e e0 a6 46 8c bc bb d2 2a 3a 19 | 0d 30 25 7b 8c f0 eb f6 7f 48 bd 51 fc 7c 03 2d | 42 fb c9 54 0b f3 df 3f 56 f4 9e 74 f1 22 86 89 | d4 fe 7d ea 34 26 2a 49 b7 c2 c2 c5 bf 06 dd 36 | be de 23 aa bf 61 22 5f 62 e1 04 e4 81 81 b4 1a | 94 68 45 c7 43 f9 2b f7 9c c7 da c1 6c f9 e0 19 | 3d 12 26 17 de 58 8c 74 5a 7c d1 ae 99 12 b1 cc | 7c fd 41 5e df 12 73 ff fe 24 d4 ac e3 4a 14 3c | a7 57 18 de 1a f8 e3 60 98 66 b7 e2 de d9 ef 30 | 7b 0c d1 7a 6d 0b f9 31 66 84 79 8b 8b 50 77 51 | 23 58 84 77 80 ea dc 70 95 5b e4 15 8d 98 42 aa | fa 93 a8 7a d7 2a 0d 51 24 2f ee fa 92 74 05 47 | d0 38 43 8c 6f cb 3f 1f 04 0b e8 57 ca ea 33 7e | 29 00 00 24 dd 5a f6 1e bd fb cd ef 92 3b 56 16 | bd 57 a2 0f d1 d5 f5 02 97 f4 10 bb 15 09 d8 8e | c9 9b 97 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 15 18 7d df ec 83 30 72 5b 68 c2 | 08 e3 c3 a4 d5 a2 af 25 00 00 00 1c 00 00 40 05 | b3 09 33 34 02 38 11 d4 03 64 9d 03 c3 5d 2b 94 | 2e 30 63 d3 | state #270 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb354048a10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46acab40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #270 | libevent_malloc: new ptr-libevent@0x7fb388043300 size 128 | #270 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49666.34029 | resume sending helper answer for #270 suppresed complete_v2_state_transition() and stole MD | #270 spent 0.453 milliseconds in resume sending helper answer | stop processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36004b850 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 aa bb 79 2f f5 b5 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #270 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #270 | rejected packet: | 98 aa bb 79 2f f5 b5 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 12 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #270: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0579 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #266 | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #266 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #266 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49666.367493; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499929 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12bc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #266 | libevent_malloc: new ptr-libevent@0x7fb36004b850 size 128 "road-eastnet-nonat-14" #266: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #266) | 6b cc e0 12 8b aa 91 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 c7 f6 72 9c a5 df d1 37 bd 8c a8 3d 12 ac f8 | 22 21 09 d5 08 f4 92 dd f1 6b 1f 81 7b 7f 3b 9d | 10 fa 77 c3 74 a7 03 4d 17 3b 47 94 f2 0e 9e 20 | ba c3 57 67 86 fd d2 e5 0d 53 bc 0e c2 cf a4 3a | ca 89 10 10 9a 9f 52 0e c5 60 b3 38 be 05 37 b4 | a3 6b 5d d8 04 66 d6 b5 93 93 8f 47 58 63 40 52 | 1b f8 2c cb 93 59 07 2b ad c7 18 ca a5 e9 24 fa | 41 de 1f 43 7f 1f 27 30 49 67 c7 c8 16 fd 61 a4 | 21 e9 05 98 46 f1 50 b6 8e 31 ad a9 2c 10 19 f5 | b9 ef 6b d3 e7 07 06 8e bf 18 8b 0a 77 f5 44 4b | 1c 00 21 d9 dc b3 66 3f a9 4b df cd cd bd 25 d2 | 2a cd 52 ad da b3 d3 bc be e7 d4 32 97 da 0f e8 | e2 29 51 0e 96 41 b4 ff 9b 20 c1 68 f8 22 6b 37 | bc 2d 7d 2a 13 01 a1 b3 05 fa c1 ea 1c 1f 45 97 | 4c 05 13 ad eb 35 15 0f f5 10 99 91 9b 3f 29 a1 | 29 e0 29 94 46 69 fe a4 f9 df d3 46 9b f7 d6 fc | 29 00 00 24 85 48 4e 62 cb aa ef f3 1e 98 d2 14 | 8e 36 5f 8a 20 c7 f8 35 5a c8 08 b9 4d a2 67 85 | 59 88 c1 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae c1 7f 5b 24 ac dc 11 ec a1 5c 57 | 31 3f 4b 60 7a 20 b0 c6 00 00 00 1c 00 00 40 05 | 71 38 17 79 8f 5d ce 34 6f 4c c4 ce cc 6f 78 37 | 7e be 6c a5 | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #266 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b cc e0 12 8b aa 91 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #266 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #266 | rejected packet: | 6b cc e0 12 8b aa 91 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #266: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #262 | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #262 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #262 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49666.440884; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002063 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #262 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 "road-eastnet-nonat-10" #262: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #262) | 6c b6 05 ad 53 aa 46 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 71 41 19 2f e2 7d 30 6b 4e a1 e7 5c d2 fe 4f | e0 61 ad 09 53 0e a0 57 08 e6 8a c7 a8 ab 86 63 | b8 6a 7f 66 41 dd b7 63 7a df 2e dc eb 44 db ac | 84 60 8a 30 6d a6 8e c8 9b e0 4a d0 70 9a 6f d7 | 2b c0 d7 cf ec 52 70 50 23 5f 91 08 50 21 38 8b | 76 60 df cc d7 e8 a2 a1 14 d7 95 47 31 84 95 aa | a3 81 92 3c a4 0d 4b 28 d7 90 8d 56 f9 3c bf bc | 84 88 bc cf 92 1a d8 6c 91 60 d7 c8 53 4c 8f 1b | 33 3d 36 12 cc 21 af 62 59 3d a6 91 f5 8f 40 b1 | 5e 20 75 cb 09 ce 69 22 f7 ce 4e 56 bd 5c 4e 69 | 85 a0 6f 08 1d 3c a0 71 93 00 3c 05 be a2 5e a3 | 18 1e 44 5a 4d ed 58 8b 10 8f 38 84 6b ea 6f 25 | 2a 8f 86 0f 8b b5 6e ce 72 db 55 37 c3 3e 68 45 | 52 fb fc c3 b0 3a 37 24 8c 65 c9 ec 5e 24 2b c3 | 69 bc 27 c7 b0 7f 81 12 a0 6d 38 e6 33 39 b8 2c | 2a b9 3c 7a 5e 19 74 c7 ec ac 4b b5 b2 ea 83 d8 | 29 00 00 24 a4 15 8c 3a a3 1b 1e b6 c4 22 d7 fc | ab 68 38 21 36 11 f7 0b d4 9b 74 fb 1e 21 f2 3a | 1b 0d d1 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 64 14 a1 e8 e4 eb 96 cf 02 78 71 | fb d0 4f 54 fd 2f 47 94 00 00 00 1c 00 00 40 05 | f3 5b 09 5c ae 75 15 23 50 5d 21 6a e9 8d 68 9d | ed b0 04 c4 | libevent_free: release ptr-libevent@0x7fb370008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #262 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c b6 05 ad 53 aa 46 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #262 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #262 | rejected packet: | 6c b6 05 ad 53 aa 46 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #262: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #19 | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #19 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #19 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49666.456176; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008537 exceeds limit? YES "road-eastnet-nonat-19" #19: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-19" #19: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #271 at 0x557d469ed400 | State DB: adding IKEv2 state #271 in UNDEFINED | pstats #271 ikev2.ike started | Message ID: init #271: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #271: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #271; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-19" #271: initiating v2 parent SA to replace #19 | using existing local IKE proposals for connection road-eastnet-nonat-19 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 271 for state #271 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #271 | libevent_malloc: new ptr-libevent@0x7fb370008e30 size 128 | #271 spent 0.104 milliseconds in ikev2_parent_outI1() | crypto helper 16 resuming | crypto helper 16 starting work-order 271 for state #271 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 271 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 271 time elapsed 0.00099 seconds | (#271) spent 0.999 milliseconds in crypto helper computing work-order 271: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 271 for state #271 to event queue | scheduling resume sending helper answer for #271 | libevent_malloc: new ptr-libevent@0x7fb364008e30 size 128 | crypto helper 16 waiting (nothing to do) | RESET processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #19 ikev2.ike failed too-many-retransmits | pstats #19 ikev2.ike deleted too-many-retransmits | #19 spent 2.63 milliseconds in total | [RE]START processing: state #19 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-19" #19: deleting state (STATE_PARENT_I1) aged 64.022s and NOT sending notification | parent state #19: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #19 "road-eastnet-nonat-19" #19: deleting IKE SA for connection 'road-eastnet-nonat-19' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-19' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-19 | State DB: deleting IKEv2 state #19 in PARENT_I1 | parent state #19: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #19 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | in statetime_stop() and could not find #19 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #271 | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 271 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #271 | **emit ISAKMP Message: | initiator cookie: | 7d 5f ba e3 47 14 e8 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-19 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a1 b7 7f 1c 9b af 52 72 9a 96 12 4e c3 f7 5f 8a | ikev2 g^x 48 37 54 79 d7 e3 fa 14 73 ed 20 d0 0f 82 32 1d | ikev2 g^x 91 7e 9e e7 72 47 b7 f9 8c ea 5f f8 df 55 12 c4 | ikev2 g^x 92 bb 9f b6 bd 08 63 49 16 85 39 f9 e1 a5 b1 3c | ikev2 g^x c9 58 9d 54 19 7c 80 7a 60 14 04 1b 66 54 39 2c | ikev2 g^x 16 d8 67 8c 1c 17 da 4b 4f 1f bb d2 83 f8 37 fc | ikev2 g^x 93 5f 92 af 49 5f 4c f2 18 ce 79 e8 01 4b 07 77 | ikev2 g^x 80 53 3f 3e 68 e0 6b 21 fa 6f 05 3a 1d 5f f9 c2 | ikev2 g^x 5b 34 da 08 fc 81 e1 b6 3f ef a7 e1 31 76 84 4b | ikev2 g^x db 66 e5 6b 4f 6c 18 0f ea 47 e4 2c 6a c6 c7 06 | ikev2 g^x 5d 0a 4e 6f d5 bc 0f 88 7b d7 82 6f 83 51 d3 f6 | ikev2 g^x 3f a3 4c ff 85 ee cb 4b c1 01 38 69 a0 a8 36 14 | ikev2 g^x 78 3e d3 db 38 75 17 e9 a4 a3 59 d1 1c af a4 4d | ikev2 g^x 60 05 9d fd 70 d0 ca cf 0e 66 4b c6 c1 40 c4 3b | ikev2 g^x 1b 74 97 05 ab 30 3b 52 e7 0a 00 36 d3 75 ae 4d | ikev2 g^x 76 9f 37 1c a2 58 eb 22 e1 c0 ab af b2 c0 c6 2e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7c 82 5e 31 94 0b 65 4a 1d 71 08 ad 0f 28 62 96 | IKEv2 nonce 1d 12 64 f9 13 f9 d7 4a bb 8e a2 2a 74 49 fb 6f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7d 5f ba e3 47 14 e8 96 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 13 | natd_hash: port= 01 f4 | natd_hash: hash= 50 80 df fd 55 81 8a 62 6a df 6a a7 9f a0 5f ab | natd_hash: hash= 49 a7 33 15 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 50 80 df fd 55 81 8a 62 6a df 6a a7 9f a0 5f ab | Notify data 49 a7 33 15 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7d 5f ba e3 47 14 e8 96 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 73 c3 81 b2 53 ff c8 44 e3 9d 4d 41 12 c0 55 97 | natd_hash: hash= b5 95 22 52 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 73 c3 81 b2 53 ff c8 44 e3 9d 4d 41 12 c0 55 97 | Notify data b5 95 22 52 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #271 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #271: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #271 to 4294967295 after switching state | Message ID: IKE #271 skipping update_recv as MD is fake | Message ID: sent #271 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-19" #271: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.19:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #271) | 7d 5f ba e3 47 14 e8 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 b7 7f 1c 9b af 52 72 9a 96 12 4e c3 f7 5f 8a | 48 37 54 79 d7 e3 fa 14 73 ed 20 d0 0f 82 32 1d | 91 7e 9e e7 72 47 b7 f9 8c ea 5f f8 df 55 12 c4 | 92 bb 9f b6 bd 08 63 49 16 85 39 f9 e1 a5 b1 3c | c9 58 9d 54 19 7c 80 7a 60 14 04 1b 66 54 39 2c | 16 d8 67 8c 1c 17 da 4b 4f 1f bb d2 83 f8 37 fc | 93 5f 92 af 49 5f 4c f2 18 ce 79 e8 01 4b 07 77 | 80 53 3f 3e 68 e0 6b 21 fa 6f 05 3a 1d 5f f9 c2 | 5b 34 da 08 fc 81 e1 b6 3f ef a7 e1 31 76 84 4b | db 66 e5 6b 4f 6c 18 0f ea 47 e4 2c 6a c6 c7 06 | 5d 0a 4e 6f d5 bc 0f 88 7b d7 82 6f 83 51 d3 f6 | 3f a3 4c ff 85 ee cb 4b c1 01 38 69 a0 a8 36 14 | 78 3e d3 db 38 75 17 e9 a4 a3 59 d1 1c af a4 4d | 60 05 9d fd 70 d0 ca cf 0e 66 4b c6 c1 40 c4 3b | 1b 74 97 05 ab 30 3b 52 e7 0a 00 36 d3 75 ae 4d | 76 9f 37 1c a2 58 eb 22 e1 c0 ab af b2 c0 c6 2e | 29 00 00 24 7c 82 5e 31 94 0b 65 4a 1d 71 08 ad | 0f 28 62 96 1d 12 64 f9 13 f9 d7 4a bb 8e a2 2a | 74 49 fb 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 80 df fd 55 81 8a 62 6a df 6a a7 | 9f a0 5f ab 49 a7 33 15 00 00 00 1c 00 00 40 05 | 73 c3 81 b2 53 ff c8 44 e3 9d 4d 41 12 c0 55 97 | b5 95 22 52 | state #271 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb370008e30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #271 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 | #271 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49666.457917 | resume sending helper answer for #271 suppresed complete_v2_state_transition() and stole MD | #271 spent 0.458 milliseconds in resume sending helper answer | stop processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb364008e30 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-19 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-19" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-19' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-19" | stop processing: connection "road-eastnet-nonat-19" (in initiate_a_connection() at initiate.c:349) | spent 0.0678 milliseconds in global timer EVENT_REVIVE_CONNS recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 5f ba e3 47 14 e8 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #271 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #271 | rejected packet: | 7d 5f ba e3 47 14 e8 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 13 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #271: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0668 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac2900 | handling event EVENT_RETRANSMIT for parent state #267 | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #267 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #267 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49666.462209; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501797 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #267 | libevent_malloc: new ptr-libevent@0x7fb364008e30 size 128 "road-eastnet-nonat-15" #267: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #267) | 6f db 88 0f fe 70 dc 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e ec fe e4 22 11 a7 b5 a2 ee 25 53 3a 2f 1c 0a | 48 51 04 db 46 22 ad 6d 3c 60 e2 cb fb cc f5 7a | 6d 5e c9 24 ec d8 52 4f 96 5b 62 28 fb 9e eb fd | ac e9 f7 6f 4d 1a f9 74 24 29 e6 a2 80 a2 a7 c1 | b9 1c da 76 8c 9d 40 38 6a 26 13 d3 da 72 01 42 | b6 16 9c ca 09 1d 9b a9 90 70 fb 71 d1 ea b4 45 | 95 3b 5d b5 2c c1 00 ea bd 33 e0 43 00 b9 22 f4 | c9 60 90 dc b0 82 03 89 b0 c4 03 22 4b cf 7c 50 | 96 60 35 da 9c 4c f2 64 7d be b4 90 21 9b 54 ab | 96 09 b1 ee 1f 0d db 8e 22 4d 09 d6 43 6f c8 f1 | da 0c fd f4 69 33 b0 96 0f 1a 25 07 1d e6 1b 37 | 20 ff 37 b4 80 d9 a3 78 93 5a eb 5d 36 bd 9e 35 | 1e 0e a9 e8 13 eb 16 8f ff d5 26 ef c2 d5 47 45 | 91 9b e3 0e c5 08 1f 34 46 fe b0 3e f5 ce e1 c7 | 7c 47 c2 2d d2 f7 4c 06 62 a0 ae f2 e6 53 ff 73 | ee d6 e5 9b 28 8e f3 4d ef ad 40 41 9e 20 99 95 | 29 00 00 24 6d 5a fb f5 8a b7 85 2e cf 37 31 c5 | a8 e8 a7 22 a7 58 7e 34 8e 06 61 77 f0 7b 3b ce | d2 d0 22 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 b4 63 c8 b9 e3 2d fa 51 7c 79 27 | ca 3c 7a c2 0c 39 1a 2b 00 00 00 1c 00 00 40 05 | d9 fc ba 6b 91 d3 e0 ee c2 81 f3 1d 92 b2 24 2f | bf 44 6b 65 | libevent_free: release ptr-libevent@0x7fb3540251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac2900 | #267 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f db 88 0f fe 70 dc 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #267 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #267 | rejected packet: | 6f db 88 0f fe 70 dc 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #267: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #254 | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #254 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #254 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49666.539562; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002347 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac2900 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #254 | libevent_malloc: new ptr-libevent@0x7fb3540251c0 size 128 "road-eastnet-nonat-2" #254: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #254) | b9 c6 03 da 3d 1b ba 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca 92 e7 94 15 6c 86 1d 96 e8 8f 04 2b 4c 31 1c | f2 c3 f1 85 7b fe b5 54 f7 1b c1 2a 4c 6d 01 5c | 34 19 7c 9d d1 b6 95 21 d0 08 d9 67 bb dc e0 e1 | 38 6b 59 b4 76 fc 39 ee a0 2d f2 f5 62 c4 0a 49 | 6b 3c f0 00 22 80 8c 1c 36 99 55 b9 ef cb 76 99 | 5c 12 4c 07 84 ad f5 48 ab 42 10 f5 2e d6 e5 5c | 9d d4 b0 9f 16 b4 b4 bb b3 53 f3 e9 cc 93 ad 3b | a8 c4 f0 7f 9d 9d e3 f4 df 44 9c 28 b2 72 cb b6 | 4b 6a f0 9c 2e 22 ce 4f d0 b2 c9 a3 7c 48 1e 03 | a8 3d 92 67 11 0c a8 c0 fd 76 08 be 4f 01 6d 12 | 3e 0b 87 da bc 3d 45 99 0f 30 cb 9d 8c 96 4d 32 | 07 37 42 c8 ca 8d d9 f2 2b 81 33 b1 a2 49 5c 82 | 69 0d 94 76 f5 ef d0 bf fa db a3 8e db 15 f4 34 | c3 81 4c 6a 47 45 9d c9 09 00 1e 8a 46 70 b4 51 | 30 c0 17 29 a6 05 17 9f 61 e3 d5 9e b5 26 aa b7 | f8 4d 8f 98 15 36 79 53 4c 2f e1 9e 49 63 a8 23 | 29 00 00 24 b7 98 fa 02 fe fe ce ce 94 a2 bc d0 | 60 0d 7b 30 0c f7 48 0b 72 92 ee ec 3d 65 36 1c | 6e c0 df 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3a c0 39 9e 3d 58 28 13 41 2f 06 c7 | b4 3e d7 c2 8d 41 7c 7d 00 00 00 1c 00 00 40 05 | 08 0f dc c4 71 f2 0f bc 45 99 87 81 91 93 b1 3d | 30 5f 17 8f | libevent_free: release ptr-libevent@0x7fb37802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #254 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 c6 03 da 3d 1b ba 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #254 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #254 | rejected packet: | b9 c6 03 da 3d 1b ba 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #254: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a94500 | handling event EVENT_RETRANSMIT for parent state #20 | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #20 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #20 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49666.540841; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007984 exceeds limit? YES "road-eastnet-nonat-20" #20: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-20" #20: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #272 at 0x557d469ee9c0 | State DB: adding IKEv2 state #272 in UNDEFINED | pstats #272 ikev2.ike started | Message ID: init #272: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #272: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #272; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-20" #272: initiating v2 parent SA to replace #20 | using existing local IKE proposals for connection road-eastnet-nonat-20 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 272 for state #272 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb33800d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #272 | libevent_malloc: new ptr-libevent@0x7fb37802a950 size 128 | #272 spent 0.0656 milliseconds in ikev2_parent_outI1() | RESET processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 resuming | start processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #20 ikev2.ike failed too-many-retransmits | pstats #20 ikev2.ike deleted too-many-retransmits | #20 spent 2.74 milliseconds in total | crypto helper 4 starting work-order 272 for state #272 | [RE]START processing: state #20 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in delete_state() at state.c:879) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 272 "road-eastnet-nonat-20" #20: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #20: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #20 "road-eastnet-nonat-20" #20: deleting IKE SA for connection 'road-eastnet-nonat-20' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-20' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-20 | State DB: deleting IKEv2 state #20 in PARENT_I1 | parent state #20: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #20 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 272 time elapsed 0.001002 seconds | libevent_free: release ptr-libevent@0x7fb384043210 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94500 | in statetime_stop() and could not find #20 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#272) spent 1.01 milliseconds in crypto helper computing work-order 272: ikev2_outI1 KE (pcr) | processing global timer EVENT_REVIVE_CONNS | crypto helper 4 sending results from work-order 272 for state #272 to event queue | scheduling resume sending helper answer for #272 Initiating connection road-eastnet-nonat-20 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7fb35804b850 size 128 | crypto helper 4 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-20" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-20' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-20" | stop processing: connection "road-eastnet-nonat-20" (in initiate_a_connection() at initiate.c:349) | spent 0.0694 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #272 | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 272 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #272 | **emit ISAKMP Message: | initiator cookie: | ff cb fd 37 8d 6e 61 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-20 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3e 04 b7 27 a5 a7 b8 66 d1 97 95 af 66 c3 e5 98 | ikev2 g^x ee b7 4e e8 fe 54 c0 2a 2c 35 b6 d6 11 41 10 b4 | ikev2 g^x 18 af 3b 75 f0 d4 8b ed 8c 54 fb a5 3b 9b 6b cd | ikev2 g^x 03 d4 cf 02 df ad 03 af ed 19 0c 47 fd 76 33 3e | ikev2 g^x 24 82 13 9d 24 33 be 90 d1 7f 59 52 78 71 71 b7 | ikev2 g^x d4 30 a1 93 8a 23 ef e8 5d 07 26 a3 58 a3 1a 46 | ikev2 g^x 2d 58 6b b7 bb c2 88 9f da 41 df 19 fa 55 01 88 | ikev2 g^x 63 f9 88 36 bf 3a 39 63 56 a1 2c 9c 43 fd a5 21 | ikev2 g^x f8 58 cf ff 69 0b 98 4e 19 2a 44 99 da 01 4c 80 | ikev2 g^x 0c 1f 77 fa 46 a9 9d c9 0d f6 84 3d b7 03 9e fa | ikev2 g^x 58 be 5a 4e 84 f9 db ea 37 27 1e 20 1a 6d 70 a9 | ikev2 g^x 48 8d a5 77 92 42 17 cb 45 b8 22 eb 9d 91 c6 90 | ikev2 g^x e3 e5 f3 a4 52 f9 ea e1 ca a2 a3 45 53 91 dc 5f | ikev2 g^x 97 6f 49 81 28 51 8e dc 29 b1 94 f1 3b a3 22 d7 | ikev2 g^x 94 cf 3a 4b 92 c4 95 64 a5 39 a2 3f 8c 62 a2 f6 | ikev2 g^x c1 95 97 06 70 da 53 50 e5 31 15 be f9 f5 d7 98 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f6 15 1a 90 c8 9a 0e fb 04 05 1c c3 59 55 fa d7 | IKEv2 nonce 2d f2 b7 dc b4 87 c3 61 27 da cc e0 74 b4 47 b6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ff cb fd 37 8d 6e 61 5d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 14 | natd_hash: port= 01 f4 | natd_hash: hash= ee f8 1c 9f 4c fe 24 8c 43 92 80 29 12 02 33 5d | natd_hash: hash= 78 63 e2 5e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ee f8 1c 9f 4c fe 24 8c 43 92 80 29 12 02 33 5d | Notify data 78 63 e2 5e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ff cb fd 37 8d 6e 61 5d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 82 23 9a b6 38 a9 7d af e0 d8 2e 1b 87 38 33 1a | natd_hash: hash= f5 86 95 cf | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 82 23 9a b6 38 a9 7d af e0 d8 2e 1b 87 38 33 1a | Notify data f5 86 95 cf | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #272 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #272: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #272 to 4294967295 after switching state | Message ID: IKE #272 skipping update_recv as MD is fake | Message ID: sent #272 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-20" #272: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.20:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #272) | ff cb fd 37 8d 6e 61 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 04 b7 27 a5 a7 b8 66 d1 97 95 af 66 c3 e5 98 | ee b7 4e e8 fe 54 c0 2a 2c 35 b6 d6 11 41 10 b4 | 18 af 3b 75 f0 d4 8b ed 8c 54 fb a5 3b 9b 6b cd | 03 d4 cf 02 df ad 03 af ed 19 0c 47 fd 76 33 3e | 24 82 13 9d 24 33 be 90 d1 7f 59 52 78 71 71 b7 | d4 30 a1 93 8a 23 ef e8 5d 07 26 a3 58 a3 1a 46 | 2d 58 6b b7 bb c2 88 9f da 41 df 19 fa 55 01 88 | 63 f9 88 36 bf 3a 39 63 56 a1 2c 9c 43 fd a5 21 | f8 58 cf ff 69 0b 98 4e 19 2a 44 99 da 01 4c 80 | 0c 1f 77 fa 46 a9 9d c9 0d f6 84 3d b7 03 9e fa | 58 be 5a 4e 84 f9 db ea 37 27 1e 20 1a 6d 70 a9 | 48 8d a5 77 92 42 17 cb 45 b8 22 eb 9d 91 c6 90 | e3 e5 f3 a4 52 f9 ea e1 ca a2 a3 45 53 91 dc 5f | 97 6f 49 81 28 51 8e dc 29 b1 94 f1 3b a3 22 d7 | 94 cf 3a 4b 92 c4 95 64 a5 39 a2 3f 8c 62 a2 f6 | c1 95 97 06 70 da 53 50 e5 31 15 be f9 f5 d7 98 | 29 00 00 24 f6 15 1a 90 c8 9a 0e fb 04 05 1c c3 | 59 55 fa d7 2d f2 b7 dc b4 87 c3 61 27 da cc e0 | 74 b4 47 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee f8 1c 9f 4c fe 24 8c 43 92 80 29 | 12 02 33 5d 78 63 e2 5e 00 00 00 1c 00 00 40 05 | 82 23 9a b6 38 a9 7d af e0 d8 2e 1b 87 38 33 1a | f5 86 95 cf | state #272 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37802a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb33800d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #272 | libevent_malloc: new ptr-libevent@0x7fb384043210 size 128 | #272 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49666.54242 | resume sending helper answer for #272 suppresed complete_v2_state_transition() and stole MD | #272 spent 0.321 milliseconds in resume sending helper answer | stop processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35804b850 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff cb fd 37 8d 6e 61 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #272 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #272 | rejected packet: | ff cb fd 37 8d 6e 61 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 14 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #272: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0401 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abfd80 | handling event EVENT_RETRANSMIT for parent state #263 | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #263 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #263 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49666.564601; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001306 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94500 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #263 | libevent_malloc: new ptr-libevent@0x7fb35804b850 size 128 "road-eastnet-nonat-11" #263: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #263) | ca df fa 2e cc 97 0a e0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 35 4e f5 b3 06 6a 55 0c f2 3d 49 3f 7e 31 f9 | fb cf 08 8d 9e dd 74 b4 ae 16 46 b6 d3 2d d7 81 | a5 4c 1e 3c 51 d2 5c 80 19 32 ae 15 f6 f1 83 90 | 89 74 e1 7a 65 6e b3 e6 37 19 f8 4c fe 75 98 41 | ac 4f 10 33 24 18 c2 b3 2c d3 58 72 8c df 81 d4 | 59 38 86 31 ec e0 a1 c4 d1 46 91 6e e8 5d e0 23 | 68 ef 05 cb cd 03 0b e1 cd 09 50 09 e9 ff 48 e3 | 8e ec a4 98 4e a5 2a 21 fb 32 20 aa 01 94 37 a3 | 4a a0 06 10 8c 55 c7 ef f3 db 52 f2 2f 93 75 5e | 89 12 79 f7 25 8b 5c 7e 90 0c 79 f1 46 9c 39 dc | 62 04 8a 23 65 3e da dc e9 e6 17 7c 76 c0 74 b4 | 38 86 ca da 50 ae fc f8 de 6d 6d ce d9 7f cd c0 | 85 4e f8 c9 04 41 9d 47 8a 73 e9 b5 4a cc 14 ad | 16 95 76 51 b8 09 27 ef 06 ca 3a bb ff 24 77 42 | cc fc 6e a1 e6 2b bd 33 6d f5 6a df 58 56 a8 4b | 96 18 0e 2a e9 ec 68 a9 e4 55 e7 47 98 67 01 11 | 29 00 00 24 1f 89 c4 e0 c8 b8 15 d0 01 8c 72 b7 | b9 51 02 35 29 86 83 18 da 61 92 fd 67 fb 67 7c | 20 e3 84 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 89 6c b7 69 49 4f f4 6b c0 cb 25 | 85 ed a6 01 12 ce 48 f3 00 00 00 1c 00 00 40 05 | 1c d7 2d 11 fa 53 cc ec b9 10 e5 08 27 61 79 62 | 96 79 33 55 | libevent_free: release ptr-libevent@0x7fb348048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abfd80 | #263 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca df fa 2e cc 97 0a e0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #263 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #263 | rejected packet: | ca df fa 2e cc 97 0a e0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #263: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #268 | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #268 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #268 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49666.619889; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.49961 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abfd80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #268 | libevent_malloc: new ptr-libevent@0x7fb348048a10 size 128 "road-eastnet-nonat-16" #268: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #268) | 52 eb eb 01 2e 07 ee 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f4 ef 40 5e f5 2a 5e 5a b8 76 94 37 37 12 d2 32 | 87 80 98 31 81 5e ec c8 c0 10 ea 13 f1 32 fd 22 | 5f da f7 72 2a 67 06 fa cf 7f d5 1a c1 ae f1 92 | 7b 53 ad 16 00 b6 90 61 58 94 dd 7e 4a 9f 32 98 | a2 2e 9b 12 92 70 47 ac 39 ac 02 84 c9 35 b9 57 | 66 95 1c 62 b4 f0 47 38 3f ec 43 4d cf 73 e8 45 | 9f d1 15 db ca 5d 1c f1 70 f1 97 a1 2b 7d 26 5e | 27 c8 08 1e 0d d7 2a 7e 36 db 89 18 87 f0 43 11 | e3 cf c8 31 7d 0e ae 6a 97 23 05 40 5d 11 ea 66 | a1 79 e8 97 cf 5c 5b 3a eb e7 1e c8 25 eb 2f 83 | 00 66 8b 3e 05 72 c5 6e 34 08 88 16 97 1a 13 a9 | db 9b 7b 48 0f 92 cf 65 2a 3e cf 88 08 c6 cf 54 | d9 1b 5a 78 a6 05 e8 73 bf 3a d4 a6 65 47 24 50 | 20 0c 6c 69 e0 29 4a aa 5a 89 69 c7 3c 4d 82 76 | 81 c9 87 1d 60 f0 a9 b6 29 2b 06 98 6d a9 24 c8 | 1d 5c 2b 40 de 5d 36 a1 45 5d 5e 8a 48 e6 0b 26 | 29 00 00 24 f0 fa c9 ee f6 f5 97 a2 44 c5 ea 10 | 5b 58 db 61 17 58 ca 3c df 15 b8 1a de 90 ef 49 | 16 34 e4 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 2c 2a b2 6d be c9 76 69 fe e4 41 | f1 72 73 59 2e 97 3f f1 00 00 00 1c 00 00 40 05 | 31 f5 db e1 45 48 68 14 42 b0 53 d9 a4 6c d5 a0 | 03 9b fe 80 | libevent_free: release ptr-libevent@0x7fb3500407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #268 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 eb eb 01 2e 07 ee 4b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #268 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #268 | rejected packet: | 52 eb eb 01 2e 07 ee 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #268: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aaf800 | handling event EVENT_RETRANSMIT for parent state #21 | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #21 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #21 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49666.653243; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009042 exceeds limit? YES "road-eastnet-nonat-21" #21: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-21" #21: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #273 at 0x557d469eff80 | State DB: adding IKEv2 state #273 in UNDEFINED | pstats #273 ikev2.ike started | Message ID: init #273: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #273: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #273; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-21" #273: initiating v2 parent SA to replace #21 | using existing local IKE proposals for connection road-eastnet-nonat-21 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 273 for state #273 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46afe580 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #273 | libevent_malloc: new ptr-libevent@0x7fb3500407f0 size 128 | #273 spent 0.0902 milliseconds in ikev2_parent_outI1() | crypto helper 13 resuming | crypto helper 13 starting work-order 273 for state #273 | RESET processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 273 | start processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #21 ikev2.ike failed too-many-retransmits | pstats #21 ikev2.ike deleted too-many-retransmits | #21 spent 2.59 milliseconds in total | [RE]START processing: state #21 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-21" #21: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #21: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #21 "road-eastnet-nonat-21" #21: deleting IKE SA for connection 'road-eastnet-nonat-21' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-21' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-21 | State DB: deleting IKEv2 state #21 in PARENT_I1 | parent state #21: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #21 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 273 time elapsed 0.000955 seconds | libevent_free: release ptr-libevent@0x7fb34001f920 | (#273) spent 0.959 milliseconds in crypto helper computing work-order 273: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aaf800 | in statetime_stop() and could not find #21 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 13 sending results from work-order 273 for state #273 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #273 Initiating connection road-eastnet-nonat-21 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7fb35c04b7c0 size 128 | crypto helper 13 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-21" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-21' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-21" | stop processing: connection "road-eastnet-nonat-21" (in initiate_a_connection() at initiate.c:349) | spent 0.0801 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #273 | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 273 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #273 | **emit ISAKMP Message: | initiator cookie: | ed 1f ad f4 73 76 3f ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-21 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ad fb 2c d6 61 18 78 ff ff 9e ac 8e 11 6e 5b 0a | ikev2 g^x 17 90 d5 cd a5 72 c6 44 33 06 36 88 ef 85 f7 fd | ikev2 g^x d1 32 bf e5 b4 df 1c 2a 44 4b 64 5a 5c fa a6 e7 | ikev2 g^x a7 88 cd 98 18 db 83 1c de 12 34 1a 01 c0 6e 90 | ikev2 g^x b0 37 b6 8e 3f bc 29 ae 17 56 d9 4e 3e aa f9 1a | ikev2 g^x 05 22 37 90 a3 98 0c 9d fd 31 f5 89 2b 79 38 70 | ikev2 g^x a3 3c e3 a6 be b6 20 06 92 92 77 84 f9 e1 f6 43 | ikev2 g^x 50 c4 75 3f ce 2c 7f a3 83 07 1e 29 12 48 86 d5 | ikev2 g^x b6 e2 61 df c8 2b 9c ea 45 c9 6b 62 38 f9 06 23 | ikev2 g^x 9b a2 90 c4 51 19 47 e4 c9 9e bb 38 c5 ea 4c 2c | ikev2 g^x 24 15 a0 60 6e 12 c1 7a cd 75 9f 6a 97 65 4f 9f | ikev2 g^x 6f aa 7c 8b b3 99 29 be 41 56 ad 5d 52 77 c8 87 | ikev2 g^x f1 18 76 ec 44 be fb bf 14 5e 22 ec 7b 78 cb 22 | ikev2 g^x 16 62 54 b4 5f 5e ed e0 38 14 64 69 82 ec fb 0f | ikev2 g^x 84 be 3a 69 27 17 b5 b0 42 81 a7 3b e2 19 f7 47 | ikev2 g^x ac 1d 3d ca 8c d0 ae cf 0d f7 a8 a2 36 9e 94 83 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a4 16 d5 7c 26 cc bd 52 fc 33 91 77 f2 08 cb df | IKEv2 nonce 04 12 5c f5 f3 31 f7 87 08 22 5b ef 2b 8c 5b 44 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ed 1f ad f4 73 76 3f ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 15 | natd_hash: port= 01 f4 | natd_hash: hash= 93 3d 78 9d 41 51 b9 57 ea 0d 4a 5f 38 c6 cb 30 | natd_hash: hash= ec f2 21 4b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 93 3d 78 9d 41 51 b9 57 ea 0d 4a 5f 38 c6 cb 30 | Notify data ec f2 21 4b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ed 1f ad f4 73 76 3f ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= bd ec 33 2a 1b 35 fa ad 7a ef 73 f7 d9 b0 09 33 | natd_hash: hash= b4 e9 3f 2e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bd ec 33 2a 1b 35 fa ad 7a ef 73 f7 d9 b0 09 33 | Notify data b4 e9 3f 2e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #273 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #273: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #273 to 4294967295 after switching state | Message ID: IKE #273 skipping update_recv as MD is fake | Message ID: sent #273 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-21" #273: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.21:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #273) | ed 1f ad f4 73 76 3f ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad fb 2c d6 61 18 78 ff ff 9e ac 8e 11 6e 5b 0a | 17 90 d5 cd a5 72 c6 44 33 06 36 88 ef 85 f7 fd | d1 32 bf e5 b4 df 1c 2a 44 4b 64 5a 5c fa a6 e7 | a7 88 cd 98 18 db 83 1c de 12 34 1a 01 c0 6e 90 | b0 37 b6 8e 3f bc 29 ae 17 56 d9 4e 3e aa f9 1a | 05 22 37 90 a3 98 0c 9d fd 31 f5 89 2b 79 38 70 | a3 3c e3 a6 be b6 20 06 92 92 77 84 f9 e1 f6 43 | 50 c4 75 3f ce 2c 7f a3 83 07 1e 29 12 48 86 d5 | b6 e2 61 df c8 2b 9c ea 45 c9 6b 62 38 f9 06 23 | 9b a2 90 c4 51 19 47 e4 c9 9e bb 38 c5 ea 4c 2c | 24 15 a0 60 6e 12 c1 7a cd 75 9f 6a 97 65 4f 9f | 6f aa 7c 8b b3 99 29 be 41 56 ad 5d 52 77 c8 87 | f1 18 76 ec 44 be fb bf 14 5e 22 ec 7b 78 cb 22 | 16 62 54 b4 5f 5e ed e0 38 14 64 69 82 ec fb 0f | 84 be 3a 69 27 17 b5 b0 42 81 a7 3b e2 19 f7 47 | ac 1d 3d ca 8c d0 ae cf 0d f7 a8 a2 36 9e 94 83 | 29 00 00 24 a4 16 d5 7c 26 cc bd 52 fc 33 91 77 | f2 08 cb df 04 12 5c f5 f3 31 f7 87 08 22 5b ef | 2b 8c 5b 44 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 3d 78 9d 41 51 b9 57 ea 0d 4a 5f | 38 c6 cb 30 ec f2 21 4b 00 00 00 1c 00 00 40 05 | bd ec 33 2a 1b 35 fa ad 7a ef 73 f7 d9 b0 09 33 | b4 e9 3f 2e | state #273 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3500407f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46afe580 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #273 | libevent_malloc: new ptr-libevent@0x7fb34001f920 size 128 | #273 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49666.654955 | resume sending helper answer for #273 suppresed complete_v2_state_transition() and stole MD | #273 spent 0.463 milliseconds in resume sending helper answer | stop processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c04b7c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 1f ad f4 73 76 3f ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #273 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #273 | rejected packet: | ed 1f ad f4 73 76 3f ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 15 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #273: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0596 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #264 | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #264 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #264 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49666.67913; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002025 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aaf800 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #264 | libevent_malloc: new ptr-libevent@0x7fb35c04b7c0 size 128 "road-eastnet-nonat-12" #264: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #264) | 8e fe 0e 1c bf 0e 6b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 85 0f 2d e4 cd 04 0b 17 96 14 35 20 98 98 7c | 43 94 0e c0 cb 2a ed cd 26 f3 f4 fd 71 0a b3 35 | 8d c8 ce 92 67 ce 39 72 cf 1d 58 73 86 98 2b a0 | 6f 55 7b 13 d0 1f 62 3b 93 93 85 3e 36 cd 86 27 | b4 c1 9a bd c4 db 39 19 44 28 ec a5 e9 1c 59 a2 | a7 fc b2 f8 f1 72 da 9c 2a b8 36 d3 61 88 51 dc | 4d 20 86 6a 14 25 ef 10 b3 1b 09 52 6d 00 f9 db | 75 0a 80 38 3b 18 7c 9c fd c8 c9 4e b1 e2 84 70 | a4 dd 3f 85 ce 8c cb 20 5c 6a 42 21 65 c4 fd 15 | 7a 47 92 65 67 69 9e be f3 7a e9 66 c9 56 bd d2 | 3c 4a 76 68 b7 3f ce 1d 64 64 a7 2c 71 37 b4 c4 | 53 38 1c 79 97 95 2a 69 1c 36 40 41 3d 05 9c ba | 4d 38 e3 a6 a7 6c e9 b1 59 1a 9f ab 80 0a d9 8e | ac 39 5a 0c e3 b3 9d c1 3d 5d 32 c8 42 00 f8 4c | 3a fb 9c 36 7f 16 43 4c 95 29 48 05 f2 b7 02 75 | 54 25 c2 90 a5 04 3b fa ca 77 9e 55 e7 39 19 34 | 29 00 00 24 0b 7d f5 1c 67 a7 5b 6f d5 5f 23 1c | de ee af 0f ed f9 a1 fa b5 71 92 a8 5a 39 25 fa | 7d a0 ff 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 4e 74 d9 6a 11 61 e7 2b 9e b3 5d | fa c6 10 84 a3 ff e4 72 00 00 00 1c 00 00 40 05 | 61 d2 3a 09 fc 3f e9 c0 9a fa 15 52 e0 d4 39 3d | 0f 2b c4 10 | libevent_free: release ptr-libevent@0x7fb3840060f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | #264 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e fe 0e 1c bf 0e 6b 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #264 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #264 | rejected packet: | 8e fe 0e 1c bf 0e 6b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #264: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0571 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c780 | handling event EVENT_RETRANSMIT for parent state #255 | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #255 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #255 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49666.687448; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002853 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #255 | libevent_malloc: new ptr-libevent@0x7fb3840060f0 size 128 "road-eastnet-nonat-3" #255: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #255) | b4 62 7d 49 a4 92 20 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 95 bd 0c ae 75 b5 e3 ef c4 cd 00 43 ea 3e 9a | 02 ba 07 e1 c1 bd 5d f0 a8 a6 51 3a 4a 21 e5 46 | 19 59 a0 93 a8 07 b1 7f 53 68 e9 d8 63 85 c8 12 | 71 98 74 63 ac c1 5d a5 39 9f c3 9e 95 82 52 3e | e1 41 18 21 d4 2e 9c 8d e0 71 8e d0 6d 4b 68 7e | 1c df fa cf ed ca 99 59 64 68 ed b3 9c 61 13 df | 2f ad b1 5a 3f dc 76 f5 58 69 91 b1 8b 83 c7 6f | 0b 08 55 fc ba 8b aa 73 16 1a 51 59 6d 0d 21 1f | bf 66 60 21 f1 49 bc 92 8c 9a be 6c 52 be 72 e6 | 19 b6 47 f8 33 cc b5 e6 ed 41 53 62 da 9d 6d 34 | fc ee 0f bf 23 f3 09 d7 96 22 fd c9 6e c0 31 60 | 95 22 90 57 96 ed 6a f6 05 50 b8 1b 34 71 5d dd | a7 c1 ab 82 e5 96 d7 d0 ac 36 1c 30 9d ee a7 97 | 6f 15 b5 89 4e c4 f6 f6 b5 08 23 bf cb 9e 75 f3 | f9 e0 ea 95 d8 eb 73 6d e3 2b 25 8d e5 17 c9 6e | f4 0f 23 e9 e4 7e dc 78 3c ae 82 7e 2a c2 1f 84 | 29 00 00 24 27 f0 79 05 ca 38 9d 60 17 70 37 05 | 8f c8 d2 c0 f8 4f 0f 05 b1 d0 9d 9d 43 88 90 d5 | 2d 20 4e 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 2d ab c5 84 ac e3 ea 3f b2 97 06 | b2 08 24 4c 91 11 e0 2a 00 00 00 1c 00 00 40 05 | ca ca c2 3f 11 62 54 7a 69 58 46 70 0a 1d a0 10 | 47 7f 3a 1d | libevent_free: release ptr-libevent@0x7fb378008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c780 | #255 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 62 7d 49 a4 92 20 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #255 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #255 | rejected packet: | b4 62 7d 49 a4 92 20 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #255: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ced0 | handling event EVENT_RETRANSMIT for parent state #22 | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #22 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #22 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49666.738763; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010811 exceeds limit? YES "road-eastnet-nonat-22" #22: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-22" #22: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #274 at 0x557d469f1540 | State DB: adding IKEv2 state #274 in UNDEFINED | pstats #274 ikev2.ike started | Message ID: init #274: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #274: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #274; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-22" #274: initiating v2 parent SA to replace #22 | using existing local IKE proposals for connection road-eastnet-nonat-22 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 274 for state #274 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9c780 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #274 | libevent_malloc: new ptr-libevent@0x7fb378008e30 size 128 | #274 spent 0.105 milliseconds in ikev2_parent_outI1() | crypto helper 17 resuming | crypto helper 17 starting work-order 274 for state #274 | RESET processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 274 | start processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #22 ikev2.ike failed too-many-retransmits | pstats #22 ikev2.ike deleted too-many-retransmits | #22 spent 2.54 milliseconds in total | [RE]START processing: state #22 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-22" #22: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #22: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #22 "road-eastnet-nonat-22" #22: deleting IKE SA for connection 'road-eastnet-nonat-22' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-22' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-22 | State DB: deleting IKEv2 state #22 in PARENT_I1 | parent state #22: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #22 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb37402a710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ced0 | in statetime_stop() and could not find #22 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-22 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 274 time elapsed 0.000649 seconds | start processing: connection "road-eastnet-nonat-22" (in initiate_a_connection() at initiate.c:186) | (#274) spent 0.692 milliseconds in crypto helper computing work-order 274: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 274 for state #274 to event queue | connection 'road-eastnet-nonat-22' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | scheduling resume sending helper answer for #274 | libevent_malloc: new ptr-libevent@0x7fb350008e30 size 128 | crypto helper 17 waiting (nothing to do) | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-22" | stop processing: connection "road-eastnet-nonat-22" (in initiate_a_connection() at initiate.c:349) | spent 0.0783 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #274 | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 274 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #274 | **emit ISAKMP Message: | initiator cookie: | 97 f1 23 53 d2 3b 4d 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-22 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d0 bf aa 44 4c 86 42 20 d8 9e 9a 10 8c 03 23 1c | ikev2 g^x 55 12 c5 05 17 54 35 db 09 ea 86 4f 1e 8f 7b 32 | ikev2 g^x 9a 2a b0 4c f2 e7 18 73 a1 a0 fd e2 40 07 2c 7c | ikev2 g^x b0 86 fe c9 c0 0a 24 ee 0b e2 8f 65 27 f4 ce d4 | ikev2 g^x 26 d0 8a 70 5c 4d 46 36 4c d7 e9 bc 9b 95 2b 48 | ikev2 g^x 94 a5 c8 98 b4 23 f8 e0 8f 7c 6d 1d 50 c7 fe 04 | ikev2 g^x 1c ce 6b 59 2b ed cf 4a 5b 4f 67 9e cc 11 c0 53 | ikev2 g^x 7c 50 d5 3e bd 07 f0 e3 56 2a 0b ae b3 c0 99 43 | ikev2 g^x bb 92 8e 39 19 7e 1e c2 71 84 a0 76 9a 0f 7a 85 | ikev2 g^x 50 cf 0d 7d 85 0a 08 cc ee a1 bd c3 88 dd 8a de | ikev2 g^x e2 9f 70 d5 bb 76 44 f0 e2 0f 12 4d ae 88 a5 a4 | ikev2 g^x 51 38 bf fa 0f 38 f4 4c bb e3 25 bf 62 88 5c 87 | ikev2 g^x e1 a2 de e1 56 a5 9f 6b ce 90 dc 86 6d 26 32 32 | ikev2 g^x 64 ae 0b ac fa 3a f6 9e fa 00 00 26 02 a9 70 2e | ikev2 g^x af 79 3d a8 07 0b 81 d4 53 f3 46 fc 05 11 f6 55 | ikev2 g^x 0d 1d 8f a8 e0 93 58 07 b0 a8 c9 54 c5 14 a2 da | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 59 ef 9f ca 6d 42 ee 4c de 0a 4a 8e ec df b4 6b | IKEv2 nonce 0d dd 66 fa b2 ad 6d 66 92 77 f9 cb 4b 49 7a f0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 97 f1 23 53 d2 3b 4d 16 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 16 | natd_hash: port= 01 f4 | natd_hash: hash= 8d 80 80 1b 6e 73 7e e3 fb 20 6a a8 f2 02 f1 bf | natd_hash: hash= e6 58 62 ac | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8d 80 80 1b 6e 73 7e e3 fb 20 6a a8 f2 02 f1 bf | Notify data e6 58 62 ac | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 97 f1 23 53 d2 3b 4d 16 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 31 9f 40 90 8f 0e 1c 6e 4b 7e bf d8 97 47 82 19 | natd_hash: hash= e1 cf 25 c8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 31 9f 40 90 8f 0e 1c 6e 4b 7e bf d8 97 47 82 19 | Notify data e1 cf 25 c8 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #274 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #274: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #274 to 4294967295 after switching state | Message ID: IKE #274 skipping update_recv as MD is fake | Message ID: sent #274 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-22" #274: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.22:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #274) | 97 f1 23 53 d2 3b 4d 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 bf aa 44 4c 86 42 20 d8 9e 9a 10 8c 03 23 1c | 55 12 c5 05 17 54 35 db 09 ea 86 4f 1e 8f 7b 32 | 9a 2a b0 4c f2 e7 18 73 a1 a0 fd e2 40 07 2c 7c | b0 86 fe c9 c0 0a 24 ee 0b e2 8f 65 27 f4 ce d4 | 26 d0 8a 70 5c 4d 46 36 4c d7 e9 bc 9b 95 2b 48 | 94 a5 c8 98 b4 23 f8 e0 8f 7c 6d 1d 50 c7 fe 04 | 1c ce 6b 59 2b ed cf 4a 5b 4f 67 9e cc 11 c0 53 | 7c 50 d5 3e bd 07 f0 e3 56 2a 0b ae b3 c0 99 43 | bb 92 8e 39 19 7e 1e c2 71 84 a0 76 9a 0f 7a 85 | 50 cf 0d 7d 85 0a 08 cc ee a1 bd c3 88 dd 8a de | e2 9f 70 d5 bb 76 44 f0 e2 0f 12 4d ae 88 a5 a4 | 51 38 bf fa 0f 38 f4 4c bb e3 25 bf 62 88 5c 87 | e1 a2 de e1 56 a5 9f 6b ce 90 dc 86 6d 26 32 32 | 64 ae 0b ac fa 3a f6 9e fa 00 00 26 02 a9 70 2e | af 79 3d a8 07 0b 81 d4 53 f3 46 fc 05 11 f6 55 | 0d 1d 8f a8 e0 93 58 07 b0 a8 c9 54 c5 14 a2 da | 29 00 00 24 59 ef 9f ca 6d 42 ee 4c de 0a 4a 8e | ec df b4 6b 0d dd 66 fa b2 ad 6d 66 92 77 f9 cb | 4b 49 7a f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8d 80 80 1b 6e 73 7e e3 fb 20 6a a8 | f2 02 f1 bf e6 58 62 ac 00 00 00 1c 00 00 40 05 | 31 9f 40 90 8f 0e 1c 6e 4b 7e bf d8 97 47 82 19 | e1 cf 25 c8 | state #274 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb378008e30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9c780 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c780 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #274 | libevent_malloc: new ptr-libevent@0x7fb37402a710 size 128 | #274 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49666.740205 | resume sending helper answer for #274 suppresed complete_v2_state_transition() and stole MD | #274 spent 0.484 milliseconds in resume sending helper answer | stop processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb350008e30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 f1 23 53 d2 3b 4d 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #274 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #274 | rejected packet: | 97 f1 23 53 d2 3b 4d 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 16 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #274: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0873 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11640 | handling event EVENT_RETRANSMIT for parent state #269 | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #269 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #269 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49666.757549; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500901 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ced0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #269 | libevent_malloc: new ptr-libevent@0x7fb350008e30 size 128 "road-eastnet-nonat-17" #269: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #269) | 42 2b 66 77 50 7b f1 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 1a b0 80 05 00 53 b8 88 37 a8 0d e8 4e c0 81 | 57 b8 c1 99 be 60 6c 42 36 80 aa e8 7e 86 e2 1b | dc 47 d3 0f cf c7 46 a8 c8 47 ce ff 99 14 e6 14 | 37 44 15 18 25 7b d6 ca f2 0f 00 2d 17 01 df 08 | ac fe e9 d3 2b 32 d0 3c 75 39 46 f3 2a a6 98 c3 | 1d b7 82 4a b4 92 84 4b b3 2d b3 71 d7 06 52 b9 | 9c eb 15 89 b5 c8 16 c5 e1 29 05 f5 12 64 42 f4 | a0 b3 32 62 fe 43 4c 1c 4e 1e 53 37 a8 e8 52 23 | 53 0e 82 46 38 b3 95 ea 7e 47 ae 7b 38 c7 ec ac | 8c 74 78 5b e3 a1 ba 65 7c 63 27 19 55 d3 7e f5 | 2f 36 c3 b3 a1 0f 84 2a 85 17 e4 09 e8 35 c4 82 | 08 59 25 c5 6f 5d dc d6 ee 2f dc 6b 0a a2 5d f8 | d2 8d a0 b1 da 71 a0 b2 68 ba c7 d1 ba 7e e6 81 | d8 e3 b3 84 de 3a 47 64 3d 04 00 a0 60 be 1c 4f | 52 66 df 3f 77 fe 53 0c dd cd ed 75 7e 76 02 77 | cc 4e de 99 d4 98 4e 1e 30 09 c0 9e cb c6 a1 c0 | 29 00 00 24 b8 ee 66 5c df cb 58 d0 1b a4 60 c3 | 1b 92 52 a8 29 57 57 d2 02 37 76 e3 2d 2f 31 c7 | 4b 37 7d fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 73 36 11 68 b5 eb 4b 5f e8 3f ce | 5b fc b9 99 cc 0c 05 c7 00 00 00 1c 00 00 40 05 | 7f dd 18 35 5d 55 ec 33 76 f4 f0 dc 77 e6 e3 3b | 97 a2 2b d9 | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11640 | #269 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 2b 66 77 50 7b f1 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #269 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #269 | rejected packet: | 42 2b 66 77 50 7b f1 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #269: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c7c0 | handling event EVENT_RETRANSMIT for parent state #265 | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #265 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #265 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49666.783843; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001537 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11640 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #265 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 "road-eastnet-nonat-13" #265: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #265) | 5e d6 2a e3 fc d6 88 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 2e 3a 15 7c f9 00 41 72 02 12 64 4c 6b 73 52 | bb 8d bc 96 e4 69 5a 27 ff 16 12 40 6d b3 e6 7d | 28 6d d8 d8 46 ae 55 b1 20 60 d0 f0 2c d7 5a 32 | f1 e8 5b 54 2b 16 ec 87 57 a5 e1 c1 08 80 a6 16 | a0 4f 0f 3b 62 e5 8c cb aa 65 e4 d5 87 37 d0 85 | 34 de df b2 ac 15 11 24 c5 c0 e2 ba 8e bf 6a 38 | 92 5b d1 dd 84 fb 29 ef cf 37 36 ed 82 a0 ef 7a | 79 c3 2b da 2f 96 ad 2b 46 50 67 74 44 c2 8f 22 | 65 99 b1 3a 1c fd 70 cc 25 39 6a 77 0a f9 8c f3 | 33 34 af 74 f2 1a 52 31 29 6f 53 43 ce 77 a1 c0 | 4e ad 32 24 24 86 73 ad 16 2d 19 8b 36 54 d6 8f | 96 95 e4 0b 0b df d1 24 22 12 35 73 ac 81 e7 c1 | af 88 20 ae e1 fa 41 09 f0 f6 2b 19 42 79 9e 92 | 6a 95 0b 69 19 21 ee ba 94 35 b0 07 aa 13 f3 40 | 4f 27 f7 e8 7d ea ae b3 14 bf 0c b2 8b a5 e7 1f | 2e 4a 4a 5e 40 8d d3 1a 30 c1 1d 13 0d 61 d3 15 | 29 00 00 24 d2 1b cb fe 42 33 59 cd 17 75 9b cc | f4 b0 0c 18 45 31 71 9f e7 2e 80 d7 48 7b 93 7c | d8 b3 ab 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 77 56 b7 16 48 fa 98 9b c1 2d 60 | a6 6c bc 07 2c 3a ef 47 00 00 00 1c 00 00 40 05 | 5a c9 c6 01 25 8a 31 37 7b d0 f2 6b d1 02 08 77 | 0a b6 4e aa | libevent_free: release ptr-libevent@0x7fb36c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | #265 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e d6 2a e3 fc d6 88 0b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #265 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #265 | rejected packet: | 5e d6 2a e3 fc d6 88 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #265: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.083 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24700 | handling event EVENT_RETRANSMIT for parent state #256 | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #256 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #256 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49666.824234; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003032 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #256 | libevent_malloc: new ptr-libevent@0x7fb36c04b850 size 128 "road-eastnet-nonat-4" #256: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #256) | af ff 14 5c e8 87 a5 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 1f 56 51 1c ec cd e5 db 48 26 c8 dc 41 fd 54 | a8 2a f3 18 64 e6 88 a2 77 94 ce b8 37 5b 43 37 | 15 71 aa 40 2b 14 32 13 87 73 76 ea dc 9c c2 0d | 5f 66 9f c3 96 de 76 09 50 94 85 73 09 16 fd 60 | e5 22 cf 96 3d 7f 8a d5 69 b3 f6 e0 d1 b6 2a b1 | 46 24 36 96 12 35 a6 66 31 6c fc 27 fd 14 5f 55 | dc 4d 24 0c d2 4a 10 86 34 a8 27 78 27 27 b0 f6 | f0 8d 2e 1b c6 a5 de fc 9e fb ab ed 9f 6c dc 3c | 42 c9 5c a1 4a e3 4a 45 da e8 44 a1 f6 8a 36 fd | f6 c8 42 59 48 f3 30 69 ad 20 74 c3 02 1b f3 f8 | 3b 14 80 5c e4 55 cc fa 49 75 80 37 c4 a0 eb 78 | 5a ba 01 b2 91 5d ef fc 1f 18 54 22 3c e6 ac 42 | 22 26 d6 93 0e 7d c7 67 e5 47 f0 ab 43 0b cd e4 | d0 9c fd 7d 64 aa cd 20 be f3 31 9f f9 fd e9 74 | f6 4d 79 65 aa 69 d2 c1 c0 27 e2 43 4d 23 a2 bd | 81 a0 4b 66 29 06 06 b0 e0 6b c0 d6 29 53 e1 5f | 29 00 00 24 68 30 70 dd 8d a8 3f ec 7e 36 6c 6a | a3 ce 4b 67 03 0b 93 d7 9a 32 93 85 56 0b 5c 0e | c5 0b 8c 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 28 6b 61 6f db 11 ce 62 1a 99 08 | cd 34 ea 3b 0e 7b 2c f1 00 00 00 1c 00 00 40 05 | f7 c5 67 63 b0 24 3f 1b e9 07 39 23 b4 29 1b da | 4e b1 36 66 | libevent_free: release ptr-libevent@0x7fb37c008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24700 | #256 spent 0.177 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af ff 14 5c e8 87 a5 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #256 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #256 | rejected packet: | af ff 14 5c e8 87 a5 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #256: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0752 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac1340 | handling event EVENT_RETRANSMIT for parent state #23 | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #23 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #23 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49666.828646; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010442 exceeds limit? YES "road-eastnet-nonat-23" #23: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-23" #23: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #275 at 0x557d469f2b00 | State DB: adding IKEv2 state #275 in UNDEFINED | pstats #275 ikev2.ike started | Message ID: init #275: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #275: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #275; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-23" #275: initiating v2 parent SA to replace #23 | using existing local IKE proposals for connection road-eastnet-nonat-23 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 275 for state #275 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b24700 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #275 | libevent_malloc: new ptr-libevent@0x7fb37c008e30 size 128 | #275 spent 0.103 milliseconds in ikev2_parent_outI1() | RESET processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #23 ikev2.ike failed too-many-retransmits | pstats #23 ikev2.ike deleted too-many-retransmits | #23 spent 2.28 milliseconds in total | [RE]START processing: state #23 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-23" #23: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #23: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #23 | crypto helper 18 resuming | crypto helper 18 starting work-order 275 for state #275 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 275 "road-eastnet-nonat-23" #23: deleting IKE SA for connection 'road-eastnet-nonat-23' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-23' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-23 | State DB: deleting IKEv2 state #23 in PARENT_I1 | parent state #23: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 275 time elapsed 0.000947 seconds | (#275) spent 0.953 milliseconds in crypto helper computing work-order 275: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 275 for state #275 to event queue | scheduling resume sending helper answer for #275 | libevent_malloc: new ptr-libevent@0x7fb354008e30 size 128 | crypto helper 18 waiting (nothing to do) | stop processing: state #23 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb344035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac1340 | in statetime_stop() and could not find #23 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-23 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-23" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-23' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-23" | stop processing: connection "road-eastnet-nonat-23" (in initiate_a_connection() at initiate.c:349) | spent 0.0847 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #275 | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 275 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #275 | **emit ISAKMP Message: | initiator cookie: | 8e 8a 90 cd 9e 92 16 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-23 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b1 db ff f3 45 8d 77 6b ab 4c f5 59 93 99 02 27 | ikev2 g^x 95 ea ea f3 ac f8 d0 0c f4 e4 a7 81 ed dc a2 2e | ikev2 g^x 80 d4 21 01 5a 1a 55 9b d3 86 c5 c8 54 08 80 87 | ikev2 g^x 53 03 95 88 ee 42 5d b8 52 8e fe 84 14 38 79 44 | ikev2 g^x c3 51 49 fc 97 0d 59 e0 5f 4b c0 5e f8 ec 96 9d | ikev2 g^x 9d 66 a2 14 38 ec b6 d3 b6 6a cc ee b5 48 0a 5e | ikev2 g^x 6f de 87 79 9d 43 73 e3 c3 11 60 66 e8 ee 7a 7d | ikev2 g^x c3 f9 f0 de 79 dc 04 3a 85 85 52 d2 92 21 fc 86 | ikev2 g^x 8d fd 20 94 86 24 05 6c 2b cb ee c9 04 8f 0f 93 | ikev2 g^x 01 a5 e2 2b 0c 12 b9 e6 3a 6c ef c0 32 59 e5 d2 | ikev2 g^x 3b 11 a2 9f 2d 5e e0 2d 8c 75 47 73 37 0b fd dc | ikev2 g^x 38 6f 1e 5d 62 ac ab 3b f8 90 5d 68 0c 10 a4 e3 | ikev2 g^x 5d d1 15 9f 1f d5 11 83 81 be 1d a7 8f 91 34 60 | ikev2 g^x 10 68 8c b7 8b 5a e8 bb 55 32 b6 ac 66 fb 13 bc | ikev2 g^x 8d 01 0f 0f f6 d9 7e e8 52 a6 18 9d f5 fb ae f8 | ikev2 g^x d6 4a f4 34 c9 7a eb 6e cd 1f ad 11 86 f4 37 e0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 82 2a d3 ed 88 6f 6d 2b 95 fc ef 17 cd da 04 83 | IKEv2 nonce d9 0b fe c7 f7 7a 31 0a 69 4f 17 0b 3b dd fa 65 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8e 8a 90 cd 9e 92 16 a8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 17 | natd_hash: port= 01 f4 | natd_hash: hash= a2 12 f4 6b 5c 7a 37 1f d4 51 59 a4 33 90 ab 79 | natd_hash: hash= b6 80 74 7b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a2 12 f4 6b 5c 7a 37 1f d4 51 59 a4 33 90 ab 79 | Notify data b6 80 74 7b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8e 8a 90 cd 9e 92 16 a8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6b 59 3d 2d 41 62 79 69 4f 0b fb 7b cf 22 15 97 | natd_hash: hash= 6d 57 a6 24 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6b 59 3d 2d 41 62 79 69 4f 0b fb 7b cf 22 15 97 | Notify data 6d 57 a6 24 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #275 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #275: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #275 to 4294967295 after switching state | Message ID: IKE #275 skipping update_recv as MD is fake | Message ID: sent #275 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-23" #275: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.23:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #275) | 8e 8a 90 cd 9e 92 16 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 db ff f3 45 8d 77 6b ab 4c f5 59 93 99 02 27 | 95 ea ea f3 ac f8 d0 0c f4 e4 a7 81 ed dc a2 2e | 80 d4 21 01 5a 1a 55 9b d3 86 c5 c8 54 08 80 87 | 53 03 95 88 ee 42 5d b8 52 8e fe 84 14 38 79 44 | c3 51 49 fc 97 0d 59 e0 5f 4b c0 5e f8 ec 96 9d | 9d 66 a2 14 38 ec b6 d3 b6 6a cc ee b5 48 0a 5e | 6f de 87 79 9d 43 73 e3 c3 11 60 66 e8 ee 7a 7d | c3 f9 f0 de 79 dc 04 3a 85 85 52 d2 92 21 fc 86 | 8d fd 20 94 86 24 05 6c 2b cb ee c9 04 8f 0f 93 | 01 a5 e2 2b 0c 12 b9 e6 3a 6c ef c0 32 59 e5 d2 | 3b 11 a2 9f 2d 5e e0 2d 8c 75 47 73 37 0b fd dc | 38 6f 1e 5d 62 ac ab 3b f8 90 5d 68 0c 10 a4 e3 | 5d d1 15 9f 1f d5 11 83 81 be 1d a7 8f 91 34 60 | 10 68 8c b7 8b 5a e8 bb 55 32 b6 ac 66 fb 13 bc | 8d 01 0f 0f f6 d9 7e e8 52 a6 18 9d f5 fb ae f8 | d6 4a f4 34 c9 7a eb 6e cd 1f ad 11 86 f4 37 e0 | 29 00 00 24 82 2a d3 ed 88 6f 6d 2b 95 fc ef 17 | cd da 04 83 d9 0b fe c7 f7 7a 31 0a 69 4f 17 0b | 3b dd fa 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 12 f4 6b 5c 7a 37 1f d4 51 59 a4 | 33 90 ab 79 b6 80 74 7b 00 00 00 1c 00 00 40 05 | 6b 59 3d 2d 41 62 79 69 4f 0b fb 7b cf 22 15 97 | 6d 57 a6 24 | state #275 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c008e30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b24700 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #275 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 | #275 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49666.830515 | resume sending helper answer for #275 suppresed complete_v2_state_transition() and stole MD | #275 spent 0.558 milliseconds in resume sending helper answer | stop processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb354008e30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 8a 90 cd 9e 92 16 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #275 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #275 | rejected packet: | 8e 8a 90 cd 9e 92 16 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 17 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #275: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0712 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acab40 | handling event EVENT_RETRANSMIT for parent state #270 | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #270 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #270 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49666.840755; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500465 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac1340 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #270 | libevent_malloc: new ptr-libevent@0x7fb354008e30 size 128 "road-eastnet-nonat-18" #270: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #270) | 98 aa bb 79 2f f5 b5 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 24 f6 25 5f fa 71 0f 39 53 f1 8f 92 58 3c 59 | 8e c2 2e 28 53 ea 0d 58 1c b1 76 25 4f 77 d3 40 | 6f 45 9c 78 a8 01 99 46 d7 6e 57 ac 51 cd 32 20 | 87 d7 3c c9 3f 5e e0 a6 46 8c bc bb d2 2a 3a 19 | 0d 30 25 7b 8c f0 eb f6 7f 48 bd 51 fc 7c 03 2d | 42 fb c9 54 0b f3 df 3f 56 f4 9e 74 f1 22 86 89 | d4 fe 7d ea 34 26 2a 49 b7 c2 c2 c5 bf 06 dd 36 | be de 23 aa bf 61 22 5f 62 e1 04 e4 81 81 b4 1a | 94 68 45 c7 43 f9 2b f7 9c c7 da c1 6c f9 e0 19 | 3d 12 26 17 de 58 8c 74 5a 7c d1 ae 99 12 b1 cc | 7c fd 41 5e df 12 73 ff fe 24 d4 ac e3 4a 14 3c | a7 57 18 de 1a f8 e3 60 98 66 b7 e2 de d9 ef 30 | 7b 0c d1 7a 6d 0b f9 31 66 84 79 8b 8b 50 77 51 | 23 58 84 77 80 ea dc 70 95 5b e4 15 8d 98 42 aa | fa 93 a8 7a d7 2a 0d 51 24 2f ee fa 92 74 05 47 | d0 38 43 8c 6f cb 3f 1f 04 0b e8 57 ca ea 33 7e | 29 00 00 24 dd 5a f6 1e bd fb cd ef 92 3b 56 16 | bd 57 a2 0f d1 d5 f5 02 97 f4 10 bb 15 09 d8 8e | c9 9b 97 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 15 18 7d df ec 83 30 72 5b 68 c2 | 08 e3 c3 a4 d5 a2 af 25 00 00 00 1c 00 00 40 05 | b3 09 33 34 02 38 11 d4 03 64 9d 03 c3 5d 2b 94 | 2e 30 63 d3 | libevent_free: release ptr-libevent@0x7fb388043300 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab40 | #270 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 aa bb 79 2f f5 b5 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #270 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #270 | rejected packet: | 98 aa bb 79 2f f5 b5 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #270: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0744 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12bc0 | handling event EVENT_RETRANSMIT for parent state #266 | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #266 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #266 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49666.869154; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00159 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab40 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #266 | libevent_malloc: new ptr-libevent@0x7fb388043300 size 128 "road-eastnet-nonat-14" #266: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #266) | 6b cc e0 12 8b aa 91 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 c7 f6 72 9c a5 df d1 37 bd 8c a8 3d 12 ac f8 | 22 21 09 d5 08 f4 92 dd f1 6b 1f 81 7b 7f 3b 9d | 10 fa 77 c3 74 a7 03 4d 17 3b 47 94 f2 0e 9e 20 | ba c3 57 67 86 fd d2 e5 0d 53 bc 0e c2 cf a4 3a | ca 89 10 10 9a 9f 52 0e c5 60 b3 38 be 05 37 b4 | a3 6b 5d d8 04 66 d6 b5 93 93 8f 47 58 63 40 52 | 1b f8 2c cb 93 59 07 2b ad c7 18 ca a5 e9 24 fa | 41 de 1f 43 7f 1f 27 30 49 67 c7 c8 16 fd 61 a4 | 21 e9 05 98 46 f1 50 b6 8e 31 ad a9 2c 10 19 f5 | b9 ef 6b d3 e7 07 06 8e bf 18 8b 0a 77 f5 44 4b | 1c 00 21 d9 dc b3 66 3f a9 4b df cd cd bd 25 d2 | 2a cd 52 ad da b3 d3 bc be e7 d4 32 97 da 0f e8 | e2 29 51 0e 96 41 b4 ff 9b 20 c1 68 f8 22 6b 37 | bc 2d 7d 2a 13 01 a1 b3 05 fa c1 ea 1c 1f 45 97 | 4c 05 13 ad eb 35 15 0f f5 10 99 91 9b 3f 29 a1 | 29 e0 29 94 46 69 fe a4 f9 df d3 46 9b f7 d6 fc | 29 00 00 24 85 48 4e 62 cb aa ef f3 1e 98 d2 14 | 8e 36 5f 8a 20 c7 f8 35 5a c8 08 b9 4d a2 67 85 | 59 88 c1 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae c1 7f 5b 24 ac dc 11 ec a1 5c 57 | 31 3f 4b 60 7a 20 b0 c6 00 00 00 1c 00 00 40 05 | 71 38 17 79 8f 5d ce 34 6f 4c c4 ce cc 6f 78 37 | 7e be 6c a5 | libevent_free: release ptr-libevent@0x7fb36004b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12bc0 | #266 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b cc e0 12 8b aa 91 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #266 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #266 | rejected packet: | 6b cc e0 12 8b aa 91 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #266: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0744 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6e010 | handling event EVENT_RETRANSMIT for parent state #24 | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #24 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #24 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49666.93857; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.013911 exceeds limit? YES "road-eastnet-nonat-24" #24: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-24" #24: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #276 at 0x557d469f40c0 | State DB: adding IKEv2 state #276 in UNDEFINED | pstats #276 ikev2.ike started | Message ID: init #276: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #276: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #276; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-24" #276: initiating v2 parent SA to replace #24 | using existing local IKE proposals for connection road-eastnet-nonat-24 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 276 for state #276 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b12bc0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #276 | libevent_malloc: new ptr-libevent@0x7fb36004b850 size 128 | #276 spent 0.114 milliseconds in ikev2_parent_outI1() | crypto helper 7 resuming | RESET processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 starting work-order 276 for state #276 | start processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #24 ikev2.ike failed too-many-retransmits | pstats #24 ikev2.ike deleted too-many-retransmits | #24 spent 2.64 milliseconds in total | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 276 | [RE]START processing: state #24 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-24" #24: deleting state (STATE_PARENT_I1) aged 64.015s and NOT sending notification | parent state #24: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #24 "road-eastnet-nonat-24" #24: deleting IKE SA for connection 'road-eastnet-nonat-24' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-24' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-24 | State DB: deleting IKEv2 state #24 in PARENT_I1 | parent state #24: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #24 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 276 time elapsed 0.000988 seconds | (#276) spent 0.985 milliseconds in crypto helper computing work-order 276: ikev2_outI1 KE (pcr) | libevent_free: release ptr-libevent@0x7fb36800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6e010 | crypto helper 7 sending results from work-order 276 for state #276 to event queue | scheduling resume sending helper answer for #276 | libevent_malloc: new ptr-libevent@0x7fb348008e30 size 128 | in statetime_stop() and could not find #24 | crypto helper 7 waiting (nothing to do) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-24 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-24" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-24' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-24" | stop processing: connection "road-eastnet-nonat-24" (in initiate_a_connection() at initiate.c:349) | spent 0.0801 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #276 | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 276 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #276 | **emit ISAKMP Message: | initiator cookie: | 97 d8 09 67 95 19 ff f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-24 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4e fe 65 45 24 16 54 b2 a7 14 49 9e 41 08 a6 ad | ikev2 g^x 8d 38 c1 ab 41 bc c5 70 74 ea 87 6b 47 67 61 c9 | ikev2 g^x 08 e4 05 10 d8 b1 89 eb 95 ae 5c c6 f1 8d 64 f6 | ikev2 g^x e2 34 f7 1e 96 bb c8 e4 08 d5 11 49 c7 13 d5 5b | ikev2 g^x 05 9d 02 33 71 55 11 11 24 9a 7a f7 2f f8 55 e9 | ikev2 g^x 49 16 da 32 11 31 25 c0 d3 d2 83 15 e8 61 24 52 | ikev2 g^x f4 f3 a7 f2 34 62 0e d9 54 b7 ea 87 42 a8 29 03 | ikev2 g^x 05 f5 e1 d2 8f 40 88 3f e8 e4 52 27 80 25 db f2 | ikev2 g^x 79 7c f2 ce e3 4d 99 fa 0f 82 50 fa bd f3 31 31 | ikev2 g^x 75 5b 04 3c f4 62 cf 98 a6 3b 30 69 aa fe de 35 | ikev2 g^x fe 70 61 92 ab 0c 67 96 0d 80 c2 5b c7 8c 3b 7a | ikev2 g^x 1d cc 0e d5 c6 71 9d 10 b0 4a ac f9 9f b7 d7 6d | ikev2 g^x 29 1a 45 c3 c8 c4 88 f8 4d dd 53 1c d2 5c 13 5d | ikev2 g^x 0b 9c e9 d4 6a e6 6d db d7 74 a8 c2 b2 2b 2e 99 | ikev2 g^x c1 be 2c 7e b9 9a 61 61 42 22 a8 96 77 9d c3 f9 | ikev2 g^x 9b eb 60 04 cc 7a e8 a6 1b 7a bb 42 2e 5c de 12 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 89 93 ef 63 4b 32 f6 be 90 74 d4 cc df 00 dd 1b | IKEv2 nonce b5 27 60 b1 da 93 3c e5 82 5c 18 d4 92 56 47 22 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 97 d8 09 67 95 19 ff f6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 18 | natd_hash: port= 01 f4 | natd_hash: hash= 96 b3 01 11 26 92 0f 1e 78 d6 0c e4 b7 13 47 be | natd_hash: hash= 6e 37 68 a6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 96 b3 01 11 26 92 0f 1e 78 d6 0c e4 b7 13 47 be | Notify data 6e 37 68 a6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 97 d8 09 67 95 19 ff f6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 24 f3 9b 24 06 cb fe aa 4a 7c a0 cb 8e 4b 56 de | natd_hash: hash= 28 62 03 f5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 24 f3 9b 24 06 cb fe aa 4a 7c a0 cb 8e 4b 56 de | Notify data 28 62 03 f5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #276 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #276: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #276 to 4294967295 after switching state | Message ID: IKE #276 skipping update_recv as MD is fake | Message ID: sent #276 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-24" #276: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.24:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #276) | 97 d8 09 67 95 19 ff f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e fe 65 45 24 16 54 b2 a7 14 49 9e 41 08 a6 ad | 8d 38 c1 ab 41 bc c5 70 74 ea 87 6b 47 67 61 c9 | 08 e4 05 10 d8 b1 89 eb 95 ae 5c c6 f1 8d 64 f6 | e2 34 f7 1e 96 bb c8 e4 08 d5 11 49 c7 13 d5 5b | 05 9d 02 33 71 55 11 11 24 9a 7a f7 2f f8 55 e9 | 49 16 da 32 11 31 25 c0 d3 d2 83 15 e8 61 24 52 | f4 f3 a7 f2 34 62 0e d9 54 b7 ea 87 42 a8 29 03 | 05 f5 e1 d2 8f 40 88 3f e8 e4 52 27 80 25 db f2 | 79 7c f2 ce e3 4d 99 fa 0f 82 50 fa bd f3 31 31 | 75 5b 04 3c f4 62 cf 98 a6 3b 30 69 aa fe de 35 | fe 70 61 92 ab 0c 67 96 0d 80 c2 5b c7 8c 3b 7a | 1d cc 0e d5 c6 71 9d 10 b0 4a ac f9 9f b7 d7 6d | 29 1a 45 c3 c8 c4 88 f8 4d dd 53 1c d2 5c 13 5d | 0b 9c e9 d4 6a e6 6d db d7 74 a8 c2 b2 2b 2e 99 | c1 be 2c 7e b9 9a 61 61 42 22 a8 96 77 9d c3 f9 | 9b eb 60 04 cc 7a e8 a6 1b 7a bb 42 2e 5c de 12 | 29 00 00 24 89 93 ef 63 4b 32 f6 be 90 74 d4 cc | df 00 dd 1b b5 27 60 b1 da 93 3c e5 82 5c 18 d4 | 92 56 47 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 b3 01 11 26 92 0f 1e 78 d6 0c e4 | b7 13 47 be 6e 37 68 a6 00 00 00 1c 00 00 40 05 | 24 f3 9b 24 06 cb fe aa 4a 7c a0 cb 8e 4b 56 de | 28 62 03 f5 | state #276 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36004b850 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b12bc0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12bc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #276 | libevent_malloc: new ptr-libevent@0x7fb36800cf80 size 128 | #276 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49666.940483 | resume sending helper answer for #276 suppresed complete_v2_state_transition() and stole MD | #276 spent 0.559 milliseconds in resume sending helper answer | stop processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb348008e30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 d8 09 67 95 19 ff f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #276 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #276 | rejected packet: | 97 d8 09 67 95 19 ff f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 18 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #276: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0733 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #271 | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #271 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #271 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49666.958751; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500834 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6e010 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #271 | libevent_malloc: new ptr-libevent@0x7fb348008e30 size 128 "road-eastnet-nonat-19" #271: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #271) | 7d 5f ba e3 47 14 e8 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 b7 7f 1c 9b af 52 72 9a 96 12 4e c3 f7 5f 8a | 48 37 54 79 d7 e3 fa 14 73 ed 20 d0 0f 82 32 1d | 91 7e 9e e7 72 47 b7 f9 8c ea 5f f8 df 55 12 c4 | 92 bb 9f b6 bd 08 63 49 16 85 39 f9 e1 a5 b1 3c | c9 58 9d 54 19 7c 80 7a 60 14 04 1b 66 54 39 2c | 16 d8 67 8c 1c 17 da 4b 4f 1f bb d2 83 f8 37 fc | 93 5f 92 af 49 5f 4c f2 18 ce 79 e8 01 4b 07 77 | 80 53 3f 3e 68 e0 6b 21 fa 6f 05 3a 1d 5f f9 c2 | 5b 34 da 08 fc 81 e1 b6 3f ef a7 e1 31 76 84 4b | db 66 e5 6b 4f 6c 18 0f ea 47 e4 2c 6a c6 c7 06 | 5d 0a 4e 6f d5 bc 0f 88 7b d7 82 6f 83 51 d3 f6 | 3f a3 4c ff 85 ee cb 4b c1 01 38 69 a0 a8 36 14 | 78 3e d3 db 38 75 17 e9 a4 a3 59 d1 1c af a4 4d | 60 05 9d fd 70 d0 ca cf 0e 66 4b c6 c1 40 c4 3b | 1b 74 97 05 ab 30 3b 52 e7 0a 00 36 d3 75 ae 4d | 76 9f 37 1c a2 58 eb 22 e1 c0 ab af b2 c0 c6 2e | 29 00 00 24 7c 82 5e 31 94 0b 65 4a 1d 71 08 ad | 0f 28 62 96 1d 12 64 f9 13 f9 d7 4a bb 8e a2 2a | 74 49 fb 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 80 df fd 55 81 8a 62 6a df 6a a7 | 9f a0 5f ab 49 a7 33 15 00 00 00 1c 00 00 40 05 | 73 c3 81 b2 53 ff c8 44 e3 9d 4d 41 12 c0 55 97 | b5 95 22 52 | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #271 spent 0.178 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 5f ba e3 47 14 e8 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #271 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #271 | rejected packet: | 7d 5f ba e3 47 14 e8 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #271: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0758 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fbb00 | handling event EVENT_RETRANSMIT for parent state #257 | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #257 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #257 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49666.961142; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003755 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #257 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 "road-eastnet-nonat-5" #257: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #257) | c0 a3 3d d0 6b df 36 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 d4 14 bb a4 26 08 82 2e 68 9d 43 5b 83 0c 36 | 1f 55 d2 1d bf 09 8f 68 0a 80 73 cf b9 a3 3e fb | 4d 3a 5e 68 e8 aa 15 71 f7 e6 60 e6 9e 7c a9 b9 | e4 7c a0 fd c4 92 d3 66 8d 75 86 7f 7f 0a c5 42 | be bb d7 8c fb b4 ab fa c5 83 64 ff dd e6 56 27 | af 9a f1 86 53 58 3b 72 b7 e4 76 4e c9 2a af 68 | 0c 7e 9d bf 26 26 ae 59 6b f6 99 f5 1c 3d 32 4e | 8e a7 43 0e b2 0c 7f 5d ea 3a c0 50 3e 6f 7e 61 | fc 39 14 9d d7 51 ad 13 b2 22 e7 6c 3e 75 0f f9 | 50 5f 45 31 fb b6 64 15 77 12 e2 82 5e ea a6 ae | e9 ef 71 7b ce a0 63 c0 ec ed c4 35 36 4d 8b ac | a2 1c 05 95 aa 9f 05 c7 da bb 7e 2c 1b be db 0a | e1 a0 b3 b2 bf 79 ee 31 3e 48 4e 05 00 26 ce 87 | 2f 0f 18 80 43 59 d6 73 3e f5 b2 95 2a 4d b8 2d | f4 60 f9 1a 76 3c f3 63 33 e3 37 34 73 88 ed 64 | 6c a7 75 12 ca d0 e5 a3 5b 68 0d 46 dd d7 61 2d | 29 00 00 24 ee 5d 7d 66 4d 0b a2 50 89 9d 46 31 | 30 20 ae b6 b5 b0 95 a5 d1 00 de 3b e5 de 68 17 | ec 12 56 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 5f 0f 32 08 df d5 f3 1e 89 e0 00 | bf de 72 4a a1 a4 e7 89 00 00 00 1c 00 00 40 05 | 60 f8 1e fb ae 99 6b 12 d7 c7 12 5b 86 70 02 5c | 5c f6 f1 68 | libevent_free: release ptr-libevent@0x7fb380027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fbb00 | #257 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c0 a3 3d d0 6b df 36 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #257 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #257 | rejected packet: | c0 a3 3d d0 6b df 36 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #257: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0733 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #267 | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #267 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #267 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49666.963527; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003115 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fbb00 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #267 | libevent_malloc: new ptr-libevent@0x7fb380027c10 size 128 "road-eastnet-nonat-15" #267: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #267) | 6f db 88 0f fe 70 dc 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e ec fe e4 22 11 a7 b5 a2 ee 25 53 3a 2f 1c 0a | 48 51 04 db 46 22 ad 6d 3c 60 e2 cb fb cc f5 7a | 6d 5e c9 24 ec d8 52 4f 96 5b 62 28 fb 9e eb fd | ac e9 f7 6f 4d 1a f9 74 24 29 e6 a2 80 a2 a7 c1 | b9 1c da 76 8c 9d 40 38 6a 26 13 d3 da 72 01 42 | b6 16 9c ca 09 1d 9b a9 90 70 fb 71 d1 ea b4 45 | 95 3b 5d b5 2c c1 00 ea bd 33 e0 43 00 b9 22 f4 | c9 60 90 dc b0 82 03 89 b0 c4 03 22 4b cf 7c 50 | 96 60 35 da 9c 4c f2 64 7d be b4 90 21 9b 54 ab | 96 09 b1 ee 1f 0d db 8e 22 4d 09 d6 43 6f c8 f1 | da 0c fd f4 69 33 b0 96 0f 1a 25 07 1d e6 1b 37 | 20 ff 37 b4 80 d9 a3 78 93 5a eb 5d 36 bd 9e 35 | 1e 0e a9 e8 13 eb 16 8f ff d5 26 ef c2 d5 47 45 | 91 9b e3 0e c5 08 1f 34 46 fe b0 3e f5 ce e1 c7 | 7c 47 c2 2d d2 f7 4c 06 62 a0 ae f2 e6 53 ff 73 | ee d6 e5 9b 28 8e f3 4d ef ad 40 41 9e 20 99 95 | 29 00 00 24 6d 5a fb f5 8a b7 85 2e cf 37 31 c5 | a8 e8 a7 22 a7 58 7e 34 8e 06 61 77 f0 7b 3b ce | d2 d0 22 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 b4 63 c8 b9 e3 2d fa 51 7c 79 27 | ca 3c 7a c2 0c 39 1a 2b 00 00 00 1c 00 00 40 05 | d9 fc ba 6b 91 d3 e0 ee c2 81 f3 1d 92 b2 24 2f | bf 44 6b 65 | libevent_free: release ptr-libevent@0x7fb364008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #267 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f db 88 0f fe 70 dc 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #267 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #267 | rejected packet: | 6f db 88 0f fe 70 dc 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #267: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0725 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc40 | handling event EVENT_RETRANSMIT for parent state #258 | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #258 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #258 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49667.029844; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002628 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #258 | libevent_malloc: new ptr-libevent@0x7fb364008e30 size 128 "road-eastnet-nonat-6" #258: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #258) | f2 0a ee 39 57 38 66 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 84 a5 7f 13 c6 d5 f4 de a1 59 9b a0 a0 80 f1 | 2f 8b 06 61 d1 0f de 44 77 49 a3 76 3f 11 11 d4 | ab 9b 3e 8d 7f a0 dc 2b 42 28 86 6f ac 5b b2 c2 | 4e 03 12 4c 72 0a d1 f2 0b 69 dc 3f 47 15 b3 66 | 0b ed 38 4d 89 9d b6 26 e5 44 a2 c8 18 05 1d ea | b9 5a 63 00 12 16 1b 15 c7 6e b8 4d 60 58 cc f0 | 35 6e d0 c1 0c 7a 3b 52 20 a4 ce 3e e5 c0 cc 56 | 65 b1 16 d6 43 c2 be ea b5 3f 07 6c 04 df 3c 27 | ca 5b 39 2e f2 76 09 d5 9a 31 cd f8 a0 9b 56 3c | 42 b3 87 82 b1 01 3e ef 89 15 5a 1d 00 90 84 19 | 5b 3d 7c ec 45 07 76 99 d3 04 39 db f5 94 ae 9f | 9a 24 93 91 e4 3f ad 43 d2 f2 74 b3 73 89 3f f4 | ac 15 1c 07 3d d0 3a 58 a4 bb b4 b2 b0 c3 65 db | c7 15 7a 2b b3 96 c2 16 55 b0 f5 86 dd bf d9 cf | 01 e1 ae 2e 78 f6 40 62 df cc 04 cf 9d bd 05 f9 | 5f ef 7a 44 a4 51 1c 3a 9b b4 7d 0d 94 46 3e a1 | 29 00 00 24 25 6d bb 73 f8 76 14 9e e8 94 3a 77 | d7 da 85 ed f6 46 fc 67 4e bb 29 38 0b 6c 4c 96 | c6 a5 48 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da 43 d0 a7 5e 1e 6a 3c 4c 0b bd b4 | fc 0a 0a d4 c2 f3 96 56 00 00 00 1c 00 00 40 05 | 20 be 8b da 4d a1 7e 30 5a c5 49 1f 20 a4 27 d3 | b3 85 6c 0e | libevent_free: release ptr-libevent@0x7fb37404b5c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc40 | #258 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 0a ee 39 57 38 66 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #258 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #258 | rejected packet: | f2 0a ee 39 57 38 66 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #258: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45310 | handling event EVENT_RETRANSMIT for parent state #25 | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #25 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #25 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49667.031123; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010244 exceeds limit? YES "road-eastnet-nonat-25" #25: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-25" #25: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #277 at 0x557d469f5680 | State DB: adding IKEv2 state #277 in UNDEFINED | pstats #277 ikev2.ike started | Message ID: init #277: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #277: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #277; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-25" #277: initiating v2 parent SA to replace #25 | using existing local IKE proposals for connection road-eastnet-nonat-25 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 277 for state #277 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46abbc40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #277 | libevent_malloc: new ptr-libevent@0x7fb37404b5c0 size 128 | #277 spent 0.0864 milliseconds in ikev2_parent_outI1() | RESET processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 8 resuming | crypto helper 8 starting work-order 277 for state #277 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 277 | pstats #25 ikev2.ike failed too-many-retransmits | pstats #25 ikev2.ike deleted too-many-retransmits | #25 spent 2.56 milliseconds in total | [RE]START processing: state #25 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-25" #25: deleting state (STATE_PARENT_I1) aged 64.013s and NOT sending notification | parent state #25: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #25 "road-eastnet-nonat-25" #25: deleting IKE SA for connection 'road-eastnet-nonat-25' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-25' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-25 | State DB: deleting IKEv2 state #25 in PARENT_I1 | parent state #25: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 277 time elapsed 0.000568 seconds | stop processing: state #25 from 192.1.2.23:500 (in delete_state() at state.c:1143) | (#277) spent 0.574 milliseconds in crypto helper computing work-order 277: ikev2_outI1 KE (pcr) | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45310 | in statetime_stop() and could not find #25 | crypto helper 8 sending results from work-order 277 for state #277 to event queue | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #277 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7fb34c008e30 size 128 Initiating connection road-eastnet-nonat-25 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 8 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-25" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-25' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-25" | stop processing: connection "road-eastnet-nonat-25" (in initiate_a_connection() at initiate.c:349) | spent 0.0618 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #277 | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 277 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #277 | **emit ISAKMP Message: | initiator cookie: | ed b4 5b 7c 9c f8 2d 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-25 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 98 91 10 6d ca 19 82 3a d9 60 7a 42 28 66 35 e5 | ikev2 g^x 82 e1 76 6a af 41 1a 40 79 5a ee 26 e3 d1 7d 52 | ikev2 g^x 03 12 d2 f6 99 41 6c 71 1c 80 6b 42 ba dc 3a 1b | ikev2 g^x b2 e9 12 a6 18 73 56 76 a4 06 05 cc 7a a0 0d 6d | ikev2 g^x 5e b3 80 19 f7 55 aa 2e 78 b1 66 56 9c 95 5c 32 | ikev2 g^x ad 95 eb b3 ba 95 95 ac ab 11 2a 2d 88 4f f4 e4 | ikev2 g^x dc 27 65 85 9d 92 a4 95 34 90 00 dd a5 be b5 ab | ikev2 g^x 9b 9f 39 46 28 33 16 41 a9 bb 12 e3 aa e6 53 f9 | ikev2 g^x 68 46 b2 9f c5 cd e9 27 33 0f ce 44 2d af d9 1b | ikev2 g^x dd 62 0d ac 4f 6c d0 11 3c 43 0a 76 ed 0e 96 8e | ikev2 g^x 3d ae f9 37 d9 67 c1 41 28 1d b6 2e 37 94 9e d3 | ikev2 g^x 2d cd 56 12 85 bb 68 4b bc 82 79 db 1e 4d bb bf | ikev2 g^x 84 00 46 a4 83 fb 2f 52 63 fc 2d 22 07 38 b8 c2 | ikev2 g^x 10 b3 b9 89 01 dd 44 99 e7 b8 0d b3 ff 24 4d 13 | ikev2 g^x b0 46 f4 b8 d8 19 4c 50 4a 18 69 03 39 b2 07 55 | ikev2 g^x 2b c7 e7 99 0d e8 a0 4f a8 e9 77 f9 b1 03 fa af | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 29 c9 81 60 c0 da c9 2a 2b e1 7f 4a cf 46 c4 64 | IKEv2 nonce f1 f4 1c 69 ff e2 b3 05 a6 db d8 66 75 2e e0 a5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ed b4 5b 7c 9c f8 2d 55 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 19 | natd_hash: port= 01 f4 | natd_hash: hash= f2 88 a4 31 ce f7 11 c3 38 da 2b 8a 45 3d 50 97 | natd_hash: hash= 02 58 67 d6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f2 88 a4 31 ce f7 11 c3 38 da 2b 8a 45 3d 50 97 | Notify data 02 58 67 d6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ed b4 5b 7c 9c f8 2d 55 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 85 8b 47 13 68 9a a2 a7 47 76 c4 a7 6b ba 26 12 | natd_hash: hash= 0d c2 32 9d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 85 8b 47 13 68 9a a2 a7 47 76 c4 a7 6b ba 26 12 | Notify data 0d c2 32 9d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #277 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #277: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #277 to 4294967295 after switching state | Message ID: IKE #277 skipping update_recv as MD is fake | Message ID: sent #277 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-25" #277: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.25:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #277) | ed b4 5b 7c 9c f8 2d 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 91 10 6d ca 19 82 3a d9 60 7a 42 28 66 35 e5 | 82 e1 76 6a af 41 1a 40 79 5a ee 26 e3 d1 7d 52 | 03 12 d2 f6 99 41 6c 71 1c 80 6b 42 ba dc 3a 1b | b2 e9 12 a6 18 73 56 76 a4 06 05 cc 7a a0 0d 6d | 5e b3 80 19 f7 55 aa 2e 78 b1 66 56 9c 95 5c 32 | ad 95 eb b3 ba 95 95 ac ab 11 2a 2d 88 4f f4 e4 | dc 27 65 85 9d 92 a4 95 34 90 00 dd a5 be b5 ab | 9b 9f 39 46 28 33 16 41 a9 bb 12 e3 aa e6 53 f9 | 68 46 b2 9f c5 cd e9 27 33 0f ce 44 2d af d9 1b | dd 62 0d ac 4f 6c d0 11 3c 43 0a 76 ed 0e 96 8e | 3d ae f9 37 d9 67 c1 41 28 1d b6 2e 37 94 9e d3 | 2d cd 56 12 85 bb 68 4b bc 82 79 db 1e 4d bb bf | 84 00 46 a4 83 fb 2f 52 63 fc 2d 22 07 38 b8 c2 | 10 b3 b9 89 01 dd 44 99 e7 b8 0d b3 ff 24 4d 13 | b0 46 f4 b8 d8 19 4c 50 4a 18 69 03 39 b2 07 55 | 2b c7 e7 99 0d e8 a0 4f a8 e9 77 f9 b1 03 fa af | 29 00 00 24 29 c9 81 60 c0 da c9 2a 2b e1 7f 4a | cf 46 c4 64 f1 f4 1c 69 ff e2 b3 05 a6 db d8 66 | 75 2e e0 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 88 a4 31 ce f7 11 c3 38 da 2b 8a | 45 3d 50 97 02 58 67 d6 00 00 00 1c 00 00 40 05 | 85 8b 47 13 68 9a a2 a7 47 76 c4 a7 6b ba 26 12 | 0d c2 32 9d | state #277 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37404b5c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46abbc40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #277 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 | #277 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49667.032314 | resume sending helper answer for #277 suppresed complete_v2_state_transition() and stole MD | #277 spent 0.356 milliseconds in resume sending helper answer | stop processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c008e30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed b4 5b 7c 9c f8 2d 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #277 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #277 | rejected packet: | ed b4 5b 7c 9c f8 2d 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 19 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #277: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0391 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #272 | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #272 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #272 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49667.043496; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501076 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45310 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #272 | libevent_malloc: new ptr-libevent@0x7fb34c008e30 size 128 "road-eastnet-nonat-20" #272: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #272) | ff cb fd 37 8d 6e 61 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 04 b7 27 a5 a7 b8 66 d1 97 95 af 66 c3 e5 98 | ee b7 4e e8 fe 54 c0 2a 2c 35 b6 d6 11 41 10 b4 | 18 af 3b 75 f0 d4 8b ed 8c 54 fb a5 3b 9b 6b cd | 03 d4 cf 02 df ad 03 af ed 19 0c 47 fd 76 33 3e | 24 82 13 9d 24 33 be 90 d1 7f 59 52 78 71 71 b7 | d4 30 a1 93 8a 23 ef e8 5d 07 26 a3 58 a3 1a 46 | 2d 58 6b b7 bb c2 88 9f da 41 df 19 fa 55 01 88 | 63 f9 88 36 bf 3a 39 63 56 a1 2c 9c 43 fd a5 21 | f8 58 cf ff 69 0b 98 4e 19 2a 44 99 da 01 4c 80 | 0c 1f 77 fa 46 a9 9d c9 0d f6 84 3d b7 03 9e fa | 58 be 5a 4e 84 f9 db ea 37 27 1e 20 1a 6d 70 a9 | 48 8d a5 77 92 42 17 cb 45 b8 22 eb 9d 91 c6 90 | e3 e5 f3 a4 52 f9 ea e1 ca a2 a3 45 53 91 dc 5f | 97 6f 49 81 28 51 8e dc 29 b1 94 f1 3b a3 22 d7 | 94 cf 3a 4b 92 c4 95 64 a5 39 a2 3f 8c 62 a2 f6 | c1 95 97 06 70 da 53 50 e5 31 15 be f9 f5 d7 98 | 29 00 00 24 f6 15 1a 90 c8 9a 0e fb 04 05 1c c3 | 59 55 fa d7 2d f2 b7 dc b4 87 c3 61 27 da cc e0 | 74 b4 47 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee f8 1c 9f 4c fe 24 8c 43 92 80 29 | 12 02 33 5d 78 63 e2 5e 00 00 00 1c 00 00 40 05 | 82 23 9a b6 38 a9 7d af e0 d8 2e 1b 87 38 33 1a | f5 86 95 cf | libevent_free: release ptr-libevent@0x7fb384043210 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #272 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff cb fd 37 8d 6e 61 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #272 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #272 | rejected packet: | ff cb fd 37 8d 6e 61 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #272: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46906b40 | handling event EVENT_RETRANSMIT for parent state #26 | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #26 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #26 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49667.105796; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006644 exceeds limit? YES "road-eastnet-nonat-26" #26: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-26" #26: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #278 at 0x557d469f6c40 | State DB: adding IKEv2 state #278 in UNDEFINED | pstats #278 ikev2.ike started | Message ID: init #278: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #278: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #278; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-26" #278: initiating v2 parent SA to replace #26 | using existing local IKE proposals for connection road-eastnet-nonat-26 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 278 for state #278 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb33800d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #278 | libevent_malloc: new ptr-libevent@0x7fb384043210 size 128 | #278 spent 0.0715 milliseconds in ikev2_parent_outI1() | crypto helper 12 resuming | RESET processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 starting work-order 278 for state #278 | start processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 278 | pstats #26 ikev2.ike failed too-many-retransmits | pstats #26 ikev2.ike deleted too-many-retransmits | #26 spent 2.46 milliseconds in total | [RE]START processing: state #26 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-26" #26: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #26: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #26 "road-eastnet-nonat-26" #26: deleting IKE SA for connection 'road-eastnet-nonat-26' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-26' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-26 | State DB: deleting IKEv2 state #26 in PARENT_I1 | parent state #26: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #26 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 278 time elapsed 0.001009 seconds | libevent_free: release ptr-libevent@0x557d46906b80 | (#278) spent 1.01 milliseconds in crypto helper computing work-order 278: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 278 for state #278 to event queue | scheduling resume sending helper answer for #278 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46906b40 | libevent_malloc: new ptr-libevent@0x7fb340008e30 size 128 | in statetime_stop() and could not find #26 | crypto helper 12 waiting (nothing to do) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-26 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-26" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-26' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-26" | stop processing: connection "road-eastnet-nonat-26" (in initiate_a_connection() at initiate.c:349) | spent 0.0605 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #278 | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 278 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #278 | **emit ISAKMP Message: | initiator cookie: | 08 20 1d 54 94 b3 08 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-26 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c5 a1 ac cd cf 52 aa c1 15 fd 26 f6 ce 5b bb 69 | ikev2 g^x e2 24 51 98 69 82 96 7a 9b 39 3d bd 86 5c 17 cb | ikev2 g^x 1b d4 a9 83 ec 80 8d 8d 98 27 4b 99 f4 20 5c e3 | ikev2 g^x 21 59 7a 6e 94 3a e5 a4 ea 37 74 6c a3 9a 99 f4 | ikev2 g^x 8f 90 94 d4 bd 67 d7 b9 06 e3 7c d1 d3 76 37 58 | ikev2 g^x 47 a2 45 8a db 7e f9 85 d6 08 20 a6 bf 2b 7f c1 | ikev2 g^x 25 eb a0 f8 68 c1 9c c0 38 d2 e7 d9 43 7b cb 27 | ikev2 g^x 99 db 05 15 9d 31 4d 0f 10 f4 8b 1c a6 46 f5 eb | ikev2 g^x 21 00 56 37 46 de 0d 94 e5 1c 55 ca 89 03 da 88 | ikev2 g^x 4e dc 76 55 16 95 7d 63 e2 29 4d 09 2b 25 59 20 | ikev2 g^x f9 0f f3 3f f2 2e bd 84 bc f5 d7 26 2f 24 33 39 | ikev2 g^x 9b 95 39 a9 c8 80 99 61 48 09 51 76 c7 02 f7 7e | ikev2 g^x 9a 29 d4 87 ca 9f 9d b2 ea 2d 4b 02 ce 90 b0 a7 | ikev2 g^x 7e 1d de da 63 ea 0e 8d 96 e6 95 fb 1c 5e 88 3b | ikev2 g^x 6e ec 99 33 d7 e2 75 ac ca 10 ec 9b 00 5a c4 5e | ikev2 g^x 94 67 a1 9a 10 a7 22 d4 3e d5 55 a9 17 c5 c5 72 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 16 ad f5 49 a7 87 af 94 50 48 7a 22 f4 eb b9 a7 | IKEv2 nonce 0c 25 3c c9 61 3d 03 4a 9f 4c 8f 7c d3 51 5e 0a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 08 20 1d 54 94 b3 08 49 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1a | natd_hash: port= 01 f4 | natd_hash: hash= 5e fe 64 30 2d 54 01 ce c5 20 30 8e 57 4b dd bc | natd_hash: hash= f4 7a 78 34 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5e fe 64 30 2d 54 01 ce c5 20 30 8e 57 4b dd bc | Notify data f4 7a 78 34 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 08 20 1d 54 94 b3 08 49 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c5 ea 3a 3a ae 73 b8 b7 65 be 1b eb 5d 99 4d a3 | natd_hash: hash= 57 6c 56 99 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c5 ea 3a 3a ae 73 b8 b7 65 be 1b eb 5d 99 4d a3 | Notify data 57 6c 56 99 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #278 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #278: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #278 to 4294967295 after switching state | Message ID: IKE #278 skipping update_recv as MD is fake | Message ID: sent #278 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-26" #278: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.26:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #278) | 08 20 1d 54 94 b3 08 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 a1 ac cd cf 52 aa c1 15 fd 26 f6 ce 5b bb 69 | e2 24 51 98 69 82 96 7a 9b 39 3d bd 86 5c 17 cb | 1b d4 a9 83 ec 80 8d 8d 98 27 4b 99 f4 20 5c e3 | 21 59 7a 6e 94 3a e5 a4 ea 37 74 6c a3 9a 99 f4 | 8f 90 94 d4 bd 67 d7 b9 06 e3 7c d1 d3 76 37 58 | 47 a2 45 8a db 7e f9 85 d6 08 20 a6 bf 2b 7f c1 | 25 eb a0 f8 68 c1 9c c0 38 d2 e7 d9 43 7b cb 27 | 99 db 05 15 9d 31 4d 0f 10 f4 8b 1c a6 46 f5 eb | 21 00 56 37 46 de 0d 94 e5 1c 55 ca 89 03 da 88 | 4e dc 76 55 16 95 7d 63 e2 29 4d 09 2b 25 59 20 | f9 0f f3 3f f2 2e bd 84 bc f5 d7 26 2f 24 33 39 | 9b 95 39 a9 c8 80 99 61 48 09 51 76 c7 02 f7 7e | 9a 29 d4 87 ca 9f 9d b2 ea 2d 4b 02 ce 90 b0 a7 | 7e 1d de da 63 ea 0e 8d 96 e6 95 fb 1c 5e 88 3b | 6e ec 99 33 d7 e2 75 ac ca 10 ec 9b 00 5a c4 5e | 94 67 a1 9a 10 a7 22 d4 3e d5 55 a9 17 c5 c5 72 | 29 00 00 24 16 ad f5 49 a7 87 af 94 50 48 7a 22 | f4 eb b9 a7 0c 25 3c c9 61 3d 03 4a 9f 4c 8f 7c | d3 51 5e 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e fe 64 30 2d 54 01 ce c5 20 30 8e | 57 4b dd bc f4 7a 78 34 00 00 00 1c 00 00 40 05 | c5 ea 3a 3a ae 73 b8 b7 65 be 1b eb 5d 99 4d a3 | 57 6c 56 99 | state #278 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb384043210 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb33800d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #278 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 | #278 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49667.107387 | resume sending helper answer for #278 suppresed complete_v2_state_transition() and stole MD | #278 spent 0.33 milliseconds in resume sending helper answer | stop processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb340008e30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 20 1d 54 94 b3 08 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #278 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #278 | rejected packet: | 08 20 1d 54 94 b3 08 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1a fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #278: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abfd80 | handling event EVENT_RETRANSMIT for parent state #268 | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #268 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #268 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49667.120571; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000292 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34002a950 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #268 | libevent_malloc: new ptr-libevent@0x7fb340008e30 size 128 "road-eastnet-nonat-16" #268: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #268) | 52 eb eb 01 2e 07 ee 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f4 ef 40 5e f5 2a 5e 5a b8 76 94 37 37 12 d2 32 | 87 80 98 31 81 5e ec c8 c0 10 ea 13 f1 32 fd 22 | 5f da f7 72 2a 67 06 fa cf 7f d5 1a c1 ae f1 92 | 7b 53 ad 16 00 b6 90 61 58 94 dd 7e 4a 9f 32 98 | a2 2e 9b 12 92 70 47 ac 39 ac 02 84 c9 35 b9 57 | 66 95 1c 62 b4 f0 47 38 3f ec 43 4d cf 73 e8 45 | 9f d1 15 db ca 5d 1c f1 70 f1 97 a1 2b 7d 26 5e | 27 c8 08 1e 0d d7 2a 7e 36 db 89 18 87 f0 43 11 | e3 cf c8 31 7d 0e ae 6a 97 23 05 40 5d 11 ea 66 | a1 79 e8 97 cf 5c 5b 3a eb e7 1e c8 25 eb 2f 83 | 00 66 8b 3e 05 72 c5 6e 34 08 88 16 97 1a 13 a9 | db 9b 7b 48 0f 92 cf 65 2a 3e cf 88 08 c6 cf 54 | d9 1b 5a 78 a6 05 e8 73 bf 3a d4 a6 65 47 24 50 | 20 0c 6c 69 e0 29 4a aa 5a 89 69 c7 3c 4d 82 76 | 81 c9 87 1d 60 f0 a9 b6 29 2b 06 98 6d a9 24 c8 | 1d 5c 2b 40 de 5d 36 a1 45 5d 5e 8a 48 e6 0b 26 | 29 00 00 24 f0 fa c9 ee f6 f5 97 a2 44 c5 ea 10 | 5b 58 db 61 17 58 ca 3c df 15 b8 1a de 90 ef 49 | 16 34 e4 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 2c 2a b2 6d be c9 76 69 fe e4 41 | f1 72 73 59 2e 97 3f f1 00 00 00 1c 00 00 40 05 | 31 f5 db e1 45 48 68 14 42 b0 53 d9 a4 6c d5 a0 | 03 9b fe 80 | libevent_free: release ptr-libevent@0x7fb348048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abfd80 | #268 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 eb eb 01 2e 07 ee 4b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #268 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #268 | rejected packet: | 52 eb eb 01 2e 07 ee 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #268: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae8980 | handling event EVENT_RETRANSMIT for parent state #259 | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #259 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #259 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49667.131867; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00271 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abfd80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #259 | libevent_malloc: new ptr-libevent@0x7fb348048a10 size 128 "road-eastnet-nonat-7" #259: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #259) | 69 c4 5c 94 f6 f0 24 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe b3 f9 68 3e 85 57 5d 74 26 b7 37 f5 c1 1c c8 | a9 30 6a e1 51 a4 0f d5 ca 35 4b e9 d0 ec d0 ea | 11 06 1a ad 0a 7c 08 a4 ce 70 10 ef b2 c9 82 43 | 06 fb 99 b0 99 d2 5d a2 87 5b cd a0 9b 7d 7a a3 | 30 f9 78 c0 d7 43 6f f3 cc 53 5a 43 25 d8 61 04 | 58 03 b6 71 c6 21 93 59 b3 7c 3f 84 50 6d 48 95 | ef b8 dc 96 69 dc 88 98 10 47 21 0a 3d 72 57 34 | e5 bd d9 b3 4a 55 2e bb 34 64 f1 be 1c 6f f2 7e | c5 4b 83 c8 2c d8 e9 41 02 95 ff 83 96 69 c2 56 | 98 1b 20 30 7a bc 8b ab ee 27 a0 89 22 93 25 c7 | d2 f1 b0 c8 12 06 e6 8d 9a d7 bd fc 06 14 66 23 | 65 ae e6 9e 37 44 0c f0 0e 0e 78 09 b8 a3 32 c3 | c6 25 1b 97 0b 77 db 90 b8 16 58 5f 15 d2 40 fe | 1c d0 5e e3 88 05 3b ef bc 19 2c a9 73 97 03 9a | 26 fc 47 8b 95 24 fe d4 39 f2 65 5a 9f ee 0c cf | 1a 9b 03 45 52 42 61 4d b6 e7 aa 2c 0c 37 c0 61 | 29 00 00 24 c4 2f 3e 0e 76 3e 59 e7 3e 5c 53 28 | 43 02 fc a9 7a 2b 47 13 2c c2 eb 53 3e b5 40 d1 | 94 dc e6 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 85 30 eb 64 9e 84 09 e0 70 76 01 | 65 fa d3 ac 84 56 a3 b4 00 00 00 1c 00 00 40 05 | 64 83 da b1 99 b6 d9 28 72 08 34 2c 77 b4 36 a0 | 74 09 78 83 | libevent_free: release ptr-libevent@0x7fb36804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae8980 | #259 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 c4 5c 94 f6 f0 24 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #259 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #259 | rejected packet: | 69 c4 5c 94 f6 f0 24 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #259: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #273 | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #273 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #273 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49667.156142; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501187 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae8980 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #273 | libevent_malloc: new ptr-libevent@0x7fb36804b850 size 128 "road-eastnet-nonat-21" #273: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #273) | ed 1f ad f4 73 76 3f ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad fb 2c d6 61 18 78 ff ff 9e ac 8e 11 6e 5b 0a | 17 90 d5 cd a5 72 c6 44 33 06 36 88 ef 85 f7 fd | d1 32 bf e5 b4 df 1c 2a 44 4b 64 5a 5c fa a6 e7 | a7 88 cd 98 18 db 83 1c de 12 34 1a 01 c0 6e 90 | b0 37 b6 8e 3f bc 29 ae 17 56 d9 4e 3e aa f9 1a | 05 22 37 90 a3 98 0c 9d fd 31 f5 89 2b 79 38 70 | a3 3c e3 a6 be b6 20 06 92 92 77 84 f9 e1 f6 43 | 50 c4 75 3f ce 2c 7f a3 83 07 1e 29 12 48 86 d5 | b6 e2 61 df c8 2b 9c ea 45 c9 6b 62 38 f9 06 23 | 9b a2 90 c4 51 19 47 e4 c9 9e bb 38 c5 ea 4c 2c | 24 15 a0 60 6e 12 c1 7a cd 75 9f 6a 97 65 4f 9f | 6f aa 7c 8b b3 99 29 be 41 56 ad 5d 52 77 c8 87 | f1 18 76 ec 44 be fb bf 14 5e 22 ec 7b 78 cb 22 | 16 62 54 b4 5f 5e ed e0 38 14 64 69 82 ec fb 0f | 84 be 3a 69 27 17 b5 b0 42 81 a7 3b e2 19 f7 47 | ac 1d 3d ca 8c d0 ae cf 0d f7 a8 a2 36 9e 94 83 | 29 00 00 24 a4 16 d5 7c 26 cc bd 52 fc 33 91 77 | f2 08 cb df 04 12 5c f5 f3 31 f7 87 08 22 5b ef | 2b 8c 5b 44 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 3d 78 9d 41 51 b9 57 ea 0d 4a 5f | 38 c6 cb 30 ec f2 21 4b 00 00 00 1c 00 00 40 05 | bd ec 33 2a 1b 35 fa ad 7a ef 73 f7 d9 b0 09 33 | b4 e9 3f 2e | libevent_free: release ptr-libevent@0x7fb34001f920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #273 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 1f ad f4 73 76 3f ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #273 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #273 | rejected packet: | ed 1f ad f4 73 76 3f ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #273: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350005860 | handling event EVENT_RETRANSMIT for parent state #27 | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #27 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #27 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49667.1805; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.016252 exceeds limit? YES "road-eastnet-nonat-27" #27: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-27" #27: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #279 at 0x557d469f8200 | State DB: adding IKEv2 state #279 in UNDEFINED | pstats #279 ikev2.ike started | Message ID: init #279: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #279: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #279; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-27" #279: initiating v2 parent SA to replace #27 | using existing local IKE proposals for connection road-eastnet-nonat-27 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 279 for state #279 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46afe580 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #279 | libevent_malloc: new ptr-libevent@0x7fb34001f920 size 128 | #279 spent 0.0816 milliseconds in ikev2_parent_outI1() | RESET processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #27 ikev2.ike failed too-many-retransmits | pstats #27 ikev2.ike deleted too-many-retransmits | #27 spent 2.44 milliseconds in total | [RE]START processing: state #27 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-27" #27: deleting state (STATE_PARENT_I1) aged 64.017s and NOT sending notification | parent state #27: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #27 "road-eastnet-nonat-27" #27: deleting IKE SA for connection 'road-eastnet-nonat-27' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-27' added to the list and scheduled for 0 seconds | crypto helper 5 resuming | crypto helper 5 starting work-order 279 for state #279 | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 279 | in connection_discard for connection road-eastnet-nonat-27 | State DB: deleting IKEv2 state #27 in PARENT_I1 | parent state #27: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 279 time elapsed 0.000783 seconds | (#279) spent 0.789 milliseconds in crypto helper computing work-order 279: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 279 for state #279 to event queue | stop processing: state #27 from 192.1.2.23:500 (in delete_state() at state.c:1143) | scheduling resume sending helper answer for #279 | libevent_free: release ptr-libevent@0x7fb350009640 | libevent_malloc: new ptr-libevent@0x7fb344008e30 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350005860 | in statetime_stop() and could not find #27 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 5 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-27 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-27" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-27' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-27" | stop processing: connection "road-eastnet-nonat-27" (in initiate_a_connection() at initiate.c:349) | spent 0.0623 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #279 | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 279 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #279 | **emit ISAKMP Message: | initiator cookie: | e3 74 db 6d 09 5b 39 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-27 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 03 0f 5a 1b 7a 8f ca c9 79 23 84 5e dc 90 86 16 | ikev2 g^x 69 23 cd b6 f6 38 83 88 87 a0 82 5d cb 87 94 7a | ikev2 g^x a5 f1 35 43 62 38 5c 18 da 06 83 48 7b 51 b2 80 | ikev2 g^x 57 ee 54 19 13 b6 1b 59 ab b3 f3 ce 4e 70 21 d2 | ikev2 g^x 1d 3f 07 6b c1 ad 15 8b 16 67 f3 79 c6 3f ee ff | ikev2 g^x 6b 97 0c 11 61 f6 68 6d 51 5b dc dc 69 1e f2 f8 | ikev2 g^x 31 6f 04 6f 19 7c a8 a9 37 a2 da ca be a8 40 a8 | ikev2 g^x d0 ef 42 ba be 70 25 1f 20 b2 dd 25 56 46 50 6a | ikev2 g^x 55 24 29 65 1f 8b ad 5a c0 f3 1f c2 6d ed 0d 17 | ikev2 g^x f8 37 85 23 72 0c 7b c5 c8 05 6a d0 1b 38 ca f1 | ikev2 g^x 63 79 aa 8b f0 75 7e c0 5c 06 26 d0 c2 20 b9 e9 | ikev2 g^x c7 89 2f ee 84 27 1c 00 f8 3a d5 7e 2a be c2 84 | ikev2 g^x e4 6a 7c 0c 25 65 bb 41 df ad ea 07 28 2c bc 6e | ikev2 g^x 24 1b 9a 66 f8 83 86 6a 84 b0 d9 93 6f e5 9a 01 | ikev2 g^x 17 24 34 ac 82 0a b8 a3 51 37 c3 89 94 09 92 d7 | ikev2 g^x 0d 37 14 e0 ee 1c 1b 73 ef 46 af cc fd ba 52 42 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f9 6f e2 b3 2b d1 43 b4 d3 29 40 07 4f e9 c5 79 | IKEv2 nonce 33 c1 2e 78 27 6c f8 54 58 c2 d9 c9 00 b6 d5 b4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e3 74 db 6d 09 5b 39 a6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1b | natd_hash: port= 01 f4 | natd_hash: hash= de 94 ec 05 36 41 29 fa 93 f5 5d d2 39 00 ad d2 | natd_hash: hash= 4d 2f 36 81 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data de 94 ec 05 36 41 29 fa 93 f5 5d d2 39 00 ad d2 | Notify data 4d 2f 36 81 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e3 74 db 6d 09 5b 39 a6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7a 98 d6 69 28 79 15 19 95 89 31 96 52 96 29 94 | natd_hash: hash= 7d 8f c3 a4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7a 98 d6 69 28 79 15 19 95 89 31 96 52 96 29 94 | Notify data 7d 8f c3 a4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #279 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #279: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #279 to 4294967295 after switching state | Message ID: IKE #279 skipping update_recv as MD is fake | Message ID: sent #279 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-27" #279: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.27:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #279) | e3 74 db 6d 09 5b 39 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 0f 5a 1b 7a 8f ca c9 79 23 84 5e dc 90 86 16 | 69 23 cd b6 f6 38 83 88 87 a0 82 5d cb 87 94 7a | a5 f1 35 43 62 38 5c 18 da 06 83 48 7b 51 b2 80 | 57 ee 54 19 13 b6 1b 59 ab b3 f3 ce 4e 70 21 d2 | 1d 3f 07 6b c1 ad 15 8b 16 67 f3 79 c6 3f ee ff | 6b 97 0c 11 61 f6 68 6d 51 5b dc dc 69 1e f2 f8 | 31 6f 04 6f 19 7c a8 a9 37 a2 da ca be a8 40 a8 | d0 ef 42 ba be 70 25 1f 20 b2 dd 25 56 46 50 6a | 55 24 29 65 1f 8b ad 5a c0 f3 1f c2 6d ed 0d 17 | f8 37 85 23 72 0c 7b c5 c8 05 6a d0 1b 38 ca f1 | 63 79 aa 8b f0 75 7e c0 5c 06 26 d0 c2 20 b9 e9 | c7 89 2f ee 84 27 1c 00 f8 3a d5 7e 2a be c2 84 | e4 6a 7c 0c 25 65 bb 41 df ad ea 07 28 2c bc 6e | 24 1b 9a 66 f8 83 86 6a 84 b0 d9 93 6f e5 9a 01 | 17 24 34 ac 82 0a b8 a3 51 37 c3 89 94 09 92 d7 | 0d 37 14 e0 ee 1c 1b 73 ef 46 af cc fd ba 52 42 | 29 00 00 24 f9 6f e2 b3 2b d1 43 b4 d3 29 40 07 | 4f e9 c5 79 33 c1 2e 78 27 6c f8 54 58 c2 d9 c9 | 00 b6 d5 b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 94 ec 05 36 41 29 fa 93 f5 5d d2 | 39 00 ad d2 4d 2f 36 81 00 00 00 1c 00 00 40 05 | 7a 98 d6 69 28 79 15 19 95 89 31 96 52 96 29 94 | 7d 8f c3 a4 | state #279 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34001f920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46afe580 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #279 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 | #279 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49667.181904 | resume sending helper answer for #279 suppresed complete_v2_state_transition() and stole MD | #279 spent 0.329 milliseconds in resume sending helper answer | stop processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb344008e30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 74 db 6d 09 5b 39 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #279 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #279 | rejected packet: | e3 74 db 6d 09 5b 39 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #279: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #260 | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #260 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #260 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49667.235079; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003266 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #260 | libevent_malloc: new ptr-libevent@0x7fb344008e30 size 128 "road-eastnet-nonat-8" #260: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #260) | a8 de 56 29 b7 d6 fa 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 e3 e7 0b 5e 0a a2 78 28 90 d4 10 18 db 3b 08 | b2 da 89 a3 10 0a cf 73 47 c7 8b 62 54 ef 17 0b | 52 d6 fe 33 62 21 4b 61 30 79 d1 82 82 85 ea 34 | 5e 16 ec db dd eb 97 56 18 30 74 8c 1f 6e 05 89 | 21 09 2b 1f b9 bc b7 45 38 93 12 7a 5d 44 53 c4 | 90 d3 d5 13 c2 0f fd 6b 37 3e 25 38 05 ed f0 2b | cb 0f 13 a8 c7 9b fe 60 00 1a 65 af 42 72 d4 bd | f1 07 94 0e 72 26 91 81 83 ee ff ef 41 c2 92 80 | a0 7f b9 6c 1f d2 e5 4b 34 fe 68 33 41 4d c0 3b | fb 7e 82 89 76 4f ab b4 81 d9 20 1a 79 fa de 75 | 7d a8 cd 19 c4 08 7c dc 7d 50 74 8e 78 b5 b3 64 | 8b 8f bd fd e8 f9 24 be 78 a0 45 9f 10 40 3e e1 | 49 ba 58 e8 63 d1 38 81 0c 79 61 75 c1 98 81 43 | 9b e0 a1 0d fc da 35 4b 0e a9 e1 35 63 d5 73 64 | db 23 3e 1b a9 3a 4e c0 e5 7f 6a ab 90 f3 cd 49 | 1b bf e5 c9 ab 56 60 25 6c 22 94 4d da ff b4 bb | 29 00 00 24 2b a8 af 62 73 94 e5 0a 7f 70 bf f7 | 73 9f 36 a9 cb 1b e2 09 0a 24 49 93 58 be a0 29 | 94 31 83 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 87 5d ef 8f 65 c8 58 d0 3b 6f e5 | c6 10 af 28 1a 1c e2 ed 00 00 00 1c 00 00 40 05 | 7a 28 e6 3f f8 c3 d1 0c 25 ff 6a 7c a9 a5 77 33 | 24 34 82 26 | libevent_free: release ptr-libevent@0x7fb3480300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #260 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad9ac0 | handling event EVENT_RETRANSMIT for parent state #28 | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #28 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #28 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49667.235219; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008343 exceeds limit? YES "road-eastnet-nonat-28" #28: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-28" #28: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #280 at 0x557d469f97c0 | State DB: adding IKEv2 state #280 in UNDEFINED | pstats #280 ikev2.ike started | Message ID: init #280: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #280: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #280; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-28" #280: initiating v2 parent SA to replace #28 | using existing local IKE proposals for connection road-eastnet-nonat-28 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 280 for state #280 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb348005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #280 | libevent_malloc: new ptr-libevent@0x7fb3480300e0 size 128 | #280 spent 0.0673 milliseconds in ikev2_parent_outI1() | RESET processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 resuming | crypto helper 3 starting work-order 280 for state #280 | start processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #28 ikev2.ike failed too-many-retransmits | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 280 | pstats #28 ikev2.ike deleted too-many-retransmits | #28 spent 2.2 milliseconds in total | [RE]START processing: state #28 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-28" #28: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #28: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #28 "road-eastnet-nonat-28" #28: deleting IKE SA for connection 'road-eastnet-nonat-28' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-28' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-28 | State DB: deleting IKEv2 state #28 in PARENT_I1 | parent state #28: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #28 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb36003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad9ac0 | in statetime_stop() and could not find #28 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 de 56 29 b7 d6 fa 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #260 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #260 | rejected packet: | a8 de 56 29 b7 d6 fa 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 08 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #260: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-28 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-28" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-28' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-28" | stop processing: connection "road-eastnet-nonat-28" (in initiate_a_connection() at initiate.c:349) | spent 0.0706 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 280 time elapsed 0.001471 seconds | (#280) spent 1.47 milliseconds in crypto helper computing work-order 280: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 280 for state #280 to event queue | scheduling resume sending helper answer for #280 | libevent_malloc: new ptr-libevent@0x7fb338008e30 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #280 | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 280 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #280 | **emit ISAKMP Message: | initiator cookie: | d6 f7 ab 7c 0b ea 69 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-28 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ca e1 05 9c 2f e1 85 fc d1 c1 5e ec 37 7e 0d 76 | ikev2 g^x 45 c5 de cd 99 7d 74 0a 48 32 65 23 49 b2 c2 df | ikev2 g^x ba 7e d2 ef 7c 32 31 03 10 0c 09 94 c0 eb b8 b5 | ikev2 g^x 06 97 c9 45 66 24 48 7d 72 da ab 98 55 09 59 9c | ikev2 g^x 31 af 0e c1 8a a9 90 d1 a5 1f 67 f1 af 23 81 27 | ikev2 g^x 72 13 c8 3c d8 f0 f1 d8 ca c2 a1 9a 92 8c fd 09 | ikev2 g^x b0 c2 a6 d5 91 c6 84 9b 99 40 a3 ac 3e 94 44 cd | ikev2 g^x 9a 36 6e be f8 2c 85 77 18 29 38 0d c0 06 06 d0 | ikev2 g^x a2 de 4c 8d 95 cd da f4 a0 2f bd 4d 70 4f 95 ae | ikev2 g^x db 5a f3 57 de 7c dd 31 a6 66 ca aa 68 cf 9d 1d | ikev2 g^x b3 0a 17 80 b5 20 24 43 82 44 17 25 0f 38 64 50 | ikev2 g^x 75 9d 57 76 b6 2b ee 0e 3f 93 33 cf 3f 9b 45 97 | ikev2 g^x f9 87 b6 87 a6 ec cb 33 18 44 a7 89 6a 59 c0 2b | ikev2 g^x ff 8a 7d 67 3d 1a 08 05 fe 9f fa 6c b7 f7 96 5d | ikev2 g^x a2 3b 23 c8 4a 7c 17 7b 08 d8 db 48 f9 5d 62 1b | ikev2 g^x 0b 5f d0 c6 c6 a2 28 ed 7c 45 7a f3 33 a6 d2 1f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 05 cd b3 b7 f3 87 52 75 9b b2 14 f4 c3 19 28 f7 | IKEv2 nonce 78 65 e3 f9 18 22 0f 07 13 10 65 88 f1 44 b8 c7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d6 f7 ab 7c 0b ea 69 05 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1c | natd_hash: port= 01 f4 | natd_hash: hash= 8a b5 25 17 f4 1a 4f 2a 05 d2 2d 99 3c 89 36 9b | natd_hash: hash= 9d 62 ed 5f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8a b5 25 17 f4 1a 4f 2a 05 d2 2d 99 3c 89 36 9b | Notify data 9d 62 ed 5f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d6 f7 ab 7c 0b ea 69 05 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ee 9f 85 88 b6 c7 ef c2 a5 c8 d9 f7 7a e7 a6 c3 | natd_hash: hash= 70 03 54 b6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ee 9f 85 88 b6 c7 ef c2 a5 c8 d9 f7 7a e7 a6 c3 | Notify data 70 03 54 b6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #280 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #280: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #280 to 4294967295 after switching state | Message ID: IKE #280 skipping update_recv as MD is fake | Message ID: sent #280 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-28" #280: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.28:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #280) | d6 f7 ab 7c 0b ea 69 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca e1 05 9c 2f e1 85 fc d1 c1 5e ec 37 7e 0d 76 | 45 c5 de cd 99 7d 74 0a 48 32 65 23 49 b2 c2 df | ba 7e d2 ef 7c 32 31 03 10 0c 09 94 c0 eb b8 b5 | 06 97 c9 45 66 24 48 7d 72 da ab 98 55 09 59 9c | 31 af 0e c1 8a a9 90 d1 a5 1f 67 f1 af 23 81 27 | 72 13 c8 3c d8 f0 f1 d8 ca c2 a1 9a 92 8c fd 09 | b0 c2 a6 d5 91 c6 84 9b 99 40 a3 ac 3e 94 44 cd | 9a 36 6e be f8 2c 85 77 18 29 38 0d c0 06 06 d0 | a2 de 4c 8d 95 cd da f4 a0 2f bd 4d 70 4f 95 ae | db 5a f3 57 de 7c dd 31 a6 66 ca aa 68 cf 9d 1d | b3 0a 17 80 b5 20 24 43 82 44 17 25 0f 38 64 50 | 75 9d 57 76 b6 2b ee 0e 3f 93 33 cf 3f 9b 45 97 | f9 87 b6 87 a6 ec cb 33 18 44 a7 89 6a 59 c0 2b | ff 8a 7d 67 3d 1a 08 05 fe 9f fa 6c b7 f7 96 5d | a2 3b 23 c8 4a 7c 17 7b 08 d8 db 48 f9 5d 62 1b | 0b 5f d0 c6 c6 a2 28 ed 7c 45 7a f3 33 a6 d2 1f | 29 00 00 24 05 cd b3 b7 f3 87 52 75 9b b2 14 f4 | c3 19 28 f7 78 65 e3 f9 18 22 0f 07 13 10 65 88 | f1 44 b8 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a b5 25 17 f4 1a 4f 2a 05 d2 2d 99 | 3c 89 36 9b 9d 62 ed 5f 00 00 00 1c 00 00 40 05 | ee 9f 85 88 b6 c7 ef c2 a5 c8 d9 f7 7a e7 a6 c3 | 70 03 54 b6 | state #280 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3480300e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb348005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #280 | libevent_malloc: new ptr-libevent@0x7fb36003b0b0 size 128 | #280 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49667.237234 | resume sending helper answer for #280 suppresed complete_v2_state_transition() and stole MD | #280 spent 0.347 milliseconds in resume sending helper answer | stop processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb338008e30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 f7 ab 7c 0b ea 69 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #280 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #280 | rejected packet: | d6 f7 ab 7c 0b ea 69 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1c fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #280: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0403 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c780 | handling event EVENT_RETRANSMIT for parent state #274 | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #274 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #274 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49667.240441; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500236 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad9ac0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #274 | libevent_malloc: new ptr-libevent@0x7fb338008e30 size 128 "road-eastnet-nonat-22" #274: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #274) | 97 f1 23 53 d2 3b 4d 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 bf aa 44 4c 86 42 20 d8 9e 9a 10 8c 03 23 1c | 55 12 c5 05 17 54 35 db 09 ea 86 4f 1e 8f 7b 32 | 9a 2a b0 4c f2 e7 18 73 a1 a0 fd e2 40 07 2c 7c | b0 86 fe c9 c0 0a 24 ee 0b e2 8f 65 27 f4 ce d4 | 26 d0 8a 70 5c 4d 46 36 4c d7 e9 bc 9b 95 2b 48 | 94 a5 c8 98 b4 23 f8 e0 8f 7c 6d 1d 50 c7 fe 04 | 1c ce 6b 59 2b ed cf 4a 5b 4f 67 9e cc 11 c0 53 | 7c 50 d5 3e bd 07 f0 e3 56 2a 0b ae b3 c0 99 43 | bb 92 8e 39 19 7e 1e c2 71 84 a0 76 9a 0f 7a 85 | 50 cf 0d 7d 85 0a 08 cc ee a1 bd c3 88 dd 8a de | e2 9f 70 d5 bb 76 44 f0 e2 0f 12 4d ae 88 a5 a4 | 51 38 bf fa 0f 38 f4 4c bb e3 25 bf 62 88 5c 87 | e1 a2 de e1 56 a5 9f 6b ce 90 dc 86 6d 26 32 32 | 64 ae 0b ac fa 3a f6 9e fa 00 00 26 02 a9 70 2e | af 79 3d a8 07 0b 81 d4 53 f3 46 fc 05 11 f6 55 | 0d 1d 8f a8 e0 93 58 07 b0 a8 c9 54 c5 14 a2 da | 29 00 00 24 59 ef 9f ca 6d 42 ee 4c de 0a 4a 8e | ec df b4 6b 0d dd 66 fa b2 ad 6d 66 92 77 f9 cb | 4b 49 7a f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8d 80 80 1b 6e 73 7e e3 fb 20 6a a8 | f2 02 f1 bf e6 58 62 ac 00 00 00 1c 00 00 40 05 | 31 9f 40 90 8f 0e 1c 6e 4b 7e bf d8 97 47 82 19 | e1 cf 25 c8 | libevent_free: release ptr-libevent@0x7fb37402a710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c780 | #274 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 f1 23 53 d2 3b 4d 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #274 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #274 | rejected packet: | 97 f1 23 53 d2 3b 4d 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #274: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ced0 | handling event EVENT_RETRANSMIT for parent state #269 | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #269 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #269 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49667.258731; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002083 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c780 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #269 | libevent_malloc: new ptr-libevent@0x7fb37402a710 size 128 "road-eastnet-nonat-17" #269: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #269) | 42 2b 66 77 50 7b f1 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 1a b0 80 05 00 53 b8 88 37 a8 0d e8 4e c0 81 | 57 b8 c1 99 be 60 6c 42 36 80 aa e8 7e 86 e2 1b | dc 47 d3 0f cf c7 46 a8 c8 47 ce ff 99 14 e6 14 | 37 44 15 18 25 7b d6 ca f2 0f 00 2d 17 01 df 08 | ac fe e9 d3 2b 32 d0 3c 75 39 46 f3 2a a6 98 c3 | 1d b7 82 4a b4 92 84 4b b3 2d b3 71 d7 06 52 b9 | 9c eb 15 89 b5 c8 16 c5 e1 29 05 f5 12 64 42 f4 | a0 b3 32 62 fe 43 4c 1c 4e 1e 53 37 a8 e8 52 23 | 53 0e 82 46 38 b3 95 ea 7e 47 ae 7b 38 c7 ec ac | 8c 74 78 5b e3 a1 ba 65 7c 63 27 19 55 d3 7e f5 | 2f 36 c3 b3 a1 0f 84 2a 85 17 e4 09 e8 35 c4 82 | 08 59 25 c5 6f 5d dc d6 ee 2f dc 6b 0a a2 5d f8 | d2 8d a0 b1 da 71 a0 b2 68 ba c7 d1 ba 7e e6 81 | d8 e3 b3 84 de 3a 47 64 3d 04 00 a0 60 be 1c 4f | 52 66 df 3f 77 fe 53 0c dd cd ed 75 7e 76 02 77 | cc 4e de 99 d4 98 4e 1e 30 09 c0 9e cb c6 a1 c0 | 29 00 00 24 b8 ee 66 5c df cb 58 d0 1b a4 60 c3 | 1b 92 52 a8 29 57 57 d2 02 37 76 e3 2d 2f 31 c7 | 4b 37 7d fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 73 36 11 68 b5 eb 4b 5f e8 3f ce | 5b fc b9 99 cc 0c 05 c7 00 00 00 1c 00 00 40 05 | 7f dd 18 35 5d 55 ec 33 76 f4 f0 dc 77 e6 e3 3b | 97 a2 2b d9 | libevent_free: release ptr-libevent@0x7fb350008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ced0 | #269 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 2b 66 77 50 7b f1 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #269 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #269 | rejected packet: | 42 2b 66 77 50 7b f1 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #269: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0499 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aee080 | handling event EVENT_RETRANSMIT for parent state #29 | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #29 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #29 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49667.304042; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010906 exceeds limit? YES "road-eastnet-nonat-29" #29: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-29" #29: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #281 at 0x557d469fad80 | State DB: adding IKEv2 state #281 in UNDEFINED | pstats #281 ikev2.ike started | Message ID: init #281: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #281: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #281; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-29" #281: initiating v2 parent SA to replace #29 | using existing local IKE proposals for connection road-eastnet-nonat-29 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 281 for state #281 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7ced0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #281 | libevent_malloc: new ptr-libevent@0x7fb350008e30 size 128 | #281 spent 0.0884 milliseconds in ikev2_parent_outI1() | RESET processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #29 ikev2.ike failed too-many-retransmits | pstats #29 ikev2.ike deleted too-many-retransmits | #29 spent 2.73 milliseconds in total | [RE]START processing: state #29 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-29" #29: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | crypto helper 1 resuming | crypto helper 1 starting work-order 281 for state #281 | parent state #29: PARENT_I1(half-open IKE SA) => delete | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 281 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #29 "road-eastnet-nonat-29" #29: deleting IKE SA for connection 'road-eastnet-nonat-29' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-29' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-29 | State DB: deleting IKEv2 state #29 in PARENT_I1 | parent state #29: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 281 time elapsed 0.00089 seconds | stop processing: state #29 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb36c046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aee080 | in statetime_stop() and could not find #29 | (#281) spent 0.892 milliseconds in crypto helper computing work-order 281: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 281 for state #281 to event queue | scheduling resume sending helper answer for #281 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb38800c460 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 1 waiting (nothing to do) Initiating connection road-eastnet-nonat-29 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-29" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-29' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-29" | stop processing: connection "road-eastnet-nonat-29" (in initiate_a_connection() at initiate.c:349) | spent 0.0709 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #281 | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 281 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #281 | **emit ISAKMP Message: | initiator cookie: | 6e a6 a1 b4 01 a0 0e dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-29 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d0 68 2b 46 8c 2b 9e 7f b4 06 ec 72 36 3a be fa | ikev2 g^x 50 91 b7 48 61 bc d4 d3 11 dc 1f d6 9a c1 21 a2 | ikev2 g^x 97 1d cf c0 4e 3d 88 c1 96 35 32 5c c3 c4 b5 d1 | ikev2 g^x 96 85 b6 1e 34 48 5e 70 e1 97 d1 4d ee c9 36 cd | ikev2 g^x 07 d4 c1 98 8c 4b f8 c0 2b 58 50 1f 39 3f 7e 62 | ikev2 g^x c9 4e 54 20 95 c8 4c fc 93 c6 64 05 ff db 54 92 | ikev2 g^x f9 8c d4 27 f6 69 ac 7b 53 12 4d 7e 22 de e0 4c | ikev2 g^x 9b 65 6e 55 e2 59 db 77 7d a0 70 9f cd fd b6 7a | ikev2 g^x 15 79 9a 65 29 97 e4 c6 46 84 7b 52 6e 4e 1b 43 | ikev2 g^x 80 ec d1 87 3d 75 43 f1 6b 08 60 65 d9 e2 6c 04 | ikev2 g^x c5 f0 75 0d 72 fe 09 0a a5 0a 64 0c 9d 8e b4 bd | ikev2 g^x 1a c3 bb 6e f6 92 c0 b5 8c 93 b9 eb e3 12 c7 a1 | ikev2 g^x bd b7 f3 a0 b9 80 8c 76 59 8f 43 af 0f 58 66 7f | ikev2 g^x b7 29 f0 c0 1c a1 51 2d c9 c0 ac e0 da 3e 0a fc | ikev2 g^x dd 42 1f ec 76 07 0c b3 ee 58 80 d8 3b 40 cd 6e | ikev2 g^x 29 12 48 14 35 22 e0 cf 05 9a 1b 46 91 35 4f 0c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1a c7 00 d3 83 91 04 b5 76 85 d3 69 a2 08 a9 2c | IKEv2 nonce b0 b3 a2 60 be 18 eb 18 2d fd ba 85 0c 0a 5c be | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6e a6 a1 b4 01 a0 0e dd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1d | natd_hash: port= 01 f4 | natd_hash: hash= e4 cf b4 85 53 44 b8 30 db 31 85 32 18 7e 13 4c | natd_hash: hash= d0 54 13 87 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e4 cf b4 85 53 44 b8 30 db 31 85 32 18 7e 13 4c | Notify data d0 54 13 87 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6e a6 a1 b4 01 a0 0e dd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 54 d2 36 85 02 19 96 85 9c 4b 22 1c 55 b4 68 ad | natd_hash: hash= 30 56 22 92 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 54 d2 36 85 02 19 96 85 9c 4b 22 1c 55 b4 68 ad | Notify data 30 56 22 92 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #281 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #281: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #281 to 4294967295 after switching state | Message ID: IKE #281 skipping update_recv as MD is fake | Message ID: sent #281 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-29" #281: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.29:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #281) | 6e a6 a1 b4 01 a0 0e dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 68 2b 46 8c 2b 9e 7f b4 06 ec 72 36 3a be fa | 50 91 b7 48 61 bc d4 d3 11 dc 1f d6 9a c1 21 a2 | 97 1d cf c0 4e 3d 88 c1 96 35 32 5c c3 c4 b5 d1 | 96 85 b6 1e 34 48 5e 70 e1 97 d1 4d ee c9 36 cd | 07 d4 c1 98 8c 4b f8 c0 2b 58 50 1f 39 3f 7e 62 | c9 4e 54 20 95 c8 4c fc 93 c6 64 05 ff db 54 92 | f9 8c d4 27 f6 69 ac 7b 53 12 4d 7e 22 de e0 4c | 9b 65 6e 55 e2 59 db 77 7d a0 70 9f cd fd b6 7a | 15 79 9a 65 29 97 e4 c6 46 84 7b 52 6e 4e 1b 43 | 80 ec d1 87 3d 75 43 f1 6b 08 60 65 d9 e2 6c 04 | c5 f0 75 0d 72 fe 09 0a a5 0a 64 0c 9d 8e b4 bd | 1a c3 bb 6e f6 92 c0 b5 8c 93 b9 eb e3 12 c7 a1 | bd b7 f3 a0 b9 80 8c 76 59 8f 43 af 0f 58 66 7f | b7 29 f0 c0 1c a1 51 2d c9 c0 ac e0 da 3e 0a fc | dd 42 1f ec 76 07 0c b3 ee 58 80 d8 3b 40 cd 6e | 29 12 48 14 35 22 e0 cf 05 9a 1b 46 91 35 4f 0c | 29 00 00 24 1a c7 00 d3 83 91 04 b5 76 85 d3 69 | a2 08 a9 2c b0 b3 a2 60 be 18 eb 18 2d fd ba 85 | 0c 0a 5c be 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 cf b4 85 53 44 b8 30 db 31 85 32 | 18 7e 13 4c d0 54 13 87 00 00 00 1c 00 00 40 05 | 54 d2 36 85 02 19 96 85 9c 4b 22 1c 55 b4 68 ad | 30 56 22 92 | state #281 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb350008e30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7ced0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ced0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #281 | libevent_malloc: new ptr-libevent@0x7fb36c046040 size 128 | #281 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49667.305752 | resume sending helper answer for #281 suppresed complete_v2_state_transition() and stole MD | #281 spent 0.488 milliseconds in resume sending helper answer | stop processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38800c460 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6e a6 a1 b4 01 a0 0e dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #281 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #281 | rejected packet: | 6e a6 a1 b4 01 a0 0e dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #281: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24700 | handling event EVENT_RETRANSMIT for parent state #275 | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #275 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #275 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49667.330921; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500406 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aee080 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #275 | libevent_malloc: new ptr-libevent@0x7fb38800c460 size 128 "road-eastnet-nonat-23" #275: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #275) | 8e 8a 90 cd 9e 92 16 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 db ff f3 45 8d 77 6b ab 4c f5 59 93 99 02 27 | 95 ea ea f3 ac f8 d0 0c f4 e4 a7 81 ed dc a2 2e | 80 d4 21 01 5a 1a 55 9b d3 86 c5 c8 54 08 80 87 | 53 03 95 88 ee 42 5d b8 52 8e fe 84 14 38 79 44 | c3 51 49 fc 97 0d 59 e0 5f 4b c0 5e f8 ec 96 9d | 9d 66 a2 14 38 ec b6 d3 b6 6a cc ee b5 48 0a 5e | 6f de 87 79 9d 43 73 e3 c3 11 60 66 e8 ee 7a 7d | c3 f9 f0 de 79 dc 04 3a 85 85 52 d2 92 21 fc 86 | 8d fd 20 94 86 24 05 6c 2b cb ee c9 04 8f 0f 93 | 01 a5 e2 2b 0c 12 b9 e6 3a 6c ef c0 32 59 e5 d2 | 3b 11 a2 9f 2d 5e e0 2d 8c 75 47 73 37 0b fd dc | 38 6f 1e 5d 62 ac ab 3b f8 90 5d 68 0c 10 a4 e3 | 5d d1 15 9f 1f d5 11 83 81 be 1d a7 8f 91 34 60 | 10 68 8c b7 8b 5a e8 bb 55 32 b6 ac 66 fb 13 bc | 8d 01 0f 0f f6 d9 7e e8 52 a6 18 9d f5 fb ae f8 | d6 4a f4 34 c9 7a eb 6e cd 1f ad 11 86 f4 37 e0 | 29 00 00 24 82 2a d3 ed 88 6f 6d 2b 95 fc ef 17 | cd da 04 83 d9 0b fe c7 f7 7a 31 0a 69 4f 17 0b | 3b dd fa 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 12 f4 6b 5c 7a 37 1f d4 51 59 a4 | 33 90 ab 79 b6 80 74 7b 00 00 00 1c 00 00 40 05 | 6b 59 3d 2d 41 62 79 69 4f 0b fb 7b cf 22 15 97 | 6d 57 a6 24 | libevent_free: release ptr-libevent@0x7fb344035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24700 | #275 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 8a 90 cd 9e 92 16 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #275 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #275 | rejected packet: | 8e 8a 90 cd 9e 92 16 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #275: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0474 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11680 | handling event EVENT_RETRANSMIT for parent state #261 | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #261 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #261 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49667.338219; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002431 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #261 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 "road-eastnet-nonat-9" #261: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #261) | 8b 59 1f 5e 29 ec 79 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 16 bb 69 7b 8c de a9 f0 aa 27 22 0c 50 1e 2b | c0 76 0c 79 99 31 2f f3 35 0b 93 05 6b 25 af d5 | 38 8a 63 51 f1 c7 93 6d 58 cf aa 10 dd 75 1f c8 | 55 42 4b ca 64 4b 8f 25 43 c0 98 a7 58 2f fe 43 | a0 fc e9 fe 8a 4f d9 62 8e db b8 54 42 5d 72 29 | 3d 08 a8 8c 4e d1 f1 b8 76 cf b0 d0 a2 dc ae 18 | 1b 5a 75 da 49 ca 9e c2 09 0d fb 74 50 88 ed a4 | d6 99 da c7 fb 22 1c 94 60 ac 50 76 4c a1 38 f1 | 43 ce 44 aa e7 39 3c 86 9e e1 41 54 48 c3 cb 31 | 48 d9 d1 19 bc cb 0b cc 7d 40 bf 96 af 1e df fb | 0f 62 79 6b f0 8e 05 4f 2e a0 3c cd 46 16 0c 86 | 49 e9 a6 e2 c2 86 c5 8e b2 14 0a be c1 f8 73 ee | bb d0 d9 50 52 32 c3 fa f2 3b b2 ca cc 8c 24 54 | 79 d5 c7 d3 1b 32 b7 28 de dd a1 c3 34 b8 54 c4 | ba 19 90 3e 1a d6 84 33 38 8c c1 45 94 fb 96 9e | 19 4c cd 4d d5 73 7e e1 8a 56 34 ce ca da 7f ec | 29 00 00 24 09 67 1c 9d 6c 7a 1d eb 24 78 5e 1f | a5 24 7e 35 ac a5 c4 f9 a0 f3 f8 63 91 47 e2 76 | a1 4d 73 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 76 e0 4e 77 d9 cf 89 73 cb 13 92 | b0 28 c4 2a 76 4e 4e 20 00 00 00 1c 00 00 40 05 | 7b 1f d5 2f e3 dc 02 0a cf 5f 34 da 40 53 6d 9d | 9b 7e 60 b7 | libevent_free: release ptr-libevent@0x7fb338048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11680 | #261 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 59 1f 5e 29 ec 79 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #261 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #261 | rejected packet: | 8b 59 1f 5e 29 ec 79 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #261: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac1340 | handling event EVENT_RETRANSMIT for parent state #270 | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #270 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #270 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49667.341477; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001187 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11680 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #270 | libevent_malloc: new ptr-libevent@0x7fb338048a10 size 128 "road-eastnet-nonat-18" #270: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #270) | 98 aa bb 79 2f f5 b5 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 24 f6 25 5f fa 71 0f 39 53 f1 8f 92 58 3c 59 | 8e c2 2e 28 53 ea 0d 58 1c b1 76 25 4f 77 d3 40 | 6f 45 9c 78 a8 01 99 46 d7 6e 57 ac 51 cd 32 20 | 87 d7 3c c9 3f 5e e0 a6 46 8c bc bb d2 2a 3a 19 | 0d 30 25 7b 8c f0 eb f6 7f 48 bd 51 fc 7c 03 2d | 42 fb c9 54 0b f3 df 3f 56 f4 9e 74 f1 22 86 89 | d4 fe 7d ea 34 26 2a 49 b7 c2 c2 c5 bf 06 dd 36 | be de 23 aa bf 61 22 5f 62 e1 04 e4 81 81 b4 1a | 94 68 45 c7 43 f9 2b f7 9c c7 da c1 6c f9 e0 19 | 3d 12 26 17 de 58 8c 74 5a 7c d1 ae 99 12 b1 cc | 7c fd 41 5e df 12 73 ff fe 24 d4 ac e3 4a 14 3c | a7 57 18 de 1a f8 e3 60 98 66 b7 e2 de d9 ef 30 | 7b 0c d1 7a 6d 0b f9 31 66 84 79 8b 8b 50 77 51 | 23 58 84 77 80 ea dc 70 95 5b e4 15 8d 98 42 aa | fa 93 a8 7a d7 2a 0d 51 24 2f ee fa 92 74 05 47 | d0 38 43 8c 6f cb 3f 1f 04 0b e8 57 ca ea 33 7e | 29 00 00 24 dd 5a f6 1e bd fb cd ef 92 3b 56 16 | bd 57 a2 0f d1 d5 f5 02 97 f4 10 bb 15 09 d8 8e | c9 9b 97 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 15 18 7d df ec 83 30 72 5b 68 c2 | 08 e3 c3 a4 d5 a2 af 25 00 00 00 1c 00 00 40 05 | b3 09 33 34 02 38 11 d4 03 64 9d 03 c3 5d 2b 94 | 2e 30 63 d3 | libevent_free: release ptr-libevent@0x7fb354008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac1340 | #270 spent 0.0918 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 aa bb 79 2f f5 b5 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #270 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #270 | rejected packet: | 98 aa bb 79 2f f5 b5 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #270: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46af6380 | handling event EVENT_RETRANSMIT for parent state #30 | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #30 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #30 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49667.394742; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.018373 exceeds limit? YES "road-eastnet-nonat-30" #30: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-30" #30: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #282 at 0x557d469fc550 | State DB: adding IKEv2 state #282 in UNDEFINED | pstats #282 ikev2.ike started | Message ID: init #282: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #282: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #282; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-30" #282: initiating v2 parent SA to replace #30 | using existing local IKE proposals for connection road-eastnet-nonat-30 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 282 for state #282 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ac1340 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #282 | libevent_malloc: new ptr-libevent@0x7fb354008e30 size 128 | #282 spent 0.126 milliseconds in ikev2_parent_outI1() | crypto helper 2 resuming | RESET processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 starting work-order 282 for state #282 | start processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 282 | pstats #30 ikev2.ike failed too-many-retransmits | pstats #30 ikev2.ike deleted too-many-retransmits | #30 spent 2.22 milliseconds in total | [RE]START processing: state #30 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-30" #30: deleting state (STATE_PARENT_I1) aged 64.020s and NOT sending notification | parent state #30: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #30 "road-eastnet-nonat-30" #30: deleting IKE SA for connection 'road-eastnet-nonat-30' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-30' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-30 | State DB: deleting IKEv2 state #30 in PARENT_I1 | parent state #30: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #30 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af6380 | in statetime_stop() and could not find #30 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-30 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-30" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-30' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-30" | stop processing: connection "road-eastnet-nonat-30" (in initiate_a_connection() at initiate.c:349) | spent 0.081 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 282 time elapsed 0.001644 seconds | (#282) spent 1.05 milliseconds in crypto helper computing work-order 282: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 282 for state #282 to event queue | scheduling resume sending helper answer for #282 | libevent_malloc: new ptr-libevent@0x7fb38000c460 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #282 | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 282 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #282 | **emit ISAKMP Message: | initiator cookie: | 46 9b 20 9a e5 8e c3 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-30 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b4 4a 4a 05 a5 e8 31 07 19 01 9a 3a 84 bd 00 2c | ikev2 g^x 01 26 e2 35 38 1d c2 10 27 23 65 e5 d1 d5 9e 9d | ikev2 g^x 93 4a 85 e7 79 d0 00 1e a3 c9 7f d0 87 96 13 32 | ikev2 g^x 3a 52 f9 aa fd 75 0f 57 d6 53 8b a2 5b 2a a9 29 | ikev2 g^x 20 47 1e e0 f6 79 b4 a2 d0 fd e2 85 9e 06 b0 c5 | ikev2 g^x 1f eb f9 ce 36 69 1b 53 58 8d aa 02 dd a3 93 19 | ikev2 g^x 8b 0f e6 94 85 c6 21 ed 47 d3 f5 ea 66 43 13 82 | ikev2 g^x da f0 e0 63 f7 98 28 5e a4 cb 20 f6 07 ee ef 26 | ikev2 g^x 67 cb 7a 06 89 6a a0 7d 08 f6 7d ba 27 41 9f 3f | ikev2 g^x f9 0e 8b 4e f2 9a 91 05 9e 11 34 81 a4 96 af ee | ikev2 g^x 90 6f f6 67 88 78 72 a1 94 39 66 b1 22 8d 82 7c | ikev2 g^x 2e db f6 a2 5d 7b a6 60 14 74 1c b3 6d 80 df 10 | ikev2 g^x f8 59 91 7e 94 04 39 3a 04 77 10 6d 00 3c a4 c9 | ikev2 g^x 37 8a d9 0b 42 ad 9c 7e 79 d0 0a 68 7a d1 19 02 | ikev2 g^x 3f 63 fb b2 47 d4 e3 0d 1d 5d 62 cd 37 80 af a2 | ikev2 g^x 0b a2 8f e1 3f b9 34 fc d9 39 c1 27 65 16 8f 01 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 43 cb 25 08 9c 10 6d 8d e0 8b af 6b 30 64 58 bc | IKEv2 nonce 44 4b 07 d1 a3 b6 7d 77 46 d8 bf 81 62 ff 7f 2f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 46 9b 20 9a e5 8e c3 c6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1e | natd_hash: port= 01 f4 | natd_hash: hash= 8f cf c8 c3 31 5e 18 fc ce 9a 0d be ec 9d b8 d1 | natd_hash: hash= d8 fa d9 18 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8f cf c8 c3 31 5e 18 fc ce 9a 0d be ec 9d b8 d1 | Notify data d8 fa d9 18 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 46 9b 20 9a e5 8e c3 c6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 91 0b 3b 5a da ea f5 67 3e 89 32 94 c9 4e eb eb | natd_hash: hash= e4 06 4e d6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 91 0b 3b 5a da ea f5 67 3e 89 32 94 c9 4e eb eb | Notify data e4 06 4e d6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #282 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #282: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #282 to 4294967295 after switching state | Message ID: IKE #282 skipping update_recv as MD is fake | Message ID: sent #282 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-30" #282: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.30:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #282) | 46 9b 20 9a e5 8e c3 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 4a 4a 05 a5 e8 31 07 19 01 9a 3a 84 bd 00 2c | 01 26 e2 35 38 1d c2 10 27 23 65 e5 d1 d5 9e 9d | 93 4a 85 e7 79 d0 00 1e a3 c9 7f d0 87 96 13 32 | 3a 52 f9 aa fd 75 0f 57 d6 53 8b a2 5b 2a a9 29 | 20 47 1e e0 f6 79 b4 a2 d0 fd e2 85 9e 06 b0 c5 | 1f eb f9 ce 36 69 1b 53 58 8d aa 02 dd a3 93 19 | 8b 0f e6 94 85 c6 21 ed 47 d3 f5 ea 66 43 13 82 | da f0 e0 63 f7 98 28 5e a4 cb 20 f6 07 ee ef 26 | 67 cb 7a 06 89 6a a0 7d 08 f6 7d ba 27 41 9f 3f | f9 0e 8b 4e f2 9a 91 05 9e 11 34 81 a4 96 af ee | 90 6f f6 67 88 78 72 a1 94 39 66 b1 22 8d 82 7c | 2e db f6 a2 5d 7b a6 60 14 74 1c b3 6d 80 df 10 | f8 59 91 7e 94 04 39 3a 04 77 10 6d 00 3c a4 c9 | 37 8a d9 0b 42 ad 9c 7e 79 d0 0a 68 7a d1 19 02 | 3f 63 fb b2 47 d4 e3 0d 1d 5d 62 cd 37 80 af a2 | 0b a2 8f e1 3f b9 34 fc d9 39 c1 27 65 16 8f 01 | 29 00 00 24 43 cb 25 08 9c 10 6d 8d e0 8b af 6b | 30 64 58 bc 44 4b 07 d1 a3 b6 7d 77 46 d8 bf 81 | 62 ff 7f 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f cf c8 c3 31 5e 18 fc ce 9a 0d be | ec 9d b8 d1 d8 fa d9 18 00 00 00 1c 00 00 40 05 | 91 0b 3b 5a da ea f5 67 3e 89 32 94 c9 4e eb eb | e4 06 4e d6 | state #282 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb354008e30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ac1340 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac1340 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #282 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 | #282 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49667.397196 | resume sending helper answer for #282 suppresed complete_v2_state_transition() and stole MD | #282 spent 0.527 milliseconds in resume sending helper answer | stop processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38000c460 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 9b 20 9a e5 8e c3 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #282 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #282 | rejected packet: | 46 9b 20 9a e5 8e c3 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1e fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #282: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12bc0 | handling event EVENT_RETRANSMIT for parent state #276 | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #276 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #276 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49667.440402; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499919 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af6380 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #276 | libevent_malloc: new ptr-libevent@0x7fb38000c460 size 128 "road-eastnet-nonat-24" #276: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #276) | 97 d8 09 67 95 19 ff f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e fe 65 45 24 16 54 b2 a7 14 49 9e 41 08 a6 ad | 8d 38 c1 ab 41 bc c5 70 74 ea 87 6b 47 67 61 c9 | 08 e4 05 10 d8 b1 89 eb 95 ae 5c c6 f1 8d 64 f6 | e2 34 f7 1e 96 bb c8 e4 08 d5 11 49 c7 13 d5 5b | 05 9d 02 33 71 55 11 11 24 9a 7a f7 2f f8 55 e9 | 49 16 da 32 11 31 25 c0 d3 d2 83 15 e8 61 24 52 | f4 f3 a7 f2 34 62 0e d9 54 b7 ea 87 42 a8 29 03 | 05 f5 e1 d2 8f 40 88 3f e8 e4 52 27 80 25 db f2 | 79 7c f2 ce e3 4d 99 fa 0f 82 50 fa bd f3 31 31 | 75 5b 04 3c f4 62 cf 98 a6 3b 30 69 aa fe de 35 | fe 70 61 92 ab 0c 67 96 0d 80 c2 5b c7 8c 3b 7a | 1d cc 0e d5 c6 71 9d 10 b0 4a ac f9 9f b7 d7 6d | 29 1a 45 c3 c8 c4 88 f8 4d dd 53 1c d2 5c 13 5d | 0b 9c e9 d4 6a e6 6d db d7 74 a8 c2 b2 2b 2e 99 | c1 be 2c 7e b9 9a 61 61 42 22 a8 96 77 9d c3 f9 | 9b eb 60 04 cc 7a e8 a6 1b 7a bb 42 2e 5c de 12 | 29 00 00 24 89 93 ef 63 4b 32 f6 be 90 74 d4 cc | df 00 dd 1b b5 27 60 b1 da 93 3c e5 82 5c 18 d4 | 92 56 47 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 b3 01 11 26 92 0f 1e 78 d6 0c e4 | b7 13 47 be 6e 37 68 a6 00 00 00 1c 00 00 40 05 | 24 f3 9b 24 06 cb fe aa 4a 7c a0 cb 8e 4b 56 de | 28 62 03 f5 | libevent_free: release ptr-libevent@0x7fb36800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12bc0 | #276 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 d8 09 67 95 19 ff f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #276 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #276 | rejected packet: | 97 d8 09 67 95 19 ff f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #276: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0727 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #262 | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #262 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #262 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49667.441766; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002945 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12bc0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #262 | libevent_malloc: new ptr-libevent@0x7fb36800cf80 size 128 "road-eastnet-nonat-10" #262: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #262) | 6c b6 05 ad 53 aa 46 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 71 41 19 2f e2 7d 30 6b 4e a1 e7 5c d2 fe 4f | e0 61 ad 09 53 0e a0 57 08 e6 8a c7 a8 ab 86 63 | b8 6a 7f 66 41 dd b7 63 7a df 2e dc eb 44 db ac | 84 60 8a 30 6d a6 8e c8 9b e0 4a d0 70 9a 6f d7 | 2b c0 d7 cf ec 52 70 50 23 5f 91 08 50 21 38 8b | 76 60 df cc d7 e8 a2 a1 14 d7 95 47 31 84 95 aa | a3 81 92 3c a4 0d 4b 28 d7 90 8d 56 f9 3c bf bc | 84 88 bc cf 92 1a d8 6c 91 60 d7 c8 53 4c 8f 1b | 33 3d 36 12 cc 21 af 62 59 3d a6 91 f5 8f 40 b1 | 5e 20 75 cb 09 ce 69 22 f7 ce 4e 56 bd 5c 4e 69 | 85 a0 6f 08 1d 3c a0 71 93 00 3c 05 be a2 5e a3 | 18 1e 44 5a 4d ed 58 8b 10 8f 38 84 6b ea 6f 25 | 2a 8f 86 0f 8b b5 6e ce 72 db 55 37 c3 3e 68 45 | 52 fb fc c3 b0 3a 37 24 8c 65 c9 ec 5e 24 2b c3 | 69 bc 27 c7 b0 7f 81 12 a0 6d 38 e6 33 39 b8 2c | 2a b9 3c 7a 5e 19 74 c7 ec ac 4b b5 b2 ea 83 d8 | 29 00 00 24 a4 15 8c 3a a3 1b 1e b6 c4 22 d7 fc | ab 68 38 21 36 11 f7 0b d4 9b 74 fb 1e 21 f2 3a | 1b 0d d1 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 64 14 a1 e8 e4 eb 96 cf 02 78 71 | fb d0 4f 54 fd 2f 47 94 00 00 00 1c 00 00 40 05 | f3 5b 09 5c ae 75 15 23 50 5d 21 6a e9 8d 68 9d | ed b0 04 c4 | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #262 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c b6 05 ad 53 aa 46 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #262 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #262 | rejected packet: | 6c b6 05 ad 53 aa 46 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #262: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0403 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6e010 | handling event EVENT_RETRANSMIT for parent state #271 | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #271 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #271 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49667.460012; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002095 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #271 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 "road-eastnet-nonat-19" #271: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #271) | 7d 5f ba e3 47 14 e8 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 b7 7f 1c 9b af 52 72 9a 96 12 4e c3 f7 5f 8a | 48 37 54 79 d7 e3 fa 14 73 ed 20 d0 0f 82 32 1d | 91 7e 9e e7 72 47 b7 f9 8c ea 5f f8 df 55 12 c4 | 92 bb 9f b6 bd 08 63 49 16 85 39 f9 e1 a5 b1 3c | c9 58 9d 54 19 7c 80 7a 60 14 04 1b 66 54 39 2c | 16 d8 67 8c 1c 17 da 4b 4f 1f bb d2 83 f8 37 fc | 93 5f 92 af 49 5f 4c f2 18 ce 79 e8 01 4b 07 77 | 80 53 3f 3e 68 e0 6b 21 fa 6f 05 3a 1d 5f f9 c2 | 5b 34 da 08 fc 81 e1 b6 3f ef a7 e1 31 76 84 4b | db 66 e5 6b 4f 6c 18 0f ea 47 e4 2c 6a c6 c7 06 | 5d 0a 4e 6f d5 bc 0f 88 7b d7 82 6f 83 51 d3 f6 | 3f a3 4c ff 85 ee cb 4b c1 01 38 69 a0 a8 36 14 | 78 3e d3 db 38 75 17 e9 a4 a3 59 d1 1c af a4 4d | 60 05 9d fd 70 d0 ca cf 0e 66 4b c6 c1 40 c4 3b | 1b 74 97 05 ab 30 3b 52 e7 0a 00 36 d3 75 ae 4d | 76 9f 37 1c a2 58 eb 22 e1 c0 ab af b2 c0 c6 2e | 29 00 00 24 7c 82 5e 31 94 0b 65 4a 1d 71 08 ad | 0f 28 62 96 1d 12 64 f9 13 f9 d7 4a bb 8e a2 2a | 74 49 fb 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 80 df fd 55 81 8a 62 6a df 6a a7 | 9f a0 5f ab 49 a7 33 15 00 00 00 1c 00 00 40 05 | 73 c3 81 b2 53 ff c8 44 e3 9d 4d 41 12 c0 55 97 | b5 95 22 52 | libevent_free: release ptr-libevent@0x7fb348008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6e010 | #271 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 5f ba e3 47 14 e8 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #271 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #271 | rejected packet: | 7d 5f ba e3 47 14 e8 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #271: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a42790 | handling event EVENT_RETRANSMIT for parent state #31 | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #31 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #31 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49667.472345; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.003111 exceeds limit? YES "road-eastnet-nonat-31" #31: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-31" #31: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #283 at 0x557d469fdb10 | State DB: adding IKEv2 state #283 in UNDEFINED | pstats #283 ikev2.ike started | Message ID: init #283: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #283: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #283; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-31" #283: initiating v2 parent SA to replace #31 | using existing local IKE proposals for connection road-eastnet-nonat-31 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 283 for state #283 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a6e010 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #283 | libevent_malloc: new ptr-libevent@0x7fb348008e30 size 128 | #283 spent 0.0936 milliseconds in ikev2_parent_outI1() | crypto helper 0 resuming | RESET processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 starting work-order 283 for state #283 | start processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #31 ikev2.ike failed too-many-retransmits | pstats #31 ikev2.ike deleted too-many-retransmits | #31 spent 2.58 milliseconds in total | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 283 | [RE]START processing: state #31 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-31" #31: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #31: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #31 "road-eastnet-nonat-31" #31: deleting IKE SA for connection 'road-eastnet-nonat-31' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-31' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-31 | State DB: deleting IKEv2 state #31 in PARENT_I1 | parent state #31: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #31 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 283 time elapsed 0.0007 seconds | libevent_free: release ptr-libevent@0x7fb36c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a42790 | in statetime_stop() and could not find #31 | (#283) spent 0.688 milliseconds in crypto helper computing work-order 283: ikev2_outI1 KE (pcr) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 0 sending results from work-order 283 for state #283 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #283 Initiating connection road-eastnet-nonat-31 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7fb38400c460 size 128 | crypto helper 0 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-31" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-31' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-31" | stop processing: connection "road-eastnet-nonat-31" (in initiate_a_connection() at initiate.c:349) | spent 0.0795 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #283 | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 283 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #283 | **emit ISAKMP Message: | initiator cookie: | 6d 25 6c e9 9d 21 2c 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-31 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5b e9 86 64 c6 6f 55 a3 bc 52 39 e5 45 42 b6 cc | ikev2 g^x f2 a4 d8 e4 d7 c3 31 05 04 56 63 c6 c2 26 bf 59 | ikev2 g^x 6a b9 a8 fc fa 31 7a 57 4f f1 c0 49 83 9c 61 f6 | ikev2 g^x ea 6e c3 47 87 15 57 34 67 e5 10 86 61 2d 48 bc | ikev2 g^x 65 9e 10 ea 92 ad c9 b9 04 73 b8 2e a2 d6 b3 0a | ikev2 g^x c0 be 8f 2a 6c 99 ba 2f e9 4c 9e ba 98 ae c9 a2 | ikev2 g^x 11 55 c6 05 57 8e ab ea fe ab c0 66 94 91 31 6d | ikev2 g^x 5a 61 9a c2 11 87 93 ed bf 92 59 c4 b9 84 ce ab | ikev2 g^x db 12 40 39 53 0e ae d0 f2 e5 17 3c ea 18 98 24 | ikev2 g^x 12 e5 c0 95 86 ac ec 82 ab 81 6f 9e 62 08 73 b9 | ikev2 g^x a8 9d e0 0f 7d f3 2e 0b 7e 07 bc 19 99 3e 51 81 | ikev2 g^x 29 43 73 f2 dc b1 11 40 fd 25 79 3c 57 b5 ab be | ikev2 g^x 2e e1 68 18 e4 38 d8 a0 4c 8c 74 5e ff df de 09 | ikev2 g^x df 96 78 f3 4d 4d f6 30 46 ec df 31 2f 74 61 0b | ikev2 g^x 81 46 62 97 97 55 58 f5 2a c4 6f df 71 dd ee 98 | ikev2 g^x ae ac aa b2 0f 96 9a 79 9a bd 7e 1b 8b 95 fc 2d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 19 7a 94 41 a3 df 39 c8 6e b5 7e 75 da 2c b2 db | IKEv2 nonce 58 bf cc 1e 51 b1 c7 de c1 0f 32 c8 22 50 94 5c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6d 25 6c e9 9d 21 2c 82 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1f | natd_hash: port= 01 f4 | natd_hash: hash= 55 90 7d 87 8b 25 a9 47 ca 59 98 98 30 6c 9b 73 | natd_hash: hash= ee 84 48 a4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 55 90 7d 87 8b 25 a9 47 ca 59 98 98 30 6c 9b 73 | Notify data ee 84 48 a4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6d 25 6c e9 9d 21 2c 82 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6c 03 cb 30 07 ff 71 63 de 15 87 b9 5c 0f 43 de | natd_hash: hash= 70 36 3d ec | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6c 03 cb 30 07 ff 71 63 de 15 87 b9 5c 0f 43 de | Notify data 70 36 3d ec | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #283 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #283: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #283 to 4294967295 after switching state | Message ID: IKE #283 skipping update_recv as MD is fake | Message ID: sent #283 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-31" #283: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.31:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #283) | 6d 25 6c e9 9d 21 2c 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b e9 86 64 c6 6f 55 a3 bc 52 39 e5 45 42 b6 cc | f2 a4 d8 e4 d7 c3 31 05 04 56 63 c6 c2 26 bf 59 | 6a b9 a8 fc fa 31 7a 57 4f f1 c0 49 83 9c 61 f6 | ea 6e c3 47 87 15 57 34 67 e5 10 86 61 2d 48 bc | 65 9e 10 ea 92 ad c9 b9 04 73 b8 2e a2 d6 b3 0a | c0 be 8f 2a 6c 99 ba 2f e9 4c 9e ba 98 ae c9 a2 | 11 55 c6 05 57 8e ab ea fe ab c0 66 94 91 31 6d | 5a 61 9a c2 11 87 93 ed bf 92 59 c4 b9 84 ce ab | db 12 40 39 53 0e ae d0 f2 e5 17 3c ea 18 98 24 | 12 e5 c0 95 86 ac ec 82 ab 81 6f 9e 62 08 73 b9 | a8 9d e0 0f 7d f3 2e 0b 7e 07 bc 19 99 3e 51 81 | 29 43 73 f2 dc b1 11 40 fd 25 79 3c 57 b5 ab be | 2e e1 68 18 e4 38 d8 a0 4c 8c 74 5e ff df de 09 | df 96 78 f3 4d 4d f6 30 46 ec df 31 2f 74 61 0b | 81 46 62 97 97 55 58 f5 2a c4 6f df 71 dd ee 98 | ae ac aa b2 0f 96 9a 79 9a bd 7e 1b 8b 95 fc 2d | 29 00 00 24 19 7a 94 41 a3 df 39 c8 6e b5 7e 75 | da 2c b2 db 58 bf cc 1e 51 b1 c7 de c1 0f 32 c8 | 22 50 94 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 90 7d 87 8b 25 a9 47 ca 59 98 98 | 30 6c 9b 73 ee 84 48 a4 00 00 00 1c 00 00 40 05 | 6c 03 cb 30 07 ff 71 63 de 15 87 b9 5c 0f 43 de | 70 36 3d ec | state #283 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb348008e30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a6e010 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6e010 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #283 | libevent_malloc: new ptr-libevent@0x7fb36c0180b0 size 128 | #283 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49667.473823 | resume sending helper answer for #283 suppresed complete_v2_state_transition() and stole MD | #283 spent 0.479 milliseconds in resume sending helper answer | stop processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38400c460 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 25 6c e9 9d 21 2c 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #283 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #283 | rejected packet: | 6d 25 6c e9 9d 21 2c 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1f fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #283: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc40 | handling event EVENT_RETRANSMIT for parent state #277 | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #277 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #277 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49667.533086; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500772 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a42790 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #277 | libevent_malloc: new ptr-libevent@0x7fb38400c460 size 128 "road-eastnet-nonat-25" #277: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #277) | ed b4 5b 7c 9c f8 2d 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 91 10 6d ca 19 82 3a d9 60 7a 42 28 66 35 e5 | 82 e1 76 6a af 41 1a 40 79 5a ee 26 e3 d1 7d 52 | 03 12 d2 f6 99 41 6c 71 1c 80 6b 42 ba dc 3a 1b | b2 e9 12 a6 18 73 56 76 a4 06 05 cc 7a a0 0d 6d | 5e b3 80 19 f7 55 aa 2e 78 b1 66 56 9c 95 5c 32 | ad 95 eb b3 ba 95 95 ac ab 11 2a 2d 88 4f f4 e4 | dc 27 65 85 9d 92 a4 95 34 90 00 dd a5 be b5 ab | 9b 9f 39 46 28 33 16 41 a9 bb 12 e3 aa e6 53 f9 | 68 46 b2 9f c5 cd e9 27 33 0f ce 44 2d af d9 1b | dd 62 0d ac 4f 6c d0 11 3c 43 0a 76 ed 0e 96 8e | 3d ae f9 37 d9 67 c1 41 28 1d b6 2e 37 94 9e d3 | 2d cd 56 12 85 bb 68 4b bc 82 79 db 1e 4d bb bf | 84 00 46 a4 83 fb 2f 52 63 fc 2d 22 07 38 b8 c2 | 10 b3 b9 89 01 dd 44 99 e7 b8 0d b3 ff 24 4d 13 | b0 46 f4 b8 d8 19 4c 50 4a 18 69 03 39 b2 07 55 | 2b c7 e7 99 0d e8 a0 4f a8 e9 77 f9 b1 03 fa af | 29 00 00 24 29 c9 81 60 c0 da c9 2a 2b e1 7f 4a | cf 46 c4 64 f1 f4 1c 69 ff e2 b3 05 a6 db d8 66 | 75 2e e0 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 88 a4 31 ce f7 11 c3 38 da 2b 8a | 45 3d 50 97 02 58 67 d6 00 00 00 1c 00 00 40 05 | 85 8b 47 13 68 9a a2 a7 47 76 c4 a7 6b ba 26 12 | 0d c2 32 9d | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc40 | #277 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed b4 5b 7c 9c f8 2d 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #277 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #277 | rejected packet: | ed b4 5b 7c 9c f8 2d 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #277: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45310 | handling event EVENT_RETRANSMIT for parent state #272 | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #272 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #272 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49667.544396; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001976 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc40 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #272 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 "road-eastnet-nonat-20" #272: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #272) | ff cb fd 37 8d 6e 61 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 04 b7 27 a5 a7 b8 66 d1 97 95 af 66 c3 e5 98 | ee b7 4e e8 fe 54 c0 2a 2c 35 b6 d6 11 41 10 b4 | 18 af 3b 75 f0 d4 8b ed 8c 54 fb a5 3b 9b 6b cd | 03 d4 cf 02 df ad 03 af ed 19 0c 47 fd 76 33 3e | 24 82 13 9d 24 33 be 90 d1 7f 59 52 78 71 71 b7 | d4 30 a1 93 8a 23 ef e8 5d 07 26 a3 58 a3 1a 46 | 2d 58 6b b7 bb c2 88 9f da 41 df 19 fa 55 01 88 | 63 f9 88 36 bf 3a 39 63 56 a1 2c 9c 43 fd a5 21 | f8 58 cf ff 69 0b 98 4e 19 2a 44 99 da 01 4c 80 | 0c 1f 77 fa 46 a9 9d c9 0d f6 84 3d b7 03 9e fa | 58 be 5a 4e 84 f9 db ea 37 27 1e 20 1a 6d 70 a9 | 48 8d a5 77 92 42 17 cb 45 b8 22 eb 9d 91 c6 90 | e3 e5 f3 a4 52 f9 ea e1 ca a2 a3 45 53 91 dc 5f | 97 6f 49 81 28 51 8e dc 29 b1 94 f1 3b a3 22 d7 | 94 cf 3a 4b 92 c4 95 64 a5 39 a2 3f 8c 62 a2 f6 | c1 95 97 06 70 da 53 50 e5 31 15 be f9 f5 d7 98 | 29 00 00 24 f6 15 1a 90 c8 9a 0e fb 04 05 1c c3 | 59 55 fa d7 2d f2 b7 dc b4 87 c3 61 27 da cc e0 | 74 b4 47 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee f8 1c 9f 4c fe 24 8c 43 92 80 29 | 12 02 33 5d 78 63 e2 5e 00 00 00 1c 00 00 40 05 | 82 23 9a b6 38 a9 7d af e0 d8 2e 1b 87 38 33 1a | f5 86 95 cf | libevent_free: release ptr-libevent@0x7fb34c008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45310 | #272 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff cb fd 37 8d 6e 61 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #272 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #272 | rejected packet: | ff cb fd 37 8d 6e 61 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #272: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b09380 | handling event EVENT_RETRANSMIT for parent state #32 | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #32 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #32 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49667.551683; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007867 exceeds limit? YES "road-eastnet-nonat-32" #32: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-32" #32: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #284 at 0x557d469ff0d0 | State DB: adding IKEv2 state #284 in UNDEFINED | pstats #284 ikev2.ike started | Message ID: init #284: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #284: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #284; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-32" #284: initiating v2 parent SA to replace #32 | using existing local IKE proposals for connection road-eastnet-nonat-32 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 284 for state #284 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a45310 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #284 | libevent_malloc: new ptr-libevent@0x7fb34c008e30 size 128 | #284 spent 0.0703 milliseconds in ikev2_parent_outI1() | RESET processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #32 ikev2.ike failed too-many-retransmits | pstats #32 ikev2.ike deleted too-many-retransmits | #32 spent 2.61 milliseconds in total | crypto helper 9 resuming | crypto helper 9 starting work-order 284 for state #284 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 284 | [RE]START processing: state #32 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-32" #32: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #32: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #32 "road-eastnet-nonat-32" #32: deleting IKE SA for connection 'road-eastnet-nonat-32' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-32' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-32 | State DB: deleting IKEv2 state #32 in PARENT_I1 | parent state #32: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #32 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb358046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b09380 | in statetime_stop() and could not find #32 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 284 time elapsed 0.000653 seconds | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#284) spent 0.669 milliseconds in crypto helper computing work-order 284: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 284 for state #284 to event queue | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-32 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | scheduling resume sending helper answer for #284 | libevent_malloc: new ptr-libevent@0x7fb37800f1a0 size 128 | crypto helper 9 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-32" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-32' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-32" | stop processing: connection "road-eastnet-nonat-32" (in initiate_a_connection() at initiate.c:349) | spent 0.0724 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #284 | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 284 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #284 | **emit ISAKMP Message: | initiator cookie: | 4f c5 f3 7c 66 c6 91 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-32 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ba b7 9c a5 65 e1 b6 6c 6d 9d e6 37 7c 5c f0 56 | ikev2 g^x 41 3d 90 c7 c5 60 97 4a 06 1e 79 6d 8b 7a e1 25 | ikev2 g^x 8a e0 db 36 d3 fb fd 75 27 2c e6 11 8c 23 25 88 | ikev2 g^x 33 6a f7 df 2d 31 86 e1 88 c6 aa 1b d4 34 45 16 | ikev2 g^x 89 ed d8 a3 84 50 47 88 30 89 02 8c a8 40 9f 16 | ikev2 g^x 7d e6 73 98 ef b8 9b e4 c2 07 6e 64 f9 a7 00 b0 | ikev2 g^x 51 f9 1e 1e 5d 35 fd 1d 61 a0 8a db ac 3a a5 8e | ikev2 g^x 67 a3 5b 3b 5e 51 8c 98 11 1d 70 aa 48 6b 1b 38 | ikev2 g^x fe 3a 74 c3 2d 4b 66 87 e9 a4 65 ed 1c 5b e4 91 | ikev2 g^x fa be 09 5f aa ec 3b 28 29 ab 52 85 54 9f ad 67 | ikev2 g^x e9 64 b2 c0 a7 f8 4d 31 5f 8c e9 8e 20 90 9f 65 | ikev2 g^x 6a 76 61 75 16 6e 59 99 0c 9b cb ca c4 c4 20 96 | ikev2 g^x 27 41 40 bc 51 ae 53 c0 78 fe 0b f1 3b 9e 38 fe | ikev2 g^x 94 f7 01 4f 33 dd 41 c6 b8 e2 1f f5 07 d9 60 b6 | ikev2 g^x 76 7e 73 5f c5 3d 67 e4 c6 ee 71 88 8c 90 3a 18 | ikev2 g^x 0e 12 ec 6b 94 d2 71 0c c3 11 05 e5 1f bd ac 6a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e8 7e a2 09 c5 c0 d6 dc c4 8f 1b fd a9 a5 28 29 | IKEv2 nonce c6 ee 14 10 31 5e 74 e5 a8 11 e2 fb 53 d1 4d b2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4f c5 f3 7c 66 c6 91 a5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 20 | natd_hash: port= 01 f4 | natd_hash: hash= 96 bd 1e aa d2 1d d0 15 75 cf 8a a1 9b e7 2e 78 | natd_hash: hash= e9 b8 ab 0e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 96 bd 1e aa d2 1d d0 15 75 cf 8a a1 9b e7 2e 78 | Notify data e9 b8 ab 0e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4f c5 f3 7c 66 c6 91 a5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 98 e6 12 78 17 7a 25 b0 15 91 c2 32 50 43 18 e1 | natd_hash: hash= 21 f2 b2 de | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 98 e6 12 78 17 7a 25 b0 15 91 c2 32 50 43 18 e1 | Notify data 21 f2 b2 de | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #284 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #284: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #284 to 4294967295 after switching state | Message ID: IKE #284 skipping update_recv as MD is fake | Message ID: sent #284 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-32" #284: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.32:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #284) | 4f c5 f3 7c 66 c6 91 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba b7 9c a5 65 e1 b6 6c 6d 9d e6 37 7c 5c f0 56 | 41 3d 90 c7 c5 60 97 4a 06 1e 79 6d 8b 7a e1 25 | 8a e0 db 36 d3 fb fd 75 27 2c e6 11 8c 23 25 88 | 33 6a f7 df 2d 31 86 e1 88 c6 aa 1b d4 34 45 16 | 89 ed d8 a3 84 50 47 88 30 89 02 8c a8 40 9f 16 | 7d e6 73 98 ef b8 9b e4 c2 07 6e 64 f9 a7 00 b0 | 51 f9 1e 1e 5d 35 fd 1d 61 a0 8a db ac 3a a5 8e | 67 a3 5b 3b 5e 51 8c 98 11 1d 70 aa 48 6b 1b 38 | fe 3a 74 c3 2d 4b 66 87 e9 a4 65 ed 1c 5b e4 91 | fa be 09 5f aa ec 3b 28 29 ab 52 85 54 9f ad 67 | e9 64 b2 c0 a7 f8 4d 31 5f 8c e9 8e 20 90 9f 65 | 6a 76 61 75 16 6e 59 99 0c 9b cb ca c4 c4 20 96 | 27 41 40 bc 51 ae 53 c0 78 fe 0b f1 3b 9e 38 fe | 94 f7 01 4f 33 dd 41 c6 b8 e2 1f f5 07 d9 60 b6 | 76 7e 73 5f c5 3d 67 e4 c6 ee 71 88 8c 90 3a 18 | 0e 12 ec 6b 94 d2 71 0c c3 11 05 e5 1f bd ac 6a | 29 00 00 24 e8 7e a2 09 c5 c0 d6 dc c4 8f 1b fd | a9 a5 28 29 c6 ee 14 10 31 5e 74 e5 a8 11 e2 fb | 53 d1 4d b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 bd 1e aa d2 1d d0 15 75 cf 8a a1 | 9b e7 2e 78 e9 b8 ab 0e 00 00 00 1c 00 00 40 05 | 98 e6 12 78 17 7a 25 b0 15 91 c2 32 50 43 18 e1 | 21 f2 b2 de | state #284 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c008e30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a45310 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45310 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #284 | libevent_malloc: new ptr-libevent@0x7fb358046040 size 128 | #284 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49667.55291 | resume sending helper answer for #284 suppresed complete_v2_state_transition() and stole MD | #284 spent 0.334 milliseconds in resume sending helper answer | stop processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37800f1a0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f c5 f3 7c 66 c6 91 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #284 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #284 | rejected packet: | 4f c5 f3 7c 66 c6 91 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 20 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #284: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a94500 | handling event EVENT_RETRANSMIT for parent state #263 | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #263 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #263 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49667.566073; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002778 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b09380 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #263 | libevent_malloc: new ptr-libevent@0x7fb37800f1a0 size 128 "road-eastnet-nonat-11" #263: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #263) | ca df fa 2e cc 97 0a e0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 35 4e f5 b3 06 6a 55 0c f2 3d 49 3f 7e 31 f9 | fb cf 08 8d 9e dd 74 b4 ae 16 46 b6 d3 2d d7 81 | a5 4c 1e 3c 51 d2 5c 80 19 32 ae 15 f6 f1 83 90 | 89 74 e1 7a 65 6e b3 e6 37 19 f8 4c fe 75 98 41 | ac 4f 10 33 24 18 c2 b3 2c d3 58 72 8c df 81 d4 | 59 38 86 31 ec e0 a1 c4 d1 46 91 6e e8 5d e0 23 | 68 ef 05 cb cd 03 0b e1 cd 09 50 09 e9 ff 48 e3 | 8e ec a4 98 4e a5 2a 21 fb 32 20 aa 01 94 37 a3 | 4a a0 06 10 8c 55 c7 ef f3 db 52 f2 2f 93 75 5e | 89 12 79 f7 25 8b 5c 7e 90 0c 79 f1 46 9c 39 dc | 62 04 8a 23 65 3e da dc e9 e6 17 7c 76 c0 74 b4 | 38 86 ca da 50 ae fc f8 de 6d 6d ce d9 7f cd c0 | 85 4e f8 c9 04 41 9d 47 8a 73 e9 b5 4a cc 14 ad | 16 95 76 51 b8 09 27 ef 06 ca 3a bb ff 24 77 42 | cc fc 6e a1 e6 2b bd 33 6d f5 6a df 58 56 a8 4b | 96 18 0e 2a e9 ec 68 a9 e4 55 e7 47 98 67 01 11 | 29 00 00 24 1f 89 c4 e0 c8 b8 15 d0 01 8c 72 b7 | b9 51 02 35 29 86 83 18 da 61 92 fd 67 fb 67 7c | 20 e3 84 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 89 6c b7 69 49 4f f4 6b c0 cb 25 | 85 ed a6 01 12 ce 48 f3 00 00 00 1c 00 00 40 05 | 1c d7 2d 11 fa 53 cc ec b9 10 e5 08 27 61 79 62 | 96 79 33 55 | libevent_free: release ptr-libevent@0x7fb35804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94500 | #263 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca df fa 2e cc 97 0a e0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #263 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #263 | rejected packet: | ca df fa 2e cc 97 0a e0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #263: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #278 | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #278 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #278 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49667.607382; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499995 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94500 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #278 | libevent_malloc: new ptr-libevent@0x7fb35804b850 size 128 "road-eastnet-nonat-26" #278: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #278) | 08 20 1d 54 94 b3 08 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 a1 ac cd cf 52 aa c1 15 fd 26 f6 ce 5b bb 69 | e2 24 51 98 69 82 96 7a 9b 39 3d bd 86 5c 17 cb | 1b d4 a9 83 ec 80 8d 8d 98 27 4b 99 f4 20 5c e3 | 21 59 7a 6e 94 3a e5 a4 ea 37 74 6c a3 9a 99 f4 | 8f 90 94 d4 bd 67 d7 b9 06 e3 7c d1 d3 76 37 58 | 47 a2 45 8a db 7e f9 85 d6 08 20 a6 bf 2b 7f c1 | 25 eb a0 f8 68 c1 9c c0 38 d2 e7 d9 43 7b cb 27 | 99 db 05 15 9d 31 4d 0f 10 f4 8b 1c a6 46 f5 eb | 21 00 56 37 46 de 0d 94 e5 1c 55 ca 89 03 da 88 | 4e dc 76 55 16 95 7d 63 e2 29 4d 09 2b 25 59 20 | f9 0f f3 3f f2 2e bd 84 bc f5 d7 26 2f 24 33 39 | 9b 95 39 a9 c8 80 99 61 48 09 51 76 c7 02 f7 7e | 9a 29 d4 87 ca 9f 9d b2 ea 2d 4b 02 ce 90 b0 a7 | 7e 1d de da 63 ea 0e 8d 96 e6 95 fb 1c 5e 88 3b | 6e ec 99 33 d7 e2 75 ac ca 10 ec 9b 00 5a c4 5e | 94 67 a1 9a 10 a7 22 d4 3e d5 55 a9 17 c5 c5 72 | 29 00 00 24 16 ad f5 49 a7 87 af 94 50 48 7a 22 | f4 eb b9 a7 0c 25 3c c9 61 3d 03 4a 9f 4c 8f 7c | d3 51 5e 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e fe 64 30 2d 54 01 ce c5 20 30 8e | 57 4b dd bc f4 7a 78 34 00 00 00 1c 00 00 40 05 | c5 ea 3a 3a ae 73 b8 b7 65 be 1b eb 5d 99 4d a3 | 57 6c 56 99 | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #278 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 20 1d 54 94 b3 08 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #278 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #278 | rejected packet: | 08 20 1d 54 94 b3 08 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #278: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90440 | handling event EVENT_RETRANSMIT for parent state #33 | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #33 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #33 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49667.617652; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006211 exceeds limit? YES "road-eastnet-nonat-33" #33: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-33" #33: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #285 at 0x557d46a00690 | State DB: adding IKEv2 state #285 in UNDEFINED | pstats #285 ikev2.ike started | Message ID: init #285: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #285: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #285; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-33" #285: initiating v2 parent SA to replace #33 | using existing local IKE proposals for connection road-eastnet-nonat-33 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 285 for state #285 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb33800d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #285 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 | crypto helper 10 resuming | #285 spent 0.0695 milliseconds in ikev2_parent_outI1() | crypto helper 10 starting work-order 285 for state #285 | RESET processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 285 | start processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #33 ikev2.ike failed too-many-retransmits | pstats #33 ikev2.ike deleted too-many-retransmits | #33 spent 2.5 milliseconds in total | [RE]START processing: state #33 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-33" #33: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #33: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #33 "road-eastnet-nonat-33" #33: deleting IKE SA for connection 'road-eastnet-nonat-33' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-33' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-33 | State DB: deleting IKEv2 state #33 in PARENT_I1 | parent state #33: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #33 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 285 time elapsed 0.000611 seconds | libevent_free: release ptr-libevent@0x7fb34801d920 | (#285) spent 0.61 milliseconds in crypto helper computing work-order 285: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 285 for state #285 to event queue | scheduling resume sending helper answer for #285 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90440 | libevent_malloc: new ptr-libevent@0x7fb37c00cbb0 size 128 | in statetime_stop() and could not find #33 | crypto helper 10 waiting (nothing to do) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-33 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-33" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-33' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-33" | stop processing: connection "road-eastnet-nonat-33" (in initiate_a_connection() at initiate.c:349) | spent 0.0595 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #285 | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 285 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #285 | **emit ISAKMP Message: | initiator cookie: | 8e b8 37 d5 68 56 5c 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-33 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b4 a4 f2 e0 52 94 4a 81 83 55 c1 41 32 b7 b8 02 | ikev2 g^x 1f ed 45 79 af ff 8a eb 0a de 74 5c 80 82 ad 8f | ikev2 g^x b3 d0 39 bf 3b db ca 12 0b a2 0e eb ce 92 b6 11 | ikev2 g^x 51 c6 b7 d3 f4 87 aa 09 0c f5 bb d2 46 13 91 7d | ikev2 g^x 65 dc 9e 2a 12 da 3f be a8 bc 4e 1c a1 4c 53 ad | ikev2 g^x 64 f4 41 68 96 19 bd e1 80 86 91 4f 17 c1 cc 5c | ikev2 g^x ad 72 12 cc 9c fe d8 85 6a cd 1f 0f cf 61 bc 07 | ikev2 g^x 09 af 5b a0 a2 6c 2a 6f 4c 7e dd ad 13 55 ed 0e | ikev2 g^x ce cf e6 c5 66 9e 5a 6a e4 42 78 50 61 c3 d4 73 | ikev2 g^x e3 47 f2 bc a4 8c 26 64 97 c9 f1 2a c6 63 9c 83 | ikev2 g^x 60 4f 25 9e cb 7a 10 71 25 9d c1 dd 11 38 34 bc | ikev2 g^x 7c a1 3b 2b 0d 73 6f f9 3c 0b 62 50 05 38 a7 0e | ikev2 g^x 31 2d 60 72 dd 2b a2 05 f6 e2 f0 0d 9b c1 b1 9e | ikev2 g^x c0 ee 0d 2f 64 4b 28 d2 c0 e7 3b 0a 50 ff 03 45 | ikev2 g^x 45 ff 2c cd 4e 54 17 7d 2b 95 02 32 23 94 0e de | ikev2 g^x 7b 38 d9 9c b7 e8 7d 2f 56 9c 26 e0 8b a0 e6 38 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e6 a9 52 cb 4c 75 d2 f3 84 20 3b dd 0e ee e2 12 | IKEv2 nonce 57 50 c2 6f 3d 4c ae 21 23 00 a4 ca 8c 87 5b 56 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8e b8 37 d5 68 56 5c 09 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 21 | natd_hash: port= 01 f4 | natd_hash: hash= 20 5c 90 12 97 99 4e dd 8f 9a cf 75 ad 0a 2b a1 | natd_hash: hash= 31 ad 53 29 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 20 5c 90 12 97 99 4e dd 8f 9a cf 75 ad 0a 2b a1 | Notify data 31 ad 53 29 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8e b8 37 d5 68 56 5c 09 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f9 f4 9b a0 01 06 28 22 67 53 82 2b ec 0b 3c 23 | natd_hash: hash= 3e d8 d3 7f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f9 f4 9b a0 01 06 28 22 67 53 82 2b ec 0b 3c 23 | Notify data 3e d8 d3 7f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #285 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #285: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #285 to 4294967295 after switching state | Message ID: IKE #285 skipping update_recv as MD is fake | Message ID: sent #285 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-33" #285: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.33:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #285) | 8e b8 37 d5 68 56 5c 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 a4 f2 e0 52 94 4a 81 83 55 c1 41 32 b7 b8 02 | 1f ed 45 79 af ff 8a eb 0a de 74 5c 80 82 ad 8f | b3 d0 39 bf 3b db ca 12 0b a2 0e eb ce 92 b6 11 | 51 c6 b7 d3 f4 87 aa 09 0c f5 bb d2 46 13 91 7d | 65 dc 9e 2a 12 da 3f be a8 bc 4e 1c a1 4c 53 ad | 64 f4 41 68 96 19 bd e1 80 86 91 4f 17 c1 cc 5c | ad 72 12 cc 9c fe d8 85 6a cd 1f 0f cf 61 bc 07 | 09 af 5b a0 a2 6c 2a 6f 4c 7e dd ad 13 55 ed 0e | ce cf e6 c5 66 9e 5a 6a e4 42 78 50 61 c3 d4 73 | e3 47 f2 bc a4 8c 26 64 97 c9 f1 2a c6 63 9c 83 | 60 4f 25 9e cb 7a 10 71 25 9d c1 dd 11 38 34 bc | 7c a1 3b 2b 0d 73 6f f9 3c 0b 62 50 05 38 a7 0e | 31 2d 60 72 dd 2b a2 05 f6 e2 f0 0d 9b c1 b1 9e | c0 ee 0d 2f 64 4b 28 d2 c0 e7 3b 0a 50 ff 03 45 | 45 ff 2c cd 4e 54 17 7d 2b 95 02 32 23 94 0e de | 7b 38 d9 9c b7 e8 7d 2f 56 9c 26 e0 8b a0 e6 38 | 29 00 00 24 e6 a9 52 cb 4c 75 d2 f3 84 20 3b dd | 0e ee e2 12 57 50 c2 6f 3d 4c ae 21 23 00 a4 ca | 8c 87 5b 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 5c 90 12 97 99 4e dd 8f 9a cf 75 | ad 0a 2b a1 31 ad 53 29 00 00 00 1c 00 00 40 05 | f9 f4 9b a0 01 06 28 22 67 53 82 2b ec 0b 3c 23 | 3e d8 d3 7f | state #285 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb33800d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #285 | libevent_malloc: new ptr-libevent@0x7fb34801d920 size 128 | #285 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49667.618849 | resume sending helper answer for #285 suppresed complete_v2_state_transition() and stole MD | #285 spent 0.329 milliseconds in resume sending helper answer | stop processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c00cbb0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e b8 37 d5 68 56 5c 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #285 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #285 | rejected packet: | 8e b8 37 d5 68 56 5c 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #285: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae8980 | handling event EVENT_RETRANSMIT for parent state #273 | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #273 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #273 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49667.658039; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003084 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90440 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #273 | libevent_malloc: new ptr-libevent@0x7fb35803b0b0 size 128 "road-eastnet-nonat-21" #273: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #273) | ed 1f ad f4 73 76 3f ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad fb 2c d6 61 18 78 ff ff 9e ac 8e 11 6e 5b 0a | 17 90 d5 cd a5 72 c6 44 33 06 36 88 ef 85 f7 fd | d1 32 bf e5 b4 df 1c 2a 44 4b 64 5a 5c fa a6 e7 | a7 88 cd 98 18 db 83 1c de 12 34 1a 01 c0 6e 90 | b0 37 b6 8e 3f bc 29 ae 17 56 d9 4e 3e aa f9 1a | 05 22 37 90 a3 98 0c 9d fd 31 f5 89 2b 79 38 70 | a3 3c e3 a6 be b6 20 06 92 92 77 84 f9 e1 f6 43 | 50 c4 75 3f ce 2c 7f a3 83 07 1e 29 12 48 86 d5 | b6 e2 61 df c8 2b 9c ea 45 c9 6b 62 38 f9 06 23 | 9b a2 90 c4 51 19 47 e4 c9 9e bb 38 c5 ea 4c 2c | 24 15 a0 60 6e 12 c1 7a cd 75 9f 6a 97 65 4f 9f | 6f aa 7c 8b b3 99 29 be 41 56 ad 5d 52 77 c8 87 | f1 18 76 ec 44 be fb bf 14 5e 22 ec 7b 78 cb 22 | 16 62 54 b4 5f 5e ed e0 38 14 64 69 82 ec fb 0f | 84 be 3a 69 27 17 b5 b0 42 81 a7 3b e2 19 f7 47 | ac 1d 3d ca 8c d0 ae cf 0d f7 a8 a2 36 9e 94 83 | 29 00 00 24 a4 16 d5 7c 26 cc bd 52 fc 33 91 77 | f2 08 cb df 04 12 5c f5 f3 31 f7 87 08 22 5b ef | 2b 8c 5b 44 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 3d 78 9d 41 51 b9 57 ea 0d 4a 5f | 38 c6 cb 30 ec f2 21 4b 00 00 00 1c 00 00 40 05 | bd ec 33 2a 1b 35 fa ad 7a ef 73 f7 d9 b0 09 33 | b4 e9 3f 2e | libevent_free: release ptr-libevent@0x7fb36804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae8980 | #273 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 1f ad f4 73 76 3f ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #273 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #273 | rejected packet: | ed 1f ad f4 73 76 3f ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #273: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aaf800 | handling event EVENT_RETRANSMIT for parent state #264 | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #264 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #264 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49667.680394; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003289 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae8980 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #264 | libevent_malloc: new ptr-libevent@0x7fb36804b850 size 128 "road-eastnet-nonat-12" #264: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #264) | 8e fe 0e 1c bf 0e 6b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 85 0f 2d e4 cd 04 0b 17 96 14 35 20 98 98 7c | 43 94 0e c0 cb 2a ed cd 26 f3 f4 fd 71 0a b3 35 | 8d c8 ce 92 67 ce 39 72 cf 1d 58 73 86 98 2b a0 | 6f 55 7b 13 d0 1f 62 3b 93 93 85 3e 36 cd 86 27 | b4 c1 9a bd c4 db 39 19 44 28 ec a5 e9 1c 59 a2 | a7 fc b2 f8 f1 72 da 9c 2a b8 36 d3 61 88 51 dc | 4d 20 86 6a 14 25 ef 10 b3 1b 09 52 6d 00 f9 db | 75 0a 80 38 3b 18 7c 9c fd c8 c9 4e b1 e2 84 70 | a4 dd 3f 85 ce 8c cb 20 5c 6a 42 21 65 c4 fd 15 | 7a 47 92 65 67 69 9e be f3 7a e9 66 c9 56 bd d2 | 3c 4a 76 68 b7 3f ce 1d 64 64 a7 2c 71 37 b4 c4 | 53 38 1c 79 97 95 2a 69 1c 36 40 41 3d 05 9c ba | 4d 38 e3 a6 a7 6c e9 b1 59 1a 9f ab 80 0a d9 8e | ac 39 5a 0c e3 b3 9d c1 3d 5d 32 c8 42 00 f8 4c | 3a fb 9c 36 7f 16 43 4c 95 29 48 05 f2 b7 02 75 | 54 25 c2 90 a5 04 3b fa ca 77 9e 55 e7 39 19 34 | 29 00 00 24 0b 7d f5 1c 67 a7 5b 6f d5 5f 23 1c | de ee af 0f ed f9 a1 fa b5 71 92 a8 5a 39 25 fa | 7d a0 ff 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 4e 74 d9 6a 11 61 e7 2b 9e b3 5d | fa c6 10 84 a3 ff e4 72 00 00 00 1c 00 00 40 05 | 61 d2 3a 09 fc 3f e9 c0 9a fa 15 52 e0 d4 39 3d | 0f 2b c4 10 | libevent_free: release ptr-libevent@0x7fb35c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aaf800 | #264 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e fe 0e 1c bf 0e 6b 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #264 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #264 | rejected packet: | 8e fe 0e 1c bf 0e 6b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #264: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0603 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #279 | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #279 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #279 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49667.682709; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500805 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aaf800 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #279 | libevent_malloc: new ptr-libevent@0x7fb35c04b7c0 size 128 "road-eastnet-nonat-27" #279: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #279) | e3 74 db 6d 09 5b 39 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 0f 5a 1b 7a 8f ca c9 79 23 84 5e dc 90 86 16 | 69 23 cd b6 f6 38 83 88 87 a0 82 5d cb 87 94 7a | a5 f1 35 43 62 38 5c 18 da 06 83 48 7b 51 b2 80 | 57 ee 54 19 13 b6 1b 59 ab b3 f3 ce 4e 70 21 d2 | 1d 3f 07 6b c1 ad 15 8b 16 67 f3 79 c6 3f ee ff | 6b 97 0c 11 61 f6 68 6d 51 5b dc dc 69 1e f2 f8 | 31 6f 04 6f 19 7c a8 a9 37 a2 da ca be a8 40 a8 | d0 ef 42 ba be 70 25 1f 20 b2 dd 25 56 46 50 6a | 55 24 29 65 1f 8b ad 5a c0 f3 1f c2 6d ed 0d 17 | f8 37 85 23 72 0c 7b c5 c8 05 6a d0 1b 38 ca f1 | 63 79 aa 8b f0 75 7e c0 5c 06 26 d0 c2 20 b9 e9 | c7 89 2f ee 84 27 1c 00 f8 3a d5 7e 2a be c2 84 | e4 6a 7c 0c 25 65 bb 41 df ad ea 07 28 2c bc 6e | 24 1b 9a 66 f8 83 86 6a 84 b0 d9 93 6f e5 9a 01 | 17 24 34 ac 82 0a b8 a3 51 37 c3 89 94 09 92 d7 | 0d 37 14 e0 ee 1c 1b 73 ef 46 af cc fd ba 52 42 | 29 00 00 24 f9 6f e2 b3 2b d1 43 b4 d3 29 40 07 | 4f e9 c5 79 33 c1 2e 78 27 6c f8 54 58 c2 d9 c9 | 00 b6 d5 b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 94 ec 05 36 41 29 fa 93 f5 5d d2 | 39 00 ad d2 4d 2f 36 81 00 00 00 1c 00 00 40 05 | 7a 98 d6 69 28 79 15 19 95 89 31 96 52 96 29 94 | 7d 8f c3 a4 | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #279 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 74 db 6d 09 5b 39 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #279 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #279 | rejected packet: | e3 74 db 6d 09 5b 39 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #279: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a855c0 | handling event EVENT_RETRANSMIT for parent state #34 | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #34 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #34 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49667.686041; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.011782 exceeds limit? YES "road-eastnet-nonat-34" #34: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-34" #34: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #286 at 0x557d46a01c50 | State DB: adding IKEv2 state #286 in UNDEFINED | pstats #286 ikev2.ike started | Message ID: init #286: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #286: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #286; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-34" #286: initiating v2 parent SA to replace #34 | using existing local IKE proposals for connection road-eastnet-nonat-34 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 286 for state #286 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46afe580 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #286 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 | #286 spent 0.103 milliseconds in ikev2_parent_outI1() | RESET processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #34 ikev2.ike failed too-many-retransmits | pstats #34 ikev2.ike deleted too-many-retransmits | #34 spent 2.6 milliseconds in total | crypto helper 14 resuming | crypto helper 14 starting work-order 286 for state #286 | [RE]START processing: state #34 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-34" #34: deleting state (STATE_PARENT_I1) aged 64.013s and NOT sending notification | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 286 | parent state #34: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #34 "road-eastnet-nonat-34" #34: deleting IKE SA for connection 'road-eastnet-nonat-34' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-34' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-34 | State DB: deleting IKEv2 state #34 in PARENT_I1 | parent state #34: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #34 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3440251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a855c0 | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 286 time elapsed 0.000578 seconds | in statetime_stop() and could not find #34 | (#286) spent 0.584 milliseconds in crypto helper computing work-order 286: ikev2_outI1 KE (pcr) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 14 sending results from work-order 286 for state #286 to event queue | scheduling resume sending helper answer for #286 | libevent_malloc: new ptr-libevent@0x7fb37000f1a0 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 14 waiting (nothing to do) Initiating connection road-eastnet-nonat-34 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-34" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-34' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-34" | stop processing: connection "road-eastnet-nonat-34" (in initiate_a_connection() at initiate.c:349) | spent 0.0693 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #286 | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 286 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #286 | **emit ISAKMP Message: | initiator cookie: | a2 ed ea 42 1b 91 7a d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-34 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5a a6 7d cd 97 e4 f8 0e 4c a8 f7 b1 ec cb f9 8c | ikev2 g^x 2f 76 7e 20 17 e9 ac 96 37 6c d0 36 42 10 05 54 | ikev2 g^x c9 b8 65 a2 e7 d3 10 b3 60 78 69 80 3d 25 e3 d0 | ikev2 g^x 6b b3 ef 43 8d bb 4b f1 6d fd 75 58 b6 64 ea eb | ikev2 g^x 21 44 51 94 9d af c8 b5 2c d9 89 52 8e 49 92 15 | ikev2 g^x c8 f5 a7 13 6d cd 71 4c 89 a6 18 b9 37 a2 0d cb | ikev2 g^x 6e 90 fa f6 c2 05 39 4f e6 3c 7a ff 95 71 4f ea | ikev2 g^x 6f fa 7f ad 4f d5 8a a0 2f e3 1c 55 7c 9d 2b b7 | ikev2 g^x f8 c6 43 95 70 9b 3c 8c f8 2e 6e 7f b8 14 5a ab | ikev2 g^x e6 e2 cc bb a0 95 89 e6 41 f3 31 0c 80 44 7c cc | ikev2 g^x 26 be 63 d8 03 4f 0e f4 82 c2 32 aa ff f3 ec 67 | ikev2 g^x 80 f5 48 c4 4e dc 67 68 c5 87 ee 31 77 11 8a 89 | ikev2 g^x f7 38 08 ed 5a b3 8e c6 08 9c 28 3d e6 49 22 cc | ikev2 g^x f1 1d ea 6e 27 3f 41 69 56 c6 98 3e aa a5 4b a8 | ikev2 g^x 83 96 ce 94 b1 ac 7a 4b a0 42 08 47 1d ca 77 fa | ikev2 g^x 08 50 16 47 c6 8d 84 08 18 b0 a8 93 c0 9a 70 76 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ff d1 37 2d 2c 72 ee aa 08 fb db a4 83 ef f7 bd | IKEv2 nonce 0a ef 47 b4 41 70 b6 07 5f 86 86 3a e3 fa 60 f7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a2 ed ea 42 1b 91 7a d5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 22 | natd_hash: port= 01 f4 | natd_hash: hash= b5 c0 b7 bc 90 25 46 09 9f 5d 7d 2b e5 1e 40 45 | natd_hash: hash= 53 17 97 19 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b5 c0 b7 bc 90 25 46 09 9f 5d 7d 2b e5 1e 40 45 | Notify data 53 17 97 19 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a2 ed ea 42 1b 91 7a d5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ec a0 d2 60 58 e7 4c 5a 13 5c f5 c2 c9 76 dd 61 | natd_hash: hash= a7 bb 7e 37 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ec a0 d2 60 58 e7 4c 5a 13 5c f5 c2 c9 76 dd 61 | Notify data a7 bb 7e 37 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #286 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #286: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #286 to 4294967295 after switching state | Message ID: IKE #286 skipping update_recv as MD is fake | Message ID: sent #286 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-34" #286: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.34:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #286) | a2 ed ea 42 1b 91 7a d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a a6 7d cd 97 e4 f8 0e 4c a8 f7 b1 ec cb f9 8c | 2f 76 7e 20 17 e9 ac 96 37 6c d0 36 42 10 05 54 | c9 b8 65 a2 e7 d3 10 b3 60 78 69 80 3d 25 e3 d0 | 6b b3 ef 43 8d bb 4b f1 6d fd 75 58 b6 64 ea eb | 21 44 51 94 9d af c8 b5 2c d9 89 52 8e 49 92 15 | c8 f5 a7 13 6d cd 71 4c 89 a6 18 b9 37 a2 0d cb | 6e 90 fa f6 c2 05 39 4f e6 3c 7a ff 95 71 4f ea | 6f fa 7f ad 4f d5 8a a0 2f e3 1c 55 7c 9d 2b b7 | f8 c6 43 95 70 9b 3c 8c f8 2e 6e 7f b8 14 5a ab | e6 e2 cc bb a0 95 89 e6 41 f3 31 0c 80 44 7c cc | 26 be 63 d8 03 4f 0e f4 82 c2 32 aa ff f3 ec 67 | 80 f5 48 c4 4e dc 67 68 c5 87 ee 31 77 11 8a 89 | f7 38 08 ed 5a b3 8e c6 08 9c 28 3d e6 49 22 cc | f1 1d ea 6e 27 3f 41 69 56 c6 98 3e aa a5 4b a8 | 83 96 ce 94 b1 ac 7a 4b a0 42 08 47 1d ca 77 fa | 08 50 16 47 c6 8d 84 08 18 b0 a8 93 c0 9a 70 76 | 29 00 00 24 ff d1 37 2d 2c 72 ee aa 08 fb db a4 | 83 ef f7 bd 0a ef 47 b4 41 70 b6 07 5f 86 86 3a | e3 fa 60 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 c0 b7 bc 90 25 46 09 9f 5d 7d 2b | e5 1e 40 45 53 17 97 19 00 00 00 1c 00 00 40 05 | ec a0 d2 60 58 e7 4c 5a 13 5c f5 c2 c9 76 dd 61 | a7 bb 7e 37 | state #286 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46afe580 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #286 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 | #286 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49667.687437 | resume sending helper answer for #286 suppresed complete_v2_state_transition() and stole MD | #286 spent 0.47 milliseconds in resume sending helper answer | stop processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37000f1a0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 ed ea 42 1b 91 7a d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #286 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #286 | rejected packet: | a2 ed ea 42 1b 91 7a d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 22 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #286: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0594 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #280 | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #280 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #280 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49667.737649; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500415 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a855c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #280 | libevent_malloc: new ptr-libevent@0x7fb37000f1a0 size 128 "road-eastnet-nonat-28" #280: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #280) | d6 f7 ab 7c 0b ea 69 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca e1 05 9c 2f e1 85 fc d1 c1 5e ec 37 7e 0d 76 | 45 c5 de cd 99 7d 74 0a 48 32 65 23 49 b2 c2 df | ba 7e d2 ef 7c 32 31 03 10 0c 09 94 c0 eb b8 b5 | 06 97 c9 45 66 24 48 7d 72 da ab 98 55 09 59 9c | 31 af 0e c1 8a a9 90 d1 a5 1f 67 f1 af 23 81 27 | 72 13 c8 3c d8 f0 f1 d8 ca c2 a1 9a 92 8c fd 09 | b0 c2 a6 d5 91 c6 84 9b 99 40 a3 ac 3e 94 44 cd | 9a 36 6e be f8 2c 85 77 18 29 38 0d c0 06 06 d0 | a2 de 4c 8d 95 cd da f4 a0 2f bd 4d 70 4f 95 ae | db 5a f3 57 de 7c dd 31 a6 66 ca aa 68 cf 9d 1d | b3 0a 17 80 b5 20 24 43 82 44 17 25 0f 38 64 50 | 75 9d 57 76 b6 2b ee 0e 3f 93 33 cf 3f 9b 45 97 | f9 87 b6 87 a6 ec cb 33 18 44 a7 89 6a 59 c0 2b | ff 8a 7d 67 3d 1a 08 05 fe 9f fa 6c b7 f7 96 5d | a2 3b 23 c8 4a 7c 17 7b 08 d8 db 48 f9 5d 62 1b | 0b 5f d0 c6 c6 a2 28 ed 7c 45 7a f3 33 a6 d2 1f | 29 00 00 24 05 cd b3 b7 f3 87 52 75 9b b2 14 f4 | c3 19 28 f7 78 65 e3 f9 18 22 0f 07 13 10 65 88 | f1 44 b8 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a b5 25 17 f4 1a 4f 2a 05 d2 2d 99 | 3c 89 36 9b 9d 62 ed 5f 00 00 00 1c 00 00 40 05 | ee 9f 85 88 b6 c7 ef c2 a5 c8 d9 f7 7a e7 a6 c3 | 70 03 54 b6 | libevent_free: release ptr-libevent@0x7fb36003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #280 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 f7 ab 7c 0b ea 69 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #280 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #280 | rejected packet: | d6 f7 ab 7c 0b ea 69 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #280: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0477 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad9ac0 | handling event EVENT_RETRANSMIT for parent state #274 | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #274 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #274 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49667.741936; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001731 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #274 | libevent_malloc: new ptr-libevent@0x7fb36003b0b0 size 128 "road-eastnet-nonat-22" #274: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #274) | 97 f1 23 53 d2 3b 4d 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 bf aa 44 4c 86 42 20 d8 9e 9a 10 8c 03 23 1c | 55 12 c5 05 17 54 35 db 09 ea 86 4f 1e 8f 7b 32 | 9a 2a b0 4c f2 e7 18 73 a1 a0 fd e2 40 07 2c 7c | b0 86 fe c9 c0 0a 24 ee 0b e2 8f 65 27 f4 ce d4 | 26 d0 8a 70 5c 4d 46 36 4c d7 e9 bc 9b 95 2b 48 | 94 a5 c8 98 b4 23 f8 e0 8f 7c 6d 1d 50 c7 fe 04 | 1c ce 6b 59 2b ed cf 4a 5b 4f 67 9e cc 11 c0 53 | 7c 50 d5 3e bd 07 f0 e3 56 2a 0b ae b3 c0 99 43 | bb 92 8e 39 19 7e 1e c2 71 84 a0 76 9a 0f 7a 85 | 50 cf 0d 7d 85 0a 08 cc ee a1 bd c3 88 dd 8a de | e2 9f 70 d5 bb 76 44 f0 e2 0f 12 4d ae 88 a5 a4 | 51 38 bf fa 0f 38 f4 4c bb e3 25 bf 62 88 5c 87 | e1 a2 de e1 56 a5 9f 6b ce 90 dc 86 6d 26 32 32 | 64 ae 0b ac fa 3a f6 9e fa 00 00 26 02 a9 70 2e | af 79 3d a8 07 0b 81 d4 53 f3 46 fc 05 11 f6 55 | 0d 1d 8f a8 e0 93 58 07 b0 a8 c9 54 c5 14 a2 da | 29 00 00 24 59 ef 9f ca 6d 42 ee 4c de 0a 4a 8e | ec df b4 6b 0d dd 66 fa b2 ad 6d 66 92 77 f9 cb | 4b 49 7a f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8d 80 80 1b 6e 73 7e e3 fb 20 6a a8 | f2 02 f1 bf e6 58 62 ac 00 00 00 1c 00 00 40 05 | 31 9f 40 90 8f 0e 1c 6e 4b 7e bf d8 97 47 82 19 | e1 cf 25 c8 | libevent_free: release ptr-libevent@0x7fb338008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad9ac0 | #274 spent 0.0966 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 f1 23 53 d2 3b 4d 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #274 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #274 | rejected packet: | 97 f1 23 53 d2 3b 4d 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #274: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0457 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a50110 | handling event EVENT_RETRANSMIT for parent state #35 | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #35 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #35 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49667.754207; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.014282 exceeds limit? YES "road-eastnet-nonat-35" #35: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-35" #35: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #287 at 0x557d46a03210 | State DB: adding IKEv2 state #287 in UNDEFINED | pstats #287 ikev2.ike started | Message ID: init #287: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #287: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #287; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-35" #287: initiating v2 parent SA to replace #35 | using existing local IKE proposals for connection road-eastnet-nonat-35 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 287 for state #287 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad9ac0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #287 | libevent_malloc: new ptr-libevent@0x7fb338008e30 size 128 | #287 spent 0.0773 milliseconds in ikev2_parent_outI1() | RESET processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #35 ikev2.ike failed too-many-retransmits | pstats #35 ikev2.ike deleted too-many-retransmits | #35 spent 2.6 milliseconds in total | [RE]START processing: state #35 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-35" #35: deleting state (STATE_PARENT_I1) aged 64.016s and NOT sending notification | parent state #35: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | crypto helper 15 resuming | crypto helper 15 starting work-order 287 for state #287 | picked newest_isakmp_sa #0 for #35 "road-eastnet-nonat-35" #35: deleting IKE SA for connection 'road-eastnet-nonat-35' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-35' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 287 | in connection_discard for connection road-eastnet-nonat-35 | State DB: deleting IKEv2 state #35 in PARENT_I1 | parent state #35: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 287 time elapsed 0.000885 seconds | (#287) spent 0.89 milliseconds in crypto helper computing work-order 287: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 287 for state #287 to event queue | scheduling resume sending helper answer for #287 | stop processing: state #35 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d469e1b60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a50110 | libevent_malloc: new ptr-libevent@0x7fb37404b5c0 size 128 | in statetime_stop() and could not find #35 | crypto helper 15 waiting (nothing to do) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-35 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-35" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-35' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-35" | stop processing: connection "road-eastnet-nonat-35" (in initiate_a_connection() at initiate.c:349) | spent 0.0569 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #287 | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 287 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #287 | **emit ISAKMP Message: | initiator cookie: | 50 65 03 a0 08 b6 fa f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-35 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9e c0 75 39 cf 17 11 31 32 ce 73 1e 64 99 bc f2 | ikev2 g^x 7f 98 bb e8 80 c2 38 47 74 80 17 bf 6d 41 27 75 | ikev2 g^x 39 62 b9 71 ae 1a 47 19 83 cd 81 c0 c8 3d 11 61 | ikev2 g^x bb 8a a5 d6 29 bd 01 7d f4 ca 44 6d 69 e4 8a 69 | ikev2 g^x a7 cc 95 e2 b5 6b 25 ca 57 eb 58 2b 4d 53 44 df | ikev2 g^x 33 8c 6f 33 81 90 ab 83 53 f5 4e 38 ab 63 7b 68 | ikev2 g^x f5 e4 10 b1 02 5a b6 e7 d6 07 bf 37 24 09 70 4b | ikev2 g^x bc 69 6e bc 79 b8 a5 58 fa 3b e4 57 c6 64 3b 30 | ikev2 g^x 47 47 bf b7 ad 67 14 cd 0a eb 04 a2 61 54 d3 a6 | ikev2 g^x 12 98 21 de 78 b3 bb b5 ae 98 e3 4e 86 f6 80 ab | ikev2 g^x 82 7f f6 f8 ef c2 b3 23 41 0b ad f4 1d 15 a3 d0 | ikev2 g^x bf fe 7d f5 bb 15 19 74 8e f2 b9 4c 77 84 ef 53 | ikev2 g^x 7c be 1b be 09 20 be 00 d9 ce 47 ea 9d 1e 79 80 | ikev2 g^x e6 b0 92 f0 11 bf e8 8c fd 97 bb 02 bf 46 b7 fa | ikev2 g^x 29 38 a8 9a ba d7 d1 99 c1 56 93 83 a6 04 d2 fc | ikev2 g^x 1b 5a ee 22 cc c4 78 02 0c 67 9c 0f 51 14 b2 6f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 82 dd 74 7a ae e7 29 d0 0c 9c 0c 72 8c 59 8b ec | IKEv2 nonce 3e a7 b7 92 7c 72 73 9c 73 da ee 57 06 e2 80 57 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 50 65 03 a0 08 b6 fa f7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 23 | natd_hash: port= 01 f4 | natd_hash: hash= a1 92 a1 ec 2f 80 2a 27 61 6c 7b 0f 4c 73 2b 71 | natd_hash: hash= f0 03 c4 ea | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a1 92 a1 ec 2f 80 2a 27 61 6c 7b 0f 4c 73 2b 71 | Notify data f0 03 c4 ea | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 50 65 03 a0 08 b6 fa f7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 71 9b 20 c5 40 26 cd 9d eb 7f a3 62 71 86 bd 52 | natd_hash: hash= 4f c4 9f f6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 71 9b 20 c5 40 26 cd 9d eb 7f a3 62 71 86 bd 52 | Notify data 4f c4 9f f6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #287 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #287: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #287 to 4294967295 after switching state | Message ID: IKE #287 skipping update_recv as MD is fake | Message ID: sent #287 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-35" #287: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.35:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #287) | 50 65 03 a0 08 b6 fa f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e c0 75 39 cf 17 11 31 32 ce 73 1e 64 99 bc f2 | 7f 98 bb e8 80 c2 38 47 74 80 17 bf 6d 41 27 75 | 39 62 b9 71 ae 1a 47 19 83 cd 81 c0 c8 3d 11 61 | bb 8a a5 d6 29 bd 01 7d f4 ca 44 6d 69 e4 8a 69 | a7 cc 95 e2 b5 6b 25 ca 57 eb 58 2b 4d 53 44 df | 33 8c 6f 33 81 90 ab 83 53 f5 4e 38 ab 63 7b 68 | f5 e4 10 b1 02 5a b6 e7 d6 07 bf 37 24 09 70 4b | bc 69 6e bc 79 b8 a5 58 fa 3b e4 57 c6 64 3b 30 | 47 47 bf b7 ad 67 14 cd 0a eb 04 a2 61 54 d3 a6 | 12 98 21 de 78 b3 bb b5 ae 98 e3 4e 86 f6 80 ab | 82 7f f6 f8 ef c2 b3 23 41 0b ad f4 1d 15 a3 d0 | bf fe 7d f5 bb 15 19 74 8e f2 b9 4c 77 84 ef 53 | 7c be 1b be 09 20 be 00 d9 ce 47 ea 9d 1e 79 80 | e6 b0 92 f0 11 bf e8 8c fd 97 bb 02 bf 46 b7 fa | 29 38 a8 9a ba d7 d1 99 c1 56 93 83 a6 04 d2 fc | 1b 5a ee 22 cc c4 78 02 0c 67 9c 0f 51 14 b2 6f | 29 00 00 24 82 dd 74 7a ae e7 29 d0 0c 9c 0c 72 | 8c 59 8b ec 3e a7 b7 92 7c 72 73 9c 73 da ee 57 | 06 e2 80 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 92 a1 ec 2f 80 2a 27 61 6c 7b 0f | 4c 73 2b 71 f0 03 c4 ea 00 00 00 1c 00 00 40 05 | 71 9b 20 c5 40 26 cd 9d eb 7f a3 62 71 86 bd 52 | 4f c4 9f f6 | state #287 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb338008e30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad9ac0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad9ac0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #287 | libevent_malloc: new ptr-libevent@0x557d469e1b60 size 128 | #287 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49667.755726 | resume sending helper answer for #287 suppresed complete_v2_state_transition() and stole MD | #287 spent 0.34 milliseconds in resume sending helper answer | stop processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37404b5c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 65 03 a0 08 b6 fa f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #287 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #287 | rejected packet: | 50 65 03 a0 08 b6 fa f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 23 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #287: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11640 | handling event EVENT_RETRANSMIT for parent state #265 | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #265 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #265 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49667.78492; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002614 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a50110 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #265 | libevent_malloc: new ptr-libevent@0x7fb37404b5c0 size 128 "road-eastnet-nonat-13" #265: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #265) | 5e d6 2a e3 fc d6 88 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 2e 3a 15 7c f9 00 41 72 02 12 64 4c 6b 73 52 | bb 8d bc 96 e4 69 5a 27 ff 16 12 40 6d b3 e6 7d | 28 6d d8 d8 46 ae 55 b1 20 60 d0 f0 2c d7 5a 32 | f1 e8 5b 54 2b 16 ec 87 57 a5 e1 c1 08 80 a6 16 | a0 4f 0f 3b 62 e5 8c cb aa 65 e4 d5 87 37 d0 85 | 34 de df b2 ac 15 11 24 c5 c0 e2 ba 8e bf 6a 38 | 92 5b d1 dd 84 fb 29 ef cf 37 36 ed 82 a0 ef 7a | 79 c3 2b da 2f 96 ad 2b 46 50 67 74 44 c2 8f 22 | 65 99 b1 3a 1c fd 70 cc 25 39 6a 77 0a f9 8c f3 | 33 34 af 74 f2 1a 52 31 29 6f 53 43 ce 77 a1 c0 | 4e ad 32 24 24 86 73 ad 16 2d 19 8b 36 54 d6 8f | 96 95 e4 0b 0b df d1 24 22 12 35 73 ac 81 e7 c1 | af 88 20 ae e1 fa 41 09 f0 f6 2b 19 42 79 9e 92 | 6a 95 0b 69 19 21 ee ba 94 35 b0 07 aa 13 f3 40 | 4f 27 f7 e8 7d ea ae b3 14 bf 0c b2 8b a5 e7 1f | 2e 4a 4a 5e 40 8d d3 1a 30 c1 1d 13 0d 61 d3 15 | 29 00 00 24 d2 1b cb fe 42 33 59 cd 17 75 9b cc | f4 b0 0c 18 45 31 71 9f e7 2e 80 d7 48 7b 93 7c | d8 b3 ab 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 77 56 b7 16 48 fa 98 9b c1 2d 60 | a6 6c bc 07 2c 3a ef 47 00 00 00 1c 00 00 40 05 | 5a c9 c6 01 25 8a 31 37 7b d0 f2 6b d1 02 08 77 | 0a b6 4e aa | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11640 | #265 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e d6 2a e3 fc d6 88 0b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #265 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #265 | rejected packet: | 5e d6 2a e3 fc d6 88 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #265: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0668 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ced0 | handling event EVENT_RETRANSMIT for parent state #281 | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #281 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #281 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49667.807231; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501479 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11640 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #281 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 "road-eastnet-nonat-29" #281: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #281) | 6e a6 a1 b4 01 a0 0e dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 68 2b 46 8c 2b 9e 7f b4 06 ec 72 36 3a be fa | 50 91 b7 48 61 bc d4 d3 11 dc 1f d6 9a c1 21 a2 | 97 1d cf c0 4e 3d 88 c1 96 35 32 5c c3 c4 b5 d1 | 96 85 b6 1e 34 48 5e 70 e1 97 d1 4d ee c9 36 cd | 07 d4 c1 98 8c 4b f8 c0 2b 58 50 1f 39 3f 7e 62 | c9 4e 54 20 95 c8 4c fc 93 c6 64 05 ff db 54 92 | f9 8c d4 27 f6 69 ac 7b 53 12 4d 7e 22 de e0 4c | 9b 65 6e 55 e2 59 db 77 7d a0 70 9f cd fd b6 7a | 15 79 9a 65 29 97 e4 c6 46 84 7b 52 6e 4e 1b 43 | 80 ec d1 87 3d 75 43 f1 6b 08 60 65 d9 e2 6c 04 | c5 f0 75 0d 72 fe 09 0a a5 0a 64 0c 9d 8e b4 bd | 1a c3 bb 6e f6 92 c0 b5 8c 93 b9 eb e3 12 c7 a1 | bd b7 f3 a0 b9 80 8c 76 59 8f 43 af 0f 58 66 7f | b7 29 f0 c0 1c a1 51 2d c9 c0 ac e0 da 3e 0a fc | dd 42 1f ec 76 07 0c b3 ee 58 80 d8 3b 40 cd 6e | 29 12 48 14 35 22 e0 cf 05 9a 1b 46 91 35 4f 0c | 29 00 00 24 1a c7 00 d3 83 91 04 b5 76 85 d3 69 | a2 08 a9 2c b0 b3 a2 60 be 18 eb 18 2d fd ba 85 | 0c 0a 5c be 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 cf b4 85 53 44 b8 30 db 31 85 32 | 18 7e 13 4c d0 54 13 87 00 00 00 1c 00 00 40 05 | 54 d2 36 85 02 19 96 85 9c 4b 22 1c 55 b4 68 ad | 30 56 22 92 | libevent_free: release ptr-libevent@0x7fb36c046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ced0 | #281 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6e a6 a1 b4 01 a0 0e dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #281 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #281 | rejected packet: | 6e a6 a1 b4 01 a0 0e dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #281: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0472 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab39c0 | handling event EVENT_RETRANSMIT for parent state #36 | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #36 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #36 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49667.817513; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006313 exceeds limit? YES "road-eastnet-nonat-36" #36: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-36" #36: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #288 at 0x557d46a047d0 | State DB: adding IKEv2 state #288 in UNDEFINED | pstats #288 ikev2.ike started | Message ID: init #288: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #288: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #288; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-36" #288: initiating v2 parent SA to replace #36 | using existing local IKE proposals for connection road-eastnet-nonat-36 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 288 for state #288 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7ced0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #288 | libevent_malloc: new ptr-libevent@0x7fb36c046040 size 128 | #288 spent 0.0682 milliseconds in ikev2_parent_outI1() | RESET processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #36 ikev2.ike failed too-many-retransmits | pstats #36 ikev2.ike deleted too-many-retransmits | #36 spent 2.65 milliseconds in total | [RE]START processing: state #36 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-36" #36: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #36: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #36 "road-eastnet-nonat-36" #36: deleting IKE SA for connection 'road-eastnet-nonat-36' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-36' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-36 | State DB: deleting IKEv2 state #36 in PARENT_I1 | crypto helper 19 resuming | crypto helper 19 starting work-order 288 for state #288 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 288 | parent state #36: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 288 time elapsed 0.000574 seconds | (#288) spent 0.576 milliseconds in crypto helper computing work-order 288: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 288 for state #288 to event queue | scheduling resume sending helper answer for #288 | libevent_malloc: new ptr-libevent@0x7fb36804b8e0 size 128 | crypto helper 19 waiting (nothing to do) | stop processing: state #36 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb340030080 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab39c0 | in statetime_stop() and could not find #36 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-36 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-36" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-36' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-36" | stop processing: connection "road-eastnet-nonat-36" (in initiate_a_connection() at initiate.c:349) | spent 0.0563 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #288 | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 288 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #288 | **emit ISAKMP Message: | initiator cookie: | bf 5c b8 9a ac cd 00 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-36 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8e dd 69 c1 03 95 4d 9d ab 37 9e bd 4e 38 ec e5 | ikev2 g^x f2 39 ed 30 ab 4f b4 af 21 e6 29 da a0 8f 8f e9 | ikev2 g^x 98 9a 5c 5c fe fe ce 8c 1e 28 6b bd f2 27 35 da | ikev2 g^x c4 21 0a d8 6a ca c2 98 92 8e 38 38 a2 a7 6b ba | ikev2 g^x 5f d2 6c ce e3 9f f3 13 3d ec 78 7e f5 b7 1e b1 | ikev2 g^x c9 c9 b0 04 f7 e8 40 14 e7 76 0c 5b a9 d0 33 de | ikev2 g^x 38 f0 55 f2 f8 c3 51 4e 26 12 33 85 1a 59 5d 06 | ikev2 g^x e7 63 42 d3 d5 d3 89 6c 22 47 f2 98 c6 f4 da 55 | ikev2 g^x 13 a9 2a 55 81 33 8b eb 87 ee 13 8e 33 aa a8 42 | ikev2 g^x 9f da b4 47 d8 37 6a 92 68 90 c1 81 a0 df a1 37 | ikev2 g^x a4 78 f7 b3 8d d2 2d ce a0 c9 68 dd 56 89 c4 d1 | ikev2 g^x 63 8d aa 71 1f 08 79 a0 6d 66 a0 3e 16 15 54 65 | ikev2 g^x d5 46 20 67 d9 5b 61 9c 6a 83 fc f8 ba b1 78 4c | ikev2 g^x 57 19 a7 94 fa 72 b9 cd d4 1a e2 8c ec 18 65 32 | ikev2 g^x 0a 6f a6 9d 17 41 ad c3 33 be e4 df 39 be bb 83 | ikev2 g^x 36 2c fd e8 5d 07 b2 3e e4 4e 6e 8c 65 67 24 e6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6b 44 05 03 68 15 67 d5 e0 ba b2 f4 3c 29 af e5 | IKEv2 nonce 83 d8 9f ee 30 22 ac b5 c3 ee cd df dc 79 2d 2d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= bf 5c b8 9a ac cd 00 07 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 24 | natd_hash: port= 01 f4 | natd_hash: hash= 6a 39 d5 43 71 fe 6f b5 ee bc 1b f9 48 2a ac fe | natd_hash: hash= 4d 86 a5 da | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6a 39 d5 43 71 fe 6f b5 ee bc 1b f9 48 2a ac fe | Notify data 4d 86 a5 da | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= bf 5c b8 9a ac cd 00 07 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f7 70 11 42 70 0c d7 f2 22 65 12 cb b8 c3 7c 30 | natd_hash: hash= 56 c5 c0 c0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f7 70 11 42 70 0c d7 f2 22 65 12 cb b8 c3 7c 30 | Notify data 56 c5 c0 c0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #288 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #288: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #288 to 4294967295 after switching state | Message ID: IKE #288 skipping update_recv as MD is fake | Message ID: sent #288 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-36" #288: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.36:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #288) | bf 5c b8 9a ac cd 00 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e dd 69 c1 03 95 4d 9d ab 37 9e bd 4e 38 ec e5 | f2 39 ed 30 ab 4f b4 af 21 e6 29 da a0 8f 8f e9 | 98 9a 5c 5c fe fe ce 8c 1e 28 6b bd f2 27 35 da | c4 21 0a d8 6a ca c2 98 92 8e 38 38 a2 a7 6b ba | 5f d2 6c ce e3 9f f3 13 3d ec 78 7e f5 b7 1e b1 | c9 c9 b0 04 f7 e8 40 14 e7 76 0c 5b a9 d0 33 de | 38 f0 55 f2 f8 c3 51 4e 26 12 33 85 1a 59 5d 06 | e7 63 42 d3 d5 d3 89 6c 22 47 f2 98 c6 f4 da 55 | 13 a9 2a 55 81 33 8b eb 87 ee 13 8e 33 aa a8 42 | 9f da b4 47 d8 37 6a 92 68 90 c1 81 a0 df a1 37 | a4 78 f7 b3 8d d2 2d ce a0 c9 68 dd 56 89 c4 d1 | 63 8d aa 71 1f 08 79 a0 6d 66 a0 3e 16 15 54 65 | d5 46 20 67 d9 5b 61 9c 6a 83 fc f8 ba b1 78 4c | 57 19 a7 94 fa 72 b9 cd d4 1a e2 8c ec 18 65 32 | 0a 6f a6 9d 17 41 ad c3 33 be e4 df 39 be bb 83 | 36 2c fd e8 5d 07 b2 3e e4 4e 6e 8c 65 67 24 e6 | 29 00 00 24 6b 44 05 03 68 15 67 d5 e0 ba b2 f4 | 3c 29 af e5 83 d8 9f ee 30 22 ac b5 c3 ee cd df | dc 79 2d 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 39 d5 43 71 fe 6f b5 ee bc 1b f9 | 48 2a ac fe 4d 86 a5 da 00 00 00 1c 00 00 40 05 | f7 70 11 42 70 0c d7 f2 22 65 12 cb b8 c3 7c 30 | 56 c5 c0 c0 | state #288 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c046040 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7ced0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ced0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #288 | libevent_malloc: new ptr-libevent@0x7fb340030080 size 128 | #288 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49667.818641 | resume sending helper answer for #288 suppresed complete_v2_state_transition() and stole MD | #288 spent 0.308 milliseconds in resume sending helper answer | stop processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36804b8e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 5c b8 9a ac cd 00 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #288 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #288 | rejected packet: | bf 5c b8 9a ac cd 00 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 24 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #288: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0411 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aee080 | handling event EVENT_RETRANSMIT for parent state #275 | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #275 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #275 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49667.831832; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001317 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab39c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #275 | libevent_malloc: new ptr-libevent@0x7fb36804b8e0 size 128 "road-eastnet-nonat-23" #275: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #275) | 8e 8a 90 cd 9e 92 16 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 db ff f3 45 8d 77 6b ab 4c f5 59 93 99 02 27 | 95 ea ea f3 ac f8 d0 0c f4 e4 a7 81 ed dc a2 2e | 80 d4 21 01 5a 1a 55 9b d3 86 c5 c8 54 08 80 87 | 53 03 95 88 ee 42 5d b8 52 8e fe 84 14 38 79 44 | c3 51 49 fc 97 0d 59 e0 5f 4b c0 5e f8 ec 96 9d | 9d 66 a2 14 38 ec b6 d3 b6 6a cc ee b5 48 0a 5e | 6f de 87 79 9d 43 73 e3 c3 11 60 66 e8 ee 7a 7d | c3 f9 f0 de 79 dc 04 3a 85 85 52 d2 92 21 fc 86 | 8d fd 20 94 86 24 05 6c 2b cb ee c9 04 8f 0f 93 | 01 a5 e2 2b 0c 12 b9 e6 3a 6c ef c0 32 59 e5 d2 | 3b 11 a2 9f 2d 5e e0 2d 8c 75 47 73 37 0b fd dc | 38 6f 1e 5d 62 ac ab 3b f8 90 5d 68 0c 10 a4 e3 | 5d d1 15 9f 1f d5 11 83 81 be 1d a7 8f 91 34 60 | 10 68 8c b7 8b 5a e8 bb 55 32 b6 ac 66 fb 13 bc | 8d 01 0f 0f f6 d9 7e e8 52 a6 18 9d f5 fb ae f8 | d6 4a f4 34 c9 7a eb 6e cd 1f ad 11 86 f4 37 e0 | 29 00 00 24 82 2a d3 ed 88 6f 6d 2b 95 fc ef 17 | cd da 04 83 d9 0b fe c7 f7 7a 31 0a 69 4f 17 0b | 3b dd fa 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 12 f4 6b 5c 7a 37 1f d4 51 59 a4 | 33 90 ab 79 b6 80 74 7b 00 00 00 1c 00 00 40 05 | 6b 59 3d 2d 41 62 79 69 4f 0b fb 7b cf 22 15 97 | 6d 57 a6 24 | libevent_free: release ptr-libevent@0x7fb38800c460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aee080 | #275 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 8a 90 cd 9e 92 16 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #275 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #275 | rejected packet: | 8e 8a 90 cd 9e 92 16 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #275: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acab40 | handling event EVENT_RETRANSMIT for parent state #266 | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #266 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #266 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49667.871131; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003567 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aee080 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #266 | libevent_malloc: new ptr-libevent@0x7fb38800c460 size 128 "road-eastnet-nonat-14" #266: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #266) | 6b cc e0 12 8b aa 91 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 c7 f6 72 9c a5 df d1 37 bd 8c a8 3d 12 ac f8 | 22 21 09 d5 08 f4 92 dd f1 6b 1f 81 7b 7f 3b 9d | 10 fa 77 c3 74 a7 03 4d 17 3b 47 94 f2 0e 9e 20 | ba c3 57 67 86 fd d2 e5 0d 53 bc 0e c2 cf a4 3a | ca 89 10 10 9a 9f 52 0e c5 60 b3 38 be 05 37 b4 | a3 6b 5d d8 04 66 d6 b5 93 93 8f 47 58 63 40 52 | 1b f8 2c cb 93 59 07 2b ad c7 18 ca a5 e9 24 fa | 41 de 1f 43 7f 1f 27 30 49 67 c7 c8 16 fd 61 a4 | 21 e9 05 98 46 f1 50 b6 8e 31 ad a9 2c 10 19 f5 | b9 ef 6b d3 e7 07 06 8e bf 18 8b 0a 77 f5 44 4b | 1c 00 21 d9 dc b3 66 3f a9 4b df cd cd bd 25 d2 | 2a cd 52 ad da b3 d3 bc be e7 d4 32 97 da 0f e8 | e2 29 51 0e 96 41 b4 ff 9b 20 c1 68 f8 22 6b 37 | bc 2d 7d 2a 13 01 a1 b3 05 fa c1 ea 1c 1f 45 97 | 4c 05 13 ad eb 35 15 0f f5 10 99 91 9b 3f 29 a1 | 29 e0 29 94 46 69 fe a4 f9 df d3 46 9b f7 d6 fc | 29 00 00 24 85 48 4e 62 cb aa ef f3 1e 98 d2 14 | 8e 36 5f 8a 20 c7 f8 35 5a c8 08 b9 4d a2 67 85 | 59 88 c1 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae c1 7f 5b 24 ac dc 11 ec a1 5c 57 | 31 3f 4b 60 7a 20 b0 c6 00 00 00 1c 00 00 40 05 | 71 38 17 79 8f 5d ce 34 6f 4c c4 ce cc 6f 78 37 | 7e be 6c a5 | libevent_free: release ptr-libevent@0x7fb388043300 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab40 | #266 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b cc e0 12 8b aa 91 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #266 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #266 | rejected packet: | 6b cc e0 12 8b aa 91 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #266: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_RETRANSMIT for parent state #37 | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #37 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #37 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49667.891421; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007593 exceeds limit? YES "road-eastnet-nonat-37" #37: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-37" #37: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #289 at 0x557d46a05d90 | State DB: adding IKEv2 state #289 in UNDEFINED | pstats #289 ikev2.ike started | Message ID: init #289: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #289: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #289; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-37" #289: initiating v2 parent SA to replace #37 | using existing local IKE proposals for connection road-eastnet-nonat-37 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 289 for state #289 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46acab40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #289 | libevent_malloc: new ptr-libevent@0x7fb388043300 size 128 | #289 spent 0.068 milliseconds in ikev2_parent_outI1() | RESET processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #37 ikev2.ike failed too-many-retransmits | pstats #37 ikev2.ike deleted too-many-retransmits | #37 spent 2.57 milliseconds in total | [RE]START processing: state #37 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-37" #37: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #37: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #37 "road-eastnet-nonat-37" #37: deleting IKE SA for connection 'road-eastnet-nonat-37' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-37' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-37 | crypto helper 6 resuming | crypto helper 6 starting work-order 289 for state #289 | State DB: deleting IKEv2 state #37 in PARENT_I1 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 289 | parent state #37: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 289 time elapsed 0.000585 seconds | (#289) spent 0.584 milliseconds in crypto helper computing work-order 289: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 289 for state #289 to event queue | scheduling resume sending helper answer for #289 | libevent_malloc: new ptr-libevent@0x7fb36c04b8e0 size 128 | crypto helper 6 waiting (nothing to do) | stop processing: state #37 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb37c046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | in statetime_stop() and could not find #37 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-37 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-37" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-37' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-37" | stop processing: connection "road-eastnet-nonat-37" (in initiate_a_connection() at initiate.c:349) | spent 0.0568 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #289 | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 289 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #289 | **emit ISAKMP Message: | initiator cookie: | 2e 50 46 ff ee 4c e9 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-37 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 11 67 60 81 00 e9 c5 12 22 cc 49 d1 8d 87 9d ec | ikev2 g^x ba e1 ae d7 0f ff 89 2c 01 49 2f 18 a4 d8 5a ff | ikev2 g^x 94 bb 3c 2d 6c 23 65 3c 9a 45 52 91 05 ff 55 0b | ikev2 g^x 22 ea fe ea 0a 4e f6 5b 7a 62 13 72 d3 65 de 8a | ikev2 g^x 6c f3 72 1b af fd 0c 36 3a 05 de a4 6d 9b 92 ce | ikev2 g^x d9 79 2b 75 ee 9a e2 a1 2c b2 02 b2 85 a2 98 a2 | ikev2 g^x 3c 63 cc 1f 7e c9 81 88 5b 95 14 a9 db c3 cc 4c | ikev2 g^x 7d 2a a7 8c 64 c7 93 92 12 cf 28 08 e5 ab 19 fa | ikev2 g^x 3f 53 9a 5b d7 86 99 40 82 c2 0d 84 83 94 43 d6 | ikev2 g^x cb b8 b3 06 64 05 bf d9 9d 5b fb 6a 5b 6a d2 16 | ikev2 g^x 6f b8 75 0b 98 2a 33 7f 2c 96 47 b3 69 76 55 52 | ikev2 g^x ca 3f b2 34 c4 b8 60 62 c8 0f 07 9c 2a 3e 70 02 | ikev2 g^x 1f 60 03 3e 97 1e ea 39 09 c8 ac 49 fb 70 ef af | ikev2 g^x f9 7e 7f f0 e4 2d 18 4d f8 20 f5 71 8f b4 fc be | ikev2 g^x 11 8b 08 ae 82 4a 27 f4 11 f5 e0 5f 14 7e a2 b5 | ikev2 g^x 66 07 59 01 f7 8e 64 17 db 17 82 9f be dd 61 54 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 70 cb ce 4e e8 fa 33 67 08 21 14 9b 70 83 d5 d1 | IKEv2 nonce 77 4f cc 4e 50 51 8a 00 6c d4 e4 19 33 47 80 f2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 2e 50 46 ff ee 4c e9 c7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 25 | natd_hash: port= 01 f4 | natd_hash: hash= e2 95 9d ea dc 9b 1a b8 2d d8 fe 0a bb 49 1d 2c | natd_hash: hash= c9 ad 47 73 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e2 95 9d ea dc 9b 1a b8 2d d8 fe 0a bb 49 1d 2c | Notify data c9 ad 47 73 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 2e 50 46 ff ee 4c e9 c7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 70 48 4d 18 17 11 80 57 99 3c 90 8c f0 f2 b1 e5 | natd_hash: hash= 98 18 b0 dd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 70 48 4d 18 17 11 80 57 99 3c 90 8c f0 f2 b1 e5 | Notify data 98 18 b0 dd | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #289 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #289: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #289 to 4294967295 after switching state | Message ID: IKE #289 skipping update_recv as MD is fake | Message ID: sent #289 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-37" #289: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.37:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #289) | 2e 50 46 ff ee 4c e9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 67 60 81 00 e9 c5 12 22 cc 49 d1 8d 87 9d ec | ba e1 ae d7 0f ff 89 2c 01 49 2f 18 a4 d8 5a ff | 94 bb 3c 2d 6c 23 65 3c 9a 45 52 91 05 ff 55 0b | 22 ea fe ea 0a 4e f6 5b 7a 62 13 72 d3 65 de 8a | 6c f3 72 1b af fd 0c 36 3a 05 de a4 6d 9b 92 ce | d9 79 2b 75 ee 9a e2 a1 2c b2 02 b2 85 a2 98 a2 | 3c 63 cc 1f 7e c9 81 88 5b 95 14 a9 db c3 cc 4c | 7d 2a a7 8c 64 c7 93 92 12 cf 28 08 e5 ab 19 fa | 3f 53 9a 5b d7 86 99 40 82 c2 0d 84 83 94 43 d6 | cb b8 b3 06 64 05 bf d9 9d 5b fb 6a 5b 6a d2 16 | 6f b8 75 0b 98 2a 33 7f 2c 96 47 b3 69 76 55 52 | ca 3f b2 34 c4 b8 60 62 c8 0f 07 9c 2a 3e 70 02 | 1f 60 03 3e 97 1e ea 39 09 c8 ac 49 fb 70 ef af | f9 7e 7f f0 e4 2d 18 4d f8 20 f5 71 8f b4 fc be | 11 8b 08 ae 82 4a 27 f4 11 f5 e0 5f 14 7e a2 b5 | 66 07 59 01 f7 8e 64 17 db 17 82 9f be dd 61 54 | 29 00 00 24 70 cb ce 4e e8 fa 33 67 08 21 14 9b | 70 83 d5 d1 77 4f cc 4e 50 51 8a 00 6c d4 e4 19 | 33 47 80 f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 95 9d ea dc 9b 1a b8 2d d8 fe 0a | bb 49 1d 2c c9 ad 47 73 00 00 00 1c 00 00 40 05 | 70 48 4d 18 17 11 80 57 99 3c 90 8c f0 f2 b1 e5 | 98 18 b0 dd | state #289 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388043300 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46acab40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #289 | libevent_malloc: new ptr-libevent@0x7fb37c046040 size 128 | #289 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49667.892565 | resume sending helper answer for #289 suppresed complete_v2_state_transition() and stole MD | #289 spent 0.313 milliseconds in resume sending helper answer | stop processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c04b8e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2e 50 46 ff ee 4c e9 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #289 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #289 | rejected packet: | 2e 50 46 ff ee 4c e9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 25 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #289: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac1340 | handling event EVENT_RETRANSMIT for parent state #282 | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #282 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #282 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49667.897745; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500549 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #282 | libevent_malloc: new ptr-libevent@0x7fb36c04b8e0 size 128 "road-eastnet-nonat-30" #282: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #282) | 46 9b 20 9a e5 8e c3 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 4a 4a 05 a5 e8 31 07 19 01 9a 3a 84 bd 00 2c | 01 26 e2 35 38 1d c2 10 27 23 65 e5 d1 d5 9e 9d | 93 4a 85 e7 79 d0 00 1e a3 c9 7f d0 87 96 13 32 | 3a 52 f9 aa fd 75 0f 57 d6 53 8b a2 5b 2a a9 29 | 20 47 1e e0 f6 79 b4 a2 d0 fd e2 85 9e 06 b0 c5 | 1f eb f9 ce 36 69 1b 53 58 8d aa 02 dd a3 93 19 | 8b 0f e6 94 85 c6 21 ed 47 d3 f5 ea 66 43 13 82 | da f0 e0 63 f7 98 28 5e a4 cb 20 f6 07 ee ef 26 | 67 cb 7a 06 89 6a a0 7d 08 f6 7d ba 27 41 9f 3f | f9 0e 8b 4e f2 9a 91 05 9e 11 34 81 a4 96 af ee | 90 6f f6 67 88 78 72 a1 94 39 66 b1 22 8d 82 7c | 2e db f6 a2 5d 7b a6 60 14 74 1c b3 6d 80 df 10 | f8 59 91 7e 94 04 39 3a 04 77 10 6d 00 3c a4 c9 | 37 8a d9 0b 42 ad 9c 7e 79 d0 0a 68 7a d1 19 02 | 3f 63 fb b2 47 d4 e3 0d 1d 5d 62 cd 37 80 af a2 | 0b a2 8f e1 3f b9 34 fc d9 39 c1 27 65 16 8f 01 | 29 00 00 24 43 cb 25 08 9c 10 6d 8d e0 8b af 6b | 30 64 58 bc 44 4b 07 d1 a3 b6 7d 77 46 d8 bf 81 | 62 ff 7f 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f cf c8 c3 31 5e 18 fc ce 9a 0d be | ec 9d b8 d1 d8 fa d9 18 00 00 00 1c 00 00 40 05 | 91 0b 3b 5a da ea f5 67 3e 89 32 94 c9 4e eb eb | e4 06 4e d6 | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac1340 | #282 spent 0.0912 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 9b 20 9a e5 8e c3 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #282 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #282 | rejected packet: | 46 9b 20 9a e5 8e c3 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #282: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0454 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46af6380 | handling event EVENT_RETRANSMIT for parent state #276 | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #276 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #276 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49667.942023; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00154 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac1340 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #276 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 "road-eastnet-nonat-24" #276: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #276) | 97 d8 09 67 95 19 ff f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e fe 65 45 24 16 54 b2 a7 14 49 9e 41 08 a6 ad | 8d 38 c1 ab 41 bc c5 70 74 ea 87 6b 47 67 61 c9 | 08 e4 05 10 d8 b1 89 eb 95 ae 5c c6 f1 8d 64 f6 | e2 34 f7 1e 96 bb c8 e4 08 d5 11 49 c7 13 d5 5b | 05 9d 02 33 71 55 11 11 24 9a 7a f7 2f f8 55 e9 | 49 16 da 32 11 31 25 c0 d3 d2 83 15 e8 61 24 52 | f4 f3 a7 f2 34 62 0e d9 54 b7 ea 87 42 a8 29 03 | 05 f5 e1 d2 8f 40 88 3f e8 e4 52 27 80 25 db f2 | 79 7c f2 ce e3 4d 99 fa 0f 82 50 fa bd f3 31 31 | 75 5b 04 3c f4 62 cf 98 a6 3b 30 69 aa fe de 35 | fe 70 61 92 ab 0c 67 96 0d 80 c2 5b c7 8c 3b 7a | 1d cc 0e d5 c6 71 9d 10 b0 4a ac f9 9f b7 d7 6d | 29 1a 45 c3 c8 c4 88 f8 4d dd 53 1c d2 5c 13 5d | 0b 9c e9 d4 6a e6 6d db d7 74 a8 c2 b2 2b 2e 99 | c1 be 2c 7e b9 9a 61 61 42 22 a8 96 77 9d c3 f9 | 9b eb 60 04 cc 7a e8 a6 1b 7a bb 42 2e 5c de 12 | 29 00 00 24 89 93 ef 63 4b 32 f6 be 90 74 d4 cc | df 00 dd 1b b5 27 60 b1 da 93 3c e5 82 5c 18 d4 | 92 56 47 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 b3 01 11 26 92 0f 1e 78 d6 0c e4 | b7 13 47 be 6e 37 68 a6 00 00 00 1c 00 00 40 05 | 24 f3 9b 24 06 cb fe aa 4a 7c a0 cb 8e 4b 56 de | 28 62 03 f5 | libevent_free: release ptr-libevent@0x7fb38000c460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af6380 | #276 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 d8 09 67 95 19 ff f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #276 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #276 | rejected packet: | 97 d8 09 67 95 19 ff f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #276: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fbb00 | handling event EVENT_RETRANSMIT for parent state #267 | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #267 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #267 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49667.964384; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003972 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af6380 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #267 | libevent_malloc: new ptr-libevent@0x7fb38000c460 size 128 "road-eastnet-nonat-15" #267: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #267) | 6f db 88 0f fe 70 dc 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e ec fe e4 22 11 a7 b5 a2 ee 25 53 3a 2f 1c 0a | 48 51 04 db 46 22 ad 6d 3c 60 e2 cb fb cc f5 7a | 6d 5e c9 24 ec d8 52 4f 96 5b 62 28 fb 9e eb fd | ac e9 f7 6f 4d 1a f9 74 24 29 e6 a2 80 a2 a7 c1 | b9 1c da 76 8c 9d 40 38 6a 26 13 d3 da 72 01 42 | b6 16 9c ca 09 1d 9b a9 90 70 fb 71 d1 ea b4 45 | 95 3b 5d b5 2c c1 00 ea bd 33 e0 43 00 b9 22 f4 | c9 60 90 dc b0 82 03 89 b0 c4 03 22 4b cf 7c 50 | 96 60 35 da 9c 4c f2 64 7d be b4 90 21 9b 54 ab | 96 09 b1 ee 1f 0d db 8e 22 4d 09 d6 43 6f c8 f1 | da 0c fd f4 69 33 b0 96 0f 1a 25 07 1d e6 1b 37 | 20 ff 37 b4 80 d9 a3 78 93 5a eb 5d 36 bd 9e 35 | 1e 0e a9 e8 13 eb 16 8f ff d5 26 ef c2 d5 47 45 | 91 9b e3 0e c5 08 1f 34 46 fe b0 3e f5 ce e1 c7 | 7c 47 c2 2d d2 f7 4c 06 62 a0 ae f2 e6 53 ff 73 | ee d6 e5 9b 28 8e f3 4d ef ad 40 41 9e 20 99 95 | 29 00 00 24 6d 5a fb f5 8a b7 85 2e cf 37 31 c5 | a8 e8 a7 22 a7 58 7e 34 8e 06 61 77 f0 7b 3b ce | d2 d0 22 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 b4 63 c8 b9 e3 2d fa 51 7c 79 27 | ca 3c 7a c2 0c 39 1a 2b 00 00 00 1c 00 00 40 05 | d9 fc ba 6b 91 d3 e0 ee c2 81 f3 1d 92 b2 24 2f | bf 44 6b 65 | libevent_free: release ptr-libevent@0x7fb380027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fbb00 | #267 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f db 88 0f fe 70 dc 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #267 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #267 | rejected packet: | 6f db 88 0f fe 70 dc 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #267: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0479 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6e010 | handling event EVENT_RETRANSMIT for parent state #283 | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #283 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #283 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49667.97467; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500847 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fbb00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #283 | libevent_malloc: new ptr-libevent@0x7fb380027c10 size 128 "road-eastnet-nonat-31" #283: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #283) | 6d 25 6c e9 9d 21 2c 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b e9 86 64 c6 6f 55 a3 bc 52 39 e5 45 42 b6 cc | f2 a4 d8 e4 d7 c3 31 05 04 56 63 c6 c2 26 bf 59 | 6a b9 a8 fc fa 31 7a 57 4f f1 c0 49 83 9c 61 f6 | ea 6e c3 47 87 15 57 34 67 e5 10 86 61 2d 48 bc | 65 9e 10 ea 92 ad c9 b9 04 73 b8 2e a2 d6 b3 0a | c0 be 8f 2a 6c 99 ba 2f e9 4c 9e ba 98 ae c9 a2 | 11 55 c6 05 57 8e ab ea fe ab c0 66 94 91 31 6d | 5a 61 9a c2 11 87 93 ed bf 92 59 c4 b9 84 ce ab | db 12 40 39 53 0e ae d0 f2 e5 17 3c ea 18 98 24 | 12 e5 c0 95 86 ac ec 82 ab 81 6f 9e 62 08 73 b9 | a8 9d e0 0f 7d f3 2e 0b 7e 07 bc 19 99 3e 51 81 | 29 43 73 f2 dc b1 11 40 fd 25 79 3c 57 b5 ab be | 2e e1 68 18 e4 38 d8 a0 4c 8c 74 5e ff df de 09 | df 96 78 f3 4d 4d f6 30 46 ec df 31 2f 74 61 0b | 81 46 62 97 97 55 58 f5 2a c4 6f df 71 dd ee 98 | ae ac aa b2 0f 96 9a 79 9a bd 7e 1b 8b 95 fc 2d | 29 00 00 24 19 7a 94 41 a3 df 39 c8 6e b5 7e 75 | da 2c b2 db 58 bf cc 1e 51 b1 c7 de c1 0f 32 c8 | 22 50 94 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 90 7d 87 8b 25 a9 47 ca 59 98 98 | 30 6c 9b 73 ee 84 48 a4 00 00 00 1c 00 00 40 05 | 6c 03 cb 30 07 ff 71 63 de 15 87 b9 5c 0f 43 de | 70 36 3d ec | libevent_free: release ptr-libevent@0x7fb36c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6e010 | #283 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 25 6c e9 9d 21 2c 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #283 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #283 | rejected packet: | 6d 25 6c e9 9d 21 2c 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #283: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0485 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_RETRANSMIT for parent state #38 | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #38 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #38 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49667.976983; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.012951 exceeds limit? YES "road-eastnet-nonat-38" #38: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-38" #38: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #290 at 0x557d46a07350 | State DB: adding IKEv2 state #290 in UNDEFINED | pstats #290 ikev2.ike started | Message ID: init #290: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #290: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #290; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-38" #290: initiating v2 parent SA to replace #38 | using existing local IKE proposals for connection road-eastnet-nonat-38 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 290 for state #290 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a6e010 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #290 | libevent_malloc: new ptr-libevent@0x7fb36c0180b0 size 128 | #290 spent 0.0727 milliseconds in ikev2_parent_outI1() | RESET processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 resuming | start processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 11 starting work-order 290 for state #290 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 290 | pstats #38 ikev2.ike failed too-many-retransmits | pstats #38 ikev2.ike deleted too-many-retransmits | #38 spent 2.46 milliseconds in total | [RE]START processing: state #38 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-38" #38: deleting state (STATE_PARENT_I1) aged 64.015s and NOT sending notification | parent state #38: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #38 "road-eastnet-nonat-38" #38: deleting IKE SA for connection 'road-eastnet-nonat-38' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-38' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-38 | State DB: deleting IKEv2 state #38 in PARENT_I1 | parent state #38: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 290 time elapsed 0.000843 seconds | (#290) spent 0.849 milliseconds in crypto helper computing work-order 290: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 290 for state #290 to event queue | scheduling resume sending helper answer for #290 | libevent_malloc: new ptr-libevent@0x7fb36004b850 size 128 | crypto helper 11 waiting (nothing to do) | stop processing: state #38 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb35401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | in statetime_stop() and could not find #38 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-38 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-38" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-38' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-38" | stop processing: connection "road-eastnet-nonat-38" (in initiate_a_connection() at initiate.c:349) | spent 0.0586 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #290 | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 290 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #290 | **emit ISAKMP Message: | initiator cookie: | d9 b1 5b a3 d1 9c 57 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-38 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 89 dc 77 37 88 c0 74 0b c8 60 da a3 8f 9c e4 42 | ikev2 g^x 29 fe d5 c9 98 e7 af 66 82 be 95 44 77 f6 93 6f | ikev2 g^x 24 98 d7 cc c4 a6 16 af 14 a2 ad 53 a8 a5 93 3c | ikev2 g^x a1 26 c3 2d 65 3f cc 3f f0 9b 21 66 64 c4 82 00 | ikev2 g^x 30 f1 57 86 bf eb 51 88 bf 71 0a 30 68 dc 14 50 | ikev2 g^x 80 50 e1 6f 25 74 d9 af 8d f4 b9 89 60 e8 c3 c8 | ikev2 g^x 3b d5 14 f3 53 b4 96 85 6c 74 39 5d ff ee 22 a4 | ikev2 g^x ad 4c 82 96 29 6f f2 59 77 4e 48 da 14 23 7a 5c | ikev2 g^x 78 bb 13 4c f8 05 33 6d 40 79 5d e2 85 b7 6d 6e | ikev2 g^x b2 54 b0 03 d6 63 64 61 00 6d fd d4 8a 79 cd 3d | ikev2 g^x f1 25 f9 cf fc 5d a4 f7 ef 48 25 44 50 58 6a b2 | ikev2 g^x cd 2c dd 4c f0 ff 5e 32 e5 0f bc 63 fa 03 d5 1a | ikev2 g^x 9a ab 7e 2b 95 53 36 2e 47 c1 65 a2 7b d7 cd db | ikev2 g^x 40 2b 7a b2 21 b9 e9 6e fc 75 da 49 33 c1 98 35 | ikev2 g^x c7 9c 09 b3 47 fb 10 3f e1 56 6f be 75 69 b0 33 | ikev2 g^x f1 cb e8 e7 d6 74 b0 43 37 f7 9f 8c c7 7c d0 1e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f3 df a5 ae 0e f0 b6 8d 6c 86 f6 fd ac 3e 20 3a | IKEv2 nonce 6e ef cc 6e 76 09 43 e5 b3 97 07 d6 b5 fd b7 b9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d9 b1 5b a3 d1 9c 57 e7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 26 | natd_hash: port= 01 f4 | natd_hash: hash= 6a 90 0c 81 3c 3a d2 14 9a 30 eb 10 fa 46 c9 fe | natd_hash: hash= 37 f4 bb 0e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6a 90 0c 81 3c 3a d2 14 9a 30 eb 10 fa 46 c9 fe | Notify data 37 f4 bb 0e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d9 b1 5b a3 d1 9c 57 e7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ea fc 09 da ae 61 e7 e4 dc 7a 6e 5d ad e3 e5 ff | natd_hash: hash= 21 64 e7 65 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ea fc 09 da ae 61 e7 e4 dc 7a 6e 5d ad e3 e5 ff | Notify data 21 64 e7 65 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #290 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #290: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #290 to 4294967295 after switching state | Message ID: IKE #290 skipping update_recv as MD is fake | Message ID: sent #290 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-38" #290: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.38:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #290) | d9 b1 5b a3 d1 9c 57 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 dc 77 37 88 c0 74 0b c8 60 da a3 8f 9c e4 42 | 29 fe d5 c9 98 e7 af 66 82 be 95 44 77 f6 93 6f | 24 98 d7 cc c4 a6 16 af 14 a2 ad 53 a8 a5 93 3c | a1 26 c3 2d 65 3f cc 3f f0 9b 21 66 64 c4 82 00 | 30 f1 57 86 bf eb 51 88 bf 71 0a 30 68 dc 14 50 | 80 50 e1 6f 25 74 d9 af 8d f4 b9 89 60 e8 c3 c8 | 3b d5 14 f3 53 b4 96 85 6c 74 39 5d ff ee 22 a4 | ad 4c 82 96 29 6f f2 59 77 4e 48 da 14 23 7a 5c | 78 bb 13 4c f8 05 33 6d 40 79 5d e2 85 b7 6d 6e | b2 54 b0 03 d6 63 64 61 00 6d fd d4 8a 79 cd 3d | f1 25 f9 cf fc 5d a4 f7 ef 48 25 44 50 58 6a b2 | cd 2c dd 4c f0 ff 5e 32 e5 0f bc 63 fa 03 d5 1a | 9a ab 7e 2b 95 53 36 2e 47 c1 65 a2 7b d7 cd db | 40 2b 7a b2 21 b9 e9 6e fc 75 da 49 33 c1 98 35 | c7 9c 09 b3 47 fb 10 3f e1 56 6f be 75 69 b0 33 | f1 cb e8 e7 d6 74 b0 43 37 f7 9f 8c c7 7c d0 1e | 29 00 00 24 f3 df a5 ae 0e f0 b6 8d 6c 86 f6 fd | ac 3e 20 3a 6e ef cc 6e 76 09 43 e5 b3 97 07 d6 | b5 fd b7 b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 90 0c 81 3c 3a d2 14 9a 30 eb 10 | fa 46 c9 fe 37 f4 bb 0e 00 00 00 1c 00 00 40 05 | ea fc 09 da ae 61 e7 e4 dc 7a 6e 5d ad e3 e5 ff | 21 64 e7 65 | state #290 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c0180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a6e010 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6e010 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #290 | libevent_malloc: new ptr-libevent@0x7fb35401d920 size 128 | #290 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49667.978408 | resume sending helper answer for #290 suppresed complete_v2_state_transition() and stole MD | #290 spent 0.318 milliseconds in resume sending helper answer | stop processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36004b850 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 b1 5b a3 d1 9c 57 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #290 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #290 | rejected packet: | d9 b1 5b a3 d1 9c 57 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 26 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #290: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a42790 | handling event EVENT_RETRANSMIT for parent state #277 | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #277 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #277 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49668.033598; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001284 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #277 | libevent_malloc: new ptr-libevent@0x7fb36004b850 size 128 "road-eastnet-nonat-25" #277: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #277) | ed b4 5b 7c 9c f8 2d 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 91 10 6d ca 19 82 3a d9 60 7a 42 28 66 35 e5 | 82 e1 76 6a af 41 1a 40 79 5a ee 26 e3 d1 7d 52 | 03 12 d2 f6 99 41 6c 71 1c 80 6b 42 ba dc 3a 1b | b2 e9 12 a6 18 73 56 76 a4 06 05 cc 7a a0 0d 6d | 5e b3 80 19 f7 55 aa 2e 78 b1 66 56 9c 95 5c 32 | ad 95 eb b3 ba 95 95 ac ab 11 2a 2d 88 4f f4 e4 | dc 27 65 85 9d 92 a4 95 34 90 00 dd a5 be b5 ab | 9b 9f 39 46 28 33 16 41 a9 bb 12 e3 aa e6 53 f9 | 68 46 b2 9f c5 cd e9 27 33 0f ce 44 2d af d9 1b | dd 62 0d ac 4f 6c d0 11 3c 43 0a 76 ed 0e 96 8e | 3d ae f9 37 d9 67 c1 41 28 1d b6 2e 37 94 9e d3 | 2d cd 56 12 85 bb 68 4b bc 82 79 db 1e 4d bb bf | 84 00 46 a4 83 fb 2f 52 63 fc 2d 22 07 38 b8 c2 | 10 b3 b9 89 01 dd 44 99 e7 b8 0d b3 ff 24 4d 13 | b0 46 f4 b8 d8 19 4c 50 4a 18 69 03 39 b2 07 55 | 2b c7 e7 99 0d e8 a0 4f a8 e9 77 f9 b1 03 fa af | 29 00 00 24 29 c9 81 60 c0 da c9 2a 2b e1 7f 4a | cf 46 c4 64 f1 f4 1c 69 ff e2 b3 05 a6 db d8 66 | 75 2e e0 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 88 a4 31 ce f7 11 c3 38 da 2b 8a | 45 3d 50 97 02 58 67 d6 00 00 00 1c 00 00 40 05 | 85 8b 47 13 68 9a a2 a7 47 76 c4 a7 6b ba 26 12 | 0d c2 32 9d | libevent_free: release ptr-libevent@0x7fb38400c460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a42790 | #277 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed b4 5b 7c 9c f8 2d 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #277 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #277 | rejected packet: | ed b4 5b 7c 9c f8 2d 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #277: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0696 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a672d0 | handling event EVENT_RETRANSMIT for parent state #39 | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #39 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #39 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49668.051942; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006651 exceeds limit? YES "road-eastnet-nonat-39" #39: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-39" #39: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #291 at 0x557d46a08910 | State DB: adding IKEv2 state #291 in UNDEFINED | pstats #291 ikev2.ike started | Message ID: init #291: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #291: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #291; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-39" #291: initiating v2 parent SA to replace #39 | using existing local IKE proposals for connection road-eastnet-nonat-39 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 291 for state #291 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a42790 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #291 | libevent_malloc: new ptr-libevent@0x7fb38400c460 size 128 | #291 spent 0.0987 milliseconds in ikev2_parent_outI1() | RESET processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #39 ikev2.ike failed too-many-retransmits | pstats #39 ikev2.ike deleted too-many-retransmits | #39 spent 2.59 milliseconds in total | [RE]START processing: state #39 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-39" #39: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #39: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #39 "road-eastnet-nonat-39" #39: deleting IKE SA for connection 'road-eastnet-nonat-39' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-39' added to the list and scheduled for 0 seconds | crypto helper 16 resuming | crypto helper 16 starting work-order 291 for state #291 | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 291 | in connection_discard for connection road-eastnet-nonat-39 | State DB: deleting IKEv2 state #39 in PARENT_I1 | parent state #39: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #39 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb338012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a672d0 | in statetime_stop() and could not find #39 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 291 time elapsed 0.000548 seconds | processing global timer EVENT_REVIVE_CONNS | (#291) spent 0.567 milliseconds in crypto helper computing work-order 291: ikev2_outI1 KE (pcr) Initiating connection road-eastnet-nonat-39 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 16 sending results from work-order 291 for state #291 to event queue | scheduling resume sending helper answer for #291 | libevent_malloc: new ptr-libevent@0x7fb36400f1a0 size 128 | crypto helper 16 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-39" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-39' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-39" | stop processing: connection "road-eastnet-nonat-39" (in initiate_a_connection() at initiate.c:349) | spent 0.0747 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #291 | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 291 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #291 | **emit ISAKMP Message: | initiator cookie: | 77 85 93 ea 80 0c b0 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-39 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 20 1c 76 58 29 75 7e d4 f4 bf 59 3f 6e da 30 13 | ikev2 g^x 97 91 e5 4d 2a 44 30 c6 77 2b e1 aa 90 8a 91 6e | ikev2 g^x f8 8f d9 e7 ab d5 fb c9 18 4a c7 0e 37 35 b2 f0 | ikev2 g^x a3 12 8b 8a 64 ba 60 9e 98 18 5b 0a c2 a4 de 16 | ikev2 g^x 9c ef 90 7b a5 b4 e5 01 26 3c 58 d0 37 33 d3 a2 | ikev2 g^x f6 fe 76 4d 01 cd 2b d6 3c be b9 eb 0d 8b d4 d7 | ikev2 g^x c4 c5 12 bf 64 f2 4f a2 ec 8b b1 e0 3a c2 a2 21 | ikev2 g^x f4 b9 1a d7 ab ef 1a 0d f1 e1 8b 50 27 cf 98 3e | ikev2 g^x c2 08 00 e6 03 cf bf ee 86 72 2a aa f9 36 e9 49 | ikev2 g^x e2 ab b6 47 68 84 b5 9d f0 67 c8 08 03 1b 51 9a | ikev2 g^x 44 fe 69 c7 87 64 78 4a b7 c0 08 da 1d ee c0 bb | ikev2 g^x be c8 5e a1 c1 cc 41 ab 33 ca fd ed d6 b3 7c b1 | ikev2 g^x a7 a2 c7 36 15 58 52 6a 99 ee 8c 84 f7 78 81 e9 | ikev2 g^x 01 61 49 76 ce 6b ac b8 4a dc 03 3e 4e 23 ba 57 | ikev2 g^x f4 01 5b 74 05 72 0c 07 03 e6 2a 5d b3 8c b8 ef | ikev2 g^x e7 cd d3 38 e6 37 e3 80 1e bc 5b 24 b7 a5 cb 2c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 37 f4 21 d3 cc 8d d5 11 a4 01 4c 20 b4 32 01 c8 | IKEv2 nonce 03 d8 fb 70 07 27 01 09 a0 70 e5 36 d3 fe b6 72 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 77 85 93 ea 80 0c b0 54 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 27 | natd_hash: port= 01 f4 | natd_hash: hash= 62 76 dc 7a b2 16 bf 01 10 e9 6f f4 8e 92 4c 8c | natd_hash: hash= 19 0f b1 8b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 62 76 dc 7a b2 16 bf 01 10 e9 6f f4 8e 92 4c 8c | Notify data 19 0f b1 8b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 77 85 93 ea 80 0c b0 54 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 48 a8 ae 2a a4 d2 aa 19 46 f9 d2 d9 d7 e1 ad a4 | natd_hash: hash= ae e0 ac b4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 48 a8 ae 2a a4 d2 aa 19 46 f9 d2 d9 d7 e1 ad a4 | Notify data ae e0 ac b4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #291 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #291: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #291 to 4294967295 after switching state | Message ID: IKE #291 skipping update_recv as MD is fake | Message ID: sent #291 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-39" #291: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.39:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #291) | 77 85 93 ea 80 0c b0 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 1c 76 58 29 75 7e d4 f4 bf 59 3f 6e da 30 13 | 97 91 e5 4d 2a 44 30 c6 77 2b e1 aa 90 8a 91 6e | f8 8f d9 e7 ab d5 fb c9 18 4a c7 0e 37 35 b2 f0 | a3 12 8b 8a 64 ba 60 9e 98 18 5b 0a c2 a4 de 16 | 9c ef 90 7b a5 b4 e5 01 26 3c 58 d0 37 33 d3 a2 | f6 fe 76 4d 01 cd 2b d6 3c be b9 eb 0d 8b d4 d7 | c4 c5 12 bf 64 f2 4f a2 ec 8b b1 e0 3a c2 a2 21 | f4 b9 1a d7 ab ef 1a 0d f1 e1 8b 50 27 cf 98 3e | c2 08 00 e6 03 cf bf ee 86 72 2a aa f9 36 e9 49 | e2 ab b6 47 68 84 b5 9d f0 67 c8 08 03 1b 51 9a | 44 fe 69 c7 87 64 78 4a b7 c0 08 da 1d ee c0 bb | be c8 5e a1 c1 cc 41 ab 33 ca fd ed d6 b3 7c b1 | a7 a2 c7 36 15 58 52 6a 99 ee 8c 84 f7 78 81 e9 | 01 61 49 76 ce 6b ac b8 4a dc 03 3e 4e 23 ba 57 | f4 01 5b 74 05 72 0c 07 03 e6 2a 5d b3 8c b8 ef | e7 cd d3 38 e6 37 e3 80 1e bc 5b 24 b7 a5 cb 2c | 29 00 00 24 37 f4 21 d3 cc 8d d5 11 a4 01 4c 20 | b4 32 01 c8 03 d8 fb 70 07 27 01 09 a0 70 e5 36 | d3 fe b6 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 76 dc 7a b2 16 bf 01 10 e9 6f f4 | 8e 92 4c 8c 19 0f b1 8b 00 00 00 1c 00 00 40 05 | 48 a8 ae 2a a4 d2 aa 19 46 f9 d2 d9 d7 e1 ad a4 | ae e0 ac b4 | state #291 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38400c460 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a42790 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a42790 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #291 | libevent_malloc: new ptr-libevent@0x7fb338012840 size 128 | #291 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49668.05334 | resume sending helper answer for #291 suppresed complete_v2_state_transition() and stole MD | #291 spent 0.478 milliseconds in resume sending helper answer | stop processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36400f1a0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 85 93 ea 80 0c b0 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #291 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #291 | rejected packet: | 77 85 93 ea 80 0c b0 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 27 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #291: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0572 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45310 | handling event EVENT_RETRANSMIT for parent state #284 | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #284 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #284 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49668.053452; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500542 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a672d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #284 | libevent_malloc: new ptr-libevent@0x7fb36400f1a0 size 128 "road-eastnet-nonat-32" #284: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #284) | 4f c5 f3 7c 66 c6 91 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba b7 9c a5 65 e1 b6 6c 6d 9d e6 37 7c 5c f0 56 | 41 3d 90 c7 c5 60 97 4a 06 1e 79 6d 8b 7a e1 25 | 8a e0 db 36 d3 fb fd 75 27 2c e6 11 8c 23 25 88 | 33 6a f7 df 2d 31 86 e1 88 c6 aa 1b d4 34 45 16 | 89 ed d8 a3 84 50 47 88 30 89 02 8c a8 40 9f 16 | 7d e6 73 98 ef b8 9b e4 c2 07 6e 64 f9 a7 00 b0 | 51 f9 1e 1e 5d 35 fd 1d 61 a0 8a db ac 3a a5 8e | 67 a3 5b 3b 5e 51 8c 98 11 1d 70 aa 48 6b 1b 38 | fe 3a 74 c3 2d 4b 66 87 e9 a4 65 ed 1c 5b e4 91 | fa be 09 5f aa ec 3b 28 29 ab 52 85 54 9f ad 67 | e9 64 b2 c0 a7 f8 4d 31 5f 8c e9 8e 20 90 9f 65 | 6a 76 61 75 16 6e 59 99 0c 9b cb ca c4 c4 20 96 | 27 41 40 bc 51 ae 53 c0 78 fe 0b f1 3b 9e 38 fe | 94 f7 01 4f 33 dd 41 c6 b8 e2 1f f5 07 d9 60 b6 | 76 7e 73 5f c5 3d 67 e4 c6 ee 71 88 8c 90 3a 18 | 0e 12 ec 6b 94 d2 71 0c c3 11 05 e5 1f bd ac 6a | 29 00 00 24 e8 7e a2 09 c5 c0 d6 dc c4 8f 1b fd | a9 a5 28 29 c6 ee 14 10 31 5e 74 e5 a8 11 e2 fb | 53 d1 4d b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 bd 1e aa d2 1d d0 15 75 cf 8a a1 | 9b e7 2e 78 e9 b8 ab 0e 00 00 00 1c 00 00 40 05 | 98 e6 12 78 17 7a 25 b0 15 91 c2 32 50 43 18 e1 | 21 f2 b2 de | libevent_free: release ptr-libevent@0x7fb358046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45310 | #284 spent 0.0947 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f c5 f3 7c 66 c6 91 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #284 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #284 | rejected packet: | 4f c5 f3 7c 66 c6 91 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #284: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0526 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a94500 | handling event EVENT_RETRANSMIT for parent state #278 | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #278 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #278 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49668.108754; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001367 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45310 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #278 | libevent_malloc: new ptr-libevent@0x7fb358046040 size 128 "road-eastnet-nonat-26" #278: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #278) | 08 20 1d 54 94 b3 08 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 a1 ac cd cf 52 aa c1 15 fd 26 f6 ce 5b bb 69 | e2 24 51 98 69 82 96 7a 9b 39 3d bd 86 5c 17 cb | 1b d4 a9 83 ec 80 8d 8d 98 27 4b 99 f4 20 5c e3 | 21 59 7a 6e 94 3a e5 a4 ea 37 74 6c a3 9a 99 f4 | 8f 90 94 d4 bd 67 d7 b9 06 e3 7c d1 d3 76 37 58 | 47 a2 45 8a db 7e f9 85 d6 08 20 a6 bf 2b 7f c1 | 25 eb a0 f8 68 c1 9c c0 38 d2 e7 d9 43 7b cb 27 | 99 db 05 15 9d 31 4d 0f 10 f4 8b 1c a6 46 f5 eb | 21 00 56 37 46 de 0d 94 e5 1c 55 ca 89 03 da 88 | 4e dc 76 55 16 95 7d 63 e2 29 4d 09 2b 25 59 20 | f9 0f f3 3f f2 2e bd 84 bc f5 d7 26 2f 24 33 39 | 9b 95 39 a9 c8 80 99 61 48 09 51 76 c7 02 f7 7e | 9a 29 d4 87 ca 9f 9d b2 ea 2d 4b 02 ce 90 b0 a7 | 7e 1d de da 63 ea 0e 8d 96 e6 95 fb 1c 5e 88 3b | 6e ec 99 33 d7 e2 75 ac ca 10 ec 9b 00 5a c4 5e | 94 67 a1 9a 10 a7 22 d4 3e d5 55 a9 17 c5 c5 72 | 29 00 00 24 16 ad f5 49 a7 87 af 94 50 48 7a 22 | f4 eb b9 a7 0c 25 3c c9 61 3d 03 4a 9f 4c 8f 7c | d3 51 5e 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e fe 64 30 2d 54 01 ce c5 20 30 8e | 57 4b dd bc f4 7a 78 34 00 00 00 1c 00 00 40 05 | c5 ea 3a 3a ae 73 b8 b7 65 be 1b eb 5d 99 4d a3 | 57 6c 56 99 | libevent_free: release ptr-libevent@0x7fb35804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94500 | #278 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 20 1d 54 94 b3 08 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #278 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #278 | rejected packet: | 08 20 1d 54 94 b3 08 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #278: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0489 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #285 | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #285 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #285 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49668.120059; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50121 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94500 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #285 | libevent_malloc: new ptr-libevent@0x7fb35804b850 size 128 "road-eastnet-nonat-33" #285: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #285) | 8e b8 37 d5 68 56 5c 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 a4 f2 e0 52 94 4a 81 83 55 c1 41 32 b7 b8 02 | 1f ed 45 79 af ff 8a eb 0a de 74 5c 80 82 ad 8f | b3 d0 39 bf 3b db ca 12 0b a2 0e eb ce 92 b6 11 | 51 c6 b7 d3 f4 87 aa 09 0c f5 bb d2 46 13 91 7d | 65 dc 9e 2a 12 da 3f be a8 bc 4e 1c a1 4c 53 ad | 64 f4 41 68 96 19 bd e1 80 86 91 4f 17 c1 cc 5c | ad 72 12 cc 9c fe d8 85 6a cd 1f 0f cf 61 bc 07 | 09 af 5b a0 a2 6c 2a 6f 4c 7e dd ad 13 55 ed 0e | ce cf e6 c5 66 9e 5a 6a e4 42 78 50 61 c3 d4 73 | e3 47 f2 bc a4 8c 26 64 97 c9 f1 2a c6 63 9c 83 | 60 4f 25 9e cb 7a 10 71 25 9d c1 dd 11 38 34 bc | 7c a1 3b 2b 0d 73 6f f9 3c 0b 62 50 05 38 a7 0e | 31 2d 60 72 dd 2b a2 05 f6 e2 f0 0d 9b c1 b1 9e | c0 ee 0d 2f 64 4b 28 d2 c0 e7 3b 0a 50 ff 03 45 | 45 ff 2c cd 4e 54 17 7d 2b 95 02 32 23 94 0e de | 7b 38 d9 9c b7 e8 7d 2f 56 9c 26 e0 8b a0 e6 38 | 29 00 00 24 e6 a9 52 cb 4c 75 d2 f3 84 20 3b dd | 0e ee e2 12 57 50 c2 6f 3d 4c ae 21 23 00 a4 ca | 8c 87 5b 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 5c 90 12 97 99 4e dd 8f 9a cf 75 | ad 0a 2b a1 31 ad 53 29 00 00 00 1c 00 00 40 05 | f9 f4 9b a0 01 06 28 22 67 53 82 2b ec 0b 3c 23 | 3e d8 d3 7f | libevent_free: release ptr-libevent@0x7fb34801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #285 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e b8 37 d5 68 56 5c 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #285 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #285 | rejected packet: | 8e b8 37 d5 68 56 5c 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #285: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.067 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6f550 | handling event EVENT_RETRANSMIT for parent state #40 | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #40 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #40 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49668.120313; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010037 exceeds limit? YES "road-eastnet-nonat-40" #40: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-40" #40: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #292 at 0x557d46a09ed0 | State DB: adding IKEv2 state #292 in UNDEFINED | pstats #292 ikev2.ike started | Message ID: init #292: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #292: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #292; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-40" #292: initiating v2 parent SA to replace #40 | using existing local IKE proposals for connection road-eastnet-nonat-40 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 292 for state #292 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb33800d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #292 | libevent_malloc: new ptr-libevent@0x7fb34801d920 size 128 | #292 spent 0.0892 milliseconds in ikev2_parent_outI1() | crypto helper 4 resuming | crypto helper 4 starting work-order 292 for state #292 | RESET processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 292 | start processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #40 ikev2.ike failed too-many-retransmits | pstats #40 ikev2.ike deleted too-many-retransmits | #40 spent 2.59 milliseconds in total | [RE]START processing: state #40 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-40" #40: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #40: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #40 "road-eastnet-nonat-40" #40: deleting IKE SA for connection 'road-eastnet-nonat-40' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-40' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-40 | State DB: deleting IKEv2 state #40 in PARENT_I1 | parent state #40: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #40 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 292 time elapsed 0.000555 seconds | libevent_free: release ptr-libevent@0x7fb33803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6f550 | in statetime_stop() and could not find #40 | (#292) spent 0.558 milliseconds in crypto helper computing work-order 292: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 292 for state #292 to event queue | scheduling resume sending helper answer for #292 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb35804b8e0 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-40 which received a Delete/Notify but must remain up per local policy | crypto helper 4 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-40" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-40' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-40" | stop processing: connection "road-eastnet-nonat-40" (in initiate_a_connection() at initiate.c:349) | spent 0.0711 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #292 | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 292 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #292 | **emit ISAKMP Message: | initiator cookie: | 87 88 51 7a 60 9d 5a 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-40 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b9 66 a0 4d 60 cb 65 95 3c 93 0d 5e 54 74 22 d5 | ikev2 g^x b9 4e e2 32 b5 97 c3 a0 c6 6f 16 29 09 b8 29 a7 | ikev2 g^x 53 85 60 d3 38 df d9 0c a3 64 8e 65 05 77 b2 87 | ikev2 g^x 1b 54 26 e9 27 44 44 33 65 9f 3e a3 6d dc 58 a3 | ikev2 g^x 3c 1b b5 56 27 64 d7 00 90 21 cd 7d 46 ab 11 af | ikev2 g^x ba 96 a3 c8 ee 97 85 92 75 7b ec 2d df 79 07 56 | ikev2 g^x 45 a8 e2 68 58 3f 02 db 14 25 0e 1f 9b c2 bb 05 | ikev2 g^x 5a 26 d6 ed 51 8a 97 6d 65 fb 55 2b bb 16 61 e4 | ikev2 g^x de 73 b2 ef 70 09 3d 76 f2 05 da 1e bd 6c 49 e0 | ikev2 g^x 44 ef e7 7e 74 41 a3 f7 8a 2e 4b 16 50 e8 de e0 | ikev2 g^x a4 17 3e ac 86 b1 62 63 2e 1c a5 2b dc 13 3a ee | ikev2 g^x 9b a0 c2 94 2b ba 80 4c 0b 59 f3 60 75 ff 33 5f | ikev2 g^x 0b 97 1a 30 63 32 07 17 5c 59 1a 4a db 49 f2 ef | ikev2 g^x 1e b6 76 4d ca 87 ea 08 32 6d 49 4e d6 81 ee 4c | ikev2 g^x c7 58 d6 e6 53 ab c7 5b 58 9e 4a 36 b9 18 48 a2 | ikev2 g^x 61 0a 77 8a 15 c7 1b 51 f1 d5 e0 50 5a 9b 7a 98 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b6 37 4c f0 c9 85 b2 01 0e 7e 3e 08 4a 99 af 96 | IKEv2 nonce 7f b4 c9 1d 28 51 f7 8e 73 35 20 22 15 78 52 6f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 87 88 51 7a 60 9d 5a 1f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 28 | natd_hash: port= 01 f4 | natd_hash: hash= 45 e7 d2 e3 15 0a 06 f3 99 b1 c4 ad 55 e8 07 46 | natd_hash: hash= e3 af eb 45 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 45 e7 d2 e3 15 0a 06 f3 99 b1 c4 ad 55 e8 07 46 | Notify data e3 af eb 45 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 87 88 51 7a 60 9d 5a 1f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9e 69 62 01 15 f2 f4 fe 05 57 a2 2c 87 7a 71 d0 | natd_hash: hash= 0c f9 69 7d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9e 69 62 01 15 f2 f4 fe 05 57 a2 2c 87 7a 71 d0 | Notify data 0c f9 69 7d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #292 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #292: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #292 to 4294967295 after switching state | Message ID: IKE #292 skipping update_recv as MD is fake | Message ID: sent #292 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-40" #292: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.40:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #292) | 87 88 51 7a 60 9d 5a 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 66 a0 4d 60 cb 65 95 3c 93 0d 5e 54 74 22 d5 | b9 4e e2 32 b5 97 c3 a0 c6 6f 16 29 09 b8 29 a7 | 53 85 60 d3 38 df d9 0c a3 64 8e 65 05 77 b2 87 | 1b 54 26 e9 27 44 44 33 65 9f 3e a3 6d dc 58 a3 | 3c 1b b5 56 27 64 d7 00 90 21 cd 7d 46 ab 11 af | ba 96 a3 c8 ee 97 85 92 75 7b ec 2d df 79 07 56 | 45 a8 e2 68 58 3f 02 db 14 25 0e 1f 9b c2 bb 05 | 5a 26 d6 ed 51 8a 97 6d 65 fb 55 2b bb 16 61 e4 | de 73 b2 ef 70 09 3d 76 f2 05 da 1e bd 6c 49 e0 | 44 ef e7 7e 74 41 a3 f7 8a 2e 4b 16 50 e8 de e0 | a4 17 3e ac 86 b1 62 63 2e 1c a5 2b dc 13 3a ee | 9b a0 c2 94 2b ba 80 4c 0b 59 f3 60 75 ff 33 5f | 0b 97 1a 30 63 32 07 17 5c 59 1a 4a db 49 f2 ef | 1e b6 76 4d ca 87 ea 08 32 6d 49 4e d6 81 ee 4c | c7 58 d6 e6 53 ab c7 5b 58 9e 4a 36 b9 18 48 a2 | 61 0a 77 8a 15 c7 1b 51 f1 d5 e0 50 5a 9b 7a 98 | 29 00 00 24 b6 37 4c f0 c9 85 b2 01 0e 7e 3e 08 | 4a 99 af 96 7f b4 c9 1d 28 51 f7 8e 73 35 20 22 | 15 78 52 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 e7 d2 e3 15 0a 06 f3 99 b1 c4 ad | 55 e8 07 46 e3 af eb 45 00 00 00 1c 00 00 40 05 | 9e 69 62 01 15 f2 f4 fe 05 57 a2 2c 87 7a 71 d0 | 0c f9 69 7d | state #292 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34801d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb33800d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #292 | libevent_malloc: new ptr-libevent@0x7fb33803b0b0 size 128 | #292 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49668.121566 | resume sending helper answer for #292 suppresed complete_v2_state_transition() and stole MD | #292 spent 0.448 milliseconds in resume sending helper answer | stop processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35804b8e0 | timer_event_cb: processing event@0x7fb34002a950 | handling event EVENT_RETRANSMIT for parent state #268 | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #268 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #268 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49668.121613; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001334 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6f550 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #268 | libevent_malloc: new ptr-libevent@0x7fb35804b8e0 size 128 "road-eastnet-nonat-16" #268: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #268) | 52 eb eb 01 2e 07 ee 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f4 ef 40 5e f5 2a 5e 5a b8 76 94 37 37 12 d2 32 | 87 80 98 31 81 5e ec c8 c0 10 ea 13 f1 32 fd 22 | 5f da f7 72 2a 67 06 fa cf 7f d5 1a c1 ae f1 92 | 7b 53 ad 16 00 b6 90 61 58 94 dd 7e 4a 9f 32 98 | a2 2e 9b 12 92 70 47 ac 39 ac 02 84 c9 35 b9 57 | 66 95 1c 62 b4 f0 47 38 3f ec 43 4d cf 73 e8 45 | 9f d1 15 db ca 5d 1c f1 70 f1 97 a1 2b 7d 26 5e | 27 c8 08 1e 0d d7 2a 7e 36 db 89 18 87 f0 43 11 | e3 cf c8 31 7d 0e ae 6a 97 23 05 40 5d 11 ea 66 | a1 79 e8 97 cf 5c 5b 3a eb e7 1e c8 25 eb 2f 83 | 00 66 8b 3e 05 72 c5 6e 34 08 88 16 97 1a 13 a9 | db 9b 7b 48 0f 92 cf 65 2a 3e cf 88 08 c6 cf 54 | d9 1b 5a 78 a6 05 e8 73 bf 3a d4 a6 65 47 24 50 | 20 0c 6c 69 e0 29 4a aa 5a 89 69 c7 3c 4d 82 76 | 81 c9 87 1d 60 f0 a9 b6 29 2b 06 98 6d a9 24 c8 | 1d 5c 2b 40 de 5d 36 a1 45 5d 5e 8a 48 e6 0b 26 | 29 00 00 24 f0 fa c9 ee f6 f5 97 a2 44 c5 ea 10 | 5b 58 db 61 17 58 ca 3c df 15 b8 1a de 90 ef 49 | 16 34 e4 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 2c 2a b2 6d be c9 76 69 fe e4 41 | f1 72 73 59 2e 97 3f f1 00 00 00 1c 00 00 40 05 | 31 f5 db e1 45 48 68 14 42 b0 53 d9 a4 6c d5 a0 | 03 9b fe 80 | libevent_free: release ptr-libevent@0x7fb340008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34002a950 | #268 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 88 51 7a 60 9d 5a 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #292 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #292 | rejected packet: | 87 88 51 7a 60 9d 5a 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #292: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0568 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 eb eb 01 2e 07 ee 4b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #268 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #268 | rejected packet: | 52 eb eb 01 2e 07 ee 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #268: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0549 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aaf800 | handling event EVENT_RETRANSMIT for parent state #279 | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #279 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #279 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49668.183971; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002067 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34002a950 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #279 | libevent_malloc: new ptr-libevent@0x7fb340008e30 size 128 "road-eastnet-nonat-27" #279: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #279) | e3 74 db 6d 09 5b 39 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 0f 5a 1b 7a 8f ca c9 79 23 84 5e dc 90 86 16 | 69 23 cd b6 f6 38 83 88 87 a0 82 5d cb 87 94 7a | a5 f1 35 43 62 38 5c 18 da 06 83 48 7b 51 b2 80 | 57 ee 54 19 13 b6 1b 59 ab b3 f3 ce 4e 70 21 d2 | 1d 3f 07 6b c1 ad 15 8b 16 67 f3 79 c6 3f ee ff | 6b 97 0c 11 61 f6 68 6d 51 5b dc dc 69 1e f2 f8 | 31 6f 04 6f 19 7c a8 a9 37 a2 da ca be a8 40 a8 | d0 ef 42 ba be 70 25 1f 20 b2 dd 25 56 46 50 6a | 55 24 29 65 1f 8b ad 5a c0 f3 1f c2 6d ed 0d 17 | f8 37 85 23 72 0c 7b c5 c8 05 6a d0 1b 38 ca f1 | 63 79 aa 8b f0 75 7e c0 5c 06 26 d0 c2 20 b9 e9 | c7 89 2f ee 84 27 1c 00 f8 3a d5 7e 2a be c2 84 | e4 6a 7c 0c 25 65 bb 41 df ad ea 07 28 2c bc 6e | 24 1b 9a 66 f8 83 86 6a 84 b0 d9 93 6f e5 9a 01 | 17 24 34 ac 82 0a b8 a3 51 37 c3 89 94 09 92 d7 | 0d 37 14 e0 ee 1c 1b 73 ef 46 af cc fd ba 52 42 | 29 00 00 24 f9 6f e2 b3 2b d1 43 b4 d3 29 40 07 | 4f e9 c5 79 33 c1 2e 78 27 6c f8 54 58 c2 d9 c9 | 00 b6 d5 b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 94 ec 05 36 41 29 fa 93 f5 5d d2 | 39 00 ad d2 4d 2f 36 81 00 00 00 1c 00 00 40 05 | 7a 98 d6 69 28 79 15 19 95 89 31 96 52 96 29 94 | 7d 8f c3 a4 | libevent_free: release ptr-libevent@0x7fb35c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aaf800 | #279 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 74 db 6d 09 5b 39 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #279 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #279 | rejected packet: | e3 74 db 6d 09 5b 39 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #279: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0502 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #286 | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #286 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #286 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49668.187261; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499824 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aaf800 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #286 | libevent_malloc: new ptr-libevent@0x7fb35c04b7c0 size 128 "road-eastnet-nonat-34" #286: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #286) | a2 ed ea 42 1b 91 7a d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a a6 7d cd 97 e4 f8 0e 4c a8 f7 b1 ec cb f9 8c | 2f 76 7e 20 17 e9 ac 96 37 6c d0 36 42 10 05 54 | c9 b8 65 a2 e7 d3 10 b3 60 78 69 80 3d 25 e3 d0 | 6b b3 ef 43 8d bb 4b f1 6d fd 75 58 b6 64 ea eb | 21 44 51 94 9d af c8 b5 2c d9 89 52 8e 49 92 15 | c8 f5 a7 13 6d cd 71 4c 89 a6 18 b9 37 a2 0d cb | 6e 90 fa f6 c2 05 39 4f e6 3c 7a ff 95 71 4f ea | 6f fa 7f ad 4f d5 8a a0 2f e3 1c 55 7c 9d 2b b7 | f8 c6 43 95 70 9b 3c 8c f8 2e 6e 7f b8 14 5a ab | e6 e2 cc bb a0 95 89 e6 41 f3 31 0c 80 44 7c cc | 26 be 63 d8 03 4f 0e f4 82 c2 32 aa ff f3 ec 67 | 80 f5 48 c4 4e dc 67 68 c5 87 ee 31 77 11 8a 89 | f7 38 08 ed 5a b3 8e c6 08 9c 28 3d e6 49 22 cc | f1 1d ea 6e 27 3f 41 69 56 c6 98 3e aa a5 4b a8 | 83 96 ce 94 b1 ac 7a 4b a0 42 08 47 1d ca 77 fa | 08 50 16 47 c6 8d 84 08 18 b0 a8 93 c0 9a 70 76 | 29 00 00 24 ff d1 37 2d 2c 72 ee aa 08 fb db a4 | 83 ef f7 bd 0a ef 47 b4 41 70 b6 07 5f 86 86 3a | e3 fa 60 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 c0 b7 bc 90 25 46 09 9f 5d 7d 2b | e5 1e 40 45 53 17 97 19 00 00 00 1c 00 00 40 05 | ec a0 d2 60 58 e7 4c 5a 13 5c f5 c2 c9 76 dd 61 | a7 bb 7e 37 | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #286 spent 0.0904 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 ed ea 42 1b 91 7a d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #286 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #286 | rejected packet: | a2 ed ea 42 1b 91 7a d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #286: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0eac0 | handling event EVENT_RETRANSMIT for parent state #41 | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #41 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #41 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49668.212505; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00796 exceeds limit? YES "road-eastnet-nonat-41" #41: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-41" #41: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #293 at 0x557d46a0b490 | State DB: adding IKEv2 state #293 in UNDEFINED | pstats #293 ikev2.ike started | Message ID: init #293: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #293: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #293; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-41" #293: initiating v2 parent SA to replace #41 | using existing local IKE proposals for connection road-eastnet-nonat-41 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 293 for state #293 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46afe580 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #293 | libevent_malloc: new ptr-libevent@0x7fb350009640 size 128 | #293 spent 0.0725 milliseconds in ikev2_parent_outI1() | crypto helper 13 resuming | RESET processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 starting work-order 293 for state #293 | start processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 293 | pstats #41 ikev2.ike failed too-many-retransmits | pstats #41 ikev2.ike deleted too-many-retransmits | #41 spent 2.56 milliseconds in total | [RE]START processing: state #41 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-41" #41: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #41: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #41 "road-eastnet-nonat-41" #41: deleting IKE SA for connection 'road-eastnet-nonat-41' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-41' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-41 | State DB: deleting IKEv2 state #41 in PARENT_I1 | parent state #41: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #41 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 293 time elapsed 0.000629 seconds | libevent_free: release ptr-libevent@0x7fb3540300e0 | (#293) spent 0.627 milliseconds in crypto helper computing work-order 293: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0eac0 | crypto helper 13 sending results from work-order 293 for state #293 to event queue | scheduling resume sending helper answer for #293 | libevent_malloc: new ptr-libevent@0x7fb35c04b850 size 128 | in statetime_stop() and could not find #41 | crypto helper 13 waiting (nothing to do) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-41 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-41" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-41' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-41" | stop processing: connection "road-eastnet-nonat-41" (in initiate_a_connection() at initiate.c:349) | spent 0.0587 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #293 | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 293 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #293 | **emit ISAKMP Message: | initiator cookie: | 98 65 e9 19 f7 80 1b 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-41 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 25 92 fa cc 80 1f 04 ae 31 60 a8 15 7f 6c d4 bb | ikev2 g^x 0d a3 36 d4 3d 31 2d db c9 a3 65 0b 54 77 b5 90 | ikev2 g^x 4b f1 85 f9 5b a2 e8 2d 9a 77 1b fe a8 fb ea d0 | ikev2 g^x 88 2f 01 a5 98 e9 7e 65 f1 01 87 3d 6a 2d 8a 3a | ikev2 g^x 8e f8 d8 76 3b 1e 19 1d 17 90 3e 76 19 99 52 4a | ikev2 g^x 6e 00 1d 7b db 96 db 83 88 cd fd 1e bd 7e 5b 89 | ikev2 g^x ba a0 91 2a b9 ee b5 58 13 b3 5e 5e 59 9d 47 30 | ikev2 g^x d5 69 4e a7 bd 52 9f d4 e7 9b be ed b8 c7 8e ca | ikev2 g^x fd 72 11 5d 3c 4e 3f 34 3a cf 63 b2 e1 3a 0c 75 | ikev2 g^x e0 fd c6 41 05 da 4e 8b 04 c0 eb 84 52 ad 81 69 | ikev2 g^x 8c d8 b9 f0 3d 70 1f c8 01 a5 b7 5f ee d4 3d 97 | ikev2 g^x 3f 74 14 bf c1 32 07 23 90 8c c7 74 19 a4 db 67 | ikev2 g^x e2 81 e3 0a 06 5d bd 34 79 e7 4a 18 70 10 d6 b8 | ikev2 g^x 84 dc 4f 06 a8 1d f3 4b d5 6f 30 05 6d 56 83 1e | ikev2 g^x 64 17 96 93 11 0f e7 08 32 35 87 dc fb e0 8f 9f | ikev2 g^x e0 07 34 5d b8 fb 0d 4c d3 c2 58 00 d5 76 62 90 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6f f2 b6 ca f4 8a a8 b3 ce 34 d7 c6 a9 bf 42 71 | IKEv2 nonce b6 a3 89 33 ed 1d 91 ee 0e 11 98 8d 12 5e c6 63 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 98 65 e9 19 f7 80 1b 92 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 29 | natd_hash: port= 01 f4 | natd_hash: hash= 06 b6 16 43 43 a6 c6 14 e2 18 67 23 58 d4 b6 9a | natd_hash: hash= 2d df 39 90 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 06 b6 16 43 43 a6 c6 14 e2 18 67 23 58 d4 b6 9a | Notify data 2d df 39 90 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 98 65 e9 19 f7 80 1b 92 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2a 56 75 a4 c4 51 60 eb 9a b6 a1 bf 9e f8 0f fa | natd_hash: hash= 6b d1 0c 00 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2a 56 75 a4 c4 51 60 eb 9a b6 a1 bf 9e f8 0f fa | Notify data 6b d1 0c 00 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #293 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #293: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #293 to 4294967295 after switching state | Message ID: IKE #293 skipping update_recv as MD is fake | Message ID: sent #293 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-41" #293: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.41:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #293) | 98 65 e9 19 f7 80 1b 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 92 fa cc 80 1f 04 ae 31 60 a8 15 7f 6c d4 bb | 0d a3 36 d4 3d 31 2d db c9 a3 65 0b 54 77 b5 90 | 4b f1 85 f9 5b a2 e8 2d 9a 77 1b fe a8 fb ea d0 | 88 2f 01 a5 98 e9 7e 65 f1 01 87 3d 6a 2d 8a 3a | 8e f8 d8 76 3b 1e 19 1d 17 90 3e 76 19 99 52 4a | 6e 00 1d 7b db 96 db 83 88 cd fd 1e bd 7e 5b 89 | ba a0 91 2a b9 ee b5 58 13 b3 5e 5e 59 9d 47 30 | d5 69 4e a7 bd 52 9f d4 e7 9b be ed b8 c7 8e ca | fd 72 11 5d 3c 4e 3f 34 3a cf 63 b2 e1 3a 0c 75 | e0 fd c6 41 05 da 4e 8b 04 c0 eb 84 52 ad 81 69 | 8c d8 b9 f0 3d 70 1f c8 01 a5 b7 5f ee d4 3d 97 | 3f 74 14 bf c1 32 07 23 90 8c c7 74 19 a4 db 67 | e2 81 e3 0a 06 5d bd 34 79 e7 4a 18 70 10 d6 b8 | 84 dc 4f 06 a8 1d f3 4b d5 6f 30 05 6d 56 83 1e | 64 17 96 93 11 0f e7 08 32 35 87 dc fb e0 8f 9f | e0 07 34 5d b8 fb 0d 4c d3 c2 58 00 d5 76 62 90 | 29 00 00 24 6f f2 b6 ca f4 8a a8 b3 ce 34 d7 c6 | a9 bf 42 71 b6 a3 89 33 ed 1d 91 ee 0e 11 98 8d | 12 5e c6 63 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 b6 16 43 43 a6 c6 14 e2 18 67 23 | 58 d4 b6 9a 2d df 39 90 00 00 00 1c 00 00 40 05 | 2a 56 75 a4 c4 51 60 eb 9a b6 a1 bf 9e f8 0f fa | 6b d1 0c 00 | state #293 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb350009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46afe580 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #293 | libevent_malloc: new ptr-libevent@0x7fb3540300e0 size 128 | #293 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49668.213821 | resume sending helper answer for #293 suppresed complete_v2_state_transition() and stole MD | #293 spent 0.449 milliseconds in resume sending helper answer | stop processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c04b850 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 65 e9 19 f7 80 1b 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #293 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #293 | rejected packet: | 98 65 e9 19 f7 80 1b 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 29 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #293: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a855c0 | handling event EVENT_RETRANSMIT for parent state #280 | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #280 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #280 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49668.23904; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001806 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0eac0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #280 | libevent_malloc: new ptr-libevent@0x7fb35c04b850 size 128 "road-eastnet-nonat-28" #280: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #280) | d6 f7 ab 7c 0b ea 69 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca e1 05 9c 2f e1 85 fc d1 c1 5e ec 37 7e 0d 76 | 45 c5 de cd 99 7d 74 0a 48 32 65 23 49 b2 c2 df | ba 7e d2 ef 7c 32 31 03 10 0c 09 94 c0 eb b8 b5 | 06 97 c9 45 66 24 48 7d 72 da ab 98 55 09 59 9c | 31 af 0e c1 8a a9 90 d1 a5 1f 67 f1 af 23 81 27 | 72 13 c8 3c d8 f0 f1 d8 ca c2 a1 9a 92 8c fd 09 | b0 c2 a6 d5 91 c6 84 9b 99 40 a3 ac 3e 94 44 cd | 9a 36 6e be f8 2c 85 77 18 29 38 0d c0 06 06 d0 | a2 de 4c 8d 95 cd da f4 a0 2f bd 4d 70 4f 95 ae | db 5a f3 57 de 7c dd 31 a6 66 ca aa 68 cf 9d 1d | b3 0a 17 80 b5 20 24 43 82 44 17 25 0f 38 64 50 | 75 9d 57 76 b6 2b ee 0e 3f 93 33 cf 3f 9b 45 97 | f9 87 b6 87 a6 ec cb 33 18 44 a7 89 6a 59 c0 2b | ff 8a 7d 67 3d 1a 08 05 fe 9f fa 6c b7 f7 96 5d | a2 3b 23 c8 4a 7c 17 7b 08 d8 db 48 f9 5d 62 1b | 0b 5f d0 c6 c6 a2 28 ed 7c 45 7a f3 33 a6 d2 1f | 29 00 00 24 05 cd b3 b7 f3 87 52 75 9b b2 14 f4 | c3 19 28 f7 78 65 e3 f9 18 22 0f 07 13 10 65 88 | f1 44 b8 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a b5 25 17 f4 1a 4f 2a 05 d2 2d 99 | 3c 89 36 9b 9d 62 ed 5f 00 00 00 1c 00 00 40 05 | ee 9f 85 88 b6 c7 ef c2 a5 c8 d9 f7 7a e7 a6 c3 | 70 03 54 b6 | libevent_free: release ptr-libevent@0x7fb37000f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a855c0 | #280 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 f7 ab 7c 0b ea 69 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #280 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #280 | rejected packet: | d6 f7 ab 7c 0b ea 69 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #280: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad9ac0 | handling event EVENT_RETRANSMIT for parent state #287 | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #287 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #287 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49668.25634; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500614 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a855c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #287 | libevent_malloc: new ptr-libevent@0x7fb37000f1a0 size 128 "road-eastnet-nonat-35" #287: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #287) | 50 65 03 a0 08 b6 fa f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e c0 75 39 cf 17 11 31 32 ce 73 1e 64 99 bc f2 | 7f 98 bb e8 80 c2 38 47 74 80 17 bf 6d 41 27 75 | 39 62 b9 71 ae 1a 47 19 83 cd 81 c0 c8 3d 11 61 | bb 8a a5 d6 29 bd 01 7d f4 ca 44 6d 69 e4 8a 69 | a7 cc 95 e2 b5 6b 25 ca 57 eb 58 2b 4d 53 44 df | 33 8c 6f 33 81 90 ab 83 53 f5 4e 38 ab 63 7b 68 | f5 e4 10 b1 02 5a b6 e7 d6 07 bf 37 24 09 70 4b | bc 69 6e bc 79 b8 a5 58 fa 3b e4 57 c6 64 3b 30 | 47 47 bf b7 ad 67 14 cd 0a eb 04 a2 61 54 d3 a6 | 12 98 21 de 78 b3 bb b5 ae 98 e3 4e 86 f6 80 ab | 82 7f f6 f8 ef c2 b3 23 41 0b ad f4 1d 15 a3 d0 | bf fe 7d f5 bb 15 19 74 8e f2 b9 4c 77 84 ef 53 | 7c be 1b be 09 20 be 00 d9 ce 47 ea 9d 1e 79 80 | e6 b0 92 f0 11 bf e8 8c fd 97 bb 02 bf 46 b7 fa | 29 38 a8 9a ba d7 d1 99 c1 56 93 83 a6 04 d2 fc | 1b 5a ee 22 cc c4 78 02 0c 67 9c 0f 51 14 b2 6f | 29 00 00 24 82 dd 74 7a ae e7 29 d0 0c 9c 0c 72 | 8c 59 8b ec 3e a7 b7 92 7c 72 73 9c 73 da ee 57 | 06 e2 80 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 92 a1 ec 2f 80 2a 27 61 6c 7b 0f | 4c 73 2b 71 f0 03 c4 ea 00 00 00 1c 00 00 40 05 | 71 9b 20 c5 40 26 cd 9d eb 7f a3 62 71 86 bd 52 | 4f c4 9f f6 | libevent_free: release ptr-libevent@0x557d469e1b60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad9ac0 | #287 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 65 03 a0 08 b6 fa f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #287 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #287 | rejected packet: | 50 65 03 a0 08 b6 fa f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #287: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0484 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c780 | handling event EVENT_RETRANSMIT for parent state #269 | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #269 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #269 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49668.259645; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002997 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad9ac0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #269 | libevent_malloc: new ptr-libevent@0x557d469e1b60 size 128 "road-eastnet-nonat-17" #269: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #269) | 42 2b 66 77 50 7b f1 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 1a b0 80 05 00 53 b8 88 37 a8 0d e8 4e c0 81 | 57 b8 c1 99 be 60 6c 42 36 80 aa e8 7e 86 e2 1b | dc 47 d3 0f cf c7 46 a8 c8 47 ce ff 99 14 e6 14 | 37 44 15 18 25 7b d6 ca f2 0f 00 2d 17 01 df 08 | ac fe e9 d3 2b 32 d0 3c 75 39 46 f3 2a a6 98 c3 | 1d b7 82 4a b4 92 84 4b b3 2d b3 71 d7 06 52 b9 | 9c eb 15 89 b5 c8 16 c5 e1 29 05 f5 12 64 42 f4 | a0 b3 32 62 fe 43 4c 1c 4e 1e 53 37 a8 e8 52 23 | 53 0e 82 46 38 b3 95 ea 7e 47 ae 7b 38 c7 ec ac | 8c 74 78 5b e3 a1 ba 65 7c 63 27 19 55 d3 7e f5 | 2f 36 c3 b3 a1 0f 84 2a 85 17 e4 09 e8 35 c4 82 | 08 59 25 c5 6f 5d dc d6 ee 2f dc 6b 0a a2 5d f8 | d2 8d a0 b1 da 71 a0 b2 68 ba c7 d1 ba 7e e6 81 | d8 e3 b3 84 de 3a 47 64 3d 04 00 a0 60 be 1c 4f | 52 66 df 3f 77 fe 53 0c dd cd ed 75 7e 76 02 77 | cc 4e de 99 d4 98 4e 1e 30 09 c0 9e cb c6 a1 c0 | 29 00 00 24 b8 ee 66 5c df cb 58 d0 1b a4 60 c3 | 1b 92 52 a8 29 57 57 d2 02 37 76 e3 2d 2f 31 c7 | 4b 37 7d fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 73 36 11 68 b5 eb 4b 5f e8 3f ce | 5b fc b9 99 cc 0c 05 c7 00 00 00 1c 00 00 40 05 | 7f dd 18 35 5d 55 ec 33 76 f4 f0 dc 77 e6 e3 3b | 97 a2 2b d9 | libevent_free: release ptr-libevent@0x7fb37402a710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c780 | #269 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 2b 66 77 50 7b f1 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #269 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #269 | rejected packet: | 42 2b 66 77 50 7b f1 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #269: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47e90 | handling event EVENT_RETRANSMIT for parent state #253 | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #253 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #253 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49668.287946; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004622 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c780 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #253 | libevent_malloc: new ptr-libevent@0x7fb37402a710 size 128 "road-eastnet-nonat-1" #253: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #253) | 54 6a b3 63 15 2d 54 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 a1 ec de cb a0 5d c1 1a bd 04 af 6b c8 65 41 | 5e 52 49 f5 a0 69 ab 28 22 ed fc 77 d0 a0 c1 09 | 24 c3 68 ac f8 52 b1 01 40 3f 24 70 5d fa bb e6 | 18 17 b8 60 62 5c 25 b7 91 1b 32 be a8 33 c7 03 | d3 9b 4d ca 93 cb 69 27 56 25 f1 0e f0 75 9b f1 | 6f a5 25 09 c0 56 aa ed be 25 e6 7b 20 95 b5 00 | 7f 1a 1b 09 1c 04 5e 80 38 55 80 90 08 7b dd ce | 4f 11 1a be 0d 38 69 ab e8 df ca 75 0d 3f c0 1b | 66 36 7e b8 6f b9 34 13 07 77 35 27 1b 68 f3 4e | 59 d6 7e de a5 ba 53 3b 79 89 bf fd cf 6b c9 05 | 32 48 47 96 e8 02 b8 8c 85 5e 07 cf ed 73 28 31 | 7f b0 4a 57 00 7a 0b 42 b6 34 c6 f8 0c c3 11 82 | b9 52 df 83 77 94 ac c4 6e d0 af 9f 9c 46 4a 9d | 6a 59 79 91 e9 aa 6f 46 f9 bf 64 56 57 97 6b ca | 02 fc e7 a2 5d cb d3 e6 be 89 40 eb 8b 5f bf bb | ea e1 78 af e4 9a d6 bc 8f 45 8e 59 45 6b cc 3f | 29 00 00 24 5b 81 82 6a 34 1f 0c 89 b3 0b 07 6c | d0 e3 bd fa b4 1c af f3 18 56 94 10 92 25 11 f0 | 48 f8 d2 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 79 2b 18 11 0c 23 de f4 d0 de e0 | 77 97 22 a5 08 48 2f ff 00 00 00 1c 00 00 40 05 | c8 d4 47 db f6 e8 46 67 19 87 ae df 18 10 c7 ab | 9f a6 71 f9 | libevent_free: release ptr-libevent@0x7fb350046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47e90 | #253 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 6a b3 63 15 2d 54 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #253 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #253 | rejected packet: | 54 6a b3 63 15 2d 54 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #253: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aee100 | handling event EVENT_RETRANSMIT for parent state #42 | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #42 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #42 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49668.29521; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006858 exceeds limit? YES "road-eastnet-nonat-42" #42: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-42" #42: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #294 at 0x557d46a0ca50 | State DB: adding IKEv2 state #294 in UNDEFINED | pstats #294 ikev2.ike started | Message ID: init #294: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #294: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #294; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-42" #294: initiating v2 parent SA to replace #42 | using existing local IKE proposals for connection road-eastnet-nonat-42 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 294 for state #294 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47e90 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #294 | libevent_malloc: new ptr-libevent@0x7fb350046040 size 128 | #294 spent 0.0657 milliseconds in ikev2_parent_outI1() | RESET processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 17 resuming | crypto helper 17 starting work-order 294 for state #294 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 294 | pstats #42 ikev2.ike failed too-many-retransmits | pstats #42 ikev2.ike deleted too-many-retransmits | #42 spent 2.54 milliseconds in total | [RE]START processing: state #42 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-42" #42: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #42: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #42 "road-eastnet-nonat-42" #42: deleting IKE SA for connection 'road-eastnet-nonat-42' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-42' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-42 | State DB: deleting IKEv2 state #42 in PARENT_I1 | parent state #42: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #42 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 294 time elapsed 0.000966 seconds | (#294) spent 0.96 milliseconds in crypto helper computing work-order 294: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 294 for state #294 to event queue | scheduling resume sending helper answer for #294 | libevent_free: release ptr-libevent@0x7fb34c046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aee100 | in statetime_stop() and could not find #42 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb35000cbb0 size 128 | crypto helper 17 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-42 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-42" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-42' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-42" | stop processing: connection "road-eastnet-nonat-42" (in initiate_a_connection() at initiate.c:349) | spent 0.0568 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #294 | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 294 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #294 | **emit ISAKMP Message: | initiator cookie: | 9b 31 1a f8 0f be 39 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-42 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 54 dd 24 24 7c 2f 7c cf af 6d 3e 60 a2 73 ad b0 | ikev2 g^x 5d e0 ad 29 4b 13 6c 37 66 5f 9c 4f e7 c9 e4 11 | ikev2 g^x 2c 5d 56 30 72 c8 d6 46 26 66 f5 93 56 d4 c3 52 | ikev2 g^x 85 cc e5 ae f9 42 b4 ed 60 85 06 0a 66 f5 50 1d | ikev2 g^x b5 97 c3 6d 71 b4 75 b7 83 18 b1 d3 7d 4a 68 8c | ikev2 g^x b9 4f df 9f 66 87 ec eb 33 88 de f2 6b c6 ea ab | ikev2 g^x d0 0d f9 06 34 9c 52 b4 c5 c4 6d 94 39 a8 58 51 | ikev2 g^x 41 ac 6d 52 08 28 9d f6 37 25 c7 7f 2d 48 ab 90 | ikev2 g^x f6 30 d2 8b 1b 90 e6 12 18 e0 e2 d4 dc 25 fe 81 | ikev2 g^x c8 41 3f 06 d9 c6 ce a5 91 8f 50 2b 48 2d e5 59 | ikev2 g^x 7a 24 e5 58 8b 81 4a bc cb 35 59 84 09 16 ee 2d | ikev2 g^x ba cf 81 ed 91 57 53 ab 0b 04 8a 27 0b c6 e0 ef | ikev2 g^x db ab 77 93 c2 db 73 a1 76 37 e1 bf 29 0a 3c 98 | ikev2 g^x 04 2f f5 e3 ff d0 c3 48 62 42 d2 a6 9f a7 c1 a7 | ikev2 g^x df e6 f0 e2 49 c7 bb 48 bb b6 1d f0 0e d1 19 d7 | ikev2 g^x 21 c7 76 5c 49 fc f0 be 36 da d1 aa ec 07 53 22 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c9 1f 43 d3 3e f5 11 59 29 27 36 bb 9f 07 da f1 | IKEv2 nonce c2 4b 17 7e d6 e4 43 b9 54 44 c2 2b 3a e0 9b 41 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9b 31 1a f8 0f be 39 07 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2a | natd_hash: port= 01 f4 | natd_hash: hash= 0f 60 07 d1 2a 2e 6f e5 7f 13 de a6 da 25 32 50 | natd_hash: hash= d9 e2 97 75 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0f 60 07 d1 2a 2e 6f e5 7f 13 de a6 da 25 32 50 | Notify data d9 e2 97 75 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9b 31 1a f8 0f be 39 07 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= de 91 5e 97 33 cf e4 58 2c 2c f0 43 aa ad 93 60 | natd_hash: hash= ec ee 8a 50 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data de 91 5e 97 33 cf e4 58 2c 2c f0 43 aa ad 93 60 | Notify data ec ee 8a 50 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #294 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #294: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #294 to 4294967295 after switching state | Message ID: IKE #294 skipping update_recv as MD is fake | Message ID: sent #294 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-42" #294: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.42:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #294) | 9b 31 1a f8 0f be 39 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 dd 24 24 7c 2f 7c cf af 6d 3e 60 a2 73 ad b0 | 5d e0 ad 29 4b 13 6c 37 66 5f 9c 4f e7 c9 e4 11 | 2c 5d 56 30 72 c8 d6 46 26 66 f5 93 56 d4 c3 52 | 85 cc e5 ae f9 42 b4 ed 60 85 06 0a 66 f5 50 1d | b5 97 c3 6d 71 b4 75 b7 83 18 b1 d3 7d 4a 68 8c | b9 4f df 9f 66 87 ec eb 33 88 de f2 6b c6 ea ab | d0 0d f9 06 34 9c 52 b4 c5 c4 6d 94 39 a8 58 51 | 41 ac 6d 52 08 28 9d f6 37 25 c7 7f 2d 48 ab 90 | f6 30 d2 8b 1b 90 e6 12 18 e0 e2 d4 dc 25 fe 81 | c8 41 3f 06 d9 c6 ce a5 91 8f 50 2b 48 2d e5 59 | 7a 24 e5 58 8b 81 4a bc cb 35 59 84 09 16 ee 2d | ba cf 81 ed 91 57 53 ab 0b 04 8a 27 0b c6 e0 ef | db ab 77 93 c2 db 73 a1 76 37 e1 bf 29 0a 3c 98 | 04 2f f5 e3 ff d0 c3 48 62 42 d2 a6 9f a7 c1 a7 | df e6 f0 e2 49 c7 bb 48 bb b6 1d f0 0e d1 19 d7 | 21 c7 76 5c 49 fc f0 be 36 da d1 aa ec 07 53 22 | 29 00 00 24 c9 1f 43 d3 3e f5 11 59 29 27 36 bb | 9f 07 da f1 c2 4b 17 7e d6 e4 43 b9 54 44 c2 2b | 3a e0 9b 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 60 07 d1 2a 2e 6f e5 7f 13 de a6 | da 25 32 50 d9 e2 97 75 00 00 00 1c 00 00 40 05 | de 91 5e 97 33 cf e4 58 2c 2c f0 43 aa ad 93 60 | ec ee 8a 50 | state #294 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb350046040 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47e90 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47e90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #294 | libevent_malloc: new ptr-libevent@0x7fb34c046040 size 128 | #294 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49668.296748 | resume sending helper answer for #294 suppresed complete_v2_state_transition() and stole MD | #294 spent 0.32 milliseconds in resume sending helper answer | stop processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35000cbb0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9b 31 1a f8 0f be 39 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #294 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #294 | rejected packet: | 9b 31 1a f8 0f be 39 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2a fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #294: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11640 | handling event EVENT_RETRANSMIT for parent state #281 | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #281 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #281 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49668.308925; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003173 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aee100 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #281 | libevent_malloc: new ptr-libevent@0x7fb3440251c0 size 128 "road-eastnet-nonat-29" #281: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #281) | 6e a6 a1 b4 01 a0 0e dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 68 2b 46 8c 2b 9e 7f b4 06 ec 72 36 3a be fa | 50 91 b7 48 61 bc d4 d3 11 dc 1f d6 9a c1 21 a2 | 97 1d cf c0 4e 3d 88 c1 96 35 32 5c c3 c4 b5 d1 | 96 85 b6 1e 34 48 5e 70 e1 97 d1 4d ee c9 36 cd | 07 d4 c1 98 8c 4b f8 c0 2b 58 50 1f 39 3f 7e 62 | c9 4e 54 20 95 c8 4c fc 93 c6 64 05 ff db 54 92 | f9 8c d4 27 f6 69 ac 7b 53 12 4d 7e 22 de e0 4c | 9b 65 6e 55 e2 59 db 77 7d a0 70 9f cd fd b6 7a | 15 79 9a 65 29 97 e4 c6 46 84 7b 52 6e 4e 1b 43 | 80 ec d1 87 3d 75 43 f1 6b 08 60 65 d9 e2 6c 04 | c5 f0 75 0d 72 fe 09 0a a5 0a 64 0c 9d 8e b4 bd | 1a c3 bb 6e f6 92 c0 b5 8c 93 b9 eb e3 12 c7 a1 | bd b7 f3 a0 b9 80 8c 76 59 8f 43 af 0f 58 66 7f | b7 29 f0 c0 1c a1 51 2d c9 c0 ac e0 da 3e 0a fc | dd 42 1f ec 76 07 0c b3 ee 58 80 d8 3b 40 cd 6e | 29 12 48 14 35 22 e0 cf 05 9a 1b 46 91 35 4f 0c | 29 00 00 24 1a c7 00 d3 83 91 04 b5 76 85 d3 69 | a2 08 a9 2c b0 b3 a2 60 be 18 eb 18 2d fd ba 85 | 0c 0a 5c be 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 cf b4 85 53 44 b8 30 db 31 85 32 | 18 7e 13 4c d0 54 13 87 00 00 00 1c 00 00 40 05 | 54 d2 36 85 02 19 96 85 9c 4b 22 1c 55 b4 68 ad | 30 56 22 92 | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11640 | #281 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6e a6 a1 b4 01 a0 0e dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #281 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #281 | rejected packet: | 6e a6 a1 b4 01 a0 0e dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #281: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ced0 | handling event EVENT_RETRANSMIT for parent state #288 | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #288 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #288 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49668.319302; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500661 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11640 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #288 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 "road-eastnet-nonat-36" #288: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #288) | bf 5c b8 9a ac cd 00 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e dd 69 c1 03 95 4d 9d ab 37 9e bd 4e 38 ec e5 | f2 39 ed 30 ab 4f b4 af 21 e6 29 da a0 8f 8f e9 | 98 9a 5c 5c fe fe ce 8c 1e 28 6b bd f2 27 35 da | c4 21 0a d8 6a ca c2 98 92 8e 38 38 a2 a7 6b ba | 5f d2 6c ce e3 9f f3 13 3d ec 78 7e f5 b7 1e b1 | c9 c9 b0 04 f7 e8 40 14 e7 76 0c 5b a9 d0 33 de | 38 f0 55 f2 f8 c3 51 4e 26 12 33 85 1a 59 5d 06 | e7 63 42 d3 d5 d3 89 6c 22 47 f2 98 c6 f4 da 55 | 13 a9 2a 55 81 33 8b eb 87 ee 13 8e 33 aa a8 42 | 9f da b4 47 d8 37 6a 92 68 90 c1 81 a0 df a1 37 | a4 78 f7 b3 8d d2 2d ce a0 c9 68 dd 56 89 c4 d1 | 63 8d aa 71 1f 08 79 a0 6d 66 a0 3e 16 15 54 65 | d5 46 20 67 d9 5b 61 9c 6a 83 fc f8 ba b1 78 4c | 57 19 a7 94 fa 72 b9 cd d4 1a e2 8c ec 18 65 32 | 0a 6f a6 9d 17 41 ad c3 33 be e4 df 39 be bb 83 | 36 2c fd e8 5d 07 b2 3e e4 4e 6e 8c 65 67 24 e6 | 29 00 00 24 6b 44 05 03 68 15 67 d5 e0 ba b2 f4 | 3c 29 af e5 83 d8 9f ee 30 22 ac b5 c3 ee cd df | dc 79 2d 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 39 d5 43 71 fe 6f b5 ee bc 1b f9 | 48 2a ac fe 4d 86 a5 da 00 00 00 1c 00 00 40 05 | f7 70 11 42 70 0c d7 f2 22 65 12 cb b8 c3 7c 30 | 56 c5 c0 c0 | libevent_free: release ptr-libevent@0x7fb340030080 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ced0 | #288 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 5c b8 9a ac cd 00 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #288 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #288 | rejected packet: | bf 5c b8 9a ac cd 00 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #288: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0484 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11680 | handling event EVENT_RETRANSMIT for parent state #270 | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #270 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #270 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49668.342603; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002313 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ced0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #270 | libevent_malloc: new ptr-libevent@0x7fb340030080 size 128 "road-eastnet-nonat-18" #270: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #270) | 98 aa bb 79 2f f5 b5 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 24 f6 25 5f fa 71 0f 39 53 f1 8f 92 58 3c 59 | 8e c2 2e 28 53 ea 0d 58 1c b1 76 25 4f 77 d3 40 | 6f 45 9c 78 a8 01 99 46 d7 6e 57 ac 51 cd 32 20 | 87 d7 3c c9 3f 5e e0 a6 46 8c bc bb d2 2a 3a 19 | 0d 30 25 7b 8c f0 eb f6 7f 48 bd 51 fc 7c 03 2d | 42 fb c9 54 0b f3 df 3f 56 f4 9e 74 f1 22 86 89 | d4 fe 7d ea 34 26 2a 49 b7 c2 c2 c5 bf 06 dd 36 | be de 23 aa bf 61 22 5f 62 e1 04 e4 81 81 b4 1a | 94 68 45 c7 43 f9 2b f7 9c c7 da c1 6c f9 e0 19 | 3d 12 26 17 de 58 8c 74 5a 7c d1 ae 99 12 b1 cc | 7c fd 41 5e df 12 73 ff fe 24 d4 ac e3 4a 14 3c | a7 57 18 de 1a f8 e3 60 98 66 b7 e2 de d9 ef 30 | 7b 0c d1 7a 6d 0b f9 31 66 84 79 8b 8b 50 77 51 | 23 58 84 77 80 ea dc 70 95 5b e4 15 8d 98 42 aa | fa 93 a8 7a d7 2a 0d 51 24 2f ee fa 92 74 05 47 | d0 38 43 8c 6f cb 3f 1f 04 0b e8 57 ca ea 33 7e | 29 00 00 24 dd 5a f6 1e bd fb cd ef 92 3b 56 16 | bd 57 a2 0f d1 d5 f5 02 97 f4 10 bb 15 09 d8 8e | c9 9b 97 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 15 18 7d df ec 83 30 72 5b 68 c2 | 08 e3 c3 a4 d5 a2 af 25 00 00 00 1c 00 00 40 05 | b3 09 33 34 02 38 11 d4 03 64 9d 03 c3 5d 2b 94 | 2e 30 63 d3 | libevent_free: release ptr-libevent@0x7fb338048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11680 | #270 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 aa bb 79 2f f5 b5 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #270 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #270 | rejected packet: | 98 aa bb 79 2f f5 b5 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #270: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0478 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25c40 | handling event EVENT_RETRANSMIT for parent state #43 | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #43 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #43 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49668.376888; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.012932 exceeds limit? YES "road-eastnet-nonat-43" #43: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-43" #43: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #295 at 0x557d46a0e010 | State DB: adding IKEv2 state #295 in UNDEFINED | pstats #295 ikev2.ike started | Message ID: init #295: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #295: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #295; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-43" #295: initiating v2 parent SA to replace #43 | using existing local IKE proposals for connection road-eastnet-nonat-43 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 295 for state #295 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b11680 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #295 | libevent_malloc: new ptr-libevent@0x7fb338048a10 size 128 | #295 spent 0.092 milliseconds in ikev2_parent_outI1() | RESET processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #43 ikev2.ike failed too-many-retransmits | pstats #43 ikev2.ike deleted too-many-retransmits | #43 spent 2.6 milliseconds in total | [RE]START processing: state #43 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-43" #43: deleting state (STATE_PARENT_I1) aged 64.014s and NOT sending notification | parent state #43: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | crypto helper 18 resuming | picked newest_isakmp_sa #0 for #43 | crypto helper 18 starting work-order 295 for state #295 "road-eastnet-nonat-43" #43: deleting IKE SA for connection 'road-eastnet-nonat-43' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 295 | add revival: connection 'road-eastnet-nonat-43' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-43 | State DB: deleting IKEv2 state #43 in PARENT_I1 | parent state #43: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #43 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb364017f20 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 295 time elapsed 0.000556 seconds | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c40 | (#295) spent 0.567 milliseconds in crypto helper computing work-order 295: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 295 for state #295 to event queue | scheduling resume sending helper answer for #295 | in statetime_stop() and could not find #43 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb35400f1a0 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-43 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 18 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-43" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-43' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-43" | stop processing: connection "road-eastnet-nonat-43" (in initiate_a_connection() at initiate.c:349) | spent 0.0704 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #295 | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 295 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #295 | **emit ISAKMP Message: | initiator cookie: | 11 ea 13 a7 2a b1 5c 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-43 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c6 c0 f3 39 06 15 d7 07 8e 11 b6 9a 6e 2d b3 34 | ikev2 g^x 66 03 a5 c2 e2 1f 37 32 46 97 6f cd af d0 2f 18 | ikev2 g^x 5f 75 66 e4 a1 42 12 53 5e 16 d8 3a 31 65 02 6a | ikev2 g^x c5 e3 cc f7 d2 22 a4 aa ae 02 3c 06 f6 0c fe fa | ikev2 g^x e4 54 02 04 c7 56 0a b1 39 1c 79 77 c9 da 62 93 | ikev2 g^x 00 7e f1 cc 8f 9d de 33 24 4e 12 09 b8 73 ad 99 | ikev2 g^x 9d bd 21 4e 12 37 5e 79 f1 fe 24 ac 36 8f 56 b3 | ikev2 g^x d6 c7 5b 74 f8 84 56 d2 c9 9a 89 80 ba ca fa 63 | ikev2 g^x 61 ef b2 49 26 8d 16 1c 9e 9b a5 d0 8c b1 11 4d | ikev2 g^x 74 c3 30 50 82 5e f2 2c 5e 21 4f 59 50 07 97 4a | ikev2 g^x 3b 99 d0 83 20 16 83 be 15 cb 08 01 be 88 1e c0 | ikev2 g^x 56 de 78 28 a9 82 d7 99 3a 47 be b7 57 13 4d ef | ikev2 g^x 18 8f 0d 23 65 69 63 f7 5c af 9a 31 54 69 e3 c6 | ikev2 g^x e4 81 15 9e a2 7e 90 55 50 a1 5a e2 6d 42 36 72 | ikev2 g^x e6 93 98 8d ab 65 9b 8b b9 2a 79 2b 2d c9 0f 1f | ikev2 g^x c1 03 48 63 1c 2b 7c f0 db 5a 0a 3e b5 46 b8 79 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 64 9e 8b 02 14 e8 a7 dc 3f 42 d2 c4 8f dc b3 ff | IKEv2 nonce fc 4c fe 98 93 e9 8f 76 eb 2b 38 f4 b9 5a a0 93 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 11 ea 13 a7 2a b1 5c 9c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2b | natd_hash: port= 01 f4 | natd_hash: hash= 3c a5 c7 ec 4b 7a cd c4 3e f0 86 6d ec 0c 21 f9 | natd_hash: hash= 74 06 3e 81 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3c a5 c7 ec 4b 7a cd c4 3e f0 86 6d ec 0c 21 f9 | Notify data 74 06 3e 81 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 11 ea 13 a7 2a b1 5c 9c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6b d7 31 2e aa f4 5b 2c dc 79 88 ab 6c 34 fc ce | natd_hash: hash= 20 91 9b 02 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6b d7 31 2e aa f4 5b 2c dc 79 88 ab 6c 34 fc ce | Notify data 20 91 9b 02 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #295 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #295: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #295 to 4294967295 after switching state | Message ID: IKE #295 skipping update_recv as MD is fake | Message ID: sent #295 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-43" #295: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.43:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #295) | 11 ea 13 a7 2a b1 5c 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 c0 f3 39 06 15 d7 07 8e 11 b6 9a 6e 2d b3 34 | 66 03 a5 c2 e2 1f 37 32 46 97 6f cd af d0 2f 18 | 5f 75 66 e4 a1 42 12 53 5e 16 d8 3a 31 65 02 6a | c5 e3 cc f7 d2 22 a4 aa ae 02 3c 06 f6 0c fe fa | e4 54 02 04 c7 56 0a b1 39 1c 79 77 c9 da 62 93 | 00 7e f1 cc 8f 9d de 33 24 4e 12 09 b8 73 ad 99 | 9d bd 21 4e 12 37 5e 79 f1 fe 24 ac 36 8f 56 b3 | d6 c7 5b 74 f8 84 56 d2 c9 9a 89 80 ba ca fa 63 | 61 ef b2 49 26 8d 16 1c 9e 9b a5 d0 8c b1 11 4d | 74 c3 30 50 82 5e f2 2c 5e 21 4f 59 50 07 97 4a | 3b 99 d0 83 20 16 83 be 15 cb 08 01 be 88 1e c0 | 56 de 78 28 a9 82 d7 99 3a 47 be b7 57 13 4d ef | 18 8f 0d 23 65 69 63 f7 5c af 9a 31 54 69 e3 c6 | e4 81 15 9e a2 7e 90 55 50 a1 5a e2 6d 42 36 72 | e6 93 98 8d ab 65 9b 8b b9 2a 79 2b 2d c9 0f 1f | c1 03 48 63 1c 2b 7c f0 db 5a 0a 3e b5 46 b8 79 | 29 00 00 24 64 9e 8b 02 14 e8 a7 dc 3f 42 d2 c4 | 8f dc b3 ff fc 4c fe 98 93 e9 8f 76 eb 2b 38 f4 | b9 5a a0 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c a5 c7 ec 4b 7a cd c4 3e f0 86 6d | ec 0c 21 f9 74 06 3e 81 00 00 00 1c 00 00 40 05 | 6b d7 31 2e aa f4 5b 2c dc 79 88 ab 6c 34 fc ce | 20 91 9b 02 | state #295 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb338048a10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b11680 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11680 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #295 | libevent_malloc: new ptr-libevent@0x7fb338048a10 size 128 | #295 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49668.378225 | resume sending helper answer for #295 suppresed complete_v2_state_transition() and stole MD | #295 spent 0.463 milliseconds in resume sending helper answer | stop processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35400f1a0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 ea 13 a7 2a b1 5c 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #295 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #295 | rejected packet: | 11 ea 13 a7 2a b1 5c 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2b fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #295: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acab40 | handling event EVENT_RETRANSMIT for parent state #289 | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #289 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #289 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49668.393439; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500874 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #289 | libevent_malloc: new ptr-libevent@0x7fb35400f1a0 size 128 "road-eastnet-nonat-37" #289: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #289) | 2e 50 46 ff ee 4c e9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 67 60 81 00 e9 c5 12 22 cc 49 d1 8d 87 9d ec | ba e1 ae d7 0f ff 89 2c 01 49 2f 18 a4 d8 5a ff | 94 bb 3c 2d 6c 23 65 3c 9a 45 52 91 05 ff 55 0b | 22 ea fe ea 0a 4e f6 5b 7a 62 13 72 d3 65 de 8a | 6c f3 72 1b af fd 0c 36 3a 05 de a4 6d 9b 92 ce | d9 79 2b 75 ee 9a e2 a1 2c b2 02 b2 85 a2 98 a2 | 3c 63 cc 1f 7e c9 81 88 5b 95 14 a9 db c3 cc 4c | 7d 2a a7 8c 64 c7 93 92 12 cf 28 08 e5 ab 19 fa | 3f 53 9a 5b d7 86 99 40 82 c2 0d 84 83 94 43 d6 | cb b8 b3 06 64 05 bf d9 9d 5b fb 6a 5b 6a d2 16 | 6f b8 75 0b 98 2a 33 7f 2c 96 47 b3 69 76 55 52 | ca 3f b2 34 c4 b8 60 62 c8 0f 07 9c 2a 3e 70 02 | 1f 60 03 3e 97 1e ea 39 09 c8 ac 49 fb 70 ef af | f9 7e 7f f0 e4 2d 18 4d f8 20 f5 71 8f b4 fc be | 11 8b 08 ae 82 4a 27 f4 11 f5 e0 5f 14 7e a2 b5 | 66 07 59 01 f7 8e 64 17 db 17 82 9f be dd 61 54 | 29 00 00 24 70 cb ce 4e e8 fa 33 67 08 21 14 9b | 70 83 d5 d1 77 4f cc 4e 50 51 8a 00 6c d4 e4 19 | 33 47 80 f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 95 9d ea dc 9b 1a b8 2d d8 fe 0a | bb 49 1d 2c c9 ad 47 73 00 00 00 1c 00 00 40 05 | 70 48 4d 18 17 11 80 57 99 3c 90 8c f0 f2 b1 e5 | 98 18 b0 dd | libevent_free: release ptr-libevent@0x7fb37c046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab40 | #289 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2e 50 46 ff ee 4c e9 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #289 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #289 | rejected packet: | 2e 50 46 ff ee 4c e9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #289: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0673 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_RETRANSMIT for parent state #282 | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #282 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #282 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49668.398796; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.0016 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab40 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #282 | libevent_malloc: new ptr-libevent@0x7fb37c046040 size 128 "road-eastnet-nonat-30" #282: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #282) | 46 9b 20 9a e5 8e c3 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 4a 4a 05 a5 e8 31 07 19 01 9a 3a 84 bd 00 2c | 01 26 e2 35 38 1d c2 10 27 23 65 e5 d1 d5 9e 9d | 93 4a 85 e7 79 d0 00 1e a3 c9 7f d0 87 96 13 32 | 3a 52 f9 aa fd 75 0f 57 d6 53 8b a2 5b 2a a9 29 | 20 47 1e e0 f6 79 b4 a2 d0 fd e2 85 9e 06 b0 c5 | 1f eb f9 ce 36 69 1b 53 58 8d aa 02 dd a3 93 19 | 8b 0f e6 94 85 c6 21 ed 47 d3 f5 ea 66 43 13 82 | da f0 e0 63 f7 98 28 5e a4 cb 20 f6 07 ee ef 26 | 67 cb 7a 06 89 6a a0 7d 08 f6 7d ba 27 41 9f 3f | f9 0e 8b 4e f2 9a 91 05 9e 11 34 81 a4 96 af ee | 90 6f f6 67 88 78 72 a1 94 39 66 b1 22 8d 82 7c | 2e db f6 a2 5d 7b a6 60 14 74 1c b3 6d 80 df 10 | f8 59 91 7e 94 04 39 3a 04 77 10 6d 00 3c a4 c9 | 37 8a d9 0b 42 ad 9c 7e 79 d0 0a 68 7a d1 19 02 | 3f 63 fb b2 47 d4 e3 0d 1d 5d 62 cd 37 80 af a2 | 0b a2 8f e1 3f b9 34 fc d9 39 c1 27 65 16 8f 01 | 29 00 00 24 43 cb 25 08 9c 10 6d 8d e0 8b af 6b | 30 64 58 bc 44 4b 07 d1 a3 b6 7d 77 46 d8 bf 81 | 62 ff 7f 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f cf c8 c3 31 5e 18 fc ce 9a 0d be | ec 9d b8 d1 d8 fa d9 18 00 00 00 1c 00 00 40 05 | 91 0b 3b 5a da ea f5 67 3e 89 32 94 c9 4e eb eb | e4 06 4e d6 | libevent_free: release ptr-libevent@0x7fb36c04b8e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | #282 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 9b 20 9a e5 8e c3 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #282 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #282 | rejected packet: | 46 9b 20 9a e5 8e c3 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #282: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0693 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #44 | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #44 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #44 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49668.440167; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008007 exceeds limit? YES "road-eastnet-nonat-44" #44: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-44" #44: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #296 at 0x557d46a0f5d0 | State DB: adding IKEv2 state #296 in UNDEFINED | pstats #296 ikev2.ike started | Message ID: init #296: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #296: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #296; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-44" #296: initiating v2 parent SA to replace #44 | using existing local IKE proposals for connection road-eastnet-nonat-44 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 296 for state #296 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0bf40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #296 | libevent_malloc: new ptr-libevent@0x7fb36c04b8e0 size 128 | #296 spent 0.0891 milliseconds in ikev2_parent_outI1() | RESET processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 resuming | crypto helper 7 starting work-order 296 for state #296 | start processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #44 ikev2.ike failed too-many-retransmits | pstats #44 ikev2.ike deleted too-many-retransmits | #44 spent 2.85 milliseconds in total | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 296 | [RE]START processing: state #44 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-44" #44: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #44: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #44 "road-eastnet-nonat-44" #44: deleting IKE SA for connection 'road-eastnet-nonat-44' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-44' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-44 | State DB: deleting IKEv2 state #44 in PARENT_I1 | parent state #44: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #44 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 296 time elapsed 0.000566 seconds | libevent_free: release ptr-libevent@0x7fb344012840 | (#296) spent 0.568 milliseconds in crypto helper computing work-order 296: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | in statetime_stop() and could not find #44 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 7 sending results from work-order 296 for state #296 to event queue | scheduling resume sending helper answer for #296 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7fb34800f1a0 size 128 Initiating connection road-eastnet-nonat-44 which received a Delete/Notify but must remain up per local policy | crypto helper 7 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-44" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-44' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-44" | stop processing: connection "road-eastnet-nonat-44" (in initiate_a_connection() at initiate.c:349) | spent 0.0728 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #296 | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 296 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #296 | **emit ISAKMP Message: | initiator cookie: | 1c da 2e ac 4a 99 24 d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-44 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x db 2a 4d fb 46 1d b7 c4 96 00 b1 66 99 7e ce 3b | ikev2 g^x 3f 48 6e 8c 76 bd 25 cd 72 f7 15 4a f9 69 ef 13 | ikev2 g^x 61 8a 19 db 25 90 81 55 08 5a cc 41 41 e5 ab d4 | ikev2 g^x 92 10 f9 d6 8d 49 ef 3f b0 9e f2 80 9b 7b 70 6e | ikev2 g^x a9 61 7d e0 84 75 fd d1 46 6c 42 61 66 ee 24 20 | ikev2 g^x 73 fa d1 4c 21 9e a9 c7 16 a9 b3 6f aa 78 ac 00 | ikev2 g^x 78 f4 c3 83 9c c4 9a 92 64 af b4 ed 81 ba ac a2 | ikev2 g^x f1 41 08 3e c1 2f b1 ba 03 49 e2 bf 7f db 95 66 | ikev2 g^x 30 1e c5 ba 28 dd ee 71 21 42 41 ca af c4 be d2 | ikev2 g^x 90 1d aa 94 fa 3e 05 ce 17 28 d8 85 00 b7 a3 6c | ikev2 g^x d2 a6 c4 12 ee 02 b6 a5 47 f5 e8 05 85 3f 07 9b | ikev2 g^x aa 0d 4f 57 c3 15 b2 47 ad f5 11 0a f7 29 da c6 | ikev2 g^x 9c 86 0c 08 6b ec 00 4d b0 6e 72 d1 b7 c3 86 c8 | ikev2 g^x 85 d9 c3 07 c3 a7 58 91 99 ee d7 82 f7 95 cb 56 | ikev2 g^x c0 48 0c 04 c6 c9 83 ce b6 aa 4e 64 f0 9f 73 46 | ikev2 g^x e9 f5 bb 10 78 a8 77 4a 7b da 32 8f 23 90 cf 6d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ce d0 75 80 6d 1e 36 8f b6 81 e0 37 25 cc b5 c9 | IKEv2 nonce b7 8f 97 4d 1e ae eb 17 23 86 66 d2 cc 2a b8 5f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1c da 2e ac 4a 99 24 d1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2c | natd_hash: port= 01 f4 | natd_hash: hash= 35 83 86 3f b2 b5 92 3c 02 7f 1a c2 45 4d 9a 24 | natd_hash: hash= f1 5a 66 8d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 35 83 86 3f b2 b5 92 3c 02 7f 1a c2 45 4d 9a 24 | Notify data f1 5a 66 8d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1c da 2e ac 4a 99 24 d1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7c cb b6 c5 ee bc 2b a0 53 bb 77 45 86 3e ca 93 | natd_hash: hash= 1e 2d 97 d8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7c cb b6 c5 ee bc 2b a0 53 bb 77 45 86 3e ca 93 | Notify data 1e 2d 97 d8 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #296 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #296: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #296 to 4294967295 after switching state | Message ID: IKE #296 skipping update_recv as MD is fake | Message ID: sent #296 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-44" #296: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.44:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #296) | 1c da 2e ac 4a 99 24 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 2a 4d fb 46 1d b7 c4 96 00 b1 66 99 7e ce 3b | 3f 48 6e 8c 76 bd 25 cd 72 f7 15 4a f9 69 ef 13 | 61 8a 19 db 25 90 81 55 08 5a cc 41 41 e5 ab d4 | 92 10 f9 d6 8d 49 ef 3f b0 9e f2 80 9b 7b 70 6e | a9 61 7d e0 84 75 fd d1 46 6c 42 61 66 ee 24 20 | 73 fa d1 4c 21 9e a9 c7 16 a9 b3 6f aa 78 ac 00 | 78 f4 c3 83 9c c4 9a 92 64 af b4 ed 81 ba ac a2 | f1 41 08 3e c1 2f b1 ba 03 49 e2 bf 7f db 95 66 | 30 1e c5 ba 28 dd ee 71 21 42 41 ca af c4 be d2 | 90 1d aa 94 fa 3e 05 ce 17 28 d8 85 00 b7 a3 6c | d2 a6 c4 12 ee 02 b6 a5 47 f5 e8 05 85 3f 07 9b | aa 0d 4f 57 c3 15 b2 47 ad f5 11 0a f7 29 da c6 | 9c 86 0c 08 6b ec 00 4d b0 6e 72 d1 b7 c3 86 c8 | 85 d9 c3 07 c3 a7 58 91 99 ee d7 82 f7 95 cb 56 | c0 48 0c 04 c6 c9 83 ce b6 aa 4e 64 f0 9f 73 46 | e9 f5 bb 10 78 a8 77 4a 7b da 32 8f 23 90 cf 6d | 29 00 00 24 ce d0 75 80 6d 1e 36 8f b6 81 e0 37 | 25 cc b5 c9 b7 8f 97 4d 1e ae eb 17 23 86 66 d2 | cc 2a b8 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 83 86 3f b2 b5 92 3c 02 7f 1a c2 | 45 4d 9a 24 f1 5a 66 8d 00 00 00 1c 00 00 40 05 | 7c cb b6 c5 ee bc 2b a0 53 bb 77 45 86 3e ca 93 | 1e 2d 97 d8 | state #296 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c04b8e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0bf40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #296 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 | #296 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49668.441493 | resume sending helper answer for #296 suppresed complete_v2_state_transition() and stole MD | #296 spent 0.466 milliseconds in resume sending helper answer | stop processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34800f1a0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c da 2e ac 4a 99 24 d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #296 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #296 | rejected packet: | 1c da 2e ac 4a 99 24 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2c fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #296: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #271 | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #271 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #271 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49668.460692; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002775 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #271 | libevent_malloc: new ptr-libevent@0x7fb34800f1a0 size 128 "road-eastnet-nonat-19" #271: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #271) | 7d 5f ba e3 47 14 e8 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 b7 7f 1c 9b af 52 72 9a 96 12 4e c3 f7 5f 8a | 48 37 54 79 d7 e3 fa 14 73 ed 20 d0 0f 82 32 1d | 91 7e 9e e7 72 47 b7 f9 8c ea 5f f8 df 55 12 c4 | 92 bb 9f b6 bd 08 63 49 16 85 39 f9 e1 a5 b1 3c | c9 58 9d 54 19 7c 80 7a 60 14 04 1b 66 54 39 2c | 16 d8 67 8c 1c 17 da 4b 4f 1f bb d2 83 f8 37 fc | 93 5f 92 af 49 5f 4c f2 18 ce 79 e8 01 4b 07 77 | 80 53 3f 3e 68 e0 6b 21 fa 6f 05 3a 1d 5f f9 c2 | 5b 34 da 08 fc 81 e1 b6 3f ef a7 e1 31 76 84 4b | db 66 e5 6b 4f 6c 18 0f ea 47 e4 2c 6a c6 c7 06 | 5d 0a 4e 6f d5 bc 0f 88 7b d7 82 6f 83 51 d3 f6 | 3f a3 4c ff 85 ee cb 4b c1 01 38 69 a0 a8 36 14 | 78 3e d3 db 38 75 17 e9 a4 a3 59 d1 1c af a4 4d | 60 05 9d fd 70 d0 ca cf 0e 66 4b c6 c1 40 c4 3b | 1b 74 97 05 ab 30 3b 52 e7 0a 00 36 d3 75 ae 4d | 76 9f 37 1c a2 58 eb 22 e1 c0 ab af b2 c0 c6 2e | 29 00 00 24 7c 82 5e 31 94 0b 65 4a 1d 71 08 ad | 0f 28 62 96 1d 12 64 f9 13 f9 d7 4a bb 8e a2 2a | 74 49 fb 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 80 df fd 55 81 8a 62 6a df 6a a7 | 9f a0 5f ab 49 a7 33 15 00 00 00 1c 00 00 40 05 | 73 c3 81 b2 53 ff c8 44 e3 9d 4d 41 12 c0 55 97 | b5 95 22 52 | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #271 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 5f ba e3 47 14 e8 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #271 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #271 | rejected packet: | 7d 5f ba e3 47 14 e8 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #271: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fbb00 | handling event EVENT_RETRANSMIT for parent state #283 | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #283 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #283 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49668.476017; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002194 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #283 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 "road-eastnet-nonat-31" #283: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #283) | 6d 25 6c e9 9d 21 2c 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b e9 86 64 c6 6f 55 a3 bc 52 39 e5 45 42 b6 cc | f2 a4 d8 e4 d7 c3 31 05 04 56 63 c6 c2 26 bf 59 | 6a b9 a8 fc fa 31 7a 57 4f f1 c0 49 83 9c 61 f6 | ea 6e c3 47 87 15 57 34 67 e5 10 86 61 2d 48 bc | 65 9e 10 ea 92 ad c9 b9 04 73 b8 2e a2 d6 b3 0a | c0 be 8f 2a 6c 99 ba 2f e9 4c 9e ba 98 ae c9 a2 | 11 55 c6 05 57 8e ab ea fe ab c0 66 94 91 31 6d | 5a 61 9a c2 11 87 93 ed bf 92 59 c4 b9 84 ce ab | db 12 40 39 53 0e ae d0 f2 e5 17 3c ea 18 98 24 | 12 e5 c0 95 86 ac ec 82 ab 81 6f 9e 62 08 73 b9 | a8 9d e0 0f 7d f3 2e 0b 7e 07 bc 19 99 3e 51 81 | 29 43 73 f2 dc b1 11 40 fd 25 79 3c 57 b5 ab be | 2e e1 68 18 e4 38 d8 a0 4c 8c 74 5e ff df de 09 | df 96 78 f3 4d 4d f6 30 46 ec df 31 2f 74 61 0b | 81 46 62 97 97 55 58 f5 2a c4 6f df 71 dd ee 98 | ae ac aa b2 0f 96 9a 79 9a bd 7e 1b 8b 95 fc 2d | 29 00 00 24 19 7a 94 41 a3 df 39 c8 6e b5 7e 75 | da 2c b2 db 58 bf cc 1e 51 b1 c7 de c1 0f 32 c8 | 22 50 94 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 90 7d 87 8b 25 a9 47 ca 59 98 98 | 30 6c 9b 73 ee 84 48 a4 00 00 00 1c 00 00 40 05 | 6c 03 cb 30 07 ff 71 63 de 15 87 b9 5c 0f 43 de | 70 36 3d ec | libevent_free: release ptr-libevent@0x7fb380027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fbb00 | #283 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 25 6c e9 9d 21 2c 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #283 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #283 | rejected packet: | 6d 25 6c e9 9d 21 2c 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #283: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6e010 | handling event EVENT_RETRANSMIT for parent state #290 | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #290 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #290 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49668.478365; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499957 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fbb00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #290 | libevent_malloc: new ptr-libevent@0x7fb380027c10 size 128 "road-eastnet-nonat-38" #290: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #290) | d9 b1 5b a3 d1 9c 57 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 dc 77 37 88 c0 74 0b c8 60 da a3 8f 9c e4 42 | 29 fe d5 c9 98 e7 af 66 82 be 95 44 77 f6 93 6f | 24 98 d7 cc c4 a6 16 af 14 a2 ad 53 a8 a5 93 3c | a1 26 c3 2d 65 3f cc 3f f0 9b 21 66 64 c4 82 00 | 30 f1 57 86 bf eb 51 88 bf 71 0a 30 68 dc 14 50 | 80 50 e1 6f 25 74 d9 af 8d f4 b9 89 60 e8 c3 c8 | 3b d5 14 f3 53 b4 96 85 6c 74 39 5d ff ee 22 a4 | ad 4c 82 96 29 6f f2 59 77 4e 48 da 14 23 7a 5c | 78 bb 13 4c f8 05 33 6d 40 79 5d e2 85 b7 6d 6e | b2 54 b0 03 d6 63 64 61 00 6d fd d4 8a 79 cd 3d | f1 25 f9 cf fc 5d a4 f7 ef 48 25 44 50 58 6a b2 | cd 2c dd 4c f0 ff 5e 32 e5 0f bc 63 fa 03 d5 1a | 9a ab 7e 2b 95 53 36 2e 47 c1 65 a2 7b d7 cd db | 40 2b 7a b2 21 b9 e9 6e fc 75 da 49 33 c1 98 35 | c7 9c 09 b3 47 fb 10 3f e1 56 6f be 75 69 b0 33 | f1 cb e8 e7 d6 74 b0 43 37 f7 9f 8c c7 7c d0 1e | 29 00 00 24 f3 df a5 ae 0e f0 b6 8d 6c 86 f6 fd | ac 3e 20 3a 6e ef cc 6e 76 09 43 e5 b3 97 07 d6 | b5 fd b7 b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 90 0c 81 3c 3a d2 14 9a 30 eb 10 | fa 46 c9 fe 37 f4 bb 0e 00 00 00 1c 00 00 40 05 | ea fc 09 da ae 61 e7 e4 dc 7a 6e 5d ad e3 e5 ff | 21 64 e7 65 | libevent_free: release ptr-libevent@0x7fb35401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6e010 | #290 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 b1 5b a3 d1 9c 57 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #290 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #290 | rejected packet: | d9 b1 5b a3 d1 9c 57 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #290: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #45 | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #45 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #45 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49668.508682; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.012964 exceeds limit? YES "road-eastnet-nonat-45" #45: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-45" #45: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #297 at 0x557d46a10b90 | State DB: adding IKEv2 state #297 in UNDEFINED | pstats #297 ikev2.ike started | Message ID: init #297: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #297: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #297; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-45" #297: initiating v2 parent SA to replace #45 | using existing local IKE proposals for connection road-eastnet-nonat-45 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 297 for state #297 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a6e010 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #297 | libevent_malloc: new ptr-libevent@0x7fb35401d920 size 128 | #297 spent 0.0687 milliseconds in ikev2_parent_outI1() | RESET processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 resuming | crypto helper 8 starting work-order 297 for state #297 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 297 | start processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #45 ikev2.ike failed too-many-retransmits | pstats #45 ikev2.ike deleted too-many-retransmits | #45 spent 2.27 milliseconds in total | [RE]START processing: state #45 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-45" #45: deleting state (STATE_PARENT_I1) aged 64.014s and NOT sending notification | parent state #45: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #45 "road-eastnet-nonat-45" #45: deleting IKE SA for connection 'road-eastnet-nonat-45' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-45' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-45 | State DB: deleting IKEv2 state #45 in PARENT_I1 | parent state #45: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 297 time elapsed 0.000997 seconds | (#297) spent 1 milliseconds in crypto helper computing work-order 297: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 297 for state #297 to event queue | scheduling resume sending helper answer for #297 | libevent_malloc: new ptr-libevent@0x7fb34c00f1a0 size 128 | crypto helper 8 waiting (nothing to do) | stop processing: state #45 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | in statetime_stop() and could not find #45 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-45 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-45" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-45' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-45" | stop processing: connection "road-eastnet-nonat-45" (in initiate_a_connection() at initiate.c:349) | spent 0.0554 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #297 | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 297 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #297 | **emit ISAKMP Message: | initiator cookie: | e1 41 d2 51 2f 25 d9 71 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-45 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b6 ea 0d 0b 39 8c c1 99 18 5a a8 8a 8f 5d 3d 22 | ikev2 g^x 46 42 ee 49 5d 81 c3 87 32 80 3d 42 65 0e 28 54 | ikev2 g^x e6 12 c3 e6 03 86 ad ca e9 ea 65 ce 14 e5 73 46 | ikev2 g^x 61 07 3a 7c 00 7f 71 ec 17 17 d4 44 37 36 26 7a | ikev2 g^x 8c 65 4b 5e 2f d6 31 47 0e b3 55 90 e6 1c cb 77 | ikev2 g^x 1c 6d 58 27 57 b3 27 ff b6 e1 e9 7d 1b 10 c2 48 | ikev2 g^x 70 f7 e7 1e 31 56 ab cf ae 38 32 b8 65 81 ac 00 | ikev2 g^x 4e 9d 3a 6c 2c 1d fb a6 ff a6 c5 15 4a d1 e9 8c | ikev2 g^x f6 3b 4a 4d e5 6a 3d e0 b2 a1 f4 29 63 27 5f 0f | ikev2 g^x 08 89 9b 00 9b 1b 1f 8e 12 d3 c4 4f 3e 13 f5 a5 | ikev2 g^x 9c 44 af 0f 10 29 67 15 0d b9 b4 26 98 5d 9e 81 | ikev2 g^x d4 78 c2 73 92 2e 97 4c 48 13 99 b5 01 42 7a 4a | ikev2 g^x aa bb 3e f2 96 18 19 79 ab c3 39 3b ba ba b8 0b | ikev2 g^x 06 4a 68 91 6a ff 80 ba f0 6f 51 cd 71 94 91 9b | ikev2 g^x 14 d1 d2 23 7f bc a7 08 5b 2f eb 14 51 51 4a 55 | ikev2 g^x ca 92 da a2 1f 6e 9a 88 d0 9b 68 b4 59 e4 e6 5b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a5 fe b0 e3 a2 f4 1f f6 10 ff b8 23 13 cf c1 54 | IKEv2 nonce 86 87 d9 95 be 21 30 83 5b ee 54 e5 86 f0 89 0d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e1 41 d2 51 2f 25 d9 71 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2d | natd_hash: port= 01 f4 | natd_hash: hash= 23 30 e2 49 c0 1b 21 8e cb 56 2f 44 75 d2 75 93 | natd_hash: hash= 97 72 cd 45 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 23 30 e2 49 c0 1b 21 8e cb 56 2f 44 75 d2 75 93 | Notify data 97 72 cd 45 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e1 41 d2 51 2f 25 d9 71 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ed 4e b6 34 59 cc 9b 96 b2 cc cc ed 70 1c 55 bb | natd_hash: hash= 38 17 6f fc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ed 4e b6 34 59 cc 9b 96 b2 cc cc ed 70 1c 55 bb | Notify data 38 17 6f fc | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #297 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #297: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #297 to 4294967295 after switching state | Message ID: IKE #297 skipping update_recv as MD is fake | Message ID: sent #297 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-45" #297: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.45:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #297) | e1 41 d2 51 2f 25 d9 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 ea 0d 0b 39 8c c1 99 18 5a a8 8a 8f 5d 3d 22 | 46 42 ee 49 5d 81 c3 87 32 80 3d 42 65 0e 28 54 | e6 12 c3 e6 03 86 ad ca e9 ea 65 ce 14 e5 73 46 | 61 07 3a 7c 00 7f 71 ec 17 17 d4 44 37 36 26 7a | 8c 65 4b 5e 2f d6 31 47 0e b3 55 90 e6 1c cb 77 | 1c 6d 58 27 57 b3 27 ff b6 e1 e9 7d 1b 10 c2 48 | 70 f7 e7 1e 31 56 ab cf ae 38 32 b8 65 81 ac 00 | 4e 9d 3a 6c 2c 1d fb a6 ff a6 c5 15 4a d1 e9 8c | f6 3b 4a 4d e5 6a 3d e0 b2 a1 f4 29 63 27 5f 0f | 08 89 9b 00 9b 1b 1f 8e 12 d3 c4 4f 3e 13 f5 a5 | 9c 44 af 0f 10 29 67 15 0d b9 b4 26 98 5d 9e 81 | d4 78 c2 73 92 2e 97 4c 48 13 99 b5 01 42 7a 4a | aa bb 3e f2 96 18 19 79 ab c3 39 3b ba ba b8 0b | 06 4a 68 91 6a ff 80 ba f0 6f 51 cd 71 94 91 9b | 14 d1 d2 23 7f bc a7 08 5b 2f eb 14 51 51 4a 55 | ca 92 da a2 1f 6e 9a 88 d0 9b 68 b4 59 e4 e6 5b | 29 00 00 24 a5 fe b0 e3 a2 f4 1f f6 10 ff b8 23 | 13 cf c1 54 86 87 d9 95 be 21 30 83 5b ee 54 e5 | 86 f0 89 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 30 e2 49 c0 1b 21 8e cb 56 2f 44 | 75 d2 75 93 97 72 cd 45 00 00 00 1c 00 00 40 05 | ed 4e b6 34 59 cc 9b 96 b2 cc cc ed 70 1c 55 bb | 38 17 6f fc | state #297 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35401d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a6e010 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6e010 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #297 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 | #297 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49668.510221 | resume sending helper answer for #297 suppresed complete_v2_state_transition() and stole MD | #297 spent 0.317 milliseconds in resume sending helper answer | stop processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c00f1a0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 41 d2 51 2f 25 d9 71 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #297 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #297 | rejected packet: | e1 41 d2 51 2f 25 d9 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #297: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac2900 | handling event EVENT_RETRANSMIT for parent state #254 | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #254 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #254 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49668.540405; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00319 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #254 | libevent_malloc: new ptr-libevent@0x7fb34c00f1a0 size 128 "road-eastnet-nonat-2" #254: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #254) | b9 c6 03 da 3d 1b ba 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca 92 e7 94 15 6c 86 1d 96 e8 8f 04 2b 4c 31 1c | f2 c3 f1 85 7b fe b5 54 f7 1b c1 2a 4c 6d 01 5c | 34 19 7c 9d d1 b6 95 21 d0 08 d9 67 bb dc e0 e1 | 38 6b 59 b4 76 fc 39 ee a0 2d f2 f5 62 c4 0a 49 | 6b 3c f0 00 22 80 8c 1c 36 99 55 b9 ef cb 76 99 | 5c 12 4c 07 84 ad f5 48 ab 42 10 f5 2e d6 e5 5c | 9d d4 b0 9f 16 b4 b4 bb b3 53 f3 e9 cc 93 ad 3b | a8 c4 f0 7f 9d 9d e3 f4 df 44 9c 28 b2 72 cb b6 | 4b 6a f0 9c 2e 22 ce 4f d0 b2 c9 a3 7c 48 1e 03 | a8 3d 92 67 11 0c a8 c0 fd 76 08 be 4f 01 6d 12 | 3e 0b 87 da bc 3d 45 99 0f 30 cb 9d 8c 96 4d 32 | 07 37 42 c8 ca 8d d9 f2 2b 81 33 b1 a2 49 5c 82 | 69 0d 94 76 f5 ef d0 bf fa db a3 8e db 15 f4 34 | c3 81 4c 6a 47 45 9d c9 09 00 1e 8a 46 70 b4 51 | 30 c0 17 29 a6 05 17 9f 61 e3 d5 9e b5 26 aa b7 | f8 4d 8f 98 15 36 79 53 4c 2f e1 9e 49 63 a8 23 | 29 00 00 24 b7 98 fa 02 fe fe ce ce 94 a2 bc d0 | 60 0d 7b 30 0c f7 48 0b 72 92 ee ec 3d 65 36 1c | 6e c0 df 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3a c0 39 9e 3d 58 28 13 41 2f 06 c7 | b4 3e d7 c2 8d 41 7c 7d 00 00 00 1c 00 00 40 05 | 08 0f dc c4 71 f2 0f bc 45 99 87 81 91 93 b1 3d | 30 5f 17 8f | libevent_free: release ptr-libevent@0x7fb3540251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac2900 | #254 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 c6 03 da 3d 1b ba 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #254 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #254 | rejected packet: | b9 c6 03 da 3d 1b ba 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #254: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.048 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc40 | handling event EVENT_RETRANSMIT for parent state #272 | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #272 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #272 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49668.545681; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003261 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac2900 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #272 | libevent_malloc: new ptr-libevent@0x7fb3540251c0 size 128 "road-eastnet-nonat-20" #272: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #272) | ff cb fd 37 8d 6e 61 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 04 b7 27 a5 a7 b8 66 d1 97 95 af 66 c3 e5 98 | ee b7 4e e8 fe 54 c0 2a 2c 35 b6 d6 11 41 10 b4 | 18 af 3b 75 f0 d4 8b ed 8c 54 fb a5 3b 9b 6b cd | 03 d4 cf 02 df ad 03 af ed 19 0c 47 fd 76 33 3e | 24 82 13 9d 24 33 be 90 d1 7f 59 52 78 71 71 b7 | d4 30 a1 93 8a 23 ef e8 5d 07 26 a3 58 a3 1a 46 | 2d 58 6b b7 bb c2 88 9f da 41 df 19 fa 55 01 88 | 63 f9 88 36 bf 3a 39 63 56 a1 2c 9c 43 fd a5 21 | f8 58 cf ff 69 0b 98 4e 19 2a 44 99 da 01 4c 80 | 0c 1f 77 fa 46 a9 9d c9 0d f6 84 3d b7 03 9e fa | 58 be 5a 4e 84 f9 db ea 37 27 1e 20 1a 6d 70 a9 | 48 8d a5 77 92 42 17 cb 45 b8 22 eb 9d 91 c6 90 | e3 e5 f3 a4 52 f9 ea e1 ca a2 a3 45 53 91 dc 5f | 97 6f 49 81 28 51 8e dc 29 b1 94 f1 3b a3 22 d7 | 94 cf 3a 4b 92 c4 95 64 a5 39 a2 3f 8c 62 a2 f6 | c1 95 97 06 70 da 53 50 e5 31 15 be f9 f5 d7 98 | 29 00 00 24 f6 15 1a 90 c8 9a 0e fb 04 05 1c c3 | 59 55 fa d7 2d f2 b7 dc b4 87 c3 61 27 da cc e0 | 74 b4 47 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee f8 1c 9f 4c fe 24 8c 43 92 80 29 | 12 02 33 5d 78 63 e2 5e 00 00 00 1c 00 00 40 05 | 82 23 9a b6 38 a9 7d af e0 d8 2e 1b 87 38 33 1a | f5 86 95 cf | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc40 | #272 spent 0.0837 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff cb fd 37 8d 6e 61 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #272 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #272 | rejected packet: | ff cb fd 37 8d 6e 61 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #272: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a42790 | handling event EVENT_RETRANSMIT for parent state #291 | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #291 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #291 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49668.553907; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500567 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #291 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 "road-eastnet-nonat-39" #291: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #291) | 77 85 93 ea 80 0c b0 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 1c 76 58 29 75 7e d4 f4 bf 59 3f 6e da 30 13 | 97 91 e5 4d 2a 44 30 c6 77 2b e1 aa 90 8a 91 6e | f8 8f d9 e7 ab d5 fb c9 18 4a c7 0e 37 35 b2 f0 | a3 12 8b 8a 64 ba 60 9e 98 18 5b 0a c2 a4 de 16 | 9c ef 90 7b a5 b4 e5 01 26 3c 58 d0 37 33 d3 a2 | f6 fe 76 4d 01 cd 2b d6 3c be b9 eb 0d 8b d4 d7 | c4 c5 12 bf 64 f2 4f a2 ec 8b b1 e0 3a c2 a2 21 | f4 b9 1a d7 ab ef 1a 0d f1 e1 8b 50 27 cf 98 3e | c2 08 00 e6 03 cf bf ee 86 72 2a aa f9 36 e9 49 | e2 ab b6 47 68 84 b5 9d f0 67 c8 08 03 1b 51 9a | 44 fe 69 c7 87 64 78 4a b7 c0 08 da 1d ee c0 bb | be c8 5e a1 c1 cc 41 ab 33 ca fd ed d6 b3 7c b1 | a7 a2 c7 36 15 58 52 6a 99 ee 8c 84 f7 78 81 e9 | 01 61 49 76 ce 6b ac b8 4a dc 03 3e 4e 23 ba 57 | f4 01 5b 74 05 72 0c 07 03 e6 2a 5d b3 8c b8 ef | e7 cd d3 38 e6 37 e3 80 1e bc 5b 24 b7 a5 cb 2c | 29 00 00 24 37 f4 21 d3 cc 8d d5 11 a4 01 4c 20 | b4 32 01 c8 03 d8 fb 70 07 27 01 09 a0 70 e5 36 | d3 fe b6 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 76 dc 7a b2 16 bf 01 10 e9 6f f4 | 8e 92 4c 8c 19 0f b1 8b 00 00 00 1c 00 00 40 05 | 48 a8 ae 2a a4 d2 aa 19 46 f9 d2 d9 d7 e1 ad a4 | ae e0 ac b4 | libevent_free: release ptr-libevent@0x7fb338012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a42790 | #291 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 85 93 ea 80 0c b0 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #291 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #291 | rejected packet: | 77 85 93 ea 80 0c b0 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #291: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.049 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a672d0 | handling event EVENT_RETRANSMIT for parent state #284 | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #284 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #284 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49668.555167; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002257 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a42790 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #284 | libevent_malloc: new ptr-libevent@0x7fb338012840 size 128 "road-eastnet-nonat-32" #284: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #284) | 4f c5 f3 7c 66 c6 91 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba b7 9c a5 65 e1 b6 6c 6d 9d e6 37 7c 5c f0 56 | 41 3d 90 c7 c5 60 97 4a 06 1e 79 6d 8b 7a e1 25 | 8a e0 db 36 d3 fb fd 75 27 2c e6 11 8c 23 25 88 | 33 6a f7 df 2d 31 86 e1 88 c6 aa 1b d4 34 45 16 | 89 ed d8 a3 84 50 47 88 30 89 02 8c a8 40 9f 16 | 7d e6 73 98 ef b8 9b e4 c2 07 6e 64 f9 a7 00 b0 | 51 f9 1e 1e 5d 35 fd 1d 61 a0 8a db ac 3a a5 8e | 67 a3 5b 3b 5e 51 8c 98 11 1d 70 aa 48 6b 1b 38 | fe 3a 74 c3 2d 4b 66 87 e9 a4 65 ed 1c 5b e4 91 | fa be 09 5f aa ec 3b 28 29 ab 52 85 54 9f ad 67 | e9 64 b2 c0 a7 f8 4d 31 5f 8c e9 8e 20 90 9f 65 | 6a 76 61 75 16 6e 59 99 0c 9b cb ca c4 c4 20 96 | 27 41 40 bc 51 ae 53 c0 78 fe 0b f1 3b 9e 38 fe | 94 f7 01 4f 33 dd 41 c6 b8 e2 1f f5 07 d9 60 b6 | 76 7e 73 5f c5 3d 67 e4 c6 ee 71 88 8c 90 3a 18 | 0e 12 ec 6b 94 d2 71 0c c3 11 05 e5 1f bd ac 6a | 29 00 00 24 e8 7e a2 09 c5 c0 d6 dc c4 8f 1b fd | a9 a5 28 29 c6 ee 14 10 31 5e 74 e5 a8 11 e2 fb | 53 d1 4d b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 bd 1e aa d2 1d d0 15 75 cf 8a a1 | 9b e7 2e 78 e9 b8 ab 0e 00 00 00 1c 00 00 40 05 | 98 e6 12 78 17 7a 25 b0 15 91 c2 32 50 43 18 e1 | 21 f2 b2 de | libevent_free: release ptr-libevent@0x7fb36400f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a672d0 | #284 spent 0.0856 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f c5 f3 7c 66 c6 91 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #284 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #284 | rejected packet: | 4f c5 f3 7c 66 c6 91 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #284: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abd200 | handling event EVENT_RETRANSMIT for parent state #46 | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #46 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #46 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49668.596439; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008623 exceeds limit? YES "road-eastnet-nonat-46" #46: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-46" #46: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #298 at 0x557d46a12150 | State DB: adding IKEv2 state #298 in UNDEFINED | pstats #298 ikev2.ike started | Message ID: init #298: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #298: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #298; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-46" #298: initiating v2 parent SA to replace #46 | using existing local IKE proposals for connection road-eastnet-nonat-46 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 298 for state #298 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a672d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #298 | libevent_malloc: new ptr-libevent@0x7fb36400f1a0 size 128 | #298 spent 0.067 milliseconds in ikev2_parent_outI1() | RESET processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #46 ikev2.ike failed too-many-retransmits | pstats #46 ikev2.ike deleted too-many-retransmits | crypto helper 12 resuming | crypto helper 12 starting work-order 298 for state #298 | #46 spent 2.63 milliseconds in total | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 298 | [RE]START processing: state #46 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-46" #46: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #46: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #46 "road-eastnet-nonat-46" #46: deleting IKE SA for connection 'road-eastnet-nonat-46' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-46' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-46 | State DB: deleting IKEv2 state #46 in PARENT_I1 | parent state #46: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 298 time elapsed 0.000602 seconds | (#298) spent 0.606 milliseconds in crypto helper computing work-order 298: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 298 for state #298 to event queue | scheduling resume sending helper answer for #298 | libevent_malloc: new ptr-libevent@0x7fb34000f1a0 size 128 | stop processing: state #46 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb35003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abd200 | in statetime_stop() and could not find #46 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 12 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-46 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-46" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-46' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-46" | stop processing: connection "road-eastnet-nonat-46" (in initiate_a_connection() at initiate.c:349) | spent 0.0708 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #298 | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 298 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #298 | **emit ISAKMP Message: | initiator cookie: | d5 0c ec bc d3 64 84 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-46 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 43 96 23 e5 3a d0 2d 36 cd 43 2d 58 c4 e0 92 a1 | ikev2 g^x ed 2d e1 4c 45 8b 42 ad 40 76 ab 67 60 92 c4 09 | ikev2 g^x 73 c4 c7 3c 9d 80 31 b9 bf b9 9e 64 35 e4 39 ba | ikev2 g^x 2f a8 59 fe 53 09 d8 e0 e9 88 59 30 e2 71 e6 be | ikev2 g^x 2d 69 bc 6a a7 6e 4f db 2a 6a 88 01 9f d2 1a 54 | ikev2 g^x 9b 70 8c b4 c5 37 d0 1b eb c3 58 21 ce 79 a3 ff | ikev2 g^x 4e 1b 84 aa 1e 08 dd 9d 9d 58 7a ba b0 dd 2d 38 | ikev2 g^x 9e da 29 29 b5 fb 28 78 05 fa 3a 26 c0 d3 4c cf | ikev2 g^x 22 22 af c7 f1 d8 11 18 01 e3 41 10 fc 1b c9 38 | ikev2 g^x 58 6b be 13 fa e2 38 5b 8d 00 15 50 84 fd a8 e0 | ikev2 g^x 20 22 31 ab 99 61 d4 85 a8 6c 2e d8 1f e4 26 c0 | ikev2 g^x 25 17 38 c7 a5 82 30 0d e2 85 f0 d0 e0 3a 59 87 | ikev2 g^x 67 7b 0d e4 52 7b 6c 35 93 c6 f4 61 2c 32 e9 62 | ikev2 g^x b8 57 d1 59 0b 7c af 14 d1 9d bb 91 61 85 75 09 | ikev2 g^x ed c6 43 19 bf 09 f8 e4 92 e6 1f f3 47 e1 6e 0a | ikev2 g^x 5a 69 40 30 db b0 00 24 c2 61 94 a9 30 49 e7 0e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4c 0e e1 06 42 9e 4c 74 3b 65 ba d4 bc 56 1a 69 | IKEv2 nonce be b4 c7 ec 29 68 0f 7e 31 97 81 70 75 a5 f0 4a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d5 0c ec bc d3 64 84 7a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2e | natd_hash: port= 01 f4 | natd_hash: hash= e6 96 a5 ca 09 14 9d 81 34 51 5c 38 06 b0 7e 03 | natd_hash: hash= d4 af 12 47 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e6 96 a5 ca 09 14 9d 81 34 51 5c 38 06 b0 7e 03 | Notify data d4 af 12 47 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d5 0c ec bc d3 64 84 7a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1b 14 fa aa 2e 1c b4 a7 92 80 67 79 37 9e 5c 02 | natd_hash: hash= 1f 84 46 7d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b 14 fa aa 2e 1c b4 a7 92 80 67 79 37 9e 5c 02 | Notify data 1f 84 46 7d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #298 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #298: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #298 to 4294967295 after switching state | Message ID: IKE #298 skipping update_recv as MD is fake | Message ID: sent #298 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-46" #298: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.46:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #298) | d5 0c ec bc d3 64 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 43 96 23 e5 3a d0 2d 36 cd 43 2d 58 c4 e0 92 a1 | ed 2d e1 4c 45 8b 42 ad 40 76 ab 67 60 92 c4 09 | 73 c4 c7 3c 9d 80 31 b9 bf b9 9e 64 35 e4 39 ba | 2f a8 59 fe 53 09 d8 e0 e9 88 59 30 e2 71 e6 be | 2d 69 bc 6a a7 6e 4f db 2a 6a 88 01 9f d2 1a 54 | 9b 70 8c b4 c5 37 d0 1b eb c3 58 21 ce 79 a3 ff | 4e 1b 84 aa 1e 08 dd 9d 9d 58 7a ba b0 dd 2d 38 | 9e da 29 29 b5 fb 28 78 05 fa 3a 26 c0 d3 4c cf | 22 22 af c7 f1 d8 11 18 01 e3 41 10 fc 1b c9 38 | 58 6b be 13 fa e2 38 5b 8d 00 15 50 84 fd a8 e0 | 20 22 31 ab 99 61 d4 85 a8 6c 2e d8 1f e4 26 c0 | 25 17 38 c7 a5 82 30 0d e2 85 f0 d0 e0 3a 59 87 | 67 7b 0d e4 52 7b 6c 35 93 c6 f4 61 2c 32 e9 62 | b8 57 d1 59 0b 7c af 14 d1 9d bb 91 61 85 75 09 | ed c6 43 19 bf 09 f8 e4 92 e6 1f f3 47 e1 6e 0a | 5a 69 40 30 db b0 00 24 c2 61 94 a9 30 49 e7 0e | 29 00 00 24 4c 0e e1 06 42 9e 4c 74 3b 65 ba d4 | bc 56 1a 69 be b4 c7 ec 29 68 0f 7e 31 97 81 70 | 75 a5 f0 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 96 a5 ca 09 14 9d 81 34 51 5c 38 | 06 b0 7e 03 d4 af 12 47 00 00 00 1c 00 00 40 05 | 1b 14 fa aa 2e 1c b4 a7 92 80 67 79 37 9e 5c 02 | 1f 84 46 7d | state #298 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36400f1a0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a672d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a672d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #298 | libevent_malloc: new ptr-libevent@0x7fb35003b0b0 size 128 | #298 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49668.597632 | resume sending helper answer for #298 suppresed complete_v2_state_transition() and stole MD | #298 spent 0.313 milliseconds in resume sending helper answer | stop processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34000f1a0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 0c ec bc d3 64 84 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #298 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #298 | rejected packet: | d5 0c ec bc d3 64 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2e fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #298: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a94500 | handling event EVENT_RETRANSMIT for parent state #285 | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #285 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #285 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49668.620807; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001958 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34001f970 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #285 | libevent_malloc: new ptr-libevent@0x7fb34000f1a0 size 128 "road-eastnet-nonat-33" #285: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #285) | 8e b8 37 d5 68 56 5c 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 a4 f2 e0 52 94 4a 81 83 55 c1 41 32 b7 b8 02 | 1f ed 45 79 af ff 8a eb 0a de 74 5c 80 82 ad 8f | b3 d0 39 bf 3b db ca 12 0b a2 0e eb ce 92 b6 11 | 51 c6 b7 d3 f4 87 aa 09 0c f5 bb d2 46 13 91 7d | 65 dc 9e 2a 12 da 3f be a8 bc 4e 1c a1 4c 53 ad | 64 f4 41 68 96 19 bd e1 80 86 91 4f 17 c1 cc 5c | ad 72 12 cc 9c fe d8 85 6a cd 1f 0f cf 61 bc 07 | 09 af 5b a0 a2 6c 2a 6f 4c 7e dd ad 13 55 ed 0e | ce cf e6 c5 66 9e 5a 6a e4 42 78 50 61 c3 d4 73 | e3 47 f2 bc a4 8c 26 64 97 c9 f1 2a c6 63 9c 83 | 60 4f 25 9e cb 7a 10 71 25 9d c1 dd 11 38 34 bc | 7c a1 3b 2b 0d 73 6f f9 3c 0b 62 50 05 38 a7 0e | 31 2d 60 72 dd 2b a2 05 f6 e2 f0 0d 9b c1 b1 9e | c0 ee 0d 2f 64 4b 28 d2 c0 e7 3b 0a 50 ff 03 45 | 45 ff 2c cd 4e 54 17 7d 2b 95 02 32 23 94 0e de | 7b 38 d9 9c b7 e8 7d 2f 56 9c 26 e0 8b a0 e6 38 | 29 00 00 24 e6 a9 52 cb 4c 75 d2 f3 84 20 3b dd | 0e ee e2 12 57 50 c2 6f 3d 4c ae 21 23 00 a4 ca | 8c 87 5b 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 5c 90 12 97 99 4e dd 8f 9a cf 75 | ad 0a 2b a1 31 ad 53 29 00 00 00 1c 00 00 40 05 | f9 f4 9b a0 01 06 28 22 67 53 82 2b ec 0b 3c 23 | 3e d8 d3 7f | libevent_free: release ptr-libevent@0x7fb35804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94500 | #285 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e b8 37 d5 68 56 5c 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #285 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #285 | rejected packet: | 8e b8 37 d5 68 56 5c 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #285: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0705 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #292 | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #292 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #292 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49668.623174; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501608 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94500 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #292 | libevent_malloc: new ptr-libevent@0x7fb35804b850 size 128 "road-eastnet-nonat-40" #292: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #292) | 87 88 51 7a 60 9d 5a 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 66 a0 4d 60 cb 65 95 3c 93 0d 5e 54 74 22 d5 | b9 4e e2 32 b5 97 c3 a0 c6 6f 16 29 09 b8 29 a7 | 53 85 60 d3 38 df d9 0c a3 64 8e 65 05 77 b2 87 | 1b 54 26 e9 27 44 44 33 65 9f 3e a3 6d dc 58 a3 | 3c 1b b5 56 27 64 d7 00 90 21 cd 7d 46 ab 11 af | ba 96 a3 c8 ee 97 85 92 75 7b ec 2d df 79 07 56 | 45 a8 e2 68 58 3f 02 db 14 25 0e 1f 9b c2 bb 05 | 5a 26 d6 ed 51 8a 97 6d 65 fb 55 2b bb 16 61 e4 | de 73 b2 ef 70 09 3d 76 f2 05 da 1e bd 6c 49 e0 | 44 ef e7 7e 74 41 a3 f7 8a 2e 4b 16 50 e8 de e0 | a4 17 3e ac 86 b1 62 63 2e 1c a5 2b dc 13 3a ee | 9b a0 c2 94 2b ba 80 4c 0b 59 f3 60 75 ff 33 5f | 0b 97 1a 30 63 32 07 17 5c 59 1a 4a db 49 f2 ef | 1e b6 76 4d ca 87 ea 08 32 6d 49 4e d6 81 ee 4c | c7 58 d6 e6 53 ab c7 5b 58 9e 4a 36 b9 18 48 a2 | 61 0a 77 8a 15 c7 1b 51 f1 d5 e0 50 5a 9b 7a 98 | 29 00 00 24 b6 37 4c f0 c9 85 b2 01 0e 7e 3e 08 | 4a 99 af 96 7f b4 c9 1d 28 51 f7 8e 73 35 20 22 | 15 78 52 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 e7 d2 e3 15 0a 06 f3 99 b1 c4 ad | 55 e8 07 46 e3 af eb 45 00 00 00 1c 00 00 40 05 | 9e 69 62 01 15 f2 f4 fe 05 57 a2 2c 87 7a 71 d0 | 0c f9 69 7d | libevent_free: release ptr-libevent@0x7fb33803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #292 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 88 51 7a 60 9d 5a 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #292 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #292 | rejected packet: | 87 88 51 7a 60 9d 5a 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #292: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90440 | handling event EVENT_RETRANSMIT for parent state #273 | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #273 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #273 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49668.658505; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00355 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #273 | libevent_malloc: new ptr-libevent@0x7fb33803b0b0 size 128 "road-eastnet-nonat-21" #273: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #273) | ed 1f ad f4 73 76 3f ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad fb 2c d6 61 18 78 ff ff 9e ac 8e 11 6e 5b 0a | 17 90 d5 cd a5 72 c6 44 33 06 36 88 ef 85 f7 fd | d1 32 bf e5 b4 df 1c 2a 44 4b 64 5a 5c fa a6 e7 | a7 88 cd 98 18 db 83 1c de 12 34 1a 01 c0 6e 90 | b0 37 b6 8e 3f bc 29 ae 17 56 d9 4e 3e aa f9 1a | 05 22 37 90 a3 98 0c 9d fd 31 f5 89 2b 79 38 70 | a3 3c e3 a6 be b6 20 06 92 92 77 84 f9 e1 f6 43 | 50 c4 75 3f ce 2c 7f a3 83 07 1e 29 12 48 86 d5 | b6 e2 61 df c8 2b 9c ea 45 c9 6b 62 38 f9 06 23 | 9b a2 90 c4 51 19 47 e4 c9 9e bb 38 c5 ea 4c 2c | 24 15 a0 60 6e 12 c1 7a cd 75 9f 6a 97 65 4f 9f | 6f aa 7c 8b b3 99 29 be 41 56 ad 5d 52 77 c8 87 | f1 18 76 ec 44 be fb bf 14 5e 22 ec 7b 78 cb 22 | 16 62 54 b4 5f 5e ed e0 38 14 64 69 82 ec fb 0f | 84 be 3a 69 27 17 b5 b0 42 81 a7 3b e2 19 f7 47 | ac 1d 3d ca 8c d0 ae cf 0d f7 a8 a2 36 9e 94 83 | 29 00 00 24 a4 16 d5 7c 26 cc bd 52 fc 33 91 77 | f2 08 cb df 04 12 5c f5 f3 31 f7 87 08 22 5b ef | 2b 8c 5b 44 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 3d 78 9d 41 51 b9 57 ea 0d 4a 5f | 38 c6 cb 30 ec f2 21 4b 00 00 00 1c 00 00 40 05 | bd ec 33 2a 1b 35 fa ad 7a ef 73 f7 d9 b0 09 33 | b4 e9 3f 2e | libevent_free: release ptr-libevent@0x7fb35803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90440 | #273 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 1f ad f4 73 76 3f ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #273 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #273 | rejected packet: | ed 1f ad f4 73 76 3f ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #273: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0482 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7a390 | handling event EVENT_RETRANSMIT for parent state #47 | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #47 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #47 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49668.664794; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010859 exceeds limit? YES "road-eastnet-nonat-47" #47: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-47" #47: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #299 at 0x557d46a13710 | State DB: adding IKEv2 state #299 in UNDEFINED | pstats #299 ikev2.ike started | Message ID: init #299: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #299: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #299; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-47" #299: initiating v2 parent SA to replace #47 | using existing local IKE proposals for connection road-eastnet-nonat-47 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 299 for state #299 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a90440 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #299 | libevent_malloc: new ptr-libevent@0x7fb35803b0b0 size 128 | #299 spent 0.13 milliseconds in ikev2_parent_outI1() | RESET processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #47 ikev2.ike failed too-many-retransmits | pstats #47 ikev2.ike deleted too-many-retransmits | #47 spent 2.03 milliseconds in total | [RE]START processing: state #47 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in delete_state() at state.c:879) | crypto helper 5 resuming | crypto helper 5 starting work-order 299 for state #299 "road-eastnet-nonat-47" #47: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 299 | parent state #47: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #47 "road-eastnet-nonat-47" #47: deleting IKE SA for connection 'road-eastnet-nonat-47' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-47' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-47 | State DB: deleting IKEv2 state #47 in PARENT_I1 | parent state #47: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 299 time elapsed 0.000557 seconds | stop processing: state #47 from 192.1.2.23:500 (in delete_state() at state.c:1143) | (#299) spent 0.562 milliseconds in crypto helper computing work-order 299: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 299 for state #299 to event queue | scheduling resume sending helper answer for #299 | libevent_free: release ptr-libevent@0x7fb37401f7f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7a390 | in statetime_stop() and could not find #47 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb34400cbb0 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 5 waiting (nothing to do) Initiating connection road-eastnet-nonat-47 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-47" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-47' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-47" | stop processing: connection "road-eastnet-nonat-47" (in initiate_a_connection() at initiate.c:349) | spent 0.0994 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #299 | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 299 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #299 | **emit ISAKMP Message: | initiator cookie: | 63 02 bb 51 d9 8c b0 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-47 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3c 17 e8 1c e0 c7 4f 03 2d a7 55 c0 45 bf a2 96 | ikev2 g^x 6a 0c 0e 0f 3f cb a5 f2 68 03 39 51 c2 b3 0b 30 | ikev2 g^x 79 44 b0 72 39 7b b4 0b c0 9d 43 f1 cf 9c ab 76 | ikev2 g^x 17 9c 76 41 f4 97 6b 3d 79 c7 93 3a b0 36 40 75 | ikev2 g^x 1d 60 59 8c 82 e2 c7 85 c2 1c 97 4a 38 8b 6e ad | ikev2 g^x 3e 5a 0d 04 9e 51 30 61 82 af ed 37 96 e2 b6 a0 | ikev2 g^x 3b c4 41 66 ee 44 1e e7 39 9f 7c 2f f5 f2 ff 4b | ikev2 g^x 36 a8 c8 29 8b eb d2 55 7f fb 10 9c ec 8c 08 d0 | ikev2 g^x 39 05 1c 07 ac 20 cb cb a4 7c 61 41 78 60 13 d3 | ikev2 g^x dd a5 39 38 ad f1 86 ff 6a 3c d0 2d b1 eb 7c 82 | ikev2 g^x 79 91 1f 2f 55 9c db 4d e2 10 be 62 dd e3 5a 7a | ikev2 g^x 61 63 85 0c fd 8f b4 af 97 73 ef e2 1b 21 c4 96 | ikev2 g^x e5 df 1b 56 fa 11 08 d6 95 8d 53 f4 13 64 3d 3d | ikev2 g^x 98 8c 38 c7 52 64 1a 00 95 89 f1 a3 72 e2 fe 87 | ikev2 g^x 05 b1 bc 3a 2d 8d ca c2 67 8a 86 e8 36 ce a6 73 | ikev2 g^x 08 10 ff 3d c7 41 a4 c0 53 af 83 9f b4 ac d3 a6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7e 5d f1 77 88 98 7f 63 50 07 d0 59 cc bb c0 62 | IKEv2 nonce cd 9c cc f3 5d 35 d8 78 d2 ee b4 01 aa b2 27 b6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 63 02 bb 51 d9 8c b0 1d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2f | natd_hash: port= 01 f4 | natd_hash: hash= 80 b5 ac f1 52 82 e1 6d 65 51 7c e0 ef a0 91 c6 | natd_hash: hash= 07 cf fb 64 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 80 b5 ac f1 52 82 e1 6d 65 51 7c e0 ef a0 91 c6 | Notify data 07 cf fb 64 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 63 02 bb 51 d9 8c b0 1d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 8f da 92 7d 7b 47 83 cb 10 aa f2 ca 2c a8 73 ac | natd_hash: hash= 13 99 82 ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8f da 92 7d 7b 47 83 cb 10 aa f2 ca 2c a8 73 ac | Notify data 13 99 82 ed | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #299 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #299: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #299 to 4294967295 after switching state | Message ID: IKE #299 skipping update_recv as MD is fake | Message ID: sent #299 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-47" #299: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.47:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #299) | 63 02 bb 51 d9 8c b0 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 17 e8 1c e0 c7 4f 03 2d a7 55 c0 45 bf a2 96 | 6a 0c 0e 0f 3f cb a5 f2 68 03 39 51 c2 b3 0b 30 | 79 44 b0 72 39 7b b4 0b c0 9d 43 f1 cf 9c ab 76 | 17 9c 76 41 f4 97 6b 3d 79 c7 93 3a b0 36 40 75 | 1d 60 59 8c 82 e2 c7 85 c2 1c 97 4a 38 8b 6e ad | 3e 5a 0d 04 9e 51 30 61 82 af ed 37 96 e2 b6 a0 | 3b c4 41 66 ee 44 1e e7 39 9f 7c 2f f5 f2 ff 4b | 36 a8 c8 29 8b eb d2 55 7f fb 10 9c ec 8c 08 d0 | 39 05 1c 07 ac 20 cb cb a4 7c 61 41 78 60 13 d3 | dd a5 39 38 ad f1 86 ff 6a 3c d0 2d b1 eb 7c 82 | 79 91 1f 2f 55 9c db 4d e2 10 be 62 dd e3 5a 7a | 61 63 85 0c fd 8f b4 af 97 73 ef e2 1b 21 c4 96 | e5 df 1b 56 fa 11 08 d6 95 8d 53 f4 13 64 3d 3d | 98 8c 38 c7 52 64 1a 00 95 89 f1 a3 72 e2 fe 87 | 05 b1 bc 3a 2d 8d ca c2 67 8a 86 e8 36 ce a6 73 | 08 10 ff 3d c7 41 a4 c0 53 af 83 9f b4 ac d3 a6 | 29 00 00 24 7e 5d f1 77 88 98 7f 63 50 07 d0 59 | cc bb c0 62 cd 9c cc f3 5d 35 d8 78 d2 ee b4 01 | aa b2 27 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 b5 ac f1 52 82 e1 6d 65 51 7c e0 | ef a0 91 c6 07 cf fb 64 00 00 00 1c 00 00 40 05 | 8f da 92 7d 7b 47 83 cb 10 aa f2 ca 2c a8 73 ac | 13 99 82 ed | state #299 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35803b0b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a90440 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7a390 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #299 | libevent_malloc: new ptr-libevent@0x7fb37401f7f0 size 128 | #299 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49668.666406 | resume sending helper answer for #299 suppresed complete_v2_state_transition() and stole MD | #299 spent 0.662 milliseconds in resume sending helper answer | stop processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34400cbb0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 02 bb 51 d9 8c b0 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #299 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #299 | rejected packet: | 63 02 bb 51 d9 8c b0 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2f fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #299: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0859 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aaf800 | handling event EVENT_RETRANSMIT for parent state #286 | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #286 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #286 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49668.688666; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001229 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abd200 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #286 | libevent_malloc: new ptr-libevent@0x7fb364017f20 size 128 "road-eastnet-nonat-34" #286: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #286) | a2 ed ea 42 1b 91 7a d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a a6 7d cd 97 e4 f8 0e 4c a8 f7 b1 ec cb f9 8c | 2f 76 7e 20 17 e9 ac 96 37 6c d0 36 42 10 05 54 | c9 b8 65 a2 e7 d3 10 b3 60 78 69 80 3d 25 e3 d0 | 6b b3 ef 43 8d bb 4b f1 6d fd 75 58 b6 64 ea eb | 21 44 51 94 9d af c8 b5 2c d9 89 52 8e 49 92 15 | c8 f5 a7 13 6d cd 71 4c 89 a6 18 b9 37 a2 0d cb | 6e 90 fa f6 c2 05 39 4f e6 3c 7a ff 95 71 4f ea | 6f fa 7f ad 4f d5 8a a0 2f e3 1c 55 7c 9d 2b b7 | f8 c6 43 95 70 9b 3c 8c f8 2e 6e 7f b8 14 5a ab | e6 e2 cc bb a0 95 89 e6 41 f3 31 0c 80 44 7c cc | 26 be 63 d8 03 4f 0e f4 82 c2 32 aa ff f3 ec 67 | 80 f5 48 c4 4e dc 67 68 c5 87 ee 31 77 11 8a 89 | f7 38 08 ed 5a b3 8e c6 08 9c 28 3d e6 49 22 cc | f1 1d ea 6e 27 3f 41 69 56 c6 98 3e aa a5 4b a8 | 83 96 ce 94 b1 ac 7a 4b a0 42 08 47 1d ca 77 fa | 08 50 16 47 c6 8d 84 08 18 b0 a8 93 c0 9a 70 76 | 29 00 00 24 ff d1 37 2d 2c 72 ee aa 08 fb db a4 | 83 ef f7 bd 0a ef 47 b4 41 70 b6 07 5f 86 86 3a | e3 fa 60 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 c0 b7 bc 90 25 46 09 9f 5d 7d 2b | e5 1e 40 45 53 17 97 19 00 00 00 1c 00 00 40 05 | ec a0 d2 60 58 e7 4c 5a 13 5c f5 c2 c9 76 dd 61 | a7 bb 7e 37 | libevent_free: release ptr-libevent@0x7fb35c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aaf800 | #286 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #255 | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #255 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #255 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49668.6888; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004205 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aaf800 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #255 | libevent_malloc: new ptr-libevent@0x7fb35c04b7c0 size 128 "road-eastnet-nonat-3" #255: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #255) | b4 62 7d 49 a4 92 20 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 95 bd 0c ae 75 b5 e3 ef c4 cd 00 43 ea 3e 9a | 02 ba 07 e1 c1 bd 5d f0 a8 a6 51 3a 4a 21 e5 46 | 19 59 a0 93 a8 07 b1 7f 53 68 e9 d8 63 85 c8 12 | 71 98 74 63 ac c1 5d a5 39 9f c3 9e 95 82 52 3e | e1 41 18 21 d4 2e 9c 8d e0 71 8e d0 6d 4b 68 7e | 1c df fa cf ed ca 99 59 64 68 ed b3 9c 61 13 df | 2f ad b1 5a 3f dc 76 f5 58 69 91 b1 8b 83 c7 6f | 0b 08 55 fc ba 8b aa 73 16 1a 51 59 6d 0d 21 1f | bf 66 60 21 f1 49 bc 92 8c 9a be 6c 52 be 72 e6 | 19 b6 47 f8 33 cc b5 e6 ed 41 53 62 da 9d 6d 34 | fc ee 0f bf 23 f3 09 d7 96 22 fd c9 6e c0 31 60 | 95 22 90 57 96 ed 6a f6 05 50 b8 1b 34 71 5d dd | a7 c1 ab 82 e5 96 d7 d0 ac 36 1c 30 9d ee a7 97 | 6f 15 b5 89 4e c4 f6 f6 b5 08 23 bf cb 9e 75 f3 | f9 e0 ea 95 d8 eb 73 6d e3 2b 25 8d e5 17 c9 6e | f4 0f 23 e9 e4 7e dc 78 3c ae 82 7e 2a c2 1f 84 | 29 00 00 24 27 f0 79 05 ca 38 9d 60 17 70 37 05 | 8f c8 d2 c0 f8 4f 0f 05 b1 d0 9d 9d 43 88 90 d5 | 2d 20 4e 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 2d ab c5 84 ac e3 ea 3f b2 97 06 | b2 08 24 4c 91 11 e0 2a 00 00 00 1c 00 00 40 05 | ca ca c2 3f 11 62 54 7a 69 58 46 70 0a 1d a0 10 | 47 7f 3a 1d | libevent_free: release ptr-libevent@0x7fb3840060f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | #255 spent 0.0731 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 ed ea 42 1b 91 7a d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #286 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #286 | rejected packet: | a2 ed ea 42 1b 91 7a d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #286: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 62 7d 49 a4 92 20 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #255 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #255 | rejected packet: | b4 62 7d 49 a4 92 20 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #255: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #293 | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #293 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #293 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49668.715073; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501252 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #293 | libevent_malloc: new ptr-libevent@0x7fb3840060f0 size 128 "road-eastnet-nonat-41" #293: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #293) | 98 65 e9 19 f7 80 1b 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 92 fa cc 80 1f 04 ae 31 60 a8 15 7f 6c d4 bb | 0d a3 36 d4 3d 31 2d db c9 a3 65 0b 54 77 b5 90 | 4b f1 85 f9 5b a2 e8 2d 9a 77 1b fe a8 fb ea d0 | 88 2f 01 a5 98 e9 7e 65 f1 01 87 3d 6a 2d 8a 3a | 8e f8 d8 76 3b 1e 19 1d 17 90 3e 76 19 99 52 4a | 6e 00 1d 7b db 96 db 83 88 cd fd 1e bd 7e 5b 89 | ba a0 91 2a b9 ee b5 58 13 b3 5e 5e 59 9d 47 30 | d5 69 4e a7 bd 52 9f d4 e7 9b be ed b8 c7 8e ca | fd 72 11 5d 3c 4e 3f 34 3a cf 63 b2 e1 3a 0c 75 | e0 fd c6 41 05 da 4e 8b 04 c0 eb 84 52 ad 81 69 | 8c d8 b9 f0 3d 70 1f c8 01 a5 b7 5f ee d4 3d 97 | 3f 74 14 bf c1 32 07 23 90 8c c7 74 19 a4 db 67 | e2 81 e3 0a 06 5d bd 34 79 e7 4a 18 70 10 d6 b8 | 84 dc 4f 06 a8 1d f3 4b d5 6f 30 05 6d 56 83 1e | 64 17 96 93 11 0f e7 08 32 35 87 dc fb e0 8f 9f | e0 07 34 5d b8 fb 0d 4c d3 c2 58 00 d5 76 62 90 | 29 00 00 24 6f f2 b6 ca f4 8a a8 b3 ce 34 d7 c6 | a9 bf 42 71 b6 a3 89 33 ed 1d 91 ee 0e 11 98 8d | 12 5e c6 63 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 b6 16 43 43 a6 c6 14 e2 18 67 23 | 58 d4 b6 9a 2d df 39 90 00 00 00 1c 00 00 40 05 | 2a 56 75 a4 c4 51 60 eb 9a b6 a1 bf 9e f8 0f fa | 6b d1 0c 00 | libevent_free: release ptr-libevent@0x7fb3540300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #293 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 65 e9 19 f7 80 1b 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #293 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #293 | rejected packet: | 98 65 e9 19 f7 80 1b 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #293: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0472 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #274 | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #274 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #274 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49668.742361; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002156 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #274 | libevent_malloc: new ptr-libevent@0x7fb3540300e0 size 128 "road-eastnet-nonat-22" #274: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #274) | 97 f1 23 53 d2 3b 4d 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 bf aa 44 4c 86 42 20 d8 9e 9a 10 8c 03 23 1c | 55 12 c5 05 17 54 35 db 09 ea 86 4f 1e 8f 7b 32 | 9a 2a b0 4c f2 e7 18 73 a1 a0 fd e2 40 07 2c 7c | b0 86 fe c9 c0 0a 24 ee 0b e2 8f 65 27 f4 ce d4 | 26 d0 8a 70 5c 4d 46 36 4c d7 e9 bc 9b 95 2b 48 | 94 a5 c8 98 b4 23 f8 e0 8f 7c 6d 1d 50 c7 fe 04 | 1c ce 6b 59 2b ed cf 4a 5b 4f 67 9e cc 11 c0 53 | 7c 50 d5 3e bd 07 f0 e3 56 2a 0b ae b3 c0 99 43 | bb 92 8e 39 19 7e 1e c2 71 84 a0 76 9a 0f 7a 85 | 50 cf 0d 7d 85 0a 08 cc ee a1 bd c3 88 dd 8a de | e2 9f 70 d5 bb 76 44 f0 e2 0f 12 4d ae 88 a5 a4 | 51 38 bf fa 0f 38 f4 4c bb e3 25 bf 62 88 5c 87 | e1 a2 de e1 56 a5 9f 6b ce 90 dc 86 6d 26 32 32 | 64 ae 0b ac fa 3a f6 9e fa 00 00 26 02 a9 70 2e | af 79 3d a8 07 0b 81 d4 53 f3 46 fc 05 11 f6 55 | 0d 1d 8f a8 e0 93 58 07 b0 a8 c9 54 c5 14 a2 da | 29 00 00 24 59 ef 9f ca 6d 42 ee 4c de 0a 4a 8e | ec df b4 6b 0d dd 66 fa b2 ad 6d 66 92 77 f9 cb | 4b 49 7a f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8d 80 80 1b 6e 73 7e e3 fb 20 6a a8 | f2 02 f1 bf e6 58 62 ac 00 00 00 1c 00 00 40 05 | 31 9f 40 90 8f 0e 1c 6e 4b 7e bf d8 97 47 82 19 | e1 cf 25 c8 | libevent_free: release ptr-libevent@0x7fb36003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #274 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ae4840 | handling event EVENT_RETRANSMIT for parent state #48 | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #48 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #48 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49668.742568; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.019805 exceeds limit? YES "road-eastnet-nonat-48" #48: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-48" #48: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #300 at 0x557d46a14cd0 | State DB: adding IKEv2 state #300 in UNDEFINED | pstats #300 ikev2.ike started | Message ID: init #300: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #300: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #300; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-48" #300: initiating v2 parent SA to replace #48 | using existing local IKE proposals for connection road-eastnet-nonat-48 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 300 for state #300 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb348005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #300 | libevent_malloc: new ptr-libevent@0x7fb36003b0b0 size 128 | #300 spent 0.101 milliseconds in ikev2_parent_outI1() | RESET processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #48 ikev2.ike failed too-many-retransmits | pstats #48 ikev2.ike deleted too-many-retransmits | #48 spent 2.9 milliseconds in total | [RE]START processing: state #48 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-48" #48: deleting state (STATE_PARENT_I1) aged 64.021s and NOT sending notification | parent state #48: PARENT_I1(half-open IKE SA) => delete | crypto helper 3 resuming | State DB: IKEv2 state not found (flush_incomplete_children) | crypto helper 3 starting work-order 300 for state #300 | picked newest_isakmp_sa #0 for #48 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 300 "road-eastnet-nonat-48" #48: deleting IKE SA for connection 'road-eastnet-nonat-48' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-48' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-48 | State DB: deleting IKEv2 state #48 in PARENT_I1 | parent state #48: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 300 time elapsed 0.000563 seconds | stop processing: state #48 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3380407f0 | (#300) spent 0.562 milliseconds in crypto helper computing work-order 300: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae4840 | in statetime_stop() and could not find #48 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 f1 23 53 d2 3b 4d 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #274 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #274 | rejected packet: | crypto helper 3 sending results from work-order 300 for state #300 to event queue | 97 f1 23 53 d2 3b 4d 16 00 00 00 00 00 00 00 00 | scheduling resume sending helper answer for #300 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | libevent_malloc: new ptr-libevent@0x7fb33800f1a0 size 128 | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | crypto helper 3 waiting (nothing to do) | a0 19 00 00 00 00 00 00 c0 01 03 16 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #274: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0942 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-48 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-48" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-48' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-48" | stop processing: connection "road-eastnet-nonat-48" (in initiate_a_connection() at initiate.c:349) | spent 0.0693 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #300 | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 300 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #300 | **emit ISAKMP Message: | initiator cookie: | 5a 7e ff 7d 11 39 dd fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-48 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 10 d7 07 3e b9 b2 ed 0a cc c5 e4 47 ac fb df bc | ikev2 g^x 0b 82 8a 56 1b e7 c2 b9 79 67 f6 05 c1 b0 1a 41 | ikev2 g^x e0 93 9f 0d bb 5b 76 5f ac 5e ea 5e 58 49 c4 c3 | ikev2 g^x 9b f8 0e 2d 48 75 fe 88 ae 81 6e bd fc ad 1e 40 | ikev2 g^x 65 b9 12 2a 8f 3a b5 a4 e3 d6 7e 50 9a b3 12 10 | ikev2 g^x be 2b 79 8f 29 34 8f 0b 99 4e 4e 7a 4b 49 42 b4 | ikev2 g^x 04 b2 ac fc ac a3 5a 98 37 17 c3 a2 f0 f0 c9 79 | ikev2 g^x df 28 17 de 36 02 c0 b4 1b f3 2c 9d ad d8 f6 f4 | ikev2 g^x c9 44 36 2c 9a 21 d9 68 8c 86 58 41 ae 59 e7 74 | ikev2 g^x 88 a3 d3 f6 a3 ef 04 07 90 c9 82 f0 a7 49 d9 a4 | ikev2 g^x 83 0f b0 90 08 f3 eb 02 f4 ec 40 8a 98 92 d5 38 | ikev2 g^x 7d db 73 c5 6a 66 84 84 0b 3e ba 92 37 b8 31 bd | ikev2 g^x 61 f6 57 d8 cd fd ab d5 b0 51 b6 0b 3f 5e a3 a5 | ikev2 g^x 0b 5e 9e c6 f9 0e 39 09 62 b7 fe 88 e1 1e 94 68 | ikev2 g^x 7e ba 69 87 7e ff 7f 13 a8 f4 7a 0a b2 7e 1c 3c | ikev2 g^x 9c 70 0e 6e a8 6f 4b 28 4f f5 1d ce 10 46 27 eb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce db d2 83 de 45 20 a2 89 40 10 d1 ad 44 17 5c 15 | IKEv2 nonce 2b 8f 9e 84 0d 1b 42 0f a9 75 90 ef 32 25 81 59 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5a 7e ff 7d 11 39 dd fb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 30 | natd_hash: port= 01 f4 | natd_hash: hash= f0 9c e3 05 f1 a6 88 c9 89 5f 4a 78 8b 60 50 45 | natd_hash: hash= 77 4b 7a a3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f0 9c e3 05 f1 a6 88 c9 89 5f 4a 78 8b 60 50 45 | Notify data 77 4b 7a a3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5a 7e ff 7d 11 39 dd fb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2b d5 a3 e8 51 d4 0b 1b d6 4d 4a ff ba 69 1c 93 | natd_hash: hash= 2c 16 fd 8b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2b d5 a3 e8 51 d4 0b 1b d6 4d 4a ff ba 69 1c 93 | Notify data 2c 16 fd 8b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #300 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #300: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #300 to 4294967295 after switching state | Message ID: IKE #300 skipping update_recv as MD is fake | Message ID: sent #300 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-48" #300: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.48:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #300) | 5a 7e ff 7d 11 39 dd fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 d7 07 3e b9 b2 ed 0a cc c5 e4 47 ac fb df bc | 0b 82 8a 56 1b e7 c2 b9 79 67 f6 05 c1 b0 1a 41 | e0 93 9f 0d bb 5b 76 5f ac 5e ea 5e 58 49 c4 c3 | 9b f8 0e 2d 48 75 fe 88 ae 81 6e bd fc ad 1e 40 | 65 b9 12 2a 8f 3a b5 a4 e3 d6 7e 50 9a b3 12 10 | be 2b 79 8f 29 34 8f 0b 99 4e 4e 7a 4b 49 42 b4 | 04 b2 ac fc ac a3 5a 98 37 17 c3 a2 f0 f0 c9 79 | df 28 17 de 36 02 c0 b4 1b f3 2c 9d ad d8 f6 f4 | c9 44 36 2c 9a 21 d9 68 8c 86 58 41 ae 59 e7 74 | 88 a3 d3 f6 a3 ef 04 07 90 c9 82 f0 a7 49 d9 a4 | 83 0f b0 90 08 f3 eb 02 f4 ec 40 8a 98 92 d5 38 | 7d db 73 c5 6a 66 84 84 0b 3e ba 92 37 b8 31 bd | 61 f6 57 d8 cd fd ab d5 b0 51 b6 0b 3f 5e a3 a5 | 0b 5e 9e c6 f9 0e 39 09 62 b7 fe 88 e1 1e 94 68 | 7e ba 69 87 7e ff 7f 13 a8 f4 7a 0a b2 7e 1c 3c | 9c 70 0e 6e a8 6f 4b 28 4f f5 1d ce 10 46 27 eb | 29 00 00 24 db d2 83 de 45 20 a2 89 40 10 d1 ad | 44 17 5c 15 2b 8f 9e 84 0d 1b 42 0f a9 75 90 ef | 32 25 81 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 9c e3 05 f1 a6 88 c9 89 5f 4a 78 | 8b 60 50 45 77 4b 7a a3 00 00 00 1c 00 00 40 05 | 2b d5 a3 e8 51 d4 0b 1b d6 4d 4a ff ba 69 1c 93 | 2c 16 fd 8b | state #300 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36003b0b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb348005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #300 | libevent_malloc: new ptr-libevent@0x7fb36003b0b0 size 128 | #300 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49668.744094 | resume sending helper answer for #300 suppresed complete_v2_state_transition() and stole MD | #300 spent 0.559 milliseconds in resume sending helper answer | stop processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb33800f1a0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 7e ff 7d 11 39 dd fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #300 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #300 | rejected packet: | 5a 7e ff 7d 11 39 dd fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 30 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #300: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0672 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a855c0 | handling event EVENT_RETRANSMIT for parent state #287 | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #287 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #287 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49668.757996; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00227 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae4840 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #287 | libevent_malloc: new ptr-libevent@0x7fb33800f1a0 size 128 "road-eastnet-nonat-35" #287: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #287) | 50 65 03 a0 08 b6 fa f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e c0 75 39 cf 17 11 31 32 ce 73 1e 64 99 bc f2 | 7f 98 bb e8 80 c2 38 47 74 80 17 bf 6d 41 27 75 | 39 62 b9 71 ae 1a 47 19 83 cd 81 c0 c8 3d 11 61 | bb 8a a5 d6 29 bd 01 7d f4 ca 44 6d 69 e4 8a 69 | a7 cc 95 e2 b5 6b 25 ca 57 eb 58 2b 4d 53 44 df | 33 8c 6f 33 81 90 ab 83 53 f5 4e 38 ab 63 7b 68 | f5 e4 10 b1 02 5a b6 e7 d6 07 bf 37 24 09 70 4b | bc 69 6e bc 79 b8 a5 58 fa 3b e4 57 c6 64 3b 30 | 47 47 bf b7 ad 67 14 cd 0a eb 04 a2 61 54 d3 a6 | 12 98 21 de 78 b3 bb b5 ae 98 e3 4e 86 f6 80 ab | 82 7f f6 f8 ef c2 b3 23 41 0b ad f4 1d 15 a3 d0 | bf fe 7d f5 bb 15 19 74 8e f2 b9 4c 77 84 ef 53 | 7c be 1b be 09 20 be 00 d9 ce 47 ea 9d 1e 79 80 | e6 b0 92 f0 11 bf e8 8c fd 97 bb 02 bf 46 b7 fa | 29 38 a8 9a ba d7 d1 99 c1 56 93 83 a6 04 d2 fc | 1b 5a ee 22 cc c4 78 02 0c 67 9c 0f 51 14 b2 6f | 29 00 00 24 82 dd 74 7a ae e7 29 d0 0c 9c 0c 72 | 8c 59 8b ec 3e a7 b7 92 7c 72 73 9c 73 da ee 57 | 06 e2 80 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 92 a1 ec 2f 80 2a 27 61 6c 7b 0f | 4c 73 2b 71 f0 03 c4 ea 00 00 00 1c 00 00 40 05 | 71 9b 20 c5 40 26 cd 9d eb 7f a3 62 71 86 bd 52 | 4f c4 9f f6 | libevent_free: release ptr-libevent@0x7fb37000f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a855c0 | #287 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 65 03 a0 08 b6 fa f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #287 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #287 | rejected packet: | 50 65 03 a0 08 b6 fa f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #287: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0676 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47e90 | handling event EVENT_RETRANSMIT for parent state #294 | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #294 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #294 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49668.797358; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50061 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a855c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #294 | libevent_malloc: new ptr-libevent@0x7fb37000f1a0 size 128 "road-eastnet-nonat-42" #294: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #294) | 9b 31 1a f8 0f be 39 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 dd 24 24 7c 2f 7c cf af 6d 3e 60 a2 73 ad b0 | 5d e0 ad 29 4b 13 6c 37 66 5f 9c 4f e7 c9 e4 11 | 2c 5d 56 30 72 c8 d6 46 26 66 f5 93 56 d4 c3 52 | 85 cc e5 ae f9 42 b4 ed 60 85 06 0a 66 f5 50 1d | b5 97 c3 6d 71 b4 75 b7 83 18 b1 d3 7d 4a 68 8c | b9 4f df 9f 66 87 ec eb 33 88 de f2 6b c6 ea ab | d0 0d f9 06 34 9c 52 b4 c5 c4 6d 94 39 a8 58 51 | 41 ac 6d 52 08 28 9d f6 37 25 c7 7f 2d 48 ab 90 | f6 30 d2 8b 1b 90 e6 12 18 e0 e2 d4 dc 25 fe 81 | c8 41 3f 06 d9 c6 ce a5 91 8f 50 2b 48 2d e5 59 | 7a 24 e5 58 8b 81 4a bc cb 35 59 84 09 16 ee 2d | ba cf 81 ed 91 57 53 ab 0b 04 8a 27 0b c6 e0 ef | db ab 77 93 c2 db 73 a1 76 37 e1 bf 29 0a 3c 98 | 04 2f f5 e3 ff d0 c3 48 62 42 d2 a6 9f a7 c1 a7 | df e6 f0 e2 49 c7 bb 48 bb b6 1d f0 0e d1 19 d7 | 21 c7 76 5c 49 fc f0 be 36 da d1 aa ec 07 53 22 | 29 00 00 24 c9 1f 43 d3 3e f5 11 59 29 27 36 bb | 9f 07 da f1 c2 4b 17 7e d6 e4 43 b9 54 44 c2 2b | 3a e0 9b 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 60 07 d1 2a 2e 6f e5 7f 13 de a6 | da 25 32 50 d9 e2 97 75 00 00 00 1c 00 00 40 05 | de 91 5e 97 33 cf e4 58 2c 2c f0 43 aa ad 93 60 | ec ee 8a 50 | libevent_free: release ptr-libevent@0x7fb34c046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47e90 | #294 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #49 | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #49 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #49 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49668.797496; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.012314 exceeds limit? YES "road-eastnet-nonat-49" #49: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-49" #49: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #301 at 0x557d46a16290 | State DB: adding IKEv2 state #301 in UNDEFINED | pstats #301 ikev2.ike started | Message ID: init #301: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #301: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #301; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-49" #301: initiating v2 parent SA to replace #49 | using existing local IKE proposals for connection road-eastnet-nonat-49 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 301 for state #301 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47e90 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #301 | libevent_malloc: new ptr-libevent@0x7fb34c046040 size 128 | #301 spent 0.0667 milliseconds in ikev2_parent_outI1() | RESET processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 resuming | crypto helper 1 starting work-order 301 for state #301 | start processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #49 ikev2.ike failed too-many-retransmits | pstats #49 ikev2.ike deleted too-many-retransmits | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 301 | #49 spent 2.43 milliseconds in total | [RE]START processing: state #49 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-49" #49: deleting state (STATE_PARENT_I1) aged 64.013s and NOT sending notification | parent state #49: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #49 "road-eastnet-nonat-49" #49: deleting IKE SA for connection 'road-eastnet-nonat-49' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-49' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-49 | State DB: deleting IKEv2 state #49 in PARENT_I1 | parent state #49: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #49 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 301 time elapsed 0.000641 seconds | libevent_free: release ptr-libevent@0x7fb38800a240 | (#301) spent 0.641 milliseconds in crypto helper computing work-order 301: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 301 for state #301 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | in statetime_stop() and could not find #49 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #301 | libevent_malloc: new ptr-libevent@0x7fb388011f30 size 128 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9b 31 1a f8 0f be 39 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | crypto helper 1 waiting (nothing to do) | State DB: found IKEv2 state #294 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #294 | rejected packet: | 9b 31 1a f8 0f be 39 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2a 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #294: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-49 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-49" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-49' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-49" | stop processing: connection "road-eastnet-nonat-49" (in initiate_a_connection() at initiate.c:349) | spent 0.0565 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #301 | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 301 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #301 | **emit ISAKMP Message: | initiator cookie: | 04 2d 84 e7 d7 11 c2 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-49 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e5 3c a0 2e 05 57 66 74 9e 59 04 02 1e 6b 82 64 | ikev2 g^x 24 cf 86 32 1b 49 63 31 85 6e 91 96 dd e7 a7 21 | ikev2 g^x 78 ee 5c 0c 83 da 97 1a 0c 46 69 7c d4 8f 0d 6c | ikev2 g^x 0b 43 52 49 09 9a 24 da 36 13 01 09 31 88 8b 5b | ikev2 g^x 38 73 77 00 83 94 ba bf 7c fa 22 16 ff 64 be 16 | ikev2 g^x 43 df 4f 1d b8 18 88 ee 83 b1 c9 32 ce 1f e3 0d | ikev2 g^x 40 e4 05 2a 7d 12 64 bf de 51 1d 4c d5 99 11 64 | ikev2 g^x 9a df 9d ae e7 e1 f9 df 89 9a 5f 11 f6 4b 39 47 | ikev2 g^x 36 de 08 ec a1 59 7b 84 9f e8 cd af ca a0 8a 29 | ikev2 g^x aa 2e 7e 1a 1d 88 43 74 5c 19 1a 8f 44 5f 83 95 | ikev2 g^x cc 00 d8 ee 8f cb 95 29 ae 58 5c 08 01 62 ea 7e | ikev2 g^x 97 e9 bf 6a 36 31 ba 2d 83 4b 4a ef ce 50 36 44 | ikev2 g^x 4f a8 a5 8e ad 2c 99 bd c1 01 08 ba ee 5e 1c 63 | ikev2 g^x 9e 50 96 b6 7a 6e 9f de cf c5 73 a0 7c d6 3d 3a | ikev2 g^x fe 11 5d 0f 1c cb 4b 02 b4 b1 f7 0c 56 bd a2 fe | ikev2 g^x d4 f1 da 5a fb cc f5 22 d5 c9 55 2b 49 27 7a 02 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9d f4 32 14 da 15 0d 5d b3 86 88 1b ed 98 fc e3 | IKEv2 nonce a3 7a 35 ba 87 aa 0c 85 93 07 0b 69 9d 37 a2 9c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 04 2d 84 e7 d7 11 c2 a9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 31 | natd_hash: port= 01 f4 | natd_hash: hash= 4d 4c 33 35 25 dc 8b ec 4f 4f 50 86 6f 49 f3 b3 | natd_hash: hash= 44 40 22 71 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4d 4c 33 35 25 dc 8b ec 4f 4f 50 86 6f 49 f3 b3 | Notify data 44 40 22 71 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 04 2d 84 e7 d7 11 c2 a9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d2 03 8c 03 1f b3 ee 14 98 31 7f d2 44 da 50 e8 | natd_hash: hash= 1a 08 5c 44 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d2 03 8c 03 1f b3 ee 14 98 31 7f d2 44 da 50 e8 | Notify data 1a 08 5c 44 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #301 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #301: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #301 to 4294967295 after switching state | Message ID: IKE #301 skipping update_recv as MD is fake | Message ID: sent #301 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-49" #301: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.49:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #301) | 04 2d 84 e7 d7 11 c2 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 3c a0 2e 05 57 66 74 9e 59 04 02 1e 6b 82 64 | 24 cf 86 32 1b 49 63 31 85 6e 91 96 dd e7 a7 21 | 78 ee 5c 0c 83 da 97 1a 0c 46 69 7c d4 8f 0d 6c | 0b 43 52 49 09 9a 24 da 36 13 01 09 31 88 8b 5b | 38 73 77 00 83 94 ba bf 7c fa 22 16 ff 64 be 16 | 43 df 4f 1d b8 18 88 ee 83 b1 c9 32 ce 1f e3 0d | 40 e4 05 2a 7d 12 64 bf de 51 1d 4c d5 99 11 64 | 9a df 9d ae e7 e1 f9 df 89 9a 5f 11 f6 4b 39 47 | 36 de 08 ec a1 59 7b 84 9f e8 cd af ca a0 8a 29 | aa 2e 7e 1a 1d 88 43 74 5c 19 1a 8f 44 5f 83 95 | cc 00 d8 ee 8f cb 95 29 ae 58 5c 08 01 62 ea 7e | 97 e9 bf 6a 36 31 ba 2d 83 4b 4a ef ce 50 36 44 | 4f a8 a5 8e ad 2c 99 bd c1 01 08 ba ee 5e 1c 63 | 9e 50 96 b6 7a 6e 9f de cf c5 73 a0 7c d6 3d 3a | fe 11 5d 0f 1c cb 4b 02 b4 b1 f7 0c 56 bd a2 fe | d4 f1 da 5a fb cc f5 22 d5 c9 55 2b 49 27 7a 02 | 29 00 00 24 9d f4 32 14 da 15 0d 5d b3 86 88 1b | ed 98 fc e3 a3 7a 35 ba 87 aa 0c 85 93 07 0b 69 | 9d 37 a2 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 4c 33 35 25 dc 8b ec 4f 4f 50 86 | 6f 49 f3 b3 44 40 22 71 00 00 00 1c 00 00 40 05 | d2 03 8c 03 1f b3 ee 14 98 31 7f d2 44 da 50 e8 | 1a 08 5c 44 | state #301 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c046040 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47e90 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47e90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #301 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 | #301 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49668.798703 | resume sending helper answer for #301 suppresed complete_v2_state_transition() and stole MD | #301 spent 0.308 milliseconds in resume sending helper answer | stop processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388011f30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 2d 84 e7 d7 11 c2 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #301 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #301 | rejected packet: | 04 2d 84 e7 d7 11 c2 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 31 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #301: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0411 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11640 | handling event EVENT_RETRANSMIT for parent state #288 | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #288 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #288 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49668.820894; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002253 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #288 | libevent_malloc: new ptr-libevent@0x7fb388011f30 size 128 "road-eastnet-nonat-36" #288: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #288) | bf 5c b8 9a ac cd 00 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e dd 69 c1 03 95 4d 9d ab 37 9e bd 4e 38 ec e5 | f2 39 ed 30 ab 4f b4 af 21 e6 29 da a0 8f 8f e9 | 98 9a 5c 5c fe fe ce 8c 1e 28 6b bd f2 27 35 da | c4 21 0a d8 6a ca c2 98 92 8e 38 38 a2 a7 6b ba | 5f d2 6c ce e3 9f f3 13 3d ec 78 7e f5 b7 1e b1 | c9 c9 b0 04 f7 e8 40 14 e7 76 0c 5b a9 d0 33 de | 38 f0 55 f2 f8 c3 51 4e 26 12 33 85 1a 59 5d 06 | e7 63 42 d3 d5 d3 89 6c 22 47 f2 98 c6 f4 da 55 | 13 a9 2a 55 81 33 8b eb 87 ee 13 8e 33 aa a8 42 | 9f da b4 47 d8 37 6a 92 68 90 c1 81 a0 df a1 37 | a4 78 f7 b3 8d d2 2d ce a0 c9 68 dd 56 89 c4 d1 | 63 8d aa 71 1f 08 79 a0 6d 66 a0 3e 16 15 54 65 | d5 46 20 67 d9 5b 61 9c 6a 83 fc f8 ba b1 78 4c | 57 19 a7 94 fa 72 b9 cd d4 1a e2 8c ec 18 65 32 | 0a 6f a6 9d 17 41 ad c3 33 be e4 df 39 be bb 83 | 36 2c fd e8 5d 07 b2 3e e4 4e 6e 8c 65 67 24 e6 | 29 00 00 24 6b 44 05 03 68 15 67 d5 e0 ba b2 f4 | 3c 29 af e5 83 d8 9f ee 30 22 ac b5 c3 ee cd df | dc 79 2d 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 39 d5 43 71 fe 6f b5 ee bc 1b f9 | 48 2a ac fe 4d 86 a5 da 00 00 00 1c 00 00 40 05 | f7 70 11 42 70 0c d7 f2 22 65 12 cb b8 c3 7c 30 | 56 c5 c0 c0 | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11640 | #288 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 5c b8 9a ac cd 00 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #288 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #288 | rejected packet: | bf 5c b8 9a ac cd 00 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #288: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c7c0 | handling event EVENT_RETRANSMIT for parent state #256 | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #256 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #256 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49668.826173; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004971 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11640 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #256 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 "road-eastnet-nonat-4" #256: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #256) | af ff 14 5c e8 87 a5 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 1f 56 51 1c ec cd e5 db 48 26 c8 dc 41 fd 54 | a8 2a f3 18 64 e6 88 a2 77 94 ce b8 37 5b 43 37 | 15 71 aa 40 2b 14 32 13 87 73 76 ea dc 9c c2 0d | 5f 66 9f c3 96 de 76 09 50 94 85 73 09 16 fd 60 | e5 22 cf 96 3d 7f 8a d5 69 b3 f6 e0 d1 b6 2a b1 | 46 24 36 96 12 35 a6 66 31 6c fc 27 fd 14 5f 55 | dc 4d 24 0c d2 4a 10 86 34 a8 27 78 27 27 b0 f6 | f0 8d 2e 1b c6 a5 de fc 9e fb ab ed 9f 6c dc 3c | 42 c9 5c a1 4a e3 4a 45 da e8 44 a1 f6 8a 36 fd | f6 c8 42 59 48 f3 30 69 ad 20 74 c3 02 1b f3 f8 | 3b 14 80 5c e4 55 cc fa 49 75 80 37 c4 a0 eb 78 | 5a ba 01 b2 91 5d ef fc 1f 18 54 22 3c e6 ac 42 | 22 26 d6 93 0e 7d c7 67 e5 47 f0 ab 43 0b cd e4 | d0 9c fd 7d 64 aa cd 20 be f3 31 9f f9 fd e9 74 | f6 4d 79 65 aa 69 d2 c1 c0 27 e2 43 4d 23 a2 bd | 81 a0 4b 66 29 06 06 b0 e0 6b c0 d6 29 53 e1 5f | 29 00 00 24 68 30 70 dd 8d a8 3f ec 7e 36 6c 6a | a3 ce 4b 67 03 0b 93 d7 9a 32 93 85 56 0b 5c 0e | c5 0b 8c 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 28 6b 61 6f db 11 ce 62 1a 99 08 | cd 34 ea 3b 0e 7b 2c f1 00 00 00 1c 00 00 40 05 | f7 c5 67 63 b0 24 3f 1b e9 07 39 23 b4 29 1b da | 4e b1 36 66 | libevent_free: release ptr-libevent@0x7fb36c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | #256 spent 0.0916 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af ff 14 5c e8 87 a5 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #256 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #256 | rejected packet: | af ff 14 5c e8 87 a5 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #256: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab39c0 | handling event EVENT_RETRANSMIT for parent state #275 | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #275 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #275 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49668.832435; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00192 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #275 | libevent_malloc: new ptr-libevent@0x7fb36c04b850 size 128 "road-eastnet-nonat-23" #275: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #275) | 8e 8a 90 cd 9e 92 16 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 db ff f3 45 8d 77 6b ab 4c f5 59 93 99 02 27 | 95 ea ea f3 ac f8 d0 0c f4 e4 a7 81 ed dc a2 2e | 80 d4 21 01 5a 1a 55 9b d3 86 c5 c8 54 08 80 87 | 53 03 95 88 ee 42 5d b8 52 8e fe 84 14 38 79 44 | c3 51 49 fc 97 0d 59 e0 5f 4b c0 5e f8 ec 96 9d | 9d 66 a2 14 38 ec b6 d3 b6 6a cc ee b5 48 0a 5e | 6f de 87 79 9d 43 73 e3 c3 11 60 66 e8 ee 7a 7d | c3 f9 f0 de 79 dc 04 3a 85 85 52 d2 92 21 fc 86 | 8d fd 20 94 86 24 05 6c 2b cb ee c9 04 8f 0f 93 | 01 a5 e2 2b 0c 12 b9 e6 3a 6c ef c0 32 59 e5 d2 | 3b 11 a2 9f 2d 5e e0 2d 8c 75 47 73 37 0b fd dc | 38 6f 1e 5d 62 ac ab 3b f8 90 5d 68 0c 10 a4 e3 | 5d d1 15 9f 1f d5 11 83 81 be 1d a7 8f 91 34 60 | 10 68 8c b7 8b 5a e8 bb 55 32 b6 ac 66 fb 13 bc | 8d 01 0f 0f f6 d9 7e e8 52 a6 18 9d f5 fb ae f8 | d6 4a f4 34 c9 7a eb 6e cd 1f ad 11 86 f4 37 e0 | 29 00 00 24 82 2a d3 ed 88 6f 6d 2b 95 fc ef 17 | cd da 04 83 d9 0b fe c7 f7 7a 31 0a 69 4f 17 0b | 3b dd fa 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 12 f4 6b 5c 7a 37 1f d4 51 59 a4 | 33 90 ab 79 b6 80 74 7b 00 00 00 1c 00 00 40 05 | 6b 59 3d 2d 41 62 79 69 4f 0b fb 7b cf 22 15 97 | 6d 57 a6 24 | libevent_free: release ptr-libevent@0x7fb36804b8e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab39c0 | #275 spent 0.0837 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 8a 90 cd 9e 92 16 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #275 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #275 | rejected packet: | 8e 8a 90 cd 9e 92 16 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #275: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12c40 | handling event EVENT_RETRANSMIT for parent state #50 | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #50 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #50 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49668.863683; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.011784 exceeds limit? YES "road-eastnet-nonat-50" #50: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-50" #50: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #302 at 0x557d46a17850 | State DB: adding IKEv2 state #302 in UNDEFINED | pstats #302 ikev2.ike started | Message ID: init #302: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #302: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #302; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-50" #302: initiating v2 parent SA to replace #50 | using existing local IKE proposals for connection road-eastnet-nonat-50 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 302 for state #302 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab39c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #302 | libevent_malloc: new ptr-libevent@0x7fb36804b8e0 size 128 | #302 spent 0.0899 milliseconds in ikev2_parent_outI1() | RESET processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 2 resuming | crypto helper 2 starting work-order 302 for state #302 | pstats #50 ikev2.ike failed too-many-retransmits | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 302 | pstats #50 ikev2.ike deleted too-many-retransmits | #50 spent 2.6 milliseconds in total | [RE]START processing: state #50 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-50" #50: deleting state (STATE_PARENT_I1) aged 64.013s and NOT sending notification | parent state #50: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #50 "road-eastnet-nonat-50" #50: deleting IKE SA for connection 'road-eastnet-nonat-50' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-50' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-50 | State DB: deleting IKEv2 state #50 in PARENT_I1 | parent state #50: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 302 time elapsed 0.000929 seconds | (#302) spent 0.935 milliseconds in crypto helper computing work-order 302: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 302 for state #302 to event queue | scheduling resume sending helper answer for #302 | stop processing: state #50 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_malloc: new ptr-libevent@0x7fb380011f30 size 128 | libevent_free: release ptr-libevent@0x7fb384048950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c40 | in statetime_stop() and could not find #50 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 2 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-50 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-50" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-50' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-50" | stop processing: connection "road-eastnet-nonat-50" (in initiate_a_connection() at initiate.c:349) | spent 0.0729 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #302 | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 302 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #302 | **emit ISAKMP Message: | initiator cookie: | 9a b7 d9 69 b7 b5 8b 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-50 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 30 3b 38 5a ca c1 e0 66 18 62 3b 15 6c b6 3b d4 | ikev2 g^x d7 ad 95 64 47 60 48 b5 a1 40 89 ca 34 68 f4 5c | ikev2 g^x b5 12 b3 25 90 eb 49 eb b5 40 df ef 79 a7 f8 11 | ikev2 g^x fd 6b 8c b7 57 dd 67 6c a2 67 a7 4f be 73 1c 93 | ikev2 g^x d0 14 73 9b 52 53 0b 4e 5f f6 38 f3 b8 8b db d1 | ikev2 g^x 1c 9f 4f 10 7c 2c fa b8 0b 5c b4 6b 80 d0 b7 e3 | ikev2 g^x b6 70 3b 9c d9 ad f0 38 ba 59 1a 5a 32 60 56 90 | ikev2 g^x 00 97 ec 2a 32 4c ce 8c d0 a5 94 f1 33 fd e4 3c | ikev2 g^x bb e9 7f cc 0d 4c 4c be 2b f0 80 18 d5 0b e3 68 | ikev2 g^x da 32 8d 6f 53 ff 6f c4 bc c7 44 a5 1e 56 ed 9a | ikev2 g^x 22 1a 47 85 cc bb d8 71 12 33 c9 06 fb bd 86 04 | ikev2 g^x 8a 5e c6 10 00 05 dc db 1a ce ef c2 9a df 5b 3e | ikev2 g^x f1 94 44 f2 93 b5 45 ee f4 39 f1 54 d0 08 74 2f | ikev2 g^x 98 02 e6 14 93 d3 55 70 9b c1 5c 0a 6d f7 72 e9 | ikev2 g^x 7a 20 75 0d 8a 45 81 c5 cd 4a 79 7e 2a a7 cf ed | ikev2 g^x b9 84 dc 2f 1f b1 1b 47 62 4c ef 36 89 f7 2e e1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4e 70 94 e8 7e 52 b9 fd e3 7f cf aa b8 11 eb 44 | IKEv2 nonce 2a e9 8b 91 cb 46 0f b2 fd 17 ad 44 7e 6a 9e 6e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9a b7 d9 69 b7 b5 8b 3c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 32 | natd_hash: port= 01 f4 | natd_hash: hash= 54 86 00 1a 73 2d f1 8e 31 28 7e 7f 4e 1d 05 b3 | natd_hash: hash= 46 7f 2d d6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 54 86 00 1a 73 2d f1 8e 31 28 7e 7f 4e 1d 05 b3 | Notify data 46 7f 2d d6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9a b7 d9 69 b7 b5 8b 3c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e4 ea 9a e9 78 75 4e 5e 40 77 76 74 52 35 fb 06 | natd_hash: hash= 70 d7 5d cd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e4 ea 9a e9 78 75 4e 5e 40 77 76 74 52 35 fb 06 | Notify data 70 d7 5d cd | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #302 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #302: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #302 to 4294967295 after switching state | Message ID: IKE #302 skipping update_recv as MD is fake | Message ID: sent #302 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-50" #302: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.50:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #302) | 9a b7 d9 69 b7 b5 8b 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 3b 38 5a ca c1 e0 66 18 62 3b 15 6c b6 3b d4 | d7 ad 95 64 47 60 48 b5 a1 40 89 ca 34 68 f4 5c | b5 12 b3 25 90 eb 49 eb b5 40 df ef 79 a7 f8 11 | fd 6b 8c b7 57 dd 67 6c a2 67 a7 4f be 73 1c 93 | d0 14 73 9b 52 53 0b 4e 5f f6 38 f3 b8 8b db d1 | 1c 9f 4f 10 7c 2c fa b8 0b 5c b4 6b 80 d0 b7 e3 | b6 70 3b 9c d9 ad f0 38 ba 59 1a 5a 32 60 56 90 | 00 97 ec 2a 32 4c ce 8c d0 a5 94 f1 33 fd e4 3c | bb e9 7f cc 0d 4c 4c be 2b f0 80 18 d5 0b e3 68 | da 32 8d 6f 53 ff 6f c4 bc c7 44 a5 1e 56 ed 9a | 22 1a 47 85 cc bb d8 71 12 33 c9 06 fb bd 86 04 | 8a 5e c6 10 00 05 dc db 1a ce ef c2 9a df 5b 3e | f1 94 44 f2 93 b5 45 ee f4 39 f1 54 d0 08 74 2f | 98 02 e6 14 93 d3 55 70 9b c1 5c 0a 6d f7 72 e9 | 7a 20 75 0d 8a 45 81 c5 cd 4a 79 7e 2a a7 cf ed | b9 84 dc 2f 1f b1 1b 47 62 4c ef 36 89 f7 2e e1 | 29 00 00 24 4e 70 94 e8 7e 52 b9 fd e3 7f cf aa | b8 11 eb 44 2a e9 8b 91 cb 46 0f b2 fd 17 ad 44 | 7e 6a 9e 6e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 54 86 00 1a 73 2d f1 8e 31 28 7e 7f | 4e 1d 05 b3 46 7f 2d d6 00 00 00 1c 00 00 40 05 | e4 ea 9a e9 78 75 4e 5e 40 77 76 74 52 35 fb 06 | 70 d7 5d cd | state #302 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36804b8e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab39c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab39c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #302 | libevent_malloc: new ptr-libevent@0x7fb384048950 size 128 | #302 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49668.86538 | resume sending helper answer for #302 suppresed complete_v2_state_transition() and stole MD | #302 spent 0.455 milliseconds in resume sending helper answer | stop processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb380011f30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a b7 d9 69 b7 b5 8b 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #302 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #302 | rejected packet: | 9a b7 d9 69 b7 b5 8b 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 32 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #302: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11680 | handling event EVENT_RETRANSMIT for parent state #295 | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #295 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #295 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49668.878547; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500322 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #295 | libevent_malloc: new ptr-libevent@0x7fb380011f30 size 128 "road-eastnet-nonat-43" #295: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #295) | 11 ea 13 a7 2a b1 5c 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 c0 f3 39 06 15 d7 07 8e 11 b6 9a 6e 2d b3 34 | 66 03 a5 c2 e2 1f 37 32 46 97 6f cd af d0 2f 18 | 5f 75 66 e4 a1 42 12 53 5e 16 d8 3a 31 65 02 6a | c5 e3 cc f7 d2 22 a4 aa ae 02 3c 06 f6 0c fe fa | e4 54 02 04 c7 56 0a b1 39 1c 79 77 c9 da 62 93 | 00 7e f1 cc 8f 9d de 33 24 4e 12 09 b8 73 ad 99 | 9d bd 21 4e 12 37 5e 79 f1 fe 24 ac 36 8f 56 b3 | d6 c7 5b 74 f8 84 56 d2 c9 9a 89 80 ba ca fa 63 | 61 ef b2 49 26 8d 16 1c 9e 9b a5 d0 8c b1 11 4d | 74 c3 30 50 82 5e f2 2c 5e 21 4f 59 50 07 97 4a | 3b 99 d0 83 20 16 83 be 15 cb 08 01 be 88 1e c0 | 56 de 78 28 a9 82 d7 99 3a 47 be b7 57 13 4d ef | 18 8f 0d 23 65 69 63 f7 5c af 9a 31 54 69 e3 c6 | e4 81 15 9e a2 7e 90 55 50 a1 5a e2 6d 42 36 72 | e6 93 98 8d ab 65 9b 8b b9 2a 79 2b 2d c9 0f 1f | c1 03 48 63 1c 2b 7c f0 db 5a 0a 3e b5 46 b8 79 | 29 00 00 24 64 9e 8b 02 14 e8 a7 dc 3f 42 d2 c4 | 8f dc b3 ff fc 4c fe 98 93 e9 8f 76 eb 2b 38 f4 | b9 5a a0 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c a5 c7 ec 4b 7a cd c4 3e f0 86 6d | ec 0c 21 f9 74 06 3e 81 00 00 00 1c 00 00 40 05 | 6b d7 31 2e aa f4 5b 2c dc 79 88 ab 6c 34 fc ce | 20 91 9b 02 | libevent_free: release ptr-libevent@0x7fb338048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11680 | #295 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 ea 13 a7 2a b1 5c 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #295 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #295 | rejected packet: | 11 ea 13 a7 2a b1 5c 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #295: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0458 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25c40 | handling event EVENT_RETRANSMIT for parent state #289 | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #289 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #289 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49668.894844; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002279 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11680 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #289 | libevent_malloc: new ptr-libevent@0x7fb338048a10 size 128 "road-eastnet-nonat-37" #289: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #289) | 2e 50 46 ff ee 4c e9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 67 60 81 00 e9 c5 12 22 cc 49 d1 8d 87 9d ec | ba e1 ae d7 0f ff 89 2c 01 49 2f 18 a4 d8 5a ff | 94 bb 3c 2d 6c 23 65 3c 9a 45 52 91 05 ff 55 0b | 22 ea fe ea 0a 4e f6 5b 7a 62 13 72 d3 65 de 8a | 6c f3 72 1b af fd 0c 36 3a 05 de a4 6d 9b 92 ce | d9 79 2b 75 ee 9a e2 a1 2c b2 02 b2 85 a2 98 a2 | 3c 63 cc 1f 7e c9 81 88 5b 95 14 a9 db c3 cc 4c | 7d 2a a7 8c 64 c7 93 92 12 cf 28 08 e5 ab 19 fa | 3f 53 9a 5b d7 86 99 40 82 c2 0d 84 83 94 43 d6 | cb b8 b3 06 64 05 bf d9 9d 5b fb 6a 5b 6a d2 16 | 6f b8 75 0b 98 2a 33 7f 2c 96 47 b3 69 76 55 52 | ca 3f b2 34 c4 b8 60 62 c8 0f 07 9c 2a 3e 70 02 | 1f 60 03 3e 97 1e ea 39 09 c8 ac 49 fb 70 ef af | f9 7e 7f f0 e4 2d 18 4d f8 20 f5 71 8f b4 fc be | 11 8b 08 ae 82 4a 27 f4 11 f5 e0 5f 14 7e a2 b5 | 66 07 59 01 f7 8e 64 17 db 17 82 9f be dd 61 54 | 29 00 00 24 70 cb ce 4e e8 fa 33 67 08 21 14 9b | 70 83 d5 d1 77 4f cc 4e 50 51 8a 00 6c d4 e4 19 | 33 47 80 f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 95 9d ea dc 9b 1a b8 2d d8 fe 0a | bb 49 1d 2c c9 ad 47 73 00 00 00 1c 00 00 40 05 | 70 48 4d 18 17 11 80 57 99 3c 90 8c f0 f2 b1 e5 | 98 18 b0 dd | libevent_free: release ptr-libevent@0x7fb35400f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c40 | #289 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2e 50 46 ff ee 4c e9 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #289 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #289 | rejected packet: | 2e 50 46 ff ee 4c e9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #289: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_RETRANSMIT for parent state #296 | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #296 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #296 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49668.942151; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500658 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #296 | libevent_malloc: new ptr-libevent@0x7fb35400f1a0 size 128 "road-eastnet-nonat-44" #296: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #296) | 1c da 2e ac 4a 99 24 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 2a 4d fb 46 1d b7 c4 96 00 b1 66 99 7e ce 3b | 3f 48 6e 8c 76 bd 25 cd 72 f7 15 4a f9 69 ef 13 | 61 8a 19 db 25 90 81 55 08 5a cc 41 41 e5 ab d4 | 92 10 f9 d6 8d 49 ef 3f b0 9e f2 80 9b 7b 70 6e | a9 61 7d e0 84 75 fd d1 46 6c 42 61 66 ee 24 20 | 73 fa d1 4c 21 9e a9 c7 16 a9 b3 6f aa 78 ac 00 | 78 f4 c3 83 9c c4 9a 92 64 af b4 ed 81 ba ac a2 | f1 41 08 3e c1 2f b1 ba 03 49 e2 bf 7f db 95 66 | 30 1e c5 ba 28 dd ee 71 21 42 41 ca af c4 be d2 | 90 1d aa 94 fa 3e 05 ce 17 28 d8 85 00 b7 a3 6c | d2 a6 c4 12 ee 02 b6 a5 47 f5 e8 05 85 3f 07 9b | aa 0d 4f 57 c3 15 b2 47 ad f5 11 0a f7 29 da c6 | 9c 86 0c 08 6b ec 00 4d b0 6e 72 d1 b7 c3 86 c8 | 85 d9 c3 07 c3 a7 58 91 99 ee d7 82 f7 95 cb 56 | c0 48 0c 04 c6 c9 83 ce b6 aa 4e 64 f0 9f 73 46 | e9 f5 bb 10 78 a8 77 4a 7b da 32 8f 23 90 cf 6d | 29 00 00 24 ce d0 75 80 6d 1e 36 8f b6 81 e0 37 | 25 cc b5 c9 b7 8f 97 4d 1e ae eb 17 23 86 66 d2 | cc 2a b8 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 83 86 3f b2 b5 92 3c 02 7f 1a c2 | 45 4d 9a 24 f1 5a 66 8d 00 00 00 1c 00 00 40 05 | 7c cb b6 c5 ee bc 2b a0 53 bb 77 45 86 3e ca 93 | 1e 2d 97 d8 | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | #296 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ac1340 | handling event EVENT_RETRANSMIT for parent state #276 | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #276 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #276 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49668.942284; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001801 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #276 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-24" #276: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #276) | 97 d8 09 67 95 19 ff f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e fe 65 45 24 16 54 b2 a7 14 49 9e 41 08 a6 ad | 8d 38 c1 ab 41 bc c5 70 74 ea 87 6b 47 67 61 c9 | 08 e4 05 10 d8 b1 89 eb 95 ae 5c c6 f1 8d 64 f6 | e2 34 f7 1e 96 bb c8 e4 08 d5 11 49 c7 13 d5 5b | 05 9d 02 33 71 55 11 11 24 9a 7a f7 2f f8 55 e9 | 49 16 da 32 11 31 25 c0 d3 d2 83 15 e8 61 24 52 | f4 f3 a7 f2 34 62 0e d9 54 b7 ea 87 42 a8 29 03 | 05 f5 e1 d2 8f 40 88 3f e8 e4 52 27 80 25 db f2 | 79 7c f2 ce e3 4d 99 fa 0f 82 50 fa bd f3 31 31 | 75 5b 04 3c f4 62 cf 98 a6 3b 30 69 aa fe de 35 | fe 70 61 92 ab 0c 67 96 0d 80 c2 5b c7 8c 3b 7a | 1d cc 0e d5 c6 71 9d 10 b0 4a ac f9 9f b7 d7 6d | 29 1a 45 c3 c8 c4 88 f8 4d dd 53 1c d2 5c 13 5d | 0b 9c e9 d4 6a e6 6d db d7 74 a8 c2 b2 2b 2e 99 | c1 be 2c 7e b9 9a 61 61 42 22 a8 96 77 9d c3 f9 | 9b eb 60 04 cc 7a e8 a6 1b 7a bb 42 2e 5c de 12 | 29 00 00 24 89 93 ef 63 4b 32 f6 be 90 74 d4 cc | df 00 dd 1b b5 27 60 b1 da 93 3c e5 82 5c 18 d4 | 92 56 47 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 b3 01 11 26 92 0f 1e 78 d6 0c e4 | b7 13 47 be 6e 37 68 a6 00 00 00 1c 00 00 40 05 | 24 f3 9b 24 06 cb fe aa 4a 7c a0 cb 8e 4b 56 de | 28 62 03 f5 | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac1340 | #276 spent 0.069 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c da 2e ac 4a 99 24 d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #296 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #296 | rejected packet: | 1c da 2e ac 4a 99 24 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #296: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 d8 09 67 95 19 ff f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #276 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #276 | rejected packet: | 97 d8 09 67 95 19 ff f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #276: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0366 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aba600 | handling event EVENT_RETRANSMIT for parent state #51 | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #51 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #51 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49668.943582; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.014975 exceeds limit? YES "road-eastnet-nonat-51" #51: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-51" #51: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #303 at 0x557d46a18e10 | State DB: adding IKEv2 state #303 in UNDEFINED | pstats #303 ikev2.ike started | Message ID: init #303: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #303: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #303; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-51" #303: initiating v2 parent SA to replace #51 | using existing local IKE proposals for connection road-eastnet-nonat-51 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 303 for state #303 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ac1340 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #303 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 | #303 spent 0.0943 milliseconds in ikev2_parent_outI1() | RESET processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #51 ikev2.ike failed too-many-retransmits | pstats #51 ikev2.ike deleted too-many-retransmits | #51 spent 2.53 milliseconds in total | [RE]START processing: state #51 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-51" #51: deleting state (STATE_PARENT_I1) aged 64.016s and NOT sending notification | parent state #51: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #51 | crypto helper 0 resuming | crypto helper 0 starting work-order 303 for state #303 "road-eastnet-nonat-51" #51: deleting IKE SA for connection 'road-eastnet-nonat-51' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-51' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-51 | State DB: deleting IKEv2 state #51 in PARENT_I1 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 303 | parent state #51: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #51 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 303 time elapsed 0.000613 seconds | libevent_free: release ptr-libevent@0x7fb35c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aba600 | in statetime_stop() and could not find #51 | (#303) spent 0.611 milliseconds in crypto helper computing work-order 303: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 303 for state #303 to event queue | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #303 | libevent_malloc: new ptr-libevent@0x7fb384011f30 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 0 waiting (nothing to do) Initiating connection road-eastnet-nonat-51 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-51" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-51' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-51" | stop processing: connection "road-eastnet-nonat-51" (in initiate_a_connection() at initiate.c:349) | spent 0.0671 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #303 | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 303 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #303 | **emit ISAKMP Message: | initiator cookie: | 0b e0 0a 79 39 06 c6 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-51 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 47 24 21 b4 0b e3 09 db 3f b6 a5 77 bb 87 5e ad | ikev2 g^x 66 c7 93 9a 8c 2e 04 3b 08 20 ac 03 a5 76 12 ab | ikev2 g^x b6 66 99 c7 bf 97 92 b1 32 f2 d4 40 1d 20 9f 0b | ikev2 g^x 85 c0 47 40 73 82 3c 97 59 5e 7a bf 29 1b 9b 33 | ikev2 g^x 65 e1 1d e1 06 4b 23 bb cd c3 d7 6f 1f 4d 6a d4 | ikev2 g^x a5 35 47 13 70 43 5f 27 3f e8 8d 45 36 1b 13 e8 | ikev2 g^x 52 7a c9 fd 4e c5 bf df 1d ad 19 77 99 5f 83 de | ikev2 g^x fd ac 63 24 8e b6 c0 c8 ec b2 56 6f 38 d9 99 06 | ikev2 g^x 17 b7 7e be be 8d 7f 5c 2d b1 d6 35 c6 26 88 21 | ikev2 g^x 6c 47 69 c2 4b 86 0c 66 51 e7 f5 2d 4c fb e5 79 | ikev2 g^x 2e e4 ba 11 88 c3 1e d5 cd ce 6d 00 ed f9 6c 2a | ikev2 g^x 2b 8c 48 d8 fb b0 3c 63 91 8e ae 31 9b af bf 15 | ikev2 g^x 0b 41 67 9d 12 12 70 9c 8c c1 6a db fc d2 6b 50 | ikev2 g^x c9 fa d7 b3 18 db 4f f1 d7 45 f6 0f b9 6e 33 c9 | ikev2 g^x 52 60 cc f3 be 3c 22 f0 a3 35 db d2 db d6 a6 94 | ikev2 g^x 52 18 e2 de 57 43 68 d8 7b eb ec 67 cd ed 35 3d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 80 ff 8a 78 69 ce 7f 51 87 5f 84 ba c7 a1 f0 8c | IKEv2 nonce ea cb 68 68 e4 3e 06 9f 5c 43 cc 06 85 44 5c 1e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0b e0 0a 79 39 06 c6 62 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 33 | natd_hash: port= 01 f4 | natd_hash: hash= a9 50 a2 4e fc 4d 1b 58 77 6d e9 3b 74 ac 43 c3 | natd_hash: hash= 0f 7e 66 e7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a9 50 a2 4e fc 4d 1b 58 77 6d e9 3b 74 ac 43 c3 | Notify data 0f 7e 66 e7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0b e0 0a 79 39 06 c6 62 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d9 44 30 c1 08 7f 7e c4 16 be af c3 f1 e2 c1 72 | natd_hash: hash= 14 da 79 2d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d9 44 30 c1 08 7f 7e c4 16 be af c3 f1 e2 c1 72 | Notify data 14 da 79 2d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #303 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #303: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #303 to 4294967295 after switching state | Message ID: IKE #303 skipping update_recv as MD is fake | Message ID: sent #303 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-51" #303: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.51:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #303) | 0b e0 0a 79 39 06 c6 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 24 21 b4 0b e3 09 db 3f b6 a5 77 bb 87 5e ad | 66 c7 93 9a 8c 2e 04 3b 08 20 ac 03 a5 76 12 ab | b6 66 99 c7 bf 97 92 b1 32 f2 d4 40 1d 20 9f 0b | 85 c0 47 40 73 82 3c 97 59 5e 7a bf 29 1b 9b 33 | 65 e1 1d e1 06 4b 23 bb cd c3 d7 6f 1f 4d 6a d4 | a5 35 47 13 70 43 5f 27 3f e8 8d 45 36 1b 13 e8 | 52 7a c9 fd 4e c5 bf df 1d ad 19 77 99 5f 83 de | fd ac 63 24 8e b6 c0 c8 ec b2 56 6f 38 d9 99 06 | 17 b7 7e be be 8d 7f 5c 2d b1 d6 35 c6 26 88 21 | 6c 47 69 c2 4b 86 0c 66 51 e7 f5 2d 4c fb e5 79 | 2e e4 ba 11 88 c3 1e d5 cd ce 6d 00 ed f9 6c 2a | 2b 8c 48 d8 fb b0 3c 63 91 8e ae 31 9b af bf 15 | 0b 41 67 9d 12 12 70 9c 8c c1 6a db fc d2 6b 50 | c9 fa d7 b3 18 db 4f f1 d7 45 f6 0f b9 6e 33 c9 | 52 60 cc f3 be 3c 22 f0 a3 35 db d2 db d6 a6 94 | 52 18 e2 de 57 43 68 d8 7b eb ec 67 cd ed 35 3d | 29 00 00 24 80 ff 8a 78 69 ce 7f 51 87 5f 84 ba | c7 a1 f0 8c ea cb 68 68 e4 3e 06 9f 5c 43 cc 06 | 85 44 5c 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 50 a2 4e fc 4d 1b 58 77 6d e9 3b | 74 ac 43 c3 0f 7e 66 e7 00 00 00 1c 00 00 40 05 | d9 44 30 c1 08 7f 7e c4 16 be af c3 f1 e2 c1 72 | 14 da 79 2d | state #303 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ac1340 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac1340 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #303 | libevent_malloc: new ptr-libevent@0x7fb35c035930 size 128 | #303 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49668.944822 | resume sending helper answer for #303 suppresed complete_v2_state_transition() and stole MD | #303 spent 0.343 milliseconds in resume sending helper answer | stop processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb384011f30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b e0 0a 79 39 06 c6 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #303 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #303 | rejected packet: | 0b e0 0a 79 39 06 c6 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 33 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #303: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #257 | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #257 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #257 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49668.962995; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005608 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384043260 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #257 | libevent_malloc: new ptr-libevent@0x7fb384011f30 size 128 "road-eastnet-nonat-5" #257: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #257) | c0 a3 3d d0 6b df 36 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 d4 14 bb a4 26 08 82 2e 68 9d 43 5b 83 0c 36 | 1f 55 d2 1d bf 09 8f 68 0a 80 73 cf b9 a3 3e fb | 4d 3a 5e 68 e8 aa 15 71 f7 e6 60 e6 9e 7c a9 b9 | e4 7c a0 fd c4 92 d3 66 8d 75 86 7f 7f 0a c5 42 | be bb d7 8c fb b4 ab fa c5 83 64 ff dd e6 56 27 | af 9a f1 86 53 58 3b 72 b7 e4 76 4e c9 2a af 68 | 0c 7e 9d bf 26 26 ae 59 6b f6 99 f5 1c 3d 32 4e | 8e a7 43 0e b2 0c 7f 5d ea 3a c0 50 3e 6f 7e 61 | fc 39 14 9d d7 51 ad 13 b2 22 e7 6c 3e 75 0f f9 | 50 5f 45 31 fb b6 64 15 77 12 e2 82 5e ea a6 ae | e9 ef 71 7b ce a0 63 c0 ec ed c4 35 36 4d 8b ac | a2 1c 05 95 aa 9f 05 c7 da bb 7e 2c 1b be db 0a | e1 a0 b3 b2 bf 79 ee 31 3e 48 4e 05 00 26 ce 87 | 2f 0f 18 80 43 59 d6 73 3e f5 b2 95 2a 4d b8 2d | f4 60 f9 1a 76 3c f3 63 33 e3 37 34 73 88 ed 64 | 6c a7 75 12 ca d0 e5 a3 5b 68 0d 46 dd d7 61 2d | 29 00 00 24 ee 5d 7d 66 4d 0b a2 50 89 9d 46 31 | 30 20 ae b6 b5 b0 95 a5 d1 00 de 3b e5 de 68 17 | ec 12 56 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 5f 0f 32 08 df d5 f3 1e 89 e0 00 | bf de 72 4a a1 a4 e7 89 00 00 00 1c 00 00 40 05 | 60 f8 1e fb ae 99 6b 12 d7 c7 12 5b 86 70 02 5c | 5c f6 f1 68 | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #257 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c0 a3 3d d0 6b df 36 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #257 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #257 | rejected packet: | c0 a3 3d d0 6b df 36 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #257: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fbb00 | handling event EVENT_RETRANSMIT for parent state #290 | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #290 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #290 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49668.979322; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000914 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #290 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 "road-eastnet-nonat-38" #290: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #290) | d9 b1 5b a3 d1 9c 57 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 dc 77 37 88 c0 74 0b c8 60 da a3 8f 9c e4 42 | 29 fe d5 c9 98 e7 af 66 82 be 95 44 77 f6 93 6f | 24 98 d7 cc c4 a6 16 af 14 a2 ad 53 a8 a5 93 3c | a1 26 c3 2d 65 3f cc 3f f0 9b 21 66 64 c4 82 00 | 30 f1 57 86 bf eb 51 88 bf 71 0a 30 68 dc 14 50 | 80 50 e1 6f 25 74 d9 af 8d f4 b9 89 60 e8 c3 c8 | 3b d5 14 f3 53 b4 96 85 6c 74 39 5d ff ee 22 a4 | ad 4c 82 96 29 6f f2 59 77 4e 48 da 14 23 7a 5c | 78 bb 13 4c f8 05 33 6d 40 79 5d e2 85 b7 6d 6e | b2 54 b0 03 d6 63 64 61 00 6d fd d4 8a 79 cd 3d | f1 25 f9 cf fc 5d a4 f7 ef 48 25 44 50 58 6a b2 | cd 2c dd 4c f0 ff 5e 32 e5 0f bc 63 fa 03 d5 1a | 9a ab 7e 2b 95 53 36 2e 47 c1 65 a2 7b d7 cd db | 40 2b 7a b2 21 b9 e9 6e fc 75 da 49 33 c1 98 35 | c7 9c 09 b3 47 fb 10 3f e1 56 6f be 75 69 b0 33 | f1 cb e8 e7 d6 74 b0 43 37 f7 9f 8c c7 7c d0 1e | 29 00 00 24 f3 df a5 ae 0e f0 b6 8d 6c 86 f6 fd | ac 3e 20 3a 6e ef cc 6e 76 09 43 e5 b3 97 07 d6 | b5 fd b7 b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 90 0c 81 3c 3a d2 14 9a 30 eb 10 | fa 46 c9 fe 37 f4 bb 0e 00 00 00 1c 00 00 40 05 | ea fc 09 da ae 61 e7 e4 dc 7a 6e 5d ad e3 e5 ff | 21 64 e7 65 | libevent_free: release ptr-libevent@0x7fb380027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fbb00 | #290 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 b1 5b a3 d1 9c 57 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #290 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #290 | rejected packet: | d9 b1 5b a3 d1 9c 57 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #290: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0454 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #52 | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #52 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #52 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49669.007619; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008474 exceeds limit? YES "road-eastnet-nonat-52" #52: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-52" #52: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #304 at 0x557d46a1a3d0 | State DB: adding IKEv2 state #304 in UNDEFINED | pstats #304 ikev2.ike started | Message ID: init #304: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #304: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #304; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-52" #304: initiating v2 parent SA to replace #52 | using existing local IKE proposals for connection road-eastnet-nonat-52 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 304 for state #304 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469fbb00 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #304 | libevent_malloc: new ptr-libevent@0x7fb380027c10 size 128 | #304 spent 0.0654 milliseconds in ikev2_parent_outI1() | RESET processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #52 ikev2.ike failed too-many-retransmits | pstats #52 ikev2.ike deleted too-many-retransmits | #52 spent 2.62 milliseconds in total | [RE]START processing: state #52 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-52" #52: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #52: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #52 "road-eastnet-nonat-52" #52: deleting IKE SA for connection 'road-eastnet-nonat-52' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-52' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-52 | State DB: deleting IKEv2 state #52 in PARENT_I1 | parent state #52: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 9 resuming | crypto helper 9 starting work-order 304 for state #304 | stop processing: state #52 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb36c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 304 | in statetime_stop() and could not find #52 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-52 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-52" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-52' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-52" | stop processing: connection "road-eastnet-nonat-52" (in initiate_a_connection() at initiate.c:349) | spent 0.0557 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 304 time elapsed 0.000552 seconds | (#304) spent 0.554 milliseconds in crypto helper computing work-order 304: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 304 for state #304 to event queue | scheduling resume sending helper answer for #304 | libevent_malloc: new ptr-libevent@0x7fb378014c70 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #304 | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 304 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #304 | **emit ISAKMP Message: | initiator cookie: | a8 9e ad f8 7e d0 8f 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-52 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 80 65 f7 e5 5b 0c d9 66 1f 9e de 27 b7 a9 e5 61 | ikev2 g^x e4 fa 1d ab 7c 97 a1 bd 20 9d f3 a2 b5 27 bd 1f | ikev2 g^x 8f a0 e6 70 97 5a a5 25 66 20 75 9f 12 5d d3 39 | ikev2 g^x 9b 63 a2 db 2b 74 35 c0 72 13 97 27 05 c2 62 b9 | ikev2 g^x e3 8d 4c df 62 26 b2 ef 71 4f 57 9f 86 a7 ae 23 | ikev2 g^x 96 73 f6 29 74 fa 2e d9 85 44 9e f4 6e a1 bf c3 | ikev2 g^x aa ee d5 e9 ef ed b7 f6 19 80 49 92 25 03 a6 fd | ikev2 g^x 97 ad 05 c1 4c ee d0 28 55 8e 3c fe 56 3a de 43 | ikev2 g^x 58 54 9b db 87 cd a3 da 37 73 a4 bf 3c b5 ae e4 | ikev2 g^x 24 52 70 fc 3d a8 8c fa 47 49 00 40 14 e1 2e ac | ikev2 g^x c2 2a 40 fe b6 ab ac c0 48 61 8f e7 d0 5a d3 f9 | ikev2 g^x ee 88 91 3d 36 46 3b a6 d1 44 56 83 2a 21 0b 8c | ikev2 g^x bf 71 69 ea 58 fa fe b7 82 58 cb 6d 26 3b 79 12 | ikev2 g^x d5 7b af 2b 0b 68 46 9e 23 40 da 39 fc 30 e7 9e | ikev2 g^x 96 5b ef fa 83 ac 69 ef e9 6f 36 21 f5 e9 e9 e7 | ikev2 g^x 28 93 fa 84 b2 62 19 86 19 c7 09 bf 96 a9 13 fa | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 01 38 84 c9 86 37 f1 ee b2 c5 1a 16 9c 76 d6 78 | IKEv2 nonce f3 8e 1b 3e 7b e2 b1 ac 57 81 00 ff be 40 7b 52 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a8 9e ad f8 7e d0 8f 50 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 34 | natd_hash: port= 01 f4 | natd_hash: hash= 28 4d a8 e4 29 87 92 f9 c9 e0 47 d4 8d 2b 33 0e | natd_hash: hash= 7e 88 7a bd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 28 4d a8 e4 29 87 92 f9 c9 e0 47 d4 8d 2b 33 0e | Notify data 7e 88 7a bd | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a8 9e ad f8 7e d0 8f 50 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 14 10 d4 5f c4 9e a3 33 92 fb 64 77 06 27 8a 6c | natd_hash: hash= e3 d6 b0 88 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 14 10 d4 5f c4 9e a3 33 92 fb 64 77 06 27 8a 6c | Notify data e3 d6 b0 88 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #304 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #304: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #304 to 4294967295 after switching state | Message ID: IKE #304 skipping update_recv as MD is fake | Message ID: sent #304 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-52" #304: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.52:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #304) | a8 9e ad f8 7e d0 8f 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 65 f7 e5 5b 0c d9 66 1f 9e de 27 b7 a9 e5 61 | e4 fa 1d ab 7c 97 a1 bd 20 9d f3 a2 b5 27 bd 1f | 8f a0 e6 70 97 5a a5 25 66 20 75 9f 12 5d d3 39 | 9b 63 a2 db 2b 74 35 c0 72 13 97 27 05 c2 62 b9 | e3 8d 4c df 62 26 b2 ef 71 4f 57 9f 86 a7 ae 23 | 96 73 f6 29 74 fa 2e d9 85 44 9e f4 6e a1 bf c3 | aa ee d5 e9 ef ed b7 f6 19 80 49 92 25 03 a6 fd | 97 ad 05 c1 4c ee d0 28 55 8e 3c fe 56 3a de 43 | 58 54 9b db 87 cd a3 da 37 73 a4 bf 3c b5 ae e4 | 24 52 70 fc 3d a8 8c fa 47 49 00 40 14 e1 2e ac | c2 2a 40 fe b6 ab ac c0 48 61 8f e7 d0 5a d3 f9 | ee 88 91 3d 36 46 3b a6 d1 44 56 83 2a 21 0b 8c | bf 71 69 ea 58 fa fe b7 82 58 cb 6d 26 3b 79 12 | d5 7b af 2b 0b 68 46 9e 23 40 da 39 fc 30 e7 9e | 96 5b ef fa 83 ac 69 ef e9 6f 36 21 f5 e9 e9 e7 | 28 93 fa 84 b2 62 19 86 19 c7 09 bf 96 a9 13 fa | 29 00 00 24 01 38 84 c9 86 37 f1 ee b2 c5 1a 16 | 9c 76 d6 78 f3 8e 1b 3e 7b e2 b1 ac 57 81 00 ff | be 40 7b 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 4d a8 e4 29 87 92 f9 c9 e0 47 d4 | 8d 2b 33 0e 7e 88 7a bd 00 00 00 1c 00 00 40 05 | 14 10 d4 5f c4 9e a3 33 92 fb 64 77 06 27 8a 6c | e3 d6 b0 88 | state #304 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380027c10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469fbb00 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #304 | libevent_malloc: new ptr-libevent@0x7fb36c00cf80 size 128 | #304 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49669.008711 | resume sending helper answer for #304 suppresed complete_v2_state_transition() and stole MD | #304 spent 0.322 milliseconds in resume sending helper answer | stop processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb378014c70 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 9e ad f8 7e d0 8f 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #304 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #304 | rejected packet: | a8 9e ad f8 7e d0 8f 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #304: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6e010 | handling event EVENT_RETRANSMIT for parent state #297 | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #297 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #297 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49669.010875; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500654 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aba600 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #297 | libevent_malloc: new ptr-libevent@0x7fb378014c70 size 128 "road-eastnet-nonat-45" #297: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #297) | e1 41 d2 51 2f 25 d9 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 ea 0d 0b 39 8c c1 99 18 5a a8 8a 8f 5d 3d 22 | 46 42 ee 49 5d 81 c3 87 32 80 3d 42 65 0e 28 54 | e6 12 c3 e6 03 86 ad ca e9 ea 65 ce 14 e5 73 46 | 61 07 3a 7c 00 7f 71 ec 17 17 d4 44 37 36 26 7a | 8c 65 4b 5e 2f d6 31 47 0e b3 55 90 e6 1c cb 77 | 1c 6d 58 27 57 b3 27 ff b6 e1 e9 7d 1b 10 c2 48 | 70 f7 e7 1e 31 56 ab cf ae 38 32 b8 65 81 ac 00 | 4e 9d 3a 6c 2c 1d fb a6 ff a6 c5 15 4a d1 e9 8c | f6 3b 4a 4d e5 6a 3d e0 b2 a1 f4 29 63 27 5f 0f | 08 89 9b 00 9b 1b 1f 8e 12 d3 c4 4f 3e 13 f5 a5 | 9c 44 af 0f 10 29 67 15 0d b9 b4 26 98 5d 9e 81 | d4 78 c2 73 92 2e 97 4c 48 13 99 b5 01 42 7a 4a | aa bb 3e f2 96 18 19 79 ab c3 39 3b ba ba b8 0b | 06 4a 68 91 6a ff 80 ba f0 6f 51 cd 71 94 91 9b | 14 d1 d2 23 7f bc a7 08 5b 2f eb 14 51 51 4a 55 | ca 92 da a2 1f 6e 9a 88 d0 9b 68 b4 59 e4 e6 5b | 29 00 00 24 a5 fe b0 e3 a2 f4 1f f6 10 ff b8 23 | 13 cf c1 54 86 87 d9 95 be 21 30 83 5b ee 54 e5 | 86 f0 89 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 30 e2 49 c0 1b 21 8e cb 56 2f 44 | 75 d2 75 93 97 72 cd 45 00 00 00 1c 00 00 40 05 | ed 4e b6 34 59 cc 9b 96 b2 cc cc ed 70 1c 55 bb | 38 17 6f fc | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6e010 | #297 spent 0.0987 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 41 d2 51 2f 25 d9 71 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #297 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #297 | rejected packet: | e1 41 d2 51 2f 25 d9 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #297: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #258 | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #258 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #258 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49669.03112; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003904 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6e010 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #258 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 "road-eastnet-nonat-6" #258: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #258) | f2 0a ee 39 57 38 66 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 84 a5 7f 13 c6 d5 f4 de a1 59 9b a0 a0 80 f1 | 2f 8b 06 61 d1 0f de 44 77 49 a3 76 3f 11 11 d4 | ab 9b 3e 8d 7f a0 dc 2b 42 28 86 6f ac 5b b2 c2 | 4e 03 12 4c 72 0a d1 f2 0b 69 dc 3f 47 15 b3 66 | 0b ed 38 4d 89 9d b6 26 e5 44 a2 c8 18 05 1d ea | b9 5a 63 00 12 16 1b 15 c7 6e b8 4d 60 58 cc f0 | 35 6e d0 c1 0c 7a 3b 52 20 a4 ce 3e e5 c0 cc 56 | 65 b1 16 d6 43 c2 be ea b5 3f 07 6c 04 df 3c 27 | ca 5b 39 2e f2 76 09 d5 9a 31 cd f8 a0 9b 56 3c | 42 b3 87 82 b1 01 3e ef 89 15 5a 1d 00 90 84 19 | 5b 3d 7c ec 45 07 76 99 d3 04 39 db f5 94 ae 9f | 9a 24 93 91 e4 3f ad 43 d2 f2 74 b3 73 89 3f f4 | ac 15 1c 07 3d d0 3a 58 a4 bb b4 b2 b0 c3 65 db | c7 15 7a 2b b3 96 c2 16 55 b0 f5 86 dd bf d9 cf | 01 e1 ae 2e 78 f6 40 62 df cc 04 cf 9d bd 05 f9 | 5f ef 7a 44 a4 51 1c 3a 9b b4 7d 0d 94 46 3e a1 | 29 00 00 24 25 6d bb 73 f8 76 14 9e e8 94 3a 77 | d7 da 85 ed f6 46 fc 67 4e bb 29 38 0b 6c 4c 96 | c6 a5 48 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da 43 d0 a7 5e 1e 6a 3c 4c 0b bd b4 | fc 0a 0a d4 c2 f3 96 56 00 00 00 1c 00 00 40 05 | 20 be 8b da 4d a1 7e 30 5a c5 49 1f 20 a4 27 d3 | b3 85 6c 0e | libevent_free: release ptr-libevent@0x7fb364008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #258 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 0a ee 39 57 38 66 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #258 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #258 | rejected packet: | f2 0a ee 39 57 38 66 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #258: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0803 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_RETRANSMIT for parent state #277 | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #277 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #277 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49669.034493; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002179 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #277 | libevent_malloc: new ptr-libevent@0x7fb364008e30 size 128 "road-eastnet-nonat-25" #277: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #277) | ed b4 5b 7c 9c f8 2d 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 91 10 6d ca 19 82 3a d9 60 7a 42 28 66 35 e5 | 82 e1 76 6a af 41 1a 40 79 5a ee 26 e3 d1 7d 52 | 03 12 d2 f6 99 41 6c 71 1c 80 6b 42 ba dc 3a 1b | b2 e9 12 a6 18 73 56 76 a4 06 05 cc 7a a0 0d 6d | 5e b3 80 19 f7 55 aa 2e 78 b1 66 56 9c 95 5c 32 | ad 95 eb b3 ba 95 95 ac ab 11 2a 2d 88 4f f4 e4 | dc 27 65 85 9d 92 a4 95 34 90 00 dd a5 be b5 ab | 9b 9f 39 46 28 33 16 41 a9 bb 12 e3 aa e6 53 f9 | 68 46 b2 9f c5 cd e9 27 33 0f ce 44 2d af d9 1b | dd 62 0d ac 4f 6c d0 11 3c 43 0a 76 ed 0e 96 8e | 3d ae f9 37 d9 67 c1 41 28 1d b6 2e 37 94 9e d3 | 2d cd 56 12 85 bb 68 4b bc 82 79 db 1e 4d bb bf | 84 00 46 a4 83 fb 2f 52 63 fc 2d 22 07 38 b8 c2 | 10 b3 b9 89 01 dd 44 99 e7 b8 0d b3 ff 24 4d 13 | b0 46 f4 b8 d8 19 4c 50 4a 18 69 03 39 b2 07 55 | 2b c7 e7 99 0d e8 a0 4f a8 e9 77 f9 b1 03 fa af | 29 00 00 24 29 c9 81 60 c0 da c9 2a 2b e1 7f 4a | cf 46 c4 64 f1 f4 1c 69 ff e2 b3 05 a6 db d8 66 | 75 2e e0 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 88 a4 31 ce f7 11 c3 38 da 2b 8a | 45 3d 50 97 02 58 67 d6 00 00 00 1c 00 00 40 05 | 85 8b 47 13 68 9a a2 a7 47 76 c4 a7 6b ba 26 12 | 0d c2 32 9d | libevent_free: release ptr-libevent@0x7fb36004b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | #277 spent 0.095 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed b4 5b 7c 9c f8 2d 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #277 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #277 | rejected packet: | ed b4 5b 7c 9c f8 2d 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #277: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc40 | handling event EVENT_RETRANSMIT for parent state #291 | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #291 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #291 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49669.054753; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001413 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #291 | libevent_malloc: new ptr-libevent@0x7fb36004b850 size 128 "road-eastnet-nonat-39" #291: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #291) | 77 85 93 ea 80 0c b0 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 1c 76 58 29 75 7e d4 f4 bf 59 3f 6e da 30 13 | 97 91 e5 4d 2a 44 30 c6 77 2b e1 aa 90 8a 91 6e | f8 8f d9 e7 ab d5 fb c9 18 4a c7 0e 37 35 b2 f0 | a3 12 8b 8a 64 ba 60 9e 98 18 5b 0a c2 a4 de 16 | 9c ef 90 7b a5 b4 e5 01 26 3c 58 d0 37 33 d3 a2 | f6 fe 76 4d 01 cd 2b d6 3c be b9 eb 0d 8b d4 d7 | c4 c5 12 bf 64 f2 4f a2 ec 8b b1 e0 3a c2 a2 21 | f4 b9 1a d7 ab ef 1a 0d f1 e1 8b 50 27 cf 98 3e | c2 08 00 e6 03 cf bf ee 86 72 2a aa f9 36 e9 49 | e2 ab b6 47 68 84 b5 9d f0 67 c8 08 03 1b 51 9a | 44 fe 69 c7 87 64 78 4a b7 c0 08 da 1d ee c0 bb | be c8 5e a1 c1 cc 41 ab 33 ca fd ed d6 b3 7c b1 | a7 a2 c7 36 15 58 52 6a 99 ee 8c 84 f7 78 81 e9 | 01 61 49 76 ce 6b ac b8 4a dc 03 3e 4e 23 ba 57 | f4 01 5b 74 05 72 0c 07 03 e6 2a 5d b3 8c b8 ef | e7 cd d3 38 e6 37 e3 80 1e bc 5b 24 b7 a5 cb 2c | 29 00 00 24 37 f4 21 d3 cc 8d d5 11 a4 01 4c 20 | b4 32 01 c8 03 d8 fb 70 07 27 01 09 a0 70 e5 36 | d3 fe b6 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 76 dc 7a b2 16 bf 01 10 e9 6f f4 | 8e 92 4c 8c 19 0f b1 8b 00 00 00 1c 00 00 40 05 | 48 a8 ae 2a a4 d2 aa 19 46 f9 d2 d9 d7 e1 ad a4 | ae e0 ac b4 | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc40 | #291 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 85 93 ea 80 0c b0 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #291 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #291 | rejected packet: | 77 85 93 ea 80 0c b0 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #291: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a25d10 | handling event EVENT_RETRANSMIT for parent state #53 | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #53 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #53 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49669.082148; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007084 exceeds limit? YES "road-eastnet-nonat-53" #53: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-53" #53: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #305 at 0x557d46a1b990 | State DB: adding IKEv2 state #305 in UNDEFINED | pstats #305 ikev2.ike started | Message ID: init #305: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #305: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #305; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-53" #305: initiating v2 parent SA to replace #53 | using existing local IKE proposals for connection road-eastnet-nonat-53 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 305 for state #305 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46abbc40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #305 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 | #305 spent 0.0931 milliseconds in ikev2_parent_outI1() | crypto helper 10 resuming | crypto helper 10 starting work-order 305 for state #305 | RESET processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 305 | start processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #53 ikev2.ike failed too-many-retransmits | pstats #53 ikev2.ike deleted too-many-retransmits | #53 spent 2.63 milliseconds in total | [RE]START processing: state #53 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-53" #53: deleting state (STATE_PARENT_I1) aged 64.013s and NOT sending notification | parent state #53: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #53 "road-eastnet-nonat-53" #53: deleting IKE SA for connection 'road-eastnet-nonat-53' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-53' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-53 | State DB: deleting IKEv2 state #53 in PARENT_I1 | parent state #53: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #53 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 305 time elapsed 0.00102 seconds | libevent_free: release ptr-libevent@0x7fb3840223a0 | (#305) spent 1.03 milliseconds in crypto helper computing work-order 305: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a25d10 | crypto helper 10 sending results from work-order 305 for state #305 to event queue | scheduling resume sending helper answer for #305 | libevent_malloc: new ptr-libevent@0x7fb37c014c70 size 128 | in statetime_stop() and could not find #53 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 10 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-53 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-53" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-53' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-53" | stop processing: connection "road-eastnet-nonat-53" (in initiate_a_connection() at initiate.c:349) | spent 0.0603 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #305 | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 305 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #305 | **emit ISAKMP Message: | initiator cookie: | 0e ad 9d c2 5e 8b 6a 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-53 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9f e9 9f 5a 6d 09 7a 5d 23 c1 f2 37 ec ac 20 ff | ikev2 g^x 0b 05 30 7f 53 42 af cd 03 b4 6f 3e 30 98 76 c7 | ikev2 g^x f6 6d 6d 12 6f 8b e0 b3 ea 9f 1c 72 a6 90 d8 7b | ikev2 g^x c5 96 6d 18 3e 75 5f 76 31 a1 d4 8e 3c 37 16 33 | ikev2 g^x 4b dd 74 20 e8 c4 62 66 2a 3f ae 2f 41 fd 91 9d | ikev2 g^x 82 99 62 7a b3 d1 ba 05 ec 0f 82 e6 50 45 b8 02 | ikev2 g^x a6 bb b5 5a eb 4b 5a 37 8e aa cf ae a4 3c 1d 53 | ikev2 g^x 50 52 15 71 96 99 84 38 c8 90 39 55 a5 f6 b3 e4 | ikev2 g^x fd 1f be 6b e2 f1 ec 6b de 7b d5 b2 c2 99 77 3a | ikev2 g^x 99 91 64 fd 16 0c de 9a 77 95 51 ab fa 63 18 46 | ikev2 g^x 7f 05 f1 01 08 4a 40 52 ce 73 f7 5e 69 b6 5a cc | ikev2 g^x 4f 80 84 49 75 3b fb a8 21 4b 60 95 55 81 f4 0d | ikev2 g^x cb 05 bd e3 26 c4 5a 85 f3 a4 be ed 0d bf dc 15 | ikev2 g^x 6d 89 c4 7e 34 fc cc cd 95 5c 1d d7 12 73 97 3c | ikev2 g^x b9 13 4a ef 01 3e 06 0d bc ac d0 d1 a5 d2 76 b5 | ikev2 g^x 0f e8 f3 1a 11 93 b0 3e ca db 92 a3 66 d7 f8 e1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f3 38 4c 4d 23 45 96 5c 15 55 c7 5a 82 60 67 82 | IKEv2 nonce ca 1f 2d 10 e7 40 18 d9 8a a9 22 da 5f 97 93 ac | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0e ad 9d c2 5e 8b 6a 9d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 35 | natd_hash: port= 01 f4 | natd_hash: hash= 08 2a f3 b2 21 79 dc dd 37 78 74 cf d5 e0 cd fd | natd_hash: hash= 06 29 e6 7b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 08 2a f3 b2 21 79 dc dd 37 78 74 cf d5 e0 cd fd | Notify data 06 29 e6 7b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0e ad 9d c2 5e 8b 6a 9d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 89 f1 13 5f 51 69 37 8e 62 27 27 24 a2 bd 48 85 | natd_hash: hash= 3c 78 e4 8e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 89 f1 13 5f 51 69 37 8e 62 27 27 24 a2 bd 48 85 | Notify data 3c 78 e4 8e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #305 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #305: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #305 to 4294967295 after switching state | Message ID: IKE #305 skipping update_recv as MD is fake | Message ID: sent #305 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-53" #305: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.53:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #305) | 0e ad 9d c2 5e 8b 6a 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f e9 9f 5a 6d 09 7a 5d 23 c1 f2 37 ec ac 20 ff | 0b 05 30 7f 53 42 af cd 03 b4 6f 3e 30 98 76 c7 | f6 6d 6d 12 6f 8b e0 b3 ea 9f 1c 72 a6 90 d8 7b | c5 96 6d 18 3e 75 5f 76 31 a1 d4 8e 3c 37 16 33 | 4b dd 74 20 e8 c4 62 66 2a 3f ae 2f 41 fd 91 9d | 82 99 62 7a b3 d1 ba 05 ec 0f 82 e6 50 45 b8 02 | a6 bb b5 5a eb 4b 5a 37 8e aa cf ae a4 3c 1d 53 | 50 52 15 71 96 99 84 38 c8 90 39 55 a5 f6 b3 e4 | fd 1f be 6b e2 f1 ec 6b de 7b d5 b2 c2 99 77 3a | 99 91 64 fd 16 0c de 9a 77 95 51 ab fa 63 18 46 | 7f 05 f1 01 08 4a 40 52 ce 73 f7 5e 69 b6 5a cc | 4f 80 84 49 75 3b fb a8 21 4b 60 95 55 81 f4 0d | cb 05 bd e3 26 c4 5a 85 f3 a4 be ed 0d bf dc 15 | 6d 89 c4 7e 34 fc cc cd 95 5c 1d d7 12 73 97 3c | b9 13 4a ef 01 3e 06 0d bc ac d0 d1 a5 d2 76 b5 | 0f e8 f3 1a 11 93 b0 3e ca db 92 a3 66 d7 f8 e1 | 29 00 00 24 f3 38 4c 4d 23 45 96 5c 15 55 c7 5a | 82 60 67 82 ca 1f 2d 10 e7 40 18 d9 8a a9 22 da | 5f 97 93 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 2a f3 b2 21 79 dc dd 37 78 74 cf | d5 e0 cd fd 06 29 e6 7b 00 00 00 1c 00 00 40 05 | 89 f1 13 5f 51 69 37 8e 62 27 27 24 a2 bd 48 85 | 3c 78 e4 8e | state #305 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46abbc40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #305 | libevent_malloc: new ptr-libevent@0x7fb3840223a0 size 128 | #305 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49669.083775 | resume sending helper answer for #305 suppresed complete_v2_state_transition() and stole MD | #305 spent 0.332 milliseconds in resume sending helper answer | stop processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c014c70 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e ad 9d c2 5e 8b 6a 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #305 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #305 | rejected packet: | 0e ad 9d c2 5e 8b 6a 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 35 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #305: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a672d0 | handling event EVENT_RETRANSMIT for parent state #298 | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #298 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #298 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49669.098975; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501343 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a25d10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #298 | libevent_malloc: new ptr-libevent@0x7fb37c014c70 size 128 "road-eastnet-nonat-46" #298: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #298) | d5 0c ec bc d3 64 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 43 96 23 e5 3a d0 2d 36 cd 43 2d 58 c4 e0 92 a1 | ed 2d e1 4c 45 8b 42 ad 40 76 ab 67 60 92 c4 09 | 73 c4 c7 3c 9d 80 31 b9 bf b9 9e 64 35 e4 39 ba | 2f a8 59 fe 53 09 d8 e0 e9 88 59 30 e2 71 e6 be | 2d 69 bc 6a a7 6e 4f db 2a 6a 88 01 9f d2 1a 54 | 9b 70 8c b4 c5 37 d0 1b eb c3 58 21 ce 79 a3 ff | 4e 1b 84 aa 1e 08 dd 9d 9d 58 7a ba b0 dd 2d 38 | 9e da 29 29 b5 fb 28 78 05 fa 3a 26 c0 d3 4c cf | 22 22 af c7 f1 d8 11 18 01 e3 41 10 fc 1b c9 38 | 58 6b be 13 fa e2 38 5b 8d 00 15 50 84 fd a8 e0 | 20 22 31 ab 99 61 d4 85 a8 6c 2e d8 1f e4 26 c0 | 25 17 38 c7 a5 82 30 0d e2 85 f0 d0 e0 3a 59 87 | 67 7b 0d e4 52 7b 6c 35 93 c6 f4 61 2c 32 e9 62 | b8 57 d1 59 0b 7c af 14 d1 9d bb 91 61 85 75 09 | ed c6 43 19 bf 09 f8 e4 92 e6 1f f3 47 e1 6e 0a | 5a 69 40 30 db b0 00 24 c2 61 94 a9 30 49 e7 0e | 29 00 00 24 4c 0e e1 06 42 9e 4c 74 3b 65 ba d4 | bc 56 1a 69 be b4 c7 ec 29 68 0f 7e 31 97 81 70 | 75 a5 f0 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 96 a5 ca 09 14 9d 81 34 51 5c 38 | 06 b0 7e 03 d4 af 12 47 00 00 00 1c 00 00 40 05 | 1b 14 fa aa 2e 1c b4 a7 92 80 67 79 37 9e 5c 02 | 1f 84 46 7d | libevent_free: release ptr-libevent@0x7fb35003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a672d0 | #298 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 0c ec bc d3 64 84 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #298 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #298 | rejected packet: | d5 0c ec bc d3 64 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #298: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45310 | handling event EVENT_RETRANSMIT for parent state #278 | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #278 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #278 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49669.109319; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001932 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a672d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #278 | libevent_malloc: new ptr-libevent@0x7fb35003b0b0 size 128 "road-eastnet-nonat-26" #278: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #278) | 08 20 1d 54 94 b3 08 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 a1 ac cd cf 52 aa c1 15 fd 26 f6 ce 5b bb 69 | e2 24 51 98 69 82 96 7a 9b 39 3d bd 86 5c 17 cb | 1b d4 a9 83 ec 80 8d 8d 98 27 4b 99 f4 20 5c e3 | 21 59 7a 6e 94 3a e5 a4 ea 37 74 6c a3 9a 99 f4 | 8f 90 94 d4 bd 67 d7 b9 06 e3 7c d1 d3 76 37 58 | 47 a2 45 8a db 7e f9 85 d6 08 20 a6 bf 2b 7f c1 | 25 eb a0 f8 68 c1 9c c0 38 d2 e7 d9 43 7b cb 27 | 99 db 05 15 9d 31 4d 0f 10 f4 8b 1c a6 46 f5 eb | 21 00 56 37 46 de 0d 94 e5 1c 55 ca 89 03 da 88 | 4e dc 76 55 16 95 7d 63 e2 29 4d 09 2b 25 59 20 | f9 0f f3 3f f2 2e bd 84 bc f5 d7 26 2f 24 33 39 | 9b 95 39 a9 c8 80 99 61 48 09 51 76 c7 02 f7 7e | 9a 29 d4 87 ca 9f 9d b2 ea 2d 4b 02 ce 90 b0 a7 | 7e 1d de da 63 ea 0e 8d 96 e6 95 fb 1c 5e 88 3b | 6e ec 99 33 d7 e2 75 ac ca 10 ec 9b 00 5a c4 5e | 94 67 a1 9a 10 a7 22 d4 3e d5 55 a9 17 c5 c5 72 | 29 00 00 24 16 ad f5 49 a7 87 af 94 50 48 7a 22 | f4 eb b9 a7 0c 25 3c c9 61 3d 03 4a 9f 4c 8f 7c | d3 51 5e 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e fe 64 30 2d 54 01 ce c5 20 30 8e | 57 4b dd bc f4 7a 78 34 00 00 00 1c 00 00 40 05 | c5 ea 3a 3a ae 73 b8 b7 65 be 1b eb 5d 99 4d a3 | 57 6c 56 99 | libevent_free: release ptr-libevent@0x7fb358046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45310 | #278 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 20 1d 54 94 b3 08 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #278 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #278 | rejected packet: | 08 20 1d 54 94 b3 08 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #278: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a94500 | handling event EVENT_RETRANSMIT for parent state #292 | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #292 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #292 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49669.12463; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003064 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45310 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #292 | libevent_malloc: new ptr-libevent@0x7fb358046040 size 128 "road-eastnet-nonat-40" #292: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #292) | 87 88 51 7a 60 9d 5a 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 66 a0 4d 60 cb 65 95 3c 93 0d 5e 54 74 22 d5 | b9 4e e2 32 b5 97 c3 a0 c6 6f 16 29 09 b8 29 a7 | 53 85 60 d3 38 df d9 0c a3 64 8e 65 05 77 b2 87 | 1b 54 26 e9 27 44 44 33 65 9f 3e a3 6d dc 58 a3 | 3c 1b b5 56 27 64 d7 00 90 21 cd 7d 46 ab 11 af | ba 96 a3 c8 ee 97 85 92 75 7b ec 2d df 79 07 56 | 45 a8 e2 68 58 3f 02 db 14 25 0e 1f 9b c2 bb 05 | 5a 26 d6 ed 51 8a 97 6d 65 fb 55 2b bb 16 61 e4 | de 73 b2 ef 70 09 3d 76 f2 05 da 1e bd 6c 49 e0 | 44 ef e7 7e 74 41 a3 f7 8a 2e 4b 16 50 e8 de e0 | a4 17 3e ac 86 b1 62 63 2e 1c a5 2b dc 13 3a ee | 9b a0 c2 94 2b ba 80 4c 0b 59 f3 60 75 ff 33 5f | 0b 97 1a 30 63 32 07 17 5c 59 1a 4a db 49 f2 ef | 1e b6 76 4d ca 87 ea 08 32 6d 49 4e d6 81 ee 4c | c7 58 d6 e6 53 ab c7 5b 58 9e 4a 36 b9 18 48 a2 | 61 0a 77 8a 15 c7 1b 51 f1 d5 e0 50 5a 9b 7a 98 | 29 00 00 24 b6 37 4c f0 c9 85 b2 01 0e 7e 3e 08 | 4a 99 af 96 7f b4 c9 1d 28 51 f7 8e 73 35 20 22 | 15 78 52 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 e7 d2 e3 15 0a 06 f3 99 b1 c4 ad | 55 e8 07 46 e3 af eb 45 00 00 00 1c 00 00 40 05 | 9e 69 62 01 15 f2 f4 fe 05 57 a2 2c 87 7a 71 d0 | 0c f9 69 7d | libevent_free: release ptr-libevent@0x7fb35804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94500 | #292 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 88 51 7a 60 9d 5a 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #292 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #292 | rejected packet: | 87 88 51 7a 60 9d 5a 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #292: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abfd80 | handling event EVENT_RETRANSMIT for parent state #259 | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #259 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #259 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49669.132918; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003761 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94500 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #259 | libevent_malloc: new ptr-libevent@0x7fb35804b850 size 128 "road-eastnet-nonat-7" #259: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #259) | 69 c4 5c 94 f6 f0 24 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe b3 f9 68 3e 85 57 5d 74 26 b7 37 f5 c1 1c c8 | a9 30 6a e1 51 a4 0f d5 ca 35 4b e9 d0 ec d0 ea | 11 06 1a ad 0a 7c 08 a4 ce 70 10 ef b2 c9 82 43 | 06 fb 99 b0 99 d2 5d a2 87 5b cd a0 9b 7d 7a a3 | 30 f9 78 c0 d7 43 6f f3 cc 53 5a 43 25 d8 61 04 | 58 03 b6 71 c6 21 93 59 b3 7c 3f 84 50 6d 48 95 | ef b8 dc 96 69 dc 88 98 10 47 21 0a 3d 72 57 34 | e5 bd d9 b3 4a 55 2e bb 34 64 f1 be 1c 6f f2 7e | c5 4b 83 c8 2c d8 e9 41 02 95 ff 83 96 69 c2 56 | 98 1b 20 30 7a bc 8b ab ee 27 a0 89 22 93 25 c7 | d2 f1 b0 c8 12 06 e6 8d 9a d7 bd fc 06 14 66 23 | 65 ae e6 9e 37 44 0c f0 0e 0e 78 09 b8 a3 32 c3 | c6 25 1b 97 0b 77 db 90 b8 16 58 5f 15 d2 40 fe | 1c d0 5e e3 88 05 3b ef bc 19 2c a9 73 97 03 9a | 26 fc 47 8b 95 24 fe d4 39 f2 65 5a 9f ee 0c cf | 1a 9b 03 45 52 42 61 4d b6 e7 aa 2c 0c 37 c0 61 | 29 00 00 24 c4 2f 3e 0e 76 3e 59 e7 3e 5c 53 28 | 43 02 fc a9 7a 2b 47 13 2c c2 eb 53 3e b5 40 d1 | 94 dc e6 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 85 30 eb 64 9e 84 09 e0 70 76 01 | 65 fa d3 ac 84 56 a3 b4 00 00 00 1c 00 00 40 05 | 64 83 da b1 99 b6 d9 28 72 08 34 2c 77 b4 36 a0 | 74 09 78 83 | libevent_free: release ptr-libevent@0x7fb348048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abfd80 | #259 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 c4 5c 94 f6 f0 24 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #259 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #259 | rejected packet: | 69 c4 5c 94 f6 f0 24 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #259: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #54 | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #54 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #54 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49669.162218; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008086 exceeds limit? YES "road-eastnet-nonat-54" #54: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-54" #54: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #306 at 0x557d46a1cf50 | State DB: adding IKEv2 state #306 in UNDEFINED | pstats #306 ikev2.ike started | Message ID: init #306: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #306: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #306; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-54" #306: initiating v2 parent SA to replace #54 | using existing local IKE proposals for connection road-eastnet-nonat-54 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 306 for state #306 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46abfd80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #306 | libevent_malloc: new ptr-libevent@0x7fb348048a10 size 128 | #306 spent 0.0694 milliseconds in ikev2_parent_outI1() | RESET processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #54 ikev2.ike failed too-many-retransmits | pstats #54 ikev2.ike deleted too-many-retransmits | #54 spent 2.53 milliseconds in total | [RE]START processing: state #54 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-54" #54: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #54: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #54 | crypto helper 14 resuming | crypto helper 14 starting work-order 306 for state #306 "road-eastnet-nonat-54" #54: deleting IKE SA for connection 'road-eastnet-nonat-54' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 306 | add revival: connection 'road-eastnet-nonat-54' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-54 | State DB: deleting IKEv2 state #54 in PARENT_I1 | parent state #54: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #54 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 306 time elapsed 0.000588 seconds | libevent_free: release ptr-libevent@0x7fb36402a780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | (#306) spent 0.59 milliseconds in crypto helper computing work-order 306: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 306 for state #306 to event queue | scheduling resume sending helper answer for #306 | in statetime_stop() and could not find #54 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb370014c70 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-54 which received a Delete/Notify but must remain up per local policy | crypto helper 14 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-54" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-54' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-54" | stop processing: connection "road-eastnet-nonat-54" (in initiate_a_connection() at initiate.c:349) | spent 0.062 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #306 | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 306 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #306 | **emit ISAKMP Message: | initiator cookie: | fd d2 63 50 0e 6e 1e 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-54 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x cc f6 1e 22 b4 91 3a 68 1f d1 67 6d 28 c8 f1 bf | ikev2 g^x e2 6e 14 07 e3 24 35 86 32 c0 3d 31 76 0e 87 74 | ikev2 g^x f9 3c 48 85 fb a5 36 8c 2d 66 01 91 c5 ea 8c 52 | ikev2 g^x 2c 54 17 a9 6d 05 2c 50 21 08 25 54 8a 1b be 0a | ikev2 g^x 1d bd df b6 06 bd 44 6a d2 67 92 4c 02 bb 81 0c | ikev2 g^x c5 ff 14 e5 24 16 2f 34 f8 b9 eb 90 9f 21 2d 2e | ikev2 g^x b4 e3 0a 67 2a 94 b3 b5 79 5e 99 67 ad f2 05 03 | ikev2 g^x 3c 2d de 97 30 2e 1c 04 bc c1 21 b5 15 d2 d7 d9 | ikev2 g^x ea a8 e1 e4 5e c5 d4 35 2f fe 33 59 95 e2 b7 3c | ikev2 g^x 23 52 f4 04 24 af 5a 95 09 7f 61 6c 7a 9b e9 50 | ikev2 g^x d2 38 26 f9 d3 19 e4 0a 3c be ac cf c6 ff b4 45 | ikev2 g^x b0 35 a0 dc ec 70 3d 13 ab c2 8a 53 0d 47 68 05 | ikev2 g^x 67 66 c8 1a af d5 d2 45 a5 c1 6e df ea 2b 64 70 | ikev2 g^x 05 da 5e 15 ac a3 ed f4 40 10 0f 5a 84 40 9e bc | ikev2 g^x d6 87 16 fd 3f a2 ff 39 19 ba 66 6d 2d e9 93 fd | ikev2 g^x b9 22 df b5 78 f4 f7 04 ee c7 91 83 7d a9 ca f1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c2 6f b9 fd fc 4f db 1a 3d 3f c0 a7 af 7a 63 dc | IKEv2 nonce 70 8f 4c 18 81 55 af 15 16 2b 00 41 32 ac cf 3c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fd d2 63 50 0e 6e 1e 65 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 36 | natd_hash: port= 01 f4 | natd_hash: hash= 16 87 47 9a 56 3f e1 15 1e 01 4b 7f bb 95 0e 04 | natd_hash: hash= 49 a0 88 16 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 16 87 47 9a 56 3f e1 15 1e 01 4b 7f bb 95 0e 04 | Notify data 49 a0 88 16 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fd d2 63 50 0e 6e 1e 65 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 0c f3 ae 84 0d fd 98 31 4d e7 cb a5 de d2 0b 07 | natd_hash: hash= b0 31 98 21 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0c f3 ae 84 0d fd 98 31 4d e7 cb a5 de d2 0b 07 | Notify data b0 31 98 21 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #306 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #306: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #306 to 4294967295 after switching state | Message ID: IKE #306 skipping update_recv as MD is fake | Message ID: sent #306 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-54" #306: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.54:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #306) | fd d2 63 50 0e 6e 1e 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc f6 1e 22 b4 91 3a 68 1f d1 67 6d 28 c8 f1 bf | e2 6e 14 07 e3 24 35 86 32 c0 3d 31 76 0e 87 74 | f9 3c 48 85 fb a5 36 8c 2d 66 01 91 c5 ea 8c 52 | 2c 54 17 a9 6d 05 2c 50 21 08 25 54 8a 1b be 0a | 1d bd df b6 06 bd 44 6a d2 67 92 4c 02 bb 81 0c | c5 ff 14 e5 24 16 2f 34 f8 b9 eb 90 9f 21 2d 2e | b4 e3 0a 67 2a 94 b3 b5 79 5e 99 67 ad f2 05 03 | 3c 2d de 97 30 2e 1c 04 bc c1 21 b5 15 d2 d7 d9 | ea a8 e1 e4 5e c5 d4 35 2f fe 33 59 95 e2 b7 3c | 23 52 f4 04 24 af 5a 95 09 7f 61 6c 7a 9b e9 50 | d2 38 26 f9 d3 19 e4 0a 3c be ac cf c6 ff b4 45 | b0 35 a0 dc ec 70 3d 13 ab c2 8a 53 0d 47 68 05 | 67 66 c8 1a af d5 d2 45 a5 c1 6e df ea 2b 64 70 | 05 da 5e 15 ac a3 ed f4 40 10 0f 5a 84 40 9e bc | d6 87 16 fd 3f a2 ff 39 19 ba 66 6d 2d e9 93 fd | b9 22 df b5 78 f4 f7 04 ee c7 91 83 7d a9 ca f1 | 29 00 00 24 c2 6f b9 fd fc 4f db 1a 3d 3f c0 a7 | af 7a 63 dc 70 8f 4c 18 81 55 af 15 16 2b 00 41 | 32 ac cf 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 87 47 9a 56 3f e1 15 1e 01 4b 7f | bb 95 0e 04 49 a0 88 16 00 00 00 1c 00 00 40 05 | 0c f3 ae 84 0d fd 98 31 4d e7 cb a5 de d2 0b 07 | b0 31 98 21 | state #306 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb348048a10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46abfd80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abfd80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #306 | libevent_malloc: new ptr-libevent@0x7fb36402a780 size 128 | #306 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49669.163413 | resume sending helper answer for #306 suppresed complete_v2_state_transition() and stole MD | #306 spent 0.321 milliseconds in resume sending helper answer | stop processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb370014c70 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd d2 63 50 0e 6e 1e 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #306 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #306 | rejected packet: | fd d2 63 50 0e 6e 1e 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 36 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #306: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0483 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7a390 | handling event EVENT_RETRANSMIT for parent state #299 | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #299 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #299 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49669.166587; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500181 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #299 | libevent_malloc: new ptr-libevent@0x7fb370014c70 size 128 "road-eastnet-nonat-47" #299: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #299) | 63 02 bb 51 d9 8c b0 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 17 e8 1c e0 c7 4f 03 2d a7 55 c0 45 bf a2 96 | 6a 0c 0e 0f 3f cb a5 f2 68 03 39 51 c2 b3 0b 30 | 79 44 b0 72 39 7b b4 0b c0 9d 43 f1 cf 9c ab 76 | 17 9c 76 41 f4 97 6b 3d 79 c7 93 3a b0 36 40 75 | 1d 60 59 8c 82 e2 c7 85 c2 1c 97 4a 38 8b 6e ad | 3e 5a 0d 04 9e 51 30 61 82 af ed 37 96 e2 b6 a0 | 3b c4 41 66 ee 44 1e e7 39 9f 7c 2f f5 f2 ff 4b | 36 a8 c8 29 8b eb d2 55 7f fb 10 9c ec 8c 08 d0 | 39 05 1c 07 ac 20 cb cb a4 7c 61 41 78 60 13 d3 | dd a5 39 38 ad f1 86 ff 6a 3c d0 2d b1 eb 7c 82 | 79 91 1f 2f 55 9c db 4d e2 10 be 62 dd e3 5a 7a | 61 63 85 0c fd 8f b4 af 97 73 ef e2 1b 21 c4 96 | e5 df 1b 56 fa 11 08 d6 95 8d 53 f4 13 64 3d 3d | 98 8c 38 c7 52 64 1a 00 95 89 f1 a3 72 e2 fe 87 | 05 b1 bc 3a 2d 8d ca c2 67 8a 86 e8 36 ce a6 73 | 08 10 ff 3d c7 41 a4 c0 53 af 83 9f b4 ac d3 a6 | 29 00 00 24 7e 5d f1 77 88 98 7f 63 50 07 d0 59 | cc bb c0 62 cd 9c cc f3 5d 35 d8 78 d2 ee b4 01 | aa b2 27 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 b5 ac f1 52 82 e1 6d 65 51 7c e0 | ef a0 91 c6 07 cf fb 64 00 00 00 1c 00 00 40 05 | 8f da 92 7d 7b 47 83 cb 10 aa f2 ca 2c a8 73 ac | 13 99 82 ed | libevent_free: release ptr-libevent@0x7fb37401f7f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7a390 | #299 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 02 bb 51 d9 8c b0 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #299 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #299 | rejected packet: | 63 02 bb 51 d9 8c b0 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #299: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0673 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34002a950 | handling event EVENT_RETRANSMIT for parent state #279 | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #279 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #279 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49669.184958; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003054 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7a390 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #279 | libevent_malloc: new ptr-libevent@0x7fb37401f7f0 size 128 "road-eastnet-nonat-27" #279: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #279) | e3 74 db 6d 09 5b 39 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 0f 5a 1b 7a 8f ca c9 79 23 84 5e dc 90 86 16 | 69 23 cd b6 f6 38 83 88 87 a0 82 5d cb 87 94 7a | a5 f1 35 43 62 38 5c 18 da 06 83 48 7b 51 b2 80 | 57 ee 54 19 13 b6 1b 59 ab b3 f3 ce 4e 70 21 d2 | 1d 3f 07 6b c1 ad 15 8b 16 67 f3 79 c6 3f ee ff | 6b 97 0c 11 61 f6 68 6d 51 5b dc dc 69 1e f2 f8 | 31 6f 04 6f 19 7c a8 a9 37 a2 da ca be a8 40 a8 | d0 ef 42 ba be 70 25 1f 20 b2 dd 25 56 46 50 6a | 55 24 29 65 1f 8b ad 5a c0 f3 1f c2 6d ed 0d 17 | f8 37 85 23 72 0c 7b c5 c8 05 6a d0 1b 38 ca f1 | 63 79 aa 8b f0 75 7e c0 5c 06 26 d0 c2 20 b9 e9 | c7 89 2f ee 84 27 1c 00 f8 3a d5 7e 2a be c2 84 | e4 6a 7c 0c 25 65 bb 41 df ad ea 07 28 2c bc 6e | 24 1b 9a 66 f8 83 86 6a 84 b0 d9 93 6f e5 9a 01 | 17 24 34 ac 82 0a b8 a3 51 37 c3 89 94 09 92 d7 | 0d 37 14 e0 ee 1c 1b 73 ef 46 af cc fd ba 52 42 | 29 00 00 24 f9 6f e2 b3 2b d1 43 b4 d3 29 40 07 | 4f e9 c5 79 33 c1 2e 78 27 6c f8 54 58 c2 d9 c9 | 00 b6 d5 b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 94 ec 05 36 41 29 fa 93 f5 5d d2 | 39 00 ad d2 4d 2f 36 81 00 00 00 1c 00 00 40 05 | 7a 98 d6 69 28 79 15 19 95 89 31 96 52 96 29 94 | 7d 8f c3 a4 | libevent_free: release ptr-libevent@0x7fb340008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34002a950 | #279 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 74 db 6d 09 5b 39 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #279 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #279 | rejected packet: | e3 74 db 6d 09 5b 39 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #279: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0476 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #293 | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #293 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #293 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49669.215242; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001421 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34002a950 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #293 | libevent_malloc: new ptr-libevent@0x7fb340008e30 size 128 "road-eastnet-nonat-41" #293: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #293) | 98 65 e9 19 f7 80 1b 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 92 fa cc 80 1f 04 ae 31 60 a8 15 7f 6c d4 bb | 0d a3 36 d4 3d 31 2d db c9 a3 65 0b 54 77 b5 90 | 4b f1 85 f9 5b a2 e8 2d 9a 77 1b fe a8 fb ea d0 | 88 2f 01 a5 98 e9 7e 65 f1 01 87 3d 6a 2d 8a 3a | 8e f8 d8 76 3b 1e 19 1d 17 90 3e 76 19 99 52 4a | 6e 00 1d 7b db 96 db 83 88 cd fd 1e bd 7e 5b 89 | ba a0 91 2a b9 ee b5 58 13 b3 5e 5e 59 9d 47 30 | d5 69 4e a7 bd 52 9f d4 e7 9b be ed b8 c7 8e ca | fd 72 11 5d 3c 4e 3f 34 3a cf 63 b2 e1 3a 0c 75 | e0 fd c6 41 05 da 4e 8b 04 c0 eb 84 52 ad 81 69 | 8c d8 b9 f0 3d 70 1f c8 01 a5 b7 5f ee d4 3d 97 | 3f 74 14 bf c1 32 07 23 90 8c c7 74 19 a4 db 67 | e2 81 e3 0a 06 5d bd 34 79 e7 4a 18 70 10 d6 b8 | 84 dc 4f 06 a8 1d f3 4b d5 6f 30 05 6d 56 83 1e | 64 17 96 93 11 0f e7 08 32 35 87 dc fb e0 8f 9f | e0 07 34 5d b8 fb 0d 4c d3 c2 58 00 d5 76 62 90 | 29 00 00 24 6f f2 b6 ca f4 8a a8 b3 ce 34 d7 c6 | a9 bf 42 71 b6 a3 89 33 ed 1d 91 ee 0e 11 98 8d | 12 5e c6 63 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 b6 16 43 43 a6 c6 14 e2 18 67 23 | 58 d4 b6 9a 2d df 39 90 00 00 00 1c 00 00 40 05 | 2a 56 75 a4 c4 51 60 eb 9a b6 a1 bf 9e f8 0f fa | 6b d1 0c 00 | libevent_free: release ptr-libevent@0x7fb3840060f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | #293 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 65 e9 19 f7 80 1b 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #293 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #293 | rejected packet: | 98 65 e9 19 f7 80 1b 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #293: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350005860 | handling event EVENT_RETRANSMIT for parent state #260 | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #260 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #260 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49669.235539; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003726 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #260 | libevent_malloc: new ptr-libevent@0x7fb3840060f0 size 128 "road-eastnet-nonat-8" #260: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #260) | a8 de 56 29 b7 d6 fa 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 e3 e7 0b 5e 0a a2 78 28 90 d4 10 18 db 3b 08 | b2 da 89 a3 10 0a cf 73 47 c7 8b 62 54 ef 17 0b | 52 d6 fe 33 62 21 4b 61 30 79 d1 82 82 85 ea 34 | 5e 16 ec db dd eb 97 56 18 30 74 8c 1f 6e 05 89 | 21 09 2b 1f b9 bc b7 45 38 93 12 7a 5d 44 53 c4 | 90 d3 d5 13 c2 0f fd 6b 37 3e 25 38 05 ed f0 2b | cb 0f 13 a8 c7 9b fe 60 00 1a 65 af 42 72 d4 bd | f1 07 94 0e 72 26 91 81 83 ee ff ef 41 c2 92 80 | a0 7f b9 6c 1f d2 e5 4b 34 fe 68 33 41 4d c0 3b | fb 7e 82 89 76 4f ab b4 81 d9 20 1a 79 fa de 75 | 7d a8 cd 19 c4 08 7c dc 7d 50 74 8e 78 b5 b3 64 | 8b 8f bd fd e8 f9 24 be 78 a0 45 9f 10 40 3e e1 | 49 ba 58 e8 63 d1 38 81 0c 79 61 75 c1 98 81 43 | 9b e0 a1 0d fc da 35 4b 0e a9 e1 35 63 d5 73 64 | db 23 3e 1b a9 3a 4e c0 e5 7f 6a ab 90 f3 cd 49 | 1b bf e5 c9 ab 56 60 25 6c 22 94 4d da ff b4 bb | 29 00 00 24 2b a8 af 62 73 94 e5 0a 7f 70 bf f7 | 73 9f 36 a9 cb 1b e2 09 0a 24 49 93 58 be a0 29 | 94 31 83 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 87 5d ef 8f 65 c8 58 d0 3b 6f e5 | c6 10 af 28 1a 1c e2 ed 00 00 00 1c 00 00 40 05 | 7a 28 e6 3f f8 c3 d1 0c 25 ff 6a 7c a9 a5 77 33 | 24 34 82 26 | libevent_free: release ptr-libevent@0x7fb344008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350005860 | #260 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 de 56 29 b7 d6 fa 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #260 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #260 | rejected packet: | a8 de 56 29 b7 d6 fa 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #260: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0eac0 | handling event EVENT_RETRANSMIT for parent state #280 | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #280 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #280 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49669.239804; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00257 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #280 | libevent_malloc: new ptr-libevent@0x7fb344008e30 size 128 "road-eastnet-nonat-28" #280: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #280) | d6 f7 ab 7c 0b ea 69 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca e1 05 9c 2f e1 85 fc d1 c1 5e ec 37 7e 0d 76 | 45 c5 de cd 99 7d 74 0a 48 32 65 23 49 b2 c2 df | ba 7e d2 ef 7c 32 31 03 10 0c 09 94 c0 eb b8 b5 | 06 97 c9 45 66 24 48 7d 72 da ab 98 55 09 59 9c | 31 af 0e c1 8a a9 90 d1 a5 1f 67 f1 af 23 81 27 | 72 13 c8 3c d8 f0 f1 d8 ca c2 a1 9a 92 8c fd 09 | b0 c2 a6 d5 91 c6 84 9b 99 40 a3 ac 3e 94 44 cd | 9a 36 6e be f8 2c 85 77 18 29 38 0d c0 06 06 d0 | a2 de 4c 8d 95 cd da f4 a0 2f bd 4d 70 4f 95 ae | db 5a f3 57 de 7c dd 31 a6 66 ca aa 68 cf 9d 1d | b3 0a 17 80 b5 20 24 43 82 44 17 25 0f 38 64 50 | 75 9d 57 76 b6 2b ee 0e 3f 93 33 cf 3f 9b 45 97 | f9 87 b6 87 a6 ec cb 33 18 44 a7 89 6a 59 c0 2b | ff 8a 7d 67 3d 1a 08 05 fe 9f fa 6c b7 f7 96 5d | a2 3b 23 c8 4a 7c 17 7b 08 d8 db 48 f9 5d 62 1b | 0b 5f d0 c6 c6 a2 28 ed 7c 45 7a f3 33 a6 d2 1f | 29 00 00 24 05 cd b3 b7 f3 87 52 75 9b b2 14 f4 | c3 19 28 f7 78 65 e3 f9 18 22 0f 07 13 10 65 88 | f1 44 b8 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a b5 25 17 f4 1a 4f 2a 05 d2 2d 99 | 3c 89 36 9b 9d 62 ed 5f 00 00 00 1c 00 00 40 05 | ee 9f 85 88 b6 c7 ef c2 a5 c8 d9 f7 7a e7 a6 c3 | 70 03 54 b6 | libevent_free: release ptr-libevent@0x7fb35c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0eac0 | #280 spent 0.0989 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 f7 ab 7c 0b ea 69 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #280 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #280 | rejected packet: | d6 f7 ab 7c 0b ea 69 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #280: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #300 | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #300 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #300 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49669.245046; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500952 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0eac0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #300 | libevent_malloc: new ptr-libevent@0x7fb35c04b850 size 128 "road-eastnet-nonat-48" #300: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #300) | 5a 7e ff 7d 11 39 dd fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 d7 07 3e b9 b2 ed 0a cc c5 e4 47 ac fb df bc | 0b 82 8a 56 1b e7 c2 b9 79 67 f6 05 c1 b0 1a 41 | e0 93 9f 0d bb 5b 76 5f ac 5e ea 5e 58 49 c4 c3 | 9b f8 0e 2d 48 75 fe 88 ae 81 6e bd fc ad 1e 40 | 65 b9 12 2a 8f 3a b5 a4 e3 d6 7e 50 9a b3 12 10 | be 2b 79 8f 29 34 8f 0b 99 4e 4e 7a 4b 49 42 b4 | 04 b2 ac fc ac a3 5a 98 37 17 c3 a2 f0 f0 c9 79 | df 28 17 de 36 02 c0 b4 1b f3 2c 9d ad d8 f6 f4 | c9 44 36 2c 9a 21 d9 68 8c 86 58 41 ae 59 e7 74 | 88 a3 d3 f6 a3 ef 04 07 90 c9 82 f0 a7 49 d9 a4 | 83 0f b0 90 08 f3 eb 02 f4 ec 40 8a 98 92 d5 38 | 7d db 73 c5 6a 66 84 84 0b 3e ba 92 37 b8 31 bd | 61 f6 57 d8 cd fd ab d5 b0 51 b6 0b 3f 5e a3 a5 | 0b 5e 9e c6 f9 0e 39 09 62 b7 fe 88 e1 1e 94 68 | 7e ba 69 87 7e ff 7f 13 a8 f4 7a 0a b2 7e 1c 3c | 9c 70 0e 6e a8 6f 4b 28 4f f5 1d ce 10 46 27 eb | 29 00 00 24 db d2 83 de 45 20 a2 89 40 10 d1 ad | 44 17 5c 15 2b 8f 9e 84 0d 1b 42 0f a9 75 90 ef | 32 25 81 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 9c e3 05 f1 a6 88 c9 89 5f 4a 78 | 8b 60 50 45 77 4b 7a a3 00 00 00 1c 00 00 40 05 | 2b d5 a3 e8 51 d4 0b 1b d6 4d 4a ff ba 69 1c 93 | 2c 16 fd 8b | libevent_free: release ptr-libevent@0x7fb36003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #300 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 7e ff 7d 11 39 dd fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #300 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #300 | rejected packet: | 5a 7e ff 7d 11 39 dd fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #300: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0411 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a855c0 | handling event EVENT_RETRANSMIT for parent state #294 | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #294 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #294 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49669.29836; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001612 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #294 | libevent_malloc: new ptr-libevent@0x7fb36003b0b0 size 128 "road-eastnet-nonat-42" #294: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #294) | 9b 31 1a f8 0f be 39 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 dd 24 24 7c 2f 7c cf af 6d 3e 60 a2 73 ad b0 | 5d e0 ad 29 4b 13 6c 37 66 5f 9c 4f e7 c9 e4 11 | 2c 5d 56 30 72 c8 d6 46 26 66 f5 93 56 d4 c3 52 | 85 cc e5 ae f9 42 b4 ed 60 85 06 0a 66 f5 50 1d | b5 97 c3 6d 71 b4 75 b7 83 18 b1 d3 7d 4a 68 8c | b9 4f df 9f 66 87 ec eb 33 88 de f2 6b c6 ea ab | d0 0d f9 06 34 9c 52 b4 c5 c4 6d 94 39 a8 58 51 | 41 ac 6d 52 08 28 9d f6 37 25 c7 7f 2d 48 ab 90 | f6 30 d2 8b 1b 90 e6 12 18 e0 e2 d4 dc 25 fe 81 | c8 41 3f 06 d9 c6 ce a5 91 8f 50 2b 48 2d e5 59 | 7a 24 e5 58 8b 81 4a bc cb 35 59 84 09 16 ee 2d | ba cf 81 ed 91 57 53 ab 0b 04 8a 27 0b c6 e0 ef | db ab 77 93 c2 db 73 a1 76 37 e1 bf 29 0a 3c 98 | 04 2f f5 e3 ff d0 c3 48 62 42 d2 a6 9f a7 c1 a7 | df e6 f0 e2 49 c7 bb 48 bb b6 1d f0 0e d1 19 d7 | 21 c7 76 5c 49 fc f0 be 36 da d1 aa ec 07 53 22 | 29 00 00 24 c9 1f 43 d3 3e f5 11 59 29 27 36 bb | 9f 07 da f1 c2 4b 17 7e d6 e4 43 b9 54 44 c2 2b | 3a e0 9b 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 60 07 d1 2a 2e 6f e5 7f 13 de a6 | da 25 32 50 d9 e2 97 75 00 00 00 1c 00 00 40 05 | de 91 5e 97 33 cf e4 58 2c 2c f0 43 aa ad 93 60 | ec ee 8a 50 | libevent_free: release ptr-libevent@0x7fb37000f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a855c0 | #294 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9b 31 1a f8 0f be 39 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #294 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #294 | rejected packet: | 9b 31 1a f8 0f be 39 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #294: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47e90 | handling event EVENT_RETRANSMIT for parent state #301 | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #301 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #301 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49669.299633; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50093 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a855c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #301 | libevent_malloc: new ptr-libevent@0x7fb37000f1a0 size 128 "road-eastnet-nonat-49" #301: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #301) | 04 2d 84 e7 d7 11 c2 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 3c a0 2e 05 57 66 74 9e 59 04 02 1e 6b 82 64 | 24 cf 86 32 1b 49 63 31 85 6e 91 96 dd e7 a7 21 | 78 ee 5c 0c 83 da 97 1a 0c 46 69 7c d4 8f 0d 6c | 0b 43 52 49 09 9a 24 da 36 13 01 09 31 88 8b 5b | 38 73 77 00 83 94 ba bf 7c fa 22 16 ff 64 be 16 | 43 df 4f 1d b8 18 88 ee 83 b1 c9 32 ce 1f e3 0d | 40 e4 05 2a 7d 12 64 bf de 51 1d 4c d5 99 11 64 | 9a df 9d ae e7 e1 f9 df 89 9a 5f 11 f6 4b 39 47 | 36 de 08 ec a1 59 7b 84 9f e8 cd af ca a0 8a 29 | aa 2e 7e 1a 1d 88 43 74 5c 19 1a 8f 44 5f 83 95 | cc 00 d8 ee 8f cb 95 29 ae 58 5c 08 01 62 ea 7e | 97 e9 bf 6a 36 31 ba 2d 83 4b 4a ef ce 50 36 44 | 4f a8 a5 8e ad 2c 99 bd c1 01 08 ba ee 5e 1c 63 | 9e 50 96 b6 7a 6e 9f de cf c5 73 a0 7c d6 3d 3a | fe 11 5d 0f 1c cb 4b 02 b4 b1 f7 0c 56 bd a2 fe | d4 f1 da 5a fb cc f5 22 d5 c9 55 2b 49 27 7a 02 | 29 00 00 24 9d f4 32 14 da 15 0d 5d b3 86 88 1b | ed 98 fc e3 a3 7a 35 ba 87 aa 0c 85 93 07 0b 69 | 9d 37 a2 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 4c 33 35 25 dc 8b ec 4f 4f 50 86 | 6f 49 f3 b3 44 40 22 71 00 00 00 1c 00 00 40 05 | d2 03 8c 03 1f b3 ee 14 98 31 7f d2 44 da 50 e8 | 1a 08 5c 44 | libevent_free: release ptr-libevent@0x7fb38800a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47e90 | #301 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 2d 84 e7 d7 11 c2 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #301 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #301 | rejected packet: | 04 2d 84 e7 d7 11 c2 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #301: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0737 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aee100 | handling event EVENT_RETRANSMIT for parent state #281 | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #281 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #281 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49669.309888; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004136 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47e90 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #281 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 "road-eastnet-nonat-29" #281: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #281) | 6e a6 a1 b4 01 a0 0e dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 68 2b 46 8c 2b 9e 7f b4 06 ec 72 36 3a be fa | 50 91 b7 48 61 bc d4 d3 11 dc 1f d6 9a c1 21 a2 | 97 1d cf c0 4e 3d 88 c1 96 35 32 5c c3 c4 b5 d1 | 96 85 b6 1e 34 48 5e 70 e1 97 d1 4d ee c9 36 cd | 07 d4 c1 98 8c 4b f8 c0 2b 58 50 1f 39 3f 7e 62 | c9 4e 54 20 95 c8 4c fc 93 c6 64 05 ff db 54 92 | f9 8c d4 27 f6 69 ac 7b 53 12 4d 7e 22 de e0 4c | 9b 65 6e 55 e2 59 db 77 7d a0 70 9f cd fd b6 7a | 15 79 9a 65 29 97 e4 c6 46 84 7b 52 6e 4e 1b 43 | 80 ec d1 87 3d 75 43 f1 6b 08 60 65 d9 e2 6c 04 | c5 f0 75 0d 72 fe 09 0a a5 0a 64 0c 9d 8e b4 bd | 1a c3 bb 6e f6 92 c0 b5 8c 93 b9 eb e3 12 c7 a1 | bd b7 f3 a0 b9 80 8c 76 59 8f 43 af 0f 58 66 7f | b7 29 f0 c0 1c a1 51 2d c9 c0 ac e0 da 3e 0a fc | dd 42 1f ec 76 07 0c b3 ee 58 80 d8 3b 40 cd 6e | 29 12 48 14 35 22 e0 cf 05 9a 1b 46 91 35 4f 0c | 29 00 00 24 1a c7 00 d3 83 91 04 b5 76 85 d3 69 | a2 08 a9 2c b0 b3 a2 60 be 18 eb 18 2d fd ba 85 | 0c 0a 5c be 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 cf b4 85 53 44 b8 30 db 31 85 32 | 18 7e 13 4c d0 54 13 87 00 00 00 1c 00 00 40 05 | 54 d2 36 85 02 19 96 85 9c 4b 22 1c 55 b4 68 ad | 30 56 22 92 | libevent_free: release ptr-libevent@0x7fb3440251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aee100 | #281 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6e a6 a1 b4 01 a0 0e dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #281 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #281 | rejected packet: | 6e a6 a1 b4 01 a0 0e dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #281: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aeb540 | handling event EVENT_RETRANSMIT for parent state #55 | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #55 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #55 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49669.324217; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009473 exceeds limit? YES "road-eastnet-nonat-55" #55: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-55" #55: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #307 at 0x557d46a1e510 | State DB: adding IKEv2 state #307 in UNDEFINED | pstats #307 ikev2.ike started | Message ID: init #307: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #307: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #307; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-55" #307: initiating v2 parent SA to replace #55 | using existing local IKE proposals for connection road-eastnet-nonat-55 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 307 for state #307 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aee100 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #307 | libevent_malloc: new ptr-libevent@0x7fb3440251c0 size 128 | #307 spent 0.0925 milliseconds in ikev2_parent_outI1() | RESET processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #55 ikev2.ike failed too-many-retransmits | pstats #55 ikev2.ike deleted too-many-retransmits | #55 spent 2.58 milliseconds in total | [RE]START processing: state #55 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-55" #55: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #55: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | crypto helper 15 resuming | crypto helper 15 starting work-order 307 for state #307 | picked newest_isakmp_sa #0 for #55 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 307 "road-eastnet-nonat-55" #55: deleting IKE SA for connection 'road-eastnet-nonat-55' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-55' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-55 | State DB: deleting IKEv2 state #55 in PARENT_I1 | parent state #55: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #55 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 307 time elapsed 0.000542 seconds | libevent_free: release ptr-libevent@0x7fb36c01d920 | (#307) spent 0.544 milliseconds in crypto helper computing work-order 307: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aeb540 | in statetime_stop() and could not find #55 | crypto helper 15 sending results from work-order 307 for state #307 to event queue | scheduling resume sending helper answer for #307 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb374013170 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-55 which received a Delete/Notify but must remain up per local policy | crypto helper 15 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-55" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-55' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-55" | stop processing: connection "road-eastnet-nonat-55" (in initiate_a_connection() at initiate.c:349) | spent 0.0639 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #307 | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 307 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #307 | **emit ISAKMP Message: | initiator cookie: | ae 96 63 e8 bb 6a 85 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-55 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9e 14 ed e9 d6 19 10 2b ec dd 37 28 c8 5c 2b 9d | ikev2 g^x 4d 1c 56 bb af 08 b5 7a 4b a6 fc d3 e6 37 09 e4 | ikev2 g^x 3f 1e 28 12 a3 d4 a0 95 36 fb be 53 ba 61 08 91 | ikev2 g^x a5 59 64 37 32 8f 20 cb c1 4b 24 6f aa 9c 35 eb | ikev2 g^x 55 d5 bc cd 87 7a 12 07 97 e1 3e 1d fe 09 4e 05 | ikev2 g^x 56 a9 36 dd e5 c2 2b 14 24 4c 71 52 b8 4a bc e5 | ikev2 g^x 44 05 b4 12 ae 0a ee 10 63 d4 56 16 75 0e 24 7a | ikev2 g^x d8 3e 40 79 17 42 50 86 a6 54 47 3f a4 b0 ab e0 | ikev2 g^x d2 28 b5 9a 24 3f 4a c2 b0 91 11 3a 15 fb b2 26 | ikev2 g^x f2 b0 63 ef 6f 51 35 98 2f 68 7c a5 78 9f 97 ad | ikev2 g^x 5a 09 af 4c 24 bb dd dc ab e6 24 53 27 3d 9e 03 | ikev2 g^x 62 ad 6c f7 99 7f 86 ec 99 0f d4 42 fa 99 b4 e1 | ikev2 g^x da 5b a4 af 44 6d 6a f4 d7 89 78 8e f4 87 7b 68 | ikev2 g^x 84 5a 7e 9d b0 43 44 70 16 90 a6 1a d2 cc 8f 85 | ikev2 g^x 21 0d 25 8b 92 c7 6a 03 1f 2e 4c a1 00 a9 05 b1 | ikev2 g^x b5 20 9b fc 87 43 c1 10 a6 42 8f 4d 15 f7 48 a2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9a 25 60 c3 7e e3 91 a3 9d b3 07 0f ff 92 da ab | IKEv2 nonce 25 95 17 32 0d 82 17 4c 51 9e de a9 5d 92 35 93 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ae 96 63 e8 bb 6a 85 de | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 37 | natd_hash: port= 01 f4 | natd_hash: hash= 7b e0 88 15 5c bc 20 c5 96 41 9f 3a 7e ef 58 59 | natd_hash: hash= 98 52 f8 6e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7b e0 88 15 5c bc 20 c5 96 41 9f 3a 7e ef 58 59 | Notify data 98 52 f8 6e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ae 96 63 e8 bb 6a 85 de | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 92 3b 5d d1 4e 37 91 81 a5 d6 c2 94 c8 33 2c 33 | natd_hash: hash= 6a d3 7b 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 92 3b 5d d1 4e 37 91 81 a5 d6 c2 94 c8 33 2c 33 | Notify data 6a d3 7b 36 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #307 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #307: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #307 to 4294967295 after switching state | Message ID: IKE #307 skipping update_recv as MD is fake | Message ID: sent #307 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-55" #307: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.55:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #307) | ae 96 63 e8 bb 6a 85 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 14 ed e9 d6 19 10 2b ec dd 37 28 c8 5c 2b 9d | 4d 1c 56 bb af 08 b5 7a 4b a6 fc d3 e6 37 09 e4 | 3f 1e 28 12 a3 d4 a0 95 36 fb be 53 ba 61 08 91 | a5 59 64 37 32 8f 20 cb c1 4b 24 6f aa 9c 35 eb | 55 d5 bc cd 87 7a 12 07 97 e1 3e 1d fe 09 4e 05 | 56 a9 36 dd e5 c2 2b 14 24 4c 71 52 b8 4a bc e5 | 44 05 b4 12 ae 0a ee 10 63 d4 56 16 75 0e 24 7a | d8 3e 40 79 17 42 50 86 a6 54 47 3f a4 b0 ab e0 | d2 28 b5 9a 24 3f 4a c2 b0 91 11 3a 15 fb b2 26 | f2 b0 63 ef 6f 51 35 98 2f 68 7c a5 78 9f 97 ad | 5a 09 af 4c 24 bb dd dc ab e6 24 53 27 3d 9e 03 | 62 ad 6c f7 99 7f 86 ec 99 0f d4 42 fa 99 b4 e1 | da 5b a4 af 44 6d 6a f4 d7 89 78 8e f4 87 7b 68 | 84 5a 7e 9d b0 43 44 70 16 90 a6 1a d2 cc 8f 85 | 21 0d 25 8b 92 c7 6a 03 1f 2e 4c a1 00 a9 05 b1 | b5 20 9b fc 87 43 c1 10 a6 42 8f 4d 15 f7 48 a2 | 29 00 00 24 9a 25 60 c3 7e e3 91 a3 9d b3 07 0f | ff 92 da ab 25 95 17 32 0d 82 17 4c 51 9e de a9 | 5d 92 35 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b e0 88 15 5c bc 20 c5 96 41 9f 3a | 7e ef 58 59 98 52 f8 6e 00 00 00 1c 00 00 40 05 | 92 3b 5d d1 4e 37 91 81 a5 d6 c2 94 c8 33 2c 33 | 6a d3 7b 36 | state #307 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3440251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aee100 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aee100 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #307 | libevent_malloc: new ptr-libevent@0x7fb36c01d920 size 128 | #307 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49669.325552 | resume sending helper answer for #307 suppresed complete_v2_state_transition() and stole MD | #307 spent 0.507 milliseconds in resume sending helper answer | stop processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb374013170 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 96 63 e8 bb 6a 85 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #307 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #307 | rejected packet: | ae 96 63 e8 bb 6a 85 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 37 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #307: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0576 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24700 | handling event EVENT_RETRANSMIT for parent state #261 | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #261 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #261 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49669.339761; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003973 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aeb540 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #261 | libevent_malloc: new ptr-libevent@0x7fb374013170 size 128 "road-eastnet-nonat-9" #261: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #261) | 8b 59 1f 5e 29 ec 79 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 16 bb 69 7b 8c de a9 f0 aa 27 22 0c 50 1e 2b | c0 76 0c 79 99 31 2f f3 35 0b 93 05 6b 25 af d5 | 38 8a 63 51 f1 c7 93 6d 58 cf aa 10 dd 75 1f c8 | 55 42 4b ca 64 4b 8f 25 43 c0 98 a7 58 2f fe 43 | a0 fc e9 fe 8a 4f d9 62 8e db b8 54 42 5d 72 29 | 3d 08 a8 8c 4e d1 f1 b8 76 cf b0 d0 a2 dc ae 18 | 1b 5a 75 da 49 ca 9e c2 09 0d fb 74 50 88 ed a4 | d6 99 da c7 fb 22 1c 94 60 ac 50 76 4c a1 38 f1 | 43 ce 44 aa e7 39 3c 86 9e e1 41 54 48 c3 cb 31 | 48 d9 d1 19 bc cb 0b cc 7d 40 bf 96 af 1e df fb | 0f 62 79 6b f0 8e 05 4f 2e a0 3c cd 46 16 0c 86 | 49 e9 a6 e2 c2 86 c5 8e b2 14 0a be c1 f8 73 ee | bb d0 d9 50 52 32 c3 fa f2 3b b2 ca cc 8c 24 54 | 79 d5 c7 d3 1b 32 b7 28 de dd a1 c3 34 b8 54 c4 | ba 19 90 3e 1a d6 84 33 38 8c c1 45 94 fb 96 9e | 19 4c cd 4d d5 73 7e e1 8a 56 34 ce ca da 7f ec | 29 00 00 24 09 67 1c 9d 6c 7a 1d eb 24 78 5e 1f | a5 24 7e 35 ac a5 c4 f9 a0 f3 f8 63 91 47 e2 76 | a1 4d 73 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 76 e0 4e 77 d9 cf 89 73 cb 13 92 | b0 28 c4 2a 76 4e 4e 20 00 00 00 1c 00 00 40 05 | 7b 1f d5 2f e3 dc 02 0a cf 5f 34 da 40 53 6d 9d | 9b 7e 60 b7 | libevent_free: release ptr-libevent@0x7fb344035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24700 | #261 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 59 1f 5e 29 ec 79 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #261 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #261 | rejected packet: | 8b 59 1f 5e 29 ec 79 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #261: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab39c0 | handling event EVENT_RETRANSMIT for parent state #302 | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #302 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #302 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49669.366033; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500653 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #302 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 "road-eastnet-nonat-50" #302: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #302) | 9a b7 d9 69 b7 b5 8b 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 3b 38 5a ca c1 e0 66 18 62 3b 15 6c b6 3b d4 | d7 ad 95 64 47 60 48 b5 a1 40 89 ca 34 68 f4 5c | b5 12 b3 25 90 eb 49 eb b5 40 df ef 79 a7 f8 11 | fd 6b 8c b7 57 dd 67 6c a2 67 a7 4f be 73 1c 93 | d0 14 73 9b 52 53 0b 4e 5f f6 38 f3 b8 8b db d1 | 1c 9f 4f 10 7c 2c fa b8 0b 5c b4 6b 80 d0 b7 e3 | b6 70 3b 9c d9 ad f0 38 ba 59 1a 5a 32 60 56 90 | 00 97 ec 2a 32 4c ce 8c d0 a5 94 f1 33 fd e4 3c | bb e9 7f cc 0d 4c 4c be 2b f0 80 18 d5 0b e3 68 | da 32 8d 6f 53 ff 6f c4 bc c7 44 a5 1e 56 ed 9a | 22 1a 47 85 cc bb d8 71 12 33 c9 06 fb bd 86 04 | 8a 5e c6 10 00 05 dc db 1a ce ef c2 9a df 5b 3e | f1 94 44 f2 93 b5 45 ee f4 39 f1 54 d0 08 74 2f | 98 02 e6 14 93 d3 55 70 9b c1 5c 0a 6d f7 72 e9 | 7a 20 75 0d 8a 45 81 c5 cd 4a 79 7e 2a a7 cf ed | b9 84 dc 2f 1f b1 1b 47 62 4c ef 36 89 f7 2e e1 | 29 00 00 24 4e 70 94 e8 7e 52 b9 fd e3 7f cf aa | b8 11 eb 44 2a e9 8b 91 cb 46 0f b2 fd 17 ad 44 | 7e 6a 9e 6e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 54 86 00 1a 73 2d f1 8e 31 28 7e 7f | 4e 1d 05 b3 46 7f 2d d6 00 00 00 1c 00 00 40 05 | e4 ea 9a e9 78 75 4e 5e 40 77 76 74 52 35 fb 06 | 70 d7 5d cd | libevent_free: release ptr-libevent@0x7fb384048950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab39c0 | #302 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a b7 d9 69 b7 b5 8b 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #302 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #302 | rejected packet: | 9a b7 d9 69 b7 b5 8b 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #302: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12c40 | handling event EVENT_RETRANSMIT for parent state #295 | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #295 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #295 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49669.379387; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001162 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab39c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #295 | libevent_malloc: new ptr-libevent@0x7fb384048950 size 128 "road-eastnet-nonat-43" #295: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #295) | 11 ea 13 a7 2a b1 5c 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 c0 f3 39 06 15 d7 07 8e 11 b6 9a 6e 2d b3 34 | 66 03 a5 c2 e2 1f 37 32 46 97 6f cd af d0 2f 18 | 5f 75 66 e4 a1 42 12 53 5e 16 d8 3a 31 65 02 6a | c5 e3 cc f7 d2 22 a4 aa ae 02 3c 06 f6 0c fe fa | e4 54 02 04 c7 56 0a b1 39 1c 79 77 c9 da 62 93 | 00 7e f1 cc 8f 9d de 33 24 4e 12 09 b8 73 ad 99 | 9d bd 21 4e 12 37 5e 79 f1 fe 24 ac 36 8f 56 b3 | d6 c7 5b 74 f8 84 56 d2 c9 9a 89 80 ba ca fa 63 | 61 ef b2 49 26 8d 16 1c 9e 9b a5 d0 8c b1 11 4d | 74 c3 30 50 82 5e f2 2c 5e 21 4f 59 50 07 97 4a | 3b 99 d0 83 20 16 83 be 15 cb 08 01 be 88 1e c0 | 56 de 78 28 a9 82 d7 99 3a 47 be b7 57 13 4d ef | 18 8f 0d 23 65 69 63 f7 5c af 9a 31 54 69 e3 c6 | e4 81 15 9e a2 7e 90 55 50 a1 5a e2 6d 42 36 72 | e6 93 98 8d ab 65 9b 8b b9 2a 79 2b 2d c9 0f 1f | c1 03 48 63 1c 2b 7c f0 db 5a 0a 3e b5 46 b8 79 | 29 00 00 24 64 9e 8b 02 14 e8 a7 dc 3f 42 d2 c4 | 8f dc b3 ff fc 4c fe 98 93 e9 8f 76 eb 2b 38 f4 | b9 5a a0 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c a5 c7 ec 4b 7a cd c4 3e f0 86 6d | ec 0c 21 f9 74 06 3e 81 00 00 00 1c 00 00 40 05 | 6b d7 31 2e aa f4 5b 2c dc 79 88 ab 6c 34 fc ce | 20 91 9b 02 | libevent_free: release ptr-libevent@0x7fb380011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c40 | #295 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 ea 13 a7 2a b1 5c 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #295 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #295 | rejected packet: | 11 ea 13 a7 2a b1 5c 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #295: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acab40 | handling event EVENT_RETRANSMIT for parent state #282 | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #282 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #282 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49669.399685; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002489 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c40 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #282 | libevent_malloc: new ptr-libevent@0x7fb380011f30 size 128 "road-eastnet-nonat-30" #282: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #282) | 46 9b 20 9a e5 8e c3 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 4a 4a 05 a5 e8 31 07 19 01 9a 3a 84 bd 00 2c | 01 26 e2 35 38 1d c2 10 27 23 65 e5 d1 d5 9e 9d | 93 4a 85 e7 79 d0 00 1e a3 c9 7f d0 87 96 13 32 | 3a 52 f9 aa fd 75 0f 57 d6 53 8b a2 5b 2a a9 29 | 20 47 1e e0 f6 79 b4 a2 d0 fd e2 85 9e 06 b0 c5 | 1f eb f9 ce 36 69 1b 53 58 8d aa 02 dd a3 93 19 | 8b 0f e6 94 85 c6 21 ed 47 d3 f5 ea 66 43 13 82 | da f0 e0 63 f7 98 28 5e a4 cb 20 f6 07 ee ef 26 | 67 cb 7a 06 89 6a a0 7d 08 f6 7d ba 27 41 9f 3f | f9 0e 8b 4e f2 9a 91 05 9e 11 34 81 a4 96 af ee | 90 6f f6 67 88 78 72 a1 94 39 66 b1 22 8d 82 7c | 2e db f6 a2 5d 7b a6 60 14 74 1c b3 6d 80 df 10 | f8 59 91 7e 94 04 39 3a 04 77 10 6d 00 3c a4 c9 | 37 8a d9 0b 42 ad 9c 7e 79 d0 0a 68 7a d1 19 02 | 3f 63 fb b2 47 d4 e3 0d 1d 5d 62 cd 37 80 af a2 | 0b a2 8f e1 3f b9 34 fc d9 39 c1 27 65 16 8f 01 | 29 00 00 24 43 cb 25 08 9c 10 6d 8d e0 8b af 6b | 30 64 58 bc 44 4b 07 d1 a3 b6 7d 77 46 d8 bf 81 | 62 ff 7f 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f cf c8 c3 31 5e 18 fc ce 9a 0d be | ec 9d b8 d1 d8 fa d9 18 00 00 00 1c 00 00 40 05 | 91 0b 3b 5a da ea f5 67 3e 89 32 94 c9 4e eb eb | e4 06 4e d6 | libevent_free: release ptr-libevent@0x7fb37c046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab40 | #282 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 9b 20 9a e5 8e c3 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #282 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #282 | rejected packet: | 46 9b 20 9a e5 8e c3 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #282: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #56 | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #56 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #56 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49669.413968; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007507 exceeds limit? YES "road-eastnet-nonat-56" #56: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-56" #56: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #308 at 0x557d46a1fad0 | State DB: adding IKEv2 state #308 in UNDEFINED | pstats #308 ikev2.ike started | Message ID: init #308: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #308: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #308; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-56" #308: initiating v2 parent SA to replace #56 | using existing local IKE proposals for connection road-eastnet-nonat-56 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 308 for state #308 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46acab40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #308 | libevent_malloc: new ptr-libevent@0x7fb37c046040 size 128 | #308 spent 0.074 milliseconds in ikev2_parent_outI1() | crypto helper 19 resuming | crypto helper 19 starting work-order 308 for state #308 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 308 | RESET processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #56 ikev2.ike failed too-many-retransmits | pstats #56 ikev2.ike deleted too-many-retransmits | #56 spent 2.52 milliseconds in total | [RE]START processing: state #56 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-56" #56: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #56: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #56 "road-eastnet-nonat-56" #56: deleting IKE SA for connection 'road-eastnet-nonat-56' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-56' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-56 | State DB: deleting IKEv2 state #56 in PARENT_I1 | parent state #56: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #56 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb358009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | in statetime_stop() and could not find #56 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-56 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 308 time elapsed 0.000935 seconds | (#308) spent 1.02 milliseconds in crypto helper computing work-order 308: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 308 for state #308 to event queue | scheduling resume sending helper answer for #308 | libevent_malloc: new ptr-libevent@0x7fb3680125d0 size 128 | start processing: connection "road-eastnet-nonat-56" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-56' +POLICY_UP | crypto helper 19 waiting (nothing to do) | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-56" | stop processing: connection "road-eastnet-nonat-56" (in initiate_a_connection() at initiate.c:349) | spent 0.108 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #308 | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 308 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #308 | **emit ISAKMP Message: | initiator cookie: | 80 0a 88 98 4b f9 e7 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-56 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 97 60 f0 11 1d 6f 3c e8 3a d0 c5 a1 1f 8b f6 d6 | ikev2 g^x b8 1e e6 d3 27 fa 35 0f 2e 35 7c 6a ac 4d b0 5a | ikev2 g^x 6b 0b 3b 4a 46 9a c1 e4 d2 3d 95 4c 54 c7 f8 b0 | ikev2 g^x a3 25 b2 e5 19 52 cf a8 80 64 9a 61 44 3f 5d 89 | ikev2 g^x b3 ab 84 f7 4d 8d 5e c3 d5 83 26 99 08 7b 56 8e | ikev2 g^x d5 6a c7 4a 76 f4 45 38 3c fa 31 64 fb a7 68 c6 | ikev2 g^x c9 63 22 21 ab 35 5e 58 62 e8 99 25 ff 5b 61 ec | ikev2 g^x 55 a2 5b 36 cc 02 da 3b ef 08 f7 a5 b1 e6 33 04 | ikev2 g^x 63 ee 2e 9b fc 5a 62 eb 0d 0f da ab 7c b3 2f f6 | ikev2 g^x 1d 06 62 78 d0 f2 08 dd bd 5a f1 dc aa 18 b1 3b | ikev2 g^x 54 75 36 28 b8 4d f2 e6 89 e0 6c 9d a4 f4 71 27 | ikev2 g^x 99 51 48 e8 63 85 2b 41 07 00 9f 7b ff df b2 6f | ikev2 g^x 90 1f ac 1e 28 94 ef cf 9a 1c cf 53 7f 88 76 ba | ikev2 g^x 31 4b 32 29 7d 41 fd ba 51 dd cc 44 b9 6c 4f e1 | ikev2 g^x cf 89 c3 39 c3 eb 26 5a 05 e3 ac c1 a6 d7 ca ae | ikev2 g^x 7d 27 a2 0d 12 e5 de 71 e2 d1 95 9c b5 ec 14 d8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d3 c9 38 16 a4 35 41 62 ad 53 1d 3f a5 70 61 f3 | IKEv2 nonce 55 11 e2 06 85 67 55 51 bd 50 94 8d 80 2d 38 49 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 80 0a 88 98 4b f9 e7 1d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 38 | natd_hash: port= 01 f4 | natd_hash: hash= e6 1c df ea ba 44 23 ff a6 53 af 56 8c 58 68 ea | natd_hash: hash= 71 49 69 6d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e6 1c df ea ba 44 23 ff a6 53 af 56 8c 58 68 ea | Notify data 71 49 69 6d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 80 0a 88 98 4b f9 e7 1d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 14 0c bd d4 4b a2 ff 28 87 d9 dd 83 a7 c2 2b 61 | natd_hash: hash= 5c 8c 59 cd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 14 0c bd d4 4b a2 ff 28 87 d9 dd 83 a7 c2 2b 61 | Notify data 5c 8c 59 cd | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #308 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #308: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #308 to 4294967295 after switching state | Message ID: IKE #308 skipping update_recv as MD is fake | Message ID: sent #308 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-56" #308: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.56:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #308) | 80 0a 88 98 4b f9 e7 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 60 f0 11 1d 6f 3c e8 3a d0 c5 a1 1f 8b f6 d6 | b8 1e e6 d3 27 fa 35 0f 2e 35 7c 6a ac 4d b0 5a | 6b 0b 3b 4a 46 9a c1 e4 d2 3d 95 4c 54 c7 f8 b0 | a3 25 b2 e5 19 52 cf a8 80 64 9a 61 44 3f 5d 89 | b3 ab 84 f7 4d 8d 5e c3 d5 83 26 99 08 7b 56 8e | d5 6a c7 4a 76 f4 45 38 3c fa 31 64 fb a7 68 c6 | c9 63 22 21 ab 35 5e 58 62 e8 99 25 ff 5b 61 ec | 55 a2 5b 36 cc 02 da 3b ef 08 f7 a5 b1 e6 33 04 | 63 ee 2e 9b fc 5a 62 eb 0d 0f da ab 7c b3 2f f6 | 1d 06 62 78 d0 f2 08 dd bd 5a f1 dc aa 18 b1 3b | 54 75 36 28 b8 4d f2 e6 89 e0 6c 9d a4 f4 71 27 | 99 51 48 e8 63 85 2b 41 07 00 9f 7b ff df b2 6f | 90 1f ac 1e 28 94 ef cf 9a 1c cf 53 7f 88 76 ba | 31 4b 32 29 7d 41 fd ba 51 dd cc 44 b9 6c 4f e1 | cf 89 c3 39 c3 eb 26 5a 05 e3 ac c1 a6 d7 ca ae | 7d 27 a2 0d 12 e5 de 71 e2 d1 95 9c b5 ec 14 d8 | 29 00 00 24 d3 c9 38 16 a4 35 41 62 ad 53 1d 3f | a5 70 61 f3 55 11 e2 06 85 67 55 51 bd 50 94 8d | 80 2d 38 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 1c df ea ba 44 23 ff a6 53 af 56 | 8c 58 68 ea 71 49 69 6d 00 00 00 1c 00 00 40 05 | 14 0c bd d4 4b a2 ff 28 87 d9 dd 83 a7 c2 2b 61 | 5c 8c 59 cd | state #308 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c046040 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46acab40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #308 | libevent_malloc: new ptr-libevent@0x7fb358009640 size 128 | #308 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49669.415727 | resume sending helper answer for #308 suppresed complete_v2_state_transition() and stole MD | #308 spent 0.471 milliseconds in resume sending helper answer | stop processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3680125d0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 0a 88 98 4b f9 e7 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #308 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #308 | rejected packet: | 80 0a 88 98 4b f9 e7 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 38 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #308: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12bc0 | handling event EVENT_RETRANSMIT for parent state #262 | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #262 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #262 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49669.442904; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004083 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #262 | libevent_malloc: new ptr-libevent@0x7fb3380407f0 size 128 "road-eastnet-nonat-10" #262: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #262) | 6c b6 05 ad 53 aa 46 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 71 41 19 2f e2 7d 30 6b 4e a1 e7 5c d2 fe 4f | e0 61 ad 09 53 0e a0 57 08 e6 8a c7 a8 ab 86 63 | b8 6a 7f 66 41 dd b7 63 7a df 2e dc eb 44 db ac | 84 60 8a 30 6d a6 8e c8 9b e0 4a d0 70 9a 6f d7 | 2b c0 d7 cf ec 52 70 50 23 5f 91 08 50 21 38 8b | 76 60 df cc d7 e8 a2 a1 14 d7 95 47 31 84 95 aa | a3 81 92 3c a4 0d 4b 28 d7 90 8d 56 f9 3c bf bc | 84 88 bc cf 92 1a d8 6c 91 60 d7 c8 53 4c 8f 1b | 33 3d 36 12 cc 21 af 62 59 3d a6 91 f5 8f 40 b1 | 5e 20 75 cb 09 ce 69 22 f7 ce 4e 56 bd 5c 4e 69 | 85 a0 6f 08 1d 3c a0 71 93 00 3c 05 be a2 5e a3 | 18 1e 44 5a 4d ed 58 8b 10 8f 38 84 6b ea 6f 25 | 2a 8f 86 0f 8b b5 6e ce 72 db 55 37 c3 3e 68 45 | 52 fb fc c3 b0 3a 37 24 8c 65 c9 ec 5e 24 2b c3 | 69 bc 27 c7 b0 7f 81 12 a0 6d 38 e6 33 39 b8 2c | 2a b9 3c 7a 5e 19 74 c7 ec ac 4b b5 b2 ea 83 d8 | 29 00 00 24 a4 15 8c 3a a3 1b 1e b6 c4 22 d7 fc | ab 68 38 21 36 11 f7 0b d4 9b 74 fb 1e 21 f2 3a | 1b 0d d1 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 64 14 a1 e8 e4 eb 96 cf 02 78 71 | fb d0 4f 54 fd 2f 47 94 00 00 00 1c 00 00 40 05 | f3 5b 09 5c ae 75 15 23 50 5d 21 6a e9 8d 68 9d | ed b0 04 c4 | libevent_free: release ptr-libevent@0x7fb36800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12bc0 | #262 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c b6 05 ad 53 aa 46 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #262 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #262 | rejected packet: | 6c b6 05 ad 53 aa 46 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #262: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25c40 | handling event EVENT_RETRANSMIT for parent state #296 | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #296 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #296 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49669.444136; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002643 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12bc0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #296 | libevent_malloc: new ptr-libevent@0x7fb36800cf80 size 128 "road-eastnet-nonat-44" #296: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #296) | 1c da 2e ac 4a 99 24 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 2a 4d fb 46 1d b7 c4 96 00 b1 66 99 7e ce 3b | 3f 48 6e 8c 76 bd 25 cd 72 f7 15 4a f9 69 ef 13 | 61 8a 19 db 25 90 81 55 08 5a cc 41 41 e5 ab d4 | 92 10 f9 d6 8d 49 ef 3f b0 9e f2 80 9b 7b 70 6e | a9 61 7d e0 84 75 fd d1 46 6c 42 61 66 ee 24 20 | 73 fa d1 4c 21 9e a9 c7 16 a9 b3 6f aa 78 ac 00 | 78 f4 c3 83 9c c4 9a 92 64 af b4 ed 81 ba ac a2 | f1 41 08 3e c1 2f b1 ba 03 49 e2 bf 7f db 95 66 | 30 1e c5 ba 28 dd ee 71 21 42 41 ca af c4 be d2 | 90 1d aa 94 fa 3e 05 ce 17 28 d8 85 00 b7 a3 6c | d2 a6 c4 12 ee 02 b6 a5 47 f5 e8 05 85 3f 07 9b | aa 0d 4f 57 c3 15 b2 47 ad f5 11 0a f7 29 da c6 | 9c 86 0c 08 6b ec 00 4d b0 6e 72 d1 b7 c3 86 c8 | 85 d9 c3 07 c3 a7 58 91 99 ee d7 82 f7 95 cb 56 | c0 48 0c 04 c6 c9 83 ce b6 aa 4e 64 f0 9f 73 46 | e9 f5 bb 10 78 a8 77 4a 7b da 32 8f 23 90 cf 6d | 29 00 00 24 ce d0 75 80 6d 1e 36 8f b6 81 e0 37 | 25 cc b5 c9 b7 8f 97 4d 1e ae eb 17 23 86 66 d2 | cc 2a b8 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 83 86 3f b2 b5 92 3c 02 7f 1a c2 | 45 4d 9a 24 f1 5a 66 8d 00 00 00 1c 00 00 40 05 | 7c cb b6 c5 ee bc 2b a0 53 bb 77 45 86 3e ca 93 | 1e 2d 97 d8 | libevent_free: release ptr-libevent@0x7fb35400f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c40 | #296 spent 0.0975 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c da 2e ac 4a 99 24 d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #296 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #296 | rejected packet: | 1c da 2e ac 4a 99 24 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #296: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0397 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac1340 | handling event EVENT_RETRANSMIT for parent state #303 | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #303 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #303 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49669.445368; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500546 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #303 | libevent_malloc: new ptr-libevent@0x7fb35400f1a0 size 128 "road-eastnet-nonat-51" #303: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #303) | 0b e0 0a 79 39 06 c6 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 24 21 b4 0b e3 09 db 3f b6 a5 77 bb 87 5e ad | 66 c7 93 9a 8c 2e 04 3b 08 20 ac 03 a5 76 12 ab | b6 66 99 c7 bf 97 92 b1 32 f2 d4 40 1d 20 9f 0b | 85 c0 47 40 73 82 3c 97 59 5e 7a bf 29 1b 9b 33 | 65 e1 1d e1 06 4b 23 bb cd c3 d7 6f 1f 4d 6a d4 | a5 35 47 13 70 43 5f 27 3f e8 8d 45 36 1b 13 e8 | 52 7a c9 fd 4e c5 bf df 1d ad 19 77 99 5f 83 de | fd ac 63 24 8e b6 c0 c8 ec b2 56 6f 38 d9 99 06 | 17 b7 7e be be 8d 7f 5c 2d b1 d6 35 c6 26 88 21 | 6c 47 69 c2 4b 86 0c 66 51 e7 f5 2d 4c fb e5 79 | 2e e4 ba 11 88 c3 1e d5 cd ce 6d 00 ed f9 6c 2a | 2b 8c 48 d8 fb b0 3c 63 91 8e ae 31 9b af bf 15 | 0b 41 67 9d 12 12 70 9c 8c c1 6a db fc d2 6b 50 | c9 fa d7 b3 18 db 4f f1 d7 45 f6 0f b9 6e 33 c9 | 52 60 cc f3 be 3c 22 f0 a3 35 db d2 db d6 a6 94 | 52 18 e2 de 57 43 68 d8 7b eb ec 67 cd ed 35 3d | 29 00 00 24 80 ff 8a 78 69 ce 7f 51 87 5f 84 ba | c7 a1 f0 8c ea cb 68 68 e4 3e 06 9f 5c 43 cc 06 | 85 44 5c 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 50 a2 4e fc 4d 1b 58 77 6d e9 3b | 74 ac 43 c3 0f 7e 66 e7 00 00 00 1c 00 00 40 05 | d9 44 30 c1 08 7f 7e c4 16 be af c3 f1 e2 c1 72 | 14 da 79 2d | libevent_free: release ptr-libevent@0x7fb35c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac1340 | #303 spent 0.0832 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b e0 0a 79 39 06 c6 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #303 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #303 | rejected packet: | 0b e0 0a 79 39 06 c6 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #303: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #283 | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #283 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #283 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49669.476605; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002782 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac1340 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #283 | libevent_malloc: new ptr-libevent@0x7fb35c035930 size 128 "road-eastnet-nonat-31" #283: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #283) | 6d 25 6c e9 9d 21 2c 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b e9 86 64 c6 6f 55 a3 bc 52 39 e5 45 42 b6 cc | f2 a4 d8 e4 d7 c3 31 05 04 56 63 c6 c2 26 bf 59 | 6a b9 a8 fc fa 31 7a 57 4f f1 c0 49 83 9c 61 f6 | ea 6e c3 47 87 15 57 34 67 e5 10 86 61 2d 48 bc | 65 9e 10 ea 92 ad c9 b9 04 73 b8 2e a2 d6 b3 0a | c0 be 8f 2a 6c 99 ba 2f e9 4c 9e ba 98 ae c9 a2 | 11 55 c6 05 57 8e ab ea fe ab c0 66 94 91 31 6d | 5a 61 9a c2 11 87 93 ed bf 92 59 c4 b9 84 ce ab | db 12 40 39 53 0e ae d0 f2 e5 17 3c ea 18 98 24 | 12 e5 c0 95 86 ac ec 82 ab 81 6f 9e 62 08 73 b9 | a8 9d e0 0f 7d f3 2e 0b 7e 07 bc 19 99 3e 51 81 | 29 43 73 f2 dc b1 11 40 fd 25 79 3c 57 b5 ab be | 2e e1 68 18 e4 38 d8 a0 4c 8c 74 5e ff df de 09 | df 96 78 f3 4d 4d f6 30 46 ec df 31 2f 74 61 0b | 81 46 62 97 97 55 58 f5 2a c4 6f df 71 dd ee 98 | ae ac aa b2 0f 96 9a 79 9a bd 7e 1b 8b 95 fc 2d | 29 00 00 24 19 7a 94 41 a3 df 39 c8 6e b5 7e 75 | da 2c b2 db 58 bf cc 1e 51 b1 c7 de c1 0f 32 c8 | 22 50 94 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 90 7d 87 8b 25 a9 47 ca 59 98 98 | 30 6c 9b 73 ee 84 48 a4 00 00 00 1c 00 00 40 05 | 6c 03 cb 30 07 ff 71 63 de 15 87 b9 5c 0f 43 de | 70 36 3d ec | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #283 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 25 6c e9 9d 21 2c 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #283 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #283 | rejected packet: | 6d 25 6c e9 9d 21 2c 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #283: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0793 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #304 | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #304 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #304 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49669.510004; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501293 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #304 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 "road-eastnet-nonat-52" #304: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #304) | a8 9e ad f8 7e d0 8f 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 65 f7 e5 5b 0c d9 66 1f 9e de 27 b7 a9 e5 61 | e4 fa 1d ab 7c 97 a1 bd 20 9d f3 a2 b5 27 bd 1f | 8f a0 e6 70 97 5a a5 25 66 20 75 9f 12 5d d3 39 | 9b 63 a2 db 2b 74 35 c0 72 13 97 27 05 c2 62 b9 | e3 8d 4c df 62 26 b2 ef 71 4f 57 9f 86 a7 ae 23 | 96 73 f6 29 74 fa 2e d9 85 44 9e f4 6e a1 bf c3 | aa ee d5 e9 ef ed b7 f6 19 80 49 92 25 03 a6 fd | 97 ad 05 c1 4c ee d0 28 55 8e 3c fe 56 3a de 43 | 58 54 9b db 87 cd a3 da 37 73 a4 bf 3c b5 ae e4 | 24 52 70 fc 3d a8 8c fa 47 49 00 40 14 e1 2e ac | c2 2a 40 fe b6 ab ac c0 48 61 8f e7 d0 5a d3 f9 | ee 88 91 3d 36 46 3b a6 d1 44 56 83 2a 21 0b 8c | bf 71 69 ea 58 fa fe b7 82 58 cb 6d 26 3b 79 12 | d5 7b af 2b 0b 68 46 9e 23 40 da 39 fc 30 e7 9e | 96 5b ef fa 83 ac 69 ef e9 6f 36 21 f5 e9 e9 e7 | 28 93 fa 84 b2 62 19 86 19 c7 09 bf 96 a9 13 fa | 29 00 00 24 01 38 84 c9 86 37 f1 ee b2 c5 1a 16 | 9c 76 d6 78 f3 8e 1b 3e 7b e2 b1 ac 57 81 00 ff | be 40 7b 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 4d a8 e4 29 87 92 f9 c9 e0 47 d4 | 8d 2b 33 0e 7e 88 7a bd 00 00 00 1c 00 00 40 05 | 14 10 d4 5f c4 9e a3 33 92 fb 64 77 06 27 8a 6c | e3 d6 b0 88 | libevent_free: release ptr-libevent@0x7fb36c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #304 spent 0.184 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 9e ad f8 7e d0 8f 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #304 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #304 | rejected packet: | a8 9e ad f8 7e d0 8f 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #304: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0721 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aba600 | handling event EVENT_RETRANSMIT for parent state #297 | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #297 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #297 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49669.511374; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001153 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #297 | libevent_malloc: new ptr-libevent@0x7fb36c00cf80 size 128 "road-eastnet-nonat-45" #297: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #297) | e1 41 d2 51 2f 25 d9 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 ea 0d 0b 39 8c c1 99 18 5a a8 8a 8f 5d 3d 22 | 46 42 ee 49 5d 81 c3 87 32 80 3d 42 65 0e 28 54 | e6 12 c3 e6 03 86 ad ca e9 ea 65 ce 14 e5 73 46 | 61 07 3a 7c 00 7f 71 ec 17 17 d4 44 37 36 26 7a | 8c 65 4b 5e 2f d6 31 47 0e b3 55 90 e6 1c cb 77 | 1c 6d 58 27 57 b3 27 ff b6 e1 e9 7d 1b 10 c2 48 | 70 f7 e7 1e 31 56 ab cf ae 38 32 b8 65 81 ac 00 | 4e 9d 3a 6c 2c 1d fb a6 ff a6 c5 15 4a d1 e9 8c | f6 3b 4a 4d e5 6a 3d e0 b2 a1 f4 29 63 27 5f 0f | 08 89 9b 00 9b 1b 1f 8e 12 d3 c4 4f 3e 13 f5 a5 | 9c 44 af 0f 10 29 67 15 0d b9 b4 26 98 5d 9e 81 | d4 78 c2 73 92 2e 97 4c 48 13 99 b5 01 42 7a 4a | aa bb 3e f2 96 18 19 79 ab c3 39 3b ba ba b8 0b | 06 4a 68 91 6a ff 80 ba f0 6f 51 cd 71 94 91 9b | 14 d1 d2 23 7f bc a7 08 5b 2f eb 14 51 51 4a 55 | ca 92 da a2 1f 6e 9a 88 d0 9b 68 b4 59 e4 e6 5b | 29 00 00 24 a5 fe b0 e3 a2 f4 1f f6 10 ff b8 23 | 13 cf c1 54 86 87 d9 95 be 21 30 83 5b ee 54 e5 | 86 f0 89 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 30 e2 49 c0 1b 21 8e cb 56 2f 44 | 75 d2 75 93 97 72 cd 45 00 00 00 1c 00 00 40 05 | ed 4e b6 34 59 cc 9b 96 b2 cc cc ed 70 1c 55 bb | 38 17 6f fc | libevent_free: release ptr-libevent@0x7fb378014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aba600 | #297 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b07dc0 | handling event EVENT_RETRANSMIT for parent state #57 | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #57 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #57 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49669.511546; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.003706 exceeds limit? YES "road-eastnet-nonat-57" #57: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-57" #57: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #309 at 0x557d46a21090 | State DB: adding IKEv2 state #309 in UNDEFINED | pstats #309 ikev2.ike started | Message ID: init #309: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #309: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #309; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-57" #309: initiating v2 parent SA to replace #57 | using existing local IKE proposals for connection road-eastnet-nonat-57 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 309 for state #309 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aba600 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #309 | libevent_malloc: new ptr-libevent@0x7fb378014c70 size 128 | #309 spent 0.105 milliseconds in ikev2_parent_outI1() | crypto helper 6 resuming | crypto helper 6 starting work-order 309 for state #309 | RESET processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 309 | start processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #57 ikev2.ike failed too-many-retransmits | pstats #57 ikev2.ike deleted too-many-retransmits | #57 spent 2.63 milliseconds in total | [RE]START processing: state #57 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-57" #57: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #57: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #57 "road-eastnet-nonat-57" #57: deleting IKE SA for connection 'road-eastnet-nonat-57' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-57' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-57 | State DB: deleting IKEv2 state #57 in PARENT_I1 | parent state #57: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #57 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 309 time elapsed 0.001 seconds | libevent_free: release ptr-libevent@0x7fb364045e60 | (#309) spent 1.01 milliseconds in crypto helper computing work-order 309: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 309 for state #309 to event queue | scheduling resume sending helper answer for #309 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b07dc0 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 | in statetime_stop() and could not find #57 | crypto helper 6 waiting (nothing to do) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 41 d2 51 2f 25 d9 71 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #297 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #297 | rejected packet: | e1 41 d2 51 2f 25 d9 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #297: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0678 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-57 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-57" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-57' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-57" | stop processing: connection "road-eastnet-nonat-57" (in initiate_a_connection() at initiate.c:349) | spent 0.0714 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #309 | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 309 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #309 | **emit ISAKMP Message: | initiator cookie: | 90 f2 f2 23 da 96 f5 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-57 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 53 ae c5 2a 76 79 d9 11 80 1f 96 5b 2c 21 55 0e | ikev2 g^x 52 32 59 59 4d 8b 62 1b 1e 24 ff e4 61 ef 06 93 | ikev2 g^x bc 09 7d 02 95 4e 35 bb 5f 6e 04 f9 37 8a f2 09 | ikev2 g^x 6d fa 0e df ec 2a 67 53 c6 cd 21 62 19 ee 00 c8 | ikev2 g^x c1 d4 ad 74 e9 af 08 d7 51 b7 54 c4 5f 85 6b a2 | ikev2 g^x 75 c9 cd 93 29 db 83 26 13 60 09 0f 01 6b a6 ba | ikev2 g^x d6 a0 83 70 f4 77 2d c4 f9 20 b0 ee 09 7b a0 33 | ikev2 g^x 18 ea 6e 22 92 4b e5 33 07 61 e4 39 b1 8b 5a 98 | ikev2 g^x 64 4f e0 7f 33 58 7a 46 70 b5 36 54 83 e6 d8 37 | ikev2 g^x ce 3d 5e 64 00 34 b5 97 2a dc 6b 73 bd d2 1e e9 | ikev2 g^x b3 9d 99 c9 3c f8 18 03 58 76 b7 9a 2d cb ea 7b | ikev2 g^x 87 84 d1 8b 6e c6 cd 25 71 71 3e 99 ff 0a 1f c8 | ikev2 g^x 85 6f a7 e5 39 50 54 2c 26 84 44 cb fa 8a 51 d4 | ikev2 g^x ba 1f 9f 90 6f 93 95 a4 f9 85 9a b3 12 aa 79 46 | ikev2 g^x 05 32 e1 d4 7a f2 7a 36 94 b5 70 4b aa c4 3f f8 | ikev2 g^x f9 83 fb b5 44 81 41 3d b3 33 5c b4 2d 71 df 84 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4c 7f 8f 28 17 31 ae 2a a7 3c 6d 65 1e 41 da 23 | IKEv2 nonce 81 4d 09 fa 18 57 5d 4f dc f4 df 6c 20 61 c5 68 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 90 f2 f2 23 da 96 f5 f1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 39 | natd_hash: port= 01 f4 | natd_hash: hash= f3 f8 4c d7 1e 43 e6 3f 42 eb 30 72 de e0 e8 5b | natd_hash: hash= 93 4d e7 89 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f3 f8 4c d7 1e 43 e6 3f 42 eb 30 72 de e0 e8 5b | Notify data 93 4d e7 89 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 90 f2 f2 23 da 96 f5 f1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e8 f2 fc 6d 83 fa 04 7a cc 0f 54 6b 70 28 25 4d | natd_hash: hash= 2b f2 eb 8b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e8 f2 fc 6d 83 fa 04 7a cc 0f 54 6b 70 28 25 4d | Notify data 2b f2 eb 8b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #309 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #309: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #309 to 4294967295 after switching state | Message ID: IKE #309 skipping update_recv as MD is fake | Message ID: sent #309 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-57" #309: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.57:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #309) | 90 f2 f2 23 da 96 f5 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 ae c5 2a 76 79 d9 11 80 1f 96 5b 2c 21 55 0e | 52 32 59 59 4d 8b 62 1b 1e 24 ff e4 61 ef 06 93 | bc 09 7d 02 95 4e 35 bb 5f 6e 04 f9 37 8a f2 09 | 6d fa 0e df ec 2a 67 53 c6 cd 21 62 19 ee 00 c8 | c1 d4 ad 74 e9 af 08 d7 51 b7 54 c4 5f 85 6b a2 | 75 c9 cd 93 29 db 83 26 13 60 09 0f 01 6b a6 ba | d6 a0 83 70 f4 77 2d c4 f9 20 b0 ee 09 7b a0 33 | 18 ea 6e 22 92 4b e5 33 07 61 e4 39 b1 8b 5a 98 | 64 4f e0 7f 33 58 7a 46 70 b5 36 54 83 e6 d8 37 | ce 3d 5e 64 00 34 b5 97 2a dc 6b 73 bd d2 1e e9 | b3 9d 99 c9 3c f8 18 03 58 76 b7 9a 2d cb ea 7b | 87 84 d1 8b 6e c6 cd 25 71 71 3e 99 ff 0a 1f c8 | 85 6f a7 e5 39 50 54 2c 26 84 44 cb fa 8a 51 d4 | ba 1f 9f 90 6f 93 95 a4 f9 85 9a b3 12 aa 79 46 | 05 32 e1 d4 7a f2 7a 36 94 b5 70 4b aa c4 3f f8 | f9 83 fb b5 44 81 41 3d b3 33 5c b4 2d 71 df 84 | 29 00 00 24 4c 7f 8f 28 17 31 ae 2a a7 3c 6d 65 | 1e 41 da 23 81 4d 09 fa 18 57 5d 4f dc f4 df 6c | 20 61 c5 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f3 f8 4c d7 1e 43 e6 3f 42 eb 30 72 | de e0 e8 5b 93 4d e7 89 00 00 00 1c 00 00 40 05 | e8 f2 fc 6d 83 fa 04 7a cc 0f 54 6b 70 28 25 4d | 2b f2 eb 8b | state #309 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb378014c70 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aba600 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aba600 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #309 | libevent_malloc: new ptr-libevent@0x7fb378014c70 size 128 | #309 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49669.51346 | resume sending helper answer for #309 suppresed complete_v2_state_transition() and stole MD | #309 spent 0.56 milliseconds in resume sending helper answer | stop processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c02a950 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 f2 f2 23 da 96 f5 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #309 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #309 | rejected packet: | 90 f2 f2 23 da 96 f5 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 39 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #309: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a42790 | handling event EVENT_RETRANSMIT for parent state #284 | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #284 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #284 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49669.556681; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003771 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #284 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 "road-eastnet-nonat-32" #284: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #284) | 4f c5 f3 7c 66 c6 91 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba b7 9c a5 65 e1 b6 6c 6d 9d e6 37 7c 5c f0 56 | 41 3d 90 c7 c5 60 97 4a 06 1e 79 6d 8b 7a e1 25 | 8a e0 db 36 d3 fb fd 75 27 2c e6 11 8c 23 25 88 | 33 6a f7 df 2d 31 86 e1 88 c6 aa 1b d4 34 45 16 | 89 ed d8 a3 84 50 47 88 30 89 02 8c a8 40 9f 16 | 7d e6 73 98 ef b8 9b e4 c2 07 6e 64 f9 a7 00 b0 | 51 f9 1e 1e 5d 35 fd 1d 61 a0 8a db ac 3a a5 8e | 67 a3 5b 3b 5e 51 8c 98 11 1d 70 aa 48 6b 1b 38 | fe 3a 74 c3 2d 4b 66 87 e9 a4 65 ed 1c 5b e4 91 | fa be 09 5f aa ec 3b 28 29 ab 52 85 54 9f ad 67 | e9 64 b2 c0 a7 f8 4d 31 5f 8c e9 8e 20 90 9f 65 | 6a 76 61 75 16 6e 59 99 0c 9b cb ca c4 c4 20 96 | 27 41 40 bc 51 ae 53 c0 78 fe 0b f1 3b 9e 38 fe | 94 f7 01 4f 33 dd 41 c6 b8 e2 1f f5 07 d9 60 b6 | 76 7e 73 5f c5 3d 67 e4 c6 ee 71 88 8c 90 3a 18 | 0e 12 ec 6b 94 d2 71 0c c3 11 05 e5 1f bd ac 6a | 29 00 00 24 e8 7e a2 09 c5 c0 d6 dc c4 8f 1b fd | a9 a5 28 29 c6 ee 14 10 31 5e 74 e5 a8 11 e2 fb | 53 d1 4d b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 bd 1e aa d2 1d d0 15 75 cf 8a a1 | 9b e7 2e 78 e9 b8 ab 0e 00 00 00 1c 00 00 40 05 | 98 e6 12 78 17 7a 25 b0 15 91 c2 32 50 43 18 e1 | 21 f2 b2 de | libevent_free: release ptr-libevent@0x7fb338012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a42790 | #284 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f c5 f3 7c 66 c6 91 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #284 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #284 | rejected packet: | 4f c5 f3 7c 66 c6 91 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #284: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0725 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b09380 | handling event EVENT_RETRANSMIT for parent state #263 | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #263 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #263 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49669.567043; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003748 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a42790 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #263 | libevent_malloc: new ptr-libevent@0x7fb338012840 size 128 "road-eastnet-nonat-11" #263: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #263) | ca df fa 2e cc 97 0a e0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 35 4e f5 b3 06 6a 55 0c f2 3d 49 3f 7e 31 f9 | fb cf 08 8d 9e dd 74 b4 ae 16 46 b6 d3 2d d7 81 | a5 4c 1e 3c 51 d2 5c 80 19 32 ae 15 f6 f1 83 90 | 89 74 e1 7a 65 6e b3 e6 37 19 f8 4c fe 75 98 41 | ac 4f 10 33 24 18 c2 b3 2c d3 58 72 8c df 81 d4 | 59 38 86 31 ec e0 a1 c4 d1 46 91 6e e8 5d e0 23 | 68 ef 05 cb cd 03 0b e1 cd 09 50 09 e9 ff 48 e3 | 8e ec a4 98 4e a5 2a 21 fb 32 20 aa 01 94 37 a3 | 4a a0 06 10 8c 55 c7 ef f3 db 52 f2 2f 93 75 5e | 89 12 79 f7 25 8b 5c 7e 90 0c 79 f1 46 9c 39 dc | 62 04 8a 23 65 3e da dc e9 e6 17 7c 76 c0 74 b4 | 38 86 ca da 50 ae fc f8 de 6d 6d ce d9 7f cd c0 | 85 4e f8 c9 04 41 9d 47 8a 73 e9 b5 4a cc 14 ad | 16 95 76 51 b8 09 27 ef 06 ca 3a bb ff 24 77 42 | cc fc 6e a1 e6 2b bd 33 6d f5 6a df 58 56 a8 4b | 96 18 0e 2a e9 ec 68 a9 e4 55 e7 47 98 67 01 11 | 29 00 00 24 1f 89 c4 e0 c8 b8 15 d0 01 8c 72 b7 | b9 51 02 35 29 86 83 18 da 61 92 fd 67 fb 67 7c | 20 e3 84 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 89 6c b7 69 49 4f f4 6b c0 cb 25 | 85 ed a6 01 12 ce 48 f3 00 00 00 1c 00 00 40 05 | 1c d7 2d 11 fa 53 cc ec b9 10 e5 08 27 61 79 62 | 96 79 33 55 | libevent_free: release ptr-libevent@0x7fb37800f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b09380 | #263 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca df fa 2e cc 97 0a e0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #263 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #263 | rejected packet: | ca df fa 2e cc 97 0a e0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #263: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc40 | handling event EVENT_RETRANSMIT for parent state #305 | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #305 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #305 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49669.584363; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500588 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b09380 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #305 | libevent_malloc: new ptr-libevent@0x7fb37800f1a0 size 128 "road-eastnet-nonat-53" #305: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #305) | 0e ad 9d c2 5e 8b 6a 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f e9 9f 5a 6d 09 7a 5d 23 c1 f2 37 ec ac 20 ff | 0b 05 30 7f 53 42 af cd 03 b4 6f 3e 30 98 76 c7 | f6 6d 6d 12 6f 8b e0 b3 ea 9f 1c 72 a6 90 d8 7b | c5 96 6d 18 3e 75 5f 76 31 a1 d4 8e 3c 37 16 33 | 4b dd 74 20 e8 c4 62 66 2a 3f ae 2f 41 fd 91 9d | 82 99 62 7a b3 d1 ba 05 ec 0f 82 e6 50 45 b8 02 | a6 bb b5 5a eb 4b 5a 37 8e aa cf ae a4 3c 1d 53 | 50 52 15 71 96 99 84 38 c8 90 39 55 a5 f6 b3 e4 | fd 1f be 6b e2 f1 ec 6b de 7b d5 b2 c2 99 77 3a | 99 91 64 fd 16 0c de 9a 77 95 51 ab fa 63 18 46 | 7f 05 f1 01 08 4a 40 52 ce 73 f7 5e 69 b6 5a cc | 4f 80 84 49 75 3b fb a8 21 4b 60 95 55 81 f4 0d | cb 05 bd e3 26 c4 5a 85 f3 a4 be ed 0d bf dc 15 | 6d 89 c4 7e 34 fc cc cd 95 5c 1d d7 12 73 97 3c | b9 13 4a ef 01 3e 06 0d bc ac d0 d1 a5 d2 76 b5 | 0f e8 f3 1a 11 93 b0 3e ca db 92 a3 66 d7 f8 e1 | 29 00 00 24 f3 38 4c 4d 23 45 96 5c 15 55 c7 5a | 82 60 67 82 ca 1f 2d 10 e7 40 18 d9 8a a9 22 da | 5f 97 93 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 2a f3 b2 21 79 dc dd 37 78 74 cf | d5 e0 cd fd 06 29 e6 7b 00 00 00 1c 00 00 40 05 | 89 f1 13 5f 51 69 37 8e 62 27 27 24 a2 bd 48 85 | 3c 78 e4 8e | libevent_free: release ptr-libevent@0x7fb3840223a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc40 | #305 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e ad 9d c2 5e 8b 6a 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #305 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #305 | rejected packet: | 0e ad 9d c2 5e 8b 6a 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #305: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #58 | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #58 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #58 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49669.597659; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006597 exceeds limit? YES "road-eastnet-nonat-58" #58: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-58" #58: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #310 at 0x557d46a22650 | State DB: adding IKEv2 state #310 in UNDEFINED | pstats #310 ikev2.ike started | Message ID: init #310: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #310: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #310; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-58" #310: initiating v2 parent SA to replace #58 | using existing local IKE proposals for connection road-eastnet-nonat-58 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 310 for state #310 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46abbc40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #310 | libevent_malloc: new ptr-libevent@0x7fb3840223a0 size 128 | #310 spent 0.0696 milliseconds in ikev2_parent_outI1() | RESET processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #58 ikev2.ike failed too-many-retransmits | pstats #58 ikev2.ike deleted too-many-retransmits | #58 spent 3.58 milliseconds in total | [RE]START processing: state #58 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-58" #58: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #58: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #58 "road-eastnet-nonat-58" #58: deleting IKE SA for connection 'road-eastnet-nonat-58' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-58' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-58 | State DB: deleting IKEv2 state #58 in PARENT_I1 | parent state #58: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 11 resuming | crypto helper 11 starting work-order 310 for state #310 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 310 | stop processing: state #58 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | in statetime_stop() and could not find #58 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-58 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-58" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-58' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-58" | stop processing: connection "road-eastnet-nonat-58" (in initiate_a_connection() at initiate.c:349) | spent 0.0601 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 310 time elapsed 0.000562 seconds | (#310) spent 0.566 milliseconds in crypto helper computing work-order 310: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 310 for state #310 to event queue | scheduling resume sending helper answer for #310 | libevent_malloc: new ptr-libevent@0x7fb3600125d0 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #310 | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 310 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #310 | **emit ISAKMP Message: | initiator cookie: | 15 02 9e 6f d7 63 29 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-58 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 96 27 e5 1e b0 b8 71 be 19 22 95 4e cb bc fb 75 | ikev2 g^x e9 3b 56 69 33 4e 64 ad 57 4b 29 1e a9 e6 47 1a | ikev2 g^x 9f d6 c8 79 0e b5 d1 68 4e cf f5 82 76 ae 1c b5 | ikev2 g^x 09 2e f5 34 f0 f4 52 a3 a8 36 97 6c 75 c0 43 c4 | ikev2 g^x ee 87 0e 53 ff 09 f4 54 79 74 c0 ae 90 9a ff fd | ikev2 g^x 29 25 b3 6a e6 b5 58 cb 0a 34 f3 40 7a e1 f0 00 | ikev2 g^x e8 b9 84 74 bb 8e 47 15 eb 04 15 5e 50 5c 56 6d | ikev2 g^x 24 4e c6 f1 73 76 98 a0 94 06 1f 4b 61 2c fc 5d | ikev2 g^x a8 62 64 09 74 1c b7 15 e9 d3 bf 3e 82 77 60 84 | ikev2 g^x b7 ec 0f bd 1c 3b 5b 97 d2 ff 90 15 40 4c 65 b9 | ikev2 g^x 49 3d 03 bf e1 e0 85 d7 23 77 e3 10 9e 84 72 33 | ikev2 g^x 77 bf bf d8 fb 57 2c a9 b4 49 77 20 46 c0 0f 64 | ikev2 g^x 28 da 55 aa ac 53 17 bb 64 f6 fe 0e af c2 be 09 | ikev2 g^x 4d 7e 65 25 98 17 8d d6 a3 3b ed 10 34 62 66 3b | ikev2 g^x 5f 3c 43 cb 1e 2b fc 0b 3e c7 88 ef 40 72 0f 91 | ikev2 g^x 73 8c 1b 91 80 50 8f 7f 10 7c a8 7c cd 25 bb 09 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8c b6 d4 9e 94 5a 53 1f e0 86 71 ae 2a 48 4d 09 | IKEv2 nonce 6b cb 2a d4 c0 d8 ae 06 c9 7c dd 47 64 97 96 e7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 15 02 9e 6f d7 63 29 0d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3a | natd_hash: port= 01 f4 | natd_hash: hash= a6 0a e7 b4 3e 63 13 55 ea 18 77 04 bd 77 d7 da | natd_hash: hash= 99 7b 63 27 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a6 0a e7 b4 3e 63 13 55 ea 18 77 04 bd 77 d7 da | Notify data 99 7b 63 27 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 15 02 9e 6f d7 63 29 0d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 5c 4d 49 83 ef 78 da dd 25 a2 53 b8 0f 9a 33 7f | natd_hash: hash= f6 be 51 b8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5c 4d 49 83 ef 78 da dd 25 a2 53 b8 0f 9a 33 7f | Notify data f6 be 51 b8 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #310 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #310: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #310 to 4294967295 after switching state | Message ID: IKE #310 skipping update_recv as MD is fake | Message ID: sent #310 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-58" #310: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.58:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #310) | 15 02 9e 6f d7 63 29 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 27 e5 1e b0 b8 71 be 19 22 95 4e cb bc fb 75 | e9 3b 56 69 33 4e 64 ad 57 4b 29 1e a9 e6 47 1a | 9f d6 c8 79 0e b5 d1 68 4e cf f5 82 76 ae 1c b5 | 09 2e f5 34 f0 f4 52 a3 a8 36 97 6c 75 c0 43 c4 | ee 87 0e 53 ff 09 f4 54 79 74 c0 ae 90 9a ff fd | 29 25 b3 6a e6 b5 58 cb 0a 34 f3 40 7a e1 f0 00 | e8 b9 84 74 bb 8e 47 15 eb 04 15 5e 50 5c 56 6d | 24 4e c6 f1 73 76 98 a0 94 06 1f 4b 61 2c fc 5d | a8 62 64 09 74 1c b7 15 e9 d3 bf 3e 82 77 60 84 | b7 ec 0f bd 1c 3b 5b 97 d2 ff 90 15 40 4c 65 b9 | 49 3d 03 bf e1 e0 85 d7 23 77 e3 10 9e 84 72 33 | 77 bf bf d8 fb 57 2c a9 b4 49 77 20 46 c0 0f 64 | 28 da 55 aa ac 53 17 bb 64 f6 fe 0e af c2 be 09 | 4d 7e 65 25 98 17 8d d6 a3 3b ed 10 34 62 66 3b | 5f 3c 43 cb 1e 2b fc 0b 3e c7 88 ef 40 72 0f 91 | 73 8c 1b 91 80 50 8f 7f 10 7c a8 7c cd 25 bb 09 | 29 00 00 24 8c b6 d4 9e 94 5a 53 1f e0 86 71 ae | 2a 48 4d 09 6b cb 2a d4 c0 d8 ae 06 c9 7c dd 47 | 64 97 96 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 0a e7 b4 3e 63 13 55 ea 18 77 04 | bd 77 d7 da 99 7b 63 27 00 00 00 1c 00 00 40 05 | 5c 4d 49 83 ef 78 da dd 25 a2 53 b8 0f 9a 33 7f | f6 be 51 b8 | state #310 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3840223a0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46abbc40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #310 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 | #310 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49669.59875 | resume sending helper answer for #310 suppresed complete_v2_state_transition() and stole MD | #310 spent 0.316 milliseconds in resume sending helper answer | stop processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3600125d0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 02 9e 6f d7 63 29 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #310 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #310 | rejected packet: | 15 02 9e 6f d7 63 29 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3a fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #310: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0702 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a25d10 | handling event EVENT_RETRANSMIT for parent state #298 | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #298 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #298 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49669.59996; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002328 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #298 | libevent_malloc: new ptr-libevent@0x7fb364045e60 size 128 "road-eastnet-nonat-46" #298: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #298) | d5 0c ec bc d3 64 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 43 96 23 e5 3a d0 2d 36 cd 43 2d 58 c4 e0 92 a1 | ed 2d e1 4c 45 8b 42 ad 40 76 ab 67 60 92 c4 09 | 73 c4 c7 3c 9d 80 31 b9 bf b9 9e 64 35 e4 39 ba | 2f a8 59 fe 53 09 d8 e0 e9 88 59 30 e2 71 e6 be | 2d 69 bc 6a a7 6e 4f db 2a 6a 88 01 9f d2 1a 54 | 9b 70 8c b4 c5 37 d0 1b eb c3 58 21 ce 79 a3 ff | 4e 1b 84 aa 1e 08 dd 9d 9d 58 7a ba b0 dd 2d 38 | 9e da 29 29 b5 fb 28 78 05 fa 3a 26 c0 d3 4c cf | 22 22 af c7 f1 d8 11 18 01 e3 41 10 fc 1b c9 38 | 58 6b be 13 fa e2 38 5b 8d 00 15 50 84 fd a8 e0 | 20 22 31 ab 99 61 d4 85 a8 6c 2e d8 1f e4 26 c0 | 25 17 38 c7 a5 82 30 0d e2 85 f0 d0 e0 3a 59 87 | 67 7b 0d e4 52 7b 6c 35 93 c6 f4 61 2c 32 e9 62 | b8 57 d1 59 0b 7c af 14 d1 9d bb 91 61 85 75 09 | ed c6 43 19 bf 09 f8 e4 92 e6 1f f3 47 e1 6e 0a | 5a 69 40 30 db b0 00 24 c2 61 94 a9 30 49 e7 0e | 29 00 00 24 4c 0e e1 06 42 9e 4c 74 3b 65 ba d4 | bc 56 1a 69 be b4 c7 ec 29 68 0f 7e 31 97 81 70 | 75 a5 f0 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 96 a5 ca 09 14 9d 81 34 51 5c 38 | 06 b0 7e 03 d4 af 12 47 00 00 00 1c 00 00 40 05 | 1b 14 fa aa 2e 1c b4 a7 92 80 67 79 37 9e 5c 02 | 1f 84 46 7d | libevent_free: release ptr-libevent@0x7fb37c014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a25d10 | #298 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 0c ec bc d3 64 84 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #298 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #298 | rejected packet: | d5 0c ec bc d3 64 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #298: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0537 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34001f970 | handling event EVENT_RETRANSMIT for parent state #285 | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #285 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #285 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49669.62124; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002391 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a25d10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #285 | libevent_malloc: new ptr-libevent@0x7fb37c014c70 size 128 "road-eastnet-nonat-33" #285: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #285) | 8e b8 37 d5 68 56 5c 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 a4 f2 e0 52 94 4a 81 83 55 c1 41 32 b7 b8 02 | 1f ed 45 79 af ff 8a eb 0a de 74 5c 80 82 ad 8f | b3 d0 39 bf 3b db ca 12 0b a2 0e eb ce 92 b6 11 | 51 c6 b7 d3 f4 87 aa 09 0c f5 bb d2 46 13 91 7d | 65 dc 9e 2a 12 da 3f be a8 bc 4e 1c a1 4c 53 ad | 64 f4 41 68 96 19 bd e1 80 86 91 4f 17 c1 cc 5c | ad 72 12 cc 9c fe d8 85 6a cd 1f 0f cf 61 bc 07 | 09 af 5b a0 a2 6c 2a 6f 4c 7e dd ad 13 55 ed 0e | ce cf e6 c5 66 9e 5a 6a e4 42 78 50 61 c3 d4 73 | e3 47 f2 bc a4 8c 26 64 97 c9 f1 2a c6 63 9c 83 | 60 4f 25 9e cb 7a 10 71 25 9d c1 dd 11 38 34 bc | 7c a1 3b 2b 0d 73 6f f9 3c 0b 62 50 05 38 a7 0e | 31 2d 60 72 dd 2b a2 05 f6 e2 f0 0d 9b c1 b1 9e | c0 ee 0d 2f 64 4b 28 d2 c0 e7 3b 0a 50 ff 03 45 | 45 ff 2c cd 4e 54 17 7d 2b 95 02 32 23 94 0e de | 7b 38 d9 9c b7 e8 7d 2f 56 9c 26 e0 8b a0 e6 38 | 29 00 00 24 e6 a9 52 cb 4c 75 d2 f3 84 20 3b dd | 0e ee e2 12 57 50 c2 6f 3d 4c ae 21 23 00 a4 ca | 8c 87 5b 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 5c 90 12 97 99 4e dd 8f 9a cf 75 | ad 0a 2b a1 31 ad 53 29 00 00 00 1c 00 00 40 05 | f9 f4 9b a0 01 06 28 22 67 53 82 2b ec 0b 3c 23 | 3e d8 d3 7f | libevent_free: release ptr-libevent@0x7fb34000f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34001f970 | #285 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e b8 37 d5 68 56 5c 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #285 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #285 | rejected packet: | 8e b8 37 d5 68 56 5c 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #285: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd40 | handling event EVENT_RETRANSMIT for parent state #59 | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #59 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #59 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49669.66352; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010049 exceeds limit? YES "road-eastnet-nonat-59" #59: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-59" #59: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #311 at 0x557d46a23c10 | State DB: adding IKEv2 state #311 in UNDEFINED | pstats #311 ikev2.ike started | Message ID: init #311: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #311: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #311; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-59" #311: initiating v2 parent SA to replace #59 | using existing local IKE proposals for connection road-eastnet-nonat-59 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 311 for state #311 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34001f970 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #311 | libevent_malloc: new ptr-libevent@0x7fb34000f1a0 size 128 | #311 spent 0.0667 milliseconds in ikev2_parent_outI1() | RESET processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 resuming | crypto helper 16 starting work-order 311 for state #311 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 311 | start processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #59 ikev2.ike failed too-many-retransmits | pstats #59 ikev2.ike deleted too-many-retransmits | #59 spent 2.52 milliseconds in total | [RE]START processing: state #59 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-59" #59: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #59: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #59 "road-eastnet-nonat-59" #59: deleting IKE SA for connection 'road-eastnet-nonat-59' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-59' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-59 | State DB: deleting IKEv2 state #59 in PARENT_I1 | parent state #59: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 311 time elapsed 0.0007 seconds | (#311) spent 0.703 milliseconds in crypto helper computing work-order 311: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 311 for state #311 to event queue | scheduling resume sending helper answer for #311 | libevent_malloc: new ptr-libevent@0x7fb364014bc0 size 128 | crypto helper 16 waiting (nothing to do) | stop processing: state #59 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb384032b00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd40 | in statetime_stop() and could not find #59 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-59 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-59" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-59' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-59" | stop processing: connection "road-eastnet-nonat-59" (in initiate_a_connection() at initiate.c:349) | spent 0.0595 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #311 | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 311 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #311 | **emit ISAKMP Message: | initiator cookie: | 44 99 87 40 ba 63 67 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-59 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 98 f7 3b 73 41 b9 88 7a e8 c9 5c 33 15 fe 59 eb | ikev2 g^x fc 54 1c 32 28 ad 56 eb 34 ed 9a d7 b7 26 48 b1 | ikev2 g^x 97 4e 59 ed 4f 99 cd e8 e6 27 80 3f 35 da 0c a7 | ikev2 g^x 23 d8 2f 5d 19 c3 94 0e 09 96 31 23 4d f5 99 7a | ikev2 g^x 2e 77 d3 1f 35 48 ef 9d e1 61 1a 11 39 f8 6e ce | ikev2 g^x 65 2d d0 de 38 b4 23 52 6e 45 44 65 4d 7b bd c8 | ikev2 g^x 41 7e 01 a8 b3 39 9f a8 ee a5 53 dc 50 9b 94 2b | ikev2 g^x 69 df 03 ec 5d 36 9f 33 dc 3d 9c 7a 93 11 41 9c | ikev2 g^x 33 38 19 c9 cf 1a a3 f8 96 ca d4 d9 26 62 88 91 | ikev2 g^x 39 58 69 eb 93 1e 87 6a d7 64 14 8d 9c 37 19 fa | ikev2 g^x c6 b6 78 0e bc 5c f3 4b 97 bf 56 93 52 5a ea e8 | ikev2 g^x e0 ac be 1b 36 a8 31 6f 20 82 12 c0 13 79 34 1d | ikev2 g^x 86 03 61 75 0c 12 25 55 a8 61 36 78 64 d8 d0 e0 | ikev2 g^x d9 d2 a7 01 7f 00 fd 1f 2e 03 76 1e 96 2c 85 64 | ikev2 g^x f8 86 44 8c a4 8a 04 3f e3 a8 0c 90 29 b2 ad bc | ikev2 g^x e2 32 ac c2 2b f4 81 23 cf 52 ee cf c4 e3 9c c7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d3 df f6 74 46 9e 11 7f ae 1b 7e 22 a8 9e 39 ab | IKEv2 nonce f7 77 2a 20 6e a6 c0 c3 6f 0b 0c 6a a5 08 b1 f9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 44 99 87 40 ba 63 67 2b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3b | natd_hash: port= 01 f4 | natd_hash: hash= 9c b5 fb 2f 48 22 68 cf e1 a0 a0 6d 16 65 fc 12 | natd_hash: hash= 3f 30 cc 2d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9c b5 fb 2f 48 22 68 cf e1 a0 a0 6d 16 65 fc 12 | Notify data 3f 30 cc 2d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 44 99 87 40 ba 63 67 2b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 5f ba 06 b7 b7 74 50 87 e6 7e 19 f6 51 18 f6 57 | natd_hash: hash= 2a d1 11 81 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5f ba 06 b7 b7 74 50 87 e6 7e 19 f6 51 18 f6 57 | Notify data 2a d1 11 81 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #311 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #311: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #311 to 4294967295 after switching state | Message ID: IKE #311 skipping update_recv as MD is fake | Message ID: sent #311 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-59" #311: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.59:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #311) | 44 99 87 40 ba 63 67 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 f7 3b 73 41 b9 88 7a e8 c9 5c 33 15 fe 59 eb | fc 54 1c 32 28 ad 56 eb 34 ed 9a d7 b7 26 48 b1 | 97 4e 59 ed 4f 99 cd e8 e6 27 80 3f 35 da 0c a7 | 23 d8 2f 5d 19 c3 94 0e 09 96 31 23 4d f5 99 7a | 2e 77 d3 1f 35 48 ef 9d e1 61 1a 11 39 f8 6e ce | 65 2d d0 de 38 b4 23 52 6e 45 44 65 4d 7b bd c8 | 41 7e 01 a8 b3 39 9f a8 ee a5 53 dc 50 9b 94 2b | 69 df 03 ec 5d 36 9f 33 dc 3d 9c 7a 93 11 41 9c | 33 38 19 c9 cf 1a a3 f8 96 ca d4 d9 26 62 88 91 | 39 58 69 eb 93 1e 87 6a d7 64 14 8d 9c 37 19 fa | c6 b6 78 0e bc 5c f3 4b 97 bf 56 93 52 5a ea e8 | e0 ac be 1b 36 a8 31 6f 20 82 12 c0 13 79 34 1d | 86 03 61 75 0c 12 25 55 a8 61 36 78 64 d8 d0 e0 | d9 d2 a7 01 7f 00 fd 1f 2e 03 76 1e 96 2c 85 64 | f8 86 44 8c a4 8a 04 3f e3 a8 0c 90 29 b2 ad bc | e2 32 ac c2 2b f4 81 23 cf 52 ee cf c4 e3 9c c7 | 29 00 00 24 d3 df f6 74 46 9e 11 7f ae 1b 7e 22 | a8 9e 39 ab f7 77 2a 20 6e a6 c0 c3 6f 0b 0c 6a | a5 08 b1 f9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c b5 fb 2f 48 22 68 cf e1 a0 a0 6d | 16 65 fc 12 3f 30 cc 2d 00 00 00 1c 00 00 40 05 | 5f ba 06 b7 b7 74 50 87 e6 7e 19 f6 51 18 f6 57 | 2a d1 11 81 | state #311 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34000f1a0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34001f970 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34001f970 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #311 | libevent_malloc: new ptr-libevent@0x7fb34000f1a0 size 128 | #311 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49669.664771 | resume sending helper answer for #311 suppresed complete_v2_state_transition() and stole MD | #311 spent 0.313 milliseconds in resume sending helper answer | stop processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb364014bc0 | timer_event_cb: processing event@0x557d46abfd80 | handling event EVENT_RETRANSMIT for parent state #306 | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #306 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #306 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49669.664803; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50139 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #306 | libevent_malloc: new ptr-libevent@0x7fb364014bc0 size 128 "road-eastnet-nonat-54" #306: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #306) | fd d2 63 50 0e 6e 1e 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc f6 1e 22 b4 91 3a 68 1f d1 67 6d 28 c8 f1 bf | e2 6e 14 07 e3 24 35 86 32 c0 3d 31 76 0e 87 74 | f9 3c 48 85 fb a5 36 8c 2d 66 01 91 c5 ea 8c 52 | 2c 54 17 a9 6d 05 2c 50 21 08 25 54 8a 1b be 0a | 1d bd df b6 06 bd 44 6a d2 67 92 4c 02 bb 81 0c | c5 ff 14 e5 24 16 2f 34 f8 b9 eb 90 9f 21 2d 2e | b4 e3 0a 67 2a 94 b3 b5 79 5e 99 67 ad f2 05 03 | 3c 2d de 97 30 2e 1c 04 bc c1 21 b5 15 d2 d7 d9 | ea a8 e1 e4 5e c5 d4 35 2f fe 33 59 95 e2 b7 3c | 23 52 f4 04 24 af 5a 95 09 7f 61 6c 7a 9b e9 50 | d2 38 26 f9 d3 19 e4 0a 3c be ac cf c6 ff b4 45 | b0 35 a0 dc ec 70 3d 13 ab c2 8a 53 0d 47 68 05 | 67 66 c8 1a af d5 d2 45 a5 c1 6e df ea 2b 64 70 | 05 da 5e 15 ac a3 ed f4 40 10 0f 5a 84 40 9e bc | d6 87 16 fd 3f a2 ff 39 19 ba 66 6d 2d e9 93 fd | b9 22 df b5 78 f4 f7 04 ee c7 91 83 7d a9 ca f1 | 29 00 00 24 c2 6f b9 fd fc 4f db 1a 3d 3f c0 a7 | af 7a 63 dc 70 8f 4c 18 81 55 af 15 16 2b 00 41 | 32 ac cf 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 87 47 9a 56 3f e1 15 1e 01 4b 7f | bb 95 0e 04 49 a0 88 16 00 00 00 1c 00 00 40 05 | 0c f3 ae 84 0d fd 98 31 4d e7 cb a5 de d2 0b 07 | b0 31 98 21 | libevent_free: release ptr-libevent@0x7fb36402a780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abfd80 | #306 spent 0.0676 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 99 87 40 ba 63 67 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #311 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #311 | rejected packet: | 44 99 87 40 ba 63 67 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #311: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd d2 63 50 0e 6e 1e 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #306 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #306 | rejected packet: | fd d2 63 50 0e 6e 1e 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #306: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #299 | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #299 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #299 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49669.668199; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001793 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abfd80 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #299 | libevent_malloc: new ptr-libevent@0x7fb36402a780 size 128 "road-eastnet-nonat-47" #299: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #299) | 63 02 bb 51 d9 8c b0 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 17 e8 1c e0 c7 4f 03 2d a7 55 c0 45 bf a2 96 | 6a 0c 0e 0f 3f cb a5 f2 68 03 39 51 c2 b3 0b 30 | 79 44 b0 72 39 7b b4 0b c0 9d 43 f1 cf 9c ab 76 | 17 9c 76 41 f4 97 6b 3d 79 c7 93 3a b0 36 40 75 | 1d 60 59 8c 82 e2 c7 85 c2 1c 97 4a 38 8b 6e ad | 3e 5a 0d 04 9e 51 30 61 82 af ed 37 96 e2 b6 a0 | 3b c4 41 66 ee 44 1e e7 39 9f 7c 2f f5 f2 ff 4b | 36 a8 c8 29 8b eb d2 55 7f fb 10 9c ec 8c 08 d0 | 39 05 1c 07 ac 20 cb cb a4 7c 61 41 78 60 13 d3 | dd a5 39 38 ad f1 86 ff 6a 3c d0 2d b1 eb 7c 82 | 79 91 1f 2f 55 9c db 4d e2 10 be 62 dd e3 5a 7a | 61 63 85 0c fd 8f b4 af 97 73 ef e2 1b 21 c4 96 | e5 df 1b 56 fa 11 08 d6 95 8d 53 f4 13 64 3d 3d | 98 8c 38 c7 52 64 1a 00 95 89 f1 a3 72 e2 fe 87 | 05 b1 bc 3a 2d 8d ca c2 67 8a 86 e8 36 ce a6 73 | 08 10 ff 3d c7 41 a4 c0 53 af 83 9f b4 ac d3 a6 | 29 00 00 24 7e 5d f1 77 88 98 7f 63 50 07 d0 59 | cc bb c0 62 cd 9c cc f3 5d 35 d8 78 d2 ee b4 01 | aa b2 27 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 b5 ac f1 52 82 e1 6d 65 51 7c e0 | ef a0 91 c6 07 cf fb 64 00 00 00 1c 00 00 40 05 | 8f da 92 7d 7b 47 83 cb 10 aa f2 ca 2c a8 73 ac | 13 99 82 ed | libevent_free: release ptr-libevent@0x7fb370014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #299 spent 0.0967 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 02 bb 51 d9 8c b0 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #299 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #299 | rejected packet: | 63 02 bb 51 d9 8c b0 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #299: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae8980 | handling event EVENT_RETRANSMIT for parent state #264 | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #264 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #264 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49669.681437; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004332 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #264 | libevent_malloc: new ptr-libevent@0x7fb370014c70 size 128 "road-eastnet-nonat-12" #264: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #264) | 8e fe 0e 1c bf 0e 6b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 85 0f 2d e4 cd 04 0b 17 96 14 35 20 98 98 7c | 43 94 0e c0 cb 2a ed cd 26 f3 f4 fd 71 0a b3 35 | 8d c8 ce 92 67 ce 39 72 cf 1d 58 73 86 98 2b a0 | 6f 55 7b 13 d0 1f 62 3b 93 93 85 3e 36 cd 86 27 | b4 c1 9a bd c4 db 39 19 44 28 ec a5 e9 1c 59 a2 | a7 fc b2 f8 f1 72 da 9c 2a b8 36 d3 61 88 51 dc | 4d 20 86 6a 14 25 ef 10 b3 1b 09 52 6d 00 f9 db | 75 0a 80 38 3b 18 7c 9c fd c8 c9 4e b1 e2 84 70 | a4 dd 3f 85 ce 8c cb 20 5c 6a 42 21 65 c4 fd 15 | 7a 47 92 65 67 69 9e be f3 7a e9 66 c9 56 bd d2 | 3c 4a 76 68 b7 3f ce 1d 64 64 a7 2c 71 37 b4 c4 | 53 38 1c 79 97 95 2a 69 1c 36 40 41 3d 05 9c ba | 4d 38 e3 a6 a7 6c e9 b1 59 1a 9f ab 80 0a d9 8e | ac 39 5a 0c e3 b3 9d c1 3d 5d 32 c8 42 00 f8 4c | 3a fb 9c 36 7f 16 43 4c 95 29 48 05 f2 b7 02 75 | 54 25 c2 90 a5 04 3b fa ca 77 9e 55 e7 39 19 34 | 29 00 00 24 0b 7d f5 1c 67 a7 5b 6f d5 5f 23 1c | de ee af 0f ed f9 a1 fa b5 71 92 a8 5a 39 25 fa | 7d a0 ff 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 4e 74 d9 6a 11 61 e7 2b 9e b3 5d | fa c6 10 84 a3 ff e4 72 00 00 00 1c 00 00 40 05 | 61 d2 3a 09 fc 3f e9 c0 9a fa 15 52 e0 d4 39 3d | 0f 2b c4 10 | libevent_free: release ptr-libevent@0x7fb36804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae8980 | #264 spent 0.0875 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e fe 0e 1c bf 0e 6b 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #264 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #264 | rejected packet: | 8e fe 0e 1c bf 0e 6b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #264: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.04 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abd200 | handling event EVENT_RETRANSMIT for parent state #286 | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #286 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #286 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49669.68966; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002223 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae8980 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #286 | libevent_malloc: new ptr-libevent@0x7fb36804b850 size 128 "road-eastnet-nonat-34" #286: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #286) | a2 ed ea 42 1b 91 7a d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a a6 7d cd 97 e4 f8 0e 4c a8 f7 b1 ec cb f9 8c | 2f 76 7e 20 17 e9 ac 96 37 6c d0 36 42 10 05 54 | c9 b8 65 a2 e7 d3 10 b3 60 78 69 80 3d 25 e3 d0 | 6b b3 ef 43 8d bb 4b f1 6d fd 75 58 b6 64 ea eb | 21 44 51 94 9d af c8 b5 2c d9 89 52 8e 49 92 15 | c8 f5 a7 13 6d cd 71 4c 89 a6 18 b9 37 a2 0d cb | 6e 90 fa f6 c2 05 39 4f e6 3c 7a ff 95 71 4f ea | 6f fa 7f ad 4f d5 8a a0 2f e3 1c 55 7c 9d 2b b7 | f8 c6 43 95 70 9b 3c 8c f8 2e 6e 7f b8 14 5a ab | e6 e2 cc bb a0 95 89 e6 41 f3 31 0c 80 44 7c cc | 26 be 63 d8 03 4f 0e f4 82 c2 32 aa ff f3 ec 67 | 80 f5 48 c4 4e dc 67 68 c5 87 ee 31 77 11 8a 89 | f7 38 08 ed 5a b3 8e c6 08 9c 28 3d e6 49 22 cc | f1 1d ea 6e 27 3f 41 69 56 c6 98 3e aa a5 4b a8 | 83 96 ce 94 b1 ac 7a 4b a0 42 08 47 1d ca 77 fa | 08 50 16 47 c6 8d 84 08 18 b0 a8 93 c0 9a 70 76 | 29 00 00 24 ff d1 37 2d 2c 72 ee aa 08 fb db a4 | 83 ef f7 bd 0a ef 47 b4 41 70 b6 07 5f 86 86 3a | e3 fa 60 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 c0 b7 bc 90 25 46 09 9f 5d 7d 2b | e5 1e 40 45 53 17 97 19 00 00 00 1c 00 00 40 05 | ec a0 d2 60 58 e7 4c 5a 13 5c f5 c2 c9 76 dd 61 | a7 bb 7e 37 | libevent_free: release ptr-libevent@0x7fb364017f20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abd200 | #286 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 ed ea 42 1b 91 7a d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #286 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #286 | rejected packet: | a2 ed ea 42 1b 91 7a d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #286: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a15810 | handling event EVENT_RETRANSMIT for parent state #60 | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #60 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #60 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49669.725958; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009919 exceeds limit? YES "road-eastnet-nonat-60" #60: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-60" #60: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #312 at 0x557d46a251d0 | State DB: adding IKEv2 state #312 in UNDEFINED | pstats #312 ikev2.ike started | Message ID: init #312: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #312: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #312; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-60" #312: initiating v2 parent SA to replace #60 | using existing local IKE proposals for connection road-eastnet-nonat-60 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 312 for state #312 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46abd200 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #312 | libevent_malloc: new ptr-libevent@0x7fb364017f20 size 128 | #312 spent 0.0664 milliseconds in ikev2_parent_outI1() | crypto helper 4 resuming | RESET processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 starting work-order 312 for state #312 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 312 | start processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #60 ikev2.ike failed too-many-retransmits | pstats #60 ikev2.ike deleted too-many-retransmits | #60 spent 2.83 milliseconds in total | [RE]START processing: state #60 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-60" #60: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #60: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #60 "road-eastnet-nonat-60" #60: deleting IKE SA for connection 'road-eastnet-nonat-60' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-60' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-60 | State DB: deleting IKEv2 state #60 in PARENT_I1 | parent state #60: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 312 time elapsed 0.000545 seconds | (#312) spent 0.548 milliseconds in crypto helper computing work-order 312: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 312 for state #312 to event queue | scheduling resume sending helper answer for #312 | libevent_malloc: new ptr-libevent@0x7fb35804b970 size 128 | crypto helper 4 waiting (nothing to do) | stop processing: state #60 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3440180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a15810 | in statetime_stop() and could not find #60 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-60 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-60" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-60' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-60" | stop processing: connection "road-eastnet-nonat-60" (in initiate_a_connection() at initiate.c:349) | spent 0.0602 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #312 | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 312 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #312 | **emit ISAKMP Message: | initiator cookie: | 89 42 ee d6 ed 2c a4 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-60 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b9 05 0b 71 54 f5 39 16 26 4c a4 39 04 60 1d 97 | ikev2 g^x 32 ea c2 30 7f b7 8f 8f 4c 46 3c 6f 52 78 aa c1 | ikev2 g^x fe e4 77 56 f7 3d d3 8d a6 3a 6f c0 2f fe 6d 02 | ikev2 g^x eb 98 53 91 b0 a7 62 d0 2e 39 52 a2 2d 9f c5 cb | ikev2 g^x d2 4b 17 0a 6d 76 74 95 b8 fd f2 4d e7 0c cf 15 | ikev2 g^x 80 f8 47 f1 16 09 01 ed b3 3a 4f 5c d5 5d 3f 6b | ikev2 g^x 2f e7 b7 4c e0 6d 6e 67 ff dd 71 47 c8 a4 15 9f | ikev2 g^x 96 98 1b 13 12 cd c9 a7 cd 82 0e 52 4d 94 b9 96 | ikev2 g^x db fe 30 4f c9 88 5e 66 97 62 f6 22 94 b7 f8 62 | ikev2 g^x 1f 97 fa 33 08 02 4b f8 35 6a 66 b6 ae 14 f2 38 | ikev2 g^x 8b d8 d1 fe 0f da d0 63 b9 64 d3 f1 12 68 13 10 | ikev2 g^x 0c 76 c3 e9 8c 5d 20 14 45 21 bc 02 62 c8 67 36 | ikev2 g^x a7 1a 3b 3f d4 a6 2b 0f 1f 20 68 bf 3f f3 da ac | ikev2 g^x 9d d4 0b a5 4f 9d 4e ee 5d 8a c9 7f a6 63 bd 37 | ikev2 g^x e4 30 f8 16 a7 79 23 99 5e 45 08 d2 1b c1 59 79 | ikev2 g^x b3 06 e4 a7 4d 24 33 20 1d ab d6 f6 ee 90 2f 69 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c3 f8 28 4c 1a 7b 0f cd eb 3b df c6 33 a5 52 0e | IKEv2 nonce 9f e3 e0 c7 7b e0 4f ee 68 74 73 39 ce 71 25 81 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 89 42 ee d6 ed 2c a4 b4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3c | natd_hash: port= 01 f4 | natd_hash: hash= c3 69 21 0b 86 be 66 6f de 2b 5e fc 58 12 49 3c | natd_hash: hash= b2 b4 50 5a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c3 69 21 0b 86 be 66 6f de 2b 5e fc 58 12 49 3c | Notify data b2 b4 50 5a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 89 42 ee d6 ed 2c a4 b4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 50 02 4b 6b 30 95 cf bb e1 65 ad fe fd e1 44 d3 | natd_hash: hash= d9 2c f8 74 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 50 02 4b 6b 30 95 cf bb e1 65 ad fe fd e1 44 d3 | Notify data d9 2c f8 74 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #312 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #312: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #312 to 4294967295 after switching state | Message ID: IKE #312 skipping update_recv as MD is fake | Message ID: sent #312 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-60" #312: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.60:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #312) | 89 42 ee d6 ed 2c a4 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 05 0b 71 54 f5 39 16 26 4c a4 39 04 60 1d 97 | 32 ea c2 30 7f b7 8f 8f 4c 46 3c 6f 52 78 aa c1 | fe e4 77 56 f7 3d d3 8d a6 3a 6f c0 2f fe 6d 02 | eb 98 53 91 b0 a7 62 d0 2e 39 52 a2 2d 9f c5 cb | d2 4b 17 0a 6d 76 74 95 b8 fd f2 4d e7 0c cf 15 | 80 f8 47 f1 16 09 01 ed b3 3a 4f 5c d5 5d 3f 6b | 2f e7 b7 4c e0 6d 6e 67 ff dd 71 47 c8 a4 15 9f | 96 98 1b 13 12 cd c9 a7 cd 82 0e 52 4d 94 b9 96 | db fe 30 4f c9 88 5e 66 97 62 f6 22 94 b7 f8 62 | 1f 97 fa 33 08 02 4b f8 35 6a 66 b6 ae 14 f2 38 | 8b d8 d1 fe 0f da d0 63 b9 64 d3 f1 12 68 13 10 | 0c 76 c3 e9 8c 5d 20 14 45 21 bc 02 62 c8 67 36 | a7 1a 3b 3f d4 a6 2b 0f 1f 20 68 bf 3f f3 da ac | 9d d4 0b a5 4f 9d 4e ee 5d 8a c9 7f a6 63 bd 37 | e4 30 f8 16 a7 79 23 99 5e 45 08 d2 1b c1 59 79 | b3 06 e4 a7 4d 24 33 20 1d ab d6 f6 ee 90 2f 69 | 29 00 00 24 c3 f8 28 4c 1a 7b 0f cd eb 3b df c6 | 33 a5 52 0e 9f e3 e0 c7 7b e0 4f ee 68 74 73 39 | ce 71 25 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 69 21 0b 86 be 66 6f de 2b 5e fc | 58 12 49 3c b2 b4 50 5a 00 00 00 1c 00 00 40 05 | 50 02 4b 6b 30 95 cf bb e1 65 ad fe fd e1 44 d3 | d9 2c f8 74 | state #312 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb364017f20 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46abd200 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abd200 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #312 | libevent_malloc: new ptr-libevent@0x7fb3440180b0 size 128 | #312 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49669.727075 | resume sending helper answer for #312 suppresed complete_v2_state_transition() and stole MD | #312 spent 0.323 milliseconds in resume sending helper answer | stop processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35804b970 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 42 ee d6 ed 2c a4 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #312 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #312 | rejected packet: | 89 42 ee d6 ed 2c a4 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3c fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #312: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0eac0 | handling event EVENT_RETRANSMIT for parent state #300 | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #300 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #300 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49669.745265; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001171 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a15810 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #300 | libevent_malloc: new ptr-libevent@0x7fb35804b970 size 128 "road-eastnet-nonat-48" #300: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #300) | 5a 7e ff 7d 11 39 dd fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 d7 07 3e b9 b2 ed 0a cc c5 e4 47 ac fb df bc | 0b 82 8a 56 1b e7 c2 b9 79 67 f6 05 c1 b0 1a 41 | e0 93 9f 0d bb 5b 76 5f ac 5e ea 5e 58 49 c4 c3 | 9b f8 0e 2d 48 75 fe 88 ae 81 6e bd fc ad 1e 40 | 65 b9 12 2a 8f 3a b5 a4 e3 d6 7e 50 9a b3 12 10 | be 2b 79 8f 29 34 8f 0b 99 4e 4e 7a 4b 49 42 b4 | 04 b2 ac fc ac a3 5a 98 37 17 c3 a2 f0 f0 c9 79 | df 28 17 de 36 02 c0 b4 1b f3 2c 9d ad d8 f6 f4 | c9 44 36 2c 9a 21 d9 68 8c 86 58 41 ae 59 e7 74 | 88 a3 d3 f6 a3 ef 04 07 90 c9 82 f0 a7 49 d9 a4 | 83 0f b0 90 08 f3 eb 02 f4 ec 40 8a 98 92 d5 38 | 7d db 73 c5 6a 66 84 84 0b 3e ba 92 37 b8 31 bd | 61 f6 57 d8 cd fd ab d5 b0 51 b6 0b 3f 5e a3 a5 | 0b 5e 9e c6 f9 0e 39 09 62 b7 fe 88 e1 1e 94 68 | 7e ba 69 87 7e ff 7f 13 a8 f4 7a 0a b2 7e 1c 3c | 9c 70 0e 6e a8 6f 4b 28 4f f5 1d ce 10 46 27 eb | 29 00 00 24 db d2 83 de 45 20 a2 89 40 10 d1 ad | 44 17 5c 15 2b 8f 9e 84 0d 1b 42 0f a9 75 90 ef | 32 25 81 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 9c e3 05 f1 a6 88 c9 89 5f 4a 78 | 8b 60 50 45 77 4b 7a a3 00 00 00 1c 00 00 40 05 | 2b d5 a3 e8 51 d4 0b 1b d6 4d 4a ff ba 69 1c 93 | 2c 16 fd 8b | libevent_free: release ptr-libevent@0x7fb35c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0eac0 | #300 spent 0.2 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 7e ff 7d 11 39 dd fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #300 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #300 | rejected packet: | 5a 7e ff 7d 11 39 dd fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #300: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0853 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae4840 | handling event EVENT_RETRANSMIT for parent state #287 | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #287 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #287 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49669.75871; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002984 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0eac0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #287 | libevent_malloc: new ptr-libevent@0x7fb35c04b850 size 128 "road-eastnet-nonat-35" #287: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #287) | 50 65 03 a0 08 b6 fa f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e c0 75 39 cf 17 11 31 32 ce 73 1e 64 99 bc f2 | 7f 98 bb e8 80 c2 38 47 74 80 17 bf 6d 41 27 75 | 39 62 b9 71 ae 1a 47 19 83 cd 81 c0 c8 3d 11 61 | bb 8a a5 d6 29 bd 01 7d f4 ca 44 6d 69 e4 8a 69 | a7 cc 95 e2 b5 6b 25 ca 57 eb 58 2b 4d 53 44 df | 33 8c 6f 33 81 90 ab 83 53 f5 4e 38 ab 63 7b 68 | f5 e4 10 b1 02 5a b6 e7 d6 07 bf 37 24 09 70 4b | bc 69 6e bc 79 b8 a5 58 fa 3b e4 57 c6 64 3b 30 | 47 47 bf b7 ad 67 14 cd 0a eb 04 a2 61 54 d3 a6 | 12 98 21 de 78 b3 bb b5 ae 98 e3 4e 86 f6 80 ab | 82 7f f6 f8 ef c2 b3 23 41 0b ad f4 1d 15 a3 d0 | bf fe 7d f5 bb 15 19 74 8e f2 b9 4c 77 84 ef 53 | 7c be 1b be 09 20 be 00 d9 ce 47 ea 9d 1e 79 80 | e6 b0 92 f0 11 bf e8 8c fd 97 bb 02 bf 46 b7 fa | 29 38 a8 9a ba d7 d1 99 c1 56 93 83 a6 04 d2 fc | 1b 5a ee 22 cc c4 78 02 0c 67 9c 0f 51 14 b2 6f | 29 00 00 24 82 dd 74 7a ae e7 29 d0 0c 9c 0c 72 | 8c 59 8b ec 3e a7 b7 92 7c 72 73 9c 73 da ee 57 | 06 e2 80 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 92 a1 ec 2f 80 2a 27 61 6c 7b 0f | 4c 73 2b 71 f0 03 c4 ea 00 00 00 1c 00 00 40 05 | 71 9b 20 c5 40 26 cd 9d eb 7f a3 62 71 86 bd 52 | 4f c4 9f f6 | libevent_free: release ptr-libevent@0x7fb33800f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae4840 | #287 spent 0.22 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 65 03 a0 08 b6 fa f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #287 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #287 | rejected packet: | 50 65 03 a0 08 b6 fa f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #287: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0868 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0d4c0 | handling event EVENT_RETRANSMIT for parent state #61 | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #61 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #61 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49669.784207; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008006 exceeds limit? YES "road-eastnet-nonat-61" #61: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-61" #61: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #313 at 0x557d46a26790 | State DB: adding IKEv2 state #313 in UNDEFINED | pstats #313 ikev2.ike started | Message ID: init #313: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #313: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #313; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-61" #313: initiating v2 parent SA to replace #61 | using existing local IKE proposals for connection road-eastnet-nonat-61 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 313 for state #313 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ae4840 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #313 | libevent_malloc: new ptr-libevent@0x7fb33800f1a0 size 128 | #313 spent 0.0667 milliseconds in ikev2_parent_outI1() | RESET processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #61 ikev2.ike failed too-many-retransmits | crypto helper 13 resuming | crypto helper 13 starting work-order 313 for state #313 | pstats #61 ikev2.ike deleted too-many-retransmits | #61 spent 2.69 milliseconds in total | [RE]START processing: state #61 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in delete_state() at state.c:879) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 313 "road-eastnet-nonat-61" #61: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #61: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #61 "road-eastnet-nonat-61" #61: deleting IKE SA for connection 'road-eastnet-nonat-61' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-61' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-61 | State DB: deleting IKEv2 state #61 in PARENT_I1 | parent state #61: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 313 time elapsed 0.000576 seconds | (#313) spent 0.576 milliseconds in crypto helper computing work-order 313: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 313 for state #313 to event queue | scheduling resume sending helper answer for #313 | stop processing: state #61 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_malloc: new ptr-libevent@0x7fb35c0125d0 size 128 | libevent_free: release ptr-libevent@0x7fb34803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | in statetime_stop() and could not find #61 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 13 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-61 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-61" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-61' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-61" | stop processing: connection "road-eastnet-nonat-61" (in initiate_a_connection() at initiate.c:349) | spent 0.0606 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #313 | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 313 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #313 | **emit ISAKMP Message: | initiator cookie: | 5f e0 5b 3a aa b2 0d 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-61 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 69 72 14 0f 17 54 5f cc c5 98 fb 35 26 a3 92 e2 | ikev2 g^x 11 a3 ad ea c4 71 33 c5 3b 09 0d 86 8a ef c9 16 | ikev2 g^x 41 6e 6e 33 c5 10 cc f1 5e 47 e9 ca 13 f8 ee 4f | ikev2 g^x 37 f9 0e ac 70 04 12 68 e2 ae b0 7b dd cb cb ab | ikev2 g^x d1 0b 9f 48 8f e3 3e b7 e3 65 ca 3d b0 79 98 5c | ikev2 g^x d4 18 e2 6e 8f 62 4a 4d 34 e2 ac f2 57 5e 56 f3 | ikev2 g^x 96 24 71 ed eb 39 5a 9f 4d 0a 51 e3 f2 80 2e 9c | ikev2 g^x c7 e3 0a d7 46 cd 62 d8 70 57 a4 15 e0 2e 57 82 | ikev2 g^x 00 9c 85 fc cc fb ec 67 7d 2f f7 de 8d 85 b7 9a | ikev2 g^x ae 6a 14 45 c8 4f c3 df 8d 60 30 87 57 0e a1 b0 | ikev2 g^x 8b bf f6 18 27 37 f1 3e 81 c1 ec 19 9b f6 db 06 | ikev2 g^x 57 00 87 5d ef 1f e5 81 9a 44 f2 c0 14 62 b9 b1 | ikev2 g^x a3 5a 63 7e 11 93 6f 2a 71 ae af 90 3a 04 4e 7a | ikev2 g^x a3 7a 98 c8 8a bb b2 5a a5 8c d5 d7 51 2b fa cf | ikev2 g^x d5 ea ac 65 e9 8c f9 24 80 81 e7 38 45 fd 2e f5 | ikev2 g^x 33 21 e2 b5 ea 65 8b be be 31 9f 87 b8 9f 6c 5b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 50 24 81 a9 b8 a1 9e c5 6d 65 2e b2 7c 32 12 aa | IKEv2 nonce 77 af 34 a7 17 a7 54 1f 7b 13 4b 11 43 e0 57 b0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5f e0 5b 3a aa b2 0d 66 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3d | natd_hash: port= 01 f4 | natd_hash: hash= 5e d7 79 da 83 ae 02 6d 20 64 f0 64 33 fe 2f 85 | natd_hash: hash= 1b 7e 43 e4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5e d7 79 da 83 ae 02 6d 20 64 f0 64 33 fe 2f 85 | Notify data 1b 7e 43 e4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5f e0 5b 3a aa b2 0d 66 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= bb f1 5c c9 25 91 06 ec a8 bd 6e 4b ab 50 48 3a | natd_hash: hash= 1c ac 06 f7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bb f1 5c c9 25 91 06 ec a8 bd 6e 4b ab 50 48 3a | Notify data 1c ac 06 f7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #313 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #313: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #313 to 4294967295 after switching state | Message ID: IKE #313 skipping update_recv as MD is fake | Message ID: sent #313 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-61" #313: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.61:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #313) | 5f e0 5b 3a aa b2 0d 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 72 14 0f 17 54 5f cc c5 98 fb 35 26 a3 92 e2 | 11 a3 ad ea c4 71 33 c5 3b 09 0d 86 8a ef c9 16 | 41 6e 6e 33 c5 10 cc f1 5e 47 e9 ca 13 f8 ee 4f | 37 f9 0e ac 70 04 12 68 e2 ae b0 7b dd cb cb ab | d1 0b 9f 48 8f e3 3e b7 e3 65 ca 3d b0 79 98 5c | d4 18 e2 6e 8f 62 4a 4d 34 e2 ac f2 57 5e 56 f3 | 96 24 71 ed eb 39 5a 9f 4d 0a 51 e3 f2 80 2e 9c | c7 e3 0a d7 46 cd 62 d8 70 57 a4 15 e0 2e 57 82 | 00 9c 85 fc cc fb ec 67 7d 2f f7 de 8d 85 b7 9a | ae 6a 14 45 c8 4f c3 df 8d 60 30 87 57 0e a1 b0 | 8b bf f6 18 27 37 f1 3e 81 c1 ec 19 9b f6 db 06 | 57 00 87 5d ef 1f e5 81 9a 44 f2 c0 14 62 b9 b1 | a3 5a 63 7e 11 93 6f 2a 71 ae af 90 3a 04 4e 7a | a3 7a 98 c8 8a bb b2 5a a5 8c d5 d7 51 2b fa cf | d5 ea ac 65 e9 8c f9 24 80 81 e7 38 45 fd 2e f5 | 33 21 e2 b5 ea 65 8b be be 31 9f 87 b8 9f 6c 5b | 29 00 00 24 50 24 81 a9 b8 a1 9e c5 6d 65 2e b2 | 7c 32 12 aa 77 af 34 a7 17 a7 54 1f 7b 13 4b 11 | 43 e0 57 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e d7 79 da 83 ae 02 6d 20 64 f0 64 | 33 fe 2f 85 1b 7e 43 e4 00 00 00 1c 00 00 40 05 | bb f1 5c c9 25 91 06 ec a8 bd 6e 4b ab 50 48 3a | 1c ac 06 f7 | state #313 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb33800f1a0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ae4840 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #313 | libevent_malloc: new ptr-libevent@0x7fb34803b0b0 size 128 | #313 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49669.785363 | resume sending helper answer for #313 suppresed complete_v2_state_transition() and stole MD | #313 spent 0.326 milliseconds in resume sending helper answer | stop processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c0125d0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f e0 5b 3a aa b2 0d 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #313 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #313 | rejected packet: | 5f e0 5b 3a aa b2 0d 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3d fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #313: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a50110 | handling event EVENT_RETRANSMIT for parent state #265 | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #265 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #265 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49669.785444; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003138 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800feb0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #265 | libevent_malloc: new ptr-libevent@0x7fb384032b00 size 128 "road-eastnet-nonat-13" #265: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #265) | 5e d6 2a e3 fc d6 88 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 2e 3a 15 7c f9 00 41 72 02 12 64 4c 6b 73 52 | bb 8d bc 96 e4 69 5a 27 ff 16 12 40 6d b3 e6 7d | 28 6d d8 d8 46 ae 55 b1 20 60 d0 f0 2c d7 5a 32 | f1 e8 5b 54 2b 16 ec 87 57 a5 e1 c1 08 80 a6 16 | a0 4f 0f 3b 62 e5 8c cb aa 65 e4 d5 87 37 d0 85 | 34 de df b2 ac 15 11 24 c5 c0 e2 ba 8e bf 6a 38 | 92 5b d1 dd 84 fb 29 ef cf 37 36 ed 82 a0 ef 7a | 79 c3 2b da 2f 96 ad 2b 46 50 67 74 44 c2 8f 22 | 65 99 b1 3a 1c fd 70 cc 25 39 6a 77 0a f9 8c f3 | 33 34 af 74 f2 1a 52 31 29 6f 53 43 ce 77 a1 c0 | 4e ad 32 24 24 86 73 ad 16 2d 19 8b 36 54 d6 8f | 96 95 e4 0b 0b df d1 24 22 12 35 73 ac 81 e7 c1 | af 88 20 ae e1 fa 41 09 f0 f6 2b 19 42 79 9e 92 | 6a 95 0b 69 19 21 ee ba 94 35 b0 07 aa 13 f3 40 | 4f 27 f7 e8 7d ea ae b3 14 bf 0c b2 8b a5 e7 1f | 2e 4a 4a 5e 40 8d d3 1a 30 c1 1d 13 0d 61 d3 15 | 29 00 00 24 d2 1b cb fe 42 33 59 cd 17 75 9b cc | f4 b0 0c 18 45 31 71 9f e7 2e 80 d7 48 7b 93 7c | d8 b3 ab 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 77 56 b7 16 48 fa 98 9b c1 2d 60 | a6 6c bc 07 2c 3a ef 47 00 00 00 1c 00 00 40 05 | 5a c9 c6 01 25 8a 31 37 7b d0 f2 6b d1 02 08 77 | 0a b6 4e aa | libevent_free: release ptr-libevent@0x7fb37404b5c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a50110 | #265 spent 0.0709 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e d6 2a e3 fc d6 88 0b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #265 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #265 | rejected packet: | 5e d6 2a e3 fc d6 88 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #265: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0375 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a855c0 | handling event EVENT_RETRANSMIT for parent state #301 | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #301 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #301 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49669.800668; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001965 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a50110 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #301 | libevent_malloc: new ptr-libevent@0x7fb37404b5c0 size 128 "road-eastnet-nonat-49" #301: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #301) | 04 2d 84 e7 d7 11 c2 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 3c a0 2e 05 57 66 74 9e 59 04 02 1e 6b 82 64 | 24 cf 86 32 1b 49 63 31 85 6e 91 96 dd e7 a7 21 | 78 ee 5c 0c 83 da 97 1a 0c 46 69 7c d4 8f 0d 6c | 0b 43 52 49 09 9a 24 da 36 13 01 09 31 88 8b 5b | 38 73 77 00 83 94 ba bf 7c fa 22 16 ff 64 be 16 | 43 df 4f 1d b8 18 88 ee 83 b1 c9 32 ce 1f e3 0d | 40 e4 05 2a 7d 12 64 bf de 51 1d 4c d5 99 11 64 | 9a df 9d ae e7 e1 f9 df 89 9a 5f 11 f6 4b 39 47 | 36 de 08 ec a1 59 7b 84 9f e8 cd af ca a0 8a 29 | aa 2e 7e 1a 1d 88 43 74 5c 19 1a 8f 44 5f 83 95 | cc 00 d8 ee 8f cb 95 29 ae 58 5c 08 01 62 ea 7e | 97 e9 bf 6a 36 31 ba 2d 83 4b 4a ef ce 50 36 44 | 4f a8 a5 8e ad 2c 99 bd c1 01 08 ba ee 5e 1c 63 | 9e 50 96 b6 7a 6e 9f de cf c5 73 a0 7c d6 3d 3a | fe 11 5d 0f 1c cb 4b 02 b4 b1 f7 0c 56 bd a2 fe | d4 f1 da 5a fb cc f5 22 d5 c9 55 2b 49 27 7a 02 | 29 00 00 24 9d f4 32 14 da 15 0d 5d b3 86 88 1b | ed 98 fc e3 a3 7a 35 ba 87 aa 0c 85 93 07 0b 69 | 9d 37 a2 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 4c 33 35 25 dc 8b ec 4f 4f 50 86 | 6f 49 f3 b3 44 40 22 71 00 00 00 1c 00 00 40 05 | d2 03 8c 03 1f b3 ee 14 98 31 7f d2 44 da 50 e8 | 1a 08 5c 44 | libevent_free: release ptr-libevent@0x7fb37000f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a855c0 | #301 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 2d 84 e7 d7 11 c2 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #301 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #301 | rejected packet: | 04 2d 84 e7 d7 11 c2 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #301: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0757 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #288 | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #288 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #288 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49669.822012; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003371 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a855c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #288 | libevent_malloc: new ptr-libevent@0x7fb37000f1a0 size 128 "road-eastnet-nonat-36" #288: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #288) | bf 5c b8 9a ac cd 00 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e dd 69 c1 03 95 4d 9d ab 37 9e bd 4e 38 ec e5 | f2 39 ed 30 ab 4f b4 af 21 e6 29 da a0 8f 8f e9 | 98 9a 5c 5c fe fe ce 8c 1e 28 6b bd f2 27 35 da | c4 21 0a d8 6a ca c2 98 92 8e 38 38 a2 a7 6b ba | 5f d2 6c ce e3 9f f3 13 3d ec 78 7e f5 b7 1e b1 | c9 c9 b0 04 f7 e8 40 14 e7 76 0c 5b a9 d0 33 de | 38 f0 55 f2 f8 c3 51 4e 26 12 33 85 1a 59 5d 06 | e7 63 42 d3 d5 d3 89 6c 22 47 f2 98 c6 f4 da 55 | 13 a9 2a 55 81 33 8b eb 87 ee 13 8e 33 aa a8 42 | 9f da b4 47 d8 37 6a 92 68 90 c1 81 a0 df a1 37 | a4 78 f7 b3 8d d2 2d ce a0 c9 68 dd 56 89 c4 d1 | 63 8d aa 71 1f 08 79 a0 6d 66 a0 3e 16 15 54 65 | d5 46 20 67 d9 5b 61 9c 6a 83 fc f8 ba b1 78 4c | 57 19 a7 94 fa 72 b9 cd d4 1a e2 8c ec 18 65 32 | 0a 6f a6 9d 17 41 ad c3 33 be e4 df 39 be bb 83 | 36 2c fd e8 5d 07 b2 3e e4 4e 6e 8c 65 67 24 e6 | 29 00 00 24 6b 44 05 03 68 15 67 d5 e0 ba b2 f4 | 3c 29 af e5 83 d8 9f ee 30 22 ac b5 c3 ee cd df | dc 79 2d 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 39 d5 43 71 fe 6f b5 ee bc 1b f9 | 48 2a ac fe 4d 86 a5 da 00 00 00 1c 00 00 40 05 | f7 70 11 42 70 0c d7 f2 22 65 12 cb b8 c3 7c 30 | 56 c5 c0 c0 | libevent_free: release ptr-libevent@0x7fb388011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #288 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 5c b8 9a ac cd 00 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #288 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #288 | rejected packet: | bf 5c b8 9a ac cd 00 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #288: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aee100 | handling event EVENT_RETRANSMIT for parent state #307 | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #307 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #307 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49669.825275; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499723 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #307 | libevent_malloc: new ptr-libevent@0x7fb388011f30 size 128 "road-eastnet-nonat-55" #307: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #307) | ae 96 63 e8 bb 6a 85 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 14 ed e9 d6 19 10 2b ec dd 37 28 c8 5c 2b 9d | 4d 1c 56 bb af 08 b5 7a 4b a6 fc d3 e6 37 09 e4 | 3f 1e 28 12 a3 d4 a0 95 36 fb be 53 ba 61 08 91 | a5 59 64 37 32 8f 20 cb c1 4b 24 6f aa 9c 35 eb | 55 d5 bc cd 87 7a 12 07 97 e1 3e 1d fe 09 4e 05 | 56 a9 36 dd e5 c2 2b 14 24 4c 71 52 b8 4a bc e5 | 44 05 b4 12 ae 0a ee 10 63 d4 56 16 75 0e 24 7a | d8 3e 40 79 17 42 50 86 a6 54 47 3f a4 b0 ab e0 | d2 28 b5 9a 24 3f 4a c2 b0 91 11 3a 15 fb b2 26 | f2 b0 63 ef 6f 51 35 98 2f 68 7c a5 78 9f 97 ad | 5a 09 af 4c 24 bb dd dc ab e6 24 53 27 3d 9e 03 | 62 ad 6c f7 99 7f 86 ec 99 0f d4 42 fa 99 b4 e1 | da 5b a4 af 44 6d 6a f4 d7 89 78 8e f4 87 7b 68 | 84 5a 7e 9d b0 43 44 70 16 90 a6 1a d2 cc 8f 85 | 21 0d 25 8b 92 c7 6a 03 1f 2e 4c a1 00 a9 05 b1 | b5 20 9b fc 87 43 c1 10 a6 42 8f 4d 15 f7 48 a2 | 29 00 00 24 9a 25 60 c3 7e e3 91 a3 9d b3 07 0f | ff 92 da ab 25 95 17 32 0d 82 17 4c 51 9e de a9 | 5d 92 35 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b e0 88 15 5c bc 20 c5 96 41 9f 3a | 7e ef 58 59 98 52 f8 6e 00 00 00 1c 00 00 40 05 | 92 3b 5d d1 4e 37 91 81 a5 d6 c2 94 c8 33 2c 33 | 6a d3 7b 36 | libevent_free: release ptr-libevent@0x7fb36c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aee100 | #307 spent 0.0921 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 96 63 e8 bb 6a 85 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #307 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #307 | rejected packet: | ae 96 63 e8 bb 6a 85 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #307: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0408 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a63210 | handling event EVENT_RETRANSMIT for parent state #62 | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #62 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #62 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49669.85155; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00992 exceeds limit? YES "road-eastnet-nonat-62" #62: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-62" #62: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #314 at 0x557d46a27f90 | State DB: adding IKEv2 state #314 in UNDEFINED | pstats #314 ikev2.ike started | Message ID: init #314: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #314: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #314; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-62" #314: initiating v2 parent SA to replace #62 | using existing local IKE proposals for connection road-eastnet-nonat-62 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 314 for state #314 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aee100 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #314 | libevent_malloc: new ptr-libevent@0x7fb36c01d920 size 128 | #314 spent 0.0671 milliseconds in ikev2_parent_outI1() | RESET processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 resuming | crypto helper 17 starting work-order 314 for state #314 | start processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #62 ikev2.ike failed too-many-retransmits | pstats #62 ikev2.ike deleted too-many-retransmits | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 314 | #62 spent 2.31 milliseconds in total | [RE]START processing: state #62 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-62" #62: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #62: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #62 "road-eastnet-nonat-62" #62: deleting IKE SA for connection 'road-eastnet-nonat-62' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-62' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-62 | State DB: deleting IKEv2 state #62 in PARENT_I1 | parent state #62: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #62 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb35c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a63210 | in statetime_stop() and could not find #62 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 314 time elapsed 0.000683 seconds | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-62 which received a Delete/Notify but must remain up per local policy | (#314) spent 0.679 milliseconds in crypto helper computing work-order 314: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 314 for state #314 to event queue | scheduling resume sending helper answer for #314 | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7fb350014c70 size 128 | crypto helper 17 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-62" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-62' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-62" | stop processing: connection "road-eastnet-nonat-62" (in initiate_a_connection() at initiate.c:349) | spent 0.0721 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #314 | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 314 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #314 | **emit ISAKMP Message: | initiator cookie: | fd 31 72 f9 64 d3 9c f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-62 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8c 18 14 ac 93 72 6f f5 79 79 36 2d 8e 4c 14 ac | ikev2 g^x ea 91 ec 03 06 fb 84 ad 5e 18 85 94 4b b8 8e ee | ikev2 g^x d9 14 0b 8c 64 c8 45 95 1b 91 75 07 f8 e4 ec 03 | ikev2 g^x 59 35 93 6c 10 48 ab 6b e6 53 29 72 ab ff 3c 2a | ikev2 g^x 61 16 cb b8 bd 31 a5 f8 2f 5d 57 58 e1 26 7c 2e | ikev2 g^x d9 c7 b7 a4 21 ac 7f a4 9a 22 28 50 e4 1d c5 8c | ikev2 g^x 89 bc f7 70 40 e3 4f 71 2a 2a 2e b1 a7 96 2a 7a | ikev2 g^x 82 34 1a e1 0e c4 48 55 41 7f 5a 8b 68 d2 fd 14 | ikev2 g^x f7 10 c0 e4 c1 ac fb 5d c6 f8 34 c9 0a 71 0c 1d | ikev2 g^x 4f 2b 4a ae bd 22 c4 9a db 63 e4 0a ff 3d 5a f9 | ikev2 g^x dc 19 2e 9a 16 8d df 98 1f 04 7e 59 57 62 0a e6 | ikev2 g^x b9 93 59 94 b4 3b eb 70 b1 7b 76 4b 9a 71 ee 97 | ikev2 g^x f5 ac 50 38 4c 04 22 68 a2 68 e3 f1 1d 13 3a e1 | ikev2 g^x 84 4b 7c 08 19 fb 96 e3 58 71 59 95 c0 bd 55 f5 | ikev2 g^x 0d 72 3b 29 f3 ae 58 91 30 ad de 16 a2 e3 03 a0 | ikev2 g^x 02 e9 38 39 b8 a1 6a 55 c4 1d 22 81 8d d1 2c eb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 83 8f 4c 82 0e ff 5a 2c de 21 68 5e 60 c0 57 92 | IKEv2 nonce a6 09 5b 7e 12 e1 2a 75 9d 50 83 dd e3 d1 6f 03 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fd 31 72 f9 64 d3 9c f5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3e | natd_hash: port= 01 f4 | natd_hash: hash= 13 7f 92 43 99 76 22 ce 79 dc 92 3a aa fb 36 5e | natd_hash: hash= 79 bf 23 b0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 13 7f 92 43 99 76 22 ce 79 dc 92 3a aa fb 36 5e | Notify data 79 bf 23 b0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fd 31 72 f9 64 d3 9c f5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e5 74 71 ef f2 a4 7e f6 0b b1 36 a7 2f ae f3 30 | natd_hash: hash= ad 50 42 06 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e5 74 71 ef f2 a4 7e f6 0b b1 36 a7 2f ae f3 30 | Notify data ad 50 42 06 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #314 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #314: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #314 to 4294967295 after switching state | Message ID: IKE #314 skipping update_recv as MD is fake | Message ID: sent #314 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-62" #314: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.62:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #314) | fd 31 72 f9 64 d3 9c f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 18 14 ac 93 72 6f f5 79 79 36 2d 8e 4c 14 ac | ea 91 ec 03 06 fb 84 ad 5e 18 85 94 4b b8 8e ee | d9 14 0b 8c 64 c8 45 95 1b 91 75 07 f8 e4 ec 03 | 59 35 93 6c 10 48 ab 6b e6 53 29 72 ab ff 3c 2a | 61 16 cb b8 bd 31 a5 f8 2f 5d 57 58 e1 26 7c 2e | d9 c7 b7 a4 21 ac 7f a4 9a 22 28 50 e4 1d c5 8c | 89 bc f7 70 40 e3 4f 71 2a 2a 2e b1 a7 96 2a 7a | 82 34 1a e1 0e c4 48 55 41 7f 5a 8b 68 d2 fd 14 | f7 10 c0 e4 c1 ac fb 5d c6 f8 34 c9 0a 71 0c 1d | 4f 2b 4a ae bd 22 c4 9a db 63 e4 0a ff 3d 5a f9 | dc 19 2e 9a 16 8d df 98 1f 04 7e 59 57 62 0a e6 | b9 93 59 94 b4 3b eb 70 b1 7b 76 4b 9a 71 ee 97 | f5 ac 50 38 4c 04 22 68 a2 68 e3 f1 1d 13 3a e1 | 84 4b 7c 08 19 fb 96 e3 58 71 59 95 c0 bd 55 f5 | 0d 72 3b 29 f3 ae 58 91 30 ad de 16 a2 e3 03 a0 | 02 e9 38 39 b8 a1 6a 55 c4 1d 22 81 8d d1 2c eb | 29 00 00 24 83 8f 4c 82 0e ff 5a 2c de 21 68 5e | 60 c0 57 92 a6 09 5b 7e 12 e1 2a 75 9d 50 83 dd | e3 d1 6f 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 7f 92 43 99 76 22 ce 79 dc 92 3a | aa fb 36 5e 79 bf 23 b0 00 00 00 1c 00 00 40 05 | e5 74 71 ef f2 a4 7e f6 0b b1 36 a7 2f ae f3 30 | ad 50 42 06 | state #314 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c01d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aee100 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a63210 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #314 | libevent_malloc: new ptr-libevent@0x7fb36c01d920 size 128 | #314 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49669.852795 | resume sending helper answer for #314 suppresed complete_v2_state_transition() and stole MD | #314 spent 0.313 milliseconds in resume sending helper answer | stop processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb350014c70 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 31 72 f9 64 d3 9c f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #314 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #314 | rejected packet: | fd 31 72 f9 64 d3 9c f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3e fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #314: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24700 | handling event EVENT_RETRANSMIT for parent state #302 | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #302 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #302 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49669.866957; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001577 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000feb0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #302 | libevent_malloc: new ptr-libevent@0x7fb350014c70 size 128 "road-eastnet-nonat-50" #302: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #302) | 9a b7 d9 69 b7 b5 8b 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 3b 38 5a ca c1 e0 66 18 62 3b 15 6c b6 3b d4 | d7 ad 95 64 47 60 48 b5 a1 40 89 ca 34 68 f4 5c | b5 12 b3 25 90 eb 49 eb b5 40 df ef 79 a7 f8 11 | fd 6b 8c b7 57 dd 67 6c a2 67 a7 4f be 73 1c 93 | d0 14 73 9b 52 53 0b 4e 5f f6 38 f3 b8 8b db d1 | 1c 9f 4f 10 7c 2c fa b8 0b 5c b4 6b 80 d0 b7 e3 | b6 70 3b 9c d9 ad f0 38 ba 59 1a 5a 32 60 56 90 | 00 97 ec 2a 32 4c ce 8c d0 a5 94 f1 33 fd e4 3c | bb e9 7f cc 0d 4c 4c be 2b f0 80 18 d5 0b e3 68 | da 32 8d 6f 53 ff 6f c4 bc c7 44 a5 1e 56 ed 9a | 22 1a 47 85 cc bb d8 71 12 33 c9 06 fb bd 86 04 | 8a 5e c6 10 00 05 dc db 1a ce ef c2 9a df 5b 3e | f1 94 44 f2 93 b5 45 ee f4 39 f1 54 d0 08 74 2f | 98 02 e6 14 93 d3 55 70 9b c1 5c 0a 6d f7 72 e9 | 7a 20 75 0d 8a 45 81 c5 cd 4a 79 7e 2a a7 cf ed | b9 84 dc 2f 1f b1 1b 47 62 4c ef 36 89 f7 2e e1 | 29 00 00 24 4e 70 94 e8 7e 52 b9 fd e3 7f cf aa | b8 11 eb 44 2a e9 8b 91 cb 46 0f b2 fd 17 ad 44 | 7e 6a 9e 6e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 54 86 00 1a 73 2d f1 8e 31 28 7e 7f | 4e 1d 05 b3 46 7f 2d d6 00 00 00 1c 00 00 40 05 | e4 ea 9a e9 78 75 4e 5e 40 77 76 74 52 35 fb 06 | 70 d7 5d cd | libevent_free: release ptr-libevent@0x7fb344035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24700 | #302 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a b7 d9 69 b7 b5 8b 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #302 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #302 | rejected packet: | 9a b7 d9 69 b7 b5 8b 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #302: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aee080 | handling event EVENT_RETRANSMIT for parent state #266 | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #266 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #266 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49669.872241; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004677 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #266 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 "road-eastnet-nonat-14" #266: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #266) | 6b cc e0 12 8b aa 91 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 c7 f6 72 9c a5 df d1 37 bd 8c a8 3d 12 ac f8 | 22 21 09 d5 08 f4 92 dd f1 6b 1f 81 7b 7f 3b 9d | 10 fa 77 c3 74 a7 03 4d 17 3b 47 94 f2 0e 9e 20 | ba c3 57 67 86 fd d2 e5 0d 53 bc 0e c2 cf a4 3a | ca 89 10 10 9a 9f 52 0e c5 60 b3 38 be 05 37 b4 | a3 6b 5d d8 04 66 d6 b5 93 93 8f 47 58 63 40 52 | 1b f8 2c cb 93 59 07 2b ad c7 18 ca a5 e9 24 fa | 41 de 1f 43 7f 1f 27 30 49 67 c7 c8 16 fd 61 a4 | 21 e9 05 98 46 f1 50 b6 8e 31 ad a9 2c 10 19 f5 | b9 ef 6b d3 e7 07 06 8e bf 18 8b 0a 77 f5 44 4b | 1c 00 21 d9 dc b3 66 3f a9 4b df cd cd bd 25 d2 | 2a cd 52 ad da b3 d3 bc be e7 d4 32 97 da 0f e8 | e2 29 51 0e 96 41 b4 ff 9b 20 c1 68 f8 22 6b 37 | bc 2d 7d 2a 13 01 a1 b3 05 fa c1 ea 1c 1f 45 97 | 4c 05 13 ad eb 35 15 0f f5 10 99 91 9b 3f 29 a1 | 29 e0 29 94 46 69 fe a4 f9 df d3 46 9b f7 d6 fc | 29 00 00 24 85 48 4e 62 cb aa ef f3 1e 98 d2 14 | 8e 36 5f 8a 20 c7 f8 35 5a c8 08 b9 4d a2 67 85 | 59 88 c1 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae c1 7f 5b 24 ac dc 11 ec a1 5c 57 | 31 3f 4b 60 7a 20 b0 c6 00 00 00 1c 00 00 40 05 | 71 38 17 79 8f 5d ce 34 6f 4c c4 ce cc 6f 78 37 | 7e be 6c a5 | libevent_free: release ptr-libevent@0x7fb38800c460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aee080 | #266 spent 0.089 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b cc e0 12 8b aa 91 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #266 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #266 | rejected packet: | 6b cc e0 12 8b aa 91 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #266: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0398 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11680 | handling event EVENT_RETRANSMIT for parent state #289 | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #289 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #289 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49669.89547; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002905 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aee080 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #289 | libevent_malloc: new ptr-libevent@0x7fb38800c460 size 128 "road-eastnet-nonat-37" #289: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #289) | 2e 50 46 ff ee 4c e9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 67 60 81 00 e9 c5 12 22 cc 49 d1 8d 87 9d ec | ba e1 ae d7 0f ff 89 2c 01 49 2f 18 a4 d8 5a ff | 94 bb 3c 2d 6c 23 65 3c 9a 45 52 91 05 ff 55 0b | 22 ea fe ea 0a 4e f6 5b 7a 62 13 72 d3 65 de 8a | 6c f3 72 1b af fd 0c 36 3a 05 de a4 6d 9b 92 ce | d9 79 2b 75 ee 9a e2 a1 2c b2 02 b2 85 a2 98 a2 | 3c 63 cc 1f 7e c9 81 88 5b 95 14 a9 db c3 cc 4c | 7d 2a a7 8c 64 c7 93 92 12 cf 28 08 e5 ab 19 fa | 3f 53 9a 5b d7 86 99 40 82 c2 0d 84 83 94 43 d6 | cb b8 b3 06 64 05 bf d9 9d 5b fb 6a 5b 6a d2 16 | 6f b8 75 0b 98 2a 33 7f 2c 96 47 b3 69 76 55 52 | ca 3f b2 34 c4 b8 60 62 c8 0f 07 9c 2a 3e 70 02 | 1f 60 03 3e 97 1e ea 39 09 c8 ac 49 fb 70 ef af | f9 7e 7f f0 e4 2d 18 4d f8 20 f5 71 8f b4 fc be | 11 8b 08 ae 82 4a 27 f4 11 f5 e0 5f 14 7e a2 b5 | 66 07 59 01 f7 8e 64 17 db 17 82 9f be dd 61 54 | 29 00 00 24 70 cb ce 4e e8 fa 33 67 08 21 14 9b | 70 83 d5 d1 77 4f cc 4e 50 51 8a 00 6c d4 e4 19 | 33 47 80 f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 95 9d ea dc 9b 1a b8 2d d8 fe 0a | bb 49 1d 2c c9 ad 47 73 00 00 00 1c 00 00 40 05 | 70 48 4d 18 17 11 80 57 99 3c 90 8c f0 f2 b1 e5 | 98 18 b0 dd | libevent_free: release ptr-libevent@0x7fb338048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11680 | #289 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2e 50 46 ff ee 4c e9 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #289 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #289 | rejected packet: | 2e 50 46 ff ee 4c e9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #289: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acab40 | handling event EVENT_RETRANSMIT for parent state #308 | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #308 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #308 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49669.916878; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501151 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11680 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #308 | libevent_malloc: new ptr-libevent@0x7fb338048a10 size 128 "road-eastnet-nonat-56" #308: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #308) | 80 0a 88 98 4b f9 e7 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 60 f0 11 1d 6f 3c e8 3a d0 c5 a1 1f 8b f6 d6 | b8 1e e6 d3 27 fa 35 0f 2e 35 7c 6a ac 4d b0 5a | 6b 0b 3b 4a 46 9a c1 e4 d2 3d 95 4c 54 c7 f8 b0 | a3 25 b2 e5 19 52 cf a8 80 64 9a 61 44 3f 5d 89 | b3 ab 84 f7 4d 8d 5e c3 d5 83 26 99 08 7b 56 8e | d5 6a c7 4a 76 f4 45 38 3c fa 31 64 fb a7 68 c6 | c9 63 22 21 ab 35 5e 58 62 e8 99 25 ff 5b 61 ec | 55 a2 5b 36 cc 02 da 3b ef 08 f7 a5 b1 e6 33 04 | 63 ee 2e 9b fc 5a 62 eb 0d 0f da ab 7c b3 2f f6 | 1d 06 62 78 d0 f2 08 dd bd 5a f1 dc aa 18 b1 3b | 54 75 36 28 b8 4d f2 e6 89 e0 6c 9d a4 f4 71 27 | 99 51 48 e8 63 85 2b 41 07 00 9f 7b ff df b2 6f | 90 1f ac 1e 28 94 ef cf 9a 1c cf 53 7f 88 76 ba | 31 4b 32 29 7d 41 fd ba 51 dd cc 44 b9 6c 4f e1 | cf 89 c3 39 c3 eb 26 5a 05 e3 ac c1 a6 d7 ca ae | 7d 27 a2 0d 12 e5 de 71 e2 d1 95 9c b5 ec 14 d8 | 29 00 00 24 d3 c9 38 16 a4 35 41 62 ad 53 1d 3f | a5 70 61 f3 55 11 e2 06 85 67 55 51 bd 50 94 8d | 80 2d 38 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 1c df ea ba 44 23 ff a6 53 af 56 | 8c 58 68 ea 71 49 69 6d 00 00 00 1c 00 00 40 05 | 14 0c bd d4 4b a2 ff 28 87 d9 dd 83 a7 c2 2b 61 | 5c 8c 59 cd | libevent_free: release ptr-libevent@0x7fb358009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab40 | #308 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 0a 88 98 4b f9 e7 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #308 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #308 | rejected packet: | 80 0a 88 98 4b f9 e7 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #308: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #63 | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #63 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #63 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49669.919131; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.014724 exceeds limit? YES "road-eastnet-nonat-63" #63: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-63" #63: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #315 at 0x557d46a29550 | State DB: adding IKEv2 state #315 in UNDEFINED | pstats #315 ikev2.ike started | Message ID: init #315: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #315: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #315; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-63" #315: initiating v2 parent SA to replace #63 | using existing local IKE proposals for connection road-eastnet-nonat-63 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 315 for state #315 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46acab40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #315 | libevent_malloc: new ptr-libevent@0x7fb358009640 size 128 | #315 spent 0.063 milliseconds in ikev2_parent_outI1() | RESET processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #63 ikev2.ike failed too-many-retransmits | pstats #63 ikev2.ike deleted too-many-retransmits | #63 spent 2.49 milliseconds in total | [RE]START processing: state #63 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-63" #63: deleting state (STATE_PARENT_I1) aged 64.016s and NOT sending notification | parent state #63: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #63 "road-eastnet-nonat-63" #63: deleting IKE SA for connection 'road-eastnet-nonat-63' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-63' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-63 | State DB: deleting IKEv2 state #63 in PARENT_I1 | parent state #63: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 18 resuming | crypto helper 18 starting work-order 315 for state #315 | stop processing: state #63 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 315 | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | in statetime_stop() and could not find #63 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-63 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-63" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-63' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-63" | stop processing: connection "road-eastnet-nonat-63" (in initiate_a_connection() at initiate.c:349) | spent 0.0581 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 315 time elapsed 0.000523 seconds | (#315) spent 0.526 milliseconds in crypto helper computing work-order 315: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 315 for state #315 to event queue | scheduling resume sending helper answer for #315 | libevent_malloc: new ptr-libevent@0x7fb354014c70 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #315 | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 315 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #315 | **emit ISAKMP Message: | initiator cookie: | 44 ed db 2c fe 0c f2 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-63 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7e 87 b1 78 dc 97 f3 7a 79 3b d6 3e 86 ea b2 fa | ikev2 g^x 5d 34 e2 db 78 24 8f 15 59 97 e5 e6 f6 90 b1 aa | ikev2 g^x 59 98 1b 57 96 2d 7a a6 68 c9 eb 8b 7d f6 64 68 | ikev2 g^x a2 48 77 fc cb 5d 8f 0e b2 52 9b 77 09 f1 21 ba | ikev2 g^x 81 62 c1 7e 82 df 5b 48 60 ba f6 08 04 c2 77 74 | ikev2 g^x 9c c8 6b 41 93 1d 14 39 f9 1e b0 b2 5b 1d 3c e0 | ikev2 g^x ca f1 1f 63 24 c8 cc 04 a5 c5 8f 7d 86 30 95 90 | ikev2 g^x fb a8 83 29 7a f1 ce 8e 64 9a 9f 82 39 eb 4b a4 | ikev2 g^x b2 6f ce 0a 5b bd e7 1a af 9d af 92 27 aa 66 57 | ikev2 g^x 8e 91 52 b5 d0 96 33 ee eb 0f 07 5f 2f 56 77 d0 | ikev2 g^x 9a 1f cb 0e 53 2f d5 4e b4 5b a5 9c 4c 15 af e1 | ikev2 g^x 28 86 0f 89 11 d9 bc 73 6b a7 3c 58 a9 04 2c eb | ikev2 g^x f2 53 51 79 62 f5 50 bf 5f 75 e1 7f 28 95 f0 09 | ikev2 g^x 87 f1 d9 ee 26 2c 8a ee 7d 84 2e 04 f2 6c 42 e0 | ikev2 g^x 67 e8 19 47 db 94 b6 12 29 d7 1d dc 8f 61 2d e0 | ikev2 g^x 53 f7 53 7d 18 19 05 ed 93 cb 84 d8 40 1b 1d fe | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5f cd cc 5e 9b b5 1f f6 2d c3 6f 0d 70 ea 63 15 | IKEv2 nonce bc b8 5b 49 76 c9 be 04 9e 55 ff 0b 33 d9 e0 fc | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 44 ed db 2c fe 0c f2 34 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3f | natd_hash: port= 01 f4 | natd_hash: hash= 47 2c d3 1b 13 1c a2 69 95 f2 01 8c cb 3c f6 d6 | natd_hash: hash= 71 d0 e6 be | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 47 2c d3 1b 13 1c a2 69 95 f2 01 8c cb 3c f6 d6 | Notify data 71 d0 e6 be | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 44 ed db 2c fe 0c f2 34 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= b1 bd 1a 4e 17 0a c1 3c 72 20 f5 8a 28 12 f4 7a | natd_hash: hash= a3 f8 1e e7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b1 bd 1a 4e 17 0a c1 3c 72 20 f5 8a 28 12 f4 7a | Notify data a3 f8 1e e7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #315 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #315: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #315 to 4294967295 after switching state | Message ID: IKE #315 skipping update_recv as MD is fake | Message ID: sent #315 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-63" #315: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.63:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #315) | 44 ed db 2c fe 0c f2 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e 87 b1 78 dc 97 f3 7a 79 3b d6 3e 86 ea b2 fa | 5d 34 e2 db 78 24 8f 15 59 97 e5 e6 f6 90 b1 aa | 59 98 1b 57 96 2d 7a a6 68 c9 eb 8b 7d f6 64 68 | a2 48 77 fc cb 5d 8f 0e b2 52 9b 77 09 f1 21 ba | 81 62 c1 7e 82 df 5b 48 60 ba f6 08 04 c2 77 74 | 9c c8 6b 41 93 1d 14 39 f9 1e b0 b2 5b 1d 3c e0 | ca f1 1f 63 24 c8 cc 04 a5 c5 8f 7d 86 30 95 90 | fb a8 83 29 7a f1 ce 8e 64 9a 9f 82 39 eb 4b a4 | b2 6f ce 0a 5b bd e7 1a af 9d af 92 27 aa 66 57 | 8e 91 52 b5 d0 96 33 ee eb 0f 07 5f 2f 56 77 d0 | 9a 1f cb 0e 53 2f d5 4e b4 5b a5 9c 4c 15 af e1 | 28 86 0f 89 11 d9 bc 73 6b a7 3c 58 a9 04 2c eb | f2 53 51 79 62 f5 50 bf 5f 75 e1 7f 28 95 f0 09 | 87 f1 d9 ee 26 2c 8a ee 7d 84 2e 04 f2 6c 42 e0 | 67 e8 19 47 db 94 b6 12 29 d7 1d dc 8f 61 2d e0 | 53 f7 53 7d 18 19 05 ed 93 cb 84 d8 40 1b 1d fe | 29 00 00 24 5f cd cc 5e 9b b5 1f f6 2d c3 6f 0d | 70 ea 63 15 bc b8 5b 49 76 c9 be 04 9e 55 ff 0b | 33 d9 e0 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 2c d3 1b 13 1c a2 69 95 f2 01 8c | cb 3c f6 d6 71 d0 e6 be 00 00 00 1c 00 00 40 05 | b1 bd 1a 4e 17 0a c1 3c 72 20 f5 8a 28 12 f4 7a | a3 f8 1e e7 | state #315 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb358009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46acab40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #315 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 | #315 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49669.920178 | resume sending helper answer for #315 suppresed complete_v2_state_transition() and stole MD | #315 spent 0.344 milliseconds in resume sending helper answer | stop processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb354014c70 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ed db 2c fe 0c f2 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #315 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #315 | rejected packet: | 44 ed db 2c fe 0c f2 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3f fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #315: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.039 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25c40 | handling event EVENT_RETRANSMIT for parent state #303 | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #303 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #303 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49669.946323; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001501 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400feb0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #303 | libevent_malloc: new ptr-libevent@0x7fb354014c70 size 128 "road-eastnet-nonat-51" #303: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #303) | 0b e0 0a 79 39 06 c6 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 24 21 b4 0b e3 09 db 3f b6 a5 77 bb 87 5e ad | 66 c7 93 9a 8c 2e 04 3b 08 20 ac 03 a5 76 12 ab | b6 66 99 c7 bf 97 92 b1 32 f2 d4 40 1d 20 9f 0b | 85 c0 47 40 73 82 3c 97 59 5e 7a bf 29 1b 9b 33 | 65 e1 1d e1 06 4b 23 bb cd c3 d7 6f 1f 4d 6a d4 | a5 35 47 13 70 43 5f 27 3f e8 8d 45 36 1b 13 e8 | 52 7a c9 fd 4e c5 bf df 1d ad 19 77 99 5f 83 de | fd ac 63 24 8e b6 c0 c8 ec b2 56 6f 38 d9 99 06 | 17 b7 7e be be 8d 7f 5c 2d b1 d6 35 c6 26 88 21 | 6c 47 69 c2 4b 86 0c 66 51 e7 f5 2d 4c fb e5 79 | 2e e4 ba 11 88 c3 1e d5 cd ce 6d 00 ed f9 6c 2a | 2b 8c 48 d8 fb b0 3c 63 91 8e ae 31 9b af bf 15 | 0b 41 67 9d 12 12 70 9c 8c c1 6a db fc d2 6b 50 | c9 fa d7 b3 18 db 4f f1 d7 45 f6 0f b9 6e 33 c9 | 52 60 cc f3 be 3c 22 f0 a3 35 db d2 db d6 a6 94 | 52 18 e2 de 57 43 68 d8 7b eb ec 67 cd ed 35 3d | 29 00 00 24 80 ff 8a 78 69 ce 7f 51 87 5f 84 ba | c7 a1 f0 8c ea cb 68 68 e4 3e 06 9f 5c 43 cc 06 | 85 44 5c 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 50 a2 4e fc 4d 1b 58 77 6d e9 3b | 74 ac 43 c3 0f 7e 66 e7 00 00 00 1c 00 00 40 05 | d9 44 30 c1 08 7f 7e c4 16 be af c3 f1 e2 c1 72 | 14 da 79 2d | libevent_free: release ptr-libevent@0x7fb35400f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c40 | #303 spent 0.0925 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b e0 0a 79 39 06 c6 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #303 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #303 | rejected packet: | 0b e0 0a 79 39 06 c6 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #303: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46af6380 | handling event EVENT_RETRANSMIT for parent state #267 | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #267 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #267 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49669.96561; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005198 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c40 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #267 | libevent_malloc: new ptr-libevent@0x7fb35400f1a0 size 128 "road-eastnet-nonat-15" #267: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #267) | 6f db 88 0f fe 70 dc 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e ec fe e4 22 11 a7 b5 a2 ee 25 53 3a 2f 1c 0a | 48 51 04 db 46 22 ad 6d 3c 60 e2 cb fb cc f5 7a | 6d 5e c9 24 ec d8 52 4f 96 5b 62 28 fb 9e eb fd | ac e9 f7 6f 4d 1a f9 74 24 29 e6 a2 80 a2 a7 c1 | b9 1c da 76 8c 9d 40 38 6a 26 13 d3 da 72 01 42 | b6 16 9c ca 09 1d 9b a9 90 70 fb 71 d1 ea b4 45 | 95 3b 5d b5 2c c1 00 ea bd 33 e0 43 00 b9 22 f4 | c9 60 90 dc b0 82 03 89 b0 c4 03 22 4b cf 7c 50 | 96 60 35 da 9c 4c f2 64 7d be b4 90 21 9b 54 ab | 96 09 b1 ee 1f 0d db 8e 22 4d 09 d6 43 6f c8 f1 | da 0c fd f4 69 33 b0 96 0f 1a 25 07 1d e6 1b 37 | 20 ff 37 b4 80 d9 a3 78 93 5a eb 5d 36 bd 9e 35 | 1e 0e a9 e8 13 eb 16 8f ff d5 26 ef c2 d5 47 45 | 91 9b e3 0e c5 08 1f 34 46 fe b0 3e f5 ce e1 c7 | 7c 47 c2 2d d2 f7 4c 06 62 a0 ae f2 e6 53 ff 73 | ee d6 e5 9b 28 8e f3 4d ef ad 40 41 9e 20 99 95 | 29 00 00 24 6d 5a fb f5 8a b7 85 2e cf 37 31 c5 | a8 e8 a7 22 a7 58 7e 34 8e 06 61 77 f0 7b 3b ce | d2 d0 22 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 b4 63 c8 b9 e3 2d fa 51 7c 79 27 | ca 3c 7a c2 0c 39 1a 2b 00 00 00 1c 00 00 40 05 | d9 fc ba 6b 91 d3 e0 ee c2 81 f3 1d 92 b2 24 2f | bf 44 6b 65 | libevent_free: release ptr-libevent@0x7fb38000c460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af6380 | #267 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f db 88 0f fe 70 dc 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #267 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #267 | rejected packet: | 6f db 88 0f fe 70 dc 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #267: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46af3800 | handling event EVENT_RETRANSMIT for parent state #64 | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #64 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #64 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49669.977043; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007268 exceeds limit? YES "road-eastnet-nonat-64" #64: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-64" #64: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #316 at 0x557d46a2ab10 | State DB: adding IKEv2 state #316 in UNDEFINED | pstats #316 ikev2.ike started | Message ID: init #316: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #316: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #316; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-64" #316: initiating v2 parent SA to replace #64 | using existing local IKE proposals for connection road-eastnet-nonat-64 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 316 for state #316 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46af6380 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #316 | libevent_malloc: new ptr-libevent@0x7fb38000c460 size 128 | #316 spent 0.108 milliseconds in ikev2_parent_outI1() | RESET processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #64 ikev2.ike failed too-many-retransmits | pstats #64 ikev2.ike deleted too-many-retransmits | #64 spent 2.32 milliseconds in total | [RE]START processing: state #64 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-64" #64: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #64: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #64 | crypto helper 7 resuming | crypto helper 7 starting work-order 316 for state #316 "road-eastnet-nonat-64" #64: deleting IKE SA for connection 'road-eastnet-nonat-64' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 316 | add revival: connection 'road-eastnet-nonat-64' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-64 | State DB: deleting IKEv2 state #64 in PARENT_I1 | parent state #64: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 316 time elapsed 0.000965 seconds | (#316) spent 0.968 milliseconds in crypto helper computing work-order 316: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 316 for state #316 to event queue | scheduling resume sending helper answer for #316 | libevent_malloc: new ptr-libevent@0x7fb348014c70 size 128 | crypto helper 7 waiting (nothing to do) | stop processing: state #64 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb35804b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af3800 | in statetime_stop() and could not find #64 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-64 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-64" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-64' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-64" | stop processing: connection "road-eastnet-nonat-64" (in initiate_a_connection() at initiate.c:349) | spent 0.0863 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #316 | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 316 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #316 | **emit ISAKMP Message: | initiator cookie: | e8 62 07 3d 83 c9 27 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-64 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x db 67 27 d8 ca da 21 fc 33 ba 4f 94 10 8a c5 3e | ikev2 g^x 5d c6 ca e9 be 5f 5b 62 d9 f8 5f ef cd 1d 75 de | ikev2 g^x 4e 46 e5 c8 47 0c 64 48 a0 a0 be ad 1a 88 be 29 | ikev2 g^x 21 51 4f e4 bd 33 bd be 35 5e 1a f3 c6 5c 72 cc | ikev2 g^x 14 4f 34 ba 69 93 e8 bf 07 ec 5c 62 f6 72 9d af | ikev2 g^x 95 ca 7c 71 3b 37 93 92 3a 98 4e 7a 53 2f 9a a8 | ikev2 g^x 2a b6 32 33 20 cf eb 65 6b e0 73 23 52 d2 61 14 | ikev2 g^x 64 77 57 5a e0 a6 ac 4c 66 6c 73 74 1e 30 64 d8 | ikev2 g^x 26 eb 6f 24 f1 a2 d0 b2 6b 58 a7 b2 54 48 ba 72 | ikev2 g^x 09 ae 65 3c 30 0d df 54 4e 6a 33 e2 26 65 76 99 | ikev2 g^x ea 2e 2a 30 fa a7 4c 97 4d 74 ba 19 a6 b3 7b 01 | ikev2 g^x 82 88 fa e7 6a 85 ab 68 48 39 a4 91 e9 e4 44 02 | ikev2 g^x 10 7a c6 c8 2e 47 03 39 25 a6 92 8c e5 51 eb 52 | ikev2 g^x f8 c7 61 20 39 65 61 dc 27 00 53 74 46 c8 5c be | ikev2 g^x 3b 90 c1 02 b8 be b2 17 6b a3 86 6f 65 fa c8 19 | ikev2 g^x e6 54 1a 74 80 e0 70 41 21 d7 44 54 50 0b cd 29 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 89 45 06 65 65 b3 8c d6 0c df 20 90 5a e6 b0 5e | IKEv2 nonce f6 87 85 10 8d 96 3d 5e 67 1f 54 38 77 de f5 29 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e8 62 07 3d 83 c9 27 cd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 40 | natd_hash: port= 01 f4 | natd_hash: hash= 53 e4 d3 0f a4 c8 a7 ec 05 e8 fa d2 6d 31 a1 ad | natd_hash: hash= f7 6f 67 3e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 53 e4 d3 0f a4 c8 a7 ec 05 e8 fa d2 6d 31 a1 ad | Notify data f7 6f 67 3e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e8 62 07 3d 83 c9 27 cd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 0a a4 aa 05 10 e6 c7 c4 a5 a6 8e 98 2e fc 0d 29 | natd_hash: hash= 7c 74 b9 43 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0a a4 aa 05 10 e6 c7 c4 a5 a6 8e 98 2e fc 0d 29 | Notify data 7c 74 b9 43 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #316 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #316: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #316 to 4294967295 after switching state | Message ID: IKE #316 skipping update_recv as MD is fake | Message ID: sent #316 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-64" #316: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.64:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #316) | e8 62 07 3d 83 c9 27 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 67 27 d8 ca da 21 fc 33 ba 4f 94 10 8a c5 3e | 5d c6 ca e9 be 5f 5b 62 d9 f8 5f ef cd 1d 75 de | 4e 46 e5 c8 47 0c 64 48 a0 a0 be ad 1a 88 be 29 | 21 51 4f e4 bd 33 bd be 35 5e 1a f3 c6 5c 72 cc | 14 4f 34 ba 69 93 e8 bf 07 ec 5c 62 f6 72 9d af | 95 ca 7c 71 3b 37 93 92 3a 98 4e 7a 53 2f 9a a8 | 2a b6 32 33 20 cf eb 65 6b e0 73 23 52 d2 61 14 | 64 77 57 5a e0 a6 ac 4c 66 6c 73 74 1e 30 64 d8 | 26 eb 6f 24 f1 a2 d0 b2 6b 58 a7 b2 54 48 ba 72 | 09 ae 65 3c 30 0d df 54 4e 6a 33 e2 26 65 76 99 | ea 2e 2a 30 fa a7 4c 97 4d 74 ba 19 a6 b3 7b 01 | 82 88 fa e7 6a 85 ab 68 48 39 a4 91 e9 e4 44 02 | 10 7a c6 c8 2e 47 03 39 25 a6 92 8c e5 51 eb 52 | f8 c7 61 20 39 65 61 dc 27 00 53 74 46 c8 5c be | 3b 90 c1 02 b8 be b2 17 6b a3 86 6f 65 fa c8 19 | e6 54 1a 74 80 e0 70 41 21 d7 44 54 50 0b cd 29 | 29 00 00 24 89 45 06 65 65 b3 8c d6 0c df 20 90 | 5a e6 b0 5e f6 87 85 10 8d 96 3d 5e 67 1f 54 38 | 77 de f5 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 e4 d3 0f a4 c8 a7 ec 05 e8 fa d2 | 6d 31 a1 ad f7 6f 67 3e 00 00 00 1c 00 00 40 05 | 0a a4 aa 05 10 e6 c7 c4 a5 a6 8e 98 2e fc 0d 29 | 7c 74 b9 43 | state #316 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38000c460 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46af6380 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af3800 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #316 | libevent_malloc: new ptr-libevent@0x7fb35804b7c0 size 128 | #316 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49669.978921 | resume sending helper answer for #316 suppresed complete_v2_state_transition() and stole MD | #316 spent 0.55 milliseconds in resume sending helper answer | stop processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb348014c70 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 62 07 3d 83 c9 27 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #316 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #316 | rejected packet: | e8 62 07 3d 83 c9 27 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 40 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #316: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0721 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #290 | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #290 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #290 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49669.981183; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002775 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #290 | libevent_malloc: new ptr-libevent@0x7fb348014c70 size 128 "road-eastnet-nonat-38" #290: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #290) | d9 b1 5b a3 d1 9c 57 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 dc 77 37 88 c0 74 0b c8 60 da a3 8f 9c e4 42 | 29 fe d5 c9 98 e7 af 66 82 be 95 44 77 f6 93 6f | 24 98 d7 cc c4 a6 16 af 14 a2 ad 53 a8 a5 93 3c | a1 26 c3 2d 65 3f cc 3f f0 9b 21 66 64 c4 82 00 | 30 f1 57 86 bf eb 51 88 bf 71 0a 30 68 dc 14 50 | 80 50 e1 6f 25 74 d9 af 8d f4 b9 89 60 e8 c3 c8 | 3b d5 14 f3 53 b4 96 85 6c 74 39 5d ff ee 22 a4 | ad 4c 82 96 29 6f f2 59 77 4e 48 da 14 23 7a 5c | 78 bb 13 4c f8 05 33 6d 40 79 5d e2 85 b7 6d 6e | b2 54 b0 03 d6 63 64 61 00 6d fd d4 8a 79 cd 3d | f1 25 f9 cf fc 5d a4 f7 ef 48 25 44 50 58 6a b2 | cd 2c dd 4c f0 ff 5e 32 e5 0f bc 63 fa 03 d5 1a | 9a ab 7e 2b 95 53 36 2e 47 c1 65 a2 7b d7 cd db | 40 2b 7a b2 21 b9 e9 6e fc 75 da 49 33 c1 98 35 | c7 9c 09 b3 47 fb 10 3f e1 56 6f be 75 69 b0 33 | f1 cb e8 e7 d6 74 b0 43 37 f7 9f 8c c7 7c d0 1e | 29 00 00 24 f3 df a5 ae 0e f0 b6 8d 6c 86 f6 fd | ac 3e 20 3a 6e ef cc 6e 76 09 43 e5 b3 97 07 d6 | b5 fd b7 b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 90 0c 81 3c 3a d2 14 9a 30 eb 10 | fa 46 c9 fe 37 f4 bb 0e 00 00 00 1c 00 00 40 05 | ea fc 09 da ae 61 e7 e4 dc 7a 6e 5d ad e3 e5 ff | 21 64 e7 65 | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #290 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 b1 5b a3 d1 9c 57 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #290 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #290 | rejected packet: | d9 b1 5b a3 d1 9c 57 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #290: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0723 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #304 | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #304 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #304 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49670.010597; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001886 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #304 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 "road-eastnet-nonat-52" #304: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #304) | a8 9e ad f8 7e d0 8f 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 65 f7 e5 5b 0c d9 66 1f 9e de 27 b7 a9 e5 61 | e4 fa 1d ab 7c 97 a1 bd 20 9d f3 a2 b5 27 bd 1f | 8f a0 e6 70 97 5a a5 25 66 20 75 9f 12 5d d3 39 | 9b 63 a2 db 2b 74 35 c0 72 13 97 27 05 c2 62 b9 | e3 8d 4c df 62 26 b2 ef 71 4f 57 9f 86 a7 ae 23 | 96 73 f6 29 74 fa 2e d9 85 44 9e f4 6e a1 bf c3 | aa ee d5 e9 ef ed b7 f6 19 80 49 92 25 03 a6 fd | 97 ad 05 c1 4c ee d0 28 55 8e 3c fe 56 3a de 43 | 58 54 9b db 87 cd a3 da 37 73 a4 bf 3c b5 ae e4 | 24 52 70 fc 3d a8 8c fa 47 49 00 40 14 e1 2e ac | c2 2a 40 fe b6 ab ac c0 48 61 8f e7 d0 5a d3 f9 | ee 88 91 3d 36 46 3b a6 d1 44 56 83 2a 21 0b 8c | bf 71 69 ea 58 fa fe b7 82 58 cb 6d 26 3b 79 12 | d5 7b af 2b 0b 68 46 9e 23 40 da 39 fc 30 e7 9e | 96 5b ef fa 83 ac 69 ef e9 6f 36 21 f5 e9 e9 e7 | 28 93 fa 84 b2 62 19 86 19 c7 09 bf 96 a9 13 fa | 29 00 00 24 01 38 84 c9 86 37 f1 ee b2 c5 1a 16 | 9c 76 d6 78 f3 8e 1b 3e 7b e2 b1 ac 57 81 00 ff | be 40 7b 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 4d a8 e4 29 87 92 f9 c9 e0 47 d4 | 8d 2b 33 0e 7e 88 7a bd 00 00 00 1c 00 00 40 05 | 14 10 d4 5f c4 9e a3 33 92 fb 64 77 06 27 8a 6c | e3 d6 b0 88 | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #304 spent 0.309 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 9e ad f8 7e d0 8f 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #304 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #304 | rejected packet: | a8 9e ad f8 7e d0 8f 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #304: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.103 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aba600 | handling event EVENT_RETRANSMIT for parent state #309 | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #309 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #309 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49670.014188; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500728 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #309 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 "road-eastnet-nonat-57" #309: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #309) | 90 f2 f2 23 da 96 f5 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 ae c5 2a 76 79 d9 11 80 1f 96 5b 2c 21 55 0e | 52 32 59 59 4d 8b 62 1b 1e 24 ff e4 61 ef 06 93 | bc 09 7d 02 95 4e 35 bb 5f 6e 04 f9 37 8a f2 09 | 6d fa 0e df ec 2a 67 53 c6 cd 21 62 19 ee 00 c8 | c1 d4 ad 74 e9 af 08 d7 51 b7 54 c4 5f 85 6b a2 | 75 c9 cd 93 29 db 83 26 13 60 09 0f 01 6b a6 ba | d6 a0 83 70 f4 77 2d c4 f9 20 b0 ee 09 7b a0 33 | 18 ea 6e 22 92 4b e5 33 07 61 e4 39 b1 8b 5a 98 | 64 4f e0 7f 33 58 7a 46 70 b5 36 54 83 e6 d8 37 | ce 3d 5e 64 00 34 b5 97 2a dc 6b 73 bd d2 1e e9 | b3 9d 99 c9 3c f8 18 03 58 76 b7 9a 2d cb ea 7b | 87 84 d1 8b 6e c6 cd 25 71 71 3e 99 ff 0a 1f c8 | 85 6f a7 e5 39 50 54 2c 26 84 44 cb fa 8a 51 d4 | ba 1f 9f 90 6f 93 95 a4 f9 85 9a b3 12 aa 79 46 | 05 32 e1 d4 7a f2 7a 36 94 b5 70 4b aa c4 3f f8 | f9 83 fb b5 44 81 41 3d b3 33 5c b4 2d 71 df 84 | 29 00 00 24 4c 7f 8f 28 17 31 ae 2a a7 3c 6d 65 | 1e 41 da 23 81 4d 09 fa 18 57 5d 4f dc f4 df 6c | 20 61 c5 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f3 f8 4c d7 1e 43 e6 3f 42 eb 30 72 | de e0 e8 5b 93 4d e7 89 00 00 00 1c 00 00 40 05 | e8 f2 fc 6d 83 fa 04 7a cc 0f 54 6b 70 28 25 4d | 2b f2 eb 8b | libevent_free: release ptr-libevent@0x7fb378014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aba600 | #309 spent 0.225 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 f2 f2 23 da 96 f5 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #309 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #309 | rejected packet: | 90 f2 f2 23 da 96 f5 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #309: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.102 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000d120 | handling event EVENT_RETRANSMIT for parent state #65 | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #65 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #65 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49670.044808; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010296 exceeds limit? YES "road-eastnet-nonat-65" #65: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-65" #65: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #317 at 0x557d46a2c0d0 | State DB: adding IKEv2 state #317 in UNDEFINED | pstats #317 ikev2.ike started | Message ID: init #317: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #317: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #317; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-65" #317: initiating v2 parent SA to replace #65 | using existing local IKE proposals for connection road-eastnet-nonat-65 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 317 for state #317 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aba600 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #317 | libevent_malloc: new ptr-libevent@0x7fb378014c70 size 128 | #317 spent 0.267 milliseconds in ikev2_parent_outI1() | RESET processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 resuming | crypto helper 8 starting work-order 317 for state #317 | start processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #65 ikev2.ike failed too-many-retransmits | pstats #65 ikev2.ike deleted too-many-retransmits | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 317 | #65 spent 2.54 milliseconds in total | [RE]START processing: state #65 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-65" #65: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #65: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #65 "road-eastnet-nonat-65" #65: deleting IKE SA for connection 'road-eastnet-nonat-65' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-65' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-65 | State DB: deleting IKEv2 state #65 in PARENT_I1 | parent state #65: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 317 time elapsed 0.002649 seconds | (#317) spent 2.63 milliseconds in crypto helper computing work-order 317: ikev2_outI1 KE (pcr) | stop processing: state #65 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 8 sending results from work-order 317 for state #317 to event queue | scheduling resume sending helper answer for #317 | libevent_free: release ptr-libevent@0x7fb360012840 | libevent_malloc: new ptr-libevent@0x7fb34c014c70 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000d120 | in statetime_stop() and could not find #65 | crypto helper 8 waiting (nothing to do) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-65 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-65" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-65' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-65" | stop processing: connection "road-eastnet-nonat-65" (in initiate_a_connection() at initiate.c:349) | spent 0.174 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #317 | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 317 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #317 | **emit ISAKMP Message: | initiator cookie: | 5c a2 6c e8 b2 28 e0 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-65 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x cc 95 b1 4b f7 b4 a2 f3 b1 63 69 55 e2 98 fb 3f | ikev2 g^x 54 1a 28 48 de 85 37 f8 72 76 27 96 2b db 5e 33 | ikev2 g^x be af 42 49 c9 29 81 c9 57 56 f4 f8 82 3d a6 af | ikev2 g^x 88 eb 0d 9f f2 82 74 6e 72 69 04 07 19 3d d2 37 | ikev2 g^x 11 a5 22 ff d2 62 d9 98 57 a1 83 a7 1e 49 51 44 | ikev2 g^x e5 97 9b 8d 73 a0 96 d3 53 9b fb 45 84 94 f7 3d | ikev2 g^x 76 31 fc 24 62 7d a9 38 2a be 46 8d 20 60 df db | ikev2 g^x 07 4b 68 3b f4 5c 0f 39 ef 4f 67 78 1a 41 5e d9 | ikev2 g^x 21 46 6b 9d 25 f7 b9 97 47 6b 61 67 28 72 bc ab | ikev2 g^x 6f b2 d8 94 3c 23 68 03 63 f9 fd 48 53 49 f9 59 | ikev2 g^x 58 72 d8 2c 34 ca e6 db de 5e 25 73 b8 b7 64 58 | ikev2 g^x c2 d1 ad 6f 0e ca 13 2e b2 5c 80 d7 ba 3d 3c a9 | ikev2 g^x 3d f9 8e 60 bf 1b 92 40 5e 5c 05 7e ba c9 a8 db | ikev2 g^x 73 77 de d1 63 54 7f e1 7b 4e 7b ea 38 36 f5 df | ikev2 g^x ad 83 e3 b0 ba 8d 91 72 ad 79 42 21 5b 3d 90 52 | ikev2 g^x 8f 94 65 66 3d 81 71 1c 3b 5e 4d 22 19 2e a8 97 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 16 ec e2 f4 0d c3 b4 c6 88 17 fa c1 57 1b 6f 8e | IKEv2 nonce 72 cf d0 88 9c 45 18 d1 76 a6 22 b7 e9 88 2c 7a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5c a2 6c e8 b2 28 e0 f8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 41 | natd_hash: port= 01 f4 | natd_hash: hash= d4 7d b4 14 23 b3 6a c1 75 92 cb 9c f1 ae 10 a4 | natd_hash: hash= 55 81 67 0f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d4 7d b4 14 23 b3 6a c1 75 92 cb 9c f1 ae 10 a4 | Notify data 55 81 67 0f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5c a2 6c e8 b2 28 e0 f8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d3 a6 c6 52 7d d4 a1 eb 3d cd 3f 6c 65 3f cc dd | natd_hash: hash= 6f e3 2d 43 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d3 a6 c6 52 7d d4 a1 eb 3d cd 3f 6c 65 3f cc dd | Notify data 6f e3 2d 43 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #317 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #317: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #317 to 4294967295 after switching state | Message ID: IKE #317 skipping update_recv as MD is fake | Message ID: sent #317 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-65" #317: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.65:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #317) | 5c a2 6c e8 b2 28 e0 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 95 b1 4b f7 b4 a2 f3 b1 63 69 55 e2 98 fb 3f | 54 1a 28 48 de 85 37 f8 72 76 27 96 2b db 5e 33 | be af 42 49 c9 29 81 c9 57 56 f4 f8 82 3d a6 af | 88 eb 0d 9f f2 82 74 6e 72 69 04 07 19 3d d2 37 | 11 a5 22 ff d2 62 d9 98 57 a1 83 a7 1e 49 51 44 | e5 97 9b 8d 73 a0 96 d3 53 9b fb 45 84 94 f7 3d | 76 31 fc 24 62 7d a9 38 2a be 46 8d 20 60 df db | 07 4b 68 3b f4 5c 0f 39 ef 4f 67 78 1a 41 5e d9 | 21 46 6b 9d 25 f7 b9 97 47 6b 61 67 28 72 bc ab | 6f b2 d8 94 3c 23 68 03 63 f9 fd 48 53 49 f9 59 | 58 72 d8 2c 34 ca e6 db de 5e 25 73 b8 b7 64 58 | c2 d1 ad 6f 0e ca 13 2e b2 5c 80 d7 ba 3d 3c a9 | 3d f9 8e 60 bf 1b 92 40 5e 5c 05 7e ba c9 a8 db | 73 77 de d1 63 54 7f e1 7b 4e 7b ea 38 36 f5 df | ad 83 e3 b0 ba 8d 91 72 ad 79 42 21 5b 3d 90 52 | 8f 94 65 66 3d 81 71 1c 3b 5e 4d 22 19 2e a8 97 | 29 00 00 24 16 ec e2 f4 0d c3 b4 c6 88 17 fa c1 | 57 1b 6f 8e 72 cf d0 88 9c 45 18 d1 76 a6 22 b7 | e9 88 2c 7a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 7d b4 14 23 b3 6a c1 75 92 cb 9c | f1 ae 10 a4 55 81 67 0f 00 00 00 1c 00 00 40 05 | d3 a6 c6 52 7d d4 a1 eb 3d cd 3f 6c 65 3f cc dd | 6f e3 2d 43 | state #317 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb378014c70 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aba600 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #317 | libevent_malloc: new ptr-libevent@0x7fb360012840 size 128 | #317 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49670.049885 | resume sending helper answer for #317 suppresed complete_v2_state_transition() and stole MD | #317 spent 1.5 milliseconds in resume sending helper answer | stop processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c014c70 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c a2 6c e8 b2 28 e0 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #317 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #317 | rejected packet: | 5c a2 6c e8 b2 28 e0 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 41 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #317: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.21 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_RETRANSMIT for parent state #291 | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #291 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #291 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49670.056425; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003085 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #291 | libevent_malloc: new ptr-libevent@0x7fb34c014c70 size 128 "road-eastnet-nonat-39" #291: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #291) | 77 85 93 ea 80 0c b0 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 1c 76 58 29 75 7e d4 f4 bf 59 3f 6e da 30 13 | 97 91 e5 4d 2a 44 30 c6 77 2b e1 aa 90 8a 91 6e | f8 8f d9 e7 ab d5 fb c9 18 4a c7 0e 37 35 b2 f0 | a3 12 8b 8a 64 ba 60 9e 98 18 5b 0a c2 a4 de 16 | 9c ef 90 7b a5 b4 e5 01 26 3c 58 d0 37 33 d3 a2 | f6 fe 76 4d 01 cd 2b d6 3c be b9 eb 0d 8b d4 d7 | c4 c5 12 bf 64 f2 4f a2 ec 8b b1 e0 3a c2 a2 21 | f4 b9 1a d7 ab ef 1a 0d f1 e1 8b 50 27 cf 98 3e | c2 08 00 e6 03 cf bf ee 86 72 2a aa f9 36 e9 49 | e2 ab b6 47 68 84 b5 9d f0 67 c8 08 03 1b 51 9a | 44 fe 69 c7 87 64 78 4a b7 c0 08 da 1d ee c0 bb | be c8 5e a1 c1 cc 41 ab 33 ca fd ed d6 b3 7c b1 | a7 a2 c7 36 15 58 52 6a 99 ee 8c 84 f7 78 81 e9 | 01 61 49 76 ce 6b ac b8 4a dc 03 3e 4e 23 ba 57 | f4 01 5b 74 05 72 0c 07 03 e6 2a 5d b3 8c b8 ef | e7 cd d3 38 e6 37 e3 80 1e bc 5b 24 b7 a5 cb 2c | 29 00 00 24 37 f4 21 d3 cc 8d d5 11 a4 01 4c 20 | b4 32 01 c8 03 d8 fb 70 07 27 01 09 a0 70 e5 36 | d3 fe b6 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 76 dc 7a b2 16 bf 01 10 e9 6f f4 | 8e 92 4c 8c 19 0f b1 8b 00 00 00 1c 00 00 40 05 | 48 a8 ae 2a a4 d2 aa 19 46 f9 d2 d9 d7 e1 ad a4 | ae e0 ac b4 | libevent_free: release ptr-libevent@0x7fb36004b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | #291 spent 0.421 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 85 93 ea 80 0c b0 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #291 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #291 | rejected packet: | 77 85 93 ea 80 0c b0 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #291: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b09380 | handling event EVENT_RETRANSMIT for parent state #305 | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #305 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #305 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49670.086281; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002506 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #305 | libevent_malloc: new ptr-libevent@0x7fb36004b850 size 128 "road-eastnet-nonat-53" #305: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #305) | 0e ad 9d c2 5e 8b 6a 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f e9 9f 5a 6d 09 7a 5d 23 c1 f2 37 ec ac 20 ff | 0b 05 30 7f 53 42 af cd 03 b4 6f 3e 30 98 76 c7 | f6 6d 6d 12 6f 8b e0 b3 ea 9f 1c 72 a6 90 d8 7b | c5 96 6d 18 3e 75 5f 76 31 a1 d4 8e 3c 37 16 33 | 4b dd 74 20 e8 c4 62 66 2a 3f ae 2f 41 fd 91 9d | 82 99 62 7a b3 d1 ba 05 ec 0f 82 e6 50 45 b8 02 | a6 bb b5 5a eb 4b 5a 37 8e aa cf ae a4 3c 1d 53 | 50 52 15 71 96 99 84 38 c8 90 39 55 a5 f6 b3 e4 | fd 1f be 6b e2 f1 ec 6b de 7b d5 b2 c2 99 77 3a | 99 91 64 fd 16 0c de 9a 77 95 51 ab fa 63 18 46 | 7f 05 f1 01 08 4a 40 52 ce 73 f7 5e 69 b6 5a cc | 4f 80 84 49 75 3b fb a8 21 4b 60 95 55 81 f4 0d | cb 05 bd e3 26 c4 5a 85 f3 a4 be ed 0d bf dc 15 | 6d 89 c4 7e 34 fc cc cd 95 5c 1d d7 12 73 97 3c | b9 13 4a ef 01 3e 06 0d bc ac d0 d1 a5 d2 76 b5 | 0f e8 f3 1a 11 93 b0 3e ca db 92 a3 66 d7 f8 e1 | 29 00 00 24 f3 38 4c 4d 23 45 96 5c 15 55 c7 5a | 82 60 67 82 ca 1f 2d 10 e7 40 18 d9 8a a9 22 da | 5f 97 93 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 2a f3 b2 21 79 dc dd 37 78 74 cf | d5 e0 cd fd 06 29 e6 7b 00 00 00 1c 00 00 40 05 | 89 f1 13 5f 51 69 37 8e 62 27 27 24 a2 bd 48 85 | 3c 78 e4 8e | libevent_free: release ptr-libevent@0x7fb37800f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b09380 | #305 spent 0.43 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e ad 9d c2 5e 8b 6a 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #305 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #305 | rejected packet: | 0e ad 9d c2 5e 8b 6a 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #305: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.202 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc40 | handling event EVENT_RETRANSMIT for parent state #310 | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #310 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #310 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49670.100121; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501371 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b09380 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #310 | libevent_malloc: new ptr-libevent@0x7fb37800f1a0 size 128 "road-eastnet-nonat-58" #310: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #310) | 15 02 9e 6f d7 63 29 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 27 e5 1e b0 b8 71 be 19 22 95 4e cb bc fb 75 | e9 3b 56 69 33 4e 64 ad 57 4b 29 1e a9 e6 47 1a | 9f d6 c8 79 0e b5 d1 68 4e cf f5 82 76 ae 1c b5 | 09 2e f5 34 f0 f4 52 a3 a8 36 97 6c 75 c0 43 c4 | ee 87 0e 53 ff 09 f4 54 79 74 c0 ae 90 9a ff fd | 29 25 b3 6a e6 b5 58 cb 0a 34 f3 40 7a e1 f0 00 | e8 b9 84 74 bb 8e 47 15 eb 04 15 5e 50 5c 56 6d | 24 4e c6 f1 73 76 98 a0 94 06 1f 4b 61 2c fc 5d | a8 62 64 09 74 1c b7 15 e9 d3 bf 3e 82 77 60 84 | b7 ec 0f bd 1c 3b 5b 97 d2 ff 90 15 40 4c 65 b9 | 49 3d 03 bf e1 e0 85 d7 23 77 e3 10 9e 84 72 33 | 77 bf bf d8 fb 57 2c a9 b4 49 77 20 46 c0 0f 64 | 28 da 55 aa ac 53 17 bb 64 f6 fe 0e af c2 be 09 | 4d 7e 65 25 98 17 8d d6 a3 3b ed 10 34 62 66 3b | 5f 3c 43 cb 1e 2b fc 0b 3e c7 88 ef 40 72 0f 91 | 73 8c 1b 91 80 50 8f 7f 10 7c a8 7c cd 25 bb 09 | 29 00 00 24 8c b6 d4 9e 94 5a 53 1f e0 86 71 ae | 2a 48 4d 09 6b cb 2a d4 c0 d8 ae 06 c9 7c dd 47 | 64 97 96 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 0a e7 b4 3e 63 13 55 ea 18 77 04 | bd 77 d7 da 99 7b 63 27 00 00 00 1c 00 00 40 05 | 5c 4d 49 83 ef 78 da dd 25 a2 53 b8 0f 9a 33 7f | f6 be 51 b8 | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc40 | #310 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 02 9e 6f d7 63 29 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #310 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #310 | rejected packet: | 15 02 9e 6f d7 63 29 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #310: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0694 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ed00 | handling event EVENT_RETRANSMIT for parent state #66 | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #66 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #66 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49670.106517; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010043 exceeds limit? YES "road-eastnet-nonat-66" #66: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-66" #66: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #318 at 0x557d46a2d690 | State DB: adding IKEv2 state #318 in UNDEFINED | pstats #318 ikev2.ike started | Message ID: init #318: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #318: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #318; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-66" #318: initiating v2 parent SA to replace #66 | using existing local IKE proposals for connection road-eastnet-nonat-66 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 318 for state #318 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46abbc40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #318 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 | #318 spent 0.0769 milliseconds in ikev2_parent_outI1() | RESET processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #66 ikev2.ike failed too-many-retransmits | pstats #66 ikev2.ike deleted too-many-retransmits | #66 spent 2.57 milliseconds in total | [RE]START processing: state #66 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-66" #66: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #66: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #66 "road-eastnet-nonat-66" #66: deleting IKE SA for connection 'road-eastnet-nonat-66' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-66' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-66 | State DB: deleting IKEv2 state #66 in PARENT_I1 | crypto helper 12 resuming | crypto helper 12 starting work-order 318 for state #318 | parent state #66: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 318 | stop processing: state #66 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ed00 | in statetime_stop() and could not find #66 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-66 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-66" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-66' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-66" | stop processing: connection "road-eastnet-nonat-66" (in initiate_a_connection() at initiate.c:349) | spent 0.0632 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 318 time elapsed 0.000691 seconds | (#318) spent 0.69 milliseconds in crypto helper computing work-order 318: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 318 for state #318 to event queue | scheduling resume sending helper answer for #318 | libevent_malloc: new ptr-libevent@0x7fb3400125d0 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #318 | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 318 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #318 | **emit ISAKMP Message: | initiator cookie: | b2 9a b8 bc 53 a3 28 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-66 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 37 a5 e6 b7 f3 09 b3 42 4d 70 2a 31 41 4a a2 a1 | ikev2 g^x da f8 c5 36 7a f2 dc 2d e7 30 c8 c3 07 0a c2 47 | ikev2 g^x 04 c4 b8 ae 57 b2 7f d1 c1 3e 18 53 e1 5d 14 23 | ikev2 g^x 04 61 06 e4 91 ef 35 cb ed 7a b9 57 a4 d9 68 76 | ikev2 g^x fa fd da 0f 58 44 d0 fa 3e 4e 2b ac ca 5d a5 c8 | ikev2 g^x 76 05 a5 5d 02 6a 96 c6 41 4e 3f 64 57 cd 41 d5 | ikev2 g^x d0 97 ad ff 58 6a 53 9a 01 1f 6b 3c 24 fe 31 ac | ikev2 g^x 0d 3c 93 ac 2c da 29 01 1d c2 dd be c2 11 80 ff | ikev2 g^x b5 b8 9d 4b 81 9c 72 55 6a 84 69 3f d0 ed e9 0c | ikev2 g^x 2b e3 ca 41 a3 62 7c a2 71 2a 37 58 65 17 c1 53 | ikev2 g^x cd 34 43 97 e4 05 81 70 70 41 b7 fe ed 43 15 27 | ikev2 g^x b6 ca b7 9c 9b 05 11 e5 9d 9d 78 a9 d5 63 3e b9 | ikev2 g^x 63 ef dc 73 f8 b5 32 8d f5 20 3c b0 29 8a 0d 0c | ikev2 g^x 3e 9f 40 29 07 45 7e 5f 6e e1 39 0d cb 64 2d c9 | ikev2 g^x 21 f3 18 88 11 a7 78 9d e5 c3 5e 82 9b 66 98 d0 | ikev2 g^x bb 21 5b 84 f3 89 c9 aa 9f 01 2e d6 67 59 8b 4c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ef 94 98 d7 0c cd d4 f9 7f 97 bf da 65 7b fd be | IKEv2 nonce ba 01 e1 85 cc 2b 5d 20 cf d0 d6 ef 60 90 51 53 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b2 9a b8 bc 53 a3 28 03 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 42 | natd_hash: port= 01 f4 | natd_hash: hash= 57 61 27 ec f1 41 a3 45 56 13 d5 ea 91 6f ea fa | natd_hash: hash= 23 e5 f5 e5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 57 61 27 ec f1 41 a3 45 56 13 d5 ea 91 6f ea fa | Notify data 23 e5 f5 e5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b2 9a b8 bc 53 a3 28 03 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d1 cc 61 18 e0 64 68 30 f0 cc 90 9d 95 49 27 67 | natd_hash: hash= 23 d5 d1 7a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d1 cc 61 18 e0 64 68 30 f0 cc 90 9d 95 49 27 67 | Notify data 23 d5 d1 7a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #318 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #318: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #318 to 4294967295 after switching state | Message ID: IKE #318 skipping update_recv as MD is fake | Message ID: sent #318 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-66" #318: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.66:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #318) | b2 9a b8 bc 53 a3 28 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 a5 e6 b7 f3 09 b3 42 4d 70 2a 31 41 4a a2 a1 | da f8 c5 36 7a f2 dc 2d e7 30 c8 c3 07 0a c2 47 | 04 c4 b8 ae 57 b2 7f d1 c1 3e 18 53 e1 5d 14 23 | 04 61 06 e4 91 ef 35 cb ed 7a b9 57 a4 d9 68 76 | fa fd da 0f 58 44 d0 fa 3e 4e 2b ac ca 5d a5 c8 | 76 05 a5 5d 02 6a 96 c6 41 4e 3f 64 57 cd 41 d5 | d0 97 ad ff 58 6a 53 9a 01 1f 6b 3c 24 fe 31 ac | 0d 3c 93 ac 2c da 29 01 1d c2 dd be c2 11 80 ff | b5 b8 9d 4b 81 9c 72 55 6a 84 69 3f d0 ed e9 0c | 2b e3 ca 41 a3 62 7c a2 71 2a 37 58 65 17 c1 53 | cd 34 43 97 e4 05 81 70 70 41 b7 fe ed 43 15 27 | b6 ca b7 9c 9b 05 11 e5 9d 9d 78 a9 d5 63 3e b9 | 63 ef dc 73 f8 b5 32 8d f5 20 3c b0 29 8a 0d 0c | 3e 9f 40 29 07 45 7e 5f 6e e1 39 0d cb 64 2d c9 | 21 f3 18 88 11 a7 78 9d e5 c3 5e 82 9b 66 98 d0 | bb 21 5b 84 f3 89 c9 aa 9f 01 2e d6 67 59 8b 4c | 29 00 00 24 ef 94 98 d7 0c cd d4 f9 7f 97 bf da | 65 7b fd be ba 01 e1 85 cc 2b 5d 20 cf d0 d6 ef | 60 90 51 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 61 27 ec f1 41 a3 45 56 13 d5 ea | 91 6f ea fa 23 e5 f5 e5 00 00 00 1c 00 00 40 05 | d1 cc 61 18 e0 64 68 30 f0 cc 90 9d 95 49 27 67 | 23 d5 d1 7a | state #318 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46abbc40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ed00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #318 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 | #318 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49670.107813 | resume sending helper answer for #318 suppresed complete_v2_state_transition() and stole MD | #318 spent 0.385 milliseconds in resume sending helper answer | stop processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3400125d0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 9a b8 bc 53 a3 28 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #318 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #318 | rejected packet: | b2 9a b8 bc 53 a3 28 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 42 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #318: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0495 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6f550 | handling event EVENT_RETRANSMIT for parent state #268 | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #268 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #268 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49670.122985; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002706 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370012bf0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #268 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 "road-eastnet-nonat-16" #268: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #268) | 52 eb eb 01 2e 07 ee 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f4 ef 40 5e f5 2a 5e 5a b8 76 94 37 37 12 d2 32 | 87 80 98 31 81 5e ec c8 c0 10 ea 13 f1 32 fd 22 | 5f da f7 72 2a 67 06 fa cf 7f d5 1a c1 ae f1 92 | 7b 53 ad 16 00 b6 90 61 58 94 dd 7e 4a 9f 32 98 | a2 2e 9b 12 92 70 47 ac 39 ac 02 84 c9 35 b9 57 | 66 95 1c 62 b4 f0 47 38 3f ec 43 4d cf 73 e8 45 | 9f d1 15 db ca 5d 1c f1 70 f1 97 a1 2b 7d 26 5e | 27 c8 08 1e 0d d7 2a 7e 36 db 89 18 87 f0 43 11 | e3 cf c8 31 7d 0e ae 6a 97 23 05 40 5d 11 ea 66 | a1 79 e8 97 cf 5c 5b 3a eb e7 1e c8 25 eb 2f 83 | 00 66 8b 3e 05 72 c5 6e 34 08 88 16 97 1a 13 a9 | db 9b 7b 48 0f 92 cf 65 2a 3e cf 88 08 c6 cf 54 | d9 1b 5a 78 a6 05 e8 73 bf 3a d4 a6 65 47 24 50 | 20 0c 6c 69 e0 29 4a aa 5a 89 69 c7 3c 4d 82 76 | 81 c9 87 1d 60 f0 a9 b6 29 2b 06 98 6d a9 24 c8 | 1d 5c 2b 40 de 5d 36 a1 45 5d 5e 8a 48 e6 0b 26 | 29 00 00 24 f0 fa c9 ee f6 f5 97 a2 44 c5 ea 10 | 5b 58 db 61 17 58 ca 3c df 15 b8 1a de 90 ef 49 | 16 34 e4 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 2c 2a b2 6d be c9 76 69 fe e4 41 | f1 72 73 59 2e 97 3f f1 00 00 00 1c 00 00 40 05 | 31 f5 db e1 45 48 68 14 42 b0 53 d9 a4 6c d5 a0 | 03 9b fe 80 | libevent_free: release ptr-libevent@0x7fb35804b8e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6f550 | #268 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 eb eb 01 2e 07 ee 4b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #268 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #268 | rejected packet: | 52 eb eb 01 2e 07 ee 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #268: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45310 | handling event EVENT_RETRANSMIT for parent state #292 | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #292 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #292 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49670.125253; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003687 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6f550 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #292 | libevent_malloc: new ptr-libevent@0x7fb35804b8e0 size 128 "road-eastnet-nonat-40" #292: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #292) | 87 88 51 7a 60 9d 5a 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 66 a0 4d 60 cb 65 95 3c 93 0d 5e 54 74 22 d5 | b9 4e e2 32 b5 97 c3 a0 c6 6f 16 29 09 b8 29 a7 | 53 85 60 d3 38 df d9 0c a3 64 8e 65 05 77 b2 87 | 1b 54 26 e9 27 44 44 33 65 9f 3e a3 6d dc 58 a3 | 3c 1b b5 56 27 64 d7 00 90 21 cd 7d 46 ab 11 af | ba 96 a3 c8 ee 97 85 92 75 7b ec 2d df 79 07 56 | 45 a8 e2 68 58 3f 02 db 14 25 0e 1f 9b c2 bb 05 | 5a 26 d6 ed 51 8a 97 6d 65 fb 55 2b bb 16 61 e4 | de 73 b2 ef 70 09 3d 76 f2 05 da 1e bd 6c 49 e0 | 44 ef e7 7e 74 41 a3 f7 8a 2e 4b 16 50 e8 de e0 | a4 17 3e ac 86 b1 62 63 2e 1c a5 2b dc 13 3a ee | 9b a0 c2 94 2b ba 80 4c 0b 59 f3 60 75 ff 33 5f | 0b 97 1a 30 63 32 07 17 5c 59 1a 4a db 49 f2 ef | 1e b6 76 4d ca 87 ea 08 32 6d 49 4e d6 81 ee 4c | c7 58 d6 e6 53 ab c7 5b 58 9e 4a 36 b9 18 48 a2 | 61 0a 77 8a 15 c7 1b 51 f1 d5 e0 50 5a 9b 7a 98 | 29 00 00 24 b6 37 4c f0 c9 85 b2 01 0e 7e 3e 08 | 4a 99 af 96 7f b4 c9 1d 28 51 f7 8e 73 35 20 22 | 15 78 52 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 e7 d2 e3 15 0a 06 f3 99 b1 c4 ad | 55 e8 07 46 e3 af eb 45 00 00 00 1c 00 00 40 05 | 9e 69 62 01 15 f2 f4 fe 05 57 a2 2c 87 7a 71 d0 | 0c f9 69 7d | libevent_free: release ptr-libevent@0x7fb358046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45310 | #292 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 88 51 7a 60 9d 5a 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #292 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #292 | rejected packet: | 87 88 51 7a 60 9d 5a 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #292: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0412 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd40 | handling event EVENT_RETRANSMIT for parent state #306 | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #306 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #306 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49670.165548; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002135 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45310 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #306 | libevent_malloc: new ptr-libevent@0x7fb358046040 size 128 "road-eastnet-nonat-54" #306: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #306) | fd d2 63 50 0e 6e 1e 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc f6 1e 22 b4 91 3a 68 1f d1 67 6d 28 c8 f1 bf | e2 6e 14 07 e3 24 35 86 32 c0 3d 31 76 0e 87 74 | f9 3c 48 85 fb a5 36 8c 2d 66 01 91 c5 ea 8c 52 | 2c 54 17 a9 6d 05 2c 50 21 08 25 54 8a 1b be 0a | 1d bd df b6 06 bd 44 6a d2 67 92 4c 02 bb 81 0c | c5 ff 14 e5 24 16 2f 34 f8 b9 eb 90 9f 21 2d 2e | b4 e3 0a 67 2a 94 b3 b5 79 5e 99 67 ad f2 05 03 | 3c 2d de 97 30 2e 1c 04 bc c1 21 b5 15 d2 d7 d9 | ea a8 e1 e4 5e c5 d4 35 2f fe 33 59 95 e2 b7 3c | 23 52 f4 04 24 af 5a 95 09 7f 61 6c 7a 9b e9 50 | d2 38 26 f9 d3 19 e4 0a 3c be ac cf c6 ff b4 45 | b0 35 a0 dc ec 70 3d 13 ab c2 8a 53 0d 47 68 05 | 67 66 c8 1a af d5 d2 45 a5 c1 6e df ea 2b 64 70 | 05 da 5e 15 ac a3 ed f4 40 10 0f 5a 84 40 9e bc | d6 87 16 fd 3f a2 ff 39 19 ba 66 6d 2d e9 93 fd | b9 22 df b5 78 f4 f7 04 ee c7 91 83 7d a9 ca f1 | 29 00 00 24 c2 6f b9 fd fc 4f db 1a 3d 3f c0 a7 | af 7a 63 dc 70 8f 4c 18 81 55 af 15 16 2b 00 41 | 32 ac cf 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 87 47 9a 56 3f e1 15 1e 01 4b 7f | bb 95 0e 04 49 a0 88 16 00 00 00 1c 00 00 40 05 | 0c f3 ae 84 0d fd 98 31 4d e7 cb a5 de d2 0b 07 | b0 31 98 21 | libevent_free: release ptr-libevent@0x7fb364014bc0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd40 | #306 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34001f970 | handling event EVENT_RETRANSMIT for parent state #311 | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #311 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #311 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49670.165685; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500914 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #311 | libevent_malloc: new ptr-libevent@0x7fb364014bc0 size 128 "road-eastnet-nonat-59" #311: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #311) | 44 99 87 40 ba 63 67 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 f7 3b 73 41 b9 88 7a e8 c9 5c 33 15 fe 59 eb | fc 54 1c 32 28 ad 56 eb 34 ed 9a d7 b7 26 48 b1 | 97 4e 59 ed 4f 99 cd e8 e6 27 80 3f 35 da 0c a7 | 23 d8 2f 5d 19 c3 94 0e 09 96 31 23 4d f5 99 7a | 2e 77 d3 1f 35 48 ef 9d e1 61 1a 11 39 f8 6e ce | 65 2d d0 de 38 b4 23 52 6e 45 44 65 4d 7b bd c8 | 41 7e 01 a8 b3 39 9f a8 ee a5 53 dc 50 9b 94 2b | 69 df 03 ec 5d 36 9f 33 dc 3d 9c 7a 93 11 41 9c | 33 38 19 c9 cf 1a a3 f8 96 ca d4 d9 26 62 88 91 | 39 58 69 eb 93 1e 87 6a d7 64 14 8d 9c 37 19 fa | c6 b6 78 0e bc 5c f3 4b 97 bf 56 93 52 5a ea e8 | e0 ac be 1b 36 a8 31 6f 20 82 12 c0 13 79 34 1d | 86 03 61 75 0c 12 25 55 a8 61 36 78 64 d8 d0 e0 | d9 d2 a7 01 7f 00 fd 1f 2e 03 76 1e 96 2c 85 64 | f8 86 44 8c a4 8a 04 3f e3 a8 0c 90 29 b2 ad bc | e2 32 ac c2 2b f4 81 23 cf 52 ee cf c4 e3 9c c7 | 29 00 00 24 d3 df f6 74 46 9e 11 7f ae 1b 7e 22 | a8 9e 39 ab f7 77 2a 20 6e a6 c0 c3 6f 0b 0c 6a | a5 08 b1 f9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c b5 fb 2f 48 22 68 cf e1 a0 a0 6d | 16 65 fc 12 3f 30 cc 2d 00 00 00 1c 00 00 40 05 | 5f ba 06 b7 b7 74 50 87 e6 7e 19 f6 51 18 f6 57 | 2a d1 11 81 | libevent_free: release ptr-libevent@0x7fb34000f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34001f970 | #311 spent 0.0711 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd d2 63 50 0e 6e 1e 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #306 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #306 | rejected packet: | fd d2 63 50 0e 6e 1e 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #306: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 99 87 40 ba 63 67 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #311 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #311 | rejected packet: | 44 99 87 40 ba 63 67 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #311: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.037 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1c450 | handling event EVENT_RETRANSMIT for parent state #67 | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #67 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #67 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49670.167959; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008112 exceeds limit? YES "road-eastnet-nonat-67" #67: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-67" #67: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #319 at 0x557d46a2ec50 | State DB: adding IKEv2 state #319 in UNDEFINED | pstats #319 ikev2.ike started | Message ID: init #319: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #319: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #319; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-67" #319: initiating v2 parent SA to replace #67 | using existing local IKE proposals for connection road-eastnet-nonat-67 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 319 for state #319 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34001f970 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #319 | libevent_malloc: new ptr-libevent@0x7fb34000f1a0 size 128 | #319 spent 0.0628 milliseconds in ikev2_parent_outI1() | RESET processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #67 ikev2.ike failed too-many-retransmits | pstats #67 ikev2.ike deleted too-many-retransmits | crypto helper 5 resuming | #67 spent 2.6 milliseconds in total | crypto helper 5 starting work-order 319 for state #319 | [RE]START processing: state #67 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in delete_state() at state.c:879) | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 319 "road-eastnet-nonat-67" #67: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #67: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #67 "road-eastnet-nonat-67" #67: deleting IKE SA for connection 'road-eastnet-nonat-67' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-67' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-67 | State DB: deleting IKEv2 state #67 in PARENT_I1 | parent state #67: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 319 time elapsed 0.000942 seconds | (#319) spent 0.946 milliseconds in crypto helper computing work-order 319: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 319 for state #319 to event queue | scheduling resume sending helper answer for #319 | libevent_malloc: new ptr-libevent@0x7fb344014c70 size 128 | crypto helper 5 waiting (nothing to do) | stop processing: state #67 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb37c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c450 | in statetime_stop() and could not find #67 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-67 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-67" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-67' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-67" | stop processing: connection "road-eastnet-nonat-67" (in initiate_a_connection() at initiate.c:349) | spent 0.0604 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #319 | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 319 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #319 | **emit ISAKMP Message: | initiator cookie: | 11 2f c2 e2 55 80 ad fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-67 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e8 29 97 2b 00 80 7a b2 ce 19 1b 94 79 57 61 71 | ikev2 g^x b5 31 67 66 2a f4 c8 dd 15 9f e0 ad 50 a1 3c 77 | ikev2 g^x 34 62 bd 4c c6 67 73 04 6a 47 e6 12 64 23 d5 1b | ikev2 g^x 98 65 2d 83 00 df 2d e7 e4 d4 74 c8 bc 36 30 29 | ikev2 g^x 44 5a 01 b4 02 e1 00 0f 8d ad 81 f9 8e 46 de 85 | ikev2 g^x 06 c3 07 15 fc b6 b0 15 06 43 f6 0e a8 fd 09 ef | ikev2 g^x d8 40 6e 21 d5 b3 5d 25 10 a6 87 71 c1 c1 fe d8 | ikev2 g^x bf 80 48 df 26 2b e7 63 6d 12 1e cf 0b 06 eb b0 | ikev2 g^x 7e 3e d5 d0 6b 21 8d aa 41 e8 f8 30 37 35 ac fc | ikev2 g^x 15 96 69 e5 f5 b2 90 e3 4e fe 2d ad 13 5f a0 e8 | ikev2 g^x 1c c7 69 35 1d b3 4c 80 f6 b9 3c 2d 05 13 72 b5 | ikev2 g^x 7e a3 0f 53 4b 80 32 e8 c3 5e b7 f7 2e ae 6c 5b | ikev2 g^x 24 7a c5 8a 0a 7f 55 0a 11 24 c0 ef fe 17 1d 30 | ikev2 g^x 05 8e ac 66 5c 3e f2 80 08 7e 41 35 dd 7a 17 b5 | ikev2 g^x ec 43 f0 d8 c9 61 5b 46 04 99 f3 93 60 24 02 4a | ikev2 g^x 51 18 18 5f 6c cb 3e f9 d1 40 eb 27 ba 67 3b b9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b8 88 60 8f 24 78 87 d6 7e a3 09 04 de 05 ae 45 | IKEv2 nonce 4d b7 3b ca 2f 96 5c 9a fa 13 da 85 a2 c0 a1 03 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 11 2f c2 e2 55 80 ad fc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 43 | natd_hash: port= 01 f4 | natd_hash: hash= b5 04 44 46 25 45 86 78 cb ac b2 11 55 71 47 06 | natd_hash: hash= ea 13 d1 6f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b5 04 44 46 25 45 86 78 cb ac b2 11 55 71 47 06 | Notify data ea 13 d1 6f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 11 2f c2 e2 55 80 ad fc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2f 9a c9 00 f1 11 a0 f7 d7 69 9d e9 ea e6 fc 70 | natd_hash: hash= 38 db 7b 3a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2f 9a c9 00 f1 11 a0 f7 d7 69 9d e9 ea e6 fc 70 | Notify data 38 db 7b 3a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #319 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #319: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #319 to 4294967295 after switching state | Message ID: IKE #319 skipping update_recv as MD is fake | Message ID: sent #319 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-67" #319: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.67:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #319) | 11 2f c2 e2 55 80 ad fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 29 97 2b 00 80 7a b2 ce 19 1b 94 79 57 61 71 | b5 31 67 66 2a f4 c8 dd 15 9f e0 ad 50 a1 3c 77 | 34 62 bd 4c c6 67 73 04 6a 47 e6 12 64 23 d5 1b | 98 65 2d 83 00 df 2d e7 e4 d4 74 c8 bc 36 30 29 | 44 5a 01 b4 02 e1 00 0f 8d ad 81 f9 8e 46 de 85 | 06 c3 07 15 fc b6 b0 15 06 43 f6 0e a8 fd 09 ef | d8 40 6e 21 d5 b3 5d 25 10 a6 87 71 c1 c1 fe d8 | bf 80 48 df 26 2b e7 63 6d 12 1e cf 0b 06 eb b0 | 7e 3e d5 d0 6b 21 8d aa 41 e8 f8 30 37 35 ac fc | 15 96 69 e5 f5 b2 90 e3 4e fe 2d ad 13 5f a0 e8 | 1c c7 69 35 1d b3 4c 80 f6 b9 3c 2d 05 13 72 b5 | 7e a3 0f 53 4b 80 32 e8 c3 5e b7 f7 2e ae 6c 5b | 24 7a c5 8a 0a 7f 55 0a 11 24 c0 ef fe 17 1d 30 | 05 8e ac 66 5c 3e f2 80 08 7e 41 35 dd 7a 17 b5 | ec 43 f0 d8 c9 61 5b 46 04 99 f3 93 60 24 02 4a | 51 18 18 5f 6c cb 3e f9 d1 40 eb 27 ba 67 3b b9 | 29 00 00 24 b8 88 60 8f 24 78 87 d6 7e a3 09 04 | de 05 ae 45 4d b7 3b ca 2f 96 5c 9a fa 13 da 85 | a2 c0 a1 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 04 44 46 25 45 86 78 cb ac b2 11 | 55 71 47 06 ea 13 d1 6f 00 00 00 1c 00 00 40 05 | 2f 9a c9 00 f1 11 a0 f7 d7 69 9d e9 ea e6 fc 70 | 38 db 7b 3a | state #319 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34000f1a0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34001f970 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c450 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #319 | libevent_malloc: new ptr-libevent@0x7fb34000f1a0 size 128 | #319 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49670.169478 | resume sending helper answer for #319 suppresed complete_v2_state_transition() and stole MD | #319 spent 0.318 milliseconds in resume sending helper answer | stop processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb344014c70 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 2f c2 e2 55 80 ad fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #319 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #319 | rejected packet: | 11 2f c2 e2 55 80 ad fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 43 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #319: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.039 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34002a950 | handling event EVENT_RETRANSMIT for parent state #293 | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #293 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #293 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49670.216661; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00284 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374013710 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #293 | libevent_malloc: new ptr-libevent@0x7fb344014c70 size 128 "road-eastnet-nonat-41" #293: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #293) | 98 65 e9 19 f7 80 1b 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 92 fa cc 80 1f 04 ae 31 60 a8 15 7f 6c d4 bb | 0d a3 36 d4 3d 31 2d db c9 a3 65 0b 54 77 b5 90 | 4b f1 85 f9 5b a2 e8 2d 9a 77 1b fe a8 fb ea d0 | 88 2f 01 a5 98 e9 7e 65 f1 01 87 3d 6a 2d 8a 3a | 8e f8 d8 76 3b 1e 19 1d 17 90 3e 76 19 99 52 4a | 6e 00 1d 7b db 96 db 83 88 cd fd 1e bd 7e 5b 89 | ba a0 91 2a b9 ee b5 58 13 b3 5e 5e 59 9d 47 30 | d5 69 4e a7 bd 52 9f d4 e7 9b be ed b8 c7 8e ca | fd 72 11 5d 3c 4e 3f 34 3a cf 63 b2 e1 3a 0c 75 | e0 fd c6 41 05 da 4e 8b 04 c0 eb 84 52 ad 81 69 | 8c d8 b9 f0 3d 70 1f c8 01 a5 b7 5f ee d4 3d 97 | 3f 74 14 bf c1 32 07 23 90 8c c7 74 19 a4 db 67 | e2 81 e3 0a 06 5d bd 34 79 e7 4a 18 70 10 d6 b8 | 84 dc 4f 06 a8 1d f3 4b d5 6f 30 05 6d 56 83 1e | 64 17 96 93 11 0f e7 08 32 35 87 dc fb e0 8f 9f | e0 07 34 5d b8 fb 0d 4c d3 c2 58 00 d5 76 62 90 | 29 00 00 24 6f f2 b6 ca f4 8a a8 b3 ce 34 d7 c6 | a9 bf 42 71 b6 a3 89 33 ed 1d 91 ee 0e 11 98 8d | 12 5e c6 63 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 b6 16 43 43 a6 c6 14 e2 18 67 23 | 58 d4 b6 9a 2d df 39 90 00 00 00 1c 00 00 40 05 | 2a 56 75 a4 c4 51 60 eb 9a b6 a1 bf 9e f8 0f fa | 6b d1 0c 00 | libevent_free: release ptr-libevent@0x7fb340008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34002a950 | #293 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 65 e9 19 f7 80 1b 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #293 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #293 | rejected packet: | 98 65 e9 19 f7 80 1b 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #293: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abd200 | handling event EVENT_RETRANSMIT for parent state #312 | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #312 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #312 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49670.227946; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500871 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34002a950 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #312 | libevent_malloc: new ptr-libevent@0x7fb340008e30 size 128 "road-eastnet-nonat-60" #312: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #312) | 89 42 ee d6 ed 2c a4 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 05 0b 71 54 f5 39 16 26 4c a4 39 04 60 1d 97 | 32 ea c2 30 7f b7 8f 8f 4c 46 3c 6f 52 78 aa c1 | fe e4 77 56 f7 3d d3 8d a6 3a 6f c0 2f fe 6d 02 | eb 98 53 91 b0 a7 62 d0 2e 39 52 a2 2d 9f c5 cb | d2 4b 17 0a 6d 76 74 95 b8 fd f2 4d e7 0c cf 15 | 80 f8 47 f1 16 09 01 ed b3 3a 4f 5c d5 5d 3f 6b | 2f e7 b7 4c e0 6d 6e 67 ff dd 71 47 c8 a4 15 9f | 96 98 1b 13 12 cd c9 a7 cd 82 0e 52 4d 94 b9 96 | db fe 30 4f c9 88 5e 66 97 62 f6 22 94 b7 f8 62 | 1f 97 fa 33 08 02 4b f8 35 6a 66 b6 ae 14 f2 38 | 8b d8 d1 fe 0f da d0 63 b9 64 d3 f1 12 68 13 10 | 0c 76 c3 e9 8c 5d 20 14 45 21 bc 02 62 c8 67 36 | a7 1a 3b 3f d4 a6 2b 0f 1f 20 68 bf 3f f3 da ac | 9d d4 0b a5 4f 9d 4e ee 5d 8a c9 7f a6 63 bd 37 | e4 30 f8 16 a7 79 23 99 5e 45 08 d2 1b c1 59 79 | b3 06 e4 a7 4d 24 33 20 1d ab d6 f6 ee 90 2f 69 | 29 00 00 24 c3 f8 28 4c 1a 7b 0f cd eb 3b df c6 | 33 a5 52 0e 9f e3 e0 c7 7b e0 4f ee 68 74 73 39 | ce 71 25 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 69 21 0b 86 be 66 6f de 2b 5e fc | 58 12 49 3c b2 b4 50 5a 00 00 00 1c 00 00 40 05 | 50 02 4b 6b 30 95 cf bb e1 65 ad fe fd e1 44 d3 | d9 2c f8 74 | libevent_free: release ptr-libevent@0x7fb3440180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abd200 | #312 spent 0.0961 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 42 ee d6 ed 2c a4 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #312 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #312 | rejected packet: | 89 42 ee d6 ed 2c a4 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #312: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0557 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad9ac0 | handling event EVENT_RETRANSMIT for parent state #269 | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #269 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #269 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49670.260235; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003587 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abd200 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #269 | libevent_malloc: new ptr-libevent@0x7fb3440180b0 size 128 "road-eastnet-nonat-17" #269: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #269) | 42 2b 66 77 50 7b f1 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 1a b0 80 05 00 53 b8 88 37 a8 0d e8 4e c0 81 | 57 b8 c1 99 be 60 6c 42 36 80 aa e8 7e 86 e2 1b | dc 47 d3 0f cf c7 46 a8 c8 47 ce ff 99 14 e6 14 | 37 44 15 18 25 7b d6 ca f2 0f 00 2d 17 01 df 08 | ac fe e9 d3 2b 32 d0 3c 75 39 46 f3 2a a6 98 c3 | 1d b7 82 4a b4 92 84 4b b3 2d b3 71 d7 06 52 b9 | 9c eb 15 89 b5 c8 16 c5 e1 29 05 f5 12 64 42 f4 | a0 b3 32 62 fe 43 4c 1c 4e 1e 53 37 a8 e8 52 23 | 53 0e 82 46 38 b3 95 ea 7e 47 ae 7b 38 c7 ec ac | 8c 74 78 5b e3 a1 ba 65 7c 63 27 19 55 d3 7e f5 | 2f 36 c3 b3 a1 0f 84 2a 85 17 e4 09 e8 35 c4 82 | 08 59 25 c5 6f 5d dc d6 ee 2f dc 6b 0a a2 5d f8 | d2 8d a0 b1 da 71 a0 b2 68 ba c7 d1 ba 7e e6 81 | d8 e3 b3 84 de 3a 47 64 3d 04 00 a0 60 be 1c 4f | 52 66 df 3f 77 fe 53 0c dd cd ed 75 7e 76 02 77 | cc 4e de 99 d4 98 4e 1e 30 09 c0 9e cb c6 a1 c0 | 29 00 00 24 b8 ee 66 5c df cb 58 d0 1b a4 60 c3 | 1b 92 52 a8 29 57 57 d2 02 37 76 e3 2d 2f 31 c7 | 4b 37 7d fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 73 36 11 68 b5 eb 4b 5f e8 3f ce | 5b fc b9 99 cc 0c 05 c7 00 00 00 1c 00 00 40 05 | 7f dd 18 35 5d 55 ec 33 76 f4 f0 dc 77 e6 e3 3b | 97 a2 2b d9 | libevent_free: release ptr-libevent@0x557d469e1b60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad9ac0 | #269 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 2b 66 77 50 7b f1 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #269 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #269 | rejected packet: | 42 2b 66 77 50 7b f1 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #269: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aeb500 | handling event EVENT_RETRANSMIT for parent state #68 | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #68 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #68 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49670.263566; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009548 exceeds limit? YES "road-eastnet-nonat-68" #68: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-68" #68: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #320 at 0x557d46a30210 | State DB: adding IKEv2 state #320 in UNDEFINED | pstats #320 ikev2.ike started | Message ID: init #320: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #320: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #320; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-68" #320: initiating v2 parent SA to replace #68 | using existing local IKE proposals for connection road-eastnet-nonat-68 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 320 for state #320 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad9ac0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #320 | libevent_malloc: new ptr-libevent@0x557d469e1b60 size 128 | #320 spent 0.0687 milliseconds in ikev2_parent_outI1() | RESET processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #68 ikev2.ike failed too-many-retransmits | pstats #68 ikev2.ike deleted too-many-retransmits | #68 spent 2.57 milliseconds in total | [RE]START processing: state #68 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-68" #68: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #68: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #68 "road-eastnet-nonat-68" #68: deleting IKE SA for connection 'road-eastnet-nonat-68' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-68' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-68 | State DB: deleting IKEv2 state #68 in PARENT_I1 | parent state #68: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #68 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3480407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aeb500 | in statetime_stop() and could not find #68 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-68 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-68" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-68' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-68" | stop processing: connection "road-eastnet-nonat-68" (in initiate_a_connection() at initiate.c:349) | spent 0.0826 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 3 resuming | crypto helper 3 starting work-order 320 for state #320 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 320 | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 320 time elapsed 0.000747 seconds | (#320) spent 0.752 milliseconds in crypto helper computing work-order 320: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 320 for state #320 to event queue | scheduling resume sending helper answer for #320 | libevent_malloc: new ptr-libevent@0x7fb338014c70 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #320 | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 320 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #320 | **emit ISAKMP Message: | initiator cookie: | af c7 ee c1 89 d6 03 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-68 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 21 a8 bd a9 e5 4d 48 c1 fb 45 8d 11 bf a7 3a cc | ikev2 g^x c9 47 84 c7 e3 5d ec 21 4e d8 5a af 98 89 03 e4 | ikev2 g^x 61 3a ba 3d 60 86 ef 6f 17 de fb a4 db d7 d8 bb | ikev2 g^x dd a1 22 38 5e f6 ed 84 ef 59 30 63 60 c1 46 9c | ikev2 g^x 68 55 6e 9a 1e c0 57 7e 80 7e b6 a3 a2 d8 44 32 | ikev2 g^x cf 08 62 90 01 f4 f2 5f ed 1f e9 b3 6d aa b3 b5 | ikev2 g^x 51 0c 08 36 0d 22 74 67 a6 8c ed a0 79 50 51 2d | ikev2 g^x 0e 2f 3b 92 1e b3 eb 2d 06 7f 88 16 e6 58 28 17 | ikev2 g^x 60 5d c5 e1 99 65 2e 54 d8 fa ea 82 20 22 7c ff | ikev2 g^x b3 f5 72 25 7c 83 b1 cd 19 3e 2b da bc a9 3d dd | ikev2 g^x 76 aa 4a e2 d6 6a 5a 1c c6 a7 82 72 c8 70 00 2c | ikev2 g^x 36 b2 a4 f0 ac d5 1d 56 89 f2 8b 82 16 da 4e a9 | ikev2 g^x 45 8b f2 f1 83 02 06 ed 82 d4 33 ad 52 79 3a 05 | ikev2 g^x a1 a9 14 4d f9 86 6b dc 84 e1 88 2a d3 ae c1 8c | ikev2 g^x 43 6f 17 24 1b 1e 6c e9 e7 e2 8e 7a 04 41 d1 b0 | ikev2 g^x a9 68 50 65 7f 85 77 b4 91 10 c3 80 9a 3e 62 10 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2e 21 9d f9 af ba 04 f5 8f 3b a6 14 4e db f7 72 | IKEv2 nonce ee 4f db 92 91 3b 76 55 23 0e 1b ed b4 de fd 2f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= af c7 ee c1 89 d6 03 e4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 44 | natd_hash: port= 01 f4 | natd_hash: hash= 2b 21 4b df 59 d9 64 c3 0f dc d7 26 ba 28 50 c6 | natd_hash: hash= 3e 72 d7 ec | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2b 21 4b df 59 d9 64 c3 0f dc d7 26 ba 28 50 c6 | Notify data 3e 72 d7 ec | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= af c7 ee c1 89 d6 03 e4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d3 cb a5 46 ac a7 4b 5d c8 de d7 e5 bf c8 e6 16 | natd_hash: hash= 1f 0a fc 46 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d3 cb a5 46 ac a7 4b 5d c8 de d7 e5 bf c8 e6 16 | Notify data 1f 0a fc 46 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #320 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #320: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #320 to 4294967295 after switching state | Message ID: IKE #320 skipping update_recv as MD is fake | Message ID: sent #320 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-68" #320: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.68:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #320) | af c7 ee c1 89 d6 03 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 a8 bd a9 e5 4d 48 c1 fb 45 8d 11 bf a7 3a cc | c9 47 84 c7 e3 5d ec 21 4e d8 5a af 98 89 03 e4 | 61 3a ba 3d 60 86 ef 6f 17 de fb a4 db d7 d8 bb | dd a1 22 38 5e f6 ed 84 ef 59 30 63 60 c1 46 9c | 68 55 6e 9a 1e c0 57 7e 80 7e b6 a3 a2 d8 44 32 | cf 08 62 90 01 f4 f2 5f ed 1f e9 b3 6d aa b3 b5 | 51 0c 08 36 0d 22 74 67 a6 8c ed a0 79 50 51 2d | 0e 2f 3b 92 1e b3 eb 2d 06 7f 88 16 e6 58 28 17 | 60 5d c5 e1 99 65 2e 54 d8 fa ea 82 20 22 7c ff | b3 f5 72 25 7c 83 b1 cd 19 3e 2b da bc a9 3d dd | 76 aa 4a e2 d6 6a 5a 1c c6 a7 82 72 c8 70 00 2c | 36 b2 a4 f0 ac d5 1d 56 89 f2 8b 82 16 da 4e a9 | 45 8b f2 f1 83 02 06 ed 82 d4 33 ad 52 79 3a 05 | a1 a9 14 4d f9 86 6b dc 84 e1 88 2a d3 ae c1 8c | 43 6f 17 24 1b 1e 6c e9 e7 e2 8e 7a 04 41 d1 b0 | a9 68 50 65 7f 85 77 b4 91 10 c3 80 9a 3e 62 10 | 29 00 00 24 2e 21 9d f9 af ba 04 f5 8f 3b a6 14 | 4e db f7 72 ee 4f db 92 91 3b 76 55 23 0e 1b ed | b4 de fd 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 21 4b df 59 d9 64 c3 0f dc d7 26 | ba 28 50 c6 3e 72 d7 ec 00 00 00 1c 00 00 40 05 | d3 cb a5 46 ac a7 4b 5d c8 de d7 e5 bf c8 e6 16 | 1f 0a fc 46 | state #320 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x557d469e1b60 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad9ac0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aeb500 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #320 | libevent_malloc: new ptr-libevent@0x7fb3480407f0 size 128 | #320 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49670.26578 | resume sending helper answer for #320 suppresed complete_v2_state_transition() and stole MD | #320 spent 0.322 milliseconds in resume sending helper answer | stop processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb338014c70 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af c7 ee c1 89 d6 03 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #320 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #320 | rejected packet: | af c7 ee c1 89 d6 03 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 44 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #320: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0399 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0d4c0 | handling event EVENT_RETRANSMIT for parent state #313 | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #313 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #313 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49670.285963; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.5006 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #313 | libevent_malloc: new ptr-libevent@0x7fb338014c70 size 128 "road-eastnet-nonat-61" #313: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #313) | 5f e0 5b 3a aa b2 0d 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 72 14 0f 17 54 5f cc c5 98 fb 35 26 a3 92 e2 | 11 a3 ad ea c4 71 33 c5 3b 09 0d 86 8a ef c9 16 | 41 6e 6e 33 c5 10 cc f1 5e 47 e9 ca 13 f8 ee 4f | 37 f9 0e ac 70 04 12 68 e2 ae b0 7b dd cb cb ab | d1 0b 9f 48 8f e3 3e b7 e3 65 ca 3d b0 79 98 5c | d4 18 e2 6e 8f 62 4a 4d 34 e2 ac f2 57 5e 56 f3 | 96 24 71 ed eb 39 5a 9f 4d 0a 51 e3 f2 80 2e 9c | c7 e3 0a d7 46 cd 62 d8 70 57 a4 15 e0 2e 57 82 | 00 9c 85 fc cc fb ec 67 7d 2f f7 de 8d 85 b7 9a | ae 6a 14 45 c8 4f c3 df 8d 60 30 87 57 0e a1 b0 | 8b bf f6 18 27 37 f1 3e 81 c1 ec 19 9b f6 db 06 | 57 00 87 5d ef 1f e5 81 9a 44 f2 c0 14 62 b9 b1 | a3 5a 63 7e 11 93 6f 2a 71 ae af 90 3a 04 4e 7a | a3 7a 98 c8 8a bb b2 5a a5 8c d5 d7 51 2b fa cf | d5 ea ac 65 e9 8c f9 24 80 81 e7 38 45 fd 2e f5 | 33 21 e2 b5 ea 65 8b be be 31 9f 87 b8 9f 6c 5b | 29 00 00 24 50 24 81 a9 b8 a1 9e c5 6d 65 2e b2 | 7c 32 12 aa 77 af 34 a7 17 a7 54 1f 7b 13 4b 11 | 43 e0 57 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e d7 79 da 83 ae 02 6d 20 64 f0 64 | 33 fe 2f 85 1b 7e 43 e4 00 00 00 1c 00 00 40 05 | bb f1 5c c9 25 91 06 ec a8 bd 6e 4b ab 50 48 3a | 1c ac 06 f7 | libevent_free: release ptr-libevent@0x7fb34803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | #313 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f e0 5b 3a aa b2 0d 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #313 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #313 | rejected packet: | 5f e0 5b 3a aa b2 0d 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #313: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #294 | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #294 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #294 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49670.299247; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002499 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #294 | libevent_malloc: new ptr-libevent@0x7fb34803b0b0 size 128 "road-eastnet-nonat-42" #294: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #294) | 9b 31 1a f8 0f be 39 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 dd 24 24 7c 2f 7c cf af 6d 3e 60 a2 73 ad b0 | 5d e0 ad 29 4b 13 6c 37 66 5f 9c 4f e7 c9 e4 11 | 2c 5d 56 30 72 c8 d6 46 26 66 f5 93 56 d4 c3 52 | 85 cc e5 ae f9 42 b4 ed 60 85 06 0a 66 f5 50 1d | b5 97 c3 6d 71 b4 75 b7 83 18 b1 d3 7d 4a 68 8c | b9 4f df 9f 66 87 ec eb 33 88 de f2 6b c6 ea ab | d0 0d f9 06 34 9c 52 b4 c5 c4 6d 94 39 a8 58 51 | 41 ac 6d 52 08 28 9d f6 37 25 c7 7f 2d 48 ab 90 | f6 30 d2 8b 1b 90 e6 12 18 e0 e2 d4 dc 25 fe 81 | c8 41 3f 06 d9 c6 ce a5 91 8f 50 2b 48 2d e5 59 | 7a 24 e5 58 8b 81 4a bc cb 35 59 84 09 16 ee 2d | ba cf 81 ed 91 57 53 ab 0b 04 8a 27 0b c6 e0 ef | db ab 77 93 c2 db 73 a1 76 37 e1 bf 29 0a 3c 98 | 04 2f f5 e3 ff d0 c3 48 62 42 d2 a6 9f a7 c1 a7 | df e6 f0 e2 49 c7 bb 48 bb b6 1d f0 0e d1 19 d7 | 21 c7 76 5c 49 fc f0 be 36 da d1 aa ec 07 53 22 | 29 00 00 24 c9 1f 43 d3 3e f5 11 59 29 27 36 bb | 9f 07 da f1 c2 4b 17 7e d6 e4 43 b9 54 44 c2 2b | 3a e0 9b 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 60 07 d1 2a 2e 6f e5 7f 13 de a6 | da 25 32 50 d9 e2 97 75 00 00 00 1c 00 00 40 05 | de 91 5e 97 33 cf e4 58 2c 2c f0 43 aa ad 93 60 | ec ee 8a 50 | libevent_free: release ptr-libevent@0x7fb36003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #294 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9b 31 1a f8 0f be 39 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #294 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #294 | rejected packet: | 9b 31 1a f8 0f be 39 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #294: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a92f80 | handling event EVENT_RETRANSMIT for parent state #69 | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #69 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #69 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49670.324552; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005978 exceeds limit? YES "road-eastnet-nonat-69" #69: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-69" #69: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #321 at 0x557d46a317d0 | State DB: adding IKEv2 state #321 in UNDEFINED | pstats #321 ikev2.ike started | Message ID: init #321: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #321: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #321; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-69" #321: initiating v2 parent SA to replace #69 | using existing local IKE proposals for connection road-eastnet-nonat-69 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 321 for state #321 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb348005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #321 | libevent_malloc: new ptr-libevent@0x7fb36003b0b0 size 128 | #321 spent 0.0702 milliseconds in ikev2_parent_outI1() | RESET processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #69 ikev2.ike failed too-many-retransmits | pstats #69 ikev2.ike deleted too-many-retransmits | #69 spent 2.4 milliseconds in total | [RE]START processing: state #69 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-69" #69: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #69: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #69 "road-eastnet-nonat-69" #69: deleting IKE SA for connection 'road-eastnet-nonat-69' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-69' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-69 | State DB: deleting IKEv2 state #69 in PARENT_I1 | parent state #69: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 1 resuming | crypto helper 1 starting work-order 321 for state #321 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 321 | stop processing: state #69 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb34c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f80 | in statetime_stop() and could not find #69 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-69 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-69" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-69' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-69" | stop processing: connection "road-eastnet-nonat-69" (in initiate_a_connection() at initiate.c:349) | spent 0.0593 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 321 time elapsed 0.000552 seconds | (#321) spent 0.554 milliseconds in crypto helper computing work-order 321: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 321 for state #321 to event queue | scheduling resume sending helper answer for #321 | libevent_malloc: new ptr-libevent@0x7fb3880177a0 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #321 | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 321 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #321 | **emit ISAKMP Message: | initiator cookie: | 30 42 c0 64 91 b3 77 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-69 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b7 8b 42 a5 47 61 3e b2 88 66 b3 90 63 22 69 df | ikev2 g^x e5 f0 68 6a 3f ab 70 bf d6 bc a2 6d 32 d6 bf 56 | ikev2 g^x 13 cd ae 31 91 9e 97 07 b1 e6 67 da 49 fc 52 44 | ikev2 g^x f0 97 00 89 4b 4a 7b 7e 72 67 33 77 ed ad d5 60 | ikev2 g^x 7c 94 7a 09 a1 fe 2b 97 f4 03 f7 65 c2 4f 92 50 | ikev2 g^x 59 77 e9 77 52 e2 ba 0e f1 c5 36 f7 3f 04 ca 02 | ikev2 g^x 29 37 fe 9d b2 ee 90 bb 59 f2 25 82 19 bd 15 09 | ikev2 g^x 7c 21 90 62 70 4c 2f 35 e2 fa b0 32 14 28 ef f3 | ikev2 g^x f9 26 2a aa 23 e5 00 f2 ed fa 00 25 b3 8d 3e f4 | ikev2 g^x 4c e5 68 7e bb cf a5 93 21 96 34 22 9d cb 8e c0 | ikev2 g^x 2d 43 58 e0 8a b9 3b 2b d8 e6 50 0b 36 e9 8a 0b | ikev2 g^x 9a 7c fa 82 ee ac d3 9d dc ac fe e5 26 e8 d7 a8 | ikev2 g^x 41 71 b3 21 7a 08 ae 35 2b 19 02 a1 3c d8 d8 79 | ikev2 g^x 7f 1b 50 2d 1e 74 84 a4 f5 80 19 40 cb b4 59 fe | ikev2 g^x e2 eb 79 b4 b1 1d a9 7a b4 6e 10 85 42 85 5d e9 | ikev2 g^x 58 9c 43 c5 54 ce c4 20 7b 73 38 bf 59 44 4d 18 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce bf 17 ca 5e f8 c4 94 b8 0b 16 3e 38 6b 43 cf 92 | IKEv2 nonce 04 d6 aa ac 11 4c 2e 2c d1 a0 dc 92 64 9e 7b 1a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 30 42 c0 64 91 b3 77 ed | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 45 | natd_hash: port= 01 f4 | natd_hash: hash= 45 bc 1a f8 41 15 d9 99 65 b2 c4 f3 df 03 a0 00 | natd_hash: hash= 26 60 50 c2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 45 bc 1a f8 41 15 d9 99 65 b2 c4 f3 df 03 a0 00 | Notify data 26 60 50 c2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 30 42 c0 64 91 b3 77 ed | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= fc 37 e7 42 82 1f 76 13 ad 5a b7 fc e2 af d4 9f | natd_hash: hash= 15 d4 13 5b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fc 37 e7 42 82 1f 76 13 ad 5a b7 fc e2 af d4 9f | Notify data 15 d4 13 5b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #321 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #321: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #321 to 4294967295 after switching state | Message ID: IKE #321 skipping update_recv as MD is fake | Message ID: sent #321 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-69" #321: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.69:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #321) | 30 42 c0 64 91 b3 77 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 8b 42 a5 47 61 3e b2 88 66 b3 90 63 22 69 df | e5 f0 68 6a 3f ab 70 bf d6 bc a2 6d 32 d6 bf 56 | 13 cd ae 31 91 9e 97 07 b1 e6 67 da 49 fc 52 44 | f0 97 00 89 4b 4a 7b 7e 72 67 33 77 ed ad d5 60 | 7c 94 7a 09 a1 fe 2b 97 f4 03 f7 65 c2 4f 92 50 | 59 77 e9 77 52 e2 ba 0e f1 c5 36 f7 3f 04 ca 02 | 29 37 fe 9d b2 ee 90 bb 59 f2 25 82 19 bd 15 09 | 7c 21 90 62 70 4c 2f 35 e2 fa b0 32 14 28 ef f3 | f9 26 2a aa 23 e5 00 f2 ed fa 00 25 b3 8d 3e f4 | 4c e5 68 7e bb cf a5 93 21 96 34 22 9d cb 8e c0 | 2d 43 58 e0 8a b9 3b 2b d8 e6 50 0b 36 e9 8a 0b | 9a 7c fa 82 ee ac d3 9d dc ac fe e5 26 e8 d7 a8 | 41 71 b3 21 7a 08 ae 35 2b 19 02 a1 3c d8 d8 79 | 7f 1b 50 2d 1e 74 84 a4 f5 80 19 40 cb b4 59 fe | e2 eb 79 b4 b1 1d a9 7a b4 6e 10 85 42 85 5d e9 | 58 9c 43 c5 54 ce c4 20 7b 73 38 bf 59 44 4d 18 | 29 00 00 24 bf 17 ca 5e f8 c4 94 b8 0b 16 3e 38 | 6b 43 cf 92 04 d6 aa ac 11 4c 2e 2c d1 a0 dc 92 | 64 9e 7b 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 bc 1a f8 41 15 d9 99 65 b2 c4 f3 | df 03 a0 00 26 60 50 c2 00 00 00 1c 00 00 40 05 | fc 37 e7 42 82 1f 76 13 ad 5a b7 fc e2 af d4 9f | 15 d4 13 5b | state #321 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36003b0b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb348005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #321 | libevent_malloc: new ptr-libevent@0x7fb34c03b0b0 size 128 | #321 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49670.325642 | resume sending helper answer for #321 suppresed complete_v2_state_transition() and stole MD | #321 spent 0.325 milliseconds in resume sending helper answer | stop processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3880177a0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 42 c0 64 91 b3 77 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #321 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #321 | rejected packet: | 30 42 c0 64 91 b3 77 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 45 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #321: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #307 | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #307 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #307 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49670.32682; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001268 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #307 | libevent_malloc: new ptr-libevent@0x7fb3880177a0 size 128 "road-eastnet-nonat-55" #307: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #307) | ae 96 63 e8 bb 6a 85 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 14 ed e9 d6 19 10 2b ec dd 37 28 c8 5c 2b 9d | 4d 1c 56 bb af 08 b5 7a 4b a6 fc d3 e6 37 09 e4 | 3f 1e 28 12 a3 d4 a0 95 36 fb be 53 ba 61 08 91 | a5 59 64 37 32 8f 20 cb c1 4b 24 6f aa 9c 35 eb | 55 d5 bc cd 87 7a 12 07 97 e1 3e 1d fe 09 4e 05 | 56 a9 36 dd e5 c2 2b 14 24 4c 71 52 b8 4a bc e5 | 44 05 b4 12 ae 0a ee 10 63 d4 56 16 75 0e 24 7a | d8 3e 40 79 17 42 50 86 a6 54 47 3f a4 b0 ab e0 | d2 28 b5 9a 24 3f 4a c2 b0 91 11 3a 15 fb b2 26 | f2 b0 63 ef 6f 51 35 98 2f 68 7c a5 78 9f 97 ad | 5a 09 af 4c 24 bb dd dc ab e6 24 53 27 3d 9e 03 | 62 ad 6c f7 99 7f 86 ec 99 0f d4 42 fa 99 b4 e1 | da 5b a4 af 44 6d 6a f4 d7 89 78 8e f4 87 7b 68 | 84 5a 7e 9d b0 43 44 70 16 90 a6 1a d2 cc 8f 85 | 21 0d 25 8b 92 c7 6a 03 1f 2e 4c a1 00 a9 05 b1 | b5 20 9b fc 87 43 c1 10 a6 42 8f 4d 15 f7 48 a2 | 29 00 00 24 9a 25 60 c3 7e e3 91 a3 9d b3 07 0f | ff 92 da ab 25 95 17 32 0d 82 17 4c 51 9e de a9 | 5d 92 35 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b e0 88 15 5c bc 20 c5 96 41 9f 3a | 7e ef 58 59 98 52 f8 6e 00 00 00 1c 00 00 40 05 | 92 3b 5d d1 4e 37 91 81 a5 d6 c2 94 c8 33 2c 33 | 6a d3 7b 36 | libevent_free: release ptr-libevent@0x7fb388011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #307 spent 0.0872 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 96 63 e8 bb 6a 85 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #307 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #307 | rejected packet: | ae 96 63 e8 bb 6a 85 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #307: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ced0 | handling event EVENT_RETRANSMIT for parent state #270 | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #270 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #270 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49670.344069; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003779 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #270 | libevent_malloc: new ptr-libevent@0x7fb388011f30 size 128 "road-eastnet-nonat-18" #270: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #270) | 98 aa bb 79 2f f5 b5 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 24 f6 25 5f fa 71 0f 39 53 f1 8f 92 58 3c 59 | 8e c2 2e 28 53 ea 0d 58 1c b1 76 25 4f 77 d3 40 | 6f 45 9c 78 a8 01 99 46 d7 6e 57 ac 51 cd 32 20 | 87 d7 3c c9 3f 5e e0 a6 46 8c bc bb d2 2a 3a 19 | 0d 30 25 7b 8c f0 eb f6 7f 48 bd 51 fc 7c 03 2d | 42 fb c9 54 0b f3 df 3f 56 f4 9e 74 f1 22 86 89 | d4 fe 7d ea 34 26 2a 49 b7 c2 c2 c5 bf 06 dd 36 | be de 23 aa bf 61 22 5f 62 e1 04 e4 81 81 b4 1a | 94 68 45 c7 43 f9 2b f7 9c c7 da c1 6c f9 e0 19 | 3d 12 26 17 de 58 8c 74 5a 7c d1 ae 99 12 b1 cc | 7c fd 41 5e df 12 73 ff fe 24 d4 ac e3 4a 14 3c | a7 57 18 de 1a f8 e3 60 98 66 b7 e2 de d9 ef 30 | 7b 0c d1 7a 6d 0b f9 31 66 84 79 8b 8b 50 77 51 | 23 58 84 77 80 ea dc 70 95 5b e4 15 8d 98 42 aa | fa 93 a8 7a d7 2a 0d 51 24 2f ee fa 92 74 05 47 | d0 38 43 8c 6f cb 3f 1f 04 0b e8 57 ca ea 33 7e | 29 00 00 24 dd 5a f6 1e bd fb cd ef 92 3b 56 16 | bd 57 a2 0f d1 d5 f5 02 97 f4 10 bb 15 09 d8 8e | c9 9b 97 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 15 18 7d df ec 83 30 72 5b 68 c2 | 08 e3 c3 a4 d5 a2 af 25 00 00 00 1c 00 00 40 05 | b3 09 33 34 02 38 11 d4 03 64 9d 03 c3 5d 2b 94 | 2e 30 63 d3 | libevent_free: release ptr-libevent@0x7fb340030080 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ced0 | #270 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 aa bb 79 2f f5 b5 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #270 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #270 | rejected packet: | 98 aa bb 79 2f f5 b5 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #270: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a63210 | handling event EVENT_RETRANSMIT for parent state #314 | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #314 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #314 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49670.353455; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50066 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ced0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #314 | libevent_malloc: new ptr-libevent@0x7fb340030080 size 128 "road-eastnet-nonat-62" #314: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #314) | fd 31 72 f9 64 d3 9c f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 18 14 ac 93 72 6f f5 79 79 36 2d 8e 4c 14 ac | ea 91 ec 03 06 fb 84 ad 5e 18 85 94 4b b8 8e ee | d9 14 0b 8c 64 c8 45 95 1b 91 75 07 f8 e4 ec 03 | 59 35 93 6c 10 48 ab 6b e6 53 29 72 ab ff 3c 2a | 61 16 cb b8 bd 31 a5 f8 2f 5d 57 58 e1 26 7c 2e | d9 c7 b7 a4 21 ac 7f a4 9a 22 28 50 e4 1d c5 8c | 89 bc f7 70 40 e3 4f 71 2a 2a 2e b1 a7 96 2a 7a | 82 34 1a e1 0e c4 48 55 41 7f 5a 8b 68 d2 fd 14 | f7 10 c0 e4 c1 ac fb 5d c6 f8 34 c9 0a 71 0c 1d | 4f 2b 4a ae bd 22 c4 9a db 63 e4 0a ff 3d 5a f9 | dc 19 2e 9a 16 8d df 98 1f 04 7e 59 57 62 0a e6 | b9 93 59 94 b4 3b eb 70 b1 7b 76 4b 9a 71 ee 97 | f5 ac 50 38 4c 04 22 68 a2 68 e3 f1 1d 13 3a e1 | 84 4b 7c 08 19 fb 96 e3 58 71 59 95 c0 bd 55 f5 | 0d 72 3b 29 f3 ae 58 91 30 ad de 16 a2 e3 03 a0 | 02 e9 38 39 b8 a1 6a 55 c4 1d 22 81 8d d1 2c eb | 29 00 00 24 83 8f 4c 82 0e ff 5a 2c de 21 68 5e | 60 c0 57 92 a6 09 5b 7e 12 e1 2a 75 9d 50 83 dd | e3 d1 6f 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 7f 92 43 99 76 22 ce 79 dc 92 3a | aa fb 36 5e 79 bf 23 b0 00 00 00 1c 00 00 40 05 | e5 74 71 ef f2 a4 7e f6 0b b1 36 a7 2f ae f3 30 | ad 50 42 06 | libevent_free: release ptr-libevent@0x7fb36c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a63210 | #314 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 31 72 f9 64 d3 9c f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #314 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #314 | rejected packet: | fd 31 72 f9 64 d3 9c f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #314: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab39c0 | handling event EVENT_RETRANSMIT for parent state #295 | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #295 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #295 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49670.380738; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002513 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a63210 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #295 | libevent_malloc: new ptr-libevent@0x7fb36c01d920 size 128 "road-eastnet-nonat-43" #295: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #295) | 11 ea 13 a7 2a b1 5c 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 c0 f3 39 06 15 d7 07 8e 11 b6 9a 6e 2d b3 34 | 66 03 a5 c2 e2 1f 37 32 46 97 6f cd af d0 2f 18 | 5f 75 66 e4 a1 42 12 53 5e 16 d8 3a 31 65 02 6a | c5 e3 cc f7 d2 22 a4 aa ae 02 3c 06 f6 0c fe fa | e4 54 02 04 c7 56 0a b1 39 1c 79 77 c9 da 62 93 | 00 7e f1 cc 8f 9d de 33 24 4e 12 09 b8 73 ad 99 | 9d bd 21 4e 12 37 5e 79 f1 fe 24 ac 36 8f 56 b3 | d6 c7 5b 74 f8 84 56 d2 c9 9a 89 80 ba ca fa 63 | 61 ef b2 49 26 8d 16 1c 9e 9b a5 d0 8c b1 11 4d | 74 c3 30 50 82 5e f2 2c 5e 21 4f 59 50 07 97 4a | 3b 99 d0 83 20 16 83 be 15 cb 08 01 be 88 1e c0 | 56 de 78 28 a9 82 d7 99 3a 47 be b7 57 13 4d ef | 18 8f 0d 23 65 69 63 f7 5c af 9a 31 54 69 e3 c6 | e4 81 15 9e a2 7e 90 55 50 a1 5a e2 6d 42 36 72 | e6 93 98 8d ab 65 9b 8b b9 2a 79 2b 2d c9 0f 1f | c1 03 48 63 1c 2b 7c f0 db 5a 0a 3e b5 46 b8 79 | 29 00 00 24 64 9e 8b 02 14 e8 a7 dc 3f 42 d2 c4 | 8f dc b3 ff fc 4c fe 98 93 e9 8f 76 eb 2b 38 f4 | b9 5a a0 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c a5 c7 ec 4b 7a cd c4 3e f0 86 6d | ec 0c 21 f9 74 06 3e 81 00 00 00 1c 00 00 40 05 | 6b d7 31 2e aa f4 5b 2c dc 79 88 ab 6c 34 fc ce | 20 91 9b 02 | libevent_free: release ptr-libevent@0x7fb384048950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab39c0 | #295 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 ea 13 a7 2a b1 5c 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #295 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #295 | rejected packet: | 11 ea 13 a7 2a b1 5c 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #295: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #70 | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #70 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #70 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49670.389034; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.01061 exceeds limit? YES "road-eastnet-nonat-70" #70: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-70" #70: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #322 at 0x557d46a32d90 | State DB: adding IKEv2 state #322 in UNDEFINED | pstats #322 ikev2.ike started | Message ID: init #322: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #322: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #322; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-70" #322: initiating v2 parent SA to replace #70 | using existing local IKE proposals for connection road-eastnet-nonat-70 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 322 for state #322 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab39c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #322 | libevent_malloc: new ptr-libevent@0x7fb384048950 size 128 | #322 spent 0.0712 milliseconds in ikev2_parent_outI1() | crypto helper 2 resuming | crypto helper 2 starting work-order 322 for state #322 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 322 | RESET processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #70 ikev2.ike failed too-many-retransmits | pstats #70 ikev2.ike deleted too-many-retransmits | #70 spent 2.12 milliseconds in total | [RE]START processing: state #70 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-70" #70: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #70: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #70 "road-eastnet-nonat-70" #70: deleting IKE SA for connection 'road-eastnet-nonat-70' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-70' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-70 | State DB: deleting IKEv2 state #70 in PARENT_I1 | parent state #70: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #70 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 322 time elapsed 0.001001 seconds | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | in statetime_stop() and could not find #70 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#322) spent 1.01 milliseconds in crypto helper computing work-order 322: ikev2_outI1 KE (pcr) | processing global timer EVENT_REVIVE_CONNS | crypto helper 2 sending results from work-order 322 for state #322 to event queue | scheduling resume sending helper answer for #322 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 | crypto helper 2 waiting (nothing to do) Initiating connection road-eastnet-nonat-70 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-70" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-70' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-70" | stop processing: connection "road-eastnet-nonat-70" (in initiate_a_connection() at initiate.c:349) | spent 0.119 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #322 | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 322 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #322 | **emit ISAKMP Message: | initiator cookie: | 74 03 a5 dd ea 05 2e d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-70 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f5 15 d9 ac 31 7b 6c 04 ac 7a ef e5 0d 89 93 07 | ikev2 g^x 20 e4 8e 39 86 a0 9c 1e 9f 76 b9 58 4d f2 a7 9f | ikev2 g^x a9 61 82 a9 75 3f e8 1a c2 92 fe 84 37 ac 33 ad | ikev2 g^x 65 45 df 2b e1 cb 2c 07 be 4f c4 59 89 1a 1e d4 | ikev2 g^x bc 00 c9 7a da 51 f8 0e 6d e5 9b 4d 2b 1e 90 8c | ikev2 g^x a7 76 dd 60 8a 02 12 aa 75 a5 70 c1 65 7c 3e 55 | ikev2 g^x 89 46 b2 4f 06 dd f5 63 86 b7 00 f0 73 2f 7c 5a | ikev2 g^x b7 d4 0f 38 d5 4f 7a 42 58 2c 1c 6e 8d df 4f 92 | ikev2 g^x 63 c6 3f de f4 10 95 80 0d 14 e0 40 1c 6b a7 25 | ikev2 g^x 78 25 a5 d6 97 e1 6b 90 22 06 bd 2b cc f5 6b ca | ikev2 g^x 10 6b ac a7 98 1a 94 fa 4c cf 33 fe dc 06 fd b0 | ikev2 g^x 5f 81 4e 82 91 b8 3e 8a c7 a6 68 81 06 ac 84 f0 | ikev2 g^x ea 68 69 9c ad 3a 07 bc c5 f3 31 91 30 05 f3 ef | ikev2 g^x dc 51 d5 f6 ee f9 4a 07 b7 9e 0f 65 ad 3f 41 a0 | ikev2 g^x d7 70 67 24 31 3b 11 1f 99 26 08 ab a5 8d 87 97 | ikev2 g^x f5 4d 04 da a2 fb f0 9d b6 5e ca 79 ac fb e6 b9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7c d4 e7 e5 83 a9 e9 e5 4c 1d 37 7f 04 0f 2a 2b | IKEv2 nonce 54 28 64 c4 b2 05 be 1f 1d 68 a9 5e 6e 76 88 d9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 74 03 a5 dd ea 05 2e d4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 46 | natd_hash: port= 01 f4 | natd_hash: hash= 3c 64 8d 0f b4 d2 3e c7 db eb 6e 9c 80 67 1d 17 | natd_hash: hash= 67 fa eb 16 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3c 64 8d 0f b4 d2 3e c7 db eb 6e 9c 80 67 1d 17 | Notify data 67 fa eb 16 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 74 03 a5 dd ea 05 2e d4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 45 ce 15 93 8c ec f9 76 43 65 cd e9 a3 d1 ec 83 | natd_hash: hash= 45 3c 35 9c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 45 ce 15 93 8c ec f9 76 43 65 cd e9 a3 d1 ec 83 | Notify data 45 3c 35 9c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #322 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #322: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #322 to 4294967295 after switching state | Message ID: IKE #322 skipping update_recv as MD is fake | Message ID: sent #322 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-70" #322: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.70:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #322) | 74 03 a5 dd ea 05 2e d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 15 d9 ac 31 7b 6c 04 ac 7a ef e5 0d 89 93 07 | 20 e4 8e 39 86 a0 9c 1e 9f 76 b9 58 4d f2 a7 9f | a9 61 82 a9 75 3f e8 1a c2 92 fe 84 37 ac 33 ad | 65 45 df 2b e1 cb 2c 07 be 4f c4 59 89 1a 1e d4 | bc 00 c9 7a da 51 f8 0e 6d e5 9b 4d 2b 1e 90 8c | a7 76 dd 60 8a 02 12 aa 75 a5 70 c1 65 7c 3e 55 | 89 46 b2 4f 06 dd f5 63 86 b7 00 f0 73 2f 7c 5a | b7 d4 0f 38 d5 4f 7a 42 58 2c 1c 6e 8d df 4f 92 | 63 c6 3f de f4 10 95 80 0d 14 e0 40 1c 6b a7 25 | 78 25 a5 d6 97 e1 6b 90 22 06 bd 2b cc f5 6b ca | 10 6b ac a7 98 1a 94 fa 4c cf 33 fe dc 06 fd b0 | 5f 81 4e 82 91 b8 3e 8a c7 a6 68 81 06 ac 84 f0 | ea 68 69 9c ad 3a 07 bc c5 f3 31 91 30 05 f3 ef | dc 51 d5 f6 ee f9 4a 07 b7 9e 0f 65 ad 3f 41 a0 | d7 70 67 24 31 3b 11 1f 99 26 08 ab a5 8d 87 97 | f5 4d 04 da a2 fb f0 9d b6 5e ca 79 ac fb e6 b9 | 29 00 00 24 7c d4 e7 e5 83 a9 e9 e5 4c 1d 37 7f | 04 0f 2a 2b 54 28 64 c4 b2 05 be 1f 1d 68 a9 5e | 6e 76 88 d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 64 8d 0f b4 d2 3e c7 db eb 6e 9c | 80 67 1d 17 67 fa eb 16 00 00 00 1c 00 00 40 05 | 45 ce 15 93 8c ec f9 76 43 65 cd e9 a3 d1 ec 83 | 45 3c 35 9c | state #322 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb384048950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab39c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #322 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 | #322 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49670.390714 | resume sending helper answer for #322 suppresed complete_v2_state_transition() and stole MD | #322 spent 0.372 milliseconds in resume sending helper answer | stop processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb380015370 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 03 a5 dd ea 05 2e d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #322 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #322 | rejected packet: | 74 03 a5 dd ea 05 2e d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #322: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11680 | handling event EVENT_RETRANSMIT for parent state #308 | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #308 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #308 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49670.417887; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00216 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360012bf0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #308 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 "road-eastnet-nonat-56" #308: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #308) | 80 0a 88 98 4b f9 e7 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 60 f0 11 1d 6f 3c e8 3a d0 c5 a1 1f 8b f6 d6 | b8 1e e6 d3 27 fa 35 0f 2e 35 7c 6a ac 4d b0 5a | 6b 0b 3b 4a 46 9a c1 e4 d2 3d 95 4c 54 c7 f8 b0 | a3 25 b2 e5 19 52 cf a8 80 64 9a 61 44 3f 5d 89 | b3 ab 84 f7 4d 8d 5e c3 d5 83 26 99 08 7b 56 8e | d5 6a c7 4a 76 f4 45 38 3c fa 31 64 fb a7 68 c6 | c9 63 22 21 ab 35 5e 58 62 e8 99 25 ff 5b 61 ec | 55 a2 5b 36 cc 02 da 3b ef 08 f7 a5 b1 e6 33 04 | 63 ee 2e 9b fc 5a 62 eb 0d 0f da ab 7c b3 2f f6 | 1d 06 62 78 d0 f2 08 dd bd 5a f1 dc aa 18 b1 3b | 54 75 36 28 b8 4d f2 e6 89 e0 6c 9d a4 f4 71 27 | 99 51 48 e8 63 85 2b 41 07 00 9f 7b ff df b2 6f | 90 1f ac 1e 28 94 ef cf 9a 1c cf 53 7f 88 76 ba | 31 4b 32 29 7d 41 fd ba 51 dd cc 44 b9 6c 4f e1 | cf 89 c3 39 c3 eb 26 5a 05 e3 ac c1 a6 d7 ca ae | 7d 27 a2 0d 12 e5 de 71 e2 d1 95 9c b5 ec 14 d8 | 29 00 00 24 d3 c9 38 16 a4 35 41 62 ad 53 1d 3f | a5 70 61 f3 55 11 e2 06 85 67 55 51 bd 50 94 8d | 80 2d 38 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 1c df ea ba 44 23 ff a6 53 af 56 | 8c 58 68 ea 71 49 69 6d 00 00 00 1c 00 00 40 05 | 14 0c bd d4 4b a2 ff 28 87 d9 dd 83 a7 c2 2b 61 | 5c 8c 59 cd | libevent_free: release ptr-libevent@0x7fb338048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11680 | #308 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 0a 88 98 4b f9 e7 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #308 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #308 | rejected packet: | 80 0a 88 98 4b f9 e7 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #308: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0769 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #315 | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #315 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #315 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49670.420257; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500079 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11680 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #315 | libevent_malloc: new ptr-libevent@0x7fb338048a10 size 128 "road-eastnet-nonat-63" #315: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #315) | 44 ed db 2c fe 0c f2 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e 87 b1 78 dc 97 f3 7a 79 3b d6 3e 86 ea b2 fa | 5d 34 e2 db 78 24 8f 15 59 97 e5 e6 f6 90 b1 aa | 59 98 1b 57 96 2d 7a a6 68 c9 eb 8b 7d f6 64 68 | a2 48 77 fc cb 5d 8f 0e b2 52 9b 77 09 f1 21 ba | 81 62 c1 7e 82 df 5b 48 60 ba f6 08 04 c2 77 74 | 9c c8 6b 41 93 1d 14 39 f9 1e b0 b2 5b 1d 3c e0 | ca f1 1f 63 24 c8 cc 04 a5 c5 8f 7d 86 30 95 90 | fb a8 83 29 7a f1 ce 8e 64 9a 9f 82 39 eb 4b a4 | b2 6f ce 0a 5b bd e7 1a af 9d af 92 27 aa 66 57 | 8e 91 52 b5 d0 96 33 ee eb 0f 07 5f 2f 56 77 d0 | 9a 1f cb 0e 53 2f d5 4e b4 5b a5 9c 4c 15 af e1 | 28 86 0f 89 11 d9 bc 73 6b a7 3c 58 a9 04 2c eb | f2 53 51 79 62 f5 50 bf 5f 75 e1 7f 28 95 f0 09 | 87 f1 d9 ee 26 2c 8a ee 7d 84 2e 04 f2 6c 42 e0 | 67 e8 19 47 db 94 b6 12 29 d7 1d dc 8f 61 2d e0 | 53 f7 53 7d 18 19 05 ed 93 cb 84 d8 40 1b 1d fe | 29 00 00 24 5f cd cc 5e 9b b5 1f f6 2d c3 6f 0d | 70 ea 63 15 bc b8 5b 49 76 c9 be 04 9e 55 ff 0b | 33 d9 e0 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 2c d3 1b 13 1c a2 69 95 f2 01 8c | cb 3c f6 d6 71 d0 e6 be 00 00 00 1c 00 00 40 05 | b1 bd 1a 4e 17 0a c1 3c 72 20 f5 8a 28 12 f4 7a | a3 f8 1e e7 | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #315 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ed db 2c fe 0c f2 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #315 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #315 | rejected packet: | 44 ed db 2c fe 0c f2 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #315: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0579 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc00 | handling event EVENT_RETRANSMIT for parent state #71 | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #71 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #71 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49670.44457; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006064 exceeds limit? YES "road-eastnet-nonat-71" #71: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-71" #71: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #323 at 0x557d46a34350 | State DB: adding IKEv2 state #323 in UNDEFINED | pstats #323 ikev2.ike started | Message ID: init #323: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #323: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #323; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-71" #323: initiating v2 parent SA to replace #71 | using existing local IKE proposals for connection road-eastnet-nonat-71 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 323 for state #323 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36800d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #323 | libevent_malloc: new ptr-libevent@0x7fb368012840 size 128 | #323 spent 0.0653 milliseconds in ikev2_parent_outI1() | RESET processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #71 ikev2.ike failed too-many-retransmits | pstats #71 ikev2.ike deleted too-many-retransmits | #71 spent 2.52 milliseconds in total | crypto helper 0 resuming | crypto helper 0 starting work-order 323 for state #323 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 323 | [RE]START processing: state #71 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-71" #71: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #71: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #71 "road-eastnet-nonat-71" #71: deleting IKE SA for connection 'road-eastnet-nonat-71' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-71' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-71 | State DB: deleting IKEv2 state #71 in PARENT_I1 | parent state #71: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #71 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 323 time elapsed 0.000606 seconds | libevent_free: release ptr-libevent@0x7fb3780300e0 | (#323) spent 0.613 milliseconds in crypto helper computing work-order 323: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc00 | in statetime_stop() and could not find #71 | crypto helper 0 sending results from work-order 323 for state #323 to event queue | scheduling resume sending helper answer for #323 | libevent_malloc: new ptr-libevent@0x7fb384048950 size 128 | crypto helper 0 waiting (nothing to do) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-71 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-71" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-71' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-71" | stop processing: connection "road-eastnet-nonat-71" (in initiate_a_connection() at initiate.c:349) | spent 0.0785 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #323 | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 323 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #323 | **emit ISAKMP Message: | initiator cookie: | fa a0 9f 7c 98 fa b7 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-71 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 98 46 00 d1 b1 2f ab 58 ff ae 3e e1 90 df ac 17 | ikev2 g^x ff f8 20 d8 dc c8 64 44 8b d4 4d 64 77 87 0d 12 | ikev2 g^x 4f 58 f8 0b b8 23 de 06 cb 6a 5a 17 a1 ce 9c 0e | ikev2 g^x b9 8f d4 30 b1 62 d8 df cd 4c 66 72 94 9e 12 c2 | ikev2 g^x 2d 76 67 bf af 09 84 71 96 13 7f 13 e3 92 f9 eb | ikev2 g^x 91 ae c7 77 a0 91 b1 8b 78 4e 95 7f ad 59 ce f7 | ikev2 g^x 52 f5 ff c7 0f 12 41 0b 6a 23 2d 80 44 0e 92 7c | ikev2 g^x 8a 4f 11 47 2b 77 90 68 d7 a1 52 f7 6b 79 db 3f | ikev2 g^x 94 cd 89 b0 a4 aa 7e 64 52 6b 85 6e 03 da 1f ae | ikev2 g^x b6 90 2d d1 46 19 b6 66 ea b6 57 b4 c6 78 39 27 | ikev2 g^x 7f 33 c8 a1 bd 41 e7 ba 08 ef c1 2b 83 3d 1a a5 | ikev2 g^x d6 cc ec 96 a2 e8 29 ec 44 9c 54 bc 8b 9c d6 9b | ikev2 g^x cf 36 d1 9f c7 0e 2f 28 11 0b 73 2c 8d e2 76 0d | ikev2 g^x 66 d9 63 04 c0 20 e3 d1 af b2 68 91 e0 90 8f 15 | ikev2 g^x 8a 1a f5 c8 e3 0d 24 88 9a 72 7c ad a0 47 9a cf | ikev2 g^x 87 bf fe bc 41 93 5c 36 c0 33 07 c5 9e ea fb dd | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 40 e8 32 3c 23 00 84 94 61 80 b2 17 1c a2 13 13 | IKEv2 nonce eb 56 70 6b 74 c5 2e 36 50 96 1d 9e 9b cf 84 1b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fa a0 9f 7c 98 fa b7 b4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 47 | natd_hash: port= 01 f4 | natd_hash: hash= a5 d2 f5 ad 3c 92 ba 81 0f fc 09 27 bf 74 8b d6 | natd_hash: hash= da e0 d6 64 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a5 d2 f5 ad 3c 92 ba 81 0f fc 09 27 bf 74 8b d6 | Notify data da e0 d6 64 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fa a0 9f 7c 98 fa b7 b4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e3 ba 50 e3 10 b5 c6 17 22 3f 31 51 2e fe 55 bf | natd_hash: hash= 2d 04 cf 9f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e3 ba 50 e3 10 b5 c6 17 22 3f 31 51 2e fe 55 bf | Notify data 2d 04 cf 9f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #323 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #323: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #323 to 4294967295 after switching state | Message ID: IKE #323 skipping update_recv as MD is fake | Message ID: sent #323 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-71" #323: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.71:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #323) | fa a0 9f 7c 98 fa b7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 46 00 d1 b1 2f ab 58 ff ae 3e e1 90 df ac 17 | ff f8 20 d8 dc c8 64 44 8b d4 4d 64 77 87 0d 12 | 4f 58 f8 0b b8 23 de 06 cb 6a 5a 17 a1 ce 9c 0e | b9 8f d4 30 b1 62 d8 df cd 4c 66 72 94 9e 12 c2 | 2d 76 67 bf af 09 84 71 96 13 7f 13 e3 92 f9 eb | 91 ae c7 77 a0 91 b1 8b 78 4e 95 7f ad 59 ce f7 | 52 f5 ff c7 0f 12 41 0b 6a 23 2d 80 44 0e 92 7c | 8a 4f 11 47 2b 77 90 68 d7 a1 52 f7 6b 79 db 3f | 94 cd 89 b0 a4 aa 7e 64 52 6b 85 6e 03 da 1f ae | b6 90 2d d1 46 19 b6 66 ea b6 57 b4 c6 78 39 27 | 7f 33 c8 a1 bd 41 e7 ba 08 ef c1 2b 83 3d 1a a5 | d6 cc ec 96 a2 e8 29 ec 44 9c 54 bc 8b 9c d6 9b | cf 36 d1 9f c7 0e 2f 28 11 0b 73 2c 8d e2 76 0d | 66 d9 63 04 c0 20 e3 d1 af b2 68 91 e0 90 8f 15 | 8a 1a f5 c8 e3 0d 24 88 9a 72 7c ad a0 47 9a cf | 87 bf fe bc 41 93 5c 36 c0 33 07 c5 9e ea fb dd | 29 00 00 24 40 e8 32 3c 23 00 84 94 61 80 b2 17 | 1c a2 13 13 eb 56 70 6b 74 c5 2e 36 50 96 1d 9e | 9b cf 84 1b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 d2 f5 ad 3c 92 ba 81 0f fc 09 27 | bf 74 8b d6 da e0 d6 64 00 00 00 1c 00 00 40 05 | e3 ba 50 e3 10 b5 c6 17 22 3f 31 51 2e fe 55 bf | 2d 04 cf 9f | state #323 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb368012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36800d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #323 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 | #323 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49670.445934 | resume sending helper answer for #323 suppresed complete_v2_state_transition() and stole MD | #323 spent 0.457 milliseconds in resume sending helper answer | stop processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb384048950 | timer_event_cb: processing event@0x557d46b12bc0 | handling event EVENT_RETRANSMIT for parent state #296 | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #296 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #296 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49670.445984; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004491 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384009ed0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #296 | libevent_malloc: new ptr-libevent@0x7fb384048950 size 128 "road-eastnet-nonat-44" #296: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #296) | 1c da 2e ac 4a 99 24 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 2a 4d fb 46 1d b7 c4 96 00 b1 66 99 7e ce 3b | 3f 48 6e 8c 76 bd 25 cd 72 f7 15 4a f9 69 ef 13 | 61 8a 19 db 25 90 81 55 08 5a cc 41 41 e5 ab d4 | 92 10 f9 d6 8d 49 ef 3f b0 9e f2 80 9b 7b 70 6e | a9 61 7d e0 84 75 fd d1 46 6c 42 61 66 ee 24 20 | 73 fa d1 4c 21 9e a9 c7 16 a9 b3 6f aa 78 ac 00 | 78 f4 c3 83 9c c4 9a 92 64 af b4 ed 81 ba ac a2 | f1 41 08 3e c1 2f b1 ba 03 49 e2 bf 7f db 95 66 | 30 1e c5 ba 28 dd ee 71 21 42 41 ca af c4 be d2 | 90 1d aa 94 fa 3e 05 ce 17 28 d8 85 00 b7 a3 6c | d2 a6 c4 12 ee 02 b6 a5 47 f5 e8 05 85 3f 07 9b | aa 0d 4f 57 c3 15 b2 47 ad f5 11 0a f7 29 da c6 | 9c 86 0c 08 6b ec 00 4d b0 6e 72 d1 b7 c3 86 c8 | 85 d9 c3 07 c3 a7 58 91 99 ee d7 82 f7 95 cb 56 | c0 48 0c 04 c6 c9 83 ce b6 aa 4e 64 f0 9f 73 46 | e9 f5 bb 10 78 a8 77 4a 7b da 32 8f 23 90 cf 6d | 29 00 00 24 ce d0 75 80 6d 1e 36 8f b6 81 e0 37 | 25 cc b5 c9 b7 8f 97 4d 1e ae eb 17 23 86 66 d2 | cc 2a b8 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 83 86 3f b2 b5 92 3c 02 7f 1a c2 | 45 4d 9a 24 f1 5a 66 8d 00 00 00 1c 00 00 40 05 | 7c cb b6 c5 ee bc 2b a0 53 bb 77 45 86 3e ca 93 | 1e 2d 97 d8 | libevent_free: release ptr-libevent@0x7fb36800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12bc0 | #296 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa a0 9f 7c 98 fa b7 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #323 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #323 | rejected packet: | fa a0 9f 7c 98 fa b7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #323: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c da 2e ac 4a 99 24 d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #296 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #296 | rejected packet: | 1c da 2e ac 4a 99 24 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #296: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0536 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #271 | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #271 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #271 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49670.461338; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003421 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12bc0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #271 | libevent_malloc: new ptr-libevent@0x7fb36800cf80 size 128 "road-eastnet-nonat-19" #271: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #271) | 7d 5f ba e3 47 14 e8 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 b7 7f 1c 9b af 52 72 9a 96 12 4e c3 f7 5f 8a | 48 37 54 79 d7 e3 fa 14 73 ed 20 d0 0f 82 32 1d | 91 7e 9e e7 72 47 b7 f9 8c ea 5f f8 df 55 12 c4 | 92 bb 9f b6 bd 08 63 49 16 85 39 f9 e1 a5 b1 3c | c9 58 9d 54 19 7c 80 7a 60 14 04 1b 66 54 39 2c | 16 d8 67 8c 1c 17 da 4b 4f 1f bb d2 83 f8 37 fc | 93 5f 92 af 49 5f 4c f2 18 ce 79 e8 01 4b 07 77 | 80 53 3f 3e 68 e0 6b 21 fa 6f 05 3a 1d 5f f9 c2 | 5b 34 da 08 fc 81 e1 b6 3f ef a7 e1 31 76 84 4b | db 66 e5 6b 4f 6c 18 0f ea 47 e4 2c 6a c6 c7 06 | 5d 0a 4e 6f d5 bc 0f 88 7b d7 82 6f 83 51 d3 f6 | 3f a3 4c ff 85 ee cb 4b c1 01 38 69 a0 a8 36 14 | 78 3e d3 db 38 75 17 e9 a4 a3 59 d1 1c af a4 4d | 60 05 9d fd 70 d0 ca cf 0e 66 4b c6 c1 40 c4 3b | 1b 74 97 05 ab 30 3b 52 e7 0a 00 36 d3 75 ae 4d | 76 9f 37 1c a2 58 eb 22 e1 c0 ab af b2 c0 c6 2e | 29 00 00 24 7c 82 5e 31 94 0b 65 4a 1d 71 08 ad | 0f 28 62 96 1d 12 64 f9 13 f9 d7 4a bb 8e a2 2a | 74 49 fb 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 80 df fd 55 81 8a 62 6a df 6a a7 | 9f a0 5f ab 49 a7 33 15 00 00 00 1c 00 00 40 05 | 73 c3 81 b2 53 ff c8 44 e3 9d 4d 41 12 c0 55 97 | b5 95 22 52 | libevent_free: release ptr-libevent@0x7fb34800f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #271 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 5f ba e3 47 14 e8 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #271 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #271 | rejected packet: | 7d 5f ba e3 47 14 e8 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #271: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46af3800 | handling event EVENT_RETRANSMIT for parent state #316 | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #316 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #316 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49670.479672; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500751 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #316 | libevent_malloc: new ptr-libevent@0x7fb34800f1a0 size 128 "road-eastnet-nonat-64" #316: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #316) | e8 62 07 3d 83 c9 27 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 67 27 d8 ca da 21 fc 33 ba 4f 94 10 8a c5 3e | 5d c6 ca e9 be 5f 5b 62 d9 f8 5f ef cd 1d 75 de | 4e 46 e5 c8 47 0c 64 48 a0 a0 be ad 1a 88 be 29 | 21 51 4f e4 bd 33 bd be 35 5e 1a f3 c6 5c 72 cc | 14 4f 34 ba 69 93 e8 bf 07 ec 5c 62 f6 72 9d af | 95 ca 7c 71 3b 37 93 92 3a 98 4e 7a 53 2f 9a a8 | 2a b6 32 33 20 cf eb 65 6b e0 73 23 52 d2 61 14 | 64 77 57 5a e0 a6 ac 4c 66 6c 73 74 1e 30 64 d8 | 26 eb 6f 24 f1 a2 d0 b2 6b 58 a7 b2 54 48 ba 72 | 09 ae 65 3c 30 0d df 54 4e 6a 33 e2 26 65 76 99 | ea 2e 2a 30 fa a7 4c 97 4d 74 ba 19 a6 b3 7b 01 | 82 88 fa e7 6a 85 ab 68 48 39 a4 91 e9 e4 44 02 | 10 7a c6 c8 2e 47 03 39 25 a6 92 8c e5 51 eb 52 | f8 c7 61 20 39 65 61 dc 27 00 53 74 46 c8 5c be | 3b 90 c1 02 b8 be b2 17 6b a3 86 6f 65 fa c8 19 | e6 54 1a 74 80 e0 70 41 21 d7 44 54 50 0b cd 29 | 29 00 00 24 89 45 06 65 65 b3 8c d6 0c df 20 90 | 5a e6 b0 5e f6 87 85 10 8d 96 3d 5e 67 1f 54 38 | 77 de f5 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 e4 d3 0f a4 c8 a7 ec 05 e8 fa d2 | 6d 31 a1 ad f7 6f 67 3e 00 00 00 1c 00 00 40 05 | 0a a4 aa 05 10 e6 c7 c4 a5 a6 8e 98 2e fc 0d 29 | 7c 74 b9 43 | libevent_free: release ptr-libevent@0x7fb35804b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af3800 | #316 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 62 07 3d 83 c9 27 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #316 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #316 | rejected packet: | e8 62 07 3d 83 c9 27 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #316: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb40 | handling event EVENT_RETRANSMIT for parent state #72 | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #72 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #72 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49670.511018; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007842 exceeds limit? YES "road-eastnet-nonat-72" #72: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-72" #72: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #324 at 0x557d46a35910 | State DB: adding IKEv2 state #324 in UNDEFINED | pstats #324 ikev2.ike started | Message ID: init #324: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #324: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #324; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-72" #324: initiating v2 parent SA to replace #72 | using existing local IKE proposals for connection road-eastnet-nonat-72 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 324 for state #324 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46af3800 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #324 | libevent_malloc: new ptr-libevent@0x7fb35804b7c0 size 128 | #324 spent 0.0843 milliseconds in ikev2_parent_outI1() | RESET processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #72 ikev2.ike failed too-many-retransmits | pstats #72 ikev2.ike deleted too-many-retransmits | crypto helper 9 resuming | crypto helper 9 starting work-order 324 for state #324 | #72 spent 2.63 milliseconds in total | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 324 | [RE]START processing: state #72 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-72" #72: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #72: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #72 "road-eastnet-nonat-72" #72: deleting IKE SA for connection 'road-eastnet-nonat-72' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-72' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-72 | State DB: deleting IKEv2 state #72 in PARENT_I1 | parent state #72: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 324 time elapsed 0.000554 seconds | (#324) spent 0.554 milliseconds in crypto helper computing work-order 324: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 324 for state #324 to event queue | scheduling resume sending helper answer for #324 | libevent_malloc: new ptr-libevent@0x7fb37801a4e0 size 128 | crypto helper 9 waiting (nothing to do) | stop processing: state #72 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb35c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb40 | in statetime_stop() and could not find #72 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-72 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-72" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-72' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-72" | stop processing: connection "road-eastnet-nonat-72" (in initiate_a_connection() at initiate.c:349) | spent 0.0595 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #324 | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 324 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #324 | **emit ISAKMP Message: | initiator cookie: | c4 71 4c 47 7a 99 7f 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-72 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2c dc ba bd 1d 04 54 b8 de 2e 7e 4a 73 d1 75 b4 | ikev2 g^x 30 69 01 66 67 06 e7 5e ab 90 82 b5 8d a8 6f 99 | ikev2 g^x a6 8e f4 9a 71 40 de b0 d0 8a d9 b4 ed e4 6f 96 | ikev2 g^x 72 62 19 62 54 5d 4c 3f 06 3d 1e 94 b0 72 25 98 | ikev2 g^x 59 31 b4 12 f8 20 4c c4 1b 57 a8 cc e5 a4 fd 8e | ikev2 g^x b7 00 85 d1 0e c7 4d 3b 7a 7d 11 6d 19 fd 6a 75 | ikev2 g^x 3a e2 10 64 69 82 7f f7 9f 48 c9 57 2f a9 70 57 | ikev2 g^x 4e 17 87 f1 7b f1 ed 42 6c 69 0f 53 01 4f 76 4d | ikev2 g^x 49 de 7e 34 19 26 2c 17 55 79 6b 2b e6 70 a9 41 | ikev2 g^x 28 a8 e5 5c 9c 0b 01 88 ec 60 31 32 12 e0 5e 2a | ikev2 g^x d0 1f 1c 62 7b 27 a5 6a b5 82 73 7a c7 4d 6d 07 | ikev2 g^x a2 fe cc 3c f6 be 38 d5 e6 bc c7 f9 e4 e8 c4 66 | ikev2 g^x 25 de 6a 66 de d9 be 67 52 10 16 32 1e 81 04 70 | ikev2 g^x 2e 04 43 17 b2 33 75 6a 97 52 34 c2 f0 d7 69 62 | ikev2 g^x a8 cb 03 e7 cd 81 0c 55 75 a8 24 c4 ed 92 5e ec | ikev2 g^x 1a d4 65 0c 31 44 9a 04 50 cf 8e 45 48 fa 6a 9c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a2 70 44 54 09 89 66 44 f1 6d a2 85 b3 a0 4f a8 | IKEv2 nonce 16 2e 01 ca af 0e 31 e7 7c 41 b8 c9 46 c7 99 87 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c4 71 4c 47 7a 99 7f 51 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 48 | natd_hash: port= 01 f4 | natd_hash: hash= a1 0b 59 de ec 8b 84 8b 41 7c 2d 20 10 87 a7 ee | natd_hash: hash= 10 a7 dc 2a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a1 0b 59 de ec 8b 84 8b 41 7c 2d 20 10 87 a7 ee | Notify data 10 a7 dc 2a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c4 71 4c 47 7a 99 7f 51 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 44 04 bc 04 96 6f cb 2b 3d a9 52 fe 2d cc 35 38 | natd_hash: hash= 9a e2 35 2c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 44 04 bc 04 96 6f cb 2b 3d a9 52 fe 2d cc 35 38 | Notify data 9a e2 35 2c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #324 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #324: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #324 to 4294967295 after switching state | Message ID: IKE #324 skipping update_recv as MD is fake | Message ID: sent #324 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-72" #324: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.72:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #324) | c4 71 4c 47 7a 99 7f 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c dc ba bd 1d 04 54 b8 de 2e 7e 4a 73 d1 75 b4 | 30 69 01 66 67 06 e7 5e ab 90 82 b5 8d a8 6f 99 | a6 8e f4 9a 71 40 de b0 d0 8a d9 b4 ed e4 6f 96 | 72 62 19 62 54 5d 4c 3f 06 3d 1e 94 b0 72 25 98 | 59 31 b4 12 f8 20 4c c4 1b 57 a8 cc e5 a4 fd 8e | b7 00 85 d1 0e c7 4d 3b 7a 7d 11 6d 19 fd 6a 75 | 3a e2 10 64 69 82 7f f7 9f 48 c9 57 2f a9 70 57 | 4e 17 87 f1 7b f1 ed 42 6c 69 0f 53 01 4f 76 4d | 49 de 7e 34 19 26 2c 17 55 79 6b 2b e6 70 a9 41 | 28 a8 e5 5c 9c 0b 01 88 ec 60 31 32 12 e0 5e 2a | d0 1f 1c 62 7b 27 a5 6a b5 82 73 7a c7 4d 6d 07 | a2 fe cc 3c f6 be 38 d5 e6 bc c7 f9 e4 e8 c4 66 | 25 de 6a 66 de d9 be 67 52 10 16 32 1e 81 04 70 | 2e 04 43 17 b2 33 75 6a 97 52 34 c2 f0 d7 69 62 | a8 cb 03 e7 cd 81 0c 55 75 a8 24 c4 ed 92 5e ec | 1a d4 65 0c 31 44 9a 04 50 cf 8e 45 48 fa 6a 9c | 29 00 00 24 a2 70 44 54 09 89 66 44 f1 6d a2 85 | b3 a0 4f a8 16 2e 01 ca af 0e 31 e7 7c 41 b8 c9 | 46 c7 99 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 0b 59 de ec 8b 84 8b 41 7c 2d 20 | 10 87 a7 ee 10 a7 dc 2a 00 00 00 1c 00 00 40 05 | 44 04 bc 04 96 6f cb 2b 3d a9 52 fe 2d cc 35 38 | 9a e2 35 2c | state #324 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35804b7c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46af3800 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #324 | libevent_malloc: new ptr-libevent@0x7fb35c0407f0 size 128 | #324 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49670.512205 | resume sending helper answer for #324 suppresed complete_v2_state_transition() and stole MD | #324 spent 0.335 milliseconds in resume sending helper answer | stop processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37801a4e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 71 4c 47 7a 99 7f 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #324 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #324 | rejected packet: | c4 71 4c 47 7a 99 7f 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 48 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #324: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0411 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #297 | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #297 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #297 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49670.512284; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002063 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #297 | libevent_malloc: new ptr-libevent@0x7fb37801a4e0 size 128 "road-eastnet-nonat-45" #297: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #297) | e1 41 d2 51 2f 25 d9 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 ea 0d 0b 39 8c c1 99 18 5a a8 8a 8f 5d 3d 22 | 46 42 ee 49 5d 81 c3 87 32 80 3d 42 65 0e 28 54 | e6 12 c3 e6 03 86 ad ca e9 ea 65 ce 14 e5 73 46 | 61 07 3a 7c 00 7f 71 ec 17 17 d4 44 37 36 26 7a | 8c 65 4b 5e 2f d6 31 47 0e b3 55 90 e6 1c cb 77 | 1c 6d 58 27 57 b3 27 ff b6 e1 e9 7d 1b 10 c2 48 | 70 f7 e7 1e 31 56 ab cf ae 38 32 b8 65 81 ac 00 | 4e 9d 3a 6c 2c 1d fb a6 ff a6 c5 15 4a d1 e9 8c | f6 3b 4a 4d e5 6a 3d e0 b2 a1 f4 29 63 27 5f 0f | 08 89 9b 00 9b 1b 1f 8e 12 d3 c4 4f 3e 13 f5 a5 | 9c 44 af 0f 10 29 67 15 0d b9 b4 26 98 5d 9e 81 | d4 78 c2 73 92 2e 97 4c 48 13 99 b5 01 42 7a 4a | aa bb 3e f2 96 18 19 79 ab c3 39 3b ba ba b8 0b | 06 4a 68 91 6a ff 80 ba f0 6f 51 cd 71 94 91 9b | 14 d1 d2 23 7f bc a7 08 5b 2f eb 14 51 51 4a 55 | ca 92 da a2 1f 6e 9a 88 d0 9b 68 b4 59 e4 e6 5b | 29 00 00 24 a5 fe b0 e3 a2 f4 1f f6 10 ff b8 23 | 13 cf c1 54 86 87 d9 95 be 21 30 83 5b ee 54 e5 | 86 f0 89 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 30 e2 49 c0 1b 21 8e cb 56 2f 44 | 75 d2 75 93 97 72 cd 45 00 00 00 1c 00 00 40 05 | ed 4e b6 34 59 cc 9b 96 b2 cc cc ed 70 1c 55 bb | 38 17 6f fc | libevent_free: release ptr-libevent@0x7fb36c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #297 spent 0.0681 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 41 d2 51 2f 25 d9 71 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #297 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #297 | rejected packet: | e1 41 d2 51 2f 25 d9 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #297: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0366 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #309 | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #309 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #309 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49670.515507; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002047 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #309 | libevent_malloc: new ptr-libevent@0x7fb36c00cf80 size 128 "road-eastnet-nonat-57" #309: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #309) | 90 f2 f2 23 da 96 f5 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 ae c5 2a 76 79 d9 11 80 1f 96 5b 2c 21 55 0e | 52 32 59 59 4d 8b 62 1b 1e 24 ff e4 61 ef 06 93 | bc 09 7d 02 95 4e 35 bb 5f 6e 04 f9 37 8a f2 09 | 6d fa 0e df ec 2a 67 53 c6 cd 21 62 19 ee 00 c8 | c1 d4 ad 74 e9 af 08 d7 51 b7 54 c4 5f 85 6b a2 | 75 c9 cd 93 29 db 83 26 13 60 09 0f 01 6b a6 ba | d6 a0 83 70 f4 77 2d c4 f9 20 b0 ee 09 7b a0 33 | 18 ea 6e 22 92 4b e5 33 07 61 e4 39 b1 8b 5a 98 | 64 4f e0 7f 33 58 7a 46 70 b5 36 54 83 e6 d8 37 | ce 3d 5e 64 00 34 b5 97 2a dc 6b 73 bd d2 1e e9 | b3 9d 99 c9 3c f8 18 03 58 76 b7 9a 2d cb ea 7b | 87 84 d1 8b 6e c6 cd 25 71 71 3e 99 ff 0a 1f c8 | 85 6f a7 e5 39 50 54 2c 26 84 44 cb fa 8a 51 d4 | ba 1f 9f 90 6f 93 95 a4 f9 85 9a b3 12 aa 79 46 | 05 32 e1 d4 7a f2 7a 36 94 b5 70 4b aa c4 3f f8 | f9 83 fb b5 44 81 41 3d b3 33 5c b4 2d 71 df 84 | 29 00 00 24 4c 7f 8f 28 17 31 ae 2a a7 3c 6d 65 | 1e 41 da 23 81 4d 09 fa 18 57 5d 4f dc f4 df 6c | 20 61 c5 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f3 f8 4c d7 1e 43 e6 3f 42 eb 30 72 | de e0 e8 5b 93 4d e7 89 00 00 00 1c 00 00 40 05 | e8 f2 fc 6d 83 fa 04 7a cc 0f 54 6b 70 28 25 4d | 2b f2 eb 8b | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #309 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 f2 f2 23 da 96 f5 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #309 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #309 | rejected packet: | 90 f2 f2 23 da 96 f5 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #309: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac2900 | handling event EVENT_RETRANSMIT for parent state #272 | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #272 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #272 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49670.546754; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004334 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #272 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 "road-eastnet-nonat-20" #272: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #272) | ff cb fd 37 8d 6e 61 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 04 b7 27 a5 a7 b8 66 d1 97 95 af 66 c3 e5 98 | ee b7 4e e8 fe 54 c0 2a 2c 35 b6 d6 11 41 10 b4 | 18 af 3b 75 f0 d4 8b ed 8c 54 fb a5 3b 9b 6b cd | 03 d4 cf 02 df ad 03 af ed 19 0c 47 fd 76 33 3e | 24 82 13 9d 24 33 be 90 d1 7f 59 52 78 71 71 b7 | d4 30 a1 93 8a 23 ef e8 5d 07 26 a3 58 a3 1a 46 | 2d 58 6b b7 bb c2 88 9f da 41 df 19 fa 55 01 88 | 63 f9 88 36 bf 3a 39 63 56 a1 2c 9c 43 fd a5 21 | f8 58 cf ff 69 0b 98 4e 19 2a 44 99 da 01 4c 80 | 0c 1f 77 fa 46 a9 9d c9 0d f6 84 3d b7 03 9e fa | 58 be 5a 4e 84 f9 db ea 37 27 1e 20 1a 6d 70 a9 | 48 8d a5 77 92 42 17 cb 45 b8 22 eb 9d 91 c6 90 | e3 e5 f3 a4 52 f9 ea e1 ca a2 a3 45 53 91 dc 5f | 97 6f 49 81 28 51 8e dc 29 b1 94 f1 3b a3 22 d7 | 94 cf 3a 4b 92 c4 95 64 a5 39 a2 3f 8c 62 a2 f6 | c1 95 97 06 70 da 53 50 e5 31 15 be f9 f5 d7 98 | 29 00 00 24 f6 15 1a 90 c8 9a 0e fb 04 05 1c c3 | 59 55 fa d7 2d f2 b7 dc b4 87 c3 61 27 da cc e0 | 74 b4 47 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee f8 1c 9f 4c fe 24 8c 43 92 80 29 | 12 02 33 5d 78 63 e2 5e 00 00 00 1c 00 00 40 05 | 82 23 9a b6 38 a9 7d af e0 d8 2e 1b 87 38 33 1a | f5 86 95 cf | libevent_free: release ptr-libevent@0x7fb3540251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac2900 | #272 spent 0.128 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff cb fd 37 8d 6e 61 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #272 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #272 | rejected packet: | ff cb fd 37 8d 6e 61 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #272: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000d120 | handling event EVENT_RETRANSMIT for parent state #317 | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #317 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #317 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49670.55009; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500205 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac2900 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #317 | libevent_malloc: new ptr-libevent@0x7fb3540251c0 size 128 "road-eastnet-nonat-65" #317: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #317) | 5c a2 6c e8 b2 28 e0 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 95 b1 4b f7 b4 a2 f3 b1 63 69 55 e2 98 fb 3f | 54 1a 28 48 de 85 37 f8 72 76 27 96 2b db 5e 33 | be af 42 49 c9 29 81 c9 57 56 f4 f8 82 3d a6 af | 88 eb 0d 9f f2 82 74 6e 72 69 04 07 19 3d d2 37 | 11 a5 22 ff d2 62 d9 98 57 a1 83 a7 1e 49 51 44 | e5 97 9b 8d 73 a0 96 d3 53 9b fb 45 84 94 f7 3d | 76 31 fc 24 62 7d a9 38 2a be 46 8d 20 60 df db | 07 4b 68 3b f4 5c 0f 39 ef 4f 67 78 1a 41 5e d9 | 21 46 6b 9d 25 f7 b9 97 47 6b 61 67 28 72 bc ab | 6f b2 d8 94 3c 23 68 03 63 f9 fd 48 53 49 f9 59 | 58 72 d8 2c 34 ca e6 db de 5e 25 73 b8 b7 64 58 | c2 d1 ad 6f 0e ca 13 2e b2 5c 80 d7 ba 3d 3c a9 | 3d f9 8e 60 bf 1b 92 40 5e 5c 05 7e ba c9 a8 db | 73 77 de d1 63 54 7f e1 7b 4e 7b ea 38 36 f5 df | ad 83 e3 b0 ba 8d 91 72 ad 79 42 21 5b 3d 90 52 | 8f 94 65 66 3d 81 71 1c 3b 5e 4d 22 19 2e a8 97 | 29 00 00 24 16 ec e2 f4 0d c3 b4 c6 88 17 fa c1 | 57 1b 6f 8e 72 cf d0 88 9c 45 18 d1 76 a6 22 b7 | e9 88 2c 7a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 7d b4 14 23 b3 6a c1 75 92 cb 9c | f1 ae 10 a4 55 81 67 0f 00 00 00 1c 00 00 40 05 | d3 a6 c6 52 7d d4 a1 eb 3d cd 3f 6c 65 3f cc dd | 6f e3 2d 43 | libevent_free: release ptr-libevent@0x7fb360012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000d120 | #317 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c a2 6c e8 b2 28 e0 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #317 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #317 | rejected packet: | 5c a2 6c e8 b2 28 e0 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #317: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0401 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b5d0 | handling event EVENT_RETRANSMIT for parent state #73 | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #73 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #73 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49670.581328; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008172 exceeds limit? YES "road-eastnet-nonat-73" #73: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-73" #73: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #325 at 0x557d46a36ed0 | State DB: adding IKEv2 state #325 in UNDEFINED | pstats #325 ikev2.ike started | Message ID: init #325: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #325: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #325; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-73" #325: initiating v2 parent SA to replace #73 | using existing local IKE proposals for connection road-eastnet-nonat-73 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 325 for state #325 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36000d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #325 | libevent_malloc: new ptr-libevent@0x7fb360012840 size 128 | #325 spent 0.0677 milliseconds in ikev2_parent_outI1() | RESET processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #73 ikev2.ike failed too-many-retransmits | pstats #73 ikev2.ike deleted too-many-retransmits | #73 spent 2.48 milliseconds in total | [RE]START processing: state #73 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-73" #73: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #73: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #73 "road-eastnet-nonat-73" #73: deleting IKE SA for connection 'road-eastnet-nonat-73' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-73' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-73 | State DB: deleting IKEv2 state #73 in PARENT_I1 | parent state #73: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 10 resuming | crypto helper 10 starting work-order 325 for state #325 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 325 | stop processing: state #73 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb384015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b5d0 | in statetime_stop() and could not find #73 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-73 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-73" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-73' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-73" | stop processing: connection "road-eastnet-nonat-73" (in initiate_a_connection() at initiate.c:349) | spent 0.0598 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 325 time elapsed 0.000525 seconds | (#325) spent 0.529 milliseconds in crypto helper computing work-order 325: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 325 for state #325 to event queue | scheduling resume sending helper answer for #325 | libevent_malloc: new ptr-libevent@0x7fb37c01a4e0 size 128 | crypto helper 10 waiting (nothing to do) | processing resume sending helper answer for #325 | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 325 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #325 | **emit ISAKMP Message: | initiator cookie: | cc 62 92 c7 07 e9 0f 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-73 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ab 78 1e 62 84 10 5f b3 3f 6a 1c 99 15 ef b2 82 | ikev2 g^x ab 2f bf af 7d 91 0a 7a 06 0b c3 b0 8f 52 23 e0 | ikev2 g^x 2a 6c c7 c4 de c8 66 7c 42 9d 81 5e 4d 92 4f 0b | ikev2 g^x 2b a2 91 3c a6 4c 27 12 5d 3b 8e 56 27 02 38 a0 | ikev2 g^x d6 c6 eb ec 94 e3 d3 7c 60 71 44 03 de ee 1c 20 | ikev2 g^x b0 a7 fc d5 f0 33 3d 58 40 9a 40 7c 4b ef 22 f2 | ikev2 g^x e4 98 7c df 9e 84 f0 00 c2 3a 23 ca 54 c0 d4 32 | ikev2 g^x 78 ec 09 e7 04 f1 06 b2 16 5d 5c 32 c7 62 b8 41 | ikev2 g^x 9e c8 62 f4 94 dc ed 85 b6 72 ee e7 73 a0 4e 8f | ikev2 g^x 20 26 e2 05 be 3a 4e 16 75 b9 60 31 64 9c 09 14 | ikev2 g^x ad be c7 c8 b5 48 83 aa 5c 33 7b 3c 0a 72 26 74 | ikev2 g^x 75 7b 8e 60 49 df aa 10 6d 2e c8 c2 08 b3 b5 75 | ikev2 g^x e0 b2 66 ad ea 56 f8 5f 65 d4 40 09 52 2c f1 dd | ikev2 g^x 08 91 8c 9a aa bf 76 e2 bf e4 1a 3b 53 96 c1 d8 | ikev2 g^x e5 63 67 aa b1 58 7e 5f 20 cf 8d 72 df da b4 0e | ikev2 g^x bf a9 5c cc d8 b0 81 7f 8f b4 f2 bf dd 09 8c 23 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce bd d5 db 94 ee 32 26 3b fc 5c d2 c6 e1 33 da da | IKEv2 nonce 8c 36 b9 7d d8 b6 53 e3 83 8c 71 5a ae 9b 26 da | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cc 62 92 c7 07 e9 0f 42 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 49 | natd_hash: port= 01 f4 | natd_hash: hash= 23 04 08 e6 80 0c ed de 4c 99 bb 24 eb 89 b5 9f | natd_hash: hash= d3 24 a6 8a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 23 04 08 e6 80 0c ed de 4c 99 bb 24 eb 89 b5 9f | Notify data d3 24 a6 8a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cc 62 92 c7 07 e9 0f 42 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 55 23 78 6b d1 b2 f4 84 29 a3 9f e9 4d 04 41 1c | natd_hash: hash= 82 df 78 f0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 55 23 78 6b d1 b2 f4 84 29 a3 9f e9 4d 04 41 1c | Notify data 82 df 78 f0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #325 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #325: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #325 to 4294967295 after switching state | Message ID: IKE #325 skipping update_recv as MD is fake | Message ID: sent #325 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-73" #325: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.73:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #325) | cc 62 92 c7 07 e9 0f 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 78 1e 62 84 10 5f b3 3f 6a 1c 99 15 ef b2 82 | ab 2f bf af 7d 91 0a 7a 06 0b c3 b0 8f 52 23 e0 | 2a 6c c7 c4 de c8 66 7c 42 9d 81 5e 4d 92 4f 0b | 2b a2 91 3c a6 4c 27 12 5d 3b 8e 56 27 02 38 a0 | d6 c6 eb ec 94 e3 d3 7c 60 71 44 03 de ee 1c 20 | b0 a7 fc d5 f0 33 3d 58 40 9a 40 7c 4b ef 22 f2 | e4 98 7c df 9e 84 f0 00 c2 3a 23 ca 54 c0 d4 32 | 78 ec 09 e7 04 f1 06 b2 16 5d 5c 32 c7 62 b8 41 | 9e c8 62 f4 94 dc ed 85 b6 72 ee e7 73 a0 4e 8f | 20 26 e2 05 be 3a 4e 16 75 b9 60 31 64 9c 09 14 | ad be c7 c8 b5 48 83 aa 5c 33 7b 3c 0a 72 26 74 | 75 7b 8e 60 49 df aa 10 6d 2e c8 c2 08 b3 b5 75 | e0 b2 66 ad ea 56 f8 5f 65 d4 40 09 52 2c f1 dd | 08 91 8c 9a aa bf 76 e2 bf e4 1a 3b 53 96 c1 d8 | e5 63 67 aa b1 58 7e 5f 20 cf 8d 72 df da b4 0e | bf a9 5c cc d8 b0 81 7f 8f b4 f2 bf dd 09 8c 23 | 29 00 00 24 bd d5 db 94 ee 32 26 3b fc 5c d2 c6 | e1 33 da da 8c 36 b9 7d d8 b6 53 e3 83 8c 71 5a | ae 9b 26 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 04 08 e6 80 0c ed de 4c 99 bb 24 | eb 89 b5 9f d3 24 a6 8a 00 00 00 1c 00 00 40 05 | 55 23 78 6b d1 b2 f4 84 29 a3 9f e9 4d 04 41 1c | 82 df 78 f0 | state #325 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb360012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36000d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #325 | libevent_malloc: new ptr-libevent@0x7fb384015370 size 128 | #325 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49670.582407 | resume sending helper answer for #325 suppresed complete_v2_state_transition() and stole MD | #325 spent 0.347 milliseconds in resume sending helper answer | stop processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c01a4e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 62 92 c7 07 e9 0f 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #325 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #325 | rejected packet: | cc 62 92 c7 07 e9 0f 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 49 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #325: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0404 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b09380 | handling event EVENT_RETRANSMIT for parent state #310 | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #310 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #310 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49670.600589; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001839 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc00 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #310 | libevent_malloc: new ptr-libevent@0x7fb37c01a4e0 size 128 "road-eastnet-nonat-58" #310: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #310) | 15 02 9e 6f d7 63 29 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 27 e5 1e b0 b8 71 be 19 22 95 4e cb bc fb 75 | e9 3b 56 69 33 4e 64 ad 57 4b 29 1e a9 e6 47 1a | 9f d6 c8 79 0e b5 d1 68 4e cf f5 82 76 ae 1c b5 | 09 2e f5 34 f0 f4 52 a3 a8 36 97 6c 75 c0 43 c4 | ee 87 0e 53 ff 09 f4 54 79 74 c0 ae 90 9a ff fd | 29 25 b3 6a e6 b5 58 cb 0a 34 f3 40 7a e1 f0 00 | e8 b9 84 74 bb 8e 47 15 eb 04 15 5e 50 5c 56 6d | 24 4e c6 f1 73 76 98 a0 94 06 1f 4b 61 2c fc 5d | a8 62 64 09 74 1c b7 15 e9 d3 bf 3e 82 77 60 84 | b7 ec 0f bd 1c 3b 5b 97 d2 ff 90 15 40 4c 65 b9 | 49 3d 03 bf e1 e0 85 d7 23 77 e3 10 9e 84 72 33 | 77 bf bf d8 fb 57 2c a9 b4 49 77 20 46 c0 0f 64 | 28 da 55 aa ac 53 17 bb 64 f6 fe 0e af c2 be 09 | 4d 7e 65 25 98 17 8d d6 a3 3b ed 10 34 62 66 3b | 5f 3c 43 cb 1e 2b fc 0b 3e c7 88 ef 40 72 0f 91 | 73 8c 1b 91 80 50 8f 7f 10 7c a8 7c cd 25 bb 09 | 29 00 00 24 8c b6 d4 9e 94 5a 53 1f e0 86 71 ae | 2a 48 4d 09 6b cb 2a d4 c0 d8 ae 06 c9 7c dd 47 | 64 97 96 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 0a e7 b4 3e 63 13 55 ea 18 77 04 | bd 77 d7 da 99 7b 63 27 00 00 00 1c 00 00 40 05 | 5c 4d 49 83 ef 78 da dd 25 a2 53 b8 0f 9a 33 7f | f6 be 51 b8 | libevent_free: release ptr-libevent@0x7fb37800f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b09380 | #310 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #298 | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #298 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #298 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49670.600725; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003093 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b09380 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #298 | libevent_malloc: new ptr-libevent@0x7fb37800f1a0 size 128 "road-eastnet-nonat-46" #298: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #298) | d5 0c ec bc d3 64 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 43 96 23 e5 3a d0 2d 36 cd 43 2d 58 c4 e0 92 a1 | ed 2d e1 4c 45 8b 42 ad 40 76 ab 67 60 92 c4 09 | 73 c4 c7 3c 9d 80 31 b9 bf b9 9e 64 35 e4 39 ba | 2f a8 59 fe 53 09 d8 e0 e9 88 59 30 e2 71 e6 be | 2d 69 bc 6a a7 6e 4f db 2a 6a 88 01 9f d2 1a 54 | 9b 70 8c b4 c5 37 d0 1b eb c3 58 21 ce 79 a3 ff | 4e 1b 84 aa 1e 08 dd 9d 9d 58 7a ba b0 dd 2d 38 | 9e da 29 29 b5 fb 28 78 05 fa 3a 26 c0 d3 4c cf | 22 22 af c7 f1 d8 11 18 01 e3 41 10 fc 1b c9 38 | 58 6b be 13 fa e2 38 5b 8d 00 15 50 84 fd a8 e0 | 20 22 31 ab 99 61 d4 85 a8 6c 2e d8 1f e4 26 c0 | 25 17 38 c7 a5 82 30 0d e2 85 f0 d0 e0 3a 59 87 | 67 7b 0d e4 52 7b 6c 35 93 c6 f4 61 2c 32 e9 62 | b8 57 d1 59 0b 7c af 14 d1 9d bb 91 61 85 75 09 | ed c6 43 19 bf 09 f8 e4 92 e6 1f f3 47 e1 6e 0a | 5a 69 40 30 db b0 00 24 c2 61 94 a9 30 49 e7 0e | 29 00 00 24 4c 0e e1 06 42 9e 4c 74 3b 65 ba d4 | bc 56 1a 69 be b4 c7 ec 29 68 0f 7e 31 97 81 70 | 75 a5 f0 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 96 a5 ca 09 14 9d 81 34 51 5c 38 | 06 b0 7e 03 d4 af 12 47 00 00 00 1c 00 00 40 05 | 1b 14 fa aa 2e 1c b4 a7 92 80 67 79 37 9e 5c 02 | 1f 84 46 7d | libevent_free: release ptr-libevent@0x7fb364045e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | #298 spent 0.0674 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 02 9e 6f d7 63 29 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #310 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #310 | rejected packet: | 15 02 9e 6f d7 63 29 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #310: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 0c ec bc d3 64 84 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #298 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #298 | rejected packet: | d5 0c ec bc d3 64 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #298: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ed00 | handling event EVENT_RETRANSMIT for parent state #318 | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #318 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #318 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49670.609008; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501195 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #318 | libevent_malloc: new ptr-libevent@0x7fb364045e60 size 128 "road-eastnet-nonat-66" #318: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #318) | b2 9a b8 bc 53 a3 28 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 a5 e6 b7 f3 09 b3 42 4d 70 2a 31 41 4a a2 a1 | da f8 c5 36 7a f2 dc 2d e7 30 c8 c3 07 0a c2 47 | 04 c4 b8 ae 57 b2 7f d1 c1 3e 18 53 e1 5d 14 23 | 04 61 06 e4 91 ef 35 cb ed 7a b9 57 a4 d9 68 76 | fa fd da 0f 58 44 d0 fa 3e 4e 2b ac ca 5d a5 c8 | 76 05 a5 5d 02 6a 96 c6 41 4e 3f 64 57 cd 41 d5 | d0 97 ad ff 58 6a 53 9a 01 1f 6b 3c 24 fe 31 ac | 0d 3c 93 ac 2c da 29 01 1d c2 dd be c2 11 80 ff | b5 b8 9d 4b 81 9c 72 55 6a 84 69 3f d0 ed e9 0c | 2b e3 ca 41 a3 62 7c a2 71 2a 37 58 65 17 c1 53 | cd 34 43 97 e4 05 81 70 70 41 b7 fe ed 43 15 27 | b6 ca b7 9c 9b 05 11 e5 9d 9d 78 a9 d5 63 3e b9 | 63 ef dc 73 f8 b5 32 8d f5 20 3c b0 29 8a 0d 0c | 3e 9f 40 29 07 45 7e 5f 6e e1 39 0d cb 64 2d c9 | 21 f3 18 88 11 a7 78 9d e5 c3 5e 82 9b 66 98 d0 | bb 21 5b 84 f3 89 c9 aa 9f 01 2e d6 67 59 8b 4c | 29 00 00 24 ef 94 98 d7 0c cd d4 f9 7f 97 bf da | 65 7b fd be ba 01 e1 85 cc 2b 5d 20 cf d0 d6 ef | 60 90 51 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 61 27 ec f1 41 a3 45 56 13 d5 ea | 91 6f ea fa 23 e5 f5 e5 00 00 00 1c 00 00 40 05 | d1 cc 61 18 e0 64 68 30 f0 cc 90 9d 95 49 27 67 | 23 d5 d1 7a | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ed00 | #318 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 9a b8 bc 53 a3 28 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #318 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #318 | rejected packet: | b2 9a b8 bc 53 a3 28 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #318: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #74 | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #74 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #74 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49670.648344; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007028 exceeds limit? YES "road-eastnet-nonat-74" #74: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-74" #74: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #326 at 0x557d46a38490 | State DB: adding IKEv2 state #326 in UNDEFINED | pstats #326 ikev2.ike started | Message ID: init #326: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #326: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #326; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-74" #326: initiating v2 parent SA to replace #74 | using existing local IKE proposals for connection road-eastnet-nonat-74 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 326 for state #326 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7ed00 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #326 | libevent_malloc: new ptr-libevent@0x7fb38400a240 size 128 | #326 spent 0.0683 milliseconds in ikev2_parent_outI1() | RESET processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #74 ikev2.ike failed too-many-retransmits | pstats #74 ikev2.ike deleted too-many-retransmits | crypto helper 14 resuming | crypto helper 14 starting work-order 326 for state #326 | #74 spent 2.38 milliseconds in total | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 326 | [RE]START processing: state #74 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-74" #74: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #74: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #74 "road-eastnet-nonat-74" #74: deleting IKE SA for connection 'road-eastnet-nonat-74' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-74' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-74 | State DB: deleting IKEv2 state #74 in PARENT_I1 | parent state #74: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #74 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3600251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | in statetime_stop() and could not find #74 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-74 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 326 time elapsed 0.000857 seconds | (#326) spent 0.904 milliseconds in crypto helper computing work-order 326: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 326 for state #326 to event queue | scheduling resume sending helper answer for #326 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 | start processing: connection "road-eastnet-nonat-74" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-74' +POLICY_UP | crypto helper 14 waiting (nothing to do) | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-74" | stop processing: connection "road-eastnet-nonat-74" (in initiate_a_connection() at initiate.c:349) | spent 0.0796 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #326 | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 326 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #326 | **emit ISAKMP Message: | initiator cookie: | 42 f4 17 bf 0b bc 36 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-74 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 05 f1 42 33 74 d0 fe 82 a0 d4 22 fd 7e 34 64 49 | ikev2 g^x 4d f5 d3 8f 3e 37 b5 af 12 9f 05 ef b3 72 9a 99 | ikev2 g^x 78 df 2d 2f c1 8c de 77 86 8e 9d 6b 67 d9 af af | ikev2 g^x ad cd b2 74 66 27 67 e3 45 6f da e1 b8 1d 10 12 | ikev2 g^x aa 54 5a 52 9a fc e0 30 8f 8b 79 31 12 59 11 92 | ikev2 g^x 5a a1 07 c2 c4 b1 d0 f4 f9 0f 04 f7 fe f9 b1 b9 | ikev2 g^x c8 5b 99 45 a3 87 06 f5 cc 08 82 18 bb f1 79 c6 | ikev2 g^x 9f 6d fc 2f c8 a5 4a bb b2 a8 2f 54 59 10 ab c2 | ikev2 g^x 83 cd 07 a2 e9 49 2a 19 10 9b b3 c3 b9 59 af 8a | ikev2 g^x 82 ad ef ed 34 d0 18 f1 8e 6d d9 f9 1b 1e 64 1d | ikev2 g^x ec 20 a9 3c a9 39 c4 6f 5c 5b 8b c5 2f aa 09 df | ikev2 g^x 17 b3 bf d7 16 36 cf cd 3e 0b 96 b5 5a 10 91 84 | ikev2 g^x f4 f3 63 75 93 27 25 04 41 5d c2 9e 4a 8a 6e e8 | ikev2 g^x b0 1c 23 7f 1d 44 0d 90 e6 7c 9c aa 0e b4 1e 03 | ikev2 g^x 9a ca 50 45 b0 6c ee 84 fe cf 35 d4 8b f6 71 45 | ikev2 g^x c0 43 28 23 ec 38 bc a8 e6 b5 85 28 d9 a1 fe 85 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f7 60 f4 89 79 23 81 74 40 fe e0 94 99 4a 8a 5f | IKEv2 nonce b0 ba 18 0a 74 b7 e9 e4 4c 15 74 6f 38 fd 32 8c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 42 f4 17 bf 0b bc 36 de | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4a | natd_hash: port= 01 f4 | natd_hash: hash= 29 0a 23 00 01 aa ce 92 9c 9e 81 0a b1 b8 dc a9 | natd_hash: hash= c7 b7 f1 4a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 29 0a 23 00 01 aa ce 92 9c 9e 81 0a b1 b8 dc a9 | Notify data c7 b7 f1 4a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 42 f4 17 bf 0b bc 36 de | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 06 aa ce 4d 77 27 34 16 db f8 8e b3 38 da ae 93 | natd_hash: hash= 3f 43 ba fe | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 06 aa ce 4d 77 27 34 16 db f8 8e b3 38 da ae 93 | Notify data 3f 43 ba fe | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #326 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #326: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #326 to 4294967295 after switching state | Message ID: IKE #326 skipping update_recv as MD is fake | Message ID: sent #326 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-74" #326: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.74:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #326) | 42 f4 17 bf 0b bc 36 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 f1 42 33 74 d0 fe 82 a0 d4 22 fd 7e 34 64 49 | 4d f5 d3 8f 3e 37 b5 af 12 9f 05 ef b3 72 9a 99 | 78 df 2d 2f c1 8c de 77 86 8e 9d 6b 67 d9 af af | ad cd b2 74 66 27 67 e3 45 6f da e1 b8 1d 10 12 | aa 54 5a 52 9a fc e0 30 8f 8b 79 31 12 59 11 92 | 5a a1 07 c2 c4 b1 d0 f4 f9 0f 04 f7 fe f9 b1 b9 | c8 5b 99 45 a3 87 06 f5 cc 08 82 18 bb f1 79 c6 | 9f 6d fc 2f c8 a5 4a bb b2 a8 2f 54 59 10 ab c2 | 83 cd 07 a2 e9 49 2a 19 10 9b b3 c3 b9 59 af 8a | 82 ad ef ed 34 d0 18 f1 8e 6d d9 f9 1b 1e 64 1d | ec 20 a9 3c a9 39 c4 6f 5c 5b 8b c5 2f aa 09 df | 17 b3 bf d7 16 36 cf cd 3e 0b 96 b5 5a 10 91 84 | f4 f3 63 75 93 27 25 04 41 5d c2 9e 4a 8a 6e e8 | b0 1c 23 7f 1d 44 0d 90 e6 7c 9c aa 0e b4 1e 03 | 9a ca 50 45 b0 6c ee 84 fe cf 35 d4 8b f6 71 45 | c0 43 28 23 ec 38 bc a8 e6 b5 85 28 d9 a1 fe 85 | 29 00 00 24 f7 60 f4 89 79 23 81 74 40 fe e0 94 | 99 4a 8a 5f b0 ba 18 0a 74 b7 e9 e4 4c 15 74 6f | 38 fd 32 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 0a 23 00 01 aa ce 92 9c 9e 81 0a | b1 b8 dc a9 c7 b7 f1 4a 00 00 00 1c 00 00 40 05 | 06 aa ce 4d 77 27 34 16 db f8 8e b3 38 da ae 93 | 3f 43 ba fe | state #326 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38400a240 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7ed00 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #326 | libevent_malloc: new ptr-libevent@0x7fb3600251c0 size 128 | #326 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49670.649803 | resume sending helper answer for #326 suppresed complete_v2_state_transition() and stole MD | #326 spent 0.319 milliseconds in resume sending helper answer | stop processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37001d920 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 f4 17 bf 0b bc 36 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #326 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #326 | rejected packet: | 42 f4 17 bf 0b bc 36 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4a fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #326: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #273 | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #273 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #273 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49670.659995; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00504 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350012bf0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #273 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 "road-eastnet-nonat-21" #273: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #273) | ed 1f ad f4 73 76 3f ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad fb 2c d6 61 18 78 ff ff 9e ac 8e 11 6e 5b 0a | 17 90 d5 cd a5 72 c6 44 33 06 36 88 ef 85 f7 fd | d1 32 bf e5 b4 df 1c 2a 44 4b 64 5a 5c fa a6 e7 | a7 88 cd 98 18 db 83 1c de 12 34 1a 01 c0 6e 90 | b0 37 b6 8e 3f bc 29 ae 17 56 d9 4e 3e aa f9 1a | 05 22 37 90 a3 98 0c 9d fd 31 f5 89 2b 79 38 70 | a3 3c e3 a6 be b6 20 06 92 92 77 84 f9 e1 f6 43 | 50 c4 75 3f ce 2c 7f a3 83 07 1e 29 12 48 86 d5 | b6 e2 61 df c8 2b 9c ea 45 c9 6b 62 38 f9 06 23 | 9b a2 90 c4 51 19 47 e4 c9 9e bb 38 c5 ea 4c 2c | 24 15 a0 60 6e 12 c1 7a cd 75 9f 6a 97 65 4f 9f | 6f aa 7c 8b b3 99 29 be 41 56 ad 5d 52 77 c8 87 | f1 18 76 ec 44 be fb bf 14 5e 22 ec 7b 78 cb 22 | 16 62 54 b4 5f 5e ed e0 38 14 64 69 82 ec fb 0f | 84 be 3a 69 27 17 b5 b0 42 81 a7 3b e2 19 f7 47 | ac 1d 3d ca 8c d0 ae cf 0d f7 a8 a2 36 9e 94 83 | 29 00 00 24 a4 16 d5 7c 26 cc bd 52 fc 33 91 77 | f2 08 cb df 04 12 5c f5 f3 31 f7 87 08 22 5b ef | 2b 8c 5b 44 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 3d 78 9d 41 51 b9 57 ea 0d 4a 5f | 38 c6 cb 30 ec f2 21 4b 00 00 00 1c 00 00 40 05 | bd ec 33 2a 1b 35 fa ad 7a ef 73 f7 d9 b0 09 33 | b4 e9 3f 2e | libevent_free: release ptr-libevent@0x7fb33803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #273 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 1f ad f4 73 76 3f ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #273 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #273 | rejected packet: | ed 1f ad f4 73 76 3f ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #273: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd40 | handling event EVENT_RETRANSMIT for parent state #311 | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #311 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #311 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49670.666297; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001526 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #311 | libevent_malloc: new ptr-libevent@0x7fb33803b0b0 size 128 "road-eastnet-nonat-59" #311: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #311) | 44 99 87 40 ba 63 67 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 f7 3b 73 41 b9 88 7a e8 c9 5c 33 15 fe 59 eb | fc 54 1c 32 28 ad 56 eb 34 ed 9a d7 b7 26 48 b1 | 97 4e 59 ed 4f 99 cd e8 e6 27 80 3f 35 da 0c a7 | 23 d8 2f 5d 19 c3 94 0e 09 96 31 23 4d f5 99 7a | 2e 77 d3 1f 35 48 ef 9d e1 61 1a 11 39 f8 6e ce | 65 2d d0 de 38 b4 23 52 6e 45 44 65 4d 7b bd c8 | 41 7e 01 a8 b3 39 9f a8 ee a5 53 dc 50 9b 94 2b | 69 df 03 ec 5d 36 9f 33 dc 3d 9c 7a 93 11 41 9c | 33 38 19 c9 cf 1a a3 f8 96 ca d4 d9 26 62 88 91 | 39 58 69 eb 93 1e 87 6a d7 64 14 8d 9c 37 19 fa | c6 b6 78 0e bc 5c f3 4b 97 bf 56 93 52 5a ea e8 | e0 ac be 1b 36 a8 31 6f 20 82 12 c0 13 79 34 1d | 86 03 61 75 0c 12 25 55 a8 61 36 78 64 d8 d0 e0 | d9 d2 a7 01 7f 00 fd 1f 2e 03 76 1e 96 2c 85 64 | f8 86 44 8c a4 8a 04 3f e3 a8 0c 90 29 b2 ad bc | e2 32 ac c2 2b f4 81 23 cf 52 ee cf c4 e3 9c c7 | 29 00 00 24 d3 df f6 74 46 9e 11 7f ae 1b 7e 22 | a8 9e 39 ab f7 77 2a 20 6e a6 c0 c3 6f 0b 0c 6a | a5 08 b1 f9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c b5 fb 2f 48 22 68 cf e1 a0 a0 6d | 16 65 fc 12 3f 30 cc 2d 00 00 00 1c 00 00 40 05 | 5f ba 06 b7 b7 74 50 87 e6 7e 19 f6 51 18 f6 57 | 2a d1 11 81 | libevent_free: release ptr-libevent@0x7fb364014bc0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd40 | #311 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 99 87 40 ba 63 67 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #311 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #311 | rejected packet: | 44 99 87 40 ba 63 67 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #311: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abfd80 | handling event EVENT_RETRANSMIT for parent state #299 | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #299 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #299 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49670.668572; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002166 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd40 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #299 | libevent_malloc: new ptr-libevent@0x7fb364014bc0 size 128 "road-eastnet-nonat-47" #299: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #299) | 63 02 bb 51 d9 8c b0 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 17 e8 1c e0 c7 4f 03 2d a7 55 c0 45 bf a2 96 | 6a 0c 0e 0f 3f cb a5 f2 68 03 39 51 c2 b3 0b 30 | 79 44 b0 72 39 7b b4 0b c0 9d 43 f1 cf 9c ab 76 | 17 9c 76 41 f4 97 6b 3d 79 c7 93 3a b0 36 40 75 | 1d 60 59 8c 82 e2 c7 85 c2 1c 97 4a 38 8b 6e ad | 3e 5a 0d 04 9e 51 30 61 82 af ed 37 96 e2 b6 a0 | 3b c4 41 66 ee 44 1e e7 39 9f 7c 2f f5 f2 ff 4b | 36 a8 c8 29 8b eb d2 55 7f fb 10 9c ec 8c 08 d0 | 39 05 1c 07 ac 20 cb cb a4 7c 61 41 78 60 13 d3 | dd a5 39 38 ad f1 86 ff 6a 3c d0 2d b1 eb 7c 82 | 79 91 1f 2f 55 9c db 4d e2 10 be 62 dd e3 5a 7a | 61 63 85 0c fd 8f b4 af 97 73 ef e2 1b 21 c4 96 | e5 df 1b 56 fa 11 08 d6 95 8d 53 f4 13 64 3d 3d | 98 8c 38 c7 52 64 1a 00 95 89 f1 a3 72 e2 fe 87 | 05 b1 bc 3a 2d 8d ca c2 67 8a 86 e8 36 ce a6 73 | 08 10 ff 3d c7 41 a4 c0 53 af 83 9f b4 ac d3 a6 | 29 00 00 24 7e 5d f1 77 88 98 7f 63 50 07 d0 59 | cc bb c0 62 cd 9c cc f3 5d 35 d8 78 d2 ee b4 01 | aa b2 27 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 b5 ac f1 52 82 e1 6d 65 51 7c e0 | ef a0 91 c6 07 cf fb 64 00 00 00 1c 00 00 40 05 | 8f da 92 7d 7b 47 83 cb 10 aa f2 ca 2c a8 73 ac | 13 99 82 ed | libevent_free: release ptr-libevent@0x7fb36402a780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abfd80 | #299 spent 0.0867 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 02 bb 51 d9 8c b0 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #299 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #299 | rejected packet: | 63 02 bb 51 d9 8c b0 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #299: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0399 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1c450 | handling event EVENT_RETRANSMIT for parent state #319 | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #319 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #319 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49670.670832; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501354 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abfd80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #319 | libevent_malloc: new ptr-libevent@0x7fb36402a780 size 128 "road-eastnet-nonat-67" #319: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #319) | 11 2f c2 e2 55 80 ad fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 29 97 2b 00 80 7a b2 ce 19 1b 94 79 57 61 71 | b5 31 67 66 2a f4 c8 dd 15 9f e0 ad 50 a1 3c 77 | 34 62 bd 4c c6 67 73 04 6a 47 e6 12 64 23 d5 1b | 98 65 2d 83 00 df 2d e7 e4 d4 74 c8 bc 36 30 29 | 44 5a 01 b4 02 e1 00 0f 8d ad 81 f9 8e 46 de 85 | 06 c3 07 15 fc b6 b0 15 06 43 f6 0e a8 fd 09 ef | d8 40 6e 21 d5 b3 5d 25 10 a6 87 71 c1 c1 fe d8 | bf 80 48 df 26 2b e7 63 6d 12 1e cf 0b 06 eb b0 | 7e 3e d5 d0 6b 21 8d aa 41 e8 f8 30 37 35 ac fc | 15 96 69 e5 f5 b2 90 e3 4e fe 2d ad 13 5f a0 e8 | 1c c7 69 35 1d b3 4c 80 f6 b9 3c 2d 05 13 72 b5 | 7e a3 0f 53 4b 80 32 e8 c3 5e b7 f7 2e ae 6c 5b | 24 7a c5 8a 0a 7f 55 0a 11 24 c0 ef fe 17 1d 30 | 05 8e ac 66 5c 3e f2 80 08 7e 41 35 dd 7a 17 b5 | ec 43 f0 d8 c9 61 5b 46 04 99 f3 93 60 24 02 4a | 51 18 18 5f 6c cb 3e f9 d1 40 eb 27 ba 67 3b b9 | 29 00 00 24 b8 88 60 8f 24 78 87 d6 7e a3 09 04 | de 05 ae 45 4d b7 3b ca 2f 96 5c 9a fa 13 da 85 | a2 c0 a1 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 04 44 46 25 45 86 78 cb ac b2 11 | 55 71 47 06 ea 13 d1 6f 00 00 00 1c 00 00 40 05 | 2f 9a c9 00 f1 11 a0 f7 d7 69 9d e9 ea e6 fc 70 | 38 db 7b 3a | libevent_free: release ptr-libevent@0x7fb34000f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c450 | #319 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 2f c2 e2 55 80 ad fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #319 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #319 | rejected packet: | 11 2f c2 e2 55 80 ad fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #319: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0392 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34002a950 | handling event EVENT_RETRANSMIT for parent state #312 | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #312 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #312 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49670.729144; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002069 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c450 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #312 | libevent_malloc: new ptr-libevent@0x7fb34000f1a0 size 128 "road-eastnet-nonat-60" #312: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #312) | 89 42 ee d6 ed 2c a4 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 05 0b 71 54 f5 39 16 26 4c a4 39 04 60 1d 97 | 32 ea c2 30 7f b7 8f 8f 4c 46 3c 6f 52 78 aa c1 | fe e4 77 56 f7 3d d3 8d a6 3a 6f c0 2f fe 6d 02 | eb 98 53 91 b0 a7 62 d0 2e 39 52 a2 2d 9f c5 cb | d2 4b 17 0a 6d 76 74 95 b8 fd f2 4d e7 0c cf 15 | 80 f8 47 f1 16 09 01 ed b3 3a 4f 5c d5 5d 3f 6b | 2f e7 b7 4c e0 6d 6e 67 ff dd 71 47 c8 a4 15 9f | 96 98 1b 13 12 cd c9 a7 cd 82 0e 52 4d 94 b9 96 | db fe 30 4f c9 88 5e 66 97 62 f6 22 94 b7 f8 62 | 1f 97 fa 33 08 02 4b f8 35 6a 66 b6 ae 14 f2 38 | 8b d8 d1 fe 0f da d0 63 b9 64 d3 f1 12 68 13 10 | 0c 76 c3 e9 8c 5d 20 14 45 21 bc 02 62 c8 67 36 | a7 1a 3b 3f d4 a6 2b 0f 1f 20 68 bf 3f f3 da ac | 9d d4 0b a5 4f 9d 4e ee 5d 8a c9 7f a6 63 bd 37 | e4 30 f8 16 a7 79 23 99 5e 45 08 d2 1b c1 59 79 | b3 06 e4 a7 4d 24 33 20 1d ab d6 f6 ee 90 2f 69 | 29 00 00 24 c3 f8 28 4c 1a 7b 0f cd eb 3b df c6 | 33 a5 52 0e 9f e3 e0 c7 7b e0 4f ee 68 74 73 39 | ce 71 25 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 69 21 0b 86 be 66 6f de 2b 5e fc | 58 12 49 3c b2 b4 50 5a 00 00 00 1c 00 00 40 05 | 50 02 4b 6b 30 95 cf bb e1 65 ad fe fd e1 44 d3 | d9 2c f8 74 | libevent_free: release ptr-libevent@0x7fb340008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34002a950 | #312 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 42 ee d6 ed 2c a4 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #312 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #312 | rejected packet: | 89 42 ee d6 ed 2c a4 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #312: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #274 | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #274 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #274 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49670.743435; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00323 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34002a950 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #274 | libevent_malloc: new ptr-libevent@0x7fb340008e30 size 128 "road-eastnet-nonat-22" #274: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #274) | 97 f1 23 53 d2 3b 4d 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 bf aa 44 4c 86 42 20 d8 9e 9a 10 8c 03 23 1c | 55 12 c5 05 17 54 35 db 09 ea 86 4f 1e 8f 7b 32 | 9a 2a b0 4c f2 e7 18 73 a1 a0 fd e2 40 07 2c 7c | b0 86 fe c9 c0 0a 24 ee 0b e2 8f 65 27 f4 ce d4 | 26 d0 8a 70 5c 4d 46 36 4c d7 e9 bc 9b 95 2b 48 | 94 a5 c8 98 b4 23 f8 e0 8f 7c 6d 1d 50 c7 fe 04 | 1c ce 6b 59 2b ed cf 4a 5b 4f 67 9e cc 11 c0 53 | 7c 50 d5 3e bd 07 f0 e3 56 2a 0b ae b3 c0 99 43 | bb 92 8e 39 19 7e 1e c2 71 84 a0 76 9a 0f 7a 85 | 50 cf 0d 7d 85 0a 08 cc ee a1 bd c3 88 dd 8a de | e2 9f 70 d5 bb 76 44 f0 e2 0f 12 4d ae 88 a5 a4 | 51 38 bf fa 0f 38 f4 4c bb e3 25 bf 62 88 5c 87 | e1 a2 de e1 56 a5 9f 6b ce 90 dc 86 6d 26 32 32 | 64 ae 0b ac fa 3a f6 9e fa 00 00 26 02 a9 70 2e | af 79 3d a8 07 0b 81 d4 53 f3 46 fc 05 11 f6 55 | 0d 1d 8f a8 e0 93 58 07 b0 a8 c9 54 c5 14 a2 da | 29 00 00 24 59 ef 9f ca 6d 42 ee 4c de 0a 4a 8e | ec df b4 6b 0d dd 66 fa b2 ad 6d 66 92 77 f9 cb | 4b 49 7a f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8d 80 80 1b 6e 73 7e e3 fb 20 6a a8 | f2 02 f1 bf e6 58 62 ac 00 00 00 1c 00 00 40 05 | 31 9f 40 90 8f 0e 1c 6e 4b 7e bf d8 97 47 82 19 | e1 cf 25 c8 | libevent_free: release ptr-libevent@0x7fb3540300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #274 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 f1 23 53 d2 3b 4d 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #274 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #274 | rejected packet: | 97 f1 23 53 d2 3b 4d 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #274: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a15810 | handling event EVENT_RETRANSMIT for parent state #300 | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #300 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #300 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49670.746742; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002648 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #300 | libevent_malloc: new ptr-libevent@0x7fb3540300e0 size 128 "road-eastnet-nonat-48" #300: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #300) | 5a 7e ff 7d 11 39 dd fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 d7 07 3e b9 b2 ed 0a cc c5 e4 47 ac fb df bc | 0b 82 8a 56 1b e7 c2 b9 79 67 f6 05 c1 b0 1a 41 | e0 93 9f 0d bb 5b 76 5f ac 5e ea 5e 58 49 c4 c3 | 9b f8 0e 2d 48 75 fe 88 ae 81 6e bd fc ad 1e 40 | 65 b9 12 2a 8f 3a b5 a4 e3 d6 7e 50 9a b3 12 10 | be 2b 79 8f 29 34 8f 0b 99 4e 4e 7a 4b 49 42 b4 | 04 b2 ac fc ac a3 5a 98 37 17 c3 a2 f0 f0 c9 79 | df 28 17 de 36 02 c0 b4 1b f3 2c 9d ad d8 f6 f4 | c9 44 36 2c 9a 21 d9 68 8c 86 58 41 ae 59 e7 74 | 88 a3 d3 f6 a3 ef 04 07 90 c9 82 f0 a7 49 d9 a4 | 83 0f b0 90 08 f3 eb 02 f4 ec 40 8a 98 92 d5 38 | 7d db 73 c5 6a 66 84 84 0b 3e ba 92 37 b8 31 bd | 61 f6 57 d8 cd fd ab d5 b0 51 b6 0b 3f 5e a3 a5 | 0b 5e 9e c6 f9 0e 39 09 62 b7 fe 88 e1 1e 94 68 | 7e ba 69 87 7e ff 7f 13 a8 f4 7a 0a b2 7e 1c 3c | 9c 70 0e 6e a8 6f 4b 28 4f f5 1d ce 10 46 27 eb | 29 00 00 24 db d2 83 de 45 20 a2 89 40 10 d1 ad | 44 17 5c 15 2b 8f 9e 84 0d 1b 42 0f a9 75 90 ef | 32 25 81 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 9c e3 05 f1 a6 88 c9 89 5f 4a 78 | 8b 60 50 45 77 4b 7a a3 00 00 00 1c 00 00 40 05 | 2b d5 a3 e8 51 d4 0b 1b d6 4d 4a ff ba 69 1c 93 | 2c 16 fd 8b | libevent_free: release ptr-libevent@0x7fb35804b970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a15810 | #300 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 7e ff 7d 11 39 dd fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #300 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #300 | rejected packet: | 5a 7e ff 7d 11 39 dd fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #300: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aeb500 | handling event EVENT_RETRANSMIT for parent state #320 | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #320 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #320 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49670.767046; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501266 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a15810 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #320 | libevent_malloc: new ptr-libevent@0x7fb35804b970 size 128 "road-eastnet-nonat-68" #320: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #320) | af c7 ee c1 89 d6 03 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 a8 bd a9 e5 4d 48 c1 fb 45 8d 11 bf a7 3a cc | c9 47 84 c7 e3 5d ec 21 4e d8 5a af 98 89 03 e4 | 61 3a ba 3d 60 86 ef 6f 17 de fb a4 db d7 d8 bb | dd a1 22 38 5e f6 ed 84 ef 59 30 63 60 c1 46 9c | 68 55 6e 9a 1e c0 57 7e 80 7e b6 a3 a2 d8 44 32 | cf 08 62 90 01 f4 f2 5f ed 1f e9 b3 6d aa b3 b5 | 51 0c 08 36 0d 22 74 67 a6 8c ed a0 79 50 51 2d | 0e 2f 3b 92 1e b3 eb 2d 06 7f 88 16 e6 58 28 17 | 60 5d c5 e1 99 65 2e 54 d8 fa ea 82 20 22 7c ff | b3 f5 72 25 7c 83 b1 cd 19 3e 2b da bc a9 3d dd | 76 aa 4a e2 d6 6a 5a 1c c6 a7 82 72 c8 70 00 2c | 36 b2 a4 f0 ac d5 1d 56 89 f2 8b 82 16 da 4e a9 | 45 8b f2 f1 83 02 06 ed 82 d4 33 ad 52 79 3a 05 | a1 a9 14 4d f9 86 6b dc 84 e1 88 2a d3 ae c1 8c | 43 6f 17 24 1b 1e 6c e9 e7 e2 8e 7a 04 41 d1 b0 | a9 68 50 65 7f 85 77 b4 91 10 c3 80 9a 3e 62 10 | 29 00 00 24 2e 21 9d f9 af ba 04 f5 8f 3b a6 14 | 4e db f7 72 ee 4f db 92 91 3b 76 55 23 0e 1b ed | b4 de fd 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 21 4b df 59 d9 64 c3 0f dc d7 26 | ba 28 50 c6 3e 72 d7 ec 00 00 00 1c 00 00 40 05 | d3 cb a5 46 ac a7 4b 5d c8 de d7 e5 bf c8 e6 16 | 1f 0a fc 46 | libevent_free: release ptr-libevent@0x7fb3480407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aeb500 | #320 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af c7 ee c1 89 d6 03 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #320 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #320 | rejected packet: | af c7 ee c1 89 d6 03 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #320: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #75 | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #75 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #75 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49670.769327; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.012101 exceeds limit? YES "road-eastnet-nonat-75" #75: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-75" #75: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #327 at 0x557d46a39a50 | State DB: adding IKEv2 state #327 in UNDEFINED | pstats #327 ikev2.ike started | Message ID: init #327: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #327: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #327; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-75" #327: initiating v2 parent SA to replace #75 | using existing local IKE proposals for connection road-eastnet-nonat-75 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 327 for state #327 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aeb500 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #327 | libevent_malloc: new ptr-libevent@0x7fb3480407f0 size 128 | #327 spent 0.0697 milliseconds in ikev2_parent_outI1() | RESET processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 resuming | crypto helper 15 starting work-order 327 for state #327 | start processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #75 ikev2.ike failed too-many-retransmits | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 327 | pstats #75 ikev2.ike deleted too-many-retransmits | #75 spent 2.66 milliseconds in total | [RE]START processing: state #75 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-75" #75: deleting state (STATE_PARENT_I1) aged 64.014s and NOT sending notification | parent state #75: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #75 "road-eastnet-nonat-75" #75: deleting IKE SA for connection 'road-eastnet-nonat-75' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-75' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-75 | State DB: deleting IKEv2 state #75 in PARENT_I1 | parent state #75: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #75 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 327 time elapsed 0.00103 seconds | libevent_free: release ptr-libevent@0x7fb35c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | in statetime_stop() and could not find #75 | (#327) spent 1.01 milliseconds in crypto helper computing work-order 327: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 327 for state #327 to event queue | scheduling resume sending helper answer for #327 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb374017ce0 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 15 waiting (nothing to do) Initiating connection road-eastnet-nonat-75 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-75" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-75' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-75" | stop processing: connection "road-eastnet-nonat-75" (in initiate_a_connection() at initiate.c:349) | spent 0.0602 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #327 | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 327 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #327 | **emit ISAKMP Message: | initiator cookie: | cd 66 0f 9c 46 d2 2e 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-75 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6c e2 6e 06 8e ba 7b 55 21 d6 ce 48 6f 3c 92 70 | ikev2 g^x 71 57 bb 2e 59 88 d0 8e 2a d9 1e 8b 54 64 af 4b | ikev2 g^x 40 4b af e2 a4 54 08 ce 78 99 d3 6e a5 bc 7d 40 | ikev2 g^x 54 45 d2 55 e5 04 88 a7 28 8f 77 11 a3 33 32 44 | ikev2 g^x c5 c1 f3 8c 73 cd 33 50 64 6e 8a 4a 03 1a e8 56 | ikev2 g^x 33 98 cb 05 7e 52 cf 35 2c 3c 0a 01 ff ea e2 ad | ikev2 g^x d8 80 22 71 7e 19 d2 b8 ce 67 79 24 c4 a0 f8 77 | ikev2 g^x 85 18 5e ad 8e 04 46 41 75 9b 16 af 02 fc dc 64 | ikev2 g^x 32 2e 9e 96 8f b4 82 0b 80 7e 79 12 22 b3 48 72 | ikev2 g^x b8 08 60 6b fb b5 54 a6 fa 64 f2 f2 1c f2 68 fd | ikev2 g^x a8 f7 9c d6 a5 ea 11 63 c4 ae d6 34 f7 8d 1a 64 | ikev2 g^x d2 72 49 10 16 1e e2 1a 26 c5 f0 ec 34 31 4a 5b | ikev2 g^x 0b 2e 91 90 5e 8e 26 12 f7 2c b6 7b b5 af 3d cb | ikev2 g^x 78 d2 30 c7 9f 03 58 c5 3d 03 c3 8e 6e cf 73 42 | ikev2 g^x 63 93 37 70 63 fa 64 09 ea e3 9b 55 c3 1a f4 3d | ikev2 g^x f3 be ab 22 fa 6d f3 45 4a 46 ad d5 84 8a f0 a1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 90 b8 80 a5 9c 42 2b 50 2e f5 43 e6 dc 43 6d 4e | IKEv2 nonce b8 ec af ce 7f 78 f5 24 c5 c3 2d 65 bb f0 87 e5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cd 66 0f 9c 46 d2 2e 86 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4b | natd_hash: port= 01 f4 | natd_hash: hash= fc f4 a0 b4 bc 1c 55 2f e9 f9 68 07 2a e9 06 2c | natd_hash: hash= 8b 87 6b db | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fc f4 a0 b4 bc 1c 55 2f e9 f9 68 07 2a e9 06 2c | Notify data 8b 87 6b db | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cd 66 0f 9c 46 d2 2e 86 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f6 e0 64 05 d4 ed 34 7f 04 0a 65 5a 6b 64 eb 2c | natd_hash: hash= 7a ff a7 d3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f6 e0 64 05 d4 ed 34 7f 04 0a 65 5a 6b 64 eb 2c | Notify data 7a ff a7 d3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #327 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #327: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #327 to 4294967295 after switching state | Message ID: IKE #327 skipping update_recv as MD is fake | Message ID: sent #327 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-75" #327: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.75:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #327) | cd 66 0f 9c 46 d2 2e 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c e2 6e 06 8e ba 7b 55 21 d6 ce 48 6f 3c 92 70 | 71 57 bb 2e 59 88 d0 8e 2a d9 1e 8b 54 64 af 4b | 40 4b af e2 a4 54 08 ce 78 99 d3 6e a5 bc 7d 40 | 54 45 d2 55 e5 04 88 a7 28 8f 77 11 a3 33 32 44 | c5 c1 f3 8c 73 cd 33 50 64 6e 8a 4a 03 1a e8 56 | 33 98 cb 05 7e 52 cf 35 2c 3c 0a 01 ff ea e2 ad | d8 80 22 71 7e 19 d2 b8 ce 67 79 24 c4 a0 f8 77 | 85 18 5e ad 8e 04 46 41 75 9b 16 af 02 fc dc 64 | 32 2e 9e 96 8f b4 82 0b 80 7e 79 12 22 b3 48 72 | b8 08 60 6b fb b5 54 a6 fa 64 f2 f2 1c f2 68 fd | a8 f7 9c d6 a5 ea 11 63 c4 ae d6 34 f7 8d 1a 64 | d2 72 49 10 16 1e e2 1a 26 c5 f0 ec 34 31 4a 5b | 0b 2e 91 90 5e 8e 26 12 f7 2c b6 7b b5 af 3d cb | 78 d2 30 c7 9f 03 58 c5 3d 03 c3 8e 6e cf 73 42 | 63 93 37 70 63 fa 64 09 ea e3 9b 55 c3 1a f4 3d | f3 be ab 22 fa 6d f3 45 4a 46 ad d5 84 8a f0 a1 | 29 00 00 24 90 b8 80 a5 9c 42 2b 50 2e f5 43 e6 | dc 43 6d 4e b8 ec af ce 7f 78 f5 24 c5 c3 2d 65 | bb f0 87 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc f4 a0 b4 bc 1c 55 2f e9 f9 68 07 | 2a e9 06 2c 8b 87 6b db 00 00 00 1c 00 00 40 05 | f6 e0 64 05 d4 ed 34 7f 04 0a 65 5a 6b 64 eb 2c | 7a ff a7 d3 | state #327 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3480407f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aeb500 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #327 | libevent_malloc: new ptr-libevent@0x7fb35c01d920 size 128 | #327 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49670.770912 | resume sending helper answer for #327 suppresed complete_v2_state_transition() and stole MD | #327 spent 0.32 milliseconds in resume sending helper answer | stop processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb374017ce0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cd 66 0f 9c 46 d2 2e 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #327 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #327 | rejected packet: | cd 66 0f 9c 46 d2 2e 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #327: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368012bf0 | handling event EVENT_RETRANSMIT for parent state #313 | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #313 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #313 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49670.787078; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001715 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37400cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #313 | libevent_malloc: new ptr-libevent@0x7fb37c0407f0 size 128 "road-eastnet-nonat-61" #313: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #313) | 5f e0 5b 3a aa b2 0d 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 72 14 0f 17 54 5f cc c5 98 fb 35 26 a3 92 e2 | 11 a3 ad ea c4 71 33 c5 3b 09 0d 86 8a ef c9 16 | 41 6e 6e 33 c5 10 cc f1 5e 47 e9 ca 13 f8 ee 4f | 37 f9 0e ac 70 04 12 68 e2 ae b0 7b dd cb cb ab | d1 0b 9f 48 8f e3 3e b7 e3 65 ca 3d b0 79 98 5c | d4 18 e2 6e 8f 62 4a 4d 34 e2 ac f2 57 5e 56 f3 | 96 24 71 ed eb 39 5a 9f 4d 0a 51 e3 f2 80 2e 9c | c7 e3 0a d7 46 cd 62 d8 70 57 a4 15 e0 2e 57 82 | 00 9c 85 fc cc fb ec 67 7d 2f f7 de 8d 85 b7 9a | ae 6a 14 45 c8 4f c3 df 8d 60 30 87 57 0e a1 b0 | 8b bf f6 18 27 37 f1 3e 81 c1 ec 19 9b f6 db 06 | 57 00 87 5d ef 1f e5 81 9a 44 f2 c0 14 62 b9 b1 | a3 5a 63 7e 11 93 6f 2a 71 ae af 90 3a 04 4e 7a | a3 7a 98 c8 8a bb b2 5a a5 8c d5 d7 51 2b fa cf | d5 ea ac 65 e9 8c f9 24 80 81 e7 38 45 fd 2e f5 | 33 21 e2 b5 ea 65 8b be be 31 9f 87 b8 9f 6c 5b | 29 00 00 24 50 24 81 a9 b8 a1 9e c5 6d 65 2e b2 | 7c 32 12 aa 77 af 34 a7 17 a7 54 1f 7b 13 4b 11 | 43 e0 57 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e d7 79 da 83 ae 02 6d 20 64 f0 64 | 33 fe 2f 85 1b 7e 43 e4 00 00 00 1c 00 00 40 05 | bb f1 5c c9 25 91 06 ec a8 bd 6e 4b ab 50 48 3a | 1c ac 06 f7 | libevent_free: release ptr-libevent@0x7fb338014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368012bf0 | #313 spent 0.0989 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f e0 5b 3a aa b2 0d 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #313 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #313 | rejected packet: | 5f e0 5b 3a aa b2 0d 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #313: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a50110 | handling event EVENT_RETRANSMIT for parent state #301 | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #301 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #301 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49670.801331; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002628 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #301 | libevent_malloc: new ptr-libevent@0x7fb338014c70 size 128 "road-eastnet-nonat-49" #301: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #301) | 04 2d 84 e7 d7 11 c2 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 3c a0 2e 05 57 66 74 9e 59 04 02 1e 6b 82 64 | 24 cf 86 32 1b 49 63 31 85 6e 91 96 dd e7 a7 21 | 78 ee 5c 0c 83 da 97 1a 0c 46 69 7c d4 8f 0d 6c | 0b 43 52 49 09 9a 24 da 36 13 01 09 31 88 8b 5b | 38 73 77 00 83 94 ba bf 7c fa 22 16 ff 64 be 16 | 43 df 4f 1d b8 18 88 ee 83 b1 c9 32 ce 1f e3 0d | 40 e4 05 2a 7d 12 64 bf de 51 1d 4c d5 99 11 64 | 9a df 9d ae e7 e1 f9 df 89 9a 5f 11 f6 4b 39 47 | 36 de 08 ec a1 59 7b 84 9f e8 cd af ca a0 8a 29 | aa 2e 7e 1a 1d 88 43 74 5c 19 1a 8f 44 5f 83 95 | cc 00 d8 ee 8f cb 95 29 ae 58 5c 08 01 62 ea 7e | 97 e9 bf 6a 36 31 ba 2d 83 4b 4a ef ce 50 36 44 | 4f a8 a5 8e ad 2c 99 bd c1 01 08 ba ee 5e 1c 63 | 9e 50 96 b6 7a 6e 9f de cf c5 73 a0 7c d6 3d 3a | fe 11 5d 0f 1c cb 4b 02 b4 b1 f7 0c 56 bd a2 fe | d4 f1 da 5a fb cc f5 22 d5 c9 55 2b 49 27 7a 02 | 29 00 00 24 9d f4 32 14 da 15 0d 5d b3 86 88 1b | ed 98 fc e3 a3 7a 35 ba 87 aa 0c 85 93 07 0b 69 | 9d 37 a2 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 4c 33 35 25 dc 8b ec 4f 4f 50 86 | 6f 49 f3 b3 44 40 22 71 00 00 00 1c 00 00 40 05 | d2 03 8c 03 1f b3 ee 14 98 31 7f d2 44 da 50 e8 | 1a 08 5c 44 | libevent_free: release ptr-libevent@0x7fb37404b5c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a50110 | #301 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 2d 84 e7 d7 11 c2 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #301 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #301 | rejected packet: | 04 2d 84 e7 d7 11 c2 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #301: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0457 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a92f80 | handling event EVENT_RETRANSMIT for parent state #321 | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #321 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #321 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49670.826618; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500976 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a50110 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #321 | libevent_malloc: new ptr-libevent@0x7fb37404b5c0 size 128 "road-eastnet-nonat-69" #321: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #321) | 30 42 c0 64 91 b3 77 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 8b 42 a5 47 61 3e b2 88 66 b3 90 63 22 69 df | e5 f0 68 6a 3f ab 70 bf d6 bc a2 6d 32 d6 bf 56 | 13 cd ae 31 91 9e 97 07 b1 e6 67 da 49 fc 52 44 | f0 97 00 89 4b 4a 7b 7e 72 67 33 77 ed ad d5 60 | 7c 94 7a 09 a1 fe 2b 97 f4 03 f7 65 c2 4f 92 50 | 59 77 e9 77 52 e2 ba 0e f1 c5 36 f7 3f 04 ca 02 | 29 37 fe 9d b2 ee 90 bb 59 f2 25 82 19 bd 15 09 | 7c 21 90 62 70 4c 2f 35 e2 fa b0 32 14 28 ef f3 | f9 26 2a aa 23 e5 00 f2 ed fa 00 25 b3 8d 3e f4 | 4c e5 68 7e bb cf a5 93 21 96 34 22 9d cb 8e c0 | 2d 43 58 e0 8a b9 3b 2b d8 e6 50 0b 36 e9 8a 0b | 9a 7c fa 82 ee ac d3 9d dc ac fe e5 26 e8 d7 a8 | 41 71 b3 21 7a 08 ae 35 2b 19 02 a1 3c d8 d8 79 | 7f 1b 50 2d 1e 74 84 a4 f5 80 19 40 cb b4 59 fe | e2 eb 79 b4 b1 1d a9 7a b4 6e 10 85 42 85 5d e9 | 58 9c 43 c5 54 ce c4 20 7b 73 38 bf 59 44 4d 18 | 29 00 00 24 bf 17 ca 5e f8 c4 94 b8 0b 16 3e 38 | 6b 43 cf 92 04 d6 aa ac 11 4c 2e 2c d1 a0 dc 92 | 64 9e 7b 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 bc 1a f8 41 15 d9 99 65 b2 c4 f3 | df 03 a0 00 26 60 50 c2 00 00 00 1c 00 00 40 05 | fc 37 e7 42 82 1f 76 13 ad 5a b7 fc e2 af d4 9f | 15 d4 13 5b | libevent_free: release ptr-libevent@0x7fb34c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f80 | #321 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 42 c0 64 91 b3 77 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #321 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #321 | rejected packet: | 30 42 c0 64 91 b3 77 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #321: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0457 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c7c0 | handling event EVENT_RETRANSMIT for parent state #275 | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #275 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #275 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49670.833891; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003376 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #275 | libevent_malloc: new ptr-libevent@0x7fb34c03b0b0 size 128 "road-eastnet-nonat-23" #275: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #275) | 8e 8a 90 cd 9e 92 16 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 db ff f3 45 8d 77 6b ab 4c f5 59 93 99 02 27 | 95 ea ea f3 ac f8 d0 0c f4 e4 a7 81 ed dc a2 2e | 80 d4 21 01 5a 1a 55 9b d3 86 c5 c8 54 08 80 87 | 53 03 95 88 ee 42 5d b8 52 8e fe 84 14 38 79 44 | c3 51 49 fc 97 0d 59 e0 5f 4b c0 5e f8 ec 96 9d | 9d 66 a2 14 38 ec b6 d3 b6 6a cc ee b5 48 0a 5e | 6f de 87 79 9d 43 73 e3 c3 11 60 66 e8 ee 7a 7d | c3 f9 f0 de 79 dc 04 3a 85 85 52 d2 92 21 fc 86 | 8d fd 20 94 86 24 05 6c 2b cb ee c9 04 8f 0f 93 | 01 a5 e2 2b 0c 12 b9 e6 3a 6c ef c0 32 59 e5 d2 | 3b 11 a2 9f 2d 5e e0 2d 8c 75 47 73 37 0b fd dc | 38 6f 1e 5d 62 ac ab 3b f8 90 5d 68 0c 10 a4 e3 | 5d d1 15 9f 1f d5 11 83 81 be 1d a7 8f 91 34 60 | 10 68 8c b7 8b 5a e8 bb 55 32 b6 ac 66 fb 13 bc | 8d 01 0f 0f f6 d9 7e e8 52 a6 18 9d f5 fb ae f8 | d6 4a f4 34 c9 7a eb 6e cd 1f ad 11 86 f4 37 e0 | 29 00 00 24 82 2a d3 ed 88 6f 6d 2b 95 fc ef 17 | cd da 04 83 d9 0b fe c7 f7 7a 31 0a 69 4f 17 0b | 3b dd fa 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 12 f4 6b 5c 7a 37 1f d4 51 59 a4 | 33 90 ab 79 b6 80 74 7b 00 00 00 1c 00 00 40 05 | 6b 59 3d 2d 41 62 79 69 4f 0b fb 7b cf 22 15 97 | 6d 57 a6 24 | libevent_free: release ptr-libevent@0x7fb36c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c7c0 | #275 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 8a 90 cd 9e 92 16 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #275 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #275 | rejected packet: | 8e 8a 90 cd 9e 92 16 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #275: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0687 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338005860 | handling event EVENT_RETRANSMIT for parent state #76 | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #76 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #76 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49670.836217; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009193 exceeds limit? YES "road-eastnet-nonat-76" #76: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-76" #76: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #328 at 0x557d46a3b010 | State DB: adding IKEv2 state #328 in UNDEFINED | pstats #328 ikev2.ike started | Message ID: init #328: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #328: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #328; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-76" #328: initiating v2 parent SA to replace #76 | using existing local IKE proposals for connection road-eastnet-nonat-76 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 328 for state #328 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9c7c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #328 | libevent_malloc: new ptr-libevent@0x7fb36c04b850 size 128 | #328 spent 0.0899 milliseconds in ikev2_parent_outI1() | crypto helper 19 resuming | crypto helper 19 starting work-order 328 for state #328 | RESET processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 328 | start processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #76 ikev2.ike failed too-many-retransmits | pstats #76 ikev2.ike deleted too-many-retransmits | #76 spent 2.21 milliseconds in total | [RE]START processing: state #76 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-76" #76: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #76: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #76 "road-eastnet-nonat-76" #76: deleting IKE SA for connection 'road-eastnet-nonat-76' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-76' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-76 | State DB: deleting IKEv2 state #76 in PARENT_I1 | parent state #76: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #76 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 328 time elapsed 0.001034 seconds | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338005860 | (#328) spent 1.04 milliseconds in crypto helper computing work-order 328: ikev2_outI1 KE (pcr) | in statetime_stop() and could not find #76 | crypto helper 19 sending results from work-order 328 for state #328 to event queue | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #328 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7fb36801a4e0 size 128 Initiating connection road-eastnet-nonat-76 which received a Delete/Notify but must remain up per local policy | crypto helper 19 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-76" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-76' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-76" | stop processing: connection "road-eastnet-nonat-76" (in initiate_a_connection() at initiate.c:349) | spent 0.0799 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #328 | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 328 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #328 | **emit ISAKMP Message: | initiator cookie: | 3c ba 5b c8 fc 4e e4 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-76 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d9 98 1b 56 d7 72 9f 0b ef 82 c1 96 52 5c 5c 9b | ikev2 g^x e9 aa b3 20 9c 71 f6 1f 7d 62 5f 32 20 71 40 58 | ikev2 g^x 1c 09 5f be 66 e2 fb 32 6f 32 7b d3 d9 05 2e a9 | ikev2 g^x ee af 44 08 4c 92 7f 63 3f 26 57 99 85 eb 91 d7 | ikev2 g^x b7 5a 96 3e 98 ed 26 ea 09 8f 0f 63 53 5d 1c b3 | ikev2 g^x c9 fb a7 17 72 50 1c 89 8a 1b ec e3 c6 13 99 f4 | ikev2 g^x 47 85 27 9f 89 00 ee af f6 42 8e 89 20 65 b0 94 | ikev2 g^x dc 96 45 50 6a fc 55 91 2d 20 a1 71 bd 13 2b 3d | ikev2 g^x c9 ca ac 78 35 01 26 cc e0 d8 0f 8b 0a 51 cf db | ikev2 g^x a4 5f b8 de 1d ef 44 4c 67 d2 41 0a 1a da 75 49 | ikev2 g^x 8b 5c 8d d5 4f ad 96 01 a7 81 6e 64 71 33 1d 13 | ikev2 g^x c8 f5 a7 cf 94 c9 e6 53 e2 b0 78 13 10 0b c7 61 | ikev2 g^x e7 11 09 49 e7 5c 3e 3d 81 8a d4 ca 33 cf 4b a6 | ikev2 g^x 11 a6 1c 3a 1f 08 75 b7 9e 2d 0e 59 2f 13 2a 60 | ikev2 g^x 81 d0 25 c3 cb 2c 46 fb 68 09 64 52 0e fa 74 b3 | ikev2 g^x e7 5b 92 47 85 91 91 a7 8f 24 50 93 20 2b b2 73 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce bd 04 20 dd 74 64 b5 d8 5a af c3 c3 73 08 e8 87 | IKEv2 nonce 3d 68 41 83 2a a2 ff d2 47 06 97 0f ee 80 ed c9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3c ba 5b c8 fc 4e e4 2a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4c | natd_hash: port= 01 f4 | natd_hash: hash= 39 f8 b1 65 26 56 ad 9d 5c eb eb 90 0c 0f 05 c7 | natd_hash: hash= 3a 68 b0 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 39 f8 b1 65 26 56 ad 9d 5c eb eb 90 0c 0f 05 c7 | Notify data 3a 68 b0 36 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3c ba 5b c8 fc 4e e4 2a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a1 90 c1 14 1b 7b 06 99 a6 d5 54 52 02 f0 92 56 | natd_hash: hash= c7 13 ca 30 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a1 90 c1 14 1b 7b 06 99 a6 d5 54 52 02 f0 92 56 | Notify data c7 13 ca 30 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #328 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #328: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #328 to 4294967295 after switching state | Message ID: IKE #328 skipping update_recv as MD is fake | Message ID: sent #328 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-76" #328: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.76:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #328) | 3c ba 5b c8 fc 4e e4 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 98 1b 56 d7 72 9f 0b ef 82 c1 96 52 5c 5c 9b | e9 aa b3 20 9c 71 f6 1f 7d 62 5f 32 20 71 40 58 | 1c 09 5f be 66 e2 fb 32 6f 32 7b d3 d9 05 2e a9 | ee af 44 08 4c 92 7f 63 3f 26 57 99 85 eb 91 d7 | b7 5a 96 3e 98 ed 26 ea 09 8f 0f 63 53 5d 1c b3 | c9 fb a7 17 72 50 1c 89 8a 1b ec e3 c6 13 99 f4 | 47 85 27 9f 89 00 ee af f6 42 8e 89 20 65 b0 94 | dc 96 45 50 6a fc 55 91 2d 20 a1 71 bd 13 2b 3d | c9 ca ac 78 35 01 26 cc e0 d8 0f 8b 0a 51 cf db | a4 5f b8 de 1d ef 44 4c 67 d2 41 0a 1a da 75 49 | 8b 5c 8d d5 4f ad 96 01 a7 81 6e 64 71 33 1d 13 | c8 f5 a7 cf 94 c9 e6 53 e2 b0 78 13 10 0b c7 61 | e7 11 09 49 e7 5c 3e 3d 81 8a d4 ca 33 cf 4b a6 | 11 a6 1c 3a 1f 08 75 b7 9e 2d 0e 59 2f 13 2a 60 | 81 d0 25 c3 cb 2c 46 fb 68 09 64 52 0e fa 74 b3 | e7 5b 92 47 85 91 91 a7 8f 24 50 93 20 2b b2 73 | 29 00 00 24 bd 04 20 dd 74 64 b5 d8 5a af c3 c3 | 73 08 e8 87 3d 68 41 83 2a a2 ff d2 47 06 97 0f | ee 80 ed c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f8 b1 65 26 56 ad 9d 5c eb eb 90 | 0c 0f 05 c7 3a 68 b0 36 00 00 00 1c 00 00 40 05 | a1 90 c1 14 1b 7b 06 99 a6 d5 54 52 02 f0 92 56 | c7 13 ca 30 | state #328 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c04b850 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9c7c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #328 | libevent_malloc: new ptr-libevent@0x7fb36c04b850 size 128 | #328 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49670.838023 | resume sending helper answer for #328 suppresed complete_v2_state_transition() and stole MD | #328 spent 0.485 milliseconds in resume sending helper answer | stop processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36801a4e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c ba 5b c8 fc 4e e4 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #328 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #328 | rejected packet: | 3c ba 5b c8 fc 4e e4 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4c fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #328: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ced0 | handling event EVENT_RETRANSMIT for parent state #314 | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #314 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #314 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49670.85422; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001425 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #314 | libevent_malloc: new ptr-libevent@0x7fb36801a4e0 size 128 "road-eastnet-nonat-62" #314: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #314) | fd 31 72 f9 64 d3 9c f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 18 14 ac 93 72 6f f5 79 79 36 2d 8e 4c 14 ac | ea 91 ec 03 06 fb 84 ad 5e 18 85 94 4b b8 8e ee | d9 14 0b 8c 64 c8 45 95 1b 91 75 07 f8 e4 ec 03 | 59 35 93 6c 10 48 ab 6b e6 53 29 72 ab ff 3c 2a | 61 16 cb b8 bd 31 a5 f8 2f 5d 57 58 e1 26 7c 2e | d9 c7 b7 a4 21 ac 7f a4 9a 22 28 50 e4 1d c5 8c | 89 bc f7 70 40 e3 4f 71 2a 2a 2e b1 a7 96 2a 7a | 82 34 1a e1 0e c4 48 55 41 7f 5a 8b 68 d2 fd 14 | f7 10 c0 e4 c1 ac fb 5d c6 f8 34 c9 0a 71 0c 1d | 4f 2b 4a ae bd 22 c4 9a db 63 e4 0a ff 3d 5a f9 | dc 19 2e 9a 16 8d df 98 1f 04 7e 59 57 62 0a e6 | b9 93 59 94 b4 3b eb 70 b1 7b 76 4b 9a 71 ee 97 | f5 ac 50 38 4c 04 22 68 a2 68 e3 f1 1d 13 3a e1 | 84 4b 7c 08 19 fb 96 e3 58 71 59 95 c0 bd 55 f5 | 0d 72 3b 29 f3 ae 58 91 30 ad de 16 a2 e3 03 a0 | 02 e9 38 39 b8 a1 6a 55 c4 1d 22 81 8d d1 2c eb | 29 00 00 24 83 8f 4c 82 0e ff 5a 2c de 21 68 5e | 60 c0 57 92 a6 09 5b 7e 12 e1 2a 75 9d 50 83 dd | e3 d1 6f 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 7f 92 43 99 76 22 ce 79 dc 92 3a | aa fb 36 5e 79 bf 23 b0 00 00 00 1c 00 00 40 05 | e5 74 71 ef f2 a4 7e f6 0b b1 36 a7 2f ae f3 30 | ad 50 42 06 | libevent_free: release ptr-libevent@0x7fb340030080 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ced0 | #314 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 31 72 f9 64 d3 9c f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #314 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #314 | rejected packet: | fd 31 72 f9 64 d3 9c f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #314: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38000feb0 | handling event EVENT_RETRANSMIT for parent state #302 | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #302 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #302 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49670.867509; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002129 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ced0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #302 | libevent_malloc: new ptr-libevent@0x7fb340030080 size 128 "road-eastnet-nonat-50" #302: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #302) | 9a b7 d9 69 b7 b5 8b 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 3b 38 5a ca c1 e0 66 18 62 3b 15 6c b6 3b d4 | d7 ad 95 64 47 60 48 b5 a1 40 89 ca 34 68 f4 5c | b5 12 b3 25 90 eb 49 eb b5 40 df ef 79 a7 f8 11 | fd 6b 8c b7 57 dd 67 6c a2 67 a7 4f be 73 1c 93 | d0 14 73 9b 52 53 0b 4e 5f f6 38 f3 b8 8b db d1 | 1c 9f 4f 10 7c 2c fa b8 0b 5c b4 6b 80 d0 b7 e3 | b6 70 3b 9c d9 ad f0 38 ba 59 1a 5a 32 60 56 90 | 00 97 ec 2a 32 4c ce 8c d0 a5 94 f1 33 fd e4 3c | bb e9 7f cc 0d 4c 4c be 2b f0 80 18 d5 0b e3 68 | da 32 8d 6f 53 ff 6f c4 bc c7 44 a5 1e 56 ed 9a | 22 1a 47 85 cc bb d8 71 12 33 c9 06 fb bd 86 04 | 8a 5e c6 10 00 05 dc db 1a ce ef c2 9a df 5b 3e | f1 94 44 f2 93 b5 45 ee f4 39 f1 54 d0 08 74 2f | 98 02 e6 14 93 d3 55 70 9b c1 5c 0a 6d f7 72 e9 | 7a 20 75 0d 8a 45 81 c5 cd 4a 79 7e 2a a7 cf ed | b9 84 dc 2f 1f b1 1b 47 62 4c ef 36 89 f7 2e e1 | 29 00 00 24 4e 70 94 e8 7e 52 b9 fd e3 7f cf aa | b8 11 eb 44 2a e9 8b 91 cb 46 0f b2 fd 17 ad 44 | 7e 6a 9e 6e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 54 86 00 1a 73 2d f1 8e 31 28 7e 7f | 4e 1d 05 b3 46 7f 2d d6 00 00 00 1c 00 00 40 05 | e4 ea 9a e9 78 75 4e 5e 40 77 76 74 52 35 fb 06 | 70 d7 5d cd | libevent_free: release ptr-libevent@0x7fb350014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000feb0 | #302 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a b7 d9 69 b7 b5 8b 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #302 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #302 | rejected packet: | 9a b7 d9 69 b7 b5 8b 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #302: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #322 | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #322 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #322 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49670.89182; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501106 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000feb0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #322 | libevent_malloc: new ptr-libevent@0x7fb350014c70 size 128 "road-eastnet-nonat-70" #322: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #322) | 74 03 a5 dd ea 05 2e d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 15 d9 ac 31 7b 6c 04 ac 7a ef e5 0d 89 93 07 | 20 e4 8e 39 86 a0 9c 1e 9f 76 b9 58 4d f2 a7 9f | a9 61 82 a9 75 3f e8 1a c2 92 fe 84 37 ac 33 ad | 65 45 df 2b e1 cb 2c 07 be 4f c4 59 89 1a 1e d4 | bc 00 c9 7a da 51 f8 0e 6d e5 9b 4d 2b 1e 90 8c | a7 76 dd 60 8a 02 12 aa 75 a5 70 c1 65 7c 3e 55 | 89 46 b2 4f 06 dd f5 63 86 b7 00 f0 73 2f 7c 5a | b7 d4 0f 38 d5 4f 7a 42 58 2c 1c 6e 8d df 4f 92 | 63 c6 3f de f4 10 95 80 0d 14 e0 40 1c 6b a7 25 | 78 25 a5 d6 97 e1 6b 90 22 06 bd 2b cc f5 6b ca | 10 6b ac a7 98 1a 94 fa 4c cf 33 fe dc 06 fd b0 | 5f 81 4e 82 91 b8 3e 8a c7 a6 68 81 06 ac 84 f0 | ea 68 69 9c ad 3a 07 bc c5 f3 31 91 30 05 f3 ef | dc 51 d5 f6 ee f9 4a 07 b7 9e 0f 65 ad 3f 41 a0 | d7 70 67 24 31 3b 11 1f 99 26 08 ab a5 8d 87 97 | f5 4d 04 da a2 fb f0 9d b6 5e ca 79 ac fb e6 b9 | 29 00 00 24 7c d4 e7 e5 83 a9 e9 e5 4c 1d 37 7f | 04 0f 2a 2b 54 28 64 c4 b2 05 be 1f 1d 68 a9 5e | 6e 76 88 d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 64 8d 0f b4 d2 3e c7 db eb 6e 9c | 80 67 1d 17 67 fa eb 16 00 00 00 1c 00 00 40 05 | 45 ce 15 93 8c ec f9 76 43 65 cd e9 a3 d1 ec 83 | 45 3c 35 9c | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #322 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 03 a5 dd ea 05 2e d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #322 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #322 | rejected packet: | 74 03 a5 dd ea 05 2e d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #322: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acab80 | handling event EVENT_RETRANSMIT for parent state #77 | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #77 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #77 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49670.896095; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007646 exceeds limit? YES "road-eastnet-nonat-77" #77: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-77" #77: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #329 at 0x557d46a3c5d0 | State DB: adding IKEv2 state #329 in UNDEFINED | pstats #329 ikev2.ike started | Message ID: init #329: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #329: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #329; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-77" #329: initiating v2 parent SA to replace #77 | using existing local IKE proposals for connection road-eastnet-nonat-77 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 329 for state #329 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb370005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #329 | libevent_malloc: new ptr-libevent@0x7fb370009640 size 128 | #329 spent 0.0971 milliseconds in ikev2_parent_outI1() | crypto helper 6 resuming | crypto helper 6 starting work-order 329 for state #329 | RESET processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 329 | start processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #77 ikev2.ike failed too-many-retransmits | pstats #77 ikev2.ike deleted too-many-retransmits | #77 spent 2.01 milliseconds in total | [RE]START processing: state #77 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-77" #77: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #77: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #77 "road-eastnet-nonat-77" #77: deleting IKE SA for connection 'road-eastnet-nonat-77' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-77' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-77 | State DB: deleting IKEv2 state #77 in PARENT_I1 | parent state #77: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #77 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb34c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab80 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 329 time elapsed 0.000538 seconds | in statetime_stop() and could not find #77 | (#329) spent 0.572 milliseconds in crypto helper computing work-order 329: ikev2_outI1 KE (pcr) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 6 sending results from work-order 329 for state #329 to event queue | scheduling resume sending helper answer for #329 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-77 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7fb36c04b8e0 size 128 | crypto helper 6 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-77" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-77' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-77" | stop processing: connection "road-eastnet-nonat-77" (in initiate_a_connection() at initiate.c:349) | spent 0.0838 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #329 | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 329 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #329 | **emit ISAKMP Message: | initiator cookie: | 19 44 0d 82 d8 18 b5 00 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-77 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 71 80 85 65 b3 ae 4b 6e fe 68 73 f2 b6 39 5a b1 | ikev2 g^x 5a f3 36 2e e0 44 7d b5 ef dd dd fc d0 35 5f bf | ikev2 g^x 0f f1 a8 56 0e fe 65 1a 64 97 d5 45 02 78 56 12 | ikev2 g^x 1d c5 a8 57 78 41 5d 67 f5 9c ac 0c ea 30 76 9f | ikev2 g^x d6 40 74 a9 16 ad b3 48 34 1d 1d 07 41 4e 7d ea | ikev2 g^x b4 15 07 22 a9 ac 8e c3 4d e5 f2 d1 ad d3 62 0d | ikev2 g^x 93 58 9b 58 67 7c fc 81 97 3b af 10 63 67 d9 86 | ikev2 g^x 45 ad 4f a6 97 2e 79 bd 48 03 5d 44 76 7f c4 9f | ikev2 g^x a3 54 a8 c8 d0 75 76 5f 1b 6c d2 e3 cc 1a fb de | ikev2 g^x f6 a0 df 0a e9 48 0b 88 3f b0 b9 04 79 1c 8b 83 | ikev2 g^x a2 11 a4 9f 9b f2 2f 13 89 0d e6 68 c7 78 af a5 | ikev2 g^x 8d 94 dc 9c 72 14 d9 47 8e b6 09 d8 6c bb 15 13 | ikev2 g^x 54 68 b1 04 b2 79 ae 72 17 9f ff 8d d0 33 2c 7a | ikev2 g^x b0 3e e8 0e e9 c9 f6 bd 41 a5 9d 71 93 9d e7 49 | ikev2 g^x fb 61 fa 0d 56 19 d3 32 c0 8d ba 0e 98 71 48 e0 | ikev2 g^x 2f 1a 52 9f c2 03 77 7a 8d 1e 4b 1c 30 c4 31 91 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ad 58 5c 32 62 e5 13 15 63 fb 95 0f de a4 7f f4 | IKEv2 nonce a1 1f b7 cf 95 c9 7b a8 76 d2 3e a1 6c d4 9d 9c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 19 44 0d 82 d8 18 b5 00 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4d | natd_hash: port= 01 f4 | natd_hash: hash= 61 38 9e 59 ae 71 c3 ed 6e 6e 92 c1 9f 33 f8 69 | natd_hash: hash= 87 bc 1f 0c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 61 38 9e 59 ae 71 c3 ed 6e 6e 92 c1 9f 33 f8 69 | Notify data 87 bc 1f 0c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 19 44 0d 82 d8 18 b5 00 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 49 73 ae f4 7f e8 6a cf 37 86 5a 1d f5 77 0e ad | natd_hash: hash= 19 ee 51 1c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 49 73 ae f4 7f e8 6a cf 37 86 5a 1d f5 77 0e ad | Notify data 19 ee 51 1c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #329 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #329: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #329 to 4294967295 after switching state | Message ID: IKE #329 skipping update_recv as MD is fake | Message ID: sent #329 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-77" #329: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.77:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #329) | 19 44 0d 82 d8 18 b5 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 80 85 65 b3 ae 4b 6e fe 68 73 f2 b6 39 5a b1 | 5a f3 36 2e e0 44 7d b5 ef dd dd fc d0 35 5f bf | 0f f1 a8 56 0e fe 65 1a 64 97 d5 45 02 78 56 12 | 1d c5 a8 57 78 41 5d 67 f5 9c ac 0c ea 30 76 9f | d6 40 74 a9 16 ad b3 48 34 1d 1d 07 41 4e 7d ea | b4 15 07 22 a9 ac 8e c3 4d e5 f2 d1 ad d3 62 0d | 93 58 9b 58 67 7c fc 81 97 3b af 10 63 67 d9 86 | 45 ad 4f a6 97 2e 79 bd 48 03 5d 44 76 7f c4 9f | a3 54 a8 c8 d0 75 76 5f 1b 6c d2 e3 cc 1a fb de | f6 a0 df 0a e9 48 0b 88 3f b0 b9 04 79 1c 8b 83 | a2 11 a4 9f 9b f2 2f 13 89 0d e6 68 c7 78 af a5 | 8d 94 dc 9c 72 14 d9 47 8e b6 09 d8 6c bb 15 13 | 54 68 b1 04 b2 79 ae 72 17 9f ff 8d d0 33 2c 7a | b0 3e e8 0e e9 c9 f6 bd 41 a5 9d 71 93 9d e7 49 | fb 61 fa 0d 56 19 d3 32 c0 8d ba 0e 98 71 48 e0 | 2f 1a 52 9f c2 03 77 7a 8d 1e 4b 1c 30 c4 31 91 | 29 00 00 24 ad 58 5c 32 62 e5 13 15 63 fb 95 0f | de a4 7f f4 a1 1f b7 cf 95 c9 7b a8 76 d2 3e a1 | 6c d4 9d 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 38 9e 59 ae 71 c3 ed 6e 6e 92 c1 | 9f 33 f8 69 87 bc 1f 0c 00 00 00 1c 00 00 40 05 | 49 73 ae f4 7f e8 6a cf 37 86 5a 1d f5 77 0e ad | 19 ee 51 1c | state #329 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb370009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb370005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #329 | libevent_malloc: new ptr-libevent@0x7fb34c0407f0 size 128 | #329 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49670.89752 | resume sending helper answer for #329 suppresed complete_v2_state_transition() and stole MD | #329 spent 0.553 milliseconds in resume sending helper answer | stop processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c04b8e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 19 44 0d 82 d8 18 b5 00 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #329 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #329 | rejected packet: | 19 44 0d 82 d8 18 b5 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4d fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #329: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0915 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11680 | handling event EVENT_RETRANSMIT for parent state #315 | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #315 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #315 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49670.921751; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001573 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c046090 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #315 | libevent_malloc: new ptr-libevent@0x7fb36c04b8e0 size 128 "road-eastnet-nonat-63" #315: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #315) | 44 ed db 2c fe 0c f2 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e 87 b1 78 dc 97 f3 7a 79 3b d6 3e 86 ea b2 fa | 5d 34 e2 db 78 24 8f 15 59 97 e5 e6 f6 90 b1 aa | 59 98 1b 57 96 2d 7a a6 68 c9 eb 8b 7d f6 64 68 | a2 48 77 fc cb 5d 8f 0e b2 52 9b 77 09 f1 21 ba | 81 62 c1 7e 82 df 5b 48 60 ba f6 08 04 c2 77 74 | 9c c8 6b 41 93 1d 14 39 f9 1e b0 b2 5b 1d 3c e0 | ca f1 1f 63 24 c8 cc 04 a5 c5 8f 7d 86 30 95 90 | fb a8 83 29 7a f1 ce 8e 64 9a 9f 82 39 eb 4b a4 | b2 6f ce 0a 5b bd e7 1a af 9d af 92 27 aa 66 57 | 8e 91 52 b5 d0 96 33 ee eb 0f 07 5f 2f 56 77 d0 | 9a 1f cb 0e 53 2f d5 4e b4 5b a5 9c 4c 15 af e1 | 28 86 0f 89 11 d9 bc 73 6b a7 3c 58 a9 04 2c eb | f2 53 51 79 62 f5 50 bf 5f 75 e1 7f 28 95 f0 09 | 87 f1 d9 ee 26 2c 8a ee 7d 84 2e 04 f2 6c 42 e0 | 67 e8 19 47 db 94 b6 12 29 d7 1d dc 8f 61 2d e0 | 53 f7 53 7d 18 19 05 ed 93 cb 84 d8 40 1b 1d fe | 29 00 00 24 5f cd cc 5e 9b b5 1f f6 2d c3 6f 0d | 70 ea 63 15 bc b8 5b 49 76 c9 be 04 9e 55 ff 0b | 33 d9 e0 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 2c d3 1b 13 1c a2 69 95 f2 01 8c | cb 3c f6 d6 71 d0 e6 be 00 00 00 1c 00 00 40 05 | b1 bd 1a 4e 17 0a c1 3c 72 20 f5 8a 28 12 f4 7a | a3 f8 1e e7 | libevent_free: release ptr-libevent@0x7fb338048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11680 | #315 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ed db 2c fe 0c f2 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #315 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #315 | rejected packet: | 44 ed db 2c fe 0c f2 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #315: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_RETRANSMIT for parent state #276 | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #276 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #276 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49670.944131; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003648 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11680 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #276 | libevent_malloc: new ptr-libevent@0x7fb338048a10 size 128 "road-eastnet-nonat-24" #276: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #276) | 97 d8 09 67 95 19 ff f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e fe 65 45 24 16 54 b2 a7 14 49 9e 41 08 a6 ad | 8d 38 c1 ab 41 bc c5 70 74 ea 87 6b 47 67 61 c9 | 08 e4 05 10 d8 b1 89 eb 95 ae 5c c6 f1 8d 64 f6 | e2 34 f7 1e 96 bb c8 e4 08 d5 11 49 c7 13 d5 5b | 05 9d 02 33 71 55 11 11 24 9a 7a f7 2f f8 55 e9 | 49 16 da 32 11 31 25 c0 d3 d2 83 15 e8 61 24 52 | f4 f3 a7 f2 34 62 0e d9 54 b7 ea 87 42 a8 29 03 | 05 f5 e1 d2 8f 40 88 3f e8 e4 52 27 80 25 db f2 | 79 7c f2 ce e3 4d 99 fa 0f 82 50 fa bd f3 31 31 | 75 5b 04 3c f4 62 cf 98 a6 3b 30 69 aa fe de 35 | fe 70 61 92 ab 0c 67 96 0d 80 c2 5b c7 8c 3b 7a | 1d cc 0e d5 c6 71 9d 10 b0 4a ac f9 9f b7 d7 6d | 29 1a 45 c3 c8 c4 88 f8 4d dd 53 1c d2 5c 13 5d | 0b 9c e9 d4 6a e6 6d db d7 74 a8 c2 b2 2b 2e 99 | c1 be 2c 7e b9 9a 61 61 42 22 a8 96 77 9d c3 f9 | 9b eb 60 04 cc 7a e8 a6 1b 7a bb 42 2e 5c de 12 | 29 00 00 24 89 93 ef 63 4b 32 f6 be 90 74 d4 cc | df 00 dd 1b b5 27 60 b1 da 93 3c e5 82 5c 18 d4 | 92 56 47 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 b3 01 11 26 92 0f 1e 78 d6 0c e4 | b7 13 47 be 6e 37 68 a6 00 00 00 1c 00 00 40 05 | 24 f3 9b 24 06 cb fe aa 4a 7c a0 cb 8e 4b 56 de | 28 62 03 f5 | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | #276 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 d8 09 67 95 19 ff f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #276 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #276 | rejected packet: | 97 d8 09 67 95 19 ff f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #276: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #323 | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #323 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #323 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49670.946438; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500504 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #323 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-71" #323: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #323) | fa a0 9f 7c 98 fa b7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 46 00 d1 b1 2f ab 58 ff ae 3e e1 90 df ac 17 | ff f8 20 d8 dc c8 64 44 8b d4 4d 64 77 87 0d 12 | 4f 58 f8 0b b8 23 de 06 cb 6a 5a 17 a1 ce 9c 0e | b9 8f d4 30 b1 62 d8 df cd 4c 66 72 94 9e 12 c2 | 2d 76 67 bf af 09 84 71 96 13 7f 13 e3 92 f9 eb | 91 ae c7 77 a0 91 b1 8b 78 4e 95 7f ad 59 ce f7 | 52 f5 ff c7 0f 12 41 0b 6a 23 2d 80 44 0e 92 7c | 8a 4f 11 47 2b 77 90 68 d7 a1 52 f7 6b 79 db 3f | 94 cd 89 b0 a4 aa 7e 64 52 6b 85 6e 03 da 1f ae | b6 90 2d d1 46 19 b6 66 ea b6 57 b4 c6 78 39 27 | 7f 33 c8 a1 bd 41 e7 ba 08 ef c1 2b 83 3d 1a a5 | d6 cc ec 96 a2 e8 29 ec 44 9c 54 bc 8b 9c d6 9b | cf 36 d1 9f c7 0e 2f 28 11 0b 73 2c 8d e2 76 0d | 66 d9 63 04 c0 20 e3 d1 af b2 68 91 e0 90 8f 15 | 8a 1a f5 c8 e3 0d 24 88 9a 72 7c ad a0 47 9a cf | 87 bf fe bc 41 93 5c 36 c0 33 07 c5 9e ea fb dd | 29 00 00 24 40 e8 32 3c 23 00 84 94 61 80 b2 17 | 1c a2 13 13 eb 56 70 6b 74 c5 2e 36 50 96 1d 9e | 9b cf 84 1b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 d2 f5 ad 3c 92 ba 81 0f fc 09 27 | bf 74 8b d6 da e0 d6 64 00 00 00 1c 00 00 40 05 | e3 ba 50 e3 10 b5 c6 17 22 3f 31 51 2e fe 55 bf | 2d 04 cf 9f | libevent_free: release ptr-libevent@0x7fb3780300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #323 spent 0.0864 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa a0 9f 7c 98 fa b7 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #323 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #323 | rejected packet: | fa a0 9f 7c 98 fa b7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #323: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38400feb0 | handling event EVENT_RETRANSMIT for parent state #303 | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #303 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #303 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49670.947689; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002867 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #303 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 "road-eastnet-nonat-51" #303: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #303) | 0b e0 0a 79 39 06 c6 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 24 21 b4 0b e3 09 db 3f b6 a5 77 bb 87 5e ad | 66 c7 93 9a 8c 2e 04 3b 08 20 ac 03 a5 76 12 ab | b6 66 99 c7 bf 97 92 b1 32 f2 d4 40 1d 20 9f 0b | 85 c0 47 40 73 82 3c 97 59 5e 7a bf 29 1b 9b 33 | 65 e1 1d e1 06 4b 23 bb cd c3 d7 6f 1f 4d 6a d4 | a5 35 47 13 70 43 5f 27 3f e8 8d 45 36 1b 13 e8 | 52 7a c9 fd 4e c5 bf df 1d ad 19 77 99 5f 83 de | fd ac 63 24 8e b6 c0 c8 ec b2 56 6f 38 d9 99 06 | 17 b7 7e be be 8d 7f 5c 2d b1 d6 35 c6 26 88 21 | 6c 47 69 c2 4b 86 0c 66 51 e7 f5 2d 4c fb e5 79 | 2e e4 ba 11 88 c3 1e d5 cd ce 6d 00 ed f9 6c 2a | 2b 8c 48 d8 fb b0 3c 63 91 8e ae 31 9b af bf 15 | 0b 41 67 9d 12 12 70 9c 8c c1 6a db fc d2 6b 50 | c9 fa d7 b3 18 db 4f f1 d7 45 f6 0f b9 6e 33 c9 | 52 60 cc f3 be 3c 22 f0 a3 35 db d2 db d6 a6 94 | 52 18 e2 de 57 43 68 d8 7b eb ec 67 cd ed 35 3d | 29 00 00 24 80 ff 8a 78 69 ce 7f 51 87 5f 84 ba | c7 a1 f0 8c ea cb 68 68 e4 3e 06 9f 5c 43 cc 06 | 85 44 5c 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 50 a2 4e fc 4d 1b 58 77 6d e9 3b | 74 ac 43 c3 0f 7e 66 e7 00 00 00 1c 00 00 40 05 | d9 44 30 c1 08 7f 7e c4 16 be af c3 f1 e2 c1 72 | 14 da 79 2d | libevent_free: release ptr-libevent@0x7fb354014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400feb0 | #303 spent 0.0828 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b e0 0a 79 39 06 c6 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #303 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #303 | rejected packet: | 0b e0 0a 79 39 06 c6 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #303: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a89740 | handling event EVENT_RETRANSMIT for parent state #78 | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #78 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #78 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49670.957932; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009028 exceeds limit? YES "road-eastnet-nonat-78" #78: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-78" #78: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #330 at 0x557d46a3db90 | State DB: adding IKEv2 state #330 in UNDEFINED | pstats #330 ikev2.ike started | Message ID: init #330: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #330: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #330; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-78" #330: initiating v2 parent SA to replace #78 | using existing local IKE proposals for connection road-eastnet-nonat-78 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 330 for state #330 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb38400feb0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #330 | libevent_malloc: new ptr-libevent@0x7fb354014c70 size 128 | crypto helper 11 resuming | #330 spent 0.0707 milliseconds in ikev2_parent_outI1() | crypto helper 11 starting work-order 330 for state #330 | RESET processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 330 | start processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #78 ikev2.ike failed too-many-retransmits | pstats #78 ikev2.ike deleted too-many-retransmits | #78 spent 2.23 milliseconds in total | [RE]START processing: state #78 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-78" #78: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #78: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #78 "road-eastnet-nonat-78" #78: deleting IKE SA for connection 'road-eastnet-nonat-78' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-78' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-78 | State DB: deleting IKEv2 state #78 in PARENT_I1 | parent state #78: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #78 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 330 time elapsed 0.000626 seconds | libevent_free: release ptr-libevent@0x7fb38401cc10 | (#330) spent 0.619 milliseconds in crypto helper computing work-order 330: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a89740 | crypto helper 11 sending results from work-order 330 for state #330 to event queue | in statetime_stop() and could not find #78 | scheduling resume sending helper answer for #330 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb36001a4e0 size 128 | crypto helper 11 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-78 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-78" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-78' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-78" | stop processing: connection "road-eastnet-nonat-78" (in initiate_a_connection() at initiate.c:349) | spent 0.0578 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #330 | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 330 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #330 | **emit ISAKMP Message: | initiator cookie: | 93 2e 75 96 9e d6 58 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-78 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b4 2c e9 0f 22 91 df 5a 5b ae 3a 65 86 ba 44 9c | ikev2 g^x 65 4a 79 99 b3 fa 29 29 22 63 49 c3 6b 7a c8 2c | ikev2 g^x a6 64 55 77 51 a1 d2 b5 c5 ed b9 2b d7 c9 de d5 | ikev2 g^x 1f 04 ca d2 89 15 35 75 d9 05 25 47 aa 0c 65 5b | ikev2 g^x a8 0c 57 96 31 e9 78 a6 a3 87 ad 68 36 d2 a1 3b | ikev2 g^x 88 08 f8 2e 28 6b 99 4e 37 3d 68 42 7a f5 6a 2c | ikev2 g^x 92 3c 46 2d 02 18 a7 c8 61 9b 40 1b d5 74 a6 72 | ikev2 g^x 61 b0 45 d7 09 4c 08 2d 1e 0e 8d f9 eb 38 be 36 | ikev2 g^x 94 bc ee 43 6d c2 1a 9d c9 1b 4a 84 b6 50 10 54 | ikev2 g^x ae 45 14 8d 9a 31 50 76 61 37 da 64 1e 74 bc 11 | ikev2 g^x a7 13 ed 80 0f 85 3c d8 35 69 89 6d b4 6c ac f3 | ikev2 g^x 2f 4a 27 55 17 f4 f5 ce 32 75 dd b4 15 0b 7f 61 | ikev2 g^x e2 87 b3 bb e4 11 66 8c 15 79 6e d9 14 50 70 fe | ikev2 g^x f5 12 aa 90 f9 25 da 28 bc a5 c1 1c 8f 54 93 e2 | ikev2 g^x 5b 5a 53 f7 1c 97 4d 5c c4 f6 b5 86 3f 24 5b 64 | ikev2 g^x c4 87 cd 28 7a 3e ef 9f 68 95 6b f8 95 8d da 08 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a1 af e5 97 d9 f1 9e 6c 80 91 ab 21 08 cf 38 0c | IKEv2 nonce a4 d3 fb b3 c7 37 98 b4 a4 0d 72 16 de e9 9d 2b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 93 2e 75 96 9e d6 58 76 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4e | natd_hash: port= 01 f4 | natd_hash: hash= 79 c9 48 f6 82 8f 0c eb 59 3f 42 40 18 2f 27 9b | natd_hash: hash= ca 1b 0e 80 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 79 c9 48 f6 82 8f 0c eb 59 3f 42 40 18 2f 27 9b | Notify data ca 1b 0e 80 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 93 2e 75 96 9e d6 58 76 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 3e 48 b8 70 cf c0 9c 35 6c 64 bb e3 c7 5c 5e 43 | natd_hash: hash= 1f 5c 26 91 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3e 48 b8 70 cf c0 9c 35 6c 64 bb e3 c7 5c 5e 43 | Notify data 1f 5c 26 91 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #330 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #330: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #330 to 4294967295 after switching state | Message ID: IKE #330 skipping update_recv as MD is fake | Message ID: sent #330 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-78" #330: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.78:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #330) | 93 2e 75 96 9e d6 58 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 2c e9 0f 22 91 df 5a 5b ae 3a 65 86 ba 44 9c | 65 4a 79 99 b3 fa 29 29 22 63 49 c3 6b 7a c8 2c | a6 64 55 77 51 a1 d2 b5 c5 ed b9 2b d7 c9 de d5 | 1f 04 ca d2 89 15 35 75 d9 05 25 47 aa 0c 65 5b | a8 0c 57 96 31 e9 78 a6 a3 87 ad 68 36 d2 a1 3b | 88 08 f8 2e 28 6b 99 4e 37 3d 68 42 7a f5 6a 2c | 92 3c 46 2d 02 18 a7 c8 61 9b 40 1b d5 74 a6 72 | 61 b0 45 d7 09 4c 08 2d 1e 0e 8d f9 eb 38 be 36 | 94 bc ee 43 6d c2 1a 9d c9 1b 4a 84 b6 50 10 54 | ae 45 14 8d 9a 31 50 76 61 37 da 64 1e 74 bc 11 | a7 13 ed 80 0f 85 3c d8 35 69 89 6d b4 6c ac f3 | 2f 4a 27 55 17 f4 f5 ce 32 75 dd b4 15 0b 7f 61 | e2 87 b3 bb e4 11 66 8c 15 79 6e d9 14 50 70 fe | f5 12 aa 90 f9 25 da 28 bc a5 c1 1c 8f 54 93 e2 | 5b 5a 53 f7 1c 97 4d 5c c4 f6 b5 86 3f 24 5b 64 | c4 87 cd 28 7a 3e ef 9f 68 95 6b f8 95 8d da 08 | 29 00 00 24 a1 af e5 97 d9 f1 9e 6c 80 91 ab 21 | 08 cf 38 0c a4 d3 fb b3 c7 37 98 b4 a4 0d 72 16 | de e9 9d 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 c9 48 f6 82 8f 0c eb 59 3f 42 40 | 18 2f 27 9b ca 1b 0e 80 00 00 00 1c 00 00 40 05 | 3e 48 b8 70 cf c0 9c 35 6c 64 bb e3 c7 5c 5e 43 | 1f 5c 26 91 | state #330 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb354014c70 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb38400feb0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a89740 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #330 | libevent_malloc: new ptr-libevent@0x7fb38401cc10 size 128 | #330 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49670.959148 | resume sending helper answer for #330 suppresed complete_v2_state_transition() and stole MD | #330 spent 0.351 milliseconds in resume sending helper answer | stop processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36001a4e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 93 2e 75 96 9e d6 58 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #330 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #330 | rejected packet: | 93 2e 75 96 9e d6 58 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #330: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #316 | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #316 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #316 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49670.980321; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.0014 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #316 | libevent_malloc: new ptr-libevent@0x7fb36001a4e0 size 128 "road-eastnet-nonat-64" #316: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #316) | e8 62 07 3d 83 c9 27 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 67 27 d8 ca da 21 fc 33 ba 4f 94 10 8a c5 3e | 5d c6 ca e9 be 5f 5b 62 d9 f8 5f ef cd 1d 75 de | 4e 46 e5 c8 47 0c 64 48 a0 a0 be ad 1a 88 be 29 | 21 51 4f e4 bd 33 bd be 35 5e 1a f3 c6 5c 72 cc | 14 4f 34 ba 69 93 e8 bf 07 ec 5c 62 f6 72 9d af | 95 ca 7c 71 3b 37 93 92 3a 98 4e 7a 53 2f 9a a8 | 2a b6 32 33 20 cf eb 65 6b e0 73 23 52 d2 61 14 | 64 77 57 5a e0 a6 ac 4c 66 6c 73 74 1e 30 64 d8 | 26 eb 6f 24 f1 a2 d0 b2 6b 58 a7 b2 54 48 ba 72 | 09 ae 65 3c 30 0d df 54 4e 6a 33 e2 26 65 76 99 | ea 2e 2a 30 fa a7 4c 97 4d 74 ba 19 a6 b3 7b 01 | 82 88 fa e7 6a 85 ab 68 48 39 a4 91 e9 e4 44 02 | 10 7a c6 c8 2e 47 03 39 25 a6 92 8c e5 51 eb 52 | f8 c7 61 20 39 65 61 dc 27 00 53 74 46 c8 5c be | 3b 90 c1 02 b8 be b2 17 6b a3 86 6f 65 fa c8 19 | e6 54 1a 74 80 e0 70 41 21 d7 44 54 50 0b cd 29 | 29 00 00 24 89 45 06 65 65 b3 8c d6 0c df 20 90 | 5a e6 b0 5e f6 87 85 10 8d 96 3d 5e 67 1f 54 38 | 77 de f5 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 e4 d3 0f a4 c8 a7 ec 05 e8 fa d2 | 6d 31 a1 ad f7 6f 67 3e 00 00 00 1c 00 00 40 05 | 0a a4 aa 05 10 e6 c7 c4 a5 a6 8e 98 2e fc 0d 29 | 7c 74 b9 43 | libevent_free: release ptr-libevent@0x7fb34800f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #316 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 62 07 3d 83 c9 27 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #316 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #316 | rejected packet: | e8 62 07 3d 83 c9 27 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #316: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #304 | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #304 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #304 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49671.011676; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002965 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #304 | libevent_malloc: new ptr-libevent@0x7fb34800f1a0 size 128 "road-eastnet-nonat-52" #304: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #304) | a8 9e ad f8 7e d0 8f 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 65 f7 e5 5b 0c d9 66 1f 9e de 27 b7 a9 e5 61 | e4 fa 1d ab 7c 97 a1 bd 20 9d f3 a2 b5 27 bd 1f | 8f a0 e6 70 97 5a a5 25 66 20 75 9f 12 5d d3 39 | 9b 63 a2 db 2b 74 35 c0 72 13 97 27 05 c2 62 b9 | e3 8d 4c df 62 26 b2 ef 71 4f 57 9f 86 a7 ae 23 | 96 73 f6 29 74 fa 2e d9 85 44 9e f4 6e a1 bf c3 | aa ee d5 e9 ef ed b7 f6 19 80 49 92 25 03 a6 fd | 97 ad 05 c1 4c ee d0 28 55 8e 3c fe 56 3a de 43 | 58 54 9b db 87 cd a3 da 37 73 a4 bf 3c b5 ae e4 | 24 52 70 fc 3d a8 8c fa 47 49 00 40 14 e1 2e ac | c2 2a 40 fe b6 ab ac c0 48 61 8f e7 d0 5a d3 f9 | ee 88 91 3d 36 46 3b a6 d1 44 56 83 2a 21 0b 8c | bf 71 69 ea 58 fa fe b7 82 58 cb 6d 26 3b 79 12 | d5 7b af 2b 0b 68 46 9e 23 40 da 39 fc 30 e7 9e | 96 5b ef fa 83 ac 69 ef e9 6f 36 21 f5 e9 e9 e7 | 28 93 fa 84 b2 62 19 86 19 c7 09 bf 96 a9 13 fa | 29 00 00 24 01 38 84 c9 86 37 f1 ee b2 c5 1a 16 | 9c 76 d6 78 f3 8e 1b 3e 7b e2 b1 ac 57 81 00 ff | be 40 7b 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 4d a8 e4 29 87 92 f9 c9 e0 47 d4 | 8d 2b 33 0e 7e 88 7a bd 00 00 00 1c 00 00 40 05 | 14 10 d4 5f c4 9e a3 33 92 fb 64 77 06 27 8a 6c | e3 d6 b0 88 | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #304 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 9e ad f8 7e d0 8f 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #304 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #304 | rejected packet: | a8 9e ad f8 7e d0 8f 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #304: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0474 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358012bf0 | handling event EVENT_RETRANSMIT for parent state #324 | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #324 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #324 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49671.012957; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500752 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #324 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 "road-eastnet-nonat-72" #324: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #324) | c4 71 4c 47 7a 99 7f 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c dc ba bd 1d 04 54 b8 de 2e 7e 4a 73 d1 75 b4 | 30 69 01 66 67 06 e7 5e ab 90 82 b5 8d a8 6f 99 | a6 8e f4 9a 71 40 de b0 d0 8a d9 b4 ed e4 6f 96 | 72 62 19 62 54 5d 4c 3f 06 3d 1e 94 b0 72 25 98 | 59 31 b4 12 f8 20 4c c4 1b 57 a8 cc e5 a4 fd 8e | b7 00 85 d1 0e c7 4d 3b 7a 7d 11 6d 19 fd 6a 75 | 3a e2 10 64 69 82 7f f7 9f 48 c9 57 2f a9 70 57 | 4e 17 87 f1 7b f1 ed 42 6c 69 0f 53 01 4f 76 4d | 49 de 7e 34 19 26 2c 17 55 79 6b 2b e6 70 a9 41 | 28 a8 e5 5c 9c 0b 01 88 ec 60 31 32 12 e0 5e 2a | d0 1f 1c 62 7b 27 a5 6a b5 82 73 7a c7 4d 6d 07 | a2 fe cc 3c f6 be 38 d5 e6 bc c7 f9 e4 e8 c4 66 | 25 de 6a 66 de d9 be 67 52 10 16 32 1e 81 04 70 | 2e 04 43 17 b2 33 75 6a 97 52 34 c2 f0 d7 69 62 | a8 cb 03 e7 cd 81 0c 55 75 a8 24 c4 ed 92 5e ec | 1a d4 65 0c 31 44 9a 04 50 cf 8e 45 48 fa 6a 9c | 29 00 00 24 a2 70 44 54 09 89 66 44 f1 6d a2 85 | b3 a0 4f a8 16 2e 01 ca af 0e 31 e7 7c 41 b8 c9 | 46 c7 99 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 0b 59 de ec 8b 84 8b 41 7c 2d 20 | 10 87 a7 ee 10 a7 dc 2a 00 00 00 1c 00 00 40 05 | 44 04 bc 04 96 6f cb 2b 3d a9 52 fe 2d cc 35 38 | 9a e2 35 2c | libevent_free: release ptr-libevent@0x7fb35c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358012bf0 | #324 spent 0.085 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 71 4c 47 7a 99 7f 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #324 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #324 | rejected packet: | c4 71 4c 47 7a 99 7f 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #324: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acd680 | handling event EVENT_RETRANSMIT for parent state #79 | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #79 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #79 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49671.022243; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008765 exceeds limit? YES "road-eastnet-nonat-79" #79: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-79" #79: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #331 at 0x557d46a3f150 | State DB: adding IKEv2 state #331 in UNDEFINED | pstats #331 ikev2.ike started | Message ID: init #331: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #331: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #331; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-79" #331: initiating v2 parent SA to replace #79 | using existing local IKE proposals for connection road-eastnet-nonat-79 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 331 for state #331 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb358012bf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #331 | libevent_malloc: new ptr-libevent@0x7fb35c0407f0 size 128 | #331 spent 0.0652 milliseconds in ikev2_parent_outI1() | RESET processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 resuming | crypto helper 16 starting work-order 331 for state #331 | start processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #79 ikev2.ike failed too-many-retransmits | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 331 | pstats #79 ikev2.ike deleted too-many-retransmits | #79 spent 2.36 milliseconds in total | [RE]START processing: state #79 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-79" #79: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #79: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #79 "road-eastnet-nonat-79" #79: deleting IKE SA for connection 'road-eastnet-nonat-79' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-79' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-79 | State DB: deleting IKEv2 state #79 in PARENT_I1 | parent state #79: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #79 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 331 time elapsed 0.001025 seconds | libevent_free: release ptr-libevent@0x7fb36002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acd680 | in statetime_stop() and could not find #79 | (#331) spent 1.03 milliseconds in crypto helper computing work-order 331: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 331 for state #331 to event queue | scheduling resume sending helper answer for #331 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb36401a420 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-79 which received a Delete/Notify but must remain up per local policy | crypto helper 16 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-79" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-79' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-79" | stop processing: connection "road-eastnet-nonat-79" (in initiate_a_connection() at initiate.c:349) | spent 0.0675 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #331 | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 331 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #331 | **emit ISAKMP Message: | initiator cookie: | 50 44 b2 3a 07 a7 4e 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-79 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5c 5b 7a 1c 65 ca 17 c3 34 09 e9 50 2c 1a 5f 2c | ikev2 g^x 3f 1f d0 f4 a9 fc a5 0f b3 e0 23 18 36 32 e0 dd | ikev2 g^x 70 db 2b a7 8a bb 5e d5 7b c1 26 49 ed 17 f5 fb | ikev2 g^x 41 8c 70 b6 46 13 5b 7c be 72 85 64 1f cb c2 3b | ikev2 g^x 7b cd ab 00 d1 f5 c6 c8 ef 4e 43 8b d1 3c de 4e | ikev2 g^x 97 78 da c1 12 64 cb f5 74 cf 7b 2b a9 ae 8b a5 | ikev2 g^x dc d3 db 70 7b c5 17 1a a0 d8 61 49 40 f3 77 7a | ikev2 g^x 26 f5 d7 d4 fc a6 3c ec 56 96 bd ad fa da 9d 95 | ikev2 g^x 6f c7 43 12 03 de b3 4a 54 ca 56 3c b7 a8 38 f0 | ikev2 g^x 03 5a 39 ab 50 08 22 eb 87 c3 7d 6f ff ac b9 cb | ikev2 g^x 79 02 42 01 ae 8a 86 1f cf 39 34 00 58 b3 82 70 | ikev2 g^x cb f1 c5 9a 1b e0 1b 28 e5 0b 30 ab da 32 50 a9 | ikev2 g^x 39 71 a2 8b c0 a0 38 d2 35 39 8f d7 36 de a3 f4 | ikev2 g^x 70 e0 8f a8 7e 36 bd e7 03 3e dd 85 86 be 19 24 | ikev2 g^x 24 d5 8e aa 7b 0a 66 52 ff 44 f1 22 3a 93 2a 43 | ikev2 g^x b3 e4 83 93 f3 85 5b 68 a3 1b 91 5b 88 3f ae 95 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 03 6b b7 f1 e0 d0 ec 2f 89 98 41 7d af 5d 2c 7f | IKEv2 nonce 97 af 10 99 b6 2e fe 6f ac 7d ce 98 66 f3 c3 e4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 50 44 b2 3a 07 a7 4e 0c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4f | natd_hash: port= 01 f4 | natd_hash: hash= 1f b7 eb 6a 1a 1b 78 47 4b c9 5c d0 13 11 3d 6a | natd_hash: hash= 14 1b 4d ab | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1f b7 eb 6a 1a 1b 78 47 4b c9 5c d0 13 11 3d 6a | Notify data 14 1b 4d ab | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 50 44 b2 3a 07 a7 4e 0c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4a 21 a9 91 28 88 ee e6 d7 a3 92 f2 91 f6 75 81 | natd_hash: hash= f6 52 77 56 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4a 21 a9 91 28 88 ee e6 d7 a3 92 f2 91 f6 75 81 | Notify data f6 52 77 56 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #331 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #331: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #331 to 4294967295 after switching state | Message ID: IKE #331 skipping update_recv as MD is fake | Message ID: sent #331 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-79" #331: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.79:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #331) | 50 44 b2 3a 07 a7 4e 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 5b 7a 1c 65 ca 17 c3 34 09 e9 50 2c 1a 5f 2c | 3f 1f d0 f4 a9 fc a5 0f b3 e0 23 18 36 32 e0 dd | 70 db 2b a7 8a bb 5e d5 7b c1 26 49 ed 17 f5 fb | 41 8c 70 b6 46 13 5b 7c be 72 85 64 1f cb c2 3b | 7b cd ab 00 d1 f5 c6 c8 ef 4e 43 8b d1 3c de 4e | 97 78 da c1 12 64 cb f5 74 cf 7b 2b a9 ae 8b a5 | dc d3 db 70 7b c5 17 1a a0 d8 61 49 40 f3 77 7a | 26 f5 d7 d4 fc a6 3c ec 56 96 bd ad fa da 9d 95 | 6f c7 43 12 03 de b3 4a 54 ca 56 3c b7 a8 38 f0 | 03 5a 39 ab 50 08 22 eb 87 c3 7d 6f ff ac b9 cb | 79 02 42 01 ae 8a 86 1f cf 39 34 00 58 b3 82 70 | cb f1 c5 9a 1b e0 1b 28 e5 0b 30 ab da 32 50 a9 | 39 71 a2 8b c0 a0 38 d2 35 39 8f d7 36 de a3 f4 | 70 e0 8f a8 7e 36 bd e7 03 3e dd 85 86 be 19 24 | 24 d5 8e aa 7b 0a 66 52 ff 44 f1 22 3a 93 2a 43 | b3 e4 83 93 f3 85 5b 68 a3 1b 91 5b 88 3f ae 95 | 29 00 00 24 03 6b b7 f1 e0 d0 ec 2f 89 98 41 7d | af 5d 2c 7f 97 af 10 99 b6 2e fe 6f ac 7d ce 98 | 66 f3 c3 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f b7 eb 6a 1a 1b 78 47 4b c9 5c d0 | 13 11 3d 6a 14 1b 4d ab 00 00 00 1c 00 00 40 05 | 4a 21 a9 91 28 88 ee e6 d7 a3 92 f2 91 f6 75 81 | f6 52 77 56 | state #331 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c0407f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb358012bf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #331 | libevent_malloc: new ptr-libevent@0x7fb36002a950 size 128 | #331 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49671.023832 | resume sending helper answer for #331 suppresed complete_v2_state_transition() and stole MD | #331 spent 0.321 milliseconds in resume sending helper answer | stop processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36401a420 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 44 b2 3a 07 a7 4e 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #331 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #331 | rejected packet: | 50 44 b2 3a 07 a7 4e 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4f fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #331: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0456 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #277 | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #277 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #277 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49671.036001; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003687 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354012bf0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #277 | libevent_malloc: new ptr-libevent@0x7fb36401a420 size 128 "road-eastnet-nonat-25" #277: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #277) | ed b4 5b 7c 9c f8 2d 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 91 10 6d ca 19 82 3a d9 60 7a 42 28 66 35 e5 | 82 e1 76 6a af 41 1a 40 79 5a ee 26 e3 d1 7d 52 | 03 12 d2 f6 99 41 6c 71 1c 80 6b 42 ba dc 3a 1b | b2 e9 12 a6 18 73 56 76 a4 06 05 cc 7a a0 0d 6d | 5e b3 80 19 f7 55 aa 2e 78 b1 66 56 9c 95 5c 32 | ad 95 eb b3 ba 95 95 ac ab 11 2a 2d 88 4f f4 e4 | dc 27 65 85 9d 92 a4 95 34 90 00 dd a5 be b5 ab | 9b 9f 39 46 28 33 16 41 a9 bb 12 e3 aa e6 53 f9 | 68 46 b2 9f c5 cd e9 27 33 0f ce 44 2d af d9 1b | dd 62 0d ac 4f 6c d0 11 3c 43 0a 76 ed 0e 96 8e | 3d ae f9 37 d9 67 c1 41 28 1d b6 2e 37 94 9e d3 | 2d cd 56 12 85 bb 68 4b bc 82 79 db 1e 4d bb bf | 84 00 46 a4 83 fb 2f 52 63 fc 2d 22 07 38 b8 c2 | 10 b3 b9 89 01 dd 44 99 e7 b8 0d b3 ff 24 4d 13 | b0 46 f4 b8 d8 19 4c 50 4a 18 69 03 39 b2 07 55 | 2b c7 e7 99 0d e8 a0 4f a8 e9 77 f9 b1 03 fa af | 29 00 00 24 29 c9 81 60 c0 da c9 2a 2b e1 7f 4a | cf 46 c4 64 f1 f4 1c 69 ff e2 b3 05 a6 db d8 66 | 75 2e e0 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 88 a4 31 ce f7 11 c3 38 da 2b 8a | 45 3d 50 97 02 58 67 d6 00 00 00 1c 00 00 40 05 | 85 8b 47 13 68 9a a2 a7 47 76 c4 a7 6b ba 26 12 | 0d c2 32 9d | libevent_free: release ptr-libevent@0x7fb364008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #277 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed b4 5b 7c 9c f8 2d 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #277 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #277 | rejected packet: | ed b4 5b 7c 9c f8 2d 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #277: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac2900 | handling event EVENT_RETRANSMIT for parent state #317 | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #317 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #317 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49671.05035; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000465 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #317 | libevent_malloc: new ptr-libevent@0x7fb364008e30 size 128 "road-eastnet-nonat-65" #317: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #317) | 5c a2 6c e8 b2 28 e0 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 95 b1 4b f7 b4 a2 f3 b1 63 69 55 e2 98 fb 3f | 54 1a 28 48 de 85 37 f8 72 76 27 96 2b db 5e 33 | be af 42 49 c9 29 81 c9 57 56 f4 f8 82 3d a6 af | 88 eb 0d 9f f2 82 74 6e 72 69 04 07 19 3d d2 37 | 11 a5 22 ff d2 62 d9 98 57 a1 83 a7 1e 49 51 44 | e5 97 9b 8d 73 a0 96 d3 53 9b fb 45 84 94 f7 3d | 76 31 fc 24 62 7d a9 38 2a be 46 8d 20 60 df db | 07 4b 68 3b f4 5c 0f 39 ef 4f 67 78 1a 41 5e d9 | 21 46 6b 9d 25 f7 b9 97 47 6b 61 67 28 72 bc ab | 6f b2 d8 94 3c 23 68 03 63 f9 fd 48 53 49 f9 59 | 58 72 d8 2c 34 ca e6 db de 5e 25 73 b8 b7 64 58 | c2 d1 ad 6f 0e ca 13 2e b2 5c 80 d7 ba 3d 3c a9 | 3d f9 8e 60 bf 1b 92 40 5e 5c 05 7e ba c9 a8 db | 73 77 de d1 63 54 7f e1 7b 4e 7b ea 38 36 f5 df | ad 83 e3 b0 ba 8d 91 72 ad 79 42 21 5b 3d 90 52 | 8f 94 65 66 3d 81 71 1c 3b 5e 4d 22 19 2e a8 97 | 29 00 00 24 16 ec e2 f4 0d c3 b4 c6 88 17 fa c1 | 57 1b 6f 8e 72 cf d0 88 9c 45 18 d1 76 a6 22 b7 | e9 88 2c 7a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 7d b4 14 23 b3 6a c1 75 92 cb 9c | f1 ae 10 a4 55 81 67 0f 00 00 00 1c 00 00 40 05 | d3 a6 c6 52 7d d4 a1 eb 3d cd 3f 6c 65 3f cc dd | 6f e3 2d 43 | libevent_free: release ptr-libevent@0x7fb3540251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac2900 | #317 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c a2 6c e8 b2 28 e0 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #317 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #317 | rejected packet: | 5c a2 6c e8 b2 28 e0 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #317: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afcfc0 | handling event EVENT_RETRANSMIT for parent state #80 | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #80 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #80 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49671.081675; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006271 exceeds limit? YES "road-eastnet-nonat-80" #80: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-80" #80: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #332 at 0x557d46a40710 | State DB: adding IKEv2 state #332 in UNDEFINED | pstats #332 ikev2.ike started | Message ID: init #332: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #332: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #332; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-80" #332: initiating v2 parent SA to replace #80 | using existing local IKE proposals for connection road-eastnet-nonat-80 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 332 for state #332 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ac2900 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #332 | libevent_malloc: new ptr-libevent@0x7fb3540251c0 size 128 | #332 spent 0.0775 milliseconds in ikev2_parent_outI1() | crypto helper 4 resuming | RESET processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 starting work-order 332 for state #332 | start processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #80 ikev2.ike failed too-many-retransmits | pstats #80 ikev2.ike deleted too-many-retransmits | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 332 | #80 spent 2.19 milliseconds in total | [RE]START processing: state #80 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-80" #80: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #80: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #80 "road-eastnet-nonat-80" #80: deleting IKE SA for connection 'road-eastnet-nonat-80' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-80' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-80 | State DB: deleting IKEv2 state #80 in PARENT_I1 | parent state #80: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #80 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 332 time elapsed 0.000991 seconds | libevent_free: release ptr-libevent@0x7fb374045df0 | (#332) spent 0.997 milliseconds in crypto helper computing work-order 332: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 332 for state #332 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afcfc0 | scheduling resume sending helper answer for #332 | in statetime_stop() and could not find #80 | libevent_malloc: new ptr-libevent@0x7fb35804ba00 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 4 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-80 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-80" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-80' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-80" | stop processing: connection "road-eastnet-nonat-80" (in initiate_a_connection() at initiate.c:349) | spent 0.0735 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #332 | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 332 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #332 | **emit ISAKMP Message: | initiator cookie: | f6 c6 d2 5e ba a8 2a f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-80 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 45 1a 55 0f 26 2f b6 a0 08 51 81 5d b7 71 b9 2d | ikev2 g^x c5 80 10 57 cc 9f 39 cd 78 f5 33 cd 29 d9 74 2d | ikev2 g^x fd fd 10 79 da 5f 98 34 d3 3d e4 28 2e 71 42 b8 | ikev2 g^x 31 90 4d 52 c2 47 b7 94 df 57 9e 16 03 38 42 c0 | ikev2 g^x 07 fe 24 67 18 0a bc 2f be 06 80 3f 3f 52 ae de | ikev2 g^x ee ce 07 d7 03 01 92 16 62 42 5c 77 dc 87 62 e2 | ikev2 g^x 3a dd 16 7d 8f 37 3d c8 ba 22 d8 ef 9b 9d 2a 3d | ikev2 g^x e0 2c 5c 39 14 07 d4 e9 80 bd 41 35 a2 65 f5 06 | ikev2 g^x d6 66 0e 9c 09 15 5b 2c 90 ec 66 68 2a aa 32 c8 | ikev2 g^x f4 e9 0e 83 19 df 87 aa b7 d2 50 b1 70 7c e8 1d | ikev2 g^x 69 9d 8f db 7f c7 e2 b0 71 77 37 93 72 6b 02 1f | ikev2 g^x ff 20 a4 e2 5f 72 65 e8 93 2e 78 8f 02 5c 26 b8 | ikev2 g^x d6 41 94 30 c6 30 1d fb 21 2d 70 c7 a4 c4 37 64 | ikev2 g^x d1 d0 93 45 ae 86 94 3c ef 88 96 54 5d 14 dc 13 | ikev2 g^x 82 20 c0 68 d6 ce 1b eb 97 51 ea 00 31 01 9f 99 | ikev2 g^x 9c 00 ca 7b c6 e3 21 ad 8a 48 45 1f d8 69 47 47 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 92 2b 4a ab c7 31 ef e2 7b 94 b4 08 46 bc 96 1f | IKEv2 nonce c5 de 4e 6b bb 45 28 4b ff e0 00 6e 79 8b 88 15 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f6 c6 d2 5e ba a8 2a f7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 50 | natd_hash: port= 01 f4 | natd_hash: hash= 10 fd 6f fe 83 1d 32 21 59 ad 4f 6d 1b 98 f5 b3 | natd_hash: hash= 09 7a d7 45 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 10 fd 6f fe 83 1d 32 21 59 ad 4f 6d 1b 98 f5 b3 | Notify data 09 7a d7 45 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f6 c6 d2 5e ba a8 2a f7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f2 d1 58 ca ab 44 6f 50 93 d1 3e f5 88 73 05 cc | natd_hash: hash= 3b a4 3c c0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f2 d1 58 ca ab 44 6f 50 93 d1 3e f5 88 73 05 cc | Notify data 3b a4 3c c0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #332 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #332: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #332 to 4294967295 after switching state | Message ID: IKE #332 skipping update_recv as MD is fake | Message ID: sent #332 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-80" #332: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.80:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #332) | f6 c6 d2 5e ba a8 2a f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 1a 55 0f 26 2f b6 a0 08 51 81 5d b7 71 b9 2d | c5 80 10 57 cc 9f 39 cd 78 f5 33 cd 29 d9 74 2d | fd fd 10 79 da 5f 98 34 d3 3d e4 28 2e 71 42 b8 | 31 90 4d 52 c2 47 b7 94 df 57 9e 16 03 38 42 c0 | 07 fe 24 67 18 0a bc 2f be 06 80 3f 3f 52 ae de | ee ce 07 d7 03 01 92 16 62 42 5c 77 dc 87 62 e2 | 3a dd 16 7d 8f 37 3d c8 ba 22 d8 ef 9b 9d 2a 3d | e0 2c 5c 39 14 07 d4 e9 80 bd 41 35 a2 65 f5 06 | d6 66 0e 9c 09 15 5b 2c 90 ec 66 68 2a aa 32 c8 | f4 e9 0e 83 19 df 87 aa b7 d2 50 b1 70 7c e8 1d | 69 9d 8f db 7f c7 e2 b0 71 77 37 93 72 6b 02 1f | ff 20 a4 e2 5f 72 65 e8 93 2e 78 8f 02 5c 26 b8 | d6 41 94 30 c6 30 1d fb 21 2d 70 c7 a4 c4 37 64 | d1 d0 93 45 ae 86 94 3c ef 88 96 54 5d 14 dc 13 | 82 20 c0 68 d6 ce 1b eb 97 51 ea 00 31 01 9f 99 | 9c 00 ca 7b c6 e3 21 ad 8a 48 45 1f d8 69 47 47 | 29 00 00 24 92 2b 4a ab c7 31 ef e2 7b 94 b4 08 | 46 bc 96 1f c5 de 4e 6b bb 45 28 4b ff e0 00 6e | 79 8b 88 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 fd 6f fe 83 1d 32 21 59 ad 4f 6d | 1b 98 f5 b3 09 7a d7 45 00 00 00 1c 00 00 40 05 | f2 d1 58 ca ab 44 6f 50 93 d1 3e f5 88 73 05 cc | 3b a4 3c c0 | state #332 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3540251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ac2900 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afcfc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #332 | libevent_malloc: new ptr-libevent@0x7fb374045df0 size 128 | #332 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49671.083333 | resume sending helper answer for #332 suppresed complete_v2_state_transition() and stole MD | #332 spent 0.37 milliseconds in resume sending helper answer | stop processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35804ba00 | timer_event_cb: processing event@0x7fb35c012bf0 | handling event EVENT_RETRANSMIT for parent state #325 | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #325 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #325 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49671.083367; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50096 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #325 | libevent_malloc: new ptr-libevent@0x7fb35804ba00 size 128 "road-eastnet-nonat-73" #325: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #325) | cc 62 92 c7 07 e9 0f 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 78 1e 62 84 10 5f b3 3f 6a 1c 99 15 ef b2 82 | ab 2f bf af 7d 91 0a 7a 06 0b c3 b0 8f 52 23 e0 | 2a 6c c7 c4 de c8 66 7c 42 9d 81 5e 4d 92 4f 0b | 2b a2 91 3c a6 4c 27 12 5d 3b 8e 56 27 02 38 a0 | d6 c6 eb ec 94 e3 d3 7c 60 71 44 03 de ee 1c 20 | b0 a7 fc d5 f0 33 3d 58 40 9a 40 7c 4b ef 22 f2 | e4 98 7c df 9e 84 f0 00 c2 3a 23 ca 54 c0 d4 32 | 78 ec 09 e7 04 f1 06 b2 16 5d 5c 32 c7 62 b8 41 | 9e c8 62 f4 94 dc ed 85 b6 72 ee e7 73 a0 4e 8f | 20 26 e2 05 be 3a 4e 16 75 b9 60 31 64 9c 09 14 | ad be c7 c8 b5 48 83 aa 5c 33 7b 3c 0a 72 26 74 | 75 7b 8e 60 49 df aa 10 6d 2e c8 c2 08 b3 b5 75 | e0 b2 66 ad ea 56 f8 5f 65 d4 40 09 52 2c f1 dd | 08 91 8c 9a aa bf 76 e2 bf e4 1a 3b 53 96 c1 d8 | e5 63 67 aa b1 58 7e 5f 20 cf 8d 72 df da b4 0e | bf a9 5c cc d8 b0 81 7f 8f b4 f2 bf dd 09 8c 23 | 29 00 00 24 bd d5 db 94 ee 32 26 3b fc 5c d2 c6 | e1 33 da da 8c 36 b9 7d d8 b6 53 e3 83 8c 71 5a | ae 9b 26 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 04 08 e6 80 0c ed de 4c 99 bb 24 | eb 89 b5 9f d3 24 a6 8a 00 00 00 1c 00 00 40 05 | 55 23 78 6b d1 b2 f4 84 29 a3 9f e9 4d 04 41 1c | 82 df 78 f0 | libevent_free: release ptr-libevent@0x7fb384015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | #325 spent 0.0711 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 c6 d2 5e ba a8 2a f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #332 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #332 | rejected packet: | f6 c6 d2 5e ba a8 2a f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #332: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 62 92 c7 07 e9 0f 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #325 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #325 | rejected packet: | cc 62 92 c7 07 e9 0f 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #325: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0374 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_RETRANSMIT for parent state #305 | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #305 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #305 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49671.087634; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003859 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #305 | libevent_malloc: new ptr-libevent@0x7fb384015370 size 128 "road-eastnet-nonat-53" #305: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #305) | 0e ad 9d c2 5e 8b 6a 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f e9 9f 5a 6d 09 7a 5d 23 c1 f2 37 ec ac 20 ff | 0b 05 30 7f 53 42 af cd 03 b4 6f 3e 30 98 76 c7 | f6 6d 6d 12 6f 8b e0 b3 ea 9f 1c 72 a6 90 d8 7b | c5 96 6d 18 3e 75 5f 76 31 a1 d4 8e 3c 37 16 33 | 4b dd 74 20 e8 c4 62 66 2a 3f ae 2f 41 fd 91 9d | 82 99 62 7a b3 d1 ba 05 ec 0f 82 e6 50 45 b8 02 | a6 bb b5 5a eb 4b 5a 37 8e aa cf ae a4 3c 1d 53 | 50 52 15 71 96 99 84 38 c8 90 39 55 a5 f6 b3 e4 | fd 1f be 6b e2 f1 ec 6b de 7b d5 b2 c2 99 77 3a | 99 91 64 fd 16 0c de 9a 77 95 51 ab fa 63 18 46 | 7f 05 f1 01 08 4a 40 52 ce 73 f7 5e 69 b6 5a cc | 4f 80 84 49 75 3b fb a8 21 4b 60 95 55 81 f4 0d | cb 05 bd e3 26 c4 5a 85 f3 a4 be ed 0d bf dc 15 | 6d 89 c4 7e 34 fc cc cd 95 5c 1d d7 12 73 97 3c | b9 13 4a ef 01 3e 06 0d bc ac d0 d1 a5 d2 76 b5 | 0f e8 f3 1a 11 93 b0 3e ca db 92 a3 66 d7 f8 e1 | 29 00 00 24 f3 38 4c 4d 23 45 96 5c 15 55 c7 5a | 82 60 67 82 ca 1f 2d 10 e7 40 18 d9 8a a9 22 da | 5f 97 93 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 2a f3 b2 21 79 dc dd 37 78 74 cf | d5 e0 cd fd 06 29 e6 7b 00 00 00 1c 00 00 40 05 | 89 f1 13 5f 51 69 37 8e 62 27 27 24 a2 bd 48 85 | 3c 78 e4 8e | libevent_free: release ptr-libevent@0x7fb36004b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | #305 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e ad 9d c2 5e 8b 6a 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #305 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #305 | rejected packet: | 0e ad 9d c2 5e 8b 6a 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #305: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #318 | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #318 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #318 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49671.10999; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002177 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #318 | libevent_malloc: new ptr-libevent@0x7fb36004b850 size 128 "road-eastnet-nonat-66" #318: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #318) | b2 9a b8 bc 53 a3 28 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 a5 e6 b7 f3 09 b3 42 4d 70 2a 31 41 4a a2 a1 | da f8 c5 36 7a f2 dc 2d e7 30 c8 c3 07 0a c2 47 | 04 c4 b8 ae 57 b2 7f d1 c1 3e 18 53 e1 5d 14 23 | 04 61 06 e4 91 ef 35 cb ed 7a b9 57 a4 d9 68 76 | fa fd da 0f 58 44 d0 fa 3e 4e 2b ac ca 5d a5 c8 | 76 05 a5 5d 02 6a 96 c6 41 4e 3f 64 57 cd 41 d5 | d0 97 ad ff 58 6a 53 9a 01 1f 6b 3c 24 fe 31 ac | 0d 3c 93 ac 2c da 29 01 1d c2 dd be c2 11 80 ff | b5 b8 9d 4b 81 9c 72 55 6a 84 69 3f d0 ed e9 0c | 2b e3 ca 41 a3 62 7c a2 71 2a 37 58 65 17 c1 53 | cd 34 43 97 e4 05 81 70 70 41 b7 fe ed 43 15 27 | b6 ca b7 9c 9b 05 11 e5 9d 9d 78 a9 d5 63 3e b9 | 63 ef dc 73 f8 b5 32 8d f5 20 3c b0 29 8a 0d 0c | 3e 9f 40 29 07 45 7e 5f 6e e1 39 0d cb 64 2d c9 | 21 f3 18 88 11 a7 78 9d e5 c3 5e 82 9b 66 98 d0 | bb 21 5b 84 f3 89 c9 aa 9f 01 2e d6 67 59 8b 4c | 29 00 00 24 ef 94 98 d7 0c cd d4 f9 7f 97 bf da | 65 7b fd be ba 01 e1 85 cc 2b 5d 20 cf d0 d6 ef | 60 90 51 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 61 27 ec f1 41 a3 45 56 13 d5 ea | 91 6f ea fa 23 e5 f5 e5 00 00 00 1c 00 00 40 05 | d1 cc 61 18 e0 64 68 30 f0 cc 90 9d 95 49 27 67 | 23 d5 d1 7a | libevent_free: release ptr-libevent@0x7fb364045e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | #318 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 9a b8 bc 53 a3 28 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #318 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #318 | rejected packet: | b2 9a b8 bc 53 a3 28 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #318: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a672d0 | handling event EVENT_RETRANSMIT for parent state #278 | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #278 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #278 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49671.110212; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002825 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #278 | libevent_malloc: new ptr-libevent@0x7fb364045e60 size 128 "road-eastnet-nonat-26" #278: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #278) | 08 20 1d 54 94 b3 08 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 a1 ac cd cf 52 aa c1 15 fd 26 f6 ce 5b bb 69 | e2 24 51 98 69 82 96 7a 9b 39 3d bd 86 5c 17 cb | 1b d4 a9 83 ec 80 8d 8d 98 27 4b 99 f4 20 5c e3 | 21 59 7a 6e 94 3a e5 a4 ea 37 74 6c a3 9a 99 f4 | 8f 90 94 d4 bd 67 d7 b9 06 e3 7c d1 d3 76 37 58 | 47 a2 45 8a db 7e f9 85 d6 08 20 a6 bf 2b 7f c1 | 25 eb a0 f8 68 c1 9c c0 38 d2 e7 d9 43 7b cb 27 | 99 db 05 15 9d 31 4d 0f 10 f4 8b 1c a6 46 f5 eb | 21 00 56 37 46 de 0d 94 e5 1c 55 ca 89 03 da 88 | 4e dc 76 55 16 95 7d 63 e2 29 4d 09 2b 25 59 20 | f9 0f f3 3f f2 2e bd 84 bc f5 d7 26 2f 24 33 39 | 9b 95 39 a9 c8 80 99 61 48 09 51 76 c7 02 f7 7e | 9a 29 d4 87 ca 9f 9d b2 ea 2d 4b 02 ce 90 b0 a7 | 7e 1d de da 63 ea 0e 8d 96 e6 95 fb 1c 5e 88 3b | 6e ec 99 33 d7 e2 75 ac ca 10 ec 9b 00 5a c4 5e | 94 67 a1 9a 10 a7 22 d4 3e d5 55 a9 17 c5 c5 72 | 29 00 00 24 16 ad f5 49 a7 87 af 94 50 48 7a 22 | f4 eb b9 a7 0c 25 3c c9 61 3d 03 4a 9f 4c 8f 7c | d3 51 5e 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e fe 64 30 2d 54 01 ce c5 20 30 8e | 57 4b dd bc f4 7a 78 34 00 00 00 1c 00 00 40 05 | c5 ea 3a 3a ae 73 b8 b7 65 be 1b eb 5d 99 4d a3 | 57 6c 56 99 | libevent_free: release ptr-libevent@0x7fb35003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a672d0 | #278 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 20 1d 54 94 b3 08 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #278 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #278 | rejected packet: | 08 20 1d 54 94 b3 08 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #278: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afd040 | handling event EVENT_RETRANSMIT for parent state #81 | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #81 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #81 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49671.146483; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007533 exceeds limit? YES "road-eastnet-nonat-81" #81: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-81" #81: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #333 at 0x557d46a41cd0 | State DB: adding IKEv2 state #333 in UNDEFINED | pstats #333 ikev2.ike started | Message ID: init #333: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #333: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #333; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-81" #333: initiating v2 parent SA to replace #81 | using existing local IKE proposals for connection road-eastnet-nonat-81 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 333 for state #333 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a672d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #333 | libevent_malloc: new ptr-libevent@0x7fb35003b0b0 size 128 | crypto helper 13 resuming | crypto helper 13 starting work-order 333 for state #333 | #333 spent 0.073 milliseconds in ikev2_parent_outI1() | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 333 | RESET processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #81 ikev2.ike failed too-many-retransmits | pstats #81 ikev2.ike deleted too-many-retransmits | #81 spent 2.25 milliseconds in total | [RE]START processing: state #81 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-81" #81: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #81: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #81 "road-eastnet-nonat-81" #81: deleting IKE SA for connection 'road-eastnet-nonat-81' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-81' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-81 | State DB: deleting IKEv2 state #81 in PARENT_I1 | parent state #81: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #81 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 333 time elapsed 0.000811 seconds | libevent_free: release ptr-libevent@0x7fb3600407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afd040 | in statetime_stop() and could not find #81 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#333) spent 0.807 milliseconds in crypto helper computing work-order 333: ikev2_outI1 KE (pcr) | processing global timer EVENT_REVIVE_CONNS | crypto helper 13 sending results from work-order 333 for state #333 to event queue Initiating connection road-eastnet-nonat-81 which received a Delete/Notify but must remain up per local policy | scheduling resume sending helper answer for #333 | libevent_malloc: new ptr-libevent@0x7fb35c01a4e0 size 128 | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 13 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-81" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-81' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-81" | stop processing: connection "road-eastnet-nonat-81" (in initiate_a_connection() at initiate.c:349) | spent 0.0839 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #333 | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 333 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #333 | **emit ISAKMP Message: | initiator cookie: | 36 9c 5e f3 7a 54 db f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-81 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x df 35 02 78 fc 13 18 22 30 0e d2 c5 c7 5e 7a ef | ikev2 g^x fc 39 68 66 58 1c a7 d7 f4 43 08 7d f3 9f a3 12 | ikev2 g^x 83 85 91 2a d6 fa cf 49 c5 3a 4e ef 94 c1 54 16 | ikev2 g^x 1b 99 b1 a6 48 34 1c b5 c6 ee 58 e5 e4 3c 00 8c | ikev2 g^x f6 ed dc dd 07 96 4c 6b 8d 5f aa d5 5e f5 20 2e | ikev2 g^x 3f 32 89 26 7f 4e af 1e 9a 4a 36 89 bf ed bc fa | ikev2 g^x 5a d9 0b e6 38 d4 55 02 b6 04 ba b9 b2 30 b0 dc | ikev2 g^x ee 4b 24 b9 ca 12 84 2f 34 21 e3 1c 0e f7 c4 d5 | ikev2 g^x ce ff 47 39 50 96 0a de ca 62 7f b7 57 aa dc 15 | ikev2 g^x fa 24 df 17 c7 d0 80 14 18 ef d1 f8 18 5f 36 22 | ikev2 g^x 2a ba 77 eb 0a 13 5b 8b 27 f6 fa ad 95 0f 09 90 | ikev2 g^x 17 80 57 73 91 84 22 c2 f7 e1 0e dd b5 d9 e2 7e | ikev2 g^x 44 ff ae 13 c1 78 7c 90 56 b5 79 a1 5d 2f 9a 4e | ikev2 g^x 56 4b 74 fa 8f 64 20 07 77 6a 9d cf 03 50 e4 f8 | ikev2 g^x 0d 1d ad 75 e0 c0 52 df 18 df 4e ac 10 5a bf 8c | ikev2 g^x 35 df 7e 38 e0 d8 bf ff 6f 7d 3a 37 d3 86 c3 73 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0e 6c f9 b7 77 8c 01 48 47 c0 c4 ac 2c 92 5d 4f | IKEv2 nonce bc 4c de 69 52 73 e8 16 78 88 9e ed d3 2e 55 f7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 36 9c 5e f3 7a 54 db f1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 51 | natd_hash: port= 01 f4 | natd_hash: hash= 9f 3c 0e c8 f8 59 38 94 13 7f 9d fb 64 4c f1 0b | natd_hash: hash= 3e 49 1c bd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9f 3c 0e c8 f8 59 38 94 13 7f 9d fb 64 4c f1 0b | Notify data 3e 49 1c bd | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 36 9c 5e f3 7a 54 db f1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 19 5d c9 52 f0 58 98 88 cd 4a c6 e4 d4 78 0a 3b | natd_hash: hash= 9f f4 40 6f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 19 5d c9 52 f0 58 98 88 cd 4a c6 e4 d4 78 0a 3b | Notify data 9f f4 40 6f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #333 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #333: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #333 to 4294967295 after switching state | Message ID: IKE #333 skipping update_recv as MD is fake | Message ID: sent #333 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-81" #333: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.81:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #333) | 36 9c 5e f3 7a 54 db f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df 35 02 78 fc 13 18 22 30 0e d2 c5 c7 5e 7a ef | fc 39 68 66 58 1c a7 d7 f4 43 08 7d f3 9f a3 12 | 83 85 91 2a d6 fa cf 49 c5 3a 4e ef 94 c1 54 16 | 1b 99 b1 a6 48 34 1c b5 c6 ee 58 e5 e4 3c 00 8c | f6 ed dc dd 07 96 4c 6b 8d 5f aa d5 5e f5 20 2e | 3f 32 89 26 7f 4e af 1e 9a 4a 36 89 bf ed bc fa | 5a d9 0b e6 38 d4 55 02 b6 04 ba b9 b2 30 b0 dc | ee 4b 24 b9 ca 12 84 2f 34 21 e3 1c 0e f7 c4 d5 | ce ff 47 39 50 96 0a de ca 62 7f b7 57 aa dc 15 | fa 24 df 17 c7 d0 80 14 18 ef d1 f8 18 5f 36 22 | 2a ba 77 eb 0a 13 5b 8b 27 f6 fa ad 95 0f 09 90 | 17 80 57 73 91 84 22 c2 f7 e1 0e dd b5 d9 e2 7e | 44 ff ae 13 c1 78 7c 90 56 b5 79 a1 5d 2f 9a 4e | 56 4b 74 fa 8f 64 20 07 77 6a 9d cf 03 50 e4 f8 | 0d 1d ad 75 e0 c0 52 df 18 df 4e ac 10 5a bf 8c | 35 df 7e 38 e0 d8 bf ff 6f 7d 3a 37 d3 86 c3 73 | 29 00 00 24 0e 6c f9 b7 77 8c 01 48 47 c0 c4 ac | 2c 92 5d 4f bc 4c de 69 52 73 e8 16 78 88 9e ed | d3 2e 55 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 3c 0e c8 f8 59 38 94 13 7f 9d fb | 64 4c f1 0b 3e 49 1c bd 00 00 00 1c 00 00 40 05 | 19 5d c9 52 f0 58 98 88 cd 4a c6 e4 d4 78 0a 3b | 9f f4 40 6f | state #333 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35003b0b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a672d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388015720 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #333 | libevent_malloc: new ptr-libevent@0x7fb3600407f0 size 128 | #333 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49671.148143 | resume sending helper answer for #333 suppresed complete_v2_state_transition() and stole MD | #333 spent 0.579 milliseconds in resume sending helper answer | stop processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c01a4e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 9c 5e f3 7a 54 db f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #333 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #333 | rejected packet: | 36 9c 5e f3 7a 54 db f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 51 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #333: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0728 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #326 | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #326 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #326 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49671.15035; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500547 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #326 | libevent_malloc: new ptr-libevent@0x7fb35c01a4e0 size 128 "road-eastnet-nonat-74" #326: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #326) | 42 f4 17 bf 0b bc 36 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 f1 42 33 74 d0 fe 82 a0 d4 22 fd 7e 34 64 49 | 4d f5 d3 8f 3e 37 b5 af 12 9f 05 ef b3 72 9a 99 | 78 df 2d 2f c1 8c de 77 86 8e 9d 6b 67 d9 af af | ad cd b2 74 66 27 67 e3 45 6f da e1 b8 1d 10 12 | aa 54 5a 52 9a fc e0 30 8f 8b 79 31 12 59 11 92 | 5a a1 07 c2 c4 b1 d0 f4 f9 0f 04 f7 fe f9 b1 b9 | c8 5b 99 45 a3 87 06 f5 cc 08 82 18 bb f1 79 c6 | 9f 6d fc 2f c8 a5 4a bb b2 a8 2f 54 59 10 ab c2 | 83 cd 07 a2 e9 49 2a 19 10 9b b3 c3 b9 59 af 8a | 82 ad ef ed 34 d0 18 f1 8e 6d d9 f9 1b 1e 64 1d | ec 20 a9 3c a9 39 c4 6f 5c 5b 8b c5 2f aa 09 df | 17 b3 bf d7 16 36 cf cd 3e 0b 96 b5 5a 10 91 84 | f4 f3 63 75 93 27 25 04 41 5d c2 9e 4a 8a 6e e8 | b0 1c 23 7f 1d 44 0d 90 e6 7c 9c aa 0e b4 1e 03 | 9a ca 50 45 b0 6c ee 84 fe cf 35 d4 8b f6 71 45 | c0 43 28 23 ec 38 bc a8 e6 b5 85 28 d9 a1 fe 85 | 29 00 00 24 f7 60 f4 89 79 23 81 74 40 fe e0 94 | 99 4a 8a 5f b0 ba 18 0a 74 b7 e9 e4 4c 15 74 6f | 38 fd 32 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 0a 23 00 01 aa ce 92 9c 9e 81 0a | b1 b8 dc a9 c7 b7 f1 4a 00 00 00 1c 00 00 40 05 | 06 aa ce 4d 77 27 34 16 db f8 8e b3 38 da ae 93 | 3f 43 ba fe | libevent_free: release ptr-libevent@0x7fb3600251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #326 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 f4 17 bf 0b bc 36 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #326 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #326 | rejected packet: | 42 f4 17 bf 0b bc 36 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #326: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0687 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45310 | handling event EVENT_RETRANSMIT for parent state #306 | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #306 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #306 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49671.166947; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003534 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #306 | libevent_malloc: new ptr-libevent@0x7fb3600251c0 size 128 "road-eastnet-nonat-54" #306: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #306) | fd d2 63 50 0e 6e 1e 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc f6 1e 22 b4 91 3a 68 1f d1 67 6d 28 c8 f1 bf | e2 6e 14 07 e3 24 35 86 32 c0 3d 31 76 0e 87 74 | f9 3c 48 85 fb a5 36 8c 2d 66 01 91 c5 ea 8c 52 | 2c 54 17 a9 6d 05 2c 50 21 08 25 54 8a 1b be 0a | 1d bd df b6 06 bd 44 6a d2 67 92 4c 02 bb 81 0c | c5 ff 14 e5 24 16 2f 34 f8 b9 eb 90 9f 21 2d 2e | b4 e3 0a 67 2a 94 b3 b5 79 5e 99 67 ad f2 05 03 | 3c 2d de 97 30 2e 1c 04 bc c1 21 b5 15 d2 d7 d9 | ea a8 e1 e4 5e c5 d4 35 2f fe 33 59 95 e2 b7 3c | 23 52 f4 04 24 af 5a 95 09 7f 61 6c 7a 9b e9 50 | d2 38 26 f9 d3 19 e4 0a 3c be ac cf c6 ff b4 45 | b0 35 a0 dc ec 70 3d 13 ab c2 8a 53 0d 47 68 05 | 67 66 c8 1a af d5 d2 45 a5 c1 6e df ea 2b 64 70 | 05 da 5e 15 ac a3 ed f4 40 10 0f 5a 84 40 9e bc | d6 87 16 fd 3f a2 ff 39 19 ba 66 6d 2d e9 93 fd | b9 22 df b5 78 f4 f7 04 ee c7 91 83 7d a9 ca f1 | 29 00 00 24 c2 6f b9 fd fc 4f db 1a 3d 3f c0 a7 | af 7a 63 dc 70 8f 4c 18 81 55 af 15 16 2b 00 41 | 32 ac cf 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 87 47 9a 56 3f e1 15 1e 01 4b 7f | bb 95 0e 04 49 a0 88 16 00 00 00 1c 00 00 40 05 | 0c f3 ae 84 0d fd 98 31 4d e7 cb a5 de d2 0b 07 | b0 31 98 21 | libevent_free: release ptr-libevent@0x7fb358046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45310 | #306 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd d2 63 50 0e 6e 1e 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #306 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #306 | rejected packet: | fd d2 63 50 0e 6e 1e 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #306: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0779 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abfd80 | handling event EVENT_RETRANSMIT for parent state #319 | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #319 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #319 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49671.171332; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001854 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45310 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #319 | libevent_malloc: new ptr-libevent@0x7fb358046040 size 128 "road-eastnet-nonat-67" #319: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #319) | 11 2f c2 e2 55 80 ad fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 29 97 2b 00 80 7a b2 ce 19 1b 94 79 57 61 71 | b5 31 67 66 2a f4 c8 dd 15 9f e0 ad 50 a1 3c 77 | 34 62 bd 4c c6 67 73 04 6a 47 e6 12 64 23 d5 1b | 98 65 2d 83 00 df 2d e7 e4 d4 74 c8 bc 36 30 29 | 44 5a 01 b4 02 e1 00 0f 8d ad 81 f9 8e 46 de 85 | 06 c3 07 15 fc b6 b0 15 06 43 f6 0e a8 fd 09 ef | d8 40 6e 21 d5 b3 5d 25 10 a6 87 71 c1 c1 fe d8 | bf 80 48 df 26 2b e7 63 6d 12 1e cf 0b 06 eb b0 | 7e 3e d5 d0 6b 21 8d aa 41 e8 f8 30 37 35 ac fc | 15 96 69 e5 f5 b2 90 e3 4e fe 2d ad 13 5f a0 e8 | 1c c7 69 35 1d b3 4c 80 f6 b9 3c 2d 05 13 72 b5 | 7e a3 0f 53 4b 80 32 e8 c3 5e b7 f7 2e ae 6c 5b | 24 7a c5 8a 0a 7f 55 0a 11 24 c0 ef fe 17 1d 30 | 05 8e ac 66 5c 3e f2 80 08 7e 41 35 dd 7a 17 b5 | ec 43 f0 d8 c9 61 5b 46 04 99 f3 93 60 24 02 4a | 51 18 18 5f 6c cb 3e f9 d1 40 eb 27 ba 67 3b b9 | 29 00 00 24 b8 88 60 8f 24 78 87 d6 7e a3 09 04 | de 05 ae 45 4d b7 3b ca 2f 96 5c 9a fa 13 da 85 | a2 c0 a1 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 04 44 46 25 45 86 78 cb ac b2 11 | 55 71 47 06 ea 13 d1 6f 00 00 00 1c 00 00 40 05 | 2f 9a c9 00 f1 11 a0 f7 d7 69 9d e9 ea e6 fc 70 | 38 db 7b 3a | libevent_free: release ptr-libevent@0x7fb36402a780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abfd80 | #319 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 2f c2 e2 55 80 ad fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #319 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #319 | rejected packet: | 11 2f c2 e2 55 80 ad fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #319: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0691 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7a390 | handling event EVENT_RETRANSMIT for parent state #279 | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #279 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #279 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49671.185716; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003812 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abfd80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #279 | libevent_malloc: new ptr-libevent@0x7fb36402a780 size 128 "road-eastnet-nonat-27" #279: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #279) | e3 74 db 6d 09 5b 39 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 0f 5a 1b 7a 8f ca c9 79 23 84 5e dc 90 86 16 | 69 23 cd b6 f6 38 83 88 87 a0 82 5d cb 87 94 7a | a5 f1 35 43 62 38 5c 18 da 06 83 48 7b 51 b2 80 | 57 ee 54 19 13 b6 1b 59 ab b3 f3 ce 4e 70 21 d2 | 1d 3f 07 6b c1 ad 15 8b 16 67 f3 79 c6 3f ee ff | 6b 97 0c 11 61 f6 68 6d 51 5b dc dc 69 1e f2 f8 | 31 6f 04 6f 19 7c a8 a9 37 a2 da ca be a8 40 a8 | d0 ef 42 ba be 70 25 1f 20 b2 dd 25 56 46 50 6a | 55 24 29 65 1f 8b ad 5a c0 f3 1f c2 6d ed 0d 17 | f8 37 85 23 72 0c 7b c5 c8 05 6a d0 1b 38 ca f1 | 63 79 aa 8b f0 75 7e c0 5c 06 26 d0 c2 20 b9 e9 | c7 89 2f ee 84 27 1c 00 f8 3a d5 7e 2a be c2 84 | e4 6a 7c 0c 25 65 bb 41 df ad ea 07 28 2c bc 6e | 24 1b 9a 66 f8 83 86 6a 84 b0 d9 93 6f e5 9a 01 | 17 24 34 ac 82 0a b8 a3 51 37 c3 89 94 09 92 d7 | 0d 37 14 e0 ee 1c 1b 73 ef 46 af cc fd ba 52 42 | 29 00 00 24 f9 6f e2 b3 2b d1 43 b4 d3 29 40 07 | 4f e9 c5 79 33 c1 2e 78 27 6c f8 54 58 c2 d9 c9 | 00 b6 d5 b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 94 ec 05 36 41 29 fa 93 f5 5d d2 | 39 00 ad d2 4d 2f 36 81 00 00 00 1c 00 00 40 05 | 7a 98 d6 69 28 79 15 19 95 89 31 96 52 96 29 94 | 7d 8f c3 a4 | libevent_free: release ptr-libevent@0x7fb37401f7f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7a390 | #279 spent 0.207 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 74 db 6d 09 5b 39 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #279 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #279 | rejected packet: | e3 74 db 6d 09 5b 39 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #279: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46af0c80 | handling event EVENT_RETRANSMIT for parent state #82 | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #82 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #82 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49671.218087; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.013298 exceeds limit? YES "road-eastnet-nonat-82" #82: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-82" #82: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #334 at 0x557d46a43290 | State DB: adding IKEv2 state #334 in UNDEFINED | pstats #334 ikev2.ike started | Message ID: init #334: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #334: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #334; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-82" #334: initiating v2 parent SA to replace #82 | using existing local IKE proposals for connection road-eastnet-nonat-82 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 334 for state #334 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7a390 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #334 | libevent_malloc: new ptr-libevent@0x7fb37401f7f0 size 128 | crypto helper 17 resuming | crypto helper 17 starting work-order 334 for state #334 | #334 spent 0.0769 milliseconds in ikev2_parent_outI1() | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 334 | RESET processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #82 ikev2.ike failed too-many-retransmits | pstats #82 ikev2.ike deleted too-many-retransmits | #82 spent 2.38 milliseconds in total | [RE]START processing: state #82 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-82" #82: deleting state (STATE_PARENT_I1) aged 64.015s and NOT sending notification | parent state #82: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #82 "road-eastnet-nonat-82" #82: deleting IKE SA for connection 'road-eastnet-nonat-82' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-82' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-82 | State DB: deleting IKEv2 state #82 in PARENT_I1 | parent state #82: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #82 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 334 time elapsed 0.000927 seconds | libevent_free: release ptr-libevent@0x7fb378046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af0c80 | in statetime_stop() and could not find #82 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#334) spent 0.93 milliseconds in crypto helper computing work-order 334: ikev2_outI1 KE (pcr) | processing global timer EVENT_REVIVE_CONNS | crypto helper 17 sending results from work-order 334 for state #334 to event queue | scheduling resume sending helper answer for #334 | libevent_malloc: new ptr-libevent@0x7fb35003b0b0 size 128 | crypto helper 17 waiting (nothing to do) Initiating connection road-eastnet-nonat-82 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-82" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-82' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-82" | stop processing: connection "road-eastnet-nonat-82" (in initiate_a_connection() at initiate.c:349) | spent 0.0733 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #334 | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 334 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #334 | **emit ISAKMP Message: | initiator cookie: | 99 fb 3f 4d 99 57 72 cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-82 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4a ca de c8 71 49 e8 30 84 13 c9 a8 49 58 85 47 | ikev2 g^x 09 f9 f9 59 70 d3 2b 07 44 44 cc 17 14 52 02 aa | ikev2 g^x 27 07 c2 cd 39 d4 b6 e5 73 79 a9 2f 72 89 bd 61 | ikev2 g^x d5 62 f8 e8 e6 f1 12 2e 57 7d d0 8e 8b 5d 7b ce | ikev2 g^x 30 2f b7 61 b2 0b 7b a0 24 5a fe 42 60 21 92 aa | ikev2 g^x 5a be e9 6d ac f6 2b f8 e4 db ed fe 70 91 ae a8 | ikev2 g^x 85 c9 a9 89 2d af 8b 90 60 53 0f 7b 1f 54 22 36 | ikev2 g^x b6 5d 78 20 de 79 62 7d 9d 74 65 df 47 cb 75 b6 | ikev2 g^x eb 4f 70 ec d4 3f 23 06 d7 65 0a b2 74 f8 e9 72 | ikev2 g^x 81 4c 29 37 9f 65 5b 7b c1 89 f7 c4 28 5b 64 9b | ikev2 g^x 59 6b b0 17 bf e7 21 58 4f ad 42 06 42 7b d5 d6 | ikev2 g^x 2f 45 bc a9 64 87 9f 47 9d 1c 11 c7 6e 0c 53 bf | ikev2 g^x a5 35 d6 5f eb b3 bf 80 3c b3 0d 2b 91 66 f7 a4 | ikev2 g^x 98 9c 01 6a 7e ee e3 b3 ad 96 90 67 e0 44 49 71 | ikev2 g^x 2a 4d 41 3b cc ae 39 dd 1f 03 62 e9 5e 5c bf 21 | ikev2 g^x 27 f6 9b 3e 24 35 1b f3 b8 96 3c e2 59 58 ea 9a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 64 85 28 2f 41 a8 19 c8 06 e4 df 4c 57 5a d5 28 | IKEv2 nonce ae 9b e4 58 e9 c7 cc 4b e4 65 be 72 5c d2 98 2f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 99 fb 3f 4d 99 57 72 cb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 52 | natd_hash: port= 01 f4 | natd_hash: hash= f7 3d 2f a6 85 1f fa fd 47 13 ee 3b 56 07 59 de | natd_hash: hash= 70 93 a0 2d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f7 3d 2f a6 85 1f fa fd 47 13 ee 3b 56 07 59 de | Notify data 70 93 a0 2d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 99 fb 3f 4d 99 57 72 cb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ab e9 3c 75 bd a4 6c 62 ac eb 51 4e 98 ab 45 51 | natd_hash: hash= fa 01 56 3d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ab e9 3c 75 bd a4 6c 62 ac eb 51 4e 98 ab 45 51 | Notify data fa 01 56 3d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #334 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #334: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #334 to 4294967295 after switching state | Message ID: IKE #334 skipping update_recv as MD is fake | Message ID: sent #334 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-82" #334: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.82:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #334) | 99 fb 3f 4d 99 57 72 cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a ca de c8 71 49 e8 30 84 13 c9 a8 49 58 85 47 | 09 f9 f9 59 70 d3 2b 07 44 44 cc 17 14 52 02 aa | 27 07 c2 cd 39 d4 b6 e5 73 79 a9 2f 72 89 bd 61 | d5 62 f8 e8 e6 f1 12 2e 57 7d d0 8e 8b 5d 7b ce | 30 2f b7 61 b2 0b 7b a0 24 5a fe 42 60 21 92 aa | 5a be e9 6d ac f6 2b f8 e4 db ed fe 70 91 ae a8 | 85 c9 a9 89 2d af 8b 90 60 53 0f 7b 1f 54 22 36 | b6 5d 78 20 de 79 62 7d 9d 74 65 df 47 cb 75 b6 | eb 4f 70 ec d4 3f 23 06 d7 65 0a b2 74 f8 e9 72 | 81 4c 29 37 9f 65 5b 7b c1 89 f7 c4 28 5b 64 9b | 59 6b b0 17 bf e7 21 58 4f ad 42 06 42 7b d5 d6 | 2f 45 bc a9 64 87 9f 47 9d 1c 11 c7 6e 0c 53 bf | a5 35 d6 5f eb b3 bf 80 3c b3 0d 2b 91 66 f7 a4 | 98 9c 01 6a 7e ee e3 b3 ad 96 90 67 e0 44 49 71 | 2a 4d 41 3b cc ae 39 dd 1f 03 62 e9 5e 5c bf 21 | 27 f6 9b 3e 24 35 1b f3 b8 96 3c e2 59 58 ea 9a | 29 00 00 24 64 85 28 2f 41 a8 19 c8 06 e4 df 4c | 57 5a d5 28 ae 9b e4 58 e9 c7 cc 4b e4 65 be 72 | 5c d2 98 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 3d 2f a6 85 1f fa fd 47 13 ee 3b | 56 07 59 de 70 93 a0 2d 00 00 00 1c 00 00 40 05 | ab e9 3c 75 bd a4 6c 62 ac eb 51 4e 98 ab 45 51 | fa 01 56 3d | state #334 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37401f7f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7a390 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380015720 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #334 | libevent_malloc: new ptr-libevent@0x7fb378046040 size 128 | #334 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49671.219753 | resume sending helper answer for #334 suppresed complete_v2_state_transition() and stole MD | #334 spent 0.468 milliseconds in resume sending helper answer | stop processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35003b0b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 fb 3f 4d 99 57 72 cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #334 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #334 | rejected packet: | 99 fb 3f 4d 99 57 72 cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 52 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #334: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350005860 | handling event EVENT_RETRANSMIT for parent state #280 | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #280 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #280 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49671.240957; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003723 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338012bf0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #280 | libevent_malloc: new ptr-libevent@0x7fb35003b0b0 size 128 "road-eastnet-nonat-28" #280: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #280) | d6 f7 ab 7c 0b ea 69 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca e1 05 9c 2f e1 85 fc d1 c1 5e ec 37 7e 0d 76 | 45 c5 de cd 99 7d 74 0a 48 32 65 23 49 b2 c2 df | ba 7e d2 ef 7c 32 31 03 10 0c 09 94 c0 eb b8 b5 | 06 97 c9 45 66 24 48 7d 72 da ab 98 55 09 59 9c | 31 af 0e c1 8a a9 90 d1 a5 1f 67 f1 af 23 81 27 | 72 13 c8 3c d8 f0 f1 d8 ca c2 a1 9a 92 8c fd 09 | b0 c2 a6 d5 91 c6 84 9b 99 40 a3 ac 3e 94 44 cd | 9a 36 6e be f8 2c 85 77 18 29 38 0d c0 06 06 d0 | a2 de 4c 8d 95 cd da f4 a0 2f bd 4d 70 4f 95 ae | db 5a f3 57 de 7c dd 31 a6 66 ca aa 68 cf 9d 1d | b3 0a 17 80 b5 20 24 43 82 44 17 25 0f 38 64 50 | 75 9d 57 76 b6 2b ee 0e 3f 93 33 cf 3f 9b 45 97 | f9 87 b6 87 a6 ec cb 33 18 44 a7 89 6a 59 c0 2b | ff 8a 7d 67 3d 1a 08 05 fe 9f fa 6c b7 f7 96 5d | a2 3b 23 c8 4a 7c 17 7b 08 d8 db 48 f9 5d 62 1b | 0b 5f d0 c6 c6 a2 28 ed 7c 45 7a f3 33 a6 d2 1f | 29 00 00 24 05 cd b3 b7 f3 87 52 75 9b b2 14 f4 | c3 19 28 f7 78 65 e3 f9 18 22 0f 07 13 10 65 88 | f1 44 b8 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a b5 25 17 f4 1a 4f 2a 05 d2 2d 99 | 3c 89 36 9b 9d 62 ed 5f 00 00 00 1c 00 00 40 05 | ee 9f 85 88 b6 c7 ef c2 a5 c8 d9 f7 7a e7 a6 c3 | 70 03 54 b6 | libevent_free: release ptr-libevent@0x7fb344008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350005860 | #280 spent 0.177 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 f7 ab 7c 0b ea 69 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #280 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #280 | rejected packet: | d6 f7 ab 7c 0b ea 69 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #280: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a15810 | handling event EVENT_RETRANSMIT for parent state #320 | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #320 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #320 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49671.267318; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001538 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #320 | libevent_malloc: new ptr-libevent@0x7fb344008e30 size 128 "road-eastnet-nonat-68" #320: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #320) | af c7 ee c1 89 d6 03 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 a8 bd a9 e5 4d 48 c1 fb 45 8d 11 bf a7 3a cc | c9 47 84 c7 e3 5d ec 21 4e d8 5a af 98 89 03 e4 | 61 3a ba 3d 60 86 ef 6f 17 de fb a4 db d7 d8 bb | dd a1 22 38 5e f6 ed 84 ef 59 30 63 60 c1 46 9c | 68 55 6e 9a 1e c0 57 7e 80 7e b6 a3 a2 d8 44 32 | cf 08 62 90 01 f4 f2 5f ed 1f e9 b3 6d aa b3 b5 | 51 0c 08 36 0d 22 74 67 a6 8c ed a0 79 50 51 2d | 0e 2f 3b 92 1e b3 eb 2d 06 7f 88 16 e6 58 28 17 | 60 5d c5 e1 99 65 2e 54 d8 fa ea 82 20 22 7c ff | b3 f5 72 25 7c 83 b1 cd 19 3e 2b da bc a9 3d dd | 76 aa 4a e2 d6 6a 5a 1c c6 a7 82 72 c8 70 00 2c | 36 b2 a4 f0 ac d5 1d 56 89 f2 8b 82 16 da 4e a9 | 45 8b f2 f1 83 02 06 ed 82 d4 33 ad 52 79 3a 05 | a1 a9 14 4d f9 86 6b dc 84 e1 88 2a d3 ae c1 8c | 43 6f 17 24 1b 1e 6c e9 e7 e2 8e 7a 04 41 d1 b0 | a9 68 50 65 7f 85 77 b4 91 10 c3 80 9a 3e 62 10 | 29 00 00 24 2e 21 9d f9 af ba 04 f5 8f 3b a6 14 | 4e db f7 72 ee 4f db 92 91 3b 76 55 23 0e 1b ed | b4 de fd 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 21 4b df 59 d9 64 c3 0f dc d7 26 | ba 28 50 c6 3e 72 d7 ec 00 00 00 1c 00 00 40 05 | d3 cb a5 46 ac a7 4b 5d c8 de d7 e5 bf c8 e6 16 | 1f 0a fc 46 | libevent_free: release ptr-libevent@0x7fb35804b970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a15810 | #320 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af c7 ee c1 89 d6 03 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #320 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #320 | rejected packet: | af c7 ee c1 89 d6 03 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #320: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #327 | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #327 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #327 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49671.271667; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500755 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a15810 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #327 | libevent_malloc: new ptr-libevent@0x7fb35804b970 size 128 "road-eastnet-nonat-75" #327: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #327) | cd 66 0f 9c 46 d2 2e 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c e2 6e 06 8e ba 7b 55 21 d6 ce 48 6f 3c 92 70 | 71 57 bb 2e 59 88 d0 8e 2a d9 1e 8b 54 64 af 4b | 40 4b af e2 a4 54 08 ce 78 99 d3 6e a5 bc 7d 40 | 54 45 d2 55 e5 04 88 a7 28 8f 77 11 a3 33 32 44 | c5 c1 f3 8c 73 cd 33 50 64 6e 8a 4a 03 1a e8 56 | 33 98 cb 05 7e 52 cf 35 2c 3c 0a 01 ff ea e2 ad | d8 80 22 71 7e 19 d2 b8 ce 67 79 24 c4 a0 f8 77 | 85 18 5e ad 8e 04 46 41 75 9b 16 af 02 fc dc 64 | 32 2e 9e 96 8f b4 82 0b 80 7e 79 12 22 b3 48 72 | b8 08 60 6b fb b5 54 a6 fa 64 f2 f2 1c f2 68 fd | a8 f7 9c d6 a5 ea 11 63 c4 ae d6 34 f7 8d 1a 64 | d2 72 49 10 16 1e e2 1a 26 c5 f0 ec 34 31 4a 5b | 0b 2e 91 90 5e 8e 26 12 f7 2c b6 7b b5 af 3d cb | 78 d2 30 c7 9f 03 58 c5 3d 03 c3 8e 6e cf 73 42 | 63 93 37 70 63 fa 64 09 ea e3 9b 55 c3 1a f4 3d | f3 be ab 22 fa 6d f3 45 4a 46 ad d5 84 8a f0 a1 | 29 00 00 24 90 b8 80 a5 9c 42 2b 50 2e f5 43 e6 | dc 43 6d 4e b8 ec af ce 7f 78 f5 24 c5 c3 2d 65 | bb f0 87 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc f4 a0 b4 bc 1c 55 2f e9 f9 68 07 | 2a e9 06 2c 8b 87 6b db 00 00 00 1c 00 00 40 05 | f6 e0 64 05 d4 ed 34 7f 04 0a 65 5a 6b 64 eb 2c | 7a ff a7 d3 | libevent_free: release ptr-libevent@0x7fb35c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #327 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a86b80 | handling event EVENT_RETRANSMIT for parent state #83 | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #83 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #83 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49671.271858; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007592 exceeds limit? YES "road-eastnet-nonat-83" #83: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-83" #83: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #335 at 0x557d46a44850 | State DB: adding IKEv2 state #335 in UNDEFINED | pstats #335 ikev2.ike started | Message ID: init #335: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #335: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #335; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-83" #335: initiating v2 parent SA to replace #83 | using existing local IKE proposals for connection road-eastnet-nonat-83 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 335 for state #335 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2cb90 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #335 | libevent_malloc: new ptr-libevent@0x7fb35c01d920 size 128 | #335 spent 0.0911 milliseconds in ikev2_parent_outI1() | crypto helper 18 resuming | RESET processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 starting work-order 335 for state #335 | start processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #83 ikev2.ike failed too-many-retransmits | pstats #83 ikev2.ike deleted too-many-retransmits | #83 spent 2.31 milliseconds in total | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 335 | [RE]START processing: state #83 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-83" #83: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #83: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #83 "road-eastnet-nonat-83" #83: deleting IKE SA for connection 'road-eastnet-nonat-83' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-83' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-83 | State DB: deleting IKEv2 state #83 in PARENT_I1 | parent state #83: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 335 time elapsed 0.000791 seconds | (#335) spent 0.791 milliseconds in crypto helper computing work-order 335: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 335 for state #335 to event queue | scheduling resume sending helper answer for #335 | libevent_malloc: new ptr-libevent@0x7fb35401a4e0 size 128 | crypto helper 18 waiting (nothing to do) | stop processing: state #83 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb38801abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a86b80 | in statetime_stop() and could not find #83 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cd 66 0f 9c 46 d2 2e 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #327 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #327 | rejected packet: | cd 66 0f 9c 46 d2 2e 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #327: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-83 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-83" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-83' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-83" | stop processing: connection "road-eastnet-nonat-83" (in initiate_a_connection() at initiate.c:349) | spent 0.0738 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #335 | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 335 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #335 | **emit ISAKMP Message: | initiator cookie: | 43 a2 0c b8 41 14 fb 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-83 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 80 1a ff fe 66 5c 27 50 3c bb 63 46 9d 4f 02 13 | ikev2 g^x 90 10 26 6b 8b bb ce 8e f8 b1 4e 76 fe b9 96 cb | ikev2 g^x 8a 27 62 97 df ca 55 0f 1b 21 02 63 f2 9a 56 cf | ikev2 g^x af a1 0c 10 6a 33 02 6e 92 2e ca f8 26 1a ae eb | ikev2 g^x 16 92 9e c4 5b 3e 17 4a 65 79 45 19 ed da 56 2e | ikev2 g^x 51 d3 90 a7 9f 98 36 5a 61 58 65 de 51 88 f2 d6 | ikev2 g^x 2c 74 21 5b 26 93 04 1f 9d 42 9f 74 af 5b 84 53 | ikev2 g^x 88 76 a7 2b 50 71 5f 03 19 11 aa 1d 3f 9a 1b be | ikev2 g^x 3f 66 50 7a 7c c6 ba 3a 1f b1 9f aa e7 d9 54 d2 | ikev2 g^x 8e 38 49 1c 3f da 85 98 28 e2 8c e3 a0 7e 8b bb | ikev2 g^x 1f a5 48 ea b8 af 51 41 c3 b5 72 51 f3 06 99 5a | ikev2 g^x 76 51 df 7b 88 a9 f4 af 6a 05 b3 e4 b4 4c ac 08 | ikev2 g^x 4f aa 11 34 cc 49 a5 06 8b 79 a3 52 45 cd 64 d8 | ikev2 g^x 83 12 a6 eb 44 69 b7 c9 e1 51 9a 09 19 b8 97 03 | ikev2 g^x 64 d6 b8 43 68 0f ed bf 4f 10 12 04 91 a0 82 30 | ikev2 g^x b8 e7 e9 9e 27 9b 68 9f 56 43 7c 93 6d 87 a8 e5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 42 02 24 73 b2 25 02 dc ca ad a2 1d 9e f8 54 e2 | IKEv2 nonce 15 e2 22 5d 3f 7b 60 32 c9 95 b0 ec b1 7e 62 26 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 43 a2 0c b8 41 14 fb 15 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 53 | natd_hash: port= 01 f4 | natd_hash: hash= c8 ff c7 be 47 4f 0e b7 8d ed 50 5b d9 e3 74 cc | natd_hash: hash= de e6 b4 2d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c8 ff c7 be 47 4f 0e b7 8d ed 50 5b d9 e3 74 cc | Notify data de e6 b4 2d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 43 a2 0c b8 41 14 fb 15 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 8d 0a fb 98 6b 40 87 d9 54 5c 96 0f 30 79 eb 55 | natd_hash: hash= 16 93 80 76 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8d 0a fb 98 6b 40 87 d9 54 5c 96 0f 30 79 eb 55 | Notify data 16 93 80 76 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #335 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #335: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #335 to 4294967295 after switching state | Message ID: IKE #335 skipping update_recv as MD is fake | Message ID: sent #335 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-83" #335: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.83:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #335) | 43 a2 0c b8 41 14 fb 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 1a ff fe 66 5c 27 50 3c bb 63 46 9d 4f 02 13 | 90 10 26 6b 8b bb ce 8e f8 b1 4e 76 fe b9 96 cb | 8a 27 62 97 df ca 55 0f 1b 21 02 63 f2 9a 56 cf | af a1 0c 10 6a 33 02 6e 92 2e ca f8 26 1a ae eb | 16 92 9e c4 5b 3e 17 4a 65 79 45 19 ed da 56 2e | 51 d3 90 a7 9f 98 36 5a 61 58 65 de 51 88 f2 d6 | 2c 74 21 5b 26 93 04 1f 9d 42 9f 74 af 5b 84 53 | 88 76 a7 2b 50 71 5f 03 19 11 aa 1d 3f 9a 1b be | 3f 66 50 7a 7c c6 ba 3a 1f b1 9f aa e7 d9 54 d2 | 8e 38 49 1c 3f da 85 98 28 e2 8c e3 a0 7e 8b bb | 1f a5 48 ea b8 af 51 41 c3 b5 72 51 f3 06 99 5a | 76 51 df 7b 88 a9 f4 af 6a 05 b3 e4 b4 4c ac 08 | 4f aa 11 34 cc 49 a5 06 8b 79 a3 52 45 cd 64 d8 | 83 12 a6 eb 44 69 b7 c9 e1 51 9a 09 19 b8 97 03 | 64 d6 b8 43 68 0f ed bf 4f 10 12 04 91 a0 82 30 | b8 e7 e9 9e 27 9b 68 9f 56 43 7c 93 6d 87 a8 e5 | 29 00 00 24 42 02 24 73 b2 25 02 dc ca ad a2 1d | 9e f8 54 e2 15 e2 22 5d 3f 7b 60 32 c9 95 b0 ec | b1 7e 62 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 ff c7 be 47 4f 0e b7 8d ed 50 5b | d9 e3 74 cc de e6 b4 2d 00 00 00 1c 00 00 40 05 | 8d 0a fb 98 6b 40 87 d9 54 5c 96 0f 30 79 eb 55 | 16 93 80 76 | state #335 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c01d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2cb90 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #335 | libevent_malloc: new ptr-libevent@0x7fb38801abe0 size 128 | #335 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49671.273514 | resume sending helper answer for #335 suppresed complete_v2_state_transition() and stole MD | #335 spent 0.486 milliseconds in resume sending helper answer | stop processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35401a4e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 a2 0c b8 41 14 fb 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #335 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #335 | rejected packet: | 43 a2 0c b8 41 14 fb 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 53 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #335: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47e90 | handling event EVENT_RETRANSMIT for parent state #281 | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #281 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #281 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49671.310687; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004935 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a86b80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #281 | libevent_malloc: new ptr-libevent@0x7fb35401a4e0 size 128 "road-eastnet-nonat-29" #281: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #281) | 6e a6 a1 b4 01 a0 0e dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 68 2b 46 8c 2b 9e 7f b4 06 ec 72 36 3a be fa | 50 91 b7 48 61 bc d4 d3 11 dc 1f d6 9a c1 21 a2 | 97 1d cf c0 4e 3d 88 c1 96 35 32 5c c3 c4 b5 d1 | 96 85 b6 1e 34 48 5e 70 e1 97 d1 4d ee c9 36 cd | 07 d4 c1 98 8c 4b f8 c0 2b 58 50 1f 39 3f 7e 62 | c9 4e 54 20 95 c8 4c fc 93 c6 64 05 ff db 54 92 | f9 8c d4 27 f6 69 ac 7b 53 12 4d 7e 22 de e0 4c | 9b 65 6e 55 e2 59 db 77 7d a0 70 9f cd fd b6 7a | 15 79 9a 65 29 97 e4 c6 46 84 7b 52 6e 4e 1b 43 | 80 ec d1 87 3d 75 43 f1 6b 08 60 65 d9 e2 6c 04 | c5 f0 75 0d 72 fe 09 0a a5 0a 64 0c 9d 8e b4 bd | 1a c3 bb 6e f6 92 c0 b5 8c 93 b9 eb e3 12 c7 a1 | bd b7 f3 a0 b9 80 8c 76 59 8f 43 af 0f 58 66 7f | b7 29 f0 c0 1c a1 51 2d c9 c0 ac e0 da 3e 0a fc | dd 42 1f ec 76 07 0c b3 ee 58 80 d8 3b 40 cd 6e | 29 12 48 14 35 22 e0 cf 05 9a 1b 46 91 35 4f 0c | 29 00 00 24 1a c7 00 d3 83 91 04 b5 76 85 d3 69 | a2 08 a9 2c b0 b3 a2 60 be 18 eb 18 2d fd ba 85 | 0c 0a 5c be 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 cf b4 85 53 44 b8 30 db 31 85 32 | 18 7e 13 4c d0 54 13 87 00 00 00 1c 00 00 40 05 | 54 d2 36 85 02 19 96 85 9c 4b 22 1c 55 b4 68 ad | 30 56 22 92 | libevent_free: release ptr-libevent@0x7fb38800a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47e90 | #281 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6e a6 a1 b4 01 a0 0e dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #281 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #281 | rejected packet: | 6e a6 a1 b4 01 a0 0e dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #281: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0481 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a50110 | handling event EVENT_RETRANSMIT for parent state #321 | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #321 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #321 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49671.327983; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002341 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47e90 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #321 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 "road-eastnet-nonat-69" #321: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #321) | 30 42 c0 64 91 b3 77 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 8b 42 a5 47 61 3e b2 88 66 b3 90 63 22 69 df | e5 f0 68 6a 3f ab 70 bf d6 bc a2 6d 32 d6 bf 56 | 13 cd ae 31 91 9e 97 07 b1 e6 67 da 49 fc 52 44 | f0 97 00 89 4b 4a 7b 7e 72 67 33 77 ed ad d5 60 | 7c 94 7a 09 a1 fe 2b 97 f4 03 f7 65 c2 4f 92 50 | 59 77 e9 77 52 e2 ba 0e f1 c5 36 f7 3f 04 ca 02 | 29 37 fe 9d b2 ee 90 bb 59 f2 25 82 19 bd 15 09 | 7c 21 90 62 70 4c 2f 35 e2 fa b0 32 14 28 ef f3 | f9 26 2a aa 23 e5 00 f2 ed fa 00 25 b3 8d 3e f4 | 4c e5 68 7e bb cf a5 93 21 96 34 22 9d cb 8e c0 | 2d 43 58 e0 8a b9 3b 2b d8 e6 50 0b 36 e9 8a 0b | 9a 7c fa 82 ee ac d3 9d dc ac fe e5 26 e8 d7 a8 | 41 71 b3 21 7a 08 ae 35 2b 19 02 a1 3c d8 d8 79 | 7f 1b 50 2d 1e 74 84 a4 f5 80 19 40 cb b4 59 fe | e2 eb 79 b4 b1 1d a9 7a b4 6e 10 85 42 85 5d e9 | 58 9c 43 c5 54 ce c4 20 7b 73 38 bf 59 44 4d 18 | 29 00 00 24 bf 17 ca 5e f8 c4 94 b8 0b 16 3e 38 | 6b 43 cf 92 04 d6 aa ac 11 4c 2e 2c d1 a0 dc 92 | 64 9e 7b 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 bc 1a f8 41 15 d9 99 65 b2 c4 f3 | df 03 a0 00 26 60 50 c2 00 00 00 1c 00 00 40 05 | fc 37 e7 42 82 1f 76 13 ad 5a b7 fc e2 af d4 9f | 15 d4 13 5b | libevent_free: release ptr-libevent@0x7fb37404b5c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a50110 | #321 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c012bf0 | handling event EVENT_RETRANSMIT for parent state #307 | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #307 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #307 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49671.328129; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002577 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a50110 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #307 | libevent_malloc: new ptr-libevent@0x7fb37404b5c0 size 128 "road-eastnet-nonat-55" #307: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #307) | ae 96 63 e8 bb 6a 85 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 14 ed e9 d6 19 10 2b ec dd 37 28 c8 5c 2b 9d | 4d 1c 56 bb af 08 b5 7a 4b a6 fc d3 e6 37 09 e4 | 3f 1e 28 12 a3 d4 a0 95 36 fb be 53 ba 61 08 91 | a5 59 64 37 32 8f 20 cb c1 4b 24 6f aa 9c 35 eb | 55 d5 bc cd 87 7a 12 07 97 e1 3e 1d fe 09 4e 05 | 56 a9 36 dd e5 c2 2b 14 24 4c 71 52 b8 4a bc e5 | 44 05 b4 12 ae 0a ee 10 63 d4 56 16 75 0e 24 7a | d8 3e 40 79 17 42 50 86 a6 54 47 3f a4 b0 ab e0 | d2 28 b5 9a 24 3f 4a c2 b0 91 11 3a 15 fb b2 26 | f2 b0 63 ef 6f 51 35 98 2f 68 7c a5 78 9f 97 ad | 5a 09 af 4c 24 bb dd dc ab e6 24 53 27 3d 9e 03 | 62 ad 6c f7 99 7f 86 ec 99 0f d4 42 fa 99 b4 e1 | da 5b a4 af 44 6d 6a f4 d7 89 78 8e f4 87 7b 68 | 84 5a 7e 9d b0 43 44 70 16 90 a6 1a d2 cc 8f 85 | 21 0d 25 8b 92 c7 6a 03 1f 2e 4c a1 00 a9 05 b1 | b5 20 9b fc 87 43 c1 10 a6 42 8f 4d 15 f7 48 a2 | 29 00 00 24 9a 25 60 c3 7e e3 91 a3 9d b3 07 0f | ff 92 da ab 25 95 17 32 0d 82 17 4c 51 9e de a9 | 5d 92 35 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b e0 88 15 5c bc 20 c5 96 41 9f 3a | 7e ef 58 59 98 52 f8 6e 00 00 00 1c 00 00 40 05 | 92 3b 5d d1 4e 37 91 81 a5 d6 c2 94 c8 33 2c 33 | 6a d3 7b 36 | libevent_free: release ptr-libevent@0x7fb3880177a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012bf0 | #307 spent 0.0739 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 42 c0 64 91 b3 77 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #321 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #321 | rejected packet: | 30 42 c0 64 91 b3 77 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #321: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 96 63 e8 bb 6a 85 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #307 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #307 | rejected packet: | ae 96 63 e8 bb 6a 85 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #307: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0361 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #84 | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #84 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #84 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49671.333382; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008425 exceeds limit? YES "road-eastnet-nonat-84" #84: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-84" #84: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #336 at 0x557d46a45e10 | State DB: adding IKEv2 state #336 in UNDEFINED | pstats #336 ikev2.ike started | Message ID: init #336: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #336: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #336; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-84" #336: initiating v2 parent SA to replace #84 | using existing local IKE proposals for connection road-eastnet-nonat-84 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 336 for state #336 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c012bf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #336 | libevent_malloc: new ptr-libevent@0x7fb3880177a0 size 128 | #336 spent 0.0676 milliseconds in ikev2_parent_outI1() | RESET processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #84 ikev2.ike failed too-many-retransmits | pstats #84 ikev2.ike deleted too-many-retransmits | #84 spent 2.37 milliseconds in total | [RE]START processing: state #84 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-84" #84: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #84: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #84 | crypto helper 7 resuming "road-eastnet-nonat-84" #84: deleting IKE SA for connection 'road-eastnet-nonat-84' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 7 starting work-order 336 for state #336 | add revival: connection 'road-eastnet-nonat-84' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-84 | State DB: deleting IKEv2 state #84 in PARENT_I1 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 336 | parent state #84: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #84 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 336 time elapsed 0.000593 seconds | libevent_free: release ptr-libevent@0x7fb35c012840 | (#336) spent 0.584 milliseconds in crypto helper computing work-order 336: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 336 for state #336 to event queue | scheduling resume sending helper answer for #336 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | libevent_malloc: new ptr-libevent@0x7fb34801a4e0 size 128 | in statetime_stop() and could not find #84 | crypto helper 7 waiting (nothing to do) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-84 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-84" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-84' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-84" | stop processing: connection "road-eastnet-nonat-84" (in initiate_a_connection() at initiate.c:349) | spent 0.0816 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #336 | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 336 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #336 | **emit ISAKMP Message: | initiator cookie: | a0 3a 99 80 e1 01 63 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-84 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 99 8b 11 e3 72 10 b4 96 46 45 1f 06 8b cb 20 43 | ikev2 g^x 48 5b dc 9f 22 0b 19 f0 6e 5a 41 4f 7b 66 7e 47 | ikev2 g^x 17 91 cc cc 24 8c c0 85 32 b7 be 23 d1 6d 12 65 | ikev2 g^x 00 df c3 47 48 17 d9 93 47 4f 9d 2a 81 88 4f 2c | ikev2 g^x 1f 98 ac a8 85 56 dd 1e 45 4f f7 f9 78 59 b2 90 | ikev2 g^x d0 96 3c c9 92 dc 80 e7 ee 9e 9f f3 a3 42 a0 87 | ikev2 g^x f4 8c 84 d8 38 fe 2c f0 0d 7c 15 54 23 ab a7 7c | ikev2 g^x ab e1 53 7c ba 26 57 e2 9b 0a 0d 44 c4 7c f6 bd | ikev2 g^x 50 8c ae 85 b6 fa 6e 51 9e 4d 32 a8 2f 5f b7 94 | ikev2 g^x 33 ef 3d 6b de 80 a9 44 cb a5 48 1f 9d d9 3e 40 | ikev2 g^x c2 f4 df a8 c7 43 1a 85 1e 99 1c be ad 10 a3 44 | ikev2 g^x af 83 22 29 2a d8 4c fc aa 9e 40 9e 83 a1 f3 2d | ikev2 g^x d3 6b 55 b5 8b 94 57 96 1f 06 03 b7 e8 07 4a dc | ikev2 g^x 94 d8 f3 f3 15 26 15 42 b7 cd 81 18 11 03 dc 3a | ikev2 g^x 4e 46 ec 2a eb 11 4a a9 f5 ce 5d 26 8e 40 7e f7 | ikev2 g^x fb 5d b7 76 23 d0 05 cb 25 8d 85 d4 e7 63 e5 fe | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 20 77 67 42 c0 5c 2e 2c 4f 51 1c e3 6e 76 b6 ed | IKEv2 nonce 2f 6c dc 89 e9 07 aa bc e6 7b f3 86 a7 c4 a8 7e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a0 3a 99 80 e1 01 63 61 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 54 | natd_hash: port= 01 f4 | natd_hash: hash= 3c e2 e4 55 b2 1e b0 cb dc 5a 76 de 82 37 47 8c | natd_hash: hash= ee 4e fe 03 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3c e2 e4 55 b2 1e b0 cb dc 5a 76 de 82 37 47 8c | Notify data ee 4e fe 03 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a0 3a 99 80 e1 01 63 61 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1d 8c 0e 3c 37 8c 24 ca 1e c1 4b a0 97 2b 99 7f | natd_hash: hash= 60 3a d2 7b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1d 8c 0e 3c 37 8c 24 ca 1e c1 4b a0 97 2b 99 7f | Notify data 60 3a d2 7b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #336 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #336: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #336 to 4294967295 after switching state | Message ID: IKE #336 skipping update_recv as MD is fake | Message ID: sent #336 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-84" #336: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.84:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #336) | a0 3a 99 80 e1 01 63 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 8b 11 e3 72 10 b4 96 46 45 1f 06 8b cb 20 43 | 48 5b dc 9f 22 0b 19 f0 6e 5a 41 4f 7b 66 7e 47 | 17 91 cc cc 24 8c c0 85 32 b7 be 23 d1 6d 12 65 | 00 df c3 47 48 17 d9 93 47 4f 9d 2a 81 88 4f 2c | 1f 98 ac a8 85 56 dd 1e 45 4f f7 f9 78 59 b2 90 | d0 96 3c c9 92 dc 80 e7 ee 9e 9f f3 a3 42 a0 87 | f4 8c 84 d8 38 fe 2c f0 0d 7c 15 54 23 ab a7 7c | ab e1 53 7c ba 26 57 e2 9b 0a 0d 44 c4 7c f6 bd | 50 8c ae 85 b6 fa 6e 51 9e 4d 32 a8 2f 5f b7 94 | 33 ef 3d 6b de 80 a9 44 cb a5 48 1f 9d d9 3e 40 | c2 f4 df a8 c7 43 1a 85 1e 99 1c be ad 10 a3 44 | af 83 22 29 2a d8 4c fc aa 9e 40 9e 83 a1 f3 2d | d3 6b 55 b5 8b 94 57 96 1f 06 03 b7 e8 07 4a dc | 94 d8 f3 f3 15 26 15 42 b7 cd 81 18 11 03 dc 3a | 4e 46 ec 2a eb 11 4a a9 f5 ce 5d 26 8e 40 7e f7 | fb 5d b7 76 23 d0 05 cb 25 8d 85 d4 e7 63 e5 fe | 29 00 00 24 20 77 67 42 c0 5c 2e 2c 4f 51 1c e3 | 6e 76 b6 ed 2f 6c dc 89 e9 07 aa bc e6 7b f3 86 | a7 c4 a8 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c e2 e4 55 b2 1e b0 cb dc 5a 76 de | 82 37 47 8c ee 4e fe 03 00 00 00 1c 00 00 40 05 | 1d 8c 0e 3c 37 8c 24 ca 1e c1 4b a0 97 2b 99 7f | 60 3a d2 7b | state #336 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3880177a0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c012bf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #336 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 | #336 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49671.334838 | resume sending helper answer for #336 suppresed complete_v2_state_transition() and stole MD | #336 spent 0.499 milliseconds in resume sending helper answer | stop processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34801a4e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 3a 99 80 e1 01 63 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #336 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #336 | rejected packet: | a0 3a 99 80 e1 01 63 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 54 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #336: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348012bf0 | handling event EVENT_RETRANSMIT for parent state #328 | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #328 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #328 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49671.339047; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501024 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #328 | libevent_malloc: new ptr-libevent@0x7fb34801a4e0 size 128 "road-eastnet-nonat-76" #328: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #328) | 3c ba 5b c8 fc 4e e4 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 98 1b 56 d7 72 9f 0b ef 82 c1 96 52 5c 5c 9b | e9 aa b3 20 9c 71 f6 1f 7d 62 5f 32 20 71 40 58 | 1c 09 5f be 66 e2 fb 32 6f 32 7b d3 d9 05 2e a9 | ee af 44 08 4c 92 7f 63 3f 26 57 99 85 eb 91 d7 | b7 5a 96 3e 98 ed 26 ea 09 8f 0f 63 53 5d 1c b3 | c9 fb a7 17 72 50 1c 89 8a 1b ec e3 c6 13 99 f4 | 47 85 27 9f 89 00 ee af f6 42 8e 89 20 65 b0 94 | dc 96 45 50 6a fc 55 91 2d 20 a1 71 bd 13 2b 3d | c9 ca ac 78 35 01 26 cc e0 d8 0f 8b 0a 51 cf db | a4 5f b8 de 1d ef 44 4c 67 d2 41 0a 1a da 75 49 | 8b 5c 8d d5 4f ad 96 01 a7 81 6e 64 71 33 1d 13 | c8 f5 a7 cf 94 c9 e6 53 e2 b0 78 13 10 0b c7 61 | e7 11 09 49 e7 5c 3e 3d 81 8a d4 ca 33 cf 4b a6 | 11 a6 1c 3a 1f 08 75 b7 9e 2d 0e 59 2f 13 2a 60 | 81 d0 25 c3 cb 2c 46 fb 68 09 64 52 0e fa 74 b3 | e7 5b 92 47 85 91 91 a7 8f 24 50 93 20 2b b2 73 | 29 00 00 24 bd 04 20 dd 74 64 b5 d8 5a af c3 c3 | 73 08 e8 87 3d 68 41 83 2a a2 ff d2 47 06 97 0f | ee 80 ed c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f8 b1 65 26 56 ad 9d 5c eb eb 90 | 0c 0f 05 c7 3a 68 b0 36 00 00 00 1c 00 00 40 05 | a1 90 c1 14 1b 7b 06 99 a6 d5 54 52 02 f0 92 56 | c7 13 ca 30 | libevent_free: release ptr-libevent@0x7fb36c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348012bf0 | #328 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c ba 5b c8 fc 4e e4 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #328 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #328 | rejected packet: | 3c ba 5b c8 fc 4e e4 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #328: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0667 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38000feb0 | handling event EVENT_RETRANSMIT for parent state #322 | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #322 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #322 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49671.392426; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001712 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348012bf0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #322 | libevent_malloc: new ptr-libevent@0x7fb36c04b850 size 128 "road-eastnet-nonat-70" #322: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #322) | 74 03 a5 dd ea 05 2e d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 15 d9 ac 31 7b 6c 04 ac 7a ef e5 0d 89 93 07 | 20 e4 8e 39 86 a0 9c 1e 9f 76 b9 58 4d f2 a7 9f | a9 61 82 a9 75 3f e8 1a c2 92 fe 84 37 ac 33 ad | 65 45 df 2b e1 cb 2c 07 be 4f c4 59 89 1a 1e d4 | bc 00 c9 7a da 51 f8 0e 6d e5 9b 4d 2b 1e 90 8c | a7 76 dd 60 8a 02 12 aa 75 a5 70 c1 65 7c 3e 55 | 89 46 b2 4f 06 dd f5 63 86 b7 00 f0 73 2f 7c 5a | b7 d4 0f 38 d5 4f 7a 42 58 2c 1c 6e 8d df 4f 92 | 63 c6 3f de f4 10 95 80 0d 14 e0 40 1c 6b a7 25 | 78 25 a5 d6 97 e1 6b 90 22 06 bd 2b cc f5 6b ca | 10 6b ac a7 98 1a 94 fa 4c cf 33 fe dc 06 fd b0 | 5f 81 4e 82 91 b8 3e 8a c7 a6 68 81 06 ac 84 f0 | ea 68 69 9c ad 3a 07 bc c5 f3 31 91 30 05 f3 ef | dc 51 d5 f6 ee f9 4a 07 b7 9e 0f 65 ad 3f 41 a0 | d7 70 67 24 31 3b 11 1f 99 26 08 ab a5 8d 87 97 | f5 4d 04 da a2 fb f0 9d b6 5e ca 79 ac fb e6 b9 | 29 00 00 24 7c d4 e7 e5 83 a9 e9 e5 4c 1d 37 7f | 04 0f 2a 2b 54 28 64 c4 b2 05 be 1f 1d 68 a9 5e | 6e 76 88 d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 64 8d 0f b4 d2 3e c7 db eb 6e 9c | 80 67 1d 17 67 fa eb 16 00 00 00 1c 00 00 40 05 | 45 ce 15 93 8c ec f9 76 43 65 cd e9 a3 d1 ec 83 | 45 3c 35 9c | libevent_free: release ptr-libevent@0x7fb350014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000feb0 | #322 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 03 a5 dd ea 05 2e d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #322 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #322 | rejected packet: | 74 03 a5 dd ea 05 2e d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #322: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0458 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c012bf0 | handling event EVENT_RETRANSMIT for parent state #329 | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #329 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #329 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49671.397642; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500122 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000feb0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #329 | libevent_malloc: new ptr-libevent@0x7fb350014c70 size 128 "road-eastnet-nonat-77" #329: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #329) | 19 44 0d 82 d8 18 b5 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 80 85 65 b3 ae 4b 6e fe 68 73 f2 b6 39 5a b1 | 5a f3 36 2e e0 44 7d b5 ef dd dd fc d0 35 5f bf | 0f f1 a8 56 0e fe 65 1a 64 97 d5 45 02 78 56 12 | 1d c5 a8 57 78 41 5d 67 f5 9c ac 0c ea 30 76 9f | d6 40 74 a9 16 ad b3 48 34 1d 1d 07 41 4e 7d ea | b4 15 07 22 a9 ac 8e c3 4d e5 f2 d1 ad d3 62 0d | 93 58 9b 58 67 7c fc 81 97 3b af 10 63 67 d9 86 | 45 ad 4f a6 97 2e 79 bd 48 03 5d 44 76 7f c4 9f | a3 54 a8 c8 d0 75 76 5f 1b 6c d2 e3 cc 1a fb de | f6 a0 df 0a e9 48 0b 88 3f b0 b9 04 79 1c 8b 83 | a2 11 a4 9f 9b f2 2f 13 89 0d e6 68 c7 78 af a5 | 8d 94 dc 9c 72 14 d9 47 8e b6 09 d8 6c bb 15 13 | 54 68 b1 04 b2 79 ae 72 17 9f ff 8d d0 33 2c 7a | b0 3e e8 0e e9 c9 f6 bd 41 a5 9d 71 93 9d e7 49 | fb 61 fa 0d 56 19 d3 32 c0 8d ba 0e 98 71 48 e0 | 2f 1a 52 9f c2 03 77 7a 8d 1e 4b 1c 30 c4 31 91 | 29 00 00 24 ad 58 5c 32 62 e5 13 15 63 fb 95 0f | de a4 7f f4 a1 1f b7 cf 95 c9 7b a8 76 d2 3e a1 | 6c d4 9d 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 38 9e 59 ae 71 c3 ed 6e 6e 92 c1 | 9f 33 f8 69 87 bc 1f 0c 00 00 00 1c 00 00 40 05 | 49 73 ae f4 7f e8 6a cf 37 86 5a 1d f5 77 0e ad | 19 ee 51 1c | libevent_free: release ptr-libevent@0x7fb34c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c012bf0 | #329 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 19 44 0d 82 d8 18 b5 00 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #329 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #329 | rejected packet: | 19 44 0d 82 d8 18 b5 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #329: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0496 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a69e50 | handling event EVENT_RETRANSMIT for parent state #85 | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #85 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #85 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49671.398914; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.01346 exceeds limit? YES "road-eastnet-nonat-85" #85: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-85" #85: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #337 at 0x557d46a473d0 | State DB: adding IKEv2 state #337 in UNDEFINED | pstats #337 ikev2.ike started | Message ID: init #337: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #337: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #337; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-85" #337: initiating v2 parent SA to replace #85 | using existing local IKE proposals for connection road-eastnet-nonat-85 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 337 for state #337 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34c012bf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #337 | libevent_malloc: new ptr-libevent@0x7fb34c0407f0 size 128 | #337 spent 0.0897 milliseconds in ikev2_parent_outI1() | RESET processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 resuming | start processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #85 ikev2.ike failed too-many-retransmits | pstats #85 ikev2.ike deleted too-many-retransmits | #85 spent 2.52 milliseconds in total | [RE]START processing: state #85 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-85" #85: deleting state (STATE_PARENT_I1) aged 64.015s and NOT sending notification | parent state #85: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #85 "road-eastnet-nonat-85" #85: deleting IKE SA for connection 'road-eastnet-nonat-85' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 8 starting work-order 337 for state #337 | add revival: connection 'road-eastnet-nonat-85' added to the list and scheduled for 0 seconds | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 337 | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-85 | State DB: deleting IKEv2 state #85 in PARENT_I1 | parent state #85: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #85 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 337 time elapsed 0.000602 seconds | libevent_free: release ptr-libevent@0x7fb378012840 | (#337) spent 0.608 milliseconds in crypto helper computing work-order 337: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 337 for state #337 to event queue | scheduling resume sending helper answer for #337 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a69e50 | in statetime_stop() and could not find #85 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb34c01a4e0 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-85 which received a Delete/Notify but must remain up per local policy | crypto helper 8 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-85" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-85' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-85" | stop processing: connection "road-eastnet-nonat-85" (in initiate_a_connection() at initiate.c:349) | spent 0.0703 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #337 | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 337 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #337 | **emit ISAKMP Message: | initiator cookie: | ed 63 58 23 fd c1 76 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-85 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f6 96 54 84 2e e5 91 43 31 05 bf 8d 46 38 09 77 | ikev2 g^x 34 82 01 41 07 ba 77 ae 0e 58 56 59 e8 aa 03 3b | ikev2 g^x 7e fb 3d 6d 4d 59 d3 86 8a 20 2c b2 06 03 8a 41 | ikev2 g^x 33 cf 0e 06 87 87 a2 ab d5 f2 99 a7 84 cd 05 cf | ikev2 g^x ec d9 29 84 36 3e fc 29 32 e5 d2 77 7d a0 28 f8 | ikev2 g^x d1 0e 51 2f 73 28 bd 60 66 cf 7b 5c e8 76 7f ee | ikev2 g^x 0b 3f cc 47 13 a2 8f 86 8a 1d a1 57 96 4b 8e 1d | ikev2 g^x 54 09 0b 8b e7 94 12 ea 68 37 a0 5a 37 1b 43 96 | ikev2 g^x 9e 43 fb b9 f4 e3 a4 14 cb 49 50 02 95 69 45 10 | ikev2 g^x 4f 12 ab e9 0f 1f 01 01 a4 c3 ef 65 1e 2e cf e7 | ikev2 g^x 08 9d 2c 27 7f 64 fb 91 ba e9 80 4e 20 48 a7 46 | ikev2 g^x 4e 2b b0 83 ea 9c e6 04 02 2b 8c 1a 52 db c6 17 | ikev2 g^x d5 9e 92 ca bd cc 2d 80 e6 b4 24 b9 79 b6 76 9a | ikev2 g^x 0e 8f 39 57 ee 2c 0b 47 20 f0 82 f0 87 6e 0d 85 | ikev2 g^x f9 ab b8 d1 c1 07 ac ad 62 5b 5a 42 cc c5 f9 04 | ikev2 g^x de 15 7e d8 03 4b a1 c4 30 01 43 b8 8d 24 8e 44 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 47 35 e2 69 12 71 4e bf 5f ce fb f5 4b 5d 78 7a | IKEv2 nonce 40 67 4e 2b 89 1a 4f 82 42 7d 07 9d 99 e5 3f 23 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ed 63 58 23 fd c1 76 bc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 55 | natd_hash: port= 01 f4 | natd_hash: hash= 60 a6 ae 66 a0 2e 4a eb 14 83 41 42 9c b3 ed 9b | natd_hash: hash= 1a cc 9f 9b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 60 a6 ae 66 a0 2e 4a eb 14 83 41 42 9c b3 ed 9b | Notify data 1a cc 9f 9b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ed 63 58 23 fd c1 76 bc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 09 b5 68 86 30 d7 ba 9d 35 40 11 f6 5c 40 95 0a | natd_hash: hash= 79 fe 98 fe | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 09 b5 68 86 30 d7 ba 9d 35 40 11 f6 5c 40 95 0a | Notify data 79 fe 98 fe | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #337 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #337: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #337 to 4294967295 after switching state | Message ID: IKE #337 skipping update_recv as MD is fake | Message ID: sent #337 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-85" #337: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.85:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #337) | ed 63 58 23 fd c1 76 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 96 54 84 2e e5 91 43 31 05 bf 8d 46 38 09 77 | 34 82 01 41 07 ba 77 ae 0e 58 56 59 e8 aa 03 3b | 7e fb 3d 6d 4d 59 d3 86 8a 20 2c b2 06 03 8a 41 | 33 cf 0e 06 87 87 a2 ab d5 f2 99 a7 84 cd 05 cf | ec d9 29 84 36 3e fc 29 32 e5 d2 77 7d a0 28 f8 | d1 0e 51 2f 73 28 bd 60 66 cf 7b 5c e8 76 7f ee | 0b 3f cc 47 13 a2 8f 86 8a 1d a1 57 96 4b 8e 1d | 54 09 0b 8b e7 94 12 ea 68 37 a0 5a 37 1b 43 96 | 9e 43 fb b9 f4 e3 a4 14 cb 49 50 02 95 69 45 10 | 4f 12 ab e9 0f 1f 01 01 a4 c3 ef 65 1e 2e cf e7 | 08 9d 2c 27 7f 64 fb 91 ba e9 80 4e 20 48 a7 46 | 4e 2b b0 83 ea 9c e6 04 02 2b 8c 1a 52 db c6 17 | d5 9e 92 ca bd cc 2d 80 e6 b4 24 b9 79 b6 76 9a | 0e 8f 39 57 ee 2c 0b 47 20 f0 82 f0 87 6e 0d 85 | f9 ab b8 d1 c1 07 ac ad 62 5b 5a 42 cc c5 f9 04 | de 15 7e d8 03 4b a1 c4 30 01 43 b8 8d 24 8e 44 | 29 00 00 24 47 35 e2 69 12 71 4e bf 5f ce fb f5 | 4b 5d 78 7a 40 67 4e 2b 89 1a 4f 82 42 7d 07 9d | 99 e5 3f 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 a6 ae 66 a0 2e 4a eb 14 83 41 42 | 9c b3 ed 9b 1a cc 9f 9b 00 00 00 1c 00 00 40 05 | 09 b5 68 86 30 d7 ba 9d 35 40 11 f6 5c 40 95 0a | 79 fe 98 fe | state #337 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c0407f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34c012bf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a69e50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #337 | libevent_malloc: new ptr-libevent@0x7fb378012840 size 128 | #337 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49671.400294 | resume sending helper answer for #337 suppresed complete_v2_state_transition() and stole MD | #337 spent 0.453 milliseconds in resume sending helper answer | stop processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c01a4e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 63 58 23 fd c1 76 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #337 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #337 | rejected packet: | ed 63 58 23 fd c1 76 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 55 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #337: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12c40 | handling event EVENT_RETRANSMIT for parent state #282 | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #282 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #282 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49671.400407; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003211 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #282 | libevent_malloc: new ptr-libevent@0x7fb34c01a4e0 size 128 "road-eastnet-nonat-30" #282: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #282) | 46 9b 20 9a e5 8e c3 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 4a 4a 05 a5 e8 31 07 19 01 9a 3a 84 bd 00 2c | 01 26 e2 35 38 1d c2 10 27 23 65 e5 d1 d5 9e 9d | 93 4a 85 e7 79 d0 00 1e a3 c9 7f d0 87 96 13 32 | 3a 52 f9 aa fd 75 0f 57 d6 53 8b a2 5b 2a a9 29 | 20 47 1e e0 f6 79 b4 a2 d0 fd e2 85 9e 06 b0 c5 | 1f eb f9 ce 36 69 1b 53 58 8d aa 02 dd a3 93 19 | 8b 0f e6 94 85 c6 21 ed 47 d3 f5 ea 66 43 13 82 | da f0 e0 63 f7 98 28 5e a4 cb 20 f6 07 ee ef 26 | 67 cb 7a 06 89 6a a0 7d 08 f6 7d ba 27 41 9f 3f | f9 0e 8b 4e f2 9a 91 05 9e 11 34 81 a4 96 af ee | 90 6f f6 67 88 78 72 a1 94 39 66 b1 22 8d 82 7c | 2e db f6 a2 5d 7b a6 60 14 74 1c b3 6d 80 df 10 | f8 59 91 7e 94 04 39 3a 04 77 10 6d 00 3c a4 c9 | 37 8a d9 0b 42 ad 9c 7e 79 d0 0a 68 7a d1 19 02 | 3f 63 fb b2 47 d4 e3 0d 1d 5d 62 cd 37 80 af a2 | 0b a2 8f e1 3f b9 34 fc d9 39 c1 27 65 16 8f 01 | 29 00 00 24 43 cb 25 08 9c 10 6d 8d e0 8b af 6b | 30 64 58 bc 44 4b 07 d1 a3 b6 7d 77 46 d8 bf 81 | 62 ff 7f 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f cf c8 c3 31 5e 18 fc ce 9a 0d be | ec 9d b8 d1 d8 fa d9 18 00 00 00 1c 00 00 40 05 | 91 0b 3b 5a da ea f5 67 3e 89 32 94 c9 4e eb eb | e4 06 4e d6 | libevent_free: release ptr-libevent@0x7fb380011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c40 | #282 spent 0.0996 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 9b 20 9a e5 8e c3 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #282 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #282 | rejected packet: | 46 9b 20 9a e5 8e c3 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #282: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0553 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360012bf0 | handling event EVENT_RETRANSMIT for parent state #308 | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #308 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #308 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49671.418692; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002965 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c40 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #308 | libevent_malloc: new ptr-libevent@0x7fb380011f30 size 128 "road-eastnet-nonat-56" #308: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #308) | 80 0a 88 98 4b f9 e7 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 60 f0 11 1d 6f 3c e8 3a d0 c5 a1 1f 8b f6 d6 | b8 1e e6 d3 27 fa 35 0f 2e 35 7c 6a ac 4d b0 5a | 6b 0b 3b 4a 46 9a c1 e4 d2 3d 95 4c 54 c7 f8 b0 | a3 25 b2 e5 19 52 cf a8 80 64 9a 61 44 3f 5d 89 | b3 ab 84 f7 4d 8d 5e c3 d5 83 26 99 08 7b 56 8e | d5 6a c7 4a 76 f4 45 38 3c fa 31 64 fb a7 68 c6 | c9 63 22 21 ab 35 5e 58 62 e8 99 25 ff 5b 61 ec | 55 a2 5b 36 cc 02 da 3b ef 08 f7 a5 b1 e6 33 04 | 63 ee 2e 9b fc 5a 62 eb 0d 0f da ab 7c b3 2f f6 | 1d 06 62 78 d0 f2 08 dd bd 5a f1 dc aa 18 b1 3b | 54 75 36 28 b8 4d f2 e6 89 e0 6c 9d a4 f4 71 27 | 99 51 48 e8 63 85 2b 41 07 00 9f 7b ff df b2 6f | 90 1f ac 1e 28 94 ef cf 9a 1c cf 53 7f 88 76 ba | 31 4b 32 29 7d 41 fd ba 51 dd cc 44 b9 6c 4f e1 | cf 89 c3 39 c3 eb 26 5a 05 e3 ac c1 a6 d7 ca ae | 7d 27 a2 0d 12 e5 de 71 e2 d1 95 9c b5 ec 14 d8 | 29 00 00 24 d3 c9 38 16 a4 35 41 62 ad 53 1d 3f | a5 70 61 f3 55 11 e2 06 85 67 55 51 bd 50 94 8d | 80 2d 38 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 1c df ea ba 44 23 ff a6 53 af 56 | 8c 58 68 ea 71 49 69 6d 00 00 00 1c 00 00 40 05 | 14 0c bd d4 4b a2 ff 28 87 d9 dd 83 a7 c2 2b 61 | 5c 8c 59 cd | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360012bf0 | #308 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 0a 88 98 4b f9 e7 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #308 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #308 | rejected packet: | 80 0a 88 98 4b f9 e7 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #308: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0499 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_RETRANSMIT for parent state #323 | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #323 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #323 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49671.447995; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002061 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360012bf0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #323 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 "road-eastnet-nonat-71" #323: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #323) | fa a0 9f 7c 98 fa b7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 46 00 d1 b1 2f ab 58 ff ae 3e e1 90 df ac 17 | ff f8 20 d8 dc c8 64 44 8b d4 4d 64 77 87 0d 12 | 4f 58 f8 0b b8 23 de 06 cb 6a 5a 17 a1 ce 9c 0e | b9 8f d4 30 b1 62 d8 df cd 4c 66 72 94 9e 12 c2 | 2d 76 67 bf af 09 84 71 96 13 7f 13 e3 92 f9 eb | 91 ae c7 77 a0 91 b1 8b 78 4e 95 7f ad 59 ce f7 | 52 f5 ff c7 0f 12 41 0b 6a 23 2d 80 44 0e 92 7c | 8a 4f 11 47 2b 77 90 68 d7 a1 52 f7 6b 79 db 3f | 94 cd 89 b0 a4 aa 7e 64 52 6b 85 6e 03 da 1f ae | b6 90 2d d1 46 19 b6 66 ea b6 57 b4 c6 78 39 27 | 7f 33 c8 a1 bd 41 e7 ba 08 ef c1 2b 83 3d 1a a5 | d6 cc ec 96 a2 e8 29 ec 44 9c 54 bc 8b 9c d6 9b | cf 36 d1 9f c7 0e 2f 28 11 0b 73 2c 8d e2 76 0d | 66 d9 63 04 c0 20 e3 d1 af b2 68 91 e0 90 8f 15 | 8a 1a f5 c8 e3 0d 24 88 9a 72 7c ad a0 47 9a cf | 87 bf fe bc 41 93 5c 36 c0 33 07 c5 9e ea fb dd | 29 00 00 24 40 e8 32 3c 23 00 84 94 61 80 b2 17 | 1c a2 13 13 eb 56 70 6b 74 c5 2e 36 50 96 1d 9e | 9b cf 84 1b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 d2 f5 ad 3c 92 ba 81 0f fc 09 27 | bf 74 8b d6 da e0 d6 64 00 00 00 1c 00 00 40 05 | e3 ba 50 e3 10 b5 c6 17 22 3f 31 51 2e fe 55 bf | 2d 04 cf 9f | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | #323 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa a0 9f 7c 98 fa b7 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #323 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #323 | rejected packet: | fa a0 9f 7c 98 fa b7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #323: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a89740 | handling event EVENT_RETRANSMIT for parent state #330 | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #330 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #330 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49671.459268; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50012 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #330 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-78" #330: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #330) | 93 2e 75 96 9e d6 58 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 2c e9 0f 22 91 df 5a 5b ae 3a 65 86 ba 44 9c | 65 4a 79 99 b3 fa 29 29 22 63 49 c3 6b 7a c8 2c | a6 64 55 77 51 a1 d2 b5 c5 ed b9 2b d7 c9 de d5 | 1f 04 ca d2 89 15 35 75 d9 05 25 47 aa 0c 65 5b | a8 0c 57 96 31 e9 78 a6 a3 87 ad 68 36 d2 a1 3b | 88 08 f8 2e 28 6b 99 4e 37 3d 68 42 7a f5 6a 2c | 92 3c 46 2d 02 18 a7 c8 61 9b 40 1b d5 74 a6 72 | 61 b0 45 d7 09 4c 08 2d 1e 0e 8d f9 eb 38 be 36 | 94 bc ee 43 6d c2 1a 9d c9 1b 4a 84 b6 50 10 54 | ae 45 14 8d 9a 31 50 76 61 37 da 64 1e 74 bc 11 | a7 13 ed 80 0f 85 3c d8 35 69 89 6d b4 6c ac f3 | 2f 4a 27 55 17 f4 f5 ce 32 75 dd b4 15 0b 7f 61 | e2 87 b3 bb e4 11 66 8c 15 79 6e d9 14 50 70 fe | f5 12 aa 90 f9 25 da 28 bc a5 c1 1c 8f 54 93 e2 | 5b 5a 53 f7 1c 97 4d 5c c4 f6 b5 86 3f 24 5b 64 | c4 87 cd 28 7a 3e ef 9f 68 95 6b f8 95 8d da 08 | 29 00 00 24 a1 af e5 97 d9 f1 9e 6c 80 91 ab 21 | 08 cf 38 0c a4 d3 fb b3 c7 37 98 b4 a4 0d 72 16 | de e9 9d 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 c9 48 f6 82 8f 0c eb 59 3f 42 40 | 18 2f 27 9b ca 1b 0e 80 00 00 00 1c 00 00 40 05 | 3e 48 b8 70 cf c0 9c 35 6c 64 bb e3 c7 5c 5e 43 | 1f 5c 26 91 | libevent_free: release ptr-libevent@0x7fb38401cc10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a89740 | #330 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 93 2e 75 96 9e d6 58 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #330 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #330 | rejected packet: | 93 2e 75 96 9e d6 58 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #330: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa1f00 | handling event EVENT_RETRANSMIT for parent state #86 | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #86 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #86 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49671.461549; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007177 exceeds limit? YES "road-eastnet-nonat-86" #86: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-86" #86: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #338 at 0x557d46a48990 | State DB: adding IKEv2 state #338 in UNDEFINED | pstats #338 ikev2.ike started | Message ID: init #338: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #338: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #338; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-86" #338: initiating v2 parent SA to replace #86 | using existing local IKE proposals for connection road-eastnet-nonat-86 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 338 for state #338 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a89740 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #338 | libevent_malloc: new ptr-libevent@0x7fb38401cc10 size 128 | #338 spent 0.0649 milliseconds in ikev2_parent_outI1() | RESET processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #86 ikev2.ike failed too-many-retransmits | pstats #86 ikev2.ike deleted too-many-retransmits | #86 spent 2.72 milliseconds in total | [RE]START processing: state #86 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-86" #86: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #86: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #86 "road-eastnet-nonat-86" #86: deleting IKE SA for connection 'road-eastnet-nonat-86' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-86' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-86 | State DB: deleting IKEv2 state #86 in PARENT_I1 | crypto helper 12 resuming | crypto helper 12 starting work-order 338 for state #338 | parent state #86: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 338 | stop processing: state #86 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3740356e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa1f00 | in statetime_stop() and could not find #86 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-86 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-86" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-86' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-86" | stop processing: connection "road-eastnet-nonat-86" (in initiate_a_connection() at initiate.c:349) | spent 0.0569 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 338 time elapsed 0.00056 seconds | (#338) spent 0.562 milliseconds in crypto helper computing work-order 338: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 338 for state #338 to event queue | scheduling resume sending helper answer for #338 | libevent_malloc: new ptr-libevent@0x7fb3400094d0 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #338 | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 338 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #338 | **emit ISAKMP Message: | initiator cookie: | 1f e2 d0 d2 e5 84 7f 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-86 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x db f7 91 cd 84 5c a7 ef c5 4a 9e 2e af a2 43 ea | ikev2 g^x 45 0a b8 db c5 6e 04 46 ba a1 d5 11 76 fa 91 5a | ikev2 g^x 21 6e 50 69 5f 4c 63 af d6 32 06 ae 79 8f f8 47 | ikev2 g^x 06 f3 f5 c6 98 57 e2 e8 f9 93 2e 73 11 9e c7 4b | ikev2 g^x 81 b1 ab c3 4c 82 50 3e 95 1b 93 8d f3 f1 26 94 | ikev2 g^x 35 dc 1c 86 75 c4 0b 21 99 da cd 92 fb c9 25 d3 | ikev2 g^x a1 77 02 1c 94 1f a7 90 d7 35 62 14 3f a4 c2 e2 | ikev2 g^x 04 47 bb f7 88 43 f1 58 36 ff ad ce 6a c6 3a e5 | ikev2 g^x ca 19 27 9c c0 b7 91 62 00 c9 17 fb 82 73 f3 dc | ikev2 g^x 8a f9 f2 d0 2d 78 16 8f d3 1a df 7b 29 7f a7 d2 | ikev2 g^x 2a 1d 58 77 31 26 e6 25 fd f1 f0 ff b3 be 2a fb | ikev2 g^x 9a f2 05 45 cd 1a c0 33 3f 3e 0c b1 4a 0e 13 b1 | ikev2 g^x f3 25 ba 03 ce 1b 65 7e 16 c3 d1 62 05 e6 0b 87 | ikev2 g^x 27 59 78 26 a7 72 9c cf a5 2a c9 6c 3c 43 6b b4 | ikev2 g^x dd fc 35 a0 21 8a d9 83 8c b5 e6 a8 c9 3d 42 bd | ikev2 g^x e0 43 1a dd 83 56 78 b8 0a 0d d3 50 6d 61 d9 5c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 53 73 16 e0 68 43 e7 c2 a0 53 68 5d 7e 07 bf 33 | IKEv2 nonce 55 30 e6 39 bc d6 66 c9 05 5a fa 29 b8 4f 54 b8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1f e2 d0 d2 e5 84 7f 74 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 56 | natd_hash: port= 01 f4 | natd_hash: hash= 48 1b 58 be 75 e4 59 10 d1 29 a5 4a 19 0e d4 a5 | natd_hash: hash= d3 bb ae eb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 48 1b 58 be 75 e4 59 10 d1 29 a5 4a 19 0e d4 a5 | Notify data d3 bb ae eb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1f e2 d0 d2 e5 84 7f 74 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e1 23 de d4 d9 5f 17 c1 21 ba 79 77 2a ee 0e dd | natd_hash: hash= 91 6b 75 70 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e1 23 de d4 d9 5f 17 c1 21 ba 79 77 2a ee 0e dd | Notify data 91 6b 75 70 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #338 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #338: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #338 to 4294967295 after switching state | Message ID: IKE #338 skipping update_recv as MD is fake | Message ID: sent #338 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-86" #338: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.86:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #338) | 1f e2 d0 d2 e5 84 7f 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db f7 91 cd 84 5c a7 ef c5 4a 9e 2e af a2 43 ea | 45 0a b8 db c5 6e 04 46 ba a1 d5 11 76 fa 91 5a | 21 6e 50 69 5f 4c 63 af d6 32 06 ae 79 8f f8 47 | 06 f3 f5 c6 98 57 e2 e8 f9 93 2e 73 11 9e c7 4b | 81 b1 ab c3 4c 82 50 3e 95 1b 93 8d f3 f1 26 94 | 35 dc 1c 86 75 c4 0b 21 99 da cd 92 fb c9 25 d3 | a1 77 02 1c 94 1f a7 90 d7 35 62 14 3f a4 c2 e2 | 04 47 bb f7 88 43 f1 58 36 ff ad ce 6a c6 3a e5 | ca 19 27 9c c0 b7 91 62 00 c9 17 fb 82 73 f3 dc | 8a f9 f2 d0 2d 78 16 8f d3 1a df 7b 29 7f a7 d2 | 2a 1d 58 77 31 26 e6 25 fd f1 f0 ff b3 be 2a fb | 9a f2 05 45 cd 1a c0 33 3f 3e 0c b1 4a 0e 13 b1 | f3 25 ba 03 ce 1b 65 7e 16 c3 d1 62 05 e6 0b 87 | 27 59 78 26 a7 72 9c cf a5 2a c9 6c 3c 43 6b b4 | dd fc 35 a0 21 8a d9 83 8c b5 e6 a8 c9 3d 42 bd | e0 43 1a dd 83 56 78 b8 0a 0d d3 50 6d 61 d9 5c | 29 00 00 24 53 73 16 e0 68 43 e7 c2 a0 53 68 5d | 7e 07 bf 33 55 30 e6 39 bc d6 66 c9 05 5a fa 29 | b8 4f 54 b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 1b 58 be 75 e4 59 10 d1 29 a5 4a | 19 0e d4 a5 d3 bb ae eb 00 00 00 1c 00 00 40 05 | e1 23 de d4 d9 5f 17 c1 21 ba 79 77 2a ee 0e dd | 91 6b 75 70 | state #338 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38401cc10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a89740 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa1f00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #338 | libevent_malloc: new ptr-libevent@0x7fb3740356e0 size 128 | #338 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49671.462617 | resume sending helper answer for #338 suppresed complete_v2_state_transition() and stole MD | #338 spent 0.316 milliseconds in resume sending helper answer | stop processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3400094d0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f e2 d0 d2 e5 84 7f 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #338 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #338 | rejected packet: | 1f e2 d0 d2 e5 84 7f 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 56 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #338: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac1340 | handling event EVENT_RETRANSMIT for parent state #283 | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #283 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #283 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49671.477817; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003994 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #283 | libevent_malloc: new ptr-libevent@0x7fb3400094d0 size 128 "road-eastnet-nonat-31" #283: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #283) | 6d 25 6c e9 9d 21 2c 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b e9 86 64 c6 6f 55 a3 bc 52 39 e5 45 42 b6 cc | f2 a4 d8 e4 d7 c3 31 05 04 56 63 c6 c2 26 bf 59 | 6a b9 a8 fc fa 31 7a 57 4f f1 c0 49 83 9c 61 f6 | ea 6e c3 47 87 15 57 34 67 e5 10 86 61 2d 48 bc | 65 9e 10 ea 92 ad c9 b9 04 73 b8 2e a2 d6 b3 0a | c0 be 8f 2a 6c 99 ba 2f e9 4c 9e ba 98 ae c9 a2 | 11 55 c6 05 57 8e ab ea fe ab c0 66 94 91 31 6d | 5a 61 9a c2 11 87 93 ed bf 92 59 c4 b9 84 ce ab | db 12 40 39 53 0e ae d0 f2 e5 17 3c ea 18 98 24 | 12 e5 c0 95 86 ac ec 82 ab 81 6f 9e 62 08 73 b9 | a8 9d e0 0f 7d f3 2e 0b 7e 07 bc 19 99 3e 51 81 | 29 43 73 f2 dc b1 11 40 fd 25 79 3c 57 b5 ab be | 2e e1 68 18 e4 38 d8 a0 4c 8c 74 5e ff df de 09 | df 96 78 f3 4d 4d f6 30 46 ec df 31 2f 74 61 0b | 81 46 62 97 97 55 58 f5 2a c4 6f df 71 dd ee 98 | ae ac aa b2 0f 96 9a 79 9a bd 7e 1b 8b 95 fc 2d | 29 00 00 24 19 7a 94 41 a3 df 39 c8 6e b5 7e 75 | da 2c b2 db 58 bf cc 1e 51 b1 c7 de c1 0f 32 c8 | 22 50 94 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 90 7d 87 8b 25 a9 47 ca 59 98 98 | 30 6c 9b 73 ee 84 48 a4 00 00 00 1c 00 00 40 05 | 6c 03 cb 30 07 ff 71 63 de 15 87 b9 5c 0f 43 de | 70 36 3d ec | libevent_free: release ptr-libevent@0x7fb35c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac1340 | #283 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 25 6c e9 9d 21 2c 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #283 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #283 | rejected packet: | 6d 25 6c e9 9d 21 2c 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #283: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #324 | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #324 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #324 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49671.51412; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001915 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac1340 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #324 | libevent_malloc: new ptr-libevent@0x7fb35c035930 size 128 "road-eastnet-nonat-72" #324: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #324) | c4 71 4c 47 7a 99 7f 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c dc ba bd 1d 04 54 b8 de 2e 7e 4a 73 d1 75 b4 | 30 69 01 66 67 06 e7 5e ab 90 82 b5 8d a8 6f 99 | a6 8e f4 9a 71 40 de b0 d0 8a d9 b4 ed e4 6f 96 | 72 62 19 62 54 5d 4c 3f 06 3d 1e 94 b0 72 25 98 | 59 31 b4 12 f8 20 4c c4 1b 57 a8 cc e5 a4 fd 8e | b7 00 85 d1 0e c7 4d 3b 7a 7d 11 6d 19 fd 6a 75 | 3a e2 10 64 69 82 7f f7 9f 48 c9 57 2f a9 70 57 | 4e 17 87 f1 7b f1 ed 42 6c 69 0f 53 01 4f 76 4d | 49 de 7e 34 19 26 2c 17 55 79 6b 2b e6 70 a9 41 | 28 a8 e5 5c 9c 0b 01 88 ec 60 31 32 12 e0 5e 2a | d0 1f 1c 62 7b 27 a5 6a b5 82 73 7a c7 4d 6d 07 | a2 fe cc 3c f6 be 38 d5 e6 bc c7 f9 e4 e8 c4 66 | 25 de 6a 66 de d9 be 67 52 10 16 32 1e 81 04 70 | 2e 04 43 17 b2 33 75 6a 97 52 34 c2 f0 d7 69 62 | a8 cb 03 e7 cd 81 0c 55 75 a8 24 c4 ed 92 5e ec | 1a d4 65 0c 31 44 9a 04 50 cf 8e 45 48 fa 6a 9c | 29 00 00 24 a2 70 44 54 09 89 66 44 f1 6d a2 85 | b3 a0 4f a8 16 2e 01 ca af 0e 31 e7 7c 41 b8 c9 | 46 c7 99 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 0b 59 de ec 8b 84 8b 41 7c 2d 20 | 10 87 a7 ee 10 a7 dc 2a 00 00 00 1c 00 00 40 05 | 44 04 bc 04 96 6f cb 2b 3d a9 52 fe 2d cc 35 38 | 9a e2 35 2c | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #324 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 71 4c 47 7a 99 7f 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #324 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #324 | rejected packet: | c4 71 4c 47 7a 99 7f 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #324: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #309 | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #309 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #309 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49671.516398; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002938 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #309 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 "road-eastnet-nonat-57" #309: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #309) | 90 f2 f2 23 da 96 f5 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 ae c5 2a 76 79 d9 11 80 1f 96 5b 2c 21 55 0e | 52 32 59 59 4d 8b 62 1b 1e 24 ff e4 61 ef 06 93 | bc 09 7d 02 95 4e 35 bb 5f 6e 04 f9 37 8a f2 09 | 6d fa 0e df ec 2a 67 53 c6 cd 21 62 19 ee 00 c8 | c1 d4 ad 74 e9 af 08 d7 51 b7 54 c4 5f 85 6b a2 | 75 c9 cd 93 29 db 83 26 13 60 09 0f 01 6b a6 ba | d6 a0 83 70 f4 77 2d c4 f9 20 b0 ee 09 7b a0 33 | 18 ea 6e 22 92 4b e5 33 07 61 e4 39 b1 8b 5a 98 | 64 4f e0 7f 33 58 7a 46 70 b5 36 54 83 e6 d8 37 | ce 3d 5e 64 00 34 b5 97 2a dc 6b 73 bd d2 1e e9 | b3 9d 99 c9 3c f8 18 03 58 76 b7 9a 2d cb ea 7b | 87 84 d1 8b 6e c6 cd 25 71 71 3e 99 ff 0a 1f c8 | 85 6f a7 e5 39 50 54 2c 26 84 44 cb fa 8a 51 d4 | ba 1f 9f 90 6f 93 95 a4 f9 85 9a b3 12 aa 79 46 | 05 32 e1 d4 7a f2 7a 36 94 b5 70 4b aa c4 3f f8 | f9 83 fb b5 44 81 41 3d b3 33 5c b4 2d 71 df 84 | 29 00 00 24 4c 7f 8f 28 17 31 ae 2a a7 3c 6d 65 | 1e 41 da 23 81 4d 09 fa 18 57 5d 4f dc f4 df 6c | 20 61 c5 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f3 f8 4c d7 1e 43 e6 3f 42 eb 30 72 | de e0 e8 5b 93 4d e7 89 00 00 00 1c 00 00 40 05 | e8 f2 fc 6d 83 fa 04 7a cc 0f 54 6b 70 28 25 4d | 2b f2 eb 8b | libevent_free: release ptr-libevent@0x7fb36c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #309 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 f2 f2 23 da 96 f5 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #309 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #309 | rejected packet: | 90 f2 f2 23 da 96 f5 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #309: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe600 | handling event EVENT_RETRANSMIT for parent state #87 | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #87 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #87 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49671.523716; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.0076 exceeds limit? YES "road-eastnet-nonat-87" #87: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-87" #87: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #339 at 0x557d46a49f50 | State DB: adding IKEv2 state #339 in UNDEFINED | pstats #339 ikev2.ike started | Message ID: init #339: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #339: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #339; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-87" #339: initiating v2 parent SA to replace #87 | using existing local IKE proposals for connection road-eastnet-nonat-87 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 339 for state #339 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4d5d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #339 | libevent_malloc: new ptr-libevent@0x7fb36c00cf80 size 128 | #339 spent 0.0927 milliseconds in ikev2_parent_outI1() | RESET processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #87 ikev2.ike failed too-many-retransmits | pstats #87 ikev2.ike deleted too-many-retransmits | #87 spent 2.47 milliseconds in total | [RE]START processing: state #87 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-87" #87: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #87: PARENT_I1(half-open IKE SA) => delete | crypto helper 5 resuming | crypto helper 5 starting work-order 339 for state #339 | State DB: IKEv2 state not found (flush_incomplete_children) | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 339 | picked newest_isakmp_sa #0 for #87 "road-eastnet-nonat-87" #87: deleting IKE SA for connection 'road-eastnet-nonat-87' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-87' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-87 | State DB: deleting IKEv2 state #87 in PARENT_I1 | parent state #87: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #87 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb35c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe600 | in statetime_stop() and could not find #87 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 339 time elapsed 0.000563 seconds | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-87 which received a Delete/Notify but must remain up per local policy | (#339) spent 0.579 milliseconds in crypto helper computing work-order 339: ikev2_outI1 KE (pcr) | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 5 sending results from work-order 339 for state #339 to event queue | scheduling resume sending helper answer for #339 | libevent_malloc: new ptr-libevent@0x7fb34401a4e0 size 128 | crypto helper 5 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-87" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-87' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-87" | stop processing: connection "road-eastnet-nonat-87" (in initiate_a_connection() at initiate.c:349) | spent 0.0702 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x7fb344012bf0 | handling event EVENT_RETRANSMIT for parent state #331 | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #331 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #331 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49671.524561; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500729 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe600 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #331 | libevent_malloc: new ptr-libevent@0x7fb35c03b0b0 size 128 "road-eastnet-nonat-79" #331: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #331) | 50 44 b2 3a 07 a7 4e 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 5b 7a 1c 65 ca 17 c3 34 09 e9 50 2c 1a 5f 2c | 3f 1f d0 f4 a9 fc a5 0f b3 e0 23 18 36 32 e0 dd | 70 db 2b a7 8a bb 5e d5 7b c1 26 49 ed 17 f5 fb | 41 8c 70 b6 46 13 5b 7c be 72 85 64 1f cb c2 3b | 7b cd ab 00 d1 f5 c6 c8 ef 4e 43 8b d1 3c de 4e | 97 78 da c1 12 64 cb f5 74 cf 7b 2b a9 ae 8b a5 | dc d3 db 70 7b c5 17 1a a0 d8 61 49 40 f3 77 7a | 26 f5 d7 d4 fc a6 3c ec 56 96 bd ad fa da 9d 95 | 6f c7 43 12 03 de b3 4a 54 ca 56 3c b7 a8 38 f0 | 03 5a 39 ab 50 08 22 eb 87 c3 7d 6f ff ac b9 cb | 79 02 42 01 ae 8a 86 1f cf 39 34 00 58 b3 82 70 | cb f1 c5 9a 1b e0 1b 28 e5 0b 30 ab da 32 50 a9 | 39 71 a2 8b c0 a0 38 d2 35 39 8f d7 36 de a3 f4 | 70 e0 8f a8 7e 36 bd e7 03 3e dd 85 86 be 19 24 | 24 d5 8e aa 7b 0a 66 52 ff 44 f1 22 3a 93 2a 43 | b3 e4 83 93 f3 85 5b 68 a3 1b 91 5b 88 3f ae 95 | 29 00 00 24 03 6b b7 f1 e0 d0 ec 2f 89 98 41 7d | af 5d 2c 7f 97 af 10 99 b6 2e fe 6f ac 7d ce 98 | 66 f3 c3 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f b7 eb 6a 1a 1b 78 47 4b c9 5c d0 | 13 11 3d 6a 14 1b 4d ab 00 00 00 1c 00 00 40 05 | 4a 21 a9 91 28 88 ee e6 d7 a3 92 f2 91 f6 75 81 | f6 52 77 56 | libevent_free: release ptr-libevent@0x7fb36002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344012bf0 | #331 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 44 b2 3a 07 a7 4e 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #331 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #331 | rejected packet: | 50 44 b2 3a 07 a7 4e 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #331: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #339 | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 339 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #339 | **emit ISAKMP Message: | initiator cookie: | a2 06 83 e6 4d cf 47 f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-87 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5f 60 78 10 c3 0f cc 3e 4e 2e d5 96 c1 d2 76 e3 | ikev2 g^x 97 d5 35 a5 15 b5 cf 25 fc d1 a9 ed 61 00 ab d3 | ikev2 g^x f0 a5 f9 6b c8 93 25 3b e7 35 94 5b 27 e6 7c aa | ikev2 g^x 9f 99 13 73 c8 87 72 6f e3 9a d8 3f f2 60 6d 07 | ikev2 g^x e2 f2 df 74 8c d9 c0 ea 66 9b 1a f7 3a 35 11 09 | ikev2 g^x 4c 1a 77 9c 33 ec 8e 52 10 1b 5c 10 4f 88 cf e4 | ikev2 g^x ab bc 00 8a 49 0d dc 56 57 fd b9 aa 33 dc a2 d8 | ikev2 g^x 3f a7 e3 81 b2 6c 3d 05 80 c1 9e e7 22 3d 4f 4b | ikev2 g^x 69 99 65 2e db d4 42 77 f6 d5 da ca 9c 7b 37 94 | ikev2 g^x 4a 33 ff d3 90 af 06 41 1e af a8 a1 29 27 b8 4e | ikev2 g^x 94 36 29 4f 90 ae d8 40 e5 f9 f7 60 20 50 ae f6 | ikev2 g^x 19 f9 e5 ce 63 be 68 f8 75 c8 c0 44 7f 51 fc 3c | ikev2 g^x fe be 4d e9 10 ea 8c 24 89 c7 41 df 92 c0 7b 00 | ikev2 g^x f7 f4 82 ce db 65 47 b6 bb fd f3 75 44 d0 1d c4 | ikev2 g^x 34 92 d9 b1 3f bf c2 cf e2 c7 6c 0d 60 aa 7d 11 | ikev2 g^x 0e 19 00 e8 57 9d 13 5a 3b a1 80 7a d5 8d 15 4c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1c 60 55 0f db a5 b1 e0 94 27 e9 83 86 bb c4 10 | IKEv2 nonce 2a 23 35 9c a1 96 2d 6f 7e 5d c3 40 27 31 c9 49 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a2 06 83 e6 4d cf 47 f6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 57 | natd_hash: port= 01 f4 | natd_hash: hash= 72 61 9a 5c 09 fb 4f 1f fe 5c 80 fd 11 ff 3a 18 | natd_hash: hash= d8 5f 68 01 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 72 61 9a 5c 09 fb 4f 1f fe 5c 80 fd 11 ff 3a 18 | Notify data d8 5f 68 01 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a2 06 83 e6 4d cf 47 f6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f8 00 9b 14 2d 47 6c 3b ee ab c1 8e 99 04 04 19 | natd_hash: hash= 24 06 94 42 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f8 00 9b 14 2d 47 6c 3b ee ab c1 8e 99 04 04 19 | Notify data 24 06 94 42 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #339 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #339: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #339 to 4294967295 after switching state | Message ID: IKE #339 skipping update_recv as MD is fake | Message ID: sent #339 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-87" #339: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.87:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #339) | a2 06 83 e6 4d cf 47 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 60 78 10 c3 0f cc 3e 4e 2e d5 96 c1 d2 76 e3 | 97 d5 35 a5 15 b5 cf 25 fc d1 a9 ed 61 00 ab d3 | f0 a5 f9 6b c8 93 25 3b e7 35 94 5b 27 e6 7c aa | 9f 99 13 73 c8 87 72 6f e3 9a d8 3f f2 60 6d 07 | e2 f2 df 74 8c d9 c0 ea 66 9b 1a f7 3a 35 11 09 | 4c 1a 77 9c 33 ec 8e 52 10 1b 5c 10 4f 88 cf e4 | ab bc 00 8a 49 0d dc 56 57 fd b9 aa 33 dc a2 d8 | 3f a7 e3 81 b2 6c 3d 05 80 c1 9e e7 22 3d 4f 4b | 69 99 65 2e db d4 42 77 f6 d5 da ca 9c 7b 37 94 | 4a 33 ff d3 90 af 06 41 1e af a8 a1 29 27 b8 4e | 94 36 29 4f 90 ae d8 40 e5 f9 f7 60 20 50 ae f6 | 19 f9 e5 ce 63 be 68 f8 75 c8 c0 44 7f 51 fc 3c | fe be 4d e9 10 ea 8c 24 89 c7 41 df 92 c0 7b 00 | f7 f4 82 ce db 65 47 b6 bb fd f3 75 44 d0 1d c4 | 34 92 d9 b1 3f bf c2 cf e2 c7 6c 0d 60 aa 7d 11 | 0e 19 00 e8 57 9d 13 5a 3b a1 80 7a d5 8d 15 4c | 29 00 00 24 1c 60 55 0f db a5 b1 e0 94 27 e9 83 | 86 bb c4 10 2a 23 35 9c a1 96 2d 6f 7e 5d c3 40 | 27 31 c9 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 61 9a 5c 09 fb 4f 1f fe 5c 80 fd | 11 ff 3a 18 d8 5f 68 01 00 00 00 1c 00 00 40 05 | f8 00 9b 14 2d 47 6c 3b ee ab c1 8e 99 04 04 19 | 24 06 94 42 | state #339 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c00cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4d5d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #339 | libevent_malloc: new ptr-libevent@0x7fb36002a950 size 128 | #339 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49671.525292 | resume sending helper answer for #339 suppresed complete_v2_state_transition() and stole MD | #339 spent 0.488 milliseconds in resume sending helper answer | stop processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34401a4e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 06 83 e6 4d cf 47 f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #339 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #339 | rejected packet: | a2 06 83 e6 4d cf 47 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #339: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b07dc0 | handling event EVENT_RETRANSMIT for parent state #284 | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #284 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #284 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49671.557514; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004604 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344012bf0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #284 | libevent_malloc: new ptr-libevent@0x7fb34401a4e0 size 128 "road-eastnet-nonat-32" #284: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #284) | 4f c5 f3 7c 66 c6 91 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba b7 9c a5 65 e1 b6 6c 6d 9d e6 37 7c 5c f0 56 | 41 3d 90 c7 c5 60 97 4a 06 1e 79 6d 8b 7a e1 25 | 8a e0 db 36 d3 fb fd 75 27 2c e6 11 8c 23 25 88 | 33 6a f7 df 2d 31 86 e1 88 c6 aa 1b d4 34 45 16 | 89 ed d8 a3 84 50 47 88 30 89 02 8c a8 40 9f 16 | 7d e6 73 98 ef b8 9b e4 c2 07 6e 64 f9 a7 00 b0 | 51 f9 1e 1e 5d 35 fd 1d 61 a0 8a db ac 3a a5 8e | 67 a3 5b 3b 5e 51 8c 98 11 1d 70 aa 48 6b 1b 38 | fe 3a 74 c3 2d 4b 66 87 e9 a4 65 ed 1c 5b e4 91 | fa be 09 5f aa ec 3b 28 29 ab 52 85 54 9f ad 67 | e9 64 b2 c0 a7 f8 4d 31 5f 8c e9 8e 20 90 9f 65 | 6a 76 61 75 16 6e 59 99 0c 9b cb ca c4 c4 20 96 | 27 41 40 bc 51 ae 53 c0 78 fe 0b f1 3b 9e 38 fe | 94 f7 01 4f 33 dd 41 c6 b8 e2 1f f5 07 d9 60 b6 | 76 7e 73 5f c5 3d 67 e4 c6 ee 71 88 8c 90 3a 18 | 0e 12 ec 6b 94 d2 71 0c c3 11 05 e5 1f bd ac 6a | 29 00 00 24 e8 7e a2 09 c5 c0 d6 dc c4 8f 1b fd | a9 a5 28 29 c6 ee 14 10 31 5e 74 e5 a8 11 e2 fb | 53 d1 4d b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 bd 1e aa d2 1d d0 15 75 cf 8a a1 | 9b e7 2e 78 e9 b8 ab 0e 00 00 00 1c 00 00 40 05 | 98 e6 12 78 17 7a 25 b0 15 91 c2 32 50 43 18 e1 | 21 f2 b2 de | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b07dc0 | #284 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f c5 f3 7c 66 c6 91 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #284 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #284 | rejected packet: | 4f c5 f3 7c 66 c6 91 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #284: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35800cc10 | handling event EVENT_RETRANSMIT for parent state #325 | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #325 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #325 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49671.583785; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001378 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #325 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 "road-eastnet-nonat-73" #325: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #325) | cc 62 92 c7 07 e9 0f 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 78 1e 62 84 10 5f b3 3f 6a 1c 99 15 ef b2 82 | ab 2f bf af 7d 91 0a 7a 06 0b c3 b0 8f 52 23 e0 | 2a 6c c7 c4 de c8 66 7c 42 9d 81 5e 4d 92 4f 0b | 2b a2 91 3c a6 4c 27 12 5d 3b 8e 56 27 02 38 a0 | d6 c6 eb ec 94 e3 d3 7c 60 71 44 03 de ee 1c 20 | b0 a7 fc d5 f0 33 3d 58 40 9a 40 7c 4b ef 22 f2 | e4 98 7c df 9e 84 f0 00 c2 3a 23 ca 54 c0 d4 32 | 78 ec 09 e7 04 f1 06 b2 16 5d 5c 32 c7 62 b8 41 | 9e c8 62 f4 94 dc ed 85 b6 72 ee e7 73 a0 4e 8f | 20 26 e2 05 be 3a 4e 16 75 b9 60 31 64 9c 09 14 | ad be c7 c8 b5 48 83 aa 5c 33 7b 3c 0a 72 26 74 | 75 7b 8e 60 49 df aa 10 6d 2e c8 c2 08 b3 b5 75 | e0 b2 66 ad ea 56 f8 5f 65 d4 40 09 52 2c f1 dd | 08 91 8c 9a aa bf 76 e2 bf e4 1a 3b 53 96 c1 d8 | e5 63 67 aa b1 58 7e 5f 20 cf 8d 72 df da b4 0e | bf a9 5c cc d8 b0 81 7f 8f b4 f2 bf dd 09 8c 23 | 29 00 00 24 bd d5 db 94 ee 32 26 3b fc 5c d2 c6 | e1 33 da da 8c 36 b9 7d d8 b6 53 e3 83 8c 71 5a | ae 9b 26 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 04 08 e6 80 0c ed de 4c 99 bb 24 | eb 89 b5 9f d3 24 a6 8a 00 00 00 1c 00 00 40 05 | 55 23 78 6b d1 b2 f4 84 29 a3 9f e9 4d 04 41 1c | 82 df 78 f0 | libevent_free: release ptr-libevent@0x7fb35804ba00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800cc10 | #325 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46afcfc0 | handling event EVENT_RETRANSMIT for parent state #332 | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #332 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #332 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49671.583972; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500639 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #332 | libevent_malloc: new ptr-libevent@0x7fb35804ba00 size 128 "road-eastnet-nonat-80" #332: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #332) | f6 c6 d2 5e ba a8 2a f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 1a 55 0f 26 2f b6 a0 08 51 81 5d b7 71 b9 2d | c5 80 10 57 cc 9f 39 cd 78 f5 33 cd 29 d9 74 2d | fd fd 10 79 da 5f 98 34 d3 3d e4 28 2e 71 42 b8 | 31 90 4d 52 c2 47 b7 94 df 57 9e 16 03 38 42 c0 | 07 fe 24 67 18 0a bc 2f be 06 80 3f 3f 52 ae de | ee ce 07 d7 03 01 92 16 62 42 5c 77 dc 87 62 e2 | 3a dd 16 7d 8f 37 3d c8 ba 22 d8 ef 9b 9d 2a 3d | e0 2c 5c 39 14 07 d4 e9 80 bd 41 35 a2 65 f5 06 | d6 66 0e 9c 09 15 5b 2c 90 ec 66 68 2a aa 32 c8 | f4 e9 0e 83 19 df 87 aa b7 d2 50 b1 70 7c e8 1d | 69 9d 8f db 7f c7 e2 b0 71 77 37 93 72 6b 02 1f | ff 20 a4 e2 5f 72 65 e8 93 2e 78 8f 02 5c 26 b8 | d6 41 94 30 c6 30 1d fb 21 2d 70 c7 a4 c4 37 64 | d1 d0 93 45 ae 86 94 3c ef 88 96 54 5d 14 dc 13 | 82 20 c0 68 d6 ce 1b eb 97 51 ea 00 31 01 9f 99 | 9c 00 ca 7b c6 e3 21 ad 8a 48 45 1f d8 69 47 47 | 29 00 00 24 92 2b 4a ab c7 31 ef e2 7b 94 b4 08 | 46 bc 96 1f c5 de 4e 6b bb 45 28 4b ff e0 00 6e | 79 8b 88 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 fd 6f fe 83 1d 32 21 59 ad 4f 6d | 1b 98 f5 b3 09 7a d7 45 00 00 00 1c 00 00 40 05 | f2 d1 58 ca ab 44 6f 50 93 d1 3e f5 88 73 05 cc | 3b a4 3c c0 | libevent_free: release ptr-libevent@0x7fb374045df0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afcfc0 | #332 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 62 92 c7 07 e9 0f 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #325 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #325 | rejected packet: | cc 62 92 c7 07 e9 0f 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #325: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 c6 d2 5e ba a8 2a f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #332 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #332 | rejected packet: | f6 c6 d2 5e ba a8 2a f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #332: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.056 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24680 | handling event EVENT_RETRANSMIT for parent state #88 | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #88 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #88 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49671.592345; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008964 exceeds limit? YES "road-eastnet-nonat-88" #88: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-88" #88: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #340 at 0x557d46a4b510 | State DB: adding IKEv2 state #340 in UNDEFINED | pstats #340 ikev2.ike started | Message ID: init #340: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #340: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #340; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-88" #340: initiating v2 parent SA to replace #88 | using existing local IKE proposals for connection road-eastnet-nonat-88 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 340 for state #340 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46afcfc0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #340 | libevent_malloc: new ptr-libevent@0x7fb374045df0 size 128 | #340 spent 0.0716 milliseconds in ikev2_parent_outI1() | crypto helper 3 resuming | crypto helper 3 starting work-order 340 for state #340 | RESET processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 340 | start processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #88 ikev2.ike failed too-many-retransmits | pstats #88 ikev2.ike deleted too-many-retransmits | #88 spent 2.55 milliseconds in total | [RE]START processing: state #88 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-88" #88: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #88: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #88 "road-eastnet-nonat-88" #88: deleting IKE SA for connection 'road-eastnet-nonat-88' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-88' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-88 | State DB: deleting IKEv2 state #88 in PARENT_I1 | parent state #88: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 340 time elapsed 0.000998 seconds | (#340) spent 1 milliseconds in crypto helper computing work-order 340: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 340 for state #340 to event queue | scheduling resume sending helper answer for #340 | libevent_malloc: new ptr-libevent@0x7fb33801a4e0 size 128 | crypto helper 3 waiting (nothing to do) | stop processing: state #88 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb36804b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24680 | in statetime_stop() and could not find #88 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-88 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-88" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-88' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-88" | stop processing: connection "road-eastnet-nonat-88" (in initiate_a_connection() at initiate.c:349) | spent 0.0581 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #340 | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 340 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #340 | **emit ISAKMP Message: | initiator cookie: | 06 b4 2a d6 65 92 42 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-88 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2a 29 a3 64 49 07 ee 29 df 38 b6 8e cf 9e 1e 2e | ikev2 g^x b5 cf 5c 9d df 90 0b 24 c7 00 d1 e9 e7 d5 9f 86 | ikev2 g^x b0 59 b0 c3 a3 da d8 a1 12 f7 d8 f8 0e b3 79 c6 | ikev2 g^x 53 3d ef a8 ea 62 cb cf 67 47 98 25 86 4a be 53 | ikev2 g^x 9d 43 a7 c0 c8 ef 24 bd 84 89 4d 1e d4 43 4c 6d | ikev2 g^x a9 e8 b8 a2 ac 6e 98 24 1f 18 dc ca 27 cf d8 28 | ikev2 g^x a6 29 25 bd 63 2f 94 ef bf ef cd 28 af b3 c4 14 | ikev2 g^x c2 24 5c 8a a7 98 ce 81 da e6 36 b6 6f 19 b3 9c | ikev2 g^x 61 e9 12 2d 81 4f 37 09 f9 11 51 0b 0a 15 3c 25 | ikev2 g^x dc 56 9d bc 1a 37 30 79 ad 58 f9 75 6f 1b 9e ed | ikev2 g^x af 69 6e f2 46 86 c0 e7 9c f5 ce 51 f7 2f 69 1c | ikev2 g^x c5 ca c9 df 4e 7a 80 a9 78 c1 72 af 2f 09 7a f4 | ikev2 g^x 7b e9 80 c9 52 10 9d 4e 28 29 82 d9 cd 16 a6 20 | ikev2 g^x 67 0a 26 62 77 51 4a e8 62 40 48 56 bb c1 3c 45 | ikev2 g^x c4 fb 9d d0 c4 57 ec 56 11 1b 76 f9 cd ac 15 3f | ikev2 g^x 9b 2c e1 a4 49 9f 96 e5 41 42 75 44 0c a4 b4 45 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ae e0 e3 5e aa a2 ee b4 ba fd 41 25 ff 71 9d 02 | IKEv2 nonce 44 71 da b9 6c 12 19 98 91 a3 35 04 b4 f3 15 fb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 06 b4 2a d6 65 92 42 69 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 58 | natd_hash: port= 01 f4 | natd_hash: hash= 74 9b ba f5 3a f3 63 5f fe ea b4 e7 7e cf 7e 1a | natd_hash: hash= ac 8a 91 ce | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 74 9b ba f5 3a f3 63 5f fe ea b4 e7 7e cf 7e 1a | Notify data ac 8a 91 ce | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 06 b4 2a d6 65 92 42 69 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7a 1b 4b 67 34 a5 a3 ba cf 0b c3 8e 76 85 1a 07 | natd_hash: hash= b5 81 41 18 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7a 1b 4b 67 34 a5 a3 ba cf 0b c3 8e 76 85 1a 07 | Notify data b5 81 41 18 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #340 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #340: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #340 to 4294967295 after switching state | Message ID: IKE #340 skipping update_recv as MD is fake | Message ID: sent #340 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-88" #340: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.88:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #340) | 06 b4 2a d6 65 92 42 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 29 a3 64 49 07 ee 29 df 38 b6 8e cf 9e 1e 2e | b5 cf 5c 9d df 90 0b 24 c7 00 d1 e9 e7 d5 9f 86 | b0 59 b0 c3 a3 da d8 a1 12 f7 d8 f8 0e b3 79 c6 | 53 3d ef a8 ea 62 cb cf 67 47 98 25 86 4a be 53 | 9d 43 a7 c0 c8 ef 24 bd 84 89 4d 1e d4 43 4c 6d | a9 e8 b8 a2 ac 6e 98 24 1f 18 dc ca 27 cf d8 28 | a6 29 25 bd 63 2f 94 ef bf ef cd 28 af b3 c4 14 | c2 24 5c 8a a7 98 ce 81 da e6 36 b6 6f 19 b3 9c | 61 e9 12 2d 81 4f 37 09 f9 11 51 0b 0a 15 3c 25 | dc 56 9d bc 1a 37 30 79 ad 58 f9 75 6f 1b 9e ed | af 69 6e f2 46 86 c0 e7 9c f5 ce 51 f7 2f 69 1c | c5 ca c9 df 4e 7a 80 a9 78 c1 72 af 2f 09 7a f4 | 7b e9 80 c9 52 10 9d 4e 28 29 82 d9 cd 16 a6 20 | 67 0a 26 62 77 51 4a e8 62 40 48 56 bb c1 3c 45 | c4 fb 9d d0 c4 57 ec 56 11 1b 76 f9 cd ac 15 3f | 9b 2c e1 a4 49 9f 96 e5 41 42 75 44 0c a4 b4 45 | 29 00 00 24 ae e0 e3 5e aa a2 ee b4 ba fd 41 25 | ff 71 9d 02 44 71 da b9 6c 12 19 98 91 a3 35 04 | b4 f3 15 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 9b ba f5 3a f3 63 5f fe ea b4 e7 | 7e cf 7e 1a ac 8a 91 ce 00 00 00 1c 00 00 40 05 | 7a 1b 4b 67 34 a5 a3 ba cf 0b c3 8e 76 85 1a 07 | b5 81 41 18 | state #340 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374045df0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46afcfc0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24680 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #340 | libevent_malloc: new ptr-libevent@0x7fb36804b7c0 size 128 | #340 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49671.593899 | resume sending helper answer for #340 suppresed complete_v2_state_transition() and stole MD | #340 spent 0.321 milliseconds in resume sending helper answer | stop processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb33801a4e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 b4 2a d6 65 92 42 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #340 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #340 | rejected packet: | 06 b4 2a d6 65 92 42 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #340: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc00 | handling event EVENT_RETRANSMIT for parent state #310 | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #310 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #310 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49671.602079; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003329 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #310 | libevent_malloc: new ptr-libevent@0x7fb33801a4e0 size 128 "road-eastnet-nonat-58" #310: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #310) | 15 02 9e 6f d7 63 29 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 27 e5 1e b0 b8 71 be 19 22 95 4e cb bc fb 75 | e9 3b 56 69 33 4e 64 ad 57 4b 29 1e a9 e6 47 1a | 9f d6 c8 79 0e b5 d1 68 4e cf f5 82 76 ae 1c b5 | 09 2e f5 34 f0 f4 52 a3 a8 36 97 6c 75 c0 43 c4 | ee 87 0e 53 ff 09 f4 54 79 74 c0 ae 90 9a ff fd | 29 25 b3 6a e6 b5 58 cb 0a 34 f3 40 7a e1 f0 00 | e8 b9 84 74 bb 8e 47 15 eb 04 15 5e 50 5c 56 6d | 24 4e c6 f1 73 76 98 a0 94 06 1f 4b 61 2c fc 5d | a8 62 64 09 74 1c b7 15 e9 d3 bf 3e 82 77 60 84 | b7 ec 0f bd 1c 3b 5b 97 d2 ff 90 15 40 4c 65 b9 | 49 3d 03 bf e1 e0 85 d7 23 77 e3 10 9e 84 72 33 | 77 bf bf d8 fb 57 2c a9 b4 49 77 20 46 c0 0f 64 | 28 da 55 aa ac 53 17 bb 64 f6 fe 0e af c2 be 09 | 4d 7e 65 25 98 17 8d d6 a3 3b ed 10 34 62 66 3b | 5f 3c 43 cb 1e 2b fc 0b 3e c7 88 ef 40 72 0f 91 | 73 8c 1b 91 80 50 8f 7f 10 7c a8 7c cd 25 bb 09 | 29 00 00 24 8c b6 d4 9e 94 5a 53 1f e0 86 71 ae | 2a 48 4d 09 6b cb 2a d4 c0 d8 ae 06 c9 7c dd 47 | 64 97 96 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 0a e7 b4 3e 63 13 55 ea 18 77 04 | bd 77 d7 da 99 7b 63 27 00 00 00 1c 00 00 40 05 | 5c 4d 49 83 ef 78 da dd 25 a2 53 b8 0f 9a 33 7f | f6 be 51 b8 | libevent_free: release ptr-libevent@0x7fb37c01a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc00 | #310 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 02 9e 6f d7 63 29 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #310 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #310 | rejected packet: | 15 02 9e 6f d7 63 29 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #310: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a25d10 | handling event EVENT_RETRANSMIT for parent state #285 | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #285 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #285 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49671.62237; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003521 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc00 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #285 | libevent_malloc: new ptr-libevent@0x7fb37c01a4e0 size 128 "road-eastnet-nonat-33" #285: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #285) | 8e b8 37 d5 68 56 5c 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 a4 f2 e0 52 94 4a 81 83 55 c1 41 32 b7 b8 02 | 1f ed 45 79 af ff 8a eb 0a de 74 5c 80 82 ad 8f | b3 d0 39 bf 3b db ca 12 0b a2 0e eb ce 92 b6 11 | 51 c6 b7 d3 f4 87 aa 09 0c f5 bb d2 46 13 91 7d | 65 dc 9e 2a 12 da 3f be a8 bc 4e 1c a1 4c 53 ad | 64 f4 41 68 96 19 bd e1 80 86 91 4f 17 c1 cc 5c | ad 72 12 cc 9c fe d8 85 6a cd 1f 0f cf 61 bc 07 | 09 af 5b a0 a2 6c 2a 6f 4c 7e dd ad 13 55 ed 0e | ce cf e6 c5 66 9e 5a 6a e4 42 78 50 61 c3 d4 73 | e3 47 f2 bc a4 8c 26 64 97 c9 f1 2a c6 63 9c 83 | 60 4f 25 9e cb 7a 10 71 25 9d c1 dd 11 38 34 bc | 7c a1 3b 2b 0d 73 6f f9 3c 0b 62 50 05 38 a7 0e | 31 2d 60 72 dd 2b a2 05 f6 e2 f0 0d 9b c1 b1 9e | c0 ee 0d 2f 64 4b 28 d2 c0 e7 3b 0a 50 ff 03 45 | 45 ff 2c cd 4e 54 17 7d 2b 95 02 32 23 94 0e de | 7b 38 d9 9c b7 e8 7d 2f 56 9c 26 e0 8b a0 e6 38 | 29 00 00 24 e6 a9 52 cb 4c 75 d2 f3 84 20 3b dd | 0e ee e2 12 57 50 c2 6f 3d 4c ae 21 23 00 a4 ca | 8c 87 5b 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 5c 90 12 97 99 4e dd 8f 9a cf 75 | ad 0a 2b a1 31 ad 53 29 00 00 00 1c 00 00 40 05 | f9 f4 9b a0 01 06 28 22 67 53 82 2b ec 0b 3c 23 | 3e d8 d3 7f | libevent_free: release ptr-libevent@0x7fb37c014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a25d10 | #285 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e b8 37 d5 68 56 5c 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #285 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #285 | rejected packet: | 8e b8 37 d5 68 56 5c 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #285: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388015720 | handling event EVENT_RETRANSMIT for parent state #333 | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #333 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #333 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49671.648713; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50057 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a25d10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #333 | libevent_malloc: new ptr-libevent@0x7fb37c014c70 size 128 "road-eastnet-nonat-81" #333: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #333) | 36 9c 5e f3 7a 54 db f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df 35 02 78 fc 13 18 22 30 0e d2 c5 c7 5e 7a ef | fc 39 68 66 58 1c a7 d7 f4 43 08 7d f3 9f a3 12 | 83 85 91 2a d6 fa cf 49 c5 3a 4e ef 94 c1 54 16 | 1b 99 b1 a6 48 34 1c b5 c6 ee 58 e5 e4 3c 00 8c | f6 ed dc dd 07 96 4c 6b 8d 5f aa d5 5e f5 20 2e | 3f 32 89 26 7f 4e af 1e 9a 4a 36 89 bf ed bc fa | 5a d9 0b e6 38 d4 55 02 b6 04 ba b9 b2 30 b0 dc | ee 4b 24 b9 ca 12 84 2f 34 21 e3 1c 0e f7 c4 d5 | ce ff 47 39 50 96 0a de ca 62 7f b7 57 aa dc 15 | fa 24 df 17 c7 d0 80 14 18 ef d1 f8 18 5f 36 22 | 2a ba 77 eb 0a 13 5b 8b 27 f6 fa ad 95 0f 09 90 | 17 80 57 73 91 84 22 c2 f7 e1 0e dd b5 d9 e2 7e | 44 ff ae 13 c1 78 7c 90 56 b5 79 a1 5d 2f 9a 4e | 56 4b 74 fa 8f 64 20 07 77 6a 9d cf 03 50 e4 f8 | 0d 1d ad 75 e0 c0 52 df 18 df 4e ac 10 5a bf 8c | 35 df 7e 38 e0 d8 bf ff 6f 7d 3a 37 d3 86 c3 73 | 29 00 00 24 0e 6c f9 b7 77 8c 01 48 47 c0 c4 ac | 2c 92 5d 4f bc 4c de 69 52 73 e8 16 78 88 9e ed | d3 2e 55 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 3c 0e c8 f8 59 38 94 13 7f 9d fb | 64 4c f1 0b 3e 49 1c bd 00 00 00 1c 00 00 40 05 | 19 5d c9 52 f0 58 98 88 cd 4a c6 e4 d4 78 0a 3b | 9f f4 40 6f | libevent_free: release ptr-libevent@0x7fb3600407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388015720 | #333 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 9c 5e f3 7a 54 db f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #333 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #333 | rejected packet: | 36 9c 5e f3 7a 54 db f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #333: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00cc10 | handling event EVENT_RETRANSMIT for parent state #326 | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #326 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #326 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49671.65199; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002187 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388015720 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #326 | libevent_malloc: new ptr-libevent@0x7fb3600407f0 size 128 "road-eastnet-nonat-74" #326: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #326) | 42 f4 17 bf 0b bc 36 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 f1 42 33 74 d0 fe 82 a0 d4 22 fd 7e 34 64 49 | 4d f5 d3 8f 3e 37 b5 af 12 9f 05 ef b3 72 9a 99 | 78 df 2d 2f c1 8c de 77 86 8e 9d 6b 67 d9 af af | ad cd b2 74 66 27 67 e3 45 6f da e1 b8 1d 10 12 | aa 54 5a 52 9a fc e0 30 8f 8b 79 31 12 59 11 92 | 5a a1 07 c2 c4 b1 d0 f4 f9 0f 04 f7 fe f9 b1 b9 | c8 5b 99 45 a3 87 06 f5 cc 08 82 18 bb f1 79 c6 | 9f 6d fc 2f c8 a5 4a bb b2 a8 2f 54 59 10 ab c2 | 83 cd 07 a2 e9 49 2a 19 10 9b b3 c3 b9 59 af 8a | 82 ad ef ed 34 d0 18 f1 8e 6d d9 f9 1b 1e 64 1d | ec 20 a9 3c a9 39 c4 6f 5c 5b 8b c5 2f aa 09 df | 17 b3 bf d7 16 36 cf cd 3e 0b 96 b5 5a 10 91 84 | f4 f3 63 75 93 27 25 04 41 5d c2 9e 4a 8a 6e e8 | b0 1c 23 7f 1d 44 0d 90 e6 7c 9c aa 0e b4 1e 03 | 9a ca 50 45 b0 6c ee 84 fe cf 35 d4 8b f6 71 45 | c0 43 28 23 ec 38 bc a8 e6 b5 85 28 d9 a1 fe 85 | 29 00 00 24 f7 60 f4 89 79 23 81 74 40 fe e0 94 | 99 4a 8a 5f b0 ba 18 0a 74 b7 e9 e4 4c 15 74 6f | 38 fd 32 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 0a 23 00 01 aa ce 92 9c 9e 81 0a | b1 b8 dc a9 c7 b7 f1 4a 00 00 00 1c 00 00 40 05 | 06 aa ce 4d 77 27 34 16 db f8 8e b3 38 da ae 93 | 3f 43 ba fe | libevent_free: release ptr-libevent@0x7fb35c01a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00cc10 | #326 spent 0.0931 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 f4 17 bf 0b bc 36 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #326 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #326 | rejected packet: | 42 f4 17 bf 0b bc 36 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #326: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7a350 | handling event EVENT_RETRANSMIT for parent state #89 | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #89 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #89 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49671.65522; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005907 exceeds limit? YES "road-eastnet-nonat-89" #89: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-89" #89: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #341 at 0x557d46a4cad0 | State DB: adding IKEv2 state #341 in UNDEFINED | pstats #341 ikev2.ike started | Message ID: init #341: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #341: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #341; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-89" #341: initiating v2 parent SA to replace #89 | using existing local IKE proposals for connection road-eastnet-nonat-89 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 341 for state #341 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c00cc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #341 | libevent_malloc: new ptr-libevent@0x7fb35c01a4e0 size 128 | #341 spent 0.0703 milliseconds in ikev2_parent_outI1() | crypto helper 1 resuming | RESET processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 starting work-order 341 for state #341 | start processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 341 | pstats #89 ikev2.ike failed too-many-retransmits | pstats #89 ikev2.ike deleted too-many-retransmits | #89 spent 2.41 milliseconds in total | [RE]START processing: state #89 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-89" #89: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #89: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #89 "road-eastnet-nonat-89" #89: deleting IKE SA for connection 'road-eastnet-nonat-89' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-89' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-89 | State DB: deleting IKEv2 state #89 in PARENT_I1 | parent state #89: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #89 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb36c04b7c0 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 341 time elapsed 0.000565 seconds | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7a350 | (#341) spent 0.572 milliseconds in crypto helper computing work-order 341: ikev2_outI1 KE (pcr) | in statetime_stop() and could not find #89 | crypto helper 1 sending results from work-order 341 for state #341 to event queue | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #341 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7fb38801d010 size 128 Initiating connection road-eastnet-nonat-89 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 1 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-89" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-89' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-89" | stop processing: connection "road-eastnet-nonat-89" (in initiate_a_connection() at initiate.c:349) | spent 0.0697 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #341 | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 341 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #341 | **emit ISAKMP Message: | initiator cookie: | 49 c3 42 79 ad a4 02 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-89 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c7 28 2b 3a 23 5f 9c 41 a8 c4 b1 54 27 b8 a0 a8 | ikev2 g^x a4 06 9f e8 bd 51 0b 54 b6 c3 33 24 5b b7 ea 09 | ikev2 g^x 0f d7 aa 52 2f c6 c6 78 f1 af 48 22 da 41 1f 06 | ikev2 g^x 45 43 46 fc b0 c6 2f 1b c2 df 83 35 32 87 c5 a5 | ikev2 g^x b2 fd 30 3e 95 a2 12 80 00 0f 09 dd 41 c2 48 21 | ikev2 g^x 60 8b 18 12 e2 f7 cf 1e de 64 8d 80 92 30 17 55 | ikev2 g^x ad 93 96 5a 50 26 d3 cf d9 c9 40 82 d0 c1 d7 8c | ikev2 g^x 1b c3 86 4b 02 cc 46 e2 fc 73 8a b5 ae 23 f0 12 | ikev2 g^x e2 a2 8c 5d c9 4d fa 9f 2b e7 d4 9f 15 6e 8f 91 | ikev2 g^x 94 64 45 c0 fe f3 80 9a 4c e2 d7 66 20 dd 41 dc | ikev2 g^x 6b 9b c8 3f df d1 ab 15 c5 36 9b b6 cb 01 6b 62 | ikev2 g^x c9 d1 d0 ae bf 44 a3 4d 59 dd 52 35 90 0f 89 8a | ikev2 g^x f2 c1 bf c6 f6 a5 a8 2e c6 a8 d7 de 94 ea f6 00 | ikev2 g^x 11 3a e4 a5 1c cc 19 f4 1b 95 ff 82 80 6f 79 ae | ikev2 g^x 97 c0 6f ca 24 fa 61 b5 2e 87 00 ef d7 62 ce 06 | ikev2 g^x 06 5f 50 40 c4 2f 8b 3a fb 06 a7 11 50 8a 1f ce | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b0 2a b8 49 b5 4b c9 98 47 c3 4a b6 54 a6 a4 dc | IKEv2 nonce f8 8a 35 db 6a e0 ae b8 2b 87 41 53 a2 41 a5 7b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 49 c3 42 79 ad a4 02 a5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 59 | natd_hash: port= 01 f4 | natd_hash: hash= 4e a8 6f b4 ec 17 85 04 80 69 75 d9 db 5a 4e 4f | natd_hash: hash= c9 9c a6 7b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4e a8 6f b4 ec 17 85 04 80 69 75 d9 db 5a 4e 4f | Notify data c9 9c a6 7b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 49 c3 42 79 ad a4 02 a5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 47 20 cd 59 bf 11 9f 21 41 41 cd 45 1c bb 06 ab | natd_hash: hash= 5f ca 38 7e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 47 20 cd 59 bf 11 9f 21 41 41 cd 45 1c bb 06 ab | Notify data 5f ca 38 7e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #341 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #341: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #341 to 4294967295 after switching state | Message ID: IKE #341 skipping update_recv as MD is fake | Message ID: sent #341 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-89" #341: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.89:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #341) | 49 c3 42 79 ad a4 02 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 28 2b 3a 23 5f 9c 41 a8 c4 b1 54 27 b8 a0 a8 | a4 06 9f e8 bd 51 0b 54 b6 c3 33 24 5b b7 ea 09 | 0f d7 aa 52 2f c6 c6 78 f1 af 48 22 da 41 1f 06 | 45 43 46 fc b0 c6 2f 1b c2 df 83 35 32 87 c5 a5 | b2 fd 30 3e 95 a2 12 80 00 0f 09 dd 41 c2 48 21 | 60 8b 18 12 e2 f7 cf 1e de 64 8d 80 92 30 17 55 | ad 93 96 5a 50 26 d3 cf d9 c9 40 82 d0 c1 d7 8c | 1b c3 86 4b 02 cc 46 e2 fc 73 8a b5 ae 23 f0 12 | e2 a2 8c 5d c9 4d fa 9f 2b e7 d4 9f 15 6e 8f 91 | 94 64 45 c0 fe f3 80 9a 4c e2 d7 66 20 dd 41 dc | 6b 9b c8 3f df d1 ab 15 c5 36 9b b6 cb 01 6b 62 | c9 d1 d0 ae bf 44 a3 4d 59 dd 52 35 90 0f 89 8a | f2 c1 bf c6 f6 a5 a8 2e c6 a8 d7 de 94 ea f6 00 | 11 3a e4 a5 1c cc 19 f4 1b 95 ff 82 80 6f 79 ae | 97 c0 6f ca 24 fa 61 b5 2e 87 00 ef d7 62 ce 06 | 06 5f 50 40 c4 2f 8b 3a fb 06 a7 11 50 8a 1f ce | 29 00 00 24 b0 2a b8 49 b5 4b c9 98 47 c3 4a b6 | 54 a6 a4 dc f8 8a 35 db 6a e0 ae b8 2b 87 41 53 | a2 41 a5 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e a8 6f b4 ec 17 85 04 80 69 75 d9 | db 5a 4e 4f c9 9c a6 7b 00 00 00 1c 00 00 40 05 | 47 20 cd 59 bf 11 9f 21 41 41 cd 45 1c bb 06 ab | 5f ca 38 7e | state #341 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c01a4e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c00cc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #341 | libevent_malloc: new ptr-libevent@0x7fb36c04b7c0 size 128 | #341 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49671.65642 | resume sending helper answer for #341 suppresed complete_v2_state_transition() and stole MD | #341 spent 0.396 milliseconds in resume sending helper answer | stop processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38801d010 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 c3 42 79 ad a4 02 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #341 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #341 | rejected packet: | 49 c3 42 79 ad a4 02 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 59 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #341: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0456 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #311 | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #311 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #311 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49671.6676; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002829 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388009ed0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #311 | libevent_malloc: new ptr-libevent@0x7fb38801d010 size 128 "road-eastnet-nonat-59" #311: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #311) | 44 99 87 40 ba 63 67 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 f7 3b 73 41 b9 88 7a e8 c9 5c 33 15 fe 59 eb | fc 54 1c 32 28 ad 56 eb 34 ed 9a d7 b7 26 48 b1 | 97 4e 59 ed 4f 99 cd e8 e6 27 80 3f 35 da 0c a7 | 23 d8 2f 5d 19 c3 94 0e 09 96 31 23 4d f5 99 7a | 2e 77 d3 1f 35 48 ef 9d e1 61 1a 11 39 f8 6e ce | 65 2d d0 de 38 b4 23 52 6e 45 44 65 4d 7b bd c8 | 41 7e 01 a8 b3 39 9f a8 ee a5 53 dc 50 9b 94 2b | 69 df 03 ec 5d 36 9f 33 dc 3d 9c 7a 93 11 41 9c | 33 38 19 c9 cf 1a a3 f8 96 ca d4 d9 26 62 88 91 | 39 58 69 eb 93 1e 87 6a d7 64 14 8d 9c 37 19 fa | c6 b6 78 0e bc 5c f3 4b 97 bf 56 93 52 5a ea e8 | e0 ac be 1b 36 a8 31 6f 20 82 12 c0 13 79 34 1d | 86 03 61 75 0c 12 25 55 a8 61 36 78 64 d8 d0 e0 | d9 d2 a7 01 7f 00 fd 1f 2e 03 76 1e 96 2c 85 64 | f8 86 44 8c a4 8a 04 3f e3 a8 0c 90 29 b2 ad bc | e2 32 ac c2 2b f4 81 23 cf 52 ee cf c4 e3 9c c7 | 29 00 00 24 d3 df f6 74 46 9e 11 7f ae 1b 7e 22 | a8 9e 39 ab f7 77 2a 20 6e a6 c0 c3 6f 0b 0c 6a | a5 08 b1 f9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c b5 fb 2f 48 22 68 cf e1 a0 a0 6d | 16 65 fc 12 3f 30 cc 2d 00 00 00 1c 00 00 40 05 | 5f ba 06 b7 b7 74 50 87 e6 7e 19 f6 51 18 f6 57 | 2a d1 11 81 | libevent_free: release ptr-libevent@0x7fb33803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #311 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 99 87 40 ba 63 67 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #311 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #311 | rejected packet: | 44 99 87 40 ba 63 67 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #311: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae8980 | handling event EVENT_RETRANSMIT for parent state #286 | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #286 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #286 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49671.69092; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003483 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #286 | libevent_malloc: new ptr-libevent@0x7fb33803b0b0 size 128 "road-eastnet-nonat-34" #286: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #286) | a2 ed ea 42 1b 91 7a d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a a6 7d cd 97 e4 f8 0e 4c a8 f7 b1 ec cb f9 8c | 2f 76 7e 20 17 e9 ac 96 37 6c d0 36 42 10 05 54 | c9 b8 65 a2 e7 d3 10 b3 60 78 69 80 3d 25 e3 d0 | 6b b3 ef 43 8d bb 4b f1 6d fd 75 58 b6 64 ea eb | 21 44 51 94 9d af c8 b5 2c d9 89 52 8e 49 92 15 | c8 f5 a7 13 6d cd 71 4c 89 a6 18 b9 37 a2 0d cb | 6e 90 fa f6 c2 05 39 4f e6 3c 7a ff 95 71 4f ea | 6f fa 7f ad 4f d5 8a a0 2f e3 1c 55 7c 9d 2b b7 | f8 c6 43 95 70 9b 3c 8c f8 2e 6e 7f b8 14 5a ab | e6 e2 cc bb a0 95 89 e6 41 f3 31 0c 80 44 7c cc | 26 be 63 d8 03 4f 0e f4 82 c2 32 aa ff f3 ec 67 | 80 f5 48 c4 4e dc 67 68 c5 87 ee 31 77 11 8a 89 | f7 38 08 ed 5a b3 8e c6 08 9c 28 3d e6 49 22 cc | f1 1d ea 6e 27 3f 41 69 56 c6 98 3e aa a5 4b a8 | 83 96 ce 94 b1 ac 7a 4b a0 42 08 47 1d ca 77 fa | 08 50 16 47 c6 8d 84 08 18 b0 a8 93 c0 9a 70 76 | 29 00 00 24 ff d1 37 2d 2c 72 ee aa 08 fb db a4 | 83 ef f7 bd 0a ef 47 b4 41 70 b6 07 5f 86 86 3a | e3 fa 60 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 c0 b7 bc 90 25 46 09 9f 5d 7d 2b | e5 1e 40 45 53 17 97 19 00 00 00 1c 00 00 40 05 | ec a0 d2 60 58 e7 4c 5a 13 5c f5 c2 c9 76 dd 61 | a7 bb 7e 37 | libevent_free: release ptr-libevent@0x7fb36804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae8980 | #286 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 ed ea 42 1b 91 7a d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #286 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #286 | rejected packet: | a2 ed ea 42 1b 91 7a d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #286: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380015720 | handling event EVENT_RETRANSMIT for parent state #334 | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #334 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #334 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49671.72121; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501457 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae8980 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #334 | libevent_malloc: new ptr-libevent@0x7fb36804b850 size 128 "road-eastnet-nonat-82" #334: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #334) | 99 fb 3f 4d 99 57 72 cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a ca de c8 71 49 e8 30 84 13 c9 a8 49 58 85 47 | 09 f9 f9 59 70 d3 2b 07 44 44 cc 17 14 52 02 aa | 27 07 c2 cd 39 d4 b6 e5 73 79 a9 2f 72 89 bd 61 | d5 62 f8 e8 e6 f1 12 2e 57 7d d0 8e 8b 5d 7b ce | 30 2f b7 61 b2 0b 7b a0 24 5a fe 42 60 21 92 aa | 5a be e9 6d ac f6 2b f8 e4 db ed fe 70 91 ae a8 | 85 c9 a9 89 2d af 8b 90 60 53 0f 7b 1f 54 22 36 | b6 5d 78 20 de 79 62 7d 9d 74 65 df 47 cb 75 b6 | eb 4f 70 ec d4 3f 23 06 d7 65 0a b2 74 f8 e9 72 | 81 4c 29 37 9f 65 5b 7b c1 89 f7 c4 28 5b 64 9b | 59 6b b0 17 bf e7 21 58 4f ad 42 06 42 7b d5 d6 | 2f 45 bc a9 64 87 9f 47 9d 1c 11 c7 6e 0c 53 bf | a5 35 d6 5f eb b3 bf 80 3c b3 0d 2b 91 66 f7 a4 | 98 9c 01 6a 7e ee e3 b3 ad 96 90 67 e0 44 49 71 | 2a 4d 41 3b cc ae 39 dd 1f 03 62 e9 5e 5c bf 21 | 27 f6 9b 3e 24 35 1b f3 b8 96 3c e2 59 58 ea 9a | 29 00 00 24 64 85 28 2f 41 a8 19 c8 06 e4 df 4c | 57 5a d5 28 ae 9b e4 58 e9 c7 cc 4b e4 65 be 72 | 5c d2 98 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 3d 2f a6 85 1f fa fd 47 13 ee 3b | 56 07 59 de 70 93 a0 2d 00 00 00 1c 00 00 40 05 | ab e9 3c 75 bd a4 6c 62 ac eb 51 4e 98 ab 45 51 | fa 01 56 3d | libevent_free: release ptr-libevent@0x7fb378046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380015720 | #334 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 fb 3f 4d 99 57 72 cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #334 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #334 | rejected packet: | 99 fb 3f 4d 99 57 72 cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #334: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1c450 | handling event EVENT_RETRANSMIT for parent state #312 | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #312 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #312 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49671.730554; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003479 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380015720 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #312 | libevent_malloc: new ptr-libevent@0x7fb378046040 size 128 "road-eastnet-nonat-60" #312: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #312) | 89 42 ee d6 ed 2c a4 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 05 0b 71 54 f5 39 16 26 4c a4 39 04 60 1d 97 | 32 ea c2 30 7f b7 8f 8f 4c 46 3c 6f 52 78 aa c1 | fe e4 77 56 f7 3d d3 8d a6 3a 6f c0 2f fe 6d 02 | eb 98 53 91 b0 a7 62 d0 2e 39 52 a2 2d 9f c5 cb | d2 4b 17 0a 6d 76 74 95 b8 fd f2 4d e7 0c cf 15 | 80 f8 47 f1 16 09 01 ed b3 3a 4f 5c d5 5d 3f 6b | 2f e7 b7 4c e0 6d 6e 67 ff dd 71 47 c8 a4 15 9f | 96 98 1b 13 12 cd c9 a7 cd 82 0e 52 4d 94 b9 96 | db fe 30 4f c9 88 5e 66 97 62 f6 22 94 b7 f8 62 | 1f 97 fa 33 08 02 4b f8 35 6a 66 b6 ae 14 f2 38 | 8b d8 d1 fe 0f da d0 63 b9 64 d3 f1 12 68 13 10 | 0c 76 c3 e9 8c 5d 20 14 45 21 bc 02 62 c8 67 36 | a7 1a 3b 3f d4 a6 2b 0f 1f 20 68 bf 3f f3 da ac | 9d d4 0b a5 4f 9d 4e ee 5d 8a c9 7f a6 63 bd 37 | e4 30 f8 16 a7 79 23 99 5e 45 08 d2 1b c1 59 79 | b3 06 e4 a7 4d 24 33 20 1d ab d6 f6 ee 90 2f 69 | 29 00 00 24 c3 f8 28 4c 1a 7b 0f cd eb 3b df c6 | 33 a5 52 0e 9f e3 e0 c7 7b e0 4f ee 68 74 73 39 | ce 71 25 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 69 21 0b 86 be 66 6f de 2b 5e fc | 58 12 49 3c b2 b4 50 5a 00 00 00 1c 00 00 40 05 | 50 02 4b 6b 30 95 cf bb e1 65 ad fe fd e1 44 d3 | d9 2c f8 74 | libevent_free: release ptr-libevent@0x7fb34000f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c450 | #312 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 42 ee d6 ed 2c a4 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #312 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #312 | rejected packet: | 89 42 ee d6 ed 2c a4 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #312: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0a980 | handling event EVENT_RETRANSMIT for parent state #90 | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #90 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #90 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49671.74388; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008228 exceeds limit? YES "road-eastnet-nonat-90" #90: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-90" #90: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #342 at 0x557d46a4e090 | State DB: adding IKEv2 state #342 in UNDEFINED | pstats #342 ikev2.ike started | Message ID: init #342: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #342: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #342; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-90" #342: initiating v2 parent SA to replace #90 | using existing local IKE proposals for connection road-eastnet-nonat-90 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 342 for state #342 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a1c450 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #342 | libevent_malloc: new ptr-libevent@0x7fb34000f1a0 size 128 | #342 spent 0.0861 milliseconds in ikev2_parent_outI1() | crypto helper 2 resuming | RESET processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 starting work-order 342 for state #342 | start processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #90 ikev2.ike failed too-many-retransmits | pstats #90 ikev2.ike deleted too-many-retransmits | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 342 | #90 spent 2.64 milliseconds in total | [RE]START processing: state #90 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-90" #90: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #90: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #90 "road-eastnet-nonat-90" #90: deleting IKE SA for connection 'road-eastnet-nonat-90' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-90' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-90 | State DB: deleting IKEv2 state #90 in PARENT_I1 | parent state #90: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #90 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 342 time elapsed 0.000657 seconds | libevent_free: release ptr-libevent@0x7fb38802d3a0 | (#342) spent 0.66 milliseconds in crypto helper computing work-order 342: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 342 for state #342 to event queue | scheduling resume sending helper answer for #342 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0a980 | in statetime_stop() and could not find #90 | libevent_malloc: new ptr-libevent@0x7fb38000c460 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 2 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-90 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-90" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-90' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-90" | stop processing: connection "road-eastnet-nonat-90" (in initiate_a_connection() at initiate.c:349) | spent 0.0657 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #342 | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 342 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #342 | **emit ISAKMP Message: | initiator cookie: | 92 0e 5c 44 35 6f 61 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-90 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 65 4b 3f 50 56 cd 4f c8 69 53 e3 02 d0 e2 c4 4b | ikev2 g^x b8 26 12 0d 2f 95 d4 df 65 d2 22 1d a5 8a 76 36 | ikev2 g^x 0f 44 f3 88 67 5b a4 93 af 87 fb e7 03 3d f3 3d | ikev2 g^x ce 49 25 06 46 21 51 fe e6 a5 e0 3f 25 17 b0 d7 | ikev2 g^x 71 9b 71 32 36 21 5f b7 2a ee 25 9c 8a 04 76 c2 | ikev2 g^x 55 e4 ab 4e 7c 02 05 d1 d2 21 09 a2 51 a4 92 f0 | ikev2 g^x 79 2b 73 03 6e bc d5 33 3d 90 f5 1b b7 cb cd e9 | ikev2 g^x 74 b4 08 87 c4 a4 7c ab 86 b2 e8 fe f3 2e a7 14 | ikev2 g^x da 5c 13 a2 0a 83 be 25 a6 25 48 21 ec 98 11 c6 | ikev2 g^x 1d 49 83 e7 e3 39 34 26 fb d4 24 cb d2 66 1f a9 | ikev2 g^x 8b 7b 97 28 60 bf e3 df fc be 83 7a 91 a4 90 3a | ikev2 g^x af ad 2d 44 70 c8 0c 11 ab e1 87 f9 88 5b 04 d8 | ikev2 g^x 04 03 d4 08 d3 e9 32 2b 30 9c 93 90 d3 62 4a 73 | ikev2 g^x df 00 65 61 53 f7 33 9c 73 ad fe 53 5a 29 aa 93 | ikev2 g^x da 76 97 14 51 4b d0 f8 fb 54 f6 6e 4f 99 ad 4b | ikev2 g^x 75 e5 97 56 5f 2e 08 fb ed 71 37 6a 4a ad d6 62 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 02 01 86 b0 0f 40 c1 16 7f df 21 87 ce a9 58 2f | IKEv2 nonce 27 7b 28 e0 c6 1c d2 35 82 80 ac e4 ab 80 e7 af | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 92 0e 5c 44 35 6f 61 f1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5a | natd_hash: port= 01 f4 | natd_hash: hash= 56 62 15 04 08 91 44 63 ec 81 3e 0b 9f 8e c8 3c | natd_hash: hash= d5 eb af f0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 56 62 15 04 08 91 44 63 ec 81 3e 0b 9f 8e c8 3c | Notify data d5 eb af f0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 92 0e 5c 44 35 6f 61 f1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 60 c3 81 cb a9 a6 9e ac 92 76 43 f4 51 0d 3b 6e | natd_hash: hash= 52 02 3f 95 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 60 c3 81 cb a9 a6 9e ac 92 76 43 f4 51 0d 3b 6e | Notify data 52 02 3f 95 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #342 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #342: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #342 to 4294967295 after switching state | Message ID: IKE #342 skipping update_recv as MD is fake | Message ID: sent #342 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-90" #342: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.90:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #342) | 92 0e 5c 44 35 6f 61 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 4b 3f 50 56 cd 4f c8 69 53 e3 02 d0 e2 c4 4b | b8 26 12 0d 2f 95 d4 df 65 d2 22 1d a5 8a 76 36 | 0f 44 f3 88 67 5b a4 93 af 87 fb e7 03 3d f3 3d | ce 49 25 06 46 21 51 fe e6 a5 e0 3f 25 17 b0 d7 | 71 9b 71 32 36 21 5f b7 2a ee 25 9c 8a 04 76 c2 | 55 e4 ab 4e 7c 02 05 d1 d2 21 09 a2 51 a4 92 f0 | 79 2b 73 03 6e bc d5 33 3d 90 f5 1b b7 cb cd e9 | 74 b4 08 87 c4 a4 7c ab 86 b2 e8 fe f3 2e a7 14 | da 5c 13 a2 0a 83 be 25 a6 25 48 21 ec 98 11 c6 | 1d 49 83 e7 e3 39 34 26 fb d4 24 cb d2 66 1f a9 | 8b 7b 97 28 60 bf e3 df fc be 83 7a 91 a4 90 3a | af ad 2d 44 70 c8 0c 11 ab e1 87 f9 88 5b 04 d8 | 04 03 d4 08 d3 e9 32 2b 30 9c 93 90 d3 62 4a 73 | df 00 65 61 53 f7 33 9c 73 ad fe 53 5a 29 aa 93 | da 76 97 14 51 4b d0 f8 fb 54 f6 6e 4f 99 ad 4b | 75 e5 97 56 5f 2e 08 fb ed 71 37 6a 4a ad d6 62 | 29 00 00 24 02 01 86 b0 0f 40 c1 16 7f df 21 87 | ce a9 58 2f 27 7b 28 e0 c6 1c d2 35 82 80 ac e4 | ab 80 e7 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 56 62 15 04 08 91 44 63 ec 81 3e 0b | 9f 8e c8 3c d5 eb af f0 00 00 00 1c 00 00 40 05 | 60 c3 81 cb a9 a6 9e ac 92 76 43 f4 51 0d 3b 6e | 52 02 3f 95 | state #342 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34000f1a0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a1c450 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #342 | libevent_malloc: new ptr-libevent@0x7fb38802d3a0 size 128 | #342 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49671.745266 | resume sending helper answer for #342 suppresed complete_v2_state_transition() and stole MD | #342 spent 0.459 milliseconds in resume sending helper answer | stop processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38000c460 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 0e 5c 44 35 6f 61 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #342 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #342 | rejected packet: | 92 0e 5c 44 35 6f 61 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5a fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #342: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.059 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0eac0 | handling event EVENT_RETRANSMIT for parent state #287 | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #287 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #287 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49671.759473; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003747 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800383c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #287 | libevent_malloc: new ptr-libevent@0x7fb38000c460 size 128 "road-eastnet-nonat-35" #287: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #287) | 50 65 03 a0 08 b6 fa f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e c0 75 39 cf 17 11 31 32 ce 73 1e 64 99 bc f2 | 7f 98 bb e8 80 c2 38 47 74 80 17 bf 6d 41 27 75 | 39 62 b9 71 ae 1a 47 19 83 cd 81 c0 c8 3d 11 61 | bb 8a a5 d6 29 bd 01 7d f4 ca 44 6d 69 e4 8a 69 | a7 cc 95 e2 b5 6b 25 ca 57 eb 58 2b 4d 53 44 df | 33 8c 6f 33 81 90 ab 83 53 f5 4e 38 ab 63 7b 68 | f5 e4 10 b1 02 5a b6 e7 d6 07 bf 37 24 09 70 4b | bc 69 6e bc 79 b8 a5 58 fa 3b e4 57 c6 64 3b 30 | 47 47 bf b7 ad 67 14 cd 0a eb 04 a2 61 54 d3 a6 | 12 98 21 de 78 b3 bb b5 ae 98 e3 4e 86 f6 80 ab | 82 7f f6 f8 ef c2 b3 23 41 0b ad f4 1d 15 a3 d0 | bf fe 7d f5 bb 15 19 74 8e f2 b9 4c 77 84 ef 53 | 7c be 1b be 09 20 be 00 d9 ce 47 ea 9d 1e 79 80 | e6 b0 92 f0 11 bf e8 8c fd 97 bb 02 bf 46 b7 fa | 29 38 a8 9a ba d7 d1 99 c1 56 93 83 a6 04 d2 fc | 1b 5a ee 22 cc c4 78 02 0c 67 9c 0f 51 14 b2 6f | 29 00 00 24 82 dd 74 7a ae e7 29 d0 0c 9c 0c 72 | 8c 59 8b ec 3e a7 b7 92 7c 72 73 9c 73 da ee 57 | 06 e2 80 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 92 a1 ec 2f 80 2a 27 61 6c 7b 0f | 4c 73 2b 71 f0 03 c4 ea 00 00 00 1c 00 00 40 05 | 71 9b 20 c5 40 26 cd 9d eb 7f a3 62 71 86 bd 52 | 4f c4 9f f6 | libevent_free: release ptr-libevent@0x7fb35c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0eac0 | #287 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 65 03 a0 08 b6 fa f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #287 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #287 | rejected packet: | 50 65 03 a0 08 b6 fa f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #287: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a15810 | handling event EVENT_RETRANSMIT for parent state #327 | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #327 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #327 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49671.772761; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001849 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0eac0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #327 | libevent_malloc: new ptr-libevent@0x7fb35c04b850 size 128 "road-eastnet-nonat-75" #327: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #327) | cd 66 0f 9c 46 d2 2e 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c e2 6e 06 8e ba 7b 55 21 d6 ce 48 6f 3c 92 70 | 71 57 bb 2e 59 88 d0 8e 2a d9 1e 8b 54 64 af 4b | 40 4b af e2 a4 54 08 ce 78 99 d3 6e a5 bc 7d 40 | 54 45 d2 55 e5 04 88 a7 28 8f 77 11 a3 33 32 44 | c5 c1 f3 8c 73 cd 33 50 64 6e 8a 4a 03 1a e8 56 | 33 98 cb 05 7e 52 cf 35 2c 3c 0a 01 ff ea e2 ad | d8 80 22 71 7e 19 d2 b8 ce 67 79 24 c4 a0 f8 77 | 85 18 5e ad 8e 04 46 41 75 9b 16 af 02 fc dc 64 | 32 2e 9e 96 8f b4 82 0b 80 7e 79 12 22 b3 48 72 | b8 08 60 6b fb b5 54 a6 fa 64 f2 f2 1c f2 68 fd | a8 f7 9c d6 a5 ea 11 63 c4 ae d6 34 f7 8d 1a 64 | d2 72 49 10 16 1e e2 1a 26 c5 f0 ec 34 31 4a 5b | 0b 2e 91 90 5e 8e 26 12 f7 2c b6 7b b5 af 3d cb | 78 d2 30 c7 9f 03 58 c5 3d 03 c3 8e 6e cf 73 42 | 63 93 37 70 63 fa 64 09 ea e3 9b 55 c3 1a f4 3d | f3 be ab 22 fa 6d f3 45 4a 46 ad d5 84 8a f0 a1 | 29 00 00 24 90 b8 80 a5 9c 42 2b 50 2e f5 43 e6 | dc 43 6d 4e b8 ec af ce 7f 78 f5 24 c5 c3 2d 65 | bb f0 87 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc f4 a0 b4 bc 1c 55 2f e9 f9 68 07 | 2a e9 06 2c 8b 87 6b db 00 00 00 1c 00 00 40 05 | f6 e0 64 05 d4 ed 34 7f 04 0a 65 5a 6b 64 eb 2c | 7a ff a7 d3 | libevent_free: release ptr-libevent@0x7fb35804b970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a15810 | #327 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cd 66 0f 9c 46 d2 2e 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #327 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #327 | rejected packet: | cd 66 0f 9c 46 d2 2e 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #327: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0594 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #335 | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #335 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #335 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49671.774111; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500597 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a15810 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #335 | libevent_malloc: new ptr-libevent@0x7fb35804b970 size 128 "road-eastnet-nonat-83" #335: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #335) | 43 a2 0c b8 41 14 fb 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 1a ff fe 66 5c 27 50 3c bb 63 46 9d 4f 02 13 | 90 10 26 6b 8b bb ce 8e f8 b1 4e 76 fe b9 96 cb | 8a 27 62 97 df ca 55 0f 1b 21 02 63 f2 9a 56 cf | af a1 0c 10 6a 33 02 6e 92 2e ca f8 26 1a ae eb | 16 92 9e c4 5b 3e 17 4a 65 79 45 19 ed da 56 2e | 51 d3 90 a7 9f 98 36 5a 61 58 65 de 51 88 f2 d6 | 2c 74 21 5b 26 93 04 1f 9d 42 9f 74 af 5b 84 53 | 88 76 a7 2b 50 71 5f 03 19 11 aa 1d 3f 9a 1b be | 3f 66 50 7a 7c c6 ba 3a 1f b1 9f aa e7 d9 54 d2 | 8e 38 49 1c 3f da 85 98 28 e2 8c e3 a0 7e 8b bb | 1f a5 48 ea b8 af 51 41 c3 b5 72 51 f3 06 99 5a | 76 51 df 7b 88 a9 f4 af 6a 05 b3 e4 b4 4c ac 08 | 4f aa 11 34 cc 49 a5 06 8b 79 a3 52 45 cd 64 d8 | 83 12 a6 eb 44 69 b7 c9 e1 51 9a 09 19 b8 97 03 | 64 d6 b8 43 68 0f ed bf 4f 10 12 04 91 a0 82 30 | b8 e7 e9 9e 27 9b 68 9f 56 43 7c 93 6d 87 a8 e5 | 29 00 00 24 42 02 24 73 b2 25 02 dc ca ad a2 1d | 9e f8 54 e2 15 e2 22 5d 3f 7b 60 32 c9 95 b0 ec | b1 7e 62 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 ff c7 be 47 4f 0e b7 8d ed 50 5b | d9 e3 74 cc de e6 b4 2d 00 00 00 1c 00 00 40 05 | 8d 0a fb 98 6b 40 87 d9 54 5c 96 0f 30 79 eb 55 | 16 93 80 76 | libevent_free: release ptr-libevent@0x7fb38801abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #335 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 a2 0c b8 41 14 fb 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #335 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #335 | rejected packet: | 43 a2 0c b8 41 14 fb 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #335: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37400cc10 | handling event EVENT_RETRANSMIT for parent state #313 | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #313 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #313 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49671.787416; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002053 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #313 | libevent_malloc: new ptr-libevent@0x7fb38801abe0 size 128 "road-eastnet-nonat-61" #313: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #313) | 5f e0 5b 3a aa b2 0d 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 72 14 0f 17 54 5f cc c5 98 fb 35 26 a3 92 e2 | 11 a3 ad ea c4 71 33 c5 3b 09 0d 86 8a ef c9 16 | 41 6e 6e 33 c5 10 cc f1 5e 47 e9 ca 13 f8 ee 4f | 37 f9 0e ac 70 04 12 68 e2 ae b0 7b dd cb cb ab | d1 0b 9f 48 8f e3 3e b7 e3 65 ca 3d b0 79 98 5c | d4 18 e2 6e 8f 62 4a 4d 34 e2 ac f2 57 5e 56 f3 | 96 24 71 ed eb 39 5a 9f 4d 0a 51 e3 f2 80 2e 9c | c7 e3 0a d7 46 cd 62 d8 70 57 a4 15 e0 2e 57 82 | 00 9c 85 fc cc fb ec 67 7d 2f f7 de 8d 85 b7 9a | ae 6a 14 45 c8 4f c3 df 8d 60 30 87 57 0e a1 b0 | 8b bf f6 18 27 37 f1 3e 81 c1 ec 19 9b f6 db 06 | 57 00 87 5d ef 1f e5 81 9a 44 f2 c0 14 62 b9 b1 | a3 5a 63 7e 11 93 6f 2a 71 ae af 90 3a 04 4e 7a | a3 7a 98 c8 8a bb b2 5a a5 8c d5 d7 51 2b fa cf | d5 ea ac 65 e9 8c f9 24 80 81 e7 38 45 fd 2e f5 | 33 21 e2 b5 ea 65 8b be be 31 9f 87 b8 9f 6c 5b | 29 00 00 24 50 24 81 a9 b8 a1 9e c5 6d 65 2e b2 | 7c 32 12 aa 77 af 34 a7 17 a7 54 1f 7b 13 4b 11 | 43 e0 57 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e d7 79 da 83 ae 02 6d 20 64 f0 64 | 33 fe 2f 85 1b 7e 43 e4 00 00 00 1c 00 00 40 05 | bb f1 5c c9 25 91 06 ec a8 bd 6e 4b ab 50 48 3a | 1c ac 06 f7 | libevent_free: release ptr-libevent@0x7fb37c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37400cc10 | #313 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f e0 5b 3a aa b2 0d 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #313 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #313 | rejected packet: | 5f e0 5b 3a aa b2 0d 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #313: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0691 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #91 | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #91 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #91 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49671.821819; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007449 exceeds limit? YES "road-eastnet-nonat-91" #91: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-91" #91: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #343 at 0x557d46a4f650 | State DB: adding IKEv2 state #343 in UNDEFINED | pstats #343 ikev2.ike started | Message ID: init #343: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #343: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #343; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-91" #343: initiating v2 parent SA to replace #91 | using existing local IKE proposals for connection road-eastnet-nonat-91 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 343 for state #343 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37400cc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #343 | libevent_malloc: new ptr-libevent@0x7fb37c0407f0 size 128 | #343 spent 0.0908 milliseconds in ikev2_parent_outI1() | RESET processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 resuming | start processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #91 ikev2.ike failed too-many-retransmits | pstats #91 ikev2.ike deleted too-many-retransmits | #91 spent 2.62 milliseconds in total | crypto helper 0 starting work-order 343 for state #343 | [RE]START processing: state #91 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in delete_state() at state.c:879) | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 343 "road-eastnet-nonat-91" #91: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #91: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #91 "road-eastnet-nonat-91" #91: deleting IKE SA for connection 'road-eastnet-nonat-91' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-91' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-91 | State DB: deleting IKEv2 state #91 in PARENT_I1 | parent state #91: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #91 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 343 time elapsed 0.000802 seconds | libevent_free: release ptr-libevent@0x7fb378009640 | (#343) spent 0.806 milliseconds in crypto helper computing work-order 343: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 343 for state #343 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | scheduling resume sending helper answer for #343 | in statetime_stop() and could not find #91 | libevent_malloc: new ptr-libevent@0x7fb38401cc10 size 128 | crypto helper 0 waiting (nothing to do) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-91 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-91" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-91' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-91" | stop processing: connection "road-eastnet-nonat-91" (in initiate_a_connection() at initiate.c:349) | spent 0.0792 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #343 | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 343 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #343 | **emit ISAKMP Message: | initiator cookie: | ae 78 c6 a9 8f e8 66 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-91 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5f 9d b8 ed 06 43 12 ec 4c 45 2d d2 98 f8 e4 c2 | ikev2 g^x 36 59 63 a7 5a 33 ff 67 e3 f9 f4 1f 01 a9 3a 4c | ikev2 g^x 55 90 c8 83 a0 29 a8 aa 4f ac db f2 6f 11 94 39 | ikev2 g^x df dd ed a8 03 f3 60 cc f4 5f c8 16 76 2c 18 b3 | ikev2 g^x 52 5b 1b ac 7a 46 b0 6c 28 af 43 e8 e9 1f 42 2d | ikev2 g^x 46 d8 e4 d3 78 66 14 97 ce c1 cd 0c 3c 65 65 46 | ikev2 g^x 46 82 84 7e d0 a7 70 e0 17 0f db 9a 4e 29 93 92 | ikev2 g^x 21 22 73 35 c9 ca 2f af 9d 0a 64 5c 81 08 63 7f | ikev2 g^x e9 bd 70 7e 9e c2 db 6e 8e 2d a9 2d 3d e8 0e 81 | ikev2 g^x cf 97 9f 13 45 5f d0 17 a5 46 81 8f f6 9c 9c dd | ikev2 g^x 6d 72 b6 df 14 55 64 61 52 e1 4b 46 36 b7 06 8a | ikev2 g^x 6d 94 56 ae f7 f9 54 fa 14 95 61 ab b8 b6 ec c3 | ikev2 g^x e8 2c f9 02 e7 ab 10 28 9e 67 38 42 93 d6 89 7e | ikev2 g^x bb 6a dc 83 42 00 3f 72 de b7 9e 71 be 55 39 21 | ikev2 g^x 54 8b a5 97 b3 b2 06 f8 5f 7f 26 67 9a c1 3f 7e | ikev2 g^x 51 39 34 0f ac 86 ce 7b e6 99 54 4b 79 6e 8f 0a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 65 6f dc 77 c3 29 54 5a 74 6e 49 3d 05 2a fe cf | IKEv2 nonce 26 c9 29 fa f4 9d 54 09 a5 a6 15 69 11 b4 0e 82 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ae 78 c6 a9 8f e8 66 ca | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5b | natd_hash: port= 01 f4 | natd_hash: hash= c3 ad 81 e7 cf f7 25 7c 0f 5a 2a 07 aa 17 3c 2f | natd_hash: hash= 54 ca c3 2d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c3 ad 81 e7 cf f7 25 7c 0f 5a 2a 07 aa 17 3c 2f | Notify data 54 ca c3 2d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ae 78 c6 a9 8f e8 66 ca | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 5d 1d e0 9d fe 43 fa fd 70 69 f4 3c 05 77 9a 1e | natd_hash: hash= 38 96 d9 39 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5d 1d e0 9d fe 43 fa fd 70 69 f4 3c 05 77 9a 1e | Notify data 38 96 d9 39 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #343 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #343: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #343 to 4294967295 after switching state | Message ID: IKE #343 skipping update_recv as MD is fake | Message ID: sent #343 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-91" #343: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.91:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #343) | ae 78 c6 a9 8f e8 66 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 9d b8 ed 06 43 12 ec 4c 45 2d d2 98 f8 e4 c2 | 36 59 63 a7 5a 33 ff 67 e3 f9 f4 1f 01 a9 3a 4c | 55 90 c8 83 a0 29 a8 aa 4f ac db f2 6f 11 94 39 | df dd ed a8 03 f3 60 cc f4 5f c8 16 76 2c 18 b3 | 52 5b 1b ac 7a 46 b0 6c 28 af 43 e8 e9 1f 42 2d | 46 d8 e4 d3 78 66 14 97 ce c1 cd 0c 3c 65 65 46 | 46 82 84 7e d0 a7 70 e0 17 0f db 9a 4e 29 93 92 | 21 22 73 35 c9 ca 2f af 9d 0a 64 5c 81 08 63 7f | e9 bd 70 7e 9e c2 db 6e 8e 2d a9 2d 3d e8 0e 81 | cf 97 9f 13 45 5f d0 17 a5 46 81 8f f6 9c 9c dd | 6d 72 b6 df 14 55 64 61 52 e1 4b 46 36 b7 06 8a | 6d 94 56 ae f7 f9 54 fa 14 95 61 ab b8 b6 ec c3 | e8 2c f9 02 e7 ab 10 28 9e 67 38 42 93 d6 89 7e | bb 6a dc 83 42 00 3f 72 de b7 9e 71 be 55 39 21 | 54 8b a5 97 b3 b2 06 f8 5f 7f 26 67 9a c1 3f 7e | 51 39 34 0f ac 86 ce 7b e6 99 54 4b 79 6e 8f 0a | 29 00 00 24 65 6f dc 77 c3 29 54 5a 74 6e 49 3d | 05 2a fe cf 26 c9 29 fa f4 9d 54 09 a5 a6 15 69 | 11 b4 0e 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 ad 81 e7 cf f7 25 7c 0f 5a 2a 07 | aa 17 3c 2f 54 ca c3 2d 00 00 00 1c 00 00 40 05 | 5d 1d e0 9d fe 43 fa fd 70 69 f4 3c 05 77 9a 1e | 38 96 d9 39 | state #343 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c0407f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37400cc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #343 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 | #343 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49671.823492 | resume sending helper answer for #343 suppresed complete_v2_state_transition() and stole MD | #343 spent 0.548 milliseconds in resume sending helper answer | stop processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38401cc10 | timer_event_cb: processing event@0x557d46a855c0 | handling event EVENT_RETRANSMIT for parent state #288 | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #288 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #288 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49671.82355; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004909 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840223f0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #288 | libevent_malloc: new ptr-libevent@0x7fb38401cc10 size 128 "road-eastnet-nonat-36" #288: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #288) | bf 5c b8 9a ac cd 00 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e dd 69 c1 03 95 4d 9d ab 37 9e bd 4e 38 ec e5 | f2 39 ed 30 ab 4f b4 af 21 e6 29 da a0 8f 8f e9 | 98 9a 5c 5c fe fe ce 8c 1e 28 6b bd f2 27 35 da | c4 21 0a d8 6a ca c2 98 92 8e 38 38 a2 a7 6b ba | 5f d2 6c ce e3 9f f3 13 3d ec 78 7e f5 b7 1e b1 | c9 c9 b0 04 f7 e8 40 14 e7 76 0c 5b a9 d0 33 de | 38 f0 55 f2 f8 c3 51 4e 26 12 33 85 1a 59 5d 06 | e7 63 42 d3 d5 d3 89 6c 22 47 f2 98 c6 f4 da 55 | 13 a9 2a 55 81 33 8b eb 87 ee 13 8e 33 aa a8 42 | 9f da b4 47 d8 37 6a 92 68 90 c1 81 a0 df a1 37 | a4 78 f7 b3 8d d2 2d ce a0 c9 68 dd 56 89 c4 d1 | 63 8d aa 71 1f 08 79 a0 6d 66 a0 3e 16 15 54 65 | d5 46 20 67 d9 5b 61 9c 6a 83 fc f8 ba b1 78 4c | 57 19 a7 94 fa 72 b9 cd d4 1a e2 8c ec 18 65 32 | 0a 6f a6 9d 17 41 ad c3 33 be e4 df 39 be bb 83 | 36 2c fd e8 5d 07 b2 3e e4 4e 6e 8c 65 67 24 e6 | 29 00 00 24 6b 44 05 03 68 15 67 d5 e0 ba b2 f4 | 3c 29 af e5 83 d8 9f ee 30 22 ac b5 c3 ee cd df | dc 79 2d 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 39 d5 43 71 fe 6f b5 ee bc 1b f9 | 48 2a ac fe 4d 86 a5 da 00 00 00 1c 00 00 40 05 | f7 70 11 42 70 0c d7 f2 22 65 12 cb b8 c3 7c 30 | 56 c5 c0 c0 | libevent_free: release ptr-libevent@0x7fb37000f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a855c0 | #288 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 78 c6 a9 8f e8 66 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #343 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #343 | rejected packet: | ae 78 c6 a9 8f e8 66 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #343: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0703 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 5c b8 9a ac cd 00 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #288 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #288 | rejected packet: | bf 5c b8 9a ac cd 00 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #288: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #336 | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #336 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #336 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49671.835924; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501086 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a855c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #336 | libevent_malloc: new ptr-libevent@0x7fb37000f1a0 size 128 "road-eastnet-nonat-84" #336: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #336) | a0 3a 99 80 e1 01 63 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 8b 11 e3 72 10 b4 96 46 45 1f 06 8b cb 20 43 | 48 5b dc 9f 22 0b 19 f0 6e 5a 41 4f 7b 66 7e 47 | 17 91 cc cc 24 8c c0 85 32 b7 be 23 d1 6d 12 65 | 00 df c3 47 48 17 d9 93 47 4f 9d 2a 81 88 4f 2c | 1f 98 ac a8 85 56 dd 1e 45 4f f7 f9 78 59 b2 90 | d0 96 3c c9 92 dc 80 e7 ee 9e 9f f3 a3 42 a0 87 | f4 8c 84 d8 38 fe 2c f0 0d 7c 15 54 23 ab a7 7c | ab e1 53 7c ba 26 57 e2 9b 0a 0d 44 c4 7c f6 bd | 50 8c ae 85 b6 fa 6e 51 9e 4d 32 a8 2f 5f b7 94 | 33 ef 3d 6b de 80 a9 44 cb a5 48 1f 9d d9 3e 40 | c2 f4 df a8 c7 43 1a 85 1e 99 1c be ad 10 a3 44 | af 83 22 29 2a d8 4c fc aa 9e 40 9e 83 a1 f3 2d | d3 6b 55 b5 8b 94 57 96 1f 06 03 b7 e8 07 4a dc | 94 d8 f3 f3 15 26 15 42 b7 cd 81 18 11 03 dc 3a | 4e 46 ec 2a eb 11 4a a9 f5 ce 5d 26 8e 40 7e f7 | fb 5d b7 76 23 d0 05 cb 25 8d 85 d4 e7 63 e5 fe | 29 00 00 24 20 77 67 42 c0 5c 2e 2c 4f 51 1c e3 | 6e 76 b6 ed 2f 6c dc 89 e9 07 aa bc e6 7b f3 86 | a7 c4 a8 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c e2 e4 55 b2 1e b0 cb dc 5a 76 de | 82 37 47 8c ee 4e fe 03 00 00 00 1c 00 00 40 05 | 1d 8c 0e 3c 37 8c 24 ca 1e c1 4b a0 97 2b 99 7f | 60 3a d2 7b | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | #336 spent 0.186 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 3a 99 80 e1 01 63 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #336 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #336 | rejected packet: | a0 3a 99 80 e1 01 63 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #336: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0403 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378018460 | handling event EVENT_RETRANSMIT for parent state #328 | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #328 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #328 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49671.839261; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001238 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #328 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 "road-eastnet-nonat-76" #328: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #328) | 3c ba 5b c8 fc 4e e4 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 98 1b 56 d7 72 9f 0b ef 82 c1 96 52 5c 5c 9b | e9 aa b3 20 9c 71 f6 1f 7d 62 5f 32 20 71 40 58 | 1c 09 5f be 66 e2 fb 32 6f 32 7b d3 d9 05 2e a9 | ee af 44 08 4c 92 7f 63 3f 26 57 99 85 eb 91 d7 | b7 5a 96 3e 98 ed 26 ea 09 8f 0f 63 53 5d 1c b3 | c9 fb a7 17 72 50 1c 89 8a 1b ec e3 c6 13 99 f4 | 47 85 27 9f 89 00 ee af f6 42 8e 89 20 65 b0 94 | dc 96 45 50 6a fc 55 91 2d 20 a1 71 bd 13 2b 3d | c9 ca ac 78 35 01 26 cc e0 d8 0f 8b 0a 51 cf db | a4 5f b8 de 1d ef 44 4c 67 d2 41 0a 1a da 75 49 | 8b 5c 8d d5 4f ad 96 01 a7 81 6e 64 71 33 1d 13 | c8 f5 a7 cf 94 c9 e6 53 e2 b0 78 13 10 0b c7 61 | e7 11 09 49 e7 5c 3e 3d 81 8a d4 ca 33 cf 4b a6 | 11 a6 1c 3a 1f 08 75 b7 9e 2d 0e 59 2f 13 2a 60 | 81 d0 25 c3 cb 2c 46 fb 68 09 64 52 0e fa 74 b3 | e7 5b 92 47 85 91 91 a7 8f 24 50 93 20 2b b2 73 | 29 00 00 24 bd 04 20 dd 74 64 b5 d8 5a af c3 c3 | 73 08 e8 87 3d 68 41 83 2a a2 ff d2 47 06 97 0f | ee 80 ed c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f8 b1 65 26 56 ad 9d 5c eb eb 90 | 0c 0f 05 c7 3a 68 b0 36 00 00 00 1c 00 00 40 05 | a1 90 c1 14 1b 7b 06 99 a6 d5 54 52 02 f0 92 56 | c7 13 ca 30 | libevent_free: release ptr-libevent@0x7fb34801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378018460 | #328 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c ba 5b c8 fc 4e e4 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #328 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #328 | rejected packet: | 3c ba 5b c8 fc 4e e4 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #328: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800cc10 | handling event EVENT_RETRANSMIT for parent state #314 | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #314 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #314 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49671.855561; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002766 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #314 | libevent_malloc: new ptr-libevent@0x7fb34801a4e0 size 128 "road-eastnet-nonat-62" #314: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #314) | fd 31 72 f9 64 d3 9c f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 18 14 ac 93 72 6f f5 79 79 36 2d 8e 4c 14 ac | ea 91 ec 03 06 fb 84 ad 5e 18 85 94 4b b8 8e ee | d9 14 0b 8c 64 c8 45 95 1b 91 75 07 f8 e4 ec 03 | 59 35 93 6c 10 48 ab 6b e6 53 29 72 ab ff 3c 2a | 61 16 cb b8 bd 31 a5 f8 2f 5d 57 58 e1 26 7c 2e | d9 c7 b7 a4 21 ac 7f a4 9a 22 28 50 e4 1d c5 8c | 89 bc f7 70 40 e3 4f 71 2a 2a 2e b1 a7 96 2a 7a | 82 34 1a e1 0e c4 48 55 41 7f 5a 8b 68 d2 fd 14 | f7 10 c0 e4 c1 ac fb 5d c6 f8 34 c9 0a 71 0c 1d | 4f 2b 4a ae bd 22 c4 9a db 63 e4 0a ff 3d 5a f9 | dc 19 2e 9a 16 8d df 98 1f 04 7e 59 57 62 0a e6 | b9 93 59 94 b4 3b eb 70 b1 7b 76 4b 9a 71 ee 97 | f5 ac 50 38 4c 04 22 68 a2 68 e3 f1 1d 13 3a e1 | 84 4b 7c 08 19 fb 96 e3 58 71 59 95 c0 bd 55 f5 | 0d 72 3b 29 f3 ae 58 91 30 ad de 16 a2 e3 03 a0 | 02 e9 38 39 b8 a1 6a 55 c4 1d 22 81 8d d1 2c eb | 29 00 00 24 83 8f 4c 82 0e ff 5a 2c de 21 68 5e | 60 c0 57 92 a6 09 5b 7e 12 e1 2a 75 9d 50 83 dd | e3 d1 6f 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 7f 92 43 99 76 22 ce 79 dc 92 3a | aa fb 36 5e 79 bf 23 b0 00 00 00 1c 00 00 40 05 | e5 74 71 ef f2 a4 7e f6 0b b1 36 a7 2f ae f3 30 | ad 50 42 06 | libevent_free: release ptr-libevent@0x7fb36801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800cc10 | #314 spent 0.0939 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 31 72 f9 64 d3 9c f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #314 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #314 | rejected packet: | fd 31 72 f9 64 d3 9c f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #314: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aee080 | handling event EVENT_RETRANSMIT for parent state #289 | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #289 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #289 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49671.896833; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004268 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #289 | libevent_malloc: new ptr-libevent@0x7fb36801a4e0 size 128 "road-eastnet-nonat-37" #289: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #289) | 2e 50 46 ff ee 4c e9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 67 60 81 00 e9 c5 12 22 cc 49 d1 8d 87 9d ec | ba e1 ae d7 0f ff 89 2c 01 49 2f 18 a4 d8 5a ff | 94 bb 3c 2d 6c 23 65 3c 9a 45 52 91 05 ff 55 0b | 22 ea fe ea 0a 4e f6 5b 7a 62 13 72 d3 65 de 8a | 6c f3 72 1b af fd 0c 36 3a 05 de a4 6d 9b 92 ce | d9 79 2b 75 ee 9a e2 a1 2c b2 02 b2 85 a2 98 a2 | 3c 63 cc 1f 7e c9 81 88 5b 95 14 a9 db c3 cc 4c | 7d 2a a7 8c 64 c7 93 92 12 cf 28 08 e5 ab 19 fa | 3f 53 9a 5b d7 86 99 40 82 c2 0d 84 83 94 43 d6 | cb b8 b3 06 64 05 bf d9 9d 5b fb 6a 5b 6a d2 16 | 6f b8 75 0b 98 2a 33 7f 2c 96 47 b3 69 76 55 52 | ca 3f b2 34 c4 b8 60 62 c8 0f 07 9c 2a 3e 70 02 | 1f 60 03 3e 97 1e ea 39 09 c8 ac 49 fb 70 ef af | f9 7e 7f f0 e4 2d 18 4d f8 20 f5 71 8f b4 fc be | 11 8b 08 ae 82 4a 27 f4 11 f5 e0 5f 14 7e a2 b5 | 66 07 59 01 f7 8e 64 17 db 17 82 9f be dd 61 54 | 29 00 00 24 70 cb ce 4e e8 fa 33 67 08 21 14 9b | 70 83 d5 d1 77 4f cc 4e 50 51 8a 00 6c d4 e4 19 | 33 47 80 f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 95 9d ea dc 9b 1a b8 2d d8 fe 0a | bb 49 1d 2c c9 ad 47 73 00 00 00 1c 00 00 40 05 | 70 48 4d 18 17 11 80 57 99 3c 90 8c f0 f2 b1 e5 | 98 18 b0 dd | libevent_free: release ptr-libevent@0x7fb38800c460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aee080 | #289 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2e 50 46 ff ee 4c e9 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #289 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #289 | rejected packet: | 2e 50 46 ff ee 4c e9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #289: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38000feb0 | handling event EVENT_RETRANSMIT for parent state #329 | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #329 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #329 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49671.899114; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001594 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aee080 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #329 | libevent_malloc: new ptr-libevent@0x7fb38800c460 size 128 "road-eastnet-nonat-77" #329: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #329) | 19 44 0d 82 d8 18 b5 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 80 85 65 b3 ae 4b 6e fe 68 73 f2 b6 39 5a b1 | 5a f3 36 2e e0 44 7d b5 ef dd dd fc d0 35 5f bf | 0f f1 a8 56 0e fe 65 1a 64 97 d5 45 02 78 56 12 | 1d c5 a8 57 78 41 5d 67 f5 9c ac 0c ea 30 76 9f | d6 40 74 a9 16 ad b3 48 34 1d 1d 07 41 4e 7d ea | b4 15 07 22 a9 ac 8e c3 4d e5 f2 d1 ad d3 62 0d | 93 58 9b 58 67 7c fc 81 97 3b af 10 63 67 d9 86 | 45 ad 4f a6 97 2e 79 bd 48 03 5d 44 76 7f c4 9f | a3 54 a8 c8 d0 75 76 5f 1b 6c d2 e3 cc 1a fb de | f6 a0 df 0a e9 48 0b 88 3f b0 b9 04 79 1c 8b 83 | a2 11 a4 9f 9b f2 2f 13 89 0d e6 68 c7 78 af a5 | 8d 94 dc 9c 72 14 d9 47 8e b6 09 d8 6c bb 15 13 | 54 68 b1 04 b2 79 ae 72 17 9f ff 8d d0 33 2c 7a | b0 3e e8 0e e9 c9 f6 bd 41 a5 9d 71 93 9d e7 49 | fb 61 fa 0d 56 19 d3 32 c0 8d ba 0e 98 71 48 e0 | 2f 1a 52 9f c2 03 77 7a 8d 1e 4b 1c 30 c4 31 91 | 29 00 00 24 ad 58 5c 32 62 e5 13 15 63 fb 95 0f | de a4 7f f4 a1 1f b7 cf 95 c9 7b a8 76 d2 3e a1 | 6c d4 9d 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 38 9e 59 ae 71 c3 ed 6e 6e 92 c1 | 9f 33 f8 69 87 bc 1f 0c 00 00 00 1c 00 00 40 05 | 49 73 ae f4 7f e8 6a cf 37 86 5a 1d f5 77 0e ad | 19 ee 51 1c | libevent_free: release ptr-libevent@0x7fb350014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000feb0 | #329 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 19 44 0d 82 d8 18 b5 00 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #329 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #329 | rejected packet: | 19 44 0d 82 d8 18 b5 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #329: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0402 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a69e50 | handling event EVENT_RETRANSMIT for parent state #337 | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #337 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #337 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49671.900374; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50008 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000feb0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #337 | libevent_malloc: new ptr-libevent@0x7fb350014c70 size 128 "road-eastnet-nonat-85" #337: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #337) | ed 63 58 23 fd c1 76 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 96 54 84 2e e5 91 43 31 05 bf 8d 46 38 09 77 | 34 82 01 41 07 ba 77 ae 0e 58 56 59 e8 aa 03 3b | 7e fb 3d 6d 4d 59 d3 86 8a 20 2c b2 06 03 8a 41 | 33 cf 0e 06 87 87 a2 ab d5 f2 99 a7 84 cd 05 cf | ec d9 29 84 36 3e fc 29 32 e5 d2 77 7d a0 28 f8 | d1 0e 51 2f 73 28 bd 60 66 cf 7b 5c e8 76 7f ee | 0b 3f cc 47 13 a2 8f 86 8a 1d a1 57 96 4b 8e 1d | 54 09 0b 8b e7 94 12 ea 68 37 a0 5a 37 1b 43 96 | 9e 43 fb b9 f4 e3 a4 14 cb 49 50 02 95 69 45 10 | 4f 12 ab e9 0f 1f 01 01 a4 c3 ef 65 1e 2e cf e7 | 08 9d 2c 27 7f 64 fb 91 ba e9 80 4e 20 48 a7 46 | 4e 2b b0 83 ea 9c e6 04 02 2b 8c 1a 52 db c6 17 | d5 9e 92 ca bd cc 2d 80 e6 b4 24 b9 79 b6 76 9a | 0e 8f 39 57 ee 2c 0b 47 20 f0 82 f0 87 6e 0d 85 | f9 ab b8 d1 c1 07 ac ad 62 5b 5a 42 cc c5 f9 04 | de 15 7e d8 03 4b a1 c4 30 01 43 b8 8d 24 8e 44 | 29 00 00 24 47 35 e2 69 12 71 4e bf 5f ce fb f5 | 4b 5d 78 7a 40 67 4e 2b 89 1a 4f 82 42 7d 07 9d | 99 e5 3f 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 a6 ae 66 a0 2e 4a eb 14 83 41 42 | 9c b3 ed 9b 1a cc 9f 9b 00 00 00 1c 00 00 40 05 | 09 b5 68 86 30 d7 ba 9d 35 40 11 f6 5c 40 95 0a | 79 fe 98 fe | libevent_free: release ptr-libevent@0x7fb378012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a69e50 | #337 spent 0.0855 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 63 58 23 fd c1 76 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #337 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #337 | rejected packet: | ed 63 58 23 fd c1 76 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #337: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a74cd0 | handling event EVENT_RETRANSMIT for parent state #92 | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #92 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #92 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49671.901609; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007153 exceeds limit? YES "road-eastnet-nonat-92" #92: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-92" #92: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #344 at 0x557d46a50c10 | State DB: adding IKEv2 state #344 in UNDEFINED | pstats #344 ikev2.ike started | Message ID: init #344: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #344: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #344; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-92" #344: initiating v2 parent SA to replace #92 | using existing local IKE proposals for connection road-eastnet-nonat-92 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 344 for state #344 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a69e50 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #344 | libevent_malloc: new ptr-libevent@0x7fb378012840 size 128 | #344 spent 0.0627 milliseconds in ikev2_parent_outI1() | RESET processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 resuming | crypto helper 9 starting work-order 344 for state #344 | start processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #92 ikev2.ike failed too-many-retransmits | pstats #92 ikev2.ike deleted too-many-retransmits | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 344 | #92 spent 2.56 milliseconds in total | [RE]START processing: state #92 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-92" #92: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #92: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #92 "road-eastnet-nonat-92" #92: deleting IKE SA for connection 'road-eastnet-nonat-92' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-92' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-92 | State DB: deleting IKEv2 state #92 in PARENT_I1 | parent state #92: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 344 time elapsed 0.000624 seconds | (#344) spent 0.625 milliseconds in crypto helper computing work-order 344: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 344 for state #344 to event queue | scheduling resume sending helper answer for #344 | libevent_malloc: new ptr-libevent@0x7fb37801fd50 size 128 | crypto helper 9 waiting (nothing to do) | stop processing: state #92 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a74cd0 | in statetime_stop() and could not find #92 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-92 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-92" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-92' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-92" | stop processing: connection "road-eastnet-nonat-92" (in initiate_a_connection() at initiate.c:349) | spent 0.0595 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #344 | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 344 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #344 | **emit ISAKMP Message: | initiator cookie: | 60 fe 47 d5 bc 7e ec f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-92 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 90 bf a8 75 45 e6 9b 9e 36 c4 f8 00 7b fa ed 16 | ikev2 g^x 45 48 19 73 f0 43 47 d5 85 f3 cd c8 97 6e 50 a8 | ikev2 g^x 7b 63 a3 ce ea 05 ae 44 e5 a2 e6 29 a8 16 bc 48 | ikev2 g^x 78 95 49 07 f7 17 ad 10 48 2e fd 23 74 21 44 c0 | ikev2 g^x b4 d3 48 b2 fb bc c3 28 df 8a d3 09 ec 63 04 28 | ikev2 g^x 7e 5a 51 87 52 03 32 ff 61 0c 39 ac c3 26 d9 35 | ikev2 g^x 88 8a 8d fe 64 9e 7c 7f c3 22 7b 8b 9e 96 8b 3d | ikev2 g^x b8 ef 81 b1 6a 3f 8a 50 49 73 5d ab 49 f3 99 5e | ikev2 g^x ad 5d e8 43 6f bd 70 02 a0 6f d4 12 c9 ee f2 55 | ikev2 g^x f1 fb cb 6e d0 ab 61 ad a4 39 c4 fa f3 3f c7 bf | ikev2 g^x 5f f1 ac db cc 36 aa 36 32 7b 50 a5 5a 12 e0 c2 | ikev2 g^x fb c0 54 26 8a e0 81 02 71 55 03 a2 11 c1 ce 2c | ikev2 g^x 62 50 df 4c eb da 5d 3d 81 bf 56 fd c4 6a 45 b3 | ikev2 g^x f3 c4 00 14 0a f0 d4 72 ad 8f 3b 97 e7 25 ea 81 | ikev2 g^x 48 23 bb ad 52 e9 90 df 74 31 fa 3e 85 2d 9b f0 | ikev2 g^x 97 f2 67 07 62 f1 e0 1b eb 9c 9b f7 2c 83 46 40 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 59 47 a1 36 35 51 2c e7 ec 59 96 c4 c5 6a 0f fd | IKEv2 nonce 9f 62 7d 5e ad fa 8e 0f 35 43 8c 01 6a c9 a8 e7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 60 fe 47 d5 bc 7e ec f1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5c | natd_hash: port= 01 f4 | natd_hash: hash= fb 37 18 00 bf d4 a8 37 15 69 ae 4c fc 2f e7 92 | natd_hash: hash= f0 22 70 f2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fb 37 18 00 bf d4 a8 37 15 69 ae 4c fc 2f e7 92 | Notify data f0 22 70 f2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 60 fe 47 d5 bc 7e ec f1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 33 e5 40 5c 05 2f 5b 7d e0 96 06 6b 07 18 0b d5 | natd_hash: hash= ca 3f e3 4a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 33 e5 40 5c 05 2f 5b 7d e0 96 06 6b 07 18 0b d5 | Notify data ca 3f e3 4a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #344 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #344: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #344 to 4294967295 after switching state | Message ID: IKE #344 skipping update_recv as MD is fake | Message ID: sent #344 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-92" #344: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.92:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #344) | 60 fe 47 d5 bc 7e ec f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 bf a8 75 45 e6 9b 9e 36 c4 f8 00 7b fa ed 16 | 45 48 19 73 f0 43 47 d5 85 f3 cd c8 97 6e 50 a8 | 7b 63 a3 ce ea 05 ae 44 e5 a2 e6 29 a8 16 bc 48 | 78 95 49 07 f7 17 ad 10 48 2e fd 23 74 21 44 c0 | b4 d3 48 b2 fb bc c3 28 df 8a d3 09 ec 63 04 28 | 7e 5a 51 87 52 03 32 ff 61 0c 39 ac c3 26 d9 35 | 88 8a 8d fe 64 9e 7c 7f c3 22 7b 8b 9e 96 8b 3d | b8 ef 81 b1 6a 3f 8a 50 49 73 5d ab 49 f3 99 5e | ad 5d e8 43 6f bd 70 02 a0 6f d4 12 c9 ee f2 55 | f1 fb cb 6e d0 ab 61 ad a4 39 c4 fa f3 3f c7 bf | 5f f1 ac db cc 36 aa 36 32 7b 50 a5 5a 12 e0 c2 | fb c0 54 26 8a e0 81 02 71 55 03 a2 11 c1 ce 2c | 62 50 df 4c eb da 5d 3d 81 bf 56 fd c4 6a 45 b3 | f3 c4 00 14 0a f0 d4 72 ad 8f 3b 97 e7 25 ea 81 | 48 23 bb ad 52 e9 90 df 74 31 fa 3e 85 2d 9b f0 | 97 f2 67 07 62 f1 e0 1b eb 9c 9b f7 2c 83 46 40 | 29 00 00 24 59 47 a1 36 35 51 2c e7 ec 59 96 c4 | c5 6a 0f fd 9f 62 7d 5e ad fa 8e 0f 35 43 8c 01 | 6a c9 a8 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 37 18 00 bf d4 a8 37 15 69 ae 4c | fc 2f e7 92 f0 22 70 f2 00 00 00 1c 00 00 40 05 | 33 e5 40 5c 05 2f 5b 7d e0 96 06 6b 07 18 0b d5 | ca 3f e3 4a | state #344 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb378012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a69e50 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #344 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 | #344 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49671.902742 | resume sending helper answer for #344 suppresed complete_v2_state_transition() and stole MD | #344 spent 0.305 milliseconds in resume sending helper answer | stop processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37801fd50 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 60 fe 47 d5 bc 7e ec f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #344 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #344 | rejected packet: | 60 fe 47 d5 bc 7e ec f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5c fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #344: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.052 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c046090 | handling event EVENT_RETRANSMIT for parent state #315 | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #315 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #315 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49671.922942; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002764 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37800cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #315 | libevent_malloc: new ptr-libevent@0x7fb37801fd50 size 128 "road-eastnet-nonat-63" #315: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #315) | 44 ed db 2c fe 0c f2 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e 87 b1 78 dc 97 f3 7a 79 3b d6 3e 86 ea b2 fa | 5d 34 e2 db 78 24 8f 15 59 97 e5 e6 f6 90 b1 aa | 59 98 1b 57 96 2d 7a a6 68 c9 eb 8b 7d f6 64 68 | a2 48 77 fc cb 5d 8f 0e b2 52 9b 77 09 f1 21 ba | 81 62 c1 7e 82 df 5b 48 60 ba f6 08 04 c2 77 74 | 9c c8 6b 41 93 1d 14 39 f9 1e b0 b2 5b 1d 3c e0 | ca f1 1f 63 24 c8 cc 04 a5 c5 8f 7d 86 30 95 90 | fb a8 83 29 7a f1 ce 8e 64 9a 9f 82 39 eb 4b a4 | b2 6f ce 0a 5b bd e7 1a af 9d af 92 27 aa 66 57 | 8e 91 52 b5 d0 96 33 ee eb 0f 07 5f 2f 56 77 d0 | 9a 1f cb 0e 53 2f d5 4e b4 5b a5 9c 4c 15 af e1 | 28 86 0f 89 11 d9 bc 73 6b a7 3c 58 a9 04 2c eb | f2 53 51 79 62 f5 50 bf 5f 75 e1 7f 28 95 f0 09 | 87 f1 d9 ee 26 2c 8a ee 7d 84 2e 04 f2 6c 42 e0 | 67 e8 19 47 db 94 b6 12 29 d7 1d dc 8f 61 2d e0 | 53 f7 53 7d 18 19 05 ed 93 cb 84 d8 40 1b 1d fe | 29 00 00 24 5f cd cc 5e 9b b5 1f f6 2d c3 6f 0d | 70 ea 63 15 bc b8 5b 49 76 c9 be 04 9e 55 ff 0b | 33 d9 e0 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 2c d3 1b 13 1c a2 69 95 f2 01 8c | cb 3c f6 d6 71 d0 e6 be 00 00 00 1c 00 00 40 05 | b1 bd 1a 4e 17 0a c1 3c 72 20 f5 8a 28 12 f4 7a | a3 f8 1e e7 | libevent_free: release ptr-libevent@0x7fb36c04b8e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c046090 | #315 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ed db 2c fe 0c f2 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #315 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #315 | rejected packet: | 44 ed db 2c fe 0c f2 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #315: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.077 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_RETRANSMIT for parent state #330 | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #330 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #330 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49671.96024; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001092 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c046090 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #330 | libevent_malloc: new ptr-libevent@0x7fb36c04b8e0 size 128 "road-eastnet-nonat-78" #330: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #330) | 93 2e 75 96 9e d6 58 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 2c e9 0f 22 91 df 5a 5b ae 3a 65 86 ba 44 9c | 65 4a 79 99 b3 fa 29 29 22 63 49 c3 6b 7a c8 2c | a6 64 55 77 51 a1 d2 b5 c5 ed b9 2b d7 c9 de d5 | 1f 04 ca d2 89 15 35 75 d9 05 25 47 aa 0c 65 5b | a8 0c 57 96 31 e9 78 a6 a3 87 ad 68 36 d2 a1 3b | 88 08 f8 2e 28 6b 99 4e 37 3d 68 42 7a f5 6a 2c | 92 3c 46 2d 02 18 a7 c8 61 9b 40 1b d5 74 a6 72 | 61 b0 45 d7 09 4c 08 2d 1e 0e 8d f9 eb 38 be 36 | 94 bc ee 43 6d c2 1a 9d c9 1b 4a 84 b6 50 10 54 | ae 45 14 8d 9a 31 50 76 61 37 da 64 1e 74 bc 11 | a7 13 ed 80 0f 85 3c d8 35 69 89 6d b4 6c ac f3 | 2f 4a 27 55 17 f4 f5 ce 32 75 dd b4 15 0b 7f 61 | e2 87 b3 bb e4 11 66 8c 15 79 6e d9 14 50 70 fe | f5 12 aa 90 f9 25 da 28 bc a5 c1 1c 8f 54 93 e2 | 5b 5a 53 f7 1c 97 4d 5c c4 f6 b5 86 3f 24 5b 64 | c4 87 cd 28 7a 3e ef 9f 68 95 6b f8 95 8d da 08 | 29 00 00 24 a1 af e5 97 d9 f1 9e 6c 80 91 ab 21 | 08 cf 38 0c a4 d3 fb b3 c7 37 98 b4 a4 0d 72 16 | de e9 9d 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 c9 48 f6 82 8f 0c eb 59 3f 42 40 | 18 2f 27 9b ca 1b 0e 80 00 00 00 1c 00 00 40 05 | 3e 48 b8 70 cf c0 9c 35 6c 64 bb e3 c7 5c 5e 43 | 1f 5c 26 91 | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | #330 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 93 2e 75 96 9e d6 58 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #330 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #330 | rejected packet: | 93 2e 75 96 9e d6 58 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #330: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa1f00 | handling event EVENT_RETRANSMIT for parent state #338 | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #338 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #338 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49671.963514; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500897 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #338 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-86" #338: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #338) | 1f e2 d0 d2 e5 84 7f 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db f7 91 cd 84 5c a7 ef c5 4a 9e 2e af a2 43 ea | 45 0a b8 db c5 6e 04 46 ba a1 d5 11 76 fa 91 5a | 21 6e 50 69 5f 4c 63 af d6 32 06 ae 79 8f f8 47 | 06 f3 f5 c6 98 57 e2 e8 f9 93 2e 73 11 9e c7 4b | 81 b1 ab c3 4c 82 50 3e 95 1b 93 8d f3 f1 26 94 | 35 dc 1c 86 75 c4 0b 21 99 da cd 92 fb c9 25 d3 | a1 77 02 1c 94 1f a7 90 d7 35 62 14 3f a4 c2 e2 | 04 47 bb f7 88 43 f1 58 36 ff ad ce 6a c6 3a e5 | ca 19 27 9c c0 b7 91 62 00 c9 17 fb 82 73 f3 dc | 8a f9 f2 d0 2d 78 16 8f d3 1a df 7b 29 7f a7 d2 | 2a 1d 58 77 31 26 e6 25 fd f1 f0 ff b3 be 2a fb | 9a f2 05 45 cd 1a c0 33 3f 3e 0c b1 4a 0e 13 b1 | f3 25 ba 03 ce 1b 65 7e 16 c3 d1 62 05 e6 0b 87 | 27 59 78 26 a7 72 9c cf a5 2a c9 6c 3c 43 6b b4 | dd fc 35 a0 21 8a d9 83 8c b5 e6 a8 c9 3d 42 bd | e0 43 1a dd 83 56 78 b8 0a 0d d3 50 6d 61 d9 5c | 29 00 00 24 53 73 16 e0 68 43 e7 c2 a0 53 68 5d | 7e 07 bf 33 55 30 e6 39 bc d6 66 c9 05 5a fa 29 | b8 4f 54 b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 1b 58 be 75 e4 59 10 d1 29 a5 4a | 19 0e d4 a5 d3 bb ae eb 00 00 00 1c 00 00 40 05 | e1 23 de d4 d9 5f 17 c1 21 ba 79 77 2a ee 0e dd | 91 6b 75 70 | libevent_free: release ptr-libevent@0x7fb3740356e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa1f00 | #338 spent 0.0865 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f e2 d0 d2 e5 84 7f 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #338 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #338 | rejected packet: | 1f e2 d0 d2 e5 84 7f 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #338: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0398 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000cc10 | handling event EVENT_RETRANSMIT for parent state #316 | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #316 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #316 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49671.981774; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002853 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa1f00 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #316 | libevent_malloc: new ptr-libevent@0x7fb3740356e0 size 128 "road-eastnet-nonat-64" #316: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #316) | e8 62 07 3d 83 c9 27 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 67 27 d8 ca da 21 fc 33 ba 4f 94 10 8a c5 3e | 5d c6 ca e9 be 5f 5b 62 d9 f8 5f ef cd 1d 75 de | 4e 46 e5 c8 47 0c 64 48 a0 a0 be ad 1a 88 be 29 | 21 51 4f e4 bd 33 bd be 35 5e 1a f3 c6 5c 72 cc | 14 4f 34 ba 69 93 e8 bf 07 ec 5c 62 f6 72 9d af | 95 ca 7c 71 3b 37 93 92 3a 98 4e 7a 53 2f 9a a8 | 2a b6 32 33 20 cf eb 65 6b e0 73 23 52 d2 61 14 | 64 77 57 5a e0 a6 ac 4c 66 6c 73 74 1e 30 64 d8 | 26 eb 6f 24 f1 a2 d0 b2 6b 58 a7 b2 54 48 ba 72 | 09 ae 65 3c 30 0d df 54 4e 6a 33 e2 26 65 76 99 | ea 2e 2a 30 fa a7 4c 97 4d 74 ba 19 a6 b3 7b 01 | 82 88 fa e7 6a 85 ab 68 48 39 a4 91 e9 e4 44 02 | 10 7a c6 c8 2e 47 03 39 25 a6 92 8c e5 51 eb 52 | f8 c7 61 20 39 65 61 dc 27 00 53 74 46 c8 5c be | 3b 90 c1 02 b8 be b2 17 6b a3 86 6f 65 fa c8 19 | e6 54 1a 74 80 e0 70 41 21 d7 44 54 50 0b cd 29 | 29 00 00 24 89 45 06 65 65 b3 8c d6 0c df 20 90 | 5a e6 b0 5e f6 87 85 10 8d 96 3d 5e 67 1f 54 38 | 77 de f5 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 e4 d3 0f a4 c8 a7 ec 05 e8 fa d2 | 6d 31 a1 ad f7 6f 67 3e 00 00 00 1c 00 00 40 05 | 0a a4 aa 05 10 e6 c7 c4 a5 a6 8e 98 2e fc 0d 29 | 7c 74 b9 43 | libevent_free: release ptr-libevent@0x7fb36001a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000cc10 | #316 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 62 07 3d 83 c9 27 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #316 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #316 | rejected packet: | e8 62 07 3d 83 c9 27 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #316: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378012bf0 | handling event EVENT_RETRANSMIT for parent state #290 | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #290 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #290 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49671.983071; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004663 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #290 | libevent_malloc: new ptr-libevent@0x7fb36001a4e0 size 128 "road-eastnet-nonat-38" #290: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #290) | d9 b1 5b a3 d1 9c 57 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 dc 77 37 88 c0 74 0b c8 60 da a3 8f 9c e4 42 | 29 fe d5 c9 98 e7 af 66 82 be 95 44 77 f6 93 6f | 24 98 d7 cc c4 a6 16 af 14 a2 ad 53 a8 a5 93 3c | a1 26 c3 2d 65 3f cc 3f f0 9b 21 66 64 c4 82 00 | 30 f1 57 86 bf eb 51 88 bf 71 0a 30 68 dc 14 50 | 80 50 e1 6f 25 74 d9 af 8d f4 b9 89 60 e8 c3 c8 | 3b d5 14 f3 53 b4 96 85 6c 74 39 5d ff ee 22 a4 | ad 4c 82 96 29 6f f2 59 77 4e 48 da 14 23 7a 5c | 78 bb 13 4c f8 05 33 6d 40 79 5d e2 85 b7 6d 6e | b2 54 b0 03 d6 63 64 61 00 6d fd d4 8a 79 cd 3d | f1 25 f9 cf fc 5d a4 f7 ef 48 25 44 50 58 6a b2 | cd 2c dd 4c f0 ff 5e 32 e5 0f bc 63 fa 03 d5 1a | 9a ab 7e 2b 95 53 36 2e 47 c1 65 a2 7b d7 cd db | 40 2b 7a b2 21 b9 e9 6e fc 75 da 49 33 c1 98 35 | c7 9c 09 b3 47 fb 10 3f e1 56 6f be 75 69 b0 33 | f1 cb e8 e7 d6 74 b0 43 37 f7 9f 8c c7 7c d0 1e | 29 00 00 24 f3 df a5 ae 0e f0 b6 8d 6c 86 f6 fd | ac 3e 20 3a 6e ef cc 6e 76 09 43 e5 b3 97 07 d6 | b5 fd b7 b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 90 0c 81 3c 3a d2 14 9a 30 eb 10 | fa 46 c9 fe 37 f4 bb 0e 00 00 00 1c 00 00 40 05 | ea fc 09 da ae 61 e7 e4 dc 7a 6e 5d ad e3 e5 ff | 21 64 e7 65 | libevent_free: release ptr-libevent@0x7fb348014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378012bf0 | #290 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 b1 5b a3 d1 9c 57 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #290 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #290 | rejected packet: | d9 b1 5b a3 d1 9c 57 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #290: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0398 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #339 | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #339 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #339 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49672.025307; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500015 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #339 | libevent_malloc: new ptr-libevent@0x7fb348014c70 size 128 "road-eastnet-nonat-87" #339: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #339) | a2 06 83 e6 4d cf 47 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 60 78 10 c3 0f cc 3e 4e 2e d5 96 c1 d2 76 e3 | 97 d5 35 a5 15 b5 cf 25 fc d1 a9 ed 61 00 ab d3 | f0 a5 f9 6b c8 93 25 3b e7 35 94 5b 27 e6 7c aa | 9f 99 13 73 c8 87 72 6f e3 9a d8 3f f2 60 6d 07 | e2 f2 df 74 8c d9 c0 ea 66 9b 1a f7 3a 35 11 09 | 4c 1a 77 9c 33 ec 8e 52 10 1b 5c 10 4f 88 cf e4 | ab bc 00 8a 49 0d dc 56 57 fd b9 aa 33 dc a2 d8 | 3f a7 e3 81 b2 6c 3d 05 80 c1 9e e7 22 3d 4f 4b | 69 99 65 2e db d4 42 77 f6 d5 da ca 9c 7b 37 94 | 4a 33 ff d3 90 af 06 41 1e af a8 a1 29 27 b8 4e | 94 36 29 4f 90 ae d8 40 e5 f9 f7 60 20 50 ae f6 | 19 f9 e5 ce 63 be 68 f8 75 c8 c0 44 7f 51 fc 3c | fe be 4d e9 10 ea 8c 24 89 c7 41 df 92 c0 7b 00 | f7 f4 82 ce db 65 47 b6 bb fd f3 75 44 d0 1d c4 | 34 92 d9 b1 3f bf c2 cf e2 c7 6c 0d 60 aa 7d 11 | 0e 19 00 e8 57 9d 13 5a 3b a1 80 7a d5 8d 15 4c | 29 00 00 24 1c 60 55 0f db a5 b1 e0 94 27 e9 83 | 86 bb c4 10 2a 23 35 9c a1 96 2d 6f 7e 5d c3 40 | 27 31 c9 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 61 9a 5c 09 fb 4f 1f fe 5c 80 fd | 11 ff 3a 18 d8 5f 68 01 00 00 00 1c 00 00 40 05 | f8 00 9b 14 2d 47 6c 3b ee ab c1 8e 99 04 04 19 | 24 06 94 42 | libevent_free: release ptr-libevent@0x7fb36002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #339 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46afe600 | handling event EVENT_RETRANSMIT for parent state #331 | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #331 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #331 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49672.025436; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001604 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #331 | libevent_malloc: new ptr-libevent@0x7fb36002a950 size 128 "road-eastnet-nonat-79" #331: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #331) | 50 44 b2 3a 07 a7 4e 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 5b 7a 1c 65 ca 17 c3 34 09 e9 50 2c 1a 5f 2c | 3f 1f d0 f4 a9 fc a5 0f b3 e0 23 18 36 32 e0 dd | 70 db 2b a7 8a bb 5e d5 7b c1 26 49 ed 17 f5 fb | 41 8c 70 b6 46 13 5b 7c be 72 85 64 1f cb c2 3b | 7b cd ab 00 d1 f5 c6 c8 ef 4e 43 8b d1 3c de 4e | 97 78 da c1 12 64 cb f5 74 cf 7b 2b a9 ae 8b a5 | dc d3 db 70 7b c5 17 1a a0 d8 61 49 40 f3 77 7a | 26 f5 d7 d4 fc a6 3c ec 56 96 bd ad fa da 9d 95 | 6f c7 43 12 03 de b3 4a 54 ca 56 3c b7 a8 38 f0 | 03 5a 39 ab 50 08 22 eb 87 c3 7d 6f ff ac b9 cb | 79 02 42 01 ae 8a 86 1f cf 39 34 00 58 b3 82 70 | cb f1 c5 9a 1b e0 1b 28 e5 0b 30 ab da 32 50 a9 | 39 71 a2 8b c0 a0 38 d2 35 39 8f d7 36 de a3 f4 | 70 e0 8f a8 7e 36 bd e7 03 3e dd 85 86 be 19 24 | 24 d5 8e aa 7b 0a 66 52 ff 44 f1 22 3a 93 2a 43 | b3 e4 83 93 f3 85 5b 68 a3 1b 91 5b 88 3f ae 95 | 29 00 00 24 03 6b b7 f1 e0 d0 ec 2f 89 98 41 7d | af 5d 2c 7f 97 af 10 99 b6 2e fe 6f ac 7d ce 98 | 66 f3 c3 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f b7 eb 6a 1a 1b 78 47 4b c9 5c d0 | 13 11 3d 6a 14 1b 4d ab 00 00 00 1c 00 00 40 05 | 4a 21 a9 91 28 88 ee e6 d7 a3 92 f2 91 f6 75 81 | f6 52 77 56 | libevent_free: release ptr-libevent@0x7fb35c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe600 | #331 spent 0.0717 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a56e30 | handling event EVENT_RETRANSMIT for parent state #93 | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #93 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #93 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49672.025524; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009167 exceeds limit? YES "road-eastnet-nonat-93" #93: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-93" #93: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #345 at 0x557d46a521d0 | State DB: adding IKEv2 state #345 in UNDEFINED | pstats #345 ikev2.ike started | Message ID: init #345: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #345: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #345; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-93" #345: initiating v2 parent SA to replace #93 | using existing local IKE proposals for connection road-eastnet-nonat-93 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 345 for state #345 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46afe600 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #345 | libevent_malloc: new ptr-libevent@0x7fb35c03b0b0 size 128 | #345 spent 0.0665 milliseconds in ikev2_parent_outI1() | RESET processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #93 ikev2.ike failed too-many-retransmits | pstats #93 ikev2.ike deleted too-many-retransmits | #93 spent 2.57 milliseconds in total | [RE]START processing: state #93 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-93" #93: deleting state (STATE_PARENT_I1) aged 64.021s and NOT sending notification | parent state #93: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #93 "road-eastnet-nonat-93" #93: deleting IKE SA for connection 'road-eastnet-nonat-93' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-93' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-93 | crypto helper 10 resuming | crypto helper 10 starting work-order 345 for state #345 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 345 | State DB: deleting IKEv2 state #93 in PARENT_I1 | parent state #93: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #93 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3680251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56e30 | in statetime_stop() and could not find #93 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 06 83 e6 4d cf 47 f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 345 time elapsed 0.000571 seconds | Message ID: 0 (0x0) | length: 452 (0x1c4) | (#345) spent 0.605 milliseconds in crypto helper computing work-order 345: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 345 for state #345 to event queue | State DB: found IKEv2 state #339 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #339 | rejected packet: | a2 06 83 e6 4d cf 47 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | scheduling resume sending helper answer for #345 | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | libevent_malloc: new ptr-libevent@0x7fb37c01fd50 size 128 | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 57 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | crypto helper 10 waiting (nothing to do) | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #339: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.1 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 44 b2 3a 07 a7 4e 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #331 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #331 | rejected packet: | 50 44 b2 3a 07 a7 4e 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4f 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #331: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0585 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-93 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-93" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-93' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-93" | stop processing: connection "road-eastnet-nonat-93" (in initiate_a_connection() at initiate.c:349) | spent 0.0688 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #345 | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 345 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #345 | **emit ISAKMP Message: | initiator cookie: | cc 1b db ff 37 55 f7 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-93 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9f 67 e9 25 ad 99 4c 76 71 a1 a8 5d 6b de 51 32 | ikev2 g^x eb 5c 8d 84 1c 3d 17 6c c1 5f 62 71 5b 44 16 fb | ikev2 g^x e4 d2 85 4c 64 49 cc e5 df 14 a2 74 3d 7a c6 c8 | ikev2 g^x 61 7c 32 bd 88 6d 99 62 9c 43 b2 d1 2b 52 46 39 | ikev2 g^x c0 c1 fe 0b d3 8c b7 41 43 fa 07 e4 ca 66 08 b9 | ikev2 g^x e3 73 79 86 ee fe 88 31 4e 3f 00 50 43 af ba 2c | ikev2 g^x 0f 81 55 13 ff ba 58 17 5f 8e c8 12 2b 5c fa c6 | ikev2 g^x ef 92 c1 91 f7 d8 64 09 28 37 f9 29 29 da 06 11 | ikev2 g^x 98 a0 90 28 27 02 35 70 61 dc cd b3 af 6b a5 cc | ikev2 g^x 33 40 2b 71 fe b4 6e 27 bc 87 0b 2e 49 cd 22 6a | ikev2 g^x fe 62 e7 dd 24 a7 1f 41 fb 60 e1 86 0c 80 50 0b | ikev2 g^x a0 a0 c9 f7 8f 75 a4 e1 64 72 0c 28 9b b9 6c ed | ikev2 g^x 86 a3 26 05 ab b4 ae 03 ec cc ce 40 59 4c 63 89 | ikev2 g^x f5 0c b7 8c 77 de 51 59 14 48 7e 85 50 2b 34 5c | ikev2 g^x b7 79 6c 71 db 1b 6c 37 06 89 c8 05 98 a4 3e 07 | ikev2 g^x 39 20 3f 60 a2 a7 3c 0b 2f 8f 18 e7 35 c0 2b f1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 20 33 be 81 19 1f 5e fe 6d 68 36 2c 95 1b cf 17 | IKEv2 nonce 03 6e cb aa fd 3d 3c 1f 01 7c 3e 25 c7 e0 c9 bc | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cc 1b db ff 37 55 f7 09 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5d | natd_hash: port= 01 f4 | natd_hash: hash= fc 24 83 28 6d 9e 08 a8 13 dd 36 c1 4e 58 4a c0 | natd_hash: hash= e0 a3 35 28 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fc 24 83 28 6d 9e 08 a8 13 dd 36 c1 4e 58 4a c0 | Notify data e0 a3 35 28 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cc 1b db ff 37 55 f7 09 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 65 c0 95 0a 9d 33 80 de 00 4a d8 7a 37 18 f6 5b | natd_hash: hash= 66 48 2b 46 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 65 c0 95 0a 9d 33 80 de 00 4a d8 7a 37 18 f6 5b | Notify data 66 48 2b 46 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #345 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #345: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #345 to 4294967295 after switching state | Message ID: IKE #345 skipping update_recv as MD is fake | Message ID: sent #345 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-93" #345: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.93:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #345) | cc 1b db ff 37 55 f7 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 67 e9 25 ad 99 4c 76 71 a1 a8 5d 6b de 51 32 | eb 5c 8d 84 1c 3d 17 6c c1 5f 62 71 5b 44 16 fb | e4 d2 85 4c 64 49 cc e5 df 14 a2 74 3d 7a c6 c8 | 61 7c 32 bd 88 6d 99 62 9c 43 b2 d1 2b 52 46 39 | c0 c1 fe 0b d3 8c b7 41 43 fa 07 e4 ca 66 08 b9 | e3 73 79 86 ee fe 88 31 4e 3f 00 50 43 af ba 2c | 0f 81 55 13 ff ba 58 17 5f 8e c8 12 2b 5c fa c6 | ef 92 c1 91 f7 d8 64 09 28 37 f9 29 29 da 06 11 | 98 a0 90 28 27 02 35 70 61 dc cd b3 af 6b a5 cc | 33 40 2b 71 fe b4 6e 27 bc 87 0b 2e 49 cd 22 6a | fe 62 e7 dd 24 a7 1f 41 fb 60 e1 86 0c 80 50 0b | a0 a0 c9 f7 8f 75 a4 e1 64 72 0c 28 9b b9 6c ed | 86 a3 26 05 ab b4 ae 03 ec cc ce 40 59 4c 63 89 | f5 0c b7 8c 77 de 51 59 14 48 7e 85 50 2b 34 5c | b7 79 6c 71 db 1b 6c 37 06 89 c8 05 98 a4 3e 07 | 39 20 3f 60 a2 a7 3c 0b 2f 8f 18 e7 35 c0 2b f1 | 29 00 00 24 20 33 be 81 19 1f 5e fe 6d 68 36 2c | 95 1b cf 17 03 6e cb aa fd 3d 3c 1f 01 7c 3e 25 | c7 e0 c9 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 24 83 28 6d 9e 08 a8 13 dd 36 c1 | 4e 58 4a c0 e0 a3 35 28 00 00 00 1c 00 00 40 05 | 65 c0 95 0a 9d 33 80 de 00 4a d8 7a 37 18 f6 5b | 66 48 2b 46 | state #345 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c03b0b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46afe600 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #345 | libevent_malloc: new ptr-libevent@0x7fb3680251c0 size 128 | #345 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49672.026849 | resume sending helper answer for #345 suppresed complete_v2_state_transition() and stole MD | #345 spent 0.327 milliseconds in resume sending helper answer | stop processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c01fd50 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 1b db ff 37 55 f7 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #345 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #345 | rejected packet: | cc 1b db ff 37 55 f7 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5d fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #345: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0401 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #317 | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #317 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #317 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49672.05214; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002255 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #317 | libevent_malloc: new ptr-libevent@0x7fb37c01fd50 size 128 "road-eastnet-nonat-65" #317: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #317) | 5c a2 6c e8 b2 28 e0 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 95 b1 4b f7 b4 a2 f3 b1 63 69 55 e2 98 fb 3f | 54 1a 28 48 de 85 37 f8 72 76 27 96 2b db 5e 33 | be af 42 49 c9 29 81 c9 57 56 f4 f8 82 3d a6 af | 88 eb 0d 9f f2 82 74 6e 72 69 04 07 19 3d d2 37 | 11 a5 22 ff d2 62 d9 98 57 a1 83 a7 1e 49 51 44 | e5 97 9b 8d 73 a0 96 d3 53 9b fb 45 84 94 f7 3d | 76 31 fc 24 62 7d a9 38 2a be 46 8d 20 60 df db | 07 4b 68 3b f4 5c 0f 39 ef 4f 67 78 1a 41 5e d9 | 21 46 6b 9d 25 f7 b9 97 47 6b 61 67 28 72 bc ab | 6f b2 d8 94 3c 23 68 03 63 f9 fd 48 53 49 f9 59 | 58 72 d8 2c 34 ca e6 db de 5e 25 73 b8 b7 64 58 | c2 d1 ad 6f 0e ca 13 2e b2 5c 80 d7 ba 3d 3c a9 | 3d f9 8e 60 bf 1b 92 40 5e 5c 05 7e ba c9 a8 db | 73 77 de d1 63 54 7f e1 7b 4e 7b ea 38 36 f5 df | ad 83 e3 b0 ba 8d 91 72 ad 79 42 21 5b 3d 90 52 | 8f 94 65 66 3d 81 71 1c 3b 5e 4d 22 19 2e a8 97 | 29 00 00 24 16 ec e2 f4 0d c3 b4 c6 88 17 fa c1 | 57 1b 6f 8e 72 cf d0 88 9c 45 18 d1 76 a6 22 b7 | e9 88 2c 7a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 7d b4 14 23 b3 6a c1 75 92 cb 9c | f1 ae 10 a4 55 81 67 0f 00 00 00 1c 00 00 40 05 | d3 a6 c6 52 7d d4 a1 eb 3d cd 3f 6c 65 3f cc dd | 6f e3 2d 43 | libevent_free: release ptr-libevent@0x7fb364008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #317 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c a2 6c e8 b2 28 e0 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #317 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #317 | rejected packet: | 5c a2 6c e8 b2 28 e0 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #317: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c012bf0 | handling event EVENT_RETRANSMIT for parent state #291 | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #291 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #291 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49672.057385; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004045 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #291 | libevent_malloc: new ptr-libevent@0x7fb364008e30 size 128 "road-eastnet-nonat-39" #291: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #291) | 77 85 93 ea 80 0c b0 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 1c 76 58 29 75 7e d4 f4 bf 59 3f 6e da 30 13 | 97 91 e5 4d 2a 44 30 c6 77 2b e1 aa 90 8a 91 6e | f8 8f d9 e7 ab d5 fb c9 18 4a c7 0e 37 35 b2 f0 | a3 12 8b 8a 64 ba 60 9e 98 18 5b 0a c2 a4 de 16 | 9c ef 90 7b a5 b4 e5 01 26 3c 58 d0 37 33 d3 a2 | f6 fe 76 4d 01 cd 2b d6 3c be b9 eb 0d 8b d4 d7 | c4 c5 12 bf 64 f2 4f a2 ec 8b b1 e0 3a c2 a2 21 | f4 b9 1a d7 ab ef 1a 0d f1 e1 8b 50 27 cf 98 3e | c2 08 00 e6 03 cf bf ee 86 72 2a aa f9 36 e9 49 | e2 ab b6 47 68 84 b5 9d f0 67 c8 08 03 1b 51 9a | 44 fe 69 c7 87 64 78 4a b7 c0 08 da 1d ee c0 bb | be c8 5e a1 c1 cc 41 ab 33 ca fd ed d6 b3 7c b1 | a7 a2 c7 36 15 58 52 6a 99 ee 8c 84 f7 78 81 e9 | 01 61 49 76 ce 6b ac b8 4a dc 03 3e 4e 23 ba 57 | f4 01 5b 74 05 72 0c 07 03 e6 2a 5d b3 8c b8 ef | e7 cd d3 38 e6 37 e3 80 1e bc 5b 24 b7 a5 cb 2c | 29 00 00 24 37 f4 21 d3 cc 8d d5 11 a4 01 4c 20 | b4 32 01 c8 03 d8 fb 70 07 27 01 09 a0 70 e5 36 | d3 fe b6 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 76 dc 7a b2 16 bf 01 10 e9 6f f4 | 8e 92 4c 8c 19 0f b1 8b 00 00 00 1c 00 00 40 05 | 48 a8 ae 2a a4 d2 aa 19 46 f9 d2 d9 d7 e1 ad a4 | ae e0 ac b4 | libevent_free: release ptr-libevent@0x7fb34c014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c012bf0 | #291 spent 0.0864 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 85 93 ea 80 0c b0 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #291 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #291 | rejected packet: | 77 85 93 ea 80 0c b0 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #291: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35800cc10 | handling event EVENT_RETRANSMIT for parent state #332 | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #332 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #332 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49672.08464; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001307 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #332 | libevent_malloc: new ptr-libevent@0x7fb34c014c70 size 128 "road-eastnet-nonat-80" #332: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #332) | f6 c6 d2 5e ba a8 2a f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 1a 55 0f 26 2f b6 a0 08 51 81 5d b7 71 b9 2d | c5 80 10 57 cc 9f 39 cd 78 f5 33 cd 29 d9 74 2d | fd fd 10 79 da 5f 98 34 d3 3d e4 28 2e 71 42 b8 | 31 90 4d 52 c2 47 b7 94 df 57 9e 16 03 38 42 c0 | 07 fe 24 67 18 0a bc 2f be 06 80 3f 3f 52 ae de | ee ce 07 d7 03 01 92 16 62 42 5c 77 dc 87 62 e2 | 3a dd 16 7d 8f 37 3d c8 ba 22 d8 ef 9b 9d 2a 3d | e0 2c 5c 39 14 07 d4 e9 80 bd 41 35 a2 65 f5 06 | d6 66 0e 9c 09 15 5b 2c 90 ec 66 68 2a aa 32 c8 | f4 e9 0e 83 19 df 87 aa b7 d2 50 b1 70 7c e8 1d | 69 9d 8f db 7f c7 e2 b0 71 77 37 93 72 6b 02 1f | ff 20 a4 e2 5f 72 65 e8 93 2e 78 8f 02 5c 26 b8 | d6 41 94 30 c6 30 1d fb 21 2d 70 c7 a4 c4 37 64 | d1 d0 93 45 ae 86 94 3c ef 88 96 54 5d 14 dc 13 | 82 20 c0 68 d6 ce 1b eb 97 51 ea 00 31 01 9f 99 | 9c 00 ca 7b c6 e3 21 ad 8a 48 45 1f d8 69 47 47 | 29 00 00 24 92 2b 4a ab c7 31 ef e2 7b 94 b4 08 | 46 bc 96 1f c5 de 4e 6b bb 45 28 4b ff e0 00 6e | 79 8b 88 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 fd 6f fe 83 1d 32 21 59 ad 4f 6d | 1b 98 f5 b3 09 7a d7 45 00 00 00 1c 00 00 40 05 | f2 d1 58 ca ab 44 6f 50 93 d1 3e f5 88 73 05 cc | 3b a4 3c c0 | libevent_free: release ptr-libevent@0x7fb35804ba00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800cc10 | #332 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 c6 d2 5e ba a8 2a f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #332 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #332 | rejected packet: | f6 c6 d2 5e ba a8 2a f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #332: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0549 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24680 | handling event EVENT_RETRANSMIT for parent state #340 | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #340 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #340 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49672.094933; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501034 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #340 | libevent_malloc: new ptr-libevent@0x7fb35804ba00 size 128 "road-eastnet-nonat-88" #340: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #340) | 06 b4 2a d6 65 92 42 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 29 a3 64 49 07 ee 29 df 38 b6 8e cf 9e 1e 2e | b5 cf 5c 9d df 90 0b 24 c7 00 d1 e9 e7 d5 9f 86 | b0 59 b0 c3 a3 da d8 a1 12 f7 d8 f8 0e b3 79 c6 | 53 3d ef a8 ea 62 cb cf 67 47 98 25 86 4a be 53 | 9d 43 a7 c0 c8 ef 24 bd 84 89 4d 1e d4 43 4c 6d | a9 e8 b8 a2 ac 6e 98 24 1f 18 dc ca 27 cf d8 28 | a6 29 25 bd 63 2f 94 ef bf ef cd 28 af b3 c4 14 | c2 24 5c 8a a7 98 ce 81 da e6 36 b6 6f 19 b3 9c | 61 e9 12 2d 81 4f 37 09 f9 11 51 0b 0a 15 3c 25 | dc 56 9d bc 1a 37 30 79 ad 58 f9 75 6f 1b 9e ed | af 69 6e f2 46 86 c0 e7 9c f5 ce 51 f7 2f 69 1c | c5 ca c9 df 4e 7a 80 a9 78 c1 72 af 2f 09 7a f4 | 7b e9 80 c9 52 10 9d 4e 28 29 82 d9 cd 16 a6 20 | 67 0a 26 62 77 51 4a e8 62 40 48 56 bb c1 3c 45 | c4 fb 9d d0 c4 57 ec 56 11 1b 76 f9 cd ac 15 3f | 9b 2c e1 a4 49 9f 96 e5 41 42 75 44 0c a4 b4 45 | 29 00 00 24 ae e0 e3 5e aa a2 ee b4 ba fd 41 25 | ff 71 9d 02 44 71 da b9 6c 12 19 98 91 a3 35 04 | b4 f3 15 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 9b ba f5 3a f3 63 5f fe ea b4 e7 | 7e cf 7e 1a ac 8a 91 ce 00 00 00 1c 00 00 40 05 | 7a 1b 4b 67 34 a5 a3 ba cf 0b c3 8e 76 85 1a 07 | b5 81 41 18 | libevent_free: release ptr-libevent@0x7fb36804b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24680 | #340 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 b4 2a d6 65 92 42 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #340 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #340 | rejected packet: | 06 b4 2a d6 65 92 42 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #340: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0549 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_RETRANSMIT for parent state #318 | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #318 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #318 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49672.110246; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002433 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24680 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #318 | libevent_malloc: new ptr-libevent@0x7fb36804b7c0 size 128 "road-eastnet-nonat-66" #318: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #318) | b2 9a b8 bc 53 a3 28 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 a5 e6 b7 f3 09 b3 42 4d 70 2a 31 41 4a a2 a1 | da f8 c5 36 7a f2 dc 2d e7 30 c8 c3 07 0a c2 47 | 04 c4 b8 ae 57 b2 7f d1 c1 3e 18 53 e1 5d 14 23 | 04 61 06 e4 91 ef 35 cb ed 7a b9 57 a4 d9 68 76 | fa fd da 0f 58 44 d0 fa 3e 4e 2b ac ca 5d a5 c8 | 76 05 a5 5d 02 6a 96 c6 41 4e 3f 64 57 cd 41 d5 | d0 97 ad ff 58 6a 53 9a 01 1f 6b 3c 24 fe 31 ac | 0d 3c 93 ac 2c da 29 01 1d c2 dd be c2 11 80 ff | b5 b8 9d 4b 81 9c 72 55 6a 84 69 3f d0 ed e9 0c | 2b e3 ca 41 a3 62 7c a2 71 2a 37 58 65 17 c1 53 | cd 34 43 97 e4 05 81 70 70 41 b7 fe ed 43 15 27 | b6 ca b7 9c 9b 05 11 e5 9d 9d 78 a9 d5 63 3e b9 | 63 ef dc 73 f8 b5 32 8d f5 20 3c b0 29 8a 0d 0c | 3e 9f 40 29 07 45 7e 5f 6e e1 39 0d cb 64 2d c9 | 21 f3 18 88 11 a7 78 9d e5 c3 5e 82 9b 66 98 d0 | bb 21 5b 84 f3 89 c9 aa 9f 01 2e d6 67 59 8b 4c | 29 00 00 24 ef 94 98 d7 0c cd d4 f9 7f 97 bf da | 65 7b fd be ba 01 e1 85 cc 2b 5d 20 cf d0 d6 ef | 60 90 51 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 61 27 ec f1 41 a3 45 56 13 d5 ea | 91 6f ea fa 23 e5 f5 e5 00 00 00 1c 00 00 40 05 | d1 cc 61 18 e0 64 68 30 f0 cc 90 9d 95 49 27 67 | 23 d5 d1 7a | libevent_free: release ptr-libevent@0x7fb36004b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | #318 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 9a b8 bc 53 a3 28 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #318 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #318 | rejected packet: | b2 9a b8 bc 53 a3 28 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #318: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0668 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6f550 | handling event EVENT_RETRANSMIT for parent state #292 | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #292 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #292 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49672.126584; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005018 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #292 | libevent_malloc: new ptr-libevent@0x7fb36004b850 size 128 "road-eastnet-nonat-40" #292: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #292) | 87 88 51 7a 60 9d 5a 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 66 a0 4d 60 cb 65 95 3c 93 0d 5e 54 74 22 d5 | b9 4e e2 32 b5 97 c3 a0 c6 6f 16 29 09 b8 29 a7 | 53 85 60 d3 38 df d9 0c a3 64 8e 65 05 77 b2 87 | 1b 54 26 e9 27 44 44 33 65 9f 3e a3 6d dc 58 a3 | 3c 1b b5 56 27 64 d7 00 90 21 cd 7d 46 ab 11 af | ba 96 a3 c8 ee 97 85 92 75 7b ec 2d df 79 07 56 | 45 a8 e2 68 58 3f 02 db 14 25 0e 1f 9b c2 bb 05 | 5a 26 d6 ed 51 8a 97 6d 65 fb 55 2b bb 16 61 e4 | de 73 b2 ef 70 09 3d 76 f2 05 da 1e bd 6c 49 e0 | 44 ef e7 7e 74 41 a3 f7 8a 2e 4b 16 50 e8 de e0 | a4 17 3e ac 86 b1 62 63 2e 1c a5 2b dc 13 3a ee | 9b a0 c2 94 2b ba 80 4c 0b 59 f3 60 75 ff 33 5f | 0b 97 1a 30 63 32 07 17 5c 59 1a 4a db 49 f2 ef | 1e b6 76 4d ca 87 ea 08 32 6d 49 4e d6 81 ee 4c | c7 58 d6 e6 53 ab c7 5b 58 9e 4a 36 b9 18 48 a2 | 61 0a 77 8a 15 c7 1b 51 f1 d5 e0 50 5a 9b 7a 98 | 29 00 00 24 b6 37 4c f0 c9 85 b2 01 0e 7e 3e 08 | 4a 99 af 96 7f b4 c9 1d 28 51 f7 8e 73 35 20 22 | 15 78 52 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 e7 d2 e3 15 0a 06 f3 99 b1 c4 ad | 55 e8 07 46 e3 af eb 45 00 00 00 1c 00 00 40 05 | 9e 69 62 01 15 f2 f4 fe 05 57 a2 2c 87 7a 71 d0 | 0c f9 69 7d | libevent_free: release ptr-libevent@0x7fb35804b8e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6f550 | #292 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 88 51 7a 60 9d 5a 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #292 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #292 | rejected packet: | 87 88 51 7a 60 9d 5a 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #292: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0692 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1ae40 | handling event EVENT_RETRANSMIT for parent state #94 | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #94 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #94 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49672.133922; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.023276 exceeds limit? YES "road-eastnet-nonat-94" #94: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-94" #94: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #346 at 0x557d46a53790 | State DB: adding IKEv2 state #346 in UNDEFINED | pstats #346 ikev2.ike started | Message ID: init #346: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #346: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #346; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-94" #346: initiating v2 parent SA to replace #94 | using existing local IKE proposals for connection road-eastnet-nonat-94 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 346 for state #346 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a6f550 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #346 | libevent_malloc: new ptr-libevent@0x7fb35804b8e0 size 128 | #346 spent 0.0912 milliseconds in ikev2_parent_outI1() | RESET processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #94 ikev2.ike failed too-many-retransmits | pstats #94 ikev2.ike deleted too-many-retransmits | #94 spent 2.54 milliseconds in total | [RE]START processing: state #94 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-94" #94: deleting state (STATE_PARENT_I1) aged 64.025s and NOT sending notification | parent state #94: PARENT_I1(half-open IKE SA) => delete | crypto helper 14 resuming | crypto helper 14 starting work-order 346 for state #346 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #94 "road-eastnet-nonat-94" #94: deleting IKE SA for connection 'road-eastnet-nonat-94' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-94' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-94 | State DB: deleting IKEv2 state #94 in PARENT_I1 | parent state #94: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #94 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3680407f0 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 346 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1ae40 | in statetime_stop() and could not find #94 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-94 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-94" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-94' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-94" | stop processing: connection "road-eastnet-nonat-94" (in initiate_a_connection() at initiate.c:349) | spent 0.0658 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 346 time elapsed 0.000597 seconds | (#346) spent 0.581 milliseconds in crypto helper computing work-order 346: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 346 for state #346 to event queue | scheduling resume sending helper answer for #346 | libevent_malloc: new ptr-libevent@0x7fb37001d6b0 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #346 | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 346 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #346 | **emit ISAKMP Message: | initiator cookie: | 5b 73 99 01 85 6b a6 c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-94 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 76 41 a4 66 03 78 2f 0c ac 28 0c 6f a0 f5 98 a8 | ikev2 g^x ad fe 06 fd 8c a4 d4 c6 03 17 f9 3c ee f7 59 ef | ikev2 g^x a4 19 f6 d6 98 a9 45 18 c4 fa 1a 04 5e 12 ad 25 | ikev2 g^x a2 eb 73 ff 50 f7 5b d9 ac 0d a3 60 63 86 dc 11 | ikev2 g^x 24 c2 5c cb 2a 8c 8f dd 11 7a 54 9c db e5 07 72 | ikev2 g^x 1d 04 b8 06 80 b0 2c 7d 70 61 0f 2e ec 51 90 ed | ikev2 g^x 50 75 e9 44 ba 97 aa c3 93 f0 e7 8e a0 59 5a ef | ikev2 g^x f5 79 47 07 02 c6 5c 62 a1 be 60 af ef 55 0d f9 | ikev2 g^x 00 ac 18 13 2d 62 0e 5a 5f 40 32 8a 49 30 5f 84 | ikev2 g^x 37 da 16 c6 63 1e a6 4e a5 65 94 59 c6 7a b2 c5 | ikev2 g^x 75 c7 8f 68 de d4 77 8e 92 40 c9 5c ee b4 80 ea | ikev2 g^x 42 78 86 4f 14 c5 47 55 13 d1 41 8b fd ef 2c 61 | ikev2 g^x b8 ff 39 92 97 ea a2 69 91 9d 1f f6 fd bd a6 d6 | ikev2 g^x 98 cc 57 23 b2 ed be c2 71 55 a4 d5 18 54 fe df | ikev2 g^x 4d ab de e9 5b 44 57 81 1d 33 6c d4 fe 06 43 32 | ikev2 g^x b0 07 7c ba 8d 9c bd 13 85 9c b0 70 80 5b 02 74 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 86 39 a6 9d e4 88 31 1e 1a 48 0c df 5d 51 c2 7f | IKEv2 nonce eb 35 e1 75 45 71 5e 9b 45 ec 98 56 3e 47 8a 2e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5b 73 99 01 85 6b a6 c3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5e | natd_hash: port= 01 f4 | natd_hash: hash= c8 d4 6c 5c e3 02 f1 ae 0d a6 ae 25 4a 2c de d9 | natd_hash: hash= 71 00 3f 70 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c8 d4 6c 5c e3 02 f1 ae 0d a6 ae 25 4a 2c de d9 | Notify data 71 00 3f 70 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5b 73 99 01 85 6b a6 c3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9a e2 a2 47 57 d0 42 27 78 4a 19 6f 7e 1c 29 7f | natd_hash: hash= 7a 88 26 9b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9a e2 a2 47 57 d0 42 27 78 4a 19 6f 7e 1c 29 7f | Notify data 7a 88 26 9b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #346 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #346: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #346 to 4294967295 after switching state | Message ID: IKE #346 skipping update_recv as MD is fake | Message ID: sent #346 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-94" #346: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.94:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #346) | 5b 73 99 01 85 6b a6 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 41 a4 66 03 78 2f 0c ac 28 0c 6f a0 f5 98 a8 | ad fe 06 fd 8c a4 d4 c6 03 17 f9 3c ee f7 59 ef | a4 19 f6 d6 98 a9 45 18 c4 fa 1a 04 5e 12 ad 25 | a2 eb 73 ff 50 f7 5b d9 ac 0d a3 60 63 86 dc 11 | 24 c2 5c cb 2a 8c 8f dd 11 7a 54 9c db e5 07 72 | 1d 04 b8 06 80 b0 2c 7d 70 61 0f 2e ec 51 90 ed | 50 75 e9 44 ba 97 aa c3 93 f0 e7 8e a0 59 5a ef | f5 79 47 07 02 c6 5c 62 a1 be 60 af ef 55 0d f9 | 00 ac 18 13 2d 62 0e 5a 5f 40 32 8a 49 30 5f 84 | 37 da 16 c6 63 1e a6 4e a5 65 94 59 c6 7a b2 c5 | 75 c7 8f 68 de d4 77 8e 92 40 c9 5c ee b4 80 ea | 42 78 86 4f 14 c5 47 55 13 d1 41 8b fd ef 2c 61 | b8 ff 39 92 97 ea a2 69 91 9d 1f f6 fd bd a6 d6 | 98 cc 57 23 b2 ed be c2 71 55 a4 d5 18 54 fe df | 4d ab de e9 5b 44 57 81 1d 33 6c d4 fe 06 43 32 | b0 07 7c ba 8d 9c bd 13 85 9c b0 70 80 5b 02 74 | 29 00 00 24 86 39 a6 9d e4 88 31 1e 1a 48 0c df | 5d 51 c2 7f eb 35 e1 75 45 71 5e 9b 45 ec 98 56 | 3e 47 8a 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 d4 6c 5c e3 02 f1 ae 0d a6 ae 25 | 4a 2c de d9 71 00 3f 70 00 00 00 1c 00 00 40 05 | 9a e2 a2 47 57 d0 42 27 78 4a 19 6f 7e 1c 29 7f | 7a 88 26 9b | state #346 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35804b8e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a6f550 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1ae40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #346 | libevent_malloc: new ptr-libevent@0x7fb3680407f0 size 128 | #346 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49672.135226 | resume sending helper answer for #346 suppresed complete_v2_state_transition() and stole MD | #346 spent 0.479 milliseconds in resume sending helper answer | stop processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37001d6b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5b 73 99 01 85 6b a6 c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #346 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #346 | rejected packet: | 5b 73 99 01 85 6b a6 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5e fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #346: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a25d10 | handling event EVENT_RETRANSMIT for parent state #333 | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #333 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #333 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49672.149434; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001291 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #333 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-81" #333: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #333) | 36 9c 5e f3 7a 54 db f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df 35 02 78 fc 13 18 22 30 0e d2 c5 c7 5e 7a ef | fc 39 68 66 58 1c a7 d7 f4 43 08 7d f3 9f a3 12 | 83 85 91 2a d6 fa cf 49 c5 3a 4e ef 94 c1 54 16 | 1b 99 b1 a6 48 34 1c b5 c6 ee 58 e5 e4 3c 00 8c | f6 ed dc dd 07 96 4c 6b 8d 5f aa d5 5e f5 20 2e | 3f 32 89 26 7f 4e af 1e 9a 4a 36 89 bf ed bc fa | 5a d9 0b e6 38 d4 55 02 b6 04 ba b9 b2 30 b0 dc | ee 4b 24 b9 ca 12 84 2f 34 21 e3 1c 0e f7 c4 d5 | ce ff 47 39 50 96 0a de ca 62 7f b7 57 aa dc 15 | fa 24 df 17 c7 d0 80 14 18 ef d1 f8 18 5f 36 22 | 2a ba 77 eb 0a 13 5b 8b 27 f6 fa ad 95 0f 09 90 | 17 80 57 73 91 84 22 c2 f7 e1 0e dd b5 d9 e2 7e | 44 ff ae 13 c1 78 7c 90 56 b5 79 a1 5d 2f 9a 4e | 56 4b 74 fa 8f 64 20 07 77 6a 9d cf 03 50 e4 f8 | 0d 1d ad 75 e0 c0 52 df 18 df 4e ac 10 5a bf 8c | 35 df 7e 38 e0 d8 bf ff 6f 7d 3a 37 d3 86 c3 73 | 29 00 00 24 0e 6c f9 b7 77 8c 01 48 47 c0 c4 ac | 2c 92 5d 4f bc 4c de 69 52 73 e8 16 78 88 9e ed | d3 2e 55 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 3c 0e c8 f8 59 38 94 13 7f 9d fb | 64 4c f1 0b 3e 49 1c bd 00 00 00 1c 00 00 40 05 | 19 5d c9 52 f0 58 98 88 cd 4a c6 e4 d4 78 0a 3b | 9f f4 40 6f | libevent_free: release ptr-libevent@0x7fb37c014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a25d10 | #333 spent 0.0919 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 9c 5e f3 7a 54 db f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #333 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #333 | rejected packet: | 36 9c 5e f3 7a 54 db f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #333: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c018460 | handling event EVENT_RETRANSMIT for parent state #341 | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #341 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #341 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49672.156667; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500247 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a25d10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #341 | libevent_malloc: new ptr-libevent@0x7fb37c014c70 size 128 "road-eastnet-nonat-89" #341: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #341) | 49 c3 42 79 ad a4 02 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 28 2b 3a 23 5f 9c 41 a8 c4 b1 54 27 b8 a0 a8 | a4 06 9f e8 bd 51 0b 54 b6 c3 33 24 5b b7 ea 09 | 0f d7 aa 52 2f c6 c6 78 f1 af 48 22 da 41 1f 06 | 45 43 46 fc b0 c6 2f 1b c2 df 83 35 32 87 c5 a5 | b2 fd 30 3e 95 a2 12 80 00 0f 09 dd 41 c2 48 21 | 60 8b 18 12 e2 f7 cf 1e de 64 8d 80 92 30 17 55 | ad 93 96 5a 50 26 d3 cf d9 c9 40 82 d0 c1 d7 8c | 1b c3 86 4b 02 cc 46 e2 fc 73 8a b5 ae 23 f0 12 | e2 a2 8c 5d c9 4d fa 9f 2b e7 d4 9f 15 6e 8f 91 | 94 64 45 c0 fe f3 80 9a 4c e2 d7 66 20 dd 41 dc | 6b 9b c8 3f df d1 ab 15 c5 36 9b b6 cb 01 6b 62 | c9 d1 d0 ae bf 44 a3 4d 59 dd 52 35 90 0f 89 8a | f2 c1 bf c6 f6 a5 a8 2e c6 a8 d7 de 94 ea f6 00 | 11 3a e4 a5 1c cc 19 f4 1b 95 ff 82 80 6f 79 ae | 97 c0 6f ca 24 fa 61 b5 2e 87 00 ef d7 62 ce 06 | 06 5f 50 40 c4 2f 8b 3a fb 06 a7 11 50 8a 1f ce | 29 00 00 24 b0 2a b8 49 b5 4b c9 98 47 c3 4a b6 | 54 a6 a4 dc f8 8a 35 db 6a e0 ae b8 2b 87 41 53 | a2 41 a5 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e a8 6f b4 ec 17 85 04 80 69 75 d9 | db 5a 4e 4f c9 9c a6 7b 00 00 00 1c 00 00 40 05 | 47 20 cd 59 bf 11 9f 21 41 41 cd 45 1c bb 06 ab | 5f ca 38 7e | libevent_free: release ptr-libevent@0x7fb36c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c018460 | #341 spent 0.0858 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 c3 42 79 ad a4 02 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #341 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #341 | rejected packet: | 49 c3 42 79 ad a4 02 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #341: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45310 | handling event EVENT_RETRANSMIT for parent state #319 | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #319 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #319 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49672.172933; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003455 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #319 | libevent_malloc: new ptr-libevent@0x7fb36c04b7c0 size 128 "road-eastnet-nonat-67" #319: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #319) | 11 2f c2 e2 55 80 ad fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 29 97 2b 00 80 7a b2 ce 19 1b 94 79 57 61 71 | b5 31 67 66 2a f4 c8 dd 15 9f e0 ad 50 a1 3c 77 | 34 62 bd 4c c6 67 73 04 6a 47 e6 12 64 23 d5 1b | 98 65 2d 83 00 df 2d e7 e4 d4 74 c8 bc 36 30 29 | 44 5a 01 b4 02 e1 00 0f 8d ad 81 f9 8e 46 de 85 | 06 c3 07 15 fc b6 b0 15 06 43 f6 0e a8 fd 09 ef | d8 40 6e 21 d5 b3 5d 25 10 a6 87 71 c1 c1 fe d8 | bf 80 48 df 26 2b e7 63 6d 12 1e cf 0b 06 eb b0 | 7e 3e d5 d0 6b 21 8d aa 41 e8 f8 30 37 35 ac fc | 15 96 69 e5 f5 b2 90 e3 4e fe 2d ad 13 5f a0 e8 | 1c c7 69 35 1d b3 4c 80 f6 b9 3c 2d 05 13 72 b5 | 7e a3 0f 53 4b 80 32 e8 c3 5e b7 f7 2e ae 6c 5b | 24 7a c5 8a 0a 7f 55 0a 11 24 c0 ef fe 17 1d 30 | 05 8e ac 66 5c 3e f2 80 08 7e 41 35 dd 7a 17 b5 | ec 43 f0 d8 c9 61 5b 46 04 99 f3 93 60 24 02 4a | 51 18 18 5f 6c cb 3e f9 d1 40 eb 27 ba 67 3b b9 | 29 00 00 24 b8 88 60 8f 24 78 87 d6 7e a3 09 04 | de 05 ae 45 4d b7 3b ca 2f 96 5c 9a fa 13 da 85 | a2 c0 a1 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 04 44 46 25 45 86 78 cb ac b2 11 | 55 71 47 06 ea 13 d1 6f 00 00 00 1c 00 00 40 05 | 2f 9a c9 00 f1 11 a0 f7 d7 69 9d e9 ea e6 fc 70 | 38 db 7b 3a | libevent_free: release ptr-libevent@0x7fb358046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45310 | #319 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 2f c2 e2 55 80 ad fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #319 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #319 | rejected packet: | 11 2f c2 e2 55 80 ad fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #319: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0729 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374013710 | handling event EVENT_RETRANSMIT for parent state #293 | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #293 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #293 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49672.217258; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003437 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45310 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #293 | libevent_malloc: new ptr-libevent@0x7fb358046040 size 128 "road-eastnet-nonat-41" #293: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #293) | 98 65 e9 19 f7 80 1b 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 92 fa cc 80 1f 04 ae 31 60 a8 15 7f 6c d4 bb | 0d a3 36 d4 3d 31 2d db c9 a3 65 0b 54 77 b5 90 | 4b f1 85 f9 5b a2 e8 2d 9a 77 1b fe a8 fb ea d0 | 88 2f 01 a5 98 e9 7e 65 f1 01 87 3d 6a 2d 8a 3a | 8e f8 d8 76 3b 1e 19 1d 17 90 3e 76 19 99 52 4a | 6e 00 1d 7b db 96 db 83 88 cd fd 1e bd 7e 5b 89 | ba a0 91 2a b9 ee b5 58 13 b3 5e 5e 59 9d 47 30 | d5 69 4e a7 bd 52 9f d4 e7 9b be ed b8 c7 8e ca | fd 72 11 5d 3c 4e 3f 34 3a cf 63 b2 e1 3a 0c 75 | e0 fd c6 41 05 da 4e 8b 04 c0 eb 84 52 ad 81 69 | 8c d8 b9 f0 3d 70 1f c8 01 a5 b7 5f ee d4 3d 97 | 3f 74 14 bf c1 32 07 23 90 8c c7 74 19 a4 db 67 | e2 81 e3 0a 06 5d bd 34 79 e7 4a 18 70 10 d6 b8 | 84 dc 4f 06 a8 1d f3 4b d5 6f 30 05 6d 56 83 1e | 64 17 96 93 11 0f e7 08 32 35 87 dc fb e0 8f 9f | e0 07 34 5d b8 fb 0d 4c d3 c2 58 00 d5 76 62 90 | 29 00 00 24 6f f2 b6 ca f4 8a a8 b3 ce 34 d7 c6 | a9 bf 42 71 b6 a3 89 33 ed 1d 91 ee 0e 11 98 8d | 12 5e c6 63 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 b6 16 43 43 a6 c6 14 e2 18 67 23 | 58 d4 b6 9a 2d df 39 90 00 00 00 1c 00 00 40 05 | 2a 56 75 a4 c4 51 60 eb 9a b6 a1 bf 9e f8 0f fa | 6b d1 0c 00 | libevent_free: release ptr-libevent@0x7fb344014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374013710 | #293 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 65 e9 19 f7 80 1b 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #293 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #293 | rejected packet: | 98 65 e9 19 f7 80 1b 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #293: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0453 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae8980 | handling event EVENT_RETRANSMIT for parent state #334 | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #334 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #334 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49672.222536; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002783 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374013710 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #334 | libevent_malloc: new ptr-libevent@0x7fb344014c70 size 128 "road-eastnet-nonat-82" #334: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #334) | 99 fb 3f 4d 99 57 72 cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a ca de c8 71 49 e8 30 84 13 c9 a8 49 58 85 47 | 09 f9 f9 59 70 d3 2b 07 44 44 cc 17 14 52 02 aa | 27 07 c2 cd 39 d4 b6 e5 73 79 a9 2f 72 89 bd 61 | d5 62 f8 e8 e6 f1 12 2e 57 7d d0 8e 8b 5d 7b ce | 30 2f b7 61 b2 0b 7b a0 24 5a fe 42 60 21 92 aa | 5a be e9 6d ac f6 2b f8 e4 db ed fe 70 91 ae a8 | 85 c9 a9 89 2d af 8b 90 60 53 0f 7b 1f 54 22 36 | b6 5d 78 20 de 79 62 7d 9d 74 65 df 47 cb 75 b6 | eb 4f 70 ec d4 3f 23 06 d7 65 0a b2 74 f8 e9 72 | 81 4c 29 37 9f 65 5b 7b c1 89 f7 c4 28 5b 64 9b | 59 6b b0 17 bf e7 21 58 4f ad 42 06 42 7b d5 d6 | 2f 45 bc a9 64 87 9f 47 9d 1c 11 c7 6e 0c 53 bf | a5 35 d6 5f eb b3 bf 80 3c b3 0d 2b 91 66 f7 a4 | 98 9c 01 6a 7e ee e3 b3 ad 96 90 67 e0 44 49 71 | 2a 4d 41 3b cc ae 39 dd 1f 03 62 e9 5e 5c bf 21 | 27 f6 9b 3e 24 35 1b f3 b8 96 3c e2 59 58 ea 9a | 29 00 00 24 64 85 28 2f 41 a8 19 c8 06 e4 df 4c | 57 5a d5 28 ae 9b e4 58 e9 c7 cc 4b e4 65 be 72 | 5c d2 98 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 3d 2f a6 85 1f fa fd 47 13 ee 3b | 56 07 59 de 70 93 a0 2d 00 00 00 1c 00 00 40 05 | ab e9 3c 75 bd a4 6c 62 ac eb 51 4e 98 ab 45 51 | fa 01 56 3d | libevent_free: release ptr-libevent@0x7fb36804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae8980 | #334 spent 0.0904 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 fb 3f 4d 99 57 72 cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #334 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #334 | rejected packet: | 99 fb 3f 4d 99 57 72 cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #334: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #95 | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #95 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #95 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49672.238804; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007347 exceeds limit? YES "road-eastnet-nonat-95" #95: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-95" #95: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #347 at 0x557d46a54d50 | State DB: adding IKEv2 state #347 in UNDEFINED | pstats #347 ikev2.ike started | Message ID: init #347: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #347: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #347; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-95" #347: initiating v2 parent SA to replace #95 | using existing local IKE proposals for connection road-eastnet-nonat-95 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 347 for state #347 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ae8980 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #347 | libevent_malloc: new ptr-libevent@0x7fb36804b850 size 128 | #347 spent 0.105 milliseconds in ikev2_parent_outI1() | crypto helper 15 resuming | RESET processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 starting work-order 347 for state #347 | start processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 347 | pstats #95 ikev2.ike failed too-many-retransmits | pstats #95 ikev2.ike deleted too-many-retransmits | #95 spent 2.6 milliseconds in total | [RE]START processing: state #95 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-95" #95: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #95: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #95 "road-eastnet-nonat-95" #95: deleting IKE SA for connection 'road-eastnet-nonat-95' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-95' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-95 | State DB: deleting IKEv2 state #95 in PARENT_I1 | parent state #95: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #95 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3440407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | in statetime_stop() and could not find #95 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-95 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 347 time elapsed 0.000844 seconds | (#347) spent 0.887 milliseconds in crypto helper computing work-order 347: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 347 for state #347 to event queue | scheduling resume sending helper answer for #347 | libevent_malloc: new ptr-libevent@0x7fb37401f7f0 size 128 | start processing: connection "road-eastnet-nonat-95" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-95' +POLICY_UP | crypto helper 15 waiting (nothing to do) | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-95" | stop processing: connection "road-eastnet-nonat-95" (in initiate_a_connection() at initiate.c:349) | spent 0.0947 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #347 | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 347 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #347 | **emit ISAKMP Message: | initiator cookie: | f8 38 0d 6d 39 93 09 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-95 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f8 c4 2f 67 81 91 d8 d3 fb 76 27 6a 79 d1 72 21 | ikev2 g^x 27 8a 05 07 53 b8 7f 41 86 ef e3 fa f6 78 ef f1 | ikev2 g^x 52 89 ca 2d 9e 75 06 3f de f7 86 92 8e de 82 39 | ikev2 g^x 74 b5 33 59 34 5d 7a 07 32 58 2d 1b 54 b4 4a 71 | ikev2 g^x 82 e9 69 4b d1 23 61 8d 33 9d 70 70 80 3d e7 06 | ikev2 g^x 38 6a 56 ed 6a ce 44 ea 5c f0 e5 ab 75 42 57 8c | ikev2 g^x 73 f2 e6 32 f6 2b 78 17 cc 77 d1 36 52 bb 7b 23 | ikev2 g^x 6f c5 5a f4 da 8c 20 ce 25 5e 2c b4 61 29 ba 22 | ikev2 g^x 7b 74 2f 22 bd 61 49 7e ed ee f8 95 fd 44 ae 87 | ikev2 g^x 6a 9a b0 84 48 37 7e bb 35 e6 e2 f6 4e 13 6b 95 | ikev2 g^x 47 4c 2d 6c a3 db 3d 5d ad 81 79 5f 80 e7 3e ed | ikev2 g^x bb b5 a8 97 95 f7 34 a1 ef 98 52 3c fa 6c 7f 37 | ikev2 g^x f7 78 d5 45 99 4e d1 38 57 29 2f b0 94 21 1c a5 | ikev2 g^x 4f 3d 71 d0 fc 88 a0 06 b8 26 ee 84 19 ff 4c 00 | ikev2 g^x 47 77 6c e4 d3 3a ee 07 05 6f 06 56 6c 1b 9a 2e | ikev2 g^x 15 bd 41 a6 3a 78 6e d5 2a 86 74 c6 d6 01 f5 e6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2a 8c 4f 9a ed e1 ff e1 d2 8e 39 06 cc ef a0 3d | IKEv2 nonce 7a d8 6e 61 bc 37 8f e1 33 0d 03 68 11 db e1 97 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f8 38 0d 6d 39 93 09 ce | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5f | natd_hash: port= 01 f4 | natd_hash: hash= 61 e5 1f 89 e2 f9 a8 3f 54 c4 5a dc 3f 1e 16 e7 | natd_hash: hash= e3 67 75 63 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 61 e5 1f 89 e2 f9 a8 3f 54 c4 5a dc 3f 1e 16 e7 | Notify data e3 67 75 63 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f8 38 0d 6d 39 93 09 ce | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d2 37 e4 48 b8 f6 61 3d d7 15 bc 92 37 84 81 61 | natd_hash: hash= b6 43 37 f7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d2 37 e4 48 b8 f6 61 3d d7 15 bc 92 37 84 81 61 | Notify data b6 43 37 f7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #347 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #347: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #347 to 4294967295 after switching state | Message ID: IKE #347 skipping update_recv as MD is fake | Message ID: sent #347 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-95" #347: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.95:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #347) | f8 38 0d 6d 39 93 09 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 c4 2f 67 81 91 d8 d3 fb 76 27 6a 79 d1 72 21 | 27 8a 05 07 53 b8 7f 41 86 ef e3 fa f6 78 ef f1 | 52 89 ca 2d 9e 75 06 3f de f7 86 92 8e de 82 39 | 74 b5 33 59 34 5d 7a 07 32 58 2d 1b 54 b4 4a 71 | 82 e9 69 4b d1 23 61 8d 33 9d 70 70 80 3d e7 06 | 38 6a 56 ed 6a ce 44 ea 5c f0 e5 ab 75 42 57 8c | 73 f2 e6 32 f6 2b 78 17 cc 77 d1 36 52 bb 7b 23 | 6f c5 5a f4 da 8c 20 ce 25 5e 2c b4 61 29 ba 22 | 7b 74 2f 22 bd 61 49 7e ed ee f8 95 fd 44 ae 87 | 6a 9a b0 84 48 37 7e bb 35 e6 e2 f6 4e 13 6b 95 | 47 4c 2d 6c a3 db 3d 5d ad 81 79 5f 80 e7 3e ed | bb b5 a8 97 95 f7 34 a1 ef 98 52 3c fa 6c 7f 37 | f7 78 d5 45 99 4e d1 38 57 29 2f b0 94 21 1c a5 | 4f 3d 71 d0 fc 88 a0 06 b8 26 ee 84 19 ff 4c 00 | 47 77 6c e4 d3 3a ee 07 05 6f 06 56 6c 1b 9a 2e | 15 bd 41 a6 3a 78 6e d5 2a 86 74 c6 d6 01 f5 e6 | 29 00 00 24 2a 8c 4f 9a ed e1 ff e1 d2 8e 39 06 | cc ef a0 3d 7a d8 6e 61 bc 37 8f e1 33 0d 03 68 | 11 db e1 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 e5 1f 89 e2 f9 a8 3f 54 c4 5a dc | 3f 1e 16 e7 e3 67 75 63 00 00 00 1c 00 00 40 05 | d2 37 e4 48 b8 f6 61 3d d7 15 bc 92 37 84 81 61 | b6 43 37 f7 | state #347 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36804b850 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ae8980 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #347 | libevent_malloc: new ptr-libevent@0x7fb36804b850 size 128 | #347 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49672.240598 | resume sending helper answer for #347 suppresed complete_v2_state_transition() and stole MD | #347 spent 0.484 milliseconds in resume sending helper answer | stop processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37401f7f0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 38 0d 6d 39 93 09 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #347 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #347 | rejected packet: | f8 38 0d 6d 39 93 09 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5f fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #347: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360018460 | handling event EVENT_RETRANSMIT for parent state #342 | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #342 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #342 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49672.245804; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500538 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37400cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #342 | libevent_malloc: new ptr-libevent@0x7fb37401f7f0 size 128 "road-eastnet-nonat-90" #342: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #342) | 92 0e 5c 44 35 6f 61 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 4b 3f 50 56 cd 4f c8 69 53 e3 02 d0 e2 c4 4b | b8 26 12 0d 2f 95 d4 df 65 d2 22 1d a5 8a 76 36 | 0f 44 f3 88 67 5b a4 93 af 87 fb e7 03 3d f3 3d | ce 49 25 06 46 21 51 fe e6 a5 e0 3f 25 17 b0 d7 | 71 9b 71 32 36 21 5f b7 2a ee 25 9c 8a 04 76 c2 | 55 e4 ab 4e 7c 02 05 d1 d2 21 09 a2 51 a4 92 f0 | 79 2b 73 03 6e bc d5 33 3d 90 f5 1b b7 cb cd e9 | 74 b4 08 87 c4 a4 7c ab 86 b2 e8 fe f3 2e a7 14 | da 5c 13 a2 0a 83 be 25 a6 25 48 21 ec 98 11 c6 | 1d 49 83 e7 e3 39 34 26 fb d4 24 cb d2 66 1f a9 | 8b 7b 97 28 60 bf e3 df fc be 83 7a 91 a4 90 3a | af ad 2d 44 70 c8 0c 11 ab e1 87 f9 88 5b 04 d8 | 04 03 d4 08 d3 e9 32 2b 30 9c 93 90 d3 62 4a 73 | df 00 65 61 53 f7 33 9c 73 ad fe 53 5a 29 aa 93 | da 76 97 14 51 4b d0 f8 fb 54 f6 6e 4f 99 ad 4b | 75 e5 97 56 5f 2e 08 fb ed 71 37 6a 4a ad d6 62 | 29 00 00 24 02 01 86 b0 0f 40 c1 16 7f df 21 87 | ce a9 58 2f 27 7b 28 e0 c6 1c d2 35 82 80 ac e4 | ab 80 e7 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 56 62 15 04 08 91 44 63 ec 81 3e 0b | 9f 8e c8 3c d5 eb af f0 00 00 00 1c 00 00 40 05 | 60 c3 81 cb a9 a6 9e ac 92 76 43 f4 51 0d 3b 6e | 52 02 3f 95 | libevent_free: release ptr-libevent@0x7fb38802d3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360018460 | #342 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 0e 5c 44 35 6f 61 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #342 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #342 | rejected packet: | 92 0e 5c 44 35 6f 61 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #342: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350005860 | handling event EVENT_RETRANSMIT for parent state #320 | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #320 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #320 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49672.269198; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003418 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #320 | libevent_malloc: new ptr-libevent@0x7fb38802d3a0 size 128 "road-eastnet-nonat-68" #320: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #320) | af c7 ee c1 89 d6 03 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 a8 bd a9 e5 4d 48 c1 fb 45 8d 11 bf a7 3a cc | c9 47 84 c7 e3 5d ec 21 4e d8 5a af 98 89 03 e4 | 61 3a ba 3d 60 86 ef 6f 17 de fb a4 db d7 d8 bb | dd a1 22 38 5e f6 ed 84 ef 59 30 63 60 c1 46 9c | 68 55 6e 9a 1e c0 57 7e 80 7e b6 a3 a2 d8 44 32 | cf 08 62 90 01 f4 f2 5f ed 1f e9 b3 6d aa b3 b5 | 51 0c 08 36 0d 22 74 67 a6 8c ed a0 79 50 51 2d | 0e 2f 3b 92 1e b3 eb 2d 06 7f 88 16 e6 58 28 17 | 60 5d c5 e1 99 65 2e 54 d8 fa ea 82 20 22 7c ff | b3 f5 72 25 7c 83 b1 cd 19 3e 2b da bc a9 3d dd | 76 aa 4a e2 d6 6a 5a 1c c6 a7 82 72 c8 70 00 2c | 36 b2 a4 f0 ac d5 1d 56 89 f2 8b 82 16 da 4e a9 | 45 8b f2 f1 83 02 06 ed 82 d4 33 ad 52 79 3a 05 | a1 a9 14 4d f9 86 6b dc 84 e1 88 2a d3 ae c1 8c | 43 6f 17 24 1b 1e 6c e9 e7 e2 8e 7a 04 41 d1 b0 | a9 68 50 65 7f 85 77 b4 91 10 c3 80 9a 3e 62 10 | 29 00 00 24 2e 21 9d f9 af ba 04 f5 8f 3b a6 14 | 4e db f7 72 ee 4f db 92 91 3b 76 55 23 0e 1b ed | b4 de fd 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 21 4b df 59 d9 64 c3 0f dc d7 26 | ba 28 50 c6 3e 72 d7 ec 00 00 00 1c 00 00 40 05 | d3 cb a5 46 ac a7 4b 5d c8 de d7 e5 bf c8 e6 16 | 1f 0a fc 46 | libevent_free: release ptr-libevent@0x7fb344008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350005860 | #320 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af c7 ee c1 89 d6 03 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #320 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #320 | rejected packet: | af c7 ee c1 89 d6 03 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #320: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a15810 | handling event EVENT_RETRANSMIT for parent state #335 | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #335 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #335 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49672.274561; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001047 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #335 | libevent_malloc: new ptr-libevent@0x7fb344008e30 size 128 "road-eastnet-nonat-83" #335: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #335) | 43 a2 0c b8 41 14 fb 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 1a ff fe 66 5c 27 50 3c bb 63 46 9d 4f 02 13 | 90 10 26 6b 8b bb ce 8e f8 b1 4e 76 fe b9 96 cb | 8a 27 62 97 df ca 55 0f 1b 21 02 63 f2 9a 56 cf | af a1 0c 10 6a 33 02 6e 92 2e ca f8 26 1a ae eb | 16 92 9e c4 5b 3e 17 4a 65 79 45 19 ed da 56 2e | 51 d3 90 a7 9f 98 36 5a 61 58 65 de 51 88 f2 d6 | 2c 74 21 5b 26 93 04 1f 9d 42 9f 74 af 5b 84 53 | 88 76 a7 2b 50 71 5f 03 19 11 aa 1d 3f 9a 1b be | 3f 66 50 7a 7c c6 ba 3a 1f b1 9f aa e7 d9 54 d2 | 8e 38 49 1c 3f da 85 98 28 e2 8c e3 a0 7e 8b bb | 1f a5 48 ea b8 af 51 41 c3 b5 72 51 f3 06 99 5a | 76 51 df 7b 88 a9 f4 af 6a 05 b3 e4 b4 4c ac 08 | 4f aa 11 34 cc 49 a5 06 8b 79 a3 52 45 cd 64 d8 | 83 12 a6 eb 44 69 b7 c9 e1 51 9a 09 19 b8 97 03 | 64 d6 b8 43 68 0f ed bf 4f 10 12 04 91 a0 82 30 | b8 e7 e9 9e 27 9b 68 9f 56 43 7c 93 6d 87 a8 e5 | 29 00 00 24 42 02 24 73 b2 25 02 dc ca ad a2 1d | 9e f8 54 e2 15 e2 22 5d 3f 7b 60 32 c9 95 b0 ec | b1 7e 62 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 ff c7 be 47 4f 0e b7 8d ed 50 5b | d9 e3 74 cc de e6 b4 2d 00 00 00 1c 00 00 40 05 | 8d 0a fb 98 6b 40 87 d9 54 5c 96 0f 30 79 eb 55 | 16 93 80 76 | libevent_free: release ptr-libevent@0x7fb35804b970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a15810 | #335 spent 0.0926 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 a2 0c b8 41 14 fb 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #335 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #335 | rejected packet: | 43 a2 0c b8 41 14 fb 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #335: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c780 | handling event EVENT_RETRANSMIT for parent state #253 | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #253 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #253 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49672.288806; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005482 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a15810 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #253 | libevent_malloc: new ptr-libevent@0x7fb35804b970 size 128 "road-eastnet-nonat-1" #253: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #253) | 54 6a b3 63 15 2d 54 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 a1 ec de cb a0 5d c1 1a bd 04 af 6b c8 65 41 | 5e 52 49 f5 a0 69 ab 28 22 ed fc 77 d0 a0 c1 09 | 24 c3 68 ac f8 52 b1 01 40 3f 24 70 5d fa bb e6 | 18 17 b8 60 62 5c 25 b7 91 1b 32 be a8 33 c7 03 | d3 9b 4d ca 93 cb 69 27 56 25 f1 0e f0 75 9b f1 | 6f a5 25 09 c0 56 aa ed be 25 e6 7b 20 95 b5 00 | 7f 1a 1b 09 1c 04 5e 80 38 55 80 90 08 7b dd ce | 4f 11 1a be 0d 38 69 ab e8 df ca 75 0d 3f c0 1b | 66 36 7e b8 6f b9 34 13 07 77 35 27 1b 68 f3 4e | 59 d6 7e de a5 ba 53 3b 79 89 bf fd cf 6b c9 05 | 32 48 47 96 e8 02 b8 8c 85 5e 07 cf ed 73 28 31 | 7f b0 4a 57 00 7a 0b 42 b6 34 c6 f8 0c c3 11 82 | b9 52 df 83 77 94 ac c4 6e d0 af 9f 9c 46 4a 9d | 6a 59 79 91 e9 aa 6f 46 f9 bf 64 56 57 97 6b ca | 02 fc e7 a2 5d cb d3 e6 be 89 40 eb 8b 5f bf bb | ea e1 78 af e4 9a d6 bc 8f 45 8e 59 45 6b cc 3f | 29 00 00 24 5b 81 82 6a 34 1f 0c 89 b3 0b 07 6c | d0 e3 bd fa b4 1c af f3 18 56 94 10 92 25 11 f0 | 48 f8 d2 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 79 2b 18 11 0c 23 de f4 d0 de e0 | 77 97 22 a5 08 48 2f ff 00 00 00 1c 00 00 40 05 | c8 d4 47 db f6 e8 46 67 19 87 ae df 18 10 c7 ab | 9f a6 71 f9 | libevent_free: release ptr-libevent@0x7fb37402a710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c780 | #253 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 6a b3 63 15 2d 54 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #253 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #253 | rejected packet: | 54 6a b3 63 15 2d 54 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #253: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0529 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0d4c0 | handling event EVENT_RETRANSMIT for parent state #294 | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #294 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #294 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49672.301124; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004376 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9c780 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #294 | libevent_malloc: new ptr-libevent@0x7fb37402a710 size 128 "road-eastnet-nonat-42" #294: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #294) | 9b 31 1a f8 0f be 39 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 dd 24 24 7c 2f 7c cf af 6d 3e 60 a2 73 ad b0 | 5d e0 ad 29 4b 13 6c 37 66 5f 9c 4f e7 c9 e4 11 | 2c 5d 56 30 72 c8 d6 46 26 66 f5 93 56 d4 c3 52 | 85 cc e5 ae f9 42 b4 ed 60 85 06 0a 66 f5 50 1d | b5 97 c3 6d 71 b4 75 b7 83 18 b1 d3 7d 4a 68 8c | b9 4f df 9f 66 87 ec eb 33 88 de f2 6b c6 ea ab | d0 0d f9 06 34 9c 52 b4 c5 c4 6d 94 39 a8 58 51 | 41 ac 6d 52 08 28 9d f6 37 25 c7 7f 2d 48 ab 90 | f6 30 d2 8b 1b 90 e6 12 18 e0 e2 d4 dc 25 fe 81 | c8 41 3f 06 d9 c6 ce a5 91 8f 50 2b 48 2d e5 59 | 7a 24 e5 58 8b 81 4a bc cb 35 59 84 09 16 ee 2d | ba cf 81 ed 91 57 53 ab 0b 04 8a 27 0b c6 e0 ef | db ab 77 93 c2 db 73 a1 76 37 e1 bf 29 0a 3c 98 | 04 2f f5 e3 ff d0 c3 48 62 42 d2 a6 9f a7 c1 a7 | df e6 f0 e2 49 c7 bb 48 bb b6 1d f0 0e d1 19 d7 | 21 c7 76 5c 49 fc f0 be 36 da d1 aa ec 07 53 22 | 29 00 00 24 c9 1f 43 d3 3e f5 11 59 29 27 36 bb | 9f 07 da f1 c2 4b 17 7e d6 e4 43 b9 54 44 c2 2b | 3a e0 9b 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 60 07 d1 2a 2e 6f e5 7f 13 de a6 | da 25 32 50 d9 e2 97 75 00 00 00 1c 00 00 40 05 | de 91 5e 97 33 cf e4 58 2c 2c f0 43 aa ad 93 60 | ec ee 8a 50 | libevent_free: release ptr-libevent@0x7fb34803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | #294 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9b 31 1a f8 0f be 39 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #294 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #294 | rejected packet: | 9b 31 1a f8 0f be 39 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #294: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #343 | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #343 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #343 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49672.323421; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499929 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #343 | libevent_malloc: new ptr-libevent@0x7fb34803b0b0 size 128 "road-eastnet-nonat-91" #343: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #343) | ae 78 c6 a9 8f e8 66 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 9d b8 ed 06 43 12 ec 4c 45 2d d2 98 f8 e4 c2 | 36 59 63 a7 5a 33 ff 67 e3 f9 f4 1f 01 a9 3a 4c | 55 90 c8 83 a0 29 a8 aa 4f ac db f2 6f 11 94 39 | df dd ed a8 03 f3 60 cc f4 5f c8 16 76 2c 18 b3 | 52 5b 1b ac 7a 46 b0 6c 28 af 43 e8 e9 1f 42 2d | 46 d8 e4 d3 78 66 14 97 ce c1 cd 0c 3c 65 65 46 | 46 82 84 7e d0 a7 70 e0 17 0f db 9a 4e 29 93 92 | 21 22 73 35 c9 ca 2f af 9d 0a 64 5c 81 08 63 7f | e9 bd 70 7e 9e c2 db 6e 8e 2d a9 2d 3d e8 0e 81 | cf 97 9f 13 45 5f d0 17 a5 46 81 8f f6 9c 9c dd | 6d 72 b6 df 14 55 64 61 52 e1 4b 46 36 b7 06 8a | 6d 94 56 ae f7 f9 54 fa 14 95 61 ab b8 b6 ec c3 | e8 2c f9 02 e7 ab 10 28 9e 67 38 42 93 d6 89 7e | bb 6a dc 83 42 00 3f 72 de b7 9e 71 be 55 39 21 | 54 8b a5 97 b3 b2 06 f8 5f 7f 26 67 9a c1 3f 7e | 51 39 34 0f ac 86 ce 7b e6 99 54 4b 79 6e 8f 0a | 29 00 00 24 65 6f dc 77 c3 29 54 5a 74 6e 49 3d | 05 2a fe cf 26 c9 29 fa f4 9d 54 09 a5 a6 15 69 | 11 b4 0e 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 ad 81 e7 cf f7 25 7c 0f 5a 2a 07 | aa 17 3c 2f 54 ca c3 2d 00 00 00 1c 00 00 40 05 | 5d 1d e0 9d fe 43 fa fd 70 69 f4 3c 05 77 9a 1e | 38 96 d9 39 | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #343 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 78 c6 a9 8f e8 66 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #343 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #343 | rejected packet: | ae 78 c6 a9 8f e8 66 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #343: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47e90 | handling event EVENT_RETRANSMIT for parent state #321 | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #321 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #321 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49672.328694; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003052 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #321 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 "road-eastnet-nonat-69" #321: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #321) | 30 42 c0 64 91 b3 77 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 8b 42 a5 47 61 3e b2 88 66 b3 90 63 22 69 df | e5 f0 68 6a 3f ab 70 bf d6 bc a2 6d 32 d6 bf 56 | 13 cd ae 31 91 9e 97 07 b1 e6 67 da 49 fc 52 44 | f0 97 00 89 4b 4a 7b 7e 72 67 33 77 ed ad d5 60 | 7c 94 7a 09 a1 fe 2b 97 f4 03 f7 65 c2 4f 92 50 | 59 77 e9 77 52 e2 ba 0e f1 c5 36 f7 3f 04 ca 02 | 29 37 fe 9d b2 ee 90 bb 59 f2 25 82 19 bd 15 09 | 7c 21 90 62 70 4c 2f 35 e2 fa b0 32 14 28 ef f3 | f9 26 2a aa 23 e5 00 f2 ed fa 00 25 b3 8d 3e f4 | 4c e5 68 7e bb cf a5 93 21 96 34 22 9d cb 8e c0 | 2d 43 58 e0 8a b9 3b 2b d8 e6 50 0b 36 e9 8a 0b | 9a 7c fa 82 ee ac d3 9d dc ac fe e5 26 e8 d7 a8 | 41 71 b3 21 7a 08 ae 35 2b 19 02 a1 3c d8 d8 79 | 7f 1b 50 2d 1e 74 84 a4 f5 80 19 40 cb b4 59 fe | e2 eb 79 b4 b1 1d a9 7a b4 6e 10 85 42 85 5d e9 | 58 9c 43 c5 54 ce c4 20 7b 73 38 bf 59 44 4d 18 | 29 00 00 24 bf 17 ca 5e f8 c4 94 b8 0b 16 3e 38 | 6b 43 cf 92 04 d6 aa ac 11 4c 2e 2c d1 a0 dc 92 | 64 9e 7b 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 bc 1a f8 41 15 d9 99 65 b2 c4 f3 | df 03 a0 00 26 60 50 c2 00 00 00 1c 00 00 40 05 | fc 37 e7 42 82 1f 76 13 ad 5a b7 fc e2 af d4 9f | 15 d4 13 5b | libevent_free: release ptr-libevent@0x7fb38800a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47e90 | #321 spent 0.0971 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 42 c0 64 91 b3 77 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #321 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #321 | rejected packet: | 30 42 c0 64 91 b3 77 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #321: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a855c0 | handling event EVENT_RETRANSMIT for parent state #336 | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #336 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #336 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49672.336962; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002124 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47e90 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #336 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 "road-eastnet-nonat-84" #336: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #336) | a0 3a 99 80 e1 01 63 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 8b 11 e3 72 10 b4 96 46 45 1f 06 8b cb 20 43 | 48 5b dc 9f 22 0b 19 f0 6e 5a 41 4f 7b 66 7e 47 | 17 91 cc cc 24 8c c0 85 32 b7 be 23 d1 6d 12 65 | 00 df c3 47 48 17 d9 93 47 4f 9d 2a 81 88 4f 2c | 1f 98 ac a8 85 56 dd 1e 45 4f f7 f9 78 59 b2 90 | d0 96 3c c9 92 dc 80 e7 ee 9e 9f f3 a3 42 a0 87 | f4 8c 84 d8 38 fe 2c f0 0d 7c 15 54 23 ab a7 7c | ab e1 53 7c ba 26 57 e2 9b 0a 0d 44 c4 7c f6 bd | 50 8c ae 85 b6 fa 6e 51 9e 4d 32 a8 2f 5f b7 94 | 33 ef 3d 6b de 80 a9 44 cb a5 48 1f 9d d9 3e 40 | c2 f4 df a8 c7 43 1a 85 1e 99 1c be ad 10 a3 44 | af 83 22 29 2a d8 4c fc aa 9e 40 9e 83 a1 f3 2d | d3 6b 55 b5 8b 94 57 96 1f 06 03 b7 e8 07 4a dc | 94 d8 f3 f3 15 26 15 42 b7 cd 81 18 11 03 dc 3a | 4e 46 ec 2a eb 11 4a a9 f5 ce 5d 26 8e 40 7e f7 | fb 5d b7 76 23 d0 05 cb 25 8d 85 d4 e7 63 e5 fe | 29 00 00 24 20 77 67 42 c0 5c 2e 2c 4f 51 1c e3 | 6e 76 b6 ed 2f 6c dc 89 e9 07 aa bc e6 7b f3 86 | a7 c4 a8 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c e2 e4 55 b2 1e b0 cb dc 5a 76 de | 82 37 47 8c ee 4e fe 03 00 00 00 1c 00 00 40 05 | 1d 8c 0e 3c 37 8c 24 ca 1e c1 4b a0 97 2b 99 7f | 60 3a d2 7b | libevent_free: release ptr-libevent@0x7fb37000f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a855c0 | #336 spent 0.0915 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 3a 99 80 e1 01 63 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #336 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #336 | rejected packet: | a0 3a 99 80 e1 01 63 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #336: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0553 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37000d120 | handling event EVENT_RETRANSMIT for parent state #96 | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #96 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #96 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49672.344234; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007634 exceeds limit? YES "road-eastnet-nonat-96" #96: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-96" #96: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #348 at 0x557d46a56310 | State DB: adding IKEv2 state #348 in UNDEFINED | pstats #348 ikev2.ike started | Message ID: init #348: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #348: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #348; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-96" #348: initiating v2 parent SA to replace #96 | using existing local IKE proposals for connection road-eastnet-nonat-96 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 348 for state #348 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a855c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #348 | libevent_malloc: new ptr-libevent@0x7fb37000f1a0 size 128 | #348 spent 0.07 milliseconds in ikev2_parent_outI1() | RESET processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #96 ikev2.ike failed too-many-retransmits | pstats #96 ikev2.ike deleted too-many-retransmits | #96 spent 2.51 milliseconds in total | [RE]START processing: state #96 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-96" #96: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #96: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #96 "road-eastnet-nonat-96" #96: deleting IKE SA for connection 'road-eastnet-nonat-96' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-96' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-96 | State DB: deleting IKEv2 state #96 in PARENT_I1 | crypto helper 19 resuming | crypto helper 19 starting work-order 348 for state #348 | parent state #96: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 348 | stop processing: state #96 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb370012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37000d120 | in statetime_stop() and could not find #96 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-96 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-96" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-96' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-96" | stop processing: connection "road-eastnet-nonat-96" (in initiate_a_connection() at initiate.c:349) | spent 0.0584 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 348 time elapsed 0.000528 seconds | (#348) spent 0.529 milliseconds in crypto helper computing work-order 348: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 348 for state #348 to event queue | scheduling resume sending helper answer for #348 | libevent_malloc: new ptr-libevent@0x7fb36801fd50 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #348 | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 348 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #348 | **emit ISAKMP Message: | initiator cookie: | a7 7d 9d ff 1a 60 65 e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-96 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ce d5 f5 8b 39 60 35 a5 25 70 07 1c 5c b5 0b 9d | ikev2 g^x 0f b2 5b 4a 01 34 b6 83 42 d7 d4 4c ad da 68 4a | ikev2 g^x 8b 4a 32 5f 36 06 f1 98 73 58 e9 72 c0 73 68 ca | ikev2 g^x 50 81 07 47 ff 17 19 96 47 97 94 3d f6 b6 04 3a | ikev2 g^x d9 53 26 2d 26 d4 5a 00 db 52 8b 30 4a 2f d3 5e | ikev2 g^x 57 21 6b c8 30 e6 41 d6 77 b5 33 c3 1e eb 09 f5 | ikev2 g^x f6 92 94 59 ce 0f f4 b6 13 a7 e6 12 2c 94 0a 0e | ikev2 g^x a5 49 7d ed 7d 57 a6 dd 0c c8 f5 e3 ab f6 df fb | ikev2 g^x 13 a2 c5 ce cd 5e 51 7c 83 34 62 82 09 e1 e3 72 | ikev2 g^x 31 4c 58 be 93 6e 60 9d a5 4a 65 3b 0e 6c 76 16 | ikev2 g^x ff b5 3c 17 b2 e3 b4 72 ba 47 1e 9f c9 b0 43 a7 | ikev2 g^x f0 b4 e5 71 a8 38 7d f3 55 a8 70 6c f5 0c ea e3 | ikev2 g^x 99 31 47 d9 67 2c ef 74 72 f0 71 8a 3c da e4 22 | ikev2 g^x d8 c1 06 32 4c 16 22 97 a9 d9 5c c1 eb 63 08 aa | ikev2 g^x 52 12 c2 6f 92 9a fe 31 31 61 1a 04 4f a6 29 e5 | ikev2 g^x bd ba 74 54 e9 68 1b 89 03 52 57 66 34 af 35 4f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d4 8c 07 58 36 6c 0d 91 39 7f ba 4b 55 80 94 2b | IKEv2 nonce 15 6a 3d d9 23 c6 de 68 59 32 ea bf f7 3a e2 06 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a7 7d 9d ff 1a 60 65 e1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 60 | natd_hash: port= 01 f4 | natd_hash: hash= c1 c6 46 d6 42 6c c3 80 0a 8c 20 90 81 74 5d e8 | natd_hash: hash= 06 92 e7 f6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c1 c6 46 d6 42 6c c3 80 0a 8c 20 90 81 74 5d e8 | Notify data 06 92 e7 f6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a7 7d 9d ff 1a 60 65 e1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 5c 1e 6e a7 c5 99 b7 4d bd dd e2 f9 8e 11 ad b4 | natd_hash: hash= 92 1e 01 ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5c 1e 6e a7 c5 99 b7 4d bd dd e2 f9 8e 11 ad b4 | Notify data 92 1e 01 ed | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #348 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #348: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #348 to 4294967295 after switching state | Message ID: IKE #348 skipping update_recv as MD is fake | Message ID: sent #348 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-96" #348: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.96:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #348) | a7 7d 9d ff 1a 60 65 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce d5 f5 8b 39 60 35 a5 25 70 07 1c 5c b5 0b 9d | 0f b2 5b 4a 01 34 b6 83 42 d7 d4 4c ad da 68 4a | 8b 4a 32 5f 36 06 f1 98 73 58 e9 72 c0 73 68 ca | 50 81 07 47 ff 17 19 96 47 97 94 3d f6 b6 04 3a | d9 53 26 2d 26 d4 5a 00 db 52 8b 30 4a 2f d3 5e | 57 21 6b c8 30 e6 41 d6 77 b5 33 c3 1e eb 09 f5 | f6 92 94 59 ce 0f f4 b6 13 a7 e6 12 2c 94 0a 0e | a5 49 7d ed 7d 57 a6 dd 0c c8 f5 e3 ab f6 df fb | 13 a2 c5 ce cd 5e 51 7c 83 34 62 82 09 e1 e3 72 | 31 4c 58 be 93 6e 60 9d a5 4a 65 3b 0e 6c 76 16 | ff b5 3c 17 b2 e3 b4 72 ba 47 1e 9f c9 b0 43 a7 | f0 b4 e5 71 a8 38 7d f3 55 a8 70 6c f5 0c ea e3 | 99 31 47 d9 67 2c ef 74 72 f0 71 8a 3c da e4 22 | d8 c1 06 32 4c 16 22 97 a9 d9 5c c1 eb 63 08 aa | 52 12 c2 6f 92 9a fe 31 31 61 1a 04 4f a6 29 e5 | bd ba 74 54 e9 68 1b 89 03 52 57 66 34 af 35 4f | 29 00 00 24 d4 8c 07 58 36 6c 0d 91 39 7f ba 4b | 55 80 94 2b 15 6a 3d d9 23 c6 de 68 59 32 ea bf | f7 3a e2 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c1 c6 46 d6 42 6c c3 80 0a 8c 20 90 | 81 74 5d e8 06 92 e7 f6 00 00 00 1c 00 00 40 05 | 5c 1e 6e a7 c5 99 b7 4d bd dd e2 f9 8e 11 ad b4 | 92 1e 01 ed | state #348 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37000f1a0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a855c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #348 | libevent_malloc: new ptr-libevent@0x7fb370012840 size 128 | #348 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49672.345314 | resume sending helper answer for #348 suppresed complete_v2_state_transition() and stole MD | #348 spent 0.349 milliseconds in resume sending helper answer | stop processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36801fd50 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 7d 9d ff 1a 60 65 e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #348 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #348 | rejected packet: | a7 7d 9d ff 1a 60 65 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 60 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #348: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0401 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a63210 | handling event EVENT_RETRANSMIT for parent state #295 | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #295 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #295 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49672.381604; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003379 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3680129a0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #295 | libevent_malloc: new ptr-libevent@0x7fb36801fd50 size 128 "road-eastnet-nonat-43" #295: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #295) | 11 ea 13 a7 2a b1 5c 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 c0 f3 39 06 15 d7 07 8e 11 b6 9a 6e 2d b3 34 | 66 03 a5 c2 e2 1f 37 32 46 97 6f cd af d0 2f 18 | 5f 75 66 e4 a1 42 12 53 5e 16 d8 3a 31 65 02 6a | c5 e3 cc f7 d2 22 a4 aa ae 02 3c 06 f6 0c fe fa | e4 54 02 04 c7 56 0a b1 39 1c 79 77 c9 da 62 93 | 00 7e f1 cc 8f 9d de 33 24 4e 12 09 b8 73 ad 99 | 9d bd 21 4e 12 37 5e 79 f1 fe 24 ac 36 8f 56 b3 | d6 c7 5b 74 f8 84 56 d2 c9 9a 89 80 ba ca fa 63 | 61 ef b2 49 26 8d 16 1c 9e 9b a5 d0 8c b1 11 4d | 74 c3 30 50 82 5e f2 2c 5e 21 4f 59 50 07 97 4a | 3b 99 d0 83 20 16 83 be 15 cb 08 01 be 88 1e c0 | 56 de 78 28 a9 82 d7 99 3a 47 be b7 57 13 4d ef | 18 8f 0d 23 65 69 63 f7 5c af 9a 31 54 69 e3 c6 | e4 81 15 9e a2 7e 90 55 50 a1 5a e2 6d 42 36 72 | e6 93 98 8d ab 65 9b 8b b9 2a 79 2b 2d c9 0f 1f | c1 03 48 63 1c 2b 7c f0 db 5a 0a 3e b5 46 b8 79 | 29 00 00 24 64 9e 8b 02 14 e8 a7 dc 3f 42 d2 c4 | 8f dc b3 ff fc 4c fe 98 93 e9 8f 76 eb 2b 38 f4 | b9 5a a0 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c a5 c7 ec 4b 7a cd c4 3e f0 86 6d | ec 0c 21 f9 74 06 3e 81 00 00 00 1c 00 00 40 05 | 6b d7 31 2e aa f4 5b 2c dc 79 88 ab 6c 34 fc ce | 20 91 9b 02 | libevent_free: release ptr-libevent@0x7fb36c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a63210 | #295 spent 0.364 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 ea 13 a7 2a b1 5c 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #295 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #295 | rejected packet: | 11 ea 13 a7 2a b1 5c 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #295: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348012bf0 | handling event EVENT_RETRANSMIT for parent state #322 | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #322 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #322 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49672.39428; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003566 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a63210 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #322 | libevent_malloc: new ptr-libevent@0x7fb36c01d920 size 128 "road-eastnet-nonat-70" #322: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #322) | 74 03 a5 dd ea 05 2e d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 15 d9 ac 31 7b 6c 04 ac 7a ef e5 0d 89 93 07 | 20 e4 8e 39 86 a0 9c 1e 9f 76 b9 58 4d f2 a7 9f | a9 61 82 a9 75 3f e8 1a c2 92 fe 84 37 ac 33 ad | 65 45 df 2b e1 cb 2c 07 be 4f c4 59 89 1a 1e d4 | bc 00 c9 7a da 51 f8 0e 6d e5 9b 4d 2b 1e 90 8c | a7 76 dd 60 8a 02 12 aa 75 a5 70 c1 65 7c 3e 55 | 89 46 b2 4f 06 dd f5 63 86 b7 00 f0 73 2f 7c 5a | b7 d4 0f 38 d5 4f 7a 42 58 2c 1c 6e 8d df 4f 92 | 63 c6 3f de f4 10 95 80 0d 14 e0 40 1c 6b a7 25 | 78 25 a5 d6 97 e1 6b 90 22 06 bd 2b cc f5 6b ca | 10 6b ac a7 98 1a 94 fa 4c cf 33 fe dc 06 fd b0 | 5f 81 4e 82 91 b8 3e 8a c7 a6 68 81 06 ac 84 f0 | ea 68 69 9c ad 3a 07 bc c5 f3 31 91 30 05 f3 ef | dc 51 d5 f6 ee f9 4a 07 b7 9e 0f 65 ad 3f 41 a0 | d7 70 67 24 31 3b 11 1f 99 26 08 ab a5 8d 87 97 | f5 4d 04 da a2 fb f0 9d b6 5e ca 79 ac fb e6 b9 | 29 00 00 24 7c d4 e7 e5 83 a9 e9 e5 4c 1d 37 7f | 04 0f 2a 2b 54 28 64 c4 b2 05 be 1f 1d 68 a9 5e | 6e 76 88 d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 64 8d 0f b4 d2 3e c7 db eb 6e 9c | 80 67 1d 17 67 fa eb 16 00 00 00 1c 00 00 40 05 | 45 ce 15 93 8c ec f9 76 43 65 cd e9 a3 d1 ec 83 | 45 3c 35 9c | libevent_free: release ptr-libevent@0x7fb36c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348012bf0 | #322 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 03 a5 dd ea 05 2e d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #322 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #322 | rejected packet: | 74 03 a5 dd ea 05 2e d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #322: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38000feb0 | handling event EVENT_RETRANSMIT for parent state #337 | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #337 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #337 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49672.401577; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001283 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348012bf0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #337 | libevent_malloc: new ptr-libevent@0x7fb36c04b850 size 128 "road-eastnet-nonat-85" #337: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #337) | ed 63 58 23 fd c1 76 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 96 54 84 2e e5 91 43 31 05 bf 8d 46 38 09 77 | 34 82 01 41 07 ba 77 ae 0e 58 56 59 e8 aa 03 3b | 7e fb 3d 6d 4d 59 d3 86 8a 20 2c b2 06 03 8a 41 | 33 cf 0e 06 87 87 a2 ab d5 f2 99 a7 84 cd 05 cf | ec d9 29 84 36 3e fc 29 32 e5 d2 77 7d a0 28 f8 | d1 0e 51 2f 73 28 bd 60 66 cf 7b 5c e8 76 7f ee | 0b 3f cc 47 13 a2 8f 86 8a 1d a1 57 96 4b 8e 1d | 54 09 0b 8b e7 94 12 ea 68 37 a0 5a 37 1b 43 96 | 9e 43 fb b9 f4 e3 a4 14 cb 49 50 02 95 69 45 10 | 4f 12 ab e9 0f 1f 01 01 a4 c3 ef 65 1e 2e cf e7 | 08 9d 2c 27 7f 64 fb 91 ba e9 80 4e 20 48 a7 46 | 4e 2b b0 83 ea 9c e6 04 02 2b 8c 1a 52 db c6 17 | d5 9e 92 ca bd cc 2d 80 e6 b4 24 b9 79 b6 76 9a | 0e 8f 39 57 ee 2c 0b 47 20 f0 82 f0 87 6e 0d 85 | f9 ab b8 d1 c1 07 ac ad 62 5b 5a 42 cc c5 f9 04 | de 15 7e d8 03 4b a1 c4 30 01 43 b8 8d 24 8e 44 | 29 00 00 24 47 35 e2 69 12 71 4e bf 5f ce fb f5 | 4b 5d 78 7a 40 67 4e 2b 89 1a 4f 82 42 7d 07 9d | 99 e5 3f 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 a6 ae 66 a0 2e 4a eb 14 83 41 42 | 9c b3 ed 9b 1a cc 9f 9b 00 00 00 1c 00 00 40 05 | 09 b5 68 86 30 d7 ba 9d 35 40 11 f6 5c 40 95 0a | 79 fe 98 fe | libevent_free: release ptr-libevent@0x7fb350014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000feb0 | #337 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 63 58 23 fd c1 76 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #337 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #337 | rejected packet: | ed 63 58 23 fd c1 76 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #337: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358018460 | handling event EVENT_RETRANSMIT for parent state #344 | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #344 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #344 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49672.403832; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50109 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000feb0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #344 | libevent_malloc: new ptr-libevent@0x7fb350014c70 size 128 "road-eastnet-nonat-92" #344: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #344) | 60 fe 47 d5 bc 7e ec f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 bf a8 75 45 e6 9b 9e 36 c4 f8 00 7b fa ed 16 | 45 48 19 73 f0 43 47 d5 85 f3 cd c8 97 6e 50 a8 | 7b 63 a3 ce ea 05 ae 44 e5 a2 e6 29 a8 16 bc 48 | 78 95 49 07 f7 17 ad 10 48 2e fd 23 74 21 44 c0 | b4 d3 48 b2 fb bc c3 28 df 8a d3 09 ec 63 04 28 | 7e 5a 51 87 52 03 32 ff 61 0c 39 ac c3 26 d9 35 | 88 8a 8d fe 64 9e 7c 7f c3 22 7b 8b 9e 96 8b 3d | b8 ef 81 b1 6a 3f 8a 50 49 73 5d ab 49 f3 99 5e | ad 5d e8 43 6f bd 70 02 a0 6f d4 12 c9 ee f2 55 | f1 fb cb 6e d0 ab 61 ad a4 39 c4 fa f3 3f c7 bf | 5f f1 ac db cc 36 aa 36 32 7b 50 a5 5a 12 e0 c2 | fb c0 54 26 8a e0 81 02 71 55 03 a2 11 c1 ce 2c | 62 50 df 4c eb da 5d 3d 81 bf 56 fd c4 6a 45 b3 | f3 c4 00 14 0a f0 d4 72 ad 8f 3b 97 e7 25 ea 81 | 48 23 bb ad 52 e9 90 df 74 31 fa 3e 85 2d 9b f0 | 97 f2 67 07 62 f1 e0 1b eb 9c 9b f7 2c 83 46 40 | 29 00 00 24 59 47 a1 36 35 51 2c e7 ec 59 96 c4 | c5 6a 0f fd 9f 62 7d 5e ad fa 8e 0f 35 43 8c 01 | 6a c9 a8 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 37 18 00 bf d4 a8 37 15 69 ae 4c | fc 2f e7 92 f0 22 70 f2 00 00 00 1c 00 00 40 05 | 33 e5 40 5c 05 2f 5b 7d e0 96 06 6b 07 18 0b d5 | ca 3f e3 4a | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358018460 | #344 spent 0.0964 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 60 fe 47 d5 bc 7e ec f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #344 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #344 | rejected packet: | 60 fe 47 d5 bc 7e ec f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #344: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384009ed0 | handling event EVENT_RETRANSMIT for parent state #296 | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #296 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #296 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49672.447143; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00565 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #296 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 "road-eastnet-nonat-44" #296: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #296) | 1c da 2e ac 4a 99 24 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 2a 4d fb 46 1d b7 c4 96 00 b1 66 99 7e ce 3b | 3f 48 6e 8c 76 bd 25 cd 72 f7 15 4a f9 69 ef 13 | 61 8a 19 db 25 90 81 55 08 5a cc 41 41 e5 ab d4 | 92 10 f9 d6 8d 49 ef 3f b0 9e f2 80 9b 7b 70 6e | a9 61 7d e0 84 75 fd d1 46 6c 42 61 66 ee 24 20 | 73 fa d1 4c 21 9e a9 c7 16 a9 b3 6f aa 78 ac 00 | 78 f4 c3 83 9c c4 9a 92 64 af b4 ed 81 ba ac a2 | f1 41 08 3e c1 2f b1 ba 03 49 e2 bf 7f db 95 66 | 30 1e c5 ba 28 dd ee 71 21 42 41 ca af c4 be d2 | 90 1d aa 94 fa 3e 05 ce 17 28 d8 85 00 b7 a3 6c | d2 a6 c4 12 ee 02 b6 a5 47 f5 e8 05 85 3f 07 9b | aa 0d 4f 57 c3 15 b2 47 ad f5 11 0a f7 29 da c6 | 9c 86 0c 08 6b ec 00 4d b0 6e 72 d1 b7 c3 86 c8 | 85 d9 c3 07 c3 a7 58 91 99 ee d7 82 f7 95 cb 56 | c0 48 0c 04 c6 c9 83 ce b6 aa 4e 64 f0 9f 73 46 | e9 f5 bb 10 78 a8 77 4a 7b da 32 8f 23 90 cf 6d | 29 00 00 24 ce d0 75 80 6d 1e 36 8f b6 81 e0 37 | 25 cc b5 c9 b7 8f 97 4d 1e ae eb 17 23 86 66 d2 | cc 2a b8 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 83 86 3f b2 b5 92 3c 02 7f 1a c2 | 45 4d 9a 24 f1 5a 66 8d 00 00 00 1c 00 00 40 05 | 7c cb b6 c5 ee bc 2b a0 53 bb 77 45 86 3e ca 93 | 1e 2d 97 d8 | libevent_free: release ptr-libevent@0x7fb384048950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384009ed0 | #296 spent 0.197 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aecac0 | handling event EVENT_RETRANSMIT for parent state #97 | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #97 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #97 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49672.447381; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007156 exceeds limit? YES "road-eastnet-nonat-97" #97: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-97" #97: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #349 at 0x557d46a578d0 | State DB: adding IKEv2 state #349 in UNDEFINED | pstats #349 ikev2.ike started | Message ID: init #349: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #349: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #349; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-97" #349: initiating v2 parent SA to replace #97 | using existing local IKE proposals for connection road-eastnet-nonat-97 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 349 for state #349 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb384009ed0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #349 | libevent_malloc: new ptr-libevent@0x7fb384048950 size 128 | #349 spent 0.116 milliseconds in ikev2_parent_outI1() | crypto helper 6 resuming | RESET processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 starting work-order 349 for state #349 | start processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 349 | pstats #97 ikev2.ike failed too-many-retransmits | pstats #97 ikev2.ike deleted too-many-retransmits | #97 spent 2.54 milliseconds in total | [RE]START processing: state #97 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-97" #97: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #97: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #97 "road-eastnet-nonat-97" #97: deleting IKE SA for connection 'road-eastnet-nonat-97' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-97' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-97 | State DB: deleting IKEv2 state #97 in PARENT_I1 | parent state #97: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #97 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 349 time elapsed 0.001224 seconds | libevent_free: release ptr-libevent@0x7fb3500251c0 | (#349) spent 1.23 milliseconds in crypto helper computing work-order 349: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecac0 | in statetime_stop() and could not find #97 | crypto helper 6 sending results from work-order 349 for state #349 to event queue | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #349 | libevent_malloc: new ptr-libevent@0x7fb36c04b970 size 128 | crypto helper 6 waiting (nothing to do) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c da 2e ac 4a 99 24 d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #296 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #296 | rejected packet: | 1c da 2e ac 4a 99 24 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2c 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #296: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.132 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-97 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-97" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-97' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-97" | stop processing: connection "road-eastnet-nonat-97" (in initiate_a_connection() at initiate.c:349) | spent 0.112 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x7fb360012bf0 | handling event EVENT_RETRANSMIT for parent state #323 | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #323 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #323 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49672.44918; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003246 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #323 | libevent_malloc: new ptr-libevent@0x7fb3500251c0 size 128 "road-eastnet-nonat-71" #323: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #323) | fa a0 9f 7c 98 fa b7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 46 00 d1 b1 2f ab 58 ff ae 3e e1 90 df ac 17 | ff f8 20 d8 dc c8 64 44 8b d4 4d 64 77 87 0d 12 | 4f 58 f8 0b b8 23 de 06 cb 6a 5a 17 a1 ce 9c 0e | b9 8f d4 30 b1 62 d8 df cd 4c 66 72 94 9e 12 c2 | 2d 76 67 bf af 09 84 71 96 13 7f 13 e3 92 f9 eb | 91 ae c7 77 a0 91 b1 8b 78 4e 95 7f ad 59 ce f7 | 52 f5 ff c7 0f 12 41 0b 6a 23 2d 80 44 0e 92 7c | 8a 4f 11 47 2b 77 90 68 d7 a1 52 f7 6b 79 db 3f | 94 cd 89 b0 a4 aa 7e 64 52 6b 85 6e 03 da 1f ae | b6 90 2d d1 46 19 b6 66 ea b6 57 b4 c6 78 39 27 | 7f 33 c8 a1 bd 41 e7 ba 08 ef c1 2b 83 3d 1a a5 | d6 cc ec 96 a2 e8 29 ec 44 9c 54 bc 8b 9c d6 9b | cf 36 d1 9f c7 0e 2f 28 11 0b 73 2c 8d e2 76 0d | 66 d9 63 04 c0 20 e3 d1 af b2 68 91 e0 90 8f 15 | 8a 1a f5 c8 e3 0d 24 88 9a 72 7c ad a0 47 9a cf | 87 bf fe bc 41 93 5c 36 c0 33 07 c5 9e ea fb dd | 29 00 00 24 40 e8 32 3c 23 00 84 94 61 80 b2 17 | 1c a2 13 13 eb 56 70 6b 74 c5 2e 36 50 96 1d 9e | 9b cf 84 1b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 d2 f5 ad 3c 92 ba 81 0f fc 09 27 | bf 74 8b d6 da e0 d6 64 00 00 00 1c 00 00 40 05 | e3 ba 50 e3 10 b5 c6 17 22 3f 31 51 2e fe 55 bf | 2d 04 cf 9f | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360012bf0 | #323 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa a0 9f 7c 98 fa b7 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #323 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #323 | rejected packet: | fa a0 9f 7c 98 fa b7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #323: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0985 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #349 | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 349 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #349 | **emit ISAKMP Message: | initiator cookie: | 84 94 92 07 09 8b 01 c4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-97 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e7 8e 3a 36 94 c3 d9 80 af 87 82 89 a3 71 41 9f | ikev2 g^x e6 44 09 3c bc 67 77 29 06 f4 ae 77 a3 9d 60 1d | ikev2 g^x 0a c3 1b 6a f7 b0 e9 13 94 a5 ce ce a7 52 56 d7 | ikev2 g^x 84 e9 4e d5 99 7f 7c fb f5 b7 93 ee 65 0d 15 55 | ikev2 g^x 04 2d a2 78 15 79 38 de 23 c4 7d 82 d0 7f 5f 98 | ikev2 g^x a6 33 cb b9 33 39 5b 48 a5 eb 5c 5c 81 d0 ca 8c | ikev2 g^x f1 d5 2b 41 d5 80 88 70 6d 08 d5 9e c9 be 4a d6 | ikev2 g^x 16 61 b8 6d a8 4e 60 a2 94 6c 33 db 5b 42 45 bb | ikev2 g^x 02 30 28 9a 37 b4 00 e3 81 c4 fd 79 89 1a f9 a5 | ikev2 g^x 2d 14 0f 8f c7 04 8a 63 e3 4c c8 23 59 80 dd 4f | ikev2 g^x 13 40 1c 8c 06 1f 4a 77 c9 3e 21 20 cb 58 47 cb | ikev2 g^x c0 5d 53 b2 99 fb 04 a7 a3 35 71 6b 00 88 75 8a | ikev2 g^x 99 0c dd 71 02 4e 48 62 56 32 bf a2 8c b2 87 7c | ikev2 g^x 45 a3 56 eb 30 b8 7e 62 54 0f 19 2a 8e 1f 1c bd | ikev2 g^x cc fa 91 16 33 60 18 c9 3d f1 ea d9 79 83 28 b3 | ikev2 g^x ee b8 50 9e a8 3a a5 db fe df 37 7d ce de f7 60 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8e 8f cc b6 0d fd cb ad 0f 95 32 a9 a9 4b b8 56 | IKEv2 nonce 89 46 30 eb 8f f5 1c d9 09 ec 14 75 5c 37 d2 fc | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 84 94 92 07 09 8b 01 c4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 61 | natd_hash: port= 01 f4 | natd_hash: hash= ea f1 98 2b 6b f5 c7 7c ec d8 88 00 36 4b b7 7c | natd_hash: hash= e3 5b 66 cb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ea f1 98 2b 6b f5 c7 7c ec d8 88 00 36 4b b7 7c | Notify data e3 5b 66 cb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 84 94 92 07 09 8b 01 c4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 49 36 ed 90 92 0a 38 5a 43 cd 17 7a 90 9b e6 10 | natd_hash: hash= 1f ed 97 63 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 49 36 ed 90 92 0a 38 5a 43 cd 17 7a 90 9b e6 10 | Notify data 1f ed 97 63 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #349 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #349: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #349 to 4294967295 after switching state | Message ID: IKE #349 skipping update_recv as MD is fake | Message ID: sent #349 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-97" #349: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.97:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #349) | 84 94 92 07 09 8b 01 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e7 8e 3a 36 94 c3 d9 80 af 87 82 89 a3 71 41 9f | e6 44 09 3c bc 67 77 29 06 f4 ae 77 a3 9d 60 1d | 0a c3 1b 6a f7 b0 e9 13 94 a5 ce ce a7 52 56 d7 | 84 e9 4e d5 99 7f 7c fb f5 b7 93 ee 65 0d 15 55 | 04 2d a2 78 15 79 38 de 23 c4 7d 82 d0 7f 5f 98 | a6 33 cb b9 33 39 5b 48 a5 eb 5c 5c 81 d0 ca 8c | f1 d5 2b 41 d5 80 88 70 6d 08 d5 9e c9 be 4a d6 | 16 61 b8 6d a8 4e 60 a2 94 6c 33 db 5b 42 45 bb | 02 30 28 9a 37 b4 00 e3 81 c4 fd 79 89 1a f9 a5 | 2d 14 0f 8f c7 04 8a 63 e3 4c c8 23 59 80 dd 4f | 13 40 1c 8c 06 1f 4a 77 c9 3e 21 20 cb 58 47 cb | c0 5d 53 b2 99 fb 04 a7 a3 35 71 6b 00 88 75 8a | 99 0c dd 71 02 4e 48 62 56 32 bf a2 8c b2 87 7c | 45 a3 56 eb 30 b8 7e 62 54 0f 19 2a 8e 1f 1c bd | cc fa 91 16 33 60 18 c9 3d f1 ea d9 79 83 28 b3 | ee b8 50 9e a8 3a a5 db fe df 37 7d ce de f7 60 | 29 00 00 24 8e 8f cc b6 0d fd cb ad 0f 95 32 a9 | a9 4b b8 56 89 46 30 eb 8f f5 1c d9 09 ec 14 75 | 5c 37 d2 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea f1 98 2b 6b f5 c7 7c ec d8 88 00 | 36 4b b7 7c e3 5b 66 cb 00 00 00 1c 00 00 40 05 | 49 36 ed 90 92 0a 38 5a 43 cd 17 7a 90 9b e6 10 | 1f ed 97 63 | state #349 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb384048950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb384009ed0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #349 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 | #349 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49672.450249 | resume sending helper answer for #349 suppresed complete_v2_state_transition() and stole MD | #349 spent 0.746 milliseconds in resume sending helper answer | stop processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c04b970 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 94 92 07 09 8b 01 c4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #349 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #349 | rejected packet: | 84 94 92 07 09 8b 01 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #349: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0948 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_RETRANSMIT for parent state #338 | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #338 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #338 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49672.464615; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001998 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012630 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #338 | libevent_malloc: new ptr-libevent@0x7fb36c04b970 size 128 "road-eastnet-nonat-86" #338: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #338) | 1f e2 d0 d2 e5 84 7f 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db f7 91 cd 84 5c a7 ef c5 4a 9e 2e af a2 43 ea | 45 0a b8 db c5 6e 04 46 ba a1 d5 11 76 fa 91 5a | 21 6e 50 69 5f 4c 63 af d6 32 06 ae 79 8f f8 47 | 06 f3 f5 c6 98 57 e2 e8 f9 93 2e 73 11 9e c7 4b | 81 b1 ab c3 4c 82 50 3e 95 1b 93 8d f3 f1 26 94 | 35 dc 1c 86 75 c4 0b 21 99 da cd 92 fb c9 25 d3 | a1 77 02 1c 94 1f a7 90 d7 35 62 14 3f a4 c2 e2 | 04 47 bb f7 88 43 f1 58 36 ff ad ce 6a c6 3a e5 | ca 19 27 9c c0 b7 91 62 00 c9 17 fb 82 73 f3 dc | 8a f9 f2 d0 2d 78 16 8f d3 1a df 7b 29 7f a7 d2 | 2a 1d 58 77 31 26 e6 25 fd f1 f0 ff b3 be 2a fb | 9a f2 05 45 cd 1a c0 33 3f 3e 0c b1 4a 0e 13 b1 | f3 25 ba 03 ce 1b 65 7e 16 c3 d1 62 05 e6 0b 87 | 27 59 78 26 a7 72 9c cf a5 2a c9 6c 3c 43 6b b4 | dd fc 35 a0 21 8a d9 83 8c b5 e6 a8 c9 3d 42 bd | e0 43 1a dd 83 56 78 b8 0a 0d d3 50 6d 61 d9 5c | 29 00 00 24 53 73 16 e0 68 43 e7 c2 a0 53 68 5d | 7e 07 bf 33 55 30 e6 39 bc d6 66 c9 05 5a fa 29 | b8 4f 54 b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 1b 58 be 75 e4 59 10 d1 29 a5 4a | 19 0e d4 a5 d3 bb ae eb 00 00 00 1c 00 00 40 05 | e1 23 de d4 d9 5f 17 c1 21 ba 79 77 2a ee 0e dd | 91 6b 75 70 | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | #338 spent 0.407 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f e2 d0 d2 e5 84 7f 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #338 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #338 | rejected packet: | 1f e2 d0 d2 e5 84 7f 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #338: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.209 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37802a9a0 | handling event EVENT_RETRANSMIT for parent state #297 | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #297 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #297 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49672.514429; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004208 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #297 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-45" #297: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #297) | e1 41 d2 51 2f 25 d9 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 ea 0d 0b 39 8c c1 99 18 5a a8 8a 8f 5d 3d 22 | 46 42 ee 49 5d 81 c3 87 32 80 3d 42 65 0e 28 54 | e6 12 c3 e6 03 86 ad ca e9 ea 65 ce 14 e5 73 46 | 61 07 3a 7c 00 7f 71 ec 17 17 d4 44 37 36 26 7a | 8c 65 4b 5e 2f d6 31 47 0e b3 55 90 e6 1c cb 77 | 1c 6d 58 27 57 b3 27 ff b6 e1 e9 7d 1b 10 c2 48 | 70 f7 e7 1e 31 56 ab cf ae 38 32 b8 65 81 ac 00 | 4e 9d 3a 6c 2c 1d fb a6 ff a6 c5 15 4a d1 e9 8c | f6 3b 4a 4d e5 6a 3d e0 b2 a1 f4 29 63 27 5f 0f | 08 89 9b 00 9b 1b 1f 8e 12 d3 c4 4f 3e 13 f5 a5 | 9c 44 af 0f 10 29 67 15 0d b9 b4 26 98 5d 9e 81 | d4 78 c2 73 92 2e 97 4c 48 13 99 b5 01 42 7a 4a | aa bb 3e f2 96 18 19 79 ab c3 39 3b ba ba b8 0b | 06 4a 68 91 6a ff 80 ba f0 6f 51 cd 71 94 91 9b | 14 d1 d2 23 7f bc a7 08 5b 2f eb 14 51 51 4a 55 | ca 92 da a2 1f 6e 9a 88 d0 9b 68 b4 59 e4 e6 5b | 29 00 00 24 a5 fe b0 e3 a2 f4 1f f6 10 ff b8 23 | 13 cf c1 54 86 87 d9 95 be 21 30 83 5b ee 54 e5 | 86 f0 89 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 30 e2 49 c0 1b 21 8e cb 56 2f 44 | 75 d2 75 93 97 72 cd 45 00 00 00 1c 00 00 40 05 | ed 4e b6 34 59 cc 9b 96 b2 cc cc ed 70 1c 55 bb | 38 17 6f fc | libevent_free: release ptr-libevent@0x7fb37801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | #297 spent 0.34 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 41 d2 51 2f 25 d9 71 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #297 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #297 | rejected packet: | e1 41 d2 51 2f 25 d9 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #297: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.16 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac1340 | handling event EVENT_RETRANSMIT for parent state #324 | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #324 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #324 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49672.51614; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003935 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #324 | libevent_malloc: new ptr-libevent@0x7fb37801a4e0 size 128 "road-eastnet-nonat-72" #324: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #324) | c4 71 4c 47 7a 99 7f 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c dc ba bd 1d 04 54 b8 de 2e 7e 4a 73 d1 75 b4 | 30 69 01 66 67 06 e7 5e ab 90 82 b5 8d a8 6f 99 | a6 8e f4 9a 71 40 de b0 d0 8a d9 b4 ed e4 6f 96 | 72 62 19 62 54 5d 4c 3f 06 3d 1e 94 b0 72 25 98 | 59 31 b4 12 f8 20 4c c4 1b 57 a8 cc e5 a4 fd 8e | b7 00 85 d1 0e c7 4d 3b 7a 7d 11 6d 19 fd 6a 75 | 3a e2 10 64 69 82 7f f7 9f 48 c9 57 2f a9 70 57 | 4e 17 87 f1 7b f1 ed 42 6c 69 0f 53 01 4f 76 4d | 49 de 7e 34 19 26 2c 17 55 79 6b 2b e6 70 a9 41 | 28 a8 e5 5c 9c 0b 01 88 ec 60 31 32 12 e0 5e 2a | d0 1f 1c 62 7b 27 a5 6a b5 82 73 7a c7 4d 6d 07 | a2 fe cc 3c f6 be 38 d5 e6 bc c7 f9 e4 e8 c4 66 | 25 de 6a 66 de d9 be 67 52 10 16 32 1e 81 04 70 | 2e 04 43 17 b2 33 75 6a 97 52 34 c2 f0 d7 69 62 | a8 cb 03 e7 cd 81 0c 55 75 a8 24 c4 ed 92 5e ec | 1a d4 65 0c 31 44 9a 04 50 cf 8e 45 48 fa 6a 9c | 29 00 00 24 a2 70 44 54 09 89 66 44 f1 6d a2 85 | b3 a0 4f a8 16 2e 01 ca af 0e 31 e7 7c 41 b8 c9 | 46 c7 99 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 0b 59 de ec 8b 84 8b 41 7c 2d 20 | 10 87 a7 ee 10 a7 dc 2a 00 00 00 1c 00 00 40 05 | 44 04 bc 04 96 6f cb 2b 3d a9 52 fe 2d cc 35 38 | 9a e2 35 2c | libevent_free: release ptr-libevent@0x7fb35c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac1340 | #324 spent 0.251 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 71 4c 47 7a 99 7f 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #324 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #324 | rejected packet: | c4 71 4c 47 7a 99 7f 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #324: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.1 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378012bf0 | handling event EVENT_RETRANSMIT for parent state #339 | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #339 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #339 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49672.526629; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001337 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac1340 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #339 | libevent_malloc: new ptr-libevent@0x7fb35c035930 size 128 "road-eastnet-nonat-87" #339: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #339) | a2 06 83 e6 4d cf 47 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 60 78 10 c3 0f cc 3e 4e 2e d5 96 c1 d2 76 e3 | 97 d5 35 a5 15 b5 cf 25 fc d1 a9 ed 61 00 ab d3 | f0 a5 f9 6b c8 93 25 3b e7 35 94 5b 27 e6 7c aa | 9f 99 13 73 c8 87 72 6f e3 9a d8 3f f2 60 6d 07 | e2 f2 df 74 8c d9 c0 ea 66 9b 1a f7 3a 35 11 09 | 4c 1a 77 9c 33 ec 8e 52 10 1b 5c 10 4f 88 cf e4 | ab bc 00 8a 49 0d dc 56 57 fd b9 aa 33 dc a2 d8 | 3f a7 e3 81 b2 6c 3d 05 80 c1 9e e7 22 3d 4f 4b | 69 99 65 2e db d4 42 77 f6 d5 da ca 9c 7b 37 94 | 4a 33 ff d3 90 af 06 41 1e af a8 a1 29 27 b8 4e | 94 36 29 4f 90 ae d8 40 e5 f9 f7 60 20 50 ae f6 | 19 f9 e5 ce 63 be 68 f8 75 c8 c0 44 7f 51 fc 3c | fe be 4d e9 10 ea 8c 24 89 c7 41 df 92 c0 7b 00 | f7 f4 82 ce db 65 47 b6 bb fd f3 75 44 d0 1d c4 | 34 92 d9 b1 3f bf c2 cf e2 c7 6c 0d 60 aa 7d 11 | 0e 19 00 e8 57 9d 13 5a 3b a1 80 7a d5 8d 15 4c | 29 00 00 24 1c 60 55 0f db a5 b1 e0 94 27 e9 83 | 86 bb c4 10 2a 23 35 9c a1 96 2d 6f 7e 5d c3 40 | 27 31 c9 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 61 9a 5c 09 fb 4f 1f fe 5c 80 fd | 11 ff 3a 18 d8 5f 68 01 00 00 00 1c 00 00 40 05 | f8 00 9b 14 2d 47 6c 3b ee ab c1 8e 99 04 04 19 | 24 06 94 42 | libevent_free: release ptr-libevent@0x7fb348014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378012bf0 | #339 spent 0.183 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 06 83 e6 4d cf 47 f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #339 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #339 | rejected packet: | a2 06 83 e6 4d cf 47 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #339: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.102 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c018460 | handling event EVENT_RETRANSMIT for parent state #345 | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #345 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #345 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49672.528087; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501238 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #345 | libevent_malloc: new ptr-libevent@0x7fb348014c70 size 128 "road-eastnet-nonat-93" #345: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #345) | cc 1b db ff 37 55 f7 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 67 e9 25 ad 99 4c 76 71 a1 a8 5d 6b de 51 32 | eb 5c 8d 84 1c 3d 17 6c c1 5f 62 71 5b 44 16 fb | e4 d2 85 4c 64 49 cc e5 df 14 a2 74 3d 7a c6 c8 | 61 7c 32 bd 88 6d 99 62 9c 43 b2 d1 2b 52 46 39 | c0 c1 fe 0b d3 8c b7 41 43 fa 07 e4 ca 66 08 b9 | e3 73 79 86 ee fe 88 31 4e 3f 00 50 43 af ba 2c | 0f 81 55 13 ff ba 58 17 5f 8e c8 12 2b 5c fa c6 | ef 92 c1 91 f7 d8 64 09 28 37 f9 29 29 da 06 11 | 98 a0 90 28 27 02 35 70 61 dc cd b3 af 6b a5 cc | 33 40 2b 71 fe b4 6e 27 bc 87 0b 2e 49 cd 22 6a | fe 62 e7 dd 24 a7 1f 41 fb 60 e1 86 0c 80 50 0b | a0 a0 c9 f7 8f 75 a4 e1 64 72 0c 28 9b b9 6c ed | 86 a3 26 05 ab b4 ae 03 ec cc ce 40 59 4c 63 89 | f5 0c b7 8c 77 de 51 59 14 48 7e 85 50 2b 34 5c | b7 79 6c 71 db 1b 6c 37 06 89 c8 05 98 a4 3e 07 | 39 20 3f 60 a2 a7 3c 0b 2f 8f 18 e7 35 c0 2b f1 | 29 00 00 24 20 33 be 81 19 1f 5e fe 6d 68 36 2c | 95 1b cf 17 03 6e cb aa fd 3d 3c 1f 01 7c 3e 25 | c7 e0 c9 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 24 83 28 6d 9e 08 a8 13 dd 36 c1 | 4e 58 4a c0 e0 a3 35 28 00 00 00 1c 00 00 40 05 | 65 c0 95 0a 9d 33 80 de 00 4a d8 7a 37 18 f6 5b | 66 48 2b 46 | libevent_free: release ptr-libevent@0x7fb3680251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c018460 | #345 spent 0.19 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 1b db ff 37 55 f7 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #345 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #345 | rejected packet: | cc 1b db ff 37 55 f7 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #345: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.108 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #98 | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #98 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #98 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49672.532528; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008411 exceeds limit? YES "road-eastnet-nonat-98" #98: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-98" #98: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #350 at 0x557d46a58e90 | State DB: adding IKEv2 state #350 in UNDEFINED | pstats #350 ikev2.ike started | Message ID: init #350: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #350: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #350; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-98" #350: initiating v2 parent SA to replace #98 | using existing local IKE proposals for connection road-eastnet-nonat-98 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 350 for state #350 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c018460 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #350 | libevent_malloc: new ptr-libevent@0x7fb3680251c0 size 128 | #350 spent 0.0834 milliseconds in ikev2_parent_outI1() | RESET processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #98 ikev2.ike failed too-many-retransmits | pstats #98 ikev2.ike deleted too-many-retransmits | #98 spent 2.59 milliseconds in total | [RE]START processing: state #98 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-98" #98: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #98: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #98 "road-eastnet-nonat-98" #98: deleting IKE SA for connection 'road-eastnet-nonat-98' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-98' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 11 resuming | crypto helper 11 starting work-order 350 for state #350 | in connection_discard for connection road-eastnet-nonat-98 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 350 | State DB: deleting IKEv2 state #98 in PARENT_I1 | parent state #98: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 350 time elapsed 0.000793 seconds | (#350) spent 0.796 milliseconds in crypto helper computing work-order 350: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 350 for state #350 to event queue | scheduling resume sending helper answer for #350 | libevent_malloc: new ptr-libevent@0x7fb36001fd50 size 128 | crypto helper 11 waiting (nothing to do) | stop processing: state #98 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | in statetime_stop() and could not find #98 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-98 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-98" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-98' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-98" | stop processing: connection "road-eastnet-nonat-98" (in initiate_a_connection() at initiate.c:349) | spent 0.0647 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #350 | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 350 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #350 | **emit ISAKMP Message: | initiator cookie: | 40 3f 8a 6a 3f ea 6b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-98 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ee ea 5c 1b 2d cc 1b 57 9c 51 33 ce c2 ed 39 3b | ikev2 g^x d5 b7 1c c2 6d 3d 6f 5f ba 5c 85 39 fb a1 11 1d | ikev2 g^x ec 11 21 bd c2 b6 25 81 4a 85 2d 0f 85 73 9e fb | ikev2 g^x a1 4c 57 38 85 7e 31 44 0a 93 0c da 6d f0 93 22 | ikev2 g^x ea f6 8a 91 67 64 50 56 68 c0 c2 6d f2 4b e0 19 | ikev2 g^x 4b 14 40 46 ec 4d e3 7d d1 0f 0b 72 f6 ab 45 80 | ikev2 g^x 03 a2 d3 a8 ff e3 ae 4e 7b 0a 5c 1e da 4a b5 ed | ikev2 g^x 95 94 b9 4b 3c c2 85 4e cd 4a 91 b6 1f 72 c1 aa | ikev2 g^x c6 85 8f ca 28 3b ab 17 e7 f1 83 c4 ae 08 27 14 | ikev2 g^x 18 32 e7 a1 65 f1 da e5 f8 9c a1 45 4b c6 41 38 | ikev2 g^x 3d f5 8c c5 56 e5 06 ff b3 a3 fd f2 89 c2 8c 0e | ikev2 g^x 41 65 f9 6f e4 16 5e 64 06 38 6c 0e 32 c8 d5 26 | ikev2 g^x 50 db 25 f3 e4 e0 37 8b 04 62 7e a1 89 aa 8e 24 | ikev2 g^x 47 48 9e 92 05 5e 29 4c b7 2e ed e9 6d 8a 54 a2 | ikev2 g^x 85 8b e4 f5 76 e6 c8 0e c4 53 cb 98 41 4b 77 41 | ikev2 g^x 74 9f 3a d4 11 79 37 50 cf fb e2 04 ed 15 0c fe | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 03 ee f5 21 ef 32 aa b5 bd 88 40 59 47 cc 90 0f | IKEv2 nonce 4b 5f 82 19 9f 96 a8 bf f3 8c 9d 85 66 d4 51 87 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 40 3f 8a 6a 3f ea 6b cb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 62 | natd_hash: port= 01 f4 | natd_hash: hash= 26 b2 cf 38 e9 ab 0b d5 10 0e c3 6c 99 ae 6e 40 | natd_hash: hash= 7a a8 97 3d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 26 b2 cf 38 e9 ab 0b d5 10 0e c3 6c 99 ae 6e 40 | Notify data 7a a8 97 3d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 40 3f 8a 6a 3f ea 6b cb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f6 5d 8e f9 dd 59 4b 5a 6d 88 5a 23 64 29 55 dd | natd_hash: hash= f6 46 db 31 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f6 5d 8e f9 dd 59 4b 5a 6d 88 5a 23 64 29 55 dd | Notify data f6 46 db 31 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #350 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #350: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #350 to 4294967295 after switching state | Message ID: IKE #350 skipping update_recv as MD is fake | Message ID: sent #350 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-98" #350: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.98:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #350) | 40 3f 8a 6a 3f ea 6b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee ea 5c 1b 2d cc 1b 57 9c 51 33 ce c2 ed 39 3b | d5 b7 1c c2 6d 3d 6f 5f ba 5c 85 39 fb a1 11 1d | ec 11 21 bd c2 b6 25 81 4a 85 2d 0f 85 73 9e fb | a1 4c 57 38 85 7e 31 44 0a 93 0c da 6d f0 93 22 | ea f6 8a 91 67 64 50 56 68 c0 c2 6d f2 4b e0 19 | 4b 14 40 46 ec 4d e3 7d d1 0f 0b 72 f6 ab 45 80 | 03 a2 d3 a8 ff e3 ae 4e 7b 0a 5c 1e da 4a b5 ed | 95 94 b9 4b 3c c2 85 4e cd 4a 91 b6 1f 72 c1 aa | c6 85 8f ca 28 3b ab 17 e7 f1 83 c4 ae 08 27 14 | 18 32 e7 a1 65 f1 da e5 f8 9c a1 45 4b c6 41 38 | 3d f5 8c c5 56 e5 06 ff b3 a3 fd f2 89 c2 8c 0e | 41 65 f9 6f e4 16 5e 64 06 38 6c 0e 32 c8 d5 26 | 50 db 25 f3 e4 e0 37 8b 04 62 7e a1 89 aa 8e 24 | 47 48 9e 92 05 5e 29 4c b7 2e ed e9 6d 8a 54 a2 | 85 8b e4 f5 76 e6 c8 0e c4 53 cb 98 41 4b 77 41 | 74 9f 3a d4 11 79 37 50 cf fb e2 04 ed 15 0c fe | 29 00 00 24 03 ee f5 21 ef 32 aa b5 bd 88 40 59 | 47 cc 90 0f 4b 5f 82 19 9f 96 a8 bf f3 8c 9d 85 | 66 d4 51 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 b2 cf 38 e9 ab 0b d5 10 0e c3 6c | 99 ae 6e 40 7a a8 97 3d 00 00 00 1c 00 00 40 05 | f6 5d 8e f9 dd 59 4b 5a 6d 88 5a 23 64 29 55 dd | f6 46 db 31 | state #350 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3680251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c018460 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #350 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 | #350 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49672.533987 | resume sending helper answer for #350 suppresed complete_v2_state_transition() and stole MD | #350 spent 0.379 milliseconds in resume sending helper answer | stop processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36001fd50 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 40 3f 8a 6a 3f ea 6b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #350 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #350 | rejected packet: | 40 3f 8a 6a 3f ea 6b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 62 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #350: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0555 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #254 | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #254 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #254 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49672.542197; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004982 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #254 | libevent_malloc: new ptr-libevent@0x7fb36001fd50 size 128 "road-eastnet-nonat-2" #254: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #254) | b9 c6 03 da 3d 1b ba 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca 92 e7 94 15 6c 86 1d 96 e8 8f 04 2b 4c 31 1c | f2 c3 f1 85 7b fe b5 54 f7 1b c1 2a 4c 6d 01 5c | 34 19 7c 9d d1 b6 95 21 d0 08 d9 67 bb dc e0 e1 | 38 6b 59 b4 76 fc 39 ee a0 2d f2 f5 62 c4 0a 49 | 6b 3c f0 00 22 80 8c 1c 36 99 55 b9 ef cb 76 99 | 5c 12 4c 07 84 ad f5 48 ab 42 10 f5 2e d6 e5 5c | 9d d4 b0 9f 16 b4 b4 bb b3 53 f3 e9 cc 93 ad 3b | a8 c4 f0 7f 9d 9d e3 f4 df 44 9c 28 b2 72 cb b6 | 4b 6a f0 9c 2e 22 ce 4f d0 b2 c9 a3 7c 48 1e 03 | a8 3d 92 67 11 0c a8 c0 fd 76 08 be 4f 01 6d 12 | 3e 0b 87 da bc 3d 45 99 0f 30 cb 9d 8c 96 4d 32 | 07 37 42 c8 ca 8d d9 f2 2b 81 33 b1 a2 49 5c 82 | 69 0d 94 76 f5 ef d0 bf fa db a3 8e db 15 f4 34 | c3 81 4c 6a 47 45 9d c9 09 00 1e 8a 46 70 b4 51 | 30 c0 17 29 a6 05 17 9f 61 e3 d5 9e b5 26 aa b7 | f8 4d 8f 98 15 36 79 53 4c 2f e1 9e 49 63 a8 23 | 29 00 00 24 b7 98 fa 02 fe fe ce ce 94 a2 bc d0 | 60 0d 7b 30 0c f7 48 0b 72 92 ee ec 3d 65 36 1c | 6e c0 df 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3a c0 39 9e 3d 58 28 13 41 2f 06 c7 | b4 3e d7 c2 8d 41 7c 7d 00 00 00 1c 00 00 40 05 | 08 0f dc c4 71 f2 0f bc 45 99 87 81 91 93 b1 3d | 30 5f 17 8f | libevent_free: release ptr-libevent@0x7fb34c00f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #254 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 c6 03 da 3d 1b ba 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #254 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #254 | rejected packet: | b9 c6 03 da 3d 1b ba 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #254: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0732 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b07dc0 | handling event EVENT_RETRANSMIT for parent state #325 | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #325 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #325 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49672.58459; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002183 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #325 | libevent_malloc: new ptr-libevent@0x7fb34c00f1a0 size 128 "road-eastnet-nonat-73" #325: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #325) | cc 62 92 c7 07 e9 0f 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 78 1e 62 84 10 5f b3 3f 6a 1c 99 15 ef b2 82 | ab 2f bf af 7d 91 0a 7a 06 0b c3 b0 8f 52 23 e0 | 2a 6c c7 c4 de c8 66 7c 42 9d 81 5e 4d 92 4f 0b | 2b a2 91 3c a6 4c 27 12 5d 3b 8e 56 27 02 38 a0 | d6 c6 eb ec 94 e3 d3 7c 60 71 44 03 de ee 1c 20 | b0 a7 fc d5 f0 33 3d 58 40 9a 40 7c 4b ef 22 f2 | e4 98 7c df 9e 84 f0 00 c2 3a 23 ca 54 c0 d4 32 | 78 ec 09 e7 04 f1 06 b2 16 5d 5c 32 c7 62 b8 41 | 9e c8 62 f4 94 dc ed 85 b6 72 ee e7 73 a0 4e 8f | 20 26 e2 05 be 3a 4e 16 75 b9 60 31 64 9c 09 14 | ad be c7 c8 b5 48 83 aa 5c 33 7b 3c 0a 72 26 74 | 75 7b 8e 60 49 df aa 10 6d 2e c8 c2 08 b3 b5 75 | e0 b2 66 ad ea 56 f8 5f 65 d4 40 09 52 2c f1 dd | 08 91 8c 9a aa bf 76 e2 bf e4 1a 3b 53 96 c1 d8 | e5 63 67 aa b1 58 7e 5f 20 cf 8d 72 df da b4 0e | bf a9 5c cc d8 b0 81 7f 8f b4 f2 bf dd 09 8c 23 | 29 00 00 24 bd d5 db 94 ee 32 26 3b fc 5c d2 c6 | e1 33 da da 8c 36 b9 7d d8 b6 53 e3 83 8c 71 5a | ae 9b 26 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 04 08 e6 80 0c ed de 4c 99 bb 24 | eb 89 b5 9f d3 24 a6 8a 00 00 00 1c 00 00 40 05 | 55 23 78 6b d1 b2 f4 84 29 a3 9f e9 4d 04 41 1c | 82 df 78 f0 | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b07dc0 | #325 spent 0.178 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 62 92 c7 07 e9 0f 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #325 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #325 | rejected packet: | cc 62 92 c7 07 e9 0f 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #325: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35800cc10 | handling event EVENT_RETRANSMIT for parent state #340 | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #340 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #340 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49672.595922; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002023 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #340 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 "road-eastnet-nonat-88" #340: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #340) | 06 b4 2a d6 65 92 42 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 29 a3 64 49 07 ee 29 df 38 b6 8e cf 9e 1e 2e | b5 cf 5c 9d df 90 0b 24 c7 00 d1 e9 e7 d5 9f 86 | b0 59 b0 c3 a3 da d8 a1 12 f7 d8 f8 0e b3 79 c6 | 53 3d ef a8 ea 62 cb cf 67 47 98 25 86 4a be 53 | 9d 43 a7 c0 c8 ef 24 bd 84 89 4d 1e d4 43 4c 6d | a9 e8 b8 a2 ac 6e 98 24 1f 18 dc ca 27 cf d8 28 | a6 29 25 bd 63 2f 94 ef bf ef cd 28 af b3 c4 14 | c2 24 5c 8a a7 98 ce 81 da e6 36 b6 6f 19 b3 9c | 61 e9 12 2d 81 4f 37 09 f9 11 51 0b 0a 15 3c 25 | dc 56 9d bc 1a 37 30 79 ad 58 f9 75 6f 1b 9e ed | af 69 6e f2 46 86 c0 e7 9c f5 ce 51 f7 2f 69 1c | c5 ca c9 df 4e 7a 80 a9 78 c1 72 af 2f 09 7a f4 | 7b e9 80 c9 52 10 9d 4e 28 29 82 d9 cd 16 a6 20 | 67 0a 26 62 77 51 4a e8 62 40 48 56 bb c1 3c 45 | c4 fb 9d d0 c4 57 ec 56 11 1b 76 f9 cd ac 15 3f | 9b 2c e1 a4 49 9f 96 e5 41 42 75 44 0c a4 b4 45 | 29 00 00 24 ae e0 e3 5e aa a2 ee b4 ba fd 41 25 | ff 71 9d 02 44 71 da b9 6c 12 19 98 91 a3 35 04 | b4 f3 15 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 9b ba f5 3a f3 63 5f fe ea b4 e7 | 7e cf 7e 1a ac 8a 91 ce 00 00 00 1c 00 00 40 05 | 7a 1b 4b 67 34 a5 a3 ba cf 0b c3 8e 76 85 1a 07 | b5 81 41 18 | libevent_free: release ptr-libevent@0x7fb35804ba00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800cc10 | #340 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 b4 2a d6 65 92 42 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #340 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #340 | rejected packet: | 06 b4 2a d6 65 92 42 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #340: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0962 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b09380 | handling event EVENT_RETRANSMIT for parent state #298 | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #298 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #298 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49672.601741; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004109 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #298 | libevent_malloc: new ptr-libevent@0x7fb35804ba00 size 128 "road-eastnet-nonat-46" #298: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #298) | d5 0c ec bc d3 64 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 43 96 23 e5 3a d0 2d 36 cd 43 2d 58 c4 e0 92 a1 | ed 2d e1 4c 45 8b 42 ad 40 76 ab 67 60 92 c4 09 | 73 c4 c7 3c 9d 80 31 b9 bf b9 9e 64 35 e4 39 ba | 2f a8 59 fe 53 09 d8 e0 e9 88 59 30 e2 71 e6 be | 2d 69 bc 6a a7 6e 4f db 2a 6a 88 01 9f d2 1a 54 | 9b 70 8c b4 c5 37 d0 1b eb c3 58 21 ce 79 a3 ff | 4e 1b 84 aa 1e 08 dd 9d 9d 58 7a ba b0 dd 2d 38 | 9e da 29 29 b5 fb 28 78 05 fa 3a 26 c0 d3 4c cf | 22 22 af c7 f1 d8 11 18 01 e3 41 10 fc 1b c9 38 | 58 6b be 13 fa e2 38 5b 8d 00 15 50 84 fd a8 e0 | 20 22 31 ab 99 61 d4 85 a8 6c 2e d8 1f e4 26 c0 | 25 17 38 c7 a5 82 30 0d e2 85 f0 d0 e0 3a 59 87 | 67 7b 0d e4 52 7b 6c 35 93 c6 f4 61 2c 32 e9 62 | b8 57 d1 59 0b 7c af 14 d1 9d bb 91 61 85 75 09 | ed c6 43 19 bf 09 f8 e4 92 e6 1f f3 47 e1 6e 0a | 5a 69 40 30 db b0 00 24 c2 61 94 a9 30 49 e7 0e | 29 00 00 24 4c 0e e1 06 42 9e 4c 74 3b 65 ba d4 | bc 56 1a 69 be b4 c7 ec 29 68 0f 7e 31 97 81 70 | 75 a5 f0 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 96 a5 ca 09 14 9d 81 34 51 5c 38 | 06 b0 7e 03 d4 af 12 47 00 00 00 1c 00 00 40 05 | 1b 14 fa aa 2e 1c b4 a7 92 80 67 79 37 9e 5c 02 | 1f 84 46 7d | libevent_free: release ptr-libevent@0x7fb37800f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b09380 | #298 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 0c ec bc d3 64 84 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #298 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #298 | rejected packet: | d5 0c ec bc d3 64 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #298: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0678 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47ed0 | handling event EVENT_RETRANSMIT for parent state #99 | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #99 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #99 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49672.628134; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008305 exceeds limit? YES "road-eastnet-nonat-99" #99: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-99" #99: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #351 at 0x557d46a5a450 | State DB: adding IKEv2 state #351 in UNDEFINED | pstats #351 ikev2.ike started | Message ID: init #351: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #351: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #351; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-99" #351: initiating v2 parent SA to replace #99 | using existing local IKE proposals for connection road-eastnet-nonat-99 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 351 for state #351 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b09380 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #351 | libevent_malloc: new ptr-libevent@0x7fb37800f1a0 size 128 | crypto helper 16 resuming | #351 spent 0.0723 milliseconds in ikev2_parent_outI1() | crypto helper 16 starting work-order 351 for state #351 | RESET processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 351 | start processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #99 ikev2.ike failed too-many-retransmits | pstats #99 ikev2.ike deleted too-many-retransmits | #99 spent 2.62 milliseconds in total | [RE]START processing: state #99 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-99" #99: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #99: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #99 "road-eastnet-nonat-99" #99: deleting IKE SA for connection 'road-eastnet-nonat-99' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-99' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-99 | State DB: deleting IKEv2 state #99 in PARENT_I1 | parent state #99: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #99 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 351 time elapsed 0.000589 seconds | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47ed0 | in statetime_stop() and could not find #99 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#351) spent 0.599 milliseconds in crypto helper computing work-order 351: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 351 for state #351 to event queue | scheduling resume sending helper answer for #351 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7fb36401e1e0 size 128 Initiating connection road-eastnet-nonat-99 which received a Delete/Notify but must remain up per local policy | crypto helper 16 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-99" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-99' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-99" | stop processing: connection "road-eastnet-nonat-99" (in initiate_a_connection() at initiate.c:349) | spent 0.0796 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #351 | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 351 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #351 | **emit ISAKMP Message: | initiator cookie: | de 65 5f af ec 9c 14 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-99 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 60 61 44 ff 3b 7e 79 78 30 98 a5 1d ec cd 39 0f | ikev2 g^x a6 1b 66 bf d1 4c f4 43 49 5b 37 74 a3 cb a8 c4 | ikev2 g^x 02 cd b2 04 1f 9b 50 46 08 d0 17 33 f5 19 85 e1 | ikev2 g^x a2 5a 8d ef 3b 1f 98 53 d1 3d 4a 2f ac 4f 19 d0 | ikev2 g^x 75 e8 7a 46 60 ff e1 45 61 55 45 47 1e ee 0e a7 | ikev2 g^x 97 fc 88 fd 13 ff 6e 23 a4 a1 77 61 b8 b4 8c fd | ikev2 g^x 22 67 ad f7 22 ca bf 94 41 28 f0 31 09 ce da 26 | ikev2 g^x 10 fa 8e 66 f4 04 b3 cf 07 07 c2 53 27 d6 cc 39 | ikev2 g^x 2e fc 33 61 76 a3 a9 c9 4a 2e 0c b9 d2 ce 1e 75 | ikev2 g^x 25 69 23 a7 b0 58 cb 85 2c 74 fd 6d 3e 51 8a ff | ikev2 g^x 12 ff 22 b0 95 e5 25 84 fd 26 ce 3e 10 f5 db d4 | ikev2 g^x fe ab 71 45 0f 50 b9 5c e4 ab 89 ce f3 bc f0 b4 | ikev2 g^x b1 6f 9b 78 15 e0 b4 c0 f6 ed 55 2b 17 d3 9e 21 | ikev2 g^x ed d2 5e 21 58 74 e4 d8 96 cd 20 e3 10 b4 fa 8b | ikev2 g^x 7f 1f 1a 01 c5 db 60 d3 81 25 a3 55 50 d2 42 6d | ikev2 g^x 88 7f 5d 84 22 e5 ff 47 18 aa ac 46 b6 f6 e6 e3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5e 0c 91 cb 9e cc c4 3b ec b3 88 06 52 11 4c 47 | IKEv2 nonce a6 59 04 4b 44 ce c4 33 03 72 36 ef b1 45 a0 90 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= de 65 5f af ec 9c 14 fd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 63 | natd_hash: port= 01 f4 | natd_hash: hash= 94 90 e3 e4 9d 06 64 22 91 ff 91 cd 3f cb ba 24 | natd_hash: hash= 72 7e a3 02 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 94 90 e3 e4 9d 06 64 22 91 ff 91 cd 3f cb ba 24 | Notify data 72 7e a3 02 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= de 65 5f af ec 9c 14 fd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 98 60 2c ab 59 ec de c3 24 7f bd 6f 4e 02 75 9a | natd_hash: hash= 41 d6 b1 3b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 98 60 2c ab 59 ec de c3 24 7f bd 6f 4e 02 75 9a | Notify data 41 d6 b1 3b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #351 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #351: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #351 to 4294967295 after switching state | Message ID: IKE #351 skipping update_recv as MD is fake | Message ID: sent #351 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-99" #351: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.99:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #351) | de 65 5f af ec 9c 14 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 61 44 ff 3b 7e 79 78 30 98 a5 1d ec cd 39 0f | a6 1b 66 bf d1 4c f4 43 49 5b 37 74 a3 cb a8 c4 | 02 cd b2 04 1f 9b 50 46 08 d0 17 33 f5 19 85 e1 | a2 5a 8d ef 3b 1f 98 53 d1 3d 4a 2f ac 4f 19 d0 | 75 e8 7a 46 60 ff e1 45 61 55 45 47 1e ee 0e a7 | 97 fc 88 fd 13 ff 6e 23 a4 a1 77 61 b8 b4 8c fd | 22 67 ad f7 22 ca bf 94 41 28 f0 31 09 ce da 26 | 10 fa 8e 66 f4 04 b3 cf 07 07 c2 53 27 d6 cc 39 | 2e fc 33 61 76 a3 a9 c9 4a 2e 0c b9 d2 ce 1e 75 | 25 69 23 a7 b0 58 cb 85 2c 74 fd 6d 3e 51 8a ff | 12 ff 22 b0 95 e5 25 84 fd 26 ce 3e 10 f5 db d4 | fe ab 71 45 0f 50 b9 5c e4 ab 89 ce f3 bc f0 b4 | b1 6f 9b 78 15 e0 b4 c0 f6 ed 55 2b 17 d3 9e 21 | ed d2 5e 21 58 74 e4 d8 96 cd 20 e3 10 b4 fa 8b | 7f 1f 1a 01 c5 db 60 d3 81 25 a3 55 50 d2 42 6d | 88 7f 5d 84 22 e5 ff 47 18 aa ac 46 b6 f6 e6 e3 | 29 00 00 24 5e 0c 91 cb 9e cc c4 3b ec b3 88 06 | 52 11 4c 47 a6 59 04 4b 44 ce c4 33 03 72 36 ef | b1 45 a0 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 90 e3 e4 9d 06 64 22 91 ff 91 cd | 3f cb ba 24 72 7e a3 02 00 00 00 1c 00 00 40 05 | 98 60 2c ab 59 ec de c3 24 7f bd 6f 4e 02 75 9a | 41 d6 b1 3b | state #351 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37800f1a0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b09380 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #351 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 | #351 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49672.629481 | resume sending helper answer for #351 suppresed complete_v2_state_transition() and stole MD | #351 spent 0.475 milliseconds in resume sending helper answer | stop processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36401e1e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 65 5f af ec 9c 14 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #351 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #351 | rejected packet: | de 65 5f af ec 9c 14 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #351: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1ae40 | handling event EVENT_RETRANSMIT for parent state #346 | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #346 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #346 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49672.6357; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500474 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #346 | libevent_malloc: new ptr-libevent@0x7fb36401e1e0 size 128 "road-eastnet-nonat-94" #346: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #346) | 5b 73 99 01 85 6b a6 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 41 a4 66 03 78 2f 0c ac 28 0c 6f a0 f5 98 a8 | ad fe 06 fd 8c a4 d4 c6 03 17 f9 3c ee f7 59 ef | a4 19 f6 d6 98 a9 45 18 c4 fa 1a 04 5e 12 ad 25 | a2 eb 73 ff 50 f7 5b d9 ac 0d a3 60 63 86 dc 11 | 24 c2 5c cb 2a 8c 8f dd 11 7a 54 9c db e5 07 72 | 1d 04 b8 06 80 b0 2c 7d 70 61 0f 2e ec 51 90 ed | 50 75 e9 44 ba 97 aa c3 93 f0 e7 8e a0 59 5a ef | f5 79 47 07 02 c6 5c 62 a1 be 60 af ef 55 0d f9 | 00 ac 18 13 2d 62 0e 5a 5f 40 32 8a 49 30 5f 84 | 37 da 16 c6 63 1e a6 4e a5 65 94 59 c6 7a b2 c5 | 75 c7 8f 68 de d4 77 8e 92 40 c9 5c ee b4 80 ea | 42 78 86 4f 14 c5 47 55 13 d1 41 8b fd ef 2c 61 | b8 ff 39 92 97 ea a2 69 91 9d 1f f6 fd bd a6 d6 | 98 cc 57 23 b2 ed be c2 71 55 a4 d5 18 54 fe df | 4d ab de e9 5b 44 57 81 1d 33 6c d4 fe 06 43 32 | b0 07 7c ba 8d 9c bd 13 85 9c b0 70 80 5b 02 74 | 29 00 00 24 86 39 a6 9d e4 88 31 1e 1a 48 0c df | 5d 51 c2 7f eb 35 e1 75 45 71 5e 9b 45 ec 98 56 | 3e 47 8a 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 d4 6c 5c e3 02 f1 ae 0d a6 ae 25 | 4a 2c de d9 71 00 3f 70 00 00 00 1c 00 00 40 05 | 9a e2 a2 47 57 d0 42 27 78 4a 19 6f 7e 1c 29 7f | 7a 88 26 9b | libevent_free: release ptr-libevent@0x7fb3680407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1ae40 | #346 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5b 73 99 01 85 6b a6 c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #346 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #346 | rejected packet: | 5b 73 99 01 85 6b a6 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #346: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388015720 | handling event EVENT_RETRANSMIT for parent state #326 | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #326 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #326 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49672.652979; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003176 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1ae40 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #326 | libevent_malloc: new ptr-libevent@0x7fb3680407f0 size 128 "road-eastnet-nonat-74" #326: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #326) | 42 f4 17 bf 0b bc 36 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 f1 42 33 74 d0 fe 82 a0 d4 22 fd 7e 34 64 49 | 4d f5 d3 8f 3e 37 b5 af 12 9f 05 ef b3 72 9a 99 | 78 df 2d 2f c1 8c de 77 86 8e 9d 6b 67 d9 af af | ad cd b2 74 66 27 67 e3 45 6f da e1 b8 1d 10 12 | aa 54 5a 52 9a fc e0 30 8f 8b 79 31 12 59 11 92 | 5a a1 07 c2 c4 b1 d0 f4 f9 0f 04 f7 fe f9 b1 b9 | c8 5b 99 45 a3 87 06 f5 cc 08 82 18 bb f1 79 c6 | 9f 6d fc 2f c8 a5 4a bb b2 a8 2f 54 59 10 ab c2 | 83 cd 07 a2 e9 49 2a 19 10 9b b3 c3 b9 59 af 8a | 82 ad ef ed 34 d0 18 f1 8e 6d d9 f9 1b 1e 64 1d | ec 20 a9 3c a9 39 c4 6f 5c 5b 8b c5 2f aa 09 df | 17 b3 bf d7 16 36 cf cd 3e 0b 96 b5 5a 10 91 84 | f4 f3 63 75 93 27 25 04 41 5d c2 9e 4a 8a 6e e8 | b0 1c 23 7f 1d 44 0d 90 e6 7c 9c aa 0e b4 1e 03 | 9a ca 50 45 b0 6c ee 84 fe cf 35 d4 8b f6 71 45 | c0 43 28 23 ec 38 bc a8 e6 b5 85 28 d9 a1 fe 85 | 29 00 00 24 f7 60 f4 89 79 23 81 74 40 fe e0 94 | 99 4a 8a 5f b0 ba 18 0a 74 b7 e9 e4 4c 15 74 6f | 38 fd 32 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 0a 23 00 01 aa ce 92 9c 9e 81 0a | b1 b8 dc a9 c7 b7 f1 4a 00 00 00 1c 00 00 40 05 | 06 aa ce 4d 77 27 34 16 db f8 8e b3 38 da ae 93 | 3f 43 ba fe | libevent_free: release ptr-libevent@0x7fb3600407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388015720 | #326 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 f4 17 bf 0b bc 36 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #326 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #326 | rejected packet: | 42 f4 17 bf 0b bc 36 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #326: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0245 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a25d10 | handling event EVENT_RETRANSMIT for parent state #341 | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #341 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #341 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49672.657254; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000834 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388015720 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #341 | libevent_malloc: new ptr-libevent@0x7fb3600407f0 size 128 "road-eastnet-nonat-89" #341: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #341) | 49 c3 42 79 ad a4 02 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 28 2b 3a 23 5f 9c 41 a8 c4 b1 54 27 b8 a0 a8 | a4 06 9f e8 bd 51 0b 54 b6 c3 33 24 5b b7 ea 09 | 0f d7 aa 52 2f c6 c6 78 f1 af 48 22 da 41 1f 06 | 45 43 46 fc b0 c6 2f 1b c2 df 83 35 32 87 c5 a5 | b2 fd 30 3e 95 a2 12 80 00 0f 09 dd 41 c2 48 21 | 60 8b 18 12 e2 f7 cf 1e de 64 8d 80 92 30 17 55 | ad 93 96 5a 50 26 d3 cf d9 c9 40 82 d0 c1 d7 8c | 1b c3 86 4b 02 cc 46 e2 fc 73 8a b5 ae 23 f0 12 | e2 a2 8c 5d c9 4d fa 9f 2b e7 d4 9f 15 6e 8f 91 | 94 64 45 c0 fe f3 80 9a 4c e2 d7 66 20 dd 41 dc | 6b 9b c8 3f df d1 ab 15 c5 36 9b b6 cb 01 6b 62 | c9 d1 d0 ae bf 44 a3 4d 59 dd 52 35 90 0f 89 8a | f2 c1 bf c6 f6 a5 a8 2e c6 a8 d7 de 94 ea f6 00 | 11 3a e4 a5 1c cc 19 f4 1b 95 ff 82 80 6f 79 ae | 97 c0 6f ca 24 fa 61 b5 2e 87 00 ef d7 62 ce 06 | 06 5f 50 40 c4 2f 8b 3a fb 06 a7 11 50 8a 1f ce | 29 00 00 24 b0 2a b8 49 b5 4b c9 98 47 c3 4a b6 | 54 a6 a4 dc f8 8a 35 db 6a e0 ae b8 2b 87 41 53 | a2 41 a5 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e a8 6f b4 ec 17 85 04 80 69 75 d9 | db 5a 4e 4f c9 9c a6 7b 00 00 00 1c 00 00 40 05 | 47 20 cd 59 bf 11 9f 21 41 41 cd 45 1c bb 06 ab | 5f ca 38 7e | libevent_free: release ptr-libevent@0x7fb37c014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a25d10 | #341 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 c3 42 79 ad a4 02 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #341 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #341 | rejected packet: | 49 c3 42 79 ad a4 02 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #341: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0219 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd40 | handling event EVENT_RETRANSMIT for parent state #299 | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #299 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #299 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49672.669563; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003157 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a25d10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #299 | libevent_malloc: new ptr-libevent@0x7fb37c014c70 size 128 "road-eastnet-nonat-47" #299: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #299) | 63 02 bb 51 d9 8c b0 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 17 e8 1c e0 c7 4f 03 2d a7 55 c0 45 bf a2 96 | 6a 0c 0e 0f 3f cb a5 f2 68 03 39 51 c2 b3 0b 30 | 79 44 b0 72 39 7b b4 0b c0 9d 43 f1 cf 9c ab 76 | 17 9c 76 41 f4 97 6b 3d 79 c7 93 3a b0 36 40 75 | 1d 60 59 8c 82 e2 c7 85 c2 1c 97 4a 38 8b 6e ad | 3e 5a 0d 04 9e 51 30 61 82 af ed 37 96 e2 b6 a0 | 3b c4 41 66 ee 44 1e e7 39 9f 7c 2f f5 f2 ff 4b | 36 a8 c8 29 8b eb d2 55 7f fb 10 9c ec 8c 08 d0 | 39 05 1c 07 ac 20 cb cb a4 7c 61 41 78 60 13 d3 | dd a5 39 38 ad f1 86 ff 6a 3c d0 2d b1 eb 7c 82 | 79 91 1f 2f 55 9c db 4d e2 10 be 62 dd e3 5a 7a | 61 63 85 0c fd 8f b4 af 97 73 ef e2 1b 21 c4 96 | e5 df 1b 56 fa 11 08 d6 95 8d 53 f4 13 64 3d 3d | 98 8c 38 c7 52 64 1a 00 95 89 f1 a3 72 e2 fe 87 | 05 b1 bc 3a 2d 8d ca c2 67 8a 86 e8 36 ce a6 73 | 08 10 ff 3d c7 41 a4 c0 53 af 83 9f b4 ac d3 a6 | 29 00 00 24 7e 5d f1 77 88 98 7f 63 50 07 d0 59 | cc bb c0 62 cd 9c cc f3 5d 35 d8 78 d2 ee b4 01 | aa b2 27 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 b5 ac f1 52 82 e1 6d 65 51 7c e0 | ef a0 91 c6 07 cf fb 64 00 00 00 1c 00 00 40 05 | 8f da 92 7d 7b 47 83 cb 10 aa f2 ca 2c a8 73 ac | 13 99 82 ed | libevent_free: release ptr-libevent@0x7fb364014bc0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd40 | #299 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 02 bb 51 d9 8c b0 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #299 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #299 | rejected packet: | 63 02 bb 51 d9 8c b0 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #299: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aaf800 | handling event EVENT_RETRANSMIT for parent state #255 | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #255 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #255 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49672.68985; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005255 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd40 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #255 | libevent_malloc: new ptr-libevent@0x7fb364014bc0 size 128 "road-eastnet-nonat-3" #255: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #255) | b4 62 7d 49 a4 92 20 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 95 bd 0c ae 75 b5 e3 ef c4 cd 00 43 ea 3e 9a | 02 ba 07 e1 c1 bd 5d f0 a8 a6 51 3a 4a 21 e5 46 | 19 59 a0 93 a8 07 b1 7f 53 68 e9 d8 63 85 c8 12 | 71 98 74 63 ac c1 5d a5 39 9f c3 9e 95 82 52 3e | e1 41 18 21 d4 2e 9c 8d e0 71 8e d0 6d 4b 68 7e | 1c df fa cf ed ca 99 59 64 68 ed b3 9c 61 13 df | 2f ad b1 5a 3f dc 76 f5 58 69 91 b1 8b 83 c7 6f | 0b 08 55 fc ba 8b aa 73 16 1a 51 59 6d 0d 21 1f | bf 66 60 21 f1 49 bc 92 8c 9a be 6c 52 be 72 e6 | 19 b6 47 f8 33 cc b5 e6 ed 41 53 62 da 9d 6d 34 | fc ee 0f bf 23 f3 09 d7 96 22 fd c9 6e c0 31 60 | 95 22 90 57 96 ed 6a f6 05 50 b8 1b 34 71 5d dd | a7 c1 ab 82 e5 96 d7 d0 ac 36 1c 30 9d ee a7 97 | 6f 15 b5 89 4e c4 f6 f6 b5 08 23 bf cb 9e 75 f3 | f9 e0 ea 95 d8 eb 73 6d e3 2b 25 8d e5 17 c9 6e | f4 0f 23 e9 e4 7e dc 78 3c ae 82 7e 2a c2 1f 84 | 29 00 00 24 27 f0 79 05 ca 38 9d 60 17 70 37 05 | 8f c8 d2 c0 f8 4f 0f 05 b1 d0 9d 9d 43 88 90 d5 | 2d 20 4e 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 2d ab c5 84 ac e3 ea 3f b2 97 06 | b2 08 24 4c 91 11 e0 2a 00 00 00 1c 00 00 40 05 | ca ca c2 3f 11 62 54 7a 69 58 46 70 0a 1d a0 10 | 47 7f 3a 1d | libevent_free: release ptr-libevent@0x7fb35c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aaf800 | #255 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 62 7d 49 a4 92 20 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #255 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #255 | rejected packet: | b4 62 7d 49 a4 92 20 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #255: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a73690 | handling event EVENT_RETRANSMIT for parent state #100 | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #100 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #100 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49672.712273; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006698 exceeds limit? YES "road-eastnet-nonat-100" #100: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-100" #100: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #352 at 0x557d46a5ba10 | State DB: adding IKEv2 state #352 in UNDEFINED | pstats #352 ikev2.ike started | Message ID: init #352: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #352: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #352; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-100" #352: initiating v2 parent SA to replace #100 | using existing local IKE proposals for connection road-eastnet-nonat-100 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 352 for state #352 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aaf800 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #352 | libevent_malloc: new ptr-libevent@0x7fb35c04b7c0 size 128 | #352 spent 0.109 milliseconds in ikev2_parent_outI1() | RESET processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 resuming | crypto helper 4 starting work-order 352 for state #352 | start processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #100 ikev2.ike failed too-many-retransmits | pstats #100 ikev2.ike deleted too-many-retransmits | #100 spent 2.5 milliseconds in total | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 352 | [RE]START processing: state #100 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-100" #100: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #100: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #100 "road-eastnet-nonat-100" #100: deleting IKE SA for connection 'road-eastnet-nonat-100' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-100' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-100 | State DB: deleting IKEv2 state #100 in PARENT_I1 | parent state #100: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 352 time elapsed 0.00057 seconds | stop processing: state #100 from 192.1.2.23:500 (in delete_state() at state.c:1143) | (#352) spent 0.569 milliseconds in crypto helper computing work-order 352: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 352 for state #352 to event queue | scheduling resume sending helper answer for #352 | libevent_free: release ptr-libevent@0x7fb34403b0b0 | libevent_malloc: new ptr-libevent@0x7fb35804ba90 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a73690 | crypto helper 4 waiting (nothing to do) | in statetime_stop() and could not find #100 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-100 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-100" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-100' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-100" | stop processing: connection "road-eastnet-nonat-100" (in initiate_a_connection() at initiate.c:349) | spent 0.0909 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #352 | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 352 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #352 | **emit ISAKMP Message: | initiator cookie: | 3c 05 1d c4 fe 50 38 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-100 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9c 64 8b 09 fa 7a d8 0e 19 4a a4 83 62 a1 a5 5a | ikev2 g^x 68 fc 46 c2 41 24 c2 81 0b b7 86 21 9c 81 02 7e | ikev2 g^x 4c e7 e3 a1 0b b2 cb 85 40 50 15 e6 9b 8e ec db | ikev2 g^x 69 e6 fa 1a ac be 36 c2 a1 ef 3e db b6 5e 52 af | ikev2 g^x 7e 52 8f f4 e4 02 53 3c 7f 96 73 09 3f 4e 1d 14 | ikev2 g^x 6d c2 31 fa 5c 39 98 fc 2c b5 f5 9e 00 af 34 e4 | ikev2 g^x 5f b6 a3 65 94 fe 46 6a 1b e5 e1 4a 56 bd a5 cf | ikev2 g^x 0a 77 7e 2c 49 79 6d b8 e1 4a 50 3f 05 7c c4 09 | ikev2 g^x eb 02 3b 50 92 11 5f 9f 53 e6 1e bd 8d 02 31 1b | ikev2 g^x ce 66 73 68 3b 0d 47 9f bd 24 08 62 f6 ab c3 d7 | ikev2 g^x a4 43 e9 f4 a6 cc 3c 8d f5 af 10 2b 54 da 75 ae | ikev2 g^x 02 35 c6 d0 b8 2f b0 bf cd b2 cd e7 d2 23 bb 30 | ikev2 g^x 31 a6 56 6a 41 57 91 fb 46 1d ee de f8 63 bc 4e | ikev2 g^x 2b 81 4f df b1 c0 cc c0 21 f9 64 98 54 3d 15 93 | ikev2 g^x 9d f2 7c 39 a9 8b 0c c2 f7 bb 99 15 ac 9c c2 51 | ikev2 g^x 1b f2 0a ec 9e 8c 56 18 67 8a fb 62 ed 27 4d ad | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a2 bb a3 dc 18 69 ac 45 10 e2 b1 d4 a3 1c d3 0a | IKEv2 nonce 99 a1 33 f7 93 76 f6 b4 72 bd d3 aa d5 07 c1 d4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3c 05 1d c4 fe 50 38 12 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 64 | natd_hash: port= 01 f4 | natd_hash: hash= 3d 31 52 a7 9d 89 a3 6a 1c 72 78 4c e5 d1 1b 1c | natd_hash: hash= 74 f4 f6 22 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3d 31 52 a7 9d 89 a3 6a 1c 72 78 4c e5 d1 1b 1c | Notify data 74 f4 f6 22 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3c 05 1d c4 fe 50 38 12 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= fc b9 a7 1f 0a 98 43 79 23 71 2c ac b0 a5 bd 76 | natd_hash: hash= ba 72 e4 ab | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fc b9 a7 1f 0a 98 43 79 23 71 2c ac b0 a5 bd 76 | Notify data ba 72 e4 ab | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #352 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #352: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #352 to 4294967295 after switching state | Message ID: IKE #352 skipping update_recv as MD is fake | Message ID: sent #352 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-100" #352: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.100:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #352) | 3c 05 1d c4 fe 50 38 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 64 8b 09 fa 7a d8 0e 19 4a a4 83 62 a1 a5 5a | 68 fc 46 c2 41 24 c2 81 0b b7 86 21 9c 81 02 7e | 4c e7 e3 a1 0b b2 cb 85 40 50 15 e6 9b 8e ec db | 69 e6 fa 1a ac be 36 c2 a1 ef 3e db b6 5e 52 af | 7e 52 8f f4 e4 02 53 3c 7f 96 73 09 3f 4e 1d 14 | 6d c2 31 fa 5c 39 98 fc 2c b5 f5 9e 00 af 34 e4 | 5f b6 a3 65 94 fe 46 6a 1b e5 e1 4a 56 bd a5 cf | 0a 77 7e 2c 49 79 6d b8 e1 4a 50 3f 05 7c c4 09 | eb 02 3b 50 92 11 5f 9f 53 e6 1e bd 8d 02 31 1b | ce 66 73 68 3b 0d 47 9f bd 24 08 62 f6 ab c3 d7 | a4 43 e9 f4 a6 cc 3c 8d f5 af 10 2b 54 da 75 ae | 02 35 c6 d0 b8 2f b0 bf cd b2 cd e7 d2 23 bb 30 | 31 a6 56 6a 41 57 91 fb 46 1d ee de f8 63 bc 4e | 2b 81 4f df b1 c0 cc c0 21 f9 64 98 54 3d 15 93 | 9d f2 7c 39 a9 8b 0c c2 f7 bb 99 15 ac 9c c2 51 | 1b f2 0a ec 9e 8c 56 18 67 8a fb 62 ed 27 4d ad | 29 00 00 24 a2 bb a3 dc 18 69 ac 45 10 e2 b1 d4 | a3 1c d3 0a 99 a1 33 f7 93 76 f6 b4 72 bd d3 aa | d5 07 c1 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 31 52 a7 9d 89 a3 6a 1c 72 78 4c | e5 d1 1b 1c 74 f4 f6 22 00 00 00 1c 00 00 40 05 | fc b9 a7 1f 0a 98 43 79 23 71 2c ac b0 a5 bd 76 | ba 72 e4 ab | state #352 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c04b7c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aaf800 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a73690 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #352 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 | #352 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49672.713818 | resume sending helper answer for #352 suppresed complete_v2_state_transition() and stole MD | #352 spent 0.604 milliseconds in resume sending helper answer | stop processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35804ba90 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c 05 1d c4 fe 50 38 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #352 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #352 | rejected packet: | 3c 05 1d c4 fe 50 38 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 64 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #352: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0743 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #347 | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #347 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #347 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49672.742065; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501467 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358012630 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #347 | libevent_malloc: new ptr-libevent@0x7fb35804ba90 size 128 "road-eastnet-nonat-95" #347: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #347) | f8 38 0d 6d 39 93 09 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 c4 2f 67 81 91 d8 d3 fb 76 27 6a 79 d1 72 21 | 27 8a 05 07 53 b8 7f 41 86 ef e3 fa f6 78 ef f1 | 52 89 ca 2d 9e 75 06 3f de f7 86 92 8e de 82 39 | 74 b5 33 59 34 5d 7a 07 32 58 2d 1b 54 b4 4a 71 | 82 e9 69 4b d1 23 61 8d 33 9d 70 70 80 3d e7 06 | 38 6a 56 ed 6a ce 44 ea 5c f0 e5 ab 75 42 57 8c | 73 f2 e6 32 f6 2b 78 17 cc 77 d1 36 52 bb 7b 23 | 6f c5 5a f4 da 8c 20 ce 25 5e 2c b4 61 29 ba 22 | 7b 74 2f 22 bd 61 49 7e ed ee f8 95 fd 44 ae 87 | 6a 9a b0 84 48 37 7e bb 35 e6 e2 f6 4e 13 6b 95 | 47 4c 2d 6c a3 db 3d 5d ad 81 79 5f 80 e7 3e ed | bb b5 a8 97 95 f7 34 a1 ef 98 52 3c fa 6c 7f 37 | f7 78 d5 45 99 4e d1 38 57 29 2f b0 94 21 1c a5 | 4f 3d 71 d0 fc 88 a0 06 b8 26 ee 84 19 ff 4c 00 | 47 77 6c e4 d3 3a ee 07 05 6f 06 56 6c 1b 9a 2e | 15 bd 41 a6 3a 78 6e d5 2a 86 74 c6 d6 01 f5 e6 | 29 00 00 24 2a 8c 4f 9a ed e1 ff e1 d2 8e 39 06 | cc ef a0 3d 7a d8 6e 61 bc 37 8f e1 33 0d 03 68 | 11 db e1 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 e5 1f 89 e2 f9 a8 3f 54 c4 5a dc | 3f 1e 16 e7 e3 67 75 63 00 00 00 1c 00 00 40 05 | d2 37 e4 48 b8 f6 61 3d d7 15 bc 92 37 84 81 61 | b6 43 37 f7 | libevent_free: release ptr-libevent@0x7fb36804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #347 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 38 0d 6d 39 93 09 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #347 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #347 | rejected packet: | f8 38 0d 6d 39 93 09 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #347: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0649 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37400cc10 | handling event EVENT_RETRANSMIT for parent state #342 | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #342 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #342 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49672.746419; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001153 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #342 | libevent_malloc: new ptr-libevent@0x7fb36804b850 size 128 "road-eastnet-nonat-90" #342: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #342) | 92 0e 5c 44 35 6f 61 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 4b 3f 50 56 cd 4f c8 69 53 e3 02 d0 e2 c4 4b | b8 26 12 0d 2f 95 d4 df 65 d2 22 1d a5 8a 76 36 | 0f 44 f3 88 67 5b a4 93 af 87 fb e7 03 3d f3 3d | ce 49 25 06 46 21 51 fe e6 a5 e0 3f 25 17 b0 d7 | 71 9b 71 32 36 21 5f b7 2a ee 25 9c 8a 04 76 c2 | 55 e4 ab 4e 7c 02 05 d1 d2 21 09 a2 51 a4 92 f0 | 79 2b 73 03 6e bc d5 33 3d 90 f5 1b b7 cb cd e9 | 74 b4 08 87 c4 a4 7c ab 86 b2 e8 fe f3 2e a7 14 | da 5c 13 a2 0a 83 be 25 a6 25 48 21 ec 98 11 c6 | 1d 49 83 e7 e3 39 34 26 fb d4 24 cb d2 66 1f a9 | 8b 7b 97 28 60 bf e3 df fc be 83 7a 91 a4 90 3a | af ad 2d 44 70 c8 0c 11 ab e1 87 f9 88 5b 04 d8 | 04 03 d4 08 d3 e9 32 2b 30 9c 93 90 d3 62 4a 73 | df 00 65 61 53 f7 33 9c 73 ad fe 53 5a 29 aa 93 | da 76 97 14 51 4b d0 f8 fb 54 f6 6e 4f 99 ad 4b | 75 e5 97 56 5f 2e 08 fb ed 71 37 6a 4a ad d6 62 | 29 00 00 24 02 01 86 b0 0f 40 c1 16 7f df 21 87 | ce a9 58 2f 27 7b 28 e0 c6 1c d2 35 82 80 ac e4 | ab 80 e7 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 56 62 15 04 08 91 44 63 ec 81 3e 0b | 9f 8e c8 3c d5 eb af f0 00 00 00 1c 00 00 40 05 | 60 c3 81 cb a9 a6 9e ac 92 76 43 f4 51 0d 3b 6e | 52 02 3f 95 | libevent_free: release ptr-libevent@0x7fb37401f7f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37400cc10 | #342 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 0e 5c 44 35 6f 61 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #342 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #342 | rejected packet: | 92 0e 5c 44 35 6f 61 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #342: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #300 | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #300 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #300 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49672.74778; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003686 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37400cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #300 | libevent_malloc: new ptr-libevent@0x7fb37401f7f0 size 128 "road-eastnet-nonat-48" #300: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #300) | 5a 7e ff 7d 11 39 dd fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 d7 07 3e b9 b2 ed 0a cc c5 e4 47 ac fb df bc | 0b 82 8a 56 1b e7 c2 b9 79 67 f6 05 c1 b0 1a 41 | e0 93 9f 0d bb 5b 76 5f ac 5e ea 5e 58 49 c4 c3 | 9b f8 0e 2d 48 75 fe 88 ae 81 6e bd fc ad 1e 40 | 65 b9 12 2a 8f 3a b5 a4 e3 d6 7e 50 9a b3 12 10 | be 2b 79 8f 29 34 8f 0b 99 4e 4e 7a 4b 49 42 b4 | 04 b2 ac fc ac a3 5a 98 37 17 c3 a2 f0 f0 c9 79 | df 28 17 de 36 02 c0 b4 1b f3 2c 9d ad d8 f6 f4 | c9 44 36 2c 9a 21 d9 68 8c 86 58 41 ae 59 e7 74 | 88 a3 d3 f6 a3 ef 04 07 90 c9 82 f0 a7 49 d9 a4 | 83 0f b0 90 08 f3 eb 02 f4 ec 40 8a 98 92 d5 38 | 7d db 73 c5 6a 66 84 84 0b 3e ba 92 37 b8 31 bd | 61 f6 57 d8 cd fd ab d5 b0 51 b6 0b 3f 5e a3 a5 | 0b 5e 9e c6 f9 0e 39 09 62 b7 fe 88 e1 1e 94 68 | 7e ba 69 87 7e ff 7f 13 a8 f4 7a 0a b2 7e 1c 3c | 9c 70 0e 6e a8 6f 4b 28 4f f5 1d ce 10 46 27 eb | 29 00 00 24 db d2 83 de 45 20 a2 89 40 10 d1 ad | 44 17 5c 15 2b 8f 9e 84 0d 1b 42 0f a9 75 90 ef | 32 25 81 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 9c e3 05 f1 a6 88 c9 89 5f 4a 78 | 8b 60 50 45 77 4b 7a a3 00 00 00 1c 00 00 40 05 | 2b d5 a3 e8 51 d4 0b 1b d6 4d 4a ff ba 69 1c 93 | 2c 16 fd 8b | libevent_free: release ptr-libevent@0x7fb3540300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #300 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 7e ff 7d 11 39 dd fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #300 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #300 | rejected packet: | 5a 7e ff 7d 11 39 dd fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #300: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0eac0 | handling event EVENT_RETRANSMIT for parent state #327 | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #327 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #327 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49672.774149; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003237 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #327 | libevent_malloc: new ptr-libevent@0x7fb3540300e0 size 128 "road-eastnet-nonat-75" #327: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #327) | cd 66 0f 9c 46 d2 2e 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c e2 6e 06 8e ba 7b 55 21 d6 ce 48 6f 3c 92 70 | 71 57 bb 2e 59 88 d0 8e 2a d9 1e 8b 54 64 af 4b | 40 4b af e2 a4 54 08 ce 78 99 d3 6e a5 bc 7d 40 | 54 45 d2 55 e5 04 88 a7 28 8f 77 11 a3 33 32 44 | c5 c1 f3 8c 73 cd 33 50 64 6e 8a 4a 03 1a e8 56 | 33 98 cb 05 7e 52 cf 35 2c 3c 0a 01 ff ea e2 ad | d8 80 22 71 7e 19 d2 b8 ce 67 79 24 c4 a0 f8 77 | 85 18 5e ad 8e 04 46 41 75 9b 16 af 02 fc dc 64 | 32 2e 9e 96 8f b4 82 0b 80 7e 79 12 22 b3 48 72 | b8 08 60 6b fb b5 54 a6 fa 64 f2 f2 1c f2 68 fd | a8 f7 9c d6 a5 ea 11 63 c4 ae d6 34 f7 8d 1a 64 | d2 72 49 10 16 1e e2 1a 26 c5 f0 ec 34 31 4a 5b | 0b 2e 91 90 5e 8e 26 12 f7 2c b6 7b b5 af 3d cb | 78 d2 30 c7 9f 03 58 c5 3d 03 c3 8e 6e cf 73 42 | 63 93 37 70 63 fa 64 09 ea e3 9b 55 c3 1a f4 3d | f3 be ab 22 fa 6d f3 45 4a 46 ad d5 84 8a f0 a1 | 29 00 00 24 90 b8 80 a5 9c 42 2b 50 2e f5 43 e6 | dc 43 6d 4e b8 ec af ce 7f 78 f5 24 c5 c3 2d 65 | bb f0 87 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc f4 a0 b4 bc 1c 55 2f e9 f9 68 07 | 2a e9 06 2c 8b 87 6b db 00 00 00 1c 00 00 40 05 | f6 e0 64 05 d4 ed 34 7f 04 0a 65 5a 6b 64 eb 2c | 7a ff a7 d3 | libevent_free: release ptr-libevent@0x7fb35c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0eac0 | #327 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cd 66 0f 9c 46 d2 2e 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #327 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #327 | rejected packet: | cd 66 0f 9c 46 d2 2e 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #327: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0457 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368012bf0 | handling event EVENT_RETRANSMIT for parent state #301 | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #301 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #301 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49672.802437; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003734 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0eac0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #301 | libevent_malloc: new ptr-libevent@0x7fb35c04b850 size 128 "road-eastnet-nonat-49" #301: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #301) | 04 2d 84 e7 d7 11 c2 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 3c a0 2e 05 57 66 74 9e 59 04 02 1e 6b 82 64 | 24 cf 86 32 1b 49 63 31 85 6e 91 96 dd e7 a7 21 | 78 ee 5c 0c 83 da 97 1a 0c 46 69 7c d4 8f 0d 6c | 0b 43 52 49 09 9a 24 da 36 13 01 09 31 88 8b 5b | 38 73 77 00 83 94 ba bf 7c fa 22 16 ff 64 be 16 | 43 df 4f 1d b8 18 88 ee 83 b1 c9 32 ce 1f e3 0d | 40 e4 05 2a 7d 12 64 bf de 51 1d 4c d5 99 11 64 | 9a df 9d ae e7 e1 f9 df 89 9a 5f 11 f6 4b 39 47 | 36 de 08 ec a1 59 7b 84 9f e8 cd af ca a0 8a 29 | aa 2e 7e 1a 1d 88 43 74 5c 19 1a 8f 44 5f 83 95 | cc 00 d8 ee 8f cb 95 29 ae 58 5c 08 01 62 ea 7e | 97 e9 bf 6a 36 31 ba 2d 83 4b 4a ef ce 50 36 44 | 4f a8 a5 8e ad 2c 99 bd c1 01 08 ba ee 5e 1c 63 | 9e 50 96 b6 7a 6e 9f de cf c5 73 a0 7c d6 3d 3a | fe 11 5d 0f 1c cb 4b 02 b4 b1 f7 0c 56 bd a2 fe | d4 f1 da 5a fb cc f5 22 d5 c9 55 2b 49 27 7a 02 | 29 00 00 24 9d f4 32 14 da 15 0d 5d b3 86 88 1b | ed 98 fc e3 a3 7a 35 ba 87 aa 0c 85 93 07 0b 69 | 9d 37 a2 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 4c 33 35 25 dc 8b ec 4f 4f 50 86 | 6f 49 f3 b3 44 40 22 71 00 00 00 1c 00 00 40 05 | d2 03 8c 03 1f b3 ee 14 98 31 7f d2 44 da 50 e8 | 1a 08 5c 44 | libevent_free: release ptr-libevent@0x7fb338014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368012bf0 | #301 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 2d 84 e7 d7 11 c2 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #301 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #301 | rejected packet: | 04 2d 84 e7 d7 11 c2 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #301: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34800d120 | handling event EVENT_RETRANSMIT for parent state #101 | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #101 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #101 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49672.808749; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.01902 exceeds limit? YES "road-eastnet-nonat-101" #101: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-101" #101: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #353 at 0x557d46a5cfd0 | State DB: adding IKEv2 state #353 in UNDEFINED | pstats #353 ikev2.ike started | Message ID: init #353: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #353: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #353; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-101" #353: initiating v2 parent SA to replace #101 | using existing local IKE proposals for connection road-eastnet-nonat-101 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 353 for state #353 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb368012bf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #353 | libevent_malloc: new ptr-libevent@0x7fb338014c70 size 128 | #353 spent 0.0902 milliseconds in ikev2_parent_outI1() | crypto helper 13 resuming | RESET processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 starting work-order 353 for state #353 | start processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 353 | pstats #101 ikev2.ike failed too-many-retransmits | pstats #101 ikev2.ike deleted too-many-retransmits | #101 spent 2.6 milliseconds in total | [RE]START processing: state #101 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-101" #101: deleting state (STATE_PARENT_I1) aged 64.021s and NOT sending notification | parent state #101: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #101 "road-eastnet-nonat-101" #101: deleting IKE SA for connection 'road-eastnet-nonat-101' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-101' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-101 | State DB: deleting IKEv2 state #101 in PARENT_I1 | parent state #101: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #101 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 353 time elapsed 0.000991 seconds | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800d120 | (#353) spent 0.994 milliseconds in crypto helper computing work-order 353: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 353 for state #353 to event queue | in statetime_stop() and could not find #101 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #353 | libevent_malloc: new ptr-libevent@0x7fb35c04b7c0 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 13 waiting (nothing to do) Initiating connection road-eastnet-nonat-101 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-101" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-101' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-101" | stop processing: connection "road-eastnet-nonat-101" (in initiate_a_connection() at initiate.c:349) | spent 0.077 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #353 | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 353 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #353 | **emit ISAKMP Message: | initiator cookie: | 5c b8 33 04 f9 07 ca 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-101 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 85 8b 11 fb 47 ec 02 c4 cd 08 09 04 3c c8 57 b9 | ikev2 g^x e6 56 8a 75 16 cb 27 a3 a8 a8 cd 60 5a 5e 10 a0 | ikev2 g^x 4c ee d4 ee 70 90 76 03 9c dd ae bd 31 4c 66 16 | ikev2 g^x b3 e1 1d be 33 f8 41 0b c4 3c 71 6f 90 30 0f da | ikev2 g^x 26 bc 55 a4 9b 68 89 99 78 6a 9f bd 9b 59 ca 66 | ikev2 g^x 9f 28 bb 1c cf d9 04 9c 3f 50 e0 a8 9a c8 86 3c | ikev2 g^x 22 ad 41 27 f3 c4 bb fb ef e9 6e f8 88 7e 34 6e | ikev2 g^x 75 ca 2d 80 b4 0c d7 c1 72 ce 98 2e 70 ec 4e 80 | ikev2 g^x a8 95 d8 c8 1d 5c 97 5c c0 a0 b9 5c ac 3a c3 07 | ikev2 g^x 2c c5 07 1e 3d 08 d1 ba e4 93 f5 5b dd cb 89 0a | ikev2 g^x 36 eb de 45 ac 11 de 24 b8 2b b2 28 d9 84 7e 81 | ikev2 g^x 6c e6 ca 34 e5 ab 3a f5 d9 8f 51 9e f8 46 26 92 | ikev2 g^x bb e9 13 c3 32 db 48 bf d1 a9 ef 9e d6 1f 7a 90 | ikev2 g^x cf e0 f7 95 4c 0f 73 ac 90 00 08 6f f7 6f bb 88 | ikev2 g^x dc 53 20 17 f7 7a 4b e1 b0 e3 53 ab c1 68 9e bb | ikev2 g^x 8c bb e3 6d 1e 44 fc 28 be 03 40 b8 4e ff ea 55 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d0 f4 4a 20 b5 18 6c ce 45 6d d4 e9 3d b2 3f bf | IKEv2 nonce 9f b6 c1 be 4d 22 b8 3f d5 b7 20 9c 7a 5b 5b 25 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5c b8 33 04 f9 07 ca 05 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 65 | natd_hash: port= 01 f4 | natd_hash: hash= 18 c3 92 4c 0f 96 63 0f 6f bc 3d e6 99 69 47 3f | natd_hash: hash= a6 34 81 2c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 18 c3 92 4c 0f 96 63 0f 6f bc 3d e6 99 69 47 3f | Notify data a6 34 81 2c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5c b8 33 04 f9 07 ca 05 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ce 29 c6 74 fd 99 32 be d7 3c ba 39 8c e5 64 d3 | natd_hash: hash= 17 27 91 5a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ce 29 c6 74 fd 99 32 be d7 3c ba 39 8c e5 64 d3 | Notify data 17 27 91 5a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #353 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #353: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #353 to 4294967295 after switching state | Message ID: IKE #353 skipping update_recv as MD is fake | Message ID: sent #353 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-101" #353: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.101:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #353) | 5c b8 33 04 f9 07 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 8b 11 fb 47 ec 02 c4 cd 08 09 04 3c c8 57 b9 | e6 56 8a 75 16 cb 27 a3 a8 a8 cd 60 5a 5e 10 a0 | 4c ee d4 ee 70 90 76 03 9c dd ae bd 31 4c 66 16 | b3 e1 1d be 33 f8 41 0b c4 3c 71 6f 90 30 0f da | 26 bc 55 a4 9b 68 89 99 78 6a 9f bd 9b 59 ca 66 | 9f 28 bb 1c cf d9 04 9c 3f 50 e0 a8 9a c8 86 3c | 22 ad 41 27 f3 c4 bb fb ef e9 6e f8 88 7e 34 6e | 75 ca 2d 80 b4 0c d7 c1 72 ce 98 2e 70 ec 4e 80 | a8 95 d8 c8 1d 5c 97 5c c0 a0 b9 5c ac 3a c3 07 | 2c c5 07 1e 3d 08 d1 ba e4 93 f5 5b dd cb 89 0a | 36 eb de 45 ac 11 de 24 b8 2b b2 28 d9 84 7e 81 | 6c e6 ca 34 e5 ab 3a f5 d9 8f 51 9e f8 46 26 92 | bb e9 13 c3 32 db 48 bf d1 a9 ef 9e d6 1f 7a 90 | cf e0 f7 95 4c 0f 73 ac 90 00 08 6f f7 6f bb 88 | dc 53 20 17 f7 7a 4b e1 b0 e3 53 ab c1 68 9e bb | 8c bb e3 6d 1e 44 fc 28 be 03 40 b8 4e ff ea 55 | 29 00 00 24 d0 f4 4a 20 b5 18 6c ce 45 6d d4 e9 | 3d b2 3f bf 9f b6 c1 be 4d 22 b8 3f d5 b7 20 9c | 7a 5b 5b 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 c3 92 4c 0f 96 63 0f 6f bc 3d e6 | 99 69 47 3f a6 34 81 2c 00 00 00 1c 00 00 40 05 | ce 29 c6 74 fd 99 32 be d7 3c ba 39 8c e5 64 d3 | 17 27 91 5a | state #353 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb338014c70 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb368012bf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #353 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 | #353 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49672.81051 | resume sending helper answer for #353 suppresed complete_v2_state_transition() and stole MD | #353 spent 0.469 milliseconds in resume sending helper answer | stop processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c04b7c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c b8 33 04 f9 07 ca 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #353 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #353 | rejected packet: | 5c b8 33 04 f9 07 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 65 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #353: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0d4c0 | handling event EVENT_RETRANSMIT for parent state #343 | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #343 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #343 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49672.824712; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00122 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #343 | libevent_malloc: new ptr-libevent@0x7fb35c04b7c0 size 128 "road-eastnet-nonat-91" #343: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #343) | ae 78 c6 a9 8f e8 66 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 9d b8 ed 06 43 12 ec 4c 45 2d d2 98 f8 e4 c2 | 36 59 63 a7 5a 33 ff 67 e3 f9 f4 1f 01 a9 3a 4c | 55 90 c8 83 a0 29 a8 aa 4f ac db f2 6f 11 94 39 | df dd ed a8 03 f3 60 cc f4 5f c8 16 76 2c 18 b3 | 52 5b 1b ac 7a 46 b0 6c 28 af 43 e8 e9 1f 42 2d | 46 d8 e4 d3 78 66 14 97 ce c1 cd 0c 3c 65 65 46 | 46 82 84 7e d0 a7 70 e0 17 0f db 9a 4e 29 93 92 | 21 22 73 35 c9 ca 2f af 9d 0a 64 5c 81 08 63 7f | e9 bd 70 7e 9e c2 db 6e 8e 2d a9 2d 3d e8 0e 81 | cf 97 9f 13 45 5f d0 17 a5 46 81 8f f6 9c 9c dd | 6d 72 b6 df 14 55 64 61 52 e1 4b 46 36 b7 06 8a | 6d 94 56 ae f7 f9 54 fa 14 95 61 ab b8 b6 ec c3 | e8 2c f9 02 e7 ab 10 28 9e 67 38 42 93 d6 89 7e | bb 6a dc 83 42 00 3f 72 de b7 9e 71 be 55 39 21 | 54 8b a5 97 b3 b2 06 f8 5f 7f 26 67 9a c1 3f 7e | 51 39 34 0f ac 86 ce 7b e6 99 54 4b 79 6e 8f 0a | 29 00 00 24 65 6f dc 77 c3 29 54 5a 74 6e 49 3d | 05 2a fe cf 26 c9 29 fa f4 9d 54 09 a5 a6 15 69 | 11 b4 0e 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 ad 81 e7 cf f7 25 7c 0f 5a 2a 07 | aa 17 3c 2f 54 ca c3 2d 00 00 00 1c 00 00 40 05 | 5d 1d e0 9d fe 43 fa fd 70 69 f4 3c 05 77 9a 1e | 38 96 d9 39 | libevent_free: release ptr-libevent@0x7fb34803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | #343 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 78 c6 a9 8f e8 66 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #343 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #343 | rejected packet: | ae 78 c6 a9 8f e8 66 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #343: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11640 | handling event EVENT_RETRANSMIT for parent state #256 | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #256 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #256 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49672.828043; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006841 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #256 | libevent_malloc: new ptr-libevent@0x7fb34803b0b0 size 128 "road-eastnet-nonat-4" #256: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #256) | af ff 14 5c e8 87 a5 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 1f 56 51 1c ec cd e5 db 48 26 c8 dc 41 fd 54 | a8 2a f3 18 64 e6 88 a2 77 94 ce b8 37 5b 43 37 | 15 71 aa 40 2b 14 32 13 87 73 76 ea dc 9c c2 0d | 5f 66 9f c3 96 de 76 09 50 94 85 73 09 16 fd 60 | e5 22 cf 96 3d 7f 8a d5 69 b3 f6 e0 d1 b6 2a b1 | 46 24 36 96 12 35 a6 66 31 6c fc 27 fd 14 5f 55 | dc 4d 24 0c d2 4a 10 86 34 a8 27 78 27 27 b0 f6 | f0 8d 2e 1b c6 a5 de fc 9e fb ab ed 9f 6c dc 3c | 42 c9 5c a1 4a e3 4a 45 da e8 44 a1 f6 8a 36 fd | f6 c8 42 59 48 f3 30 69 ad 20 74 c3 02 1b f3 f8 | 3b 14 80 5c e4 55 cc fa 49 75 80 37 c4 a0 eb 78 | 5a ba 01 b2 91 5d ef fc 1f 18 54 22 3c e6 ac 42 | 22 26 d6 93 0e 7d c7 67 e5 47 f0 ab 43 0b cd e4 | d0 9c fd 7d 64 aa cd 20 be f3 31 9f f9 fd e9 74 | f6 4d 79 65 aa 69 d2 c1 c0 27 e2 43 4d 23 a2 bd | 81 a0 4b 66 29 06 06 b0 e0 6b c0 d6 29 53 e1 5f | 29 00 00 24 68 30 70 dd 8d a8 3f ec 7e 36 6c 6a | a3 ce 4b 67 03 0b 93 d7 9a 32 93 85 56 0b 5c 0e | c5 0b 8c 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 28 6b 61 6f db 11 ce 62 1a 99 08 | cd 34 ea 3b 0e 7b 2c f1 00 00 00 1c 00 00 40 05 | f7 c5 67 63 b0 24 3f 1b e9 07 39 23 b4 29 1b da | 4e b1 36 66 | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11640 | #256 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af ff 14 5c e8 87 a5 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #256 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #256 | rejected packet: | af ff 14 5c e8 87 a5 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #256: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #328 | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #328 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #328 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49672.840381; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002358 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11640 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #328 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 "road-eastnet-nonat-76" #328: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #328) | 3c ba 5b c8 fc 4e e4 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 98 1b 56 d7 72 9f 0b ef 82 c1 96 52 5c 5c 9b | e9 aa b3 20 9c 71 f6 1f 7d 62 5f 32 20 71 40 58 | 1c 09 5f be 66 e2 fb 32 6f 32 7b d3 d9 05 2e a9 | ee af 44 08 4c 92 7f 63 3f 26 57 99 85 eb 91 d7 | b7 5a 96 3e 98 ed 26 ea 09 8f 0f 63 53 5d 1c b3 | c9 fb a7 17 72 50 1c 89 8a 1b ec e3 c6 13 99 f4 | 47 85 27 9f 89 00 ee af f6 42 8e 89 20 65 b0 94 | dc 96 45 50 6a fc 55 91 2d 20 a1 71 bd 13 2b 3d | c9 ca ac 78 35 01 26 cc e0 d8 0f 8b 0a 51 cf db | a4 5f b8 de 1d ef 44 4c 67 d2 41 0a 1a da 75 49 | 8b 5c 8d d5 4f ad 96 01 a7 81 6e 64 71 33 1d 13 | c8 f5 a7 cf 94 c9 e6 53 e2 b0 78 13 10 0b c7 61 | e7 11 09 49 e7 5c 3e 3d 81 8a d4 ca 33 cf 4b a6 | 11 a6 1c 3a 1f 08 75 b7 9e 2d 0e 59 2f 13 2a 60 | 81 d0 25 c3 cb 2c 46 fb 68 09 64 52 0e fa 74 b3 | e7 5b 92 47 85 91 91 a7 8f 24 50 93 20 2b b2 73 | 29 00 00 24 bd 04 20 dd 74 64 b5 d8 5a af c3 c3 | 73 08 e8 87 3d 68 41 83 2a a2 ff d2 47 06 97 0f | ee 80 ed c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f8 b1 65 26 56 ad 9d 5c eb eb 90 | 0c 0f 05 c7 3a 68 b0 36 00 00 00 1c 00 00 40 05 | a1 90 c1 14 1b 7b 06 99 a6 d5 54 52 02 f0 92 56 | c7 13 ca 30 | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | #328 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c ba 5b c8 fc 4e e4 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #328 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #328 | rejected packet: | 3c ba 5b c8 fc 4e e4 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #328: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348018460 | handling event EVENT_RETRANSMIT for parent state #348 | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #348 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #348 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49672.845747; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500433 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #348 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 "road-eastnet-nonat-96" #348: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #348) | a7 7d 9d ff 1a 60 65 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce d5 f5 8b 39 60 35 a5 25 70 07 1c 5c b5 0b 9d | 0f b2 5b 4a 01 34 b6 83 42 d7 d4 4c ad da 68 4a | 8b 4a 32 5f 36 06 f1 98 73 58 e9 72 c0 73 68 ca | 50 81 07 47 ff 17 19 96 47 97 94 3d f6 b6 04 3a | d9 53 26 2d 26 d4 5a 00 db 52 8b 30 4a 2f d3 5e | 57 21 6b c8 30 e6 41 d6 77 b5 33 c3 1e eb 09 f5 | f6 92 94 59 ce 0f f4 b6 13 a7 e6 12 2c 94 0a 0e | a5 49 7d ed 7d 57 a6 dd 0c c8 f5 e3 ab f6 df fb | 13 a2 c5 ce cd 5e 51 7c 83 34 62 82 09 e1 e3 72 | 31 4c 58 be 93 6e 60 9d a5 4a 65 3b 0e 6c 76 16 | ff b5 3c 17 b2 e3 b4 72 ba 47 1e 9f c9 b0 43 a7 | f0 b4 e5 71 a8 38 7d f3 55 a8 70 6c f5 0c ea e3 | 99 31 47 d9 67 2c ef 74 72 f0 71 8a 3c da e4 22 | d8 c1 06 32 4c 16 22 97 a9 d9 5c c1 eb 63 08 aa | 52 12 c2 6f 92 9a fe 31 31 61 1a 04 4f a6 29 e5 | bd ba 74 54 e9 68 1b 89 03 52 57 66 34 af 35 4f | 29 00 00 24 d4 8c 07 58 36 6c 0d 91 39 7f ba 4b | 55 80 94 2b 15 6a 3d d9 23 c6 de 68 59 32 ea bf | f7 3a e2 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c1 c6 46 d6 42 6c c3 80 0a 8c 20 90 | 81 74 5d e8 06 92 e7 f6 00 00 00 1c 00 00 40 05 | 5c 1e 6e a7 c5 99 b7 4d bd dd e2 f9 8e 11 ad b4 | 92 1e 01 ed | libevent_free: release ptr-libevent@0x7fb370012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348018460 | #348 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 7d 9d ff 1a 60 65 e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #348 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #348 | rejected packet: | a7 7d 9d ff 1a 60 65 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #348: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0697 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #102 | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #102 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #102 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49672.861112; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007544 exceeds limit? YES "road-eastnet-nonat-102" #102: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-102" #102: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #354 at 0x557d46a5e590 | State DB: adding IKEv2 state #354 in UNDEFINED | pstats #354 ikev2.ike started | Message ID: init #354: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #354: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #354; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-102" #354: initiating v2 parent SA to replace #102 | using existing local IKE proposals for connection road-eastnet-nonat-102 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 354 for state #354 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb348018460 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #354 | libevent_malloc: new ptr-libevent@0x7fb370012840 size 128 | #354 spent 0.0865 milliseconds in ikev2_parent_outI1() | crypto helper 17 resuming | RESET processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 starting work-order 354 for state #354 | start processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 354 | pstats #102 ikev2.ike failed too-many-retransmits | pstats #102 ikev2.ike deleted too-many-retransmits | #102 spent 2.38 milliseconds in total | [RE]START processing: state #102 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-102" #102: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #102: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #102 "road-eastnet-nonat-102" #102: deleting IKE SA for connection 'road-eastnet-nonat-102' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-102' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-102 | State DB: deleting IKEv2 state #102 in PARENT_I1 | parent state #102: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #102 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 354 time elapsed 0.000897 seconds | libevent_free: release ptr-libevent@0x7fb35c0180b0 | (#354) spent 0.909 milliseconds in crypto helper computing work-order 354: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | crypto helper 17 sending results from work-order 354 for state #354 to event queue | scheduling resume sending helper answer for #354 | libevent_malloc: new ptr-libevent@0x7fb35001fd50 size 128 | in statetime_stop() and could not find #102 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 17 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-102 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-102" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-102' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-102" | stop processing: connection "road-eastnet-nonat-102" (in initiate_a_connection() at initiate.c:349) | spent 0.0721 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #354 | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 354 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #354 | **emit ISAKMP Message: | initiator cookie: | 72 4c 85 c6 74 09 42 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-102 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d6 1b e9 65 bc 73 bc c5 81 57 1a 7b 1b db 4b 3f | ikev2 g^x 32 d5 0d b7 6a 65 f1 0a 67 34 33 c1 2c 23 e5 f2 | ikev2 g^x 41 57 12 1f 62 7d 04 aa d4 c7 47 71 78 e8 f0 df | ikev2 g^x 48 86 0b 9f 4e 36 6e 72 bd ec 74 1b dd 83 0a ab | ikev2 g^x df 0b c7 29 5d 45 26 d8 31 4b 64 db c5 65 76 90 | ikev2 g^x cd 52 7e 2d 27 67 7a 01 34 ba b6 3f e3 9a 85 48 | ikev2 g^x e4 51 41 5f 21 41 ff 88 e4 cc aa c0 b6 13 70 92 | ikev2 g^x 13 45 bf db 76 ed 1c 31 eb 2b 1f af 38 c5 ca 82 | ikev2 g^x 0b fb bb d7 57 27 bd 26 60 cb 6b 22 18 4a df 09 | ikev2 g^x ae e5 bd 33 88 7d ef 21 1c 95 13 3d a5 02 60 08 | ikev2 g^x e7 d2 1b 72 0a 7b aa 01 9d 47 2a 4d 32 3f 9b ec | ikev2 g^x 5b 5a ea 31 68 bb 1a dc 15 be 3d d6 a0 c0 98 db | ikev2 g^x 7b 5b 3d 8f ce 9b 6c 43 56 11 be e1 16 78 07 0a | ikev2 g^x 06 29 bd c7 77 7e 17 95 3a 22 27 47 9f 23 32 f6 | ikev2 g^x 37 27 d0 b4 53 1e 36 9f c8 05 75 2f 68 c9 35 72 | ikev2 g^x da 2e a9 d1 44 f4 35 64 d4 0a 4b c0 71 73 52 a8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 72 5c 82 6f 5d 6b bd 69 39 4b 52 31 75 ca 0e e7 | IKEv2 nonce 64 bc 08 f8 b5 d4 6f 1f bc a5 fc 80 56 52 35 49 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 72 4c 85 c6 74 09 42 d6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 66 | natd_hash: port= 01 f4 | natd_hash: hash= 75 33 77 7a c0 93 c5 bf 78 5c 8c bc 79 60 cc b9 | natd_hash: hash= 7e aa 2e bb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 75 33 77 7a c0 93 c5 bf 78 5c 8c bc 79 60 cc b9 | Notify data 7e aa 2e bb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 72 4c 85 c6 74 09 42 d6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= df 4b d5 4e cf 64 0d 4d 4f 32 d9 61 e4 8d 05 c9 | natd_hash: hash= 9f e3 12 70 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data df 4b d5 4e cf 64 0d 4d 4f 32 d9 61 e4 8d 05 c9 | Notify data 9f e3 12 70 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #354 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #354: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #354 to 4294967295 after switching state | Message ID: IKE #354 skipping update_recv as MD is fake | Message ID: sent #354 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-102" #354: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.102:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #354) | 72 4c 85 c6 74 09 42 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 1b e9 65 bc 73 bc c5 81 57 1a 7b 1b db 4b 3f | 32 d5 0d b7 6a 65 f1 0a 67 34 33 c1 2c 23 e5 f2 | 41 57 12 1f 62 7d 04 aa d4 c7 47 71 78 e8 f0 df | 48 86 0b 9f 4e 36 6e 72 bd ec 74 1b dd 83 0a ab | df 0b c7 29 5d 45 26 d8 31 4b 64 db c5 65 76 90 | cd 52 7e 2d 27 67 7a 01 34 ba b6 3f e3 9a 85 48 | e4 51 41 5f 21 41 ff 88 e4 cc aa c0 b6 13 70 92 | 13 45 bf db 76 ed 1c 31 eb 2b 1f af 38 c5 ca 82 | 0b fb bb d7 57 27 bd 26 60 cb 6b 22 18 4a df 09 | ae e5 bd 33 88 7d ef 21 1c 95 13 3d a5 02 60 08 | e7 d2 1b 72 0a 7b aa 01 9d 47 2a 4d 32 3f 9b ec | 5b 5a ea 31 68 bb 1a dc 15 be 3d d6 a0 c0 98 db | 7b 5b 3d 8f ce 9b 6c 43 56 11 be e1 16 78 07 0a | 06 29 bd c7 77 7e 17 95 3a 22 27 47 9f 23 32 f6 | 37 27 d0 b4 53 1e 36 9f c8 05 75 2f 68 c9 35 72 | da 2e a9 d1 44 f4 35 64 d4 0a 4b c0 71 73 52 a8 | 29 00 00 24 72 5c 82 6f 5d 6b bd 69 39 4b 52 31 | 75 ca 0e e7 64 bc 08 f8 b5 d4 6f 1f bc a5 fc 80 | 56 52 35 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 33 77 7a c0 93 c5 bf 78 5c 8c bc | 79 60 cc b9 7e aa 2e bb 00 00 00 1c 00 00 40 05 | df 4b d5 4e cf 64 0d 4d 4f 32 d9 61 e4 8d 05 c9 | 9f e3 12 70 | state #354 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb370012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb348018460 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #354 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 | #354 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49672.862777 | resume sending helper answer for #354 suppresed complete_v2_state_transition() and stole MD | #354 spent 0.479 milliseconds in resume sending helper answer | stop processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35001fd50 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 4c 85 c6 74 09 42 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #354 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #354 | rejected packet: | 72 4c 85 c6 74 09 42 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #354: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ced0 | handling event EVENT_RETRANSMIT for parent state #302 | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #302 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #302 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49672.869028; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003648 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350040840 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #302 | libevent_malloc: new ptr-libevent@0x7fb35001fd50 size 128 "road-eastnet-nonat-50" #302: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #302) | 9a b7 d9 69 b7 b5 8b 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 3b 38 5a ca c1 e0 66 18 62 3b 15 6c b6 3b d4 | d7 ad 95 64 47 60 48 b5 a1 40 89 ca 34 68 f4 5c | b5 12 b3 25 90 eb 49 eb b5 40 df ef 79 a7 f8 11 | fd 6b 8c b7 57 dd 67 6c a2 67 a7 4f be 73 1c 93 | d0 14 73 9b 52 53 0b 4e 5f f6 38 f3 b8 8b db d1 | 1c 9f 4f 10 7c 2c fa b8 0b 5c b4 6b 80 d0 b7 e3 | b6 70 3b 9c d9 ad f0 38 ba 59 1a 5a 32 60 56 90 | 00 97 ec 2a 32 4c ce 8c d0 a5 94 f1 33 fd e4 3c | bb e9 7f cc 0d 4c 4c be 2b f0 80 18 d5 0b e3 68 | da 32 8d 6f 53 ff 6f c4 bc c7 44 a5 1e 56 ed 9a | 22 1a 47 85 cc bb d8 71 12 33 c9 06 fb bd 86 04 | 8a 5e c6 10 00 05 dc db 1a ce ef c2 9a df 5b 3e | f1 94 44 f2 93 b5 45 ee f4 39 f1 54 d0 08 74 2f | 98 02 e6 14 93 d3 55 70 9b c1 5c 0a 6d f7 72 e9 | 7a 20 75 0d 8a 45 81 c5 cd 4a 79 7e 2a a7 cf ed | b9 84 dc 2f 1f b1 1b 47 62 4c ef 36 89 f7 2e e1 | 29 00 00 24 4e 70 94 e8 7e 52 b9 fd e3 7f cf aa | b8 11 eb 44 2a e9 8b 91 cb 46 0f b2 fd 17 ad 44 | 7e 6a 9e 6e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 54 86 00 1a 73 2d f1 8e 31 28 7e 7f | 4e 1d 05 b3 46 7f 2d d6 00 00 00 1c 00 00 40 05 | e4 ea 9a e9 78 75 4e 5e 40 77 76 74 52 35 fb 06 | 70 d7 5d cd | libevent_free: release ptr-libevent@0x7fb340030080 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ced0 | #302 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a b7 d9 69 b7 b5 8b 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #302 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #302 | rejected packet: | 9a b7 d9 69 b7 b5 8b 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #302: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0714 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aee080 | handling event EVENT_RETRANSMIT for parent state #329 | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #329 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #329 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49672.90038; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00286 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ced0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #329 | libevent_malloc: new ptr-libevent@0x7fb340030080 size 128 "road-eastnet-nonat-77" #329: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #329) | 19 44 0d 82 d8 18 b5 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 80 85 65 b3 ae 4b 6e fe 68 73 f2 b6 39 5a b1 | 5a f3 36 2e e0 44 7d b5 ef dd dd fc d0 35 5f bf | 0f f1 a8 56 0e fe 65 1a 64 97 d5 45 02 78 56 12 | 1d c5 a8 57 78 41 5d 67 f5 9c ac 0c ea 30 76 9f | d6 40 74 a9 16 ad b3 48 34 1d 1d 07 41 4e 7d ea | b4 15 07 22 a9 ac 8e c3 4d e5 f2 d1 ad d3 62 0d | 93 58 9b 58 67 7c fc 81 97 3b af 10 63 67 d9 86 | 45 ad 4f a6 97 2e 79 bd 48 03 5d 44 76 7f c4 9f | a3 54 a8 c8 d0 75 76 5f 1b 6c d2 e3 cc 1a fb de | f6 a0 df 0a e9 48 0b 88 3f b0 b9 04 79 1c 8b 83 | a2 11 a4 9f 9b f2 2f 13 89 0d e6 68 c7 78 af a5 | 8d 94 dc 9c 72 14 d9 47 8e b6 09 d8 6c bb 15 13 | 54 68 b1 04 b2 79 ae 72 17 9f ff 8d d0 33 2c 7a | b0 3e e8 0e e9 c9 f6 bd 41 a5 9d 71 93 9d e7 49 | fb 61 fa 0d 56 19 d3 32 c0 8d ba 0e 98 71 48 e0 | 2f 1a 52 9f c2 03 77 7a 8d 1e 4b 1c 30 c4 31 91 | 29 00 00 24 ad 58 5c 32 62 e5 13 15 63 fb 95 0f | de a4 7f f4 a1 1f b7 cf 95 c9 7b a8 76 d2 3e a1 | 6c d4 9d 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 38 9e 59 ae 71 c3 ed 6e 6e 92 c1 | 9f 33 f8 69 87 bc 1f 0c 00 00 00 1c 00 00 40 05 | 49 73 ae f4 7f e8 6a cf 37 86 5a 1d f5 77 0e ad | 19 ee 51 1c | libevent_free: release ptr-libevent@0x7fb38800c460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aee080 | #329 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 19 44 0d 82 d8 18 b5 00 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #329 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #329 | rejected packet: | 19 44 0d 82 d8 18 b5 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #329: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38000feb0 | handling event EVENT_RETRANSMIT for parent state #344 | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #344 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #344 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49672.906617; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003875 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aee080 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #344 | libevent_malloc: new ptr-libevent@0x7fb38800c460 size 128 "road-eastnet-nonat-92" #344: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #344) | 60 fe 47 d5 bc 7e ec f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 bf a8 75 45 e6 9b 9e 36 c4 f8 00 7b fa ed 16 | 45 48 19 73 f0 43 47 d5 85 f3 cd c8 97 6e 50 a8 | 7b 63 a3 ce ea 05 ae 44 e5 a2 e6 29 a8 16 bc 48 | 78 95 49 07 f7 17 ad 10 48 2e fd 23 74 21 44 c0 | b4 d3 48 b2 fb bc c3 28 df 8a d3 09 ec 63 04 28 | 7e 5a 51 87 52 03 32 ff 61 0c 39 ac c3 26 d9 35 | 88 8a 8d fe 64 9e 7c 7f c3 22 7b 8b 9e 96 8b 3d | b8 ef 81 b1 6a 3f 8a 50 49 73 5d ab 49 f3 99 5e | ad 5d e8 43 6f bd 70 02 a0 6f d4 12 c9 ee f2 55 | f1 fb cb 6e d0 ab 61 ad a4 39 c4 fa f3 3f c7 bf | 5f f1 ac db cc 36 aa 36 32 7b 50 a5 5a 12 e0 c2 | fb c0 54 26 8a e0 81 02 71 55 03 a2 11 c1 ce 2c | 62 50 df 4c eb da 5d 3d 81 bf 56 fd c4 6a 45 b3 | f3 c4 00 14 0a f0 d4 72 ad 8f 3b 97 e7 25 ea 81 | 48 23 bb ad 52 e9 90 df 74 31 fa 3e 85 2d 9b f0 | 97 f2 67 07 62 f1 e0 1b eb 9c 9b f7 2c 83 46 40 | 29 00 00 24 59 47 a1 36 35 51 2c e7 ec 59 96 c4 | c5 6a 0f fd 9f 62 7d 5e ad fa 8e 0f 35 43 8c 01 | 6a c9 a8 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 37 18 00 bf d4 a8 37 15 69 ae 4c | fc 2f e7 92 f0 22 70 f2 00 00 00 1c 00 00 40 05 | 33 e5 40 5c 05 2f 5b 7d e0 96 06 6b 07 18 0b d5 | ca 3f e3 4a | libevent_free: release ptr-libevent@0x7fb350014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000feb0 | #344 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 60 fe 47 d5 bc 7e ec f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #344 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #344 | rejected packet: | 60 fe 47 d5 bc 7e ec f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #344: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0747 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1aec0 | handling event EVENT_RETRANSMIT for parent state #103 | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #103 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #103 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49672.936987; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009142 exceeds limit? YES "road-eastnet-nonat-103" #103: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-103" #103: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #355 at 0x557d46a5fb50 | State DB: adding IKEv2 state #355 in UNDEFINED | pstats #355 ikev2.ike started | Message ID: init #355: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #355: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #355; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-103" #355: initiating v2 parent SA to replace #103 | using existing local IKE proposals for connection road-eastnet-nonat-103 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 355 for state #355 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb38000feb0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #355 | libevent_malloc: new ptr-libevent@0x7fb350014c70 size 128 | #355 spent 0.143 milliseconds in ikev2_parent_outI1() | RESET processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #103 ikev2.ike failed too-many-retransmits | pstats #103 ikev2.ike deleted too-many-retransmits | #103 spent 2.24 milliseconds in total | [RE]START processing: state #103 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-103" #103: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #103: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #103 "road-eastnet-nonat-103" #103: deleting IKE SA for connection 'road-eastnet-nonat-103' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-103' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-103 | State DB: deleting IKEv2 state #103 in PARENT_I1 | parent state #103: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #103 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3600300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1aec0 | in statetime_stop() and could not find #103 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-103 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-103" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-103' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-103" | stop processing: connection "road-eastnet-nonat-103" (in initiate_a_connection() at initiate.c:349) | spent 0.0974 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 18 resuming | crypto helper 18 starting work-order 355 for state #355 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 355 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 355 time elapsed 0.001253 seconds | (#355) spent 1.25 milliseconds in crypto helper computing work-order 355: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 355 for state #355 to event queue | scheduling resume sending helper answer for #355 | libevent_malloc: new ptr-libevent@0x7fb35401fd50 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #355 | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 355 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #355 | **emit ISAKMP Message: | initiator cookie: | 56 ed c8 71 de f9 06 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-103 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fc 2a 83 b1 26 56 49 8c fe 5f bd b2 84 ea a3 88 | ikev2 g^x a4 f8 b8 d9 ec 49 43 44 95 bd 12 f2 c5 21 82 10 | ikev2 g^x 03 69 98 1b 4a 24 1f ea 40 8a 0b 91 c9 76 5c 49 | ikev2 g^x d4 99 e0 74 0f 3f ee 6f 9e 53 54 1a 23 35 59 5a | ikev2 g^x aa 59 0d cf 6b cd 1c a1 eb 6c 98 6c 37 17 d0 f8 | ikev2 g^x 3c dc 93 d2 77 45 41 e8 99 25 82 ad 9d 55 e6 13 | ikev2 g^x c0 f1 0d 8b 61 04 8f 57 63 d5 98 2e 2e 99 6e 3b | ikev2 g^x 2e 7c 41 b8 5b 06 ba ad 18 18 aa 84 1a 4c 4a ef | ikev2 g^x 3b 6e c9 03 be ae 7b 01 5e 77 a6 2b 34 36 7e 21 | ikev2 g^x 7f c5 d3 9e 48 69 2b 5b 00 e3 c7 29 41 93 4a 4f | ikev2 g^x 3f 0c 86 c3 a8 9a b3 72 ca 66 fb a6 7b 68 f9 97 | ikev2 g^x 45 bd 92 5e ee 7e 28 d2 1e 8d 24 ad 5b 2c db 57 | ikev2 g^x 1e 74 10 aa 41 ab d2 f5 21 4c 56 2b c7 8f ce 5e | ikev2 g^x d8 69 da 43 89 31 85 08 6d d1 b2 1a 22 1c fe b0 | ikev2 g^x 36 38 83 b8 45 19 23 bb 71 3e 12 a0 c1 d4 c6 f9 | ikev2 g^x 92 4b 6b b1 a2 bb 20 eb ff a0 77 69 c4 c9 35 d8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c0 01 1a b2 54 fa cf 80 10 d0 f3 31 e6 0e 79 92 | IKEv2 nonce f9 e8 de f5 3e 1e d4 6a 54 e0 c2 2f 19 27 3a 66 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 56 ed c8 71 de f9 06 4a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 67 | natd_hash: port= 01 f4 | natd_hash: hash= 72 da f6 01 f4 40 01 a7 a7 77 b7 fc 3d b7 6f 1f | natd_hash: hash= f7 90 79 11 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 72 da f6 01 f4 40 01 a7 a7 77 b7 fc 3d b7 6f 1f | Notify data f7 90 79 11 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 56 ed c8 71 de f9 06 4a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d2 9a 8c 84 e0 9c 3f 77 ed a7 98 65 71 77 a0 dc | natd_hash: hash= b3 15 95 be | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d2 9a 8c 84 e0 9c 3f 77 ed a7 98 65 71 77 a0 dc | Notify data b3 15 95 be | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #355 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #355: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #355 to 4294967295 after switching state | Message ID: IKE #355 skipping update_recv as MD is fake | Message ID: sent #355 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-103" #355: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.103:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #355) | 56 ed c8 71 de f9 06 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 2a 83 b1 26 56 49 8c fe 5f bd b2 84 ea a3 88 | a4 f8 b8 d9 ec 49 43 44 95 bd 12 f2 c5 21 82 10 | 03 69 98 1b 4a 24 1f ea 40 8a 0b 91 c9 76 5c 49 | d4 99 e0 74 0f 3f ee 6f 9e 53 54 1a 23 35 59 5a | aa 59 0d cf 6b cd 1c a1 eb 6c 98 6c 37 17 d0 f8 | 3c dc 93 d2 77 45 41 e8 99 25 82 ad 9d 55 e6 13 | c0 f1 0d 8b 61 04 8f 57 63 d5 98 2e 2e 99 6e 3b | 2e 7c 41 b8 5b 06 ba ad 18 18 aa 84 1a 4c 4a ef | 3b 6e c9 03 be ae 7b 01 5e 77 a6 2b 34 36 7e 21 | 7f c5 d3 9e 48 69 2b 5b 00 e3 c7 29 41 93 4a 4f | 3f 0c 86 c3 a8 9a b3 72 ca 66 fb a6 7b 68 f9 97 | 45 bd 92 5e ee 7e 28 d2 1e 8d 24 ad 5b 2c db 57 | 1e 74 10 aa 41 ab d2 f5 21 4c 56 2b c7 8f ce 5e | d8 69 da 43 89 31 85 08 6d d1 b2 1a 22 1c fe b0 | 36 38 83 b8 45 19 23 bb 71 3e 12 a0 c1 d4 c6 f9 | 92 4b 6b b1 a2 bb 20 eb ff a0 77 69 c4 c9 35 d8 | 29 00 00 24 c0 01 1a b2 54 fa cf 80 10 d0 f3 31 | e6 0e 79 92 f9 e8 de f5 3e 1e d4 6a 54 e0 c2 2f | 19 27 3a 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 da f6 01 f4 40 01 a7 a7 77 b7 fc | 3d b7 6f 1f f7 90 79 11 00 00 00 1c 00 00 40 05 | d2 9a 8c 84 e0 9c 3f 77 ed a7 98 65 71 77 a0 dc | b3 15 95 be | state #355 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb350014c70 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb38000feb0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1aec0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #355 | libevent_malloc: new ptr-libevent@0x7fb3600300e0 size 128 | #355 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49672.939455 | resume sending helper answer for #355 suppresed complete_v2_state_transition() and stole MD | #355 spent 0.653 milliseconds in resume sending helper answer | stop processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35401fd50 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 ed c8 71 de f9 06 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #355 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #355 | rejected packet: | 56 ed c8 71 de f9 06 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 67 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #355: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0916 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #303 | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #303 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #303 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49672.948701; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003879 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #303 | libevent_malloc: new ptr-libevent@0x7fb35401fd50 size 128 "road-eastnet-nonat-51" #303: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #303) | 0b e0 0a 79 39 06 c6 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 24 21 b4 0b e3 09 db 3f b6 a5 77 bb 87 5e ad | 66 c7 93 9a 8c 2e 04 3b 08 20 ac 03 a5 76 12 ab | b6 66 99 c7 bf 97 92 b1 32 f2 d4 40 1d 20 9f 0b | 85 c0 47 40 73 82 3c 97 59 5e 7a bf 29 1b 9b 33 | 65 e1 1d e1 06 4b 23 bb cd c3 d7 6f 1f 4d 6a d4 | a5 35 47 13 70 43 5f 27 3f e8 8d 45 36 1b 13 e8 | 52 7a c9 fd 4e c5 bf df 1d ad 19 77 99 5f 83 de | fd ac 63 24 8e b6 c0 c8 ec b2 56 6f 38 d9 99 06 | 17 b7 7e be be 8d 7f 5c 2d b1 d6 35 c6 26 88 21 | 6c 47 69 c2 4b 86 0c 66 51 e7 f5 2d 4c fb e5 79 | 2e e4 ba 11 88 c3 1e d5 cd ce 6d 00 ed f9 6c 2a | 2b 8c 48 d8 fb b0 3c 63 91 8e ae 31 9b af bf 15 | 0b 41 67 9d 12 12 70 9c 8c c1 6a db fc d2 6b 50 | c9 fa d7 b3 18 db 4f f1 d7 45 f6 0f b9 6e 33 c9 | 52 60 cc f3 be 3c 22 f0 a3 35 db d2 db d6 a6 94 | 52 18 e2 de 57 43 68 d8 7b eb ec 67 cd ed 35 3d | 29 00 00 24 80 ff 8a 78 69 ce 7f 51 87 5f 84 ba | c7 a1 f0 8c ea cb 68 68 e4 3e 06 9f 5c 43 cc 06 | 85 44 5c 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 50 a2 4e fc 4d 1b 58 77 6d e9 3b | 74 ac 43 c3 0f 7e 66 e7 00 00 00 1c 00 00 40 05 | d9 44 30 c1 08 7f 7e c4 16 be af c3 f1 e2 c1 72 | 14 da 79 2d | libevent_free: release ptr-libevent@0x7fb3780300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #303 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b e0 0a 79 39 06 c6 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #303 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #303 | rejected packet: | 0b e0 0a 79 39 06 c6 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #303: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360012bf0 | handling event EVENT_RETRANSMIT for parent state #349 | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #349 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #349 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49672.951193; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500944 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #349 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 "road-eastnet-nonat-97" #349: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #349) | 84 94 92 07 09 8b 01 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e7 8e 3a 36 94 c3 d9 80 af 87 82 89 a3 71 41 9f | e6 44 09 3c bc 67 77 29 06 f4 ae 77 a3 9d 60 1d | 0a c3 1b 6a f7 b0 e9 13 94 a5 ce ce a7 52 56 d7 | 84 e9 4e d5 99 7f 7c fb f5 b7 93 ee 65 0d 15 55 | 04 2d a2 78 15 79 38 de 23 c4 7d 82 d0 7f 5f 98 | a6 33 cb b9 33 39 5b 48 a5 eb 5c 5c 81 d0 ca 8c | f1 d5 2b 41 d5 80 88 70 6d 08 d5 9e c9 be 4a d6 | 16 61 b8 6d a8 4e 60 a2 94 6c 33 db 5b 42 45 bb | 02 30 28 9a 37 b4 00 e3 81 c4 fd 79 89 1a f9 a5 | 2d 14 0f 8f c7 04 8a 63 e3 4c c8 23 59 80 dd 4f | 13 40 1c 8c 06 1f 4a 77 c9 3e 21 20 cb 58 47 cb | c0 5d 53 b2 99 fb 04 a7 a3 35 71 6b 00 88 75 8a | 99 0c dd 71 02 4e 48 62 56 32 bf a2 8c b2 87 7c | 45 a3 56 eb 30 b8 7e 62 54 0f 19 2a 8e 1f 1c bd | cc fa 91 16 33 60 18 c9 3d f1 ea d9 79 83 28 b3 | ee b8 50 9e a8 3a a5 db fe df 37 7d ce de f7 60 | 29 00 00 24 8e 8f cc b6 0d fd cb ad 0f 95 32 a9 | a9 4b b8 56 89 46 30 eb 8f f5 1c d9 09 ec 14 75 | 5c 37 d2 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea f1 98 2b 6b f5 c7 7c ec d8 88 00 | 36 4b b7 7c e3 5b 66 cb 00 00 00 1c 00 00 40 05 | 49 36 ed 90 92 0a 38 5a 43 cd 17 7a 90 9b e6 10 | 1f ed 97 63 | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360012bf0 | #349 spent 0.128 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 94 92 07 09 8b 01 c4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #349 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #349 | rejected packet: | 84 94 92 07 09 8b 01 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #349: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c046090 | handling event EVENT_RETRANSMIT for parent state #330 | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #330 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #330 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49672.961515; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002367 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #330 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 "road-eastnet-nonat-78" #330: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #330) | 93 2e 75 96 9e d6 58 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 2c e9 0f 22 91 df 5a 5b ae 3a 65 86 ba 44 9c | 65 4a 79 99 b3 fa 29 29 22 63 49 c3 6b 7a c8 2c | a6 64 55 77 51 a1 d2 b5 c5 ed b9 2b d7 c9 de d5 | 1f 04 ca d2 89 15 35 75 d9 05 25 47 aa 0c 65 5b | a8 0c 57 96 31 e9 78 a6 a3 87 ad 68 36 d2 a1 3b | 88 08 f8 2e 28 6b 99 4e 37 3d 68 42 7a f5 6a 2c | 92 3c 46 2d 02 18 a7 c8 61 9b 40 1b d5 74 a6 72 | 61 b0 45 d7 09 4c 08 2d 1e 0e 8d f9 eb 38 be 36 | 94 bc ee 43 6d c2 1a 9d c9 1b 4a 84 b6 50 10 54 | ae 45 14 8d 9a 31 50 76 61 37 da 64 1e 74 bc 11 | a7 13 ed 80 0f 85 3c d8 35 69 89 6d b4 6c ac f3 | 2f 4a 27 55 17 f4 f5 ce 32 75 dd b4 15 0b 7f 61 | e2 87 b3 bb e4 11 66 8c 15 79 6e d9 14 50 70 fe | f5 12 aa 90 f9 25 da 28 bc a5 c1 1c 8f 54 93 e2 | 5b 5a 53 f7 1c 97 4d 5c c4 f6 b5 86 3f 24 5b 64 | c4 87 cd 28 7a 3e ef 9f 68 95 6b f8 95 8d da 08 | 29 00 00 24 a1 af e5 97 d9 f1 9e 6c 80 91 ab 21 | 08 cf 38 0c a4 d3 fb b3 c7 37 98 b4 a4 0d 72 16 | de e9 9d 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 c9 48 f6 82 8f 0c eb 59 3f 42 40 | 18 2f 27 9b ca 1b 0e 80 00 00 00 1c 00 00 40 05 | 3e 48 b8 70 cf c0 9c 35 6c 64 bb e3 c7 5c 5e 43 | 1f 5c 26 91 | libevent_free: release ptr-libevent@0x7fb36c04b8e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c046090 | #330 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 93 2e 75 96 9e d6 58 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #330 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #330 | rejected packet: | 93 2e 75 96 9e d6 58 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #330: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384043260 | handling event EVENT_RETRANSMIT for parent state #257 | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #257 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #257 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49672.963842; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006455 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c046090 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #257 | libevent_malloc: new ptr-libevent@0x7fb36c04b8e0 size 128 "road-eastnet-nonat-5" #257: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #257) | c0 a3 3d d0 6b df 36 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 d4 14 bb a4 26 08 82 2e 68 9d 43 5b 83 0c 36 | 1f 55 d2 1d bf 09 8f 68 0a 80 73 cf b9 a3 3e fb | 4d 3a 5e 68 e8 aa 15 71 f7 e6 60 e6 9e 7c a9 b9 | e4 7c a0 fd c4 92 d3 66 8d 75 86 7f 7f 0a c5 42 | be bb d7 8c fb b4 ab fa c5 83 64 ff dd e6 56 27 | af 9a f1 86 53 58 3b 72 b7 e4 76 4e c9 2a af 68 | 0c 7e 9d bf 26 26 ae 59 6b f6 99 f5 1c 3d 32 4e | 8e a7 43 0e b2 0c 7f 5d ea 3a c0 50 3e 6f 7e 61 | fc 39 14 9d d7 51 ad 13 b2 22 e7 6c 3e 75 0f f9 | 50 5f 45 31 fb b6 64 15 77 12 e2 82 5e ea a6 ae | e9 ef 71 7b ce a0 63 c0 ec ed c4 35 36 4d 8b ac | a2 1c 05 95 aa 9f 05 c7 da bb 7e 2c 1b be db 0a | e1 a0 b3 b2 bf 79 ee 31 3e 48 4e 05 00 26 ce 87 | 2f 0f 18 80 43 59 d6 73 3e f5 b2 95 2a 4d b8 2d | f4 60 f9 1a 76 3c f3 63 33 e3 37 34 73 88 ed 64 | 6c a7 75 12 ca d0 e5 a3 5b 68 0d 46 dd d7 61 2d | 29 00 00 24 ee 5d 7d 66 4d 0b a2 50 89 9d 46 31 | 30 20 ae b6 b5 b0 95 a5 d1 00 de 3b e5 de 68 17 | ec 12 56 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 5f 0f 32 08 df d5 f3 1e 89 e0 00 | bf de 72 4a a1 a4 e7 89 00 00 00 1c 00 00 40 05 | 60 f8 1e fb ae 99 6b 12 d7 c7 12 5b 86 70 02 5c | 5c f6 f1 68 | libevent_free: release ptr-libevent@0x7fb384011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384043260 | #257 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c0 a3 3d d0 6b df 36 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #257 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #257 | rejected packet: | c0 a3 3d d0 6b df 36 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #257: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0685 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #304 | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #304 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #304 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49673.013195; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004484 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384043260 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #304 | libevent_malloc: new ptr-libevent@0x7fb384011f30 size 128 "road-eastnet-nonat-52" #304: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #304) | a8 9e ad f8 7e d0 8f 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 65 f7 e5 5b 0c d9 66 1f 9e de 27 b7 a9 e5 61 | e4 fa 1d ab 7c 97 a1 bd 20 9d f3 a2 b5 27 bd 1f | 8f a0 e6 70 97 5a a5 25 66 20 75 9f 12 5d d3 39 | 9b 63 a2 db 2b 74 35 c0 72 13 97 27 05 c2 62 b9 | e3 8d 4c df 62 26 b2 ef 71 4f 57 9f 86 a7 ae 23 | 96 73 f6 29 74 fa 2e d9 85 44 9e f4 6e a1 bf c3 | aa ee d5 e9 ef ed b7 f6 19 80 49 92 25 03 a6 fd | 97 ad 05 c1 4c ee d0 28 55 8e 3c fe 56 3a de 43 | 58 54 9b db 87 cd a3 da 37 73 a4 bf 3c b5 ae e4 | 24 52 70 fc 3d a8 8c fa 47 49 00 40 14 e1 2e ac | c2 2a 40 fe b6 ab ac c0 48 61 8f e7 d0 5a d3 f9 | ee 88 91 3d 36 46 3b a6 d1 44 56 83 2a 21 0b 8c | bf 71 69 ea 58 fa fe b7 82 58 cb 6d 26 3b 79 12 | d5 7b af 2b 0b 68 46 9e 23 40 da 39 fc 30 e7 9e | 96 5b ef fa 83 ac 69 ef e9 6f 36 21 f5 e9 e9 e7 | 28 93 fa 84 b2 62 19 86 19 c7 09 bf 96 a9 13 fa | 29 00 00 24 01 38 84 c9 86 37 f1 ee b2 c5 1a 16 | 9c 76 d6 78 f3 8e 1b 3e 7b e2 b1 ac 57 81 00 ff | be 40 7b 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 4d a8 e4 29 87 92 f9 c9 e0 47 d4 | 8d 2b 33 0e 7e 88 7a bd 00 00 00 1c 00 00 40 05 | 14 10 d4 5f c4 9e a3 33 92 fb 64 77 06 27 8a 6c | e3 d6 b0 88 | libevent_free: release ptr-libevent@0x7fb34800f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #304 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 9e ad f8 7e d0 8f 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #304 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #304 | rejected packet: | a8 9e ad f8 7e d0 8f 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #304: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.082 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #331 | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #331 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #331 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49673.026529; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002697 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #331 | libevent_malloc: new ptr-libevent@0x7fb34800f1a0 size 128 "road-eastnet-nonat-79" #331: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #331) | 50 44 b2 3a 07 a7 4e 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 5b 7a 1c 65 ca 17 c3 34 09 e9 50 2c 1a 5f 2c | 3f 1f d0 f4 a9 fc a5 0f b3 e0 23 18 36 32 e0 dd | 70 db 2b a7 8a bb 5e d5 7b c1 26 49 ed 17 f5 fb | 41 8c 70 b6 46 13 5b 7c be 72 85 64 1f cb c2 3b | 7b cd ab 00 d1 f5 c6 c8 ef 4e 43 8b d1 3c de 4e | 97 78 da c1 12 64 cb f5 74 cf 7b 2b a9 ae 8b a5 | dc d3 db 70 7b c5 17 1a a0 d8 61 49 40 f3 77 7a | 26 f5 d7 d4 fc a6 3c ec 56 96 bd ad fa da 9d 95 | 6f c7 43 12 03 de b3 4a 54 ca 56 3c b7 a8 38 f0 | 03 5a 39 ab 50 08 22 eb 87 c3 7d 6f ff ac b9 cb | 79 02 42 01 ae 8a 86 1f cf 39 34 00 58 b3 82 70 | cb f1 c5 9a 1b e0 1b 28 e5 0b 30 ab da 32 50 a9 | 39 71 a2 8b c0 a0 38 d2 35 39 8f d7 36 de a3 f4 | 70 e0 8f a8 7e 36 bd e7 03 3e dd 85 86 be 19 24 | 24 d5 8e aa 7b 0a 66 52 ff 44 f1 22 3a 93 2a 43 | b3 e4 83 93 f3 85 5b 68 a3 1b 91 5b 88 3f ae 95 | 29 00 00 24 03 6b b7 f1 e0 d0 ec 2f 89 98 41 7d | af 5d 2c 7f 97 af 10 99 b6 2e fe 6f ac 7d ce 98 | 66 f3 c3 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f b7 eb 6a 1a 1b 78 47 4b c9 5c d0 | 13 11 3d 6a 14 1b 4d ab 00 00 00 1c 00 00 40 05 | 4a 21 a9 91 28 88 ee e6 d7 a3 92 f2 91 f6 75 81 | f6 52 77 56 | libevent_free: release ptr-libevent@0x7fb36002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #331 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a77850 | handling event EVENT_RETRANSMIT for parent state #104 | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #104 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #104 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49673.026696; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.016461 exceeds limit? YES "road-eastnet-nonat-104" #104: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-104" #104: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #356 at 0x557d46a61110 | State DB: adding IKEv2 state #356 in UNDEFINED | pstats #356 ikev2.ike started | Message ID: init #356: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #356: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #356; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-104" #356: initiating v2 parent SA to replace #104 | using existing local IKE proposals for connection road-eastnet-nonat-104 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 356 for state #356 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4d5d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #356 | libevent_malloc: new ptr-libevent@0x7fb36002a950 size 128 | #356 spent 0.0712 milliseconds in ikev2_parent_outI1() | RESET processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 resuming | start processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #104 ikev2.ike failed too-many-retransmits | pstats #104 ikev2.ike deleted too-many-retransmits | #104 spent 2.65 milliseconds in total | crypto helper 7 starting work-order 356 for state #356 | [RE]START processing: state #104 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in delete_state() at state.c:879) | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 356 "road-eastnet-nonat-104" #104: deleting state (STATE_PARENT_I1) aged 64.018s and NOT sending notification | parent state #104: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #104 "road-eastnet-nonat-104" #104: deleting IKE SA for connection 'road-eastnet-nonat-104' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-104' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-104 | State DB: deleting IKEv2 state #104 in PARENT_I1 | parent state #104: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #104 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 356 time elapsed 0.000649 seconds | libevent_free: release ptr-libevent@0x7fb370035930 | (#356) spent 0.656 milliseconds in crypto helper computing work-order 356: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a77850 | crypto helper 7 sending results from work-order 356 for state #356 to event queue | in statetime_stop() and could not find #104 | scheduling resume sending helper answer for #356 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb34801fd50 size 128 | crypto helper 7 waiting (nothing to do) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 44 b2 3a 07 a7 4e 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #331 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #331 | rejected packet: | 50 44 b2 3a 07 a7 4e 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4f 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #331: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0457 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-104 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-104" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-104' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-104" | stop processing: connection "road-eastnet-nonat-104" (in initiate_a_connection() at initiate.c:349) | spent 0.0637 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #356 | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 356 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #356 | **emit ISAKMP Message: | initiator cookie: | ac bc fb 64 b8 05 f9 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-104 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9e 3b ae 20 ec 7a cd 21 f9 ff e0 06 71 c2 e5 55 | ikev2 g^x 9b 45 49 5f 50 f5 30 9c 0b 3e 8a a2 28 f4 85 c7 | ikev2 g^x 4f 6f 8c f6 77 7f 00 15 6e 19 1d d1 e0 68 66 87 | ikev2 g^x 4e df 9c 72 ac b2 8d ab fe f6 05 78 0d c2 c2 f2 | ikev2 g^x 31 63 92 17 54 19 b6 cf fd 16 6a d8 32 67 48 40 | ikev2 g^x 84 9f 47 99 c0 29 49 ad 8d 18 53 a5 6f ce c9 03 | ikev2 g^x 2a bd 3e e5 4f fd 0e 59 73 26 a7 73 de 18 dc 8d | ikev2 g^x 09 79 73 ae 09 17 25 e9 44 ce 32 60 cd df 52 37 | ikev2 g^x 66 e2 fc 8e a8 ff 6f bc 73 d9 a9 e6 7e 34 29 30 | ikev2 g^x c0 25 f8 37 35 6d fc d1 5a 42 45 e2 29 19 ad 5e | ikev2 g^x b1 89 0e dc 25 33 50 a2 38 82 4f ae e6 4f c3 97 | ikev2 g^x 55 76 c2 67 8a 3e ac 3d 84 f3 32 ca 54 cc 1c 9f | ikev2 g^x 23 91 a9 44 f4 93 a5 2a aa cc ed 04 01 4e eb f5 | ikev2 g^x 00 ac f3 c1 d5 2f 9a 43 89 cf f2 f2 55 7d 1d 3b | ikev2 g^x d4 57 90 a2 11 f9 23 83 ee a6 72 aa 3b 95 a5 9a | ikev2 g^x f2 6e 4c 51 df 03 55 77 ff 21 15 db 98 87 cc e3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 80 41 9d 85 d0 e1 49 10 c1 0f c3 d9 f1 36 ea c7 | IKEv2 nonce 60 65 b3 e5 0e 51 88 57 20 76 d9 47 30 46 2c b3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ac bc fb 64 b8 05 f9 58 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 68 | natd_hash: port= 01 f4 | natd_hash: hash= 21 1f 59 ee ab 85 d8 d4 4a d4 96 c0 ee 5f a4 59 | natd_hash: hash= 2f 4a 72 17 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 21 1f 59 ee ab 85 d8 d4 4a d4 96 c0 ee 5f a4 59 | Notify data 2f 4a 72 17 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ac bc fb 64 b8 05 f9 58 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 04 5f 5b a5 b0 c4 89 9e 39 c9 c6 97 69 9e e5 9e | natd_hash: hash= 19 14 82 3e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 04 5f 5b a5 b0 c4 89 9e 39 c9 c6 97 69 9e e5 9e | Notify data 19 14 82 3e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #356 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #356: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #356 to 4294967295 after switching state | Message ID: IKE #356 skipping update_recv as MD is fake | Message ID: sent #356 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-104" #356: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.104:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #356) | ac bc fb 64 b8 05 f9 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 3b ae 20 ec 7a cd 21 f9 ff e0 06 71 c2 e5 55 | 9b 45 49 5f 50 f5 30 9c 0b 3e 8a a2 28 f4 85 c7 | 4f 6f 8c f6 77 7f 00 15 6e 19 1d d1 e0 68 66 87 | 4e df 9c 72 ac b2 8d ab fe f6 05 78 0d c2 c2 f2 | 31 63 92 17 54 19 b6 cf fd 16 6a d8 32 67 48 40 | 84 9f 47 99 c0 29 49 ad 8d 18 53 a5 6f ce c9 03 | 2a bd 3e e5 4f fd 0e 59 73 26 a7 73 de 18 dc 8d | 09 79 73 ae 09 17 25 e9 44 ce 32 60 cd df 52 37 | 66 e2 fc 8e a8 ff 6f bc 73 d9 a9 e6 7e 34 29 30 | c0 25 f8 37 35 6d fc d1 5a 42 45 e2 29 19 ad 5e | b1 89 0e dc 25 33 50 a2 38 82 4f ae e6 4f c3 97 | 55 76 c2 67 8a 3e ac 3d 84 f3 32 ca 54 cc 1c 9f | 23 91 a9 44 f4 93 a5 2a aa cc ed 04 01 4e eb f5 | 00 ac f3 c1 d5 2f 9a 43 89 cf f2 f2 55 7d 1d 3b | d4 57 90 a2 11 f9 23 83 ee a6 72 aa 3b 95 a5 9a | f2 6e 4c 51 df 03 55 77 ff 21 15 db 98 87 cc e3 | 29 00 00 24 80 41 9d 85 d0 e1 49 10 c1 0f c3 d9 | f1 36 ea c7 60 65 b3 e5 0e 51 88 57 20 76 d9 47 | 30 46 2c b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 1f 59 ee ab 85 d8 d4 4a d4 96 c0 | ee 5f a4 59 2f 4a 72 17 00 00 00 1c 00 00 40 05 | 04 5f 5b a5 b0 c4 89 9e 39 c9 c6 97 69 9e e5 9e | 19 14 82 3e | state #356 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36002a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4d5d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #356 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 | #356 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49673.027965 | resume sending helper answer for #356 suppresed complete_v2_state_transition() and stole MD | #356 spent 0.315 milliseconds in resume sending helper answer | stop processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34801fd50 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac bc fb 64 b8 05 f9 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #356 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #356 | rejected packet: | ac bc fb 64 b8 05 f9 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 68 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #356: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378012bf0 | handling event EVENT_RETRANSMIT for parent state #345 | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #345 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #345 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49673.029096; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002247 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a77850 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #345 | libevent_malloc: new ptr-libevent@0x7fb34801fd50 size 128 "road-eastnet-nonat-93" #345: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #345) | cc 1b db ff 37 55 f7 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 67 e9 25 ad 99 4c 76 71 a1 a8 5d 6b de 51 32 | eb 5c 8d 84 1c 3d 17 6c c1 5f 62 71 5b 44 16 fb | e4 d2 85 4c 64 49 cc e5 df 14 a2 74 3d 7a c6 c8 | 61 7c 32 bd 88 6d 99 62 9c 43 b2 d1 2b 52 46 39 | c0 c1 fe 0b d3 8c b7 41 43 fa 07 e4 ca 66 08 b9 | e3 73 79 86 ee fe 88 31 4e 3f 00 50 43 af ba 2c | 0f 81 55 13 ff ba 58 17 5f 8e c8 12 2b 5c fa c6 | ef 92 c1 91 f7 d8 64 09 28 37 f9 29 29 da 06 11 | 98 a0 90 28 27 02 35 70 61 dc cd b3 af 6b a5 cc | 33 40 2b 71 fe b4 6e 27 bc 87 0b 2e 49 cd 22 6a | fe 62 e7 dd 24 a7 1f 41 fb 60 e1 86 0c 80 50 0b | a0 a0 c9 f7 8f 75 a4 e1 64 72 0c 28 9b b9 6c ed | 86 a3 26 05 ab b4 ae 03 ec cc ce 40 59 4c 63 89 | f5 0c b7 8c 77 de 51 59 14 48 7e 85 50 2b 34 5c | b7 79 6c 71 db 1b 6c 37 06 89 c8 05 98 a4 3e 07 | 39 20 3f 60 a2 a7 3c 0b 2f 8f 18 e7 35 c0 2b f1 | 29 00 00 24 20 33 be 81 19 1f 5e fe 6d 68 36 2c | 95 1b cf 17 03 6e cb aa fd 3d 3c 1f 01 7c 3e 25 | c7 e0 c9 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 24 83 28 6d 9e 08 a8 13 dd 36 c1 | 4e 58 4a c0 e0 a3 35 28 00 00 00 1c 00 00 40 05 | 65 c0 95 0a 9d 33 80 de 00 4a d8 7a 37 18 f6 5b | 66 48 2b 46 | libevent_free: release ptr-libevent@0x7fb348014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378012bf0 | #345 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 1b db ff 37 55 f7 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #345 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #345 | rejected packet: | cc 1b db ff 37 55 f7 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #345: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6e010 | handling event EVENT_RETRANSMIT for parent state #258 | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #258 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #258 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49673.032351; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005135 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378012bf0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #258 | libevent_malloc: new ptr-libevent@0x7fb348014c70 size 128 "road-eastnet-nonat-6" #258: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #258) | f2 0a ee 39 57 38 66 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 84 a5 7f 13 c6 d5 f4 de a1 59 9b a0 a0 80 f1 | 2f 8b 06 61 d1 0f de 44 77 49 a3 76 3f 11 11 d4 | ab 9b 3e 8d 7f a0 dc 2b 42 28 86 6f ac 5b b2 c2 | 4e 03 12 4c 72 0a d1 f2 0b 69 dc 3f 47 15 b3 66 | 0b ed 38 4d 89 9d b6 26 e5 44 a2 c8 18 05 1d ea | b9 5a 63 00 12 16 1b 15 c7 6e b8 4d 60 58 cc f0 | 35 6e d0 c1 0c 7a 3b 52 20 a4 ce 3e e5 c0 cc 56 | 65 b1 16 d6 43 c2 be ea b5 3f 07 6c 04 df 3c 27 | ca 5b 39 2e f2 76 09 d5 9a 31 cd f8 a0 9b 56 3c | 42 b3 87 82 b1 01 3e ef 89 15 5a 1d 00 90 84 19 | 5b 3d 7c ec 45 07 76 99 d3 04 39 db f5 94 ae 9f | 9a 24 93 91 e4 3f ad 43 d2 f2 74 b3 73 89 3f f4 | ac 15 1c 07 3d d0 3a 58 a4 bb b4 b2 b0 c3 65 db | c7 15 7a 2b b3 96 c2 16 55 b0 f5 86 dd bf d9 cf | 01 e1 ae 2e 78 f6 40 62 df cc 04 cf 9d bd 05 f9 | 5f ef 7a 44 a4 51 1c 3a 9b b4 7d 0d 94 46 3e a1 | 29 00 00 24 25 6d bb 73 f8 76 14 9e e8 94 3a 77 | d7 da 85 ed f6 46 fc 67 4e bb 29 38 0b 6c 4c 96 | c6 a5 48 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da 43 d0 a7 5e 1e 6a 3c 4c 0b bd b4 | fc 0a 0a d4 c2 f3 96 56 00 00 00 1c 00 00 40 05 | 20 be 8b da 4d a1 7e 30 5a c5 49 1f 20 a4 27 d3 | b3 85 6c 0e | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6e010 | #258 spent 0.099 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 0a ee 39 57 38 66 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #258 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #258 | rejected packet: | f2 0a ee 39 57 38 66 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #258: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #350 | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #350 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #350 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49673.034626; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500639 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6e010 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #350 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 "road-eastnet-nonat-98" #350: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #350) | 40 3f 8a 6a 3f ea 6b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee ea 5c 1b 2d cc 1b 57 9c 51 33 ce c2 ed 39 3b | d5 b7 1c c2 6d 3d 6f 5f ba 5c 85 39 fb a1 11 1d | ec 11 21 bd c2 b6 25 81 4a 85 2d 0f 85 73 9e fb | a1 4c 57 38 85 7e 31 44 0a 93 0c da 6d f0 93 22 | ea f6 8a 91 67 64 50 56 68 c0 c2 6d f2 4b e0 19 | 4b 14 40 46 ec 4d e3 7d d1 0f 0b 72 f6 ab 45 80 | 03 a2 d3 a8 ff e3 ae 4e 7b 0a 5c 1e da 4a b5 ed | 95 94 b9 4b 3c c2 85 4e cd 4a 91 b6 1f 72 c1 aa | c6 85 8f ca 28 3b ab 17 e7 f1 83 c4 ae 08 27 14 | 18 32 e7 a1 65 f1 da e5 f8 9c a1 45 4b c6 41 38 | 3d f5 8c c5 56 e5 06 ff b3 a3 fd f2 89 c2 8c 0e | 41 65 f9 6f e4 16 5e 64 06 38 6c 0e 32 c8 d5 26 | 50 db 25 f3 e4 e0 37 8b 04 62 7e a1 89 aa 8e 24 | 47 48 9e 92 05 5e 29 4c b7 2e ed e9 6d 8a 54 a2 | 85 8b e4 f5 76 e6 c8 0e c4 53 cb 98 41 4b 77 41 | 74 9f 3a d4 11 79 37 50 cf fb e2 04 ed 15 0c fe | 29 00 00 24 03 ee f5 21 ef 32 aa b5 bd 88 40 59 | 47 cc 90 0f 4b 5f 82 19 9f 96 a8 bf f3 8c 9d 85 | 66 d4 51 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 b2 cf 38 e9 ab 0b d5 10 0e c3 6c | 99 ae 6e 40 7a a8 97 3d 00 00 00 1c 00 00 40 05 | f6 5d 8e f9 dd 59 4b 5a 6d 88 5a 23 64 29 55 dd | f6 46 db 31 | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #350 spent 0.0923 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 40 3f 8a 6a 3f ea 6b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #350 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #350 | rejected packet: | 40 3f 8a 6a 3f ea 6b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #350: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c012bf0 | handling event EVENT_RETRANSMIT for parent state #332 | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #332 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #332 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49673.085897; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002564 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #332 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 "road-eastnet-nonat-80" #332: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #332) | f6 c6 d2 5e ba a8 2a f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 1a 55 0f 26 2f b6 a0 08 51 81 5d b7 71 b9 2d | c5 80 10 57 cc 9f 39 cd 78 f5 33 cd 29 d9 74 2d | fd fd 10 79 da 5f 98 34 d3 3d e4 28 2e 71 42 b8 | 31 90 4d 52 c2 47 b7 94 df 57 9e 16 03 38 42 c0 | 07 fe 24 67 18 0a bc 2f be 06 80 3f 3f 52 ae de | ee ce 07 d7 03 01 92 16 62 42 5c 77 dc 87 62 e2 | 3a dd 16 7d 8f 37 3d c8 ba 22 d8 ef 9b 9d 2a 3d | e0 2c 5c 39 14 07 d4 e9 80 bd 41 35 a2 65 f5 06 | d6 66 0e 9c 09 15 5b 2c 90 ec 66 68 2a aa 32 c8 | f4 e9 0e 83 19 df 87 aa b7 d2 50 b1 70 7c e8 1d | 69 9d 8f db 7f c7 e2 b0 71 77 37 93 72 6b 02 1f | ff 20 a4 e2 5f 72 65 e8 93 2e 78 8f 02 5c 26 b8 | d6 41 94 30 c6 30 1d fb 21 2d 70 c7 a4 c4 37 64 | d1 d0 93 45 ae 86 94 3c ef 88 96 54 5d 14 dc 13 | 82 20 c0 68 d6 ce 1b eb 97 51 ea 00 31 01 9f 99 | 9c 00 ca 7b c6 e3 21 ad 8a 48 45 1f d8 69 47 47 | 29 00 00 24 92 2b 4a ab c7 31 ef e2 7b 94 b4 08 | 46 bc 96 1f c5 de 4e 6b bb 45 28 4b ff e0 00 6e | 79 8b 88 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 fd 6f fe 83 1d 32 21 59 ad 4f 6d | 1b 98 f5 b3 09 7a d7 45 00 00 00 1c 00 00 40 05 | f2 d1 58 ca ab 44 6f 50 93 d1 3e f5 88 73 05 cc | 3b a4 3c c0 | libevent_free: release ptr-libevent@0x7fb34c014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c012bf0 | #332 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 c6 d2 5e ba a8 2a f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #332 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #332 | rejected packet: | f6 c6 d2 5e ba a8 2a f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #332: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c012bf0 | handling event EVENT_RETRANSMIT for parent state #305 | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #305 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #305 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49673.089187; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005412 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #305 | libevent_malloc: new ptr-libevent@0x7fb34c014c70 size 128 "road-eastnet-nonat-53" #305: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #305) | 0e ad 9d c2 5e 8b 6a 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f e9 9f 5a 6d 09 7a 5d 23 c1 f2 37 ec ac 20 ff | 0b 05 30 7f 53 42 af cd 03 b4 6f 3e 30 98 76 c7 | f6 6d 6d 12 6f 8b e0 b3 ea 9f 1c 72 a6 90 d8 7b | c5 96 6d 18 3e 75 5f 76 31 a1 d4 8e 3c 37 16 33 | 4b dd 74 20 e8 c4 62 66 2a 3f ae 2f 41 fd 91 9d | 82 99 62 7a b3 d1 ba 05 ec 0f 82 e6 50 45 b8 02 | a6 bb b5 5a eb 4b 5a 37 8e aa cf ae a4 3c 1d 53 | 50 52 15 71 96 99 84 38 c8 90 39 55 a5 f6 b3 e4 | fd 1f be 6b e2 f1 ec 6b de 7b d5 b2 c2 99 77 3a | 99 91 64 fd 16 0c de 9a 77 95 51 ab fa 63 18 46 | 7f 05 f1 01 08 4a 40 52 ce 73 f7 5e 69 b6 5a cc | 4f 80 84 49 75 3b fb a8 21 4b 60 95 55 81 f4 0d | cb 05 bd e3 26 c4 5a 85 f3 a4 be ed 0d bf dc 15 | 6d 89 c4 7e 34 fc cc cd 95 5c 1d d7 12 73 97 3c | b9 13 4a ef 01 3e 06 0d bc ac d0 d1 a5 d2 76 b5 | 0f e8 f3 1a 11 93 b0 3e ca db 92 a3 66 d7 f8 e1 | 29 00 00 24 f3 38 4c 4d 23 45 96 5c 15 55 c7 5a | 82 60 67 82 ca 1f 2d 10 e7 40 18 d9 8a a9 22 da | 5f 97 93 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 2a f3 b2 21 79 dc dd 37 78 74 cf | d5 e0 cd fd 06 29 e6 7b 00 00 00 1c 00 00 40 05 | 89 f1 13 5f 51 69 37 8e 62 27 27 24 a2 bd 48 85 | 3c 78 e4 8e | libevent_free: release ptr-libevent@0x7fb384015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | #305 spent 0.092 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e ad 9d c2 5e 8b 6a 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #305 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #305 | rejected packet: | 0e ad 9d c2 5e 8b 6a 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #305: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0553 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11600 | handling event EVENT_RETRANSMIT for parent state #105 | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #105 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #105 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49673.098475; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.0061 exceeds limit? YES "road-eastnet-nonat-105" #105: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-105" #105: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #357 at 0x557d46a626d0 | State DB: adding IKEv2 state #357 in UNDEFINED | pstats #357 ikev2.ike started | Message ID: init #357: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #357: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #357; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-105" #357: initiating v2 parent SA to replace #105 | using existing local IKE proposals for connection road-eastnet-nonat-105 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 357 for state #357 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c012bf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #357 | libevent_malloc: new ptr-libevent@0x7fb384015370 size 128 | #357 spent 0.0709 milliseconds in ikev2_parent_outI1() | RESET processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #105 ikev2.ike failed too-many-retransmits | pstats #105 ikev2.ike deleted too-many-retransmits | #105 spent 2.49 milliseconds in total | [RE]START processing: state #105 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-105" #105: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #105: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #105 "road-eastnet-nonat-105" #105: deleting IKE SA for connection 'road-eastnet-nonat-105' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-105' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-105 | State DB: deleting IKEv2 state #105 in PARENT_I1 | crypto helper 8 resuming | crypto helper 8 starting work-order 357 for state #357 | parent state #105: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 357 | stop processing: state #105 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb340040790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11600 | in statetime_stop() and could not find #105 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-105 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-105" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-105' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-105" | stop processing: connection "road-eastnet-nonat-105" (in initiate_a_connection() at initiate.c:349) | spent 0.0567 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 357 time elapsed 0.000598 seconds | (#357) spent 0.596 milliseconds in crypto helper computing work-order 357: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 357 for state #357 to event queue | scheduling resume sending helper answer for #357 | libevent_malloc: new ptr-libevent@0x7fb34c01fd50 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #357 | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 357 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #357 | **emit ISAKMP Message: | initiator cookie: | 01 73 53 b2 ed 0d 4f 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-105 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 71 5d e8 51 f8 88 2e 8f 82 b3 f0 c5 8d a9 64 a4 | ikev2 g^x a0 30 bf b5 c2 12 6f 84 86 c4 e5 7c 43 ef 90 df | ikev2 g^x 5d 9c 5c c9 94 45 36 f4 9a c7 87 0d ff 17 4f a4 | ikev2 g^x bd 30 02 23 c4 49 d7 cd 90 90 63 b2 f0 74 82 ef | ikev2 g^x 7b ab 5b 1a 9b 56 e3 fd 6b c1 60 57 a4 3d 47 37 | ikev2 g^x cf 84 69 51 e7 0c 33 60 a6 88 c6 d3 40 f2 c0 67 | ikev2 g^x 8b b5 93 bc 89 96 e7 49 3d 16 a4 fa 47 99 08 bb | ikev2 g^x bf 76 ad cc b2 29 51 14 b3 93 c1 93 70 ab fa 85 | ikev2 g^x 9c 87 13 3b 74 20 3c a9 9f e8 37 97 e1 cf 3a 19 | ikev2 g^x 47 ba 4f bf 93 41 7a fe 94 33 ee 81 fb be 0f 8d | ikev2 g^x 00 a6 62 b8 8f 57 b3 51 57 ec 11 f0 29 c2 98 0d | ikev2 g^x c4 d2 cf 4a 38 f9 e9 bb 93 44 3a af 7c 9c 77 58 | ikev2 g^x 65 26 12 0d 96 b7 42 97 54 c0 ec f8 c4 63 9f c0 | ikev2 g^x 21 fc 89 98 11 d0 25 94 6e 52 89 6d 61 9b 1b e0 | ikev2 g^x 4a d8 54 ed 06 da f5 4b d3 dd 7c 2c 10 b9 6d 1c | ikev2 g^x a3 ef f1 ff a5 e4 02 74 f7 b0 97 d7 72 10 8b a3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2c c1 df 10 e0 1b 6c 08 e6 87 0f da 7b 1d fc 5a | IKEv2 nonce dc 06 9f d4 9a 8b 4f 0e 09 60 b7 78 83 2e 36 39 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 01 73 53 b2 ed 0d 4f 2a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 69 | natd_hash: port= 01 f4 | natd_hash: hash= be 3a 2f 62 a9 83 16 c4 9b 57 fc 3c bc 9e d0 29 | natd_hash: hash= 41 57 58 a4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data be 3a 2f 62 a9 83 16 c4 9b 57 fc 3c bc 9e d0 29 | Notify data 41 57 58 a4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 01 73 53 b2 ed 0d 4f 2a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 08 0b c8 d5 d5 c0 e6 e6 c4 8a f3 fb 5c 3f c5 0a | natd_hash: hash= 4e c8 f0 d0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 08 0b c8 d5 d5 c0 e6 e6 c4 8a f3 fb 5c 3f c5 0a | Notify data 4e c8 f0 d0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #357 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #357: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #357 to 4294967295 after switching state | Message ID: IKE #357 skipping update_recv as MD is fake | Message ID: sent #357 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-105" #357: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.105:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #357) | 01 73 53 b2 ed 0d 4f 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 5d e8 51 f8 88 2e 8f 82 b3 f0 c5 8d a9 64 a4 | a0 30 bf b5 c2 12 6f 84 86 c4 e5 7c 43 ef 90 df | 5d 9c 5c c9 94 45 36 f4 9a c7 87 0d ff 17 4f a4 | bd 30 02 23 c4 49 d7 cd 90 90 63 b2 f0 74 82 ef | 7b ab 5b 1a 9b 56 e3 fd 6b c1 60 57 a4 3d 47 37 | cf 84 69 51 e7 0c 33 60 a6 88 c6 d3 40 f2 c0 67 | 8b b5 93 bc 89 96 e7 49 3d 16 a4 fa 47 99 08 bb | bf 76 ad cc b2 29 51 14 b3 93 c1 93 70 ab fa 85 | 9c 87 13 3b 74 20 3c a9 9f e8 37 97 e1 cf 3a 19 | 47 ba 4f bf 93 41 7a fe 94 33 ee 81 fb be 0f 8d | 00 a6 62 b8 8f 57 b3 51 57 ec 11 f0 29 c2 98 0d | c4 d2 cf 4a 38 f9 e9 bb 93 44 3a af 7c 9c 77 58 | 65 26 12 0d 96 b7 42 97 54 c0 ec f8 c4 63 9f c0 | 21 fc 89 98 11 d0 25 94 6e 52 89 6d 61 9b 1b e0 | 4a d8 54 ed 06 da f5 4b d3 dd 7c 2c 10 b9 6d 1c | a3 ef f1 ff a5 e4 02 74 f7 b0 97 d7 72 10 8b a3 | 29 00 00 24 2c c1 df 10 e0 1b 6c 08 e6 87 0f da | 7b 1d fc 5a dc 06 9f d4 9a 8b 4f 0e 09 60 b7 78 | 83 2e 36 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be 3a 2f 62 a9 83 16 c4 9b 57 fc 3c | bc 9e d0 29 41 57 58 a4 00 00 00 1c 00 00 40 05 | 08 0b c8 d5 d5 c0 e6 e6 c4 8a f3 fb 5c 3f c5 0a | 4e c8 f0 d0 | state #357 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb384015370 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c012bf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #357 | libevent_malloc: new ptr-libevent@0x7fb340040790 size 128 | #357 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49673.099603 | resume sending helper answer for #357 suppresed complete_v2_state_transition() and stole MD | #357 spent 0.317 milliseconds in resume sending helper answer | stop processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c01fd50 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 73 53 b2 ed 0d 4f 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #357 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #357 | rejected packet: | 01 73 53 b2 ed 0d 4f 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 69 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #357: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344018460 | handling event EVENT_RETRANSMIT for parent state #351 | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #351 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #351 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49673.1298; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500319 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11600 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #351 | libevent_malloc: new ptr-libevent@0x7fb34c01fd50 size 128 "road-eastnet-nonat-99" #351: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #351) | de 65 5f af ec 9c 14 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 61 44 ff 3b 7e 79 78 30 98 a5 1d ec cd 39 0f | a6 1b 66 bf d1 4c f4 43 49 5b 37 74 a3 cb a8 c4 | 02 cd b2 04 1f 9b 50 46 08 d0 17 33 f5 19 85 e1 | a2 5a 8d ef 3b 1f 98 53 d1 3d 4a 2f ac 4f 19 d0 | 75 e8 7a 46 60 ff e1 45 61 55 45 47 1e ee 0e a7 | 97 fc 88 fd 13 ff 6e 23 a4 a1 77 61 b8 b4 8c fd | 22 67 ad f7 22 ca bf 94 41 28 f0 31 09 ce da 26 | 10 fa 8e 66 f4 04 b3 cf 07 07 c2 53 27 d6 cc 39 | 2e fc 33 61 76 a3 a9 c9 4a 2e 0c b9 d2 ce 1e 75 | 25 69 23 a7 b0 58 cb 85 2c 74 fd 6d 3e 51 8a ff | 12 ff 22 b0 95 e5 25 84 fd 26 ce 3e 10 f5 db d4 | fe ab 71 45 0f 50 b9 5c e4 ab 89 ce f3 bc f0 b4 | b1 6f 9b 78 15 e0 b4 c0 f6 ed 55 2b 17 d3 9e 21 | ed d2 5e 21 58 74 e4 d8 96 cd 20 e3 10 b4 fa 8b | 7f 1f 1a 01 c5 db 60 d3 81 25 a3 55 50 d2 42 6d | 88 7f 5d 84 22 e5 ff 47 18 aa ac 46 b6 f6 e6 e3 | 29 00 00 24 5e 0c 91 cb 9e cc c4 3b ec b3 88 06 | 52 11 4c 47 a6 59 04 4b 44 ce c4 33 03 72 36 ef | b1 45 a0 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 90 e3 e4 9d 06 64 22 91 ff 91 cd | 3f cb ba 24 72 7e a3 02 00 00 00 1c 00 00 40 05 | 98 60 2c ab 59 ec de c3 24 7f bd 6f 4e 02 75 9a | 41 d6 b1 3b | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344018460 | #351 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 65 5f af ec 9c 14 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #351 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #351 | rejected packet: | de 65 5f af ec 9c 14 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #351: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a94500 | handling event EVENT_RETRANSMIT for parent state #259 | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #259 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #259 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49673.134122; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004965 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344018460 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #259 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 "road-eastnet-nonat-7" #259: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #259) | 69 c4 5c 94 f6 f0 24 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe b3 f9 68 3e 85 57 5d 74 26 b7 37 f5 c1 1c c8 | a9 30 6a e1 51 a4 0f d5 ca 35 4b e9 d0 ec d0 ea | 11 06 1a ad 0a 7c 08 a4 ce 70 10 ef b2 c9 82 43 | 06 fb 99 b0 99 d2 5d a2 87 5b cd a0 9b 7d 7a a3 | 30 f9 78 c0 d7 43 6f f3 cc 53 5a 43 25 d8 61 04 | 58 03 b6 71 c6 21 93 59 b3 7c 3f 84 50 6d 48 95 | ef b8 dc 96 69 dc 88 98 10 47 21 0a 3d 72 57 34 | e5 bd d9 b3 4a 55 2e bb 34 64 f1 be 1c 6f f2 7e | c5 4b 83 c8 2c d8 e9 41 02 95 ff 83 96 69 c2 56 | 98 1b 20 30 7a bc 8b ab ee 27 a0 89 22 93 25 c7 | d2 f1 b0 c8 12 06 e6 8d 9a d7 bd fc 06 14 66 23 | 65 ae e6 9e 37 44 0c f0 0e 0e 78 09 b8 a3 32 c3 | c6 25 1b 97 0b 77 db 90 b8 16 58 5f 15 d2 40 fe | 1c d0 5e e3 88 05 3b ef bc 19 2c a9 73 97 03 9a | 26 fc 47 8b 95 24 fe d4 39 f2 65 5a 9f ee 0c cf | 1a 9b 03 45 52 42 61 4d b6 e7 aa 2c 0c 37 c0 61 | 29 00 00 24 c4 2f 3e 0e 76 3e 59 e7 3e 5c 53 28 | 43 02 fc a9 7a 2b 47 13 2c c2 eb 53 3e b5 40 d1 | 94 dc e6 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 85 30 eb 64 9e 84 09 e0 70 76 01 | 65 fa d3 ac 84 56 a3 b4 00 00 00 1c 00 00 40 05 | 64 83 da b1 99 b6 d9 28 72 08 34 2c 77 b4 36 a0 | 74 09 78 83 | libevent_free: release ptr-libevent@0x7fb35804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94500 | #259 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 c4 5c 94 f6 f0 24 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #259 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #259 | rejected packet: | 69 c4 5c 94 f6 f0 24 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #259: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0402 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354018460 | handling event EVENT_RETRANSMIT for parent state #346 | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #346 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #346 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49673.136371; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001145 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94500 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #346 | libevent_malloc: new ptr-libevent@0x7fb35804b850 size 128 "road-eastnet-nonat-94" #346: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #346) | 5b 73 99 01 85 6b a6 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 41 a4 66 03 78 2f 0c ac 28 0c 6f a0 f5 98 a8 | ad fe 06 fd 8c a4 d4 c6 03 17 f9 3c ee f7 59 ef | a4 19 f6 d6 98 a9 45 18 c4 fa 1a 04 5e 12 ad 25 | a2 eb 73 ff 50 f7 5b d9 ac 0d a3 60 63 86 dc 11 | 24 c2 5c cb 2a 8c 8f dd 11 7a 54 9c db e5 07 72 | 1d 04 b8 06 80 b0 2c 7d 70 61 0f 2e ec 51 90 ed | 50 75 e9 44 ba 97 aa c3 93 f0 e7 8e a0 59 5a ef | f5 79 47 07 02 c6 5c 62 a1 be 60 af ef 55 0d f9 | 00 ac 18 13 2d 62 0e 5a 5f 40 32 8a 49 30 5f 84 | 37 da 16 c6 63 1e a6 4e a5 65 94 59 c6 7a b2 c5 | 75 c7 8f 68 de d4 77 8e 92 40 c9 5c ee b4 80 ea | 42 78 86 4f 14 c5 47 55 13 d1 41 8b fd ef 2c 61 | b8 ff 39 92 97 ea a2 69 91 9d 1f f6 fd bd a6 d6 | 98 cc 57 23 b2 ed be c2 71 55 a4 d5 18 54 fe df | 4d ab de e9 5b 44 57 81 1d 33 6c d4 fe 06 43 32 | b0 07 7c ba 8d 9c bd 13 85 9c b0 70 80 5b 02 74 | 29 00 00 24 86 39 a6 9d e4 88 31 1e 1a 48 0c df | 5d 51 c2 7f eb 35 e1 75 45 71 5e 9b 45 ec 98 56 | 3e 47 8a 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 d4 6c 5c e3 02 f1 ae 0d a6 ae 25 | 4a 2c de d9 71 00 3f 70 00 00 00 1c 00 00 40 05 | 9a e2 a2 47 57 d0 42 27 78 4a 19 6f 7e 1c 29 7f | 7a 88 26 9b | libevent_free: release ptr-libevent@0x7fb36401e1e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354018460 | #346 spent 0.0873 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5b 73 99 01 85 6b a6 c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #346 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #346 | rejected packet: | 5b 73 99 01 85 6b a6 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #346: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0404 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350018460 | handling event EVENT_RETRANSMIT for parent state #333 | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #333 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #333 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49673.150623; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00248 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #333 | libevent_malloc: new ptr-libevent@0x7fb36401e1e0 size 128 "road-eastnet-nonat-81" #333: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #333) | 36 9c 5e f3 7a 54 db f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df 35 02 78 fc 13 18 22 30 0e d2 c5 c7 5e 7a ef | fc 39 68 66 58 1c a7 d7 f4 43 08 7d f3 9f a3 12 | 83 85 91 2a d6 fa cf 49 c5 3a 4e ef 94 c1 54 16 | 1b 99 b1 a6 48 34 1c b5 c6 ee 58 e5 e4 3c 00 8c | f6 ed dc dd 07 96 4c 6b 8d 5f aa d5 5e f5 20 2e | 3f 32 89 26 7f 4e af 1e 9a 4a 36 89 bf ed bc fa | 5a d9 0b e6 38 d4 55 02 b6 04 ba b9 b2 30 b0 dc | ee 4b 24 b9 ca 12 84 2f 34 21 e3 1c 0e f7 c4 d5 | ce ff 47 39 50 96 0a de ca 62 7f b7 57 aa dc 15 | fa 24 df 17 c7 d0 80 14 18 ef d1 f8 18 5f 36 22 | 2a ba 77 eb 0a 13 5b 8b 27 f6 fa ad 95 0f 09 90 | 17 80 57 73 91 84 22 c2 f7 e1 0e dd b5 d9 e2 7e | 44 ff ae 13 c1 78 7c 90 56 b5 79 a1 5d 2f 9a 4e | 56 4b 74 fa 8f 64 20 07 77 6a 9d cf 03 50 e4 f8 | 0d 1d ad 75 e0 c0 52 df 18 df 4e ac 10 5a bf 8c | 35 df 7e 38 e0 d8 bf ff 6f 7d 3a 37 d3 86 c3 73 | 29 00 00 24 0e 6c f9 b7 77 8c 01 48 47 c0 c4 ac | 2c 92 5d 4f bc 4c de 69 52 73 e8 16 78 88 9e ed | d3 2e 55 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 3c 0e c8 f8 59 38 94 13 7f 9d fb | 64 4c f1 0b 3e 49 1c bd 00 00 00 1c 00 00 40 05 | 19 5d c9 52 f0 58 98 88 cd 4a c6 e4 d4 78 0a 3b | 9f f4 40 6f | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350018460 | #333 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 9c 5e f3 7a 54 db f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #333 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #333 | rejected packet: | 36 9c 5e f3 7a 54 db f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #333: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #306 | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #306 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #306 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49673.167939; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004526 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #306 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-54" #306: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #306) | fd d2 63 50 0e 6e 1e 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc f6 1e 22 b4 91 3a 68 1f d1 67 6d 28 c8 f1 bf | e2 6e 14 07 e3 24 35 86 32 c0 3d 31 76 0e 87 74 | f9 3c 48 85 fb a5 36 8c 2d 66 01 91 c5 ea 8c 52 | 2c 54 17 a9 6d 05 2c 50 21 08 25 54 8a 1b be 0a | 1d bd df b6 06 bd 44 6a d2 67 92 4c 02 bb 81 0c | c5 ff 14 e5 24 16 2f 34 f8 b9 eb 90 9f 21 2d 2e | b4 e3 0a 67 2a 94 b3 b5 79 5e 99 67 ad f2 05 03 | 3c 2d de 97 30 2e 1c 04 bc c1 21 b5 15 d2 d7 d9 | ea a8 e1 e4 5e c5 d4 35 2f fe 33 59 95 e2 b7 3c | 23 52 f4 04 24 af 5a 95 09 7f 61 6c 7a 9b e9 50 | d2 38 26 f9 d3 19 e4 0a 3c be ac cf c6 ff b4 45 | b0 35 a0 dc ec 70 3d 13 ab c2 8a 53 0d 47 68 05 | 67 66 c8 1a af d5 d2 45 a5 c1 6e df ea 2b 64 70 | 05 da 5e 15 ac a3 ed f4 40 10 0f 5a 84 40 9e bc | d6 87 16 fd 3f a2 ff 39 19 ba 66 6d 2d e9 93 fd | b9 22 df b5 78 f4 f7 04 ee c7 91 83 7d a9 ca f1 | 29 00 00 24 c2 6f b9 fd fc 4f db 1a 3d 3f c0 a7 | af 7a 63 dc 70 8f 4c 18 81 55 af 15 16 2b 00 41 | 32 ac cf 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 87 47 9a 56 3f e1 15 1e 01 4b 7f | bb 95 0e 04 49 a0 88 16 00 00 00 1c 00 00 40 05 | 0c f3 ae 84 0d fd 98 31 4d e7 cb a5 de d2 0b 07 | b0 31 98 21 | libevent_free: release ptr-libevent@0x7fb3600251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #306 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd d2 63 50 0e 6e 1e 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #306 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #306 | rejected packet: | fd d2 63 50 0e 6e 1e 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #306: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.056 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a67330 | handling event EVENT_RETRANSMIT for parent state #106 | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #106 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #106 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49673.183244; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008599 exceeds limit? YES "road-eastnet-nonat-106" #106: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-106" #106: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #358 at 0x557d46a63c90 | State DB: adding IKEv2 state #358 in UNDEFINED | pstats #358 ikev2.ike started | Message ID: init #358: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #358: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #358; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-106" #358: initiating v2 parent SA to replace #106 | using existing local IKE proposals for connection road-eastnet-nonat-106 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 358 for state #358 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a0a9d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #358 | libevent_malloc: new ptr-libevent@0x7fb3600251c0 size 128 | #358 spent 0.0669 milliseconds in ikev2_parent_outI1() | RESET processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #106 ikev2.ike failed too-many-retransmits | pstats #106 ikev2.ike deleted too-many-retransmits | #106 spent 2.61 milliseconds in total | [RE]START processing: state #106 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-106" #106: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #106: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #106 "road-eastnet-nonat-106" #106: deleting IKE SA for connection 'road-eastnet-nonat-106' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-106' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-106 | State DB: deleting IKEv2 state #106 in PARENT_I1 | parent state #106: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 12 resuming | crypto helper 12 starting work-order 358 for state #358 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 358 | stop processing: state #106 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3700300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a67330 | in statetime_stop() and could not find #106 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-106 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-106" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-106' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-106" | stop processing: connection "road-eastnet-nonat-106" (in initiate_a_connection() at initiate.c:349) | spent 0.0563 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 358 time elapsed 0.000524 seconds | (#358) spent 0.526 milliseconds in crypto helper computing work-order 358: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 358 for state #358 to event queue | scheduling resume sending helper answer for #358 | libevent_malloc: new ptr-libevent@0x7fb340018db0 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #358 | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 358 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #358 | **emit ISAKMP Message: | initiator cookie: | 9c 16 21 10 e3 b0 2f 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-106 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 72 b0 5e 24 2c 38 69 f7 5e 0a ef 9c cd 0c a9 a2 | ikev2 g^x e7 60 22 31 02 17 4e 87 ab da 67 2c 74 68 e6 5c | ikev2 g^x 3c 13 72 b8 82 de 1f 97 f0 91 0b ef 5f 05 b5 88 | ikev2 g^x 8f 55 10 d6 ed 84 95 00 12 6f 2a 48 1a 79 36 91 | ikev2 g^x 49 04 49 1e 83 7f 51 0b cd 40 c4 12 1d 28 81 4a | ikev2 g^x ff 1e be db 2c 06 48 44 01 2b 86 9e 50 88 79 26 | ikev2 g^x a2 fe 2d b6 28 25 0f 1c 72 e5 7c 02 81 23 76 48 | ikev2 g^x e4 63 77 54 94 1c a2 42 e7 62 79 1a 9c c2 d3 a5 | ikev2 g^x 84 2a 02 f0 5d 86 de 0c ac 44 c1 bc a9 db 93 da | ikev2 g^x ab e8 d1 96 60 b7 1e 28 8e ce cc cb 77 fb 32 3a | ikev2 g^x af 1c d9 5d 2b 9d 4c bb 37 50 e3 2c 2a bd a4 df | ikev2 g^x 6f 99 23 0d 27 83 b0 b4 f9 48 a2 69 86 2e 3a c0 | ikev2 g^x 5d bf ed 94 bb f2 f3 07 e1 00 d8 2f 62 9b ee ec | ikev2 g^x b5 9a a1 3e ac 61 be 8a ce 7d 14 b6 c3 13 21 43 | ikev2 g^x 2f 85 9a 2f fd b3 5f a3 b2 e0 9c 9a 19 21 fa dc | ikev2 g^x c3 c9 17 3d e7 0b 51 07 b0 13 9d cf 7d 38 e5 ef | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 31 6e a1 8e 9b bf 74 40 01 d9 c6 2f f4 95 5e 1f | IKEv2 nonce af be c9 b5 67 9c 79 1e 7d 41 57 e9 2e 59 a1 62 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9c 16 21 10 e3 b0 2f 9a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6a | natd_hash: port= 01 f4 | natd_hash: hash= 26 2b df 62 51 b1 0d 46 7a 83 b8 02 18 9c 1e 91 | natd_hash: hash= 3d 80 67 46 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 26 2b df 62 51 b1 0d 46 7a 83 b8 02 18 9c 1e 91 | Notify data 3d 80 67 46 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9c 16 21 10 e3 b0 2f 9a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 21 2b d2 d4 2f 80 55 47 29 a9 2f db 69 80 68 e4 | natd_hash: hash= e7 d9 41 df | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 21 2b d2 d4 2f 80 55 47 29 a9 2f db 69 80 68 e4 | Notify data e7 d9 41 df | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #358 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #358: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #358 to 4294967295 after switching state | Message ID: IKE #358 skipping update_recv as MD is fake | Message ID: sent #358 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-106" #358: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.106:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #358) | 9c 16 21 10 e3 b0 2f 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 b0 5e 24 2c 38 69 f7 5e 0a ef 9c cd 0c a9 a2 | e7 60 22 31 02 17 4e 87 ab da 67 2c 74 68 e6 5c | 3c 13 72 b8 82 de 1f 97 f0 91 0b ef 5f 05 b5 88 | 8f 55 10 d6 ed 84 95 00 12 6f 2a 48 1a 79 36 91 | 49 04 49 1e 83 7f 51 0b cd 40 c4 12 1d 28 81 4a | ff 1e be db 2c 06 48 44 01 2b 86 9e 50 88 79 26 | a2 fe 2d b6 28 25 0f 1c 72 e5 7c 02 81 23 76 48 | e4 63 77 54 94 1c a2 42 e7 62 79 1a 9c c2 d3 a5 | 84 2a 02 f0 5d 86 de 0c ac 44 c1 bc a9 db 93 da | ab e8 d1 96 60 b7 1e 28 8e ce cc cb 77 fb 32 3a | af 1c d9 5d 2b 9d 4c bb 37 50 e3 2c 2a bd a4 df | 6f 99 23 0d 27 83 b0 b4 f9 48 a2 69 86 2e 3a c0 | 5d bf ed 94 bb f2 f3 07 e1 00 d8 2f 62 9b ee ec | b5 9a a1 3e ac 61 be 8a ce 7d 14 b6 c3 13 21 43 | 2f 85 9a 2f fd b3 5f a3 b2 e0 9c 9a 19 21 fa dc | c3 c9 17 3d e7 0b 51 07 b0 13 9d cf 7d 38 e5 ef | 29 00 00 24 31 6e a1 8e 9b bf 74 40 01 d9 c6 2f | f4 95 5e 1f af be c9 b5 67 9c 79 1e 7d 41 57 e9 | 2e 59 a1 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 2b df 62 51 b1 0d 46 7a 83 b8 02 | 18 9c 1e 91 3d 80 67 46 00 00 00 1c 00 00 40 05 | 21 2b d2 d4 2f 80 55 47 29 a9 2f db 69 80 68 e4 | e7 d9 41 df | state #358 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3600251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a0a9d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #358 | libevent_malloc: new ptr-libevent@0x7fb3700300e0 size 128 | #358 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49673.184301 | resume sending helper answer for #358 suppresed complete_v2_state_transition() and stole MD | #358 spent 0.339 milliseconds in resume sending helper answer | stop processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb340018db0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9c 16 21 10 e3 b0 2f 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #358 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #358 | rejected packet: | 9c 16 21 10 e3 b0 2f 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6a fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #358: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0392 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a73690 | handling event EVENT_RETRANSMIT for parent state #352 | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #352 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #352 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49673.214511; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500693 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #352 | libevent_malloc: new ptr-libevent@0x7fb340018db0 size 128 "road-eastnet-nonat-100" #352: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #352) | 3c 05 1d c4 fe 50 38 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 64 8b 09 fa 7a d8 0e 19 4a a4 83 62 a1 a5 5a | 68 fc 46 c2 41 24 c2 81 0b b7 86 21 9c 81 02 7e | 4c e7 e3 a1 0b b2 cb 85 40 50 15 e6 9b 8e ec db | 69 e6 fa 1a ac be 36 c2 a1 ef 3e db b6 5e 52 af | 7e 52 8f f4 e4 02 53 3c 7f 96 73 09 3f 4e 1d 14 | 6d c2 31 fa 5c 39 98 fc 2c b5 f5 9e 00 af 34 e4 | 5f b6 a3 65 94 fe 46 6a 1b e5 e1 4a 56 bd a5 cf | 0a 77 7e 2c 49 79 6d b8 e1 4a 50 3f 05 7c c4 09 | eb 02 3b 50 92 11 5f 9f 53 e6 1e bd 8d 02 31 1b | ce 66 73 68 3b 0d 47 9f bd 24 08 62 f6 ab c3 d7 | a4 43 e9 f4 a6 cc 3c 8d f5 af 10 2b 54 da 75 ae | 02 35 c6 d0 b8 2f b0 bf cd b2 cd e7 d2 23 bb 30 | 31 a6 56 6a 41 57 91 fb 46 1d ee de f8 63 bc 4e | 2b 81 4f df b1 c0 cc c0 21 f9 64 98 54 3d 15 93 | 9d f2 7c 39 a9 8b 0c c2 f7 bb 99 15 ac 9c c2 51 | 1b f2 0a ec 9e 8c 56 18 67 8a fb 62 ed 27 4d ad | 29 00 00 24 a2 bb a3 dc 18 69 ac 45 10 e2 b1 d4 | a3 1c d3 0a 99 a1 33 f7 93 76 f6 b4 72 bd d3 aa | d5 07 c1 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 31 52 a7 9d 89 a3 6a 1c 72 78 4c | e5 d1 1b 1c 74 f4 f6 22 00 00 00 1c 00 00 40 05 | fc b9 a7 1f 0a 98 43 79 23 71 2c ac b0 a5 bd 76 | ba 72 e4 ab | libevent_free: release ptr-libevent@0x7fb34403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a73690 | #352 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c 05 1d c4 fe 50 38 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #352 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #352 | rejected packet: | 3c 05 1d c4 fe 50 38 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #352: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0753 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374013710 | handling event EVENT_RETRANSMIT for parent state #334 | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #334 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #334 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49673.223894; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004141 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a73690 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #334 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 "road-eastnet-nonat-82" #334: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #334) | 99 fb 3f 4d 99 57 72 cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a ca de c8 71 49 e8 30 84 13 c9 a8 49 58 85 47 | 09 f9 f9 59 70 d3 2b 07 44 44 cc 17 14 52 02 aa | 27 07 c2 cd 39 d4 b6 e5 73 79 a9 2f 72 89 bd 61 | d5 62 f8 e8 e6 f1 12 2e 57 7d d0 8e 8b 5d 7b ce | 30 2f b7 61 b2 0b 7b a0 24 5a fe 42 60 21 92 aa | 5a be e9 6d ac f6 2b f8 e4 db ed fe 70 91 ae a8 | 85 c9 a9 89 2d af 8b 90 60 53 0f 7b 1f 54 22 36 | b6 5d 78 20 de 79 62 7d 9d 74 65 df 47 cb 75 b6 | eb 4f 70 ec d4 3f 23 06 d7 65 0a b2 74 f8 e9 72 | 81 4c 29 37 9f 65 5b 7b c1 89 f7 c4 28 5b 64 9b | 59 6b b0 17 bf e7 21 58 4f ad 42 06 42 7b d5 d6 | 2f 45 bc a9 64 87 9f 47 9d 1c 11 c7 6e 0c 53 bf | a5 35 d6 5f eb b3 bf 80 3c b3 0d 2b 91 66 f7 a4 | 98 9c 01 6a 7e ee e3 b3 ad 96 90 67 e0 44 49 71 | 2a 4d 41 3b cc ae 39 dd 1f 03 62 e9 5e 5c bf 21 | 27 f6 9b 3e 24 35 1b f3 b8 96 3c e2 59 58 ea 9a | 29 00 00 24 64 85 28 2f 41 a8 19 c8 06 e4 df 4c | 57 5a d5 28 ae 9b e4 58 e9 c7 cc 4b e4 65 be 72 | 5c d2 98 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 3d 2f a6 85 1f fa fd 47 13 ee 3b | 56 07 59 de 70 93 a0 2d 00 00 00 1c 00 00 40 05 | ab e9 3c 75 bd a4 6c 62 ac eb 51 4e 98 ab 45 51 | fa 01 56 3d | libevent_free: release ptr-libevent@0x7fb344014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374013710 | #334 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 fb 3f 4d 99 57 72 cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #334 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #334 | rejected packet: | 99 fb 3f 4d 99 57 72 cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #334: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #260 | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #260 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #260 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49673.237212; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005399 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374013710 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #260 | libevent_malloc: new ptr-libevent@0x7fb344014c70 size 128 "road-eastnet-nonat-8" #260: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #260) | a8 de 56 29 b7 d6 fa 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 e3 e7 0b 5e 0a a2 78 28 90 d4 10 18 db 3b 08 | b2 da 89 a3 10 0a cf 73 47 c7 8b 62 54 ef 17 0b | 52 d6 fe 33 62 21 4b 61 30 79 d1 82 82 85 ea 34 | 5e 16 ec db dd eb 97 56 18 30 74 8c 1f 6e 05 89 | 21 09 2b 1f b9 bc b7 45 38 93 12 7a 5d 44 53 c4 | 90 d3 d5 13 c2 0f fd 6b 37 3e 25 38 05 ed f0 2b | cb 0f 13 a8 c7 9b fe 60 00 1a 65 af 42 72 d4 bd | f1 07 94 0e 72 26 91 81 83 ee ff ef 41 c2 92 80 | a0 7f b9 6c 1f d2 e5 4b 34 fe 68 33 41 4d c0 3b | fb 7e 82 89 76 4f ab b4 81 d9 20 1a 79 fa de 75 | 7d a8 cd 19 c4 08 7c dc 7d 50 74 8e 78 b5 b3 64 | 8b 8f bd fd e8 f9 24 be 78 a0 45 9f 10 40 3e e1 | 49 ba 58 e8 63 d1 38 81 0c 79 61 75 c1 98 81 43 | 9b e0 a1 0d fc da 35 4b 0e a9 e1 35 63 d5 73 64 | db 23 3e 1b a9 3a 4e c0 e5 7f 6a ab 90 f3 cd 49 | 1b bf e5 c9 ab 56 60 25 6c 22 94 4d da ff b4 bb | 29 00 00 24 2b a8 af 62 73 94 e5 0a 7f 70 bf f7 | 73 9f 36 a9 cb 1b e2 09 0a 24 49 93 58 be a0 29 | 94 31 83 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 87 5d ef 8f 65 c8 58 d0 3b 6f e5 | c6 10 af 28 1a 1c e2 ed 00 00 00 1c 00 00 40 05 | 7a 28 e6 3f f8 c3 d1 0c 25 ff 6a 7c a9 a5 77 33 | 24 34 82 26 | libevent_free: release ptr-libevent@0x7fb3840060f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | #260 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 de 56 29 b7 d6 fa 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #260 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #260 | rejected packet: | a8 de 56 29 b7 d6 fa 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #260: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358012630 | handling event EVENT_RETRANSMIT for parent state #347 | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #347 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #347 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49673.242498; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.0019 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #347 | libevent_malloc: new ptr-libevent@0x7fb3840060f0 size 128 "road-eastnet-nonat-95" #347: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #347) | f8 38 0d 6d 39 93 09 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 c4 2f 67 81 91 d8 d3 fb 76 27 6a 79 d1 72 21 | 27 8a 05 07 53 b8 7f 41 86 ef e3 fa f6 78 ef f1 | 52 89 ca 2d 9e 75 06 3f de f7 86 92 8e de 82 39 | 74 b5 33 59 34 5d 7a 07 32 58 2d 1b 54 b4 4a 71 | 82 e9 69 4b d1 23 61 8d 33 9d 70 70 80 3d e7 06 | 38 6a 56 ed 6a ce 44 ea 5c f0 e5 ab 75 42 57 8c | 73 f2 e6 32 f6 2b 78 17 cc 77 d1 36 52 bb 7b 23 | 6f c5 5a f4 da 8c 20 ce 25 5e 2c b4 61 29 ba 22 | 7b 74 2f 22 bd 61 49 7e ed ee f8 95 fd 44 ae 87 | 6a 9a b0 84 48 37 7e bb 35 e6 e2 f6 4e 13 6b 95 | 47 4c 2d 6c a3 db 3d 5d ad 81 79 5f 80 e7 3e ed | bb b5 a8 97 95 f7 34 a1 ef 98 52 3c fa 6c 7f 37 | f7 78 d5 45 99 4e d1 38 57 29 2f b0 94 21 1c a5 | 4f 3d 71 d0 fc 88 a0 06 b8 26 ee 84 19 ff 4c 00 | 47 77 6c e4 d3 3a ee 07 05 6f 06 56 6c 1b 9a 2e | 15 bd 41 a6 3a 78 6e d5 2a 86 74 c6 d6 01 f5 e6 | 29 00 00 24 2a 8c 4f 9a ed e1 ff e1 d2 8e 39 06 | cc ef a0 3d 7a d8 6e 61 bc 37 8f e1 33 0d 03 68 | 11 db e1 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 e5 1f 89 e2 f9 a8 3f 54 c4 5a dc | 3f 1e 16 e7 e3 67 75 63 00 00 00 1c 00 00 40 05 | d2 37 e4 48 b8 f6 61 3d d7 15 bc 92 37 84 81 61 | b6 43 37 f7 | libevent_free: release ptr-libevent@0x7fb35804ba90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358012630 | #347 spent 0.0921 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 38 0d 6d 39 93 09 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #347 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #347 | rejected packet: | f8 38 0d 6d 39 93 09 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #347: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0408 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9b1c0 | handling event EVENT_RETRANSMIT for parent state #107 | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #107 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #107 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49673.257788; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.0115 exceeds limit? YES "road-eastnet-nonat-107" #107: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-107" #107: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #359 at 0x557d46a65250 | State DB: adding IKEv2 state #359 in UNDEFINED | pstats #359 ikev2.ike started | Message ID: init #359: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #359: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #359; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-107" #359: initiating v2 parent SA to replace #107 | using existing local IKE proposals for connection road-eastnet-nonat-107 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 359 for state #359 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb358012630 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #359 | libevent_malloc: new ptr-libevent@0x7fb35804ba90 size 128 | #359 spent 0.0762 milliseconds in ikev2_parent_outI1() | RESET processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 resuming | start processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #107 ikev2.ike failed too-many-retransmits | pstats #107 ikev2.ike deleted too-many-retransmits | crypto helper 5 starting work-order 359 for state #359 | #107 spent 2.48 milliseconds in total | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 359 | [RE]START processing: state #107 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-107" #107: deleting state (STATE_PARENT_I1) aged 64.013s and NOT sending notification | parent state #107: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #107 "road-eastnet-nonat-107" #107: deleting IKE SA for connection 'road-eastnet-nonat-107' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-107' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-107 | State DB: deleting IKEv2 state #107 in PARENT_I1 | parent state #107: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 359 time elapsed 0.000935 seconds | stop processing: state #107 from 192.1.2.23:500 (in delete_state() at state.c:1143) | (#359) spent 0.942 milliseconds in crypto helper computing work-order 359: ikev2_outI1 KE (pcr) | libevent_free: release ptr-libevent@0x7fb37402ff60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9b1c0 | crypto helper 5 sending results from work-order 359 for state #359 to event queue | scheduling resume sending helper answer for #359 | in statetime_stop() and could not find #107 | libevent_malloc: new ptr-libevent@0x7fb34401fd50 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 5 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-107 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-107" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-107' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-107" | stop processing: connection "road-eastnet-nonat-107" (in initiate_a_connection() at initiate.c:349) | spent 0.0703 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #359 | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 359 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #359 | **emit ISAKMP Message: | initiator cookie: | 73 c2 2a a2 cb e2 3d 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-107 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ae 2e 83 fc d4 94 f1 45 60 7e d6 c0 1f 1c e7 33 | ikev2 g^x 0f bd b7 8a 76 4b 8b 45 55 e6 bb 84 3d 22 78 af | ikev2 g^x 75 6e da ff d0 e9 4b 87 08 80 14 e9 1e 9e bb 0e | ikev2 g^x 16 e9 ea 66 ca bd 7c 66 87 ad a8 d9 21 e1 38 83 | ikev2 g^x 1f 32 ef a7 2f 0e bf 2d 1d 63 39 6b 83 61 62 c6 | ikev2 g^x 3e 6a a6 28 e7 8f 0a b3 a0 d9 53 fb be 77 6d 21 | ikev2 g^x 33 ab c4 d4 01 99 45 77 31 5e 2f ff 5a 01 15 07 | ikev2 g^x d7 80 2f 1a 7e c3 c0 54 fe ea 5a 9f 7b b7 54 0e | ikev2 g^x 9f aa da f6 69 55 9a 24 0b a7 e8 7e 52 f9 f8 78 | ikev2 g^x ba 68 8d a1 bc 1f b0 9f 73 b4 50 08 1b 93 cf 3c | ikev2 g^x ca 2c f0 94 b0 7c a2 eb fc f9 ec 95 a0 6e 85 2f | ikev2 g^x 2e ef 23 90 9d 23 ef b2 33 25 ac 56 cb 51 63 74 | ikev2 g^x c1 ab 1f 93 d7 e6 e0 11 36 c8 47 24 fc 03 91 1a | ikev2 g^x 9f ca af ad 3e 92 13 be 1e e3 b4 78 2a ad 4c d9 | ikev2 g^x b9 b1 7c 5e 5e 7c 3e c4 e0 d5 55 d6 b9 f7 15 83 | ikev2 g^x 2f 6c 01 ee d5 14 3b f0 0d dd 1e 11 8b 30 cd e0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 69 b6 35 41 69 53 97 ba 18 48 44 fd d5 e2 9a 31 | IKEv2 nonce 05 82 94 36 da fb c0 91 72 56 36 c7 c4 dd c7 06 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 73 c2 2a a2 cb e2 3d 7a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6b | natd_hash: port= 01 f4 | natd_hash: hash= 13 a1 1b b6 5c a0 e8 d3 82 8b cf 19 85 69 c3 9f | natd_hash: hash= 45 ea 96 77 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 13 a1 1b b6 5c a0 e8 d3 82 8b cf 19 85 69 c3 9f | Notify data 45 ea 96 77 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 73 c2 2a a2 cb e2 3d 7a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 5b ca 3a 7b b0 51 af 81 eb d5 3c 03 e7 f7 fa 57 | natd_hash: hash= 2f 45 5b b9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5b ca 3a 7b b0 51 af 81 eb d5 3c 03 e7 f7 fa 57 | Notify data 2f 45 5b b9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #359 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #359: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #359 to 4294967295 after switching state | Message ID: IKE #359 skipping update_recv as MD is fake | Message ID: sent #359 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-107" #359: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.107:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #359) | 73 c2 2a a2 cb e2 3d 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 2e 83 fc d4 94 f1 45 60 7e d6 c0 1f 1c e7 33 | 0f bd b7 8a 76 4b 8b 45 55 e6 bb 84 3d 22 78 af | 75 6e da ff d0 e9 4b 87 08 80 14 e9 1e 9e bb 0e | 16 e9 ea 66 ca bd 7c 66 87 ad a8 d9 21 e1 38 83 | 1f 32 ef a7 2f 0e bf 2d 1d 63 39 6b 83 61 62 c6 | 3e 6a a6 28 e7 8f 0a b3 a0 d9 53 fb be 77 6d 21 | 33 ab c4 d4 01 99 45 77 31 5e 2f ff 5a 01 15 07 | d7 80 2f 1a 7e c3 c0 54 fe ea 5a 9f 7b b7 54 0e | 9f aa da f6 69 55 9a 24 0b a7 e8 7e 52 f9 f8 78 | ba 68 8d a1 bc 1f b0 9f 73 b4 50 08 1b 93 cf 3c | ca 2c f0 94 b0 7c a2 eb fc f9 ec 95 a0 6e 85 2f | 2e ef 23 90 9d 23 ef b2 33 25 ac 56 cb 51 63 74 | c1 ab 1f 93 d7 e6 e0 11 36 c8 47 24 fc 03 91 1a | 9f ca af ad 3e 92 13 be 1e e3 b4 78 2a ad 4c d9 | b9 b1 7c 5e 5e 7c 3e c4 e0 d5 55 d6 b9 f7 15 83 | 2f 6c 01 ee d5 14 3b f0 0d dd 1e 11 8b 30 cd e0 | 29 00 00 24 69 b6 35 41 69 53 97 ba 18 48 44 fd | d5 e2 9a 31 05 82 94 36 da fb c0 91 72 56 36 c7 | c4 dd c7 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 a1 1b b6 5c a0 e8 d3 82 8b cf 19 | 85 69 c3 9f 45 ea 96 77 00 00 00 1c 00 00 40 05 | 5b ca 3a 7b b0 51 af 81 eb d5 3c 03 e7 f7 fa 57 | 2f 45 5b b9 | state #359 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35804ba90 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb358012630 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9b1c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #359 | libevent_malloc: new ptr-libevent@0x7fb37402ff60 size 128 | #359 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49673.259484 | resume sending helper answer for #359 suppresed complete_v2_state_transition() and stole MD | #359 spent 0.453 milliseconds in resume sending helper answer | stop processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34401fd50 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 73 c2 2a a2 cb e2 3d 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #359 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #359 | rejected packet: | 73 c2 2a a2 cb e2 3d 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #359: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350005860 | handling event EVENT_RETRANSMIT for parent state #335 | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #335 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #335 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49673.275646; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002132 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a67330 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #335 | libevent_malloc: new ptr-libevent@0x7fb34401fd50 size 128 "road-eastnet-nonat-83" #335: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #335) | 43 a2 0c b8 41 14 fb 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 1a ff fe 66 5c 27 50 3c bb 63 46 9d 4f 02 13 | 90 10 26 6b 8b bb ce 8e f8 b1 4e 76 fe b9 96 cb | 8a 27 62 97 df ca 55 0f 1b 21 02 63 f2 9a 56 cf | af a1 0c 10 6a 33 02 6e 92 2e ca f8 26 1a ae eb | 16 92 9e c4 5b 3e 17 4a 65 79 45 19 ed da 56 2e | 51 d3 90 a7 9f 98 36 5a 61 58 65 de 51 88 f2 d6 | 2c 74 21 5b 26 93 04 1f 9d 42 9f 74 af 5b 84 53 | 88 76 a7 2b 50 71 5f 03 19 11 aa 1d 3f 9a 1b be | 3f 66 50 7a 7c c6 ba 3a 1f b1 9f aa e7 d9 54 d2 | 8e 38 49 1c 3f da 85 98 28 e2 8c e3 a0 7e 8b bb | 1f a5 48 ea b8 af 51 41 c3 b5 72 51 f3 06 99 5a | 76 51 df 7b 88 a9 f4 af 6a 05 b3 e4 b4 4c ac 08 | 4f aa 11 34 cc 49 a5 06 8b 79 a3 52 45 cd 64 d8 | 83 12 a6 eb 44 69 b7 c9 e1 51 9a 09 19 b8 97 03 | 64 d6 b8 43 68 0f ed bf 4f 10 12 04 91 a0 82 30 | b8 e7 e9 9e 27 9b 68 9f 56 43 7c 93 6d 87 a8 e5 | 29 00 00 24 42 02 24 73 b2 25 02 dc ca ad a2 1d | 9e f8 54 e2 15 e2 22 5d 3f 7b 60 32 c9 95 b0 ec | b1 7e 62 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 ff c7 be 47 4f 0e b7 8d ed 50 5b | d9 e3 74 cc de e6 b4 2d 00 00 00 1c 00 00 40 05 | 8d 0a fb 98 6b 40 87 d9 54 5c 96 0f 30 79 eb 55 | 16 93 80 76 | libevent_free: release ptr-libevent@0x7fb344008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350005860 | #335 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 a2 0c b8 41 14 fb 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #335 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #335 | rejected packet: | 43 a2 0c b8 41 14 fb 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #335: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34800d120 | handling event EVENT_RETRANSMIT for parent state #353 | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #353 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #353 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49673.310917; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500407 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #353 | libevent_malloc: new ptr-libevent@0x7fb344008e30 size 128 "road-eastnet-nonat-101" #353: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #353) | 5c b8 33 04 f9 07 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 8b 11 fb 47 ec 02 c4 cd 08 09 04 3c c8 57 b9 | e6 56 8a 75 16 cb 27 a3 a8 a8 cd 60 5a 5e 10 a0 | 4c ee d4 ee 70 90 76 03 9c dd ae bd 31 4c 66 16 | b3 e1 1d be 33 f8 41 0b c4 3c 71 6f 90 30 0f da | 26 bc 55 a4 9b 68 89 99 78 6a 9f bd 9b 59 ca 66 | 9f 28 bb 1c cf d9 04 9c 3f 50 e0 a8 9a c8 86 3c | 22 ad 41 27 f3 c4 bb fb ef e9 6e f8 88 7e 34 6e | 75 ca 2d 80 b4 0c d7 c1 72 ce 98 2e 70 ec 4e 80 | a8 95 d8 c8 1d 5c 97 5c c0 a0 b9 5c ac 3a c3 07 | 2c c5 07 1e 3d 08 d1 ba e4 93 f5 5b dd cb 89 0a | 36 eb de 45 ac 11 de 24 b8 2b b2 28 d9 84 7e 81 | 6c e6 ca 34 e5 ab 3a f5 d9 8f 51 9e f8 46 26 92 | bb e9 13 c3 32 db 48 bf d1 a9 ef 9e d6 1f 7a 90 | cf e0 f7 95 4c 0f 73 ac 90 00 08 6f f7 6f bb 88 | dc 53 20 17 f7 7a 4b e1 b0 e3 53 ab c1 68 9e bb | 8c bb e3 6d 1e 44 fc 28 be 03 40 b8 4e ff ea 55 | 29 00 00 24 d0 f4 4a 20 b5 18 6c ce 45 6d d4 e9 | 3d b2 3f bf 9f b6 c1 be 4d 22 b8 3f d5 b7 20 9c | 7a 5b 5b 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 c3 92 4c 0f 96 63 0f 6f bc 3d e6 | 99 69 47 3f a6 34 81 2c 00 00 00 1c 00 00 40 05 | ce 29 c6 74 fd 99 32 be d7 3c ba 39 8c e5 64 d3 | 17 27 91 5a | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800d120 | #353 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c b8 33 04 f9 07 ca 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #353 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #353 | rejected packet: | 5c b8 33 04 f9 07 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #353: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0733 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a50110 | handling event EVENT_RETRANSMIT for parent state #307 | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #307 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #307 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49673.329249; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003697 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #307 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 "road-eastnet-nonat-55" #307: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #307) | ae 96 63 e8 bb 6a 85 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 14 ed e9 d6 19 10 2b ec dd 37 28 c8 5c 2b 9d | 4d 1c 56 bb af 08 b5 7a 4b a6 fc d3 e6 37 09 e4 | 3f 1e 28 12 a3 d4 a0 95 36 fb be 53 ba 61 08 91 | a5 59 64 37 32 8f 20 cb c1 4b 24 6f aa 9c 35 eb | 55 d5 bc cd 87 7a 12 07 97 e1 3e 1d fe 09 4e 05 | 56 a9 36 dd e5 c2 2b 14 24 4c 71 52 b8 4a bc e5 | 44 05 b4 12 ae 0a ee 10 63 d4 56 16 75 0e 24 7a | d8 3e 40 79 17 42 50 86 a6 54 47 3f a4 b0 ab e0 | d2 28 b5 9a 24 3f 4a c2 b0 91 11 3a 15 fb b2 26 | f2 b0 63 ef 6f 51 35 98 2f 68 7c a5 78 9f 97 ad | 5a 09 af 4c 24 bb dd dc ab e6 24 53 27 3d 9e 03 | 62 ad 6c f7 99 7f 86 ec 99 0f d4 42 fa 99 b4 e1 | da 5b a4 af 44 6d 6a f4 d7 89 78 8e f4 87 7b 68 | 84 5a 7e 9d b0 43 44 70 16 90 a6 1a d2 cc 8f 85 | 21 0d 25 8b 92 c7 6a 03 1f 2e 4c a1 00 a9 05 b1 | b5 20 9b fc 87 43 c1 10 a6 42 8f 4d 15 f7 48 a2 | 29 00 00 24 9a 25 60 c3 7e e3 91 a3 9d b3 07 0f | ff 92 da ab 25 95 17 32 0d 82 17 4c 51 9e de a9 | 5d 92 35 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b e0 88 15 5c bc 20 c5 96 41 9f 3a | 7e ef 58 59 98 52 f8 6e 00 00 00 1c 00 00 40 05 | 92 3b 5d d1 4e 37 91 81 a5 d6 c2 94 c8 33 2c 33 | 6a d3 7b 36 | libevent_free: release ptr-libevent@0x7fb37404b5c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a50110 | #307 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 96 63 e8 bb 6a 85 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #307 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #307 | rejected packet: | ae 96 63 e8 bb 6a 85 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #307: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47e90 | handling event EVENT_RETRANSMIT for parent state #336 | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #336 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #336 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49673.337531; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002693 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a50110 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #336 | libevent_malloc: new ptr-libevent@0x7fb37404b5c0 size 128 "road-eastnet-nonat-84" #336: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #336) | a0 3a 99 80 e1 01 63 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 8b 11 e3 72 10 b4 96 46 45 1f 06 8b cb 20 43 | 48 5b dc 9f 22 0b 19 f0 6e 5a 41 4f 7b 66 7e 47 | 17 91 cc cc 24 8c c0 85 32 b7 be 23 d1 6d 12 65 | 00 df c3 47 48 17 d9 93 47 4f 9d 2a 81 88 4f 2c | 1f 98 ac a8 85 56 dd 1e 45 4f f7 f9 78 59 b2 90 | d0 96 3c c9 92 dc 80 e7 ee 9e 9f f3 a3 42 a0 87 | f4 8c 84 d8 38 fe 2c f0 0d 7c 15 54 23 ab a7 7c | ab e1 53 7c ba 26 57 e2 9b 0a 0d 44 c4 7c f6 bd | 50 8c ae 85 b6 fa 6e 51 9e 4d 32 a8 2f 5f b7 94 | 33 ef 3d 6b de 80 a9 44 cb a5 48 1f 9d d9 3e 40 | c2 f4 df a8 c7 43 1a 85 1e 99 1c be ad 10 a3 44 | af 83 22 29 2a d8 4c fc aa 9e 40 9e 83 a1 f3 2d | d3 6b 55 b5 8b 94 57 96 1f 06 03 b7 e8 07 4a dc | 94 d8 f3 f3 15 26 15 42 b7 cd 81 18 11 03 dc 3a | 4e 46 ec 2a eb 11 4a a9 f5 ce 5d 26 8e 40 7e f7 | fb 5d b7 76 23 d0 05 cb 25 8d 85 d4 e7 63 e5 fe | 29 00 00 24 20 77 67 42 c0 5c 2e 2c 4f 51 1c e3 | 6e 76 b6 ed 2f 6c dc 89 e9 07 aa bc e6 7b f3 86 | a7 c4 a8 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c e2 e4 55 b2 1e b0 cb dc 5a 76 de | 82 37 47 8c ee 4e fe 03 00 00 00 1c 00 00 40 05 | 1d 8c 0e 3c 37 8c 24 ca 1e c1 4b a0 97 2b 99 7f | 60 3a d2 7b | libevent_free: release ptr-libevent@0x7fb38800a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47e90 | #336 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 3a 99 80 e1 01 63 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #336 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #336 | rejected packet: | a0 3a 99 80 e1 01 63 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #336: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0751 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aeb540 | handling event EVENT_RETRANSMIT for parent state #261 | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #261 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #261 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49673.340911; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005123 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47e90 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #261 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 "road-eastnet-nonat-9" #261: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #261) | 8b 59 1f 5e 29 ec 79 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 16 bb 69 7b 8c de a9 f0 aa 27 22 0c 50 1e 2b | c0 76 0c 79 99 31 2f f3 35 0b 93 05 6b 25 af d5 | 38 8a 63 51 f1 c7 93 6d 58 cf aa 10 dd 75 1f c8 | 55 42 4b ca 64 4b 8f 25 43 c0 98 a7 58 2f fe 43 | a0 fc e9 fe 8a 4f d9 62 8e db b8 54 42 5d 72 29 | 3d 08 a8 8c 4e d1 f1 b8 76 cf b0 d0 a2 dc ae 18 | 1b 5a 75 da 49 ca 9e c2 09 0d fb 74 50 88 ed a4 | d6 99 da c7 fb 22 1c 94 60 ac 50 76 4c a1 38 f1 | 43 ce 44 aa e7 39 3c 86 9e e1 41 54 48 c3 cb 31 | 48 d9 d1 19 bc cb 0b cc 7d 40 bf 96 af 1e df fb | 0f 62 79 6b f0 8e 05 4f 2e a0 3c cd 46 16 0c 86 | 49 e9 a6 e2 c2 86 c5 8e b2 14 0a be c1 f8 73 ee | bb d0 d9 50 52 32 c3 fa f2 3b b2 ca cc 8c 24 54 | 79 d5 c7 d3 1b 32 b7 28 de dd a1 c3 34 b8 54 c4 | ba 19 90 3e 1a d6 84 33 38 8c c1 45 94 fb 96 9e | 19 4c cd 4d d5 73 7e e1 8a 56 34 ce ca da 7f ec | 29 00 00 24 09 67 1c 9d 6c 7a 1d eb 24 78 5e 1f | a5 24 7e 35 ac a5 c4 f9 a0 f3 f8 63 91 47 e2 76 | a1 4d 73 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 76 e0 4e 77 d9 cf 89 73 cb 13 92 | b0 28 c4 2a 76 4e 4e 20 00 00 00 1c 00 00 40 05 | 7b 1f d5 2f e3 dc 02 0a cf 5f 34 da 40 53 6d 9d | 9b 7e 60 b7 | libevent_free: release ptr-libevent@0x7fb374013170 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aeb540 | #261 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 59 1f 5e 29 ec 79 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #261 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #261 | rejected packet: | 8b 59 1f 5e 29 ec 79 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #261: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.072 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad0280 | handling event EVENT_RETRANSMIT for parent state #108 | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #108 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #108 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49673.345246; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.014101 exceeds limit? YES "road-eastnet-nonat-108" #108: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-108" #108: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #360 at 0x557d46a66810 | State DB: adding IKEv2 state #360 in UNDEFINED | pstats #360 ikev2.ike started | Message ID: init #360: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #360: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #360; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-108" #360: initiating v2 parent SA to replace #108 | using existing local IKE proposals for connection road-eastnet-nonat-108 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 360 for state #360 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aeb540 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #360 | libevent_malloc: new ptr-libevent@0x7fb374013170 size 128 | crypto helper 3 resuming | crypto helper 3 starting work-order 360 for state #360 | #360 spent 0.0709 milliseconds in ikev2_parent_outI1() | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 360 | RESET processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #108 ikev2.ike failed too-many-retransmits | pstats #108 ikev2.ike deleted too-many-retransmits | #108 spent 2.58 milliseconds in total | [RE]START processing: state #108 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-108" #108: deleting state (STATE_PARENT_I1) aged 64.016s and NOT sending notification | parent state #108: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #108 "road-eastnet-nonat-108" #108: deleting IKE SA for connection 'road-eastnet-nonat-108' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-108' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-108 | State DB: deleting IKEv2 state #108 in PARENT_I1 | parent state #108: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #108 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb37c035930 | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 360 time elapsed 0.000636 seconds | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad0280 | (#360) spent 0.64 milliseconds in crypto helper computing work-order 360: ikev2_outI1 KE (pcr) | in statetime_stop() and could not find #108 | crypto helper 3 sending results from work-order 360 for state #360 to event queue | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #360 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7fb33801fd50 size 128 Initiating connection road-eastnet-nonat-108 which received a Delete/Notify but must remain up per local policy | crypto helper 3 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-108" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-108' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-108" | stop processing: connection "road-eastnet-nonat-108" (in initiate_a_connection() at initiate.c:349) | spent 0.089 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #360 | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 360 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #360 | **emit ISAKMP Message: | initiator cookie: | e8 ba f7 ac 97 7a d7 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-108 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 26 a7 6a 2f 0e 47 4f c5 a2 87 88 1c 76 27 25 53 | ikev2 g^x 18 cf 29 be de 65 a5 ec fa 8e ba d5 95 70 46 1a | ikev2 g^x 5e 82 ee 5e ea 78 6c 5e e1 5a ba c3 42 fa 62 85 | ikev2 g^x 96 61 49 94 e4 26 35 02 12 7e c3 49 17 01 2e ad | ikev2 g^x da 08 aa 31 5d 07 3f 11 e2 3e a1 55 1e 97 51 1d | ikev2 g^x 21 13 8f d7 77 02 f2 6a 5f 3a a3 ad 67 d3 b3 fe | ikev2 g^x 4d bc 3d 87 97 56 a8 ed 5e 65 2d 59 2c 08 c6 f6 | ikev2 g^x e3 33 48 1e c9 5b 10 68 f5 80 0a de 74 5b 48 d5 | ikev2 g^x 12 63 cb 81 c8 06 b2 4b 2a 11 1e ef 99 9b bd 96 | ikev2 g^x 3d 2d 68 30 3c a5 df b7 7c b9 96 9a 90 b4 80 82 | ikev2 g^x 7f 32 39 5b 15 a6 11 ef 5c ad af 36 92 59 32 87 | ikev2 g^x 1f b6 1c c4 37 ef 0e 8f d4 cd 1f 34 87 b5 54 45 | ikev2 g^x 4f b4 69 d7 3d 68 0c fa bd 14 4f 0f ca d9 05 b6 | ikev2 g^x 6c 12 d4 47 46 2e 28 86 0e 8a 52 14 fe d2 d6 83 | ikev2 g^x e9 62 c7 35 25 a1 d0 50 cc af ac b0 fd 2d 90 37 | ikev2 g^x 95 46 1a 19 98 e1 af 75 ba a4 1b aa b9 40 54 be | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1b 6f 95 ad 44 06 60 87 4d 33 ad b6 0a 54 4e 5c | IKEv2 nonce c3 38 27 ff 28 86 c4 a8 14 ff fc 45 4c 10 47 85 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e8 ba f7 ac 97 7a d7 4a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6c | natd_hash: port= 01 f4 | natd_hash: hash= 62 71 5e 67 a4 d4 de c3 91 7e 75 5e 86 6a 2f 03 | natd_hash: hash= c9 58 fc 3e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 62 71 5e 67 a4 d4 de c3 91 7e 75 5e 86 6a 2f 03 | Notify data c9 58 fc 3e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e8 ba f7 ac 97 7a d7 4a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 42 65 a4 4c 2a f8 3a 2c 53 a5 43 50 55 9d ce 16 | natd_hash: hash= 71 5f ac c0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 42 65 a4 4c 2a f8 3a 2c 53 a5 43 50 55 9d ce 16 | Notify data 71 5f ac c0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #360 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #360: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #360 to 4294967295 after switching state | Message ID: IKE #360 skipping update_recv as MD is fake | Message ID: sent #360 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-108" #360: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.108:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #360) | e8 ba f7 ac 97 7a d7 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 a7 6a 2f 0e 47 4f c5 a2 87 88 1c 76 27 25 53 | 18 cf 29 be de 65 a5 ec fa 8e ba d5 95 70 46 1a | 5e 82 ee 5e ea 78 6c 5e e1 5a ba c3 42 fa 62 85 | 96 61 49 94 e4 26 35 02 12 7e c3 49 17 01 2e ad | da 08 aa 31 5d 07 3f 11 e2 3e a1 55 1e 97 51 1d | 21 13 8f d7 77 02 f2 6a 5f 3a a3 ad 67 d3 b3 fe | 4d bc 3d 87 97 56 a8 ed 5e 65 2d 59 2c 08 c6 f6 | e3 33 48 1e c9 5b 10 68 f5 80 0a de 74 5b 48 d5 | 12 63 cb 81 c8 06 b2 4b 2a 11 1e ef 99 9b bd 96 | 3d 2d 68 30 3c a5 df b7 7c b9 96 9a 90 b4 80 82 | 7f 32 39 5b 15 a6 11 ef 5c ad af 36 92 59 32 87 | 1f b6 1c c4 37 ef 0e 8f d4 cd 1f 34 87 b5 54 45 | 4f b4 69 d7 3d 68 0c fa bd 14 4f 0f ca d9 05 b6 | 6c 12 d4 47 46 2e 28 86 0e 8a 52 14 fe d2 d6 83 | e9 62 c7 35 25 a1 d0 50 cc af ac b0 fd 2d 90 37 | 95 46 1a 19 98 e1 af 75 ba a4 1b aa b9 40 54 be | 29 00 00 24 1b 6f 95 ad 44 06 60 87 4d 33 ad b6 | 0a 54 4e 5c c3 38 27 ff 28 86 c4 a8 14 ff fc 45 | 4c 10 47 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 71 5e 67 a4 d4 de c3 91 7e 75 5e | 86 6a 2f 03 c9 58 fc 3e 00 00 00 1c 00 00 40 05 | 42 65 a4 4c 2a f8 3a 2c 53 a5 43 50 55 9d ce 16 | 71 5f ac c0 | state #360 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374013170 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aeb540 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aeb540 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #360 | libevent_malloc: new ptr-libevent@0x7fb37c035930 size 128 | #360 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49673.346484 | resume sending helper answer for #360 suppresed complete_v2_state_transition() and stole MD | #360 spent 0.343 milliseconds in resume sending helper answer | stop processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb33801fd50 | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #348 | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #348 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #348 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49673.346539; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001225 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338017ea0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #348 | libevent_malloc: new ptr-libevent@0x7fb33801fd50 size 128 "road-eastnet-nonat-96" #348: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #348) | a7 7d 9d ff 1a 60 65 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce d5 f5 8b 39 60 35 a5 25 70 07 1c 5c b5 0b 9d | 0f b2 5b 4a 01 34 b6 83 42 d7 d4 4c ad da 68 4a | 8b 4a 32 5f 36 06 f1 98 73 58 e9 72 c0 73 68 ca | 50 81 07 47 ff 17 19 96 47 97 94 3d f6 b6 04 3a | d9 53 26 2d 26 d4 5a 00 db 52 8b 30 4a 2f d3 5e | 57 21 6b c8 30 e6 41 d6 77 b5 33 c3 1e eb 09 f5 | f6 92 94 59 ce 0f f4 b6 13 a7 e6 12 2c 94 0a 0e | a5 49 7d ed 7d 57 a6 dd 0c c8 f5 e3 ab f6 df fb | 13 a2 c5 ce cd 5e 51 7c 83 34 62 82 09 e1 e3 72 | 31 4c 58 be 93 6e 60 9d a5 4a 65 3b 0e 6c 76 16 | ff b5 3c 17 b2 e3 b4 72 ba 47 1e 9f c9 b0 43 a7 | f0 b4 e5 71 a8 38 7d f3 55 a8 70 6c f5 0c ea e3 | 99 31 47 d9 67 2c ef 74 72 f0 71 8a 3c da e4 22 | d8 c1 06 32 4c 16 22 97 a9 d9 5c c1 eb 63 08 aa | 52 12 c2 6f 92 9a fe 31 31 61 1a 04 4f a6 29 e5 | bd ba 74 54 e9 68 1b 89 03 52 57 66 34 af 35 4f | 29 00 00 24 d4 8c 07 58 36 6c 0d 91 39 7f ba 4b | 55 80 94 2b 15 6a 3d d9 23 c6 de 68 59 32 ea bf | f7 3a e2 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c1 c6 46 d6 42 6c c3 80 0a 8c 20 90 | 81 74 5d e8 06 92 e7 f6 00 00 00 1c 00 00 40 05 | 5c 1e 6e a7 c5 99 b7 4d bd dd e2 f9 8e 11 ad b4 | 92 1e 01 ed | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | #348 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 ba f7 ac 97 7a d7 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #360 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #360 | rejected packet: | e8 ba f7 ac 97 7a d7 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #360: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 7d 9d ff 1a 60 65 e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #348 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #348 | rejected packet: | a7 7d 9d ff 1a 60 65 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #348: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0548 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #354 | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #354 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #354 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49673.363912; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501135 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #354 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 "road-eastnet-nonat-102" #354: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #354) | 72 4c 85 c6 74 09 42 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 1b e9 65 bc 73 bc c5 81 57 1a 7b 1b db 4b 3f | 32 d5 0d b7 6a 65 f1 0a 67 34 33 c1 2c 23 e5 f2 | 41 57 12 1f 62 7d 04 aa d4 c7 47 71 78 e8 f0 df | 48 86 0b 9f 4e 36 6e 72 bd ec 74 1b dd 83 0a ab | df 0b c7 29 5d 45 26 d8 31 4b 64 db c5 65 76 90 | cd 52 7e 2d 27 67 7a 01 34 ba b6 3f e3 9a 85 48 | e4 51 41 5f 21 41 ff 88 e4 cc aa c0 b6 13 70 92 | 13 45 bf db 76 ed 1c 31 eb 2b 1f af 38 c5 ca 82 | 0b fb bb d7 57 27 bd 26 60 cb 6b 22 18 4a df 09 | ae e5 bd 33 88 7d ef 21 1c 95 13 3d a5 02 60 08 | e7 d2 1b 72 0a 7b aa 01 9d 47 2a 4d 32 3f 9b ec | 5b 5a ea 31 68 bb 1a dc 15 be 3d d6 a0 c0 98 db | 7b 5b 3d 8f ce 9b 6c 43 56 11 be e1 16 78 07 0a | 06 29 bd c7 77 7e 17 95 3a 22 27 47 9f 23 32 f6 | 37 27 d0 b4 53 1e 36 9f c8 05 75 2f 68 c9 35 72 | da 2e a9 d1 44 f4 35 64 d4 0a 4b c0 71 73 52 a8 | 29 00 00 24 72 5c 82 6f 5d 6b bd 69 39 4b 52 31 | 75 ca 0e e7 64 bc 08 f8 b5 d4 6f 1f bc a5 fc 80 | 56 52 35 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 33 77 7a c0 93 c5 bf 78 5c 8c bc | 79 60 cc b9 7e aa 2e bb 00 00 00 1c 00 00 40 05 | df 4b d5 4e cf 64 0d 4d 4f 32 d9 61 e4 8d 05 c9 | 9f e3 12 70 | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #354 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 4c 85 c6 74 09 42 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #354 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #354 | rejected packet: | 72 4c 85 c6 74 09 42 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #354: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0672 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348012bf0 | handling event EVENT_RETRANSMIT for parent state #337 | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #337 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #337 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49673.40227; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001976 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #337 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 "road-eastnet-nonat-85" #337: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #337) | ed 63 58 23 fd c1 76 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 96 54 84 2e e5 91 43 31 05 bf 8d 46 38 09 77 | 34 82 01 41 07 ba 77 ae 0e 58 56 59 e8 aa 03 3b | 7e fb 3d 6d 4d 59 d3 86 8a 20 2c b2 06 03 8a 41 | 33 cf 0e 06 87 87 a2 ab d5 f2 99 a7 84 cd 05 cf | ec d9 29 84 36 3e fc 29 32 e5 d2 77 7d a0 28 f8 | d1 0e 51 2f 73 28 bd 60 66 cf 7b 5c e8 76 7f ee | 0b 3f cc 47 13 a2 8f 86 8a 1d a1 57 96 4b 8e 1d | 54 09 0b 8b e7 94 12 ea 68 37 a0 5a 37 1b 43 96 | 9e 43 fb b9 f4 e3 a4 14 cb 49 50 02 95 69 45 10 | 4f 12 ab e9 0f 1f 01 01 a4 c3 ef 65 1e 2e cf e7 | 08 9d 2c 27 7f 64 fb 91 ba e9 80 4e 20 48 a7 46 | 4e 2b b0 83 ea 9c e6 04 02 2b 8c 1a 52 db c6 17 | d5 9e 92 ca bd cc 2d 80 e6 b4 24 b9 79 b6 76 9a | 0e 8f 39 57 ee 2c 0b 47 20 f0 82 f0 87 6e 0d 85 | f9 ab b8 d1 c1 07 ac ad 62 5b 5a 42 cc c5 f9 04 | de 15 7e d8 03 4b a1 c4 30 01 43 b8 8d 24 8e 44 | 29 00 00 24 47 35 e2 69 12 71 4e bf 5f ce fb f5 | 4b 5d 78 7a 40 67 4e 2b 89 1a 4f 82 42 7d 07 9d | 99 e5 3f 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 a6 ae 66 a0 2e 4a eb 14 83 41 42 | 9c b3 ed 9b 1a cc 9f 9b 00 00 00 1c 00 00 40 05 | 09 b5 68 86 30 d7 ba 9d 35 40 11 f6 5c 40 95 0a | 79 fe 98 fe | libevent_free: release ptr-libevent@0x7fb36c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348012bf0 | #337 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 63 58 23 fd c1 76 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #337 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #337 | rejected packet: | ed 63 58 23 fd c1 76 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #337: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0453 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23150 | handling event EVENT_RETRANSMIT for parent state #109 | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #109 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #109 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49673.413566; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006853 exceeds limit? YES "road-eastnet-nonat-109" #109: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-109" #109: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #361 at 0x557d46a67dd0 | State DB: adding IKEv2 state #361 in UNDEFINED | pstats #361 ikev2.ike started | Message ID: init #361: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #361: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #361; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-109" #361: initiating v2 parent SA to replace #109 | using existing local IKE proposals for connection road-eastnet-nonat-109 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 361 for state #361 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb348012bf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #361 | libevent_malloc: new ptr-libevent@0x7fb36c04b850 size 128 | #361 spent 0.0689 milliseconds in ikev2_parent_outI1() | RESET processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #109 ikev2.ike failed too-many-retransmits | pstats #109 ikev2.ike deleted too-many-retransmits | #109 spent 2.86 milliseconds in total | [RE]START processing: state #109 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-109" #109: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #109: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #109 "road-eastnet-nonat-109" #109: deleting IKE SA for connection 'road-eastnet-nonat-109' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-109' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-109 | State DB: deleting IKEv2 state #109 in PARENT_I1 | parent state #109: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 1 resuming | crypto helper 1 starting work-order 361 for state #361 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 361 | stop processing: state #109 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23150 | in statetime_stop() and could not find #109 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-109 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-109" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-109' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-109" | stop processing: connection "road-eastnet-nonat-109" (in initiate_a_connection() at initiate.c:349) | spent 0.0564 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 361 time elapsed 0.000565 seconds | (#361) spent 0.572 milliseconds in crypto helper computing work-order 361: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 361 for state #361 to event queue | scheduling resume sending helper answer for #361 | libevent_malloc: new ptr-libevent@0x7fb388020cc0 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #361 | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 361 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #361 | **emit ISAKMP Message: | initiator cookie: | 9c f5 2d c8 50 35 55 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-109 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fe f7 f3 f1 6a 76 6a 9a e6 0e 10 b4 e5 b5 16 07 | ikev2 g^x 0f 90 8a f4 dc 9f 27 b0 2a 41 17 f0 21 60 87 50 | ikev2 g^x 11 a6 84 2e 86 94 e1 65 4d 1a 59 ce 11 45 d2 c5 | ikev2 g^x 09 df ce 0a 2c f9 3e 7e cb 59 88 eb 93 1a 26 06 | ikev2 g^x 39 22 a5 57 b6 f2 5b 4c fe 56 6a 26 49 df e6 84 | ikev2 g^x b9 e4 e4 41 19 a0 e8 70 69 c2 51 79 76 2e 80 40 | ikev2 g^x 6f 9e 4b a9 87 c2 02 65 d3 3e 05 60 b6 af 86 d7 | ikev2 g^x 52 3c 7a 52 e9 69 b8 2a e6 43 99 6c 72 d9 7c 1a | ikev2 g^x 8d c9 5b fb a3 c2 fc 51 d5 fc c8 85 ff 46 8f 64 | ikev2 g^x e3 d3 a7 99 28 b1 43 6d 9b 9d 50 e1 af 1a d6 ff | ikev2 g^x 7e fd 10 23 a2 a6 f9 9b d2 06 fa 0f 91 01 67 9f | ikev2 g^x 42 43 ac e6 4f ae 3e 00 59 5d 7a cf b3 59 12 67 | ikev2 g^x 0d c1 86 cf 82 5d 20 9e 98 97 ec b2 7e be 63 74 | ikev2 g^x b3 15 a1 c0 63 a7 5d 61 bb b3 2f 2d 42 15 59 57 | ikev2 g^x 72 ca 0b d8 9e d0 1b 84 91 fd db 5e 8f 2f 62 ed | ikev2 g^x 99 8c a3 a5 ec ef 08 26 6f ab 64 68 6b 97 9d 3e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5d 7a 1f c2 56 77 bf 60 f2 37 f5 ed 4d 94 c3 a6 | IKEv2 nonce 58 e2 5f 6e 1b f6 b4 76 e5 69 0c 98 27 55 cd c0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9c f5 2d c8 50 35 55 d9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6d | natd_hash: port= 01 f4 | natd_hash: hash= 7d 71 91 34 7a e2 ba d5 01 f3 c5 56 ba 5f 83 71 | natd_hash: hash= 00 17 86 15 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7d 71 91 34 7a e2 ba d5 01 f3 c5 56 ba 5f 83 71 | Notify data 00 17 86 15 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9c f5 2d c8 50 35 55 d9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e0 46 0d f9 99 b9 47 b4 35 a0 04 20 4b 9b 45 ee | natd_hash: hash= 1c f7 92 53 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e0 46 0d f9 99 b9 47 b4 35 a0 04 20 4b 9b 45 ee | Notify data 1c f7 92 53 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #361 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #361: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #361 to 4294967295 after switching state | Message ID: IKE #361 skipping update_recv as MD is fake | Message ID: sent #361 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-109" #361: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.109:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #361) | 9c f5 2d c8 50 35 55 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe f7 f3 f1 6a 76 6a 9a e6 0e 10 b4 e5 b5 16 07 | 0f 90 8a f4 dc 9f 27 b0 2a 41 17 f0 21 60 87 50 | 11 a6 84 2e 86 94 e1 65 4d 1a 59 ce 11 45 d2 c5 | 09 df ce 0a 2c f9 3e 7e cb 59 88 eb 93 1a 26 06 | 39 22 a5 57 b6 f2 5b 4c fe 56 6a 26 49 df e6 84 | b9 e4 e4 41 19 a0 e8 70 69 c2 51 79 76 2e 80 40 | 6f 9e 4b a9 87 c2 02 65 d3 3e 05 60 b6 af 86 d7 | 52 3c 7a 52 e9 69 b8 2a e6 43 99 6c 72 d9 7c 1a | 8d c9 5b fb a3 c2 fc 51 d5 fc c8 85 ff 46 8f 64 | e3 d3 a7 99 28 b1 43 6d 9b 9d 50 e1 af 1a d6 ff | 7e fd 10 23 a2 a6 f9 9b d2 06 fa 0f 91 01 67 9f | 42 43 ac e6 4f ae 3e 00 59 5d 7a cf b3 59 12 67 | 0d c1 86 cf 82 5d 20 9e 98 97 ec b2 7e be 63 74 | b3 15 a1 c0 63 a7 5d 61 bb b3 2f 2d 42 15 59 57 | 72 ca 0b d8 9e d0 1b 84 91 fd db 5e 8f 2f 62 ed | 99 8c a3 a5 ec ef 08 26 6f ab 64 68 6b 97 9d 3e | 29 00 00 24 5d 7a 1f c2 56 77 bf 60 f2 37 f5 ed | 4d 94 c3 a6 58 e2 5f 6e 1b f6 b4 76 e5 69 0c 98 | 27 55 cd c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 71 91 34 7a e2 ba d5 01 f3 c5 56 | ba 5f 83 71 00 17 86 15 00 00 00 1c 00 00 40 05 | e0 46 0d f9 99 b9 47 b4 35 a0 04 20 4b 9b 45 ee | 1c f7 92 53 | state #361 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c04b850 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb348012bf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #361 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 | #361 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49673.414659 | resume sending helper answer for #361 suppresed complete_v2_state_transition() and stole MD | #361 spent 0.317 milliseconds in resume sending helper answer | stop processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388020cc0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9c f5 2d c8 50 35 55 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #361 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #361 | rejected packet: | 9c f5 2d c8 50 35 55 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6d fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #361: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12c40 | handling event EVENT_RETRANSMIT for parent state #308 | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #308 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #308 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49673.419836; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004109 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388043350 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #308 | libevent_malloc: new ptr-libevent@0x7fb388020cc0 size 128 "road-eastnet-nonat-56" #308: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #308) | 80 0a 88 98 4b f9 e7 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 60 f0 11 1d 6f 3c e8 3a d0 c5 a1 1f 8b f6 d6 | b8 1e e6 d3 27 fa 35 0f 2e 35 7c 6a ac 4d b0 5a | 6b 0b 3b 4a 46 9a c1 e4 d2 3d 95 4c 54 c7 f8 b0 | a3 25 b2 e5 19 52 cf a8 80 64 9a 61 44 3f 5d 89 | b3 ab 84 f7 4d 8d 5e c3 d5 83 26 99 08 7b 56 8e | d5 6a c7 4a 76 f4 45 38 3c fa 31 64 fb a7 68 c6 | c9 63 22 21 ab 35 5e 58 62 e8 99 25 ff 5b 61 ec | 55 a2 5b 36 cc 02 da 3b ef 08 f7 a5 b1 e6 33 04 | 63 ee 2e 9b fc 5a 62 eb 0d 0f da ab 7c b3 2f f6 | 1d 06 62 78 d0 f2 08 dd bd 5a f1 dc aa 18 b1 3b | 54 75 36 28 b8 4d f2 e6 89 e0 6c 9d a4 f4 71 27 | 99 51 48 e8 63 85 2b 41 07 00 9f 7b ff df b2 6f | 90 1f ac 1e 28 94 ef cf 9a 1c cf 53 7f 88 76 ba | 31 4b 32 29 7d 41 fd ba 51 dd cc 44 b9 6c 4f e1 | cf 89 c3 39 c3 eb 26 5a 05 e3 ac c1 a6 d7 ca ae | 7d 27 a2 0d 12 e5 de 71 e2 d1 95 9c b5 ec 14 d8 | 29 00 00 24 d3 c9 38 16 a4 35 41 62 ad 53 1d 3f | a5 70 61 f3 55 11 e2 06 85 67 55 51 bd 50 94 8d | 80 2d 38 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 1c df ea ba 44 23 ff a6 53 af 56 | 8c 58 68 ea 71 49 69 6d 00 00 00 1c 00 00 40 05 | 14 0c bd d4 4b a2 ff 28 87 d9 dd 83 a7 c2 2b 61 | 5c 8c 59 cd | libevent_free: release ptr-libevent@0x7fb380011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c40 | #308 spent 0.0846 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 0a 88 98 4b f9 e7 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #308 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #308 | rejected packet: | 80 0a 88 98 4b f9 e7 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #308: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0392 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1aec0 | handling event EVENT_RETRANSMIT for parent state #355 | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #355 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #355 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49673.440225; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50077 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #355 | libevent_malloc: new ptr-libevent@0x7fb380011f30 size 128 "road-eastnet-nonat-103" #355: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #355) | 56 ed c8 71 de f9 06 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 2a 83 b1 26 56 49 8c fe 5f bd b2 84 ea a3 88 | a4 f8 b8 d9 ec 49 43 44 95 bd 12 f2 c5 21 82 10 | 03 69 98 1b 4a 24 1f ea 40 8a 0b 91 c9 76 5c 49 | d4 99 e0 74 0f 3f ee 6f 9e 53 54 1a 23 35 59 5a | aa 59 0d cf 6b cd 1c a1 eb 6c 98 6c 37 17 d0 f8 | 3c dc 93 d2 77 45 41 e8 99 25 82 ad 9d 55 e6 13 | c0 f1 0d 8b 61 04 8f 57 63 d5 98 2e 2e 99 6e 3b | 2e 7c 41 b8 5b 06 ba ad 18 18 aa 84 1a 4c 4a ef | 3b 6e c9 03 be ae 7b 01 5e 77 a6 2b 34 36 7e 21 | 7f c5 d3 9e 48 69 2b 5b 00 e3 c7 29 41 93 4a 4f | 3f 0c 86 c3 a8 9a b3 72 ca 66 fb a6 7b 68 f9 97 | 45 bd 92 5e ee 7e 28 d2 1e 8d 24 ad 5b 2c db 57 | 1e 74 10 aa 41 ab d2 f5 21 4c 56 2b c7 8f ce 5e | d8 69 da 43 89 31 85 08 6d d1 b2 1a 22 1c fe b0 | 36 38 83 b8 45 19 23 bb 71 3e 12 a0 c1 d4 c6 f9 | 92 4b 6b b1 a2 bb 20 eb ff a0 77 69 c4 c9 35 d8 | 29 00 00 24 c0 01 1a b2 54 fa cf 80 10 d0 f3 31 | e6 0e 79 92 f9 e8 de f5 3e 1e d4 6a 54 e0 c2 2f | 19 27 3a 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 da f6 01 f4 40 01 a7 a7 77 b7 fc | 3d b7 6f 1f f7 90 79 11 00 00 00 1c 00 00 40 05 | d2 9a 8c 84 e0 9c 3f 77 ed a7 98 65 71 77 a0 dc | b3 15 95 be | libevent_free: release ptr-libevent@0x7fb3600300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1aec0 | #355 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 ed c8 71 de f9 06 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #355 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #355 | rejected packet: | 56 ed c8 71 de f9 06 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #355: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #262 | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #262 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #262 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49673.443598; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004777 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1aec0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #262 | libevent_malloc: new ptr-libevent@0x7fb3600300e0 size 128 "road-eastnet-nonat-10" #262: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #262) | 6c b6 05 ad 53 aa 46 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 71 41 19 2f e2 7d 30 6b 4e a1 e7 5c d2 fe 4f | e0 61 ad 09 53 0e a0 57 08 e6 8a c7 a8 ab 86 63 | b8 6a 7f 66 41 dd b7 63 7a df 2e dc eb 44 db ac | 84 60 8a 30 6d a6 8e c8 9b e0 4a d0 70 9a 6f d7 | 2b c0 d7 cf ec 52 70 50 23 5f 91 08 50 21 38 8b | 76 60 df cc d7 e8 a2 a1 14 d7 95 47 31 84 95 aa | a3 81 92 3c a4 0d 4b 28 d7 90 8d 56 f9 3c bf bc | 84 88 bc cf 92 1a d8 6c 91 60 d7 c8 53 4c 8f 1b | 33 3d 36 12 cc 21 af 62 59 3d a6 91 f5 8f 40 b1 | 5e 20 75 cb 09 ce 69 22 f7 ce 4e 56 bd 5c 4e 69 | 85 a0 6f 08 1d 3c a0 71 93 00 3c 05 be a2 5e a3 | 18 1e 44 5a 4d ed 58 8b 10 8f 38 84 6b ea 6f 25 | 2a 8f 86 0f 8b b5 6e ce 72 db 55 37 c3 3e 68 45 | 52 fb fc c3 b0 3a 37 24 8c 65 c9 ec 5e 24 2b c3 | 69 bc 27 c7 b0 7f 81 12 a0 6d 38 e6 33 39 b8 2c | 2a b9 3c 7a 5e 19 74 c7 ec ac 4b b5 b2 ea 83 d8 | 29 00 00 24 a4 15 8c 3a a3 1b 1e b6 c4 22 d7 fc | ab 68 38 21 36 11 f7 0b d4 9b 74 fb 1e 21 f2 3a | 1b 0d d1 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 64 14 a1 e8 e4 eb 96 cf 02 78 71 | fb d0 4f 54 fd 2f 47 94 00 00 00 1c 00 00 40 05 | f3 5b 09 5c ae 75 15 23 50 5d 21 6a e9 8d 68 9d | ed b0 04 c4 | libevent_free: release ptr-libevent@0x7fb3380407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | #262 spent 0.0851 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c b6 05 ad 53 aa 46 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #262 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #262 | rejected packet: | 6c b6 05 ad 53 aa 46 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #262: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #349 | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #349 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #349 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49673.452851; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002602 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #349 | libevent_malloc: new ptr-libevent@0x7fb3380407f0 size 128 "road-eastnet-nonat-97" #349: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #349) | 84 94 92 07 09 8b 01 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e7 8e 3a 36 94 c3 d9 80 af 87 82 89 a3 71 41 9f | e6 44 09 3c bc 67 77 29 06 f4 ae 77 a3 9d 60 1d | 0a c3 1b 6a f7 b0 e9 13 94 a5 ce ce a7 52 56 d7 | 84 e9 4e d5 99 7f 7c fb f5 b7 93 ee 65 0d 15 55 | 04 2d a2 78 15 79 38 de 23 c4 7d 82 d0 7f 5f 98 | a6 33 cb b9 33 39 5b 48 a5 eb 5c 5c 81 d0 ca 8c | f1 d5 2b 41 d5 80 88 70 6d 08 d5 9e c9 be 4a d6 | 16 61 b8 6d a8 4e 60 a2 94 6c 33 db 5b 42 45 bb | 02 30 28 9a 37 b4 00 e3 81 c4 fd 79 89 1a f9 a5 | 2d 14 0f 8f c7 04 8a 63 e3 4c c8 23 59 80 dd 4f | 13 40 1c 8c 06 1f 4a 77 c9 3e 21 20 cb 58 47 cb | c0 5d 53 b2 99 fb 04 a7 a3 35 71 6b 00 88 75 8a | 99 0c dd 71 02 4e 48 62 56 32 bf a2 8c b2 87 7c | 45 a3 56 eb 30 b8 7e 62 54 0f 19 2a 8e 1f 1c bd | cc fa 91 16 33 60 18 c9 3d f1 ea d9 79 83 28 b3 | ee b8 50 9e a8 3a a5 db fe df 37 7d ce de f7 60 | 29 00 00 24 8e 8f cc b6 0d fd cb ad 0f 95 32 a9 | a9 4b b8 56 89 46 30 eb 8f f5 1c d9 09 ec 14 75 | 5c 37 d2 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea f1 98 2b 6b f5 c7 7c ec d8 88 00 | 36 4b b7 7c e3 5b 66 cb 00 00 00 1c 00 00 40 05 | 49 36 ed 90 92 0a 38 5a 43 cd 17 7a 90 9b e6 10 | 1f ed 97 63 | libevent_free: release ptr-libevent@0x7fb3780300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #349 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 94 92 07 09 8b 01 c4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #349 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #349 | rejected packet: | 84 94 92 07 09 8b 01 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #349: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c012630 | handling event EVENT_RETRANSMIT for parent state #338 | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #338 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #338 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49673.466135; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003518 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #338 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 "road-eastnet-nonat-86" #338: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #338) | 1f e2 d0 d2 e5 84 7f 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db f7 91 cd 84 5c a7 ef c5 4a 9e 2e af a2 43 ea | 45 0a b8 db c5 6e 04 46 ba a1 d5 11 76 fa 91 5a | 21 6e 50 69 5f 4c 63 af d6 32 06 ae 79 8f f8 47 | 06 f3 f5 c6 98 57 e2 e8 f9 93 2e 73 11 9e c7 4b | 81 b1 ab c3 4c 82 50 3e 95 1b 93 8d f3 f1 26 94 | 35 dc 1c 86 75 c4 0b 21 99 da cd 92 fb c9 25 d3 | a1 77 02 1c 94 1f a7 90 d7 35 62 14 3f a4 c2 e2 | 04 47 bb f7 88 43 f1 58 36 ff ad ce 6a c6 3a e5 | ca 19 27 9c c0 b7 91 62 00 c9 17 fb 82 73 f3 dc | 8a f9 f2 d0 2d 78 16 8f d3 1a df 7b 29 7f a7 d2 | 2a 1d 58 77 31 26 e6 25 fd f1 f0 ff b3 be 2a fb | 9a f2 05 45 cd 1a c0 33 3f 3e 0c b1 4a 0e 13 b1 | f3 25 ba 03 ce 1b 65 7e 16 c3 d1 62 05 e6 0b 87 | 27 59 78 26 a7 72 9c cf a5 2a c9 6c 3c 43 6b b4 | dd fc 35 a0 21 8a d9 83 8c b5 e6 a8 c9 3d 42 bd | e0 43 1a dd 83 56 78 b8 0a 0d d3 50 6d 61 d9 5c | 29 00 00 24 53 73 16 e0 68 43 e7 c2 a0 53 68 5d | 7e 07 bf 33 55 30 e6 39 bc d6 66 c9 05 5a fa 29 | b8 4f 54 b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 1b 58 be 75 e4 59 10 d1 29 a5 4a | 19 0e d4 a5 d3 bb ae eb 00 00 00 1c 00 00 40 05 | e1 23 de d4 d9 5f 17 c1 21 ba 79 77 2a ee 0e dd | 91 6b 75 70 | libevent_free: release ptr-libevent@0x7fb36c04b970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012630 | #338 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f e2 d0 d2 e5 84 7f 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #338 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #338 | rejected packet: | 1f e2 d0 d2 e5 84 7f 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #338: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344005860 | handling event EVENT_RETRANSMIT for parent state #309 | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #309 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #309 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49673.517422; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003962 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012630 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #309 | libevent_malloc: new ptr-libevent@0x7fb36c04b970 size 128 "road-eastnet-nonat-57" #309: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #309) | 90 f2 f2 23 da 96 f5 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 ae c5 2a 76 79 d9 11 80 1f 96 5b 2c 21 55 0e | 52 32 59 59 4d 8b 62 1b 1e 24 ff e4 61 ef 06 93 | bc 09 7d 02 95 4e 35 bb 5f 6e 04 f9 37 8a f2 09 | 6d fa 0e df ec 2a 67 53 c6 cd 21 62 19 ee 00 c8 | c1 d4 ad 74 e9 af 08 d7 51 b7 54 c4 5f 85 6b a2 | 75 c9 cd 93 29 db 83 26 13 60 09 0f 01 6b a6 ba | d6 a0 83 70 f4 77 2d c4 f9 20 b0 ee 09 7b a0 33 | 18 ea 6e 22 92 4b e5 33 07 61 e4 39 b1 8b 5a 98 | 64 4f e0 7f 33 58 7a 46 70 b5 36 54 83 e6 d8 37 | ce 3d 5e 64 00 34 b5 97 2a dc 6b 73 bd d2 1e e9 | b3 9d 99 c9 3c f8 18 03 58 76 b7 9a 2d cb ea 7b | 87 84 d1 8b 6e c6 cd 25 71 71 3e 99 ff 0a 1f c8 | 85 6f a7 e5 39 50 54 2c 26 84 44 cb fa 8a 51 d4 | ba 1f 9f 90 6f 93 95 a4 f9 85 9a b3 12 aa 79 46 | 05 32 e1 d4 7a f2 7a 36 94 b5 70 4b aa c4 3f f8 | f9 83 fb b5 44 81 41 3d b3 33 5c b4 2d 71 df 84 | 29 00 00 24 4c 7f 8f 28 17 31 ae 2a a7 3c 6d 65 | 1e 41 da 23 81 4d 09 fa 18 57 5d 4f dc f4 df 6c | 20 61 c5 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f3 f8 4c d7 1e 43 e6 3f 42 eb 30 72 | de e0 e8 5b 93 4d e7 89 00 00 00 1c 00 00 40 05 | e8 f2 fc 6d 83 fa 04 7a cc 0f 54 6b 70 28 25 4d | 2b f2 eb 8b | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344005860 | #309 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 f2 f2 23 da 96 f5 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #309 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #309 | rejected packet: | 90 f2 f2 23 da 96 f5 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #309: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad4340 | handling event EVENT_RETRANSMIT for parent state #110 | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #110 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #110 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49673.519704; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00993 exceeds limit? YES "road-eastnet-nonat-110" #110: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-110" #110: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #362 at 0x557d46a69390 | State DB: adding IKEv2 state #362 in UNDEFINED | pstats #362 ikev2.ike started | Message ID: init #362: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #362: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #362; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-110" #362: initiating v2 parent SA to replace #110 | using existing local IKE proposals for connection road-eastnet-nonat-110 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 362 for state #362 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #362 | libevent_malloc: new ptr-libevent@0x7fb374009640 size 128 | #362 spent 0.087 milliseconds in ikev2_parent_outI1() | RESET processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 resuming | crypto helper 2 starting work-order 362 for state #362 | start processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #110 ikev2.ike failed too-many-retransmits | pstats #110 ikev2.ike deleted too-many-retransmits | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 362 | #110 spent 3.08 milliseconds in total | [RE]START processing: state #110 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-110" #110: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #110: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #110 "road-eastnet-nonat-110" #110: deleting IKE SA for connection 'road-eastnet-nonat-110' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-110' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-110 | State DB: deleting IKEv2 state #110 in PARENT_I1 | parent state #110: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #110 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 362 time elapsed 0.001072 seconds | libevent_free: release ptr-libevent@0x7fb370046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad4340 | in statetime_stop() and could not find #110 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-110 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | (#362) spent 1.07 milliseconds in crypto helper computing work-order 362: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 362 for state #362 to event queue | start processing: connection "road-eastnet-nonat-110" (in initiate_a_connection() at initiate.c:186) | scheduling resume sending helper answer for #362 | connection 'road-eastnet-nonat-110' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | libevent_malloc: new ptr-libevent@0x7fb3800223c0 size 128 | FOR_EACH_STATE_... in find_phase1_state | crypto helper 2 waiting (nothing to do) | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-110" | stop processing: connection "road-eastnet-nonat-110" (in initiate_a_connection() at initiate.c:349) | spent 0.0757 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #362 | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 362 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #362 | **emit ISAKMP Message: | initiator cookie: | 79 e0 7b db bf e0 df 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-110 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 05 58 27 86 c5 f9 8c cf 89 68 d1 9e c2 2a c8 4a | ikev2 g^x da 7d d8 07 8a b5 64 43 22 f7 a6 30 97 ca b8 f5 | ikev2 g^x c8 25 5f 3f d2 8e be 62 d3 8d 6c cf 71 bf 76 63 | ikev2 g^x d9 07 8d b1 c5 9f c3 a7 b8 7e e5 00 03 0b c1 0d | ikev2 g^x 22 f4 89 95 0c d8 00 e4 8c ba a0 1b ac fa 89 c6 | ikev2 g^x 67 62 f6 a7 e4 8c 4f c8 c7 77 79 53 f8 98 39 2d | ikev2 g^x 3b 30 0a e1 da cb f1 fc f0 30 13 27 47 13 e0 65 | ikev2 g^x 0b da e5 87 6f 0e 6c c0 89 03 ab 2a 82 c5 34 95 | ikev2 g^x 15 34 67 de 5a aa b5 07 35 bc 95 aa 82 00 b1 16 | ikev2 g^x 8e 6b 21 e0 45 a5 66 95 6e 83 16 8f 2b ee 03 ef | ikev2 g^x 02 de 36 db b0 c0 f4 e2 d2 1e 0d be d8 91 f7 72 | ikev2 g^x cd 14 33 51 64 d5 dd d5 3d 65 70 28 c3 2f 57 3f | ikev2 g^x 4b 4b d5 8c f2 92 b3 0c 9f 8d a0 2f 9a 5f 9d a8 | ikev2 g^x 0d ae cd 5e 77 75 b7 48 bb 27 68 90 7e 0e 8d 10 | ikev2 g^x 86 bf a4 47 df bb 7b cb 34 23 b8 08 15 f3 7f 6d | ikev2 g^x 51 d5 ae f8 b3 60 44 e0 56 71 c5 a9 57 5a 24 c6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3b 79 7f e5 5c de f0 ae 26 7a 15 81 35 42 e6 f3 | IKEv2 nonce 1d 66 3a 94 36 41 6a 99 ae e0 a8 96 08 73 ec d2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 79 e0 7b db bf e0 df 8c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6e | natd_hash: port= 01 f4 | natd_hash: hash= 08 91 48 5f b0 47 d4 61 2c f1 27 03 24 75 2b 95 | natd_hash: hash= c4 3a 3e 58 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 08 91 48 5f b0 47 d4 61 2c f1 27 03 24 75 2b 95 | Notify data c4 3a 3e 58 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 79 e0 7b db bf e0 df 8c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ec 66 fb 7f d2 86 12 b1 2b 4e 47 12 62 c8 23 32 | natd_hash: hash= 13 d6 12 8d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ec 66 fb 7f d2 86 12 b1 2b 4e 47 12 62 c8 23 32 | Notify data 13 d6 12 8d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #362 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #362: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #362 to 4294967295 after switching state | Message ID: IKE #362 skipping update_recv as MD is fake | Message ID: sent #362 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-110" #362: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.110:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #362) | 79 e0 7b db bf e0 df 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 58 27 86 c5 f9 8c cf 89 68 d1 9e c2 2a c8 4a | da 7d d8 07 8a b5 64 43 22 f7 a6 30 97 ca b8 f5 | c8 25 5f 3f d2 8e be 62 d3 8d 6c cf 71 bf 76 63 | d9 07 8d b1 c5 9f c3 a7 b8 7e e5 00 03 0b c1 0d | 22 f4 89 95 0c d8 00 e4 8c ba a0 1b ac fa 89 c6 | 67 62 f6 a7 e4 8c 4f c8 c7 77 79 53 f8 98 39 2d | 3b 30 0a e1 da cb f1 fc f0 30 13 27 47 13 e0 65 | 0b da e5 87 6f 0e 6c c0 89 03 ab 2a 82 c5 34 95 | 15 34 67 de 5a aa b5 07 35 bc 95 aa 82 00 b1 16 | 8e 6b 21 e0 45 a5 66 95 6e 83 16 8f 2b ee 03 ef | 02 de 36 db b0 c0 f4 e2 d2 1e 0d be d8 91 f7 72 | cd 14 33 51 64 d5 dd d5 3d 65 70 28 c3 2f 57 3f | 4b 4b d5 8c f2 92 b3 0c 9f 8d a0 2f 9a 5f 9d a8 | 0d ae cd 5e 77 75 b7 48 bb 27 68 90 7e 0e 8d 10 | 86 bf a4 47 df bb 7b cb 34 23 b8 08 15 f3 7f 6d | 51 d5 ae f8 b3 60 44 e0 56 71 c5 a9 57 5a 24 c6 | 29 00 00 24 3b 79 7f e5 5c de f0 ae 26 7a 15 81 | 35 42 e6 f3 1d 66 3a 94 36 41 6a 99 ae e0 a8 96 | 08 73 ec d2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 91 48 5f b0 47 d4 61 2c f1 27 03 | 24 75 2b 95 c4 3a 3e 58 00 00 00 1c 00 00 40 05 | ec 66 fb 7f d2 86 12 b1 2b 4e 47 12 62 c8 23 32 | 13 d6 12 8d | state #362 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb344005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad4340 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #362 | libevent_malloc: new ptr-libevent@0x7fb370046040 size 128 | #362 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49673.52138 | resume sending helper answer for #362 suppresed complete_v2_state_transition() and stole MD | #362 spent 0.333 milliseconds in resume sending helper answer | stop processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3800223c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 e0 7b db bf e0 df 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #362 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #362 | rejected packet: | 79 e0 7b db bf e0 df 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6e fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #362: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac1340 | handling event EVENT_RETRANSMIT for parent state #339 | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #339 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #339 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49673.527553; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002261 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380009ed0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #339 | libevent_malloc: new ptr-libevent@0x7fb3800223c0 size 128 "road-eastnet-nonat-87" #339: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #339) | a2 06 83 e6 4d cf 47 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 60 78 10 c3 0f cc 3e 4e 2e d5 96 c1 d2 76 e3 | 97 d5 35 a5 15 b5 cf 25 fc d1 a9 ed 61 00 ab d3 | f0 a5 f9 6b c8 93 25 3b e7 35 94 5b 27 e6 7c aa | 9f 99 13 73 c8 87 72 6f e3 9a d8 3f f2 60 6d 07 | e2 f2 df 74 8c d9 c0 ea 66 9b 1a f7 3a 35 11 09 | 4c 1a 77 9c 33 ec 8e 52 10 1b 5c 10 4f 88 cf e4 | ab bc 00 8a 49 0d dc 56 57 fd b9 aa 33 dc a2 d8 | 3f a7 e3 81 b2 6c 3d 05 80 c1 9e e7 22 3d 4f 4b | 69 99 65 2e db d4 42 77 f6 d5 da ca 9c 7b 37 94 | 4a 33 ff d3 90 af 06 41 1e af a8 a1 29 27 b8 4e | 94 36 29 4f 90 ae d8 40 e5 f9 f7 60 20 50 ae f6 | 19 f9 e5 ce 63 be 68 f8 75 c8 c0 44 7f 51 fc 3c | fe be 4d e9 10 ea 8c 24 89 c7 41 df 92 c0 7b 00 | f7 f4 82 ce db 65 47 b6 bb fd f3 75 44 d0 1d c4 | 34 92 d9 b1 3f bf c2 cf e2 c7 6c 0d 60 aa 7d 11 | 0e 19 00 e8 57 9d 13 5a 3b a1 80 7a d5 8d 15 4c | 29 00 00 24 1c 60 55 0f db a5 b1 e0 94 27 e9 83 | 86 bb c4 10 2a 23 35 9c a1 96 2d 6f 7e 5d c3 40 | 27 31 c9 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 61 9a 5c 09 fb 4f 1f fe 5c 80 fd | 11 ff 3a 18 d8 5f 68 01 00 00 00 1c 00 00 40 05 | f8 00 9b 14 2d 47 6c 3b ee ab c1 8e 99 04 04 19 | 24 06 94 42 | libevent_free: release ptr-libevent@0x7fb35c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac1340 | #339 spent 0.0926 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 06 83 e6 4d cf 47 f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #339 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #339 | rejected packet: | a2 06 83 e6 4d cf 47 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #339: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #356 | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #356 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #356 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49673.528806; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500841 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac1340 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #356 | libevent_malloc: new ptr-libevent@0x7fb35c035930 size 128 "road-eastnet-nonat-104" #356: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #356) | ac bc fb 64 b8 05 f9 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 3b ae 20 ec 7a cd 21 f9 ff e0 06 71 c2 e5 55 | 9b 45 49 5f 50 f5 30 9c 0b 3e 8a a2 28 f4 85 c7 | 4f 6f 8c f6 77 7f 00 15 6e 19 1d d1 e0 68 66 87 | 4e df 9c 72 ac b2 8d ab fe f6 05 78 0d c2 c2 f2 | 31 63 92 17 54 19 b6 cf fd 16 6a d8 32 67 48 40 | 84 9f 47 99 c0 29 49 ad 8d 18 53 a5 6f ce c9 03 | 2a bd 3e e5 4f fd 0e 59 73 26 a7 73 de 18 dc 8d | 09 79 73 ae 09 17 25 e9 44 ce 32 60 cd df 52 37 | 66 e2 fc 8e a8 ff 6f bc 73 d9 a9 e6 7e 34 29 30 | c0 25 f8 37 35 6d fc d1 5a 42 45 e2 29 19 ad 5e | b1 89 0e dc 25 33 50 a2 38 82 4f ae e6 4f c3 97 | 55 76 c2 67 8a 3e ac 3d 84 f3 32 ca 54 cc 1c 9f | 23 91 a9 44 f4 93 a5 2a aa cc ed 04 01 4e eb f5 | 00 ac f3 c1 d5 2f 9a 43 89 cf f2 f2 55 7d 1d 3b | d4 57 90 a2 11 f9 23 83 ee a6 72 aa 3b 95 a5 9a | f2 6e 4c 51 df 03 55 77 ff 21 15 db 98 87 cc e3 | 29 00 00 24 80 41 9d 85 d0 e1 49 10 c1 0f c3 d9 | f1 36 ea c7 60 65 b3 e5 0e 51 88 57 20 76 d9 47 | 30 46 2c b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 1f 59 ee ab 85 d8 d4 4a d4 96 c0 | ee 5f a4 59 2f 4a 72 17 00 00 00 1c 00 00 40 05 | 04 5f 5b a5 b0 c4 89 9e 39 c9 c6 97 69 9e e5 9e | 19 14 82 3e | libevent_free: release ptr-libevent@0x7fb370035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #356 spent 0.0866 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac bc fb 64 b8 05 f9 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #356 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #356 | rejected packet: | ac bc fb 64 b8 05 f9 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #356: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0408 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6e010 | handling event EVENT_RETRANSMIT for parent state #350 | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #350 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #350 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49673.536072; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002085 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #350 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 "road-eastnet-nonat-98" #350: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #350) | 40 3f 8a 6a 3f ea 6b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee ea 5c 1b 2d cc 1b 57 9c 51 33 ce c2 ed 39 3b | d5 b7 1c c2 6d 3d 6f 5f ba 5c 85 39 fb a1 11 1d | ec 11 21 bd c2 b6 25 81 4a 85 2d 0f 85 73 9e fb | a1 4c 57 38 85 7e 31 44 0a 93 0c da 6d f0 93 22 | ea f6 8a 91 67 64 50 56 68 c0 c2 6d f2 4b e0 19 | 4b 14 40 46 ec 4d e3 7d d1 0f 0b 72 f6 ab 45 80 | 03 a2 d3 a8 ff e3 ae 4e 7b 0a 5c 1e da 4a b5 ed | 95 94 b9 4b 3c c2 85 4e cd 4a 91 b6 1f 72 c1 aa | c6 85 8f ca 28 3b ab 17 e7 f1 83 c4 ae 08 27 14 | 18 32 e7 a1 65 f1 da e5 f8 9c a1 45 4b c6 41 38 | 3d f5 8c c5 56 e5 06 ff b3 a3 fd f2 89 c2 8c 0e | 41 65 f9 6f e4 16 5e 64 06 38 6c 0e 32 c8 d5 26 | 50 db 25 f3 e4 e0 37 8b 04 62 7e a1 89 aa 8e 24 | 47 48 9e 92 05 5e 29 4c b7 2e ed e9 6d 8a 54 a2 | 85 8b e4 f5 76 e6 c8 0e c4 53 cb 98 41 4b 77 41 | 74 9f 3a d4 11 79 37 50 cf fb e2 04 ed 15 0c fe | 29 00 00 24 03 ee f5 21 ef 32 aa b5 bd 88 40 59 | 47 cc 90 0f 4b 5f 82 19 9f 96 a8 bf f3 8c 9d 85 | 66 d4 51 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 b2 cf 38 e9 ab 0b d5 10 0e c3 6c | 99 ae 6e 40 7a a8 97 3d 00 00 00 1c 00 00 40 05 | f6 5d 8e f9 dd 59 4b 5a 6d 88 5a 23 64 29 55 dd | f6 46 db 31 | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6e010 | #350 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 40 3f 8a 6a 3f ea 6b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #350 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #350 | rejected packet: | 40 3f 8a 6a 3f ea 6b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #350: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a42790 | handling event EVENT_RETRANSMIT for parent state #263 | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #263 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #263 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49673.567347; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004052 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6e010 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #263 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 "road-eastnet-nonat-11" #263: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #263) | ca df fa 2e cc 97 0a e0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 35 4e f5 b3 06 6a 55 0c f2 3d 49 3f 7e 31 f9 | fb cf 08 8d 9e dd 74 b4 ae 16 46 b6 d3 2d d7 81 | a5 4c 1e 3c 51 d2 5c 80 19 32 ae 15 f6 f1 83 90 | 89 74 e1 7a 65 6e b3 e6 37 19 f8 4c fe 75 98 41 | ac 4f 10 33 24 18 c2 b3 2c d3 58 72 8c df 81 d4 | 59 38 86 31 ec e0 a1 c4 d1 46 91 6e e8 5d e0 23 | 68 ef 05 cb cd 03 0b e1 cd 09 50 09 e9 ff 48 e3 | 8e ec a4 98 4e a5 2a 21 fb 32 20 aa 01 94 37 a3 | 4a a0 06 10 8c 55 c7 ef f3 db 52 f2 2f 93 75 5e | 89 12 79 f7 25 8b 5c 7e 90 0c 79 f1 46 9c 39 dc | 62 04 8a 23 65 3e da dc e9 e6 17 7c 76 c0 74 b4 | 38 86 ca da 50 ae fc f8 de 6d 6d ce d9 7f cd c0 | 85 4e f8 c9 04 41 9d 47 8a 73 e9 b5 4a cc 14 ad | 16 95 76 51 b8 09 27 ef 06 ca 3a bb ff 24 77 42 | cc fc 6e a1 e6 2b bd 33 6d f5 6a df 58 56 a8 4b | 96 18 0e 2a e9 ec 68 a9 e4 55 e7 47 98 67 01 11 | 29 00 00 24 1f 89 c4 e0 c8 b8 15 d0 01 8c 72 b7 | b9 51 02 35 29 86 83 18 da 61 92 fd 67 fb 67 7c | 20 e3 84 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 89 6c b7 69 49 4f f4 6b c0 cb 25 | 85 ed a6 01 12 ce 48 f3 00 00 00 1c 00 00 40 05 | 1c d7 2d 11 fa 53 cc ec b9 10 e5 08 27 61 79 62 | 96 79 33 55 | libevent_free: release ptr-libevent@0x7fb338012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a42790 | #263 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca df fa 2e cc 97 0a e0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #263 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #263 | rejected packet: | ca df fa 2e cc 97 0a e0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #263: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0673 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #111 | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #111 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #111 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49673.586701; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007297 exceeds limit? YES "road-eastnet-nonat-111" #111: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-111" #111: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #363 at 0x557d46a6a950 | State DB: adding IKEv2 state #363 in UNDEFINED | pstats #363 ikev2.ike started | Message ID: init #363: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #363: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #363; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-111" #363: initiating v2 parent SA to replace #111 | using existing local IKE proposals for connection road-eastnet-nonat-111 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 363 for state #363 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a42790 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #363 | libevent_malloc: new ptr-libevent@0x7fb338012840 size 128 | #363 spent 0.0936 milliseconds in ikev2_parent_outI1() | RESET processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #111 ikev2.ike failed too-many-retransmits | pstats #111 ikev2.ike deleted too-many-retransmits | #111 spent 2.59 milliseconds in total | [RE]START processing: state #111 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-111" #111: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #111: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #111 "road-eastnet-nonat-111" #111: deleting IKE SA for connection 'road-eastnet-nonat-111' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-111' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-111 | State DB: deleting IKEv2 state #111 in PARENT_I1 | parent state #111: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #111 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb35c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | in statetime_stop() and could not find #111 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-111 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-111" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-111' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-111" | stop processing: connection "road-eastnet-nonat-111" (in initiate_a_connection() at initiate.c:349) | spent 0.0609 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 0 resuming | crypto helper 0 starting work-order 363 for state #363 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 363 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 363 time elapsed 0.00084 seconds | (#363) spent 0.847 milliseconds in crypto helper computing work-order 363: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 363 for state #363 to event queue | scheduling resume sending helper answer for #363 | libevent_malloc: new ptr-libevent@0x7fb384020ef0 size 128 | crypto helper 0 waiting (nothing to do) | processing resume sending helper answer for #363 | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 363 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #363 | **emit ISAKMP Message: | initiator cookie: | 51 61 7f 08 48 15 06 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-111 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 46 a4 74 58 c5 f7 d1 13 97 f0 a1 32 ec ba 3b 12 | ikev2 g^x 2a d1 a7 2b 3c 6a 89 b1 af 9f ef 60 99 3f 2b 97 | ikev2 g^x 5a 99 67 3e 04 49 9e e1 18 dd 5b 9a 36 f4 31 c2 | ikev2 g^x 53 fb e0 15 b1 f1 17 18 c0 6a ef 59 2d 9b 43 90 | ikev2 g^x f2 8c 3e 64 6c 64 9b 41 4d c8 83 ed 81 03 01 ef | ikev2 g^x 94 98 ac cb 77 3f 19 e2 3d 9a 98 04 76 6b 13 b3 | ikev2 g^x cd 7b 90 ce b0 33 d0 e1 b7 52 ee 6b 51 23 7a ea | ikev2 g^x a8 cb 6b 19 dd 2c 75 92 bf 4f 96 8d 61 90 60 ba | ikev2 g^x ac 55 20 f8 f6 10 ca 5a 43 53 71 3b 48 a8 5f 63 | ikev2 g^x 88 26 59 cb be 95 f5 90 58 5a 07 1f 8c 1f 49 2e | ikev2 g^x ab c9 b4 33 89 02 d4 f8 ad 34 05 81 7c 83 7c ee | ikev2 g^x b9 f5 ea 3c 82 86 1f 8e fd dd f8 79 c6 1d d2 66 | ikev2 g^x eb 43 cd 6b f4 5d 2f 21 06 e6 55 35 36 2a fc 16 | ikev2 g^x 28 b4 a8 e2 ec 6d b6 b7 1a 42 16 71 43 4d 93 a5 | ikev2 g^x b9 be 7c 8b c2 15 e3 5b 72 eb 03 26 dc 93 d9 17 | ikev2 g^x b6 f6 7f 82 7f 35 e0 76 a8 41 7c 2a 12 6a fc 61 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 05 ae 65 e3 84 b1 1a 26 06 06 7b dc a8 83 38 36 | IKEv2 nonce 54 1a c8 5b 72 97 b6 83 dc f9 79 7c dc 6e a1 e8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 51 61 7f 08 48 15 06 49 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6f | natd_hash: port= 01 f4 | natd_hash: hash= e9 05 ad f7 99 b0 88 ad 41 82 57 31 e5 ff 67 18 | natd_hash: hash= 3e 77 ff e2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e9 05 ad f7 99 b0 88 ad 41 82 57 31 e5 ff 67 18 | Notify data 3e 77 ff e2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 51 61 7f 08 48 15 06 49 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a3 ac d5 a3 ef 34 92 9f a8 df c6 0f 83 0b 12 93 | natd_hash: hash= d2 32 5e d3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a3 ac d5 a3 ef 34 92 9f a8 df c6 0f 83 0b 12 93 | Notify data d2 32 5e d3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #363 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #363: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #363 to 4294967295 after switching state | Message ID: IKE #363 skipping update_recv as MD is fake | Message ID: sent #363 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-111" #363: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.111:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #363) | 51 61 7f 08 48 15 06 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 a4 74 58 c5 f7 d1 13 97 f0 a1 32 ec ba 3b 12 | 2a d1 a7 2b 3c 6a 89 b1 af 9f ef 60 99 3f 2b 97 | 5a 99 67 3e 04 49 9e e1 18 dd 5b 9a 36 f4 31 c2 | 53 fb e0 15 b1 f1 17 18 c0 6a ef 59 2d 9b 43 90 | f2 8c 3e 64 6c 64 9b 41 4d c8 83 ed 81 03 01 ef | 94 98 ac cb 77 3f 19 e2 3d 9a 98 04 76 6b 13 b3 | cd 7b 90 ce b0 33 d0 e1 b7 52 ee 6b 51 23 7a ea | a8 cb 6b 19 dd 2c 75 92 bf 4f 96 8d 61 90 60 ba | ac 55 20 f8 f6 10 ca 5a 43 53 71 3b 48 a8 5f 63 | 88 26 59 cb be 95 f5 90 58 5a 07 1f 8c 1f 49 2e | ab c9 b4 33 89 02 d4 f8 ad 34 05 81 7c 83 7c ee | b9 f5 ea 3c 82 86 1f 8e fd dd f8 79 c6 1d d2 66 | eb 43 cd 6b f4 5d 2f 21 06 e6 55 35 36 2a fc 16 | 28 b4 a8 e2 ec 6d b6 b7 1a 42 16 71 43 4d 93 a5 | b9 be 7c 8b c2 15 e3 5b 72 eb 03 26 dc 93 d9 17 | b6 f6 7f 82 7f 35 e0 76 a8 41 7c 2a 12 6a fc 61 | 29 00 00 24 05 ae 65 e3 84 b1 1a 26 06 06 7b dc | a8 83 38 36 54 1a c8 5b 72 97 b6 83 dc f9 79 7c | dc 6e a1 e8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 05 ad f7 99 b0 88 ad 41 82 57 31 | e5 ff 67 18 3e 77 ff e2 00 00 00 1c 00 00 40 05 | a3 ac d5 a3 ef 34 92 9f a8 df c6 0f 83 0b 12 93 | d2 32 5e d3 | state #363 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb338012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a42790 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #363 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 | #363 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49673.588403 | resume sending helper answer for #363 suppresed complete_v2_state_transition() and stole MD | #363 spent 0.482 milliseconds in resume sending helper answer | stop processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb384020ef0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 61 7f 08 48 15 06 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #363 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #363 | rejected packet: | 51 61 7f 08 48 15 06 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6f fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #363: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b07dc0 | handling event EVENT_RETRANSMIT for parent state #340 | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #340 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #340 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49673.596617; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002718 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384015160 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #340 | libevent_malloc: new ptr-libevent@0x7fb384020ef0 size 128 "road-eastnet-nonat-88" #340: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #340) | 06 b4 2a d6 65 92 42 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 29 a3 64 49 07 ee 29 df 38 b6 8e cf 9e 1e 2e | b5 cf 5c 9d df 90 0b 24 c7 00 d1 e9 e7 d5 9f 86 | b0 59 b0 c3 a3 da d8 a1 12 f7 d8 f8 0e b3 79 c6 | 53 3d ef a8 ea 62 cb cf 67 47 98 25 86 4a be 53 | 9d 43 a7 c0 c8 ef 24 bd 84 89 4d 1e d4 43 4c 6d | a9 e8 b8 a2 ac 6e 98 24 1f 18 dc ca 27 cf d8 28 | a6 29 25 bd 63 2f 94 ef bf ef cd 28 af b3 c4 14 | c2 24 5c 8a a7 98 ce 81 da e6 36 b6 6f 19 b3 9c | 61 e9 12 2d 81 4f 37 09 f9 11 51 0b 0a 15 3c 25 | dc 56 9d bc 1a 37 30 79 ad 58 f9 75 6f 1b 9e ed | af 69 6e f2 46 86 c0 e7 9c f5 ce 51 f7 2f 69 1c | c5 ca c9 df 4e 7a 80 a9 78 c1 72 af 2f 09 7a f4 | 7b e9 80 c9 52 10 9d 4e 28 29 82 d9 cd 16 a6 20 | 67 0a 26 62 77 51 4a e8 62 40 48 56 bb c1 3c 45 | c4 fb 9d d0 c4 57 ec 56 11 1b 76 f9 cd ac 15 3f | 9b 2c e1 a4 49 9f 96 e5 41 42 75 44 0c a4 b4 45 | 29 00 00 24 ae e0 e3 5e aa a2 ee b4 ba fd 41 25 | ff 71 9d 02 44 71 da b9 6c 12 19 98 91 a3 35 04 | b4 f3 15 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 9b ba f5 3a f3 63 5f fe ea b4 e7 | 7e cf 7e 1a ac 8a 91 ce 00 00 00 1c 00 00 40 05 | 7a 1b 4b 67 34 a5 a3 ba cf 0b c3 8e 76 85 1a 07 | b5 81 41 18 | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b07dc0 | #340 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 b4 2a d6 65 92 42 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #340 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #340 | rejected packet: | 06 b4 2a d6 65 92 42 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #340: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c012bf0 | handling event EVENT_RETRANSMIT for parent state #357 | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #357 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #357 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49673.600964; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501361 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #357 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 "road-eastnet-nonat-105" #357: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #357) | 01 73 53 b2 ed 0d 4f 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 5d e8 51 f8 88 2e 8f 82 b3 f0 c5 8d a9 64 a4 | a0 30 bf b5 c2 12 6f 84 86 c4 e5 7c 43 ef 90 df | 5d 9c 5c c9 94 45 36 f4 9a c7 87 0d ff 17 4f a4 | bd 30 02 23 c4 49 d7 cd 90 90 63 b2 f0 74 82 ef | 7b ab 5b 1a 9b 56 e3 fd 6b c1 60 57 a4 3d 47 37 | cf 84 69 51 e7 0c 33 60 a6 88 c6 d3 40 f2 c0 67 | 8b b5 93 bc 89 96 e7 49 3d 16 a4 fa 47 99 08 bb | bf 76 ad cc b2 29 51 14 b3 93 c1 93 70 ab fa 85 | 9c 87 13 3b 74 20 3c a9 9f e8 37 97 e1 cf 3a 19 | 47 ba 4f bf 93 41 7a fe 94 33 ee 81 fb be 0f 8d | 00 a6 62 b8 8f 57 b3 51 57 ec 11 f0 29 c2 98 0d | c4 d2 cf 4a 38 f9 e9 bb 93 44 3a af 7c 9c 77 58 | 65 26 12 0d 96 b7 42 97 54 c0 ec f8 c4 63 9f c0 | 21 fc 89 98 11 d0 25 94 6e 52 89 6d 61 9b 1b e0 | 4a d8 54 ed 06 da f5 4b d3 dd 7c 2c 10 b9 6d 1c | a3 ef f1 ff a5 e4 02 74 f7 b0 97 d7 72 10 8b a3 | 29 00 00 24 2c c1 df 10 e0 1b 6c 08 e6 87 0f da | 7b 1d fc 5a dc 06 9f d4 9a 8b 4f 0e 09 60 b7 78 | 83 2e 36 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be 3a 2f 62 a9 83 16 c4 9b 57 fc 3c | bc 9e d0 29 41 57 58 a4 00 00 00 1c 00 00 40 05 | 08 0b c8 d5 d5 c0 e6 e6 c4 8a f3 fb 5c 3f c5 0a | 4e c8 f0 d0 | libevent_free: release ptr-libevent@0x7fb340040790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | #357 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 73 53 b2 ed 0d 4f 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #357 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #357 | rejected packet: | 01 73 53 b2 ed 0d 4f 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #357: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0594 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800cc10 | handling event EVENT_RETRANSMIT for parent state #310 | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #310 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #310 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49673.602247; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003497 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #310 | libevent_malloc: new ptr-libevent@0x7fb340040790 size 128 "road-eastnet-nonat-58" #310: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #310) | 15 02 9e 6f d7 63 29 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 27 e5 1e b0 b8 71 be 19 22 95 4e cb bc fb 75 | e9 3b 56 69 33 4e 64 ad 57 4b 29 1e a9 e6 47 1a | 9f d6 c8 79 0e b5 d1 68 4e cf f5 82 76 ae 1c b5 | 09 2e f5 34 f0 f4 52 a3 a8 36 97 6c 75 c0 43 c4 | ee 87 0e 53 ff 09 f4 54 79 74 c0 ae 90 9a ff fd | 29 25 b3 6a e6 b5 58 cb 0a 34 f3 40 7a e1 f0 00 | e8 b9 84 74 bb 8e 47 15 eb 04 15 5e 50 5c 56 6d | 24 4e c6 f1 73 76 98 a0 94 06 1f 4b 61 2c fc 5d | a8 62 64 09 74 1c b7 15 e9 d3 bf 3e 82 77 60 84 | b7 ec 0f bd 1c 3b 5b 97 d2 ff 90 15 40 4c 65 b9 | 49 3d 03 bf e1 e0 85 d7 23 77 e3 10 9e 84 72 33 | 77 bf bf d8 fb 57 2c a9 b4 49 77 20 46 c0 0f 64 | 28 da 55 aa ac 53 17 bb 64 f6 fe 0e af c2 be 09 | 4d 7e 65 25 98 17 8d d6 a3 3b ed 10 34 62 66 3b | 5f 3c 43 cb 1e 2b fc 0b 3e c7 88 ef 40 72 0f 91 | 73 8c 1b 91 80 50 8f 7f 10 7c a8 7c cd 25 bb 09 | 29 00 00 24 8c b6 d4 9e 94 5a 53 1f e0 86 71 ae | 2a 48 4d 09 6b cb 2a d4 c0 d8 ae 06 c9 7c dd 47 | 64 97 96 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 0a e7 b4 3e 63 13 55 ea 18 77 04 | bd 77 d7 da 99 7b 63 27 00 00 00 1c 00 00 40 05 | 5c 4d 49 83 ef 78 da dd 25 a2 53 b8 0f 9a 33 7f | f6 be 51 b8 | libevent_free: release ptr-libevent@0x7fb33801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800cc10 | #310 spent 0.0864 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 02 9e 6f d7 63 29 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #310 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #310 | rejected packet: | 15 02 9e 6f d7 63 29 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #310: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0529 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11600 | handling event EVENT_RETRANSMIT for parent state #351 | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #351 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #351 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49673.630508; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001027 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #351 | libevent_malloc: new ptr-libevent@0x7fb33801a4e0 size 128 "road-eastnet-nonat-99" #351: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #351) | de 65 5f af ec 9c 14 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 61 44 ff 3b 7e 79 78 30 98 a5 1d ec cd 39 0f | a6 1b 66 bf d1 4c f4 43 49 5b 37 74 a3 cb a8 c4 | 02 cd b2 04 1f 9b 50 46 08 d0 17 33 f5 19 85 e1 | a2 5a 8d ef 3b 1f 98 53 d1 3d 4a 2f ac 4f 19 d0 | 75 e8 7a 46 60 ff e1 45 61 55 45 47 1e ee 0e a7 | 97 fc 88 fd 13 ff 6e 23 a4 a1 77 61 b8 b4 8c fd | 22 67 ad f7 22 ca bf 94 41 28 f0 31 09 ce da 26 | 10 fa 8e 66 f4 04 b3 cf 07 07 c2 53 27 d6 cc 39 | 2e fc 33 61 76 a3 a9 c9 4a 2e 0c b9 d2 ce 1e 75 | 25 69 23 a7 b0 58 cb 85 2c 74 fd 6d 3e 51 8a ff | 12 ff 22 b0 95 e5 25 84 fd 26 ce 3e 10 f5 db d4 | fe ab 71 45 0f 50 b9 5c e4 ab 89 ce f3 bc f0 b4 | b1 6f 9b 78 15 e0 b4 c0 f6 ed 55 2b 17 d3 9e 21 | ed d2 5e 21 58 74 e4 d8 96 cd 20 e3 10 b4 fa 8b | 7f 1f 1a 01 c5 db 60 d3 81 25 a3 55 50 d2 42 6d | 88 7f 5d 84 22 e5 ff 47 18 aa ac 46 b6 f6 e6 e3 | 29 00 00 24 5e 0c 91 cb 9e cc c4 3b ec b3 88 06 | 52 11 4c 47 a6 59 04 4b 44 ce c4 33 03 72 36 ef | b1 45 a0 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 90 e3 e4 9d 06 64 22 91 ff 91 cd | 3f cb ba 24 72 7e a3 02 00 00 00 1c 00 00 40 05 | 98 60 2c ab 59 ec de c3 24 7f bd 6f 4e 02 75 9a | 41 d6 b1 3b | libevent_free: release ptr-libevent@0x7fb34c01fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11600 | #351 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 65 5f af ec 9c 14 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #351 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #351 | rejected packet: | de 65 5f af ec 9c 14 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #351: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28ab0 | handling event EVENT_RETRANSMIT for parent state #112 | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #112 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #112 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49673.650872; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.011066 exceeds limit? YES "road-eastnet-nonat-112" #112: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-112" #112: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #364 at 0x557d46a6bf10 | State DB: adding IKEv2 state #364 in UNDEFINED | pstats #364 ikev2.ike started | Message ID: init #364: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #364: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #364; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-112" #364: initiating v2 parent SA to replace #112 | using existing local IKE proposals for connection road-eastnet-nonat-112 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 364 for state #364 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b11600 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #364 | libevent_malloc: new ptr-libevent@0x7fb34c01fd50 size 128 | crypto helper 9 resuming | #364 spent 0.0711 milliseconds in ikev2_parent_outI1() | crypto helper 9 starting work-order 364 for state #364 | RESET processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 364 | start processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #112 ikev2.ike failed too-many-retransmits | pstats #112 ikev2.ike deleted too-many-retransmits | #112 spent 2.19 milliseconds in total | [RE]START processing: state #112 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-112" #112: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #112: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #112 "road-eastnet-nonat-112" #112: deleting IKE SA for connection 'road-eastnet-nonat-112' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-112' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-112 | State DB: deleting IKEv2 state #112 in PARENT_I1 | parent state #112: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #112 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 364 time elapsed 0.000571 seconds | libevent_free: release ptr-libevent@0x7fb38000a240 | (#364) spent 0.569 milliseconds in crypto helper computing work-order 364: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 364 for state #364 to event queue | scheduling resume sending helper answer for #364 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28ab0 | in statetime_stop() and could not find #112 | libevent_malloc: new ptr-libevent@0x7fb378012840 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 9 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-112 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-112" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-112' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-112" | stop processing: connection "road-eastnet-nonat-112" (in initiate_a_connection() at initiate.c:349) | spent 0.0578 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #364 | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 364 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #364 | **emit ISAKMP Message: | initiator cookie: | 33 be fb 4e a0 1f 6e f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-112 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 57 2a 42 5d a7 d8 6e 30 43 82 cd c7 8b 99 36 58 | ikev2 g^x d8 cb c2 34 66 ff 8a 30 2d b5 6a f0 e0 25 f9 40 | ikev2 g^x 18 b9 ba e3 e0 90 ff f4 cd 9b 1b 34 38 ee bc bc | ikev2 g^x a0 41 ef 4f 47 94 f5 37 14 2e 5c 6e 0f a6 94 db | ikev2 g^x 88 81 75 e1 ca 78 c8 9f 91 97 49 cc 62 0b 7c 24 | ikev2 g^x 05 6f 34 9d ba a1 13 0a 58 7e 2f 7a ad f7 32 fc | ikev2 g^x 1d 0c 87 25 75 e1 21 b8 48 fb 8f 7c d6 35 a3 1a | ikev2 g^x ae f0 b3 f0 3b da b9 9b f9 3d d2 6d c0 fe 81 68 | ikev2 g^x c2 c7 a1 4c 73 5e 1c b4 3a 58 ed b8 29 5f 91 4a | ikev2 g^x f8 66 00 af 13 4e e2 0d 66 a8 97 6e 0e 81 4f 92 | ikev2 g^x 8c 69 2c e3 38 08 3d ee 34 5d c4 0d 5d 92 19 a0 | ikev2 g^x ed a9 9d c5 1f 5c c0 55 9f 77 6e f9 34 95 4c 9a | ikev2 g^x 1b 67 cf ca 63 f1 13 a2 4f fd 39 a9 a7 28 45 69 | ikev2 g^x a8 39 46 14 38 17 c4 c7 52 5d 03 e8 bd 24 28 07 | ikev2 g^x 48 28 79 7d f7 c5 f9 df 10 a1 d2 ba 0c 72 5c 57 | ikev2 g^x de c7 d6 50 9c eb 46 ad 18 84 34 9f f7 a9 0f 36 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 57 1c 59 6e 8c 59 64 04 26 7e c7 7d 57 3e 20 cd | IKEv2 nonce ce 8c 1c 54 8d 44 77 eb 53 6a 1b 23 5a 68 d6 45 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 33 be fb 4e a0 1f 6e f8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 70 | natd_hash: port= 01 f4 | natd_hash: hash= 22 b7 ef ef bc 35 4f 63 6b 7a c6 35 bb 1f b7 d6 | natd_hash: hash= 68 94 93 4f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 22 b7 ef ef bc 35 4f 63 6b 7a c6 35 bb 1f b7 d6 | Notify data 68 94 93 4f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 33 be fb 4e a0 1f 6e f8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 20 e3 22 42 33 64 b9 da db 7f 44 ff d7 76 e4 71 | natd_hash: hash= c9 1d dc 40 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 20 e3 22 42 33 64 b9 da db 7f 44 ff d7 76 e4 71 | Notify data c9 1d dc 40 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #364 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #364: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #364 to 4294967295 after switching state | Message ID: IKE #364 skipping update_recv as MD is fake | Message ID: sent #364 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-112" #364: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.112:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #364) | 33 be fb 4e a0 1f 6e f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 2a 42 5d a7 d8 6e 30 43 82 cd c7 8b 99 36 58 | d8 cb c2 34 66 ff 8a 30 2d b5 6a f0 e0 25 f9 40 | 18 b9 ba e3 e0 90 ff f4 cd 9b 1b 34 38 ee bc bc | a0 41 ef 4f 47 94 f5 37 14 2e 5c 6e 0f a6 94 db | 88 81 75 e1 ca 78 c8 9f 91 97 49 cc 62 0b 7c 24 | 05 6f 34 9d ba a1 13 0a 58 7e 2f 7a ad f7 32 fc | 1d 0c 87 25 75 e1 21 b8 48 fb 8f 7c d6 35 a3 1a | ae f0 b3 f0 3b da b9 9b f9 3d d2 6d c0 fe 81 68 | c2 c7 a1 4c 73 5e 1c b4 3a 58 ed b8 29 5f 91 4a | f8 66 00 af 13 4e e2 0d 66 a8 97 6e 0e 81 4f 92 | 8c 69 2c e3 38 08 3d ee 34 5d c4 0d 5d 92 19 a0 | ed a9 9d c5 1f 5c c0 55 9f 77 6e f9 34 95 4c 9a | 1b 67 cf ca 63 f1 13 a2 4f fd 39 a9 a7 28 45 69 | a8 39 46 14 38 17 c4 c7 52 5d 03 e8 bd 24 28 07 | 48 28 79 7d f7 c5 f9 df 10 a1 d2 ba 0c 72 5c 57 | de c7 d6 50 9c eb 46 ad 18 84 34 9f f7 a9 0f 36 | 29 00 00 24 57 1c 59 6e 8c 59 64 04 26 7e c7 7d | 57 3e 20 cd ce 8c 1c 54 8d 44 77 eb 53 6a 1b 23 | 5a 68 d6 45 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 b7 ef ef bc 35 4f 63 6b 7a c6 35 | bb 1f b7 d6 68 94 93 4f 00 00 00 1c 00 00 40 05 | 20 e3 22 42 33 64 b9 da db 7f 44 ff d7 76 e4 71 | c9 1d dc 40 | state #364 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c01fd50 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b11600 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28ab0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #364 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 | #364 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49673.651992 | resume sending helper answer for #364 suppresed complete_v2_state_transition() and stole MD | #364 spent 0.317 milliseconds in resume sending helper answer | stop processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb378012840 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 be fb 4e a0 1f 6e f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #364 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #364 | rejected packet: | 33 be fb 4e a0 1f 6e f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 70 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #364: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388015720 | handling event EVENT_RETRANSMIT for parent state #341 | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #341 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #341 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49673.659162; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002742 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37801d710 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #341 | libevent_malloc: new ptr-libevent@0x7fb378012840 size 128 "road-eastnet-nonat-89" #341: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #341) | 49 c3 42 79 ad a4 02 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 28 2b 3a 23 5f 9c 41 a8 c4 b1 54 27 b8 a0 a8 | a4 06 9f e8 bd 51 0b 54 b6 c3 33 24 5b b7 ea 09 | 0f d7 aa 52 2f c6 c6 78 f1 af 48 22 da 41 1f 06 | 45 43 46 fc b0 c6 2f 1b c2 df 83 35 32 87 c5 a5 | b2 fd 30 3e 95 a2 12 80 00 0f 09 dd 41 c2 48 21 | 60 8b 18 12 e2 f7 cf 1e de 64 8d 80 92 30 17 55 | ad 93 96 5a 50 26 d3 cf d9 c9 40 82 d0 c1 d7 8c | 1b c3 86 4b 02 cc 46 e2 fc 73 8a b5 ae 23 f0 12 | e2 a2 8c 5d c9 4d fa 9f 2b e7 d4 9f 15 6e 8f 91 | 94 64 45 c0 fe f3 80 9a 4c e2 d7 66 20 dd 41 dc | 6b 9b c8 3f df d1 ab 15 c5 36 9b b6 cb 01 6b 62 | c9 d1 d0 ae bf 44 a3 4d 59 dd 52 35 90 0f 89 8a | f2 c1 bf c6 f6 a5 a8 2e c6 a8 d7 de 94 ea f6 00 | 11 3a e4 a5 1c cc 19 f4 1b 95 ff 82 80 6f 79 ae | 97 c0 6f ca 24 fa 61 b5 2e 87 00 ef d7 62 ce 06 | 06 5f 50 40 c4 2f 8b 3a fb 06 a7 11 50 8a 1f ce | 29 00 00 24 b0 2a b8 49 b5 4b c9 98 47 c3 4a b6 | 54 a6 a4 dc f8 8a 35 db 6a e0 ae b8 2b 87 41 53 | a2 41 a5 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e a8 6f b4 ec 17 85 04 80 69 75 d9 | db 5a 4e 4f c9 9c a6 7b 00 00 00 1c 00 00 40 05 | 47 20 cd 59 bf 11 9f 21 41 41 cd 45 1c bb 06 ab | 5f ca 38 7e | libevent_free: release ptr-libevent@0x7fb3600407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388015720 | #341 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 c3 42 79 ad a4 02 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #341 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #341 | rejected packet: | 49 c3 42 79 ad a4 02 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #341: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0453 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388009ed0 | handling event EVENT_RETRANSMIT for parent state #311 | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #311 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #311 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49673.668441; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00367 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388015720 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #311 | libevent_malloc: new ptr-libevent@0x7fb3600407f0 size 128 "road-eastnet-nonat-59" #311: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #311) | 44 99 87 40 ba 63 67 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 f7 3b 73 41 b9 88 7a e8 c9 5c 33 15 fe 59 eb | fc 54 1c 32 28 ad 56 eb 34 ed 9a d7 b7 26 48 b1 | 97 4e 59 ed 4f 99 cd e8 e6 27 80 3f 35 da 0c a7 | 23 d8 2f 5d 19 c3 94 0e 09 96 31 23 4d f5 99 7a | 2e 77 d3 1f 35 48 ef 9d e1 61 1a 11 39 f8 6e ce | 65 2d d0 de 38 b4 23 52 6e 45 44 65 4d 7b bd c8 | 41 7e 01 a8 b3 39 9f a8 ee a5 53 dc 50 9b 94 2b | 69 df 03 ec 5d 36 9f 33 dc 3d 9c 7a 93 11 41 9c | 33 38 19 c9 cf 1a a3 f8 96 ca d4 d9 26 62 88 91 | 39 58 69 eb 93 1e 87 6a d7 64 14 8d 9c 37 19 fa | c6 b6 78 0e bc 5c f3 4b 97 bf 56 93 52 5a ea e8 | e0 ac be 1b 36 a8 31 6f 20 82 12 c0 13 79 34 1d | 86 03 61 75 0c 12 25 55 a8 61 36 78 64 d8 d0 e0 | d9 d2 a7 01 7f 00 fd 1f 2e 03 76 1e 96 2c 85 64 | f8 86 44 8c a4 8a 04 3f e3 a8 0c 90 29 b2 ad bc | e2 32 ac c2 2b f4 81 23 cf 52 ee cf c4 e3 9c c7 | 29 00 00 24 d3 df f6 74 46 9e 11 7f ae 1b 7e 22 | a8 9e 39 ab f7 77 2a 20 6e a6 c0 c3 6f 0b 0c 6a | a5 08 b1 f9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c b5 fb 2f 48 22 68 cf e1 a0 a0 6d | 16 65 fc 12 3f 30 cc 2d 00 00 00 1c 00 00 40 05 | 5f ba 06 b7 b7 74 50 87 e6 7e 19 f6 51 18 f6 57 | 2a d1 11 81 | libevent_free: release ptr-libevent@0x7fb38801d010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388009ed0 | #311 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 99 87 40 ba 63 67 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #311 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #311 | rejected packet: | 44 99 87 40 ba 63 67 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #311: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0673 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #264 | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #264 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #264 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49673.682826; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005721 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388009ed0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #264 | libevent_malloc: new ptr-libevent@0x7fb38801d010 size 128 "road-eastnet-nonat-12" #264: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #264) | 8e fe 0e 1c bf 0e 6b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 85 0f 2d e4 cd 04 0b 17 96 14 35 20 98 98 7c | 43 94 0e c0 cb 2a ed cd 26 f3 f4 fd 71 0a b3 35 | 8d c8 ce 92 67 ce 39 72 cf 1d 58 73 86 98 2b a0 | 6f 55 7b 13 d0 1f 62 3b 93 93 85 3e 36 cd 86 27 | b4 c1 9a bd c4 db 39 19 44 28 ec a5 e9 1c 59 a2 | a7 fc b2 f8 f1 72 da 9c 2a b8 36 d3 61 88 51 dc | 4d 20 86 6a 14 25 ef 10 b3 1b 09 52 6d 00 f9 db | 75 0a 80 38 3b 18 7c 9c fd c8 c9 4e b1 e2 84 70 | a4 dd 3f 85 ce 8c cb 20 5c 6a 42 21 65 c4 fd 15 | 7a 47 92 65 67 69 9e be f3 7a e9 66 c9 56 bd d2 | 3c 4a 76 68 b7 3f ce 1d 64 64 a7 2c 71 37 b4 c4 | 53 38 1c 79 97 95 2a 69 1c 36 40 41 3d 05 9c ba | 4d 38 e3 a6 a7 6c e9 b1 59 1a 9f ab 80 0a d9 8e | ac 39 5a 0c e3 b3 9d c1 3d 5d 32 c8 42 00 f8 4c | 3a fb 9c 36 7f 16 43 4c 95 29 48 05 f2 b7 02 75 | 54 25 c2 90 a5 04 3b fa ca 77 9e 55 e7 39 19 34 | 29 00 00 24 0b 7d f5 1c 67 a7 5b 6f d5 5f 23 1c | de ee af 0f ed f9 a1 fa b5 71 92 a8 5a 39 25 fa | 7d a0 ff 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 4e 74 d9 6a 11 61 e7 2b 9e b3 5d | fa c6 10 84 a3 ff e4 72 00 00 00 1c 00 00 40 05 | 61 d2 3a 09 fc 3f e9 c0 9a fa 15 52 e0 d4 39 3d | 0f 2b c4 10 | libevent_free: release ptr-libevent@0x7fb370014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #264 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e fe 0e 1c bf 0e 6b 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #264 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #264 | rejected packet: | 8e fe 0e 1c bf 0e 6b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #264: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0707 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #358 | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #358 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #358 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49673.685178; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500877 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #358 | libevent_malloc: new ptr-libevent@0x7fb370014c70 size 128 "road-eastnet-nonat-106" #358: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #358) | 9c 16 21 10 e3 b0 2f 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 b0 5e 24 2c 38 69 f7 5e 0a ef 9c cd 0c a9 a2 | e7 60 22 31 02 17 4e 87 ab da 67 2c 74 68 e6 5c | 3c 13 72 b8 82 de 1f 97 f0 91 0b ef 5f 05 b5 88 | 8f 55 10 d6 ed 84 95 00 12 6f 2a 48 1a 79 36 91 | 49 04 49 1e 83 7f 51 0b cd 40 c4 12 1d 28 81 4a | ff 1e be db 2c 06 48 44 01 2b 86 9e 50 88 79 26 | a2 fe 2d b6 28 25 0f 1c 72 e5 7c 02 81 23 76 48 | e4 63 77 54 94 1c a2 42 e7 62 79 1a 9c c2 d3 a5 | 84 2a 02 f0 5d 86 de 0c ac 44 c1 bc a9 db 93 da | ab e8 d1 96 60 b7 1e 28 8e ce cc cb 77 fb 32 3a | af 1c d9 5d 2b 9d 4c bb 37 50 e3 2c 2a bd a4 df | 6f 99 23 0d 27 83 b0 b4 f9 48 a2 69 86 2e 3a c0 | 5d bf ed 94 bb f2 f3 07 e1 00 d8 2f 62 9b ee ec | b5 9a a1 3e ac 61 be 8a ce 7d 14 b6 c3 13 21 43 | 2f 85 9a 2f fd b3 5f a3 b2 e0 9c 9a 19 21 fa dc | c3 c9 17 3d e7 0b 51 07 b0 13 9d cf 7d 38 e5 ef | 29 00 00 24 31 6e a1 8e 9b bf 74 40 01 d9 c6 2f | f4 95 5e 1f af be c9 b5 67 9c 79 1e 7d 41 57 e9 | 2e 59 a1 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 2b df 62 51 b1 0d 46 7a 83 b8 02 | 18 9c 1e 91 3d 80 67 46 00 00 00 1c 00 00 40 05 | 21 2b d2 d4 2f 80 55 47 29 a9 2f db 69 80 68 e4 | e7 d9 41 df | libevent_free: release ptr-libevent@0x7fb3700300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #358 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9c 16 21 10 e3 b0 2f 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #358 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #358 | rejected packet: | 9c 16 21 10 e3 b0 2f 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #358: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34000cc10 | handling event EVENT_RETRANSMIT for parent state #352 | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #352 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #352 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49673.715505; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001687 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #352 | libevent_malloc: new ptr-libevent@0x7fb3700300e0 size 128 "road-eastnet-nonat-100" #352: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #352) | 3c 05 1d c4 fe 50 38 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 64 8b 09 fa 7a d8 0e 19 4a a4 83 62 a1 a5 5a | 68 fc 46 c2 41 24 c2 81 0b b7 86 21 9c 81 02 7e | 4c e7 e3 a1 0b b2 cb 85 40 50 15 e6 9b 8e ec db | 69 e6 fa 1a ac be 36 c2 a1 ef 3e db b6 5e 52 af | 7e 52 8f f4 e4 02 53 3c 7f 96 73 09 3f 4e 1d 14 | 6d c2 31 fa 5c 39 98 fc 2c b5 f5 9e 00 af 34 e4 | 5f b6 a3 65 94 fe 46 6a 1b e5 e1 4a 56 bd a5 cf | 0a 77 7e 2c 49 79 6d b8 e1 4a 50 3f 05 7c c4 09 | eb 02 3b 50 92 11 5f 9f 53 e6 1e bd 8d 02 31 1b | ce 66 73 68 3b 0d 47 9f bd 24 08 62 f6 ab c3 d7 | a4 43 e9 f4 a6 cc 3c 8d f5 af 10 2b 54 da 75 ae | 02 35 c6 d0 b8 2f b0 bf cd b2 cd e7 d2 23 bb 30 | 31 a6 56 6a 41 57 91 fb 46 1d ee de f8 63 bc 4e | 2b 81 4f df b1 c0 cc c0 21 f9 64 98 54 3d 15 93 | 9d f2 7c 39 a9 8b 0c c2 f7 bb 99 15 ac 9c c2 51 | 1b f2 0a ec 9e 8c 56 18 67 8a fb 62 ed 27 4d ad | 29 00 00 24 a2 bb a3 dc 18 69 ac 45 10 e2 b1 d4 | a3 1c d3 0a 99 a1 33 f7 93 76 f6 b4 72 bd d3 aa | d5 07 c1 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 31 52 a7 9d 89 a3 6a 1c 72 78 4c | e5 d1 1b 1c 74 f4 f6 22 00 00 00 1c 00 00 40 05 | fc b9 a7 1f 0a 98 43 79 23 71 2c ac b0 a5 bd 76 | ba 72 e4 ab | libevent_free: release ptr-libevent@0x7fb340018db0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000cc10 | #352 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c 05 1d c4 fe 50 38 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #352 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #352 | rejected packet: | 3c 05 1d c4 fe 50 38 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #352: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cbd0 | handling event EVENT_RETRANSMIT for parent state #113 | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #113 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #113 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49673.720804; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.012096 exceeds limit? YES "road-eastnet-nonat-113" #113: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-113" #113: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #365 at 0x557d46a6d4d0 | State DB: adding IKEv2 state #365 in UNDEFINED | pstats #365 ikev2.ike started | Message ID: init #365: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #365: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #365; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-113" #365: initiating v2 parent SA to replace #113 | using existing local IKE proposals for connection road-eastnet-nonat-113 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 365 for state #365 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34000cc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #365 | libevent_malloc: new ptr-libevent@0x7fb340018db0 size 128 | crypto helper 10 resuming | #365 spent 0.0723 milliseconds in ikev2_parent_outI1() | crypto helper 10 starting work-order 365 for state #365 | RESET processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 365 | start processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #113 ikev2.ike failed too-many-retransmits | pstats #113 ikev2.ike deleted too-many-retransmits | #113 spent 2.63 milliseconds in total | [RE]START processing: state #113 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-113" #113: deleting state (STATE_PARENT_I1) aged 64.014s and NOT sending notification | parent state #113: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #113 "road-eastnet-nonat-113" #113: deleting IKE SA for connection 'road-eastnet-nonat-113' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-113' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-113 | State DB: deleting IKEv2 state #113 in PARENT_I1 | parent state #113: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #113 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 365 time elapsed 0.00064 seconds | libevent_free: release ptr-libevent@0x7fb3400250b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cbd0 | (#365) spent 0.642 milliseconds in crypto helper computing work-order 365: ikev2_outI1 KE (pcr) | in statetime_stop() and could not find #113 | crypto helper 10 sending results from work-order 365 for state #365 to event queue | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #365 | libevent_malloc: new ptr-libevent@0x7fb37c023b10 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 10 waiting (nothing to do) Initiating connection road-eastnet-nonat-113 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-113" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-113' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-113" | stop processing: connection "road-eastnet-nonat-113" (in initiate_a_connection() at initiate.c:349) | spent 0.0641 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #365 | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 365 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #365 | **emit ISAKMP Message: | initiator cookie: | 85 67 19 58 d7 3c f0 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-113 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 34 c9 07 e2 a7 25 a6 09 ab 7f e9 5d 7e 7f 47 e1 | ikev2 g^x 9f 44 d1 91 14 4d 9b 8f 5d 22 2a 52 a8 98 ff b2 | ikev2 g^x 6b 6a b0 36 7f fd 95 da a0 25 8f 6e 16 7f 04 38 | ikev2 g^x 86 c2 bd 33 bf fc a5 26 c4 b6 f6 70 3e fd c6 4a | ikev2 g^x 25 c8 b3 a8 9f a8 44 89 83 a1 8c aa b8 af 7f e3 | ikev2 g^x 16 bb 17 56 79 89 e8 f0 01 49 b8 07 c4 c2 fd 27 | ikev2 g^x 4f 8e 62 66 4b 11 2b 01 9f f2 8c 2a 44 d1 a6 b0 | ikev2 g^x 37 65 5b 66 a4 8d e5 2d a7 91 fd e3 72 91 ef 62 | ikev2 g^x 52 0e c8 e1 f3 04 05 43 a3 3a 3c 61 1b d7 eb bd | ikev2 g^x 6b 38 06 f9 ff f3 a7 b2 e7 89 6b 9c da 79 fc be | ikev2 g^x 85 2e 71 9d 7f 61 aa 1d 41 bd c5 f4 78 4a e7 2c | ikev2 g^x 3d fa 74 f7 ca 33 00 f8 ee a6 a8 8a 16 63 2d 1b | ikev2 g^x 61 9d fa 4c a8 ca 3a 31 b1 cd 60 8d cb 56 88 b6 | ikev2 g^x 81 05 15 ed cf 3d b4 c9 19 7e d9 8d 29 23 d3 64 | ikev2 g^x ec 0b 35 05 39 3b e0 f1 75 19 f5 f3 4f 99 e8 61 | ikev2 g^x bd bd 06 53 be 50 6f 6a cb bc 2d c6 18 e6 53 b2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e5 25 b4 c0 9c 12 3e 53 68 a2 43 fb 88 db 47 7b | IKEv2 nonce b4 96 4d ec 31 20 f7 c3 1c a9 eb e1 62 8a 8b 1d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 85 67 19 58 d7 3c f0 86 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 71 | natd_hash: port= 01 f4 | natd_hash: hash= 90 3b 10 25 ca fe 1f 3b 58 67 93 fa 3d a3 98 00 | natd_hash: hash= cc 36 84 a7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 90 3b 10 25 ca fe 1f 3b 58 67 93 fa 3d a3 98 00 | Notify data cc 36 84 a7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 85 67 19 58 d7 3c f0 86 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 55 c6 52 e3 aa aa 60 c0 64 26 bb 2b 79 4e a4 42 | natd_hash: hash= 73 1e 76 57 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 55 c6 52 e3 aa aa 60 c0 64 26 bb 2b 79 4e a4 42 | Notify data 73 1e 76 57 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #365 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #365: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #365 to 4294967295 after switching state | Message ID: IKE #365 skipping update_recv as MD is fake | Message ID: sent #365 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-113" #365: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.113:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #365) | 85 67 19 58 d7 3c f0 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 c9 07 e2 a7 25 a6 09 ab 7f e9 5d 7e 7f 47 e1 | 9f 44 d1 91 14 4d 9b 8f 5d 22 2a 52 a8 98 ff b2 | 6b 6a b0 36 7f fd 95 da a0 25 8f 6e 16 7f 04 38 | 86 c2 bd 33 bf fc a5 26 c4 b6 f6 70 3e fd c6 4a | 25 c8 b3 a8 9f a8 44 89 83 a1 8c aa b8 af 7f e3 | 16 bb 17 56 79 89 e8 f0 01 49 b8 07 c4 c2 fd 27 | 4f 8e 62 66 4b 11 2b 01 9f f2 8c 2a 44 d1 a6 b0 | 37 65 5b 66 a4 8d e5 2d a7 91 fd e3 72 91 ef 62 | 52 0e c8 e1 f3 04 05 43 a3 3a 3c 61 1b d7 eb bd | 6b 38 06 f9 ff f3 a7 b2 e7 89 6b 9c da 79 fc be | 85 2e 71 9d 7f 61 aa 1d 41 bd c5 f4 78 4a e7 2c | 3d fa 74 f7 ca 33 00 f8 ee a6 a8 8a 16 63 2d 1b | 61 9d fa 4c a8 ca 3a 31 b1 cd 60 8d cb 56 88 b6 | 81 05 15 ed cf 3d b4 c9 19 7e d9 8d 29 23 d3 64 | ec 0b 35 05 39 3b e0 f1 75 19 f5 f3 4f 99 e8 61 | bd bd 06 53 be 50 6f 6a cb bc 2d c6 18 e6 53 b2 | 29 00 00 24 e5 25 b4 c0 9c 12 3e 53 68 a2 43 fb | 88 db 47 7b b4 96 4d ec 31 20 f7 c3 1c a9 eb e1 | 62 8a 8b 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 90 3b 10 25 ca fe 1f 3b 58 67 93 fa | 3d a3 98 00 cc 36 84 a7 00 00 00 1c 00 00 40 05 | 55 c6 52 e3 aa aa 60 c0 64 26 bb 2b 79 4e a4 42 | 73 1e 76 57 | state #365 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb340018db0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34000cc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cbd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #365 | libevent_malloc: new ptr-libevent@0x7fb3400250b0 size 128 | #365 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49673.722011 | resume sending helper answer for #365 suppresed complete_v2_state_transition() and stole MD | #365 spent 0.324 milliseconds in resume sending helper answer | stop processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c023b10 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 67 19 58 d7 3c f0 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #365 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #365 | rejected packet: | 85 67 19 58 d7 3c f0 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 71 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #365: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0503 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380015720 | handling event EVENT_RETRANSMIT for parent state #312 | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #312 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #312 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49673.732195; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00512 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad0280 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #312 | libevent_malloc: new ptr-libevent@0x7fb37c023b10 size 128 "road-eastnet-nonat-60" #312: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #312) | 89 42 ee d6 ed 2c a4 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 05 0b 71 54 f5 39 16 26 4c a4 39 04 60 1d 97 | 32 ea c2 30 7f b7 8f 8f 4c 46 3c 6f 52 78 aa c1 | fe e4 77 56 f7 3d d3 8d a6 3a 6f c0 2f fe 6d 02 | eb 98 53 91 b0 a7 62 d0 2e 39 52 a2 2d 9f c5 cb | d2 4b 17 0a 6d 76 74 95 b8 fd f2 4d e7 0c cf 15 | 80 f8 47 f1 16 09 01 ed b3 3a 4f 5c d5 5d 3f 6b | 2f e7 b7 4c e0 6d 6e 67 ff dd 71 47 c8 a4 15 9f | 96 98 1b 13 12 cd c9 a7 cd 82 0e 52 4d 94 b9 96 | db fe 30 4f c9 88 5e 66 97 62 f6 22 94 b7 f8 62 | 1f 97 fa 33 08 02 4b f8 35 6a 66 b6 ae 14 f2 38 | 8b d8 d1 fe 0f da d0 63 b9 64 d3 f1 12 68 13 10 | 0c 76 c3 e9 8c 5d 20 14 45 21 bc 02 62 c8 67 36 | a7 1a 3b 3f d4 a6 2b 0f 1f 20 68 bf 3f f3 da ac | 9d d4 0b a5 4f 9d 4e ee 5d 8a c9 7f a6 63 bd 37 | e4 30 f8 16 a7 79 23 99 5e 45 08 d2 1b c1 59 79 | b3 06 e4 a7 4d 24 33 20 1d ab d6 f6 ee 90 2f 69 | 29 00 00 24 c3 f8 28 4c 1a 7b 0f cd eb 3b df c6 | 33 a5 52 0e 9f e3 e0 c7 7b e0 4f ee 68 74 73 39 | ce 71 25 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 69 21 0b 86 be 66 6f de 2b 5e fc | 58 12 49 3c b2 b4 50 5a 00 00 00 1c 00 00 40 05 | 50 02 4b 6b 30 95 cf bb e1 65 ad fe fd e1 44 d3 | d9 2c f8 74 | libevent_free: release ptr-libevent@0x7fb378046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380015720 | #312 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 42 ee d6 ed 2c a4 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #312 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #312 | rejected packet: | 89 42 ee d6 ed 2c a4 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #312: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #342 | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #342 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #342 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49673.747478; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002212 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380015720 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #342 | libevent_malloc: new ptr-libevent@0x7fb378046040 size 128 "road-eastnet-nonat-90" #342: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #342) | 92 0e 5c 44 35 6f 61 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 4b 3f 50 56 cd 4f c8 69 53 e3 02 d0 e2 c4 4b | b8 26 12 0d 2f 95 d4 df 65 d2 22 1d a5 8a 76 36 | 0f 44 f3 88 67 5b a4 93 af 87 fb e7 03 3d f3 3d | ce 49 25 06 46 21 51 fe e6 a5 e0 3f 25 17 b0 d7 | 71 9b 71 32 36 21 5f b7 2a ee 25 9c 8a 04 76 c2 | 55 e4 ab 4e 7c 02 05 d1 d2 21 09 a2 51 a4 92 f0 | 79 2b 73 03 6e bc d5 33 3d 90 f5 1b b7 cb cd e9 | 74 b4 08 87 c4 a4 7c ab 86 b2 e8 fe f3 2e a7 14 | da 5c 13 a2 0a 83 be 25 a6 25 48 21 ec 98 11 c6 | 1d 49 83 e7 e3 39 34 26 fb d4 24 cb d2 66 1f a9 | 8b 7b 97 28 60 bf e3 df fc be 83 7a 91 a4 90 3a | af ad 2d 44 70 c8 0c 11 ab e1 87 f9 88 5b 04 d8 | 04 03 d4 08 d3 e9 32 2b 30 9c 93 90 d3 62 4a 73 | df 00 65 61 53 f7 33 9c 73 ad fe 53 5a 29 aa 93 | da 76 97 14 51 4b d0 f8 fb 54 f6 6e 4f 99 ad 4b | 75 e5 97 56 5f 2e 08 fb ed 71 37 6a 4a ad d6 62 | 29 00 00 24 02 01 86 b0 0f 40 c1 16 7f df 21 87 | ce a9 58 2f 27 7b 28 e0 c6 1c d2 35 82 80 ac e4 | ab 80 e7 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 56 62 15 04 08 91 44 63 ec 81 3e 0b | 9f 8e c8 3c d5 eb af f0 00 00 00 1c 00 00 40 05 | 60 c3 81 cb a9 a6 9e ac 92 76 43 f4 51 0d 3b 6e | 52 02 3f 95 | libevent_free: release ptr-libevent@0x7fb36804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #342 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 0e 5c 44 35 6f 61 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #342 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #342 | rejected packet: | 92 0e 5c 44 35 6f 61 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #342: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9b1c0 | handling event EVENT_RETRANSMIT for parent state #359 | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #359 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #359 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49673.759884; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.5004 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #359 | libevent_malloc: new ptr-libevent@0x7fb36804b850 size 128 "road-eastnet-nonat-107" #359: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #359) | 73 c2 2a a2 cb e2 3d 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 2e 83 fc d4 94 f1 45 60 7e d6 c0 1f 1c e7 33 | 0f bd b7 8a 76 4b 8b 45 55 e6 bb 84 3d 22 78 af | 75 6e da ff d0 e9 4b 87 08 80 14 e9 1e 9e bb 0e | 16 e9 ea 66 ca bd 7c 66 87 ad a8 d9 21 e1 38 83 | 1f 32 ef a7 2f 0e bf 2d 1d 63 39 6b 83 61 62 c6 | 3e 6a a6 28 e7 8f 0a b3 a0 d9 53 fb be 77 6d 21 | 33 ab c4 d4 01 99 45 77 31 5e 2f ff 5a 01 15 07 | d7 80 2f 1a 7e c3 c0 54 fe ea 5a 9f 7b b7 54 0e | 9f aa da f6 69 55 9a 24 0b a7 e8 7e 52 f9 f8 78 | ba 68 8d a1 bc 1f b0 9f 73 b4 50 08 1b 93 cf 3c | ca 2c f0 94 b0 7c a2 eb fc f9 ec 95 a0 6e 85 2f | 2e ef 23 90 9d 23 ef b2 33 25 ac 56 cb 51 63 74 | c1 ab 1f 93 d7 e6 e0 11 36 c8 47 24 fc 03 91 1a | 9f ca af ad 3e 92 13 be 1e e3 b4 78 2a ad 4c d9 | b9 b1 7c 5e 5e 7c 3e c4 e0 d5 55 d6 b9 f7 15 83 | 2f 6c 01 ee d5 14 3b f0 0d dd 1e 11 8b 30 cd e0 | 29 00 00 24 69 b6 35 41 69 53 97 ba 18 48 44 fd | d5 e2 9a 31 05 82 94 36 da fb c0 91 72 56 36 c7 | c4 dd c7 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 a1 1b b6 5c a0 e8 d3 82 8b cf 19 | 85 69 c3 9f 45 ea 96 77 00 00 00 1c 00 00 40 05 | 5b ca 3a 7b b0 51 af 81 eb d5 3c 03 e7 f7 fa 57 | 2f 45 5b b9 | libevent_free: release ptr-libevent@0x7fb37402ff60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9b1c0 | #359 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 73 c2 2a a2 cb e2 3d 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #359 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #359 | rejected packet: | 73 c2 2a a2 cb e2 3d 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #359: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0552 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2e150 | handling event EVENT_RETRANSMIT for parent state #114 | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #114 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #114 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49673.78255; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010116 exceeds limit? YES "road-eastnet-nonat-114" #114: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-114" #114: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #366 at 0x557d46a6ea90 | State DB: adding IKEv2 state #366 in UNDEFINED | pstats #366 ikev2.ike started | Message ID: init #366: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #366: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #366; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-114" #366: initiating v2 parent SA to replace #114 | using existing local IKE proposals for connection road-eastnet-nonat-114 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 366 for state #366 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9b1c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #366 | libevent_malloc: new ptr-libevent@0x7fb37402ff60 size 128 | #366 spent 0.069 milliseconds in ikev2_parent_outI1() | RESET processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 14 resuming | start processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #114 ikev2.ike failed too-many-retransmits | pstats #114 ikev2.ike deleted too-many-retransmits | crypto helper 14 starting work-order 366 for state #366 | #114 spent 2.24 milliseconds in total | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 366 | [RE]START processing: state #114 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-114" #114: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #114: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #114 "road-eastnet-nonat-114" #114: deleting IKE SA for connection 'road-eastnet-nonat-114' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-114' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-114 | State DB: deleting IKEv2 state #114 in PARENT_I1 | parent state #114: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #114 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 366 time elapsed 0.00095 seconds | (#366) spent 0.964 milliseconds in crypto helper computing work-order 366: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 366 for state #366 to event queue | scheduling resume sending helper answer for #366 | libevent_malloc: new ptr-libevent@0x7fb37001d6b0 size 128 | crypto helper 14 waiting (nothing to do) | libevent_free: release ptr-libevent@0x7fb35800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2e150 | in statetime_stop() and could not find #114 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-114 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-114" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-114' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-114" | stop processing: connection "road-eastnet-nonat-114" (in initiate_a_connection() at initiate.c:349) | spent 0.0584 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #366 | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 366 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #366 | **emit ISAKMP Message: | initiator cookie: | 3c e6 10 56 de c7 50 ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-114 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 96 fc d0 2b 58 ad f1 9a aa 82 c0 57 ae f0 46 70 | ikev2 g^x a2 7b 22 23 65 30 fe 9c 0d f5 dc 40 c0 ca 9d ee | ikev2 g^x 6e 66 1d 3a 72 fe dc 88 4a 26 55 69 91 41 bf 12 | ikev2 g^x 90 50 78 9a 3c 37 7a d2 58 65 01 98 28 27 ba 6d | ikev2 g^x 00 33 b4 2e 8f 98 78 f3 cd 21 f0 18 dd 51 cb 68 | ikev2 g^x 4f 92 9d 38 c4 06 c1 6c cf 60 41 a1 18 22 f2 93 | ikev2 g^x 34 0c 55 d7 b5 30 6c c4 9c ad 0a aa 9b 11 9f 59 | ikev2 g^x 49 ac e6 72 dc 82 61 fc 42 ea d8 0b 5d 7d f2 47 | ikev2 g^x 0f e6 10 b9 1d c6 85 40 80 3f b3 ee 0f dc 82 fa | ikev2 g^x 53 40 f0 d9 23 6a 65 60 f3 d7 02 47 6c 0a 6f 61 | ikev2 g^x 8d 04 17 7d 94 9e 17 80 39 4f b5 db 2d a0 f8 02 | ikev2 g^x 18 21 68 7d 0e af 20 98 75 39 40 4d 5d 87 d7 7b | ikev2 g^x 4c 39 3b 20 a9 65 05 04 46 a1 49 0b d9 6d 8f 15 | ikev2 g^x 4f b4 23 1a 8e 5f 27 66 f0 b0 a6 bd 48 dc 96 c2 | ikev2 g^x 77 e2 b0 72 b6 2c 19 2f 16 65 ef 29 dd a3 4a de | ikev2 g^x 9a 82 38 c8 cb 37 99 80 5e bb 4b 53 97 7b f3 fa | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7a ad 39 64 9f ec c1 f8 33 94 44 40 f7 c9 dd b2 | IKEv2 nonce 6b e5 21 16 26 39 73 9d cd 0b f5 7a f4 93 09 bf | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3c e6 10 56 de c7 50 ef | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 72 | natd_hash: port= 01 f4 | natd_hash: hash= 37 12 7d c7 e4 80 f6 ae d0 f3 0f 94 c9 99 cc 19 | natd_hash: hash= 2a ad fe 8d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 37 12 7d c7 e4 80 f6 ae d0 f3 0f 94 c9 99 cc 19 | Notify data 2a ad fe 8d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3c e6 10 56 de c7 50 ef | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 84 74 fa e2 ee 48 6b 8a 7f a7 09 f6 4e 00 6d 26 | natd_hash: hash= 52 0f f6 08 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 84 74 fa e2 ee 48 6b 8a 7f a7 09 f6 4e 00 6d 26 | Notify data 52 0f f6 08 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #366 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #366: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #366 to 4294967295 after switching state | Message ID: IKE #366 skipping update_recv as MD is fake | Message ID: sent #366 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-114" #366: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.114:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #366) | 3c e6 10 56 de c7 50 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 fc d0 2b 58 ad f1 9a aa 82 c0 57 ae f0 46 70 | a2 7b 22 23 65 30 fe 9c 0d f5 dc 40 c0 ca 9d ee | 6e 66 1d 3a 72 fe dc 88 4a 26 55 69 91 41 bf 12 | 90 50 78 9a 3c 37 7a d2 58 65 01 98 28 27 ba 6d | 00 33 b4 2e 8f 98 78 f3 cd 21 f0 18 dd 51 cb 68 | 4f 92 9d 38 c4 06 c1 6c cf 60 41 a1 18 22 f2 93 | 34 0c 55 d7 b5 30 6c c4 9c ad 0a aa 9b 11 9f 59 | 49 ac e6 72 dc 82 61 fc 42 ea d8 0b 5d 7d f2 47 | 0f e6 10 b9 1d c6 85 40 80 3f b3 ee 0f dc 82 fa | 53 40 f0 d9 23 6a 65 60 f3 d7 02 47 6c 0a 6f 61 | 8d 04 17 7d 94 9e 17 80 39 4f b5 db 2d a0 f8 02 | 18 21 68 7d 0e af 20 98 75 39 40 4d 5d 87 d7 7b | 4c 39 3b 20 a9 65 05 04 46 a1 49 0b d9 6d 8f 15 | 4f b4 23 1a 8e 5f 27 66 f0 b0 a6 bd 48 dc 96 c2 | 77 e2 b0 72 b6 2c 19 2f 16 65 ef 29 dd a3 4a de | 9a 82 38 c8 cb 37 99 80 5e bb 4b 53 97 7b f3 fa | 29 00 00 24 7a ad 39 64 9f ec c1 f8 33 94 44 40 | f7 c9 dd b2 6b e5 21 16 26 39 73 9d cd 0b f5 7a | f4 93 09 bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 12 7d c7 e4 80 f6 ae d0 f3 0f 94 | c9 99 cc 19 2a ad fe 8d 00 00 00 1c 00 00 40 05 | 84 74 fa e2 ee 48 6b 8a 7f a7 09 f6 4e 00 6d 26 | 52 0f f6 08 | state #366 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37402ff60 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9b1c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9b1c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #366 | libevent_malloc: new ptr-libevent@0x7fb35800cf80 size 128 | #366 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49673.78412 | resume sending helper answer for #366 suppresed complete_v2_state_transition() and stole MD | #366 spent 0.327 milliseconds in resume sending helper answer | stop processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37001d6b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c e6 10 56 de c7 50 ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #366 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #366 | rejected packet: | 3c e6 10 56 de c7 50 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 72 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #366: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38800feb0 | handling event EVENT_RETRANSMIT for parent state #265 | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #265 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #265 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49673.78628; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003974 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2e150 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #265 | libevent_malloc: new ptr-libevent@0x7fb3440407f0 size 128 "road-eastnet-nonat-13" #265: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #265) | 5e d6 2a e3 fc d6 88 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 2e 3a 15 7c f9 00 41 72 02 12 64 4c 6b 73 52 | bb 8d bc 96 e4 69 5a 27 ff 16 12 40 6d b3 e6 7d | 28 6d d8 d8 46 ae 55 b1 20 60 d0 f0 2c d7 5a 32 | f1 e8 5b 54 2b 16 ec 87 57 a5 e1 c1 08 80 a6 16 | a0 4f 0f 3b 62 e5 8c cb aa 65 e4 d5 87 37 d0 85 | 34 de df b2 ac 15 11 24 c5 c0 e2 ba 8e bf 6a 38 | 92 5b d1 dd 84 fb 29 ef cf 37 36 ed 82 a0 ef 7a | 79 c3 2b da 2f 96 ad 2b 46 50 67 74 44 c2 8f 22 | 65 99 b1 3a 1c fd 70 cc 25 39 6a 77 0a f9 8c f3 | 33 34 af 74 f2 1a 52 31 29 6f 53 43 ce 77 a1 c0 | 4e ad 32 24 24 86 73 ad 16 2d 19 8b 36 54 d6 8f | 96 95 e4 0b 0b df d1 24 22 12 35 73 ac 81 e7 c1 | af 88 20 ae e1 fa 41 09 f0 f6 2b 19 42 79 9e 92 | 6a 95 0b 69 19 21 ee ba 94 35 b0 07 aa 13 f3 40 | 4f 27 f7 e8 7d ea ae b3 14 bf 0c b2 8b a5 e7 1f | 2e 4a 4a 5e 40 8d d3 1a 30 c1 1d 13 0d 61 d3 15 | 29 00 00 24 d2 1b cb fe 42 33 59 cd 17 75 9b cc | f4 b0 0c 18 45 31 71 9f e7 2e 80 d7 48 7b 93 7c | d8 b3 ab 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 77 56 b7 16 48 fa 98 9b c1 2d 60 | a6 6c bc 07 2c 3a ef 47 00 00 00 1c 00 00 40 05 | 5a c9 c6 01 25 8a 31 37 7b d0 f2 6b d1 02 08 77 | 0a b6 4e aa | libevent_free: release ptr-libevent@0x7fb384032b00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800feb0 | #265 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e d6 2a e3 fc d6 88 0b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #265 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #265 | rejected packet: | 5e d6 2a e3 fc d6 88 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #265: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #313 | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #313 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #313 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49673.788551; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003188 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800feb0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #313 | libevent_malloc: new ptr-libevent@0x7fb384032b00 size 128 "road-eastnet-nonat-61" #313: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #313) | 5f e0 5b 3a aa b2 0d 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 72 14 0f 17 54 5f cc c5 98 fb 35 26 a3 92 e2 | 11 a3 ad ea c4 71 33 c5 3b 09 0d 86 8a ef c9 16 | 41 6e 6e 33 c5 10 cc f1 5e 47 e9 ca 13 f8 ee 4f | 37 f9 0e ac 70 04 12 68 e2 ae b0 7b dd cb cb ab | d1 0b 9f 48 8f e3 3e b7 e3 65 ca 3d b0 79 98 5c | d4 18 e2 6e 8f 62 4a 4d 34 e2 ac f2 57 5e 56 f3 | 96 24 71 ed eb 39 5a 9f 4d 0a 51 e3 f2 80 2e 9c | c7 e3 0a d7 46 cd 62 d8 70 57 a4 15 e0 2e 57 82 | 00 9c 85 fc cc fb ec 67 7d 2f f7 de 8d 85 b7 9a | ae 6a 14 45 c8 4f c3 df 8d 60 30 87 57 0e a1 b0 | 8b bf f6 18 27 37 f1 3e 81 c1 ec 19 9b f6 db 06 | 57 00 87 5d ef 1f e5 81 9a 44 f2 c0 14 62 b9 b1 | a3 5a 63 7e 11 93 6f 2a 71 ae af 90 3a 04 4e 7a | a3 7a 98 c8 8a bb b2 5a a5 8c d5 d7 51 2b fa cf | d5 ea ac 65 e9 8c f9 24 80 81 e7 38 45 fd 2e f5 | 33 21 e2 b5 ea 65 8b be be 31 9f 87 b8 9f 6c 5b | 29 00 00 24 50 24 81 a9 b8 a1 9e c5 6d 65 2e b2 | 7c 32 12 aa 77 af 34 a7 17 a7 54 1f 7b 13 4b 11 | 43 e0 57 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e d7 79 da 83 ae 02 6d 20 64 f0 64 | 33 fe 2f 85 1b 7e 43 e4 00 00 00 1c 00 00 40 05 | bb f1 5c c9 25 91 06 ec a8 bd 6e 4b ab 50 48 3a | 1c ac 06 f7 | libevent_free: release ptr-libevent@0x7fb38801abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #313 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f e0 5b 3a aa b2 0d 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #313 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #313 | rejected packet: | 5f e0 5b 3a aa b2 0d 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #313: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350005860 | handling event EVENT_RETRANSMIT for parent state #353 | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #353 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #353 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49673.811892; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001382 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #353 | libevent_malloc: new ptr-libevent@0x7fb38801abe0 size 128 "road-eastnet-nonat-101" #353: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #353) | 5c b8 33 04 f9 07 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 8b 11 fb 47 ec 02 c4 cd 08 09 04 3c c8 57 b9 | e6 56 8a 75 16 cb 27 a3 a8 a8 cd 60 5a 5e 10 a0 | 4c ee d4 ee 70 90 76 03 9c dd ae bd 31 4c 66 16 | b3 e1 1d be 33 f8 41 0b c4 3c 71 6f 90 30 0f da | 26 bc 55 a4 9b 68 89 99 78 6a 9f bd 9b 59 ca 66 | 9f 28 bb 1c cf d9 04 9c 3f 50 e0 a8 9a c8 86 3c | 22 ad 41 27 f3 c4 bb fb ef e9 6e f8 88 7e 34 6e | 75 ca 2d 80 b4 0c d7 c1 72 ce 98 2e 70 ec 4e 80 | a8 95 d8 c8 1d 5c 97 5c c0 a0 b9 5c ac 3a c3 07 | 2c c5 07 1e 3d 08 d1 ba e4 93 f5 5b dd cb 89 0a | 36 eb de 45 ac 11 de 24 b8 2b b2 28 d9 84 7e 81 | 6c e6 ca 34 e5 ab 3a f5 d9 8f 51 9e f8 46 26 92 | bb e9 13 c3 32 db 48 bf d1 a9 ef 9e d6 1f 7a 90 | cf e0 f7 95 4c 0f 73 ac 90 00 08 6f f7 6f bb 88 | dc 53 20 17 f7 7a 4b e1 b0 e3 53 ab c1 68 9e bb | 8c bb e3 6d 1e 44 fc 28 be 03 40 b8 4e ff ea 55 | 29 00 00 24 d0 f4 4a 20 b5 18 6c ce 45 6d d4 e9 | 3d b2 3f bf 9f b6 c1 be 4d 22 b8 3f d5 b7 20 9c | 7a 5b 5b 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 c3 92 4c 0f 96 63 0f 6f bc 3d e6 | 99 69 47 3f a6 34 81 2c 00 00 00 1c 00 00 40 05 | ce 29 c6 74 fd 99 32 be d7 3c ba 39 8c e5 64 d3 | 17 27 91 5a | libevent_free: release ptr-libevent@0x7fb344008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350005860 | #353 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c b8 33 04 f9 07 ca 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #353 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #353 | rejected packet: | 5c b8 33 04 f9 07 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #353: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0515 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c017ea0 | handling event EVENT_RETRANSMIT for parent state #343 | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #343 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #343 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49673.826215; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002723 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #343 | libevent_malloc: new ptr-libevent@0x7fb344008e30 size 128 "road-eastnet-nonat-91" #343: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #343) | ae 78 c6 a9 8f e8 66 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 9d b8 ed 06 43 12 ec 4c 45 2d d2 98 f8 e4 c2 | 36 59 63 a7 5a 33 ff 67 e3 f9 f4 1f 01 a9 3a 4c | 55 90 c8 83 a0 29 a8 aa 4f ac db f2 6f 11 94 39 | df dd ed a8 03 f3 60 cc f4 5f c8 16 76 2c 18 b3 | 52 5b 1b ac 7a 46 b0 6c 28 af 43 e8 e9 1f 42 2d | 46 d8 e4 d3 78 66 14 97 ce c1 cd 0c 3c 65 65 46 | 46 82 84 7e d0 a7 70 e0 17 0f db 9a 4e 29 93 92 | 21 22 73 35 c9 ca 2f af 9d 0a 64 5c 81 08 63 7f | e9 bd 70 7e 9e c2 db 6e 8e 2d a9 2d 3d e8 0e 81 | cf 97 9f 13 45 5f d0 17 a5 46 81 8f f6 9c 9c dd | 6d 72 b6 df 14 55 64 61 52 e1 4b 46 36 b7 06 8a | 6d 94 56 ae f7 f9 54 fa 14 95 61 ab b8 b6 ec c3 | e8 2c f9 02 e7 ab 10 28 9e 67 38 42 93 d6 89 7e | bb 6a dc 83 42 00 3f 72 de b7 9e 71 be 55 39 21 | 54 8b a5 97 b3 b2 06 f8 5f 7f 26 67 9a c1 3f 7e | 51 39 34 0f ac 86 ce 7b e6 99 54 4b 79 6e 8f 0a | 29 00 00 24 65 6f dc 77 c3 29 54 5a 74 6e 49 3d | 05 2a fe cf 26 c9 29 fa f4 9d 54 09 a5 a6 15 69 | 11 b4 0e 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 ad 81 e7 cf f7 25 7c 0f 5a 2a 07 | aa 17 3c 2f 54 ca c3 2d 00 00 00 1c 00 00 40 05 | 5d 1d e0 9d fe 43 fa fd 70 69 f4 3c 05 77 9a 1e | 38 96 d9 39 | libevent_free: release ptr-libevent@0x7fb35c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | #343 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 78 c6 a9 8f e8 66 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #343 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #343 | rejected packet: | ae 78 c6 a9 8f e8 66 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #343: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae9fc0 | handling event EVENT_RETRANSMIT for parent state #115 | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #115 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #115 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49673.843585; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006836 exceeds limit? YES "road-eastnet-nonat-115" #115: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-115" #115: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #367 at 0x557d46a70050 | State DB: adding IKEv2 state #367 in UNDEFINED | pstats #367 ikev2.ike started | Message ID: init #367: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #367: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #367; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-115" #367: initiating v2 parent SA to replace #115 | using existing local IKE proposals for connection road-eastnet-nonat-115 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 367 for state #367 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c017ea0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #367 | libevent_malloc: new ptr-libevent@0x7fb35c04b7c0 size 128 | #367 spent 0.0946 milliseconds in ikev2_parent_outI1() | RESET processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 resuming | crypto helper 15 starting work-order 367 for state #367 | start processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #115 ikev2.ike failed too-many-retransmits | pstats #115 ikev2.ike deleted too-many-retransmits | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 367 | #115 spent 2.21 milliseconds in total | [RE]START processing: state #115 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-115" #115: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #115: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #115 "road-eastnet-nonat-115" #115: deleting IKE SA for connection 'road-eastnet-nonat-115' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-115' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-115 | State DB: deleting IKEv2 state #115 in PARENT_I1 | parent state #115: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 367 time elapsed 0.00061 seconds | stop processing: state #115 from 192.1.2.23:500 (in delete_state() at state.c:1143) | (#367) spent 0.613 milliseconds in crypto helper computing work-order 367: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 367 for state #367 to event queue | scheduling resume sending helper answer for #367 | libevent_malloc: new ptr-libevent@0x7fb374045df0 size 128 | crypto helper 15 waiting (nothing to do) | libevent_free: release ptr-libevent@0x7fb36404b5a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae9fc0 | in statetime_stop() and could not find #115 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-115 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-115" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-115' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-115" | stop processing: connection "road-eastnet-nonat-115" (in initiate_a_connection() at initiate.c:349) | spent 0.0722 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #367 | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 367 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #367 | **emit ISAKMP Message: | initiator cookie: | 4a 87 68 98 60 e9 4c f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-115 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 22 0c 97 07 ab 60 f0 87 17 3b e3 ad e6 c0 a4 f8 | ikev2 g^x bc d0 84 fc 55 d2 65 d6 9f 46 ab 63 b9 cd 86 a7 | ikev2 g^x 92 52 2d 61 57 c8 33 96 bd 3f e7 29 4c c0 56 81 | ikev2 g^x 07 2c a6 2e b4 e1 f4 a2 f9 92 52 0a 37 04 e4 51 | ikev2 g^x 6e 83 7a 8b f6 b0 a9 33 fc 7e 63 8b 04 cb e8 b1 | ikev2 g^x 89 da ba 9d 79 52 4b 77 ad fe 01 ca be 34 71 25 | ikev2 g^x 01 b7 c6 b7 a4 d2 8b 5a 4f 28 3e 3a 2c 2d 2b 82 | ikev2 g^x b6 7f 76 80 3a 8d 21 5e c2 27 da 9c 35 b4 28 8d | ikev2 g^x 4f 12 52 38 3a d3 0a 5c 8a f9 8f 79 8d 25 d4 f8 | ikev2 g^x ed f0 27 a3 9a 91 9a 23 17 a2 c5 fb 5c 81 c7 3f | ikev2 g^x d7 90 16 5d 16 d9 fd c2 ab 94 11 66 13 b9 42 50 | ikev2 g^x 61 f5 f7 53 fa 66 74 a0 35 1a 38 cb 76 13 72 7a | ikev2 g^x 71 f8 95 99 2b 70 57 e9 96 87 e1 a7 fa 09 46 16 | ikev2 g^x 2d 17 ab 0f b3 e3 6d 7d c4 71 f7 b9 01 3d 53 ec | ikev2 g^x 89 99 23 9b ed fe dc 3d 96 90 a5 f1 6b a2 7c ad | ikev2 g^x 08 22 28 21 90 c0 9d 24 98 36 19 8c 8e 5f 64 f3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce cc 21 72 ec 84 1b 6c bc be 58 98 1b fd b2 70 93 | IKEv2 nonce 97 ae 8a 73 25 e3 f3 ed 6f 6f ad a0 a3 bc 74 bd | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4a 87 68 98 60 e9 4c f1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 73 | natd_hash: port= 01 f4 | natd_hash: hash= f8 20 17 ba 74 ed cb 3d 19 9d 8d 0a 7d 3c 02 99 | natd_hash: hash= ce fc 27 96 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f8 20 17 ba 74 ed cb 3d 19 9d 8d 0a 7d 3c 02 99 | Notify data ce fc 27 96 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4a 87 68 98 60 e9 4c f1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= be d4 1c 69 d6 46 df 94 c0 c1 0d 02 c5 30 14 7a | natd_hash: hash= ff f7 b4 bf | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data be d4 1c 69 d6 46 df 94 c0 c1 0d 02 c5 30 14 7a | Notify data ff f7 b4 bf | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #367 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #367: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #367 to 4294967295 after switching state | Message ID: IKE #367 skipping update_recv as MD is fake | Message ID: sent #367 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-115" #367: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.115:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #367) | 4a 87 68 98 60 e9 4c f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 0c 97 07 ab 60 f0 87 17 3b e3 ad e6 c0 a4 f8 | bc d0 84 fc 55 d2 65 d6 9f 46 ab 63 b9 cd 86 a7 | 92 52 2d 61 57 c8 33 96 bd 3f e7 29 4c c0 56 81 | 07 2c a6 2e b4 e1 f4 a2 f9 92 52 0a 37 04 e4 51 | 6e 83 7a 8b f6 b0 a9 33 fc 7e 63 8b 04 cb e8 b1 | 89 da ba 9d 79 52 4b 77 ad fe 01 ca be 34 71 25 | 01 b7 c6 b7 a4 d2 8b 5a 4f 28 3e 3a 2c 2d 2b 82 | b6 7f 76 80 3a 8d 21 5e c2 27 da 9c 35 b4 28 8d | 4f 12 52 38 3a d3 0a 5c 8a f9 8f 79 8d 25 d4 f8 | ed f0 27 a3 9a 91 9a 23 17 a2 c5 fb 5c 81 c7 3f | d7 90 16 5d 16 d9 fd c2 ab 94 11 66 13 b9 42 50 | 61 f5 f7 53 fa 66 74 a0 35 1a 38 cb 76 13 72 7a | 71 f8 95 99 2b 70 57 e9 96 87 e1 a7 fa 09 46 16 | 2d 17 ab 0f b3 e3 6d 7d c4 71 f7 b9 01 3d 53 ec | 89 99 23 9b ed fe dc 3d 96 90 a5 f1 6b a2 7c ad | 08 22 28 21 90 c0 9d 24 98 36 19 8c 8e 5f 64 f3 | 29 00 00 24 cc 21 72 ec 84 1b 6c bc be 58 98 1b | fd b2 70 93 97 ae 8a 73 25 e3 f3 ed 6f 6f ad a0 | a3 bc 74 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 20 17 ba 74 ed cb 3d 19 9d 8d 0a | 7d 3c 02 99 ce fc 27 96 00 00 00 1c 00 00 40 05 | be d4 1c 69 d6 46 df 94 c0 c1 0d 02 c5 30 14 7a | ff f7 b4 bf | state #367 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c04b7c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c017ea0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #367 | libevent_malloc: new ptr-libevent@0x7fb35c04b7c0 size 128 | #367 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49673.844859 | resume sending helper answer for #367 suppresed complete_v2_state_transition() and stole MD | #367 spent 0.349 milliseconds in resume sending helper answer | stop processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb374045df0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 87 68 98 60 e9 4c f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #367 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #367 | rejected packet: | 4a 87 68 98 60 e9 4c f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 73 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #367: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aeb540 | handling event EVENT_RETRANSMIT for parent state #360 | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #360 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #360 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49673.848031; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501547 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374009690 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #360 | libevent_malloc: new ptr-libevent@0x7fb374045df0 size 128 "road-eastnet-nonat-108" #360: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #360) | e8 ba f7 ac 97 7a d7 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 a7 6a 2f 0e 47 4f c5 a2 87 88 1c 76 27 25 53 | 18 cf 29 be de 65 a5 ec fa 8e ba d5 95 70 46 1a | 5e 82 ee 5e ea 78 6c 5e e1 5a ba c3 42 fa 62 85 | 96 61 49 94 e4 26 35 02 12 7e c3 49 17 01 2e ad | da 08 aa 31 5d 07 3f 11 e2 3e a1 55 1e 97 51 1d | 21 13 8f d7 77 02 f2 6a 5f 3a a3 ad 67 d3 b3 fe | 4d bc 3d 87 97 56 a8 ed 5e 65 2d 59 2c 08 c6 f6 | e3 33 48 1e c9 5b 10 68 f5 80 0a de 74 5b 48 d5 | 12 63 cb 81 c8 06 b2 4b 2a 11 1e ef 99 9b bd 96 | 3d 2d 68 30 3c a5 df b7 7c b9 96 9a 90 b4 80 82 | 7f 32 39 5b 15 a6 11 ef 5c ad af 36 92 59 32 87 | 1f b6 1c c4 37 ef 0e 8f d4 cd 1f 34 87 b5 54 45 | 4f b4 69 d7 3d 68 0c fa bd 14 4f 0f ca d9 05 b6 | 6c 12 d4 47 46 2e 28 86 0e 8a 52 14 fe d2 d6 83 | e9 62 c7 35 25 a1 d0 50 cc af ac b0 fd 2d 90 37 | 95 46 1a 19 98 e1 af 75 ba a4 1b aa b9 40 54 be | 29 00 00 24 1b 6f 95 ad 44 06 60 87 4d 33 ad b6 | 0a 54 4e 5c c3 38 27 ff 28 86 c4 a8 14 ff fc 45 | 4c 10 47 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 71 5e 67 a4 d4 de c3 91 7e 75 5e | 86 6a 2f 03 c9 58 fc 3e 00 00 00 1c 00 00 40 05 | 42 65 a4 4c 2a f8 3a 2c 53 a5 43 50 55 9d ce 16 | 71 5f ac c0 | libevent_free: release ptr-libevent@0x7fb37c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aeb540 | #360 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 ba f7 ac 97 7a d7 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #360 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #360 | rejected packet: | e8 ba f7 ac 97 7a d7 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #360: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378018460 | handling event EVENT_RETRANSMIT for parent state #314 | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #314 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #314 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49673.856315; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00352 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aeb540 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #314 | libevent_malloc: new ptr-libevent@0x7fb37c035930 size 128 "road-eastnet-nonat-62" #314: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #314) | fd 31 72 f9 64 d3 9c f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 18 14 ac 93 72 6f f5 79 79 36 2d 8e 4c 14 ac | ea 91 ec 03 06 fb 84 ad 5e 18 85 94 4b b8 8e ee | d9 14 0b 8c 64 c8 45 95 1b 91 75 07 f8 e4 ec 03 | 59 35 93 6c 10 48 ab 6b e6 53 29 72 ab ff 3c 2a | 61 16 cb b8 bd 31 a5 f8 2f 5d 57 58 e1 26 7c 2e | d9 c7 b7 a4 21 ac 7f a4 9a 22 28 50 e4 1d c5 8c | 89 bc f7 70 40 e3 4f 71 2a 2a 2e b1 a7 96 2a 7a | 82 34 1a e1 0e c4 48 55 41 7f 5a 8b 68 d2 fd 14 | f7 10 c0 e4 c1 ac fb 5d c6 f8 34 c9 0a 71 0c 1d | 4f 2b 4a ae bd 22 c4 9a db 63 e4 0a ff 3d 5a f9 | dc 19 2e 9a 16 8d df 98 1f 04 7e 59 57 62 0a e6 | b9 93 59 94 b4 3b eb 70 b1 7b 76 4b 9a 71 ee 97 | f5 ac 50 38 4c 04 22 68 a2 68 e3 f1 1d 13 3a e1 | 84 4b 7c 08 19 fb 96 e3 58 71 59 95 c0 bd 55 f5 | 0d 72 3b 29 f3 ae 58 91 30 ad de 16 a2 e3 03 a0 | 02 e9 38 39 b8 a1 6a 55 c4 1d 22 81 8d d1 2c eb | 29 00 00 24 83 8f 4c 82 0e ff 5a 2c de 21 68 5e | 60 c0 57 92 a6 09 5b 7e 12 e1 2a 75 9d 50 83 dd | e3 d1 6f 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 7f 92 43 99 76 22 ce 79 dc 92 3a | aa fb 36 5e 79 bf 23 b0 00 00 00 1c 00 00 40 05 | e5 74 71 ef f2 a4 7e f6 0b b1 36 a7 2f ae f3 30 | ad 50 42 06 | libevent_free: release ptr-libevent@0x7fb34801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378018460 | #314 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 31 72 f9 64 d3 9c f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #314 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #314 | rejected packet: | fd 31 72 f9 64 d3 9c f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #314: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #354 | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #354 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #354 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49673.864685; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001908 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #354 | libevent_malloc: new ptr-libevent@0x7fb34801a4e0 size 128 "road-eastnet-nonat-102" #354: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #354) | 72 4c 85 c6 74 09 42 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 1b e9 65 bc 73 bc c5 81 57 1a 7b 1b db 4b 3f | 32 d5 0d b7 6a 65 f1 0a 67 34 33 c1 2c 23 e5 f2 | 41 57 12 1f 62 7d 04 aa d4 c7 47 71 78 e8 f0 df | 48 86 0b 9f 4e 36 6e 72 bd ec 74 1b dd 83 0a ab | df 0b c7 29 5d 45 26 d8 31 4b 64 db c5 65 76 90 | cd 52 7e 2d 27 67 7a 01 34 ba b6 3f e3 9a 85 48 | e4 51 41 5f 21 41 ff 88 e4 cc aa c0 b6 13 70 92 | 13 45 bf db 76 ed 1c 31 eb 2b 1f af 38 c5 ca 82 | 0b fb bb d7 57 27 bd 26 60 cb 6b 22 18 4a df 09 | ae e5 bd 33 88 7d ef 21 1c 95 13 3d a5 02 60 08 | e7 d2 1b 72 0a 7b aa 01 9d 47 2a 4d 32 3f 9b ec | 5b 5a ea 31 68 bb 1a dc 15 be 3d d6 a0 c0 98 db | 7b 5b 3d 8f ce 9b 6c 43 56 11 be e1 16 78 07 0a | 06 29 bd c7 77 7e 17 95 3a 22 27 47 9f 23 32 f6 | 37 27 d0 b4 53 1e 36 9f c8 05 75 2f 68 c9 35 72 | da 2e a9 d1 44 f4 35 64 d4 0a 4b c0 71 73 52 a8 | 29 00 00 24 72 5c 82 6f 5d 6b bd 69 39 4b 52 31 | 75 ca 0e e7 64 bc 08 f8 b5 d4 6f 1f bc a5 fc 80 | 56 52 35 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 33 77 7a c0 93 c5 bf 78 5c 8c bc | 79 60 cc b9 7e aa 2e bb 00 00 00 1c 00 00 40 05 | df 4b d5 4e cf 64 0d 4d 4f 32 d9 61 e4 8d 05 c9 | 9f e3 12 70 | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | #354 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 4c 85 c6 74 09 42 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #354 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #354 | rejected packet: | 72 4c 85 c6 74 09 42 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #354: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24700 | handling event EVENT_RETRANSMIT for parent state #266 | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #266 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #266 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49673.873981; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006417 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #266 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 "road-eastnet-nonat-14" #266: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #266) | 6b cc e0 12 8b aa 91 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 c7 f6 72 9c a5 df d1 37 bd 8c a8 3d 12 ac f8 | 22 21 09 d5 08 f4 92 dd f1 6b 1f 81 7b 7f 3b 9d | 10 fa 77 c3 74 a7 03 4d 17 3b 47 94 f2 0e 9e 20 | ba c3 57 67 86 fd d2 e5 0d 53 bc 0e c2 cf a4 3a | ca 89 10 10 9a 9f 52 0e c5 60 b3 38 be 05 37 b4 | a3 6b 5d d8 04 66 d6 b5 93 93 8f 47 58 63 40 52 | 1b f8 2c cb 93 59 07 2b ad c7 18 ca a5 e9 24 fa | 41 de 1f 43 7f 1f 27 30 49 67 c7 c8 16 fd 61 a4 | 21 e9 05 98 46 f1 50 b6 8e 31 ad a9 2c 10 19 f5 | b9 ef 6b d3 e7 07 06 8e bf 18 8b 0a 77 f5 44 4b | 1c 00 21 d9 dc b3 66 3f a9 4b df cd cd bd 25 d2 | 2a cd 52 ad da b3 d3 bc be e7 d4 32 97 da 0f e8 | e2 29 51 0e 96 41 b4 ff 9b 20 c1 68 f8 22 6b 37 | bc 2d 7d 2a 13 01 a1 b3 05 fa c1 ea 1c 1f 45 97 | 4c 05 13 ad eb 35 15 0f f5 10 99 91 9b 3f 29 a1 | 29 e0 29 94 46 69 fe a4 f9 df d3 46 9b f7 d6 fc | 29 00 00 24 85 48 4e 62 cb aa ef f3 1e 98 d2 14 | 8e 36 5f 8a 20 c7 f8 35 5a c8 08 b9 4d a2 67 85 | 59 88 c1 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae c1 7f 5b 24 ac dc 11 ec a1 5c 57 | 31 3f 4b 60 7a 20 b0 c6 00 00 00 1c 00 00 40 05 | 71 38 17 79 8f 5d ce 34 6f 4c c4 ce cc 6f 78 37 | 7e be 6c a5 | libevent_free: release ptr-libevent@0x7fb344035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24700 | #266 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b cc e0 12 8b aa 91 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #266 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #266 | rejected packet: | 6b cc e0 12 8b aa 91 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #266: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aee080 | handling event EVENT_RETRANSMIT for parent state #344 | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #344 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #344 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49673.907259; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004517 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #344 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 "road-eastnet-nonat-92" #344: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #344) | 60 fe 47 d5 bc 7e ec f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 bf a8 75 45 e6 9b 9e 36 c4 f8 00 7b fa ed 16 | 45 48 19 73 f0 43 47 d5 85 f3 cd c8 97 6e 50 a8 | 7b 63 a3 ce ea 05 ae 44 e5 a2 e6 29 a8 16 bc 48 | 78 95 49 07 f7 17 ad 10 48 2e fd 23 74 21 44 c0 | b4 d3 48 b2 fb bc c3 28 df 8a d3 09 ec 63 04 28 | 7e 5a 51 87 52 03 32 ff 61 0c 39 ac c3 26 d9 35 | 88 8a 8d fe 64 9e 7c 7f c3 22 7b 8b 9e 96 8b 3d | b8 ef 81 b1 6a 3f 8a 50 49 73 5d ab 49 f3 99 5e | ad 5d e8 43 6f bd 70 02 a0 6f d4 12 c9 ee f2 55 | f1 fb cb 6e d0 ab 61 ad a4 39 c4 fa f3 3f c7 bf | 5f f1 ac db cc 36 aa 36 32 7b 50 a5 5a 12 e0 c2 | fb c0 54 26 8a e0 81 02 71 55 03 a2 11 c1 ce 2c | 62 50 df 4c eb da 5d 3d 81 bf 56 fd c4 6a 45 b3 | f3 c4 00 14 0a f0 d4 72 ad 8f 3b 97 e7 25 ea 81 | 48 23 bb ad 52 e9 90 df 74 31 fa 3e 85 2d 9b f0 | 97 f2 67 07 62 f1 e0 1b eb 9c 9b f7 2c 83 46 40 | 29 00 00 24 59 47 a1 36 35 51 2c e7 ec 59 96 c4 | c5 6a 0f fd 9f 62 7d 5e ad fa 8e 0f 35 43 8c 01 | 6a c9 a8 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 37 18 00 bf d4 a8 37 15 69 ae 4c | fc 2f e7 92 f0 22 70 f2 00 00 00 1c 00 00 40 05 | 33 e5 40 5c 05 2f 5b 7d e0 96 06 6b 07 18 0b d5 | ca 3f e3 4a | libevent_free: release ptr-libevent@0x7fb38800c460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aee080 | #344 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 60 fe 47 d5 bc 7e ec f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #344 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #344 | rejected packet: | 60 fe 47 d5 bc 7e ec f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #344: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23110 | handling event EVENT_RETRANSMIT for parent state #116 | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #116 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #116 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49673.91354; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010888 exceeds limit? YES "road-eastnet-nonat-116" #116: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-116" #116: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #368 at 0x557d46a71610 | State DB: adding IKEv2 state #368 in UNDEFINED | pstats #368 ikev2.ike started | Message ID: init #368: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #368: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #368; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-116" #368: initiating v2 parent SA to replace #116 | using existing local IKE proposals for connection road-eastnet-nonat-116 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 368 for state #368 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aee080 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #368 | libevent_malloc: new ptr-libevent@0x7fb38800c460 size 128 | #368 spent 0.0691 milliseconds in ikev2_parent_outI1() | RESET processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #116 ikev2.ike failed too-many-retransmits | pstats #116 ikev2.ike deleted too-many-retransmits | #116 spent 2.64 milliseconds in total | [RE]START processing: state #116 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-116" #116: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #116: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #116 "road-eastnet-nonat-116" #116: deleting IKE SA for connection 'road-eastnet-nonat-116' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-116' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-116 | State DB: deleting IKEv2 state #116 in PARENT_I1 | crypto helper 19 resuming | crypto helper 19 starting work-order 368 for state #368 | parent state #116: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 368 | stop processing: state #116 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23110 | in statetime_stop() and could not find #116 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-116 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-116" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-116' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-116" | stop processing: connection "road-eastnet-nonat-116" (in initiate_a_connection() at initiate.c:349) | spent 0.0569 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 368 time elapsed 0.000568 seconds | (#368) spent 0.571 milliseconds in crypto helper computing work-order 368: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 368 for state #368 to event queue | scheduling resume sending helper answer for #368 | libevent_malloc: new ptr-libevent@0x7fb368023a60 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #368 | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 368 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #368 | **emit ISAKMP Message: | initiator cookie: | af 44 01 88 e6 16 c8 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-116 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 76 fe d2 29 cf 90 27 2d 78 45 a2 b1 3a ed 0c 48 | ikev2 g^x 17 b4 e8 54 dd 68 cf 7e 09 7a af 17 ed 4f 89 f8 | ikev2 g^x c0 ff 46 bb 6c a6 b3 38 fd f1 d2 cc cf d4 db c1 | ikev2 g^x e0 88 fe 51 49 6d e3 71 01 85 fe f4 a5 9f 85 04 | ikev2 g^x b6 d1 25 1f bd d7 ec 86 d1 7c 74 4d 2b 88 9b 37 | ikev2 g^x 88 75 91 51 15 43 e3 94 29 7a fc 34 e7 47 6b 09 | ikev2 g^x 3f 68 5a af 07 68 67 15 d9 ca f4 fd c3 d0 6c 2d | ikev2 g^x 70 40 4e 4a 88 cf b4 8b 6f 34 77 1b fd 2c ac c0 | ikev2 g^x b5 ab 67 28 d7 0d cf 79 56 41 4a ee e4 5c 59 e9 | ikev2 g^x 16 2d 45 df 3b 83 50 77 d1 1d 25 2e df 41 d7 96 | ikev2 g^x e0 ae 3d 15 c2 fb 47 fc 22 43 64 51 9d 2b 27 9e | ikev2 g^x ef d5 13 c7 bc a8 df 51 ba 9e 32 c3 d2 0e 3d 97 | ikev2 g^x 23 9a d8 1c 93 38 85 21 ff 2a 81 20 c2 e1 c5 96 | ikev2 g^x 9d d3 5f 74 e3 dc ae 9a 19 d8 eb 6f 38 2d 11 55 | ikev2 g^x b9 c5 4b fe 45 56 61 1b 03 ae 41 5d 20 26 7b b4 | ikev2 g^x dd 4c d4 57 72 8f 74 07 75 75 35 67 ae 9c b4 2d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b4 f8 c7 8c ce d2 25 cc 04 b1 28 85 4c 50 50 1c | IKEv2 nonce af 66 c6 a8 14 6b b6 e9 07 eb 31 8e 06 0d 7b dd | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= af 44 01 88 e6 16 c8 e2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 74 | natd_hash: port= 01 f4 | natd_hash: hash= df 4f 54 9f 13 b7 58 02 6e 4f 8f 36 8b d5 61 f1 | natd_hash: hash= 61 e4 53 15 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data df 4f 54 9f 13 b7 58 02 6e 4f 8f 36 8b d5 61 f1 | Notify data 61 e4 53 15 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= af 44 01 88 e6 16 c8 e2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 79 7d 7e 8e 6a 0e d7 b1 f9 8e 14 46 7c 3e c2 fe | natd_hash: hash= 69 34 3d 95 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 79 7d 7e 8e 6a 0e d7 b1 f9 8e 14 46 7c 3e c2 fe | Notify data 69 34 3d 95 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #368 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #368: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #368 to 4294967295 after switching state | Message ID: IKE #368 skipping update_recv as MD is fake | Message ID: sent #368 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-116" #368: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.116:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #368) | af 44 01 88 e6 16 c8 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 fe d2 29 cf 90 27 2d 78 45 a2 b1 3a ed 0c 48 | 17 b4 e8 54 dd 68 cf 7e 09 7a af 17 ed 4f 89 f8 | c0 ff 46 bb 6c a6 b3 38 fd f1 d2 cc cf d4 db c1 | e0 88 fe 51 49 6d e3 71 01 85 fe f4 a5 9f 85 04 | b6 d1 25 1f bd d7 ec 86 d1 7c 74 4d 2b 88 9b 37 | 88 75 91 51 15 43 e3 94 29 7a fc 34 e7 47 6b 09 | 3f 68 5a af 07 68 67 15 d9 ca f4 fd c3 d0 6c 2d | 70 40 4e 4a 88 cf b4 8b 6f 34 77 1b fd 2c ac c0 | b5 ab 67 28 d7 0d cf 79 56 41 4a ee e4 5c 59 e9 | 16 2d 45 df 3b 83 50 77 d1 1d 25 2e df 41 d7 96 | e0 ae 3d 15 c2 fb 47 fc 22 43 64 51 9d 2b 27 9e | ef d5 13 c7 bc a8 df 51 ba 9e 32 c3 d2 0e 3d 97 | 23 9a d8 1c 93 38 85 21 ff 2a 81 20 c2 e1 c5 96 | 9d d3 5f 74 e3 dc ae 9a 19 d8 eb 6f 38 2d 11 55 | b9 c5 4b fe 45 56 61 1b 03 ae 41 5d 20 26 7b b4 | dd 4c d4 57 72 8f 74 07 75 75 35 67 ae 9c b4 2d | 29 00 00 24 b4 f8 c7 8c ce d2 25 cc 04 b1 28 85 | 4c 50 50 1c af 66 c6 a8 14 6b b6 e9 07 eb 31 8e | 06 0d 7b dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 4f 54 9f 13 b7 58 02 6e 4f 8f 36 | 8b d5 61 f1 61 e4 53 15 00 00 00 1c 00 00 40 05 | 79 7d 7e 8e 6a 0e d7 b1 f9 8e 14 46 7c 3e c2 fe | 69 34 3d 95 | state #368 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38800c460 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aee080 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23110 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #368 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 | #368 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49673.914611 | resume sending helper answer for #368 suppresed complete_v2_state_transition() and stole MD | #368 spent 0.309 milliseconds in resume sending helper answer | stop processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb368023a60 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 44 01 88 e6 16 c8 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #368 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #368 | rejected packet: | af 44 01 88 e6 16 c8 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 74 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #368: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23150 | handling event EVENT_RETRANSMIT for parent state #361 | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #361 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #361 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49673.915788; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501129 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae9fc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #361 | libevent_malloc: new ptr-libevent@0x7fb368023a60 size 128 "road-eastnet-nonat-109" #361: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #361) | 9c f5 2d c8 50 35 55 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe f7 f3 f1 6a 76 6a 9a e6 0e 10 b4 e5 b5 16 07 | 0f 90 8a f4 dc 9f 27 b0 2a 41 17 f0 21 60 87 50 | 11 a6 84 2e 86 94 e1 65 4d 1a 59 ce 11 45 d2 c5 | 09 df ce 0a 2c f9 3e 7e cb 59 88 eb 93 1a 26 06 | 39 22 a5 57 b6 f2 5b 4c fe 56 6a 26 49 df e6 84 | b9 e4 e4 41 19 a0 e8 70 69 c2 51 79 76 2e 80 40 | 6f 9e 4b a9 87 c2 02 65 d3 3e 05 60 b6 af 86 d7 | 52 3c 7a 52 e9 69 b8 2a e6 43 99 6c 72 d9 7c 1a | 8d c9 5b fb a3 c2 fc 51 d5 fc c8 85 ff 46 8f 64 | e3 d3 a7 99 28 b1 43 6d 9b 9d 50 e1 af 1a d6 ff | 7e fd 10 23 a2 a6 f9 9b d2 06 fa 0f 91 01 67 9f | 42 43 ac e6 4f ae 3e 00 59 5d 7a cf b3 59 12 67 | 0d c1 86 cf 82 5d 20 9e 98 97 ec b2 7e be 63 74 | b3 15 a1 c0 63 a7 5d 61 bb b3 2f 2d 42 15 59 57 | 72 ca 0b d8 9e d0 1b 84 91 fd db 5e 8f 2f 62 ed | 99 8c a3 a5 ec ef 08 26 6f ab 64 68 6b 97 9d 3e | 29 00 00 24 5d 7a 1f c2 56 77 bf 60 f2 37 f5 ed | 4d 94 c3 a6 58 e2 5f 6e 1b f6 b4 76 e5 69 0c 98 | 27 55 cd c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 71 91 34 7a e2 ba d5 01 f3 c5 56 | ba 5f 83 71 00 17 86 15 00 00 00 1c 00 00 40 05 | e0 46 0d f9 99 b9 47 b4 35 a0 04 20 4b 9b 45 ee | 1c f7 92 53 | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23150 | #361 spent 0.0816 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9c f5 2d c8 50 35 55 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #361 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #361 | rejected packet: | 9c f5 2d c8 50 35 55 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #361: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37800cc10 | handling event EVENT_RETRANSMIT for parent state #315 | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #315 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #315 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49673.924008; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00383 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23150 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #315 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 "road-eastnet-nonat-63" #315: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #315) | 44 ed db 2c fe 0c f2 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e 87 b1 78 dc 97 f3 7a 79 3b d6 3e 86 ea b2 fa | 5d 34 e2 db 78 24 8f 15 59 97 e5 e6 f6 90 b1 aa | 59 98 1b 57 96 2d 7a a6 68 c9 eb 8b 7d f6 64 68 | a2 48 77 fc cb 5d 8f 0e b2 52 9b 77 09 f1 21 ba | 81 62 c1 7e 82 df 5b 48 60 ba f6 08 04 c2 77 74 | 9c c8 6b 41 93 1d 14 39 f9 1e b0 b2 5b 1d 3c e0 | ca f1 1f 63 24 c8 cc 04 a5 c5 8f 7d 86 30 95 90 | fb a8 83 29 7a f1 ce 8e 64 9a 9f 82 39 eb 4b a4 | b2 6f ce 0a 5b bd e7 1a af 9d af 92 27 aa 66 57 | 8e 91 52 b5 d0 96 33 ee eb 0f 07 5f 2f 56 77 d0 | 9a 1f cb 0e 53 2f d5 4e b4 5b a5 9c 4c 15 af e1 | 28 86 0f 89 11 d9 bc 73 6b a7 3c 58 a9 04 2c eb | f2 53 51 79 62 f5 50 bf 5f 75 e1 7f 28 95 f0 09 | 87 f1 d9 ee 26 2c 8a ee 7d 84 2e 04 f2 6c 42 e0 | 67 e8 19 47 db 94 b6 12 29 d7 1d dc 8f 61 2d e0 | 53 f7 53 7d 18 19 05 ed 93 cb 84 d8 40 1b 1d fe | 29 00 00 24 5f cd cc 5e 9b b5 1f f6 2d c3 6f 0d | 70 ea 63 15 bc b8 5b 49 76 c9 be 04 9e 55 ff 0b | 33 d9 e0 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 2c d3 1b 13 1c a2 69 95 f2 01 8c | cb 3c f6 d6 71 d0 e6 be 00 00 00 1c 00 00 40 05 | b1 bd 1a 4e 17 0a c1 3c 72 20 f5 8a 28 12 f4 7a | a3 f8 1e e7 | libevent_free: release ptr-libevent@0x7fb37801fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37800cc10 | #315 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ed db 2c fe 0c f2 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #315 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #315 | rejected packet: | 44 ed db 2c fe 0c f2 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #315: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12c40 | handling event EVENT_RETRANSMIT for parent state #355 | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #355 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #355 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49673.9413; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001845 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37800cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #355 | libevent_malloc: new ptr-libevent@0x7fb37801fd50 size 128 "road-eastnet-nonat-103" #355: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #355) | 56 ed c8 71 de f9 06 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 2a 83 b1 26 56 49 8c fe 5f bd b2 84 ea a3 88 | a4 f8 b8 d9 ec 49 43 44 95 bd 12 f2 c5 21 82 10 | 03 69 98 1b 4a 24 1f ea 40 8a 0b 91 c9 76 5c 49 | d4 99 e0 74 0f 3f ee 6f 9e 53 54 1a 23 35 59 5a | aa 59 0d cf 6b cd 1c a1 eb 6c 98 6c 37 17 d0 f8 | 3c dc 93 d2 77 45 41 e8 99 25 82 ad 9d 55 e6 13 | c0 f1 0d 8b 61 04 8f 57 63 d5 98 2e 2e 99 6e 3b | 2e 7c 41 b8 5b 06 ba ad 18 18 aa 84 1a 4c 4a ef | 3b 6e c9 03 be ae 7b 01 5e 77 a6 2b 34 36 7e 21 | 7f c5 d3 9e 48 69 2b 5b 00 e3 c7 29 41 93 4a 4f | 3f 0c 86 c3 a8 9a b3 72 ca 66 fb a6 7b 68 f9 97 | 45 bd 92 5e ee 7e 28 d2 1e 8d 24 ad 5b 2c db 57 | 1e 74 10 aa 41 ab d2 f5 21 4c 56 2b c7 8f ce 5e | d8 69 da 43 89 31 85 08 6d d1 b2 1a 22 1c fe b0 | 36 38 83 b8 45 19 23 bb 71 3e 12 a0 c1 d4 c6 f9 | 92 4b 6b b1 a2 bb 20 eb ff a0 77 69 c4 c9 35 d8 | 29 00 00 24 c0 01 1a b2 54 fa cf 80 10 d0 f3 31 | e6 0e 79 92 f9 e8 de f5 3e 1e d4 6a 54 e0 c2 2f | 19 27 3a 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 da f6 01 f4 40 01 a7 a7 77 b7 fc | 3d b7 6f 1f f7 90 79 11 00 00 00 1c 00 00 40 05 | d2 9a 8c 84 e0 9c 3f 77 ed a7 98 65 71 77 a0 dc | b3 15 95 be | libevent_free: release ptr-libevent@0x7fb380011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c40 | #355 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 ed c8 71 de f9 06 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #355 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #355 | rejected packet: | 56 ed c8 71 de f9 06 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #355: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25c40 | handling event EVENT_RETRANSMIT for parent state #267 | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #267 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #267 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49673.966598; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006186 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c40 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #267 | libevent_malloc: new ptr-libevent@0x7fb380011f30 size 128 "road-eastnet-nonat-15" #267: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #267) | 6f db 88 0f fe 70 dc 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e ec fe e4 22 11 a7 b5 a2 ee 25 53 3a 2f 1c 0a | 48 51 04 db 46 22 ad 6d 3c 60 e2 cb fb cc f5 7a | 6d 5e c9 24 ec d8 52 4f 96 5b 62 28 fb 9e eb fd | ac e9 f7 6f 4d 1a f9 74 24 29 e6 a2 80 a2 a7 c1 | b9 1c da 76 8c 9d 40 38 6a 26 13 d3 da 72 01 42 | b6 16 9c ca 09 1d 9b a9 90 70 fb 71 d1 ea b4 45 | 95 3b 5d b5 2c c1 00 ea bd 33 e0 43 00 b9 22 f4 | c9 60 90 dc b0 82 03 89 b0 c4 03 22 4b cf 7c 50 | 96 60 35 da 9c 4c f2 64 7d be b4 90 21 9b 54 ab | 96 09 b1 ee 1f 0d db 8e 22 4d 09 d6 43 6f c8 f1 | da 0c fd f4 69 33 b0 96 0f 1a 25 07 1d e6 1b 37 | 20 ff 37 b4 80 d9 a3 78 93 5a eb 5d 36 bd 9e 35 | 1e 0e a9 e8 13 eb 16 8f ff d5 26 ef c2 d5 47 45 | 91 9b e3 0e c5 08 1f 34 46 fe b0 3e f5 ce e1 c7 | 7c 47 c2 2d d2 f7 4c 06 62 a0 ae f2 e6 53 ff 73 | ee d6 e5 9b 28 8e f3 4d ef ad 40 41 9e 20 99 95 | 29 00 00 24 6d 5a fb f5 8a b7 85 2e cf 37 31 c5 | a8 e8 a7 22 a7 58 7e 34 8e 06 61 77 f0 7b 3b ce | d2 d0 22 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 b4 63 c8 b9 e3 2d fa 51 7c 79 27 | ca 3c 7a c2 0c 39 1a 2b 00 00 00 1c 00 00 40 05 | d9 fc ba 6b 91 d3 e0 ee c2 81 f3 1d 92 b2 24 2f | bf 44 6b 65 | libevent_free: release ptr-libevent@0x7fb35400f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c40 | #267 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f db 88 0f fe 70 dc 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #267 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #267 | rejected packet: | 6f db 88 0f fe 70 dc 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #267: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c00d120 | handling event EVENT_RETRANSMIT for parent state #117 | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #117 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #117 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49673.972899; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010177 exceeds limit? YES "road-eastnet-nonat-117" #117: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-117" #117: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #369 at 0x557d46a72bd0 | State DB: adding IKEv2 state #369 in UNDEFINED | pstats #369 ikev2.ike started | Message ID: init #369: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #369: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #369; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-117" #369: initiating v2 parent SA to replace #117 | using existing local IKE proposals for connection road-eastnet-nonat-117 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 369 for state #369 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b25c40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #369 | libevent_malloc: new ptr-libevent@0x7fb35400f1a0 size 128 | #369 spent 0.0953 milliseconds in ikev2_parent_outI1() | crypto helper 6 resuming | RESET processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 starting work-order 369 for state #369 | start processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 369 | pstats #117 ikev2.ike failed too-many-retransmits | pstats #117 ikev2.ike deleted too-many-retransmits | #117 spent 2.29 milliseconds in total | [RE]START processing: state #117 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-117" #117: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #117: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #117 "road-eastnet-nonat-117" #117: deleting IKE SA for connection 'road-eastnet-nonat-117' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-117' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-117 | State DB: deleting IKEv2 state #117 in PARENT_I1 | parent state #117: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #117 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 369 time elapsed 0.001035 seconds | libevent_free: release ptr-libevent@0x7fb36c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00d120 | in statetime_stop() and could not find #117 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#369) spent 1.03 milliseconds in crypto helper computing work-order 369: ikev2_outI1 KE (pcr) | processing global timer EVENT_REVIVE_CONNS | crypto helper 6 sending results from work-order 369 for state #369 to event queue Initiating connection road-eastnet-nonat-117 which received a Delete/Notify but must remain up per local policy | scheduling resume sending helper answer for #369 | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7fb36c04b850 size 128 | crypto helper 6 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-117" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-117' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-117" | stop processing: connection "road-eastnet-nonat-117" (in initiate_a_connection() at initiate.c:349) | spent 0.0844 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #369 | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 369 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #369 | **emit ISAKMP Message: | initiator cookie: | ff 18 31 cc 83 7e 2e ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-117 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 12 1f 06 e6 7b ea 4e 17 1c 87 7d 86 73 80 47 50 | ikev2 g^x cf bf e2 ff 09 37 6a 25 2d 87 f4 71 22 38 1c ca | ikev2 g^x 11 79 43 67 c5 65 1f f5 07 47 33 ad 73 a4 d3 73 | ikev2 g^x 51 54 fd df 5a c2 8d 18 cb cc 20 72 8e 07 68 eb | ikev2 g^x b6 8d ab 31 ba fd fa 9b 7c 59 57 b3 71 f1 91 34 | ikev2 g^x ea 4b 70 52 a4 6c eb 12 7d 01 23 58 56 9a d3 c0 | ikev2 g^x a8 35 4b 27 63 af ee d0 37 dd c7 3e 45 5a 0b 60 | ikev2 g^x bd 6d ed c4 e9 d9 c1 d7 e1 29 a2 3f dc 2c af 7c | ikev2 g^x e6 74 73 2b 26 15 ca 1c f5 95 b6 33 2f 8c 4a 22 | ikev2 g^x a1 8d d2 aa 72 d0 9b 41 c8 87 a6 d7 f8 13 c7 cd | ikev2 g^x 3c d8 62 e2 fc 64 74 ed 50 b1 79 e3 79 44 21 85 | ikev2 g^x 12 8f 6c 07 3b 37 80 9b 8c 83 41 c0 0e 38 b7 92 | ikev2 g^x 75 a7 4a 89 81 43 56 e9 67 ee 43 e0 24 9b 53 75 | ikev2 g^x b9 e5 d1 27 c1 f4 c3 83 7c 57 e4 5e 33 8b e2 10 | ikev2 g^x c9 ec fe 76 73 25 ae 4b 87 a7 e2 e5 89 5a 08 72 | ikev2 g^x fc 88 9c 69 9c 14 55 be f9 d1 24 d2 2a 6b bd 35 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 03 b6 58 fc c8 79 29 fe 43 44 80 31 59 cf 11 77 | IKEv2 nonce 19 87 27 44 32 ac 84 44 78 ab c0 33 d7 16 05 58 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ff 18 31 cc 83 7e 2e ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 75 | natd_hash: port= 01 f4 | natd_hash: hash= 1a fa 34 e9 cb c2 b8 b0 71 3e db 9c 1e f7 0a 0e | natd_hash: hash= 8d a9 9b 92 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1a fa 34 e9 cb c2 b8 b0 71 3e db 9c 1e f7 0a 0e | Notify data 8d a9 9b 92 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ff 18 31 cc 83 7e 2e ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c3 12 1d 90 39 27 a3 80 ba dc 3c b0 c3 6a 52 2a | natd_hash: hash= 1e d7 c5 9b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c3 12 1d 90 39 27 a3 80 ba dc 3c b0 c3 6a 52 2a | Notify data 1e d7 c5 9b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #369 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #369: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #369 to 4294967295 after switching state | Message ID: IKE #369 skipping update_recv as MD is fake | Message ID: sent #369 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-117" #369: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.117:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #369) | ff 18 31 cc 83 7e 2e ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 1f 06 e6 7b ea 4e 17 1c 87 7d 86 73 80 47 50 | cf bf e2 ff 09 37 6a 25 2d 87 f4 71 22 38 1c ca | 11 79 43 67 c5 65 1f f5 07 47 33 ad 73 a4 d3 73 | 51 54 fd df 5a c2 8d 18 cb cc 20 72 8e 07 68 eb | b6 8d ab 31 ba fd fa 9b 7c 59 57 b3 71 f1 91 34 | ea 4b 70 52 a4 6c eb 12 7d 01 23 58 56 9a d3 c0 | a8 35 4b 27 63 af ee d0 37 dd c7 3e 45 5a 0b 60 | bd 6d ed c4 e9 d9 c1 d7 e1 29 a2 3f dc 2c af 7c | e6 74 73 2b 26 15 ca 1c f5 95 b6 33 2f 8c 4a 22 | a1 8d d2 aa 72 d0 9b 41 c8 87 a6 d7 f8 13 c7 cd | 3c d8 62 e2 fc 64 74 ed 50 b1 79 e3 79 44 21 85 | 12 8f 6c 07 3b 37 80 9b 8c 83 41 c0 0e 38 b7 92 | 75 a7 4a 89 81 43 56 e9 67 ee 43 e0 24 9b 53 75 | b9 e5 d1 27 c1 f4 c3 83 7c 57 e4 5e 33 8b e2 10 | c9 ec fe 76 73 25 ae 4b 87 a7 e2 e5 89 5a 08 72 | fc 88 9c 69 9c 14 55 be f9 d1 24 d2 2a 6b bd 35 | 29 00 00 24 03 b6 58 fc c8 79 29 fe 43 44 80 31 | 59 cf 11 77 19 87 27 44 32 ac 84 44 78 ab c0 33 | d7 16 05 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a fa 34 e9 cb c2 b8 b0 71 3e db 9c | 1e f7 0a 0e 8d a9 9b 92 00 00 00 1c 00 00 40 05 | c3 12 1d 90 39 27 a3 80 ba dc 3c b0 c3 6a 52 2a | 1e d7 c5 9b | state #369 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35400f1a0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b25c40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #369 | libevent_malloc: new ptr-libevent@0x7fb36c012840 size 128 | #369 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49673.974903 | resume sending helper answer for #369 suppresed complete_v2_state_transition() and stole MD | #369 spent 0.631 milliseconds in resume sending helper answer | stop processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c04b850 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff 18 31 cc 83 7e 2e ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #369 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #369 | rejected packet: | ff 18 31 cc 83 7e 2e ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 75 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #369: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa1f00 | handling event EVENT_RETRANSMIT for parent state #316 | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #316 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #316 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49673.983098; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004177 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #316 | libevent_malloc: new ptr-libevent@0x7fb36c04b850 size 128 "road-eastnet-nonat-64" #316: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #316) | e8 62 07 3d 83 c9 27 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 67 27 d8 ca da 21 fc 33 ba 4f 94 10 8a c5 3e | 5d c6 ca e9 be 5f 5b 62 d9 f8 5f ef cd 1d 75 de | 4e 46 e5 c8 47 0c 64 48 a0 a0 be ad 1a 88 be 29 | 21 51 4f e4 bd 33 bd be 35 5e 1a f3 c6 5c 72 cc | 14 4f 34 ba 69 93 e8 bf 07 ec 5c 62 f6 72 9d af | 95 ca 7c 71 3b 37 93 92 3a 98 4e 7a 53 2f 9a a8 | 2a b6 32 33 20 cf eb 65 6b e0 73 23 52 d2 61 14 | 64 77 57 5a e0 a6 ac 4c 66 6c 73 74 1e 30 64 d8 | 26 eb 6f 24 f1 a2 d0 b2 6b 58 a7 b2 54 48 ba 72 | 09 ae 65 3c 30 0d df 54 4e 6a 33 e2 26 65 76 99 | ea 2e 2a 30 fa a7 4c 97 4d 74 ba 19 a6 b3 7b 01 | 82 88 fa e7 6a 85 ab 68 48 39 a4 91 e9 e4 44 02 | 10 7a c6 c8 2e 47 03 39 25 a6 92 8c e5 51 eb 52 | f8 c7 61 20 39 65 61 dc 27 00 53 74 46 c8 5c be | 3b 90 c1 02 b8 be b2 17 6b a3 86 6f 65 fa c8 19 | e6 54 1a 74 80 e0 70 41 21 d7 44 54 50 0b cd 29 | 29 00 00 24 89 45 06 65 65 b3 8c d6 0c df 20 90 | 5a e6 b0 5e f6 87 85 10 8d 96 3d 5e 67 1f 54 38 | 77 de f5 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 e4 d3 0f a4 c8 a7 ec 05 e8 fa d2 | 6d 31 a1 ad f7 6f 67 3e 00 00 00 1c 00 00 40 05 | 0a a4 aa 05 10 e6 c7 c4 a5 a6 8e 98 2e fc 0d 29 | 7c 74 b9 43 | libevent_free: release ptr-libevent@0x7fb3740356e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa1f00 | #316 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 62 07 3d 83 c9 27 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #316 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #316 | rejected packet: | e8 62 07 3d 83 c9 27 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #316: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad4340 | handling event EVENT_RETRANSMIT for parent state #362 | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #362 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #362 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49674.021375; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499995 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa1f00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #362 | libevent_malloc: new ptr-libevent@0x7fb3740356e0 size 128 "road-eastnet-nonat-110" #362: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #362) | 79 e0 7b db bf e0 df 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 58 27 86 c5 f9 8c cf 89 68 d1 9e c2 2a c8 4a | da 7d d8 07 8a b5 64 43 22 f7 a6 30 97 ca b8 f5 | c8 25 5f 3f d2 8e be 62 d3 8d 6c cf 71 bf 76 63 | d9 07 8d b1 c5 9f c3 a7 b8 7e e5 00 03 0b c1 0d | 22 f4 89 95 0c d8 00 e4 8c ba a0 1b ac fa 89 c6 | 67 62 f6 a7 e4 8c 4f c8 c7 77 79 53 f8 98 39 2d | 3b 30 0a e1 da cb f1 fc f0 30 13 27 47 13 e0 65 | 0b da e5 87 6f 0e 6c c0 89 03 ab 2a 82 c5 34 95 | 15 34 67 de 5a aa b5 07 35 bc 95 aa 82 00 b1 16 | 8e 6b 21 e0 45 a5 66 95 6e 83 16 8f 2b ee 03 ef | 02 de 36 db b0 c0 f4 e2 d2 1e 0d be d8 91 f7 72 | cd 14 33 51 64 d5 dd d5 3d 65 70 28 c3 2f 57 3f | 4b 4b d5 8c f2 92 b3 0c 9f 8d a0 2f 9a 5f 9d a8 | 0d ae cd 5e 77 75 b7 48 bb 27 68 90 7e 0e 8d 10 | 86 bf a4 47 df bb 7b cb 34 23 b8 08 15 f3 7f 6d | 51 d5 ae f8 b3 60 44 e0 56 71 c5 a9 57 5a 24 c6 | 29 00 00 24 3b 79 7f e5 5c de f0 ae 26 7a 15 81 | 35 42 e6 f3 1d 66 3a 94 36 41 6a 99 ae e0 a8 96 | 08 73 ec d2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 91 48 5f b0 47 d4 61 2c f1 27 03 | 24 75 2b 95 c4 3a 3e 58 00 00 00 1c 00 00 40 05 | ec 66 fb 7f d2 86 12 b1 2b 4e 47 12 62 c8 23 32 | 13 d6 12 8d | libevent_free: release ptr-libevent@0x7fb370046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad4340 | #362 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 e0 7b db bf e0 df 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #362 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #362 | rejected packet: | 79 e0 7b db bf e0 df 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #362: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac1340 | handling event EVENT_RETRANSMIT for parent state #356 | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #356 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #356 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49674.029679; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001714 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad4340 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #356 | libevent_malloc: new ptr-libevent@0x7fb370046040 size 128 "road-eastnet-nonat-104" #356: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #356) | ac bc fb 64 b8 05 f9 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 3b ae 20 ec 7a cd 21 f9 ff e0 06 71 c2 e5 55 | 9b 45 49 5f 50 f5 30 9c 0b 3e 8a a2 28 f4 85 c7 | 4f 6f 8c f6 77 7f 00 15 6e 19 1d d1 e0 68 66 87 | 4e df 9c 72 ac b2 8d ab fe f6 05 78 0d c2 c2 f2 | 31 63 92 17 54 19 b6 cf fd 16 6a d8 32 67 48 40 | 84 9f 47 99 c0 29 49 ad 8d 18 53 a5 6f ce c9 03 | 2a bd 3e e5 4f fd 0e 59 73 26 a7 73 de 18 dc 8d | 09 79 73 ae 09 17 25 e9 44 ce 32 60 cd df 52 37 | 66 e2 fc 8e a8 ff 6f bc 73 d9 a9 e6 7e 34 29 30 | c0 25 f8 37 35 6d fc d1 5a 42 45 e2 29 19 ad 5e | b1 89 0e dc 25 33 50 a2 38 82 4f ae e6 4f c3 97 | 55 76 c2 67 8a 3e ac 3d 84 f3 32 ca 54 cc 1c 9f | 23 91 a9 44 f4 93 a5 2a aa cc ed 04 01 4e eb f5 | 00 ac f3 c1 d5 2f 9a 43 89 cf f2 f2 55 7d 1d 3b | d4 57 90 a2 11 f9 23 83 ee a6 72 aa 3b 95 a5 9a | f2 6e 4c 51 df 03 55 77 ff 21 15 db 98 87 cc e3 | 29 00 00 24 80 41 9d 85 d0 e1 49 10 c1 0f c3 d9 | f1 36 ea c7 60 65 b3 e5 0e 51 88 57 20 76 d9 47 | 30 46 2c b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 1f 59 ee ab 85 d8 d4 4a d4 96 c0 | ee 5f a4 59 2f 4a 72 17 00 00 00 1c 00 00 40 05 | 04 5f 5b a5 b0 c4 89 9e 39 c9 c6 97 69 9e e5 9e | 19 14 82 3e | libevent_free: release ptr-libevent@0x7fb35c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac1340 | #356 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac bc fb 64 b8 05 f9 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #356 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #356 | rejected packet: | ac bc fb 64 b8 05 f9 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #356: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a77850 | handling event EVENT_RETRANSMIT for parent state #345 | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #345 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #345 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49674.031002; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004153 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac1340 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #345 | libevent_malloc: new ptr-libevent@0x7fb35c035930 size 128 "road-eastnet-nonat-93" #345: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #345) | cc 1b db ff 37 55 f7 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 67 e9 25 ad 99 4c 76 71 a1 a8 5d 6b de 51 32 | eb 5c 8d 84 1c 3d 17 6c c1 5f 62 71 5b 44 16 fb | e4 d2 85 4c 64 49 cc e5 df 14 a2 74 3d 7a c6 c8 | 61 7c 32 bd 88 6d 99 62 9c 43 b2 d1 2b 52 46 39 | c0 c1 fe 0b d3 8c b7 41 43 fa 07 e4 ca 66 08 b9 | e3 73 79 86 ee fe 88 31 4e 3f 00 50 43 af ba 2c | 0f 81 55 13 ff ba 58 17 5f 8e c8 12 2b 5c fa c6 | ef 92 c1 91 f7 d8 64 09 28 37 f9 29 29 da 06 11 | 98 a0 90 28 27 02 35 70 61 dc cd b3 af 6b a5 cc | 33 40 2b 71 fe b4 6e 27 bc 87 0b 2e 49 cd 22 6a | fe 62 e7 dd 24 a7 1f 41 fb 60 e1 86 0c 80 50 0b | a0 a0 c9 f7 8f 75 a4 e1 64 72 0c 28 9b b9 6c ed | 86 a3 26 05 ab b4 ae 03 ec cc ce 40 59 4c 63 89 | f5 0c b7 8c 77 de 51 59 14 48 7e 85 50 2b 34 5c | b7 79 6c 71 db 1b 6c 37 06 89 c8 05 98 a4 3e 07 | 39 20 3f 60 a2 a7 3c 0b 2f 8f 18 e7 35 c0 2b f1 | 29 00 00 24 20 33 be 81 19 1f 5e fe 6d 68 36 2c | 95 1b cf 17 03 6e cb aa fd 3d 3c 1f 01 7c 3e 25 | c7 e0 c9 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 24 83 28 6d 9e 08 a8 13 dd 36 c1 | 4e 58 4a c0 e0 a3 35 28 00 00 00 1c 00 00 40 05 | 65 c0 95 0a 9d 33 80 de 00 4a d8 7a 37 18 f6 5b | 66 48 2b 46 | libevent_free: release ptr-libevent@0x7fb34801fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a77850 | #345 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 1b db ff 37 55 f7 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #345 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #345 | rejected packet: | cc 1b db ff 37 55 f7 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #345: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ecc0 | handling event EVENT_RETRANSMIT for parent state #118 | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #118 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #118 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49674.032271; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008526 exceeds limit? YES "road-eastnet-nonat-118" #118: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-118" #118: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #370 at 0x557d46a74190 | State DB: adding IKEv2 state #370 in UNDEFINED | pstats #370 ikev2.ike started | Message ID: init #370: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #370: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #370; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-118" #370: initiating v2 parent SA to replace #118 | using existing local IKE proposals for connection road-eastnet-nonat-118 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 370 for state #370 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a77850 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #370 | libevent_malloc: new ptr-libevent@0x7fb34801fd50 size 128 | #370 spent 0.0683 milliseconds in ikev2_parent_outI1() | RESET processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 resuming | start processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #118 ikev2.ike failed too-many-retransmits | pstats #118 ikev2.ike deleted too-many-retransmits | crypto helper 11 starting work-order 370 for state #370 | #118 spent 2.31 milliseconds in total | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 370 | [RE]START processing: state #118 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-118" #118: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #118: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #118 "road-eastnet-nonat-118" #118: deleting IKE SA for connection 'road-eastnet-nonat-118' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-118' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-118 | State DB: deleting IKEv2 state #118 in PARENT_I1 | parent state #118: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #118 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb37c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ecc0 | in statetime_stop() and could not find #118 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 370 time elapsed 0.000983 seconds | processing global timer EVENT_REVIVE_CONNS | (#370) spent 0.993 milliseconds in crypto helper computing work-order 370: ikev2_outI1 KE (pcr) Initiating connection road-eastnet-nonat-118 which received a Delete/Notify but must remain up per local policy | crypto helper 11 sending results from work-order 370 for state #370 to event queue | FOR_EACH_CONNECTION_... in conn_by_name | scheduling resume sending helper answer for #370 | libevent_malloc: new ptr-libevent@0x7fb3600251c0 size 128 | crypto helper 11 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-118" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-118' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-118" | stop processing: connection "road-eastnet-nonat-118" (in initiate_a_connection() at initiate.c:349) | spent 0.0698 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #370 | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 370 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #370 | **emit ISAKMP Message: | initiator cookie: | 4a 80 23 ad fc 41 99 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-118 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 79 13 bc 42 a7 35 39 b2 99 5a ec 69 08 73 18 3f | ikev2 g^x fe 31 dc bf 22 23 10 df 50 13 8d 04 9e ea 66 93 | ikev2 g^x 98 fa 79 7f 64 34 1f da 27 d5 8f dc 20 be 18 56 | ikev2 g^x 17 0e c5 53 3e a4 18 ed 82 41 0e 7f 91 9c e6 cb | ikev2 g^x ef 35 45 6e 59 c7 b5 4d 35 32 d9 63 30 b7 dd 5d | ikev2 g^x 28 28 04 d3 d6 a5 84 6f 4c f3 94 90 75 da df 42 | ikev2 g^x 5a 65 b6 2e cd 5e 42 3b 71 3e 46 f7 4b 13 d1 aa | ikev2 g^x a5 9c 11 b7 2c 83 34 92 e3 55 46 0b 4b 42 12 08 | ikev2 g^x 06 02 c9 42 46 42 d0 f1 82 14 36 15 1e 2e d4 a0 | ikev2 g^x 23 35 a8 d9 5e c2 f8 ca da 81 45 00 34 f6 88 47 | ikev2 g^x 2f 60 cc ac c2 4b 39 55 8a 1b 8f 66 b3 43 72 fd | ikev2 g^x 59 52 11 ef 5c 2c 9e b7 b7 6a c6 60 eb 22 9a 4d | ikev2 g^x e9 c0 4b de 56 c3 d3 e4 19 f0 86 9f a5 38 ef 26 | ikev2 g^x 39 fb ac 6e b8 32 45 c4 d1 f5 cc bb b2 2f 7b 0b | ikev2 g^x 6b 6b b1 6f 27 b1 bb 88 e7 c4 d6 31 26 e0 94 2a | ikev2 g^x ae 90 aa 75 e5 cb 3e 1f 43 13 d3 7b 3c ed 1e b0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a0 6f 08 ca 5f 92 e1 a2 10 08 5a 34 7d b6 05 db | IKEv2 nonce 65 e8 3d 88 a0 b3 7d 19 ed 75 36 c4 95 ec 9c 26 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4a 80 23 ad fc 41 99 e5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 76 | natd_hash: port= 01 f4 | natd_hash: hash= 74 38 cd 57 b0 33 db 6c e3 f5 95 3e 28 5e 17 44 | natd_hash: hash= 43 d3 05 33 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 74 38 cd 57 b0 33 db 6c e3 f5 95 3e 28 5e 17 44 | Notify data 43 d3 05 33 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4a 80 23 ad fc 41 99 e5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6f b1 ce a1 45 d5 bc 6f 48 f8 db 92 31 a1 28 9a | natd_hash: hash= ba c8 a7 2b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6f b1 ce a1 45 d5 bc 6f 48 f8 db 92 31 a1 28 9a | Notify data ba c8 a7 2b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #370 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #370: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #370 to 4294967295 after switching state | Message ID: IKE #370 skipping update_recv as MD is fake | Message ID: sent #370 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-118" #370: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.118:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #370) | 4a 80 23 ad fc 41 99 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 13 bc 42 a7 35 39 b2 99 5a ec 69 08 73 18 3f | fe 31 dc bf 22 23 10 df 50 13 8d 04 9e ea 66 93 | 98 fa 79 7f 64 34 1f da 27 d5 8f dc 20 be 18 56 | 17 0e c5 53 3e a4 18 ed 82 41 0e 7f 91 9c e6 cb | ef 35 45 6e 59 c7 b5 4d 35 32 d9 63 30 b7 dd 5d | 28 28 04 d3 d6 a5 84 6f 4c f3 94 90 75 da df 42 | 5a 65 b6 2e cd 5e 42 3b 71 3e 46 f7 4b 13 d1 aa | a5 9c 11 b7 2c 83 34 92 e3 55 46 0b 4b 42 12 08 | 06 02 c9 42 46 42 d0 f1 82 14 36 15 1e 2e d4 a0 | 23 35 a8 d9 5e c2 f8 ca da 81 45 00 34 f6 88 47 | 2f 60 cc ac c2 4b 39 55 8a 1b 8f 66 b3 43 72 fd | 59 52 11 ef 5c 2c 9e b7 b7 6a c6 60 eb 22 9a 4d | e9 c0 4b de 56 c3 d3 e4 19 f0 86 9f a5 38 ef 26 | 39 fb ac 6e b8 32 45 c4 d1 f5 cc bb b2 2f 7b 0b | 6b 6b b1 6f 27 b1 bb 88 e7 c4 d6 31 26 e0 94 2a | ae 90 aa 75 e5 cb 3e 1f 43 13 d3 7b 3c ed 1e b0 | 29 00 00 24 a0 6f 08 ca 5f 92 e1 a2 10 08 5a 34 | 7d b6 05 db 65 e8 3d 88 a0 b3 7d 19 ed 75 36 c4 | 95 ec 9c 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 38 cd 57 b0 33 db 6c e3 f5 95 3e | 28 5e 17 44 43 d3 05 33 00 00 00 1c 00 00 40 05 | 6f b1 ce a1 45 d5 bc 6f 48 f8 db 92 31 a1 28 9a | ba c8 a7 2b | state #370 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34801fd50 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a77850 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ecc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #370 | libevent_malloc: new ptr-libevent@0x7fb37c0300e0 size 128 | #370 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49674.033799 | resume sending helper answer for #370 suppresed complete_v2_state_transition() and stole MD | #370 spent 0.32 milliseconds in resume sending helper answer | stop processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3600251c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 80 23 ad fc 41 99 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #370 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #370 | rejected packet: | 4a 80 23 ad fc 41 99 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 76 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #370: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368018460 | handling event EVENT_RETRANSMIT for parent state #317 | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #317 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #317 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49674.053976; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004091 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #317 | libevent_malloc: new ptr-libevent@0x7fb3600251c0 size 128 "road-eastnet-nonat-65" #317: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #317) | 5c a2 6c e8 b2 28 e0 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 95 b1 4b f7 b4 a2 f3 b1 63 69 55 e2 98 fb 3f | 54 1a 28 48 de 85 37 f8 72 76 27 96 2b db 5e 33 | be af 42 49 c9 29 81 c9 57 56 f4 f8 82 3d a6 af | 88 eb 0d 9f f2 82 74 6e 72 69 04 07 19 3d d2 37 | 11 a5 22 ff d2 62 d9 98 57 a1 83 a7 1e 49 51 44 | e5 97 9b 8d 73 a0 96 d3 53 9b fb 45 84 94 f7 3d | 76 31 fc 24 62 7d a9 38 2a be 46 8d 20 60 df db | 07 4b 68 3b f4 5c 0f 39 ef 4f 67 78 1a 41 5e d9 | 21 46 6b 9d 25 f7 b9 97 47 6b 61 67 28 72 bc ab | 6f b2 d8 94 3c 23 68 03 63 f9 fd 48 53 49 f9 59 | 58 72 d8 2c 34 ca e6 db de 5e 25 73 b8 b7 64 58 | c2 d1 ad 6f 0e ca 13 2e b2 5c 80 d7 ba 3d 3c a9 | 3d f9 8e 60 bf 1b 92 40 5e 5c 05 7e ba c9 a8 db | 73 77 de d1 63 54 7f e1 7b 4e 7b ea 38 36 f5 df | ad 83 e3 b0 ba 8d 91 72 ad 79 42 21 5b 3d 90 52 | 8f 94 65 66 3d 81 71 1c 3b 5e 4d 22 19 2e a8 97 | 29 00 00 24 16 ec e2 f4 0d c3 b4 c6 88 17 fa c1 | 57 1b 6f 8e 72 cf d0 88 9c 45 18 d1 76 a6 22 b7 | e9 88 2c 7a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 7d b4 14 23 b3 6a c1 75 92 cb 9c | f1 ae 10 a4 55 81 67 0f 00 00 00 1c 00 00 40 05 | d3 a6 c6 52 7d d4 a1 eb 3d cd 3f 6c 65 3f cc dd | 6f e3 2d 43 | libevent_free: release ptr-libevent@0x7fb37c01fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368018460 | #317 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c a2 6c e8 b2 28 e0 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #317 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #317 | rejected packet: | 5c a2 6c e8 b2 28 e0 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #317: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #363 | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #363 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #363 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49674.08831; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499907 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #363 | libevent_malloc: new ptr-libevent@0x7fb37c01fd50 size 128 "road-eastnet-nonat-111" #363: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #363) | 51 61 7f 08 48 15 06 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 a4 74 58 c5 f7 d1 13 97 f0 a1 32 ec ba 3b 12 | 2a d1 a7 2b 3c 6a 89 b1 af 9f ef 60 99 3f 2b 97 | 5a 99 67 3e 04 49 9e e1 18 dd 5b 9a 36 f4 31 c2 | 53 fb e0 15 b1 f1 17 18 c0 6a ef 59 2d 9b 43 90 | f2 8c 3e 64 6c 64 9b 41 4d c8 83 ed 81 03 01 ef | 94 98 ac cb 77 3f 19 e2 3d 9a 98 04 76 6b 13 b3 | cd 7b 90 ce b0 33 d0 e1 b7 52 ee 6b 51 23 7a ea | a8 cb 6b 19 dd 2c 75 92 bf 4f 96 8d 61 90 60 ba | ac 55 20 f8 f6 10 ca 5a 43 53 71 3b 48 a8 5f 63 | 88 26 59 cb be 95 f5 90 58 5a 07 1f 8c 1f 49 2e | ab c9 b4 33 89 02 d4 f8 ad 34 05 81 7c 83 7c ee | b9 f5 ea 3c 82 86 1f 8e fd dd f8 79 c6 1d d2 66 | eb 43 cd 6b f4 5d 2f 21 06 e6 55 35 36 2a fc 16 | 28 b4 a8 e2 ec 6d b6 b7 1a 42 16 71 43 4d 93 a5 | b9 be 7c 8b c2 15 e3 5b 72 eb 03 26 dc 93 d9 17 | b6 f6 7f 82 7f 35 e0 76 a8 41 7c 2a 12 6a fc 61 | 29 00 00 24 05 ae 65 e3 84 b1 1a 26 06 06 7b dc | a8 83 38 36 54 1a c8 5b 72 97 b6 83 dc f9 79 7c | dc 6e a1 e8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 05 ad f7 99 b0 88 ad 41 82 57 31 | e5 ff 67 18 3e 77 ff e2 00 00 00 1c 00 00 40 05 | a3 ac d5 a3 ef 34 92 9f a8 df c6 0f 83 0b 12 93 | d2 32 5e d3 | libevent_free: release ptr-libevent@0x7fb35c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #363 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 61 7f 08 48 15 06 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #363 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #363 | rejected packet: | 51 61 7f 08 48 15 06 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #363: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_RETRANSMIT for parent state #119 | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #119 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #119 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49674.092649; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008322 exceeds limit? YES "road-eastnet-nonat-119" #119: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-119" #119: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #371 at 0x557d46a75750 | State DB: adding IKEv2 state #371 in UNDEFINED | pstats #371 ikev2.ike started | Message ID: init #371: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #371: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #371; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-119" #371: initiating v2 parent SA to replace #119 | using existing local IKE proposals for connection road-eastnet-nonat-119 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 371 for state #371 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #371 | libevent_malloc: new ptr-libevent@0x7fb35c009640 size 128 | #371 spent 0.0718 milliseconds in ikev2_parent_outI1() | RESET processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 resuming | start processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #119 ikev2.ike failed too-many-retransmits | pstats #119 ikev2.ike deleted too-many-retransmits | crypto helper 16 starting work-order 371 for state #371 | #119 spent 2.44 milliseconds in total | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 371 | [RE]START processing: state #119 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-119" #119: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #119: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #119 "road-eastnet-nonat-119" #119: deleting IKE SA for connection 'road-eastnet-nonat-119' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-119' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-119 | State DB: deleting IKEv2 state #119 in PARENT_I1 | parent state #119: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #119 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | in statetime_stop() and could not find #119 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 371 time elapsed 0.000986 seconds | (#371) spent 0.989 milliseconds in crypto helper computing work-order 371: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 371 for state #371 to event queue | scheduling resume sending helper answer for #371 | libevent_malloc: new ptr-libevent@0x7fb364023a90 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 16 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-119 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-119" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-119' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-119" | stop processing: connection "road-eastnet-nonat-119" (in initiate_a_connection() at initiate.c:349) | spent 0.0599 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #371 | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 371 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #371 | **emit ISAKMP Message: | initiator cookie: | ea d3 d9 fc 5b 7e b4 e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-119 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d1 af 47 0e 69 de 58 3a 2d 1e 57 76 30 bc 22 a4 | ikev2 g^x 2e b6 88 1e b3 88 e7 a1 c8 be 2b 4e 69 e2 28 01 | ikev2 g^x d0 52 c1 fa 78 94 10 52 aa 87 89 5a 02 a4 2d d1 | ikev2 g^x 6b d9 9b 86 d2 da a0 98 26 8e b9 2f 8a a2 27 af | ikev2 g^x de 72 28 ad 98 97 b6 15 90 9c ae 3a 16 ae 38 00 | ikev2 g^x 2e 00 fb 22 bb 46 e6 d4 1f 46 0d dd a1 55 00 4a | ikev2 g^x ce 15 02 1f 97 d1 0a 8b 6a 9c c8 a8 24 2f 84 76 | ikev2 g^x 4b d2 ac 8c 05 c7 63 26 60 5d b2 3c e7 66 a9 5d | ikev2 g^x bd fb b9 24 84 be 9f 9f d0 98 db 75 76 42 5a 2c | ikev2 g^x 99 3f 96 7c cd 86 57 c4 8b f7 47 04 8d 56 1e 36 | ikev2 g^x 87 53 98 86 58 32 c9 ce 17 26 19 6b 99 a4 da aa | ikev2 g^x cb 3c 40 8e 29 32 f1 cd b7 5a 34 1f de 2b 31 8c | ikev2 g^x 0d 44 f0 ee 94 1a 31 39 88 2c 28 df 02 20 48 5d | ikev2 g^x 9d 67 4b c6 5a 1a 30 81 19 09 4e 1b ac 9d a3 80 | ikev2 g^x 78 a7 b1 0a 79 f2 60 13 6a a0 1a 0d 01 b3 b3 40 | ikev2 g^x 74 bb ba 1f 20 2b 3c 36 9e 56 74 1c ba 16 9e 5f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c2 25 48 18 a9 32 86 16 98 b5 8a 9d 56 ab 3c 59 | IKEv2 nonce 82 6e f2 93 a8 6a ca 20 09 df d9 6f aa 1d 6f e0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ea d3 d9 fc 5b 7e b4 e6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 77 | natd_hash: port= 01 f4 | natd_hash: hash= 13 eb 88 f4 ae c4 a3 7b f7 07 ac 42 0d c0 83 df | natd_hash: hash= c2 98 39 e6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 13 eb 88 f4 ae c4 a3 7b f7 07 ac 42 0d c0 83 df | Notify data c2 98 39 e6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ea d3 d9 fc 5b 7e b4 e6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 0c 73 7d f6 90 2f 67 26 fc 28 2f df 9c 80 3e da | natd_hash: hash= bc 60 3a 9d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0c 73 7d f6 90 2f 67 26 fc 28 2f df 9c 80 3e da | Notify data bc 60 3a 9d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #371 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #371: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #371 to 4294967295 after switching state | Message ID: IKE #371 skipping update_recv as MD is fake | Message ID: sent #371 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-119" #371: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.119:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #371) | ea d3 d9 fc 5b 7e b4 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 af 47 0e 69 de 58 3a 2d 1e 57 76 30 bc 22 a4 | 2e b6 88 1e b3 88 e7 a1 c8 be 2b 4e 69 e2 28 01 | d0 52 c1 fa 78 94 10 52 aa 87 89 5a 02 a4 2d d1 | 6b d9 9b 86 d2 da a0 98 26 8e b9 2f 8a a2 27 af | de 72 28 ad 98 97 b6 15 90 9c ae 3a 16 ae 38 00 | 2e 00 fb 22 bb 46 e6 d4 1f 46 0d dd a1 55 00 4a | ce 15 02 1f 97 d1 0a 8b 6a 9c c8 a8 24 2f 84 76 | 4b d2 ac 8c 05 c7 63 26 60 5d b2 3c e7 66 a9 5d | bd fb b9 24 84 be 9f 9f d0 98 db 75 76 42 5a 2c | 99 3f 96 7c cd 86 57 c4 8b f7 47 04 8d 56 1e 36 | 87 53 98 86 58 32 c9 ce 17 26 19 6b 99 a4 da aa | cb 3c 40 8e 29 32 f1 cd b7 5a 34 1f de 2b 31 8c | 0d 44 f0 ee 94 1a 31 39 88 2c 28 df 02 20 48 5d | 9d 67 4b c6 5a 1a 30 81 19 09 4e 1b ac 9d a3 80 | 78 a7 b1 0a 79 f2 60 13 6a a0 1a 0d 01 b3 b3 40 | 74 bb ba 1f 20 2b 3c 36 9e 56 74 1c ba 16 9e 5f | 29 00 00 24 c2 25 48 18 a9 32 86 16 98 b5 8a 9d | 56 ab 3c 59 82 6e f2 93 a8 6a ca 20 09 df d9 6f | aa 1d 6f e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 eb 88 f4 ae c4 a3 7b f7 07 ac 42 | 0d c0 83 df c2 98 39 e6 00 00 00 1c 00 00 40 05 | 0c 73 7d f6 90 2f 67 26 fc 28 2f df 9c 80 3e da | bc 60 3a 9d | state #371 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #371 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 | #371 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49674.094194 | resume sending helper answer for #371 suppresed complete_v2_state_transition() and stole MD | #371 spent 0.324 milliseconds in resume sending helper answer | stop processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb364023a90 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea d3 d9 fc 5b 7e b4 e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #371 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #371 | rejected packet: | ea d3 d9 fc 5b 7e b4 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 77 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #371: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0412 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b07dc0 | handling event EVENT_RETRANSMIT for parent state #357 | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #357 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #357 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49674.10137; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001767 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #357 | libevent_malloc: new ptr-libevent@0x7fb364023a90 size 128 "road-eastnet-nonat-105" #357: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #357) | 01 73 53 b2 ed 0d 4f 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 5d e8 51 f8 88 2e 8f 82 b3 f0 c5 8d a9 64 a4 | a0 30 bf b5 c2 12 6f 84 86 c4 e5 7c 43 ef 90 df | 5d 9c 5c c9 94 45 36 f4 9a c7 87 0d ff 17 4f a4 | bd 30 02 23 c4 49 d7 cd 90 90 63 b2 f0 74 82 ef | 7b ab 5b 1a 9b 56 e3 fd 6b c1 60 57 a4 3d 47 37 | cf 84 69 51 e7 0c 33 60 a6 88 c6 d3 40 f2 c0 67 | 8b b5 93 bc 89 96 e7 49 3d 16 a4 fa 47 99 08 bb | bf 76 ad cc b2 29 51 14 b3 93 c1 93 70 ab fa 85 | 9c 87 13 3b 74 20 3c a9 9f e8 37 97 e1 cf 3a 19 | 47 ba 4f bf 93 41 7a fe 94 33 ee 81 fb be 0f 8d | 00 a6 62 b8 8f 57 b3 51 57 ec 11 f0 29 c2 98 0d | c4 d2 cf 4a 38 f9 e9 bb 93 44 3a af 7c 9c 77 58 | 65 26 12 0d 96 b7 42 97 54 c0 ec f8 c4 63 9f c0 | 21 fc 89 98 11 d0 25 94 6e 52 89 6d 61 9b 1b e0 | 4a d8 54 ed 06 da f5 4b d3 dd 7c 2c 10 b9 6d 1c | a3 ef f1 ff a5 e4 02 74 f7 b0 97 d7 72 10 8b a3 | 29 00 00 24 2c c1 df 10 e0 1b 6c 08 e6 87 0f da | 7b 1d fc 5a dc 06 9f d4 9a 8b 4f 0e 09 60 b7 78 | 83 2e 36 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be 3a 2f 62 a9 83 16 c4 9b 57 fc 3c | bc 9e d0 29 41 57 58 a4 00 00 00 1c 00 00 40 05 | 08 0b c8 d5 d5 c0 e6 e6 c4 8a f3 fb 5c 3f c5 0a | 4e c8 f0 d0 | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b07dc0 | #357 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 73 53 b2 ed 0d 4f 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #357 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #357 | rejected packet: | 01 73 53 b2 ed 0d 4f 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #357: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24680 | handling event EVENT_RETRANSMIT for parent state #318 | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #318 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #318 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49674.111703; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00389 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #318 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 "road-eastnet-nonat-66" #318: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #318) | b2 9a b8 bc 53 a3 28 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 a5 e6 b7 f3 09 b3 42 4d 70 2a 31 41 4a a2 a1 | da f8 c5 36 7a f2 dc 2d e7 30 c8 c3 07 0a c2 47 | 04 c4 b8 ae 57 b2 7f d1 c1 3e 18 53 e1 5d 14 23 | 04 61 06 e4 91 ef 35 cb ed 7a b9 57 a4 d9 68 76 | fa fd da 0f 58 44 d0 fa 3e 4e 2b ac ca 5d a5 c8 | 76 05 a5 5d 02 6a 96 c6 41 4e 3f 64 57 cd 41 d5 | d0 97 ad ff 58 6a 53 9a 01 1f 6b 3c 24 fe 31 ac | 0d 3c 93 ac 2c da 29 01 1d c2 dd be c2 11 80 ff | b5 b8 9d 4b 81 9c 72 55 6a 84 69 3f d0 ed e9 0c | 2b e3 ca 41 a3 62 7c a2 71 2a 37 58 65 17 c1 53 | cd 34 43 97 e4 05 81 70 70 41 b7 fe ed 43 15 27 | b6 ca b7 9c 9b 05 11 e5 9d 9d 78 a9 d5 63 3e b9 | 63 ef dc 73 f8 b5 32 8d f5 20 3c b0 29 8a 0d 0c | 3e 9f 40 29 07 45 7e 5f 6e e1 39 0d cb 64 2d c9 | 21 f3 18 88 11 a7 78 9d e5 c3 5e 82 9b 66 98 d0 | bb 21 5b 84 f3 89 c9 aa 9f 01 2e d6 67 59 8b 4c | 29 00 00 24 ef 94 98 d7 0c cd d4 f9 7f 97 bf da | 65 7b fd be ba 01 e1 85 cc 2b 5d 20 cf d0 d6 ef | 60 90 51 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 61 27 ec f1 41 a3 45 56 13 d5 ea | 91 6f ea fa 23 e5 f5 e5 00 00 00 1c 00 00 40 05 | d1 cc 61 18 e0 64 68 30 f0 cc 90 9d 95 49 27 67 | 23 d5 d1 7a | libevent_free: release ptr-libevent@0x7fb36804b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24680 | #318 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 9a b8 bc 53 a3 28 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #318 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #318 | rejected packet: | b2 9a b8 bc 53 a3 28 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #318: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0583 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370012bf0 | handling event EVENT_RETRANSMIT for parent state #268 | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #268 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #268 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49674.124046; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003767 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24680 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #268 | libevent_malloc: new ptr-libevent@0x7fb36804b7c0 size 128 "road-eastnet-nonat-16" #268: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #268) | 52 eb eb 01 2e 07 ee 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f4 ef 40 5e f5 2a 5e 5a b8 76 94 37 37 12 d2 32 | 87 80 98 31 81 5e ec c8 c0 10 ea 13 f1 32 fd 22 | 5f da f7 72 2a 67 06 fa cf 7f d5 1a c1 ae f1 92 | 7b 53 ad 16 00 b6 90 61 58 94 dd 7e 4a 9f 32 98 | a2 2e 9b 12 92 70 47 ac 39 ac 02 84 c9 35 b9 57 | 66 95 1c 62 b4 f0 47 38 3f ec 43 4d cf 73 e8 45 | 9f d1 15 db ca 5d 1c f1 70 f1 97 a1 2b 7d 26 5e | 27 c8 08 1e 0d d7 2a 7e 36 db 89 18 87 f0 43 11 | e3 cf c8 31 7d 0e ae 6a 97 23 05 40 5d 11 ea 66 | a1 79 e8 97 cf 5c 5b 3a eb e7 1e c8 25 eb 2f 83 | 00 66 8b 3e 05 72 c5 6e 34 08 88 16 97 1a 13 a9 | db 9b 7b 48 0f 92 cf 65 2a 3e cf 88 08 c6 cf 54 | d9 1b 5a 78 a6 05 e8 73 bf 3a d4 a6 65 47 24 50 | 20 0c 6c 69 e0 29 4a aa 5a 89 69 c7 3c 4d 82 76 | 81 c9 87 1d 60 f0 a9 b6 29 2b 06 98 6d a9 24 c8 | 1d 5c 2b 40 de 5d 36 a1 45 5d 5e 8a 48 e6 0b 26 | 29 00 00 24 f0 fa c9 ee f6 f5 97 a2 44 c5 ea 10 | 5b 58 db 61 17 58 ca 3c df 15 b8 1a de 90 ef 49 | 16 34 e4 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 2c 2a b2 6d be c9 76 69 fe e4 41 | f1 72 73 59 2e 97 3f f1 00 00 00 1c 00 00 40 05 | 31 f5 db e1 45 48 68 14 42 b0 53 d9 a4 6c d5 a0 | 03 9b fe 80 | libevent_free: release ptr-libevent@0x7fb35c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370012bf0 | #268 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 eb eb 01 2e 07 ee 4b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #268 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #268 | rejected packet: | 52 eb eb 01 2e 07 ee 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #268: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a94500 | handling event EVENT_RETRANSMIT for parent state #346 | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #346 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #346 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49674.13732; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002094 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #346 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 "road-eastnet-nonat-94" #346: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #346) | 5b 73 99 01 85 6b a6 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 41 a4 66 03 78 2f 0c ac 28 0c 6f a0 f5 98 a8 | ad fe 06 fd 8c a4 d4 c6 03 17 f9 3c ee f7 59 ef | a4 19 f6 d6 98 a9 45 18 c4 fa 1a 04 5e 12 ad 25 | a2 eb 73 ff 50 f7 5b d9 ac 0d a3 60 63 86 dc 11 | 24 c2 5c cb 2a 8c 8f dd 11 7a 54 9c db e5 07 72 | 1d 04 b8 06 80 b0 2c 7d 70 61 0f 2e ec 51 90 ed | 50 75 e9 44 ba 97 aa c3 93 f0 e7 8e a0 59 5a ef | f5 79 47 07 02 c6 5c 62 a1 be 60 af ef 55 0d f9 | 00 ac 18 13 2d 62 0e 5a 5f 40 32 8a 49 30 5f 84 | 37 da 16 c6 63 1e a6 4e a5 65 94 59 c6 7a b2 c5 | 75 c7 8f 68 de d4 77 8e 92 40 c9 5c ee b4 80 ea | 42 78 86 4f 14 c5 47 55 13 d1 41 8b fd ef 2c 61 | b8 ff 39 92 97 ea a2 69 91 9d 1f f6 fd bd a6 d6 | 98 cc 57 23 b2 ed be c2 71 55 a4 d5 18 54 fe df | 4d ab de e9 5b 44 57 81 1d 33 6c d4 fe 06 43 32 | b0 07 7c ba 8d 9c bd 13 85 9c b0 70 80 5b 02 74 | 29 00 00 24 86 39 a6 9d e4 88 31 1e 1a 48 0c df | 5d 51 c2 7f eb 35 e1 75 45 71 5e 9b 45 ec 98 56 | 3e 47 8a 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 d4 6c 5c e3 02 f1 ae 0d a6 ae 25 | 4a 2c de d9 71 00 3f 70 00 00 00 1c 00 00 40 05 | 9a e2 a2 47 57 d0 42 27 78 4a 19 6f 7e 1c 29 7f | 7a 88 26 9b | libevent_free: release ptr-libevent@0x7fb35804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94500 | #346 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5b 73 99 01 85 6b a6 c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #346 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #346 | rejected packet: | 5b 73 99 01 85 6b a6 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #346: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28ab0 | handling event EVENT_RETRANSMIT for parent state #364 | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #364 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #364 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49674.15262; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500628 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94500 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #364 | libevent_malloc: new ptr-libevent@0x7fb35804b850 size 128 "road-eastnet-nonat-112" #364: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #364) | 33 be fb 4e a0 1f 6e f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 2a 42 5d a7 d8 6e 30 43 82 cd c7 8b 99 36 58 | d8 cb c2 34 66 ff 8a 30 2d b5 6a f0 e0 25 f9 40 | 18 b9 ba e3 e0 90 ff f4 cd 9b 1b 34 38 ee bc bc | a0 41 ef 4f 47 94 f5 37 14 2e 5c 6e 0f a6 94 db | 88 81 75 e1 ca 78 c8 9f 91 97 49 cc 62 0b 7c 24 | 05 6f 34 9d ba a1 13 0a 58 7e 2f 7a ad f7 32 fc | 1d 0c 87 25 75 e1 21 b8 48 fb 8f 7c d6 35 a3 1a | ae f0 b3 f0 3b da b9 9b f9 3d d2 6d c0 fe 81 68 | c2 c7 a1 4c 73 5e 1c b4 3a 58 ed b8 29 5f 91 4a | f8 66 00 af 13 4e e2 0d 66 a8 97 6e 0e 81 4f 92 | 8c 69 2c e3 38 08 3d ee 34 5d c4 0d 5d 92 19 a0 | ed a9 9d c5 1f 5c c0 55 9f 77 6e f9 34 95 4c 9a | 1b 67 cf ca 63 f1 13 a2 4f fd 39 a9 a7 28 45 69 | a8 39 46 14 38 17 c4 c7 52 5d 03 e8 bd 24 28 07 | 48 28 79 7d f7 c5 f9 df 10 a1 d2 ba 0c 72 5c 57 | de c7 d6 50 9c eb 46 ad 18 84 34 9f f7 a9 0f 36 | 29 00 00 24 57 1c 59 6e 8c 59 64 04 26 7e c7 7d | 57 3e 20 cd ce 8c 1c 54 8d 44 77 eb 53 6a 1b 23 | 5a 68 d6 45 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 b7 ef ef bc 35 4f 63 6b 7a c6 35 | bb 1f b7 d6 68 94 93 4f 00 00 00 1c 00 00 40 05 | 20 e3 22 42 33 64 b9 da db 7f 44 ff d7 76 e4 71 | c9 1d dc 40 | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28ab0 | #364 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 be fb 4e a0 1f 6e f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #364 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #364 | rejected packet: | 33 be fb 4e a0 1f 6e f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #364: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afd000 | handling event EVENT_RETRANSMIT for parent state #120 | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #120 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #120 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49674.160978; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00954 exceeds limit? YES "road-eastnet-nonat-120" #120: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-120" #120: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #372 at 0x557d46a76d10 | State DB: adding IKEv2 state #372 in UNDEFINED | pstats #372 ikev2.ike started | Message ID: init #372: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #372: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #372; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-120" #372: initiating v2 parent SA to replace #120 | using existing local IKE proposals for connection road-eastnet-nonat-120 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 372 for state #372 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a28ab0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #372 | libevent_malloc: new ptr-libevent@0x7fb38000a240 size 128 | #372 spent 0.0972 milliseconds in ikev2_parent_outI1() | crypto helper 4 resuming | crypto helper 4 starting work-order 372 for state #372 | RESET processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 372 | start processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #120 ikev2.ike failed too-many-retransmits | pstats #120 ikev2.ike deleted too-many-retransmits | #120 spent 2.5 milliseconds in total | [RE]START processing: state #120 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-120" #120: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #120: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #120 "road-eastnet-nonat-120" #120: deleting IKE SA for connection 'road-eastnet-nonat-120' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-120' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-120 | State DB: deleting IKEv2 state #120 in PARENT_I1 | parent state #120: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #120 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 372 time elapsed 0.001011 seconds | libevent_free: release ptr-libevent@0x7fb36c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afd000 | in statetime_stop() and could not find #120 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS | (#372) spent 1.02 milliseconds in crypto helper computing work-order 372: ikev2_outI1 KE (pcr) Initiating connection road-eastnet-nonat-120 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 4 sending results from work-order 372 for state #372 to event queue | scheduling resume sending helper answer for #372 | libevent_malloc: new ptr-libevent@0x7fb358023a50 size 128 | crypto helper 4 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-120" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-120' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-120" | stop processing: connection "road-eastnet-nonat-120" (in initiate_a_connection() at initiate.c:349) | spent 0.0735 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #372 | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 372 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #372 | **emit ISAKMP Message: | initiator cookie: | 36 75 19 e8 2f 22 a4 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-120 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x aa 1c 43 17 d7 b5 ce d2 b8 29 b2 bf 57 09 8b a5 | ikev2 g^x 02 ac c4 b7 76 e6 2d d8 ee ee 3c fe f4 66 f4 89 | ikev2 g^x f0 05 d4 6f 70 58 f2 ac a3 f6 a0 c0 6f e2 88 9c | ikev2 g^x 40 3f 21 b6 b5 e3 53 20 6c d9 59 5c d3 ed 29 31 | ikev2 g^x 70 b1 e2 00 f7 0a fb f6 8a 39 29 d2 58 c2 74 92 | ikev2 g^x 4c 9b 08 3f 44 b8 04 b0 23 1d ad 99 96 41 5c c3 | ikev2 g^x 74 17 1f 67 0a d8 d1 96 a3 e0 b8 c3 31 5e 35 15 | ikev2 g^x b4 7d 07 ac 51 6c 39 25 b1 04 61 4c b1 08 c3 a9 | ikev2 g^x 03 2e 6c 07 f6 12 ea 26 ae ed 42 10 86 bf 00 1f | ikev2 g^x 2c 3f d3 c3 05 31 1b 23 d0 7f 44 40 17 23 be b1 | ikev2 g^x ac f2 d9 5c 2d 0f 0e 8d d6 8e 02 9e c2 0d 39 2a | ikev2 g^x 1e 53 92 9d 45 7f f8 25 a0 3b 40 14 ce aa d7 8e | ikev2 g^x 3c 97 d8 0a 68 34 c5 e0 01 c0 9d 3c df ab b9 db | ikev2 g^x 0f 08 4e 9b 7f 31 ba b0 df 14 c3 2e b6 43 df 9c | ikev2 g^x e8 24 93 e8 93 fa be d8 05 20 58 54 dc 18 b6 a1 | ikev2 g^x 81 c2 54 d8 9d 63 fd 0b 60 e1 78 75 ef 13 d9 ec | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5b 70 e2 22 fb be c5 61 40 e7 92 1f fe 03 7b 3d | IKEv2 nonce 26 2b 9e 50 62 fe 14 ef 7e 0b e5 c1 7b 5b 83 23 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 36 75 19 e8 2f 22 a4 a5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 78 | natd_hash: port= 01 f4 | natd_hash: hash= 6f bb b6 72 03 25 00 b3 08 33 f3 00 3f a7 05 f9 | natd_hash: hash= e6 64 00 bb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6f bb b6 72 03 25 00 b3 08 33 f3 00 3f a7 05 f9 | Notify data e6 64 00 bb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 36 75 19 e8 2f 22 a4 a5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 5c 2b 76 69 54 27 3e cb 36 ec 86 9b 13 f7 89 7b | natd_hash: hash= 0b 66 55 89 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5c 2b 76 69 54 27 3e cb 36 ec 86 9b 13 f7 89 7b | Notify data 0b 66 55 89 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #372 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #372: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #372 to 4294967295 after switching state | Message ID: IKE #372 skipping update_recv as MD is fake | Message ID: sent #372 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-120" #372: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.120:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #372) | 36 75 19 e8 2f 22 a4 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 1c 43 17 d7 b5 ce d2 b8 29 b2 bf 57 09 8b a5 | 02 ac c4 b7 76 e6 2d d8 ee ee 3c fe f4 66 f4 89 | f0 05 d4 6f 70 58 f2 ac a3 f6 a0 c0 6f e2 88 9c | 40 3f 21 b6 b5 e3 53 20 6c d9 59 5c d3 ed 29 31 | 70 b1 e2 00 f7 0a fb f6 8a 39 29 d2 58 c2 74 92 | 4c 9b 08 3f 44 b8 04 b0 23 1d ad 99 96 41 5c c3 | 74 17 1f 67 0a d8 d1 96 a3 e0 b8 c3 31 5e 35 15 | b4 7d 07 ac 51 6c 39 25 b1 04 61 4c b1 08 c3 a9 | 03 2e 6c 07 f6 12 ea 26 ae ed 42 10 86 bf 00 1f | 2c 3f d3 c3 05 31 1b 23 d0 7f 44 40 17 23 be b1 | ac f2 d9 5c 2d 0f 0e 8d d6 8e 02 9e c2 0d 39 2a | 1e 53 92 9d 45 7f f8 25 a0 3b 40 14 ce aa d7 8e | 3c 97 d8 0a 68 34 c5 e0 01 c0 9d 3c df ab b9 db | 0f 08 4e 9b 7f 31 ba b0 df 14 c3 2e b6 43 df 9c | e8 24 93 e8 93 fa be d8 05 20 58 54 dc 18 b6 a1 | 81 c2 54 d8 9d 63 fd 0b 60 e1 78 75 ef 13 d9 ec | 29 00 00 24 5b 70 e2 22 fb be c5 61 40 e7 92 1f | fe 03 7b 3d 26 2b 9e 50 62 fe 14 ef 7e 0b e5 c1 | 7b 5b 83 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6f bb b6 72 03 25 00 b3 08 33 f3 00 | 3f a7 05 f9 e6 64 00 bb 00 00 00 1c 00 00 40 05 | 5c 2b 76 69 54 27 3e cb 36 ec 86 9b 13 f7 89 7b | 0b 66 55 89 | state #372 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38000a240 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a28ab0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28ab0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #372 | libevent_malloc: new ptr-libevent@0x7fb36c0407f0 size 128 | #372 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49674.162746 | resume sending helper answer for #372 suppresed complete_v2_state_transition() and stole MD | #372 spent 0.455 milliseconds in resume sending helper answer | stop processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb358023a50 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 75 19 e8 2f 22 a4 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #372 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #372 | rejected packet: | 36 75 19 e8 2f 22 a4 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 78 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #372: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c018460 | handling event EVENT_RETRANSMIT for parent state #319 | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #319 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #319 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49674.173951; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004473 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358012bf0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #319 | libevent_malloc: new ptr-libevent@0x7fb358023a50 size 128 "road-eastnet-nonat-67" #319: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #319) | 11 2f c2 e2 55 80 ad fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 29 97 2b 00 80 7a b2 ce 19 1b 94 79 57 61 71 | b5 31 67 66 2a f4 c8 dd 15 9f e0 ad 50 a1 3c 77 | 34 62 bd 4c c6 67 73 04 6a 47 e6 12 64 23 d5 1b | 98 65 2d 83 00 df 2d e7 e4 d4 74 c8 bc 36 30 29 | 44 5a 01 b4 02 e1 00 0f 8d ad 81 f9 8e 46 de 85 | 06 c3 07 15 fc b6 b0 15 06 43 f6 0e a8 fd 09 ef | d8 40 6e 21 d5 b3 5d 25 10 a6 87 71 c1 c1 fe d8 | bf 80 48 df 26 2b e7 63 6d 12 1e cf 0b 06 eb b0 | 7e 3e d5 d0 6b 21 8d aa 41 e8 f8 30 37 35 ac fc | 15 96 69 e5 f5 b2 90 e3 4e fe 2d ad 13 5f a0 e8 | 1c c7 69 35 1d b3 4c 80 f6 b9 3c 2d 05 13 72 b5 | 7e a3 0f 53 4b 80 32 e8 c3 5e b7 f7 2e ae 6c 5b | 24 7a c5 8a 0a 7f 55 0a 11 24 c0 ef fe 17 1d 30 | 05 8e ac 66 5c 3e f2 80 08 7e 41 35 dd 7a 17 b5 | ec 43 f0 d8 c9 61 5b 46 04 99 f3 93 60 24 02 4a | 51 18 18 5f 6c cb 3e f9 d1 40 eb 27 ba 67 3b b9 | 29 00 00 24 b8 88 60 8f 24 78 87 d6 7e a3 09 04 | de 05 ae 45 4d b7 3b ca 2f 96 5c 9a fa 13 da 85 | a2 c0 a1 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 04 44 46 25 45 86 78 cb ac b2 11 | 55 71 47 06 ea 13 d1 6f 00 00 00 1c 00 00 40 05 | 2f 9a c9 00 f1 11 a0 f7 d7 69 9d e9 ea e6 fc 70 | 38 db 7b 3a | libevent_free: release ptr-libevent@0x7fb36c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c018460 | #319 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 2f c2 e2 55 80 ad fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #319 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #319 | rejected packet: | 11 2f c2 e2 55 80 ad fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #319: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #358 | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #358 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #358 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49674.186296; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001995 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #358 | libevent_malloc: new ptr-libevent@0x7fb36c04b7c0 size 128 "road-eastnet-nonat-106" #358: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #358) | 9c 16 21 10 e3 b0 2f 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 b0 5e 24 2c 38 69 f7 5e 0a ef 9c cd 0c a9 a2 | e7 60 22 31 02 17 4e 87 ab da 67 2c 74 68 e6 5c | 3c 13 72 b8 82 de 1f 97 f0 91 0b ef 5f 05 b5 88 | 8f 55 10 d6 ed 84 95 00 12 6f 2a 48 1a 79 36 91 | 49 04 49 1e 83 7f 51 0b cd 40 c4 12 1d 28 81 4a | ff 1e be db 2c 06 48 44 01 2b 86 9e 50 88 79 26 | a2 fe 2d b6 28 25 0f 1c 72 e5 7c 02 81 23 76 48 | e4 63 77 54 94 1c a2 42 e7 62 79 1a 9c c2 d3 a5 | 84 2a 02 f0 5d 86 de 0c ac 44 c1 bc a9 db 93 da | ab e8 d1 96 60 b7 1e 28 8e ce cc cb 77 fb 32 3a | af 1c d9 5d 2b 9d 4c bb 37 50 e3 2c 2a bd a4 df | 6f 99 23 0d 27 83 b0 b4 f9 48 a2 69 86 2e 3a c0 | 5d bf ed 94 bb f2 f3 07 e1 00 d8 2f 62 9b ee ec | b5 9a a1 3e ac 61 be 8a ce 7d 14 b6 c3 13 21 43 | 2f 85 9a 2f fd b3 5f a3 b2 e0 9c 9a 19 21 fa dc | c3 c9 17 3d e7 0b 51 07 b0 13 9d cf 7d 38 e5 ef | 29 00 00 24 31 6e a1 8e 9b bf 74 40 01 d9 c6 2f | f4 95 5e 1f af be c9 b5 67 9c 79 1e 7d 41 57 e9 | 2e 59 a1 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 2b df 62 51 b1 0d 46 7a 83 b8 02 | 18 9c 1e 91 3d 80 67 46 00 00 00 1c 00 00 40 05 | 21 2b d2 d4 2f 80 55 47 29 a9 2f db 69 80 68 e4 | e7 d9 41 df | libevent_free: release ptr-libevent@0x7fb370014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #358 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9c 16 21 10 e3 b0 2f 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #358 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #358 | rejected packet: | 9c 16 21 10 e3 b0 2f 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #358: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0683 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cbd0 | handling event EVENT_RETRANSMIT for parent state #365 | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #365 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #365 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49674.222658; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500647 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #365 | libevent_malloc: new ptr-libevent@0x7fb370014c70 size 128 "road-eastnet-nonat-113" #365: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #365) | 85 67 19 58 d7 3c f0 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 c9 07 e2 a7 25 a6 09 ab 7f e9 5d 7e 7f 47 e1 | 9f 44 d1 91 14 4d 9b 8f 5d 22 2a 52 a8 98 ff b2 | 6b 6a b0 36 7f fd 95 da a0 25 8f 6e 16 7f 04 38 | 86 c2 bd 33 bf fc a5 26 c4 b6 f6 70 3e fd c6 4a | 25 c8 b3 a8 9f a8 44 89 83 a1 8c aa b8 af 7f e3 | 16 bb 17 56 79 89 e8 f0 01 49 b8 07 c4 c2 fd 27 | 4f 8e 62 66 4b 11 2b 01 9f f2 8c 2a 44 d1 a6 b0 | 37 65 5b 66 a4 8d e5 2d a7 91 fd e3 72 91 ef 62 | 52 0e c8 e1 f3 04 05 43 a3 3a 3c 61 1b d7 eb bd | 6b 38 06 f9 ff f3 a7 b2 e7 89 6b 9c da 79 fc be | 85 2e 71 9d 7f 61 aa 1d 41 bd c5 f4 78 4a e7 2c | 3d fa 74 f7 ca 33 00 f8 ee a6 a8 8a 16 63 2d 1b | 61 9d fa 4c a8 ca 3a 31 b1 cd 60 8d cb 56 88 b6 | 81 05 15 ed cf 3d b4 c9 19 7e d9 8d 29 23 d3 64 | ec 0b 35 05 39 3b e0 f1 75 19 f5 f3 4f 99 e8 61 | bd bd 06 53 be 50 6f 6a cb bc 2d c6 18 e6 53 b2 | 29 00 00 24 e5 25 b4 c0 9c 12 3e 53 68 a2 43 fb | 88 db 47 7b b4 96 4d ec 31 20 f7 c3 1c a9 eb e1 | 62 8a 8b 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 90 3b 10 25 ca fe 1f 3b 58 67 93 fa | 3d a3 98 00 cc 36 84 a7 00 00 00 1c 00 00 40 05 | 55 c6 52 e3 aa aa 60 c0 64 26 bb 2b 79 4e a4 42 | 73 1e 76 57 | libevent_free: release ptr-libevent@0x7fb3400250b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cbd0 | #365 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 67 19 58 d7 3c f0 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #365 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #365 | rejected packet: | 85 67 19 58 d7 3c f0 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #365: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0739 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd80 | handling event EVENT_RETRANSMIT for parent state #121 | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #121 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #121 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49674.233976; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.015175 exceeds limit? YES "road-eastnet-nonat-121" #121: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-121" #121: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #373 at 0x557d46a782d0 | State DB: adding IKEv2 state #373 in UNDEFINED | pstats #373 ikev2.ike started | Message ID: init #373: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #373: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #373; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-121" #373: initiating v2 parent SA to replace #121 | using existing local IKE proposals for connection road-eastnet-nonat-121 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 373 for state #373 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2cbd0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #373 | libevent_malloc: new ptr-libevent@0x7fb3400250b0 size 128 | #373 spent 0.104 milliseconds in ikev2_parent_outI1() | crypto helper 13 resuming | RESET processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 starting work-order 373 for state #373 | start processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #121 ikev2.ike failed too-many-retransmits | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 373 | pstats #121 ikev2.ike deleted too-many-retransmits | #121 spent 2.3 milliseconds in total | [RE]START processing: state #121 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-121" #121: deleting state (STATE_PARENT_I1) aged 64.017s and NOT sending notification | parent state #121: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #121 "road-eastnet-nonat-121" #121: deleting IKE SA for connection 'road-eastnet-nonat-121' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-121' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-121 | State DB: deleting IKEv2 state #121 in PARENT_I1 | parent state #121: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #121 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 373 time elapsed 0.001006 seconds | (#373) spent 1.01 milliseconds in crypto helper computing work-order 373: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 373 for state #373 to event queue | scheduling resume sending helper answer for #373 | libevent_malloc: new ptr-libevent@0x7fb35c014b40 size 128 | crypto helper 13 waiting (nothing to do) | libevent_free: release ptr-libevent@0x7fb35c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd80 | in statetime_stop() and could not find #121 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-121 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-121" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-121' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-121" | stop processing: connection "road-eastnet-nonat-121" (in initiate_a_connection() at initiate.c:349) | spent 0.0663 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #373 | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 373 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #373 | **emit ISAKMP Message: | initiator cookie: | cc d0 7c e3 2d ba 98 af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-121 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ba c9 ec 57 66 ee 6d 75 ec 00 31 9e bb a2 7b 33 | ikev2 g^x 03 5b e1 5f f9 35 33 83 7e 5f 91 5b a2 92 9a a8 | ikev2 g^x 8d 3b 36 89 d7 60 3c f0 e0 82 e5 11 6e 43 23 b1 | ikev2 g^x df d6 90 8f 04 61 87 4f 48 d6 55 c3 74 01 c3 05 | ikev2 g^x 74 78 5b 86 ae c3 d1 0f 5a c9 e4 c5 26 fd 8f 0b | ikev2 g^x 7a de b0 bf fa 77 b7 99 27 6d 94 68 54 8f 2e b4 | ikev2 g^x 27 fc 46 a6 65 3e f8 0d 42 f0 50 03 21 b0 cd 96 | ikev2 g^x 2d 45 e2 17 2e 0c 5d ab 5d cf b0 76 7e 40 37 71 | ikev2 g^x ec c6 7f c3 8e c1 e3 0c da 69 0c bb 78 ac ef e6 | ikev2 g^x fa da 64 48 00 9c 0f d4 5e 3f fd b4 84 a9 1f 83 | ikev2 g^x f8 16 28 f3 f1 a7 fd f1 9e 6b cf 4b 33 5a 08 dd | ikev2 g^x 8d d5 23 ac 66 10 69 36 aa 87 aa ab ed ab 68 36 | ikev2 g^x 4a 70 e5 64 3a 2f 37 bf 5e 42 b9 8e 12 99 78 f7 | ikev2 g^x 0c 24 39 a4 0c ff 5c 9e b7 31 00 75 be b4 85 09 | ikev2 g^x f6 93 ec eb a2 a7 69 50 c8 7a 9b 97 aa 4c fd 91 | ikev2 g^x 2c 8c 14 31 ec 08 42 84 d3 a9 ed d2 74 47 99 ae | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b4 0d dc 4f 11 5b a4 50 84 d3 92 d3 f6 ef 85 ab | IKEv2 nonce 3e d2 da 12 30 2f 73 8e 10 d5 43 df 1d 88 10 ab | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cc d0 7c e3 2d ba 98 af | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 79 | natd_hash: port= 01 f4 | natd_hash: hash= 18 85 d9 5b 1c 2d 07 c4 07 50 eb 06 15 5f 19 1f | natd_hash: hash= ba 90 46 a0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 18 85 d9 5b 1c 2d 07 c4 07 50 eb 06 15 5f 19 1f | Notify data ba 90 46 a0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cc d0 7c e3 2d ba 98 af | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= bb 4b 15 0f 4a b6 b1 9b ec 46 e5 86 fe 18 d0 b4 | natd_hash: hash= dc 99 60 c7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bb 4b 15 0f 4a b6 b1 9b ec 46 e5 86 fe 18 d0 b4 | Notify data dc 99 60 c7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #373 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #373: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #373 to 4294967295 after switching state | Message ID: IKE #373 skipping update_recv as MD is fake | Message ID: sent #373 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-121" #373: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.121:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #373) | cc d0 7c e3 2d ba 98 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba c9 ec 57 66 ee 6d 75 ec 00 31 9e bb a2 7b 33 | 03 5b e1 5f f9 35 33 83 7e 5f 91 5b a2 92 9a a8 | 8d 3b 36 89 d7 60 3c f0 e0 82 e5 11 6e 43 23 b1 | df d6 90 8f 04 61 87 4f 48 d6 55 c3 74 01 c3 05 | 74 78 5b 86 ae c3 d1 0f 5a c9 e4 c5 26 fd 8f 0b | 7a de b0 bf fa 77 b7 99 27 6d 94 68 54 8f 2e b4 | 27 fc 46 a6 65 3e f8 0d 42 f0 50 03 21 b0 cd 96 | 2d 45 e2 17 2e 0c 5d ab 5d cf b0 76 7e 40 37 71 | ec c6 7f c3 8e c1 e3 0c da 69 0c bb 78 ac ef e6 | fa da 64 48 00 9c 0f d4 5e 3f fd b4 84 a9 1f 83 | f8 16 28 f3 f1 a7 fd f1 9e 6b cf 4b 33 5a 08 dd | 8d d5 23 ac 66 10 69 36 aa 87 aa ab ed ab 68 36 | 4a 70 e5 64 3a 2f 37 bf 5e 42 b9 8e 12 99 78 f7 | 0c 24 39 a4 0c ff 5c 9e b7 31 00 75 be b4 85 09 | f6 93 ec eb a2 a7 69 50 c8 7a 9b 97 aa 4c fd 91 | 2c 8c 14 31 ec 08 42 84 d3 a9 ed d2 74 47 99 ae | 29 00 00 24 b4 0d dc 4f 11 5b a4 50 84 d3 92 d3 | f6 ef 85 ab 3e d2 da 12 30 2f 73 8e 10 d5 43 df | 1d 88 10 ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 85 d9 5b 1c 2d 07 c4 07 50 eb 06 | 15 5f 19 1f ba 90 46 a0 00 00 00 1c 00 00 40 05 | bb 4b 15 0f 4a b6 b1 9b ec 46 e5 86 fe 18 d0 b4 | dc 99 60 c7 | state #373 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3400250b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2cbd0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #373 | libevent_malloc: new ptr-libevent@0x7fb35c02a950 size 128 | #373 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49674.235864 | resume sending helper answer for #373 suppresed complete_v2_state_transition() and stole MD | #373 spent 0.47 milliseconds in resume sending helper answer | stop processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c014b40 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc d0 7c e3 2d ba 98 af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #373 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #373 | rejected packet: | cc d0 7c e3 2d ba 98 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 79 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #373: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0603 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #347 | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #347 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #347 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49674.24407; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003472 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #347 | libevent_malloc: new ptr-libevent@0x7fb35c014b40 size 128 "road-eastnet-nonat-95" #347: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #347) | f8 38 0d 6d 39 93 09 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 c4 2f 67 81 91 d8 d3 fb 76 27 6a 79 d1 72 21 | 27 8a 05 07 53 b8 7f 41 86 ef e3 fa f6 78 ef f1 | 52 89 ca 2d 9e 75 06 3f de f7 86 92 8e de 82 39 | 74 b5 33 59 34 5d 7a 07 32 58 2d 1b 54 b4 4a 71 | 82 e9 69 4b d1 23 61 8d 33 9d 70 70 80 3d e7 06 | 38 6a 56 ed 6a ce 44 ea 5c f0 e5 ab 75 42 57 8c | 73 f2 e6 32 f6 2b 78 17 cc 77 d1 36 52 bb 7b 23 | 6f c5 5a f4 da 8c 20 ce 25 5e 2c b4 61 29 ba 22 | 7b 74 2f 22 bd 61 49 7e ed ee f8 95 fd 44 ae 87 | 6a 9a b0 84 48 37 7e bb 35 e6 e2 f6 4e 13 6b 95 | 47 4c 2d 6c a3 db 3d 5d ad 81 79 5f 80 e7 3e ed | bb b5 a8 97 95 f7 34 a1 ef 98 52 3c fa 6c 7f 37 | f7 78 d5 45 99 4e d1 38 57 29 2f b0 94 21 1c a5 | 4f 3d 71 d0 fc 88 a0 06 b8 26 ee 84 19 ff 4c 00 | 47 77 6c e4 d3 3a ee 07 05 6f 06 56 6c 1b 9a 2e | 15 bd 41 a6 3a 78 6e d5 2a 86 74 c6 d6 01 f5 e6 | 29 00 00 24 2a 8c 4f 9a ed e1 ff e1 d2 8e 39 06 | cc ef a0 3d 7a d8 6e 61 bc 37 8f e1 33 0d 03 68 | 11 db e1 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 e5 1f 89 e2 f9 a8 3f 54 c4 5a dc | 3f 1e 16 e7 e3 67 75 63 00 00 00 1c 00 00 40 05 | d2 37 e4 48 b8 f6 61 3d d7 15 bc 92 37 84 81 61 | b6 43 37 f7 | libevent_free: release ptr-libevent@0x7fb3840060f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | #347 spent 0.175 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 38 0d 6d 39 93 09 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #347 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #347 | rejected packet: | f8 38 0d 6d 39 93 09 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #347: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0267 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #359 | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #359 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #359 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49674.260379; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000895 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #359 | libevent_malloc: new ptr-libevent@0x7fb3840060f0 size 128 "road-eastnet-nonat-107" #359: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #359) | 73 c2 2a a2 cb e2 3d 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 2e 83 fc d4 94 f1 45 60 7e d6 c0 1f 1c e7 33 | 0f bd b7 8a 76 4b 8b 45 55 e6 bb 84 3d 22 78 af | 75 6e da ff d0 e9 4b 87 08 80 14 e9 1e 9e bb 0e | 16 e9 ea 66 ca bd 7c 66 87 ad a8 d9 21 e1 38 83 | 1f 32 ef a7 2f 0e bf 2d 1d 63 39 6b 83 61 62 c6 | 3e 6a a6 28 e7 8f 0a b3 a0 d9 53 fb be 77 6d 21 | 33 ab c4 d4 01 99 45 77 31 5e 2f ff 5a 01 15 07 | d7 80 2f 1a 7e c3 c0 54 fe ea 5a 9f 7b b7 54 0e | 9f aa da f6 69 55 9a 24 0b a7 e8 7e 52 f9 f8 78 | ba 68 8d a1 bc 1f b0 9f 73 b4 50 08 1b 93 cf 3c | ca 2c f0 94 b0 7c a2 eb fc f9 ec 95 a0 6e 85 2f | 2e ef 23 90 9d 23 ef b2 33 25 ac 56 cb 51 63 74 | c1 ab 1f 93 d7 e6 e0 11 36 c8 47 24 fc 03 91 1a | 9f ca af ad 3e 92 13 be 1e e3 b4 78 2a ad 4c d9 | b9 b1 7c 5e 5e 7c 3e c4 e0 d5 55 d6 b9 f7 15 83 | 2f 6c 01 ee d5 14 3b f0 0d dd 1e 11 8b 30 cd e0 | 29 00 00 24 69 b6 35 41 69 53 97 ba 18 48 44 fd | d5 e2 9a 31 05 82 94 36 da fb c0 91 72 56 36 c7 | c4 dd c7 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 a1 1b b6 5c a0 e8 d3 82 8b cf 19 | 85 69 c3 9f 45 ea 96 77 00 00 00 1c 00 00 40 05 | 5b ca 3a 7b b0 51 af 81 eb d5 3c 03 e7 f7 fa 57 | 2f 45 5b b9 | libevent_free: release ptr-libevent@0x7fb36804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #359 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 73 c2 2a a2 cb e2 3d 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #359 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #359 | rejected packet: | 73 c2 2a a2 cb e2 3d 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #359: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abd200 | handling event EVENT_RETRANSMIT for parent state #269 | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #269 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #269 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49674.261699; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005051 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #269 | libevent_malloc: new ptr-libevent@0x7fb36804b850 size 128 "road-eastnet-nonat-17" #269: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #269) | 42 2b 66 77 50 7b f1 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 1a b0 80 05 00 53 b8 88 37 a8 0d e8 4e c0 81 | 57 b8 c1 99 be 60 6c 42 36 80 aa e8 7e 86 e2 1b | dc 47 d3 0f cf c7 46 a8 c8 47 ce ff 99 14 e6 14 | 37 44 15 18 25 7b d6 ca f2 0f 00 2d 17 01 df 08 | ac fe e9 d3 2b 32 d0 3c 75 39 46 f3 2a a6 98 c3 | 1d b7 82 4a b4 92 84 4b b3 2d b3 71 d7 06 52 b9 | 9c eb 15 89 b5 c8 16 c5 e1 29 05 f5 12 64 42 f4 | a0 b3 32 62 fe 43 4c 1c 4e 1e 53 37 a8 e8 52 23 | 53 0e 82 46 38 b3 95 ea 7e 47 ae 7b 38 c7 ec ac | 8c 74 78 5b e3 a1 ba 65 7c 63 27 19 55 d3 7e f5 | 2f 36 c3 b3 a1 0f 84 2a 85 17 e4 09 e8 35 c4 82 | 08 59 25 c5 6f 5d dc d6 ee 2f dc 6b 0a a2 5d f8 | d2 8d a0 b1 da 71 a0 b2 68 ba c7 d1 ba 7e e6 81 | d8 e3 b3 84 de 3a 47 64 3d 04 00 a0 60 be 1c 4f | 52 66 df 3f 77 fe 53 0c dd cd ed 75 7e 76 02 77 | cc 4e de 99 d4 98 4e 1e 30 09 c0 9e cb c6 a1 c0 | 29 00 00 24 b8 ee 66 5c df cb 58 d0 1b a4 60 c3 | 1b 92 52 a8 29 57 57 d2 02 37 76 e3 2d 2f 31 c7 | 4b 37 7d fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 73 36 11 68 b5 eb 4b 5f e8 3f ce | 5b fc b9 99 cc 0c 05 c7 00 00 00 1c 00 00 40 05 | 7f dd 18 35 5d 55 ec 33 76 f4 f0 dc 77 e6 e3 3b | 97 a2 2b d9 | libevent_free: release ptr-libevent@0x7fb3440180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abd200 | #269 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 2b 66 77 50 7b f1 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #269 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #269 | rejected packet: | 42 2b 66 77 50 7b f1 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #269: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0574 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360018460 | handling event EVENT_RETRANSMIT for parent state #320 | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #320 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #320 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49674.270981; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005201 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abd200 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #320 | libevent_malloc: new ptr-libevent@0x7fb3440180b0 size 128 "road-eastnet-nonat-68" #320: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #320) | af c7 ee c1 89 d6 03 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 a8 bd a9 e5 4d 48 c1 fb 45 8d 11 bf a7 3a cc | c9 47 84 c7 e3 5d ec 21 4e d8 5a af 98 89 03 e4 | 61 3a ba 3d 60 86 ef 6f 17 de fb a4 db d7 d8 bb | dd a1 22 38 5e f6 ed 84 ef 59 30 63 60 c1 46 9c | 68 55 6e 9a 1e c0 57 7e 80 7e b6 a3 a2 d8 44 32 | cf 08 62 90 01 f4 f2 5f ed 1f e9 b3 6d aa b3 b5 | 51 0c 08 36 0d 22 74 67 a6 8c ed a0 79 50 51 2d | 0e 2f 3b 92 1e b3 eb 2d 06 7f 88 16 e6 58 28 17 | 60 5d c5 e1 99 65 2e 54 d8 fa ea 82 20 22 7c ff | b3 f5 72 25 7c 83 b1 cd 19 3e 2b da bc a9 3d dd | 76 aa 4a e2 d6 6a 5a 1c c6 a7 82 72 c8 70 00 2c | 36 b2 a4 f0 ac d5 1d 56 89 f2 8b 82 16 da 4e a9 | 45 8b f2 f1 83 02 06 ed 82 d4 33 ad 52 79 3a 05 | a1 a9 14 4d f9 86 6b dc 84 e1 88 2a d3 ae c1 8c | 43 6f 17 24 1b 1e 6c e9 e7 e2 8e 7a 04 41 d1 b0 | a9 68 50 65 7f 85 77 b4 91 10 c3 80 9a 3e 62 10 | 29 00 00 24 2e 21 9d f9 af ba 04 f5 8f 3b a6 14 | 4e db f7 72 ee 4f db 92 91 3b 76 55 23 0e 1b ed | b4 de fd 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 21 4b df 59 d9 64 c3 0f dc d7 26 | ba 28 50 c6 3e 72 d7 ec 00 00 00 1c 00 00 40 05 | d3 cb a5 46 ac a7 4b 5d c8 de d7 e5 bf c8 e6 16 | 1f 0a fc 46 | libevent_free: release ptr-libevent@0x7fb38802d3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360018460 | #320 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af c7 ee c1 89 d6 03 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #320 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #320 | rejected packet: | af c7 ee c1 89 d6 03 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #320: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0896 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9b1c0 | handling event EVENT_RETRANSMIT for parent state #366 | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #366 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #366 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49674.284389; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500269 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #366 | libevent_malloc: new ptr-libevent@0x7fb38802d3a0 size 128 "road-eastnet-nonat-114" #366: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #366) | 3c e6 10 56 de c7 50 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 fc d0 2b 58 ad f1 9a aa 82 c0 57 ae f0 46 70 | a2 7b 22 23 65 30 fe 9c 0d f5 dc 40 c0 ca 9d ee | 6e 66 1d 3a 72 fe dc 88 4a 26 55 69 91 41 bf 12 | 90 50 78 9a 3c 37 7a d2 58 65 01 98 28 27 ba 6d | 00 33 b4 2e 8f 98 78 f3 cd 21 f0 18 dd 51 cb 68 | 4f 92 9d 38 c4 06 c1 6c cf 60 41 a1 18 22 f2 93 | 34 0c 55 d7 b5 30 6c c4 9c ad 0a aa 9b 11 9f 59 | 49 ac e6 72 dc 82 61 fc 42 ea d8 0b 5d 7d f2 47 | 0f e6 10 b9 1d c6 85 40 80 3f b3 ee 0f dc 82 fa | 53 40 f0 d9 23 6a 65 60 f3 d7 02 47 6c 0a 6f 61 | 8d 04 17 7d 94 9e 17 80 39 4f b5 db 2d a0 f8 02 | 18 21 68 7d 0e af 20 98 75 39 40 4d 5d 87 d7 7b | 4c 39 3b 20 a9 65 05 04 46 a1 49 0b d9 6d 8f 15 | 4f b4 23 1a 8e 5f 27 66 f0 b0 a6 bd 48 dc 96 c2 | 77 e2 b0 72 b6 2c 19 2f 16 65 ef 29 dd a3 4a de | 9a 82 38 c8 cb 37 99 80 5e bb 4b 53 97 7b f3 fa | 29 00 00 24 7a ad 39 64 9f ec c1 f8 33 94 44 40 | f7 c9 dd b2 6b e5 21 16 26 39 73 9d cd 0b f5 7a | f4 93 09 bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 12 7d c7 e4 80 f6 ae d0 f3 0f 94 | c9 99 cc 19 2a ad fe 8d 00 00 00 1c 00 00 40 05 | 84 74 fa e2 ee 48 6b 8a 7f a7 09 f6 4e 00 6d 26 | 52 0f f6 08 | libevent_free: release ptr-libevent@0x7fb35800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9b1c0 | #366 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c e6 10 56 de c7 50 ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #366 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #366 | rejected packet: | 3c e6 10 56 de c7 50 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #366: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4ebd0 | handling event EVENT_RETRANSMIT for parent state #122 | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #122 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #122 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49674.288725; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007597 exceeds limit? YES "road-eastnet-nonat-122" #122: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-122" #122: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #374 at 0x557d46a79890 | State DB: adding IKEv2 state #374 in UNDEFINED | pstats #374 ikev2.ike started | Message ID: init #374: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #374: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #374; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-122" #374: initiating v2 parent SA to replace #122 | using existing local IKE proposals for connection road-eastnet-nonat-122 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 374 for state #374 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9b1c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #374 | libevent_malloc: new ptr-libevent@0x7fb35800cf80 size 128 | #374 spent 0.0933 milliseconds in ikev2_parent_outI1() | RESET processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 resuming | crypto helper 17 starting work-order 374 for state #374 | start processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #122 ikev2.ike failed too-many-retransmits | pstats #122 ikev2.ike deleted too-many-retransmits | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 374 | #122 spent 2.69 milliseconds in total | [RE]START processing: state #122 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-122" #122: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #122: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #122 "road-eastnet-nonat-122" #122: deleting IKE SA for connection 'road-eastnet-nonat-122' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-122' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-122 | State DB: deleting IKEv2 state #122 in PARENT_I1 | parent state #122: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #122 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | in statetime_stop() and could not find #122 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 374 time elapsed 0.000566 seconds | processing global timer EVENT_REVIVE_CONNS | (#374) spent 0.586 milliseconds in crypto helper computing work-order 374: ikev2_outI1 KE (pcr) Initiating connection road-eastnet-nonat-122 which received a Delete/Notify but must remain up per local policy | crypto helper 17 sending results from work-order 374 for state #374 to event queue | scheduling resume sending helper answer for #374 | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7fb3500096b0 size 128 | crypto helper 17 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-122" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-122' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-122" | stop processing: connection "road-eastnet-nonat-122" (in initiate_a_connection() at initiate.c:349) | spent 0.0759 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #374 | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 374 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #374 | **emit ISAKMP Message: | initiator cookie: | 2b af 1b 03 10 38 37 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-122 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d1 c3 14 06 9b d8 f1 99 49 48 ff 90 1f 86 00 28 | ikev2 g^x 44 18 8a f8 52 dc 7d 04 1b d5 bc 43 4d 6c cb 67 | ikev2 g^x f8 0d 9d 6d d0 66 c5 1d 7e 62 70 73 1c 71 41 b4 | ikev2 g^x dd 81 08 b3 22 a9 c5 05 00 35 5b 00 07 16 93 d5 | ikev2 g^x 94 c1 6c 23 e3 4f fb cc 11 67 47 b3 e1 b1 07 89 | ikev2 g^x ea c0 9e a2 65 96 87 08 be 34 63 54 73 84 17 c6 | ikev2 g^x d1 75 fb 5b 8e 80 b1 4e bc e5 80 b5 fc 51 6b 8e | ikev2 g^x af 49 e6 d5 05 a1 42 3f 30 13 b7 fe 10 06 81 bc | ikev2 g^x 26 72 22 45 7f 9f 88 7e f2 4d d6 4b 6d 85 6b 06 | ikev2 g^x 69 00 b6 2d 19 97 b0 06 ca c7 30 d2 02 d3 f6 37 | ikev2 g^x 5e 73 21 4a 86 ec 60 ca fd d2 ed d8 05 2b db 6c | ikev2 g^x a9 01 2a 23 f7 1d d9 64 5b e9 5e 20 76 8d 16 0a | ikev2 g^x bf cd f0 54 2a 72 e9 f6 56 5e 90 80 56 52 68 ca | ikev2 g^x 9f 40 22 7c 1e b1 d0 73 7b 7b 65 7f 5f 3b b2 a4 | ikev2 g^x 2d 12 04 bd 89 d0 f1 f1 ba b3 be 3d 20 c5 f8 84 | ikev2 g^x bc fa 4d 90 8e a5 a8 51 48 43 7b 6c ed ea 9f e0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8b e7 71 0b f0 6c d4 66 d8 89 de 00 61 f0 41 76 | IKEv2 nonce 89 f5 bb 07 5f 2d 78 ac d6 5e eb 30 2f 0d 98 f1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 2b af 1b 03 10 38 37 1a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7a | natd_hash: port= 01 f4 | natd_hash: hash= ff 37 47 83 86 42 9b 81 4e c6 41 b6 af 4f 24 3f | natd_hash: hash= ee d6 bb bd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ff 37 47 83 86 42 9b 81 4e c6 41 b6 af 4f 24 3f | Notify data ee d6 bb bd | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 2b af 1b 03 10 38 37 1a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2f d6 db c3 63 be 1c 54 fe 3c c7 2a 35 82 32 22 | natd_hash: hash= 47 30 b2 bc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2f d6 db c3 63 be 1c 54 fe 3c c7 2a 35 82 32 22 | Notify data 47 30 b2 bc | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #374 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #374: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #374 to 4294967295 after switching state | Message ID: IKE #374 skipping update_recv as MD is fake | Message ID: sent #374 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-122" #374: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.122:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #374) | 2b af 1b 03 10 38 37 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 c3 14 06 9b d8 f1 99 49 48 ff 90 1f 86 00 28 | 44 18 8a f8 52 dc 7d 04 1b d5 bc 43 4d 6c cb 67 | f8 0d 9d 6d d0 66 c5 1d 7e 62 70 73 1c 71 41 b4 | dd 81 08 b3 22 a9 c5 05 00 35 5b 00 07 16 93 d5 | 94 c1 6c 23 e3 4f fb cc 11 67 47 b3 e1 b1 07 89 | ea c0 9e a2 65 96 87 08 be 34 63 54 73 84 17 c6 | d1 75 fb 5b 8e 80 b1 4e bc e5 80 b5 fc 51 6b 8e | af 49 e6 d5 05 a1 42 3f 30 13 b7 fe 10 06 81 bc | 26 72 22 45 7f 9f 88 7e f2 4d d6 4b 6d 85 6b 06 | 69 00 b6 2d 19 97 b0 06 ca c7 30 d2 02 d3 f6 37 | 5e 73 21 4a 86 ec 60 ca fd d2 ed d8 05 2b db 6c | a9 01 2a 23 f7 1d d9 64 5b e9 5e 20 76 8d 16 0a | bf cd f0 54 2a 72 e9 f6 56 5e 90 80 56 52 68 ca | 9f 40 22 7c 1e b1 d0 73 7b 7b 65 7f 5f 3b b2 a4 | 2d 12 04 bd 89 d0 f1 f1 ba b3 be 3d 20 c5 f8 84 | bc fa 4d 90 8e a5 a8 51 48 43 7b 6c ed ea 9f e0 | 29 00 00 24 8b e7 71 0b f0 6c d4 66 d8 89 de 00 | 61 f0 41 76 89 f5 bb 07 5f 2d 78 ac d6 5e eb 30 | 2f 0d 98 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 37 47 83 86 42 9b 81 4e c6 41 b6 | af 4f 24 3f ee d6 bb bd 00 00 00 1c 00 00 40 05 | 2f d6 db c3 63 be 1c 54 fe 3c c7 2a 35 82 32 22 | 47 30 b2 bc | state #374 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35800cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9b1c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #374 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 | #374 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49674.290082 | resume sending helper answer for #374 suppresed complete_v2_state_transition() and stole MD | #374 spent 0.498 milliseconds in resume sending helper answer | stop processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3500096b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2b af 1b 03 10 38 37 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #374 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #374 | rejected packet: | 2b af 1b 03 10 38 37 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7a fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #374: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #321 | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #321 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #321 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49674.329301; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003659 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afd000 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #321 | libevent_malloc: new ptr-libevent@0x7fb3500096b0 size 128 "road-eastnet-nonat-69" #321: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #321) | 30 42 c0 64 91 b3 77 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 8b 42 a5 47 61 3e b2 88 66 b3 90 63 22 69 df | e5 f0 68 6a 3f ab 70 bf d6 bc a2 6d 32 d6 bf 56 | 13 cd ae 31 91 9e 97 07 b1 e6 67 da 49 fc 52 44 | f0 97 00 89 4b 4a 7b 7e 72 67 33 77 ed ad d5 60 | 7c 94 7a 09 a1 fe 2b 97 f4 03 f7 65 c2 4f 92 50 | 59 77 e9 77 52 e2 ba 0e f1 c5 36 f7 3f 04 ca 02 | 29 37 fe 9d b2 ee 90 bb 59 f2 25 82 19 bd 15 09 | 7c 21 90 62 70 4c 2f 35 e2 fa b0 32 14 28 ef f3 | f9 26 2a aa 23 e5 00 f2 ed fa 00 25 b3 8d 3e f4 | 4c e5 68 7e bb cf a5 93 21 96 34 22 9d cb 8e c0 | 2d 43 58 e0 8a b9 3b 2b d8 e6 50 0b 36 e9 8a 0b | 9a 7c fa 82 ee ac d3 9d dc ac fe e5 26 e8 d7 a8 | 41 71 b3 21 7a 08 ae 35 2b 19 02 a1 3c d8 d8 79 | 7f 1b 50 2d 1e 74 84 a4 f5 80 19 40 cb b4 59 fe | e2 eb 79 b4 b1 1d a9 7a b4 6e 10 85 42 85 5d e9 | 58 9c 43 c5 54 ce c4 20 7b 73 38 bf 59 44 4d 18 | 29 00 00 24 bf 17 ca 5e f8 c4 94 b8 0b 16 3e 38 | 6b 43 cf 92 04 d6 aa ac 11 4c 2e 2c d1 a0 dc 92 | 64 9e 7b 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 bc 1a f8 41 15 d9 99 65 b2 c4 f3 | df 03 a0 00 26 60 50 c2 00 00 00 1c 00 00 40 05 | fc 37 e7 42 82 1f 76 13 ad 5a b7 fc e2 af d4 9f | 15 d4 13 5b | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #321 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 42 c0 64 91 b3 77 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #321 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #321 | rejected packet: | 30 42 c0 64 91 b3 77 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #321: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0622 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #270 | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #270 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #270 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49674.344642; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004352 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #270 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 "road-eastnet-nonat-18" #270: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #270) | 98 aa bb 79 2f f5 b5 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 24 f6 25 5f fa 71 0f 39 53 f1 8f 92 58 3c 59 | 8e c2 2e 28 53 ea 0d 58 1c b1 76 25 4f 77 d3 40 | 6f 45 9c 78 a8 01 99 46 d7 6e 57 ac 51 cd 32 20 | 87 d7 3c c9 3f 5e e0 a6 46 8c bc bb d2 2a 3a 19 | 0d 30 25 7b 8c f0 eb f6 7f 48 bd 51 fc 7c 03 2d | 42 fb c9 54 0b f3 df 3f 56 f4 9e 74 f1 22 86 89 | d4 fe 7d ea 34 26 2a 49 b7 c2 c2 c5 bf 06 dd 36 | be de 23 aa bf 61 22 5f 62 e1 04 e4 81 81 b4 1a | 94 68 45 c7 43 f9 2b f7 9c c7 da c1 6c f9 e0 19 | 3d 12 26 17 de 58 8c 74 5a 7c d1 ae 99 12 b1 cc | 7c fd 41 5e df 12 73 ff fe 24 d4 ac e3 4a 14 3c | a7 57 18 de 1a f8 e3 60 98 66 b7 e2 de d9 ef 30 | 7b 0c d1 7a 6d 0b f9 31 66 84 79 8b 8b 50 77 51 | 23 58 84 77 80 ea dc 70 95 5b e4 15 8d 98 42 aa | fa 93 a8 7a d7 2a 0d 51 24 2f ee fa 92 74 05 47 | d0 38 43 8c 6f cb 3f 1f 04 0b e8 57 ca ea 33 7e | 29 00 00 24 dd 5a f6 1e bd fb cd ef 92 3b 56 16 | bd 57 a2 0f d1 d5 f5 02 97 f4 10 bb 15 09 d8 8e | c9 9b 97 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 15 18 7d df ec 83 30 72 5b 68 c2 | 08 e3 c3 a4 d5 a2 af 25 00 00 00 1c 00 00 40 05 | b3 09 33 34 02 38 11 d4 03 64 9d 03 c3 5d 2b 94 | 2e 30 63 d3 | libevent_free: release ptr-libevent@0x7fb388011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #270 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 aa bb 79 2f f5 b5 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #270 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #270 | rejected packet: | 98 aa bb 79 2f f5 b5 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #270: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0572 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c017ea0 | handling event EVENT_RETRANSMIT for parent state #367 | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #367 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #367 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49674.34595; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501091 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #367 | libevent_malloc: new ptr-libevent@0x7fb388011f30 size 128 "road-eastnet-nonat-115" #367: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #367) | 4a 87 68 98 60 e9 4c f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 0c 97 07 ab 60 f0 87 17 3b e3 ad e6 c0 a4 f8 | bc d0 84 fc 55 d2 65 d6 9f 46 ab 63 b9 cd 86 a7 | 92 52 2d 61 57 c8 33 96 bd 3f e7 29 4c c0 56 81 | 07 2c a6 2e b4 e1 f4 a2 f9 92 52 0a 37 04 e4 51 | 6e 83 7a 8b f6 b0 a9 33 fc 7e 63 8b 04 cb e8 b1 | 89 da ba 9d 79 52 4b 77 ad fe 01 ca be 34 71 25 | 01 b7 c6 b7 a4 d2 8b 5a 4f 28 3e 3a 2c 2d 2b 82 | b6 7f 76 80 3a 8d 21 5e c2 27 da 9c 35 b4 28 8d | 4f 12 52 38 3a d3 0a 5c 8a f9 8f 79 8d 25 d4 f8 | ed f0 27 a3 9a 91 9a 23 17 a2 c5 fb 5c 81 c7 3f | d7 90 16 5d 16 d9 fd c2 ab 94 11 66 13 b9 42 50 | 61 f5 f7 53 fa 66 74 a0 35 1a 38 cb 76 13 72 7a | 71 f8 95 99 2b 70 57 e9 96 87 e1 a7 fa 09 46 16 | 2d 17 ab 0f b3 e3 6d 7d c4 71 f7 b9 01 3d 53 ec | 89 99 23 9b ed fe dc 3d 96 90 a5 f1 6b a2 7c ad | 08 22 28 21 90 c0 9d 24 98 36 19 8c 8e 5f 64 f3 | 29 00 00 24 cc 21 72 ec 84 1b 6c bc be 58 98 1b | fd b2 70 93 97 ae 8a 73 25 e3 f3 ed 6f 6f ad a0 | a3 bc 74 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 20 17 ba 74 ed cb 3d 19 9d 8d 0a | 7d 3c 02 99 ce fc 27 96 00 00 00 1c 00 00 40 05 | be d4 1c 69 d6 46 df 94 c0 c1 0d 02 c5 30 14 7a | ff f7 b4 bf | libevent_free: release ptr-libevent@0x7fb35c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | #367 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 87 68 98 60 e9 4c f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #367 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #367 | rejected packet: | 4a 87 68 98 60 e9 4c f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #367: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0523 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338017ea0 | handling event EVENT_RETRANSMIT for parent state #348 | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #348 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #348 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49674.347238; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001924 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #348 | libevent_malloc: new ptr-libevent@0x7fb35c04b7c0 size 128 "road-eastnet-nonat-96" #348: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #348) | a7 7d 9d ff 1a 60 65 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce d5 f5 8b 39 60 35 a5 25 70 07 1c 5c b5 0b 9d | 0f b2 5b 4a 01 34 b6 83 42 d7 d4 4c ad da 68 4a | 8b 4a 32 5f 36 06 f1 98 73 58 e9 72 c0 73 68 ca | 50 81 07 47 ff 17 19 96 47 97 94 3d f6 b6 04 3a | d9 53 26 2d 26 d4 5a 00 db 52 8b 30 4a 2f d3 5e | 57 21 6b c8 30 e6 41 d6 77 b5 33 c3 1e eb 09 f5 | f6 92 94 59 ce 0f f4 b6 13 a7 e6 12 2c 94 0a 0e | a5 49 7d ed 7d 57 a6 dd 0c c8 f5 e3 ab f6 df fb | 13 a2 c5 ce cd 5e 51 7c 83 34 62 82 09 e1 e3 72 | 31 4c 58 be 93 6e 60 9d a5 4a 65 3b 0e 6c 76 16 | ff b5 3c 17 b2 e3 b4 72 ba 47 1e 9f c9 b0 43 a7 | f0 b4 e5 71 a8 38 7d f3 55 a8 70 6c f5 0c ea e3 | 99 31 47 d9 67 2c ef 74 72 f0 71 8a 3c da e4 22 | d8 c1 06 32 4c 16 22 97 a9 d9 5c c1 eb 63 08 aa | 52 12 c2 6f 92 9a fe 31 31 61 1a 04 4f a6 29 e5 | bd ba 74 54 e9 68 1b 89 03 52 57 66 34 af 35 4f | 29 00 00 24 d4 8c 07 58 36 6c 0d 91 39 7f ba 4b | 55 80 94 2b 15 6a 3d d9 23 c6 de 68 59 32 ea bf | f7 3a e2 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c1 c6 46 d6 42 6c c3 80 0a 8c 20 90 | 81 74 5d e8 06 92 e7 f6 00 00 00 1c 00 00 40 05 | 5c 1e 6e a7 c5 99 b7 4d bd dd e2 f9 8e 11 ad b4 | 92 1e 01 ed | libevent_free: release ptr-libevent@0x7fb33801fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338017ea0 | #348 spent 0.091 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 7d 9d ff 1a 60 65 e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #348 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #348 | rejected packet: | a7 7d 9d ff 1a 60 65 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #348: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374009690 | handling event EVENT_RETRANSMIT for parent state #360 | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #360 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #360 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49674.348465; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001981 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338017ea0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #360 | libevent_malloc: new ptr-libevent@0x7fb33801fd50 size 128 "road-eastnet-nonat-108" #360: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #360) | e8 ba f7 ac 97 7a d7 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 a7 6a 2f 0e 47 4f c5 a2 87 88 1c 76 27 25 53 | 18 cf 29 be de 65 a5 ec fa 8e ba d5 95 70 46 1a | 5e 82 ee 5e ea 78 6c 5e e1 5a ba c3 42 fa 62 85 | 96 61 49 94 e4 26 35 02 12 7e c3 49 17 01 2e ad | da 08 aa 31 5d 07 3f 11 e2 3e a1 55 1e 97 51 1d | 21 13 8f d7 77 02 f2 6a 5f 3a a3 ad 67 d3 b3 fe | 4d bc 3d 87 97 56 a8 ed 5e 65 2d 59 2c 08 c6 f6 | e3 33 48 1e c9 5b 10 68 f5 80 0a de 74 5b 48 d5 | 12 63 cb 81 c8 06 b2 4b 2a 11 1e ef 99 9b bd 96 | 3d 2d 68 30 3c a5 df b7 7c b9 96 9a 90 b4 80 82 | 7f 32 39 5b 15 a6 11 ef 5c ad af 36 92 59 32 87 | 1f b6 1c c4 37 ef 0e 8f d4 cd 1f 34 87 b5 54 45 | 4f b4 69 d7 3d 68 0c fa bd 14 4f 0f ca d9 05 b6 | 6c 12 d4 47 46 2e 28 86 0e 8a 52 14 fe d2 d6 83 | e9 62 c7 35 25 a1 d0 50 cc af ac b0 fd 2d 90 37 | 95 46 1a 19 98 e1 af 75 ba a4 1b aa b9 40 54 be | 29 00 00 24 1b 6f 95 ad 44 06 60 87 4d 33 ad b6 | 0a 54 4e 5c c3 38 27 ff 28 86 c4 a8 14 ff fc 45 | 4c 10 47 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 71 5e 67 a4 d4 de c3 91 7e 75 5e | 86 6a 2f 03 c9 58 fc 3e 00 00 00 1c 00 00 40 05 | 42 65 a4 4c 2a f8 3a 2c 53 a5 43 50 55 9d ce 16 | 71 5f ac c0 | libevent_free: release ptr-libevent@0x7fb374045df0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374009690 | #360 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 ba f7 ac 97 7a d7 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #360 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #360 | rejected packet: | e8 ba f7 ac 97 7a d7 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #360: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0531 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8cc0 | handling event EVENT_RETRANSMIT for parent state #123 | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #123 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #123 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49674.351735; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008017 exceeds limit? YES "road-eastnet-nonat-123" #123: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-123" #123: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #375 at 0x557d46a7ae50 | State DB: adding IKEv2 state #375 in UNDEFINED | pstats #375 ikev2.ike started | Message ID: init #375: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #375: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #375; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-123" #375: initiating v2 parent SA to replace #123 | using existing local IKE proposals for connection road-eastnet-nonat-123 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 375 for state #375 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb374009690 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #375 | libevent_malloc: new ptr-libevent@0x7fb374045df0 size 128 | #375 spent 0.0963 milliseconds in ikev2_parent_outI1() | crypto helper 18 resuming | crypto helper 18 starting work-order 375 for state #375 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 375 | RESET processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #123 ikev2.ike failed too-many-retransmits | pstats #123 ikev2.ike deleted too-many-retransmits | #123 spent 2.54 milliseconds in total | [RE]START processing: state #123 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-123" #123: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #123: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #123 "road-eastnet-nonat-123" #123: deleting IKE SA for connection 'road-eastnet-nonat-123' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-123' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-123 | State DB: deleting IKEv2 state #123 in PARENT_I1 | parent state #123: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #123 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 375 time elapsed 0.000767 seconds | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8cc0 | in statetime_stop() and could not find #123 | (#375) spent 0.77 milliseconds in crypto helper computing work-order 375: ikev2_outI1 KE (pcr) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-123 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-123" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-123' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | crypto helper 18 sending results from work-order 375 for state #375 to event queue | scheduling resume sending helper answer for #375 | libevent_malloc: new ptr-libevent@0x7fb3540095a0 size 128 | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-123" | stop processing: connection "road-eastnet-nonat-123" (in initiate_a_connection() at initiate.c:349) | spent 0.0787 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #375 | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 375 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #375 | **emit ISAKMP Message: | initiator cookie: | a4 09 26 11 42 9e 51 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-123 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | crypto helper 18 waiting (nothing to do) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9b 77 05 ad 49 62 16 46 be f5 65 08 84 ad 14 8b | ikev2 g^x 54 2c 99 1d e2 97 87 23 80 81 89 f0 4c d0 eb 92 | ikev2 g^x 7b 0b 4f bb c5 8e f0 7c 4a e9 4e f5 41 3b c0 9c | ikev2 g^x 84 74 7a 28 42 6c 3e a3 44 ba 29 11 96 09 9b f3 | ikev2 g^x 38 05 36 bd 24 dc d4 f1 69 9a 67 13 96 b5 cc 0e | ikev2 g^x 5b 85 9c bc 45 e5 5b 70 a0 86 01 2f a9 6f b7 16 | ikev2 g^x e5 8c 0d ae 1d 65 f5 53 d8 97 9b 0e 3c f7 8c b4 | ikev2 g^x 84 cb c7 3a c6 10 40 ea de 5f 63 4c 12 d8 3f ca | ikev2 g^x 6d 62 70 f0 93 72 e5 53 fe e2 f7 48 e3 16 ec 2c | ikev2 g^x 0c 51 77 44 87 3b cf 71 6a 9d b3 31 8e cc be f2 | ikev2 g^x 83 ce be c0 12 f1 01 88 ca 5d f3 fc 95 bc f7 5a | ikev2 g^x 34 7b 8e 4b 02 d0 59 3f ca a0 78 bc ef 69 51 e1 | ikev2 g^x 59 c6 1a ee b3 5f f4 fe ba ab aa 32 83 46 24 8b | ikev2 g^x 44 0a ac 7f 47 be 12 69 64 f5 8a a0 c3 66 33 2a | ikev2 g^x d1 fe cd 2b 6e fd 1c 22 43 71 36 d1 05 aa f3 a0 | ikev2 g^x 34 64 36 1b 5f af f2 60 88 b6 fd ad 79 17 84 9b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a2 f8 9d 2f 08 fe df 02 8f a0 29 1e b3 67 52 e4 | IKEv2 nonce 00 d5 8c 7f 4e 12 c2 f7 f5 b4 05 71 a4 8b 3b 37 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a4 09 26 11 42 9e 51 e7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7b | natd_hash: port= 01 f4 | natd_hash: hash= 12 2b 6b 99 24 aa d2 31 8d d6 a9 cf 86 3d 5f d7 | natd_hash: hash= 43 66 7f 91 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 12 2b 6b 99 24 aa d2 31 8d d6 a9 cf 86 3d 5f d7 | Notify data 43 66 7f 91 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a4 09 26 11 42 9e 51 e7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 3d 40 65 0f bf b0 2e 03 30 63 c3 7a f7 f2 38 a3 | natd_hash: hash= 20 e1 e4 b2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3d 40 65 0f bf b0 2e 03 30 63 c3 7a f7 f2 38 a3 | Notify data 20 e1 e4 b2 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #375 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #375: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #375 to 4294967295 after switching state | Message ID: IKE #375 skipping update_recv as MD is fake | Message ID: sent #375 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-123" #375: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.123:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #375) | a4 09 26 11 42 9e 51 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b 77 05 ad 49 62 16 46 be f5 65 08 84 ad 14 8b | 54 2c 99 1d e2 97 87 23 80 81 89 f0 4c d0 eb 92 | 7b 0b 4f bb c5 8e f0 7c 4a e9 4e f5 41 3b c0 9c | 84 74 7a 28 42 6c 3e a3 44 ba 29 11 96 09 9b f3 | 38 05 36 bd 24 dc d4 f1 69 9a 67 13 96 b5 cc 0e | 5b 85 9c bc 45 e5 5b 70 a0 86 01 2f a9 6f b7 16 | e5 8c 0d ae 1d 65 f5 53 d8 97 9b 0e 3c f7 8c b4 | 84 cb c7 3a c6 10 40 ea de 5f 63 4c 12 d8 3f ca | 6d 62 70 f0 93 72 e5 53 fe e2 f7 48 e3 16 ec 2c | 0c 51 77 44 87 3b cf 71 6a 9d b3 31 8e cc be f2 | 83 ce be c0 12 f1 01 88 ca 5d f3 fc 95 bc f7 5a | 34 7b 8e 4b 02 d0 59 3f ca a0 78 bc ef 69 51 e1 | 59 c6 1a ee b3 5f f4 fe ba ab aa 32 83 46 24 8b | 44 0a ac 7f 47 be 12 69 64 f5 8a a0 c3 66 33 2a | d1 fe cd 2b 6e fd 1c 22 43 71 36 d1 05 aa f3 a0 | 34 64 36 1b 5f af f2 60 88 b6 fd ad 79 17 84 9b | 29 00 00 24 a2 f8 9d 2f 08 fe df 02 8f a0 29 1e | b3 67 52 e4 00 d5 8c 7f 4e 12 c2 f7 f5 b4 05 71 | a4 8b 3b 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 12 2b 6b 99 24 aa d2 31 8d d6 a9 cf | 86 3d 5f d7 43 66 7f 91 00 00 00 1c 00 00 40 05 | 3d 40 65 0f bf b0 2e 03 30 63 c3 7a f7 f2 38 a3 | 20 e1 e4 b2 | state #375 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374045df0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb374009690 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374009690 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #375 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 | #375 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49674.353299 | resume sending helper answer for #375 suppresed complete_v2_state_transition() and stole MD | #375 spent 0.482 milliseconds in resume sending helper answer | stop processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3540095a0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 09 26 11 42 9e 51 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #375 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #375 | rejected packet: | a4 09 26 11 42 9e 51 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7b fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #375: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0655 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a63210 | handling event EVENT_RETRANSMIT for parent state #322 | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #322 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #322 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49674.395499; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004785 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8cc0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #322 | libevent_malloc: new ptr-libevent@0x7fb36404b5a0 size 128 "road-eastnet-nonat-70" #322: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #322) | 74 03 a5 dd ea 05 2e d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 15 d9 ac 31 7b 6c 04 ac 7a ef e5 0d 89 93 07 | 20 e4 8e 39 86 a0 9c 1e 9f 76 b9 58 4d f2 a7 9f | a9 61 82 a9 75 3f e8 1a c2 92 fe 84 37 ac 33 ad | 65 45 df 2b e1 cb 2c 07 be 4f c4 59 89 1a 1e d4 | bc 00 c9 7a da 51 f8 0e 6d e5 9b 4d 2b 1e 90 8c | a7 76 dd 60 8a 02 12 aa 75 a5 70 c1 65 7c 3e 55 | 89 46 b2 4f 06 dd f5 63 86 b7 00 f0 73 2f 7c 5a | b7 d4 0f 38 d5 4f 7a 42 58 2c 1c 6e 8d df 4f 92 | 63 c6 3f de f4 10 95 80 0d 14 e0 40 1c 6b a7 25 | 78 25 a5 d6 97 e1 6b 90 22 06 bd 2b cc f5 6b ca | 10 6b ac a7 98 1a 94 fa 4c cf 33 fe dc 06 fd b0 | 5f 81 4e 82 91 b8 3e 8a c7 a6 68 81 06 ac 84 f0 | ea 68 69 9c ad 3a 07 bc c5 f3 31 91 30 05 f3 ef | dc 51 d5 f6 ee f9 4a 07 b7 9e 0f 65 ad 3f 41 a0 | d7 70 67 24 31 3b 11 1f 99 26 08 ab a5 8d 87 97 | f5 4d 04 da a2 fb f0 9d b6 5e ca 79 ac fb e6 b9 | 29 00 00 24 7c d4 e7 e5 83 a9 e9 e5 4c 1d 37 7f | 04 0f 2a 2b 54 28 64 c4 b2 05 be 1f 1d 68 a9 5e | 6e 76 88 d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 64 8d 0f b4 d2 3e c7 db eb 6e 9c | 80 67 1d 17 67 fa eb 16 00 00 00 1c 00 00 40 05 | 45 ce 15 93 8c ec f9 76 43 65 cd e9 a3 d1 ec 83 | 45 3c 35 9c | libevent_free: release ptr-libevent@0x7fb36c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a63210 | #322 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 03 a5 dd ea 05 2e d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #322 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #322 | rejected packet: | 74 03 a5 dd ea 05 2e d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #322: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23110 | handling event EVENT_RETRANSMIT for parent state #368 | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #368 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #368 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49674.415786; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501175 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a63210 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #368 | libevent_malloc: new ptr-libevent@0x7fb36c01d920 size 128 "road-eastnet-nonat-116" #368: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #368) | af 44 01 88 e6 16 c8 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 fe d2 29 cf 90 27 2d 78 45 a2 b1 3a ed 0c 48 | 17 b4 e8 54 dd 68 cf 7e 09 7a af 17 ed 4f 89 f8 | c0 ff 46 bb 6c a6 b3 38 fd f1 d2 cc cf d4 db c1 | e0 88 fe 51 49 6d e3 71 01 85 fe f4 a5 9f 85 04 | b6 d1 25 1f bd d7 ec 86 d1 7c 74 4d 2b 88 9b 37 | 88 75 91 51 15 43 e3 94 29 7a fc 34 e7 47 6b 09 | 3f 68 5a af 07 68 67 15 d9 ca f4 fd c3 d0 6c 2d | 70 40 4e 4a 88 cf b4 8b 6f 34 77 1b fd 2c ac c0 | b5 ab 67 28 d7 0d cf 79 56 41 4a ee e4 5c 59 e9 | 16 2d 45 df 3b 83 50 77 d1 1d 25 2e df 41 d7 96 | e0 ae 3d 15 c2 fb 47 fc 22 43 64 51 9d 2b 27 9e | ef d5 13 c7 bc a8 df 51 ba 9e 32 c3 d2 0e 3d 97 | 23 9a d8 1c 93 38 85 21 ff 2a 81 20 c2 e1 c5 96 | 9d d3 5f 74 e3 dc ae 9a 19 d8 eb 6f 38 2d 11 55 | b9 c5 4b fe 45 56 61 1b 03 ae 41 5d 20 26 7b b4 | dd 4c d4 57 72 8f 74 07 75 75 35 67 ae 9c b4 2d | 29 00 00 24 b4 f8 c7 8c ce d2 25 cc 04 b1 28 85 | 4c 50 50 1c af 66 c6 a8 14 6b b6 e9 07 eb 31 8e | 06 0d 7b dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 4f 54 9f 13 b7 58 02 6e 4f 8f 36 | 8b d5 61 f1 61 e4 53 15 00 00 00 1c 00 00 40 05 | 79 7d 7e 8e 6a 0e d7 b1 f9 8e 14 46 7c 3e c2 fe | 69 34 3d 95 | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23110 | #368 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 44 01 88 e6 16 c8 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #368 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #368 | rejected packet: | af 44 01 88 e6 16 c8 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #368: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae9fc0 | handling event EVENT_RETRANSMIT for parent state #361 | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #361 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #361 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49674.417099; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00244 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23110 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #361 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 "road-eastnet-nonat-109" #361: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #361) | 9c f5 2d c8 50 35 55 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe f7 f3 f1 6a 76 6a 9a e6 0e 10 b4 e5 b5 16 07 | 0f 90 8a f4 dc 9f 27 b0 2a 41 17 f0 21 60 87 50 | 11 a6 84 2e 86 94 e1 65 4d 1a 59 ce 11 45 d2 c5 | 09 df ce 0a 2c f9 3e 7e cb 59 88 eb 93 1a 26 06 | 39 22 a5 57 b6 f2 5b 4c fe 56 6a 26 49 df e6 84 | b9 e4 e4 41 19 a0 e8 70 69 c2 51 79 76 2e 80 40 | 6f 9e 4b a9 87 c2 02 65 d3 3e 05 60 b6 af 86 d7 | 52 3c 7a 52 e9 69 b8 2a e6 43 99 6c 72 d9 7c 1a | 8d c9 5b fb a3 c2 fc 51 d5 fc c8 85 ff 46 8f 64 | e3 d3 a7 99 28 b1 43 6d 9b 9d 50 e1 af 1a d6 ff | 7e fd 10 23 a2 a6 f9 9b d2 06 fa 0f 91 01 67 9f | 42 43 ac e6 4f ae 3e 00 59 5d 7a cf b3 59 12 67 | 0d c1 86 cf 82 5d 20 9e 98 97 ec b2 7e be 63 74 | b3 15 a1 c0 63 a7 5d 61 bb b3 2f 2d 42 15 59 57 | 72 ca 0b d8 9e d0 1b 84 91 fd db 5e 8f 2f 62 ed | 99 8c a3 a5 ec ef 08 26 6f ab 64 68 6b 97 9d 3e | 29 00 00 24 5d 7a 1f c2 56 77 bf 60 f2 37 f5 ed | 4d 94 c3 a6 58 e2 5f 6e 1b f6 b4 76 e5 69 0c 98 | 27 55 cd c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 71 91 34 7a e2 ba d5 01 f3 c5 56 | ba 5f 83 71 00 17 86 15 00 00 00 1c 00 00 40 05 | e0 46 0d f9 99 b9 47 b4 35 a0 04 20 4b 9b 45 ee | 1c f7 92 53 | libevent_free: release ptr-libevent@0x7fb368023a60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae9fc0 | #361 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #124 | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #124 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #124 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49674.417258; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007614 exceeds limit? YES "road-eastnet-nonat-124" #124: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-124" #124: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #376 at 0x557d46a7c410 | State DB: adding IKEv2 state #376 in UNDEFINED | pstats #376 ikev2.ike started | Message ID: init #376: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #376: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #376; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-124" #376: initiating v2 parent SA to replace #124 | using existing local IKE proposals for connection road-eastnet-nonat-124 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 376 for state #376 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ae9fc0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #376 | libevent_malloc: new ptr-libevent@0x7fb368023a60 size 128 | #376 spent 0.0994 milliseconds in ikev2_parent_outI1() | crypto helper 7 resuming | crypto helper 7 starting work-order 376 for state #376 | RESET processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 376 | start processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #124 ikev2.ike failed too-many-retransmits | pstats #124 ikev2.ike deleted too-many-retransmits | #124 spent 2.66 milliseconds in total | [RE]START processing: state #124 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-124" #124: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #124: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #124 "road-eastnet-nonat-124" #124: deleting IKE SA for connection 'road-eastnet-nonat-124' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-124' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-124 | State DB: deleting IKEv2 state #124 in PARENT_I1 | parent state #124: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 376 time elapsed 0.000917 seconds | stop processing: state #124 from 192.1.2.23:500 (in delete_state() at state.c:1143) | (#376) spent 0.924 milliseconds in crypto helper computing work-order 376: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 376 for state #376 to event queue | scheduling resume sending helper answer for #376 | libevent_malloc: new ptr-libevent@0x7fb348025100 size 128 | crypto helper 7 waiting (nothing to do) | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | in statetime_stop() and could not find #124 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9c f5 2d c8 50 35 55 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #361 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #361 | rejected packet: | 9c f5 2d c8 50 35 55 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6d 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #361: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0472 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-124 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-124" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-124' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-124" | stop processing: connection "road-eastnet-nonat-124" (in initiate_a_connection() at initiate.c:349) | spent 0.0575 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #376 | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 376 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #376 | **emit ISAKMP Message: | initiator cookie: | ea 6d 1c 44 16 cc 7c db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-124 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 56 30 8d f2 73 36 66 21 18 72 ab a6 1d 5b ca 9c | ikev2 g^x 0a 7e 8f ea 73 27 8a 58 d5 e4 26 95 19 96 87 0c | ikev2 g^x 7f 07 37 1c 70 d2 60 3e 98 51 eb 57 bf 72 e0 8c | ikev2 g^x 84 ad 4f b6 dc 5c 36 41 e2 77 e0 9c 8d 51 16 fc | ikev2 g^x 84 d9 54 f9 85 4d 98 72 f2 d6 3d 1b 19 f0 da ce | ikev2 g^x ab 3f 23 52 e0 3a 3c 0f e9 38 61 5a c2 41 30 12 | ikev2 g^x 05 82 0c cb c8 c2 1e a1 4f f2 c3 e1 3d da 41 26 | ikev2 g^x 24 be f6 af 3e e8 2f 87 ee 1b 93 a1 f0 e9 53 da | ikev2 g^x 3a 2e 85 7e d2 d0 a7 3b eb 29 ab 65 b7 78 9f f6 | ikev2 g^x c5 fd a3 19 78 40 8c d9 48 7b 2c 4c e7 26 6f 53 | ikev2 g^x d3 ac b1 b4 ba da af d2 ab 50 63 75 e1 1d 99 d0 | ikev2 g^x b8 31 ac 7d e7 18 55 91 d3 ac 44 fc d3 74 62 7f | ikev2 g^x ce 91 66 95 28 b3 47 a1 94 fd 56 15 40 09 da b9 | ikev2 g^x 56 ba 99 10 ef 74 77 7b 2d 9f e1 06 40 6f 4c 27 | ikev2 g^x 16 1c 00 6e 75 bf e7 e8 68 0b d5 e5 14 e8 f6 62 | ikev2 g^x 49 c7 45 85 8e da 35 35 ec 65 cf 2e 56 35 57 b4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b2 22 59 8f 2f 17 3c be 86 a7 a1 89 a7 cd 11 4f | IKEv2 nonce 04 a8 63 56 c2 46 93 de 35 e3 be b3 5b e4 fb 6f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ea 6d 1c 44 16 cc 7c db | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7c | natd_hash: port= 01 f4 | natd_hash: hash= 92 73 25 29 4a e6 52 0b aa f7 7d 73 68 37 ec c6 | natd_hash: hash= 59 a7 02 18 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 92 73 25 29 4a e6 52 0b aa f7 7d 73 68 37 ec c6 | Notify data 59 a7 02 18 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ea 6d 1c 44 16 cc 7c db | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a9 5a 00 6b 7f 85 e1 a6 d7 c4 fa 5e b7 b1 99 68 | natd_hash: hash= fa 78 21 65 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a9 5a 00 6b 7f 85 e1 a6 d7 c4 fa 5e b7 b1 99 68 | Notify data fa 78 21 65 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #376 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #376: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #376 to 4294967295 after switching state | Message ID: IKE #376 skipping update_recv as MD is fake | Message ID: sent #376 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-124" #376: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.124:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #376) | ea 6d 1c 44 16 cc 7c db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 30 8d f2 73 36 66 21 18 72 ab a6 1d 5b ca 9c | 0a 7e 8f ea 73 27 8a 58 d5 e4 26 95 19 96 87 0c | 7f 07 37 1c 70 d2 60 3e 98 51 eb 57 bf 72 e0 8c | 84 ad 4f b6 dc 5c 36 41 e2 77 e0 9c 8d 51 16 fc | 84 d9 54 f9 85 4d 98 72 f2 d6 3d 1b 19 f0 da ce | ab 3f 23 52 e0 3a 3c 0f e9 38 61 5a c2 41 30 12 | 05 82 0c cb c8 c2 1e a1 4f f2 c3 e1 3d da 41 26 | 24 be f6 af 3e e8 2f 87 ee 1b 93 a1 f0 e9 53 da | 3a 2e 85 7e d2 d0 a7 3b eb 29 ab 65 b7 78 9f f6 | c5 fd a3 19 78 40 8c d9 48 7b 2c 4c e7 26 6f 53 | d3 ac b1 b4 ba da af d2 ab 50 63 75 e1 1d 99 d0 | b8 31 ac 7d e7 18 55 91 d3 ac 44 fc d3 74 62 7f | ce 91 66 95 28 b3 47 a1 94 fd 56 15 40 09 da b9 | 56 ba 99 10 ef 74 77 7b 2d 9f e1 06 40 6f 4c 27 | 16 1c 00 6e 75 bf e7 e8 68 0b d5 e5 14 e8 f6 62 | 49 c7 45 85 8e da 35 35 ec 65 cf 2e 56 35 57 b4 | 29 00 00 24 b2 22 59 8f 2f 17 3c be 86 a7 a1 89 | a7 cd 11 4f 04 a8 63 56 c2 46 93 de 35 e3 be b3 | 5b e4 fb 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 73 25 29 4a e6 52 0b aa f7 7d 73 | 68 37 ec c6 59 a7 02 18 00 00 00 1c 00 00 40 05 | a9 5a 00 6b 7f 85 e1 a6 d7 c4 fa 5e b7 b1 99 68 | fa 78 21 65 | state #376 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb368023a60 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ae9fc0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae9fc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #376 | libevent_malloc: new ptr-libevent@0x7fb368023a60 size 128 | #376 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49674.418815 | resume sending helper answer for #376 suppresed complete_v2_state_transition() and stole MD | #376 spent 0.317 milliseconds in resume sending helper answer | stop processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb348025100 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 6d 1c 44 16 cc 7c db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #376 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #376 | rejected packet: | ea 6d 1c 44 16 cc 7c db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7c fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #376: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0393 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c018460 | handling event EVENT_RETRANSMIT for parent state #323 | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #323 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #323 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49674.450008; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004074 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #323 | libevent_malloc: new ptr-libevent@0x7fb348025100 size 128 "road-eastnet-nonat-71" #323: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #323) | fa a0 9f 7c 98 fa b7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 46 00 d1 b1 2f ab 58 ff ae 3e e1 90 df ac 17 | ff f8 20 d8 dc c8 64 44 8b d4 4d 64 77 87 0d 12 | 4f 58 f8 0b b8 23 de 06 cb 6a 5a 17 a1 ce 9c 0e | b9 8f d4 30 b1 62 d8 df cd 4c 66 72 94 9e 12 c2 | 2d 76 67 bf af 09 84 71 96 13 7f 13 e3 92 f9 eb | 91 ae c7 77 a0 91 b1 8b 78 4e 95 7f ad 59 ce f7 | 52 f5 ff c7 0f 12 41 0b 6a 23 2d 80 44 0e 92 7c | 8a 4f 11 47 2b 77 90 68 d7 a1 52 f7 6b 79 db 3f | 94 cd 89 b0 a4 aa 7e 64 52 6b 85 6e 03 da 1f ae | b6 90 2d d1 46 19 b6 66 ea b6 57 b4 c6 78 39 27 | 7f 33 c8 a1 bd 41 e7 ba 08 ef c1 2b 83 3d 1a a5 | d6 cc ec 96 a2 e8 29 ec 44 9c 54 bc 8b 9c d6 9b | cf 36 d1 9f c7 0e 2f 28 11 0b 73 2c 8d e2 76 0d | 66 d9 63 04 c0 20 e3 d1 af b2 68 91 e0 90 8f 15 | 8a 1a f5 c8 e3 0d 24 88 9a 72 7c ad a0 47 9a cf | 87 bf fe bc 41 93 5c 36 c0 33 07 c5 9e ea fb dd | 29 00 00 24 40 e8 32 3c 23 00 84 94 61 80 b2 17 | 1c a2 13 13 eb 56 70 6b 74 c5 2e 36 50 96 1d 9e | 9b cf 84 1b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 d2 f5 ad 3c 92 ba 81 0f fc 09 27 | bf 74 8b d6 da e0 d6 64 00 00 00 1c 00 00 40 05 | e3 ba 50 e3 10 b5 c6 17 22 3f 31 51 2e fe 55 bf | 2d 04 cf 9f | libevent_free: release ptr-libevent@0x7fb3500251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c018460 | #323 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa a0 9f 7c 98 fa b7 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #323 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #323 | rejected packet: | fa a0 9f 7c 98 fa b7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #323: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #349 | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #349 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #349 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49674.453361; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003112 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #349 | libevent_malloc: new ptr-libevent@0x7fb3500251c0 size 128 "road-eastnet-nonat-97" #349: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #349) | 84 94 92 07 09 8b 01 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e7 8e 3a 36 94 c3 d9 80 af 87 82 89 a3 71 41 9f | e6 44 09 3c bc 67 77 29 06 f4 ae 77 a3 9d 60 1d | 0a c3 1b 6a f7 b0 e9 13 94 a5 ce ce a7 52 56 d7 | 84 e9 4e d5 99 7f 7c fb f5 b7 93 ee 65 0d 15 55 | 04 2d a2 78 15 79 38 de 23 c4 7d 82 d0 7f 5f 98 | a6 33 cb b9 33 39 5b 48 a5 eb 5c 5c 81 d0 ca 8c | f1 d5 2b 41 d5 80 88 70 6d 08 d5 9e c9 be 4a d6 | 16 61 b8 6d a8 4e 60 a2 94 6c 33 db 5b 42 45 bb | 02 30 28 9a 37 b4 00 e3 81 c4 fd 79 89 1a f9 a5 | 2d 14 0f 8f c7 04 8a 63 e3 4c c8 23 59 80 dd 4f | 13 40 1c 8c 06 1f 4a 77 c9 3e 21 20 cb 58 47 cb | c0 5d 53 b2 99 fb 04 a7 a3 35 71 6b 00 88 75 8a | 99 0c dd 71 02 4e 48 62 56 32 bf a2 8c b2 87 7c | 45 a3 56 eb 30 b8 7e 62 54 0f 19 2a 8e 1f 1c bd | cc fa 91 16 33 60 18 c9 3d f1 ea d9 79 83 28 b3 | ee b8 50 9e a8 3a a5 db fe df 37 7d ce de f7 60 | 29 00 00 24 8e 8f cc b6 0d fd cb ad 0f 95 32 a9 | a9 4b b8 56 89 46 30 eb 8f f5 1c d9 09 ec 14 75 | 5c 37 d2 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea f1 98 2b 6b f5 c7 7c ec d8 88 00 | 36 4b b7 7c e3 5b 66 cb 00 00 00 1c 00 00 40 05 | 49 36 ed 90 92 0a 38 5a 43 cd 17 7a 90 9b e6 10 | 1f ed 97 63 | libevent_free: release ptr-libevent@0x7fb3380407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | #349 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 94 92 07 09 8b 01 c4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #349 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #349 | rejected packet: | 84 94 92 07 09 8b 01 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #349: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12bc0 | handling event EVENT_RETRANSMIT for parent state #271 | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #271 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #271 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49674.462648; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004731 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #271 | libevent_malloc: new ptr-libevent@0x7fb3380407f0 size 128 "road-eastnet-nonat-19" #271: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #271) | 7d 5f ba e3 47 14 e8 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 b7 7f 1c 9b af 52 72 9a 96 12 4e c3 f7 5f 8a | 48 37 54 79 d7 e3 fa 14 73 ed 20 d0 0f 82 32 1d | 91 7e 9e e7 72 47 b7 f9 8c ea 5f f8 df 55 12 c4 | 92 bb 9f b6 bd 08 63 49 16 85 39 f9 e1 a5 b1 3c | c9 58 9d 54 19 7c 80 7a 60 14 04 1b 66 54 39 2c | 16 d8 67 8c 1c 17 da 4b 4f 1f bb d2 83 f8 37 fc | 93 5f 92 af 49 5f 4c f2 18 ce 79 e8 01 4b 07 77 | 80 53 3f 3e 68 e0 6b 21 fa 6f 05 3a 1d 5f f9 c2 | 5b 34 da 08 fc 81 e1 b6 3f ef a7 e1 31 76 84 4b | db 66 e5 6b 4f 6c 18 0f ea 47 e4 2c 6a c6 c7 06 | 5d 0a 4e 6f d5 bc 0f 88 7b d7 82 6f 83 51 d3 f6 | 3f a3 4c ff 85 ee cb 4b c1 01 38 69 a0 a8 36 14 | 78 3e d3 db 38 75 17 e9 a4 a3 59 d1 1c af a4 4d | 60 05 9d fd 70 d0 ca cf 0e 66 4b c6 c1 40 c4 3b | 1b 74 97 05 ab 30 3b 52 e7 0a 00 36 d3 75 ae 4d | 76 9f 37 1c a2 58 eb 22 e1 c0 ab af b2 c0 c6 2e | 29 00 00 24 7c 82 5e 31 94 0b 65 4a 1d 71 08 ad | 0f 28 62 96 1d 12 64 f9 13 f9 d7 4a bb 8e a2 2a | 74 49 fb 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 80 df fd 55 81 8a 62 6a df 6a a7 | 9f a0 5f ab 49 a7 33 15 00 00 00 1c 00 00 40 05 | 73 c3 81 b2 53 ff c8 44 e3 9d 4d 41 12 c0 55 97 | b5 95 22 52 | libevent_free: release ptr-libevent@0x7fb36800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12bc0 | #271 spent 0.197 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 5f ba e3 47 14 e8 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #271 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #271 | rejected packet: | 7d 5f ba e3 47 14 e8 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #271: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.085 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25c40 | handling event EVENT_RETRANSMIT for parent state #369 | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #369 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #369 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49674.476074; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501171 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12bc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #369 | libevent_malloc: new ptr-libevent@0x7fb36800cf80 size 128 "road-eastnet-nonat-117" #369: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #369) | ff 18 31 cc 83 7e 2e ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 1f 06 e6 7b ea 4e 17 1c 87 7d 86 73 80 47 50 | cf bf e2 ff 09 37 6a 25 2d 87 f4 71 22 38 1c ca | 11 79 43 67 c5 65 1f f5 07 47 33 ad 73 a4 d3 73 | 51 54 fd df 5a c2 8d 18 cb cc 20 72 8e 07 68 eb | b6 8d ab 31 ba fd fa 9b 7c 59 57 b3 71 f1 91 34 | ea 4b 70 52 a4 6c eb 12 7d 01 23 58 56 9a d3 c0 | a8 35 4b 27 63 af ee d0 37 dd c7 3e 45 5a 0b 60 | bd 6d ed c4 e9 d9 c1 d7 e1 29 a2 3f dc 2c af 7c | e6 74 73 2b 26 15 ca 1c f5 95 b6 33 2f 8c 4a 22 | a1 8d d2 aa 72 d0 9b 41 c8 87 a6 d7 f8 13 c7 cd | 3c d8 62 e2 fc 64 74 ed 50 b1 79 e3 79 44 21 85 | 12 8f 6c 07 3b 37 80 9b 8c 83 41 c0 0e 38 b7 92 | 75 a7 4a 89 81 43 56 e9 67 ee 43 e0 24 9b 53 75 | b9 e5 d1 27 c1 f4 c3 83 7c 57 e4 5e 33 8b e2 10 | c9 ec fe 76 73 25 ae 4b 87 a7 e2 e5 89 5a 08 72 | fc 88 9c 69 9c 14 55 be f9 d1 24 d2 2a 6b bd 35 | 29 00 00 24 03 b6 58 fc c8 79 29 fe 43 44 80 31 | 59 cf 11 77 19 87 27 44 32 ac 84 44 78 ab c0 33 | d7 16 05 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a fa 34 e9 cb c2 b8 b0 71 3e db 9c | 1e f7 0a 0e 8d a9 9b 92 00 00 00 1c 00 00 40 05 | c3 12 1d 90 39 27 a3 80 ba dc 3c b0 c3 6a 52 2a | 1e d7 c5 9b | libevent_free: release ptr-libevent@0x7fb36c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c40 | #369 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff 18 31 cc 83 7e 2e ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #369 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #369 | rejected packet: | ff 18 31 cc 83 7e 2e ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #369: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0453 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab0dc0 | handling event EVENT_RETRANSMIT for parent state #125 | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #125 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #125 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49674.482336; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006278 exceeds limit? YES "road-eastnet-nonat-125" #125: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-125" #125: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #377 at 0x557d46a7d9d0 | State DB: adding IKEv2 state #377 in UNDEFINED | pstats #377 ikev2.ike started | Message ID: init #377: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #377: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #377; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-125" #377: initiating v2 parent SA to replace #125 | using existing local IKE proposals for connection road-eastnet-nonat-125 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 377 for state #377 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b25c40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #377 | libevent_malloc: new ptr-libevent@0x7fb36c012840 size 128 | crypto helper 8 resuming | #377 spent 0.0734 milliseconds in ikev2_parent_outI1() | crypto helper 8 starting work-order 377 for state #377 | RESET processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 377 | start processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #125 ikev2.ike failed too-many-retransmits | pstats #125 ikev2.ike deleted too-many-retransmits | #125 spent 2.34 milliseconds in total | [RE]START processing: state #125 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-125" #125: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #125: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #125 "road-eastnet-nonat-125" #125: deleting IKE SA for connection 'road-eastnet-nonat-125' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-125' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-125 | State DB: deleting IKEv2 state #125 in PARENT_I1 | parent state #125: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #125 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb380043300 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab0dc0 | in statetime_stop() and could not find #125 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 377 time elapsed 0.000632 seconds | processing global timer EVENT_REVIVE_CONNS | (#377) spent 0.684 milliseconds in crypto helper computing work-order 377: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 377 for state #377 to event queue | scheduling resume sending helper answer for #377 Initiating connection road-eastnet-nonat-125 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7fb34c023bc0 size 128 | crypto helper 8 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-125" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-125' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-125" | stop processing: connection "road-eastnet-nonat-125" (in initiate_a_connection() at initiate.c:349) | spent 0.0949 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #377 | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 377 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #377 | **emit ISAKMP Message: | initiator cookie: | 7d b7 6a 31 9c d6 86 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-125 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 49 bf 7a 35 d2 37 1e c0 a2 92 6a 98 80 72 24 5e | ikev2 g^x 1f 3c b2 01 23 5f 15 bf ce e9 e4 d7 08 a3 2a 60 | ikev2 g^x 60 1e 2a e8 5a e7 a9 d5 87 39 6d 3f 34 3f c0 1b | ikev2 g^x ca fe dc 77 c6 7e 84 64 73 35 57 0c ed b5 74 11 | ikev2 g^x bb 72 6b af 00 a6 5c 48 1d a9 ae e0 21 6e f9 6c | ikev2 g^x fe 77 59 9f 79 f0 27 e3 f8 d3 03 12 c5 8c 01 06 | ikev2 g^x 76 43 6f e7 91 25 19 a3 05 2c 5f 40 7b 60 ce d6 | ikev2 g^x c7 0a 22 7e c1 15 e4 29 ab c3 9b 6d 58 d6 08 88 | ikev2 g^x eb 2e fc 26 54 22 7d d9 71 73 77 93 47 47 52 c7 | ikev2 g^x 2f be 59 30 ba ca e1 78 87 6d cb 35 72 6f 4d 3b | ikev2 g^x a0 93 98 95 e4 6c 43 b1 50 a4 aa 69 98 d4 ed e8 | ikev2 g^x 9d 30 82 39 85 51 32 50 b9 91 12 7b 77 d2 d0 9f | ikev2 g^x 64 b8 21 58 96 89 58 eb 1b a0 e3 48 15 3e 58 3b | ikev2 g^x 7f 5d 13 52 09 44 ad 12 73 77 70 1d 29 a3 72 c1 | ikev2 g^x 6f bc 36 26 b2 07 f9 32 34 75 b2 cb 8d 27 b8 92 | ikev2 g^x 36 ef 06 e2 e3 5e 94 66 19 de e4 ee 30 db 10 64 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 40 c7 66 20 2c ab 25 81 a4 29 77 75 63 eb 29 35 | IKEv2 nonce 21 bb d9 a5 a3 5d 38 ec 5b 5c 03 34 11 83 53 07 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7d b7 6a 31 9c d6 86 e7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7d | natd_hash: port= 01 f4 | natd_hash: hash= a0 20 88 86 59 0d 66 18 17 be e2 6d 8e c3 55 fc | natd_hash: hash= 50 ba 92 3e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a0 20 88 86 59 0d 66 18 17 be e2 6d 8e c3 55 fc | Notify data 50 ba 92 3e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7d b7 6a 31 9c d6 86 e7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a3 24 68 23 82 72 27 ee 2c 96 9c 16 80 ee e0 88 | natd_hash: hash= 08 9f bc a7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a3 24 68 23 82 72 27 ee 2c 96 9c 16 80 ee e0 88 | Notify data 08 9f bc a7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #377 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #377: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #377 to 4294967295 after switching state | Message ID: IKE #377 skipping update_recv as MD is fake | Message ID: sent #377 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-125" #377: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.125:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #377) | 7d b7 6a 31 9c d6 86 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 bf 7a 35 d2 37 1e c0 a2 92 6a 98 80 72 24 5e | 1f 3c b2 01 23 5f 15 bf ce e9 e4 d7 08 a3 2a 60 | 60 1e 2a e8 5a e7 a9 d5 87 39 6d 3f 34 3f c0 1b | ca fe dc 77 c6 7e 84 64 73 35 57 0c ed b5 74 11 | bb 72 6b af 00 a6 5c 48 1d a9 ae e0 21 6e f9 6c | fe 77 59 9f 79 f0 27 e3 f8 d3 03 12 c5 8c 01 06 | 76 43 6f e7 91 25 19 a3 05 2c 5f 40 7b 60 ce d6 | c7 0a 22 7e c1 15 e4 29 ab c3 9b 6d 58 d6 08 88 | eb 2e fc 26 54 22 7d d9 71 73 77 93 47 47 52 c7 | 2f be 59 30 ba ca e1 78 87 6d cb 35 72 6f 4d 3b | a0 93 98 95 e4 6c 43 b1 50 a4 aa 69 98 d4 ed e8 | 9d 30 82 39 85 51 32 50 b9 91 12 7b 77 d2 d0 9f | 64 b8 21 58 96 89 58 eb 1b a0 e3 48 15 3e 58 3b | 7f 5d 13 52 09 44 ad 12 73 77 70 1d 29 a3 72 c1 | 6f bc 36 26 b2 07 f9 32 34 75 b2 cb 8d 27 b8 92 | 36 ef 06 e2 e3 5e 94 66 19 de e4 ee 30 db 10 64 | 29 00 00 24 40 c7 66 20 2c ab 25 81 a4 29 77 75 | 63 eb 29 35 21 bb d9 a5 a3 5d 38 ec 5b 5c 03 34 | 11 83 53 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 20 88 86 59 0d 66 18 17 be e2 6d | 8e c3 55 fc 50 ba 92 3e 00 00 00 1c 00 00 40 05 | a3 24 68 23 82 72 27 ee 2c 96 9c 16 80 ee e0 88 | 08 9f bc a7 | state #377 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b25c40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #377 | libevent_malloc: new ptr-libevent@0x7fb380043300 size 128 | #377 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49674.483757 | resume sending helper answer for #377 suppresed complete_v2_state_transition() and stole MD | #377 spent 0.474 milliseconds in resume sending helper answer | stop processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c023bc0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d b7 6a 31 9c d6 86 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #377 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #377 | rejected packet: | 7d b7 6a 31 9c d6 86 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7d fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #377: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0576 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37802a9a0 | handling event EVENT_RETRANSMIT for parent state #324 | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #324 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #324 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49674.517951; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005746 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab0dc0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #324 | libevent_malloc: new ptr-libevent@0x7fb34c023bc0 size 128 "road-eastnet-nonat-72" #324: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #324) | c4 71 4c 47 7a 99 7f 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c dc ba bd 1d 04 54 b8 de 2e 7e 4a 73 d1 75 b4 | 30 69 01 66 67 06 e7 5e ab 90 82 b5 8d a8 6f 99 | a6 8e f4 9a 71 40 de b0 d0 8a d9 b4 ed e4 6f 96 | 72 62 19 62 54 5d 4c 3f 06 3d 1e 94 b0 72 25 98 | 59 31 b4 12 f8 20 4c c4 1b 57 a8 cc e5 a4 fd 8e | b7 00 85 d1 0e c7 4d 3b 7a 7d 11 6d 19 fd 6a 75 | 3a e2 10 64 69 82 7f f7 9f 48 c9 57 2f a9 70 57 | 4e 17 87 f1 7b f1 ed 42 6c 69 0f 53 01 4f 76 4d | 49 de 7e 34 19 26 2c 17 55 79 6b 2b e6 70 a9 41 | 28 a8 e5 5c 9c 0b 01 88 ec 60 31 32 12 e0 5e 2a | d0 1f 1c 62 7b 27 a5 6a b5 82 73 7a c7 4d 6d 07 | a2 fe cc 3c f6 be 38 d5 e6 bc c7 f9 e4 e8 c4 66 | 25 de 6a 66 de d9 be 67 52 10 16 32 1e 81 04 70 | 2e 04 43 17 b2 33 75 6a 97 52 34 c2 f0 d7 69 62 | a8 cb 03 e7 cd 81 0c 55 75 a8 24 c4 ed 92 5e ec | 1a d4 65 0c 31 44 9a 04 50 cf 8e 45 48 fa 6a 9c | 29 00 00 24 a2 70 44 54 09 89 66 44 f1 6d a2 85 | b3 a0 4f a8 16 2e 01 ca af 0e 31 e7 7c 41 b8 c9 | 46 c7 99 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 0b 59 de ec 8b 84 8b 41 7c 2d 20 | 10 87 a7 ee 10 a7 dc 2a 00 00 00 1c 00 00 40 05 | 44 04 bc 04 96 6f cb 2b 3d a9 52 fe 2d cc 35 38 | 9a e2 35 2c | libevent_free: release ptr-libevent@0x7fb37801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | #324 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 71 4c 47 7a 99 7f 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #324 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #324 | rejected packet: | c4 71 4c 47 7a 99 7f 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #324: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa1f00 | handling event EVENT_RETRANSMIT for parent state #362 | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #362 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #362 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49674.522259; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000879 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #362 | libevent_malloc: new ptr-libevent@0x7fb37801a4e0 size 128 "road-eastnet-nonat-110" #362: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #362) | 79 e0 7b db bf e0 df 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 58 27 86 c5 f9 8c cf 89 68 d1 9e c2 2a c8 4a | da 7d d8 07 8a b5 64 43 22 f7 a6 30 97 ca b8 f5 | c8 25 5f 3f d2 8e be 62 d3 8d 6c cf 71 bf 76 63 | d9 07 8d b1 c5 9f c3 a7 b8 7e e5 00 03 0b c1 0d | 22 f4 89 95 0c d8 00 e4 8c ba a0 1b ac fa 89 c6 | 67 62 f6 a7 e4 8c 4f c8 c7 77 79 53 f8 98 39 2d | 3b 30 0a e1 da cb f1 fc f0 30 13 27 47 13 e0 65 | 0b da e5 87 6f 0e 6c c0 89 03 ab 2a 82 c5 34 95 | 15 34 67 de 5a aa b5 07 35 bc 95 aa 82 00 b1 16 | 8e 6b 21 e0 45 a5 66 95 6e 83 16 8f 2b ee 03 ef | 02 de 36 db b0 c0 f4 e2 d2 1e 0d be d8 91 f7 72 | cd 14 33 51 64 d5 dd d5 3d 65 70 28 c3 2f 57 3f | 4b 4b d5 8c f2 92 b3 0c 9f 8d a0 2f 9a 5f 9d a8 | 0d ae cd 5e 77 75 b7 48 bb 27 68 90 7e 0e 8d 10 | 86 bf a4 47 df bb 7b cb 34 23 b8 08 15 f3 7f 6d | 51 d5 ae f8 b3 60 44 e0 56 71 c5 a9 57 5a 24 c6 | 29 00 00 24 3b 79 7f e5 5c de f0 ae 26 7a 15 81 | 35 42 e6 f3 1d 66 3a 94 36 41 6a 99 ae e0 a8 96 | 08 73 ec d2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 91 48 5f b0 47 d4 61 2c f1 27 03 | 24 75 2b 95 c4 3a 3e 58 00 00 00 1c 00 00 40 05 | ec 66 fb 7f d2 86 12 b1 2b 4e 47 12 62 c8 23 32 | 13 d6 12 8d | libevent_free: release ptr-libevent@0x7fb3740356e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa1f00 | #362 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 e0 7b db bf e0 df 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #362 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #362 | rejected packet: | 79 e0 7b db bf e0 df 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #362: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ecc0 | handling event EVENT_RETRANSMIT for parent state #370 | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #370 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #370 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49674.534548; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500749 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa1f00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #370 | libevent_malloc: new ptr-libevent@0x7fb3740356e0 size 128 "road-eastnet-nonat-118" #370: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #370) | 4a 80 23 ad fc 41 99 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 13 bc 42 a7 35 39 b2 99 5a ec 69 08 73 18 3f | fe 31 dc bf 22 23 10 df 50 13 8d 04 9e ea 66 93 | 98 fa 79 7f 64 34 1f da 27 d5 8f dc 20 be 18 56 | 17 0e c5 53 3e a4 18 ed 82 41 0e 7f 91 9c e6 cb | ef 35 45 6e 59 c7 b5 4d 35 32 d9 63 30 b7 dd 5d | 28 28 04 d3 d6 a5 84 6f 4c f3 94 90 75 da df 42 | 5a 65 b6 2e cd 5e 42 3b 71 3e 46 f7 4b 13 d1 aa | a5 9c 11 b7 2c 83 34 92 e3 55 46 0b 4b 42 12 08 | 06 02 c9 42 46 42 d0 f1 82 14 36 15 1e 2e d4 a0 | 23 35 a8 d9 5e c2 f8 ca da 81 45 00 34 f6 88 47 | 2f 60 cc ac c2 4b 39 55 8a 1b 8f 66 b3 43 72 fd | 59 52 11 ef 5c 2c 9e b7 b7 6a c6 60 eb 22 9a 4d | e9 c0 4b de 56 c3 d3 e4 19 f0 86 9f a5 38 ef 26 | 39 fb ac 6e b8 32 45 c4 d1 f5 cc bb b2 2f 7b 0b | 6b 6b b1 6f 27 b1 bb 88 e7 c4 d6 31 26 e0 94 2a | ae 90 aa 75 e5 cb 3e 1f 43 13 d3 7b 3c ed 1e b0 | 29 00 00 24 a0 6f 08 ca 5f 92 e1 a2 10 08 5a 34 | 7d b6 05 db 65 e8 3d 88 a0 b3 7d 19 ed 75 36 c4 | 95 ec 9c 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 38 cd 57 b0 33 db 6c e3 f5 95 3e | 28 5e 17 44 43 d3 05 33 00 00 00 1c 00 00 40 05 | 6f b1 ce a1 45 d5 bc 6f 48 f8 db 92 31 a1 28 9a | ba c8 a7 2b | libevent_free: release ptr-libevent@0x7fb37c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ecc0 | #370 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 80 23 ad fc 41 99 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #370 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #370 | rejected packet: | 4a 80 23 ad fc 41 99 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #370: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #350 | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #350 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #350 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49674.536818; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002831 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ecc0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #350 | libevent_malloc: new ptr-libevent@0x7fb37c0300e0 size 128 "road-eastnet-nonat-98" #350: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #350) | 40 3f 8a 6a 3f ea 6b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee ea 5c 1b 2d cc 1b 57 9c 51 33 ce c2 ed 39 3b | d5 b7 1c c2 6d 3d 6f 5f ba 5c 85 39 fb a1 11 1d | ec 11 21 bd c2 b6 25 81 4a 85 2d 0f 85 73 9e fb | a1 4c 57 38 85 7e 31 44 0a 93 0c da 6d f0 93 22 | ea f6 8a 91 67 64 50 56 68 c0 c2 6d f2 4b e0 19 | 4b 14 40 46 ec 4d e3 7d d1 0f 0b 72 f6 ab 45 80 | 03 a2 d3 a8 ff e3 ae 4e 7b 0a 5c 1e da 4a b5 ed | 95 94 b9 4b 3c c2 85 4e cd 4a 91 b6 1f 72 c1 aa | c6 85 8f ca 28 3b ab 17 e7 f1 83 c4 ae 08 27 14 | 18 32 e7 a1 65 f1 da e5 f8 9c a1 45 4b c6 41 38 | 3d f5 8c c5 56 e5 06 ff b3 a3 fd f2 89 c2 8c 0e | 41 65 f9 6f e4 16 5e 64 06 38 6c 0e 32 c8 d5 26 | 50 db 25 f3 e4 e0 37 8b 04 62 7e a1 89 aa 8e 24 | 47 48 9e 92 05 5e 29 4c b7 2e ed e9 6d 8a 54 a2 | 85 8b e4 f5 76 e6 c8 0e c4 53 cb 98 41 4b 77 41 | 74 9f 3a d4 11 79 37 50 cf fb e2 04 ed 15 0c fe | 29 00 00 24 03 ee f5 21 ef 32 aa b5 bd 88 40 59 | 47 cc 90 0f 4b 5f 82 19 9f 96 a8 bf f3 8c 9d 85 | 66 d4 51 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 b2 cf 38 e9 ab 0b d5 10 0e c3 6c | 99 ae 6e 40 7a a8 97 3d 00 00 00 1c 00 00 40 05 | f6 5d 8e f9 dd 59 4b 5a 6d 88 5a 23 64 29 55 dd | f6 46 db 31 | libevent_free: release ptr-libevent@0x7fb370035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #350 spent 0.0863 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 40 3f 8a 6a 3f ea 6b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #350 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #350 | rejected packet: | 40 3f 8a 6a 3f ea 6b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #350: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #272 | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #272 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #272 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49674.548046; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005626 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #272 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 "road-eastnet-nonat-20" #272: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #272) | ff cb fd 37 8d 6e 61 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 04 b7 27 a5 a7 b8 66 d1 97 95 af 66 c3 e5 98 | ee b7 4e e8 fe 54 c0 2a 2c 35 b6 d6 11 41 10 b4 | 18 af 3b 75 f0 d4 8b ed 8c 54 fb a5 3b 9b 6b cd | 03 d4 cf 02 df ad 03 af ed 19 0c 47 fd 76 33 3e | 24 82 13 9d 24 33 be 90 d1 7f 59 52 78 71 71 b7 | d4 30 a1 93 8a 23 ef e8 5d 07 26 a3 58 a3 1a 46 | 2d 58 6b b7 bb c2 88 9f da 41 df 19 fa 55 01 88 | 63 f9 88 36 bf 3a 39 63 56 a1 2c 9c 43 fd a5 21 | f8 58 cf ff 69 0b 98 4e 19 2a 44 99 da 01 4c 80 | 0c 1f 77 fa 46 a9 9d c9 0d f6 84 3d b7 03 9e fa | 58 be 5a 4e 84 f9 db ea 37 27 1e 20 1a 6d 70 a9 | 48 8d a5 77 92 42 17 cb 45 b8 22 eb 9d 91 c6 90 | e3 e5 f3 a4 52 f9 ea e1 ca a2 a3 45 53 91 dc 5f | 97 6f 49 81 28 51 8e dc 29 b1 94 f1 3b a3 22 d7 | 94 cf 3a 4b 92 c4 95 64 a5 39 a2 3f 8c 62 a2 f6 | c1 95 97 06 70 da 53 50 e5 31 15 be f9 f5 d7 98 | 29 00 00 24 f6 15 1a 90 c8 9a 0e fb 04 05 1c c3 | 59 55 fa d7 2d f2 b7 dc b4 87 c3 61 27 da cc e0 | 74 b4 47 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee f8 1c 9f 4c fe 24 8c 43 92 80 29 | 12 02 33 5d 78 63 e2 5e 00 00 00 1c 00 00 40 05 | 82 23 9a b6 38 a9 7d af e0 d8 2e 1b 87 38 33 1a | f5 86 95 cf | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #272 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff cb fd 37 8d 6e 61 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #272 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #272 | rejected packet: | ff cb fd 37 8d 6e 61 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #272: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4bfd0 | handling event EVENT_RETRANSMIT for parent state #126 | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #126 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #126 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49674.559336; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007002 exceeds limit? YES "road-eastnet-nonat-126" #126: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-126" #126: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #378 at 0x557d46a7f400 | State DB: adding IKEv2 state #378 in UNDEFINED | pstats #378 ikev2.ike started | Message ID: init #378: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #378: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #378; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-126" #378: initiating v2 parent SA to replace #126 | using existing local IKE proposals for connection road-eastnet-nonat-126 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 378 for state #378 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aecb00 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #378 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #378 spent 0.0933 milliseconds in ikev2_parent_outI1() | RESET processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 resuming | crypto helper 12 starting work-order 378 for state #378 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 378 | start processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #126 ikev2.ike failed too-many-retransmits | pstats #126 ikev2.ike deleted too-many-retransmits | #126 spent 2.48 milliseconds in total | [RE]START processing: state #126 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-126" #126: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #126: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #126 "road-eastnet-nonat-126" #126: deleting IKE SA for connection 'road-eastnet-nonat-126' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-126' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-126 | State DB: deleting IKEv2 state #126 in PARENT_I1 | parent state #126: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #126 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3700251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4bfd0 | in statetime_stop() and could not find #126 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-126 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 378 time elapsed 0.000639 seconds | (#378) spent 0.683 milliseconds in crypto helper computing work-order 378: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 378 for state #378 to event queue | scheduling resume sending helper answer for #378 | libevent_malloc: new ptr-libevent@0x7fb34001e520 size 128 | crypto helper 12 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-126" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-126' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-126" | stop processing: connection "road-eastnet-nonat-126" (in initiate_a_connection() at initiate.c:349) | spent 0.108 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #378 | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 378 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #378 | **emit ISAKMP Message: | initiator cookie: | 92 97 bf d9 57 64 2b d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-126 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f5 7e 95 c3 59 64 68 1e dc 08 f2 0b df c0 d3 85 | ikev2 g^x e4 57 68 76 f4 90 dc 14 fc b4 13 07 10 44 a8 8d | ikev2 g^x 11 66 84 12 ea 03 ab ca df 00 f5 13 ba 15 16 97 | ikev2 g^x c3 ae f2 09 b4 c2 1e 65 f4 d4 ef 76 85 ff a3 4a | ikev2 g^x ac ec 61 57 66 09 9f 4c b2 b0 4b 1a 98 fe 62 e6 | ikev2 g^x 55 f4 45 b9 db aa 2b bf cb d7 f6 c7 03 42 ad 34 | ikev2 g^x c6 d8 65 c8 40 fd 09 2c 94 7c 3b f3 2f 0a 0e 1d | ikev2 g^x 89 ee 1f 04 2f 4d 06 ee d1 19 c4 2e 99 32 3d c2 | ikev2 g^x d8 62 64 5d 3c 19 32 29 e6 a4 d4 41 97 46 6e 74 | ikev2 g^x 98 69 50 bd e9 22 20 c8 a0 94 d0 e1 2c ac e0 d4 | ikev2 g^x 3d 6d 89 f8 65 d2 f8 6c 5d 07 8b 5f be 6f 9f a2 | ikev2 g^x e3 9a 7d 49 fc a1 b3 f5 34 84 25 08 1b bf 82 69 | ikev2 g^x 97 0b c6 17 ae 91 38 6f 37 30 af 60 73 cd d7 76 | ikev2 g^x 1c 53 8a ed 55 8d 3b a6 b0 09 19 d4 bd 91 ad 63 | ikev2 g^x d2 44 97 69 9c 25 f2 23 5f d4 fb c5 78 47 07 23 | ikev2 g^x 75 fb 33 32 09 b8 13 e4 4b fc ad 29 45 c0 60 e8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 45 ad fc 22 10 a1 61 46 e5 0c 1e 06 27 43 7b e2 | IKEv2 nonce 4e f3 c7 89 82 92 48 5f 08 ae ee 54 20 02 7f 19 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 92 97 bf d9 57 64 2b d9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7e | natd_hash: port= 01 f4 | natd_hash: hash= cb d4 ce a5 02 7b 5e 75 a8 72 0f 9e 6c 02 05 b4 | natd_hash: hash= a6 0e 08 51 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cb d4 ce a5 02 7b 5e 75 a8 72 0f 9e 6c 02 05 b4 | Notify data a6 0e 08 51 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 92 97 bf d9 57 64 2b d9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 67 63 47 aa c8 01 74 31 fc 9f e6 c6 9d 96 80 21 | natd_hash: hash= f6 7a 37 28 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 67 63 47 aa c8 01 74 31 fc 9f e6 c6 9d 96 80 21 | Notify data f6 7a 37 28 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #378 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #378: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #378 to 4294967295 after switching state | Message ID: IKE #378 skipping update_recv as MD is fake | Message ID: sent #378 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-126" #378: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.126:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #378) | 92 97 bf d9 57 64 2b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 7e 95 c3 59 64 68 1e dc 08 f2 0b df c0 d3 85 | e4 57 68 76 f4 90 dc 14 fc b4 13 07 10 44 a8 8d | 11 66 84 12 ea 03 ab ca df 00 f5 13 ba 15 16 97 | c3 ae f2 09 b4 c2 1e 65 f4 d4 ef 76 85 ff a3 4a | ac ec 61 57 66 09 9f 4c b2 b0 4b 1a 98 fe 62 e6 | 55 f4 45 b9 db aa 2b bf cb d7 f6 c7 03 42 ad 34 | c6 d8 65 c8 40 fd 09 2c 94 7c 3b f3 2f 0a 0e 1d | 89 ee 1f 04 2f 4d 06 ee d1 19 c4 2e 99 32 3d c2 | d8 62 64 5d 3c 19 32 29 e6 a4 d4 41 97 46 6e 74 | 98 69 50 bd e9 22 20 c8 a0 94 d0 e1 2c ac e0 d4 | 3d 6d 89 f8 65 d2 f8 6c 5d 07 8b 5f be 6f 9f a2 | e3 9a 7d 49 fc a1 b3 f5 34 84 25 08 1b bf 82 69 | 97 0b c6 17 ae 91 38 6f 37 30 af 60 73 cd d7 76 | 1c 53 8a ed 55 8d 3b a6 b0 09 19 d4 bd 91 ad 63 | d2 44 97 69 9c 25 f2 23 5f d4 fb c5 78 47 07 23 | 75 fb 33 32 09 b8 13 e4 4b fc ad 29 45 c0 60 e8 | 29 00 00 24 45 ad fc 22 10 a1 61 46 e5 0c 1e 06 | 27 43 7b e2 4e f3 c7 89 82 92 48 5f 08 ae ee 54 | 20 02 7f 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb d4 ce a5 02 7b 5e 75 a8 72 0f 9e | 6c 02 05 b4 a6 0e 08 51 00 00 00 1c 00 00 40 05 | 67 63 47 aa c8 01 74 31 fc 9f e6 c6 9d 96 80 21 | f6 7a 37 28 | state #378 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aecb00 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #378 | libevent_malloc: new ptr-libevent@0x7fb3700251c0 size 128 | #378 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49674.560603 | resume sending helper answer for #378 suppresed complete_v2_state_transition() and stole MD | #378 spent 0.328 milliseconds in resume sending helper answer | stop processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34001e520 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 97 bf d9 57 64 2b d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #378 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #378 | rejected packet: | 92 97 bf d9 57 64 2b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7e fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #378: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #325 | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #325 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #325 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49674.58582; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003413 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000f1f0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #325 | libevent_malloc: new ptr-libevent@0x7fb34001e520 size 128 "road-eastnet-nonat-73" #325: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #325) | cc 62 92 c7 07 e9 0f 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 78 1e 62 84 10 5f b3 3f 6a 1c 99 15 ef b2 82 | ab 2f bf af 7d 91 0a 7a 06 0b c3 b0 8f 52 23 e0 | 2a 6c c7 c4 de c8 66 7c 42 9d 81 5e 4d 92 4f 0b | 2b a2 91 3c a6 4c 27 12 5d 3b 8e 56 27 02 38 a0 | d6 c6 eb ec 94 e3 d3 7c 60 71 44 03 de ee 1c 20 | b0 a7 fc d5 f0 33 3d 58 40 9a 40 7c 4b ef 22 f2 | e4 98 7c df 9e 84 f0 00 c2 3a 23 ca 54 c0 d4 32 | 78 ec 09 e7 04 f1 06 b2 16 5d 5c 32 c7 62 b8 41 | 9e c8 62 f4 94 dc ed 85 b6 72 ee e7 73 a0 4e 8f | 20 26 e2 05 be 3a 4e 16 75 b9 60 31 64 9c 09 14 | ad be c7 c8 b5 48 83 aa 5c 33 7b 3c 0a 72 26 74 | 75 7b 8e 60 49 df aa 10 6d 2e c8 c2 08 b3 b5 75 | e0 b2 66 ad ea 56 f8 5f 65 d4 40 09 52 2c f1 dd | 08 91 8c 9a aa bf 76 e2 bf e4 1a 3b 53 96 c1 d8 | e5 63 67 aa b1 58 7e 5f 20 cf 8d 72 df da b4 0e | bf a9 5c cc d8 b0 81 7f 8f b4 f2 bf dd 09 8c 23 | 29 00 00 24 bd d5 db 94 ee 32 26 3b fc 5c d2 c6 | e1 33 da da 8c 36 b9 7d d8 b6 53 e3 83 8c 71 5a | ae 9b 26 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 04 08 e6 80 0c ed de 4c 99 bb 24 | eb 89 b5 9f d3 24 a6 8a 00 00 00 1c 00 00 40 05 | 55 23 78 6b d1 b2 f4 84 29 a3 9f e9 4d 04 41 1c | 82 df 78 f0 | libevent_free: release ptr-libevent@0x7fb34c00f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #325 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 62 92 c7 07 e9 0f 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #325 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #325 | rejected packet: | cc 62 92 c7 07 e9 0f 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #325: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0705 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368018460 | handling event EVENT_RETRANSMIT for parent state #363 | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #363 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #363 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49674.59023; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001827 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #363 | libevent_malloc: new ptr-libevent@0x7fb34c00f1a0 size 128 "road-eastnet-nonat-111" #363: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #363) | 51 61 7f 08 48 15 06 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 a4 74 58 c5 f7 d1 13 97 f0 a1 32 ec ba 3b 12 | 2a d1 a7 2b 3c 6a 89 b1 af 9f ef 60 99 3f 2b 97 | 5a 99 67 3e 04 49 9e e1 18 dd 5b 9a 36 f4 31 c2 | 53 fb e0 15 b1 f1 17 18 c0 6a ef 59 2d 9b 43 90 | f2 8c 3e 64 6c 64 9b 41 4d c8 83 ed 81 03 01 ef | 94 98 ac cb 77 3f 19 e2 3d 9a 98 04 76 6b 13 b3 | cd 7b 90 ce b0 33 d0 e1 b7 52 ee 6b 51 23 7a ea | a8 cb 6b 19 dd 2c 75 92 bf 4f 96 8d 61 90 60 ba | ac 55 20 f8 f6 10 ca 5a 43 53 71 3b 48 a8 5f 63 | 88 26 59 cb be 95 f5 90 58 5a 07 1f 8c 1f 49 2e | ab c9 b4 33 89 02 d4 f8 ad 34 05 81 7c 83 7c ee | b9 f5 ea 3c 82 86 1f 8e fd dd f8 79 c6 1d d2 66 | eb 43 cd 6b f4 5d 2f 21 06 e6 55 35 36 2a fc 16 | 28 b4 a8 e2 ec 6d b6 b7 1a 42 16 71 43 4d 93 a5 | b9 be 7c 8b c2 15 e3 5b 72 eb 03 26 dc 93 d9 17 | b6 f6 7f 82 7f 35 e0 76 a8 41 7c 2a 12 6a fc 61 | 29 00 00 24 05 ae 65 e3 84 b1 1a 26 06 06 7b dc | a8 83 38 36 54 1a c8 5b 72 97 b6 83 dc f9 79 7c | dc 6e a1 e8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 05 ad f7 99 b0 88 ad 41 82 57 31 | e5 ff 67 18 3e 77 ff e2 00 00 00 1c 00 00 40 05 | a3 ac d5 a3 ef 34 92 9f a8 df c6 0f 83 0b 12 93 | d2 32 5e d3 | libevent_free: release ptr-libevent@0x7fb37c01fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368018460 | #363 spent 0.0843 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 61 7f 08 48 15 06 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #363 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #363 | rejected packet: | 51 61 7f 08 48 15 06 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #363: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0472 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #371 | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #371 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #371 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49674.594454; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50026 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #371 | libevent_malloc: new ptr-libevent@0x7fb37c01fd50 size 128 "road-eastnet-nonat-119" #371: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #371) | ea d3 d9 fc 5b 7e b4 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 af 47 0e 69 de 58 3a 2d 1e 57 76 30 bc 22 a4 | 2e b6 88 1e b3 88 e7 a1 c8 be 2b 4e 69 e2 28 01 | d0 52 c1 fa 78 94 10 52 aa 87 89 5a 02 a4 2d d1 | 6b d9 9b 86 d2 da a0 98 26 8e b9 2f 8a a2 27 af | de 72 28 ad 98 97 b6 15 90 9c ae 3a 16 ae 38 00 | 2e 00 fb 22 bb 46 e6 d4 1f 46 0d dd a1 55 00 4a | ce 15 02 1f 97 d1 0a 8b 6a 9c c8 a8 24 2f 84 76 | 4b d2 ac 8c 05 c7 63 26 60 5d b2 3c e7 66 a9 5d | bd fb b9 24 84 be 9f 9f d0 98 db 75 76 42 5a 2c | 99 3f 96 7c cd 86 57 c4 8b f7 47 04 8d 56 1e 36 | 87 53 98 86 58 32 c9 ce 17 26 19 6b 99 a4 da aa | cb 3c 40 8e 29 32 f1 cd b7 5a 34 1f de 2b 31 8c | 0d 44 f0 ee 94 1a 31 39 88 2c 28 df 02 20 48 5d | 9d 67 4b c6 5a 1a 30 81 19 09 4e 1b ac 9d a3 80 | 78 a7 b1 0a 79 f2 60 13 6a a0 1a 0d 01 b3 b3 40 | 74 bb ba 1f 20 2b 3c 36 9e 56 74 1c ba 16 9e 5f | 29 00 00 24 c2 25 48 18 a9 32 86 16 98 b5 8a 9d | 56 ab 3c 59 82 6e f2 93 a8 6a ca 20 09 df d9 6f | aa 1d 6f e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 eb 88 f4 ae c4 a3 7b f7 07 ac 42 | 0d c0 83 df c2 98 39 e6 00 00 00 1c 00 00 40 05 | 0c 73 7d f6 90 2f 67 26 fc 28 2f df 9c 80 3e da | bc 60 3a 9d | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #371 spent 0.099 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea d3 d9 fc 5b 7e b4 e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #371 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #371 | rejected packet: | ea d3 d9 fc 5b 7e b4 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #371: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0484 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800cc10 | handling event EVENT_RETRANSMIT for parent state #351 | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #351 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #351 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49674.631761; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00228 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #351 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 "road-eastnet-nonat-99" #351: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #351) | de 65 5f af ec 9c 14 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 61 44 ff 3b 7e 79 78 30 98 a5 1d ec cd 39 0f | a6 1b 66 bf d1 4c f4 43 49 5b 37 74 a3 cb a8 c4 | 02 cd b2 04 1f 9b 50 46 08 d0 17 33 f5 19 85 e1 | a2 5a 8d ef 3b 1f 98 53 d1 3d 4a 2f ac 4f 19 d0 | 75 e8 7a 46 60 ff e1 45 61 55 45 47 1e ee 0e a7 | 97 fc 88 fd 13 ff 6e 23 a4 a1 77 61 b8 b4 8c fd | 22 67 ad f7 22 ca bf 94 41 28 f0 31 09 ce da 26 | 10 fa 8e 66 f4 04 b3 cf 07 07 c2 53 27 d6 cc 39 | 2e fc 33 61 76 a3 a9 c9 4a 2e 0c b9 d2 ce 1e 75 | 25 69 23 a7 b0 58 cb 85 2c 74 fd 6d 3e 51 8a ff | 12 ff 22 b0 95 e5 25 84 fd 26 ce 3e 10 f5 db d4 | fe ab 71 45 0f 50 b9 5c e4 ab 89 ce f3 bc f0 b4 | b1 6f 9b 78 15 e0 b4 c0 f6 ed 55 2b 17 d3 9e 21 | ed d2 5e 21 58 74 e4 d8 96 cd 20 e3 10 b4 fa 8b | 7f 1f 1a 01 c5 db 60 d3 81 25 a3 55 50 d2 42 6d | 88 7f 5d 84 22 e5 ff 47 18 aa ac 46 b6 f6 e6 e3 | 29 00 00 24 5e 0c 91 cb 9e cc c4 3b ec b3 88 06 | 52 11 4c 47 a6 59 04 4b 44 ce c4 33 03 72 36 ef | b1 45 a0 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 90 e3 e4 9d 06 64 22 91 ff 91 cd | 3f cb ba 24 72 7e a3 02 00 00 00 1c 00 00 40 05 | 98 60 2c ab 59 ec de c3 24 7f bd 6f 4e 02 75 9a | 41 d6 b1 3b | libevent_free: release ptr-libevent@0x7fb33801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800cc10 | #351 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 65 5f af ec 9c 14 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #351 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #351 | rejected packet: | de 65 5f af ec 9c 14 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #351: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0752 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a94500 | handling event EVENT_RETRANSMIT for parent state #364 | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #364 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #364 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49674.654158; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002166 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #364 | libevent_malloc: new ptr-libevent@0x7fb33801a4e0 size 128 "road-eastnet-nonat-112" #364: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #364) | 33 be fb 4e a0 1f 6e f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 2a 42 5d a7 d8 6e 30 43 82 cd c7 8b 99 36 58 | d8 cb c2 34 66 ff 8a 30 2d b5 6a f0 e0 25 f9 40 | 18 b9 ba e3 e0 90 ff f4 cd 9b 1b 34 38 ee bc bc | a0 41 ef 4f 47 94 f5 37 14 2e 5c 6e 0f a6 94 db | 88 81 75 e1 ca 78 c8 9f 91 97 49 cc 62 0b 7c 24 | 05 6f 34 9d ba a1 13 0a 58 7e 2f 7a ad f7 32 fc | 1d 0c 87 25 75 e1 21 b8 48 fb 8f 7c d6 35 a3 1a | ae f0 b3 f0 3b da b9 9b f9 3d d2 6d c0 fe 81 68 | c2 c7 a1 4c 73 5e 1c b4 3a 58 ed b8 29 5f 91 4a | f8 66 00 af 13 4e e2 0d 66 a8 97 6e 0e 81 4f 92 | 8c 69 2c e3 38 08 3d ee 34 5d c4 0d 5d 92 19 a0 | ed a9 9d c5 1f 5c c0 55 9f 77 6e f9 34 95 4c 9a | 1b 67 cf ca 63 f1 13 a2 4f fd 39 a9 a7 28 45 69 | a8 39 46 14 38 17 c4 c7 52 5d 03 e8 bd 24 28 07 | 48 28 79 7d f7 c5 f9 df 10 a1 d2 ba 0c 72 5c 57 | de c7 d6 50 9c eb 46 ad 18 84 34 9f f7 a9 0f 36 | 29 00 00 24 57 1c 59 6e 8c 59 64 04 26 7e c7 7d | 57 3e 20 cd ce 8c 1c 54 8d 44 77 eb 53 6a 1b 23 | 5a 68 d6 45 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 b7 ef ef bc 35 4f 63 6b 7a c6 35 | bb 1f b7 d6 68 94 93 4f 00 00 00 1c 00 00 40 05 | 20 e3 22 42 33 64 b9 da db 7f 44 ff d7 76 e4 71 | c9 1d dc 40 | libevent_free: release ptr-libevent@0x7fb35804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94500 | #364 spent 0.175 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b1ae40 | handling event EVENT_RETRANSMIT for parent state #326 | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #326 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #326 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49674.654396; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004593 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94500 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #326 | libevent_malloc: new ptr-libevent@0x7fb35804b850 size 128 "road-eastnet-nonat-74" #326: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #326) | 42 f4 17 bf 0b bc 36 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 f1 42 33 74 d0 fe 82 a0 d4 22 fd 7e 34 64 49 | 4d f5 d3 8f 3e 37 b5 af 12 9f 05 ef b3 72 9a 99 | 78 df 2d 2f c1 8c de 77 86 8e 9d 6b 67 d9 af af | ad cd b2 74 66 27 67 e3 45 6f da e1 b8 1d 10 12 | aa 54 5a 52 9a fc e0 30 8f 8b 79 31 12 59 11 92 | 5a a1 07 c2 c4 b1 d0 f4 f9 0f 04 f7 fe f9 b1 b9 | c8 5b 99 45 a3 87 06 f5 cc 08 82 18 bb f1 79 c6 | 9f 6d fc 2f c8 a5 4a bb b2 a8 2f 54 59 10 ab c2 | 83 cd 07 a2 e9 49 2a 19 10 9b b3 c3 b9 59 af 8a | 82 ad ef ed 34 d0 18 f1 8e 6d d9 f9 1b 1e 64 1d | ec 20 a9 3c a9 39 c4 6f 5c 5b 8b c5 2f aa 09 df | 17 b3 bf d7 16 36 cf cd 3e 0b 96 b5 5a 10 91 84 | f4 f3 63 75 93 27 25 04 41 5d c2 9e 4a 8a 6e e8 | b0 1c 23 7f 1d 44 0d 90 e6 7c 9c aa 0e b4 1e 03 | 9a ca 50 45 b0 6c ee 84 fe cf 35 d4 8b f6 71 45 | c0 43 28 23 ec 38 bc a8 e6 b5 85 28 d9 a1 fe 85 | 29 00 00 24 f7 60 f4 89 79 23 81 74 40 fe e0 94 | 99 4a 8a 5f b0 ba 18 0a 74 b7 e9 e4 4c 15 74 6f | 38 fd 32 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 0a 23 00 01 aa ce 92 9c 9e 81 0a | b1 b8 dc a9 c7 b7 f1 4a 00 00 00 1c 00 00 40 05 | 06 aa ce 4d 77 27 34 16 db f8 8e b3 38 da ae 93 | 3f 43 ba fe | libevent_free: release ptr-libevent@0x7fb3680407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1ae40 | #326 spent 0.197 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a94540 | handling event EVENT_RETRANSMIT for parent state #127 | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #127 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #127 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49674.654636; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010073 exceeds limit? YES "road-eastnet-nonat-127" #127: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-127" #127: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #379 at 0x557d46a809c0 | State DB: adding IKEv2 state #379 in UNDEFINED | pstats #379 ikev2.ike started | Message ID: init #379: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #379: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #379; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-127" #379: initiating v2 parent SA to replace #127 | using existing local IKE proposals for connection road-eastnet-nonat-127 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 379 for state #379 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b1ae40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #379 | libevent_malloc: new ptr-libevent@0x7fb3680407f0 size 128 | #379 spent 0.161 milliseconds in ikev2_parent_outI1() | RESET processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 resuming | start processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 5 starting work-order 379 for state #379 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 379 | pstats #127 ikev2.ike failed too-many-retransmits | pstats #127 ikev2.ike deleted too-many-retransmits | #127 spent 2.28 milliseconds in total | [RE]START processing: state #127 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-127" #127: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #127: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #127 "road-eastnet-nonat-127" #127: deleting IKE SA for connection 'road-eastnet-nonat-127' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-127' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-127 | State DB: deleting IKEv2 state #127 in PARENT_I1 | parent state #127: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 379 time elapsed 0.001574 seconds | (#379) spent 1.58 milliseconds in crypto helper computing work-order 379: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 379 for state #379 to event queue | scheduling resume sending helper answer for #379 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | crypto helper 5 waiting (nothing to do) | stop processing: state #127 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94540 | in statetime_stop() and could not find #127 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 be fb 4e a0 1f 6e f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #364 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #364 | rejected packet: | 33 be fb 4e a0 1f 6e f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 70 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #364: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.134 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 f4 17 bf 0b bc 36 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #326 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #326 | rejected packet: | 42 f4 17 bf 0b bc 36 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4a 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #326: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.111 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-127 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-127" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-127' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-127" | stop processing: connection "road-eastnet-nonat-127" (in initiate_a_connection() at initiate.c:349) | spent 0.102 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #379 | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 379 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #379 | **emit ISAKMP Message: | initiator cookie: | ac d4 3b e7 18 ea 52 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-127 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 44 79 a1 28 22 6c 83 3f 06 54 d9 39 13 0e d2 1a | ikev2 g^x 91 c2 ca c5 f2 c4 4e d5 78 8f 04 34 b9 34 73 b2 | ikev2 g^x 0e 75 71 ec 03 a6 5b c6 fa 6d a8 f4 41 1e af 26 | ikev2 g^x a4 e1 0a 58 77 48 aa f7 f9 4b 31 cf 6b f4 65 97 | ikev2 g^x 07 66 c4 32 08 bd d1 a1 48 aa 20 4b 65 4e 17 6e | ikev2 g^x 1d 1d 3e be b4 1e 7a 49 6a 64 0a fb 44 89 ba 45 | ikev2 g^x 90 86 8a 0e 4e 08 c0 05 da d1 a0 ff 5a ee c2 33 | ikev2 g^x ff d9 1a 6f ee 08 fd 7e aa 64 53 f4 84 74 c5 cf | ikev2 g^x 19 1a 29 d4 bf 47 bd 52 17 99 38 57 75 f7 85 58 | ikev2 g^x a7 b0 c8 4e e1 95 2d 4b f1 9c 5e eb 85 14 0d 87 | ikev2 g^x ff dd 17 9a ad 51 c0 99 e2 a6 60 c5 a5 7e 68 46 | ikev2 g^x b9 5c 04 3b 76 a0 9e 3d f7 9a 42 72 b5 92 be a4 | ikev2 g^x 61 c4 dd 5e a0 a3 58 05 90 20 32 7d b8 9d ca 34 | ikev2 g^x 36 d3 6d 56 98 49 60 97 da 87 f8 14 51 ea cf 16 | ikev2 g^x 79 9b 7d e5 00 7a 74 76 25 99 77 5a ef df a7 1c | ikev2 g^x e5 07 de ab dc 8b 19 85 17 de fd 62 d8 d6 3b b0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7a e9 60 d7 4c 8b 32 bf 82 0a a8 9a c0 af 7e 52 | IKEv2 nonce e6 dc b9 f1 3b fb 0d 8e 4f c7 9d 86 5c d7 7a af | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ac d4 3b e7 18 ea 52 07 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7f | natd_hash: port= 01 f4 | natd_hash: hash= 8b e2 54 69 3e 49 d9 e9 7b 2c 62 f7 a1 9b 3b a0 | natd_hash: hash= 68 bf 42 11 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8b e2 54 69 3e 49 d9 e9 7b 2c 62 f7 a1 9b 3b a0 | Notify data 68 bf 42 11 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ac d4 3b e7 18 ea 52 07 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 0c ab 0f ab 0f 86 37 d7 85 f7 e9 a7 f4 f2 01 1e | natd_hash: hash= 28 ca 40 2a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0c ab 0f ab 0f 86 37 d7 85 f7 e9 a7 f4 f2 01 1e | Notify data 28 ca 40 2a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #379 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #379: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #379 to 4294967295 after switching state | Message ID: IKE #379 skipping update_recv as MD is fake | Message ID: sent #379 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-127" #379: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.127:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #379) | ac d4 3b e7 18 ea 52 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 79 a1 28 22 6c 83 3f 06 54 d9 39 13 0e d2 1a | 91 c2 ca c5 f2 c4 4e d5 78 8f 04 34 b9 34 73 b2 | 0e 75 71 ec 03 a6 5b c6 fa 6d a8 f4 41 1e af 26 | a4 e1 0a 58 77 48 aa f7 f9 4b 31 cf 6b f4 65 97 | 07 66 c4 32 08 bd d1 a1 48 aa 20 4b 65 4e 17 6e | 1d 1d 3e be b4 1e 7a 49 6a 64 0a fb 44 89 ba 45 | 90 86 8a 0e 4e 08 c0 05 da d1 a0 ff 5a ee c2 33 | ff d9 1a 6f ee 08 fd 7e aa 64 53 f4 84 74 c5 cf | 19 1a 29 d4 bf 47 bd 52 17 99 38 57 75 f7 85 58 | a7 b0 c8 4e e1 95 2d 4b f1 9c 5e eb 85 14 0d 87 | ff dd 17 9a ad 51 c0 99 e2 a6 60 c5 a5 7e 68 46 | b9 5c 04 3b 76 a0 9e 3d f7 9a 42 72 b5 92 be a4 | 61 c4 dd 5e a0 a3 58 05 90 20 32 7d b8 9d ca 34 | 36 d3 6d 56 98 49 60 97 da 87 f8 14 51 ea cf 16 | 79 9b 7d e5 00 7a 74 76 25 99 77 5a ef df a7 1c | e5 07 de ab dc 8b 19 85 17 de fd 62 d8 d6 3b b0 | 29 00 00 24 7a e9 60 d7 4c 8b 32 bf 82 0a a8 9a | c0 af 7e 52 e6 dc b9 f1 3b fb 0d 8e 4f c7 9d 86 | 5c d7 7a af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b e2 54 69 3e 49 d9 e9 7b 2c 62 f7 | a1 9b 3b a0 68 bf 42 11 00 00 00 1c 00 00 40 05 | 0c ab 0f ab 0f 86 37 d7 85 f7 e9 a7 f4 f2 01 1e | 28 ca 40 2a | state #379 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3680407f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b1ae40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94540 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #379 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 | #379 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49674.658135 | resume sending helper answer for #379 suppresed complete_v2_state_transition() and stole MD | #379 spent 0.963 milliseconds in resume sending helper answer | stop processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb344009640 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac d4 3b e7 18 ea 52 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #379 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #379 | rejected packet: | ac d4 3b e7 18 ea 52 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7f fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #379: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.106 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350012bf0 | handling event EVENT_RETRANSMIT for parent state #273 | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #273 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #273 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49674.660444; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005489 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4bfd0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #273 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 "road-eastnet-nonat-21" #273: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #273) | ed 1f ad f4 73 76 3f ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad fb 2c d6 61 18 78 ff ff 9e ac 8e 11 6e 5b 0a | 17 90 d5 cd a5 72 c6 44 33 06 36 88 ef 85 f7 fd | d1 32 bf e5 b4 df 1c 2a 44 4b 64 5a 5c fa a6 e7 | a7 88 cd 98 18 db 83 1c de 12 34 1a 01 c0 6e 90 | b0 37 b6 8e 3f bc 29 ae 17 56 d9 4e 3e aa f9 1a | 05 22 37 90 a3 98 0c 9d fd 31 f5 89 2b 79 38 70 | a3 3c e3 a6 be b6 20 06 92 92 77 84 f9 e1 f6 43 | 50 c4 75 3f ce 2c 7f a3 83 07 1e 29 12 48 86 d5 | b6 e2 61 df c8 2b 9c ea 45 c9 6b 62 38 f9 06 23 | 9b a2 90 c4 51 19 47 e4 c9 9e bb 38 c5 ea 4c 2c | 24 15 a0 60 6e 12 c1 7a cd 75 9f 6a 97 65 4f 9f | 6f aa 7c 8b b3 99 29 be 41 56 ad 5d 52 77 c8 87 | f1 18 76 ec 44 be fb bf 14 5e 22 ec 7b 78 cb 22 | 16 62 54 b4 5f 5e ed e0 38 14 64 69 82 ec fb 0f | 84 be 3a 69 27 17 b5 b0 42 81 a7 3b e2 19 f7 47 | ac 1d 3d ca 8c d0 ae cf 0d f7 a8 a2 36 9e 94 83 | 29 00 00 24 a4 16 d5 7c 26 cc bd 52 fc 33 91 77 | f2 08 cb df 04 12 5c f5 f3 31 f7 87 08 22 5b ef | 2b 8c 5b 44 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 3d 78 9d 41 51 b9 57 ea 0d 4a 5f | 38 c6 cb 30 ec f2 21 4b 00 00 00 1c 00 00 40 05 | bd ec 33 2a 1b 35 fa ad 7a ef 73 f7 d9 b0 09 33 | b4 e9 3f 2e | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350012bf0 | #273 spent 0.237 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 1f ad f4 73 76 3f ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #273 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #273 | rejected packet: | ed 1f ad f4 73 76 3f ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #273: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.116 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28ab0 | handling event EVENT_RETRANSMIT for parent state #372 | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #372 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #372 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49674.663981; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501235 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #372 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 "road-eastnet-nonat-120" #372: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #372) | 36 75 19 e8 2f 22 a4 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 1c 43 17 d7 b5 ce d2 b8 29 b2 bf 57 09 8b a5 | 02 ac c4 b7 76 e6 2d d8 ee ee 3c fe f4 66 f4 89 | f0 05 d4 6f 70 58 f2 ac a3 f6 a0 c0 6f e2 88 9c | 40 3f 21 b6 b5 e3 53 20 6c d9 59 5c d3 ed 29 31 | 70 b1 e2 00 f7 0a fb f6 8a 39 29 d2 58 c2 74 92 | 4c 9b 08 3f 44 b8 04 b0 23 1d ad 99 96 41 5c c3 | 74 17 1f 67 0a d8 d1 96 a3 e0 b8 c3 31 5e 35 15 | b4 7d 07 ac 51 6c 39 25 b1 04 61 4c b1 08 c3 a9 | 03 2e 6c 07 f6 12 ea 26 ae ed 42 10 86 bf 00 1f | 2c 3f d3 c3 05 31 1b 23 d0 7f 44 40 17 23 be b1 | ac f2 d9 5c 2d 0f 0e 8d d6 8e 02 9e c2 0d 39 2a | 1e 53 92 9d 45 7f f8 25 a0 3b 40 14 ce aa d7 8e | 3c 97 d8 0a 68 34 c5 e0 01 c0 9d 3c df ab b9 db | 0f 08 4e 9b 7f 31 ba b0 df 14 c3 2e b6 43 df 9c | e8 24 93 e8 93 fa be d8 05 20 58 54 dc 18 b6 a1 | 81 c2 54 d8 9d 63 fd 0b 60 e1 78 75 ef 13 d9 ec | 29 00 00 24 5b 70 e2 22 fb be c5 61 40 e7 92 1f | fe 03 7b 3d 26 2b 9e 50 62 fe 14 ef 7e 0b e5 c1 | 7b 5b 83 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6f bb b6 72 03 25 00 b3 08 33 f3 00 | 3f a7 05 f9 e6 64 00 bb 00 00 00 1c 00 00 40 05 | 5c 2b 76 69 54 27 3e cb 36 ec 86 9b 13 f7 89 7b | 0b 66 55 89 | libevent_free: release ptr-libevent@0x7fb36c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28ab0 | #372 spent 0.178 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 75 19 e8 2f 22 a4 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #372 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #372 | rejected packet: | 36 75 19 e8 2f 22 a4 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #372: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0834 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #352 | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #352 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #352 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49674.716401; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002583 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28ab0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #352 | libevent_malloc: new ptr-libevent@0x7fb36c0407f0 size 128 "road-eastnet-nonat-100" #352: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #352) | 3c 05 1d c4 fe 50 38 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 64 8b 09 fa 7a d8 0e 19 4a a4 83 62 a1 a5 5a | 68 fc 46 c2 41 24 c2 81 0b b7 86 21 9c 81 02 7e | 4c e7 e3 a1 0b b2 cb 85 40 50 15 e6 9b 8e ec db | 69 e6 fa 1a ac be 36 c2 a1 ef 3e db b6 5e 52 af | 7e 52 8f f4 e4 02 53 3c 7f 96 73 09 3f 4e 1d 14 | 6d c2 31 fa 5c 39 98 fc 2c b5 f5 9e 00 af 34 e4 | 5f b6 a3 65 94 fe 46 6a 1b e5 e1 4a 56 bd a5 cf | 0a 77 7e 2c 49 79 6d b8 e1 4a 50 3f 05 7c c4 09 | eb 02 3b 50 92 11 5f 9f 53 e6 1e bd 8d 02 31 1b | ce 66 73 68 3b 0d 47 9f bd 24 08 62 f6 ab c3 d7 | a4 43 e9 f4 a6 cc 3c 8d f5 af 10 2b 54 da 75 ae | 02 35 c6 d0 b8 2f b0 bf cd b2 cd e7 d2 23 bb 30 | 31 a6 56 6a 41 57 91 fb 46 1d ee de f8 63 bc 4e | 2b 81 4f df b1 c0 cc c0 21 f9 64 98 54 3d 15 93 | 9d f2 7c 39 a9 8b 0c c2 f7 bb 99 15 ac 9c c2 51 | 1b f2 0a ec 9e 8c 56 18 67 8a fb 62 ed 27 4d ad | 29 00 00 24 a2 bb a3 dc 18 69 ac 45 10 e2 b1 d4 | a3 1c d3 0a 99 a1 33 f7 93 76 f6 b4 72 bd d3 aa | d5 07 c1 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 31 52 a7 9d 89 a3 6a 1c 72 78 4c | e5 d1 1b 1c 74 f4 f6 22 00 00 00 1c 00 00 40 05 | fc b9 a7 1f 0a 98 43 79 23 71 2c ac b0 a5 bd 76 | ba 72 e4 ab | libevent_free: release ptr-libevent@0x7fb3700300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #352 spent 0.184 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c 05 1d c4 fe 50 38 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #352 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #352 | rejected packet: | 3c 05 1d c4 fe 50 38 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #352: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.117 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #365 | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #365 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #365 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49674.723881; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00187 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #365 | libevent_malloc: new ptr-libevent@0x7fb3700300e0 size 128 "road-eastnet-nonat-113" #365: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #365) | 85 67 19 58 d7 3c f0 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 c9 07 e2 a7 25 a6 09 ab 7f e9 5d 7e 7f 47 e1 | 9f 44 d1 91 14 4d 9b 8f 5d 22 2a 52 a8 98 ff b2 | 6b 6a b0 36 7f fd 95 da a0 25 8f 6e 16 7f 04 38 | 86 c2 bd 33 bf fc a5 26 c4 b6 f6 70 3e fd c6 4a | 25 c8 b3 a8 9f a8 44 89 83 a1 8c aa b8 af 7f e3 | 16 bb 17 56 79 89 e8 f0 01 49 b8 07 c4 c2 fd 27 | 4f 8e 62 66 4b 11 2b 01 9f f2 8c 2a 44 d1 a6 b0 | 37 65 5b 66 a4 8d e5 2d a7 91 fd e3 72 91 ef 62 | 52 0e c8 e1 f3 04 05 43 a3 3a 3c 61 1b d7 eb bd | 6b 38 06 f9 ff f3 a7 b2 e7 89 6b 9c da 79 fc be | 85 2e 71 9d 7f 61 aa 1d 41 bd c5 f4 78 4a e7 2c | 3d fa 74 f7 ca 33 00 f8 ee a6 a8 8a 16 63 2d 1b | 61 9d fa 4c a8 ca 3a 31 b1 cd 60 8d cb 56 88 b6 | 81 05 15 ed cf 3d b4 c9 19 7e d9 8d 29 23 d3 64 | ec 0b 35 05 39 3b e0 f1 75 19 f5 f3 4f 99 e8 61 | bd bd 06 53 be 50 6f 6a cb bc 2d c6 18 e6 53 b2 | 29 00 00 24 e5 25 b4 c0 9c 12 3e 53 68 a2 43 fb | 88 db 47 7b b4 96 4d ec 31 20 f7 c3 1c a9 eb e1 | 62 8a 8b 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 90 3b 10 25 ca fe 1f 3b 58 67 93 fa | 3d a3 98 00 cc 36 84 a7 00 00 00 1c 00 00 40 05 | 55 c6 52 e3 aa aa 60 c0 64 26 bb 2b 79 4e a4 42 | 73 1e 76 57 | libevent_free: release ptr-libevent@0x7fb370014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #365 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 67 19 58 d7 3c f0 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #365 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #365 | rejected packet: | 85 67 19 58 d7 3c f0 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #365: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.07 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd80 | handling event EVENT_RETRANSMIT for parent state #373 | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #373 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #373 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49674.737229; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501365 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #373 | libevent_malloc: new ptr-libevent@0x7fb370014c70 size 128 "road-eastnet-nonat-121" #373: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #373) | cc d0 7c e3 2d ba 98 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba c9 ec 57 66 ee 6d 75 ec 00 31 9e bb a2 7b 33 | 03 5b e1 5f f9 35 33 83 7e 5f 91 5b a2 92 9a a8 | 8d 3b 36 89 d7 60 3c f0 e0 82 e5 11 6e 43 23 b1 | df d6 90 8f 04 61 87 4f 48 d6 55 c3 74 01 c3 05 | 74 78 5b 86 ae c3 d1 0f 5a c9 e4 c5 26 fd 8f 0b | 7a de b0 bf fa 77 b7 99 27 6d 94 68 54 8f 2e b4 | 27 fc 46 a6 65 3e f8 0d 42 f0 50 03 21 b0 cd 96 | 2d 45 e2 17 2e 0c 5d ab 5d cf b0 76 7e 40 37 71 | ec c6 7f c3 8e c1 e3 0c da 69 0c bb 78 ac ef e6 | fa da 64 48 00 9c 0f d4 5e 3f fd b4 84 a9 1f 83 | f8 16 28 f3 f1 a7 fd f1 9e 6b cf 4b 33 5a 08 dd | 8d d5 23 ac 66 10 69 36 aa 87 aa ab ed ab 68 36 | 4a 70 e5 64 3a 2f 37 bf 5e 42 b9 8e 12 99 78 f7 | 0c 24 39 a4 0c ff 5c 9e b7 31 00 75 be b4 85 09 | f6 93 ec eb a2 a7 69 50 c8 7a 9b 97 aa 4c fd 91 | 2c 8c 14 31 ec 08 42 84 d3 a9 ed d2 74 47 99 ae | 29 00 00 24 b4 0d dc 4f 11 5b a4 50 84 d3 92 d3 | f6 ef 85 ab 3e d2 da 12 30 2f 73 8e 10 d5 43 df | 1d 88 10 ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 85 d9 5b 1c 2d 07 c4 07 50 eb 06 | 15 5f 19 1f ba 90 46 a0 00 00 00 1c 00 00 40 05 | bb 4b 15 0f 4a b6 b1 9b ec 46 e5 86 fe 18 d0 b4 | dc 99 60 c7 | libevent_free: release ptr-libevent@0x7fb35c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd80 | #373 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc d0 7c e3 2d ba 98 af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #373 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #373 | rejected packet: | cc d0 7c e3 2d ba 98 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #373: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0506 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7fec0 | handling event EVENT_RETRANSMIT for parent state #128 | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #128 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #128 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49674.744541; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007703 exceeds limit? YES "road-eastnet-nonat-128" #128: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-128" #128: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #380 at 0x557d46a81f80 | State DB: adding IKEv2 state #380 in UNDEFINED | pstats #380 ikev2.ike started | Message ID: init #380: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #380: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #380; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-128" #380: initiating v2 parent SA to replace #128 | using existing local IKE proposals for connection road-eastnet-nonat-128 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 380 for state #380 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9dd80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #380 | libevent_malloc: new ptr-libevent@0x7fb35c02a950 size 128 | #380 spent 0.135 milliseconds in ikev2_parent_outI1() | RESET processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #128 ikev2.ike failed too-many-retransmits | pstats #128 ikev2.ike deleted too-many-retransmits | #128 spent 2.53 milliseconds in total | [RE]START processing: state #128 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in delete_state() at state.c:879) | crypto helper 3 resuming "road-eastnet-nonat-128" #128: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #128: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | crypto helper 3 starting work-order 380 for state #380 | picked newest_isakmp_sa #0 for #128 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 380 "road-eastnet-nonat-128" #128: deleting IKE SA for connection 'road-eastnet-nonat-128' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-128' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-128 | State DB: deleting IKEv2 state #128 in PARENT_I1 | parent state #128: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 380 time elapsed 0.000703 seconds | (#380) spent 0.707 milliseconds in crypto helper computing work-order 380: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 380 for state #380 to event queue | scheduling resume sending helper answer for #380 | stop processing: state #128 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_malloc: new ptr-libevent@0x7fb338023a60 size 128 | libevent_free: release ptr-libevent@0x7fb34402a950 | crypto helper 3 waiting (nothing to do) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7fec0 | in statetime_stop() and could not find #128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34002a950 | handling event EVENT_RETRANSMIT for parent state #274 | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #274 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #274 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49674.745532; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005327 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7fec0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #274 | libevent_malloc: new ptr-libevent@0x7fb34402a950 size 128 "road-eastnet-nonat-22" #274: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #274) | 97 f1 23 53 d2 3b 4d 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 bf aa 44 4c 86 42 20 d8 9e 9a 10 8c 03 23 1c | 55 12 c5 05 17 54 35 db 09 ea 86 4f 1e 8f 7b 32 | 9a 2a b0 4c f2 e7 18 73 a1 a0 fd e2 40 07 2c 7c | b0 86 fe c9 c0 0a 24 ee 0b e2 8f 65 27 f4 ce d4 | 26 d0 8a 70 5c 4d 46 36 4c d7 e9 bc 9b 95 2b 48 | 94 a5 c8 98 b4 23 f8 e0 8f 7c 6d 1d 50 c7 fe 04 | 1c ce 6b 59 2b ed cf 4a 5b 4f 67 9e cc 11 c0 53 | 7c 50 d5 3e bd 07 f0 e3 56 2a 0b ae b3 c0 99 43 | bb 92 8e 39 19 7e 1e c2 71 84 a0 76 9a 0f 7a 85 | 50 cf 0d 7d 85 0a 08 cc ee a1 bd c3 88 dd 8a de | e2 9f 70 d5 bb 76 44 f0 e2 0f 12 4d ae 88 a5 a4 | 51 38 bf fa 0f 38 f4 4c bb e3 25 bf 62 88 5c 87 | e1 a2 de e1 56 a5 9f 6b ce 90 dc 86 6d 26 32 32 | 64 ae 0b ac fa 3a f6 9e fa 00 00 26 02 a9 70 2e | af 79 3d a8 07 0b 81 d4 53 f3 46 fc 05 11 f6 55 | 0d 1d 8f a8 e0 93 58 07 b0 a8 c9 54 c5 14 a2 da | 29 00 00 24 59 ef 9f ca 6d 42 ee 4c de 0a 4a 8e | ec df b4 6b 0d dd 66 fa b2 ad 6d 66 92 77 f9 cb | 4b 49 7a f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8d 80 80 1b 6e 73 7e e3 fb 20 6a a8 | f2 02 f1 bf e6 58 62 ac 00 00 00 1c 00 00 40 05 | 31 9f 40 90 8f 0e 1c 6e 4b 7e bf d8 97 47 82 19 | e1 cf 25 c8 | libevent_free: release ptr-libevent@0x7fb340008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34002a950 | #274 spent 0.0897 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 f1 23 53 d2 3b 4d 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #274 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #274 | rejected packet: | 97 f1 23 53 d2 3b 4d 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #274: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-128 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-128" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-128' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-128" | stop processing: connection "road-eastnet-nonat-128" (in initiate_a_connection() at initiate.c:349) | spent 0.0576 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #380 | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 380 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #380 | **emit ISAKMP Message: | initiator cookie: | 8c 85 b9 1f be 6e 3d 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-128 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 17 1e de d9 e8 4b 77 f1 86 35 82 03 5f ce 7b cb | ikev2 g^x 0a c9 87 87 aa 3a 74 01 02 fc e1 64 e0 07 7c 06 | ikev2 g^x dd ed c8 68 23 d7 e1 98 d6 47 ab 77 d0 38 d7 b3 | ikev2 g^x 2e d4 c4 52 2d e3 2c bc 34 35 8e 16 9e 83 9d 76 | ikev2 g^x 9f cc 43 a2 24 c5 ff 0f ed 32 bf e5 c9 3b bb e7 | ikev2 g^x a4 cc 2a 54 79 4f 13 6e 29 6d 75 36 6c 87 01 9c | ikev2 g^x 1f e0 d3 9f 4c c1 24 b9 2b d8 7b fa 2a d1 70 cc | ikev2 g^x f1 73 67 12 91 0a 83 03 b6 96 60 5a f8 fb a0 1a | ikev2 g^x 92 b6 0c fb e9 77 6e a8 e9 d4 02 be 0d 82 27 ba | ikev2 g^x 20 48 7d ed 5d 31 52 4a 59 63 6f 7e c4 3e 2e ac | ikev2 g^x 5e 97 a4 c4 d3 ae 3d fa a4 3b fb c2 de b4 5c 6c | ikev2 g^x f2 4a 19 f4 47 5a 00 3f 78 e7 bc 36 32 f4 d0 ce | ikev2 g^x 7c 2d 58 ca fa c4 cc 95 9e a4 78 b5 2d fd 23 cb | ikev2 g^x 2a 9d bc 7a 8a bb 88 97 8b fb 82 e5 e3 af 23 95 | ikev2 g^x 4e ed 5d 7c 45 af c0 e7 bb 20 cb e5 da 63 b4 54 | ikev2 g^x a8 b6 35 4f 40 f2 02 b1 8a 9f 38 00 e7 8b 27 93 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e9 59 12 f8 16 a7 9f df 69 ae 67 26 7d 68 3d f0 | IKEv2 nonce e8 95 32 e5 ac 44 49 ce 96 5b 71 84 56 84 ec f2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8c 85 b9 1f be 6e 3d 49 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 80 | natd_hash: port= 01 f4 | natd_hash: hash= 1d 47 26 04 c2 b4 0a 38 20 0b c5 38 8f 45 ae 49 | natd_hash: hash= d1 6f dd cf | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1d 47 26 04 c2 b4 0a 38 20 0b c5 38 8f 45 ae 49 | Notify data d1 6f dd cf | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8c 85 b9 1f be 6e 3d 49 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 48 d9 a4 21 0f e8 6e ab 23 f4 84 7b 2a 45 72 13 | natd_hash: hash= eb 6b 5f 3a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 48 d9 a4 21 0f e8 6e ab 23 f4 84 7b 2a 45 72 13 | Notify data eb 6b 5f 3a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #380 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #380: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #380 to 4294967295 after switching state | Message ID: IKE #380 skipping update_recv as MD is fake | Message ID: sent #380 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-128" #380: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.128:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #380) | 8c 85 b9 1f be 6e 3d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 1e de d9 e8 4b 77 f1 86 35 82 03 5f ce 7b cb | 0a c9 87 87 aa 3a 74 01 02 fc e1 64 e0 07 7c 06 | dd ed c8 68 23 d7 e1 98 d6 47 ab 77 d0 38 d7 b3 | 2e d4 c4 52 2d e3 2c bc 34 35 8e 16 9e 83 9d 76 | 9f cc 43 a2 24 c5 ff 0f ed 32 bf e5 c9 3b bb e7 | a4 cc 2a 54 79 4f 13 6e 29 6d 75 36 6c 87 01 9c | 1f e0 d3 9f 4c c1 24 b9 2b d8 7b fa 2a d1 70 cc | f1 73 67 12 91 0a 83 03 b6 96 60 5a f8 fb a0 1a | 92 b6 0c fb e9 77 6e a8 e9 d4 02 be 0d 82 27 ba | 20 48 7d ed 5d 31 52 4a 59 63 6f 7e c4 3e 2e ac | 5e 97 a4 c4 d3 ae 3d fa a4 3b fb c2 de b4 5c 6c | f2 4a 19 f4 47 5a 00 3f 78 e7 bc 36 32 f4 d0 ce | 7c 2d 58 ca fa c4 cc 95 9e a4 78 b5 2d fd 23 cb | 2a 9d bc 7a 8a bb 88 97 8b fb 82 e5 e3 af 23 95 | 4e ed 5d 7c 45 af c0 e7 bb 20 cb e5 da 63 b4 54 | a8 b6 35 4f 40 f2 02 b1 8a 9f 38 00 e7 8b 27 93 | 29 00 00 24 e9 59 12 f8 16 a7 9f df 69 ae 67 26 | 7d 68 3d f0 e8 95 32 e5 ac 44 49 ce 96 5b 71 84 | 56 84 ec f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 47 26 04 c2 b4 0a 38 20 0b c5 38 | 8f 45 ae 49 d1 6f dd cf 00 00 00 1c 00 00 40 05 | 48 d9 a4 21 0f e8 6e ab 23 f4 84 7b 2a 45 72 13 | eb 6b 5f 3a | state #380 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c02a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9dd80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #380 | libevent_malloc: new ptr-libevent@0x7fb340008e30 size 128 | #380 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49674.746178 | resume sending helper answer for #380 suppresed complete_v2_state_transition() and stole MD | #380 spent 0.412 milliseconds in resume sending helper answer | stop processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb338023a60 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c 85 b9 1f be 6e 3d 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #380 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #380 | rejected packet: | 8c 85 b9 1f be 6e 3d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 80 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #380: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #327 | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #327 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #327 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49674.775405; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004493 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34002a950 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #327 | libevent_malloc: new ptr-libevent@0x7fb338023a60 size 128 "road-eastnet-nonat-75" #327: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #327) | cd 66 0f 9c 46 d2 2e 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c e2 6e 06 8e ba 7b 55 21 d6 ce 48 6f 3c 92 70 | 71 57 bb 2e 59 88 d0 8e 2a d9 1e 8b 54 64 af 4b | 40 4b af e2 a4 54 08 ce 78 99 d3 6e a5 bc 7d 40 | 54 45 d2 55 e5 04 88 a7 28 8f 77 11 a3 33 32 44 | c5 c1 f3 8c 73 cd 33 50 64 6e 8a 4a 03 1a e8 56 | 33 98 cb 05 7e 52 cf 35 2c 3c 0a 01 ff ea e2 ad | d8 80 22 71 7e 19 d2 b8 ce 67 79 24 c4 a0 f8 77 | 85 18 5e ad 8e 04 46 41 75 9b 16 af 02 fc dc 64 | 32 2e 9e 96 8f b4 82 0b 80 7e 79 12 22 b3 48 72 | b8 08 60 6b fb b5 54 a6 fa 64 f2 f2 1c f2 68 fd | a8 f7 9c d6 a5 ea 11 63 c4 ae d6 34 f7 8d 1a 64 | d2 72 49 10 16 1e e2 1a 26 c5 f0 ec 34 31 4a 5b | 0b 2e 91 90 5e 8e 26 12 f7 2c b6 7b b5 af 3d cb | 78 d2 30 c7 9f 03 58 c5 3d 03 c3 8e 6e cf 73 42 | 63 93 37 70 63 fa 64 09 ea e3 9b 55 c3 1a f4 3d | f3 be ab 22 fa 6d f3 45 4a 46 ad d5 84 8a f0 a1 | 29 00 00 24 90 b8 80 a5 9c 42 2b 50 2e f5 43 e6 | dc 43 6d 4e b8 ec af ce 7f 78 f5 24 c5 c3 2d 65 | bb f0 87 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc f4 a0 b4 bc 1c 55 2f e9 f9 68 07 | 2a e9 06 2c 8b 87 6b db 00 00 00 1c 00 00 40 05 | f6 e0 64 05 d4 ed 34 7f 04 0a 65 5a 6b 64 eb 2c | 7a ff a7 d3 | libevent_free: release ptr-libevent@0x7fb3540300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #327 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cd 66 0f 9c 46 d2 2e 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #327 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #327 | rejected packet: | cd 66 0f 9c 46 d2 2e 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #327: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360018460 | handling event EVENT_RETRANSMIT for parent state #366 | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #366 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #366 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49674.785686; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001566 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #366 | libevent_malloc: new ptr-libevent@0x7fb3540300e0 size 128 "road-eastnet-nonat-114" #366: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #366) | 3c e6 10 56 de c7 50 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 fc d0 2b 58 ad f1 9a aa 82 c0 57 ae f0 46 70 | a2 7b 22 23 65 30 fe 9c 0d f5 dc 40 c0 ca 9d ee | 6e 66 1d 3a 72 fe dc 88 4a 26 55 69 91 41 bf 12 | 90 50 78 9a 3c 37 7a d2 58 65 01 98 28 27 ba 6d | 00 33 b4 2e 8f 98 78 f3 cd 21 f0 18 dd 51 cb 68 | 4f 92 9d 38 c4 06 c1 6c cf 60 41 a1 18 22 f2 93 | 34 0c 55 d7 b5 30 6c c4 9c ad 0a aa 9b 11 9f 59 | 49 ac e6 72 dc 82 61 fc 42 ea d8 0b 5d 7d f2 47 | 0f e6 10 b9 1d c6 85 40 80 3f b3 ee 0f dc 82 fa | 53 40 f0 d9 23 6a 65 60 f3 d7 02 47 6c 0a 6f 61 | 8d 04 17 7d 94 9e 17 80 39 4f b5 db 2d a0 f8 02 | 18 21 68 7d 0e af 20 98 75 39 40 4d 5d 87 d7 7b | 4c 39 3b 20 a9 65 05 04 46 a1 49 0b d9 6d 8f 15 | 4f b4 23 1a 8e 5f 27 66 f0 b0 a6 bd 48 dc 96 c2 | 77 e2 b0 72 b6 2c 19 2f 16 65 ef 29 dd a3 4a de | 9a 82 38 c8 cb 37 99 80 5e bb 4b 53 97 7b f3 fa | 29 00 00 24 7a ad 39 64 9f ec c1 f8 33 94 44 40 | f7 c9 dd b2 6b e5 21 16 26 39 73 9d cd 0b f5 7a | f4 93 09 bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 12 7d c7 e4 80 f6 ae d0 f3 0f 94 | c9 99 cc 19 2a ad fe 8d 00 00 00 1c 00 00 40 05 | 84 74 fa e2 ee 48 6b 8a 7f a7 09 f6 4e 00 6d 26 | 52 0f f6 08 | libevent_free: release ptr-libevent@0x7fb38802d3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360018460 | #366 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c e6 10 56 de c7 50 ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #366 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #366 | rejected packet: | 3c e6 10 56 de c7 50 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #366: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0728 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4ebd0 | handling event EVENT_RETRANSMIT for parent state #374 | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #374 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #374 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49674.791092; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50101 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #374 | libevent_malloc: new ptr-libevent@0x7fb38802d3a0 size 128 "road-eastnet-nonat-122" #374: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #374) | 2b af 1b 03 10 38 37 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 c3 14 06 9b d8 f1 99 49 48 ff 90 1f 86 00 28 | 44 18 8a f8 52 dc 7d 04 1b d5 bc 43 4d 6c cb 67 | f8 0d 9d 6d d0 66 c5 1d 7e 62 70 73 1c 71 41 b4 | dd 81 08 b3 22 a9 c5 05 00 35 5b 00 07 16 93 d5 | 94 c1 6c 23 e3 4f fb cc 11 67 47 b3 e1 b1 07 89 | ea c0 9e a2 65 96 87 08 be 34 63 54 73 84 17 c6 | d1 75 fb 5b 8e 80 b1 4e bc e5 80 b5 fc 51 6b 8e | af 49 e6 d5 05 a1 42 3f 30 13 b7 fe 10 06 81 bc | 26 72 22 45 7f 9f 88 7e f2 4d d6 4b 6d 85 6b 06 | 69 00 b6 2d 19 97 b0 06 ca c7 30 d2 02 d3 f6 37 | 5e 73 21 4a 86 ec 60 ca fd d2 ed d8 05 2b db 6c | a9 01 2a 23 f7 1d d9 64 5b e9 5e 20 76 8d 16 0a | bf cd f0 54 2a 72 e9 f6 56 5e 90 80 56 52 68 ca | 9f 40 22 7c 1e b1 d0 73 7b 7b 65 7f 5f 3b b2 a4 | 2d 12 04 bd 89 d0 f1 f1 ba b3 be 3d 20 c5 f8 84 | bc fa 4d 90 8e a5 a8 51 48 43 7b 6c ed ea 9f e0 | 29 00 00 24 8b e7 71 0b f0 6c d4 66 d8 89 de 00 | 61 f0 41 76 89 f5 bb 07 5f 2d 78 ac d6 5e eb 30 | 2f 0d 98 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 37 47 83 86 42 9b 81 4e c6 41 b6 | af 4f 24 3f ee d6 bb bd 00 00 00 1c 00 00 40 05 | 2f d6 db c3 63 be 1c 54 fe 3c c7 2a 35 82 32 22 | 47 30 b2 bc | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | #374 spent 0.181 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2b af 1b 03 10 38 37 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #374 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #374 | rejected packet: | 2b af 1b 03 10 38 37 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #374: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0717 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #353 | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #353 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #353 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49674.81248; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00197 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #353 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 "road-eastnet-nonat-101" #353: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #353) | 5c b8 33 04 f9 07 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 8b 11 fb 47 ec 02 c4 cd 08 09 04 3c c8 57 b9 | e6 56 8a 75 16 cb 27 a3 a8 a8 cd 60 5a 5e 10 a0 | 4c ee d4 ee 70 90 76 03 9c dd ae bd 31 4c 66 16 | b3 e1 1d be 33 f8 41 0b c4 3c 71 6f 90 30 0f da | 26 bc 55 a4 9b 68 89 99 78 6a 9f bd 9b 59 ca 66 | 9f 28 bb 1c cf d9 04 9c 3f 50 e0 a8 9a c8 86 3c | 22 ad 41 27 f3 c4 bb fb ef e9 6e f8 88 7e 34 6e | 75 ca 2d 80 b4 0c d7 c1 72 ce 98 2e 70 ec 4e 80 | a8 95 d8 c8 1d 5c 97 5c c0 a0 b9 5c ac 3a c3 07 | 2c c5 07 1e 3d 08 d1 ba e4 93 f5 5b dd cb 89 0a | 36 eb de 45 ac 11 de 24 b8 2b b2 28 d9 84 7e 81 | 6c e6 ca 34 e5 ab 3a f5 d9 8f 51 9e f8 46 26 92 | bb e9 13 c3 32 db 48 bf d1 a9 ef 9e d6 1f 7a 90 | cf e0 f7 95 4c 0f 73 ac 90 00 08 6f f7 6f bb 88 | dc 53 20 17 f7 7a 4b e1 b0 e3 53 ab c1 68 9e bb | 8c bb e3 6d 1e 44 fc 28 be 03 40 b8 4e ff ea 55 | 29 00 00 24 d0 f4 4a 20 b5 18 6c ce 45 6d d4 e9 | 3d b2 3f bf 9f b6 c1 be 4d 22 b8 3f d5 b7 20 9c | 7a 5b 5b 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 c3 92 4c 0f 96 63 0f 6f bc 3d e6 | 99 69 47 3f a6 34 81 2c 00 00 00 1c 00 00 40 05 | ce 29 c6 74 fd 99 32 be d7 3c ba 39 8c e5 64 d3 | 17 27 91 5a | libevent_free: release ptr-libevent@0x7fb38801abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #353 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c b8 33 04 f9 07 ca 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #353 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #353 | rejected packet: | 5c b8 33 04 f9 07 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #353: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a60690 | handling event EVENT_RETRANSMIT for parent state #129 | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #129 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #129 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49674.829762; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009862 exceeds limit? YES "road-eastnet-nonat-129" #129: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-129" #129: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #381 at 0x557d46a83540 | State DB: adding IKEv2 state #381 in UNDEFINED | pstats #381 ikev2.ike started | Message ID: init #381: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #381: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #381; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-129" #381: initiating v2 parent SA to replace #129 | using existing local IKE proposals for connection road-eastnet-nonat-129 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 381 for state #381 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2cb90 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #381 | libevent_malloc: new ptr-libevent@0x7fb38801abe0 size 128 | #381 spent 0.0984 milliseconds in ikev2_parent_outI1() | crypto helper 1 resuming | crypto helper 1 starting work-order 381 for state #381 | RESET processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 381 | start processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #129 ikev2.ike failed too-many-retransmits | pstats #129 ikev2.ike deleted too-many-retransmits | #129 spent 2.9 milliseconds in total | [RE]START processing: state #129 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-129" #129: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #129: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #129 "road-eastnet-nonat-129" #129: deleting IKE SA for connection 'road-eastnet-nonat-129' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-129' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-129 | State DB: deleting IKEv2 state #129 in PARENT_I1 | parent state #129: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #129 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 381 time elapsed 0.00097 seconds | libevent_free: release ptr-libevent@0x7fb364024ff0 | (#381) spent 0.975 milliseconds in crypto helper computing work-order 381: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a60690 | in statetime_stop() and could not find #129 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 1 sending results from work-order 381 for state #381 to event queue | scheduling resume sending helper answer for #381 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7fb3880210c0 size 128 Initiating connection road-eastnet-nonat-129 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 1 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-129" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-129' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-129" | stop processing: connection "road-eastnet-nonat-129" (in initiate_a_connection() at initiate.c:349) | spent 0.0709 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #381 | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 381 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #381 | **emit ISAKMP Message: | initiator cookie: | 1e fb 19 74 69 81 f6 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-129 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5f 15 4d 3c 26 b9 8e 71 c8 4c 65 3c 93 c4 f8 5c | ikev2 g^x 0c 69 48 07 1f b0 40 db 39 45 4f 12 5d b7 64 ce | ikev2 g^x f6 36 76 d1 4f f2 c3 d5 d1 3f c7 4e dd 69 ef bd | ikev2 g^x 2e 06 de 7f fb 43 32 b5 94 31 7c 96 1c 09 3c 05 | ikev2 g^x c9 f9 e9 6e f6 32 3d b2 3f 7a 40 e8 05 db 42 df | ikev2 g^x 50 a9 3b 1b be f2 2b d2 43 70 99 24 25 7e b9 8b | ikev2 g^x 88 12 28 70 28 9b b9 5b b0 6d 48 da 44 23 6b 4d | ikev2 g^x 59 ff ee 67 e5 c7 db c0 7c 7f a2 4b 21 92 3a a1 | ikev2 g^x fd 14 25 80 1a 91 48 40 e9 5b 63 e7 84 7c b3 99 | ikev2 g^x 02 c6 5d 6d b6 28 24 98 77 5e dc c9 be 98 c3 d6 | ikev2 g^x b6 bc 7a bf 31 81 8d c7 ba a9 27 81 82 5a 2f b7 | ikev2 g^x 23 3d 16 95 ba b5 4a 07 29 09 4c 3e c5 38 81 20 | ikev2 g^x 6c 0f d0 d6 67 62 46 f9 bc 6b c6 8e 7d a5 ce 50 | ikev2 g^x f1 0f 9a 64 d5 01 da 1f 72 e3 1b 16 9a ec 02 45 | ikev2 g^x ef 03 20 b4 4d cb ac e4 80 48 13 be cc c9 5e 11 | ikev2 g^x 9a f4 a2 21 ee 6b 6d 92 17 77 1f 86 a2 bd ac 89 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5b c1 91 12 e1 44 84 05 fe aa f1 fc b1 6d 8f ce | IKEv2 nonce 01 29 aa f2 75 b6 aa e9 3c cb db 81 72 99 63 d9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1e fb 19 74 69 81 f6 a1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 81 | natd_hash: port= 01 f4 | natd_hash: hash= 86 78 cd 6f 27 81 4c 4a f4 57 06 82 fb 0a 60 ad | natd_hash: hash= 54 dd e0 6c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 86 78 cd 6f 27 81 4c 4a f4 57 06 82 fb 0a 60 ad | Notify data 54 dd e0 6c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1e fb 19 74 69 81 f6 a1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 73 d8 f7 cb c0 0b a5 77 76 9f 97 28 b6 7f a1 0e | natd_hash: hash= 85 3a 80 ee | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 73 d8 f7 cb c0 0b a5 77 76 9f 97 28 b6 7f a1 0e | Notify data 85 3a 80 ee | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #381 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #381: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #381 to 4294967295 after switching state | Message ID: IKE #381 skipping update_recv as MD is fake | Message ID: sent #381 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-129" #381: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.129:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #381) | 1e fb 19 74 69 81 f6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 15 4d 3c 26 b9 8e 71 c8 4c 65 3c 93 c4 f8 5c | 0c 69 48 07 1f b0 40 db 39 45 4f 12 5d b7 64 ce | f6 36 76 d1 4f f2 c3 d5 d1 3f c7 4e dd 69 ef bd | 2e 06 de 7f fb 43 32 b5 94 31 7c 96 1c 09 3c 05 | c9 f9 e9 6e f6 32 3d b2 3f 7a 40 e8 05 db 42 df | 50 a9 3b 1b be f2 2b d2 43 70 99 24 25 7e b9 8b | 88 12 28 70 28 9b b9 5b b0 6d 48 da 44 23 6b 4d | 59 ff ee 67 e5 c7 db c0 7c 7f a2 4b 21 92 3a a1 | fd 14 25 80 1a 91 48 40 e9 5b 63 e7 84 7c b3 99 | 02 c6 5d 6d b6 28 24 98 77 5e dc c9 be 98 c3 d6 | b6 bc 7a bf 31 81 8d c7 ba a9 27 81 82 5a 2f b7 | 23 3d 16 95 ba b5 4a 07 29 09 4c 3e c5 38 81 20 | 6c 0f d0 d6 67 62 46 f9 bc 6b c6 8e 7d a5 ce 50 | f1 0f 9a 64 d5 01 da 1f 72 e3 1b 16 9a ec 02 45 | ef 03 20 b4 4d cb ac e4 80 48 13 be cc c9 5e 11 | 9a f4 a2 21 ee 6b 6d 92 17 77 1f 86 a2 bd ac 89 | 29 00 00 24 5b c1 91 12 e1 44 84 05 fe aa f1 fc | b1 6d 8f ce 01 29 aa f2 75 b6 aa e9 3c cb db 81 | 72 99 63 d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 78 cd 6f 27 81 4c 4a f4 57 06 82 | fb 0a 60 ad 54 dd e0 6c 00 00 00 1c 00 00 40 05 | 73 d8 f7 cb c0 0b a5 77 76 9f 97 28 b6 7f a1 0e | 85 3a 80 ee | state #381 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38801abe0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2cb90 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #381 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 | #381 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49674.831537 | resume sending helper answer for #381 suppresed complete_v2_state_transition() and stole MD | #381 spent 0.475 milliseconds in resume sending helper answer | stop processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3880210c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e fb 19 74 69 81 f6 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #381 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #381 | rejected packet: | 1e fb 19 74 69 81 f6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 81 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #381: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a92f80 | handling event EVENT_RETRANSMIT for parent state #275 | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #275 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #275 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49674.834728; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004213 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a60690 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #275 | libevent_malloc: new ptr-libevent@0x7fb3880210c0 size 128 "road-eastnet-nonat-23" #275: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #275) | 8e 8a 90 cd 9e 92 16 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 db ff f3 45 8d 77 6b ab 4c f5 59 93 99 02 27 | 95 ea ea f3 ac f8 d0 0c f4 e4 a7 81 ed dc a2 2e | 80 d4 21 01 5a 1a 55 9b d3 86 c5 c8 54 08 80 87 | 53 03 95 88 ee 42 5d b8 52 8e fe 84 14 38 79 44 | c3 51 49 fc 97 0d 59 e0 5f 4b c0 5e f8 ec 96 9d | 9d 66 a2 14 38 ec b6 d3 b6 6a cc ee b5 48 0a 5e | 6f de 87 79 9d 43 73 e3 c3 11 60 66 e8 ee 7a 7d | c3 f9 f0 de 79 dc 04 3a 85 85 52 d2 92 21 fc 86 | 8d fd 20 94 86 24 05 6c 2b cb ee c9 04 8f 0f 93 | 01 a5 e2 2b 0c 12 b9 e6 3a 6c ef c0 32 59 e5 d2 | 3b 11 a2 9f 2d 5e e0 2d 8c 75 47 73 37 0b fd dc | 38 6f 1e 5d 62 ac ab 3b f8 90 5d 68 0c 10 a4 e3 | 5d d1 15 9f 1f d5 11 83 81 be 1d a7 8f 91 34 60 | 10 68 8c b7 8b 5a e8 bb 55 32 b6 ac 66 fb 13 bc | 8d 01 0f 0f f6 d9 7e e8 52 a6 18 9d f5 fb ae f8 | d6 4a f4 34 c9 7a eb 6e cd 1f ad 11 86 f4 37 e0 | 29 00 00 24 82 2a d3 ed 88 6f 6d 2b 95 fc ef 17 | cd da 04 83 d9 0b fe c7 f7 7a 31 0a 69 4f 17 0b | 3b dd fa 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 12 f4 6b 5c 7a 37 1f d4 51 59 a4 | 33 90 ab 79 b6 80 74 7b 00 00 00 1c 00 00 40 05 | 6b 59 3d 2d 41 62 79 69 4f 0b fb 7b cf 22 15 97 | 6d 57 a6 24 | libevent_free: release ptr-libevent@0x7fb34c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f80 | #275 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 8a 90 cd 9e 92 16 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #275 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #275 | rejected packet: | 8e 8a 90 cd 9e 92 16 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #275: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0682 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11640 | handling event EVENT_RETRANSMIT for parent state #328 | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #328 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #328 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49674.842085; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004062 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #328 | libevent_malloc: new ptr-libevent@0x7fb34c03b0b0 size 128 "road-eastnet-nonat-76" #328: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #328) | 3c ba 5b c8 fc 4e e4 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 98 1b 56 d7 72 9f 0b ef 82 c1 96 52 5c 5c 9b | e9 aa b3 20 9c 71 f6 1f 7d 62 5f 32 20 71 40 58 | 1c 09 5f be 66 e2 fb 32 6f 32 7b d3 d9 05 2e a9 | ee af 44 08 4c 92 7f 63 3f 26 57 99 85 eb 91 d7 | b7 5a 96 3e 98 ed 26 ea 09 8f 0f 63 53 5d 1c b3 | c9 fb a7 17 72 50 1c 89 8a 1b ec e3 c6 13 99 f4 | 47 85 27 9f 89 00 ee af f6 42 8e 89 20 65 b0 94 | dc 96 45 50 6a fc 55 91 2d 20 a1 71 bd 13 2b 3d | c9 ca ac 78 35 01 26 cc e0 d8 0f 8b 0a 51 cf db | a4 5f b8 de 1d ef 44 4c 67 d2 41 0a 1a da 75 49 | 8b 5c 8d d5 4f ad 96 01 a7 81 6e 64 71 33 1d 13 | c8 f5 a7 cf 94 c9 e6 53 e2 b0 78 13 10 0b c7 61 | e7 11 09 49 e7 5c 3e 3d 81 8a d4 ca 33 cf 4b a6 | 11 a6 1c 3a 1f 08 75 b7 9e 2d 0e 59 2f 13 2a 60 | 81 d0 25 c3 cb 2c 46 fb 68 09 64 52 0e fa 74 b3 | e7 5b 92 47 85 91 91 a7 8f 24 50 93 20 2b b2 73 | 29 00 00 24 bd 04 20 dd 74 64 b5 d8 5a af c3 c3 | 73 08 e8 87 3d 68 41 83 2a a2 ff d2 47 06 97 0f | ee 80 ed c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f8 b1 65 26 56 ad 9d 5c eb eb 90 | 0c 0f 05 c7 3a 68 b0 36 00 00 00 1c 00 00 40 05 | a1 90 c1 14 1b 7b 06 99 a6 d5 54 52 02 f0 92 56 | c7 13 ca 30 | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11640 | #328 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c ba 5b c8 fc 4e e4 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #328 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #328 | rejected packet: | 3c ba 5b c8 fc 4e e4 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #328: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #367 | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #367 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #367 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49674.846442; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001583 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11640 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #367 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 "road-eastnet-nonat-115" #367: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #367) | 4a 87 68 98 60 e9 4c f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 0c 97 07 ab 60 f0 87 17 3b e3 ad e6 c0 a4 f8 | bc d0 84 fc 55 d2 65 d6 9f 46 ab 63 b9 cd 86 a7 | 92 52 2d 61 57 c8 33 96 bd 3f e7 29 4c c0 56 81 | 07 2c a6 2e b4 e1 f4 a2 f9 92 52 0a 37 04 e4 51 | 6e 83 7a 8b f6 b0 a9 33 fc 7e 63 8b 04 cb e8 b1 | 89 da ba 9d 79 52 4b 77 ad fe 01 ca be 34 71 25 | 01 b7 c6 b7 a4 d2 8b 5a 4f 28 3e 3a 2c 2d 2b 82 | b6 7f 76 80 3a 8d 21 5e c2 27 da 9c 35 b4 28 8d | 4f 12 52 38 3a d3 0a 5c 8a f9 8f 79 8d 25 d4 f8 | ed f0 27 a3 9a 91 9a 23 17 a2 c5 fb 5c 81 c7 3f | d7 90 16 5d 16 d9 fd c2 ab 94 11 66 13 b9 42 50 | 61 f5 f7 53 fa 66 74 a0 35 1a 38 cb 76 13 72 7a | 71 f8 95 99 2b 70 57 e9 96 87 e1 a7 fa 09 46 16 | 2d 17 ab 0f b3 e3 6d 7d c4 71 f7 b9 01 3d 53 ec | 89 99 23 9b ed fe dc 3d 96 90 a5 f1 6b a2 7c ad | 08 22 28 21 90 c0 9d 24 98 36 19 8c 8e 5f 64 f3 | 29 00 00 24 cc 21 72 ec 84 1b 6c bc be 58 98 1b | fd b2 70 93 97 ae 8a 73 25 e3 f3 ed 6f 6f ad a0 | a3 bc 74 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 20 17 ba 74 ed cb 3d 19 9d 8d 0a | 7d 3c 02 99 ce fc 27 96 00 00 00 1c 00 00 40 05 | be d4 1c 69 d6 46 df 94 c0 c1 0d 02 c5 30 14 7a | ff f7 b4 bf | libevent_free: release ptr-libevent@0x7fb388011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #367 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 87 68 98 60 e9 4c f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #367 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #367 | rejected packet: | 4a 87 68 98 60 e9 4c f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #367: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374009690 | handling event EVENT_RETRANSMIT for parent state #375 | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #375 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #375 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49674.85381; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500511 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #375 | libevent_malloc: new ptr-libevent@0x7fb388011f30 size 128 "road-eastnet-nonat-123" #375: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #375) | a4 09 26 11 42 9e 51 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b 77 05 ad 49 62 16 46 be f5 65 08 84 ad 14 8b | 54 2c 99 1d e2 97 87 23 80 81 89 f0 4c d0 eb 92 | 7b 0b 4f bb c5 8e f0 7c 4a e9 4e f5 41 3b c0 9c | 84 74 7a 28 42 6c 3e a3 44 ba 29 11 96 09 9b f3 | 38 05 36 bd 24 dc d4 f1 69 9a 67 13 96 b5 cc 0e | 5b 85 9c bc 45 e5 5b 70 a0 86 01 2f a9 6f b7 16 | e5 8c 0d ae 1d 65 f5 53 d8 97 9b 0e 3c f7 8c b4 | 84 cb c7 3a c6 10 40 ea de 5f 63 4c 12 d8 3f ca | 6d 62 70 f0 93 72 e5 53 fe e2 f7 48 e3 16 ec 2c | 0c 51 77 44 87 3b cf 71 6a 9d b3 31 8e cc be f2 | 83 ce be c0 12 f1 01 88 ca 5d f3 fc 95 bc f7 5a | 34 7b 8e 4b 02 d0 59 3f ca a0 78 bc ef 69 51 e1 | 59 c6 1a ee b3 5f f4 fe ba ab aa 32 83 46 24 8b | 44 0a ac 7f 47 be 12 69 64 f5 8a a0 c3 66 33 2a | d1 fe cd 2b 6e fd 1c 22 43 71 36 d1 05 aa f3 a0 | 34 64 36 1b 5f af f2 60 88 b6 fd ad 79 17 84 9b | 29 00 00 24 a2 f8 9d 2f 08 fe df 02 8f a0 29 1e | b3 67 52 e4 00 d5 8c 7f 4e 12 c2 f7 f5 b4 05 71 | a4 8b 3b 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 12 2b 6b 99 24 aa d2 31 8d d6 a9 cf | 86 3d 5f d7 43 66 7f 91 00 00 00 1c 00 00 40 05 | 3d 40 65 0f bf b0 2e 03 30 63 c3 7a f7 f2 38 a3 | 20 e1 e4 b2 | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374009690 | #375 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 09 26 11 42 9e 51 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #375 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #375 | rejected packet: | a4 09 26 11 42 9e 51 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #375: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378018460 | handling event EVENT_RETRANSMIT for parent state #354 | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #354 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #354 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49674.866093; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003316 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374009690 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #354 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 "road-eastnet-nonat-102" #354: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #354) | 72 4c 85 c6 74 09 42 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 1b e9 65 bc 73 bc c5 81 57 1a 7b 1b db 4b 3f | 32 d5 0d b7 6a 65 f1 0a 67 34 33 c1 2c 23 e5 f2 | 41 57 12 1f 62 7d 04 aa d4 c7 47 71 78 e8 f0 df | 48 86 0b 9f 4e 36 6e 72 bd ec 74 1b dd 83 0a ab | df 0b c7 29 5d 45 26 d8 31 4b 64 db c5 65 76 90 | cd 52 7e 2d 27 67 7a 01 34 ba b6 3f e3 9a 85 48 | e4 51 41 5f 21 41 ff 88 e4 cc aa c0 b6 13 70 92 | 13 45 bf db 76 ed 1c 31 eb 2b 1f af 38 c5 ca 82 | 0b fb bb d7 57 27 bd 26 60 cb 6b 22 18 4a df 09 | ae e5 bd 33 88 7d ef 21 1c 95 13 3d a5 02 60 08 | e7 d2 1b 72 0a 7b aa 01 9d 47 2a 4d 32 3f 9b ec | 5b 5a ea 31 68 bb 1a dc 15 be 3d d6 a0 c0 98 db | 7b 5b 3d 8f ce 9b 6c 43 56 11 be e1 16 78 07 0a | 06 29 bd c7 77 7e 17 95 3a 22 27 47 9f 23 32 f6 | 37 27 d0 b4 53 1e 36 9f c8 05 75 2f 68 c9 35 72 | da 2e a9 d1 44 f4 35 64 d4 0a 4b c0 71 73 52 a8 | 29 00 00 24 72 5c 82 6f 5d 6b bd 69 39 4b 52 31 | 75 ca 0e e7 64 bc 08 f8 b5 d4 6f 1f bc a5 fc 80 | 56 52 35 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 33 77 7a c0 93 c5 bf 78 5c 8c bc | 79 60 cc b9 7e aa 2e bb 00 00 00 1c 00 00 40 05 | df 4b d5 4e cf 64 0d 4d 4f 32 d9 61 e4 8d 05 c9 | 9f e3 12 70 | libevent_free: release ptr-libevent@0x7fb34801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378018460 | #354 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 4c 85 c6 74 09 42 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #354 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #354 | rejected packet: | 72 4c 85 c6 74 09 42 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #354: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae4880 | handling event EVENT_RETRANSMIT for parent state #130 | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #130 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #130 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49674.898473; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006819 exceeds limit? YES "road-eastnet-nonat-130" #130: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-130" #130: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #382 at 0x557d46a84b00 | State DB: adding IKEv2 state #382 in UNDEFINED | pstats #382 ikev2.ike started | Message ID: init #382: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #382: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #382; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-130" #382: initiating v2 parent SA to replace #130 | using existing local IKE proposals for connection road-eastnet-nonat-130 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 382 for state #382 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb378018460 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #382 | libevent_malloc: new ptr-libevent@0x7fb34801a4e0 size 128 | #382 spent 0.0718 milliseconds in ikev2_parent_outI1() | RESET processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #130 ikev2.ike failed too-many-retransmits | pstats #130 ikev2.ike deleted too-many-retransmits | #130 spent 2.51 milliseconds in total | [RE]START processing: state #130 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-130" #130: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #130: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #130 "road-eastnet-nonat-130" #130: deleting IKE SA for connection 'road-eastnet-nonat-130' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-130' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-130 | State DB: deleting IKEv2 state #130 in PARENT_I1 | crypto helper 2 resuming | crypto helper 2 starting work-order 382 for state #382 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 382 | parent state #130: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #130 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 382 time elapsed 0.00066 seconds | libevent_free: release ptr-libevent@0x7fb3700407f0 | (#382) spent 0.658 milliseconds in crypto helper computing work-order 382: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae4880 | crypto helper 2 sending results from work-order 382 for state #382 to event queue | in statetime_stop() and could not find #130 | scheduling resume sending helper answer for #382 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb3800211f0 size 128 | crypto helper 2 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-130 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-130" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-130' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-130" | stop processing: connection "road-eastnet-nonat-130" (in initiate_a_connection() at initiate.c:349) | spent 0.103 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #382 | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 382 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #382 | **emit ISAKMP Message: | initiator cookie: | 8a a7 de 77 ff fe 00 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-130 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c7 1e 05 01 d3 c0 50 0e 07 5a f5 6c 2a f3 ca c5 | ikev2 g^x f5 6b b5 ce e5 2d 0d 22 8a 9d fc a1 92 f1 21 88 | ikev2 g^x fe 80 af 87 07 4e ac cb 0e 4c 2f 1f 7c 09 ad 56 | ikev2 g^x 27 1d 20 e6 ec e9 94 a7 13 47 77 6d 93 7b 8b 31 | ikev2 g^x 4c 98 f5 11 b5 9a 38 64 29 ba c8 d0 2f a9 37 ca | ikev2 g^x 1d 9c 45 27 41 6d 78 24 2b 30 7d 43 66 5f da 35 | ikev2 g^x 99 0b ee f7 a5 dd a9 e7 24 b7 2c 27 c3 b8 3c 38 | ikev2 g^x 22 f4 c4 26 23 91 a1 6d a7 03 90 dd c7 47 8b e4 | ikev2 g^x b9 30 db 10 7a b0 86 55 91 13 ed 5a 5c 50 c6 55 | ikev2 g^x 38 6b 0d bb 7c d6 67 e7 99 0a 0d 7c c8 3b f2 93 | ikev2 g^x 43 b8 a6 1e f0 04 5a 66 ab 2b 76 49 15 e4 be b6 | ikev2 g^x e3 ab 9a 84 5b 45 f3 99 3f 3d 94 3a 7f ba c6 2d | ikev2 g^x c0 e5 16 1f a9 0e c4 b3 c7 a8 37 c7 df 60 6d b0 | ikev2 g^x 90 7f 5b 83 e7 16 35 cd f8 80 7e 6b 4c 50 19 23 | ikev2 g^x 8a a3 35 38 cd 8b ef 81 d2 24 34 89 61 4b 37 2c | ikev2 g^x a1 bc 48 55 f5 65 06 2e e7 6f b3 a0 6e 02 6c 89 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7c cd b7 56 1d 0f 15 7b 08 97 8c a9 df 91 53 e0 | IKEv2 nonce 6a 88 48 cc 4c b6 8e 33 b3 57 e0 e8 1c 04 d1 33 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8a a7 de 77 ff fe 00 f2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 82 | natd_hash: port= 01 f4 | natd_hash: hash= e4 58 61 cb 76 cc c4 93 e8 81 4f b3 54 86 64 27 | natd_hash: hash= f4 77 87 8f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e4 58 61 cb 76 cc c4 93 e8 81 4f b3 54 86 64 27 | Notify data f4 77 87 8f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8a a7 de 77 ff fe 00 f2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 27 d0 5f f0 83 ae a8 e6 f3 e6 a6 2d bb 57 f3 83 | natd_hash: hash= 78 36 b0 95 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 27 d0 5f f0 83 ae a8 e6 f3 e6 a6 2d bb 57 f3 83 | Notify data 78 36 b0 95 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #382 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #382: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #382 to 4294967295 after switching state | Message ID: IKE #382 skipping update_recv as MD is fake | Message ID: sent #382 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-130" #382: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.130:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #382) | 8a a7 de 77 ff fe 00 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 1e 05 01 d3 c0 50 0e 07 5a f5 6c 2a f3 ca c5 | f5 6b b5 ce e5 2d 0d 22 8a 9d fc a1 92 f1 21 88 | fe 80 af 87 07 4e ac cb 0e 4c 2f 1f 7c 09 ad 56 | 27 1d 20 e6 ec e9 94 a7 13 47 77 6d 93 7b 8b 31 | 4c 98 f5 11 b5 9a 38 64 29 ba c8 d0 2f a9 37 ca | 1d 9c 45 27 41 6d 78 24 2b 30 7d 43 66 5f da 35 | 99 0b ee f7 a5 dd a9 e7 24 b7 2c 27 c3 b8 3c 38 | 22 f4 c4 26 23 91 a1 6d a7 03 90 dd c7 47 8b e4 | b9 30 db 10 7a b0 86 55 91 13 ed 5a 5c 50 c6 55 | 38 6b 0d bb 7c d6 67 e7 99 0a 0d 7c c8 3b f2 93 | 43 b8 a6 1e f0 04 5a 66 ab 2b 76 49 15 e4 be b6 | e3 ab 9a 84 5b 45 f3 99 3f 3d 94 3a 7f ba c6 2d | c0 e5 16 1f a9 0e c4 b3 c7 a8 37 c7 df 60 6d b0 | 90 7f 5b 83 e7 16 35 cd f8 80 7e 6b 4c 50 19 23 | 8a a3 35 38 cd 8b ef 81 d2 24 34 89 61 4b 37 2c | a1 bc 48 55 f5 65 06 2e e7 6f b3 a0 6e 02 6c 89 | 29 00 00 24 7c cd b7 56 1d 0f 15 7b 08 97 8c a9 | df 91 53 e0 6a 88 48 cc 4c b6 8e 33 b3 57 e0 e8 | 1c 04 d1 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 58 61 cb 76 cc c4 93 e8 81 4f b3 | 54 86 64 27 f4 77 87 8f 00 00 00 1c 00 00 40 05 | 27 d0 5f f0 83 ae a8 e6 f3 e6 a6 2d bb 57 f3 83 | 78 36 b0 95 | state #382 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34801a4e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb378018460 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #382 | libevent_malloc: new ptr-libevent@0x7fb3700407f0 size 128 | #382 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49674.89986 | resume sending helper answer for #382 suppresed complete_v2_state_transition() and stole MD | #382 spent 0.426 milliseconds in resume sending helper answer | stop processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3800211f0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a a7 de 77 ff fe 00 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #382 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #382 | rejected packet: | 8a a7 de 77 ff fe 00 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 82 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #382: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ced0 | handling event EVENT_RETRANSMIT for parent state #329 | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #329 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #329 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49674.902073; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004553 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #329 | libevent_malloc: new ptr-libevent@0x7fb3800211f0 size 128 "road-eastnet-nonat-77" #329: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #329) | 19 44 0d 82 d8 18 b5 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 80 85 65 b3 ae 4b 6e fe 68 73 f2 b6 39 5a b1 | 5a f3 36 2e e0 44 7d b5 ef dd dd fc d0 35 5f bf | 0f f1 a8 56 0e fe 65 1a 64 97 d5 45 02 78 56 12 | 1d c5 a8 57 78 41 5d 67 f5 9c ac 0c ea 30 76 9f | d6 40 74 a9 16 ad b3 48 34 1d 1d 07 41 4e 7d ea | b4 15 07 22 a9 ac 8e c3 4d e5 f2 d1 ad d3 62 0d | 93 58 9b 58 67 7c fc 81 97 3b af 10 63 67 d9 86 | 45 ad 4f a6 97 2e 79 bd 48 03 5d 44 76 7f c4 9f | a3 54 a8 c8 d0 75 76 5f 1b 6c d2 e3 cc 1a fb de | f6 a0 df 0a e9 48 0b 88 3f b0 b9 04 79 1c 8b 83 | a2 11 a4 9f 9b f2 2f 13 89 0d e6 68 c7 78 af a5 | 8d 94 dc 9c 72 14 d9 47 8e b6 09 d8 6c bb 15 13 | 54 68 b1 04 b2 79 ae 72 17 9f ff 8d d0 33 2c 7a | b0 3e e8 0e e9 c9 f6 bd 41 a5 9d 71 93 9d e7 49 | fb 61 fa 0d 56 19 d3 32 c0 8d ba 0e 98 71 48 e0 | 2f 1a 52 9f c2 03 77 7a 8d 1e 4b 1c 30 c4 31 91 | 29 00 00 24 ad 58 5c 32 62 e5 13 15 63 fb 95 0f | de a4 7f f4 a1 1f b7 cf 95 c9 7b a8 76 d2 3e a1 | 6c d4 9d 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 38 9e 59 ae 71 c3 ed 6e 6e 92 c1 | 9f 33 f8 69 87 bc 1f 0c 00 00 00 1c 00 00 40 05 | 49 73 ae f4 7f e8 6a cf 37 86 5a 1d f5 77 0e ad | 19 ee 51 1c | libevent_free: release ptr-libevent@0x7fb340030080 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ced0 | #329 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 19 44 0d 82 d8 18 b5 00 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #329 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #329 | rejected packet: | 19 44 0d 82 d8 18 b5 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #329: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a63210 | handling event EVENT_RETRANSMIT for parent state #368 | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #368 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #368 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49674.916437; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001826 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ced0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #368 | libevent_malloc: new ptr-libevent@0x7fb340030080 size 128 "road-eastnet-nonat-116" #368: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #368) | af 44 01 88 e6 16 c8 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 fe d2 29 cf 90 27 2d 78 45 a2 b1 3a ed 0c 48 | 17 b4 e8 54 dd 68 cf 7e 09 7a af 17 ed 4f 89 f8 | c0 ff 46 bb 6c a6 b3 38 fd f1 d2 cc cf d4 db c1 | e0 88 fe 51 49 6d e3 71 01 85 fe f4 a5 9f 85 04 | b6 d1 25 1f bd d7 ec 86 d1 7c 74 4d 2b 88 9b 37 | 88 75 91 51 15 43 e3 94 29 7a fc 34 e7 47 6b 09 | 3f 68 5a af 07 68 67 15 d9 ca f4 fd c3 d0 6c 2d | 70 40 4e 4a 88 cf b4 8b 6f 34 77 1b fd 2c ac c0 | b5 ab 67 28 d7 0d cf 79 56 41 4a ee e4 5c 59 e9 | 16 2d 45 df 3b 83 50 77 d1 1d 25 2e df 41 d7 96 | e0 ae 3d 15 c2 fb 47 fc 22 43 64 51 9d 2b 27 9e | ef d5 13 c7 bc a8 df 51 ba 9e 32 c3 d2 0e 3d 97 | 23 9a d8 1c 93 38 85 21 ff 2a 81 20 c2 e1 c5 96 | 9d d3 5f 74 e3 dc ae 9a 19 d8 eb 6f 38 2d 11 55 | b9 c5 4b fe 45 56 61 1b 03 ae 41 5d 20 26 7b b4 | dd 4c d4 57 72 8f 74 07 75 75 35 67 ae 9c b4 2d | 29 00 00 24 b4 f8 c7 8c ce d2 25 cc 04 b1 28 85 | 4c 50 50 1c af 66 c6 a8 14 6b b6 e9 07 eb 31 8e | 06 0d 7b dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 4f 54 9f 13 b7 58 02 6e 4f 8f 36 | 8b d5 61 f1 61 e4 53 15 00 00 00 1c 00 00 40 05 | 79 7d 7e 8e 6a 0e d7 b1 f9 8e 14 46 7c 3e c2 fe | 69 34 3d 95 | libevent_free: release ptr-libevent@0x7fb36c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a63210 | #368 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 44 01 88 e6 16 c8 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #368 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #368 | rejected packet: | af 44 01 88 e6 16 c8 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #368: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae9fc0 | handling event EVENT_RETRANSMIT for parent state #376 | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #376 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #376 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49674.919729; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500914 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a63210 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #376 | libevent_malloc: new ptr-libevent@0x7fb36c01d920 size 128 "road-eastnet-nonat-124" #376: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #376) | ea 6d 1c 44 16 cc 7c db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 30 8d f2 73 36 66 21 18 72 ab a6 1d 5b ca 9c | 0a 7e 8f ea 73 27 8a 58 d5 e4 26 95 19 96 87 0c | 7f 07 37 1c 70 d2 60 3e 98 51 eb 57 bf 72 e0 8c | 84 ad 4f b6 dc 5c 36 41 e2 77 e0 9c 8d 51 16 fc | 84 d9 54 f9 85 4d 98 72 f2 d6 3d 1b 19 f0 da ce | ab 3f 23 52 e0 3a 3c 0f e9 38 61 5a c2 41 30 12 | 05 82 0c cb c8 c2 1e a1 4f f2 c3 e1 3d da 41 26 | 24 be f6 af 3e e8 2f 87 ee 1b 93 a1 f0 e9 53 da | 3a 2e 85 7e d2 d0 a7 3b eb 29 ab 65 b7 78 9f f6 | c5 fd a3 19 78 40 8c d9 48 7b 2c 4c e7 26 6f 53 | d3 ac b1 b4 ba da af d2 ab 50 63 75 e1 1d 99 d0 | b8 31 ac 7d e7 18 55 91 d3 ac 44 fc d3 74 62 7f | ce 91 66 95 28 b3 47 a1 94 fd 56 15 40 09 da b9 | 56 ba 99 10 ef 74 77 7b 2d 9f e1 06 40 6f 4c 27 | 16 1c 00 6e 75 bf e7 e8 68 0b d5 e5 14 e8 f6 62 | 49 c7 45 85 8e da 35 35 ec 65 cf 2e 56 35 57 b4 | 29 00 00 24 b2 22 59 8f 2f 17 3c be 86 a7 a1 89 | a7 cd 11 4f 04 a8 63 56 c2 46 93 de 35 e3 be b3 | 5b e4 fb 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 73 25 29 4a e6 52 0b aa f7 7d 73 | 68 37 ec c6 59 a7 02 18 00 00 00 1c 00 00 40 05 | a9 5a 00 6b 7f 85 e1 a6 d7 c4 fa 5e b7 b1 99 68 | fa 78 21 65 | libevent_free: release ptr-libevent@0x7fb368023a60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae9fc0 | #376 spent 0.0882 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 6d 1c 44 16 cc 7c db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #376 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #376 | rejected packet: | ea 6d 1c 44 16 cc 7c db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #376: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37800cc10 | handling event EVENT_RETRANSMIT for parent state #355 | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #355 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #355 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49674.942999; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003544 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae9fc0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #355 | libevent_malloc: new ptr-libevent@0x7fb368023a60 size 128 "road-eastnet-nonat-103" #355: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #355) | 56 ed c8 71 de f9 06 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 2a 83 b1 26 56 49 8c fe 5f bd b2 84 ea a3 88 | a4 f8 b8 d9 ec 49 43 44 95 bd 12 f2 c5 21 82 10 | 03 69 98 1b 4a 24 1f ea 40 8a 0b 91 c9 76 5c 49 | d4 99 e0 74 0f 3f ee 6f 9e 53 54 1a 23 35 59 5a | aa 59 0d cf 6b cd 1c a1 eb 6c 98 6c 37 17 d0 f8 | 3c dc 93 d2 77 45 41 e8 99 25 82 ad 9d 55 e6 13 | c0 f1 0d 8b 61 04 8f 57 63 d5 98 2e 2e 99 6e 3b | 2e 7c 41 b8 5b 06 ba ad 18 18 aa 84 1a 4c 4a ef | 3b 6e c9 03 be ae 7b 01 5e 77 a6 2b 34 36 7e 21 | 7f c5 d3 9e 48 69 2b 5b 00 e3 c7 29 41 93 4a 4f | 3f 0c 86 c3 a8 9a b3 72 ca 66 fb a6 7b 68 f9 97 | 45 bd 92 5e ee 7e 28 d2 1e 8d 24 ad 5b 2c db 57 | 1e 74 10 aa 41 ab d2 f5 21 4c 56 2b c7 8f ce 5e | d8 69 da 43 89 31 85 08 6d d1 b2 1a 22 1c fe b0 | 36 38 83 b8 45 19 23 bb 71 3e 12 a0 c1 d4 c6 f9 | 92 4b 6b b1 a2 bb 20 eb ff a0 77 69 c4 c9 35 d8 | 29 00 00 24 c0 01 1a b2 54 fa cf 80 10 d0 f3 31 | e6 0e 79 92 f9 e8 de f5 3e 1e d4 6a 54 e0 c2 2f | 19 27 3a 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 da f6 01 f4 40 01 a7 a7 77 b7 fc | 3d b7 6f 1f f7 90 79 11 00 00 00 1c 00 00 40 05 | d2 9a 8c 84 e0 9c 3f 77 ed a7 98 65 71 77 a0 dc | b3 15 95 be | libevent_free: release ptr-libevent@0x7fb37801fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37800cc10 | #355 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 ed c8 71 de f9 06 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #355 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #355 | rejected packet: | 56 ed c8 71 de f9 06 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #355: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11680 | handling event EVENT_RETRANSMIT for parent state #276 | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #276 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #276 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49674.945308; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004825 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37800cc10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #276 | libevent_malloc: new ptr-libevent@0x7fb37801fd50 size 128 "road-eastnet-nonat-24" #276: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #276) | 97 d8 09 67 95 19 ff f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e fe 65 45 24 16 54 b2 a7 14 49 9e 41 08 a6 ad | 8d 38 c1 ab 41 bc c5 70 74 ea 87 6b 47 67 61 c9 | 08 e4 05 10 d8 b1 89 eb 95 ae 5c c6 f1 8d 64 f6 | e2 34 f7 1e 96 bb c8 e4 08 d5 11 49 c7 13 d5 5b | 05 9d 02 33 71 55 11 11 24 9a 7a f7 2f f8 55 e9 | 49 16 da 32 11 31 25 c0 d3 d2 83 15 e8 61 24 52 | f4 f3 a7 f2 34 62 0e d9 54 b7 ea 87 42 a8 29 03 | 05 f5 e1 d2 8f 40 88 3f e8 e4 52 27 80 25 db f2 | 79 7c f2 ce e3 4d 99 fa 0f 82 50 fa bd f3 31 31 | 75 5b 04 3c f4 62 cf 98 a6 3b 30 69 aa fe de 35 | fe 70 61 92 ab 0c 67 96 0d 80 c2 5b c7 8c 3b 7a | 1d cc 0e d5 c6 71 9d 10 b0 4a ac f9 9f b7 d7 6d | 29 1a 45 c3 c8 c4 88 f8 4d dd 53 1c d2 5c 13 5d | 0b 9c e9 d4 6a e6 6d db d7 74 a8 c2 b2 2b 2e 99 | c1 be 2c 7e b9 9a 61 61 42 22 a8 96 77 9d c3 f9 | 9b eb 60 04 cc 7a e8 a6 1b 7a bb 42 2e 5c de 12 | 29 00 00 24 89 93 ef 63 4b 32 f6 be 90 74 d4 cc | df 00 dd 1b b5 27 60 b1 da 93 3c e5 82 5c 18 d4 | 92 56 47 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 b3 01 11 26 92 0f 1e 78 d6 0c e4 | b7 13 47 be 6e 37 68 a6 00 00 00 1c 00 00 40 05 | 24 f3 9b 24 06 cb fe aa 4a 7c a0 cb 8e 4b 56 de | 28 62 03 f5 | libevent_free: release ptr-libevent@0x7fb338048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11680 | #276 spent 0.128 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 d8 09 67 95 19 ff f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #276 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #276 | rejected packet: | 97 d8 09 67 95 19 ff f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #276: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0541 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360012bf0 | handling event EVENT_RETRANSMIT for parent state #330 | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #330 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #330 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49674.962646; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003498 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11680 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #330 | libevent_malloc: new ptr-libevent@0x7fb338048a10 size 128 "road-eastnet-nonat-78" #330: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #330) | 93 2e 75 96 9e d6 58 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 2c e9 0f 22 91 df 5a 5b ae 3a 65 86 ba 44 9c | 65 4a 79 99 b3 fa 29 29 22 63 49 c3 6b 7a c8 2c | a6 64 55 77 51 a1 d2 b5 c5 ed b9 2b d7 c9 de d5 | 1f 04 ca d2 89 15 35 75 d9 05 25 47 aa 0c 65 5b | a8 0c 57 96 31 e9 78 a6 a3 87 ad 68 36 d2 a1 3b | 88 08 f8 2e 28 6b 99 4e 37 3d 68 42 7a f5 6a 2c | 92 3c 46 2d 02 18 a7 c8 61 9b 40 1b d5 74 a6 72 | 61 b0 45 d7 09 4c 08 2d 1e 0e 8d f9 eb 38 be 36 | 94 bc ee 43 6d c2 1a 9d c9 1b 4a 84 b6 50 10 54 | ae 45 14 8d 9a 31 50 76 61 37 da 64 1e 74 bc 11 | a7 13 ed 80 0f 85 3c d8 35 69 89 6d b4 6c ac f3 | 2f 4a 27 55 17 f4 f5 ce 32 75 dd b4 15 0b 7f 61 | e2 87 b3 bb e4 11 66 8c 15 79 6e d9 14 50 70 fe | f5 12 aa 90 f9 25 da 28 bc a5 c1 1c 8f 54 93 e2 | 5b 5a 53 f7 1c 97 4d 5c c4 f6 b5 86 3f 24 5b 64 | c4 87 cd 28 7a 3e ef 9f 68 95 6b f8 95 8d da 08 | 29 00 00 24 a1 af e5 97 d9 f1 9e 6c 80 91 ab 21 | 08 cf 38 0c a4 d3 fb b3 c7 37 98 b4 a4 0d 72 16 | de e9 9d 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 c9 48 f6 82 8f 0c eb 59 3f 42 40 | 18 2f 27 9b ca 1b 0e 80 00 00 00 1c 00 00 40 05 | 3e 48 b8 70 cf c0 9c 35 6c 64 bb e3 c7 5c 5e 43 | 1f 5c 26 91 | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360012bf0 | #330 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 93 2e 75 96 9e d6 58 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #330 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #330 | rejected packet: | 93 2e 75 96 9e d6 58 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #330: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0582 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acc140 | handling event EVENT_RETRANSMIT for parent state #131 | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #131 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #131 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49674.970941; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009525 exceeds limit? YES "road-eastnet-nonat-131" #131: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-131" #131: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #383 at 0x557d46a860c0 | State DB: adding IKEv2 state #383 in UNDEFINED | pstats #383 ikev2.ike started | Message ID: init #383: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #383: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #383; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-131" #383: initiating v2 parent SA to replace #131 | using existing local IKE proposals for connection road-eastnet-nonat-131 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 383 for state #383 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb360012bf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #383 | libevent_malloc: new ptr-libevent@0x7fb380015370 size 128 | crypto helper 0 resuming | #383 spent 0.0672 milliseconds in ikev2_parent_outI1() | crypto helper 0 starting work-order 383 for state #383 | RESET processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 383 | start processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #131 ikev2.ike failed too-many-retransmits | pstats #131 ikev2.ike deleted too-many-retransmits | #131 spent 2.58 milliseconds in total | [RE]START processing: state #131 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-131" #131: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #131: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #131 "road-eastnet-nonat-131" #131: deleting IKE SA for connection 'road-eastnet-nonat-131' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-131' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-131 | State DB: deleting IKEv2 state #131 in PARENT_I1 | parent state #131: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #131 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3440300e0 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 383 time elapsed 0.000566 seconds | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acc140 | in statetime_stop() and could not find #131 | (#383) spent 0.569 milliseconds in crypto helper computing work-order 383: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 383 for state #383 to event queue | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #383 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7fb3840266d0 size 128 Initiating connection road-eastnet-nonat-131 which received a Delete/Notify but must remain up per local policy | crypto helper 0 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-131" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-131' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-131" | stop processing: connection "road-eastnet-nonat-131" (in initiate_a_connection() at initiate.c:349) | spent 0.065 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #383 | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 383 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #383 | **emit ISAKMP Message: | initiator cookie: | 8b a9 fc 25 06 93 a1 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-131 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f1 48 8c d9 3d c6 b0 61 39 4e 19 f7 86 b1 e2 c3 | ikev2 g^x 03 ba 84 78 9c c4 77 a1 7d 57 91 f5 ae c2 ed b8 | ikev2 g^x 0b 61 98 04 6f 72 68 b3 63 3d b6 20 12 b2 50 10 | ikev2 g^x 3d 3c 00 1d b9 ab be 72 ac ba 93 14 3b b2 a4 c2 | ikev2 g^x 8e b0 47 ba 98 bb 5c 2b e4 da 7c 8d a4 4a d6 89 | ikev2 g^x a4 b6 36 de 0f 18 04 bb fc 9c 28 b5 1a ee c2 7a | ikev2 g^x 18 c6 24 27 71 17 17 60 ca 39 4e 5f 5b 71 71 ab | ikev2 g^x e4 cd 79 1b 79 6b 31 46 63 bb cd 82 d7 96 72 86 | ikev2 g^x 1d fc 72 1c e4 a4 16 04 29 1f 9e b6 3a fd 62 30 | ikev2 g^x f1 da dd 12 af 8e 61 c7 51 15 f6 a4 66 22 64 42 | ikev2 g^x ef d3 2c 09 00 94 20 e3 33 79 f3 1d c7 7c 4e 79 | ikev2 g^x a7 a8 2d ec 91 f0 bb fb ff 6c 89 63 ff 5d a6 dc | ikev2 g^x 2c c3 c7 01 d9 71 f9 87 28 4c e4 de 91 08 4b 02 | ikev2 g^x b3 28 ae a1 4d 26 42 63 01 7b d1 2e 68 17 e3 a7 | ikev2 g^x 0a 0b eb 5c 62 18 33 2f d3 a6 c9 6b 3c a2 aa a0 | ikev2 g^x f6 fc 0d 55 8c 1d 7c d8 f9 bd 77 28 68 1c b3 05 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c7 43 5d 92 21 cd 92 00 ce 48 5a 41 bc 51 f7 9c | IKEv2 nonce 7c 73 79 39 5d 67 8e 5d 0e b9 e5 ea f1 7d 01 68 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8b a9 fc 25 06 93 a1 35 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 83 | natd_hash: port= 01 f4 | natd_hash: hash= 2d 9e 11 98 e3 85 61 70 79 85 31 a8 4f a4 76 88 | natd_hash: hash= f9 86 57 fe | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2d 9e 11 98 e3 85 61 70 79 85 31 a8 4f a4 76 88 | Notify data f9 86 57 fe | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8b a9 fc 25 06 93 a1 35 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= fb 7f 30 9d 57 51 30 a9 24 b7 71 f5 04 63 5f 8a | natd_hash: hash= f8 68 fc 05 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fb 7f 30 9d 57 51 30 a9 24 b7 71 f5 04 63 5f 8a | Notify data f8 68 fc 05 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #383 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #383: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #383 to 4294967295 after switching state | Message ID: IKE #383 skipping update_recv as MD is fake | Message ID: sent #383 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-131" #383: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.131:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #383) | 8b a9 fc 25 06 93 a1 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 48 8c d9 3d c6 b0 61 39 4e 19 f7 86 b1 e2 c3 | 03 ba 84 78 9c c4 77 a1 7d 57 91 f5 ae c2 ed b8 | 0b 61 98 04 6f 72 68 b3 63 3d b6 20 12 b2 50 10 | 3d 3c 00 1d b9 ab be 72 ac ba 93 14 3b b2 a4 c2 | 8e b0 47 ba 98 bb 5c 2b e4 da 7c 8d a4 4a d6 89 | a4 b6 36 de 0f 18 04 bb fc 9c 28 b5 1a ee c2 7a | 18 c6 24 27 71 17 17 60 ca 39 4e 5f 5b 71 71 ab | e4 cd 79 1b 79 6b 31 46 63 bb cd 82 d7 96 72 86 | 1d fc 72 1c e4 a4 16 04 29 1f 9e b6 3a fd 62 30 | f1 da dd 12 af 8e 61 c7 51 15 f6 a4 66 22 64 42 | ef d3 2c 09 00 94 20 e3 33 79 f3 1d c7 7c 4e 79 | a7 a8 2d ec 91 f0 bb fb ff 6c 89 63 ff 5d a6 dc | 2c c3 c7 01 d9 71 f9 87 28 4c e4 de 91 08 4b 02 | b3 28 ae a1 4d 26 42 63 01 7b d1 2e 68 17 e3 a7 | 0a 0b eb 5c 62 18 33 2f d3 a6 c9 6b 3c a2 aa a0 | f6 fc 0d 55 8c 1d 7c d8 f9 bd 77 28 68 1c b3 05 | 29 00 00 24 c7 43 5d 92 21 cd 92 00 ce 48 5a 41 | bc 51 f7 9c 7c 73 79 39 5d 67 8e 5d 0e b9 e5 ea | f1 7d 01 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 9e 11 98 e3 85 61 70 79 85 31 a8 | 4f a4 76 88 f9 86 57 fe 00 00 00 1c 00 00 40 05 | fb 7f 30 9d 57 51 30 a9 24 b7 71 f5 04 63 5f 8a | f8 68 fc 05 | state #383 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380015370 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb360012bf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acc140 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #383 | libevent_malloc: new ptr-libevent@0x7fb3440300e0 size 128 | #383 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49674.972062 | resume sending helper answer for #383 suppresed complete_v2_state_transition() and stole MD | #383 spent 0.325 milliseconds in resume sending helper answer | stop processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3840266d0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b a9 fc 25 06 93 a1 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #383 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #383 | rejected packet: | 8b a9 fc 25 06 93 a1 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 83 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #383: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12bc0 | handling event EVENT_RETRANSMIT for parent state #369 | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #369 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #369 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49674.976209; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001306 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400feb0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #369 | libevent_malloc: new ptr-libevent@0x7fb3840266d0 size 128 "road-eastnet-nonat-117" #369: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #369) | ff 18 31 cc 83 7e 2e ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 1f 06 e6 7b ea 4e 17 1c 87 7d 86 73 80 47 50 | cf bf e2 ff 09 37 6a 25 2d 87 f4 71 22 38 1c ca | 11 79 43 67 c5 65 1f f5 07 47 33 ad 73 a4 d3 73 | 51 54 fd df 5a c2 8d 18 cb cc 20 72 8e 07 68 eb | b6 8d ab 31 ba fd fa 9b 7c 59 57 b3 71 f1 91 34 | ea 4b 70 52 a4 6c eb 12 7d 01 23 58 56 9a d3 c0 | a8 35 4b 27 63 af ee d0 37 dd c7 3e 45 5a 0b 60 | bd 6d ed c4 e9 d9 c1 d7 e1 29 a2 3f dc 2c af 7c | e6 74 73 2b 26 15 ca 1c f5 95 b6 33 2f 8c 4a 22 | a1 8d d2 aa 72 d0 9b 41 c8 87 a6 d7 f8 13 c7 cd | 3c d8 62 e2 fc 64 74 ed 50 b1 79 e3 79 44 21 85 | 12 8f 6c 07 3b 37 80 9b 8c 83 41 c0 0e 38 b7 92 | 75 a7 4a 89 81 43 56 e9 67 ee 43 e0 24 9b 53 75 | b9 e5 d1 27 c1 f4 c3 83 7c 57 e4 5e 33 8b e2 10 | c9 ec fe 76 73 25 ae 4b 87 a7 e2 e5 89 5a 08 72 | fc 88 9c 69 9c 14 55 be f9 d1 24 d2 2a 6b bd 35 | 29 00 00 24 03 b6 58 fc c8 79 29 fe 43 44 80 31 | 59 cf 11 77 19 87 27 44 32 ac 84 44 78 ab c0 33 | d7 16 05 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a fa 34 e9 cb c2 b8 b0 71 3e db 9c | 1e f7 0a 0e 8d a9 9b 92 00 00 00 1c 00 00 40 05 | c3 12 1d 90 39 27 a3 80 ba dc 3c b0 c3 6a 52 2a | 1e d7 c5 9b | libevent_free: release ptr-libevent@0x7fb36800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12bc0 | #369 spent 0.0876 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff 18 31 cc 83 7e 2e ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #369 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #369 | rejected packet: | ff 18 31 cc 83 7e 2e ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #369: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0408 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25c40 | handling event EVENT_RETRANSMIT for parent state #377 | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #377 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #377 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49674.984463; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500706 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12bc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #377 | libevent_malloc: new ptr-libevent@0x7fb36800cf80 size 128 "road-eastnet-nonat-125" #377: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #377) | 7d b7 6a 31 9c d6 86 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 bf 7a 35 d2 37 1e c0 a2 92 6a 98 80 72 24 5e | 1f 3c b2 01 23 5f 15 bf ce e9 e4 d7 08 a3 2a 60 | 60 1e 2a e8 5a e7 a9 d5 87 39 6d 3f 34 3f c0 1b | ca fe dc 77 c6 7e 84 64 73 35 57 0c ed b5 74 11 | bb 72 6b af 00 a6 5c 48 1d a9 ae e0 21 6e f9 6c | fe 77 59 9f 79 f0 27 e3 f8 d3 03 12 c5 8c 01 06 | 76 43 6f e7 91 25 19 a3 05 2c 5f 40 7b 60 ce d6 | c7 0a 22 7e c1 15 e4 29 ab c3 9b 6d 58 d6 08 88 | eb 2e fc 26 54 22 7d d9 71 73 77 93 47 47 52 c7 | 2f be 59 30 ba ca e1 78 87 6d cb 35 72 6f 4d 3b | a0 93 98 95 e4 6c 43 b1 50 a4 aa 69 98 d4 ed e8 | 9d 30 82 39 85 51 32 50 b9 91 12 7b 77 d2 d0 9f | 64 b8 21 58 96 89 58 eb 1b a0 e3 48 15 3e 58 3b | 7f 5d 13 52 09 44 ad 12 73 77 70 1d 29 a3 72 c1 | 6f bc 36 26 b2 07 f9 32 34 75 b2 cb 8d 27 b8 92 | 36 ef 06 e2 e3 5e 94 66 19 de e4 ee 30 db 10 64 | 29 00 00 24 40 c7 66 20 2c ab 25 81 a4 29 77 75 | 63 eb 29 35 21 bb d9 a5 a3 5d 38 ec 5b 5c 03 34 | 11 83 53 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 20 88 86 59 0d 66 18 17 be e2 6d | 8e c3 55 fc 50 ba 92 3e 00 00 00 1c 00 00 40 05 | a3 24 68 23 82 72 27 ee 2c 96 9c 16 80 ee e0 88 | 08 9f bc a7 | libevent_free: release ptr-libevent@0x7fb380043300 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c40 | #377 spent 0.0952 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d b7 6a 31 9c d6 86 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #377 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #377 | rejected packet: | 7d b7 6a 31 9c d6 86 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #377: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #331 | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #331 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #331 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49675.027716; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003884 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c40 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #331 | libevent_malloc: new ptr-libevent@0x7fb380043300 size 128 "road-eastnet-nonat-79" #331: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #331) | 50 44 b2 3a 07 a7 4e 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 5b 7a 1c 65 ca 17 c3 34 09 e9 50 2c 1a 5f 2c | 3f 1f d0 f4 a9 fc a5 0f b3 e0 23 18 36 32 e0 dd | 70 db 2b a7 8a bb 5e d5 7b c1 26 49 ed 17 f5 fb | 41 8c 70 b6 46 13 5b 7c be 72 85 64 1f cb c2 3b | 7b cd ab 00 d1 f5 c6 c8 ef 4e 43 8b d1 3c de 4e | 97 78 da c1 12 64 cb f5 74 cf 7b 2b a9 ae 8b a5 | dc d3 db 70 7b c5 17 1a a0 d8 61 49 40 f3 77 7a | 26 f5 d7 d4 fc a6 3c ec 56 96 bd ad fa da 9d 95 | 6f c7 43 12 03 de b3 4a 54 ca 56 3c b7 a8 38 f0 | 03 5a 39 ab 50 08 22 eb 87 c3 7d 6f ff ac b9 cb | 79 02 42 01 ae 8a 86 1f cf 39 34 00 58 b3 82 70 | cb f1 c5 9a 1b e0 1b 28 e5 0b 30 ab da 32 50 a9 | 39 71 a2 8b c0 a0 38 d2 35 39 8f d7 36 de a3 f4 | 70 e0 8f a8 7e 36 bd e7 03 3e dd 85 86 be 19 24 | 24 d5 8e aa 7b 0a 66 52 ff 44 f1 22 3a 93 2a 43 | b3 e4 83 93 f3 85 5b 68 a3 1b 91 5b 88 3f ae 95 | 29 00 00 24 03 6b b7 f1 e0 d0 ec 2f 89 98 41 7d | af 5d 2c 7f 97 af 10 99 b6 2e fe 6f ac 7d ce 98 | 66 f3 c3 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f b7 eb 6a 1a 1b 78 47 4b c9 5c d0 | 13 11 3d 6a 14 1b 4d ab 00 00 00 1c 00 00 40 05 | 4a 21 a9 91 28 88 ee e6 d7 a3 92 f2 91 f6 75 81 | f6 52 77 56 | libevent_free: release ptr-libevent@0x7fb34800f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #331 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 44 b2 3a 07 a7 4e 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #331 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #331 | rejected packet: | 50 44 b2 3a 07 a7 4e 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #331: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad4340 | handling event EVENT_RETRANSMIT for parent state #356 | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #356 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #356 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49675.030986; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003021 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #356 | libevent_malloc: new ptr-libevent@0x7fb34800f1a0 size 128 "road-eastnet-nonat-104" #356: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #356) | ac bc fb 64 b8 05 f9 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 3b ae 20 ec 7a cd 21 f9 ff e0 06 71 c2 e5 55 | 9b 45 49 5f 50 f5 30 9c 0b 3e 8a a2 28 f4 85 c7 | 4f 6f 8c f6 77 7f 00 15 6e 19 1d d1 e0 68 66 87 | 4e df 9c 72 ac b2 8d ab fe f6 05 78 0d c2 c2 f2 | 31 63 92 17 54 19 b6 cf fd 16 6a d8 32 67 48 40 | 84 9f 47 99 c0 29 49 ad 8d 18 53 a5 6f ce c9 03 | 2a bd 3e e5 4f fd 0e 59 73 26 a7 73 de 18 dc 8d | 09 79 73 ae 09 17 25 e9 44 ce 32 60 cd df 52 37 | 66 e2 fc 8e a8 ff 6f bc 73 d9 a9 e6 7e 34 29 30 | c0 25 f8 37 35 6d fc d1 5a 42 45 e2 29 19 ad 5e | b1 89 0e dc 25 33 50 a2 38 82 4f ae e6 4f c3 97 | 55 76 c2 67 8a 3e ac 3d 84 f3 32 ca 54 cc 1c 9f | 23 91 a9 44 f4 93 a5 2a aa cc ed 04 01 4e eb f5 | 00 ac f3 c1 d5 2f 9a 43 89 cf f2 f2 55 7d 1d 3b | d4 57 90 a2 11 f9 23 83 ee a6 72 aa 3b 95 a5 9a | f2 6e 4c 51 df 03 55 77 ff 21 15 db 98 87 cc e3 | 29 00 00 24 80 41 9d 85 d0 e1 49 10 c1 0f c3 d9 | f1 36 ea c7 60 65 b3 e5 0e 51 88 57 20 76 d9 47 | 30 46 2c b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 1f 59 ee ab 85 d8 d4 4a d4 96 c0 | ee 5f a4 59 2f 4a 72 17 00 00 00 1c 00 00 40 05 | 04 5f 5b a5 b0 c4 89 9e 39 c9 c6 97 69 9e e5 9e | 19 14 82 3e | libevent_free: release ptr-libevent@0x7fb370046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad4340 | #356 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac bc fb 64 b8 05 f9 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #356 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #356 | rejected packet: | ac bc fb 64 b8 05 f9 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #356: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a903c0 | handling event EVENT_RETRANSMIT for parent state #132 | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #132 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #132 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49675.032303; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008093 exceeds limit? YES "road-eastnet-nonat-132" #132: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-132" #132: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #384 at 0x557d46a87680 | State DB: adding IKEv2 state #384 in UNDEFINED | pstats #384 ikev2.ike started | Message ID: init #384: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #384: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #384; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-132" #384: initiating v2 parent SA to replace #132 | using existing local IKE proposals for connection road-eastnet-nonat-132 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 384 for state #384 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad4340 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #384 | libevent_malloc: new ptr-libevent@0x7fb370046040 size 128 | #384 spent 0.0949 milliseconds in ikev2_parent_outI1() | RESET processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #132 ikev2.ike failed too-many-retransmits | pstats #132 ikev2.ike deleted too-many-retransmits | #132 spent 2.33 milliseconds in total | [RE]START processing: state #132 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-132" #132: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #132: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #132 | crypto helper 9 resuming | crypto helper 9 starting work-order 384 for state #384 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 384 "road-eastnet-nonat-132" #132: deleting IKE SA for connection 'road-eastnet-nonat-132' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-132' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-132 | State DB: deleting IKEv2 state #132 in PARENT_I1 | parent state #132: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 384 time elapsed 0.00055 seconds | (#384) spent 0.553 milliseconds in crypto helper computing work-order 384: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 384 for state #384 to event queue | scheduling resume sending helper answer for #384 | libevent_malloc: new ptr-libevent@0x7fb37800f1a0 size 128 | crypto helper 9 waiting (nothing to do) | stop processing: state #132 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb34c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a903c0 | in statetime_stop() and could not find #132 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-132 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-132" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-132' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-132" | stop processing: connection "road-eastnet-nonat-132" (in initiate_a_connection() at initiate.c:349) | spent 0.0589 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #384 | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 384 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #384 | **emit ISAKMP Message: | initiator cookie: | 86 6f ae 12 4d c0 7a b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-132 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2d b1 fb 85 46 e4 0b ed 3a 09 27 c9 1d d0 fe 19 | ikev2 g^x 7a 6b 17 bb 62 8e 54 ac f1 64 67 34 40 ff 38 85 | ikev2 g^x 4f ff 54 1e 02 a7 af 76 91 63 95 f0 62 9e e7 68 | ikev2 g^x d4 07 2d a5 05 78 38 e6 00 65 3b 0c 3b 55 b9 34 | ikev2 g^x 19 27 7d 5e 1b 1f d1 f1 b8 c6 a4 32 36 a3 a1 4d | ikev2 g^x 77 fc 92 08 8e 44 1c 7b 72 a0 4a 6f ff ad 86 71 | ikev2 g^x 79 52 e6 49 b1 8f 12 9c 40 bc ec da 58 c7 66 8c | ikev2 g^x df 54 c1 66 96 41 fb 21 bc f2 5f 23 6c 52 ad 47 | ikev2 g^x c4 d3 9c 32 fb 09 e2 cc 47 c2 4b 3f 71 c2 e6 99 | ikev2 g^x 6d b7 94 23 a5 4c 0a 3c be 0e b2 50 04 86 41 e3 | ikev2 g^x 7a 9c 55 d1 3b 34 0c 3c 9f fd 4c f5 09 73 9f 60 | ikev2 g^x 56 d6 11 97 6a c5 df ef fe 2f 35 ee 63 fe 39 b0 | ikev2 g^x 29 b4 b3 01 1b 35 ff 91 b5 b4 bf 86 5f 29 e0 72 | ikev2 g^x 9b d7 f8 07 0a dc 66 0d 27 38 bb fd d4 42 1b 97 | ikev2 g^x 0e e9 cb d0 75 c1 5f 7b 20 8d a3 bd 9c d8 be df | ikev2 g^x 08 8a d8 c8 72 8d 2e 70 0c 78 7d 99 d6 b0 fe c1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce dd a5 d7 0d 86 0a ce 46 70 f7 a4 d8 79 8d ab 0d | IKEv2 nonce 5a ba 15 d4 6b c1 b8 d3 f7 39 89 32 f9 a6 bc c1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 86 6f ae 12 4d c0 7a b9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 84 | natd_hash: port= 01 f4 | natd_hash: hash= ea 0a a8 53 d7 f6 23 14 8d 14 98 5a ec 27 4c a0 | natd_hash: hash= 59 56 95 73 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ea 0a a8 53 d7 f6 23 14 8d 14 98 5a ec 27 4c a0 | Notify data 59 56 95 73 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 86 6f ae 12 4d c0 7a b9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 5b d2 62 5b 9b b5 2e 9c 89 b9 50 27 01 71 4f 1d | natd_hash: hash= 99 42 bf 80 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5b d2 62 5b 9b b5 2e 9c 89 b9 50 27 01 71 4f 1d | Notify data 99 42 bf 80 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #384 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #384: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #384 to 4294967295 after switching state | Message ID: IKE #384 skipping update_recv as MD is fake | Message ID: sent #384 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-132" #384: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.132:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #384) | 86 6f ae 12 4d c0 7a b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d b1 fb 85 46 e4 0b ed 3a 09 27 c9 1d d0 fe 19 | 7a 6b 17 bb 62 8e 54 ac f1 64 67 34 40 ff 38 85 | 4f ff 54 1e 02 a7 af 76 91 63 95 f0 62 9e e7 68 | d4 07 2d a5 05 78 38 e6 00 65 3b 0c 3b 55 b9 34 | 19 27 7d 5e 1b 1f d1 f1 b8 c6 a4 32 36 a3 a1 4d | 77 fc 92 08 8e 44 1c 7b 72 a0 4a 6f ff ad 86 71 | 79 52 e6 49 b1 8f 12 9c 40 bc ec da 58 c7 66 8c | df 54 c1 66 96 41 fb 21 bc f2 5f 23 6c 52 ad 47 | c4 d3 9c 32 fb 09 e2 cc 47 c2 4b 3f 71 c2 e6 99 | 6d b7 94 23 a5 4c 0a 3c be 0e b2 50 04 86 41 e3 | 7a 9c 55 d1 3b 34 0c 3c 9f fd 4c f5 09 73 9f 60 | 56 d6 11 97 6a c5 df ef fe 2f 35 ee 63 fe 39 b0 | 29 b4 b3 01 1b 35 ff 91 b5 b4 bf 86 5f 29 e0 72 | 9b d7 f8 07 0a dc 66 0d 27 38 bb fd d4 42 1b 97 | 0e e9 cb d0 75 c1 5f 7b 20 8d a3 bd 9c d8 be df | 08 8a d8 c8 72 8d 2e 70 0c 78 7d 99 d6 b0 fe c1 | 29 00 00 24 dd a5 d7 0d 86 0a ce 46 70 f7 a4 d8 | 79 8d ab 0d 5a ba 15 d4 6b c1 b8 d3 f7 39 89 32 | f9 a6 bc c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 0a a8 53 d7 f6 23 14 8d 14 98 5a | ec 27 4c a0 59 56 95 73 00 00 00 1c 00 00 40 05 | 5b d2 62 5b 9b b5 2e 9c 89 b9 50 27 01 71 4f 1d | 99 42 bf 80 | state #384 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb370046040 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad4340 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a903c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #384 | libevent_malloc: new ptr-libevent@0x7fb34c02a950 size 128 | #384 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49675.033447 | resume sending helper answer for #384 suppresed complete_v2_state_transition() and stole MD | #384 spent 0.312 milliseconds in resume sending helper answer | stop processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37800f1a0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 6f ae 12 4d c0 7a b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #384 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #384 | rejected packet: | 86 6f ae 12 4d c0 7a b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 84 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #384: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0404 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa1f00 | handling event EVENT_RETRANSMIT for parent state #370 | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #370 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #370 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49675.035717; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001918 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae4880 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #370 | libevent_malloc: new ptr-libevent@0x7fb37800f1a0 size 128 "road-eastnet-nonat-118" #370: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #370) | 4a 80 23 ad fc 41 99 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 13 bc 42 a7 35 39 b2 99 5a ec 69 08 73 18 3f | fe 31 dc bf 22 23 10 df 50 13 8d 04 9e ea 66 93 | 98 fa 79 7f 64 34 1f da 27 d5 8f dc 20 be 18 56 | 17 0e c5 53 3e a4 18 ed 82 41 0e 7f 91 9c e6 cb | ef 35 45 6e 59 c7 b5 4d 35 32 d9 63 30 b7 dd 5d | 28 28 04 d3 d6 a5 84 6f 4c f3 94 90 75 da df 42 | 5a 65 b6 2e cd 5e 42 3b 71 3e 46 f7 4b 13 d1 aa | a5 9c 11 b7 2c 83 34 92 e3 55 46 0b 4b 42 12 08 | 06 02 c9 42 46 42 d0 f1 82 14 36 15 1e 2e d4 a0 | 23 35 a8 d9 5e c2 f8 ca da 81 45 00 34 f6 88 47 | 2f 60 cc ac c2 4b 39 55 8a 1b 8f 66 b3 43 72 fd | 59 52 11 ef 5c 2c 9e b7 b7 6a c6 60 eb 22 9a 4d | e9 c0 4b de 56 c3 d3 e4 19 f0 86 9f a5 38 ef 26 | 39 fb ac 6e b8 32 45 c4 d1 f5 cc bb b2 2f 7b 0b | 6b 6b b1 6f 27 b1 bb 88 e7 c4 d6 31 26 e0 94 2a | ae 90 aa 75 e5 cb 3e 1f 43 13 d3 7b 3c ed 1e b0 | 29 00 00 24 a0 6f 08 ca 5f 92 e1 a2 10 08 5a 34 | 7d b6 05 db 65 e8 3d 88 a0 b3 7d 19 ed 75 36 c4 | 95 ec 9c 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 38 cd 57 b0 33 db 6c e3 f5 95 3e | 28 5e 17 44 43 d3 05 33 00 00 00 1c 00 00 40 05 | 6f b1 ce a1 45 d5 bc 6f 48 f8 db 92 31 a1 28 9a | ba c8 a7 2b | libevent_free: release ptr-libevent@0x7fb3740356e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa1f00 | #370 spent 0.0863 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 80 23 ad fc 41 99 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #370 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #370 | rejected packet: | 4a 80 23 ad fc 41 99 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #370: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354012bf0 | handling event EVENT_RETRANSMIT for parent state #277 | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #277 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #277 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49675.037057; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004743 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa1f00 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #277 | libevent_malloc: new ptr-libevent@0x7fb3740356e0 size 128 "road-eastnet-nonat-25" #277: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #277) | ed b4 5b 7c 9c f8 2d 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 91 10 6d ca 19 82 3a d9 60 7a 42 28 66 35 e5 | 82 e1 76 6a af 41 1a 40 79 5a ee 26 e3 d1 7d 52 | 03 12 d2 f6 99 41 6c 71 1c 80 6b 42 ba dc 3a 1b | b2 e9 12 a6 18 73 56 76 a4 06 05 cc 7a a0 0d 6d | 5e b3 80 19 f7 55 aa 2e 78 b1 66 56 9c 95 5c 32 | ad 95 eb b3 ba 95 95 ac ab 11 2a 2d 88 4f f4 e4 | dc 27 65 85 9d 92 a4 95 34 90 00 dd a5 be b5 ab | 9b 9f 39 46 28 33 16 41 a9 bb 12 e3 aa e6 53 f9 | 68 46 b2 9f c5 cd e9 27 33 0f ce 44 2d af d9 1b | dd 62 0d ac 4f 6c d0 11 3c 43 0a 76 ed 0e 96 8e | 3d ae f9 37 d9 67 c1 41 28 1d b6 2e 37 94 9e d3 | 2d cd 56 12 85 bb 68 4b bc 82 79 db 1e 4d bb bf | 84 00 46 a4 83 fb 2f 52 63 fc 2d 22 07 38 b8 c2 | 10 b3 b9 89 01 dd 44 99 e7 b8 0d b3 ff 24 4d 13 | b0 46 f4 b8 d8 19 4c 50 4a 18 69 03 39 b2 07 55 | 2b c7 e7 99 0d e8 a0 4f a8 e9 77 f9 b1 03 fa af | 29 00 00 24 29 c9 81 60 c0 da c9 2a 2b e1 7f 4a | cf 46 c4 64 f1 f4 1c 69 ff e2 b3 05 a6 db d8 66 | 75 2e e0 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 88 a4 31 ce f7 11 c3 38 da 2b 8a | 45 3d 50 97 02 58 67 d6 00 00 00 1c 00 00 40 05 | 85 8b 47 13 68 9a a2 a7 47 76 c4 a7 6b ba 26 12 | 0d c2 32 9d | libevent_free: release ptr-libevent@0x7fb36401a420 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354012bf0 | #277 spent 0.0877 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed b4 5b 7c 9c f8 2d 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #277 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #277 | rejected packet: | ed b4 5b 7c 9c f8 2d 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #277: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0404 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #378 | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #378 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #378 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49675.061292; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500689 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #378 | libevent_malloc: new ptr-libevent@0x7fb36401a420 size 128 "road-eastnet-nonat-126" #378: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #378) | 92 97 bf d9 57 64 2b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 7e 95 c3 59 64 68 1e dc 08 f2 0b df c0 d3 85 | e4 57 68 76 f4 90 dc 14 fc b4 13 07 10 44 a8 8d | 11 66 84 12 ea 03 ab ca df 00 f5 13 ba 15 16 97 | c3 ae f2 09 b4 c2 1e 65 f4 d4 ef 76 85 ff a3 4a | ac ec 61 57 66 09 9f 4c b2 b0 4b 1a 98 fe 62 e6 | 55 f4 45 b9 db aa 2b bf cb d7 f6 c7 03 42 ad 34 | c6 d8 65 c8 40 fd 09 2c 94 7c 3b f3 2f 0a 0e 1d | 89 ee 1f 04 2f 4d 06 ee d1 19 c4 2e 99 32 3d c2 | d8 62 64 5d 3c 19 32 29 e6 a4 d4 41 97 46 6e 74 | 98 69 50 bd e9 22 20 c8 a0 94 d0 e1 2c ac e0 d4 | 3d 6d 89 f8 65 d2 f8 6c 5d 07 8b 5f be 6f 9f a2 | e3 9a 7d 49 fc a1 b3 f5 34 84 25 08 1b bf 82 69 | 97 0b c6 17 ae 91 38 6f 37 30 af 60 73 cd d7 76 | 1c 53 8a ed 55 8d 3b a6 b0 09 19 d4 bd 91 ad 63 | d2 44 97 69 9c 25 f2 23 5f d4 fb c5 78 47 07 23 | 75 fb 33 32 09 b8 13 e4 4b fc ad 29 45 c0 60 e8 | 29 00 00 24 45 ad fc 22 10 a1 61 46 e5 0c 1e 06 | 27 43 7b e2 4e f3 c7 89 82 92 48 5f 08 ae ee 54 | 20 02 7f 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb d4 ce a5 02 7b 5e 75 a8 72 0f 9e | 6c 02 05 b4 a6 0e 08 51 00 00 00 1c 00 00 40 05 | 67 63 47 aa c8 01 74 31 fc 9f e6 c6 9d 96 80 21 | f6 7a 37 28 | libevent_free: release ptr-libevent@0x7fb3700251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #378 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 97 bf d9 57 64 2b d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #378 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #378 | rejected packet: | 92 97 bf d9 57 64 2b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #378: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0692 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #332 | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #332 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #332 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49675.086669; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003336 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #332 | libevent_malloc: new ptr-libevent@0x7fb3700251c0 size 128 "road-eastnet-nonat-80" #332: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #332) | f6 c6 d2 5e ba a8 2a f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 1a 55 0f 26 2f b6 a0 08 51 81 5d b7 71 b9 2d | c5 80 10 57 cc 9f 39 cd 78 f5 33 cd 29 d9 74 2d | fd fd 10 79 da 5f 98 34 d3 3d e4 28 2e 71 42 b8 | 31 90 4d 52 c2 47 b7 94 df 57 9e 16 03 38 42 c0 | 07 fe 24 67 18 0a bc 2f be 06 80 3f 3f 52 ae de | ee ce 07 d7 03 01 92 16 62 42 5c 77 dc 87 62 e2 | 3a dd 16 7d 8f 37 3d c8 ba 22 d8 ef 9b 9d 2a 3d | e0 2c 5c 39 14 07 d4 e9 80 bd 41 35 a2 65 f5 06 | d6 66 0e 9c 09 15 5b 2c 90 ec 66 68 2a aa 32 c8 | f4 e9 0e 83 19 df 87 aa b7 d2 50 b1 70 7c e8 1d | 69 9d 8f db 7f c7 e2 b0 71 77 37 93 72 6b 02 1f | ff 20 a4 e2 5f 72 65 e8 93 2e 78 8f 02 5c 26 b8 | d6 41 94 30 c6 30 1d fb 21 2d 70 c7 a4 c4 37 64 | d1 d0 93 45 ae 86 94 3c ef 88 96 54 5d 14 dc 13 | 82 20 c0 68 d6 ce 1b eb 97 51 ea 00 31 01 9f 99 | 9c 00 ca 7b c6 e3 21 ad 8a 48 45 1f d8 69 47 47 | 29 00 00 24 92 2b 4a ab c7 31 ef e2 7b 94 b4 08 | 46 bc 96 1f c5 de 4e 6b bb 45 28 4b ff e0 00 6e | 79 8b 88 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 fd 6f fe 83 1d 32 21 59 ad 4f 6d | 1b 98 f5 b3 09 7a d7 45 00 00 00 1c 00 00 40 05 | f2 d1 58 ca ab 44 6f 50 93 d1 3e f5 88 73 05 cc | 3b a4 3c c0 | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #332 spent 0.182 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 c6 d2 5e ba a8 2a f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #332 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #332 | rejected packet: | f6 c6 d2 5e ba a8 2a f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #332: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0767 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368018460 | handling event EVENT_RETRANSMIT for parent state #371 | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #371 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #371 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49675.096078; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001884 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #371 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 "road-eastnet-nonat-119" #371: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #371) | ea d3 d9 fc 5b 7e b4 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 af 47 0e 69 de 58 3a 2d 1e 57 76 30 bc 22 a4 | 2e b6 88 1e b3 88 e7 a1 c8 be 2b 4e 69 e2 28 01 | d0 52 c1 fa 78 94 10 52 aa 87 89 5a 02 a4 2d d1 | 6b d9 9b 86 d2 da a0 98 26 8e b9 2f 8a a2 27 af | de 72 28 ad 98 97 b6 15 90 9c ae 3a 16 ae 38 00 | 2e 00 fb 22 bb 46 e6 d4 1f 46 0d dd a1 55 00 4a | ce 15 02 1f 97 d1 0a 8b 6a 9c c8 a8 24 2f 84 76 | 4b d2 ac 8c 05 c7 63 26 60 5d b2 3c e7 66 a9 5d | bd fb b9 24 84 be 9f 9f d0 98 db 75 76 42 5a 2c | 99 3f 96 7c cd 86 57 c4 8b f7 47 04 8d 56 1e 36 | 87 53 98 86 58 32 c9 ce 17 26 19 6b 99 a4 da aa | cb 3c 40 8e 29 32 f1 cd b7 5a 34 1f de 2b 31 8c | 0d 44 f0 ee 94 1a 31 39 88 2c 28 df 02 20 48 5d | 9d 67 4b c6 5a 1a 30 81 19 09 4e 1b ac 9d a3 80 | 78 a7 b1 0a 79 f2 60 13 6a a0 1a 0d 01 b3 b3 40 | 74 bb ba 1f 20 2b 3c 36 9e 56 74 1c ba 16 9e 5f | 29 00 00 24 c2 25 48 18 a9 32 86 16 98 b5 8a 9d | 56 ab 3c 59 82 6e f2 93 a8 6a ca 20 09 df d9 6f | aa 1d 6f e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 eb 88 f4 ae c4 a3 7b f7 07 ac 42 | 0d c0 83 df c2 98 39 e6 00 00 00 1c 00 00 40 05 | 0c 73 7d f6 90 2f 67 26 fc 28 2f df 9c 80 3e da | bc 60 3a 9d | libevent_free: release ptr-libevent@0x7fb37c01fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368018460 | #371 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea d3 d9 fc 5b 7e b4 e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #371 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #371 | rejected packet: | ea d3 d9 fc 5b 7e b4 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #371: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0758 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47f10 | handling event EVENT_RETRANSMIT for parent state #133 | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #133 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #133 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49675.09637; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008722 exceeds limit? YES "road-eastnet-nonat-133" #133: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-133" #133: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #385 at 0x557d46a88c40 | State DB: adding IKEv2 state #385 in UNDEFINED | pstats #385 ikev2.ike started | Message ID: init #385: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #385: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #385; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-133" #385: initiating v2 parent SA to replace #133 | using existing local IKE proposals for connection road-eastnet-nonat-133 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 385 for state #385 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb368018460 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #385 | libevent_malloc: new ptr-libevent@0x7fb37c01fd50 size 128 | #385 spent 0.105 milliseconds in ikev2_parent_outI1() | crypto helper 10 resuming | crypto helper 10 starting work-order 385 for state #385 | RESET processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 385 | start processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #133 ikev2.ike failed too-many-retransmits | pstats #133 ikev2.ike deleted too-many-retransmits | #133 spent 2.38 milliseconds in total | [RE]START processing: state #133 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-133" #133: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #133: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #133 "road-eastnet-nonat-133" #133: deleting IKE SA for connection 'road-eastnet-nonat-133' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-133' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-133 | State DB: deleting IKEv2 state #133 in PARENT_I1 | parent state #133: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #133 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 385 time elapsed 0.000669 seconds | libevent_free: release ptr-libevent@0x7fb37801d920 | (#385) spent 0.678 milliseconds in crypto helper computing work-order 385: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47f10 | crypto helper 10 sending results from work-order 385 for state #385 to event queue | scheduling resume sending helper answer for #385 | libevent_malloc: new ptr-libevent@0x7fb37c023f10 size 128 | in statetime_stop() and could not find #133 | crypto helper 10 waiting (nothing to do) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-133 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-133" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-133' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-133" | stop processing: connection "road-eastnet-nonat-133" (in initiate_a_connection() at initiate.c:349) | spent 0.0711 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #385 | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 385 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #385 | **emit ISAKMP Message: | initiator cookie: | dc 0d 67 a5 b0 49 95 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-133 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f9 d2 87 4f 28 1e d2 9a 8d 89 1b 83 29 19 de f5 | ikev2 g^x e6 63 09 2d e2 e9 61 46 d1 7b 1d 91 3c 38 a6 0f | ikev2 g^x e9 63 cf 58 08 13 3f 3e 7d f1 19 3d 13 fc 34 b5 | ikev2 g^x 18 8a e7 0c f9 3c 2c 71 b0 34 a4 05 97 a5 9f c7 | ikev2 g^x 97 d1 e4 25 37 22 ef 17 fb 52 35 c9 4f 1f 26 16 | ikev2 g^x 3c 2a 1f 00 10 3c df 46 38 33 44 5d a6 92 e5 d5 | ikev2 g^x 69 68 b5 76 06 e3 77 b8 1e 01 65 43 01 c9 86 ef | ikev2 g^x da 65 a5 1f 57 b0 00 8a de a9 34 23 2e 5c 26 a6 | ikev2 g^x a0 7f 44 a7 f5 75 dd 87 e1 fa 95 ca ff 5e 20 3b | ikev2 g^x 92 ff 19 e9 6e 3b 74 90 7d f7 38 58 ce a4 6e 3e | ikev2 g^x 22 98 35 57 a7 19 32 26 90 4e 72 85 8e fc 44 0f | ikev2 g^x e3 30 88 10 65 63 68 a3 81 e7 a5 04 d1 cf 06 2d | ikev2 g^x 36 a6 35 6b fb 1a c6 21 82 6b b4 50 a3 0b 89 0a | ikev2 g^x 70 f4 46 4d b9 30 8c 1b 9a a3 3e a4 57 bb 51 f0 | ikev2 g^x c0 0a 2a ca 36 ae b3 f0 02 3c c8 b5 bb 6a 7b 96 | ikev2 g^x 55 84 4d bb 15 b3 47 cf cd 45 3c 4a e8 4b 8f 89 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 90 a0 a9 10 09 5c 84 13 2a 39 8b 57 c5 67 7f 3e | IKEv2 nonce 0b 64 03 36 1d 0d c2 a2 27 b3 44 c5 83 b2 09 65 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= dc 0d 67 a5 b0 49 95 64 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 85 | natd_hash: port= 01 f4 | natd_hash: hash= 36 9a 97 66 55 a8 9e d7 24 ff 14 54 09 c0 45 ac | natd_hash: hash= a1 60 51 9f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 36 9a 97 66 55 a8 9e d7 24 ff 14 54 09 c0 45 ac | Notify data a1 60 51 9f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= dc 0d 67 a5 b0 49 95 64 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= da 5c 4e 27 00 47 9e f2 1c fc 63 30 21 b4 79 d8 | natd_hash: hash= 3b 38 4e b8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data da 5c 4e 27 00 47 9e f2 1c fc 63 30 21 b4 79 d8 | Notify data 3b 38 4e b8 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #385 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #385: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #385 to 4294967295 after switching state | Message ID: IKE #385 skipping update_recv as MD is fake | Message ID: sent #385 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-133" #385: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.133:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #385) | dc 0d 67 a5 b0 49 95 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 d2 87 4f 28 1e d2 9a 8d 89 1b 83 29 19 de f5 | e6 63 09 2d e2 e9 61 46 d1 7b 1d 91 3c 38 a6 0f | e9 63 cf 58 08 13 3f 3e 7d f1 19 3d 13 fc 34 b5 | 18 8a e7 0c f9 3c 2c 71 b0 34 a4 05 97 a5 9f c7 | 97 d1 e4 25 37 22 ef 17 fb 52 35 c9 4f 1f 26 16 | 3c 2a 1f 00 10 3c df 46 38 33 44 5d a6 92 e5 d5 | 69 68 b5 76 06 e3 77 b8 1e 01 65 43 01 c9 86 ef | da 65 a5 1f 57 b0 00 8a de a9 34 23 2e 5c 26 a6 | a0 7f 44 a7 f5 75 dd 87 e1 fa 95 ca ff 5e 20 3b | 92 ff 19 e9 6e 3b 74 90 7d f7 38 58 ce a4 6e 3e | 22 98 35 57 a7 19 32 26 90 4e 72 85 8e fc 44 0f | e3 30 88 10 65 63 68 a3 81 e7 a5 04 d1 cf 06 2d | 36 a6 35 6b fb 1a c6 21 82 6b b4 50 a3 0b 89 0a | 70 f4 46 4d b9 30 8c 1b 9a a3 3e a4 57 bb 51 f0 | c0 0a 2a ca 36 ae b3 f0 02 3c c8 b5 bb 6a 7b 96 | 55 84 4d bb 15 b3 47 cf cd 45 3c 4a e8 4b 8f 89 | 29 00 00 24 90 a0 a9 10 09 5c 84 13 2a 39 8b 57 | c5 67 7f 3e 0b 64 03 36 1d 0d c2 a2 27 b3 44 c5 | 83 b2 09 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 9a 97 66 55 a8 9e d7 24 ff 14 54 | 09 c0 45 ac a1 60 51 9f 00 00 00 1c 00 00 40 05 | da 5c 4e 27 00 47 9e f2 1c fc 63 30 21 b4 79 d8 | 3b 38 4e b8 | state #385 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c01fd50 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb368018460 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #385 | libevent_malloc: new ptr-libevent@0x7fb37801d920 size 128 | #385 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49675.097846 | resume sending helper answer for #385 suppresed complete_v2_state_transition() and stole MD | #385 spent 0.515 milliseconds in resume sending helper answer | stop processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c023f10 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 0d 67 a5 b0 49 95 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #385 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #385 | rejected packet: | dc 0d 67 a5 b0 49 95 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 85 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #385: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_RETRANSMIT for parent state #357 | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #357 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #357 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49675.103083; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00348 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c046090 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #357 | libevent_malloc: new ptr-libevent@0x7fb37c023f10 size 128 "road-eastnet-nonat-105" #357: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #357) | 01 73 53 b2 ed 0d 4f 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 5d e8 51 f8 88 2e 8f 82 b3 f0 c5 8d a9 64 a4 | a0 30 bf b5 c2 12 6f 84 86 c4 e5 7c 43 ef 90 df | 5d 9c 5c c9 94 45 36 f4 9a c7 87 0d ff 17 4f a4 | bd 30 02 23 c4 49 d7 cd 90 90 63 b2 f0 74 82 ef | 7b ab 5b 1a 9b 56 e3 fd 6b c1 60 57 a4 3d 47 37 | cf 84 69 51 e7 0c 33 60 a6 88 c6 d3 40 f2 c0 67 | 8b b5 93 bc 89 96 e7 49 3d 16 a4 fa 47 99 08 bb | bf 76 ad cc b2 29 51 14 b3 93 c1 93 70 ab fa 85 | 9c 87 13 3b 74 20 3c a9 9f e8 37 97 e1 cf 3a 19 | 47 ba 4f bf 93 41 7a fe 94 33 ee 81 fb be 0f 8d | 00 a6 62 b8 8f 57 b3 51 57 ec 11 f0 29 c2 98 0d | c4 d2 cf 4a 38 f9 e9 bb 93 44 3a af 7c 9c 77 58 | 65 26 12 0d 96 b7 42 97 54 c0 ec f8 c4 63 9f c0 | 21 fc 89 98 11 d0 25 94 6e 52 89 6d 61 9b 1b e0 | 4a d8 54 ed 06 da f5 4b d3 dd 7c 2c 10 b9 6d 1c | a3 ef f1 ff a5 e4 02 74 f7 b0 97 d7 72 10 8b a3 | 29 00 00 24 2c c1 df 10 e0 1b 6c 08 e6 87 0f da | 7b 1d fc 5a dc 06 9f d4 9a 8b 4f 0e 09 60 b7 78 | 83 2e 36 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be 3a 2f 62 a9 83 16 c4 9b 57 fc 3c | bc 9e d0 29 41 57 58 a4 00 00 00 1c 00 00 40 05 | 08 0b c8 d5 d5 c0 e6 e6 c4 8a f3 fb 5c 3f c5 0a | 4e c8 f0 d0 | libevent_free: release ptr-libevent@0x7fb364023a90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | #357 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 73 53 b2 ed 0d 4f 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #357 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #357 | rejected packet: | 01 73 53 b2 ed 0d 4f 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #357: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0697 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #278 | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #278 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #278 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49675.111449; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004062 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #278 | libevent_malloc: new ptr-libevent@0x7fb364023a90 size 128 "road-eastnet-nonat-26" #278: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #278) | 08 20 1d 54 94 b3 08 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 a1 ac cd cf 52 aa c1 15 fd 26 f6 ce 5b bb 69 | e2 24 51 98 69 82 96 7a 9b 39 3d bd 86 5c 17 cb | 1b d4 a9 83 ec 80 8d 8d 98 27 4b 99 f4 20 5c e3 | 21 59 7a 6e 94 3a e5 a4 ea 37 74 6c a3 9a 99 f4 | 8f 90 94 d4 bd 67 d7 b9 06 e3 7c d1 d3 76 37 58 | 47 a2 45 8a db 7e f9 85 d6 08 20 a6 bf 2b 7f c1 | 25 eb a0 f8 68 c1 9c c0 38 d2 e7 d9 43 7b cb 27 | 99 db 05 15 9d 31 4d 0f 10 f4 8b 1c a6 46 f5 eb | 21 00 56 37 46 de 0d 94 e5 1c 55 ca 89 03 da 88 | 4e dc 76 55 16 95 7d 63 e2 29 4d 09 2b 25 59 20 | f9 0f f3 3f f2 2e bd 84 bc f5 d7 26 2f 24 33 39 | 9b 95 39 a9 c8 80 99 61 48 09 51 76 c7 02 f7 7e | 9a 29 d4 87 ca 9f 9d b2 ea 2d 4b 02 ce 90 b0 a7 | 7e 1d de da 63 ea 0e 8d 96 e6 95 fb 1c 5e 88 3b | 6e ec 99 33 d7 e2 75 ac ca 10 ec 9b 00 5a c4 5e | 94 67 a1 9a 10 a7 22 d4 3e d5 55 a9 17 c5 c5 72 | 29 00 00 24 16 ad f5 49 a7 87 af 94 50 48 7a 22 | f4 eb b9 a7 0c 25 3c c9 61 3d 03 4a 9f 4c 8f 7c | d3 51 5e 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e fe 64 30 2d 54 01 ce c5 20 30 8e | 57 4b dd bc f4 7a 78 34 00 00 00 1c 00 00 40 05 | c5 ea 3a 3a ae 73 b8 b7 65 be 1b eb 5d 99 4d a3 | 57 6c 56 99 | libevent_free: release ptr-libevent@0x7fb364045e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | #278 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 20 1d 54 94 b3 08 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #278 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #278 | rejected packet: | 08 20 1d 54 94 b3 08 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #278: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0533 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354018460 | handling event EVENT_RETRANSMIT for parent state #333 | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #333 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #333 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49675.151784; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003641 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #333 | libevent_malloc: new ptr-libevent@0x7fb364045e60 size 128 "road-eastnet-nonat-81" #333: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #333) | 36 9c 5e f3 7a 54 db f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df 35 02 78 fc 13 18 22 30 0e d2 c5 c7 5e 7a ef | fc 39 68 66 58 1c a7 d7 f4 43 08 7d f3 9f a3 12 | 83 85 91 2a d6 fa cf 49 c5 3a 4e ef 94 c1 54 16 | 1b 99 b1 a6 48 34 1c b5 c6 ee 58 e5 e4 3c 00 8c | f6 ed dc dd 07 96 4c 6b 8d 5f aa d5 5e f5 20 2e | 3f 32 89 26 7f 4e af 1e 9a 4a 36 89 bf ed bc fa | 5a d9 0b e6 38 d4 55 02 b6 04 ba b9 b2 30 b0 dc | ee 4b 24 b9 ca 12 84 2f 34 21 e3 1c 0e f7 c4 d5 | ce ff 47 39 50 96 0a de ca 62 7f b7 57 aa dc 15 | fa 24 df 17 c7 d0 80 14 18 ef d1 f8 18 5f 36 22 | 2a ba 77 eb 0a 13 5b 8b 27 f6 fa ad 95 0f 09 90 | 17 80 57 73 91 84 22 c2 f7 e1 0e dd b5 d9 e2 7e | 44 ff ae 13 c1 78 7c 90 56 b5 79 a1 5d 2f 9a 4e | 56 4b 74 fa 8f 64 20 07 77 6a 9d cf 03 50 e4 f8 | 0d 1d ad 75 e0 c0 52 df 18 df 4e ac 10 5a bf 8c | 35 df 7e 38 e0 d8 bf ff 6f 7d 3a 37 d3 86 c3 73 | 29 00 00 24 0e 6c f9 b7 77 8c 01 48 47 c0 c4 ac | 2c 92 5d 4f bc 4c de 69 52 73 e8 16 78 88 9e ed | d3 2e 55 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 3c 0e c8 f8 59 38 94 13 7f 9d fb | 64 4c f1 0b 3e 49 1c bd 00 00 00 1c 00 00 40 05 | 19 5d c9 52 f0 58 98 88 cd 4a c6 e4 d4 78 0a 3b | 9f f4 40 6f | libevent_free: release ptr-libevent@0x7fb36401e1e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354018460 | #333 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 9c 5e f3 7a 54 db f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #333 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #333 | rejected packet: | 36 9c 5e f3 7a 54 db f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #333: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0548 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8ee40 | handling event EVENT_RETRANSMIT for parent state #134 | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #134 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #134 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49675.155092; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00761 exceeds limit? YES "road-eastnet-nonat-134" #134: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-134" #134: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #386 at 0x557d46a8a200 | State DB: adding IKEv2 state #386 in UNDEFINED | pstats #386 ikev2.ike started | Message ID: init #386: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #386: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #386; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-134" #386: initiating v2 parent SA to replace #134 | using existing local IKE proposals for connection road-eastnet-nonat-134 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 386 for state #386 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb354018460 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #386 | libevent_malloc: new ptr-libevent@0x7fb36401e1e0 size 128 | #386 spent 0.0918 milliseconds in ikev2_parent_outI1() | RESET processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 14 resuming | crypto helper 14 starting work-order 386 for state #386 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 386 | start processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #134 ikev2.ike failed too-many-retransmits | pstats #134 ikev2.ike deleted too-many-retransmits | #134 spent 2.26 milliseconds in total | [RE]START processing: state #134 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-134" #134: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #134: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #134 "road-eastnet-nonat-134" #134: deleting IKE SA for connection 'road-eastnet-nonat-134' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-134' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-134 | State DB: deleting IKEv2 state #134 in PARENT_I1 | parent state #134: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #134 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 386 time elapsed 0.001156 seconds | libevent_free: release ptr-libevent@0x7fb36c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee40 | in statetime_stop() and could not find #134 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#386) spent 1.17 milliseconds in crypto helper computing work-order 386: ikev2_outI1 KE (pcr) | processing global timer EVENT_REVIVE_CONNS | crypto helper 14 sending results from work-order 386 for state #386 to event queue | scheduling resume sending helper answer for #386 | libevent_malloc: new ptr-libevent@0x7fb37001d6b0 size 128 Initiating connection road-eastnet-nonat-134 which received a Delete/Notify but must remain up per local policy | crypto helper 14 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-134" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-134' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-134" | stop processing: connection "road-eastnet-nonat-134" (in initiate_a_connection() at initiate.c:349) | spent 0.0924 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #386 | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 386 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #386 | **emit ISAKMP Message: | initiator cookie: | b9 e2 f3 4f 37 4c 11 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-134 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1f da ec b0 32 6b 35 e3 b5 80 95 66 e9 7f b8 d5 | ikev2 g^x e2 e0 68 33 cd 76 e0 38 1a b1 5d 56 26 da 9f e0 | ikev2 g^x 7e 25 7d 36 13 86 62 f1 2c 8d 3f 33 c2 a9 77 5c | ikev2 g^x 6c 22 2c d9 e8 13 05 5f 5c b6 bf 2d 06 59 25 68 | ikev2 g^x 04 0a 7e 77 39 77 e2 48 8e 95 f3 7a 6b 62 7a 5c | ikev2 g^x 74 73 02 c5 eb 3d 85 b2 e4 97 e2 a5 7e c1 fd bd | ikev2 g^x 8e 39 16 68 05 dd bf 87 fa 57 12 1c 04 ca 0c 29 | ikev2 g^x 8c f4 e1 ff dd 36 cf 70 de cd 23 dc c6 ae 0f aa | ikev2 g^x 3b 0f fa f5 80 72 1a cd 74 ba bc e4 a4 6c a0 e3 | ikev2 g^x 89 9a 36 59 db 27 b5 54 3f 8a aa cb ee 7a 4c 74 | ikev2 g^x 10 ef 6c 33 3c 46 b9 be 98 4b 1f 0c 9e a1 0f e7 | ikev2 g^x 70 9c 48 fc 41 5f bc 21 01 43 4c 8e f5 9c e5 23 | ikev2 g^x bb 93 4c ac ba 5c 01 89 9a 17 4a 24 a8 b9 2c 47 | ikev2 g^x 70 fc 07 f1 21 a4 d5 20 f9 8f f8 38 ce d5 70 b1 | ikev2 g^x 42 c9 99 11 ba 5a fc 0c 06 b5 ae ff af e4 68 aa | ikev2 g^x d7 82 77 58 85 4e fc 74 00 fa 00 8a 91 15 50 9e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 84 96 aa 5e b5 f6 6f 99 c5 43 c7 51 b3 36 1c 3e | IKEv2 nonce 65 fe 9c e9 3e a8 cd 03 a7 c9 e1 a9 36 56 0e 4b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b9 e2 f3 4f 37 4c 11 40 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 86 | natd_hash: port= 01 f4 | natd_hash: hash= 69 80 4a c6 9c b6 70 28 5d 0a 3a 23 72 63 d0 38 | natd_hash: hash= 6e f2 8f ca | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 69 80 4a c6 9c b6 70 28 5d 0a 3a 23 72 63 d0 38 | Notify data 6e f2 8f ca | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b9 e2 f3 4f 37 4c 11 40 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 26 1f 03 bb d7 50 8e c5 c4 3f 03 d2 3a c8 fe 3b | natd_hash: hash= 09 a1 da 1f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 26 1f 03 bb d7 50 8e c5 c4 3f 03 d2 3a c8 fe 3b | Notify data 09 a1 da 1f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #386 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #386: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #386 to 4294967295 after switching state | Message ID: IKE #386 skipping update_recv as MD is fake | Message ID: sent #386 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-134" #386: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.134:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #386) | b9 e2 f3 4f 37 4c 11 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f da ec b0 32 6b 35 e3 b5 80 95 66 e9 7f b8 d5 | e2 e0 68 33 cd 76 e0 38 1a b1 5d 56 26 da 9f e0 | 7e 25 7d 36 13 86 62 f1 2c 8d 3f 33 c2 a9 77 5c | 6c 22 2c d9 e8 13 05 5f 5c b6 bf 2d 06 59 25 68 | 04 0a 7e 77 39 77 e2 48 8e 95 f3 7a 6b 62 7a 5c | 74 73 02 c5 eb 3d 85 b2 e4 97 e2 a5 7e c1 fd bd | 8e 39 16 68 05 dd bf 87 fa 57 12 1c 04 ca 0c 29 | 8c f4 e1 ff dd 36 cf 70 de cd 23 dc c6 ae 0f aa | 3b 0f fa f5 80 72 1a cd 74 ba bc e4 a4 6c a0 e3 | 89 9a 36 59 db 27 b5 54 3f 8a aa cb ee 7a 4c 74 | 10 ef 6c 33 3c 46 b9 be 98 4b 1f 0c 9e a1 0f e7 | 70 9c 48 fc 41 5f bc 21 01 43 4c 8e f5 9c e5 23 | bb 93 4c ac ba 5c 01 89 9a 17 4a 24 a8 b9 2c 47 | 70 fc 07 f1 21 a4 d5 20 f9 8f f8 38 ce d5 70 b1 | 42 c9 99 11 ba 5a fc 0c 06 b5 ae ff af e4 68 aa | d7 82 77 58 85 4e fc 74 00 fa 00 8a 91 15 50 9e | 29 00 00 24 84 96 aa 5e b5 f6 6f 99 c5 43 c7 51 | b3 36 1c 3e 65 fe 9c e9 3e a8 cd 03 a7 c9 e1 a9 | 36 56 0e 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 80 4a c6 9c b6 70 28 5d 0a 3a 23 | 72 63 d0 38 6e f2 8f ca 00 00 00 1c 00 00 40 05 | 26 1f 03 bb d7 50 8e c5 c4 3f 03 d2 3a c8 fe 3b | 09 a1 da 1f | state #386 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36401e1e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb354018460 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #386 | libevent_malloc: new ptr-libevent@0x7fb36c0251c0 size 128 | #386 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49675.15709 | resume sending helper answer for #386 suppresed complete_v2_state_transition() and stole MD | #386 spent 0.512 milliseconds in resume sending helper answer | stop processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37001d6b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 e2 f3 4f 37 4c 11 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #386 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #386 | rejected packet: | b9 e2 f3 4f 37 4c 11 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 86 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #386: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0779 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a94540 | handling event EVENT_RETRANSMIT for parent state #379 | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #379 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #379 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49675.157231; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499096 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #379 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 "road-eastnet-nonat-127" #379: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #379) | ac d4 3b e7 18 ea 52 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 79 a1 28 22 6c 83 3f 06 54 d9 39 13 0e d2 1a | 91 c2 ca c5 f2 c4 4e d5 78 8f 04 34 b9 34 73 b2 | 0e 75 71 ec 03 a6 5b c6 fa 6d a8 f4 41 1e af 26 | a4 e1 0a 58 77 48 aa f7 f9 4b 31 cf 6b f4 65 97 | 07 66 c4 32 08 bd d1 a1 48 aa 20 4b 65 4e 17 6e | 1d 1d 3e be b4 1e 7a 49 6a 64 0a fb 44 89 ba 45 | 90 86 8a 0e 4e 08 c0 05 da d1 a0 ff 5a ee c2 33 | ff d9 1a 6f ee 08 fd 7e aa 64 53 f4 84 74 c5 cf | 19 1a 29 d4 bf 47 bd 52 17 99 38 57 75 f7 85 58 | a7 b0 c8 4e e1 95 2d 4b f1 9c 5e eb 85 14 0d 87 | ff dd 17 9a ad 51 c0 99 e2 a6 60 c5 a5 7e 68 46 | b9 5c 04 3b 76 a0 9e 3d f7 9a 42 72 b5 92 be a4 | 61 c4 dd 5e a0 a3 58 05 90 20 32 7d b8 9d ca 34 | 36 d3 6d 56 98 49 60 97 da 87 f8 14 51 ea cf 16 | 79 9b 7d e5 00 7a 74 76 25 99 77 5a ef df a7 1c | e5 07 de ab dc 8b 19 85 17 de fd 62 d8 d6 3b b0 | 29 00 00 24 7a e9 60 d7 4c 8b 32 bf 82 0a a8 9a | c0 af 7e 52 e6 dc b9 f1 3b fb 0d 8e 4f c7 9d 86 | 5c d7 7a af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b e2 54 69 3e 49 d9 e9 7b 2c 62 f7 | a1 9b 3b a0 68 bf 42 11 00 00 00 1c 00 00 40 05 | 0c ab 0f ab 0f 86 37 d7 85 f7 e9 a7 f4 f2 01 1e | 28 ca 40 2a | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94540 | #379 spent 0.0956 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac d4 3b e7 18 ea 52 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #379 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #379 | rejected packet: | ac d4 3b e7 18 ea 52 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #379: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.048 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350012bf0 | handling event EVENT_RETRANSMIT for parent state #372 | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #372 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #372 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49675.164627; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001881 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94540 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #372 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 "road-eastnet-nonat-120" #372: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #372) | 36 75 19 e8 2f 22 a4 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 1c 43 17 d7 b5 ce d2 b8 29 b2 bf 57 09 8b a5 | 02 ac c4 b7 76 e6 2d d8 ee ee 3c fe f4 66 f4 89 | f0 05 d4 6f 70 58 f2 ac a3 f6 a0 c0 6f e2 88 9c | 40 3f 21 b6 b5 e3 53 20 6c d9 59 5c d3 ed 29 31 | 70 b1 e2 00 f7 0a fb f6 8a 39 29 d2 58 c2 74 92 | 4c 9b 08 3f 44 b8 04 b0 23 1d ad 99 96 41 5c c3 | 74 17 1f 67 0a d8 d1 96 a3 e0 b8 c3 31 5e 35 15 | b4 7d 07 ac 51 6c 39 25 b1 04 61 4c b1 08 c3 a9 | 03 2e 6c 07 f6 12 ea 26 ae ed 42 10 86 bf 00 1f | 2c 3f d3 c3 05 31 1b 23 d0 7f 44 40 17 23 be b1 | ac f2 d9 5c 2d 0f 0e 8d d6 8e 02 9e c2 0d 39 2a | 1e 53 92 9d 45 7f f8 25 a0 3b 40 14 ce aa d7 8e | 3c 97 d8 0a 68 34 c5 e0 01 c0 9d 3c df ab b9 db | 0f 08 4e 9b 7f 31 ba b0 df 14 c3 2e b6 43 df 9c | e8 24 93 e8 93 fa be d8 05 20 58 54 dc 18 b6 a1 | 81 c2 54 d8 9d 63 fd 0b 60 e1 78 75 ef 13 d9 ec | 29 00 00 24 5b 70 e2 22 fb be c5 61 40 e7 92 1f | fe 03 7b 3d 26 2b 9e 50 62 fe 14 ef 7e 0b e5 c1 | 7b 5b 83 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6f bb b6 72 03 25 00 b3 08 33 f3 00 | 3f a7 05 f9 e6 64 00 bb 00 00 00 1c 00 00 40 05 | 5c 2b 76 69 54 27 3e cb 36 ec 86 9b 13 f7 89 7b | 0b 66 55 89 | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350012bf0 | #372 spent 0.178 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 75 19 e8 2f 22 a4 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #372 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #372 | rejected packet: | 36 75 19 e8 2f 22 a4 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #372: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0845 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abfd80 | handling event EVENT_RETRANSMIT for parent state #279 | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #279 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #279 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49675.187047; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005143 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350012bf0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #279 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 "road-eastnet-nonat-27" #279: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #279) | e3 74 db 6d 09 5b 39 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 0f 5a 1b 7a 8f ca c9 79 23 84 5e dc 90 86 16 | 69 23 cd b6 f6 38 83 88 87 a0 82 5d cb 87 94 7a | a5 f1 35 43 62 38 5c 18 da 06 83 48 7b 51 b2 80 | 57 ee 54 19 13 b6 1b 59 ab b3 f3 ce 4e 70 21 d2 | 1d 3f 07 6b c1 ad 15 8b 16 67 f3 79 c6 3f ee ff | 6b 97 0c 11 61 f6 68 6d 51 5b dc dc 69 1e f2 f8 | 31 6f 04 6f 19 7c a8 a9 37 a2 da ca be a8 40 a8 | d0 ef 42 ba be 70 25 1f 20 b2 dd 25 56 46 50 6a | 55 24 29 65 1f 8b ad 5a c0 f3 1f c2 6d ed 0d 17 | f8 37 85 23 72 0c 7b c5 c8 05 6a d0 1b 38 ca f1 | 63 79 aa 8b f0 75 7e c0 5c 06 26 d0 c2 20 b9 e9 | c7 89 2f ee 84 27 1c 00 f8 3a d5 7e 2a be c2 84 | e4 6a 7c 0c 25 65 bb 41 df ad ea 07 28 2c bc 6e | 24 1b 9a 66 f8 83 86 6a 84 b0 d9 93 6f e5 9a 01 | 17 24 34 ac 82 0a b8 a3 51 37 c3 89 94 09 92 d7 | 0d 37 14 e0 ee 1c 1b 73 ef 46 af cc fd ba 52 42 | 29 00 00 24 f9 6f e2 b3 2b d1 43 b4 d3 29 40 07 | 4f e9 c5 79 33 c1 2e 78 27 6c f8 54 58 c2 d9 c9 | 00 b6 d5 b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 94 ec 05 36 41 29 fa 93 f5 5d d2 | 39 00 ad d2 4d 2f 36 81 00 00 00 1c 00 00 40 05 | 7a 98 d6 69 28 79 15 19 95 89 31 96 52 96 29 94 | 7d 8f c3 a4 | libevent_free: release ptr-libevent@0x7fb36402a780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abfd80 | #279 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 74 db 6d 09 5b 39 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #279 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #279 | rejected packet: | e3 74 db 6d 09 5b 39 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #279: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c018460 | handling event EVENT_RETRANSMIT for parent state #358 | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #358 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #358 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49675.18733; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003029 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abfd80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #358 | libevent_malloc: new ptr-libevent@0x7fb36402a780 size 128 "road-eastnet-nonat-106" #358: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #358) | 9c 16 21 10 e3 b0 2f 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 b0 5e 24 2c 38 69 f7 5e 0a ef 9c cd 0c a9 a2 | e7 60 22 31 02 17 4e 87 ab da 67 2c 74 68 e6 5c | 3c 13 72 b8 82 de 1f 97 f0 91 0b ef 5f 05 b5 88 | 8f 55 10 d6 ed 84 95 00 12 6f 2a 48 1a 79 36 91 | 49 04 49 1e 83 7f 51 0b cd 40 c4 12 1d 28 81 4a | ff 1e be db 2c 06 48 44 01 2b 86 9e 50 88 79 26 | a2 fe 2d b6 28 25 0f 1c 72 e5 7c 02 81 23 76 48 | e4 63 77 54 94 1c a2 42 e7 62 79 1a 9c c2 d3 a5 | 84 2a 02 f0 5d 86 de 0c ac 44 c1 bc a9 db 93 da | ab e8 d1 96 60 b7 1e 28 8e ce cc cb 77 fb 32 3a | af 1c d9 5d 2b 9d 4c bb 37 50 e3 2c 2a bd a4 df | 6f 99 23 0d 27 83 b0 b4 f9 48 a2 69 86 2e 3a c0 | 5d bf ed 94 bb f2 f3 07 e1 00 d8 2f 62 9b ee ec | b5 9a a1 3e ac 61 be 8a ce 7d 14 b6 c3 13 21 43 | 2f 85 9a 2f fd b3 5f a3 b2 e0 9c 9a 19 21 fa dc | c3 c9 17 3d e7 0b 51 07 b0 13 9d cf 7d 38 e5 ef | 29 00 00 24 31 6e a1 8e 9b bf 74 40 01 d9 c6 2f | f4 95 5e 1f af be c9 b5 67 9c 79 1e 7d 41 57 e9 | 2e 59 a1 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 2b df 62 51 b1 0d 46 7a 83 b8 02 | 18 9c 1e 91 3d 80 67 46 00 00 00 1c 00 00 40 05 | 21 2b d2 d4 2f 80 55 47 29 a9 2f db 69 80 68 e4 | e7 d9 41 df | libevent_free: release ptr-libevent@0x7fb36c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c018460 | #358 spent 0.0825 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9c 16 21 10 e3 b0 2f 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #358 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #358 | rejected packet: | 9c 16 21 10 e3 b0 2f 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #358: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0482 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad43c0 | handling event EVENT_RETRANSMIT for parent state #135 | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #135 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #135 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49675.214618; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007061 exceeds limit? YES "road-eastnet-nonat-135" #135: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-135" #135: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #387 at 0x557d46a8b7c0 | State DB: adding IKEv2 state #387 in UNDEFINED | pstats #387 ikev2.ike started | Message ID: init #387: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #387: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #387; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-135" #387: initiating v2 parent SA to replace #135 | using existing local IKE proposals for connection road-eastnet-nonat-135 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 387 for state #387 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c018460 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #387 | libevent_malloc: new ptr-libevent@0x7fb36c04b7c0 size 128 | #387 spent 0.0798 milliseconds in ikev2_parent_outI1() | RESET processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #135 ikev2.ike failed too-many-retransmits | pstats #135 ikev2.ike deleted too-many-retransmits | #135 spent 2.27 milliseconds in total | [RE]START processing: state #135 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-135" #135: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #135: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #135 "road-eastnet-nonat-135" #135: deleting IKE SA for connection 'road-eastnet-nonat-135' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-135' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-135 | crypto helper 15 resuming | State DB: deleting IKEv2 state #135 in PARENT_I1 | crypto helper 15 starting work-order 387 for state #387 | parent state #135: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 387 | stop processing: state #135 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb368046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad43c0 | in statetime_stop() and could not find #135 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-135 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-135" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-135' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-135" | stop processing: connection "road-eastnet-nonat-135" (in initiate_a_connection() at initiate.c:349) | spent 0.0737 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 387 time elapsed 0.000657 seconds | (#387) spent 0.661 milliseconds in crypto helper computing work-order 387: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 387 for state #387 to event queue | scheduling resume sending helper answer for #387 | libevent_malloc: new ptr-libevent@0x7fb374023c90 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #387 | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 387 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #387 | **emit ISAKMP Message: | initiator cookie: | 75 6e e5 e5 6a cd b8 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-135 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ff a4 36 8a d7 5e f8 44 73 70 3f d1 cc 7c 79 90 | ikev2 g^x 0b d6 30 0a fd 2b 08 93 ae c4 9d c0 92 f3 30 c3 | ikev2 g^x aa 43 1a b6 dd 00 a6 77 0b 61 7f 7a 6d 22 60 10 | ikev2 g^x f1 8f 0a bd 4e 21 a1 c5 3c 6d bc 87 58 3a fc 28 | ikev2 g^x a1 f5 dc 41 f0 99 f6 3d 83 55 3c 93 36 df 67 78 | ikev2 g^x d6 16 47 a9 dd 0a f6 c9 ed 30 32 20 48 63 8f ce | ikev2 g^x 8c eb 37 37 cb 50 71 37 bd cb 4b f9 48 98 89 fb | ikev2 g^x 52 3f d5 c6 89 92 40 89 ae 52 a8 41 db 88 8d ad | ikev2 g^x 76 89 a2 2c 25 fd cd a1 b3 18 a9 52 92 ca 41 cc | ikev2 g^x be 86 7c 0a d4 fa d9 2c a1 ce 6b 87 5c 4f 0b a7 | ikev2 g^x e2 e7 b1 90 b4 88 13 15 0f 2d 50 24 a6 28 8e 8a | ikev2 g^x 81 90 02 66 38 1d 10 b6 04 db f1 15 7f 9a 7c eb | ikev2 g^x ec 94 ef 10 22 b8 7f a2 35 e6 24 56 5c e6 40 99 | ikev2 g^x 8b 09 81 82 27 99 96 55 ae 30 73 4e 23 e9 a5 45 | ikev2 g^x d0 57 f8 f9 3b 6c 05 9a 46 78 7d b3 62 a4 ed 17 | ikev2 g^x 2e 15 c3 a2 7d 0c 1c 89 e1 68 08 b6 03 09 76 f8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 11 0e 4a cd 20 fc ce 84 68 c7 a8 ec 48 5c fe b5 | IKEv2 nonce ee 21 2d ef c1 3f a3 a1 30 c1 c0 88 b1 78 03 bd | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 75 6e e5 e5 6a cd b8 3f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 87 | natd_hash: port= 01 f4 | natd_hash: hash= 68 fb 47 16 eb 64 05 e3 af e5 70 ee b4 39 fc 1b | natd_hash: hash= 30 12 e4 0b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 68 fb 47 16 eb 64 05 e3 af e5 70 ee b4 39 fc 1b | Notify data 30 12 e4 0b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 75 6e e5 e5 6a cd b8 3f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d8 e1 2e 80 87 77 be 81 c0 a4 a8 f5 fc 15 8f 58 | natd_hash: hash= 08 dc e4 8d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d8 e1 2e 80 87 77 be 81 c0 a4 a8 f5 fc 15 8f 58 | Notify data 08 dc e4 8d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #387 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #387: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #387 to 4294967295 after switching state | Message ID: IKE #387 skipping update_recv as MD is fake | Message ID: sent #387 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-135" #387: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.135:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #387) | 75 6e e5 e5 6a cd b8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff a4 36 8a d7 5e f8 44 73 70 3f d1 cc 7c 79 90 | 0b d6 30 0a fd 2b 08 93 ae c4 9d c0 92 f3 30 c3 | aa 43 1a b6 dd 00 a6 77 0b 61 7f 7a 6d 22 60 10 | f1 8f 0a bd 4e 21 a1 c5 3c 6d bc 87 58 3a fc 28 | a1 f5 dc 41 f0 99 f6 3d 83 55 3c 93 36 df 67 78 | d6 16 47 a9 dd 0a f6 c9 ed 30 32 20 48 63 8f ce | 8c eb 37 37 cb 50 71 37 bd cb 4b f9 48 98 89 fb | 52 3f d5 c6 89 92 40 89 ae 52 a8 41 db 88 8d ad | 76 89 a2 2c 25 fd cd a1 b3 18 a9 52 92 ca 41 cc | be 86 7c 0a d4 fa d9 2c a1 ce 6b 87 5c 4f 0b a7 | e2 e7 b1 90 b4 88 13 15 0f 2d 50 24 a6 28 8e 8a | 81 90 02 66 38 1d 10 b6 04 db f1 15 7f 9a 7c eb | ec 94 ef 10 22 b8 7f a2 35 e6 24 56 5c e6 40 99 | 8b 09 81 82 27 99 96 55 ae 30 73 4e 23 e9 a5 45 | d0 57 f8 f9 3b 6c 05 9a 46 78 7d b3 62 a4 ed 17 | 2e 15 c3 a2 7d 0c 1c 89 e1 68 08 b6 03 09 76 f8 | 29 00 00 24 11 0e 4a cd 20 fc ce 84 68 c7 a8 ec | 48 5c fe b5 ee 21 2d ef c1 3f a3 a1 30 c1 c0 88 | b1 78 03 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 fb 47 16 eb 64 05 e3 af e5 70 ee | b4 39 fc 1b 30 12 e4 0b 00 00 00 1c 00 00 40 05 | d8 e1 2e 80 87 77 be 81 c0 a4 a8 f5 fc 15 8f 58 | 08 dc e4 8d | state #387 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c04b7c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c018460 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad43c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #387 | libevent_malloc: new ptr-libevent@0x7fb36c04b7c0 size 128 | #387 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49675.216013 | resume sending helper answer for #387 suppresed complete_v2_state_transition() and stole MD | #387 spent 0.475 milliseconds in resume sending helper answer | stop processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb374023c90 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 6e e5 e5 6a cd b8 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #387 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #387 | rejected packet: | 75 6e e5 e5 6a cd b8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 87 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #387: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a73690 | handling event EVENT_RETRANSMIT for parent state #334 | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #334 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #334 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49675.225242; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005489 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #334 | libevent_malloc: new ptr-libevent@0x7fb374023c90 size 128 "road-eastnet-nonat-82" #334: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #334) | 99 fb 3f 4d 99 57 72 cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a ca de c8 71 49 e8 30 84 13 c9 a8 49 58 85 47 | 09 f9 f9 59 70 d3 2b 07 44 44 cc 17 14 52 02 aa | 27 07 c2 cd 39 d4 b6 e5 73 79 a9 2f 72 89 bd 61 | d5 62 f8 e8 e6 f1 12 2e 57 7d d0 8e 8b 5d 7b ce | 30 2f b7 61 b2 0b 7b a0 24 5a fe 42 60 21 92 aa | 5a be e9 6d ac f6 2b f8 e4 db ed fe 70 91 ae a8 | 85 c9 a9 89 2d af 8b 90 60 53 0f 7b 1f 54 22 36 | b6 5d 78 20 de 79 62 7d 9d 74 65 df 47 cb 75 b6 | eb 4f 70 ec d4 3f 23 06 d7 65 0a b2 74 f8 e9 72 | 81 4c 29 37 9f 65 5b 7b c1 89 f7 c4 28 5b 64 9b | 59 6b b0 17 bf e7 21 58 4f ad 42 06 42 7b d5 d6 | 2f 45 bc a9 64 87 9f 47 9d 1c 11 c7 6e 0c 53 bf | a5 35 d6 5f eb b3 bf 80 3c b3 0d 2b 91 66 f7 a4 | 98 9c 01 6a 7e ee e3 b3 ad 96 90 67 e0 44 49 71 | 2a 4d 41 3b cc ae 39 dd 1f 03 62 e9 5e 5c bf 21 | 27 f6 9b 3e 24 35 1b f3 b8 96 3c e2 59 58 ea 9a | 29 00 00 24 64 85 28 2f 41 a8 19 c8 06 e4 df 4c | 57 5a d5 28 ae 9b e4 58 e9 c7 cc 4b e4 65 be 72 | 5c d2 98 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 3d 2f a6 85 1f fa fd 47 13 ee 3b | 56 07 59 de 70 93 a0 2d 00 00 00 1c 00 00 40 05 | ab e9 3c 75 bd a4 6c 62 ac eb 51 4e 98 ab 45 51 | fa 01 56 3d | libevent_free: release ptr-libevent@0x7fb34403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a73690 | #334 spent 0.189 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 fb 3f 4d 99 57 72 cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #334 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #334 | rejected packet: | 99 fb 3f 4d 99 57 72 cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #334: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0855 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #373 | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #373 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #373 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49675.238676; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002812 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a73690 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #373 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 "road-eastnet-nonat-121" #373: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #373) | cc d0 7c e3 2d ba 98 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba c9 ec 57 66 ee 6d 75 ec 00 31 9e bb a2 7b 33 | 03 5b e1 5f f9 35 33 83 7e 5f 91 5b a2 92 9a a8 | 8d 3b 36 89 d7 60 3c f0 e0 82 e5 11 6e 43 23 b1 | df d6 90 8f 04 61 87 4f 48 d6 55 c3 74 01 c3 05 | 74 78 5b 86 ae c3 d1 0f 5a c9 e4 c5 26 fd 8f 0b | 7a de b0 bf fa 77 b7 99 27 6d 94 68 54 8f 2e b4 | 27 fc 46 a6 65 3e f8 0d 42 f0 50 03 21 b0 cd 96 | 2d 45 e2 17 2e 0c 5d ab 5d cf b0 76 7e 40 37 71 | ec c6 7f c3 8e c1 e3 0c da 69 0c bb 78 ac ef e6 | fa da 64 48 00 9c 0f d4 5e 3f fd b4 84 a9 1f 83 | f8 16 28 f3 f1 a7 fd f1 9e 6b cf 4b 33 5a 08 dd | 8d d5 23 ac 66 10 69 36 aa 87 aa ab ed ab 68 36 | 4a 70 e5 64 3a 2f 37 bf 5e 42 b9 8e 12 99 78 f7 | 0c 24 39 a4 0c ff 5c 9e b7 31 00 75 be b4 85 09 | f6 93 ec eb a2 a7 69 50 c8 7a 9b 97 aa 4c fd 91 | 2c 8c 14 31 ec 08 42 84 d3 a9 ed d2 74 47 99 ae | 29 00 00 24 b4 0d dc 4f 11 5b a4 50 84 d3 92 d3 | f6 ef 85 ab 3e d2 da 12 30 2f 73 8e 10 d5 43 df | 1d 88 10 ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 85 d9 5b 1c 2d 07 c4 07 50 eb 06 | 15 5f 19 1f ba 90 46 a0 00 00 00 1c 00 00 40 05 | bb 4b 15 0f 4a b6 b1 9b ec 46 e5 86 fe 18 d0 b4 | dc 99 60 c7 | libevent_free: release ptr-libevent@0x7fb370014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #373 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc d0 7c e3 2d ba 98 af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #373 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #373 | rejected packet: | cc d0 7c e3 2d ba 98 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #373: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.059 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338012bf0 | handling event EVENT_RETRANSMIT for parent state #280 | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #280 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #280 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49675.242019; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004785 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #280 | libevent_malloc: new ptr-libevent@0x7fb370014c70 size 128 "road-eastnet-nonat-28" #280: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #280) | d6 f7 ab 7c 0b ea 69 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca e1 05 9c 2f e1 85 fc d1 c1 5e ec 37 7e 0d 76 | 45 c5 de cd 99 7d 74 0a 48 32 65 23 49 b2 c2 df | ba 7e d2 ef 7c 32 31 03 10 0c 09 94 c0 eb b8 b5 | 06 97 c9 45 66 24 48 7d 72 da ab 98 55 09 59 9c | 31 af 0e c1 8a a9 90 d1 a5 1f 67 f1 af 23 81 27 | 72 13 c8 3c d8 f0 f1 d8 ca c2 a1 9a 92 8c fd 09 | b0 c2 a6 d5 91 c6 84 9b 99 40 a3 ac 3e 94 44 cd | 9a 36 6e be f8 2c 85 77 18 29 38 0d c0 06 06 d0 | a2 de 4c 8d 95 cd da f4 a0 2f bd 4d 70 4f 95 ae | db 5a f3 57 de 7c dd 31 a6 66 ca aa 68 cf 9d 1d | b3 0a 17 80 b5 20 24 43 82 44 17 25 0f 38 64 50 | 75 9d 57 76 b6 2b ee 0e 3f 93 33 cf 3f 9b 45 97 | f9 87 b6 87 a6 ec cb 33 18 44 a7 89 6a 59 c0 2b | ff 8a 7d 67 3d 1a 08 05 fe 9f fa 6c b7 f7 96 5d | a2 3b 23 c8 4a 7c 17 7b 08 d8 db 48 f9 5d 62 1b | 0b 5f d0 c6 c6 a2 28 ed 7c 45 7a f3 33 a6 d2 1f | 29 00 00 24 05 cd b3 b7 f3 87 52 75 9b b2 14 f4 | c3 19 28 f7 78 65 e3 f9 18 22 0f 07 13 10 65 88 | f1 44 b8 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a b5 25 17 f4 1a 4f 2a 05 d2 2d 99 | 3c 89 36 9b 9d 62 ed 5f 00 00 00 1c 00 00 40 05 | ee 9f 85 88 b6 c7 ef c2 a5 c8 d9 f7 7a e7 a6 c3 | 70 03 54 b6 | libevent_free: release ptr-libevent@0x7fb35003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338012bf0 | #280 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 f7 ab 7c 0b ea 69 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #280 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #280 | rejected packet: | d6 f7 ab 7c 0b ea 69 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #280: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0811 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd80 | handling event EVENT_RETRANSMIT for parent state #380 | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #380 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #380 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49675.246424; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500246 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #380 | libevent_malloc: new ptr-libevent@0x7fb35003b0b0 size 128 "road-eastnet-nonat-128" #380: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #380) | 8c 85 b9 1f be 6e 3d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 1e de d9 e8 4b 77 f1 86 35 82 03 5f ce 7b cb | 0a c9 87 87 aa 3a 74 01 02 fc e1 64 e0 07 7c 06 | dd ed c8 68 23 d7 e1 98 d6 47 ab 77 d0 38 d7 b3 | 2e d4 c4 52 2d e3 2c bc 34 35 8e 16 9e 83 9d 76 | 9f cc 43 a2 24 c5 ff 0f ed 32 bf e5 c9 3b bb e7 | a4 cc 2a 54 79 4f 13 6e 29 6d 75 36 6c 87 01 9c | 1f e0 d3 9f 4c c1 24 b9 2b d8 7b fa 2a d1 70 cc | f1 73 67 12 91 0a 83 03 b6 96 60 5a f8 fb a0 1a | 92 b6 0c fb e9 77 6e a8 e9 d4 02 be 0d 82 27 ba | 20 48 7d ed 5d 31 52 4a 59 63 6f 7e c4 3e 2e ac | 5e 97 a4 c4 d3 ae 3d fa a4 3b fb c2 de b4 5c 6c | f2 4a 19 f4 47 5a 00 3f 78 e7 bc 36 32 f4 d0 ce | 7c 2d 58 ca fa c4 cc 95 9e a4 78 b5 2d fd 23 cb | 2a 9d bc 7a 8a bb 88 97 8b fb 82 e5 e3 af 23 95 | 4e ed 5d 7c 45 af c0 e7 bb 20 cb e5 da 63 b4 54 | a8 b6 35 4f 40 f2 02 b1 8a 9f 38 00 e7 8b 27 93 | 29 00 00 24 e9 59 12 f8 16 a7 9f df 69 ae 67 26 | 7d 68 3d f0 e8 95 32 e5 ac 44 49 ce 96 5b 71 84 | 56 84 ec f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 47 26 04 c2 b4 0a 38 20 0b c5 38 | 8f 45 ae 49 d1 6f dd cf 00 00 00 1c 00 00 40 05 | 48 d9 a4 21 0f e8 6e ab 23 f4 84 7b 2a 45 72 13 | eb 6b 5f 3a | libevent_free: release ptr-libevent@0x7fb340008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd80 | #380 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c 85 b9 1f be 6e 3d 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #380 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #380 | rejected packet: | 8c 85 b9 1f be 6e 3d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #380: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0817 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #359 | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #359 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #359 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49675.261833; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002349 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #359 | libevent_malloc: new ptr-libevent@0x7fb340008e30 size 128 "road-eastnet-nonat-107" #359: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #359) | 73 c2 2a a2 cb e2 3d 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 2e 83 fc d4 94 f1 45 60 7e d6 c0 1f 1c e7 33 | 0f bd b7 8a 76 4b 8b 45 55 e6 bb 84 3d 22 78 af | 75 6e da ff d0 e9 4b 87 08 80 14 e9 1e 9e bb 0e | 16 e9 ea 66 ca bd 7c 66 87 ad a8 d9 21 e1 38 83 | 1f 32 ef a7 2f 0e bf 2d 1d 63 39 6b 83 61 62 c6 | 3e 6a a6 28 e7 8f 0a b3 a0 d9 53 fb be 77 6d 21 | 33 ab c4 d4 01 99 45 77 31 5e 2f ff 5a 01 15 07 | d7 80 2f 1a 7e c3 c0 54 fe ea 5a 9f 7b b7 54 0e | 9f aa da f6 69 55 9a 24 0b a7 e8 7e 52 f9 f8 78 | ba 68 8d a1 bc 1f b0 9f 73 b4 50 08 1b 93 cf 3c | ca 2c f0 94 b0 7c a2 eb fc f9 ec 95 a0 6e 85 2f | 2e ef 23 90 9d 23 ef b2 33 25 ac 56 cb 51 63 74 | c1 ab 1f 93 d7 e6 e0 11 36 c8 47 24 fc 03 91 1a | 9f ca af ad 3e 92 13 be 1e e3 b4 78 2a ad 4c d9 | b9 b1 7c 5e 5e 7c 3e c4 e0 d5 55 d6 b9 f7 15 83 | 2f 6c 01 ee d5 14 3b f0 0d dd 1e 11 8b 30 cd e0 | 29 00 00 24 69 b6 35 41 69 53 97 ba 18 48 44 fd | d5 e2 9a 31 05 82 94 36 da fb c0 91 72 56 36 c7 | c4 dd c7 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 a1 1b b6 5c a0 e8 d3 82 8b cf 19 | 85 69 c3 9f 45 ea 96 77 00 00 00 1c 00 00 40 05 | 5b ca 3a 7b b0 51 af 81 eb d5 3c 03 e7 f7 fa 57 | 2f 45 5b b9 | libevent_free: release ptr-libevent@0x7fb3840060f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | #359 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 73 c2 2a a2 cb e2 3d 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #359 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #359 | rejected packet: | 73 c2 2a a2 cb e2 3d 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #359: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0562 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a67330 | handling event EVENT_RETRANSMIT for parent state #335 | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #335 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #335 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49675.277122; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003608 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #335 | libevent_malloc: new ptr-libevent@0x7fb3840060f0 size 128 "road-eastnet-nonat-83" #335: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #335) | 43 a2 0c b8 41 14 fb 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 1a ff fe 66 5c 27 50 3c bb 63 46 9d 4f 02 13 | 90 10 26 6b 8b bb ce 8e f8 b1 4e 76 fe b9 96 cb | 8a 27 62 97 df ca 55 0f 1b 21 02 63 f2 9a 56 cf | af a1 0c 10 6a 33 02 6e 92 2e ca f8 26 1a ae eb | 16 92 9e c4 5b 3e 17 4a 65 79 45 19 ed da 56 2e | 51 d3 90 a7 9f 98 36 5a 61 58 65 de 51 88 f2 d6 | 2c 74 21 5b 26 93 04 1f 9d 42 9f 74 af 5b 84 53 | 88 76 a7 2b 50 71 5f 03 19 11 aa 1d 3f 9a 1b be | 3f 66 50 7a 7c c6 ba 3a 1f b1 9f aa e7 d9 54 d2 | 8e 38 49 1c 3f da 85 98 28 e2 8c e3 a0 7e 8b bb | 1f a5 48 ea b8 af 51 41 c3 b5 72 51 f3 06 99 5a | 76 51 df 7b 88 a9 f4 af 6a 05 b3 e4 b4 4c ac 08 | 4f aa 11 34 cc 49 a5 06 8b 79 a3 52 45 cd 64 d8 | 83 12 a6 eb 44 69 b7 c9 e1 51 9a 09 19 b8 97 03 | 64 d6 b8 43 68 0f ed bf 4f 10 12 04 91 a0 82 30 | b8 e7 e9 9e 27 9b 68 9f 56 43 7c 93 6d 87 a8 e5 | 29 00 00 24 42 02 24 73 b2 25 02 dc ca ad a2 1d | 9e f8 54 e2 15 e2 22 5d 3f 7b 60 32 c9 95 b0 ec | b1 7e 62 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 ff c7 be 47 4f 0e b7 8d ed 50 5b | d9 e3 74 cc de e6 b4 2d 00 00 00 1c 00 00 40 05 | 8d 0a fb 98 6b 40 87 d9 54 5c 96 0f 30 79 eb 55 | 16 93 80 76 | libevent_free: release ptr-libevent@0x7fb34401fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a67330 | #335 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 a2 0c b8 41 14 fb 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #335 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #335 | rejected packet: | 43 a2 0c b8 41 14 fb 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #335: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0728 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #136 | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #136 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #136 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49675.280495; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007689 exceeds limit? YES "road-eastnet-nonat-136" #136: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-136" #136: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #388 at 0x557d46a8cd80 | State DB: adding IKEv2 state #388 in UNDEFINED | pstats #388 ikev2.ike started | Message ID: init #388: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #388: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #388; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-136" #388: initiating v2 parent SA to replace #136 | using existing local IKE proposals for connection road-eastnet-nonat-136 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 388 for state #388 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a67330 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #388 | libevent_malloc: new ptr-libevent@0x7fb34401fd50 size 128 | #388 spent 0.101 milliseconds in ikev2_parent_outI1() | crypto helper 19 resuming | RESET processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 19 starting work-order 388 for state #388 | start processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #136 ikev2.ike failed too-many-retransmits | pstats #136 ikev2.ike deleted too-many-retransmits | #136 spent 2.61 milliseconds in total | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 388 | [RE]START processing: state #136 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-136" #136: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #136: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #136 "road-eastnet-nonat-136" #136: deleting IKE SA for connection 'road-eastnet-nonat-136' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-136' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-136 | State DB: deleting IKEv2 state #136 in PARENT_I1 | parent state #136: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #136 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 388 time elapsed 0.001187 seconds | libevent_free: release ptr-libevent@0x7fb34c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | (#388) spent 1.18 milliseconds in crypto helper computing work-order 388: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 388 for state #388 to event queue | in statetime_stop() and could not find #136 | scheduling resume sending helper answer for #388 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb368023e60 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-136 which received a Delete/Notify but must remain up per local policy | crypto helper 19 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-136" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-136' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-136" | stop processing: connection "road-eastnet-nonat-136" (in initiate_a_connection() at initiate.c:349) | spent 0.0805 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #388 | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 388 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #388 | **emit ISAKMP Message: | initiator cookie: | f7 ff cf 56 0b 2d 32 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-136 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b2 17 f0 4b b8 d6 41 9d bc 4a 96 2e 42 ab 77 4e | ikev2 g^x 7f 54 60 13 56 59 15 20 fc c4 79 98 ae 8f e2 06 | ikev2 g^x 69 79 8f 5d 63 48 c3 bc 00 b2 f8 7b 8f f4 4d a0 | ikev2 g^x 8c a9 81 52 3e 4a c4 f8 92 22 05 f0 4d e8 83 0e | ikev2 g^x f0 26 c0 2c 43 f9 88 43 07 5f 25 9e 50 b5 11 c3 | ikev2 g^x 73 c8 0e 1f 5c 85 88 1c fc e4 6e f2 9c 07 04 d2 | ikev2 g^x 2d 14 31 25 c7 f1 fa 00 27 db 06 87 f8 4d 48 60 | ikev2 g^x a2 9b c5 9a 24 e6 5c 8b 88 aa 13 bf 0e 45 97 1c | ikev2 g^x aa fb ea 7f ee 38 9d c2 3b dc ac 73 ba e2 2c 03 | ikev2 g^x 3d dd 91 b1 96 88 2a b1 4e a5 10 5e fe 8f b7 60 | ikev2 g^x 27 7f 42 c9 c1 97 c4 03 be 93 ba 66 8c 91 b1 77 | ikev2 g^x 12 50 ef a2 c9 9b f5 15 0b 50 4a dc c3 9e 64 d1 | ikev2 g^x d8 0c c9 6c 86 d8 1a 40 d2 c3 48 bc 8a 19 fb 47 | ikev2 g^x d3 3d 4c 63 67 3a 9b 43 54 08 5f 36 9c 29 c6 ed | ikev2 g^x 7a c1 fa 3a 70 4b f1 9d 3d f8 73 d3 02 37 8f 1c | ikev2 g^x 0a e4 74 d1 b8 f7 7d a3 cc 04 0d cc 02 1c 9d d7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d2 a6 cd 06 28 a1 fe ae 1b 89 a2 1d a1 4a 61 12 | IKEv2 nonce 14 72 44 a4 a4 a5 e9 38 f2 78 91 07 4b 1e 98 28 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f7 ff cf 56 0b 2d 32 8a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 88 | natd_hash: port= 01 f4 | natd_hash: hash= 00 fc fe 8e 48 65 14 18 f3 7c 80 1c c9 89 2e 09 | natd_hash: hash= 96 5d 2c 3e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 00 fc fe 8e 48 65 14 18 f3 7c 80 1c c9 89 2e 09 | Notify data 96 5d 2c 3e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f7 ff cf 56 0b 2d 32 8a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 5e 49 cb 06 a1 a8 89 d0 e9 f4 c7 34 ac a2 e0 5c | natd_hash: hash= 40 ed 0b 80 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5e 49 cb 06 a1 a8 89 d0 e9 f4 c7 34 ac a2 e0 5c | Notify data 40 ed 0b 80 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #388 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #388: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #388 to 4294967295 after switching state | Message ID: IKE #388 skipping update_recv as MD is fake | Message ID: sent #388 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-136" #388: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.136:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #388) | f7 ff cf 56 0b 2d 32 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 17 f0 4b b8 d6 41 9d bc 4a 96 2e 42 ab 77 4e | 7f 54 60 13 56 59 15 20 fc c4 79 98 ae 8f e2 06 | 69 79 8f 5d 63 48 c3 bc 00 b2 f8 7b 8f f4 4d a0 | 8c a9 81 52 3e 4a c4 f8 92 22 05 f0 4d e8 83 0e | f0 26 c0 2c 43 f9 88 43 07 5f 25 9e 50 b5 11 c3 | 73 c8 0e 1f 5c 85 88 1c fc e4 6e f2 9c 07 04 d2 | 2d 14 31 25 c7 f1 fa 00 27 db 06 87 f8 4d 48 60 | a2 9b c5 9a 24 e6 5c 8b 88 aa 13 bf 0e 45 97 1c | aa fb ea 7f ee 38 9d c2 3b dc ac 73 ba e2 2c 03 | 3d dd 91 b1 96 88 2a b1 4e a5 10 5e fe 8f b7 60 | 27 7f 42 c9 c1 97 c4 03 be 93 ba 66 8c 91 b1 77 | 12 50 ef a2 c9 9b f5 15 0b 50 4a dc c3 9e 64 d1 | d8 0c c9 6c 86 d8 1a 40 d2 c3 48 bc 8a 19 fb 47 | d3 3d 4c 63 67 3a 9b 43 54 08 5f 36 9c 29 c6 ed | 7a c1 fa 3a 70 4b f1 9d 3d f8 73 d3 02 37 8f 1c | 0a e4 74 d1 b8 f7 7d a3 cc 04 0d cc 02 1c 9d d7 | 29 00 00 24 d2 a6 cd 06 28 a1 fe ae 1b 89 a2 1d | a1 4a 61 12 14 72 44 a4 a4 a5 e9 38 f2 78 91 07 | 4b 1e 98 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 fc fe 8e 48 65 14 18 f3 7c 80 1c | c9 89 2e 09 96 5d 2c 3e 00 00 00 1c 00 00 40 05 | 5e 49 cb 06 a1 a8 89 d0 e9 f4 c7 34 ac a2 e0 5c | 40 ed 0b 80 | state #388 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34401fd50 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a67330 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #388 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 | #388 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49675.282561 | resume sending helper answer for #388 suppresed complete_v2_state_transition() and stole MD | #388 spent 0.544 milliseconds in resume sending helper answer | stop processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb368023e60 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 ff cf 56 0b 2d 32 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #388 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #388 | rejected packet: | f7 ff cf 56 0b 2d 32 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 88 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #388: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0728 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360018460 | handling event EVENT_RETRANSMIT for parent state #374 | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #374 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #374 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49675.291805; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001723 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368017ea0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #374 | libevent_malloc: new ptr-libevent@0x7fb368023e60 size 128 "road-eastnet-nonat-122" #374: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #374) | 2b af 1b 03 10 38 37 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 c3 14 06 9b d8 f1 99 49 48 ff 90 1f 86 00 28 | 44 18 8a f8 52 dc 7d 04 1b d5 bc 43 4d 6c cb 67 | f8 0d 9d 6d d0 66 c5 1d 7e 62 70 73 1c 71 41 b4 | dd 81 08 b3 22 a9 c5 05 00 35 5b 00 07 16 93 d5 | 94 c1 6c 23 e3 4f fb cc 11 67 47 b3 e1 b1 07 89 | ea c0 9e a2 65 96 87 08 be 34 63 54 73 84 17 c6 | d1 75 fb 5b 8e 80 b1 4e bc e5 80 b5 fc 51 6b 8e | af 49 e6 d5 05 a1 42 3f 30 13 b7 fe 10 06 81 bc | 26 72 22 45 7f 9f 88 7e f2 4d d6 4b 6d 85 6b 06 | 69 00 b6 2d 19 97 b0 06 ca c7 30 d2 02 d3 f6 37 | 5e 73 21 4a 86 ec 60 ca fd d2 ed d8 05 2b db 6c | a9 01 2a 23 f7 1d d9 64 5b e9 5e 20 76 8d 16 0a | bf cd f0 54 2a 72 e9 f6 56 5e 90 80 56 52 68 ca | 9f 40 22 7c 1e b1 d0 73 7b 7b 65 7f 5f 3b b2 a4 | 2d 12 04 bd 89 d0 f1 f1 ba b3 be 3d 20 c5 f8 84 | bc fa 4d 90 8e a5 a8 51 48 43 7b 6c ed ea 9f e0 | 29 00 00 24 8b e7 71 0b f0 6c d4 66 d8 89 de 00 | 61 f0 41 76 89 f5 bb 07 5f 2d 78 ac d6 5e eb 30 | 2f 0d 98 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 37 47 83 86 42 9b 81 4e c6 41 b6 | af 4f 24 3f ee d6 bb bd 00 00 00 1c 00 00 40 05 | 2f d6 db c3 63 be 1c 54 fe 3c c7 2a 35 82 32 22 | 47 30 b2 bc | libevent_free: release ptr-libevent@0x7fb38802d3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360018460 | #374 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2b af 1b 03 10 38 37 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #374 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #374 | rejected packet: | 2b af 1b 03 10 38 37 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #374: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0546 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a86b80 | handling event EVENT_RETRANSMIT for parent state #281 | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #281 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #281 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49675.31215; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006398 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360018460 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #281 | libevent_malloc: new ptr-libevent@0x7fb38802d3a0 size 128 "road-eastnet-nonat-29" #281: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #281) | 6e a6 a1 b4 01 a0 0e dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 68 2b 46 8c 2b 9e 7f b4 06 ec 72 36 3a be fa | 50 91 b7 48 61 bc d4 d3 11 dc 1f d6 9a c1 21 a2 | 97 1d cf c0 4e 3d 88 c1 96 35 32 5c c3 c4 b5 d1 | 96 85 b6 1e 34 48 5e 70 e1 97 d1 4d ee c9 36 cd | 07 d4 c1 98 8c 4b f8 c0 2b 58 50 1f 39 3f 7e 62 | c9 4e 54 20 95 c8 4c fc 93 c6 64 05 ff db 54 92 | f9 8c d4 27 f6 69 ac 7b 53 12 4d 7e 22 de e0 4c | 9b 65 6e 55 e2 59 db 77 7d a0 70 9f cd fd b6 7a | 15 79 9a 65 29 97 e4 c6 46 84 7b 52 6e 4e 1b 43 | 80 ec d1 87 3d 75 43 f1 6b 08 60 65 d9 e2 6c 04 | c5 f0 75 0d 72 fe 09 0a a5 0a 64 0c 9d 8e b4 bd | 1a c3 bb 6e f6 92 c0 b5 8c 93 b9 eb e3 12 c7 a1 | bd b7 f3 a0 b9 80 8c 76 59 8f 43 af 0f 58 66 7f | b7 29 f0 c0 1c a1 51 2d c9 c0 ac e0 da 3e 0a fc | dd 42 1f ec 76 07 0c b3 ee 58 80 d8 3b 40 cd 6e | 29 12 48 14 35 22 e0 cf 05 9a 1b 46 91 35 4f 0c | 29 00 00 24 1a c7 00 d3 83 91 04 b5 76 85 d3 69 | a2 08 a9 2c b0 b3 a2 60 be 18 eb 18 2d fd ba 85 | 0c 0a 5c be 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 cf b4 85 53 44 b8 30 db 31 85 32 | 18 7e 13 4c d0 54 13 87 00 00 00 1c 00 00 40 05 | 54 d2 36 85 02 19 96 85 9c 4b 22 1c 55 b4 68 ad | 30 56 22 92 | libevent_free: release ptr-libevent@0x7fb35401a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a86b80 | #281 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6e a6 a1 b4 01 a0 0e dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #281 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #281 | rejected packet: | 6e a6 a1 b4 01 a0 0e dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #281: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #381 | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #381 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #381 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49675.331439; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499902 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a86b80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #381 | libevent_malloc: new ptr-libevent@0x7fb35401a4e0 size 128 "road-eastnet-nonat-129" #381: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #381) | 1e fb 19 74 69 81 f6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 15 4d 3c 26 b9 8e 71 c8 4c 65 3c 93 c4 f8 5c | 0c 69 48 07 1f b0 40 db 39 45 4f 12 5d b7 64 ce | f6 36 76 d1 4f f2 c3 d5 d1 3f c7 4e dd 69 ef bd | 2e 06 de 7f fb 43 32 b5 94 31 7c 96 1c 09 3c 05 | c9 f9 e9 6e f6 32 3d b2 3f 7a 40 e8 05 db 42 df | 50 a9 3b 1b be f2 2b d2 43 70 99 24 25 7e b9 8b | 88 12 28 70 28 9b b9 5b b0 6d 48 da 44 23 6b 4d | 59 ff ee 67 e5 c7 db c0 7c 7f a2 4b 21 92 3a a1 | fd 14 25 80 1a 91 48 40 e9 5b 63 e7 84 7c b3 99 | 02 c6 5d 6d b6 28 24 98 77 5e dc c9 be 98 c3 d6 | b6 bc 7a bf 31 81 8d c7 ba a9 27 81 82 5a 2f b7 | 23 3d 16 95 ba b5 4a 07 29 09 4c 3e c5 38 81 20 | 6c 0f d0 d6 67 62 46 f9 bc 6b c6 8e 7d a5 ce 50 | f1 0f 9a 64 d5 01 da 1f 72 e3 1b 16 9a ec 02 45 | ef 03 20 b4 4d cb ac e4 80 48 13 be cc c9 5e 11 | 9a f4 a2 21 ee 6b 6d 92 17 77 1f 86 a2 bd ac 89 | 29 00 00 24 5b c1 91 12 e1 44 84 05 fe aa f1 fc | b1 6d 8f ce 01 29 aa f2 75 b6 aa e9 3c cb db 81 | 72 99 63 d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 78 cd 6f 27 81 4c 4a f4 57 06 82 | fb 0a 60 ad 54 dd e0 6c 00 00 00 1c 00 00 40 05 | 73 d8 f7 cb c0 0b a5 77 76 9f 97 28 b6 7f a1 0e | 85 3a 80 ee | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #381 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e fb 19 74 69 81 f6 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #381 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #381 | rejected packet: | 1e fb 19 74 69 81 f6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #381: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a50110 | handling event EVENT_RETRANSMIT for parent state #336 | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #336 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #336 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49675.338791; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003953 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #336 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 "road-eastnet-nonat-84" #336: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #336) | a0 3a 99 80 e1 01 63 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 8b 11 e3 72 10 b4 96 46 45 1f 06 8b cb 20 43 | 48 5b dc 9f 22 0b 19 f0 6e 5a 41 4f 7b 66 7e 47 | 17 91 cc cc 24 8c c0 85 32 b7 be 23 d1 6d 12 65 | 00 df c3 47 48 17 d9 93 47 4f 9d 2a 81 88 4f 2c | 1f 98 ac a8 85 56 dd 1e 45 4f f7 f9 78 59 b2 90 | d0 96 3c c9 92 dc 80 e7 ee 9e 9f f3 a3 42 a0 87 | f4 8c 84 d8 38 fe 2c f0 0d 7c 15 54 23 ab a7 7c | ab e1 53 7c ba 26 57 e2 9b 0a 0d 44 c4 7c f6 bd | 50 8c ae 85 b6 fa 6e 51 9e 4d 32 a8 2f 5f b7 94 | 33 ef 3d 6b de 80 a9 44 cb a5 48 1f 9d d9 3e 40 | c2 f4 df a8 c7 43 1a 85 1e 99 1c be ad 10 a3 44 | af 83 22 29 2a d8 4c fc aa 9e 40 9e 83 a1 f3 2d | d3 6b 55 b5 8b 94 57 96 1f 06 03 b7 e8 07 4a dc | 94 d8 f3 f3 15 26 15 42 b7 cd 81 18 11 03 dc 3a | 4e 46 ec 2a eb 11 4a a9 f5 ce 5d 26 8e 40 7e f7 | fb 5d b7 76 23 d0 05 cb 25 8d 85 d4 e7 63 e5 fe | 29 00 00 24 20 77 67 42 c0 5c 2e 2c 4f 51 1c e3 | 6e 76 b6 ed 2f 6c dc 89 e9 07 aa bc e6 7b f3 86 | a7 c4 a8 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c e2 e4 55 b2 1e b0 cb dc 5a 76 de | 82 37 47 8c ee 4e fe 03 00 00 00 1c 00 00 40 05 | 1d 8c 0e 3c 37 8c 24 ca 1e c1 4b a0 97 2b 99 7f | 60 3a d2 7b | libevent_free: release ptr-libevent@0x7fb37404b5c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a50110 | #336 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 3a 99 80 e1 01 63 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #336 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #336 | rejected packet: | a0 3a 99 80 e1 01 63 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #336: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338017ea0 | handling event EVENT_RETRANSMIT for parent state #360 | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #360 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #360 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49675.350142; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003658 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a50110 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #360 | libevent_malloc: new ptr-libevent@0x7fb37404b5c0 size 128 "road-eastnet-nonat-108" #360: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #360) | e8 ba f7 ac 97 7a d7 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 a7 6a 2f 0e 47 4f c5 a2 87 88 1c 76 27 25 53 | 18 cf 29 be de 65 a5 ec fa 8e ba d5 95 70 46 1a | 5e 82 ee 5e ea 78 6c 5e e1 5a ba c3 42 fa 62 85 | 96 61 49 94 e4 26 35 02 12 7e c3 49 17 01 2e ad | da 08 aa 31 5d 07 3f 11 e2 3e a1 55 1e 97 51 1d | 21 13 8f d7 77 02 f2 6a 5f 3a a3 ad 67 d3 b3 fe | 4d bc 3d 87 97 56 a8 ed 5e 65 2d 59 2c 08 c6 f6 | e3 33 48 1e c9 5b 10 68 f5 80 0a de 74 5b 48 d5 | 12 63 cb 81 c8 06 b2 4b 2a 11 1e ef 99 9b bd 96 | 3d 2d 68 30 3c a5 df b7 7c b9 96 9a 90 b4 80 82 | 7f 32 39 5b 15 a6 11 ef 5c ad af 36 92 59 32 87 | 1f b6 1c c4 37 ef 0e 8f d4 cd 1f 34 87 b5 54 45 | 4f b4 69 d7 3d 68 0c fa bd 14 4f 0f ca d9 05 b6 | 6c 12 d4 47 46 2e 28 86 0e 8a 52 14 fe d2 d6 83 | e9 62 c7 35 25 a1 d0 50 cc af ac b0 fd 2d 90 37 | 95 46 1a 19 98 e1 af 75 ba a4 1b aa b9 40 54 be | 29 00 00 24 1b 6f 95 ad 44 06 60 87 4d 33 ad b6 | 0a 54 4e 5c c3 38 27 ff 28 86 c4 a8 14 ff fc 45 | 4c 10 47 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 71 5e 67 a4 d4 de c3 91 7e 75 5e | 86 6a 2f 03 c9 58 fc 3e 00 00 00 1c 00 00 40 05 | 42 65 a4 4c 2a f8 3a 2c 53 a5 43 50 55 9d ce 16 | 71 5f ac c0 | libevent_free: release ptr-libevent@0x7fb33801fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338017ea0 | #360 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a68890 | handling event EVENT_RETRANSMIT for parent state #137 | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #137 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #137 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49675.35034; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008859 exceeds limit? YES "road-eastnet-nonat-137" #137: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-137" #137: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #389 at 0x557d46a8e340 | State DB: adding IKEv2 state #389 in UNDEFINED | pstats #389 ikev2.ike started | Message ID: init #389: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #389: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #389; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-137" #389: initiating v2 parent SA to replace #137 | using existing local IKE proposals for connection road-eastnet-nonat-137 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 389 for state #389 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb338017ea0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #389 | libevent_malloc: new ptr-libevent@0x7fb33801fd50 size 128 | #389 spent 0.094 milliseconds in ikev2_parent_outI1() | RESET processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 6 resuming | crypto helper 6 starting work-order 389 for state #389 | start processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #137 ikev2.ike failed too-many-retransmits | pstats #137 ikev2.ike deleted too-many-retransmits | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 389 | #137 spent 2.65 milliseconds in total | [RE]START processing: state #137 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-137" #137: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #137: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #137 "road-eastnet-nonat-137" #137: deleting IKE SA for connection 'road-eastnet-nonat-137' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-137' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-137 | State DB: deleting IKEv2 state #137 in PARENT_I1 | parent state #137: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #137 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb374014820 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a68890 | in statetime_stop() and could not find #137 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 389 time elapsed 0.00057 seconds recvmsg: received truncated IKE packet (MSG_TRUNC) | (#389) spent 0.628 milliseconds in crypto helper computing work-order 389: ikev2_outI1 KE (pcr) | **parse ISAKMP Message (raw): | initiator cookie: | e8 ba f7 ac 97 7a d7 4a | responder cookie: | crypto helper 6 sending results from work-order 389 for state #389 to event queue | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | scheduling resume sending helper answer for #389 | libevent_malloc: new ptr-libevent@0x7fb36c023e70 size 128 | State DB: found IKEv2 state #360 in PARENT_I1 (find_likely_sender) | crypto helper 6 waiting (nothing to do) | MSG_ERRQUEUE packet matches IKEv2 SA #360 | rejected packet: | e8 ba f7 ac 97 7a d7 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6c 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #360: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.115 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-137 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-137" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-137' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-137" | stop processing: connection "road-eastnet-nonat-137" (in initiate_a_connection() at initiate.c:349) | spent 0.0725 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #389 | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 389 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #389 | **emit ISAKMP Message: | initiator cookie: | 85 39 d1 4d 8b 00 62 4d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-137 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 33 35 45 30 eb 5a 4e 31 22 74 c6 b3 a4 12 3f 11 | ikev2 g^x d4 ed 4e ed d9 b9 2a b5 45 b7 bf 2f c4 12 8d f6 | ikev2 g^x b6 45 8b e7 42 00 82 88 9b 5f 9d ac d3 62 85 20 | ikev2 g^x 80 d9 92 f9 48 6c 61 18 10 02 b3 60 4a 67 bc f5 | ikev2 g^x 7f f3 06 fd dd d9 85 7b 8a 61 74 3e b0 54 86 48 | ikev2 g^x be 68 e1 1d 71 86 b6 10 0b 53 c9 4b c6 1d e3 32 | ikev2 g^x 0e 9d a0 c1 c2 ea 3f 8d 85 11 04 6b 8c a8 06 e2 | ikev2 g^x 8a a8 28 44 e2 f4 2d 9b 79 2e 3b 95 17 25 de 38 | ikev2 g^x b1 b1 27 54 d1 ca 51 cb 05 e4 51 d4 10 05 5a 73 | ikev2 g^x f7 6e 3f 1e 04 83 05 45 32 c8 e5 83 91 5b d4 46 | ikev2 g^x cb 00 53 49 8b aa e2 4a 03 fb ec 92 bd 9a d8 ef | ikev2 g^x c2 f7 13 0e ac 87 cd a2 d6 11 8a 4d b3 76 15 63 | ikev2 g^x 7e 5d ad ad 19 54 b0 8b cf 33 56 db af c2 f6 2f | ikev2 g^x 46 e8 3c 3e 30 75 95 b6 ad 6b 4c bd b8 1c f7 d8 | ikev2 g^x 42 48 45 24 c4 28 be c8 24 78 21 7b 8c a1 5f d5 | ikev2 g^x 3c 68 c6 b7 92 f7 dd 99 0c 2e 4d 49 3c 4e 34 53 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d4 02 58 a1 15 41 bf 82 7e 15 0d c9 ca 5c 1f 96 | IKEv2 nonce c8 8b 6c 22 75 5c 08 57 5f 06 6b 32 fe f8 a7 db | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 85 39 d1 4d 8b 00 62 4d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 89 | natd_hash: port= 01 f4 | natd_hash: hash= 74 ad 3c 1a 7d 4c cc 56 a6 70 0e c9 dd 4d 28 a6 | natd_hash: hash= f3 20 1b cb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 74 ad 3c 1a 7d 4c cc 56 a6 70 0e c9 dd 4d 28 a6 | Notify data f3 20 1b cb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 85 39 d1 4d 8b 00 62 4d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e7 a3 be 04 a3 45 3b 11 1b f8 e3 89 48 23 a2 23 | natd_hash: hash= c1 e1 2a f8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e7 a3 be 04 a3 45 3b 11 1b f8 e3 89 48 23 a2 23 | Notify data c1 e1 2a f8 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #389 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #389: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #389 to 4294967295 after switching state | Message ID: IKE #389 skipping update_recv as MD is fake | Message ID: sent #389 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-137" #389: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.137:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #389) | 85 39 d1 4d 8b 00 62 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 35 45 30 eb 5a 4e 31 22 74 c6 b3 a4 12 3f 11 | d4 ed 4e ed d9 b9 2a b5 45 b7 bf 2f c4 12 8d f6 | b6 45 8b e7 42 00 82 88 9b 5f 9d ac d3 62 85 20 | 80 d9 92 f9 48 6c 61 18 10 02 b3 60 4a 67 bc f5 | 7f f3 06 fd dd d9 85 7b 8a 61 74 3e b0 54 86 48 | be 68 e1 1d 71 86 b6 10 0b 53 c9 4b c6 1d e3 32 | 0e 9d a0 c1 c2 ea 3f 8d 85 11 04 6b 8c a8 06 e2 | 8a a8 28 44 e2 f4 2d 9b 79 2e 3b 95 17 25 de 38 | b1 b1 27 54 d1 ca 51 cb 05 e4 51 d4 10 05 5a 73 | f7 6e 3f 1e 04 83 05 45 32 c8 e5 83 91 5b d4 46 | cb 00 53 49 8b aa e2 4a 03 fb ec 92 bd 9a d8 ef | c2 f7 13 0e ac 87 cd a2 d6 11 8a 4d b3 76 15 63 | 7e 5d ad ad 19 54 b0 8b cf 33 56 db af c2 f6 2f | 46 e8 3c 3e 30 75 95 b6 ad 6b 4c bd b8 1c f7 d8 | 42 48 45 24 c4 28 be c8 24 78 21 7b 8c a1 5f d5 | 3c 68 c6 b7 92 f7 dd 99 0c 2e 4d 49 3c 4e 34 53 | 29 00 00 24 d4 02 58 a1 15 41 bf 82 7e 15 0d c9 | ca 5c 1f 96 c8 8b 6c 22 75 5c 08 57 5f 06 6b 32 | fe f8 a7 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 ad 3c 1a 7d 4c cc 56 a6 70 0e c9 | dd 4d 28 a6 f3 20 1b cb 00 00 00 1c 00 00 40 05 | e7 a3 be 04 a3 45 3b 11 1b f8 e3 89 48 23 a2 23 | c1 e1 2a f8 | state #389 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb33801fd50 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb338017ea0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a68890 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #389 | libevent_malloc: new ptr-libevent@0x7fb374014820 size 128 | #389 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49675.351805 | resume sending helper answer for #389 suppresed complete_v2_state_transition() and stole MD | #389 spent 0.468 milliseconds in resume sending helper answer | stop processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c023e70 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 39 d1 4d 8b 00 62 4d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #389 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #389 | rejected packet: | 85 39 d1 4d 8b 00 62 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 89 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #389: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0568 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #375 | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #375 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #375 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49675.354993; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001694 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c018210 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #375 | libevent_malloc: new ptr-libevent@0x7fb36c023e70 size 128 "road-eastnet-nonat-123" #375: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #375) | a4 09 26 11 42 9e 51 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b 77 05 ad 49 62 16 46 be f5 65 08 84 ad 14 8b | 54 2c 99 1d e2 97 87 23 80 81 89 f0 4c d0 eb 92 | 7b 0b 4f bb c5 8e f0 7c 4a e9 4e f5 41 3b c0 9c | 84 74 7a 28 42 6c 3e a3 44 ba 29 11 96 09 9b f3 | 38 05 36 bd 24 dc d4 f1 69 9a 67 13 96 b5 cc 0e | 5b 85 9c bc 45 e5 5b 70 a0 86 01 2f a9 6f b7 16 | e5 8c 0d ae 1d 65 f5 53 d8 97 9b 0e 3c f7 8c b4 | 84 cb c7 3a c6 10 40 ea de 5f 63 4c 12 d8 3f ca | 6d 62 70 f0 93 72 e5 53 fe e2 f7 48 e3 16 ec 2c | 0c 51 77 44 87 3b cf 71 6a 9d b3 31 8e cc be f2 | 83 ce be c0 12 f1 01 88 ca 5d f3 fc 95 bc f7 5a | 34 7b 8e 4b 02 d0 59 3f ca a0 78 bc ef 69 51 e1 | 59 c6 1a ee b3 5f f4 fe ba ab aa 32 83 46 24 8b | 44 0a ac 7f 47 be 12 69 64 f5 8a a0 c3 66 33 2a | d1 fe cd 2b 6e fd 1c 22 43 71 36 d1 05 aa f3 a0 | 34 64 36 1b 5f af f2 60 88 b6 fd ad 79 17 84 9b | 29 00 00 24 a2 f8 9d 2f 08 fe df 02 8f a0 29 1e | b3 67 52 e4 00 d5 8c 7f 4e 12 c2 f7 f5 b4 05 71 | a4 8b 3b 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 12 2b 6b 99 24 aa d2 31 8d d6 a9 cf | 86 3d 5f d7 43 66 7f 91 00 00 00 1c 00 00 40 05 | 3d 40 65 0f bf b0 2e 03 30 63 c3 7a f7 f2 38 a3 | 20 e1 e4 b2 | libevent_free: release ptr-libevent@0x7fb388011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #375 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 09 26 11 42 9e 51 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #375 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #375 | rejected packet: | a4 09 26 11 42 9e 51 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #375: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378018460 | handling event EVENT_RETRANSMIT for parent state #382 | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #382 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #382 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49675.400288; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500428 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #382 | libevent_malloc: new ptr-libevent@0x7fb388011f30 size 128 "road-eastnet-nonat-130" #382: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #382) | 8a a7 de 77 ff fe 00 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 1e 05 01 d3 c0 50 0e 07 5a f5 6c 2a f3 ca c5 | f5 6b b5 ce e5 2d 0d 22 8a 9d fc a1 92 f1 21 88 | fe 80 af 87 07 4e ac cb 0e 4c 2f 1f 7c 09 ad 56 | 27 1d 20 e6 ec e9 94 a7 13 47 77 6d 93 7b 8b 31 | 4c 98 f5 11 b5 9a 38 64 29 ba c8 d0 2f a9 37 ca | 1d 9c 45 27 41 6d 78 24 2b 30 7d 43 66 5f da 35 | 99 0b ee f7 a5 dd a9 e7 24 b7 2c 27 c3 b8 3c 38 | 22 f4 c4 26 23 91 a1 6d a7 03 90 dd c7 47 8b e4 | b9 30 db 10 7a b0 86 55 91 13 ed 5a 5c 50 c6 55 | 38 6b 0d bb 7c d6 67 e7 99 0a 0d 7c c8 3b f2 93 | 43 b8 a6 1e f0 04 5a 66 ab 2b 76 49 15 e4 be b6 | e3 ab 9a 84 5b 45 f3 99 3f 3d 94 3a 7f ba c6 2d | c0 e5 16 1f a9 0e c4 b3 c7 a8 37 c7 df 60 6d b0 | 90 7f 5b 83 e7 16 35 cd f8 80 7e 6b 4c 50 19 23 | 8a a3 35 38 cd 8b ef 81 d2 24 34 89 61 4b 37 2c | a1 bc 48 55 f5 65 06 2e e7 6f b3 a0 6e 02 6c 89 | 29 00 00 24 7c cd b7 56 1d 0f 15 7b 08 97 8c a9 | df 91 53 e0 6a 88 48 cc 4c b6 8e 33 b3 57 e0 e8 | 1c 04 d1 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 58 61 cb 76 cc c4 93 e8 81 4f b3 | 54 86 64 27 f4 77 87 8f 00 00 00 1c 00 00 40 05 | 27 d0 5f f0 83 ae a8 e6 f3 e6 a6 2d bb 57 f3 83 | 78 36 b0 95 | libevent_free: release ptr-libevent@0x7fb3700407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378018460 | #382 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a a7 de 77 ff fe 00 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #382 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #382 | rejected packet: | 8a a7 de 77 ff fe 00 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #382: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c018460 | handling event EVENT_RETRANSMIT for parent state #282 | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #282 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #282 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49675.401607; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004411 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378018460 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #282 | libevent_malloc: new ptr-libevent@0x7fb3700407f0 size 128 "road-eastnet-nonat-30" #282: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #282) | 46 9b 20 9a e5 8e c3 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 4a 4a 05 a5 e8 31 07 19 01 9a 3a 84 bd 00 2c | 01 26 e2 35 38 1d c2 10 27 23 65 e5 d1 d5 9e 9d | 93 4a 85 e7 79 d0 00 1e a3 c9 7f d0 87 96 13 32 | 3a 52 f9 aa fd 75 0f 57 d6 53 8b a2 5b 2a a9 29 | 20 47 1e e0 f6 79 b4 a2 d0 fd e2 85 9e 06 b0 c5 | 1f eb f9 ce 36 69 1b 53 58 8d aa 02 dd a3 93 19 | 8b 0f e6 94 85 c6 21 ed 47 d3 f5 ea 66 43 13 82 | da f0 e0 63 f7 98 28 5e a4 cb 20 f6 07 ee ef 26 | 67 cb 7a 06 89 6a a0 7d 08 f6 7d ba 27 41 9f 3f | f9 0e 8b 4e f2 9a 91 05 9e 11 34 81 a4 96 af ee | 90 6f f6 67 88 78 72 a1 94 39 66 b1 22 8d 82 7c | 2e db f6 a2 5d 7b a6 60 14 74 1c b3 6d 80 df 10 | f8 59 91 7e 94 04 39 3a 04 77 10 6d 00 3c a4 c9 | 37 8a d9 0b 42 ad 9c 7e 79 d0 0a 68 7a d1 19 02 | 3f 63 fb b2 47 d4 e3 0d 1d 5d 62 cd 37 80 af a2 | 0b a2 8f e1 3f b9 34 fc d9 39 c1 27 65 16 8f 01 | 29 00 00 24 43 cb 25 08 9c 10 6d 8d e0 8b af 6b | 30 64 58 bc 44 4b 07 d1 a3 b6 7d 77 46 d8 bf 81 | 62 ff 7f 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f cf c8 c3 31 5e 18 fc ce 9a 0d be | ec 9d b8 d1 d8 fa d9 18 00 00 00 1c 00 00 40 05 | 91 0b 3b 5a da ea f5 67 3e 89 32 94 c9 4e eb eb | e4 06 4e d6 | libevent_free: release ptr-libevent@0x7fb34c01a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c018460 | #282 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 9b 20 9a e5 8e c3 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #282 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #282 | rejected packet: | 46 9b 20 9a e5 8e c3 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #282: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0583 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #337 | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #337 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #337 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49675.403897; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003603 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #337 | libevent_malloc: new ptr-libevent@0x7fb34c01a4e0 size 128 "road-eastnet-nonat-85" #337: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #337) | ed 63 58 23 fd c1 76 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 96 54 84 2e e5 91 43 31 05 bf 8d 46 38 09 77 | 34 82 01 41 07 ba 77 ae 0e 58 56 59 e8 aa 03 3b | 7e fb 3d 6d 4d 59 d3 86 8a 20 2c b2 06 03 8a 41 | 33 cf 0e 06 87 87 a2 ab d5 f2 99 a7 84 cd 05 cf | ec d9 29 84 36 3e fc 29 32 e5 d2 77 7d a0 28 f8 | d1 0e 51 2f 73 28 bd 60 66 cf 7b 5c e8 76 7f ee | 0b 3f cc 47 13 a2 8f 86 8a 1d a1 57 96 4b 8e 1d | 54 09 0b 8b e7 94 12 ea 68 37 a0 5a 37 1b 43 96 | 9e 43 fb b9 f4 e3 a4 14 cb 49 50 02 95 69 45 10 | 4f 12 ab e9 0f 1f 01 01 a4 c3 ef 65 1e 2e cf e7 | 08 9d 2c 27 7f 64 fb 91 ba e9 80 4e 20 48 a7 46 | 4e 2b b0 83 ea 9c e6 04 02 2b 8c 1a 52 db c6 17 | d5 9e 92 ca bd cc 2d 80 e6 b4 24 b9 79 b6 76 9a | 0e 8f 39 57 ee 2c 0b 47 20 f0 82 f0 87 6e 0d 85 | f9 ab b8 d1 c1 07 ac ad 62 5b 5a 42 cc c5 f9 04 | de 15 7e d8 03 4b a1 c4 30 01 43 b8 8d 24 8e 44 | 29 00 00 24 47 35 e2 69 12 71 4e bf 5f ce fb f5 | 4b 5d 78 7a 40 67 4e 2b 89 1a 4f 82 42 7d 07 9d | 99 e5 3f 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 a6 ae 66 a0 2e 4a eb 14 83 41 42 | 9c b3 ed 9b 1a cc 9f 9b 00 00 00 1c 00 00 40 05 | 09 b5 68 86 30 d7 ba 9d 35 40 11 f6 5c 40 95 0a | 79 fe 98 fe | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #337 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 63 58 23 fd c1 76 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #337 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #337 | rejected packet: | ed 63 58 23 fd c1 76 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #337: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0887 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23110 | handling event EVENT_RETRANSMIT for parent state #361 | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #361 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #361 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49675.419215; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004556 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #361 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 "road-eastnet-nonat-109" #361: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #361) | 9c f5 2d c8 50 35 55 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe f7 f3 f1 6a 76 6a 9a e6 0e 10 b4 e5 b5 16 07 | 0f 90 8a f4 dc 9f 27 b0 2a 41 17 f0 21 60 87 50 | 11 a6 84 2e 86 94 e1 65 4d 1a 59 ce 11 45 d2 c5 | 09 df ce 0a 2c f9 3e 7e cb 59 88 eb 93 1a 26 06 | 39 22 a5 57 b6 f2 5b 4c fe 56 6a 26 49 df e6 84 | b9 e4 e4 41 19 a0 e8 70 69 c2 51 79 76 2e 80 40 | 6f 9e 4b a9 87 c2 02 65 d3 3e 05 60 b6 af 86 d7 | 52 3c 7a 52 e9 69 b8 2a e6 43 99 6c 72 d9 7c 1a | 8d c9 5b fb a3 c2 fc 51 d5 fc c8 85 ff 46 8f 64 | e3 d3 a7 99 28 b1 43 6d 9b 9d 50 e1 af 1a d6 ff | 7e fd 10 23 a2 a6 f9 9b d2 06 fa 0f 91 01 67 9f | 42 43 ac e6 4f ae 3e 00 59 5d 7a cf b3 59 12 67 | 0d c1 86 cf 82 5d 20 9e 98 97 ec b2 7e be 63 74 | b3 15 a1 c0 63 a7 5d 61 bb b3 2f 2d 42 15 59 57 | 72 ca 0b d8 9e d0 1b 84 91 fd db 5e 8f 2f 62 ed | 99 8c a3 a5 ec ef 08 26 6f ab 64 68 6b 97 9d 3e | 29 00 00 24 5d 7a 1f c2 56 77 bf 60 f2 37 f5 ed | 4d 94 c3 a6 58 e2 5f 6e 1b f6 b4 76 e5 69 0c 98 | 27 55 cd c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 71 91 34 7a e2 ba d5 01 f3 c5 56 | ba 5f 83 71 00 17 86 15 00 00 00 1c 00 00 40 05 | e0 46 0d f9 99 b9 47 b4 35 a0 04 20 4b 9b 45 ee | 1c f7 92 53 | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23110 | #361 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9c f5 2d c8 50 35 55 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #361 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #361 | rejected packet: | 9c f5 2d c8 50 35 55 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #361: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a63210 | handling event EVENT_RETRANSMIT for parent state #376 | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #376 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #376 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49675.420528; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001713 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23110 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #376 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 "road-eastnet-nonat-124" #376: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #376) | ea 6d 1c 44 16 cc 7c db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 30 8d f2 73 36 66 21 18 72 ab a6 1d 5b ca 9c | 0a 7e 8f ea 73 27 8a 58 d5 e4 26 95 19 96 87 0c | 7f 07 37 1c 70 d2 60 3e 98 51 eb 57 bf 72 e0 8c | 84 ad 4f b6 dc 5c 36 41 e2 77 e0 9c 8d 51 16 fc | 84 d9 54 f9 85 4d 98 72 f2 d6 3d 1b 19 f0 da ce | ab 3f 23 52 e0 3a 3c 0f e9 38 61 5a c2 41 30 12 | 05 82 0c cb c8 c2 1e a1 4f f2 c3 e1 3d da 41 26 | 24 be f6 af 3e e8 2f 87 ee 1b 93 a1 f0 e9 53 da | 3a 2e 85 7e d2 d0 a7 3b eb 29 ab 65 b7 78 9f f6 | c5 fd a3 19 78 40 8c d9 48 7b 2c 4c e7 26 6f 53 | d3 ac b1 b4 ba da af d2 ab 50 63 75 e1 1d 99 d0 | b8 31 ac 7d e7 18 55 91 d3 ac 44 fc d3 74 62 7f | ce 91 66 95 28 b3 47 a1 94 fd 56 15 40 09 da b9 | 56 ba 99 10 ef 74 77 7b 2d 9f e1 06 40 6f 4c 27 | 16 1c 00 6e 75 bf e7 e8 68 0b d5 e5 14 e8 f6 62 | 49 c7 45 85 8e da 35 35 ec 65 cf 2e 56 35 57 b4 | 29 00 00 24 b2 22 59 8f 2f 17 3c be 86 a7 a1 89 | a7 cd 11 4f 04 a8 63 56 c2 46 93 de 35 e3 be b3 | 5b e4 fb 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 73 25 29 4a e6 52 0b aa f7 7d 73 | 68 37 ec c6 59 a7 02 18 00 00 00 1c 00 00 40 05 | a9 5a 00 6b 7f 85 e1 a6 d7 c4 fa 5e b7 b1 99 68 | fa 78 21 65 | libevent_free: release ptr-libevent@0x7fb36c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a63210 | #376 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 6d 1c 44 16 cc 7c db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #376 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #376 | rejected packet: | ea 6d 1c 44 16 cc 7c db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #376: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0547 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b06800 | handling event EVENT_RETRANSMIT for parent state #138 | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #138 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #138 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49675.421799; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007339 exceeds limit? YES "road-eastnet-nonat-138" #138: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-138" #138: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #390 at 0x557d46a8f900 | State DB: adding IKEv2 state #390 in UNDEFINED | pstats #390 ikev2.ike started | Message ID: init #390: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #390: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #390; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-138" #390: initiating v2 parent SA to replace #138 | using existing local IKE proposals for connection road-eastnet-nonat-138 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 390 for state #390 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a63210 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #390 | libevent_malloc: new ptr-libevent@0x7fb36c01d920 size 128 | #390 spent 0.0695 milliseconds in ikev2_parent_outI1() | crypto helper 11 resuming | RESET processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 starting work-order 390 for state #390 | start processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 390 | pstats #138 ikev2.ike failed too-many-retransmits | pstats #138 ikev2.ike deleted too-many-retransmits | #138 spent 2.71 milliseconds in total | [RE]START processing: state #138 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-138" #138: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #138: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #138 "road-eastnet-nonat-138" #138: deleting IKE SA for connection 'road-eastnet-nonat-138' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-138' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-138 | State DB: deleting IKEv2 state #138 in PARENT_I1 | parent state #138: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #138 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 390 time elapsed 0.000574 seconds | libevent_free: release ptr-libevent@0x7fb360046040 | (#390) spent 0.575 milliseconds in crypto helper computing work-order 390: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 390 for state #390 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b06800 | scheduling resume sending helper answer for #390 | in statetime_stop() and could not find #138 | libevent_malloc: new ptr-libevent@0x7fb360023dd0 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 11 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-138 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-138" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-138' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-138" | stop processing: connection "road-eastnet-nonat-138" (in initiate_a_connection() at initiate.c:349) | spent 0.0597 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #390 | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 390 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #390 | **emit ISAKMP Message: | initiator cookie: | f0 59 d0 2d 97 92 84 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-138 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 05 a6 bc 87 d6 62 82 0f 67 22 b6 ee c6 47 37 24 | ikev2 g^x 35 77 67 9d 2b 69 4d 68 d9 17 5e 4e 5b 7c e7 e0 | ikev2 g^x de 0c 00 17 eb 73 f2 8c 21 62 77 5f ed 93 76 62 | ikev2 g^x 82 34 a8 dc e3 cb c2 5a 08 71 13 11 3d 4b e6 d1 | ikev2 g^x 76 57 25 8b a6 9b ab 1b 86 9a b2 3c b4 c5 09 27 | ikev2 g^x 07 3a 9a 1f b3 ba dc 74 b5 99 e0 70 c7 35 07 15 | ikev2 g^x 6b eb 79 13 3f 27 25 55 75 85 60 5d d2 d0 ba 32 | ikev2 g^x 68 73 83 f4 c5 0a 96 0e 4b e5 39 e5 86 02 a4 93 | ikev2 g^x e2 f4 48 ef 0c f4 c4 74 9a 13 7f eb 1a f7 58 25 | ikev2 g^x 7f f1 9e dc 6a 9c 5a 01 55 d6 94 fe 2a 9d 15 54 | ikev2 g^x c4 c7 a9 92 32 84 b6 cb 67 d0 cf 4d c5 e2 bc df | ikev2 g^x 9f d8 4e db 8f 96 2f 1e c9 d0 ec 6a 9b 77 d4 57 | ikev2 g^x 6b cf 06 d5 ae fb ea 29 a5 1f 59 cf 78 34 af ff | ikev2 g^x a5 76 3d 89 27 c1 f8 1c 6e a5 66 a5 63 8a 2d 2f | ikev2 g^x b3 a7 de f9 71 62 f3 67 56 6c 03 83 1d be 14 17 | ikev2 g^x 8c 04 f3 ba 5f 3e 7d cb 76 74 94 e2 c9 0a 5a 07 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9a 7c 0d 04 38 99 0e 36 73 a3 ab df 41 d9 56 ed | IKEv2 nonce 47 3b 6b 02 19 aa 87 30 cc 21 65 76 f4 51 64 6d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f0 59 d0 2d 97 92 84 99 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8a | natd_hash: port= 01 f4 | natd_hash: hash= db 0a c1 09 04 69 58 cc 7d de 65 69 68 f6 ba 86 | natd_hash: hash= 4e 7f 6a 28 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data db 0a c1 09 04 69 58 cc 7d de 65 69 68 f6 ba 86 | Notify data 4e 7f 6a 28 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f0 59 d0 2d 97 92 84 99 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 52 91 09 9c ff 5e 67 81 8a 7d bb c1 ce e0 37 4c | natd_hash: hash= d9 14 ec 51 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 52 91 09 9c ff 5e 67 81 8a 7d bb c1 ce e0 37 4c | Notify data d9 14 ec 51 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #390 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #390: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #390 to 4294967295 after switching state | Message ID: IKE #390 skipping update_recv as MD is fake | Message ID: sent #390 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-138" #390: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.138:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #390) | f0 59 d0 2d 97 92 84 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 a6 bc 87 d6 62 82 0f 67 22 b6 ee c6 47 37 24 | 35 77 67 9d 2b 69 4d 68 d9 17 5e 4e 5b 7c e7 e0 | de 0c 00 17 eb 73 f2 8c 21 62 77 5f ed 93 76 62 | 82 34 a8 dc e3 cb c2 5a 08 71 13 11 3d 4b e6 d1 | 76 57 25 8b a6 9b ab 1b 86 9a b2 3c b4 c5 09 27 | 07 3a 9a 1f b3 ba dc 74 b5 99 e0 70 c7 35 07 15 | 6b eb 79 13 3f 27 25 55 75 85 60 5d d2 d0 ba 32 | 68 73 83 f4 c5 0a 96 0e 4b e5 39 e5 86 02 a4 93 | e2 f4 48 ef 0c f4 c4 74 9a 13 7f eb 1a f7 58 25 | 7f f1 9e dc 6a 9c 5a 01 55 d6 94 fe 2a 9d 15 54 | c4 c7 a9 92 32 84 b6 cb 67 d0 cf 4d c5 e2 bc df | 9f d8 4e db 8f 96 2f 1e c9 d0 ec 6a 9b 77 d4 57 | 6b cf 06 d5 ae fb ea 29 a5 1f 59 cf 78 34 af ff | a5 76 3d 89 27 c1 f8 1c 6e a5 66 a5 63 8a 2d 2f | b3 a7 de f9 71 62 f3 67 56 6c 03 83 1d be 14 17 | 8c 04 f3 ba 5f 3e 7d cb 76 74 94 e2 c9 0a 5a 07 | 29 00 00 24 9a 7c 0d 04 38 99 0e 36 73 a3 ab df | 41 d9 56 ed 47 3b 6b 02 19 aa 87 30 cc 21 65 76 | f4 51 64 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 0a c1 09 04 69 58 cc 7d de 65 69 | 68 f6 ba 86 4e 7f 6a 28 00 00 00 1c 00 00 40 05 | 52 91 09 9c ff 5e 67 81 8a 7d bb c1 ce e0 37 4c | d9 14 ec 51 | state #390 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c01d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a63210 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b06800 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #390 | libevent_malloc: new ptr-libevent@0x7fb360046040 size 128 | #390 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49675.422954 | resume sending helper answer for #390 suppresed complete_v2_state_transition() and stole MD | #390 spent 0.328 milliseconds in resume sending helper answer | stop processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb360023dd0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f0 59 d0 2d 97 92 84 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #390 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #390 | rejected packet: | f0 59 d0 2d 97 92 84 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8a fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #390: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #338 | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #338 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #338 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49675.468125; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005508 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36003b100 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #338 | libevent_malloc: new ptr-libevent@0x7fb360023dd0 size 128 "road-eastnet-nonat-86" #338: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #338) | 1f e2 d0 d2 e5 84 7f 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db f7 91 cd 84 5c a7 ef c5 4a 9e 2e af a2 43 ea | 45 0a b8 db c5 6e 04 46 ba a1 d5 11 76 fa 91 5a | 21 6e 50 69 5f 4c 63 af d6 32 06 ae 79 8f f8 47 | 06 f3 f5 c6 98 57 e2 e8 f9 93 2e 73 11 9e c7 4b | 81 b1 ab c3 4c 82 50 3e 95 1b 93 8d f3 f1 26 94 | 35 dc 1c 86 75 c4 0b 21 99 da cd 92 fb c9 25 d3 | a1 77 02 1c 94 1f a7 90 d7 35 62 14 3f a4 c2 e2 | 04 47 bb f7 88 43 f1 58 36 ff ad ce 6a c6 3a e5 | ca 19 27 9c c0 b7 91 62 00 c9 17 fb 82 73 f3 dc | 8a f9 f2 d0 2d 78 16 8f d3 1a df 7b 29 7f a7 d2 | 2a 1d 58 77 31 26 e6 25 fd f1 f0 ff b3 be 2a fb | 9a f2 05 45 cd 1a c0 33 3f 3e 0c b1 4a 0e 13 b1 | f3 25 ba 03 ce 1b 65 7e 16 c3 d1 62 05 e6 0b 87 | 27 59 78 26 a7 72 9c cf a5 2a c9 6c 3c 43 6b b4 | dd fc 35 a0 21 8a d9 83 8c b5 e6 a8 c9 3d 42 bd | e0 43 1a dd 83 56 78 b8 0a 0d d3 50 6d 61 d9 5c | 29 00 00 24 53 73 16 e0 68 43 e7 c2 a0 53 68 5d | 7e 07 bf 33 55 30 e6 39 bc d6 66 c9 05 5a fa 29 | b8 4f 54 b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 1b 58 be 75 e4 59 10 d1 29 a5 4a | 19 0e d4 a5 d3 bb ae eb 00 00 00 1c 00 00 40 05 | e1 23 de d4 d9 5f 17 c1 21 ba 79 77 2a ee 0e dd | 91 6b 75 70 | libevent_free: release ptr-libevent@0x7fb3780300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #338 spent 0.226 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f e2 d0 d2 e5 84 7f 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #338 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #338 | rejected packet: | 1f e2 d0 d2 e5 84 7f 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #338: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acc140 | handling event EVENT_RETRANSMIT for parent state #383 | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #383 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #383 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49675.472534; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500472 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #383 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 "road-eastnet-nonat-131" #383: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #383) | 8b a9 fc 25 06 93 a1 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 48 8c d9 3d c6 b0 61 39 4e 19 f7 86 b1 e2 c3 | 03 ba 84 78 9c c4 77 a1 7d 57 91 f5 ae c2 ed b8 | 0b 61 98 04 6f 72 68 b3 63 3d b6 20 12 b2 50 10 | 3d 3c 00 1d b9 ab be 72 ac ba 93 14 3b b2 a4 c2 | 8e b0 47 ba 98 bb 5c 2b e4 da 7c 8d a4 4a d6 89 | a4 b6 36 de 0f 18 04 bb fc 9c 28 b5 1a ee c2 7a | 18 c6 24 27 71 17 17 60 ca 39 4e 5f 5b 71 71 ab | e4 cd 79 1b 79 6b 31 46 63 bb cd 82 d7 96 72 86 | 1d fc 72 1c e4 a4 16 04 29 1f 9e b6 3a fd 62 30 | f1 da dd 12 af 8e 61 c7 51 15 f6 a4 66 22 64 42 | ef d3 2c 09 00 94 20 e3 33 79 f3 1d c7 7c 4e 79 | a7 a8 2d ec 91 f0 bb fb ff 6c 89 63 ff 5d a6 dc | 2c c3 c7 01 d9 71 f9 87 28 4c e4 de 91 08 4b 02 | b3 28 ae a1 4d 26 42 63 01 7b d1 2e 68 17 e3 a7 | 0a 0b eb 5c 62 18 33 2f d3 a6 c9 6b 3c a2 aa a0 | f6 fc 0d 55 8c 1d 7c d8 f9 bd 77 28 68 1c b3 05 | 29 00 00 24 c7 43 5d 92 21 cd 92 00 ce 48 5a 41 | bc 51 f7 9c 7c 73 79 39 5d 67 8e 5d 0e b9 e5 ea | f1 7d 01 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 9e 11 98 e3 85 61 70 79 85 31 a8 | 4f a4 76 88 f9 86 57 fe 00 00 00 1c 00 00 40 05 | fb 7f 30 9d 57 51 30 a9 24 b7 71 f5 04 63 5f 8a | f8 68 fc 05 | libevent_free: release ptr-libevent@0x7fb3440300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acc140 | #383 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b a9 fc 25 06 93 a1 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #383 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #383 | rejected packet: | 8b a9 fc 25 06 93 a1 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #383: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370018460 | handling event EVENT_RETRANSMIT for parent state #283 | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #283 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #283 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49675.478862; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005039 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acc140 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #283 | libevent_malloc: new ptr-libevent@0x7fb3440300e0 size 128 "road-eastnet-nonat-31" #283: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #283) | 6d 25 6c e9 9d 21 2c 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b e9 86 64 c6 6f 55 a3 bc 52 39 e5 45 42 b6 cc | f2 a4 d8 e4 d7 c3 31 05 04 56 63 c6 c2 26 bf 59 | 6a b9 a8 fc fa 31 7a 57 4f f1 c0 49 83 9c 61 f6 | ea 6e c3 47 87 15 57 34 67 e5 10 86 61 2d 48 bc | 65 9e 10 ea 92 ad c9 b9 04 73 b8 2e a2 d6 b3 0a | c0 be 8f 2a 6c 99 ba 2f e9 4c 9e ba 98 ae c9 a2 | 11 55 c6 05 57 8e ab ea fe ab c0 66 94 91 31 6d | 5a 61 9a c2 11 87 93 ed bf 92 59 c4 b9 84 ce ab | db 12 40 39 53 0e ae d0 f2 e5 17 3c ea 18 98 24 | 12 e5 c0 95 86 ac ec 82 ab 81 6f 9e 62 08 73 b9 | a8 9d e0 0f 7d f3 2e 0b 7e 07 bc 19 99 3e 51 81 | 29 43 73 f2 dc b1 11 40 fd 25 79 3c 57 b5 ab be | 2e e1 68 18 e4 38 d8 a0 4c 8c 74 5e ff df de 09 | df 96 78 f3 4d 4d f6 30 46 ec df 31 2f 74 61 0b | 81 46 62 97 97 55 58 f5 2a c4 6f df 71 dd ee 98 | ae ac aa b2 0f 96 9a 79 9a bd 7e 1b 8b 95 fc 2d | 29 00 00 24 19 7a 94 41 a3 df 39 c8 6e b5 7e 75 | da 2c b2 db 58 bf cc 1e 51 b1 c7 de c1 0f 32 c8 | 22 50 94 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 90 7d 87 8b 25 a9 47 ca 59 98 98 | 30 6c 9b 73 ee 84 48 a4 00 00 00 1c 00 00 40 05 | 6c 03 cb 30 07 ff 71 63 de 15 87 b9 5c 0f 43 de | 70 36 3d ec | libevent_free: release ptr-libevent@0x7fb3400094d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370018460 | #283 spent 0.0979 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 25 6c e9 9d 21 2c 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #283 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #283 | rejected packet: | 6d 25 6c e9 9d 21 2c 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #283: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12bc0 | handling event EVENT_RETRANSMIT for parent state #377 | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #377 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #377 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49675.486144; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002387 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #377 | libevent_malloc: new ptr-libevent@0x7fb3400094d0 size 128 "road-eastnet-nonat-125" #377: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #377) | 7d b7 6a 31 9c d6 86 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 bf 7a 35 d2 37 1e c0 a2 92 6a 98 80 72 24 5e | 1f 3c b2 01 23 5f 15 bf ce e9 e4 d7 08 a3 2a 60 | 60 1e 2a e8 5a e7 a9 d5 87 39 6d 3f 34 3f c0 1b | ca fe dc 77 c6 7e 84 64 73 35 57 0c ed b5 74 11 | bb 72 6b af 00 a6 5c 48 1d a9 ae e0 21 6e f9 6c | fe 77 59 9f 79 f0 27 e3 f8 d3 03 12 c5 8c 01 06 | 76 43 6f e7 91 25 19 a3 05 2c 5f 40 7b 60 ce d6 | c7 0a 22 7e c1 15 e4 29 ab c3 9b 6d 58 d6 08 88 | eb 2e fc 26 54 22 7d d9 71 73 77 93 47 47 52 c7 | 2f be 59 30 ba ca e1 78 87 6d cb 35 72 6f 4d 3b | a0 93 98 95 e4 6c 43 b1 50 a4 aa 69 98 d4 ed e8 | 9d 30 82 39 85 51 32 50 b9 91 12 7b 77 d2 d0 9f | 64 b8 21 58 96 89 58 eb 1b a0 e3 48 15 3e 58 3b | 7f 5d 13 52 09 44 ad 12 73 77 70 1d 29 a3 72 c1 | 6f bc 36 26 b2 07 f9 32 34 75 b2 cb 8d 27 b8 92 | 36 ef 06 e2 e3 5e 94 66 19 de e4 ee 30 db 10 64 | 29 00 00 24 40 c7 66 20 2c ab 25 81 a4 29 77 75 | 63 eb 29 35 21 bb d9 a5 a3 5d 38 ec 5b 5c 03 34 | 11 83 53 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 20 88 86 59 0d 66 18 17 be e2 6d | 8e c3 55 fc 50 ba 92 3e 00 00 00 1c 00 00 40 05 | a3 24 68 23 82 72 27 ee 2c 96 9c 16 80 ee e0 88 | 08 9f bc a7 | libevent_free: release ptr-libevent@0x7fb36800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12bc0 | #377 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d b7 6a 31 9c d6 86 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #377 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #377 | rejected packet: | 7d b7 6a 31 9c d6 86 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #377: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab2380 | handling event EVENT_RETRANSMIT for parent state #139 | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #139 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #139 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49675.48946; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008613 exceeds limit? YES "road-eastnet-nonat-139" #139: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-139" #139: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #391 at 0x557d46a90ec0 | State DB: adding IKEv2 state #391 in UNDEFINED | pstats #391 ikev2.ike started | Message ID: init #391: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #391: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #391; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-139" #391: initiating v2 parent SA to replace #139 | using existing local IKE proposals for connection road-eastnet-nonat-139 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 391 for state #391 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b12bc0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #391 | libevent_malloc: new ptr-libevent@0x7fb36800cf80 size 128 | #391 spent 0.0841 milliseconds in ikev2_parent_outI1() | RESET processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #139 ikev2.ike failed too-many-retransmits | pstats #139 ikev2.ike deleted too-many-retransmits | #139 spent 2.74 milliseconds in total | [RE]START processing: state #139 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-139" #139: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #139: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #139 "road-eastnet-nonat-139" #139: deleting IKE SA for connection 'road-eastnet-nonat-139' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 16 resuming | crypto helper 16 starting work-order 391 for state #391 | add revival: connection 'road-eastnet-nonat-139' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 391 | in connection_discard for connection road-eastnet-nonat-139 | State DB: deleting IKEv2 state #139 in PARENT_I1 | parent state #139: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #139 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 391 time elapsed 0.000615 seconds | libevent_free: release ptr-libevent@0x7fb344046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab2380 | in statetime_stop() and could not find #139 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#391) spent 0.611 milliseconds in crypto helper computing work-order 391: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 391 for state #391 to event queue | scheduling resume sending helper answer for #391 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-139 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7fb364029220 size 128 | crypto helper 16 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-139" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-139' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-139" | stop processing: connection "road-eastnet-nonat-139" (in initiate_a_connection() at initiate.c:349) | spent 0.065 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #391 | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 391 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #391 | **emit ISAKMP Message: | initiator cookie: | 1e 4c 10 d0 5a dd 02 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-139 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 17 44 38 de 57 e6 42 14 4a 75 cb e8 86 f1 15 c7 | ikev2 g^x b3 6b a5 d0 a3 15 b5 a8 cf fe 21 90 de 4f ce 44 | ikev2 g^x 4b 9e a3 45 9f e5 e3 4a e1 61 50 92 d7 96 bd 78 | ikev2 g^x c9 7d fa 56 09 ee b1 46 53 20 fc ad 34 b3 1e e5 | ikev2 g^x 0c f4 f7 d3 65 bb 8f 18 cc a8 06 7f fc 7e 66 0f | ikev2 g^x 5a c0 66 08 19 5f fe 23 13 53 7d f1 cb 35 9c bf | ikev2 g^x b6 cc 27 b3 74 16 78 a5 d0 41 0b 66 96 4e d5 0b | ikev2 g^x a8 67 13 54 66 95 b9 f4 f4 50 eb 64 58 9c 23 eb | ikev2 g^x 8d 1e 98 9a 88 3b 5f 86 67 00 79 34 97 29 56 1a | ikev2 g^x b2 15 47 48 a5 9a 2b a5 34 cb 00 12 67 7f e0 d9 | ikev2 g^x 3a f8 09 e7 20 e1 52 74 01 fd f4 0c 96 53 a6 b7 | ikev2 g^x c6 61 c0 6c f5 79 6f b0 c7 2c 95 3d f0 6b 1d 3c | ikev2 g^x a1 9c 76 2c 42 98 e7 2f 92 d1 8e 08 bb da 6a 80 | ikev2 g^x de bb 58 dc 69 88 c5 71 37 d4 7b 84 79 2b bc 7c | ikev2 g^x 3c 5f 6e af 11 b3 52 0f 4a 94 17 dd 26 64 0a 25 | ikev2 g^x 66 61 88 60 23 0c 83 1b 44 d1 a9 f9 6e 89 2a f7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f4 e3 20 9c cf 9f 8b a0 c8 c9 bb b9 ac d4 eb 98 | IKEv2 nonce 02 de 0f c4 e7 00 7a df 68 e7 4c eb e6 18 a5 97 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1e 4c 10 d0 5a dd 02 ca | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8b | natd_hash: port= 01 f4 | natd_hash: hash= 76 3e 10 ca 19 aa 6a 76 c2 f6 15 22 58 d4 f7 90 | natd_hash: hash= 3e 72 98 9d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 76 3e 10 ca 19 aa 6a 76 c2 f6 15 22 58 d4 f7 90 | Notify data 3e 72 98 9d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1e 4c 10 d0 5a dd 02 ca | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 94 13 1b ea fd 35 6e 40 4c 88 7a 5c c1 e4 2f 2d | natd_hash: hash= 6d 26 6f 2a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 94 13 1b ea fd 35 6e 40 4c 88 7a 5c c1 e4 2f 2d | Notify data 6d 26 6f 2a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #391 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #391: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #391 to 4294967295 after switching state | Message ID: IKE #391 skipping update_recv as MD is fake | Message ID: sent #391 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-139" #391: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.139:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #391) | 1e 4c 10 d0 5a dd 02 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 44 38 de 57 e6 42 14 4a 75 cb e8 86 f1 15 c7 | b3 6b a5 d0 a3 15 b5 a8 cf fe 21 90 de 4f ce 44 | 4b 9e a3 45 9f e5 e3 4a e1 61 50 92 d7 96 bd 78 | c9 7d fa 56 09 ee b1 46 53 20 fc ad 34 b3 1e e5 | 0c f4 f7 d3 65 bb 8f 18 cc a8 06 7f fc 7e 66 0f | 5a c0 66 08 19 5f fe 23 13 53 7d f1 cb 35 9c bf | b6 cc 27 b3 74 16 78 a5 d0 41 0b 66 96 4e d5 0b | a8 67 13 54 66 95 b9 f4 f4 50 eb 64 58 9c 23 eb | 8d 1e 98 9a 88 3b 5f 86 67 00 79 34 97 29 56 1a | b2 15 47 48 a5 9a 2b a5 34 cb 00 12 67 7f e0 d9 | 3a f8 09 e7 20 e1 52 74 01 fd f4 0c 96 53 a6 b7 | c6 61 c0 6c f5 79 6f b0 c7 2c 95 3d f0 6b 1d 3c | a1 9c 76 2c 42 98 e7 2f 92 d1 8e 08 bb da 6a 80 | de bb 58 dc 69 88 c5 71 37 d4 7b 84 79 2b bc 7c | 3c 5f 6e af 11 b3 52 0f 4a 94 17 dd 26 64 0a 25 | 66 61 88 60 23 0c 83 1b 44 d1 a9 f9 6e 89 2a f7 | 29 00 00 24 f4 e3 20 9c cf 9f 8b a0 c8 c9 bb b9 | ac d4 eb 98 02 de 0f c4 e7 00 7a df 68 e7 4c eb | e6 18 a5 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 3e 10 ca 19 aa 6a 76 c2 f6 15 22 | 58 d4 f7 90 3e 72 98 9d 00 00 00 1c 00 00 40 05 | 94 13 1b ea fd 35 6e 40 4c 88 7a 5c c1 e4 2f 2d | 6d 26 6f 2a | state #391 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36800cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b12bc0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab2380 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #391 | libevent_malloc: new ptr-libevent@0x7fb344046040 size 128 | #391 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49675.490759 | resume sending helper answer for #391 suppresed complete_v2_state_transition() and stole MD | #391 spent 0.407 milliseconds in resume sending helper answer | stop processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb364029220 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 4c 10 d0 5a dd 02 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #391 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #391 | rejected packet: | 1e 4c 10 d0 5a dd 02 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8b fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #391: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0815 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37802a9a0 | handling event EVENT_RETRANSMIT for parent state #362 | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #362 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #362 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49675.523988; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002608 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #362 | libevent_malloc: new ptr-libevent@0x7fb364029220 size 128 "road-eastnet-nonat-110" #362: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #362) | 79 e0 7b db bf e0 df 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 58 27 86 c5 f9 8c cf 89 68 d1 9e c2 2a c8 4a | da 7d d8 07 8a b5 64 43 22 f7 a6 30 97 ca b8 f5 | c8 25 5f 3f d2 8e be 62 d3 8d 6c cf 71 bf 76 63 | d9 07 8d b1 c5 9f c3 a7 b8 7e e5 00 03 0b c1 0d | 22 f4 89 95 0c d8 00 e4 8c ba a0 1b ac fa 89 c6 | 67 62 f6 a7 e4 8c 4f c8 c7 77 79 53 f8 98 39 2d | 3b 30 0a e1 da cb f1 fc f0 30 13 27 47 13 e0 65 | 0b da e5 87 6f 0e 6c c0 89 03 ab 2a 82 c5 34 95 | 15 34 67 de 5a aa b5 07 35 bc 95 aa 82 00 b1 16 | 8e 6b 21 e0 45 a5 66 95 6e 83 16 8f 2b ee 03 ef | 02 de 36 db b0 c0 f4 e2 d2 1e 0d be d8 91 f7 72 | cd 14 33 51 64 d5 dd d5 3d 65 70 28 c3 2f 57 3f | 4b 4b d5 8c f2 92 b3 0c 9f 8d a0 2f 9a 5f 9d a8 | 0d ae cd 5e 77 75 b7 48 bb 27 68 90 7e 0e 8d 10 | 86 bf a4 47 df bb 7b cb 34 23 b8 08 15 f3 7f 6d | 51 d5 ae f8 b3 60 44 e0 56 71 c5 a9 57 5a 24 c6 | 29 00 00 24 3b 79 7f e5 5c de f0 ae 26 7a 15 81 | 35 42 e6 f3 1d 66 3a 94 36 41 6a 99 ae e0 a8 96 | 08 73 ec d2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 91 48 5f b0 47 d4 61 2c f1 27 03 | 24 75 2b 95 c4 3a 3e 58 00 00 00 1c 00 00 40 05 | ec 66 fb 7f d2 86 12 b1 2b 4e 47 12 62 c8 23 32 | 13 d6 12 8d | libevent_free: release ptr-libevent@0x7fb37801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | #362 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 e0 7b db bf e0 df 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #362 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #362 | rejected packet: | 79 e0 7b db bf e0 df 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #362: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380009ed0 | handling event EVENT_RETRANSMIT for parent state #339 | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #339 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #339 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49675.52839; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003098 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #339 | libevent_malloc: new ptr-libevent@0x7fb37801a4e0 size 128 "road-eastnet-nonat-87" #339: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #339) | a2 06 83 e6 4d cf 47 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 60 78 10 c3 0f cc 3e 4e 2e d5 96 c1 d2 76 e3 | 97 d5 35 a5 15 b5 cf 25 fc d1 a9 ed 61 00 ab d3 | f0 a5 f9 6b c8 93 25 3b e7 35 94 5b 27 e6 7c aa | 9f 99 13 73 c8 87 72 6f e3 9a d8 3f f2 60 6d 07 | e2 f2 df 74 8c d9 c0 ea 66 9b 1a f7 3a 35 11 09 | 4c 1a 77 9c 33 ec 8e 52 10 1b 5c 10 4f 88 cf e4 | ab bc 00 8a 49 0d dc 56 57 fd b9 aa 33 dc a2 d8 | 3f a7 e3 81 b2 6c 3d 05 80 c1 9e e7 22 3d 4f 4b | 69 99 65 2e db d4 42 77 f6 d5 da ca 9c 7b 37 94 | 4a 33 ff d3 90 af 06 41 1e af a8 a1 29 27 b8 4e | 94 36 29 4f 90 ae d8 40 e5 f9 f7 60 20 50 ae f6 | 19 f9 e5 ce 63 be 68 f8 75 c8 c0 44 7f 51 fc 3c | fe be 4d e9 10 ea 8c 24 89 c7 41 df 92 c0 7b 00 | f7 f4 82 ce db 65 47 b6 bb fd f3 75 44 d0 1d c4 | 34 92 d9 b1 3f bf c2 cf e2 c7 6c 0d 60 aa 7d 11 | 0e 19 00 e8 57 9d 13 5a 3b a1 80 7a d5 8d 15 4c | 29 00 00 24 1c 60 55 0f db a5 b1 e0 94 27 e9 83 | 86 bb c4 10 2a 23 35 9c a1 96 2d 6f 7e 5d c3 40 | 27 31 c9 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 61 9a 5c 09 fb 4f 1f fe 5c 80 fd | 11 ff 3a 18 d8 5f 68 01 00 00 00 1c 00 00 40 05 | f8 00 9b 14 2d 47 6c 3b ee ab c1 8e 99 04 04 19 | 24 06 94 42 | libevent_free: release ptr-libevent@0x7fb3800223c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380009ed0 | #339 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 06 83 e6 4d cf 47 f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #339 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #339 | rejected packet: | a2 06 83 e6 4d cf 47 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #339: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a903c0 | handling event EVENT_RETRANSMIT for parent state #384 | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #384 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #384 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49675.534749; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501302 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380009ed0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #384 | libevent_malloc: new ptr-libevent@0x7fb3800223c0 size 128 "road-eastnet-nonat-132" #384: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #384) | 86 6f ae 12 4d c0 7a b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d b1 fb 85 46 e4 0b ed 3a 09 27 c9 1d d0 fe 19 | 7a 6b 17 bb 62 8e 54 ac f1 64 67 34 40 ff 38 85 | 4f ff 54 1e 02 a7 af 76 91 63 95 f0 62 9e e7 68 | d4 07 2d a5 05 78 38 e6 00 65 3b 0c 3b 55 b9 34 | 19 27 7d 5e 1b 1f d1 f1 b8 c6 a4 32 36 a3 a1 4d | 77 fc 92 08 8e 44 1c 7b 72 a0 4a 6f ff ad 86 71 | 79 52 e6 49 b1 8f 12 9c 40 bc ec da 58 c7 66 8c | df 54 c1 66 96 41 fb 21 bc f2 5f 23 6c 52 ad 47 | c4 d3 9c 32 fb 09 e2 cc 47 c2 4b 3f 71 c2 e6 99 | 6d b7 94 23 a5 4c 0a 3c be 0e b2 50 04 86 41 e3 | 7a 9c 55 d1 3b 34 0c 3c 9f fd 4c f5 09 73 9f 60 | 56 d6 11 97 6a c5 df ef fe 2f 35 ee 63 fe 39 b0 | 29 b4 b3 01 1b 35 ff 91 b5 b4 bf 86 5f 29 e0 72 | 9b d7 f8 07 0a dc 66 0d 27 38 bb fd d4 42 1b 97 | 0e e9 cb d0 75 c1 5f 7b 20 8d a3 bd 9c d8 be df | 08 8a d8 c8 72 8d 2e 70 0c 78 7d 99 d6 b0 fe c1 | 29 00 00 24 dd a5 d7 0d 86 0a ce 46 70 f7 a4 d8 | 79 8d ab 0d 5a ba 15 d4 6b c1 b8 d3 f7 39 89 32 | f9 a6 bc c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 0a a8 53 d7 f6 23 14 8d 14 98 5a | ec 27 4c a0 59 56 95 73 00 00 00 1c 00 00 40 05 | 5b d2 62 5b 9b b5 2e 9c 89 b9 50 27 01 71 4f 1d | 99 42 bf 80 | libevent_free: release ptr-libevent@0x7fb34c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a903c0 | #384 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 6f ae 12 4d c0 7a b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #384 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #384 | rejected packet: | 86 6f ae 12 4d c0 7a b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #384: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #140 | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #140 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #140 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49675.553056; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007665 exceeds limit? YES "road-eastnet-nonat-140" #140: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-140" #140: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #392 at 0x557d46a92480 | State DB: adding IKEv2 state #392 in UNDEFINED | pstats #392 ikev2.ike started | Message ID: init #392: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #392: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #392; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-140" #392: initiating v2 parent SA to replace #140 | using existing local IKE proposals for connection road-eastnet-nonat-140 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 392 for state #392 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a903c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #392 | libevent_malloc: new ptr-libevent@0x7fb34c02a950 size 128 | #392 spent 0.0712 milliseconds in ikev2_parent_outI1() | RESET processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #140 ikev2.ike failed too-many-retransmits | pstats #140 ikev2.ike deleted too-many-retransmits | #140 spent 2.47 milliseconds in total | [RE]START processing: state #140 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-140" #140: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #140: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #140 "road-eastnet-nonat-140" #140: deleting IKE SA for connection 'road-eastnet-nonat-140' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-140' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-140 | State DB: deleting IKEv2 state #140 in PARENT_I1 | parent state #140: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 4 resuming | crypto helper 4 starting work-order 392 for state #392 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 392 | stop processing: state #140 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | in statetime_stop() and could not find #140 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-140 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-140" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-140' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-140" | stop processing: connection "road-eastnet-nonat-140" (in initiate_a_connection() at initiate.c:349) | spent 0.0609 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 392 time elapsed 0.000539 seconds | (#392) spent 0.543 milliseconds in crypto helper computing work-order 392: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 392 for state #392 to event queue | scheduling resume sending helper answer for #392 | libevent_malloc: new ptr-libevent@0x7fb358023e50 size 128 | crypto helper 4 waiting (nothing to do) | processing resume sending helper answer for #392 | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 392 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #392 | **emit ISAKMP Message: | initiator cookie: | 10 0f ce a6 80 60 53 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-140 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 42 7c dc 39 42 03 83 1d fc 78 1f a6 0a 82 be ac | ikev2 g^x 8c 3b 39 1b 2f 80 e7 cb aa b0 35 db d6 f3 de 35 | ikev2 g^x 37 b1 68 f3 68 1d 2d f4 b0 35 cc 7b dc 22 05 f9 | ikev2 g^x b7 af f7 1d a4 46 4d 00 a0 fe ea 26 a2 f9 9b 9a | ikev2 g^x 09 ee 3f e6 65 a7 03 64 d2 2c 26 ad b0 0a b6 6c | ikev2 g^x b7 a6 17 d4 6e a3 92 2f 34 cc d4 54 77 6b ca 57 | ikev2 g^x d5 59 3b bf 54 fe aa b8 9e 19 8b 0b 05 8a f7 be | ikev2 g^x fc d0 1b 7e ca 71 b1 c1 02 6a 82 df ef f5 65 97 | ikev2 g^x da 1e 51 41 e3 d8 f1 96 c4 03 03 bd 8f 10 04 b2 | ikev2 g^x c3 58 82 7f ce 35 78 05 db 11 6d 1f 95 52 d4 56 | ikev2 g^x 49 d1 80 fa 2e f3 ac 1f 38 a0 e5 d5 81 e9 34 d8 | ikev2 g^x 41 7f 2d 0d 61 dd 7b e7 44 a4 89 c9 0c 7d 05 e4 | ikev2 g^x 9f 1e 2d 40 16 34 e0 f0 2c f0 ca 39 ea 5a 9b 3c | ikev2 g^x e7 ee 11 8b d0 d0 71 64 02 96 00 c1 27 19 8e 75 | ikev2 g^x f0 b3 d3 5e 45 6f c3 79 42 e7 20 9d b5 0d 76 ff | ikev2 g^x e5 ba 64 52 91 7f bb 6e bc 95 4c d1 a1 34 da e7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 27 55 30 76 6e b8 e9 20 0f 49 9d 0e 6c f7 55 67 | IKEv2 nonce 5b a0 fb d4 e7 df 75 53 94 42 2e 19 d9 ae ec a2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 10 0f ce a6 80 60 53 20 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8c | natd_hash: port= 01 f4 | natd_hash: hash= 5c 0f f0 e9 84 b6 f5 5d 7e 1b 97 d7 89 b2 50 d4 | natd_hash: hash= 36 fd 91 50 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5c 0f f0 e9 84 b6 f5 5d 7e 1b 97 d7 89 b2 50 d4 | Notify data 36 fd 91 50 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 10 0f ce a6 80 60 53 20 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 93 22 be de f9 76 c2 04 2a 35 c8 fb 20 98 3d d6 | natd_hash: hash= 50 a7 79 8d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 93 22 be de f9 76 c2 04 2a 35 c8 fb 20 98 3d d6 | Notify data 50 a7 79 8d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #392 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #392: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #392 to 4294967295 after switching state | Message ID: IKE #392 skipping update_recv as MD is fake | Message ID: sent #392 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-140" #392: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.140:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #392) | 10 0f ce a6 80 60 53 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 7c dc 39 42 03 83 1d fc 78 1f a6 0a 82 be ac | 8c 3b 39 1b 2f 80 e7 cb aa b0 35 db d6 f3 de 35 | 37 b1 68 f3 68 1d 2d f4 b0 35 cc 7b dc 22 05 f9 | b7 af f7 1d a4 46 4d 00 a0 fe ea 26 a2 f9 9b 9a | 09 ee 3f e6 65 a7 03 64 d2 2c 26 ad b0 0a b6 6c | b7 a6 17 d4 6e a3 92 2f 34 cc d4 54 77 6b ca 57 | d5 59 3b bf 54 fe aa b8 9e 19 8b 0b 05 8a f7 be | fc d0 1b 7e ca 71 b1 c1 02 6a 82 df ef f5 65 97 | da 1e 51 41 e3 d8 f1 96 c4 03 03 bd 8f 10 04 b2 | c3 58 82 7f ce 35 78 05 db 11 6d 1f 95 52 d4 56 | 49 d1 80 fa 2e f3 ac 1f 38 a0 e5 d5 81 e9 34 d8 | 41 7f 2d 0d 61 dd 7b e7 44 a4 89 c9 0c 7d 05 e4 | 9f 1e 2d 40 16 34 e0 f0 2c f0 ca 39 ea 5a 9b 3c | e7 ee 11 8b d0 d0 71 64 02 96 00 c1 27 19 8e 75 | f0 b3 d3 5e 45 6f c3 79 42 e7 20 9d b5 0d 76 ff | e5 ba 64 52 91 7f bb 6e bc 95 4c d1 a1 34 da e7 | 29 00 00 24 27 55 30 76 6e b8 e9 20 0f 49 9d 0e | 6c f7 55 67 5b a0 fb d4 e7 df 75 53 94 42 2e 19 | d9 ae ec a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 0f f0 e9 84 b6 f5 5d 7e 1b 97 d7 | 89 b2 50 d4 36 fd 91 50 00 00 00 1c 00 00 40 05 | 93 22 be de f9 76 c2 04 2a 35 c8 fb 20 98 3d d6 | 50 a7 79 8d | state #392 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c02a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a903c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a903c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #392 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 | #392 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49675.554191 | resume sending helper answer for #392 suppresed complete_v2_state_transition() and stole MD | #392 spent 0.4 milliseconds in resume sending helper answer | stop processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb358023e50 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 0f ce a6 80 60 53 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #392 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #392 | rejected packet: | 10 0f ce a6 80 60 53 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8c fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #392: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344012bf0 | handling event EVENT_RETRANSMIT for parent state #284 | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #284 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #284 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49675.558367; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005457 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358009690 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #284 | libevent_malloc: new ptr-libevent@0x7fb358023e50 size 128 "road-eastnet-nonat-32" #284: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #284) | 4f c5 f3 7c 66 c6 91 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba b7 9c a5 65 e1 b6 6c 6d 9d e6 37 7c 5c f0 56 | 41 3d 90 c7 c5 60 97 4a 06 1e 79 6d 8b 7a e1 25 | 8a e0 db 36 d3 fb fd 75 27 2c e6 11 8c 23 25 88 | 33 6a f7 df 2d 31 86 e1 88 c6 aa 1b d4 34 45 16 | 89 ed d8 a3 84 50 47 88 30 89 02 8c a8 40 9f 16 | 7d e6 73 98 ef b8 9b e4 c2 07 6e 64 f9 a7 00 b0 | 51 f9 1e 1e 5d 35 fd 1d 61 a0 8a db ac 3a a5 8e | 67 a3 5b 3b 5e 51 8c 98 11 1d 70 aa 48 6b 1b 38 | fe 3a 74 c3 2d 4b 66 87 e9 a4 65 ed 1c 5b e4 91 | fa be 09 5f aa ec 3b 28 29 ab 52 85 54 9f ad 67 | e9 64 b2 c0 a7 f8 4d 31 5f 8c e9 8e 20 90 9f 65 | 6a 76 61 75 16 6e 59 99 0c 9b cb ca c4 c4 20 96 | 27 41 40 bc 51 ae 53 c0 78 fe 0b f1 3b 9e 38 fe | 94 f7 01 4f 33 dd 41 c6 b8 e2 1f f5 07 d9 60 b6 | 76 7e 73 5f c5 3d 67 e4 c6 ee 71 88 8c 90 3a 18 | 0e 12 ec 6b 94 d2 71 0c c3 11 05 e5 1f bd ac 6a | 29 00 00 24 e8 7e a2 09 c5 c0 d6 dc c4 8f 1b fd | a9 a5 28 29 c6 ee 14 10 31 5e 74 e5 a8 11 e2 fb | 53 d1 4d b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 bd 1e aa d2 1d d0 15 75 cf 8a a1 | 9b e7 2e 78 e9 b8 ab 0e 00 00 00 1c 00 00 40 05 | 98 e6 12 78 17 7a 25 b0 15 91 c2 32 50 43 18 e1 | 21 f2 b2 de | libevent_free: release ptr-libevent@0x7fb34401a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344012bf0 | #284 spent 0.0943 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f c5 f3 7c 66 c6 91 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #284 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #284 | rejected packet: | 4f c5 f3 7c 66 c6 91 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #284: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354012bf0 | handling event EVENT_RETRANSMIT for parent state #378 | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #378 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #378 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49675.56263; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002027 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344012bf0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #378 | libevent_malloc: new ptr-libevent@0x7fb34401a4e0 size 128 "road-eastnet-nonat-126" #378: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #378) | 92 97 bf d9 57 64 2b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 7e 95 c3 59 64 68 1e dc 08 f2 0b df c0 d3 85 | e4 57 68 76 f4 90 dc 14 fc b4 13 07 10 44 a8 8d | 11 66 84 12 ea 03 ab ca df 00 f5 13 ba 15 16 97 | c3 ae f2 09 b4 c2 1e 65 f4 d4 ef 76 85 ff a3 4a | ac ec 61 57 66 09 9f 4c b2 b0 4b 1a 98 fe 62 e6 | 55 f4 45 b9 db aa 2b bf cb d7 f6 c7 03 42 ad 34 | c6 d8 65 c8 40 fd 09 2c 94 7c 3b f3 2f 0a 0e 1d | 89 ee 1f 04 2f 4d 06 ee d1 19 c4 2e 99 32 3d c2 | d8 62 64 5d 3c 19 32 29 e6 a4 d4 41 97 46 6e 74 | 98 69 50 bd e9 22 20 c8 a0 94 d0 e1 2c ac e0 d4 | 3d 6d 89 f8 65 d2 f8 6c 5d 07 8b 5f be 6f 9f a2 | e3 9a 7d 49 fc a1 b3 f5 34 84 25 08 1b bf 82 69 | 97 0b c6 17 ae 91 38 6f 37 30 af 60 73 cd d7 76 | 1c 53 8a ed 55 8d 3b a6 b0 09 19 d4 bd 91 ad 63 | d2 44 97 69 9c 25 f2 23 5f d4 fb c5 78 47 07 23 | 75 fb 33 32 09 b8 13 e4 4b fc ad 29 45 c0 60 e8 | 29 00 00 24 45 ad fc 22 10 a1 61 46 e5 0c 1e 06 | 27 43 7b e2 4e f3 c7 89 82 92 48 5f 08 ae ee 54 | 20 02 7f 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb d4 ce a5 02 7b 5e 75 a8 72 0f 9e | 6c 02 05 b4 a6 0e 08 51 00 00 00 1c 00 00 40 05 | 67 63 47 aa c8 01 74 31 fc 9f e6 c6 9d 96 80 21 | f6 7a 37 28 | libevent_free: release ptr-libevent@0x7fb36401a420 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354012bf0 | #378 spent 0.088 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 97 bf d9 57 64 2b d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #378 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #378 | rejected packet: | 92 97 bf d9 57 64 2b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #378: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0408 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #363 | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #363 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #363 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49675.591861; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003458 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #363 | libevent_malloc: new ptr-libevent@0x7fb36401a420 size 128 "road-eastnet-nonat-111" #363: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #363) | 51 61 7f 08 48 15 06 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 a4 74 58 c5 f7 d1 13 97 f0 a1 32 ec ba 3b 12 | 2a d1 a7 2b 3c 6a 89 b1 af 9f ef 60 99 3f 2b 97 | 5a 99 67 3e 04 49 9e e1 18 dd 5b 9a 36 f4 31 c2 | 53 fb e0 15 b1 f1 17 18 c0 6a ef 59 2d 9b 43 90 | f2 8c 3e 64 6c 64 9b 41 4d c8 83 ed 81 03 01 ef | 94 98 ac cb 77 3f 19 e2 3d 9a 98 04 76 6b 13 b3 | cd 7b 90 ce b0 33 d0 e1 b7 52 ee 6b 51 23 7a ea | a8 cb 6b 19 dd 2c 75 92 bf 4f 96 8d 61 90 60 ba | ac 55 20 f8 f6 10 ca 5a 43 53 71 3b 48 a8 5f 63 | 88 26 59 cb be 95 f5 90 58 5a 07 1f 8c 1f 49 2e | ab c9 b4 33 89 02 d4 f8 ad 34 05 81 7c 83 7c ee | b9 f5 ea 3c 82 86 1f 8e fd dd f8 79 c6 1d d2 66 | eb 43 cd 6b f4 5d 2f 21 06 e6 55 35 36 2a fc 16 | 28 b4 a8 e2 ec 6d b6 b7 1a 42 16 71 43 4d 93 a5 | b9 be 7c 8b c2 15 e3 5b 72 eb 03 26 dc 93 d9 17 | b6 f6 7f 82 7f 35 e0 76 a8 41 7c 2a 12 6a fc 61 | 29 00 00 24 05 ae 65 e3 84 b1 1a 26 06 06 7b dc | a8 83 38 36 54 1a c8 5b 72 97 b6 83 dc f9 79 7c | dc 6e a1 e8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 05 ad f7 99 b0 88 ad 41 82 57 31 | e5 ff 67 18 3e 77 ff e2 00 00 00 1c 00 00 40 05 | a3 ac d5 a3 ef 34 92 9f a8 df c6 0f 83 0b 12 93 | d2 32 5e d3 | libevent_free: release ptr-libevent@0x7fb34c00f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #363 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 61 7f 08 48 15 06 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #363 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #363 | rejected packet: | 51 61 7f 08 48 15 06 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #363: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384015160 | handling event EVENT_RETRANSMIT for parent state #340 | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #340 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #340 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49675.598139; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00424 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #340 | libevent_malloc: new ptr-libevent@0x7fb34c00f1a0 size 128 "road-eastnet-nonat-88" #340: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #340) | 06 b4 2a d6 65 92 42 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 29 a3 64 49 07 ee 29 df 38 b6 8e cf 9e 1e 2e | b5 cf 5c 9d df 90 0b 24 c7 00 d1 e9 e7 d5 9f 86 | b0 59 b0 c3 a3 da d8 a1 12 f7 d8 f8 0e b3 79 c6 | 53 3d ef a8 ea 62 cb cf 67 47 98 25 86 4a be 53 | 9d 43 a7 c0 c8 ef 24 bd 84 89 4d 1e d4 43 4c 6d | a9 e8 b8 a2 ac 6e 98 24 1f 18 dc ca 27 cf d8 28 | a6 29 25 bd 63 2f 94 ef bf ef cd 28 af b3 c4 14 | c2 24 5c 8a a7 98 ce 81 da e6 36 b6 6f 19 b3 9c | 61 e9 12 2d 81 4f 37 09 f9 11 51 0b 0a 15 3c 25 | dc 56 9d bc 1a 37 30 79 ad 58 f9 75 6f 1b 9e ed | af 69 6e f2 46 86 c0 e7 9c f5 ce 51 f7 2f 69 1c | c5 ca c9 df 4e 7a 80 a9 78 c1 72 af 2f 09 7a f4 | 7b e9 80 c9 52 10 9d 4e 28 29 82 d9 cd 16 a6 20 | 67 0a 26 62 77 51 4a e8 62 40 48 56 bb c1 3c 45 | c4 fb 9d d0 c4 57 ec 56 11 1b 76 f9 cd ac 15 3f | 9b 2c e1 a4 49 9f 96 e5 41 42 75 44 0c a4 b4 45 | 29 00 00 24 ae e0 e3 5e aa a2 ee b4 ba fd 41 25 | ff 71 9d 02 44 71 da b9 6c 12 19 98 91 a3 35 04 | b4 f3 15 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 9b ba f5 3a f3 63 5f fe ea b4 e7 | 7e cf 7e 1a ac 8a 91 ce 00 00 00 1c 00 00 40 05 | 7a 1b 4b 67 34 a5 a3 ba cf 0b c3 8e 76 85 1a 07 | b5 81 41 18 | libevent_free: release ptr-libevent@0x7fb384020ef0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384015160 | #340 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368018460 | handling event EVENT_RETRANSMIT for parent state #385 | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #385 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #385 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49675.59827; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500424 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384015160 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #385 | libevent_malloc: new ptr-libevent@0x7fb384020ef0 size 128 "road-eastnet-nonat-133" #385: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #385) | dc 0d 67 a5 b0 49 95 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 d2 87 4f 28 1e d2 9a 8d 89 1b 83 29 19 de f5 | e6 63 09 2d e2 e9 61 46 d1 7b 1d 91 3c 38 a6 0f | e9 63 cf 58 08 13 3f 3e 7d f1 19 3d 13 fc 34 b5 | 18 8a e7 0c f9 3c 2c 71 b0 34 a4 05 97 a5 9f c7 | 97 d1 e4 25 37 22 ef 17 fb 52 35 c9 4f 1f 26 16 | 3c 2a 1f 00 10 3c df 46 38 33 44 5d a6 92 e5 d5 | 69 68 b5 76 06 e3 77 b8 1e 01 65 43 01 c9 86 ef | da 65 a5 1f 57 b0 00 8a de a9 34 23 2e 5c 26 a6 | a0 7f 44 a7 f5 75 dd 87 e1 fa 95 ca ff 5e 20 3b | 92 ff 19 e9 6e 3b 74 90 7d f7 38 58 ce a4 6e 3e | 22 98 35 57 a7 19 32 26 90 4e 72 85 8e fc 44 0f | e3 30 88 10 65 63 68 a3 81 e7 a5 04 d1 cf 06 2d | 36 a6 35 6b fb 1a c6 21 82 6b b4 50 a3 0b 89 0a | 70 f4 46 4d b9 30 8c 1b 9a a3 3e a4 57 bb 51 f0 | c0 0a 2a ca 36 ae b3 f0 02 3c c8 b5 bb 6a 7b 96 | 55 84 4d bb 15 b3 47 cf cd 45 3c 4a e8 4b 8f 89 | 29 00 00 24 90 a0 a9 10 09 5c 84 13 2a 39 8b 57 | c5 67 7f 3e 0b 64 03 36 1d 0d c2 a2 27 b3 44 c5 | 83 b2 09 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 9a 97 66 55 a8 9e d7 24 ff 14 54 | 09 c0 45 ac a1 60 51 9f 00 00 00 1c 00 00 40 05 | da 5c 4e 27 00 47 9e f2 1c fc 63 30 21 b4 79 d8 | 3b 38 4e b8 | libevent_free: release ptr-libevent@0x7fb37801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368018460 | #385 spent 0.0701 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 b4 2a d6 65 92 42 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #340 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #340 | rejected packet: | 06 b4 2a d6 65 92 42 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #340: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 0d 67 a5 b0 49 95 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #385 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #385 | rejected packet: | dc 0d 67 a5 b0 49 95 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #385: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0362 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a34e10 | handling event EVENT_RETRANSMIT for parent state #141 | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #141 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #141 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49675.615544; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007818 exceeds limit? YES "road-eastnet-nonat-141" #141: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-141" #141: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #393 at 0x557d46a93a40 | State DB: adding IKEv2 state #393 in UNDEFINED | pstats #393 ikev2.ike started | Message ID: init #393: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #393: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #393; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-141" #393: initiating v2 parent SA to replace #141 | using existing local IKE proposals for connection road-eastnet-nonat-141 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 393 for state #393 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb368018460 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #393 | libevent_malloc: new ptr-libevent@0x7fb37801d920 size 128 | #393 spent 0.0674 milliseconds in ikev2_parent_outI1() | RESET processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #141 ikev2.ike failed too-many-retransmits | pstats #141 ikev2.ike deleted too-many-retransmits | #141 spent 2.52 milliseconds in total | [RE]START processing: state #141 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-141" #141: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #141: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #141 "road-eastnet-nonat-141" #141: deleting IKE SA for connection 'road-eastnet-nonat-141' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-141' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-141 | State DB: deleting IKEv2 state #141 in PARENT_I1 | parent state #141: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 13 resuming | crypto helper 13 starting work-order 393 for state #393 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 393 | stop processing: state #141 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a34e10 | in statetime_stop() and could not find #141 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-141 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-141" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-141' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-141" | stop processing: connection "road-eastnet-nonat-141" (in initiate_a_connection() at initiate.c:349) | spent 0.0583 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 393 time elapsed 0.000555 seconds | (#393) spent 0.559 milliseconds in crypto helper computing work-order 393: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 393 for state #393 to event queue | scheduling resume sending helper answer for #393 | libevent_malloc: new ptr-libevent@0x7fb35c023d80 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #393 | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 393 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #393 | **emit ISAKMP Message: | initiator cookie: | d2 4f c7 97 0e 2c 3e ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-141 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x de 57 42 91 f9 c0 06 25 d3 5e c6 ff a0 b9 c7 9a | ikev2 g^x f8 73 f5 52 ea b3 b7 0b 33 79 a9 ab be 94 f5 d3 | ikev2 g^x 47 a2 ed 3f 30 d5 f5 d7 c5 7f 9d d3 ed 4d a0 b4 | ikev2 g^x f7 ad a1 76 18 49 17 db 8a b9 cb ed 58 a9 0c d9 | ikev2 g^x 5a 76 b8 cb 07 f9 85 e7 ea fe 63 f8 ee 0b 16 50 | ikev2 g^x 8f 7f 23 44 74 8a 56 f9 51 93 d3 d4 1e a9 e0 6d | ikev2 g^x d7 af c4 1a 46 a4 66 f8 55 f1 fc bb 79 62 df 34 | ikev2 g^x 8f ee 1b 57 26 7e c4 de 20 f4 80 c2 d6 80 72 a1 | ikev2 g^x aa 53 f1 e8 e4 e6 1c e7 0b 29 98 85 7a 59 d5 aa | ikev2 g^x 68 b0 88 b1 b9 15 73 53 b5 6a 19 c9 ae 48 c5 a2 | ikev2 g^x 01 52 4f ea f5 c9 9f b8 90 37 cc 56 4f 8d 78 b9 | ikev2 g^x 10 dc d8 56 42 a7 88 d4 9d 82 8e d9 33 ab ac 86 | ikev2 g^x 5e b8 f6 d0 8e 0c aa b2 4f 41 73 62 f2 0c c2 27 | ikev2 g^x ef ba c6 42 e2 bb a6 b0 c4 15 d3 04 4c 56 e0 5c | ikev2 g^x ad 92 8b ed ed ba dd c2 b7 4a 92 54 4a ae d4 37 | ikev2 g^x c3 0d 4f 7c 37 7e 0b 49 1e 1d 38 1e 4b 41 b4 43 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f4 b5 fb 56 01 5f ac 00 1d 31 6b d7 01 8d f2 d0 | IKEv2 nonce 3f 15 27 39 dc 6b 31 7e 82 50 a3 bb 9c f0 ec f4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d2 4f c7 97 0e 2c 3e ff | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8d | natd_hash: port= 01 f4 | natd_hash: hash= 5c 9c 87 ea bd bf 36 3e cf 82 b1 7a 78 3f f7 57 | natd_hash: hash= 2c cf 08 1f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5c 9c 87 ea bd bf 36 3e cf 82 b1 7a 78 3f f7 57 | Notify data 2c cf 08 1f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d2 4f c7 97 0e 2c 3e ff | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 77 3b 5d 4c 9c 3f 6e 8a 01 7a d1 9c 5b 89 36 dc | natd_hash: hash= 10 f8 1f e1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 77 3b 5d 4c 9c 3f 6e 8a 01 7a d1 9c 5b 89 36 dc | Notify data 10 f8 1f e1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #393 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #393: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #393 to 4294967295 after switching state | Message ID: IKE #393 skipping update_recv as MD is fake | Message ID: sent #393 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-141" #393: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.141:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #393) | d2 4f c7 97 0e 2c 3e ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 57 42 91 f9 c0 06 25 d3 5e c6 ff a0 b9 c7 9a | f8 73 f5 52 ea b3 b7 0b 33 79 a9 ab be 94 f5 d3 | 47 a2 ed 3f 30 d5 f5 d7 c5 7f 9d d3 ed 4d a0 b4 | f7 ad a1 76 18 49 17 db 8a b9 cb ed 58 a9 0c d9 | 5a 76 b8 cb 07 f9 85 e7 ea fe 63 f8 ee 0b 16 50 | 8f 7f 23 44 74 8a 56 f9 51 93 d3 d4 1e a9 e0 6d | d7 af c4 1a 46 a4 66 f8 55 f1 fc bb 79 62 df 34 | 8f ee 1b 57 26 7e c4 de 20 f4 80 c2 d6 80 72 a1 | aa 53 f1 e8 e4 e6 1c e7 0b 29 98 85 7a 59 d5 aa | 68 b0 88 b1 b9 15 73 53 b5 6a 19 c9 ae 48 c5 a2 | 01 52 4f ea f5 c9 9f b8 90 37 cc 56 4f 8d 78 b9 | 10 dc d8 56 42 a7 88 d4 9d 82 8e d9 33 ab ac 86 | 5e b8 f6 d0 8e 0c aa b2 4f 41 73 62 f2 0c c2 27 | ef ba c6 42 e2 bb a6 b0 c4 15 d3 04 4c 56 e0 5c | ad 92 8b ed ed ba dd c2 b7 4a 92 54 4a ae d4 37 | c3 0d 4f 7c 37 7e 0b 49 1e 1d 38 1e 4b 41 b4 43 | 29 00 00 24 f4 b5 fb 56 01 5f ac 00 1d 31 6b d7 | 01 8d f2 d0 3f 15 27 39 dc 6b 31 7e 82 50 a3 bb | 9c f0 ec f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 9c 87 ea bd bf 36 3e cf 82 b1 7a | 78 3f f7 57 2c cf 08 1f 00 00 00 1c 00 00 40 05 | 77 3b 5d 4c 9c 3f 6e 8a 01 7a d1 9c 5b 89 36 dc | 10 f8 1f e1 | state #393 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37801d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb368018460 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a34e10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #393 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 | #393 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49675.616606 | resume sending helper answer for #393 suppresed complete_v2_state_transition() and stole MD | #393 spent 0.318 milliseconds in resume sending helper answer | stop processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c023d80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 4f c7 97 0e 2c 3e ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #393 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #393 | rejected packet: | d2 4f c7 97 0e 2c 3e ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8d fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #393: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc00 | handling event EVENT_RETRANSMIT for parent state #285 | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #285 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #285 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49675.62379; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004941 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00cc10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #285 | libevent_malloc: new ptr-libevent@0x7fb35c023d80 size 128 "road-eastnet-nonat-33" #285: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #285) | 8e b8 37 d5 68 56 5c 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 a4 f2 e0 52 94 4a 81 83 55 c1 41 32 b7 b8 02 | 1f ed 45 79 af ff 8a eb 0a de 74 5c 80 82 ad 8f | b3 d0 39 bf 3b db ca 12 0b a2 0e eb ce 92 b6 11 | 51 c6 b7 d3 f4 87 aa 09 0c f5 bb d2 46 13 91 7d | 65 dc 9e 2a 12 da 3f be a8 bc 4e 1c a1 4c 53 ad | 64 f4 41 68 96 19 bd e1 80 86 91 4f 17 c1 cc 5c | ad 72 12 cc 9c fe d8 85 6a cd 1f 0f cf 61 bc 07 | 09 af 5b a0 a2 6c 2a 6f 4c 7e dd ad 13 55 ed 0e | ce cf e6 c5 66 9e 5a 6a e4 42 78 50 61 c3 d4 73 | e3 47 f2 bc a4 8c 26 64 97 c9 f1 2a c6 63 9c 83 | 60 4f 25 9e cb 7a 10 71 25 9d c1 dd 11 38 34 bc | 7c a1 3b 2b 0d 73 6f f9 3c 0b 62 50 05 38 a7 0e | 31 2d 60 72 dd 2b a2 05 f6 e2 f0 0d 9b c1 b1 9e | c0 ee 0d 2f 64 4b 28 d2 c0 e7 3b 0a 50 ff 03 45 | 45 ff 2c cd 4e 54 17 7d 2b 95 02 32 23 94 0e de | 7b 38 d9 9c b7 e8 7d 2f 56 9c 26 e0 8b a0 e6 38 | 29 00 00 24 e6 a9 52 cb 4c 75 d2 f3 84 20 3b dd | 0e ee e2 12 57 50 c2 6f 3d 4c ae 21 23 00 a4 ca | 8c 87 5b 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 5c 90 12 97 99 4e dd 8f 9a cf 75 | ad 0a 2b a1 31 ad 53 29 00 00 00 1c 00 00 40 05 | f9 f4 9b a0 01 06 28 22 67 53 82 2b ec 0b 3c 23 | 3e d8 d3 7f | libevent_free: release ptr-libevent@0x7fb37c01a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc00 | #285 spent 0.0995 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e b8 37 d5 68 56 5c 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #285 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #285 | rejected packet: | 8e b8 37 d5 68 56 5c 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #285: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800cc10 | handling event EVENT_RETRANSMIT for parent state #364 | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #364 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #364 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49675.65608; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004088 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc00 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #364 | libevent_malloc: new ptr-libevent@0x7fb37c01a4e0 size 128 "road-eastnet-nonat-112" #364: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #364) | 33 be fb 4e a0 1f 6e f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 2a 42 5d a7 d8 6e 30 43 82 cd c7 8b 99 36 58 | d8 cb c2 34 66 ff 8a 30 2d b5 6a f0 e0 25 f9 40 | 18 b9 ba e3 e0 90 ff f4 cd 9b 1b 34 38 ee bc bc | a0 41 ef 4f 47 94 f5 37 14 2e 5c 6e 0f a6 94 db | 88 81 75 e1 ca 78 c8 9f 91 97 49 cc 62 0b 7c 24 | 05 6f 34 9d ba a1 13 0a 58 7e 2f 7a ad f7 32 fc | 1d 0c 87 25 75 e1 21 b8 48 fb 8f 7c d6 35 a3 1a | ae f0 b3 f0 3b da b9 9b f9 3d d2 6d c0 fe 81 68 | c2 c7 a1 4c 73 5e 1c b4 3a 58 ed b8 29 5f 91 4a | f8 66 00 af 13 4e e2 0d 66 a8 97 6e 0e 81 4f 92 | 8c 69 2c e3 38 08 3d ee 34 5d c4 0d 5d 92 19 a0 | ed a9 9d c5 1f 5c c0 55 9f 77 6e f9 34 95 4c 9a | 1b 67 cf ca 63 f1 13 a2 4f fd 39 a9 a7 28 45 69 | a8 39 46 14 38 17 c4 c7 52 5d 03 e8 bd 24 28 07 | 48 28 79 7d f7 c5 f9 df 10 a1 d2 ba 0c 72 5c 57 | de c7 d6 50 9c eb 46 ad 18 84 34 9f f7 a9 0f 36 | 29 00 00 24 57 1c 59 6e 8c 59 64 04 26 7e c7 7d | 57 3e 20 cd ce 8c 1c 54 8d 44 77 eb 53 6a 1b 23 | 5a 68 d6 45 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 b7 ef ef bc 35 4f 63 6b 7a c6 35 | bb 1f b7 d6 68 94 93 4f 00 00 00 1c 00 00 40 05 | 20 e3 22 42 33 64 b9 da db 7f 44 ff d7 76 e4 71 | c9 1d dc 40 | libevent_free: release ptr-libevent@0x7fb33801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800cc10 | #364 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 be fb 4e a0 1f 6e f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #364 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #364 | rejected packet: | 33 be fb 4e a0 1f 6e f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #364: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8ee40 | handling event EVENT_RETRANSMIT for parent state #386 | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #386 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #386 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49675.657351; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500261 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #386 | libevent_malloc: new ptr-libevent@0x7fb33801a4e0 size 128 "road-eastnet-nonat-134" #386: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #386) | b9 e2 f3 4f 37 4c 11 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f da ec b0 32 6b 35 e3 b5 80 95 66 e9 7f b8 d5 | e2 e0 68 33 cd 76 e0 38 1a b1 5d 56 26 da 9f e0 | 7e 25 7d 36 13 86 62 f1 2c 8d 3f 33 c2 a9 77 5c | 6c 22 2c d9 e8 13 05 5f 5c b6 bf 2d 06 59 25 68 | 04 0a 7e 77 39 77 e2 48 8e 95 f3 7a 6b 62 7a 5c | 74 73 02 c5 eb 3d 85 b2 e4 97 e2 a5 7e c1 fd bd | 8e 39 16 68 05 dd bf 87 fa 57 12 1c 04 ca 0c 29 | 8c f4 e1 ff dd 36 cf 70 de cd 23 dc c6 ae 0f aa | 3b 0f fa f5 80 72 1a cd 74 ba bc e4 a4 6c a0 e3 | 89 9a 36 59 db 27 b5 54 3f 8a aa cb ee 7a 4c 74 | 10 ef 6c 33 3c 46 b9 be 98 4b 1f 0c 9e a1 0f e7 | 70 9c 48 fc 41 5f bc 21 01 43 4c 8e f5 9c e5 23 | bb 93 4c ac ba 5c 01 89 9a 17 4a 24 a8 b9 2c 47 | 70 fc 07 f1 21 a4 d5 20 f9 8f f8 38 ce d5 70 b1 | 42 c9 99 11 ba 5a fc 0c 06 b5 ae ff af e4 68 aa | d7 82 77 58 85 4e fc 74 00 fa 00 8a 91 15 50 9e | 29 00 00 24 84 96 aa 5e b5 f6 6f 99 c5 43 c7 51 | b3 36 1c 3e 65 fe 9c e9 3e a8 cd 03 a7 c9 e1 a9 | 36 56 0e 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 80 4a c6 9c b6 70 28 5d 0a 3a 23 | 72 63 d0 38 6e f2 8f ca 00 00 00 1c 00 00 40 05 | 26 1f 03 bb d7 50 8e c5 c4 3f 03 d2 3a c8 fe 3b | 09 a1 da 1f | libevent_free: release ptr-libevent@0x7fb36c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee40 | #386 spent 0.0873 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 e2 f3 4f 37 4c 11 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #386 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #386 | rejected packet: | b9 e2 f3 4f 37 4c 11 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #386: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370017ea0 | handling event EVENT_RETRANSMIT for parent state #379 | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #379 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #379 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49675.658575; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00044 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee40 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #379 | libevent_malloc: new ptr-libevent@0x7fb36c0251c0 size 128 "road-eastnet-nonat-127" #379: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #379) | ac d4 3b e7 18 ea 52 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 79 a1 28 22 6c 83 3f 06 54 d9 39 13 0e d2 1a | 91 c2 ca c5 f2 c4 4e d5 78 8f 04 34 b9 34 73 b2 | 0e 75 71 ec 03 a6 5b c6 fa 6d a8 f4 41 1e af 26 | a4 e1 0a 58 77 48 aa f7 f9 4b 31 cf 6b f4 65 97 | 07 66 c4 32 08 bd d1 a1 48 aa 20 4b 65 4e 17 6e | 1d 1d 3e be b4 1e 7a 49 6a 64 0a fb 44 89 ba 45 | 90 86 8a 0e 4e 08 c0 05 da d1 a0 ff 5a ee c2 33 | ff d9 1a 6f ee 08 fd 7e aa 64 53 f4 84 74 c5 cf | 19 1a 29 d4 bf 47 bd 52 17 99 38 57 75 f7 85 58 | a7 b0 c8 4e e1 95 2d 4b f1 9c 5e eb 85 14 0d 87 | ff dd 17 9a ad 51 c0 99 e2 a6 60 c5 a5 7e 68 46 | b9 5c 04 3b 76 a0 9e 3d f7 9a 42 72 b5 92 be a4 | 61 c4 dd 5e a0 a3 58 05 90 20 32 7d b8 9d ca 34 | 36 d3 6d 56 98 49 60 97 da 87 f8 14 51 ea cf 16 | 79 9b 7d e5 00 7a 74 76 25 99 77 5a ef df a7 1c | e5 07 de ab dc 8b 19 85 17 de fd 62 d8 d6 3b b0 | 29 00 00 24 7a e9 60 d7 4c 8b 32 bf 82 0a a8 9a | c0 af 7e 52 e6 dc b9 f1 3b fb 0d 8e 4f c7 9d 86 | 5c d7 7a af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b e2 54 69 3e 49 d9 e9 7b 2c 62 f7 | a1 9b 3b a0 68 bf 42 11 00 00 00 1c 00 00 40 05 | 0c ab 0f ab 0f 86 37 d7 85 f7 e9 a7 f4 f2 01 1e | 28 ca 40 2a | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370017ea0 | #379 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac d4 3b e7 18 ea 52 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #379 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #379 | rejected packet: | ac d4 3b e7 18 ea 52 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #379: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0562 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37801d710 | handling event EVENT_RETRANSMIT for parent state #341 | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #341 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #341 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49675.660861; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004441 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370017ea0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #341 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 "road-eastnet-nonat-89" #341: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #341) | 49 c3 42 79 ad a4 02 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 28 2b 3a 23 5f 9c 41 a8 c4 b1 54 27 b8 a0 a8 | a4 06 9f e8 bd 51 0b 54 b6 c3 33 24 5b b7 ea 09 | 0f d7 aa 52 2f c6 c6 78 f1 af 48 22 da 41 1f 06 | 45 43 46 fc b0 c6 2f 1b c2 df 83 35 32 87 c5 a5 | b2 fd 30 3e 95 a2 12 80 00 0f 09 dd 41 c2 48 21 | 60 8b 18 12 e2 f7 cf 1e de 64 8d 80 92 30 17 55 | ad 93 96 5a 50 26 d3 cf d9 c9 40 82 d0 c1 d7 8c | 1b c3 86 4b 02 cc 46 e2 fc 73 8a b5 ae 23 f0 12 | e2 a2 8c 5d c9 4d fa 9f 2b e7 d4 9f 15 6e 8f 91 | 94 64 45 c0 fe f3 80 9a 4c e2 d7 66 20 dd 41 dc | 6b 9b c8 3f df d1 ab 15 c5 36 9b b6 cb 01 6b 62 | c9 d1 d0 ae bf 44 a3 4d 59 dd 52 35 90 0f 89 8a | f2 c1 bf c6 f6 a5 a8 2e c6 a8 d7 de 94 ea f6 00 | 11 3a e4 a5 1c cc 19 f4 1b 95 ff 82 80 6f 79 ae | 97 c0 6f ca 24 fa 61 b5 2e 87 00 ef d7 62 ce 06 | 06 5f 50 40 c4 2f 8b 3a fb 06 a7 11 50 8a 1f ce | 29 00 00 24 b0 2a b8 49 b5 4b c9 98 47 c3 4a b6 | 54 a6 a4 dc f8 8a 35 db 6a e0 ae b8 2b 87 41 53 | a2 41 a5 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e a8 6f b4 ec 17 85 04 80 69 75 d9 | db 5a 4e 4f c9 9c a6 7b 00 00 00 1c 00 00 40 05 | 47 20 cd 59 bf 11 9f 21 41 41 cd 45 1c bb 06 ab | 5f ca 38 7e | libevent_free: release ptr-libevent@0x7fb378012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37801d710 | #341 spent 0.0873 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 c3 42 79 ad a4 02 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #341 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #341 | rejected packet: | 49 c3 42 79 ad a4 02 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #341: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3fc10 | handling event EVENT_RETRANSMIT for parent state #142 | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #142 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #142 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49675.680089; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010376 exceeds limit? YES "road-eastnet-nonat-142" #142: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-142" #142: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #394 at 0x557d46a95000 | State DB: adding IKEv2 state #394 in UNDEFINED | pstats #394 ikev2.ike started | Message ID: init #394: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #394: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #394; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-142" #394: initiating v2 parent SA to replace #142 | using existing local IKE proposals for connection road-eastnet-nonat-142 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 394 for state #394 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37801d710 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #394 | libevent_malloc: new ptr-libevent@0x7fb378012840 size 128 | #394 spent 0.08 milliseconds in ikev2_parent_outI1() | RESET processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #142 ikev2.ike failed too-many-retransmits | pstats #142 ikev2.ike deleted too-many-retransmits | #142 spent 2.24 milliseconds in total | [RE]START processing: state #142 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-142" #142: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #142: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #142 "road-eastnet-nonat-142" #142: deleting IKE SA for connection 'road-eastnet-nonat-142' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-142' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-142 | State DB: deleting IKEv2 state #142 in PARENT_I1 | parent state #142: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 17 resuming | crypto helper 17 starting work-order 394 for state #394 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 394 | stop processing: state #142 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb34001a190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3fc10 | in statetime_stop() and could not find #142 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-142 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-142" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-142' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-142" | stop processing: connection "road-eastnet-nonat-142" (in initiate_a_connection() at initiate.c:349) | spent 0.0584 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 394 time elapsed 0.000536 seconds | (#394) spent 0.54 milliseconds in crypto helper computing work-order 394: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 394 for state #394 to event queue | scheduling resume sending helper answer for #394 | libevent_malloc: new ptr-libevent@0x7fb350023d80 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #394 | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 394 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #394 | **emit ISAKMP Message: | initiator cookie: | c6 0a d6 5e 7e fc 84 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-142 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 74 b5 7c 6c c9 f1 d1 76 55 70 0c 53 79 42 59 aa | ikev2 g^x 1c 78 3a 1c cf 8e ff bf 3c 4f 8e 36 eb fa f5 80 | ikev2 g^x 9c 26 80 0f 65 74 f8 36 f2 69 55 0c 8f 0e 23 f4 | ikev2 g^x f2 22 a0 b5 d9 98 7e 1f aa d3 a2 c6 8c ae 8e 98 | ikev2 g^x 7c 0a f3 ed 8f 8b 88 58 8c d6 33 95 a0 55 9d 22 | ikev2 g^x 45 bd 30 81 fc 6e e7 86 9a f8 90 92 f7 2d bb 24 | ikev2 g^x 69 7e b6 2c e3 c4 d3 78 cf 51 21 62 11 c2 15 e2 | ikev2 g^x b3 a9 82 d8 15 7c 3e 4d bb 85 98 4b 06 e1 32 2f | ikev2 g^x 7a ee fc 56 3c 9b 3f a7 bb d2 50 44 19 3c 10 75 | ikev2 g^x d0 ab ea a8 d0 55 74 15 97 4a a8 8a 65 6f 7d 24 | ikev2 g^x 88 48 f4 59 45 9a aa ed 6e b4 a3 4a 2e c4 97 e3 | ikev2 g^x ef a9 a3 78 d3 c7 01 a3 80 5f 34 19 5f e9 1a 0b | ikev2 g^x 22 c3 b3 e4 7b 39 94 40 be d6 c0 25 22 6b 94 43 | ikev2 g^x 4e 6c a4 23 34 ff 10 49 a6 bf 97 8e b9 5f 55 2d | ikev2 g^x 28 e5 68 c3 b7 a6 14 92 b7 6a 59 d7 14 cc 2b 2a | ikev2 g^x 46 b7 9f a5 f7 40 91 f4 58 19 59 a8 c2 3d 8c 54 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 48 a4 83 24 df d5 ff 67 2d 1a db a8 39 76 5f a5 | IKEv2 nonce 8c c2 0e 08 ee f5 2b 2a a4 7f 9e 08 09 74 ed 35 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c6 0a d6 5e 7e fc 84 b9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8e | natd_hash: port= 01 f4 | natd_hash: hash= a3 07 bb 4a c8 d9 c8 75 02 c5 e8 2f 3d 22 1e b1 | natd_hash: hash= bf 8b 35 f7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a3 07 bb 4a c8 d9 c8 75 02 c5 e8 2f 3d 22 1e b1 | Notify data bf 8b 35 f7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c6 0a d6 5e 7e fc 84 b9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6e c1 7a 04 07 74 46 3d 3d f7 4a 09 48 b9 79 2c | natd_hash: hash= 6a b6 13 f4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6e c1 7a 04 07 74 46 3d 3d f7 4a 09 48 b9 79 2c | Notify data 6a b6 13 f4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #394 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #394: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #394 to 4294967295 after switching state | Message ID: IKE #394 skipping update_recv as MD is fake | Message ID: sent #394 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-142" #394: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.142:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #394) | c6 0a d6 5e 7e fc 84 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 b5 7c 6c c9 f1 d1 76 55 70 0c 53 79 42 59 aa | 1c 78 3a 1c cf 8e ff bf 3c 4f 8e 36 eb fa f5 80 | 9c 26 80 0f 65 74 f8 36 f2 69 55 0c 8f 0e 23 f4 | f2 22 a0 b5 d9 98 7e 1f aa d3 a2 c6 8c ae 8e 98 | 7c 0a f3 ed 8f 8b 88 58 8c d6 33 95 a0 55 9d 22 | 45 bd 30 81 fc 6e e7 86 9a f8 90 92 f7 2d bb 24 | 69 7e b6 2c e3 c4 d3 78 cf 51 21 62 11 c2 15 e2 | b3 a9 82 d8 15 7c 3e 4d bb 85 98 4b 06 e1 32 2f | 7a ee fc 56 3c 9b 3f a7 bb d2 50 44 19 3c 10 75 | d0 ab ea a8 d0 55 74 15 97 4a a8 8a 65 6f 7d 24 | 88 48 f4 59 45 9a aa ed 6e b4 a3 4a 2e c4 97 e3 | ef a9 a3 78 d3 c7 01 a3 80 5f 34 19 5f e9 1a 0b | 22 c3 b3 e4 7b 39 94 40 be d6 c0 25 22 6b 94 43 | 4e 6c a4 23 34 ff 10 49 a6 bf 97 8e b9 5f 55 2d | 28 e5 68 c3 b7 a6 14 92 b7 6a 59 d7 14 cc 2b 2a | 46 b7 9f a5 f7 40 91 f4 58 19 59 a8 c2 3d 8c 54 | 29 00 00 24 48 a4 83 24 df d5 ff 67 2d 1a db a8 | 39 76 5f a5 8c c2 0e 08 ee f5 2b 2a a4 7f 9e 08 | 09 74 ed 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 07 bb 4a c8 d9 c8 75 02 c5 e8 2f | 3d 22 1e b1 bf 8b 35 f7 00 00 00 1c 00 00 40 05 | 6e c1 7a 04 07 74 46 3d 3d f7 4a 09 48 b9 79 2c | 6a b6 13 f4 | state #394 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb378012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37801d710 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3fc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #394 | libevent_malloc: new ptr-libevent@0x7fb34001a190 size 128 | #394 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49675.681195 | resume sending helper answer for #394 suppresed complete_v2_state_transition() and stole MD | #394 spent 0.333 milliseconds in resume sending helper answer | stop processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb350023d80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c6 0a d6 5e 7e fc 84 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #394 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #394 | rejected packet: | c6 0a d6 5e 7e fc 84 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8e fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #394: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #286 | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #286 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #286 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49675.691384; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003947 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350017ea0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #286 | libevent_malloc: new ptr-libevent@0x7fb350023d80 size 128 "road-eastnet-nonat-34" #286: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #286) | a2 ed ea 42 1b 91 7a d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a a6 7d cd 97 e4 f8 0e 4c a8 f7 b1 ec cb f9 8c | 2f 76 7e 20 17 e9 ac 96 37 6c d0 36 42 10 05 54 | c9 b8 65 a2 e7 d3 10 b3 60 78 69 80 3d 25 e3 d0 | 6b b3 ef 43 8d bb 4b f1 6d fd 75 58 b6 64 ea eb | 21 44 51 94 9d af c8 b5 2c d9 89 52 8e 49 92 15 | c8 f5 a7 13 6d cd 71 4c 89 a6 18 b9 37 a2 0d cb | 6e 90 fa f6 c2 05 39 4f e6 3c 7a ff 95 71 4f ea | 6f fa 7f ad 4f d5 8a a0 2f e3 1c 55 7c 9d 2b b7 | f8 c6 43 95 70 9b 3c 8c f8 2e 6e 7f b8 14 5a ab | e6 e2 cc bb a0 95 89 e6 41 f3 31 0c 80 44 7c cc | 26 be 63 d8 03 4f 0e f4 82 c2 32 aa ff f3 ec 67 | 80 f5 48 c4 4e dc 67 68 c5 87 ee 31 77 11 8a 89 | f7 38 08 ed 5a b3 8e c6 08 9c 28 3d e6 49 22 cc | f1 1d ea 6e 27 3f 41 69 56 c6 98 3e aa a5 4b a8 | 83 96 ce 94 b1 ac 7a 4b a0 42 08 47 1d ca 77 fa | 08 50 16 47 c6 8d 84 08 18 b0 a8 93 c0 9a 70 76 | 29 00 00 24 ff d1 37 2d 2c 72 ee aa 08 fb db a4 | 83 ef f7 bd 0a ef 47 b4 41 70 b6 07 5f 86 86 3a | e3 fa 60 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 c0 b7 bc 90 25 46 09 9f 5d 7d 2b | e5 1e 40 45 53 17 97 19 00 00 00 1c 00 00 40 05 | ec a0 d2 60 58 e7 4c 5a 13 5c f5 c2 c9 76 dd 61 | a7 bb 7e 37 | libevent_free: release ptr-libevent@0x7fb33803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #286 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 ed ea 42 1b 91 7a d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #286 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #286 | rejected packet: | a2 ed ea 42 1b 91 7a d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #286: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad43c0 | handling event EVENT_RETRANSMIT for parent state #387 | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #387 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #387 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49675.716677; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500664 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #387 | libevent_malloc: new ptr-libevent@0x7fb33803b0b0 size 128 "road-eastnet-nonat-135" #387: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #387) | 75 6e e5 e5 6a cd b8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff a4 36 8a d7 5e f8 44 73 70 3f d1 cc 7c 79 90 | 0b d6 30 0a fd 2b 08 93 ae c4 9d c0 92 f3 30 c3 | aa 43 1a b6 dd 00 a6 77 0b 61 7f 7a 6d 22 60 10 | f1 8f 0a bd 4e 21 a1 c5 3c 6d bc 87 58 3a fc 28 | a1 f5 dc 41 f0 99 f6 3d 83 55 3c 93 36 df 67 78 | d6 16 47 a9 dd 0a f6 c9 ed 30 32 20 48 63 8f ce | 8c eb 37 37 cb 50 71 37 bd cb 4b f9 48 98 89 fb | 52 3f d5 c6 89 92 40 89 ae 52 a8 41 db 88 8d ad | 76 89 a2 2c 25 fd cd a1 b3 18 a9 52 92 ca 41 cc | be 86 7c 0a d4 fa d9 2c a1 ce 6b 87 5c 4f 0b a7 | e2 e7 b1 90 b4 88 13 15 0f 2d 50 24 a6 28 8e 8a | 81 90 02 66 38 1d 10 b6 04 db f1 15 7f 9a 7c eb | ec 94 ef 10 22 b8 7f a2 35 e6 24 56 5c e6 40 99 | 8b 09 81 82 27 99 96 55 ae 30 73 4e 23 e9 a5 45 | d0 57 f8 f9 3b 6c 05 9a 46 78 7d b3 62 a4 ed 17 | 2e 15 c3 a2 7d 0c 1c 89 e1 68 08 b6 03 09 76 f8 | 29 00 00 24 11 0e 4a cd 20 fc ce 84 68 c7 a8 ec | 48 5c fe b5 ee 21 2d ef c1 3f a3 a1 30 c1 c0 88 | b1 78 03 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 fb 47 16 eb 64 05 e3 af e5 70 ee | b4 39 fc 1b 30 12 e4 0b 00 00 00 1c 00 00 40 05 | d8 e1 2e 80 87 77 be 81 c0 a4 a8 f5 fc 15 8f 58 | 08 dc e4 8d | libevent_free: release ptr-libevent@0x7fb36c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad43c0 | #387 spent 0.0991 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 6e e5 e5 6a cd b8 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #387 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #387 | rejected packet: | 75 6e e5 e5 6a cd b8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #387: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #365 | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #365 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #365 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49675.724951; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00294 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad43c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #365 | libevent_malloc: new ptr-libevent@0x7fb36c04b7c0 size 128 "road-eastnet-nonat-113" #365: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #365) | 85 67 19 58 d7 3c f0 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 c9 07 e2 a7 25 a6 09 ab 7f e9 5d 7e 7f 47 e1 | 9f 44 d1 91 14 4d 9b 8f 5d 22 2a 52 a8 98 ff b2 | 6b 6a b0 36 7f fd 95 da a0 25 8f 6e 16 7f 04 38 | 86 c2 bd 33 bf fc a5 26 c4 b6 f6 70 3e fd c6 4a | 25 c8 b3 a8 9f a8 44 89 83 a1 8c aa b8 af 7f e3 | 16 bb 17 56 79 89 e8 f0 01 49 b8 07 c4 c2 fd 27 | 4f 8e 62 66 4b 11 2b 01 9f f2 8c 2a 44 d1 a6 b0 | 37 65 5b 66 a4 8d e5 2d a7 91 fd e3 72 91 ef 62 | 52 0e c8 e1 f3 04 05 43 a3 3a 3c 61 1b d7 eb bd | 6b 38 06 f9 ff f3 a7 b2 e7 89 6b 9c da 79 fc be | 85 2e 71 9d 7f 61 aa 1d 41 bd c5 f4 78 4a e7 2c | 3d fa 74 f7 ca 33 00 f8 ee a6 a8 8a 16 63 2d 1b | 61 9d fa 4c a8 ca 3a 31 b1 cd 60 8d cb 56 88 b6 | 81 05 15 ed cf 3d b4 c9 19 7e d9 8d 29 23 d3 64 | ec 0b 35 05 39 3b e0 f1 75 19 f5 f3 4f 99 e8 61 | bd bd 06 53 be 50 6f 6a cb bc 2d c6 18 e6 53 b2 | 29 00 00 24 e5 25 b4 c0 9c 12 3e 53 68 a2 43 fb | 88 db 47 7b b4 96 4d ec 31 20 f7 c3 1c a9 eb e1 | 62 8a 8b 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 90 3b 10 25 ca fe 1f 3b 58 67 93 fa | 3d a3 98 00 cc 36 84 a7 00 00 00 1c 00 00 40 05 | 55 c6 52 e3 aa aa 60 c0 64 26 bb 2b 79 4e a4 42 | 73 1e 76 57 | libevent_free: release ptr-libevent@0x7fb3700300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #365 spent 0.0912 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 67 19 58 d7 3c f0 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #365 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #365 | rejected packet: | 85 67 19 58 d7 3c f0 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #365: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0764 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338012bf0 | handling event EVENT_RETRANSMIT for parent state #380 | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #380 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #380 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49675.748234; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002056 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #380 | libevent_malloc: new ptr-libevent@0x7fb3700300e0 size 128 "road-eastnet-nonat-128" #380: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #380) | 8c 85 b9 1f be 6e 3d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 1e de d9 e8 4b 77 f1 86 35 82 03 5f ce 7b cb | 0a c9 87 87 aa 3a 74 01 02 fc e1 64 e0 07 7c 06 | dd ed c8 68 23 d7 e1 98 d6 47 ab 77 d0 38 d7 b3 | 2e d4 c4 52 2d e3 2c bc 34 35 8e 16 9e 83 9d 76 | 9f cc 43 a2 24 c5 ff 0f ed 32 bf e5 c9 3b bb e7 | a4 cc 2a 54 79 4f 13 6e 29 6d 75 36 6c 87 01 9c | 1f e0 d3 9f 4c c1 24 b9 2b d8 7b fa 2a d1 70 cc | f1 73 67 12 91 0a 83 03 b6 96 60 5a f8 fb a0 1a | 92 b6 0c fb e9 77 6e a8 e9 d4 02 be 0d 82 27 ba | 20 48 7d ed 5d 31 52 4a 59 63 6f 7e c4 3e 2e ac | 5e 97 a4 c4 d3 ae 3d fa a4 3b fb c2 de b4 5c 6c | f2 4a 19 f4 47 5a 00 3f 78 e7 bc 36 32 f4 d0 ce | 7c 2d 58 ca fa c4 cc 95 9e a4 78 b5 2d fd 23 cb | 2a 9d bc 7a 8a bb 88 97 8b fb 82 e5 e3 af 23 95 | 4e ed 5d 7c 45 af c0 e7 bb 20 cb e5 da 63 b4 54 | a8 b6 35 4f 40 f2 02 b1 8a 9f 38 00 e7 8b 27 93 | 29 00 00 24 e9 59 12 f8 16 a7 9f df 69 ae 67 26 | 7d 68 3d f0 e8 95 32 e5 ac 44 49 ce 96 5b 71 84 | 56 84 ec f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 47 26 04 c2 b4 0a 38 20 0b c5 38 | 8f 45 ae 49 d1 6f dd cf 00 00 00 1c 00 00 40 05 | 48 d9 a4 21 0f e8 6e ab 23 f4 84 7b 2a 45 72 13 | eb 6b 5f 3a | libevent_free: release ptr-libevent@0x7fb35003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338012bf0 | #380 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb380015720 | handling event EVENT_RETRANSMIT for parent state #342 | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #342 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #342 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49675.748404; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003138 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338012bf0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #342 | libevent_malloc: new ptr-libevent@0x7fb35003b0b0 size 128 "road-eastnet-nonat-90" #342: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #342) | 92 0e 5c 44 35 6f 61 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 4b 3f 50 56 cd 4f c8 69 53 e3 02 d0 e2 c4 4b | b8 26 12 0d 2f 95 d4 df 65 d2 22 1d a5 8a 76 36 | 0f 44 f3 88 67 5b a4 93 af 87 fb e7 03 3d f3 3d | ce 49 25 06 46 21 51 fe e6 a5 e0 3f 25 17 b0 d7 | 71 9b 71 32 36 21 5f b7 2a ee 25 9c 8a 04 76 c2 | 55 e4 ab 4e 7c 02 05 d1 d2 21 09 a2 51 a4 92 f0 | 79 2b 73 03 6e bc d5 33 3d 90 f5 1b b7 cb cd e9 | 74 b4 08 87 c4 a4 7c ab 86 b2 e8 fe f3 2e a7 14 | da 5c 13 a2 0a 83 be 25 a6 25 48 21 ec 98 11 c6 | 1d 49 83 e7 e3 39 34 26 fb d4 24 cb d2 66 1f a9 | 8b 7b 97 28 60 bf e3 df fc be 83 7a 91 a4 90 3a | af ad 2d 44 70 c8 0c 11 ab e1 87 f9 88 5b 04 d8 | 04 03 d4 08 d3 e9 32 2b 30 9c 93 90 d3 62 4a 73 | df 00 65 61 53 f7 33 9c 73 ad fe 53 5a 29 aa 93 | da 76 97 14 51 4b d0 f8 fb 54 f6 6e 4f 99 ad 4b | 75 e5 97 56 5f 2e 08 fb ed 71 37 6a 4a ad d6 62 | 29 00 00 24 02 01 86 b0 0f 40 c1 16 7f df 21 87 | ce a9 58 2f 27 7b 28 e0 c6 1c d2 35 82 80 ac e4 | ab 80 e7 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 56 62 15 04 08 91 44 63 ec 81 3e 0b | 9f 8e c8 3c d5 eb af f0 00 00 00 1c 00 00 40 05 | 60 c3 81 cb a9 a6 9e ac 92 76 43 f4 51 0d 3b 6e | 52 02 3f 95 | libevent_free: release ptr-libevent@0x7fb378046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380015720 | #342 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c 85 b9 1f be 6e 3d 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #380 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #380 | rejected packet: | 8c 85 b9 1f be 6e 3d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #380: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 0e 5c 44 35 6f 61 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #342 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #342 | rejected packet: | 92 0e 5c 44 35 6f 61 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #342: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0543 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0a940 | handling event EVENT_RETRANSMIT for parent state #143 | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #143 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #143 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49675.754729; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.012578 exceeds limit? YES "road-eastnet-nonat-143" #143: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-143" #143: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #395 at 0x557d46a965c0 | State DB: adding IKEv2 state #395 in UNDEFINED | pstats #395 ikev2.ike started | Message ID: init #395: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #395: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #395; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-143" #395: initiating v2 parent SA to replace #143 | using existing local IKE proposals for connection road-eastnet-nonat-143 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 395 for state #395 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb380015720 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #395 | libevent_malloc: new ptr-libevent@0x7fb378046040 size 128 | #395 spent 0.087 milliseconds in ikev2_parent_outI1() | RESET processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #143 ikev2.ike failed too-many-retransmits | crypto helper 18 resuming | crypto helper 18 starting work-order 395 for state #395 | pstats #143 ikev2.ike deleted too-many-retransmits | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 395 | #143 spent 2.64 milliseconds in total | [RE]START processing: state #143 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-143" #143: deleting state (STATE_PARENT_I1) aged 64.014s and NOT sending notification | parent state #143: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #143 "road-eastnet-nonat-143" #143: deleting IKE SA for connection 'road-eastnet-nonat-143' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-143' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-143 | State DB: deleting IKEv2 state #143 in PARENT_I1 | parent state #143: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #143 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb35c046040 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 395 time elapsed 0.000585 seconds | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0a940 | in statetime_stop() and could not find #143 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#395) spent 0.594 milliseconds in crypto helper computing work-order 395: ikev2_outI1 KE (pcr) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-143 which received a Delete/Notify but must remain up per local policy | crypto helper 18 sending results from work-order 395 for state #395 to event queue | scheduling resume sending helper answer for #395 | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7fb354023e30 size 128 | crypto helper 18 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-143" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-143' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-143" | stop processing: connection "road-eastnet-nonat-143" (in initiate_a_connection() at initiate.c:349) | spent 0.0744 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #395 | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 395 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #395 | **emit ISAKMP Message: | initiator cookie: | ba 7b 3c 0c 6c 47 ed ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-143 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 88 4c 55 7e d1 a2 38 a3 4d 34 44 bf 98 52 f4 22 | ikev2 g^x 2b 2e d7 52 9d e2 60 32 f1 e9 de 11 e6 81 90 27 | ikev2 g^x 7f aa b4 cd 92 c7 cc 0a 99 86 49 e0 e9 e5 7f c7 | ikev2 g^x 53 00 84 30 c4 2b a1 40 94 2b e5 13 32 e0 cc 77 | ikev2 g^x 9f 67 6c cf 30 e7 4a c4 94 da 5f 5f 42 9a ce 83 | ikev2 g^x 94 65 21 10 2f c8 9d e9 90 7c c8 a2 24 10 5f eb | ikev2 g^x b7 e4 01 18 df 72 f4 7a bb ab 13 f9 5e 78 3b bb | ikev2 g^x fa c9 e1 75 55 1d c1 7d 77 9c f5 dd 9c f1 6d cf | ikev2 g^x 64 15 f4 f8 06 12 d8 2b 76 e9 8f 68 61 57 5e f9 | ikev2 g^x ce b7 25 0f 70 50 5b 08 f7 40 3f 01 f6 b5 a6 1b | ikev2 g^x 6a b5 fe b6 73 a7 04 b2 74 dc 3e 4a 46 a2 06 81 | ikev2 g^x 11 ce 3e 21 33 d9 a8 2a ee 54 b5 69 d8 57 77 1f | ikev2 g^x dc ec 39 32 06 54 92 6d 8f 0a ca d2 fd fd bd fb | ikev2 g^x 1b 7c 6a b6 6b 55 6f cb c2 b7 b7 fb e7 79 1c 7d | ikev2 g^x c3 44 5b 72 2c bc 4f 59 92 b8 bc 2a d4 d1 be 0f | ikev2 g^x 33 95 9e 53 f7 bf 90 2f bf b1 8e 5f 51 a1 8b aa | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce bd 0e 20 29 4b d5 e3 ae 9c 68 67 e1 41 5b 48 5c | IKEv2 nonce 33 08 9f 5c 1f 4f 9e 6e c3 72 5b 33 2c ad 1f 1a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ba 7b 3c 0c 6c 47 ed ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8f | natd_hash: port= 01 f4 | natd_hash: hash= b1 4d 21 6f 15 00 d4 49 f9 94 84 2e 85 71 98 cf | natd_hash: hash= 82 ff b0 a3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b1 4d 21 6f 15 00 d4 49 f9 94 84 2e 85 71 98 cf | Notify data 82 ff b0 a3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ba 7b 3c 0c 6c 47 ed ae | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 8a 38 a6 07 76 28 82 e1 53 d4 45 b3 59 f3 34 be | natd_hash: hash= 83 20 f5 6d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8a 38 a6 07 76 28 82 e1 53 d4 45 b3 59 f3 34 be | Notify data 83 20 f5 6d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #395 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #395: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #395 to 4294967295 after switching state | Message ID: IKE #395 skipping update_recv as MD is fake | Message ID: sent #395 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-143" #395: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.143:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #395) | ba 7b 3c 0c 6c 47 ed ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 88 4c 55 7e d1 a2 38 a3 4d 34 44 bf 98 52 f4 22 | 2b 2e d7 52 9d e2 60 32 f1 e9 de 11 e6 81 90 27 | 7f aa b4 cd 92 c7 cc 0a 99 86 49 e0 e9 e5 7f c7 | 53 00 84 30 c4 2b a1 40 94 2b e5 13 32 e0 cc 77 | 9f 67 6c cf 30 e7 4a c4 94 da 5f 5f 42 9a ce 83 | 94 65 21 10 2f c8 9d e9 90 7c c8 a2 24 10 5f eb | b7 e4 01 18 df 72 f4 7a bb ab 13 f9 5e 78 3b bb | fa c9 e1 75 55 1d c1 7d 77 9c f5 dd 9c f1 6d cf | 64 15 f4 f8 06 12 d8 2b 76 e9 8f 68 61 57 5e f9 | ce b7 25 0f 70 50 5b 08 f7 40 3f 01 f6 b5 a6 1b | 6a b5 fe b6 73 a7 04 b2 74 dc 3e 4a 46 a2 06 81 | 11 ce 3e 21 33 d9 a8 2a ee 54 b5 69 d8 57 77 1f | dc ec 39 32 06 54 92 6d 8f 0a ca d2 fd fd bd fb | 1b 7c 6a b6 6b 55 6f cb c2 b7 b7 fb e7 79 1c 7d | c3 44 5b 72 2c bc 4f 59 92 b8 bc 2a d4 d1 be 0f | 33 95 9e 53 f7 bf 90 2f bf b1 8e 5f 51 a1 8b aa | 29 00 00 24 bd 0e 20 29 4b d5 e3 ae 9c 68 67 e1 | 41 5b 48 5c 33 08 9f 5c 1f 4f 9e 6e c3 72 5b 33 | 2c ad 1f 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b1 4d 21 6f 15 00 d4 49 f9 94 84 2e | 85 71 98 cf 82 ff b0 a3 00 00 00 1c 00 00 40 05 | 8a 38 a6 07 76 28 82 e1 53 d4 45 b3 59 f3 34 be | 83 20 f5 6d | state #395 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb378046040 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb380015720 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0a940 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #395 | libevent_malloc: new ptr-libevent@0x7fb35c046040 size 128 | #395 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49675.756106 | resume sending helper answer for #395 suppresed complete_v2_state_transition() and stole MD | #395 spent 0.478 milliseconds in resume sending helper answer | stop processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb354023e30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 7b 3c 0c 6c 47 ed ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #395 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #395 | rejected packet: | ba 7b 3c 0c 6c 47 ed ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8f fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #395: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0578 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3800383c0 | handling event EVENT_RETRANSMIT for parent state #287 | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #287 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #287 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49675.76028; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004554 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400cc10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #287 | libevent_malloc: new ptr-libevent@0x7fb354023e30 size 128 "road-eastnet-nonat-35" #287: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #287) | 50 65 03 a0 08 b6 fa f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e c0 75 39 cf 17 11 31 32 ce 73 1e 64 99 bc f2 | 7f 98 bb e8 80 c2 38 47 74 80 17 bf 6d 41 27 75 | 39 62 b9 71 ae 1a 47 19 83 cd 81 c0 c8 3d 11 61 | bb 8a a5 d6 29 bd 01 7d f4 ca 44 6d 69 e4 8a 69 | a7 cc 95 e2 b5 6b 25 ca 57 eb 58 2b 4d 53 44 df | 33 8c 6f 33 81 90 ab 83 53 f5 4e 38 ab 63 7b 68 | f5 e4 10 b1 02 5a b6 e7 d6 07 bf 37 24 09 70 4b | bc 69 6e bc 79 b8 a5 58 fa 3b e4 57 c6 64 3b 30 | 47 47 bf b7 ad 67 14 cd 0a eb 04 a2 61 54 d3 a6 | 12 98 21 de 78 b3 bb b5 ae 98 e3 4e 86 f6 80 ab | 82 7f f6 f8 ef c2 b3 23 41 0b ad f4 1d 15 a3 d0 | bf fe 7d f5 bb 15 19 74 8e f2 b9 4c 77 84 ef 53 | 7c be 1b be 09 20 be 00 d9 ce 47 ea 9d 1e 79 80 | e6 b0 92 f0 11 bf e8 8c fd 97 bb 02 bf 46 b7 fa | 29 38 a8 9a ba d7 d1 99 c1 56 93 83 a6 04 d2 fc | 1b 5a ee 22 cc c4 78 02 0c 67 9c 0f 51 14 b2 6f | 29 00 00 24 82 dd 74 7a ae e7 29 d0 0c 9c 0c 72 | 8c 59 8b ec 3e a7 b7 92 7c 72 73 9c 73 da ee 57 | 06 e2 80 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 92 a1 ec 2f 80 2a 27 61 6c 7b 0f | 4c 73 2b 71 f0 03 c4 ea 00 00 00 1c 00 00 40 05 | 71 9b 20 c5 40 26 cd 9d eb 7f a3 62 71 86 bd 52 | 4f c4 9f f6 | libevent_free: release ptr-libevent@0x7fb38000c460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800383c0 | #287 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 65 03 a0 08 b6 fa f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #287 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #287 | rejected packet: | 50 65 03 a0 08 b6 fa f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #287: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #388 | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #388 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #388 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49675.782572; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500011 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800383c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #388 | libevent_malloc: new ptr-libevent@0x7fb38000c460 size 128 "road-eastnet-nonat-136" #388: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #388) | f7 ff cf 56 0b 2d 32 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 17 f0 4b b8 d6 41 9d bc 4a 96 2e 42 ab 77 4e | 7f 54 60 13 56 59 15 20 fc c4 79 98 ae 8f e2 06 | 69 79 8f 5d 63 48 c3 bc 00 b2 f8 7b 8f f4 4d a0 | 8c a9 81 52 3e 4a c4 f8 92 22 05 f0 4d e8 83 0e | f0 26 c0 2c 43 f9 88 43 07 5f 25 9e 50 b5 11 c3 | 73 c8 0e 1f 5c 85 88 1c fc e4 6e f2 9c 07 04 d2 | 2d 14 31 25 c7 f1 fa 00 27 db 06 87 f8 4d 48 60 | a2 9b c5 9a 24 e6 5c 8b 88 aa 13 bf 0e 45 97 1c | aa fb ea 7f ee 38 9d c2 3b dc ac 73 ba e2 2c 03 | 3d dd 91 b1 96 88 2a b1 4e a5 10 5e fe 8f b7 60 | 27 7f 42 c9 c1 97 c4 03 be 93 ba 66 8c 91 b1 77 | 12 50 ef a2 c9 9b f5 15 0b 50 4a dc c3 9e 64 d1 | d8 0c c9 6c 86 d8 1a 40 d2 c3 48 bc 8a 19 fb 47 | d3 3d 4c 63 67 3a 9b 43 54 08 5f 36 9c 29 c6 ed | 7a c1 fa 3a 70 4b f1 9d 3d f8 73 d3 02 37 8f 1c | 0a e4 74 d1 b8 f7 7d a3 cc 04 0d cc 02 1c 9d d7 | 29 00 00 24 d2 a6 cd 06 28 a1 fe ae 1b 89 a2 1d | a1 4a 61 12 14 72 44 a4 a4 a5 e9 38 f2 78 91 07 | 4b 1e 98 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 fc fe 8e 48 65 14 18 f3 7c 80 1c | c9 89 2e 09 96 5d 2c 3e 00 00 00 1c 00 00 40 05 | 5e 49 cb 06 a1 a8 89 d0 e9 f4 c7 34 ac a2 e0 5c | 40 ed 0b 80 | libevent_free: release ptr-libevent@0x7fb34c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | #388 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 ff cf 56 0b 2d 32 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #388 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #388 | rejected packet: | f7 ff cf 56 0b 2d 32 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #388: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0503 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #366 | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #366 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #366 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49675.786885; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002765 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #366 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 "road-eastnet-nonat-114" #366: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #366) | 3c e6 10 56 de c7 50 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 fc d0 2b 58 ad f1 9a aa 82 c0 57 ae f0 46 70 | a2 7b 22 23 65 30 fe 9c 0d f5 dc 40 c0 ca 9d ee | 6e 66 1d 3a 72 fe dc 88 4a 26 55 69 91 41 bf 12 | 90 50 78 9a 3c 37 7a d2 58 65 01 98 28 27 ba 6d | 00 33 b4 2e 8f 98 78 f3 cd 21 f0 18 dd 51 cb 68 | 4f 92 9d 38 c4 06 c1 6c cf 60 41 a1 18 22 f2 93 | 34 0c 55 d7 b5 30 6c c4 9c ad 0a aa 9b 11 9f 59 | 49 ac e6 72 dc 82 61 fc 42 ea d8 0b 5d 7d f2 47 | 0f e6 10 b9 1d c6 85 40 80 3f b3 ee 0f dc 82 fa | 53 40 f0 d9 23 6a 65 60 f3 d7 02 47 6c 0a 6f 61 | 8d 04 17 7d 94 9e 17 80 39 4f b5 db 2d a0 f8 02 | 18 21 68 7d 0e af 20 98 75 39 40 4d 5d 87 d7 7b | 4c 39 3b 20 a9 65 05 04 46 a1 49 0b d9 6d 8f 15 | 4f b4 23 1a 8e 5f 27 66 f0 b0 a6 bd 48 dc 96 c2 | 77 e2 b0 72 b6 2c 19 2f 16 65 ef 29 dd a3 4a de | 9a 82 38 c8 cb 37 99 80 5e bb 4b 53 97 7b f3 fa | 29 00 00 24 7a ad 39 64 9f ec c1 f8 33 94 44 40 | f7 c9 dd b2 6b e5 21 16 26 39 73 9d cd 0b f5 7a | f4 93 09 bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 12 7d c7 e4 80 f6 ae d0 f3 0f 94 | c9 99 cc 19 2a ad fe 8d 00 00 00 1c 00 00 40 05 | 84 74 fa e2 ee 48 6b 8a 7f a7 09 f6 4e 00 6d 26 | 52 0f f6 08 | libevent_free: release ptr-libevent@0x7fb3540300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #366 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c e6 10 56 de c7 50 ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #366 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #366 | rejected packet: | 3c e6 10 56 de c7 50 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #366: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3840223f0 | handling event EVENT_RETRANSMIT for parent state #288 | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #288 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #288 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49675.824117; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005476 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #288 | libevent_malloc: new ptr-libevent@0x7fb3540300e0 size 128 "road-eastnet-nonat-36" #288: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #288) | bf 5c b8 9a ac cd 00 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e dd 69 c1 03 95 4d 9d ab 37 9e bd 4e 38 ec e5 | f2 39 ed 30 ab 4f b4 af 21 e6 29 da a0 8f 8f e9 | 98 9a 5c 5c fe fe ce 8c 1e 28 6b bd f2 27 35 da | c4 21 0a d8 6a ca c2 98 92 8e 38 38 a2 a7 6b ba | 5f d2 6c ce e3 9f f3 13 3d ec 78 7e f5 b7 1e b1 | c9 c9 b0 04 f7 e8 40 14 e7 76 0c 5b a9 d0 33 de | 38 f0 55 f2 f8 c3 51 4e 26 12 33 85 1a 59 5d 06 | e7 63 42 d3 d5 d3 89 6c 22 47 f2 98 c6 f4 da 55 | 13 a9 2a 55 81 33 8b eb 87 ee 13 8e 33 aa a8 42 | 9f da b4 47 d8 37 6a 92 68 90 c1 81 a0 df a1 37 | a4 78 f7 b3 8d d2 2d ce a0 c9 68 dd 56 89 c4 d1 | 63 8d aa 71 1f 08 79 a0 6d 66 a0 3e 16 15 54 65 | d5 46 20 67 d9 5b 61 9c 6a 83 fc f8 ba b1 78 4c | 57 19 a7 94 fa 72 b9 cd d4 1a e2 8c ec 18 65 32 | 0a 6f a6 9d 17 41 ad c3 33 be e4 df 39 be bb 83 | 36 2c fd e8 5d 07 b2 3e e4 4e 6e 8c 65 67 24 e6 | 29 00 00 24 6b 44 05 03 68 15 67 d5 e0 ba b2 f4 | 3c 29 af e5 83 d8 9f ee 30 22 ac b5 c3 ee cd df | dc 79 2d 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 39 d5 43 71 fe 6f b5 ee bc 1b f9 | 48 2a ac fe 4d 86 a5 da 00 00 00 1c 00 00 40 05 | f7 70 11 42 70 0c d7 f2 22 65 12 cb b8 c3 7c 30 | 56 c5 c0 c0 | libevent_free: release ptr-libevent@0x7fb38401cc10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840223f0 | #288 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 5c b8 9a ac cd 00 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #288 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #288 | rejected packet: | bf 5c b8 9a ac cd 00 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #288: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0699 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350005860 | handling event EVENT_RETRANSMIT for parent state #343 | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #343 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #343 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49675.827482; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00399 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840223f0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #343 | libevent_malloc: new ptr-libevent@0x7fb38401cc10 size 128 "road-eastnet-nonat-91" #343: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #343) | ae 78 c6 a9 8f e8 66 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 9d b8 ed 06 43 12 ec 4c 45 2d d2 98 f8 e4 c2 | 36 59 63 a7 5a 33 ff 67 e3 f9 f4 1f 01 a9 3a 4c | 55 90 c8 83 a0 29 a8 aa 4f ac db f2 6f 11 94 39 | df dd ed a8 03 f3 60 cc f4 5f c8 16 76 2c 18 b3 | 52 5b 1b ac 7a 46 b0 6c 28 af 43 e8 e9 1f 42 2d | 46 d8 e4 d3 78 66 14 97 ce c1 cd 0c 3c 65 65 46 | 46 82 84 7e d0 a7 70 e0 17 0f db 9a 4e 29 93 92 | 21 22 73 35 c9 ca 2f af 9d 0a 64 5c 81 08 63 7f | e9 bd 70 7e 9e c2 db 6e 8e 2d a9 2d 3d e8 0e 81 | cf 97 9f 13 45 5f d0 17 a5 46 81 8f f6 9c 9c dd | 6d 72 b6 df 14 55 64 61 52 e1 4b 46 36 b7 06 8a | 6d 94 56 ae f7 f9 54 fa 14 95 61 ab b8 b6 ec c3 | e8 2c f9 02 e7 ab 10 28 9e 67 38 42 93 d6 89 7e | bb 6a dc 83 42 00 3f 72 de b7 9e 71 be 55 39 21 | 54 8b a5 97 b3 b2 06 f8 5f 7f 26 67 9a c1 3f 7e | 51 39 34 0f ac 86 ce 7b e6 99 54 4b 79 6e 8f 0a | 29 00 00 24 65 6f dc 77 c3 29 54 5a 74 6e 49 3d | 05 2a fe cf 26 c9 29 fa f4 9d 54 09 a5 a6 15 69 | 11 b4 0e 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 ad 81 e7 cf f7 25 7c 0f 5a 2a 07 | aa 17 3c 2f 54 ca c3 2d 00 00 00 1c 00 00 40 05 | 5d 1d e0 9d fe 43 fa fd 70 69 f4 3c 05 77 9a 1e | 38 96 d9 39 | libevent_free: release ptr-libevent@0x7fb344008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350005860 | #343 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 78 c6 a9 8f e8 66 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #343 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #343 | rejected packet: | ae 78 c6 a9 8f e8 66 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #343: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf10 | handling event EVENT_RETRANSMIT for parent state #144 | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #144 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #144 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49675.83183; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007247 exceeds limit? YES "road-eastnet-nonat-144" #144: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-144" #144: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #396 at 0x557d46a97b80 | State DB: adding IKEv2 state #396 in UNDEFINED | pstats #396 ikev2.ike started | Message ID: init #396: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #396: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #396; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-144" #396: initiating v2 parent SA to replace #144 | using existing local IKE proposals for connection road-eastnet-nonat-144 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 396 for state #396 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb350005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #396 | libevent_malloc: new ptr-libevent@0x7fb344008e30 size 128 | #396 spent 0.094 milliseconds in ikev2_parent_outI1() | RESET processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #144 ikev2.ike failed too-many-retransmits | pstats #144 ikev2.ike deleted too-many-retransmits | #144 spent 2.24 milliseconds in total | [RE]START processing: state #144 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-144" #144: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #144: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #144 "road-eastnet-nonat-144" #144: deleting IKE SA for connection 'road-eastnet-nonat-144' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-144' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-144 | State DB: deleting IKEv2 state #144 in PARENT_I1 | parent state #144: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #144 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb34401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf10 | in statetime_stop() and could not find #144 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-144 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 7 resuming | crypto helper 7 starting work-order 396 for state #396 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 396 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 396 time elapsed 0.000859 seconds | (#396) spent 0.865 milliseconds in crypto helper computing work-order 396: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 396 for state #396 to event queue | scheduling resume sending helper answer for #396 | libevent_malloc: new ptr-libevent@0x7fb348023e80 size 128 | crypto helper 7 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-144" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-144' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-144" | stop processing: connection "road-eastnet-nonat-144" (in initiate_a_connection() at initiate.c:349) | spent 0.0858 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #396 | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 396 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #396 | **emit ISAKMP Message: | initiator cookie: | 34 3a ea ba b4 d5 c3 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-144 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 20 b3 5e a9 7f 93 97 83 00 ac b3 90 fb e7 f1 78 | ikev2 g^x 95 aa f1 ba 36 2b 6d a3 37 11 74 f8 88 50 3b b9 | ikev2 g^x 5f 0f a0 79 72 f7 39 e7 3a 2c a8 e0 53 9b be fd | ikev2 g^x fc bd 96 c1 32 d9 24 ce f7 06 60 ff b3 43 45 a6 | ikev2 g^x 24 b9 a3 f5 cb 0e b9 aa aa 8e 8f d1 f4 f2 6e c0 | ikev2 g^x 2d cf 97 8a 96 4c c9 d9 fa 9b b2 4f 23 e7 4e 04 | ikev2 g^x 32 38 36 77 bf 5c cc 5e 9d b8 9a 89 95 85 a0 cd | ikev2 g^x 38 05 64 bb 18 47 79 4a 9e e0 36 97 2c 58 a9 ca | ikev2 g^x 05 7e fc 24 b9 aa 44 5a 5a 1a 01 53 4f 6b 25 9c | ikev2 g^x 0b 57 f1 a9 6c 20 f6 40 eb 60 95 56 91 d3 93 3b | ikev2 g^x e3 6f 55 d6 2d 80 8e 1b 25 11 49 ca e7 6a 57 76 | ikev2 g^x 46 38 51 f8 26 5f df d7 e7 dc 81 fb 26 f9 44 9d | ikev2 g^x 73 c6 16 4c 9f 24 d8 42 a4 b9 bf 36 76 cf 2d c1 | ikev2 g^x 81 f5 6e 1c 27 05 14 9e 74 b9 a7 24 89 53 2b 8a | ikev2 g^x e5 d2 6e 23 b8 62 43 c8 68 d3 55 8e 35 2d 54 67 | ikev2 g^x 77 ed 1c 39 ec 49 32 f8 1f c9 68 6b 34 67 a6 5c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 70 3a 86 3e 59 bb d0 ee e5 b9 db 1d c8 9a e2 55 | IKEv2 nonce 5b 79 c1 c3 66 32 3d 49 47 3b f1 44 bc b6 4a ae | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 34 3a ea ba b4 d5 c3 ec | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 90 | natd_hash: port= 01 f4 | natd_hash: hash= 53 b0 29 ea 4a 03 79 05 a6 d6 5d 03 24 78 07 cd | natd_hash: hash= 73 8e b4 4c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 53 b0 29 ea 4a 03 79 05 a6 d6 5d 03 24 78 07 cd | Notify data 73 8e b4 4c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 34 3a ea ba b4 d5 c3 ec | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= cb 86 b2 db 9b fe 49 fd e2 3b b4 79 c3 f9 fd 58 | natd_hash: hash= 79 48 29 02 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cb 86 b2 db 9b fe 49 fd e2 3b b4 79 c3 f9 fd 58 | Notify data 79 48 29 02 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #396 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #396: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #396 to 4294967295 after switching state | Message ID: IKE #396 skipping update_recv as MD is fake | Message ID: sent #396 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-144" #396: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.144:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #396) | 34 3a ea ba b4 d5 c3 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 b3 5e a9 7f 93 97 83 00 ac b3 90 fb e7 f1 78 | 95 aa f1 ba 36 2b 6d a3 37 11 74 f8 88 50 3b b9 | 5f 0f a0 79 72 f7 39 e7 3a 2c a8 e0 53 9b be fd | fc bd 96 c1 32 d9 24 ce f7 06 60 ff b3 43 45 a6 | 24 b9 a3 f5 cb 0e b9 aa aa 8e 8f d1 f4 f2 6e c0 | 2d cf 97 8a 96 4c c9 d9 fa 9b b2 4f 23 e7 4e 04 | 32 38 36 77 bf 5c cc 5e 9d b8 9a 89 95 85 a0 cd | 38 05 64 bb 18 47 79 4a 9e e0 36 97 2c 58 a9 ca | 05 7e fc 24 b9 aa 44 5a 5a 1a 01 53 4f 6b 25 9c | 0b 57 f1 a9 6c 20 f6 40 eb 60 95 56 91 d3 93 3b | e3 6f 55 d6 2d 80 8e 1b 25 11 49 ca e7 6a 57 76 | 46 38 51 f8 26 5f df d7 e7 dc 81 fb 26 f9 44 9d | 73 c6 16 4c 9f 24 d8 42 a4 b9 bf 36 76 cf 2d c1 | 81 f5 6e 1c 27 05 14 9e 74 b9 a7 24 89 53 2b 8a | e5 d2 6e 23 b8 62 43 c8 68 d3 55 8e 35 2d 54 67 | 77 ed 1c 39 ec 49 32 f8 1f c9 68 6b 34 67 a6 5c | 29 00 00 24 70 3a 86 3e 59 bb d0 ee e5 b9 db 1d | c8 9a e2 55 5b 79 c1 c3 66 32 3d 49 47 3b f1 44 | bc b6 4a ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 b0 29 ea 4a 03 79 05 a6 d6 5d 03 | 24 78 07 cd 73 8e b4 4c 00 00 00 1c 00 00 40 05 | cb 86 b2 db 9b fe 49 fd e2 3b b4 79 c3 f9 fd 58 | 79 48 29 02 | state #396 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344008e30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb350005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #396 | libevent_malloc: new ptr-libevent@0x7fb34401d920 size 128 | #396 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49675.833662 | resume sending helper answer for #396 suppresed complete_v2_state_transition() and stole MD | #396 spent 0.484 milliseconds in resume sending helper answer | stop processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb348023e80 | timer_event_cb: processing event@0x557d46a86b80 | handling event EVENT_RETRANSMIT for parent state #381 | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #381 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #381 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49675.833711; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002174 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #381 | libevent_malloc: new ptr-libevent@0x7fb348023e80 size 128 "road-eastnet-nonat-129" #381: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #381) | 1e fb 19 74 69 81 f6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 15 4d 3c 26 b9 8e 71 c8 4c 65 3c 93 c4 f8 5c | 0c 69 48 07 1f b0 40 db 39 45 4f 12 5d b7 64 ce | f6 36 76 d1 4f f2 c3 d5 d1 3f c7 4e dd 69 ef bd | 2e 06 de 7f fb 43 32 b5 94 31 7c 96 1c 09 3c 05 | c9 f9 e9 6e f6 32 3d b2 3f 7a 40 e8 05 db 42 df | 50 a9 3b 1b be f2 2b d2 43 70 99 24 25 7e b9 8b | 88 12 28 70 28 9b b9 5b b0 6d 48 da 44 23 6b 4d | 59 ff ee 67 e5 c7 db c0 7c 7f a2 4b 21 92 3a a1 | fd 14 25 80 1a 91 48 40 e9 5b 63 e7 84 7c b3 99 | 02 c6 5d 6d b6 28 24 98 77 5e dc c9 be 98 c3 d6 | b6 bc 7a bf 31 81 8d c7 ba a9 27 81 82 5a 2f b7 | 23 3d 16 95 ba b5 4a 07 29 09 4c 3e c5 38 81 20 | 6c 0f d0 d6 67 62 46 f9 bc 6b c6 8e 7d a5 ce 50 | f1 0f 9a 64 d5 01 da 1f 72 e3 1b 16 9a ec 02 45 | ef 03 20 b4 4d cb ac e4 80 48 13 be cc c9 5e 11 | 9a f4 a2 21 ee 6b 6d 92 17 77 1f 86 a2 bd ac 89 | 29 00 00 24 5b c1 91 12 e1 44 84 05 fe aa f1 fc | b1 6d 8f ce 01 29 aa f2 75 b6 aa e9 3c cb db 81 | 72 99 63 d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 78 cd 6f 27 81 4c 4a f4 57 06 82 | fb 0a 60 ad 54 dd e0 6c 00 00 00 1c 00 00 40 05 | 73 d8 f7 cb c0 0b a5 77 76 9f 97 28 b6 7f a1 0e | 85 3a 80 ee | libevent_free: release ptr-libevent@0x7fb35401a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a86b80 | #381 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 3a ea ba b4 d5 c3 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #396 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #396 | rejected packet: | 34 3a ea ba b4 d5 c3 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #396: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0582 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e fb 19 74 69 81 f6 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #381 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #381 | rejected packet: | 1e fb 19 74 69 81 f6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #381: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.053 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11640 | handling event EVENT_RETRANSMIT for parent state #367 | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #367 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #367 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49675.848084; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003225 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a86b80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #367 | libevent_malloc: new ptr-libevent@0x7fb35401a4e0 size 128 "road-eastnet-nonat-115" #367: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #367) | 4a 87 68 98 60 e9 4c f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 0c 97 07 ab 60 f0 87 17 3b e3 ad e6 c0 a4 f8 | bc d0 84 fc 55 d2 65 d6 9f 46 ab 63 b9 cd 86 a7 | 92 52 2d 61 57 c8 33 96 bd 3f e7 29 4c c0 56 81 | 07 2c a6 2e b4 e1 f4 a2 f9 92 52 0a 37 04 e4 51 | 6e 83 7a 8b f6 b0 a9 33 fc 7e 63 8b 04 cb e8 b1 | 89 da ba 9d 79 52 4b 77 ad fe 01 ca be 34 71 25 | 01 b7 c6 b7 a4 d2 8b 5a 4f 28 3e 3a 2c 2d 2b 82 | b6 7f 76 80 3a 8d 21 5e c2 27 da 9c 35 b4 28 8d | 4f 12 52 38 3a d3 0a 5c 8a f9 8f 79 8d 25 d4 f8 | ed f0 27 a3 9a 91 9a 23 17 a2 c5 fb 5c 81 c7 3f | d7 90 16 5d 16 d9 fd c2 ab 94 11 66 13 b9 42 50 | 61 f5 f7 53 fa 66 74 a0 35 1a 38 cb 76 13 72 7a | 71 f8 95 99 2b 70 57 e9 96 87 e1 a7 fa 09 46 16 | 2d 17 ab 0f b3 e3 6d 7d c4 71 f7 b9 01 3d 53 ec | 89 99 23 9b ed fe dc 3d 96 90 a5 f1 6b a2 7c ad | 08 22 28 21 90 c0 9d 24 98 36 19 8c 8e 5f 64 f3 | 29 00 00 24 cc 21 72 ec 84 1b 6c bc be 58 98 1b | fd b2 70 93 97 ae 8a 73 25 e3 f3 ed 6f 6f ad a0 | a3 bc 74 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 20 17 ba 74 ed cb 3d 19 9d 8d 0a | 7d 3c 02 99 ce fc 27 96 00 00 00 1c 00 00 40 05 | be d4 1c 69 d6 46 df 94 c0 c1 0d 02 c5 30 14 7a | ff f7 b4 bf | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11640 | #367 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 87 68 98 60 e9 4c f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #367 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #367 | rejected packet: | 4a 87 68 98 60 e9 4c f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #367: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0535 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a68890 | handling event EVENT_RETRANSMIT for parent state #389 | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #389 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #389 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49675.852426; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500621 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11640 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #389 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 "road-eastnet-nonat-137" #389: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #389) | 85 39 d1 4d 8b 00 62 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 35 45 30 eb 5a 4e 31 22 74 c6 b3 a4 12 3f 11 | d4 ed 4e ed d9 b9 2a b5 45 b7 bf 2f c4 12 8d f6 | b6 45 8b e7 42 00 82 88 9b 5f 9d ac d3 62 85 20 | 80 d9 92 f9 48 6c 61 18 10 02 b3 60 4a 67 bc f5 | 7f f3 06 fd dd d9 85 7b 8a 61 74 3e b0 54 86 48 | be 68 e1 1d 71 86 b6 10 0b 53 c9 4b c6 1d e3 32 | 0e 9d a0 c1 c2 ea 3f 8d 85 11 04 6b 8c a8 06 e2 | 8a a8 28 44 e2 f4 2d 9b 79 2e 3b 95 17 25 de 38 | b1 b1 27 54 d1 ca 51 cb 05 e4 51 d4 10 05 5a 73 | f7 6e 3f 1e 04 83 05 45 32 c8 e5 83 91 5b d4 46 | cb 00 53 49 8b aa e2 4a 03 fb ec 92 bd 9a d8 ef | c2 f7 13 0e ac 87 cd a2 d6 11 8a 4d b3 76 15 63 | 7e 5d ad ad 19 54 b0 8b cf 33 56 db af c2 f6 2f | 46 e8 3c 3e 30 75 95 b6 ad 6b 4c bd b8 1c f7 d8 | 42 48 45 24 c4 28 be c8 24 78 21 7b 8c a1 5f d5 | 3c 68 c6 b7 92 f7 dd 99 0c 2e 4d 49 3c 4e 34 53 | 29 00 00 24 d4 02 58 a1 15 41 bf 82 7e 15 0d c9 | ca 5c 1f 96 c8 8b 6c 22 75 5c 08 57 5f 06 6b 32 | fe f8 a7 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 ad 3c 1a 7d 4c cc 56 a6 70 0e c9 | dd 4d 28 a6 f3 20 1b cb 00 00 00 1c 00 00 40 05 | e7 a3 be 04 a3 45 3b 11 1b f8 e3 89 48 23 a2 23 | c1 e1 2a f8 | libevent_free: release ptr-libevent@0x7fb374014820 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a68890 | #389 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 39 d1 4d 8b 00 62 4d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #389 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #389 | rejected packet: | 85 39 d1 4d 8b 00 62 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #389: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800cc10 | handling event EVENT_RETRANSMIT for parent state #289 | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #289 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #289 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49675.897731; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005166 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a68890 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #289 | libevent_malloc: new ptr-libevent@0x7fb374014820 size 128 "road-eastnet-nonat-37" #289: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #289) | 2e 50 46 ff ee 4c e9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 67 60 81 00 e9 c5 12 22 cc 49 d1 8d 87 9d ec | ba e1 ae d7 0f ff 89 2c 01 49 2f 18 a4 d8 5a ff | 94 bb 3c 2d 6c 23 65 3c 9a 45 52 91 05 ff 55 0b | 22 ea fe ea 0a 4e f6 5b 7a 62 13 72 d3 65 de 8a | 6c f3 72 1b af fd 0c 36 3a 05 de a4 6d 9b 92 ce | d9 79 2b 75 ee 9a e2 a1 2c b2 02 b2 85 a2 98 a2 | 3c 63 cc 1f 7e c9 81 88 5b 95 14 a9 db c3 cc 4c | 7d 2a a7 8c 64 c7 93 92 12 cf 28 08 e5 ab 19 fa | 3f 53 9a 5b d7 86 99 40 82 c2 0d 84 83 94 43 d6 | cb b8 b3 06 64 05 bf d9 9d 5b fb 6a 5b 6a d2 16 | 6f b8 75 0b 98 2a 33 7f 2c 96 47 b3 69 76 55 52 | ca 3f b2 34 c4 b8 60 62 c8 0f 07 9c 2a 3e 70 02 | 1f 60 03 3e 97 1e ea 39 09 c8 ac 49 fb 70 ef af | f9 7e 7f f0 e4 2d 18 4d f8 20 f5 71 8f b4 fc be | 11 8b 08 ae 82 4a 27 f4 11 f5 e0 5f 14 7e a2 b5 | 66 07 59 01 f7 8e 64 17 db 17 82 9f be dd 61 54 | 29 00 00 24 70 cb ce 4e e8 fa 33 67 08 21 14 9b | 70 83 d5 d1 77 4f cc 4e 50 51 8a 00 6c d4 e4 19 | 33 47 80 f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 95 9d ea dc 9b 1a b8 2d d8 fe 0a | bb 49 1d 2c c9 ad 47 73 00 00 00 1c 00 00 40 05 | 70 48 4d 18 17 11 80 57 99 3c 90 8c f0 f2 b1 e5 | 98 18 b0 dd | libevent_free: release ptr-libevent@0x7fb36801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800cc10 | #289 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2e 50 46 ff ee 4c e9 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #289 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #289 | rejected packet: | 2e 50 46 ff ee 4c e9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #289: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0697 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #382 | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #382 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #382 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49675.902215; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002355 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #382 | libevent_malloc: new ptr-libevent@0x7fb36801a4e0 size 128 "road-eastnet-nonat-130" #382: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #382) | 8a a7 de 77 ff fe 00 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 1e 05 01 d3 c0 50 0e 07 5a f5 6c 2a f3 ca c5 | f5 6b b5 ce e5 2d 0d 22 8a 9d fc a1 92 f1 21 88 | fe 80 af 87 07 4e ac cb 0e 4c 2f 1f 7c 09 ad 56 | 27 1d 20 e6 ec e9 94 a7 13 47 77 6d 93 7b 8b 31 | 4c 98 f5 11 b5 9a 38 64 29 ba c8 d0 2f a9 37 ca | 1d 9c 45 27 41 6d 78 24 2b 30 7d 43 66 5f da 35 | 99 0b ee f7 a5 dd a9 e7 24 b7 2c 27 c3 b8 3c 38 | 22 f4 c4 26 23 91 a1 6d a7 03 90 dd c7 47 8b e4 | b9 30 db 10 7a b0 86 55 91 13 ed 5a 5c 50 c6 55 | 38 6b 0d bb 7c d6 67 e7 99 0a 0d 7c c8 3b f2 93 | 43 b8 a6 1e f0 04 5a 66 ab 2b 76 49 15 e4 be b6 | e3 ab 9a 84 5b 45 f3 99 3f 3d 94 3a 7f ba c6 2d | c0 e5 16 1f a9 0e c4 b3 c7 a8 37 c7 df 60 6d b0 | 90 7f 5b 83 e7 16 35 cd f8 80 7e 6b 4c 50 19 23 | 8a a3 35 38 cd 8b ef 81 d2 24 34 89 61 4b 37 2c | a1 bc 48 55 f5 65 06 2e e7 6f b3 a0 6e 02 6c 89 | 29 00 00 24 7c cd b7 56 1d 0f 15 7b 08 97 8c a9 | df 91 53 e0 6a 88 48 cc 4c b6 8e 33 b3 57 e0 e8 | 1c 04 d1 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 58 61 cb 76 cc c4 93 e8 81 4f b3 | 54 86 64 27 f4 77 87 8f 00 00 00 1c 00 00 40 05 | 27 d0 5f f0 83 ae a8 e6 f3 e6 a6 2d bb 57 f3 83 | 78 36 b0 95 | libevent_free: release ptr-libevent@0x7fb388011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #382 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a a7 de 77 ff fe 00 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #382 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #382 | rejected packet: | 8a a7 de 77 ff fe 00 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #382: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24700 | handling event EVENT_RETRANSMIT for parent state #344 | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #344 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #344 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49675.908563; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005821 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #344 | libevent_malloc: new ptr-libevent@0x7fb388011f30 size 128 "road-eastnet-nonat-92" #344: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #344) | 60 fe 47 d5 bc 7e ec f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 bf a8 75 45 e6 9b 9e 36 c4 f8 00 7b fa ed 16 | 45 48 19 73 f0 43 47 d5 85 f3 cd c8 97 6e 50 a8 | 7b 63 a3 ce ea 05 ae 44 e5 a2 e6 29 a8 16 bc 48 | 78 95 49 07 f7 17 ad 10 48 2e fd 23 74 21 44 c0 | b4 d3 48 b2 fb bc c3 28 df 8a d3 09 ec 63 04 28 | 7e 5a 51 87 52 03 32 ff 61 0c 39 ac c3 26 d9 35 | 88 8a 8d fe 64 9e 7c 7f c3 22 7b 8b 9e 96 8b 3d | b8 ef 81 b1 6a 3f 8a 50 49 73 5d ab 49 f3 99 5e | ad 5d e8 43 6f bd 70 02 a0 6f d4 12 c9 ee f2 55 | f1 fb cb 6e d0 ab 61 ad a4 39 c4 fa f3 3f c7 bf | 5f f1 ac db cc 36 aa 36 32 7b 50 a5 5a 12 e0 c2 | fb c0 54 26 8a e0 81 02 71 55 03 a2 11 c1 ce 2c | 62 50 df 4c eb da 5d 3d 81 bf 56 fd c4 6a 45 b3 | f3 c4 00 14 0a f0 d4 72 ad 8f 3b 97 e7 25 ea 81 | 48 23 bb ad 52 e9 90 df 74 31 fa 3e 85 2d 9b f0 | 97 f2 67 07 62 f1 e0 1b eb 9c 9b f7 2c 83 46 40 | 29 00 00 24 59 47 a1 36 35 51 2c e7 ec 59 96 c4 | c5 6a 0f fd 9f 62 7d 5e ad fa 8e 0f 35 43 8c 01 | 6a c9 a8 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 37 18 00 bf d4 a8 37 15 69 ae 4c | fc 2f e7 92 f0 22 70 f2 00 00 00 1c 00 00 40 05 | 33 e5 40 5c 05 2f 5b 7d e0 96 06 6b 07 18 0b d5 | ca 3f e3 4a | libevent_free: release ptr-libevent@0x7fb344035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24700 | #344 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 60 fe 47 d5 bc 7e ec f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #344 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #344 | rejected packet: | 60 fe 47 d5 bc 7e ec f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #344: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf50 | handling event EVENT_RETRANSMIT for parent state #145 | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #145 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #145 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49675.914406; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009071 exceeds limit? YES "road-eastnet-nonat-145" #145: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-145" #145: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #397 at 0x557d46a99140 | State DB: adding IKEv2 state #397 in UNDEFINED | pstats #397 ikev2.ike started | Message ID: init #397: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #397: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #397; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-145" #397: initiating v2 parent SA to replace #145 | using existing local IKE proposals for connection road-eastnet-nonat-145 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 397 for state #397 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b24700 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #397 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 | #397 spent 0.0977 milliseconds in ikev2_parent_outI1() | RESET processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #145 ikev2.ike failed too-many-retransmits | pstats #145 ikev2.ike deleted too-many-retransmits | #145 spent 2.59 milliseconds in total | [RE]START processing: state #145 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-145" #145: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #145: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #145 "road-eastnet-nonat-145" #145: deleting IKE SA for connection 'road-eastnet-nonat-145' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-145' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-145 | State DB: deleting IKEv2 state #145 in PARENT_I1 | parent state #145: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #145 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3500180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf50 | in statetime_stop() and could not find #145 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-145 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-145" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-145' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-145" | stop processing: connection "road-eastnet-nonat-145" (in initiate_a_connection() at initiate.c:349) | spent 0.0701 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 8 resuming | crypto helper 8 starting work-order 397 for state #397 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 397 | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 397 time elapsed 0.000919 seconds | (#397) spent 0.928 milliseconds in crypto helper computing work-order 397: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 397 for state #397 to event queue | scheduling resume sending helper answer for #397 | libevent_malloc: new ptr-libevent@0x7fb34c0293f0 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #397 | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 397 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #397 | **emit ISAKMP Message: | initiator cookie: | b8 96 65 06 95 e1 f4 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-145 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 40 c8 0d f4 cf 12 04 23 b3 8c b0 d5 0f 34 4c a1 | ikev2 g^x e0 38 a5 84 33 97 be 9e 20 02 11 8c 69 5e 11 d0 | ikev2 g^x 7f 62 ac d4 51 19 cc 39 4f d4 08 35 17 3d d8 7a | ikev2 g^x c8 e2 b7 8a c4 ef 87 90 f4 6c ad 03 c1 12 e5 fe | ikev2 g^x a1 ca 4d a3 a7 26 51 b1 18 00 3f 74 0f 0b 76 79 | ikev2 g^x bc c1 ba 8c 57 57 64 fe a4 22 c8 a4 ab 19 ab 0c | ikev2 g^x dd ce 55 14 58 7f a0 3d 7e 01 33 18 3d 67 8f 6a | ikev2 g^x ca ae 35 2c fc 77 68 f1 26 46 2d 1f 7a bb f6 b6 | ikev2 g^x 88 41 08 63 25 29 f3 b7 63 ae 0e 14 3f a2 dc 97 | ikev2 g^x 0e 00 b1 e7 fc 07 d8 8b 49 bf 80 af e9 ed 2e ae | ikev2 g^x 76 d5 6d 36 b9 2a 02 65 8e ab 6e 62 de 0e 3d f3 | ikev2 g^x f7 6f bf 03 ee 4b bf 13 13 36 8d f9 63 27 fb 43 | ikev2 g^x 3f 8c 62 32 8e 36 3e 03 c1 c2 7e e0 16 a2 30 62 | ikev2 g^x 14 7f 02 fd b0 1d f6 8c 31 34 94 1b 15 18 28 ae | ikev2 g^x 0e b7 ba 68 7f a5 50 6b 2b de 67 a0 81 07 b2 62 | ikev2 g^x f5 48 ed c5 05 14 42 21 f6 53 6c 0e 3a 26 2c f6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 27 60 c6 66 70 ae 97 9f 6b 69 4c 25 37 ba d9 cf | IKEv2 nonce 08 77 b3 59 45 e3 d8 2d 73 dd 52 c3 cf dc c0 84 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b8 96 65 06 95 e1 f4 12 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 91 | natd_hash: port= 01 f4 | natd_hash: hash= 4b 57 f9 bf 9f 01 9a 6f 3c 35 55 f3 32 2b 15 a5 | natd_hash: hash= 4a 2d 79 cf | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4b 57 f9 bf 9f 01 9a 6f 3c 35 55 f3 32 2b 15 a5 | Notify data 4a 2d 79 cf | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b8 96 65 06 95 e1 f4 12 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4f 21 3e 38 45 eb 50 34 34 8d 72 07 46 d4 99 5b | natd_hash: hash= e3 94 74 97 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4f 21 3e 38 45 eb 50 34 34 8d 72 07 46 d4 99 5b | Notify data e3 94 74 97 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #397 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #397: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #397 to 4294967295 after switching state | Message ID: IKE #397 skipping update_recv as MD is fake | Message ID: sent #397 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-145" #397: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.145:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #397) | b8 96 65 06 95 e1 f4 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 c8 0d f4 cf 12 04 23 b3 8c b0 d5 0f 34 4c a1 | e0 38 a5 84 33 97 be 9e 20 02 11 8c 69 5e 11 d0 | 7f 62 ac d4 51 19 cc 39 4f d4 08 35 17 3d d8 7a | c8 e2 b7 8a c4 ef 87 90 f4 6c ad 03 c1 12 e5 fe | a1 ca 4d a3 a7 26 51 b1 18 00 3f 74 0f 0b 76 79 | bc c1 ba 8c 57 57 64 fe a4 22 c8 a4 ab 19 ab 0c | dd ce 55 14 58 7f a0 3d 7e 01 33 18 3d 67 8f 6a | ca ae 35 2c fc 77 68 f1 26 46 2d 1f 7a bb f6 b6 | 88 41 08 63 25 29 f3 b7 63 ae 0e 14 3f a2 dc 97 | 0e 00 b1 e7 fc 07 d8 8b 49 bf 80 af e9 ed 2e ae | 76 d5 6d 36 b9 2a 02 65 8e ab 6e 62 de 0e 3d f3 | f7 6f bf 03 ee 4b bf 13 13 36 8d f9 63 27 fb 43 | 3f 8c 62 32 8e 36 3e 03 c1 c2 7e e0 16 a2 30 62 | 14 7f 02 fd b0 1d f6 8c 31 34 94 1b 15 18 28 ae | 0e b7 ba 68 7f a5 50 6b 2b de 67 a0 81 07 b2 62 | f5 48 ed c5 05 14 42 21 f6 53 6c 0e 3a 26 2c f6 | 29 00 00 24 27 60 c6 66 70 ae 97 9f 6b 69 4c 25 | 37 ba d9 cf 08 77 b3 59 45 e3 d8 2d 73 dd 52 c3 | cf dc c0 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 57 f9 bf 9f 01 9a 6f 3c 35 55 f3 | 32 2b 15 a5 4a 2d 79 cf 00 00 00 1c 00 00 40 05 | 4f 21 3e 38 45 eb 50 34 34 8d 72 07 46 d4 99 5b | e3 94 74 97 | state #397 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b24700 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #397 | libevent_malloc: new ptr-libevent@0x7fb3500180b0 size 128 | #397 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49675.916339 | resume sending helper answer for #397 suppresed complete_v2_state_transition() and stole MD | #397 spent 0.623 milliseconds in resume sending helper answer | stop processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c0293f0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 96 65 06 95 e1 f4 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #397 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #397 | rejected packet: | b8 96 65 06 95 e1 f4 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 91 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #397: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0773 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ced0 | handling event EVENT_RETRANSMIT for parent state #368 | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #368 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #368 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49675.917653; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003042 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf50 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #368 | libevent_malloc: new ptr-libevent@0x7fb34c0293f0 size 128 "road-eastnet-nonat-116" #368: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #368) | af 44 01 88 e6 16 c8 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 fe d2 29 cf 90 27 2d 78 45 a2 b1 3a ed 0c 48 | 17 b4 e8 54 dd 68 cf 7e 09 7a af 17 ed 4f 89 f8 | c0 ff 46 bb 6c a6 b3 38 fd f1 d2 cc cf d4 db c1 | e0 88 fe 51 49 6d e3 71 01 85 fe f4 a5 9f 85 04 | b6 d1 25 1f bd d7 ec 86 d1 7c 74 4d 2b 88 9b 37 | 88 75 91 51 15 43 e3 94 29 7a fc 34 e7 47 6b 09 | 3f 68 5a af 07 68 67 15 d9 ca f4 fd c3 d0 6c 2d | 70 40 4e 4a 88 cf b4 8b 6f 34 77 1b fd 2c ac c0 | b5 ab 67 28 d7 0d cf 79 56 41 4a ee e4 5c 59 e9 | 16 2d 45 df 3b 83 50 77 d1 1d 25 2e df 41 d7 96 | e0 ae 3d 15 c2 fb 47 fc 22 43 64 51 9d 2b 27 9e | ef d5 13 c7 bc a8 df 51 ba 9e 32 c3 d2 0e 3d 97 | 23 9a d8 1c 93 38 85 21 ff 2a 81 20 c2 e1 c5 96 | 9d d3 5f 74 e3 dc ae 9a 19 d8 eb 6f 38 2d 11 55 | b9 c5 4b fe 45 56 61 1b 03 ae 41 5d 20 26 7b b4 | dd 4c d4 57 72 8f 74 07 75 75 35 67 ae 9c b4 2d | 29 00 00 24 b4 f8 c7 8c ce d2 25 cc 04 b1 28 85 | 4c 50 50 1c af 66 c6 a8 14 6b b6 e9 07 eb 31 8e | 06 0d 7b dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 4f 54 9f 13 b7 58 02 6e 4f 8f 36 | 8b d5 61 f1 61 e4 53 15 00 00 00 1c 00 00 40 05 | 79 7d 7e 8e 6a 0e d7 b1 f9 8e 14 46 7c 3e c2 fe | 69 34 3d 95 | libevent_free: release ptr-libevent@0x7fb340030080 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ced0 | #368 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 44 01 88 e6 16 c8 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #368 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #368 | rejected packet: | af 44 01 88 e6 16 c8 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #368: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0703 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b06800 | handling event EVENT_RETRANSMIT for parent state #390 | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #390 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #390 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49675.924004; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50105 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ced0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #390 | libevent_malloc: new ptr-libevent@0x7fb340030080 size 128 "road-eastnet-nonat-138" #390: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #390) | f0 59 d0 2d 97 92 84 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 a6 bc 87 d6 62 82 0f 67 22 b6 ee c6 47 37 24 | 35 77 67 9d 2b 69 4d 68 d9 17 5e 4e 5b 7c e7 e0 | de 0c 00 17 eb 73 f2 8c 21 62 77 5f ed 93 76 62 | 82 34 a8 dc e3 cb c2 5a 08 71 13 11 3d 4b e6 d1 | 76 57 25 8b a6 9b ab 1b 86 9a b2 3c b4 c5 09 27 | 07 3a 9a 1f b3 ba dc 74 b5 99 e0 70 c7 35 07 15 | 6b eb 79 13 3f 27 25 55 75 85 60 5d d2 d0 ba 32 | 68 73 83 f4 c5 0a 96 0e 4b e5 39 e5 86 02 a4 93 | e2 f4 48 ef 0c f4 c4 74 9a 13 7f eb 1a f7 58 25 | 7f f1 9e dc 6a 9c 5a 01 55 d6 94 fe 2a 9d 15 54 | c4 c7 a9 92 32 84 b6 cb 67 d0 cf 4d c5 e2 bc df | 9f d8 4e db 8f 96 2f 1e c9 d0 ec 6a 9b 77 d4 57 | 6b cf 06 d5 ae fb ea 29 a5 1f 59 cf 78 34 af ff | a5 76 3d 89 27 c1 f8 1c 6e a5 66 a5 63 8a 2d 2f | b3 a7 de f9 71 62 f3 67 56 6c 03 83 1d be 14 17 | 8c 04 f3 ba 5f 3e 7d cb 76 74 94 e2 c9 0a 5a 07 | 29 00 00 24 9a 7c 0d 04 38 99 0e 36 73 a3 ab df | 41 d9 56 ed 47 3b 6b 02 19 aa 87 30 cc 21 65 76 | f4 51 64 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 0a c1 09 04 69 58 cc 7d de 65 69 | 68 f6 ba 86 4e 7f 6a 28 00 00 00 1c 00 00 40 05 | 52 91 09 9c ff 5e 67 81 8a 7d bb c1 ce e0 37 4c | d9 14 ec 51 | libevent_free: release ptr-libevent@0x7fb360046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b06800 | #390 spent 0.183 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f0 59 d0 2d 97 92 84 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #390 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #390 | rejected packet: | f0 59 d0 2d 97 92 84 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #390: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0703 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #383 | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #383 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #383 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49675.973406; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001344 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b06800 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #383 | libevent_malloc: new ptr-libevent@0x7fb360046040 size 128 "road-eastnet-nonat-131" #383: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #383) | 8b a9 fc 25 06 93 a1 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 48 8c d9 3d c6 b0 61 39 4e 19 f7 86 b1 e2 c3 | 03 ba 84 78 9c c4 77 a1 7d 57 91 f5 ae c2 ed b8 | 0b 61 98 04 6f 72 68 b3 63 3d b6 20 12 b2 50 10 | 3d 3c 00 1d b9 ab be 72 ac ba 93 14 3b b2 a4 c2 | 8e b0 47 ba 98 bb 5c 2b e4 da 7c 8d a4 4a d6 89 | a4 b6 36 de 0f 18 04 bb fc 9c 28 b5 1a ee c2 7a | 18 c6 24 27 71 17 17 60 ca 39 4e 5f 5b 71 71 ab | e4 cd 79 1b 79 6b 31 46 63 bb cd 82 d7 96 72 86 | 1d fc 72 1c e4 a4 16 04 29 1f 9e b6 3a fd 62 30 | f1 da dd 12 af 8e 61 c7 51 15 f6 a4 66 22 64 42 | ef d3 2c 09 00 94 20 e3 33 79 f3 1d c7 7c 4e 79 | a7 a8 2d ec 91 f0 bb fb ff 6c 89 63 ff 5d a6 dc | 2c c3 c7 01 d9 71 f9 87 28 4c e4 de 91 08 4b 02 | b3 28 ae a1 4d 26 42 63 01 7b d1 2e 68 17 e3 a7 | 0a 0b eb 5c 62 18 33 2f d3 a6 c9 6b 3c a2 aa a0 | f6 fc 0d 55 8c 1d 7c d8 f9 bd 77 28 68 1c b3 05 | 29 00 00 24 c7 43 5d 92 21 cd 92 00 ce 48 5a 41 | bc 51 f7 9c 7c 73 79 39 5d 67 8e 5d 0e b9 e5 ea | f1 7d 01 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 9e 11 98 e3 85 61 70 79 85 31 a8 | 4f a4 76 88 f9 86 57 fe 00 00 00 1c 00 00 40 05 | fb 7f 30 9d 57 51 30 a9 24 b7 71 f5 04 63 5f 8a | f8 68 fc 05 | libevent_free: release ptr-libevent@0x7fb3780300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #383 spent 0.21 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b a9 fc 25 06 93 a1 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #383 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #383 | rejected packet: | 8b a9 fc 25 06 93 a1 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #383: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0863 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38400feb0 | handling event EVENT_RETRANSMIT for parent state #369 | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #369 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #369 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49675.977858; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002955 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #369 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 "road-eastnet-nonat-117" #369: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #369) | ff 18 31 cc 83 7e 2e ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 1f 06 e6 7b ea 4e 17 1c 87 7d 86 73 80 47 50 | cf bf e2 ff 09 37 6a 25 2d 87 f4 71 22 38 1c ca | 11 79 43 67 c5 65 1f f5 07 47 33 ad 73 a4 d3 73 | 51 54 fd df 5a c2 8d 18 cb cc 20 72 8e 07 68 eb | b6 8d ab 31 ba fd fa 9b 7c 59 57 b3 71 f1 91 34 | ea 4b 70 52 a4 6c eb 12 7d 01 23 58 56 9a d3 c0 | a8 35 4b 27 63 af ee d0 37 dd c7 3e 45 5a 0b 60 | bd 6d ed c4 e9 d9 c1 d7 e1 29 a2 3f dc 2c af 7c | e6 74 73 2b 26 15 ca 1c f5 95 b6 33 2f 8c 4a 22 | a1 8d d2 aa 72 d0 9b 41 c8 87 a6 d7 f8 13 c7 cd | 3c d8 62 e2 fc 64 74 ed 50 b1 79 e3 79 44 21 85 | 12 8f 6c 07 3b 37 80 9b 8c 83 41 c0 0e 38 b7 92 | 75 a7 4a 89 81 43 56 e9 67 ee 43 e0 24 9b 53 75 | b9 e5 d1 27 c1 f4 c3 83 7c 57 e4 5e 33 8b e2 10 | c9 ec fe 76 73 25 ae 4b 87 a7 e2 e5 89 5a 08 72 | fc 88 9c 69 9c 14 55 be f9 d1 24 d2 2a 6b bd 35 | 29 00 00 24 03 b6 58 fc c8 79 29 fe 43 44 80 31 | 59 cf 11 77 19 87 27 44 32 ac 84 44 78 ab c0 33 | d7 16 05 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a fa 34 e9 cb c2 b8 b0 71 3e db 9c | 1e f7 0a 0e 8d a9 9b 92 00 00 00 1c 00 00 40 05 | c3 12 1d 90 39 27 a3 80 ba dc 3c b0 c3 6a 52 2a | 1e d7 c5 9b | libevent_free: release ptr-libevent@0x7fb3840266d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400feb0 | #369 spent 0.216 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff 18 31 cc 83 7e 2e ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #369 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #369 | rejected packet: | ff 18 31 cc 83 7e 2e ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #369: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0872 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000cc10 | handling event EVENT_RETRANSMIT for parent state #290 | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #290 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #290 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49675.983337; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004929 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400feb0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #290 | libevent_malloc: new ptr-libevent@0x7fb3840266d0 size 128 "road-eastnet-nonat-38" #290: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #290) | d9 b1 5b a3 d1 9c 57 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 dc 77 37 88 c0 74 0b c8 60 da a3 8f 9c e4 42 | 29 fe d5 c9 98 e7 af 66 82 be 95 44 77 f6 93 6f | 24 98 d7 cc c4 a6 16 af 14 a2 ad 53 a8 a5 93 3c | a1 26 c3 2d 65 3f cc 3f f0 9b 21 66 64 c4 82 00 | 30 f1 57 86 bf eb 51 88 bf 71 0a 30 68 dc 14 50 | 80 50 e1 6f 25 74 d9 af 8d f4 b9 89 60 e8 c3 c8 | 3b d5 14 f3 53 b4 96 85 6c 74 39 5d ff ee 22 a4 | ad 4c 82 96 29 6f f2 59 77 4e 48 da 14 23 7a 5c | 78 bb 13 4c f8 05 33 6d 40 79 5d e2 85 b7 6d 6e | b2 54 b0 03 d6 63 64 61 00 6d fd d4 8a 79 cd 3d | f1 25 f9 cf fc 5d a4 f7 ef 48 25 44 50 58 6a b2 | cd 2c dd 4c f0 ff 5e 32 e5 0f bc 63 fa 03 d5 1a | 9a ab 7e 2b 95 53 36 2e 47 c1 65 a2 7b d7 cd db | 40 2b 7a b2 21 b9 e9 6e fc 75 da 49 33 c1 98 35 | c7 9c 09 b3 47 fb 10 3f e1 56 6f be 75 69 b0 33 | f1 cb e8 e7 d6 74 b0 43 37 f7 9f 8c c7 7c d0 1e | 29 00 00 24 f3 df a5 ae 0e f0 b6 8d 6c 86 f6 fd | ac 3e 20 3a 6e ef cc 6e 76 09 43 e5 b3 97 07 d6 | b5 fd b7 b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 90 0c 81 3c 3a d2 14 9a 30 eb 10 | fa 46 c9 fe 37 f4 bb 0e 00 00 00 1c 00 00 40 05 | ea fc 09 da ae 61 e7 e4 dc 7a 6e 5d ad e3 e5 ff | 21 64 e7 65 | libevent_free: release ptr-libevent@0x7fb36001a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000cc10 | #290 spent 0.205 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 b1 5b a3 d1 9c 57 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #290 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #290 | rejected packet: | d9 b1 5b a3 d1 9c 57 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #290: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0874 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf80 | handling event EVENT_RETRANSMIT for parent state #146 | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #146 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #146 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49675.985776; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.014244 exceeds limit? YES "road-eastnet-nonat-146" #146: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-146" #146: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #398 at 0x557d46a9a700 | State DB: adding IKEv2 state #398 in UNDEFINED | pstats #398 ikev2.ike started | Message ID: init #398: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #398: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #398; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-146" #398: initiating v2 parent SA to replace #146 | using existing local IKE proposals for connection road-eastnet-nonat-146 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 398 for state #398 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36000cc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #398 | libevent_malloc: new ptr-libevent@0x7fb36001a4e0 size 128 | #398 spent 0.137 milliseconds in ikev2_parent_outI1() | crypto helper 12 resuming | crypto helper 12 starting work-order 398 for state #398 | RESET processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 398 | start processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #146 ikev2.ike failed too-many-retransmits | pstats #146 ikev2.ike deleted too-many-retransmits | #146 spent 2.94 milliseconds in total | [RE]START processing: state #146 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-146" #146: deleting state (STATE_PARENT_I1) aged 64.016s and NOT sending notification | parent state #146: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #146 "road-eastnet-nonat-146" #146: deleting IKE SA for connection 'road-eastnet-nonat-146' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-146' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-146 | State DB: deleting IKEv2 state #146 in PARENT_I1 | parent state #146: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 398 time elapsed 0.000596 seconds | stop processing: state #146 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb34003b010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf80 | in statetime_stop() and could not find #146 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS | (#398) spent 0.596 milliseconds in crypto helper computing work-order 398: ikev2_outI1 KE (pcr) Initiating connection road-eastnet-nonat-146 which received a Delete/Notify but must remain up per local policy | crypto helper 12 sending results from work-order 398 for state #398 to event queue | FOR_EACH_CONNECTION_... in conn_by_name | scheduling resume sending helper answer for #398 | libevent_malloc: new ptr-libevent@0x7fb340029170 size 128 | crypto helper 12 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-146" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-146' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-146" | stop processing: connection "road-eastnet-nonat-146" (in initiate_a_connection() at initiate.c:349) | spent 0.11 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #398 | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 398 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #398 | **emit ISAKMP Message: | initiator cookie: | d0 92 7e a2 a7 09 60 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-146 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d9 b4 17 bf 7e 10 d5 e2 12 67 d5 eb 44 fc 6b da | ikev2 g^x be 3b 71 0a c4 e3 79 bc 55 7d 33 ab 53 2c 63 89 | ikev2 g^x 9e 95 b9 30 6b 13 a7 4a c4 7b bb 0d b8 d2 26 a2 | ikev2 g^x 1b 44 de e4 2f 11 41 58 72 a9 de c1 a4 1a 3c de | ikev2 g^x fb 82 ea df 3c 36 4d b1 bb 32 a7 75 2a 9c da 3d | ikev2 g^x 04 1d ae c6 9e 47 9c 96 a3 bd 6c 27 32 62 7e ad | ikev2 g^x 70 24 3a b8 2d 6d 20 b6 31 c7 e4 59 58 b0 08 22 | ikev2 g^x 82 a6 37 db ba ec 34 68 a5 11 ce c9 83 0a 92 b3 | ikev2 g^x dd ea d2 26 81 86 3c 25 24 24 ac 6b b8 4a 55 12 | ikev2 g^x 52 ea 4b 29 23 c3 37 83 f6 36 9b 47 37 10 75 9d | ikev2 g^x f4 dd 3d a7 8c 08 2f 3c e4 23 53 ed 31 76 a3 fc | ikev2 g^x 1d a9 fd 55 24 58 0f 2f e2 fa 33 69 e3 52 ce 0b | ikev2 g^x 40 31 96 92 4b 51 32 bf 2a 17 34 73 b9 0a 6b 90 | ikev2 g^x de fe 0d 37 2c 91 fd 6c 7a a7 e2 56 e8 ce 17 fa | ikev2 g^x d6 57 69 b6 c9 3d e4 60 c8 79 32 d0 c0 ff e6 32 | ikev2 g^x 04 59 72 13 74 5b a6 22 e7 dc df 1b fa 28 85 f9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ae ec a4 eb 03 5f 45 70 f0 53 21 d7 81 1e fd e8 | IKEv2 nonce 52 41 5f 93 69 78 ae d9 36 11 23 a3 df 40 91 38 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d0 92 7e a2 a7 09 60 b1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 92 | natd_hash: port= 01 f4 | natd_hash: hash= de b0 87 87 88 52 10 6b eb de e2 56 47 54 e5 87 | natd_hash: hash= 4e eb 84 92 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data de b0 87 87 88 52 10 6b eb de e2 56 47 54 e5 87 | Notify data 4e eb 84 92 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d0 92 7e a2 a7 09 60 b1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= cf cf 8e 7f dc f9 05 61 ec 0b 32 5d d8 50 5d 1e | natd_hash: hash= f5 62 0b 45 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cf cf 8e 7f dc f9 05 61 ec 0b 32 5d d8 50 5d 1e | Notify data f5 62 0b 45 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #398 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #398: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #398 to 4294967295 after switching state | Message ID: IKE #398 skipping update_recv as MD is fake | Message ID: sent #398 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-146" #398: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.146:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #398) | d0 92 7e a2 a7 09 60 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 b4 17 bf 7e 10 d5 e2 12 67 d5 eb 44 fc 6b da | be 3b 71 0a c4 e3 79 bc 55 7d 33 ab 53 2c 63 89 | 9e 95 b9 30 6b 13 a7 4a c4 7b bb 0d b8 d2 26 a2 | 1b 44 de e4 2f 11 41 58 72 a9 de c1 a4 1a 3c de | fb 82 ea df 3c 36 4d b1 bb 32 a7 75 2a 9c da 3d | 04 1d ae c6 9e 47 9c 96 a3 bd 6c 27 32 62 7e ad | 70 24 3a b8 2d 6d 20 b6 31 c7 e4 59 58 b0 08 22 | 82 a6 37 db ba ec 34 68 a5 11 ce c9 83 0a 92 b3 | dd ea d2 26 81 86 3c 25 24 24 ac 6b b8 4a 55 12 | 52 ea 4b 29 23 c3 37 83 f6 36 9b 47 37 10 75 9d | f4 dd 3d a7 8c 08 2f 3c e4 23 53 ed 31 76 a3 fc | 1d a9 fd 55 24 58 0f 2f e2 fa 33 69 e3 52 ce 0b | 40 31 96 92 4b 51 32 bf 2a 17 34 73 b9 0a 6b 90 | de fe 0d 37 2c 91 fd 6c 7a a7 e2 56 e8 ce 17 fa | d6 57 69 b6 c9 3d e4 60 c8 79 32 d0 c0 ff e6 32 | 04 59 72 13 74 5b a6 22 e7 dc df 1b fa 28 85 f9 | 29 00 00 24 ae ec a4 eb 03 5f 45 70 f0 53 21 d7 | 81 1e fd e8 52 41 5f 93 69 78 ae d9 36 11 23 a3 | df 40 91 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de b0 87 87 88 52 10 6b eb de e2 56 | 47 54 e5 87 4e eb 84 92 00 00 00 1c 00 00 40 05 | cf cf 8e 7f dc f9 05 61 ec 0b 32 5d d8 50 5d 1e | f5 62 0b 45 | state #398 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36001a4e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36000cc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #398 | libevent_malloc: new ptr-libevent@0x7fb34003b010 size 128 | #398 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49675.98749 | resume sending helper answer for #398 suppresed complete_v2_state_transition() and stole MD | #398 spent 0.677 milliseconds in resume sending helper answer | stop processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb340029170 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 92 7e a2 a7 09 60 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #398 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #398 | rejected packet: | d0 92 7e a2 a7 09 60 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 92 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #398: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0848 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab2380 | handling event EVENT_RETRANSMIT for parent state #391 | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #391 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #391 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49675.991728; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500969 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34001fa80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #391 | libevent_malloc: new ptr-libevent@0x7fb340029170 size 128 "road-eastnet-nonat-139" #391: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #391) | 1e 4c 10 d0 5a dd 02 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 44 38 de 57 e6 42 14 4a 75 cb e8 86 f1 15 c7 | b3 6b a5 d0 a3 15 b5 a8 cf fe 21 90 de 4f ce 44 | 4b 9e a3 45 9f e5 e3 4a e1 61 50 92 d7 96 bd 78 | c9 7d fa 56 09 ee b1 46 53 20 fc ad 34 b3 1e e5 | 0c f4 f7 d3 65 bb 8f 18 cc a8 06 7f fc 7e 66 0f | 5a c0 66 08 19 5f fe 23 13 53 7d f1 cb 35 9c bf | b6 cc 27 b3 74 16 78 a5 d0 41 0b 66 96 4e d5 0b | a8 67 13 54 66 95 b9 f4 f4 50 eb 64 58 9c 23 eb | 8d 1e 98 9a 88 3b 5f 86 67 00 79 34 97 29 56 1a | b2 15 47 48 a5 9a 2b a5 34 cb 00 12 67 7f e0 d9 | 3a f8 09 e7 20 e1 52 74 01 fd f4 0c 96 53 a6 b7 | c6 61 c0 6c f5 79 6f b0 c7 2c 95 3d f0 6b 1d 3c | a1 9c 76 2c 42 98 e7 2f 92 d1 8e 08 bb da 6a 80 | de bb 58 dc 69 88 c5 71 37 d4 7b 84 79 2b bc 7c | 3c 5f 6e af 11 b3 52 0f 4a 94 17 dd 26 64 0a 25 | 66 61 88 60 23 0c 83 1b 44 d1 a9 f9 6e 89 2a f7 | 29 00 00 24 f4 e3 20 9c cf 9f 8b a0 c8 c9 bb b9 | ac d4 eb 98 02 de 0f c4 e7 00 7a df 68 e7 4c eb | e6 18 a5 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 3e 10 ca 19 aa 6a 76 c2 f6 15 22 | 58 d4 f7 90 3e 72 98 9d 00 00 00 1c 00 00 40 05 | 94 13 1b ea fd 35 6e 40 4c 88 7a 5c c1 e4 2f 2d | 6d 26 6f 2a | libevent_free: release ptr-libevent@0x7fb344046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab2380 | #391 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 4c 10 d0 5a dd 02 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #391 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #391 | rejected packet: | 1e 4c 10 d0 5a dd 02 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #391: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac1340 | handling event EVENT_RETRANSMIT for parent state #345 | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #345 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #345 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49676.032074; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005225 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab2380 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #345 | libevent_malloc: new ptr-libevent@0x7fb344046040 size 128 "road-eastnet-nonat-93" #345: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #345) | cc 1b db ff 37 55 f7 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 67 e9 25 ad 99 4c 76 71 a1 a8 5d 6b de 51 32 | eb 5c 8d 84 1c 3d 17 6c c1 5f 62 71 5b 44 16 fb | e4 d2 85 4c 64 49 cc e5 df 14 a2 74 3d 7a c6 c8 | 61 7c 32 bd 88 6d 99 62 9c 43 b2 d1 2b 52 46 39 | c0 c1 fe 0b d3 8c b7 41 43 fa 07 e4 ca 66 08 b9 | e3 73 79 86 ee fe 88 31 4e 3f 00 50 43 af ba 2c | 0f 81 55 13 ff ba 58 17 5f 8e c8 12 2b 5c fa c6 | ef 92 c1 91 f7 d8 64 09 28 37 f9 29 29 da 06 11 | 98 a0 90 28 27 02 35 70 61 dc cd b3 af 6b a5 cc | 33 40 2b 71 fe b4 6e 27 bc 87 0b 2e 49 cd 22 6a | fe 62 e7 dd 24 a7 1f 41 fb 60 e1 86 0c 80 50 0b | a0 a0 c9 f7 8f 75 a4 e1 64 72 0c 28 9b b9 6c ed | 86 a3 26 05 ab b4 ae 03 ec cc ce 40 59 4c 63 89 | f5 0c b7 8c 77 de 51 59 14 48 7e 85 50 2b 34 5c | b7 79 6c 71 db 1b 6c 37 06 89 c8 05 98 a4 3e 07 | 39 20 3f 60 a2 a7 3c 0b 2f 8f 18 e7 35 c0 2b f1 | 29 00 00 24 20 33 be 81 19 1f 5e fe 6d 68 36 2c | 95 1b cf 17 03 6e cb aa fd 3d 3c 1f 01 7c 3e 25 | c7 e0 c9 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 24 83 28 6d 9e 08 a8 13 dd 36 c1 | 4e 58 4a c0 e0 a3 35 28 00 00 00 1c 00 00 40 05 | 65 c0 95 0a 9d 33 80 de 00 4a d8 7a 37 18 f6 5b | 66 48 2b 46 | libevent_free: release ptr-libevent@0x7fb35c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac1340 | #345 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 1b db ff 37 55 f7 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #345 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #345 | rejected packet: | cc 1b db ff 37 55 f7 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #345: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380009ed0 | handling event EVENT_RETRANSMIT for parent state #384 | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #384 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #384 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49676.035383; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001936 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac1340 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #384 | libevent_malloc: new ptr-libevent@0x7fb35c035930 size 128 "road-eastnet-nonat-132" #384: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #384) | 86 6f ae 12 4d c0 7a b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d b1 fb 85 46 e4 0b ed 3a 09 27 c9 1d d0 fe 19 | 7a 6b 17 bb 62 8e 54 ac f1 64 67 34 40 ff 38 85 | 4f ff 54 1e 02 a7 af 76 91 63 95 f0 62 9e e7 68 | d4 07 2d a5 05 78 38 e6 00 65 3b 0c 3b 55 b9 34 | 19 27 7d 5e 1b 1f d1 f1 b8 c6 a4 32 36 a3 a1 4d | 77 fc 92 08 8e 44 1c 7b 72 a0 4a 6f ff ad 86 71 | 79 52 e6 49 b1 8f 12 9c 40 bc ec da 58 c7 66 8c | df 54 c1 66 96 41 fb 21 bc f2 5f 23 6c 52 ad 47 | c4 d3 9c 32 fb 09 e2 cc 47 c2 4b 3f 71 c2 e6 99 | 6d b7 94 23 a5 4c 0a 3c be 0e b2 50 04 86 41 e3 | 7a 9c 55 d1 3b 34 0c 3c 9f fd 4c f5 09 73 9f 60 | 56 d6 11 97 6a c5 df ef fe 2f 35 ee 63 fe 39 b0 | 29 b4 b3 01 1b 35 ff 91 b5 b4 bf 86 5f 29 e0 72 | 9b d7 f8 07 0a dc 66 0d 27 38 bb fd d4 42 1b 97 | 0e e9 cb d0 75 c1 5f 7b 20 8d a3 bd 9c d8 be df | 08 8a d8 c8 72 8d 2e 70 0c 78 7d 99 d6 b0 fe c1 | 29 00 00 24 dd a5 d7 0d 86 0a ce 46 70 f7 a4 d8 | 79 8d ab 0d 5a ba 15 d4 6b c1 b8 d3 f7 39 89 32 | f9 a6 bc c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 0a a8 53 d7 f6 23 14 8d 14 98 5a | ec 27 4c a0 59 56 95 73 00 00 00 1c 00 00 40 05 | 5b d2 62 5b 9b b5 2e 9c 89 b9 50 27 01 71 4f 1d | 99 42 bf 80 | libevent_free: release ptr-libevent@0x7fb3800223c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380009ed0 | #384 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 6f ae 12 4d c0 7a b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #384 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #384 | rejected packet: | 86 6f ae 12 4d c0 7a b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #384: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae4880 | handling event EVENT_RETRANSMIT for parent state #370 | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #370 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #370 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49676.036665; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002866 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380009ed0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #370 | libevent_malloc: new ptr-libevent@0x7fb3800223c0 size 128 "road-eastnet-nonat-118" #370: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #370) | 4a 80 23 ad fc 41 99 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 13 bc 42 a7 35 39 b2 99 5a ec 69 08 73 18 3f | fe 31 dc bf 22 23 10 df 50 13 8d 04 9e ea 66 93 | 98 fa 79 7f 64 34 1f da 27 d5 8f dc 20 be 18 56 | 17 0e c5 53 3e a4 18 ed 82 41 0e 7f 91 9c e6 cb | ef 35 45 6e 59 c7 b5 4d 35 32 d9 63 30 b7 dd 5d | 28 28 04 d3 d6 a5 84 6f 4c f3 94 90 75 da df 42 | 5a 65 b6 2e cd 5e 42 3b 71 3e 46 f7 4b 13 d1 aa | a5 9c 11 b7 2c 83 34 92 e3 55 46 0b 4b 42 12 08 | 06 02 c9 42 46 42 d0 f1 82 14 36 15 1e 2e d4 a0 | 23 35 a8 d9 5e c2 f8 ca da 81 45 00 34 f6 88 47 | 2f 60 cc ac c2 4b 39 55 8a 1b 8f 66 b3 43 72 fd | 59 52 11 ef 5c 2c 9e b7 b7 6a c6 60 eb 22 9a 4d | e9 c0 4b de 56 c3 d3 e4 19 f0 86 9f a5 38 ef 26 | 39 fb ac 6e b8 32 45 c4 d1 f5 cc bb b2 2f 7b 0b | 6b 6b b1 6f 27 b1 bb 88 e7 c4 d6 31 26 e0 94 2a | ae 90 aa 75 e5 cb 3e 1f 43 13 d3 7b 3c ed 1e b0 | 29 00 00 24 a0 6f 08 ca 5f 92 e1 a2 10 08 5a 34 | 7d b6 05 db 65 e8 3d 88 a0 b3 7d 19 ed 75 36 c4 | 95 ec 9c 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 38 cd 57 b0 33 db 6c e3 f5 95 3e | 28 5e 17 44 43 d3 05 33 00 00 00 1c 00 00 40 05 | 6f b1 ce a1 45 d5 bc 6f 48 f8 db 92 31 a1 28 9a | ba c8 a7 2b | libevent_free: release ptr-libevent@0x7fb37800f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae4880 | #370 spent 0.0928 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 80 23 ad fc 41 99 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #370 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #370 | rejected packet: | 4a 80 23 ad fc 41 99 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #370: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aee0c0 | handling event EVENT_RETRANSMIT for parent state #147 | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #147 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #147 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49676.042889; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007731 exceeds limit? YES "road-eastnet-nonat-147" #147: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-147" #147: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #399 at 0x557d46a9bcc0 | State DB: adding IKEv2 state #399 in UNDEFINED | pstats #399 ikev2.ike started | Message ID: init #399: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #399: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #399; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-147" #399: initiating v2 parent SA to replace #147 | using existing local IKE proposals for connection road-eastnet-nonat-147 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 399 for state #399 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ae4880 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #399 | libevent_malloc: new ptr-libevent@0x7fb37800f1a0 size 128 | #399 spent 0.0954 milliseconds in ikev2_parent_outI1() | RESET processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 resuming | crypto helper 5 starting work-order 399 for state #399 | start processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #147 ikev2.ike failed too-many-retransmits | pstats #147 ikev2.ike deleted too-many-retransmits | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 399 | #147 spent 2.52 milliseconds in total | [RE]START processing: state #147 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-147" #147: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #147: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #147 "road-eastnet-nonat-147" #147: deleting IKE SA for connection 'road-eastnet-nonat-147' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-147' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-147 | State DB: deleting IKEv2 state #147 in PARENT_I1 | parent state #147: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #147 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 399 time elapsed 0.000564 seconds | libevent_free: release ptr-libevent@0x7fb354046040 | (#399) spent 0.567 milliseconds in crypto helper computing work-order 399: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 399 for state #399 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aee0c0 | in statetime_stop() and could not find #147 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #399 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7fb344008e30 size 128 Initiating connection road-eastnet-nonat-147 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 5 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-147" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-147' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-147" | stop processing: connection "road-eastnet-nonat-147" (in initiate_a_connection() at initiate.c:349) | spent 0.0686 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #399 | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 399 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #399 | **emit ISAKMP Message: | initiator cookie: | 9a 35 91 e3 ae 4f 45 29 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-147 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 84 ce a5 03 ec 4a ee 33 f3 67 48 7b 6f be a9 66 | ikev2 g^x fb 8e 19 e6 36 60 4c c6 f2 fa ab 4a 53 70 9f a8 | ikev2 g^x 5d 61 41 57 15 0a 04 a9 c6 86 5d ab 3b 79 47 d9 | ikev2 g^x 64 c0 42 8c 2d 5e 11 ee 5a b4 7c 00 df db 58 b0 | ikev2 g^x 10 63 ed d6 5b 1a 63 c2 6e 59 c7 e8 2a 78 4e 44 | ikev2 g^x 25 ff 91 a5 4f 9f d4 f8 46 f6 2e bb b6 05 d4 45 | ikev2 g^x 7f ef 54 77 ee f0 2c 99 e2 fe 9b fe 0e 9d c8 14 | ikev2 g^x ca 70 65 95 d9 6c bd 1f dd d1 55 09 ab fd c5 44 | ikev2 g^x 6f ba 1f 76 70 5a 17 28 af 45 27 b3 5f fa fe 02 | ikev2 g^x 6a 08 1d 7c 03 0b fb b8 0b b4 48 92 28 71 ac 6f | ikev2 g^x 5f 3f a7 45 71 f7 92 e0 6c 9d f2 6c bb 9e 54 7d | ikev2 g^x 4e c3 05 e2 c9 1e 50 4a ea 5d b8 f4 10 cd bd ed | ikev2 g^x f5 70 36 5b 63 22 bb 46 fb e4 aa 69 fc 3a 38 34 | ikev2 g^x d5 97 f3 9a 0b d9 79 ac e6 c8 40 6d e3 6c 66 31 | ikev2 g^x 20 73 b6 2d f4 7d 52 fd f2 32 69 70 71 7f cd d6 | ikev2 g^x 06 5e 27 45 05 1c 80 53 a4 80 ee b7 a6 45 c2 7e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a1 6d db 5e 0b f7 f4 70 57 f1 37 cb cc a0 06 3f | IKEv2 nonce 1d 1e 6b 0a b6 35 fa c1 29 23 78 83 cc 1e 42 b6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9a 35 91 e3 ae 4f 45 29 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 93 | natd_hash: port= 01 f4 | natd_hash: hash= 5b 7c 20 90 94 5e 44 74 17 3c c7 e7 e8 35 eb 34 | natd_hash: hash= 00 1c 2e 68 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5b 7c 20 90 94 5e 44 74 17 3c c7 e7 e8 35 eb 34 | Notify data 00 1c 2e 68 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9a 35 91 e3 ae 4f 45 29 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= eb 24 3e a6 a5 f2 dc 45 a5 ce 8c 46 9a d0 7a ff | natd_hash: hash= cb 2c 1c 90 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data eb 24 3e a6 a5 f2 dc 45 a5 ce 8c 46 9a d0 7a ff | Notify data cb 2c 1c 90 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #399 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #399: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #399 to 4294967295 after switching state | Message ID: IKE #399 skipping update_recv as MD is fake | Message ID: sent #399 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-147" #399: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.147:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #399) | 9a 35 91 e3 ae 4f 45 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 ce a5 03 ec 4a ee 33 f3 67 48 7b 6f be a9 66 | fb 8e 19 e6 36 60 4c c6 f2 fa ab 4a 53 70 9f a8 | 5d 61 41 57 15 0a 04 a9 c6 86 5d ab 3b 79 47 d9 | 64 c0 42 8c 2d 5e 11 ee 5a b4 7c 00 df db 58 b0 | 10 63 ed d6 5b 1a 63 c2 6e 59 c7 e8 2a 78 4e 44 | 25 ff 91 a5 4f 9f d4 f8 46 f6 2e bb b6 05 d4 45 | 7f ef 54 77 ee f0 2c 99 e2 fe 9b fe 0e 9d c8 14 | ca 70 65 95 d9 6c bd 1f dd d1 55 09 ab fd c5 44 | 6f ba 1f 76 70 5a 17 28 af 45 27 b3 5f fa fe 02 | 6a 08 1d 7c 03 0b fb b8 0b b4 48 92 28 71 ac 6f | 5f 3f a7 45 71 f7 92 e0 6c 9d f2 6c bb 9e 54 7d | 4e c3 05 e2 c9 1e 50 4a ea 5d b8 f4 10 cd bd ed | f5 70 36 5b 63 22 bb 46 fb e4 aa 69 fc 3a 38 34 | d5 97 f3 9a 0b d9 79 ac e6 c8 40 6d e3 6c 66 31 | 20 73 b6 2d f4 7d 52 fd f2 32 69 70 71 7f cd d6 | 06 5e 27 45 05 1c 80 53 a4 80 ee b7 a6 45 c2 7e | 29 00 00 24 a1 6d db 5e 0b f7 f4 70 57 f1 37 cb | cc a0 06 3f 1d 1e 6b 0a b6 35 fa c1 29 23 78 83 | cc 1e 42 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 7c 20 90 94 5e 44 74 17 3c c7 e7 | e8 35 eb 34 00 1c 2e 68 00 00 00 1c 00 00 40 05 | eb 24 3e a6 a5 f2 dc 45 a5 ce 8c 46 9a d0 7a ff | cb 2c 1c 90 | state #399 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37800f1a0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ae4880 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aee0c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #399 | libevent_malloc: new ptr-libevent@0x7fb354046040 size 128 | #399 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49676.044246 | resume sending helper answer for #399 suppresed complete_v2_state_transition() and stole MD | #399 spent 0.495 milliseconds in resume sending helper answer | stop processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb344008e30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 35 91 e3 ae 4f 45 29 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #399 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #399 | rejected packet: | 9a 35 91 e3 ae 4f 45 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 93 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #399: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0586 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a903c0 | handling event EVENT_RETRANSMIT for parent state #392 | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #392 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #392 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49676.054437; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500246 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #392 | libevent_malloc: new ptr-libevent@0x7fb344008e30 size 128 "road-eastnet-nonat-140" #392: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #392) | 10 0f ce a6 80 60 53 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 7c dc 39 42 03 83 1d fc 78 1f a6 0a 82 be ac | 8c 3b 39 1b 2f 80 e7 cb aa b0 35 db d6 f3 de 35 | 37 b1 68 f3 68 1d 2d f4 b0 35 cc 7b dc 22 05 f9 | b7 af f7 1d a4 46 4d 00 a0 fe ea 26 a2 f9 9b 9a | 09 ee 3f e6 65 a7 03 64 d2 2c 26 ad b0 0a b6 6c | b7 a6 17 d4 6e a3 92 2f 34 cc d4 54 77 6b ca 57 | d5 59 3b bf 54 fe aa b8 9e 19 8b 0b 05 8a f7 be | fc d0 1b 7e ca 71 b1 c1 02 6a 82 df ef f5 65 97 | da 1e 51 41 e3 d8 f1 96 c4 03 03 bd 8f 10 04 b2 | c3 58 82 7f ce 35 78 05 db 11 6d 1f 95 52 d4 56 | 49 d1 80 fa 2e f3 ac 1f 38 a0 e5 d5 81 e9 34 d8 | 41 7f 2d 0d 61 dd 7b e7 44 a4 89 c9 0c 7d 05 e4 | 9f 1e 2d 40 16 34 e0 f0 2c f0 ca 39 ea 5a 9b 3c | e7 ee 11 8b d0 d0 71 64 02 96 00 c1 27 19 8e 75 | f0 b3 d3 5e 45 6f c3 79 42 e7 20 9d b5 0d 76 ff | e5 ba 64 52 91 7f bb 6e bc 95 4c d1 a1 34 da e7 | 29 00 00 24 27 55 30 76 6e b8 e9 20 0f 49 9d 0e | 6c f7 55 67 5b a0 fb d4 e7 df 75 53 94 42 2e 19 | d9 ae ec a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 0f f0 e9 84 b6 f5 5d 7e 1b 97 d7 | 89 b2 50 d4 36 fd 91 50 00 00 00 1c 00 00 40 05 | 93 22 be de f9 76 c2 04 2a 35 c8 fb 20 98 3d d6 | 50 a7 79 8d | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a903c0 | #392 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 0f ce a6 80 60 53 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #392 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #392 | rejected packet: | 10 0f ce a6 80 60 53 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #392: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #291 | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #291 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #291 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49676.058754; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005414 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a903c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #291 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-39" #291: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #291) | 77 85 93 ea 80 0c b0 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 1c 76 58 29 75 7e d4 f4 bf 59 3f 6e da 30 13 | 97 91 e5 4d 2a 44 30 c6 77 2b e1 aa 90 8a 91 6e | f8 8f d9 e7 ab d5 fb c9 18 4a c7 0e 37 35 b2 f0 | a3 12 8b 8a 64 ba 60 9e 98 18 5b 0a c2 a4 de 16 | 9c ef 90 7b a5 b4 e5 01 26 3c 58 d0 37 33 d3 a2 | f6 fe 76 4d 01 cd 2b d6 3c be b9 eb 0d 8b d4 d7 | c4 c5 12 bf 64 f2 4f a2 ec 8b b1 e0 3a c2 a2 21 | f4 b9 1a d7 ab ef 1a 0d f1 e1 8b 50 27 cf 98 3e | c2 08 00 e6 03 cf bf ee 86 72 2a aa f9 36 e9 49 | e2 ab b6 47 68 84 b5 9d f0 67 c8 08 03 1b 51 9a | 44 fe 69 c7 87 64 78 4a b7 c0 08 da 1d ee c0 bb | be c8 5e a1 c1 cc 41 ab 33 ca fd ed d6 b3 7c b1 | a7 a2 c7 36 15 58 52 6a 99 ee 8c 84 f7 78 81 e9 | 01 61 49 76 ce 6b ac b8 4a dc 03 3e 4e 23 ba 57 | f4 01 5b 74 05 72 0c 07 03 e6 2a 5d b3 8c b8 ef | e7 cd d3 38 e6 37 e3 80 1e bc 5b 24 b7 a5 cb 2c | 29 00 00 24 37 f4 21 d3 cc 8d d5 11 a4 01 4c 20 | b4 32 01 c8 03 d8 fb 70 07 27 01 09 a0 70 e5 36 | d3 fe b6 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 76 dc 7a b2 16 bf 01 10 e9 6f f4 | 8e 92 4c 8c 19 0f b1 8b 00 00 00 1c 00 00 40 05 | 48 a8 ae 2a a4 d2 aa 19 46 f9 d2 d9 d7 e1 ad a4 | ae e0 ac b4 | libevent_free: release ptr-libevent@0x7fb364008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #291 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 85 93 ea 80 0c b0 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #291 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #291 | rejected packet: | 77 85 93 ea 80 0c b0 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #291: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #371 | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #371 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #371 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49676.097128; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002934 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #371 | libevent_malloc: new ptr-libevent@0x7fb364008e30 size 128 "road-eastnet-nonat-119" #371: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #371) | ea d3 d9 fc 5b 7e b4 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 af 47 0e 69 de 58 3a 2d 1e 57 76 30 bc 22 a4 | 2e b6 88 1e b3 88 e7 a1 c8 be 2b 4e 69 e2 28 01 | d0 52 c1 fa 78 94 10 52 aa 87 89 5a 02 a4 2d d1 | 6b d9 9b 86 d2 da a0 98 26 8e b9 2f 8a a2 27 af | de 72 28 ad 98 97 b6 15 90 9c ae 3a 16 ae 38 00 | 2e 00 fb 22 bb 46 e6 d4 1f 46 0d dd a1 55 00 4a | ce 15 02 1f 97 d1 0a 8b 6a 9c c8 a8 24 2f 84 76 | 4b d2 ac 8c 05 c7 63 26 60 5d b2 3c e7 66 a9 5d | bd fb b9 24 84 be 9f 9f d0 98 db 75 76 42 5a 2c | 99 3f 96 7c cd 86 57 c4 8b f7 47 04 8d 56 1e 36 | 87 53 98 86 58 32 c9 ce 17 26 19 6b 99 a4 da aa | cb 3c 40 8e 29 32 f1 cd b7 5a 34 1f de 2b 31 8c | 0d 44 f0 ee 94 1a 31 39 88 2c 28 df 02 20 48 5d | 9d 67 4b c6 5a 1a 30 81 19 09 4e 1b ac 9d a3 80 | 78 a7 b1 0a 79 f2 60 13 6a a0 1a 0d 01 b3 b3 40 | 74 bb ba 1f 20 2b 3c 36 9e 56 74 1c ba 16 9e 5f | 29 00 00 24 c2 25 48 18 a9 32 86 16 98 b5 8a 9d | 56 ab 3c 59 82 6e f2 93 a8 6a ca 20 09 df d9 6f | aa 1d 6f e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 eb 88 f4 ae c4 a3 7b f7 07 ac 42 | 0d c0 83 df c2 98 39 e6 00 00 00 1c 00 00 40 05 | 0c 73 7d f6 90 2f 67 26 fc 28 2f df 9c 80 3e da | bc 60 3a 9d | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #371 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea d3 d9 fc 5b 7e b4 e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #371 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #371 | rejected packet: | ea d3 d9 fc 5b 7e b4 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #371: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384015160 | handling event EVENT_RETRANSMIT for parent state #385 | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #385 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #385 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49676.099476; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00163 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #385 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 "road-eastnet-nonat-133" #385: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #385) | dc 0d 67 a5 b0 49 95 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 d2 87 4f 28 1e d2 9a 8d 89 1b 83 29 19 de f5 | e6 63 09 2d e2 e9 61 46 d1 7b 1d 91 3c 38 a6 0f | e9 63 cf 58 08 13 3f 3e 7d f1 19 3d 13 fc 34 b5 | 18 8a e7 0c f9 3c 2c 71 b0 34 a4 05 97 a5 9f c7 | 97 d1 e4 25 37 22 ef 17 fb 52 35 c9 4f 1f 26 16 | 3c 2a 1f 00 10 3c df 46 38 33 44 5d a6 92 e5 d5 | 69 68 b5 76 06 e3 77 b8 1e 01 65 43 01 c9 86 ef | da 65 a5 1f 57 b0 00 8a de a9 34 23 2e 5c 26 a6 | a0 7f 44 a7 f5 75 dd 87 e1 fa 95 ca ff 5e 20 3b | 92 ff 19 e9 6e 3b 74 90 7d f7 38 58 ce a4 6e 3e | 22 98 35 57 a7 19 32 26 90 4e 72 85 8e fc 44 0f | e3 30 88 10 65 63 68 a3 81 e7 a5 04 d1 cf 06 2d | 36 a6 35 6b fb 1a c6 21 82 6b b4 50 a3 0b 89 0a | 70 f4 46 4d b9 30 8c 1b 9a a3 3e a4 57 bb 51 f0 | c0 0a 2a ca 36 ae b3 f0 02 3c c8 b5 bb 6a 7b 96 | 55 84 4d bb 15 b3 47 cf cd 45 3c 4a e8 4b 8f 89 | 29 00 00 24 90 a0 a9 10 09 5c 84 13 2a 39 8b 57 | c5 67 7f 3e 0b 64 03 36 1d 0d c2 a2 27 b3 44 c5 | 83 b2 09 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 9a 97 66 55 a8 9e d7 24 ff 14 54 | 09 c0 45 ac a1 60 51 9f 00 00 00 1c 00 00 40 05 | da 5c 4e 27 00 47 9e f2 1c fc 63 30 21 b4 79 d8 | 3b 38 4e b8 | libevent_free: release ptr-libevent@0x7fb384020ef0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384015160 | #385 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 0d 67 a5 b0 49 95 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #385 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #385 | rejected packet: | dc 0d 67 a5 b0 49 95 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #385: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1af10 | handling event EVENT_RETRANSMIT for parent state #148 | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #148 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #148 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49676.10478; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00727 exceeds limit? YES "road-eastnet-nonat-148" #148: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-148" #148: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #400 at 0x557d46a9d280 | State DB: adding IKEv2 state #400 in UNDEFINED | pstats #400 ikev2.ike started | Message ID: init #400: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #400: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #400; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-148" #400: initiating v2 parent SA to replace #148 | using existing local IKE proposals for connection road-eastnet-nonat-148 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 400 for state #400 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb384015160 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #400 | libevent_malloc: new ptr-libevent@0x7fb384020ef0 size 128 | #400 spent 0.0899 milliseconds in ikev2_parent_outI1() | crypto helper 3 resuming | RESET processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 starting work-order 400 for state #400 | start processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 400 | pstats #148 ikev2.ike failed too-many-retransmits | pstats #148 ikev2.ike deleted too-many-retransmits | #148 spent 2.59 milliseconds in total | [RE]START processing: state #148 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-148" #148: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #148: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #148 "road-eastnet-nonat-148" #148: deleting IKE SA for connection 'road-eastnet-nonat-148' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-148' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-148 | State DB: deleting IKEv2 state #148 in PARENT_I1 | parent state #148: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #148 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 400 time elapsed 0.001036 seconds | libevent_free: release ptr-libevent@0x7fb348035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1af10 | in statetime_stop() and could not find #148 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#400) spent 1.04 milliseconds in crypto helper computing work-order 400: ikev2_outI1 KE (pcr) | processing global timer EVENT_REVIVE_CONNS | crypto helper 3 sending results from work-order 400 for state #400 to event queue Initiating connection road-eastnet-nonat-148 which received a Delete/Notify but must remain up per local policy | scheduling resume sending helper answer for #400 | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7fb338023e10 size 128 | crypto helper 3 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-148" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-148' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-148" | stop processing: connection "road-eastnet-nonat-148" (in initiate_a_connection() at initiate.c:349) | spent 0.0641 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #400 | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 400 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #400 | **emit ISAKMP Message: | initiator cookie: | 6c f1 c2 e4 ca 88 89 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-148 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2a 14 1f bf 2d 44 6c 78 3f 86 f8 f3 fa a1 a5 9d | ikev2 g^x a0 a8 08 62 76 01 cc db f3 4e 4a c1 03 ae f2 db | ikev2 g^x c6 06 da 1a 15 ae 3e f9 fa b6 70 0f b3 7b e5 34 | ikev2 g^x 8d 5b 06 20 ef d4 aa 62 0d d5 a9 7d 3d 49 08 95 | ikev2 g^x 77 51 97 14 c6 fe 13 ee ee 9b f0 54 56 73 79 30 | ikev2 g^x ad d7 b3 17 12 47 8d 8d e8 49 20 41 18 2a 1c c8 | ikev2 g^x c4 68 99 45 f4 b5 f1 6d d9 34 ec 8a e3 80 cc 67 | ikev2 g^x 30 b6 d6 0d 11 9e 86 7f 87 2f c0 73 7c 40 eb 31 | ikev2 g^x 24 34 89 0e ca 7b 62 d2 f6 17 85 8f 75 81 28 9b | ikev2 g^x 1c a9 03 80 8d 78 61 63 07 3b b3 b9 c4 40 46 d5 | ikev2 g^x ab 82 5f da 4c aa ce 61 bb ab c0 1a 00 85 50 e6 | ikev2 g^x e8 f6 9f c8 7f 01 8e 16 ac 04 56 78 cf 7c 43 a9 | ikev2 g^x f9 c7 26 fb 06 32 92 98 86 3f 37 ca f2 f2 fc bf | ikev2 g^x 1d e3 ee 48 e8 25 74 7d 16 d9 38 6e ca e9 38 51 | ikev2 g^x 44 22 32 93 01 95 d0 87 12 07 ff 4c 7e 49 f3 04 | ikev2 g^x 98 50 fe 91 bd 78 84 00 92 17 d7 f5 e0 e1 d0 43 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce aa 21 0d 2f 8b 5a 11 5c 7a 19 73 4d 8f 68 86 24 | IKEv2 nonce 6a ba 53 0b 82 59 c5 5c 31 b4 eb 7e 18 78 2e 54 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6c f1 c2 e4 ca 88 89 65 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 94 | natd_hash: port= 01 f4 | natd_hash: hash= 24 82 bc d9 51 57 ae 67 73 5e 22 78 a2 06 a4 b1 | natd_hash: hash= df 07 78 c3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 24 82 bc d9 51 57 ae 67 73 5e 22 78 a2 06 a4 b1 | Notify data df 07 78 c3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6c f1 c2 e4 ca 88 89 65 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 48 01 58 d1 13 9f 6e 34 06 7b 6e f6 08 2f fa 1f | natd_hash: hash= f9 ef b6 96 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 48 01 58 d1 13 9f 6e 34 06 7b 6e f6 08 2f fa 1f | Notify data f9 ef b6 96 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #400 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #400: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #400 to 4294967295 after switching state | Message ID: IKE #400 skipping update_recv as MD is fake | Message ID: sent #400 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-148" #400: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.148:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #400) | 6c f1 c2 e4 ca 88 89 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 14 1f bf 2d 44 6c 78 3f 86 f8 f3 fa a1 a5 9d | a0 a8 08 62 76 01 cc db f3 4e 4a c1 03 ae f2 db | c6 06 da 1a 15 ae 3e f9 fa b6 70 0f b3 7b e5 34 | 8d 5b 06 20 ef d4 aa 62 0d d5 a9 7d 3d 49 08 95 | 77 51 97 14 c6 fe 13 ee ee 9b f0 54 56 73 79 30 | ad d7 b3 17 12 47 8d 8d e8 49 20 41 18 2a 1c c8 | c4 68 99 45 f4 b5 f1 6d d9 34 ec 8a e3 80 cc 67 | 30 b6 d6 0d 11 9e 86 7f 87 2f c0 73 7c 40 eb 31 | 24 34 89 0e ca 7b 62 d2 f6 17 85 8f 75 81 28 9b | 1c a9 03 80 8d 78 61 63 07 3b b3 b9 c4 40 46 d5 | ab 82 5f da 4c aa ce 61 bb ab c0 1a 00 85 50 e6 | e8 f6 9f c8 7f 01 8e 16 ac 04 56 78 cf 7c 43 a9 | f9 c7 26 fb 06 32 92 98 86 3f 37 ca f2 f2 fc bf | 1d e3 ee 48 e8 25 74 7d 16 d9 38 6e ca e9 38 51 | 44 22 32 93 01 95 d0 87 12 07 ff 4c 7e 49 f3 04 | 98 50 fe 91 bd 78 84 00 92 17 d7 f5 e0 e1 d0 43 | 29 00 00 24 aa 21 0d 2f 8b 5a 11 5c 7a 19 73 4d | 8f 68 86 24 6a ba 53 0b 82 59 c5 5c 31 b4 eb 7e | 18 78 2e 54 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 82 bc d9 51 57 ae 67 73 5e 22 78 | a2 06 a4 b1 df 07 78 c3 00 00 00 1c 00 00 40 05 | 48 01 58 d1 13 9f 6e 34 06 7b 6e f6 08 2f fa 1f | f9 ef b6 96 | state #400 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb384020ef0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb384015160 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384015160 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #400 | libevent_malloc: new ptr-libevent@0x7fb348035930 size 128 | #400 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49676.10644 | resume sending helper answer for #400 suppresed complete_v2_state_transition() and stole MD | #400 spent 0.359 milliseconds in resume sending helper answer | stop processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb338023e10 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c f1 c2 e4 ca 88 89 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #400 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #400 | rejected packet: | 6c f1 c2 e4 ca 88 89 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 94 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #400: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a34e10 | handling event EVENT_RETRANSMIT for parent state #393 | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #393 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #393 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49676.117615; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501009 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33801d710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #393 | libevent_malloc: new ptr-libevent@0x7fb338023e10 size 128 "road-eastnet-nonat-141" #393: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #393) | d2 4f c7 97 0e 2c 3e ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 57 42 91 f9 c0 06 25 d3 5e c6 ff a0 b9 c7 9a | f8 73 f5 52 ea b3 b7 0b 33 79 a9 ab be 94 f5 d3 | 47 a2 ed 3f 30 d5 f5 d7 c5 7f 9d d3 ed 4d a0 b4 | f7 ad a1 76 18 49 17 db 8a b9 cb ed 58 a9 0c d9 | 5a 76 b8 cb 07 f9 85 e7 ea fe 63 f8 ee 0b 16 50 | 8f 7f 23 44 74 8a 56 f9 51 93 d3 d4 1e a9 e0 6d | d7 af c4 1a 46 a4 66 f8 55 f1 fc bb 79 62 df 34 | 8f ee 1b 57 26 7e c4 de 20 f4 80 c2 d6 80 72 a1 | aa 53 f1 e8 e4 e6 1c e7 0b 29 98 85 7a 59 d5 aa | 68 b0 88 b1 b9 15 73 53 b5 6a 19 c9 ae 48 c5 a2 | 01 52 4f ea f5 c9 9f b8 90 37 cc 56 4f 8d 78 b9 | 10 dc d8 56 42 a7 88 d4 9d 82 8e d9 33 ab ac 86 | 5e b8 f6 d0 8e 0c aa b2 4f 41 73 62 f2 0c c2 27 | ef ba c6 42 e2 bb a6 b0 c4 15 d3 04 4c 56 e0 5c | ad 92 8b ed ed ba dd c2 b7 4a 92 54 4a ae d4 37 | c3 0d 4f 7c 37 7e 0b 49 1e 1d 38 1e 4b 41 b4 43 | 29 00 00 24 f4 b5 fb 56 01 5f ac 00 1d 31 6b d7 | 01 8d f2 d0 3f 15 27 39 dc 6b 31 7e 82 50 a3 bb | 9c f0 ec f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 9c 87 ea bd bf 36 3e cf 82 b1 7a | 78 3f f7 57 2c cf 08 1f 00 00 00 1c 00 00 40 05 | 77 3b 5d 4c 9c 3f 6e 8a 01 7a d1 9c 5b 89 36 dc | 10 f8 1f e1 | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a34e10 | #393 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 4f c7 97 0e 2c 3e ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #393 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #393 | rejected packet: | d2 4f c7 97 0e 2c 3e ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #393: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_RETRANSMIT for parent state #292 | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #292 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #292 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49676.127969; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006403 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a34e10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #292 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 "road-eastnet-nonat-40" #292: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #292) | 87 88 51 7a 60 9d 5a 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 66 a0 4d 60 cb 65 95 3c 93 0d 5e 54 74 22 d5 | b9 4e e2 32 b5 97 c3 a0 c6 6f 16 29 09 b8 29 a7 | 53 85 60 d3 38 df d9 0c a3 64 8e 65 05 77 b2 87 | 1b 54 26 e9 27 44 44 33 65 9f 3e a3 6d dc 58 a3 | 3c 1b b5 56 27 64 d7 00 90 21 cd 7d 46 ab 11 af | ba 96 a3 c8 ee 97 85 92 75 7b ec 2d df 79 07 56 | 45 a8 e2 68 58 3f 02 db 14 25 0e 1f 9b c2 bb 05 | 5a 26 d6 ed 51 8a 97 6d 65 fb 55 2b bb 16 61 e4 | de 73 b2 ef 70 09 3d 76 f2 05 da 1e bd 6c 49 e0 | 44 ef e7 7e 74 41 a3 f7 8a 2e 4b 16 50 e8 de e0 | a4 17 3e ac 86 b1 62 63 2e 1c a5 2b dc 13 3a ee | 9b a0 c2 94 2b ba 80 4c 0b 59 f3 60 75 ff 33 5f | 0b 97 1a 30 63 32 07 17 5c 59 1a 4a db 49 f2 ef | 1e b6 76 4d ca 87 ea 08 32 6d 49 4e d6 81 ee 4c | c7 58 d6 e6 53 ab c7 5b 58 9e 4a 36 b9 18 48 a2 | 61 0a 77 8a 15 c7 1b 51 f1 d5 e0 50 5a 9b 7a 98 | 29 00 00 24 b6 37 4c f0 c9 85 b2 01 0e 7e 3e 08 | 4a 99 af 96 7f b4 c9 1d 28 51 f7 8e 73 35 20 22 | 15 78 52 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 e7 d2 e3 15 0a 06 f3 99 b1 c4 ad | 55 e8 07 46 e3 af eb 45 00 00 00 1c 00 00 40 05 | 9e 69 62 01 15 f2 f4 fe 05 57 a2 2c 87 7a 71 d0 | 0c f9 69 7d | libevent_free: release ptr-libevent@0x7fb36004b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | #292 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 88 51 7a 60 9d 5a 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #292 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #292 | rejected packet: | 87 88 51 7a 60 9d 5a 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #292: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370012bf0 | handling event EVENT_RETRANSMIT for parent state #346 | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #346 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #346 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49676.138357; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003131 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #346 | libevent_malloc: new ptr-libevent@0x7fb36004b850 size 128 "road-eastnet-nonat-94" #346: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #346) | 5b 73 99 01 85 6b a6 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 41 a4 66 03 78 2f 0c ac 28 0c 6f a0 f5 98 a8 | ad fe 06 fd 8c a4 d4 c6 03 17 f9 3c ee f7 59 ef | a4 19 f6 d6 98 a9 45 18 c4 fa 1a 04 5e 12 ad 25 | a2 eb 73 ff 50 f7 5b d9 ac 0d a3 60 63 86 dc 11 | 24 c2 5c cb 2a 8c 8f dd 11 7a 54 9c db e5 07 72 | 1d 04 b8 06 80 b0 2c 7d 70 61 0f 2e ec 51 90 ed | 50 75 e9 44 ba 97 aa c3 93 f0 e7 8e a0 59 5a ef | f5 79 47 07 02 c6 5c 62 a1 be 60 af ef 55 0d f9 | 00 ac 18 13 2d 62 0e 5a 5f 40 32 8a 49 30 5f 84 | 37 da 16 c6 63 1e a6 4e a5 65 94 59 c6 7a b2 c5 | 75 c7 8f 68 de d4 77 8e 92 40 c9 5c ee b4 80 ea | 42 78 86 4f 14 c5 47 55 13 d1 41 8b fd ef 2c 61 | b8 ff 39 92 97 ea a2 69 91 9d 1f f6 fd bd a6 d6 | 98 cc 57 23 b2 ed be c2 71 55 a4 d5 18 54 fe df | 4d ab de e9 5b 44 57 81 1d 33 6c d4 fe 06 43 32 | b0 07 7c ba 8d 9c bd 13 85 9c b0 70 80 5b 02 74 | 29 00 00 24 86 39 a6 9d e4 88 31 1e 1a 48 0c df | 5d 51 c2 7f eb 35 e1 75 45 71 5e 9b 45 ec 98 56 | 3e 47 8a 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 d4 6c 5c e3 02 f1 ae 0d a6 ae 25 | 4a 2c de d9 71 00 3f 70 00 00 00 1c 00 00 40 05 | 9a e2 a2 47 57 d0 42 27 78 4a 19 6f 7e 1c 29 7f | 7a 88 26 9b | libevent_free: release ptr-libevent@0x7fb35c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370012bf0 | #346 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5b 73 99 01 85 6b a6 c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #346 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #346 | rejected packet: | 5b 73 99 01 85 6b a6 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #346: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800cc10 | handling event EVENT_RETRANSMIT for parent state #386 | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #386 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #386 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49676.158733; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001643 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370012bf0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #386 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 "road-eastnet-nonat-134" #386: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #386) | b9 e2 f3 4f 37 4c 11 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f da ec b0 32 6b 35 e3 b5 80 95 66 e9 7f b8 d5 | e2 e0 68 33 cd 76 e0 38 1a b1 5d 56 26 da 9f e0 | 7e 25 7d 36 13 86 62 f1 2c 8d 3f 33 c2 a9 77 5c | 6c 22 2c d9 e8 13 05 5f 5c b6 bf 2d 06 59 25 68 | 04 0a 7e 77 39 77 e2 48 8e 95 f3 7a 6b 62 7a 5c | 74 73 02 c5 eb 3d 85 b2 e4 97 e2 a5 7e c1 fd bd | 8e 39 16 68 05 dd bf 87 fa 57 12 1c 04 ca 0c 29 | 8c f4 e1 ff dd 36 cf 70 de cd 23 dc c6 ae 0f aa | 3b 0f fa f5 80 72 1a cd 74 ba bc e4 a4 6c a0 e3 | 89 9a 36 59 db 27 b5 54 3f 8a aa cb ee 7a 4c 74 | 10 ef 6c 33 3c 46 b9 be 98 4b 1f 0c 9e a1 0f e7 | 70 9c 48 fc 41 5f bc 21 01 43 4c 8e f5 9c e5 23 | bb 93 4c ac ba 5c 01 89 9a 17 4a 24 a8 b9 2c 47 | 70 fc 07 f1 21 a4 d5 20 f9 8f f8 38 ce d5 70 b1 | 42 c9 99 11 ba 5a fc 0c 06 b5 ae ff af e4 68 aa | d7 82 77 58 85 4e fc 74 00 fa 00 8a 91 15 50 9e | 29 00 00 24 84 96 aa 5e b5 f6 6f 99 c5 43 c7 51 | b3 36 1c 3e 65 fe 9c e9 3e a8 cd 03 a7 c9 e1 a9 | 36 56 0e 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 80 4a c6 9c b6 70 28 5d 0a 3a 23 | 72 63 d0 38 6e f2 8f ca 00 00 00 1c 00 00 40 05 | 26 1f 03 bb d7 50 8e c5 c4 3f 03 d2 3a c8 fe 3b | 09 a1 da 1f | libevent_free: release ptr-libevent@0x7fb33801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800cc10 | #386 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 e2 f3 4f 37 4c 11 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #386 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #386 | rejected packet: | b9 e2 f3 4f 37 4c 11 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #386: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a94540 | handling event EVENT_RETRANSMIT for parent state #372 | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #372 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #372 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49676.166031; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003285 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #372 | libevent_malloc: new ptr-libevent@0x7fb33801a4e0 size 128 "road-eastnet-nonat-120" #372: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #372) | 36 75 19 e8 2f 22 a4 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 1c 43 17 d7 b5 ce d2 b8 29 b2 bf 57 09 8b a5 | 02 ac c4 b7 76 e6 2d d8 ee ee 3c fe f4 66 f4 89 | f0 05 d4 6f 70 58 f2 ac a3 f6 a0 c0 6f e2 88 9c | 40 3f 21 b6 b5 e3 53 20 6c d9 59 5c d3 ed 29 31 | 70 b1 e2 00 f7 0a fb f6 8a 39 29 d2 58 c2 74 92 | 4c 9b 08 3f 44 b8 04 b0 23 1d ad 99 96 41 5c c3 | 74 17 1f 67 0a d8 d1 96 a3 e0 b8 c3 31 5e 35 15 | b4 7d 07 ac 51 6c 39 25 b1 04 61 4c b1 08 c3 a9 | 03 2e 6c 07 f6 12 ea 26 ae ed 42 10 86 bf 00 1f | 2c 3f d3 c3 05 31 1b 23 d0 7f 44 40 17 23 be b1 | ac f2 d9 5c 2d 0f 0e 8d d6 8e 02 9e c2 0d 39 2a | 1e 53 92 9d 45 7f f8 25 a0 3b 40 14 ce aa d7 8e | 3c 97 d8 0a 68 34 c5 e0 01 c0 9d 3c df ab b9 db | 0f 08 4e 9b 7f 31 ba b0 df 14 c3 2e b6 43 df 9c | e8 24 93 e8 93 fa be d8 05 20 58 54 dc 18 b6 a1 | 81 c2 54 d8 9d 63 fd 0b 60 e1 78 75 ef 13 d9 ec | 29 00 00 24 5b 70 e2 22 fb be c5 61 40 e7 92 1f | fe 03 7b 3d 26 2b 9e 50 62 fe 14 ef 7e 0b e5 c1 | 7b 5b 83 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6f bb b6 72 03 25 00 b3 08 33 f3 00 | 3f a7 05 f9 e6 64 00 bb 00 00 00 1c 00 00 40 05 | 5c 2b 76 69 54 27 3e cb 36 ec 86 9b 13 f7 89 7b | 0b 66 55 89 | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94540 | #372 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 75 19 e8 2f 22 a4 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #372 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #372 | rejected packet: | 36 75 19 e8 2f 22 a4 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #372: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0ea80 | handling event EVENT_RETRANSMIT for parent state #149 | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #149 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #149 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49676.17133; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006621 exceeds limit? YES "road-eastnet-nonat-149" #149: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-149" #149: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #401 at 0x557d46a9e840 | State DB: adding IKEv2 state #401 in UNDEFINED | pstats #401 ikev2.ike started | Message ID: init #401: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #401: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #401; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-149" #401: initiating v2 parent SA to replace #149 | using existing local IKE proposals for connection road-eastnet-nonat-149 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 401 for state #401 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a94540 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #401 | libevent_malloc: new ptr-libevent@0x7fb388006900 size 128 | #401 spent 0.069 milliseconds in ikev2_parent_outI1() | RESET processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 resuming | crypto helper 1 starting work-order 401 for state #401 | start processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 401 | pstats #149 ikev2.ike failed too-many-retransmits | pstats #149 ikev2.ike deleted too-many-retransmits | #149 spent 2.51 milliseconds in total | [RE]START processing: state #149 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-149" #149: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #149: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #149 "road-eastnet-nonat-149" #149: deleting IKE SA for connection 'road-eastnet-nonat-149' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-149' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-149 | State DB: deleting IKEv2 state #149 in PARENT_I1 | parent state #149: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #149 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb36c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0ea80 | in statetime_stop() and could not find #149 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 401 time elapsed 0.000995 seconds Initiating connection road-eastnet-nonat-149 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | (#401) spent 1.06 milliseconds in crypto helper computing work-order 401: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 401 for state #401 to event queue | scheduling resume sending helper answer for #401 | libevent_malloc: new ptr-libevent@0x7fb3880269d0 size 128 | crypto helper 1 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-149" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-149' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-149" | stop processing: connection "road-eastnet-nonat-149" (in initiate_a_connection() at initiate.c:349) | spent 0.0911 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #401 | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 401 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #401 | **emit ISAKMP Message: | initiator cookie: | 32 2a 52 53 b6 80 03 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-149 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c3 23 97 0d 57 1e 4b f9 07 88 66 bf 34 6e 58 4c | ikev2 g^x e6 20 66 15 d1 8b df 5a d2 2b 70 66 bf e5 46 ee | ikev2 g^x 75 f4 eb 71 1f f1 6f e1 d6 58 06 0a 4d 97 04 53 | ikev2 g^x 74 d3 7a 62 9c 6d fc 73 97 9b c2 cb c3 d3 cb d1 | ikev2 g^x a7 2a 8a bf ad 15 46 4b ac 4a 21 e7 16 cd 32 18 | ikev2 g^x f6 83 ab c8 99 38 21 bc e5 81 05 3f fc e4 b5 9f | ikev2 g^x 7d 77 82 93 0f 69 5a af 5b c2 81 88 55 f6 fa cc | ikev2 g^x 86 fe 2d 7e 6d ae 3a 9b 57 e6 de 78 5a 36 ba 60 | ikev2 g^x 3d 56 da 1d 5d 7b 85 49 92 79 e6 7c 62 e6 ba 39 | ikev2 g^x 70 40 1b 2f 31 49 fc c6 d5 8b 43 aa e6 2d 80 f1 | ikev2 g^x 00 4e 8e 1a 05 73 d3 15 0d 7c 1c 15 71 3b 45 0a | ikev2 g^x 71 47 01 7c 8b 3a 4c 28 d2 c5 72 06 09 34 70 7a | ikev2 g^x 6f eb 8d 51 fc f9 d9 92 d1 00 53 57 7a 80 e8 39 | ikev2 g^x 37 38 0d 62 49 b3 0f 75 c3 ee 8b a3 66 04 51 8d | ikev2 g^x 4d ca 16 c5 dc 18 bd ee 26 01 0f c7 9b e6 0b 35 | ikev2 g^x e3 5e 44 0d 5e 45 e9 f2 25 03 56 4f 95 a8 57 74 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 98 0f af 0d 18 0d 49 ab 74 8d 40 09 a9 19 04 ac | IKEv2 nonce c2 29 19 2a e5 21 dd 83 5a 09 3e 6b 71 16 78 8b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 32 2a 52 53 b6 80 03 68 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 95 | natd_hash: port= 01 f4 | natd_hash: hash= 3e 5b 75 e0 fb 06 ab 59 93 2a 0c bc 70 9d 3c 6c | natd_hash: hash= 4b 98 95 ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3e 5b 75 e0 fb 06 ab 59 93 2a 0c bc 70 9d 3c 6c | Notify data 4b 98 95 ed | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 32 2a 52 53 b6 80 03 68 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 06 0c a6 cc 70 cf f8 01 75 5d 68 14 0f cc 7e 89 | natd_hash: hash= 81 50 60 0f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 06 0c a6 cc 70 cf f8 01 75 5d 68 14 0f cc 7e 89 | Notify data 81 50 60 0f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #401 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #401: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #401 to 4294967295 after switching state | Message ID: IKE #401 skipping update_recv as MD is fake | Message ID: sent #401 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-149" #401: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.149:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #401) | 32 2a 52 53 b6 80 03 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 23 97 0d 57 1e 4b f9 07 88 66 bf 34 6e 58 4c | e6 20 66 15 d1 8b df 5a d2 2b 70 66 bf e5 46 ee | 75 f4 eb 71 1f f1 6f e1 d6 58 06 0a 4d 97 04 53 | 74 d3 7a 62 9c 6d fc 73 97 9b c2 cb c3 d3 cb d1 | a7 2a 8a bf ad 15 46 4b ac 4a 21 e7 16 cd 32 18 | f6 83 ab c8 99 38 21 bc e5 81 05 3f fc e4 b5 9f | 7d 77 82 93 0f 69 5a af 5b c2 81 88 55 f6 fa cc | 86 fe 2d 7e 6d ae 3a 9b 57 e6 de 78 5a 36 ba 60 | 3d 56 da 1d 5d 7b 85 49 92 79 e6 7c 62 e6 ba 39 | 70 40 1b 2f 31 49 fc c6 d5 8b 43 aa e6 2d 80 f1 | 00 4e 8e 1a 05 73 d3 15 0d 7c 1c 15 71 3b 45 0a | 71 47 01 7c 8b 3a 4c 28 d2 c5 72 06 09 34 70 7a | 6f eb 8d 51 fc f9 d9 92 d1 00 53 57 7a 80 e8 39 | 37 38 0d 62 49 b3 0f 75 c3 ee 8b a3 66 04 51 8d | 4d ca 16 c5 dc 18 bd ee 26 01 0f c7 9b e6 0b 35 | e3 5e 44 0d 5e 45 e9 f2 25 03 56 4f 95 a8 57 74 | 29 00 00 24 98 0f af 0d 18 0d 49 ab 74 8d 40 09 | a9 19 04 ac c2 29 19 2a e5 21 dd 83 5a 09 3e 6b | 71 16 78 8b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 5b 75 e0 fb 06 ab 59 93 2a 0c bc | 70 9d 3c 6c 4b 98 95 ed 00 00 00 1c 00 00 40 05 | 06 0c a6 cc 70 cf f8 01 75 5d 68 14 0f cc 7e 89 | 81 50 60 0f | state #401 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388006900 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a94540 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0ea80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #401 | libevent_malloc: new ptr-libevent@0x7fb36c03b0b0 size 128 | #401 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49676.173128 | resume sending helper answer for #401 suppresed complete_v2_state_transition() and stole MD | #401 spent 0.489 milliseconds in resume sending helper answer | stop processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3880269d0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 2a 52 53 b6 80 03 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #401 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #401 | rejected packet: | 32 2a 52 53 b6 80 03 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 95 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #401: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3fc10 | handling event EVENT_RETRANSMIT for parent state #394 | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #394 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #394 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49676.18135; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500155 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1af10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #394 | libevent_malloc: new ptr-libevent@0x7fb3880269d0 size 128 "road-eastnet-nonat-142" #394: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #394) | c6 0a d6 5e 7e fc 84 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 b5 7c 6c c9 f1 d1 76 55 70 0c 53 79 42 59 aa | 1c 78 3a 1c cf 8e ff bf 3c 4f 8e 36 eb fa f5 80 | 9c 26 80 0f 65 74 f8 36 f2 69 55 0c 8f 0e 23 f4 | f2 22 a0 b5 d9 98 7e 1f aa d3 a2 c6 8c ae 8e 98 | 7c 0a f3 ed 8f 8b 88 58 8c d6 33 95 a0 55 9d 22 | 45 bd 30 81 fc 6e e7 86 9a f8 90 92 f7 2d bb 24 | 69 7e b6 2c e3 c4 d3 78 cf 51 21 62 11 c2 15 e2 | b3 a9 82 d8 15 7c 3e 4d bb 85 98 4b 06 e1 32 2f | 7a ee fc 56 3c 9b 3f a7 bb d2 50 44 19 3c 10 75 | d0 ab ea a8 d0 55 74 15 97 4a a8 8a 65 6f 7d 24 | 88 48 f4 59 45 9a aa ed 6e b4 a3 4a 2e c4 97 e3 | ef a9 a3 78 d3 c7 01 a3 80 5f 34 19 5f e9 1a 0b | 22 c3 b3 e4 7b 39 94 40 be d6 c0 25 22 6b 94 43 | 4e 6c a4 23 34 ff 10 49 a6 bf 97 8e b9 5f 55 2d | 28 e5 68 c3 b7 a6 14 92 b7 6a 59 d7 14 cc 2b 2a | 46 b7 9f a5 f7 40 91 f4 58 19 59 a8 c2 3d 8c 54 | 29 00 00 24 48 a4 83 24 df d5 ff 67 2d 1a db a8 | 39 76 5f a5 8c c2 0e 08 ee f5 2b 2a a4 7f 9e 08 | 09 74 ed 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 07 bb 4a c8 d9 c8 75 02 c5 e8 2f | 3d 22 1e b1 bf 8b 35 f7 00 00 00 1c 00 00 40 05 | 6e c1 7a 04 07 74 46 3d 3d f7 4a 09 48 b9 79 2c | 6a b6 13 f4 | libevent_free: release ptr-libevent@0x7fb34001a190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3fc10 | #394 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c6 0a d6 5e 7e fc 84 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #394 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #394 | rejected packet: | c6 0a d6 5e 7e fc 84 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #394: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0703 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #387 | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #387 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #387 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49676.217696; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001683 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3fc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #387 | libevent_malloc: new ptr-libevent@0x7fb34001a190 size 128 "road-eastnet-nonat-135" #387: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #387) | 75 6e e5 e5 6a cd b8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff a4 36 8a d7 5e f8 44 73 70 3f d1 cc 7c 79 90 | 0b d6 30 0a fd 2b 08 93 ae c4 9d c0 92 f3 30 c3 | aa 43 1a b6 dd 00 a6 77 0b 61 7f 7a 6d 22 60 10 | f1 8f 0a bd 4e 21 a1 c5 3c 6d bc 87 58 3a fc 28 | a1 f5 dc 41 f0 99 f6 3d 83 55 3c 93 36 df 67 78 | d6 16 47 a9 dd 0a f6 c9 ed 30 32 20 48 63 8f ce | 8c eb 37 37 cb 50 71 37 bd cb 4b f9 48 98 89 fb | 52 3f d5 c6 89 92 40 89 ae 52 a8 41 db 88 8d ad | 76 89 a2 2c 25 fd cd a1 b3 18 a9 52 92 ca 41 cc | be 86 7c 0a d4 fa d9 2c a1 ce 6b 87 5c 4f 0b a7 | e2 e7 b1 90 b4 88 13 15 0f 2d 50 24 a6 28 8e 8a | 81 90 02 66 38 1d 10 b6 04 db f1 15 7f 9a 7c eb | ec 94 ef 10 22 b8 7f a2 35 e6 24 56 5c e6 40 99 | 8b 09 81 82 27 99 96 55 ae 30 73 4e 23 e9 a5 45 | d0 57 f8 f9 3b 6c 05 9a 46 78 7d b3 62 a4 ed 17 | 2e 15 c3 a2 7d 0c 1c 89 e1 68 08 b6 03 09 76 f8 | 29 00 00 24 11 0e 4a cd 20 fc ce 84 68 c7 a8 ec | 48 5c fe b5 ee 21 2d ef c1 3f a3 a1 30 c1 c0 88 | b1 78 03 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 fb 47 16 eb 64 05 e3 af e5 70 ee | b4 39 fc 1b 30 12 e4 0b 00 00 00 1c 00 00 40 05 | d8 e1 2e 80 87 77 be 81 c0 a4 a8 f5 fc 15 8f 58 | 08 dc e4 8d | libevent_free: release ptr-libevent@0x7fb33803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #387 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 6e e5 e5 6a cd b8 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #387 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #387 | rejected packet: | 75 6e e5 e5 6a cd b8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #387: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45310 | handling event EVENT_RETRANSMIT for parent state #293 | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #293 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #293 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49676.218956; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005135 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #293 | libevent_malloc: new ptr-libevent@0x7fb33803b0b0 size 128 "road-eastnet-nonat-41" #293: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #293) | 98 65 e9 19 f7 80 1b 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 92 fa cc 80 1f 04 ae 31 60 a8 15 7f 6c d4 bb | 0d a3 36 d4 3d 31 2d db c9 a3 65 0b 54 77 b5 90 | 4b f1 85 f9 5b a2 e8 2d 9a 77 1b fe a8 fb ea d0 | 88 2f 01 a5 98 e9 7e 65 f1 01 87 3d 6a 2d 8a 3a | 8e f8 d8 76 3b 1e 19 1d 17 90 3e 76 19 99 52 4a | 6e 00 1d 7b db 96 db 83 88 cd fd 1e bd 7e 5b 89 | ba a0 91 2a b9 ee b5 58 13 b3 5e 5e 59 9d 47 30 | d5 69 4e a7 bd 52 9f d4 e7 9b be ed b8 c7 8e ca | fd 72 11 5d 3c 4e 3f 34 3a cf 63 b2 e1 3a 0c 75 | e0 fd c6 41 05 da 4e 8b 04 c0 eb 84 52 ad 81 69 | 8c d8 b9 f0 3d 70 1f c8 01 a5 b7 5f ee d4 3d 97 | 3f 74 14 bf c1 32 07 23 90 8c c7 74 19 a4 db 67 | e2 81 e3 0a 06 5d bd 34 79 e7 4a 18 70 10 d6 b8 | 84 dc 4f 06 a8 1d f3 4b d5 6f 30 05 6d 56 83 1e | 64 17 96 93 11 0f e7 08 32 35 87 dc fb e0 8f 9f | e0 07 34 5d b8 fb 0d 4c d3 c2 58 00 d5 76 62 90 | 29 00 00 24 6f f2 b6 ca f4 8a a8 b3 ce 34 d7 c6 | a9 bf 42 71 b6 a3 89 33 ed 1d 91 ee 0e 11 98 8d | 12 5e c6 63 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 b6 16 43 43 a6 c6 14 e2 18 67 23 | 58 d4 b6 9a 2d df 39 90 00 00 00 1c 00 00 40 05 | 2a 56 75 a4 c4 51 60 eb 9a b6 a1 bf 9e f8 0f fa | 6b d1 0c 00 | libevent_free: release ptr-libevent@0x7fb358046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45310 | #293 spent 0.0876 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 65 e9 19 f7 80 1b 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #293 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #293 | rejected packet: | 98 65 e9 19 f7 80 1b 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #293: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a32290 | handling event EVENT_RETRANSMIT for parent state #150 | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #150 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #150 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49676.236209; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008503 exceeds limit? YES "road-eastnet-nonat-150" #150: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-150" #150: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #402 at 0x557d46a9fe00 | State DB: adding IKEv2 state #402 in UNDEFINED | pstats #402 ikev2.ike started | Message ID: init #402: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #402: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #402; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-150" #402: initiating v2 parent SA to replace #150 | using existing local IKE proposals for connection road-eastnet-nonat-150 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 402 for state #402 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a45310 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #402 | libevent_malloc: new ptr-libevent@0x7fb358046040 size 128 | #402 spent 0.0982 milliseconds in ikev2_parent_outI1() | crypto helper 2 resuming | crypto helper 2 starting work-order 402 for state #402 | RESET processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 402 | start processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #150 ikev2.ike failed too-many-retransmits | pstats #150 ikev2.ike deleted too-many-retransmits | #150 spent 2.5 milliseconds in total | [RE]START processing: state #150 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-150" #150: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #150: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #150 "road-eastnet-nonat-150" #150: deleting IKE SA for connection 'road-eastnet-nonat-150' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-150' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-150 | State DB: deleting IKEv2 state #150 in PARENT_I1 | parent state #150: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #150 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb37c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a32290 | in statetime_stop() and could not find #150 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 402 time elapsed 0.001016 seconds Initiating connection road-eastnet-nonat-150 which received a Delete/Notify but must remain up per local policy | (#402) spent 1.07 milliseconds in crypto helper computing work-order 402: ikev2_outI1 KE (pcr) | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 2 sending results from work-order 402 for state #402 to event queue | scheduling resume sending helper answer for #402 | libevent_malloc: new ptr-libevent@0x7fb3800269d0 size 128 | crypto helper 2 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-150" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-150' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-150" | stop processing: connection "road-eastnet-nonat-150" (in initiate_a_connection() at initiate.c:349) | spent 0.0954 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #402 | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 402 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #402 | **emit ISAKMP Message: | initiator cookie: | d7 18 0b 56 dd fc 93 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-150 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x de 8f d0 91 ee 0c 2c 6d b1 49 7f e7 a7 c5 b4 b6 | ikev2 g^x ba 26 c6 73 cd 26 6d 07 75 be 09 23 1b d9 66 18 | ikev2 g^x 43 89 72 64 b1 d5 06 ca 9d c0 33 e2 98 5e c1 57 | ikev2 g^x 08 88 8a 2d 7a 4a eb cd 6a ad 0c 5b 60 7a 3c d6 | ikev2 g^x 1b 41 e1 63 95 9d 48 05 85 b8 3e e9 c2 2c 08 fc | ikev2 g^x 0a e1 15 60 ae 51 d5 ec 71 41 de 9c 11 57 49 6c | ikev2 g^x 9b fc 6f 1d 07 87 e1 29 06 e5 0a b9 9d 8f 51 66 | ikev2 g^x de ed ee d7 d1 94 d4 80 f9 c9 b3 72 40 5d 4f 1f | ikev2 g^x e8 51 bc 21 99 7c 48 a4 03 69 7e 36 81 2c 93 c5 | ikev2 g^x 85 f1 72 97 17 d9 4b 16 e1 02 93 16 a0 e9 5a 8c | ikev2 g^x 18 8b 2d 22 a0 68 e9 52 fc 14 55 90 a6 f2 25 49 | ikev2 g^x d1 90 07 21 fd a8 a8 15 db 83 f7 be ce 21 31 d0 | ikev2 g^x 18 03 fd af 89 22 76 d9 16 f9 54 ff a2 a4 03 62 | ikev2 g^x f9 9f ab 74 f4 75 62 99 a7 8b 91 97 ad 9d c4 9c | ikev2 g^x 3e 40 41 dc 60 23 02 31 5e 46 98 d3 1a 73 73 14 | ikev2 g^x dd ff 30 58 0d fa ab 00 11 c3 0b 18 0a c3 bc a2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 22 ce 51 25 1e d0 f6 54 17 83 9f e7 7f a6 b8 56 | IKEv2 nonce 15 08 66 12 32 0f c5 1a 1c 37 04 e4 a3 f5 17 a2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d7 18 0b 56 dd fc 93 82 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 96 | natd_hash: port= 01 f4 | natd_hash: hash= 42 72 8a fb e8 f5 d3 16 73 e6 1b bd ae fd 45 81 | natd_hash: hash= b5 65 c1 51 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 42 72 8a fb e8 f5 d3 16 73 e6 1b bd ae fd 45 81 | Notify data b5 65 c1 51 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d7 18 0b 56 dd fc 93 82 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 63 4e 70 bd 7c b5 4d 3a 8c 2e 79 8c 91 4d 92 d1 | natd_hash: hash= 89 54 24 9e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 63 4e 70 bd 7c b5 4d 3a 8c 2e 79 8c 91 4d 92 d1 | Notify data 89 54 24 9e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #402 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #402: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #402 to 4294967295 after switching state | Message ID: IKE #402 skipping update_recv as MD is fake | Message ID: sent #402 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-150" #402: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.150:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #402) | d7 18 0b 56 dd fc 93 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 8f d0 91 ee 0c 2c 6d b1 49 7f e7 a7 c5 b4 b6 | ba 26 c6 73 cd 26 6d 07 75 be 09 23 1b d9 66 18 | 43 89 72 64 b1 d5 06 ca 9d c0 33 e2 98 5e c1 57 | 08 88 8a 2d 7a 4a eb cd 6a ad 0c 5b 60 7a 3c d6 | 1b 41 e1 63 95 9d 48 05 85 b8 3e e9 c2 2c 08 fc | 0a e1 15 60 ae 51 d5 ec 71 41 de 9c 11 57 49 6c | 9b fc 6f 1d 07 87 e1 29 06 e5 0a b9 9d 8f 51 66 | de ed ee d7 d1 94 d4 80 f9 c9 b3 72 40 5d 4f 1f | e8 51 bc 21 99 7c 48 a4 03 69 7e 36 81 2c 93 c5 | 85 f1 72 97 17 d9 4b 16 e1 02 93 16 a0 e9 5a 8c | 18 8b 2d 22 a0 68 e9 52 fc 14 55 90 a6 f2 25 49 | d1 90 07 21 fd a8 a8 15 db 83 f7 be ce 21 31 d0 | 18 03 fd af 89 22 76 d9 16 f9 54 ff a2 a4 03 62 | f9 9f ab 74 f4 75 62 99 a7 8b 91 97 ad 9d c4 9c | 3e 40 41 dc 60 23 02 31 5e 46 98 d3 1a 73 73 14 | dd ff 30 58 0d fa ab 00 11 c3 0b 18 0a c3 bc a2 | 29 00 00 24 22 ce 51 25 1e d0 f6 54 17 83 9f e7 | 7f a6 b8 56 15 08 66 12 32 0f c5 1a 1c 37 04 e4 | a3 f5 17 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 72 8a fb e8 f5 d3 16 73 e6 1b bd | ae fd 45 81 b5 65 c1 51 00 00 00 1c 00 00 40 05 | 63 4e 70 bd 7c b5 4d 3a 8c 2e 79 8c 91 4d 92 d1 | 89 54 24 9e | state #402 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb358046040 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a45310 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45310 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #402 | libevent_malloc: new ptr-libevent@0x7fb37c009640 size 128 | #402 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49676.238033 | resume sending helper answer for #402 suppresed complete_v2_state_transition() and stole MD | #402 spent 0.482 milliseconds in resume sending helper answer | stop processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3800269d0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 18 0b 56 dd fc 93 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #402 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #402 | rejected packet: | d7 18 0b 56 dd fc 93 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 96 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #402: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0762 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a73690 | handling event EVENT_RETRANSMIT for parent state #373 | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #373 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #373 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49676.239251; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003387 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380015160 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #373 | libevent_malloc: new ptr-libevent@0x7fb3800269d0 size 128 "road-eastnet-nonat-121" #373: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #373) | cc d0 7c e3 2d ba 98 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba c9 ec 57 66 ee 6d 75 ec 00 31 9e bb a2 7b 33 | 03 5b e1 5f f9 35 33 83 7e 5f 91 5b a2 92 9a a8 | 8d 3b 36 89 d7 60 3c f0 e0 82 e5 11 6e 43 23 b1 | df d6 90 8f 04 61 87 4f 48 d6 55 c3 74 01 c3 05 | 74 78 5b 86 ae c3 d1 0f 5a c9 e4 c5 26 fd 8f 0b | 7a de b0 bf fa 77 b7 99 27 6d 94 68 54 8f 2e b4 | 27 fc 46 a6 65 3e f8 0d 42 f0 50 03 21 b0 cd 96 | 2d 45 e2 17 2e 0c 5d ab 5d cf b0 76 7e 40 37 71 | ec c6 7f c3 8e c1 e3 0c da 69 0c bb 78 ac ef e6 | fa da 64 48 00 9c 0f d4 5e 3f fd b4 84 a9 1f 83 | f8 16 28 f3 f1 a7 fd f1 9e 6b cf 4b 33 5a 08 dd | 8d d5 23 ac 66 10 69 36 aa 87 aa ab ed ab 68 36 | 4a 70 e5 64 3a 2f 37 bf 5e 42 b9 8e 12 99 78 f7 | 0c 24 39 a4 0c ff 5c 9e b7 31 00 75 be b4 85 09 | f6 93 ec eb a2 a7 69 50 c8 7a 9b 97 aa 4c fd 91 | 2c 8c 14 31 ec 08 42 84 d3 a9 ed d2 74 47 99 ae | 29 00 00 24 b4 0d dc 4f 11 5b a4 50 84 d3 92 d3 | f6 ef 85 ab 3e d2 da 12 30 2f 73 8e 10 d5 43 df | 1d 88 10 ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 85 d9 5b 1c 2d 07 c4 07 50 eb 06 | 15 5f 19 1f ba 90 46 a0 00 00 00 1c 00 00 40 05 | bb 4b 15 0f 4a b6 b1 9b ec 46 e5 86 fe 18 d0 b4 | dc 99 60 c7 | libevent_free: release ptr-libevent@0x7fb34403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a73690 | #373 spent 0.0921 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc d0 7c e3 2d ba 98 af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #373 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #373 | rejected packet: | cc d0 7c e3 2d ba 98 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #373: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c018460 | handling event EVENT_RETRANSMIT for parent state #347 | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #347 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #347 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49676.244507; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003909 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a73690 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #347 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 "road-eastnet-nonat-95" #347: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #347) | f8 38 0d 6d 39 93 09 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 c4 2f 67 81 91 d8 d3 fb 76 27 6a 79 d1 72 21 | 27 8a 05 07 53 b8 7f 41 86 ef e3 fa f6 78 ef f1 | 52 89 ca 2d 9e 75 06 3f de f7 86 92 8e de 82 39 | 74 b5 33 59 34 5d 7a 07 32 58 2d 1b 54 b4 4a 71 | 82 e9 69 4b d1 23 61 8d 33 9d 70 70 80 3d e7 06 | 38 6a 56 ed 6a ce 44 ea 5c f0 e5 ab 75 42 57 8c | 73 f2 e6 32 f6 2b 78 17 cc 77 d1 36 52 bb 7b 23 | 6f c5 5a f4 da 8c 20 ce 25 5e 2c b4 61 29 ba 22 | 7b 74 2f 22 bd 61 49 7e ed ee f8 95 fd 44 ae 87 | 6a 9a b0 84 48 37 7e bb 35 e6 e2 f6 4e 13 6b 95 | 47 4c 2d 6c a3 db 3d 5d ad 81 79 5f 80 e7 3e ed | bb b5 a8 97 95 f7 34 a1 ef 98 52 3c fa 6c 7f 37 | f7 78 d5 45 99 4e d1 38 57 29 2f b0 94 21 1c a5 | 4f 3d 71 d0 fc 88 a0 06 b8 26 ee 84 19 ff 4c 00 | 47 77 6c e4 d3 3a ee 07 05 6f 06 56 6c 1b 9a 2e | 15 bd 41 a6 3a 78 6e d5 2a 86 74 c6 d6 01 f5 e6 | 29 00 00 24 2a 8c 4f 9a ed e1 ff e1 d2 8e 39 06 | cc ef a0 3d 7a d8 6e 61 bc 37 8f e1 33 0d 03 68 | 11 db e1 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 e5 1f 89 e2 f9 a8 3f 54 c4 5a dc | 3f 1e 16 e7 e3 67 75 63 00 00 00 1c 00 00 40 05 | d2 37 e4 48 b8 f6 61 3d d7 15 bc 92 37 84 81 61 | b6 43 37 f7 | libevent_free: release ptr-libevent@0x7fb35c014b40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c018460 | #347 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 38 0d 6d 39 93 09 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #347 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #347 | rejected packet: | f8 38 0d 6d 39 93 09 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #347: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0a940 | handling event EVENT_RETRANSMIT for parent state #395 | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #395 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #395 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49676.256858; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500752 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #395 | libevent_malloc: new ptr-libevent@0x7fb35c014b40 size 128 "road-eastnet-nonat-143" #395: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #395) | ba 7b 3c 0c 6c 47 ed ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 88 4c 55 7e d1 a2 38 a3 4d 34 44 bf 98 52 f4 22 | 2b 2e d7 52 9d e2 60 32 f1 e9 de 11 e6 81 90 27 | 7f aa b4 cd 92 c7 cc 0a 99 86 49 e0 e9 e5 7f c7 | 53 00 84 30 c4 2b a1 40 94 2b e5 13 32 e0 cc 77 | 9f 67 6c cf 30 e7 4a c4 94 da 5f 5f 42 9a ce 83 | 94 65 21 10 2f c8 9d e9 90 7c c8 a2 24 10 5f eb | b7 e4 01 18 df 72 f4 7a bb ab 13 f9 5e 78 3b bb | fa c9 e1 75 55 1d c1 7d 77 9c f5 dd 9c f1 6d cf | 64 15 f4 f8 06 12 d8 2b 76 e9 8f 68 61 57 5e f9 | ce b7 25 0f 70 50 5b 08 f7 40 3f 01 f6 b5 a6 1b | 6a b5 fe b6 73 a7 04 b2 74 dc 3e 4a 46 a2 06 81 | 11 ce 3e 21 33 d9 a8 2a ee 54 b5 69 d8 57 77 1f | dc ec 39 32 06 54 92 6d 8f 0a ca d2 fd fd bd fb | 1b 7c 6a b6 6b 55 6f cb c2 b7 b7 fb e7 79 1c 7d | c3 44 5b 72 2c bc 4f 59 92 b8 bc 2a d4 d1 be 0f | 33 95 9e 53 f7 bf 90 2f bf b1 8e 5f 51 a1 8b aa | 29 00 00 24 bd 0e 20 29 4b d5 e3 ae 9c 68 67 e1 | 41 5b 48 5c 33 08 9f 5c 1f 4f 9e 6e c3 72 5b 33 | 2c ad 1f 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b1 4d 21 6f 15 00 d4 49 f9 94 84 2e | 85 71 98 cf 82 ff b0 a3 00 00 00 1c 00 00 40 05 | 8a 38 a6 07 76 28 82 e1 53 d4 45 b3 59 f3 34 be | 83 20 f5 6d | libevent_free: release ptr-libevent@0x7fb35c046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0a940 | #395 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 7b 3c 0c 6c 47 ed ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #395 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #395 | rejected packet: | ba 7b 3c 0c 6c 47 ed ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #395: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.084 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3800383c0 | handling event EVENT_RETRANSMIT for parent state #388 | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #388 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #388 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49676.284238; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001677 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0a940 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #388 | libevent_malloc: new ptr-libevent@0x7fb35c046040 size 128 "road-eastnet-nonat-136" #388: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #388) | f7 ff cf 56 0b 2d 32 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 17 f0 4b b8 d6 41 9d bc 4a 96 2e 42 ab 77 4e | 7f 54 60 13 56 59 15 20 fc c4 79 98 ae 8f e2 06 | 69 79 8f 5d 63 48 c3 bc 00 b2 f8 7b 8f f4 4d a0 | 8c a9 81 52 3e 4a c4 f8 92 22 05 f0 4d e8 83 0e | f0 26 c0 2c 43 f9 88 43 07 5f 25 9e 50 b5 11 c3 | 73 c8 0e 1f 5c 85 88 1c fc e4 6e f2 9c 07 04 d2 | 2d 14 31 25 c7 f1 fa 00 27 db 06 87 f8 4d 48 60 | a2 9b c5 9a 24 e6 5c 8b 88 aa 13 bf 0e 45 97 1c | aa fb ea 7f ee 38 9d c2 3b dc ac 73 ba e2 2c 03 | 3d dd 91 b1 96 88 2a b1 4e a5 10 5e fe 8f b7 60 | 27 7f 42 c9 c1 97 c4 03 be 93 ba 66 8c 91 b1 77 | 12 50 ef a2 c9 9b f5 15 0b 50 4a dc c3 9e 64 d1 | d8 0c c9 6c 86 d8 1a 40 d2 c3 48 bc 8a 19 fb 47 | d3 3d 4c 63 67 3a 9b 43 54 08 5f 36 9c 29 c6 ed | 7a c1 fa 3a 70 4b f1 9d 3d f8 73 d3 02 37 8f 1c | 0a e4 74 d1 b8 f7 7d a3 cc 04 0d cc 02 1c 9d d7 | 29 00 00 24 d2 a6 cd 06 28 a1 fe ae 1b 89 a2 1d | a1 4a 61 12 14 72 44 a4 a4 a5 e9 38 f2 78 91 07 | 4b 1e 98 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 fc fe 8e 48 65 14 18 f3 7c 80 1c | c9 89 2e 09 96 5d 2c 3e 00 00 00 1c 00 00 40 05 | 5e 49 cb 06 a1 a8 89 d0 e9 f4 c7 34 ac a2 e0 5c | 40 ed 0b 80 | libevent_free: release ptr-libevent@0x7fb38000c460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800383c0 | #388 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 ff cf 56 0b 2d 32 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #388 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #388 | rejected packet: | f7 ff cf 56 0b 2d 32 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #388: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368017ea0 | handling event EVENT_RETRANSMIT for parent state #374 | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #374 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #374 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49676.292567; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002485 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800383c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #374 | libevent_malloc: new ptr-libevent@0x7fb38000c460 size 128 "road-eastnet-nonat-122" #374: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #374) | 2b af 1b 03 10 38 37 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 c3 14 06 9b d8 f1 99 49 48 ff 90 1f 86 00 28 | 44 18 8a f8 52 dc 7d 04 1b d5 bc 43 4d 6c cb 67 | f8 0d 9d 6d d0 66 c5 1d 7e 62 70 73 1c 71 41 b4 | dd 81 08 b3 22 a9 c5 05 00 35 5b 00 07 16 93 d5 | 94 c1 6c 23 e3 4f fb cc 11 67 47 b3 e1 b1 07 89 | ea c0 9e a2 65 96 87 08 be 34 63 54 73 84 17 c6 | d1 75 fb 5b 8e 80 b1 4e bc e5 80 b5 fc 51 6b 8e | af 49 e6 d5 05 a1 42 3f 30 13 b7 fe 10 06 81 bc | 26 72 22 45 7f 9f 88 7e f2 4d d6 4b 6d 85 6b 06 | 69 00 b6 2d 19 97 b0 06 ca c7 30 d2 02 d3 f6 37 | 5e 73 21 4a 86 ec 60 ca fd d2 ed d8 05 2b db 6c | a9 01 2a 23 f7 1d d9 64 5b e9 5e 20 76 8d 16 0a | bf cd f0 54 2a 72 e9 f6 56 5e 90 80 56 52 68 ca | 9f 40 22 7c 1e b1 d0 73 7b 7b 65 7f 5f 3b b2 a4 | 2d 12 04 bd 89 d0 f1 f1 ba b3 be 3d 20 c5 f8 84 | bc fa 4d 90 8e a5 a8 51 48 43 7b 6c ed ea 9f e0 | 29 00 00 24 8b e7 71 0b f0 6c d4 66 d8 89 de 00 | 61 f0 41 76 89 f5 bb 07 5f 2d 78 ac d6 5e eb 30 | 2f 0d 98 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 37 47 83 86 42 9b 81 4e c6 41 b6 | af 4f 24 3f ee d6 bb bd 00 00 00 1c 00 00 40 05 | 2f d6 db c3 63 be 1c 54 fe 3c c7 2a 35 82 32 22 | 47 30 b2 bc | libevent_free: release ptr-libevent@0x7fb368023e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368017ea0 | #374 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2b af 1b 03 10 38 37 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #374 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #374 | rejected packet: | 2b af 1b 03 10 38 37 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #374: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9c780 | handling event EVENT_RETRANSMIT for parent state #294 | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #294 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #294 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49676.302889; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006141 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368017ea0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #294 | libevent_malloc: new ptr-libevent@0x7fb368023e60 size 128 "road-eastnet-nonat-42" #294: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #294) | 9b 31 1a f8 0f be 39 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 dd 24 24 7c 2f 7c cf af 6d 3e 60 a2 73 ad b0 | 5d e0 ad 29 4b 13 6c 37 66 5f 9c 4f e7 c9 e4 11 | 2c 5d 56 30 72 c8 d6 46 26 66 f5 93 56 d4 c3 52 | 85 cc e5 ae f9 42 b4 ed 60 85 06 0a 66 f5 50 1d | b5 97 c3 6d 71 b4 75 b7 83 18 b1 d3 7d 4a 68 8c | b9 4f df 9f 66 87 ec eb 33 88 de f2 6b c6 ea ab | d0 0d f9 06 34 9c 52 b4 c5 c4 6d 94 39 a8 58 51 | 41 ac 6d 52 08 28 9d f6 37 25 c7 7f 2d 48 ab 90 | f6 30 d2 8b 1b 90 e6 12 18 e0 e2 d4 dc 25 fe 81 | c8 41 3f 06 d9 c6 ce a5 91 8f 50 2b 48 2d e5 59 | 7a 24 e5 58 8b 81 4a bc cb 35 59 84 09 16 ee 2d | ba cf 81 ed 91 57 53 ab 0b 04 8a 27 0b c6 e0 ef | db ab 77 93 c2 db 73 a1 76 37 e1 bf 29 0a 3c 98 | 04 2f f5 e3 ff d0 c3 48 62 42 d2 a6 9f a7 c1 a7 | df e6 f0 e2 49 c7 bb 48 bb b6 1d f0 0e d1 19 d7 | 21 c7 76 5c 49 fc f0 be 36 da d1 aa ec 07 53 22 | 29 00 00 24 c9 1f 43 d3 3e f5 11 59 29 27 36 bb | 9f 07 da f1 c2 4b 17 7e d6 e4 43 b9 54 44 c2 2b | 3a e0 9b 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 60 07 d1 2a 2e 6f e5 7f 13 de a6 | da 25 32 50 d9 e2 97 75 00 00 00 1c 00 00 40 05 | de 91 5e 97 33 cf e4 58 2c 2c f0 43 aa ad 93 60 | ec ee 8a 50 | libevent_free: release ptr-libevent@0x7fb37402a710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9c780 | #294 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9b 31 1a f8 0f be 39 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #294 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #294 | rejected packet: | 9b 31 1a f8 0f be 39 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #294: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0668 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61bd0 | handling event EVENT_RETRANSMIT for parent state #151 | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #151 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #151 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49676.303148; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008254 exceeds limit? YES "road-eastnet-nonat-151" #151: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-151" #151: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #403 at 0x557d46aa13c0 | State DB: adding IKEv2 state #403 in UNDEFINED | pstats #403 ikev2.ike started | Message ID: init #403: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #403: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #403; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-151" #403: initiating v2 parent SA to replace #151 | using existing local IKE proposals for connection road-eastnet-nonat-151 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 403 for state #403 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9c780 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #403 | libevent_malloc: new ptr-libevent@0x7fb37402a710 size 128 | #403 spent 0.0859 milliseconds in ikev2_parent_outI1() | RESET processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #151 ikev2.ike failed too-many-retransmits | pstats #151 ikev2.ike deleted too-many-retransmits | #151 spent 1.94 milliseconds in total | [RE]START processing: state #151 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-151" #151: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #151: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #151 "road-eastnet-nonat-151" #151: deleting IKE SA for connection 'road-eastnet-nonat-151' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-151' added to the list and scheduled for 0 seconds | crypto helper 0 resuming | crypto helper 0 starting work-order 403 for state #403 | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-151 | State DB: deleting IKEv2 state #151 in PARENT_I1 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 403 | parent state #151: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #151 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 403 time elapsed 0.000597 seconds | libevent_free: release ptr-libevent@0x7fb3380180b0 | (#403) spent 0.602 milliseconds in crypto helper computing work-order 403: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61bd0 | in statetime_stop() and could not find #151 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 0 sending results from work-order 403 for state #403 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #403 Initiating connection road-eastnet-nonat-151 which received a Delete/Notify but must remain up per local policy | libevent_malloc: new ptr-libevent@0x7fb38402bf10 size 128 | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 0 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-151" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-151' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-151" | stop processing: connection "road-eastnet-nonat-151" (in initiate_a_connection() at initiate.c:349) | spent 0.0723 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #403 | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 403 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #403 | **emit ISAKMP Message: | initiator cookie: | 32 36 13 09 3a 0c 64 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-151 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 51 1d 1f f9 29 d4 7a 82 e5 c3 ed 2d 91 36 94 a3 | ikev2 g^x ad 42 95 1c da 49 e7 df be 20 17 de b8 10 02 70 | ikev2 g^x 99 a0 9d 95 41 a8 00 d1 af 94 26 4c 6c 86 0c 1f | ikev2 g^x 94 7a 02 35 96 84 54 33 fd cb 84 dd 66 c9 68 48 | ikev2 g^x c0 82 f1 59 9a 21 1d bc d5 30 03 12 1e e7 09 61 | ikev2 g^x be 0b 67 1d db fb 9e 1e 17 49 85 95 31 47 f7 2b | ikev2 g^x 4a 86 6c c9 65 82 f2 1e a6 01 6c ac cd f1 e2 b1 | ikev2 g^x c0 7c 6b 1c 75 70 5d e8 eb b9 df 8a a0 09 66 57 | ikev2 g^x 4a b4 92 66 fc a3 08 c8 94 4f 6c 58 0d 44 86 54 | ikev2 g^x 0d a6 ba 1e d2 d3 f5 98 14 c7 bb cb 0d c6 25 81 | ikev2 g^x 7d 00 f0 be 73 bc 11 32 a7 22 fe 40 f1 5c 99 a7 | ikev2 g^x f6 f4 02 31 24 83 16 a4 cb d9 f9 bc 7d ee f9 64 | ikev2 g^x 7a 45 11 03 43 36 f4 ff f8 3b 61 50 62 1a ea 35 | ikev2 g^x 94 85 76 d9 cf 8d 05 40 c4 4f 44 89 69 5a 20 63 | ikev2 g^x bb 17 c4 c0 24 8c 90 9c 7c 82 0c b1 fd 04 ab 4c | ikev2 g^x 94 5c 67 12 3b 66 e3 71 78 3a f5 9a 05 60 53 5e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 96 4a 72 fe 73 4d 43 f4 22 71 ca 5d 92 02 9d 90 | IKEv2 nonce a1 de a3 67 65 d9 a5 3e 5d f5 46 47 3c 9d 2b 01 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 32 36 13 09 3a 0c 64 d7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 97 | natd_hash: port= 01 f4 | natd_hash: hash= 97 72 77 63 b0 4d c0 15 33 f7 7b 47 a3 64 95 74 | natd_hash: hash= 99 05 10 8e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 97 72 77 63 b0 4d c0 15 33 f7 7b 47 a3 64 95 74 | Notify data 99 05 10 8e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 32 36 13 09 3a 0c 64 d7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 3b eb 87 4d 47 ff 24 80 19 6f 36 13 fc b8 88 ec | natd_hash: hash= 58 fe 93 a3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3b eb 87 4d 47 ff 24 80 19 6f 36 13 fc b8 88 ec | Notify data 58 fe 93 a3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #403 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #403: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #403 to 4294967295 after switching state | Message ID: IKE #403 skipping update_recv as MD is fake | Message ID: sent #403 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-151" #403: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.151:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #403) | 32 36 13 09 3a 0c 64 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 1d 1f f9 29 d4 7a 82 e5 c3 ed 2d 91 36 94 a3 | ad 42 95 1c da 49 e7 df be 20 17 de b8 10 02 70 | 99 a0 9d 95 41 a8 00 d1 af 94 26 4c 6c 86 0c 1f | 94 7a 02 35 96 84 54 33 fd cb 84 dd 66 c9 68 48 | c0 82 f1 59 9a 21 1d bc d5 30 03 12 1e e7 09 61 | be 0b 67 1d db fb 9e 1e 17 49 85 95 31 47 f7 2b | 4a 86 6c c9 65 82 f2 1e a6 01 6c ac cd f1 e2 b1 | c0 7c 6b 1c 75 70 5d e8 eb b9 df 8a a0 09 66 57 | 4a b4 92 66 fc a3 08 c8 94 4f 6c 58 0d 44 86 54 | 0d a6 ba 1e d2 d3 f5 98 14 c7 bb cb 0d c6 25 81 | 7d 00 f0 be 73 bc 11 32 a7 22 fe 40 f1 5c 99 a7 | f6 f4 02 31 24 83 16 a4 cb d9 f9 bc 7d ee f9 64 | 7a 45 11 03 43 36 f4 ff f8 3b 61 50 62 1a ea 35 | 94 85 76 d9 cf 8d 05 40 c4 4f 44 89 69 5a 20 63 | bb 17 c4 c0 24 8c 90 9c 7c 82 0c b1 fd 04 ab 4c | 94 5c 67 12 3b 66 e3 71 78 3a f5 9a 05 60 53 5e | 29 00 00 24 96 4a 72 fe 73 4d 43 f4 22 71 ca 5d | 92 02 9d 90 a1 de a3 67 65 d9 a5 3e 5d f5 46 47 | 3c 9d 2b 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 72 77 63 b0 4d c0 15 33 f7 7b 47 | a3 64 95 74 99 05 10 8e 00 00 00 1c 00 00 40 05 | 3b eb 87 4d 47 ff 24 80 19 6f 36 13 fc b8 88 ec | 58 fe 93 a3 | state #403 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37402a710 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9c780 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #403 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 | #403 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49676.304471 | resume sending helper answer for #403 suppresed complete_v2_state_transition() and stole MD | #403 spent 0.449 milliseconds in resume sending helper answer | stop processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38402bf10 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 36 13 09 3a 0c 64 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #403 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #403 | rejected packet: | 32 36 13 09 3a 0c 64 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 97 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #403: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0569 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf10 | handling event EVENT_RETRANSMIT for parent state #396 | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #396 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #396 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49676.33469; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501028 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400a290 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #396 | libevent_malloc: new ptr-libevent@0x7fb38402bf10 size 128 "road-eastnet-nonat-144" #396: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #396) | 34 3a ea ba b4 d5 c3 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 b3 5e a9 7f 93 97 83 00 ac b3 90 fb e7 f1 78 | 95 aa f1 ba 36 2b 6d a3 37 11 74 f8 88 50 3b b9 | 5f 0f a0 79 72 f7 39 e7 3a 2c a8 e0 53 9b be fd | fc bd 96 c1 32 d9 24 ce f7 06 60 ff b3 43 45 a6 | 24 b9 a3 f5 cb 0e b9 aa aa 8e 8f d1 f4 f2 6e c0 | 2d cf 97 8a 96 4c c9 d9 fa 9b b2 4f 23 e7 4e 04 | 32 38 36 77 bf 5c cc 5e 9d b8 9a 89 95 85 a0 cd | 38 05 64 bb 18 47 79 4a 9e e0 36 97 2c 58 a9 ca | 05 7e fc 24 b9 aa 44 5a 5a 1a 01 53 4f 6b 25 9c | 0b 57 f1 a9 6c 20 f6 40 eb 60 95 56 91 d3 93 3b | e3 6f 55 d6 2d 80 8e 1b 25 11 49 ca e7 6a 57 76 | 46 38 51 f8 26 5f df d7 e7 dc 81 fb 26 f9 44 9d | 73 c6 16 4c 9f 24 d8 42 a4 b9 bf 36 76 cf 2d c1 | 81 f5 6e 1c 27 05 14 9e 74 b9 a7 24 89 53 2b 8a | e5 d2 6e 23 b8 62 43 c8 68 d3 55 8e 35 2d 54 67 | 77 ed 1c 39 ec 49 32 f8 1f c9 68 6b 34 67 a6 5c | 29 00 00 24 70 3a 86 3e 59 bb d0 ee e5 b9 db 1d | c8 9a e2 55 5b 79 c1 c3 66 32 3d 49 47 3b f1 44 | bc b6 4a ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 b0 29 ea 4a 03 79 05 a6 d6 5d 03 | 24 78 07 cd 73 8e b4 4c 00 00 00 1c 00 00 40 05 | cb 86 b2 db 9b fe 49 fd e2 3b b4 79 c3 f9 fd 58 | 79 48 29 02 | libevent_free: release ptr-libevent@0x7fb34401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf10 | #396 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 3a ea ba b4 d5 c3 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #396 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #396 | rejected packet: | 34 3a ea ba b4 d5 c3 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #396: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0474 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c017ea0 | handling event EVENT_RETRANSMIT for parent state #348 | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #348 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #348 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49676.349017; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003703 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #348 | libevent_malloc: new ptr-libevent@0x7fb34401d920 size 128 "road-eastnet-nonat-96" #348: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #348) | a7 7d 9d ff 1a 60 65 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce d5 f5 8b 39 60 35 a5 25 70 07 1c 5c b5 0b 9d | 0f b2 5b 4a 01 34 b6 83 42 d7 d4 4c ad da 68 4a | 8b 4a 32 5f 36 06 f1 98 73 58 e9 72 c0 73 68 ca | 50 81 07 47 ff 17 19 96 47 97 94 3d f6 b6 04 3a | d9 53 26 2d 26 d4 5a 00 db 52 8b 30 4a 2f d3 5e | 57 21 6b c8 30 e6 41 d6 77 b5 33 c3 1e eb 09 f5 | f6 92 94 59 ce 0f f4 b6 13 a7 e6 12 2c 94 0a 0e | a5 49 7d ed 7d 57 a6 dd 0c c8 f5 e3 ab f6 df fb | 13 a2 c5 ce cd 5e 51 7c 83 34 62 82 09 e1 e3 72 | 31 4c 58 be 93 6e 60 9d a5 4a 65 3b 0e 6c 76 16 | ff b5 3c 17 b2 e3 b4 72 ba 47 1e 9f c9 b0 43 a7 | f0 b4 e5 71 a8 38 7d f3 55 a8 70 6c f5 0c ea e3 | 99 31 47 d9 67 2c ef 74 72 f0 71 8a 3c da e4 22 | d8 c1 06 32 4c 16 22 97 a9 d9 5c c1 eb 63 08 aa | 52 12 c2 6f 92 9a fe 31 31 61 1a 04 4f a6 29 e5 | bd ba 74 54 e9 68 1b 89 03 52 57 66 34 af 35 4f | 29 00 00 24 d4 8c 07 58 36 6c 0d 91 39 7f ba 4b | 55 80 94 2b 15 6a 3d d9 23 c6 de 68 59 32 ea bf | f7 3a e2 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c1 c6 46 d6 42 6c c3 80 0a 8c 20 90 | 81 74 5d e8 06 92 e7 f6 00 00 00 1c 00 00 40 05 | 5c 1e 6e a7 c5 99 b7 4d bd dd e2 f9 8e 11 ad b4 | 92 1e 01 ed | libevent_free: release ptr-libevent@0x7fb35c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | #348 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 7d 9d ff 1a 60 65 e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #348 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #348 | rejected packet: | a7 7d 9d ff 1a 60 65 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #348: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11640 | handling event EVENT_RETRANSMIT for parent state #389 | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #389 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #389 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49676.353293; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001488 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #389 | libevent_malloc: new ptr-libevent@0x7fb35c04b7c0 size 128 "road-eastnet-nonat-137" #389: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #389) | 85 39 d1 4d 8b 00 62 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 35 45 30 eb 5a 4e 31 22 74 c6 b3 a4 12 3f 11 | d4 ed 4e ed d9 b9 2a b5 45 b7 bf 2f c4 12 8d f6 | b6 45 8b e7 42 00 82 88 9b 5f 9d ac d3 62 85 20 | 80 d9 92 f9 48 6c 61 18 10 02 b3 60 4a 67 bc f5 | 7f f3 06 fd dd d9 85 7b 8a 61 74 3e b0 54 86 48 | be 68 e1 1d 71 86 b6 10 0b 53 c9 4b c6 1d e3 32 | 0e 9d a0 c1 c2 ea 3f 8d 85 11 04 6b 8c a8 06 e2 | 8a a8 28 44 e2 f4 2d 9b 79 2e 3b 95 17 25 de 38 | b1 b1 27 54 d1 ca 51 cb 05 e4 51 d4 10 05 5a 73 | f7 6e 3f 1e 04 83 05 45 32 c8 e5 83 91 5b d4 46 | cb 00 53 49 8b aa e2 4a 03 fb ec 92 bd 9a d8 ef | c2 f7 13 0e ac 87 cd a2 d6 11 8a 4d b3 76 15 63 | 7e 5d ad ad 19 54 b0 8b cf 33 56 db af c2 f6 2f | 46 e8 3c 3e 30 75 95 b6 ad 6b 4c bd b8 1c f7 d8 | 42 48 45 24 c4 28 be c8 24 78 21 7b 8c a1 5f d5 | 3c 68 c6 b7 92 f7 dd 99 0c 2e 4d 49 3c 4e 34 53 | 29 00 00 24 d4 02 58 a1 15 41 bf 82 7e 15 0d c9 | ca 5c 1f 96 c8 8b 6c 22 75 5c 08 57 5f 06 6b 32 | fe f8 a7 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 ad 3c 1a 7d 4c cc 56 a6 70 0e c9 | dd 4d 28 a6 f3 20 1b cb 00 00 00 1c 00 00 40 05 | e7 a3 be 04 a3 45 3b 11 1b f8 e3 89 48 23 a2 23 | c1 e1 2a f8 | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11640 | #389 spent 0.0904 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 39 d1 4d 8b 00 62 4d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #389 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #389 | rejected packet: | 85 39 d1 4d 8b 00 62 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #389: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c018210 | handling event EVENT_RETRANSMIT for parent state #375 | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #375 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #375 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49676.35555; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002251 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11640 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #375 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 "road-eastnet-nonat-123" #375: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #375) | a4 09 26 11 42 9e 51 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b 77 05 ad 49 62 16 46 be f5 65 08 84 ad 14 8b | 54 2c 99 1d e2 97 87 23 80 81 89 f0 4c d0 eb 92 | 7b 0b 4f bb c5 8e f0 7c 4a e9 4e f5 41 3b c0 9c | 84 74 7a 28 42 6c 3e a3 44 ba 29 11 96 09 9b f3 | 38 05 36 bd 24 dc d4 f1 69 9a 67 13 96 b5 cc 0e | 5b 85 9c bc 45 e5 5b 70 a0 86 01 2f a9 6f b7 16 | e5 8c 0d ae 1d 65 f5 53 d8 97 9b 0e 3c f7 8c b4 | 84 cb c7 3a c6 10 40 ea de 5f 63 4c 12 d8 3f ca | 6d 62 70 f0 93 72 e5 53 fe e2 f7 48 e3 16 ec 2c | 0c 51 77 44 87 3b cf 71 6a 9d b3 31 8e cc be f2 | 83 ce be c0 12 f1 01 88 ca 5d f3 fc 95 bc f7 5a | 34 7b 8e 4b 02 d0 59 3f ca a0 78 bc ef 69 51 e1 | 59 c6 1a ee b3 5f f4 fe ba ab aa 32 83 46 24 8b | 44 0a ac 7f 47 be 12 69 64 f5 8a a0 c3 66 33 2a | d1 fe cd 2b 6e fd 1c 22 43 71 36 d1 05 aa f3 a0 | 34 64 36 1b 5f af f2 60 88 b6 fd ad 79 17 84 9b | 29 00 00 24 a2 f8 9d 2f 08 fe df 02 8f a0 29 1e | b3 67 52 e4 00 d5 8c 7f 4e 12 c2 f7 f5 b4 05 71 | a4 8b 3b 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 12 2b 6b 99 24 aa d2 31 8d d6 a9 cf | 86 3d 5f d7 43 66 7f 91 00 00 00 1c 00 00 40 05 | 3d 40 65 0f bf b0 2e 03 30 63 c3 7a f7 f2 38 a3 | 20 e1 e4 b2 | libevent_free: release ptr-libevent@0x7fb36c023e70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c018210 | #375 spent 0.0881 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 09 26 11 42 9e 51 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #375 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #375 | rejected packet: | a4 09 26 11 42 9e 51 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #375: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aef6c0 | handling event EVENT_RETRANSMIT for parent state #152 | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #152 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #152 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49676.37281; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.0163 exceeds limit? YES "road-eastnet-nonat-152" #152: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-152" #152: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #404 at 0x557d46aa2980 | State DB: adding IKEv2 state #404 in UNDEFINED | pstats #404 ikev2.ike started | Message ID: init #404: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #404: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #404; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-152" #404: initiating v2 parent SA to replace #152 | using existing local IKE proposals for connection road-eastnet-nonat-152 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 404 for state #404 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c018210 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #404 | libevent_malloc: new ptr-libevent@0x7fb36c023e70 size 128 | #404 spent 0.0724 milliseconds in ikev2_parent_outI1() | crypto helper 9 resuming | RESET processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 starting work-order 404 for state #404 | start processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 404 | pstats #152 ikev2.ike failed too-many-retransmits | pstats #152 ikev2.ike deleted too-many-retransmits | #152 spent 2.44 milliseconds in total | [RE]START processing: state #152 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-152" #152: deleting state (STATE_PARENT_I1) aged 64.017s and NOT sending notification | parent state #152: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #152 "road-eastnet-nonat-152" #152: deleting IKE SA for connection 'road-eastnet-nonat-152' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-152' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-152 | State DB: deleting IKEv2 state #152 in PARENT_I1 | parent state #152: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 404 time elapsed 0.000982 seconds | (#404) spent 0.989 milliseconds in crypto helper computing work-order 404: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 404 for state #404 to event queue | scheduling resume sending helper answer for #404 | libevent_malloc: new ptr-libevent@0x7fb37800f1a0 size 128 | stop processing: state #152 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 9 waiting (nothing to do) | libevent_free: release ptr-libevent@0x7fb3400357c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aef6c0 | in statetime_stop() and could not find #152 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-152 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-152" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-152' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-152" | stop processing: connection "road-eastnet-nonat-152" (in initiate_a_connection() at initiate.c:349) | spent 0.057 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #404 | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 404 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #404 | **emit ISAKMP Message: | initiator cookie: | 4a 5a cc 55 a0 5d f2 1b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-152 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 72 5c 51 83 ab 6b 01 fa 80 7d 29 db 27 cd 7b c6 | ikev2 g^x 7f 04 2f 6a 27 69 df b1 41 5e bf ae 45 95 c1 0c | ikev2 g^x 60 62 91 a3 34 a3 09 ec 77 e7 89 a6 51 09 95 12 | ikev2 g^x 3b ff b9 99 25 19 b1 ca db 05 e4 39 d2 de d6 52 | ikev2 g^x 26 ca b9 02 d7 13 18 29 d4 9e 9a 68 e5 5b 44 39 | ikev2 g^x 54 a0 05 f4 ba 65 c0 95 36 73 37 bc a2 90 45 30 | ikev2 g^x d7 96 35 a2 19 0f c4 75 70 1c 7f 35 ab a5 29 b5 | ikev2 g^x 6b 5d 34 07 1e e2 3e 41 ca 0a 85 69 25 b8 27 58 | ikev2 g^x d4 99 f8 5e 96 15 ec 82 ac 10 04 76 9b 35 64 a2 | ikev2 g^x 61 5a aa b1 99 cc 29 04 86 b5 f4 cc 47 04 55 8f | ikev2 g^x c7 28 c5 78 33 30 c8 76 93 6d f5 e2 6a c6 30 01 | ikev2 g^x 28 59 c4 cc 64 9b 7d 8e 92 4e ac 31 52 df 0e bd | ikev2 g^x 0a 9d da 2a 1d 60 fa 21 2a 50 98 51 8a 76 ec c4 | ikev2 g^x d0 d7 c3 bf 4d 91 f8 7a 88 5f bc 07 e6 69 d7 f2 | ikev2 g^x ab ab b7 dd 41 cf 13 b8 5a 48 6f f6 ea 70 5c d9 | ikev2 g^x fb 24 71 46 69 e2 7c a6 fa 4a f9 ae 35 11 e2 42 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce fe 30 87 af f4 c1 ee 21 b0 88 ac a0 02 58 85 f4 | IKEv2 nonce de 21 52 28 4c d8 94 b1 9c 53 a3 c4 4e 96 a9 3b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4a 5a cc 55 a0 5d f2 1b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 98 | natd_hash: port= 01 f4 | natd_hash: hash= 20 64 19 b7 d1 4f 25 21 1b 78 33 8e a2 b3 19 f4 | natd_hash: hash= 56 5e 34 fd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 20 64 19 b7 d1 4f 25 21 1b 78 33 8e a2 b3 19 f4 | Notify data 56 5e 34 fd | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4a 5a cc 55 a0 5d f2 1b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ec 45 06 4d 08 52 67 71 ea 88 ce 05 15 99 3d c7 | natd_hash: hash= 85 58 3c 64 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ec 45 06 4d 08 52 67 71 ea 88 ce 05 15 99 3d c7 | Notify data 85 58 3c 64 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #404 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #404: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #404 to 4294967295 after switching state | Message ID: IKE #404 skipping update_recv as MD is fake | Message ID: sent #404 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-152" #404: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.152:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #404) | 4a 5a cc 55 a0 5d f2 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 5c 51 83 ab 6b 01 fa 80 7d 29 db 27 cd 7b c6 | 7f 04 2f 6a 27 69 df b1 41 5e bf ae 45 95 c1 0c | 60 62 91 a3 34 a3 09 ec 77 e7 89 a6 51 09 95 12 | 3b ff b9 99 25 19 b1 ca db 05 e4 39 d2 de d6 52 | 26 ca b9 02 d7 13 18 29 d4 9e 9a 68 e5 5b 44 39 | 54 a0 05 f4 ba 65 c0 95 36 73 37 bc a2 90 45 30 | d7 96 35 a2 19 0f c4 75 70 1c 7f 35 ab a5 29 b5 | 6b 5d 34 07 1e e2 3e 41 ca 0a 85 69 25 b8 27 58 | d4 99 f8 5e 96 15 ec 82 ac 10 04 76 9b 35 64 a2 | 61 5a aa b1 99 cc 29 04 86 b5 f4 cc 47 04 55 8f | c7 28 c5 78 33 30 c8 76 93 6d f5 e2 6a c6 30 01 | 28 59 c4 cc 64 9b 7d 8e 92 4e ac 31 52 df 0e bd | 0a 9d da 2a 1d 60 fa 21 2a 50 98 51 8a 76 ec c4 | d0 d7 c3 bf 4d 91 f8 7a 88 5f bc 07 e6 69 d7 f2 | ab ab b7 dd 41 cf 13 b8 5a 48 6f f6 ea 70 5c d9 | fb 24 71 46 69 e2 7c a6 fa 4a f9 ae 35 11 e2 42 | 29 00 00 24 fe 30 87 af f4 c1 ee 21 b0 88 ac a0 | 02 58 85 f4 de 21 52 28 4c d8 94 b1 9c 53 a3 c4 | 4e 96 a9 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 64 19 b7 d1 4f 25 21 1b 78 33 8e | a2 b3 19 f4 56 5e 34 fd 00 00 00 1c 00 00 40 05 | ec 45 06 4d 08 52 67 71 ea 88 ce 05 15 99 3d c7 | 85 58 3c 64 | state #404 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c023e70 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c018210 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aef6c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #404 | libevent_malloc: new ptr-libevent@0x7fb3400357c0 size 128 | #404 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49676.374364 | resume sending helper answer for #404 suppresed complete_v2_state_transition() and stole MD | #404 spent 0.329 milliseconds in resume sending helper answer | stop processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37800f1a0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 5a cc 55 a0 5d f2 1b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #404 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #404 | rejected packet: | 4a 5a cc 55 a0 5d f2 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 98 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #404: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3680129a0 | handling event EVENT_RETRANSMIT for parent state #295 | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #295 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #295 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49676.382527; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004302 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37801d970 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #295 | libevent_malloc: new ptr-libevent@0x7fb37800f1a0 size 128 "road-eastnet-nonat-43" #295: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #295) | 11 ea 13 a7 2a b1 5c 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 c0 f3 39 06 15 d7 07 8e 11 b6 9a 6e 2d b3 34 | 66 03 a5 c2 e2 1f 37 32 46 97 6f cd af d0 2f 18 | 5f 75 66 e4 a1 42 12 53 5e 16 d8 3a 31 65 02 6a | c5 e3 cc f7 d2 22 a4 aa ae 02 3c 06 f6 0c fe fa | e4 54 02 04 c7 56 0a b1 39 1c 79 77 c9 da 62 93 | 00 7e f1 cc 8f 9d de 33 24 4e 12 09 b8 73 ad 99 | 9d bd 21 4e 12 37 5e 79 f1 fe 24 ac 36 8f 56 b3 | d6 c7 5b 74 f8 84 56 d2 c9 9a 89 80 ba ca fa 63 | 61 ef b2 49 26 8d 16 1c 9e 9b a5 d0 8c b1 11 4d | 74 c3 30 50 82 5e f2 2c 5e 21 4f 59 50 07 97 4a | 3b 99 d0 83 20 16 83 be 15 cb 08 01 be 88 1e c0 | 56 de 78 28 a9 82 d7 99 3a 47 be b7 57 13 4d ef | 18 8f 0d 23 65 69 63 f7 5c af 9a 31 54 69 e3 c6 | e4 81 15 9e a2 7e 90 55 50 a1 5a e2 6d 42 36 72 | e6 93 98 8d ab 65 9b 8b b9 2a 79 2b 2d c9 0f 1f | c1 03 48 63 1c 2b 7c f0 db 5a 0a 3e b5 46 b8 79 | 29 00 00 24 64 9e 8b 02 14 e8 a7 dc 3f 42 d2 c4 | 8f dc b3 ff fc 4c fe 98 93 e9 8f 76 eb 2b 38 f4 | b9 5a a0 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c a5 c7 ec 4b 7a cd c4 3e f0 86 6d | ec 0c 21 f9 74 06 3e 81 00 00 00 1c 00 00 40 05 | 6b d7 31 2e aa f4 5b 2c dc 79 88 ab 6c 34 fc ce | 20 91 9b 02 | libevent_free: release ptr-libevent@0x7fb36801fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3680129a0 | #295 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 ea 13 a7 2a b1 5c 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #295 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #295 | rejected packet: | 11 ea 13 a7 2a b1 5c 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #295: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0494 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24700 | handling event EVENT_RETRANSMIT for parent state #397 | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #397 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #397 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49676.416807; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500468 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3680129a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #397 | libevent_malloc: new ptr-libevent@0x7fb36801fd50 size 128 "road-eastnet-nonat-145" #397: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #397) | b8 96 65 06 95 e1 f4 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 c8 0d f4 cf 12 04 23 b3 8c b0 d5 0f 34 4c a1 | e0 38 a5 84 33 97 be 9e 20 02 11 8c 69 5e 11 d0 | 7f 62 ac d4 51 19 cc 39 4f d4 08 35 17 3d d8 7a | c8 e2 b7 8a c4 ef 87 90 f4 6c ad 03 c1 12 e5 fe | a1 ca 4d a3 a7 26 51 b1 18 00 3f 74 0f 0b 76 79 | bc c1 ba 8c 57 57 64 fe a4 22 c8 a4 ab 19 ab 0c | dd ce 55 14 58 7f a0 3d 7e 01 33 18 3d 67 8f 6a | ca ae 35 2c fc 77 68 f1 26 46 2d 1f 7a bb f6 b6 | 88 41 08 63 25 29 f3 b7 63 ae 0e 14 3f a2 dc 97 | 0e 00 b1 e7 fc 07 d8 8b 49 bf 80 af e9 ed 2e ae | 76 d5 6d 36 b9 2a 02 65 8e ab 6e 62 de 0e 3d f3 | f7 6f bf 03 ee 4b bf 13 13 36 8d f9 63 27 fb 43 | 3f 8c 62 32 8e 36 3e 03 c1 c2 7e e0 16 a2 30 62 | 14 7f 02 fd b0 1d f6 8c 31 34 94 1b 15 18 28 ae | 0e b7 ba 68 7f a5 50 6b 2b de 67 a0 81 07 b2 62 | f5 48 ed c5 05 14 42 21 f6 53 6c 0e 3a 26 2c f6 | 29 00 00 24 27 60 c6 66 70 ae 97 9f 6b 69 4c 25 | 37 ba d9 cf 08 77 b3 59 45 e3 d8 2d 73 dd 52 c3 | cf dc c0 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 57 f9 bf 9f 01 9a 6f 3c 35 55 f3 | 32 2b 15 a5 4a 2d 79 cf 00 00 00 1c 00 00 40 05 | 4f 21 3e 38 45 eb 50 34 34 8d 72 07 46 d4 99 5b | e3 94 74 97 | libevent_free: release ptr-libevent@0x7fb3500180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24700 | #397 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 96 65 06 95 e1 f4 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #397 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #397 | rejected packet: | b8 96 65 06 95 e1 f4 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #397: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0451 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23110 | handling event EVENT_RETRANSMIT for parent state #376 | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #376 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #376 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49676.422121; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003306 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #376 | libevent_malloc: new ptr-libevent@0x7fb3500180b0 size 128 "road-eastnet-nonat-124" #376: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #376) | ea 6d 1c 44 16 cc 7c db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 30 8d f2 73 36 66 21 18 72 ab a6 1d 5b ca 9c | 0a 7e 8f ea 73 27 8a 58 d5 e4 26 95 19 96 87 0c | 7f 07 37 1c 70 d2 60 3e 98 51 eb 57 bf 72 e0 8c | 84 ad 4f b6 dc 5c 36 41 e2 77 e0 9c 8d 51 16 fc | 84 d9 54 f9 85 4d 98 72 f2 d6 3d 1b 19 f0 da ce | ab 3f 23 52 e0 3a 3c 0f e9 38 61 5a c2 41 30 12 | 05 82 0c cb c8 c2 1e a1 4f f2 c3 e1 3d da 41 26 | 24 be f6 af 3e e8 2f 87 ee 1b 93 a1 f0 e9 53 da | 3a 2e 85 7e d2 d0 a7 3b eb 29 ab 65 b7 78 9f f6 | c5 fd a3 19 78 40 8c d9 48 7b 2c 4c e7 26 6f 53 | d3 ac b1 b4 ba da af d2 ab 50 63 75 e1 1d 99 d0 | b8 31 ac 7d e7 18 55 91 d3 ac 44 fc d3 74 62 7f | ce 91 66 95 28 b3 47 a1 94 fd 56 15 40 09 da b9 | 56 ba 99 10 ef 74 77 7b 2d 9f e1 06 40 6f 4c 27 | 16 1c 00 6e 75 bf e7 e8 68 0b d5 e5 14 e8 f6 62 | 49 c7 45 85 8e da 35 35 ec 65 cf 2e 56 35 57 b4 | 29 00 00 24 b2 22 59 8f 2f 17 3c be 86 a7 a1 89 | a7 cd 11 4f 04 a8 63 56 c2 46 93 de 35 e3 be b3 | 5b e4 fb 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 73 25 29 4a e6 52 0b aa f7 7d 73 | 68 37 ec c6 59 a7 02 18 00 00 00 1c 00 00 40 05 | a9 5a 00 6b 7f 85 e1 a6 d7 c4 fa 5e b7 b1 99 68 | fa 78 21 65 | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23110 | #376 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 6d 1c 44 16 cc 7c db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #376 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #376 | rejected packet: | ea 6d 1c 44 16 cc 7c db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #376: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ced0 | handling event EVENT_RETRANSMIT for parent state #390 | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #390 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #390 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49676.424374; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00142 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23110 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #390 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 "road-eastnet-nonat-138" #390: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #390) | f0 59 d0 2d 97 92 84 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 a6 bc 87 d6 62 82 0f 67 22 b6 ee c6 47 37 24 | 35 77 67 9d 2b 69 4d 68 d9 17 5e 4e 5b 7c e7 e0 | de 0c 00 17 eb 73 f2 8c 21 62 77 5f ed 93 76 62 | 82 34 a8 dc e3 cb c2 5a 08 71 13 11 3d 4b e6 d1 | 76 57 25 8b a6 9b ab 1b 86 9a b2 3c b4 c5 09 27 | 07 3a 9a 1f b3 ba dc 74 b5 99 e0 70 c7 35 07 15 | 6b eb 79 13 3f 27 25 55 75 85 60 5d d2 d0 ba 32 | 68 73 83 f4 c5 0a 96 0e 4b e5 39 e5 86 02 a4 93 | e2 f4 48 ef 0c f4 c4 74 9a 13 7f eb 1a f7 58 25 | 7f f1 9e dc 6a 9c 5a 01 55 d6 94 fe 2a 9d 15 54 | c4 c7 a9 92 32 84 b6 cb 67 d0 cf 4d c5 e2 bc df | 9f d8 4e db 8f 96 2f 1e c9 d0 ec 6a 9b 77 d4 57 | 6b cf 06 d5 ae fb ea 29 a5 1f 59 cf 78 34 af ff | a5 76 3d 89 27 c1 f8 1c 6e a5 66 a5 63 8a 2d 2f | b3 a7 de f9 71 62 f3 67 56 6c 03 83 1d be 14 17 | 8c 04 f3 ba 5f 3e 7d cb 76 74 94 e2 c9 0a 5a 07 | 29 00 00 24 9a 7c 0d 04 38 99 0e 36 73 a3 ab df | 41 d9 56 ed 47 3b 6b 02 19 aa 87 30 cc 21 65 76 | f4 51 64 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 0a c1 09 04 69 58 cc 7d de 65 69 | 68 f6 ba 86 4e 7f 6a 28 00 00 00 1c 00 00 40 05 | 52 91 09 9c ff 5e 67 81 8a 7d bb c1 ce e0 37 4c | d9 14 ec 51 | libevent_free: release ptr-libevent@0x7fb340030080 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ced0 | #390 spent 0.0837 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f0 59 d0 2d 97 92 84 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #390 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #390 | rejected packet: | f0 59 d0 2d 97 92 84 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #390: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35000d120 | handling event EVENT_RETRANSMIT for parent state #153 | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #153 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #153 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49676.428621; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008279 exceeds limit? YES "road-eastnet-nonat-153" #153: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-153" #153: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #405 at 0x557d46aa3f40 | State DB: adding IKEv2 state #405 in UNDEFINED | pstats #405 ikev2.ike started | Message ID: init #405: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #405: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #405; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-153" #405: initiating v2 parent SA to replace #153 | using existing local IKE proposals for connection road-eastnet-nonat-153 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 405 for state #405 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7ced0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #405 | libevent_malloc: new ptr-libevent@0x7fb340030080 size 128 | #405 spent 0.0686 milliseconds in ikev2_parent_outI1() | RESET processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #153 ikev2.ike failed too-many-retransmits | pstats #153 ikev2.ike deleted too-many-retransmits | crypto helper 10 resuming | crypto helper 10 starting work-order 405 for state #405 | #153 spent 2.62 milliseconds in total | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 405 | [RE]START processing: state #153 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-153" #153: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #153: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #153 "road-eastnet-nonat-153" #153: deleting IKE SA for connection 'road-eastnet-nonat-153' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-153' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-153 | State DB: deleting IKEv2 state #153 in PARENT_I1 | parent state #153: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #153 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 405 time elapsed 0.000612 seconds | libevent_free: release ptr-libevent@0x7fb350012840 | (#405) spent 0.617 milliseconds in crypto helper computing work-order 405: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 405 for state #405 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35000d120 | in statetime_stop() and could not find #153 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #405 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7fb37c029710 size 128 Initiating connection road-eastnet-nonat-153 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 10 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-153" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-153' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-153" | stop processing: connection "road-eastnet-nonat-153" (in initiate_a_connection() at initiate.c:349) | spent 0.0804 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #405 | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 405 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #405 | **emit ISAKMP Message: | initiator cookie: | be e8 17 81 54 19 aa 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-153 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 46 35 ee 04 e9 c6 8a 5e c2 8c d0 2d 28 00 02 85 | ikev2 g^x 8c 37 b4 2a 7d 22 9b 7b d7 a1 23 7d 82 8f c4 6b | ikev2 g^x 57 c4 dd c3 ee aa c0 59 55 41 ec 07 5b d2 96 3f | ikev2 g^x 84 76 05 f0 b5 2a e8 98 98 d7 99 f0 e6 85 ba e9 | ikev2 g^x 7a 9d b6 d3 d8 1c ba 13 51 c2 52 69 b1 b0 51 2d | ikev2 g^x 27 ff ad 85 cb c3 37 19 4d 04 8f 00 5d 8e da a2 | ikev2 g^x 83 bf af 69 a5 88 8d 6e 4b fc d9 97 99 c9 fb 45 | ikev2 g^x db d1 9d 19 a0 0a d0 5c 01 fa a2 fa ec 3d 5c 71 | ikev2 g^x 97 18 03 d4 ac c9 d5 4f 44 b7 51 11 eb 34 8d f4 | ikev2 g^x ae 35 d6 d0 d3 d3 55 70 23 2c b8 b9 0d e9 30 e3 | ikev2 g^x 09 45 cd 57 53 d7 0b 66 63 c7 ad 04 26 12 af a0 | ikev2 g^x 90 e5 43 30 55 a3 78 25 bd ac a0 c8 d8 1b 48 03 | ikev2 g^x 7d 5e a7 cb e9 7e 28 c2 c1 55 c3 c2 88 18 bb 71 | ikev2 g^x ea 43 2f 82 f5 b1 df d2 66 a9 f6 d5 fa 01 de ee | ikev2 g^x e8 cd 12 32 f5 db da 44 b1 63 d9 46 0a 50 55 e5 | ikev2 g^x e4 13 08 92 13 df ad 90 0b 31 de af 43 48 dc 7b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ad 05 d9 2e f2 d6 c0 cb b5 b3 6e e0 64 6e 66 e1 | IKEv2 nonce 31 b9 1b 6d 0b a1 0e d8 22 30 ee ae e8 8f 1f eb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= be e8 17 81 54 19 aa 2f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 99 | natd_hash: port= 01 f4 | natd_hash: hash= f6 93 4e 39 e4 10 9f 0f a5 0f ed 76 86 5f 9d 57 | natd_hash: hash= 55 de 19 a7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f6 93 4e 39 e4 10 9f 0f a5 0f ed 76 86 5f 9d 57 | Notify data 55 de 19 a7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= be e8 17 81 54 19 aa 2f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= eb f0 2f 13 5d 22 43 08 07 64 33 45 d0 5d dc 6e | natd_hash: hash= 5b 6e e5 c1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data eb f0 2f 13 5d 22 43 08 07 64 33 45 d0 5d dc 6e | Notify data 5b 6e e5 c1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #405 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #405: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #405 to 4294967295 after switching state | Message ID: IKE #405 skipping update_recv as MD is fake | Message ID: sent #405 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-153" #405: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.153:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #405) | be e8 17 81 54 19 aa 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 35 ee 04 e9 c6 8a 5e c2 8c d0 2d 28 00 02 85 | 8c 37 b4 2a 7d 22 9b 7b d7 a1 23 7d 82 8f c4 6b | 57 c4 dd c3 ee aa c0 59 55 41 ec 07 5b d2 96 3f | 84 76 05 f0 b5 2a e8 98 98 d7 99 f0 e6 85 ba e9 | 7a 9d b6 d3 d8 1c ba 13 51 c2 52 69 b1 b0 51 2d | 27 ff ad 85 cb c3 37 19 4d 04 8f 00 5d 8e da a2 | 83 bf af 69 a5 88 8d 6e 4b fc d9 97 99 c9 fb 45 | db d1 9d 19 a0 0a d0 5c 01 fa a2 fa ec 3d 5c 71 | 97 18 03 d4 ac c9 d5 4f 44 b7 51 11 eb 34 8d f4 | ae 35 d6 d0 d3 d3 55 70 23 2c b8 b9 0d e9 30 e3 | 09 45 cd 57 53 d7 0b 66 63 c7 ad 04 26 12 af a0 | 90 e5 43 30 55 a3 78 25 bd ac a0 c8 d8 1b 48 03 | 7d 5e a7 cb e9 7e 28 c2 c1 55 c3 c2 88 18 bb 71 | ea 43 2f 82 f5 b1 df d2 66 a9 f6 d5 fa 01 de ee | e8 cd 12 32 f5 db da 44 b1 63 d9 46 0a 50 55 e5 | e4 13 08 92 13 df ad 90 0b 31 de af 43 48 dc 7b | 29 00 00 24 ad 05 d9 2e f2 d6 c0 cb b5 b3 6e e0 | 64 6e 66 e1 31 b9 1b 6d 0b a1 0e d8 22 30 ee ae | e8 8f 1f eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 93 4e 39 e4 10 9f 0f a5 0f ed 76 | 86 5f 9d 57 55 de 19 a7 00 00 00 1c 00 00 40 05 | eb f0 2f 13 5d 22 43 08 07 64 33 45 d0 5d dc 6e | 5b 6e e5 c1 | state #405 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb340030080 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7ced0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35000d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #405 | libevent_malloc: new ptr-libevent@0x7fb350012840 size 128 | #405 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49676.429916 | resume sending helper answer for #405 suppresed complete_v2_state_transition() and stole MD | #405 spent 0.413 milliseconds in resume sending helper answer | stop processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c029710 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be e8 17 81 54 19 aa 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #405 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #405 | rejected packet: | be e8 17 81 54 19 aa 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 99 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #405: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.05 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358018460 | handling event EVENT_RETRANSMIT for parent state #296 | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #296 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #296 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49676.449095; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007602 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #296 | libevent_malloc: new ptr-libevent@0x7fb37c029710 size 128 "road-eastnet-nonat-44" #296: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #296) | 1c da 2e ac 4a 99 24 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 2a 4d fb 46 1d b7 c4 96 00 b1 66 99 7e ce 3b | 3f 48 6e 8c 76 bd 25 cd 72 f7 15 4a f9 69 ef 13 | 61 8a 19 db 25 90 81 55 08 5a cc 41 41 e5 ab d4 | 92 10 f9 d6 8d 49 ef 3f b0 9e f2 80 9b 7b 70 6e | a9 61 7d e0 84 75 fd d1 46 6c 42 61 66 ee 24 20 | 73 fa d1 4c 21 9e a9 c7 16 a9 b3 6f aa 78 ac 00 | 78 f4 c3 83 9c c4 9a 92 64 af b4 ed 81 ba ac a2 | f1 41 08 3e c1 2f b1 ba 03 49 e2 bf 7f db 95 66 | 30 1e c5 ba 28 dd ee 71 21 42 41 ca af c4 be d2 | 90 1d aa 94 fa 3e 05 ce 17 28 d8 85 00 b7 a3 6c | d2 a6 c4 12 ee 02 b6 a5 47 f5 e8 05 85 3f 07 9b | aa 0d 4f 57 c3 15 b2 47 ad f5 11 0a f7 29 da c6 | 9c 86 0c 08 6b ec 00 4d b0 6e 72 d1 b7 c3 86 c8 | 85 d9 c3 07 c3 a7 58 91 99 ee d7 82 f7 95 cb 56 | c0 48 0c 04 c6 c9 83 ce b6 aa 4e 64 f0 9f 73 46 | e9 f5 bb 10 78 a8 77 4a 7b da 32 8f 23 90 cf 6d | 29 00 00 24 ce d0 75 80 6d 1e 36 8f b6 81 e0 37 | 25 cc b5 c9 b7 8f 97 4d 1e ae eb 17 23 86 66 d2 | cc 2a b8 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 83 86 3f b2 b5 92 3c 02 7f 1a c2 | 45 4d 9a 24 f1 5a 66 8d 00 00 00 1c 00 00 40 05 | 7c cb b6 c5 ee bc 2b a0 53 bb 77 45 86 3e ca 93 | 1e 2d 97 d8 | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358018460 | #296 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c da 2e ac 4a 99 24 d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #296 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #296 | rejected packet: | 1c da 2e ac 4a 99 24 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #296: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0459 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c018460 | handling event EVENT_RETRANSMIT for parent state #349 | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #349 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #349 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49676.454387; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004138 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #349 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 "road-eastnet-nonat-97" #349: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #349) | 84 94 92 07 09 8b 01 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e7 8e 3a 36 94 c3 d9 80 af 87 82 89 a3 71 41 9f | e6 44 09 3c bc 67 77 29 06 f4 ae 77 a3 9d 60 1d | 0a c3 1b 6a f7 b0 e9 13 94 a5 ce ce a7 52 56 d7 | 84 e9 4e d5 99 7f 7c fb f5 b7 93 ee 65 0d 15 55 | 04 2d a2 78 15 79 38 de 23 c4 7d 82 d0 7f 5f 98 | a6 33 cb b9 33 39 5b 48 a5 eb 5c 5c 81 d0 ca 8c | f1 d5 2b 41 d5 80 88 70 6d 08 d5 9e c9 be 4a d6 | 16 61 b8 6d a8 4e 60 a2 94 6c 33 db 5b 42 45 bb | 02 30 28 9a 37 b4 00 e3 81 c4 fd 79 89 1a f9 a5 | 2d 14 0f 8f c7 04 8a 63 e3 4c c8 23 59 80 dd 4f | 13 40 1c 8c 06 1f 4a 77 c9 3e 21 20 cb 58 47 cb | c0 5d 53 b2 99 fb 04 a7 a3 35 71 6b 00 88 75 8a | 99 0c dd 71 02 4e 48 62 56 32 bf a2 8c b2 87 7c | 45 a3 56 eb 30 b8 7e 62 54 0f 19 2a 8e 1f 1c bd | cc fa 91 16 33 60 18 c9 3d f1 ea d9 79 83 28 b3 | ee b8 50 9e a8 3a a5 db fe df 37 7d ce de f7 60 | 29 00 00 24 8e 8f cc b6 0d fd cb ad 0f 95 32 a9 | a9 4b b8 56 89 46 30 eb 8f f5 1c d9 09 ec 14 75 | 5c 37 d2 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea f1 98 2b 6b f5 c7 7c ec d8 88 00 | 36 4b b7 7c e3 5b 66 cb 00 00 00 1c 00 00 40 05 | 49 36 ed 90 92 0a 38 5a 43 cd 17 7a 90 9b e6 10 | 1f ed 97 63 | libevent_free: release ptr-libevent@0x7fb3500251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c018460 | #349 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 94 92 07 09 8b 01 c4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #349 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #349 | rejected packet: | 84 94 92 07 09 8b 01 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #349: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000cc10 | handling event EVENT_RETRANSMIT for parent state #398 | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #398 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #398 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49676.487653; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500163 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #398 | libevent_malloc: new ptr-libevent@0x7fb3500251c0 size 128 "road-eastnet-nonat-146" #398: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #398) | d0 92 7e a2 a7 09 60 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 b4 17 bf 7e 10 d5 e2 12 67 d5 eb 44 fc 6b da | be 3b 71 0a c4 e3 79 bc 55 7d 33 ab 53 2c 63 89 | 9e 95 b9 30 6b 13 a7 4a c4 7b bb 0d b8 d2 26 a2 | 1b 44 de e4 2f 11 41 58 72 a9 de c1 a4 1a 3c de | fb 82 ea df 3c 36 4d b1 bb 32 a7 75 2a 9c da 3d | 04 1d ae c6 9e 47 9c 96 a3 bd 6c 27 32 62 7e ad | 70 24 3a b8 2d 6d 20 b6 31 c7 e4 59 58 b0 08 22 | 82 a6 37 db ba ec 34 68 a5 11 ce c9 83 0a 92 b3 | dd ea d2 26 81 86 3c 25 24 24 ac 6b b8 4a 55 12 | 52 ea 4b 29 23 c3 37 83 f6 36 9b 47 37 10 75 9d | f4 dd 3d a7 8c 08 2f 3c e4 23 53 ed 31 76 a3 fc | 1d a9 fd 55 24 58 0f 2f e2 fa 33 69 e3 52 ce 0b | 40 31 96 92 4b 51 32 bf 2a 17 34 73 b9 0a 6b 90 | de fe 0d 37 2c 91 fd 6c 7a a7 e2 56 e8 ce 17 fa | d6 57 69 b6 c9 3d e4 60 c8 79 32 d0 c0 ff e6 32 | 04 59 72 13 74 5b a6 22 e7 dc df 1b fa 28 85 f9 | 29 00 00 24 ae ec a4 eb 03 5f 45 70 f0 53 21 d7 | 81 1e fd e8 52 41 5f 93 69 78 ae d9 36 11 23 a3 | df 40 91 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de b0 87 87 88 52 10 6b eb de e2 56 | 47 54 e5 87 4e eb 84 92 00 00 00 1c 00 00 40 05 | cf cf 8e 7f dc f9 05 61 ec 0b 32 5d d8 50 5d 1e | f5 62 0b 45 | libevent_free: release ptr-libevent@0x7fb34003b010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000cc10 | #398 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370018460 | handling event EVENT_RETRANSMIT for parent state #377 | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #377 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #377 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49676.48779; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004033 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #377 | libevent_malloc: new ptr-libevent@0x7fb34003b010 size 128 "road-eastnet-nonat-125" #377: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #377) | 7d b7 6a 31 9c d6 86 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 bf 7a 35 d2 37 1e c0 a2 92 6a 98 80 72 24 5e | 1f 3c b2 01 23 5f 15 bf ce e9 e4 d7 08 a3 2a 60 | 60 1e 2a e8 5a e7 a9 d5 87 39 6d 3f 34 3f c0 1b | ca fe dc 77 c6 7e 84 64 73 35 57 0c ed b5 74 11 | bb 72 6b af 00 a6 5c 48 1d a9 ae e0 21 6e f9 6c | fe 77 59 9f 79 f0 27 e3 f8 d3 03 12 c5 8c 01 06 | 76 43 6f e7 91 25 19 a3 05 2c 5f 40 7b 60 ce d6 | c7 0a 22 7e c1 15 e4 29 ab c3 9b 6d 58 d6 08 88 | eb 2e fc 26 54 22 7d d9 71 73 77 93 47 47 52 c7 | 2f be 59 30 ba ca e1 78 87 6d cb 35 72 6f 4d 3b | a0 93 98 95 e4 6c 43 b1 50 a4 aa 69 98 d4 ed e8 | 9d 30 82 39 85 51 32 50 b9 91 12 7b 77 d2 d0 9f | 64 b8 21 58 96 89 58 eb 1b a0 e3 48 15 3e 58 3b | 7f 5d 13 52 09 44 ad 12 73 77 70 1d 29 a3 72 c1 | 6f bc 36 26 b2 07 f9 32 34 75 b2 cb 8d 27 b8 92 | 36 ef 06 e2 e3 5e 94 66 19 de e4 ee 30 db 10 64 | 29 00 00 24 40 c7 66 20 2c ab 25 81 a4 29 77 75 | 63 eb 29 35 21 bb d9 a5 a3 5d 38 ec 5b 5c 03 34 | 11 83 53 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 20 88 86 59 0d 66 18 17 be e2 6d | 8e c3 55 fc 50 ba 92 3e 00 00 00 1c 00 00 40 05 | a3 24 68 23 82 72 27 ee 2c 96 9c 16 80 ee e0 88 | 08 9f bc a7 | libevent_free: release ptr-libevent@0x7fb3400094d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370018460 | #377 spent 0.0743 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 92 7e a2 a7 09 60 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #398 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #398 | rejected packet: | d0 92 7e a2 a7 09 60 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #398: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d b7 6a 31 9c d6 86 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #377 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #377 | rejected packet: | 7d b7 6a 31 9c d6 86 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #377: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0401 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34001fa80 | handling event EVENT_RETRANSMIT for parent state #391 | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #391 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #391 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49676.49307; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002311 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #391 | libevent_malloc: new ptr-libevent@0x7fb3400094d0 size 128 "road-eastnet-nonat-139" #391: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #391) | 1e 4c 10 d0 5a dd 02 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 44 38 de 57 e6 42 14 4a 75 cb e8 86 f1 15 c7 | b3 6b a5 d0 a3 15 b5 a8 cf fe 21 90 de 4f ce 44 | 4b 9e a3 45 9f e5 e3 4a e1 61 50 92 d7 96 bd 78 | c9 7d fa 56 09 ee b1 46 53 20 fc ad 34 b3 1e e5 | 0c f4 f7 d3 65 bb 8f 18 cc a8 06 7f fc 7e 66 0f | 5a c0 66 08 19 5f fe 23 13 53 7d f1 cb 35 9c bf | b6 cc 27 b3 74 16 78 a5 d0 41 0b 66 96 4e d5 0b | a8 67 13 54 66 95 b9 f4 f4 50 eb 64 58 9c 23 eb | 8d 1e 98 9a 88 3b 5f 86 67 00 79 34 97 29 56 1a | b2 15 47 48 a5 9a 2b a5 34 cb 00 12 67 7f e0 d9 | 3a f8 09 e7 20 e1 52 74 01 fd f4 0c 96 53 a6 b7 | c6 61 c0 6c f5 79 6f b0 c7 2c 95 3d f0 6b 1d 3c | a1 9c 76 2c 42 98 e7 2f 92 d1 8e 08 bb da 6a 80 | de bb 58 dc 69 88 c5 71 37 d4 7b 84 79 2b bc 7c | 3c 5f 6e af 11 b3 52 0f 4a 94 17 dd 26 64 0a 25 | 66 61 88 60 23 0c 83 1b 44 d1 a9 f9 6e 89 2a f7 | 29 00 00 24 f4 e3 20 9c cf 9f 8b a0 c8 c9 bb b9 | ac d4 eb 98 02 de 0f c4 e7 00 7a df 68 e7 4c eb | e6 18 a5 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 3e 10 ca 19 aa 6a 76 c2 f6 15 22 | 58 d4 f7 90 3e 72 98 9d 00 00 00 1c 00 00 40 05 | 94 13 1b ea fd 35 6e 40 4c 88 7a 5c c1 e4 2f 2d | 6d 26 6f 2a | libevent_free: release ptr-libevent@0x7fb340029170 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34001fa80 | #391 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 4c 10 d0 5a dd 02 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #391 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #391 | rejected packet: | 1e 4c 10 d0 5a dd 02 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #391: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0649 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aacc80 | handling event EVENT_RETRANSMIT for parent state #154 | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #154 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #154 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49676.502429; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.020405 exceeds limit? YES "road-eastnet-nonat-154" #154: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-154" #154: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #406 at 0x557d46aa5500 | State DB: adding IKEv2 state #406 in UNDEFINED | pstats #406 ikev2.ike started | Message ID: init #406: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #406: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #406; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-154" #406: initiating v2 parent SA to replace #154 | using existing local IKE proposals for connection road-eastnet-nonat-154 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 406 for state #406 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34001fa80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #406 | libevent_malloc: new ptr-libevent@0x7fb340029170 size 128 | #406 spent 0.0893 milliseconds in ikev2_parent_outI1() | RESET processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #154 ikev2.ike failed too-many-retransmits | pstats #154 ikev2.ike deleted too-many-retransmits | #154 spent 2.5 milliseconds in total | crypto helper 14 resuming | [RE]START processing: state #154 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-154" #154: deleting state (STATE_PARENT_I1) aged 64.021s and NOT sending notification | parent state #154: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #154 "road-eastnet-nonat-154" #154: deleting IKE SA for connection 'road-eastnet-nonat-154' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-154' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-154 | State DB: deleting IKEv2 state #154 in PARENT_I1 | crypto helper 14 starting work-order 406 for state #406 | parent state #154: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 406 | stop processing: state #154 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3780407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aacc80 | in statetime_stop() and could not find #154 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-154 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-154" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-154' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-154" | stop processing: connection "road-eastnet-nonat-154" (in initiate_a_connection() at initiate.c:349) | spent 0.064 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 406 time elapsed 0.000549 seconds | (#406) spent 0.547 milliseconds in crypto helper computing work-order 406: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 406 for state #406 to event queue | scheduling resume sending helper answer for #406 | libevent_malloc: new ptr-libevent@0x7fb37002eb80 size 128 | crypto helper 14 waiting (nothing to do) | processing resume sending helper answer for #406 | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 406 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #406 | **emit ISAKMP Message: | initiator cookie: | 5c 1b 3d 38 ad ed bb 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-154 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d5 1a b6 af ea 21 97 b3 f5 89 b5 95 b7 8e 01 21 | ikev2 g^x 34 29 bd cd 92 66 af f7 07 14 1e f2 4b ac 69 77 | ikev2 g^x b3 25 64 1a 72 01 08 14 88 fb 34 a6 91 bd 4c e8 | ikev2 g^x 74 ed 64 90 06 cb ad 54 67 18 ec c2 f6 32 90 94 | ikev2 g^x 8a 60 b7 b6 26 ea 31 da ec 24 92 6a 22 25 e6 ae | ikev2 g^x 79 52 07 43 fe e8 78 1d 19 58 3a 0f 01 09 9b 79 | ikev2 g^x a8 83 55 03 d0 25 e3 a6 6b 4d b2 09 24 dc 38 c7 | ikev2 g^x c0 36 e4 53 c2 05 eb 85 aa 76 78 46 e9 fc ba 6a | ikev2 g^x 9d 2a 99 85 b8 e3 fb 99 44 cb 75 c0 ab ae 6e 11 | ikev2 g^x 07 c0 ca 22 19 62 ce d5 17 5c e1 b9 18 74 78 be | ikev2 g^x 34 a1 1c d9 92 69 84 5a 1b b1 7e 28 a9 f2 00 ef | ikev2 g^x e6 0f 63 2f 7a b6 8d 10 3d 27 b5 f9 29 ad b2 b0 | ikev2 g^x 65 7c 94 5e 21 5a 98 07 17 36 5b b2 b7 51 51 8d | ikev2 g^x 3d 77 c7 dd 9a b0 95 69 8a b2 64 fa 98 d0 67 3a | ikev2 g^x d0 c0 eb c5 e3 82 7f 6a 7e d1 db 5f 16 5a 12 aa | ikev2 g^x ee c9 5e 0d 7b ae 47 81 60 df bf f4 74 63 48 5d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 00 c8 88 3e 7a 51 ef 1c 0c 98 f2 86 d5 82 58 ca | IKEv2 nonce a8 80 65 3f cb c6 86 a8 5f 67 eb c4 af 88 eb 43 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5c 1b 3d 38 ad ed bb 04 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9a | natd_hash: port= 01 f4 | natd_hash: hash= 6c fb 6e 46 7d 68 85 83 cc d1 35 3b 25 21 b7 36 | natd_hash: hash= bf 74 0f f9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6c fb 6e 46 7d 68 85 83 cc d1 35 3b 25 21 b7 36 | Notify data bf 74 0f f9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5c 1b 3d 38 ad ed bb 04 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ea 1c 8a 1b 9f c4 37 0b d8 b4 d1 29 da 67 72 c1 | natd_hash: hash= 45 ae 67 d8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ea 1c 8a 1b 9f c4 37 0b d8 b4 d1 29 da 67 72 c1 | Notify data 45 ae 67 d8 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #406 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #406: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #406 to 4294967295 after switching state | Message ID: IKE #406 skipping update_recv as MD is fake | Message ID: sent #406 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-154" #406: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.154:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #406) | 5c 1b 3d 38 ad ed bb 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 1a b6 af ea 21 97 b3 f5 89 b5 95 b7 8e 01 21 | 34 29 bd cd 92 66 af f7 07 14 1e f2 4b ac 69 77 | b3 25 64 1a 72 01 08 14 88 fb 34 a6 91 bd 4c e8 | 74 ed 64 90 06 cb ad 54 67 18 ec c2 f6 32 90 94 | 8a 60 b7 b6 26 ea 31 da ec 24 92 6a 22 25 e6 ae | 79 52 07 43 fe e8 78 1d 19 58 3a 0f 01 09 9b 79 | a8 83 55 03 d0 25 e3 a6 6b 4d b2 09 24 dc 38 c7 | c0 36 e4 53 c2 05 eb 85 aa 76 78 46 e9 fc ba 6a | 9d 2a 99 85 b8 e3 fb 99 44 cb 75 c0 ab ae 6e 11 | 07 c0 ca 22 19 62 ce d5 17 5c e1 b9 18 74 78 be | 34 a1 1c d9 92 69 84 5a 1b b1 7e 28 a9 f2 00 ef | e6 0f 63 2f 7a b6 8d 10 3d 27 b5 f9 29 ad b2 b0 | 65 7c 94 5e 21 5a 98 07 17 36 5b b2 b7 51 51 8d | 3d 77 c7 dd 9a b0 95 69 8a b2 64 fa 98 d0 67 3a | d0 c0 eb c5 e3 82 7f 6a 7e d1 db 5f 16 5a 12 aa | ee c9 5e 0d 7b ae 47 81 60 df bf f4 74 63 48 5d | 29 00 00 24 00 c8 88 3e 7a 51 ef 1c 0c 98 f2 86 | d5 82 58 ca a8 80 65 3f cb c6 86 a8 5f 67 eb c4 | af 88 eb 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c fb 6e 46 7d 68 85 83 cc d1 35 3b | 25 21 b7 36 bf 74 0f f9 00 00 00 1c 00 00 40 05 | ea 1c 8a 1b 9f c4 37 0b d8 b4 d1 29 da 67 72 c1 | 45 ae 67 d8 | state #406 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb340029170 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34001fa80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aacc80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #406 | libevent_malloc: new ptr-libevent@0x7fb3780407f0 size 128 | #406 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49676.503731 | resume sending helper answer for #406 suppresed complete_v2_state_transition() and stole MD | #406 spent 0.468 milliseconds in resume sending helper answer | stop processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37002eb80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 1b 3d 38 ad ed bb 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #406 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #406 | rejected packet: | 5c 1b 3d 38 ad ed bb 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9a fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #406: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_RETRANSMIT for parent state #297 | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #297 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #297 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49676.515935; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005714 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #297 | libevent_malloc: new ptr-libevent@0x7fb37002eb80 size 128 "road-eastnet-nonat-45" #297: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #297) | e1 41 d2 51 2f 25 d9 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 ea 0d 0b 39 8c c1 99 18 5a a8 8a 8f 5d 3d 22 | 46 42 ee 49 5d 81 c3 87 32 80 3d 42 65 0e 28 54 | e6 12 c3 e6 03 86 ad ca e9 ea 65 ce 14 e5 73 46 | 61 07 3a 7c 00 7f 71 ec 17 17 d4 44 37 36 26 7a | 8c 65 4b 5e 2f d6 31 47 0e b3 55 90 e6 1c cb 77 | 1c 6d 58 27 57 b3 27 ff b6 e1 e9 7d 1b 10 c2 48 | 70 f7 e7 1e 31 56 ab cf ae 38 32 b8 65 81 ac 00 | 4e 9d 3a 6c 2c 1d fb a6 ff a6 c5 15 4a d1 e9 8c | f6 3b 4a 4d e5 6a 3d e0 b2 a1 f4 29 63 27 5f 0f | 08 89 9b 00 9b 1b 1f 8e 12 d3 c4 4f 3e 13 f5 a5 | 9c 44 af 0f 10 29 67 15 0d b9 b4 26 98 5d 9e 81 | d4 78 c2 73 92 2e 97 4c 48 13 99 b5 01 42 7a 4a | aa bb 3e f2 96 18 19 79 ab c3 39 3b ba ba b8 0b | 06 4a 68 91 6a ff 80 ba f0 6f 51 cd 71 94 91 9b | 14 d1 d2 23 7f bc a7 08 5b 2f eb 14 51 51 4a 55 | ca 92 da a2 1f 6e 9a 88 d0 9b 68 b4 59 e4 e6 5b | 29 00 00 24 a5 fe b0 e3 a2 f4 1f f6 10 ff b8 23 | 13 cf c1 54 86 87 d9 95 be 21 30 83 5b ee 54 e5 | 86 f0 89 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 30 e2 49 c0 1b 21 8e cb 56 2f 44 | 75 d2 75 93 97 72 cd 45 00 00 00 1c 00 00 40 05 | ed 4e b6 34 59 cc 9b 96 b2 cc cc ed 70 1c 55 bb | 38 17 6f fc | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | #297 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 41 d2 51 2f 25 d9 71 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #297 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #297 | rejected packet: | e1 41 d2 51 2f 25 d9 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #297: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0662 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ecc0 | handling event EVENT_RETRANSMIT for parent state #350 | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #350 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #350 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49676.537306; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003319 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #350 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-98" #350: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #350) | 40 3f 8a 6a 3f ea 6b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee ea 5c 1b 2d cc 1b 57 9c 51 33 ce c2 ed 39 3b | d5 b7 1c c2 6d 3d 6f 5f ba 5c 85 39 fb a1 11 1d | ec 11 21 bd c2 b6 25 81 4a 85 2d 0f 85 73 9e fb | a1 4c 57 38 85 7e 31 44 0a 93 0c da 6d f0 93 22 | ea f6 8a 91 67 64 50 56 68 c0 c2 6d f2 4b e0 19 | 4b 14 40 46 ec 4d e3 7d d1 0f 0b 72 f6 ab 45 80 | 03 a2 d3 a8 ff e3 ae 4e 7b 0a 5c 1e da 4a b5 ed | 95 94 b9 4b 3c c2 85 4e cd 4a 91 b6 1f 72 c1 aa | c6 85 8f ca 28 3b ab 17 e7 f1 83 c4 ae 08 27 14 | 18 32 e7 a1 65 f1 da e5 f8 9c a1 45 4b c6 41 38 | 3d f5 8c c5 56 e5 06 ff b3 a3 fd f2 89 c2 8c 0e | 41 65 f9 6f e4 16 5e 64 06 38 6c 0e 32 c8 d5 26 | 50 db 25 f3 e4 e0 37 8b 04 62 7e a1 89 aa 8e 24 | 47 48 9e 92 05 5e 29 4c b7 2e ed e9 6d 8a 54 a2 | 85 8b e4 f5 76 e6 c8 0e c4 53 cb 98 41 4b 77 41 | 74 9f 3a d4 11 79 37 50 cf fb e2 04 ed 15 0c fe | 29 00 00 24 03 ee f5 21 ef 32 aa b5 bd 88 40 59 | 47 cc 90 0f 4b 5f 82 19 9f 96 a8 bf f3 8c 9d 85 | 66 d4 51 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 b2 cf 38 e9 ab 0b d5 10 0e c3 6c | 99 ae 6e 40 7a a8 97 3d 00 00 00 1c 00 00 40 05 | f6 5d 8e f9 dd 59 4b 5a 6d 88 5a 23 64 29 55 dd | f6 46 db 31 | libevent_free: release ptr-libevent@0x7fb37c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ecc0 | #350 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 40 3f 8a 6a 3f ea 6b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #350 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #350 | rejected packet: | 40 3f 8a 6a 3f ea 6b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #350: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0481 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aee0c0 | handling event EVENT_RETRANSMIT for parent state #399 | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #399 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #399 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49676.544566; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50032 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ecc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #399 | libevent_malloc: new ptr-libevent@0x7fb37c0300e0 size 128 "road-eastnet-nonat-147" #399: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #399) | 9a 35 91 e3 ae 4f 45 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 ce a5 03 ec 4a ee 33 f3 67 48 7b 6f be a9 66 | fb 8e 19 e6 36 60 4c c6 f2 fa ab 4a 53 70 9f a8 | 5d 61 41 57 15 0a 04 a9 c6 86 5d ab 3b 79 47 d9 | 64 c0 42 8c 2d 5e 11 ee 5a b4 7c 00 df db 58 b0 | 10 63 ed d6 5b 1a 63 c2 6e 59 c7 e8 2a 78 4e 44 | 25 ff 91 a5 4f 9f d4 f8 46 f6 2e bb b6 05 d4 45 | 7f ef 54 77 ee f0 2c 99 e2 fe 9b fe 0e 9d c8 14 | ca 70 65 95 d9 6c bd 1f dd d1 55 09 ab fd c5 44 | 6f ba 1f 76 70 5a 17 28 af 45 27 b3 5f fa fe 02 | 6a 08 1d 7c 03 0b fb b8 0b b4 48 92 28 71 ac 6f | 5f 3f a7 45 71 f7 92 e0 6c 9d f2 6c bb 9e 54 7d | 4e c3 05 e2 c9 1e 50 4a ea 5d b8 f4 10 cd bd ed | f5 70 36 5b 63 22 bb 46 fb e4 aa 69 fc 3a 38 34 | d5 97 f3 9a 0b d9 79 ac e6 c8 40 6d e3 6c 66 31 | 20 73 b6 2d f4 7d 52 fd f2 32 69 70 71 7f cd d6 | 06 5e 27 45 05 1c 80 53 a4 80 ee b7 a6 45 c2 7e | 29 00 00 24 a1 6d db 5e 0b f7 f4 70 57 f1 37 cb | cc a0 06 3f 1d 1e 6b 0a b6 35 fa c1 29 23 78 83 | cc 1e 42 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 7c 20 90 94 5e 44 74 17 3c c7 e7 | e8 35 eb 34 00 1c 2e 68 00 00 00 1c 00 00 40 05 | eb 24 3e a6 a5 f2 dc 45 a5 ce 8c 46 9a d0 7a ff | cb 2c 1c 90 | libevent_free: release ptr-libevent@0x7fb354046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aee0c0 | #399 spent 0.0903 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 35 91 e3 ae 4f 45 29 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #399 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #399 | rejected packet: | 9a 35 91 e3 ae 4f 45 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #399: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9f380 | handling event EVENT_RETRANSMIT for parent state #155 | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #155 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #155 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49676.553836; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008771 exceeds limit? YES "road-eastnet-nonat-155" #155: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-155" #155: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #407 at 0x557d46aa6ac0 | State DB: adding IKEv2 state #407 in UNDEFINED | pstats #407 ikev2.ike started | Message ID: init #407: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #407: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #407; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-155" #407: initiating v2 parent SA to replace #155 | using existing local IKE proposals for connection road-eastnet-nonat-155 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 407 for state #407 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aee0c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #407 | libevent_malloc: new ptr-libevent@0x7fb354046040 size 128 | #407 spent 0.0698 milliseconds in ikev2_parent_outI1() | RESET processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #155 ikev2.ike failed too-many-retransmits | pstats #155 ikev2.ike deleted too-many-retransmits | #155 spent 2.16 milliseconds in total | [RE]START processing: state #155 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-155" #155: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #155: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #155 "road-eastnet-nonat-155" #155: deleting IKE SA for connection 'road-eastnet-nonat-155' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-155' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-155 | crypto helper 15 resuming | State DB: deleting IKEv2 state #155 in PARENT_I1 | crypto helper 15 starting work-order 407 for state #407 | parent state #155: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 407 | stop processing: state #155 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb36402ffd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9f380 | in statetime_stop() and could not find #155 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-155 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-155" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-155' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-155" | stop processing: connection "road-eastnet-nonat-155" (in initiate_a_connection() at initiate.c:349) | spent 0.0605 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 407 time elapsed 0.000546 seconds | (#407) spent 0.546 milliseconds in crypto helper computing work-order 407: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 407 for state #407 to event queue | scheduling resume sending helper answer for #407 | libevent_malloc: new ptr-libevent@0x7fb374029410 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #407 | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 407 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #407 | **emit ISAKMP Message: | initiator cookie: | 0e f3 59 3b 18 9b 4c 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-155 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9c 5f 7f 81 27 bd f8 4f 84 8b e5 e1 d9 93 de d8 | ikev2 g^x ec 64 3c 7a c3 34 95 f3 06 ea 96 b5 7a 1b 8f d9 | ikev2 g^x c8 72 7c 66 d5 b2 ca 73 d5 43 7d ea c5 0c 84 ce | ikev2 g^x ea c7 b2 0b b4 5d 2c b0 44 4e 93 91 63 38 66 d7 | ikev2 g^x 19 d5 08 6f 6d f9 84 4a 63 7a 55 68 05 24 95 3e | ikev2 g^x 99 aa 1e b1 c3 ab 11 18 fa 12 e7 7c 5e c4 8f e2 | ikev2 g^x 44 28 c7 70 13 76 b9 dd 3a a6 1c 9b 90 d4 8f 73 | ikev2 g^x 83 e9 82 03 c0 46 28 ea 33 e9 c1 33 69 9b 00 f8 | ikev2 g^x f6 cd 83 94 cf a0 a7 5e b8 a0 8a 65 44 ef ec 83 | ikev2 g^x 35 ff 33 b2 45 4f 06 95 40 67 f8 16 c1 7f cb 23 | ikev2 g^x 42 69 1a ee 3e 5b 22 ed 9d 49 26 08 ce 24 1f dc | ikev2 g^x 4a 71 86 ce 70 39 9b 18 48 00 7f 0b fd 35 9a e2 | ikev2 g^x 3f 9a 8e 15 96 bd 41 9e d7 e9 02 79 05 c7 13 f3 | ikev2 g^x c8 1e 09 29 1f ca 34 e6 f2 7a 3f 24 4a 98 16 47 | ikev2 g^x 9a 91 43 46 5c 83 b4 00 84 95 4d df 42 56 5f 61 | ikev2 g^x 36 41 b7 50 c0 98 6b 76 ff 78 86 a6 38 01 7c 10 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 21 43 66 be 17 99 40 cd 23 ec 46 61 66 3c a9 d5 | IKEv2 nonce 4d dd 70 3a b4 cd a8 e6 b6 42 a4 c0 0c aa c9 a3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0e f3 59 3b 18 9b 4c 1a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9b | natd_hash: port= 01 f4 | natd_hash: hash= 34 43 3c a2 b5 33 c4 3b e7 27 68 b0 1d 1f b8 cf | natd_hash: hash= bc 05 b9 a9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 34 43 3c a2 b5 33 c4 3b e7 27 68 b0 1d 1f b8 cf | Notify data bc 05 b9 a9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0e f3 59 3b 18 9b 4c 1a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 76 06 02 ba 2b 08 ee 9d 42 ab b0 60 2b 0a e2 b7 | natd_hash: hash= a2 85 77 a0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 76 06 02 ba 2b 08 ee 9d 42 ab b0 60 2b 0a e2 b7 | Notify data a2 85 77 a0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #407 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #407: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #407 to 4294967295 after switching state | Message ID: IKE #407 skipping update_recv as MD is fake | Message ID: sent #407 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-155" #407: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.155:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #407) | 0e f3 59 3b 18 9b 4c 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 5f 7f 81 27 bd f8 4f 84 8b e5 e1 d9 93 de d8 | ec 64 3c 7a c3 34 95 f3 06 ea 96 b5 7a 1b 8f d9 | c8 72 7c 66 d5 b2 ca 73 d5 43 7d ea c5 0c 84 ce | ea c7 b2 0b b4 5d 2c b0 44 4e 93 91 63 38 66 d7 | 19 d5 08 6f 6d f9 84 4a 63 7a 55 68 05 24 95 3e | 99 aa 1e b1 c3 ab 11 18 fa 12 e7 7c 5e c4 8f e2 | 44 28 c7 70 13 76 b9 dd 3a a6 1c 9b 90 d4 8f 73 | 83 e9 82 03 c0 46 28 ea 33 e9 c1 33 69 9b 00 f8 | f6 cd 83 94 cf a0 a7 5e b8 a0 8a 65 44 ef ec 83 | 35 ff 33 b2 45 4f 06 95 40 67 f8 16 c1 7f cb 23 | 42 69 1a ee 3e 5b 22 ed 9d 49 26 08 ce 24 1f dc | 4a 71 86 ce 70 39 9b 18 48 00 7f 0b fd 35 9a e2 | 3f 9a 8e 15 96 bd 41 9e d7 e9 02 79 05 c7 13 f3 | c8 1e 09 29 1f ca 34 e6 f2 7a 3f 24 4a 98 16 47 | 9a 91 43 46 5c 83 b4 00 84 95 4d df 42 56 5f 61 | 36 41 b7 50 c0 98 6b 76 ff 78 86 a6 38 01 7c 10 | 29 00 00 24 21 43 66 be 17 99 40 cd 23 ec 46 61 | 66 3c a9 d5 4d dd 70 3a b4 cd a8 e6 b6 42 a4 c0 | 0c aa c9 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 43 3c a2 b5 33 c4 3b e7 27 68 b0 | 1d 1f b8 cf bc 05 b9 a9 00 00 00 1c 00 00 40 05 | 76 06 02 ba 2b 08 ee 9d 42 ab b0 60 2b 0a e2 b7 | a2 85 77 a0 | state #407 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb354046040 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aee0c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9f380 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #407 | libevent_malloc: new ptr-libevent@0x7fb36402ffd0 size 128 | #407 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49676.554931 | resume sending helper answer for #407 suppresed complete_v2_state_transition() and stole MD | #407 spent 0.33 milliseconds in resume sending helper answer | stop processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb374029410 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e f3 59 3b 18 9b 4c 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #407 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #407 | rejected packet: | 0e f3 59 3b 18 9b 4c 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9b fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #407: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf80 | handling event EVENT_RETRANSMIT for parent state #392 | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #392 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #392 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49676.556101; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00191 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374045e40 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #392 | libevent_malloc: new ptr-libevent@0x7fb374029410 size 128 "road-eastnet-nonat-140" #392: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #392) | 10 0f ce a6 80 60 53 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 7c dc 39 42 03 83 1d fc 78 1f a6 0a 82 be ac | 8c 3b 39 1b 2f 80 e7 cb aa b0 35 db d6 f3 de 35 | 37 b1 68 f3 68 1d 2d f4 b0 35 cc 7b dc 22 05 f9 | b7 af f7 1d a4 46 4d 00 a0 fe ea 26 a2 f9 9b 9a | 09 ee 3f e6 65 a7 03 64 d2 2c 26 ad b0 0a b6 6c | b7 a6 17 d4 6e a3 92 2f 34 cc d4 54 77 6b ca 57 | d5 59 3b bf 54 fe aa b8 9e 19 8b 0b 05 8a f7 be | fc d0 1b 7e ca 71 b1 c1 02 6a 82 df ef f5 65 97 | da 1e 51 41 e3 d8 f1 96 c4 03 03 bd 8f 10 04 b2 | c3 58 82 7f ce 35 78 05 db 11 6d 1f 95 52 d4 56 | 49 d1 80 fa 2e f3 ac 1f 38 a0 e5 d5 81 e9 34 d8 | 41 7f 2d 0d 61 dd 7b e7 44 a4 89 c9 0c 7d 05 e4 | 9f 1e 2d 40 16 34 e0 f0 2c f0 ca 39 ea 5a 9b 3c | e7 ee 11 8b d0 d0 71 64 02 96 00 c1 27 19 8e 75 | f0 b3 d3 5e 45 6f c3 79 42 e7 20 9d b5 0d 76 ff | e5 ba 64 52 91 7f bb 6e bc 95 4c d1 a1 34 da e7 | 29 00 00 24 27 55 30 76 6e b8 e9 20 0f 49 9d 0e | 6c f7 55 67 5b a0 fb d4 e7 df 75 53 94 42 2e 19 | d9 ae ec a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 0f f0 e9 84 b6 f5 5d 7e 1b 97 d7 | 89 b2 50 d4 36 fd 91 50 00 00 00 1c 00 00 40 05 | 93 22 be de f9 76 c2 04 2a 35 c8 fb 20 98 3d d6 | 50 a7 79 8d | libevent_free: release ptr-libevent@0x7fb344008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf80 | #392 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 0f ce a6 80 60 53 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #392 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #392 | rejected packet: | 10 0f ce a6 80 60 53 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #392: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344012bf0 | handling event EVENT_RETRANSMIT for parent state #378 | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #378 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #378 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49676.563366; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002763 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #378 | libevent_malloc: new ptr-libevent@0x7fb344008e30 size 128 "road-eastnet-nonat-126" #378: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #378) | 92 97 bf d9 57 64 2b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 7e 95 c3 59 64 68 1e dc 08 f2 0b df c0 d3 85 | e4 57 68 76 f4 90 dc 14 fc b4 13 07 10 44 a8 8d | 11 66 84 12 ea 03 ab ca df 00 f5 13 ba 15 16 97 | c3 ae f2 09 b4 c2 1e 65 f4 d4 ef 76 85 ff a3 4a | ac ec 61 57 66 09 9f 4c b2 b0 4b 1a 98 fe 62 e6 | 55 f4 45 b9 db aa 2b bf cb d7 f6 c7 03 42 ad 34 | c6 d8 65 c8 40 fd 09 2c 94 7c 3b f3 2f 0a 0e 1d | 89 ee 1f 04 2f 4d 06 ee d1 19 c4 2e 99 32 3d c2 | d8 62 64 5d 3c 19 32 29 e6 a4 d4 41 97 46 6e 74 | 98 69 50 bd e9 22 20 c8 a0 94 d0 e1 2c ac e0 d4 | 3d 6d 89 f8 65 d2 f8 6c 5d 07 8b 5f be 6f 9f a2 | e3 9a 7d 49 fc a1 b3 f5 34 84 25 08 1b bf 82 69 | 97 0b c6 17 ae 91 38 6f 37 30 af 60 73 cd d7 76 | 1c 53 8a ed 55 8d 3b a6 b0 09 19 d4 bd 91 ad 63 | d2 44 97 69 9c 25 f2 23 5f d4 fb c5 78 47 07 23 | 75 fb 33 32 09 b8 13 e4 4b fc ad 29 45 c0 60 e8 | 29 00 00 24 45 ad fc 22 10 a1 61 46 e5 0c 1e 06 | 27 43 7b e2 4e f3 c7 89 82 92 48 5f 08 ae ee 54 | 20 02 7f 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb d4 ce a5 02 7b 5e 75 a8 72 0f 9e | 6c 02 05 b4 a6 0e 08 51 00 00 00 1c 00 00 40 05 | 67 63 47 aa c8 01 74 31 fc 9f e6 c6 9d 96 80 21 | f6 7a 37 28 | libevent_free: release ptr-libevent@0x7fb34401a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344012bf0 | #378 spent 0.0845 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 97 bf d9 57 64 2b d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #378 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #378 | rejected packet: | 92 97 bf d9 57 64 2b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #378: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35800cc10 | handling event EVENT_RETRANSMIT for parent state #298 | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #298 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #298 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49676.602597; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004965 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344012bf0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #298 | libevent_malloc: new ptr-libevent@0x7fb34401a4e0 size 128 "road-eastnet-nonat-46" #298: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #298) | d5 0c ec bc d3 64 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 43 96 23 e5 3a d0 2d 36 cd 43 2d 58 c4 e0 92 a1 | ed 2d e1 4c 45 8b 42 ad 40 76 ab 67 60 92 c4 09 | 73 c4 c7 3c 9d 80 31 b9 bf b9 9e 64 35 e4 39 ba | 2f a8 59 fe 53 09 d8 e0 e9 88 59 30 e2 71 e6 be | 2d 69 bc 6a a7 6e 4f db 2a 6a 88 01 9f d2 1a 54 | 9b 70 8c b4 c5 37 d0 1b eb c3 58 21 ce 79 a3 ff | 4e 1b 84 aa 1e 08 dd 9d 9d 58 7a ba b0 dd 2d 38 | 9e da 29 29 b5 fb 28 78 05 fa 3a 26 c0 d3 4c cf | 22 22 af c7 f1 d8 11 18 01 e3 41 10 fc 1b c9 38 | 58 6b be 13 fa e2 38 5b 8d 00 15 50 84 fd a8 e0 | 20 22 31 ab 99 61 d4 85 a8 6c 2e d8 1f e4 26 c0 | 25 17 38 c7 a5 82 30 0d e2 85 f0 d0 e0 3a 59 87 | 67 7b 0d e4 52 7b 6c 35 93 c6 f4 61 2c 32 e9 62 | b8 57 d1 59 0b 7c af 14 d1 9d bb 91 61 85 75 09 | ed c6 43 19 bf 09 f8 e4 92 e6 1f f3 47 e1 6e 0a | 5a 69 40 30 db b0 00 24 c2 61 94 a9 30 49 e7 0e | 29 00 00 24 4c 0e e1 06 42 9e 4c 74 3b 65 ba d4 | bc 56 1a 69 be b4 c7 ec 29 68 0f 7e 31 97 81 70 | 75 a5 f0 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 96 a5 ca 09 14 9d 81 34 51 5c 38 | 06 b0 7e 03 d4 af 12 47 00 00 00 1c 00 00 40 05 | 1b 14 fa aa 2e 1c b4 a7 92 80 67 79 37 9e 5c 02 | 1f 84 46 7d | libevent_free: release ptr-libevent@0x7fb35804ba00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800cc10 | #298 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 0c ec bc d3 64 84 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #298 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #298 | rejected packet: | d5 0c ec bc d3 64 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #298: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384015160 | handling event EVENT_RETRANSMIT for parent state #400 | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #400 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #400 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49676.606924; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500484 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #400 | libevent_malloc: new ptr-libevent@0x7fb35804ba00 size 128 "road-eastnet-nonat-148" #400: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #400) | 6c f1 c2 e4 ca 88 89 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 14 1f bf 2d 44 6c 78 3f 86 f8 f3 fa a1 a5 9d | a0 a8 08 62 76 01 cc db f3 4e 4a c1 03 ae f2 db | c6 06 da 1a 15 ae 3e f9 fa b6 70 0f b3 7b e5 34 | 8d 5b 06 20 ef d4 aa 62 0d d5 a9 7d 3d 49 08 95 | 77 51 97 14 c6 fe 13 ee ee 9b f0 54 56 73 79 30 | ad d7 b3 17 12 47 8d 8d e8 49 20 41 18 2a 1c c8 | c4 68 99 45 f4 b5 f1 6d d9 34 ec 8a e3 80 cc 67 | 30 b6 d6 0d 11 9e 86 7f 87 2f c0 73 7c 40 eb 31 | 24 34 89 0e ca 7b 62 d2 f6 17 85 8f 75 81 28 9b | 1c a9 03 80 8d 78 61 63 07 3b b3 b9 c4 40 46 d5 | ab 82 5f da 4c aa ce 61 bb ab c0 1a 00 85 50 e6 | e8 f6 9f c8 7f 01 8e 16 ac 04 56 78 cf 7c 43 a9 | f9 c7 26 fb 06 32 92 98 86 3f 37 ca f2 f2 fc bf | 1d e3 ee 48 e8 25 74 7d 16 d9 38 6e ca e9 38 51 | 44 22 32 93 01 95 d0 87 12 07 ff 4c 7e 49 f3 04 | 98 50 fe 91 bd 78 84 00 92 17 d7 f5 e0 e1 d0 43 | 29 00 00 24 aa 21 0d 2f 8b 5a 11 5c 7a 19 73 4d | 8f 68 86 24 6a ba 53 0b 82 59 c5 5c 31 b4 eb 7e | 18 78 2e 54 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 82 bc d9 51 57 ae 67 73 5e 22 78 | a2 06 a4 b1 df 07 78 c3 00 00 00 1c 00 00 40 05 | 48 01 58 d1 13 9f 6e 34 06 7b 6e f6 08 2f fa 1f | f9 ef b6 96 | libevent_free: release ptr-libevent@0x7fb348035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384015160 | #400 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c f1 c2 e4 ca 88 89 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #400 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #400 | rejected packet: | 6c f1 c2 e4 ca 88 89 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #400: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.07 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b026c0 | handling event EVENT_RETRANSMIT for parent state #156 | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #156 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #156 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49676.617274; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006717 exceeds limit? YES "road-eastnet-nonat-156" #156: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-156" #156: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #408 at 0x557d46aa8080 | State DB: adding IKEv2 state #408 in UNDEFINED | pstats #408 ikev2.ike started | Message ID: init #408: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #408: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #408; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-156" #408: initiating v2 parent SA to replace #156 | using existing local IKE proposals for connection road-eastnet-nonat-156 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 408 for state #408 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb384015160 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #408 | libevent_malloc: new ptr-libevent@0x7fb348035930 size 128 | #408 spent 0.0933 milliseconds in ikev2_parent_outI1() | RESET processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 19 resuming | crypto helper 19 starting work-order 408 for state #408 | pstats #156 ikev2.ike failed too-many-retransmits | pstats #156 ikev2.ike deleted too-many-retransmits | #156 spent 2.57 milliseconds in total | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 408 | [RE]START processing: state #156 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-156" #156: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #156: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #156 "road-eastnet-nonat-156" #156: deleting IKE SA for connection 'road-eastnet-nonat-156' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-156' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-156 | State DB: deleting IKEv2 state #156 in PARENT_I1 | parent state #156: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #156 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb388048a80 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 408 time elapsed 0.000613 seconds | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b026c0 | in statetime_stop() and could not find #156 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#408) spent 0.617 milliseconds in crypto helper computing work-order 408: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 408 for state #408 to event queue | scheduling resume sending helper answer for #408 | libevent_malloc: new ptr-libevent@0x7fb368029760 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 19 waiting (nothing to do) Initiating connection road-eastnet-nonat-156 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-156" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-156' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-156" | stop processing: connection "road-eastnet-nonat-156" (in initiate_a_connection() at initiate.c:349) | spent 0.0716 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x7fb33801d710 | handling event EVENT_RETRANSMIT for parent state #393 | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #393 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #393 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49676.61817; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001564 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b026c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #393 | libevent_malloc: new ptr-libevent@0x7fb388048a80 size 128 "road-eastnet-nonat-141" #393: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #393) | d2 4f c7 97 0e 2c 3e ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 57 42 91 f9 c0 06 25 d3 5e c6 ff a0 b9 c7 9a | f8 73 f5 52 ea b3 b7 0b 33 79 a9 ab be 94 f5 d3 | 47 a2 ed 3f 30 d5 f5 d7 c5 7f 9d d3 ed 4d a0 b4 | f7 ad a1 76 18 49 17 db 8a b9 cb ed 58 a9 0c d9 | 5a 76 b8 cb 07 f9 85 e7 ea fe 63 f8 ee 0b 16 50 | 8f 7f 23 44 74 8a 56 f9 51 93 d3 d4 1e a9 e0 6d | d7 af c4 1a 46 a4 66 f8 55 f1 fc bb 79 62 df 34 | 8f ee 1b 57 26 7e c4 de 20 f4 80 c2 d6 80 72 a1 | aa 53 f1 e8 e4 e6 1c e7 0b 29 98 85 7a 59 d5 aa | 68 b0 88 b1 b9 15 73 53 b5 6a 19 c9 ae 48 c5 a2 | 01 52 4f ea f5 c9 9f b8 90 37 cc 56 4f 8d 78 b9 | 10 dc d8 56 42 a7 88 d4 9d 82 8e d9 33 ab ac 86 | 5e b8 f6 d0 8e 0c aa b2 4f 41 73 62 f2 0c c2 27 | ef ba c6 42 e2 bb a6 b0 c4 15 d3 04 4c 56 e0 5c | ad 92 8b ed ed ba dd c2 b7 4a 92 54 4a ae d4 37 | c3 0d 4f 7c 37 7e 0b 49 1e 1d 38 1e 4b 41 b4 43 | 29 00 00 24 f4 b5 fb 56 01 5f ac 00 1d 31 6b d7 | 01 8d f2 d0 3f 15 27 39 dc 6b 31 7e 82 50 a3 bb | 9c f0 ec f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 9c 87 ea bd bf 36 3e cf 82 b1 7a | 78 3f f7 57 2c cf 08 1f 00 00 00 1c 00 00 40 05 | 77 3b 5d 4c 9c 3f 6e 8a 01 7a d1 9c 5b 89 36 dc | 10 f8 1f e1 | libevent_free: release ptr-libevent@0x7fb338023e10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33801d710 | #393 spent 0.0836 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 4f c7 97 0e 2c 3e ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #393 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #393 | rejected packet: | d2 4f c7 97 0e 2c 3e ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #393: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #408 | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 408 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #408 | **emit ISAKMP Message: | initiator cookie: | 34 97 74 26 6a e5 a4 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-156 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f0 b4 84 d1 c7 68 61 a7 a8 43 5d 75 52 c1 45 ab | ikev2 g^x 1c 34 c9 1c fb 58 62 3f d2 e4 63 2f df 8e 65 23 | ikev2 g^x b3 d6 a9 03 c7 71 70 03 ff 1d bb ac 17 a8 6b 6d | ikev2 g^x e6 be 80 ad c9 77 c7 17 6a 89 49 48 8d b3 43 d4 | ikev2 g^x 49 ba db 2f fb d6 1b 93 5a 1f a3 ce 04 89 6c 2c | ikev2 g^x cc 68 c0 e5 12 10 fe eb 35 b6 6c ba a1 43 99 e7 | ikev2 g^x 4d 42 5d cb 3f a9 dd f3 e4 5f 32 df 76 2b 7a ba | ikev2 g^x 94 68 cc b7 71 6f 68 e6 66 e9 1a 0b ff e7 f5 9d | ikev2 g^x 06 aa 01 3c 32 ad d4 f8 5e 61 a5 fe 63 fb f1 96 | ikev2 g^x b8 0a 85 b5 ad 42 f9 e3 5a cf 27 5e ec 13 9b d0 | ikev2 g^x 73 b5 31 d4 d2 24 51 4d f5 0b 85 9e 11 85 42 e0 | ikev2 g^x 88 fc 0a 42 f4 e7 3d 49 ba 53 8a d7 ce 64 df d3 | ikev2 g^x 52 60 3d 1b 37 34 8f 8c 6a 9e 6e 25 b4 f3 7c 18 | ikev2 g^x 7a d1 56 c7 cf 72 57 08 b3 73 0c ad 15 18 33 ce | ikev2 g^x 9c f7 e6 b3 e4 26 15 89 8c 70 86 37 d6 87 03 97 | ikev2 g^x 84 4a 45 be 3f 69 21 05 76 54 73 82 39 32 70 e8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 59 44 9e 7a bb 43 7f 93 5b bd e5 23 c1 87 73 73 | IKEv2 nonce 05 59 35 01 ab d3 f0 0b c4 05 69 18 98 63 3b b2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 34 97 74 26 6a e5 a4 52 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9c | natd_hash: port= 01 f4 | natd_hash: hash= d8 8e f2 86 2b ac 70 a5 cc 8b e7 7d ac ad 47 30 | natd_hash: hash= 21 b0 b0 7f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d8 8e f2 86 2b ac 70 a5 cc 8b e7 7d ac ad 47 30 | Notify data 21 b0 b0 7f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 34 97 74 26 6a e5 a4 52 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 79 17 f0 70 ea 4a c6 21 3a b7 c0 97 d4 68 33 32 | natd_hash: hash= 9c c8 09 b0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 79 17 f0 70 ea 4a c6 21 3a b7 c0 97 d4 68 33 32 | Notify data 9c c8 09 b0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #408 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #408: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #408 to 4294967295 after switching state | Message ID: IKE #408 skipping update_recv as MD is fake | Message ID: sent #408 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-156" #408: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.156:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #408) | 34 97 74 26 6a e5 a4 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 b4 84 d1 c7 68 61 a7 a8 43 5d 75 52 c1 45 ab | 1c 34 c9 1c fb 58 62 3f d2 e4 63 2f df 8e 65 23 | b3 d6 a9 03 c7 71 70 03 ff 1d bb ac 17 a8 6b 6d | e6 be 80 ad c9 77 c7 17 6a 89 49 48 8d b3 43 d4 | 49 ba db 2f fb d6 1b 93 5a 1f a3 ce 04 89 6c 2c | cc 68 c0 e5 12 10 fe eb 35 b6 6c ba a1 43 99 e7 | 4d 42 5d cb 3f a9 dd f3 e4 5f 32 df 76 2b 7a ba | 94 68 cc b7 71 6f 68 e6 66 e9 1a 0b ff e7 f5 9d | 06 aa 01 3c 32 ad d4 f8 5e 61 a5 fe 63 fb f1 96 | b8 0a 85 b5 ad 42 f9 e3 5a cf 27 5e ec 13 9b d0 | 73 b5 31 d4 d2 24 51 4d f5 0b 85 9e 11 85 42 e0 | 88 fc 0a 42 f4 e7 3d 49 ba 53 8a d7 ce 64 df d3 | 52 60 3d 1b 37 34 8f 8c 6a 9e 6e 25 b4 f3 7c 18 | 7a d1 56 c7 cf 72 57 08 b3 73 0c ad 15 18 33 ce | 9c f7 e6 b3 e4 26 15 89 8c 70 86 37 d6 87 03 97 | 84 4a 45 be 3f 69 21 05 76 54 73 82 39 32 70 e8 | 29 00 00 24 59 44 9e 7a bb 43 7f 93 5b bd e5 23 | c1 87 73 73 05 59 35 01 ab d3 f0 0b c4 05 69 18 | 98 63 3b b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 8e f2 86 2b ac 70 a5 cc 8b e7 7d | ac ad 47 30 21 b0 b0 7f 00 00 00 1c 00 00 40 05 | 79 17 f0 70 ea 4a c6 21 3a b7 c0 97 d4 68 33 32 | 9c c8 09 b0 | state #408 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb348035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb384015160 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33801d710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #408 | libevent_malloc: new ptr-libevent@0x7fb338023e10 size 128 | #408 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49676.618661 | resume sending helper answer for #408 suppresed complete_v2_state_transition() and stole MD | #408 spent 0.309 milliseconds in resume sending helper answer | stop processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb368029760 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 97 74 26 6a e5 a4 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #408 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #408 | rejected packet: | 34 97 74 26 6a e5 a4 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #408: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0408 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #351 | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #351 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #351 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49676.632832; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003351 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36801d710 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #351 | libevent_malloc: new ptr-libevent@0x7fb368046040 size 128 "road-eastnet-nonat-99" #351: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #351) | de 65 5f af ec 9c 14 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 61 44 ff 3b 7e 79 78 30 98 a5 1d ec cd 39 0f | a6 1b 66 bf d1 4c f4 43 49 5b 37 74 a3 cb a8 c4 | 02 cd b2 04 1f 9b 50 46 08 d0 17 33 f5 19 85 e1 | a2 5a 8d ef 3b 1f 98 53 d1 3d 4a 2f ac 4f 19 d0 | 75 e8 7a 46 60 ff e1 45 61 55 45 47 1e ee 0e a7 | 97 fc 88 fd 13 ff 6e 23 a4 a1 77 61 b8 b4 8c fd | 22 67 ad f7 22 ca bf 94 41 28 f0 31 09 ce da 26 | 10 fa 8e 66 f4 04 b3 cf 07 07 c2 53 27 d6 cc 39 | 2e fc 33 61 76 a3 a9 c9 4a 2e 0c b9 d2 ce 1e 75 | 25 69 23 a7 b0 58 cb 85 2c 74 fd 6d 3e 51 8a ff | 12 ff 22 b0 95 e5 25 84 fd 26 ce 3e 10 f5 db d4 | fe ab 71 45 0f 50 b9 5c e4 ab 89 ce f3 bc f0 b4 | b1 6f 9b 78 15 e0 b4 c0 f6 ed 55 2b 17 d3 9e 21 | ed d2 5e 21 58 74 e4 d8 96 cd 20 e3 10 b4 fa 8b | 7f 1f 1a 01 c5 db 60 d3 81 25 a3 55 50 d2 42 6d | 88 7f 5d 84 22 e5 ff 47 18 aa ac 46 b6 f6 e6 e3 | 29 00 00 24 5e 0c 91 cb 9e cc c4 3b ec b3 88 06 | 52 11 4c 47 a6 59 04 4b 44 ce c4 33 03 72 36 ef | b1 45 a0 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 90 e3 e4 9d 06 64 22 91 ff 91 cd | 3f cb ba 24 72 7e a3 02 00 00 00 1c 00 00 40 05 | 98 60 2c ab 59 ec de c3 24 7f bd 6f 4e 02 75 9a | 41 d6 b1 3b | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #351 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 65 5f af ec 9c 14 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #351 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #351 | rejected packet: | de 65 5f af ec 9c 14 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #351: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0809 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8ee40 | handling event EVENT_RETRANSMIT for parent state #379 | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #379 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #379 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49676.660218; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002083 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #379 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 "road-eastnet-nonat-127" #379: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #379) | ac d4 3b e7 18 ea 52 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 79 a1 28 22 6c 83 3f 06 54 d9 39 13 0e d2 1a | 91 c2 ca c5 f2 c4 4e d5 78 8f 04 34 b9 34 73 b2 | 0e 75 71 ec 03 a6 5b c6 fa 6d a8 f4 41 1e af 26 | a4 e1 0a 58 77 48 aa f7 f9 4b 31 cf 6b f4 65 97 | 07 66 c4 32 08 bd d1 a1 48 aa 20 4b 65 4e 17 6e | 1d 1d 3e be b4 1e 7a 49 6a 64 0a fb 44 89 ba 45 | 90 86 8a 0e 4e 08 c0 05 da d1 a0 ff 5a ee c2 33 | ff d9 1a 6f ee 08 fd 7e aa 64 53 f4 84 74 c5 cf | 19 1a 29 d4 bf 47 bd 52 17 99 38 57 75 f7 85 58 | a7 b0 c8 4e e1 95 2d 4b f1 9c 5e eb 85 14 0d 87 | ff dd 17 9a ad 51 c0 99 e2 a6 60 c5 a5 7e 68 46 | b9 5c 04 3b 76 a0 9e 3d f7 9a 42 72 b5 92 be a4 | 61 c4 dd 5e a0 a3 58 05 90 20 32 7d b8 9d ca 34 | 36 d3 6d 56 98 49 60 97 da 87 f8 14 51 ea cf 16 | 79 9b 7d e5 00 7a 74 76 25 99 77 5a ef df a7 1c | e5 07 de ab dc 8b 19 85 17 de fd 62 d8 d6 3b b0 | 29 00 00 24 7a e9 60 d7 4c 8b 32 bf 82 0a a8 9a | c0 af 7e 52 e6 dc b9 f1 3b fb 0d 8e 4f c7 9d 86 | 5c d7 7a af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b e2 54 69 3e 49 d9 e9 7b 2c 62 f7 | a1 9b 3b a0 68 bf 42 11 00 00 00 1c 00 00 40 05 | 0c ab 0f ab 0f 86 37 d7 85 f7 e9 a7 f4 f2 01 1e | 28 ca 40 2a | libevent_free: release ptr-libevent@0x7fb36c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee40 | #379 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac d4 3b e7 18 ea 52 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #379 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #379 | rejected packet: | ac d4 3b e7 18 ea 52 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #379: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a25d10 | handling event EVENT_RETRANSMIT for parent state #299 | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #299 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #299 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49676.670518; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004112 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee40 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #299 | libevent_malloc: new ptr-libevent@0x7fb36c0251c0 size 128 "road-eastnet-nonat-47" #299: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #299) | 63 02 bb 51 d9 8c b0 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 17 e8 1c e0 c7 4f 03 2d a7 55 c0 45 bf a2 96 | 6a 0c 0e 0f 3f cb a5 f2 68 03 39 51 c2 b3 0b 30 | 79 44 b0 72 39 7b b4 0b c0 9d 43 f1 cf 9c ab 76 | 17 9c 76 41 f4 97 6b 3d 79 c7 93 3a b0 36 40 75 | 1d 60 59 8c 82 e2 c7 85 c2 1c 97 4a 38 8b 6e ad | 3e 5a 0d 04 9e 51 30 61 82 af ed 37 96 e2 b6 a0 | 3b c4 41 66 ee 44 1e e7 39 9f 7c 2f f5 f2 ff 4b | 36 a8 c8 29 8b eb d2 55 7f fb 10 9c ec 8c 08 d0 | 39 05 1c 07 ac 20 cb cb a4 7c 61 41 78 60 13 d3 | dd a5 39 38 ad f1 86 ff 6a 3c d0 2d b1 eb 7c 82 | 79 91 1f 2f 55 9c db 4d e2 10 be 62 dd e3 5a 7a | 61 63 85 0c fd 8f b4 af 97 73 ef e2 1b 21 c4 96 | e5 df 1b 56 fa 11 08 d6 95 8d 53 f4 13 64 3d 3d | 98 8c 38 c7 52 64 1a 00 95 89 f1 a3 72 e2 fe 87 | 05 b1 bc 3a 2d 8d ca c2 67 8a 86 e8 36 ce a6 73 | 08 10 ff 3d c7 41 a4 c0 53 af 83 9f b4 ac d3 a6 | 29 00 00 24 7e 5d f1 77 88 98 7f 63 50 07 d0 59 | cc bb c0 62 cd 9c cc f3 5d 35 d8 78 d2 ee b4 01 | aa b2 27 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 b5 ac f1 52 82 e1 6d 65 51 7c e0 | ef a0 91 c6 07 cf fb 64 00 00 00 1c 00 00 40 05 | 8f da 92 7d 7b 47 83 cb 10 aa f2 ca 2c a8 73 ac | 13 99 82 ed | libevent_free: release ptr-libevent@0x7fb37c014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a25d10 | #299 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 02 bb 51 d9 8c b0 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #299 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #299 | rejected packet: | 63 02 bb 51 d9 8c b0 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #299: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0ea80 | handling event EVENT_RETRANSMIT for parent state #401 | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #401 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #401 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49676.673829; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500701 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a25d10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #401 | libevent_malloc: new ptr-libevent@0x7fb37c014c70 size 128 "road-eastnet-nonat-149" #401: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #401) | 32 2a 52 53 b6 80 03 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 23 97 0d 57 1e 4b f9 07 88 66 bf 34 6e 58 4c | e6 20 66 15 d1 8b df 5a d2 2b 70 66 bf e5 46 ee | 75 f4 eb 71 1f f1 6f e1 d6 58 06 0a 4d 97 04 53 | 74 d3 7a 62 9c 6d fc 73 97 9b c2 cb c3 d3 cb d1 | a7 2a 8a bf ad 15 46 4b ac 4a 21 e7 16 cd 32 18 | f6 83 ab c8 99 38 21 bc e5 81 05 3f fc e4 b5 9f | 7d 77 82 93 0f 69 5a af 5b c2 81 88 55 f6 fa cc | 86 fe 2d 7e 6d ae 3a 9b 57 e6 de 78 5a 36 ba 60 | 3d 56 da 1d 5d 7b 85 49 92 79 e6 7c 62 e6 ba 39 | 70 40 1b 2f 31 49 fc c6 d5 8b 43 aa e6 2d 80 f1 | 00 4e 8e 1a 05 73 d3 15 0d 7c 1c 15 71 3b 45 0a | 71 47 01 7c 8b 3a 4c 28 d2 c5 72 06 09 34 70 7a | 6f eb 8d 51 fc f9 d9 92 d1 00 53 57 7a 80 e8 39 | 37 38 0d 62 49 b3 0f 75 c3 ee 8b a3 66 04 51 8d | 4d ca 16 c5 dc 18 bd ee 26 01 0f c7 9b e6 0b 35 | e3 5e 44 0d 5e 45 e9 f2 25 03 56 4f 95 a8 57 74 | 29 00 00 24 98 0f af 0d 18 0d 49 ab 74 8d 40 09 | a9 19 04 ac c2 29 19 2a e5 21 dd 83 5a 09 3e 6b | 71 16 78 8b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 5b 75 e0 fb 06 ab 59 93 2a 0c bc | 70 9d 3c 6c 4b 98 95 ed 00 00 00 1c 00 00 40 05 | 06 0c a6 cc 70 cf f8 01 75 5d 68 14 0f cc 7e 89 | 81 50 60 0f | libevent_free: release ptr-libevent@0x7fb36c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0ea80 | #401 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 2a 52 53 b6 80 03 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #401 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #401 | rejected packet: | 32 2a 52 53 b6 80 03 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #401: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0585 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1af10 | handling event EVENT_RETRANSMIT for parent state #394 | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #394 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #394 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49676.683137; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001942 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0ea80 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #394 | libevent_malloc: new ptr-libevent@0x7fb36c03b0b0 size 128 "road-eastnet-nonat-142" #394: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #394) | c6 0a d6 5e 7e fc 84 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 b5 7c 6c c9 f1 d1 76 55 70 0c 53 79 42 59 aa | 1c 78 3a 1c cf 8e ff bf 3c 4f 8e 36 eb fa f5 80 | 9c 26 80 0f 65 74 f8 36 f2 69 55 0c 8f 0e 23 f4 | f2 22 a0 b5 d9 98 7e 1f aa d3 a2 c6 8c ae 8e 98 | 7c 0a f3 ed 8f 8b 88 58 8c d6 33 95 a0 55 9d 22 | 45 bd 30 81 fc 6e e7 86 9a f8 90 92 f7 2d bb 24 | 69 7e b6 2c e3 c4 d3 78 cf 51 21 62 11 c2 15 e2 | b3 a9 82 d8 15 7c 3e 4d bb 85 98 4b 06 e1 32 2f | 7a ee fc 56 3c 9b 3f a7 bb d2 50 44 19 3c 10 75 | d0 ab ea a8 d0 55 74 15 97 4a a8 8a 65 6f 7d 24 | 88 48 f4 59 45 9a aa ed 6e b4 a3 4a 2e c4 97 e3 | ef a9 a3 78 d3 c7 01 a3 80 5f 34 19 5f e9 1a 0b | 22 c3 b3 e4 7b 39 94 40 be d6 c0 25 22 6b 94 43 | 4e 6c a4 23 34 ff 10 49 a6 bf 97 8e b9 5f 55 2d | 28 e5 68 c3 b7 a6 14 92 b7 6a 59 d7 14 cc 2b 2a | 46 b7 9f a5 f7 40 91 f4 58 19 59 a8 c2 3d 8c 54 | 29 00 00 24 48 a4 83 24 df d5 ff 67 2d 1a db a8 | 39 76 5f a5 8c c2 0e 08 ee f5 2b 2a a4 7f 9e 08 | 09 74 ed 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 07 bb 4a c8 d9 c8 75 02 c5 e8 2f | 3d 22 1e b1 bf 8b 35 f7 00 00 00 1c 00 00 40 05 | 6e c1 7a 04 07 74 46 3d 3d f7 4a 09 48 b9 79 2c | 6a b6 13 f4 | libevent_free: release ptr-libevent@0x7fb3880269d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1af10 | #394 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c6 0a d6 5e 7e fc 84 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #394 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #394 | rejected packet: | c6 0a d6 5e 7e fc 84 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #394: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abe780 | handling event EVENT_RETRANSMIT for parent state #157 | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #157 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #157 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49676.689417; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.014271 exceeds limit? YES "road-eastnet-nonat-157" #157: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-157" #157: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #409 at 0x557d46aa9640 | State DB: adding IKEv2 state #409 in UNDEFINED | pstats #409 ikev2.ike started | Message ID: init #409: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #409: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #409; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-157" #409: initiating v2 parent SA to replace #157 | using existing local IKE proposals for connection road-eastnet-nonat-157 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 409 for state #409 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a1af10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #409 | libevent_malloc: new ptr-libevent@0x7fb3880269d0 size 128 | #409 spent 0.0984 milliseconds in ikev2_parent_outI1() | RESET processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #157 ikev2.ike failed too-many-retransmits | pstats #157 ikev2.ike deleted too-many-retransmits | #157 spent 2.37 milliseconds in total | [RE]START processing: state #157 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-157" #157: deleting state (STATE_PARENT_I1) aged 64.016s and NOT sending notification | parent state #157: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | crypto helper 6 resuming | crypto helper 6 starting work-order 409 for state #409 | picked newest_isakmp_sa #0 for #157 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 409 "road-eastnet-nonat-157" #157: deleting IKE SA for connection 'road-eastnet-nonat-157' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-157' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-157 | State DB: deleting IKEv2 state #157 in PARENT_I1 | parent state #157: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #157 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 409 time elapsed 0.000733 seconds | libevent_free: release ptr-libevent@0x7fb3500300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe780 | (#409) spent 0.735 milliseconds in crypto helper computing work-order 409: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 409 for state #409 to event queue | scheduling resume sending helper answer for #409 | in statetime_stop() and could not find #157 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb36c0296b0 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-157 which received a Delete/Notify but must remain up per local policy | crypto helper 6 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-157" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-157' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-157" | stop processing: connection "road-eastnet-nonat-157" (in initiate_a_connection() at initiate.c:349) | spent 0.0762 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #409 | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 409 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #409 | **emit ISAKMP Message: | initiator cookie: | 0d 5e 25 c2 55 3c 99 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-157 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5e 9e 5e 2e 09 bf 8f 71 99 55 8d fe 7f 83 64 1f | ikev2 g^x 09 d9 64 f5 c9 93 8a 5c be 46 9e 22 f6 15 48 5f | ikev2 g^x a3 27 82 be 44 32 8b ed 4e a8 f7 10 74 01 31 7a | ikev2 g^x a5 a7 4a e9 16 68 9c 40 cb 7b 6b e4 87 2e b5 7d | ikev2 g^x 61 20 08 88 29 08 bb bf f5 22 fa fd 47 2b fd 61 | ikev2 g^x a5 c3 48 69 18 1a 27 78 c3 f3 e3 0b 62 b4 52 0b | ikev2 g^x 48 72 ce 1d 37 3b 34 c5 fc ba cb 1f 9d e8 de ad | ikev2 g^x 9b ab 2c 3a d9 69 c6 42 6d b1 05 5a c4 77 34 d1 | ikev2 g^x ff 6d 2c 38 8e 1f 9c 0a 39 45 f9 c1 2e 9a c1 dd | ikev2 g^x d2 58 ca fc 7a d1 3f 4c 26 24 eb 54 5d 92 fb 39 | ikev2 g^x 47 60 ec 18 66 63 9c 19 12 10 f2 b6 7c 18 85 c7 | ikev2 g^x 6c d1 5b c2 e0 13 21 58 85 48 a4 fc 6e b1 46 84 | ikev2 g^x 53 a9 5a 65 21 91 66 41 1c 5e ad 4e a2 85 5a 4b | ikev2 g^x dd 4b fe 45 dc c9 fe ab c9 08 d4 96 88 93 93 aa | ikev2 g^x 1e 95 b1 87 3d 21 a8 b6 2f fd 18 ff 13 73 04 e2 | ikev2 g^x 11 aa e4 99 8f 8e f6 da 34 f7 b8 a6 55 2e b3 22 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 56 91 a2 13 7d 33 fd 14 52 dc d7 9d 97 62 ec aa | IKEv2 nonce 5a ba e0 81 38 20 1d 66 12 9f da fa a6 b6 f9 00 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0d 5e 25 c2 55 3c 99 87 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9d | natd_hash: port= 01 f4 | natd_hash: hash= d7 a6 1d 1c 1e 3f 9a df 29 5a 62 1d 4b b6 a0 46 | natd_hash: hash= 97 db 0a 03 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d7 a6 1d 1c 1e 3f 9a df 29 5a 62 1d 4b b6 a0 46 | Notify data 97 db 0a 03 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0d 5e 25 c2 55 3c 99 87 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= b4 37 78 a6 35 8d da 4f 96 64 40 e6 05 68 b6 9e | natd_hash: hash= 6d 2b 7a a6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b4 37 78 a6 35 8d da 4f 96 64 40 e6 05 68 b6 9e | Notify data 6d 2b 7a a6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #409 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #409: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #409 to 4294967295 after switching state | Message ID: IKE #409 skipping update_recv as MD is fake | Message ID: sent #409 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-157" #409: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.157:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #409) | 0d 5e 25 c2 55 3c 99 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e 9e 5e 2e 09 bf 8f 71 99 55 8d fe 7f 83 64 1f | 09 d9 64 f5 c9 93 8a 5c be 46 9e 22 f6 15 48 5f | a3 27 82 be 44 32 8b ed 4e a8 f7 10 74 01 31 7a | a5 a7 4a e9 16 68 9c 40 cb 7b 6b e4 87 2e b5 7d | 61 20 08 88 29 08 bb bf f5 22 fa fd 47 2b fd 61 | a5 c3 48 69 18 1a 27 78 c3 f3 e3 0b 62 b4 52 0b | 48 72 ce 1d 37 3b 34 c5 fc ba cb 1f 9d e8 de ad | 9b ab 2c 3a d9 69 c6 42 6d b1 05 5a c4 77 34 d1 | ff 6d 2c 38 8e 1f 9c 0a 39 45 f9 c1 2e 9a c1 dd | d2 58 ca fc 7a d1 3f 4c 26 24 eb 54 5d 92 fb 39 | 47 60 ec 18 66 63 9c 19 12 10 f2 b6 7c 18 85 c7 | 6c d1 5b c2 e0 13 21 58 85 48 a4 fc 6e b1 46 84 | 53 a9 5a 65 21 91 66 41 1c 5e ad 4e a2 85 5a 4b | dd 4b fe 45 dc c9 fe ab c9 08 d4 96 88 93 93 aa | 1e 95 b1 87 3d 21 a8 b6 2f fd 18 ff 13 73 04 e2 | 11 aa e4 99 8f 8e f6 da 34 f7 b8 a6 55 2e b3 22 | 29 00 00 24 56 91 a2 13 7d 33 fd 14 52 dc d7 9d | 97 62 ec aa 5a ba e0 81 38 20 1d 66 12 9f da fa | a6 b6 f9 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d7 a6 1d 1c 1e 3f 9a df 29 5a 62 1d | 4b b6 a0 46 97 db 0a 03 00 00 00 1c 00 00 40 05 | b4 37 78 a6 35 8d da 4f 96 64 40 e6 05 68 b6 9e | 6d 2b 7a a6 | state #409 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3880269d0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a1af10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe780 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #409 | libevent_malloc: new ptr-libevent@0x7fb3880269d0 size 128 | #409 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49676.690915 | resume sending helper answer for #409 suppresed complete_v2_state_transition() and stole MD | #409 spent 0.442 milliseconds in resume sending helper answer | stop processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c0296b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 5e 25 c2 55 3c 99 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #409 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #409 | rejected packet: | 0d 5e 25 c2 55 3c 99 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9d fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #409: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28ab0 | handling event EVENT_RETRANSMIT for parent state #352 | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #352 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #352 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49676.718128; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00431 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00cfd0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #352 | libevent_malloc: new ptr-libevent@0x7fb36c0296b0 size 128 "road-eastnet-nonat-100" #352: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #352) | 3c 05 1d c4 fe 50 38 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 64 8b 09 fa 7a d8 0e 19 4a a4 83 62 a1 a5 5a | 68 fc 46 c2 41 24 c2 81 0b b7 86 21 9c 81 02 7e | 4c e7 e3 a1 0b b2 cb 85 40 50 15 e6 9b 8e ec db | 69 e6 fa 1a ac be 36 c2 a1 ef 3e db b6 5e 52 af | 7e 52 8f f4 e4 02 53 3c 7f 96 73 09 3f 4e 1d 14 | 6d c2 31 fa 5c 39 98 fc 2c b5 f5 9e 00 af 34 e4 | 5f b6 a3 65 94 fe 46 6a 1b e5 e1 4a 56 bd a5 cf | 0a 77 7e 2c 49 79 6d b8 e1 4a 50 3f 05 7c c4 09 | eb 02 3b 50 92 11 5f 9f 53 e6 1e bd 8d 02 31 1b | ce 66 73 68 3b 0d 47 9f bd 24 08 62 f6 ab c3 d7 | a4 43 e9 f4 a6 cc 3c 8d f5 af 10 2b 54 da 75 ae | 02 35 c6 d0 b8 2f b0 bf cd b2 cd e7 d2 23 bb 30 | 31 a6 56 6a 41 57 91 fb 46 1d ee de f8 63 bc 4e | 2b 81 4f df b1 c0 cc c0 21 f9 64 98 54 3d 15 93 | 9d f2 7c 39 a9 8b 0c c2 f7 bb 99 15 ac 9c c2 51 | 1b f2 0a ec 9e 8c 56 18 67 8a fb 62 ed 27 4d ad | 29 00 00 24 a2 bb a3 dc 18 69 ac 45 10 e2 b1 d4 | a3 1c d3 0a 99 a1 33 f7 93 76 f6 b4 72 bd d3 aa | d5 07 c1 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 31 52 a7 9d 89 a3 6a 1c 72 78 4c | e5 d1 1b 1c 74 f4 f6 22 00 00 00 1c 00 00 40 05 | fc b9 a7 1f 0a 98 43 79 23 71 2c ac b0 a5 bd 76 | ba 72 e4 ab | libevent_free: release ptr-libevent@0x7fb36c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28ab0 | #352 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c 05 1d c4 fe 50 38 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #352 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #352 | rejected packet: | 3c 05 1d c4 fe 50 38 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #352: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45310 | handling event EVENT_RETRANSMIT for parent state #402 | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #402 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #402 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49676.73842; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500387 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28ab0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #402 | libevent_malloc: new ptr-libevent@0x7fb36c0407f0 size 128 "road-eastnet-nonat-150" #402: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #402) | d7 18 0b 56 dd fc 93 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 8f d0 91 ee 0c 2c 6d b1 49 7f e7 a7 c5 b4 b6 | ba 26 c6 73 cd 26 6d 07 75 be 09 23 1b d9 66 18 | 43 89 72 64 b1 d5 06 ca 9d c0 33 e2 98 5e c1 57 | 08 88 8a 2d 7a 4a eb cd 6a ad 0c 5b 60 7a 3c d6 | 1b 41 e1 63 95 9d 48 05 85 b8 3e e9 c2 2c 08 fc | 0a e1 15 60 ae 51 d5 ec 71 41 de 9c 11 57 49 6c | 9b fc 6f 1d 07 87 e1 29 06 e5 0a b9 9d 8f 51 66 | de ed ee d7 d1 94 d4 80 f9 c9 b3 72 40 5d 4f 1f | e8 51 bc 21 99 7c 48 a4 03 69 7e 36 81 2c 93 c5 | 85 f1 72 97 17 d9 4b 16 e1 02 93 16 a0 e9 5a 8c | 18 8b 2d 22 a0 68 e9 52 fc 14 55 90 a6 f2 25 49 | d1 90 07 21 fd a8 a8 15 db 83 f7 be ce 21 31 d0 | 18 03 fd af 89 22 76 d9 16 f9 54 ff a2 a4 03 62 | f9 9f ab 74 f4 75 62 99 a7 8b 91 97 ad 9d c4 9c | 3e 40 41 dc 60 23 02 31 5e 46 98 d3 1a 73 73 14 | dd ff 30 58 0d fa ab 00 11 c3 0b 18 0a c3 bc a2 | 29 00 00 24 22 ce 51 25 1e d0 f6 54 17 83 9f e7 | 7f a6 b8 56 15 08 66 12 32 0f c5 1a 1c 37 04 e4 | a3 f5 17 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 72 8a fb e8 f5 d3 16 73 e6 1b bd | ae fd 45 81 b5 65 c1 51 00 00 00 1c 00 00 40 05 | 63 4e 70 bd 7c b5 4d 3a 8c 2e 79 8c 91 4d 92 d1 | 89 54 24 9e | libevent_free: release ptr-libevent@0x7fb37c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45310 | #402 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 18 0b 56 dd fc 93 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #402 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #402 | rejected packet: | d7 18 0b 56 dd fc 93 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #402: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7b910 | handling event EVENT_RETRANSMIT for parent state #158 | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #158 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #158 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49676.745714; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007311 exceeds limit? YES "road-eastnet-nonat-158" #158: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-158" #158: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #410 at 0x557d46aaac00 | State DB: adding IKEv2 state #410 in UNDEFINED | pstats #410 ikev2.ike started | Message ID: init #410: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #410: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #410; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-158" #410: initiating v2 parent SA to replace #158 | using existing local IKE proposals for connection road-eastnet-nonat-158 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 410 for state #410 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a45310 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #410 | libevent_malloc: new ptr-libevent@0x7fb37c009640 size 128 | #410 spent 0.0735 milliseconds in ikev2_parent_outI1() | RESET processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #158 ikev2.ike failed too-many-retransmits | pstats #158 ikev2.ike deleted too-many-retransmits | #158 spent 2.65 milliseconds in total | [RE]START processing: state #158 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-158" #158: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #158: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #158 "road-eastnet-nonat-158" #158: deleting IKE SA for connection 'road-eastnet-nonat-158' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-158' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-158 | State DB: deleting IKEv2 state #158 in PARENT_I1 | parent state #158: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 11 resuming | crypto helper 11 starting work-order 410 for state #410 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 410 | stop processing: state #158 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb37803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7b910 | in statetime_stop() and could not find #158 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-158 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-158" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-158' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-158" | stop processing: connection "road-eastnet-nonat-158" (in initiate_a_connection() at initiate.c:349) | spent 0.0569 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 410 time elapsed 0.000545 seconds | (#410) spent 0.549 milliseconds in crypto helper computing work-order 410: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 410 for state #410 to event queue | scheduling resume sending helper answer for #410 | libevent_malloc: new ptr-libevent@0x7fb360029760 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #410 | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 410 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #410 | **emit ISAKMP Message: | initiator cookie: | 59 b5 db 36 67 47 70 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-158 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 99 b7 0b 8c f9 95 bc f7 80 78 70 36 f3 fd f2 85 | ikev2 g^x 36 5b 98 b3 da 7d 8e 19 72 07 91 60 60 8a e6 82 | ikev2 g^x 67 b3 ba e3 47 c2 28 3a c4 af df a8 61 5d 73 9e | ikev2 g^x d2 63 4a 41 c1 df 23 58 85 d0 d0 d7 31 64 13 d3 | ikev2 g^x fc c4 39 95 ba ac 0f ae 94 0f 0a ba f0 76 e9 ae | ikev2 g^x a0 35 47 51 b9 fa 43 1f 5e 7f a1 99 3d cc 76 ac | ikev2 g^x 19 ca 51 32 ad cd e2 9d 6b 98 62 47 ad 2c d1 40 | ikev2 g^x 11 bd ff e1 9d 02 a1 c8 40 a8 ed 91 e5 60 1c 79 | ikev2 g^x ee 69 bc ed 65 82 b2 85 d5 b1 74 ab f9 fa 7a e9 | ikev2 g^x f0 dc 57 ef e3 3e 09 b2 80 4a e9 c3 55 5a 97 3e | ikev2 g^x 39 d4 2d 85 ca cc 9a e5 d4 76 c5 5e 9e c1 e9 7d | ikev2 g^x 39 17 67 a4 c4 56 99 a0 e7 0c b7 13 22 44 76 46 | ikev2 g^x 08 b0 60 5a a2 8d 7d 3c 2d 85 7a 7a dd 83 3a 2b | ikev2 g^x 27 be 2b 38 04 53 2f 3d 0c cd c0 ad bc 4e 6a 91 | ikev2 g^x 94 3d 91 ac 7d a2 5b fd 39 2e 69 e6 48 9c ae be | ikev2 g^x 71 e2 83 13 24 ec 5c 04 d1 c5 4a 80 96 3c 2f 11 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e1 88 5c 17 02 b4 80 04 34 b3 a7 d4 f8 d1 c3 d6 | IKEv2 nonce e1 59 82 cb 1f c0 98 16 57 75 53 e7 ef 70 14 25 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 59 b5 db 36 67 47 70 48 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9e | natd_hash: port= 01 f4 | natd_hash: hash= a7 ce e5 8e 76 7c ee 72 e4 c9 6c 0a 7e 11 3d 4e | natd_hash: hash= e7 09 5c 04 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a7 ce e5 8e 76 7c ee 72 e4 c9 6c 0a 7e 11 3d 4e | Notify data e7 09 5c 04 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 59 b5 db 36 67 47 70 48 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2c 17 58 9d 14 87 37 db ad 40 b0 f7 64 73 53 a7 | natd_hash: hash= 0b 3f 01 e6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2c 17 58 9d 14 87 37 db ad 40 b0 f7 64 73 53 a7 | Notify data 0b 3f 01 e6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #410 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #410: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #410 to 4294967295 after switching state | Message ID: IKE #410 skipping update_recv as MD is fake | Message ID: sent #410 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-158" #410: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.158:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #410) | 59 b5 db 36 67 47 70 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 b7 0b 8c f9 95 bc f7 80 78 70 36 f3 fd f2 85 | 36 5b 98 b3 da 7d 8e 19 72 07 91 60 60 8a e6 82 | 67 b3 ba e3 47 c2 28 3a c4 af df a8 61 5d 73 9e | d2 63 4a 41 c1 df 23 58 85 d0 d0 d7 31 64 13 d3 | fc c4 39 95 ba ac 0f ae 94 0f 0a ba f0 76 e9 ae | a0 35 47 51 b9 fa 43 1f 5e 7f a1 99 3d cc 76 ac | 19 ca 51 32 ad cd e2 9d 6b 98 62 47 ad 2c d1 40 | 11 bd ff e1 9d 02 a1 c8 40 a8 ed 91 e5 60 1c 79 | ee 69 bc ed 65 82 b2 85 d5 b1 74 ab f9 fa 7a e9 | f0 dc 57 ef e3 3e 09 b2 80 4a e9 c3 55 5a 97 3e | 39 d4 2d 85 ca cc 9a e5 d4 76 c5 5e 9e c1 e9 7d | 39 17 67 a4 c4 56 99 a0 e7 0c b7 13 22 44 76 46 | 08 b0 60 5a a2 8d 7d 3c 2d 85 7a 7a dd 83 3a 2b | 27 be 2b 38 04 53 2f 3d 0c cd c0 ad bc 4e 6a 91 | 94 3d 91 ac 7d a2 5b fd 39 2e 69 e6 48 9c ae be | 71 e2 83 13 24 ec 5c 04 d1 c5 4a 80 96 3c 2f 11 | 29 00 00 24 e1 88 5c 17 02 b4 80 04 34 b3 a7 d4 | f8 d1 c3 d6 e1 59 82 cb 1f c0 98 16 57 75 53 e7 | ef 70 14 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 ce e5 8e 76 7c ee 72 e4 c9 6c 0a | 7e 11 3d 4e e7 09 5c 04 00 00 00 1c 00 00 40 05 | 2c 17 58 9d 14 87 37 db ad 40 b0 f7 64 73 53 a7 | 0b 3f 01 e6 | state #410 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a45310 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7b910 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #410 | libevent_malloc: new ptr-libevent@0x7fb37803b0b0 size 128 | #410 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49676.746822 | resume sending helper answer for #410 suppresed complete_v2_state_transition() and stole MD | #410 spent 0.335 milliseconds in resume sending helper answer | stop processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb360029760 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 59 b5 db 36 67 47 70 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #410 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #410 | rejected packet: | 59 b5 db 36 67 47 70 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9e fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #410: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37400cc10 | handling event EVENT_RETRANSMIT for parent state #300 | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #300 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #300 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49676.749002; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004908 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3600129a0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #300 | libevent_malloc: new ptr-libevent@0x7fb3500300e0 size 128 "road-eastnet-nonat-48" #300: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #300) | 5a 7e ff 7d 11 39 dd fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 d7 07 3e b9 b2 ed 0a cc c5 e4 47 ac fb df bc | 0b 82 8a 56 1b e7 c2 b9 79 67 f6 05 c1 b0 1a 41 | e0 93 9f 0d bb 5b 76 5f ac 5e ea 5e 58 49 c4 c3 | 9b f8 0e 2d 48 75 fe 88 ae 81 6e bd fc ad 1e 40 | 65 b9 12 2a 8f 3a b5 a4 e3 d6 7e 50 9a b3 12 10 | be 2b 79 8f 29 34 8f 0b 99 4e 4e 7a 4b 49 42 b4 | 04 b2 ac fc ac a3 5a 98 37 17 c3 a2 f0 f0 c9 79 | df 28 17 de 36 02 c0 b4 1b f3 2c 9d ad d8 f6 f4 | c9 44 36 2c 9a 21 d9 68 8c 86 58 41 ae 59 e7 74 | 88 a3 d3 f6 a3 ef 04 07 90 c9 82 f0 a7 49 d9 a4 | 83 0f b0 90 08 f3 eb 02 f4 ec 40 8a 98 92 d5 38 | 7d db 73 c5 6a 66 84 84 0b 3e ba 92 37 b8 31 bd | 61 f6 57 d8 cd fd ab d5 b0 51 b6 0b 3f 5e a3 a5 | 0b 5e 9e c6 f9 0e 39 09 62 b7 fe 88 e1 1e 94 68 | 7e ba 69 87 7e ff 7f 13 a8 f4 7a 0a b2 7e 1c 3c | 9c 70 0e 6e a8 6f 4b 28 4f f5 1d ce 10 46 27 eb | 29 00 00 24 db d2 83 de 45 20 a2 89 40 10 d1 ad | 44 17 5c 15 2b 8f 9e 84 0d 1b 42 0f a9 75 90 ef | 32 25 81 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 9c e3 05 f1 a6 88 c9 89 5f 4a 78 | 8b 60 50 45 77 4b 7a a3 00 00 00 1c 00 00 40 05 | 2b d5 a3 e8 51 d4 0b 1b d6 4d 4a ff ba 69 1c 93 | 2c 16 fd 8b | libevent_free: release ptr-libevent@0x7fb37401f7f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37400cc10 | #300 spent 0.0925 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 7e ff 7d 11 39 dd fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #300 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #300 | rejected packet: | 5a 7e ff 7d 11 39 dd fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #300: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0408 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #380 | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #380 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #380 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49676.74916; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002982 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37400cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #380 | libevent_malloc: new ptr-libevent@0x7fb37401f7f0 size 128 "road-eastnet-nonat-128" #380: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #380) | 8c 85 b9 1f be 6e 3d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 1e de d9 e8 4b 77 f1 86 35 82 03 5f ce 7b cb | 0a c9 87 87 aa 3a 74 01 02 fc e1 64 e0 07 7c 06 | dd ed c8 68 23 d7 e1 98 d6 47 ab 77 d0 38 d7 b3 | 2e d4 c4 52 2d e3 2c bc 34 35 8e 16 9e 83 9d 76 | 9f cc 43 a2 24 c5 ff 0f ed 32 bf e5 c9 3b bb e7 | a4 cc 2a 54 79 4f 13 6e 29 6d 75 36 6c 87 01 9c | 1f e0 d3 9f 4c c1 24 b9 2b d8 7b fa 2a d1 70 cc | f1 73 67 12 91 0a 83 03 b6 96 60 5a f8 fb a0 1a | 92 b6 0c fb e9 77 6e a8 e9 d4 02 be 0d 82 27 ba | 20 48 7d ed 5d 31 52 4a 59 63 6f 7e c4 3e 2e ac | 5e 97 a4 c4 d3 ae 3d fa a4 3b fb c2 de b4 5c 6c | f2 4a 19 f4 47 5a 00 3f 78 e7 bc 36 32 f4 d0 ce | 7c 2d 58 ca fa c4 cc 95 9e a4 78 b5 2d fd 23 cb | 2a 9d bc 7a 8a bb 88 97 8b fb 82 e5 e3 af 23 95 | 4e ed 5d 7c 45 af c0 e7 bb 20 cb e5 da 63 b4 54 | a8 b6 35 4f 40 f2 02 b1 8a 9f 38 00 e7 8b 27 93 | 29 00 00 24 e9 59 12 f8 16 a7 9f df 69 ae 67 26 | 7d 68 3d f0 e8 95 32 e5 ac 44 49 ce 96 5b 71 84 | 56 84 ec f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 47 26 04 c2 b4 0a 38 20 0b c5 38 | 8f 45 ae 49 d1 6f dd cf 00 00 00 1c 00 00 40 05 | 48 d9 a4 21 0f e8 6e ab 23 f4 84 7b 2a 45 72 13 | eb 6b 5f 3a | libevent_free: release ptr-libevent@0x7fb3700300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #380 spent 0.0706 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c 85 b9 1f be 6e 3d 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #380 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #380 | rejected packet: | 8c 85 b9 1f be 6e 3d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #380: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0375 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c018460 | handling event EVENT_RETRANSMIT for parent state #395 | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #395 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #395 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49676.757383; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001277 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #395 | libevent_malloc: new ptr-libevent@0x7fb3700300e0 size 128 "road-eastnet-nonat-143" #395: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #395) | ba 7b 3c 0c 6c 47 ed ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 88 4c 55 7e d1 a2 38 a3 4d 34 44 bf 98 52 f4 22 | 2b 2e d7 52 9d e2 60 32 f1 e9 de 11 e6 81 90 27 | 7f aa b4 cd 92 c7 cc 0a 99 86 49 e0 e9 e5 7f c7 | 53 00 84 30 c4 2b a1 40 94 2b e5 13 32 e0 cc 77 | 9f 67 6c cf 30 e7 4a c4 94 da 5f 5f 42 9a ce 83 | 94 65 21 10 2f c8 9d e9 90 7c c8 a2 24 10 5f eb | b7 e4 01 18 df 72 f4 7a bb ab 13 f9 5e 78 3b bb | fa c9 e1 75 55 1d c1 7d 77 9c f5 dd 9c f1 6d cf | 64 15 f4 f8 06 12 d8 2b 76 e9 8f 68 61 57 5e f9 | ce b7 25 0f 70 50 5b 08 f7 40 3f 01 f6 b5 a6 1b | 6a b5 fe b6 73 a7 04 b2 74 dc 3e 4a 46 a2 06 81 | 11 ce 3e 21 33 d9 a8 2a ee 54 b5 69 d8 57 77 1f | dc ec 39 32 06 54 92 6d 8f 0a ca d2 fd fd bd fb | 1b 7c 6a b6 6b 55 6f cb c2 b7 b7 fb e7 79 1c 7d | c3 44 5b 72 2c bc 4f 59 92 b8 bc 2a d4 d1 be 0f | 33 95 9e 53 f7 bf 90 2f bf b1 8e 5f 51 a1 8b aa | 29 00 00 24 bd 0e 20 29 4b d5 e3 ae 9c 68 67 e1 | 41 5b 48 5c 33 08 9f 5c 1f 4f 9e 6e c3 72 5b 33 | 2c ad 1f 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b1 4d 21 6f 15 00 d4 49 f9 94 84 2e | 85 71 98 cf 82 ff b0 a3 00 00 00 1c 00 00 40 05 | 8a 38 a6 07 76 28 82 e1 53 d4 45 b3 59 f3 34 be | 83 20 f5 6d | libevent_free: release ptr-libevent@0x7fb35c014b40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c018460 | #395 spent 0.0976 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 7b 3c 0c 6c 47 ed ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #395 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #395 | rejected packet: | ba 7b 3c 0c 6c 47 ed ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #395: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0eac0 | handling event EVENT_RETRANSMIT for parent state #301 | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #301 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #301 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49676.80366; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004957 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c018460 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #301 | libevent_malloc: new ptr-libevent@0x7fb35c014b40 size 128 "road-eastnet-nonat-49" #301: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #301) | 04 2d 84 e7 d7 11 c2 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 3c a0 2e 05 57 66 74 9e 59 04 02 1e 6b 82 64 | 24 cf 86 32 1b 49 63 31 85 6e 91 96 dd e7 a7 21 | 78 ee 5c 0c 83 da 97 1a 0c 46 69 7c d4 8f 0d 6c | 0b 43 52 49 09 9a 24 da 36 13 01 09 31 88 8b 5b | 38 73 77 00 83 94 ba bf 7c fa 22 16 ff 64 be 16 | 43 df 4f 1d b8 18 88 ee 83 b1 c9 32 ce 1f e3 0d | 40 e4 05 2a 7d 12 64 bf de 51 1d 4c d5 99 11 64 | 9a df 9d ae e7 e1 f9 df 89 9a 5f 11 f6 4b 39 47 | 36 de 08 ec a1 59 7b 84 9f e8 cd af ca a0 8a 29 | aa 2e 7e 1a 1d 88 43 74 5c 19 1a 8f 44 5f 83 95 | cc 00 d8 ee 8f cb 95 29 ae 58 5c 08 01 62 ea 7e | 97 e9 bf 6a 36 31 ba 2d 83 4b 4a ef ce 50 36 44 | 4f a8 a5 8e ad 2c 99 bd c1 01 08 ba ee 5e 1c 63 | 9e 50 96 b6 7a 6e 9f de cf c5 73 a0 7c d6 3d 3a | fe 11 5d 0f 1c cb 4b 02 b4 b1 f7 0c 56 bd a2 fe | d4 f1 da 5a fb cc f5 22 d5 c9 55 2b 49 27 7a 02 | 29 00 00 24 9d f4 32 14 da 15 0d 5d b3 86 88 1b | ed 98 fc e3 a3 7a 35 ba 87 aa 0c 85 93 07 0b 69 | 9d 37 a2 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 4c 33 35 25 dc 8b ec 4f 4f 50 86 | 6f 49 f3 b3 44 40 22 71 00 00 00 1c 00 00 40 05 | d2 03 8c 03 1f b3 ee 14 98 31 7f d2 44 da 50 e8 | 1a 08 5c 44 | libevent_free: release ptr-libevent@0x7fb35c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0eac0 | #301 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 2d 84 e7 d7 11 c2 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #301 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #301 | rejected packet: | 04 2d 84 e7 d7 11 c2 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #301: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61bd0 | handling event EVENT_RETRANSMIT for parent state #403 | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #403 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #403 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49676.804941; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50047 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0eac0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #403 | libevent_malloc: new ptr-libevent@0x7fb35c04b850 size 128 "road-eastnet-nonat-151" #403: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #403) | 32 36 13 09 3a 0c 64 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 1d 1f f9 29 d4 7a 82 e5 c3 ed 2d 91 36 94 a3 | ad 42 95 1c da 49 e7 df be 20 17 de b8 10 02 70 | 99 a0 9d 95 41 a8 00 d1 af 94 26 4c 6c 86 0c 1f | 94 7a 02 35 96 84 54 33 fd cb 84 dd 66 c9 68 48 | c0 82 f1 59 9a 21 1d bc d5 30 03 12 1e e7 09 61 | be 0b 67 1d db fb 9e 1e 17 49 85 95 31 47 f7 2b | 4a 86 6c c9 65 82 f2 1e a6 01 6c ac cd f1 e2 b1 | c0 7c 6b 1c 75 70 5d e8 eb b9 df 8a a0 09 66 57 | 4a b4 92 66 fc a3 08 c8 94 4f 6c 58 0d 44 86 54 | 0d a6 ba 1e d2 d3 f5 98 14 c7 bb cb 0d c6 25 81 | 7d 00 f0 be 73 bc 11 32 a7 22 fe 40 f1 5c 99 a7 | f6 f4 02 31 24 83 16 a4 cb d9 f9 bc 7d ee f9 64 | 7a 45 11 03 43 36 f4 ff f8 3b 61 50 62 1a ea 35 | 94 85 76 d9 cf 8d 05 40 c4 4f 44 89 69 5a 20 63 | bb 17 c4 c0 24 8c 90 9c 7c 82 0c b1 fd 04 ab 4c | 94 5c 67 12 3b 66 e3 71 78 3a f5 9a 05 60 53 5e | 29 00 00 24 96 4a 72 fe 73 4d 43 f4 22 71 ca 5d | 92 02 9d 90 a1 de a3 67 65 d9 a5 3e 5d f5 46 47 | 3c 9d 2b 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 72 77 63 b0 4d c0 15 33 f7 7b 47 | a3 64 95 74 99 05 10 8e 00 00 00 1c 00 00 40 05 | 3b eb 87 4d 47 ff 24 80 19 6f 36 13 fc b8 88 ec | 58 fe 93 a3 | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61bd0 | #403 spent 0.0878 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 36 13 09 3a 0c 64 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #403 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #403 | rejected packet: | 32 36 13 09 3a 0c 64 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #403: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4ebd0 | handling event EVENT_RETRANSMIT for parent state #353 | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #353 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #353 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49676.814176; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003666 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #353 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 "road-eastnet-nonat-101" #353: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #353) | 5c b8 33 04 f9 07 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 8b 11 fb 47 ec 02 c4 cd 08 09 04 3c c8 57 b9 | e6 56 8a 75 16 cb 27 a3 a8 a8 cd 60 5a 5e 10 a0 | 4c ee d4 ee 70 90 76 03 9c dd ae bd 31 4c 66 16 | b3 e1 1d be 33 f8 41 0b c4 3c 71 6f 90 30 0f da | 26 bc 55 a4 9b 68 89 99 78 6a 9f bd 9b 59 ca 66 | 9f 28 bb 1c cf d9 04 9c 3f 50 e0 a8 9a c8 86 3c | 22 ad 41 27 f3 c4 bb fb ef e9 6e f8 88 7e 34 6e | 75 ca 2d 80 b4 0c d7 c1 72 ce 98 2e 70 ec 4e 80 | a8 95 d8 c8 1d 5c 97 5c c0 a0 b9 5c ac 3a c3 07 | 2c c5 07 1e 3d 08 d1 ba e4 93 f5 5b dd cb 89 0a | 36 eb de 45 ac 11 de 24 b8 2b b2 28 d9 84 7e 81 | 6c e6 ca 34 e5 ab 3a f5 d9 8f 51 9e f8 46 26 92 | bb e9 13 c3 32 db 48 bf d1 a9 ef 9e d6 1f 7a 90 | cf e0 f7 95 4c 0f 73 ac 90 00 08 6f f7 6f bb 88 | dc 53 20 17 f7 7a 4b e1 b0 e3 53 ab c1 68 9e bb | 8c bb e3 6d 1e 44 fc 28 be 03 40 b8 4e ff ea 55 | 29 00 00 24 d0 f4 4a 20 b5 18 6c ce 45 6d d4 e9 | 3d b2 3f bf 9f b6 c1 be 4d 22 b8 3f d5 b7 20 9c | 7a 5b 5b 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 c3 92 4c 0f 96 63 0f 6f bc 3d e6 | 99 69 47 3f a6 34 81 2c 00 00 00 1c 00 00 40 05 | ce 29 c6 74 fd 99 32 be d7 3c ba 39 8c e5 64 d3 | 17 27 91 5a | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4ebd0 | #353 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c b8 33 04 f9 07 ca 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #353 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #353 | rejected packet: | 5c b8 33 04 f9 07 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #353: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.059 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61c10 | handling event EVENT_RETRANSMIT for parent state #159 | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #159 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #159 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49676.820472; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.018637 exceeds limit? YES "road-eastnet-nonat-159" #159: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-159" #159: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #411 at 0x557d46aac1c0 | State DB: adding IKEv2 state #411 in UNDEFINED | pstats #411 ikev2.ike started | Message ID: init #411: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #411: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #411; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-159" #411: initiating v2 parent SA to replace #159 | using existing local IKE proposals for connection road-eastnet-nonat-159 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 411 for state #411 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4ebd0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #411 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 | #411 spent 0.0892 milliseconds in ikev2_parent_outI1() | RESET processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #159 ikev2.ike failed too-many-retransmits | pstats #159 ikev2.ike deleted too-many-retransmits | #159 spent 2.34 milliseconds in total | [RE]START processing: state #159 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-159" #159: deleting state (STATE_PARENT_I1) aged 64.020s and NOT sending notification | parent state #159: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #159 | crypto helper 16 resuming | crypto helper 16 starting work-order 411 for state #411 "road-eastnet-nonat-159" #159: deleting IKE SA for connection 'road-eastnet-nonat-159' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 411 | add revival: connection 'road-eastnet-nonat-159' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-159 | State DB: deleting IKEv2 state #159 in PARENT_I1 | parent state #159: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #159 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb36801d920 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 411 time elapsed 0.000561 seconds | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61c10 | (#411) spent 0.569 milliseconds in crypto helper computing work-order 411: ikev2_outI1 KE (pcr) | in statetime_stop() and could not find #159 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 16 sending results from work-order 411 for state #411 to event queue | scheduling resume sending helper answer for #411 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-159 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7fb36402e9b0 size 128 | crypto helper 16 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-159" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-159' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-159" | stop processing: connection "road-eastnet-nonat-159" (in initiate_a_connection() at initiate.c:349) | spent 0.0674 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #411 | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 411 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #411 | **emit ISAKMP Message: | initiator cookie: | dd dd 24 eb b8 cb 50 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-159 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x bd cd 4b b5 b6 e7 18 30 d4 d0 8e 83 03 53 e6 4e | ikev2 g^x 8d 99 24 ba 33 2f 0c bd fc e2 e9 0d 81 68 aa 7b | ikev2 g^x 12 93 68 9f 91 0d c2 fa e1 b9 83 26 f0 5b 9b dd | ikev2 g^x 51 e3 9e ed 34 ea 5f c9 93 72 24 b6 bd 13 cb 5c | ikev2 g^x 26 fe cc 72 6c e7 c6 21 ed 4e 14 b2 9f a3 3b 3c | ikev2 g^x 94 f8 1a 98 76 bb 57 e6 0d a9 bd 26 b1 18 3d 50 | ikev2 g^x 59 31 42 4b 06 7d ba db 70 1e 1c ae a8 d8 de 3a | ikev2 g^x 81 ee 27 6d 40 cc 4d 6a 4b fc 36 c4 b0 3a 09 0b | ikev2 g^x 48 47 43 74 dd e5 cb 90 df 6e e3 46 c3 6c 8b 97 | ikev2 g^x f3 25 7f d4 fd ec f5 56 ff 6b 80 d1 67 dc c0 79 | ikev2 g^x 70 cf 38 a2 35 5f 37 c9 04 ae 98 e9 6e f3 26 d3 | ikev2 g^x 47 94 bb 03 5d 71 7b 87 ad 54 4b 93 a3 b0 71 8f | ikev2 g^x 5f 69 b0 8d 69 3f e2 c0 02 32 57 3f 64 cb 19 71 | ikev2 g^x 58 00 09 d8 ce 8f 64 c9 55 9e 7c 00 26 28 eb f7 | ikev2 g^x 6f eb 0e ab 01 fb ae c5 0f da bd 30 07 46 c2 b0 | ikev2 g^x 5c ea 05 eb 2d 3f 40 91 20 c1 a3 5a 4f 86 98 86 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a3 6a 54 81 57 a4 87 e3 a7 7a 68 dd 8e 44 5b 6e | IKEv2 nonce 2b 5e f0 9a 3e c5 72 e8 17 f4 34 1c 65 bd e7 d4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= dd dd 24 eb b8 cb 50 15 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9f | natd_hash: port= 01 f4 | natd_hash: hash= 5f a2 a7 20 75 c6 9d 9f 5f af fe db d7 0a 3e e1 | natd_hash: hash= 5c 28 6c 20 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5f a2 a7 20 75 c6 9d 9f 5f af fe db d7 0a 3e e1 | Notify data 5c 28 6c 20 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= dd dd 24 eb b8 cb 50 15 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 37 57 74 7e fa 8f cf 8f 09 51 1f a5 a7 dc 5e 89 | natd_hash: hash= 60 7b 2d b3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 37 57 74 7e fa 8f cf 8f 09 51 1f a5 a7 dc 5e 89 | Notify data 60 7b 2d b3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #411 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #411: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #411 to 4294967295 after switching state | Message ID: IKE #411 skipping update_recv as MD is fake | Message ID: sent #411 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-159" #411: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.159:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #411) | dd dd 24 eb b8 cb 50 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd cd 4b b5 b6 e7 18 30 d4 d0 8e 83 03 53 e6 4e | 8d 99 24 ba 33 2f 0c bd fc e2 e9 0d 81 68 aa 7b | 12 93 68 9f 91 0d c2 fa e1 b9 83 26 f0 5b 9b dd | 51 e3 9e ed 34 ea 5f c9 93 72 24 b6 bd 13 cb 5c | 26 fe cc 72 6c e7 c6 21 ed 4e 14 b2 9f a3 3b 3c | 94 f8 1a 98 76 bb 57 e6 0d a9 bd 26 b1 18 3d 50 | 59 31 42 4b 06 7d ba db 70 1e 1c ae a8 d8 de 3a | 81 ee 27 6d 40 cc 4d 6a 4b fc 36 c4 b0 3a 09 0b | 48 47 43 74 dd e5 cb 90 df 6e e3 46 c3 6c 8b 97 | f3 25 7f d4 fd ec f5 56 ff 6b 80 d1 67 dc c0 79 | 70 cf 38 a2 35 5f 37 c9 04 ae 98 e9 6e f3 26 d3 | 47 94 bb 03 5d 71 7b 87 ad 54 4b 93 a3 b0 71 8f | 5f 69 b0 8d 69 3f e2 c0 02 32 57 3f 64 cb 19 71 | 58 00 09 d8 ce 8f 64 c9 55 9e 7c 00 26 28 eb f7 | 6f eb 0e ab 01 fb ae c5 0f da bd 30 07 46 c2 b0 | 5c ea 05 eb 2d 3f 40 91 20 c1 a3 5a 4f 86 98 86 | 29 00 00 24 a3 6a 54 81 57 a4 87 e3 a7 7a 68 dd | 8e 44 5b 6e 2b 5e f0 9a 3e c5 72 e8 17 f4 34 1c | 65 bd e7 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f a2 a7 20 75 c6 9d 9f 5f af fe db | d7 0a 3e e1 5c 28 6c 20 00 00 00 1c 00 00 40 05 | 37 57 74 7e fa 8f cf 8f 09 51 1f a5 a7 dc 5e 89 | 60 7b 2d b3 | state #411 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4ebd0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61c10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #411 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 | #411 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49676.821755 | resume sending helper answer for #411 suppresed complete_v2_state_transition() and stole MD | #411 spent 0.448 milliseconds in resume sending helper answer | stop processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36402e9b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd dd 24 eb b8 cb 50 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #411 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #411 | rejected packet: | dd dd 24 eb b8 cb 50 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9f fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #411: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0576 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #381 | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #381 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #381 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49676.834926; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003389 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a32290 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #381 | libevent_malloc: new ptr-libevent@0x7fb36402e9b0 size 128 "road-eastnet-nonat-129" #381: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #381) | 1e fb 19 74 69 81 f6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 15 4d 3c 26 b9 8e 71 c8 4c 65 3c 93 c4 f8 5c | 0c 69 48 07 1f b0 40 db 39 45 4f 12 5d b7 64 ce | f6 36 76 d1 4f f2 c3 d5 d1 3f c7 4e dd 69 ef bd | 2e 06 de 7f fb 43 32 b5 94 31 7c 96 1c 09 3c 05 | c9 f9 e9 6e f6 32 3d b2 3f 7a 40 e8 05 db 42 df | 50 a9 3b 1b be f2 2b d2 43 70 99 24 25 7e b9 8b | 88 12 28 70 28 9b b9 5b b0 6d 48 da 44 23 6b 4d | 59 ff ee 67 e5 c7 db c0 7c 7f a2 4b 21 92 3a a1 | fd 14 25 80 1a 91 48 40 e9 5b 63 e7 84 7c b3 99 | 02 c6 5d 6d b6 28 24 98 77 5e dc c9 be 98 c3 d6 | b6 bc 7a bf 31 81 8d c7 ba a9 27 81 82 5a 2f b7 | 23 3d 16 95 ba b5 4a 07 29 09 4c 3e c5 38 81 20 | 6c 0f d0 d6 67 62 46 f9 bc 6b c6 8e 7d a5 ce 50 | f1 0f 9a 64 d5 01 da 1f 72 e3 1b 16 9a ec 02 45 | ef 03 20 b4 4d cb ac e4 80 48 13 be cc c9 5e 11 | 9a f4 a2 21 ee 6b 6d 92 17 77 1f 86 a2 bd ac 89 | 29 00 00 24 5b c1 91 12 e1 44 84 05 fe aa f1 fc | b1 6d 8f ce 01 29 aa f2 75 b6 aa e9 3c cb db 81 | 72 99 63 d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 78 cd 6f 27 81 4c 4a f4 57 06 82 | fb 0a 60 ad 54 dd e0 6c 00 00 00 1c 00 00 40 05 | 73 d8 f7 cb c0 0b a5 77 76 9f 97 28 b6 7f a1 0e | 85 3a 80 ee | libevent_free: release ptr-libevent@0x7fb348023e80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #381 spent 0.0879 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e fb 19 74 69 81 f6 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #381 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #381 | rejected packet: | 1e fb 19 74 69 81 f6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #381: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38400a290 | handling event EVENT_RETRANSMIT for parent state #396 | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #396 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #396 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49676.836212; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00255 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #396 | libevent_malloc: new ptr-libevent@0x7fb348023e80 size 128 "road-eastnet-nonat-144" #396: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #396) | 34 3a ea ba b4 d5 c3 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 b3 5e a9 7f 93 97 83 00 ac b3 90 fb e7 f1 78 | 95 aa f1 ba 36 2b 6d a3 37 11 74 f8 88 50 3b b9 | 5f 0f a0 79 72 f7 39 e7 3a 2c a8 e0 53 9b be fd | fc bd 96 c1 32 d9 24 ce f7 06 60 ff b3 43 45 a6 | 24 b9 a3 f5 cb 0e b9 aa aa 8e 8f d1 f4 f2 6e c0 | 2d cf 97 8a 96 4c c9 d9 fa 9b b2 4f 23 e7 4e 04 | 32 38 36 77 bf 5c cc 5e 9d b8 9a 89 95 85 a0 cd | 38 05 64 bb 18 47 79 4a 9e e0 36 97 2c 58 a9 ca | 05 7e fc 24 b9 aa 44 5a 5a 1a 01 53 4f 6b 25 9c | 0b 57 f1 a9 6c 20 f6 40 eb 60 95 56 91 d3 93 3b | e3 6f 55 d6 2d 80 8e 1b 25 11 49 ca e7 6a 57 76 | 46 38 51 f8 26 5f df d7 e7 dc 81 fb 26 f9 44 9d | 73 c6 16 4c 9f 24 d8 42 a4 b9 bf 36 76 cf 2d c1 | 81 f5 6e 1c 27 05 14 9e 74 b9 a7 24 89 53 2b 8a | e5 d2 6e 23 b8 62 43 c8 68 d3 55 8e 35 2d 54 67 | 77 ed 1c 39 ec 49 32 f8 1f c9 68 6b 34 67 a6 5c | 29 00 00 24 70 3a 86 3e 59 bb d0 ee e5 b9 db 1d | c8 9a e2 55 5b 79 c1 c3 66 32 3d 49 47 3b f1 44 | bc b6 4a ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 b0 29 ea 4a 03 79 05 a6 d6 5d 03 | 24 78 07 cd 73 8e b4 4c 00 00 00 1c 00 00 40 05 | cb 86 b2 db 9b fe 49 fd e2 3b b4 79 c3 f9 fd 58 | 79 48 29 02 | libevent_free: release ptr-libevent@0x7fb38402bf10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400a290 | #396 spent 0.0849 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 3a ea ba b4 d5 c3 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #396 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #396 | rejected packet: | 34 3a ea ba b4 d5 c3 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #396: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374009690 | handling event EVENT_RETRANSMIT for parent state #354 | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #354 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #354 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49676.866443; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003666 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400a290 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #354 | libevent_malloc: new ptr-libevent@0x7fb38402bf10 size 128 "road-eastnet-nonat-102" #354: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #354) | 72 4c 85 c6 74 09 42 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 1b e9 65 bc 73 bc c5 81 57 1a 7b 1b db 4b 3f | 32 d5 0d b7 6a 65 f1 0a 67 34 33 c1 2c 23 e5 f2 | 41 57 12 1f 62 7d 04 aa d4 c7 47 71 78 e8 f0 df | 48 86 0b 9f 4e 36 6e 72 bd ec 74 1b dd 83 0a ab | df 0b c7 29 5d 45 26 d8 31 4b 64 db c5 65 76 90 | cd 52 7e 2d 27 67 7a 01 34 ba b6 3f e3 9a 85 48 | e4 51 41 5f 21 41 ff 88 e4 cc aa c0 b6 13 70 92 | 13 45 bf db 76 ed 1c 31 eb 2b 1f af 38 c5 ca 82 | 0b fb bb d7 57 27 bd 26 60 cb 6b 22 18 4a df 09 | ae e5 bd 33 88 7d ef 21 1c 95 13 3d a5 02 60 08 | e7 d2 1b 72 0a 7b aa 01 9d 47 2a 4d 32 3f 9b ec | 5b 5a ea 31 68 bb 1a dc 15 be 3d d6 a0 c0 98 db | 7b 5b 3d 8f ce 9b 6c 43 56 11 be e1 16 78 07 0a | 06 29 bd c7 77 7e 17 95 3a 22 27 47 9f 23 32 f6 | 37 27 d0 b4 53 1e 36 9f c8 05 75 2f 68 c9 35 72 | da 2e a9 d1 44 f4 35 64 d4 0a 4b c0 71 73 52 a8 | 29 00 00 24 72 5c 82 6f 5d 6b bd 69 39 4b 52 31 | 75 ca 0e e7 64 bc 08 f8 b5 d4 6f 1f bc a5 fc 80 | 56 52 35 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 33 77 7a c0 93 c5 bf 78 5c 8c bc | 79 60 cc b9 7e aa 2e bb 00 00 00 1c 00 00 40 05 | df 4b d5 4e cf 64 0d 4d 4f 32 d9 61 e4 8d 05 c9 | 9f e3 12 70 | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374009690 | #354 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 4c 85 c6 74 09 42 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #354 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #354 | rejected packet: | 72 4c 85 c6 74 09 42 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #354: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0599 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350040840 | handling event EVENT_RETRANSMIT for parent state #302 | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #302 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #302 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49676.869769; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004389 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374009690 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #302 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 "road-eastnet-nonat-50" #302: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #302) | 9a b7 d9 69 b7 b5 8b 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 3b 38 5a ca c1 e0 66 18 62 3b 15 6c b6 3b d4 | d7 ad 95 64 47 60 48 b5 a1 40 89 ca 34 68 f4 5c | b5 12 b3 25 90 eb 49 eb b5 40 df ef 79 a7 f8 11 | fd 6b 8c b7 57 dd 67 6c a2 67 a7 4f be 73 1c 93 | d0 14 73 9b 52 53 0b 4e 5f f6 38 f3 b8 8b db d1 | 1c 9f 4f 10 7c 2c fa b8 0b 5c b4 6b 80 d0 b7 e3 | b6 70 3b 9c d9 ad f0 38 ba 59 1a 5a 32 60 56 90 | 00 97 ec 2a 32 4c ce 8c d0 a5 94 f1 33 fd e4 3c | bb e9 7f cc 0d 4c 4c be 2b f0 80 18 d5 0b e3 68 | da 32 8d 6f 53 ff 6f c4 bc c7 44 a5 1e 56 ed 9a | 22 1a 47 85 cc bb d8 71 12 33 c9 06 fb bd 86 04 | 8a 5e c6 10 00 05 dc db 1a ce ef c2 9a df 5b 3e | f1 94 44 f2 93 b5 45 ee f4 39 f1 54 d0 08 74 2f | 98 02 e6 14 93 d3 55 70 9b c1 5c 0a 6d f7 72 e9 | 7a 20 75 0d 8a 45 81 c5 cd 4a 79 7e 2a a7 cf ed | b9 84 dc 2f 1f b1 1b 47 62 4c ef 36 89 f7 2e e1 | 29 00 00 24 4e 70 94 e8 7e 52 b9 fd e3 7f cf aa | b8 11 eb 44 2a e9 8b 91 cb 46 0f b2 fd 17 ad 44 | 7e 6a 9e 6e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 54 86 00 1a 73 2d f1 8e 31 28 7e 7f | 4e 1d 05 b3 46 7f 2d d6 00 00 00 1c 00 00 40 05 | e4 ea 9a e9 78 75 4e 5e 40 77 76 74 52 35 fb 06 | 70 d7 5d cd | libevent_free: release ptr-libevent@0x7fb35001fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350040840 | #302 spent 0.0936 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a b7 d9 69 b7 b5 8b 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #302 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #302 | rejected packet: | 9a b7 d9 69 b7 b5 8b 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #302: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aef6c0 | handling event EVENT_RETRANSMIT for parent state #404 | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #404 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #404 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49676.875028; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500664 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350040840 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #404 | libevent_malloc: new ptr-libevent@0x7fb35001fd50 size 128 "road-eastnet-nonat-152" #404: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #404) | 4a 5a cc 55 a0 5d f2 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 5c 51 83 ab 6b 01 fa 80 7d 29 db 27 cd 7b c6 | 7f 04 2f 6a 27 69 df b1 41 5e bf ae 45 95 c1 0c | 60 62 91 a3 34 a3 09 ec 77 e7 89 a6 51 09 95 12 | 3b ff b9 99 25 19 b1 ca db 05 e4 39 d2 de d6 52 | 26 ca b9 02 d7 13 18 29 d4 9e 9a 68 e5 5b 44 39 | 54 a0 05 f4 ba 65 c0 95 36 73 37 bc a2 90 45 30 | d7 96 35 a2 19 0f c4 75 70 1c 7f 35 ab a5 29 b5 | 6b 5d 34 07 1e e2 3e 41 ca 0a 85 69 25 b8 27 58 | d4 99 f8 5e 96 15 ec 82 ac 10 04 76 9b 35 64 a2 | 61 5a aa b1 99 cc 29 04 86 b5 f4 cc 47 04 55 8f | c7 28 c5 78 33 30 c8 76 93 6d f5 e2 6a c6 30 01 | 28 59 c4 cc 64 9b 7d 8e 92 4e ac 31 52 df 0e bd | 0a 9d da 2a 1d 60 fa 21 2a 50 98 51 8a 76 ec c4 | d0 d7 c3 bf 4d 91 f8 7a 88 5f bc 07 e6 69 d7 f2 | ab ab b7 dd 41 cf 13 b8 5a 48 6f f6 ea 70 5c d9 | fb 24 71 46 69 e2 7c a6 fa 4a f9 ae 35 11 e2 42 | 29 00 00 24 fe 30 87 af f4 c1 ee 21 b0 88 ac a0 | 02 58 85 f4 de 21 52 28 4c d8 94 b1 9c 53 a3 c4 | 4e 96 a9 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 64 19 b7 d1 4f 25 21 1b 78 33 8e | a2 b3 19 f4 56 5e 34 fd 00 00 00 1c 00 00 40 05 | ec 45 06 4d 08 52 67 71 ea 88 ce 05 15 99 3d c7 | 85 58 3c 64 | libevent_free: release ptr-libevent@0x7fb3400357c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aef6c0 | #404 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 5a cc 55 a0 5d f2 1b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #404 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #404 | rejected packet: | 4a 5a cc 55 a0 5d f2 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #404: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf00 | handling event EVENT_RETRANSMIT for parent state #160 | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #160 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #160 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49676.877295; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00961 exceeds limit? YES "road-eastnet-nonat-160" #160: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-160" #160: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #412 at 0x557d46aad780 | State DB: adding IKEv2 state #412 in UNDEFINED | pstats #412 ikev2.ike started | Message ID: init #412: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #412: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #412; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-160" #412: initiating v2 parent SA to replace #160 | using existing local IKE proposals for connection road-eastnet-nonat-160 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 412 for state #412 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aef6c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #412 | libevent_malloc: new ptr-libevent@0x7fb3400357c0 size 128 | #412 spent 0.0658 milliseconds in ikev2_parent_outI1() | RESET processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #160 ikev2.ike failed too-many-retransmits | crypto helper 4 resuming | crypto helper 4 starting work-order 412 for state #412 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 412 | pstats #160 ikev2.ike deleted too-many-retransmits | #160 spent 2.63 milliseconds in total | [RE]START processing: state #160 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-160" #160: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #160: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #160 "road-eastnet-nonat-160" #160: deleting IKE SA for connection 'road-eastnet-nonat-160' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-160' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-160 | State DB: deleting IKEv2 state #160 in PARENT_I1 | parent state #160: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 412 time elapsed 0.000987 seconds | (#412) spent 0.989 milliseconds in crypto helper computing work-order 412: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 412 for state #412 to event queue | scheduling resume sending helper answer for #412 | libevent_malloc: new ptr-libevent@0x7fb358029760 size 128 | crypto helper 4 waiting (nothing to do) | stop processing: state #160 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb38402d380 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf00 | in statetime_stop() and could not find #160 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-160 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-160" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-160' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-160" | stop processing: connection "road-eastnet-nonat-160" (in initiate_a_connection() at initiate.c:349) | spent 0.0588 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #412 | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 412 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #412 | **emit ISAKMP Message: | initiator cookie: | af 34 f0 93 1d 1b d6 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-160 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e0 73 ca 82 d1 b8 25 7f 04 b5 f2 f7 30 87 a9 41 | ikev2 g^x a5 4a c9 0d a4 7b 88 6a 9c a7 a5 05 c4 99 82 97 | ikev2 g^x fe 18 55 31 1a 69 24 11 ef 96 2b 9b 00 09 64 93 | ikev2 g^x f5 9b 6f 9f 26 02 b8 02 eb ec d6 b9 58 77 37 c4 | ikev2 g^x 15 13 55 d4 ba a0 8c 70 db 9d 5d b8 50 b2 fb 14 | ikev2 g^x 70 91 27 3f 52 b9 21 d5 ac 35 9f 2f 74 c2 cd a3 | ikev2 g^x f5 0a 60 3b 9e 8f df b1 5a c8 44 f1 32 14 8d c9 | ikev2 g^x 96 70 54 8d 6a b3 1d 9e 55 f7 54 39 be 48 72 05 | ikev2 g^x 31 be c1 bc a2 b1 92 d9 d7 2b ac 35 4b a3 d1 85 | ikev2 g^x c8 13 0e 09 13 01 9b 53 39 df da 51 e3 f0 0f b0 | ikev2 g^x b8 cb 35 90 8d 85 96 9f 9a 47 73 3d e9 c6 9a 9b | ikev2 g^x 64 e5 27 2a 0d 1b 39 d0 c9 ca 54 89 58 ae ef 63 | ikev2 g^x 30 57 d5 95 13 d6 7b 07 db 4c 1f 26 15 fc 42 93 | ikev2 g^x 98 20 27 df a5 2d d6 c3 03 e8 40 00 9e a8 d6 5b | ikev2 g^x d9 5c 3b 12 b9 90 e7 25 5f 47 7e 86 19 c6 bc 15 | ikev2 g^x 0b 47 49 10 46 90 3e a8 79 f3 d0 fc 23 1f c9 d1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a3 90 3f ea a1 9a ff 04 92 34 17 b8 6f ef 29 47 | IKEv2 nonce 17 37 0c c0 67 c5 c5 dd ee 94 92 f1 d0 ea b7 d5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= af 34 f0 93 1d 1b d6 d6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a0 | natd_hash: port= 01 f4 | natd_hash: hash= cd 8b 79 f3 42 b6 33 1b 9b 02 cf 5d 36 ad 4c 1f | natd_hash: hash= 32 b9 37 c2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cd 8b 79 f3 42 b6 33 1b 9b 02 cf 5d 36 ad 4c 1f | Notify data 32 b9 37 c2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= af 34 f0 93 1d 1b d6 d6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a6 ab fb 7e 68 25 b5 32 b3 ef df 3a 19 eb c4 3f | natd_hash: hash= d0 c1 29 ec | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a6 ab fb 7e 68 25 b5 32 b3 ef df 3a 19 eb c4 3f | Notify data d0 c1 29 ec | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #412 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #412: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #412 to 4294967295 after switching state | Message ID: IKE #412 skipping update_recv as MD is fake | Message ID: sent #412 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-160" #412: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.160:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #412) | af 34 f0 93 1d 1b d6 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 73 ca 82 d1 b8 25 7f 04 b5 f2 f7 30 87 a9 41 | a5 4a c9 0d a4 7b 88 6a 9c a7 a5 05 c4 99 82 97 | fe 18 55 31 1a 69 24 11 ef 96 2b 9b 00 09 64 93 | f5 9b 6f 9f 26 02 b8 02 eb ec d6 b9 58 77 37 c4 | 15 13 55 d4 ba a0 8c 70 db 9d 5d b8 50 b2 fb 14 | 70 91 27 3f 52 b9 21 d5 ac 35 9f 2f 74 c2 cd a3 | f5 0a 60 3b 9e 8f df b1 5a c8 44 f1 32 14 8d c9 | 96 70 54 8d 6a b3 1d 9e 55 f7 54 39 be 48 72 05 | 31 be c1 bc a2 b1 92 d9 d7 2b ac 35 4b a3 d1 85 | c8 13 0e 09 13 01 9b 53 39 df da 51 e3 f0 0f b0 | b8 cb 35 90 8d 85 96 9f 9a 47 73 3d e9 c6 9a 9b | 64 e5 27 2a 0d 1b 39 d0 c9 ca 54 89 58 ae ef 63 | 30 57 d5 95 13 d6 7b 07 db 4c 1f 26 15 fc 42 93 | 98 20 27 df a5 2d d6 c3 03 e8 40 00 9e a8 d6 5b | d9 5c 3b 12 b9 90 e7 25 5f 47 7e 86 19 c6 bc 15 | 0b 47 49 10 46 90 3e a8 79 f3 d0 fc 23 1f c9 d1 | 29 00 00 24 a3 90 3f ea a1 9a ff 04 92 34 17 b8 | 6f ef 29 47 17 37 0c c0 67 c5 c5 dd ee 94 92 f1 | d0 ea b7 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 8b 79 f3 42 b6 33 1b 9b 02 cf 5d | 36 ad 4c 1f 32 b9 37 c2 00 00 00 1c 00 00 40 05 | a6 ab fb 7e 68 25 b5 32 b3 ef df 3a 19 eb c4 3f | d0 c1 29 ec | state #412 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3400357c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aef6c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aef6c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #412 | libevent_malloc: new ptr-libevent@0x7fb38402d380 size 128 | #412 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49676.878814 | resume sending helper answer for #412 suppresed complete_v2_state_transition() and stole MD | #412 spent 0.328 milliseconds in resume sending helper answer | stop processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb358029760 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 34 f0 93 1d 1b d6 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #412 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #412 | rejected packet: | af 34 f0 93 1d 1b d6 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a0 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #412: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0526 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800cc10 | handling event EVENT_RETRANSMIT for parent state #382 | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #382 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #382 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49676.904014; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004154 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35804b810 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #382 | libevent_malloc: new ptr-libevent@0x7fb36801d920 size 128 "road-eastnet-nonat-130" #382: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #382) | 8a a7 de 77 ff fe 00 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 1e 05 01 d3 c0 50 0e 07 5a f5 6c 2a f3 ca c5 | f5 6b b5 ce e5 2d 0d 22 8a 9d fc a1 92 f1 21 88 | fe 80 af 87 07 4e ac cb 0e 4c 2f 1f 7c 09 ad 56 | 27 1d 20 e6 ec e9 94 a7 13 47 77 6d 93 7b 8b 31 | 4c 98 f5 11 b5 9a 38 64 29 ba c8 d0 2f a9 37 ca | 1d 9c 45 27 41 6d 78 24 2b 30 7d 43 66 5f da 35 | 99 0b ee f7 a5 dd a9 e7 24 b7 2c 27 c3 b8 3c 38 | 22 f4 c4 26 23 91 a1 6d a7 03 90 dd c7 47 8b e4 | b9 30 db 10 7a b0 86 55 91 13 ed 5a 5c 50 c6 55 | 38 6b 0d bb 7c d6 67 e7 99 0a 0d 7c c8 3b f2 93 | 43 b8 a6 1e f0 04 5a 66 ab 2b 76 49 15 e4 be b6 | e3 ab 9a 84 5b 45 f3 99 3f 3d 94 3a 7f ba c6 2d | c0 e5 16 1f a9 0e c4 b3 c7 a8 37 c7 df 60 6d b0 | 90 7f 5b 83 e7 16 35 cd f8 80 7e 6b 4c 50 19 23 | 8a a3 35 38 cd 8b ef 81 d2 24 34 89 61 4b 37 2c | a1 bc 48 55 f5 65 06 2e e7 6f b3 a0 6e 02 6c 89 | 29 00 00 24 7c cd b7 56 1d 0f 15 7b 08 97 8c a9 | df 91 53 e0 6a 88 48 cc 4c b6 8e 33 b3 57 e0 e8 | 1c 04 d1 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 58 61 cb 76 cc c4 93 e8 81 4f b3 | 54 86 64 27 f4 77 87 8f 00 00 00 1c 00 00 40 05 | 27 d0 5f f0 83 ae a8 e6 f3 e6 a6 2d bb 57 f3 83 | 78 36 b0 95 | libevent_free: release ptr-libevent@0x7fb36801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800cc10 | #382 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a a7 de 77 ff fe 00 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #382 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #382 | rejected packet: | 8a a7 de 77 ff fe 00 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #382: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0578 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3680129a0 | handling event EVENT_RETRANSMIT for parent state #397 | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #397 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #397 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49676.917361; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001022 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #397 | libevent_malloc: new ptr-libevent@0x7fb36801a4e0 size 128 "road-eastnet-nonat-145" #397: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #397) | b8 96 65 06 95 e1 f4 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 c8 0d f4 cf 12 04 23 b3 8c b0 d5 0f 34 4c a1 | e0 38 a5 84 33 97 be 9e 20 02 11 8c 69 5e 11 d0 | 7f 62 ac d4 51 19 cc 39 4f d4 08 35 17 3d d8 7a | c8 e2 b7 8a c4 ef 87 90 f4 6c ad 03 c1 12 e5 fe | a1 ca 4d a3 a7 26 51 b1 18 00 3f 74 0f 0b 76 79 | bc c1 ba 8c 57 57 64 fe a4 22 c8 a4 ab 19 ab 0c | dd ce 55 14 58 7f a0 3d 7e 01 33 18 3d 67 8f 6a | ca ae 35 2c fc 77 68 f1 26 46 2d 1f 7a bb f6 b6 | 88 41 08 63 25 29 f3 b7 63 ae 0e 14 3f a2 dc 97 | 0e 00 b1 e7 fc 07 d8 8b 49 bf 80 af e9 ed 2e ae | 76 d5 6d 36 b9 2a 02 65 8e ab 6e 62 de 0e 3d f3 | f7 6f bf 03 ee 4b bf 13 13 36 8d f9 63 27 fb 43 | 3f 8c 62 32 8e 36 3e 03 c1 c2 7e e0 16 a2 30 62 | 14 7f 02 fd b0 1d f6 8c 31 34 94 1b 15 18 28 ae | 0e b7 ba 68 7f a5 50 6b 2b de 67 a0 81 07 b2 62 | f5 48 ed c5 05 14 42 21 f6 53 6c 0e 3a 26 2c f6 | 29 00 00 24 27 60 c6 66 70 ae 97 9f 6b 69 4c 25 | 37 ba d9 cf 08 77 b3 59 45 e3 d8 2d 73 dd 52 c3 | cf dc c0 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 57 f9 bf 9f 01 9a 6f 3c 35 55 f3 | 32 2b 15 a5 4a 2d 79 cf 00 00 00 1c 00 00 40 05 | 4f 21 3e 38 45 eb 50 34 34 8d 72 07 46 d4 99 5b | e3 94 74 97 | libevent_free: release ptr-libevent@0x7fb36801fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3680129a0 | #397 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 96 65 06 95 e1 f4 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #397 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #397 | rejected packet: | b8 96 65 06 95 e1 f4 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #397: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35000d120 | handling event EVENT_RETRANSMIT for parent state #405 | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #405 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #405 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49676.930725; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500809 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3680129a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #405 | libevent_malloc: new ptr-libevent@0x7fb36801fd50 size 128 "road-eastnet-nonat-153" #405: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #405) | be e8 17 81 54 19 aa 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 35 ee 04 e9 c6 8a 5e c2 8c d0 2d 28 00 02 85 | 8c 37 b4 2a 7d 22 9b 7b d7 a1 23 7d 82 8f c4 6b | 57 c4 dd c3 ee aa c0 59 55 41 ec 07 5b d2 96 3f | 84 76 05 f0 b5 2a e8 98 98 d7 99 f0 e6 85 ba e9 | 7a 9d b6 d3 d8 1c ba 13 51 c2 52 69 b1 b0 51 2d | 27 ff ad 85 cb c3 37 19 4d 04 8f 00 5d 8e da a2 | 83 bf af 69 a5 88 8d 6e 4b fc d9 97 99 c9 fb 45 | db d1 9d 19 a0 0a d0 5c 01 fa a2 fa ec 3d 5c 71 | 97 18 03 d4 ac c9 d5 4f 44 b7 51 11 eb 34 8d f4 | ae 35 d6 d0 d3 d3 55 70 23 2c b8 b9 0d e9 30 e3 | 09 45 cd 57 53 d7 0b 66 63 c7 ad 04 26 12 af a0 | 90 e5 43 30 55 a3 78 25 bd ac a0 c8 d8 1b 48 03 | 7d 5e a7 cb e9 7e 28 c2 c1 55 c3 c2 88 18 bb 71 | ea 43 2f 82 f5 b1 df d2 66 a9 f6 d5 fa 01 de ee | e8 cd 12 32 f5 db da 44 b1 63 d9 46 0a 50 55 e5 | e4 13 08 92 13 df ad 90 0b 31 de af 43 48 dc 7b | 29 00 00 24 ad 05 d9 2e f2 d6 c0 cb b5 b3 6e e0 | 64 6e 66 e1 31 b9 1b 6d 0b a1 0e d8 22 30 ee ae | e8 8f 1f eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 93 4e 39 e4 10 9f 0f a5 0f ed 76 | 86 5f 9d 57 55 de 19 a7 00 00 00 1c 00 00 40 05 | eb f0 2f 13 5d 22 43 08 07 64 33 45 d0 5d dc 6e | 5b 6e e5 c1 | libevent_free: release ptr-libevent@0x7fb350012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35000d120 | #405 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be e8 17 81 54 19 aa 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #405 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #405 | rejected packet: | be e8 17 81 54 19 aa 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #405: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae9fc0 | handling event EVENT_RETRANSMIT for parent state #355 | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #355 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #355 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49676.944069; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004614 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35000d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #355 | libevent_malloc: new ptr-libevent@0x7fb350012840 size 128 "road-eastnet-nonat-103" #355: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #355) | 56 ed c8 71 de f9 06 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 2a 83 b1 26 56 49 8c fe 5f bd b2 84 ea a3 88 | a4 f8 b8 d9 ec 49 43 44 95 bd 12 f2 c5 21 82 10 | 03 69 98 1b 4a 24 1f ea 40 8a 0b 91 c9 76 5c 49 | d4 99 e0 74 0f 3f ee 6f 9e 53 54 1a 23 35 59 5a | aa 59 0d cf 6b cd 1c a1 eb 6c 98 6c 37 17 d0 f8 | 3c dc 93 d2 77 45 41 e8 99 25 82 ad 9d 55 e6 13 | c0 f1 0d 8b 61 04 8f 57 63 d5 98 2e 2e 99 6e 3b | 2e 7c 41 b8 5b 06 ba ad 18 18 aa 84 1a 4c 4a ef | 3b 6e c9 03 be ae 7b 01 5e 77 a6 2b 34 36 7e 21 | 7f c5 d3 9e 48 69 2b 5b 00 e3 c7 29 41 93 4a 4f | 3f 0c 86 c3 a8 9a b3 72 ca 66 fb a6 7b 68 f9 97 | 45 bd 92 5e ee 7e 28 d2 1e 8d 24 ad 5b 2c db 57 | 1e 74 10 aa 41 ab d2 f5 21 4c 56 2b c7 8f ce 5e | d8 69 da 43 89 31 85 08 6d d1 b2 1a 22 1c fe b0 | 36 38 83 b8 45 19 23 bb 71 3e 12 a0 c1 d4 c6 f9 | 92 4b 6b b1 a2 bb 20 eb ff a0 77 69 c4 c9 35 d8 | 29 00 00 24 c0 01 1a b2 54 fa cf 80 10 d0 f3 31 | e6 0e 79 92 f9 e8 de f5 3e 1e d4 6a 54 e0 c2 2f | 19 27 3a 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 da f6 01 f4 40 01 a7 a7 77 b7 fc | 3d b7 6f 1f f7 90 79 11 00 00 00 1c 00 00 40 05 | d2 9a 8c 84 e0 9c 3f 77 ed a7 98 65 71 77 a0 dc | b3 15 95 be | libevent_free: release ptr-libevent@0x7fb368023a60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae9fc0 | #355 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a89700 | handling event EVENT_RETRANSMIT for parent state #161 | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #161 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #161 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49676.944255; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.014301 exceeds limit? YES "road-eastnet-nonat-161" #161: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-161" #161: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #413 at 0x557d46aaed40 | State DB: adding IKEv2 state #413 in UNDEFINED | pstats #413 ikev2.ike started | Message ID: init #413: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #413: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #413; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-161" #413: initiating v2 parent SA to replace #161 | using existing local IKE proposals for connection road-eastnet-nonat-161 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 413 for state #413 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ae9fc0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #413 | libevent_malloc: new ptr-libevent@0x7fb368023a60 size 128 | #413 spent 0.0902 milliseconds in ikev2_parent_outI1() | RESET processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #161 ikev2.ike failed too-many-retransmits | pstats #161 ikev2.ike deleted too-many-retransmits | #161 spent 2.54 milliseconds in total | [RE]START processing: state #161 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-161" #161: deleting state (STATE_PARENT_I1) aged 64.016s and NOT sending notification | parent state #161: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #161 "road-eastnet-nonat-161" #161: deleting IKE SA for connection 'road-eastnet-nonat-161' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-161' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-161 | State DB: deleting IKEv2 state #161 in PARENT_I1 | parent state #161: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #161 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb34802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a89700 | in statetime_stop() and could not find #161 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 ed c8 71 de f9 06 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #355 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #355 | rejected packet: | 56 ed c8 71 de f9 06 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 67 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #355: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-161 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-161" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-161' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-161" | stop processing: connection "road-eastnet-nonat-161" (in initiate_a_connection() at initiate.c:349) | spent 0.0663 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 13 resuming | crypto helper 13 starting work-order 413 for state #413 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 413 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 413 time elapsed 0.000969 seconds | (#413) spent 0.973 milliseconds in crypto helper computing work-order 413: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 413 for state #413 to event queue | scheduling resume sending helper answer for #413 | libevent_malloc: new ptr-libevent@0x7fb35c029490 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #413 | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 413 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #413 | **emit ISAKMP Message: | initiator cookie: | ea 46 85 e7 fd 9b ca c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-161 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8a d6 4a 46 94 c5 0e 81 7d ce e7 15 1a 5a 21 6b | ikev2 g^x d0 32 15 1d df aa 19 22 73 4c 48 c7 c9 6d a8 93 | ikev2 g^x 29 7e ec 61 b6 83 c3 69 04 a5 60 f9 c5 35 27 f9 | ikev2 g^x 44 bf c3 99 38 07 63 d7 db de ef 2b 00 c6 3d 6f | ikev2 g^x 1e 8f 0f f0 f2 98 90 49 cc c1 d2 86 82 6d 83 07 | ikev2 g^x b6 cd 6e db a4 2f 05 29 fa 3e e9 09 c5 23 64 57 | ikev2 g^x 0f 6b 66 2d b4 b3 b3 d2 ea e7 1c 7e 8b 59 ce a2 | ikev2 g^x 2a db b2 33 4a cb 53 6b e5 06 8d cf 28 1c 31 94 | ikev2 g^x 7e 79 27 07 12 0f ee 03 55 92 90 46 1e 9e 32 06 | ikev2 g^x e3 69 6e 6a 21 a6 b6 3d c6 89 df ef c7 fa b0 eb | ikev2 g^x ab 8c ae 81 fa 71 38 65 08 c6 41 65 64 a9 83 b0 | ikev2 g^x bc c3 01 a6 3a 68 d2 5d bb 35 97 d0 1e e7 f8 04 | ikev2 g^x 04 04 f6 ff 5e f9 22 b6 f2 9f 86 d9 b4 ae ee 49 | ikev2 g^x fd 07 2d 26 52 e7 63 86 cc 1a 6e 7f 04 ad 81 4a | ikev2 g^x a3 d7 7a 6d 6e 53 1b 65 52 8d 28 da bd 54 d5 04 | ikev2 g^x 1e 3e 9f 74 3c 77 dc 33 e5 c5 fe 6f df d3 a7 16 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 85 87 06 d7 9a bf 7b 07 3a ec 94 d1 cf f4 5c 33 | IKEv2 nonce c2 8f dc 32 29 58 27 3f e4 e5 19 81 63 f8 b3 e3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ea 46 85 e7 fd 9b ca c8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a1 | natd_hash: port= 01 f4 | natd_hash: hash= 26 20 9c 8e 3c 13 0c 4e a0 e8 24 76 9d 56 e7 f6 | natd_hash: hash= 81 08 36 aa | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 26 20 9c 8e 3c 13 0c 4e a0 e8 24 76 9d 56 e7 f6 | Notify data 81 08 36 aa | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ea 46 85 e7 fd 9b ca c8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 3c 55 11 1a b1 a6 35 ac 5d bf b2 4d 0c c0 40 68 | natd_hash: hash= 37 73 05 e6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3c 55 11 1a b1 a6 35 ac 5d bf b2 4d 0c c0 40 68 | Notify data 37 73 05 e6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #413 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #413: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #413 to 4294967295 after switching state | Message ID: IKE #413 skipping update_recv as MD is fake | Message ID: sent #413 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-161" #413: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.161:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #413) | ea 46 85 e7 fd 9b ca c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a d6 4a 46 94 c5 0e 81 7d ce e7 15 1a 5a 21 6b | d0 32 15 1d df aa 19 22 73 4c 48 c7 c9 6d a8 93 | 29 7e ec 61 b6 83 c3 69 04 a5 60 f9 c5 35 27 f9 | 44 bf c3 99 38 07 63 d7 db de ef 2b 00 c6 3d 6f | 1e 8f 0f f0 f2 98 90 49 cc c1 d2 86 82 6d 83 07 | b6 cd 6e db a4 2f 05 29 fa 3e e9 09 c5 23 64 57 | 0f 6b 66 2d b4 b3 b3 d2 ea e7 1c 7e 8b 59 ce a2 | 2a db b2 33 4a cb 53 6b e5 06 8d cf 28 1c 31 94 | 7e 79 27 07 12 0f ee 03 55 92 90 46 1e 9e 32 06 | e3 69 6e 6a 21 a6 b6 3d c6 89 df ef c7 fa b0 eb | ab 8c ae 81 fa 71 38 65 08 c6 41 65 64 a9 83 b0 | bc c3 01 a6 3a 68 d2 5d bb 35 97 d0 1e e7 f8 04 | 04 04 f6 ff 5e f9 22 b6 f2 9f 86 d9 b4 ae ee 49 | fd 07 2d 26 52 e7 63 86 cc 1a 6e 7f 04 ad 81 4a | a3 d7 7a 6d 6e 53 1b 65 52 8d 28 da bd 54 d5 04 | 1e 3e 9f 74 3c 77 dc 33 e5 c5 fe 6f df d3 a7 16 | 29 00 00 24 85 87 06 d7 9a bf 7b 07 3a ec 94 d1 | cf f4 5c 33 c2 8f dc 32 29 58 27 3f e4 e5 19 81 | 63 f8 b3 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 20 9c 8e 3c 13 0c 4e a0 e8 24 76 | 9d 56 e7 f6 81 08 36 aa 00 00 00 1c 00 00 40 05 | 3c 55 11 1a b1 a6 35 ac 5d bf b2 4d 0c c0 40 68 | 37 73 05 e6 | state #413 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb368023a60 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ae9fc0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a89700 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #413 | libevent_malloc: new ptr-libevent@0x7fb368023a60 size 128 | #413 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49676.946082 | resume sending helper answer for #413 suppresed complete_v2_state_transition() and stole MD | #413 spent 0.462 milliseconds in resume sending helper answer | stop processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c029490 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 46 85 e7 fd 9b ca c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #413 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #413 | rejected packet: | ea 46 85 e7 fd 9b ca c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a1 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #413: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0585 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338018460 | handling event EVENT_RETRANSMIT for parent state #303 | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #303 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #303 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49676.949273; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004451 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c03b100 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #303 | libevent_malloc: new ptr-libevent@0x7fb35c029490 size 128 "road-eastnet-nonat-51" #303: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #303) | 0b e0 0a 79 39 06 c6 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 24 21 b4 0b e3 09 db 3f b6 a5 77 bb 87 5e ad | 66 c7 93 9a 8c 2e 04 3b 08 20 ac 03 a5 76 12 ab | b6 66 99 c7 bf 97 92 b1 32 f2 d4 40 1d 20 9f 0b | 85 c0 47 40 73 82 3c 97 59 5e 7a bf 29 1b 9b 33 | 65 e1 1d e1 06 4b 23 bb cd c3 d7 6f 1f 4d 6a d4 | a5 35 47 13 70 43 5f 27 3f e8 8d 45 36 1b 13 e8 | 52 7a c9 fd 4e c5 bf df 1d ad 19 77 99 5f 83 de | fd ac 63 24 8e b6 c0 c8 ec b2 56 6f 38 d9 99 06 | 17 b7 7e be be 8d 7f 5c 2d b1 d6 35 c6 26 88 21 | 6c 47 69 c2 4b 86 0c 66 51 e7 f5 2d 4c fb e5 79 | 2e e4 ba 11 88 c3 1e d5 cd ce 6d 00 ed f9 6c 2a | 2b 8c 48 d8 fb b0 3c 63 91 8e ae 31 9b af bf 15 | 0b 41 67 9d 12 12 70 9c 8c c1 6a db fc d2 6b 50 | c9 fa d7 b3 18 db 4f f1 d7 45 f6 0f b9 6e 33 c9 | 52 60 cc f3 be 3c 22 f0 a3 35 db d2 db d6 a6 94 | 52 18 e2 de 57 43 68 d8 7b eb ec 67 cd ed 35 3d | 29 00 00 24 80 ff 8a 78 69 ce 7f 51 87 5f 84 ba | c7 a1 f0 8c ea cb 68 68 e4 3e 06 9f 5c 43 cc 06 | 85 44 5c 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 50 a2 4e fc 4d 1b 58 77 6d e9 3b | 74 ac 43 c3 0f 7e 66 e7 00 00 00 1c 00 00 40 05 | d9 44 30 c1 08 7f 7e c4 16 be af c3 f1 e2 c1 72 | 14 da 79 2d | libevent_free: release ptr-libevent@0x7fb35401fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338018460 | #303 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b e0 0a 79 39 06 c6 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #303 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #303 | rejected packet: | 0b e0 0a 79 39 06 c6 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #303: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b06800 | handling event EVENT_RETRANSMIT for parent state #383 | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #383 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #383 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49676.974624; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002562 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #383 | libevent_malloc: new ptr-libevent@0x7fb35401fd50 size 128 "road-eastnet-nonat-131" #383: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #383) | 8b a9 fc 25 06 93 a1 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 48 8c d9 3d c6 b0 61 39 4e 19 f7 86 b1 e2 c3 | 03 ba 84 78 9c c4 77 a1 7d 57 91 f5 ae c2 ed b8 | 0b 61 98 04 6f 72 68 b3 63 3d b6 20 12 b2 50 10 | 3d 3c 00 1d b9 ab be 72 ac ba 93 14 3b b2 a4 c2 | 8e b0 47 ba 98 bb 5c 2b e4 da 7c 8d a4 4a d6 89 | a4 b6 36 de 0f 18 04 bb fc 9c 28 b5 1a ee c2 7a | 18 c6 24 27 71 17 17 60 ca 39 4e 5f 5b 71 71 ab | e4 cd 79 1b 79 6b 31 46 63 bb cd 82 d7 96 72 86 | 1d fc 72 1c e4 a4 16 04 29 1f 9e b6 3a fd 62 30 | f1 da dd 12 af 8e 61 c7 51 15 f6 a4 66 22 64 42 | ef d3 2c 09 00 94 20 e3 33 79 f3 1d c7 7c 4e 79 | a7 a8 2d ec 91 f0 bb fb ff 6c 89 63 ff 5d a6 dc | 2c c3 c7 01 d9 71 f9 87 28 4c e4 de 91 08 4b 02 | b3 28 ae a1 4d 26 42 63 01 7b d1 2e 68 17 e3 a7 | 0a 0b eb 5c 62 18 33 2f d3 a6 c9 6b 3c a2 aa a0 | f6 fc 0d 55 8c 1d 7c d8 f9 bd 77 28 68 1c b3 05 | 29 00 00 24 c7 43 5d 92 21 cd 92 00 ce 48 5a 41 | bc 51 f7 9c 7c 73 79 39 5d 67 8e 5d 0e b9 e5 ea | f1 7d 01 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 9e 11 98 e3 85 61 70 79 85 31 a8 | 4f a4 76 88 f9 86 57 fe 00 00 00 1c 00 00 40 05 | fb 7f 30 9d 57 51 30 a9 24 b7 71 f5 04 63 5f 8a | f8 68 fc 05 | libevent_free: release ptr-libevent@0x7fb360046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b06800 | #383 spent 0.213 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b a9 fc 25 06 93 a1 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #383 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #383 | rejected packet: | 8b a9 fc 25 06 93 a1 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #383: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0892 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c018460 | handling event EVENT_RETRANSMIT for parent state #398 | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #398 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #398 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49676.989086; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001596 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b06800 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #398 | libevent_malloc: new ptr-libevent@0x7fb360046040 size 128 "road-eastnet-nonat-146" #398: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #398) | d0 92 7e a2 a7 09 60 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 b4 17 bf 7e 10 d5 e2 12 67 d5 eb 44 fc 6b da | be 3b 71 0a c4 e3 79 bc 55 7d 33 ab 53 2c 63 89 | 9e 95 b9 30 6b 13 a7 4a c4 7b bb 0d b8 d2 26 a2 | 1b 44 de e4 2f 11 41 58 72 a9 de c1 a4 1a 3c de | fb 82 ea df 3c 36 4d b1 bb 32 a7 75 2a 9c da 3d | 04 1d ae c6 9e 47 9c 96 a3 bd 6c 27 32 62 7e ad | 70 24 3a b8 2d 6d 20 b6 31 c7 e4 59 58 b0 08 22 | 82 a6 37 db ba ec 34 68 a5 11 ce c9 83 0a 92 b3 | dd ea d2 26 81 86 3c 25 24 24 ac 6b b8 4a 55 12 | 52 ea 4b 29 23 c3 37 83 f6 36 9b 47 37 10 75 9d | f4 dd 3d a7 8c 08 2f 3c e4 23 53 ed 31 76 a3 fc | 1d a9 fd 55 24 58 0f 2f e2 fa 33 69 e3 52 ce 0b | 40 31 96 92 4b 51 32 bf 2a 17 34 73 b9 0a 6b 90 | de fe 0d 37 2c 91 fd 6c 7a a7 e2 56 e8 ce 17 fa | d6 57 69 b6 c9 3d e4 60 c8 79 32 d0 c0 ff e6 32 | 04 59 72 13 74 5b a6 22 e7 dc df 1b fa 28 85 f9 | 29 00 00 24 ae ec a4 eb 03 5f 45 70 f0 53 21 d7 | 81 1e fd e8 52 41 5f 93 69 78 ae d9 36 11 23 a3 | df 40 91 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de b0 87 87 88 52 10 6b eb de e2 56 | 47 54 e5 87 4e eb 84 92 00 00 00 1c 00 00 40 05 | cf cf 8e 7f dc f9 05 61 ec 0b 32 5d d8 50 5d 1e | f5 62 0b 45 | libevent_free: release ptr-libevent@0x7fb3500251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c018460 | #398 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 92 7e a2 a7 09 60 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #398 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #398 | rejected packet: | d0 92 7e a2 a7 09 60 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #398: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0682 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aacc80 | handling event EVENT_RETRANSMIT for parent state #406 | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #406 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #406 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49677.004445; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500714 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #406 | libevent_malloc: new ptr-libevent@0x7fb3500251c0 size 128 "road-eastnet-nonat-154" #406: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #406) | 5c 1b 3d 38 ad ed bb 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 1a b6 af ea 21 97 b3 f5 89 b5 95 b7 8e 01 21 | 34 29 bd cd 92 66 af f7 07 14 1e f2 4b ac 69 77 | b3 25 64 1a 72 01 08 14 88 fb 34 a6 91 bd 4c e8 | 74 ed 64 90 06 cb ad 54 67 18 ec c2 f6 32 90 94 | 8a 60 b7 b6 26 ea 31 da ec 24 92 6a 22 25 e6 ae | 79 52 07 43 fe e8 78 1d 19 58 3a 0f 01 09 9b 79 | a8 83 55 03 d0 25 e3 a6 6b 4d b2 09 24 dc 38 c7 | c0 36 e4 53 c2 05 eb 85 aa 76 78 46 e9 fc ba 6a | 9d 2a 99 85 b8 e3 fb 99 44 cb 75 c0 ab ae 6e 11 | 07 c0 ca 22 19 62 ce d5 17 5c e1 b9 18 74 78 be | 34 a1 1c d9 92 69 84 5a 1b b1 7e 28 a9 f2 00 ef | e6 0f 63 2f 7a b6 8d 10 3d 27 b5 f9 29 ad b2 b0 | 65 7c 94 5e 21 5a 98 07 17 36 5b b2 b7 51 51 8d | 3d 77 c7 dd 9a b0 95 69 8a b2 64 fa 98 d0 67 3a | d0 c0 eb c5 e3 82 7f 6a 7e d1 db 5f 16 5a 12 aa | ee c9 5e 0d 7b ae 47 81 60 df bf f4 74 63 48 5d | 29 00 00 24 00 c8 88 3e 7a 51 ef 1c 0c 98 f2 86 | d5 82 58 ca a8 80 65 3f cb c6 86 a8 5f 67 eb c4 | af 88 eb 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c fb 6e 46 7d 68 85 83 cc d1 35 3b | 25 21 b7 36 bf 74 0f f9 00 00 00 1c 00 00 40 05 | ea 1c 8a 1b 9f c4 37 0b d8 b4 d1 29 da 67 72 c1 | 45 ae 67 d8 | libevent_free: release ptr-libevent@0x7fb3780407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aacc80 | #406 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 1b 3d 38 ad ed bb 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #406 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #406 | rejected packet: | 5c 1b 3d 38 ad ed bb 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #406: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384043260 | handling event EVENT_RETRANSMIT for parent state #304 | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #304 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #304 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49677.014787; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006076 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aacc80 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #304 | libevent_malloc: new ptr-libevent@0x7fb3780407f0 size 128 "road-eastnet-nonat-52" #304: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #304) | a8 9e ad f8 7e d0 8f 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 65 f7 e5 5b 0c d9 66 1f 9e de 27 b7 a9 e5 61 | e4 fa 1d ab 7c 97 a1 bd 20 9d f3 a2 b5 27 bd 1f | 8f a0 e6 70 97 5a a5 25 66 20 75 9f 12 5d d3 39 | 9b 63 a2 db 2b 74 35 c0 72 13 97 27 05 c2 62 b9 | e3 8d 4c df 62 26 b2 ef 71 4f 57 9f 86 a7 ae 23 | 96 73 f6 29 74 fa 2e d9 85 44 9e f4 6e a1 bf c3 | aa ee d5 e9 ef ed b7 f6 19 80 49 92 25 03 a6 fd | 97 ad 05 c1 4c ee d0 28 55 8e 3c fe 56 3a de 43 | 58 54 9b db 87 cd a3 da 37 73 a4 bf 3c b5 ae e4 | 24 52 70 fc 3d a8 8c fa 47 49 00 40 14 e1 2e ac | c2 2a 40 fe b6 ab ac c0 48 61 8f e7 d0 5a d3 f9 | ee 88 91 3d 36 46 3b a6 d1 44 56 83 2a 21 0b 8c | bf 71 69 ea 58 fa fe b7 82 58 cb 6d 26 3b 79 12 | d5 7b af 2b 0b 68 46 9e 23 40 da 39 fc 30 e7 9e | 96 5b ef fa 83 ac 69 ef e9 6f 36 21 f5 e9 e9 e7 | 28 93 fa 84 b2 62 19 86 19 c7 09 bf 96 a9 13 fa | 29 00 00 24 01 38 84 c9 86 37 f1 ee b2 c5 1a 16 | 9c 76 d6 78 f3 8e 1b 3e 7b e2 b1 ac 57 81 00 ff | be 40 7b 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 4d a8 e4 29 87 92 f9 c9 e0 47 d4 | 8d 2b 33 0e 7e 88 7a bd 00 00 00 1c 00 00 40 05 | 14 10 d4 5f c4 9e a3 33 92 fb 64 77 06 27 8a 6c | e3 d6 b0 88 | libevent_free: release ptr-libevent@0x7fb384011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384043260 | #304 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 9e ad f8 7e d0 8f 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #304 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #304 | rejected packet: | a8 9e ad f8 7e d0 8f 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #304: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0696 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35400d120 | handling event EVENT_RETRANSMIT for parent state #162 | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #162 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #162 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49677.016172; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008621 exceeds limit? YES "road-eastnet-nonat-162" #162: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-162" #162: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #414 at 0x557d46ab0300 | State DB: adding IKEv2 state #414 in UNDEFINED | pstats #414 ikev2.ike started | Message ID: init #414: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #414: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #414; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-162" #414: initiating v2 parent SA to replace #162 | using existing local IKE proposals for connection road-eastnet-nonat-162 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 414 for state #414 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb384043260 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #414 | libevent_malloc: new ptr-libevent@0x7fb384011f30 size 128 | #414 spent 0.091 milliseconds in ikev2_parent_outI1() | RESET processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #162 ikev2.ike failed too-many-retransmits | pstats #162 ikev2.ike deleted too-many-retransmits | #162 spent 2.56 milliseconds in total | [RE]START processing: state #162 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-162" #162: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #162: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #162 "road-eastnet-nonat-162" #162: deleting IKE SA for connection 'road-eastnet-nonat-162' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-162' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-162 | State DB: deleting IKEv2 state #162 in PARENT_I1 | parent state #162: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #162 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb354012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400d120 | in statetime_stop() and could not find #162 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-162 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-162" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-162' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-162" | stop processing: connection "road-eastnet-nonat-162" (in initiate_a_connection() at initiate.c:349) | spent 0.0678 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 17 resuming | crypto helper 17 starting work-order 414 for state #414 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 414 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 414 time elapsed 0.000976 seconds | (#414) spent 0.977 milliseconds in crypto helper computing work-order 414: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 414 for state #414 to event queue | scheduling resume sending helper answer for #414 | libevent_malloc: new ptr-libevent@0x7fb350029650 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #414 | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 414 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #414 | **emit ISAKMP Message: | initiator cookie: | 9e d5 a6 6b e9 51 f5 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-162 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f1 17 ff 89 e8 3c 16 16 6a 13 a2 4a 6e d7 58 8c | ikev2 g^x 31 4a 5d a6 06 21 a0 a1 9e a4 d6 9f 9d d0 c9 ef | ikev2 g^x 81 a2 6a e5 e1 ce f7 5b 3f cb a3 39 af 4b 00 d3 | ikev2 g^x 8e ea 93 72 09 07 7e f7 07 70 f1 60 90 61 a3 52 | ikev2 g^x 45 df 81 dd 3b 9f 90 cc 5a ee 79 3a e6 e9 1c 8f | ikev2 g^x 3e 5d 20 51 b9 06 0a c7 eb 0e 7c 49 84 44 06 9a | ikev2 g^x 8a 7d 42 8a 3c 02 e8 20 6f 96 b9 43 e4 b6 78 25 | ikev2 g^x 2a 47 75 c2 a6 5e 09 93 6e 0a 52 61 7e 11 07 98 | ikev2 g^x e5 ed 70 aa 1a 26 50 15 8a 10 03 2b 04 12 5a 90 | ikev2 g^x df c8 9d 86 1f 6a 9b b1 b4 ef a4 64 93 b4 1c b9 | ikev2 g^x a7 2b 05 40 cd d6 1a ea f2 e2 7e 25 9c 0d 5f 1b | ikev2 g^x 71 7c a0 ab 46 0c fd 1d 5d c2 80 68 45 9c 03 04 | ikev2 g^x ba 22 16 f6 4e 43 40 2a 18 55 ee ba be b9 c7 28 | ikev2 g^x a3 19 30 1c 73 7f 70 9d 56 01 fc 31 bf 29 77 0b | ikev2 g^x f7 40 78 1c 68 3b 66 2d 2e 5b fb 5d 13 f6 84 1d | ikev2 g^x 63 eb 8e 4a f6 af 8f 02 43 3a 27 60 08 28 58 6a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8a 22 da 4e 47 50 93 9e a6 73 51 af 87 1e 05 a5 | IKEv2 nonce 3e cb 07 7d 69 59 69 03 d3 ed 1d 7a 33 b5 03 71 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9e d5 a6 6b e9 51 f5 d0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a2 | natd_hash: port= 01 f4 | natd_hash: hash= ba fb 8a fc 1d 3f b9 dc ba d7 c2 5a de ae b7 6f | natd_hash: hash= 1b 1d e3 06 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ba fb 8a fc 1d 3f b9 dc ba d7 c2 5a de ae b7 6f | Notify data 1b 1d e3 06 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9e d5 a6 6b e9 51 f5 d0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6c ca d3 22 34 6c 0b 0a d6 9b 01 8f e9 fa 8a 7e | natd_hash: hash= 51 47 3d 5a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6c ca d3 22 34 6c 0b 0a d6 9b 01 8f e9 fa 8a 7e | Notify data 51 47 3d 5a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #414 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #414: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #414 to 4294967295 after switching state | Message ID: IKE #414 skipping update_recv as MD is fake | Message ID: sent #414 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-162" #414: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.162:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #414) | 9e d5 a6 6b e9 51 f5 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 17 ff 89 e8 3c 16 16 6a 13 a2 4a 6e d7 58 8c | 31 4a 5d a6 06 21 a0 a1 9e a4 d6 9f 9d d0 c9 ef | 81 a2 6a e5 e1 ce f7 5b 3f cb a3 39 af 4b 00 d3 | 8e ea 93 72 09 07 7e f7 07 70 f1 60 90 61 a3 52 | 45 df 81 dd 3b 9f 90 cc 5a ee 79 3a e6 e9 1c 8f | 3e 5d 20 51 b9 06 0a c7 eb 0e 7c 49 84 44 06 9a | 8a 7d 42 8a 3c 02 e8 20 6f 96 b9 43 e4 b6 78 25 | 2a 47 75 c2 a6 5e 09 93 6e 0a 52 61 7e 11 07 98 | e5 ed 70 aa 1a 26 50 15 8a 10 03 2b 04 12 5a 90 | df c8 9d 86 1f 6a 9b b1 b4 ef a4 64 93 b4 1c b9 | a7 2b 05 40 cd d6 1a ea f2 e2 7e 25 9c 0d 5f 1b | 71 7c a0 ab 46 0c fd 1d 5d c2 80 68 45 9c 03 04 | ba 22 16 f6 4e 43 40 2a 18 55 ee ba be b9 c7 28 | a3 19 30 1c 73 7f 70 9d 56 01 fc 31 bf 29 77 0b | f7 40 78 1c 68 3b 66 2d 2e 5b fb 5d 13 f6 84 1d | 63 eb 8e 4a f6 af 8f 02 43 3a 27 60 08 28 58 6a | 29 00 00 24 8a 22 da 4e 47 50 93 9e a6 73 51 af | 87 1e 05 a5 3e cb 07 7d 69 59 69 03 d3 ed 1d 7a | 33 b5 03 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba fb 8a fc 1d 3f b9 dc ba d7 c2 5a | de ae b7 6f 1b 1d e3 06 00 00 00 1c 00 00 40 05 | 6c ca d3 22 34 6c 0b 0a d6 9b 01 8f e9 fa 8a 7e | 51 47 3d 5a | state #414 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb384011f30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb384043260 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #414 | libevent_malloc: new ptr-libevent@0x7fb354012840 size 128 | #414 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49677.01795 | resume sending helper answer for #414 suppresed complete_v2_state_transition() and stole MD | #414 spent 0.463 milliseconds in resume sending helper answer | stop processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb350029650 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e d5 a6 6b e9 51 f5 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #414 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #414 | rejected packet: | 9e d5 a6 6b e9 51 f5 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a2 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #414: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0596 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #356 | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #356 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #356 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49677.032115; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00415 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350014cc0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #356 | libevent_malloc: new ptr-libevent@0x7fb350029650 size 128 "road-eastnet-nonat-104" #356: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #356) | ac bc fb 64 b8 05 f9 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 3b ae 20 ec 7a cd 21 f9 ff e0 06 71 c2 e5 55 | 9b 45 49 5f 50 f5 30 9c 0b 3e 8a a2 28 f4 85 c7 | 4f 6f 8c f6 77 7f 00 15 6e 19 1d d1 e0 68 66 87 | 4e df 9c 72 ac b2 8d ab fe f6 05 78 0d c2 c2 f2 | 31 63 92 17 54 19 b6 cf fd 16 6a d8 32 67 48 40 | 84 9f 47 99 c0 29 49 ad 8d 18 53 a5 6f ce c9 03 | 2a bd 3e e5 4f fd 0e 59 73 26 a7 73 de 18 dc 8d | 09 79 73 ae 09 17 25 e9 44 ce 32 60 cd df 52 37 | 66 e2 fc 8e a8 ff 6f bc 73 d9 a9 e6 7e 34 29 30 | c0 25 f8 37 35 6d fc d1 5a 42 45 e2 29 19 ad 5e | b1 89 0e dc 25 33 50 a2 38 82 4f ae e6 4f c3 97 | 55 76 c2 67 8a 3e ac 3d 84 f3 32 ca 54 cc 1c 9f | 23 91 a9 44 f4 93 a5 2a aa cc ed 04 01 4e eb f5 | 00 ac f3 c1 d5 2f 9a 43 89 cf f2 f2 55 7d 1d 3b | d4 57 90 a2 11 f9 23 83 ee a6 72 aa 3b 95 a5 9a | f2 6e 4c 51 df 03 55 77 ff 21 15 db 98 87 cc e3 | 29 00 00 24 80 41 9d 85 d0 e1 49 10 c1 0f c3 d9 | f1 36 ea c7 60 65 b3 e5 0e 51 88 57 20 76 d9 47 | 30 46 2c b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 1f 59 ee ab 85 d8 d4 4a d4 96 c0 | ee 5f a4 59 2f 4a 72 17 00 00 00 1c 00 00 40 05 | 04 5f 5b a5 b0 c4 89 9e 39 c9 c6 97 69 9e e5 9e | 19 14 82 3e | libevent_free: release ptr-libevent@0x7fb34800f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #356 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac bc fb 64 b8 05 f9 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #356 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #356 | rejected packet: | ac bc fb 64 b8 05 f9 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #356: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac1340 | handling event EVENT_RETRANSMIT for parent state #384 | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #384 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #384 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49677.036512; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003065 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #384 | libevent_malloc: new ptr-libevent@0x7fb34800f1a0 size 128 "road-eastnet-nonat-132" #384: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #384) | 86 6f ae 12 4d c0 7a b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d b1 fb 85 46 e4 0b ed 3a 09 27 c9 1d d0 fe 19 | 7a 6b 17 bb 62 8e 54 ac f1 64 67 34 40 ff 38 85 | 4f ff 54 1e 02 a7 af 76 91 63 95 f0 62 9e e7 68 | d4 07 2d a5 05 78 38 e6 00 65 3b 0c 3b 55 b9 34 | 19 27 7d 5e 1b 1f d1 f1 b8 c6 a4 32 36 a3 a1 4d | 77 fc 92 08 8e 44 1c 7b 72 a0 4a 6f ff ad 86 71 | 79 52 e6 49 b1 8f 12 9c 40 bc ec da 58 c7 66 8c | df 54 c1 66 96 41 fb 21 bc f2 5f 23 6c 52 ad 47 | c4 d3 9c 32 fb 09 e2 cc 47 c2 4b 3f 71 c2 e6 99 | 6d b7 94 23 a5 4c 0a 3c be 0e b2 50 04 86 41 e3 | 7a 9c 55 d1 3b 34 0c 3c 9f fd 4c f5 09 73 9f 60 | 56 d6 11 97 6a c5 df ef fe 2f 35 ee 63 fe 39 b0 | 29 b4 b3 01 1b 35 ff 91 b5 b4 bf 86 5f 29 e0 72 | 9b d7 f8 07 0a dc 66 0d 27 38 bb fd d4 42 1b 97 | 0e e9 cb d0 75 c1 5f 7b 20 8d a3 bd 9c d8 be df | 08 8a d8 c8 72 8d 2e 70 0c 78 7d 99 d6 b0 fe c1 | 29 00 00 24 dd a5 d7 0d 86 0a ce 46 70 f7 a4 d8 | 79 8d ab 0d 5a ba 15 d4 6b c1 b8 d3 f7 39 89 32 | f9 a6 bc c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 0a a8 53 d7 f6 23 14 8d 14 98 5a | ec 27 4c a0 59 56 95 73 00 00 00 1c 00 00 40 05 | 5b d2 62 5b 9b b5 2e 9c 89 b9 50 27 01 71 4f 1d | 99 42 bf 80 | libevent_free: release ptr-libevent@0x7fb35c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac1340 | #384 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 6f ae 12 4d c0 7a b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #384 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #384 | rejected packet: | 86 6f ae 12 4d c0 7a b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #384: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ecc0 | handling event EVENT_RETRANSMIT for parent state #399 | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #399 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #399 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49677.045869; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001623 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac1340 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #399 | libevent_malloc: new ptr-libevent@0x7fb35c035930 size 128 "road-eastnet-nonat-147" #399: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #399) | 9a 35 91 e3 ae 4f 45 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 ce a5 03 ec 4a ee 33 f3 67 48 7b 6f be a9 66 | fb 8e 19 e6 36 60 4c c6 f2 fa ab 4a 53 70 9f a8 | 5d 61 41 57 15 0a 04 a9 c6 86 5d ab 3b 79 47 d9 | 64 c0 42 8c 2d 5e 11 ee 5a b4 7c 00 df db 58 b0 | 10 63 ed d6 5b 1a 63 c2 6e 59 c7 e8 2a 78 4e 44 | 25 ff 91 a5 4f 9f d4 f8 46 f6 2e bb b6 05 d4 45 | 7f ef 54 77 ee f0 2c 99 e2 fe 9b fe 0e 9d c8 14 | ca 70 65 95 d9 6c bd 1f dd d1 55 09 ab fd c5 44 | 6f ba 1f 76 70 5a 17 28 af 45 27 b3 5f fa fe 02 | 6a 08 1d 7c 03 0b fb b8 0b b4 48 92 28 71 ac 6f | 5f 3f a7 45 71 f7 92 e0 6c 9d f2 6c bb 9e 54 7d | 4e c3 05 e2 c9 1e 50 4a ea 5d b8 f4 10 cd bd ed | f5 70 36 5b 63 22 bb 46 fb e4 aa 69 fc 3a 38 34 | d5 97 f3 9a 0b d9 79 ac e6 c8 40 6d e3 6c 66 31 | 20 73 b6 2d f4 7d 52 fd f2 32 69 70 71 7f cd d6 | 06 5e 27 45 05 1c 80 53 a4 80 ee b7 a6 45 c2 7e | 29 00 00 24 a1 6d db 5e 0b f7 f4 70 57 f1 37 cb | cc a0 06 3f 1d 1e 6b 0a b6 35 fa c1 29 23 78 83 | cc 1e 42 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 7c 20 90 94 5e 44 74 17 3c c7 e7 | e8 35 eb 34 00 1c 2e 68 00 00 00 1c 00 00 40 05 | eb 24 3e a6 a5 f2 dc 45 a5 ce 8c 46 9a d0 7a ff | cb 2c 1c 90 | libevent_free: release ptr-libevent@0x7fb37c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ecc0 | #399 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 35 91 e3 ae 4f 45 29 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #399 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #399 | rejected packet: | 9a 35 91 e3 ae 4f 45 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #399: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0733 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9f380 | handling event EVENT_RETRANSMIT for parent state #407 | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #407 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #407 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49677.05625; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501319 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ecc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #407 | libevent_malloc: new ptr-libevent@0x7fb37c0300e0 size 128 "road-eastnet-nonat-155" #407: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #407) | 0e f3 59 3b 18 9b 4c 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 5f 7f 81 27 bd f8 4f 84 8b e5 e1 d9 93 de d8 | ec 64 3c 7a c3 34 95 f3 06 ea 96 b5 7a 1b 8f d9 | c8 72 7c 66 d5 b2 ca 73 d5 43 7d ea c5 0c 84 ce | ea c7 b2 0b b4 5d 2c b0 44 4e 93 91 63 38 66 d7 | 19 d5 08 6f 6d f9 84 4a 63 7a 55 68 05 24 95 3e | 99 aa 1e b1 c3 ab 11 18 fa 12 e7 7c 5e c4 8f e2 | 44 28 c7 70 13 76 b9 dd 3a a6 1c 9b 90 d4 8f 73 | 83 e9 82 03 c0 46 28 ea 33 e9 c1 33 69 9b 00 f8 | f6 cd 83 94 cf a0 a7 5e b8 a0 8a 65 44 ef ec 83 | 35 ff 33 b2 45 4f 06 95 40 67 f8 16 c1 7f cb 23 | 42 69 1a ee 3e 5b 22 ed 9d 49 26 08 ce 24 1f dc | 4a 71 86 ce 70 39 9b 18 48 00 7f 0b fd 35 9a e2 | 3f 9a 8e 15 96 bd 41 9e d7 e9 02 79 05 c7 13 f3 | c8 1e 09 29 1f ca 34 e6 f2 7a 3f 24 4a 98 16 47 | 9a 91 43 46 5c 83 b4 00 84 95 4d df 42 56 5f 61 | 36 41 b7 50 c0 98 6b 76 ff 78 86 a6 38 01 7c 10 | 29 00 00 24 21 43 66 be 17 99 40 cd 23 ec 46 61 | 66 3c a9 d5 4d dd 70 3a b4 cd a8 e6 b6 42 a4 c0 | 0c aa c9 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 43 3c a2 b5 33 c4 3b e7 27 68 b0 | 1d 1f b8 cf bc 05 b9 a9 00 00 00 1c 00 00 40 05 | 76 06 02 ba 2b 08 ee 9d 42 ab b0 60 2b 0a e2 b7 | a2 85 77 a0 | libevent_free: release ptr-libevent@0x7fb36402ffd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9f380 | #407 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e f3 59 3b 18 9b 4c 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #407 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #407 | rejected packet: | 0e f3 59 3b 18 9b 4c 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #407: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0741 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa34c0 | handling event EVENT_RETRANSMIT for parent state #163 | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #163 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #163 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49677.083619; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.015076 exceeds limit? YES "road-eastnet-nonat-163" #163: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-163" #163: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #415 at 0x557d46ab18c0 | State DB: adding IKEv2 state #415 in UNDEFINED | pstats #415 ikev2.ike started | Message ID: init #415: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #415: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #415; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-163" #415: initiating v2 parent SA to replace #163 | using existing local IKE proposals for connection road-eastnet-nonat-163 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 415 for state #415 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9f380 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #415 | libevent_malloc: new ptr-libevent@0x7fb36402ffd0 size 128 | #415 spent 0.108 milliseconds in ikev2_parent_outI1() | crypto helper 18 resuming | crypto helper 18 starting work-order 415 for state #415 | RESET processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 415 | start processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #163 ikev2.ike failed too-many-retransmits | pstats #163 ikev2.ike deleted too-many-retransmits | #163 spent 2.18 milliseconds in total | [RE]START processing: state #163 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-163" #163: deleting state (STATE_PARENT_I1) aged 64.016s and NOT sending notification | parent state #163: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #163 "road-eastnet-nonat-163" #163: deleting IKE SA for connection 'road-eastnet-nonat-163' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-163' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-163 | State DB: deleting IKEv2 state #163 in PARENT_I1 | parent state #163: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #163 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 415 time elapsed 0.000662 seconds | libevent_free: release ptr-libevent@0x7fb380022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa34c0 | (#415) spent 0.66 milliseconds in crypto helper computing work-order 415: ikev2_outI1 KE (pcr) | in statetime_stop() and could not find #163 | crypto helper 18 sending results from work-order 415 for state #415 to event queue | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #415 | libevent_malloc: new ptr-libevent@0x7fb354029760 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-163 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 18 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-163" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-163' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-163" | stop processing: connection "road-eastnet-nonat-163" (in initiate_a_connection() at initiate.c:349) | spent 0.0788 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #415 | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 415 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #415 | **emit ISAKMP Message: | initiator cookie: | 65 fc 55 c7 f1 44 1e 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-163 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c0 9b 11 f8 2e b4 b5 c5 30 9b 3d a0 a2 4b 27 41 | ikev2 g^x f3 d8 72 20 8a 56 0a 05 ca 4d 84 e6 cb f6 3e 40 | ikev2 g^x 63 3e 65 dc a2 c0 87 47 ce 3b 5e 72 88 1b 50 31 | ikev2 g^x 15 c5 cf 6b 4a 2f c7 ec 02 24 2b 5b d8 13 58 82 | ikev2 g^x ef 96 ce cf 1b c6 83 84 dd 4e ef ff 6c f9 de 4b | ikev2 g^x fa f0 63 3e cd 62 10 03 38 09 9e db 49 54 15 3a | ikev2 g^x a8 3d 15 df b8 ef fb f6 60 02 a0 d4 fd 2e 9b e9 | ikev2 g^x ce 3a 0e 92 13 6c 3b 4e d2 2c 44 8a 4a 9a 05 6f | ikev2 g^x c3 bf 63 16 b0 c4 63 88 ff 02 84 93 54 65 74 42 | ikev2 g^x 97 c9 d1 95 9c 76 cf c6 11 6e 97 99 50 ea 6c f5 | ikev2 g^x 6f f0 5c 9c c9 57 a9 e3 41 19 f6 b0 38 a3 e5 ef | ikev2 g^x 84 44 8a 93 ae f1 ef 1d 2e 53 2b d3 a8 41 d5 27 | ikev2 g^x 64 64 ae fa 1d fd ea 61 22 f5 cc 34 a6 a2 ea 37 | ikev2 g^x 88 8a b9 05 5f 00 cd a9 3b c3 f2 31 36 31 fa 53 | ikev2 g^x 3d ba 7c f3 35 4b 65 ab 19 3c 20 1a b3 c4 2a ca | ikev2 g^x f4 c6 08 71 62 bd 13 1a f6 9c 40 a8 5d ea 27 a8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e8 b8 58 d7 ae 38 da 44 20 ee 1e 02 80 cb 41 b6 | IKEv2 nonce 8f 71 2c 96 9f ff be f1 a6 fa a0 4e 6d 67 74 06 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 65 fc 55 c7 f1 44 1e 54 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a3 | natd_hash: port= 01 f4 | natd_hash: hash= e9 e0 03 d8 e5 8b 46 47 10 2c a8 6c 82 9e b3 1d | natd_hash: hash= 1e 26 96 28 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e9 e0 03 d8 e5 8b 46 47 10 2c a8 6c 82 9e b3 1d | Notify data 1e 26 96 28 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 65 fc 55 c7 f1 44 1e 54 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= bb 40 b0 02 70 34 84 30 58 79 6d d4 87 e5 1d 82 | natd_hash: hash= 6b ed a6 65 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bb 40 b0 02 70 34 84 30 58 79 6d d4 87 e5 1d 82 | Notify data 6b ed a6 65 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #415 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #415: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #415 to 4294967295 after switching state | Message ID: IKE #415 skipping update_recv as MD is fake | Message ID: sent #415 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-163" #415: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.163:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #415) | 65 fc 55 c7 f1 44 1e 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 9b 11 f8 2e b4 b5 c5 30 9b 3d a0 a2 4b 27 41 | f3 d8 72 20 8a 56 0a 05 ca 4d 84 e6 cb f6 3e 40 | 63 3e 65 dc a2 c0 87 47 ce 3b 5e 72 88 1b 50 31 | 15 c5 cf 6b 4a 2f c7 ec 02 24 2b 5b d8 13 58 82 | ef 96 ce cf 1b c6 83 84 dd 4e ef ff 6c f9 de 4b | fa f0 63 3e cd 62 10 03 38 09 9e db 49 54 15 3a | a8 3d 15 df b8 ef fb f6 60 02 a0 d4 fd 2e 9b e9 | ce 3a 0e 92 13 6c 3b 4e d2 2c 44 8a 4a 9a 05 6f | c3 bf 63 16 b0 c4 63 88 ff 02 84 93 54 65 74 42 | 97 c9 d1 95 9c 76 cf c6 11 6e 97 99 50 ea 6c f5 | 6f f0 5c 9c c9 57 a9 e3 41 19 f6 b0 38 a3 e5 ef | 84 44 8a 93 ae f1 ef 1d 2e 53 2b d3 a8 41 d5 27 | 64 64 ae fa 1d fd ea 61 22 f5 cc 34 a6 a2 ea 37 | 88 8a b9 05 5f 00 cd a9 3b c3 f2 31 36 31 fa 53 | 3d ba 7c f3 35 4b 65 ab 19 3c 20 1a b3 c4 2a ca | f4 c6 08 71 62 bd 13 1a f6 9c 40 a8 5d ea 27 a8 | 29 00 00 24 e8 b8 58 d7 ae 38 da 44 20 ee 1e 02 | 80 cb 41 b6 8f 71 2c 96 9f ff be f1 a6 fa a0 4e | 6d 67 74 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 e0 03 d8 e5 8b 46 47 10 2c a8 6c | 82 9e b3 1d 1e 26 96 28 00 00 00 1c 00 00 40 05 | bb 40 b0 02 70 34 84 30 58 79 6d d4 87 e5 1d 82 | 6b ed a6 65 | state #415 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36402ffd0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9f380 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa34c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #415 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 | #415 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49677.084982 | resume sending helper answer for #415 suppresed complete_v2_state_transition() and stole MD | #415 spent 0.399 milliseconds in resume sending helper answer | stop processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb354029760 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 fc 55 c7 f1 44 1e 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #415 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #415 | rejected packet: | 65 fc 55 c7 f1 44 1e 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a3 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #415: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c012bf0 | handling event EVENT_RETRANSMIT for parent state #305 | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #305 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #305 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49677.091232; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007457 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354012630 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #305 | libevent_malloc: new ptr-libevent@0x7fb34802a950 size 128 "road-eastnet-nonat-53" #305: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #305) | 0e ad 9d c2 5e 8b 6a 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f e9 9f 5a 6d 09 7a 5d 23 c1 f2 37 ec ac 20 ff | 0b 05 30 7f 53 42 af cd 03 b4 6f 3e 30 98 76 c7 | f6 6d 6d 12 6f 8b e0 b3 ea 9f 1c 72 a6 90 d8 7b | c5 96 6d 18 3e 75 5f 76 31 a1 d4 8e 3c 37 16 33 | 4b dd 74 20 e8 c4 62 66 2a 3f ae 2f 41 fd 91 9d | 82 99 62 7a b3 d1 ba 05 ec 0f 82 e6 50 45 b8 02 | a6 bb b5 5a eb 4b 5a 37 8e aa cf ae a4 3c 1d 53 | 50 52 15 71 96 99 84 38 c8 90 39 55 a5 f6 b3 e4 | fd 1f be 6b e2 f1 ec 6b de 7b d5 b2 c2 99 77 3a | 99 91 64 fd 16 0c de 9a 77 95 51 ab fa 63 18 46 | 7f 05 f1 01 08 4a 40 52 ce 73 f7 5e 69 b6 5a cc | 4f 80 84 49 75 3b fb a8 21 4b 60 95 55 81 f4 0d | cb 05 bd e3 26 c4 5a 85 f3 a4 be ed 0d bf dc 15 | 6d 89 c4 7e 34 fc cc cd 95 5c 1d d7 12 73 97 3c | b9 13 4a ef 01 3e 06 0d bc ac d0 d1 a5 d2 76 b5 | 0f e8 f3 1a 11 93 b0 3e ca db 92 a3 66 d7 f8 e1 | 29 00 00 24 f3 38 4c 4d 23 45 96 5c 15 55 c7 5a | 82 60 67 82 ca 1f 2d 10 e7 40 18 d9 8a a9 22 da | 5f 97 93 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 2a f3 b2 21 79 dc dd 37 78 74 cf | d5 e0 cd fd 06 29 e6 7b 00 00 00 1c 00 00 40 05 | 89 f1 13 5f 51 69 37 8e 62 27 27 24 a2 bd 48 85 | 3c 78 e4 8e | libevent_free: release ptr-libevent@0x7fb34c014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c012bf0 | #305 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e ad 9d c2 5e 8b 6a 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #305 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #305 | rejected packet: | 0e ad 9d c2 5e 8b 6a 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #305: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0476 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #385 | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #385 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #385 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49677.100532; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002686 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #385 | libevent_malloc: new ptr-libevent@0x7fb34c014c70 size 128 "road-eastnet-nonat-133" #385: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #385) | dc 0d 67 a5 b0 49 95 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 d2 87 4f 28 1e d2 9a 8d 89 1b 83 29 19 de f5 | e6 63 09 2d e2 e9 61 46 d1 7b 1d 91 3c 38 a6 0f | e9 63 cf 58 08 13 3f 3e 7d f1 19 3d 13 fc 34 b5 | 18 8a e7 0c f9 3c 2c 71 b0 34 a4 05 97 a5 9f c7 | 97 d1 e4 25 37 22 ef 17 fb 52 35 c9 4f 1f 26 16 | 3c 2a 1f 00 10 3c df 46 38 33 44 5d a6 92 e5 d5 | 69 68 b5 76 06 e3 77 b8 1e 01 65 43 01 c9 86 ef | da 65 a5 1f 57 b0 00 8a de a9 34 23 2e 5c 26 a6 | a0 7f 44 a7 f5 75 dd 87 e1 fa 95 ca ff 5e 20 3b | 92 ff 19 e9 6e 3b 74 90 7d f7 38 58 ce a4 6e 3e | 22 98 35 57 a7 19 32 26 90 4e 72 85 8e fc 44 0f | e3 30 88 10 65 63 68 a3 81 e7 a5 04 d1 cf 06 2d | 36 a6 35 6b fb 1a c6 21 82 6b b4 50 a3 0b 89 0a | 70 f4 46 4d b9 30 8c 1b 9a a3 3e a4 57 bb 51 f0 | c0 0a 2a ca 36 ae b3 f0 02 3c c8 b5 bb 6a 7b 96 | 55 84 4d bb 15 b3 47 cf cd 45 3c 4a e8 4b 8f 89 | 29 00 00 24 90 a0 a9 10 09 5c 84 13 2a 39 8b 57 | c5 67 7f 3e 0b 64 03 36 1d 0d c2 a2 27 b3 44 c5 | 83 b2 09 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 9a 97 66 55 a8 9e d7 24 ff 14 54 | 09 c0 45 ac a1 60 51 9f 00 00 00 1c 00 00 40 05 | da 5c 4e 27 00 47 9e f2 1c fc 63 30 21 b4 79 d8 | 3b 38 4e b8 | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #385 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 0d 67 a5 b0 49 95 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #385 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #385 | rejected packet: | dc 0d 67 a5 b0 49 95 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #385: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0701 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c046090 | handling event EVENT_RETRANSMIT for parent state #357 | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #357 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #357 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49677.103901; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004298 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #357 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 "road-eastnet-nonat-105" #357: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #357) | 01 73 53 b2 ed 0d 4f 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 5d e8 51 f8 88 2e 8f 82 b3 f0 c5 8d a9 64 a4 | a0 30 bf b5 c2 12 6f 84 86 c4 e5 7c 43 ef 90 df | 5d 9c 5c c9 94 45 36 f4 9a c7 87 0d ff 17 4f a4 | bd 30 02 23 c4 49 d7 cd 90 90 63 b2 f0 74 82 ef | 7b ab 5b 1a 9b 56 e3 fd 6b c1 60 57 a4 3d 47 37 | cf 84 69 51 e7 0c 33 60 a6 88 c6 d3 40 f2 c0 67 | 8b b5 93 bc 89 96 e7 49 3d 16 a4 fa 47 99 08 bb | bf 76 ad cc b2 29 51 14 b3 93 c1 93 70 ab fa 85 | 9c 87 13 3b 74 20 3c a9 9f e8 37 97 e1 cf 3a 19 | 47 ba 4f bf 93 41 7a fe 94 33 ee 81 fb be 0f 8d | 00 a6 62 b8 8f 57 b3 51 57 ec 11 f0 29 c2 98 0d | c4 d2 cf 4a 38 f9 e9 bb 93 44 3a af 7c 9c 77 58 | 65 26 12 0d 96 b7 42 97 54 c0 ec f8 c4 63 9f c0 | 21 fc 89 98 11 d0 25 94 6e 52 89 6d 61 9b 1b e0 | 4a d8 54 ed 06 da f5 4b d3 dd 7c 2c 10 b9 6d 1c | a3 ef f1 ff a5 e4 02 74 f7 b0 97 d7 72 10 8b a3 | 29 00 00 24 2c c1 df 10 e0 1b 6c 08 e6 87 0f da | 7b 1d fc 5a dc 06 9f d4 9a 8b 4f 0e 09 60 b7 78 | 83 2e 36 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be 3a 2f 62 a9 83 16 c4 9b 57 fc 3c | bc 9e d0 29 41 57 58 a4 00 00 00 1c 00 00 40 05 | 08 0b c8 d5 d5 c0 e6 e6 c4 8a f3 fb 5c 3f c5 0a | 4e c8 f0 d0 | libevent_free: release ptr-libevent@0x7fb37c023f10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c046090 | #357 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 73 53 b2 ed 0d 4f 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #357 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #357 | rejected packet: | 01 73 53 b2 ed 0d 4f 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #357: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0526 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35800cc10 | handling event EVENT_RETRANSMIT for parent state #400 | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #400 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #400 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49677.108207; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001767 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c046090 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #400 | libevent_malloc: new ptr-libevent@0x7fb37c023f10 size 128 "road-eastnet-nonat-148" #400: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #400) | 6c f1 c2 e4 ca 88 89 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 14 1f bf 2d 44 6c 78 3f 86 f8 f3 fa a1 a5 9d | a0 a8 08 62 76 01 cc db f3 4e 4a c1 03 ae f2 db | c6 06 da 1a 15 ae 3e f9 fa b6 70 0f b3 7b e5 34 | 8d 5b 06 20 ef d4 aa 62 0d d5 a9 7d 3d 49 08 95 | 77 51 97 14 c6 fe 13 ee ee 9b f0 54 56 73 79 30 | ad d7 b3 17 12 47 8d 8d e8 49 20 41 18 2a 1c c8 | c4 68 99 45 f4 b5 f1 6d d9 34 ec 8a e3 80 cc 67 | 30 b6 d6 0d 11 9e 86 7f 87 2f c0 73 7c 40 eb 31 | 24 34 89 0e ca 7b 62 d2 f6 17 85 8f 75 81 28 9b | 1c a9 03 80 8d 78 61 63 07 3b b3 b9 c4 40 46 d5 | ab 82 5f da 4c aa ce 61 bb ab c0 1a 00 85 50 e6 | e8 f6 9f c8 7f 01 8e 16 ac 04 56 78 cf 7c 43 a9 | f9 c7 26 fb 06 32 92 98 86 3f 37 ca f2 f2 fc bf | 1d e3 ee 48 e8 25 74 7d 16 d9 38 6e ca e9 38 51 | 44 22 32 93 01 95 d0 87 12 07 ff 4c 7e 49 f3 04 | 98 50 fe 91 bd 78 84 00 92 17 d7 f5 e0 e1 d0 43 | 29 00 00 24 aa 21 0d 2f 8b 5a 11 5c 7a 19 73 4d | 8f 68 86 24 6a ba 53 0b 82 59 c5 5c 31 b4 eb 7e | 18 78 2e 54 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 82 bc d9 51 57 ae 67 73 5e 22 78 | a2 06 a4 b1 df 07 78 c3 00 00 00 1c 00 00 40 05 | 48 01 58 d1 13 9f 6e 34 06 7b 6e f6 08 2f fa 1f | f9 ef b6 96 | libevent_free: release ptr-libevent@0x7fb35804ba00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800cc10 | #400 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c f1 c2 e4 ca 88 89 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #400 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #400 | rejected packet: | 6c f1 c2 e4 ca 88 89 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #400: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.049 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33801d710 | handling event EVENT_RETRANSMIT for parent state #408 | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #408 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #408 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49677.119533; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500872 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #408 | libevent_malloc: new ptr-libevent@0x7fb35804ba00 size 128 "road-eastnet-nonat-156" #408: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #408) | 34 97 74 26 6a e5 a4 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 b4 84 d1 c7 68 61 a7 a8 43 5d 75 52 c1 45 ab | 1c 34 c9 1c fb 58 62 3f d2 e4 63 2f df 8e 65 23 | b3 d6 a9 03 c7 71 70 03 ff 1d bb ac 17 a8 6b 6d | e6 be 80 ad c9 77 c7 17 6a 89 49 48 8d b3 43 d4 | 49 ba db 2f fb d6 1b 93 5a 1f a3 ce 04 89 6c 2c | cc 68 c0 e5 12 10 fe eb 35 b6 6c ba a1 43 99 e7 | 4d 42 5d cb 3f a9 dd f3 e4 5f 32 df 76 2b 7a ba | 94 68 cc b7 71 6f 68 e6 66 e9 1a 0b ff e7 f5 9d | 06 aa 01 3c 32 ad d4 f8 5e 61 a5 fe 63 fb f1 96 | b8 0a 85 b5 ad 42 f9 e3 5a cf 27 5e ec 13 9b d0 | 73 b5 31 d4 d2 24 51 4d f5 0b 85 9e 11 85 42 e0 | 88 fc 0a 42 f4 e7 3d 49 ba 53 8a d7 ce 64 df d3 | 52 60 3d 1b 37 34 8f 8c 6a 9e 6e 25 b4 f3 7c 18 | 7a d1 56 c7 cf 72 57 08 b3 73 0c ad 15 18 33 ce | 9c f7 e6 b3 e4 26 15 89 8c 70 86 37 d6 87 03 97 | 84 4a 45 be 3f 69 21 05 76 54 73 82 39 32 70 e8 | 29 00 00 24 59 44 9e 7a bb 43 7f 93 5b bd e5 23 | c1 87 73 73 05 59 35 01 ab d3 f0 0b c4 05 69 18 | 98 63 3b b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 8e f2 86 2b ac 70 a5 cc 8b e7 7d | ac ad 47 30 21 b0 b0 7f 00 00 00 1c 00 00 40 05 | 79 17 f0 70 ea 4a c6 21 3a b7 c0 97 d4 68 33 32 | 9c c8 09 b0 | libevent_free: release ptr-libevent@0x7fb338023e10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33801d710 | #408 spent 0.181 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 97 74 26 6a e5 a4 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #408 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #408 | rejected packet: | 34 97 74 26 6a e5 a4 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #408: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0762 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8d840 | handling event EVENT_RETRANSMIT for parent state #164 | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #164 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #164 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49677.143925; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.012388 exceeds limit? YES "road-eastnet-nonat-164" #164: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-164" #164: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #416 at 0x557d46ab2e80 | State DB: adding IKEv2 state #416 in UNDEFINED | pstats #416 ikev2.ike started | Message ID: init #416: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #416: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #416; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-164" #416: initiating v2 parent SA to replace #164 | using existing local IKE proposals for connection road-eastnet-nonat-164 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 416 for state #416 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb33801d710 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #416 | libevent_malloc: new ptr-libevent@0x7fb338023e10 size 128 | #416 spent 0.102 milliseconds in ikev2_parent_outI1() | crypto helper 7 resuming | RESET processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 starting work-order 416 for state #416 | start processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #164 ikev2.ike failed too-many-retransmits | pstats #164 ikev2.ike deleted too-many-retransmits | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 416 | #164 spent 2.53 milliseconds in total | [RE]START processing: state #164 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-164" #164: deleting state (STATE_PARENT_I1) aged 64.014s and NOT sending notification | parent state #164: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #164 "road-eastnet-nonat-164" #164: deleting IKE SA for connection 'road-eastnet-nonat-164' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-164' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-164 | State DB: deleting IKEv2 state #164 in PARENT_I1 | parent state #164: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #164 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 416 time elapsed 0.000993 seconds | libevent_free: release ptr-libevent@0x7fb3680300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8d840 | in statetime_stop() and could not find #164 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#416) spent 1 milliseconds in crypto helper computing work-order 416: ikev2_outI1 KE (pcr) | processing global timer EVENT_REVIVE_CONNS | crypto helper 7 sending results from work-order 416 for state #416 to event queue | scheduling resume sending helper answer for #416 Initiating connection road-eastnet-nonat-164 which received a Delete/Notify but must remain up per local policy | libevent_malloc: new ptr-libevent@0x7fb348029760 size 128 | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 7 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-164" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-164' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-164" | stop processing: connection "road-eastnet-nonat-164" (in initiate_a_connection() at initiate.c:349) | spent 0.0836 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #416 | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 416 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #416 | **emit ISAKMP Message: | initiator cookie: | 5d bf 34 43 fd eb 2e 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-164 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a0 9c 12 61 6e 55 5f 3f e9 df f9 16 83 d1 25 2a | ikev2 g^x 72 5f a1 78 f7 87 25 3a 22 d7 65 e6 11 d9 d3 59 | ikev2 g^x e3 ba 0c 77 63 47 38 eb 2b 7e 21 79 54 43 77 67 | ikev2 g^x 7d 43 26 41 55 e2 a8 b7 fe 98 ba 7e ee 6e e7 d1 | ikev2 g^x f4 f4 66 e8 1d dc d6 4c 00 81 99 f5 5a 7b 73 a7 | ikev2 g^x 30 2a 46 7a 31 1a a2 5d 7f 98 25 46 aa 6e fe 80 | ikev2 g^x f5 47 c9 6c 4b 73 63 fa cd 88 eb 14 22 c8 b1 b2 | ikev2 g^x ad 5f b2 f2 36 1e b4 11 ad 9a b6 4a 8b 3e c1 87 | ikev2 g^x 99 5d 71 91 57 ac 82 f2 a3 ed 29 f1 0e 50 36 50 | ikev2 g^x 84 2e 3a 51 9c b6 89 41 dc e0 0d 62 c7 07 fd 92 | ikev2 g^x b2 9d 62 79 ea 78 ed 7f ed 48 ed 1d 98 d3 08 ff | ikev2 g^x 02 b4 3e 75 4f aa f5 e9 04 8d 83 d6 4c a8 75 42 | ikev2 g^x 31 a1 15 df b2 8a e4 30 1f 81 68 86 a3 e6 e3 23 | ikev2 g^x 56 ac 18 47 57 cf 03 de 91 03 0e d5 5d 28 a8 63 | ikev2 g^x aa 5c 8c 97 5e 5c eb 84 7c 09 fb 47 84 e9 d6 18 | ikev2 g^x 63 4d 10 b9 7d 4e 26 06 3f 25 b1 aa e9 d4 6c b6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b4 c4 67 16 b9 c2 e8 af d8 82 12 ab bc d9 b4 36 | IKEv2 nonce b0 6a ad c4 e5 8c 60 6e da e3 9f 02 d5 5c 1a 39 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5d bf 34 43 fd eb 2e 8c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a4 | natd_hash: port= 01 f4 | natd_hash: hash= 19 76 97 4c b0 23 bd 31 57 aa f9 24 a0 38 a6 39 | natd_hash: hash= 12 13 22 3e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 19 76 97 4c b0 23 bd 31 57 aa f9 24 a0 38 a6 39 | Notify data 12 13 22 3e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5d bf 34 43 fd eb 2e 8c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d7 f1 41 97 86 a8 54 0a 0b 1f 8a 34 7f d0 a2 86 | natd_hash: hash= ea 0e a2 fa | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d7 f1 41 97 86 a8 54 0a 0b 1f 8a 34 7f d0 a2 86 | Notify data ea 0e a2 fa | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #416 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #416: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #416 to 4294967295 after switching state | Message ID: IKE #416 skipping update_recv as MD is fake | Message ID: sent #416 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-164" #416: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.164:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #416) | 5d bf 34 43 fd eb 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 9c 12 61 6e 55 5f 3f e9 df f9 16 83 d1 25 2a | 72 5f a1 78 f7 87 25 3a 22 d7 65 e6 11 d9 d3 59 | e3 ba 0c 77 63 47 38 eb 2b 7e 21 79 54 43 77 67 | 7d 43 26 41 55 e2 a8 b7 fe 98 ba 7e ee 6e e7 d1 | f4 f4 66 e8 1d dc d6 4c 00 81 99 f5 5a 7b 73 a7 | 30 2a 46 7a 31 1a a2 5d 7f 98 25 46 aa 6e fe 80 | f5 47 c9 6c 4b 73 63 fa cd 88 eb 14 22 c8 b1 b2 | ad 5f b2 f2 36 1e b4 11 ad 9a b6 4a 8b 3e c1 87 | 99 5d 71 91 57 ac 82 f2 a3 ed 29 f1 0e 50 36 50 | 84 2e 3a 51 9c b6 89 41 dc e0 0d 62 c7 07 fd 92 | b2 9d 62 79 ea 78 ed 7f ed 48 ed 1d 98 d3 08 ff | 02 b4 3e 75 4f aa f5 e9 04 8d 83 d6 4c a8 75 42 | 31 a1 15 df b2 8a e4 30 1f 81 68 86 a3 e6 e3 23 | 56 ac 18 47 57 cf 03 de 91 03 0e d5 5d 28 a8 63 | aa 5c 8c 97 5e 5c eb 84 7c 09 fb 47 84 e9 d6 18 | 63 4d 10 b9 7d 4e 26 06 3f 25 b1 aa e9 d4 6c b6 | 29 00 00 24 b4 c4 67 16 b9 c2 e8 af d8 82 12 ab | bc d9 b4 36 b0 6a ad c4 e5 8c 60 6e da e3 9f 02 | d5 5c 1a 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 19 76 97 4c b0 23 bd 31 57 aa f9 24 | a0 38 a6 39 12 13 22 3e 00 00 00 1c 00 00 40 05 | d7 f1 41 97 86 a8 54 0a 0b 1f 8a 34 7f d0 a2 86 | ea 0e a2 fa | state #416 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb338023e10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb33801d710 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8d840 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #416 | libevent_malloc: new ptr-libevent@0x7fb338023e10 size 128 | #416 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49677.14573 | resume sending helper answer for #416 suppresed complete_v2_state_transition() and stole MD | #416 spent 0.49 milliseconds in resume sending helper answer | stop processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb348029760 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d bf 34 43 fd eb 2e 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #416 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #416 | rejected packet: | 5d bf 34 43 fd eb 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a4 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #416: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0649 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370012bf0 | handling event EVENT_RETRANSMIT for parent state #386 | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #386 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #386 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49677.159933; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002843 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf00 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #386 | libevent_malloc: new ptr-libevent@0x7fb3680300e0 size 128 "road-eastnet-nonat-134" #386: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #386) | b9 e2 f3 4f 37 4c 11 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f da ec b0 32 6b 35 e3 b5 80 95 66 e9 7f b8 d5 | e2 e0 68 33 cd 76 e0 38 1a b1 5d 56 26 da 9f e0 | 7e 25 7d 36 13 86 62 f1 2c 8d 3f 33 c2 a9 77 5c | 6c 22 2c d9 e8 13 05 5f 5c b6 bf 2d 06 59 25 68 | 04 0a 7e 77 39 77 e2 48 8e 95 f3 7a 6b 62 7a 5c | 74 73 02 c5 eb 3d 85 b2 e4 97 e2 a5 7e c1 fd bd | 8e 39 16 68 05 dd bf 87 fa 57 12 1c 04 ca 0c 29 | 8c f4 e1 ff dd 36 cf 70 de cd 23 dc c6 ae 0f aa | 3b 0f fa f5 80 72 1a cd 74 ba bc e4 a4 6c a0 e3 | 89 9a 36 59 db 27 b5 54 3f 8a aa cb ee 7a 4c 74 | 10 ef 6c 33 3c 46 b9 be 98 4b 1f 0c 9e a1 0f e7 | 70 9c 48 fc 41 5f bc 21 01 43 4c 8e f5 9c e5 23 | bb 93 4c ac ba 5c 01 89 9a 17 4a 24 a8 b9 2c 47 | 70 fc 07 f1 21 a4 d5 20 f9 8f f8 38 ce d5 70 b1 | 42 c9 99 11 ba 5a fc 0c 06 b5 ae ff af e4 68 aa | d7 82 77 58 85 4e fc 74 00 fa 00 8a 91 15 50 9e | 29 00 00 24 84 96 aa 5e b5 f6 6f 99 c5 43 c7 51 | b3 36 1c 3e 65 fe 9c e9 3e a8 cd 03 a7 c9 e1 a9 | 36 56 0e 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 80 4a c6 9c b6 70 28 5d 0a 3a 23 | 72 63 d0 38 6e f2 8f ca 00 00 00 1c 00 00 40 05 | 26 1f 03 bb d7 50 8e c5 c4 3f 03 d2 3a c8 fe 3b | 09 a1 da 1f | libevent_free: release ptr-libevent@0x7fb35c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370012bf0 | #386 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 e2 f3 4f 37 4c 11 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #386 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #386 | rejected packet: | b9 e2 f3 4f 37 4c 11 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #386: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0683 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350018460 | handling event EVENT_RETRANSMIT for parent state #306 | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #306 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #306 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49677.168331; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004918 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370012bf0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #306 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 "road-eastnet-nonat-54" #306: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #306) | fd d2 63 50 0e 6e 1e 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc f6 1e 22 b4 91 3a 68 1f d1 67 6d 28 c8 f1 bf | e2 6e 14 07 e3 24 35 86 32 c0 3d 31 76 0e 87 74 | f9 3c 48 85 fb a5 36 8c 2d 66 01 91 c5 ea 8c 52 | 2c 54 17 a9 6d 05 2c 50 21 08 25 54 8a 1b be 0a | 1d bd df b6 06 bd 44 6a d2 67 92 4c 02 bb 81 0c | c5 ff 14 e5 24 16 2f 34 f8 b9 eb 90 9f 21 2d 2e | b4 e3 0a 67 2a 94 b3 b5 79 5e 99 67 ad f2 05 03 | 3c 2d de 97 30 2e 1c 04 bc c1 21 b5 15 d2 d7 d9 | ea a8 e1 e4 5e c5 d4 35 2f fe 33 59 95 e2 b7 3c | 23 52 f4 04 24 af 5a 95 09 7f 61 6c 7a 9b e9 50 | d2 38 26 f9 d3 19 e4 0a 3c be ac cf c6 ff b4 45 | b0 35 a0 dc ec 70 3d 13 ab c2 8a 53 0d 47 68 05 | 67 66 c8 1a af d5 d2 45 a5 c1 6e df ea 2b 64 70 | 05 da 5e 15 ac a3 ed f4 40 10 0f 5a 84 40 9e bc | d6 87 16 fd 3f a2 ff 39 19 ba 66 6d 2d e9 93 fd | b9 22 df b5 78 f4 f7 04 ee c7 91 83 7d a9 ca f1 | 29 00 00 24 c2 6f b9 fd fc 4f db 1a 3d 3f c0 a7 | af 7a 63 dc 70 8f 4c 18 81 55 af 15 16 2b 00 41 | 32 ac cf 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 87 47 9a 56 3f e1 15 1e 01 4b 7f | bb 95 0e 04 49 a0 88 16 00 00 00 1c 00 00 40 05 | 0c f3 ae 84 0d fd 98 31 4d e7 cb a5 de d2 0b 07 | b0 31 98 21 | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350018460 | #306 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd d2 63 50 0e 6e 1e 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #306 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #306 | rejected packet: | fd d2 63 50 0e 6e 1e 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #306: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0704 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a25d10 | handling event EVENT_RETRANSMIT for parent state #401 | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #401 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #401 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49677.174704; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001576 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #401 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-149" #401: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #401) | 32 2a 52 53 b6 80 03 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 23 97 0d 57 1e 4b f9 07 88 66 bf 34 6e 58 4c | e6 20 66 15 d1 8b df 5a d2 2b 70 66 bf e5 46 ee | 75 f4 eb 71 1f f1 6f e1 d6 58 06 0a 4d 97 04 53 | 74 d3 7a 62 9c 6d fc 73 97 9b c2 cb c3 d3 cb d1 | a7 2a 8a bf ad 15 46 4b ac 4a 21 e7 16 cd 32 18 | f6 83 ab c8 99 38 21 bc e5 81 05 3f fc e4 b5 9f | 7d 77 82 93 0f 69 5a af 5b c2 81 88 55 f6 fa cc | 86 fe 2d 7e 6d ae 3a 9b 57 e6 de 78 5a 36 ba 60 | 3d 56 da 1d 5d 7b 85 49 92 79 e6 7c 62 e6 ba 39 | 70 40 1b 2f 31 49 fc c6 d5 8b 43 aa e6 2d 80 f1 | 00 4e 8e 1a 05 73 d3 15 0d 7c 1c 15 71 3b 45 0a | 71 47 01 7c 8b 3a 4c 28 d2 c5 72 06 09 34 70 7a | 6f eb 8d 51 fc f9 d9 92 d1 00 53 57 7a 80 e8 39 | 37 38 0d 62 49 b3 0f 75 c3 ee 8b a3 66 04 51 8d | 4d ca 16 c5 dc 18 bd ee 26 01 0f c7 9b e6 0b 35 | e3 5e 44 0d 5e 45 e9 f2 25 03 56 4f 95 a8 57 74 | 29 00 00 24 98 0f af 0d 18 0d 49 ab 74 8d 40 09 | a9 19 04 ac c2 29 19 2a e5 21 dd 83 5a 09 3e 6b | 71 16 78 8b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 5b 75 e0 fb 06 ab 59 93 2a 0c bc | 70 9d 3c 6c 4b 98 95 ed 00 00 00 1c 00 00 40 05 | 06 0c a6 cc 70 cf f8 01 75 5d 68 14 0f cc 7e 89 | 81 50 60 0f | libevent_free: release ptr-libevent@0x7fb37c014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a25d10 | #401 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 2a 52 53 b6 80 03 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #401 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #401 | rejected packet: | 32 2a 52 53 b6 80 03 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #401: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0589 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abfd80 | handling event EVENT_RETRANSMIT for parent state #358 | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #358 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #358 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49677.189014; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004713 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a25d10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #358 | libevent_malloc: new ptr-libevent@0x7fb37c014c70 size 128 "road-eastnet-nonat-106" #358: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #358) | 9c 16 21 10 e3 b0 2f 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 b0 5e 24 2c 38 69 f7 5e 0a ef 9c cd 0c a9 a2 | e7 60 22 31 02 17 4e 87 ab da 67 2c 74 68 e6 5c | 3c 13 72 b8 82 de 1f 97 f0 91 0b ef 5f 05 b5 88 | 8f 55 10 d6 ed 84 95 00 12 6f 2a 48 1a 79 36 91 | 49 04 49 1e 83 7f 51 0b cd 40 c4 12 1d 28 81 4a | ff 1e be db 2c 06 48 44 01 2b 86 9e 50 88 79 26 | a2 fe 2d b6 28 25 0f 1c 72 e5 7c 02 81 23 76 48 | e4 63 77 54 94 1c a2 42 e7 62 79 1a 9c c2 d3 a5 | 84 2a 02 f0 5d 86 de 0c ac 44 c1 bc a9 db 93 da | ab e8 d1 96 60 b7 1e 28 8e ce cc cb 77 fb 32 3a | af 1c d9 5d 2b 9d 4c bb 37 50 e3 2c 2a bd a4 df | 6f 99 23 0d 27 83 b0 b4 f9 48 a2 69 86 2e 3a c0 | 5d bf ed 94 bb f2 f3 07 e1 00 d8 2f 62 9b ee ec | b5 9a a1 3e ac 61 be 8a ce 7d 14 b6 c3 13 21 43 | 2f 85 9a 2f fd b3 5f a3 b2 e0 9c 9a 19 21 fa dc | c3 c9 17 3d e7 0b 51 07 b0 13 9d cf 7d 38 e5 ef | 29 00 00 24 31 6e a1 8e 9b bf 74 40 01 d9 c6 2f | f4 95 5e 1f af be c9 b5 67 9c 79 1e 7d 41 57 e9 | 2e 59 a1 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 2b df 62 51 b1 0d 46 7a 83 b8 02 | 18 9c 1e 91 3d 80 67 46 00 00 00 1c 00 00 40 05 | 21 2b d2 d4 2f 80 55 47 29 a9 2f db 69 80 68 e4 | e7 d9 41 df | libevent_free: release ptr-libevent@0x7fb36402a780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abfd80 | #358 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9c 16 21 10 e3 b0 2f 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #358 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #358 | rejected packet: | 9c 16 21 10 e3 b0 2f 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #358: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abe780 | handling event EVENT_RETRANSMIT for parent state #409 | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #409 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #409 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49677.19138; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500465 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abfd80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #409 | libevent_malloc: new ptr-libevent@0x7fb36402a780 size 128 "road-eastnet-nonat-157" #409: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #409) | 0d 5e 25 c2 55 3c 99 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e 9e 5e 2e 09 bf 8f 71 99 55 8d fe 7f 83 64 1f | 09 d9 64 f5 c9 93 8a 5c be 46 9e 22 f6 15 48 5f | a3 27 82 be 44 32 8b ed 4e a8 f7 10 74 01 31 7a | a5 a7 4a e9 16 68 9c 40 cb 7b 6b e4 87 2e b5 7d | 61 20 08 88 29 08 bb bf f5 22 fa fd 47 2b fd 61 | a5 c3 48 69 18 1a 27 78 c3 f3 e3 0b 62 b4 52 0b | 48 72 ce 1d 37 3b 34 c5 fc ba cb 1f 9d e8 de ad | 9b ab 2c 3a d9 69 c6 42 6d b1 05 5a c4 77 34 d1 | ff 6d 2c 38 8e 1f 9c 0a 39 45 f9 c1 2e 9a c1 dd | d2 58 ca fc 7a d1 3f 4c 26 24 eb 54 5d 92 fb 39 | 47 60 ec 18 66 63 9c 19 12 10 f2 b6 7c 18 85 c7 | 6c d1 5b c2 e0 13 21 58 85 48 a4 fc 6e b1 46 84 | 53 a9 5a 65 21 91 66 41 1c 5e ad 4e a2 85 5a 4b | dd 4b fe 45 dc c9 fe ab c9 08 d4 96 88 93 93 aa | 1e 95 b1 87 3d 21 a8 b6 2f fd 18 ff 13 73 04 e2 | 11 aa e4 99 8f 8e f6 da 34 f7 b8 a6 55 2e b3 22 | 29 00 00 24 56 91 a2 13 7d 33 fd 14 52 dc d7 9d | 97 62 ec aa 5a ba e0 81 38 20 1d 66 12 9f da fa | a6 b6 f9 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d7 a6 1d 1c 1e 3f 9a df 29 5a 62 1d | 4b b6 a0 46 97 db 0a 03 00 00 00 1c 00 00 40 05 | b4 37 78 a6 35 8d da 4f 96 64 40 e6 05 68 b6 9e | 6d 2b 7a a6 | libevent_free: release ptr-libevent@0x7fb3880269d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe780 | #409 spent 0.0798 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 5e 25 c2 55 3c 99 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #409 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #409 | rejected packet: | 0d 5e 25 c2 55 3c 99 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #409: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0383 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1c490 | handling event EVENT_RETRANSMIT for parent state #165 | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #165 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #165 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49677.204622; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00615 exceeds limit? YES "road-eastnet-nonat-165" #165: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-165" #165: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #417 at 0x557d46ab4440 | State DB: adding IKEv2 state #417 in UNDEFINED | pstats #417 ikev2.ike started | Message ID: init #417: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #417: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #417; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-165" #417: initiating v2 parent SA to replace #165 | using existing local IKE proposals for connection road-eastnet-nonat-165 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 417 for state #417 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46abe780 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #417 | libevent_malloc: new ptr-libevent@0x7fb3880269d0 size 128 | #417 spent 0.0678 milliseconds in ikev2_parent_outI1() | RESET processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #165 ikev2.ike failed too-many-retransmits | pstats #165 ikev2.ike deleted too-many-retransmits | crypto helper 8 resuming | crypto helper 8 starting work-order 417 for state #417 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 417 | #165 spent 2.41 milliseconds in total | [RE]START processing: state #165 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-165" #165: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #165: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #165 "road-eastnet-nonat-165" #165: deleting IKE SA for connection 'road-eastnet-nonat-165' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-165' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-165 | State DB: deleting IKEv2 state #165 in PARENT_I1 | parent state #165: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 417 time elapsed 0.000601 seconds | stop processing: state #165 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb35403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c490 | (#417) spent 0.606 milliseconds in crypto helper computing work-order 417: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 417 for state #417 to event queue | in statetime_stop() and could not find #165 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #417 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7fb34c02ec30 size 128 Initiating connection road-eastnet-nonat-165 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 8 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-165" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-165' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-165" | stop processing: connection "road-eastnet-nonat-165" (in initiate_a_connection() at initiate.c:349) | spent 0.0757 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #417 | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 417 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #417 | **emit ISAKMP Message: | initiator cookie: | d9 e4 18 5f 59 64 b9 ab | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-165 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 75 fd ed 03 c4 13 a8 51 65 6c f8 7b f8 e0 2d 89 | ikev2 g^x 59 12 b6 d0 fa 5d d3 b6 48 1f 05 4f d0 37 4e 96 | ikev2 g^x b6 b0 a9 07 5a 84 b2 22 72 c2 6e e4 2c 16 e8 fb | ikev2 g^x c8 92 b8 74 ce 3f 40 30 b5 60 8c 95 d1 d0 42 81 | ikev2 g^x 96 4a 3e 9a 08 06 af be 4a d9 72 15 c0 c3 46 78 | ikev2 g^x d0 1e d0 10 cd c4 48 fd 2d ac c2 45 66 8d 26 84 | ikev2 g^x dc ff cb c9 a3 60 b9 5c 03 1c 63 7c ad bd 60 96 | ikev2 g^x ce 2e d7 57 49 16 93 e7 43 2d b6 d5 b4 ce 5b 3b | ikev2 g^x 96 51 3a 88 ff 32 38 dc 5f 0b a8 74 a0 1a 49 87 | ikev2 g^x b5 db a2 1f ed 10 a6 d0 7a 48 4a 90 79 4e 5a f9 | ikev2 g^x 2b 8b 33 88 7e f6 9a 82 54 47 b3 ae d3 d5 19 8e | ikev2 g^x 35 94 b5 a7 07 70 69 91 1e 2e 08 a0 fa fa bf a8 | ikev2 g^x 09 5a 06 2f 9a 90 75 b5 b1 fe 11 2e 8d bc e2 8f | ikev2 g^x fc 8a 4c 02 b2 2c 51 5d d4 fd cc 21 3e c1 63 73 | ikev2 g^x 47 88 57 72 c3 e3 90 eb 42 71 fd 34 f9 5d 5f ad | ikev2 g^x 35 a7 22 19 95 d8 2d 82 e5 c2 0e d7 d8 88 22 f6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce df 2c 07 75 0e bd bd 78 6f 85 ca 62 53 2e a0 29 | IKEv2 nonce e4 f9 3b 0b 22 fe c0 44 7c 40 c5 a3 8b 56 a4 94 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d9 e4 18 5f 59 64 b9 ab | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a5 | natd_hash: port= 01 f4 | natd_hash: hash= 33 f3 05 bf ce a7 d8 4f e5 99 24 52 75 47 3a d4 | natd_hash: hash= 7d 71 ad 77 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 33 f3 05 bf ce a7 d8 4f e5 99 24 52 75 47 3a d4 | Notify data 7d 71 ad 77 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d9 e4 18 5f 59 64 b9 ab | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 01 69 5d 3d 4a 00 3f a4 76 63 f4 90 ae 45 6d 8b | natd_hash: hash= 22 6e e0 18 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 01 69 5d 3d 4a 00 3f a4 76 63 f4 90 ae 45 6d 8b | Notify data 22 6e e0 18 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #417 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #417: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #417 to 4294967295 after switching state | Message ID: IKE #417 skipping update_recv as MD is fake | Message ID: sent #417 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-165" #417: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.165:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #417) | d9 e4 18 5f 59 64 b9 ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 fd ed 03 c4 13 a8 51 65 6c f8 7b f8 e0 2d 89 | 59 12 b6 d0 fa 5d d3 b6 48 1f 05 4f d0 37 4e 96 | b6 b0 a9 07 5a 84 b2 22 72 c2 6e e4 2c 16 e8 fb | c8 92 b8 74 ce 3f 40 30 b5 60 8c 95 d1 d0 42 81 | 96 4a 3e 9a 08 06 af be 4a d9 72 15 c0 c3 46 78 | d0 1e d0 10 cd c4 48 fd 2d ac c2 45 66 8d 26 84 | dc ff cb c9 a3 60 b9 5c 03 1c 63 7c ad bd 60 96 | ce 2e d7 57 49 16 93 e7 43 2d b6 d5 b4 ce 5b 3b | 96 51 3a 88 ff 32 38 dc 5f 0b a8 74 a0 1a 49 87 | b5 db a2 1f ed 10 a6 d0 7a 48 4a 90 79 4e 5a f9 | 2b 8b 33 88 7e f6 9a 82 54 47 b3 ae d3 d5 19 8e | 35 94 b5 a7 07 70 69 91 1e 2e 08 a0 fa fa bf a8 | 09 5a 06 2f 9a 90 75 b5 b1 fe 11 2e 8d bc e2 8f | fc 8a 4c 02 b2 2c 51 5d d4 fd cc 21 3e c1 63 73 | 47 88 57 72 c3 e3 90 eb 42 71 fd 34 f9 5d 5f ad | 35 a7 22 19 95 d8 2d 82 e5 c2 0e d7 d8 88 22 f6 | 29 00 00 24 df 2c 07 75 0e bd bd 78 6f 85 ca 62 | 53 2e a0 29 e4 f9 3b 0b 22 fe c0 44 7c 40 c5 a3 | 8b 56 a4 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 33 f3 05 bf ce a7 d8 4f e5 99 24 52 | 75 47 3a d4 7d 71 ad 77 00 00 00 1c 00 00 40 05 | 01 69 5d 3d 4a 00 3f a4 76 63 f4 90 ae 45 6d 8b | 22 6e e0 18 | state #417 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3880269d0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46abe780 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe780 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #417 | libevent_malloc: new ptr-libevent@0x7fb3880269d0 size 128 | #417 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49677.205814 | resume sending helper answer for #417 suppresed complete_v2_state_transition() and stole MD | #417 spent 0.313 milliseconds in resume sending helper answer | stop processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c02ec30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 e4 18 5f 59 64 b9 ab | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #417 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #417 | rejected packet: | d9 e4 18 5f 59 64 b9 ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a5 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #417: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3fc10 | handling event EVENT_RETRANSMIT for parent state #387 | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #387 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #387 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49677.219003; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00299 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c490 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #387 | libevent_malloc: new ptr-libevent@0x7fb34c02ec30 size 128 "road-eastnet-nonat-135" #387: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #387) | 75 6e e5 e5 6a cd b8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff a4 36 8a d7 5e f8 44 73 70 3f d1 cc 7c 79 90 | 0b d6 30 0a fd 2b 08 93 ae c4 9d c0 92 f3 30 c3 | aa 43 1a b6 dd 00 a6 77 0b 61 7f 7a 6d 22 60 10 | f1 8f 0a bd 4e 21 a1 c5 3c 6d bc 87 58 3a fc 28 | a1 f5 dc 41 f0 99 f6 3d 83 55 3c 93 36 df 67 78 | d6 16 47 a9 dd 0a f6 c9 ed 30 32 20 48 63 8f ce | 8c eb 37 37 cb 50 71 37 bd cb 4b f9 48 98 89 fb | 52 3f d5 c6 89 92 40 89 ae 52 a8 41 db 88 8d ad | 76 89 a2 2c 25 fd cd a1 b3 18 a9 52 92 ca 41 cc | be 86 7c 0a d4 fa d9 2c a1 ce 6b 87 5c 4f 0b a7 | e2 e7 b1 90 b4 88 13 15 0f 2d 50 24 a6 28 8e 8a | 81 90 02 66 38 1d 10 b6 04 db f1 15 7f 9a 7c eb | ec 94 ef 10 22 b8 7f a2 35 e6 24 56 5c e6 40 99 | 8b 09 81 82 27 99 96 55 ae 30 73 4e 23 e9 a5 45 | d0 57 f8 f9 3b 6c 05 9a 46 78 7d b3 62 a4 ed 17 | 2e 15 c3 a2 7d 0c 1c 89 e1 68 08 b6 03 09 76 f8 | 29 00 00 24 11 0e 4a cd 20 fc ce 84 68 c7 a8 ec | 48 5c fe b5 ee 21 2d ef c1 3f a3 a1 30 c1 c0 88 | b1 78 03 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 fb 47 16 eb 64 05 e3 af e5 70 ee | b4 39 fc 1b 30 12 e4 0b 00 00 00 1c 00 00 40 05 | d8 e1 2e 80 87 77 be 81 c0 a4 a8 f5 fc 15 8f 58 | 08 dc e4 8d | libevent_free: release ptr-libevent@0x7fb34001a190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3fc10 | #387 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 6e e5 e5 6a cd b8 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #387 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #387 | rejected packet: | 75 6e e5 e5 6a cd b8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #387: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28ab0 | handling event EVENT_RETRANSMIT for parent state #402 | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #402 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #402 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49677.239303; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00127 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3fc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #402 | libevent_malloc: new ptr-libevent@0x7fb34001a190 size 128 "road-eastnet-nonat-150" #402: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #402) | d7 18 0b 56 dd fc 93 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 8f d0 91 ee 0c 2c 6d b1 49 7f e7 a7 c5 b4 b6 | ba 26 c6 73 cd 26 6d 07 75 be 09 23 1b d9 66 18 | 43 89 72 64 b1 d5 06 ca 9d c0 33 e2 98 5e c1 57 | 08 88 8a 2d 7a 4a eb cd 6a ad 0c 5b 60 7a 3c d6 | 1b 41 e1 63 95 9d 48 05 85 b8 3e e9 c2 2c 08 fc | 0a e1 15 60 ae 51 d5 ec 71 41 de 9c 11 57 49 6c | 9b fc 6f 1d 07 87 e1 29 06 e5 0a b9 9d 8f 51 66 | de ed ee d7 d1 94 d4 80 f9 c9 b3 72 40 5d 4f 1f | e8 51 bc 21 99 7c 48 a4 03 69 7e 36 81 2c 93 c5 | 85 f1 72 97 17 d9 4b 16 e1 02 93 16 a0 e9 5a 8c | 18 8b 2d 22 a0 68 e9 52 fc 14 55 90 a6 f2 25 49 | d1 90 07 21 fd a8 a8 15 db 83 f7 be ce 21 31 d0 | 18 03 fd af 89 22 76 d9 16 f9 54 ff a2 a4 03 62 | f9 9f ab 74 f4 75 62 99 a7 8b 91 97 ad 9d c4 9c | 3e 40 41 dc 60 23 02 31 5e 46 98 d3 1a 73 73 14 | dd ff 30 58 0d fa ab 00 11 c3 0b 18 0a c3 bc a2 | 29 00 00 24 22 ce 51 25 1e d0 f6 54 17 83 9f e7 | 7f a6 b8 56 15 08 66 12 32 0f c5 1a 1c 37 04 e4 | a3 f5 17 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 72 8a fb e8 f5 d3 16 73 e6 1b bd | ae fd 45 81 b5 65 c1 51 00 00 00 1c 00 00 40 05 | 63 4e 70 bd 7c b5 4d 3a 8c 2e 79 8c 91 4d 92 d1 | 89 54 24 9e | libevent_free: release ptr-libevent@0x7fb36c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28ab0 | #402 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 18 0b 56 dd fc 93 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #402 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #402 | rejected packet: | d7 18 0b 56 dd fc 93 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #402: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7b910 | handling event EVENT_RETRANSMIT for parent state #410 | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #410 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #410 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49677.247586; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500764 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a28ab0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #410 | libevent_malloc: new ptr-libevent@0x7fb36c0407f0 size 128 "road-eastnet-nonat-158" #410: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #410) | 59 b5 db 36 67 47 70 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 b7 0b 8c f9 95 bc f7 80 78 70 36 f3 fd f2 85 | 36 5b 98 b3 da 7d 8e 19 72 07 91 60 60 8a e6 82 | 67 b3 ba e3 47 c2 28 3a c4 af df a8 61 5d 73 9e | d2 63 4a 41 c1 df 23 58 85 d0 d0 d7 31 64 13 d3 | fc c4 39 95 ba ac 0f ae 94 0f 0a ba f0 76 e9 ae | a0 35 47 51 b9 fa 43 1f 5e 7f a1 99 3d cc 76 ac | 19 ca 51 32 ad cd e2 9d 6b 98 62 47 ad 2c d1 40 | 11 bd ff e1 9d 02 a1 c8 40 a8 ed 91 e5 60 1c 79 | ee 69 bc ed 65 82 b2 85 d5 b1 74 ab f9 fa 7a e9 | f0 dc 57 ef e3 3e 09 b2 80 4a e9 c3 55 5a 97 3e | 39 d4 2d 85 ca cc 9a e5 d4 76 c5 5e 9e c1 e9 7d | 39 17 67 a4 c4 56 99 a0 e7 0c b7 13 22 44 76 46 | 08 b0 60 5a a2 8d 7d 3c 2d 85 7a 7a dd 83 3a 2b | 27 be 2b 38 04 53 2f 3d 0c cd c0 ad bc 4e 6a 91 | 94 3d 91 ac 7d a2 5b fd 39 2e 69 e6 48 9c ae be | 71 e2 83 13 24 ec 5c 04 d1 c5 4a 80 96 3c 2f 11 | 29 00 00 24 e1 88 5c 17 02 b4 80 04 34 b3 a7 d4 | f8 d1 c3 d6 e1 59 82 cb 1f c0 98 16 57 75 53 e7 | ef 70 14 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 ce e5 8e 76 7c ee 72 e4 c9 6c 0a | 7e 11 3d 4e e7 09 5c 04 00 00 00 1c 00 00 40 05 | 2c 17 58 9d 14 87 37 db ad 40 b0 f7 64 73 53 a7 | 0b 3f 01 e6 | libevent_free: release ptr-libevent@0x7fb37803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7b910 | #410 spent 0.0893 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 59 b5 db 36 67 47 70 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #410 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #410 | rejected packet: | 59 b5 db 36 67 47 70 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #410: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd80 | handling event EVENT_RETRANSMIT for parent state #359 | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #359 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #359 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49677.262852; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003368 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7b910 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #359 | libevent_malloc: new ptr-libevent@0x7fb37803b0b0 size 128 "road-eastnet-nonat-107" #359: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #359) | 73 c2 2a a2 cb e2 3d 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 2e 83 fc d4 94 f1 45 60 7e d6 c0 1f 1c e7 33 | 0f bd b7 8a 76 4b 8b 45 55 e6 bb 84 3d 22 78 af | 75 6e da ff d0 e9 4b 87 08 80 14 e9 1e 9e bb 0e | 16 e9 ea 66 ca bd 7c 66 87 ad a8 d9 21 e1 38 83 | 1f 32 ef a7 2f 0e bf 2d 1d 63 39 6b 83 61 62 c6 | 3e 6a a6 28 e7 8f 0a b3 a0 d9 53 fb be 77 6d 21 | 33 ab c4 d4 01 99 45 77 31 5e 2f ff 5a 01 15 07 | d7 80 2f 1a 7e c3 c0 54 fe ea 5a 9f 7b b7 54 0e | 9f aa da f6 69 55 9a 24 0b a7 e8 7e 52 f9 f8 78 | ba 68 8d a1 bc 1f b0 9f 73 b4 50 08 1b 93 cf 3c | ca 2c f0 94 b0 7c a2 eb fc f9 ec 95 a0 6e 85 2f | 2e ef 23 90 9d 23 ef b2 33 25 ac 56 cb 51 63 74 | c1 ab 1f 93 d7 e6 e0 11 36 c8 47 24 fc 03 91 1a | 9f ca af ad 3e 92 13 be 1e e3 b4 78 2a ad 4c d9 | b9 b1 7c 5e 5e 7c 3e c4 e0 d5 55 d6 b9 f7 15 83 | 2f 6c 01 ee d5 14 3b f0 0d dd 1e 11 8b 30 cd e0 | 29 00 00 24 69 b6 35 41 69 53 97 ba 18 48 44 fd | d5 e2 9a 31 05 82 94 36 da fb c0 91 72 56 36 c7 | c4 dd c7 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 a1 1b b6 5c a0 e8 d3 82 8b cf 19 | 85 69 c3 9f 45 ea 96 77 00 00 00 1c 00 00 40 05 | 5b ca 3a 7b b0 51 af 81 eb d5 3c 03 e7 f7 fa 57 | 2f 45 5b b9 | libevent_free: release ptr-libevent@0x7fb340008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd80 | #359 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 73 c2 2a a2 cb e2 3d 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #359 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #359 | rejected packet: | 73 c2 2a a2 cb e2 3d 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #359: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0873 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25c80 | handling event EVENT_RETRANSMIT for parent state #166 | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #166 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #166 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49677.271237; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009324 exceeds limit? YES "road-eastnet-nonat-166" #166: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-166" #166: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #418 at 0x557d46ab5a00 | State DB: adding IKEv2 state #418 in UNDEFINED | pstats #418 ikev2.ike started | Message ID: init #418: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #418: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #418; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-166" #418: initiating v2 parent SA to replace #166 | using existing local IKE proposals for connection road-eastnet-nonat-166 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 418 for state #418 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9dd80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #418 | libevent_malloc: new ptr-libevent@0x7fb340008e30 size 128 | #418 spent 0.113 milliseconds in ikev2_parent_outI1() | crypto helper 12 resuming | crypto helper 12 starting work-order 418 for state #418 | RESET processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 418 | start processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #166 ikev2.ike failed too-many-retransmits | pstats #166 ikev2.ike deleted too-many-retransmits | #166 spent 2.25 milliseconds in total | [RE]START processing: state #166 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-166" #166: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #166: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #166 "road-eastnet-nonat-166" #166: deleting IKE SA for connection 'road-eastnet-nonat-166' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-166' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-166 | State DB: deleting IKEv2 state #166 in PARENT_I1 | parent state #166: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #166 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 418 time elapsed 0.000861 seconds | libevent_free: release ptr-libevent@0x7fb37c04b7c0 | (#418) spent 0.869 milliseconds in crypto helper computing work-order 418: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c80 | crypto helper 12 sending results from work-order 418 for state #418 to event queue | scheduling resume sending helper answer for #418 | libevent_malloc: new ptr-libevent@0x7fb340030080 size 128 | in statetime_stop() and could not find #166 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 12 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-166 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-166" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-166' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-166" | stop processing: connection "road-eastnet-nonat-166" (in initiate_a_connection() at initiate.c:349) | spent 0.0597 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #418 | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 418 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #418 | **emit ISAKMP Message: | initiator cookie: | 1c 58 36 d0 b8 a0 d1 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-166 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 35 21 69 13 ea 9b 51 f5 f8 3d bc 58 75 ed a9 fd | ikev2 g^x 17 d1 ac 45 30 9e bb dc f5 67 d6 33 5f f9 21 3b | ikev2 g^x d7 08 0c bd e4 4c bf b2 e0 66 df d2 39 12 b4 cd | ikev2 g^x 51 1d 79 99 b2 28 9d 92 25 3d de c7 de 50 60 c0 | ikev2 g^x b1 e7 b1 2f 20 ba 56 e0 cc d5 d3 89 fb f3 3a 69 | ikev2 g^x 08 b8 19 34 ad 51 11 33 2c 83 6c 01 df 40 a9 5a | ikev2 g^x d2 8e ac 81 f5 73 32 a5 92 89 d9 43 53 9f d1 60 | ikev2 g^x 24 f6 18 43 4f b2 cc 04 87 ab 6f 28 3d 9c e1 be | ikev2 g^x 1d b6 6f 40 8a 39 f7 27 97 65 7c fa 70 bb d3 47 | ikev2 g^x 6d aa 41 65 fd 87 5b bf 5a 85 1c ca 2d 31 4b 63 | ikev2 g^x 3b 57 1d 34 66 19 31 70 16 5e 12 2a 4b 3c f3 aa | ikev2 g^x c7 b4 1f b1 9b ff 71 77 21 47 b5 ee 99 1f 02 09 | ikev2 g^x 95 71 68 b7 06 9b 0f 65 04 ee a4 b9 3b 45 42 02 | ikev2 g^x 7d d2 87 0e 66 c1 75 4c ff 7a f3 83 39 de 46 b2 | ikev2 g^x 20 fd 8a d9 22 4f c4 77 47 fd 4b 1b 01 cf 2f ef | ikev2 g^x dc 02 1e 19 bc 0a 3d 9b 32 25 8e a1 b4 27 34 08 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1a d8 6e 71 ca d7 ba 26 1e 49 f1 5f c1 b0 03 8a | IKEv2 nonce 8a 69 67 55 4a ef 6c 1a 26 5d 01 35 4b 44 6d e5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1c 58 36 d0 b8 a0 d1 56 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a6 | natd_hash: port= 01 f4 | natd_hash: hash= 50 63 ba bc 17 58 ec 8f 3d 47 af 87 d9 d9 f5 4c | natd_hash: hash= 16 0e 40 2b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 50 63 ba bc 17 58 ec 8f 3d 47 af 87 d9 d9 f5 4c | Notify data 16 0e 40 2b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1c 58 36 d0 b8 a0 d1 56 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 0c c9 6a 54 72 2b 9b 5b 7b 1a a4 b5 a9 4f 1c b9 | natd_hash: hash= a1 57 0c cc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0c c9 6a 54 72 2b 9b 5b 7b 1a a4 b5 a9 4f 1c b9 | Notify data a1 57 0c cc | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #418 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #418: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #418 to 4294967295 after switching state | Message ID: IKE #418 skipping update_recv as MD is fake | Message ID: sent #418 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-166" #418: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.166:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #418) | 1c 58 36 d0 b8 a0 d1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 21 69 13 ea 9b 51 f5 f8 3d bc 58 75 ed a9 fd | 17 d1 ac 45 30 9e bb dc f5 67 d6 33 5f f9 21 3b | d7 08 0c bd e4 4c bf b2 e0 66 df d2 39 12 b4 cd | 51 1d 79 99 b2 28 9d 92 25 3d de c7 de 50 60 c0 | b1 e7 b1 2f 20 ba 56 e0 cc d5 d3 89 fb f3 3a 69 | 08 b8 19 34 ad 51 11 33 2c 83 6c 01 df 40 a9 5a | d2 8e ac 81 f5 73 32 a5 92 89 d9 43 53 9f d1 60 | 24 f6 18 43 4f b2 cc 04 87 ab 6f 28 3d 9c e1 be | 1d b6 6f 40 8a 39 f7 27 97 65 7c fa 70 bb d3 47 | 6d aa 41 65 fd 87 5b bf 5a 85 1c ca 2d 31 4b 63 | 3b 57 1d 34 66 19 31 70 16 5e 12 2a 4b 3c f3 aa | c7 b4 1f b1 9b ff 71 77 21 47 b5 ee 99 1f 02 09 | 95 71 68 b7 06 9b 0f 65 04 ee a4 b9 3b 45 42 02 | 7d d2 87 0e 66 c1 75 4c ff 7a f3 83 39 de 46 b2 | 20 fd 8a d9 22 4f c4 77 47 fd 4b 1b 01 cf 2f ef | dc 02 1e 19 bc 0a 3d 9b 32 25 8e a1 b4 27 34 08 | 29 00 00 24 1a d8 6e 71 ca d7 ba 26 1e 49 f1 5f | c1 b0 03 8a 8a 69 67 55 4a ef 6c 1a 26 5d 01 35 | 4b 44 6d e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 63 ba bc 17 58 ec 8f 3d 47 af 87 | d9 d9 f5 4c 16 0e 40 2b 00 00 00 1c 00 00 40 05 | 0c c9 6a 54 72 2b 9b 5b 7b 1a a4 b5 a9 4f 1c b9 | a1 57 0c cc | state #418 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb340008e30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9dd80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #418 | libevent_malloc: new ptr-libevent@0x7fb37c04b7c0 size 128 | #418 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49677.272754 | resume sending helper answer for #418 suppresed complete_v2_state_transition() and stole MD | #418 spent 0.365 milliseconds in resume sending helper answer | stop processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb340030080 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c 58 36 d0 b8 a0 d1 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #418 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #418 | rejected packet: | 1c 58 36 d0 b8 a0 d1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a6 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #418: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0a940 | handling event EVENT_RETRANSMIT for parent state #388 | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #388 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #388 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49677.28598; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003419 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #388 | libevent_malloc: new ptr-libevent@0x7fb340030080 size 128 "road-eastnet-nonat-136" #388: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #388) | f7 ff cf 56 0b 2d 32 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 17 f0 4b b8 d6 41 9d bc 4a 96 2e 42 ab 77 4e | 7f 54 60 13 56 59 15 20 fc c4 79 98 ae 8f e2 06 | 69 79 8f 5d 63 48 c3 bc 00 b2 f8 7b 8f f4 4d a0 | 8c a9 81 52 3e 4a c4 f8 92 22 05 f0 4d e8 83 0e | f0 26 c0 2c 43 f9 88 43 07 5f 25 9e 50 b5 11 c3 | 73 c8 0e 1f 5c 85 88 1c fc e4 6e f2 9c 07 04 d2 | 2d 14 31 25 c7 f1 fa 00 27 db 06 87 f8 4d 48 60 | a2 9b c5 9a 24 e6 5c 8b 88 aa 13 bf 0e 45 97 1c | aa fb ea 7f ee 38 9d c2 3b dc ac 73 ba e2 2c 03 | 3d dd 91 b1 96 88 2a b1 4e a5 10 5e fe 8f b7 60 | 27 7f 42 c9 c1 97 c4 03 be 93 ba 66 8c 91 b1 77 | 12 50 ef a2 c9 9b f5 15 0b 50 4a dc c3 9e 64 d1 | d8 0c c9 6c 86 d8 1a 40 d2 c3 48 bc 8a 19 fb 47 | d3 3d 4c 63 67 3a 9b 43 54 08 5f 36 9c 29 c6 ed | 7a c1 fa 3a 70 4b f1 9d 3d f8 73 d3 02 37 8f 1c | 0a e4 74 d1 b8 f7 7d a3 cc 04 0d cc 02 1c 9d d7 | 29 00 00 24 d2 a6 cd 06 28 a1 fe ae 1b 89 a2 1d | a1 4a 61 12 14 72 44 a4 a4 a5 e9 38 f2 78 91 07 | 4b 1e 98 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 fc fe 8e 48 65 14 18 f3 7c 80 1c | c9 89 2e 09 96 5d 2c 3e 00 00 00 1c 00 00 40 05 | 5e 49 cb 06 a1 a8 89 d0 e9 f4 c7 34 ac a2 e0 5c | 40 ed 0b 80 | libevent_free: release ptr-libevent@0x7fb35c046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0a940 | #388 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 ff cf 56 0b 2d 32 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #388 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #388 | rejected packet: | f7 ff cf 56 0b 2d 32 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #388: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0eac0 | handling event EVENT_RETRANSMIT for parent state #403 | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #403 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #403 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49677.30528; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000809 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0a940 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #403 | libevent_malloc: new ptr-libevent@0x7fb35c046040 size 128 "road-eastnet-nonat-151" #403: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #403) | 32 36 13 09 3a 0c 64 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 1d 1f f9 29 d4 7a 82 e5 c3 ed 2d 91 36 94 a3 | ad 42 95 1c da 49 e7 df be 20 17 de b8 10 02 70 | 99 a0 9d 95 41 a8 00 d1 af 94 26 4c 6c 86 0c 1f | 94 7a 02 35 96 84 54 33 fd cb 84 dd 66 c9 68 48 | c0 82 f1 59 9a 21 1d bc d5 30 03 12 1e e7 09 61 | be 0b 67 1d db fb 9e 1e 17 49 85 95 31 47 f7 2b | 4a 86 6c c9 65 82 f2 1e a6 01 6c ac cd f1 e2 b1 | c0 7c 6b 1c 75 70 5d e8 eb b9 df 8a a0 09 66 57 | 4a b4 92 66 fc a3 08 c8 94 4f 6c 58 0d 44 86 54 | 0d a6 ba 1e d2 d3 f5 98 14 c7 bb cb 0d c6 25 81 | 7d 00 f0 be 73 bc 11 32 a7 22 fe 40 f1 5c 99 a7 | f6 f4 02 31 24 83 16 a4 cb d9 f9 bc 7d ee f9 64 | 7a 45 11 03 43 36 f4 ff f8 3b 61 50 62 1a ea 35 | 94 85 76 d9 cf 8d 05 40 c4 4f 44 89 69 5a 20 63 | bb 17 c4 c0 24 8c 90 9c 7c 82 0c b1 fd 04 ab 4c | 94 5c 67 12 3b 66 e3 71 78 3a f5 9a 05 60 53 5e | 29 00 00 24 96 4a 72 fe 73 4d 43 f4 22 71 ca 5d | 92 02 9d 90 a1 de a3 67 65 d9 a5 3e 5d f5 46 47 | 3c 9d 2b 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 72 77 63 b0 4d c0 15 33 f7 7b 47 | a3 64 95 74 99 05 10 8e 00 00 00 1c 00 00 40 05 | 3b eb 87 4d 47 ff 24 80 19 6f 36 13 fc b8 88 ec | 58 fe 93 a3 | libevent_free: release ptr-libevent@0x7fb35c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0eac0 | #403 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 36 13 09 3a 0c 64 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #403 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #403 | rejected packet: | 32 36 13 09 3a 0c 64 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #403: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61c10 | handling event EVENT_RETRANSMIT for parent state #411 | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #411 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #411 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49677.322582; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500827 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0eac0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #411 | libevent_malloc: new ptr-libevent@0x7fb35c04b850 size 128 "road-eastnet-nonat-159" #411: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #411) | dd dd 24 eb b8 cb 50 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd cd 4b b5 b6 e7 18 30 d4 d0 8e 83 03 53 e6 4e | 8d 99 24 ba 33 2f 0c bd fc e2 e9 0d 81 68 aa 7b | 12 93 68 9f 91 0d c2 fa e1 b9 83 26 f0 5b 9b dd | 51 e3 9e ed 34 ea 5f c9 93 72 24 b6 bd 13 cb 5c | 26 fe cc 72 6c e7 c6 21 ed 4e 14 b2 9f a3 3b 3c | 94 f8 1a 98 76 bb 57 e6 0d a9 bd 26 b1 18 3d 50 | 59 31 42 4b 06 7d ba db 70 1e 1c ae a8 d8 de 3a | 81 ee 27 6d 40 cc 4d 6a 4b fc 36 c4 b0 3a 09 0b | 48 47 43 74 dd e5 cb 90 df 6e e3 46 c3 6c 8b 97 | f3 25 7f d4 fd ec f5 56 ff 6b 80 d1 67 dc c0 79 | 70 cf 38 a2 35 5f 37 c9 04 ae 98 e9 6e f3 26 d3 | 47 94 bb 03 5d 71 7b 87 ad 54 4b 93 a3 b0 71 8f | 5f 69 b0 8d 69 3f e2 c0 02 32 57 3f 64 cb 19 71 | 58 00 09 d8 ce 8f 64 c9 55 9e 7c 00 26 28 eb f7 | 6f eb 0e ab 01 fb ae c5 0f da bd 30 07 46 c2 b0 | 5c ea 05 eb 2d 3f 40 91 20 c1 a3 5a 4f 86 98 86 | 29 00 00 24 a3 6a 54 81 57 a4 87 e3 a7 7a 68 dd | 8e 44 5b 6e 2b 5e f0 9a 3e c5 72 e8 17 f4 34 1c | 65 bd e7 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f a2 a7 20 75 c6 9d 9f 5f af fe db | d7 0a 3e e1 5c 28 6c 20 00 00 00 1c 00 00 40 05 | 37 57 74 7e fa 8f cf 8f 09 51 1f a5 a7 dc 5e 89 | 60 7b 2d b3 | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61c10 | #411 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd dd 24 eb b8 cb 50 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #411 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #411 | rejected packet: | dd dd 24 eb b8 cb 50 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #411: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34800d120 | handling event EVENT_RETRANSMIT for parent state #307 | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #307 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #307 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49677.330881; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005329 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61c10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #307 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 "road-eastnet-nonat-55" #307: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #307) | ae 96 63 e8 bb 6a 85 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 14 ed e9 d6 19 10 2b ec dd 37 28 c8 5c 2b 9d | 4d 1c 56 bb af 08 b5 7a 4b a6 fc d3 e6 37 09 e4 | 3f 1e 28 12 a3 d4 a0 95 36 fb be 53 ba 61 08 91 | a5 59 64 37 32 8f 20 cb c1 4b 24 6f aa 9c 35 eb | 55 d5 bc cd 87 7a 12 07 97 e1 3e 1d fe 09 4e 05 | 56 a9 36 dd e5 c2 2b 14 24 4c 71 52 b8 4a bc e5 | 44 05 b4 12 ae 0a ee 10 63 d4 56 16 75 0e 24 7a | d8 3e 40 79 17 42 50 86 a6 54 47 3f a4 b0 ab e0 | d2 28 b5 9a 24 3f 4a c2 b0 91 11 3a 15 fb b2 26 | f2 b0 63 ef 6f 51 35 98 2f 68 7c a5 78 9f 97 ad | 5a 09 af 4c 24 bb dd dc ab e6 24 53 27 3d 9e 03 | 62 ad 6c f7 99 7f 86 ec 99 0f d4 42 fa 99 b4 e1 | da 5b a4 af 44 6d 6a f4 d7 89 78 8e f4 87 7b 68 | 84 5a 7e 9d b0 43 44 70 16 90 a6 1a d2 cc 8f 85 | 21 0d 25 8b 92 c7 6a 03 1f 2e 4c a1 00 a9 05 b1 | b5 20 9b fc 87 43 c1 10 a6 42 8f 4d 15 f7 48 a2 | 29 00 00 24 9a 25 60 c3 7e e3 91 a3 9d b3 07 0f | ff 92 da ab 25 95 17 32 0d 82 17 4c 51 9e de a9 | 5d 92 35 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b e0 88 15 5c bc 20 c5 96 41 9f 3a | 7e ef 58 59 98 52 f8 6e 00 00 00 1c 00 00 40 05 | 92 3b 5d d1 4e 37 91 81 a5 d6 c2 94 c8 33 2c 33 | 6a d3 7b 36 | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800d120 | #307 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 96 63 e8 bb 6a 85 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #307 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #307 | rejected packet: | ae 96 63 e8 bb 6a 85 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #307: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0483 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a70b50 | handling event EVENT_RETRANSMIT for parent state #167 | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #167 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #167 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49677.338206; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010947 exceeds limit? YES "road-eastnet-nonat-167" #167: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-167" #167: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #419 at 0x557d46ab6fc0 | State DB: adding IKEv2 state #419 in UNDEFINED | pstats #419 ikev2.ike started | Message ID: init #419: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #419: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #419; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-167" #419: initiating v2 parent SA to replace #167 | using existing local IKE proposals for connection road-eastnet-nonat-167 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 419 for state #419 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34800d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #419 | libevent_malloc: new ptr-libevent@0x7fb348012840 size 128 | #419 spent 0.0723 milliseconds in ikev2_parent_outI1() | RESET processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #167 ikev2.ike failed too-many-retransmits | pstats #167 ikev2.ike deleted too-many-retransmits | #167 spent 2.65 milliseconds in total | [RE]START processing: state #167 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-167" #167: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #167: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #167 "road-eastnet-nonat-167" #167: deleting IKE SA for connection 'road-eastnet-nonat-167' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-167' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-167 | State DB: deleting IKEv2 state #167 in PARENT_I1 | crypto helper 5 resuming | crypto helper 5 starting work-order 419 for state #419 | parent state #167: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 419 | stop processing: state #167 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb35001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b50 | in statetime_stop() and could not find #167 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-167 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-167" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-167' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-167" | stop processing: connection "road-eastnet-nonat-167" (in initiate_a_connection() at initiate.c:349) | spent 0.0566 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 419 time elapsed 0.000556 seconds | (#419) spent 0.557 milliseconds in crypto helper computing work-order 419: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 419 for state #419 to event queue | scheduling resume sending helper answer for #419 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #419 | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 419 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #419 | **emit ISAKMP Message: | initiator cookie: | 13 42 1a 05 2a a9 f4 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-167 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6c 82 ba 57 e5 18 7f 6d c1 4e 6c 32 74 c7 8d bc | ikev2 g^x fa 9e 5f 85 57 91 bd e7 d1 f6 a5 cc 56 d4 ef 2c | ikev2 g^x 82 2b a5 62 6a 68 41 f0 a0 92 fa 2e 12 6a 74 95 | ikev2 g^x 56 98 09 32 67 8d a9 cf ce e8 4b 16 ca ae fd 57 | ikev2 g^x 33 7d 99 6a 29 1d 52 35 0b 5c 55 de 21 8b fe 4c | ikev2 g^x 64 ea 17 c4 c0 64 cd 47 31 4b 7a 08 f8 bd 37 3f | ikev2 g^x 72 ba 30 cd 0e c2 9d 0f e4 8b 3f b8 4c 2a d4 69 | ikev2 g^x de 4a 7f 8a a8 eb c0 7f 8f b2 10 0b d8 35 aa 5e | ikev2 g^x c8 ac 23 ce e4 c8 52 08 91 9c 13 ce 38 17 f1 d8 | ikev2 g^x db ec 31 93 d6 0d 09 93 5b d1 dc 9c 92 3b e5 29 | ikev2 g^x 17 5b e6 ee 7f f5 fb 3d 38 b5 23 c0 cf 25 d5 5b | ikev2 g^x 67 0a 2b 07 fd 68 8f 4c 74 c9 96 0b 9b 44 5c 6b | ikev2 g^x 0e 2d 70 4b 98 d5 d7 b9 54 dc 11 1e 19 cb 73 3f | ikev2 g^x 22 ca 80 46 28 a8 4a 20 64 29 4c 39 a5 b7 25 84 | ikev2 g^x 93 fd 4d 3a a6 fa ab c2 68 fc 5d fb 3c 7c 06 72 | ikev2 g^x eb 28 8a f5 09 69 59 c1 01 26 88 c4 c6 36 f6 6c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 83 3f e0 e8 30 90 0c c2 fd 9a 5c 8a 88 7b e1 27 | IKEv2 nonce 5d 3c cc 26 1c 41 3f 95 a3 1e 69 69 b9 67 17 14 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 13 42 1a 05 2a a9 f4 f2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a7 | natd_hash: port= 01 f4 | natd_hash: hash= 82 b9 c0 cf 3f 29 65 8b 9d 3a 51 6d 0f 16 20 c0 | natd_hash: hash= 79 fc 1d 37 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 82 b9 c0 cf 3f 29 65 8b 9d 3a 51 6d 0f 16 20 c0 | Notify data 79 fc 1d 37 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 13 42 1a 05 2a a9 f4 f2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 67 f3 84 dc 78 2e 75 89 44 b5 31 a8 97 13 e9 a5 | natd_hash: hash= b9 b4 3a e4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 67 f3 84 dc 78 2e 75 89 44 b5 31 a8 97 13 e9 a5 | Notify data b9 b4 3a e4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #419 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #419: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #419 to 4294967295 after switching state | Message ID: IKE #419 skipping update_recv as MD is fake | Message ID: sent #419 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-167" #419: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.167:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #419) | 13 42 1a 05 2a a9 f4 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 82 ba 57 e5 18 7f 6d c1 4e 6c 32 74 c7 8d bc | fa 9e 5f 85 57 91 bd e7 d1 f6 a5 cc 56 d4 ef 2c | 82 2b a5 62 6a 68 41 f0 a0 92 fa 2e 12 6a 74 95 | 56 98 09 32 67 8d a9 cf ce e8 4b 16 ca ae fd 57 | 33 7d 99 6a 29 1d 52 35 0b 5c 55 de 21 8b fe 4c | 64 ea 17 c4 c0 64 cd 47 31 4b 7a 08 f8 bd 37 3f | 72 ba 30 cd 0e c2 9d 0f e4 8b 3f b8 4c 2a d4 69 | de 4a 7f 8a a8 eb c0 7f 8f b2 10 0b d8 35 aa 5e | c8 ac 23 ce e4 c8 52 08 91 9c 13 ce 38 17 f1 d8 | db ec 31 93 d6 0d 09 93 5b d1 dc 9c 92 3b e5 29 | 17 5b e6 ee 7f f5 fb 3d 38 b5 23 c0 cf 25 d5 5b | 67 0a 2b 07 fd 68 8f 4c 74 c9 96 0b 9b 44 5c 6b | 0e 2d 70 4b 98 d5 d7 b9 54 dc 11 1e 19 cb 73 3f | 22 ca 80 46 28 a8 4a 20 64 29 4c 39 a5 b7 25 84 | 93 fd 4d 3a a6 fa ab c2 68 fc 5d fb 3c 7c 06 72 | eb 28 8a f5 09 69 59 c1 01 26 88 c4 c6 36 f6 6c | 29 00 00 24 83 3f e0 e8 30 90 0c c2 fd 9a 5c 8a | 88 7b e1 27 5d 3c cc 26 1c 41 3f 95 a3 1e 69 69 | b9 67 17 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 b9 c0 cf 3f 29 65 8b 9d 3a 51 6d | 0f 16 20 c0 79 fc 1d 37 00 00 00 1c 00 00 40 05 | 67 f3 84 dc 78 2e 75 89 44 b5 31 a8 97 13 e9 a5 | b9 b4 3a e4 | state #419 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb348012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34800d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #419 | libevent_malloc: new ptr-libevent@0x7fb35001d920 size 128 | #419 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49677.339344 | resume sending helper answer for #419 suppresed complete_v2_state_transition() and stole MD | #419 spent 0.362 milliseconds in resume sending helper answer | stop processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb344035930 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 13 42 1a 05 2a a9 f4 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #419 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #419 | rejected packet: | 13 42 1a 05 2a a9 f4 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a7 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #419: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a50110 | handling event EVENT_RETRANSMIT for parent state #360 | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #360 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #360 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49677.351538; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005054 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #360 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 "road-eastnet-nonat-108" #360: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #360) | e8 ba f7 ac 97 7a d7 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 a7 6a 2f 0e 47 4f c5 a2 87 88 1c 76 27 25 53 | 18 cf 29 be de 65 a5 ec fa 8e ba d5 95 70 46 1a | 5e 82 ee 5e ea 78 6c 5e e1 5a ba c3 42 fa 62 85 | 96 61 49 94 e4 26 35 02 12 7e c3 49 17 01 2e ad | da 08 aa 31 5d 07 3f 11 e2 3e a1 55 1e 97 51 1d | 21 13 8f d7 77 02 f2 6a 5f 3a a3 ad 67 d3 b3 fe | 4d bc 3d 87 97 56 a8 ed 5e 65 2d 59 2c 08 c6 f6 | e3 33 48 1e c9 5b 10 68 f5 80 0a de 74 5b 48 d5 | 12 63 cb 81 c8 06 b2 4b 2a 11 1e ef 99 9b bd 96 | 3d 2d 68 30 3c a5 df b7 7c b9 96 9a 90 b4 80 82 | 7f 32 39 5b 15 a6 11 ef 5c ad af 36 92 59 32 87 | 1f b6 1c c4 37 ef 0e 8f d4 cd 1f 34 87 b5 54 45 | 4f b4 69 d7 3d 68 0c fa bd 14 4f 0f ca d9 05 b6 | 6c 12 d4 47 46 2e 28 86 0e 8a 52 14 fe d2 d6 83 | e9 62 c7 35 25 a1 d0 50 cc af ac b0 fd 2d 90 37 | 95 46 1a 19 98 e1 af 75 ba a4 1b aa b9 40 54 be | 29 00 00 24 1b 6f 95 ad 44 06 60 87 4d 33 ad b6 | 0a 54 4e 5c c3 38 27 ff 28 86 c4 a8 14 ff fc 45 | 4c 10 47 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 71 5e 67 a4 d4 de c3 91 7e 75 5e | 86 6a 2f 03 c9 58 fc 3e 00 00 00 1c 00 00 40 05 | 42 65 a4 4c 2a f8 3a 2c 53 a5 43 50 55 9d ce 16 | 71 5f ac c0 | libevent_free: release ptr-libevent@0x7fb37404b5c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a50110 | #360 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 ba f7 ac 97 7a d7 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #360 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #360 | rejected packet: | e8 ba f7 ac 97 7a d7 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #360: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c017ea0 | handling event EVENT_RETRANSMIT for parent state #389 | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #389 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #389 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49677.354869; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003064 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a50110 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #389 | libevent_malloc: new ptr-libevent@0x7fb37404b5c0 size 128 "road-eastnet-nonat-137" #389: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #389) | 85 39 d1 4d 8b 00 62 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 35 45 30 eb 5a 4e 31 22 74 c6 b3 a4 12 3f 11 | d4 ed 4e ed d9 b9 2a b5 45 b7 bf 2f c4 12 8d f6 | b6 45 8b e7 42 00 82 88 9b 5f 9d ac d3 62 85 20 | 80 d9 92 f9 48 6c 61 18 10 02 b3 60 4a 67 bc f5 | 7f f3 06 fd dd d9 85 7b 8a 61 74 3e b0 54 86 48 | be 68 e1 1d 71 86 b6 10 0b 53 c9 4b c6 1d e3 32 | 0e 9d a0 c1 c2 ea 3f 8d 85 11 04 6b 8c a8 06 e2 | 8a a8 28 44 e2 f4 2d 9b 79 2e 3b 95 17 25 de 38 | b1 b1 27 54 d1 ca 51 cb 05 e4 51 d4 10 05 5a 73 | f7 6e 3f 1e 04 83 05 45 32 c8 e5 83 91 5b d4 46 | cb 00 53 49 8b aa e2 4a 03 fb ec 92 bd 9a d8 ef | c2 f7 13 0e ac 87 cd a2 d6 11 8a 4d b3 76 15 63 | 7e 5d ad ad 19 54 b0 8b cf 33 56 db af c2 f6 2f | 46 e8 3c 3e 30 75 95 b6 ad 6b 4c bd b8 1c f7 d8 | 42 48 45 24 c4 28 be c8 24 78 21 7b 8c a1 5f d5 | 3c 68 c6 b7 92 f7 dd 99 0c 2e 4d 49 3c 4e 34 53 | 29 00 00 24 d4 02 58 a1 15 41 bf 82 7e 15 0d c9 | ca 5c 1f 96 c8 8b 6c 22 75 5c 08 57 5f 06 6b 32 | fe f8 a7 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 ad 3c 1a 7d 4c cc 56 a6 70 0e c9 | dd 4d 28 a6 f3 20 1b cb 00 00 00 1c 00 00 40 05 | e7 a3 be 04 a3 45 3b 11 1b f8 e3 89 48 23 a2 23 | c1 e1 2a f8 | libevent_free: release ptr-libevent@0x7fb35c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | #389 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 39 d1 4d 8b 00 62 4d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #389 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #389 | rejected packet: | 85 39 d1 4d 8b 00 62 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #389: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0402 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350040840 | handling event EVENT_RETRANSMIT for parent state #404 | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #404 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #404 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49677.37615; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001786 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #404 | libevent_malloc: new ptr-libevent@0x7fb35c04b7c0 size 128 "road-eastnet-nonat-152" #404: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #404) | 4a 5a cc 55 a0 5d f2 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 5c 51 83 ab 6b 01 fa 80 7d 29 db 27 cd 7b c6 | 7f 04 2f 6a 27 69 df b1 41 5e bf ae 45 95 c1 0c | 60 62 91 a3 34 a3 09 ec 77 e7 89 a6 51 09 95 12 | 3b ff b9 99 25 19 b1 ca db 05 e4 39 d2 de d6 52 | 26 ca b9 02 d7 13 18 29 d4 9e 9a 68 e5 5b 44 39 | 54 a0 05 f4 ba 65 c0 95 36 73 37 bc a2 90 45 30 | d7 96 35 a2 19 0f c4 75 70 1c 7f 35 ab a5 29 b5 | 6b 5d 34 07 1e e2 3e 41 ca 0a 85 69 25 b8 27 58 | d4 99 f8 5e 96 15 ec 82 ac 10 04 76 9b 35 64 a2 | 61 5a aa b1 99 cc 29 04 86 b5 f4 cc 47 04 55 8f | c7 28 c5 78 33 30 c8 76 93 6d f5 e2 6a c6 30 01 | 28 59 c4 cc 64 9b 7d 8e 92 4e ac 31 52 df 0e bd | 0a 9d da 2a 1d 60 fa 21 2a 50 98 51 8a 76 ec c4 | d0 d7 c3 bf 4d 91 f8 7a 88 5f bc 07 e6 69 d7 f2 | ab ab b7 dd 41 cf 13 b8 5a 48 6f f6 ea 70 5c d9 | fb 24 71 46 69 e2 7c a6 fa 4a f9 ae 35 11 e2 42 | 29 00 00 24 fe 30 87 af f4 c1 ee 21 b0 88 ac a0 | 02 58 85 f4 de 21 52 28 4c d8 94 b1 9c 53 a3 c4 | 4e 96 a9 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 64 19 b7 d1 4f 25 21 1b 78 33 8e | a2 b3 19 f4 56 5e 34 fd 00 00 00 1c 00 00 40 05 | ec 45 06 4d 08 52 67 71 ea 88 ce 05 15 99 3d c7 | 85 58 3c 64 | libevent_free: release ptr-libevent@0x7fb35001fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350040840 | #404 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 5a cc 55 a0 5d f2 1b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #404 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #404 | rejected packet: | 4a 5a cc 55 a0 5d f2 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #404: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aef6c0 | handling event EVENT_RETRANSMIT for parent state #412 | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #412 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #412 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49677.379451; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500637 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350040840 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #412 | libevent_malloc: new ptr-libevent@0x7fb35001fd50 size 128 "road-eastnet-nonat-160" #412: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #412) | af 34 f0 93 1d 1b d6 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 73 ca 82 d1 b8 25 7f 04 b5 f2 f7 30 87 a9 41 | a5 4a c9 0d a4 7b 88 6a 9c a7 a5 05 c4 99 82 97 | fe 18 55 31 1a 69 24 11 ef 96 2b 9b 00 09 64 93 | f5 9b 6f 9f 26 02 b8 02 eb ec d6 b9 58 77 37 c4 | 15 13 55 d4 ba a0 8c 70 db 9d 5d b8 50 b2 fb 14 | 70 91 27 3f 52 b9 21 d5 ac 35 9f 2f 74 c2 cd a3 | f5 0a 60 3b 9e 8f df b1 5a c8 44 f1 32 14 8d c9 | 96 70 54 8d 6a b3 1d 9e 55 f7 54 39 be 48 72 05 | 31 be c1 bc a2 b1 92 d9 d7 2b ac 35 4b a3 d1 85 | c8 13 0e 09 13 01 9b 53 39 df da 51 e3 f0 0f b0 | b8 cb 35 90 8d 85 96 9f 9a 47 73 3d e9 c6 9a 9b | 64 e5 27 2a 0d 1b 39 d0 c9 ca 54 89 58 ae ef 63 | 30 57 d5 95 13 d6 7b 07 db 4c 1f 26 15 fc 42 93 | 98 20 27 df a5 2d d6 c3 03 e8 40 00 9e a8 d6 5b | d9 5c 3b 12 b9 90 e7 25 5f 47 7e 86 19 c6 bc 15 | 0b 47 49 10 46 90 3e a8 79 f3 d0 fc 23 1f c9 d1 | 29 00 00 24 a3 90 3f ea a1 9a ff 04 92 34 17 b8 | 6f ef 29 47 17 37 0c c0 67 c5 c5 dd ee 94 92 f1 | d0 ea b7 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 8b 79 f3 42 b6 33 1b 9b 02 cf 5d | 36 ad 4c 1f 32 b9 37 c2 00 00 00 1c 00 00 40 05 | a6 ab fb 7e 68 25 b5 32 b3 ef df 3a 19 eb c4 3f | d0 c1 29 ec | libevent_free: release ptr-libevent@0x7fb38402d380 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aef6c0 | #412 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 34 f0 93 1d 1b d6 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #412 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #412 | rejected packet: | af 34 f0 93 1d 1b d6 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #412: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25cc0 | handling event EVENT_RETRANSMIT for parent state #168 | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #168 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #168 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49677.411837; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.014846 exceeds limit? YES "road-eastnet-nonat-168" #168: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-168" #168: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #420 at 0x557d46ab8580 | State DB: adding IKEv2 state #420 in UNDEFINED | pstats #420 ikev2.ike started | Message ID: init #420: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #420: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #420; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-168" #420: initiating v2 parent SA to replace #168 | using existing local IKE proposals for connection road-eastnet-nonat-168 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 420 for state #420 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aef6c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #420 | libevent_malloc: new ptr-libevent@0x7fb38402d380 size 128 | #420 spent 0.0724 milliseconds in ikev2_parent_outI1() | RESET processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #168 ikev2.ike failed too-many-retransmits | pstats #168 ikev2.ike deleted too-many-retransmits | #168 spent 2.47 milliseconds in total | [RE]START processing: state #168 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-168" #168: deleting state (STATE_PARENT_I1) aged 64.016s and NOT sending notification | parent state #168: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #168 "road-eastnet-nonat-168" #168: deleting IKE SA for connection 'road-eastnet-nonat-168' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-168' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-168 | State DB: deleting IKEv2 state #168 in PARENT_I1 | crypto helper 3 resuming | crypto helper 3 starting work-order 420 for state #420 | parent state #168: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 420 | stop processing: state #168 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb37004b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25cc0 | in statetime_stop() and could not find #168 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-168 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-168" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-168' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-168" | stop processing: connection "road-eastnet-nonat-168" (in initiate_a_connection() at initiate.c:349) | spent 0.0625 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 420 time elapsed 0.000546 seconds | (#420) spent 0.546 milliseconds in crypto helper computing work-order 420: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 420 for state #420 to event queue | scheduling resume sending helper answer for #420 | libevent_malloc: new ptr-libevent@0x7fb338029760 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #420 | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 420 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #420 | **emit ISAKMP Message: | initiator cookie: | 38 01 94 6e be 3a 28 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-168 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0c e6 6f 10 c2 18 44 e2 34 88 94 b1 6e ad 96 2f | ikev2 g^x 7e f2 2f d5 05 74 10 9d b0 ed 16 ba d1 bb 6a 81 | ikev2 g^x 3b 36 bb 33 64 6a 4b 49 98 6b 61 6b 38 a7 f0 f9 | ikev2 g^x 85 f1 ea 1f 82 7f 75 2e b8 87 48 fb ca 42 ad 54 | ikev2 g^x 59 d3 d4 98 fc e3 db 9e 06 1c 4d 0a 68 e2 82 b1 | ikev2 g^x b4 79 61 9d ef 49 6d 74 7e f5 a5 55 9d ac 1f 86 | ikev2 g^x bc 38 61 c3 ec 65 14 03 d9 05 f4 3a a0 cf b9 81 | ikev2 g^x ea f9 8e 26 2a 33 57 de f0 0c 7b 3a 31 62 59 7d | ikev2 g^x 0a 51 80 e9 b3 45 96 f0 0f c4 ba 78 af bf d6 5a | ikev2 g^x 60 67 ef 7e 3d 35 d6 cc 9c c8 4a 58 b2 0f d6 d7 | ikev2 g^x a4 37 58 a2 99 5b 23 f1 45 8d 6c d3 30 bc 9f 64 | ikev2 g^x 97 c5 ef 20 d5 b9 a3 78 d6 da 52 f2 da 0c 22 0a | ikev2 g^x a7 af 15 bc c7 88 8c 82 a8 a3 ee 2f 8a ad 53 b2 | ikev2 g^x a0 1b 8a 3b ba 0a 34 48 34 2f ad da 72 63 db 61 | ikev2 g^x 9e b4 c4 95 69 50 db f5 62 4c 82 15 0a a2 7d 3d | ikev2 g^x 5b 37 5a 63 75 a1 9d 88 2f 4d 72 7d 91 14 f6 58 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a2 fc 3c 40 ce 99 e3 62 f3 97 ac 0a d5 d9 6a e9 | IKEv2 nonce cb 20 69 0b 55 a4 ef ef 10 02 28 ef bc 3f 93 32 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 38 01 94 6e be 3a 28 c7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a8 | natd_hash: port= 01 f4 | natd_hash: hash= f5 0a f7 67 8f e9 41 30 08 68 43 0c 01 13 f9 c1 | natd_hash: hash= 61 fa 63 aa | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f5 0a f7 67 8f e9 41 30 08 68 43 0c 01 13 f9 c1 | Notify data 61 fa 63 aa | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 38 01 94 6e be 3a 28 c7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ef 1c 5b ca 2a 2f ea 7b fb 12 61 31 e7 f2 9d c7 | natd_hash: hash= 67 58 3e 74 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ef 1c 5b ca 2a 2f ea 7b fb 12 61 31 e7 f2 9d c7 | Notify data 67 58 3e 74 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #420 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #420: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #420 to 4294967295 after switching state | Message ID: IKE #420 skipping update_recv as MD is fake | Message ID: sent #420 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-168" #420: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.168:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #420) | 38 01 94 6e be 3a 28 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c e6 6f 10 c2 18 44 e2 34 88 94 b1 6e ad 96 2f | 7e f2 2f d5 05 74 10 9d b0 ed 16 ba d1 bb 6a 81 | 3b 36 bb 33 64 6a 4b 49 98 6b 61 6b 38 a7 f0 f9 | 85 f1 ea 1f 82 7f 75 2e b8 87 48 fb ca 42 ad 54 | 59 d3 d4 98 fc e3 db 9e 06 1c 4d 0a 68 e2 82 b1 | b4 79 61 9d ef 49 6d 74 7e f5 a5 55 9d ac 1f 86 | bc 38 61 c3 ec 65 14 03 d9 05 f4 3a a0 cf b9 81 | ea f9 8e 26 2a 33 57 de f0 0c 7b 3a 31 62 59 7d | 0a 51 80 e9 b3 45 96 f0 0f c4 ba 78 af bf d6 5a | 60 67 ef 7e 3d 35 d6 cc 9c c8 4a 58 b2 0f d6 d7 | a4 37 58 a2 99 5b 23 f1 45 8d 6c d3 30 bc 9f 64 | 97 c5 ef 20 d5 b9 a3 78 d6 da 52 f2 da 0c 22 0a | a7 af 15 bc c7 88 8c 82 a8 a3 ee 2f 8a ad 53 b2 | a0 1b 8a 3b ba 0a 34 48 34 2f ad da 72 63 db 61 | 9e b4 c4 95 69 50 db f5 62 4c 82 15 0a a2 7d 3d | 5b 37 5a 63 75 a1 9d 88 2f 4d 72 7d 91 14 f6 58 | 29 00 00 24 a2 fc 3c 40 ce 99 e3 62 f3 97 ac 0a | d5 d9 6a e9 cb 20 69 0b 55 a4 ef ef 10 02 28 ef | bc 3f 93 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 0a f7 67 8f e9 41 30 08 68 43 0c | 01 13 f9 c1 61 fa 63 aa 00 00 00 1c 00 00 40 05 | ef 1c 5b ca 2a 2f ea 7b fb 12 61 31 e7 f2 9d c7 | 67 58 3e 74 | state #420 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38402d380 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aef6c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aef6c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #420 | libevent_malloc: new ptr-libevent@0x7fb37004b7c0 size 128 | #420 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49677.412924 | resume sending helper answer for #420 suppresed complete_v2_state_transition() and stole MD | #420 spent 0.328 milliseconds in resume sending helper answer | stop processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb338029760 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 01 94 6e be 3a 28 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #420 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #420 | rejected packet: | 38 01 94 6e be 3a 28 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a8 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #420: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0476 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #361 | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #361 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #361 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49677.421121; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006462 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338017ea0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #361 | libevent_malloc: new ptr-libevent@0x7fb35403b0b0 size 128 "road-eastnet-nonat-109" #361: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #361) | 9c f5 2d c8 50 35 55 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe f7 f3 f1 6a 76 6a 9a e6 0e 10 b4 e5 b5 16 07 | 0f 90 8a f4 dc 9f 27 b0 2a 41 17 f0 21 60 87 50 | 11 a6 84 2e 86 94 e1 65 4d 1a 59 ce 11 45 d2 c5 | 09 df ce 0a 2c f9 3e 7e cb 59 88 eb 93 1a 26 06 | 39 22 a5 57 b6 f2 5b 4c fe 56 6a 26 49 df e6 84 | b9 e4 e4 41 19 a0 e8 70 69 c2 51 79 76 2e 80 40 | 6f 9e 4b a9 87 c2 02 65 d3 3e 05 60 b6 af 86 d7 | 52 3c 7a 52 e9 69 b8 2a e6 43 99 6c 72 d9 7c 1a | 8d c9 5b fb a3 c2 fc 51 d5 fc c8 85 ff 46 8f 64 | e3 d3 a7 99 28 b1 43 6d 9b 9d 50 e1 af 1a d6 ff | 7e fd 10 23 a2 a6 f9 9b d2 06 fa 0f 91 01 67 9f | 42 43 ac e6 4f ae 3e 00 59 5d 7a cf b3 59 12 67 | 0d c1 86 cf 82 5d 20 9e 98 97 ec b2 7e be 63 74 | b3 15 a1 c0 63 a7 5d 61 bb b3 2f 2d 42 15 59 57 | 72 ca 0b d8 9e d0 1b 84 91 fd db 5e 8f 2f 62 ed | 99 8c a3 a5 ec ef 08 26 6f ab 64 68 6b 97 9d 3e | 29 00 00 24 5d 7a 1f c2 56 77 bf 60 f2 37 f5 ed | 4d 94 c3 a6 58 e2 5f 6e 1b f6 b4 76 e5 69 0c 98 | 27 55 cd c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 71 91 34 7a e2 ba d5 01 f3 c5 56 | ba 5f 83 71 00 17 86 15 00 00 00 1c 00 00 40 05 | e0 46 0d f9 99 b9 47 b4 35 a0 04 20 4b 9b 45 ee | 1c f7 92 53 | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #361 spent 0.0912 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388043350 | handling event EVENT_RETRANSMIT for parent state #308 | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #308 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #308 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49677.421231; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005504 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #308 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 "road-eastnet-nonat-56" #308: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #308) | 80 0a 88 98 4b f9 e7 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 60 f0 11 1d 6f 3c e8 3a d0 c5 a1 1f 8b f6 d6 | b8 1e e6 d3 27 fa 35 0f 2e 35 7c 6a ac 4d b0 5a | 6b 0b 3b 4a 46 9a c1 e4 d2 3d 95 4c 54 c7 f8 b0 | a3 25 b2 e5 19 52 cf a8 80 64 9a 61 44 3f 5d 89 | b3 ab 84 f7 4d 8d 5e c3 d5 83 26 99 08 7b 56 8e | d5 6a c7 4a 76 f4 45 38 3c fa 31 64 fb a7 68 c6 | c9 63 22 21 ab 35 5e 58 62 e8 99 25 ff 5b 61 ec | 55 a2 5b 36 cc 02 da 3b ef 08 f7 a5 b1 e6 33 04 | 63 ee 2e 9b fc 5a 62 eb 0d 0f da ab 7c b3 2f f6 | 1d 06 62 78 d0 f2 08 dd bd 5a f1 dc aa 18 b1 3b | 54 75 36 28 b8 4d f2 e6 89 e0 6c 9d a4 f4 71 27 | 99 51 48 e8 63 85 2b 41 07 00 9f 7b ff df b2 6f | 90 1f ac 1e 28 94 ef cf 9a 1c cf 53 7f 88 76 ba | 31 4b 32 29 7d 41 fd ba 51 dd cc 44 b9 6c 4f e1 | cf 89 c3 39 c3 eb 26 5a 05 e3 ac c1 a6 d7 ca ae | 7d 27 a2 0d 12 e5 de 71 e2 d1 95 9c b5 ec 14 d8 | 29 00 00 24 d3 c9 38 16 a4 35 41 62 ad 53 1d 3f | a5 70 61 f3 55 11 e2 06 85 67 55 51 bd 50 94 8d | 80 2d 38 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 1c df ea ba 44 23 ff a6 53 af 56 | 8c 58 68 ea 71 49 69 6d 00 00 00 1c 00 00 40 05 | 14 0c bd d4 4b a2 ff 28 87 d9 dd 83 a7 c2 2b 61 | 5c 8c 59 cd | libevent_free: release ptr-libevent@0x7fb388020cc0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388043350 | #308 spent 0.0677 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9c f5 2d c8 50 35 55 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #361 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #361 | rejected packet: | 9c f5 2d c8 50 35 55 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #361: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 0a 88 98 4b f9 e7 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #308 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #308 | rejected packet: | 80 0a 88 98 4b f9 e7 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #308: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0359 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23110 | handling event EVENT_RETRANSMIT for parent state #390 | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #390 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #390 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49677.425509; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002555 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388043350 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #390 | libevent_malloc: new ptr-libevent@0x7fb388020cc0 size 128 "road-eastnet-nonat-138" #390: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #390) | f0 59 d0 2d 97 92 84 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 a6 bc 87 d6 62 82 0f 67 22 b6 ee c6 47 37 24 | 35 77 67 9d 2b 69 4d 68 d9 17 5e 4e 5b 7c e7 e0 | de 0c 00 17 eb 73 f2 8c 21 62 77 5f ed 93 76 62 | 82 34 a8 dc e3 cb c2 5a 08 71 13 11 3d 4b e6 d1 | 76 57 25 8b a6 9b ab 1b 86 9a b2 3c b4 c5 09 27 | 07 3a 9a 1f b3 ba dc 74 b5 99 e0 70 c7 35 07 15 | 6b eb 79 13 3f 27 25 55 75 85 60 5d d2 d0 ba 32 | 68 73 83 f4 c5 0a 96 0e 4b e5 39 e5 86 02 a4 93 | e2 f4 48 ef 0c f4 c4 74 9a 13 7f eb 1a f7 58 25 | 7f f1 9e dc 6a 9c 5a 01 55 d6 94 fe 2a 9d 15 54 | c4 c7 a9 92 32 84 b6 cb 67 d0 cf 4d c5 e2 bc df | 9f d8 4e db 8f 96 2f 1e c9 d0 ec 6a 9b 77 d4 57 | 6b cf 06 d5 ae fb ea 29 a5 1f 59 cf 78 34 af ff | a5 76 3d 89 27 c1 f8 1c 6e a5 66 a5 63 8a 2d 2f | b3 a7 de f9 71 62 f3 67 56 6c 03 83 1d be 14 17 | 8c 04 f3 ba 5f 3e 7d cb 76 74 94 e2 c9 0a 5a 07 | 29 00 00 24 9a 7c 0d 04 38 99 0e 36 73 a3 ab df | 41 d9 56 ed 47 3b 6b 02 19 aa 87 30 cc 21 65 76 | f4 51 64 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 0a c1 09 04 69 58 cc 7d de 65 69 | 68 f6 ba 86 4e 7f 6a 28 00 00 00 1c 00 00 40 05 | 52 91 09 9c ff 5e 67 81 8a 7d bb c1 ce e0 37 4c | d9 14 ec 51 | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23110 | #390 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f0 59 d0 2d 97 92 84 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #390 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #390 | rejected packet: | f0 59 d0 2d 97 92 84 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #390: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3680129a0 | handling event EVENT_RETRANSMIT for parent state #405 | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #405 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #405 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49677.43179; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001874 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23110 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #405 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 "road-eastnet-nonat-153" #405: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #405) | be e8 17 81 54 19 aa 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 35 ee 04 e9 c6 8a 5e c2 8c d0 2d 28 00 02 85 | 8c 37 b4 2a 7d 22 9b 7b d7 a1 23 7d 82 8f c4 6b | 57 c4 dd c3 ee aa c0 59 55 41 ec 07 5b d2 96 3f | 84 76 05 f0 b5 2a e8 98 98 d7 99 f0 e6 85 ba e9 | 7a 9d b6 d3 d8 1c ba 13 51 c2 52 69 b1 b0 51 2d | 27 ff ad 85 cb c3 37 19 4d 04 8f 00 5d 8e da a2 | 83 bf af 69 a5 88 8d 6e 4b fc d9 97 99 c9 fb 45 | db d1 9d 19 a0 0a d0 5c 01 fa a2 fa ec 3d 5c 71 | 97 18 03 d4 ac c9 d5 4f 44 b7 51 11 eb 34 8d f4 | ae 35 d6 d0 d3 d3 55 70 23 2c b8 b9 0d e9 30 e3 | 09 45 cd 57 53 d7 0b 66 63 c7 ad 04 26 12 af a0 | 90 e5 43 30 55 a3 78 25 bd ac a0 c8 d8 1b 48 03 | 7d 5e a7 cb e9 7e 28 c2 c1 55 c3 c2 88 18 bb 71 | ea 43 2f 82 f5 b1 df d2 66 a9 f6 d5 fa 01 de ee | e8 cd 12 32 f5 db da 44 b1 63 d9 46 0a 50 55 e5 | e4 13 08 92 13 df ad 90 0b 31 de af 43 48 dc 7b | 29 00 00 24 ad 05 d9 2e f2 d6 c0 cb b5 b3 6e e0 | 64 6e 66 e1 31 b9 1b 6d 0b a1 0e d8 22 30 ee ae | e8 8f 1f eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 93 4e 39 e4 10 9f 0f a5 0f ed 76 | 86 5f 9d 57 55 de 19 a7 00 00 00 1c 00 00 40 05 | eb f0 2f 13 5d 22 43 08 07 64 33 45 d0 5d dc 6e | 5b 6e e5 c1 | libevent_free: release ptr-libevent@0x7fb36801fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3680129a0 | #405 spent 0.177 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be e8 17 81 54 19 aa 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #405 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #405 | rejected packet: | be e8 17 81 54 19 aa 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #405: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0708 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a89700 | handling event EVENT_RETRANSMIT for parent state #413 | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #413 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #413 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49677.447167; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501085 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3680129a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #413 | libevent_malloc: new ptr-libevent@0x7fb36801fd50 size 128 "road-eastnet-nonat-161" #413: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #413) | ea 46 85 e7 fd 9b ca c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a d6 4a 46 94 c5 0e 81 7d ce e7 15 1a 5a 21 6b | d0 32 15 1d df aa 19 22 73 4c 48 c7 c9 6d a8 93 | 29 7e ec 61 b6 83 c3 69 04 a5 60 f9 c5 35 27 f9 | 44 bf c3 99 38 07 63 d7 db de ef 2b 00 c6 3d 6f | 1e 8f 0f f0 f2 98 90 49 cc c1 d2 86 82 6d 83 07 | b6 cd 6e db a4 2f 05 29 fa 3e e9 09 c5 23 64 57 | 0f 6b 66 2d b4 b3 b3 d2 ea e7 1c 7e 8b 59 ce a2 | 2a db b2 33 4a cb 53 6b e5 06 8d cf 28 1c 31 94 | 7e 79 27 07 12 0f ee 03 55 92 90 46 1e 9e 32 06 | e3 69 6e 6a 21 a6 b6 3d c6 89 df ef c7 fa b0 eb | ab 8c ae 81 fa 71 38 65 08 c6 41 65 64 a9 83 b0 | bc c3 01 a6 3a 68 d2 5d bb 35 97 d0 1e e7 f8 04 | 04 04 f6 ff 5e f9 22 b6 f2 9f 86 d9 b4 ae ee 49 | fd 07 2d 26 52 e7 63 86 cc 1a 6e 7f 04 ad 81 4a | a3 d7 7a 6d 6e 53 1b 65 52 8d 28 da bd 54 d5 04 | 1e 3e 9f 74 3c 77 dc 33 e5 c5 fe 6f df d3 a7 16 | 29 00 00 24 85 87 06 d7 9a bf 7b 07 3a ec 94 d1 | cf f4 5c 33 c2 8f dc 32 29 58 27 3f e4 e5 19 81 | 63 f8 b3 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 20 9c 8e 3c 13 0c 4e a0 e8 24 76 | 9d 56 e7 f6 81 08 36 aa 00 00 00 1c 00 00 40 05 | 3c 55 11 1a b1 a6 35 ac 5d bf b2 4d 0c c0 40 68 | 37 73 05 e6 | libevent_free: release ptr-libevent@0x7fb368023a60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a89700 | #413 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 46 85 e7 fd 9b ca c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #413 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #413 | rejected packet: | ea 46 85 e7 fd 9b ca c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #413: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0686 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a647d0 | handling event EVENT_RETRANSMIT for parent state #169 | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #169 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #169 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49677.482549; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.004828 exceeds limit? YES "road-eastnet-nonat-169" #169: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-169" #169: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #421 at 0x557d46ab9b40 | State DB: adding IKEv2 state #421 in UNDEFINED | pstats #421 ikev2.ike started | Message ID: init #421: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #421: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #421; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-169" #421: initiating v2 parent SA to replace #169 | using existing local IKE proposals for connection road-eastnet-nonat-169 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 421 for state #421 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a89700 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #421 | libevent_malloc: new ptr-libevent@0x7fb368023a60 size 128 | #421 spent 0.0711 milliseconds in ikev2_parent_outI1() | RESET processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #169 ikev2.ike failed too-many-retransmits | pstats #169 ikev2.ike deleted too-many-retransmits | #169 spent 2.49 milliseconds in total | crypto helper 1 resuming | crypto helper 1 starting work-order 421 for state #421 | [RE]START processing: state #169 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-169" #169: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #169: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 421 | picked newest_isakmp_sa #0 for #169 "road-eastnet-nonat-169" #169: deleting IKE SA for connection 'road-eastnet-nonat-169' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-169' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-169 | State DB: deleting IKEv2 state #169 in PARENT_I1 | parent state #169: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #169 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 421 time elapsed 0.000733 seconds | libevent_free: release ptr-libevent@0x7fb388015370 | (#421) spent 0.742 milliseconds in crypto helper computing work-order 421: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 421 for state #421 to event queue | scheduling resume sending helper answer for #421 | libevent_malloc: new ptr-libevent@0x7fb38802c0a0 size 128 | crypto helper 1 waiting (nothing to do) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a647d0 | in statetime_stop() and could not find #169 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-169 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-169" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-169' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-169" | stop processing: connection "road-eastnet-nonat-169" (in initiate_a_connection() at initiate.c:349) | spent 0.0819 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #421 | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 421 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #421 | **emit ISAKMP Message: | initiator cookie: | 53 46 78 d0 f9 b4 2b ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-169 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0a 1e 13 6f 9e 9e 28 7d 48 cb 8f 21 ad 12 23 0d | ikev2 g^x 2e 17 4b ec 60 47 24 f9 49 65 0f b8 05 f3 b2 c5 | ikev2 g^x 35 0c dd 44 2a 04 47 c6 96 e8 e3 9d da 44 54 8d | ikev2 g^x d0 16 cf 7d 24 e8 e0 cd a8 2c 8e 39 d3 b2 8b 7f | ikev2 g^x 72 0a 52 da e9 14 4a cc 17 a9 78 b8 cd 5e be 1d | ikev2 g^x b9 b5 cd 7b b6 5f 02 22 ea c4 0a a6 8f a3 01 6c | ikev2 g^x 5b 53 24 36 89 d6 72 ef 99 b2 12 aa fb cb aa db | ikev2 g^x b2 d1 08 23 c1 6a e2 dd cd 0b 52 1b 08 f4 07 44 | ikev2 g^x f6 bb f7 14 71 89 1d 05 a9 2e 9d 11 f6 47 e7 7b | ikev2 g^x 5c 89 c0 6a 79 44 41 55 07 e9 d4 c5 65 08 95 21 | ikev2 g^x 02 27 ea de 7e 8f c1 e5 b3 56 d5 44 30 34 c9 29 | ikev2 g^x 25 c6 6c f5 76 8d bd 58 fa 4e 08 93 a9 a8 12 bd | ikev2 g^x 8c 61 44 c0 18 3b 6c f3 4a 89 60 c3 7a 98 37 61 | ikev2 g^x d4 a6 d5 c6 6d e0 61 22 11 f5 b2 91 df 3b aa 2c | ikev2 g^x 62 52 60 02 03 f1 56 8c f6 e3 d9 1e 59 30 5a b8 | ikev2 g^x cf c5 38 a8 40 43 1f 7b 8b 5b 7c d9 77 f7 d9 ba | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 41 49 08 f2 3f 7f 22 d1 7a a9 25 e2 15 a5 3d 37 | IKEv2 nonce 9b e8 6b f7 56 6b 10 73 05 1d f4 b0 b9 8c f9 c2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 53 46 78 d0 f9 b4 2b ea | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a9 | natd_hash: port= 01 f4 | natd_hash: hash= 41 d0 78 7d 22 f6 6d e2 e5 b7 d3 9b 09 f6 2a 83 | natd_hash: hash= 8c 96 39 01 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 41 d0 78 7d 22 f6 6d e2 e5 b7 d3 9b 09 f6 2a 83 | Notify data 8c 96 39 01 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 53 46 78 d0 f9 b4 2b ea | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 72 19 84 dc d4 59 5b 35 51 4f b6 9f 34 c6 2f ea | natd_hash: hash= b9 aa 04 8a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 72 19 84 dc d4 59 5b 35 51 4f b6 9f 34 c6 2f ea | Notify data b9 aa 04 8a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #421 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #421: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #421 to 4294967295 after switching state | Message ID: IKE #421 skipping update_recv as MD is fake | Message ID: sent #421 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-169" #421: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.169:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #421) | 53 46 78 d0 f9 b4 2b ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 1e 13 6f 9e 9e 28 7d 48 cb 8f 21 ad 12 23 0d | 2e 17 4b ec 60 47 24 f9 49 65 0f b8 05 f3 b2 c5 | 35 0c dd 44 2a 04 47 c6 96 e8 e3 9d da 44 54 8d | d0 16 cf 7d 24 e8 e0 cd a8 2c 8e 39 d3 b2 8b 7f | 72 0a 52 da e9 14 4a cc 17 a9 78 b8 cd 5e be 1d | b9 b5 cd 7b b6 5f 02 22 ea c4 0a a6 8f a3 01 6c | 5b 53 24 36 89 d6 72 ef 99 b2 12 aa fb cb aa db | b2 d1 08 23 c1 6a e2 dd cd 0b 52 1b 08 f4 07 44 | f6 bb f7 14 71 89 1d 05 a9 2e 9d 11 f6 47 e7 7b | 5c 89 c0 6a 79 44 41 55 07 e9 d4 c5 65 08 95 21 | 02 27 ea de 7e 8f c1 e5 b3 56 d5 44 30 34 c9 29 | 25 c6 6c f5 76 8d bd 58 fa 4e 08 93 a9 a8 12 bd | 8c 61 44 c0 18 3b 6c f3 4a 89 60 c3 7a 98 37 61 | d4 a6 d5 c6 6d e0 61 22 11 f5 b2 91 df 3b aa 2c | 62 52 60 02 03 f1 56 8c f6 e3 d9 1e 59 30 5a b8 | cf c5 38 a8 40 43 1f 7b 8b 5b 7c d9 77 f7 d9 ba | 29 00 00 24 41 49 08 f2 3f 7f 22 d1 7a a9 25 e2 | 15 a5 3d 37 9b e8 6b f7 56 6b 10 73 05 1d f4 b0 | b9 8c f9 c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 d0 78 7d 22 f6 6d e2 e5 b7 d3 9b | 09 f6 2a 83 8c 96 39 01 00 00 00 1c 00 00 40 05 | 72 19 84 dc d4 59 5b 35 51 4f b6 9f 34 c6 2f ea | b9 aa 04 8a | state #421 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb368023a60 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a89700 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a647d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #421 | libevent_malloc: new ptr-libevent@0x7fb368023a60 size 128 | #421 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49677.484236 | resume sending helper answer for #421 suppresed complete_v2_state_transition() and stole MD | #421 spent 0.593 milliseconds in resume sending helper answer | stop processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38802c0a0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 46 78 d0 f9 b4 2b ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #421 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #421 | rejected packet: | 53 46 78 d0 f9 b4 2b ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a9 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #421: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0829 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370018460 | handling event EVENT_RETRANSMIT for parent state #391 | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #391 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #391 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49677.493462; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002703 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25cc0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #391 | libevent_malloc: new ptr-libevent@0x7fb38802c0a0 size 128 "road-eastnet-nonat-139" #391: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #391) | 1e 4c 10 d0 5a dd 02 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 44 38 de 57 e6 42 14 4a 75 cb e8 86 f1 15 c7 | b3 6b a5 d0 a3 15 b5 a8 cf fe 21 90 de 4f ce 44 | 4b 9e a3 45 9f e5 e3 4a e1 61 50 92 d7 96 bd 78 | c9 7d fa 56 09 ee b1 46 53 20 fc ad 34 b3 1e e5 | 0c f4 f7 d3 65 bb 8f 18 cc a8 06 7f fc 7e 66 0f | 5a c0 66 08 19 5f fe 23 13 53 7d f1 cb 35 9c bf | b6 cc 27 b3 74 16 78 a5 d0 41 0b 66 96 4e d5 0b | a8 67 13 54 66 95 b9 f4 f4 50 eb 64 58 9c 23 eb | 8d 1e 98 9a 88 3b 5f 86 67 00 79 34 97 29 56 1a | b2 15 47 48 a5 9a 2b a5 34 cb 00 12 67 7f e0 d9 | 3a f8 09 e7 20 e1 52 74 01 fd f4 0c 96 53 a6 b7 | c6 61 c0 6c f5 79 6f b0 c7 2c 95 3d f0 6b 1d 3c | a1 9c 76 2c 42 98 e7 2f 92 d1 8e 08 bb da 6a 80 | de bb 58 dc 69 88 c5 71 37 d4 7b 84 79 2b bc 7c | 3c 5f 6e af 11 b3 52 0f 4a 94 17 dd 26 64 0a 25 | 66 61 88 60 23 0c 83 1b 44 d1 a9 f9 6e 89 2a f7 | 29 00 00 24 f4 e3 20 9c cf 9f 8b a0 c8 c9 bb b9 | ac d4 eb 98 02 de 0f c4 e7 00 7a df 68 e7 4c eb | e6 18 a5 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 3e 10 ca 19 aa 6a 76 c2 f6 15 22 | 58 d4 f7 90 3e 72 98 9d 00 00 00 1c 00 00 40 05 | 94 13 1b ea fd 35 6e 40 4c 88 7a 5c c1 e4 2f 2d | 6d 26 6f 2a | libevent_free: release ptr-libevent@0x7fb3400094d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370018460 | #391 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 4c 10 d0 5a dd 02 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #391 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #391 | rejected packet: | 1e 4c 10 d0 5a dd 02 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #391: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0687 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c018460 | handling event EVENT_RETRANSMIT for parent state #406 | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #406 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #406 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49677.505804; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002073 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #406 | libevent_malloc: new ptr-libevent@0x7fb3400094d0 size 128 "road-eastnet-nonat-154" #406: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #406) | 5c 1b 3d 38 ad ed bb 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 1a b6 af ea 21 97 b3 f5 89 b5 95 b7 8e 01 21 | 34 29 bd cd 92 66 af f7 07 14 1e f2 4b ac 69 77 | b3 25 64 1a 72 01 08 14 88 fb 34 a6 91 bd 4c e8 | 74 ed 64 90 06 cb ad 54 67 18 ec c2 f6 32 90 94 | 8a 60 b7 b6 26 ea 31 da ec 24 92 6a 22 25 e6 ae | 79 52 07 43 fe e8 78 1d 19 58 3a 0f 01 09 9b 79 | a8 83 55 03 d0 25 e3 a6 6b 4d b2 09 24 dc 38 c7 | c0 36 e4 53 c2 05 eb 85 aa 76 78 46 e9 fc ba 6a | 9d 2a 99 85 b8 e3 fb 99 44 cb 75 c0 ab ae 6e 11 | 07 c0 ca 22 19 62 ce d5 17 5c e1 b9 18 74 78 be | 34 a1 1c d9 92 69 84 5a 1b b1 7e 28 a9 f2 00 ef | e6 0f 63 2f 7a b6 8d 10 3d 27 b5 f9 29 ad b2 b0 | 65 7c 94 5e 21 5a 98 07 17 36 5b b2 b7 51 51 8d | 3d 77 c7 dd 9a b0 95 69 8a b2 64 fa 98 d0 67 3a | d0 c0 eb c5 e3 82 7f 6a 7e d1 db 5f 16 5a 12 aa | ee c9 5e 0d 7b ae 47 81 60 df bf f4 74 63 48 5d | 29 00 00 24 00 c8 88 3e 7a 51 ef 1c 0c 98 f2 86 | d5 82 58 ca a8 80 65 3f cb c6 86 a8 5f 67 eb c4 | af 88 eb 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c fb 6e 46 7d 68 85 83 cc d1 35 3b | 25 21 b7 36 bf 74 0f f9 00 00 00 1c 00 00 40 05 | ea 1c 8a 1b 9f c4 37 0b d8 b4 d1 29 da 67 72 c1 | 45 ae 67 d8 | libevent_free: release ptr-libevent@0x7fb3500251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c018460 | #406 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 1b 3d 38 ad ed bb 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #406 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #406 | rejected packet: | 5c 1b 3d 38 ad ed bb 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #406: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35400d120 | handling event EVENT_RETRANSMIT for parent state #414 | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #414 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #414 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49677.519131; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501181 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #414 | libevent_malloc: new ptr-libevent@0x7fb3500251c0 size 128 "road-eastnet-nonat-162" #414: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #414) | 9e d5 a6 6b e9 51 f5 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 17 ff 89 e8 3c 16 16 6a 13 a2 4a 6e d7 58 8c | 31 4a 5d a6 06 21 a0 a1 9e a4 d6 9f 9d d0 c9 ef | 81 a2 6a e5 e1 ce f7 5b 3f cb a3 39 af 4b 00 d3 | 8e ea 93 72 09 07 7e f7 07 70 f1 60 90 61 a3 52 | 45 df 81 dd 3b 9f 90 cc 5a ee 79 3a e6 e9 1c 8f | 3e 5d 20 51 b9 06 0a c7 eb 0e 7c 49 84 44 06 9a | 8a 7d 42 8a 3c 02 e8 20 6f 96 b9 43 e4 b6 78 25 | 2a 47 75 c2 a6 5e 09 93 6e 0a 52 61 7e 11 07 98 | e5 ed 70 aa 1a 26 50 15 8a 10 03 2b 04 12 5a 90 | df c8 9d 86 1f 6a 9b b1 b4 ef a4 64 93 b4 1c b9 | a7 2b 05 40 cd d6 1a ea f2 e2 7e 25 9c 0d 5f 1b | 71 7c a0 ab 46 0c fd 1d 5d c2 80 68 45 9c 03 04 | ba 22 16 f6 4e 43 40 2a 18 55 ee ba be b9 c7 28 | a3 19 30 1c 73 7f 70 9d 56 01 fc 31 bf 29 77 0b | f7 40 78 1c 68 3b 66 2d 2e 5b fb 5d 13 f6 84 1d | 63 eb 8e 4a f6 af 8f 02 43 3a 27 60 08 28 58 6a | 29 00 00 24 8a 22 da 4e 47 50 93 9e a6 73 51 af | 87 1e 05 a5 3e cb 07 7d 69 59 69 03 d3 ed 1d 7a | 33 b5 03 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba fb 8a fc 1d 3f b9 dc ba d7 c2 5a | de ae b7 6f 1b 1d e3 06 00 00 00 1c 00 00 40 05 | 6c ca d3 22 34 6c 0b 0a d6 9b 01 8f e9 fa 8a 7e | 51 47 3d 5a | libevent_free: release ptr-libevent@0x7fb354012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400d120 | #414 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c012630 | handling event EVENT_RETRANSMIT for parent state #309 | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #309 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #309 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49677.519268; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005808 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #309 | libevent_malloc: new ptr-libevent@0x7fb354012840 size 128 "road-eastnet-nonat-57" #309: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #309) | 90 f2 f2 23 da 96 f5 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 ae c5 2a 76 79 d9 11 80 1f 96 5b 2c 21 55 0e | 52 32 59 59 4d 8b 62 1b 1e 24 ff e4 61 ef 06 93 | bc 09 7d 02 95 4e 35 bb 5f 6e 04 f9 37 8a f2 09 | 6d fa 0e df ec 2a 67 53 c6 cd 21 62 19 ee 00 c8 | c1 d4 ad 74 e9 af 08 d7 51 b7 54 c4 5f 85 6b a2 | 75 c9 cd 93 29 db 83 26 13 60 09 0f 01 6b a6 ba | d6 a0 83 70 f4 77 2d c4 f9 20 b0 ee 09 7b a0 33 | 18 ea 6e 22 92 4b e5 33 07 61 e4 39 b1 8b 5a 98 | 64 4f e0 7f 33 58 7a 46 70 b5 36 54 83 e6 d8 37 | ce 3d 5e 64 00 34 b5 97 2a dc 6b 73 bd d2 1e e9 | b3 9d 99 c9 3c f8 18 03 58 76 b7 9a 2d cb ea 7b | 87 84 d1 8b 6e c6 cd 25 71 71 3e 99 ff 0a 1f c8 | 85 6f a7 e5 39 50 54 2c 26 84 44 cb fa 8a 51 d4 | ba 1f 9f 90 6f 93 95 a4 f9 85 9a b3 12 aa 79 46 | 05 32 e1 d4 7a f2 7a 36 94 b5 70 4b aa c4 3f f8 | f9 83 fb b5 44 81 41 3d b3 33 5c b4 2d 71 df 84 | 29 00 00 24 4c 7f 8f 28 17 31 ae 2a a7 3c 6d 65 | 1e 41 da 23 81 4d 09 fa 18 57 5d 4f dc f4 df 6c | 20 61 c5 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f3 f8 4c d7 1e 43 e6 3f 42 eb 30 72 | de e0 e8 5b 93 4d e7 89 00 00 00 1c 00 00 40 05 | e8 f2 fc 6d 83 fa 04 7a cc 0f 54 6b 70 28 25 4d | 2b f2 eb 8b | libevent_free: release ptr-libevent@0x7fb36c04b970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012630 | #309 spent 0.0735 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e d5 a6 6b e9 51 f5 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #414 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #414 | rejected packet: | 9e d5 a6 6b e9 51 f5 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #414: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 f2 f2 23 da 96 f5 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #309 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #309 | rejected packet: | 90 f2 f2 23 da 96 f5 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #309: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0379 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47f10 | handling event EVENT_RETRANSMIT for parent state #362 | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #362 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #362 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49677.524557; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003177 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012630 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #362 | libevent_malloc: new ptr-libevent@0x7fb36c04b970 size 128 "road-eastnet-nonat-110" #362: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #362) | 79 e0 7b db bf e0 df 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 58 27 86 c5 f9 8c cf 89 68 d1 9e c2 2a c8 4a | da 7d d8 07 8a b5 64 43 22 f7 a6 30 97 ca b8 f5 | c8 25 5f 3f d2 8e be 62 d3 8d 6c cf 71 bf 76 63 | d9 07 8d b1 c5 9f c3 a7 b8 7e e5 00 03 0b c1 0d | 22 f4 89 95 0c d8 00 e4 8c ba a0 1b ac fa 89 c6 | 67 62 f6 a7 e4 8c 4f c8 c7 77 79 53 f8 98 39 2d | 3b 30 0a e1 da cb f1 fc f0 30 13 27 47 13 e0 65 | 0b da e5 87 6f 0e 6c c0 89 03 ab 2a 82 c5 34 95 | 15 34 67 de 5a aa b5 07 35 bc 95 aa 82 00 b1 16 | 8e 6b 21 e0 45 a5 66 95 6e 83 16 8f 2b ee 03 ef | 02 de 36 db b0 c0 f4 e2 d2 1e 0d be d8 91 f7 72 | cd 14 33 51 64 d5 dd d5 3d 65 70 28 c3 2f 57 3f | 4b 4b d5 8c f2 92 b3 0c 9f 8d a0 2f 9a 5f 9d a8 | 0d ae cd 5e 77 75 b7 48 bb 27 68 90 7e 0e 8d 10 | 86 bf a4 47 df bb 7b cb 34 23 b8 08 15 f3 7f 6d | 51 d5 ae f8 b3 60 44 e0 56 71 c5 a9 57 5a 24 c6 | 29 00 00 24 3b 79 7f e5 5c de f0 ae 26 7a 15 81 | 35 42 e6 f3 1d 66 3a 94 36 41 6a 99 ae e0 a8 96 | 08 73 ec d2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 91 48 5f b0 47 d4 61 2c f1 27 03 | 24 75 2b 95 c4 3a 3e 58 00 00 00 1c 00 00 40 05 | ec 66 fb 7f d2 86 12 b1 2b 4e 47 12 62 c8 23 32 | 13 d6 12 8d | libevent_free: release ptr-libevent@0x7fb364029220 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47f10 | #362 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 e0 7b db bf e0 df 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #362 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #362 | rejected packet: | 79 e0 7b db bf e0 df 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #362: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45350 | handling event EVENT_RETRANSMIT for parent state #170 | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #170 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #170 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49677.550978; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008936 exceeds limit? YES "road-eastnet-nonat-170" #170: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-170" #170: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #422 at 0x557d46abb100 | State DB: adding IKEv2 state #422 in UNDEFINED | pstats #422 ikev2.ike started | Message ID: init #422: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #422: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #422; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-170" #422: initiating v2 parent SA to replace #170 | using existing local IKE proposals for connection road-eastnet-nonat-170 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 422 for state #422 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47f10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #422 | libevent_malloc: new ptr-libevent@0x7fb364029220 size 128 | #422 spent 0.0746 milliseconds in ikev2_parent_outI1() | RESET processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #170 ikev2.ike failed too-many-retransmits | pstats #170 ikev2.ike deleted too-many-retransmits | #170 spent 2.14 milliseconds in total | [RE]START processing: state #170 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-170" #170: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #170: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #170 "road-eastnet-nonat-170" #170: deleting IKE SA for connection 'road-eastnet-nonat-170' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-170' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-170 | State DB: deleting IKEv2 state #170 in PARENT_I1 | parent state #170: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 2 resuming | stop processing: state #170 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 2 starting work-order 422 for state #422 | libevent_free: release ptr-libevent@0x7fb37c01d920 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 422 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45350 | in statetime_stop() and could not find #170 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-170 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-170" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-170' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-170" | stop processing: connection "road-eastnet-nonat-170" (in initiate_a_connection() at initiate.c:349) | spent 0.0601 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 422 time elapsed 0.000549 seconds | (#422) spent 0.553 milliseconds in crypto helper computing work-order 422: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 422 for state #422 to event queue | scheduling resume sending helper answer for #422 | libevent_malloc: new ptr-libevent@0x7fb38002c1b0 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #422 | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 422 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #422 | **emit ISAKMP Message: | initiator cookie: | b8 e0 2b 96 c7 45 5a 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-170 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5c 6c 40 a5 03 bc 57 72 c1 66 d6 ac 89 5b f4 c1 | ikev2 g^x d0 36 2b 40 f8 23 54 39 34 b5 82 a2 ec a9 be f0 | ikev2 g^x 9e 2a fb a5 33 fb bf 78 6a 65 ee e2 5e 78 b2 97 | ikev2 g^x 57 06 96 a7 85 bc b5 2f 57 ad dd 92 ec d4 39 15 | ikev2 g^x 9d 72 7c 3a f0 31 6f b3 e0 1f fa e2 bb 36 ae ad | ikev2 g^x 14 69 bc c7 2b b8 d3 5c 99 5b e0 8a c5 e8 54 ff | ikev2 g^x a1 c6 b4 be 7e 54 b5 cb 08 e2 27 e4 e9 7a 16 60 | ikev2 g^x ce 85 f4 97 da 4f 4d 09 2e 8c 52 19 57 93 83 db | ikev2 g^x 87 b1 16 b3 51 00 56 5d 37 6d b9 b3 a2 bd 99 3b | ikev2 g^x aa 47 42 33 bb 18 39 df 45 15 55 a1 5a 1e 8d 44 | ikev2 g^x 65 5b 06 c8 ce 40 9d 80 8b 2e ca 26 d1 79 fd 78 | ikev2 g^x 43 19 a6 31 62 db c5 b6 b4 99 3e 3d 0f 92 3a 22 | ikev2 g^x 67 54 41 d3 95 c5 98 ed 1d fc 1c 5c cc 1c ff 1e | ikev2 g^x 72 31 d9 fd 8f 7a 3f e9 62 8e 84 af f0 f7 f0 8d | ikev2 g^x 9b 73 d6 fc ff bc e5 4a d7 b9 1b 80 22 88 c1 56 | ikev2 g^x e0 bb 60 af 81 19 d7 73 ec 24 2d 0b 96 d4 fa 10 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2b c3 8d 3d 91 5a 53 1a b5 f4 6d b1 02 bf f8 18 | IKEv2 nonce e1 84 d7 9f a5 0d 77 07 91 b8 4d 3f 04 89 f2 e5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b8 e0 2b 96 c7 45 5a 2b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 aa | natd_hash: port= 01 f4 | natd_hash: hash= 15 85 d2 75 8f 47 7e 81 98 63 03 9f 1d 8c c0 94 | natd_hash: hash= 92 93 75 cc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 15 85 d2 75 8f 47 7e 81 98 63 03 9f 1d 8c c0 94 | Notify data 92 93 75 cc | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b8 e0 2b 96 c7 45 5a 2b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2a 28 b7 7f 38 5f e0 65 f6 1d 4d c9 d5 6f ea f1 | natd_hash: hash= c9 85 fb 5d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2a 28 b7 7f 38 5f e0 65 f6 1d 4d c9 d5 6f ea f1 | Notify data c9 85 fb 5d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #422 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #422: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #422 to 4294967295 after switching state | Message ID: IKE #422 skipping update_recv as MD is fake | Message ID: sent #422 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-170" #422: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.170:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #422) | b8 e0 2b 96 c7 45 5a 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 6c 40 a5 03 bc 57 72 c1 66 d6 ac 89 5b f4 c1 | d0 36 2b 40 f8 23 54 39 34 b5 82 a2 ec a9 be f0 | 9e 2a fb a5 33 fb bf 78 6a 65 ee e2 5e 78 b2 97 | 57 06 96 a7 85 bc b5 2f 57 ad dd 92 ec d4 39 15 | 9d 72 7c 3a f0 31 6f b3 e0 1f fa e2 bb 36 ae ad | 14 69 bc c7 2b b8 d3 5c 99 5b e0 8a c5 e8 54 ff | a1 c6 b4 be 7e 54 b5 cb 08 e2 27 e4 e9 7a 16 60 | ce 85 f4 97 da 4f 4d 09 2e 8c 52 19 57 93 83 db | 87 b1 16 b3 51 00 56 5d 37 6d b9 b3 a2 bd 99 3b | aa 47 42 33 bb 18 39 df 45 15 55 a1 5a 1e 8d 44 | 65 5b 06 c8 ce 40 9d 80 8b 2e ca 26 d1 79 fd 78 | 43 19 a6 31 62 db c5 b6 b4 99 3e 3d 0f 92 3a 22 | 67 54 41 d3 95 c5 98 ed 1d fc 1c 5c cc 1c ff 1e | 72 31 d9 fd 8f 7a 3f e9 62 8e 84 af f0 f7 f0 8d | 9b 73 d6 fc ff bc e5 4a d7 b9 1b 80 22 88 c1 56 | e0 bb 60 af 81 19 d7 73 ec 24 2d 0b 96 d4 fa 10 | 29 00 00 24 2b c3 8d 3d 91 5a 53 1a b5 f4 6d b1 | 02 bf f8 18 e1 84 d7 9f a5 0d 77 07 91 b8 4d 3f | 04 89 f2 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 85 d2 75 8f 47 7e 81 98 63 03 9f | 1d 8c c0 94 92 93 75 cc 00 00 00 1c 00 00 40 05 | 2a 28 b7 7f 38 5f e0 65 f6 1d 4d c9 d5 6f ea f1 | c9 85 fb 5d | state #422 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb364029220 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47f10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #422 | libevent_malloc: new ptr-libevent@0x7fb37c01d920 size 128 | #422 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49677.552088 | resume sending helper answer for #422 suppresed complete_v2_state_transition() and stole MD | #422 spent 0.331 milliseconds in resume sending helper answer | stop processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38002c1b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 e0 2b 96 c7 45 5a 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #422 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #422 | rejected packet: | b8 e0 2b 96 c7 45 5a 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 aa fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #422: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ecc0 | handling event EVENT_RETRANSMIT for parent state #407 | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #407 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #407 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49677.557225; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002294 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000feb0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #407 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 "road-eastnet-nonat-155" #407: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #407) | 0e f3 59 3b 18 9b 4c 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 5f 7f 81 27 bd f8 4f 84 8b e5 e1 d9 93 de d8 | ec 64 3c 7a c3 34 95 f3 06 ea 96 b5 7a 1b 8f d9 | c8 72 7c 66 d5 b2 ca 73 d5 43 7d ea c5 0c 84 ce | ea c7 b2 0b b4 5d 2c b0 44 4e 93 91 63 38 66 d7 | 19 d5 08 6f 6d f9 84 4a 63 7a 55 68 05 24 95 3e | 99 aa 1e b1 c3 ab 11 18 fa 12 e7 7c 5e c4 8f e2 | 44 28 c7 70 13 76 b9 dd 3a a6 1c 9b 90 d4 8f 73 | 83 e9 82 03 c0 46 28 ea 33 e9 c1 33 69 9b 00 f8 | f6 cd 83 94 cf a0 a7 5e b8 a0 8a 65 44 ef ec 83 | 35 ff 33 b2 45 4f 06 95 40 67 f8 16 c1 7f cb 23 | 42 69 1a ee 3e 5b 22 ed 9d 49 26 08 ce 24 1f dc | 4a 71 86 ce 70 39 9b 18 48 00 7f 0b fd 35 9a e2 | 3f 9a 8e 15 96 bd 41 9e d7 e9 02 79 05 c7 13 f3 | c8 1e 09 29 1f ca 34 e6 f2 7a 3f 24 4a 98 16 47 | 9a 91 43 46 5c 83 b4 00 84 95 4d df 42 56 5f 61 | 36 41 b7 50 c0 98 6b 76 ff 78 86 a6 38 01 7c 10 | 29 00 00 24 21 43 66 be 17 99 40 cd 23 ec 46 61 | 66 3c a9 d5 4d dd 70 3a b4 cd a8 e6 b6 42 a4 c0 | 0c aa c9 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 43 3c a2 b5 33 c4 3b e7 27 68 b0 | 1d 1f b8 cf bc 05 b9 a9 00 00 00 1c 00 00 40 05 | 76 06 02 ba 2b 08 ee 9d 42 ab b0 60 2b 0a e2 b7 | a2 85 77 a0 | libevent_free: release ptr-libevent@0x7fb37c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ecc0 | #407 spent 0.0854 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374045e40 | handling event EVENT_RETRANSMIT for parent state #392 | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #392 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #392 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49677.557322; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003131 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7ecc0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #392 | libevent_malloc: new ptr-libevent@0x7fb37c0300e0 size 128 "road-eastnet-nonat-140" #392: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #392) | 10 0f ce a6 80 60 53 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 7c dc 39 42 03 83 1d fc 78 1f a6 0a 82 be ac | 8c 3b 39 1b 2f 80 e7 cb aa b0 35 db d6 f3 de 35 | 37 b1 68 f3 68 1d 2d f4 b0 35 cc 7b dc 22 05 f9 | b7 af f7 1d a4 46 4d 00 a0 fe ea 26 a2 f9 9b 9a | 09 ee 3f e6 65 a7 03 64 d2 2c 26 ad b0 0a b6 6c | b7 a6 17 d4 6e a3 92 2f 34 cc d4 54 77 6b ca 57 | d5 59 3b bf 54 fe aa b8 9e 19 8b 0b 05 8a f7 be | fc d0 1b 7e ca 71 b1 c1 02 6a 82 df ef f5 65 97 | da 1e 51 41 e3 d8 f1 96 c4 03 03 bd 8f 10 04 b2 | c3 58 82 7f ce 35 78 05 db 11 6d 1f 95 52 d4 56 | 49 d1 80 fa 2e f3 ac 1f 38 a0 e5 d5 81 e9 34 d8 | 41 7f 2d 0d 61 dd 7b e7 44 a4 89 c9 0c 7d 05 e4 | 9f 1e 2d 40 16 34 e0 f0 2c f0 ca 39 ea 5a 9b 3c | e7 ee 11 8b d0 d0 71 64 02 96 00 c1 27 19 8e 75 | f0 b3 d3 5e 45 6f c3 79 42 e7 20 9d b5 0d 76 ff | e5 ba 64 52 91 7f bb 6e bc 95 4c d1 a1 34 da e7 | 29 00 00 24 27 55 30 76 6e b8 e9 20 0f 49 9d 0e | 6c f7 55 67 5b a0 fb d4 e7 df 75 53 94 42 2e 19 | d9 ae ec a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 0f f0 e9 84 b6 f5 5d 7e 1b 97 d7 | 89 b2 50 d4 36 fd 91 50 00 00 00 1c 00 00 40 05 | 93 22 be de f9 76 c2 04 2a 35 c8 fb 20 98 3d d6 | 50 a7 79 8d | libevent_free: release ptr-libevent@0x7fb374029410 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374045e40 | #392 spent 0.0677 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e f3 59 3b 18 9b 4c 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #407 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #407 | rejected packet: | 0e f3 59 3b 18 9b 4c 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #407: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 0f ce a6 80 60 53 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #392 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #392 | rejected packet: | 10 0f ce a6 80 60 53 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #392: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0359 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa34c0 | handling event EVENT_RETRANSMIT for parent state #415 | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #415 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #415 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49677.585614; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500632 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374045e40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #415 | libevent_malloc: new ptr-libevent@0x7fb374029410 size 128 "road-eastnet-nonat-163" #415: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #415) | 65 fc 55 c7 f1 44 1e 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 9b 11 f8 2e b4 b5 c5 30 9b 3d a0 a2 4b 27 41 | f3 d8 72 20 8a 56 0a 05 ca 4d 84 e6 cb f6 3e 40 | 63 3e 65 dc a2 c0 87 47 ce 3b 5e 72 88 1b 50 31 | 15 c5 cf 6b 4a 2f c7 ec 02 24 2b 5b d8 13 58 82 | ef 96 ce cf 1b c6 83 84 dd 4e ef ff 6c f9 de 4b | fa f0 63 3e cd 62 10 03 38 09 9e db 49 54 15 3a | a8 3d 15 df b8 ef fb f6 60 02 a0 d4 fd 2e 9b e9 | ce 3a 0e 92 13 6c 3b 4e d2 2c 44 8a 4a 9a 05 6f | c3 bf 63 16 b0 c4 63 88 ff 02 84 93 54 65 74 42 | 97 c9 d1 95 9c 76 cf c6 11 6e 97 99 50 ea 6c f5 | 6f f0 5c 9c c9 57 a9 e3 41 19 f6 b0 38 a3 e5 ef | 84 44 8a 93 ae f1 ef 1d 2e 53 2b d3 a8 41 d5 27 | 64 64 ae fa 1d fd ea 61 22 f5 cc 34 a6 a2 ea 37 | 88 8a b9 05 5f 00 cd a9 3b c3 f2 31 36 31 fa 53 | 3d ba 7c f3 35 4b 65 ab 19 3c 20 1a b3 c4 2a ca | f4 c6 08 71 62 bd 13 1a f6 9c 40 a8 5d ea 27 a8 | 29 00 00 24 e8 b8 58 d7 ae 38 da 44 20 ee 1e 02 | 80 cb 41 b6 8f 71 2c 96 9f ff be f1 a6 fa a0 4e | 6d 67 74 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 e0 03 d8 e5 8b 46 47 10 2c a8 6c | 82 9e b3 1d 1e 26 96 28 00 00 00 1c 00 00 40 05 | bb 40 b0 02 70 34 84 30 58 79 6d d4 87 e5 1d 82 | 6b ed a6 65 | libevent_free: release ptr-libevent@0x7fb380022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa34c0 | #415 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 fc 55 c7 f1 44 1e 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #415 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #415 | rejected packet: | 65 fc 55 c7 f1 44 1e 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #415: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0565 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354012bf0 | handling event EVENT_RETRANSMIT for parent state #363 | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #363 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #363 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49677.592954; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004551 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa34c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #363 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 "road-eastnet-nonat-111" #363: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #363) | 51 61 7f 08 48 15 06 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 a4 74 58 c5 f7 d1 13 97 f0 a1 32 ec ba 3b 12 | 2a d1 a7 2b 3c 6a 89 b1 af 9f ef 60 99 3f 2b 97 | 5a 99 67 3e 04 49 9e e1 18 dd 5b 9a 36 f4 31 c2 | 53 fb e0 15 b1 f1 17 18 c0 6a ef 59 2d 9b 43 90 | f2 8c 3e 64 6c 64 9b 41 4d c8 83 ed 81 03 01 ef | 94 98 ac cb 77 3f 19 e2 3d 9a 98 04 76 6b 13 b3 | cd 7b 90 ce b0 33 d0 e1 b7 52 ee 6b 51 23 7a ea | a8 cb 6b 19 dd 2c 75 92 bf 4f 96 8d 61 90 60 ba | ac 55 20 f8 f6 10 ca 5a 43 53 71 3b 48 a8 5f 63 | 88 26 59 cb be 95 f5 90 58 5a 07 1f 8c 1f 49 2e | ab c9 b4 33 89 02 d4 f8 ad 34 05 81 7c 83 7c ee | b9 f5 ea 3c 82 86 1f 8e fd dd f8 79 c6 1d d2 66 | eb 43 cd 6b f4 5d 2f 21 06 e6 55 35 36 2a fc 16 | 28 b4 a8 e2 ec 6d b6 b7 1a 42 16 71 43 4d 93 a5 | b9 be 7c 8b c2 15 e3 5b 72 eb 03 26 dc 93 d9 17 | b6 f6 7f 82 7f 35 e0 76 a8 41 7c 2a 12 6a fc 61 | 29 00 00 24 05 ae 65 e3 84 b1 1a 26 06 06 7b dc | a8 83 38 36 54 1a c8 5b 72 97 b6 83 dc f9 79 7c | dc 6e a1 e8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 05 ad f7 99 b0 88 ad 41 82 57 31 | e5 ff 67 18 3e 77 ff e2 00 00 00 1c 00 00 40 05 | a3 ac d5 a3 ef 34 92 9f a8 df c6 0f 83 0b 12 93 | d2 32 5e d3 | libevent_free: release ptr-libevent@0x7fb36401a420 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354012bf0 | #363 spent 0.183 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 61 7f 08 48 15 06 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #363 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #363 | rejected packet: | 51 61 7f 08 48 15 06 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #363: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c012bf0 | handling event EVENT_RETRANSMIT for parent state #310 | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #310 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #310 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49677.603353; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004603 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354012bf0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #310 | libevent_malloc: new ptr-libevent@0x7fb36401a420 size 128 "road-eastnet-nonat-58" #310: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #310) | 15 02 9e 6f d7 63 29 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 27 e5 1e b0 b8 71 be 19 22 95 4e cb bc fb 75 | e9 3b 56 69 33 4e 64 ad 57 4b 29 1e a9 e6 47 1a | 9f d6 c8 79 0e b5 d1 68 4e cf f5 82 76 ae 1c b5 | 09 2e f5 34 f0 f4 52 a3 a8 36 97 6c 75 c0 43 c4 | ee 87 0e 53 ff 09 f4 54 79 74 c0 ae 90 9a ff fd | 29 25 b3 6a e6 b5 58 cb 0a 34 f3 40 7a e1 f0 00 | e8 b9 84 74 bb 8e 47 15 eb 04 15 5e 50 5c 56 6d | 24 4e c6 f1 73 76 98 a0 94 06 1f 4b 61 2c fc 5d | a8 62 64 09 74 1c b7 15 e9 d3 bf 3e 82 77 60 84 | b7 ec 0f bd 1c 3b 5b 97 d2 ff 90 15 40 4c 65 b9 | 49 3d 03 bf e1 e0 85 d7 23 77 e3 10 9e 84 72 33 | 77 bf bf d8 fb 57 2c a9 b4 49 77 20 46 c0 0f 64 | 28 da 55 aa ac 53 17 bb 64 f6 fe 0e af c2 be 09 | 4d 7e 65 25 98 17 8d d6 a3 3b ed 10 34 62 66 3b | 5f 3c 43 cb 1e 2b fc 0b 3e c7 88 ef 40 72 0f 91 | 73 8c 1b 91 80 50 8f 7f 10 7c a8 7c cd 25 bb 09 | 29 00 00 24 8c b6 d4 9e 94 5a 53 1f e0 86 71 ae | 2a 48 4d 09 6b cb 2a d4 c0 d8 ae 06 c9 7c dd 47 | 64 97 96 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 0a e7 b4 3e 63 13 55 ea 18 77 04 | bd 77 d7 da 99 7b 63 27 00 00 00 1c 00 00 40 05 | 5c 4d 49 83 ef 78 da dd 25 a2 53 b8 0f 9a 33 7f | f6 be 51 b8 | libevent_free: release ptr-libevent@0x7fb340040790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | #310 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 02 9e 6f d7 63 29 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #310 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #310 | rejected packet: | 15 02 9e 6f d7 63 29 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #310: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.07 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b026c0 | handling event EVENT_RETRANSMIT for parent state #393 | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #393 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #393 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49677.619768; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003162 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #393 | libevent_malloc: new ptr-libevent@0x7fb340040790 size 128 "road-eastnet-nonat-141" #393: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #393) | d2 4f c7 97 0e 2c 3e ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 57 42 91 f9 c0 06 25 d3 5e c6 ff a0 b9 c7 9a | f8 73 f5 52 ea b3 b7 0b 33 79 a9 ab be 94 f5 d3 | 47 a2 ed 3f 30 d5 f5 d7 c5 7f 9d d3 ed 4d a0 b4 | f7 ad a1 76 18 49 17 db 8a b9 cb ed 58 a9 0c d9 | 5a 76 b8 cb 07 f9 85 e7 ea fe 63 f8 ee 0b 16 50 | 8f 7f 23 44 74 8a 56 f9 51 93 d3 d4 1e a9 e0 6d | d7 af c4 1a 46 a4 66 f8 55 f1 fc bb 79 62 df 34 | 8f ee 1b 57 26 7e c4 de 20 f4 80 c2 d6 80 72 a1 | aa 53 f1 e8 e4 e6 1c e7 0b 29 98 85 7a 59 d5 aa | 68 b0 88 b1 b9 15 73 53 b5 6a 19 c9 ae 48 c5 a2 | 01 52 4f ea f5 c9 9f b8 90 37 cc 56 4f 8d 78 b9 | 10 dc d8 56 42 a7 88 d4 9d 82 8e d9 33 ab ac 86 | 5e b8 f6 d0 8e 0c aa b2 4f 41 73 62 f2 0c c2 27 | ef ba c6 42 e2 bb a6 b0 c4 15 d3 04 4c 56 e0 5c | ad 92 8b ed ed ba dd c2 b7 4a 92 54 4a ae d4 37 | c3 0d 4f 7c 37 7e 0b 49 1e 1d 38 1e 4b 41 b4 43 | 29 00 00 24 f4 b5 fb 56 01 5f ac 00 1d 31 6b d7 | 01 8d f2 d0 3f 15 27 39 dc 6b 31 7e 82 50 a3 bb | 9c f0 ec f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 9c 87 ea bd bf 36 3e cf 82 b1 7a | 78 3f f7 57 2c cf 08 1f 00 00 00 1c 00 00 40 05 | 77 3b 5d 4c 9c 3f 6e 8a 01 7a d1 9c 5b 89 36 dc | 10 f8 1f e1 | libevent_free: release ptr-libevent@0x7fb388048a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b026c0 | #393 spent 0.183 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2b610 | handling event EVENT_RETRANSMIT for parent state #171 | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #171 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #171 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49677.619983; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007905 exceeds limit? YES "road-eastnet-nonat-171" #171: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-171" #171: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #423 at 0x557d46abc6c0 | State DB: adding IKEv2 state #423 in UNDEFINED | pstats #423 ikev2.ike started | Message ID: init #423: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #423: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #423; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-171" #423: initiating v2 parent SA to replace #171 | using existing local IKE proposals for connection road-eastnet-nonat-171 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 423 for state #423 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b026c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #423 | libevent_malloc: new ptr-libevent@0x7fb388048a80 size 128 | #423 spent 0.121 milliseconds in ikev2_parent_outI1() | RESET processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #171 ikev2.ike failed too-many-retransmits | pstats #171 ikev2.ike deleted too-many-retransmits | #171 spent 2.22 milliseconds in total | [RE]START processing: state #171 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-171" #171: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #171: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #171 | crypto helper 0 resuming | crypto helper 0 starting work-order 423 for state #423 "road-eastnet-nonat-171" #171: deleting IKE SA for connection 'road-eastnet-nonat-171' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 423 | add revival: connection 'road-eastnet-nonat-171' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-171 | State DB: deleting IKEv2 state #171 in PARENT_I1 | parent state #171: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 423 time elapsed 0.001 seconds | (#423) spent 1.01 milliseconds in crypto helper computing work-order 423: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 423 for state #423 to event queue | scheduling resume sending helper answer for #423 | libevent_malloc: new ptr-libevent@0x7fb38402d490 size 128 | crypto helper 0 waiting (nothing to do) | stop processing: state #171 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb34c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b610 | in statetime_stop() and could not find #171 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 4f c7 97 0e 2c 3e ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #393 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #393 | rejected packet: | d2 4f c7 97 0e 2c 3e ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8d 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #393: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0865 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-171 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-171" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-171' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-171" | stop processing: connection "road-eastnet-nonat-171" (in initiate_a_connection() at initiate.c:349) | spent 0.0793 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #423 | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 423 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #423 | **emit ISAKMP Message: | initiator cookie: | 0d af b2 c4 93 36 1d aa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-171 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4d 70 3e db fb be 8b b3 fd 73 c0 a9 96 0b 3d a8 | ikev2 g^x e8 36 31 e7 9c ec 5a 7d ff 70 f6 37 85 23 83 66 | ikev2 g^x b2 fa b4 b8 d5 45 16 aa a6 25 06 9f 8e 8e bf 87 | ikev2 g^x eb 95 12 b7 4e e4 06 f4 d1 f8 40 ef 32 40 e6 a6 | ikev2 g^x 6e f4 f8 67 e1 5b 90 26 e6 0e 43 21 0c 13 d6 b5 | ikev2 g^x 8e c1 48 f1 b8 e8 39 77 8f 82 36 7b 93 75 c8 ab | ikev2 g^x 84 91 17 9b a4 7d 3c 17 79 cf 26 b4 a0 3c f6 3b | ikev2 g^x 8a 9e f2 22 e0 37 3d 4a 22 71 37 fa af 63 94 e0 | ikev2 g^x 5d cb 53 25 8c 9f 3c aa f6 38 ac 60 e7 b7 a3 49 | ikev2 g^x 84 5c ea cd 1a 4a 52 75 d6 46 93 25 09 85 d1 82 | ikev2 g^x dd 53 68 4b de 95 3f 19 ff d3 86 0a c0 38 25 ae | ikev2 g^x 80 9b b3 ed 25 0e b6 ad 72 55 3f 58 28 54 96 74 | ikev2 g^x 26 60 4c 26 05 26 c2 53 24 50 7e 5b 35 6b ca a1 | ikev2 g^x e8 d8 01 f8 35 32 32 e5 07 d9 c6 ca 24 0c 96 3a | ikev2 g^x 31 97 ac ed 1f 95 1e 6e 00 fc 4a 03 2a 9c 00 a0 | ikev2 g^x bd e4 04 9f 5c 17 08 9c 92 06 6e 29 32 98 a2 91 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ce f0 94 25 9a 41 87 5c 3e 7f f2 93 02 a0 d4 6b | IKEv2 nonce b2 dd 60 48 d2 68 61 fc a3 c4 4b 4a b6 d0 3f b9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0d af b2 c4 93 36 1d aa | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ab | natd_hash: port= 01 f4 | natd_hash: hash= 76 fb df b4 aa 7f 08 b4 87 40 7c 29 54 a9 d0 e2 | natd_hash: hash= e4 44 95 43 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 76 fb df b4 aa 7f 08 b4 87 40 7c 29 54 a9 d0 e2 | Notify data e4 44 95 43 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0d af b2 c4 93 36 1d aa | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= b2 9a 73 50 a7 57 97 7d 3b 57 52 b7 42 61 08 84 | natd_hash: hash= 33 0c bd 82 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b2 9a 73 50 a7 57 97 7d 3b 57 52 b7 42 61 08 84 | Notify data 33 0c bd 82 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #423 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #423: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #423 to 4294967295 after switching state | Message ID: IKE #423 skipping update_recv as MD is fake | Message ID: sent #423 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-171" #423: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.171:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #423) | 0d af b2 c4 93 36 1d aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 70 3e db fb be 8b b3 fd 73 c0 a9 96 0b 3d a8 | e8 36 31 e7 9c ec 5a 7d ff 70 f6 37 85 23 83 66 | b2 fa b4 b8 d5 45 16 aa a6 25 06 9f 8e 8e bf 87 | eb 95 12 b7 4e e4 06 f4 d1 f8 40 ef 32 40 e6 a6 | 6e f4 f8 67 e1 5b 90 26 e6 0e 43 21 0c 13 d6 b5 | 8e c1 48 f1 b8 e8 39 77 8f 82 36 7b 93 75 c8 ab | 84 91 17 9b a4 7d 3c 17 79 cf 26 b4 a0 3c f6 3b | 8a 9e f2 22 e0 37 3d 4a 22 71 37 fa af 63 94 e0 | 5d cb 53 25 8c 9f 3c aa f6 38 ac 60 e7 b7 a3 49 | 84 5c ea cd 1a 4a 52 75 d6 46 93 25 09 85 d1 82 | dd 53 68 4b de 95 3f 19 ff d3 86 0a c0 38 25 ae | 80 9b b3 ed 25 0e b6 ad 72 55 3f 58 28 54 96 74 | 26 60 4c 26 05 26 c2 53 24 50 7e 5b 35 6b ca a1 | e8 d8 01 f8 35 32 32 e5 07 d9 c6 ca 24 0c 96 3a | 31 97 ac ed 1f 95 1e 6e 00 fc 4a 03 2a 9c 00 a0 | bd e4 04 9f 5c 17 08 9c 92 06 6e 29 32 98 a2 91 | 29 00 00 24 ce f0 94 25 9a 41 87 5c 3e 7f f2 93 | 02 a0 d4 6b b2 dd 60 48 d2 68 61 fc a3 c4 4b 4a | b6 d0 3f b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 fb df b4 aa 7f 08 b4 87 40 7c 29 | 54 a9 d0 e2 e4 44 95 43 00 00 00 1c 00 00 40 05 | b2 9a 73 50 a7 57 97 7d 3b 57 52 b7 42 61 08 84 | 33 0c bd 82 | state #423 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388048a80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b026c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b610 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #423 | libevent_malloc: new ptr-libevent@0x7fb388048a80 size 128 | #423 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49677.622019 | resume sending helper answer for #423 suppresed complete_v2_state_transition() and stole MD | #423 spent 0.57 milliseconds in resume sending helper answer | stop processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38402d490 | timer_event_cb: processing event@0x7fb35800cc10 | handling event EVENT_RETRANSMIT for parent state #408 | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #408 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #408 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49677.622098; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003437 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840489a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #408 | libevent_malloc: new ptr-libevent@0x7fb38402d490 size 128 "road-eastnet-nonat-156" #408: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #408) | 34 97 74 26 6a e5 a4 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 b4 84 d1 c7 68 61 a7 a8 43 5d 75 52 c1 45 ab | 1c 34 c9 1c fb 58 62 3f d2 e4 63 2f df 8e 65 23 | b3 d6 a9 03 c7 71 70 03 ff 1d bb ac 17 a8 6b 6d | e6 be 80 ad c9 77 c7 17 6a 89 49 48 8d b3 43 d4 | 49 ba db 2f fb d6 1b 93 5a 1f a3 ce 04 89 6c 2c | cc 68 c0 e5 12 10 fe eb 35 b6 6c ba a1 43 99 e7 | 4d 42 5d cb 3f a9 dd f3 e4 5f 32 df 76 2b 7a ba | 94 68 cc b7 71 6f 68 e6 66 e9 1a 0b ff e7 f5 9d | 06 aa 01 3c 32 ad d4 f8 5e 61 a5 fe 63 fb f1 96 | b8 0a 85 b5 ad 42 f9 e3 5a cf 27 5e ec 13 9b d0 | 73 b5 31 d4 d2 24 51 4d f5 0b 85 9e 11 85 42 e0 | 88 fc 0a 42 f4 e7 3d 49 ba 53 8a d7 ce 64 df d3 | 52 60 3d 1b 37 34 8f 8c 6a 9e 6e 25 b4 f3 7c 18 | 7a d1 56 c7 cf 72 57 08 b3 73 0c ad 15 18 33 ce | 9c f7 e6 b3 e4 26 15 89 8c 70 86 37 d6 87 03 97 | 84 4a 45 be 3f 69 21 05 76 54 73 82 39 32 70 e8 | 29 00 00 24 59 44 9e 7a bb 43 7f 93 5b bd e5 23 | c1 87 73 73 05 59 35 01 ab d3 f0 0b c4 05 69 18 | 98 63 3b b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 8e f2 86 2b ac 70 a5 cc 8b e7 7d | ac ad 47 30 21 b0 b0 7f 00 00 00 1c 00 00 40 05 | 79 17 f0 70 ea 4a c6 21 3a b7 c0 97 d4 68 33 32 | 9c c8 09 b0 | libevent_free: release ptr-libevent@0x7fb35804ba00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800cc10 | #408 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d af b2 c4 93 36 1d aa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #423 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #423 | rejected packet: | 0d af b2 c4 93 36 1d aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #423: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0732 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 97 74 26 6a e5 a4 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #408 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #408 | rejected packet: | 34 97 74 26 6a e5 a4 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #408: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0661 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8d840 | handling event EVENT_RETRANSMIT for parent state #416 | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #416 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #416 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49677.646538; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500808 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #416 | libevent_malloc: new ptr-libevent@0x7fb35804ba00 size 128 "road-eastnet-nonat-164" #416: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #416) | 5d bf 34 43 fd eb 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 9c 12 61 6e 55 5f 3f e9 df f9 16 83 d1 25 2a | 72 5f a1 78 f7 87 25 3a 22 d7 65 e6 11 d9 d3 59 | e3 ba 0c 77 63 47 38 eb 2b 7e 21 79 54 43 77 67 | 7d 43 26 41 55 e2 a8 b7 fe 98 ba 7e ee 6e e7 d1 | f4 f4 66 e8 1d dc d6 4c 00 81 99 f5 5a 7b 73 a7 | 30 2a 46 7a 31 1a a2 5d 7f 98 25 46 aa 6e fe 80 | f5 47 c9 6c 4b 73 63 fa cd 88 eb 14 22 c8 b1 b2 | ad 5f b2 f2 36 1e b4 11 ad 9a b6 4a 8b 3e c1 87 | 99 5d 71 91 57 ac 82 f2 a3 ed 29 f1 0e 50 36 50 | 84 2e 3a 51 9c b6 89 41 dc e0 0d 62 c7 07 fd 92 | b2 9d 62 79 ea 78 ed 7f ed 48 ed 1d 98 d3 08 ff | 02 b4 3e 75 4f aa f5 e9 04 8d 83 d6 4c a8 75 42 | 31 a1 15 df b2 8a e4 30 1f 81 68 86 a3 e6 e3 23 | 56 ac 18 47 57 cf 03 de 91 03 0e d5 5d 28 a8 63 | aa 5c 8c 97 5e 5c eb 84 7c 09 fb 47 84 e9 d6 18 | 63 4d 10 b9 7d 4e 26 06 3f 25 b1 aa e9 d4 6c b6 | 29 00 00 24 b4 c4 67 16 b9 c2 e8 af d8 82 12 ab | bc d9 b4 36 b0 6a ad c4 e5 8c 60 6e da e3 9f 02 | d5 5c 1a 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 19 76 97 4c b0 23 bd 31 57 aa f9 24 | a0 38 a6 39 12 13 22 3e 00 00 00 1c 00 00 40 05 | d7 f1 41 97 86 a8 54 0a 0b 1f 8a 34 7f d0 a2 86 | ea 0e a2 fa | libevent_free: release ptr-libevent@0x7fb338023e10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8d840 | #416 spent 0.18 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d bf 34 43 fd eb 2e 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #416 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #416 | rejected packet: | 5d bf 34 43 fd eb 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #416: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0978 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc00 | handling event EVENT_RETRANSMIT for parent state #364 | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #364 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #364 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49677.656997; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005005 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8d840 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #364 | libevent_malloc: new ptr-libevent@0x7fb338023e10 size 128 "road-eastnet-nonat-112" #364: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #364) | 33 be fb 4e a0 1f 6e f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 2a 42 5d a7 d8 6e 30 43 82 cd c7 8b 99 36 58 | d8 cb c2 34 66 ff 8a 30 2d b5 6a f0 e0 25 f9 40 | 18 b9 ba e3 e0 90 ff f4 cd 9b 1b 34 38 ee bc bc | a0 41 ef 4f 47 94 f5 37 14 2e 5c 6e 0f a6 94 db | 88 81 75 e1 ca 78 c8 9f 91 97 49 cc 62 0b 7c 24 | 05 6f 34 9d ba a1 13 0a 58 7e 2f 7a ad f7 32 fc | 1d 0c 87 25 75 e1 21 b8 48 fb 8f 7c d6 35 a3 1a | ae f0 b3 f0 3b da b9 9b f9 3d d2 6d c0 fe 81 68 | c2 c7 a1 4c 73 5e 1c b4 3a 58 ed b8 29 5f 91 4a | f8 66 00 af 13 4e e2 0d 66 a8 97 6e 0e 81 4f 92 | 8c 69 2c e3 38 08 3d ee 34 5d c4 0d 5d 92 19 a0 | ed a9 9d c5 1f 5c c0 55 9f 77 6e f9 34 95 4c 9a | 1b 67 cf ca 63 f1 13 a2 4f fd 39 a9 a7 28 45 69 | a8 39 46 14 38 17 c4 c7 52 5d 03 e8 bd 24 28 07 | 48 28 79 7d f7 c5 f9 df 10 a1 d2 ba 0c 72 5c 57 | de c7 d6 50 9c eb 46 ad 18 84 34 9f f7 a9 0f 36 | 29 00 00 24 57 1c 59 6e 8c 59 64 04 26 7e c7 7d | 57 3e 20 cd ce 8c 1c 54 8d 44 77 eb 53 6a 1b 23 | 5a 68 d6 45 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 b7 ef ef bc 35 4f 63 6b 7a c6 35 | bb 1f b7 d6 68 94 93 4f 00 00 00 1c 00 00 40 05 | 20 e3 22 42 33 64 b9 da db 7f 44 ff d7 76 e4 71 | c9 1d dc 40 | libevent_free: release ptr-libevent@0x7fb37c01a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc00 | #364 spent 0.186 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 be fb 4e a0 1f 6e f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #364 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #364 | rejected packet: | 33 be fb 4e a0 1f 6e f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #364: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0841 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388015720 | handling event EVENT_RETRANSMIT for parent state #311 | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #311 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #311 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49677.669408; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004637 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc00 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #311 | libevent_malloc: new ptr-libevent@0x7fb37c01a4e0 size 128 "road-eastnet-nonat-59" #311: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #311) | 44 99 87 40 ba 63 67 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 f7 3b 73 41 b9 88 7a e8 c9 5c 33 15 fe 59 eb | fc 54 1c 32 28 ad 56 eb 34 ed 9a d7 b7 26 48 b1 | 97 4e 59 ed 4f 99 cd e8 e6 27 80 3f 35 da 0c a7 | 23 d8 2f 5d 19 c3 94 0e 09 96 31 23 4d f5 99 7a | 2e 77 d3 1f 35 48 ef 9d e1 61 1a 11 39 f8 6e ce | 65 2d d0 de 38 b4 23 52 6e 45 44 65 4d 7b bd c8 | 41 7e 01 a8 b3 39 9f a8 ee a5 53 dc 50 9b 94 2b | 69 df 03 ec 5d 36 9f 33 dc 3d 9c 7a 93 11 41 9c | 33 38 19 c9 cf 1a a3 f8 96 ca d4 d9 26 62 88 91 | 39 58 69 eb 93 1e 87 6a d7 64 14 8d 9c 37 19 fa | c6 b6 78 0e bc 5c f3 4b 97 bf 56 93 52 5a ea e8 | e0 ac be 1b 36 a8 31 6f 20 82 12 c0 13 79 34 1d | 86 03 61 75 0c 12 25 55 a8 61 36 78 64 d8 d0 e0 | d9 d2 a7 01 7f 00 fd 1f 2e 03 76 1e 96 2c 85 64 | f8 86 44 8c a4 8a 04 3f e3 a8 0c 90 29 b2 ad bc | e2 32 ac c2 2b f4 81 23 cf 52 ee cf c4 e3 9c c7 | 29 00 00 24 d3 df f6 74 46 9e 11 7f ae 1b 7e 22 | a8 9e 39 ab f7 77 2a 20 6e a6 c0 c3 6f 0b 0c 6a | a5 08 b1 f9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c b5 fb 2f 48 22 68 cf e1 a0 a0 6d | 16 65 fc 12 3f 30 cc 2d 00 00 00 1c 00 00 40 05 | 5f ba 06 b7 b7 74 50 87 e6 7e 19 f6 51 18 f6 57 | 2a d1 11 81 | libevent_free: release ptr-libevent@0x7fb3600407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388015720 | #311 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 99 87 40 ba 63 67 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #311 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #311 | rejected packet: | 44 99 87 40 ba 63 67 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #311: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0818 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0ea80 | handling event EVENT_RETRANSMIT for parent state #394 | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #394 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #394 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49677.684812; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003617 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388015720 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #394 | libevent_malloc: new ptr-libevent@0x7fb3600407f0 size 128 "road-eastnet-nonat-142" #394: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #394) | c6 0a d6 5e 7e fc 84 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 b5 7c 6c c9 f1 d1 76 55 70 0c 53 79 42 59 aa | 1c 78 3a 1c cf 8e ff bf 3c 4f 8e 36 eb fa f5 80 | 9c 26 80 0f 65 74 f8 36 f2 69 55 0c 8f 0e 23 f4 | f2 22 a0 b5 d9 98 7e 1f aa d3 a2 c6 8c ae 8e 98 | 7c 0a f3 ed 8f 8b 88 58 8c d6 33 95 a0 55 9d 22 | 45 bd 30 81 fc 6e e7 86 9a f8 90 92 f7 2d bb 24 | 69 7e b6 2c e3 c4 d3 78 cf 51 21 62 11 c2 15 e2 | b3 a9 82 d8 15 7c 3e 4d bb 85 98 4b 06 e1 32 2f | 7a ee fc 56 3c 9b 3f a7 bb d2 50 44 19 3c 10 75 | d0 ab ea a8 d0 55 74 15 97 4a a8 8a 65 6f 7d 24 | 88 48 f4 59 45 9a aa ed 6e b4 a3 4a 2e c4 97 e3 | ef a9 a3 78 d3 c7 01 a3 80 5f 34 19 5f e9 1a 0b | 22 c3 b3 e4 7b 39 94 40 be d6 c0 25 22 6b 94 43 | 4e 6c a4 23 34 ff 10 49 a6 bf 97 8e b9 5f 55 2d | 28 e5 68 c3 b7 a6 14 92 b7 6a 59 d7 14 cc 2b 2a | 46 b7 9f a5 f7 40 91 f4 58 19 59 a8 c2 3d 8c 54 | 29 00 00 24 48 a4 83 24 df d5 ff 67 2d 1a db a8 | 39 76 5f a5 8c c2 0e 08 ee f5 2b 2a a4 7f 9e 08 | 09 74 ed 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 07 bb 4a c8 d9 c8 75 02 c5 e8 2f | 3d 22 1e b1 bf 8b 35 f7 00 00 00 1c 00 00 40 05 | 6e c1 7a 04 07 74 46 3d 3d f7 4a 09 48 b9 79 2c | 6a b6 13 f4 | libevent_free: release ptr-libevent@0x7fb36c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0ea80 | #394 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c6 0a d6 5e 7e fc 84 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #394 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #394 | rejected packet: | c6 0a d6 5e 7e fc 84 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #394: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0873 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad4380 | handling event EVENT_RETRANSMIT for parent state #172 | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #172 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #172 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49677.688144; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008327 exceeds limit? YES "road-eastnet-nonat-172" #172: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-172" #172: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #424 at 0x557d46abdc80 | State DB: adding IKEv2 state #424 in UNDEFINED | pstats #424 ikev2.ike started | Message ID: init #424: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #424: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #424; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-172" #424: initiating v2 parent SA to replace #172 | using existing local IKE proposals for connection road-eastnet-nonat-172 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 424 for state #424 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0ea80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #424 | libevent_malloc: new ptr-libevent@0x7fb36c03b0b0 size 128 | #424 spent 0.103 milliseconds in ikev2_parent_outI1() | RESET processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #172 ikev2.ike failed too-many-retransmits | pstats #172 ikev2.ike deleted too-many-retransmits | crypto helper 9 resuming | crypto helper 9 starting work-order 424 for state #424 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 424 | #172 spent 2.57 milliseconds in total | [RE]START processing: state #172 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-172" #172: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #172: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #172 "road-eastnet-nonat-172" #172: deleting IKE SA for connection 'road-eastnet-nonat-172' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-172' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-172 | State DB: deleting IKEv2 state #172 in PARENT_I1 | parent state #172: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 424 time elapsed 0.002321 seconds | stop processing: state #172 from 192.1.2.23:500 (in delete_state() at state.c:1143) | (#424) spent 2.34 milliseconds in crypto helper computing work-order 424: ikev2_outI1 KE (pcr) | libevent_free: release ptr-libevent@0x7fb37002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad4380 | crypto helper 9 sending results from work-order 424 for state #424 to event queue | in statetime_stop() and could not find #172 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #424 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-172 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7fb37802a8c0 size 128 | crypto helper 9 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-172" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-172' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-172" | stop processing: connection "road-eastnet-nonat-172" (in initiate_a_connection() at initiate.c:349) | spent 0.103 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #424 | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 424 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #424 | **emit ISAKMP Message: | initiator cookie: | e5 61 ef 5f 7f e3 58 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-172 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2c da e9 09 30 1c 29 bb e6 91 cb 4e 69 4d ec 03 | ikev2 g^x b5 f9 29 7a 23 48 20 ed f7 47 c2 fe 06 e6 43 d7 | ikev2 g^x dd db db 34 94 8c 85 3b 55 9b f4 3a 74 ed 7a a1 | ikev2 g^x b8 84 40 94 dc 5c ed 16 d0 73 2d 49 36 0b 9a 1d | ikev2 g^x 7a 62 45 16 8d 9c 63 79 31 b8 8c 83 f1 0e b1 7f | ikev2 g^x 67 fe bc d6 57 49 2e 4d c3 49 48 a7 55 5f ff d0 | ikev2 g^x 14 68 fc 6f 72 30 bd 46 7b 9a 8c f4 dc c7 37 1c | ikev2 g^x e4 a4 8f 19 bc e7 61 cc 6b 11 48 dd 4e 4a 37 e3 | ikev2 g^x ee aa ab b1 b2 36 8e 89 eb 7e b7 77 69 a0 09 80 | ikev2 g^x 3c 6b fc 75 71 9a f3 bd 94 2c c9 c7 7f d3 9b 98 | ikev2 g^x 01 34 f8 57 09 1c 44 77 27 2b 95 8b 42 b2 1e 03 | ikev2 g^x d7 04 87 d9 03 b3 37 7c 1d b7 57 41 2d 16 5a a8 | ikev2 g^x dc c5 ad 48 e5 82 26 97 54 fe f5 c0 fe b9 29 58 | ikev2 g^x 35 ce 2a 1a 65 c3 c1 3a f9 04 5b 80 08 58 bc a4 | ikev2 g^x 5f 74 90 a2 3e 82 ee a6 80 5f 67 41 cd ba a6 4f | ikev2 g^x 66 85 f6 7c 29 e8 a5 11 0e c2 6f 44 c1 41 6a eb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7c 1f b6 fc f1 5f 8d 51 2e 05 d2 13 e2 d8 d5 f5 | IKEv2 nonce 0f 0a 46 07 58 f7 ec 9e c5 1c 22 09 2c cd 2f ef | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e5 61 ef 5f 7f e3 58 2b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ac | natd_hash: port= 01 f4 | natd_hash: hash= 13 d1 0c 8f d2 91 2d a0 36 f1 93 d6 bd 3f 30 ca | natd_hash: hash= a6 e2 8d 8a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 13 d1 0c 8f d2 91 2d a0 36 f1 93 d6 bd 3f 30 ca | Notify data a6 e2 8d 8a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e5 61 ef 5f 7f e3 58 2b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 48 c0 59 12 12 13 1e e0 ba de 8c 06 ba c3 58 23 | natd_hash: hash= f1 28 ea 8c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 48 c0 59 12 12 13 1e e0 ba de 8c 06 ba c3 58 23 | Notify data f1 28 ea 8c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #424 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #424: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #424 to 4294967295 after switching state | Message ID: IKE #424 skipping update_recv as MD is fake | Message ID: sent #424 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-172" #424: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.172:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #424) | e5 61 ef 5f 7f e3 58 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c da e9 09 30 1c 29 bb e6 91 cb 4e 69 4d ec 03 | b5 f9 29 7a 23 48 20 ed f7 47 c2 fe 06 e6 43 d7 | dd db db 34 94 8c 85 3b 55 9b f4 3a 74 ed 7a a1 | b8 84 40 94 dc 5c ed 16 d0 73 2d 49 36 0b 9a 1d | 7a 62 45 16 8d 9c 63 79 31 b8 8c 83 f1 0e b1 7f | 67 fe bc d6 57 49 2e 4d c3 49 48 a7 55 5f ff d0 | 14 68 fc 6f 72 30 bd 46 7b 9a 8c f4 dc c7 37 1c | e4 a4 8f 19 bc e7 61 cc 6b 11 48 dd 4e 4a 37 e3 | ee aa ab b1 b2 36 8e 89 eb 7e b7 77 69 a0 09 80 | 3c 6b fc 75 71 9a f3 bd 94 2c c9 c7 7f d3 9b 98 | 01 34 f8 57 09 1c 44 77 27 2b 95 8b 42 b2 1e 03 | d7 04 87 d9 03 b3 37 7c 1d b7 57 41 2d 16 5a a8 | dc c5 ad 48 e5 82 26 97 54 fe f5 c0 fe b9 29 58 | 35 ce 2a 1a 65 c3 c1 3a f9 04 5b 80 08 58 bc a4 | 5f 74 90 a2 3e 82 ee a6 80 5f 67 41 cd ba a6 4f | 66 85 f6 7c 29 e8 a5 11 0e c2 6f 44 c1 41 6a eb | 29 00 00 24 7c 1f b6 fc f1 5f 8d 51 2e 05 d2 13 | e2 d8 d5 f5 0f 0a 46 07 58 f7 ec 9e c5 1c 22 09 | 2c cd 2f ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 d1 0c 8f d2 91 2d a0 36 f1 93 d6 | bd 3f 30 ca a6 e2 8d 8a 00 00 00 1c 00 00 40 05 | 48 c0 59 12 12 13 1e e0 ba de 8c 06 ba c3 58 23 | f1 28 ea 8c | state #424 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c03b0b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0ea80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad4380 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #424 | libevent_malloc: new ptr-libevent@0x7fb37002a950 size 128 | #424 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49677.691459 | resume sending helper answer for #424 suppresed complete_v2_state_transition() and stole MD | #424 spent 0.58 milliseconds in resume sending helper answer | stop processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37802a8c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 61 ef 5f 7f e3 58 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #424 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #424 | rejected packet: | e5 61 ef 5f 7f e3 58 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ac fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #424: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0776 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abfd80 | handling event EVENT_RETRANSMIT for parent state #409 | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #409 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #409 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49677.692707; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001792 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378012890 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #409 | libevent_malloc: new ptr-libevent@0x7fb37802a8c0 size 128 "road-eastnet-nonat-157" #409: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #409) | 0d 5e 25 c2 55 3c 99 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e 9e 5e 2e 09 bf 8f 71 99 55 8d fe 7f 83 64 1f | 09 d9 64 f5 c9 93 8a 5c be 46 9e 22 f6 15 48 5f | a3 27 82 be 44 32 8b ed 4e a8 f7 10 74 01 31 7a | a5 a7 4a e9 16 68 9c 40 cb 7b 6b e4 87 2e b5 7d | 61 20 08 88 29 08 bb bf f5 22 fa fd 47 2b fd 61 | a5 c3 48 69 18 1a 27 78 c3 f3 e3 0b 62 b4 52 0b | 48 72 ce 1d 37 3b 34 c5 fc ba cb 1f 9d e8 de ad | 9b ab 2c 3a d9 69 c6 42 6d b1 05 5a c4 77 34 d1 | ff 6d 2c 38 8e 1f 9c 0a 39 45 f9 c1 2e 9a c1 dd | d2 58 ca fc 7a d1 3f 4c 26 24 eb 54 5d 92 fb 39 | 47 60 ec 18 66 63 9c 19 12 10 f2 b6 7c 18 85 c7 | 6c d1 5b c2 e0 13 21 58 85 48 a4 fc 6e b1 46 84 | 53 a9 5a 65 21 91 66 41 1c 5e ad 4e a2 85 5a 4b | dd 4b fe 45 dc c9 fe ab c9 08 d4 96 88 93 93 aa | 1e 95 b1 87 3d 21 a8 b6 2f fd 18 ff 13 73 04 e2 | 11 aa e4 99 8f 8e f6 da 34 f7 b8 a6 55 2e b3 22 | 29 00 00 24 56 91 a2 13 7d 33 fd 14 52 dc d7 9d | 97 62 ec aa 5a ba e0 81 38 20 1d 66 12 9f da fa | a6 b6 f9 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d7 a6 1d 1c 1e 3f 9a df 29 5a 62 1d | 4b b6 a0 46 97 db 0a 03 00 00 00 1c 00 00 40 05 | b4 37 78 a6 35 8d da 4f 96 64 40 e6 05 68 b6 9e | 6d 2b 7a a6 | libevent_free: release ptr-libevent@0x7fb36402a780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abfd80 | #409 spent 0.221 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 5e 25 c2 55 3c 99 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #409 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #409 | rejected packet: | 0d 5e 25 c2 55 3c 99 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #409: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0942 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abe780 | handling event EVENT_RETRANSMIT for parent state #417 | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #417 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #417 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49677.707156; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501342 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abfd80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #417 | libevent_malloc: new ptr-libevent@0x7fb36402a780 size 128 "road-eastnet-nonat-165" #417: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #417) | d9 e4 18 5f 59 64 b9 ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 fd ed 03 c4 13 a8 51 65 6c f8 7b f8 e0 2d 89 | 59 12 b6 d0 fa 5d d3 b6 48 1f 05 4f d0 37 4e 96 | b6 b0 a9 07 5a 84 b2 22 72 c2 6e e4 2c 16 e8 fb | c8 92 b8 74 ce 3f 40 30 b5 60 8c 95 d1 d0 42 81 | 96 4a 3e 9a 08 06 af be 4a d9 72 15 c0 c3 46 78 | d0 1e d0 10 cd c4 48 fd 2d ac c2 45 66 8d 26 84 | dc ff cb c9 a3 60 b9 5c 03 1c 63 7c ad bd 60 96 | ce 2e d7 57 49 16 93 e7 43 2d b6 d5 b4 ce 5b 3b | 96 51 3a 88 ff 32 38 dc 5f 0b a8 74 a0 1a 49 87 | b5 db a2 1f ed 10 a6 d0 7a 48 4a 90 79 4e 5a f9 | 2b 8b 33 88 7e f6 9a 82 54 47 b3 ae d3 d5 19 8e | 35 94 b5 a7 07 70 69 91 1e 2e 08 a0 fa fa bf a8 | 09 5a 06 2f 9a 90 75 b5 b1 fe 11 2e 8d bc e2 8f | fc 8a 4c 02 b2 2c 51 5d d4 fd cc 21 3e c1 63 73 | 47 88 57 72 c3 e3 90 eb 42 71 fd 34 f9 5d 5f ad | 35 a7 22 19 95 d8 2d 82 e5 c2 0e d7 d8 88 22 f6 | 29 00 00 24 df 2c 07 75 0e bd bd 78 6f 85 ca 62 | 53 2e a0 29 e4 f9 3b 0b 22 fe c0 44 7c 40 c5 a3 | 8b 56 a4 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 33 f3 05 bf ce a7 d8 4f e5 99 24 52 | 75 47 3a d4 7d 71 ad 77 00 00 00 1c 00 00 40 05 | 01 69 5d 3d 4a 00 3f a4 76 63 f4 90 ae 45 6d 8b | 22 6e e0 18 | libevent_free: release ptr-libevent@0x7fb3880269d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe780 | #417 spent 0.228 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 e4 18 5f 59 64 b9 ab | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #417 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #417 | rejected packet: | d9 e4 18 5f 59 64 b9 ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #417: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0935 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad43c0 | handling event EVENT_RETRANSMIT for parent state #365 | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #365 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #365 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49677.725659; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003648 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe780 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #365 | libevent_malloc: new ptr-libevent@0x7fb3880269d0 size 128 "road-eastnet-nonat-113" #365: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #365) | 85 67 19 58 d7 3c f0 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 c9 07 e2 a7 25 a6 09 ab 7f e9 5d 7e 7f 47 e1 | 9f 44 d1 91 14 4d 9b 8f 5d 22 2a 52 a8 98 ff b2 | 6b 6a b0 36 7f fd 95 da a0 25 8f 6e 16 7f 04 38 | 86 c2 bd 33 bf fc a5 26 c4 b6 f6 70 3e fd c6 4a | 25 c8 b3 a8 9f a8 44 89 83 a1 8c aa b8 af 7f e3 | 16 bb 17 56 79 89 e8 f0 01 49 b8 07 c4 c2 fd 27 | 4f 8e 62 66 4b 11 2b 01 9f f2 8c 2a 44 d1 a6 b0 | 37 65 5b 66 a4 8d e5 2d a7 91 fd e3 72 91 ef 62 | 52 0e c8 e1 f3 04 05 43 a3 3a 3c 61 1b d7 eb bd | 6b 38 06 f9 ff f3 a7 b2 e7 89 6b 9c da 79 fc be | 85 2e 71 9d 7f 61 aa 1d 41 bd c5 f4 78 4a e7 2c | 3d fa 74 f7 ca 33 00 f8 ee a6 a8 8a 16 63 2d 1b | 61 9d fa 4c a8 ca 3a 31 b1 cd 60 8d cb 56 88 b6 | 81 05 15 ed cf 3d b4 c9 19 7e d9 8d 29 23 d3 64 | ec 0b 35 05 39 3b e0 f1 75 19 f5 f3 4f 99 e8 61 | bd bd 06 53 be 50 6f 6a cb bc 2d c6 18 e6 53 b2 | 29 00 00 24 e5 25 b4 c0 9c 12 3e 53 68 a2 43 fb | 88 db 47 7b b4 96 4d ec 31 20 f7 c3 1c a9 eb e1 | 62 8a 8b 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 90 3b 10 25 ca fe 1f 3b 58 67 93 fa | 3d a3 98 00 cc 36 84 a7 00 00 00 1c 00 00 40 05 | 55 c6 52 e3 aa aa 60 c0 64 26 bb 2b 79 4e a4 42 | 73 1e 76 57 | libevent_free: release ptr-libevent@0x7fb36c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad43c0 | #365 spent 0.18 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 67 19 58 d7 3c f0 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #365 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #365 | rejected packet: | 85 67 19 58 d7 3c f0 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #365: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0854 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad0280 | handling event EVENT_RETRANSMIT for parent state #312 | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #312 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #312 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49677.734102; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007027 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad43c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #312 | libevent_malloc: new ptr-libevent@0x7fb36c04b7c0 size 128 "road-eastnet-nonat-60" #312: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #312) | 89 42 ee d6 ed 2c a4 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 05 0b 71 54 f5 39 16 26 4c a4 39 04 60 1d 97 | 32 ea c2 30 7f b7 8f 8f 4c 46 3c 6f 52 78 aa c1 | fe e4 77 56 f7 3d d3 8d a6 3a 6f c0 2f fe 6d 02 | eb 98 53 91 b0 a7 62 d0 2e 39 52 a2 2d 9f c5 cb | d2 4b 17 0a 6d 76 74 95 b8 fd f2 4d e7 0c cf 15 | 80 f8 47 f1 16 09 01 ed b3 3a 4f 5c d5 5d 3f 6b | 2f e7 b7 4c e0 6d 6e 67 ff dd 71 47 c8 a4 15 9f | 96 98 1b 13 12 cd c9 a7 cd 82 0e 52 4d 94 b9 96 | db fe 30 4f c9 88 5e 66 97 62 f6 22 94 b7 f8 62 | 1f 97 fa 33 08 02 4b f8 35 6a 66 b6 ae 14 f2 38 | 8b d8 d1 fe 0f da d0 63 b9 64 d3 f1 12 68 13 10 | 0c 76 c3 e9 8c 5d 20 14 45 21 bc 02 62 c8 67 36 | a7 1a 3b 3f d4 a6 2b 0f 1f 20 68 bf 3f f3 da ac | 9d d4 0b a5 4f 9d 4e ee 5d 8a c9 7f a6 63 bd 37 | e4 30 f8 16 a7 79 23 99 5e 45 08 d2 1b c1 59 79 | b3 06 e4 a7 4d 24 33 20 1d ab d6 f6 ee 90 2f 69 | 29 00 00 24 c3 f8 28 4c 1a 7b 0f cd eb 3b df c6 | 33 a5 52 0e 9f e3 e0 c7 7b e0 4f ee 68 74 73 39 | ce 71 25 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 69 21 0b 86 be 66 6f de 2b 5e fc | 58 12 49 3c b2 b4 50 5a 00 00 00 1c 00 00 40 05 | 50 02 4b 6b 30 95 cf bb e1 65 ad fe fd e1 44 d3 | d9 2c f8 74 | libevent_free: release ptr-libevent@0x7fb37c023b10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad0280 | #312 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 42 ee d6 ed 2c a4 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #312 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #312 | rejected packet: | 89 42 ee d6 ed 2c a4 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #312: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0811 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a28ab0 | handling event EVENT_RETRANSMIT for parent state #410 | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #410 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #410 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49677.748514; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001692 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad0280 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #410 | libevent_malloc: new ptr-libevent@0x7fb37c023b10 size 128 "road-eastnet-nonat-158" #410: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #410) | 59 b5 db 36 67 47 70 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 b7 0b 8c f9 95 bc f7 80 78 70 36 f3 fd f2 85 | 36 5b 98 b3 da 7d 8e 19 72 07 91 60 60 8a e6 82 | 67 b3 ba e3 47 c2 28 3a c4 af df a8 61 5d 73 9e | d2 63 4a 41 c1 df 23 58 85 d0 d0 d7 31 64 13 d3 | fc c4 39 95 ba ac 0f ae 94 0f 0a ba f0 76 e9 ae | a0 35 47 51 b9 fa 43 1f 5e 7f a1 99 3d cc 76 ac | 19 ca 51 32 ad cd e2 9d 6b 98 62 47 ad 2c d1 40 | 11 bd ff e1 9d 02 a1 c8 40 a8 ed 91 e5 60 1c 79 | ee 69 bc ed 65 82 b2 85 d5 b1 74 ab f9 fa 7a e9 | f0 dc 57 ef e3 3e 09 b2 80 4a e9 c3 55 5a 97 3e | 39 d4 2d 85 ca cc 9a e5 d4 76 c5 5e 9e c1 e9 7d | 39 17 67 a4 c4 56 99 a0 e7 0c b7 13 22 44 76 46 | 08 b0 60 5a a2 8d 7d 3c 2d 85 7a 7a dd 83 3a 2b | 27 be 2b 38 04 53 2f 3d 0c cd c0 ad bc 4e 6a 91 | 94 3d 91 ac 7d a2 5b fd 39 2e 69 e6 48 9c ae be | 71 e2 83 13 24 ec 5c 04 d1 c5 4a 80 96 3c 2f 11 | 29 00 00 24 e1 88 5c 17 02 b4 80 04 34 b3 a7 d4 | f8 d1 c3 d6 e1 59 82 cb 1f c0 98 16 57 75 53 e7 | ef 70 14 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 ce e5 8e 76 7c ee 72 e4 c9 6c 0a | 7e 11 3d 4e e7 09 5c 04 00 00 00 1c 00 00 40 05 | 2c 17 58 9d 14 87 37 db ad 40 b0 f7 64 73 53 a7 | 0b 3f 01 e6 | libevent_free: release ptr-libevent@0x7fb36c0407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a28ab0 | #410 spent 0.175 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 59 b5 db 36 67 47 70 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #410 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #410 | rejected packet: | 59 b5 db 36 67 47 70 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #410: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0834 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #173 | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #173 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #173 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49677.751939; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010184 exceeds limit? YES "road-eastnet-nonat-173" #173: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-173" #173: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #425 at 0x557d46abf240 | State DB: adding IKEv2 state #425 in UNDEFINED | pstats #425 ikev2.ike started | Message ID: init #425: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #425: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #425; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-173" #425: initiating v2 parent SA to replace #173 | using existing local IKE proposals for connection road-eastnet-nonat-173 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 425 for state #425 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a28ab0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #425 | libevent_malloc: new ptr-libevent@0x7fb36c0407f0 size 128 | #425 spent 0.118 milliseconds in ikev2_parent_outI1() | RESET processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #173 ikev2.ike failed too-many-retransmits | pstats #173 ikev2.ike deleted too-many-retransmits | #173 spent 2.56 milliseconds in total | [RE]START processing: state #173 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-173" #173: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #173: PARENT_I1(half-open IKE SA) => delete | crypto helper 10 resuming | crypto helper 10 starting work-order 425 for state #425 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 425 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #173 "road-eastnet-nonat-173" #173: deleting IKE SA for connection 'road-eastnet-nonat-173' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-173' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-173 | State DB: deleting IKEv2 state #173 in PARENT_I1 | parent state #173: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 425 time elapsed 0.000998 seconds | (#425) spent 1 milliseconds in crypto helper computing work-order 425: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 425 for state #425 to event queue | scheduling resume sending helper answer for #425 | libevent_malloc: new ptr-libevent@0x7fb37c02eef0 size 128 | crypto helper 10 waiting (nothing to do) | stop processing: state #173 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | in statetime_stop() and could not find #173 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-173 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-173" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-173' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-173" | stop processing: connection "road-eastnet-nonat-173" (in initiate_a_connection() at initiate.c:349) | spent 0.0729 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #425 | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 425 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #425 | **emit ISAKMP Message: | initiator cookie: | f7 cf 50 4a 74 06 05 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-173 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0a 92 89 d6 89 4e 50 5f b7 2f 6b 96 d5 81 21 07 | ikev2 g^x ab 44 17 58 90 1d 7b 64 81 e9 17 d7 bd fe aa 4b | ikev2 g^x 0a 10 ad 93 a3 c3 87 5f f5 66 29 fb c9 3a c9 b1 | ikev2 g^x 31 b0 a9 ee c4 90 84 b7 e6 dd 91 e8 75 48 e7 2e | ikev2 g^x 93 2f d6 a2 f7 4b f6 49 3f d9 f6 d0 5a d6 d1 dd | ikev2 g^x 4f 9d c2 ed c5 18 e2 07 13 e3 28 e5 ef cc 0a 8a | ikev2 g^x 3b 35 e0 3e 37 bc 79 9f 2a 04 4a f3 9c f9 c1 fe | ikev2 g^x 06 93 6a fc 31 07 8c 82 e2 3d 36 5b 4c 64 57 29 | ikev2 g^x 42 03 5c 40 11 83 46 58 6b 89 40 fb 97 9c 72 d8 | ikev2 g^x 16 d1 a0 21 3d 63 55 3f 12 ce 3e bc a1 a4 b1 4f | ikev2 g^x 21 3c 91 be 83 c8 57 a7 2b 28 e1 48 64 02 57 7e | ikev2 g^x 42 a3 f1 45 48 e1 db 05 2e fb d4 4c 7c 8a 0a 60 | ikev2 g^x 5f f4 86 80 46 9a e0 d0 18 11 1a 4d bb 7c 02 87 | ikev2 g^x bf 2e e0 bb 87 e9 5f b8 47 04 4d f1 27 cf b3 29 | ikev2 g^x 9c 1a d0 ad 05 bc 03 0c 16 0c 3a 7e 72 1b 12 70 | ikev2 g^x b9 a4 26 8b 78 5c b2 39 ba 99 5c 08 5d fd 0b bd | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5f 48 0d c0 35 2d 82 0c 4e 37 c0 2d fb 4b f1 c7 | IKEv2 nonce 3e 7f d8 da d2 4b 1d 20 b9 ad b0 f8 d9 af 0c f6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f7 cf 50 4a 74 06 05 45 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ad | natd_hash: port= 01 f4 | natd_hash: hash= 10 91 c4 e4 6c ee a0 d8 c3 62 ab 89 a1 7e a7 1c | natd_hash: hash= b9 03 c3 d0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 10 91 c4 e4 6c ee a0 d8 c3 62 ab 89 a1 7e a7 1c | Notify data b9 03 c3 d0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f7 cf 50 4a 74 06 05 45 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 62 01 4a 70 10 9c f9 53 26 65 4b 23 2c 02 6b 53 | natd_hash: hash= 25 3b 71 4a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 62 01 4a 70 10 9c f9 53 26 65 4b 23 2c 02 6b 53 | Notify data 25 3b 71 4a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #425 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #425: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #425 to 4294967295 after switching state | Message ID: IKE #425 skipping update_recv as MD is fake | Message ID: sent #425 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-173" #425: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.173:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #425) | f7 cf 50 4a 74 06 05 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 92 89 d6 89 4e 50 5f b7 2f 6b 96 d5 81 21 07 | ab 44 17 58 90 1d 7b 64 81 e9 17 d7 bd fe aa 4b | 0a 10 ad 93 a3 c3 87 5f f5 66 29 fb c9 3a c9 b1 | 31 b0 a9 ee c4 90 84 b7 e6 dd 91 e8 75 48 e7 2e | 93 2f d6 a2 f7 4b f6 49 3f d9 f6 d0 5a d6 d1 dd | 4f 9d c2 ed c5 18 e2 07 13 e3 28 e5 ef cc 0a 8a | 3b 35 e0 3e 37 bc 79 9f 2a 04 4a f3 9c f9 c1 fe | 06 93 6a fc 31 07 8c 82 e2 3d 36 5b 4c 64 57 29 | 42 03 5c 40 11 83 46 58 6b 89 40 fb 97 9c 72 d8 | 16 d1 a0 21 3d 63 55 3f 12 ce 3e bc a1 a4 b1 4f | 21 3c 91 be 83 c8 57 a7 2b 28 e1 48 64 02 57 7e | 42 a3 f1 45 48 e1 db 05 2e fb d4 4c 7c 8a 0a 60 | 5f f4 86 80 46 9a e0 d0 18 11 1a 4d bb 7c 02 87 | bf 2e e0 bb 87 e9 5f b8 47 04 4d f1 27 cf b3 29 | 9c 1a d0 ad 05 bc 03 0c 16 0c 3a 7e 72 1b 12 70 | b9 a4 26 8b 78 5c b2 39 ba 99 5c 08 5d fd 0b bd | 29 00 00 24 5f 48 0d c0 35 2d 82 0c 4e 37 c0 2d | fb 4b f1 c7 3e 7f d8 da d2 4b 1d 20 b9 ad b0 f8 | d9 af 0c f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 91 c4 e4 6c ee a0 d8 c3 62 ab 89 | a1 7e a7 1c b9 03 c3 d0 00 00 00 1c 00 00 40 05 | 62 01 4a 70 10 9c f9 53 26 65 4b 23 2c 02 6b 53 | 25 3b 71 4a | state #425 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c0407f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a28ab0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #425 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 | #425 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49677.75385 | resume sending helper answer for #425 suppresed complete_v2_state_transition() and stole MD | #425 spent 0.506 milliseconds in resume sending helper answer | stop processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c02eef0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 cf 50 4a 74 06 05 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #425 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #425 | rejected packet: | f7 cf 50 4a 74 06 05 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ad fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #425: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.068 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #395 | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #395 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #395 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49677.759064; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002958 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c040840 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #395 | libevent_malloc: new ptr-libevent@0x7fb34c00cf80 size 128 "road-eastnet-nonat-143" #395: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #395) | ba 7b 3c 0c 6c 47 ed ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 88 4c 55 7e d1 a2 38 a3 4d 34 44 bf 98 52 f4 22 | 2b 2e d7 52 9d e2 60 32 f1 e9 de 11 e6 81 90 27 | 7f aa b4 cd 92 c7 cc 0a 99 86 49 e0 e9 e5 7f c7 | 53 00 84 30 c4 2b a1 40 94 2b e5 13 32 e0 cc 77 | 9f 67 6c cf 30 e7 4a c4 94 da 5f 5f 42 9a ce 83 | 94 65 21 10 2f c8 9d e9 90 7c c8 a2 24 10 5f eb | b7 e4 01 18 df 72 f4 7a bb ab 13 f9 5e 78 3b bb | fa c9 e1 75 55 1d c1 7d 77 9c f5 dd 9c f1 6d cf | 64 15 f4 f8 06 12 d8 2b 76 e9 8f 68 61 57 5e f9 | ce b7 25 0f 70 50 5b 08 f7 40 3f 01 f6 b5 a6 1b | 6a b5 fe b6 73 a7 04 b2 74 dc 3e 4a 46 a2 06 81 | 11 ce 3e 21 33 d9 a8 2a ee 54 b5 69 d8 57 77 1f | dc ec 39 32 06 54 92 6d 8f 0a ca d2 fd fd bd fb | 1b 7c 6a b6 6b 55 6f cb c2 b7 b7 fb e7 79 1c 7d | c3 44 5b 72 2c bc 4f 59 92 b8 bc 2a d4 d1 be 0f | 33 95 9e 53 f7 bf 90 2f bf b1 8e 5f 51 a1 8b aa | 29 00 00 24 bd 0e 20 29 4b d5 e3 ae 9c 68 67 e1 | 41 5b 48 5c 33 08 9f 5c 1f 4f 9e 6e c3 72 5b 33 | 2c ad 1f 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b1 4d 21 6f 15 00 d4 49 f9 94 84 2e | 85 71 98 cf 82 ff b0 a3 00 00 00 1c 00 00 40 05 | 8a 38 a6 07 76 28 82 e1 53 d4 45 b3 59 f3 34 be | 83 20 f5 6d | libevent_free: release ptr-libevent@0x7fb3700300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #395 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 7b 3c 0c 6c 47 ed ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #395 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #395 | rejected packet: | ba 7b 3c 0c 6c 47 ed ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #395: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd80 | handling event EVENT_RETRANSMIT for parent state #418 | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #418 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #418 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49677.773405; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500651 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #418 | libevent_malloc: new ptr-libevent@0x7fb3700300e0 size 128 "road-eastnet-nonat-166" #418: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #418) | 1c 58 36 d0 b8 a0 d1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 21 69 13 ea 9b 51 f5 f8 3d bc 58 75 ed a9 fd | 17 d1 ac 45 30 9e bb dc f5 67 d6 33 5f f9 21 3b | d7 08 0c bd e4 4c bf b2 e0 66 df d2 39 12 b4 cd | 51 1d 79 99 b2 28 9d 92 25 3d de c7 de 50 60 c0 | b1 e7 b1 2f 20 ba 56 e0 cc d5 d3 89 fb f3 3a 69 | 08 b8 19 34 ad 51 11 33 2c 83 6c 01 df 40 a9 5a | d2 8e ac 81 f5 73 32 a5 92 89 d9 43 53 9f d1 60 | 24 f6 18 43 4f b2 cc 04 87 ab 6f 28 3d 9c e1 be | 1d b6 6f 40 8a 39 f7 27 97 65 7c fa 70 bb d3 47 | 6d aa 41 65 fd 87 5b bf 5a 85 1c ca 2d 31 4b 63 | 3b 57 1d 34 66 19 31 70 16 5e 12 2a 4b 3c f3 aa | c7 b4 1f b1 9b ff 71 77 21 47 b5 ee 99 1f 02 09 | 95 71 68 b7 06 9b 0f 65 04 ee a4 b9 3b 45 42 02 | 7d d2 87 0e 66 c1 75 4c ff 7a f3 83 39 de 46 b2 | 20 fd 8a d9 22 4f c4 77 47 fd 4b 1b 01 cf 2f ef | dc 02 1e 19 bc 0a 3d 9b 32 25 8e a1 b4 27 34 08 | 29 00 00 24 1a d8 6e 71 ca d7 ba 26 1e 49 f1 5f | c1 b0 03 8a 8a 69 67 55 4a ef 6c 1a 26 5d 01 35 | 4b 44 6d e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 63 ba bc 17 58 ec 8f 3d 47 af 87 | d9 d9 f5 4c 16 0e 40 2b 00 00 00 1c 00 00 40 05 | 0c c9 6a 54 72 2b 9b 5b 7b 1a a4 b5 a9 4f 1c b9 | a1 57 0c cc | libevent_free: release ptr-libevent@0x7fb37c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd80 | #418 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c 58 36 d0 b8 a0 d1 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #418 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #418 | rejected packet: | 1c 58 36 d0 b8 a0 d1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #418: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.07 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #366 | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #366 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #366 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49677.787775; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003655 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #366 | libevent_malloc: new ptr-libevent@0x7fb37c04b7c0 size 128 "road-eastnet-nonat-114" #366: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #366) | 3c e6 10 56 de c7 50 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 fc d0 2b 58 ad f1 9a aa 82 c0 57 ae f0 46 70 | a2 7b 22 23 65 30 fe 9c 0d f5 dc 40 c0 ca 9d ee | 6e 66 1d 3a 72 fe dc 88 4a 26 55 69 91 41 bf 12 | 90 50 78 9a 3c 37 7a d2 58 65 01 98 28 27 ba 6d | 00 33 b4 2e 8f 98 78 f3 cd 21 f0 18 dd 51 cb 68 | 4f 92 9d 38 c4 06 c1 6c cf 60 41 a1 18 22 f2 93 | 34 0c 55 d7 b5 30 6c c4 9c ad 0a aa 9b 11 9f 59 | 49 ac e6 72 dc 82 61 fc 42 ea d8 0b 5d 7d f2 47 | 0f e6 10 b9 1d c6 85 40 80 3f b3 ee 0f dc 82 fa | 53 40 f0 d9 23 6a 65 60 f3 d7 02 47 6c 0a 6f 61 | 8d 04 17 7d 94 9e 17 80 39 4f b5 db 2d a0 f8 02 | 18 21 68 7d 0e af 20 98 75 39 40 4d 5d 87 d7 7b | 4c 39 3b 20 a9 65 05 04 46 a1 49 0b d9 6d 8f 15 | 4f b4 23 1a 8e 5f 27 66 f0 b0 a6 bd 48 dc 96 c2 | 77 e2 b0 72 b6 2c 19 2f 16 65 ef 29 dd a3 4a de | 9a 82 38 c8 cb 37 99 80 5e bb 4b 53 97 7b f3 fa | 29 00 00 24 7a ad 39 64 9f ec c1 f8 33 94 44 40 | f7 c9 dd b2 6b e5 21 16 26 39 73 9d cd 0b f5 7a | f4 93 09 bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 12 7d c7 e4 80 f6 ae d0 f3 0f 94 | c9 99 cc 19 2a ad fe 8d 00 00 00 1c 00 00 40 05 | 84 74 fa e2 ee 48 6b 8a 7f a7 09 f6 4e 00 6d 26 | 52 0f f6 08 | libevent_free: release ptr-libevent@0x7fb34c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | #366 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c e6 10 56 de c7 50 ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #366 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #366 | rejected packet: | 3c e6 10 56 de c7 50 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #366: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38800feb0 | handling event EVENT_RETRANSMIT for parent state #313 | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #313 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #313 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49677.79006; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004697 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #313 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 "road-eastnet-nonat-61" #313: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #313) | 5f e0 5b 3a aa b2 0d 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 72 14 0f 17 54 5f cc c5 98 fb 35 26 a3 92 e2 | 11 a3 ad ea c4 71 33 c5 3b 09 0d 86 8a ef c9 16 | 41 6e 6e 33 c5 10 cc f1 5e 47 e9 ca 13 f8 ee 4f | 37 f9 0e ac 70 04 12 68 e2 ae b0 7b dd cb cb ab | d1 0b 9f 48 8f e3 3e b7 e3 65 ca 3d b0 79 98 5c | d4 18 e2 6e 8f 62 4a 4d 34 e2 ac f2 57 5e 56 f3 | 96 24 71 ed eb 39 5a 9f 4d 0a 51 e3 f2 80 2e 9c | c7 e3 0a d7 46 cd 62 d8 70 57 a4 15 e0 2e 57 82 | 00 9c 85 fc cc fb ec 67 7d 2f f7 de 8d 85 b7 9a | ae 6a 14 45 c8 4f c3 df 8d 60 30 87 57 0e a1 b0 | 8b bf f6 18 27 37 f1 3e 81 c1 ec 19 9b f6 db 06 | 57 00 87 5d ef 1f e5 81 9a 44 f2 c0 14 62 b9 b1 | a3 5a 63 7e 11 93 6f 2a 71 ae af 90 3a 04 4e 7a | a3 7a 98 c8 8a bb b2 5a a5 8c d5 d7 51 2b fa cf | d5 ea ac 65 e9 8c f9 24 80 81 e7 38 45 fd 2e f5 | 33 21 e2 b5 ea 65 8b be be 31 9f 87 b8 9f 6c 5b | 29 00 00 24 50 24 81 a9 b8 a1 9e c5 6d 65 2e b2 | 7c 32 12 aa 77 af 34 a7 17 a7 54 1f 7b 13 4b 11 | 43 e0 57 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e d7 79 da 83 ae 02 6d 20 64 f0 64 | 33 fe 2f 85 1b 7e 43 e4 00 00 00 1c 00 00 40 05 | bb f1 5c c9 25 91 06 ec a8 bd 6e 4b ab 50 48 3a | 1c ac 06 f7 | libevent_free: release ptr-libevent@0x7fb384032b00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800feb0 | #313 spent 0.0873 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f e0 5b 3a aa b2 0d 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #313 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #313 | rejected packet: | 5f e0 5b 3a aa b2 0d 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #313: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.04 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0eac0 | handling event EVENT_RETRANSMIT for parent state #411 | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #411 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #411 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49677.823296; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001541 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800feb0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #411 | libevent_malloc: new ptr-libevent@0x7fb384032b00 size 128 "road-eastnet-nonat-159" #411: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #411) | dd dd 24 eb b8 cb 50 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd cd 4b b5 b6 e7 18 30 d4 d0 8e 83 03 53 e6 4e | 8d 99 24 ba 33 2f 0c bd fc e2 e9 0d 81 68 aa 7b | 12 93 68 9f 91 0d c2 fa e1 b9 83 26 f0 5b 9b dd | 51 e3 9e ed 34 ea 5f c9 93 72 24 b6 bd 13 cb 5c | 26 fe cc 72 6c e7 c6 21 ed 4e 14 b2 9f a3 3b 3c | 94 f8 1a 98 76 bb 57 e6 0d a9 bd 26 b1 18 3d 50 | 59 31 42 4b 06 7d ba db 70 1e 1c ae a8 d8 de 3a | 81 ee 27 6d 40 cc 4d 6a 4b fc 36 c4 b0 3a 09 0b | 48 47 43 74 dd e5 cb 90 df 6e e3 46 c3 6c 8b 97 | f3 25 7f d4 fd ec f5 56 ff 6b 80 d1 67 dc c0 79 | 70 cf 38 a2 35 5f 37 c9 04 ae 98 e9 6e f3 26 d3 | 47 94 bb 03 5d 71 7b 87 ad 54 4b 93 a3 b0 71 8f | 5f 69 b0 8d 69 3f e2 c0 02 32 57 3f 64 cb 19 71 | 58 00 09 d8 ce 8f 64 c9 55 9e 7c 00 26 28 eb f7 | 6f eb 0e ab 01 fb ae c5 0f da bd 30 07 46 c2 b0 | 5c ea 05 eb 2d 3f 40 91 20 c1 a3 5a 4f 86 98 86 | 29 00 00 24 a3 6a 54 81 57 a4 87 e3 a7 7a 68 dd | 8e 44 5b 6e 2b 5e f0 9a 3e c5 72 e8 17 f4 34 1c | 65 bd e7 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f a2 a7 20 75 c6 9d 9f 5f af fe db | d7 0a 3e e1 5c 28 6c 20 00 00 00 1c 00 00 40 05 | 37 57 74 7e fa 8f cf 8f 09 51 1f a5 a7 dc 5e 89 | 60 7b 2d b3 | libevent_free: release ptr-libevent@0x7fb35c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0eac0 | #411 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34000d120 | handling event EVENT_RETRANSMIT for parent state #174 | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #174 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #174 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49677.823471; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.011172 exceeds limit? YES "road-eastnet-nonat-174" #174: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-174" #174: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #426 at 0x557d46ac0800 | State DB: adding IKEv2 state #426 in UNDEFINED | pstats #426 ikev2.ike started | Message ID: init #426: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #426: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #426; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-174" #426: initiating v2 parent SA to replace #174 | using existing local IKE proposals for connection road-eastnet-nonat-174 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 426 for state #426 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0eac0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #426 | libevent_malloc: new ptr-libevent@0x7fb35c04b850 size 128 | #426 spent 0.0825 milliseconds in ikev2_parent_outI1() | RESET processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #174 ikev2.ike failed too-many-retransmits | pstats #174 ikev2.ike deleted too-many-retransmits | #174 spent 2.25 milliseconds in total | [RE]START processing: state #174 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-174" #174: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #174: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #174 "road-eastnet-nonat-174" #174: deleting IKE SA for connection 'road-eastnet-nonat-174' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-174' added to the list and scheduled for 0 seconds | crypto helper 14 resuming | crypto helper 14 starting work-order 426 for state #426 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 426 | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-174 | State DB: deleting IKEv2 state #174 in PARENT_I1 | parent state #174: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #174 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb340012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000d120 | in statetime_stop() and could not find #174 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 426 time elapsed 0.000579 seconds | (#426) spent 0.599 milliseconds in crypto helper computing work-order 426: ikev2_outI1 KE (pcr) recvmsg: received truncated IKE packet (MSG_TRUNC) | crypto helper 14 sending results from work-order 426 for state #426 to event queue | **parse ISAKMP Message (raw): | scheduling resume sending helper answer for #426 | libevent_malloc: new ptr-libevent@0x7fb370029490 size 128 | initiator cookie: | dd dd 24 eb b8 cb 50 15 | responder cookie: | 00 00 00 00 00 00 00 00 | crypto helper 14 waiting (nothing to do) | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #411 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #411 | rejected packet: | dd dd 24 eb b8 cb 50 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9f 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #411: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0744 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-174 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-174" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-174' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-174" | stop processing: connection "road-eastnet-nonat-174" (in initiate_a_connection() at initiate.c:349) | spent 0.062 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #426 | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 426 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #426 | **emit ISAKMP Message: | initiator cookie: | 9a cd 73 8e 7d d4 98 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-174 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 98 8c 97 9a 7b 25 95 00 9a 77 62 32 ef ca 9f d6 | ikev2 g^x 76 8f c1 1d 7b f7 f1 fd 6f 49 39 37 2f 63 23 81 | ikev2 g^x 71 66 7a 84 28 0c 71 94 62 69 ce 59 2d d7 c5 69 | ikev2 g^x 55 1a 91 d5 7e 6b 73 77 b1 63 3d e2 98 99 4c 7d | ikev2 g^x 88 69 a7 7b 5e bc cc b8 0e b3 73 c2 2e 32 ae 8e | ikev2 g^x 86 79 03 81 0b 4c 54 b4 73 a6 e2 6e 97 ca 67 d3 | ikev2 g^x 85 98 35 01 61 ca 66 d6 14 1b 0e ed 3a 29 6c 85 | ikev2 g^x ba 28 d6 d7 db e6 44 77 a6 ce 5b 46 99 7c a1 df | ikev2 g^x 78 8d f1 17 d8 0f f9 ea 99 30 fc e2 cf b2 41 e0 | ikev2 g^x b2 47 0b 49 32 f7 03 99 56 d9 28 c3 7a 54 f6 02 | ikev2 g^x 19 cd 98 7b 73 22 d4 cd 39 3f 7a 0d d8 d7 cd a6 | ikev2 g^x 8a 6b 30 16 cd 73 f2 96 6c 21 9f bd 4e e5 1b e4 | ikev2 g^x 55 08 4d 75 fb 1c cb 36 33 b5 70 97 3d ae 1c 0b | ikev2 g^x fd 17 d6 8a db a7 4c eb 93 47 b3 25 b1 c8 9d b9 | ikev2 g^x 3c fc 99 0e e7 eb 29 07 c1 90 16 1e 24 76 3c e1 | ikev2 g^x f0 b6 2f 6d 76 8c 81 1b 13 f1 8a 90 f5 6f 06 29 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9e 79 2e b7 2a 97 cc 4e 5e 3a 53 a1 14 f4 9d f2 | IKEv2 nonce e0 f1 3a 21 7a b3 38 2d 77 ac 99 ad 8b c3 54 da | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9a cd 73 8e 7d d4 98 03 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ae | natd_hash: port= 01 f4 | natd_hash: hash= b4 36 a3 f8 78 1e 60 6d 59 1a 44 b3 39 63 64 a7 | natd_hash: hash= a1 bd a5 d0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b4 36 a3 f8 78 1e 60 6d 59 1a 44 b3 39 63 64 a7 | Notify data a1 bd a5 d0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9a cd 73 8e 7d d4 98 03 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 8b d1 e6 ab 49 4a f3 b9 19 1d c0 80 f7 d0 cb 97 | natd_hash: hash= 3f 74 7f 21 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8b d1 e6 ab 49 4a f3 b9 19 1d c0 80 f7 d0 cb 97 | Notify data 3f 74 7f 21 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #426 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #426: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #426 to 4294967295 after switching state | Message ID: IKE #426 skipping update_recv as MD is fake | Message ID: sent #426 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-174" #426: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.174:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #426) | 9a cd 73 8e 7d d4 98 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 8c 97 9a 7b 25 95 00 9a 77 62 32 ef ca 9f d6 | 76 8f c1 1d 7b f7 f1 fd 6f 49 39 37 2f 63 23 81 | 71 66 7a 84 28 0c 71 94 62 69 ce 59 2d d7 c5 69 | 55 1a 91 d5 7e 6b 73 77 b1 63 3d e2 98 99 4c 7d | 88 69 a7 7b 5e bc cc b8 0e b3 73 c2 2e 32 ae 8e | 86 79 03 81 0b 4c 54 b4 73 a6 e2 6e 97 ca 67 d3 | 85 98 35 01 61 ca 66 d6 14 1b 0e ed 3a 29 6c 85 | ba 28 d6 d7 db e6 44 77 a6 ce 5b 46 99 7c a1 df | 78 8d f1 17 d8 0f f9 ea 99 30 fc e2 cf b2 41 e0 | b2 47 0b 49 32 f7 03 99 56 d9 28 c3 7a 54 f6 02 | 19 cd 98 7b 73 22 d4 cd 39 3f 7a 0d d8 d7 cd a6 | 8a 6b 30 16 cd 73 f2 96 6c 21 9f bd 4e e5 1b e4 | 55 08 4d 75 fb 1c cb 36 33 b5 70 97 3d ae 1c 0b | fd 17 d6 8a db a7 4c eb 93 47 b3 25 b1 c8 9d b9 | 3c fc 99 0e e7 eb 29 07 c1 90 16 1e 24 76 3c e1 | f0 b6 2f 6d 76 8c 81 1b 13 f1 8a 90 f5 6f 06 29 | 29 00 00 24 9e 79 2e b7 2a 97 cc 4e 5e 3a 53 a1 | 14 f4 9d f2 e0 f1 3a 21 7a b3 38 2d 77 ac 99 ad | 8b c3 54 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 36 a3 f8 78 1e 60 6d 59 1a 44 b3 | 39 63 64 a7 a1 bd a5 d0 00 00 00 1c 00 00 40 05 | 8b d1 e6 ab 49 4a f3 b9 19 1d c0 80 f7 d0 cb 97 | 3f 74 7f 21 | state #426 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c04b850 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0eac0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #426 | libevent_malloc: new ptr-libevent@0x7fb35c04b850 size 128 | #426 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49677.824817 | resume sending helper answer for #426 suppresed complete_v2_state_transition() and stole MD | #426 spent 0.432 milliseconds in resume sending helper answer | stop processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb370029490 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a cd 73 8e 7d d4 98 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #426 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #426 | rejected packet: | 9a cd 73 8e 7d d4 98 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ae fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #426: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0574 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #396 | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #396 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #396 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49677.837993; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004331 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37000d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #396 | libevent_malloc: new ptr-libevent@0x7fb370029490 size 128 "road-eastnet-nonat-144" #396: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #396) | 34 3a ea ba b4 d5 c3 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 b3 5e a9 7f 93 97 83 00 ac b3 90 fb e7 f1 78 | 95 aa f1 ba 36 2b 6d a3 37 11 74 f8 88 50 3b b9 | 5f 0f a0 79 72 f7 39 e7 3a 2c a8 e0 53 9b be fd | fc bd 96 c1 32 d9 24 ce f7 06 60 ff b3 43 45 a6 | 24 b9 a3 f5 cb 0e b9 aa aa 8e 8f d1 f4 f2 6e c0 | 2d cf 97 8a 96 4c c9 d9 fa 9b b2 4f 23 e7 4e 04 | 32 38 36 77 bf 5c cc 5e 9d b8 9a 89 95 85 a0 cd | 38 05 64 bb 18 47 79 4a 9e e0 36 97 2c 58 a9 ca | 05 7e fc 24 b9 aa 44 5a 5a 1a 01 53 4f 6b 25 9c | 0b 57 f1 a9 6c 20 f6 40 eb 60 95 56 91 d3 93 3b | e3 6f 55 d6 2d 80 8e 1b 25 11 49 ca e7 6a 57 76 | 46 38 51 f8 26 5f df d7 e7 dc 81 fb 26 f9 44 9d | 73 c6 16 4c 9f 24 d8 42 a4 b9 bf 36 76 cf 2d c1 | 81 f5 6e 1c 27 05 14 9e 74 b9 a7 24 89 53 2b 8a | e5 d2 6e 23 b8 62 43 c8 68 d3 55 8e 35 2d 54 67 | 77 ed 1c 39 ec 49 32 f8 1f c9 68 6b 34 67 a6 5c | 29 00 00 24 70 3a 86 3e 59 bb d0 ee e5 b9 db 1d | c8 9a e2 55 5b 79 c1 c3 66 32 3d 49 47 3b f1 44 | bc b6 4a ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 b0 29 ea 4a 03 79 05 a6 d6 5d 03 | 24 78 07 cd 73 8e b4 4c 00 00 00 1c 00 00 40 05 | cb 86 b2 db 9b fe 49 fd e2 3b b4 79 c3 f9 fd 58 | 79 48 29 02 | libevent_free: release ptr-libevent@0x7fb348023e80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #396 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 3a ea ba b4 d5 c3 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #396 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #396 | rejected packet: | 34 3a ea ba b4 d5 c3 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #396: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a70b50 | handling event EVENT_RETRANSMIT for parent state #419 | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #419 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #419 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49677.839254; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.49991 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #419 | libevent_malloc: new ptr-libevent@0x7fb348023e80 size 128 "road-eastnet-nonat-167" #419: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #419) | 13 42 1a 05 2a a9 f4 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 82 ba 57 e5 18 7f 6d c1 4e 6c 32 74 c7 8d bc | fa 9e 5f 85 57 91 bd e7 d1 f6 a5 cc 56 d4 ef 2c | 82 2b a5 62 6a 68 41 f0 a0 92 fa 2e 12 6a 74 95 | 56 98 09 32 67 8d a9 cf ce e8 4b 16 ca ae fd 57 | 33 7d 99 6a 29 1d 52 35 0b 5c 55 de 21 8b fe 4c | 64 ea 17 c4 c0 64 cd 47 31 4b 7a 08 f8 bd 37 3f | 72 ba 30 cd 0e c2 9d 0f e4 8b 3f b8 4c 2a d4 69 | de 4a 7f 8a a8 eb c0 7f 8f b2 10 0b d8 35 aa 5e | c8 ac 23 ce e4 c8 52 08 91 9c 13 ce 38 17 f1 d8 | db ec 31 93 d6 0d 09 93 5b d1 dc 9c 92 3b e5 29 | 17 5b e6 ee 7f f5 fb 3d 38 b5 23 c0 cf 25 d5 5b | 67 0a 2b 07 fd 68 8f 4c 74 c9 96 0b 9b 44 5c 6b | 0e 2d 70 4b 98 d5 d7 b9 54 dc 11 1e 19 cb 73 3f | 22 ca 80 46 28 a8 4a 20 64 29 4c 39 a5 b7 25 84 | 93 fd 4d 3a a6 fa ab c2 68 fc 5d fb 3c 7c 06 72 | eb 28 8a f5 09 69 59 c1 01 26 88 c4 c6 36 f6 6c | 29 00 00 24 83 3f e0 e8 30 90 0c c2 fd 9a 5c 8a | 88 7b e1 27 5d 3c cc 26 1c 41 3f 95 a3 1e 69 69 | b9 67 17 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 b9 c0 cf 3f 29 65 8b 9d 3a 51 6d | 0f 16 20 c0 79 fc 1d 37 00 00 00 1c 00 00 40 05 | 67 f3 84 dc 78 2e 75 89 44 b5 31 a8 97 13 e9 a5 | b9 b4 3a e4 | libevent_free: release ptr-libevent@0x7fb35001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b50 | #419 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 13 42 1a 05 2a a9 f4 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #419 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #419 | rejected packet: | 13 42 1a 05 2a a9 f4 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #419: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0546 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a86b80 | handling event EVENT_RETRANSMIT for parent state #367 | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #367 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #367 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49677.848539; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00368 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b50 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #367 | libevent_malloc: new ptr-libevent@0x7fb35001d920 size 128 "road-eastnet-nonat-115" #367: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #367) | 4a 87 68 98 60 e9 4c f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 0c 97 07 ab 60 f0 87 17 3b e3 ad e6 c0 a4 f8 | bc d0 84 fc 55 d2 65 d6 9f 46 ab 63 b9 cd 86 a7 | 92 52 2d 61 57 c8 33 96 bd 3f e7 29 4c c0 56 81 | 07 2c a6 2e b4 e1 f4 a2 f9 92 52 0a 37 04 e4 51 | 6e 83 7a 8b f6 b0 a9 33 fc 7e 63 8b 04 cb e8 b1 | 89 da ba 9d 79 52 4b 77 ad fe 01 ca be 34 71 25 | 01 b7 c6 b7 a4 d2 8b 5a 4f 28 3e 3a 2c 2d 2b 82 | b6 7f 76 80 3a 8d 21 5e c2 27 da 9c 35 b4 28 8d | 4f 12 52 38 3a d3 0a 5c 8a f9 8f 79 8d 25 d4 f8 | ed f0 27 a3 9a 91 9a 23 17 a2 c5 fb 5c 81 c7 3f | d7 90 16 5d 16 d9 fd c2 ab 94 11 66 13 b9 42 50 | 61 f5 f7 53 fa 66 74 a0 35 1a 38 cb 76 13 72 7a | 71 f8 95 99 2b 70 57 e9 96 87 e1 a7 fa 09 46 16 | 2d 17 ab 0f b3 e3 6d 7d c4 71 f7 b9 01 3d 53 ec | 89 99 23 9b ed fe dc 3d 96 90 a5 f1 6b a2 7c ad | 08 22 28 21 90 c0 9d 24 98 36 19 8c 8e 5f 64 f3 | 29 00 00 24 cc 21 72 ec 84 1b 6c bc be 58 98 1b | fd b2 70 93 97 ae 8a 73 25 e3 f3 ed 6f 6f ad a0 | a3 bc 74 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 20 17 ba 74 ed cb 3d 19 9d 8d 0a | 7d 3c 02 99 ce fc 27 96 00 00 00 1c 00 00 40 05 | be d4 1c 69 d6 46 df 94 c0 c1 0d 02 c5 30 14 7a | ff f7 b4 bf | libevent_free: release ptr-libevent@0x7fb35401a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a86b80 | #367 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 87 68 98 60 e9 4c f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #367 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #367 | rejected packet: | 4a 87 68 98 60 e9 4c f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #367: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aeb540 | handling event EVENT_RETRANSMIT for parent state #314 | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #314 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #314 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49677.85783; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005035 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a86b80 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #314 | libevent_malloc: new ptr-libevent@0x7fb35401a4e0 size 128 "road-eastnet-nonat-62" #314: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #314) | fd 31 72 f9 64 d3 9c f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 18 14 ac 93 72 6f f5 79 79 36 2d 8e 4c 14 ac | ea 91 ec 03 06 fb 84 ad 5e 18 85 94 4b b8 8e ee | d9 14 0b 8c 64 c8 45 95 1b 91 75 07 f8 e4 ec 03 | 59 35 93 6c 10 48 ab 6b e6 53 29 72 ab ff 3c 2a | 61 16 cb b8 bd 31 a5 f8 2f 5d 57 58 e1 26 7c 2e | d9 c7 b7 a4 21 ac 7f a4 9a 22 28 50 e4 1d c5 8c | 89 bc f7 70 40 e3 4f 71 2a 2a 2e b1 a7 96 2a 7a | 82 34 1a e1 0e c4 48 55 41 7f 5a 8b 68 d2 fd 14 | f7 10 c0 e4 c1 ac fb 5d c6 f8 34 c9 0a 71 0c 1d | 4f 2b 4a ae bd 22 c4 9a db 63 e4 0a ff 3d 5a f9 | dc 19 2e 9a 16 8d df 98 1f 04 7e 59 57 62 0a e6 | b9 93 59 94 b4 3b eb 70 b1 7b 76 4b 9a 71 ee 97 | f5 ac 50 38 4c 04 22 68 a2 68 e3 f1 1d 13 3a e1 | 84 4b 7c 08 19 fb 96 e3 58 71 59 95 c0 bd 55 f5 | 0d 72 3b 29 f3 ae 58 91 30 ad de 16 a2 e3 03 a0 | 02 e9 38 39 b8 a1 6a 55 c4 1d 22 81 8d d1 2c eb | 29 00 00 24 83 8f 4c 82 0e ff 5a 2c de 21 68 5e | 60 c0 57 92 a6 09 5b 7e 12 e1 2a 75 9d 50 83 dd | e3 d1 6f 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 7f 92 43 99 76 22 ce 79 dc 92 3a | aa fb 36 5e 79 bf 23 b0 00 00 00 1c 00 00 40 05 | e5 74 71 ef f2 a4 7e f6 0b b1 36 a7 2f ae f3 30 | ad 50 42 06 | libevent_free: release ptr-libevent@0x7fb37c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aeb540 | #314 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 31 72 f9 64 d3 9c f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #314 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #314 | rejected packet: | fd 31 72 f9 64 d3 9c f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #314: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350040840 | handling event EVENT_RETRANSMIT for parent state #412 | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #412 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #412 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49677.881144; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00233 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aeb540 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #412 | libevent_malloc: new ptr-libevent@0x7fb37c035930 size 128 "road-eastnet-nonat-160" #412: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #412) | af 34 f0 93 1d 1b d6 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 73 ca 82 d1 b8 25 7f 04 b5 f2 f7 30 87 a9 41 | a5 4a c9 0d a4 7b 88 6a 9c a7 a5 05 c4 99 82 97 | fe 18 55 31 1a 69 24 11 ef 96 2b 9b 00 09 64 93 | f5 9b 6f 9f 26 02 b8 02 eb ec d6 b9 58 77 37 c4 | 15 13 55 d4 ba a0 8c 70 db 9d 5d b8 50 b2 fb 14 | 70 91 27 3f 52 b9 21 d5 ac 35 9f 2f 74 c2 cd a3 | f5 0a 60 3b 9e 8f df b1 5a c8 44 f1 32 14 8d c9 | 96 70 54 8d 6a b3 1d 9e 55 f7 54 39 be 48 72 05 | 31 be c1 bc a2 b1 92 d9 d7 2b ac 35 4b a3 d1 85 | c8 13 0e 09 13 01 9b 53 39 df da 51 e3 f0 0f b0 | b8 cb 35 90 8d 85 96 9f 9a 47 73 3d e9 c6 9a 9b | 64 e5 27 2a 0d 1b 39 d0 c9 ca 54 89 58 ae ef 63 | 30 57 d5 95 13 d6 7b 07 db 4c 1f 26 15 fc 42 93 | 98 20 27 df a5 2d d6 c3 03 e8 40 00 9e a8 d6 5b | d9 5c 3b 12 b9 90 e7 25 5f 47 7e 86 19 c6 bc 15 | 0b 47 49 10 46 90 3e a8 79 f3 d0 fc 23 1f c9 d1 | 29 00 00 24 a3 90 3f ea a1 9a ff 04 92 34 17 b8 | 6f ef 29 47 17 37 0c c0 67 c5 c5 dd ee 94 92 f1 | d0 ea b7 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 8b 79 f3 42 b6 33 1b 9b 02 cf 5d | 36 ad 4c 1f 32 b9 37 c2 00 00 00 1c 00 00 40 05 | a6 ab fb 7e 68 25 b5 32 b3 ef df 3a 19 eb c4 3f | d0 c1 29 ec | libevent_free: release ptr-libevent@0x7fb35001fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350040840 | #412 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 34 f0 93 1d 1b d6 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #412 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #412 | rejected packet: | af 34 f0 93 1d 1b d6 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #412: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a49450 | handling event EVENT_RETRANSMIT for parent state #175 | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #175 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #175 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49677.900413; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008494 exceeds limit? YES "road-eastnet-nonat-175" #175: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-175" #175: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #427 at 0x557d46ac1dc0 | State DB: adding IKEv2 state #427 in UNDEFINED | pstats #427 ikev2.ike started | Message ID: init #427: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #427: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #427; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-175" #427: initiating v2 parent SA to replace #175 | using existing local IKE proposals for connection road-eastnet-nonat-175 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 427 for state #427 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb350040840 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #427 | libevent_malloc: new ptr-libevent@0x7fb35001fd50 size 128 | #427 spent 0.0927 milliseconds in ikev2_parent_outI1() | RESET processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 15 resuming | crypto helper 15 starting work-order 427 for state #427 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 427 | pstats #175 ikev2.ike failed too-many-retransmits | pstats #175 ikev2.ike deleted too-many-retransmits | #175 spent 3.06 milliseconds in total | [RE]START processing: state #175 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-175" #175: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #175: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #175 "road-eastnet-nonat-175" #175: deleting IKE SA for connection 'road-eastnet-nonat-175' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-175' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-175 | State DB: deleting IKEv2 state #175 in PARENT_I1 | parent state #175: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #175 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a49450 | in statetime_stop() and could not find #175 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-175 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 427 time elapsed 0.000562 seconds | (#427) spent 0.624 milliseconds in crypto helper computing work-order 427: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 427 for state #427 to event queue | scheduling resume sending helper answer for #427 | libevent_malloc: new ptr-libevent@0x7fb374034da0 size 128 | crypto helper 15 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-175" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-175' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-175" | stop processing: connection "road-eastnet-nonat-175" (in initiate_a_connection() at initiate.c:349) | spent 0.0898 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #427 | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 427 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #427 | **emit ISAKMP Message: | initiator cookie: | 4d cf ce dc 5e 69 0c 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-175 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x be f3 80 6d a1 4d bc 3b 63 de fe 7b 5d 35 aa 05 | ikev2 g^x b1 28 d6 19 4f ca c2 b6 85 f2 21 b1 5f ee 7d c3 | ikev2 g^x e5 4d ce d8 a2 87 47 56 c6 32 a1 9b 66 32 11 d6 | ikev2 g^x 2a 42 af 5d 8f 34 c5 d5 6c 06 20 9f 03 7a dd 4b | ikev2 g^x 48 34 c3 3a 83 64 cc cf 03 38 0f 85 e3 77 24 47 | ikev2 g^x d5 16 ac 4d 8b 47 b5 03 3d 95 eb ea 92 b9 cf 0a | ikev2 g^x 68 66 89 9f e9 d7 ae 03 3d 64 75 ac c9 d5 b3 10 | ikev2 g^x de 8f 17 7b 40 ef 37 ec 93 3c cd 2d 80 d3 81 0e | ikev2 g^x 06 7b 23 ba 8b 61 0c f3 0a da 72 5d 9c fe 2a 86 | ikev2 g^x bd e9 e7 fc 88 d7 20 01 3d 62 9b 97 2d 52 60 5a | ikev2 g^x fa 1e fb 14 48 2b da dc c9 bc 30 8f d1 65 96 cb | ikev2 g^x 33 cf 05 cd 5e fb 63 36 4b e6 22 41 78 36 97 51 | ikev2 g^x 7d 03 25 93 d8 95 93 1e 55 d3 a5 af 94 2f 9c 8c | ikev2 g^x 5f a3 40 23 47 68 5e 3a 9d 49 f6 a2 e8 96 cd ae | ikev2 g^x 14 48 e0 e0 ab cb ce 26 3e 2f 37 d7 ae b6 aa 01 | ikev2 g^x 36 16 4f df 45 31 cb 1a 1c 34 5e a5 cc 5a a8 48 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce fd 8d 8b b7 46 89 9a fa b3 ab b5 e9 cc f2 e8 c2 | IKEv2 nonce d2 52 f8 a0 49 af 7a 94 c3 9c de 32 b7 d8 84 67 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4d cf ce dc 5e 69 0c 2c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 af | natd_hash: port= 01 f4 | natd_hash: hash= 9a c6 fd c2 96 5c 57 4c be 19 76 6e d6 a6 82 da | natd_hash: hash= 0b ee 49 1a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9a c6 fd c2 96 5c 57 4c be 19 76 6e d6 a6 82 da | Notify data 0b ee 49 1a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4d cf ce dc 5e 69 0c 2c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 12 be 5a 47 ba 89 37 fe 5c 7b 97 4a 79 4a eb 43 | natd_hash: hash= ad 50 1a 96 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 12 be 5a 47 ba 89 37 fe 5c 7b 97 4a 79 4a eb 43 | Notify data ad 50 1a 96 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #427 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #427: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #427 to 4294967295 after switching state | Message ID: IKE #427 skipping update_recv as MD is fake | Message ID: sent #427 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-175" #427: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.175:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #427) | 4d cf ce dc 5e 69 0c 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be f3 80 6d a1 4d bc 3b 63 de fe 7b 5d 35 aa 05 | b1 28 d6 19 4f ca c2 b6 85 f2 21 b1 5f ee 7d c3 | e5 4d ce d8 a2 87 47 56 c6 32 a1 9b 66 32 11 d6 | 2a 42 af 5d 8f 34 c5 d5 6c 06 20 9f 03 7a dd 4b | 48 34 c3 3a 83 64 cc cf 03 38 0f 85 e3 77 24 47 | d5 16 ac 4d 8b 47 b5 03 3d 95 eb ea 92 b9 cf 0a | 68 66 89 9f e9 d7 ae 03 3d 64 75 ac c9 d5 b3 10 | de 8f 17 7b 40 ef 37 ec 93 3c cd 2d 80 d3 81 0e | 06 7b 23 ba 8b 61 0c f3 0a da 72 5d 9c fe 2a 86 | bd e9 e7 fc 88 d7 20 01 3d 62 9b 97 2d 52 60 5a | fa 1e fb 14 48 2b da dc c9 bc 30 8f d1 65 96 cb | 33 cf 05 cd 5e fb 63 36 4b e6 22 41 78 36 97 51 | 7d 03 25 93 d8 95 93 1e 55 d3 a5 af 94 2f 9c 8c | 5f a3 40 23 47 68 5e 3a 9d 49 f6 a2 e8 96 cd ae | 14 48 e0 e0 ab cb ce 26 3e 2f 37 d7 ae b6 aa 01 | 36 16 4f df 45 31 cb 1a 1c 34 5e a5 cc 5a a8 48 | 29 00 00 24 fd 8d 8b b7 46 89 9a fa b3 ab b5 e9 | cc f2 e8 c2 d2 52 f8 a0 49 af 7a 94 c3 9c de 32 | b7 d8 84 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9a c6 fd c2 96 5c 57 4c be 19 76 6e | d6 a6 82 da 0b ee 49 1a 00 00 00 1c 00 00 40 05 | 12 be 5a 47 ba 89 37 fe 5c 7b 97 4a 79 4a eb 43 | ad 50 1a 96 | state #427 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35001fd50 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb350040840 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a49450 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #427 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 | #427 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49677.901793 | resume sending helper answer for #427 suppresed complete_v2_state_transition() and stole MD | #427 spent 0.477 milliseconds in resume sending helper answer | stop processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb374034da0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d cf ce dc 5e 69 0c 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #427 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #427 | rejected packet: | 4d cf ce dc 5e 69 0c 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 af fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #427: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aef6c0 | handling event EVENT_RETRANSMIT for parent state #420 | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #420 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #420 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49677.914012; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501088 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45350 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #420 | libevent_malloc: new ptr-libevent@0x7fb374034da0 size 128 "road-eastnet-nonat-168" #420: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #420) | 38 01 94 6e be 3a 28 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c e6 6f 10 c2 18 44 e2 34 88 94 b1 6e ad 96 2f | 7e f2 2f d5 05 74 10 9d b0 ed 16 ba d1 bb 6a 81 | 3b 36 bb 33 64 6a 4b 49 98 6b 61 6b 38 a7 f0 f9 | 85 f1 ea 1f 82 7f 75 2e b8 87 48 fb ca 42 ad 54 | 59 d3 d4 98 fc e3 db 9e 06 1c 4d 0a 68 e2 82 b1 | b4 79 61 9d ef 49 6d 74 7e f5 a5 55 9d ac 1f 86 | bc 38 61 c3 ec 65 14 03 d9 05 f4 3a a0 cf b9 81 | ea f9 8e 26 2a 33 57 de f0 0c 7b 3a 31 62 59 7d | 0a 51 80 e9 b3 45 96 f0 0f c4 ba 78 af bf d6 5a | 60 67 ef 7e 3d 35 d6 cc 9c c8 4a 58 b2 0f d6 d7 | a4 37 58 a2 99 5b 23 f1 45 8d 6c d3 30 bc 9f 64 | 97 c5 ef 20 d5 b9 a3 78 d6 da 52 f2 da 0c 22 0a | a7 af 15 bc c7 88 8c 82 a8 a3 ee 2f 8a ad 53 b2 | a0 1b 8a 3b ba 0a 34 48 34 2f ad da 72 63 db 61 | 9e b4 c4 95 69 50 db f5 62 4c 82 15 0a a2 7d 3d | 5b 37 5a 63 75 a1 9d 88 2f 4d 72 7d 91 14 f6 58 | 29 00 00 24 a2 fc 3c 40 ce 99 e3 62 f3 97 ac 0a | d5 d9 6a e9 cb 20 69 0b 55 a4 ef ef 10 02 28 ef | bc 3f 93 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 0a f7 67 8f e9 41 30 08 68 43 0c | 01 13 f9 c1 61 fa 63 aa 00 00 00 1c 00 00 40 05 | ef 1c 5b ca 2a 2f ea 7b fb 12 61 31 e7 f2 9d c7 | 67 58 3e 74 | libevent_free: release ptr-libevent@0x7fb37004b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aef6c0 | #420 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 01 94 6e be 3a 28 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #420 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #420 | rejected packet: | 38 01 94 6e be 3a 28 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #420: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0411 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800cc10 | handling event EVENT_RETRANSMIT for parent state #397 | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #397 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #397 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49677.91829; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001951 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aef6c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #397 | libevent_malloc: new ptr-libevent@0x7fb37004b7c0 size 128 "road-eastnet-nonat-145" #397: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #397) | b8 96 65 06 95 e1 f4 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 c8 0d f4 cf 12 04 23 b3 8c b0 d5 0f 34 4c a1 | e0 38 a5 84 33 97 be 9e 20 02 11 8c 69 5e 11 d0 | 7f 62 ac d4 51 19 cc 39 4f d4 08 35 17 3d d8 7a | c8 e2 b7 8a c4 ef 87 90 f4 6c ad 03 c1 12 e5 fe | a1 ca 4d a3 a7 26 51 b1 18 00 3f 74 0f 0b 76 79 | bc c1 ba 8c 57 57 64 fe a4 22 c8 a4 ab 19 ab 0c | dd ce 55 14 58 7f a0 3d 7e 01 33 18 3d 67 8f 6a | ca ae 35 2c fc 77 68 f1 26 46 2d 1f 7a bb f6 b6 | 88 41 08 63 25 29 f3 b7 63 ae 0e 14 3f a2 dc 97 | 0e 00 b1 e7 fc 07 d8 8b 49 bf 80 af e9 ed 2e ae | 76 d5 6d 36 b9 2a 02 65 8e ab 6e 62 de 0e 3d f3 | f7 6f bf 03 ee 4b bf 13 13 36 8d f9 63 27 fb 43 | 3f 8c 62 32 8e 36 3e 03 c1 c2 7e e0 16 a2 30 62 | 14 7f 02 fd b0 1d f6 8c 31 34 94 1b 15 18 28 ae | 0e b7 ba 68 7f a5 50 6b 2b de 67 a0 81 07 b2 62 | f5 48 ed c5 05 14 42 21 f6 53 6c 0e 3a 26 2c f6 | 29 00 00 24 27 60 c6 66 70 ae 97 9f 6b 69 4c 25 | 37 ba d9 cf 08 77 b3 59 45 e3 d8 2d 73 dd 52 c3 | cf dc c0 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 57 f9 bf 9f 01 9a 6f 3c 35 55 f3 | 32 2b 15 a5 4a 2d 79 cf 00 00 00 1c 00 00 40 05 | 4f 21 3e 38 45 eb 50 34 34 8d 72 07 46 d4 99 5b | e3 94 74 97 | libevent_free: release ptr-libevent@0x7fb36801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800cc10 | #397 spent 0.0873 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7cf50 | handling event EVENT_RETRANSMIT for parent state #368 | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #368 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #368 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49677.918393; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003782 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #368 | libevent_malloc: new ptr-libevent@0x7fb36801a4e0 size 128 "road-eastnet-nonat-116" #368: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #368) | af 44 01 88 e6 16 c8 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 fe d2 29 cf 90 27 2d 78 45 a2 b1 3a ed 0c 48 | 17 b4 e8 54 dd 68 cf 7e 09 7a af 17 ed 4f 89 f8 | c0 ff 46 bb 6c a6 b3 38 fd f1 d2 cc cf d4 db c1 | e0 88 fe 51 49 6d e3 71 01 85 fe f4 a5 9f 85 04 | b6 d1 25 1f bd d7 ec 86 d1 7c 74 4d 2b 88 9b 37 | 88 75 91 51 15 43 e3 94 29 7a fc 34 e7 47 6b 09 | 3f 68 5a af 07 68 67 15 d9 ca f4 fd c3 d0 6c 2d | 70 40 4e 4a 88 cf b4 8b 6f 34 77 1b fd 2c ac c0 | b5 ab 67 28 d7 0d cf 79 56 41 4a ee e4 5c 59 e9 | 16 2d 45 df 3b 83 50 77 d1 1d 25 2e df 41 d7 96 | e0 ae 3d 15 c2 fb 47 fc 22 43 64 51 9d 2b 27 9e | ef d5 13 c7 bc a8 df 51 ba 9e 32 c3 d2 0e 3d 97 | 23 9a d8 1c 93 38 85 21 ff 2a 81 20 c2 e1 c5 96 | 9d d3 5f 74 e3 dc ae 9a 19 d8 eb 6f 38 2d 11 55 | b9 c5 4b fe 45 56 61 1b 03 ae 41 5d 20 26 7b b4 | dd 4c d4 57 72 8f 74 07 75 75 35 67 ae 9c b4 2d | 29 00 00 24 b4 f8 c7 8c ce d2 25 cc 04 b1 28 85 | 4c 50 50 1c af 66 c6 a8 14 6b b6 e9 07 eb 31 8e | 06 0d 7b dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 4f 54 9f 13 b7 58 02 6e 4f 8f 36 | 8b d5 61 f1 61 e4 53 15 00 00 00 1c 00 00 40 05 | 79 7d 7e 8e 6a 0e d7 b1 f9 8e 14 46 7c 3e c2 fe | 69 34 3d 95 | libevent_free: release ptr-libevent@0x7fb34c0293f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf50 | #368 spent 0.0662 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 96 65 06 95 e1 f4 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #397 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #397 | rejected packet: | b8 96 65 06 95 e1 f4 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #397: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 44 01 88 e6 16 c8 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #368 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #368 | rejected packet: | af 44 01 88 e6 16 c8 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #368: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0352 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23150 | handling event EVENT_RETRANSMIT for parent state #315 | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #315 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #315 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49677.924685; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004507 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf50 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #315 | libevent_malloc: new ptr-libevent@0x7fb34c0293f0 size 128 "road-eastnet-nonat-63" #315: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #315) | 44 ed db 2c fe 0c f2 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e 87 b1 78 dc 97 f3 7a 79 3b d6 3e 86 ea b2 fa | 5d 34 e2 db 78 24 8f 15 59 97 e5 e6 f6 90 b1 aa | 59 98 1b 57 96 2d 7a a6 68 c9 eb 8b 7d f6 64 68 | a2 48 77 fc cb 5d 8f 0e b2 52 9b 77 09 f1 21 ba | 81 62 c1 7e 82 df 5b 48 60 ba f6 08 04 c2 77 74 | 9c c8 6b 41 93 1d 14 39 f9 1e b0 b2 5b 1d 3c e0 | ca f1 1f 63 24 c8 cc 04 a5 c5 8f 7d 86 30 95 90 | fb a8 83 29 7a f1 ce 8e 64 9a 9f 82 39 eb 4b a4 | b2 6f ce 0a 5b bd e7 1a af 9d af 92 27 aa 66 57 | 8e 91 52 b5 d0 96 33 ee eb 0f 07 5f 2f 56 77 d0 | 9a 1f cb 0e 53 2f d5 4e b4 5b a5 9c 4c 15 af e1 | 28 86 0f 89 11 d9 bc 73 6b a7 3c 58 a9 04 2c eb | f2 53 51 79 62 f5 50 bf 5f 75 e1 7f 28 95 f0 09 | 87 f1 d9 ee 26 2c 8a ee 7d 84 2e 04 f2 6c 42 e0 | 67 e8 19 47 db 94 b6 12 29 d7 1d dc 8f 61 2d e0 | 53 f7 53 7d 18 19 05 ed 93 cb 84 d8 40 1b 1d fe | 29 00 00 24 5f cd cc 5e 9b b5 1f f6 2d c3 6f 0d | 70 ea 63 15 bc b8 5b 49 76 c9 be 04 9e 55 ff 0b | 33 d9 e0 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 2c d3 1b 13 1c a2 69 95 f2 01 8c | cb 3c f6 d6 71 d0 e6 be 00 00 00 1c 00 00 40 05 | b1 bd 1a 4e 17 0a c1 3c 72 20 f5 8a 28 12 f4 7a | a3 f8 1e e7 | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23150 | #315 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ed db 2c fe 0c f2 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #315 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #315 | rejected packet: | 44 ed db 2c fe 0c f2 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #315: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3680129a0 | handling event EVENT_RETRANSMIT for parent state #413 | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #413 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #413 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49677.948971; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002889 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23150 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #413 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 "road-eastnet-nonat-161" #413: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #413) | ea 46 85 e7 fd 9b ca c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a d6 4a 46 94 c5 0e 81 7d ce e7 15 1a 5a 21 6b | d0 32 15 1d df aa 19 22 73 4c 48 c7 c9 6d a8 93 | 29 7e ec 61 b6 83 c3 69 04 a5 60 f9 c5 35 27 f9 | 44 bf c3 99 38 07 63 d7 db de ef 2b 00 c6 3d 6f | 1e 8f 0f f0 f2 98 90 49 cc c1 d2 86 82 6d 83 07 | b6 cd 6e db a4 2f 05 29 fa 3e e9 09 c5 23 64 57 | 0f 6b 66 2d b4 b3 b3 d2 ea e7 1c 7e 8b 59 ce a2 | 2a db b2 33 4a cb 53 6b e5 06 8d cf 28 1c 31 94 | 7e 79 27 07 12 0f ee 03 55 92 90 46 1e 9e 32 06 | e3 69 6e 6a 21 a6 b6 3d c6 89 df ef c7 fa b0 eb | ab 8c ae 81 fa 71 38 65 08 c6 41 65 64 a9 83 b0 | bc c3 01 a6 3a 68 d2 5d bb 35 97 d0 1e e7 f8 04 | 04 04 f6 ff 5e f9 22 b6 f2 9f 86 d9 b4 ae ee 49 | fd 07 2d 26 52 e7 63 86 cc 1a 6e 7f 04 ad 81 4a | a3 d7 7a 6d 6e 53 1b 65 52 8d 28 da bd 54 d5 04 | 1e 3e 9f 74 3c 77 dc 33 e5 c5 fe 6f df d3 a7 16 | 29 00 00 24 85 87 06 d7 9a bf 7b 07 3a ec 94 d1 | cf f4 5c 33 c2 8f dc 32 29 58 27 3f e4 e5 19 81 | 63 f8 b3 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 20 9c 8e 3c 13 0c 4e a0 e8 24 76 | 9d 56 e7 f6 81 08 36 aa 00 00 00 1c 00 00 40 05 | 3c 55 11 1a b1 a6 35 ac 5d bf b2 4d 0c c0 40 68 | 37 73 05 e6 | libevent_free: release ptr-libevent@0x7fb36801fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3680129a0 | #413 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 46 85 e7 fd 9b ca c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #413 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #413 | rejected packet: | ea 46 85 e7 fd 9b ca c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #413: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a88140 | handling event EVENT_RETRANSMIT for parent state #176 | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #176 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #176 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49677.973255; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006229 exceeds limit? YES "road-eastnet-nonat-176" #176: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-176" #176: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #428 at 0x557d46ac3380 | State DB: adding IKEv2 state #428 in UNDEFINED | pstats #428 ikev2.ike started | Message ID: init #428: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #428: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #428; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-176" #428: initiating v2 parent SA to replace #176 | using existing local IKE proposals for connection road-eastnet-nonat-176 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 428 for state #428 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb3680129a0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #428 | libevent_malloc: new ptr-libevent@0x7fb36801fd50 size 128 | #428 spent 0.0696 milliseconds in ikev2_parent_outI1() | RESET processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #176 ikev2.ike failed too-many-retransmits | pstats #176 ikev2.ike deleted too-many-retransmits | #176 spent 2.11 milliseconds in total | [RE]START processing: state #176 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-176" #176: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #176: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #176 "road-eastnet-nonat-176" #176: deleting IKE SA for connection 'road-eastnet-nonat-176' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-176' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-176 | State DB: deleting IKEv2 state #176 in PARENT_I1 | parent state #176: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 19 resuming | crypto helper 19 starting work-order 428 for state #428 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 428 | stop processing: state #176 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb38001abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a88140 | in statetime_stop() and could not find #176 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-176 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-176" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-176' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-176" | stop processing: connection "road-eastnet-nonat-176" (in initiate_a_connection() at initiate.c:349) | spent 0.059 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 428 time elapsed 0.000802 seconds | (#428) spent 0.809 milliseconds in crypto helper computing work-order 428: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 428 for state #428 to event queue | scheduling resume sending helper answer for #428 | libevent_malloc: new ptr-libevent@0x7fb36802ee40 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #428 | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 428 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #428 | **emit ISAKMP Message: | initiator cookie: | fb 15 42 71 fe 24 9a a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-176 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 07 50 d4 99 e3 c3 b2 8d 50 f4 55 ae 47 3b 25 61 | ikev2 g^x 1e c4 05 b1 59 21 46 35 0e 81 55 dd de 7f 65 40 | ikev2 g^x 00 1a 4e c9 0d 72 6a 7a 8e 31 f2 b8 05 87 95 5f | ikev2 g^x 92 19 3b d0 26 f7 ef a7 b3 37 5f 37 15 e9 34 12 | ikev2 g^x 33 cb bc 05 19 62 04 88 c4 b0 11 3c a2 fc 2e a7 | ikev2 g^x 48 74 27 c5 24 6a b1 84 34 89 1c 11 73 e4 fb e9 | ikev2 g^x 1b 3e 80 7d 33 32 51 1f 3d 67 11 16 e4 23 05 bd | ikev2 g^x 3f 72 2d 38 c9 0b 38 c0 12 64 3a 43 5b e7 46 c1 | ikev2 g^x 2b 7e 29 d4 ef 37 71 a8 e0 71 19 2f a1 c5 6c 53 | ikev2 g^x 94 fe 4e 57 73 5c 74 b5 d5 7f cc e2 3d a3 30 0d | ikev2 g^x 02 5c 9d dc 4d a0 93 77 cd b6 58 cb 5c 89 fe a8 | ikev2 g^x 40 8a c4 11 16 43 cc f4 7d 6e ae 00 27 3a 7c 8c | ikev2 g^x 12 14 7e db be 5a 42 72 b9 d0 07 1b fd aa 82 51 | ikev2 g^x 0e fb 68 c6 88 b4 35 6c 93 af 50 1c ff 48 78 d4 | ikev2 g^x b7 b7 c9 3d bd cb b9 82 34 8d b6 5a ff e7 73 c1 | ikev2 g^x e0 88 1f 51 42 a1 76 7d 4c 3a 1b 39 03 d3 42 78 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e8 4b ce 8e 1c b5 fd 76 2e 19 5c e4 1a 51 b2 57 | IKEv2 nonce c5 b9 7b 5b bc c1 c3 17 ad 08 ad 32 c1 29 cf d0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fb 15 42 71 fe 24 9a a9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b0 | natd_hash: port= 01 f4 | natd_hash: hash= db 5a 55 94 7a 84 e5 8b 58 e8 27 7a 96 44 f5 8a | natd_hash: hash= 4c 99 6f 81 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data db 5a 55 94 7a 84 e5 8b 58 e8 27 7a 96 44 f5 8a | Notify data 4c 99 6f 81 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fb 15 42 71 fe 24 9a a9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 54 c7 00 62 13 8f 45 35 f4 93 09 e0 a0 98 7d 08 | natd_hash: hash= 6e 4a 7d e5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 54 c7 00 62 13 8f 45 35 f4 93 09 e0 a0 98 7d 08 | Notify data 6e 4a 7d e5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #428 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #428: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #428 to 4294967295 after switching state | Message ID: IKE #428 skipping update_recv as MD is fake | Message ID: sent #428 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-176" #428: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.176:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #428) | fb 15 42 71 fe 24 9a a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 50 d4 99 e3 c3 b2 8d 50 f4 55 ae 47 3b 25 61 | 1e c4 05 b1 59 21 46 35 0e 81 55 dd de 7f 65 40 | 00 1a 4e c9 0d 72 6a 7a 8e 31 f2 b8 05 87 95 5f | 92 19 3b d0 26 f7 ef a7 b3 37 5f 37 15 e9 34 12 | 33 cb bc 05 19 62 04 88 c4 b0 11 3c a2 fc 2e a7 | 48 74 27 c5 24 6a b1 84 34 89 1c 11 73 e4 fb e9 | 1b 3e 80 7d 33 32 51 1f 3d 67 11 16 e4 23 05 bd | 3f 72 2d 38 c9 0b 38 c0 12 64 3a 43 5b e7 46 c1 | 2b 7e 29 d4 ef 37 71 a8 e0 71 19 2f a1 c5 6c 53 | 94 fe 4e 57 73 5c 74 b5 d5 7f cc e2 3d a3 30 0d | 02 5c 9d dc 4d a0 93 77 cd b6 58 cb 5c 89 fe a8 | 40 8a c4 11 16 43 cc f4 7d 6e ae 00 27 3a 7c 8c | 12 14 7e db be 5a 42 72 b9 d0 07 1b fd aa 82 51 | 0e fb 68 c6 88 b4 35 6c 93 af 50 1c ff 48 78 d4 | b7 b7 c9 3d bd cb b9 82 34 8d b6 5a ff e7 73 c1 | e0 88 1f 51 42 a1 76 7d 4c 3a 1b 39 03 d3 42 78 | 29 00 00 24 e8 4b ce 8e 1c b5 fd 76 2e 19 5c e4 | 1a 51 b2 57 c5 b9 7b 5b bc c1 c3 17 ad 08 ad 32 | c1 29 cf d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 5a 55 94 7a 84 e5 8b 58 e8 27 7a | 96 44 f5 8a 4c 99 6f 81 00 00 00 1c 00 00 40 05 | 54 c7 00 62 13 8f 45 35 f4 93 09 e0 a0 98 7d 08 | 6e 4a 7d e5 | state #428 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36801fd50 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb3680129a0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3680129a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #428 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 | #428 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49677.974713 | resume sending helper answer for #428 suppresed complete_v2_state_transition() and stole MD | #428 spent 0.4 milliseconds in resume sending helper answer | stop processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36802ee40 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 15 42 71 fe 24 9a a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #428 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #428 | rejected packet: | fb 15 42 71 fe 24 9a a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b0 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #428: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #369 | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #369 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #369 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49677.978898; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003995 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368025320 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #369 | libevent_malloc: new ptr-libevent@0x7fb36802ee40 size 128 "road-eastnet-nonat-117" #369: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #369) | ff 18 31 cc 83 7e 2e ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 1f 06 e6 7b ea 4e 17 1c 87 7d 86 73 80 47 50 | cf bf e2 ff 09 37 6a 25 2d 87 f4 71 22 38 1c ca | 11 79 43 67 c5 65 1f f5 07 47 33 ad 73 a4 d3 73 | 51 54 fd df 5a c2 8d 18 cb cc 20 72 8e 07 68 eb | b6 8d ab 31 ba fd fa 9b 7c 59 57 b3 71 f1 91 34 | ea 4b 70 52 a4 6c eb 12 7d 01 23 58 56 9a d3 c0 | a8 35 4b 27 63 af ee d0 37 dd c7 3e 45 5a 0b 60 | bd 6d ed c4 e9 d9 c1 d7 e1 29 a2 3f dc 2c af 7c | e6 74 73 2b 26 15 ca 1c f5 95 b6 33 2f 8c 4a 22 | a1 8d d2 aa 72 d0 9b 41 c8 87 a6 d7 f8 13 c7 cd | 3c d8 62 e2 fc 64 74 ed 50 b1 79 e3 79 44 21 85 | 12 8f 6c 07 3b 37 80 9b 8c 83 41 c0 0e 38 b7 92 | 75 a7 4a 89 81 43 56 e9 67 ee 43 e0 24 9b 53 75 | b9 e5 d1 27 c1 f4 c3 83 7c 57 e4 5e 33 8b e2 10 | c9 ec fe 76 73 25 ae 4b 87 a7 e2 e5 89 5a 08 72 | fc 88 9c 69 9c 14 55 be f9 d1 24 d2 2a 6b bd 35 | 29 00 00 24 03 b6 58 fc c8 79 29 fe 43 44 80 31 | 59 cf 11 77 19 87 27 44 32 ac 84 44 78 ab c0 33 | d7 16 05 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a fa 34 e9 cb c2 b8 b0 71 3e db 9c | 1e f7 0a 0e 8d a9 9b 92 00 00 00 1c 00 00 40 05 | c3 12 1d 90 39 27 a3 80 ba dc 3c b0 c3 6a 52 2a | 1e d7 c5 9b | libevent_free: release ptr-libevent@0x7fb3780300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #369 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff 18 31 cc 83 7e 2e ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #369 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #369 | rejected packet: | ff 18 31 cc 83 7e 2e ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #369: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0769 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a647d0 | handling event EVENT_RETRANSMIT for parent state #421 | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #421 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #421 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49677.985214; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500978 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #421 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 "road-eastnet-nonat-169" #421: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #421) | 53 46 78 d0 f9 b4 2b ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 1e 13 6f 9e 9e 28 7d 48 cb 8f 21 ad 12 23 0d | 2e 17 4b ec 60 47 24 f9 49 65 0f b8 05 f3 b2 c5 | 35 0c dd 44 2a 04 47 c6 96 e8 e3 9d da 44 54 8d | d0 16 cf 7d 24 e8 e0 cd a8 2c 8e 39 d3 b2 8b 7f | 72 0a 52 da e9 14 4a cc 17 a9 78 b8 cd 5e be 1d | b9 b5 cd 7b b6 5f 02 22 ea c4 0a a6 8f a3 01 6c | 5b 53 24 36 89 d6 72 ef 99 b2 12 aa fb cb aa db | b2 d1 08 23 c1 6a e2 dd cd 0b 52 1b 08 f4 07 44 | f6 bb f7 14 71 89 1d 05 a9 2e 9d 11 f6 47 e7 7b | 5c 89 c0 6a 79 44 41 55 07 e9 d4 c5 65 08 95 21 | 02 27 ea de 7e 8f c1 e5 b3 56 d5 44 30 34 c9 29 | 25 c6 6c f5 76 8d bd 58 fa 4e 08 93 a9 a8 12 bd | 8c 61 44 c0 18 3b 6c f3 4a 89 60 c3 7a 98 37 61 | d4 a6 d5 c6 6d e0 61 22 11 f5 b2 91 df 3b aa 2c | 62 52 60 02 03 f1 56 8c f6 e3 d9 1e 59 30 5a b8 | cf c5 38 a8 40 43 1f 7b 8b 5b 7c d9 77 f7 d9 ba | 29 00 00 24 41 49 08 f2 3f 7f 22 d1 7a a9 25 e2 | 15 a5 3d 37 9b e8 6b f7 56 6b 10 73 05 1d f4 b0 | b9 8c f9 c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 d0 78 7d 22 f6 6d e2 e5 b7 d3 9b | 09 f6 2a 83 8c 96 39 01 00 00 00 1c 00 00 40 05 | 72 19 84 dc d4 59 5b 35 51 4f b6 9f 34 c6 2f ea | b9 aa 04 8a | libevent_free: release ptr-libevent@0x7fb368023a60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a647d0 | #421 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c017ea0 | handling event EVENT_RETRANSMIT for parent state #316 | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #316 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #316 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49677.985384; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006463 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a647d0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #316 | libevent_malloc: new ptr-libevent@0x7fb368023a60 size 128 "road-eastnet-nonat-64" #316: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #316) | e8 62 07 3d 83 c9 27 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 67 27 d8 ca da 21 fc 33 ba 4f 94 10 8a c5 3e | 5d c6 ca e9 be 5f 5b 62 d9 f8 5f ef cd 1d 75 de | 4e 46 e5 c8 47 0c 64 48 a0 a0 be ad 1a 88 be 29 | 21 51 4f e4 bd 33 bd be 35 5e 1a f3 c6 5c 72 cc | 14 4f 34 ba 69 93 e8 bf 07 ec 5c 62 f6 72 9d af | 95 ca 7c 71 3b 37 93 92 3a 98 4e 7a 53 2f 9a a8 | 2a b6 32 33 20 cf eb 65 6b e0 73 23 52 d2 61 14 | 64 77 57 5a e0 a6 ac 4c 66 6c 73 74 1e 30 64 d8 | 26 eb 6f 24 f1 a2 d0 b2 6b 58 a7 b2 54 48 ba 72 | 09 ae 65 3c 30 0d df 54 4e 6a 33 e2 26 65 76 99 | ea 2e 2a 30 fa a7 4c 97 4d 74 ba 19 a6 b3 7b 01 | 82 88 fa e7 6a 85 ab 68 48 39 a4 91 e9 e4 44 02 | 10 7a c6 c8 2e 47 03 39 25 a6 92 8c e5 51 eb 52 | f8 c7 61 20 39 65 61 dc 27 00 53 74 46 c8 5c be | 3b 90 c1 02 b8 be b2 17 6b a3 86 6f 65 fa c8 19 | e6 54 1a 74 80 e0 70 41 21 d7 44 54 50 0b cd 29 | 29 00 00 24 89 45 06 65 65 b3 8c d6 0c df 20 90 | 5a e6 b0 5e f6 87 85 10 8d 96 3d 5e 67 1f 54 38 | 77 de f5 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 e4 d3 0f a4 c8 a7 ec 05 e8 fa d2 | 6d 31 a1 ad f7 6f 67 3e 00 00 00 1c 00 00 40 05 | 0a a4 aa 05 10 e6 c7 c4 a5 a6 8e 98 2e fc 0d 29 | 7c 74 b9 43 | libevent_free: release ptr-libevent@0x7fb36c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | #316 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 46 78 d0 f9 b4 2b ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #421 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #421 | rejected packet: | 53 46 78 d0 f9 b4 2b ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #421: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0571 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 62 07 3d 83 c9 27 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #316 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #316 | rejected packet: | e8 62 07 3d 83 c9 27 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #316: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0529 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b06800 | handling event EVENT_RETRANSMIT for parent state #398 | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #398 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #398 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49677.989687; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002197 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #398 | libevent_malloc: new ptr-libevent@0x7fb36c04b850 size 128 "road-eastnet-nonat-146" #398: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #398) | d0 92 7e a2 a7 09 60 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 b4 17 bf 7e 10 d5 e2 12 67 d5 eb 44 fc 6b da | be 3b 71 0a c4 e3 79 bc 55 7d 33 ab 53 2c 63 89 | 9e 95 b9 30 6b 13 a7 4a c4 7b bb 0d b8 d2 26 a2 | 1b 44 de e4 2f 11 41 58 72 a9 de c1 a4 1a 3c de | fb 82 ea df 3c 36 4d b1 bb 32 a7 75 2a 9c da 3d | 04 1d ae c6 9e 47 9c 96 a3 bd 6c 27 32 62 7e ad | 70 24 3a b8 2d 6d 20 b6 31 c7 e4 59 58 b0 08 22 | 82 a6 37 db ba ec 34 68 a5 11 ce c9 83 0a 92 b3 | dd ea d2 26 81 86 3c 25 24 24 ac 6b b8 4a 55 12 | 52 ea 4b 29 23 c3 37 83 f6 36 9b 47 37 10 75 9d | f4 dd 3d a7 8c 08 2f 3c e4 23 53 ed 31 76 a3 fc | 1d a9 fd 55 24 58 0f 2f e2 fa 33 69 e3 52 ce 0b | 40 31 96 92 4b 51 32 bf 2a 17 34 73 b9 0a 6b 90 | de fe 0d 37 2c 91 fd 6c 7a a7 e2 56 e8 ce 17 fa | d6 57 69 b6 c9 3d e4 60 c8 79 32 d0 c0 ff e6 32 | 04 59 72 13 74 5b a6 22 e7 dc df 1b fa 28 85 f9 | 29 00 00 24 ae ec a4 eb 03 5f 45 70 f0 53 21 d7 | 81 1e fd e8 52 41 5f 93 69 78 ae d9 36 11 23 a3 | df 40 91 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de b0 87 87 88 52 10 6b eb de e2 56 | 47 54 e5 87 4e eb 84 92 00 00 00 1c 00 00 40 05 | cf cf 8e 7f dc f9 05 61 ec 0b 32 5d d8 50 5d 1e | f5 62 0b 45 | libevent_free: release ptr-libevent@0x7fb360046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b06800 | #398 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 92 7e a2 a7 09 60 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #398 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #398 | rejected packet: | d0 92 7e a2 a7 09 60 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #398: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0545 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c018460 | handling event EVENT_RETRANSMIT for parent state #414 | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #414 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #414 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49678.021078; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003128 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b06800 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #414 | libevent_malloc: new ptr-libevent@0x7fb360046040 size 128 "road-eastnet-nonat-162" #414: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #414) | 9e d5 a6 6b e9 51 f5 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 17 ff 89 e8 3c 16 16 6a 13 a2 4a 6e d7 58 8c | 31 4a 5d a6 06 21 a0 a1 9e a4 d6 9f 9d d0 c9 ef | 81 a2 6a e5 e1 ce f7 5b 3f cb a3 39 af 4b 00 d3 | 8e ea 93 72 09 07 7e f7 07 70 f1 60 90 61 a3 52 | 45 df 81 dd 3b 9f 90 cc 5a ee 79 3a e6 e9 1c 8f | 3e 5d 20 51 b9 06 0a c7 eb 0e 7c 49 84 44 06 9a | 8a 7d 42 8a 3c 02 e8 20 6f 96 b9 43 e4 b6 78 25 | 2a 47 75 c2 a6 5e 09 93 6e 0a 52 61 7e 11 07 98 | e5 ed 70 aa 1a 26 50 15 8a 10 03 2b 04 12 5a 90 | df c8 9d 86 1f 6a 9b b1 b4 ef a4 64 93 b4 1c b9 | a7 2b 05 40 cd d6 1a ea f2 e2 7e 25 9c 0d 5f 1b | 71 7c a0 ab 46 0c fd 1d 5d c2 80 68 45 9c 03 04 | ba 22 16 f6 4e 43 40 2a 18 55 ee ba be b9 c7 28 | a3 19 30 1c 73 7f 70 9d 56 01 fc 31 bf 29 77 0b | f7 40 78 1c 68 3b 66 2d 2e 5b fb 5d 13 f6 84 1d | 63 eb 8e 4a f6 af 8f 02 43 3a 27 60 08 28 58 6a | 29 00 00 24 8a 22 da 4e 47 50 93 9e a6 73 51 af | 87 1e 05 a5 3e cb 07 7d 69 59 69 03 d3 ed 1d 7a | 33 b5 03 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba fb 8a fc 1d 3f b9 dc ba d7 c2 5a | de ae b7 6f 1b 1d e3 06 00 00 00 1c 00 00 40 05 | 6c ca d3 22 34 6c 0b 0a d6 9b 01 8f e9 fa 8a 7e | 51 47 3d 5a | libevent_free: release ptr-libevent@0x7fb3500251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c018460 | #414 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e d5 a6 6b e9 51 f5 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #414 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #414 | rejected packet: | 9e d5 a6 6b e9 51 f5 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #414: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0412 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380009ed0 | handling event EVENT_RETRANSMIT for parent state #370 | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #370 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #370 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49678.037349; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00355 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #370 | libevent_malloc: new ptr-libevent@0x7fb3500251c0 size 128 "road-eastnet-nonat-118" #370: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #370) | 4a 80 23 ad fc 41 99 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 13 bc 42 a7 35 39 b2 99 5a ec 69 08 73 18 3f | fe 31 dc bf 22 23 10 df 50 13 8d 04 9e ea 66 93 | 98 fa 79 7f 64 34 1f da 27 d5 8f dc 20 be 18 56 | 17 0e c5 53 3e a4 18 ed 82 41 0e 7f 91 9c e6 cb | ef 35 45 6e 59 c7 b5 4d 35 32 d9 63 30 b7 dd 5d | 28 28 04 d3 d6 a5 84 6f 4c f3 94 90 75 da df 42 | 5a 65 b6 2e cd 5e 42 3b 71 3e 46 f7 4b 13 d1 aa | a5 9c 11 b7 2c 83 34 92 e3 55 46 0b 4b 42 12 08 | 06 02 c9 42 46 42 d0 f1 82 14 36 15 1e 2e d4 a0 | 23 35 a8 d9 5e c2 f8 ca da 81 45 00 34 f6 88 47 | 2f 60 cc ac c2 4b 39 55 8a 1b 8f 66 b3 43 72 fd | 59 52 11 ef 5c 2c 9e b7 b7 6a c6 60 eb 22 9a 4d | e9 c0 4b de 56 c3 d3 e4 19 f0 86 9f a5 38 ef 26 | 39 fb ac 6e b8 32 45 c4 d1 f5 cc bb b2 2f 7b 0b | 6b 6b b1 6f 27 b1 bb 88 e7 c4 d6 31 26 e0 94 2a | ae 90 aa 75 e5 cb 3e 1f 43 13 d3 7b 3c ed 1e b0 | 29 00 00 24 a0 6f 08 ca 5f 92 e1 a2 10 08 5a 34 | 7d b6 05 db 65 e8 3d 88 a0 b3 7d 19 ed 75 36 c4 | 95 ec 9c 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 38 cd 57 b0 33 db 6c e3 f5 95 3e | 28 5e 17 44 43 d3 05 33 00 00 00 1c 00 00 40 05 | 6f b1 ce a1 45 d5 bc 6f 48 f8 db 92 31 a1 28 9a | ba c8 a7 2b | libevent_free: release ptr-libevent@0x7fb3800223c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380009ed0 | #370 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 80 23 ad fc 41 99 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #370 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #370 | rejected packet: | 4a 80 23 ad fc 41 99 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #370: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac1340 | handling event EVENT_RETRANSMIT for parent state #399 | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #399 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #399 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49678.04672; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002474 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380009ed0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #399 | libevent_malloc: new ptr-libevent@0x7fb3800223c0 size 128 "road-eastnet-nonat-147" #399: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #399) | 9a 35 91 e3 ae 4f 45 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 ce a5 03 ec 4a ee 33 f3 67 48 7b 6f be a9 66 | fb 8e 19 e6 36 60 4c c6 f2 fa ab 4a 53 70 9f a8 | 5d 61 41 57 15 0a 04 a9 c6 86 5d ab 3b 79 47 d9 | 64 c0 42 8c 2d 5e 11 ee 5a b4 7c 00 df db 58 b0 | 10 63 ed d6 5b 1a 63 c2 6e 59 c7 e8 2a 78 4e 44 | 25 ff 91 a5 4f 9f d4 f8 46 f6 2e bb b6 05 d4 45 | 7f ef 54 77 ee f0 2c 99 e2 fe 9b fe 0e 9d c8 14 | ca 70 65 95 d9 6c bd 1f dd d1 55 09 ab fd c5 44 | 6f ba 1f 76 70 5a 17 28 af 45 27 b3 5f fa fe 02 | 6a 08 1d 7c 03 0b fb b8 0b b4 48 92 28 71 ac 6f | 5f 3f a7 45 71 f7 92 e0 6c 9d f2 6c bb 9e 54 7d | 4e c3 05 e2 c9 1e 50 4a ea 5d b8 f4 10 cd bd ed | f5 70 36 5b 63 22 bb 46 fb e4 aa 69 fc 3a 38 34 | d5 97 f3 9a 0b d9 79 ac e6 c8 40 6d e3 6c 66 31 | 20 73 b6 2d f4 7d 52 fd f2 32 69 70 71 7f cd d6 | 06 5e 27 45 05 1c 80 53 a4 80 ee b7 a6 45 c2 7e | 29 00 00 24 a1 6d db 5e 0b f7 f4 70 57 f1 37 cb | cc a0 06 3f 1d 1e 6b 0a b6 35 fa c1 29 23 78 83 | cc 1e 42 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 7c 20 90 94 5e 44 74 17 3c c7 e7 | e8 35 eb 34 00 1c 2e 68 00 00 00 1c 00 00 40 05 | eb 24 3e a6 a5 f2 dc 45 a5 ce 8c 46 9a d0 7a ff | cb 2c 1c 90 | libevent_free: release ptr-libevent@0x7fb35c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac1340 | #399 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 35 91 e3 ae 4f 45 29 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #399 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #399 | rejected packet: | 9a 35 91 e3 ae 4f 45 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #399: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47f10 | handling event EVENT_RETRANSMIT for parent state #422 | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #422 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #422 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49678.053002; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500914 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac1340 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #422 | libevent_malloc: new ptr-libevent@0x7fb35c035930 size 128 "road-eastnet-nonat-170" #422: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #422) | b8 e0 2b 96 c7 45 5a 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 6c 40 a5 03 bc 57 72 c1 66 d6 ac 89 5b f4 c1 | d0 36 2b 40 f8 23 54 39 34 b5 82 a2 ec a9 be f0 | 9e 2a fb a5 33 fb bf 78 6a 65 ee e2 5e 78 b2 97 | 57 06 96 a7 85 bc b5 2f 57 ad dd 92 ec d4 39 15 | 9d 72 7c 3a f0 31 6f b3 e0 1f fa e2 bb 36 ae ad | 14 69 bc c7 2b b8 d3 5c 99 5b e0 8a c5 e8 54 ff | a1 c6 b4 be 7e 54 b5 cb 08 e2 27 e4 e9 7a 16 60 | ce 85 f4 97 da 4f 4d 09 2e 8c 52 19 57 93 83 db | 87 b1 16 b3 51 00 56 5d 37 6d b9 b3 a2 bd 99 3b | aa 47 42 33 bb 18 39 df 45 15 55 a1 5a 1e 8d 44 | 65 5b 06 c8 ce 40 9d 80 8b 2e ca 26 d1 79 fd 78 | 43 19 a6 31 62 db c5 b6 b4 99 3e 3d 0f 92 3a 22 | 67 54 41 d3 95 c5 98 ed 1d fc 1c 5c cc 1c ff 1e | 72 31 d9 fd 8f 7a 3f e9 62 8e 84 af f0 f7 f0 8d | 9b 73 d6 fc ff bc e5 4a d7 b9 1b 80 22 88 c1 56 | e0 bb 60 af 81 19 d7 73 ec 24 2d 0b 96 d4 fa 10 | 29 00 00 24 2b c3 8d 3d 91 5a 53 1a b5 f4 6d b1 | 02 bf f8 18 e1 84 d7 9f a5 0d 77 07 91 b8 4d 3f | 04 89 f2 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 85 d2 75 8f 47 7e 81 98 63 03 9f | 1d 8c c0 94 92 93 75 cc 00 00 00 1c 00 00 40 05 | 2a 28 b7 7f 38 5f e0 65 f6 1d 4d c9 d5 6f ea f1 | c9 85 fb 5d | libevent_free: release ptr-libevent@0x7fb37c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47f10 | #422 spent 0.0922 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 e0 2b 96 c7 45 5a 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #422 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #422 | rejected packet: | b8 e0 2b 96 c7 45 5a 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #422: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c00d120 | handling event EVENT_RETRANSMIT for parent state #317 | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #317 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #317 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49678.054226; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004341 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #317 | libevent_malloc: new ptr-libevent@0x7fb37c01d920 size 128 "road-eastnet-nonat-65" #317: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #317) | 5c a2 6c e8 b2 28 e0 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 95 b1 4b f7 b4 a2 f3 b1 63 69 55 e2 98 fb 3f | 54 1a 28 48 de 85 37 f8 72 76 27 96 2b db 5e 33 | be af 42 49 c9 29 81 c9 57 56 f4 f8 82 3d a6 af | 88 eb 0d 9f f2 82 74 6e 72 69 04 07 19 3d d2 37 | 11 a5 22 ff d2 62 d9 98 57 a1 83 a7 1e 49 51 44 | e5 97 9b 8d 73 a0 96 d3 53 9b fb 45 84 94 f7 3d | 76 31 fc 24 62 7d a9 38 2a be 46 8d 20 60 df db | 07 4b 68 3b f4 5c 0f 39 ef 4f 67 78 1a 41 5e d9 | 21 46 6b 9d 25 f7 b9 97 47 6b 61 67 28 72 bc ab | 6f b2 d8 94 3c 23 68 03 63 f9 fd 48 53 49 f9 59 | 58 72 d8 2c 34 ca e6 db de 5e 25 73 b8 b7 64 58 | c2 d1 ad 6f 0e ca 13 2e b2 5c 80 d7 ba 3d 3c a9 | 3d f9 8e 60 bf 1b 92 40 5e 5c 05 7e ba c9 a8 db | 73 77 de d1 63 54 7f e1 7b 4e 7b ea 38 36 f5 df | ad 83 e3 b0 ba 8d 91 72 ad 79 42 21 5b 3d 90 52 | 8f 94 65 66 3d 81 71 1c 3b 5e 4d 22 19 2e a8 97 | 29 00 00 24 16 ec e2 f4 0d c3 b4 c6 88 17 fa c1 | 57 1b 6f 8e 72 cf d0 88 9c 45 18 d1 76 a6 22 b7 | e9 88 2c 7a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 7d b4 14 23 b3 6a c1 75 92 cb 9c | f1 ae 10 a4 55 81 67 0f 00 00 00 1c 00 00 40 05 | d3 a6 c6 52 7d d4 a1 eb 3d cd 3f 6c 65 3f cc dd | 6f e3 2d 43 | libevent_free: release ptr-libevent@0x7fb3600251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00d120 | #317 spent 0.0864 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c a2 6c e8 b2 28 e0 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #317 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #317 | rejected packet: | 5c a2 6c e8 b2 28 e0 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #317: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #177 | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #177 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #177 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49678.062479; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00834 exceeds limit? YES "road-eastnet-nonat-177" #177: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-177" #177: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #429 at 0x557d46ac4940 | State DB: adding IKEv2 state #429 in UNDEFINED | pstats #429 ikev2.ike started | Message ID: init #429: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #429: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #429; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-177" #429: initiating v2 parent SA to replace #177 | using existing local IKE proposals for connection road-eastnet-nonat-177 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 429 for state #429 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c00d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #429 | libevent_malloc: new ptr-libevent@0x7fb3600251c0 size 128 | #429 spent 0.0677 milliseconds in ikev2_parent_outI1() | RESET processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #177 ikev2.ike failed too-many-retransmits | pstats #177 ikev2.ike deleted too-many-retransmits | crypto helper 6 resuming | crypto helper 6 starting work-order 429 for state #429 | #177 spent 2.62 milliseconds in total | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 429 | [RE]START processing: state #177 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-177" #177: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #177: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #177 "road-eastnet-nonat-177" #177: deleting IKE SA for connection 'road-eastnet-nonat-177' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-177' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-177 | State DB: deleting IKEv2 state #177 in PARENT_I1 | parent state #177: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 429 time elapsed 0.000617 seconds | (#429) spent 0.621 milliseconds in crypto helper computing work-order 429: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 429 for state #429 to event queue | scheduling resume sending helper answer for #429 | stop processing: state #177 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | libevent_malloc: new ptr-libevent@0x7fb36c02ed30 size 128 | crypto helper 6 waiting (nothing to do) | in statetime_stop() and could not find #177 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-177 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-177" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-177' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-177" | stop processing: connection "road-eastnet-nonat-177" (in initiate_a_connection() at initiate.c:349) | spent 0.0713 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #429 | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 429 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #429 | **emit ISAKMP Message: | initiator cookie: | b1 3d 9b 75 e9 17 32 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-177 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2c 58 34 a3 ec c6 75 50 25 fe 5f 41 58 c3 98 5a | ikev2 g^x 11 1f 83 e4 20 79 02 69 b1 3d ac 82 33 8f 44 96 | ikev2 g^x e7 d5 9d 7b f3 d7 f5 f1 3c 4b 07 77 e3 30 83 22 | ikev2 g^x 33 90 f7 d8 39 7d 51 da 1f be a3 9d 27 21 e0 23 | ikev2 g^x 1c c5 b5 f8 01 28 d0 3f bb de 17 8b 08 3e 77 12 | ikev2 g^x 3b 7e a1 ef 9e 6d 3b c1 0f 78 3f 7f d4 15 3e 67 | ikev2 g^x bd d8 07 2d 5c 0a f8 3b 6e 03 96 47 2a 3b ad 8d | ikev2 g^x fd ac a5 a9 41 55 69 70 54 4f c8 07 46 0f 75 8a | ikev2 g^x 8e 3a c9 5a 0e 6f 91 97 a2 53 99 02 54 c0 74 38 | ikev2 g^x 8d d6 59 17 7c b6 f5 96 24 2d 36 88 1b c1 a8 f4 | ikev2 g^x 9a 2c c6 20 9e 9c 1f 79 b7 b2 e2 28 6d c8 dc ea | ikev2 g^x ab 6f 81 8f 3c 54 99 e1 b5 ac 7a 7b e2 4b b7 47 | ikev2 g^x cc 01 c3 58 76 3a 5d 7a 87 5a 60 d6 14 71 21 77 | ikev2 g^x 7d 56 a9 78 8c 67 16 f3 5f ff 22 ed 4c 9c 08 f9 | ikev2 g^x b7 a6 81 b8 d7 76 0d 66 ab 45 4e 0c 98 69 dc 04 | ikev2 g^x 8b a0 74 65 f2 0e e3 59 97 ce 63 09 c5 83 7c 9c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce cb 81 79 39 c4 59 07 cd 3c 90 56 3e 9d 57 79 9f | IKEv2 nonce 8d e6 58 24 f4 84 cf b6 0e b6 4d 54 f8 24 7a fb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b1 3d 9b 75 e9 17 32 ee | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b1 | natd_hash: port= 01 f4 | natd_hash: hash= fb 94 ea 1e 66 81 07 70 ab d6 5a a9 c0 a7 0f 24 | natd_hash: hash= 1b cb e7 a4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fb 94 ea 1e 66 81 07 70 ab d6 5a a9 c0 a7 0f 24 | Notify data 1b cb e7 a4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b1 3d 9b 75 e9 17 32 ee | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 17 95 c4 1b c0 e8 ee e6 7e 70 e4 b9 12 c2 c5 ed | natd_hash: hash= 6f 00 57 73 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 17 95 c4 1b c0 e8 ee e6 7e 70 e4 b9 12 c2 c5 ed | Notify data 6f 00 57 73 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #429 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #429: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #429 to 4294967295 after switching state | Message ID: IKE #429 skipping update_recv as MD is fake | Message ID: sent #429 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-177" #429: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.177:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #429) | b1 3d 9b 75 e9 17 32 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 58 34 a3 ec c6 75 50 25 fe 5f 41 58 c3 98 5a | 11 1f 83 e4 20 79 02 69 b1 3d ac 82 33 8f 44 96 | e7 d5 9d 7b f3 d7 f5 f1 3c 4b 07 77 e3 30 83 22 | 33 90 f7 d8 39 7d 51 da 1f be a3 9d 27 21 e0 23 | 1c c5 b5 f8 01 28 d0 3f bb de 17 8b 08 3e 77 12 | 3b 7e a1 ef 9e 6d 3b c1 0f 78 3f 7f d4 15 3e 67 | bd d8 07 2d 5c 0a f8 3b 6e 03 96 47 2a 3b ad 8d | fd ac a5 a9 41 55 69 70 54 4f c8 07 46 0f 75 8a | 8e 3a c9 5a 0e 6f 91 97 a2 53 99 02 54 c0 74 38 | 8d d6 59 17 7c b6 f5 96 24 2d 36 88 1b c1 a8 f4 | 9a 2c c6 20 9e 9c 1f 79 b7 b2 e2 28 6d c8 dc ea | ab 6f 81 8f 3c 54 99 e1 b5 ac 7a 7b e2 4b b7 47 | cc 01 c3 58 76 3a 5d 7a 87 5a 60 d6 14 71 21 77 | 7d 56 a9 78 8c 67 16 f3 5f ff 22 ed 4c 9c 08 f9 | b7 a6 81 b8 d7 76 0d 66 ab 45 4e 0c 98 69 dc 04 | 8b a0 74 65 f2 0e e3 59 97 ce 63 09 c5 83 7c 9c | 29 00 00 24 cb 81 79 39 c4 59 07 cd 3c 90 56 3e | 9d 57 79 9f 8d e6 58 24 f4 84 cf b6 0e b6 4d 54 | f8 24 7a fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 94 ea 1e 66 81 07 70 ab d6 5a a9 | c0 a7 0f 24 1b cb e7 a4 00 00 00 1c 00 00 40 05 | 17 95 c4 1b c0 e8 ee e6 7e 70 e4 b9 12 c2 c5 ed | 6f 00 57 73 | state #429 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3600251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c00d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #429 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 | #429 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49678.063669 | resume sending helper answer for #429 suppresed complete_v2_state_transition() and stole MD | #429 spent 0.308 milliseconds in resume sending helper answer | stop processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c02ed30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 3d 9b 75 e9 17 32 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #429 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #429 | rejected packet: | b1 3d 9b 75 e9 17 32 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b1 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #429: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374045e40 | handling event EVENT_RETRANSMIT for parent state #415 | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #415 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #415 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49678.086893; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001911 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c01d710 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #415 | libevent_malloc: new ptr-libevent@0x7fb36c02ed30 size 128 "road-eastnet-nonat-163" #415: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #415) | 65 fc 55 c7 f1 44 1e 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 9b 11 f8 2e b4 b5 c5 30 9b 3d a0 a2 4b 27 41 | f3 d8 72 20 8a 56 0a 05 ca 4d 84 e6 cb f6 3e 40 | 63 3e 65 dc a2 c0 87 47 ce 3b 5e 72 88 1b 50 31 | 15 c5 cf 6b 4a 2f c7 ec 02 24 2b 5b d8 13 58 82 | ef 96 ce cf 1b c6 83 84 dd 4e ef ff 6c f9 de 4b | fa f0 63 3e cd 62 10 03 38 09 9e db 49 54 15 3a | a8 3d 15 df b8 ef fb f6 60 02 a0 d4 fd 2e 9b e9 | ce 3a 0e 92 13 6c 3b 4e d2 2c 44 8a 4a 9a 05 6f | c3 bf 63 16 b0 c4 63 88 ff 02 84 93 54 65 74 42 | 97 c9 d1 95 9c 76 cf c6 11 6e 97 99 50 ea 6c f5 | 6f f0 5c 9c c9 57 a9 e3 41 19 f6 b0 38 a3 e5 ef | 84 44 8a 93 ae f1 ef 1d 2e 53 2b d3 a8 41 d5 27 | 64 64 ae fa 1d fd ea 61 22 f5 cc 34 a6 a2 ea 37 | 88 8a b9 05 5f 00 cd a9 3b c3 f2 31 36 31 fa 53 | 3d ba 7c f3 35 4b 65 ab 19 3c 20 1a b3 c4 2a ca | f4 c6 08 71 62 bd 13 1a f6 9c 40 a8 5d ea 27 a8 | 29 00 00 24 e8 b8 58 d7 ae 38 da 44 20 ee 1e 02 | 80 cb 41 b6 8f 71 2c 96 9f ff be f1 a6 fa a0 4e | 6d 67 74 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 e0 03 d8 e5 8b 46 47 10 2c a8 6c | 82 9e b3 1d 1e 26 96 28 00 00 00 1c 00 00 40 05 | bb 40 b0 02 70 34 84 30 58 79 6d d4 87 e5 1d 82 | 6b ed a6 65 | libevent_free: release ptr-libevent@0x7fb374029410 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374045e40 | #415 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 fc 55 c7 f1 44 1e 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #415 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #415 | rejected packet: | 65 fc 55 c7 f1 44 1e 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #415: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #371 | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #371 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #371 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49678.099137; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004943 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374045e40 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #371 | libevent_malloc: new ptr-libevent@0x7fb374029410 size 128 "road-eastnet-nonat-119" #371: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #371) | ea d3 d9 fc 5b 7e b4 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 af 47 0e 69 de 58 3a 2d 1e 57 76 30 bc 22 a4 | 2e b6 88 1e b3 88 e7 a1 c8 be 2b 4e 69 e2 28 01 | d0 52 c1 fa 78 94 10 52 aa 87 89 5a 02 a4 2d d1 | 6b d9 9b 86 d2 da a0 98 26 8e b9 2f 8a a2 27 af | de 72 28 ad 98 97 b6 15 90 9c ae 3a 16 ae 38 00 | 2e 00 fb 22 bb 46 e6 d4 1f 46 0d dd a1 55 00 4a | ce 15 02 1f 97 d1 0a 8b 6a 9c c8 a8 24 2f 84 76 | 4b d2 ac 8c 05 c7 63 26 60 5d b2 3c e7 66 a9 5d | bd fb b9 24 84 be 9f 9f d0 98 db 75 76 42 5a 2c | 99 3f 96 7c cd 86 57 c4 8b f7 47 04 8d 56 1e 36 | 87 53 98 86 58 32 c9 ce 17 26 19 6b 99 a4 da aa | cb 3c 40 8e 29 32 f1 cd b7 5a 34 1f de 2b 31 8c | 0d 44 f0 ee 94 1a 31 39 88 2c 28 df 02 20 48 5d | 9d 67 4b c6 5a 1a 30 81 19 09 4e 1b ac 9d a3 80 | 78 a7 b1 0a 79 f2 60 13 6a a0 1a 0d 01 b3 b3 40 | 74 bb ba 1f 20 2b 3c 36 9e 56 74 1c ba 16 9e 5f | 29 00 00 24 c2 25 48 18 a9 32 86 16 98 b5 8a 9d | 56 ab 3c 59 82 6e f2 93 a8 6a ca 20 09 df d9 6f | aa 1d 6f e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 eb 88 f4 ae c4 a3 7b f7 07 ac 42 | 0d c0 83 df c2 98 39 e6 00 00 00 1c 00 00 40 05 | 0c 73 7d f6 90 2f 67 26 fc 28 2f df 9c 80 3e da | bc 60 3a 9d | libevent_free: release ptr-libevent@0x7fb364008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #371 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea d3 d9 fc 5b 7e b4 e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #371 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #371 | rejected packet: | ea d3 d9 fc 5b 7e b4 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #371: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c046090 | handling event EVENT_RETRANSMIT for parent state #400 | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #400 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #400 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49678.109404; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002964 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #400 | libevent_malloc: new ptr-libevent@0x7fb364008e30 size 128 "road-eastnet-nonat-148" #400: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #400) | 6c f1 c2 e4 ca 88 89 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 14 1f bf 2d 44 6c 78 3f 86 f8 f3 fa a1 a5 9d | a0 a8 08 62 76 01 cc db f3 4e 4a c1 03 ae f2 db | c6 06 da 1a 15 ae 3e f9 fa b6 70 0f b3 7b e5 34 | 8d 5b 06 20 ef d4 aa 62 0d d5 a9 7d 3d 49 08 95 | 77 51 97 14 c6 fe 13 ee ee 9b f0 54 56 73 79 30 | ad d7 b3 17 12 47 8d 8d e8 49 20 41 18 2a 1c c8 | c4 68 99 45 f4 b5 f1 6d d9 34 ec 8a e3 80 cc 67 | 30 b6 d6 0d 11 9e 86 7f 87 2f c0 73 7c 40 eb 31 | 24 34 89 0e ca 7b 62 d2 f6 17 85 8f 75 81 28 9b | 1c a9 03 80 8d 78 61 63 07 3b b3 b9 c4 40 46 d5 | ab 82 5f da 4c aa ce 61 bb ab c0 1a 00 85 50 e6 | e8 f6 9f c8 7f 01 8e 16 ac 04 56 78 cf 7c 43 a9 | f9 c7 26 fb 06 32 92 98 86 3f 37 ca f2 f2 fc bf | 1d e3 ee 48 e8 25 74 7d 16 d9 38 6e ca e9 38 51 | 44 22 32 93 01 95 d0 87 12 07 ff 4c 7e 49 f3 04 | 98 50 fe 91 bd 78 84 00 92 17 d7 f5 e0 e1 d0 43 | 29 00 00 24 aa 21 0d 2f 8b 5a 11 5c 7a 19 73 4d | 8f 68 86 24 6a ba 53 0b 82 59 c5 5c 31 b4 eb 7e | 18 78 2e 54 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 82 bc d9 51 57 ae 67 73 5e 22 78 | a2 06 a4 b1 df 07 78 c3 00 00 00 1c 00 00 40 05 | 48 01 58 d1 13 9f 6e 34 06 7b 6e f6 08 2f fa 1f | f9 ef b6 96 | libevent_free: release ptr-libevent@0x7fb37c023f10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c046090 | #400 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c f1 c2 e4 ca 88 89 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #400 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #400 | rejected packet: | 6c f1 c2 e4 ca 88 89 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #400: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b07dc0 | handling event EVENT_RETRANSMIT for parent state #318 | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #318 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #318 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49678.11274; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004927 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c046090 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #318 | libevent_malloc: new ptr-libevent@0x7fb37c023f10 size 128 "road-eastnet-nonat-66" #318: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #318) | b2 9a b8 bc 53 a3 28 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 a5 e6 b7 f3 09 b3 42 4d 70 2a 31 41 4a a2 a1 | da f8 c5 36 7a f2 dc 2d e7 30 c8 c3 07 0a c2 47 | 04 c4 b8 ae 57 b2 7f d1 c1 3e 18 53 e1 5d 14 23 | 04 61 06 e4 91 ef 35 cb ed 7a b9 57 a4 d9 68 76 | fa fd da 0f 58 44 d0 fa 3e 4e 2b ac ca 5d a5 c8 | 76 05 a5 5d 02 6a 96 c6 41 4e 3f 64 57 cd 41 d5 | d0 97 ad ff 58 6a 53 9a 01 1f 6b 3c 24 fe 31 ac | 0d 3c 93 ac 2c da 29 01 1d c2 dd be c2 11 80 ff | b5 b8 9d 4b 81 9c 72 55 6a 84 69 3f d0 ed e9 0c | 2b e3 ca 41 a3 62 7c a2 71 2a 37 58 65 17 c1 53 | cd 34 43 97 e4 05 81 70 70 41 b7 fe ed 43 15 27 | b6 ca b7 9c 9b 05 11 e5 9d 9d 78 a9 d5 63 3e b9 | 63 ef dc 73 f8 b5 32 8d f5 20 3c b0 29 8a 0d 0c | 3e 9f 40 29 07 45 7e 5f 6e e1 39 0d cb 64 2d c9 | 21 f3 18 88 11 a7 78 9d e5 c3 5e 82 9b 66 98 d0 | bb 21 5b 84 f3 89 c9 aa 9f 01 2e d6 67 59 8b 4c | 29 00 00 24 ef 94 98 d7 0c cd d4 f9 7f 97 bf da | 65 7b fd be ba 01 e1 85 cc 2b 5d 20 cf d0 d6 ef | 60 90 51 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 61 27 ec f1 41 a3 45 56 13 d5 ea | 91 6f ea fa 23 e5 f5 e5 00 00 00 1c 00 00 40 05 | d1 cc 61 18 e0 64 68 30 f0 cc 90 9d 95 49 27 67 | 23 d5 d1 7a | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b07dc0 | #318 spent 0.208 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 9a b8 bc 53 a3 28 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #318 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #318 | rejected packet: | b2 9a b8 bc 53 a3 28 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #318: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0768 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b610 | handling event EVENT_RETRANSMIT for parent state #423 | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #423 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #423 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49678.123181; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501162 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #423 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 "road-eastnet-nonat-171" #423: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #423) | 0d af b2 c4 93 36 1d aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 70 3e db fb be 8b b3 fd 73 c0 a9 96 0b 3d a8 | e8 36 31 e7 9c ec 5a 7d ff 70 f6 37 85 23 83 66 | b2 fa b4 b8 d5 45 16 aa a6 25 06 9f 8e 8e bf 87 | eb 95 12 b7 4e e4 06 f4 d1 f8 40 ef 32 40 e6 a6 | 6e f4 f8 67 e1 5b 90 26 e6 0e 43 21 0c 13 d6 b5 | 8e c1 48 f1 b8 e8 39 77 8f 82 36 7b 93 75 c8 ab | 84 91 17 9b a4 7d 3c 17 79 cf 26 b4 a0 3c f6 3b | 8a 9e f2 22 e0 37 3d 4a 22 71 37 fa af 63 94 e0 | 5d cb 53 25 8c 9f 3c aa f6 38 ac 60 e7 b7 a3 49 | 84 5c ea cd 1a 4a 52 75 d6 46 93 25 09 85 d1 82 | dd 53 68 4b de 95 3f 19 ff d3 86 0a c0 38 25 ae | 80 9b b3 ed 25 0e b6 ad 72 55 3f 58 28 54 96 74 | 26 60 4c 26 05 26 c2 53 24 50 7e 5b 35 6b ca a1 | e8 d8 01 f8 35 32 32 e5 07 d9 c6 ca 24 0c 96 3a | 31 97 ac ed 1f 95 1e 6e 00 fc 4a 03 2a 9c 00 a0 | bd e4 04 9f 5c 17 08 9c 92 06 6e 29 32 98 a2 91 | 29 00 00 24 ce f0 94 25 9a 41 87 5c 3e 7f f2 93 | 02 a0 d4 6b b2 dd 60 48 d2 68 61 fc a3 c4 4b 4a | b6 d0 3f b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 fb df b4 aa 7f 08 b4 87 40 7c 29 | 54 a9 d0 e2 e4 44 95 43 00 00 00 1c 00 00 40 05 | b2 9a 73 50 a7 57 97 7d 3b 57 52 b7 42 61 08 84 | 33 0c bd 82 | libevent_free: release ptr-libevent@0x7fb388048a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b610 | #423 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d af b2 c4 93 36 1d aa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #423 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #423 | rejected packet: | 0d af b2 c4 93 36 1d aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #423: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0481 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35800cc10 | handling event EVENT_RETRANSMIT for parent state #416 | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #416 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #416 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49678.147469; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001739 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b610 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #416 | libevent_malloc: new ptr-libevent@0x7fb388048a80 size 128 "road-eastnet-nonat-164" #416: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #416) | 5d bf 34 43 fd eb 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 9c 12 61 6e 55 5f 3f e9 df f9 16 83 d1 25 2a | 72 5f a1 78 f7 87 25 3a 22 d7 65 e6 11 d9 d3 59 | e3 ba 0c 77 63 47 38 eb 2b 7e 21 79 54 43 77 67 | 7d 43 26 41 55 e2 a8 b7 fe 98 ba 7e ee 6e e7 d1 | f4 f4 66 e8 1d dc d6 4c 00 81 99 f5 5a 7b 73 a7 | 30 2a 46 7a 31 1a a2 5d 7f 98 25 46 aa 6e fe 80 | f5 47 c9 6c 4b 73 63 fa cd 88 eb 14 22 c8 b1 b2 | ad 5f b2 f2 36 1e b4 11 ad 9a b6 4a 8b 3e c1 87 | 99 5d 71 91 57 ac 82 f2 a3 ed 29 f1 0e 50 36 50 | 84 2e 3a 51 9c b6 89 41 dc e0 0d 62 c7 07 fd 92 | b2 9d 62 79 ea 78 ed 7f ed 48 ed 1d 98 d3 08 ff | 02 b4 3e 75 4f aa f5 e9 04 8d 83 d6 4c a8 75 42 | 31 a1 15 df b2 8a e4 30 1f 81 68 86 a3 e6 e3 23 | 56 ac 18 47 57 cf 03 de 91 03 0e d5 5d 28 a8 63 | aa 5c 8c 97 5e 5c eb 84 7c 09 fb 47 84 e9 d6 18 | 63 4d 10 b9 7d 4e 26 06 3f 25 b1 aa e9 d4 6c b6 | 29 00 00 24 b4 c4 67 16 b9 c2 e8 af d8 82 12 ab | bc d9 b4 36 b0 6a ad c4 e5 8c 60 6e da e3 9f 02 | d5 5c 1a 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 19 76 97 4c b0 23 bd 31 57 aa f9 24 | a0 38 a6 39 12 13 22 3e 00 00 00 1c 00 00 40 05 | d7 f1 41 97 86 a8 54 0a 0b 1f 8a 34 7f d0 a2 86 | ea 0e a2 fa | libevent_free: release ptr-libevent@0x7fb35804ba00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800cc10 | #416 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d bf 34 43 fd eb 2e 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #416 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #416 | rejected packet: | 5d bf 34 43 fd eb 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #416: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0752 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa0940 | handling event EVENT_RETRANSMIT for parent state #178 | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #178 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #178 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49678.152821; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.01089 exceeds limit? YES "road-eastnet-nonat-178" #178: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-178" #178: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #430 at 0x557d46ac5f00 | State DB: adding IKEv2 state #430 in UNDEFINED | pstats #430 ikev2.ike started | Message ID: init #430: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #430: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #430; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-178" #430: initiating v2 parent SA to replace #178 | using existing local IKE proposals for connection road-eastnet-nonat-178 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 430 for state #430 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35800cc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #430 | libevent_malloc: new ptr-libevent@0x7fb35804ba00 size 128 | #430 spent 0.104 milliseconds in ikev2_parent_outI1() | crypto helper 11 resuming | RESET processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 starting work-order 430 for state #430 | start processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 430 | pstats #178 ikev2.ike failed too-many-retransmits | pstats #178 ikev2.ike deleted too-many-retransmits | #178 spent 2.42 milliseconds in total | [RE]START processing: state #178 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-178" #178: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #178: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #178 "road-eastnet-nonat-178" #178: deleting IKE SA for connection 'road-eastnet-nonat-178' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-178' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-178 | State DB: deleting IKEv2 state #178 in PARENT_I1 | parent state #178: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #178 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 430 time elapsed 0.000631 seconds | libevent_free: release ptr-libevent@0x7fb3380300e0 | (#430) spent 0.64 milliseconds in crypto helper computing work-order 430: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 430 for state #430 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa0940 | in statetime_stop() and could not find #178 | scheduling resume sending helper answer for #430 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb36002ed90 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 11 waiting (nothing to do) Initiating connection road-eastnet-nonat-178 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-178" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-178' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-178" | stop processing: connection "road-eastnet-nonat-178" (in initiate_a_connection() at initiate.c:349) | spent 0.0728 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #430 | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 430 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #430 | **emit ISAKMP Message: | initiator cookie: | fd 31 ba 30 35 2e 2d c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-178 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 63 61 13 a5 cc e9 81 b6 86 fc 6b 16 f1 74 d1 d9 | ikev2 g^x 72 f7 e2 ba f7 11 d1 79 92 c8 3d 2f 28 42 00 4a | ikev2 g^x 78 0d 84 65 5e dc 17 2f ba 15 c9 f0 22 4d 0a 3b | ikev2 g^x 29 55 5d 3f ae dd 3d 32 e8 c3 46 a9 04 47 63 51 | ikev2 g^x 2f 80 77 91 5f 9c b1 19 0f 94 27 d5 5d fe 9c 81 | ikev2 g^x eb f7 f8 80 c0 5d c2 5a 33 1a 77 e9 05 ab d6 42 | ikev2 g^x 13 e3 2a 15 08 f1 ba d2 bf eb 3d 3d ce 2d cd 92 | ikev2 g^x 09 c3 9f 5e 21 7b 84 9b 7e ad 3a cb 5a e8 5e a4 | ikev2 g^x 33 a8 4d 41 b7 9c ef db 29 ac 76 73 88 b2 9f 61 | ikev2 g^x fa 8c 1c 07 e5 8d 13 2c 9f d7 a6 11 29 94 1a 21 | ikev2 g^x 41 e9 57 a1 8b f3 e6 b9 90 b9 b8 f3 a3 3b 4c 8f | ikev2 g^x 23 8e 08 2f 27 17 72 8c c0 e7 38 14 1f 4b aa 78 | ikev2 g^x e1 d2 e5 79 c4 be 0b 93 9e 0c 21 6c d4 2a fe 21 | ikev2 g^x c7 8e 29 af b0 03 63 38 02 4d 95 ee 76 1a 81 af | ikev2 g^x a9 96 3e 2d 7b 5a 65 f4 b4 60 bb 2f a9 e9 18 59 | ikev2 g^x 66 94 d6 32 f1 9f 06 b1 1e 3d 20 4c 29 30 cd 34 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 72 14 4a 62 3b 2e 28 0b 02 9a 2b 55 37 9d 8e 84 | IKEv2 nonce fb c2 f7 70 ad cf 43 07 12 85 de c1 7c 78 30 38 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fd 31 ba 30 35 2e 2d c7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b2 | natd_hash: port= 01 f4 | natd_hash: hash= e0 6b 92 d2 7b 15 90 7f 21 2f b9 04 b8 30 3c 8f | natd_hash: hash= c2 2d 01 6b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e0 6b 92 d2 7b 15 90 7f 21 2f b9 04 b8 30 3c 8f | Notify data c2 2d 01 6b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fd 31 ba 30 35 2e 2d c7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4e cf 7c 8c 30 ae f3 1b a7 47 e4 11 ea a4 73 10 | natd_hash: hash= 14 82 c2 9c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4e cf 7c 8c 30 ae f3 1b a7 47 e4 11 ea a4 73 10 | Notify data 14 82 c2 9c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #430 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #430: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #430 to 4294967295 after switching state | Message ID: IKE #430 skipping update_recv as MD is fake | Message ID: sent #430 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-178" #430: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.178:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #430) | fd 31 ba 30 35 2e 2d c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 61 13 a5 cc e9 81 b6 86 fc 6b 16 f1 74 d1 d9 | 72 f7 e2 ba f7 11 d1 79 92 c8 3d 2f 28 42 00 4a | 78 0d 84 65 5e dc 17 2f ba 15 c9 f0 22 4d 0a 3b | 29 55 5d 3f ae dd 3d 32 e8 c3 46 a9 04 47 63 51 | 2f 80 77 91 5f 9c b1 19 0f 94 27 d5 5d fe 9c 81 | eb f7 f8 80 c0 5d c2 5a 33 1a 77 e9 05 ab d6 42 | 13 e3 2a 15 08 f1 ba d2 bf eb 3d 3d ce 2d cd 92 | 09 c3 9f 5e 21 7b 84 9b 7e ad 3a cb 5a e8 5e a4 | 33 a8 4d 41 b7 9c ef db 29 ac 76 73 88 b2 9f 61 | fa 8c 1c 07 e5 8d 13 2c 9f d7 a6 11 29 94 1a 21 | 41 e9 57 a1 8b f3 e6 b9 90 b9 b8 f3 a3 3b 4c 8f | 23 8e 08 2f 27 17 72 8c c0 e7 38 14 1f 4b aa 78 | e1 d2 e5 79 c4 be 0b 93 9e 0c 21 6c d4 2a fe 21 | c7 8e 29 af b0 03 63 38 02 4d 95 ee 76 1a 81 af | a9 96 3e 2d 7b 5a 65 f4 b4 60 bb 2f a9 e9 18 59 | 66 94 d6 32 f1 9f 06 b1 1e 3d 20 4c 29 30 cd 34 | 29 00 00 24 72 14 4a 62 3b 2e 28 0b 02 9a 2b 55 | 37 9d 8e 84 fb c2 f7 70 ad cf 43 07 12 85 de c1 | 7c 78 30 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e0 6b 92 d2 7b 15 90 7f 21 2f b9 04 | b8 30 3c 8f c2 2d 01 6b 00 00 00 1c 00 00 40 05 | 4e cf 7c 8c 30 ae f3 1b a7 47 e4 11 ea a4 73 10 | 14 82 c2 9c | state #430 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35804ba00 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35800cc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa0940 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #430 | libevent_malloc: new ptr-libevent@0x7fb3380300e0 size 128 | #430 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49678.154338 | resume sending helper answer for #430 suppresed complete_v2_state_transition() and stole MD | #430 spent 0.564 milliseconds in resume sending helper answer | stop processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36002ed90 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 31 ba 30 35 2e 2d c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #430 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #430 | rejected packet: | fd 31 ba 30 35 2e 2d c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b2 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #430: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800cc10 | handling event EVENT_RETRANSMIT for parent state #372 | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #372 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #372 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49678.166556; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00381 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36001d710 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #372 | libevent_malloc: new ptr-libevent@0x7fb36002ed90 size 128 "road-eastnet-nonat-120" #372: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #372) | 36 75 19 e8 2f 22 a4 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 1c 43 17 d7 b5 ce d2 b8 29 b2 bf 57 09 8b a5 | 02 ac c4 b7 76 e6 2d d8 ee ee 3c fe f4 66 f4 89 | f0 05 d4 6f 70 58 f2 ac a3 f6 a0 c0 6f e2 88 9c | 40 3f 21 b6 b5 e3 53 20 6c d9 59 5c d3 ed 29 31 | 70 b1 e2 00 f7 0a fb f6 8a 39 29 d2 58 c2 74 92 | 4c 9b 08 3f 44 b8 04 b0 23 1d ad 99 96 41 5c c3 | 74 17 1f 67 0a d8 d1 96 a3 e0 b8 c3 31 5e 35 15 | b4 7d 07 ac 51 6c 39 25 b1 04 61 4c b1 08 c3 a9 | 03 2e 6c 07 f6 12 ea 26 ae ed 42 10 86 bf 00 1f | 2c 3f d3 c3 05 31 1b 23 d0 7f 44 40 17 23 be b1 | ac f2 d9 5c 2d 0f 0e 8d d6 8e 02 9e c2 0d 39 2a | 1e 53 92 9d 45 7f f8 25 a0 3b 40 14 ce aa d7 8e | 3c 97 d8 0a 68 34 c5 e0 01 c0 9d 3c df ab b9 db | 0f 08 4e 9b 7f 31 ba b0 df 14 c3 2e b6 43 df 9c | e8 24 93 e8 93 fa be d8 05 20 58 54 dc 18 b6 a1 | 81 c2 54 d8 9d 63 fd 0b 60 e1 78 75 ef 13 d9 ec | 29 00 00 24 5b 70 e2 22 fb be c5 61 40 e7 92 1f | fe 03 7b 3d 26 2b 9e 50 62 fe 14 ef 7e 0b e5 c1 | 7b 5b 83 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6f bb b6 72 03 25 00 b3 08 33 f3 00 | 3f a7 05 f9 e6 64 00 bb 00 00 00 1c 00 00 40 05 | 5c 2b 76 69 54 27 3e cb 36 ec 86 9b 13 f7 89 7b | 0b 66 55 89 | libevent_free: release ptr-libevent@0x7fb33801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800cc10 | #372 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 75 19 e8 2f 22 a4 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #372 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #372 | rejected packet: | 36 75 19 e8 2f 22 a4 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #372: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0471 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358012bf0 | handling event EVENT_RETRANSMIT for parent state #319 | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #319 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #319 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49678.174836; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005358 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800cc10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #319 | libevent_malloc: new ptr-libevent@0x7fb33801a4e0 size 128 "road-eastnet-nonat-67" #319: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #319) | 11 2f c2 e2 55 80 ad fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 29 97 2b 00 80 7a b2 ce 19 1b 94 79 57 61 71 | b5 31 67 66 2a f4 c8 dd 15 9f e0 ad 50 a1 3c 77 | 34 62 bd 4c c6 67 73 04 6a 47 e6 12 64 23 d5 1b | 98 65 2d 83 00 df 2d e7 e4 d4 74 c8 bc 36 30 29 | 44 5a 01 b4 02 e1 00 0f 8d ad 81 f9 8e 46 de 85 | 06 c3 07 15 fc b6 b0 15 06 43 f6 0e a8 fd 09 ef | d8 40 6e 21 d5 b3 5d 25 10 a6 87 71 c1 c1 fe d8 | bf 80 48 df 26 2b e7 63 6d 12 1e cf 0b 06 eb b0 | 7e 3e d5 d0 6b 21 8d aa 41 e8 f8 30 37 35 ac fc | 15 96 69 e5 f5 b2 90 e3 4e fe 2d ad 13 5f a0 e8 | 1c c7 69 35 1d b3 4c 80 f6 b9 3c 2d 05 13 72 b5 | 7e a3 0f 53 4b 80 32 e8 c3 5e b7 f7 2e ae 6c 5b | 24 7a c5 8a 0a 7f 55 0a 11 24 c0 ef fe 17 1d 30 | 05 8e ac 66 5c 3e f2 80 08 7e 41 35 dd 7a 17 b5 | ec 43 f0 d8 c9 61 5b 46 04 99 f3 93 60 24 02 4a | 51 18 18 5f 6c cb 3e f9 d1 40 eb 27 ba 67 3b b9 | 29 00 00 24 b8 88 60 8f 24 78 87 d6 7e a3 09 04 | de 05 ae 45 4d b7 3b ca 2f 96 5c 9a fa 13 da 85 | a2 c0 a1 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 04 44 46 25 45 86 78 cb ac b2 11 | 55 71 47 06 ea 13 d1 6f 00 00 00 1c 00 00 40 05 | 2f 9a c9 00 f1 11 a0 f7 d7 69 9d e9 ea e6 fc 70 | 38 db 7b 3a | libevent_free: release ptr-libevent@0x7fb358023a50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358012bf0 | #319 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 2f c2 e2 55 80 ad fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #319 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #319 | rejected packet: | 11 2f c2 e2 55 80 ad fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #319: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0649 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350018460 | handling event EVENT_RETRANSMIT for parent state #401 | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #401 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #401 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49678.176152; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003024 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #401 | libevent_malloc: new ptr-libevent@0x7fb358023a50 size 128 "road-eastnet-nonat-149" #401: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #401) | 32 2a 52 53 b6 80 03 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 23 97 0d 57 1e 4b f9 07 88 66 bf 34 6e 58 4c | e6 20 66 15 d1 8b df 5a d2 2b 70 66 bf e5 46 ee | 75 f4 eb 71 1f f1 6f e1 d6 58 06 0a 4d 97 04 53 | 74 d3 7a 62 9c 6d fc 73 97 9b c2 cb c3 d3 cb d1 | a7 2a 8a bf ad 15 46 4b ac 4a 21 e7 16 cd 32 18 | f6 83 ab c8 99 38 21 bc e5 81 05 3f fc e4 b5 9f | 7d 77 82 93 0f 69 5a af 5b c2 81 88 55 f6 fa cc | 86 fe 2d 7e 6d ae 3a 9b 57 e6 de 78 5a 36 ba 60 | 3d 56 da 1d 5d 7b 85 49 92 79 e6 7c 62 e6 ba 39 | 70 40 1b 2f 31 49 fc c6 d5 8b 43 aa e6 2d 80 f1 | 00 4e 8e 1a 05 73 d3 15 0d 7c 1c 15 71 3b 45 0a | 71 47 01 7c 8b 3a 4c 28 d2 c5 72 06 09 34 70 7a | 6f eb 8d 51 fc f9 d9 92 d1 00 53 57 7a 80 e8 39 | 37 38 0d 62 49 b3 0f 75 c3 ee 8b a3 66 04 51 8d | 4d ca 16 c5 dc 18 bd ee 26 01 0f c7 9b e6 0b 35 | e3 5e 44 0d 5e 45 e9 f2 25 03 56 4f 95 a8 57 74 | 29 00 00 24 98 0f af 0d 18 0d 49 ab 74 8d 40 09 | a9 19 04 ac c2 29 19 2a e5 21 dd 83 5a 09 3e 6b | 71 16 78 8b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 5b 75 e0 fb 06 ab 59 93 2a 0c bc | 70 9d 3c 6c 4b 98 95 ed 00 00 00 1c 00 00 40 05 | 06 0c a6 cc 70 cf f8 01 75 5d 68 14 0f cc 7e 89 | 81 50 60 0f | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350018460 | #401 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 2a 52 53 b6 80 03 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #401 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #401 | rejected packet: | 32 2a 52 53 b6 80 03 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #401: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad4380 | handling event EVENT_RETRANSMIT for parent state #424 | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #424 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #424 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49678.191461; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500002 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #424 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-172" #424: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #424) | e5 61 ef 5f 7f e3 58 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c da e9 09 30 1c 29 bb e6 91 cb 4e 69 4d ec 03 | b5 f9 29 7a 23 48 20 ed f7 47 c2 fe 06 e6 43 d7 | dd db db 34 94 8c 85 3b 55 9b f4 3a 74 ed 7a a1 | b8 84 40 94 dc 5c ed 16 d0 73 2d 49 36 0b 9a 1d | 7a 62 45 16 8d 9c 63 79 31 b8 8c 83 f1 0e b1 7f | 67 fe bc d6 57 49 2e 4d c3 49 48 a7 55 5f ff d0 | 14 68 fc 6f 72 30 bd 46 7b 9a 8c f4 dc c7 37 1c | e4 a4 8f 19 bc e7 61 cc 6b 11 48 dd 4e 4a 37 e3 | ee aa ab b1 b2 36 8e 89 eb 7e b7 77 69 a0 09 80 | 3c 6b fc 75 71 9a f3 bd 94 2c c9 c7 7f d3 9b 98 | 01 34 f8 57 09 1c 44 77 27 2b 95 8b 42 b2 1e 03 | d7 04 87 d9 03 b3 37 7c 1d b7 57 41 2d 16 5a a8 | dc c5 ad 48 e5 82 26 97 54 fe f5 c0 fe b9 29 58 | 35 ce 2a 1a 65 c3 c1 3a f9 04 5b 80 08 58 bc a4 | 5f 74 90 a2 3e 82 ee a6 80 5f 67 41 cd ba a6 4f | 66 85 f6 7c 29 e8 a5 11 0e c2 6f 44 c1 41 6a eb | 29 00 00 24 7c 1f b6 fc f1 5f 8d 51 2e 05 d2 13 | e2 d8 d5 f5 0f 0a 46 07 58 f7 ec 9e c5 1c 22 09 | 2c cd 2f ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 d1 0c 8f d2 91 2d a0 36 f1 93 d6 | bd 3f 30 ca a6 e2 8d 8a 00 00 00 1c 00 00 40 05 | 48 c0 59 12 12 13 1e e0 ba de 8c 06 ba c3 58 23 | f1 28 ea 8c | libevent_free: release ptr-libevent@0x7fb37002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad4380 | #424 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 61 ef 5f 7f e3 58 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #424 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #424 | rejected packet: | e5 61 ef 5f 7f e3 58 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #424: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0747 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abfd80 | handling event EVENT_RETRANSMIT for parent state #417 | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #417 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #417 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49678.208832; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003018 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad4380 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #417 | libevent_malloc: new ptr-libevent@0x7fb37002a950 size 128 "road-eastnet-nonat-165" #417: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #417) | d9 e4 18 5f 59 64 b9 ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 fd ed 03 c4 13 a8 51 65 6c f8 7b f8 e0 2d 89 | 59 12 b6 d0 fa 5d d3 b6 48 1f 05 4f d0 37 4e 96 | b6 b0 a9 07 5a 84 b2 22 72 c2 6e e4 2c 16 e8 fb | c8 92 b8 74 ce 3f 40 30 b5 60 8c 95 d1 d0 42 81 | 96 4a 3e 9a 08 06 af be 4a d9 72 15 c0 c3 46 78 | d0 1e d0 10 cd c4 48 fd 2d ac c2 45 66 8d 26 84 | dc ff cb c9 a3 60 b9 5c 03 1c 63 7c ad bd 60 96 | ce 2e d7 57 49 16 93 e7 43 2d b6 d5 b4 ce 5b 3b | 96 51 3a 88 ff 32 38 dc 5f 0b a8 74 a0 1a 49 87 | b5 db a2 1f ed 10 a6 d0 7a 48 4a 90 79 4e 5a f9 | 2b 8b 33 88 7e f6 9a 82 54 47 b3 ae d3 d5 19 8e | 35 94 b5 a7 07 70 69 91 1e 2e 08 a0 fa fa bf a8 | 09 5a 06 2f 9a 90 75 b5 b1 fe 11 2e 8d bc e2 8f | fc 8a 4c 02 b2 2c 51 5d d4 fd cc 21 3e c1 63 73 | 47 88 57 72 c3 e3 90 eb 42 71 fd 34 f9 5d 5f ad | 35 a7 22 19 95 d8 2d 82 e5 c2 0e d7 d8 88 22 f6 | 29 00 00 24 df 2c 07 75 0e bd bd 78 6f 85 ca 62 | 53 2e a0 29 e4 f9 3b 0b 22 fe c0 44 7c 40 c5 a3 | 8b 56 a4 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 33 f3 05 bf ce a7 d8 4f e5 99 24 52 | 75 47 3a d4 7d 71 ad 77 00 00 00 1c 00 00 40 05 | 01 69 5d 3d 4a 00 3f a4 76 63 f4 90 ae 45 6d 8b | 22 6e e0 18 | libevent_free: release ptr-libevent@0x7fb36402a780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abfd80 | #417 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 e4 18 5f 59 64 b9 ab | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #417 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #417 | rejected packet: | d9 e4 18 5f 59 64 b9 ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #417: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.07 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a43dd0 | handling event EVENT_RETRANSMIT for parent state #179 | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #179 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #179 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49678.231229; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.019099 exceeds limit? YES "road-eastnet-nonat-179" #179: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-179" #179: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #431 at 0x557d46ac74c0 | State DB: adding IKEv2 state #431 in UNDEFINED | pstats #431 ikev2.ike started | Message ID: init #431: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #431: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #431; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-179" #431: initiating v2 parent SA to replace #179 | using existing local IKE proposals for connection road-eastnet-nonat-179 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 431 for state #431 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46abfd80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #431 | libevent_malloc: new ptr-libevent@0x7fb36402a780 size 128 | #431 spent 0.0969 milliseconds in ikev2_parent_outI1() | RESET processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #179 ikev2.ike failed too-many-retransmits | pstats #179 ikev2.ike deleted too-many-retransmits | #179 spent 2.27 milliseconds in total | [RE]START processing: state #179 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-179" #179: deleting state (STATE_PARENT_I1) aged 64.020s and NOT sending notification | parent state #179: PARENT_I1(half-open IKE SA) => delete | crypto helper 16 resuming | crypto helper 16 starting work-order 431 for state #431 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #179 "road-eastnet-nonat-179" #179: deleting IKE SA for connection 'road-eastnet-nonat-179' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-179' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 431 | in connection_discard for connection road-eastnet-nonat-179 | State DB: deleting IKEv2 state #179 in PARENT_I1 | parent state #179: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #179 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 431 time elapsed 0.000562 seconds | libevent_free: release ptr-libevent@0x7fb34c01d920 | (#431) spent 0.565 milliseconds in crypto helper computing work-order 431: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 431 for state #431 to event queue | scheduling resume sending helper answer for #431 | libevent_malloc: new ptr-libevent@0x7fb364034150 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a43dd0 | crypto helper 16 waiting (nothing to do) | in statetime_stop() and could not find #179 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-179 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-179" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-179' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-179" | stop processing: connection "road-eastnet-nonat-179" (in initiate_a_connection() at initiate.c:349) | spent 0.0865 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #431 | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 431 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #431 | **emit ISAKMP Message: | initiator cookie: | 47 a9 f6 5d ab 90 59 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-179 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fa 61 b4 c7 cd e1 2c 04 0c 72 d6 80 6f c8 af 30 | ikev2 g^x 4d b0 b2 1e 8d 4f c3 2d f2 10 58 df a2 cf 51 79 | ikev2 g^x b1 79 c2 3f a7 35 e3 8e 8c e9 62 c2 7f 62 64 45 | ikev2 g^x 0a e4 6a 79 06 24 d8 93 a4 d7 88 f6 f8 67 56 ac | ikev2 g^x da f7 27 22 46 b5 f3 36 fc 59 b8 ef 46 c0 a0 39 | ikev2 g^x db 63 6d 41 32 18 a5 95 8d 7d ad 6f 27 26 ca df | ikev2 g^x ed d3 ee 53 fd 4c f5 cc 75 fc e3 f8 93 5a 96 cb | ikev2 g^x 92 9a 63 48 fa 88 0d 7b 6d 6b ed e6 9a a3 62 cc | ikev2 g^x f6 ca d1 cc 9a a4 27 97 4e 98 8a fa ec f7 10 73 | ikev2 g^x 1c 8b 1a f2 37 ea 26 ef 65 c4 24 b5 68 0e 71 36 | ikev2 g^x f1 1a b0 23 a4 4f b8 8f 75 d7 00 cd 7b 3c ae b6 | ikev2 g^x d6 4e 42 ae bd d1 a4 92 33 6b 9b 3f 93 ee 1b 13 | ikev2 g^x 12 06 ae 19 81 16 af 26 23 73 f8 46 07 4b f9 88 | ikev2 g^x 69 47 c6 fb 6b 2b 62 2c a3 d3 70 f4 52 77 08 a4 | ikev2 g^x 0e 48 7c ce 5d 87 5a c2 55 50 b0 8a 92 e5 1a 3c | ikev2 g^x 83 00 60 34 e5 f6 a0 b7 42 00 ef b1 62 a7 9d 6c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 71 9e 5f 53 a0 03 f4 e4 24 3a 58 53 c3 05 4a 1c | IKEv2 nonce c7 b1 e2 bd 95 07 98 a5 4b 6a 2d 2f 6b 11 45 33 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 47 a9 f6 5d ab 90 59 cd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b3 | natd_hash: port= 01 f4 | natd_hash: hash= df 46 73 c7 9b 2a a1 6f 39 66 d3 70 f2 4b 98 95 | natd_hash: hash= 84 ba e3 3f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data df 46 73 c7 9b 2a a1 6f 39 66 d3 70 f2 4b 98 95 | Notify data 84 ba e3 3f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 47 a9 f6 5d ab 90 59 cd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9a b5 4b 5a b1 14 b9 6a 89 15 79 d3 91 3a bb d6 | natd_hash: hash= 0d 4a ca 70 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9a b5 4b 5a b1 14 b9 6a 89 15 79 d3 91 3a bb d6 | Notify data 0d 4a ca 70 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #431 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #431: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #431 to 4294967295 after switching state | Message ID: IKE #431 skipping update_recv as MD is fake | Message ID: sent #431 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-179" #431: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.179:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #431) | 47 a9 f6 5d ab 90 59 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 61 b4 c7 cd e1 2c 04 0c 72 d6 80 6f c8 af 30 | 4d b0 b2 1e 8d 4f c3 2d f2 10 58 df a2 cf 51 79 | b1 79 c2 3f a7 35 e3 8e 8c e9 62 c2 7f 62 64 45 | 0a e4 6a 79 06 24 d8 93 a4 d7 88 f6 f8 67 56 ac | da f7 27 22 46 b5 f3 36 fc 59 b8 ef 46 c0 a0 39 | db 63 6d 41 32 18 a5 95 8d 7d ad 6f 27 26 ca df | ed d3 ee 53 fd 4c f5 cc 75 fc e3 f8 93 5a 96 cb | 92 9a 63 48 fa 88 0d 7b 6d 6b ed e6 9a a3 62 cc | f6 ca d1 cc 9a a4 27 97 4e 98 8a fa ec f7 10 73 | 1c 8b 1a f2 37 ea 26 ef 65 c4 24 b5 68 0e 71 36 | f1 1a b0 23 a4 4f b8 8f 75 d7 00 cd 7b 3c ae b6 | d6 4e 42 ae bd d1 a4 92 33 6b 9b 3f 93 ee 1b 13 | 12 06 ae 19 81 16 af 26 23 73 f8 46 07 4b f9 88 | 69 47 c6 fb 6b 2b 62 2c a3 d3 70 f4 52 77 08 a4 | 0e 48 7c ce 5d 87 5a c2 55 50 b0 8a 92 e5 1a 3c | 83 00 60 34 e5 f6 a0 b7 42 00 ef b1 62 a7 9d 6c | 29 00 00 24 71 9e 5f 53 a0 03 f4 e4 24 3a 58 53 | c3 05 4a 1c c7 b1 e2 bd 95 07 98 a5 4b 6a 2d 2f | 6b 11 45 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 46 73 c7 9b 2a a1 6f 39 66 d3 70 | f2 4b 98 95 84 ba e3 3f 00 00 00 1c 00 00 40 05 | 9a b5 4b 5a b1 14 b9 6a 89 15 79 d3 91 3a bb d6 | 0d 4a ca 70 | state #431 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36402a780 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46abfd80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a43dd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #431 | libevent_malloc: new ptr-libevent@0x7fb34c01d920 size 128 | #431 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49678.232606 | resume sending helper answer for #431 suppresed complete_v2_state_transition() and stole MD | #431 spent 0.466 milliseconds in resume sending helper answer | stop processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb364034150 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 a9 f6 5d ab 90 59 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #431 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #431 | rejected packet: | 47 a9 f6 5d ab 90 59 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b3 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #431: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3fc10 | handling event EVENT_RETRANSMIT for parent state #402 | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #402 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #402 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49678.240831; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002798 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a88140 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #402 | libevent_malloc: new ptr-libevent@0x7fb364034150 size 128 "road-eastnet-nonat-150" #402: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #402) | d7 18 0b 56 dd fc 93 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 8f d0 91 ee 0c 2c 6d b1 49 7f e7 a7 c5 b4 b6 | ba 26 c6 73 cd 26 6d 07 75 be 09 23 1b d9 66 18 | 43 89 72 64 b1 d5 06 ca 9d c0 33 e2 98 5e c1 57 | 08 88 8a 2d 7a 4a eb cd 6a ad 0c 5b 60 7a 3c d6 | 1b 41 e1 63 95 9d 48 05 85 b8 3e e9 c2 2c 08 fc | 0a e1 15 60 ae 51 d5 ec 71 41 de 9c 11 57 49 6c | 9b fc 6f 1d 07 87 e1 29 06 e5 0a b9 9d 8f 51 66 | de ed ee d7 d1 94 d4 80 f9 c9 b3 72 40 5d 4f 1f | e8 51 bc 21 99 7c 48 a4 03 69 7e 36 81 2c 93 c5 | 85 f1 72 97 17 d9 4b 16 e1 02 93 16 a0 e9 5a 8c | 18 8b 2d 22 a0 68 e9 52 fc 14 55 90 a6 f2 25 49 | d1 90 07 21 fd a8 a8 15 db 83 f7 be ce 21 31 d0 | 18 03 fd af 89 22 76 d9 16 f9 54 ff a2 a4 03 62 | f9 9f ab 74 f4 75 62 99 a7 8b 91 97 ad 9d c4 9c | 3e 40 41 dc 60 23 02 31 5e 46 98 d3 1a 73 73 14 | dd ff 30 58 0d fa ab 00 11 c3 0b 18 0a c3 bc a2 | 29 00 00 24 22 ce 51 25 1e d0 f6 54 17 83 9f e7 | 7f a6 b8 56 15 08 66 12 32 0f c5 1a 1c 37 04 e4 | a3 f5 17 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 72 8a fb e8 f5 d3 16 73 e6 1b bd | ae fd 45 81 b5 65 c1 51 00 00 00 1c 00 00 40 05 | 63 4e 70 bd 7c b5 4d 3a 8c 2e 79 8c 91 4d 92 d1 | 89 54 24 9e | libevent_free: release ptr-libevent@0x7fb34001a190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3fc10 | #402 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb380015160 | handling event EVENT_RETRANSMIT for parent state #373 | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #373 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #373 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49678.24097; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005106 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3fc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #373 | libevent_malloc: new ptr-libevent@0x7fb34001a190 size 128 "road-eastnet-nonat-121" #373: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #373) | cc d0 7c e3 2d ba 98 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba c9 ec 57 66 ee 6d 75 ec 00 31 9e bb a2 7b 33 | 03 5b e1 5f f9 35 33 83 7e 5f 91 5b a2 92 9a a8 | 8d 3b 36 89 d7 60 3c f0 e0 82 e5 11 6e 43 23 b1 | df d6 90 8f 04 61 87 4f 48 d6 55 c3 74 01 c3 05 | 74 78 5b 86 ae c3 d1 0f 5a c9 e4 c5 26 fd 8f 0b | 7a de b0 bf fa 77 b7 99 27 6d 94 68 54 8f 2e b4 | 27 fc 46 a6 65 3e f8 0d 42 f0 50 03 21 b0 cd 96 | 2d 45 e2 17 2e 0c 5d ab 5d cf b0 76 7e 40 37 71 | ec c6 7f c3 8e c1 e3 0c da 69 0c bb 78 ac ef e6 | fa da 64 48 00 9c 0f d4 5e 3f fd b4 84 a9 1f 83 | f8 16 28 f3 f1 a7 fd f1 9e 6b cf 4b 33 5a 08 dd | 8d d5 23 ac 66 10 69 36 aa 87 aa ab ed ab 68 36 | 4a 70 e5 64 3a 2f 37 bf 5e 42 b9 8e 12 99 78 f7 | 0c 24 39 a4 0c ff 5c 9e b7 31 00 75 be b4 85 09 | f6 93 ec eb a2 a7 69 50 c8 7a 9b 97 aa 4c fd 91 | 2c 8c 14 31 ec 08 42 84 d3 a9 ed d2 74 47 99 ae | 29 00 00 24 b4 0d dc 4f 11 5b a4 50 84 d3 92 d3 | f6 ef 85 ab 3e d2 da 12 30 2f 73 8e 10 d5 43 df | 1d 88 10 ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 85 d9 5b 1c 2d 07 c4 07 50 eb 06 | 15 5f 19 1f ba 90 46 a0 00 00 00 1c 00 00 40 05 | bb 4b 15 0f 4a b6 b1 9b ec 46 e5 86 fe 18 d0 b4 | dc 99 60 c7 | libevent_free: release ptr-libevent@0x7fb3800269d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380015160 | #373 spent 0.0718 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 18 0b 56 dd fc 93 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #402 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #402 | rejected packet: | d7 18 0b 56 dd fc 93 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #402: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc d0 7c e3 2d ba 98 af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #373 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #373 | rejected packet: | cc d0 7c e3 2d ba 98 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #373: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0386 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #425 | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #425 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #425 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49678.255238; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501388 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380015160 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #425 | libevent_malloc: new ptr-libevent@0x7fb3800269d0 size 128 "road-eastnet-nonat-173" #425: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #425) | f7 cf 50 4a 74 06 05 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 92 89 d6 89 4e 50 5f b7 2f 6b 96 d5 81 21 07 | ab 44 17 58 90 1d 7b 64 81 e9 17 d7 bd fe aa 4b | 0a 10 ad 93 a3 c3 87 5f f5 66 29 fb c9 3a c9 b1 | 31 b0 a9 ee c4 90 84 b7 e6 dd 91 e8 75 48 e7 2e | 93 2f d6 a2 f7 4b f6 49 3f d9 f6 d0 5a d6 d1 dd | 4f 9d c2 ed c5 18 e2 07 13 e3 28 e5 ef cc 0a 8a | 3b 35 e0 3e 37 bc 79 9f 2a 04 4a f3 9c f9 c1 fe | 06 93 6a fc 31 07 8c 82 e2 3d 36 5b 4c 64 57 29 | 42 03 5c 40 11 83 46 58 6b 89 40 fb 97 9c 72 d8 | 16 d1 a0 21 3d 63 55 3f 12 ce 3e bc a1 a4 b1 4f | 21 3c 91 be 83 c8 57 a7 2b 28 e1 48 64 02 57 7e | 42 a3 f1 45 48 e1 db 05 2e fb d4 4c 7c 8a 0a 60 | 5f f4 86 80 46 9a e0 d0 18 11 1a 4d bb 7c 02 87 | bf 2e e0 bb 87 e9 5f b8 47 04 4d f1 27 cf b3 29 | 9c 1a d0 ad 05 bc 03 0c 16 0c 3a 7e 72 1b 12 70 | b9 a4 26 8b 78 5c b2 39 ba 99 5c 08 5d fd 0b bd | 29 00 00 24 5f 48 0d c0 35 2d 82 0c 4e 37 c0 2d | fb 4b f1 c7 3e 7f d8 da d2 4b 1d 20 b9 ad b0 f8 | d9 af 0c f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 91 c4 e4 6c ee a0 d8 c3 62 ab 89 | a1 7e a7 1c b9 03 c3 d0 00 00 00 1c 00 00 40 05 | 62 01 4a 70 10 9c f9 53 26 65 4b 23 2c 02 6b 53 | 25 3b 71 4a | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #425 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 cf 50 4a 74 06 05 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #425 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #425 | rejected packet: | f7 cf 50 4a 74 06 05 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #425: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abd200 | handling event EVENT_RETRANSMIT for parent state #320 | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #320 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #320 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49678.27153; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00575 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #320 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 "road-eastnet-nonat-68" #320: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #320) | af c7 ee c1 89 d6 03 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 a8 bd a9 e5 4d 48 c1 fb 45 8d 11 bf a7 3a cc | c9 47 84 c7 e3 5d ec 21 4e d8 5a af 98 89 03 e4 | 61 3a ba 3d 60 86 ef 6f 17 de fb a4 db d7 d8 bb | dd a1 22 38 5e f6 ed 84 ef 59 30 63 60 c1 46 9c | 68 55 6e 9a 1e c0 57 7e 80 7e b6 a3 a2 d8 44 32 | cf 08 62 90 01 f4 f2 5f ed 1f e9 b3 6d aa b3 b5 | 51 0c 08 36 0d 22 74 67 a6 8c ed a0 79 50 51 2d | 0e 2f 3b 92 1e b3 eb 2d 06 7f 88 16 e6 58 28 17 | 60 5d c5 e1 99 65 2e 54 d8 fa ea 82 20 22 7c ff | b3 f5 72 25 7c 83 b1 cd 19 3e 2b da bc a9 3d dd | 76 aa 4a e2 d6 6a 5a 1c c6 a7 82 72 c8 70 00 2c | 36 b2 a4 f0 ac d5 1d 56 89 f2 8b 82 16 da 4e a9 | 45 8b f2 f1 83 02 06 ed 82 d4 33 ad 52 79 3a 05 | a1 a9 14 4d f9 86 6b dc 84 e1 88 2a d3 ae c1 8c | 43 6f 17 24 1b 1e 6c e9 e7 e2 8e 7a 04 41 d1 b0 | a9 68 50 65 7f 85 77 b4 91 10 c3 80 9a 3e 62 10 | 29 00 00 24 2e 21 9d f9 af ba 04 f5 8f 3b a6 14 | 4e db f7 72 ee 4f db 92 91 3b 76 55 23 0e 1b ed | b4 de fd 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 21 4b df 59 d9 64 c3 0f dc d7 26 | ba 28 50 c6 3e 72 d7 ec 00 00 00 1c 00 00 40 05 | d3 cb a5 46 ac a7 4b 5d c8 de d7 e5 bf c8 e6 16 | 1f 0a fc 46 | libevent_free: release ptr-libevent@0x7fb3440180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abd200 | #320 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af c7 ee c1 89 d6 03 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #320 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #320 | rejected packet: | af c7 ee c1 89 d6 03 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #320: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #418 | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #418 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #418 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49678.274831; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002077 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abd200 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #418 | libevent_malloc: new ptr-libevent@0x7fb3440180b0 size 128 "road-eastnet-nonat-166" #418: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #418) | 1c 58 36 d0 b8 a0 d1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 21 69 13 ea 9b 51 f5 f8 3d bc 58 75 ed a9 fd | 17 d1 ac 45 30 9e bb dc f5 67 d6 33 5f f9 21 3b | d7 08 0c bd e4 4c bf b2 e0 66 df d2 39 12 b4 cd | 51 1d 79 99 b2 28 9d 92 25 3d de c7 de 50 60 c0 | b1 e7 b1 2f 20 ba 56 e0 cc d5 d3 89 fb f3 3a 69 | 08 b8 19 34 ad 51 11 33 2c 83 6c 01 df 40 a9 5a | d2 8e ac 81 f5 73 32 a5 92 89 d9 43 53 9f d1 60 | 24 f6 18 43 4f b2 cc 04 87 ab 6f 28 3d 9c e1 be | 1d b6 6f 40 8a 39 f7 27 97 65 7c fa 70 bb d3 47 | 6d aa 41 65 fd 87 5b bf 5a 85 1c ca 2d 31 4b 63 | 3b 57 1d 34 66 19 31 70 16 5e 12 2a 4b 3c f3 aa | c7 b4 1f b1 9b ff 71 77 21 47 b5 ee 99 1f 02 09 | 95 71 68 b7 06 9b 0f 65 04 ee a4 b9 3b 45 42 02 | 7d d2 87 0e 66 c1 75 4c ff 7a f3 83 39 de 46 b2 | 20 fd 8a d9 22 4f c4 77 47 fd 4b 1b 01 cf 2f ef | dc 02 1e 19 bc 0a 3d 9b 32 25 8e a1 b4 27 34 08 | 29 00 00 24 1a d8 6e 71 ca d7 ba 26 1e 49 f1 5f | c1 b0 03 8a 8a 69 67 55 4a ef 6c 1a 26 5d 01 35 | 4b 44 6d e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 63 ba bc 17 58 ec 8f 3d 47 af 87 | d9 d9 f5 4c 16 0e 40 2b 00 00 00 1c 00 00 40 05 | 0c c9 6a 54 72 2b 9b 5b 7b 1a a4 b5 a9 4f 1c b9 | a1 57 0c cc | libevent_free: release ptr-libevent@0x7fb3700300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #418 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c 58 36 d0 b8 a0 d1 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #418 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #418 | rejected packet: | 1c 58 36 d0 b8 a0 d1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #418: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3800383c0 | handling event EVENT_RETRANSMIT for parent state #374 | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #374 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #374 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49678.294106; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004024 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #374 | libevent_malloc: new ptr-libevent@0x7fb3700300e0 size 128 "road-eastnet-nonat-122" #374: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #374) | 2b af 1b 03 10 38 37 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 c3 14 06 9b d8 f1 99 49 48 ff 90 1f 86 00 28 | 44 18 8a f8 52 dc 7d 04 1b d5 bc 43 4d 6c cb 67 | f8 0d 9d 6d d0 66 c5 1d 7e 62 70 73 1c 71 41 b4 | dd 81 08 b3 22 a9 c5 05 00 35 5b 00 07 16 93 d5 | 94 c1 6c 23 e3 4f fb cc 11 67 47 b3 e1 b1 07 89 | ea c0 9e a2 65 96 87 08 be 34 63 54 73 84 17 c6 | d1 75 fb 5b 8e 80 b1 4e bc e5 80 b5 fc 51 6b 8e | af 49 e6 d5 05 a1 42 3f 30 13 b7 fe 10 06 81 bc | 26 72 22 45 7f 9f 88 7e f2 4d d6 4b 6d 85 6b 06 | 69 00 b6 2d 19 97 b0 06 ca c7 30 d2 02 d3 f6 37 | 5e 73 21 4a 86 ec 60 ca fd d2 ed d8 05 2b db 6c | a9 01 2a 23 f7 1d d9 64 5b e9 5e 20 76 8d 16 0a | bf cd f0 54 2a 72 e9 f6 56 5e 90 80 56 52 68 ca | 9f 40 22 7c 1e b1 d0 73 7b 7b 65 7f 5f 3b b2 a4 | 2d 12 04 bd 89 d0 f1 f1 ba b3 be 3d 20 c5 f8 84 | bc fa 4d 90 8e a5 a8 51 48 43 7b 6c ed ea 9f e0 | 29 00 00 24 8b e7 71 0b f0 6c d4 66 d8 89 de 00 | 61 f0 41 76 89 f5 bb 07 5f 2d 78 ac d6 5e eb 30 | 2f 0d 98 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 37 47 83 86 42 9b 81 4e c6 41 b6 | af 4f 24 3f ee d6 bb bd 00 00 00 1c 00 00 40 05 | 2f d6 db c3 63 be 1c 54 fe 3c c7 2a 35 82 32 22 | 47 30 b2 bc | libevent_free: release ptr-libevent@0x7fb38000c460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800383c0 | #374 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2b af 1b 03 10 38 37 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #374 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #374 | rejected packet: | 2b af 1b 03 10 38 37 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #374: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0a940 | handling event EVENT_RETRANSMIT for parent state #403 | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #403 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #403 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49678.306435; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001964 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800383c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #403 | libevent_malloc: new ptr-libevent@0x7fb38000c460 size 128 "road-eastnet-nonat-151" #403: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #403) | 32 36 13 09 3a 0c 64 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 1d 1f f9 29 d4 7a 82 e5 c3 ed 2d 91 36 94 a3 | ad 42 95 1c da 49 e7 df be 20 17 de b8 10 02 70 | 99 a0 9d 95 41 a8 00 d1 af 94 26 4c 6c 86 0c 1f | 94 7a 02 35 96 84 54 33 fd cb 84 dd 66 c9 68 48 | c0 82 f1 59 9a 21 1d bc d5 30 03 12 1e e7 09 61 | be 0b 67 1d db fb 9e 1e 17 49 85 95 31 47 f7 2b | 4a 86 6c c9 65 82 f2 1e a6 01 6c ac cd f1 e2 b1 | c0 7c 6b 1c 75 70 5d e8 eb b9 df 8a a0 09 66 57 | 4a b4 92 66 fc a3 08 c8 94 4f 6c 58 0d 44 86 54 | 0d a6 ba 1e d2 d3 f5 98 14 c7 bb cb 0d c6 25 81 | 7d 00 f0 be 73 bc 11 32 a7 22 fe 40 f1 5c 99 a7 | f6 f4 02 31 24 83 16 a4 cb d9 f9 bc 7d ee f9 64 | 7a 45 11 03 43 36 f4 ff f8 3b 61 50 62 1a ea 35 | 94 85 76 d9 cf 8d 05 40 c4 4f 44 89 69 5a 20 63 | bb 17 c4 c0 24 8c 90 9c 7c 82 0c b1 fd 04 ab 4c | 94 5c 67 12 3b 66 e3 71 78 3a f5 9a 05 60 53 5e | 29 00 00 24 96 4a 72 fe 73 4d 43 f4 22 71 ca 5d | 92 02 9d 90 a1 de a3 67 65 d9 a5 3e 5d f5 46 47 | 3c 9d 2b 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 72 77 63 b0 4d c0 15 33 f7 7b 47 | a3 64 95 74 99 05 10 8e 00 00 00 1c 00 00 40 05 | 3b eb 87 4d 47 ff 24 80 19 6f 36 13 fc b8 88 ec | 58 fe 93 a3 | libevent_free: release ptr-libevent@0x7fb35c046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0a940 | #403 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 36 13 09 3a 0c 64 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #403 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #403 | rejected packet: | 32 36 13 09 3a 0c 64 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #403: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a70b10 | handling event EVENT_RETRANSMIT for parent state #180 | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #180 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #180 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49678.316729; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00849 exceeds limit? YES "road-eastnet-nonat-180" #180: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-180" #180: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #432 at 0x557d46ac8a80 | State DB: adding IKEv2 state #432 in UNDEFINED | pstats #432 ikev2.ike started | Message ID: init #432: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #432: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #432; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-180" #432: initiating v2 parent SA to replace #180 | using existing local IKE proposals for connection road-eastnet-nonat-180 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 432 for state #432 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0a940 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #432 | libevent_malloc: new ptr-libevent@0x7fb35c046040 size 128 | #432 spent 0.0748 milliseconds in ikev2_parent_outI1() | RESET processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #180 ikev2.ike failed too-many-retransmits | pstats #180 ikev2.ike deleted too-many-retransmits | #180 spent 2.47 milliseconds in total | crypto helper 4 resuming | crypto helper 4 starting work-order 432 for state #432 | [RE]START processing: state #180 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in delete_state() at state.c:879) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 432 "road-eastnet-nonat-180" #180: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #180: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #180 "road-eastnet-nonat-180" #180: deleting IKE SA for connection 'road-eastnet-nonat-180' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-180' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-180 | State DB: deleting IKEv2 state #180 in PARENT_I1 | parent state #180: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #180 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3700180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b10 | in statetime_stop() and could not find #180 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-180 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 432 time elapsed 0.000622 seconds | (#432) spent 0.691 milliseconds in crypto helper computing work-order 432: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 432 for state #432 to event queue | start processing: connection "road-eastnet-nonat-180" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-180' +POLICY_UP | scheduling resume sending helper answer for #432 | libevent_malloc: new ptr-libevent@0x7fb35802ed90 size 128 | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | crypto helper 4 waiting (nothing to do) | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-180" | stop processing: connection "road-eastnet-nonat-180" (in initiate_a_connection() at initiate.c:349) | spent 0.108 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #432 | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 432 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #432 | **emit ISAKMP Message: | initiator cookie: | 9e 5c f1 81 be b3 cc bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-180 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 48 a7 44 cc 56 0f 1f a1 57 e9 97 90 cf 04 1e 5b | ikev2 g^x e0 0e 7b 47 ef c0 b0 6b 28 ba 80 69 c9 1b 38 ab | ikev2 g^x 77 4e c9 e0 e5 8e ac 7e e2 16 87 36 5e 9c 78 7a | ikev2 g^x 88 e7 f8 df f3 43 04 06 de 41 bf fc 2c aa 5f 0d | ikev2 g^x 69 d9 8b 25 79 3a 55 bd c2 56 12 76 16 fc d9 a5 | ikev2 g^x 9c 10 c0 69 f3 49 ac 1b 12 69 8b 54 81 c5 66 b4 | ikev2 g^x ce 87 81 ab 4c 4a 3c be 13 a8 a6 c4 c4 ee d3 f3 | ikev2 g^x e4 6c 08 82 35 56 98 d0 52 0e 3c b5 9f cf 94 45 | ikev2 g^x b1 ff 7d 1f 92 70 cf 8e d1 c1 37 a6 37 65 ee ce | ikev2 g^x 20 a0 2f 74 83 20 8b e8 b7 59 69 69 3d 2e af d9 | ikev2 g^x 5c 5b c8 f5 d1 97 f9 58 4c 4b b5 5a 72 21 7a ff | ikev2 g^x 15 e2 cf de 63 20 f5 1b 33 44 6d 86 26 89 fe a9 | ikev2 g^x ef 26 23 fc 07 42 35 ac 53 4d 00 7f 36 93 50 78 | ikev2 g^x ef 61 a9 fd 99 64 73 27 a0 12 f0 71 a5 ef 01 e0 | ikev2 g^x f5 fa 65 6f 20 9b da c4 8d 30 72 f1 87 a2 6d e6 | ikev2 g^x e6 3b 2c 57 3c e1 2d 99 93 66 b2 b3 c7 c3 45 c6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 97 c3 cd 2d d6 91 ce 3c 3a 10 07 b4 90 19 a9 e3 | IKEv2 nonce 82 ea 52 87 8f 88 50 41 d4 a6 e1 e6 2e 3c 74 db | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9e 5c f1 81 be b3 cc bc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b4 | natd_hash: port= 01 f4 | natd_hash: hash= 0b b0 51 e2 58 5c b1 15 1d eb ed 97 2a 88 5d 96 | natd_hash: hash= 2e c9 a1 f8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0b b0 51 e2 58 5c b1 15 1d eb ed 97 2a 88 5d 96 | Notify data 2e c9 a1 f8 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9e 5c f1 81 be b3 cc bc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 78 1a 23 ab e8 fa 74 f8 b4 b9 8c 5c d8 d3 f5 f5 | natd_hash: hash= 1c a1 eb 5a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 78 1a 23 ab e8 fa 74 f8 b4 b9 8c 5c d8 d3 f5 f5 | Notify data 1c a1 eb 5a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #432 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #432: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #432 to 4294967295 after switching state | Message ID: IKE #432 skipping update_recv as MD is fake | Message ID: sent #432 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-180" #432: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.180:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #432) | 9e 5c f1 81 be b3 cc bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 a7 44 cc 56 0f 1f a1 57 e9 97 90 cf 04 1e 5b | e0 0e 7b 47 ef c0 b0 6b 28 ba 80 69 c9 1b 38 ab | 77 4e c9 e0 e5 8e ac 7e e2 16 87 36 5e 9c 78 7a | 88 e7 f8 df f3 43 04 06 de 41 bf fc 2c aa 5f 0d | 69 d9 8b 25 79 3a 55 bd c2 56 12 76 16 fc d9 a5 | 9c 10 c0 69 f3 49 ac 1b 12 69 8b 54 81 c5 66 b4 | ce 87 81 ab 4c 4a 3c be 13 a8 a6 c4 c4 ee d3 f3 | e4 6c 08 82 35 56 98 d0 52 0e 3c b5 9f cf 94 45 | b1 ff 7d 1f 92 70 cf 8e d1 c1 37 a6 37 65 ee ce | 20 a0 2f 74 83 20 8b e8 b7 59 69 69 3d 2e af d9 | 5c 5b c8 f5 d1 97 f9 58 4c 4b b5 5a 72 21 7a ff | 15 e2 cf de 63 20 f5 1b 33 44 6d 86 26 89 fe a9 | ef 26 23 fc 07 42 35 ac 53 4d 00 7f 36 93 50 78 | ef 61 a9 fd 99 64 73 27 a0 12 f0 71 a5 ef 01 e0 | f5 fa 65 6f 20 9b da c4 8d 30 72 f1 87 a2 6d e6 | e6 3b 2c 57 3c e1 2d 99 93 66 b2 b3 c7 c3 45 c6 | 29 00 00 24 97 c3 cd 2d d6 91 ce 3c 3a 10 07 b4 | 90 19 a9 e3 82 ea 52 87 8f 88 50 41 d4 a6 e1 e6 | 2e 3c 74 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b b0 51 e2 58 5c b1 15 1d eb ed 97 | 2a 88 5d 96 2e c9 a1 f8 00 00 00 1c 00 00 40 05 | 78 1a 23 ab e8 fa 74 f8 b4 b9 8c 5c d8 d3 f5 f5 | 1c a1 eb 5a | state #432 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c046040 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0a940 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0a940 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #432 | libevent_malloc: new ptr-libevent@0x7fb3700180b0 size 128 | #432 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49678.317976 | resume sending helper answer for #432 suppresed complete_v2_state_transition() and stole MD | #432 spent 0.319 milliseconds in resume sending helper answer | stop processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35802ed90 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e 5c f1 81 be b3 cc bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #432 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #432 | rejected packet: | 9e 5c f1 81 be b3 cc bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b4 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #432: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34000d120 | handling event EVENT_RETRANSMIT for parent state #426 | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #426 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #426 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49678.32613; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501313 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #426 | libevent_malloc: new ptr-libevent@0x7fb35802ed90 size 128 "road-eastnet-nonat-174" #426: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #426) | 9a cd 73 8e 7d d4 98 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 8c 97 9a 7b 25 95 00 9a 77 62 32 ef ca 9f d6 | 76 8f c1 1d 7b f7 f1 fd 6f 49 39 37 2f 63 23 81 | 71 66 7a 84 28 0c 71 94 62 69 ce 59 2d d7 c5 69 | 55 1a 91 d5 7e 6b 73 77 b1 63 3d e2 98 99 4c 7d | 88 69 a7 7b 5e bc cc b8 0e b3 73 c2 2e 32 ae 8e | 86 79 03 81 0b 4c 54 b4 73 a6 e2 6e 97 ca 67 d3 | 85 98 35 01 61 ca 66 d6 14 1b 0e ed 3a 29 6c 85 | ba 28 d6 d7 db e6 44 77 a6 ce 5b 46 99 7c a1 df | 78 8d f1 17 d8 0f f9 ea 99 30 fc e2 cf b2 41 e0 | b2 47 0b 49 32 f7 03 99 56 d9 28 c3 7a 54 f6 02 | 19 cd 98 7b 73 22 d4 cd 39 3f 7a 0d d8 d7 cd a6 | 8a 6b 30 16 cd 73 f2 96 6c 21 9f bd 4e e5 1b e4 | 55 08 4d 75 fb 1c cb 36 33 b5 70 97 3d ae 1c 0b | fd 17 d6 8a db a7 4c eb 93 47 b3 25 b1 c8 9d b9 | 3c fc 99 0e e7 eb 29 07 c1 90 16 1e 24 76 3c e1 | f0 b6 2f 6d 76 8c 81 1b 13 f1 8a 90 f5 6f 06 29 | 29 00 00 24 9e 79 2e b7 2a 97 cc 4e 5e 3a 53 a1 | 14 f4 9d f2 e0 f1 3a 21 7a b3 38 2d 77 ac 99 ad | 8b c3 54 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 36 a3 f8 78 1e 60 6d 59 1a 44 b3 | 39 63 64 a7 a1 bd a5 d0 00 00 00 1c 00 00 40 05 | 8b d1 e6 ab 49 4a f3 b9 19 1d c0 80 f7 d0 cb 97 | 3f 74 7f 21 | libevent_free: release ptr-libevent@0x7fb35c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000d120 | #426 spent 0.208 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a cd 73 8e 7d d4 98 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #426 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #426 | rejected packet: | 9a cd 73 8e 7d d4 98 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #426: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0504 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afd000 | handling event EVENT_RETRANSMIT for parent state #321 | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #321 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #321 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49678.330498; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004856 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #321 | libevent_malloc: new ptr-libevent@0x7fb35c04b850 size 128 "road-eastnet-nonat-69" #321: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #321) | 30 42 c0 64 91 b3 77 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 8b 42 a5 47 61 3e b2 88 66 b3 90 63 22 69 df | e5 f0 68 6a 3f ab 70 bf d6 bc a2 6d 32 d6 bf 56 | 13 cd ae 31 91 9e 97 07 b1 e6 67 da 49 fc 52 44 | f0 97 00 89 4b 4a 7b 7e 72 67 33 77 ed ad d5 60 | 7c 94 7a 09 a1 fe 2b 97 f4 03 f7 65 c2 4f 92 50 | 59 77 e9 77 52 e2 ba 0e f1 c5 36 f7 3f 04 ca 02 | 29 37 fe 9d b2 ee 90 bb 59 f2 25 82 19 bd 15 09 | 7c 21 90 62 70 4c 2f 35 e2 fa b0 32 14 28 ef f3 | f9 26 2a aa 23 e5 00 f2 ed fa 00 25 b3 8d 3e f4 | 4c e5 68 7e bb cf a5 93 21 96 34 22 9d cb 8e c0 | 2d 43 58 e0 8a b9 3b 2b d8 e6 50 0b 36 e9 8a 0b | 9a 7c fa 82 ee ac d3 9d dc ac fe e5 26 e8 d7 a8 | 41 71 b3 21 7a 08 ae 35 2b 19 02 a1 3c d8 d8 79 | 7f 1b 50 2d 1e 74 84 a4 f5 80 19 40 cb b4 59 fe | e2 eb 79 b4 b1 1d a9 7a b4 6e 10 85 42 85 5d e9 | 58 9c 43 c5 54 ce c4 20 7b 73 38 bf 59 44 4d 18 | 29 00 00 24 bf 17 ca 5e f8 c4 94 b8 0b 16 3e 38 | 6b 43 cf 92 04 d6 aa ac 11 4c 2e 2c d1 a0 dc 92 | 64 9e 7b 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 bc 1a f8 41 15 d9 99 65 b2 c4 f3 | df 03 a0 00 26 60 50 c2 00 00 00 1c 00 00 40 05 | fc 37 e7 42 82 1f 76 13 ad 5a b7 fc e2 af d4 9f | 15 d4 13 5b | libevent_free: release ptr-libevent@0x7fb3500096b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afd000 | #321 spent 0.0989 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 42 c0 64 91 b3 77 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #321 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #321 | rejected packet: | 30 42 c0 64 91 b3 77 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #321: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #419 | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #419 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #419 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49678.340775; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001431 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afd000 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #419 | libevent_malloc: new ptr-libevent@0x7fb3500096b0 size 128 "road-eastnet-nonat-167" #419: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #419) | 13 42 1a 05 2a a9 f4 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 82 ba 57 e5 18 7f 6d c1 4e 6c 32 74 c7 8d bc | fa 9e 5f 85 57 91 bd e7 d1 f6 a5 cc 56 d4 ef 2c | 82 2b a5 62 6a 68 41 f0 a0 92 fa 2e 12 6a 74 95 | 56 98 09 32 67 8d a9 cf ce e8 4b 16 ca ae fd 57 | 33 7d 99 6a 29 1d 52 35 0b 5c 55 de 21 8b fe 4c | 64 ea 17 c4 c0 64 cd 47 31 4b 7a 08 f8 bd 37 3f | 72 ba 30 cd 0e c2 9d 0f e4 8b 3f b8 4c 2a d4 69 | de 4a 7f 8a a8 eb c0 7f 8f b2 10 0b d8 35 aa 5e | c8 ac 23 ce e4 c8 52 08 91 9c 13 ce 38 17 f1 d8 | db ec 31 93 d6 0d 09 93 5b d1 dc 9c 92 3b e5 29 | 17 5b e6 ee 7f f5 fb 3d 38 b5 23 c0 cf 25 d5 5b | 67 0a 2b 07 fd 68 8f 4c 74 c9 96 0b 9b 44 5c 6b | 0e 2d 70 4b 98 d5 d7 b9 54 dc 11 1e 19 cb 73 3f | 22 ca 80 46 28 a8 4a 20 64 29 4c 39 a5 b7 25 84 | 93 fd 4d 3a a6 fa ab c2 68 fc 5d fb 3c 7c 06 72 | eb 28 8a f5 09 69 59 c1 01 26 88 c4 c6 36 f6 6c | 29 00 00 24 83 3f e0 e8 30 90 0c c2 fd 9a 5c 8a | 88 7b e1 27 5d 3c cc 26 1c 41 3f 95 a3 1e 69 69 | b9 67 17 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 b9 c0 cf 3f 29 65 8b 9d 3a 51 6d | 0f 16 20 c0 79 fc 1d 37 00 00 00 1c 00 00 40 05 | 67 f3 84 dc 78 2e 75 89 44 b5 31 a8 97 13 e9 a5 | b9 b4 3a e4 | libevent_free: release ptr-libevent@0x7fb348023e80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #419 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 13 42 1a 05 2a a9 f4 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #419 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #419 | rejected packet: | 13 42 1a 05 2a a9 f4 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #419: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11640 | handling event EVENT_RETRANSMIT for parent state #375 | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #375 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #375 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49678.35708; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003781 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #375 | libevent_malloc: new ptr-libevent@0x7fb348023e80 size 128 "road-eastnet-nonat-123" #375: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #375) | a4 09 26 11 42 9e 51 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b 77 05 ad 49 62 16 46 be f5 65 08 84 ad 14 8b | 54 2c 99 1d e2 97 87 23 80 81 89 f0 4c d0 eb 92 | 7b 0b 4f bb c5 8e f0 7c 4a e9 4e f5 41 3b c0 9c | 84 74 7a 28 42 6c 3e a3 44 ba 29 11 96 09 9b f3 | 38 05 36 bd 24 dc d4 f1 69 9a 67 13 96 b5 cc 0e | 5b 85 9c bc 45 e5 5b 70 a0 86 01 2f a9 6f b7 16 | e5 8c 0d ae 1d 65 f5 53 d8 97 9b 0e 3c f7 8c b4 | 84 cb c7 3a c6 10 40 ea de 5f 63 4c 12 d8 3f ca | 6d 62 70 f0 93 72 e5 53 fe e2 f7 48 e3 16 ec 2c | 0c 51 77 44 87 3b cf 71 6a 9d b3 31 8e cc be f2 | 83 ce be c0 12 f1 01 88 ca 5d f3 fc 95 bc f7 5a | 34 7b 8e 4b 02 d0 59 3f ca a0 78 bc ef 69 51 e1 | 59 c6 1a ee b3 5f f4 fe ba ab aa 32 83 46 24 8b | 44 0a ac 7f 47 be 12 69 64 f5 8a a0 c3 66 33 2a | d1 fe cd 2b 6e fd 1c 22 43 71 36 d1 05 aa f3 a0 | 34 64 36 1b 5f af f2 60 88 b6 fd ad 79 17 84 9b | 29 00 00 24 a2 f8 9d 2f 08 fe df 02 8f a0 29 1e | b3 67 52 e4 00 d5 8c 7f 4e 12 c2 f7 f5 b4 05 71 | a4 8b 3b 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 12 2b 6b 99 24 aa d2 31 8d d6 a9 cf | 86 3d 5f d7 43 66 7f 91 00 00 00 1c 00 00 40 05 | 3d 40 65 0f bf b0 2e 03 30 63 c3 7a f7 f2 38 a3 | 20 e1 e4 b2 | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11640 | #375 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 09 26 11 42 9e 51 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #375 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #375 | rejected packet: | a4 09 26 11 42 9e 51 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #375: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c017ea0 | handling event EVENT_RETRANSMIT for parent state #404 | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #404 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #404 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49678.377377; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003013 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11640 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #404 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 "road-eastnet-nonat-152" #404: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #404) | 4a 5a cc 55 a0 5d f2 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 5c 51 83 ab 6b 01 fa 80 7d 29 db 27 cd 7b c6 | 7f 04 2f 6a 27 69 df b1 41 5e bf ae 45 95 c1 0c | 60 62 91 a3 34 a3 09 ec 77 e7 89 a6 51 09 95 12 | 3b ff b9 99 25 19 b1 ca db 05 e4 39 d2 de d6 52 | 26 ca b9 02 d7 13 18 29 d4 9e 9a 68 e5 5b 44 39 | 54 a0 05 f4 ba 65 c0 95 36 73 37 bc a2 90 45 30 | d7 96 35 a2 19 0f c4 75 70 1c 7f 35 ab a5 29 b5 | 6b 5d 34 07 1e e2 3e 41 ca 0a 85 69 25 b8 27 58 | d4 99 f8 5e 96 15 ec 82 ac 10 04 76 9b 35 64 a2 | 61 5a aa b1 99 cc 29 04 86 b5 f4 cc 47 04 55 8f | c7 28 c5 78 33 30 c8 76 93 6d f5 e2 6a c6 30 01 | 28 59 c4 cc 64 9b 7d 8e 92 4e ac 31 52 df 0e bd | 0a 9d da 2a 1d 60 fa 21 2a 50 98 51 8a 76 ec c4 | d0 d7 c3 bf 4d 91 f8 7a 88 5f bc 07 e6 69 d7 f2 | ab ab b7 dd 41 cf 13 b8 5a 48 6f f6 ea 70 5c d9 | fb 24 71 46 69 e2 7c a6 fa 4a f9 ae 35 11 e2 42 | 29 00 00 24 fe 30 87 af f4 c1 ee 21 b0 88 ac a0 | 02 58 85 f4 de 21 52 28 4c d8 94 b1 9c 53 a3 c4 | 4e 96 a9 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 64 19 b7 d1 4f 25 21 1b 78 33 8e | a2 b3 19 f4 56 5e 34 fd 00 00 00 1c 00 00 40 05 | ec 45 06 4d 08 52 67 71 ea 88 ce 05 15 99 3d c7 | 85 58 3c 64 | libevent_free: release ptr-libevent@0x7fb35c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | #404 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 5a cc 55 a0 5d f2 1b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #404 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #404 | rejected packet: | 4a 5a cc 55 a0 5d f2 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #404: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_RETRANSMIT for parent state #181 | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #181 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #181 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49678.388675; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009992 exceeds limit? YES "road-eastnet-nonat-181" #181: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-181" #181: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #433 at 0x557d46aca040 | State DB: adding IKEv2 state #433 in UNDEFINED | pstats #433 ikev2.ike started | Message ID: init #433: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #433: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #433; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-181" #433: initiating v2 parent SA to replace #181 | using existing local IKE proposals for connection road-eastnet-nonat-181 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 433 for state #433 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c017ea0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #433 | libevent_malloc: new ptr-libevent@0x7fb35c04b7c0 size 128 | #433 spent 0.11 milliseconds in ikev2_parent_outI1() | crypto helper 13 resuming | crypto helper 13 starting work-order 433 for state #433 | RESET processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 433 | start processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #181 ikev2.ike failed too-many-retransmits | pstats #181 ikev2.ike deleted too-many-retransmits | #181 spent 2.63 milliseconds in total | [RE]START processing: state #181 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-181" #181: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #181: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #181 "road-eastnet-nonat-181" #181: deleting IKE SA for connection 'road-eastnet-nonat-181' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-181' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-181 | State DB: deleting IKEv2 state #181 in PARENT_I1 | parent state #181: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #181 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 433 time elapsed 0.00069 seconds | libevent_free: release ptr-libevent@0x7fb34400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | (#433) spent 0.692 milliseconds in crypto helper computing work-order 433: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 433 for state #433 to event queue | in statetime_stop() and could not find #181 | scheduling resume sending helper answer for #433 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb35c02ec80 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-181 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 13 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-181" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-181' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-181" | stop processing: connection "road-eastnet-nonat-181" (in initiate_a_connection() at initiate.c:349) | spent 0.0875 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #433 | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 433 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #433 | **emit ISAKMP Message: | initiator cookie: | 23 e1 68 16 6a df f6 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-181 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 52 84 65 c0 62 66 6e cb 40 26 80 c7 11 7a b1 77 | ikev2 g^x 8f 7b 14 21 bf 47 61 54 80 80 4f 40 4b 14 8f 6c | ikev2 g^x 7f 20 33 7a 32 bd 20 39 a9 e7 e4 8c 88 5e 71 0c | ikev2 g^x b4 34 07 ea 3b 74 7a 69 d0 40 c2 8a ce 14 e0 29 | ikev2 g^x f7 f8 fb 45 30 ce 02 50 b6 4b d6 fe ce bd d7 fd | ikev2 g^x d9 af 2b 59 d1 37 75 ed 60 7b 97 1e bb b5 21 2d | ikev2 g^x 82 af 47 6c fd b3 b6 b4 1a e4 0b 54 80 93 91 9a | ikev2 g^x 7c 67 57 2c 37 bc 4a ba 6c 68 8e 7c 69 ae 25 35 | ikev2 g^x f6 73 82 3e e0 ba 6e 40 b9 c2 c0 d3 bd 9e 54 14 | ikev2 g^x 66 2e 22 5d 66 78 db 66 26 82 fa c1 4b 7c 9e 34 | ikev2 g^x 57 34 cb 3c 56 da ee df b8 34 f8 14 c2 9b 3b a3 | ikev2 g^x d6 4c a8 fb 55 30 94 15 c4 87 b2 b9 65 70 e9 f6 | ikev2 g^x 5f 9b ae 28 67 59 78 af d0 1e d8 d4 2a 4a 91 32 | ikev2 g^x 25 06 fb ff be c0 6a 2f e3 60 0d e2 75 08 92 ca | ikev2 g^x 55 96 9f 26 37 e4 6c 28 e7 f1 08 78 9b ac 4e 5b | ikev2 g^x 3b 11 9e bf 95 59 23 96 7a 89 87 42 71 70 51 75 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce bc 75 9d d0 ff b6 ae 90 e3 29 fd fb 27 30 03 9d | IKEv2 nonce 8d 6e b5 df cd e3 e0 48 35 b6 7e d4 5d 99 20 4f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 23 e1 68 16 6a df f6 a3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b5 | natd_hash: port= 01 f4 | natd_hash: hash= d3 1d b4 53 81 6d 12 3c 62 05 25 08 f2 c7 73 02 | natd_hash: hash= 9c 59 76 4d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d3 1d b4 53 81 6d 12 3c 62 05 25 08 f2 c7 73 02 | Notify data 9c 59 76 4d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 23 e1 68 16 6a df f6 a3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9b bb 33 9d d0 7d d5 98 fe 91 d5 bc 36 50 81 f5 | natd_hash: hash= 28 37 64 3d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9b bb 33 9d d0 7d d5 98 fe 91 d5 bc 36 50 81 f5 | Notify data 28 37 64 3d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #433 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #433: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #433 to 4294967295 after switching state | Message ID: IKE #433 skipping update_recv as MD is fake | Message ID: sent #433 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-181" #433: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.181:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #433) | 23 e1 68 16 6a df f6 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 84 65 c0 62 66 6e cb 40 26 80 c7 11 7a b1 77 | 8f 7b 14 21 bf 47 61 54 80 80 4f 40 4b 14 8f 6c | 7f 20 33 7a 32 bd 20 39 a9 e7 e4 8c 88 5e 71 0c | b4 34 07 ea 3b 74 7a 69 d0 40 c2 8a ce 14 e0 29 | f7 f8 fb 45 30 ce 02 50 b6 4b d6 fe ce bd d7 fd | d9 af 2b 59 d1 37 75 ed 60 7b 97 1e bb b5 21 2d | 82 af 47 6c fd b3 b6 b4 1a e4 0b 54 80 93 91 9a | 7c 67 57 2c 37 bc 4a ba 6c 68 8e 7c 69 ae 25 35 | f6 73 82 3e e0 ba 6e 40 b9 c2 c0 d3 bd 9e 54 14 | 66 2e 22 5d 66 78 db 66 26 82 fa c1 4b 7c 9e 34 | 57 34 cb 3c 56 da ee df b8 34 f8 14 c2 9b 3b a3 | d6 4c a8 fb 55 30 94 15 c4 87 b2 b9 65 70 e9 f6 | 5f 9b ae 28 67 59 78 af d0 1e d8 d4 2a 4a 91 32 | 25 06 fb ff be c0 6a 2f e3 60 0d e2 75 08 92 ca | 55 96 9f 26 37 e4 6c 28 e7 f1 08 78 9b ac 4e 5b | 3b 11 9e bf 95 59 23 96 7a 89 87 42 71 70 51 75 | 29 00 00 24 bc 75 9d d0 ff b6 ae 90 e3 29 fd fb | 27 30 03 9d 8d 6e b5 df cd e3 e0 48 35 b6 7e d4 | 5d 99 20 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 1d b4 53 81 6d 12 3c 62 05 25 08 | f2 c7 73 02 9c 59 76 4d 00 00 00 1c 00 00 40 05 | 9b bb 33 9d d0 7d d5 98 fe 91 d5 bc 36 50 81 f5 | 28 37 64 3d | state #433 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c04b7c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c017ea0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #433 | libevent_malloc: new ptr-libevent@0x7fb34400cf80 size 128 | #433 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49678.390313 | resume sending helper answer for #433 suppresed complete_v2_state_transition() and stole MD | #433 spent 0.605 milliseconds in resume sending helper answer | stop processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c02ec80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 e1 68 16 6a df f6 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #433 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #433 | rejected packet: | 23 e1 68 16 6a df f6 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b5 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #433: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0705 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8cc0 | handling event EVENT_RETRANSMIT for parent state #322 | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #322 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #322 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49678.396538; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005824 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c01da80 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #322 | libevent_malloc: new ptr-libevent@0x7fb35c02ec80 size 128 "road-eastnet-nonat-70" #322: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #322) | 74 03 a5 dd ea 05 2e d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 15 d9 ac 31 7b 6c 04 ac 7a ef e5 0d 89 93 07 | 20 e4 8e 39 86 a0 9c 1e 9f 76 b9 58 4d f2 a7 9f | a9 61 82 a9 75 3f e8 1a c2 92 fe 84 37 ac 33 ad | 65 45 df 2b e1 cb 2c 07 be 4f c4 59 89 1a 1e d4 | bc 00 c9 7a da 51 f8 0e 6d e5 9b 4d 2b 1e 90 8c | a7 76 dd 60 8a 02 12 aa 75 a5 70 c1 65 7c 3e 55 | 89 46 b2 4f 06 dd f5 63 86 b7 00 f0 73 2f 7c 5a | b7 d4 0f 38 d5 4f 7a 42 58 2c 1c 6e 8d df 4f 92 | 63 c6 3f de f4 10 95 80 0d 14 e0 40 1c 6b a7 25 | 78 25 a5 d6 97 e1 6b 90 22 06 bd 2b cc f5 6b ca | 10 6b ac a7 98 1a 94 fa 4c cf 33 fe dc 06 fd b0 | 5f 81 4e 82 91 b8 3e 8a c7 a6 68 81 06 ac 84 f0 | ea 68 69 9c ad 3a 07 bc c5 f3 31 91 30 05 f3 ef | dc 51 d5 f6 ee f9 4a 07 b7 9e 0f 65 ad 3f 41 a0 | d7 70 67 24 31 3b 11 1f 99 26 08 ab a5 8d 87 97 | f5 4d 04 da a2 fb f0 9d b6 5e ca 79 ac fb e6 b9 | 29 00 00 24 7c d4 e7 e5 83 a9 e9 e5 4c 1d 37 7f | 04 0f 2a 2b 54 28 64 c4 b2 05 be 1f 1d 68 a9 5e | 6e 76 88 d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 64 8d 0f b4 d2 3e c7 db eb 6e 9c | 80 67 1d 17 67 fa eb 16 00 00 00 1c 00 00 40 05 | 45 ce 15 93 8c ec f9 76 43 65 cd e9 a3 d1 ec 83 | 45 3c 35 9c | libevent_free: release ptr-libevent@0x7fb36404b5a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8cc0 | #322 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 03 a5 dd ea 05 2e d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #322 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #322 | rejected packet: | 74 03 a5 dd ea 05 2e d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #322: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a49450 | handling event EVENT_RETRANSMIT for parent state #427 | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #427 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #427 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49678.402824; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501031 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8cc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #427 | libevent_malloc: new ptr-libevent@0x7fb36404b5a0 size 128 "road-eastnet-nonat-175" #427: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #427) | 4d cf ce dc 5e 69 0c 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be f3 80 6d a1 4d bc 3b 63 de fe 7b 5d 35 aa 05 | b1 28 d6 19 4f ca c2 b6 85 f2 21 b1 5f ee 7d c3 | e5 4d ce d8 a2 87 47 56 c6 32 a1 9b 66 32 11 d6 | 2a 42 af 5d 8f 34 c5 d5 6c 06 20 9f 03 7a dd 4b | 48 34 c3 3a 83 64 cc cf 03 38 0f 85 e3 77 24 47 | d5 16 ac 4d 8b 47 b5 03 3d 95 eb ea 92 b9 cf 0a | 68 66 89 9f e9 d7 ae 03 3d 64 75 ac c9 d5 b3 10 | de 8f 17 7b 40 ef 37 ec 93 3c cd 2d 80 d3 81 0e | 06 7b 23 ba 8b 61 0c f3 0a da 72 5d 9c fe 2a 86 | bd e9 e7 fc 88 d7 20 01 3d 62 9b 97 2d 52 60 5a | fa 1e fb 14 48 2b da dc c9 bc 30 8f d1 65 96 cb | 33 cf 05 cd 5e fb 63 36 4b e6 22 41 78 36 97 51 | 7d 03 25 93 d8 95 93 1e 55 d3 a5 af 94 2f 9c 8c | 5f a3 40 23 47 68 5e 3a 9d 49 f6 a2 e8 96 cd ae | 14 48 e0 e0 ab cb ce 26 3e 2f 37 d7 ae b6 aa 01 | 36 16 4f df 45 31 cb 1a 1c 34 5e a5 cc 5a a8 48 | 29 00 00 24 fd 8d 8b b7 46 89 9a fa b3 ab b5 e9 | cc f2 e8 c2 d2 52 f8 a0 49 af 7a 94 c3 9c de 32 | b7 d8 84 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9a c6 fd c2 96 5c 57 4c be 19 76 6e | d6 a6 82 da 0b ee 49 1a 00 00 00 1c 00 00 40 05 | 12 be 5a 47 ba 89 37 fe 5c 7b 97 4a 79 4a eb 43 | ad 50 1a 96 | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a49450 | #427 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d cf ce dc 5e 69 0c 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #427 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #427 | rejected packet: | 4d cf ce dc 5e 69 0c 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #427: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45350 | handling event EVENT_RETRANSMIT for parent state #420 | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #420 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #420 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49678.415127; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002203 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a49450 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #420 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 "road-eastnet-nonat-168" #420: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #420) | 38 01 94 6e be 3a 28 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c e6 6f 10 c2 18 44 e2 34 88 94 b1 6e ad 96 2f | 7e f2 2f d5 05 74 10 9d b0 ed 16 ba d1 bb 6a 81 | 3b 36 bb 33 64 6a 4b 49 98 6b 61 6b 38 a7 f0 f9 | 85 f1 ea 1f 82 7f 75 2e b8 87 48 fb ca 42 ad 54 | 59 d3 d4 98 fc e3 db 9e 06 1c 4d 0a 68 e2 82 b1 | b4 79 61 9d ef 49 6d 74 7e f5 a5 55 9d ac 1f 86 | bc 38 61 c3 ec 65 14 03 d9 05 f4 3a a0 cf b9 81 | ea f9 8e 26 2a 33 57 de f0 0c 7b 3a 31 62 59 7d | 0a 51 80 e9 b3 45 96 f0 0f c4 ba 78 af bf d6 5a | 60 67 ef 7e 3d 35 d6 cc 9c c8 4a 58 b2 0f d6 d7 | a4 37 58 a2 99 5b 23 f1 45 8d 6c d3 30 bc 9f 64 | 97 c5 ef 20 d5 b9 a3 78 d6 da 52 f2 da 0c 22 0a | a7 af 15 bc c7 88 8c 82 a8 a3 ee 2f 8a ad 53 b2 | a0 1b 8a 3b ba 0a 34 48 34 2f ad da 72 63 db 61 | 9e b4 c4 95 69 50 db f5 62 4c 82 15 0a a2 7d 3d | 5b 37 5a 63 75 a1 9d 88 2f 4d 72 7d 91 14 f6 58 | 29 00 00 24 a2 fc 3c 40 ce 99 e3 62 f3 97 ac 0a | d5 d9 6a e9 cb 20 69 0b 55 a4 ef ef 10 02 28 ef | bc 3f 93 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 0a f7 67 8f e9 41 30 08 68 43 0c | 01 13 f9 c1 61 fa 63 aa 00 00 00 1c 00 00 40 05 | ef 1c 5b ca 2a 2f ea 7b fb 12 61 31 e7 f2 9d c7 | 67 58 3e 74 | libevent_free: release ptr-libevent@0x7fb374034da0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45350 | #420 spent 0.176 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 01 94 6e be 3a 28 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #420 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #420 | rejected packet: | 38 01 94 6e be 3a 28 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #420: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0626 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24700 | handling event EVENT_RETRANSMIT for parent state #376 | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #376 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #376 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49678.423445; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00463 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45350 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #376 | libevent_malloc: new ptr-libevent@0x7fb374034da0 size 128 "road-eastnet-nonat-124" #376: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #376) | ea 6d 1c 44 16 cc 7c db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 30 8d f2 73 36 66 21 18 72 ab a6 1d 5b ca 9c | 0a 7e 8f ea 73 27 8a 58 d5 e4 26 95 19 96 87 0c | 7f 07 37 1c 70 d2 60 3e 98 51 eb 57 bf 72 e0 8c | 84 ad 4f b6 dc 5c 36 41 e2 77 e0 9c 8d 51 16 fc | 84 d9 54 f9 85 4d 98 72 f2 d6 3d 1b 19 f0 da ce | ab 3f 23 52 e0 3a 3c 0f e9 38 61 5a c2 41 30 12 | 05 82 0c cb c8 c2 1e a1 4f f2 c3 e1 3d da 41 26 | 24 be f6 af 3e e8 2f 87 ee 1b 93 a1 f0 e9 53 da | 3a 2e 85 7e d2 d0 a7 3b eb 29 ab 65 b7 78 9f f6 | c5 fd a3 19 78 40 8c d9 48 7b 2c 4c e7 26 6f 53 | d3 ac b1 b4 ba da af d2 ab 50 63 75 e1 1d 99 d0 | b8 31 ac 7d e7 18 55 91 d3 ac 44 fc d3 74 62 7f | ce 91 66 95 28 b3 47 a1 94 fd 56 15 40 09 da b9 | 56 ba 99 10 ef 74 77 7b 2d 9f e1 06 40 6f 4c 27 | 16 1c 00 6e 75 bf e7 e8 68 0b d5 e5 14 e8 f6 62 | 49 c7 45 85 8e da 35 35 ec 65 cf 2e 56 35 57 b4 | 29 00 00 24 b2 22 59 8f 2f 17 3c be 86 a7 a1 89 | a7 cd 11 4f 04 a8 63 56 c2 46 93 de 35 e3 be b3 | 5b e4 fb 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 73 25 29 4a e6 52 0b aa f7 7d 73 | 68 37 ec c6 59 a7 02 18 00 00 00 1c 00 00 40 05 | a9 5a 00 6b 7f 85 e1 a6 d7 c4 fa 5e b7 b1 99 68 | fa 78 21 65 | libevent_free: release ptr-libevent@0x7fb3500180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24700 | #376 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 6d 1c 44 16 cc 7c db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #376 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #376 | rejected packet: | ea 6d 1c 44 16 cc 7c db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #376: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0583 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23110 | handling event EVENT_RETRANSMIT for parent state #405 | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #405 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #405 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49678.432735; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002819 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #405 | libevent_malloc: new ptr-libevent@0x7fb3500180b0 size 128 "road-eastnet-nonat-153" #405: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #405) | be e8 17 81 54 19 aa 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 35 ee 04 e9 c6 8a 5e c2 8c d0 2d 28 00 02 85 | 8c 37 b4 2a 7d 22 9b 7b d7 a1 23 7d 82 8f c4 6b | 57 c4 dd c3 ee aa c0 59 55 41 ec 07 5b d2 96 3f | 84 76 05 f0 b5 2a e8 98 98 d7 99 f0 e6 85 ba e9 | 7a 9d b6 d3 d8 1c ba 13 51 c2 52 69 b1 b0 51 2d | 27 ff ad 85 cb c3 37 19 4d 04 8f 00 5d 8e da a2 | 83 bf af 69 a5 88 8d 6e 4b fc d9 97 99 c9 fb 45 | db d1 9d 19 a0 0a d0 5c 01 fa a2 fa ec 3d 5c 71 | 97 18 03 d4 ac c9 d5 4f 44 b7 51 11 eb 34 8d f4 | ae 35 d6 d0 d3 d3 55 70 23 2c b8 b9 0d e9 30 e3 | 09 45 cd 57 53 d7 0b 66 63 c7 ad 04 26 12 af a0 | 90 e5 43 30 55 a3 78 25 bd ac a0 c8 d8 1b 48 03 | 7d 5e a7 cb e9 7e 28 c2 c1 55 c3 c2 88 18 bb 71 | ea 43 2f 82 f5 b1 df d2 66 a9 f6 d5 fa 01 de ee | e8 cd 12 32 f5 db da 44 b1 63 d9 46 0a 50 55 e5 | e4 13 08 92 13 df ad 90 0b 31 de af 43 48 dc 7b | 29 00 00 24 ad 05 d9 2e f2 d6 c0 cb b5 b3 6e e0 | 64 6e 66 e1 31 b9 1b 6d 0b a1 0e d8 22 30 ee ae | e8 8f 1f eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 93 4e 39 e4 10 9f 0f a5 0f ed 76 | 86 5f 9d 57 55 de 19 a7 00 00 00 1c 00 00 40 05 | eb f0 2f 13 5d 22 43 08 07 64 33 45 d0 5d dc 6e | 5b 6e e5 c1 | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23110 | #405 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be e8 17 81 54 19 aa 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #405 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #405 | rejected packet: | be e8 17 81 54 19 aa 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #405: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0558 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360005860 | handling event EVENT_RETRANSMIT for parent state #323 | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #323 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #323 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49678.451022; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005088 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23110 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #323 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 "road-eastnet-nonat-71" #323: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #323) | fa a0 9f 7c 98 fa b7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 46 00 d1 b1 2f ab 58 ff ae 3e e1 90 df ac 17 | ff f8 20 d8 dc c8 64 44 8b d4 4d 64 77 87 0d 12 | 4f 58 f8 0b b8 23 de 06 cb 6a 5a 17 a1 ce 9c 0e | b9 8f d4 30 b1 62 d8 df cd 4c 66 72 94 9e 12 c2 | 2d 76 67 bf af 09 84 71 96 13 7f 13 e3 92 f9 eb | 91 ae c7 77 a0 91 b1 8b 78 4e 95 7f ad 59 ce f7 | 52 f5 ff c7 0f 12 41 0b 6a 23 2d 80 44 0e 92 7c | 8a 4f 11 47 2b 77 90 68 d7 a1 52 f7 6b 79 db 3f | 94 cd 89 b0 a4 aa 7e 64 52 6b 85 6e 03 da 1f ae | b6 90 2d d1 46 19 b6 66 ea b6 57 b4 c6 78 39 27 | 7f 33 c8 a1 bd 41 e7 ba 08 ef c1 2b 83 3d 1a a5 | d6 cc ec 96 a2 e8 29 ec 44 9c 54 bc 8b 9c d6 9b | cf 36 d1 9f c7 0e 2f 28 11 0b 73 2c 8d e2 76 0d | 66 d9 63 04 c0 20 e3 d1 af b2 68 91 e0 90 8f 15 | 8a 1a f5 c8 e3 0d 24 88 9a 72 7c ad a0 47 9a cf | 87 bf fe bc 41 93 5c 36 c0 33 07 c5 9e ea fb dd | 29 00 00 24 40 e8 32 3c 23 00 84 94 61 80 b2 17 | 1c a2 13 13 eb 56 70 6b 74 c5 2e 36 50 96 1d 9e | 9b cf 84 1b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 d2 f5 ad 3c 92 ba 81 0f fc 09 27 | bf 74 8b d6 da e0 d6 64 00 00 00 1c 00 00 40 05 | e3 ba 50 e3 10 b5 c6 17 22 3f 31 51 2e fe 55 bf | 2d 04 cf 9f | libevent_free: release ptr-libevent@0x7fb348025100 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360005860 | #323 spent 0.176 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa a0 9f 7c 98 fa b7 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #323 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #323 | rejected packet: | fa a0 9f 7c 98 fa b7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #323: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad5900 | handling event EVENT_RETRANSMIT for parent state #182 | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #182 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #182 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49678.459379; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00764 exceeds limit? YES "road-eastnet-nonat-182" #182: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-182" #182: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #434 at 0x557d46acb600 | State DB: adding IKEv2 state #434 in UNDEFINED | pstats #434 ikev2.ike started | Message ID: init #434: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #434: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #434; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-182" #434: initiating v2 parent SA to replace #182 | using existing local IKE proposals for connection road-eastnet-nonat-182 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 434 for state #434 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb360005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #434 | libevent_malloc: new ptr-libevent@0x7fb348025100 size 128 | #434 spent 0.0672 milliseconds in ikev2_parent_outI1() | RESET processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #182 ikev2.ike failed too-many-retransmits | pstats #182 ikev2.ike deleted too-many-retransmits | #182 spent 2.65 milliseconds in total | [RE]START processing: state #182 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-182" #182: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #182: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #182 "road-eastnet-nonat-182" #182: deleting IKE SA for connection 'road-eastnet-nonat-182' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-182' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-182 | State DB: deleting IKEv2 state #182 in PARENT_I1 | crypto helper 17 resuming | crypto helper 17 starting work-order 434 for state #434 | parent state #182: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 434 | stop processing: state #182 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb34c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad5900 | in statetime_stop() and could not find #182 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-182 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-182" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-182' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-182" | stop processing: connection "road-eastnet-nonat-182" (in initiate_a_connection() at initiate.c:349) | spent 0.0592 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 434 time elapsed 0.000545 seconds | (#434) spent 0.546 milliseconds in crypto helper computing work-order 434: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 434 for state #434 to event queue | scheduling resume sending helper answer for #434 | libevent_malloc: new ptr-libevent@0x7fb3500342b0 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #434 | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 434 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #434 | **emit ISAKMP Message: | initiator cookie: | 68 bd 27 f7 1a 5f c8 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-182 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9b 8d dc 86 f4 61 cd 63 4f 12 1a 89 63 c0 18 0e | ikev2 g^x da c1 2f 67 00 48 49 fe 80 58 30 87 77 1f 60 f1 | ikev2 g^x 91 93 c4 dd 6a 33 66 a0 69 fa 20 95 f6 9a 11 c7 | ikev2 g^x fd d3 c3 ff f1 0e a6 05 ba 58 f9 c6 b4 81 c1 3f | ikev2 g^x 58 b5 fa d8 f3 85 c4 ec 19 40 f6 9f ac 5a 0e 85 | ikev2 g^x ab f8 54 8d ff fd 0f ef d3 5b 98 8a 75 38 18 ce | ikev2 g^x f2 7b e8 23 92 dc 6c 70 3f 25 92 19 2b 60 a6 82 | ikev2 g^x 30 c7 b8 84 44 df 82 d3 8a 4d fc 1d 9c e4 51 d6 | ikev2 g^x 72 15 3a 4a d5 64 0f 79 a2 e3 fa 27 32 de fa 9b | ikev2 g^x 0a b6 71 85 29 d5 43 a6 b2 3c 95 42 d3 be 1c 80 | ikev2 g^x e1 df 27 cf e0 47 6a aa 9d f0 da 55 04 28 85 87 | ikev2 g^x 1e 7a 6c 89 a7 1a 78 3d cf 4e 43 87 8f 82 da c7 | ikev2 g^x 06 01 34 b1 a1 6a 5d 22 18 fe 03 9e 0d 36 91 39 | ikev2 g^x 6c bb 36 1a 00 1b a4 da c4 26 ba 72 4d 2a 35 43 | ikev2 g^x a5 6f 44 e2 75 40 5e f0 90 a9 5a 70 fc 57 4c e2 | ikev2 g^x 21 84 c8 a9 9b df a7 2e 69 2b 50 04 e1 24 b1 85 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 24 e6 ca a8 b3 30 fc 67 22 ff 0b c1 23 a4 8f 2a | IKEv2 nonce ae b5 6d 78 43 33 67 66 1b 96 07 82 43 a1 52 5d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 68 bd 27 f7 1a 5f c8 9f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b6 | natd_hash: port= 01 f4 | natd_hash: hash= e1 30 9f db e9 ff d2 de 10 c0 b8 22 86 59 ab dc | natd_hash: hash= 44 02 05 1c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e1 30 9f db e9 ff d2 de 10 c0 b8 22 86 59 ab dc | Notify data 44 02 05 1c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 68 bd 27 f7 1a 5f c8 9f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2d 24 f4 0c 2e f5 a0 c9 e2 14 db 8f 00 ef 15 a2 | natd_hash: hash= 0d 97 11 53 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2d 24 f4 0c 2e f5 a0 c9 e2 14 db 8f 00 ef 15 a2 | Notify data 0d 97 11 53 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #434 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #434: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #434 to 4294967295 after switching state | Message ID: IKE #434 skipping update_recv as MD is fake | Message ID: sent #434 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-182" #434: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.182:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #434) | 68 bd 27 f7 1a 5f c8 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b 8d dc 86 f4 61 cd 63 4f 12 1a 89 63 c0 18 0e | da c1 2f 67 00 48 49 fe 80 58 30 87 77 1f 60 f1 | 91 93 c4 dd 6a 33 66 a0 69 fa 20 95 f6 9a 11 c7 | fd d3 c3 ff f1 0e a6 05 ba 58 f9 c6 b4 81 c1 3f | 58 b5 fa d8 f3 85 c4 ec 19 40 f6 9f ac 5a 0e 85 | ab f8 54 8d ff fd 0f ef d3 5b 98 8a 75 38 18 ce | f2 7b e8 23 92 dc 6c 70 3f 25 92 19 2b 60 a6 82 | 30 c7 b8 84 44 df 82 d3 8a 4d fc 1d 9c e4 51 d6 | 72 15 3a 4a d5 64 0f 79 a2 e3 fa 27 32 de fa 9b | 0a b6 71 85 29 d5 43 a6 b2 3c 95 42 d3 be 1c 80 | e1 df 27 cf e0 47 6a aa 9d f0 da 55 04 28 85 87 | 1e 7a 6c 89 a7 1a 78 3d cf 4e 43 87 8f 82 da c7 | 06 01 34 b1 a1 6a 5d 22 18 fe 03 9e 0d 36 91 39 | 6c bb 36 1a 00 1b a4 da c4 26 ba 72 4d 2a 35 43 | a5 6f 44 e2 75 40 5e f0 90 a9 5a 70 fc 57 4c e2 | 21 84 c8 a9 9b df a7 2e 69 2b 50 04 e1 24 b1 85 | 29 00 00 24 24 e6 ca a8 b3 30 fc 67 22 ff 0b c1 | 23 a4 8f 2a ae b5 6d 78 43 33 67 66 1b 96 07 82 | 43 a1 52 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e1 30 9f db e9 ff d2 de 10 c0 b8 22 | 86 59 ab dc 44 02 05 1c 00 00 00 1c 00 00 40 05 | 2d 24 f4 0c 2e f5 a0 c9 e2 14 db 8f 00 ef 15 a2 | 0d 97 11 53 | state #434 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb348025100 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb360005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad5900 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #434 | libevent_malloc: new ptr-libevent@0x7fb34c0300e0 size 128 | #434 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49678.460444 | resume sending helper answer for #434 suppresed complete_v2_state_transition() and stole MD | #434 spent 0.32 milliseconds in resume sending helper answer | stop processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3500342b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 bd 27 f7 1a 5f c8 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #434 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #434 | rejected packet: | 68 bd 27 f7 1a 5f c8 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b6 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #434: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3680129a0 | handling event EVENT_RETRANSMIT for parent state #428 | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #428 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #428 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49678.475639; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500926 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350040840 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #428 | libevent_malloc: new ptr-libevent@0x7fb3500342b0 size 128 "road-eastnet-nonat-176" #428: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #428) | fb 15 42 71 fe 24 9a a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 50 d4 99 e3 c3 b2 8d 50 f4 55 ae 47 3b 25 61 | 1e c4 05 b1 59 21 46 35 0e 81 55 dd de 7f 65 40 | 00 1a 4e c9 0d 72 6a 7a 8e 31 f2 b8 05 87 95 5f | 92 19 3b d0 26 f7 ef a7 b3 37 5f 37 15 e9 34 12 | 33 cb bc 05 19 62 04 88 c4 b0 11 3c a2 fc 2e a7 | 48 74 27 c5 24 6a b1 84 34 89 1c 11 73 e4 fb e9 | 1b 3e 80 7d 33 32 51 1f 3d 67 11 16 e4 23 05 bd | 3f 72 2d 38 c9 0b 38 c0 12 64 3a 43 5b e7 46 c1 | 2b 7e 29 d4 ef 37 71 a8 e0 71 19 2f a1 c5 6c 53 | 94 fe 4e 57 73 5c 74 b5 d5 7f cc e2 3d a3 30 0d | 02 5c 9d dc 4d a0 93 77 cd b6 58 cb 5c 89 fe a8 | 40 8a c4 11 16 43 cc f4 7d 6e ae 00 27 3a 7c 8c | 12 14 7e db be 5a 42 72 b9 d0 07 1b fd aa 82 51 | 0e fb 68 c6 88 b4 35 6c 93 af 50 1c ff 48 78 d4 | b7 b7 c9 3d bd cb b9 82 34 8d b6 5a ff e7 73 c1 | e0 88 1f 51 42 a1 76 7d 4c 3a 1b 39 03 d3 42 78 | 29 00 00 24 e8 4b ce 8e 1c b5 fd 76 2e 19 5c e4 | 1a 51 b2 57 c5 b9 7b 5b bc c1 c3 17 ad 08 ad 32 | c1 29 cf d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 5a 55 94 7a 84 e5 8b 58 e8 27 7a | 96 44 f5 8a 4c 99 6f 81 00 00 00 1c 00 00 40 05 | 54 c7 00 62 13 8f 45 35 f4 93 09 e0 a0 98 7d 08 | 6e 4a 7d e5 | libevent_free: release ptr-libevent@0x7fb38001abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3680129a0 | #428 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 15 42 71 fe 24 9a a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #428 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #428 | rejected packet: | fb 15 42 71 fe 24 9a a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #428: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #421 | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #421 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #421 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49678.486946; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00271 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3680129a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #421 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 "road-eastnet-nonat-169" #421: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #421) | 53 46 78 d0 f9 b4 2b ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 1e 13 6f 9e 9e 28 7d 48 cb 8f 21 ad 12 23 0d | 2e 17 4b ec 60 47 24 f9 49 65 0f b8 05 f3 b2 c5 | 35 0c dd 44 2a 04 47 c6 96 e8 e3 9d da 44 54 8d | d0 16 cf 7d 24 e8 e0 cd a8 2c 8e 39 d3 b2 8b 7f | 72 0a 52 da e9 14 4a cc 17 a9 78 b8 cd 5e be 1d | b9 b5 cd 7b b6 5f 02 22 ea c4 0a a6 8f a3 01 6c | 5b 53 24 36 89 d6 72 ef 99 b2 12 aa fb cb aa db | b2 d1 08 23 c1 6a e2 dd cd 0b 52 1b 08 f4 07 44 | f6 bb f7 14 71 89 1d 05 a9 2e 9d 11 f6 47 e7 7b | 5c 89 c0 6a 79 44 41 55 07 e9 d4 c5 65 08 95 21 | 02 27 ea de 7e 8f c1 e5 b3 56 d5 44 30 34 c9 29 | 25 c6 6c f5 76 8d bd 58 fa 4e 08 93 a9 a8 12 bd | 8c 61 44 c0 18 3b 6c f3 4a 89 60 c3 7a 98 37 61 | d4 a6 d5 c6 6d e0 61 22 11 f5 b2 91 df 3b aa 2c | 62 52 60 02 03 f1 56 8c f6 e3 d9 1e 59 30 5a b8 | cf c5 38 a8 40 43 1f 7b 8b 5b 7c d9 77 f7 d9 ba | 29 00 00 24 41 49 08 f2 3f 7f 22 d1 7a a9 25 e2 | 15 a5 3d 37 9b e8 6b f7 56 6b 10 73 05 1d f4 b0 | b9 8c f9 c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 d0 78 7d 22 f6 6d e2 e5 b7 d3 9b | 09 f6 2a 83 8c 96 39 01 00 00 00 1c 00 00 40 05 | 72 19 84 dc d4 59 5b 35 51 4f b6 9f 34 c6 2f ea | b9 aa 04 8a | libevent_free: release ptr-libevent@0x7fb3780300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #421 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 46 78 d0 f9 b4 2b ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #421 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #421 | rejected packet: | 53 46 78 d0 f9 b4 2b ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #421: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000cc10 | handling event EVENT_RETRANSMIT for parent state #377 | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #377 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #377 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49678.488221; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004464 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #377 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 "road-eastnet-nonat-125" #377: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #377) | 7d b7 6a 31 9c d6 86 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 bf 7a 35 d2 37 1e c0 a2 92 6a 98 80 72 24 5e | 1f 3c b2 01 23 5f 15 bf ce e9 e4 d7 08 a3 2a 60 | 60 1e 2a e8 5a e7 a9 d5 87 39 6d 3f 34 3f c0 1b | ca fe dc 77 c6 7e 84 64 73 35 57 0c ed b5 74 11 | bb 72 6b af 00 a6 5c 48 1d a9 ae e0 21 6e f9 6c | fe 77 59 9f 79 f0 27 e3 f8 d3 03 12 c5 8c 01 06 | 76 43 6f e7 91 25 19 a3 05 2c 5f 40 7b 60 ce d6 | c7 0a 22 7e c1 15 e4 29 ab c3 9b 6d 58 d6 08 88 | eb 2e fc 26 54 22 7d d9 71 73 77 93 47 47 52 c7 | 2f be 59 30 ba ca e1 78 87 6d cb 35 72 6f 4d 3b | a0 93 98 95 e4 6c 43 b1 50 a4 aa 69 98 d4 ed e8 | 9d 30 82 39 85 51 32 50 b9 91 12 7b 77 d2 d0 9f | 64 b8 21 58 96 89 58 eb 1b a0 e3 48 15 3e 58 3b | 7f 5d 13 52 09 44 ad 12 73 77 70 1d 29 a3 72 c1 | 6f bc 36 26 b2 07 f9 32 34 75 b2 cb 8d 27 b8 92 | 36 ef 06 e2 e3 5e 94 66 19 de e4 ee 30 db 10 64 | 29 00 00 24 40 c7 66 20 2c ab 25 81 a4 29 77 75 | 63 eb 29 35 21 bb d9 a5 a3 5d 38 ec 5b 5c 03 34 | 11 83 53 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 20 88 86 59 0d 66 18 17 be e2 6d | 8e c3 55 fc 50 ba 92 3e 00 00 00 1c 00 00 40 05 | a3 24 68 23 82 72 27 ee 2c 96 9c 16 80 ee e0 88 | 08 9f bc a7 | libevent_free: release ptr-libevent@0x7fb34003b010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000cc10 | #377 spent 0.0849 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d b7 6a 31 9c d6 86 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #377 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #377 | rejected packet: | 7d b7 6a 31 9c d6 86 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #377: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0399 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370018460 | handling event EVENT_RETRANSMIT for parent state #406 | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #406 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #406 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49678.506484; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002753 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #406 | libevent_malloc: new ptr-libevent@0x7fb34003b010 size 128 "road-eastnet-nonat-154" #406: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #406) | 5c 1b 3d 38 ad ed bb 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 1a b6 af ea 21 97 b3 f5 89 b5 95 b7 8e 01 21 | 34 29 bd cd 92 66 af f7 07 14 1e f2 4b ac 69 77 | b3 25 64 1a 72 01 08 14 88 fb 34 a6 91 bd 4c e8 | 74 ed 64 90 06 cb ad 54 67 18 ec c2 f6 32 90 94 | 8a 60 b7 b6 26 ea 31 da ec 24 92 6a 22 25 e6 ae | 79 52 07 43 fe e8 78 1d 19 58 3a 0f 01 09 9b 79 | a8 83 55 03 d0 25 e3 a6 6b 4d b2 09 24 dc 38 c7 | c0 36 e4 53 c2 05 eb 85 aa 76 78 46 e9 fc ba 6a | 9d 2a 99 85 b8 e3 fb 99 44 cb 75 c0 ab ae 6e 11 | 07 c0 ca 22 19 62 ce d5 17 5c e1 b9 18 74 78 be | 34 a1 1c d9 92 69 84 5a 1b b1 7e 28 a9 f2 00 ef | e6 0f 63 2f 7a b6 8d 10 3d 27 b5 f9 29 ad b2 b0 | 65 7c 94 5e 21 5a 98 07 17 36 5b b2 b7 51 51 8d | 3d 77 c7 dd 9a b0 95 69 8a b2 64 fa 98 d0 67 3a | d0 c0 eb c5 e3 82 7f 6a 7e d1 db 5f 16 5a 12 aa | ee c9 5e 0d 7b ae 47 81 60 df bf f4 74 63 48 5d | 29 00 00 24 00 c8 88 3e 7a 51 ef 1c 0c 98 f2 86 | d5 82 58 ca a8 80 65 3f cb c6 86 a8 5f 67 eb c4 | af 88 eb 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c fb 6e 46 7d 68 85 83 cc d1 35 3b | 25 21 b7 36 bf 74 0f f9 00 00 00 1c 00 00 40 05 | ea 1c 8a 1b 9f c4 37 0b d8 b4 d1 29 da 67 72 c1 | 45 ae 67 d8 | libevent_free: release ptr-libevent@0x7fb3400094d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370018460 | #406 spent 0.234 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 1b 3d 38 ad ed bb 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #406 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #406 | rejected packet: | 5c 1b 3d 38 ad ed bb 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #406: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.103 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab0dc0 | handling event EVENT_RETRANSMIT for parent state #324 | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #324 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #324 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49678.518976; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006771 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370018460 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #324 | libevent_malloc: new ptr-libevent@0x7fb3400094d0 size 128 "road-eastnet-nonat-72" #324: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #324) | c4 71 4c 47 7a 99 7f 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c dc ba bd 1d 04 54 b8 de 2e 7e 4a 73 d1 75 b4 | 30 69 01 66 67 06 e7 5e ab 90 82 b5 8d a8 6f 99 | a6 8e f4 9a 71 40 de b0 d0 8a d9 b4 ed e4 6f 96 | 72 62 19 62 54 5d 4c 3f 06 3d 1e 94 b0 72 25 98 | 59 31 b4 12 f8 20 4c c4 1b 57 a8 cc e5 a4 fd 8e | b7 00 85 d1 0e c7 4d 3b 7a 7d 11 6d 19 fd 6a 75 | 3a e2 10 64 69 82 7f f7 9f 48 c9 57 2f a9 70 57 | 4e 17 87 f1 7b f1 ed 42 6c 69 0f 53 01 4f 76 4d | 49 de 7e 34 19 26 2c 17 55 79 6b 2b e6 70 a9 41 | 28 a8 e5 5c 9c 0b 01 88 ec 60 31 32 12 e0 5e 2a | d0 1f 1c 62 7b 27 a5 6a b5 82 73 7a c7 4d 6d 07 | a2 fe cc 3c f6 be 38 d5 e6 bc c7 f9 e4 e8 c4 66 | 25 de 6a 66 de d9 be 67 52 10 16 32 1e 81 04 70 | 2e 04 43 17 b2 33 75 6a 97 52 34 c2 f0 d7 69 62 | a8 cb 03 e7 cd 81 0c 55 75 a8 24 c4 ed 92 5e ec | 1a d4 65 0c 31 44 9a 04 50 cf 8e 45 48 fa 6a 9c | 29 00 00 24 a2 70 44 54 09 89 66 44 f1 6d a2 85 | b3 a0 4f a8 16 2e 01 ca af 0e 31 e7 7c 41 b8 c9 | 46 c7 99 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 0b 59 de ec 8b 84 8b 41 7c 2d 20 | 10 87 a7 ee 10 a7 dc 2a 00 00 00 1c 00 00 40 05 | 44 04 bc 04 96 6f cb 2b 3d a9 52 fe 2d cc 35 38 | 9a e2 35 2c | libevent_free: release ptr-libevent@0x7fb34c023bc0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab0dc0 | #324 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 71 4c 47 7a 99 7f 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #324 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #324 | rejected packet: | c4 71 4c 47 7a 99 7f 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #324: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.056 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1c400 | handling event EVENT_RETRANSMIT for parent state #183 | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #183 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #183 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49678.527334; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.012694 exceeds limit? YES "road-eastnet-nonat-183" #183: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-183" #183: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #435 at 0x557d46accbc0 | State DB: adding IKEv2 state #435 in UNDEFINED | pstats #435 ikev2.ike started | Message ID: init #435: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #435: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #435; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-183" #435: initiating v2 parent SA to replace #183 | using existing local IKE proposals for connection road-eastnet-nonat-183 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 435 for state #435 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab0dc0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #435 | libevent_malloc: new ptr-libevent@0x7fb34c023bc0 size 128 | #435 spent 0.0942 milliseconds in ikev2_parent_outI1() | RESET processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #183 ikev2.ike failed too-many-retransmits | pstats #183 ikev2.ike deleted too-many-retransmits | #183 spent 2.67 milliseconds in total | [RE]START processing: state #183 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-183" #183: deleting state (STATE_PARENT_I1) aged 64.014s and NOT sending notification | parent state #183: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #183 | crypto helper 18 resuming | crypto helper 18 starting work-order 435 for state #435 "road-eastnet-nonat-183" #183: deleting IKE SA for connection 'road-eastnet-nonat-183' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-183' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 435 | in connection_discard for connection road-eastnet-nonat-183 | State DB: deleting IKEv2 state #183 in PARENT_I1 | parent state #183: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #183 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 435 time elapsed 0.000546 seconds | libevent_free: release ptr-libevent@0x7fb388038370 | (#435) spent 0.555 milliseconds in crypto helper computing work-order 435: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 435 for state #435 to event queue | scheduling resume sending helper answer for #435 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c400 | in statetime_stop() and could not find #183 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb35402ede0 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-183 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 18 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-183" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-183' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-183" | stop processing: connection "road-eastnet-nonat-183" (in initiate_a_connection() at initiate.c:349) | spent 0.0682 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #435 | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 435 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #435 | **emit ISAKMP Message: | initiator cookie: | 02 95 c8 9c 02 70 ef 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-183 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c4 be 1c 3f a4 66 94 b1 76 a3 9b 53 73 2f 7f 23 | ikev2 g^x 4a e8 16 a3 16 f5 f7 58 2e fa f9 cc e5 72 42 dd | ikev2 g^x 79 82 dc a3 32 45 63 e7 97 5f 0c 3f 10 0e f2 af | ikev2 g^x 36 1e 6e 10 67 9c 3e 6a f7 f3 72 ba 54 df 6c 10 | ikev2 g^x a0 1c 0f 6a ce 67 71 2a a3 c4 d3 9c 88 b9 f7 04 | ikev2 g^x 30 84 58 1f bb cd f1 cd f3 e2 04 50 7f cf d2 c2 | ikev2 g^x 26 c1 1c 97 d9 a2 05 dc 96 89 90 50 ae 56 a0 13 | ikev2 g^x ef 2a 24 f0 f6 4d a9 8e e9 e9 a2 eb 42 50 42 ab | ikev2 g^x 0a 3d 04 3e 57 0c 0a e1 00 9d 75 a3 60 15 b7 e8 | ikev2 g^x 84 24 4c a7 d1 ab 72 3e f4 8b ef 1a c8 cc 7d af | ikev2 g^x ee 55 f6 12 cd b9 d1 90 77 f0 61 3d 61 12 ee f8 | ikev2 g^x 94 b3 64 a2 07 62 d6 b1 81 57 84 c9 8b ff 25 ea | ikev2 g^x 74 4a 3e 9b d6 88 62 0a dc b0 05 5d 90 03 c9 cd | ikev2 g^x 54 3d 83 cb 36 ad ef 96 f9 28 73 d8 df b8 72 79 | ikev2 g^x d4 6d 08 a8 b3 a6 c9 bf ea 29 05 5f 61 ed 03 82 | ikev2 g^x b8 9d e9 c7 c9 a7 67 16 08 0f e7 ba 6a 6d 38 69 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ae 8f 34 92 0a 08 8b 7b 30 37 54 ea a0 43 df e6 | IKEv2 nonce ae f8 bc fe 70 d8 fd fe ce a5 f7 5d fb 76 aa 10 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 02 95 c8 9c 02 70 ef 9a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b7 | natd_hash: port= 01 f4 | natd_hash: hash= 86 34 e7 f7 2a 07 1c be c1 53 fb c8 09 7a b0 5a | natd_hash: hash= 0f 53 bf 3c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 86 34 e7 f7 2a 07 1c be c1 53 fb c8 09 7a b0 5a | Notify data 0f 53 bf 3c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 02 95 c8 9c 02 70 ef 9a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 75 09 e1 26 ec 40 37 83 67 2f 03 41 48 5a 4e 60 | natd_hash: hash= ef 86 00 50 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 75 09 e1 26 ec 40 37 83 67 2f 03 41 48 5a 4e 60 | Notify data ef 86 00 50 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #435 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #435: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #435 to 4294967295 after switching state | Message ID: IKE #435 skipping update_recv as MD is fake | Message ID: sent #435 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-183" #435: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.183:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #435) | 02 95 c8 9c 02 70 ef 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 be 1c 3f a4 66 94 b1 76 a3 9b 53 73 2f 7f 23 | 4a e8 16 a3 16 f5 f7 58 2e fa f9 cc e5 72 42 dd | 79 82 dc a3 32 45 63 e7 97 5f 0c 3f 10 0e f2 af | 36 1e 6e 10 67 9c 3e 6a f7 f3 72 ba 54 df 6c 10 | a0 1c 0f 6a ce 67 71 2a a3 c4 d3 9c 88 b9 f7 04 | 30 84 58 1f bb cd f1 cd f3 e2 04 50 7f cf d2 c2 | 26 c1 1c 97 d9 a2 05 dc 96 89 90 50 ae 56 a0 13 | ef 2a 24 f0 f6 4d a9 8e e9 e9 a2 eb 42 50 42 ab | 0a 3d 04 3e 57 0c 0a e1 00 9d 75 a3 60 15 b7 e8 | 84 24 4c a7 d1 ab 72 3e f4 8b ef 1a c8 cc 7d af | ee 55 f6 12 cd b9 d1 90 77 f0 61 3d 61 12 ee f8 | 94 b3 64 a2 07 62 d6 b1 81 57 84 c9 8b ff 25 ea | 74 4a 3e 9b d6 88 62 0a dc b0 05 5d 90 03 c9 cd | 54 3d 83 cb 36 ad ef 96 f9 28 73 d8 df b8 72 79 | d4 6d 08 a8 b3 a6 c9 bf ea 29 05 5f 61 ed 03 82 | b8 9d e9 c7 c9 a7 67 16 08 0f e7 ba 6a 6d 38 69 | 29 00 00 24 ae 8f 34 92 0a 08 8b 7b 30 37 54 ea | a0 43 df e6 ae f8 bc fe 70 d8 fd fe ce a5 f7 5d | fb 76 aa 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 34 e7 f7 2a 07 1c be c1 53 fb c8 | 09 7a b0 5a 0f 53 bf 3c 00 00 00 1c 00 00 40 05 | 75 09 e1 26 ec 40 37 83 67 2f 03 41 48 5a 4e 60 | ef 86 00 50 | state #435 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c023bc0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab0dc0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c400 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #435 | libevent_malloc: new ptr-libevent@0x7fb388038370 size 128 | #435 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49678.528679 | resume sending helper answer for #435 suppresed complete_v2_state_transition() and stole MD | #435 spent 0.453 milliseconds in resume sending helper answer | stop processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35402ede0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 95 c8 9c 02 70 ef 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #435 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #435 | rejected packet: | 02 95 c8 9c 02 70 ef 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b7 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #435: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0577 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac1340 | handling event EVENT_RETRANSMIT for parent state #422 | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #422 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #422 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49678.553876; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001788 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35401d710 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #422 | libevent_malloc: new ptr-libevent@0x7fb35402ede0 size 128 "road-eastnet-nonat-170" #422: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #422) | b8 e0 2b 96 c7 45 5a 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 6c 40 a5 03 bc 57 72 c1 66 d6 ac 89 5b f4 c1 | d0 36 2b 40 f8 23 54 39 34 b5 82 a2 ec a9 be f0 | 9e 2a fb a5 33 fb bf 78 6a 65 ee e2 5e 78 b2 97 | 57 06 96 a7 85 bc b5 2f 57 ad dd 92 ec d4 39 15 | 9d 72 7c 3a f0 31 6f b3 e0 1f fa e2 bb 36 ae ad | 14 69 bc c7 2b b8 d3 5c 99 5b e0 8a c5 e8 54 ff | a1 c6 b4 be 7e 54 b5 cb 08 e2 27 e4 e9 7a 16 60 | ce 85 f4 97 da 4f 4d 09 2e 8c 52 19 57 93 83 db | 87 b1 16 b3 51 00 56 5d 37 6d b9 b3 a2 bd 99 3b | aa 47 42 33 bb 18 39 df 45 15 55 a1 5a 1e 8d 44 | 65 5b 06 c8 ce 40 9d 80 8b 2e ca 26 d1 79 fd 78 | 43 19 a6 31 62 db c5 b6 b4 99 3e 3d 0f 92 3a 22 | 67 54 41 d3 95 c5 98 ed 1d fc 1c 5c cc 1c ff 1e | 72 31 d9 fd 8f 7a 3f e9 62 8e 84 af f0 f7 f0 8d | 9b 73 d6 fc ff bc e5 4a d7 b9 1b 80 22 88 c1 56 | e0 bb 60 af 81 19 d7 73 ec 24 2d 0b 96 d4 fa 10 | 29 00 00 24 2b c3 8d 3d 91 5a 53 1a b5 f4 6d b1 | 02 bf f8 18 e1 84 d7 9f a5 0d 77 07 91 b8 4d 3f | 04 89 f2 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 85 d2 75 8f 47 7e 81 98 63 03 9f | 1d 8c c0 94 92 93 75 cc 00 00 00 1c 00 00 40 05 | 2a 28 b7 7f 38 5f e0 65 f6 1d 4d c9 d5 6f ea f1 | c9 85 fb 5d | libevent_free: release ptr-libevent@0x7fb35c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac1340 | #422 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 e0 2b 96 c7 45 5a 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #422 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #422 | rejected packet: | b8 e0 2b 96 c7 45 5a 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #422: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0818 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38000feb0 | handling event EVENT_RETRANSMIT for parent state #407 | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #407 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #407 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49678.559267; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004336 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac1340 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #407 | libevent_malloc: new ptr-libevent@0x7fb35c035930 size 128 "road-eastnet-nonat-155" #407: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #407) | 0e f3 59 3b 18 9b 4c 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 5f 7f 81 27 bd f8 4f 84 8b e5 e1 d9 93 de d8 | ec 64 3c 7a c3 34 95 f3 06 ea 96 b5 7a 1b 8f d9 | c8 72 7c 66 d5 b2 ca 73 d5 43 7d ea c5 0c 84 ce | ea c7 b2 0b b4 5d 2c b0 44 4e 93 91 63 38 66 d7 | 19 d5 08 6f 6d f9 84 4a 63 7a 55 68 05 24 95 3e | 99 aa 1e b1 c3 ab 11 18 fa 12 e7 7c 5e c4 8f e2 | 44 28 c7 70 13 76 b9 dd 3a a6 1c 9b 90 d4 8f 73 | 83 e9 82 03 c0 46 28 ea 33 e9 c1 33 69 9b 00 f8 | f6 cd 83 94 cf a0 a7 5e b8 a0 8a 65 44 ef ec 83 | 35 ff 33 b2 45 4f 06 95 40 67 f8 16 c1 7f cb 23 | 42 69 1a ee 3e 5b 22 ed 9d 49 26 08 ce 24 1f dc | 4a 71 86 ce 70 39 9b 18 48 00 7f 0b fd 35 9a e2 | 3f 9a 8e 15 96 bd 41 9e d7 e9 02 79 05 c7 13 f3 | c8 1e 09 29 1f ca 34 e6 f2 7a 3f 24 4a 98 16 47 | 9a 91 43 46 5c 83 b4 00 84 95 4d df 42 56 5f 61 | 36 41 b7 50 c0 98 6b 76 ff 78 86 a6 38 01 7c 10 | 29 00 00 24 21 43 66 be 17 99 40 cd 23 ec 46 61 | 66 3c a9 d5 4d dd 70 3a b4 cd a8 e6 b6 42 a4 c0 | 0c aa c9 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 43 3c a2 b5 33 c4 3b e7 27 68 b0 | 1d 1f b8 cf bc 05 b9 a9 00 00 00 1c 00 00 40 05 | 76 06 02 ba 2b 08 ee 9d 42 ab b0 60 2b 0a e2 b7 | a2 85 77 a0 | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000feb0 | #407 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e f3 59 3b 18 9b 4c 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #407 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #407 | rejected packet: | 0e f3 59 3b 18 9b 4c 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #407: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #429 | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #429 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #429 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49678.564597; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500928 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000feb0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #429 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 "road-eastnet-nonat-177" #429: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #429) | b1 3d 9b 75 e9 17 32 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 58 34 a3 ec c6 75 50 25 fe 5f 41 58 c3 98 5a | 11 1f 83 e4 20 79 02 69 b1 3d ac 82 33 8f 44 96 | e7 d5 9d 7b f3 d7 f5 f1 3c 4b 07 77 e3 30 83 22 | 33 90 f7 d8 39 7d 51 da 1f be a3 9d 27 21 e0 23 | 1c c5 b5 f8 01 28 d0 3f bb de 17 8b 08 3e 77 12 | 3b 7e a1 ef 9e 6d 3b c1 0f 78 3f 7f d4 15 3e 67 | bd d8 07 2d 5c 0a f8 3b 6e 03 96 47 2a 3b ad 8d | fd ac a5 a9 41 55 69 70 54 4f c8 07 46 0f 75 8a | 8e 3a c9 5a 0e 6f 91 97 a2 53 99 02 54 c0 74 38 | 8d d6 59 17 7c b6 f5 96 24 2d 36 88 1b c1 a8 f4 | 9a 2c c6 20 9e 9c 1f 79 b7 b2 e2 28 6d c8 dc ea | ab 6f 81 8f 3c 54 99 e1 b5 ac 7a 7b e2 4b b7 47 | cc 01 c3 58 76 3a 5d 7a 87 5a 60 d6 14 71 21 77 | 7d 56 a9 78 8c 67 16 f3 5f ff 22 ed 4c 9c 08 f9 | b7 a6 81 b8 d7 76 0d 66 ab 45 4e 0c 98 69 dc 04 | 8b a0 74 65 f2 0e e3 59 97 ce 63 09 c5 83 7c 9c | 29 00 00 24 cb 81 79 39 c4 59 07 cd 3c 90 56 3e | 9d 57 79 9f 8d e6 58 24 f4 84 cf b6 0e b6 4d 54 | f8 24 7a fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 94 ea 1e 66 81 07 70 ab d6 5a a9 | c0 a7 0f 24 1b cb e7 a4 00 00 00 1c 00 00 40 05 | 17 95 c4 1b c0 e8 ee e6 7e 70 e4 b9 12 c2 c5 ed | 6f 00 57 73 | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #429 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0bf80 | handling event EVENT_RETRANSMIT for parent state #378 | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #378 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #378 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49678.564788; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004185 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #378 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 "road-eastnet-nonat-126" #378: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #378) | 92 97 bf d9 57 64 2b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 7e 95 c3 59 64 68 1e dc 08 f2 0b df c0 d3 85 | e4 57 68 76 f4 90 dc 14 fc b4 13 07 10 44 a8 8d | 11 66 84 12 ea 03 ab ca df 00 f5 13 ba 15 16 97 | c3 ae f2 09 b4 c2 1e 65 f4 d4 ef 76 85 ff a3 4a | ac ec 61 57 66 09 9f 4c b2 b0 4b 1a 98 fe 62 e6 | 55 f4 45 b9 db aa 2b bf cb d7 f6 c7 03 42 ad 34 | c6 d8 65 c8 40 fd 09 2c 94 7c 3b f3 2f 0a 0e 1d | 89 ee 1f 04 2f 4d 06 ee d1 19 c4 2e 99 32 3d c2 | d8 62 64 5d 3c 19 32 29 e6 a4 d4 41 97 46 6e 74 | 98 69 50 bd e9 22 20 c8 a0 94 d0 e1 2c ac e0 d4 | 3d 6d 89 f8 65 d2 f8 6c 5d 07 8b 5f be 6f 9f a2 | e3 9a 7d 49 fc a1 b3 f5 34 84 25 08 1b bf 82 69 | 97 0b c6 17 ae 91 38 6f 37 30 af 60 73 cd d7 76 | 1c 53 8a ed 55 8d 3b a6 b0 09 19 d4 bd 91 ad 63 | d2 44 97 69 9c 25 f2 23 5f d4 fb c5 78 47 07 23 | 75 fb 33 32 09 b8 13 e4 4b fc ad 29 45 c0 60 e8 | 29 00 00 24 45 ad fc 22 10 a1 61 46 e5 0c 1e 06 | 27 43 7b e2 4e f3 c7 89 82 92 48 5f 08 ae ee 54 | 20 02 7f 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb d4 ce a5 02 7b 5e 75 a8 72 0f 9e | 6c 02 05 b4 a6 0e 08 51 00 00 00 1c 00 00 40 05 | 67 63 47 aa c8 01 74 31 fc 9f e6 c6 9d 96 80 21 | f6 7a 37 28 | libevent_free: release ptr-libevent@0x7fb344008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf80 | #378 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 3d 9b 75 e9 17 32 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #429 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #429 | rejected packet: | b1 3d 9b 75 e9 17 32 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #429: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 97 bf d9 57 64 2b d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #378 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #378 | rejected packet: | 92 97 bf d9 57 64 2b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #378: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa5fc0 | handling event EVENT_RETRANSMIT for parent state #184 | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #184 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #184 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49678.587177; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008398 exceeds limit? YES "road-eastnet-nonat-184" #184: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-184" #184: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #436 at 0x557d46ace180 | State DB: adding IKEv2 state #436 in UNDEFINED | pstats #436 ikev2.ike started | Message ID: init #436: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #436: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #436; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-184" #436: initiating v2 parent SA to replace #184 | using existing local IKE proposals for connection road-eastnet-nonat-184 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 436 for state #436 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0bf80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #436 | libevent_malloc: new ptr-libevent@0x7fb344008e30 size 128 | #436 spent 0.0904 milliseconds in ikev2_parent_outI1() | RESET processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #184 ikev2.ike failed too-many-retransmits | pstats #184 ikev2.ike deleted too-many-retransmits | #184 spent 2.34 milliseconds in total | [RE]START processing: state #184 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-184" #184: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #184: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | crypto helper 7 resuming | crypto helper 7 starting work-order 436 for state #436 | picked newest_isakmp_sa #0 for #184 "road-eastnet-nonat-184" #184: deleting IKE SA for connection 'road-eastnet-nonat-184' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 436 | add revival: connection 'road-eastnet-nonat-184' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-184 | State DB: deleting IKEv2 state #184 in PARENT_I1 | parent state #184: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #184 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb35c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | in statetime_stop() and could not find #184 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 436 time elapsed 0.000641 seconds | timer_event_cb: processing event@0x7fb34000f1f0 | (#436) spent 0.656 milliseconds in crypto helper computing work-order 436: ikev2_outI1 KE (pcr) | handling event EVENT_RETRANSMIT for parent state #325 | crypto helper 7 sending results from work-order 436 for state #436 to event queue | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | scheduling resume sending helper answer for #436 | IKEv2 retransmit event | libevent_malloc: new ptr-libevent@0x7fb348029760 size 128 | [RE]START processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | crypto helper 7 waiting (nothing to do) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #325 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #325 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49678.588027; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00562 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #325 | libevent_malloc: new ptr-libevent@0x7fb35c0300e0 size 128 "road-eastnet-nonat-73" #325: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #325) | cc 62 92 c7 07 e9 0f 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 78 1e 62 84 10 5f b3 3f 6a 1c 99 15 ef b2 82 | ab 2f bf af 7d 91 0a 7a 06 0b c3 b0 8f 52 23 e0 | 2a 6c c7 c4 de c8 66 7c 42 9d 81 5e 4d 92 4f 0b | 2b a2 91 3c a6 4c 27 12 5d 3b 8e 56 27 02 38 a0 | d6 c6 eb ec 94 e3 d3 7c 60 71 44 03 de ee 1c 20 | b0 a7 fc d5 f0 33 3d 58 40 9a 40 7c 4b ef 22 f2 | e4 98 7c df 9e 84 f0 00 c2 3a 23 ca 54 c0 d4 32 | 78 ec 09 e7 04 f1 06 b2 16 5d 5c 32 c7 62 b8 41 | 9e c8 62 f4 94 dc ed 85 b6 72 ee e7 73 a0 4e 8f | 20 26 e2 05 be 3a 4e 16 75 b9 60 31 64 9c 09 14 | ad be c7 c8 b5 48 83 aa 5c 33 7b 3c 0a 72 26 74 | 75 7b 8e 60 49 df aa 10 6d 2e c8 c2 08 b3 b5 75 | e0 b2 66 ad ea 56 f8 5f 65 d4 40 09 52 2c f1 dd | 08 91 8c 9a aa bf 76 e2 bf e4 1a 3b 53 96 c1 d8 | e5 63 67 aa b1 58 7e 5f 20 cf 8d 72 df da b4 0e | bf a9 5c cc d8 b0 81 7f 8f b4 f2 bf dd 09 8c 23 | 29 00 00 24 bd d5 db 94 ee 32 26 3b fc 5c d2 c6 | e1 33 da da 8c 36 b9 7d d8 b6 53 e3 83 8c 71 5a | ae 9b 26 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 04 08 e6 80 0c ed de 4c 99 bb 24 | eb 89 b5 9f d3 24 a6 8a 00 00 00 1c 00 00 40 05 | 55 23 78 6b d1 b2 f4 84 29 a3 9f e9 4d 04 41 1c | 82 df 78 f0 | libevent_free: release ptr-libevent@0x7fb34001e520 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000f1f0 | #325 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 62 92 c7 07 e9 0f 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #325 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #325 | rejected packet: | cc 62 92 c7 07 e9 0f 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #325: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-184 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-184" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-184' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-184" | stop processing: connection "road-eastnet-nonat-184" (in initiate_a_connection() at initiate.c:349) | spent 0.0657 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #436 | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 436 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #436 | **emit ISAKMP Message: | initiator cookie: | cc d9 b7 db 44 05 84 19 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-184 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 45 3c 80 f9 ec ce 19 79 1b 2a 4e 88 36 86 a9 d8 | ikev2 g^x 85 e2 ee 1a ce 49 16 7b 84 5e 31 fc e1 84 f2 62 | ikev2 g^x 83 ed 4d eb 9f 6a c2 85 84 04 f4 d9 bd aa ee 02 | ikev2 g^x 08 1b 87 fa b5 ac ff f6 a9 3e 63 6d 16 01 77 f5 | ikev2 g^x 2b 3e 1b 6e c7 66 ff fb 38 8c 19 c9 7b b1 fe 10 | ikev2 g^x bc 5c c8 26 33 9f ff 45 76 a0 23 85 19 e3 31 de | ikev2 g^x 28 8c dd 45 56 45 3b fb b4 0d 18 e3 cd 81 8e 00 | ikev2 g^x 0b f6 17 10 a2 e0 44 20 37 74 e1 31 a8 10 b7 14 | ikev2 g^x cf 9a 72 a5 9f 1a 4b 15 1a b2 c9 bb 99 44 1e 31 | ikev2 g^x 11 05 e2 cf 98 40 c9 ef aa 8c fe 19 58 f6 d5 62 | ikev2 g^x cf d6 d5 ea 4e 24 4c 33 16 1d 0c db 05 43 98 5e | ikev2 g^x d3 1a 94 c0 4b ed 3c 02 54 4b fc ca 99 42 ac 4b | ikev2 g^x fc 8a 3c 6f 70 38 23 05 eb da 77 20 a0 4e 73 f3 | ikev2 g^x af d2 c3 64 0d 77 b8 54 17 69 4d 1e a8 53 83 4b | ikev2 g^x 8b 72 92 0a 4d 90 87 b2 56 ec 43 2c 41 d7 64 66 | ikev2 g^x 71 79 54 ef 65 56 ba 6d 1d e6 d1 dc ad 99 41 fe | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a3 ee 0b 44 35 bf 27 26 10 74 6f 1a d2 86 21 80 | IKEv2 nonce e6 fa 2e 6d 1e 83 9b 58 c8 96 87 8e e4 1b 77 71 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cc d9 b7 db 44 05 84 19 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b8 | natd_hash: port= 01 f4 | natd_hash: hash= 69 51 98 88 78 46 d0 e6 54 3d 62 ae 5f a3 54 6d | natd_hash: hash= d3 39 61 c5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 69 51 98 88 78 46 d0 e6 54 3d 62 ae 5f a3 54 6d | Notify data d3 39 61 c5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cc d9 b7 db 44 05 84 19 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f1 9f 10 2a 1c da 5a 4c b5 8c 1e 6e 78 d5 be 31 | natd_hash: hash= 9e a0 0c c1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f1 9f 10 2a 1c da 5a 4c b5 8c 1e 6e 78 d5 be 31 | Notify data 9e a0 0c c1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #436 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #436: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #436 to 4294967295 after switching state | Message ID: IKE #436 skipping update_recv as MD is fake | Message ID: sent #436 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-184" #436: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.184:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #436) | cc d9 b7 db 44 05 84 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 3c 80 f9 ec ce 19 79 1b 2a 4e 88 36 86 a9 d8 | 85 e2 ee 1a ce 49 16 7b 84 5e 31 fc e1 84 f2 62 | 83 ed 4d eb 9f 6a c2 85 84 04 f4 d9 bd aa ee 02 | 08 1b 87 fa b5 ac ff f6 a9 3e 63 6d 16 01 77 f5 | 2b 3e 1b 6e c7 66 ff fb 38 8c 19 c9 7b b1 fe 10 | bc 5c c8 26 33 9f ff 45 76 a0 23 85 19 e3 31 de | 28 8c dd 45 56 45 3b fb b4 0d 18 e3 cd 81 8e 00 | 0b f6 17 10 a2 e0 44 20 37 74 e1 31 a8 10 b7 14 | cf 9a 72 a5 9f 1a 4b 15 1a b2 c9 bb 99 44 1e 31 | 11 05 e2 cf 98 40 c9 ef aa 8c fe 19 58 f6 d5 62 | cf d6 d5 ea 4e 24 4c 33 16 1d 0c db 05 43 98 5e | d3 1a 94 c0 4b ed 3c 02 54 4b fc ca 99 42 ac 4b | fc 8a 3c 6f 70 38 23 05 eb da 77 20 a0 4e 73 f3 | af d2 c3 64 0d 77 b8 54 17 69 4d 1e a8 53 83 4b | 8b 72 92 0a 4d 90 87 b2 56 ec 43 2c 41 d7 64 66 | 71 79 54 ef 65 56 ba 6d 1d e6 d1 dc ad 99 41 fe | 29 00 00 24 a3 ee 0b 44 35 bf 27 26 10 74 6f 1a | d2 86 21 80 e6 fa 2e 6d 1e 83 9b 58 c8 96 87 8e | e4 1b 77 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 51 98 88 78 46 d0 e6 54 3d 62 ae | 5f a3 54 6d d3 39 61 c5 00 00 00 1c 00 00 40 05 | f1 9f 10 2a 1c da 5a 4c b5 8c 1e 6e 78 d5 be 31 | 9e a0 0c c1 | state #436 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344008e30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0bf80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000f1f0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #436 | libevent_malloc: new ptr-libevent@0x7fb34001e520 size 128 | #436 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49678.588804 | resume sending helper answer for #436 suppresed complete_v2_state_transition() and stole MD | #436 spent 0.441 milliseconds in resume sending helper answer | stop processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb348029760 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc d9 b7 db 44 05 84 19 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #436 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #436 | rejected packet: | cc d9 b7 db 44 05 84 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b8 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #436: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3840489a0 | handling event EVENT_RETRANSMIT for parent state #408 | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #408 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #408 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49678.623009; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004348 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #408 | libevent_malloc: new ptr-libevent@0x7fb340012840 size 128 "road-eastnet-nonat-156" #408: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #408) | 34 97 74 26 6a e5 a4 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 b4 84 d1 c7 68 61 a7 a8 43 5d 75 52 c1 45 ab | 1c 34 c9 1c fb 58 62 3f d2 e4 63 2f df 8e 65 23 | b3 d6 a9 03 c7 71 70 03 ff 1d bb ac 17 a8 6b 6d | e6 be 80 ad c9 77 c7 17 6a 89 49 48 8d b3 43 d4 | 49 ba db 2f fb d6 1b 93 5a 1f a3 ce 04 89 6c 2c | cc 68 c0 e5 12 10 fe eb 35 b6 6c ba a1 43 99 e7 | 4d 42 5d cb 3f a9 dd f3 e4 5f 32 df 76 2b 7a ba | 94 68 cc b7 71 6f 68 e6 66 e9 1a 0b ff e7 f5 9d | 06 aa 01 3c 32 ad d4 f8 5e 61 a5 fe 63 fb f1 96 | b8 0a 85 b5 ad 42 f9 e3 5a cf 27 5e ec 13 9b d0 | 73 b5 31 d4 d2 24 51 4d f5 0b 85 9e 11 85 42 e0 | 88 fc 0a 42 f4 e7 3d 49 ba 53 8a d7 ce 64 df d3 | 52 60 3d 1b 37 34 8f 8c 6a 9e 6e 25 b4 f3 7c 18 | 7a d1 56 c7 cf 72 57 08 b3 73 0c ad 15 18 33 ce | 9c f7 e6 b3 e4 26 15 89 8c 70 86 37 d6 87 03 97 | 84 4a 45 be 3f 69 21 05 76 54 73 82 39 32 70 e8 | 29 00 00 24 59 44 9e 7a bb 43 7f 93 5b bd e5 23 | c1 87 73 73 05 59 35 01 ab d3 f0 0b c4 05 69 18 | 98 63 3b b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 8e f2 86 2b ac 70 a5 cc 8b e7 7d | ac ad 47 30 21 b0 b0 7f 00 00 00 1c 00 00 40 05 | 79 17 f0 70 ea 4a c6 21 3a b7 c0 97 d4 68 33 32 | 9c c8 09 b0 | libevent_free: release ptr-libevent@0x7fb38402d490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840489a0 | #408 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 97 74 26 6a e5 a4 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #408 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #408 | rejected packet: | 34 97 74 26 6a e5 a4 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #408: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0454 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b07dc0 | handling event EVENT_RETRANSMIT for parent state #423 | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #423 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #423 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49678.624288; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002269 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840489a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #423 | libevent_malloc: new ptr-libevent@0x7fb38402d490 size 128 "road-eastnet-nonat-171" #423: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #423) | 0d af b2 c4 93 36 1d aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 70 3e db fb be 8b b3 fd 73 c0 a9 96 0b 3d a8 | e8 36 31 e7 9c ec 5a 7d ff 70 f6 37 85 23 83 66 | b2 fa b4 b8 d5 45 16 aa a6 25 06 9f 8e 8e bf 87 | eb 95 12 b7 4e e4 06 f4 d1 f8 40 ef 32 40 e6 a6 | 6e f4 f8 67 e1 5b 90 26 e6 0e 43 21 0c 13 d6 b5 | 8e c1 48 f1 b8 e8 39 77 8f 82 36 7b 93 75 c8 ab | 84 91 17 9b a4 7d 3c 17 79 cf 26 b4 a0 3c f6 3b | 8a 9e f2 22 e0 37 3d 4a 22 71 37 fa af 63 94 e0 | 5d cb 53 25 8c 9f 3c aa f6 38 ac 60 e7 b7 a3 49 | 84 5c ea cd 1a 4a 52 75 d6 46 93 25 09 85 d1 82 | dd 53 68 4b de 95 3f 19 ff d3 86 0a c0 38 25 ae | 80 9b b3 ed 25 0e b6 ad 72 55 3f 58 28 54 96 74 | 26 60 4c 26 05 26 c2 53 24 50 7e 5b 35 6b ca a1 | e8 d8 01 f8 35 32 32 e5 07 d9 c6 ca 24 0c 96 3a | 31 97 ac ed 1f 95 1e 6e 00 fc 4a 03 2a 9c 00 a0 | bd e4 04 9f 5c 17 08 9c 92 06 6e 29 32 98 a2 91 | 29 00 00 24 ce f0 94 25 9a 41 87 5c 3e 7f f2 93 | 02 a0 d4 6b b2 dd 60 48 d2 68 61 fc a3 c4 4b 4a | b6 d0 3f b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 fb df b4 aa 7f 08 b4 87 40 7c 29 | 54 a9 d0 e2 e4 44 95 43 00 00 00 1c 00 00 40 05 | b2 9a 73 50 a7 57 97 7d 3b 57 52 b7 42 61 08 84 | 33 0c bd 82 | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b07dc0 | #423 spent 0.0818 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d af b2 c4 93 36 1d aa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #423 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #423 | rejected packet: | 0d af b2 c4 93 36 1d aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #423: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa0940 | handling event EVENT_RETRANSMIT for parent state #430 | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #430 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #430 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49678.654612; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500274 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #430 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 "road-eastnet-nonat-178" #430: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #430) | fd 31 ba 30 35 2e 2d c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 61 13 a5 cc e9 81 b6 86 fc 6b 16 f1 74 d1 d9 | 72 f7 e2 ba f7 11 d1 79 92 c8 3d 2f 28 42 00 4a | 78 0d 84 65 5e dc 17 2f ba 15 c9 f0 22 4d 0a 3b | 29 55 5d 3f ae dd 3d 32 e8 c3 46 a9 04 47 63 51 | 2f 80 77 91 5f 9c b1 19 0f 94 27 d5 5d fe 9c 81 | eb f7 f8 80 c0 5d c2 5a 33 1a 77 e9 05 ab d6 42 | 13 e3 2a 15 08 f1 ba d2 bf eb 3d 3d ce 2d cd 92 | 09 c3 9f 5e 21 7b 84 9b 7e ad 3a cb 5a e8 5e a4 | 33 a8 4d 41 b7 9c ef db 29 ac 76 73 88 b2 9f 61 | fa 8c 1c 07 e5 8d 13 2c 9f d7 a6 11 29 94 1a 21 | 41 e9 57 a1 8b f3 e6 b9 90 b9 b8 f3 a3 3b 4c 8f | 23 8e 08 2f 27 17 72 8c c0 e7 38 14 1f 4b aa 78 | e1 d2 e5 79 c4 be 0b 93 9e 0c 21 6c d4 2a fe 21 | c7 8e 29 af b0 03 63 38 02 4d 95 ee 76 1a 81 af | a9 96 3e 2d 7b 5a 65 f4 b4 60 bb 2f a9 e9 18 59 | 66 94 d6 32 f1 9f 06 b1 1e 3d 20 4c 29 30 cd 34 | 29 00 00 24 72 14 4a 62 3b 2e 28 0b 02 9a 2b 55 | 37 9d 8e 84 fb c2 f7 70 ad cf 43 07 12 85 de c1 | 7c 78 30 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e0 6b 92 d2 7b 15 90 7f 21 2f b9 04 | b8 30 3c 8f c2 2d 01 6b 00 00 00 1c 00 00 40 05 | 4e cf 7c 8c 30 ae f3 1b a7 47 e4 11 ea a4 73 10 | 14 82 c2 9c | libevent_free: release ptr-libevent@0x7fb3380300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa0940 | #430 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 31 ba 30 35 2e 2d c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #430 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #430 | rejected packet: | fd 31 ba 30 35 2e 2d c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #430: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0521 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac69c0 | handling event EVENT_RETRANSMIT for parent state #185 | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #185 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #185 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49678.655896; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010012 exceeds limit? YES "road-eastnet-nonat-185" #185: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-185" #185: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #437 at 0x557d46acf740 | State DB: adding IKEv2 state #437 in UNDEFINED | pstats #437 ikev2.ike started | Message ID: init #437: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #437: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #437; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-185" #437: initiating v2 parent SA to replace #185 | using existing local IKE proposals for connection road-eastnet-nonat-185 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 437 for state #437 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aa0940 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #437 | libevent_malloc: new ptr-libevent@0x7fb3380300e0 size 128 | #437 spent 0.0778 milliseconds in ikev2_parent_outI1() | crypto helper 8 resuming | RESET processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 starting work-order 437 for state #437 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 437 | start processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #185 ikev2.ike failed too-many-retransmits | pstats #185 ikev2.ike deleted too-many-retransmits | #185 spent 2.57 milliseconds in total | [RE]START processing: state #185 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-185" #185: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #185: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #185 "road-eastnet-nonat-185" #185: deleting IKE SA for connection 'road-eastnet-nonat-185' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-185' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-185 | State DB: deleting IKEv2 state #185 in PARENT_I1 | parent state #185: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 437 time elapsed 0.000796 seconds | (#437) spent 0.801 milliseconds in crypto helper computing work-order 437: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 437 for state #437 to event queue | stop processing: state #185 from 192.1.2.23:500 (in delete_state() at state.c:1143) | scheduling resume sending helper answer for #437 | libevent_free: release ptr-libevent@0x7fb36c035930 | libevent_malloc: new ptr-libevent@0x7fb34c034410 size 128 | crypto helper 8 waiting (nothing to do) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac69c0 | in statetime_stop() and could not find #185 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a94500 | handling event EVENT_RETRANSMIT for parent state #326 | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #326 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #326 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49678.656893; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00709 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac69c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #326 | libevent_malloc: new ptr-libevent@0x7fb36c035930 size 128 "road-eastnet-nonat-74" #326: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #326) | 42 f4 17 bf 0b bc 36 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 f1 42 33 74 d0 fe 82 a0 d4 22 fd 7e 34 64 49 | 4d f5 d3 8f 3e 37 b5 af 12 9f 05 ef b3 72 9a 99 | 78 df 2d 2f c1 8c de 77 86 8e 9d 6b 67 d9 af af | ad cd b2 74 66 27 67 e3 45 6f da e1 b8 1d 10 12 | aa 54 5a 52 9a fc e0 30 8f 8b 79 31 12 59 11 92 | 5a a1 07 c2 c4 b1 d0 f4 f9 0f 04 f7 fe f9 b1 b9 | c8 5b 99 45 a3 87 06 f5 cc 08 82 18 bb f1 79 c6 | 9f 6d fc 2f c8 a5 4a bb b2 a8 2f 54 59 10 ab c2 | 83 cd 07 a2 e9 49 2a 19 10 9b b3 c3 b9 59 af 8a | 82 ad ef ed 34 d0 18 f1 8e 6d d9 f9 1b 1e 64 1d | ec 20 a9 3c a9 39 c4 6f 5c 5b 8b c5 2f aa 09 df | 17 b3 bf d7 16 36 cf cd 3e 0b 96 b5 5a 10 91 84 | f4 f3 63 75 93 27 25 04 41 5d c2 9e 4a 8a 6e e8 | b0 1c 23 7f 1d 44 0d 90 e6 7c 9c aa 0e b4 1e 03 | 9a ca 50 45 b0 6c ee 84 fe cf 35 d4 8b f6 71 45 | c0 43 28 23 ec 38 bc a8 e6 b5 85 28 d9 a1 fe 85 | 29 00 00 24 f7 60 f4 89 79 23 81 74 40 fe e0 94 | 99 4a 8a 5f b0 ba 18 0a 74 b7 e9 e4 4c 15 74 6f | 38 fd 32 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 0a 23 00 01 aa ce 92 9c 9e 81 0a | b1 b8 dc a9 c7 b7 f1 4a 00 00 00 1c 00 00 40 05 | 06 aa ce 4d 77 27 34 16 db f8 8e b3 38 da ae 93 | 3f 43 ba fe | libevent_free: release ptr-libevent@0x7fb35804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94500 | #326 spent 0.0966 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 f4 17 bf 0b bc 36 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #326 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #326 | rejected packet: | 42 f4 17 bf 0b bc 36 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #326: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-185 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-185" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-185' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-185" | stop processing: connection "road-eastnet-nonat-185" (in initiate_a_connection() at initiate.c:349) | spent 0.0679 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #437 | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 437 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #437 | **emit ISAKMP Message: | initiator cookie: | 31 51 d4 f7 c8 fe c5 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-185 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8d 4d c3 c5 4f ca 6c d8 d4 84 06 d4 ea 89 80 6d | ikev2 g^x 99 d1 7f e1 cb 80 24 55 fd df 90 fb 02 92 ff c9 | ikev2 g^x f0 47 14 8d 77 1a bb 9c 7c dd 17 b9 16 19 6b 74 | ikev2 g^x ec 88 72 db 3e 1a c4 54 69 dd d8 16 b9 56 68 f6 | ikev2 g^x 6a 0a 44 9f 3f b5 a3 4b 08 8a 18 15 d1 69 95 71 | ikev2 g^x d9 52 3a e9 65 ee 70 4d ea 9c f5 16 84 a6 99 9c | ikev2 g^x ab ff 36 83 9d b6 9f c3 53 f1 00 51 ea c6 f5 a2 | ikev2 g^x 5c ce 33 c2 cf de 1d c7 31 1f d6 91 bf f2 7f 9f | ikev2 g^x fc 6e d8 c8 43 fd a2 ec ed d4 2e e3 1a 35 b1 d0 | ikev2 g^x de 28 47 6a 6b a3 42 0c 4a 1a 4e 13 17 87 94 71 | ikev2 g^x f7 93 75 92 ea b9 03 fc c2 41 93 f1 c9 f7 b4 4d | ikev2 g^x 3c f1 35 28 f5 5e 37 14 cf 3e ce 38 da e2 53 26 | ikev2 g^x df e6 e9 23 b5 8c b6 45 18 8f e2 54 89 f9 96 79 | ikev2 g^x aa 6a 79 aa cf b4 ec 3d e4 21 6c a5 14 2c 68 b2 | ikev2 g^x 1b 56 0e 23 e2 48 c6 68 81 fb b5 23 23 53 e6 4a | ikev2 g^x 1c 61 e2 7a 67 e5 f5 84 ba 68 ce a3 e9 a9 c8 e3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 02 5e bf 69 6a 09 af cb c5 28 ba 2f be c6 fe 19 | IKEv2 nonce 42 f8 ee f5 0b 73 06 5b 41 10 d0 e5 69 e3 64 15 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 31 51 d4 f7 c8 fe c5 08 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b9 | natd_hash: port= 01 f4 | natd_hash: hash= a4 6b 27 8e 3d c1 6d e7 fb 64 0d 99 79 35 e1 df | natd_hash: hash= 31 89 9b 32 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a4 6b 27 8e 3d c1 6d e7 fb 64 0d 99 79 35 e1 df | Notify data 31 89 9b 32 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 31 51 d4 f7 c8 fe c5 08 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= dc 48 f6 93 16 4d 8a fc 81 8e 30 65 58 3a 8c 28 | natd_hash: hash= 32 6e e0 6b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dc 48 f6 93 16 4d 8a fc 81 8e 30 65 58 3a 8c 28 | Notify data 32 6e e0 6b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #437 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #437: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #437 to 4294967295 after switching state | Message ID: IKE #437 skipping update_recv as MD is fake | Message ID: sent #437 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-185" #437: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.185:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #437) | 31 51 d4 f7 c8 fe c5 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d 4d c3 c5 4f ca 6c d8 d4 84 06 d4 ea 89 80 6d | 99 d1 7f e1 cb 80 24 55 fd df 90 fb 02 92 ff c9 | f0 47 14 8d 77 1a bb 9c 7c dd 17 b9 16 19 6b 74 | ec 88 72 db 3e 1a c4 54 69 dd d8 16 b9 56 68 f6 | 6a 0a 44 9f 3f b5 a3 4b 08 8a 18 15 d1 69 95 71 | d9 52 3a e9 65 ee 70 4d ea 9c f5 16 84 a6 99 9c | ab ff 36 83 9d b6 9f c3 53 f1 00 51 ea c6 f5 a2 | 5c ce 33 c2 cf de 1d c7 31 1f d6 91 bf f2 7f 9f | fc 6e d8 c8 43 fd a2 ec ed d4 2e e3 1a 35 b1 d0 | de 28 47 6a 6b a3 42 0c 4a 1a 4e 13 17 87 94 71 | f7 93 75 92 ea b9 03 fc c2 41 93 f1 c9 f7 b4 4d | 3c f1 35 28 f5 5e 37 14 cf 3e ce 38 da e2 53 26 | df e6 e9 23 b5 8c b6 45 18 8f e2 54 89 f9 96 79 | aa 6a 79 aa cf b4 ec 3d e4 21 6c a5 14 2c 68 b2 | 1b 56 0e 23 e2 48 c6 68 81 fb b5 23 23 53 e6 4a | 1c 61 e2 7a 67 e5 f5 84 ba 68 ce a3 e9 a9 c8 e3 | 29 00 00 24 02 5e bf 69 6a 09 af cb c5 28 ba 2f | be c6 fe 19 42 f8 ee f5 0b 73 06 5b 41 10 d0 e5 | 69 e3 64 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 6b 27 8e 3d c1 6d e7 fb 64 0d 99 | 79 35 e1 df 31 89 9b 32 00 00 00 1c 00 00 40 05 | dc 48 f6 93 16 4d 8a fc 81 8e 30 65 58 3a 8c 28 | 32 6e e0 6b | state #437 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3380300e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aa0940 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94500 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #437 | libevent_malloc: new ptr-libevent@0x7fb3380300e0 size 128 | #437 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49678.657726 | resume sending helper answer for #437 suppresed complete_v2_state_transition() and stole MD | #437 spent 0.557 milliseconds in resume sending helper answer | stop processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c034410 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 31 51 d4 f7 c8 fe c5 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #437 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #437 | rejected packet: | 31 51 d4 f7 c8 fe c5 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b9 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #437: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0796 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #379 | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #379 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #379 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49678.661971; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003836 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #379 | libevent_malloc: new ptr-libevent@0x7fb34c034410 size 128 "road-eastnet-nonat-127" #379: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #379) | ac d4 3b e7 18 ea 52 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 79 a1 28 22 6c 83 3f 06 54 d9 39 13 0e d2 1a | 91 c2 ca c5 f2 c4 4e d5 78 8f 04 34 b9 34 73 b2 | 0e 75 71 ec 03 a6 5b c6 fa 6d a8 f4 41 1e af 26 | a4 e1 0a 58 77 48 aa f7 f9 4b 31 cf 6b f4 65 97 | 07 66 c4 32 08 bd d1 a1 48 aa 20 4b 65 4e 17 6e | 1d 1d 3e be b4 1e 7a 49 6a 64 0a fb 44 89 ba 45 | 90 86 8a 0e 4e 08 c0 05 da d1 a0 ff 5a ee c2 33 | ff d9 1a 6f ee 08 fd 7e aa 64 53 f4 84 74 c5 cf | 19 1a 29 d4 bf 47 bd 52 17 99 38 57 75 f7 85 58 | a7 b0 c8 4e e1 95 2d 4b f1 9c 5e eb 85 14 0d 87 | ff dd 17 9a ad 51 c0 99 e2 a6 60 c5 a5 7e 68 46 | b9 5c 04 3b 76 a0 9e 3d f7 9a 42 72 b5 92 be a4 | 61 c4 dd 5e a0 a3 58 05 90 20 32 7d b8 9d ca 34 | 36 d3 6d 56 98 49 60 97 da 87 f8 14 51 ea cf 16 | 79 9b 7d e5 00 7a 74 76 25 99 77 5a ef df a7 1c | e5 07 de ab dc 8b 19 85 17 de fd 62 d8 d6 3b b0 | 29 00 00 24 7a e9 60 d7 4c 8b 32 bf 82 0a a8 9a | c0 af 7e 52 e6 dc b9 f1 3b fb 0d 8e 4f c7 9d 86 | 5c d7 7a af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b e2 54 69 3e 49 d9 e9 7b 2c 62 f7 | a1 9b 3b a0 68 bf 42 11 00 00 00 1c 00 00 40 05 | 0c ab 0f ab 0f 86 37 d7 85 f7 e9 a7 f4 f2 01 1e | 28 ca 40 2a | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #379 spent 0.197 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac d4 3b e7 18 ea 52 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #379 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #379 | rejected packet: | ac d4 3b e7 18 ea 52 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #379: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0892 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350018460 | handling event EVENT_RETRANSMIT for parent state #424 | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #424 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #424 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49678.692398; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000939 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #424 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 "road-eastnet-nonat-172" #424: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #424) | e5 61 ef 5f 7f e3 58 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c da e9 09 30 1c 29 bb e6 91 cb 4e 69 4d ec 03 | b5 f9 29 7a 23 48 20 ed f7 47 c2 fe 06 e6 43 d7 | dd db db 34 94 8c 85 3b 55 9b f4 3a 74 ed 7a a1 | b8 84 40 94 dc 5c ed 16 d0 73 2d 49 36 0b 9a 1d | 7a 62 45 16 8d 9c 63 79 31 b8 8c 83 f1 0e b1 7f | 67 fe bc d6 57 49 2e 4d c3 49 48 a7 55 5f ff d0 | 14 68 fc 6f 72 30 bd 46 7b 9a 8c f4 dc c7 37 1c | e4 a4 8f 19 bc e7 61 cc 6b 11 48 dd 4e 4a 37 e3 | ee aa ab b1 b2 36 8e 89 eb 7e b7 77 69 a0 09 80 | 3c 6b fc 75 71 9a f3 bd 94 2c c9 c7 7f d3 9b 98 | 01 34 f8 57 09 1c 44 77 27 2b 95 8b 42 b2 1e 03 | d7 04 87 d9 03 b3 37 7c 1d b7 57 41 2d 16 5a a8 | dc c5 ad 48 e5 82 26 97 54 fe f5 c0 fe b9 29 58 | 35 ce 2a 1a 65 c3 c1 3a f9 04 5b 80 08 58 bc a4 | 5f 74 90 a2 3e 82 ee a6 80 5f 67 41 cd ba a6 4f | 66 85 f6 7c 29 e8 a5 11 0e c2 6f 44 c1 41 6a eb | 29 00 00 24 7c 1f b6 fc f1 5f 8d 51 2e 05 d2 13 | e2 d8 d5 f5 0f 0a 46 07 58 f7 ec 9e c5 1c 22 09 | 2c cd 2f ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 d1 0c 8f d2 91 2d a0 36 f1 93 d6 | bd 3f 30 ca a6 e2 8d 8a 00 00 00 1c 00 00 40 05 | 48 c0 59 12 12 13 1e e0 ba de 8c 06 ba c3 58 23 | f1 28 ea 8c | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350018460 | #424 spent 0.18 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 61 ef 5f 7f e3 58 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #424 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #424 | rejected packet: | e5 61 ef 5f 7f e3 58 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #424: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.082 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378012890 | handling event EVENT_RETRANSMIT for parent state #409 | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #409 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #409 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49678.693788; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002873 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #409 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-157" #409: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #409) | 0d 5e 25 c2 55 3c 99 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e 9e 5e 2e 09 bf 8f 71 99 55 8d fe 7f 83 64 1f | 09 d9 64 f5 c9 93 8a 5c be 46 9e 22 f6 15 48 5f | a3 27 82 be 44 32 8b ed 4e a8 f7 10 74 01 31 7a | a5 a7 4a e9 16 68 9c 40 cb 7b 6b e4 87 2e b5 7d | 61 20 08 88 29 08 bb bf f5 22 fa fd 47 2b fd 61 | a5 c3 48 69 18 1a 27 78 c3 f3 e3 0b 62 b4 52 0b | 48 72 ce 1d 37 3b 34 c5 fc ba cb 1f 9d e8 de ad | 9b ab 2c 3a d9 69 c6 42 6d b1 05 5a c4 77 34 d1 | ff 6d 2c 38 8e 1f 9c 0a 39 45 f9 c1 2e 9a c1 dd | d2 58 ca fc 7a d1 3f 4c 26 24 eb 54 5d 92 fb 39 | 47 60 ec 18 66 63 9c 19 12 10 f2 b6 7c 18 85 c7 | 6c d1 5b c2 e0 13 21 58 85 48 a4 fc 6e b1 46 84 | 53 a9 5a 65 21 91 66 41 1c 5e ad 4e a2 85 5a 4b | dd 4b fe 45 dc c9 fe ab c9 08 d4 96 88 93 93 aa | 1e 95 b1 87 3d 21 a8 b6 2f fd 18 ff 13 73 04 e2 | 11 aa e4 99 8f 8e f6 da 34 f7 b8 a6 55 2e b3 22 | 29 00 00 24 56 91 a2 13 7d 33 fd 14 52 dc d7 9d | 97 62 ec aa 5a ba e0 81 38 20 1d 66 12 9f da fa | a6 b6 f9 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d7 a6 1d 1c 1e 3f 9a df 29 5a 62 1d | 4b b6 a0 46 97 db 0a 03 00 00 00 1c 00 00 40 05 | b4 37 78 a6 35 8d da 4f 96 64 40 e6 05 68 b6 9e | 6d 2b 7a a6 | libevent_free: release ptr-libevent@0x7fb37802a8c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378012890 | #409 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 5e 25 c2 55 3c 99 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #409 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #409 | rejected packet: | 0d 5e 25 c2 55 3c 99 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #409: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0822 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a43dd0 | handling event EVENT_RETRANSMIT for parent state #431 | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #431 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #431 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49678.733103; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500497 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378012890 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #431 | libevent_malloc: new ptr-libevent@0x7fb37802a8c0 size 128 "road-eastnet-nonat-179" #431: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #431) | 47 a9 f6 5d ab 90 59 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 61 b4 c7 cd e1 2c 04 0c 72 d6 80 6f c8 af 30 | 4d b0 b2 1e 8d 4f c3 2d f2 10 58 df a2 cf 51 79 | b1 79 c2 3f a7 35 e3 8e 8c e9 62 c2 7f 62 64 45 | 0a e4 6a 79 06 24 d8 93 a4 d7 88 f6 f8 67 56 ac | da f7 27 22 46 b5 f3 36 fc 59 b8 ef 46 c0 a0 39 | db 63 6d 41 32 18 a5 95 8d 7d ad 6f 27 26 ca df | ed d3 ee 53 fd 4c f5 cc 75 fc e3 f8 93 5a 96 cb | 92 9a 63 48 fa 88 0d 7b 6d 6b ed e6 9a a3 62 cc | f6 ca d1 cc 9a a4 27 97 4e 98 8a fa ec f7 10 73 | 1c 8b 1a f2 37 ea 26 ef 65 c4 24 b5 68 0e 71 36 | f1 1a b0 23 a4 4f b8 8f 75 d7 00 cd 7b 3c ae b6 | d6 4e 42 ae bd d1 a4 92 33 6b 9b 3f 93 ee 1b 13 | 12 06 ae 19 81 16 af 26 23 73 f8 46 07 4b f9 88 | 69 47 c6 fb 6b 2b 62 2c a3 d3 70 f4 52 77 08 a4 | 0e 48 7c ce 5d 87 5a c2 55 50 b0 8a 92 e5 1a 3c | 83 00 60 34 e5 f6 a0 b7 42 00 ef b1 62 a7 9d 6c | 29 00 00 24 71 9e 5f 53 a0 03 f4 e4 24 3a 58 53 | c3 05 4a 1c c7 b1 e2 bd 95 07 98 a5 4b 6a 2d 2f | 6b 11 45 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 46 73 c7 9b 2a a1 6f 39 66 d3 70 | f2 4b 98 95 84 ba e3 3f 00 00 00 1c 00 00 40 05 | 9a b5 4b 5a b1 14 b9 6a 89 15 79 d3 91 3a bb d6 | 0d 4a ca 70 | libevent_free: release ptr-libevent@0x7fb34c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a43dd0 | #431 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 a9 f6 5d ab 90 59 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #431 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #431 | rejected packet: | 47 a9 f6 5d ab 90 59 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #431: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0551 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acab00 | handling event EVENT_RETRANSMIT for parent state #186 | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #186 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #186 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49678.739377; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.011059 exceeds limit? YES "road-eastnet-nonat-186" #186: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-186" #186: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #438 at 0x557d46ad0d00 | State DB: adding IKEv2 state #438 in UNDEFINED | pstats #438 ikev2.ike started | Message ID: init #438: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #438: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #438; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-186" #438: initiating v2 parent SA to replace #186 | using existing local IKE proposals for connection road-eastnet-nonat-186 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 438 for state #438 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a43dd0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #438 | libevent_malloc: new ptr-libevent@0x7fb34c01d920 size 128 | #438 spent 0.0666 milliseconds in ikev2_parent_outI1() | RESET processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #186 ikev2.ike failed too-many-retransmits | pstats #186 ikev2.ike deleted too-many-retransmits | #186 spent 2.59 milliseconds in total | [RE]START processing: state #186 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-186" #186: deleting state (STATE_PARENT_I1) aged 64.013s and NOT sending notification | parent state #186: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #186 "road-eastnet-nonat-186" #186: deleting IKE SA for connection 'road-eastnet-nonat-186' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-186' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-186 | State DB: deleting IKEv2 state #186 in PARENT_I1 | parent state #186: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 12 resuming | crypto helper 12 starting work-order 438 for state #438 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 438 | stop processing: state #186 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3600180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab00 | in statetime_stop() and could not find #186 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-186 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-186" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-186' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-186" | stop processing: connection "road-eastnet-nonat-186" (in initiate_a_connection() at initiate.c:349) | spent 0.0563 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 438 time elapsed 0.000529 seconds | (#438) spent 0.532 milliseconds in crypto helper computing work-order 438: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 438 for state #438 to event queue | scheduling resume sending helper answer for #438 | libevent_malloc: new ptr-libevent@0x7fb34002edf0 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #438 | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 438 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #438 | **emit ISAKMP Message: | initiator cookie: | 41 3e 80 fb 50 ac d5 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-186 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 97 f5 0a 72 18 b4 76 75 f6 01 ed 57 e5 f7 fc 77 | ikev2 g^x 49 c0 b9 2a a0 da 30 6d 64 aa a5 e7 d9 21 f7 0d | ikev2 g^x 91 be 59 58 e0 73 bb 49 e3 e7 3d e2 78 8a 04 ac | ikev2 g^x e2 97 a4 99 a2 30 e0 4b a8 00 c0 ee 42 04 60 c2 | ikev2 g^x 77 26 36 9f ca 4c 02 7c fe 9f ae b6 ae 04 ad 9a | ikev2 g^x 8f d0 27 5f 92 70 2c be 09 55 2c 26 bd b6 4c 20 | ikev2 g^x bf 73 30 d0 44 67 97 1f 1b 2e b0 03 d6 27 ac d2 | ikev2 g^x 9a 9e e4 f7 c7 3b 09 97 22 3c 54 79 43 94 36 23 | ikev2 g^x 17 e9 e5 03 2b e9 58 e3 73 9f 26 68 9a d9 44 87 | ikev2 g^x db f9 8f 3e f3 46 76 36 18 c6 80 3a ce aa cb fb | ikev2 g^x 5f dd ff d6 eb 23 75 c4 e2 35 1f 1d 81 9e 2a 45 | ikev2 g^x d7 f8 e7 91 af a5 b6 a5 46 57 1a 8c 96 c0 29 4e | ikev2 g^x 8e dc e8 e6 2d 92 82 6a 85 02 3a ad 02 27 a8 84 | ikev2 g^x 8c be 58 97 e6 a0 56 65 e3 b8 11 05 1f 19 4d bc | ikev2 g^x 68 44 f8 dd 63 ea 12 b6 6d 02 31 e2 3c 83 0c 90 | ikev2 g^x bb ff 2c 31 86 51 81 cf b9 63 dd 72 3b ea de db | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 65 91 ed 0a d4 1d 29 43 43 2f 3a 60 71 14 cd 7a | IKEv2 nonce ee 7f 0c dc 85 e8 36 48 85 1d 6f 9b 44 a1 8a 5c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 41 3e 80 fb 50 ac d5 e5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ba | natd_hash: port= 01 f4 | natd_hash: hash= 03 a7 76 d6 c0 45 d0 97 b1 a7 8c de d2 b0 18 be | natd_hash: hash= bd b1 c7 45 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 03 a7 76 d6 c0 45 d0 97 b1 a7 8c de d2 b0 18 be | Notify data bd b1 c7 45 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 41 3e 80 fb 50 ac d5 e5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 93 a1 f0 74 30 f5 50 67 ed 62 ea 87 43 47 97 7c | natd_hash: hash= d7 55 2f e9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 93 a1 f0 74 30 f5 50 67 ed 62 ea 87 43 47 97 7c | Notify data d7 55 2f e9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #438 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #438: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #438 to 4294967295 after switching state | Message ID: IKE #438 skipping update_recv as MD is fake | Message ID: sent #438 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-186" #438: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.186:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #438) | 41 3e 80 fb 50 ac d5 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 f5 0a 72 18 b4 76 75 f6 01 ed 57 e5 f7 fc 77 | 49 c0 b9 2a a0 da 30 6d 64 aa a5 e7 d9 21 f7 0d | 91 be 59 58 e0 73 bb 49 e3 e7 3d e2 78 8a 04 ac | e2 97 a4 99 a2 30 e0 4b a8 00 c0 ee 42 04 60 c2 | 77 26 36 9f ca 4c 02 7c fe 9f ae b6 ae 04 ad 9a | 8f d0 27 5f 92 70 2c be 09 55 2c 26 bd b6 4c 20 | bf 73 30 d0 44 67 97 1f 1b 2e b0 03 d6 27 ac d2 | 9a 9e e4 f7 c7 3b 09 97 22 3c 54 79 43 94 36 23 | 17 e9 e5 03 2b e9 58 e3 73 9f 26 68 9a d9 44 87 | db f9 8f 3e f3 46 76 36 18 c6 80 3a ce aa cb fb | 5f dd ff d6 eb 23 75 c4 e2 35 1f 1d 81 9e 2a 45 | d7 f8 e7 91 af a5 b6 a5 46 57 1a 8c 96 c0 29 4e | 8e dc e8 e6 2d 92 82 6a 85 02 3a ad 02 27 a8 84 | 8c be 58 97 e6 a0 56 65 e3 b8 11 05 1f 19 4d bc | 68 44 f8 dd 63 ea 12 b6 6d 02 31 e2 3c 83 0c 90 | bb ff 2c 31 86 51 81 cf b9 63 dd 72 3b ea de db | 29 00 00 24 65 91 ed 0a d4 1d 29 43 43 2f 3a 60 | 71 14 cd 7a ee 7f 0c dc 85 e8 36 48 85 1d 6f 9b | 44 a1 8a 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 a7 76 d6 c0 45 d0 97 b1 a7 8c de | d2 b0 18 be bd b1 c7 45 00 00 00 1c 00 00 40 05 | 93 a1 f0 74 30 f5 50 67 ed 62 ea 87 43 47 97 7c | d7 55 2f e9 | state #438 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c01d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a43dd0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a43dd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #438 | libevent_malloc: new ptr-libevent@0x7fb3600180b0 size 128 | #438 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49678.740393 | resume sending helper answer for #438 suppresed complete_v2_state_transition() and stole MD | #438 spent 0.315 milliseconds in resume sending helper answer | stop processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34002edf0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 3e 80 fb 50 ac d5 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #438 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #438 | rejected packet: | 41 3e 80 fb 50 ac d5 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ba fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #438: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad0280 | handling event EVENT_RETRANSMIT for parent state #410 | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #410 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #410 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49678.749578; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002756 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340025210 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #410 | libevent_malloc: new ptr-libevent@0x7fb35804b850 size 128 "road-eastnet-nonat-158" #410: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #410) | 59 b5 db 36 67 47 70 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 b7 0b 8c f9 95 bc f7 80 78 70 36 f3 fd f2 85 | 36 5b 98 b3 da 7d 8e 19 72 07 91 60 60 8a e6 82 | 67 b3 ba e3 47 c2 28 3a c4 af df a8 61 5d 73 9e | d2 63 4a 41 c1 df 23 58 85 d0 d0 d7 31 64 13 d3 | fc c4 39 95 ba ac 0f ae 94 0f 0a ba f0 76 e9 ae | a0 35 47 51 b9 fa 43 1f 5e 7f a1 99 3d cc 76 ac | 19 ca 51 32 ad cd e2 9d 6b 98 62 47 ad 2c d1 40 | 11 bd ff e1 9d 02 a1 c8 40 a8 ed 91 e5 60 1c 79 | ee 69 bc ed 65 82 b2 85 d5 b1 74 ab f9 fa 7a e9 | f0 dc 57 ef e3 3e 09 b2 80 4a e9 c3 55 5a 97 3e | 39 d4 2d 85 ca cc 9a e5 d4 76 c5 5e 9e c1 e9 7d | 39 17 67 a4 c4 56 99 a0 e7 0c b7 13 22 44 76 46 | 08 b0 60 5a a2 8d 7d 3c 2d 85 7a 7a dd 83 3a 2b | 27 be 2b 38 04 53 2f 3d 0c cd c0 ad bc 4e 6a 91 | 94 3d 91 ac 7d a2 5b fd 39 2e 69 e6 48 9c ae be | 71 e2 83 13 24 ec 5c 04 d1 c5 4a 80 96 3c 2f 11 | 29 00 00 24 e1 88 5c 17 02 b4 80 04 34 b3 a7 d4 | f8 d1 c3 d6 e1 59 82 cb 1f c0 98 16 57 75 53 e7 | ef 70 14 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 ce e5 8e 76 7c ee 72 e4 c9 6c 0a | 7e 11 3d 4e e7 09 5c 04 00 00 00 1c 00 00 40 05 | 2c 17 58 9d 14 87 37 db ad 40 b0 f7 64 73 53 a7 | 0b 3f 01 e6 | libevent_free: release ptr-libevent@0x7fb37c023b10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad0280 | #410 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 59 b5 db 36 67 47 70 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #410 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #410 | rejected packet: | 59 b5 db 36 67 47 70 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #410: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37400cc10 | handling event EVENT_RETRANSMIT for parent state #380 | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #380 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #380 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49678.750868; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00469 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad0280 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #380 | libevent_malloc: new ptr-libevent@0x7fb37c023b10 size 128 "road-eastnet-nonat-128" #380: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #380) | 8c 85 b9 1f be 6e 3d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 1e de d9 e8 4b 77 f1 86 35 82 03 5f ce 7b cb | 0a c9 87 87 aa 3a 74 01 02 fc e1 64 e0 07 7c 06 | dd ed c8 68 23 d7 e1 98 d6 47 ab 77 d0 38 d7 b3 | 2e d4 c4 52 2d e3 2c bc 34 35 8e 16 9e 83 9d 76 | 9f cc 43 a2 24 c5 ff 0f ed 32 bf e5 c9 3b bb e7 | a4 cc 2a 54 79 4f 13 6e 29 6d 75 36 6c 87 01 9c | 1f e0 d3 9f 4c c1 24 b9 2b d8 7b fa 2a d1 70 cc | f1 73 67 12 91 0a 83 03 b6 96 60 5a f8 fb a0 1a | 92 b6 0c fb e9 77 6e a8 e9 d4 02 be 0d 82 27 ba | 20 48 7d ed 5d 31 52 4a 59 63 6f 7e c4 3e 2e ac | 5e 97 a4 c4 d3 ae 3d fa a4 3b fb c2 de b4 5c 6c | f2 4a 19 f4 47 5a 00 3f 78 e7 bc 36 32 f4 d0 ce | 7c 2d 58 ca fa c4 cc 95 9e a4 78 b5 2d fd 23 cb | 2a 9d bc 7a 8a bb 88 97 8b fb 82 e5 e3 af 23 95 | 4e ed 5d 7c 45 af c0 e7 bb 20 cb e5 da 63 b4 54 | a8 b6 35 4f 40 f2 02 b1 8a 9f 38 00 e7 8b 27 93 | 29 00 00 24 e9 59 12 f8 16 a7 9f df 69 ae 67 26 | 7d 68 3d f0 e8 95 32 e5 ac 44 49 ce 96 5b 71 84 | 56 84 ec f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 47 26 04 c2 b4 0a 38 20 0b c5 38 | 8f 45 ae 49 d1 6f dd cf 00 00 00 1c 00 00 40 05 | 48 d9 a4 21 0f e8 6e ab 23 f4 84 7b 2a 45 72 13 | eb 6b 5f 3a | libevent_free: release ptr-libevent@0x7fb37401f7f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37400cc10 | #380 spent 0.0864 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c 85 b9 1f be 6e 3d 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #380 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #380 | rejected packet: | 8c 85 b9 1f be 6e 3d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #380: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380015160 | handling event EVENT_RETRANSMIT for parent state #425 | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #425 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #425 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49678.757102; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003252 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37400cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #425 | libevent_malloc: new ptr-libevent@0x7fb37401f7f0 size 128 "road-eastnet-nonat-173" #425: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #425) | f7 cf 50 4a 74 06 05 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 92 89 d6 89 4e 50 5f b7 2f 6b 96 d5 81 21 07 | ab 44 17 58 90 1d 7b 64 81 e9 17 d7 bd fe aa 4b | 0a 10 ad 93 a3 c3 87 5f f5 66 29 fb c9 3a c9 b1 | 31 b0 a9 ee c4 90 84 b7 e6 dd 91 e8 75 48 e7 2e | 93 2f d6 a2 f7 4b f6 49 3f d9 f6 d0 5a d6 d1 dd | 4f 9d c2 ed c5 18 e2 07 13 e3 28 e5 ef cc 0a 8a | 3b 35 e0 3e 37 bc 79 9f 2a 04 4a f3 9c f9 c1 fe | 06 93 6a fc 31 07 8c 82 e2 3d 36 5b 4c 64 57 29 | 42 03 5c 40 11 83 46 58 6b 89 40 fb 97 9c 72 d8 | 16 d1 a0 21 3d 63 55 3f 12 ce 3e bc a1 a4 b1 4f | 21 3c 91 be 83 c8 57 a7 2b 28 e1 48 64 02 57 7e | 42 a3 f1 45 48 e1 db 05 2e fb d4 4c 7c 8a 0a 60 | 5f f4 86 80 46 9a e0 d0 18 11 1a 4d bb 7c 02 87 | bf 2e e0 bb 87 e9 5f b8 47 04 4d f1 27 cf b3 29 | 9c 1a d0 ad 05 bc 03 0c 16 0c 3a 7e 72 1b 12 70 | b9 a4 26 8b 78 5c b2 39 ba 99 5c 08 5d fd 0b bd | 29 00 00 24 5f 48 0d c0 35 2d 82 0c 4e 37 c0 2d | fb 4b f1 c7 3e 7f d8 da d2 4b 1d 20 b9 ad b0 f8 | d9 af 0c f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 91 c4 e4 6c ee a0 d8 c3 62 ab 89 | a1 7e a7 1c b9 03 c3 d0 00 00 00 1c 00 00 40 05 | 62 01 4a 70 10 9c f9 53 26 65 4b 23 2c 02 6b 53 | 25 3b 71 4a | libevent_free: release ptr-libevent@0x7fb3800269d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380015160 | #425 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 cf 50 4a 74 06 05 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #425 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #425 | rejected packet: | f7 cf 50 4a 74 06 05 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #425: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0453 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34002a950 | handling event EVENT_RETRANSMIT for parent state #327 | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #327 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #327 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49678.776423; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005511 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380015160 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #327 | libevent_malloc: new ptr-libevent@0x7fb3800269d0 size 128 "road-eastnet-nonat-75" #327: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #327) | cd 66 0f 9c 46 d2 2e 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c e2 6e 06 8e ba 7b 55 21 d6 ce 48 6f 3c 92 70 | 71 57 bb 2e 59 88 d0 8e 2a d9 1e 8b 54 64 af 4b | 40 4b af e2 a4 54 08 ce 78 99 d3 6e a5 bc 7d 40 | 54 45 d2 55 e5 04 88 a7 28 8f 77 11 a3 33 32 44 | c5 c1 f3 8c 73 cd 33 50 64 6e 8a 4a 03 1a e8 56 | 33 98 cb 05 7e 52 cf 35 2c 3c 0a 01 ff ea e2 ad | d8 80 22 71 7e 19 d2 b8 ce 67 79 24 c4 a0 f8 77 | 85 18 5e ad 8e 04 46 41 75 9b 16 af 02 fc dc 64 | 32 2e 9e 96 8f b4 82 0b 80 7e 79 12 22 b3 48 72 | b8 08 60 6b fb b5 54 a6 fa 64 f2 f2 1c f2 68 fd | a8 f7 9c d6 a5 ea 11 63 c4 ae d6 34 f7 8d 1a 64 | d2 72 49 10 16 1e e2 1a 26 c5 f0 ec 34 31 4a 5b | 0b 2e 91 90 5e 8e 26 12 f7 2c b6 7b b5 af 3d cb | 78 d2 30 c7 9f 03 58 c5 3d 03 c3 8e 6e cf 73 42 | 63 93 37 70 63 fa 64 09 ea e3 9b 55 c3 1a f4 3d | f3 be ab 22 fa 6d f3 45 4a 46 ad d5 84 8a f0 a1 | 29 00 00 24 90 b8 80 a5 9c 42 2b 50 2e f5 43 e6 | dc 43 6d 4e b8 ec af ce 7f 78 f5 24 c5 c3 2d 65 | bb f0 87 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc f4 a0 b4 bc 1c 55 2f e9 f9 68 07 | 2a e9 06 2c 8b 87 6b db 00 00 00 1c 00 00 40 05 | f6 e0 64 05 d4 ed 34 7f 04 0a 65 5a 6b 64 eb 2c | 7a ff a7 d3 | libevent_free: release ptr-libevent@0x7fb338023a60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34002a950 | #327 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cd 66 0f 9c 46 d2 2e 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #327 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #327 | rejected packet: | cd 66 0f 9c 46 d2 2e 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #327: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a84000 | handling event EVENT_RETRANSMIT for parent state #187 | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #187 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #187 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49678.809776; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.015544 exceeds limit? YES "road-eastnet-nonat-187" #187: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-187" #187: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #439 at 0x557d46ad22c0 | State DB: adding IKEv2 state #439 in UNDEFINED | pstats #439 ikev2.ike started | Message ID: init #439: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #439: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #439; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-187" #439: initiating v2 parent SA to replace #187 | using existing local IKE proposals for connection road-eastnet-nonat-187 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 439 for state #439 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34002a950 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #439 | libevent_malloc: new ptr-libevent@0x7fb338023a60 size 128 | #439 spent 0.068 milliseconds in ikev2_parent_outI1() | RESET processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #187 ikev2.ike failed too-many-retransmits | pstats #187 ikev2.ike deleted too-many-retransmits | #187 spent 2.31 milliseconds in total | [RE]START processing: state #187 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-187" #187: deleting state (STATE_PARENT_I1) aged 64.017s and NOT sending notification | parent state #187: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #187 "road-eastnet-nonat-187" #187: deleting IKE SA for connection 'road-eastnet-nonat-187' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-187' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 5 resuming | in connection_discard for connection road-eastnet-nonat-187 | State DB: deleting IKEv2 state #187 in PARENT_I1 | crypto helper 5 starting work-order 439 for state #439 | parent state #187: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 439 | stop processing: state #187 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a84000 | in statetime_stop() and could not find #187 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-187 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-187" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-187' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-187" | stop processing: connection "road-eastnet-nonat-187" (in initiate_a_connection() at initiate.c:349) | spent 0.0566 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 439 time elapsed 0.000543 seconds | (#439) spent 0.546 milliseconds in crypto helper computing work-order 439: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 439 for state #439 to event queue | scheduling resume sending helper answer for #439 | libevent_malloc: new ptr-libevent@0x7fb344034470 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #439 | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 439 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #439 | **emit ISAKMP Message: | initiator cookie: | 47 50 75 67 1d 00 52 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-187 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f2 10 e6 27 54 79 a5 06 ab 7b 5d 27 c9 72 11 8a | ikev2 g^x be 8d 9d bf 52 e0 ac e0 58 f4 00 83 0a 18 2a d4 | ikev2 g^x 41 71 ec e9 2e f0 05 ec e8 a2 ec d2 28 ce f8 d4 | ikev2 g^x e5 81 d8 3c 87 bc 89 6a 8b 0a 1a e2 d3 eb 38 44 | ikev2 g^x e6 af 0a 47 aa 17 06 2d e7 33 df 52 16 8d b3 fb | ikev2 g^x d9 67 8e 07 e3 c9 9e 52 cf 8d 56 fb 7c c2 93 d9 | ikev2 g^x 9d 49 6e f0 2c fb ae b5 5c 7d 08 de 63 dc 9b 39 | ikev2 g^x 2d fb 3d b8 63 14 a9 ce d9 19 af ff bb a7 b1 81 | ikev2 g^x 41 c7 41 67 e7 53 2b fa 68 10 a5 13 3f f8 0f e7 | ikev2 g^x 33 85 43 eb a8 54 d5 5b fd f4 a1 1e d5 4f 32 99 | ikev2 g^x 86 f6 ec 22 05 a8 98 ec cb 6f de 01 77 3a 63 2b | ikev2 g^x 85 0f 08 c2 e9 6d 60 39 18 10 c9 3c 04 a6 69 c0 | ikev2 g^x 90 8a 6f 1c 7a 2e 85 ad 4f 29 5f 48 49 12 08 e4 | ikev2 g^x 72 3f d7 cc 42 6d 91 5a f7 f3 7b 44 dc 38 f7 05 | ikev2 g^x b2 bf 70 89 ab 24 52 cd cd c1 b3 61 99 9d a9 28 | ikev2 g^x e2 c4 12 1d de cd 37 64 c2 e0 70 28 45 34 de 67 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d9 2f 24 9b 75 f5 ca 1e 2e 7d f4 06 41 a2 89 f3 | IKEv2 nonce ae c7 ae 61 65 4e 5f 7f 65 dd c2 12 ae ae 3a 01 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 47 50 75 67 1d 00 52 fa | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 bb | natd_hash: port= 01 f4 | natd_hash: hash= 81 fd b4 2f 23 17 b8 9b d8 0c 2a 45 b9 34 13 eb | natd_hash: hash= df 7c 42 33 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 81 fd b4 2f 23 17 b8 9b d8 0c 2a 45 b9 34 13 eb | Notify data df 7c 42 33 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 47 50 75 67 1d 00 52 fa | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f1 b3 a4 02 7a 60 50 36 46 44 d9 88 f9 29 1a 5f | natd_hash: hash= aa 01 32 cb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f1 b3 a4 02 7a 60 50 36 46 44 d9 88 f9 29 1a 5f | Notify data aa 01 32 cb | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #439 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #439: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #439 to 4294967295 after switching state | Message ID: IKE #439 skipping update_recv as MD is fake | Message ID: sent #439 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-187" #439: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.187:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #439) | 47 50 75 67 1d 00 52 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 10 e6 27 54 79 a5 06 ab 7b 5d 27 c9 72 11 8a | be 8d 9d bf 52 e0 ac e0 58 f4 00 83 0a 18 2a d4 | 41 71 ec e9 2e f0 05 ec e8 a2 ec d2 28 ce f8 d4 | e5 81 d8 3c 87 bc 89 6a 8b 0a 1a e2 d3 eb 38 44 | e6 af 0a 47 aa 17 06 2d e7 33 df 52 16 8d b3 fb | d9 67 8e 07 e3 c9 9e 52 cf 8d 56 fb 7c c2 93 d9 | 9d 49 6e f0 2c fb ae b5 5c 7d 08 de 63 dc 9b 39 | 2d fb 3d b8 63 14 a9 ce d9 19 af ff bb a7 b1 81 | 41 c7 41 67 e7 53 2b fa 68 10 a5 13 3f f8 0f e7 | 33 85 43 eb a8 54 d5 5b fd f4 a1 1e d5 4f 32 99 | 86 f6 ec 22 05 a8 98 ec cb 6f de 01 77 3a 63 2b | 85 0f 08 c2 e9 6d 60 39 18 10 c9 3c 04 a6 69 c0 | 90 8a 6f 1c 7a 2e 85 ad 4f 29 5f 48 49 12 08 e4 | 72 3f d7 cc 42 6d 91 5a f7 f3 7b 44 dc 38 f7 05 | b2 bf 70 89 ab 24 52 cd cd c1 b3 61 99 9d a9 28 | e2 c4 12 1d de cd 37 64 c2 e0 70 28 45 34 de 67 | 29 00 00 24 d9 2f 24 9b 75 f5 ca 1e 2e 7d f4 06 | 41 a2 89 f3 ae c7 ae 61 65 4e 5f 7f 65 dd c2 12 | ae ae 3a 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 fd b4 2f 23 17 b8 9b d8 0c 2a 45 | b9 34 13 eb df 7c 42 33 00 00 00 1c 00 00 40 05 | f1 b3 a4 02 7a 60 50 36 46 44 d9 88 f9 29 1a 5f | aa 01 32 cb | state #439 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb338023a60 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34002a950 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #439 | libevent_malloc: new ptr-libevent@0x7fb338023a60 size 128 | #439 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49678.810882 | resume sending helper answer for #439 suppresed complete_v2_state_transition() and stole MD | #439 spent 0.34 milliseconds in resume sending helper answer | stop processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb344034470 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 50 75 67 1d 00 52 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #439 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #439 | rejected packet: | 47 50 75 67 1d 00 52 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bb fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #439: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0a940 | handling event EVENT_RETRANSMIT for parent state #432 | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #432 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #432 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49678.819042; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501066 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #432 | libevent_malloc: new ptr-libevent@0x7fb344034470 size 128 "road-eastnet-nonat-180" #432: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #432) | 9e 5c f1 81 be b3 cc bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 a7 44 cc 56 0f 1f a1 57 e9 97 90 cf 04 1e 5b | e0 0e 7b 47 ef c0 b0 6b 28 ba 80 69 c9 1b 38 ab | 77 4e c9 e0 e5 8e ac 7e e2 16 87 36 5e 9c 78 7a | 88 e7 f8 df f3 43 04 06 de 41 bf fc 2c aa 5f 0d | 69 d9 8b 25 79 3a 55 bd c2 56 12 76 16 fc d9 a5 | 9c 10 c0 69 f3 49 ac 1b 12 69 8b 54 81 c5 66 b4 | ce 87 81 ab 4c 4a 3c be 13 a8 a6 c4 c4 ee d3 f3 | e4 6c 08 82 35 56 98 d0 52 0e 3c b5 9f cf 94 45 | b1 ff 7d 1f 92 70 cf 8e d1 c1 37 a6 37 65 ee ce | 20 a0 2f 74 83 20 8b e8 b7 59 69 69 3d 2e af d9 | 5c 5b c8 f5 d1 97 f9 58 4c 4b b5 5a 72 21 7a ff | 15 e2 cf de 63 20 f5 1b 33 44 6d 86 26 89 fe a9 | ef 26 23 fc 07 42 35 ac 53 4d 00 7f 36 93 50 78 | ef 61 a9 fd 99 64 73 27 a0 12 f0 71 a5 ef 01 e0 | f5 fa 65 6f 20 9b da c4 8d 30 72 f1 87 a2 6d e6 | e6 3b 2c 57 3c e1 2d 99 93 66 b2 b3 c7 c3 45 c6 | 29 00 00 24 97 c3 cd 2d d6 91 ce 3c 3a 10 07 b4 | 90 19 a9 e3 82 ea 52 87 8f 88 50 41 d4 a6 e1 e6 | 2e 3c 74 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b b0 51 e2 58 5c b1 15 1d eb ed 97 | 2a 88 5d 96 2e c9 a1 f8 00 00 00 1c 00 00 40 05 | 78 1a 23 ab e8 fa 74 f8 b4 b9 8c 5c d8 d3 f5 f5 | 1c a1 eb 5a | libevent_free: release ptr-libevent@0x7fb3700180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0a940 | #432 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e 5c f1 81 be b3 cc bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #432 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #432 | rejected packet: | 9e 5c f1 81 be b3 cc bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #432: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38800feb0 | handling event EVENT_RETRANSMIT for parent state #411 | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #411 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #411 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49678.824324; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002569 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0a940 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #411 | libevent_malloc: new ptr-libevent@0x7fb3700180b0 size 128 "road-eastnet-nonat-159" #411: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #411) | dd dd 24 eb b8 cb 50 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd cd 4b b5 b6 e7 18 30 d4 d0 8e 83 03 53 e6 4e | 8d 99 24 ba 33 2f 0c bd fc e2 e9 0d 81 68 aa 7b | 12 93 68 9f 91 0d c2 fa e1 b9 83 26 f0 5b 9b dd | 51 e3 9e ed 34 ea 5f c9 93 72 24 b6 bd 13 cb 5c | 26 fe cc 72 6c e7 c6 21 ed 4e 14 b2 9f a3 3b 3c | 94 f8 1a 98 76 bb 57 e6 0d a9 bd 26 b1 18 3d 50 | 59 31 42 4b 06 7d ba db 70 1e 1c ae a8 d8 de 3a | 81 ee 27 6d 40 cc 4d 6a 4b fc 36 c4 b0 3a 09 0b | 48 47 43 74 dd e5 cb 90 df 6e e3 46 c3 6c 8b 97 | f3 25 7f d4 fd ec f5 56 ff 6b 80 d1 67 dc c0 79 | 70 cf 38 a2 35 5f 37 c9 04 ae 98 e9 6e f3 26 d3 | 47 94 bb 03 5d 71 7b 87 ad 54 4b 93 a3 b0 71 8f | 5f 69 b0 8d 69 3f e2 c0 02 32 57 3f 64 cb 19 71 | 58 00 09 d8 ce 8f 64 c9 55 9e 7c 00 26 28 eb f7 | 6f eb 0e ab 01 fb ae c5 0f da bd 30 07 46 c2 b0 | 5c ea 05 eb 2d 3f 40 91 20 c1 a3 5a 4f 86 98 86 | 29 00 00 24 a3 6a 54 81 57 a4 87 e3 a7 7a 68 dd | 8e 44 5b 6e 2b 5e f0 9a 3e c5 72 e8 17 f4 34 1c | 65 bd e7 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f a2 a7 20 75 c6 9d 9f 5f af fe db | d7 0a 3e e1 5c 28 6c 20 00 00 00 1c 00 00 40 05 | 37 57 74 7e fa 8f cf 8f 09 51 1f a5 a7 dc 5e 89 | 60 7b 2d b3 | libevent_free: release ptr-libevent@0x7fb384032b00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800feb0 | #411 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd dd 24 eb b8 cb 50 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #411 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #411 | rejected packet: | dd dd 24 eb b8 cb 50 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #411: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358017ea0 | handling event EVENT_RETRANSMIT for parent state #426 | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #426 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #426 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49678.827628; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002811 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800feb0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #426 | libevent_malloc: new ptr-libevent@0x7fb384032b00 size 128 "road-eastnet-nonat-174" #426: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #426) | 9a cd 73 8e 7d d4 98 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 8c 97 9a 7b 25 95 00 9a 77 62 32 ef ca 9f d6 | 76 8f c1 1d 7b f7 f1 fd 6f 49 39 37 2f 63 23 81 | 71 66 7a 84 28 0c 71 94 62 69 ce 59 2d d7 c5 69 | 55 1a 91 d5 7e 6b 73 77 b1 63 3d e2 98 99 4c 7d | 88 69 a7 7b 5e bc cc b8 0e b3 73 c2 2e 32 ae 8e | 86 79 03 81 0b 4c 54 b4 73 a6 e2 6e 97 ca 67 d3 | 85 98 35 01 61 ca 66 d6 14 1b 0e ed 3a 29 6c 85 | ba 28 d6 d7 db e6 44 77 a6 ce 5b 46 99 7c a1 df | 78 8d f1 17 d8 0f f9 ea 99 30 fc e2 cf b2 41 e0 | b2 47 0b 49 32 f7 03 99 56 d9 28 c3 7a 54 f6 02 | 19 cd 98 7b 73 22 d4 cd 39 3f 7a 0d d8 d7 cd a6 | 8a 6b 30 16 cd 73 f2 96 6c 21 9f bd 4e e5 1b e4 | 55 08 4d 75 fb 1c cb 36 33 b5 70 97 3d ae 1c 0b | fd 17 d6 8a db a7 4c eb 93 47 b3 25 b1 c8 9d b9 | 3c fc 99 0e e7 eb 29 07 c1 90 16 1e 24 76 3c e1 | f0 b6 2f 6d 76 8c 81 1b 13 f1 8a 90 f5 6f 06 29 | 29 00 00 24 9e 79 2e b7 2a 97 cc 4e 5e 3a 53 a1 | 14 f4 9d f2 e0 f1 3a 21 7a b3 38 2d 77 ac 99 ad | 8b c3 54 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 36 a3 f8 78 1e 60 6d 59 1a 44 b3 | 39 63 64 a7 a1 bd a5 d0 00 00 00 1c 00 00 40 05 | 8b d1 e6 ab 49 4a f3 b9 19 1d c0 80 f7 d0 cb 97 | 3f 74 7f 21 | libevent_free: release ptr-libevent@0x7fb35802ed90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358017ea0 | #426 spent 0.0888 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a cd 73 8e 7d d4 98 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #426 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #426 | rejected packet: | 9a cd 73 8e 7d d4 98 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #426: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a32290 | handling event EVENT_RETRANSMIT for parent state #381 | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #381 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #381 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49678.83588; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004343 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358017ea0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #381 | libevent_malloc: new ptr-libevent@0x7fb35802ed90 size 128 "road-eastnet-nonat-129" #381: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #381) | 1e fb 19 74 69 81 f6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 15 4d 3c 26 b9 8e 71 c8 4c 65 3c 93 c4 f8 5c | 0c 69 48 07 1f b0 40 db 39 45 4f 12 5d b7 64 ce | f6 36 76 d1 4f f2 c3 d5 d1 3f c7 4e dd 69 ef bd | 2e 06 de 7f fb 43 32 b5 94 31 7c 96 1c 09 3c 05 | c9 f9 e9 6e f6 32 3d b2 3f 7a 40 e8 05 db 42 df | 50 a9 3b 1b be f2 2b d2 43 70 99 24 25 7e b9 8b | 88 12 28 70 28 9b b9 5b b0 6d 48 da 44 23 6b 4d | 59 ff ee 67 e5 c7 db c0 7c 7f a2 4b 21 92 3a a1 | fd 14 25 80 1a 91 48 40 e9 5b 63 e7 84 7c b3 99 | 02 c6 5d 6d b6 28 24 98 77 5e dc c9 be 98 c3 d6 | b6 bc 7a bf 31 81 8d c7 ba a9 27 81 82 5a 2f b7 | 23 3d 16 95 ba b5 4a 07 29 09 4c 3e c5 38 81 20 | 6c 0f d0 d6 67 62 46 f9 bc 6b c6 8e 7d a5 ce 50 | f1 0f 9a 64 d5 01 da 1f 72 e3 1b 16 9a ec 02 45 | ef 03 20 b4 4d cb ac e4 80 48 13 be cc c9 5e 11 | 9a f4 a2 21 ee 6b 6d 92 17 77 1f 86 a2 bd ac 89 | 29 00 00 24 5b c1 91 12 e1 44 84 05 fe aa f1 fc | b1 6d 8f ce 01 29 aa f2 75 b6 aa e9 3c cb db 81 | 72 99 63 d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 78 cd 6f 27 81 4c 4a f4 57 06 82 | fb 0a 60 ad 54 dd e0 6c 00 00 00 1c 00 00 40 05 | 73 d8 f7 cb c0 0b a5 77 76 9f 97 28 b6 7f a1 0e | 85 3a 80 ee | libevent_free: release ptr-libevent@0x7fb36402e9b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a32290 | #381 spent 0.0967 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e fb 19 74 69 81 f6 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #381 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #381 | rejected packet: | 1e fb 19 74 69 81 f6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #381: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a92f80 | handling event EVENT_RETRANSMIT for parent state #328 | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #328 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #328 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49678.843097; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005074 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a32290 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #328 | libevent_malloc: new ptr-libevent@0x7fb36402e9b0 size 128 "road-eastnet-nonat-76" #328: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #328) | 3c ba 5b c8 fc 4e e4 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 98 1b 56 d7 72 9f 0b ef 82 c1 96 52 5c 5c 9b | e9 aa b3 20 9c 71 f6 1f 7d 62 5f 32 20 71 40 58 | 1c 09 5f be 66 e2 fb 32 6f 32 7b d3 d9 05 2e a9 | ee af 44 08 4c 92 7f 63 3f 26 57 99 85 eb 91 d7 | b7 5a 96 3e 98 ed 26 ea 09 8f 0f 63 53 5d 1c b3 | c9 fb a7 17 72 50 1c 89 8a 1b ec e3 c6 13 99 f4 | 47 85 27 9f 89 00 ee af f6 42 8e 89 20 65 b0 94 | dc 96 45 50 6a fc 55 91 2d 20 a1 71 bd 13 2b 3d | c9 ca ac 78 35 01 26 cc e0 d8 0f 8b 0a 51 cf db | a4 5f b8 de 1d ef 44 4c 67 d2 41 0a 1a da 75 49 | 8b 5c 8d d5 4f ad 96 01 a7 81 6e 64 71 33 1d 13 | c8 f5 a7 cf 94 c9 e6 53 e2 b0 78 13 10 0b c7 61 | e7 11 09 49 e7 5c 3e 3d 81 8a d4 ca 33 cf 4b a6 | 11 a6 1c 3a 1f 08 75 b7 9e 2d 0e 59 2f 13 2a 60 | 81 d0 25 c3 cb 2c 46 fb 68 09 64 52 0e fa 74 b3 | e7 5b 92 47 85 91 91 a7 8f 24 50 93 20 2b b2 73 | 29 00 00 24 bd 04 20 dd 74 64 b5 d8 5a af c3 c3 | 73 08 e8 87 3d 68 41 83 2a a2 ff d2 47 06 97 0f | ee 80 ed c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f8 b1 65 26 56 ad 9d 5c eb eb 90 | 0c 0f 05 c7 3a 68 b0 36 00 00 00 1c 00 00 40 05 | a1 90 c1 14 1b 7b 06 99 a6 d5 54 52 02 f0 92 56 | c7 13 ca 30 | libevent_free: release ptr-libevent@0x7fb34c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f80 | #328 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c ba 5b c8 fc 4e e4 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #328 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #328 | rejected packet: | 3c ba 5b c8 fc 4e e4 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #328: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0509 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aeb540 | handling event EVENT_RETRANSMIT for parent state #412 | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #412 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #412 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49678.882384; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00357 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #412 | libevent_malloc: new ptr-libevent@0x7fb34c03b0b0 size 128 "road-eastnet-nonat-160" #412: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #412) | af 34 f0 93 1d 1b d6 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 73 ca 82 d1 b8 25 7f 04 b5 f2 f7 30 87 a9 41 | a5 4a c9 0d a4 7b 88 6a 9c a7 a5 05 c4 99 82 97 | fe 18 55 31 1a 69 24 11 ef 96 2b 9b 00 09 64 93 | f5 9b 6f 9f 26 02 b8 02 eb ec d6 b9 58 77 37 c4 | 15 13 55 d4 ba a0 8c 70 db 9d 5d b8 50 b2 fb 14 | 70 91 27 3f 52 b9 21 d5 ac 35 9f 2f 74 c2 cd a3 | f5 0a 60 3b 9e 8f df b1 5a c8 44 f1 32 14 8d c9 | 96 70 54 8d 6a b3 1d 9e 55 f7 54 39 be 48 72 05 | 31 be c1 bc a2 b1 92 d9 d7 2b ac 35 4b a3 d1 85 | c8 13 0e 09 13 01 9b 53 39 df da 51 e3 f0 0f b0 | b8 cb 35 90 8d 85 96 9f 9a 47 73 3d e9 c6 9a 9b | 64 e5 27 2a 0d 1b 39 d0 c9 ca 54 89 58 ae ef 63 | 30 57 d5 95 13 d6 7b 07 db 4c 1f 26 15 fc 42 93 | 98 20 27 df a5 2d d6 c3 03 e8 40 00 9e a8 d6 5b | d9 5c 3b 12 b9 90 e7 25 5f 47 7e 86 19 c6 bc 15 | 0b 47 49 10 46 90 3e a8 79 f3 d0 fc 23 1f c9 d1 | 29 00 00 24 a3 90 3f ea a1 9a ff 04 92 34 17 b8 | 6f ef 29 47 17 37 0c c0 67 c5 c5 dd ee 94 92 f1 | d0 ea b7 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 8b 79 f3 42 b6 33 1b 9b 02 cf 5d | 36 ad 4c 1f 32 b9 37 c2 00 00 00 1c 00 00 40 05 | a6 ab fb 7e 68 25 b5 32 b3 ef df 3a 19 eb c4 3f | d0 c1 29 ec | libevent_free: release ptr-libevent@0x7fb37c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aeb540 | #412 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 34 f0 93 1d 1b d6 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #412 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #412 | rejected packet: | af 34 f0 93 1d 1b d6 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #412: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_RETRANSMIT for parent state #433 | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #433 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #433 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49678.890709; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500396 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aeb540 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #433 | libevent_malloc: new ptr-libevent@0x7fb37c035930 size 128 "road-eastnet-nonat-181" #433: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #433) | 23 e1 68 16 6a df f6 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 84 65 c0 62 66 6e cb 40 26 80 c7 11 7a b1 77 | 8f 7b 14 21 bf 47 61 54 80 80 4f 40 4b 14 8f 6c | 7f 20 33 7a 32 bd 20 39 a9 e7 e4 8c 88 5e 71 0c | b4 34 07 ea 3b 74 7a 69 d0 40 c2 8a ce 14 e0 29 | f7 f8 fb 45 30 ce 02 50 b6 4b d6 fe ce bd d7 fd | d9 af 2b 59 d1 37 75 ed 60 7b 97 1e bb b5 21 2d | 82 af 47 6c fd b3 b6 b4 1a e4 0b 54 80 93 91 9a | 7c 67 57 2c 37 bc 4a ba 6c 68 8e 7c 69 ae 25 35 | f6 73 82 3e e0 ba 6e 40 b9 c2 c0 d3 bd 9e 54 14 | 66 2e 22 5d 66 78 db 66 26 82 fa c1 4b 7c 9e 34 | 57 34 cb 3c 56 da ee df b8 34 f8 14 c2 9b 3b a3 | d6 4c a8 fb 55 30 94 15 c4 87 b2 b9 65 70 e9 f6 | 5f 9b ae 28 67 59 78 af d0 1e d8 d4 2a 4a 91 32 | 25 06 fb ff be c0 6a 2f e3 60 0d e2 75 08 92 ca | 55 96 9f 26 37 e4 6c 28 e7 f1 08 78 9b ac 4e 5b | 3b 11 9e bf 95 59 23 96 7a 89 87 42 71 70 51 75 | 29 00 00 24 bc 75 9d d0 ff b6 ae 90 e3 29 fd fb | 27 30 03 9d 8d 6e b5 df cd e3 e0 48 35 b6 7e d4 | 5d 99 20 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 1d b4 53 81 6d 12 3c 62 05 25 08 | f2 c7 73 02 9c 59 76 4d 00 00 00 1c 00 00 40 05 | 9b bb 33 9d d0 7d d5 98 fe 91 d5 bc 36 50 81 f5 | 28 37 64 3d | libevent_free: release ptr-libevent@0x7fb34400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | #433 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 e1 68 16 6a df f6 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #433 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #433 | rejected packet: | 23 e1 68 16 6a df f6 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #433: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0575 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38000f8f0 | handling event EVENT_RETRANSMIT for parent state #329 | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #329 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #329 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49678.902991; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005471 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #329 | libevent_malloc: new ptr-libevent@0x7fb34400cf80 size 128 "road-eastnet-nonat-77" #329: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #329) | 19 44 0d 82 d8 18 b5 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 80 85 65 b3 ae 4b 6e fe 68 73 f2 b6 39 5a b1 | 5a f3 36 2e e0 44 7d b5 ef dd dd fc d0 35 5f bf | 0f f1 a8 56 0e fe 65 1a 64 97 d5 45 02 78 56 12 | 1d c5 a8 57 78 41 5d 67 f5 9c ac 0c ea 30 76 9f | d6 40 74 a9 16 ad b3 48 34 1d 1d 07 41 4e 7d ea | b4 15 07 22 a9 ac 8e c3 4d e5 f2 d1 ad d3 62 0d | 93 58 9b 58 67 7c fc 81 97 3b af 10 63 67 d9 86 | 45 ad 4f a6 97 2e 79 bd 48 03 5d 44 76 7f c4 9f | a3 54 a8 c8 d0 75 76 5f 1b 6c d2 e3 cc 1a fb de | f6 a0 df 0a e9 48 0b 88 3f b0 b9 04 79 1c 8b 83 | a2 11 a4 9f 9b f2 2f 13 89 0d e6 68 c7 78 af a5 | 8d 94 dc 9c 72 14 d9 47 8e b6 09 d8 6c bb 15 13 | 54 68 b1 04 b2 79 ae 72 17 9f ff 8d d0 33 2c 7a | b0 3e e8 0e e9 c9 f6 bd 41 a5 9d 71 93 9d e7 49 | fb 61 fa 0d 56 19 d3 32 c0 8d ba 0e 98 71 48 e0 | 2f 1a 52 9f c2 03 77 7a 8d 1e 4b 1c 30 c4 31 91 | 29 00 00 24 ad 58 5c 32 62 e5 13 15 63 fb 95 0f | de a4 7f f4 a1 1f b7 cf 95 c9 7b a8 76 d2 3e a1 | 6c d4 9d 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 38 9e 59 ae 71 c3 ed 6e 6e 92 c1 | 9f 33 f8 69 87 bc 1f 0c 00 00 00 1c 00 00 40 05 | 49 73 ae f4 7f e8 6a cf 37 86 5a 1d f5 77 0e ad | 19 ee 51 1c | libevent_free: release ptr-libevent@0x7fb3800211f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | #329 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 19 44 0d 82 d8 18 b5 00 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #329 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #329 | rejected packet: | 19 44 0d 82 d8 18 b5 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #329: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8cc0 | handling event EVENT_RETRANSMIT for parent state #427 | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #427 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #427 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49678.9032; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001407 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #427 | libevent_malloc: new ptr-libevent@0x7fb3800211f0 size 128 "road-eastnet-nonat-175" #427: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #427) | 4d cf ce dc 5e 69 0c 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be f3 80 6d a1 4d bc 3b 63 de fe 7b 5d 35 aa 05 | b1 28 d6 19 4f ca c2 b6 85 f2 21 b1 5f ee 7d c3 | e5 4d ce d8 a2 87 47 56 c6 32 a1 9b 66 32 11 d6 | 2a 42 af 5d 8f 34 c5 d5 6c 06 20 9f 03 7a dd 4b | 48 34 c3 3a 83 64 cc cf 03 38 0f 85 e3 77 24 47 | d5 16 ac 4d 8b 47 b5 03 3d 95 eb ea 92 b9 cf 0a | 68 66 89 9f e9 d7 ae 03 3d 64 75 ac c9 d5 b3 10 | de 8f 17 7b 40 ef 37 ec 93 3c cd 2d 80 d3 81 0e | 06 7b 23 ba 8b 61 0c f3 0a da 72 5d 9c fe 2a 86 | bd e9 e7 fc 88 d7 20 01 3d 62 9b 97 2d 52 60 5a | fa 1e fb 14 48 2b da dc c9 bc 30 8f d1 65 96 cb | 33 cf 05 cd 5e fb 63 36 4b e6 22 41 78 36 97 51 | 7d 03 25 93 d8 95 93 1e 55 d3 a5 af 94 2f 9c 8c | 5f a3 40 23 47 68 5e 3a 9d 49 f6 a2 e8 96 cd ae | 14 48 e0 e0 ab cb ce 26 3e 2f 37 d7 ae b6 aa 01 | 36 16 4f df 45 31 cb 1a 1c 34 5e a5 cc 5a a8 48 | 29 00 00 24 fd 8d 8b b7 46 89 9a fa b3 ab b5 e9 | cc f2 e8 c2 d2 52 f8 a0 49 af 7a 94 c3 9c de 32 | b7 d8 84 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9a c6 fd c2 96 5c 57 4c be 19 76 6e | d6 a6 82 da 0b ee 49 1a 00 00 00 1c 00 00 40 05 | 12 be 5a 47 ba 89 37 fe 5c 7b 97 4a 79 4a eb 43 | ad 50 1a 96 | libevent_free: release ptr-libevent@0x7fb36404b5a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8cc0 | #427 spent 0.0706 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d cf ce dc 5e 69 0c 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #427 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #427 | rejected packet: | 4d cf ce dc 5e 69 0c 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #427: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0372 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35804b810 | handling event EVENT_RETRANSMIT for parent state #382 | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #382 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #382 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49678.904424; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004564 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8cc0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #382 | libevent_malloc: new ptr-libevent@0x7fb36404b5a0 size 128 "road-eastnet-nonat-130" #382: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #382) | 8a a7 de 77 ff fe 00 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 1e 05 01 d3 c0 50 0e 07 5a f5 6c 2a f3 ca c5 | f5 6b b5 ce e5 2d 0d 22 8a 9d fc a1 92 f1 21 88 | fe 80 af 87 07 4e ac cb 0e 4c 2f 1f 7c 09 ad 56 | 27 1d 20 e6 ec e9 94 a7 13 47 77 6d 93 7b 8b 31 | 4c 98 f5 11 b5 9a 38 64 29 ba c8 d0 2f a9 37 ca | 1d 9c 45 27 41 6d 78 24 2b 30 7d 43 66 5f da 35 | 99 0b ee f7 a5 dd a9 e7 24 b7 2c 27 c3 b8 3c 38 | 22 f4 c4 26 23 91 a1 6d a7 03 90 dd c7 47 8b e4 | b9 30 db 10 7a b0 86 55 91 13 ed 5a 5c 50 c6 55 | 38 6b 0d bb 7c d6 67 e7 99 0a 0d 7c c8 3b f2 93 | 43 b8 a6 1e f0 04 5a 66 ab 2b 76 49 15 e4 be b6 | e3 ab 9a 84 5b 45 f3 99 3f 3d 94 3a 7f ba c6 2d | c0 e5 16 1f a9 0e c4 b3 c7 a8 37 c7 df 60 6d b0 | 90 7f 5b 83 e7 16 35 cd f8 80 7e 6b 4c 50 19 23 | 8a a3 35 38 cd 8b ef 81 d2 24 34 89 61 4b 37 2c | a1 bc 48 55 f5 65 06 2e e7 6f b3 a0 6e 02 6c 89 | 29 00 00 24 7c cd b7 56 1d 0f 15 7b 08 97 8c a9 | df 91 53 e0 6a 88 48 cc 4c b6 8e 33 b3 57 e0 e8 | 1c 04 d1 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 58 61 cb 76 cc c4 93 e8 81 4f b3 | 54 86 64 27 f4 77 87 8f 00 00 00 1c 00 00 40 05 | 27 d0 5f f0 83 ae a8 e6 f3 e6 a6 2d bb 57 f3 83 | 78 36 b0 95 | libevent_free: release ptr-libevent@0x7fb36801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35804b810 | #382 spent 0.0852 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a a7 de 77 ff fe 00 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #382 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #382 | rejected packet: | 8a a7 de 77 ff fe 00 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #382: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c00d120 | handling event EVENT_RETRANSMIT for parent state #188 | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #188 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #188 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49678.92365; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.014224 exceeds limit? YES "road-eastnet-nonat-188" #188: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-188" #188: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #440 at 0x557d46ad3880 | State DB: adding IKEv2 state #440 in UNDEFINED | pstats #440 ikev2.ike started | Message ID: init #440: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #440: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #440; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-188" #440: initiating v2 parent SA to replace #188 | using existing local IKE proposals for connection road-eastnet-nonat-188 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 440 for state #440 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35804b810 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #440 | libevent_malloc: new ptr-libevent@0x7fb36801d920 size 128 | #440 spent 0.0674 milliseconds in ikev2_parent_outI1() | RESET processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #188 ikev2.ike failed too-many-retransmits | pstats #188 ikev2.ike deleted too-many-retransmits | crypto helper 3 resuming | crypto helper 3 starting work-order 440 for state #440 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 440 | #188 spent 2.68 milliseconds in total | [RE]START processing: state #188 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-188" #188: deleting state (STATE_PARENT_I1) aged 64.016s and NOT sending notification | parent state #188: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #188 "road-eastnet-nonat-188" #188: deleting IKE SA for connection 'road-eastnet-nonat-188' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-188' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-188 | State DB: deleting IKEv2 state #188 in PARENT_I1 | parent state #188: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 440 time elapsed 0.000593 seconds | (#440) spent 0.593 milliseconds in crypto helper computing work-order 440: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 440 for state #440 to event queue | scheduling resume sending helper answer for #440 | libevent_malloc: new ptr-libevent@0x7fb33802ee40 size 128 | crypto helper 3 waiting (nothing to do) | stop processing: state #188 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c00d120 | in statetime_stop() and could not find #188 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-188 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-188" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-188' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-188" | stop processing: connection "road-eastnet-nonat-188" (in initiate_a_connection() at initiate.c:349) | spent 0.0769 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #440 | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 440 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #440 | **emit ISAKMP Message: | initiator cookie: | 59 19 97 9a e3 8b 77 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-188 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 28 57 86 98 5b 96 d3 77 6a 73 d3 f1 79 83 3d b1 | ikev2 g^x 25 c0 29 5c f0 c3 a2 69 ec 6a e3 4d 6f cd 0b d7 | ikev2 g^x 79 9c cb d7 34 fa 78 1e b1 98 79 da 0f ac 84 e0 | ikev2 g^x 73 c1 06 f8 21 3a aa 0a f4 0e 4d f7 bf 24 b0 23 | ikev2 g^x 75 13 78 7d aa 97 d6 f9 8b f1 96 43 1f bc e1 e6 | ikev2 g^x da 7d fb 41 ce 93 49 6e e1 1e f3 c1 41 08 43 3b | ikev2 g^x 3e e8 ed 1f 4e 08 d4 85 64 9e d1 11 dc 50 e9 45 | ikev2 g^x 7f a7 7d f7 2b 35 cf 9a d1 cb 6a 05 4f 83 e6 fd | ikev2 g^x 42 8f 63 21 ff 80 40 b7 e2 26 41 31 52 b6 49 a0 | ikev2 g^x 77 11 47 93 5f a3 3d 9c 1c 0e 6f 2b 0b b6 1d 42 | ikev2 g^x d3 1d 45 13 c6 e8 f2 a5 8e c9 4c 05 0a 08 aa 82 | ikev2 g^x ac e4 27 b7 b2 77 b7 80 38 58 3d 68 92 fd 5e 6a | ikev2 g^x 38 c8 de 6a 08 ae c9 2d 85 13 3c b9 b9 2c 91 48 | ikev2 g^x 64 74 4e 5e a1 07 a6 ff 63 67 43 99 ae 3a 36 0a | ikev2 g^x 11 4e c4 4f 1a ab 97 3f 39 c8 63 d0 49 b4 29 fe | ikev2 g^x 77 df c5 36 12 ae 96 21 4b 67 cf 07 6a b0 e1 5d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 82 fb 4c 4b 30 7b 16 3b 6a c7 2b 62 cc 7b b0 14 | IKEv2 nonce ea 16 0d 74 ad 0f c2 be 8d 39 6e c0 2a 84 9f 10 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 59 19 97 9a e3 8b 77 41 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 bc | natd_hash: port= 01 f4 | natd_hash: hash= 76 37 6d ef 85 b5 1f 0e 28 d0 8a e5 d5 d3 1d e3 | natd_hash: hash= 5f d5 cf 90 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 76 37 6d ef 85 b5 1f 0e 28 d0 8a e5 d5 d3 1d e3 | Notify data 5f d5 cf 90 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 59 19 97 9a e3 8b 77 41 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 72 f1 07 bf 82 38 a8 c2 32 ec a4 d6 59 1b 7c de | natd_hash: hash= 06 08 a2 81 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 72 f1 07 bf 82 38 a8 c2 32 ec a4 d6 59 1b 7c de | Notify data 06 08 a2 81 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #440 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #440: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #440 to 4294967295 after switching state | Message ID: IKE #440 skipping update_recv as MD is fake | Message ID: sent #440 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-188" #440: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.188:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #440) | 59 19 97 9a e3 8b 77 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 57 86 98 5b 96 d3 77 6a 73 d3 f1 79 83 3d b1 | 25 c0 29 5c f0 c3 a2 69 ec 6a e3 4d 6f cd 0b d7 | 79 9c cb d7 34 fa 78 1e b1 98 79 da 0f ac 84 e0 | 73 c1 06 f8 21 3a aa 0a f4 0e 4d f7 bf 24 b0 23 | 75 13 78 7d aa 97 d6 f9 8b f1 96 43 1f bc e1 e6 | da 7d fb 41 ce 93 49 6e e1 1e f3 c1 41 08 43 3b | 3e e8 ed 1f 4e 08 d4 85 64 9e d1 11 dc 50 e9 45 | 7f a7 7d f7 2b 35 cf 9a d1 cb 6a 05 4f 83 e6 fd | 42 8f 63 21 ff 80 40 b7 e2 26 41 31 52 b6 49 a0 | 77 11 47 93 5f a3 3d 9c 1c 0e 6f 2b 0b b6 1d 42 | d3 1d 45 13 c6 e8 f2 a5 8e c9 4c 05 0a 08 aa 82 | ac e4 27 b7 b2 77 b7 80 38 58 3d 68 92 fd 5e 6a | 38 c8 de 6a 08 ae c9 2d 85 13 3c b9 b9 2c 91 48 | 64 74 4e 5e a1 07 a6 ff 63 67 43 99 ae 3a 36 0a | 11 4e c4 4f 1a ab 97 3f 39 c8 63 d0 49 b4 29 fe | 77 df c5 36 12 ae 96 21 4b 67 cf 07 6a b0 e1 5d | 29 00 00 24 82 fb 4c 4b 30 7b 16 3b 6a c7 2b 62 | cc 7b b0 14 ea 16 0d 74 ad 0f c2 be 8d 39 6e c0 | 2a 84 9f 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 37 6d ef 85 b5 1f 0e 28 d0 8a e5 | d5 d3 1d e3 5f d5 cf 90 00 00 00 1c 00 00 40 05 | 72 f1 07 bf 82 38 a8 c2 32 ec a4 d6 59 1b 7c de | 06 08 a2 81 | state #440 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36801d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35804b810 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35804b810 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #440 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 | #440 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49678.924892 | resume sending helper answer for #440 suppresed complete_v2_state_transition() and stole MD | #440 spent 0.37 milliseconds in resume sending helper answer | stop processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb33802ee40 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 59 19 97 9a e3 8b 77 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #440 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #440 | rejected packet: | 59 19 97 9a e3 8b 77 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bc fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #440: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23150 | handling event EVENT_RETRANSMIT for parent state #413 | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #413 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #413 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49678.950122; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00404 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33801d710 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #413 | libevent_malloc: new ptr-libevent@0x7fb33802ee40 size 128 "road-eastnet-nonat-161" #413: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #413) | ea 46 85 e7 fd 9b ca c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a d6 4a 46 94 c5 0e 81 7d ce e7 15 1a 5a 21 6b | d0 32 15 1d df aa 19 22 73 4c 48 c7 c9 6d a8 93 | 29 7e ec 61 b6 83 c3 69 04 a5 60 f9 c5 35 27 f9 | 44 bf c3 99 38 07 63 d7 db de ef 2b 00 c6 3d 6f | 1e 8f 0f f0 f2 98 90 49 cc c1 d2 86 82 6d 83 07 | b6 cd 6e db a4 2f 05 29 fa 3e e9 09 c5 23 64 57 | 0f 6b 66 2d b4 b3 b3 d2 ea e7 1c 7e 8b 59 ce a2 | 2a db b2 33 4a cb 53 6b e5 06 8d cf 28 1c 31 94 | 7e 79 27 07 12 0f ee 03 55 92 90 46 1e 9e 32 06 | e3 69 6e 6a 21 a6 b6 3d c6 89 df ef c7 fa b0 eb | ab 8c ae 81 fa 71 38 65 08 c6 41 65 64 a9 83 b0 | bc c3 01 a6 3a 68 d2 5d bb 35 97 d0 1e e7 f8 04 | 04 04 f6 ff 5e f9 22 b6 f2 9f 86 d9 b4 ae ee 49 | fd 07 2d 26 52 e7 63 86 cc 1a 6e 7f 04 ad 81 4a | a3 d7 7a 6d 6e 53 1b 65 52 8d 28 da bd 54 d5 04 | 1e 3e 9f 74 3c 77 dc 33 e5 c5 fe 6f df d3 a7 16 | 29 00 00 24 85 87 06 d7 9a bf 7b 07 3a ec 94 d1 | cf f4 5c 33 c2 8f dc 32 29 58 27 3f e4 e5 19 81 | 63 f8 b3 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 20 9c 8e 3c 13 0c 4e a0 e8 24 76 | 9d 56 e7 f6 81 08 36 aa 00 00 00 1c 00 00 40 05 | 3c 55 11 1a b1 a6 35 ac 5d bf b2 4d 0c c0 40 68 | 37 73 05 e6 | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23150 | #413 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 46 85 e7 fd 9b ca c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #413 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #413 | rejected packet: | ea 46 85 e7 fd 9b ca c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #413: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad5900 | handling event EVENT_RETRANSMIT for parent state #434 | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #434 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #434 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49678.961386; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500942 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #434 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 "road-eastnet-nonat-182" #434: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #434) | 68 bd 27 f7 1a 5f c8 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b 8d dc 86 f4 61 cd 63 4f 12 1a 89 63 c0 18 0e | da c1 2f 67 00 48 49 fe 80 58 30 87 77 1f 60 f1 | 91 93 c4 dd 6a 33 66 a0 69 fa 20 95 f6 9a 11 c7 | fd d3 c3 ff f1 0e a6 05 ba 58 f9 c6 b4 81 c1 3f | 58 b5 fa d8 f3 85 c4 ec 19 40 f6 9f ac 5a 0e 85 | ab f8 54 8d ff fd 0f ef d3 5b 98 8a 75 38 18 ce | f2 7b e8 23 92 dc 6c 70 3f 25 92 19 2b 60 a6 82 | 30 c7 b8 84 44 df 82 d3 8a 4d fc 1d 9c e4 51 d6 | 72 15 3a 4a d5 64 0f 79 a2 e3 fa 27 32 de fa 9b | 0a b6 71 85 29 d5 43 a6 b2 3c 95 42 d3 be 1c 80 | e1 df 27 cf e0 47 6a aa 9d f0 da 55 04 28 85 87 | 1e 7a 6c 89 a7 1a 78 3d cf 4e 43 87 8f 82 da c7 | 06 01 34 b1 a1 6a 5d 22 18 fe 03 9e 0d 36 91 39 | 6c bb 36 1a 00 1b a4 da c4 26 ba 72 4d 2a 35 43 | a5 6f 44 e2 75 40 5e f0 90 a9 5a 70 fc 57 4c e2 | 21 84 c8 a9 9b df a7 2e 69 2b 50 04 e1 24 b1 85 | 29 00 00 24 24 e6 ca a8 b3 30 fc 67 22 ff 0b c1 | 23 a4 8f 2a ae b5 6d 78 43 33 67 66 1b 96 07 82 | 43 a1 52 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e1 30 9f db e9 ff d2 de 10 c0 b8 22 | 86 59 ab dc 44 02 05 1c 00 00 00 1c 00 00 40 05 | 2d 24 f4 0c 2e f5 a0 c9 e2 14 db 8f 00 ef 15 a2 | 0d 97 11 53 | libevent_free: release ptr-libevent@0x7fb34c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad5900 | #434 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 bd 27 f7 1a 5f c8 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #434 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #434 | rejected packet: | 68 bd 27 f7 1a 5f c8 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #434: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11680 | handling event EVENT_RETRANSMIT for parent state #330 | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #330 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #330 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49678.963761; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004613 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad5900 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #330 | libevent_malloc: new ptr-libevent@0x7fb34c0300e0 size 128 "road-eastnet-nonat-78" #330: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #330) | 93 2e 75 96 9e d6 58 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 2c e9 0f 22 91 df 5a 5b ae 3a 65 86 ba 44 9c | 65 4a 79 99 b3 fa 29 29 22 63 49 c3 6b 7a c8 2c | a6 64 55 77 51 a1 d2 b5 c5 ed b9 2b d7 c9 de d5 | 1f 04 ca d2 89 15 35 75 d9 05 25 47 aa 0c 65 5b | a8 0c 57 96 31 e9 78 a6 a3 87 ad 68 36 d2 a1 3b | 88 08 f8 2e 28 6b 99 4e 37 3d 68 42 7a f5 6a 2c | 92 3c 46 2d 02 18 a7 c8 61 9b 40 1b d5 74 a6 72 | 61 b0 45 d7 09 4c 08 2d 1e 0e 8d f9 eb 38 be 36 | 94 bc ee 43 6d c2 1a 9d c9 1b 4a 84 b6 50 10 54 | ae 45 14 8d 9a 31 50 76 61 37 da 64 1e 74 bc 11 | a7 13 ed 80 0f 85 3c d8 35 69 89 6d b4 6c ac f3 | 2f 4a 27 55 17 f4 f5 ce 32 75 dd b4 15 0b 7f 61 | e2 87 b3 bb e4 11 66 8c 15 79 6e d9 14 50 70 fe | f5 12 aa 90 f9 25 da 28 bc a5 c1 1c 8f 54 93 e2 | 5b 5a 53 f7 1c 97 4d 5c c4 f6 b5 86 3f 24 5b 64 | c4 87 cd 28 7a 3e ef 9f 68 95 6b f8 95 8d da 08 | 29 00 00 24 a1 af e5 97 d9 f1 9e 6c 80 91 ab 21 | 08 cf 38 0c a4 d3 fb b3 c7 37 98 b4 a4 0d 72 16 | de e9 9d 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 c9 48 f6 82 8f 0c eb 59 3f 42 40 | 18 2f 27 9b ca 1b 0e 80 00 00 00 1c 00 00 40 05 | 3e 48 b8 70 cf c0 9c 35 6c 64 bb e3 c7 5c 5e 43 | 1f 5c 26 91 | libevent_free: release ptr-libevent@0x7fb338048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11680 | #330 spent 0.0866 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 93 2e 75 96 9e d6 58 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #330 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #330 | rejected packet: | 93 2e 75 96 9e d6 58 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #330: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0403 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338018460 | handling event EVENT_RETRANSMIT for parent state #383 | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #383 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #383 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49678.976011; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003949 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b11680 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #383 | libevent_malloc: new ptr-libevent@0x7fb338048a10 size 128 "road-eastnet-nonat-131" #383: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #383) | 8b a9 fc 25 06 93 a1 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 48 8c d9 3d c6 b0 61 39 4e 19 f7 86 b1 e2 c3 | 03 ba 84 78 9c c4 77 a1 7d 57 91 f5 ae c2 ed b8 | 0b 61 98 04 6f 72 68 b3 63 3d b6 20 12 b2 50 10 | 3d 3c 00 1d b9 ab be 72 ac ba 93 14 3b b2 a4 c2 | 8e b0 47 ba 98 bb 5c 2b e4 da 7c 8d a4 4a d6 89 | a4 b6 36 de 0f 18 04 bb fc 9c 28 b5 1a ee c2 7a | 18 c6 24 27 71 17 17 60 ca 39 4e 5f 5b 71 71 ab | e4 cd 79 1b 79 6b 31 46 63 bb cd 82 d7 96 72 86 | 1d fc 72 1c e4 a4 16 04 29 1f 9e b6 3a fd 62 30 | f1 da dd 12 af 8e 61 c7 51 15 f6 a4 66 22 64 42 | ef d3 2c 09 00 94 20 e3 33 79 f3 1d c7 7c 4e 79 | a7 a8 2d ec 91 f0 bb fb ff 6c 89 63 ff 5d a6 dc | 2c c3 c7 01 d9 71 f9 87 28 4c e4 de 91 08 4b 02 | b3 28 ae a1 4d 26 42 63 01 7b d1 2e 68 17 e3 a7 | 0a 0b eb 5c 62 18 33 2f d3 a6 c9 6b 3c a2 aa a0 | f6 fc 0d 55 8c 1d 7c d8 f9 bd 77 28 68 1c b3 05 | 29 00 00 24 c7 43 5d 92 21 cd 92 00 ce 48 5a 41 | bc 51 f7 9c 7c 73 79 39 5d 67 8e 5d 0e b9 e5 ea | f1 7d 01 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 9e 11 98 e3 85 61 70 79 85 31 a8 | 4f a4 76 88 f9 86 57 fe 00 00 00 1c 00 00 40 05 | fb 7f 30 9d 57 51 30 a9 24 b7 71 f5 04 63 5f 8a | f8 68 fc 05 | libevent_free: release ptr-libevent@0x7fb35401fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338018460 | #383 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b a9 fc 25 06 93 a1 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #383 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #383 | rejected packet: | 8b a9 fc 25 06 93 a1 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #383: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350040840 | handling event EVENT_RETRANSMIT for parent state #428 | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #428 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #428 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49678.97622; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001507 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #428 | libevent_malloc: new ptr-libevent@0x7fb35401fd50 size 128 "road-eastnet-nonat-176" #428: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #428) | fb 15 42 71 fe 24 9a a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 50 d4 99 e3 c3 b2 8d 50 f4 55 ae 47 3b 25 61 | 1e c4 05 b1 59 21 46 35 0e 81 55 dd de 7f 65 40 | 00 1a 4e c9 0d 72 6a 7a 8e 31 f2 b8 05 87 95 5f | 92 19 3b d0 26 f7 ef a7 b3 37 5f 37 15 e9 34 12 | 33 cb bc 05 19 62 04 88 c4 b0 11 3c a2 fc 2e a7 | 48 74 27 c5 24 6a b1 84 34 89 1c 11 73 e4 fb e9 | 1b 3e 80 7d 33 32 51 1f 3d 67 11 16 e4 23 05 bd | 3f 72 2d 38 c9 0b 38 c0 12 64 3a 43 5b e7 46 c1 | 2b 7e 29 d4 ef 37 71 a8 e0 71 19 2f a1 c5 6c 53 | 94 fe 4e 57 73 5c 74 b5 d5 7f cc e2 3d a3 30 0d | 02 5c 9d dc 4d a0 93 77 cd b6 58 cb 5c 89 fe a8 | 40 8a c4 11 16 43 cc f4 7d 6e ae 00 27 3a 7c 8c | 12 14 7e db be 5a 42 72 b9 d0 07 1b fd aa 82 51 | 0e fb 68 c6 88 b4 35 6c 93 af 50 1c ff 48 78 d4 | b7 b7 c9 3d bd cb b9 82 34 8d b6 5a ff e7 73 c1 | e0 88 1f 51 42 a1 76 7d 4c 3a 1b 39 03 d3 42 78 | 29 00 00 24 e8 4b ce 8e 1c b5 fd 76 2e 19 5c e4 | 1a 51 b2 57 c5 b9 7b 5b bc c1 c3 17 ad 08 ad 32 | c1 29 cf d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 5a 55 94 7a 84 e5 8b 58 e8 27 7a | 96 44 f5 8a 4c 99 6f 81 00 00 00 1c 00 00 40 05 | 54 c7 00 62 13 8f 45 35 f4 93 09 e0 a0 98 7d 08 | 6e 4a 7d e5 | libevent_free: release ptr-libevent@0x7fb3500342b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350040840 | #428 spent 0.0703 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 15 42 71 fe 24 9a a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #428 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #428 | rejected packet: | fb 15 42 71 fe 24 9a a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #428: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0368 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b06800 | handling event EVENT_RETRANSMIT for parent state #414 | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #414 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #414 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49679.021455; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003505 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350040840 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #414 | libevent_malloc: new ptr-libevent@0x7fb3500342b0 size 128 "road-eastnet-nonat-162" #414: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #414) | 9e d5 a6 6b e9 51 f5 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 17 ff 89 e8 3c 16 16 6a 13 a2 4a 6e d7 58 8c | 31 4a 5d a6 06 21 a0 a1 9e a4 d6 9f 9d d0 c9 ef | 81 a2 6a e5 e1 ce f7 5b 3f cb a3 39 af 4b 00 d3 | 8e ea 93 72 09 07 7e f7 07 70 f1 60 90 61 a3 52 | 45 df 81 dd 3b 9f 90 cc 5a ee 79 3a e6 e9 1c 8f | 3e 5d 20 51 b9 06 0a c7 eb 0e 7c 49 84 44 06 9a | 8a 7d 42 8a 3c 02 e8 20 6f 96 b9 43 e4 b6 78 25 | 2a 47 75 c2 a6 5e 09 93 6e 0a 52 61 7e 11 07 98 | e5 ed 70 aa 1a 26 50 15 8a 10 03 2b 04 12 5a 90 | df c8 9d 86 1f 6a 9b b1 b4 ef a4 64 93 b4 1c b9 | a7 2b 05 40 cd d6 1a ea f2 e2 7e 25 9c 0d 5f 1b | 71 7c a0 ab 46 0c fd 1d 5d c2 80 68 45 9c 03 04 | ba 22 16 f6 4e 43 40 2a 18 55 ee ba be b9 c7 28 | a3 19 30 1c 73 7f 70 9d 56 01 fc 31 bf 29 77 0b | f7 40 78 1c 68 3b 66 2d 2e 5b fb 5d 13 f6 84 1d | 63 eb 8e 4a f6 af 8f 02 43 3a 27 60 08 28 58 6a | 29 00 00 24 8a 22 da 4e 47 50 93 9e a6 73 51 af | 87 1e 05 a5 3e cb 07 7d 69 59 69 03 d3 ed 1d 7a | 33 b5 03 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba fb 8a fc 1d 3f b9 dc ba d7 c2 5a | de ae b7 6f 1b 1d e3 06 00 00 00 1c 00 00 40 05 | 6c ca d3 22 34 6c 0b 0a d6 9b 01 8f e9 fa 8a 7e | 51 47 3d 5a | libevent_free: release ptr-libevent@0x7fb360046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b06800 | #414 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e d5 a6 6b e9 51 f5 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #414 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #414 | rejected packet: | 9e d5 a6 6b e9 51 f5 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #414: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25c40 | handling event EVENT_RETRANSMIT for parent state #331 | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #331 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #331 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49679.028834; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005002 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b06800 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #331 | libevent_malloc: new ptr-libevent@0x7fb360046040 size 128 "road-eastnet-nonat-79" #331: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #331) | 50 44 b2 3a 07 a7 4e 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 5b 7a 1c 65 ca 17 c3 34 09 e9 50 2c 1a 5f 2c | 3f 1f d0 f4 a9 fc a5 0f b3 e0 23 18 36 32 e0 dd | 70 db 2b a7 8a bb 5e d5 7b c1 26 49 ed 17 f5 fb | 41 8c 70 b6 46 13 5b 7c be 72 85 64 1f cb c2 3b | 7b cd ab 00 d1 f5 c6 c8 ef 4e 43 8b d1 3c de 4e | 97 78 da c1 12 64 cb f5 74 cf 7b 2b a9 ae 8b a5 | dc d3 db 70 7b c5 17 1a a0 d8 61 49 40 f3 77 7a | 26 f5 d7 d4 fc a6 3c ec 56 96 bd ad fa da 9d 95 | 6f c7 43 12 03 de b3 4a 54 ca 56 3c b7 a8 38 f0 | 03 5a 39 ab 50 08 22 eb 87 c3 7d 6f ff ac b9 cb | 79 02 42 01 ae 8a 86 1f cf 39 34 00 58 b3 82 70 | cb f1 c5 9a 1b e0 1b 28 e5 0b 30 ab da 32 50 a9 | 39 71 a2 8b c0 a0 38 d2 35 39 8f d7 36 de a3 f4 | 70 e0 8f a8 7e 36 bd e7 03 3e dd 85 86 be 19 24 | 24 d5 8e aa 7b 0a 66 52 ff 44 f1 22 3a 93 2a 43 | b3 e4 83 93 f3 85 5b 68 a3 1b 91 5b 88 3f ae 95 | 29 00 00 24 03 6b b7 f1 e0 d0 ec 2f 89 98 41 7d | af 5d 2c 7f 97 af 10 99 b6 2e fe 6f ac 7d ce 98 | 66 f3 c3 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f b7 eb 6a 1a 1b 78 47 4b c9 5c d0 | 13 11 3d 6a 14 1b 4d ab 00 00 00 1c 00 00 40 05 | 4a 21 a9 91 28 88 ee e6 d7 a3 92 f2 91 f6 75 81 | f6 52 77 56 | libevent_free: release ptr-libevent@0x7fb380043300 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c40 | #331 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 44 b2 3a 07 a7 4e 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #331 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #331 | rejected packet: | 50 44 b2 3a 07 a7 4e 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #331: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1c400 | handling event EVENT_RETRANSMIT for parent state #435 | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #435 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #435 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49679.030234; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501555 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #435 | libevent_malloc: new ptr-libevent@0x7fb380043300 size 128 "road-eastnet-nonat-183" #435: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #435) | 02 95 c8 9c 02 70 ef 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 be 1c 3f a4 66 94 b1 76 a3 9b 53 73 2f 7f 23 | 4a e8 16 a3 16 f5 f7 58 2e fa f9 cc e5 72 42 dd | 79 82 dc a3 32 45 63 e7 97 5f 0c 3f 10 0e f2 af | 36 1e 6e 10 67 9c 3e 6a f7 f3 72 ba 54 df 6c 10 | a0 1c 0f 6a ce 67 71 2a a3 c4 d3 9c 88 b9 f7 04 | 30 84 58 1f bb cd f1 cd f3 e2 04 50 7f cf d2 c2 | 26 c1 1c 97 d9 a2 05 dc 96 89 90 50 ae 56 a0 13 | ef 2a 24 f0 f6 4d a9 8e e9 e9 a2 eb 42 50 42 ab | 0a 3d 04 3e 57 0c 0a e1 00 9d 75 a3 60 15 b7 e8 | 84 24 4c a7 d1 ab 72 3e f4 8b ef 1a c8 cc 7d af | ee 55 f6 12 cd b9 d1 90 77 f0 61 3d 61 12 ee f8 | 94 b3 64 a2 07 62 d6 b1 81 57 84 c9 8b ff 25 ea | 74 4a 3e 9b d6 88 62 0a dc b0 05 5d 90 03 c9 cd | 54 3d 83 cb 36 ad ef 96 f9 28 73 d8 df b8 72 79 | d4 6d 08 a8 b3 a6 c9 bf ea 29 05 5f 61 ed 03 82 | b8 9d e9 c7 c9 a7 67 16 08 0f e7 ba 6a 6d 38 69 | 29 00 00 24 ae 8f 34 92 0a 08 8b 7b 30 37 54 ea | a0 43 df e6 ae f8 bc fe 70 d8 fd fe ce a5 f7 5d | fb 76 aa 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 34 e7 f7 2a 07 1c be c1 53 fb c8 | 09 7a b0 5a 0f 53 bf 3c 00 00 00 1c 00 00 40 05 | 75 09 e1 26 ec 40 37 83 67 2f 03 41 48 5a 4e 60 | ef 86 00 50 | libevent_free: release ptr-libevent@0x7fb388038370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c400 | #435 spent 0.0936 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 95 c8 9c 02 70 ef 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #435 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #435 | rejected packet: | 02 95 c8 9c 02 70 ef 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #435: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7e4d0 | handling event EVENT_RETRANSMIT for parent state #189 | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #189 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #189 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49679.033569; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010675 exceeds limit? YES "road-eastnet-nonat-189" #189: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-189" #189: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #441 at 0x557d46ad4e40 | State DB: adding IKEv2 state #441 in UNDEFINED | pstats #441 ikev2.ike started | Message ID: init #441: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #441: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #441; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-189" #441: initiating v2 parent SA to replace #189 | using existing local IKE proposals for connection road-eastnet-nonat-189 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 441 for state #441 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b1c400 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #441 | libevent_malloc: new ptr-libevent@0x7fb388038370 size 128 | #441 spent 0.0644 milliseconds in ikev2_parent_outI1() | RESET processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #189 ikev2.ike failed too-many-retransmits | pstats #189 ikev2.ike deleted too-many-retransmits | #189 spent 2.55 milliseconds in total | [RE]START processing: state #189 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-189" #189: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #189: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #189 "road-eastnet-nonat-189" #189: deleting IKE SA for connection 'road-eastnet-nonat-189' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-189' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-189 | State DB: deleting IKEv2 state #189 in PARENT_I1 | parent state #189: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 1 resuming | crypto helper 1 starting work-order 441 for state #441 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 441 | stop processing: state #189 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb374024f80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | in statetime_stop() and could not find #189 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-189 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-189" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-189' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-189" | stop processing: connection "road-eastnet-nonat-189" (in initiate_a_connection() at initiate.c:349) | spent 0.0841 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 441 time elapsed 0.000587 seconds | (#441) spent 0.588 milliseconds in crypto helper computing work-order 441: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 441 for state #441 to event queue | scheduling resume sending helper answer for #441 | libevent_malloc: new ptr-libevent@0x7fb388037a30 size 128 | crypto helper 1 waiting (nothing to do) | processing resume sending helper answer for #441 | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 441 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #441 | **emit ISAKMP Message: | initiator cookie: | 51 22 97 d4 f1 aa 56 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-189 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fb 2c c6 09 06 fb 75 c9 7f c8 2c f2 78 2e 86 cf | ikev2 g^x 10 e2 71 84 ec 7a d3 00 3b 70 b4 67 49 a1 3c 4d | ikev2 g^x 21 45 e6 9b ef ae 2b 06 a0 05 7e f8 20 46 fb f7 | ikev2 g^x 0f d4 3c 68 46 a5 74 b1 69 d3 27 26 91 1f fb ea | ikev2 g^x a2 29 d1 d5 ec 8d ba a9 55 81 7c dd 8b b0 d5 f0 | ikev2 g^x 65 df 87 db d6 24 b4 8d 72 d6 b9 0a a2 e0 30 fc | ikev2 g^x e4 5b 51 8c ab 49 74 dc 67 ef 9d ed b7 2a 83 35 | ikev2 g^x e7 01 ba 5c 14 ef fc c4 a3 30 10 68 67 0e 82 16 | ikev2 g^x 7d 82 bc d7 25 ec 2f c1 f6 97 ab 23 a3 9a b0 7c | ikev2 g^x d2 fc 27 3c 76 c0 04 de 3f f1 57 2b 49 24 75 a8 | ikev2 g^x f7 b1 cb 9a 6d 04 c0 ee c6 a3 f0 18 d5 7f 4e a7 | ikev2 g^x 2c 74 2c d5 e8 3f cd c9 69 5b b5 31 78 19 bb d1 | ikev2 g^x 32 75 82 1c 75 29 51 85 94 3b 48 0b 31 5b 51 f5 | ikev2 g^x 93 f5 fc 53 3a 80 c0 7f 4c 5e 8d 4e c5 a0 2e 05 | ikev2 g^x fd c5 76 9f 1a 22 f6 df 9c 77 35 ff d3 0b a0 5e | ikev2 g^x 73 0d 0d 92 2d ee d7 e3 ed 3d 6b a2 54 4a 19 9a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9c 47 e2 58 3f 57 67 62 b6 2e 0d 3a cb 75 8a b1 | IKEv2 nonce 7d cd 2d 8e 6c 75 cc 2c b3 bd 9f b3 c7 bf c7 9c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 51 22 97 d4 f1 aa 56 45 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 bd | natd_hash: port= 01 f4 | natd_hash: hash= 16 c2 f5 08 e1 41 ca c3 a8 c7 5d b8 30 41 e7 b2 | natd_hash: hash= e6 39 d6 66 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 16 c2 f5 08 e1 41 ca c3 a8 c7 5d b8 30 41 e7 b2 | Notify data e6 39 d6 66 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 51 22 97 d4 f1 aa 56 45 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 92 32 df 91 6d 86 4c 91 9f c0 e2 90 d1 aa b2 8d | natd_hash: hash= 1d 5c 17 a3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 92 32 df 91 6d 86 4c 91 9f c0 e2 90 d1 aa b2 8d | Notify data 1d 5c 17 a3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #441 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #441: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #441 to 4294967295 after switching state | Message ID: IKE #441 skipping update_recv as MD is fake | Message ID: sent #441 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-189" #441: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.189:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #441) | 51 22 97 d4 f1 aa 56 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 2c c6 09 06 fb 75 c9 7f c8 2c f2 78 2e 86 cf | 10 e2 71 84 ec 7a d3 00 3b 70 b4 67 49 a1 3c 4d | 21 45 e6 9b ef ae 2b 06 a0 05 7e f8 20 46 fb f7 | 0f d4 3c 68 46 a5 74 b1 69 d3 27 26 91 1f fb ea | a2 29 d1 d5 ec 8d ba a9 55 81 7c dd 8b b0 d5 f0 | 65 df 87 db d6 24 b4 8d 72 d6 b9 0a a2 e0 30 fc | e4 5b 51 8c ab 49 74 dc 67 ef 9d ed b7 2a 83 35 | e7 01 ba 5c 14 ef fc c4 a3 30 10 68 67 0e 82 16 | 7d 82 bc d7 25 ec 2f c1 f6 97 ab 23 a3 9a b0 7c | d2 fc 27 3c 76 c0 04 de 3f f1 57 2b 49 24 75 a8 | f7 b1 cb 9a 6d 04 c0 ee c6 a3 f0 18 d5 7f 4e a7 | 2c 74 2c d5 e8 3f cd c9 69 5b b5 31 78 19 bb d1 | 32 75 82 1c 75 29 51 85 94 3b 48 0b 31 5b 51 f5 | 93 f5 fc 53 3a 80 c0 7f 4c 5e 8d 4e c5 a0 2e 05 | fd c5 76 9f 1a 22 f6 df 9c 77 35 ff d3 0b a0 5e | 73 0d 0d 92 2d ee d7 e3 ed 3d 6b a2 54 4a 19 9a | 29 00 00 24 9c 47 e2 58 3f 57 67 62 b6 2e 0d 3a | cb 75 8a b1 7d cd 2d 8e 6c 75 cc 2c b3 bd 9f b3 | c7 bf c7 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 c2 f5 08 e1 41 ca c3 a8 c7 5d b8 | 30 41 e7 b2 e6 39 d6 66 00 00 00 1c 00 00 40 05 | 92 32 df 91 6d 86 4c 91 9f c0 e2 90 d1 aa b2 8d | 1d 5c 17 a3 | state #441 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388038370 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b1c400 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #441 | libevent_malloc: new ptr-libevent@0x7fb374024f80 size 128 | #441 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49679.034657 | resume sending helper answer for #441 suppresed complete_v2_state_transition() and stole MD | #441 spent 0.31 milliseconds in resume sending helper answer | stop processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388037a30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 22 97 d4 f1 aa 56 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #441 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #441 | rejected packet: | 51 22 97 d4 f1 aa 56 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bd fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #441: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0397 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #384 | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #384 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #384 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49679.037927; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00448 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800f8f0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #384 | libevent_malloc: new ptr-libevent@0x7fb388037a30 size 128 "road-eastnet-nonat-132" #384: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #384) | 86 6f ae 12 4d c0 7a b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d b1 fb 85 46 e4 0b ed 3a 09 27 c9 1d d0 fe 19 | 7a 6b 17 bb 62 8e 54 ac f1 64 67 34 40 ff 38 85 | 4f ff 54 1e 02 a7 af 76 91 63 95 f0 62 9e e7 68 | d4 07 2d a5 05 78 38 e6 00 65 3b 0c 3b 55 b9 34 | 19 27 7d 5e 1b 1f d1 f1 b8 c6 a4 32 36 a3 a1 4d | 77 fc 92 08 8e 44 1c 7b 72 a0 4a 6f ff ad 86 71 | 79 52 e6 49 b1 8f 12 9c 40 bc ec da 58 c7 66 8c | df 54 c1 66 96 41 fb 21 bc f2 5f 23 6c 52 ad 47 | c4 d3 9c 32 fb 09 e2 cc 47 c2 4b 3f 71 c2 e6 99 | 6d b7 94 23 a5 4c 0a 3c be 0e b2 50 04 86 41 e3 | 7a 9c 55 d1 3b 34 0c 3c 9f fd 4c f5 09 73 9f 60 | 56 d6 11 97 6a c5 df ef fe 2f 35 ee 63 fe 39 b0 | 29 b4 b3 01 1b 35 ff 91 b5 b4 bf 86 5f 29 e0 72 | 9b d7 f8 07 0a dc 66 0d 27 38 bb fd d4 42 1b 97 | 0e e9 cb d0 75 c1 5f 7b 20 8d a3 bd 9c d8 be df | 08 8a d8 c8 72 8d 2e 70 0c 78 7d 99 d6 b0 fe c1 | 29 00 00 24 dd a5 d7 0d 86 0a ce 46 70 f7 a4 d8 | 79 8d ab 0d 5a ba 15 d4 6b c1 b8 d3 f7 39 89 32 | f9 a6 bc c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 0a a8 53 d7 f6 23 14 8d 14 98 5a | ec 27 4c a0 59 56 95 73 00 00 00 1c 00 00 40 05 | 5b d2 62 5b 9b b5 2e 9c 89 b9 50 27 01 71 4f 1d | 99 42 bf 80 | libevent_free: release ptr-libevent@0x7fb34800f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #384 spent 0.0837 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 6f ae 12 4d c0 7a b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #384 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #384 | rejected packet: | 86 6f ae 12 4d c0 7a b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #384: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0404 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38000feb0 | handling event EVENT_RETRANSMIT for parent state #429 | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #429 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #429 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49679.066198; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002529 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #429 | libevent_malloc: new ptr-libevent@0x7fb34800f1a0 size 128 "road-eastnet-nonat-177" #429: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #429) | b1 3d 9b 75 e9 17 32 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 58 34 a3 ec c6 75 50 25 fe 5f 41 58 c3 98 5a | 11 1f 83 e4 20 79 02 69 b1 3d ac 82 33 8f 44 96 | e7 d5 9d 7b f3 d7 f5 f1 3c 4b 07 77 e3 30 83 22 | 33 90 f7 d8 39 7d 51 da 1f be a3 9d 27 21 e0 23 | 1c c5 b5 f8 01 28 d0 3f bb de 17 8b 08 3e 77 12 | 3b 7e a1 ef 9e 6d 3b c1 0f 78 3f 7f d4 15 3e 67 | bd d8 07 2d 5c 0a f8 3b 6e 03 96 47 2a 3b ad 8d | fd ac a5 a9 41 55 69 70 54 4f c8 07 46 0f 75 8a | 8e 3a c9 5a 0e 6f 91 97 a2 53 99 02 54 c0 74 38 | 8d d6 59 17 7c b6 f5 96 24 2d 36 88 1b c1 a8 f4 | 9a 2c c6 20 9e 9c 1f 79 b7 b2 e2 28 6d c8 dc ea | ab 6f 81 8f 3c 54 99 e1 b5 ac 7a 7b e2 4b b7 47 | cc 01 c3 58 76 3a 5d 7a 87 5a 60 d6 14 71 21 77 | 7d 56 a9 78 8c 67 16 f3 5f ff 22 ed 4c 9c 08 f9 | b7 a6 81 b8 d7 76 0d 66 ab 45 4e 0c 98 69 dc 04 | 8b a0 74 65 f2 0e e3 59 97 ce 63 09 c5 83 7c 9c | 29 00 00 24 cb 81 79 39 c4 59 07 cd 3c 90 56 3e | 9d 57 79 9f 8d e6 58 24 f4 84 cf b6 0e b6 4d 54 | f8 24 7a fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 94 ea 1e 66 81 07 70 ab d6 5a a9 | c0 a7 0f 24 1b cb e7 a4 00 00 00 1c 00 00 40 05 | 17 95 c4 1b c0 e8 ee e6 7e 70 e4 b9 12 c2 c5 ed | 6f 00 57 73 | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000feb0 | #429 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 3d 9b 75 e9 17 32 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #429 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #429 | rejected packet: | b1 3d 9b 75 e9 17 32 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #429: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0692 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c01d710 | handling event EVENT_RETRANSMIT for parent state #415 | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #415 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #415 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49679.087669; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002687 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000feb0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #415 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 "road-eastnet-nonat-163" #415: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #415) | 65 fc 55 c7 f1 44 1e 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 9b 11 f8 2e b4 b5 c5 30 9b 3d a0 a2 4b 27 41 | f3 d8 72 20 8a 56 0a 05 ca 4d 84 e6 cb f6 3e 40 | 63 3e 65 dc a2 c0 87 47 ce 3b 5e 72 88 1b 50 31 | 15 c5 cf 6b 4a 2f c7 ec 02 24 2b 5b d8 13 58 82 | ef 96 ce cf 1b c6 83 84 dd 4e ef ff 6c f9 de 4b | fa f0 63 3e cd 62 10 03 38 09 9e db 49 54 15 3a | a8 3d 15 df b8 ef fb f6 60 02 a0 d4 fd 2e 9b e9 | ce 3a 0e 92 13 6c 3b 4e d2 2c 44 8a 4a 9a 05 6f | c3 bf 63 16 b0 c4 63 88 ff 02 84 93 54 65 74 42 | 97 c9 d1 95 9c 76 cf c6 11 6e 97 99 50 ea 6c f5 | 6f f0 5c 9c c9 57 a9 e3 41 19 f6 b0 38 a3 e5 ef | 84 44 8a 93 ae f1 ef 1d 2e 53 2b d3 a8 41 d5 27 | 64 64 ae fa 1d fd ea 61 22 f5 cc 34 a6 a2 ea 37 | 88 8a b9 05 5f 00 cd a9 3b c3 f2 31 36 31 fa 53 | 3d ba 7c f3 35 4b 65 ab 19 3c 20 1a b3 c4 2a ca | f4 c6 08 71 62 bd 13 1a f6 9c 40 a8 5d ea 27 a8 | 29 00 00 24 e8 b8 58 d7 ae 38 da 44 20 ee 1e 02 | 80 cb 41 b6 8f 71 2c 96 9f ff be f1 a6 fa a0 4e | 6d 67 74 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 e0 03 d8 e5 8b 46 47 10 2c a8 6c | 82 9e b3 1d 1e 26 96 28 00 00 00 1c 00 00 40 05 | bb 40 b0 02 70 34 84 30 58 79 6d d4 87 e5 1d 82 | 6b ed a6 65 | libevent_free: release ptr-libevent@0x7fb36c02ed30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c01d710 | #415 spent 0.271 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #332 | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #332 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #332 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49679.08799; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004657 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c01d710 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #332 | libevent_malloc: new ptr-libevent@0x7fb36c02ed30 size 128 "road-eastnet-nonat-80" #332: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #332) | f6 c6 d2 5e ba a8 2a f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 1a 55 0f 26 2f b6 a0 08 51 81 5d b7 71 b9 2d | c5 80 10 57 cc 9f 39 cd 78 f5 33 cd 29 d9 74 2d | fd fd 10 79 da 5f 98 34 d3 3d e4 28 2e 71 42 b8 | 31 90 4d 52 c2 47 b7 94 df 57 9e 16 03 38 42 c0 | 07 fe 24 67 18 0a bc 2f be 06 80 3f 3f 52 ae de | ee ce 07 d7 03 01 92 16 62 42 5c 77 dc 87 62 e2 | 3a dd 16 7d 8f 37 3d c8 ba 22 d8 ef 9b 9d 2a 3d | e0 2c 5c 39 14 07 d4 e9 80 bd 41 35 a2 65 f5 06 | d6 66 0e 9c 09 15 5b 2c 90 ec 66 68 2a aa 32 c8 | f4 e9 0e 83 19 df 87 aa b7 d2 50 b1 70 7c e8 1d | 69 9d 8f db 7f c7 e2 b0 71 77 37 93 72 6b 02 1f | ff 20 a4 e2 5f 72 65 e8 93 2e 78 8f 02 5c 26 b8 | d6 41 94 30 c6 30 1d fb 21 2d 70 c7 a4 c4 37 64 | d1 d0 93 45 ae 86 94 3c ef 88 96 54 5d 14 dc 13 | 82 20 c0 68 d6 ce 1b eb 97 51 ea 00 31 01 9f 99 | 9c 00 ca 7b c6 e3 21 ad 8a 48 45 1f d8 69 47 47 | 29 00 00 24 92 2b 4a ab c7 31 ef e2 7b 94 b4 08 | 46 bc 96 1f c5 de 4e 6b bb 45 28 4b ff e0 00 6e | 79 8b 88 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 fd 6f fe 83 1d 32 21 59 ad 4f 6d | 1b 98 f5 b3 09 7a d7 45 00 00 00 1c 00 00 40 05 | f2 d1 58 ca ab 44 6f 50 93 d1 3e f5 88 73 05 cc | 3b a4 3c c0 | libevent_free: release ptr-libevent@0x7fb3700251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #332 spent 0.287 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 fc 55 c7 f1 44 1e 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #415 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #415 | rejected packet: | 65 fc 55 c7 f1 44 1e 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #415: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.17 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 c6 d2 5e ba a8 2a f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #332 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #332 | rejected packet: | f6 c6 d2 5e ba a8 2a f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #332: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.122 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34000f1f0 | handling event EVENT_RETRANSMIT for parent state #436 | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #436 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #436 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49679.089826; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501022 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #436 | libevent_malloc: new ptr-libevent@0x7fb3700251c0 size 128 "road-eastnet-nonat-184" #436: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #436) | cc d9 b7 db 44 05 84 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 3c 80 f9 ec ce 19 79 1b 2a 4e 88 36 86 a9 d8 | 85 e2 ee 1a ce 49 16 7b 84 5e 31 fc e1 84 f2 62 | 83 ed 4d eb 9f 6a c2 85 84 04 f4 d9 bd aa ee 02 | 08 1b 87 fa b5 ac ff f6 a9 3e 63 6d 16 01 77 f5 | 2b 3e 1b 6e c7 66 ff fb 38 8c 19 c9 7b b1 fe 10 | bc 5c c8 26 33 9f ff 45 76 a0 23 85 19 e3 31 de | 28 8c dd 45 56 45 3b fb b4 0d 18 e3 cd 81 8e 00 | 0b f6 17 10 a2 e0 44 20 37 74 e1 31 a8 10 b7 14 | cf 9a 72 a5 9f 1a 4b 15 1a b2 c9 bb 99 44 1e 31 | 11 05 e2 cf 98 40 c9 ef aa 8c fe 19 58 f6 d5 62 | cf d6 d5 ea 4e 24 4c 33 16 1d 0c db 05 43 98 5e | d3 1a 94 c0 4b ed 3c 02 54 4b fc ca 99 42 ac 4b | fc 8a 3c 6f 70 38 23 05 eb da 77 20 a0 4e 73 f3 | af d2 c3 64 0d 77 b8 54 17 69 4d 1e a8 53 83 4b | 8b 72 92 0a 4d 90 87 b2 56 ec 43 2c 41 d7 64 66 | 71 79 54 ef 65 56 ba 6d 1d e6 d1 dc ad 99 41 fe | 29 00 00 24 a3 ee 0b 44 35 bf 27 26 10 74 6f 1a | d2 86 21 80 e6 fa 2e 6d 1e 83 9b 58 c8 96 87 8e | e4 1b 77 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 51 98 88 78 46 d0 e6 54 3d 62 ae | 5f a3 54 6d d3 39 61 c5 00 00 00 1c 00 00 40 05 | f1 9f 10 2a 1c da 5a 4c b5 8c 1e 6e 78 d5 be 31 | 9e a0 0c c1 | libevent_free: release ptr-libevent@0x7fb34001e520 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000f1f0 | #436 spent 0.402 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc d9 b7 db 44 05 84 19 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #436 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #436 | rejected packet: | cc d9 b7 db 44 05 84 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #436: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.232 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c012bf0 | handling event EVENT_RETRANSMIT for parent state #385 | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #385 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #385 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49679.101767; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003921 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000f1f0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #385 | libevent_malloc: new ptr-libevent@0x7fb34001e520 size 128 "road-eastnet-nonat-133" #385: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #385) | dc 0d 67 a5 b0 49 95 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 d2 87 4f 28 1e d2 9a 8d 89 1b 83 29 19 de f5 | e6 63 09 2d e2 e9 61 46 d1 7b 1d 91 3c 38 a6 0f | e9 63 cf 58 08 13 3f 3e 7d f1 19 3d 13 fc 34 b5 | 18 8a e7 0c f9 3c 2c 71 b0 34 a4 05 97 a5 9f c7 | 97 d1 e4 25 37 22 ef 17 fb 52 35 c9 4f 1f 26 16 | 3c 2a 1f 00 10 3c df 46 38 33 44 5d a6 92 e5 d5 | 69 68 b5 76 06 e3 77 b8 1e 01 65 43 01 c9 86 ef | da 65 a5 1f 57 b0 00 8a de a9 34 23 2e 5c 26 a6 | a0 7f 44 a7 f5 75 dd 87 e1 fa 95 ca ff 5e 20 3b | 92 ff 19 e9 6e 3b 74 90 7d f7 38 58 ce a4 6e 3e | 22 98 35 57 a7 19 32 26 90 4e 72 85 8e fc 44 0f | e3 30 88 10 65 63 68 a3 81 e7 a5 04 d1 cf 06 2d | 36 a6 35 6b fb 1a c6 21 82 6b b4 50 a3 0b 89 0a | 70 f4 46 4d b9 30 8c 1b 9a a3 3e a4 57 bb 51 f0 | c0 0a 2a ca 36 ae b3 f0 02 3c c8 b5 bb 6a 7b 96 | 55 84 4d bb 15 b3 47 cf cd 45 3c 4a e8 4b 8f 89 | 29 00 00 24 90 a0 a9 10 09 5c 84 13 2a 39 8b 57 | c5 67 7f 3e 0b 64 03 36 1d 0d c2 a2 27 b3 44 c5 | 83 b2 09 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 9a 97 66 55 a8 9e d7 24 ff 14 54 | 09 c0 45 ac a1 60 51 9f 00 00 00 1c 00 00 40 05 | da 5c 4e 27 00 47 9e f2 1c fc 63 30 21 b4 79 d8 | 3b 38 4e b8 | libevent_free: release ptr-libevent@0x7fb34c014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c012bf0 | #385 spent 0.583 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 0d 67 a5 b0 49 95 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #385 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #385 | rejected packet: | dc 0d 67 a5 b0 49 95 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #385: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.314 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90400 | handling event EVENT_RETRANSMIT for parent state #190 | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #190 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #190 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49679.147858; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.021181 exceeds limit? YES "road-eastnet-nonat-190" #190: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-190" #190: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #442 at 0x557d46ad6400 | State DB: adding IKEv2 state #442 in UNDEFINED | pstats #442 ikev2.ike started | Message ID: init #442: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #442: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #442; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-190" #442: initiating v2 parent SA to replace #190 | using existing local IKE proposals for connection road-eastnet-nonat-190 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 442 for state #442 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c012bf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #442 | libevent_malloc: new ptr-libevent@0x7fb34c014c70 size 128 | #442 spent 0.161 milliseconds in ikev2_parent_outI1() | crypto helper 2 resuming | RESET processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 2 starting work-order 442 for state #442 | start processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #190 ikev2.ike failed too-many-retransmits | pstats #190 ikev2.ike deleted too-many-retransmits | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 442 | #190 spent 2.84 milliseconds in total | [RE]START processing: state #190 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-190" #190: deleting state (STATE_PARENT_I1) aged 64.023s and NOT sending notification | parent state #190: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #190 "road-eastnet-nonat-190" #190: deleting IKE SA for connection 'road-eastnet-nonat-190' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-190' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-190 | State DB: deleting IKEv2 state #190 in PARENT_I1 | parent state #190: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 442 time elapsed 0.001332 seconds | stop processing: state #190 from 192.1.2.23:500 (in delete_state() at state.c:1143) | (#442) spent 1.34 milliseconds in crypto helper computing work-order 442: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 442 for state #442 to event queue | libevent_free: release ptr-libevent@0x7fb3580300e0 | scheduling resume sending helper answer for #442 | libevent_malloc: new ptr-libevent@0x7fb380036d70 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90400 | crypto helper 2 waiting (nothing to do) | in statetime_stop() and could not find #190 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-190 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-190" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-190' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-190" | stop processing: connection "road-eastnet-nonat-190" (in initiate_a_connection() at initiate.c:349) | spent 0.105 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #442 | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 442 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #442 | **emit ISAKMP Message: | initiator cookie: | 87 5c d8 cc 20 15 ba 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-190 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 05 68 c7 3c 11 2f 9c 07 85 86 ab fd 70 b3 a3 4b | ikev2 g^x 4b 15 db 0c 55 63 48 ae b0 dc 7b 34 ba 58 39 54 | ikev2 g^x 81 cc 25 fd b5 c7 f7 39 e9 8f 2e f9 b9 70 0e c0 | ikev2 g^x 6c fd 85 d9 5d cd 9d f6 5f 5d 4e 86 38 b5 78 a7 | ikev2 g^x d8 3d 3d f5 25 e8 c6 56 da a5 38 73 cf 89 18 32 | ikev2 g^x cf c9 c3 46 fb 60 20 53 a4 ff ca 61 0a 1f ad 2b | ikev2 g^x a5 f9 d2 1b d5 73 db 29 4b af 73 16 1f 68 6e 88 | ikev2 g^x a8 b3 5c d6 b4 01 8a 06 65 2f a3 ad 76 14 68 68 | ikev2 g^x 9f cb 47 75 86 fb 98 94 58 0a 1b c8 87 0a bf b1 | ikev2 g^x 97 c2 17 ab 5f e8 c3 11 ea 6b b5 fc 83 10 e7 36 | ikev2 g^x 12 60 e6 87 bd 62 58 93 cb ac ef ca 4f 7f ed 7c | ikev2 g^x 32 f8 74 a9 e0 2b 69 44 cf b3 d9 33 28 7b 15 7d | ikev2 g^x 6b 78 11 47 ae a2 e0 8f 52 91 83 be f4 84 c7 17 | ikev2 g^x a5 b8 57 df 7a 32 65 6d 3b bd ca 10 c7 fb bf 39 | ikev2 g^x ca 7b 85 7d 49 00 cc 7c 5f b7 c2 27 37 c0 3c 03 | ikev2 g^x 4d 75 5e a1 e3 8a 16 a4 15 da ac 76 26 68 0c 96 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce bc 7d d1 02 e0 e7 26 b2 02 88 eb 9f 6d cb 61 e3 | IKEv2 nonce 66 23 89 34 b9 17 0a 11 8d c9 39 5d 4a 6a d8 e7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 87 5c d8 cc 20 15 ba 3c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 be | natd_hash: port= 01 f4 | natd_hash: hash= 1b b4 fa 62 4d 88 e7 9c 8f 3a a9 82 e0 af 15 4d | natd_hash: hash= 27 f2 cd 63 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b b4 fa 62 4d 88 e7 9c 8f 3a a9 82 e0 af 15 4d | Notify data 27 f2 cd 63 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 87 5c d8 cc 20 15 ba 3c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ff 91 89 9d d7 da 34 d7 9b a8 06 6f f9 4a 9b 25 | natd_hash: hash= 2a 77 df 3e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ff 91 89 9d d7 da 34 d7 9b a8 06 6f f9 4a 9b 25 | Notify data 2a 77 df 3e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #442 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #442: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #442 to 4294967295 after switching state | Message ID: IKE #442 skipping update_recv as MD is fake | Message ID: sent #442 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-190" #442: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.190:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #442) | 87 5c d8 cc 20 15 ba 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 68 c7 3c 11 2f 9c 07 85 86 ab fd 70 b3 a3 4b | 4b 15 db 0c 55 63 48 ae b0 dc 7b 34 ba 58 39 54 | 81 cc 25 fd b5 c7 f7 39 e9 8f 2e f9 b9 70 0e c0 | 6c fd 85 d9 5d cd 9d f6 5f 5d 4e 86 38 b5 78 a7 | d8 3d 3d f5 25 e8 c6 56 da a5 38 73 cf 89 18 32 | cf c9 c3 46 fb 60 20 53 a4 ff ca 61 0a 1f ad 2b | a5 f9 d2 1b d5 73 db 29 4b af 73 16 1f 68 6e 88 | a8 b3 5c d6 b4 01 8a 06 65 2f a3 ad 76 14 68 68 | 9f cb 47 75 86 fb 98 94 58 0a 1b c8 87 0a bf b1 | 97 c2 17 ab 5f e8 c3 11 ea 6b b5 fc 83 10 e7 36 | 12 60 e6 87 bd 62 58 93 cb ac ef ca 4f 7f ed 7c | 32 f8 74 a9 e0 2b 69 44 cf b3 d9 33 28 7b 15 7d | 6b 78 11 47 ae a2 e0 8f 52 91 83 be f4 84 c7 17 | a5 b8 57 df 7a 32 65 6d 3b bd ca 10 c7 fb bf 39 | ca 7b 85 7d 49 00 cc 7c 5f b7 c2 27 37 c0 3c 03 | 4d 75 5e a1 e3 8a 16 a4 15 da ac 76 26 68 0c 96 | 29 00 00 24 bc 7d d1 02 e0 e7 26 b2 02 88 eb 9f | 6d cb 61 e3 66 23 89 34 b9 17 0a 11 8d c9 39 5d | 4a 6a d8 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b b4 fa 62 4d 88 e7 9c 8f 3a a9 82 | e0 af 15 4d 27 f2 cd 63 00 00 00 1c 00 00 40 05 | ff 91 89 9d d7 da 34 d7 9b a8 06 6f f9 4a 9b 25 | 2a 77 df 3e | state #442 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c014c70 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c012bf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90400 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #442 | libevent_malloc: new ptr-libevent@0x7fb3580300e0 size 128 | #442 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49679.150589 | resume sending helper answer for #442 suppresed complete_v2_state_transition() and stole MD | #442 spent 0.872 milliseconds in resume sending helper answer | stop processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb380036d70 | timer_event_cb: processing event@0x557d46a2b610 | handling event EVENT_RETRANSMIT for parent state #416 | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #416 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #416 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49679.150668; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004938 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000a290 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #416 | libevent_malloc: new ptr-libevent@0x7fb380036d70 size 128 "road-eastnet-nonat-164" #416: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #416) | 5d bf 34 43 fd eb 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 9c 12 61 6e 55 5f 3f e9 df f9 16 83 d1 25 2a | 72 5f a1 78 f7 87 25 3a 22 d7 65 e6 11 d9 d3 59 | e3 ba 0c 77 63 47 38 eb 2b 7e 21 79 54 43 77 67 | 7d 43 26 41 55 e2 a8 b7 fe 98 ba 7e ee 6e e7 d1 | f4 f4 66 e8 1d dc d6 4c 00 81 99 f5 5a 7b 73 a7 | 30 2a 46 7a 31 1a a2 5d 7f 98 25 46 aa 6e fe 80 | f5 47 c9 6c 4b 73 63 fa cd 88 eb 14 22 c8 b1 b2 | ad 5f b2 f2 36 1e b4 11 ad 9a b6 4a 8b 3e c1 87 | 99 5d 71 91 57 ac 82 f2 a3 ed 29 f1 0e 50 36 50 | 84 2e 3a 51 9c b6 89 41 dc e0 0d 62 c7 07 fd 92 | b2 9d 62 79 ea 78 ed 7f ed 48 ed 1d 98 d3 08 ff | 02 b4 3e 75 4f aa f5 e9 04 8d 83 d6 4c a8 75 42 | 31 a1 15 df b2 8a e4 30 1f 81 68 86 a3 e6 e3 23 | 56 ac 18 47 57 cf 03 de 91 03 0e d5 5d 28 a8 63 | aa 5c 8c 97 5e 5c eb 84 7c 09 fb 47 84 e9 d6 18 | 63 4d 10 b9 7d 4e 26 06 3f 25 b1 aa e9 d4 6c b6 | 29 00 00 24 b4 c4 67 16 b9 c2 e8 af d8 82 12 ab | bc d9 b4 36 b0 6a ad c4 e5 8c 60 6e da e3 9f 02 | d5 5c 1a 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 19 76 97 4c b0 23 bd 31 57 aa f9 24 | a0 38 a6 39 12 13 22 3e 00 00 00 1c 00 00 40 05 | d7 f1 41 97 86 a8 54 0a 0b 1f 8a 34 7f d0 a2 86 | ea 0e a2 fa | libevent_free: release ptr-libevent@0x7fb388048a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b610 | #416 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 5c d8 cc 20 15 ba 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #442 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #442 | rejected packet: | 87 5c d8 cc 20 15 ba 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #442: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0961 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d bf 34 43 fd eb 2e 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #416 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #416 | rejected packet: | 5d bf 34 43 fd eb 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #416: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0923 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #333 | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #333 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #333 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49679.153185; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005042 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b610 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #333 | libevent_malloc: new ptr-libevent@0x7fb388048a80 size 128 "road-eastnet-nonat-81" #333: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #333) | 36 9c 5e f3 7a 54 db f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df 35 02 78 fc 13 18 22 30 0e d2 c5 c7 5e 7a ef | fc 39 68 66 58 1c a7 d7 f4 43 08 7d f3 9f a3 12 | 83 85 91 2a d6 fa cf 49 c5 3a 4e ef 94 c1 54 16 | 1b 99 b1 a6 48 34 1c b5 c6 ee 58 e5 e4 3c 00 8c | f6 ed dc dd 07 96 4c 6b 8d 5f aa d5 5e f5 20 2e | 3f 32 89 26 7f 4e af 1e 9a 4a 36 89 bf ed bc fa | 5a d9 0b e6 38 d4 55 02 b6 04 ba b9 b2 30 b0 dc | ee 4b 24 b9 ca 12 84 2f 34 21 e3 1c 0e f7 c4 d5 | ce ff 47 39 50 96 0a de ca 62 7f b7 57 aa dc 15 | fa 24 df 17 c7 d0 80 14 18 ef d1 f8 18 5f 36 22 | 2a ba 77 eb 0a 13 5b 8b 27 f6 fa ad 95 0f 09 90 | 17 80 57 73 91 84 22 c2 f7 e1 0e dd b5 d9 e2 7e | 44 ff ae 13 c1 78 7c 90 56 b5 79 a1 5d 2f 9a 4e | 56 4b 74 fa 8f 64 20 07 77 6a 9d cf 03 50 e4 f8 | 0d 1d ad 75 e0 c0 52 df 18 df 4e ac 10 5a bf 8c | 35 df 7e 38 e0 d8 bf ff 6f 7d 3a 37 d3 86 c3 73 | 29 00 00 24 0e 6c f9 b7 77 8c 01 48 47 c0 c4 ac | 2c 92 5d 4f bc 4c de 69 52 73 e8 16 78 88 9e ed | d3 2e 55 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 3c 0e c8 f8 59 38 94 13 7f 9d fb | 64 4c f1 0b 3e 49 1c bd 00 00 00 1c 00 00 40 05 | 19 5d c9 52 f0 58 98 88 cd 4a c6 e4 d4 78 0a 3b | 9f f4 40 6f | libevent_free: release ptr-libevent@0x7fb364045e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | #333 spent 0.217 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 9c 5e f3 7a 54 db f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #333 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #333 | rejected packet: | 36 9c 5e f3 7a 54 db f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #333: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.114 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b07dc0 | handling event EVENT_RETRANSMIT for parent state #430 | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #430 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #430 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49679.155636; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001298 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #430 | libevent_malloc: new ptr-libevent@0x7fb364045e60 size 128 "road-eastnet-nonat-178" #430: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #430) | fd 31 ba 30 35 2e 2d c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 61 13 a5 cc e9 81 b6 86 fc 6b 16 f1 74 d1 d9 | 72 f7 e2 ba f7 11 d1 79 92 c8 3d 2f 28 42 00 4a | 78 0d 84 65 5e dc 17 2f ba 15 c9 f0 22 4d 0a 3b | 29 55 5d 3f ae dd 3d 32 e8 c3 46 a9 04 47 63 51 | 2f 80 77 91 5f 9c b1 19 0f 94 27 d5 5d fe 9c 81 | eb f7 f8 80 c0 5d c2 5a 33 1a 77 e9 05 ab d6 42 | 13 e3 2a 15 08 f1 ba d2 bf eb 3d 3d ce 2d cd 92 | 09 c3 9f 5e 21 7b 84 9b 7e ad 3a cb 5a e8 5e a4 | 33 a8 4d 41 b7 9c ef db 29 ac 76 73 88 b2 9f 61 | fa 8c 1c 07 e5 8d 13 2c 9f d7 a6 11 29 94 1a 21 | 41 e9 57 a1 8b f3 e6 b9 90 b9 b8 f3 a3 3b 4c 8f | 23 8e 08 2f 27 17 72 8c c0 e7 38 14 1f 4b aa 78 | e1 d2 e5 79 c4 be 0b 93 9e 0c 21 6c d4 2a fe 21 | c7 8e 29 af b0 03 63 38 02 4d 95 ee 76 1a 81 af | a9 96 3e 2d 7b 5a 65 f4 b4 60 bb 2f a9 e9 18 59 | 66 94 d6 32 f1 9f 06 b1 1e 3d 20 4c 29 30 cd 34 | 29 00 00 24 72 14 4a 62 3b 2e 28 0b 02 9a 2b 55 | 37 9d 8e 84 fb c2 f7 70 ad cf 43 07 12 85 de c1 | 7c 78 30 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e0 6b 92 d2 7b 15 90 7f 21 2f b9 04 | b8 30 3c 8f c2 2d 01 6b 00 00 00 1c 00 00 40 05 | 4e cf 7c 8c 30 ae f3 1b a7 47 e4 11 ea a4 73 10 | 14 82 c2 9c | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b07dc0 | #430 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 31 ba 30 35 2e 2d c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #430 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #430 | rejected packet: | fd 31 ba 30 35 2e 2d c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #430: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0865 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a94500 | handling event EVENT_RETRANSMIT for parent state #437 | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #437 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #437 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49679.158002; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500276 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #437 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 "road-eastnet-nonat-185" #437: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #437) | 31 51 d4 f7 c8 fe c5 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d 4d c3 c5 4f ca 6c d8 d4 84 06 d4 ea 89 80 6d | 99 d1 7f e1 cb 80 24 55 fd df 90 fb 02 92 ff c9 | f0 47 14 8d 77 1a bb 9c 7c dd 17 b9 16 19 6b 74 | ec 88 72 db 3e 1a c4 54 69 dd d8 16 b9 56 68 f6 | 6a 0a 44 9f 3f b5 a3 4b 08 8a 18 15 d1 69 95 71 | d9 52 3a e9 65 ee 70 4d ea 9c f5 16 84 a6 99 9c | ab ff 36 83 9d b6 9f c3 53 f1 00 51 ea c6 f5 a2 | 5c ce 33 c2 cf de 1d c7 31 1f d6 91 bf f2 7f 9f | fc 6e d8 c8 43 fd a2 ec ed d4 2e e3 1a 35 b1 d0 | de 28 47 6a 6b a3 42 0c 4a 1a 4e 13 17 87 94 71 | f7 93 75 92 ea b9 03 fc c2 41 93 f1 c9 f7 b4 4d | 3c f1 35 28 f5 5e 37 14 cf 3e ce 38 da e2 53 26 | df e6 e9 23 b5 8c b6 45 18 8f e2 54 89 f9 96 79 | aa 6a 79 aa cf b4 ec 3d e4 21 6c a5 14 2c 68 b2 | 1b 56 0e 23 e2 48 c6 68 81 fb b5 23 23 53 e6 4a | 1c 61 e2 7a 67 e5 f5 84 ba 68 ce a3 e9 a9 c8 e3 | 29 00 00 24 02 5e bf 69 6a 09 af cb c5 28 ba 2f | be c6 fe 19 42 f8 ee f5 0b 73 06 5b 41 10 d0 e5 | 69 e3 64 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 6b 27 8e 3d c1 6d e7 fb 64 0d 99 | 79 35 e1 df 31 89 9b 32 00 00 00 1c 00 00 40 05 | dc 48 f6 93 16 4d 8a fc 81 8e 30 65 58 3a 8c 28 | 32 6e e0 6b | libevent_free: release ptr-libevent@0x7fb3380300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94500 | #437 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 31 51 d4 f7 c8 fe c5 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #437 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #437 | rejected packet: | 31 51 d4 f7 c8 fe c5 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #437: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf00 | handling event EVENT_RETRANSMIT for parent state #386 | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #386 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #386 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49679.160322; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003232 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94500 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #386 | libevent_malloc: new ptr-libevent@0x7fb3380300e0 size 128 "road-eastnet-nonat-134" #386: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #386) | b9 e2 f3 4f 37 4c 11 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f da ec b0 32 6b 35 e3 b5 80 95 66 e9 7f b8 d5 | e2 e0 68 33 cd 76 e0 38 1a b1 5d 56 26 da 9f e0 | 7e 25 7d 36 13 86 62 f1 2c 8d 3f 33 c2 a9 77 5c | 6c 22 2c d9 e8 13 05 5f 5c b6 bf 2d 06 59 25 68 | 04 0a 7e 77 39 77 e2 48 8e 95 f3 7a 6b 62 7a 5c | 74 73 02 c5 eb 3d 85 b2 e4 97 e2 a5 7e c1 fd bd | 8e 39 16 68 05 dd bf 87 fa 57 12 1c 04 ca 0c 29 | 8c f4 e1 ff dd 36 cf 70 de cd 23 dc c6 ae 0f aa | 3b 0f fa f5 80 72 1a cd 74 ba bc e4 a4 6c a0 e3 | 89 9a 36 59 db 27 b5 54 3f 8a aa cb ee 7a 4c 74 | 10 ef 6c 33 3c 46 b9 be 98 4b 1f 0c 9e a1 0f e7 | 70 9c 48 fc 41 5f bc 21 01 43 4c 8e f5 9c e5 23 | bb 93 4c ac ba 5c 01 89 9a 17 4a 24 a8 b9 2c 47 | 70 fc 07 f1 21 a4 d5 20 f9 8f f8 38 ce d5 70 b1 | 42 c9 99 11 ba 5a fc 0c 06 b5 ae ff af e4 68 aa | d7 82 77 58 85 4e fc 74 00 fa 00 8a 91 15 50 9e | 29 00 00 24 84 96 aa 5e b5 f6 6f 99 c5 43 c7 51 | b3 36 1c 3e 65 fe 9c e9 3e a8 cd 03 a7 c9 e1 a9 | 36 56 0e 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 80 4a c6 9c b6 70 28 5d 0a 3a 23 | 72 63 d0 38 6e f2 8f ca 00 00 00 1c 00 00 40 05 | 26 1f 03 bb d7 50 8e c5 c4 3f 03 d2 3a c8 fe 3b | 09 a1 da 1f | libevent_free: release ptr-libevent@0x7fb3680300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf00 | #386 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 e2 f3 4f 37 4c 11 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #386 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #386 | rejected packet: | b9 e2 f3 4f 37 4c 11 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #386: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.052 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad4380 | handling event EVENT_RETRANSMIT for parent state #417 | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #417 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #417 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49679.209634; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00382 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf00 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #417 | libevent_malloc: new ptr-libevent@0x7fb3680300e0 size 128 "road-eastnet-nonat-165" #417: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #417) | d9 e4 18 5f 59 64 b9 ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 fd ed 03 c4 13 a8 51 65 6c f8 7b f8 e0 2d 89 | 59 12 b6 d0 fa 5d d3 b6 48 1f 05 4f d0 37 4e 96 | b6 b0 a9 07 5a 84 b2 22 72 c2 6e e4 2c 16 e8 fb | c8 92 b8 74 ce 3f 40 30 b5 60 8c 95 d1 d0 42 81 | 96 4a 3e 9a 08 06 af be 4a d9 72 15 c0 c3 46 78 | d0 1e d0 10 cd c4 48 fd 2d ac c2 45 66 8d 26 84 | dc ff cb c9 a3 60 b9 5c 03 1c 63 7c ad bd 60 96 | ce 2e d7 57 49 16 93 e7 43 2d b6 d5 b4 ce 5b 3b | 96 51 3a 88 ff 32 38 dc 5f 0b a8 74 a0 1a 49 87 | b5 db a2 1f ed 10 a6 d0 7a 48 4a 90 79 4e 5a f9 | 2b 8b 33 88 7e f6 9a 82 54 47 b3 ae d3 d5 19 8e | 35 94 b5 a7 07 70 69 91 1e 2e 08 a0 fa fa bf a8 | 09 5a 06 2f 9a 90 75 b5 b1 fe 11 2e 8d bc e2 8f | fc 8a 4c 02 b2 2c 51 5d d4 fd cc 21 3e c1 63 73 | 47 88 57 72 c3 e3 90 eb 42 71 fd 34 f9 5d 5f ad | 35 a7 22 19 95 d8 2d 82 e5 c2 0e d7 d8 88 22 f6 | 29 00 00 24 df 2c 07 75 0e bd bd 78 6f 85 ca 62 | 53 2e a0 29 e4 f9 3b 0b 22 fe c0 44 7c 40 c5 a3 | 8b 56 a4 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 33 f3 05 bf ce a7 d8 4f e5 99 24 52 | 75 47 3a d4 7d 71 ad 77 00 00 00 1c 00 00 40 05 | 01 69 5d 3d 4a 00 3f a4 76 63 f4 90 ae 45 6d 8b | 22 6e e0 18 | libevent_free: release ptr-libevent@0x7fb37002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad4380 | #417 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 e4 18 5f 59 64 b9 ab | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #417 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #417 | rejected packet: | d9 e4 18 5f 59 64 b9 ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #417: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1c490 | handling event EVENT_RETRANSMIT for parent state #387 | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #387 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #387 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49679.219934; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003921 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad4380 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #387 | libevent_malloc: new ptr-libevent@0x7fb37002a950 size 128 "road-eastnet-nonat-135" #387: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #387) | 75 6e e5 e5 6a cd b8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff a4 36 8a d7 5e f8 44 73 70 3f d1 cc 7c 79 90 | 0b d6 30 0a fd 2b 08 93 ae c4 9d c0 92 f3 30 c3 | aa 43 1a b6 dd 00 a6 77 0b 61 7f 7a 6d 22 60 10 | f1 8f 0a bd 4e 21 a1 c5 3c 6d bc 87 58 3a fc 28 | a1 f5 dc 41 f0 99 f6 3d 83 55 3c 93 36 df 67 78 | d6 16 47 a9 dd 0a f6 c9 ed 30 32 20 48 63 8f ce | 8c eb 37 37 cb 50 71 37 bd cb 4b f9 48 98 89 fb | 52 3f d5 c6 89 92 40 89 ae 52 a8 41 db 88 8d ad | 76 89 a2 2c 25 fd cd a1 b3 18 a9 52 92 ca 41 cc | be 86 7c 0a d4 fa d9 2c a1 ce 6b 87 5c 4f 0b a7 | e2 e7 b1 90 b4 88 13 15 0f 2d 50 24 a6 28 8e 8a | 81 90 02 66 38 1d 10 b6 04 db f1 15 7f 9a 7c eb | ec 94 ef 10 22 b8 7f a2 35 e6 24 56 5c e6 40 99 | 8b 09 81 82 27 99 96 55 ae 30 73 4e 23 e9 a5 45 | d0 57 f8 f9 3b 6c 05 9a 46 78 7d b3 62 a4 ed 17 | 2e 15 c3 a2 7d 0c 1c 89 e1 68 08 b6 03 09 76 f8 | 29 00 00 24 11 0e 4a cd 20 fc ce 84 68 c7 a8 ec | 48 5c fe b5 ee 21 2d ef c1 3f a3 a1 30 c1 c0 88 | b1 78 03 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 fb 47 16 eb 64 05 e3 af e5 70 ee | b4 39 fc 1b 30 12 e4 0b 00 00 00 1c 00 00 40 05 | d8 e1 2e 80 87 77 be 81 c0 a4 a8 f5 fc 15 8f 58 | 08 dc e4 8d | libevent_free: release ptr-libevent@0x7fb34c02ec30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c490 | #387 spent 0.0978 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 6e e5 e5 6a cd b8 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #387 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #387 | rejected packet: | 75 6e e5 e5 6a cd b8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #387: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0754 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37402ffb0 | handling event EVENT_RETRANSMIT for parent state #334 | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #334 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #334 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49679.227213; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00746 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c490 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #334 | libevent_malloc: new ptr-libevent@0x7fb34c02ec30 size 128 "road-eastnet-nonat-82" #334: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #334) | 99 fb 3f 4d 99 57 72 cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a ca de c8 71 49 e8 30 84 13 c9 a8 49 58 85 47 | 09 f9 f9 59 70 d3 2b 07 44 44 cc 17 14 52 02 aa | 27 07 c2 cd 39 d4 b6 e5 73 79 a9 2f 72 89 bd 61 | d5 62 f8 e8 e6 f1 12 2e 57 7d d0 8e 8b 5d 7b ce | 30 2f b7 61 b2 0b 7b a0 24 5a fe 42 60 21 92 aa | 5a be e9 6d ac f6 2b f8 e4 db ed fe 70 91 ae a8 | 85 c9 a9 89 2d af 8b 90 60 53 0f 7b 1f 54 22 36 | b6 5d 78 20 de 79 62 7d 9d 74 65 df 47 cb 75 b6 | eb 4f 70 ec d4 3f 23 06 d7 65 0a b2 74 f8 e9 72 | 81 4c 29 37 9f 65 5b 7b c1 89 f7 c4 28 5b 64 9b | 59 6b b0 17 bf e7 21 58 4f ad 42 06 42 7b d5 d6 | 2f 45 bc a9 64 87 9f 47 9d 1c 11 c7 6e 0c 53 bf | a5 35 d6 5f eb b3 bf 80 3c b3 0d 2b 91 66 f7 a4 | 98 9c 01 6a 7e ee e3 b3 ad 96 90 67 e0 44 49 71 | 2a 4d 41 3b cc ae 39 dd 1f 03 62 e9 5e 5c bf 21 | 27 f6 9b 3e 24 35 1b f3 b8 96 3c e2 59 58 ea 9a | 29 00 00 24 64 85 28 2f 41 a8 19 c8 06 e4 df 4c | 57 5a d5 28 ae 9b e4 58 e9 c7 cc 4b e4 65 be 72 | 5c d2 98 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 3d 2f a6 85 1f fa fd 47 13 ee 3b | 56 07 59 de 70 93 a0 2d 00 00 00 1c 00 00 40 05 | ab e9 3c 75 bd a4 6c 62 ac eb 51 4e 98 ab 45 51 | fa 01 56 3d | libevent_free: release ptr-libevent@0x7fb374023c90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | #334 spent 0.0907 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 fb 3f 4d 99 57 72 cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #334 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #334 | rejected packet: | 99 fb 3f 4d 99 57 72 cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #334: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acec40 | handling event EVENT_RETRANSMIT for parent state #191 | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #191 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #191 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49679.232471; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006015 exceeds limit? YES "road-eastnet-nonat-191" #191: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-191" #191: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #443 at 0x557d46ad79c0 | State DB: adding IKEv2 state #443 in UNDEFINED | pstats #443 ikev2.ike started | Message ID: init #443: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #443: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #443; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-191" #443: initiating v2 parent SA to replace #191 | using existing local IKE proposals for connection road-eastnet-nonat-191 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 443 for state #443 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37402ffb0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #443 | libevent_malloc: new ptr-libevent@0x7fb374023c90 size 128 | #443 spent 0.0731 milliseconds in ikev2_parent_outI1() | RESET processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #191 ikev2.ike failed too-many-retransmits | pstats #191 ikev2.ike deleted too-many-retransmits | #191 spent 2.51 milliseconds in total | crypto helper 0 resuming | crypto helper 0 starting work-order 443 for state #443 | [RE]START processing: state #191 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in delete_state() at state.c:879) | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 443 "road-eastnet-nonat-191" #191: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #191: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #191 "road-eastnet-nonat-191" #191: deleting IKE SA for connection 'road-eastnet-nonat-191' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-191' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-191 | State DB: deleting IKEv2 state #191 in PARENT_I1 | parent state #191: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 443 time elapsed 0.001061 seconds | (#443) spent 1.02 milliseconds in crypto helper computing work-order 443: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 443 for state #443 to event queue | scheduling resume sending helper answer for #443 | libevent_malloc: new ptr-libevent@0x7fb384031e80 size 128 | crypto helper 0 waiting (nothing to do) | stop processing: state #191 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb37c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acec40 | in statetime_stop() and could not find #191 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-191 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-191" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-191' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-191" | stop processing: connection "road-eastnet-nonat-191" (in initiate_a_connection() at initiate.c:349) | spent 0.0579 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #443 | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 443 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #443 | **emit ISAKMP Message: | initiator cookie: | 99 e5 a7 37 44 6e 78 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-191 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 73 12 f7 51 e4 9b df 2b ce ce f2 ee 7b 13 94 51 | ikev2 g^x 6a dd a6 05 05 c5 f9 51 17 99 5e 09 04 c9 1f b2 | ikev2 g^x fd 1f 26 33 db d5 00 aa 13 04 1c 40 7e db ca 5a | ikev2 g^x d7 f8 59 90 a2 34 4e 73 d9 b4 1b 12 47 af 09 6a | ikev2 g^x 3d c6 bc 0a 75 d2 59 20 61 0f b0 78 2f f9 96 a8 | ikev2 g^x bc 6e fc a4 91 79 01 c5 c6 bf 55 5f ca 2a 71 57 | ikev2 g^x 55 3a c2 55 6a 02 68 58 b9 3f ee 10 26 00 19 6c | ikev2 g^x a4 9b 2b c5 37 91 ea 3d f7 92 10 15 3e 21 96 87 | ikev2 g^x 2b 42 57 b1 96 6e 0c 94 b6 11 c4 ca 44 56 8a bf | ikev2 g^x 72 e1 9f 77 2e b1 9f 72 96 c2 0b cd e9 02 1e ed | ikev2 g^x f4 40 75 83 23 4e d6 76 72 99 62 9c 55 c4 df 8d | ikev2 g^x 23 38 27 3c f9 b9 3f 1c 37 14 80 74 3c 7a 5d f8 | ikev2 g^x 1a 0c 7f 0d 3a 48 23 4c 35 58 8d c3 50 e9 4f d5 | ikev2 g^x 3a d4 b6 fa d0 f4 f0 02 7b 72 04 9c a6 5b 57 b7 | ikev2 g^x 6f ac e8 68 3f 0b ab 1c 0a 68 cc 2e 68 e9 56 e5 | ikev2 g^x 09 9a 32 64 09 77 95 51 f1 d9 2b dd e7 b2 96 44 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d1 ee 39 81 5a e3 54 a6 73 c8 50 03 2c 50 da d8 | IKEv2 nonce 32 42 2b e6 ab ed 1b 51 ff 8e f3 84 d3 ae 77 7f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 99 e5 a7 37 44 6e 78 62 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 bf | natd_hash: port= 01 f4 | natd_hash: hash= 43 53 91 6c eb c8 88 e0 f9 9e 54 62 8e 3a 67 1c | natd_hash: hash= 98 f2 42 50 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 43 53 91 6c eb c8 88 e0 f9 9e 54 62 8e 3a 67 1c | Notify data 98 f2 42 50 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 99 e5 a7 37 44 6e 78 62 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 84 7e 67 f1 2a 8c cc 0b 8d 85 0d 9d a9 c1 72 b7 | natd_hash: hash= 86 11 2f 01 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 84 7e 67 f1 2a 8c cc 0b 8d 85 0d 9d a9 c1 72 b7 | Notify data 86 11 2f 01 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #443 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #443: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #443 to 4294967295 after switching state | Message ID: IKE #443 skipping update_recv as MD is fake | Message ID: sent #443 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-191" #443: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.191:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #443) | 99 e5 a7 37 44 6e 78 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 12 f7 51 e4 9b df 2b ce ce f2 ee 7b 13 94 51 | 6a dd a6 05 05 c5 f9 51 17 99 5e 09 04 c9 1f b2 | fd 1f 26 33 db d5 00 aa 13 04 1c 40 7e db ca 5a | d7 f8 59 90 a2 34 4e 73 d9 b4 1b 12 47 af 09 6a | 3d c6 bc 0a 75 d2 59 20 61 0f b0 78 2f f9 96 a8 | bc 6e fc a4 91 79 01 c5 c6 bf 55 5f ca 2a 71 57 | 55 3a c2 55 6a 02 68 58 b9 3f ee 10 26 00 19 6c | a4 9b 2b c5 37 91 ea 3d f7 92 10 15 3e 21 96 87 | 2b 42 57 b1 96 6e 0c 94 b6 11 c4 ca 44 56 8a bf | 72 e1 9f 77 2e b1 9f 72 96 c2 0b cd e9 02 1e ed | f4 40 75 83 23 4e d6 76 72 99 62 9c 55 c4 df 8d | 23 38 27 3c f9 b9 3f 1c 37 14 80 74 3c 7a 5d f8 | 1a 0c 7f 0d 3a 48 23 4c 35 58 8d c3 50 e9 4f d5 | 3a d4 b6 fa d0 f4 f0 02 7b 72 04 9c a6 5b 57 b7 | 6f ac e8 68 3f 0b ab 1c 0a 68 cc 2e 68 e9 56 e5 | 09 9a 32 64 09 77 95 51 f1 d9 2b dd e7 b2 96 44 | 29 00 00 24 d1 ee 39 81 5a e3 54 a6 73 c8 50 03 | 2c 50 da d8 32 42 2b e6 ab ed 1b 51 ff 8e f3 84 | d3 ae 77 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 53 91 6c eb c8 88 e0 f9 9e 54 62 | 8e 3a 67 1c 98 f2 42 50 00 00 00 1c 00 00 40 05 | 84 7e 67 f1 2a 8c cc 0b 8d 85 0d 9d a9 c1 72 b7 | 86 11 2f 01 | state #443 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374023c90 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37402ffb0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acec40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #443 | libevent_malloc: new ptr-libevent@0x7fb37c02a950 size 128 | #443 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49679.234128 | resume sending helper answer for #443 suppresed complete_v2_state_transition() and stole MD | #443 spent 0.334 milliseconds in resume sending helper answer | stop processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb384031e80 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 e5 a7 37 44 6e 78 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #443 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #443 | rejected packet: | 99 e5 a7 37 44 6e 78 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bf fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #443: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378012890 | handling event EVENT_RETRANSMIT for parent state #431 | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #431 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #431 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49679.234211; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001605 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384043260 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #431 | libevent_malloc: new ptr-libevent@0x7fb384031e80 size 128 "road-eastnet-nonat-179" #431: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #431) | 47 a9 f6 5d ab 90 59 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 61 b4 c7 cd e1 2c 04 0c 72 d6 80 6f c8 af 30 | 4d b0 b2 1e 8d 4f c3 2d f2 10 58 df a2 cf 51 79 | b1 79 c2 3f a7 35 e3 8e 8c e9 62 c2 7f 62 64 45 | 0a e4 6a 79 06 24 d8 93 a4 d7 88 f6 f8 67 56 ac | da f7 27 22 46 b5 f3 36 fc 59 b8 ef 46 c0 a0 39 | db 63 6d 41 32 18 a5 95 8d 7d ad 6f 27 26 ca df | ed d3 ee 53 fd 4c f5 cc 75 fc e3 f8 93 5a 96 cb | 92 9a 63 48 fa 88 0d 7b 6d 6b ed e6 9a a3 62 cc | f6 ca d1 cc 9a a4 27 97 4e 98 8a fa ec f7 10 73 | 1c 8b 1a f2 37 ea 26 ef 65 c4 24 b5 68 0e 71 36 | f1 1a b0 23 a4 4f b8 8f 75 d7 00 cd 7b 3c ae b6 | d6 4e 42 ae bd d1 a4 92 33 6b 9b 3f 93 ee 1b 13 | 12 06 ae 19 81 16 af 26 23 73 f8 46 07 4b f9 88 | 69 47 c6 fb 6b 2b 62 2c a3 d3 70 f4 52 77 08 a4 | 0e 48 7c ce 5d 87 5a c2 55 50 b0 8a 92 e5 1a 3c | 83 00 60 34 e5 f6 a0 b7 42 00 ef b1 62 a7 9d 6c | 29 00 00 24 71 9e 5f 53 a0 03 f4 e4 24 3a 58 53 | c3 05 4a 1c c7 b1 e2 bd 95 07 98 a5 4b 6a 2d 2f | 6b 11 45 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 46 73 c7 9b 2a a1 6f 39 66 d3 70 | f2 4b 98 95 84 ba e3 3f 00 00 00 1c 00 00 40 05 | 9a b5 4b 5a b1 14 b9 6a 89 15 79 d3 91 3a bb d6 | 0d 4a ca 70 | libevent_free: release ptr-libevent@0x7fb37802a8c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378012890 | #431 spent 0.0691 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 a9 f6 5d ab 90 59 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #431 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #431 | rejected packet: | 47 a9 f6 5d ab 90 59 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #431: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0369 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a43dd0 | handling event EVENT_RETRANSMIT for parent state #438 | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #438 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #438 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49679.24041; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500017 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378012890 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #438 | libevent_malloc: new ptr-libevent@0x7fb37802a8c0 size 128 "road-eastnet-nonat-186" #438: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #438) | 41 3e 80 fb 50 ac d5 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 f5 0a 72 18 b4 76 75 f6 01 ed 57 e5 f7 fc 77 | 49 c0 b9 2a a0 da 30 6d 64 aa a5 e7 d9 21 f7 0d | 91 be 59 58 e0 73 bb 49 e3 e7 3d e2 78 8a 04 ac | e2 97 a4 99 a2 30 e0 4b a8 00 c0 ee 42 04 60 c2 | 77 26 36 9f ca 4c 02 7c fe 9f ae b6 ae 04 ad 9a | 8f d0 27 5f 92 70 2c be 09 55 2c 26 bd b6 4c 20 | bf 73 30 d0 44 67 97 1f 1b 2e b0 03 d6 27 ac d2 | 9a 9e e4 f7 c7 3b 09 97 22 3c 54 79 43 94 36 23 | 17 e9 e5 03 2b e9 58 e3 73 9f 26 68 9a d9 44 87 | db f9 8f 3e f3 46 76 36 18 c6 80 3a ce aa cb fb | 5f dd ff d6 eb 23 75 c4 e2 35 1f 1d 81 9e 2a 45 | d7 f8 e7 91 af a5 b6 a5 46 57 1a 8c 96 c0 29 4e | 8e dc e8 e6 2d 92 82 6a 85 02 3a ad 02 27 a8 84 | 8c be 58 97 e6 a0 56 65 e3 b8 11 05 1f 19 4d bc | 68 44 f8 dd 63 ea 12 b6 6d 02 31 e2 3c 83 0c 90 | bb ff 2c 31 86 51 81 cf b9 63 dd 72 3b ea de db | 29 00 00 24 65 91 ed 0a d4 1d 29 43 43 2f 3a 60 | 71 14 cd 7a ee 7f 0c dc 85 e8 36 48 85 1d 6f 9b | 44 a1 8a 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 a7 76 d6 c0 45 d0 97 b1 a7 8c de | d2 b0 18 be bd b1 c7 45 00 00 00 1c 00 00 40 05 | 93 a1 f0 74 30 f5 50 67 ed 62 ea 87 43 47 97 7c | d7 55 2f e9 | libevent_free: release ptr-libevent@0x7fb3600180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a43dd0 | #438 spent 0.0931 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 3e 80 fb 50 ac d5 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #438 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #438 | rejected packet: | 41 3e 80 fb 50 ac d5 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #438: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abd200 | handling event EVENT_RETRANSMIT for parent state #418 | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #418 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #418 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49679.275675; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002921 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a43dd0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #418 | libevent_malloc: new ptr-libevent@0x7fb3600180b0 size 128 "road-eastnet-nonat-166" #418: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #418) | 1c 58 36 d0 b8 a0 d1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 21 69 13 ea 9b 51 f5 f8 3d bc 58 75 ed a9 fd | 17 d1 ac 45 30 9e bb dc f5 67 d6 33 5f f9 21 3b | d7 08 0c bd e4 4c bf b2 e0 66 df d2 39 12 b4 cd | 51 1d 79 99 b2 28 9d 92 25 3d de c7 de 50 60 c0 | b1 e7 b1 2f 20 ba 56 e0 cc d5 d3 89 fb f3 3a 69 | 08 b8 19 34 ad 51 11 33 2c 83 6c 01 df 40 a9 5a | d2 8e ac 81 f5 73 32 a5 92 89 d9 43 53 9f d1 60 | 24 f6 18 43 4f b2 cc 04 87 ab 6f 28 3d 9c e1 be | 1d b6 6f 40 8a 39 f7 27 97 65 7c fa 70 bb d3 47 | 6d aa 41 65 fd 87 5b bf 5a 85 1c ca 2d 31 4b 63 | 3b 57 1d 34 66 19 31 70 16 5e 12 2a 4b 3c f3 aa | c7 b4 1f b1 9b ff 71 77 21 47 b5 ee 99 1f 02 09 | 95 71 68 b7 06 9b 0f 65 04 ee a4 b9 3b 45 42 02 | 7d d2 87 0e 66 c1 75 4c ff 7a f3 83 39 de 46 b2 | 20 fd 8a d9 22 4f c4 77 47 fd 4b 1b 01 cf 2f ef | dc 02 1e 19 bc 0a 3d 9b 32 25 8e a1 b4 27 34 08 | 29 00 00 24 1a d8 6e 71 ca d7 ba 26 1e 49 f1 5f | c1 b0 03 8a 8a 69 67 55 4a ef 6c 1a 26 5d 01 35 | 4b 44 6d e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 63 ba bc 17 58 ec 8f 3d 47 af 87 | d9 d9 f5 4c 16 0e 40 2b 00 00 00 1c 00 00 40 05 | 0c c9 6a 54 72 2b 9b 5b 7b 1a a4 b5 a9 4f 1c b9 | a1 57 0c cc | libevent_free: release ptr-libevent@0x7fb3440180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abd200 | #418 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c 58 36 d0 b8 a0 d1 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #418 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #418 | rejected packet: | 1c 58 36 d0 b8 a0 d1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #418: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #335 | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #335 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #335 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49679.278954; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00544 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abd200 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #335 | libevent_malloc: new ptr-libevent@0x7fb3440180b0 size 128 "road-eastnet-nonat-83" #335: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #335) | 43 a2 0c b8 41 14 fb 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 1a ff fe 66 5c 27 50 3c bb 63 46 9d 4f 02 13 | 90 10 26 6b 8b bb ce 8e f8 b1 4e 76 fe b9 96 cb | 8a 27 62 97 df ca 55 0f 1b 21 02 63 f2 9a 56 cf | af a1 0c 10 6a 33 02 6e 92 2e ca f8 26 1a ae eb | 16 92 9e c4 5b 3e 17 4a 65 79 45 19 ed da 56 2e | 51 d3 90 a7 9f 98 36 5a 61 58 65 de 51 88 f2 d6 | 2c 74 21 5b 26 93 04 1f 9d 42 9f 74 af 5b 84 53 | 88 76 a7 2b 50 71 5f 03 19 11 aa 1d 3f 9a 1b be | 3f 66 50 7a 7c c6 ba 3a 1f b1 9f aa e7 d9 54 d2 | 8e 38 49 1c 3f da 85 98 28 e2 8c e3 a0 7e 8b bb | 1f a5 48 ea b8 af 51 41 c3 b5 72 51 f3 06 99 5a | 76 51 df 7b 88 a9 f4 af 6a 05 b3 e4 b4 4c ac 08 | 4f aa 11 34 cc 49 a5 06 8b 79 a3 52 45 cd 64 d8 | 83 12 a6 eb 44 69 b7 c9 e1 51 9a 09 19 b8 97 03 | 64 d6 b8 43 68 0f ed bf 4f 10 12 04 91 a0 82 30 | b8 e7 e9 9e 27 9b 68 9f 56 43 7c 93 6d 87 a8 e5 | 29 00 00 24 42 02 24 73 b2 25 02 dc ca ad a2 1d | 9e f8 54 e2 15 e2 22 5d 3f 7b 60 32 c9 95 b0 ec | b1 7e 62 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 ff c7 be 47 4f 0e b7 8d ed 50 5b | d9 e3 74 cc de e6 b4 2d 00 00 00 1c 00 00 40 05 | 8d 0a fb 98 6b 40 87 d9 54 5c 96 0f 30 79 eb 55 | 16 93 80 76 | libevent_free: release ptr-libevent@0x7fb3840060f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | #335 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 a2 0c b8 41 14 fb 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #335 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #335 | rejected packet: | 43 a2 0c b8 41 14 fb 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #335: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0581 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34000cc10 | handling event EVENT_RETRANSMIT for parent state #388 | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #388 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #388 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49679.286278; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003717 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #388 | libevent_malloc: new ptr-libevent@0x7fb3840060f0 size 128 "road-eastnet-nonat-136" #388: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #388) | f7 ff cf 56 0b 2d 32 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 17 f0 4b b8 d6 41 9d bc 4a 96 2e 42 ab 77 4e | 7f 54 60 13 56 59 15 20 fc c4 79 98 ae 8f e2 06 | 69 79 8f 5d 63 48 c3 bc 00 b2 f8 7b 8f f4 4d a0 | 8c a9 81 52 3e 4a c4 f8 92 22 05 f0 4d e8 83 0e | f0 26 c0 2c 43 f9 88 43 07 5f 25 9e 50 b5 11 c3 | 73 c8 0e 1f 5c 85 88 1c fc e4 6e f2 9c 07 04 d2 | 2d 14 31 25 c7 f1 fa 00 27 db 06 87 f8 4d 48 60 | a2 9b c5 9a 24 e6 5c 8b 88 aa 13 bf 0e 45 97 1c | aa fb ea 7f ee 38 9d c2 3b dc ac 73 ba e2 2c 03 | 3d dd 91 b1 96 88 2a b1 4e a5 10 5e fe 8f b7 60 | 27 7f 42 c9 c1 97 c4 03 be 93 ba 66 8c 91 b1 77 | 12 50 ef a2 c9 9b f5 15 0b 50 4a dc c3 9e 64 d1 | d8 0c c9 6c 86 d8 1a 40 d2 c3 48 bc 8a 19 fb 47 | d3 3d 4c 63 67 3a 9b 43 54 08 5f 36 9c 29 c6 ed | 7a c1 fa 3a 70 4b f1 9d 3d f8 73 d3 02 37 8f 1c | 0a e4 74 d1 b8 f7 7d a3 cc 04 0d cc 02 1c 9d d7 | 29 00 00 24 d2 a6 cd 06 28 a1 fe ae 1b 89 a2 1d | a1 4a 61 12 14 72 44 a4 a4 a5 e9 38 f2 78 91 07 | 4b 1e 98 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 fc fe 8e 48 65 14 18 f3 7c 80 1c | c9 89 2e 09 96 5d 2c 3e 00 00 00 1c 00 00 40 05 | 5e 49 cb 06 a1 a8 89 d0 e9 f4 c7 34 ac a2 e0 5c | 40 ed 0b 80 | libevent_free: release ptr-libevent@0x7fb340030080 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000cc10 | #388 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 ff cf 56 0b 2d 32 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #388 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #388 | rejected packet: | f7 ff cf 56 0b 2d 32 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #388: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0603 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #192 | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #192 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #192 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49679.305639; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009044 exceeds limit? YES "road-eastnet-nonat-192" #192: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-192" #192: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #444 at 0x557d46ad8f80 | State DB: adding IKEv2 state #444 in UNDEFINED | pstats #444 ikev2.ike started | Message ID: init #444: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #444: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #444; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-192" #444: initiating v2 parent SA to replace #192 | using existing local IKE proposals for connection road-eastnet-nonat-192 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 444 for state #444 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34000cc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #444 | libevent_malloc: new ptr-libevent@0x7fb340030080 size 128 | #444 spent 0.0767 milliseconds in ikev2_parent_outI1() | RESET processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 resuming | crypto helper 9 starting work-order 444 for state #444 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 444 | start processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #192 ikev2.ike failed too-many-retransmits | pstats #192 ikev2.ike deleted too-many-retransmits | #192 spent 2.66 milliseconds in total | [RE]START processing: state #192 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-192" #192: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #192: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #192 "road-eastnet-nonat-192" #192: deleting IKE SA for connection 'road-eastnet-nonat-192' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-192' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-192 | State DB: deleting IKEv2 state #192 in PARENT_I1 | parent state #192: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #192 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 444 time elapsed 0.000947 seconds | libevent_free: release ptr-libevent@0x7fb368009640 | (#444) spent 0.954 milliseconds in crypto helper computing work-order 444: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 444 for state #444 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | scheduling resume sending helper answer for #444 | libevent_malloc: new ptr-libevent@0x7fb378034680 size 128 | in statetime_stop() and could not find #192 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 9 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-192 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-192" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-192' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-192" | stop processing: connection "road-eastnet-nonat-192" (in initiate_a_connection() at initiate.c:349) | spent 0.0586 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #444 | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 444 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #444 | **emit ISAKMP Message: | initiator cookie: | 7f 9a e3 30 35 a2 50 3a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-192 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 93 73 44 16 cd dc 6d af 1e 52 47 5f 1e bd fa ee | ikev2 g^x 64 00 7c 0c 09 cd 6a b9 96 7a 9e fd 7b 60 d3 11 | ikev2 g^x 94 7f f3 14 ab de fc 67 4d 77 8c ed ae 35 5e 21 | ikev2 g^x 92 1a 34 1f 52 96 c6 b4 82 cf e2 da a3 5d a8 40 | ikev2 g^x 55 b6 be b1 02 f7 4f 09 53 8a 9a 82 43 68 c5 03 | ikev2 g^x 91 79 7b fa ca eb 01 ae de 9c b8 57 af 0c ad 92 | ikev2 g^x 90 f7 80 a3 5f 1b 76 77 00 b6 f8 6e 45 fc bc 6c | ikev2 g^x 08 e0 42 31 50 bd 6d b4 9c ee e1 eb b4 38 73 a9 | ikev2 g^x 34 e4 98 23 d2 4d e0 d9 b6 c6 f6 dc 56 58 4e 20 | ikev2 g^x 84 e1 d2 8f 09 7f 4a 9d 26 b0 f3 d6 00 33 87 e7 | ikev2 g^x 4a de ea 2f 4a 53 b4 0f 48 62 38 e9 50 42 17 64 | ikev2 g^x 60 9a 88 18 4e 23 6b 6a 5a a4 6b 23 ad 33 67 82 | ikev2 g^x 97 a8 79 73 5f c7 02 96 5e 91 0e 40 d6 4e f8 b3 | ikev2 g^x d9 30 5c 69 30 3f 5d 5d 8a 33 e5 82 75 a6 f8 01 | ikev2 g^x e5 10 de e1 1f 27 d1 2a e8 d2 12 a6 bb 52 29 5c | ikev2 g^x 7e c1 67 58 19 ab fb 58 65 a2 55 1e 99 be f5 8d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2a ad 1b 39 f3 fd f9 42 4c 00 4a 5c ed 00 f4 3a | IKEv2 nonce 31 ea eb b5 54 5a 5c 9d a2 7d 7c c4 61 a7 b5 14 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7f 9a e3 30 35 a2 50 3a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c0 | natd_hash: port= 01 f4 | natd_hash: hash= 37 d0 f0 6f a1 ca 95 cb 19 9f 38 2a 49 20 b8 20 | natd_hash: hash= 36 38 5c 50 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 37 d0 f0 6f a1 ca 95 cb 19 9f 38 2a 49 20 b8 20 | Notify data 36 38 5c 50 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7f 9a e3 30 35 a2 50 3a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 75 b6 79 50 7c d3 43 75 20 ac ac 20 ab c2 0f 0e | natd_hash: hash= 7d 73 a1 76 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 75 b6 79 50 7c d3 43 75 20 ac ac 20 ab c2 0f 0e | Notify data 7d 73 a1 76 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #444 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #444: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #444 to 4294967295 after switching state | Message ID: IKE #444 skipping update_recv as MD is fake | Message ID: sent #444 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-192" #444: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.192:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #444) | 7f 9a e3 30 35 a2 50 3a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 73 44 16 cd dc 6d af 1e 52 47 5f 1e bd fa ee | 64 00 7c 0c 09 cd 6a b9 96 7a 9e fd 7b 60 d3 11 | 94 7f f3 14 ab de fc 67 4d 77 8c ed ae 35 5e 21 | 92 1a 34 1f 52 96 c6 b4 82 cf e2 da a3 5d a8 40 | 55 b6 be b1 02 f7 4f 09 53 8a 9a 82 43 68 c5 03 | 91 79 7b fa ca eb 01 ae de 9c b8 57 af 0c ad 92 | 90 f7 80 a3 5f 1b 76 77 00 b6 f8 6e 45 fc bc 6c | 08 e0 42 31 50 bd 6d b4 9c ee e1 eb b4 38 73 a9 | 34 e4 98 23 d2 4d e0 d9 b6 c6 f6 dc 56 58 4e 20 | 84 e1 d2 8f 09 7f 4a 9d 26 b0 f3 d6 00 33 87 e7 | 4a de ea 2f 4a 53 b4 0f 48 62 38 e9 50 42 17 64 | 60 9a 88 18 4e 23 6b 6a 5a a4 6b 23 ad 33 67 82 | 97 a8 79 73 5f c7 02 96 5e 91 0e 40 d6 4e f8 b3 | d9 30 5c 69 30 3f 5d 5d 8a 33 e5 82 75 a6 f8 01 | e5 10 de e1 1f 27 d1 2a e8 d2 12 a6 bb 52 29 5c | 7e c1 67 58 19 ab fb 58 65 a2 55 1e 99 be f5 8d | 29 00 00 24 2a ad 1b 39 f3 fd f9 42 4c 00 4a 5c | ed 00 f4 3a 31 ea eb b5 54 5a 5c 9d a2 7d 7c c4 | 61 a7 b5 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 d0 f0 6f a1 ca 95 cb 19 9f 38 2a | 49 20 b8 20 36 38 5c 50 00 00 00 1c 00 00 40 05 | 75 b6 79 50 7c d3 43 75 20 ac ac 20 ab c2 0f 0e | 7d 73 a1 76 | state #444 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb340030080 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34000cc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #444 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 | #444 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49679.307176 | resume sending helper answer for #444 suppresed complete_v2_state_transition() and stole MD | #444 spent 0.341 milliseconds in resume sending helper answer | stop processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb378034680 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 9a e3 30 35 a2 50 3a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #444 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #444 | rejected packet: | 7f 9a e3 30 35 a2 50 3a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c0 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #444: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a84000 | handling event EVENT_RETRANSMIT for parent state #439 | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #439 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #439 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49679.311327; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500445 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378046090 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #439 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 "road-eastnet-nonat-187" #439: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #439) | 47 50 75 67 1d 00 52 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 10 e6 27 54 79 a5 06 ab 7b 5d 27 c9 72 11 8a | be 8d 9d bf 52 e0 ac e0 58 f4 00 83 0a 18 2a d4 | 41 71 ec e9 2e f0 05 ec e8 a2 ec d2 28 ce f8 d4 | e5 81 d8 3c 87 bc 89 6a 8b 0a 1a e2 d3 eb 38 44 | e6 af 0a 47 aa 17 06 2d e7 33 df 52 16 8d b3 fb | d9 67 8e 07 e3 c9 9e 52 cf 8d 56 fb 7c c2 93 d9 | 9d 49 6e f0 2c fb ae b5 5c 7d 08 de 63 dc 9b 39 | 2d fb 3d b8 63 14 a9 ce d9 19 af ff bb a7 b1 81 | 41 c7 41 67 e7 53 2b fa 68 10 a5 13 3f f8 0f e7 | 33 85 43 eb a8 54 d5 5b fd f4 a1 1e d5 4f 32 99 | 86 f6 ec 22 05 a8 98 ec cb 6f de 01 77 3a 63 2b | 85 0f 08 c2 e9 6d 60 39 18 10 c9 3c 04 a6 69 c0 | 90 8a 6f 1c 7a 2e 85 ad 4f 29 5f 48 49 12 08 e4 | 72 3f d7 cc 42 6d 91 5a f7 f3 7b 44 dc 38 f7 05 | b2 bf 70 89 ab 24 52 cd cd c1 b3 61 99 9d a9 28 | e2 c4 12 1d de cd 37 64 c2 e0 70 28 45 34 de 67 | 29 00 00 24 d9 2f 24 9b 75 f5 ca 1e 2e 7d f4 06 | 41 a2 89 f3 ae c7 ae 61 65 4e 5f 7f 65 dd c2 12 | ae ae 3a 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 fd b4 2f 23 17 b8 9b d8 0c 2a 45 | b9 34 13 eb df 7c 42 33 00 00 00 1c 00 00 40 05 | f1 b3 a4 02 7a 60 50 36 46 44 d9 88 f9 29 1a 5f | aa 01 32 cb | libevent_free: release ptr-libevent@0x7fb338023a60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a84000 | #439 spent 0.0942 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 50 75 67 1d 00 52 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #439 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #439 | rejected packet: | 47 50 75 67 1d 00 52 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #439: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acab00 | handling event EVENT_RETRANSMIT for parent state #432 | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #432 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #432 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49679.319607; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001631 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #432 | libevent_malloc: new ptr-libevent@0x7fb338023a60 size 128 "road-eastnet-nonat-180" #432: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #432) | 9e 5c f1 81 be b3 cc bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 a7 44 cc 56 0f 1f a1 57 e9 97 90 cf 04 1e 5b | e0 0e 7b 47 ef c0 b0 6b 28 ba 80 69 c9 1b 38 ab | 77 4e c9 e0 e5 8e ac 7e e2 16 87 36 5e 9c 78 7a | 88 e7 f8 df f3 43 04 06 de 41 bf fc 2c aa 5f 0d | 69 d9 8b 25 79 3a 55 bd c2 56 12 76 16 fc d9 a5 | 9c 10 c0 69 f3 49 ac 1b 12 69 8b 54 81 c5 66 b4 | ce 87 81 ab 4c 4a 3c be 13 a8 a6 c4 c4 ee d3 f3 | e4 6c 08 82 35 56 98 d0 52 0e 3c b5 9f cf 94 45 | b1 ff 7d 1f 92 70 cf 8e d1 c1 37 a6 37 65 ee ce | 20 a0 2f 74 83 20 8b e8 b7 59 69 69 3d 2e af d9 | 5c 5b c8 f5 d1 97 f9 58 4c 4b b5 5a 72 21 7a ff | 15 e2 cf de 63 20 f5 1b 33 44 6d 86 26 89 fe a9 | ef 26 23 fc 07 42 35 ac 53 4d 00 7f 36 93 50 78 | ef 61 a9 fd 99 64 73 27 a0 12 f0 71 a5 ef 01 e0 | f5 fa 65 6f 20 9b da c4 8d 30 72 f1 87 a2 6d e6 | e6 3b 2c 57 3c e1 2d 99 93 66 b2 b3 c7 c3 45 c6 | 29 00 00 24 97 c3 cd 2d d6 91 ce 3c 3a 10 07 b4 | 90 19 a9 e3 82 ea 52 87 8f 88 50 41 d4 a6 e1 e6 | 2e 3c 74 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b b0 51 e2 58 5c b1 15 1d eb ed 97 | 2a 88 5d 96 2e c9 a1 f8 00 00 00 1c 00 00 40 05 | 78 1a 23 ab e8 fa 74 f8 b4 b9 8c 5c d8 d3 f5 f5 | 1c a1 eb 5a | libevent_free: release ptr-libevent@0x7fb344034470 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab00 | #432 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e 5c f1 81 be b3 cc bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #432 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #432 | rejected packet: | 9e 5c f1 81 be b3 cc bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #432: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #336 | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #336 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #336 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49679.339867; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005029 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab00 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #336 | libevent_malloc: new ptr-libevent@0x7fb344034470 size 128 "road-eastnet-nonat-84" #336: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #336) | a0 3a 99 80 e1 01 63 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 8b 11 e3 72 10 b4 96 46 45 1f 06 8b cb 20 43 | 48 5b dc 9f 22 0b 19 f0 6e 5a 41 4f 7b 66 7e 47 | 17 91 cc cc 24 8c c0 85 32 b7 be 23 d1 6d 12 65 | 00 df c3 47 48 17 d9 93 47 4f 9d 2a 81 88 4f 2c | 1f 98 ac a8 85 56 dd 1e 45 4f f7 f9 78 59 b2 90 | d0 96 3c c9 92 dc 80 e7 ee 9e 9f f3 a3 42 a0 87 | f4 8c 84 d8 38 fe 2c f0 0d 7c 15 54 23 ab a7 7c | ab e1 53 7c ba 26 57 e2 9b 0a 0d 44 c4 7c f6 bd | 50 8c ae 85 b6 fa 6e 51 9e 4d 32 a8 2f 5f b7 94 | 33 ef 3d 6b de 80 a9 44 cb a5 48 1f 9d d9 3e 40 | c2 f4 df a8 c7 43 1a 85 1e 99 1c be ad 10 a3 44 | af 83 22 29 2a d8 4c fc aa 9e 40 9e 83 a1 f3 2d | d3 6b 55 b5 8b 94 57 96 1f 06 03 b7 e8 07 4a dc | 94 d8 f3 f3 15 26 15 42 b7 cd 81 18 11 03 dc 3a | 4e 46 ec 2a eb 11 4a a9 f5 ce 5d 26 8e 40 7e f7 | fb 5d b7 76 23 d0 05 cb 25 8d 85 d4 e7 63 e5 fe | 29 00 00 24 20 77 67 42 c0 5c 2e 2c 4f 51 1c e3 | 6e 76 b6 ed 2f 6c dc 89 e9 07 aa bc e6 7b f3 86 | a7 c4 a8 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c e2 e4 55 b2 1e b0 cb dc 5a 76 de | 82 37 47 8c ee 4e fe 03 00 00 00 1c 00 00 40 05 | 1d 8c 0e 3c 37 8c 24 ca 1e c1 4b a0 97 2b 99 7f | 60 3a d2 7b | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #336 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 3a 99 80 e1 01 63 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #336 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #336 | rejected packet: | a0 3a 99 80 e1 01 63 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #336: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afd000 | handling event EVENT_RETRANSMIT for parent state #419 | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #419 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #419 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49679.342137; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002793 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #419 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 "road-eastnet-nonat-167" #419: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #419) | 13 42 1a 05 2a a9 f4 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 82 ba 57 e5 18 7f 6d c1 4e 6c 32 74 c7 8d bc | fa 9e 5f 85 57 91 bd e7 d1 f6 a5 cc 56 d4 ef 2c | 82 2b a5 62 6a 68 41 f0 a0 92 fa 2e 12 6a 74 95 | 56 98 09 32 67 8d a9 cf ce e8 4b 16 ca ae fd 57 | 33 7d 99 6a 29 1d 52 35 0b 5c 55 de 21 8b fe 4c | 64 ea 17 c4 c0 64 cd 47 31 4b 7a 08 f8 bd 37 3f | 72 ba 30 cd 0e c2 9d 0f e4 8b 3f b8 4c 2a d4 69 | de 4a 7f 8a a8 eb c0 7f 8f b2 10 0b d8 35 aa 5e | c8 ac 23 ce e4 c8 52 08 91 9c 13 ce 38 17 f1 d8 | db ec 31 93 d6 0d 09 93 5b d1 dc 9c 92 3b e5 29 | 17 5b e6 ee 7f f5 fb 3d 38 b5 23 c0 cf 25 d5 5b | 67 0a 2b 07 fd 68 8f 4c 74 c9 96 0b 9b 44 5c 6b | 0e 2d 70 4b 98 d5 d7 b9 54 dc 11 1e 19 cb 73 3f | 22 ca 80 46 28 a8 4a 20 64 29 4c 39 a5 b7 25 84 | 93 fd 4d 3a a6 fa ab c2 68 fc 5d fb 3c 7c 06 72 | eb 28 8a f5 09 69 59 c1 01 26 88 c4 c6 36 f6 6c | 29 00 00 24 83 3f e0 e8 30 90 0c c2 fd 9a 5c 8a | 88 7b e1 27 5d 3c cc 26 1c 41 3f 95 a3 1e 69 69 | b9 67 17 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 b9 c0 cf 3f 29 65 8b 9d 3a 51 6d | 0f 16 20 c0 79 fc 1d 37 00 00 00 1c 00 00 40 05 | 67 f3 84 dc 78 2e 75 89 44 b5 31 a8 97 13 e9 a5 | b9 b4 3a e4 | libevent_free: release ptr-libevent@0x7fb3500096b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afd000 | #419 spent 0.0983 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 13 42 1a 05 2a a9 f4 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #419 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #419 | rejected packet: | 13 42 1a 05 2a a9 f4 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #419: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a50110 | handling event EVENT_RETRANSMIT for parent state #389 | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #389 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #389 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49679.35538; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003575 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afd000 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #389 | libevent_malloc: new ptr-libevent@0x7fb3500096b0 size 128 "road-eastnet-nonat-137" #389: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #389) | 85 39 d1 4d 8b 00 62 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 35 45 30 eb 5a 4e 31 22 74 c6 b3 a4 12 3f 11 | d4 ed 4e ed d9 b9 2a b5 45 b7 bf 2f c4 12 8d f6 | b6 45 8b e7 42 00 82 88 9b 5f 9d ac d3 62 85 20 | 80 d9 92 f9 48 6c 61 18 10 02 b3 60 4a 67 bc f5 | 7f f3 06 fd dd d9 85 7b 8a 61 74 3e b0 54 86 48 | be 68 e1 1d 71 86 b6 10 0b 53 c9 4b c6 1d e3 32 | 0e 9d a0 c1 c2 ea 3f 8d 85 11 04 6b 8c a8 06 e2 | 8a a8 28 44 e2 f4 2d 9b 79 2e 3b 95 17 25 de 38 | b1 b1 27 54 d1 ca 51 cb 05 e4 51 d4 10 05 5a 73 | f7 6e 3f 1e 04 83 05 45 32 c8 e5 83 91 5b d4 46 | cb 00 53 49 8b aa e2 4a 03 fb ec 92 bd 9a d8 ef | c2 f7 13 0e ac 87 cd a2 d6 11 8a 4d b3 76 15 63 | 7e 5d ad ad 19 54 b0 8b cf 33 56 db af c2 f6 2f | 46 e8 3c 3e 30 75 95 b6 ad 6b 4c bd b8 1c f7 d8 | 42 48 45 24 c4 28 be c8 24 78 21 7b 8c a1 5f d5 | 3c 68 c6 b7 92 f7 dd 99 0c 2e 4d 49 3c 4e 34 53 | 29 00 00 24 d4 02 58 a1 15 41 bf 82 7e 15 0d c9 | ca 5c 1f 96 c8 8b 6c 22 75 5c 08 57 5f 06 6b 32 | fe f8 a7 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 ad 3c 1a 7d 4c cc 56 a6 70 0e c9 | dd 4d 28 a6 f3 20 1b cb 00 00 00 1c 00 00 40 05 | e7 a3 be 04 a3 45 3b 11 1b f8 e3 89 48 23 a2 23 | c1 e1 2a f8 | libevent_free: release ptr-libevent@0x7fb37404b5c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a50110 | #389 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 39 d1 4d 8b 00 62 4d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #389 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #389 | rejected packet: | 85 39 d1 4d 8b 00 62 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #389: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0718 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aeb540 | handling event EVENT_RETRANSMIT for parent state #433 | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #433 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #433 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49679.391761; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001448 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a50110 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #433 | libevent_malloc: new ptr-libevent@0x7fb37404b5c0 size 128 "road-eastnet-nonat-181" #433: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #433) | 23 e1 68 16 6a df f6 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 84 65 c0 62 66 6e cb 40 26 80 c7 11 7a b1 77 | 8f 7b 14 21 bf 47 61 54 80 80 4f 40 4b 14 8f 6c | 7f 20 33 7a 32 bd 20 39 a9 e7 e4 8c 88 5e 71 0c | b4 34 07 ea 3b 74 7a 69 d0 40 c2 8a ce 14 e0 29 | f7 f8 fb 45 30 ce 02 50 b6 4b d6 fe ce bd d7 fd | d9 af 2b 59 d1 37 75 ed 60 7b 97 1e bb b5 21 2d | 82 af 47 6c fd b3 b6 b4 1a e4 0b 54 80 93 91 9a | 7c 67 57 2c 37 bc 4a ba 6c 68 8e 7c 69 ae 25 35 | f6 73 82 3e e0 ba 6e 40 b9 c2 c0 d3 bd 9e 54 14 | 66 2e 22 5d 66 78 db 66 26 82 fa c1 4b 7c 9e 34 | 57 34 cb 3c 56 da ee df b8 34 f8 14 c2 9b 3b a3 | d6 4c a8 fb 55 30 94 15 c4 87 b2 b9 65 70 e9 f6 | 5f 9b ae 28 67 59 78 af d0 1e d8 d4 2a 4a 91 32 | 25 06 fb ff be c0 6a 2f e3 60 0d e2 75 08 92 ca | 55 96 9f 26 37 e4 6c 28 e7 f1 08 78 9b ac 4e 5b | 3b 11 9e bf 95 59 23 96 7a 89 87 42 71 70 51 75 | 29 00 00 24 bc 75 9d d0 ff b6 ae 90 e3 29 fd fb | 27 30 03 9d 8d 6e b5 df cd e3 e0 48 35 b6 7e d4 | 5d 99 20 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 1d b4 53 81 6d 12 3c 62 05 25 08 | f2 c7 73 02 9c 59 76 4d 00 00 00 1c 00 00 40 05 | 9b bb 33 9d d0 7d d5 98 fe 91 d5 bc 36 50 81 f5 | 28 37 64 3d | libevent_free: release ptr-libevent@0x7fb37c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aeb540 | #433 spent 0.21 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 e1 68 16 6a df f6 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #433 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #433 | rejected packet: | 23 e1 68 16 6a df f6 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #433: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.116 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5da90 | handling event EVENT_RETRANSMIT for parent state #193 | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #193 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #193 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49679.399235; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.015557 exceeds limit? YES "road-eastnet-nonat-193" #193: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-193" #193: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #445 at 0x557d46ada540 | State DB: adding IKEv2 state #445 in UNDEFINED | pstats #445 ikev2.ike started | Message ID: init #445: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #445: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #445; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-193" #445: initiating v2 parent SA to replace #193 | using existing local IKE proposals for connection road-eastnet-nonat-193 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 445 for state #445 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aeb540 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #445 | libevent_malloc: new ptr-libevent@0x7fb37c035930 size 128 | #445 spent 0.067 milliseconds in ikev2_parent_outI1() | RESET processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #193 ikev2.ike failed too-many-retransmits | pstats #193 ikev2.ike deleted too-many-retransmits | #193 spent 2.66 milliseconds in total | crypto helper 10 resuming | [RE]START processing: state #193 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-193" #193: deleting state (STATE_PARENT_I1) aged 64.017s and NOT sending notification | crypto helper 10 starting work-order 445 for state #445 | parent state #193: PARENT_I1(half-open IKE SA) => delete | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 445 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #193 "road-eastnet-nonat-193" #193: deleting IKE SA for connection 'road-eastnet-nonat-193' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-193' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-193 | State DB: deleting IKEv2 state #193 in PARENT_I1 | parent state #193: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #193 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 445 time elapsed 0.000594 seconds | libevent_free: release ptr-libevent@0x7fb36c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5da90 | in statetime_stop() and could not find #193 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#445) spent 0.602 milliseconds in crypto helper computing work-order 445: ikev2_outI1 KE (pcr) | processing global timer EVENT_REVIVE_CONNS | crypto helper 10 sending results from work-order 445 for state #445 to event queue | scheduling resume sending helper answer for #445 Initiating connection road-eastnet-nonat-193 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7fb37c034680 size 128 | crypto helper 10 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-193" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-193' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-193" | stop processing: connection "road-eastnet-nonat-193" (in initiate_a_connection() at initiate.c:349) | spent 0.075 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #445 | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 445 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #445 | **emit ISAKMP Message: | initiator cookie: | b4 2e 78 cc c5 f6 9b 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-193 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5a ba 44 5e e8 04 0b 1d 80 c6 75 3f 8a bb 68 32 | ikev2 g^x 06 11 b8 93 58 a0 e3 d0 41 9a dc df 91 ac 0b 46 | ikev2 g^x b8 6d fc ac c1 e9 09 52 48 47 7e 50 d3 96 46 49 | ikev2 g^x 4c db ea ed bd 20 06 58 05 cd d9 91 57 1d 80 4d | ikev2 g^x 27 35 e2 86 24 5f 4e 32 bf 57 32 fe 52 fe 8f 11 | ikev2 g^x 64 dd f6 c1 cf a0 23 81 27 d1 05 22 c7 e8 81 e4 | ikev2 g^x 67 a9 8c 32 ef 56 b6 40 b1 5f 41 a6 60 fd 00 92 | ikev2 g^x 0a e3 78 9b f2 03 2c 98 1e 8c fc 31 fc 9b e2 d2 | ikev2 g^x 0c f9 17 3c fe e3 b4 da 8e 06 ef 92 fc 84 24 e8 | ikev2 g^x 41 6f 79 14 e9 fb a1 a0 07 48 de 12 d6 84 2d 7e | ikev2 g^x 90 30 a3 38 3d 28 16 c5 17 69 90 4c 1a 42 aa f9 | ikev2 g^x c8 01 fd 3b 2e 46 f9 3b 3c c2 87 e4 f3 79 4f c7 | ikev2 g^x 11 59 a6 e8 26 10 94 45 c9 46 e9 8c ab e9 1d 28 | ikev2 g^x 48 da 5b 23 c8 48 65 23 9b 45 8d ab 8d 58 2e 78 | ikev2 g^x 34 e4 38 1d 80 97 ed 49 5c 38 3d af 3b ec ad d6 | ikev2 g^x 83 24 62 c1 f1 7d c9 59 93 3c f3 1e db d1 30 e4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 43 99 24 d2 66 51 b3 d4 1c 15 bd 40 1f a6 87 a7 | IKEv2 nonce 4d 01 75 d0 ba dd bc 61 a0 08 b2 b5 88 d8 85 97 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b4 2e 78 cc c5 f6 9b 58 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c1 | natd_hash: port= 01 f4 | natd_hash: hash= e4 20 6b 9d 83 bc 81 44 79 c4 11 cc c3 90 0e 2f | natd_hash: hash= 55 7c a4 51 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e4 20 6b 9d 83 bc 81 44 79 c4 11 cc c3 90 0e 2f | Notify data 55 7c a4 51 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b4 2e 78 cc c5 f6 9b 58 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c1 5a b3 1c bf d8 ae 9a 12 a9 ee 41 24 11 a3 d4 | natd_hash: hash= f8 37 2e 14 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c1 5a b3 1c bf d8 ae 9a 12 a9 ee 41 24 11 a3 d4 | Notify data f8 37 2e 14 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #445 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #445: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #445 to 4294967295 after switching state | Message ID: IKE #445 skipping update_recv as MD is fake | Message ID: sent #445 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-193" #445: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.193:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #445) | b4 2e 78 cc c5 f6 9b 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a ba 44 5e e8 04 0b 1d 80 c6 75 3f 8a bb 68 32 | 06 11 b8 93 58 a0 e3 d0 41 9a dc df 91 ac 0b 46 | b8 6d fc ac c1 e9 09 52 48 47 7e 50 d3 96 46 49 | 4c db ea ed bd 20 06 58 05 cd d9 91 57 1d 80 4d | 27 35 e2 86 24 5f 4e 32 bf 57 32 fe 52 fe 8f 11 | 64 dd f6 c1 cf a0 23 81 27 d1 05 22 c7 e8 81 e4 | 67 a9 8c 32 ef 56 b6 40 b1 5f 41 a6 60 fd 00 92 | 0a e3 78 9b f2 03 2c 98 1e 8c fc 31 fc 9b e2 d2 | 0c f9 17 3c fe e3 b4 da 8e 06 ef 92 fc 84 24 e8 | 41 6f 79 14 e9 fb a1 a0 07 48 de 12 d6 84 2d 7e | 90 30 a3 38 3d 28 16 c5 17 69 90 4c 1a 42 aa f9 | c8 01 fd 3b 2e 46 f9 3b 3c c2 87 e4 f3 79 4f c7 | 11 59 a6 e8 26 10 94 45 c9 46 e9 8c ab e9 1d 28 | 48 da 5b 23 c8 48 65 23 9b 45 8d ab 8d 58 2e 78 | 34 e4 38 1d 80 97 ed 49 5c 38 3d af 3b ec ad d6 | 83 24 62 c1 f1 7d c9 59 93 3c f3 1e db d1 30 e4 | 29 00 00 24 43 99 24 d2 66 51 b3 d4 1c 15 bd 40 | 1f a6 87 a7 4d 01 75 d0 ba dd bc 61 a0 08 b2 b5 | 88 d8 85 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 20 6b 9d 83 bc 81 44 79 c4 11 cc | c3 90 0e 2f 55 7c a4 51 00 00 00 1c 00 00 40 05 | c1 5a b3 1c bf d8 ae 9a 12 a9 ee 41 24 11 a3 d4 | f8 37 2e 14 | state #445 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aeb540 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5da90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #445 | libevent_malloc: new ptr-libevent@0x7fb37c035930 size 128 | #445 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49679.400456 | resume sending helper answer for #445 suppresed complete_v2_state_transition() and stole MD | #445 spent 0.36 milliseconds in resume sending helper answer | stop processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c034680 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 2e 78 cc c5 f6 9b 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #445 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #445 | rejected packet: | b4 2e 78 cc c5 f6 9b 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c1 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #445: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c018460 | handling event EVENT_RETRANSMIT for parent state #337 | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #337 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #337 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49679.404643; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004349 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c01d710 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #337 | libevent_malloc: new ptr-libevent@0x7fb36c0300e0 size 128 "road-eastnet-nonat-85" #337: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #337) | ed 63 58 23 fd c1 76 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 96 54 84 2e e5 91 43 31 05 bf 8d 46 38 09 77 | 34 82 01 41 07 ba 77 ae 0e 58 56 59 e8 aa 03 3b | 7e fb 3d 6d 4d 59 d3 86 8a 20 2c b2 06 03 8a 41 | 33 cf 0e 06 87 87 a2 ab d5 f2 99 a7 84 cd 05 cf | ec d9 29 84 36 3e fc 29 32 e5 d2 77 7d a0 28 f8 | d1 0e 51 2f 73 28 bd 60 66 cf 7b 5c e8 76 7f ee | 0b 3f cc 47 13 a2 8f 86 8a 1d a1 57 96 4b 8e 1d | 54 09 0b 8b e7 94 12 ea 68 37 a0 5a 37 1b 43 96 | 9e 43 fb b9 f4 e3 a4 14 cb 49 50 02 95 69 45 10 | 4f 12 ab e9 0f 1f 01 01 a4 c3 ef 65 1e 2e cf e7 | 08 9d 2c 27 7f 64 fb 91 ba e9 80 4e 20 48 a7 46 | 4e 2b b0 83 ea 9c e6 04 02 2b 8c 1a 52 db c6 17 | d5 9e 92 ca bd cc 2d 80 e6 b4 24 b9 79 b6 76 9a | 0e 8f 39 57 ee 2c 0b 47 20 f0 82 f0 87 6e 0d 85 | f9 ab b8 d1 c1 07 ac ad 62 5b 5a 42 cc c5 f9 04 | de 15 7e d8 03 4b a1 c4 30 01 43 b8 8d 24 8e 44 | 29 00 00 24 47 35 e2 69 12 71 4e bf 5f ce fb f5 | 4b 5d 78 7a 40 67 4e 2b 89 1a 4f 82 42 7d 07 9d | 99 e5 3f 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 a6 ae 66 a0 2e 4a eb 14 83 41 42 | 9c b3 ed 9b 1a cc 9f 9b 00 00 00 1c 00 00 40 05 | 09 b5 68 86 30 d7 ba 9d 35 40 11 f6 5c 40 95 0a | 79 fe 98 fe | libevent_free: release ptr-libevent@0x7fb34c01a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c018460 | #337 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 63 58 23 fd c1 76 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #337 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #337 | rejected packet: | ed 63 58 23 fd c1 76 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #337: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a49450 | handling event EVENT_RETRANSMIT for parent state #420 | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #420 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #420 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49679.415934; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00301 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #420 | libevent_malloc: new ptr-libevent@0x7fb34c01a4e0 size 128 "road-eastnet-nonat-168" #420: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #420) | 38 01 94 6e be 3a 28 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c e6 6f 10 c2 18 44 e2 34 88 94 b1 6e ad 96 2f | 7e f2 2f d5 05 74 10 9d b0 ed 16 ba d1 bb 6a 81 | 3b 36 bb 33 64 6a 4b 49 98 6b 61 6b 38 a7 f0 f9 | 85 f1 ea 1f 82 7f 75 2e b8 87 48 fb ca 42 ad 54 | 59 d3 d4 98 fc e3 db 9e 06 1c 4d 0a 68 e2 82 b1 | b4 79 61 9d ef 49 6d 74 7e f5 a5 55 9d ac 1f 86 | bc 38 61 c3 ec 65 14 03 d9 05 f4 3a a0 cf b9 81 | ea f9 8e 26 2a 33 57 de f0 0c 7b 3a 31 62 59 7d | 0a 51 80 e9 b3 45 96 f0 0f c4 ba 78 af bf d6 5a | 60 67 ef 7e 3d 35 d6 cc 9c c8 4a 58 b2 0f d6 d7 | a4 37 58 a2 99 5b 23 f1 45 8d 6c d3 30 bc 9f 64 | 97 c5 ef 20 d5 b9 a3 78 d6 da 52 f2 da 0c 22 0a | a7 af 15 bc c7 88 8c 82 a8 a3 ee 2f 8a ad 53 b2 | a0 1b 8a 3b ba 0a 34 48 34 2f ad da 72 63 db 61 | 9e b4 c4 95 69 50 db f5 62 4c 82 15 0a a2 7d 3d | 5b 37 5a 63 75 a1 9d 88 2f 4d 72 7d 91 14 f6 58 | 29 00 00 24 a2 fc 3c 40 ce 99 e3 62 f3 97 ac 0a | d5 d9 6a e9 cb 20 69 0b 55 a4 ef ef 10 02 28 ef | bc 3f 93 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 0a f7 67 8f e9 41 30 08 68 43 0c | 01 13 f9 c1 61 fa 63 aa 00 00 00 1c 00 00 40 05 | ef 1c 5b ca 2a 2f ea 7b fb 12 61 31 e7 f2 9d c7 | 67 58 3e 74 | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a49450 | #420 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 01 94 6e be 3a 28 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #420 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #420 | rejected packet: | 38 01 94 6e be 3a 28 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #420: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35804b810 | handling event EVENT_RETRANSMIT for parent state #440 | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #440 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #440 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49679.425215; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500323 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a49450 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #440 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 "road-eastnet-nonat-188" #440: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #440) | 59 19 97 9a e3 8b 77 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 57 86 98 5b 96 d3 77 6a 73 d3 f1 79 83 3d b1 | 25 c0 29 5c f0 c3 a2 69 ec 6a e3 4d 6f cd 0b d7 | 79 9c cb d7 34 fa 78 1e b1 98 79 da 0f ac 84 e0 | 73 c1 06 f8 21 3a aa 0a f4 0e 4d f7 bf 24 b0 23 | 75 13 78 7d aa 97 d6 f9 8b f1 96 43 1f bc e1 e6 | da 7d fb 41 ce 93 49 6e e1 1e f3 c1 41 08 43 3b | 3e e8 ed 1f 4e 08 d4 85 64 9e d1 11 dc 50 e9 45 | 7f a7 7d f7 2b 35 cf 9a d1 cb 6a 05 4f 83 e6 fd | 42 8f 63 21 ff 80 40 b7 e2 26 41 31 52 b6 49 a0 | 77 11 47 93 5f a3 3d 9c 1c 0e 6f 2b 0b b6 1d 42 | d3 1d 45 13 c6 e8 f2 a5 8e c9 4c 05 0a 08 aa 82 | ac e4 27 b7 b2 77 b7 80 38 58 3d 68 92 fd 5e 6a | 38 c8 de 6a 08 ae c9 2d 85 13 3c b9 b9 2c 91 48 | 64 74 4e 5e a1 07 a6 ff 63 67 43 99 ae 3a 36 0a | 11 4e c4 4f 1a ab 97 3f 39 c8 63 d0 49 b4 29 fe | 77 df c5 36 12 ae 96 21 4b 67 cf 07 6a b0 e1 5d | 29 00 00 24 82 fb 4c 4b 30 7b 16 3b 6a c7 2b 62 | cc 7b b0 14 ea 16 0d 74 ad 0f c2 be 8d 39 6e c0 | 2a 84 9f 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 37 6d ef 85 b5 1f 0e 28 d0 8a e5 | d5 d3 1d e3 5f d5 cf 90 00 00 00 1c 00 00 40 05 | 72 f1 07 bf 82 38 a8 c2 32 ec a4 d6 59 1b 7c de | 06 08 a2 81 | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35804b810 | #440 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 59 19 97 9a e3 8b 77 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #440 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #440 | rejected packet: | 59 19 97 9a e3 8b 77 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #440: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388043350 | handling event EVENT_RETRANSMIT for parent state #390 | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #390 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #390 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49679.42654; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003586 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35804b810 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #390 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 "road-eastnet-nonat-138" #390: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #390) | f0 59 d0 2d 97 92 84 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 a6 bc 87 d6 62 82 0f 67 22 b6 ee c6 47 37 24 | 35 77 67 9d 2b 69 4d 68 d9 17 5e 4e 5b 7c e7 e0 | de 0c 00 17 eb 73 f2 8c 21 62 77 5f ed 93 76 62 | 82 34 a8 dc e3 cb c2 5a 08 71 13 11 3d 4b e6 d1 | 76 57 25 8b a6 9b ab 1b 86 9a b2 3c b4 c5 09 27 | 07 3a 9a 1f b3 ba dc 74 b5 99 e0 70 c7 35 07 15 | 6b eb 79 13 3f 27 25 55 75 85 60 5d d2 d0 ba 32 | 68 73 83 f4 c5 0a 96 0e 4b e5 39 e5 86 02 a4 93 | e2 f4 48 ef 0c f4 c4 74 9a 13 7f eb 1a f7 58 25 | 7f f1 9e dc 6a 9c 5a 01 55 d6 94 fe 2a 9d 15 54 | c4 c7 a9 92 32 84 b6 cb 67 d0 cf 4d c5 e2 bc df | 9f d8 4e db 8f 96 2f 1e c9 d0 ec 6a 9b 77 d4 57 | 6b cf 06 d5 ae fb ea 29 a5 1f 59 cf 78 34 af ff | a5 76 3d 89 27 c1 f8 1c 6e a5 66 a5 63 8a 2d 2f | b3 a7 de f9 71 62 f3 67 56 6c 03 83 1d be 14 17 | 8c 04 f3 ba 5f 3e 7d cb 76 74 94 e2 c9 0a 5a 07 | 29 00 00 24 9a 7c 0d 04 38 99 0e 36 73 a3 ab df | 41 d9 56 ed 47 3b 6b 02 19 aa 87 30 cc 21 65 76 | f4 51 64 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 0a c1 09 04 69 58 cc 7d de 65 69 | 68 f6 ba 86 4e 7f 6a 28 00 00 00 1c 00 00 40 05 | 52 91 09 9c ff 5e 67 81 8a 7d bb c1 ce e0 37 4c | d9 14 ec 51 | libevent_free: release ptr-libevent@0x7fb388020cc0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388043350 | #390 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f0 59 d0 2d 97 92 84 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #390 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #390 | rejected packet: | f0 59 d0 2d 97 92 84 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #390: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0588 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23150 | handling event EVENT_RETRANSMIT for parent state #434 | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #434 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #434 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49679.462858; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002414 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388043350 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #434 | libevent_malloc: new ptr-libevent@0x7fb388020cc0 size 128 "road-eastnet-nonat-182" #434: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #434) | 68 bd 27 f7 1a 5f c8 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b 8d dc 86 f4 61 cd 63 4f 12 1a 89 63 c0 18 0e | da c1 2f 67 00 48 49 fe 80 58 30 87 77 1f 60 f1 | 91 93 c4 dd 6a 33 66 a0 69 fa 20 95 f6 9a 11 c7 | fd d3 c3 ff f1 0e a6 05 ba 58 f9 c6 b4 81 c1 3f | 58 b5 fa d8 f3 85 c4 ec 19 40 f6 9f ac 5a 0e 85 | ab f8 54 8d ff fd 0f ef d3 5b 98 8a 75 38 18 ce | f2 7b e8 23 92 dc 6c 70 3f 25 92 19 2b 60 a6 82 | 30 c7 b8 84 44 df 82 d3 8a 4d fc 1d 9c e4 51 d6 | 72 15 3a 4a d5 64 0f 79 a2 e3 fa 27 32 de fa 9b | 0a b6 71 85 29 d5 43 a6 b2 3c 95 42 d3 be 1c 80 | e1 df 27 cf e0 47 6a aa 9d f0 da 55 04 28 85 87 | 1e 7a 6c 89 a7 1a 78 3d cf 4e 43 87 8f 82 da c7 | 06 01 34 b1 a1 6a 5d 22 18 fe 03 9e 0d 36 91 39 | 6c bb 36 1a 00 1b a4 da c4 26 ba 72 4d 2a 35 43 | a5 6f 44 e2 75 40 5e f0 90 a9 5a 70 fc 57 4c e2 | 21 84 c8 a9 9b df a7 2e 69 2b 50 04 e1 24 b1 85 | 29 00 00 24 24 e6 ca a8 b3 30 fc 67 22 ff 0b c1 | 23 a4 8f 2a ae b5 6d 78 43 33 67 66 1b 96 07 82 | 43 a1 52 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e1 30 9f db e9 ff d2 de 10 c0 b8 22 | 86 59 ab dc 44 02 05 1c 00 00 00 1c 00 00 40 05 | 2d 24 f4 0c 2e f5 a0 c9 e2 14 db 8f 00 ef 15 a2 | 0d 97 11 53 | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23150 | #434 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 bd 27 f7 1a 5f c8 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #434 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #434 | rejected packet: | 68 bd 27 f7 1a 5f c8 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #434: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3980 | handling event EVENT_RETRANSMIT for parent state #194 | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #194 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #194 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49679.464108; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.012031 exceeds limit? YES "road-eastnet-nonat-194" #194: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-194" #194: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #446 at 0x557d46adbb00 | State DB: adding IKEv2 state #446 in UNDEFINED | pstats #446 ikev2.ike started | Message ID: init #446: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #446: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #446; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-194" #446: initiating v2 parent SA to replace #194 | using existing local IKE proposals for connection road-eastnet-nonat-194 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 446 for state #446 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a23150 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #446 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 | #446 spent 0.0645 milliseconds in ikev2_parent_outI1() | RESET processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 14 resuming | crypto helper 14 starting work-order 446 for state #446 | pstats #194 ikev2.ike failed too-many-retransmits | pstats #194 ikev2.ike deleted too-many-retransmits | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 446 | #194 spent 2.52 milliseconds in total | [RE]START processing: state #194 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-194" #194: deleting state (STATE_PARENT_I1) aged 64.014s and NOT sending notification | parent state #194: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #194 "road-eastnet-nonat-194" #194: deleting IKE SA for connection 'road-eastnet-nonat-194' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-194' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-194 | State DB: deleting IKEv2 state #194 in PARENT_I1 | parent state #194: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #194 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 446 time elapsed 0.000683 seconds | libevent_free: release ptr-libevent@0x7fb37003b0b0 | (#446) spent 0.692 milliseconds in crypto helper computing work-order 446: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3980 | in statetime_stop() and could not find #194 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 14 sending results from work-order 446 for state #446 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #446 Initiating connection road-eastnet-nonat-194 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7fb37003a770 size 128 | crypto helper 14 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-194" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-194' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-194" | stop processing: connection "road-eastnet-nonat-194" (in initiate_a_connection() at initiate.c:349) | spent 0.0616 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #446 | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 446 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #446 | **emit ISAKMP Message: | initiator cookie: | 88 1d ae ca 37 da 9c 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-194 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2a c2 f6 76 62 03 08 9a a8 98 a1 67 18 76 36 6f | ikev2 g^x f2 14 09 7e 5a 52 4f 9f 19 c8 ba 89 bc 37 1d 8e | ikev2 g^x 11 c7 c7 24 c8 21 0f 20 96 1c 89 74 ee 2d eb 0f | ikev2 g^x d9 40 32 aa 68 91 41 4a dd 21 15 90 12 e4 8b c9 | ikev2 g^x 4d 5c 9c dd a5 b1 90 8f 14 47 58 25 b1 c4 3a 4d | ikev2 g^x f0 56 c6 bf 57 58 f2 ac e6 d1 1a 63 f9 d8 c3 1a | ikev2 g^x a4 3b 86 89 ab bf 3e 5a 25 6f 85 ba 03 4e 84 c0 | ikev2 g^x a7 2c b9 17 b5 20 be c6 c5 13 97 18 56 e3 27 c2 | ikev2 g^x f9 d2 f9 ff 5e 3c 1b 93 48 e2 17 63 4c c3 83 be | ikev2 g^x b7 98 15 95 f6 a1 48 ea 20 9c e6 f3 53 b1 cd 88 | ikev2 g^x 53 a7 49 3f 59 99 9e 83 6d e2 88 bb a9 e3 fc 02 | ikev2 g^x 29 31 b8 83 4f 47 15 6b 71 12 58 3e 96 a5 76 cc | ikev2 g^x 0b 52 1f 8d 6c b2 63 0d 85 4d 51 f2 5f f7 f4 97 | ikev2 g^x 20 32 4c 0f 1c ff 39 c3 f0 0e d9 00 b3 27 e0 af | ikev2 g^x 29 89 02 52 1a 56 5c 18 4f a4 87 c7 25 17 55 3d | ikev2 g^x f8 28 8f d9 14 95 ef 08 7c ea 8b df 87 e5 f7 5e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5e f7 7f 32 12 e9 cf 93 a5 5f 05 08 2b 32 36 a4 | IKEv2 nonce d8 35 51 26 4c a4 53 84 4a 3d 2b 33 5f dc 90 c6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 88 1d ae ca 37 da 9c 16 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c2 | natd_hash: port= 01 f4 | natd_hash: hash= bd 76 de 3d 7d 38 3c 23 fa c5 a8 aa 98 15 c0 6a | natd_hash: hash= 4a ab a4 fc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bd 76 de 3d 7d 38 3c 23 fa c5 a8 aa 98 15 c0 6a | Notify data 4a ab a4 fc | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 88 1d ae ca 37 da 9c 16 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7b cf 42 04 70 bc 06 e9 71 4c e8 ba 2d 5f 18 79 | natd_hash: hash= 9f 19 93 8c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7b cf 42 04 70 bc 06 e9 71 4c e8 ba 2d 5f 18 79 | Notify data 9f 19 93 8c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #446 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #446: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #446 to 4294967295 after switching state | Message ID: IKE #446 skipping update_recv as MD is fake | Message ID: sent #446 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-194" #446: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.194:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #446) | 88 1d ae ca 37 da 9c 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a c2 f6 76 62 03 08 9a a8 98 a1 67 18 76 36 6f | f2 14 09 7e 5a 52 4f 9f 19 c8 ba 89 bc 37 1d 8e | 11 c7 c7 24 c8 21 0f 20 96 1c 89 74 ee 2d eb 0f | d9 40 32 aa 68 91 41 4a dd 21 15 90 12 e4 8b c9 | 4d 5c 9c dd a5 b1 90 8f 14 47 58 25 b1 c4 3a 4d | f0 56 c6 bf 57 58 f2 ac e6 d1 1a 63 f9 d8 c3 1a | a4 3b 86 89 ab bf 3e 5a 25 6f 85 ba 03 4e 84 c0 | a7 2c b9 17 b5 20 be c6 c5 13 97 18 56 e3 27 c2 | f9 d2 f9 ff 5e 3c 1b 93 48 e2 17 63 4c c3 83 be | b7 98 15 95 f6 a1 48 ea 20 9c e6 f3 53 b1 cd 88 | 53 a7 49 3f 59 99 9e 83 6d e2 88 bb a9 e3 fc 02 | 29 31 b8 83 4f 47 15 6b 71 12 58 3e 96 a5 76 cc | 0b 52 1f 8d 6c b2 63 0d 85 4d 51 f2 5f f7 f4 97 | 20 32 4c 0f 1c ff 39 c3 f0 0e d9 00 b3 27 e0 af | 29 89 02 52 1a 56 5c 18 4f a4 87 c7 25 17 55 3d | f8 28 8f d9 14 95 ef 08 7c ea 8b df 87 e5 f7 5e | 29 00 00 24 5e f7 7f 32 12 e9 cf 93 a5 5f 05 08 | 2b 32 36 a4 d8 35 51 26 4c a4 53 84 4a 3d 2b 33 | 5f dc 90 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bd 76 de 3d 7d 38 3c 23 fa c5 a8 aa | 98 15 c0 6a 4a ab a4 fc 00 00 00 1c 00 00 40 05 | 7b cf 42 04 70 bc 06 e9 71 4c e8 ba 2d 5f 18 79 | 9f 19 93 8c | state #446 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a23150 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3980 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #446 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 | #446 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49679.465332 | resume sending helper answer for #446 suppresed complete_v2_state_transition() and stole MD | #446 spent 0.321 milliseconds in resume sending helper answer | stop processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37003a770 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 88 1d ae ca 37 da 9c 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #446 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #446 | rejected packet: | 88 1d ae ca 37 da 9c 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c2 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #446: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36003b100 | handling event EVENT_RETRANSMIT for parent state #338 | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #338 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #338 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49679.469512; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006895 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370012890 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #338 | libevent_malloc: new ptr-libevent@0x7fb37003a770 size 128 "road-eastnet-nonat-86" #338: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #338) | 1f e2 d0 d2 e5 84 7f 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db f7 91 cd 84 5c a7 ef c5 4a 9e 2e af a2 43 ea | 45 0a b8 db c5 6e 04 46 ba a1 d5 11 76 fa 91 5a | 21 6e 50 69 5f 4c 63 af d6 32 06 ae 79 8f f8 47 | 06 f3 f5 c6 98 57 e2 e8 f9 93 2e 73 11 9e c7 4b | 81 b1 ab c3 4c 82 50 3e 95 1b 93 8d f3 f1 26 94 | 35 dc 1c 86 75 c4 0b 21 99 da cd 92 fb c9 25 d3 | a1 77 02 1c 94 1f a7 90 d7 35 62 14 3f a4 c2 e2 | 04 47 bb f7 88 43 f1 58 36 ff ad ce 6a c6 3a e5 | ca 19 27 9c c0 b7 91 62 00 c9 17 fb 82 73 f3 dc | 8a f9 f2 d0 2d 78 16 8f d3 1a df 7b 29 7f a7 d2 | 2a 1d 58 77 31 26 e6 25 fd f1 f0 ff b3 be 2a fb | 9a f2 05 45 cd 1a c0 33 3f 3e 0c b1 4a 0e 13 b1 | f3 25 ba 03 ce 1b 65 7e 16 c3 d1 62 05 e6 0b 87 | 27 59 78 26 a7 72 9c cf a5 2a c9 6c 3c 43 6b b4 | dd fc 35 a0 21 8a d9 83 8c b5 e6 a8 c9 3d 42 bd | e0 43 1a dd 83 56 78 b8 0a 0d d3 50 6d 61 d9 5c | 29 00 00 24 53 73 16 e0 68 43 e7 c2 a0 53 68 5d | 7e 07 bf 33 55 30 e6 39 bc d6 66 c9 05 5a fa 29 | b8 4f 54 b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 1b 58 be 75 e4 59 10 d1 29 a5 4a | 19 0e d4 a5 d3 bb ae eb 00 00 00 1c 00 00 40 05 | e1 23 de d4 d9 5f 17 c1 21 ba 79 77 2a ee 0e dd | 91 6b 75 70 | libevent_free: release ptr-libevent@0x7fb360023dd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36003b100 | #338 spent 0.128 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f e2 d0 d2 e5 84 7f 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #338 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #338 | rejected packet: | 1f e2 d0 d2 e5 84 7f 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #338: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3680129a0 | handling event EVENT_RETRANSMIT for parent state #421 | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #421 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #421 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49679.48781; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003574 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36003b100 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #421 | libevent_malloc: new ptr-libevent@0x7fb360023dd0 size 128 "road-eastnet-nonat-169" #421: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #421) | 53 46 78 d0 f9 b4 2b ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 1e 13 6f 9e 9e 28 7d 48 cb 8f 21 ad 12 23 0d | 2e 17 4b ec 60 47 24 f9 49 65 0f b8 05 f3 b2 c5 | 35 0c dd 44 2a 04 47 c6 96 e8 e3 9d da 44 54 8d | d0 16 cf 7d 24 e8 e0 cd a8 2c 8e 39 d3 b2 8b 7f | 72 0a 52 da e9 14 4a cc 17 a9 78 b8 cd 5e be 1d | b9 b5 cd 7b b6 5f 02 22 ea c4 0a a6 8f a3 01 6c | 5b 53 24 36 89 d6 72 ef 99 b2 12 aa fb cb aa db | b2 d1 08 23 c1 6a e2 dd cd 0b 52 1b 08 f4 07 44 | f6 bb f7 14 71 89 1d 05 a9 2e 9d 11 f6 47 e7 7b | 5c 89 c0 6a 79 44 41 55 07 e9 d4 c5 65 08 95 21 | 02 27 ea de 7e 8f c1 e5 b3 56 d5 44 30 34 c9 29 | 25 c6 6c f5 76 8d bd 58 fa 4e 08 93 a9 a8 12 bd | 8c 61 44 c0 18 3b 6c f3 4a 89 60 c3 7a 98 37 61 | d4 a6 d5 c6 6d e0 61 22 11 f5 b2 91 df 3b aa 2c | 62 52 60 02 03 f1 56 8c f6 e3 d9 1e 59 30 5a b8 | cf c5 38 a8 40 43 1f 7b 8b 5b 7c d9 77 f7 d9 ba | 29 00 00 24 41 49 08 f2 3f 7f 22 d1 7a a9 25 e2 | 15 a5 3d 37 9b e8 6b f7 56 6b 10 73 05 1d f4 b0 | b9 8c f9 c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 d0 78 7d 22 f6 6d e2 e5 b7 d3 9b | 09 f6 2a 83 8c 96 39 01 00 00 00 1c 00 00 40 05 | 72 19 84 dc d4 59 5b 35 51 4f b6 9f 34 c6 2f ea | b9 aa 04 8a | libevent_free: release ptr-libevent@0x7fb38001abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3680129a0 | #421 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 46 78 d0 f9 b4 2b ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #421 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #421 | rejected packet: | 53 46 78 d0 f9 b4 2b ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #421: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25cc0 | handling event EVENT_RETRANSMIT for parent state #391 | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #391 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #391 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49679.495086; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004327 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3680129a0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #391 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 "road-eastnet-nonat-139" #391: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #391) | 1e 4c 10 d0 5a dd 02 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 44 38 de 57 e6 42 14 4a 75 cb e8 86 f1 15 c7 | b3 6b a5 d0 a3 15 b5 a8 cf fe 21 90 de 4f ce 44 | 4b 9e a3 45 9f e5 e3 4a e1 61 50 92 d7 96 bd 78 | c9 7d fa 56 09 ee b1 46 53 20 fc ad 34 b3 1e e5 | 0c f4 f7 d3 65 bb 8f 18 cc a8 06 7f fc 7e 66 0f | 5a c0 66 08 19 5f fe 23 13 53 7d f1 cb 35 9c bf | b6 cc 27 b3 74 16 78 a5 d0 41 0b 66 96 4e d5 0b | a8 67 13 54 66 95 b9 f4 f4 50 eb 64 58 9c 23 eb | 8d 1e 98 9a 88 3b 5f 86 67 00 79 34 97 29 56 1a | b2 15 47 48 a5 9a 2b a5 34 cb 00 12 67 7f e0 d9 | 3a f8 09 e7 20 e1 52 74 01 fd f4 0c 96 53 a6 b7 | c6 61 c0 6c f5 79 6f b0 c7 2c 95 3d f0 6b 1d 3c | a1 9c 76 2c 42 98 e7 2f 92 d1 8e 08 bb da 6a 80 | de bb 58 dc 69 88 c5 71 37 d4 7b 84 79 2b bc 7c | 3c 5f 6e af 11 b3 52 0f 4a 94 17 dd 26 64 0a 25 | 66 61 88 60 23 0c 83 1b 44 d1 a9 f9 6e 89 2a f7 | 29 00 00 24 f4 e3 20 9c cf 9f 8b a0 c8 c9 bb b9 | ac d4 eb 98 02 de 0f c4 e7 00 7a df 68 e7 4c eb | e6 18 a5 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 3e 10 ca 19 aa 6a 76 c2 f6 15 22 | 58 d4 f7 90 3e 72 98 9d 00 00 00 1c 00 00 40 05 | 94 13 1b ea fd 35 6e 40 4c 88 7a 5c c1 e4 2f 2d | 6d 26 6f 2a | libevent_free: release ptr-libevent@0x7fb38802c0a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25cc0 | #391 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 4c 10 d0 5a dd 02 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #391 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #391 | rejected packet: | 1e 4c 10 d0 5a dd 02 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #391: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37802a9a0 | handling event EVENT_RETRANSMIT for parent state #339 | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #339 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #339 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49679.529511; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004219 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25cc0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #339 | libevent_malloc: new ptr-libevent@0x7fb38802c0a0 size 128 "road-eastnet-nonat-87" #339: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #339) | a2 06 83 e6 4d cf 47 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 60 78 10 c3 0f cc 3e 4e 2e d5 96 c1 d2 76 e3 | 97 d5 35 a5 15 b5 cf 25 fc d1 a9 ed 61 00 ab d3 | f0 a5 f9 6b c8 93 25 3b e7 35 94 5b 27 e6 7c aa | 9f 99 13 73 c8 87 72 6f e3 9a d8 3f f2 60 6d 07 | e2 f2 df 74 8c d9 c0 ea 66 9b 1a f7 3a 35 11 09 | 4c 1a 77 9c 33 ec 8e 52 10 1b 5c 10 4f 88 cf e4 | ab bc 00 8a 49 0d dc 56 57 fd b9 aa 33 dc a2 d8 | 3f a7 e3 81 b2 6c 3d 05 80 c1 9e e7 22 3d 4f 4b | 69 99 65 2e db d4 42 77 f6 d5 da ca 9c 7b 37 94 | 4a 33 ff d3 90 af 06 41 1e af a8 a1 29 27 b8 4e | 94 36 29 4f 90 ae d8 40 e5 f9 f7 60 20 50 ae f6 | 19 f9 e5 ce 63 be 68 f8 75 c8 c0 44 7f 51 fc 3c | fe be 4d e9 10 ea 8c 24 89 c7 41 df 92 c0 7b 00 | f7 f4 82 ce db 65 47 b6 bb fd f3 75 44 d0 1d c4 | 34 92 d9 b1 3f bf c2 cf e2 c7 6c 0d 60 aa 7d 11 | 0e 19 00 e8 57 9d 13 5a 3b a1 80 7a d5 8d 15 4c | 29 00 00 24 1c 60 55 0f db a5 b1 e0 94 27 e9 83 | 86 bb c4 10 2a 23 35 9c a1 96 2d 6f 7e 5d c3 40 | 27 31 c9 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 61 9a 5c 09 fb 4f 1f fe 5c 80 fd | 11 ff 3a 18 d8 5f 68 01 00 00 00 1c 00 00 40 05 | f8 00 9b 14 2d 47 6c 3b ee ab c1 8e 99 04 04 19 | 24 06 94 42 | libevent_free: release ptr-libevent@0x7fb37801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | #339 spent 0.443 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 06 83 e6 4d cf 47 f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #339 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #339 | rejected packet: | a2 06 83 e6 4d cf 47 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #339: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.224 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25c40 | handling event EVENT_RETRANSMIT for parent state #435 | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #435 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #435 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49679.532412; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003733 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #435 | libevent_malloc: new ptr-libevent@0x7fb37801a4e0 size 128 "road-eastnet-nonat-183" #435: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #435) | 02 95 c8 9c 02 70 ef 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 be 1c 3f a4 66 94 b1 76 a3 9b 53 73 2f 7f 23 | 4a e8 16 a3 16 f5 f7 58 2e fa f9 cc e5 72 42 dd | 79 82 dc a3 32 45 63 e7 97 5f 0c 3f 10 0e f2 af | 36 1e 6e 10 67 9c 3e 6a f7 f3 72 ba 54 df 6c 10 | a0 1c 0f 6a ce 67 71 2a a3 c4 d3 9c 88 b9 f7 04 | 30 84 58 1f bb cd f1 cd f3 e2 04 50 7f cf d2 c2 | 26 c1 1c 97 d9 a2 05 dc 96 89 90 50 ae 56 a0 13 | ef 2a 24 f0 f6 4d a9 8e e9 e9 a2 eb 42 50 42 ab | 0a 3d 04 3e 57 0c 0a e1 00 9d 75 a3 60 15 b7 e8 | 84 24 4c a7 d1 ab 72 3e f4 8b ef 1a c8 cc 7d af | ee 55 f6 12 cd b9 d1 90 77 f0 61 3d 61 12 ee f8 | 94 b3 64 a2 07 62 d6 b1 81 57 84 c9 8b ff 25 ea | 74 4a 3e 9b d6 88 62 0a dc b0 05 5d 90 03 c9 cd | 54 3d 83 cb 36 ad ef 96 f9 28 73 d8 df b8 72 79 | d4 6d 08 a8 b3 a6 c9 bf ea 29 05 5f 61 ed 03 82 | b8 9d e9 c7 c9 a7 67 16 08 0f e7 ba 6a 6d 38 69 | 29 00 00 24 ae 8f 34 92 0a 08 8b 7b 30 37 54 ea | a0 43 df e6 ae f8 bc fe 70 d8 fd fe ce a5 f7 5d | fb 76 aa 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 34 e7 f7 2a 07 1c be c1 53 fb c8 | 09 7a b0 5a 0f 53 bf 3c 00 00 00 1c 00 00 40 05 | 75 09 e1 26 ec 40 37 83 67 2f 03 41 48 5a 4e 60 | ef 86 00 50 | libevent_free: release ptr-libevent@0x7fb380043300 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c40 | #435 spent 0.404 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 95 c8 9c 02 70 ef 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #435 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #435 | rejected packet: | 02 95 c8 9c 02 70 ef 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #435: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.213 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7e4d0 | handling event EVENT_RETRANSMIT for parent state #441 | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #441 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #441 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49679.536314; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501657 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #441 | libevent_malloc: new ptr-libevent@0x7fb380043300 size 128 "road-eastnet-nonat-189" #441: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #441) | 51 22 97 d4 f1 aa 56 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 2c c6 09 06 fb 75 c9 7f c8 2c f2 78 2e 86 cf | 10 e2 71 84 ec 7a d3 00 3b 70 b4 67 49 a1 3c 4d | 21 45 e6 9b ef ae 2b 06 a0 05 7e f8 20 46 fb f7 | 0f d4 3c 68 46 a5 74 b1 69 d3 27 26 91 1f fb ea | a2 29 d1 d5 ec 8d ba a9 55 81 7c dd 8b b0 d5 f0 | 65 df 87 db d6 24 b4 8d 72 d6 b9 0a a2 e0 30 fc | e4 5b 51 8c ab 49 74 dc 67 ef 9d ed b7 2a 83 35 | e7 01 ba 5c 14 ef fc c4 a3 30 10 68 67 0e 82 16 | 7d 82 bc d7 25 ec 2f c1 f6 97 ab 23 a3 9a b0 7c | d2 fc 27 3c 76 c0 04 de 3f f1 57 2b 49 24 75 a8 | f7 b1 cb 9a 6d 04 c0 ee c6 a3 f0 18 d5 7f 4e a7 | 2c 74 2c d5 e8 3f cd c9 69 5b b5 31 78 19 bb d1 | 32 75 82 1c 75 29 51 85 94 3b 48 0b 31 5b 51 f5 | 93 f5 fc 53 3a 80 c0 7f 4c 5e 8d 4e c5 a0 2e 05 | fd c5 76 9f 1a 22 f6 df 9c 77 35 ff d3 0b a0 5e | 73 0d 0d 92 2d ee d7 e3 ed 3d 6b a2 54 4a 19 9a | 29 00 00 24 9c 47 e2 58 3f 57 67 62 b6 2e 0d 3a | cb 75 8a b1 7d cd 2d 8e 6c 75 cc 2c b3 bd 9f b3 | c7 bf c7 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 c2 f5 08 e1 41 ca c3 a8 c7 5d b8 | 30 41 e7 b2 e6 39 d6 66 00 00 00 1c 00 00 40 05 | 92 32 df 91 6d 86 4c 91 9f c0 e2 90 d1 aa b2 8d | 1d 5c 17 a3 | libevent_free: release ptr-libevent@0x7fb374024f80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | #441 spent 0.565 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 22 97 d4 f1 aa 56 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #441 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #441 | rejected packet: | 51 22 97 d4 f1 aa 56 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #441: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.313 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35401d710 | handling event EVENT_RETRANSMIT for parent state #422 | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #422 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #422 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49679.555519; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003431 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #422 | libevent_malloc: new ptr-libevent@0x7fb374024f80 size 128 "road-eastnet-nonat-170" #422: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #422) | b8 e0 2b 96 c7 45 5a 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 6c 40 a5 03 bc 57 72 c1 66 d6 ac 89 5b f4 c1 | d0 36 2b 40 f8 23 54 39 34 b5 82 a2 ec a9 be f0 | 9e 2a fb a5 33 fb bf 78 6a 65 ee e2 5e 78 b2 97 | 57 06 96 a7 85 bc b5 2f 57 ad dd 92 ec d4 39 15 | 9d 72 7c 3a f0 31 6f b3 e0 1f fa e2 bb 36 ae ad | 14 69 bc c7 2b b8 d3 5c 99 5b e0 8a c5 e8 54 ff | a1 c6 b4 be 7e 54 b5 cb 08 e2 27 e4 e9 7a 16 60 | ce 85 f4 97 da 4f 4d 09 2e 8c 52 19 57 93 83 db | 87 b1 16 b3 51 00 56 5d 37 6d b9 b3 a2 bd 99 3b | aa 47 42 33 bb 18 39 df 45 15 55 a1 5a 1e 8d 44 | 65 5b 06 c8 ce 40 9d 80 8b 2e ca 26 d1 79 fd 78 | 43 19 a6 31 62 db c5 b6 b4 99 3e 3d 0f 92 3a 22 | 67 54 41 d3 95 c5 98 ed 1d fc 1c 5c cc 1c ff 1e | 72 31 d9 fd 8f 7a 3f e9 62 8e 84 af f0 f7 f0 8d | 9b 73 d6 fc ff bc e5 4a d7 b9 1b 80 22 88 c1 56 | e0 bb 60 af 81 19 d7 73 ec 24 2d 0b 96 d4 fa 10 | 29 00 00 24 2b c3 8d 3d 91 5a 53 1a b5 f4 6d b1 | 02 bf f8 18 e1 84 d7 9f a5 0d 77 07 91 b8 4d 3f | 04 89 f2 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 85 d2 75 8f 47 7e 81 98 63 03 9f | 1d 8c c0 94 92 93 75 cc 00 00 00 1c 00 00 40 05 | 2a 28 b7 7f 38 5f e0 65 f6 1d 4d c9 d5 6f ea f1 | c9 85 fb 5d | libevent_free: release ptr-libevent@0x7fb35402ede0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35401d710 | #422 spent 0.693 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 e0 2b 96 c7 45 5a 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #422 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #422 | rejected packet: | b8 e0 2b 96 c7 45 5a 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #422: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.358 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7ecc0 | handling event EVENT_RETRANSMIT for parent state #392 | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #392 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #392 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49679.558928; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004737 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35401d710 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #392 | libevent_malloc: new ptr-libevent@0x7fb35402ede0 size 128 "road-eastnet-nonat-140" #392: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #392) | 10 0f ce a6 80 60 53 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 7c dc 39 42 03 83 1d fc 78 1f a6 0a 82 be ac | 8c 3b 39 1b 2f 80 e7 cb aa b0 35 db d6 f3 de 35 | 37 b1 68 f3 68 1d 2d f4 b0 35 cc 7b dc 22 05 f9 | b7 af f7 1d a4 46 4d 00 a0 fe ea 26 a2 f9 9b 9a | 09 ee 3f e6 65 a7 03 64 d2 2c 26 ad b0 0a b6 6c | b7 a6 17 d4 6e a3 92 2f 34 cc d4 54 77 6b ca 57 | d5 59 3b bf 54 fe aa b8 9e 19 8b 0b 05 8a f7 be | fc d0 1b 7e ca 71 b1 c1 02 6a 82 df ef f5 65 97 | da 1e 51 41 e3 d8 f1 96 c4 03 03 bd 8f 10 04 b2 | c3 58 82 7f ce 35 78 05 db 11 6d 1f 95 52 d4 56 | 49 d1 80 fa 2e f3 ac 1f 38 a0 e5 d5 81 e9 34 d8 | 41 7f 2d 0d 61 dd 7b e7 44 a4 89 c9 0c 7d 05 e4 | 9f 1e 2d 40 16 34 e0 f0 2c f0 ca 39 ea 5a 9b 3c | e7 ee 11 8b d0 d0 71 64 02 96 00 c1 27 19 8e 75 | f0 b3 d3 5e 45 6f c3 79 42 e7 20 9d b5 0d 76 ff | e5 ba 64 52 91 7f bb 6e bc 95 4c d1 a1 34 da e7 | 29 00 00 24 27 55 30 76 6e b8 e9 20 0f 49 9d 0e | 6c f7 55 67 5b a0 fb d4 e7 df 75 53 94 42 2e 19 | d9 ae ec a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 0f f0 e9 84 b6 f5 5d 7e 1b 97 d7 | 89 b2 50 d4 36 fd 91 50 00 00 00 1c 00 00 40 05 | 93 22 be de f9 76 c2 04 2a 35 c8 fb 20 98 3d d6 | 50 a7 79 8d | libevent_free: release ptr-libevent@0x7fb37c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7ecc0 | #392 spent 0.739 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 0f ce a6 80 60 53 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #392 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #392 | rejected packet: | 10 0f ce a6 80 60 53 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #392: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe5c0 | handling event EVENT_RETRANSMIT for parent state #195 | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #195 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #195 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49679.569422; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008717 exceeds limit? YES "road-eastnet-nonat-195" #195: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-195" #195: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #447 at 0x557d46add0c0 | State DB: adding IKEv2 state #447 in UNDEFINED | pstats #447 ikev2.ike started | Message ID: init #447: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #447: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #447; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-195" #447: initiating v2 parent SA to replace #195 | using existing local IKE proposals for connection road-eastnet-nonat-195 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 447 for state #447 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7ecc0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #447 | libevent_malloc: new ptr-libevent@0x7fb37c0300e0 size 128 | #447 spent 0.26 milliseconds in ikev2_parent_outI1() | crypto helper 15 resuming | RESET processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 starting work-order 447 for state #447 | start processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 447 | pstats #195 ikev2.ike failed too-many-retransmits | pstats #195 ikev2.ike deleted too-many-retransmits | #195 spent 2.59 milliseconds in total | [RE]START processing: state #195 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-195" #195: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #195: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #195 "road-eastnet-nonat-195" #195: deleting IKE SA for connection 'road-eastnet-nonat-195' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-195' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-195 | State DB: deleting IKEv2 state #195 in PARENT_I1 | parent state #195: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #195 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 447 time elapsed 0.002852 seconds | libevent_free: release ptr-libevent@0x7fb37404b530 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe5c0 | in statetime_stop() and could not find #195 | (#447) spent 2.82 milliseconds in crypto helper computing work-order 447: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 447 for state #447 to event queue | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #447 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7fb374034460 size 128 Initiating connection road-eastnet-nonat-195 which received a Delete/Notify but must remain up per local policy | crypto helper 15 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-195" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-195' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-195" | stop processing: connection "road-eastnet-nonat-195" (in initiate_a_connection() at initiate.c:349) | spent 0.198 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #447 | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 447 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #447 | **emit ISAKMP Message: | initiator cookie: | 38 12 e6 81 e7 94 57 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-195 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1f 06 2b 67 fa f3 85 ef c9 87 64 80 c6 08 7f 26 | ikev2 g^x 45 8a d6 b2 f0 0d 75 25 97 6d 45 07 fd cb e4 04 | ikev2 g^x bf 7e ab 4e 45 57 81 c7 b5 29 22 16 b5 58 17 73 | ikev2 g^x fb 06 1c 20 f6 01 42 43 d1 e6 cb 7e a1 aa b9 6e | ikev2 g^x 26 8c bc f7 62 2d 79 d5 2d 49 41 71 09 9e b4 75 | ikev2 g^x ea 9e f2 7f e9 07 f0 a5 64 1a db a1 ff 4f ee 2e | ikev2 g^x 4f 3b 9e aa ac 22 2d 9f 1b 37 bc cf 47 d1 ca f1 | ikev2 g^x 85 86 f8 a5 9e 4a f1 ed 2d 36 8a 97 fa 17 f5 2d | ikev2 g^x 74 78 21 72 1b 33 88 07 44 c7 17 ee 95 f3 cb cb | ikev2 g^x 74 32 bb 69 59 ac ab 47 c6 9c ea 80 62 ae 1f 88 | ikev2 g^x 81 9b 37 d9 2d eb b0 eb c8 de b9 11 87 9a a9 5b | ikev2 g^x 92 c9 38 b1 30 9b d0 b1 7f 2a dc 10 02 4c 1e 0e | ikev2 g^x 28 73 54 43 6f 78 74 45 0e 5e 40 cb d7 a1 f6 9b | ikev2 g^x 8d bf eb b3 ff de 36 ad 5d d5 a1 e7 e2 d9 b6 74 | ikev2 g^x 11 52 d9 17 88 a2 35 0f d7 23 95 ef eb 8f 58 a1 | ikev2 g^x ef f0 f0 24 22 5b dd f5 64 21 6b 5a 10 90 d6 b9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c8 ed 9d b9 b2 64 8b 9d 5d 85 10 8f bc bb 1d 46 | IKEv2 nonce c9 3a dd 35 d0 ed 23 11 cf 06 d9 fd be 51 4b 2e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 38 12 e6 81 e7 94 57 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c3 | natd_hash: port= 01 f4 | natd_hash: hash= 0f 28 c6 de 25 95 4a 27 58 aa 1c c2 15 34 6b e8 | natd_hash: hash= d4 2b c8 d2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0f 28 c6 de 25 95 4a 27 58 aa 1c c2 15 34 6b e8 | Notify data d4 2b c8 d2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 38 12 e6 81 e7 94 57 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= dc 67 81 1e 74 e8 91 b7 d4 fb 94 8c c2 c6 73 c6 | natd_hash: hash= 89 a9 30 0d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dc 67 81 1e 74 e8 91 b7 d4 fb 94 8c c2 c6 73 c6 | Notify data 89 a9 30 0d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #447 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #447: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #447 to 4294967295 after switching state | Message ID: IKE #447 skipping update_recv as MD is fake | Message ID: sent #447 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-195" #447: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.195:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #447) | 38 12 e6 81 e7 94 57 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 06 2b 67 fa f3 85 ef c9 87 64 80 c6 08 7f 26 | 45 8a d6 b2 f0 0d 75 25 97 6d 45 07 fd cb e4 04 | bf 7e ab 4e 45 57 81 c7 b5 29 22 16 b5 58 17 73 | fb 06 1c 20 f6 01 42 43 d1 e6 cb 7e a1 aa b9 6e | 26 8c bc f7 62 2d 79 d5 2d 49 41 71 09 9e b4 75 | ea 9e f2 7f e9 07 f0 a5 64 1a db a1 ff 4f ee 2e | 4f 3b 9e aa ac 22 2d 9f 1b 37 bc cf 47 d1 ca f1 | 85 86 f8 a5 9e 4a f1 ed 2d 36 8a 97 fa 17 f5 2d | 74 78 21 72 1b 33 88 07 44 c7 17 ee 95 f3 cb cb | 74 32 bb 69 59 ac ab 47 c6 9c ea 80 62 ae 1f 88 | 81 9b 37 d9 2d eb b0 eb c8 de b9 11 87 9a a9 5b | 92 c9 38 b1 30 9b d0 b1 7f 2a dc 10 02 4c 1e 0e | 28 73 54 43 6f 78 74 45 0e 5e 40 cb d7 a1 f6 9b | 8d bf eb b3 ff de 36 ad 5d d5 a1 e7 e2 d9 b6 74 | 11 52 d9 17 88 a2 35 0f d7 23 95 ef eb 8f 58 a1 | ef f0 f0 24 22 5b dd f5 64 21 6b 5a 10 90 d6 b9 | 29 00 00 24 c8 ed 9d b9 b2 64 8b 9d 5d 85 10 8f | bc bb 1d 46 c9 3a dd 35 d0 ed 23 11 cf 06 d9 fd | be 51 4b 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 28 c6 de 25 95 4a 27 58 aa 1c c2 | 15 34 6b e8 d4 2b c8 d2 00 00 00 1c 00 00 40 05 | dc 67 81 1e 74 e8 91 b7 d4 fb 94 8c c2 c6 73 c6 | 89 a9 30 0d | state #447 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c0300e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7ecc0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe5c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #447 | libevent_malloc: new ptr-libevent@0x7fb37404b530 size 128 | #447 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49679.574645 | resume sending helper answer for #447 suppresed complete_v2_state_transition() and stole MD | #447 spent 1.53 milliseconds in resume sending helper answer | stop processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb374034460 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 12 e6 81 e7 94 57 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #447 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #447 | rejected packet: | 38 12 e6 81 e7 94 57 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c3 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #447: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.338 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #436 | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #436 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #436 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49679.591352; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002548 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #436 | libevent_malloc: new ptr-libevent@0x7fb374034460 size 128 "road-eastnet-nonat-184" #436: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #436) | cc d9 b7 db 44 05 84 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 3c 80 f9 ec ce 19 79 1b 2a 4e 88 36 86 a9 d8 | 85 e2 ee 1a ce 49 16 7b 84 5e 31 fc e1 84 f2 62 | 83 ed 4d eb 9f 6a c2 85 84 04 f4 d9 bd aa ee 02 | 08 1b 87 fa b5 ac ff f6 a9 3e 63 6d 16 01 77 f5 | 2b 3e 1b 6e c7 66 ff fb 38 8c 19 c9 7b b1 fe 10 | bc 5c c8 26 33 9f ff 45 76 a0 23 85 19 e3 31 de | 28 8c dd 45 56 45 3b fb b4 0d 18 e3 cd 81 8e 00 | 0b f6 17 10 a2 e0 44 20 37 74 e1 31 a8 10 b7 14 | cf 9a 72 a5 9f 1a 4b 15 1a b2 c9 bb 99 44 1e 31 | 11 05 e2 cf 98 40 c9 ef aa 8c fe 19 58 f6 d5 62 | cf d6 d5 ea 4e 24 4c 33 16 1d 0c db 05 43 98 5e | d3 1a 94 c0 4b ed 3c 02 54 4b fc ca 99 42 ac 4b | fc 8a 3c 6f 70 38 23 05 eb da 77 20 a0 4e 73 f3 | af d2 c3 64 0d 77 b8 54 17 69 4d 1e a8 53 83 4b | 8b 72 92 0a 4d 90 87 b2 56 ec 43 2c 41 d7 64 66 | 71 79 54 ef 65 56 ba 6d 1d e6 d1 dc ad 99 41 fe | 29 00 00 24 a3 ee 0b 44 35 bf 27 26 10 74 6f 1a | d2 86 21 80 e6 fa 2e 6d 1e 83 9b 58 c8 96 87 8e | e4 1b 77 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 51 98 88 78 46 d0 e6 54 3d 62 ae | 5f a3 54 6d d3 39 61 c5 00 00 00 1c 00 00 40 05 | f1 9f 10 2a 1c da 5a 4c b5 8c 1e 6e 78 d5 be 31 | 9e a0 0c c1 | libevent_free: release ptr-libevent@0x7fb3700251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #436 spent 0.429 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc d9 b7 db 44 05 84 19 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #436 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #436 | rejected packet: | cc d9 b7 db 44 05 84 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #436: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.218 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #340 | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #340 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #340 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49679.600283; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006384 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #340 | libevent_malloc: new ptr-libevent@0x7fb3700251c0 size 128 "road-eastnet-nonat-88" #340: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #340) | 06 b4 2a d6 65 92 42 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 29 a3 64 49 07 ee 29 df 38 b6 8e cf 9e 1e 2e | b5 cf 5c 9d df 90 0b 24 c7 00 d1 e9 e7 d5 9f 86 | b0 59 b0 c3 a3 da d8 a1 12 f7 d8 f8 0e b3 79 c6 | 53 3d ef a8 ea 62 cb cf 67 47 98 25 86 4a be 53 | 9d 43 a7 c0 c8 ef 24 bd 84 89 4d 1e d4 43 4c 6d | a9 e8 b8 a2 ac 6e 98 24 1f 18 dc ca 27 cf d8 28 | a6 29 25 bd 63 2f 94 ef bf ef cd 28 af b3 c4 14 | c2 24 5c 8a a7 98 ce 81 da e6 36 b6 6f 19 b3 9c | 61 e9 12 2d 81 4f 37 09 f9 11 51 0b 0a 15 3c 25 | dc 56 9d bc 1a 37 30 79 ad 58 f9 75 6f 1b 9e ed | af 69 6e f2 46 86 c0 e7 9c f5 ce 51 f7 2f 69 1c | c5 ca c9 df 4e 7a 80 a9 78 c1 72 af 2f 09 7a f4 | 7b e9 80 c9 52 10 9d 4e 28 29 82 d9 cd 16 a6 20 | 67 0a 26 62 77 51 4a e8 62 40 48 56 bb c1 3c 45 | c4 fb 9d d0 c4 57 ec 56 11 1b 76 f9 cd ac 15 3f | 9b 2c e1 a4 49 9f 96 e5 41 42 75 44 0c a4 b4 45 | 29 00 00 24 ae e0 e3 5e aa a2 ee b4 ba fd 41 25 | ff 71 9d 02 44 71 da b9 6c 12 19 98 91 a3 35 04 | b4 f3 15 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 9b ba f5 3a f3 63 5f fe ea b4 e7 | 7e cf 7e 1a ac 8a 91 ce 00 00 00 1c 00 00 40 05 | 7a 1b 4b 67 34 a5 a3 ba cf 0b c3 8e 76 85 1a 07 | b5 81 41 18 | libevent_free: release ptr-libevent@0x7fb34c00f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #340 spent 0.577 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 b4 2a d6 65 92 42 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #340 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #340 | rejected packet: | 06 b4 2a d6 65 92 42 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #340: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.298 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c012bf0 | handling event EVENT_RETRANSMIT for parent state #393 | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #393 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #393 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49679.622773; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006167 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #393 | libevent_malloc: new ptr-libevent@0x7fb34c00f1a0 size 128 "road-eastnet-nonat-141" #393: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #393) | d2 4f c7 97 0e 2c 3e ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 57 42 91 f9 c0 06 25 d3 5e c6 ff a0 b9 c7 9a | f8 73 f5 52 ea b3 b7 0b 33 79 a9 ab be 94 f5 d3 | 47 a2 ed 3f 30 d5 f5 d7 c5 7f 9d d3 ed 4d a0 b4 | f7 ad a1 76 18 49 17 db 8a b9 cb ed 58 a9 0c d9 | 5a 76 b8 cb 07 f9 85 e7 ea fe 63 f8 ee 0b 16 50 | 8f 7f 23 44 74 8a 56 f9 51 93 d3 d4 1e a9 e0 6d | d7 af c4 1a 46 a4 66 f8 55 f1 fc bb 79 62 df 34 | 8f ee 1b 57 26 7e c4 de 20 f4 80 c2 d6 80 72 a1 | aa 53 f1 e8 e4 e6 1c e7 0b 29 98 85 7a 59 d5 aa | 68 b0 88 b1 b9 15 73 53 b5 6a 19 c9 ae 48 c5 a2 | 01 52 4f ea f5 c9 9f b8 90 37 cc 56 4f 8d 78 b9 | 10 dc d8 56 42 a7 88 d4 9d 82 8e d9 33 ab ac 86 | 5e b8 f6 d0 8e 0c aa b2 4f 41 73 62 f2 0c c2 27 | ef ba c6 42 e2 bb a6 b0 c4 15 d3 04 4c 56 e0 5c | ad 92 8b ed ed ba dd c2 b7 4a 92 54 4a ae d4 37 | c3 0d 4f 7c 37 7e 0b 49 1e 1d 38 1e 4b 41 b4 43 | 29 00 00 24 f4 b5 fb 56 01 5f ac 00 1d 31 6b d7 | 01 8d f2 d0 3f 15 27 39 dc 6b 31 7e 82 50 a3 bb | 9c f0 ec f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 9c 87 ea bd bf 36 3e cf 82 b1 7a | 78 3f f7 57 2c cf 08 1f 00 00 00 1c 00 00 40 05 | 77 3b 5d 4c 9c 3f 6e 8a 01 7a d1 9c 5b 89 36 dc | 10 f8 1f e1 | libevent_free: release ptr-libevent@0x7fb340040790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | #393 spent 0.598 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 4f c7 97 0e 2c 3e ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #393 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #393 | rejected packet: | d2 4f c7 97 0e 2c 3e ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #393: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.222 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3840489a0 | handling event EVENT_RETRANSMIT for parent state #423 | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #423 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #423 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49679.625803; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003784 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #423 | libevent_malloc: new ptr-libevent@0x7fb340040790 size 128 "road-eastnet-nonat-171" #423: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #423) | 0d af b2 c4 93 36 1d aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 70 3e db fb be 8b b3 fd 73 c0 a9 96 0b 3d a8 | e8 36 31 e7 9c ec 5a 7d ff 70 f6 37 85 23 83 66 | b2 fa b4 b8 d5 45 16 aa a6 25 06 9f 8e 8e bf 87 | eb 95 12 b7 4e e4 06 f4 d1 f8 40 ef 32 40 e6 a6 | 6e f4 f8 67 e1 5b 90 26 e6 0e 43 21 0c 13 d6 b5 | 8e c1 48 f1 b8 e8 39 77 8f 82 36 7b 93 75 c8 ab | 84 91 17 9b a4 7d 3c 17 79 cf 26 b4 a0 3c f6 3b | 8a 9e f2 22 e0 37 3d 4a 22 71 37 fa af 63 94 e0 | 5d cb 53 25 8c 9f 3c aa f6 38 ac 60 e7 b7 a3 49 | 84 5c ea cd 1a 4a 52 75 d6 46 93 25 09 85 d1 82 | dd 53 68 4b de 95 3f 19 ff d3 86 0a c0 38 25 ae | 80 9b b3 ed 25 0e b6 ad 72 55 3f 58 28 54 96 74 | 26 60 4c 26 05 26 c2 53 24 50 7e 5b 35 6b ca a1 | e8 d8 01 f8 35 32 32 e5 07 d9 c6 ca 24 0c 96 3a | 31 97 ac ed 1f 95 1e 6e 00 fc 4a 03 2a 9c 00 a0 | bd e4 04 9f 5c 17 08 9c 92 06 6e 29 32 98 a2 91 | 29 00 00 24 ce f0 94 25 9a 41 87 5c 3e 7f f2 93 | 02 a0 d4 6b b2 dd 60 48 d2 68 61 fc a3 c4 4b 4a | b6 d0 3f b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 fb df b4 aa 7f 08 b4 87 40 7c 29 | 54 a9 d0 e2 e4 44 95 43 00 00 00 1c 00 00 40 05 | b2 9a 73 50 a7 57 97 7d 3b 57 52 b7 42 61 08 84 | 33 0c bd 82 | libevent_free: release ptr-libevent@0x7fb38402d490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840489a0 | #423 spent 0.382 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d af b2 c4 93 36 1d aa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #423 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #423 | rejected packet: | 0d af b2 c4 93 36 1d aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #423: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.197 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #196 | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #196 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #196 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49679.64957; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.012532 exceeds limit? YES "road-eastnet-nonat-196" #196: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-196" #196: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #448 at 0x557d46ade680 | State DB: adding IKEv2 state #448 in UNDEFINED | pstats #448 ikev2.ike started | Message ID: init #448: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #448: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #448; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-196" #448: initiating v2 parent SA to replace #196 | using existing local IKE proposals for connection road-eastnet-nonat-196 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 448 for state #448 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb3840489a0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #448 | libevent_malloc: new ptr-libevent@0x7fb38402d490 size 128 | #448 spent 0.188 milliseconds in ikev2_parent_outI1() | crypto helper 19 resuming | RESET processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 19 starting work-order 448 for state #448 | start processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 448 | pstats #196 ikev2.ike failed too-many-retransmits | pstats #196 ikev2.ike deleted too-many-retransmits | #196 spent 2.5 milliseconds in total | [RE]START processing: state #196 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-196" #196: deleting state (STATE_PARENT_I1) aged 64.014s and NOT sending notification | parent state #196: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #196 "road-eastnet-nonat-196" #196: deleting IKE SA for connection 'road-eastnet-nonat-196' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-196' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-196 | State DB: deleting IKEv2 state #196 in PARENT_I1 | parent state #196: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #196 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb34c009640 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 448 time elapsed 0.001408 seconds | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | in statetime_stop() and could not find #196 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#448) spent 1.38 milliseconds in crypto helper computing work-order 448: ikev2_outI1 KE (pcr) | processing global timer EVENT_REVIVE_CONNS | crypto helper 19 sending results from work-order 448 for state #448 to event queue Initiating connection road-eastnet-nonat-196 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | scheduling resume sending helper answer for #448 | libevent_malloc: new ptr-libevent@0x7fb3680345d0 size 128 | crypto helper 19 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-196" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-196' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-196" | stop processing: connection "road-eastnet-nonat-196" (in initiate_a_connection() at initiate.c:349) | spent 0.0998 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x557d46a90400 | handling event EVENT_RETRANSMIT for parent state #442 | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #442 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #442 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49679.651443; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500854 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #442 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 "road-eastnet-nonat-190" #442: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #442) | 87 5c d8 cc 20 15 ba 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 68 c7 3c 11 2f 9c 07 85 86 ab fd 70 b3 a3 4b | 4b 15 db 0c 55 63 48 ae b0 dc 7b 34 ba 58 39 54 | 81 cc 25 fd b5 c7 f7 39 e9 8f 2e f9 b9 70 0e c0 | 6c fd 85 d9 5d cd 9d f6 5f 5d 4e 86 38 b5 78 a7 | d8 3d 3d f5 25 e8 c6 56 da a5 38 73 cf 89 18 32 | cf c9 c3 46 fb 60 20 53 a4 ff ca 61 0a 1f ad 2b | a5 f9 d2 1b d5 73 db 29 4b af 73 16 1f 68 6e 88 | a8 b3 5c d6 b4 01 8a 06 65 2f a3 ad 76 14 68 68 | 9f cb 47 75 86 fb 98 94 58 0a 1b c8 87 0a bf b1 | 97 c2 17 ab 5f e8 c3 11 ea 6b b5 fc 83 10 e7 36 | 12 60 e6 87 bd 62 58 93 cb ac ef ca 4f 7f ed 7c | 32 f8 74 a9 e0 2b 69 44 cf b3 d9 33 28 7b 15 7d | 6b 78 11 47 ae a2 e0 8f 52 91 83 be f4 84 c7 17 | a5 b8 57 df 7a 32 65 6d 3b bd ca 10 c7 fb bf 39 | ca 7b 85 7d 49 00 cc 7c 5f b7 c2 27 37 c0 3c 03 | 4d 75 5e a1 e3 8a 16 a4 15 da ac 76 26 68 0c 96 | 29 00 00 24 bc 7d d1 02 e0 e7 26 b2 02 88 eb 9f | 6d cb 61 e3 66 23 89 34 b9 17 0a 11 8d c9 39 5d | 4a 6a d8 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b b4 fa 62 4d 88 e7 9c 8f 3a a9 82 | e0 af 15 4d 27 f2 cd 63 00 00 00 1c 00 00 40 05 | ff 91 89 9d d7 da 34 d7 9b a8 06 6f f9 4a 9b 25 | 2a 77 df 3e | libevent_free: release ptr-libevent@0x7fb3580300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90400 | #442 spent 0.225 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 5c d8 cc 20 15 ba 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #442 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #442 | rejected packet: | 87 5c d8 cc 20 15 ba 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #442: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.114 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #448 | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 448 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #448 | **emit ISAKMP Message: | initiator cookie: | ea d6 68 25 ae ee 80 d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-196 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ab 2e 7f 22 4b d6 ee 79 95 7d ea e6 94 56 fc 59 | ikev2 g^x 41 1c 12 66 f4 de 00 d4 6a e6 f4 4c 67 01 c3 97 | ikev2 g^x d7 f0 7f 15 19 52 1c e1 e7 cb 10 43 bf 32 f7 97 | ikev2 g^x 3f 7d 76 9e 8f 5c 2d a2 10 89 27 a3 31 39 40 6f | ikev2 g^x 23 b5 50 de a5 26 d5 37 1d bc c7 b0 be 51 02 45 | ikev2 g^x 35 60 2b d9 a4 52 16 a6 1b 75 6d 90 d7 94 82 b4 | ikev2 g^x dd 41 db 2a cd 7c b4 ec 00 64 fe 2d 52 b4 ab 6f | ikev2 g^x a1 8a dc c4 d8 32 f4 27 d3 99 3c 5b 3c 30 47 ed | ikev2 g^x 06 54 fe bf 5a 80 4f d3 cd d3 63 ab 7a 0a c4 81 | ikev2 g^x eb 86 4b 9a 37 9c a7 bc 09 9b f1 b6 f5 69 f2 05 | ikev2 g^x c2 89 b2 f3 ca 58 71 7c 0b b2 02 99 cf da 83 99 | ikev2 g^x b9 82 4c 58 38 5d 2d be 03 71 b3 5f 32 1a 82 30 | ikev2 g^x 6f ca 79 08 7e ac dc 25 d6 1a ad 46 a4 8d 7c 47 | ikev2 g^x 64 b8 24 1d 37 d9 41 0f 8b 4e 16 65 d2 41 4b ab | ikev2 g^x d2 0e 95 38 92 91 3a 77 ae cf 19 35 ef c9 91 13 | ikev2 g^x b4 90 b2 24 68 10 9d af 29 52 a9 15 24 f7 4d 93 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f3 0f f3 36 25 a9 50 89 21 ce 62 13 d8 e8 8d 8d | IKEv2 nonce c3 33 f9 d1 62 a2 a6 a0 e9 3e 64 7f fb b2 90 fb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ea d6 68 25 ae ee 80 d8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c4 | natd_hash: port= 01 f4 | natd_hash: hash= 48 d7 4f 67 97 77 e0 a3 2c fc 24 e7 7a a9 1a d4 | natd_hash: hash= d3 98 14 3c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 48 d7 4f 67 97 77 e0 a3 2c fc 24 e7 7a a9 1a d4 | Notify data d3 98 14 3c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ea d6 68 25 ae ee 80 d8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 18 00 5b 20 2e 1c a9 8b 56 50 4b 4f f1 d3 fc 60 | natd_hash: hash= 9d dd 28 85 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 18 00 5b 20 2e 1c a9 8b 56 50 4b 4f f1 d3 fc 60 | Notify data 9d dd 28 85 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #448 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #448: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #448 to 4294967295 after switching state | Message ID: IKE #448 skipping update_recv as MD is fake | Message ID: sent #448 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-196" #448: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.196:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #448) | ea d6 68 25 ae ee 80 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 2e 7f 22 4b d6 ee 79 95 7d ea e6 94 56 fc 59 | 41 1c 12 66 f4 de 00 d4 6a e6 f4 4c 67 01 c3 97 | d7 f0 7f 15 19 52 1c e1 e7 cb 10 43 bf 32 f7 97 | 3f 7d 76 9e 8f 5c 2d a2 10 89 27 a3 31 39 40 6f | 23 b5 50 de a5 26 d5 37 1d bc c7 b0 be 51 02 45 | 35 60 2b d9 a4 52 16 a6 1b 75 6d 90 d7 94 82 b4 | dd 41 db 2a cd 7c b4 ec 00 64 fe 2d 52 b4 ab 6f | a1 8a dc c4 d8 32 f4 27 d3 99 3c 5b 3c 30 47 ed | 06 54 fe bf 5a 80 4f d3 cd d3 63 ab 7a 0a c4 81 | eb 86 4b 9a 37 9c a7 bc 09 9b f1 b6 f5 69 f2 05 | c2 89 b2 f3 ca 58 71 7c 0b b2 02 99 cf da 83 99 | b9 82 4c 58 38 5d 2d be 03 71 b3 5f 32 1a 82 30 | 6f ca 79 08 7e ac dc 25 d6 1a ad 46 a4 8d 7c 47 | 64 b8 24 1d 37 d9 41 0f 8b 4e 16 65 d2 41 4b ab | d2 0e 95 38 92 91 3a 77 ae cf 19 35 ef c9 91 13 | b4 90 b2 24 68 10 9d af 29 52 a9 15 24 f7 4d 93 | 29 00 00 24 f3 0f f3 36 25 a9 50 89 21 ce 62 13 | d8 e8 8d 8d c3 33 f9 d1 62 a2 a6 a0 e9 3e 64 7f | fb b2 90 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 d7 4f 67 97 77 e0 a3 2c fc 24 e7 | 7a a9 1a d4 d3 98 14 3c 00 00 00 1c 00 00 40 05 | 18 00 5b 20 2e 1c a9 8b 56 50 4b 4f f1 d3 fc 60 | 9d dd 28 85 | state #448 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38402d490 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb3840489a0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90400 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #448 | libevent_malloc: new ptr-libevent@0x7fb3580300e0 size 128 | #448 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49679.652744 | resume sending helper answer for #448 suppresed complete_v2_state_transition() and stole MD | #448 spent 0.905 milliseconds in resume sending helper answer | stop processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3680345d0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea d6 68 25 ae ee 80 d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #448 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #448 | rejected packet: | ea d6 68 25 ae ee 80 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #448: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.11 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b07dc0 | handling event EVENT_RETRANSMIT for parent state #437 | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #437 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #437 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49679.659037; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001311 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368040840 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #437 | libevent_malloc: new ptr-libevent@0x7fb3680345d0 size 128 "road-eastnet-nonat-185" #437: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #437) | 31 51 d4 f7 c8 fe c5 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d 4d c3 c5 4f ca 6c d8 d4 84 06 d4 ea 89 80 6d | 99 d1 7f e1 cb 80 24 55 fd df 90 fb 02 92 ff c9 | f0 47 14 8d 77 1a bb 9c 7c dd 17 b9 16 19 6b 74 | ec 88 72 db 3e 1a c4 54 69 dd d8 16 b9 56 68 f6 | 6a 0a 44 9f 3f b5 a3 4b 08 8a 18 15 d1 69 95 71 | d9 52 3a e9 65 ee 70 4d ea 9c f5 16 84 a6 99 9c | ab ff 36 83 9d b6 9f c3 53 f1 00 51 ea c6 f5 a2 | 5c ce 33 c2 cf de 1d c7 31 1f d6 91 bf f2 7f 9f | fc 6e d8 c8 43 fd a2 ec ed d4 2e e3 1a 35 b1 d0 | de 28 47 6a 6b a3 42 0c 4a 1a 4e 13 17 87 94 71 | f7 93 75 92 ea b9 03 fc c2 41 93 f1 c9 f7 b4 4d | 3c f1 35 28 f5 5e 37 14 cf 3e ce 38 da e2 53 26 | df e6 e9 23 b5 8c b6 45 18 8f e2 54 89 f9 96 79 | aa 6a 79 aa cf b4 ec 3d e4 21 6c a5 14 2c 68 b2 | 1b 56 0e 23 e2 48 c6 68 81 fb b5 23 23 53 e6 4a | 1c 61 e2 7a 67 e5 f5 84 ba 68 ce a3 e9 a9 c8 e3 | 29 00 00 24 02 5e bf 69 6a 09 af cb c5 28 ba 2f | be c6 fe 19 42 f8 ee f5 0b 73 06 5b 41 10 d0 e5 | 69 e3 64 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 6b 27 8e 3d c1 6d e7 fb 64 0d 99 | 79 35 e1 df 31 89 9b 32 00 00 00 1c 00 00 40 05 | dc 48 f6 93 16 4d 8a fc 81 8e 30 65 58 3a 8c 28 | 32 6e e0 6b | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b07dc0 | #437 spent 0.227 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 31 51 d4 f7 c8 fe c5 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #437 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #437 | rejected packet: | 31 51 d4 f7 c8 fe c5 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #437: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0965 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370017ea0 | handling event EVENT_RETRANSMIT for parent state #341 | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #341 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #341 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49679.661467; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005047 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #341 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 "road-eastnet-nonat-89" #341: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #341) | 49 c3 42 79 ad a4 02 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 28 2b 3a 23 5f 9c 41 a8 c4 b1 54 27 b8 a0 a8 | a4 06 9f e8 bd 51 0b 54 b6 c3 33 24 5b b7 ea 09 | 0f d7 aa 52 2f c6 c6 78 f1 af 48 22 da 41 1f 06 | 45 43 46 fc b0 c6 2f 1b c2 df 83 35 32 87 c5 a5 | b2 fd 30 3e 95 a2 12 80 00 0f 09 dd 41 c2 48 21 | 60 8b 18 12 e2 f7 cf 1e de 64 8d 80 92 30 17 55 | ad 93 96 5a 50 26 d3 cf d9 c9 40 82 d0 c1 d7 8c | 1b c3 86 4b 02 cc 46 e2 fc 73 8a b5 ae 23 f0 12 | e2 a2 8c 5d c9 4d fa 9f 2b e7 d4 9f 15 6e 8f 91 | 94 64 45 c0 fe f3 80 9a 4c e2 d7 66 20 dd 41 dc | 6b 9b c8 3f df d1 ab 15 c5 36 9b b6 cb 01 6b 62 | c9 d1 d0 ae bf 44 a3 4d 59 dd 52 35 90 0f 89 8a | f2 c1 bf c6 f6 a5 a8 2e c6 a8 d7 de 94 ea f6 00 | 11 3a e4 a5 1c cc 19 f4 1b 95 ff 82 80 6f 79 ae | 97 c0 6f ca 24 fa 61 b5 2e 87 00 ef d7 62 ce 06 | 06 5f 50 40 c4 2f 8b 3a fb 06 a7 11 50 8a 1f ce | 29 00 00 24 b0 2a b8 49 b5 4b c9 98 47 c3 4a b6 | 54 a6 a4 dc f8 8a 35 db 6a e0 ae b8 2b 87 41 53 | a2 41 a5 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e a8 6f b4 ec 17 85 04 80 69 75 d9 | db 5a 4e 4f c9 9c a6 7b 00 00 00 1c 00 00 40 05 | 47 20 cd 59 bf 11 9f 21 41 41 cd 45 1c bb 06 ab | 5f ca 38 7e | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370017ea0 | #341 spent 0.19 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 c3 42 79 ad a4 02 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #341 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #341 | rejected packet: | 49 c3 42 79 ad a4 02 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #341: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0933 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388015720 | handling event EVENT_RETRANSMIT for parent state #394 | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #394 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #394 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49679.685856; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004661 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370017ea0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #394 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 "road-eastnet-nonat-142" #394: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #394) | c6 0a d6 5e 7e fc 84 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 b5 7c 6c c9 f1 d1 76 55 70 0c 53 79 42 59 aa | 1c 78 3a 1c cf 8e ff bf 3c 4f 8e 36 eb fa f5 80 | 9c 26 80 0f 65 74 f8 36 f2 69 55 0c 8f 0e 23 f4 | f2 22 a0 b5 d9 98 7e 1f aa d3 a2 c6 8c ae 8e 98 | 7c 0a f3 ed 8f 8b 88 58 8c d6 33 95 a0 55 9d 22 | 45 bd 30 81 fc 6e e7 86 9a f8 90 92 f7 2d bb 24 | 69 7e b6 2c e3 c4 d3 78 cf 51 21 62 11 c2 15 e2 | b3 a9 82 d8 15 7c 3e 4d bb 85 98 4b 06 e1 32 2f | 7a ee fc 56 3c 9b 3f a7 bb d2 50 44 19 3c 10 75 | d0 ab ea a8 d0 55 74 15 97 4a a8 8a 65 6f 7d 24 | 88 48 f4 59 45 9a aa ed 6e b4 a3 4a 2e c4 97 e3 | ef a9 a3 78 d3 c7 01 a3 80 5f 34 19 5f e9 1a 0b | 22 c3 b3 e4 7b 39 94 40 be d6 c0 25 22 6b 94 43 | 4e 6c a4 23 34 ff 10 49 a6 bf 97 8e b9 5f 55 2d | 28 e5 68 c3 b7 a6 14 92 b7 6a 59 d7 14 cc 2b 2a | 46 b7 9f a5 f7 40 91 f4 58 19 59 a8 c2 3d 8c 54 | 29 00 00 24 48 a4 83 24 df d5 ff 67 2d 1a db a8 | 39 76 5f a5 8c c2 0e 08 ee f5 2b 2a a4 7f 9e 08 | 09 74 ed 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 07 bb 4a c8 d9 c8 75 02 c5 e8 2f | 3d 22 1e b1 bf 8b 35 f7 00 00 00 1c 00 00 40 05 | 6e c1 7a 04 07 74 46 3d 3d f7 4a 09 48 b9 79 2c | 6a b6 13 f4 | libevent_free: release ptr-libevent@0x7fb3600407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388015720 | #394 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c6 0a d6 5e 7e fc 84 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #394 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #394 | rejected packet: | c6 0a d6 5e 7e fc 84 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #394: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0502 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #424 | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #424 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #424 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49679.69415; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002691 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388015720 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #424 | libevent_malloc: new ptr-libevent@0x7fb3600407f0 size 128 "road-eastnet-nonat-172" #424: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #424) | e5 61 ef 5f 7f e3 58 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c da e9 09 30 1c 29 bb e6 91 cb 4e 69 4d ec 03 | b5 f9 29 7a 23 48 20 ed f7 47 c2 fe 06 e6 43 d7 | dd db db 34 94 8c 85 3b 55 9b f4 3a 74 ed 7a a1 | b8 84 40 94 dc 5c ed 16 d0 73 2d 49 36 0b 9a 1d | 7a 62 45 16 8d 9c 63 79 31 b8 8c 83 f1 0e b1 7f | 67 fe bc d6 57 49 2e 4d c3 49 48 a7 55 5f ff d0 | 14 68 fc 6f 72 30 bd 46 7b 9a 8c f4 dc c7 37 1c | e4 a4 8f 19 bc e7 61 cc 6b 11 48 dd 4e 4a 37 e3 | ee aa ab b1 b2 36 8e 89 eb 7e b7 77 69 a0 09 80 | 3c 6b fc 75 71 9a f3 bd 94 2c c9 c7 7f d3 9b 98 | 01 34 f8 57 09 1c 44 77 27 2b 95 8b 42 b2 1e 03 | d7 04 87 d9 03 b3 37 7c 1d b7 57 41 2d 16 5a a8 | dc c5 ad 48 e5 82 26 97 54 fe f5 c0 fe b9 29 58 | 35 ce 2a 1a 65 c3 c1 3a f9 04 5b 80 08 58 bc a4 | 5f 74 90 a2 3e 82 ee a6 80 5f 67 41 cd ba a6 4f | 66 85 f6 7c 29 e8 a5 11 0e c2 6f 44 c1 41 6a eb | 29 00 00 24 7c 1f b6 fc f1 5f 8d 51 2e 05 d2 13 | e2 d8 d5 f5 0f 0a 46 07 58 f7 ec 9e c5 1c 22 09 | 2c cd 2f ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 d1 0c 8f d2 91 2d a0 36 f1 93 d6 | bd 3f 30 ca a6 e2 8d 8a 00 00 00 1c 00 00 40 05 | 48 c0 59 12 12 13 1e e0 ba de 8c 06 ba c3 58 23 | f1 28 ea 8c | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #424 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 61 ef 5f 7f e3 58 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #424 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #424 | rejected packet: | e5 61 ef 5f 7f e3 58 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #424: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acec40 | handling event EVENT_RETRANSMIT for parent state #443 | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #443 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #443 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49679.734437; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500309 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #443 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 "road-eastnet-nonat-191" #443: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #443) | 99 e5 a7 37 44 6e 78 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 12 f7 51 e4 9b df 2b ce ce f2 ee 7b 13 94 51 | 6a dd a6 05 05 c5 f9 51 17 99 5e 09 04 c9 1f b2 | fd 1f 26 33 db d5 00 aa 13 04 1c 40 7e db ca 5a | d7 f8 59 90 a2 34 4e 73 d9 b4 1b 12 47 af 09 6a | 3d c6 bc 0a 75 d2 59 20 61 0f b0 78 2f f9 96 a8 | bc 6e fc a4 91 79 01 c5 c6 bf 55 5f ca 2a 71 57 | 55 3a c2 55 6a 02 68 58 b9 3f ee 10 26 00 19 6c | a4 9b 2b c5 37 91 ea 3d f7 92 10 15 3e 21 96 87 | 2b 42 57 b1 96 6e 0c 94 b6 11 c4 ca 44 56 8a bf | 72 e1 9f 77 2e b1 9f 72 96 c2 0b cd e9 02 1e ed | f4 40 75 83 23 4e d6 76 72 99 62 9c 55 c4 df 8d | 23 38 27 3c f9 b9 3f 1c 37 14 80 74 3c 7a 5d f8 | 1a 0c 7f 0d 3a 48 23 4c 35 58 8d c3 50 e9 4f d5 | 3a d4 b6 fa d0 f4 f0 02 7b 72 04 9c a6 5b 57 b7 | 6f ac e8 68 3f 0b ab 1c 0a 68 cc 2e 68 e9 56 e5 | 09 9a 32 64 09 77 95 51 f1 d9 2b dd e7 b2 96 44 | 29 00 00 24 d1 ee 39 81 5a e3 54 a6 73 c8 50 03 | 2c 50 da d8 32 42 2b e6 ab ed 1b 51 ff 8e f3 84 | d3 ae 77 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 53 91 6c eb c8 88 e0 f9 9e 54 62 | 8e 3a 67 1c 98 f2 42 50 00 00 00 1c 00 00 40 05 | 84 7e 67 f1 2a 8c cc 0b 8d 85 0d 9d a9 c1 72 b7 | 86 11 2f 01 | libevent_free: release ptr-libevent@0x7fb37c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acec40 | #443 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 e5 a7 37 44 6e 78 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #443 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #443 | rejected packet: | 99 e5 a7 37 44 6e 78 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #443: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378012890 | handling event EVENT_RETRANSMIT for parent state #438 | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #438 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #438 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49679.741817; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001424 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acec40 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #438 | libevent_malloc: new ptr-libevent@0x7fb37c02a950 size 128 "road-eastnet-nonat-186" #438: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #438) | 41 3e 80 fb 50 ac d5 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 f5 0a 72 18 b4 76 75 f6 01 ed 57 e5 f7 fc 77 | 49 c0 b9 2a a0 da 30 6d 64 aa a5 e7 d9 21 f7 0d | 91 be 59 58 e0 73 bb 49 e3 e7 3d e2 78 8a 04 ac | e2 97 a4 99 a2 30 e0 4b a8 00 c0 ee 42 04 60 c2 | 77 26 36 9f ca 4c 02 7c fe 9f ae b6 ae 04 ad 9a | 8f d0 27 5f 92 70 2c be 09 55 2c 26 bd b6 4c 20 | bf 73 30 d0 44 67 97 1f 1b 2e b0 03 d6 27 ac d2 | 9a 9e e4 f7 c7 3b 09 97 22 3c 54 79 43 94 36 23 | 17 e9 e5 03 2b e9 58 e3 73 9f 26 68 9a d9 44 87 | db f9 8f 3e f3 46 76 36 18 c6 80 3a ce aa cb fb | 5f dd ff d6 eb 23 75 c4 e2 35 1f 1d 81 9e 2a 45 | d7 f8 e7 91 af a5 b6 a5 46 57 1a 8c 96 c0 29 4e | 8e dc e8 e6 2d 92 82 6a 85 02 3a ad 02 27 a8 84 | 8c be 58 97 e6 a0 56 65 e3 b8 11 05 1f 19 4d bc | 68 44 f8 dd 63 ea 12 b6 6d 02 31 e2 3c 83 0c 90 | bb ff 2c 31 86 51 81 cf b9 63 dd 72 3b ea de db | 29 00 00 24 65 91 ed 0a d4 1d 29 43 43 2f 3a 60 | 71 14 cd 7a ee 7f 0c dc 85 e8 36 48 85 1d 6f 9b | 44 a1 8a 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 a7 76 d6 c0 45 d0 97 b1 a7 8c de | d2 b0 18 be bd b1 c7 45 00 00 00 1c 00 00 40 05 | 93 a1 f0 74 30 f5 50 67 ed 62 ea 87 43 47 97 7c | d7 55 2f e9 | libevent_free: release ptr-libevent@0x7fb37802a8c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378012890 | #438 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 3e 80 fb 50 ac d5 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #438 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #438 | rejected packet: | 41 3e 80 fb 50 ac d5 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #438: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0453 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abe740 | handling event EVENT_RETRANSMIT for parent state #197 | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #197 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #197 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49679.747202; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.027698 exceeds limit? YES "road-eastnet-nonat-197" #197: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-197" #197: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #449 at 0x557d46adfc40 | State DB: adding IKEv2 state #449 in UNDEFINED | pstats #449 ikev2.ike started | Message ID: init #449: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #449: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #449; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-197" #449: initiating v2 parent SA to replace #197 | using existing local IKE proposals for connection road-eastnet-nonat-197 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 449 for state #449 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb378012890 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #449 | libevent_malloc: new ptr-libevent@0x7fb37802a8c0 size 128 | #449 spent 0.076 milliseconds in ikev2_parent_outI1() | RESET processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #197 ikev2.ike failed too-many-retransmits | pstats #197 ikev2.ike deleted too-many-retransmits | #197 spent 2.61 milliseconds in total | [RE]START processing: state #197 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-197" #197: deleting state (STATE_PARENT_I1) aged 64.029s and NOT sending notification | parent state #197: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #197 "road-eastnet-nonat-197" #197: deleting IKE SA for connection 'road-eastnet-nonat-197' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-197' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-197 | State DB: deleting IKEv2 state #197 in PARENT_I1 | parent state #197: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 6 resuming | crypto helper 6 starting work-order 449 for state #449 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 449 | stop processing: state #197 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb34c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe740 | in statetime_stop() and could not find #197 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-197 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-197" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-197' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-197" | stop processing: connection "road-eastnet-nonat-197" (in initiate_a_connection() at initiate.c:349) | spent 0.0584 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 449 time elapsed 0.000576 seconds | (#449) spent 0.58 milliseconds in crypto helper computing work-order 449: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 449 for state #449 to event queue | scheduling resume sending helper answer for #449 | libevent_malloc: new ptr-libevent@0x7fb36c03a770 size 128 | crypto helper 6 waiting (nothing to do) | processing resume sending helper answer for #449 | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 449 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #449 | **emit ISAKMP Message: | initiator cookie: | ea 52 41 06 29 be 32 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-197 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1c f6 72 22 70 e3 8e 6a 67 c3 d0 4a 0b 7f 5b cf | ikev2 g^x 2d 68 56 81 95 56 3f 4d 2a 1e 61 1a 59 76 f5 26 | ikev2 g^x 54 d5 6a 01 f4 8a a1 63 50 3e a3 b6 d1 85 12 bf | ikev2 g^x 8c a7 c8 b2 9c d2 7e 12 ce 8a 8f 97 a7 10 c6 36 | ikev2 g^x 55 54 39 bd 73 f0 07 97 c0 8f d8 2f a2 5e 50 05 | ikev2 g^x cb 9d 1a b8 ce 20 6a 30 ff 7d 3d 2a 89 9c e8 f9 | ikev2 g^x db 68 6b e7 d3 12 f3 5c 42 81 cc 9e c7 d6 ab 3b | ikev2 g^x 07 00 72 f9 2b bb 2c 8f 88 74 45 a7 1f 5a 2d 17 | ikev2 g^x 94 3e ec e0 ce a9 ab 72 79 45 76 ba 8c 1f 40 56 | ikev2 g^x 6d 7a 46 42 83 af a1 98 c5 23 1e 58 16 d7 79 25 | ikev2 g^x b7 cc 17 53 0a 7f 1c 45 dc 0f 11 52 e6 bb 5f 53 | ikev2 g^x 8d b5 f6 fb 27 2b 60 33 a4 cd 4d e9 7c 6b 4b 17 | ikev2 g^x 81 ec cb ca e4 d2 97 9b 61 33 64 a7 c9 1d 12 b0 | ikev2 g^x ff a4 81 cf f4 75 a2 54 63 07 9b 1c 61 4f 70 9a | ikev2 g^x f2 61 b3 19 96 98 3c 7b 44 1f aa 65 b4 bf d7 a8 | ikev2 g^x 55 c2 75 de ff 71 8c 90 1b 3c c3 a8 3f fe 54 f3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 43 77 8d 20 c7 95 c9 d5 6a 2d 87 1f da 3a b4 7e | IKEv2 nonce 55 a2 17 ed 53 70 56 79 ef 21 f9 7e 28 b4 26 9a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ea 52 41 06 29 be 32 63 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c5 | natd_hash: port= 01 f4 | natd_hash: hash= 62 9b 7e ce 31 a7 8d 1a 50 79 db 89 b3 07 e5 e2 | natd_hash: hash= b0 c0 20 fc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 62 9b 7e ce 31 a7 8d 1a 50 79 db 89 b3 07 e5 e2 | Notify data b0 c0 20 fc | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ea 52 41 06 29 be 32 63 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= eb cc 39 a0 b6 a4 78 79 56 5f 29 29 93 1e cc 18 | natd_hash: hash= 29 12 ff 3b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data eb cc 39 a0 b6 a4 78 79 56 5f 29 29 93 1e cc 18 | Notify data 29 12 ff 3b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #449 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #449: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #449 to 4294967295 after switching state | Message ID: IKE #449 skipping update_recv as MD is fake | Message ID: sent #449 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-197" #449: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.197:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #449) | ea 52 41 06 29 be 32 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c f6 72 22 70 e3 8e 6a 67 c3 d0 4a 0b 7f 5b cf | 2d 68 56 81 95 56 3f 4d 2a 1e 61 1a 59 76 f5 26 | 54 d5 6a 01 f4 8a a1 63 50 3e a3 b6 d1 85 12 bf | 8c a7 c8 b2 9c d2 7e 12 ce 8a 8f 97 a7 10 c6 36 | 55 54 39 bd 73 f0 07 97 c0 8f d8 2f a2 5e 50 05 | cb 9d 1a b8 ce 20 6a 30 ff 7d 3d 2a 89 9c e8 f9 | db 68 6b e7 d3 12 f3 5c 42 81 cc 9e c7 d6 ab 3b | 07 00 72 f9 2b bb 2c 8f 88 74 45 a7 1f 5a 2d 17 | 94 3e ec e0 ce a9 ab 72 79 45 76 ba 8c 1f 40 56 | 6d 7a 46 42 83 af a1 98 c5 23 1e 58 16 d7 79 25 | b7 cc 17 53 0a 7f 1c 45 dc 0f 11 52 e6 bb 5f 53 | 8d b5 f6 fb 27 2b 60 33 a4 cd 4d e9 7c 6b 4b 17 | 81 ec cb ca e4 d2 97 9b 61 33 64 a7 c9 1d 12 b0 | ff a4 81 cf f4 75 a2 54 63 07 9b 1c 61 4f 70 9a | f2 61 b3 19 96 98 3c 7b 44 1f aa 65 b4 bf d7 a8 | 55 c2 75 de ff 71 8c 90 1b 3c c3 a8 3f fe 54 f3 | 29 00 00 24 43 77 8d 20 c7 95 c9 d5 6a 2d 87 1f | da 3a b4 7e 55 a2 17 ed 53 70 56 79 ef 21 f9 7e | 28 b4 26 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 9b 7e ce 31 a7 8d 1a 50 79 db 89 | b3 07 e5 e2 b0 c0 20 fc 00 00 00 1c 00 00 40 05 | eb cc 39 a0 b6 a4 78 79 56 5f 29 29 93 1e cc 18 | 29 12 ff 3b | state #449 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37802a8c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb378012890 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe740 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #449 | libevent_malloc: new ptr-libevent@0x7fb34c0251c0 size 128 | #449 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49679.748327 | resume sending helper answer for #449 suppresed complete_v2_state_transition() and stole MD | #449 spent 0.338 milliseconds in resume sending helper answer | stop processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c03a770 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 52 41 06 29 be 32 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #449 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #449 | rejected packet: | ea 52 41 06 29 be 32 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c5 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #449: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338012bf0 | handling event EVENT_RETRANSMIT for parent state #342 | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #342 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #342 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49679.749594; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004328 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012890 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #342 | libevent_malloc: new ptr-libevent@0x7fb36c03a770 size 128 "road-eastnet-nonat-90" #342: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #342) | 92 0e 5c 44 35 6f 61 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 4b 3f 50 56 cd 4f c8 69 53 e3 02 d0 e2 c4 4b | b8 26 12 0d 2f 95 d4 df 65 d2 22 1d a5 8a 76 36 | 0f 44 f3 88 67 5b a4 93 af 87 fb e7 03 3d f3 3d | ce 49 25 06 46 21 51 fe e6 a5 e0 3f 25 17 b0 d7 | 71 9b 71 32 36 21 5f b7 2a ee 25 9c 8a 04 76 c2 | 55 e4 ab 4e 7c 02 05 d1 d2 21 09 a2 51 a4 92 f0 | 79 2b 73 03 6e bc d5 33 3d 90 f5 1b b7 cb cd e9 | 74 b4 08 87 c4 a4 7c ab 86 b2 e8 fe f3 2e a7 14 | da 5c 13 a2 0a 83 be 25 a6 25 48 21 ec 98 11 c6 | 1d 49 83 e7 e3 39 34 26 fb d4 24 cb d2 66 1f a9 | 8b 7b 97 28 60 bf e3 df fc be 83 7a 91 a4 90 3a | af ad 2d 44 70 c8 0c 11 ab e1 87 f9 88 5b 04 d8 | 04 03 d4 08 d3 e9 32 2b 30 9c 93 90 d3 62 4a 73 | df 00 65 61 53 f7 33 9c 73 ad fe 53 5a 29 aa 93 | da 76 97 14 51 4b d0 f8 fb 54 f6 6e 4f 99 ad 4b | 75 e5 97 56 5f 2e 08 fb ed 71 37 6a 4a ad d6 62 | 29 00 00 24 02 01 86 b0 0f 40 c1 16 7f df 21 87 | ce a9 58 2f 27 7b 28 e0 c6 1c d2 35 82 80 ac e4 | ab 80 e7 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 56 62 15 04 08 91 44 63 ec 81 3e 0b | 9f 8e c8 3c d5 eb af f0 00 00 00 1c 00 00 40 05 | 60 c3 81 cb a9 a6 9e ac 92 76 43 f4 51 0d 3b 6e | 52 02 3f 95 | libevent_free: release ptr-libevent@0x7fb35003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338012bf0 | #342 spent 0.0978 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 0e 5c 44 35 6f 61 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #342 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #342 | rejected packet: | 92 0e 5c 44 35 6f 61 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #342: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37400cc10 | handling event EVENT_RETRANSMIT for parent state #425 | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #425 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #425 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49679.757913; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004063 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #425 | libevent_malloc: new ptr-libevent@0x7fb35003b0b0 size 128 "road-eastnet-nonat-173" #425: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #425) | f7 cf 50 4a 74 06 05 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 92 89 d6 89 4e 50 5f b7 2f 6b 96 d5 81 21 07 | ab 44 17 58 90 1d 7b 64 81 e9 17 d7 bd fe aa 4b | 0a 10 ad 93 a3 c3 87 5f f5 66 29 fb c9 3a c9 b1 | 31 b0 a9 ee c4 90 84 b7 e6 dd 91 e8 75 48 e7 2e | 93 2f d6 a2 f7 4b f6 49 3f d9 f6 d0 5a d6 d1 dd | 4f 9d c2 ed c5 18 e2 07 13 e3 28 e5 ef cc 0a 8a | 3b 35 e0 3e 37 bc 79 9f 2a 04 4a f3 9c f9 c1 fe | 06 93 6a fc 31 07 8c 82 e2 3d 36 5b 4c 64 57 29 | 42 03 5c 40 11 83 46 58 6b 89 40 fb 97 9c 72 d8 | 16 d1 a0 21 3d 63 55 3f 12 ce 3e bc a1 a4 b1 4f | 21 3c 91 be 83 c8 57 a7 2b 28 e1 48 64 02 57 7e | 42 a3 f1 45 48 e1 db 05 2e fb d4 4c 7c 8a 0a 60 | 5f f4 86 80 46 9a e0 d0 18 11 1a 4d bb 7c 02 87 | bf 2e e0 bb 87 e9 5f b8 47 04 4d f1 27 cf b3 29 | 9c 1a d0 ad 05 bc 03 0c 16 0c 3a 7e 72 1b 12 70 | b9 a4 26 8b 78 5c b2 39 ba 99 5c 08 5d fd 0b bd | 29 00 00 24 5f 48 0d c0 35 2d 82 0c 4e 37 c0 2d | fb 4b f1 c7 3e 7f d8 da d2 4b 1d 20 b9 ad b0 f8 | d9 af 0c f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 91 c4 e4 6c ee a0 d8 c3 62 ab 89 | a1 7e a7 1c b9 03 c3 d0 00 00 00 1c 00 00 40 05 | 62 01 4a 70 10 9c f9 53 26 65 4b 23 2c 02 6b 53 | 25 3b 71 4a | libevent_free: release ptr-libevent@0x7fb37401f7f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37400cc10 | #425 spent 0.0984 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 cf 50 4a 74 06 05 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #425 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #425 | rejected packet: | f7 cf 50 4a 74 06 05 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #425: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0498 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c040840 | handling event EVENT_RETRANSMIT for parent state #395 | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #395 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #395 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49679.760199; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004093 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37400cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #395 | libevent_malloc: new ptr-libevent@0x7fb37401f7f0 size 128 "road-eastnet-nonat-143" #395: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #395) | ba 7b 3c 0c 6c 47 ed ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 88 4c 55 7e d1 a2 38 a3 4d 34 44 bf 98 52 f4 22 | 2b 2e d7 52 9d e2 60 32 f1 e9 de 11 e6 81 90 27 | 7f aa b4 cd 92 c7 cc 0a 99 86 49 e0 e9 e5 7f c7 | 53 00 84 30 c4 2b a1 40 94 2b e5 13 32 e0 cc 77 | 9f 67 6c cf 30 e7 4a c4 94 da 5f 5f 42 9a ce 83 | 94 65 21 10 2f c8 9d e9 90 7c c8 a2 24 10 5f eb | b7 e4 01 18 df 72 f4 7a bb ab 13 f9 5e 78 3b bb | fa c9 e1 75 55 1d c1 7d 77 9c f5 dd 9c f1 6d cf | 64 15 f4 f8 06 12 d8 2b 76 e9 8f 68 61 57 5e f9 | ce b7 25 0f 70 50 5b 08 f7 40 3f 01 f6 b5 a6 1b | 6a b5 fe b6 73 a7 04 b2 74 dc 3e 4a 46 a2 06 81 | 11 ce 3e 21 33 d9 a8 2a ee 54 b5 69 d8 57 77 1f | dc ec 39 32 06 54 92 6d 8f 0a ca d2 fd fd bd fb | 1b 7c 6a b6 6b 55 6f cb c2 b7 b7 fb e7 79 1c 7d | c3 44 5b 72 2c bc 4f 59 92 b8 bc 2a d4 d1 be 0f | 33 95 9e 53 f7 bf 90 2f bf b1 8e 5f 51 a1 8b aa | 29 00 00 24 bd 0e 20 29 4b d5 e3 ae 9c 68 67 e1 | 41 5b 48 5c 33 08 9f 5c 1f 4f 9e 6e c3 72 5b 33 | 2c ad 1f 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b1 4d 21 6f 15 00 d4 49 f9 94 84 2e | 85 71 98 cf 82 ff b0 a3 00 00 00 1c 00 00 40 05 | 8a 38 a6 07 76 28 82 e1 53 d4 45 b3 59 f3 34 be | 83 20 f5 6d | libevent_free: release ptr-libevent@0x7fb34c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c040840 | #395 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 7b 3c 0c 6c 47 ed ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #395 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #395 | rejected packet: | ba 7b 3c 0c 6c 47 ed ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #395: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0519 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #444 | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #444 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #444 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49679.807541; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500365 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c040840 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #444 | libevent_malloc: new ptr-libevent@0x7fb34c00cf80 size 128 "road-eastnet-nonat-192" #444: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #444) | 7f 9a e3 30 35 a2 50 3a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 73 44 16 cd dc 6d af 1e 52 47 5f 1e bd fa ee | 64 00 7c 0c 09 cd 6a b9 96 7a 9e fd 7b 60 d3 11 | 94 7f f3 14 ab de fc 67 4d 77 8c ed ae 35 5e 21 | 92 1a 34 1f 52 96 c6 b4 82 cf e2 da a3 5d a8 40 | 55 b6 be b1 02 f7 4f 09 53 8a 9a 82 43 68 c5 03 | 91 79 7b fa ca eb 01 ae de 9c b8 57 af 0c ad 92 | 90 f7 80 a3 5f 1b 76 77 00 b6 f8 6e 45 fc bc 6c | 08 e0 42 31 50 bd 6d b4 9c ee e1 eb b4 38 73 a9 | 34 e4 98 23 d2 4d e0 d9 b6 c6 f6 dc 56 58 4e 20 | 84 e1 d2 8f 09 7f 4a 9d 26 b0 f3 d6 00 33 87 e7 | 4a de ea 2f 4a 53 b4 0f 48 62 38 e9 50 42 17 64 | 60 9a 88 18 4e 23 6b 6a 5a a4 6b 23 ad 33 67 82 | 97 a8 79 73 5f c7 02 96 5e 91 0e 40 d6 4e f8 b3 | d9 30 5c 69 30 3f 5d 5d 8a 33 e5 82 75 a6 f8 01 | e5 10 de e1 1f 27 d1 2a e8 d2 12 a6 bb 52 29 5c | 7e c1 67 58 19 ab fb 58 65 a2 55 1e 99 be f5 8d | 29 00 00 24 2a ad 1b 39 f3 fd f9 42 4c 00 4a 5c | ed 00 f4 3a 31 ea eb b5 54 5a 5c 9d a2 7d 7c c4 | 61 a7 b5 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 d0 f0 6f a1 ca 95 cb 19 9f 38 2a | 49 20 b8 20 36 38 5c 50 00 00 00 1c 00 00 40 05 | 75 b6 79 50 7c d3 43 75 20 ac ac 20 ab c2 0f 0e | 7d 73 a1 76 | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #444 spent 0.237 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 9a e3 30 35 a2 50 3a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #444 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #444 | rejected packet: | 7f 9a e3 30 35 a2 50 3a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #444: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.105 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378046090 | handling event EVENT_RETRANSMIT for parent state #439 | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #439 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #439 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49679.813083; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002201 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #439 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 "road-eastnet-nonat-187" #439: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #439) | 47 50 75 67 1d 00 52 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 10 e6 27 54 79 a5 06 ab 7b 5d 27 c9 72 11 8a | be 8d 9d bf 52 e0 ac e0 58 f4 00 83 0a 18 2a d4 | 41 71 ec e9 2e f0 05 ec e8 a2 ec d2 28 ce f8 d4 | e5 81 d8 3c 87 bc 89 6a 8b 0a 1a e2 d3 eb 38 44 | e6 af 0a 47 aa 17 06 2d e7 33 df 52 16 8d b3 fb | d9 67 8e 07 e3 c9 9e 52 cf 8d 56 fb 7c c2 93 d9 | 9d 49 6e f0 2c fb ae b5 5c 7d 08 de 63 dc 9b 39 | 2d fb 3d b8 63 14 a9 ce d9 19 af ff bb a7 b1 81 | 41 c7 41 67 e7 53 2b fa 68 10 a5 13 3f f8 0f e7 | 33 85 43 eb a8 54 d5 5b fd f4 a1 1e d5 4f 32 99 | 86 f6 ec 22 05 a8 98 ec cb 6f de 01 77 3a 63 2b | 85 0f 08 c2 e9 6d 60 39 18 10 c9 3c 04 a6 69 c0 | 90 8a 6f 1c 7a 2e 85 ad 4f 29 5f 48 49 12 08 e4 | 72 3f d7 cc 42 6d 91 5a f7 f3 7b 44 dc 38 f7 05 | b2 bf 70 89 ab 24 52 cd cd c1 b3 61 99 9d a9 28 | e2 c4 12 1d de cd 37 64 c2 e0 70 28 45 34 de 67 | 29 00 00 24 d9 2f 24 9b 75 f5 ca 1e 2e 7d f4 06 | 41 a2 89 f3 ae c7 ae 61 65 4e 5f 7f 65 dd c2 12 | ae ae 3a 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 fd b4 2f 23 17 b8 9b d8 0c 2a 45 | b9 34 13 eb df 7c 42 33 00 00 00 1c 00 00 40 05 | f1 b3 a4 02 7a 60 50 36 46 44 d9 88 f9 29 1a 5f | aa 01 32 cb | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378046090 | #439 spent 0.23 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 50 75 67 1d 00 52 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #439 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #439 | rejected packet: | 47 50 75 67 1d 00 52 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #439: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.1 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38800feb0 | handling event EVENT_RETRANSMIT for parent state #426 | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #426 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #426 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49679.828597; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00378 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378046090 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #426 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 "road-eastnet-nonat-174" #426: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #426) | 9a cd 73 8e 7d d4 98 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 8c 97 9a 7b 25 95 00 9a 77 62 32 ef ca 9f d6 | 76 8f c1 1d 7b f7 f1 fd 6f 49 39 37 2f 63 23 81 | 71 66 7a 84 28 0c 71 94 62 69 ce 59 2d d7 c5 69 | 55 1a 91 d5 7e 6b 73 77 b1 63 3d e2 98 99 4c 7d | 88 69 a7 7b 5e bc cc b8 0e b3 73 c2 2e 32 ae 8e | 86 79 03 81 0b 4c 54 b4 73 a6 e2 6e 97 ca 67 d3 | 85 98 35 01 61 ca 66 d6 14 1b 0e ed 3a 29 6c 85 | ba 28 d6 d7 db e6 44 77 a6 ce 5b 46 99 7c a1 df | 78 8d f1 17 d8 0f f9 ea 99 30 fc e2 cf b2 41 e0 | b2 47 0b 49 32 f7 03 99 56 d9 28 c3 7a 54 f6 02 | 19 cd 98 7b 73 22 d4 cd 39 3f 7a 0d d8 d7 cd a6 | 8a 6b 30 16 cd 73 f2 96 6c 21 9f bd 4e e5 1b e4 | 55 08 4d 75 fb 1c cb 36 33 b5 70 97 3d ae 1c 0b | fd 17 d6 8a db a7 4c eb 93 47 b3 25 b1 c8 9d b9 | 3c fc 99 0e e7 eb 29 07 c1 90 16 1e 24 76 3c e1 | f0 b6 2f 6d 76 8c 81 1b 13 f1 8a 90 f5 6f 06 29 | 29 00 00 24 9e 79 2e b7 2a 97 cc 4e 5e 3a 53 a1 | 14 f4 9d f2 e0 f1 3a 21 7a b3 38 2d 77 ac 99 ad | 8b c3 54 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 36 a3 f8 78 1e 60 6d 59 1a 44 b3 | 39 63 64 a7 a1 bd a5 d0 00 00 00 1c 00 00 40 05 | 8b d1 e6 ab 49 4a f3 b9 19 1d c0 80 f7 d0 cb 97 | 3f 74 7f 21 | libevent_free: release ptr-libevent@0x7fb384032b00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800feb0 | #426 spent 0.23 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3840223f0 | handling event EVENT_RETRANSMIT for parent state #343 | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #343 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #343 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49679.82887; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005378 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800feb0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #343 | libevent_malloc: new ptr-libevent@0x7fb384032b00 size 128 "road-eastnet-nonat-91" #343: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #343) | ae 78 c6 a9 8f e8 66 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 9d b8 ed 06 43 12 ec 4c 45 2d d2 98 f8 e4 c2 | 36 59 63 a7 5a 33 ff 67 e3 f9 f4 1f 01 a9 3a 4c | 55 90 c8 83 a0 29 a8 aa 4f ac db f2 6f 11 94 39 | df dd ed a8 03 f3 60 cc f4 5f c8 16 76 2c 18 b3 | 52 5b 1b ac 7a 46 b0 6c 28 af 43 e8 e9 1f 42 2d | 46 d8 e4 d3 78 66 14 97 ce c1 cd 0c 3c 65 65 46 | 46 82 84 7e d0 a7 70 e0 17 0f db 9a 4e 29 93 92 | 21 22 73 35 c9 ca 2f af 9d 0a 64 5c 81 08 63 7f | e9 bd 70 7e 9e c2 db 6e 8e 2d a9 2d 3d e8 0e 81 | cf 97 9f 13 45 5f d0 17 a5 46 81 8f f6 9c 9c dd | 6d 72 b6 df 14 55 64 61 52 e1 4b 46 36 b7 06 8a | 6d 94 56 ae f7 f9 54 fa 14 95 61 ab b8 b6 ec c3 | e8 2c f9 02 e7 ab 10 28 9e 67 38 42 93 d6 89 7e | bb 6a dc 83 42 00 3f 72 de b7 9e 71 be 55 39 21 | 54 8b a5 97 b3 b2 06 f8 5f 7f 26 67 9a c1 3f 7e | 51 39 34 0f ac 86 ce 7b e6 99 54 4b 79 6e 8f 0a | 29 00 00 24 65 6f dc 77 c3 29 54 5a 74 6e 49 3d | 05 2a fe cf 26 c9 29 fa f4 9d 54 09 a5 a6 15 69 | 11 b4 0e 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 ad 81 e7 cf f7 25 7c 0f 5a 2a 07 | aa 17 3c 2f 54 ca c3 2d 00 00 00 1c 00 00 40 05 | 5d 1d e0 9d fe 43 fa fd 70 69 f4 3c 05 77 9a 1e | 38 96 d9 39 | libevent_free: release ptr-libevent@0x7fb38401cc10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840223f0 | #343 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a cd 73 8e 7d d4 98 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #426 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #426 | rejected packet: | 9a cd 73 8e 7d d4 98 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #426: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.112 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 78 c6 a9 8f e8 66 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #343 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #343 | rejected packet: | ae 78 c6 a9 8f e8 66 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #343: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0899 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b246c0 | handling event EVENT_RETRANSMIT for parent state #198 | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #198 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #198 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49679.833432; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009147 exceeds limit? YES "road-eastnet-nonat-198" #198: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-198" #198: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #450 at 0x557d46ae1200 | State DB: adding IKEv2 state #450 in UNDEFINED | pstats #450 ikev2.ike started | Message ID: init #450: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #450: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #450; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-198" #450: initiating v2 parent SA to replace #198 | using existing local IKE proposals for connection road-eastnet-nonat-198 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 450 for state #450 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb3840223f0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #450 | libevent_malloc: new ptr-libevent@0x7fb38401cc10 size 128 | #450 spent 0.138 milliseconds in ikev2_parent_outI1() | crypto helper 11 resuming | RESET processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 starting work-order 450 for state #450 | start processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #198 ikev2.ike failed too-many-retransmits | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 450 | pstats #198 ikev2.ike deleted too-many-retransmits | #198 spent 2.65 milliseconds in total | [RE]START processing: state #198 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-198" #198: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #198: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #198 "road-eastnet-nonat-198" #198: deleting IKE SA for connection 'road-eastnet-nonat-198' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-198' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-198 | State DB: deleting IKEv2 state #198 in PARENT_I1 | parent state #198: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 450 time elapsed 0.001519 seconds | stop processing: state #198 from 192.1.2.23:500 (in delete_state() at state.c:1143) | (#450) spent 1.51 milliseconds in crypto helper computing work-order 450: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 450 for state #450 to event queue | scheduling resume sending helper answer for #450 | libevent_malloc: new ptr-libevent@0x7fb360034680 size 128 | libevent_free: release ptr-libevent@0x7fb34c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b246c0 | in statetime_stop() and could not find #198 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 11 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-198 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-198" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-198' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-198" | stop processing: connection "road-eastnet-nonat-198" (in initiate_a_connection() at initiate.c:349) | spent 0.109 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #450 | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 450 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #450 | **emit ISAKMP Message: | initiator cookie: | 6c 66 54 70 e3 85 47 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-198 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1b 7f 52 be 1b be 3e b4 95 6c 7f ea ce 79 84 79 | ikev2 g^x bb 2c a4 22 02 14 1a c7 80 c9 fc 63 a2 df a7 b4 | ikev2 g^x 1d c3 3e 47 98 35 3a c5 6d 01 79 cf ce 3b ed 3f | ikev2 g^x e7 fc 21 90 6a 8f a9 37 0a 15 57 ed e5 84 6d 80 | ikev2 g^x bc b0 af 24 80 0c 58 35 20 db 3e aa 64 ad 44 83 | ikev2 g^x d9 34 7e 33 a0 1c 88 af b7 63 e8 97 42 89 19 cf | ikev2 g^x e1 51 ee bc 36 b3 3f ea ae 0a 36 ea 2a 42 b5 d5 | ikev2 g^x 2b 9d 6c 67 c3 b5 e3 5c 88 ec 08 73 1a b8 90 c6 | ikev2 g^x eb c9 08 93 4a fd 61 5f ac b7 cf 92 b0 ce 44 08 | ikev2 g^x c5 ea 9d d1 33 ae 08 3a 55 1a 54 74 ee 06 12 8c | ikev2 g^x af 05 f1 32 8b f9 ad 76 e7 15 cf bb 56 d8 0d 22 | ikev2 g^x aa bf 8f d9 bc 81 33 05 b5 ca b2 64 e4 57 c2 aa | ikev2 g^x 8a ce 60 a9 03 71 24 23 e8 e9 eb 0e f3 fd cb 40 | ikev2 g^x 57 21 41 6c 87 a4 12 87 6c a3 20 f1 71 99 97 a1 | ikev2 g^x c9 bf 28 c9 61 1f 0e d1 0f d5 eb 18 2d 83 11 2c | ikev2 g^x a4 a9 46 db 50 5e 63 04 e8 1e e0 10 c3 22 6d 3c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 60 b3 78 69 cb 9c d2 f7 d6 cf 6b 51 75 18 c5 a7 | IKEv2 nonce 1c 11 fb 00 38 fa 43 80 05 51 ec 75 df 66 73 10 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6c 66 54 70 e3 85 47 18 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c6 | natd_hash: port= 01 f4 | natd_hash: hash= 45 01 2f 17 96 36 9a 51 cd 6f 6e a8 c1 69 8d 8a | natd_hash: hash= 84 17 97 6b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 45 01 2f 17 96 36 9a 51 cd 6f 6e a8 c1 69 8d 8a | Notify data 84 17 97 6b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6c 66 54 70 e3 85 47 18 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 07 24 02 da 94 a8 c8 5e ad a8 39 f9 98 2f 5a 91 | natd_hash: hash= 01 02 06 a3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 07 24 02 da 94 a8 c8 5e ad a8 39 f9 98 2f 5a 91 | Notify data 01 02 06 a3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #450 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #450: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #450 to 4294967295 after switching state | Message ID: IKE #450 skipping update_recv as MD is fake | Message ID: sent #450 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-198" #450: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.198:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #450) | 6c 66 54 70 e3 85 47 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 7f 52 be 1b be 3e b4 95 6c 7f ea ce 79 84 79 | bb 2c a4 22 02 14 1a c7 80 c9 fc 63 a2 df a7 b4 | 1d c3 3e 47 98 35 3a c5 6d 01 79 cf ce 3b ed 3f | e7 fc 21 90 6a 8f a9 37 0a 15 57 ed e5 84 6d 80 | bc b0 af 24 80 0c 58 35 20 db 3e aa 64 ad 44 83 | d9 34 7e 33 a0 1c 88 af b7 63 e8 97 42 89 19 cf | e1 51 ee bc 36 b3 3f ea ae 0a 36 ea 2a 42 b5 d5 | 2b 9d 6c 67 c3 b5 e3 5c 88 ec 08 73 1a b8 90 c6 | eb c9 08 93 4a fd 61 5f ac b7 cf 92 b0 ce 44 08 | c5 ea 9d d1 33 ae 08 3a 55 1a 54 74 ee 06 12 8c | af 05 f1 32 8b f9 ad 76 e7 15 cf bb 56 d8 0d 22 | aa bf 8f d9 bc 81 33 05 b5 ca b2 64 e4 57 c2 aa | 8a ce 60 a9 03 71 24 23 e8 e9 eb 0e f3 fd cb 40 | 57 21 41 6c 87 a4 12 87 6c a3 20 f1 71 99 97 a1 | c9 bf 28 c9 61 1f 0e d1 0f d5 eb 18 2d 83 11 2c | a4 a9 46 db 50 5e 63 04 e8 1e e0 10 c3 22 6d 3c | 29 00 00 24 60 b3 78 69 cb 9c d2 f7 d6 cf 6b 51 | 75 18 c5 a7 1c 11 fb 00 38 fa 43 80 05 51 ec 75 | df 66 73 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 01 2f 17 96 36 9a 51 cd 6f 6e a8 | c1 69 8d 8a 84 17 97 6b 00 00 00 1c 00 00 40 05 | 07 24 02 da 94 a8 c8 5e ad a8 39 f9 98 2f 5a 91 | 01 02 06 a3 | state #450 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38401cc10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb3840223f0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b246c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #450 | libevent_malloc: new ptr-libevent@0x7fb34c035930 size 128 | #450 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49679.836251 | resume sending helper answer for #450 suppresed complete_v2_state_transition() and stole MD | #450 spent 0.784 milliseconds in resume sending helper answer | stop processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb360034680 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 66 54 70 e3 85 47 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #450 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #450 | rejected packet: | 6c 66 54 70 e3 85 47 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c6 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #450: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.101 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37000d120 | handling event EVENT_RETRANSMIT for parent state #396 | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #396 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #396 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49679.838556; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004894 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360012bf0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #396 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 "road-eastnet-nonat-144" #396: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #396) | 34 3a ea ba b4 d5 c3 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 b3 5e a9 7f 93 97 83 00 ac b3 90 fb e7 f1 78 | 95 aa f1 ba 36 2b 6d a3 37 11 74 f8 88 50 3b b9 | 5f 0f a0 79 72 f7 39 e7 3a 2c a8 e0 53 9b be fd | fc bd 96 c1 32 d9 24 ce f7 06 60 ff b3 43 45 a6 | 24 b9 a3 f5 cb 0e b9 aa aa 8e 8f d1 f4 f2 6e c0 | 2d cf 97 8a 96 4c c9 d9 fa 9b b2 4f 23 e7 4e 04 | 32 38 36 77 bf 5c cc 5e 9d b8 9a 89 95 85 a0 cd | 38 05 64 bb 18 47 79 4a 9e e0 36 97 2c 58 a9 ca | 05 7e fc 24 b9 aa 44 5a 5a 1a 01 53 4f 6b 25 9c | 0b 57 f1 a9 6c 20 f6 40 eb 60 95 56 91 d3 93 3b | e3 6f 55 d6 2d 80 8e 1b 25 11 49 ca e7 6a 57 76 | 46 38 51 f8 26 5f df d7 e7 dc 81 fb 26 f9 44 9d | 73 c6 16 4c 9f 24 d8 42 a4 b9 bf 36 76 cf 2d c1 | 81 f5 6e 1c 27 05 14 9e 74 b9 a7 24 89 53 2b 8a | e5 d2 6e 23 b8 62 43 c8 68 d3 55 8e 35 2d 54 67 | 77 ed 1c 39 ec 49 32 f8 1f c9 68 6b 34 67 a6 5c | 29 00 00 24 70 3a 86 3e 59 bb d0 ee e5 b9 db 1d | c8 9a e2 55 5b 79 c1 c3 66 32 3d 49 47 3b f1 44 | bc b6 4a ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 b0 29 ea 4a 03 79 05 a6 d6 5d 03 | 24 78 07 cd 73 8e b4 4c 00 00 00 1c 00 00 40 05 | cb 86 b2 db 9b fe 49 fd e2 3b b4 79 c3 f9 fd 58 | 79 48 29 02 | libevent_free: release ptr-libevent@0x7fb370029490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37000d120 | #396 spent 0.21 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 3a ea ba b4 d5 c3 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #396 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #396 | rejected packet: | 34 3a ea ba b4 d5 c3 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #396: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.127 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5da90 | handling event EVENT_RETRANSMIT for parent state #445 | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #445 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #445 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49679.902068; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501612 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37000d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #445 | libevent_malloc: new ptr-libevent@0x7fb370029490 size 128 "road-eastnet-nonat-193" #445: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #445) | b4 2e 78 cc c5 f6 9b 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a ba 44 5e e8 04 0b 1d 80 c6 75 3f 8a bb 68 32 | 06 11 b8 93 58 a0 e3 d0 41 9a dc df 91 ac 0b 46 | b8 6d fc ac c1 e9 09 52 48 47 7e 50 d3 96 46 49 | 4c db ea ed bd 20 06 58 05 cd d9 91 57 1d 80 4d | 27 35 e2 86 24 5f 4e 32 bf 57 32 fe 52 fe 8f 11 | 64 dd f6 c1 cf a0 23 81 27 d1 05 22 c7 e8 81 e4 | 67 a9 8c 32 ef 56 b6 40 b1 5f 41 a6 60 fd 00 92 | 0a e3 78 9b f2 03 2c 98 1e 8c fc 31 fc 9b e2 d2 | 0c f9 17 3c fe e3 b4 da 8e 06 ef 92 fc 84 24 e8 | 41 6f 79 14 e9 fb a1 a0 07 48 de 12 d6 84 2d 7e | 90 30 a3 38 3d 28 16 c5 17 69 90 4c 1a 42 aa f9 | c8 01 fd 3b 2e 46 f9 3b 3c c2 87 e4 f3 79 4f c7 | 11 59 a6 e8 26 10 94 45 c9 46 e9 8c ab e9 1d 28 | 48 da 5b 23 c8 48 65 23 9b 45 8d ab 8d 58 2e 78 | 34 e4 38 1d 80 97 ed 49 5c 38 3d af 3b ec ad d6 | 83 24 62 c1 f1 7d c9 59 93 3c f3 1e db d1 30 e4 | 29 00 00 24 43 99 24 d2 66 51 b3 d4 1c 15 bd 40 | 1f a6 87 a7 4d 01 75 d0 ba dd bc 61 a0 08 b2 b5 | 88 d8 85 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 20 6b 9d 83 bc 81 44 79 c4 11 cc | c3 90 0e 2f 55 7c a4 51 00 00 00 1c 00 00 40 05 | c1 5a b3 1c bf d8 ae 9a 12 a9 ee 41 24 11 a3 d4 | f8 37 2e 14 | libevent_free: release ptr-libevent@0x7fb37c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5da90 | #445 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 2e 78 cc c5 f6 9b 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #445 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #445 | rejected packet: | b4 2e 78 cc c5 f6 9b 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #445: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38000f8f0 | handling event EVENT_RETRANSMIT for parent state #427 | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #427 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #427 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49679.904341; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002548 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5da90 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #427 | libevent_malloc: new ptr-libevent@0x7fb37c035930 size 128 "road-eastnet-nonat-175" #427: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #427) | 4d cf ce dc 5e 69 0c 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be f3 80 6d a1 4d bc 3b 63 de fe 7b 5d 35 aa 05 | b1 28 d6 19 4f ca c2 b6 85 f2 21 b1 5f ee 7d c3 | e5 4d ce d8 a2 87 47 56 c6 32 a1 9b 66 32 11 d6 | 2a 42 af 5d 8f 34 c5 d5 6c 06 20 9f 03 7a dd 4b | 48 34 c3 3a 83 64 cc cf 03 38 0f 85 e3 77 24 47 | d5 16 ac 4d 8b 47 b5 03 3d 95 eb ea 92 b9 cf 0a | 68 66 89 9f e9 d7 ae 03 3d 64 75 ac c9 d5 b3 10 | de 8f 17 7b 40 ef 37 ec 93 3c cd 2d 80 d3 81 0e | 06 7b 23 ba 8b 61 0c f3 0a da 72 5d 9c fe 2a 86 | bd e9 e7 fc 88 d7 20 01 3d 62 9b 97 2d 52 60 5a | fa 1e fb 14 48 2b da dc c9 bc 30 8f d1 65 96 cb | 33 cf 05 cd 5e fb 63 36 4b e6 22 41 78 36 97 51 | 7d 03 25 93 d8 95 93 1e 55 d3 a5 af 94 2f 9c 8c | 5f a3 40 23 47 68 5e 3a 9d 49 f6 a2 e8 96 cd ae | 14 48 e0 e0 ab cb ce 26 3e 2f 37 d7 ae b6 aa 01 | 36 16 4f df 45 31 cb 1a 1c 34 5e a5 cc 5a a8 48 | 29 00 00 24 fd 8d 8b b7 46 89 9a fa b3 ab b5 e9 | cc f2 e8 c2 d2 52 f8 a0 49 af 7a 94 c3 9c de 32 | b7 d8 84 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9a c6 fd c2 96 5c 57 4c be 19 76 6e | d6 a6 82 da 0b ee 49 1a 00 00 00 1c 00 00 40 05 | 12 be 5a 47 ba 89 37 fe 5c 7b 97 4a 79 4a eb 43 | ad 50 1a 96 | libevent_free: release ptr-libevent@0x7fb3800211f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | #427 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d cf ce dc 5e 69 0c 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #427 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #427 | rejected packet: | 4d cf ce dc 5e 69 0c 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #427: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #344 | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #344 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #344 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49679.909642; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.0069 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #344 | libevent_malloc: new ptr-libevent@0x7fb3800211f0 size 128 "road-eastnet-nonat-92" #344: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #344) | 60 fe 47 d5 bc 7e ec f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 bf a8 75 45 e6 9b 9e 36 c4 f8 00 7b fa ed 16 | 45 48 19 73 f0 43 47 d5 85 f3 cd c8 97 6e 50 a8 | 7b 63 a3 ce ea 05 ae 44 e5 a2 e6 29 a8 16 bc 48 | 78 95 49 07 f7 17 ad 10 48 2e fd 23 74 21 44 c0 | b4 d3 48 b2 fb bc c3 28 df 8a d3 09 ec 63 04 28 | 7e 5a 51 87 52 03 32 ff 61 0c 39 ac c3 26 d9 35 | 88 8a 8d fe 64 9e 7c 7f c3 22 7b 8b 9e 96 8b 3d | b8 ef 81 b1 6a 3f 8a 50 49 73 5d ab 49 f3 99 5e | ad 5d e8 43 6f bd 70 02 a0 6f d4 12 c9 ee f2 55 | f1 fb cb 6e d0 ab 61 ad a4 39 c4 fa f3 3f c7 bf | 5f f1 ac db cc 36 aa 36 32 7b 50 a5 5a 12 e0 c2 | fb c0 54 26 8a e0 81 02 71 55 03 a2 11 c1 ce 2c | 62 50 df 4c eb da 5d 3d 81 bf 56 fd c4 6a 45 b3 | f3 c4 00 14 0a f0 d4 72 ad 8f 3b 97 e7 25 ea 81 | 48 23 bb ad 52 e9 90 df 74 31 fa 3e 85 2d 9b f0 | 97 f2 67 07 62 f1 e0 1b eb 9c 9b f7 2c 83 46 40 | 29 00 00 24 59 47 a1 36 35 51 2c e7 ec 59 96 c4 | c5 6a 0f fd 9f 62 7d 5e ad fa 8e 0f 35 43 8c 01 | 6a c9 a8 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 37 18 00 bf d4 a8 37 15 69 ae 4c | fc 2f e7 92 f0 22 70 f2 00 00 00 1c 00 00 40 05 | 33 e5 40 5c 05 2f 5b 7d e0 96 06 6b 07 18 0b d5 | ca 3f e3 4a | libevent_free: release ptr-libevent@0x7fb388011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #344 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 60 fe 47 d5 bc 7e ec f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #344 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #344 | rejected packet: | 60 fe 47 d5 bc 7e ec f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #344: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aef6c0 | handling event EVENT_RETRANSMIT for parent state #397 | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #397 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #397 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49679.919939; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.0036 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #397 | libevent_malloc: new ptr-libevent@0x7fb388011f30 size 128 "road-eastnet-nonat-145" #397: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #397) | b8 96 65 06 95 e1 f4 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 c8 0d f4 cf 12 04 23 b3 8c b0 d5 0f 34 4c a1 | e0 38 a5 84 33 97 be 9e 20 02 11 8c 69 5e 11 d0 | 7f 62 ac d4 51 19 cc 39 4f d4 08 35 17 3d d8 7a | c8 e2 b7 8a c4 ef 87 90 f4 6c ad 03 c1 12 e5 fe | a1 ca 4d a3 a7 26 51 b1 18 00 3f 74 0f 0b 76 79 | bc c1 ba 8c 57 57 64 fe a4 22 c8 a4 ab 19 ab 0c | dd ce 55 14 58 7f a0 3d 7e 01 33 18 3d 67 8f 6a | ca ae 35 2c fc 77 68 f1 26 46 2d 1f 7a bb f6 b6 | 88 41 08 63 25 29 f3 b7 63 ae 0e 14 3f a2 dc 97 | 0e 00 b1 e7 fc 07 d8 8b 49 bf 80 af e9 ed 2e ae | 76 d5 6d 36 b9 2a 02 65 8e ab 6e 62 de 0e 3d f3 | f7 6f bf 03 ee 4b bf 13 13 36 8d f9 63 27 fb 43 | 3f 8c 62 32 8e 36 3e 03 c1 c2 7e e0 16 a2 30 62 | 14 7f 02 fd b0 1d f6 8c 31 34 94 1b 15 18 28 ae | 0e b7 ba 68 7f a5 50 6b 2b de 67 a0 81 07 b2 62 | f5 48 ed c5 05 14 42 21 f6 53 6c 0e 3a 26 2c f6 | 29 00 00 24 27 60 c6 66 70 ae 97 9f 6b 69 4c 25 | 37 ba d9 cf 08 77 b3 59 45 e3 d8 2d 73 dd 52 c3 | cf dc c0 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 57 f9 bf 9f 01 9a 6f 3c 35 55 f3 | 32 2b 15 a5 4a 2d 79 cf 00 00 00 1c 00 00 40 05 | 4f 21 3e 38 45 eb 50 34 34 8d 72 07 46 d4 99 5b | e3 94 74 97 | libevent_free: release ptr-libevent@0x7fb37004b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aef6c0 | #397 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 96 65 06 95 e1 f4 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #397 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #397 | rejected packet: | b8 96 65 06 95 e1 f4 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #397: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0498 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a49450 | handling event EVENT_RETRANSMIT for parent state #440 | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #440 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #440 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49679.926289; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001397 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aef6c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #440 | libevent_malloc: new ptr-libevent@0x7fb37004b7c0 size 128 "road-eastnet-nonat-188" #440: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #440) | 59 19 97 9a e3 8b 77 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 57 86 98 5b 96 d3 77 6a 73 d3 f1 79 83 3d b1 | 25 c0 29 5c f0 c3 a2 69 ec 6a e3 4d 6f cd 0b d7 | 79 9c cb d7 34 fa 78 1e b1 98 79 da 0f ac 84 e0 | 73 c1 06 f8 21 3a aa 0a f4 0e 4d f7 bf 24 b0 23 | 75 13 78 7d aa 97 d6 f9 8b f1 96 43 1f bc e1 e6 | da 7d fb 41 ce 93 49 6e e1 1e f3 c1 41 08 43 3b | 3e e8 ed 1f 4e 08 d4 85 64 9e d1 11 dc 50 e9 45 | 7f a7 7d f7 2b 35 cf 9a d1 cb 6a 05 4f 83 e6 fd | 42 8f 63 21 ff 80 40 b7 e2 26 41 31 52 b6 49 a0 | 77 11 47 93 5f a3 3d 9c 1c 0e 6f 2b 0b b6 1d 42 | d3 1d 45 13 c6 e8 f2 a5 8e c9 4c 05 0a 08 aa 82 | ac e4 27 b7 b2 77 b7 80 38 58 3d 68 92 fd 5e 6a | 38 c8 de 6a 08 ae c9 2d 85 13 3c b9 b9 2c 91 48 | 64 74 4e 5e a1 07 a6 ff 63 67 43 99 ae 3a 36 0a | 11 4e c4 4f 1a ab 97 3f 39 c8 63 d0 49 b4 29 fe | 77 df c5 36 12 ae 96 21 4b 67 cf 07 6a b0 e1 5d | 29 00 00 24 82 fb 4c 4b 30 7b 16 3b 6a c7 2b 62 | cc 7b b0 14 ea 16 0d 74 ad 0f c2 be 8d 39 6e c0 | 2a 84 9f 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 37 6d ef 85 b5 1f 0e 28 d0 8a e5 | d5 d3 1d e3 5f d5 cf 90 00 00 00 1c 00 00 40 05 | 72 f1 07 bf 82 38 a8 c2 32 ec a4 d6 59 1b 7c de | 06 08 a2 81 | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a49450 | #440 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 59 19 97 9a e3 8b 77 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #440 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #440 | rejected packet: | 59 19 97 9a e3 8b 77 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #440: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.058 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab90c0 | handling event EVENT_RETRANSMIT for parent state #199 | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #199 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #199 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49679.950638; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.014974 exceeds limit? YES "road-eastnet-nonat-199" #199: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-199" #199: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #451 at 0x557d46ae27c0 | State DB: adding IKEv2 state #451 in UNDEFINED | pstats #451 ikev2.ike started | Message ID: init #451: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #451: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #451; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-199" #451: initiating v2 parent SA to replace #199 | using existing local IKE proposals for connection road-eastnet-nonat-199 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 451 for state #451 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a49450 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #451 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 | #451 spent 0.0659 milliseconds in ikev2_parent_outI1() | RESET processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 16 resuming | crypto helper 16 starting work-order 451 for state #451 | pstats #199 ikev2.ike failed too-many-retransmits | pstats #199 ikev2.ike deleted too-many-retransmits | #199 spent 2.52 milliseconds in total | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 451 | [RE]START processing: state #199 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-199" #199: deleting state (STATE_PARENT_I1) aged 64.016s and NOT sending notification | parent state #199: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #199 "road-eastnet-nonat-199" #199: deleting IKE SA for connection 'road-eastnet-nonat-199' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-199' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-199 | State DB: deleting IKEv2 state #199 in PARENT_I1 | parent state #199: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 451 time elapsed 0.000998 seconds | (#451) spent 0.996 milliseconds in crypto helper computing work-order 451: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 451 for state #451 to event queue | scheduling resume sending helper answer for #451 | libevent_malloc: new ptr-libevent@0x7fb36401f4e0 size 128 | crypto helper 16 waiting (nothing to do) | stop processing: state #199 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb36403ae90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab90c0 | in statetime_stop() and could not find #199 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-199 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-199" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-199' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-199" | stop processing: connection "road-eastnet-nonat-199" (in initiate_a_connection() at initiate.c:349) | spent 0.0569 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #451 | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 451 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #451 | **emit ISAKMP Message: | initiator cookie: | ba 7b a0 b0 99 57 b7 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-199 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 77 86 c1 bd 46 53 16 86 81 3c 90 d2 1b d5 72 d6 | ikev2 g^x 90 46 2b fe 71 0a b5 92 27 f1 2a 98 1f 0b 9c 86 | ikev2 g^x b4 73 fd 62 b2 c4 76 72 65 dc a3 4a 74 c5 fd c6 | ikev2 g^x 79 b7 24 8c 57 9e 68 29 d1 51 ef 41 d9 35 5f e0 | ikev2 g^x 38 61 4f 5c 38 99 a1 c4 18 39 cd 7c d3 ce 2b 13 | ikev2 g^x fc 9c 47 13 18 41 cd b0 e2 7f c5 8a 64 72 a5 44 | ikev2 g^x 53 3a 53 2d 27 d7 7b 2d 79 06 40 fe 3d 6f 0c 91 | ikev2 g^x d2 44 b7 35 de 08 ea 0c 51 75 4f ac 93 26 ff 1a | ikev2 g^x 9b 0e 24 d8 14 0e 9a fc f6 cc 0e 9a dd d9 b9 d2 | ikev2 g^x 1b 38 2f 39 cf f5 c7 33 b5 34 1b 0e a3 9e 16 b5 | ikev2 g^x a1 af 82 8d 2c a9 ce 6b 79 b5 5c 3b f7 3b ae 09 | ikev2 g^x 38 95 45 10 35 73 6b 75 72 ac 01 d0 d8 9c 2a 56 | ikev2 g^x 79 52 8f 61 80 9d ac 4d cd 53 ef 84 96 01 18 60 | ikev2 g^x 62 4a 3f 8c ae bb 58 49 e4 bd 6c ac 5f b8 ee 89 | ikev2 g^x d9 a3 21 bd 37 79 80 9b e7 e0 92 c7 ad 63 83 e1 | ikev2 g^x b3 a4 a9 38 2d 78 59 50 55 18 b3 a6 f4 4b 9a 44 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c0 83 9a b8 91 8b 33 7b 3e ca 3c 3c 55 1b 13 ae | IKEv2 nonce f8 60 71 22 6b 87 6a 60 f0 da d9 ee 56 ce cf eb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ba 7b a0 b0 99 57 b7 46 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c7 | natd_hash: port= 01 f4 | natd_hash: hash= 7b 64 e2 2e 4b 98 7a a3 19 bf 09 d8 5a 5f 60 9f | natd_hash: hash= 04 ef ea a4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7b 64 e2 2e 4b 98 7a a3 19 bf 09 d8 5a 5f 60 9f | Notify data 04 ef ea a4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ba 7b a0 b0 99 57 b7 46 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f6 42 3e 9c 74 68 a9 db 08 24 19 e3 18 ae 01 16 | natd_hash: hash= fd d2 98 25 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f6 42 3e 9c 74 68 a9 db 08 24 19 e3 18 ae 01 16 | Notify data fd d2 98 25 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #451 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #451: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #451 to 4294967295 after switching state | Message ID: IKE #451 skipping update_recv as MD is fake | Message ID: sent #451 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-199" #451: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.199:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #451) | ba 7b a0 b0 99 57 b7 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 86 c1 bd 46 53 16 86 81 3c 90 d2 1b d5 72 d6 | 90 46 2b fe 71 0a b5 92 27 f1 2a 98 1f 0b 9c 86 | b4 73 fd 62 b2 c4 76 72 65 dc a3 4a 74 c5 fd c6 | 79 b7 24 8c 57 9e 68 29 d1 51 ef 41 d9 35 5f e0 | 38 61 4f 5c 38 99 a1 c4 18 39 cd 7c d3 ce 2b 13 | fc 9c 47 13 18 41 cd b0 e2 7f c5 8a 64 72 a5 44 | 53 3a 53 2d 27 d7 7b 2d 79 06 40 fe 3d 6f 0c 91 | d2 44 b7 35 de 08 ea 0c 51 75 4f ac 93 26 ff 1a | 9b 0e 24 d8 14 0e 9a fc f6 cc 0e 9a dd d9 b9 d2 | 1b 38 2f 39 cf f5 c7 33 b5 34 1b 0e a3 9e 16 b5 | a1 af 82 8d 2c a9 ce 6b 79 b5 5c 3b f7 3b ae 09 | 38 95 45 10 35 73 6b 75 72 ac 01 d0 d8 9c 2a 56 | 79 52 8f 61 80 9d ac 4d cd 53 ef 84 96 01 18 60 | 62 4a 3f 8c ae bb 58 49 e4 bd 6c ac 5f b8 ee 89 | d9 a3 21 bd 37 79 80 9b e7 e0 92 c7 ad 63 83 e1 | b3 a4 a9 38 2d 78 59 50 55 18 b3 a6 f4 4b 9a 44 | 29 00 00 24 c0 83 9a b8 91 8b 33 7b 3e ca 3c 3c | 55 1b 13 ae f8 60 71 22 6b 87 6a 60 f0 da d9 ee | 56 ce cf eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 64 e2 2e 4b 98 7a a3 19 bf 09 d8 | 5a 5f 60 9f 04 ef ea a4 00 00 00 1c 00 00 40 05 | f6 42 3e 9c 74 68 a9 db 08 24 19 e3 18 ae 01 16 | fd d2 98 25 | state #451 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a49450 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab90c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #451 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 | #451 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49679.952228 | resume sending helper answer for #451 suppresed complete_v2_state_transition() and stole MD | #451 spent 0.347 milliseconds in resume sending helper answer | stop processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36401f4e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 7b a0 b0 99 57 b7 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #451 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #451 | rejected packet: | ba 7b a0 b0 99 57 b7 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c7 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #451: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0402 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3980 | handling event EVENT_RETRANSMIT for parent state #446 | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #446 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #446 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49679.965407; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500075 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #446 | libevent_malloc: new ptr-libevent@0x7fb36401f4e0 size 128 "road-eastnet-nonat-194" #446: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #446) | 88 1d ae ca 37 da 9c 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a c2 f6 76 62 03 08 9a a8 98 a1 67 18 76 36 6f | f2 14 09 7e 5a 52 4f 9f 19 c8 ba 89 bc 37 1d 8e | 11 c7 c7 24 c8 21 0f 20 96 1c 89 74 ee 2d eb 0f | d9 40 32 aa 68 91 41 4a dd 21 15 90 12 e4 8b c9 | 4d 5c 9c dd a5 b1 90 8f 14 47 58 25 b1 c4 3a 4d | f0 56 c6 bf 57 58 f2 ac e6 d1 1a 63 f9 d8 c3 1a | a4 3b 86 89 ab bf 3e 5a 25 6f 85 ba 03 4e 84 c0 | a7 2c b9 17 b5 20 be c6 c5 13 97 18 56 e3 27 c2 | f9 d2 f9 ff 5e 3c 1b 93 48 e2 17 63 4c c3 83 be | b7 98 15 95 f6 a1 48 ea 20 9c e6 f3 53 b1 cd 88 | 53 a7 49 3f 59 99 9e 83 6d e2 88 bb a9 e3 fc 02 | 29 31 b8 83 4f 47 15 6b 71 12 58 3e 96 a5 76 cc | 0b 52 1f 8d 6c b2 63 0d 85 4d 51 f2 5f f7 f4 97 | 20 32 4c 0f 1c ff 39 c3 f0 0e d9 00 b3 27 e0 af | 29 89 02 52 1a 56 5c 18 4f a4 87 c7 25 17 55 3d | f8 28 8f d9 14 95 ef 08 7c ea 8b df 87 e5 f7 5e | 29 00 00 24 5e f7 7f 32 12 e9 cf 93 a5 5f 05 08 | 2b 32 36 a4 d8 35 51 26 4c a4 53 84 4a 3d 2b 33 | 5f dc 90 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bd 76 de 3d 7d 38 3c 23 fa c5 a8 aa | 98 15 c0 6a 4a ab a4 fc 00 00 00 1c 00 00 40 05 | 7b cf 42 04 70 bc 06 e9 71 4c e8 ba 2d 5f 18 79 | 9f 19 93 8c | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3980 | #446 spent 0.0981 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 88 1d ae ca 37 da 9c 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #446 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #446 | rejected packet: | 88 1d ae ca 37 da 9c 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #446: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0408 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338018460 | handling event EVENT_RETRANSMIT for parent state #428 | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #428 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #428 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49679.977685; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002972 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3980 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #428 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 "road-eastnet-nonat-176" #428: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #428) | fb 15 42 71 fe 24 9a a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 50 d4 99 e3 c3 b2 8d 50 f4 55 ae 47 3b 25 61 | 1e c4 05 b1 59 21 46 35 0e 81 55 dd de 7f 65 40 | 00 1a 4e c9 0d 72 6a 7a 8e 31 f2 b8 05 87 95 5f | 92 19 3b d0 26 f7 ef a7 b3 37 5f 37 15 e9 34 12 | 33 cb bc 05 19 62 04 88 c4 b0 11 3c a2 fc 2e a7 | 48 74 27 c5 24 6a b1 84 34 89 1c 11 73 e4 fb e9 | 1b 3e 80 7d 33 32 51 1f 3d 67 11 16 e4 23 05 bd | 3f 72 2d 38 c9 0b 38 c0 12 64 3a 43 5b e7 46 c1 | 2b 7e 29 d4 ef 37 71 a8 e0 71 19 2f a1 c5 6c 53 | 94 fe 4e 57 73 5c 74 b5 d5 7f cc e2 3d a3 30 0d | 02 5c 9d dc 4d a0 93 77 cd b6 58 cb 5c 89 fe a8 | 40 8a c4 11 16 43 cc f4 7d 6e ae 00 27 3a 7c 8c | 12 14 7e db be 5a 42 72 b9 d0 07 1b fd aa 82 51 | 0e fb 68 c6 88 b4 35 6c 93 af 50 1c ff 48 78 d4 | b7 b7 c9 3d bd cb b9 82 34 8d b6 5a ff e7 73 c1 | e0 88 1f 51 42 a1 76 7d 4c 3a 1b 39 03 d3 42 78 | 29 00 00 24 e8 4b ce 8e 1c b5 fd 76 2e 19 5c e4 | 1a 51 b2 57 c5 b9 7b 5b bc c1 c3 17 ad 08 ad 32 | c1 29 cf d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 5a 55 94 7a 84 e5 8b 58 e8 27 7a | 96 44 f5 8a 4c 99 6f 81 00 00 00 1c 00 00 40 05 | 54 c7 00 62 13 8f 45 35 f4 93 09 e0 a0 98 7d 08 | 6e 4a 7d e5 | libevent_free: release ptr-libevent@0x7fb35401fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338018460 | #428 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 15 42 71 fe 24 9a a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #428 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #428 | rejected packet: | fb 15 42 71 fe 24 9a a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #428: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c017ea0 | handling event EVENT_RETRANSMIT for parent state #398 | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #398 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #398 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49679.990961; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003471 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #398 | libevent_malloc: new ptr-libevent@0x7fb35401fd50 size 128 "road-eastnet-nonat-146" #398: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #398) | d0 92 7e a2 a7 09 60 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 b4 17 bf 7e 10 d5 e2 12 67 d5 eb 44 fc 6b da | be 3b 71 0a c4 e3 79 bc 55 7d 33 ab 53 2c 63 89 | 9e 95 b9 30 6b 13 a7 4a c4 7b bb 0d b8 d2 26 a2 | 1b 44 de e4 2f 11 41 58 72 a9 de c1 a4 1a 3c de | fb 82 ea df 3c 36 4d b1 bb 32 a7 75 2a 9c da 3d | 04 1d ae c6 9e 47 9c 96 a3 bd 6c 27 32 62 7e ad | 70 24 3a b8 2d 6d 20 b6 31 c7 e4 59 58 b0 08 22 | 82 a6 37 db ba ec 34 68 a5 11 ce c9 83 0a 92 b3 | dd ea d2 26 81 86 3c 25 24 24 ac 6b b8 4a 55 12 | 52 ea 4b 29 23 c3 37 83 f6 36 9b 47 37 10 75 9d | f4 dd 3d a7 8c 08 2f 3c e4 23 53 ed 31 76 a3 fc | 1d a9 fd 55 24 58 0f 2f e2 fa 33 69 e3 52 ce 0b | 40 31 96 92 4b 51 32 bf 2a 17 34 73 b9 0a 6b 90 | de fe 0d 37 2c 91 fd 6c 7a a7 e2 56 e8 ce 17 fa | d6 57 69 b6 c9 3d e4 60 c8 79 32 d0 c0 ff e6 32 | 04 59 72 13 74 5b a6 22 e7 dc df 1b fa 28 85 f9 | 29 00 00 24 ae ec a4 eb 03 5f 45 70 f0 53 21 d7 | 81 1e fd e8 52 41 5f 93 69 78 ae d9 36 11 23 a3 | df 40 91 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de b0 87 87 88 52 10 6b eb de e2 56 | 47 54 e5 87 4e eb 84 92 00 00 00 1c 00 00 40 05 | cf cf 8e 7f dc f9 05 61 ec 0b 32 5d d8 50 5d 1e | f5 62 0b 45 | libevent_free: release ptr-libevent@0x7fb36c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | #398 spent 0.099 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 92 7e a2 a7 09 60 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #398 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #398 | rejected packet: | d0 92 7e a2 a7 09 60 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #398: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.056 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_SHUNT_SCAN | expiring aged bare shunts from shunt table | spent 0.003 milliseconds in global timer EVENT_SHUNT_SCAN | timer_event_cb: processing event@0x557d46ab2380 | handling event EVENT_RETRANSMIT for parent state #345 | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #345 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #345 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49680.032358; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005509 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #345 | libevent_malloc: new ptr-libevent@0x7fb36c04b850 size 128 "road-eastnet-nonat-93" #345: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #345) | cc 1b db ff 37 55 f7 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 67 e9 25 ad 99 4c 76 71 a1 a8 5d 6b de 51 32 | eb 5c 8d 84 1c 3d 17 6c c1 5f 62 71 5b 44 16 fb | e4 d2 85 4c 64 49 cc e5 df 14 a2 74 3d 7a c6 c8 | 61 7c 32 bd 88 6d 99 62 9c 43 b2 d1 2b 52 46 39 | c0 c1 fe 0b d3 8c b7 41 43 fa 07 e4 ca 66 08 b9 | e3 73 79 86 ee fe 88 31 4e 3f 00 50 43 af ba 2c | 0f 81 55 13 ff ba 58 17 5f 8e c8 12 2b 5c fa c6 | ef 92 c1 91 f7 d8 64 09 28 37 f9 29 29 da 06 11 | 98 a0 90 28 27 02 35 70 61 dc cd b3 af 6b a5 cc | 33 40 2b 71 fe b4 6e 27 bc 87 0b 2e 49 cd 22 6a | fe 62 e7 dd 24 a7 1f 41 fb 60 e1 86 0c 80 50 0b | a0 a0 c9 f7 8f 75 a4 e1 64 72 0c 28 9b b9 6c ed | 86 a3 26 05 ab b4 ae 03 ec cc ce 40 59 4c 63 89 | f5 0c b7 8c 77 de 51 59 14 48 7e 85 50 2b 34 5c | b7 79 6c 71 db 1b 6c 37 06 89 c8 05 98 a4 3e 07 | 39 20 3f 60 a2 a7 3c 0b 2f 8f 18 e7 35 c0 2b f1 | 29 00 00 24 20 33 be 81 19 1f 5e fe 6d 68 36 2c | 95 1b cf 17 03 6e cb aa fd 3d 3c 1f 01 7c 3e 25 | c7 e0 c9 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 24 83 28 6d 9e 08 a8 13 dd 36 c1 | 4e 58 4a c0 e0 a3 35 28 00 00 00 1c 00 00 40 05 | 65 c0 95 0a 9d 33 80 de 00 4a d8 7a 37 18 f6 5b | 66 48 2b 46 | libevent_free: release ptr-libevent@0x7fb344046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab2380 | #345 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 1b db ff 37 55 f7 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #345 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #345 | rejected packet: | cc 1b db ff 37 55 f7 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #345: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.047 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25c40 | handling event EVENT_RETRANSMIT for parent state #441 | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #441 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #441 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49680.037657; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab2380 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #441 | libevent_malloc: new ptr-libevent@0x7fb344046040 size 128 "road-eastnet-nonat-189" #441: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #441) | 51 22 97 d4 f1 aa 56 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 2c c6 09 06 fb 75 c9 7f c8 2c f2 78 2e 86 cf | 10 e2 71 84 ec 7a d3 00 3b 70 b4 67 49 a1 3c 4d | 21 45 e6 9b ef ae 2b 06 a0 05 7e f8 20 46 fb f7 | 0f d4 3c 68 46 a5 74 b1 69 d3 27 26 91 1f fb ea | a2 29 d1 d5 ec 8d ba a9 55 81 7c dd 8b b0 d5 f0 | 65 df 87 db d6 24 b4 8d 72 d6 b9 0a a2 e0 30 fc | e4 5b 51 8c ab 49 74 dc 67 ef 9d ed b7 2a 83 35 | e7 01 ba 5c 14 ef fc c4 a3 30 10 68 67 0e 82 16 | 7d 82 bc d7 25 ec 2f c1 f6 97 ab 23 a3 9a b0 7c | d2 fc 27 3c 76 c0 04 de 3f f1 57 2b 49 24 75 a8 | f7 b1 cb 9a 6d 04 c0 ee c6 a3 f0 18 d5 7f 4e a7 | 2c 74 2c d5 e8 3f cd c9 69 5b b5 31 78 19 bb d1 | 32 75 82 1c 75 29 51 85 94 3b 48 0b 31 5b 51 f5 | 93 f5 fc 53 3a 80 c0 7f 4c 5e 8d 4e c5 a0 2e 05 | fd c5 76 9f 1a 22 f6 df 9c 77 35 ff d3 0b a0 5e | 73 0d 0d 92 2d ee d7 e3 ed 3d 6b a2 54 4a 19 9a | 29 00 00 24 9c 47 e2 58 3f 57 67 62 b6 2e 0d 3a | cb 75 8a b1 7d cd 2d 8e 6c 75 cc 2c b3 bd 9f b3 | c7 bf c7 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 c2 f5 08 e1 41 ca c3 a8 c7 5d b8 | 30 41 e7 b2 e6 39 d6 66 00 00 00 1c 00 00 40 05 | 92 32 df 91 6d 86 4c 91 9f c0 e2 90 d1 aa b2 8d | 1d 5c 17 a3 | libevent_free: release ptr-libevent@0x7fb380043300 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c40 | #441 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 22 97 d4 f1 aa 56 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #441 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #441 | rejected packet: | 51 22 97 d4 f1 aa 56 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #441: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fa300 | handling event EVENT_RETRANSMIT for parent state #200 | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #200 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #200 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49680.040942; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.013525 exceeds limit? YES "road-eastnet-nonat-200" #200: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-200" #200: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #452 at 0x557d46ae3d80 | State DB: adding IKEv2 state #452 in UNDEFINED | pstats #452 ikev2.ike started | Message ID: init #452: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #452: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #452; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-200" #452: initiating v2 parent SA to replace #200 | using existing local IKE proposals for connection road-eastnet-nonat-200 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 452 for state #452 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b25c40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #452 | libevent_malloc: new ptr-libevent@0x7fb380043300 size 128 | #452 spent 0.0678 milliseconds in ikev2_parent_outI1() | crypto helper 4 resuming | RESET processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 starting work-order 452 for state #452 | start processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 452 | pstats #200 ikev2.ike failed too-many-retransmits | pstats #200 ikev2.ike deleted too-many-retransmits | #200 spent 3.02 milliseconds in total | [RE]START processing: state #200 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-200" #200: deleting state (STATE_PARENT_I1) aged 64.015s and NOT sending notification | parent state #200: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #200 "road-eastnet-nonat-200" #200: deleting IKE SA for connection 'road-eastnet-nonat-200' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-200' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-200 | State DB: deleting IKEv2 state #200 in PARENT_I1 | parent state #200: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 452 time elapsed 0.000591 seconds | stop processing: state #200 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fa300 | (#452) spent 0.594 milliseconds in crypto helper computing work-order 452: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 452 for state #452 to event queue | in statetime_stop() and could not find #200 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #452 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-200 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7fb35803a770 size 128 | crypto helper 4 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-200" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-200' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-200" | stop processing: connection "road-eastnet-nonat-200" (in initiate_a_connection() at initiate.c:349) | spent 0.0715 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #452 | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 452 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #452 | **emit ISAKMP Message: | initiator cookie: | 50 11 a1 bf ed cc 03 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-200 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x da 8a 76 57 c4 9b d0 38 b9 d2 c2 4b 69 ba e2 a2 | ikev2 g^x 5a 11 4c 0a 45 a5 bd e6 9d dd c0 17 e1 2d b4 38 | ikev2 g^x 58 7e 63 fb 2b 24 a5 63 e6 a8 3b c4 4f a3 78 62 | ikev2 g^x 66 71 ba 53 c3 c9 09 13 5d ce 86 73 ab 12 87 fa | ikev2 g^x 35 c6 ff 8b 42 89 25 72 85 e2 b1 87 71 47 d8 8c | ikev2 g^x ac 7e ee 22 cc e1 04 85 55 54 54 b2 e0 ad d5 39 | ikev2 g^x 0a fc 74 d3 64 5e 05 35 2e 1a b0 95 d1 38 f8 9d | ikev2 g^x e0 83 e6 f4 e2 39 cf ac 1a e7 54 52 1b c6 27 82 | ikev2 g^x 61 87 37 7f 47 a3 e4 be 08 d5 c5 1a f3 6f 8c 8b | ikev2 g^x 63 33 54 b5 d2 c3 52 ce c9 11 04 d4 3e 44 cf a0 | ikev2 g^x cb 89 ea 96 9d 4b f1 9d 8d dc 98 07 bd 7b 2f d6 | ikev2 g^x 8f 69 b2 51 af f2 60 a1 de 25 ef d3 5a 7c e5 c5 | ikev2 g^x 23 56 16 2b d4 22 e3 1f 96 12 60 85 a4 b1 18 7f | ikev2 g^x b7 c2 db 59 66 51 fe 4e 85 1b ae a3 40 84 80 d2 | ikev2 g^x d2 e6 e1 c5 9e 39 9a 1f 42 76 d0 90 ba 8e cc dd | ikev2 g^x 5a 7b 9a 97 d8 6d 8b db 68 e9 10 8f 2c 64 9d b8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ba 51 08 92 39 ed 80 e6 57 c3 97 3c b4 4a b0 29 | IKEv2 nonce f6 7a 02 bc 32 31 68 fb 36 27 e7 7b 80 17 94 14 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 50 11 a1 bf ed cc 03 70 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c8 | natd_hash: port= 01 f4 | natd_hash: hash= 08 cf 89 69 b2 6f 00 24 ae 75 3b 9a 3a b6 ca 28 | natd_hash: hash= 54 7e 11 99 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 08 cf 89 69 b2 6f 00 24 ae 75 3b 9a 3a b6 ca 28 | Notify data 54 7e 11 99 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 50 11 a1 bf ed cc 03 70 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 3b ea 73 3d bf 95 ec 19 18 d5 48 b2 c7 6d ef 5f | natd_hash: hash= 10 2b 0f c2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3b ea 73 3d bf 95 ec 19 18 d5 48 b2 c7 6d ef 5f | Notify data 10 2b 0f c2 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #452 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #452: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #452 to 4294967295 after switching state | Message ID: IKE #452 skipping update_recv as MD is fake | Message ID: sent #452 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-200" #452: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.200:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #452) | 50 11 a1 bf ed cc 03 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 8a 76 57 c4 9b d0 38 b9 d2 c2 4b 69 ba e2 a2 | 5a 11 4c 0a 45 a5 bd e6 9d dd c0 17 e1 2d b4 38 | 58 7e 63 fb 2b 24 a5 63 e6 a8 3b c4 4f a3 78 62 | 66 71 ba 53 c3 c9 09 13 5d ce 86 73 ab 12 87 fa | 35 c6 ff 8b 42 89 25 72 85 e2 b1 87 71 47 d8 8c | ac 7e ee 22 cc e1 04 85 55 54 54 b2 e0 ad d5 39 | 0a fc 74 d3 64 5e 05 35 2e 1a b0 95 d1 38 f8 9d | e0 83 e6 f4 e2 39 cf ac 1a e7 54 52 1b c6 27 82 | 61 87 37 7f 47 a3 e4 be 08 d5 c5 1a f3 6f 8c 8b | 63 33 54 b5 d2 c3 52 ce c9 11 04 d4 3e 44 cf a0 | cb 89 ea 96 9d 4b f1 9d 8d dc 98 07 bd 7b 2f d6 | 8f 69 b2 51 af f2 60 a1 de 25 ef d3 5a 7c e5 c5 | 23 56 16 2b d4 22 e3 1f 96 12 60 85 a4 b1 18 7f | b7 c2 db 59 66 51 fe 4e 85 1b ae a3 40 84 80 d2 | d2 e6 e1 c5 9e 39 9a 1f 42 76 d0 90 ba 8e cc dd | 5a 7b 9a 97 d8 6d 8b db 68 e9 10 8f 2c 64 9d b8 | 29 00 00 24 ba 51 08 92 39 ed 80 e6 57 c3 97 3c | b4 4a b0 29 f6 7a 02 bc 32 31 68 fb 36 27 e7 7b | 80 17 94 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 cf 89 69 b2 6f 00 24 ae 75 3b 9a | 3a b6 ca 28 54 7e 11 99 00 00 00 1c 00 00 40 05 | 3b ea 73 3d bf 95 ec 19 18 d5 48 b2 c7 6d ef 5f | 10 2b 0f c2 | state #452 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380043300 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b25c40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #452 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 | #452 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49680.042125 | resume sending helper answer for #452 suppresed complete_v2_state_transition() and stole MD | #452 spent 0.331 milliseconds in resume sending helper answer | stop processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35803a770 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 11 a1 bf ed cc 03 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #452 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #452 | rejected packet: | 50 11 a1 bf ed cc 03 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c8 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #452: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0404 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380009ed0 | handling event EVENT_RETRANSMIT for parent state #399 | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #399 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #399 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49680.047306; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00306 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35801d710 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #399 | libevent_malloc: new ptr-libevent@0x7fb35803a770 size 128 "road-eastnet-nonat-147" #399: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #399) | 9a 35 91 e3 ae 4f 45 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 ce a5 03 ec 4a ee 33 f3 67 48 7b 6f be a9 66 | fb 8e 19 e6 36 60 4c c6 f2 fa ab 4a 53 70 9f a8 | 5d 61 41 57 15 0a 04 a9 c6 86 5d ab 3b 79 47 d9 | 64 c0 42 8c 2d 5e 11 ee 5a b4 7c 00 df db 58 b0 | 10 63 ed d6 5b 1a 63 c2 6e 59 c7 e8 2a 78 4e 44 | 25 ff 91 a5 4f 9f d4 f8 46 f6 2e bb b6 05 d4 45 | 7f ef 54 77 ee f0 2c 99 e2 fe 9b fe 0e 9d c8 14 | ca 70 65 95 d9 6c bd 1f dd d1 55 09 ab fd c5 44 | 6f ba 1f 76 70 5a 17 28 af 45 27 b3 5f fa fe 02 | 6a 08 1d 7c 03 0b fb b8 0b b4 48 92 28 71 ac 6f | 5f 3f a7 45 71 f7 92 e0 6c 9d f2 6c bb 9e 54 7d | 4e c3 05 e2 c9 1e 50 4a ea 5d b8 f4 10 cd bd ed | f5 70 36 5b 63 22 bb 46 fb e4 aa 69 fc 3a 38 34 | d5 97 f3 9a 0b d9 79 ac e6 c8 40 6d e3 6c 66 31 | 20 73 b6 2d f4 7d 52 fd f2 32 69 70 71 7f cd d6 | 06 5e 27 45 05 1c 80 53 a4 80 ee b7 a6 45 c2 7e | 29 00 00 24 a1 6d db 5e 0b f7 f4 70 57 f1 37 cb | cc a0 06 3f 1d 1e 6b 0a b6 35 fa c1 29 23 78 83 | cc 1e 42 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 7c 20 90 94 5e 44 74 17 3c c7 e7 | e8 35 eb 34 00 1c 2e 68 00 00 00 1c 00 00 40 05 | eb 24 3e a6 a5 f2 dc 45 a5 ce 8c 46 9a d0 7a ff | cb 2c 1c 90 | libevent_free: release ptr-libevent@0x7fb3800223c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380009ed0 | #399 spent 0.0931 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 35 91 e3 ae 4f 45 29 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #399 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #399 | rejected packet: | 9a 35 91 e3 ae 4f 45 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #399: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #429 | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #429 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #429 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49680.067586; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003917 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380009ed0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #429 | libevent_malloc: new ptr-libevent@0x7fb3800223c0 size 128 "road-eastnet-nonat-177" #429: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #429) | b1 3d 9b 75 e9 17 32 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 58 34 a3 ec c6 75 50 25 fe 5f 41 58 c3 98 5a | 11 1f 83 e4 20 79 02 69 b1 3d ac 82 33 8f 44 96 | e7 d5 9d 7b f3 d7 f5 f1 3c 4b 07 77 e3 30 83 22 | 33 90 f7 d8 39 7d 51 da 1f be a3 9d 27 21 e0 23 | 1c c5 b5 f8 01 28 d0 3f bb de 17 8b 08 3e 77 12 | 3b 7e a1 ef 9e 6d 3b c1 0f 78 3f 7f d4 15 3e 67 | bd d8 07 2d 5c 0a f8 3b 6e 03 96 47 2a 3b ad 8d | fd ac a5 a9 41 55 69 70 54 4f c8 07 46 0f 75 8a | 8e 3a c9 5a 0e 6f 91 97 a2 53 99 02 54 c0 74 38 | 8d d6 59 17 7c b6 f5 96 24 2d 36 88 1b c1 a8 f4 | 9a 2c c6 20 9e 9c 1f 79 b7 b2 e2 28 6d c8 dc ea | ab 6f 81 8f 3c 54 99 e1 b5 ac 7a 7b e2 4b b7 47 | cc 01 c3 58 76 3a 5d 7a 87 5a 60 d6 14 71 21 77 | 7d 56 a9 78 8c 67 16 f3 5f ff 22 ed 4c 9c 08 f9 | b7 a6 81 b8 d7 76 0d 66 ab 45 4e 0c 98 69 dc 04 | 8b a0 74 65 f2 0e e3 59 97 ce 63 09 c5 83 7c 9c | 29 00 00 24 cb 81 79 39 c4 59 07 cd 3c 90 56 3e | 9d 57 79 9f 8d e6 58 24 f4 84 cf b6 0e b6 4d 54 | f8 24 7a fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 94 ea 1e 66 81 07 70 ab d6 5a a9 | c0 a7 0f 24 1b cb e7 a4 00 00 00 1c 00 00 40 05 | 17 95 c4 1b c0 e8 ee e6 7e 70 e4 b9 12 c2 c5 ed | 6f 00 57 73 | libevent_free: release ptr-libevent@0x7fb34800f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #429 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 3d 9b 75 e9 17 32 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #429 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #429 | rejected packet: | b1 3d 9b 75 e9 17 32 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #429: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe5c0 | handling event EVENT_RETRANSMIT for parent state #447 | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #447 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #447 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49680.073881; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499236 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #447 | libevent_malloc: new ptr-libevent@0x7fb34800f1a0 size 128 "road-eastnet-nonat-195" #447: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #447) | 38 12 e6 81 e7 94 57 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 06 2b 67 fa f3 85 ef c9 87 64 80 c6 08 7f 26 | 45 8a d6 b2 f0 0d 75 25 97 6d 45 07 fd cb e4 04 | bf 7e ab 4e 45 57 81 c7 b5 29 22 16 b5 58 17 73 | fb 06 1c 20 f6 01 42 43 d1 e6 cb 7e a1 aa b9 6e | 26 8c bc f7 62 2d 79 d5 2d 49 41 71 09 9e b4 75 | ea 9e f2 7f e9 07 f0 a5 64 1a db a1 ff 4f ee 2e | 4f 3b 9e aa ac 22 2d 9f 1b 37 bc cf 47 d1 ca f1 | 85 86 f8 a5 9e 4a f1 ed 2d 36 8a 97 fa 17 f5 2d | 74 78 21 72 1b 33 88 07 44 c7 17 ee 95 f3 cb cb | 74 32 bb 69 59 ac ab 47 c6 9c ea 80 62 ae 1f 88 | 81 9b 37 d9 2d eb b0 eb c8 de b9 11 87 9a a9 5b | 92 c9 38 b1 30 9b d0 b1 7f 2a dc 10 02 4c 1e 0e | 28 73 54 43 6f 78 74 45 0e 5e 40 cb d7 a1 f6 9b | 8d bf eb b3 ff de 36 ad 5d d5 a1 e7 e2 d9 b6 74 | 11 52 d9 17 88 a2 35 0f d7 23 95 ef eb 8f 58 a1 | ef f0 f0 24 22 5b dd f5 64 21 6b 5a 10 90 d6 b9 | 29 00 00 24 c8 ed 9d b9 b2 64 8b 9d 5d 85 10 8f | bc bb 1d 46 c9 3a dd 35 d0 ed 23 11 cf 06 d9 fd | be 51 4b 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 28 c6 de 25 95 4a 27 58 aa 1c c2 | 15 34 6b e8 d4 2b c8 d2 00 00 00 1c 00 00 40 05 | dc 67 81 1e 74 e8 91 b7 d4 fb 94 8c c2 c6 73 c6 | 89 a9 30 0d | libevent_free: release ptr-libevent@0x7fb37404b530 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe5c0 | #447 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 12 e6 81 e7 94 57 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #447 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #447 | rejected packet: | 38 12 e6 81 e7 94 57 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #447: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.091 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac3ec0 | handling event EVENT_RETRANSMIT for parent state #201 | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #201 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #201 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49680.099293; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005911 exceeds limit? YES "road-eastnet-nonat-201" #201: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-201" #201: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #453 at 0x557d46ae5340 | State DB: adding IKEv2 state #453 in UNDEFINED | pstats #453 ikev2.ike started | Message ID: init #453: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #453: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #453; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-201" #453: initiating v2 parent SA to replace #201 | using existing local IKE proposals for connection road-eastnet-nonat-201 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 453 for state #453 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46afe5c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #453 | libevent_malloc: new ptr-libevent@0x7fb37404b530 size 128 | #453 spent 0.0697 milliseconds in ikev2_parent_outI1() | RESET processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #201 ikev2.ike failed too-many-retransmits | pstats #201 ikev2.ike deleted too-many-retransmits | #201 spent 2.62 milliseconds in total | [RE]START processing: state #201 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-201" #201: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #201: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #201 "road-eastnet-nonat-201" #201: deleting IKE SA for connection 'road-eastnet-nonat-201' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-201' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-201 | crypto helper 13 resuming | crypto helper 13 starting work-order 453 for state #453 | State DB: deleting IKEv2 state #201 in PARENT_I1 | parent state #201: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 453 | stop processing: state #201 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb384027b30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | in statetime_stop() and could not find #201 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-201 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-201" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-201' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-201" | stop processing: connection "road-eastnet-nonat-201" (in initiate_a_connection() at initiate.c:349) | spent 0.0564 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 453 time elapsed 0.000543 seconds | (#453) spent 0.544 milliseconds in crypto helper computing work-order 453: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 453 for state #453 to event queue | scheduling resume sending helper answer for #453 | libevent_malloc: new ptr-libevent@0x7fb35c03a770 size 128 | crypto helper 13 waiting (nothing to do) | processing resume sending helper answer for #453 | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 453 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #453 | **emit ISAKMP Message: | initiator cookie: | ce fd 6b dc 43 f9 b6 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-201 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2a fe 9f 71 b9 6e 69 49 23 6a d5 87 63 a6 2d 80 | ikev2 g^x fc 10 3a 5e 08 f9 cc a8 36 72 0a 5b 2e 86 63 13 | ikev2 g^x 40 48 02 71 3c 66 28 bf ad d7 fa c6 30 96 5e 17 | ikev2 g^x bf a0 d6 3f 57 20 44 4e e4 00 ed 65 d2 4f 08 d6 | ikev2 g^x 20 51 fe 4a 66 fa 02 8d 06 00 db e7 45 a0 fc fc | ikev2 g^x 8c 97 f6 4d f7 77 a5 6a 79 27 5b a0 e1 46 fb a6 | ikev2 g^x 23 99 9c 26 32 43 cf 04 80 58 6f 87 cb a5 6d d2 | ikev2 g^x 76 b6 f1 d1 81 44 27 9c 99 67 9d 01 ca 24 01 04 | ikev2 g^x 53 a4 a4 40 53 47 8f 99 18 29 ec f0 3e a1 86 13 | ikev2 g^x dc e4 8b ba 11 0f e1 c3 4b ee 52 62 b4 64 8e 2f | ikev2 g^x 66 5c ba 6c ee 04 04 ed f9 bf cd 94 0a 45 b8 40 | ikev2 g^x e4 22 f5 d1 d6 df 3a ed ce c6 15 28 b6 04 76 04 | ikev2 g^x bd c3 75 e8 63 e6 45 74 6f 79 fc 8f 52 0e 1e 14 | ikev2 g^x f2 bb ae c1 f9 bb 75 83 86 a8 ff 0c d1 f1 5d 0c | ikev2 g^x a0 ce 81 b4 8f 58 61 e5 9f 60 57 7c c4 7a 6c 26 | ikev2 g^x 0d 77 a8 c6 b2 9c 49 0c ea 36 61 b7 06 0a 10 da | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e4 ac ab 1b 0b c0 0c 13 54 30 d6 3f 0a a4 17 49 | IKEv2 nonce c8 c8 1a 8d ae d5 3b 39 11 5a 2a f6 e8 ed 91 7d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ce fd 6b dc 43 f9 b6 80 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c9 | natd_hash: port= 01 f4 | natd_hash: hash= cd 76 3b e4 72 b5 b8 a8 50 2a b0 80 46 e6 9d 5f | natd_hash: hash= 02 57 8f 98 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cd 76 3b e4 72 b5 b8 a8 50 2a b0 80 46 e6 9d 5f | Notify data 02 57 8f 98 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ce fd 6b dc 43 f9 b6 80 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9d b5 75 60 1a f1 a6 46 0c b9 85 72 c6 f1 03 f3 | natd_hash: hash= 4e 7a aa 51 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9d b5 75 60 1a f1 a6 46 0c b9 85 72 c6 f1 03 f3 | Notify data 4e 7a aa 51 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #453 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #453: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #453 to 4294967295 after switching state | Message ID: IKE #453 skipping update_recv as MD is fake | Message ID: sent #453 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-201" #453: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.201:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #453) | ce fd 6b dc 43 f9 b6 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a fe 9f 71 b9 6e 69 49 23 6a d5 87 63 a6 2d 80 | fc 10 3a 5e 08 f9 cc a8 36 72 0a 5b 2e 86 63 13 | 40 48 02 71 3c 66 28 bf ad d7 fa c6 30 96 5e 17 | bf a0 d6 3f 57 20 44 4e e4 00 ed 65 d2 4f 08 d6 | 20 51 fe 4a 66 fa 02 8d 06 00 db e7 45 a0 fc fc | 8c 97 f6 4d f7 77 a5 6a 79 27 5b a0 e1 46 fb a6 | 23 99 9c 26 32 43 cf 04 80 58 6f 87 cb a5 6d d2 | 76 b6 f1 d1 81 44 27 9c 99 67 9d 01 ca 24 01 04 | 53 a4 a4 40 53 47 8f 99 18 29 ec f0 3e a1 86 13 | dc e4 8b ba 11 0f e1 c3 4b ee 52 62 b4 64 8e 2f | 66 5c ba 6c ee 04 04 ed f9 bf cd 94 0a 45 b8 40 | e4 22 f5 d1 d6 df 3a ed ce c6 15 28 b6 04 76 04 | bd c3 75 e8 63 e6 45 74 6f 79 fc 8f 52 0e 1e 14 | f2 bb ae c1 f9 bb 75 83 86 a8 ff 0c d1 f1 5d 0c | a0 ce 81 b4 8f 58 61 e5 9f 60 57 7c c4 7a 6c 26 | 0d 77 a8 c6 b2 9c 49 0c ea 36 61 b7 06 0a 10 da | 29 00 00 24 e4 ac ab 1b 0b c0 0c 13 54 30 d6 3f | 0a a4 17 49 c8 c8 1a 8d ae d5 3b 39 11 5a 2a f6 | e8 ed 91 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 76 3b e4 72 b5 b8 a8 50 2a b0 80 | 46 e6 9d 5f 02 57 8f 98 00 00 00 1c 00 00 40 05 | 9d b5 75 60 1a f1 a6 46 0c b9 85 72 c6 f1 03 f3 | 4e 7a aa 51 | state #453 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37404b530 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46afe5c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #453 | libevent_malloc: new ptr-libevent@0x7fb384027b30 size 128 | #453 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49680.100399 | resume sending helper answer for #453 suppresed complete_v2_state_transition() and stole MD | #453 spent 0.349 milliseconds in resume sending helper answer | stop processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c03a770 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce fd 6b dc 43 f9 b6 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #453 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #453 | rejected packet: | ce fd 6b dc 43 f9 b6 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c9 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #453: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #400 | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #400 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #400 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49680.110591; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004151 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c02aab0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #400 | libevent_malloc: new ptr-libevent@0x7fb35c03a770 size 128 "road-eastnet-nonat-148" #400: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #400) | 6c f1 c2 e4 ca 88 89 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 14 1f bf 2d 44 6c 78 3f 86 f8 f3 fa a1 a5 9d | a0 a8 08 62 76 01 cc db f3 4e 4a c1 03 ae f2 db | c6 06 da 1a 15 ae 3e f9 fa b6 70 0f b3 7b e5 34 | 8d 5b 06 20 ef d4 aa 62 0d d5 a9 7d 3d 49 08 95 | 77 51 97 14 c6 fe 13 ee ee 9b f0 54 56 73 79 30 | ad d7 b3 17 12 47 8d 8d e8 49 20 41 18 2a 1c c8 | c4 68 99 45 f4 b5 f1 6d d9 34 ec 8a e3 80 cc 67 | 30 b6 d6 0d 11 9e 86 7f 87 2f c0 73 7c 40 eb 31 | 24 34 89 0e ca 7b 62 d2 f6 17 85 8f 75 81 28 9b | 1c a9 03 80 8d 78 61 63 07 3b b3 b9 c4 40 46 d5 | ab 82 5f da 4c aa ce 61 bb ab c0 1a 00 85 50 e6 | e8 f6 9f c8 7f 01 8e 16 ac 04 56 78 cf 7c 43 a9 | f9 c7 26 fb 06 32 92 98 86 3f 37 ca f2 f2 fc bf | 1d e3 ee 48 e8 25 74 7d 16 d9 38 6e ca e9 38 51 | 44 22 32 93 01 95 d0 87 12 07 ff 4c 7e 49 f3 04 | 98 50 fe 91 bd 78 84 00 92 17 d7 f5 e0 e1 d0 43 | 29 00 00 24 aa 21 0d 2f 8b 5a 11 5c 7a 19 73 4d | 8f 68 86 24 6a ba 53 0b 82 59 c5 5c 31 b4 eb 7e | 18 78 2e 54 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 82 bc d9 51 57 ae 67 73 5e 22 78 | a2 06 a4 b1 df 07 78 c3 00 00 00 1c 00 00 40 05 | 48 01 58 d1 13 9f 6e 34 06 7b 6e f6 08 2f fa 1f | f9 ef b6 96 | libevent_free: release ptr-libevent@0x7fb364008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #400 spent 0.386 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c f1 c2 e4 ca 88 89 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #400 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #400 | rejected packet: | 6c f1 c2 e4 ca 88 89 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #400: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0471 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_RETRANSMIT for parent state #346 | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #346 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #346 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49680.140158; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004932 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #346 | libevent_malloc: new ptr-libevent@0x7fb364008e30 size 128 "road-eastnet-nonat-94" #346: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #346) | 5b 73 99 01 85 6b a6 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 41 a4 66 03 78 2f 0c ac 28 0c 6f a0 f5 98 a8 | ad fe 06 fd 8c a4 d4 c6 03 17 f9 3c ee f7 59 ef | a4 19 f6 d6 98 a9 45 18 c4 fa 1a 04 5e 12 ad 25 | a2 eb 73 ff 50 f7 5b d9 ac 0d a3 60 63 86 dc 11 | 24 c2 5c cb 2a 8c 8f dd 11 7a 54 9c db e5 07 72 | 1d 04 b8 06 80 b0 2c 7d 70 61 0f 2e ec 51 90 ed | 50 75 e9 44 ba 97 aa c3 93 f0 e7 8e a0 59 5a ef | f5 79 47 07 02 c6 5c 62 a1 be 60 af ef 55 0d f9 | 00 ac 18 13 2d 62 0e 5a 5f 40 32 8a 49 30 5f 84 | 37 da 16 c6 63 1e a6 4e a5 65 94 59 c6 7a b2 c5 | 75 c7 8f 68 de d4 77 8e 92 40 c9 5c ee b4 80 ea | 42 78 86 4f 14 c5 47 55 13 d1 41 8b fd ef 2c 61 | b8 ff 39 92 97 ea a2 69 91 9d 1f f6 fd bd a6 d6 | 98 cc 57 23 b2 ed be c2 71 55 a4 d5 18 54 fe df | 4d ab de e9 5b 44 57 81 1d 33 6c d4 fe 06 43 32 | b0 07 7c ba 8d 9c bd 13 85 9c b0 70 80 5b 02 74 | 29 00 00 24 86 39 a6 9d e4 88 31 1e 1a 48 0c df | 5d 51 c2 7f eb 35 e1 75 45 71 5e 9b 45 ec 98 56 | 3e 47 8a 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 d4 6c 5c e3 02 f1 ae 0d a6 ae 25 | 4a 2c de d9 71 00 3f 70 00 00 00 1c 00 00 40 05 | 9a e2 a2 47 57 d0 42 27 78 4a 19 6f 7e 1c 29 7f | 7a 88 26 9b | libevent_free: release ptr-libevent@0x7fb36004b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | #346 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5b 73 99 01 85 6b a6 c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #346 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #346 | rejected packet: | 5b 73 99 01 85 6b a6 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #346: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90400 | handling event EVENT_RETRANSMIT for parent state #448 | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #448 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #448 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49680.152477; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499733 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #448 | libevent_malloc: new ptr-libevent@0x7fb36004b850 size 128 "road-eastnet-nonat-196" #448: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #448) | ea d6 68 25 ae ee 80 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 2e 7f 22 4b d6 ee 79 95 7d ea e6 94 56 fc 59 | 41 1c 12 66 f4 de 00 d4 6a e6 f4 4c 67 01 c3 97 | d7 f0 7f 15 19 52 1c e1 e7 cb 10 43 bf 32 f7 97 | 3f 7d 76 9e 8f 5c 2d a2 10 89 27 a3 31 39 40 6f | 23 b5 50 de a5 26 d5 37 1d bc c7 b0 be 51 02 45 | 35 60 2b d9 a4 52 16 a6 1b 75 6d 90 d7 94 82 b4 | dd 41 db 2a cd 7c b4 ec 00 64 fe 2d 52 b4 ab 6f | a1 8a dc c4 d8 32 f4 27 d3 99 3c 5b 3c 30 47 ed | 06 54 fe bf 5a 80 4f d3 cd d3 63 ab 7a 0a c4 81 | eb 86 4b 9a 37 9c a7 bc 09 9b f1 b6 f5 69 f2 05 | c2 89 b2 f3 ca 58 71 7c 0b b2 02 99 cf da 83 99 | b9 82 4c 58 38 5d 2d be 03 71 b3 5f 32 1a 82 30 | 6f ca 79 08 7e ac dc 25 d6 1a ad 46 a4 8d 7c 47 | 64 b8 24 1d 37 d9 41 0f 8b 4e 16 65 d2 41 4b ab | d2 0e 95 38 92 91 3a 77 ae cf 19 35 ef c9 91 13 | b4 90 b2 24 68 10 9d af 29 52 a9 15 24 f7 4d 93 | 29 00 00 24 f3 0f f3 36 25 a9 50 89 21 ce 62 13 | d8 e8 8d 8d c3 33 f9 d1 62 a2 a6 a0 e9 3e 64 7f | fb b2 90 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 d7 4f 67 97 77 e0 a3 2c fc 24 e7 | 7a a9 1a d4 d3 98 14 3c 00 00 00 1c 00 00 40 05 | 18 00 5b 20 2e 1c a9 8b 56 50 4b 4f f1 d3 fc 60 | 9d dd 28 85 | libevent_free: release ptr-libevent@0x7fb3580300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90400 | #448 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #442 | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #442 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #442 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49680.152628; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002039 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90400 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #442 | libevent_malloc: new ptr-libevent@0x7fb3580300e0 size 128 "road-eastnet-nonat-190" #442: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #442) | 87 5c d8 cc 20 15 ba 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 68 c7 3c 11 2f 9c 07 85 86 ab fd 70 b3 a3 4b | 4b 15 db 0c 55 63 48 ae b0 dc 7b 34 ba 58 39 54 | 81 cc 25 fd b5 c7 f7 39 e9 8f 2e f9 b9 70 0e c0 | 6c fd 85 d9 5d cd 9d f6 5f 5d 4e 86 38 b5 78 a7 | d8 3d 3d f5 25 e8 c6 56 da a5 38 73 cf 89 18 32 | cf c9 c3 46 fb 60 20 53 a4 ff ca 61 0a 1f ad 2b | a5 f9 d2 1b d5 73 db 29 4b af 73 16 1f 68 6e 88 | a8 b3 5c d6 b4 01 8a 06 65 2f a3 ad 76 14 68 68 | 9f cb 47 75 86 fb 98 94 58 0a 1b c8 87 0a bf b1 | 97 c2 17 ab 5f e8 c3 11 ea 6b b5 fc 83 10 e7 36 | 12 60 e6 87 bd 62 58 93 cb ac ef ca 4f 7f ed 7c | 32 f8 74 a9 e0 2b 69 44 cf b3 d9 33 28 7b 15 7d | 6b 78 11 47 ae a2 e0 8f 52 91 83 be f4 84 c7 17 | a5 b8 57 df 7a 32 65 6d 3b bd ca 10 c7 fb bf 39 | ca 7b 85 7d 49 00 cc 7c 5f b7 c2 27 37 c0 3c 03 | 4d 75 5e a1 e3 8a 16 a4 15 da ac 76 26 68 0c 96 | 29 00 00 24 bc 7d d1 02 e0 e7 26 b2 02 88 eb 9f | 6d cb 61 e3 66 23 89 34 b9 17 0a 11 8d c9 39 5d | 4a 6a d8 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b b4 fa 62 4d 88 e7 9c 8f 3a a9 82 | e0 af 15 4d 27 f2 cd 63 00 00 00 1c 00 00 40 05 | ff 91 89 9d d7 da 34 d7 9b a8 06 6f f9 4a 9b 25 | 2a 77 df 3e | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #442 spent 0.0688 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea d6 68 25 ae ee 80 d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #448 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #448 | rejected packet: | ea d6 68 25 ae ee 80 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #448: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0704 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 5c d8 cc 20 15 ba 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #442 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #442 | rejected packet: | 87 5c d8 cc 20 15 ba 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #442: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0737 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #430 | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #430 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #430 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49680.156961; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002623 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #430 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 "road-eastnet-nonat-178" #430: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #430) | fd 31 ba 30 35 2e 2d c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 61 13 a5 cc e9 81 b6 86 fc 6b 16 f1 74 d1 d9 | 72 f7 e2 ba f7 11 d1 79 92 c8 3d 2f 28 42 00 4a | 78 0d 84 65 5e dc 17 2f ba 15 c9 f0 22 4d 0a 3b | 29 55 5d 3f ae dd 3d 32 e8 c3 46 a9 04 47 63 51 | 2f 80 77 91 5f 9c b1 19 0f 94 27 d5 5d fe 9c 81 | eb f7 f8 80 c0 5d c2 5a 33 1a 77 e9 05 ab d6 42 | 13 e3 2a 15 08 f1 ba d2 bf eb 3d 3d ce 2d cd 92 | 09 c3 9f 5e 21 7b 84 9b 7e ad 3a cb 5a e8 5e a4 | 33 a8 4d 41 b7 9c ef db 29 ac 76 73 88 b2 9f 61 | fa 8c 1c 07 e5 8d 13 2c 9f d7 a6 11 29 94 1a 21 | 41 e9 57 a1 8b f3 e6 b9 90 b9 b8 f3 a3 3b 4c 8f | 23 8e 08 2f 27 17 72 8c c0 e7 38 14 1f 4b aa 78 | e1 d2 e5 79 c4 be 0b 93 9e 0c 21 6c d4 2a fe 21 | c7 8e 29 af b0 03 63 38 02 4d 95 ee 76 1a 81 af | a9 96 3e 2d 7b 5a 65 f4 b4 60 bb 2f a9 e9 18 59 | 66 94 d6 32 f1 9f 06 b1 1e 3d 20 4c 29 30 cd 34 | 29 00 00 24 72 14 4a 62 3b 2e 28 0b 02 9a 2b 55 | 37 9d 8e 84 fb c2 f7 70 ad cf 43 07 12 85 de c1 | 7c 78 30 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e0 6b 92 d2 7b 15 90 7f 21 2f b9 04 | b8 30 3c 8f c2 2d 01 6b 00 00 00 1c 00 00 40 05 | 4e cf 7c 8c 30 ae f3 1b a7 47 e4 11 ea a4 73 10 | 14 82 c2 9c | libevent_free: release ptr-libevent@0x7fb364045e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | #430 spent 0.176 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 31 ba 30 35 2e 2d c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #430 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #430 | rejected packet: | fd 31 ba 30 35 2e 2d c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #430: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0718 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358012bf0 | handling event EVENT_RETRANSMIT for parent state #401 | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #401 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #401 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49680.177354; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004226 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #401 | libevent_malloc: new ptr-libevent@0x7fb364045e60 size 128 "road-eastnet-nonat-149" #401: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #401) | 32 2a 52 53 b6 80 03 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 23 97 0d 57 1e 4b f9 07 88 66 bf 34 6e 58 4c | e6 20 66 15 d1 8b df 5a d2 2b 70 66 bf e5 46 ee | 75 f4 eb 71 1f f1 6f e1 d6 58 06 0a 4d 97 04 53 | 74 d3 7a 62 9c 6d fc 73 97 9b c2 cb c3 d3 cb d1 | a7 2a 8a bf ad 15 46 4b ac 4a 21 e7 16 cd 32 18 | f6 83 ab c8 99 38 21 bc e5 81 05 3f fc e4 b5 9f | 7d 77 82 93 0f 69 5a af 5b c2 81 88 55 f6 fa cc | 86 fe 2d 7e 6d ae 3a 9b 57 e6 de 78 5a 36 ba 60 | 3d 56 da 1d 5d 7b 85 49 92 79 e6 7c 62 e6 ba 39 | 70 40 1b 2f 31 49 fc c6 d5 8b 43 aa e6 2d 80 f1 | 00 4e 8e 1a 05 73 d3 15 0d 7c 1c 15 71 3b 45 0a | 71 47 01 7c 8b 3a 4c 28 d2 c5 72 06 09 34 70 7a | 6f eb 8d 51 fc f9 d9 92 d1 00 53 57 7a 80 e8 39 | 37 38 0d 62 49 b3 0f 75 c3 ee 8b a3 66 04 51 8d | 4d ca 16 c5 dc 18 bd ee 26 01 0f c7 9b e6 0b 35 | e3 5e 44 0d 5e 45 e9 f2 25 03 56 4f 95 a8 57 74 | 29 00 00 24 98 0f af 0d 18 0d 49 ab 74 8d 40 09 | a9 19 04 ac c2 29 19 2a e5 21 dd 83 5a 09 3e 6b | 71 16 78 8b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 5b 75 e0 fb 06 ab 59 93 2a 0c bc | 70 9d 3c 6c 4b 98 95 ed 00 00 00 1c 00 00 40 05 | 06 0c a6 cc 70 cf f8 01 75 5d 68 14 0f cc 7e 89 | 81 50 60 0f | libevent_free: release ptr-libevent@0x7fb358023a50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358012bf0 | #401 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 2a 52 53 b6 80 03 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #401 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #401 | rejected packet: | 32 2a 52 53 b6 80 03 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #401: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a276e0 | handling event EVENT_RETRANSMIT for parent state #202 | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #202 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #202 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49680.19382; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008444 exceeds limit? YES "road-eastnet-nonat-202" #202: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-202" #202: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #454 at 0x557d46ae6900 | State DB: adding IKEv2 state #454 in UNDEFINED | pstats #454 ikev2.ike started | Message ID: init #454: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #454: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #454; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-202" #454: initiating v2 parent SA to replace #202 | using existing local IKE proposals for connection road-eastnet-nonat-202 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 454 for state #454 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb358012bf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #454 | libevent_malloc: new ptr-libevent@0x7fb358023a50 size 128 | #454 spent 0.0718 milliseconds in ikev2_parent_outI1() | RESET processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #202 ikev2.ike failed too-many-retransmits | pstats #202 ikev2.ike deleted too-many-retransmits | #202 spent 2.64 milliseconds in total | [RE]START processing: state #202 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-202" #202: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #202: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #202 "road-eastnet-nonat-202" #202: deleting IKE SA for connection 'road-eastnet-nonat-202' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-202' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 17 resuming | crypto helper 17 starting work-order 454 for state #454 | in connection_discard for connection road-eastnet-nonat-202 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 454 | State DB: deleting IKEv2 state #202 in PARENT_I1 | parent state #202: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 454 time elapsed 0.000669 seconds | (#454) spent 0.547 milliseconds in crypto helper computing work-order 454: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 454 for state #454 to event queue | scheduling resume sending helper answer for #454 | libevent_malloc: new ptr-libevent@0x7fb35003a770 size 128 | crypto helper 17 waiting (nothing to do) | stop processing: state #202 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a276e0 | in statetime_stop() and could not find #202 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-202 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-202" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-202' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-202" | stop processing: connection "road-eastnet-nonat-202" (in initiate_a_connection() at initiate.c:349) | spent 0.0571 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #454 | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 454 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #454 | **emit ISAKMP Message: | initiator cookie: | 3e f1 41 2a cb 15 91 c1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-202 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a0 3c 6a c7 38 95 77 87 5d 1e c8 dc ba 22 fc 03 | ikev2 g^x 1c 9c 6c 7f 8e 0e fd af 13 dd 37 0a 23 40 7c ce | ikev2 g^x 87 9a c3 3c b2 29 81 32 66 6c ba 2d 43 73 e4 9f | ikev2 g^x 34 a2 6c c8 c3 e8 8f d1 b2 45 4b 81 58 b8 9d f6 | ikev2 g^x d7 6b 98 99 af 72 e9 d0 c7 87 b4 74 61 b8 6f 67 | ikev2 g^x 18 e9 20 82 3b 32 85 5d b7 fc 19 46 92 6b 65 26 | ikev2 g^x b2 31 d6 c3 36 5c 46 dd c1 b3 1a ba 4d 4c b4 fb | ikev2 g^x c9 29 e2 5f 88 92 21 72 05 11 74 76 83 6a f0 05 | ikev2 g^x 70 a8 4f 78 f0 27 41 4f 18 70 43 44 55 76 41 4e | ikev2 g^x d4 55 4f 0d be 47 fb 72 63 29 ab 49 16 15 52 01 | ikev2 g^x 76 0d 0d 3c d4 72 41 c1 63 95 85 97 21 62 a1 0c | ikev2 g^x 98 62 73 cf ff 81 3f b1 d6 5b a3 17 9c bf 13 ea | ikev2 g^x 76 47 19 6b ec 4e dd d2 c8 fc 10 8a 93 9d e2 40 | ikev2 g^x 1a 9a ec ba a4 26 5c 4d 01 9a 6a 47 3b fc ea 48 | ikev2 g^x 29 30 cf ee 79 66 a8 78 a7 b1 8e ad 2b ce 52 2c | ikev2 g^x 72 05 7f 8f f6 f4 ff ed 12 0a b1 b7 de 27 bb d0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 42 50 bc e2 16 2b 34 89 d5 4e 59 5a a4 d3 d2 a4 | IKEv2 nonce 86 df 60 97 ee fa 90 f6 ad 34 8e f4 49 50 59 36 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3e f1 41 2a cb 15 91 c1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ca | natd_hash: port= 01 f4 | natd_hash: hash= 83 1c 0d 08 a9 24 58 8d 73 8e f2 10 b3 0d e0 67 | natd_hash: hash= 52 ae c5 46 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 83 1c 0d 08 a9 24 58 8d 73 8e f2 10 b3 0d e0 67 | Notify data 52 ae c5 46 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3e f1 41 2a cb 15 91 c1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 72 a5 1c 62 b2 bc b3 f0 fe 77 e1 0e f2 db 46 ae | natd_hash: hash= 09 80 33 7f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 72 a5 1c 62 b2 bc b3 f0 fe 77 e1 0e f2 db 46 ae | Notify data 09 80 33 7f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #454 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #454: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #454 to 4294967295 after switching state | Message ID: IKE #454 skipping update_recv as MD is fake | Message ID: sent #454 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-202" #454: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.202:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #454) | 3e f1 41 2a cb 15 91 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 3c 6a c7 38 95 77 87 5d 1e c8 dc ba 22 fc 03 | 1c 9c 6c 7f 8e 0e fd af 13 dd 37 0a 23 40 7c ce | 87 9a c3 3c b2 29 81 32 66 6c ba 2d 43 73 e4 9f | 34 a2 6c c8 c3 e8 8f d1 b2 45 4b 81 58 b8 9d f6 | d7 6b 98 99 af 72 e9 d0 c7 87 b4 74 61 b8 6f 67 | 18 e9 20 82 3b 32 85 5d b7 fc 19 46 92 6b 65 26 | b2 31 d6 c3 36 5c 46 dd c1 b3 1a ba 4d 4c b4 fb | c9 29 e2 5f 88 92 21 72 05 11 74 76 83 6a f0 05 | 70 a8 4f 78 f0 27 41 4f 18 70 43 44 55 76 41 4e | d4 55 4f 0d be 47 fb 72 63 29 ab 49 16 15 52 01 | 76 0d 0d 3c d4 72 41 c1 63 95 85 97 21 62 a1 0c | 98 62 73 cf ff 81 3f b1 d6 5b a3 17 9c bf 13 ea | 76 47 19 6b ec 4e dd d2 c8 fc 10 8a 93 9d e2 40 | 1a 9a ec ba a4 26 5c 4d 01 9a 6a 47 3b fc ea 48 | 29 30 cf ee 79 66 a8 78 a7 b1 8e ad 2b ce 52 2c | 72 05 7f 8f f6 f4 ff ed 12 0a b1 b7 de 27 bb d0 | 29 00 00 24 42 50 bc e2 16 2b 34 89 d5 4e 59 5a | a4 d3 d2 a4 86 df 60 97 ee fa 90 f6 ad 34 8e f4 | 49 50 59 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 1c 0d 08 a9 24 58 8d 73 8e f2 10 | b3 0d e0 67 52 ae c5 46 00 00 00 1c 00 00 40 05 | 72 a5 1c 62 b2 bc b3 f0 fe 77 e1 0e f2 db 46 ae | 09 80 33 7f | state #454 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb358023a50 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb358012bf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a276e0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #454 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 | #454 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49680.195105 | resume sending helper answer for #454 suppresed complete_v2_state_transition() and stole MD | #454 spent 0.347 milliseconds in resume sending helper answer | stop processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35003a770 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3e f1 41 2a cb 15 91 c1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #454 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #454 | rejected packet: | 3e f1 41 2a cb 15 91 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ca fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #454: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #443 | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #443 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #443 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49680.235279; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001151 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3500300a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #443 | libevent_malloc: new ptr-libevent@0x7fb35003a770 size 128 "road-eastnet-nonat-191" #443: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #443) | 99 e5 a7 37 44 6e 78 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 12 f7 51 e4 9b df 2b ce ce f2 ee 7b 13 94 51 | 6a dd a6 05 05 c5 f9 51 17 99 5e 09 04 c9 1f b2 | fd 1f 26 33 db d5 00 aa 13 04 1c 40 7e db ca 5a | d7 f8 59 90 a2 34 4e 73 d9 b4 1b 12 47 af 09 6a | 3d c6 bc 0a 75 d2 59 20 61 0f b0 78 2f f9 96 a8 | bc 6e fc a4 91 79 01 c5 c6 bf 55 5f ca 2a 71 57 | 55 3a c2 55 6a 02 68 58 b9 3f ee 10 26 00 19 6c | a4 9b 2b c5 37 91 ea 3d f7 92 10 15 3e 21 96 87 | 2b 42 57 b1 96 6e 0c 94 b6 11 c4 ca 44 56 8a bf | 72 e1 9f 77 2e b1 9f 72 96 c2 0b cd e9 02 1e ed | f4 40 75 83 23 4e d6 76 72 99 62 9c 55 c4 df 8d | 23 38 27 3c f9 b9 3f 1c 37 14 80 74 3c 7a 5d f8 | 1a 0c 7f 0d 3a 48 23 4c 35 58 8d c3 50 e9 4f d5 | 3a d4 b6 fa d0 f4 f0 02 7b 72 04 9c a6 5b 57 b7 | 6f ac e8 68 3f 0b ab 1c 0a 68 cc 2e 68 e9 56 e5 | 09 9a 32 64 09 77 95 51 f1 d9 2b dd e7 b2 96 44 | 29 00 00 24 d1 ee 39 81 5a e3 54 a6 73 c8 50 03 | 2c 50 da d8 32 42 2b e6 ab ed 1b 51 ff 8e f3 84 | d3 ae 77 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 53 91 6c eb c8 88 e0 f9 9e 54 62 | 8e 3a 67 1c 98 f2 42 50 00 00 00 1c 00 00 40 05 | 84 7e 67 f1 2a 8c cc 0b 8d 85 0d 9d a9 c1 72 b7 | 86 11 2f 01 | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #443 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb384043260 | handling event EVENT_RETRANSMIT for parent state #431 | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #431 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #431 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49680.235461; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002855 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #431 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 "road-eastnet-nonat-179" #431: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #431) | 47 a9 f6 5d ab 90 59 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 61 b4 c7 cd e1 2c 04 0c 72 d6 80 6f c8 af 30 | 4d b0 b2 1e 8d 4f c3 2d f2 10 58 df a2 cf 51 79 | b1 79 c2 3f a7 35 e3 8e 8c e9 62 c2 7f 62 64 45 | 0a e4 6a 79 06 24 d8 93 a4 d7 88 f6 f8 67 56 ac | da f7 27 22 46 b5 f3 36 fc 59 b8 ef 46 c0 a0 39 | db 63 6d 41 32 18 a5 95 8d 7d ad 6f 27 26 ca df | ed d3 ee 53 fd 4c f5 cc 75 fc e3 f8 93 5a 96 cb | 92 9a 63 48 fa 88 0d 7b 6d 6b ed e6 9a a3 62 cc | f6 ca d1 cc 9a a4 27 97 4e 98 8a fa ec f7 10 73 | 1c 8b 1a f2 37 ea 26 ef 65 c4 24 b5 68 0e 71 36 | f1 1a b0 23 a4 4f b8 8f 75 d7 00 cd 7b 3c ae b6 | d6 4e 42 ae bd d1 a4 92 33 6b 9b 3f 93 ee 1b 13 | 12 06 ae 19 81 16 af 26 23 73 f8 46 07 4b f9 88 | 69 47 c6 fb 6b 2b 62 2c a3 d3 70 f4 52 77 08 a4 | 0e 48 7c ce 5d 87 5a c2 55 50 b0 8a 92 e5 1a 3c | 83 00 60 34 e5 f6 a0 b7 42 00 ef b1 62 a7 9d 6c | 29 00 00 24 71 9e 5f 53 a0 03 f4 e4 24 3a 58 53 | c3 05 4a 1c c7 b1 e2 bd 95 07 98 a5 4b 6a 2d 2f | 6b 11 45 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 46 73 c7 9b 2a a1 6f 39 66 d3 70 | f2 4b 98 95 84 ba e3 3f 00 00 00 1c 00 00 40 05 | 9a b5 4b 5a b1 14 b9 6a 89 15 79 d3 91 3a bb d6 | 0d 4a ca 70 | libevent_free: release ptr-libevent@0x7fb384031e80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384043260 | #431 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 e5 a7 37 44 6e 78 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #443 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #443 | rejected packet: | 99 e5 a7 37 44 6e 78 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #443: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 a9 f6 5d ab 90 59 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #431 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #431 | rejected packet: | 47 a9 f6 5d ab 90 59 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #431: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0537 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a88140 | handling event EVENT_RETRANSMIT for parent state #402 | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #402 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #402 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49680.241815; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003782 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384043260 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #402 | libevent_malloc: new ptr-libevent@0x7fb384031e80 size 128 "road-eastnet-nonat-150" #402: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #402) | d7 18 0b 56 dd fc 93 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 8f d0 91 ee 0c 2c 6d b1 49 7f e7 a7 c5 b4 b6 | ba 26 c6 73 cd 26 6d 07 75 be 09 23 1b d9 66 18 | 43 89 72 64 b1 d5 06 ca 9d c0 33 e2 98 5e c1 57 | 08 88 8a 2d 7a 4a eb cd 6a ad 0c 5b 60 7a 3c d6 | 1b 41 e1 63 95 9d 48 05 85 b8 3e e9 c2 2c 08 fc | 0a e1 15 60 ae 51 d5 ec 71 41 de 9c 11 57 49 6c | 9b fc 6f 1d 07 87 e1 29 06 e5 0a b9 9d 8f 51 66 | de ed ee d7 d1 94 d4 80 f9 c9 b3 72 40 5d 4f 1f | e8 51 bc 21 99 7c 48 a4 03 69 7e 36 81 2c 93 c5 | 85 f1 72 97 17 d9 4b 16 e1 02 93 16 a0 e9 5a 8c | 18 8b 2d 22 a0 68 e9 52 fc 14 55 90 a6 f2 25 49 | d1 90 07 21 fd a8 a8 15 db 83 f7 be ce 21 31 d0 | 18 03 fd af 89 22 76 d9 16 f9 54 ff a2 a4 03 62 | f9 9f ab 74 f4 75 62 99 a7 8b 91 97 ad 9d c4 9c | 3e 40 41 dc 60 23 02 31 5e 46 98 d3 1a 73 73 14 | dd ff 30 58 0d fa ab 00 11 c3 0b 18 0a c3 bc a2 | 29 00 00 24 22 ce 51 25 1e d0 f6 54 17 83 9f e7 | 7f a6 b8 56 15 08 66 12 32 0f c5 1a 1c 37 04 e4 | a3 f5 17 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 72 8a fb e8 f5 d3 16 73 e6 1b bd | ae fd 45 81 b5 65 c1 51 00 00 00 1c 00 00 40 05 | 63 4e 70 bd 7c b5 4d 3a 8c 2e 79 8c 91 4d 92 d1 | 89 54 24 9e | libevent_free: release ptr-libevent@0x7fb364034150 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a88140 | #402 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 18 0b 56 dd fc 93 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #402 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #402 | rejected packet: | d7 18 0b 56 dd fc 93 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #402: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a73690 | handling event EVENT_RETRANSMIT for parent state #347 | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #347 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #347 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49680.246124; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005526 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a88140 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #347 | libevent_malloc: new ptr-libevent@0x7fb364034150 size 128 "road-eastnet-nonat-95" #347: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #347) | f8 38 0d 6d 39 93 09 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 c4 2f 67 81 91 d8 d3 fb 76 27 6a 79 d1 72 21 | 27 8a 05 07 53 b8 7f 41 86 ef e3 fa f6 78 ef f1 | 52 89 ca 2d 9e 75 06 3f de f7 86 92 8e de 82 39 | 74 b5 33 59 34 5d 7a 07 32 58 2d 1b 54 b4 4a 71 | 82 e9 69 4b d1 23 61 8d 33 9d 70 70 80 3d e7 06 | 38 6a 56 ed 6a ce 44 ea 5c f0 e5 ab 75 42 57 8c | 73 f2 e6 32 f6 2b 78 17 cc 77 d1 36 52 bb 7b 23 | 6f c5 5a f4 da 8c 20 ce 25 5e 2c b4 61 29 ba 22 | 7b 74 2f 22 bd 61 49 7e ed ee f8 95 fd 44 ae 87 | 6a 9a b0 84 48 37 7e bb 35 e6 e2 f6 4e 13 6b 95 | 47 4c 2d 6c a3 db 3d 5d ad 81 79 5f 80 e7 3e ed | bb b5 a8 97 95 f7 34 a1 ef 98 52 3c fa 6c 7f 37 | f7 78 d5 45 99 4e d1 38 57 29 2f b0 94 21 1c a5 | 4f 3d 71 d0 fc 88 a0 06 b8 26 ee 84 19 ff 4c 00 | 47 77 6c e4 d3 3a ee 07 05 6f 06 56 6c 1b 9a 2e | 15 bd 41 a6 3a 78 6e d5 2a 86 74 c6 d6 01 f5 e6 | 29 00 00 24 2a 8c 4f 9a ed e1 ff e1 d2 8e 39 06 | cc ef a0 3d 7a d8 6e 61 bc 37 8f e1 33 0d 03 68 | 11 db e1 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 e5 1f 89 e2 f9 a8 3f 54 c4 5a dc | 3f 1e 16 e7 e3 67 75 63 00 00 00 1c 00 00 40 05 | d2 37 e4 48 b8 f6 61 3d d7 15 bc 92 37 84 81 61 | b6 43 37 f7 | libevent_free: release ptr-libevent@0x7fb34403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a73690 | #347 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 38 0d 6d 39 93 09 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #347 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #347 | rejected packet: | f8 38 0d 6d 39 93 09 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #347: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.056 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abe740 | handling event EVENT_RETRANSMIT for parent state #449 | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #449 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #449 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49680.248417; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50009 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a73690 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #449 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 "road-eastnet-nonat-197" #449: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #449) | ea 52 41 06 29 be 32 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c f6 72 22 70 e3 8e 6a 67 c3 d0 4a 0b 7f 5b cf | 2d 68 56 81 95 56 3f 4d 2a 1e 61 1a 59 76 f5 26 | 54 d5 6a 01 f4 8a a1 63 50 3e a3 b6 d1 85 12 bf | 8c a7 c8 b2 9c d2 7e 12 ce 8a 8f 97 a7 10 c6 36 | 55 54 39 bd 73 f0 07 97 c0 8f d8 2f a2 5e 50 05 | cb 9d 1a b8 ce 20 6a 30 ff 7d 3d 2a 89 9c e8 f9 | db 68 6b e7 d3 12 f3 5c 42 81 cc 9e c7 d6 ab 3b | 07 00 72 f9 2b bb 2c 8f 88 74 45 a7 1f 5a 2d 17 | 94 3e ec e0 ce a9 ab 72 79 45 76 ba 8c 1f 40 56 | 6d 7a 46 42 83 af a1 98 c5 23 1e 58 16 d7 79 25 | b7 cc 17 53 0a 7f 1c 45 dc 0f 11 52 e6 bb 5f 53 | 8d b5 f6 fb 27 2b 60 33 a4 cd 4d e9 7c 6b 4b 17 | 81 ec cb ca e4 d2 97 9b 61 33 64 a7 c9 1d 12 b0 | ff a4 81 cf f4 75 a2 54 63 07 9b 1c 61 4f 70 9a | f2 61 b3 19 96 98 3c 7b 44 1f aa 65 b4 bf d7 a8 | 55 c2 75 de ff 71 8c 90 1b 3c c3 a8 3f fe 54 f3 | 29 00 00 24 43 77 8d 20 c7 95 c9 d5 6a 2d 87 1f | da 3a b4 7e 55 a2 17 ed 53 70 56 79 ef 21 f9 7e | 28 b4 26 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 9b 7e ce 31 a7 8d 1a 50 79 db 89 | b3 07 e5 e2 b0 c0 20 fc 00 00 00 1c 00 00 40 05 | eb cc 39 a0 b6 a4 78 79 56 5f 29 29 93 1e cc 18 | 29 12 ff 3b | libevent_free: release ptr-libevent@0x7fb34c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe740 | #449 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 52 41 06 29 be 32 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #449 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #449 | rejected packet: | ea 52 41 06 29 be 32 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #449: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0556 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1ae80 | handling event EVENT_RETRANSMIT for parent state #203 | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #203 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #203 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49680.272716; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007553 exceeds limit? YES "road-eastnet-nonat-203" #203: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-203" #203: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #455 at 0x557d46ae7ec0 | State DB: adding IKEv2 state #455 in UNDEFINED | pstats #455 ikev2.ike started | Message ID: init #455: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #455: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #455; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-203" #455: initiating v2 parent SA to replace #203 | using existing local IKE proposals for connection road-eastnet-nonat-203 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 455 for state #455 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46abe740 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #455 | libevent_malloc: new ptr-libevent@0x7fb34c0251c0 size 128 | #455 spent 0.0744 milliseconds in ikev2_parent_outI1() | RESET processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 resuming | crypto helper 18 starting work-order 455 for state #455 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 455 | start processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #203 ikev2.ike failed too-many-retransmits | pstats #203 ikev2.ike deleted too-many-retransmits | #203 spent 2.34 milliseconds in total | [RE]START processing: state #203 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-203" #203: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #203: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #203 "road-eastnet-nonat-203" #203: deleting IKE SA for connection 'road-eastnet-nonat-203' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-203' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-203 | State DB: deleting IKEv2 state #203 in PARENT_I1 | parent state #203: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 455 time elapsed 0.000726 seconds | (#455) spent 0.728 milliseconds in crypto helper computing work-order 455: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 455 for state #455 to event queue | scheduling resume sending helper answer for #455 | libevent_malloc: new ptr-libevent@0x7fb35403a770 size 128 | crypto helper 18 waiting (nothing to do) | stop processing: state #203 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb348046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1ae80 | in statetime_stop() and could not find #203 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-203 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-203" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-203' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-203" | stop processing: connection "road-eastnet-nonat-203" (in initiate_a_connection() at initiate.c:349) | spent 0.0578 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #455 | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 455 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #455 | **emit ISAKMP Message: | initiator cookie: | a6 08 27 1f 75 50 39 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-203 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d5 c7 bc 11 60 3e a6 9a 85 6d e5 42 37 d7 18 00 | ikev2 g^x 0c ea 15 92 bc 93 3a fa 4f c0 cd 9b 9d 21 1a ec | ikev2 g^x 13 f0 fc 0b a2 84 9a a5 b1 57 c2 a8 ab 33 a5 7b | ikev2 g^x 04 ac cd 61 b9 a7 e2 6f b1 9a 56 b1 3c b1 a4 2e | ikev2 g^x 8d 80 e0 ac 78 ee b2 78 51 00 d0 a0 eb cf 06 35 | ikev2 g^x 9c 7e 2a 73 b1 56 cd fe b7 d8 9d ab 84 62 9b e7 | ikev2 g^x ab 4d 04 16 06 c3 1a 9c 88 af e1 4b bd a0 09 ac | ikev2 g^x fd 8a ba 51 00 10 a1 a7 a6 a2 56 74 b5 9b 53 af | ikev2 g^x 87 60 09 5b 74 75 e3 41 f8 3d 7a cf 0c 36 f7 ea | ikev2 g^x aa 1b 05 8b 54 d5 b2 e1 fe 9e d4 4e f4 ae 74 22 | ikev2 g^x 98 23 25 ba ff 74 27 da 25 81 74 09 8c 6b 8b 69 | ikev2 g^x 54 dc 62 05 8c 02 be b4 b0 c4 25 43 18 99 9f c3 | ikev2 g^x 41 7e c1 29 f3 a3 60 75 de aa 26 bd a3 38 8c ad | ikev2 g^x a8 31 89 d2 48 90 d9 19 ce f4 34 9e 9d e7 1c e9 | ikev2 g^x d3 7f ee 85 33 84 75 6d 04 5b b4 a0 96 a6 93 65 | ikev2 g^x 8d 1c 3a f8 14 81 03 4c 63 f4 25 e5 59 99 ac 86 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6a 39 a6 75 f8 f4 82 47 b3 0b 2e 10 f3 31 67 d9 | IKEv2 nonce 88 26 9d 5b f1 75 40 6b 34 32 86 bb 7a 07 84 1e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a6 08 27 1f 75 50 39 d3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 cb | natd_hash: port= 01 f4 | natd_hash: hash= 24 cd df 41 37 6e 2d fc 1b 29 38 8e de fc 0c a0 | natd_hash: hash= 44 c7 44 d5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 24 cd df 41 37 6e 2d fc 1b 29 38 8e de fc 0c a0 | Notify data 44 c7 44 d5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a6 08 27 1f 75 50 39 d3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6e c0 59 83 50 2c 8a cc c5 6e 0a 98 ab 1c 00 ee | natd_hash: hash= ff c6 95 31 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6e c0 59 83 50 2c 8a cc c5 6e 0a 98 ab 1c 00 ee | Notify data ff c6 95 31 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #455 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #455: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #455 to 4294967295 after switching state | Message ID: IKE #455 skipping update_recv as MD is fake | Message ID: sent #455 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-203" #455: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.203:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #455) | a6 08 27 1f 75 50 39 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 c7 bc 11 60 3e a6 9a 85 6d e5 42 37 d7 18 00 | 0c ea 15 92 bc 93 3a fa 4f c0 cd 9b 9d 21 1a ec | 13 f0 fc 0b a2 84 9a a5 b1 57 c2 a8 ab 33 a5 7b | 04 ac cd 61 b9 a7 e2 6f b1 9a 56 b1 3c b1 a4 2e | 8d 80 e0 ac 78 ee b2 78 51 00 d0 a0 eb cf 06 35 | 9c 7e 2a 73 b1 56 cd fe b7 d8 9d ab 84 62 9b e7 | ab 4d 04 16 06 c3 1a 9c 88 af e1 4b bd a0 09 ac | fd 8a ba 51 00 10 a1 a7 a6 a2 56 74 b5 9b 53 af | 87 60 09 5b 74 75 e3 41 f8 3d 7a cf 0c 36 f7 ea | aa 1b 05 8b 54 d5 b2 e1 fe 9e d4 4e f4 ae 74 22 | 98 23 25 ba ff 74 27 da 25 81 74 09 8c 6b 8b 69 | 54 dc 62 05 8c 02 be b4 b0 c4 25 43 18 99 9f c3 | 41 7e c1 29 f3 a3 60 75 de aa 26 bd a3 38 8c ad | a8 31 89 d2 48 90 d9 19 ce f4 34 9e 9d e7 1c e9 | d3 7f ee 85 33 84 75 6d 04 5b b4 a0 96 a6 93 65 | 8d 1c 3a f8 14 81 03 4c 63 f4 25 e5 59 99 ac 86 | 29 00 00 24 6a 39 a6 75 f8 f4 82 47 b3 0b 2e 10 | f3 31 67 d9 88 26 9d 5b f1 75 40 6b 34 32 86 bb | 7a 07 84 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 cd df 41 37 6e 2d fc 1b 29 38 8e | de fc 0c a0 44 c7 44 d5 00 00 00 1c 00 00 40 05 | 6e c0 59 83 50 2c 8a cc c5 6e 0a 98 ab 1c 00 ee | ff c6 95 31 | state #455 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c0251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46abe740 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1ae80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #455 | libevent_malloc: new ptr-libevent@0x7fb348046040 size 128 | #455 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49680.274009 | resume sending helper answer for #455 suppresed complete_v2_state_transition() and stole MD | #455 spent 0.325 milliseconds in resume sending helper answer | stop processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35403a770 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 08 27 1f 75 50 39 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #455 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #455 | rejected packet: | a6 08 27 1f 75 50 39 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cb fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #455: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0484 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a15810 | handling event EVENT_RETRANSMIT for parent state #253 | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #253 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #253 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49680.290157; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006833 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400f1f0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #253 | libevent_malloc: new ptr-libevent@0x7fb35403a770 size 128 "road-eastnet-nonat-1" #253: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #253) | 54 6a b3 63 15 2d 54 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 a1 ec de cb a0 5d c1 1a bd 04 af 6b c8 65 41 | 5e 52 49 f5 a0 69 ab 28 22 ed fc 77 d0 a0 c1 09 | 24 c3 68 ac f8 52 b1 01 40 3f 24 70 5d fa bb e6 | 18 17 b8 60 62 5c 25 b7 91 1b 32 be a8 33 c7 03 | d3 9b 4d ca 93 cb 69 27 56 25 f1 0e f0 75 9b f1 | 6f a5 25 09 c0 56 aa ed be 25 e6 7b 20 95 b5 00 | 7f 1a 1b 09 1c 04 5e 80 38 55 80 90 08 7b dd ce | 4f 11 1a be 0d 38 69 ab e8 df ca 75 0d 3f c0 1b | 66 36 7e b8 6f b9 34 13 07 77 35 27 1b 68 f3 4e | 59 d6 7e de a5 ba 53 3b 79 89 bf fd cf 6b c9 05 | 32 48 47 96 e8 02 b8 8c 85 5e 07 cf ed 73 28 31 | 7f b0 4a 57 00 7a 0b 42 b6 34 c6 f8 0c c3 11 82 | b9 52 df 83 77 94 ac c4 6e d0 af 9f 9c 46 4a 9d | 6a 59 79 91 e9 aa 6f 46 f9 bf 64 56 57 97 6b ca | 02 fc e7 a2 5d cb d3 e6 be 89 40 eb 8b 5f bf bb | ea e1 78 af e4 9a d6 bc 8f 45 8e 59 45 6b cc 3f | 29 00 00 24 5b 81 82 6a 34 1f 0c 89 b3 0b 07 6c | d0 e3 bd fa b4 1c af f3 18 56 94 10 92 25 11 f0 | 48 f8 d2 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 79 2b 18 11 0c 23 de f4 d0 de e0 | 77 97 22 a5 08 48 2f ff 00 00 00 1c 00 00 40 05 | c8 d4 47 db f6 e8 46 67 19 87 ae df 18 10 c7 ab | 9f a6 71 f9 | libevent_free: release ptr-libevent@0x7fb35804b970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a15810 | #253 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 6a b3 63 15 2d 54 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #253 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #253 | rejected packet: | 54 6a b3 63 15 2d 54 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #253: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3800383c0 | handling event EVENT_RETRANSMIT for parent state #403 | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #403 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #403 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49680.307444; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002973 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a15810 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #403 | libevent_malloc: new ptr-libevent@0x7fb35804b970 size 128 "road-eastnet-nonat-151" #403: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #403) | 32 36 13 09 3a 0c 64 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 1d 1f f9 29 d4 7a 82 e5 c3 ed 2d 91 36 94 a3 | ad 42 95 1c da 49 e7 df be 20 17 de b8 10 02 70 | 99 a0 9d 95 41 a8 00 d1 af 94 26 4c 6c 86 0c 1f | 94 7a 02 35 96 84 54 33 fd cb 84 dd 66 c9 68 48 | c0 82 f1 59 9a 21 1d bc d5 30 03 12 1e e7 09 61 | be 0b 67 1d db fb 9e 1e 17 49 85 95 31 47 f7 2b | 4a 86 6c c9 65 82 f2 1e a6 01 6c ac cd f1 e2 b1 | c0 7c 6b 1c 75 70 5d e8 eb b9 df 8a a0 09 66 57 | 4a b4 92 66 fc a3 08 c8 94 4f 6c 58 0d 44 86 54 | 0d a6 ba 1e d2 d3 f5 98 14 c7 bb cb 0d c6 25 81 | 7d 00 f0 be 73 bc 11 32 a7 22 fe 40 f1 5c 99 a7 | f6 f4 02 31 24 83 16 a4 cb d9 f9 bc 7d ee f9 64 | 7a 45 11 03 43 36 f4 ff f8 3b 61 50 62 1a ea 35 | 94 85 76 d9 cf 8d 05 40 c4 4f 44 89 69 5a 20 63 | bb 17 c4 c0 24 8c 90 9c 7c 82 0c b1 fd 04 ab 4c | 94 5c 67 12 3b 66 e3 71 78 3a f5 9a 05 60 53 5e | 29 00 00 24 96 4a 72 fe 73 4d 43 f4 22 71 ca 5d | 92 02 9d 90 a1 de a3 67 65 d9 a5 3e 5d f5 46 47 | 3c 9d 2b 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 72 77 63 b0 4d c0 15 33 f7 7b 47 | a3 64 95 74 99 05 10 8e 00 00 00 1c 00 00 40 05 | 3b eb 87 4d 47 ff 24 80 19 6f 36 13 fc b8 88 ec | 58 fe 93 a3 | libevent_free: release ptr-libevent@0x7fb38000c460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800383c0 | #403 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 36 13 09 3a 0c 64 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #403 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #403 | rejected packet: | 32 36 13 09 3a 0c 64 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #403: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c040840 | handling event EVENT_RETRANSMIT for parent state #444 | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #444 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #444 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49680.308742; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001566 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800383c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #444 | libevent_malloc: new ptr-libevent@0x7fb38000c460 size 128 "road-eastnet-nonat-192" #444: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #444) | 7f 9a e3 30 35 a2 50 3a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 73 44 16 cd dc 6d af 1e 52 47 5f 1e bd fa ee | 64 00 7c 0c 09 cd 6a b9 96 7a 9e fd 7b 60 d3 11 | 94 7f f3 14 ab de fc 67 4d 77 8c ed ae 35 5e 21 | 92 1a 34 1f 52 96 c6 b4 82 cf e2 da a3 5d a8 40 | 55 b6 be b1 02 f7 4f 09 53 8a 9a 82 43 68 c5 03 | 91 79 7b fa ca eb 01 ae de 9c b8 57 af 0c ad 92 | 90 f7 80 a3 5f 1b 76 77 00 b6 f8 6e 45 fc bc 6c | 08 e0 42 31 50 bd 6d b4 9c ee e1 eb b4 38 73 a9 | 34 e4 98 23 d2 4d e0 d9 b6 c6 f6 dc 56 58 4e 20 | 84 e1 d2 8f 09 7f 4a 9d 26 b0 f3 d6 00 33 87 e7 | 4a de ea 2f 4a 53 b4 0f 48 62 38 e9 50 42 17 64 | 60 9a 88 18 4e 23 6b 6a 5a a4 6b 23 ad 33 67 82 | 97 a8 79 73 5f c7 02 96 5e 91 0e 40 d6 4e f8 b3 | d9 30 5c 69 30 3f 5d 5d 8a 33 e5 82 75 a6 f8 01 | e5 10 de e1 1f 27 d1 2a e8 d2 12 a6 bb 52 29 5c | 7e c1 67 58 19 ab fb 58 65 a2 55 1e 99 be f5 8d | 29 00 00 24 2a ad 1b 39 f3 fd f9 42 4c 00 4a 5c | ed 00 f4 3a 31 ea eb b5 54 5a 5c 9d a2 7d 7c c4 | 61 a7 b5 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 d0 f0 6f a1 ca 95 cb 19 9f 38 2a | 49 20 b8 20 36 38 5c 50 00 00 00 1c 00 00 40 05 | 75 b6 79 50 7c d3 43 75 20 ac ac 20 ab c2 0f 0e | 7d 73 a1 76 | libevent_free: release ptr-libevent@0x7fb34c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c040840 | #444 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 9a e3 30 35 a2 50 3a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #444 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #444 | rejected packet: | 7f 9a e3 30 35 a2 50 3a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #444: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a84000 | handling event EVENT_RETRANSMIT for parent state #432 | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #432 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #432 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49680.321024; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003048 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c040840 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #432 | libevent_malloc: new ptr-libevent@0x7fb34c00cf80 size 128 "road-eastnet-nonat-180" #432: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #432) | 9e 5c f1 81 be b3 cc bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 a7 44 cc 56 0f 1f a1 57 e9 97 90 cf 04 1e 5b | e0 0e 7b 47 ef c0 b0 6b 28 ba 80 69 c9 1b 38 ab | 77 4e c9 e0 e5 8e ac 7e e2 16 87 36 5e 9c 78 7a | 88 e7 f8 df f3 43 04 06 de 41 bf fc 2c aa 5f 0d | 69 d9 8b 25 79 3a 55 bd c2 56 12 76 16 fc d9 a5 | 9c 10 c0 69 f3 49 ac 1b 12 69 8b 54 81 c5 66 b4 | ce 87 81 ab 4c 4a 3c be 13 a8 a6 c4 c4 ee d3 f3 | e4 6c 08 82 35 56 98 d0 52 0e 3c b5 9f cf 94 45 | b1 ff 7d 1f 92 70 cf 8e d1 c1 37 a6 37 65 ee ce | 20 a0 2f 74 83 20 8b e8 b7 59 69 69 3d 2e af d9 | 5c 5b c8 f5 d1 97 f9 58 4c 4b b5 5a 72 21 7a ff | 15 e2 cf de 63 20 f5 1b 33 44 6d 86 26 89 fe a9 | ef 26 23 fc 07 42 35 ac 53 4d 00 7f 36 93 50 78 | ef 61 a9 fd 99 64 73 27 a0 12 f0 71 a5 ef 01 e0 | f5 fa 65 6f 20 9b da c4 8d 30 72 f1 87 a2 6d e6 | e6 3b 2c 57 3c e1 2d 99 93 66 b2 b3 c7 c3 45 c6 | 29 00 00 24 97 c3 cd 2d d6 91 ce 3c 3a 10 07 b4 | 90 19 a9 e3 82 ea 52 87 8f 88 50 41 d4 a6 e1 e6 | 2e 3c 74 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b b0 51 e2 58 5c b1 15 1d eb ed 97 | 2a 88 5d 96 2e c9 a1 f8 00 00 00 1c 00 00 40 05 | 78 1a 23 ab e8 fa 74 f8 b4 b9 8c 5c d8 d3 f5 f5 | 1c a1 eb 5a | libevent_free: release ptr-libevent@0x7fb338023a60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a84000 | #432 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e 5c f1 81 be b3 cc bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #432 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #432 | rejected packet: | 9e 5c f1 81 be b3 cc bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #432: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b246c0 | handling event EVENT_RETRANSMIT for parent state #450 | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #450 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #450 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49680.336385; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500134 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #450 | libevent_malloc: new ptr-libevent@0x7fb338023a60 size 128 "road-eastnet-nonat-198" #450: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #450) | 6c 66 54 70 e3 85 47 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 7f 52 be 1b be 3e b4 95 6c 7f ea ce 79 84 79 | bb 2c a4 22 02 14 1a c7 80 c9 fc 63 a2 df a7 b4 | 1d c3 3e 47 98 35 3a c5 6d 01 79 cf ce 3b ed 3f | e7 fc 21 90 6a 8f a9 37 0a 15 57 ed e5 84 6d 80 | bc b0 af 24 80 0c 58 35 20 db 3e aa 64 ad 44 83 | d9 34 7e 33 a0 1c 88 af b7 63 e8 97 42 89 19 cf | e1 51 ee bc 36 b3 3f ea ae 0a 36 ea 2a 42 b5 d5 | 2b 9d 6c 67 c3 b5 e3 5c 88 ec 08 73 1a b8 90 c6 | eb c9 08 93 4a fd 61 5f ac b7 cf 92 b0 ce 44 08 | c5 ea 9d d1 33 ae 08 3a 55 1a 54 74 ee 06 12 8c | af 05 f1 32 8b f9 ad 76 e7 15 cf bb 56 d8 0d 22 | aa bf 8f d9 bc 81 33 05 b5 ca b2 64 e4 57 c2 aa | 8a ce 60 a9 03 71 24 23 e8 e9 eb 0e f3 fd cb 40 | 57 21 41 6c 87 a4 12 87 6c a3 20 f1 71 99 97 a1 | c9 bf 28 c9 61 1f 0e d1 0f d5 eb 18 2d 83 11 2c | a4 a9 46 db 50 5e 63 04 e8 1e e0 10 c3 22 6d 3c | 29 00 00 24 60 b3 78 69 cb 9c d2 f7 d6 cf 6b 51 | 75 18 c5 a7 1c 11 fb 00 38 fa 43 80 05 51 ec 75 | df 66 73 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 01 2f 17 96 36 9a 51 cd 6f 6e a8 | c1 69 8d 8a 84 17 97 6b 00 00 00 1c 00 00 40 05 | 07 24 02 da 94 a8 c8 5e ad a8 39 f9 98 2f 5a 91 | 01 02 06 a3 | libevent_free: release ptr-libevent@0x7fb34c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b246c0 | #450 spent 0.194 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 66 54 70 e3 85 47 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #450 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #450 | rejected packet: | 6c 66 54 70 e3 85 47 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #450: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf10 | handling event EVENT_RETRANSMIT for parent state #348 | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #348 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #348 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49680.349777; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004463 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b246c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #348 | libevent_malloc: new ptr-libevent@0x7fb34c035930 size 128 "road-eastnet-nonat-96" #348: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #348) | a7 7d 9d ff 1a 60 65 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce d5 f5 8b 39 60 35 a5 25 70 07 1c 5c b5 0b 9d | 0f b2 5b 4a 01 34 b6 83 42 d7 d4 4c ad da 68 4a | 8b 4a 32 5f 36 06 f1 98 73 58 e9 72 c0 73 68 ca | 50 81 07 47 ff 17 19 96 47 97 94 3d f6 b6 04 3a | d9 53 26 2d 26 d4 5a 00 db 52 8b 30 4a 2f d3 5e | 57 21 6b c8 30 e6 41 d6 77 b5 33 c3 1e eb 09 f5 | f6 92 94 59 ce 0f f4 b6 13 a7 e6 12 2c 94 0a 0e | a5 49 7d ed 7d 57 a6 dd 0c c8 f5 e3 ab f6 df fb | 13 a2 c5 ce cd 5e 51 7c 83 34 62 82 09 e1 e3 72 | 31 4c 58 be 93 6e 60 9d a5 4a 65 3b 0e 6c 76 16 | ff b5 3c 17 b2 e3 b4 72 ba 47 1e 9f c9 b0 43 a7 | f0 b4 e5 71 a8 38 7d f3 55 a8 70 6c f5 0c ea e3 | 99 31 47 d9 67 2c ef 74 72 f0 71 8a 3c da e4 22 | d8 c1 06 32 4c 16 22 97 a9 d9 5c c1 eb 63 08 aa | 52 12 c2 6f 92 9a fe 31 31 61 1a 04 4f a6 29 e5 | bd ba 74 54 e9 68 1b 89 03 52 57 66 34 af 35 4f | 29 00 00 24 d4 8c 07 58 36 6c 0d 91 39 7f ba 4b | 55 80 94 2b 15 6a 3d d9 23 c6 de 68 59 32 ea bf | f7 3a e2 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c1 c6 46 d6 42 6c c3 80 0a 8c 20 90 | 81 74 5d e8 06 92 e7 f6 00 00 00 1c 00 00 40 05 | 5c 1e 6e a7 c5 99 b7 4d bd dd e2 f9 8e 11 ad b4 | 92 1e 01 ed | libevent_free: release ptr-libevent@0x7fb34401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf10 | #348 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 7d 9d ff 1a 60 65 e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #348 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #348 | rejected packet: | a7 7d 9d ff 1a 60 65 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #348: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11640 | handling event EVENT_RETRANSMIT for parent state #404 | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #404 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #404 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49680.379067; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004703 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #404 | libevent_malloc: new ptr-libevent@0x7fb34401d920 size 128 "road-eastnet-nonat-152" #404: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #404) | 4a 5a cc 55 a0 5d f2 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 5c 51 83 ab 6b 01 fa 80 7d 29 db 27 cd 7b c6 | 7f 04 2f 6a 27 69 df b1 41 5e bf ae 45 95 c1 0c | 60 62 91 a3 34 a3 09 ec 77 e7 89 a6 51 09 95 12 | 3b ff b9 99 25 19 b1 ca db 05 e4 39 d2 de d6 52 | 26 ca b9 02 d7 13 18 29 d4 9e 9a 68 e5 5b 44 39 | 54 a0 05 f4 ba 65 c0 95 36 73 37 bc a2 90 45 30 | d7 96 35 a2 19 0f c4 75 70 1c 7f 35 ab a5 29 b5 | 6b 5d 34 07 1e e2 3e 41 ca 0a 85 69 25 b8 27 58 | d4 99 f8 5e 96 15 ec 82 ac 10 04 76 9b 35 64 a2 | 61 5a aa b1 99 cc 29 04 86 b5 f4 cc 47 04 55 8f | c7 28 c5 78 33 30 c8 76 93 6d f5 e2 6a c6 30 01 | 28 59 c4 cc 64 9b 7d 8e 92 4e ac 31 52 df 0e bd | 0a 9d da 2a 1d 60 fa 21 2a 50 98 51 8a 76 ec c4 | d0 d7 c3 bf 4d 91 f8 7a 88 5f bc 07 e6 69 d7 f2 | ab ab b7 dd 41 cf 13 b8 5a 48 6f f6 ea 70 5c d9 | fb 24 71 46 69 e2 7c a6 fa 4a f9 ae 35 11 e2 42 | 29 00 00 24 fe 30 87 af f4 c1 ee 21 b0 88 ac a0 | 02 58 85 f4 de 21 52 28 4c d8 94 b1 9c 53 a3 c4 | 4e 96 a9 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 64 19 b7 d1 4f 25 21 1b 78 33 8e | a2 b3 19 f4 56 5e 34 fd 00 00 00 1c 00 00 40 05 | ec 45 06 4d 08 52 67 71 ea 88 ce 05 15 99 3d c7 | 85 58 3c 64 | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11640 | #404 spent 0.185 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 5a cc 55 a0 5d f2 1b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #404 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #404 | rejected packet: | 4a 5a cc 55 a0 5d f2 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #404: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab7a80 | handling event EVENT_RETRANSMIT for parent state #204 | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #204 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #204 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49680.379355; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.01442 exceeds limit? YES "road-eastnet-nonat-204" #204: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-204" #204: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #456 at 0x557d46ae9480 | State DB: adding IKEv2 state #456 in UNDEFINED | pstats #456 ikev2.ike started | Message ID: init #456: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #456: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #456; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-204" #456: initiating v2 parent SA to replace #204 | using existing local IKE proposals for connection road-eastnet-nonat-204 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 456 for state #456 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b11640 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #456 | libevent_malloc: new ptr-libevent@0x7fb35002a950 size 128 | #456 spent 0.0952 milliseconds in ikev2_parent_outI1() | crypto helper 7 resuming | crypto helper 7 starting work-order 456 for state #456 | RESET processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 456 | start processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #204 ikev2.ike failed too-many-retransmits | pstats #204 ikev2.ike deleted too-many-retransmits | #204 spent 2.46 milliseconds in total | [RE]START processing: state #204 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-204" #204: deleting state (STATE_PARENT_I1) aged 64.016s and NOT sending notification | parent state #204: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #204 "road-eastnet-nonat-204" #204: deleting IKE SA for connection 'road-eastnet-nonat-204' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-204' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-204 | State DB: deleting IKEv2 state #204 in PARENT_I1 | parent state #204: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #204 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 456 time elapsed 0.000683 seconds | libevent_free: release ptr-libevent@0x7fb34c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab7a80 | in statetime_stop() and could not find #204 | (#456) spent 0.687 milliseconds in crypto helper computing work-order 456: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 456 for state #456 to event queue | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #456 | libevent_malloc: new ptr-libevent@0x7fb348034680 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 7 waiting (nothing to do) Initiating connection road-eastnet-nonat-204 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-204" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-204' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-204" | stop processing: connection "road-eastnet-nonat-204" (in initiate_a_connection() at initiate.c:349) | spent 0.0672 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #456 | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 456 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #456 | **emit ISAKMP Message: | initiator cookie: | 9d 73 90 c6 28 50 00 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-204 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a4 3f ed 93 2c 95 9a 36 92 4d 4f a2 60 c1 a4 c9 | ikev2 g^x 4f 89 23 1f d1 62 f5 78 d3 b5 53 89 10 3d be a6 | ikev2 g^x 0b 7e 28 8a f8 9f 39 90 86 39 f9 58 de b8 41 b5 | ikev2 g^x 4e b5 7b 74 44 63 cc 49 07 82 fe 85 49 2e bc 7a | ikev2 g^x f9 73 7c 32 a7 c0 6d 69 27 6b 58 3d ad d1 e3 ec | ikev2 g^x cc a2 3b ff 29 b9 68 35 71 ee f8 63 67 14 1d 54 | ikev2 g^x bd cd c0 94 2f 62 7a 35 f4 12 35 06 31 ee 52 8b | ikev2 g^x 29 f1 3d 4d 88 53 c4 ee a1 13 19 c9 95 9c 3a b3 | ikev2 g^x 01 50 95 2e cb 29 cc 04 53 67 66 58 33 78 91 44 | ikev2 g^x bb 06 02 b6 52 69 e1 7c 4a 36 de 14 7e d4 42 89 | ikev2 g^x da ed 12 fd e2 7c 6b 02 ab fa 82 91 36 f1 eb 4f | ikev2 g^x a3 22 e5 0e 96 4e 45 d1 d5 c3 b4 13 59 96 05 fe | ikev2 g^x 42 25 83 c3 8d 08 66 f5 9f c5 f5 d6 78 e8 30 c4 | ikev2 g^x 64 8d 48 0b ea 1f e9 05 9f 8a 0b 97 9c 51 d8 74 | ikev2 g^x a8 a9 43 c8 84 d8 11 55 a3 8c 0b ac d0 92 1d f4 | ikev2 g^x 61 b1 7f 3d f8 aa 52 a8 9b c7 bf 12 0c da 76 e4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6d 34 cd c2 13 6b 2e 99 a8 cb ee 2a a0 eb 8c a9 | IKEv2 nonce 1d 65 aa 5b 5f 82 85 1d 0e 9e 60 f1 7a ed 45 40 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9d 73 90 c6 28 50 00 4f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 cc | natd_hash: port= 01 f4 | natd_hash: hash= ef 03 64 ba 5e b8 36 8b cc 07 48 65 d5 6f 6e 8b | natd_hash: hash= 3d 6d 57 bb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ef 03 64 ba 5e b8 36 8b cc 07 48 65 d5 6f 6e 8b | Notify data 3d 6d 57 bb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9d 73 90 c6 28 50 00 4f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 07 ad 51 48 59 7f 26 2d fc 42 e0 9c c0 43 00 49 | natd_hash: hash= 58 00 de b8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 07 ad 51 48 59 7f 26 2d fc 42 e0 9c c0 43 00 49 | Notify data 58 00 de b8 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #456 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #456: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #456 to 4294967295 after switching state | Message ID: IKE #456 skipping update_recv as MD is fake | Message ID: sent #456 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-204" #456: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.204:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #456) | 9d 73 90 c6 28 50 00 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 3f ed 93 2c 95 9a 36 92 4d 4f a2 60 c1 a4 c9 | 4f 89 23 1f d1 62 f5 78 d3 b5 53 89 10 3d be a6 | 0b 7e 28 8a f8 9f 39 90 86 39 f9 58 de b8 41 b5 | 4e b5 7b 74 44 63 cc 49 07 82 fe 85 49 2e bc 7a | f9 73 7c 32 a7 c0 6d 69 27 6b 58 3d ad d1 e3 ec | cc a2 3b ff 29 b9 68 35 71 ee f8 63 67 14 1d 54 | bd cd c0 94 2f 62 7a 35 f4 12 35 06 31 ee 52 8b | 29 f1 3d 4d 88 53 c4 ee a1 13 19 c9 95 9c 3a b3 | 01 50 95 2e cb 29 cc 04 53 67 66 58 33 78 91 44 | bb 06 02 b6 52 69 e1 7c 4a 36 de 14 7e d4 42 89 | da ed 12 fd e2 7c 6b 02 ab fa 82 91 36 f1 eb 4f | a3 22 e5 0e 96 4e 45 d1 d5 c3 b4 13 59 96 05 fe | 42 25 83 c3 8d 08 66 f5 9f c5 f5 d6 78 e8 30 c4 | 64 8d 48 0b ea 1f e9 05 9f 8a 0b 97 9c 51 d8 74 | a8 a9 43 c8 84 d8 11 55 a3 8c 0b ac d0 92 1d f4 | 61 b1 7f 3d f8 aa 52 a8 9b c7 bf 12 0c da 76 e4 | 29 00 00 24 6d 34 cd c2 13 6b 2e 99 a8 cb ee 2a | a0 eb 8c a9 1d 65 aa 5b 5f 82 85 1d 0e 9e 60 f1 | 7a ed 45 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ef 03 64 ba 5e b8 36 8b cc 07 48 65 | d5 6f 6e 8b 3d 6d 57 bb 00 00 00 1c 00 00 40 05 | 07 ad 51 48 59 7f 26 2d fc 42 e0 9c c0 43 00 49 | 58 00 de b8 | state #456 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35002a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b11640 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab7a80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #456 | libevent_malloc: new ptr-libevent@0x7fb34c0180b0 size 128 | #456 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49680.380761 | resume sending helper answer for #456 suppresed complete_v2_state_transition() and stole MD | #456 spent 0.471 milliseconds in resume sending helper answer | stop processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb348034680 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d 73 90 c6 28 50 00 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #456 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #456 | rejected packet: | 9d 73 90 c6 28 50 00 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cc fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #456: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a50110 | handling event EVENT_RETRANSMIT for parent state #433 | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #433 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #433 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49680.39295; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002637 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348048a60 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #433 | libevent_malloc: new ptr-libevent@0x7fb36403ae90 size 128 "road-eastnet-nonat-181" #433: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #433) | 23 e1 68 16 6a df f6 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 84 65 c0 62 66 6e cb 40 26 80 c7 11 7a b1 77 | 8f 7b 14 21 bf 47 61 54 80 80 4f 40 4b 14 8f 6c | 7f 20 33 7a 32 bd 20 39 a9 e7 e4 8c 88 5e 71 0c | b4 34 07 ea 3b 74 7a 69 d0 40 c2 8a ce 14 e0 29 | f7 f8 fb 45 30 ce 02 50 b6 4b d6 fe ce bd d7 fd | d9 af 2b 59 d1 37 75 ed 60 7b 97 1e bb b5 21 2d | 82 af 47 6c fd b3 b6 b4 1a e4 0b 54 80 93 91 9a | 7c 67 57 2c 37 bc 4a ba 6c 68 8e 7c 69 ae 25 35 | f6 73 82 3e e0 ba 6e 40 b9 c2 c0 d3 bd 9e 54 14 | 66 2e 22 5d 66 78 db 66 26 82 fa c1 4b 7c 9e 34 | 57 34 cb 3c 56 da ee df b8 34 f8 14 c2 9b 3b a3 | d6 4c a8 fb 55 30 94 15 c4 87 b2 b9 65 70 e9 f6 | 5f 9b ae 28 67 59 78 af d0 1e d8 d4 2a 4a 91 32 | 25 06 fb ff be c0 6a 2f e3 60 0d e2 75 08 92 ca | 55 96 9f 26 37 e4 6c 28 e7 f1 08 78 9b ac 4e 5b | 3b 11 9e bf 95 59 23 96 7a 89 87 42 71 70 51 75 | 29 00 00 24 bc 75 9d d0 ff b6 ae 90 e3 29 fd fb | 27 30 03 9d 8d 6e b5 df cd e3 e0 48 35 b6 7e d4 | 5d 99 20 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 1d b4 53 81 6d 12 3c 62 05 25 08 | f2 c7 73 02 9c 59 76 4d 00 00 00 1c 00 00 40 05 | 9b bb 33 9d d0 7d d5 98 fe 91 d5 bc 36 50 81 f5 | 28 37 64 3d | libevent_free: release ptr-libevent@0x7fb37404b5c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a50110 | #433 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 e1 68 16 6a df f6 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #433 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #433 | rejected packet: | 23 e1 68 16 6a df f6 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #433: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37000d120 | handling event EVENT_RETRANSMIT for parent state #445 | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #445 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #445 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49680.402266; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00181 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a50110 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #445 | libevent_malloc: new ptr-libevent@0x7fb37404b5c0 size 128 "road-eastnet-nonat-193" #445: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #445) | b4 2e 78 cc c5 f6 9b 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a ba 44 5e e8 04 0b 1d 80 c6 75 3f 8a bb 68 32 | 06 11 b8 93 58 a0 e3 d0 41 9a dc df 91 ac 0b 46 | b8 6d fc ac c1 e9 09 52 48 47 7e 50 d3 96 46 49 | 4c db ea ed bd 20 06 58 05 cd d9 91 57 1d 80 4d | 27 35 e2 86 24 5f 4e 32 bf 57 32 fe 52 fe 8f 11 | 64 dd f6 c1 cf a0 23 81 27 d1 05 22 c7 e8 81 e4 | 67 a9 8c 32 ef 56 b6 40 b1 5f 41 a6 60 fd 00 92 | 0a e3 78 9b f2 03 2c 98 1e 8c fc 31 fc 9b e2 d2 | 0c f9 17 3c fe e3 b4 da 8e 06 ef 92 fc 84 24 e8 | 41 6f 79 14 e9 fb a1 a0 07 48 de 12 d6 84 2d 7e | 90 30 a3 38 3d 28 16 c5 17 69 90 4c 1a 42 aa f9 | c8 01 fd 3b 2e 46 f9 3b 3c c2 87 e4 f3 79 4f c7 | 11 59 a6 e8 26 10 94 45 c9 46 e9 8c ab e9 1d 28 | 48 da 5b 23 c8 48 65 23 9b 45 8d ab 8d 58 2e 78 | 34 e4 38 1d 80 97 ed 49 5c 38 3d af 3b ec ad d6 | 83 24 62 c1 f1 7d c9 59 93 3c f3 1e db d1 30 e4 | 29 00 00 24 43 99 24 d2 66 51 b3 d4 1c 15 bd 40 | 1f a6 87 a7 4d 01 75 d0 ba dd bc 61 a0 08 b2 b5 | 88 d8 85 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 20 6b 9d 83 bc 81 44 79 c4 11 cc | c3 90 0e 2f 55 7c a4 51 00 00 00 1c 00 00 40 05 | c1 5a b3 1c bf d8 ae 9a 12 a9 ee 41 24 11 a3 d4 | f8 37 2e 14 | libevent_free: release ptr-libevent@0x7fb370029490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37000d120 | #445 spent 0.0972 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 2e 78 cc c5 f6 9b 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #445 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #445 | rejected packet: | b4 2e 78 cc c5 f6 9b 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #445: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24700 | handling event EVENT_RETRANSMIT for parent state #405 | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #405 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #405 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49680.433543; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003627 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37000d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #405 | libevent_malloc: new ptr-libevent@0x7fb370029490 size 128 "road-eastnet-nonat-153" #405: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #405) | be e8 17 81 54 19 aa 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 35 ee 04 e9 c6 8a 5e c2 8c d0 2d 28 00 02 85 | 8c 37 b4 2a 7d 22 9b 7b d7 a1 23 7d 82 8f c4 6b | 57 c4 dd c3 ee aa c0 59 55 41 ec 07 5b d2 96 3f | 84 76 05 f0 b5 2a e8 98 98 d7 99 f0 e6 85 ba e9 | 7a 9d b6 d3 d8 1c ba 13 51 c2 52 69 b1 b0 51 2d | 27 ff ad 85 cb c3 37 19 4d 04 8f 00 5d 8e da a2 | 83 bf af 69 a5 88 8d 6e 4b fc d9 97 99 c9 fb 45 | db d1 9d 19 a0 0a d0 5c 01 fa a2 fa ec 3d 5c 71 | 97 18 03 d4 ac c9 d5 4f 44 b7 51 11 eb 34 8d f4 | ae 35 d6 d0 d3 d3 55 70 23 2c b8 b9 0d e9 30 e3 | 09 45 cd 57 53 d7 0b 66 63 c7 ad 04 26 12 af a0 | 90 e5 43 30 55 a3 78 25 bd ac a0 c8 d8 1b 48 03 | 7d 5e a7 cb e9 7e 28 c2 c1 55 c3 c2 88 18 bb 71 | ea 43 2f 82 f5 b1 df d2 66 a9 f6 d5 fa 01 de ee | e8 cd 12 32 f5 db da 44 b1 63 d9 46 0a 50 55 e5 | e4 13 08 92 13 df ad 90 0b 31 de af 43 48 dc 7b | 29 00 00 24 ad 05 d9 2e f2 d6 c0 cb b5 b3 6e e0 | 64 6e 66 e1 31 b9 1b 6d 0b a1 0e d8 22 30 ee ae | e8 8f 1f eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 93 4e 39 e4 10 9f 0f a5 0f ed 76 | 86 5f 9d 57 55 de 19 a7 00 00 00 1c 00 00 40 05 | eb f0 2f 13 5d 22 43 08 07 64 33 45 d0 5d dc 6e | 5b 6e e5 c1 | libevent_free: release ptr-libevent@0x7fb3500180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24700 | #405 spent 0.0944 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be e8 17 81 54 19 aa 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #405 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #405 | rejected packet: | be e8 17 81 54 19 aa 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #405: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab90c0 | handling event EVENT_RETRANSMIT for parent state #451 | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #451 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #451 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49680.452822; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500594 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #451 | libevent_malloc: new ptr-libevent@0x7fb3500180b0 size 128 "road-eastnet-nonat-199" #451: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #451) | ba 7b a0 b0 99 57 b7 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 86 c1 bd 46 53 16 86 81 3c 90 d2 1b d5 72 d6 | 90 46 2b fe 71 0a b5 92 27 f1 2a 98 1f 0b 9c 86 | b4 73 fd 62 b2 c4 76 72 65 dc a3 4a 74 c5 fd c6 | 79 b7 24 8c 57 9e 68 29 d1 51 ef 41 d9 35 5f e0 | 38 61 4f 5c 38 99 a1 c4 18 39 cd 7c d3 ce 2b 13 | fc 9c 47 13 18 41 cd b0 e2 7f c5 8a 64 72 a5 44 | 53 3a 53 2d 27 d7 7b 2d 79 06 40 fe 3d 6f 0c 91 | d2 44 b7 35 de 08 ea 0c 51 75 4f ac 93 26 ff 1a | 9b 0e 24 d8 14 0e 9a fc f6 cc 0e 9a dd d9 b9 d2 | 1b 38 2f 39 cf f5 c7 33 b5 34 1b 0e a3 9e 16 b5 | a1 af 82 8d 2c a9 ce 6b 79 b5 5c 3b f7 3b ae 09 | 38 95 45 10 35 73 6b 75 72 ac 01 d0 d8 9c 2a 56 | 79 52 8f 61 80 9d ac 4d cd 53 ef 84 96 01 18 60 | 62 4a 3f 8c ae bb 58 49 e4 bd 6c ac 5f b8 ee 89 | d9 a3 21 bd 37 79 80 9b e7 e0 92 c7 ad 63 83 e1 | b3 a4 a9 38 2d 78 59 50 55 18 b3 a6 f4 4b 9a 44 | 29 00 00 24 c0 83 9a b8 91 8b 33 7b 3e ca 3c 3c | 55 1b 13 ae f8 60 71 22 6b 87 6a 60 f0 da d9 ee | 56 ce cf eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 64 e2 2e 4b 98 7a a3 19 bf 09 d8 | 5a 5f 60 9f 04 ef ea a4 00 00 00 1c 00 00 40 05 | f6 42 3e 9c 74 68 a9 db 08 24 19 e3 18 ae 01 16 | fd d2 98 25 | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab90c0 | #451 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 7b a0 b0 99 57 b7 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #451 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #451 | rejected packet: | ba 7b a0 b0 99 57 b7 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #451: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358018460 | handling event EVENT_RETRANSMIT for parent state #349 | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #349 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #349 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49680.456135; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005886 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab90c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #349 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 "road-eastnet-nonat-97" #349: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #349) | 84 94 92 07 09 8b 01 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e7 8e 3a 36 94 c3 d9 80 af 87 82 89 a3 71 41 9f | e6 44 09 3c bc 67 77 29 06 f4 ae 77 a3 9d 60 1d | 0a c3 1b 6a f7 b0 e9 13 94 a5 ce ce a7 52 56 d7 | 84 e9 4e d5 99 7f 7c fb f5 b7 93 ee 65 0d 15 55 | 04 2d a2 78 15 79 38 de 23 c4 7d 82 d0 7f 5f 98 | a6 33 cb b9 33 39 5b 48 a5 eb 5c 5c 81 d0 ca 8c | f1 d5 2b 41 d5 80 88 70 6d 08 d5 9e c9 be 4a d6 | 16 61 b8 6d a8 4e 60 a2 94 6c 33 db 5b 42 45 bb | 02 30 28 9a 37 b4 00 e3 81 c4 fd 79 89 1a f9 a5 | 2d 14 0f 8f c7 04 8a 63 e3 4c c8 23 59 80 dd 4f | 13 40 1c 8c 06 1f 4a 77 c9 3e 21 20 cb 58 47 cb | c0 5d 53 b2 99 fb 04 a7 a3 35 71 6b 00 88 75 8a | 99 0c dd 71 02 4e 48 62 56 32 bf a2 8c b2 87 7c | 45 a3 56 eb 30 b8 7e 62 54 0f 19 2a 8e 1f 1c bd | cc fa 91 16 33 60 18 c9 3d f1 ea d9 79 83 28 b3 | ee b8 50 9e a8 3a a5 db fe df 37 7d ce de f7 60 | 29 00 00 24 8e 8f cc b6 0d fd cb ad 0f 95 32 a9 | a9 4b b8 56 89 46 30 eb 8f f5 1c d9 09 ec 14 75 | 5c 37 d2 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea f1 98 2b 6b f5 c7 7c ec d8 88 00 | 36 4b b7 7c e3 5b 66 cb 00 00 00 1c 00 00 40 05 | 49 36 ed 90 92 0a 38 5a 43 cd 17 7a 90 9b e6 10 | 1f ed 97 63 | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358018460 | #349 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 94 92 07 09 8b 01 c4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #349 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #349 | rejected packet: | 84 94 92 07 09 8b 01 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #349: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0398 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388043350 | handling event EVENT_RETRANSMIT for parent state #434 | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #434 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #434 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49680.463408; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002964 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #434 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 "road-eastnet-nonat-182" #434: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #434) | 68 bd 27 f7 1a 5f c8 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b 8d dc 86 f4 61 cd 63 4f 12 1a 89 63 c0 18 0e | da c1 2f 67 00 48 49 fe 80 58 30 87 77 1f 60 f1 | 91 93 c4 dd 6a 33 66 a0 69 fa 20 95 f6 9a 11 c7 | fd d3 c3 ff f1 0e a6 05 ba 58 f9 c6 b4 81 c1 3f | 58 b5 fa d8 f3 85 c4 ec 19 40 f6 9f ac 5a 0e 85 | ab f8 54 8d ff fd 0f ef d3 5b 98 8a 75 38 18 ce | f2 7b e8 23 92 dc 6c 70 3f 25 92 19 2b 60 a6 82 | 30 c7 b8 84 44 df 82 d3 8a 4d fc 1d 9c e4 51 d6 | 72 15 3a 4a d5 64 0f 79 a2 e3 fa 27 32 de fa 9b | 0a b6 71 85 29 d5 43 a6 b2 3c 95 42 d3 be 1c 80 | e1 df 27 cf e0 47 6a aa 9d f0 da 55 04 28 85 87 | 1e 7a 6c 89 a7 1a 78 3d cf 4e 43 87 8f 82 da c7 | 06 01 34 b1 a1 6a 5d 22 18 fe 03 9e 0d 36 91 39 | 6c bb 36 1a 00 1b a4 da c4 26 ba 72 4d 2a 35 43 | a5 6f 44 e2 75 40 5e f0 90 a9 5a 70 fc 57 4c e2 | 21 84 c8 a9 9b df a7 2e 69 2b 50 04 e1 24 b1 85 | 29 00 00 24 24 e6 ca a8 b3 30 fc 67 22 ff 0b c1 | 23 a4 8f 2a ae b5 6d 78 43 33 67 66 1b 96 07 82 | 43 a1 52 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e1 30 9f db e9 ff d2 de 10 c0 b8 22 | 86 59 ab dc 44 02 05 1c 00 00 00 1c 00 00 40 05 | 2d 24 f4 0c 2e f5 a0 c9 e2 14 db 8f 00 ef 15 a2 | 0d 97 11 53 | libevent_free: release ptr-libevent@0x7fb388020cc0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388043350 | #434 spent 0.0857 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 bd 27 f7 1a 5f c8 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #434 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #434 | rejected packet: | 68 bd 27 f7 1a 5f c8 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #434: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0399 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c00d120 | handling event EVENT_RETRANSMIT for parent state #446 | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #446 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #446 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49680.466627; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001295 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388043350 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #446 | libevent_malloc: new ptr-libevent@0x7fb388020cc0 size 128 "road-eastnet-nonat-194" #446: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #446) | 88 1d ae ca 37 da 9c 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a c2 f6 76 62 03 08 9a a8 98 a1 67 18 76 36 6f | f2 14 09 7e 5a 52 4f 9f 19 c8 ba 89 bc 37 1d 8e | 11 c7 c7 24 c8 21 0f 20 96 1c 89 74 ee 2d eb 0f | d9 40 32 aa 68 91 41 4a dd 21 15 90 12 e4 8b c9 | 4d 5c 9c dd a5 b1 90 8f 14 47 58 25 b1 c4 3a 4d | f0 56 c6 bf 57 58 f2 ac e6 d1 1a 63 f9 d8 c3 1a | a4 3b 86 89 ab bf 3e 5a 25 6f 85 ba 03 4e 84 c0 | a7 2c b9 17 b5 20 be c6 c5 13 97 18 56 e3 27 c2 | f9 d2 f9 ff 5e 3c 1b 93 48 e2 17 63 4c c3 83 be | b7 98 15 95 f6 a1 48 ea 20 9c e6 f3 53 b1 cd 88 | 53 a7 49 3f 59 99 9e 83 6d e2 88 bb a9 e3 fc 02 | 29 31 b8 83 4f 47 15 6b 71 12 58 3e 96 a5 76 cc | 0b 52 1f 8d 6c b2 63 0d 85 4d 51 f2 5f f7 f4 97 | 20 32 4c 0f 1c ff 39 c3 f0 0e d9 00 b3 27 e0 af | 29 89 02 52 1a 56 5c 18 4f a4 87 c7 25 17 55 3d | f8 28 8f d9 14 95 ef 08 7c ea 8b df 87 e5 f7 5e | 29 00 00 24 5e f7 7f 32 12 e9 cf 93 a5 5f 05 08 | 2b 32 36 a4 d8 35 51 26 4c a4 53 84 4a 3d 2b 33 | 5f dc 90 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bd 76 de 3d 7d 38 3c 23 fa c5 a8 aa | 98 15 c0 6a 4a ab a4 fc 00 00 00 1c 00 00 40 05 | 7b cf 42 04 70 bc 06 e9 71 4c e8 ba 2d 5f 18 79 | 9f 19 93 8c | libevent_free: release ptr-libevent@0x7fb36401f4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c00d120 | #446 spent 0.0908 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 88 1d ae ca 37 da 9c 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #446 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #446 | rejected packet: | 88 1d ae ca 37 da 9c 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #446: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0401 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000cc10 | handling event EVENT_RETRANSMIT for parent state #406 | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #406 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #406 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49680.507913; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004182 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #406 | libevent_malloc: new ptr-libevent@0x7fb36401f4e0 size 128 "road-eastnet-nonat-154" #406: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #406) | 5c 1b 3d 38 ad ed bb 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 1a b6 af ea 21 97 b3 f5 89 b5 95 b7 8e 01 21 | 34 29 bd cd 92 66 af f7 07 14 1e f2 4b ac 69 77 | b3 25 64 1a 72 01 08 14 88 fb 34 a6 91 bd 4c e8 | 74 ed 64 90 06 cb ad 54 67 18 ec c2 f6 32 90 94 | 8a 60 b7 b6 26 ea 31 da ec 24 92 6a 22 25 e6 ae | 79 52 07 43 fe e8 78 1d 19 58 3a 0f 01 09 9b 79 | a8 83 55 03 d0 25 e3 a6 6b 4d b2 09 24 dc 38 c7 | c0 36 e4 53 c2 05 eb 85 aa 76 78 46 e9 fc ba 6a | 9d 2a 99 85 b8 e3 fb 99 44 cb 75 c0 ab ae 6e 11 | 07 c0 ca 22 19 62 ce d5 17 5c e1 b9 18 74 78 be | 34 a1 1c d9 92 69 84 5a 1b b1 7e 28 a9 f2 00 ef | e6 0f 63 2f 7a b6 8d 10 3d 27 b5 f9 29 ad b2 b0 | 65 7c 94 5e 21 5a 98 07 17 36 5b b2 b7 51 51 8d | 3d 77 c7 dd 9a b0 95 69 8a b2 64 fa 98 d0 67 3a | d0 c0 eb c5 e3 82 7f 6a 7e d1 db 5f 16 5a 12 aa | ee c9 5e 0d 7b ae 47 81 60 df bf f4 74 63 48 5d | 29 00 00 24 00 c8 88 3e 7a 51 ef 1c 0c 98 f2 86 | d5 82 58 ca a8 80 65 3f cb c6 86 a8 5f 67 eb c4 | af 88 eb 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c fb 6e 46 7d 68 85 83 cc d1 35 3b | 25 21 b7 36 bf 74 0f f9 00 00 00 1c 00 00 40 05 | ea 1c 8a 1b 9f c4 37 0b d8 b4 d1 29 da 67 72 c1 | 45 ae 67 d8 | libevent_free: release ptr-libevent@0x7fb34003b010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000cc10 | #406 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 1b 3d 38 ad ed bb 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #406 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #406 | rejected packet: | 5c 1b 3d 38 ad ed bb 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #406: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37802a9a0 | handling event EVENT_RETRANSMIT for parent state #435 | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #435 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #435 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49680.53329; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004611 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #435 | libevent_malloc: new ptr-libevent@0x7fb34003b010 size 128 "road-eastnet-nonat-183" #435: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #435) | 02 95 c8 9c 02 70 ef 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 be 1c 3f a4 66 94 b1 76 a3 9b 53 73 2f 7f 23 | 4a e8 16 a3 16 f5 f7 58 2e fa f9 cc e5 72 42 dd | 79 82 dc a3 32 45 63 e7 97 5f 0c 3f 10 0e f2 af | 36 1e 6e 10 67 9c 3e 6a f7 f3 72 ba 54 df 6c 10 | a0 1c 0f 6a ce 67 71 2a a3 c4 d3 9c 88 b9 f7 04 | 30 84 58 1f bb cd f1 cd f3 e2 04 50 7f cf d2 c2 | 26 c1 1c 97 d9 a2 05 dc 96 89 90 50 ae 56 a0 13 | ef 2a 24 f0 f6 4d a9 8e e9 e9 a2 eb 42 50 42 ab | 0a 3d 04 3e 57 0c 0a e1 00 9d 75 a3 60 15 b7 e8 | 84 24 4c a7 d1 ab 72 3e f4 8b ef 1a c8 cc 7d af | ee 55 f6 12 cd b9 d1 90 77 f0 61 3d 61 12 ee f8 | 94 b3 64 a2 07 62 d6 b1 81 57 84 c9 8b ff 25 ea | 74 4a 3e 9b d6 88 62 0a dc b0 05 5d 90 03 c9 cd | 54 3d 83 cb 36 ad ef 96 f9 28 73 d8 df b8 72 79 | d4 6d 08 a8 b3 a6 c9 bf ea 29 05 5f 61 ed 03 82 | b8 9d e9 c7 c9 a7 67 16 08 0f e7 ba 6a 6d 38 69 | 29 00 00 24 ae 8f 34 92 0a 08 8b 7b 30 37 54 ea | a0 43 df e6 ae f8 bc fe 70 d8 fd fe ce a5 f7 5d | fb 76 aa 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 34 e7 f7 2a 07 1c be c1 53 fb c8 | 09 7a b0 5a 0f 53 bf 3c 00 00 00 1c 00 00 40 05 | 75 09 e1 26 ec 40 37 83 67 2f 03 41 48 5a 4e 60 | ef 86 00 50 | libevent_free: release ptr-libevent@0x7fb37801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | #435 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 95 c8 9c 02 70 ef 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #435 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #435 | rejected packet: | 02 95 c8 9c 02 70 ef 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #435: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_RETRANSMIT for parent state #350 | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #350 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #350 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49680.538584; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004597 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #350 | libevent_malloc: new ptr-libevent@0x7fb37801a4e0 size 128 "road-eastnet-nonat-98" #350: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #350) | 40 3f 8a 6a 3f ea 6b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee ea 5c 1b 2d cc 1b 57 9c 51 33 ce c2 ed 39 3b | d5 b7 1c c2 6d 3d 6f 5f ba 5c 85 39 fb a1 11 1d | ec 11 21 bd c2 b6 25 81 4a 85 2d 0f 85 73 9e fb | a1 4c 57 38 85 7e 31 44 0a 93 0c da 6d f0 93 22 | ea f6 8a 91 67 64 50 56 68 c0 c2 6d f2 4b e0 19 | 4b 14 40 46 ec 4d e3 7d d1 0f 0b 72 f6 ab 45 80 | 03 a2 d3 a8 ff e3 ae 4e 7b 0a 5c 1e da 4a b5 ed | 95 94 b9 4b 3c c2 85 4e cd 4a 91 b6 1f 72 c1 aa | c6 85 8f ca 28 3b ab 17 e7 f1 83 c4 ae 08 27 14 | 18 32 e7 a1 65 f1 da e5 f8 9c a1 45 4b c6 41 38 | 3d f5 8c c5 56 e5 06 ff b3 a3 fd f2 89 c2 8c 0e | 41 65 f9 6f e4 16 5e 64 06 38 6c 0e 32 c8 d5 26 | 50 db 25 f3 e4 e0 37 8b 04 62 7e a1 89 aa 8e 24 | 47 48 9e 92 05 5e 29 4c b7 2e ed e9 6d 8a 54 a2 | 85 8b e4 f5 76 e6 c8 0e c4 53 cb 98 41 4b 77 41 | 74 9f 3a d4 11 79 37 50 cf fb e2 04 ed 15 0c fe | 29 00 00 24 03 ee f5 21 ef 32 aa b5 bd 88 40 59 | 47 cc 90 0f 4b 5f 82 19 9f 96 a8 bf f3 8c 9d 85 | 66 d4 51 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 b2 cf 38 e9 ab 0b d5 10 0e c3 6c | 99 ae 6e 40 7a a8 97 3d 00 00 00 1c 00 00 40 05 | f6 5d 8e f9 dd 59 4b 5a 6d 88 5a 23 64 29 55 dd | f6 46 db 31 | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | #350 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 40 3f 8a 6a 3f ea 6b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #350 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #350 | rejected packet: | 40 3f 8a 6a 3f ea 6b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #350: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25c40 | handling event EVENT_RETRANSMIT for parent state #452 | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #452 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #452 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49680.542899; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500774 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #452 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-200" #452: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #452) | 50 11 a1 bf ed cc 03 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 8a 76 57 c4 9b d0 38 b9 d2 c2 4b 69 ba e2 a2 | 5a 11 4c 0a 45 a5 bd e6 9d dd c0 17 e1 2d b4 38 | 58 7e 63 fb 2b 24 a5 63 e6 a8 3b c4 4f a3 78 62 | 66 71 ba 53 c3 c9 09 13 5d ce 86 73 ab 12 87 fa | 35 c6 ff 8b 42 89 25 72 85 e2 b1 87 71 47 d8 8c | ac 7e ee 22 cc e1 04 85 55 54 54 b2 e0 ad d5 39 | 0a fc 74 d3 64 5e 05 35 2e 1a b0 95 d1 38 f8 9d | e0 83 e6 f4 e2 39 cf ac 1a e7 54 52 1b c6 27 82 | 61 87 37 7f 47 a3 e4 be 08 d5 c5 1a f3 6f 8c 8b | 63 33 54 b5 d2 c3 52 ce c9 11 04 d4 3e 44 cf a0 | cb 89 ea 96 9d 4b f1 9d 8d dc 98 07 bd 7b 2f d6 | 8f 69 b2 51 af f2 60 a1 de 25 ef d3 5a 7c e5 c5 | 23 56 16 2b d4 22 e3 1f 96 12 60 85 a4 b1 18 7f | b7 c2 db 59 66 51 fe 4e 85 1b ae a3 40 84 80 d2 | d2 e6 e1 c5 9e 39 9a 1f 42 76 d0 90 ba 8e cc dd | 5a 7b 9a 97 d8 6d 8b db 68 e9 10 8f 2c 64 9d b8 | 29 00 00 24 ba 51 08 92 39 ed 80 e6 57 c3 97 3c | b4 4a b0 29 f6 7a 02 bc 32 31 68 fb 36 27 e7 7b | 80 17 94 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 cf 89 69 b2 6f 00 24 ae 75 3b 9a | 3a b6 ca 28 54 7e 11 99 00 00 00 1c 00 00 40 05 | 3b ea 73 3d bf 95 ec 19 18 d5 48 b2 c7 6d ef 5f | 10 2b 0f c2 | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c40 | #452 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 11 a1 bf ed cc 03 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #452 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #452 | rejected packet: | 50 11 a1 bf ed cc 03 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #452: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0685 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000d120 | handling event EVENT_RETRANSMIT for parent state #254 | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #254 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #254 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49680.544206; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006991 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c40 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #254 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 "road-eastnet-nonat-2" #254: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #254) | b9 c6 03 da 3d 1b ba 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca 92 e7 94 15 6c 86 1d 96 e8 8f 04 2b 4c 31 1c | f2 c3 f1 85 7b fe b5 54 f7 1b c1 2a 4c 6d 01 5c | 34 19 7c 9d d1 b6 95 21 d0 08 d9 67 bb dc e0 e1 | 38 6b 59 b4 76 fc 39 ee a0 2d f2 f5 62 c4 0a 49 | 6b 3c f0 00 22 80 8c 1c 36 99 55 b9 ef cb 76 99 | 5c 12 4c 07 84 ad f5 48 ab 42 10 f5 2e d6 e5 5c | 9d d4 b0 9f 16 b4 b4 bb b3 53 f3 e9 cc 93 ad 3b | a8 c4 f0 7f 9d 9d e3 f4 df 44 9c 28 b2 72 cb b6 | 4b 6a f0 9c 2e 22 ce 4f d0 b2 c9 a3 7c 48 1e 03 | a8 3d 92 67 11 0c a8 c0 fd 76 08 be 4f 01 6d 12 | 3e 0b 87 da bc 3d 45 99 0f 30 cb 9d 8c 96 4d 32 | 07 37 42 c8 ca 8d d9 f2 2b 81 33 b1 a2 49 5c 82 | 69 0d 94 76 f5 ef d0 bf fa db a3 8e db 15 f4 34 | c3 81 4c 6a 47 45 9d c9 09 00 1e 8a 46 70 b4 51 | 30 c0 17 29 a6 05 17 9f 61 e3 d5 9e b5 26 aa b7 | f8 4d 8f 98 15 36 79 53 4c 2f e1 9e 49 63 a8 23 | 29 00 00 24 b7 98 fa 02 fe fe ce ce 94 a2 bc d0 | 60 0d 7b 30 0c f7 48 0b 72 92 ee ec 3d 65 36 1c | 6e c0 df 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3a c0 39 9e 3d 58 28 13 41 2f 06 c7 | b4 3e d7 c2 8d 41 7c 7d 00 00 00 1c 00 00 40 05 | 08 0f dc c4 71 f2 0f bc 45 99 87 81 91 93 b1 3d | 30 5f 17 8f | libevent_free: release ptr-libevent@0x7fb36001fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000d120 | #254 spent 0.0893 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 c6 03 da 3d 1b ba 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #254 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #254 | rejected packet: | b9 c6 03 da 3d 1b ba 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #254: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac1340 | handling event EVENT_RETRANSMIT for parent state #407 | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #407 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #407 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49680.560482; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005551 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #407 | libevent_malloc: new ptr-libevent@0x7fb36001fd50 size 128 "road-eastnet-nonat-155" #407: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #407) | 0e f3 59 3b 18 9b 4c 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 5f 7f 81 27 bd f8 4f 84 8b e5 e1 d9 93 de d8 | ec 64 3c 7a c3 34 95 f3 06 ea 96 b5 7a 1b 8f d9 | c8 72 7c 66 d5 b2 ca 73 d5 43 7d ea c5 0c 84 ce | ea c7 b2 0b b4 5d 2c b0 44 4e 93 91 63 38 66 d7 | 19 d5 08 6f 6d f9 84 4a 63 7a 55 68 05 24 95 3e | 99 aa 1e b1 c3 ab 11 18 fa 12 e7 7c 5e c4 8f e2 | 44 28 c7 70 13 76 b9 dd 3a a6 1c 9b 90 d4 8f 73 | 83 e9 82 03 c0 46 28 ea 33 e9 c1 33 69 9b 00 f8 | f6 cd 83 94 cf a0 a7 5e b8 a0 8a 65 44 ef ec 83 | 35 ff 33 b2 45 4f 06 95 40 67 f8 16 c1 7f cb 23 | 42 69 1a ee 3e 5b 22 ed 9d 49 26 08 ce 24 1f dc | 4a 71 86 ce 70 39 9b 18 48 00 7f 0b fd 35 9a e2 | 3f 9a 8e 15 96 bd 41 9e d7 e9 02 79 05 c7 13 f3 | c8 1e 09 29 1f ca 34 e6 f2 7a 3f 24 4a 98 16 47 | 9a 91 43 46 5c 83 b4 00 84 95 4d df 42 56 5f 61 | 36 41 b7 50 c0 98 6b 76 ff 78 86 a6 38 01 7c 10 | 29 00 00 24 21 43 66 be 17 99 40 cd 23 ec 46 61 | 66 3c a9 d5 4d dd 70 3a b4 cd a8 e6 b6 42 a4 c0 | 0c aa c9 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 43 3c a2 b5 33 c4 3b e7 27 68 b0 | 1d 1f b8 cf bc 05 b9 a9 00 00 00 1c 00 00 40 05 | 76 06 02 ba 2b 08 ee 9d 42 ab b0 60 2b 0a e2 b7 | a2 85 77 a0 | libevent_free: release ptr-libevent@0x7fb35c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac1340 | #407 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aaa100 | handling event EVENT_RETRANSMIT for parent state #205 | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #205 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #205 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49680.560617; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.026331 exceeds limit? YES "road-eastnet-nonat-205" #205: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-205" #205: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #457 at 0x557d46aeaa40 | State DB: adding IKEv2 state #457 in UNDEFINED | pstats #457 ikev2.ike started | Message ID: init #457: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #457: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #457; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-205" #457: initiating v2 parent SA to replace #205 | using existing local IKE proposals for connection road-eastnet-nonat-205 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 457 for state #457 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ac1340 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #457 | libevent_malloc: new ptr-libevent@0x7fb35c035930 size 128 | #457 spent 0.0654 milliseconds in ikev2_parent_outI1() | RESET processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #205 ikev2.ike failed too-many-retransmits | pstats #205 ikev2.ike deleted too-many-retransmits | #205 spent 2.63 milliseconds in total | [RE]START processing: state #205 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-205" #205: deleting state (STATE_PARENT_I1) aged 64.029s and NOT sending notification | parent state #205: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #205 "road-eastnet-nonat-205" #205: deleting IKE SA for connection 'road-eastnet-nonat-205' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-205' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-205 | State DB: deleting IKEv2 state #205 in PARENT_I1 | parent state #205: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 8 resuming | crypto helper 8 starting work-order 457 for state #457 | stop processing: state #205 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 457 | libevent_free: release ptr-libevent@0x7fb38403da90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aaa100 | in statetime_stop() and could not find #205 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e f3 59 3b 18 9b 4c 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #407 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #407 | rejected packet: | 0e f3 59 3b 18 9b 4c 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9b 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #407: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-205 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-205" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-205' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-205" | stop processing: connection "road-eastnet-nonat-205" (in initiate_a_connection() at initiate.c:349) | spent 0.055 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 457 time elapsed 0.000567 seconds | (#457) spent 0.57 milliseconds in crypto helper computing work-order 457: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 457 for state #457 to event queue | scheduling resume sending helper answer for #457 | libevent_malloc: new ptr-libevent@0x7fb34c03a770 size 128 | crypto helper 8 waiting (nothing to do) | processing resume sending helper answer for #457 | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 457 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #457 | **emit ISAKMP Message: | initiator cookie: | 3d e3 b8 80 8f bd c5 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-205 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9c 7a cc 82 1e 2d 53 a5 ce 9e 27 c2 26 66 c5 e9 | ikev2 g^x ca b7 3b d7 b3 d5 8f c0 1e ac 61 93 25 30 44 75 | ikev2 g^x 16 7f 86 32 17 98 9b b2 bd a4 40 62 a6 0f f6 2b | ikev2 g^x b1 e8 33 29 3f 84 59 09 aa bb 5e 2f cd e9 1a 72 | ikev2 g^x c5 38 7c e2 59 e4 bc cf cc fa da 23 96 75 c1 c7 | ikev2 g^x ad fb a2 86 e8 bf a6 3f 1e fe 2b 41 b8 4f 8a 8f | ikev2 g^x fc 26 0a 24 5a dd 02 29 13 7a b7 2d e7 62 32 f3 | ikev2 g^x 6a 17 ae ce 85 51 34 8a 1c 60 c5 a3 0d 63 33 17 | ikev2 g^x b8 03 02 91 41 6c de d7 2a b4 05 f1 63 80 c5 fa | ikev2 g^x a4 93 75 6c e4 d1 6b 22 4b c0 ed 28 67 a9 70 75 | ikev2 g^x f9 13 92 e4 11 7c 99 29 38 c0 6b 83 36 d2 38 17 | ikev2 g^x 99 86 23 65 2a c3 af 64 bb 12 ca 10 15 c7 5a 01 | ikev2 g^x e6 2f f0 2b 77 e0 ac b3 ec 7b 00 6e 19 4c 17 4e | ikev2 g^x c2 c8 73 f2 63 d0 16 98 d3 38 a7 f8 87 36 2b 60 | ikev2 g^x fd b1 1f f7 a9 42 1c 9e d6 33 ef 51 73 04 4f 2e | ikev2 g^x c1 59 d4 cb eb 88 5a 87 9b 61 94 46 2e b3 5e 3c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce bf 42 01 47 80 24 bc 54 c5 78 43 68 88 cb 29 3a | IKEv2 nonce 9a 04 f3 2d 0c c7 ac f0 bd ad b4 35 ec c6 0a 8d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3d e3 b8 80 8f bd c5 62 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 cd | natd_hash: port= 01 f4 | natd_hash: hash= b8 d2 27 5a 8f 21 c7 36 56 bd fb 12 29 e7 69 7f | natd_hash: hash= 19 4f 04 f7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b8 d2 27 5a 8f 21 c7 36 56 bd fb 12 29 e7 69 7f | Notify data 19 4f 04 f7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3d e3 b8 80 8f bd c5 62 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 06 c5 63 f1 7d e9 6e 2f 88 1f 75 73 67 c0 d5 c5 | natd_hash: hash= dc d6 be 87 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 06 c5 63 f1 7d e9 6e 2f 88 1f 75 73 67 c0 d5 c5 | Notify data dc d6 be 87 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #457 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #457: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #457 to 4294967295 after switching state | Message ID: IKE #457 skipping update_recv as MD is fake | Message ID: sent #457 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-205" #457: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.205:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #457) | 3d e3 b8 80 8f bd c5 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 7a cc 82 1e 2d 53 a5 ce 9e 27 c2 26 66 c5 e9 | ca b7 3b d7 b3 d5 8f c0 1e ac 61 93 25 30 44 75 | 16 7f 86 32 17 98 9b b2 bd a4 40 62 a6 0f f6 2b | b1 e8 33 29 3f 84 59 09 aa bb 5e 2f cd e9 1a 72 | c5 38 7c e2 59 e4 bc cf cc fa da 23 96 75 c1 c7 | ad fb a2 86 e8 bf a6 3f 1e fe 2b 41 b8 4f 8a 8f | fc 26 0a 24 5a dd 02 29 13 7a b7 2d e7 62 32 f3 | 6a 17 ae ce 85 51 34 8a 1c 60 c5 a3 0d 63 33 17 | b8 03 02 91 41 6c de d7 2a b4 05 f1 63 80 c5 fa | a4 93 75 6c e4 d1 6b 22 4b c0 ed 28 67 a9 70 75 | f9 13 92 e4 11 7c 99 29 38 c0 6b 83 36 d2 38 17 | 99 86 23 65 2a c3 af 64 bb 12 ca 10 15 c7 5a 01 | e6 2f f0 2b 77 e0 ac b3 ec 7b 00 6e 19 4c 17 4e | c2 c8 73 f2 63 d0 16 98 d3 38 a7 f8 87 36 2b 60 | fd b1 1f f7 a9 42 1c 9e d6 33 ef 51 73 04 4f 2e | c1 59 d4 cb eb 88 5a 87 9b 61 94 46 2e b3 5e 3c | 29 00 00 24 bf 42 01 47 80 24 bc 54 c5 78 43 68 | 88 cb 29 3a 9a 04 f3 2d 0c c7 ac f0 bd ad b4 35 | ec c6 0a 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 d2 27 5a 8f 21 c7 36 56 bd fb 12 | 29 e7 69 7f 19 4f 04 f7 00 00 00 1c 00 00 40 05 | 06 c5 63 f1 7d e9 6e 2f 88 1f 75 73 67 c0 d5 c5 | dc d6 be 87 | state #457 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ac1340 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aaa100 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #457 | libevent_malloc: new ptr-libevent@0x7fb35c035930 size 128 | #457 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49680.561689 | resume sending helper answer for #457 suppresed complete_v2_state_transition() and stole MD | #457 spent 0.31 milliseconds in resume sending helper answer | stop processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c03a770 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d e3 b8 80 8f bd c5 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #457 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #457 | rejected packet: | 3d e3 b8 80 8f bd c5 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cd fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #457: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #447 | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #447 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #447 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49680.574862; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000217 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fa300 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #447 | libevent_malloc: new ptr-libevent@0x7fb34c03a770 size 128 "road-eastnet-nonat-195" #447: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #447) | 38 12 e6 81 e7 94 57 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 06 2b 67 fa f3 85 ef c9 87 64 80 c6 08 7f 26 | 45 8a d6 b2 f0 0d 75 25 97 6d 45 07 fd cb e4 04 | bf 7e ab 4e 45 57 81 c7 b5 29 22 16 b5 58 17 73 | fb 06 1c 20 f6 01 42 43 d1 e6 cb 7e a1 aa b9 6e | 26 8c bc f7 62 2d 79 d5 2d 49 41 71 09 9e b4 75 | ea 9e f2 7f e9 07 f0 a5 64 1a db a1 ff 4f ee 2e | 4f 3b 9e aa ac 22 2d 9f 1b 37 bc cf 47 d1 ca f1 | 85 86 f8 a5 9e 4a f1 ed 2d 36 8a 97 fa 17 f5 2d | 74 78 21 72 1b 33 88 07 44 c7 17 ee 95 f3 cb cb | 74 32 bb 69 59 ac ab 47 c6 9c ea 80 62 ae 1f 88 | 81 9b 37 d9 2d eb b0 eb c8 de b9 11 87 9a a9 5b | 92 c9 38 b1 30 9b d0 b1 7f 2a dc 10 02 4c 1e 0e | 28 73 54 43 6f 78 74 45 0e 5e 40 cb d7 a1 f6 9b | 8d bf eb b3 ff de 36 ad 5d d5 a1 e7 e2 d9 b6 74 | 11 52 d9 17 88 a2 35 0f d7 23 95 ef eb 8f 58 a1 | ef f0 f0 24 22 5b dd f5 64 21 6b 5a 10 90 d6 b9 | 29 00 00 24 c8 ed 9d b9 b2 64 8b 9d 5d 85 10 8f | bc bb 1d 46 c9 3a dd 35 d0 ed 23 11 cf 06 d9 fd | be 51 4b 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 28 c6 de 25 95 4a 27 58 aa 1c c2 | 15 34 6b e8 d4 2b c8 d2 00 00 00 1c 00 00 40 05 | dc 67 81 1e 74 e8 91 b7 d4 fb 94 8c c2 c6 73 c6 | 89 a9 30 0d | libevent_free: release ptr-libevent@0x7fb34800f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #447 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 12 e6 81 e7 94 57 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #447 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #447 | rejected packet: | 38 12 e6 81 e7 94 57 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #447: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37402ffb0 | handling event EVENT_RETRANSMIT for parent state #436 | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #436 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #436 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49680.593136; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004332 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #436 | libevent_malloc: new ptr-libevent@0x7fb34800f1a0 size 128 "road-eastnet-nonat-184" #436: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #436) | cc d9 b7 db 44 05 84 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 3c 80 f9 ec ce 19 79 1b 2a 4e 88 36 86 a9 d8 | 85 e2 ee 1a ce 49 16 7b 84 5e 31 fc e1 84 f2 62 | 83 ed 4d eb 9f 6a c2 85 84 04 f4 d9 bd aa ee 02 | 08 1b 87 fa b5 ac ff f6 a9 3e 63 6d 16 01 77 f5 | 2b 3e 1b 6e c7 66 ff fb 38 8c 19 c9 7b b1 fe 10 | bc 5c c8 26 33 9f ff 45 76 a0 23 85 19 e3 31 de | 28 8c dd 45 56 45 3b fb b4 0d 18 e3 cd 81 8e 00 | 0b f6 17 10 a2 e0 44 20 37 74 e1 31 a8 10 b7 14 | cf 9a 72 a5 9f 1a 4b 15 1a b2 c9 bb 99 44 1e 31 | 11 05 e2 cf 98 40 c9 ef aa 8c fe 19 58 f6 d5 62 | cf d6 d5 ea 4e 24 4c 33 16 1d 0c db 05 43 98 5e | d3 1a 94 c0 4b ed 3c 02 54 4b fc ca 99 42 ac 4b | fc 8a 3c 6f 70 38 23 05 eb da 77 20 a0 4e 73 f3 | af d2 c3 64 0d 77 b8 54 17 69 4d 1e a8 53 83 4b | 8b 72 92 0a 4d 90 87 b2 56 ec 43 2c 41 d7 64 66 | 71 79 54 ef 65 56 ba 6d 1d e6 d1 dc ad 99 41 fe | 29 00 00 24 a3 ee 0b 44 35 bf 27 26 10 74 6f 1a | d2 86 21 80 e6 fa 2e 6d 1e 83 9b 58 c8 96 87 8e | e4 1b 77 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 51 98 88 78 46 d0 e6 54 3d 62 ae | 5f a3 54 6d d3 39 61 c5 00 00 00 1c 00 00 40 05 | f1 9f 10 2a 1c da 5a 4c b5 8c 1e 6e 78 d5 be 31 | 9e a0 0c c1 | libevent_free: release ptr-libevent@0x7fb374034460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | #436 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc d9 b7 db 44 05 84 19 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #436 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #436 | rejected packet: | cc d9 b7 db 44 05 84 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #436: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0555 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac3ec0 | handling event EVENT_RETRANSMIT for parent state #453 | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #453 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #453 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49680.60045; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500051 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #453 | libevent_malloc: new ptr-libevent@0x7fb374034460 size 128 "road-eastnet-nonat-201" #453: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #453) | ce fd 6b dc 43 f9 b6 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a fe 9f 71 b9 6e 69 49 23 6a d5 87 63 a6 2d 80 | fc 10 3a 5e 08 f9 cc a8 36 72 0a 5b 2e 86 63 13 | 40 48 02 71 3c 66 28 bf ad d7 fa c6 30 96 5e 17 | bf a0 d6 3f 57 20 44 4e e4 00 ed 65 d2 4f 08 d6 | 20 51 fe 4a 66 fa 02 8d 06 00 db e7 45 a0 fc fc | 8c 97 f6 4d f7 77 a5 6a 79 27 5b a0 e1 46 fb a6 | 23 99 9c 26 32 43 cf 04 80 58 6f 87 cb a5 6d d2 | 76 b6 f1 d1 81 44 27 9c 99 67 9d 01 ca 24 01 04 | 53 a4 a4 40 53 47 8f 99 18 29 ec f0 3e a1 86 13 | dc e4 8b ba 11 0f e1 c3 4b ee 52 62 b4 64 8e 2f | 66 5c ba 6c ee 04 04 ed f9 bf cd 94 0a 45 b8 40 | e4 22 f5 d1 d6 df 3a ed ce c6 15 28 b6 04 76 04 | bd c3 75 e8 63 e6 45 74 6f 79 fc 8f 52 0e 1e 14 | f2 bb ae c1 f9 bb 75 83 86 a8 ff 0c d1 f1 5d 0c | a0 ce 81 b4 8f 58 61 e5 9f 60 57 7c c4 7a 6c 26 | 0d 77 a8 c6 b2 9c 49 0c ea 36 61 b7 06 0a 10 da | 29 00 00 24 e4 ac ab 1b 0b c0 0c 13 54 30 d6 3f | 0a a4 17 49 c8 c8 1a 8d ae d5 3b 39 11 5a 2a f6 | e8 ed 91 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 76 3b e4 72 b5 b8 a8 50 2a b0 80 | 46 e6 9d 5f 02 57 8f 98 00 00 00 1c 00 00 40 05 | 9d b5 75 60 1a f1 a6 46 0c b9 85 72 c6 f1 03 f3 | 4e 7a aa 51 | libevent_free: release ptr-libevent@0x7fb384027b30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | #453 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce fd 6b dc 43 f9 b6 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #453 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #453 | rejected packet: | ce fd 6b dc 43 f9 b6 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #453: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0458 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34800cc10 | handling event EVENT_RETRANSMIT for parent state #408 | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #408 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #408 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49680.623745; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005084 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #408 | libevent_malloc: new ptr-libevent@0x7fb384027b30 size 128 "road-eastnet-nonat-156" #408: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #408) | 34 97 74 26 6a e5 a4 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 b4 84 d1 c7 68 61 a7 a8 43 5d 75 52 c1 45 ab | 1c 34 c9 1c fb 58 62 3f d2 e4 63 2f df 8e 65 23 | b3 d6 a9 03 c7 71 70 03 ff 1d bb ac 17 a8 6b 6d | e6 be 80 ad c9 77 c7 17 6a 89 49 48 8d b3 43 d4 | 49 ba db 2f fb d6 1b 93 5a 1f a3 ce 04 89 6c 2c | cc 68 c0 e5 12 10 fe eb 35 b6 6c ba a1 43 99 e7 | 4d 42 5d cb 3f a9 dd f3 e4 5f 32 df 76 2b 7a ba | 94 68 cc b7 71 6f 68 e6 66 e9 1a 0b ff e7 f5 9d | 06 aa 01 3c 32 ad d4 f8 5e 61 a5 fe 63 fb f1 96 | b8 0a 85 b5 ad 42 f9 e3 5a cf 27 5e ec 13 9b d0 | 73 b5 31 d4 d2 24 51 4d f5 0b 85 9e 11 85 42 e0 | 88 fc 0a 42 f4 e7 3d 49 ba 53 8a d7 ce 64 df d3 | 52 60 3d 1b 37 34 8f 8c 6a 9e 6e 25 b4 f3 7c 18 | 7a d1 56 c7 cf 72 57 08 b3 73 0c ad 15 18 33 ce | 9c f7 e6 b3 e4 26 15 89 8c 70 86 37 d6 87 03 97 | 84 4a 45 be 3f 69 21 05 76 54 73 82 39 32 70 e8 | 29 00 00 24 59 44 9e 7a bb 43 7f 93 5b bd e5 23 | c1 87 73 73 05 59 35 01 ab d3 f0 0b c4 05 69 18 | 98 63 3b b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 8e f2 86 2b ac 70 a5 cc 8b e7 7d | ac ad 47 30 21 b0 b0 7f 00 00 00 1c 00 00 40 05 | 79 17 f0 70 ea 4a c6 21 3a b7 c0 97 d4 68 33 32 | 9c c8 09 b0 | libevent_free: release ptr-libevent@0x7fb340012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800cc10 | #408 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 97 74 26 6a e5 a4 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #408 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #408 | rejected packet: | 34 97 74 26 6a e5 a4 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #408: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36801d710 | handling event EVENT_RETRANSMIT for parent state #351 | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #351 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #351 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49680.634047; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004566 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800cc10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #351 | libevent_malloc: new ptr-libevent@0x7fb340012840 size 128 "road-eastnet-nonat-99" #351: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #351) | de 65 5f af ec 9c 14 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 61 44 ff 3b 7e 79 78 30 98 a5 1d ec cd 39 0f | a6 1b 66 bf d1 4c f4 43 49 5b 37 74 a3 cb a8 c4 | 02 cd b2 04 1f 9b 50 46 08 d0 17 33 f5 19 85 e1 | a2 5a 8d ef 3b 1f 98 53 d1 3d 4a 2f ac 4f 19 d0 | 75 e8 7a 46 60 ff e1 45 61 55 45 47 1e ee 0e a7 | 97 fc 88 fd 13 ff 6e 23 a4 a1 77 61 b8 b4 8c fd | 22 67 ad f7 22 ca bf 94 41 28 f0 31 09 ce da 26 | 10 fa 8e 66 f4 04 b3 cf 07 07 c2 53 27 d6 cc 39 | 2e fc 33 61 76 a3 a9 c9 4a 2e 0c b9 d2 ce 1e 75 | 25 69 23 a7 b0 58 cb 85 2c 74 fd 6d 3e 51 8a ff | 12 ff 22 b0 95 e5 25 84 fd 26 ce 3e 10 f5 db d4 | fe ab 71 45 0f 50 b9 5c e4 ab 89 ce f3 bc f0 b4 | b1 6f 9b 78 15 e0 b4 c0 f6 ed 55 2b 17 d3 9e 21 | ed d2 5e 21 58 74 e4 d8 96 cd 20 e3 10 b4 fa 8b | 7f 1f 1a 01 c5 db 60 d3 81 25 a3 55 50 d2 42 6d | 88 7f 5d 84 22 e5 ff 47 18 aa ac 46 b6 f6 e6 e3 | 29 00 00 24 5e 0c 91 cb 9e cc c4 3b ec b3 88 06 | 52 11 4c 47 a6 59 04 4b 44 ce c4 33 03 72 36 ef | b1 45 a0 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 90 e3 e4 9d 06 64 22 91 ff 91 cd | 3f cb ba 24 72 7e a3 02 00 00 00 1c 00 00 40 05 | 98 60 2c ab 59 ec de c3 24 7f bd 6f 4e 02 75 9a | 41 d6 b1 3b | libevent_free: release ptr-libevent@0x7fb368046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36801d710 | #351 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 65 5f af ec 9c 14 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #351 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #351 | rejected packet: | de 65 5f af ec 9c 14 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #351: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_RETRANSMIT for parent state #448 | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #448 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #448 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49680.65336; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000616 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36801d710 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #448 | libevent_malloc: new ptr-libevent@0x7fb368046040 size 128 "road-eastnet-nonat-196" #448: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #448) | ea d6 68 25 ae ee 80 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 2e 7f 22 4b d6 ee 79 95 7d ea e6 94 56 fc 59 | 41 1c 12 66 f4 de 00 d4 6a e6 f4 4c 67 01 c3 97 | d7 f0 7f 15 19 52 1c e1 e7 cb 10 43 bf 32 f7 97 | 3f 7d 76 9e 8f 5c 2d a2 10 89 27 a3 31 39 40 6f | 23 b5 50 de a5 26 d5 37 1d bc c7 b0 be 51 02 45 | 35 60 2b d9 a4 52 16 a6 1b 75 6d 90 d7 94 82 b4 | dd 41 db 2a cd 7c b4 ec 00 64 fe 2d 52 b4 ab 6f | a1 8a dc c4 d8 32 f4 27 d3 99 3c 5b 3c 30 47 ed | 06 54 fe bf 5a 80 4f d3 cd d3 63 ab 7a 0a c4 81 | eb 86 4b 9a 37 9c a7 bc 09 9b f1 b6 f5 69 f2 05 | c2 89 b2 f3 ca 58 71 7c 0b b2 02 99 cf da 83 99 | b9 82 4c 58 38 5d 2d be 03 71 b3 5f 32 1a 82 30 | 6f ca 79 08 7e ac dc 25 d6 1a ad 46 a4 8d 7c 47 | 64 b8 24 1d 37 d9 41 0f 8b 4e 16 65 d2 41 4b ab | d2 0e 95 38 92 91 3a 77 ae cf 19 35 ef c9 91 13 | b4 90 b2 24 68 10 9d af 29 52 a9 15 24 f7 4d 93 | 29 00 00 24 f3 0f f3 36 25 a9 50 89 21 ce 62 13 | d8 e8 8d 8d c3 33 f9 d1 62 a2 a6 a0 e9 3e 64 7f | fb b2 90 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 d7 4f 67 97 77 e0 a3 2c fc 24 e7 | 7a a9 1a d4 d3 98 14 3c 00 00 00 1c 00 00 40 05 | 18 00 5b 20 2e 1c a9 8b 56 50 4b 4f f1 d3 fc 60 | 9d dd 28 85 | libevent_free: release ptr-libevent@0x7fb36004b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | #448 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea d6 68 25 ae ee 80 d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #448 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #448 | rejected packet: | ea d6 68 25 ae ee 80 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #448: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1c440 | handling event EVENT_RETRANSMIT for parent state #206 | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #206 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #206 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49680.657641; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010153 exceeds limit? YES "road-eastnet-nonat-206" #206: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-206" #206: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #458 at 0x557d46aec000 | State DB: adding IKEv2 state #458 in UNDEFINED | pstats #458 ikev2.ike started | Message ID: init #458: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #458: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #458; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-206" #458: initiating v2 parent SA to replace #206 | using existing local IKE proposals for connection road-eastnet-nonat-206 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 458 for state #458 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a23190 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #458 | libevent_malloc: new ptr-libevent@0x7fb36004b850 size 128 | #458 spent 0.0687 milliseconds in ikev2_parent_outI1() | RESET processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #206 ikev2.ike failed too-many-retransmits | pstats #206 ikev2.ike deleted too-many-retransmits | #206 spent 2.58 milliseconds in total | [RE]START processing: state #206 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-206" #206: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #206: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #206 "road-eastnet-nonat-206" #206: deleting IKE SA for connection 'road-eastnet-nonat-206' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-206' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-206 | State DB: deleting IKEv2 state #206 in PARENT_I1 | parent state #206: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 12 resuming | crypto helper 12 starting work-order 458 for state #458 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 458 | stop processing: state #206 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb36802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c440 | in statetime_stop() and could not find #206 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-206 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-206" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-206' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-206" | stop processing: connection "road-eastnet-nonat-206" (in initiate_a_connection() at initiate.c:349) | spent 0.0581 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 458 time elapsed 0.000565 seconds | (#458) spent 0.569 milliseconds in crypto helper computing work-order 458: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 458 for state #458 to event queue | scheduling resume sending helper answer for #458 | libevent_malloc: new ptr-libevent@0x7fb3400343b0 size 128 | crypto helper 12 waiting (nothing to do) | processing resume sending helper answer for #458 | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 458 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #458 | **emit ISAKMP Message: | initiator cookie: | d8 20 9c 76 6a 13 05 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-206 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 56 f8 70 4a 7e 5c d3 77 41 08 04 2a 79 b8 78 55 | ikev2 g^x 9f 63 d7 1f d9 bd 04 73 e8 de 1f e6 51 71 d1 c1 | ikev2 g^x 71 09 97 4a 5c 16 68 a0 aa 69 e9 b4 93 ac ba f6 | ikev2 g^x 92 85 87 a8 c8 1f 88 3f 36 bb 45 8a 62 53 f9 71 | ikev2 g^x 32 e3 0c 69 bc 64 74 29 df 76 29 f7 54 0a d6 9e | ikev2 g^x bf f9 de ca 92 41 8b 95 09 7a 0d 5d 50 17 4e 54 | ikev2 g^x 40 99 d8 f9 ca e7 ca c6 0c af 31 22 59 39 c6 0f | ikev2 g^x c7 31 f1 5e c9 b0 5a 0c c9 3f c9 f9 d7 bd 4f d2 | ikev2 g^x fd 98 c7 19 a0 f3 e9 01 16 f3 fe 75 35 59 15 08 | ikev2 g^x 13 ea cd 50 33 e8 15 ab 01 f5 9e c1 43 d2 27 90 | ikev2 g^x 39 d5 e2 89 77 57 ec 66 ab 2d 6c 09 fc 1d 8f 1a | ikev2 g^x 62 91 d6 59 58 86 af 9e fa f2 4d 80 b6 39 ef 93 | ikev2 g^x e4 aa 9e 6f 49 aa 2c d4 54 59 f2 01 66 25 3e 6c | ikev2 g^x 9e 0b 06 28 b9 af 2e bd e7 a4 57 6f f0 5b 4c cd | ikev2 g^x 6a 03 04 af 85 10 e3 f2 17 ad 37 f3 24 3e 66 fb | ikev2 g^x 27 c7 a1 c5 2e 32 66 c3 94 bc a6 2b 60 cb 4f f9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 33 eb be f2 9e 94 9d 08 4c d8 00 c2 f8 2c a4 ef | IKEv2 nonce 00 e3 f7 7a 62 72 9a 99 65 d6 f3 0e ff c8 b6 6c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d8 20 9c 76 6a 13 05 e5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ce | natd_hash: port= 01 f4 | natd_hash: hash= 41 01 77 97 bc 56 25 23 ed d6 15 51 7d a3 3f e8 | natd_hash: hash= c0 74 6b cf | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 41 01 77 97 bc 56 25 23 ed d6 15 51 7d a3 3f e8 | Notify data c0 74 6b cf | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d8 20 9c 76 6a 13 05 e5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 8f 1b 57 d9 1a 63 f1 b3 99 7b 22 3d 44 e6 21 51 | natd_hash: hash= 1c 41 cc 24 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8f 1b 57 d9 1a 63 f1 b3 99 7b 22 3d 44 e6 21 51 | Notify data 1c 41 cc 24 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #458 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #458: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #458 to 4294967295 after switching state | Message ID: IKE #458 skipping update_recv as MD is fake | Message ID: sent #458 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-206" #458: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.206:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #458) | d8 20 9c 76 6a 13 05 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 f8 70 4a 7e 5c d3 77 41 08 04 2a 79 b8 78 55 | 9f 63 d7 1f d9 bd 04 73 e8 de 1f e6 51 71 d1 c1 | 71 09 97 4a 5c 16 68 a0 aa 69 e9 b4 93 ac ba f6 | 92 85 87 a8 c8 1f 88 3f 36 bb 45 8a 62 53 f9 71 | 32 e3 0c 69 bc 64 74 29 df 76 29 f7 54 0a d6 9e | bf f9 de ca 92 41 8b 95 09 7a 0d 5d 50 17 4e 54 | 40 99 d8 f9 ca e7 ca c6 0c af 31 22 59 39 c6 0f | c7 31 f1 5e c9 b0 5a 0c c9 3f c9 f9 d7 bd 4f d2 | fd 98 c7 19 a0 f3 e9 01 16 f3 fe 75 35 59 15 08 | 13 ea cd 50 33 e8 15 ab 01 f5 9e c1 43 d2 27 90 | 39 d5 e2 89 77 57 ec 66 ab 2d 6c 09 fc 1d 8f 1a | 62 91 d6 59 58 86 af 9e fa f2 4d 80 b6 39 ef 93 | e4 aa 9e 6f 49 aa 2c d4 54 59 f2 01 66 25 3e 6c | 9e 0b 06 28 b9 af 2e bd e7 a4 57 6f f0 5b 4c cd | 6a 03 04 af 85 10 e3 f2 17 ad 37 f3 24 3e 66 fb | 27 c7 a1 c5 2e 32 66 c3 94 bc a6 2b 60 cb 4f f9 | 29 00 00 24 33 eb be f2 9e 94 9d 08 4c d8 00 c2 | f8 2c a4 ef 00 e3 f7 7a 62 72 9a 99 65 d6 f3 0e | ff c8 b6 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 01 77 97 bc 56 25 23 ed d6 15 51 | 7d a3 3f e8 c0 74 6b cf 00 00 00 1c 00 00 40 05 | 8f 1b 57 d9 1a 63 f1 b3 99 7b 22 3d 44 e6 21 51 | 1c 41 cc 24 | state #458 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36004b850 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a23190 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #458 | libevent_malloc: new ptr-libevent@0x7fb36802a950 size 128 | #458 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49680.65871 | resume sending helper answer for #458 suppresed complete_v2_state_transition() and stole MD | #458 spent 0.308 milliseconds in resume sending helper answer | stop processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3400343b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 20 9c 76 6a 13 05 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #458 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #458 | rejected packet: | d8 20 9c 76 6a 13 05 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ce fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #458: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368040840 | handling event EVENT_RETRANSMIT for parent state #437 | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #437 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #437 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49680.659884; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002158 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34001fa80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #437 | libevent_malloc: new ptr-libevent@0x7fb3400343b0 size 128 "road-eastnet-nonat-185" #437: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #437) | 31 51 d4 f7 c8 fe c5 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d 4d c3 c5 4f ca 6c d8 d4 84 06 d4 ea 89 80 6d | 99 d1 7f e1 cb 80 24 55 fd df 90 fb 02 92 ff c9 | f0 47 14 8d 77 1a bb 9c 7c dd 17 b9 16 19 6b 74 | ec 88 72 db 3e 1a c4 54 69 dd d8 16 b9 56 68 f6 | 6a 0a 44 9f 3f b5 a3 4b 08 8a 18 15 d1 69 95 71 | d9 52 3a e9 65 ee 70 4d ea 9c f5 16 84 a6 99 9c | ab ff 36 83 9d b6 9f c3 53 f1 00 51 ea c6 f5 a2 | 5c ce 33 c2 cf de 1d c7 31 1f d6 91 bf f2 7f 9f | fc 6e d8 c8 43 fd a2 ec ed d4 2e e3 1a 35 b1 d0 | de 28 47 6a 6b a3 42 0c 4a 1a 4e 13 17 87 94 71 | f7 93 75 92 ea b9 03 fc c2 41 93 f1 c9 f7 b4 4d | 3c f1 35 28 f5 5e 37 14 cf 3e ce 38 da e2 53 26 | df e6 e9 23 b5 8c b6 45 18 8f e2 54 89 f9 96 79 | aa 6a 79 aa cf b4 ec 3d e4 21 6c a5 14 2c 68 b2 | 1b 56 0e 23 e2 48 c6 68 81 fb b5 23 23 53 e6 4a | 1c 61 e2 7a 67 e5 f5 84 ba 68 ce a3 e9 a9 c8 e3 | 29 00 00 24 02 5e bf 69 6a 09 af cb c5 28 ba 2f | be c6 fe 19 42 f8 ee f5 0b 73 06 5b 41 10 d0 e5 | 69 e3 64 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 6b 27 8e 3d c1 6d e7 fb 64 0d 99 | 79 35 e1 df 31 89 9b 32 00 00 00 1c 00 00 40 05 | dc 48 f6 93 16 4d 8a fc 81 8e 30 65 58 3a 8c 28 | 32 6e e0 6b | libevent_free: release ptr-libevent@0x7fb3680345d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368040840 | #437 spent 0.0837 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 31 51 d4 f7 c8 fe c5 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #437 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #437 | rejected packet: | 31 51 d4 f7 c8 fe c5 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #437: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0398 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd40 | handling event EVENT_RETRANSMIT for parent state #255 | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #255 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #255 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49680.691108; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006513 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368040840 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #255 | libevent_malloc: new ptr-libevent@0x7fb3680345d0 size 128 "road-eastnet-nonat-3" #255: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #255) | b4 62 7d 49 a4 92 20 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 95 bd 0c ae 75 b5 e3 ef c4 cd 00 43 ea 3e 9a | 02 ba 07 e1 c1 bd 5d f0 a8 a6 51 3a 4a 21 e5 46 | 19 59 a0 93 a8 07 b1 7f 53 68 e9 d8 63 85 c8 12 | 71 98 74 63 ac c1 5d a5 39 9f c3 9e 95 82 52 3e | e1 41 18 21 d4 2e 9c 8d e0 71 8e d0 6d 4b 68 7e | 1c df fa cf ed ca 99 59 64 68 ed b3 9c 61 13 df | 2f ad b1 5a 3f dc 76 f5 58 69 91 b1 8b 83 c7 6f | 0b 08 55 fc ba 8b aa 73 16 1a 51 59 6d 0d 21 1f | bf 66 60 21 f1 49 bc 92 8c 9a be 6c 52 be 72 e6 | 19 b6 47 f8 33 cc b5 e6 ed 41 53 62 da 9d 6d 34 | fc ee 0f bf 23 f3 09 d7 96 22 fd c9 6e c0 31 60 | 95 22 90 57 96 ed 6a f6 05 50 b8 1b 34 71 5d dd | a7 c1 ab 82 e5 96 d7 d0 ac 36 1c 30 9d ee a7 97 | 6f 15 b5 89 4e c4 f6 f6 b5 08 23 bf cb 9e 75 f3 | f9 e0 ea 95 d8 eb 73 6d e3 2b 25 8d e5 17 c9 6e | f4 0f 23 e9 e4 7e dc 78 3c ae 82 7e 2a c2 1f 84 | 29 00 00 24 27 f0 79 05 ca 38 9d 60 17 70 37 05 | 8f c8 d2 c0 f8 4f 0f 05 b1 d0 9d 9d 43 88 90 d5 | 2d 20 4e 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 2d ab c5 84 ac e3 ea 3f b2 97 06 | b2 08 24 4c 91 11 e0 2a 00 00 00 1c 00 00 40 05 | ca ca c2 3f 11 62 54 7a 69 58 46 70 0a 1d a0 10 | 47 7f 3a 1d | libevent_free: release ptr-libevent@0x7fb364014bc0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd40 | #255 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 62 7d 49 a4 92 20 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #255 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #255 | rejected packet: | b4 62 7d 49 a4 92 20 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #255: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350018460 | handling event EVENT_RETRANSMIT for parent state #409 | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #409 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #409 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49680.694438; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003523 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd40 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #409 | libevent_malloc: new ptr-libevent@0x7fb364014bc0 size 128 "road-eastnet-nonat-157" #409: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #409) | 0d 5e 25 c2 55 3c 99 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e 9e 5e 2e 09 bf 8f 71 99 55 8d fe 7f 83 64 1f | 09 d9 64 f5 c9 93 8a 5c be 46 9e 22 f6 15 48 5f | a3 27 82 be 44 32 8b ed 4e a8 f7 10 74 01 31 7a | a5 a7 4a e9 16 68 9c 40 cb 7b 6b e4 87 2e b5 7d | 61 20 08 88 29 08 bb bf f5 22 fa fd 47 2b fd 61 | a5 c3 48 69 18 1a 27 78 c3 f3 e3 0b 62 b4 52 0b | 48 72 ce 1d 37 3b 34 c5 fc ba cb 1f 9d e8 de ad | 9b ab 2c 3a d9 69 c6 42 6d b1 05 5a c4 77 34 d1 | ff 6d 2c 38 8e 1f 9c 0a 39 45 f9 c1 2e 9a c1 dd | d2 58 ca fc 7a d1 3f 4c 26 24 eb 54 5d 92 fb 39 | 47 60 ec 18 66 63 9c 19 12 10 f2 b6 7c 18 85 c7 | 6c d1 5b c2 e0 13 21 58 85 48 a4 fc 6e b1 46 84 | 53 a9 5a 65 21 91 66 41 1c 5e ad 4e a2 85 5a 4b | dd 4b fe 45 dc c9 fe ab c9 08 d4 96 88 93 93 aa | 1e 95 b1 87 3d 21 a8 b6 2f fd 18 ff 13 73 04 e2 | 11 aa e4 99 8f 8e f6 da 34 f7 b8 a6 55 2e b3 22 | 29 00 00 24 56 91 a2 13 7d 33 fd 14 52 dc d7 9d | 97 62 ec aa 5a ba e0 81 38 20 1d 66 12 9f da fa | a6 b6 f9 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d7 a6 1d 1c 1e 3f 9a df 29 5a 62 1d | 4b b6 a0 46 97 db 0a 03 00 00 00 1c 00 00 40 05 | b4 37 78 a6 35 8d da 4f 96 64 40 e6 05 68 b6 9e | 6d 2b 7a a6 | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350018460 | #409 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 5e 25 c2 55 3c 99 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #409 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #409 | rejected packet: | 0d 5e 25 c2 55 3c 99 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #409: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a276e0 | handling event EVENT_RETRANSMIT for parent state #454 | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #454 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #454 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49680.695758; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500653 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #454 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-202" #454: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #454) | 3e f1 41 2a cb 15 91 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 3c 6a c7 38 95 77 87 5d 1e c8 dc ba 22 fc 03 | 1c 9c 6c 7f 8e 0e fd af 13 dd 37 0a 23 40 7c ce | 87 9a c3 3c b2 29 81 32 66 6c ba 2d 43 73 e4 9f | 34 a2 6c c8 c3 e8 8f d1 b2 45 4b 81 58 b8 9d f6 | d7 6b 98 99 af 72 e9 d0 c7 87 b4 74 61 b8 6f 67 | 18 e9 20 82 3b 32 85 5d b7 fc 19 46 92 6b 65 26 | b2 31 d6 c3 36 5c 46 dd c1 b3 1a ba 4d 4c b4 fb | c9 29 e2 5f 88 92 21 72 05 11 74 76 83 6a f0 05 | 70 a8 4f 78 f0 27 41 4f 18 70 43 44 55 76 41 4e | d4 55 4f 0d be 47 fb 72 63 29 ab 49 16 15 52 01 | 76 0d 0d 3c d4 72 41 c1 63 95 85 97 21 62 a1 0c | 98 62 73 cf ff 81 3f b1 d6 5b a3 17 9c bf 13 ea | 76 47 19 6b ec 4e dd d2 c8 fc 10 8a 93 9d e2 40 | 1a 9a ec ba a4 26 5c 4d 01 9a 6a 47 3b fc ea 48 | 29 30 cf ee 79 66 a8 78 a7 b1 8e ad 2b ce 52 2c | 72 05 7f 8f f6 f4 ff ed 12 0a b1 b7 de 27 bb d0 | 29 00 00 24 42 50 bc e2 16 2b 34 89 d5 4e 59 5a | a4 d3 d2 a4 86 df 60 97 ee fa 90 f6 ad 34 8e f4 | 49 50 59 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 1c 0d 08 a9 24 58 8d 73 8e f2 10 | b3 0d e0 67 52 ae c5 46 00 00 00 1c 00 00 40 05 | 72 a5 1c 62 b2 bc b3 f0 fe 77 e1 0e f2 db 46 ae | 09 80 33 7f | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a276e0 | #454 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3e f1 41 2a cb 15 91 c1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #454 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #454 | rejected packet: | 3e f1 41 2a cb 15 91 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #454: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c00cfd0 | handling event EVENT_RETRANSMIT for parent state #352 | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #352 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #352 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49680.720052; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006234 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a276e0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #352 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 "road-eastnet-nonat-100" #352: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #352) | 3c 05 1d c4 fe 50 38 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 64 8b 09 fa 7a d8 0e 19 4a a4 83 62 a1 a5 5a | 68 fc 46 c2 41 24 c2 81 0b b7 86 21 9c 81 02 7e | 4c e7 e3 a1 0b b2 cb 85 40 50 15 e6 9b 8e ec db | 69 e6 fa 1a ac be 36 c2 a1 ef 3e db b6 5e 52 af | 7e 52 8f f4 e4 02 53 3c 7f 96 73 09 3f 4e 1d 14 | 6d c2 31 fa 5c 39 98 fc 2c b5 f5 9e 00 af 34 e4 | 5f b6 a3 65 94 fe 46 6a 1b e5 e1 4a 56 bd a5 cf | 0a 77 7e 2c 49 79 6d b8 e1 4a 50 3f 05 7c c4 09 | eb 02 3b 50 92 11 5f 9f 53 e6 1e bd 8d 02 31 1b | ce 66 73 68 3b 0d 47 9f bd 24 08 62 f6 ab c3 d7 | a4 43 e9 f4 a6 cc 3c 8d f5 af 10 2b 54 da 75 ae | 02 35 c6 d0 b8 2f b0 bf cd b2 cd e7 d2 23 bb 30 | 31 a6 56 6a 41 57 91 fb 46 1d ee de f8 63 bc 4e | 2b 81 4f df b1 c0 cc c0 21 f9 64 98 54 3d 15 93 | 9d f2 7c 39 a9 8b 0c c2 f7 bb 99 15 ac 9c c2 51 | 1b f2 0a ec 9e 8c 56 18 67 8a fb 62 ed 27 4d ad | 29 00 00 24 a2 bb a3 dc 18 69 ac 45 10 e2 b1 d4 | a3 1c d3 0a 99 a1 33 f7 93 76 f6 b4 72 bd d3 aa | d5 07 c1 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 31 52 a7 9d 89 a3 6a 1c 72 78 4c | e5 d1 1b 1c 74 f4 f6 22 00 00 00 1c 00 00 40 05 | fc b9 a7 1f 0a 98 43 79 23 71 2c ac b0 a5 bd 76 | ba 72 e4 ab | libevent_free: release ptr-libevent@0x7fb36c0296b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00cfd0 | #352 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c 05 1d c4 fe 50 38 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #352 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #352 | rejected packet: | 3c 05 1d c4 fe 50 38 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #352: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acec40 | handling event EVENT_RETRANSMIT for parent state #438 | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #438 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #438 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49680.743437; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003044 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00cfd0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #438 | libevent_malloc: new ptr-libevent@0x7fb36c0296b0 size 128 "road-eastnet-nonat-186" #438: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #438) | 41 3e 80 fb 50 ac d5 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 f5 0a 72 18 b4 76 75 f6 01 ed 57 e5 f7 fc 77 | 49 c0 b9 2a a0 da 30 6d 64 aa a5 e7 d9 21 f7 0d | 91 be 59 58 e0 73 bb 49 e3 e7 3d e2 78 8a 04 ac | e2 97 a4 99 a2 30 e0 4b a8 00 c0 ee 42 04 60 c2 | 77 26 36 9f ca 4c 02 7c fe 9f ae b6 ae 04 ad 9a | 8f d0 27 5f 92 70 2c be 09 55 2c 26 bd b6 4c 20 | bf 73 30 d0 44 67 97 1f 1b 2e b0 03 d6 27 ac d2 | 9a 9e e4 f7 c7 3b 09 97 22 3c 54 79 43 94 36 23 | 17 e9 e5 03 2b e9 58 e3 73 9f 26 68 9a d9 44 87 | db f9 8f 3e f3 46 76 36 18 c6 80 3a ce aa cb fb | 5f dd ff d6 eb 23 75 c4 e2 35 1f 1d 81 9e 2a 45 | d7 f8 e7 91 af a5 b6 a5 46 57 1a 8c 96 c0 29 4e | 8e dc e8 e6 2d 92 82 6a 85 02 3a ad 02 27 a8 84 | 8c be 58 97 e6 a0 56 65 e3 b8 11 05 1f 19 4d bc | 68 44 f8 dd 63 ea 12 b6 6d 02 31 e2 3c 83 0c 90 | bb ff 2c 31 86 51 81 cf b9 63 dd 72 3b ea de db | 29 00 00 24 65 91 ed 0a d4 1d 29 43 43 2f 3a 60 | 71 14 cd 7a ee 7f 0c dc 85 e8 36 48 85 1d 6f 9b | 44 a1 8a 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 a7 76 d6 c0 45 d0 97 b1 a7 8c de | d2 b0 18 be bd b1 c7 45 00 00 00 1c 00 00 40 05 | 93 a1 f0 74 30 f5 50 67 ed 62 ea 87 43 47 97 7c | d7 55 2f e9 | libevent_free: release ptr-libevent@0x7fb37c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acec40 | #438 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 3e 80 fb 50 ac d5 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #438 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #438 | rejected packet: | 41 3e 80 fb 50 ac d5 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #438: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0563 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a73690 | handling event EVENT_RETRANSMIT for parent state #449 | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #449 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #449 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49680.749738; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001411 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acec40 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #449 | libevent_malloc: new ptr-libevent@0x7fb37c02a950 size 128 "road-eastnet-nonat-197" #449: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #449) | ea 52 41 06 29 be 32 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c f6 72 22 70 e3 8e 6a 67 c3 d0 4a 0b 7f 5b cf | 2d 68 56 81 95 56 3f 4d 2a 1e 61 1a 59 76 f5 26 | 54 d5 6a 01 f4 8a a1 63 50 3e a3 b6 d1 85 12 bf | 8c a7 c8 b2 9c d2 7e 12 ce 8a 8f 97 a7 10 c6 36 | 55 54 39 bd 73 f0 07 97 c0 8f d8 2f a2 5e 50 05 | cb 9d 1a b8 ce 20 6a 30 ff 7d 3d 2a 89 9c e8 f9 | db 68 6b e7 d3 12 f3 5c 42 81 cc 9e c7 d6 ab 3b | 07 00 72 f9 2b bb 2c 8f 88 74 45 a7 1f 5a 2d 17 | 94 3e ec e0 ce a9 ab 72 79 45 76 ba 8c 1f 40 56 | 6d 7a 46 42 83 af a1 98 c5 23 1e 58 16 d7 79 25 | b7 cc 17 53 0a 7f 1c 45 dc 0f 11 52 e6 bb 5f 53 | 8d b5 f6 fb 27 2b 60 33 a4 cd 4d e9 7c 6b 4b 17 | 81 ec cb ca e4 d2 97 9b 61 33 64 a7 c9 1d 12 b0 | ff a4 81 cf f4 75 a2 54 63 07 9b 1c 61 4f 70 9a | f2 61 b3 19 96 98 3c 7b 44 1f aa 65 b4 bf d7 a8 | 55 c2 75 de ff 71 8c 90 1b 3c c3 a8 3f fe 54 f3 | 29 00 00 24 43 77 8d 20 c7 95 c9 d5 6a 2d 87 1f | da 3a b4 7e 55 a2 17 ed 53 70 56 79 ef 21 f9 7e | 28 b4 26 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 9b 7e ce 31 a7 8d 1a 50 79 db 89 | b3 07 e5 e2 b0 c0 20 fc 00 00 00 1c 00 00 40 05 | eb cc 39 a0 b6 a4 78 79 56 5f 29 29 93 1e cc 18 | 29 12 ff 3b | libevent_free: release ptr-libevent@0x7fb34403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a73690 | #449 spent 0.0905 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 52 41 06 29 be 32 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #449 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #449 | rejected packet: | ea 52 41 06 29 be 32 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #449: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340025210 | handling event EVENT_RETRANSMIT for parent state #410 | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #410 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #410 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49680.750994; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004172 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a73690 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #410 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 "road-eastnet-nonat-158" #410: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #410) | 59 b5 db 36 67 47 70 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 b7 0b 8c f9 95 bc f7 80 78 70 36 f3 fd f2 85 | 36 5b 98 b3 da 7d 8e 19 72 07 91 60 60 8a e6 82 | 67 b3 ba e3 47 c2 28 3a c4 af df a8 61 5d 73 9e | d2 63 4a 41 c1 df 23 58 85 d0 d0 d7 31 64 13 d3 | fc c4 39 95 ba ac 0f ae 94 0f 0a ba f0 76 e9 ae | a0 35 47 51 b9 fa 43 1f 5e 7f a1 99 3d cc 76 ac | 19 ca 51 32 ad cd e2 9d 6b 98 62 47 ad 2c d1 40 | 11 bd ff e1 9d 02 a1 c8 40 a8 ed 91 e5 60 1c 79 | ee 69 bc ed 65 82 b2 85 d5 b1 74 ab f9 fa 7a e9 | f0 dc 57 ef e3 3e 09 b2 80 4a e9 c3 55 5a 97 3e | 39 d4 2d 85 ca cc 9a e5 d4 76 c5 5e 9e c1 e9 7d | 39 17 67 a4 c4 56 99 a0 e7 0c b7 13 22 44 76 46 | 08 b0 60 5a a2 8d 7d 3c 2d 85 7a 7a dd 83 3a 2b | 27 be 2b 38 04 53 2f 3d 0c cd c0 ad bc 4e 6a 91 | 94 3d 91 ac 7d a2 5b fd 39 2e 69 e6 48 9c ae be | 71 e2 83 13 24 ec 5c 04 d1 c5 4a 80 96 3c 2f 11 | 29 00 00 24 e1 88 5c 17 02 b4 80 04 34 b3 a7 d4 | f8 d1 c3 d6 e1 59 82 cb 1f c0 98 16 57 75 53 e7 | ef 70 14 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 ce e5 8e 76 7c ee 72 e4 c9 6c 0a | 7e 11 3d 4e e7 09 5c 04 00 00 00 1c 00 00 40 05 | 2c 17 58 9d 14 87 37 db ad 40 b0 f7 64 73 53 a7 | 0b 3f 01 e6 | libevent_free: release ptr-libevent@0x7fb35804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340025210 | #410 spent 0.0892 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 59 b5 db 36 67 47 70 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #410 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #410 | rejected packet: | 59 b5 db 36 67 47 70 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #410: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0402 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1ae80 | handling event EVENT_RETRANSMIT for parent state #455 | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #455 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #455 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49680.774271; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500262 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340025210 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #455 | libevent_malloc: new ptr-libevent@0x7fb35804b850 size 128 "road-eastnet-nonat-203" #455: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #455) | a6 08 27 1f 75 50 39 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 c7 bc 11 60 3e a6 9a 85 6d e5 42 37 d7 18 00 | 0c ea 15 92 bc 93 3a fa 4f c0 cd 9b 9d 21 1a ec | 13 f0 fc 0b a2 84 9a a5 b1 57 c2 a8 ab 33 a5 7b | 04 ac cd 61 b9 a7 e2 6f b1 9a 56 b1 3c b1 a4 2e | 8d 80 e0 ac 78 ee b2 78 51 00 d0 a0 eb cf 06 35 | 9c 7e 2a 73 b1 56 cd fe b7 d8 9d ab 84 62 9b e7 | ab 4d 04 16 06 c3 1a 9c 88 af e1 4b bd a0 09 ac | fd 8a ba 51 00 10 a1 a7 a6 a2 56 74 b5 9b 53 af | 87 60 09 5b 74 75 e3 41 f8 3d 7a cf 0c 36 f7 ea | aa 1b 05 8b 54 d5 b2 e1 fe 9e d4 4e f4 ae 74 22 | 98 23 25 ba ff 74 27 da 25 81 74 09 8c 6b 8b 69 | 54 dc 62 05 8c 02 be b4 b0 c4 25 43 18 99 9f c3 | 41 7e c1 29 f3 a3 60 75 de aa 26 bd a3 38 8c ad | a8 31 89 d2 48 90 d9 19 ce f4 34 9e 9d e7 1c e9 | d3 7f ee 85 33 84 75 6d 04 5b b4 a0 96 a6 93 65 | 8d 1c 3a f8 14 81 03 4c 63 f4 25 e5 59 99 ac 86 | 29 00 00 24 6a 39 a6 75 f8 f4 82 47 b3 0b 2e 10 | f3 31 67 d9 88 26 9d 5b f1 75 40 6b 34 32 86 bb | 7a 07 84 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 cd df 41 37 6e 2d fc 1b 29 38 8e | de fc 0c a0 44 c7 44 d5 00 00 00 1c 00 00 40 05 | 6e c0 59 83 50 2c 8a cc c5 6e 0a 98 ab 1c 00 ee | ff c6 95 31 | libevent_free: release ptr-libevent@0x7fb348046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1ae80 | #455 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 08 27 1f 75 50 39 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #455 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #455 | rejected packet: | a6 08 27 1f 75 50 39 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #455: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a30d30 | handling event EVENT_RETRANSMIT for parent state #207 | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #207 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #207 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49680.782574; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.022048 exceeds limit? YES "road-eastnet-nonat-207" #207: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-207" #207: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #459 at 0x557d46aed5c0 | State DB: adding IKEv2 state #459 in UNDEFINED | pstats #459 ikev2.ike started | Message ID: init #459: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #459: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #459; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-207" #459: initiating v2 parent SA to replace #207 | using existing local IKE proposals for connection road-eastnet-nonat-207 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 459 for state #459 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b1ae80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #459 | libevent_malloc: new ptr-libevent@0x7fb348046040 size 128 | #459 spent 0.0825 milliseconds in ikev2_parent_outI1() | RESET processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 resuming | start processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #207 ikev2.ike failed too-many-retransmits | pstats #207 ikev2.ike deleted too-many-retransmits | crypto helper 5 starting work-order 459 for state #459 | #207 spent 2.68 milliseconds in total | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 459 | [RE]START processing: state #207 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-207" #207: deleting state (STATE_PARENT_I1) aged 64.024s and NOT sending notification | parent state #207: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #207 "road-eastnet-nonat-207" #207: deleting IKE SA for connection 'road-eastnet-nonat-207' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-207' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-207 | State DB: deleting IKEv2 state #207 in PARENT_I1 | parent state #207: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 459 time elapsed 0.00103 seconds | (#459) spent 1.04 milliseconds in crypto helper computing work-order 459: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 459 for state #459 to event queue | scheduling resume sending helper answer for #459 | libevent_malloc: new ptr-libevent@0x7fb34403a3d0 size 128 | crypto helper 5 waiting (nothing to do) | stop processing: state #207 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb37800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a30d30 | in statetime_stop() and could not find #207 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-207 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-207" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-207' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-207" | stop processing: connection "road-eastnet-nonat-207" (in initiate_a_connection() at initiate.c:349) | spent 0.0588 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #459 | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 459 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #459 | **emit ISAKMP Message: | initiator cookie: | 64 1c f9 72 57 02 e5 bf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-207 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 09 f4 91 af e8 cc 47 24 c2 b5 4c 3e ed df 87 0c | ikev2 g^x 09 e0 4b 07 1e 23 c5 7e 86 e2 5a ab 7d 41 06 3d | ikev2 g^x 7f 7d f9 8e b6 58 c8 fa 4a e7 6e 59 bd 9e 19 5b | ikev2 g^x d0 22 36 6d 62 9e c7 d4 0e 8a 77 c0 e4 05 9e c6 | ikev2 g^x 38 14 50 50 10 9e e8 30 b1 17 07 a8 ec 87 4b 21 | ikev2 g^x 15 4c 43 ee b6 9d 8d a1 9c 18 3d 34 43 97 8f 77 | ikev2 g^x 9a 8e 35 11 77 6c 19 4c d5 d6 10 76 41 7d 92 29 | ikev2 g^x ce 7e b0 f8 dd e1 3c da bd 28 65 ea 34 c0 d5 5e | ikev2 g^x 87 61 2d 03 e2 eb 39 88 92 b2 21 9a 8c ff 81 cd | ikev2 g^x e0 87 95 3d 88 8d a2 1e 66 0d db a2 7a 79 4c cc | ikev2 g^x ae 9a d3 e6 87 6a 1b 78 ae 44 bb 23 8a 41 53 1f | ikev2 g^x af 3f 42 6b ff 45 a9 da 42 e2 38 bd 4c 50 bf a8 | ikev2 g^x 3b 16 b5 57 9a cf 28 d9 88 40 31 6e bd 9a 3e 51 | ikev2 g^x 61 82 b6 d4 f2 88 81 2c 57 c3 85 0c a7 ff fd 6c | ikev2 g^x ed 2a 14 13 51 d6 b5 56 aa 0c 26 20 25 e3 9c 40 | ikev2 g^x 12 38 26 e0 f5 9a 6e 40 35 0c 6b 0a 6d b3 65 32 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5c 75 af 9e f8 ea 62 49 48 89 05 1e 77 92 7c c2 | IKEv2 nonce 74 9a fc 43 04 bc b7 18 cc f7 58 3d 9b c8 34 cc | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 64 1c f9 72 57 02 e5 bf | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 cf | natd_hash: port= 01 f4 | natd_hash: hash= ae 7f b1 c0 22 56 8e bd 29 fd 39 4f 5d 90 ed 84 | natd_hash: hash= 8a 20 f8 23 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ae 7f b1 c0 22 56 8e bd 29 fd 39 4f 5d 90 ed 84 | Notify data 8a 20 f8 23 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 64 1c f9 72 57 02 e5 bf | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 58 59 18 6a d1 74 dc 11 3e 54 b0 34 57 9e 0a 5d | natd_hash: hash= 5a f6 05 3b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 58 59 18 6a d1 74 dc 11 3e 54 b0 34 57 9e 0a 5d | Notify data 5a f6 05 3b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #459 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #459: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #459 to 4294967295 after switching state | Message ID: IKE #459 skipping update_recv as MD is fake | Message ID: sent #459 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-207" #459: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.207:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #459) | 64 1c f9 72 57 02 e5 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 f4 91 af e8 cc 47 24 c2 b5 4c 3e ed df 87 0c | 09 e0 4b 07 1e 23 c5 7e 86 e2 5a ab 7d 41 06 3d | 7f 7d f9 8e b6 58 c8 fa 4a e7 6e 59 bd 9e 19 5b | d0 22 36 6d 62 9e c7 d4 0e 8a 77 c0 e4 05 9e c6 | 38 14 50 50 10 9e e8 30 b1 17 07 a8 ec 87 4b 21 | 15 4c 43 ee b6 9d 8d a1 9c 18 3d 34 43 97 8f 77 | 9a 8e 35 11 77 6c 19 4c d5 d6 10 76 41 7d 92 29 | ce 7e b0 f8 dd e1 3c da bd 28 65 ea 34 c0 d5 5e | 87 61 2d 03 e2 eb 39 88 92 b2 21 9a 8c ff 81 cd | e0 87 95 3d 88 8d a2 1e 66 0d db a2 7a 79 4c cc | ae 9a d3 e6 87 6a 1b 78 ae 44 bb 23 8a 41 53 1f | af 3f 42 6b ff 45 a9 da 42 e2 38 bd 4c 50 bf a8 | 3b 16 b5 57 9a cf 28 d9 88 40 31 6e bd 9a 3e 51 | 61 82 b6 d4 f2 88 81 2c 57 c3 85 0c a7 ff fd 6c | ed 2a 14 13 51 d6 b5 56 aa 0c 26 20 25 e3 9c 40 | 12 38 26 e0 f5 9a 6e 40 35 0c 6b 0a 6d b3 65 32 | 29 00 00 24 5c 75 af 9e f8 ea 62 49 48 89 05 1e | 77 92 7c c2 74 9a fc 43 04 bc b7 18 cc f7 58 3d | 9b c8 34 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 7f b1 c0 22 56 8e bd 29 fd 39 4f | 5d 90 ed 84 8a 20 f8 23 00 00 00 1c 00 00 40 05 | 58 59 18 6a d1 74 dc 11 3e 54 b0 34 57 9e 0a 5d | 5a f6 05 3b | state #459 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb348046040 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b1ae80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a30d30 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #459 | libevent_malloc: new ptr-libevent@0x7fb37800cf80 size 128 | #459 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49680.784226 | resume sending helper answer for #459 suppresed complete_v2_state_transition() and stole MD | #459 spent 0.358 milliseconds in resume sending helper answer | stop processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34403a3d0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 1c f9 72 57 02 e5 bf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #459 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #459 | rejected packet: | 64 1c f9 72 57 02 e5 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cf fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #459: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0412 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #439 | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #439 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #439 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49680.813434; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002552 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c440 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #439 | libevent_malloc: new ptr-libevent@0x7fb34403a3d0 size 128 "road-eastnet-nonat-187" #439: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #439) | 47 50 75 67 1d 00 52 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 10 e6 27 54 79 a5 06 ab 7b 5d 27 c9 72 11 8a | be 8d 9d bf 52 e0 ac e0 58 f4 00 83 0a 18 2a d4 | 41 71 ec e9 2e f0 05 ec e8 a2 ec d2 28 ce f8 d4 | e5 81 d8 3c 87 bc 89 6a 8b 0a 1a e2 d3 eb 38 44 | e6 af 0a 47 aa 17 06 2d e7 33 df 52 16 8d b3 fb | d9 67 8e 07 e3 c9 9e 52 cf 8d 56 fb 7c c2 93 d9 | 9d 49 6e f0 2c fb ae b5 5c 7d 08 de 63 dc 9b 39 | 2d fb 3d b8 63 14 a9 ce d9 19 af ff bb a7 b1 81 | 41 c7 41 67 e7 53 2b fa 68 10 a5 13 3f f8 0f e7 | 33 85 43 eb a8 54 d5 5b fd f4 a1 1e d5 4f 32 99 | 86 f6 ec 22 05 a8 98 ec cb 6f de 01 77 3a 63 2b | 85 0f 08 c2 e9 6d 60 39 18 10 c9 3c 04 a6 69 c0 | 90 8a 6f 1c 7a 2e 85 ad 4f 29 5f 48 49 12 08 e4 | 72 3f d7 cc 42 6d 91 5a f7 f3 7b 44 dc 38 f7 05 | b2 bf 70 89 ab 24 52 cd cd c1 b3 61 99 9d a9 28 | e2 c4 12 1d de cd 37 64 c2 e0 70 28 45 34 de 67 | 29 00 00 24 d9 2f 24 9b 75 f5 ca 1e 2e 7d f4 06 | 41 a2 89 f3 ae c7 ae 61 65 4e 5f 7f 65 dd c2 12 | ae ae 3a 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 fd b4 2f 23 17 b8 9b d8 0c 2a 45 | b9 34 13 eb df 7c 42 33 00 00 00 1c 00 00 40 05 | f1 b3 a4 02 7a 60 50 36 46 44 d9 88 f9 29 1a 5f | aa 01 32 cb | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #439 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 50 75 67 1d 00 52 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #439 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #439 | rejected packet: | 47 50 75 67 1d 00 52 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #439: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0801 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61bd0 | handling event EVENT_RETRANSMIT for parent state #353 | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #353 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #353 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49680.815796; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005286 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #353 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 "road-eastnet-nonat-101" #353: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #353) | 5c b8 33 04 f9 07 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 8b 11 fb 47 ec 02 c4 cd 08 09 04 3c c8 57 b9 | e6 56 8a 75 16 cb 27 a3 a8 a8 cd 60 5a 5e 10 a0 | 4c ee d4 ee 70 90 76 03 9c dd ae bd 31 4c 66 16 | b3 e1 1d be 33 f8 41 0b c4 3c 71 6f 90 30 0f da | 26 bc 55 a4 9b 68 89 99 78 6a 9f bd 9b 59 ca 66 | 9f 28 bb 1c cf d9 04 9c 3f 50 e0 a8 9a c8 86 3c | 22 ad 41 27 f3 c4 bb fb ef e9 6e f8 88 7e 34 6e | 75 ca 2d 80 b4 0c d7 c1 72 ce 98 2e 70 ec 4e 80 | a8 95 d8 c8 1d 5c 97 5c c0 a0 b9 5c ac 3a c3 07 | 2c c5 07 1e 3d 08 d1 ba e4 93 f5 5b dd cb 89 0a | 36 eb de 45 ac 11 de 24 b8 2b b2 28 d9 84 7e 81 | 6c e6 ca 34 e5 ab 3a f5 d9 8f 51 9e f8 46 26 92 | bb e9 13 c3 32 db 48 bf d1 a9 ef 9e d6 1f 7a 90 | cf e0 f7 95 4c 0f 73 ac 90 00 08 6f f7 6f bb 88 | dc 53 20 17 f7 7a 4b e1 b0 e3 53 ab c1 68 9e bb | 8c bb e3 6d 1e 44 fc 28 be 03 40 b8 4e ff ea 55 | 29 00 00 24 d0 f4 4a 20 b5 18 6c ce 45 6d d4 e9 | 3d b2 3f bf 9f b6 c1 be 4d 22 b8 3f d5 b7 20 9c | 7a 5b 5b 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 c3 92 4c 0f 96 63 0f 6f bc 3d e6 | 99 69 47 3f a6 34 81 2c 00 00 00 1c 00 00 40 05 | ce 29 c6 74 fd 99 32 be d7 3c ba 39 8c e5 64 d3 | 17 27 91 5a | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61bd0 | #353 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c b8 33 04 f9 07 ca 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #353 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #353 | rejected packet: | 5c b8 33 04 f9 07 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #353: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0596 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0a940 | handling event EVENT_RETRANSMIT for parent state #411 | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #411 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #411 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49680.826096; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004341 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #411 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 "road-eastnet-nonat-159" #411: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #411) | dd dd 24 eb b8 cb 50 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd cd 4b b5 b6 e7 18 30 d4 d0 8e 83 03 53 e6 4e | 8d 99 24 ba 33 2f 0c bd fc e2 e9 0d 81 68 aa 7b | 12 93 68 9f 91 0d c2 fa e1 b9 83 26 f0 5b 9b dd | 51 e3 9e ed 34 ea 5f c9 93 72 24 b6 bd 13 cb 5c | 26 fe cc 72 6c e7 c6 21 ed 4e 14 b2 9f a3 3b 3c | 94 f8 1a 98 76 bb 57 e6 0d a9 bd 26 b1 18 3d 50 | 59 31 42 4b 06 7d ba db 70 1e 1c ae a8 d8 de 3a | 81 ee 27 6d 40 cc 4d 6a 4b fc 36 c4 b0 3a 09 0b | 48 47 43 74 dd e5 cb 90 df 6e e3 46 c3 6c 8b 97 | f3 25 7f d4 fd ec f5 56 ff 6b 80 d1 67 dc c0 79 | 70 cf 38 a2 35 5f 37 c9 04 ae 98 e9 6e f3 26 d3 | 47 94 bb 03 5d 71 7b 87 ad 54 4b 93 a3 b0 71 8f | 5f 69 b0 8d 69 3f e2 c0 02 32 57 3f 64 cb 19 71 | 58 00 09 d8 ce 8f 64 c9 55 9e 7c 00 26 28 eb f7 | 6f eb 0e ab 01 fb ae c5 0f da bd 30 07 46 c2 b0 | 5c ea 05 eb 2d 3f 40 91 20 c1 a3 5a 4f 86 98 86 | 29 00 00 24 a3 6a 54 81 57 a4 87 e3 a7 7a 68 dd | 8e 44 5b 6e 2b 5e f0 9a 3e c5 72 e8 17 f4 34 1c | 65 bd e7 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f a2 a7 20 75 c6 9d 9f 5f af fe db | d7 0a 3e e1 5c 28 6c 20 00 00 00 1c 00 00 40 05 | 37 57 74 7e fa 8f cf 8f 09 51 1f a5 a7 dc 5e 89 | 60 7b 2d b3 | libevent_free: release ptr-libevent@0x7fb3700180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0a940 | #411 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd dd 24 eb b8 cb 50 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #411 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #411 | rejected packet: | dd dd 24 eb b8 cb 50 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #411: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0d4c0 | handling event EVENT_RETRANSMIT for parent state #256 | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #256 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #256 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49680.82839; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007188 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0a940 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #256 | libevent_malloc: new ptr-libevent@0x7fb3700180b0 size 128 "road-eastnet-nonat-4" #256: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #256) | af ff 14 5c e8 87 a5 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 1f 56 51 1c ec cd e5 db 48 26 c8 dc 41 fd 54 | a8 2a f3 18 64 e6 88 a2 77 94 ce b8 37 5b 43 37 | 15 71 aa 40 2b 14 32 13 87 73 76 ea dc 9c c2 0d | 5f 66 9f c3 96 de 76 09 50 94 85 73 09 16 fd 60 | e5 22 cf 96 3d 7f 8a d5 69 b3 f6 e0 d1 b6 2a b1 | 46 24 36 96 12 35 a6 66 31 6c fc 27 fd 14 5f 55 | dc 4d 24 0c d2 4a 10 86 34 a8 27 78 27 27 b0 f6 | f0 8d 2e 1b c6 a5 de fc 9e fb ab ed 9f 6c dc 3c | 42 c9 5c a1 4a e3 4a 45 da e8 44 a1 f6 8a 36 fd | f6 c8 42 59 48 f3 30 69 ad 20 74 c3 02 1b f3 f8 | 3b 14 80 5c e4 55 cc fa 49 75 80 37 c4 a0 eb 78 | 5a ba 01 b2 91 5d ef fc 1f 18 54 22 3c e6 ac 42 | 22 26 d6 93 0e 7d c7 67 e5 47 f0 ab 43 0b cd e4 | d0 9c fd 7d 64 aa cd 20 be f3 31 9f f9 fd e9 74 | f6 4d 79 65 aa 69 d2 c1 c0 27 e2 43 4d 23 a2 bd | 81 a0 4b 66 29 06 06 b0 e0 6b c0 d6 29 53 e1 5f | 29 00 00 24 68 30 70 dd 8d a8 3f ec 7e 36 6c 6a | a3 ce 4b 67 03 0b 93 d7 9a 32 93 85 56 0b 5c 0e | c5 0b 8c 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 28 6b 61 6f db 11 ce 62 1a 99 08 | cd 34 ea 3b 0e 7b 2c f1 00 00 00 1c 00 00 40 05 | f7 c5 67 63 b0 24 3f 1b e9 07 39 23 b4 29 1b da | 4e b1 36 66 | libevent_free: release ptr-libevent@0x7fb34803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | #256 spent 0.0885 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af ff 14 5c e8 87 a5 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #256 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #256 | rejected packet: | af ff 14 5c e8 87 a5 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #256: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0402 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a84000 | handling event EVENT_RETRANSMIT for parent state #450 | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #450 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #450 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49680.837643; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001392 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #450 | libevent_malloc: new ptr-libevent@0x7fb34803b0b0 size 128 "road-eastnet-nonat-198" #450: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #450) | 6c 66 54 70 e3 85 47 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 7f 52 be 1b be 3e b4 95 6c 7f ea ce 79 84 79 | bb 2c a4 22 02 14 1a c7 80 c9 fc 63 a2 df a7 b4 | 1d c3 3e 47 98 35 3a c5 6d 01 79 cf ce 3b ed 3f | e7 fc 21 90 6a 8f a9 37 0a 15 57 ed e5 84 6d 80 | bc b0 af 24 80 0c 58 35 20 db 3e aa 64 ad 44 83 | d9 34 7e 33 a0 1c 88 af b7 63 e8 97 42 89 19 cf | e1 51 ee bc 36 b3 3f ea ae 0a 36 ea 2a 42 b5 d5 | 2b 9d 6c 67 c3 b5 e3 5c 88 ec 08 73 1a b8 90 c6 | eb c9 08 93 4a fd 61 5f ac b7 cf 92 b0 ce 44 08 | c5 ea 9d d1 33 ae 08 3a 55 1a 54 74 ee 06 12 8c | af 05 f1 32 8b f9 ad 76 e7 15 cf bb 56 d8 0d 22 | aa bf 8f d9 bc 81 33 05 b5 ca b2 64 e4 57 c2 aa | 8a ce 60 a9 03 71 24 23 e8 e9 eb 0e f3 fd cb 40 | 57 21 41 6c 87 a4 12 87 6c a3 20 f1 71 99 97 a1 | c9 bf 28 c9 61 1f 0e d1 0f d5 eb 18 2d 83 11 2c | a4 a9 46 db 50 5e 63 04 e8 1e e0 10 c3 22 6d 3c | 29 00 00 24 60 b3 78 69 cb 9c d2 f7 d6 cf 6b 51 | 75 18 c5 a7 1c 11 fb 00 38 fa 43 80 05 51 ec 75 | df 66 73 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 01 2f 17 96 36 9a 51 cd 6f 6e a8 | c1 69 8d 8a 84 17 97 6b 00 00 00 1c 00 00 40 05 | 07 24 02 da 94 a8 c8 5e ad a8 39 f9 98 2f 5a 91 | 01 02 06 a3 | libevent_free: release ptr-libevent@0x7fb338023a60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a84000 | #450 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 66 54 70 e3 85 47 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #450 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #450 | rejected packet: | 6c 66 54 70 e3 85 47 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #450: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38400a290 | handling event EVENT_RETRANSMIT for parent state #354 | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #354 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #354 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49680.868009; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005232 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #354 | libevent_malloc: new ptr-libevent@0x7fb338023a60 size 128 "road-eastnet-nonat-102" #354: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #354) | 72 4c 85 c6 74 09 42 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 1b e9 65 bc 73 bc c5 81 57 1a 7b 1b db 4b 3f | 32 d5 0d b7 6a 65 f1 0a 67 34 33 c1 2c 23 e5 f2 | 41 57 12 1f 62 7d 04 aa d4 c7 47 71 78 e8 f0 df | 48 86 0b 9f 4e 36 6e 72 bd ec 74 1b dd 83 0a ab | df 0b c7 29 5d 45 26 d8 31 4b 64 db c5 65 76 90 | cd 52 7e 2d 27 67 7a 01 34 ba b6 3f e3 9a 85 48 | e4 51 41 5f 21 41 ff 88 e4 cc aa c0 b6 13 70 92 | 13 45 bf db 76 ed 1c 31 eb 2b 1f af 38 c5 ca 82 | 0b fb bb d7 57 27 bd 26 60 cb 6b 22 18 4a df 09 | ae e5 bd 33 88 7d ef 21 1c 95 13 3d a5 02 60 08 | e7 d2 1b 72 0a 7b aa 01 9d 47 2a 4d 32 3f 9b ec | 5b 5a ea 31 68 bb 1a dc 15 be 3d d6 a0 c0 98 db | 7b 5b 3d 8f ce 9b 6c 43 56 11 be e1 16 78 07 0a | 06 29 bd c7 77 7e 17 95 3a 22 27 47 9f 23 32 f6 | 37 27 d0 b4 53 1e 36 9f c8 05 75 2f 68 c9 35 72 | da 2e a9 d1 44 f4 35 64 d4 0a 4b c0 71 73 52 a8 | 29 00 00 24 72 5c 82 6f 5d 6b bd 69 39 4b 52 31 | 75 ca 0e e7 64 bc 08 f8 b5 d4 6f 1f bc a5 fc 80 | 56 52 35 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 33 77 7a c0 93 c5 bf 78 5c 8c bc | 79 60 cc b9 7e aa 2e bb 00 00 00 1c 00 00 40 05 | df 4b d5 4e cf 64 0d 4d 4f 32 d9 61 e4 8d 05 c9 | 9f e3 12 70 | libevent_free: release ptr-libevent@0x7fb38402bf10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400a290 | #354 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 4c 85 c6 74 09 42 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #354 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #354 | rejected packet: | 72 4c 85 c6 74 09 42 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #354: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab7a80 | handling event EVENT_RETRANSMIT for parent state #456 | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #456 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #456 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49680.884714; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.503953 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400a290 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #456 | libevent_malloc: new ptr-libevent@0x7fb38402bf10 size 128 "road-eastnet-nonat-204" #456: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #456) | 9d 73 90 c6 28 50 00 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 3f ed 93 2c 95 9a 36 92 4d 4f a2 60 c1 a4 c9 | 4f 89 23 1f d1 62 f5 78 d3 b5 53 89 10 3d be a6 | 0b 7e 28 8a f8 9f 39 90 86 39 f9 58 de b8 41 b5 | 4e b5 7b 74 44 63 cc 49 07 82 fe 85 49 2e bc 7a | f9 73 7c 32 a7 c0 6d 69 27 6b 58 3d ad d1 e3 ec | cc a2 3b ff 29 b9 68 35 71 ee f8 63 67 14 1d 54 | bd cd c0 94 2f 62 7a 35 f4 12 35 06 31 ee 52 8b | 29 f1 3d 4d 88 53 c4 ee a1 13 19 c9 95 9c 3a b3 | 01 50 95 2e cb 29 cc 04 53 67 66 58 33 78 91 44 | bb 06 02 b6 52 69 e1 7c 4a 36 de 14 7e d4 42 89 | da ed 12 fd e2 7c 6b 02 ab fa 82 91 36 f1 eb 4f | a3 22 e5 0e 96 4e 45 d1 d5 c3 b4 13 59 96 05 fe | 42 25 83 c3 8d 08 66 f5 9f c5 f5 d6 78 e8 30 c4 | 64 8d 48 0b ea 1f e9 05 9f 8a 0b 97 9c 51 d8 74 | a8 a9 43 c8 84 d8 11 55 a3 8c 0b ac d0 92 1d f4 | 61 b1 7f 3d f8 aa 52 a8 9b c7 bf 12 0c da 76 e4 | 29 00 00 24 6d 34 cd c2 13 6b 2e 99 a8 cb ee 2a | a0 eb 8c a9 1d 65 aa 5b 5f 82 85 1d 0e 9e 60 f1 | 7a ed 45 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ef 03 64 ba 5e b8 36 8b cc 07 48 65 | d5 6f 6e 8b 3d 6d 57 bb 00 00 00 1c 00 00 40 05 | 07 ad 51 48 59 7f 26 2d fc 42 e0 9c c0 43 00 49 | 58 00 de b8 | libevent_free: release ptr-libevent@0x7fb34c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab7a80 | #456 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a92f80 | handling event EVENT_RETRANSMIT for parent state #412 | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #412 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #412 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49680.88491; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006096 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab7a80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #412 | libevent_malloc: new ptr-libevent@0x7fb34c0180b0 size 128 "road-eastnet-nonat-160" #412: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #412) | af 34 f0 93 1d 1b d6 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 73 ca 82 d1 b8 25 7f 04 b5 f2 f7 30 87 a9 41 | a5 4a c9 0d a4 7b 88 6a 9c a7 a5 05 c4 99 82 97 | fe 18 55 31 1a 69 24 11 ef 96 2b 9b 00 09 64 93 | f5 9b 6f 9f 26 02 b8 02 eb ec d6 b9 58 77 37 c4 | 15 13 55 d4 ba a0 8c 70 db 9d 5d b8 50 b2 fb 14 | 70 91 27 3f 52 b9 21 d5 ac 35 9f 2f 74 c2 cd a3 | f5 0a 60 3b 9e 8f df b1 5a c8 44 f1 32 14 8d c9 | 96 70 54 8d 6a b3 1d 9e 55 f7 54 39 be 48 72 05 | 31 be c1 bc a2 b1 92 d9 d7 2b ac 35 4b a3 d1 85 | c8 13 0e 09 13 01 9b 53 39 df da 51 e3 f0 0f b0 | b8 cb 35 90 8d 85 96 9f 9a 47 73 3d e9 c6 9a 9b | 64 e5 27 2a 0d 1b 39 d0 c9 ca 54 89 58 ae ef 63 | 30 57 d5 95 13 d6 7b 07 db 4c 1f 26 15 fc 42 93 | 98 20 27 df a5 2d d6 c3 03 e8 40 00 9e a8 d6 5b | d9 5c 3b 12 b9 90 e7 25 5f 47 7e 86 19 c6 bc 15 | 0b 47 49 10 46 90 3e a8 79 f3 d0 fc 23 1f c9 d1 | 29 00 00 24 a3 90 3f ea a1 9a ff 04 92 34 17 b8 | 6f ef 29 47 17 37 0c c0 67 c5 c5 dd ee 94 92 f1 | d0 ea b7 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 8b 79 f3 42 b6 33 1b 9b 02 cf 5d | 36 ad 4c 1f 32 b9 37 c2 00 00 00 1c 00 00 40 05 | a6 ab fb 7e 68 25 b5 32 b3 ef df 3a 19 eb c4 3f | d0 c1 29 ec | libevent_free: release ptr-libevent@0x7fb34c03b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f80 | #412 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d 73 90 c6 28 50 00 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #456 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #456 | rejected packet: | 9d 73 90 c6 28 50 00 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #456: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 34 f0 93 1d 1b d6 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #412 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #412 | rejected packet: | af 34 f0 93 1d 1b d6 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #412: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0557 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #208 | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #208 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #208 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49680.89028; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009004 exceeds limit? YES "road-eastnet-nonat-208" #208: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-208" #208: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #460 at 0x557d46aeeb80 | State DB: adding IKEv2 state #460 in UNDEFINED | pstats #460 ikev2.ike started | Message ID: init #460: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #460: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #460; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-208" #460: initiating v2 parent SA to replace #208 | using existing local IKE proposals for connection road-eastnet-nonat-208 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 460 for state #460 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a92f80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #460 | libevent_malloc: new ptr-libevent@0x7fb34c03b0b0 size 128 | #460 spent 0.0967 milliseconds in ikev2_parent_outI1() | RESET processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #208 ikev2.ike failed too-many-retransmits | pstats #208 ikev2.ike deleted too-many-retransmits | #208 spent 2.66 milliseconds in total | [RE]START processing: state #208 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-208" #208: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #208: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #208 "road-eastnet-nonat-208" #208: deleting IKE SA for connection 'road-eastnet-nonat-208' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-208' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-208 | State DB: deleting IKEv2 state #208 in PARENT_I1 | parent state #208: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #208 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | in statetime_stop() and could not find #208 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-208 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-208" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-208' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-208" | stop processing: connection "road-eastnet-nonat-208" (in initiate_a_connection() at initiate.c:349) | spent 0.0727 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 3 resuming | crypto helper 3 starting work-order 460 for state #460 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 460 | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 460 time elapsed 0.000941 seconds | (#460) spent 0.941 milliseconds in crypto helper computing work-order 460: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 460 for state #460 to event queue | scheduling resume sending helper answer for #460 | libevent_malloc: new ptr-libevent@0x7fb33803a770 size 128 | crypto helper 3 waiting (nothing to do) | processing resume sending helper answer for #460 | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 460 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #460 | **emit ISAKMP Message: | initiator cookie: | 23 48 f5 22 8d 37 9a d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-208 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b3 df d9 22 d0 fa 01 d1 aa 88 df 6a 8b 18 c0 09 | ikev2 g^x 4f 5b 80 db c5 12 8b 47 ef 35 50 bc b0 af 99 c5 | ikev2 g^x f9 cf 10 a6 63 8f ba 03 da 7f 0b b3 54 11 ba 9c | ikev2 g^x bb 06 80 77 61 12 b6 fe 2b bb 2c 7d 23 ed 7a 74 | ikev2 g^x 17 31 cb cb 95 4c d6 8f 31 04 dc 07 37 df 2d f4 | ikev2 g^x 1c ed 0c bb 28 ba e2 23 2d 3d a3 b2 fc 6f 50 eb | ikev2 g^x 56 d2 5b 1e f1 ad 23 2f 3e 55 c4 35 e9 32 f6 24 | ikev2 g^x 86 b3 e7 fd 04 0f 6f 72 db 37 4f bd d9 fe 64 c2 | ikev2 g^x 83 ac 83 05 91 73 42 0a a1 0c 3e 29 3c 20 67 b6 | ikev2 g^x 92 37 23 8d 25 df 18 a0 fa c2 98 93 ab ff 5f 64 | ikev2 g^x 7c d6 b8 fc 1d 90 5c 26 98 2d 8b b3 56 38 e2 7c | ikev2 g^x 20 da c8 bf 8d be 1d 6d f8 c5 88 bf 2f 3a f2 41 | ikev2 g^x 78 28 51 f9 69 ab 11 20 67 51 52 04 40 a5 c7 0c | ikev2 g^x 37 f0 c6 5d f9 95 c0 b8 47 6e 71 8e 99 56 3a 5f | ikev2 g^x e1 5c d4 8d c1 97 29 9c 26 a6 ac 65 11 ae 68 ef | ikev2 g^x 23 72 8e c9 45 c4 63 78 1b 5c 81 47 6e 58 87 ff | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 25 2a f3 c2 d1 34 f2 28 be 54 0b a4 22 e2 98 59 | IKEv2 nonce 02 dc 2f 37 5b b6 b4 bd 10 49 91 58 87 4d 98 bd | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 23 48 f5 22 8d 37 9a d6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d0 | natd_hash: port= 01 f4 | natd_hash: hash= 9c c8 5d 4c 09 cc 17 d5 22 fc 7b d0 43 ae fd 90 | natd_hash: hash= 5d 04 da 2b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9c c8 5d 4c 09 cc 17 d5 22 fc 7b d0 43 ae fd 90 | Notify data 5d 04 da 2b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 23 48 f5 22 8d 37 9a d6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 07 a4 f0 f7 58 53 22 23 25 cf 1a 07 69 10 b8 4a | natd_hash: hash= 16 e3 ac d7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 07 a4 f0 f7 58 53 22 23 25 cf 1a 07 69 10 b8 4a | Notify data 16 e3 ac d7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #460 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #460: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #460 to 4294967295 after switching state | Message ID: IKE #460 skipping update_recv as MD is fake | Message ID: sent #460 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-208" #460: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.208:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #460) | 23 48 f5 22 8d 37 9a d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 df d9 22 d0 fa 01 d1 aa 88 df 6a 8b 18 c0 09 | 4f 5b 80 db c5 12 8b 47 ef 35 50 bc b0 af 99 c5 | f9 cf 10 a6 63 8f ba 03 da 7f 0b b3 54 11 ba 9c | bb 06 80 77 61 12 b6 fe 2b bb 2c 7d 23 ed 7a 74 | 17 31 cb cb 95 4c d6 8f 31 04 dc 07 37 df 2d f4 | 1c ed 0c bb 28 ba e2 23 2d 3d a3 b2 fc 6f 50 eb | 56 d2 5b 1e f1 ad 23 2f 3e 55 c4 35 e9 32 f6 24 | 86 b3 e7 fd 04 0f 6f 72 db 37 4f bd d9 fe 64 c2 | 83 ac 83 05 91 73 42 0a a1 0c 3e 29 3c 20 67 b6 | 92 37 23 8d 25 df 18 a0 fa c2 98 93 ab ff 5f 64 | 7c d6 b8 fc 1d 90 5c 26 98 2d 8b b3 56 38 e2 7c | 20 da c8 bf 8d be 1d 6d f8 c5 88 bf 2f 3a f2 41 | 78 28 51 f9 69 ab 11 20 67 51 52 04 40 a5 c7 0c | 37 f0 c6 5d f9 95 c0 b8 47 6e 71 8e 99 56 3a 5f | e1 5c d4 8d c1 97 29 9c 26 a6 ac 65 11 ae 68 ef | 23 72 8e c9 45 c4 63 78 1b 5c 81 47 6e 58 87 ff | 29 00 00 24 25 2a f3 c2 d1 34 f2 28 be 54 0b a4 | 22 e2 98 59 02 dc 2f 37 5b b6 b4 bd 10 49 91 58 | 87 4d 98 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c c8 5d 4c 09 cc 17 d5 22 fc 7b d0 | 43 ae fd 90 5d 04 da 2b 00 00 00 1c 00 00 40 05 | 07 a4 f0 f7 58 53 22 23 25 cf 1a 07 69 10 b8 4a | 16 e3 ac d7 | state #460 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c03b0b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a92f80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #460 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 | #460 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49680.892099 | resume sending helper answer for #460 suppresed complete_v2_state_transition() and stole MD | #460 spent 0.491 milliseconds in resume sending helper answer | stop processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb33803a770 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 48 f5 22 8d 37 9a d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #460 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #460 | rejected packet: | 23 48 f5 22 8d 37 9a d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d0 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #460: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aef6c0 | handling event EVENT_RETRANSMIT for parent state #440 | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #440 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #440 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49680.927318; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002426 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3380300a0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #440 | libevent_malloc: new ptr-libevent@0x7fb33803a770 size 128 "road-eastnet-nonat-188" #440: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #440) | 59 19 97 9a e3 8b 77 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 57 86 98 5b 96 d3 77 6a 73 d3 f1 79 83 3d b1 | 25 c0 29 5c f0 c3 a2 69 ec 6a e3 4d 6f cd 0b d7 | 79 9c cb d7 34 fa 78 1e b1 98 79 da 0f ac 84 e0 | 73 c1 06 f8 21 3a aa 0a f4 0e 4d f7 bf 24 b0 23 | 75 13 78 7d aa 97 d6 f9 8b f1 96 43 1f bc e1 e6 | da 7d fb 41 ce 93 49 6e e1 1e f3 c1 41 08 43 3b | 3e e8 ed 1f 4e 08 d4 85 64 9e d1 11 dc 50 e9 45 | 7f a7 7d f7 2b 35 cf 9a d1 cb 6a 05 4f 83 e6 fd | 42 8f 63 21 ff 80 40 b7 e2 26 41 31 52 b6 49 a0 | 77 11 47 93 5f a3 3d 9c 1c 0e 6f 2b 0b b6 1d 42 | d3 1d 45 13 c6 e8 f2 a5 8e c9 4c 05 0a 08 aa 82 | ac e4 27 b7 b2 77 b7 80 38 58 3d 68 92 fd 5e 6a | 38 c8 de 6a 08 ae c9 2d 85 13 3c b9 b9 2c 91 48 | 64 74 4e 5e a1 07 a6 ff 63 67 43 99 ae 3a 36 0a | 11 4e c4 4f 1a ab 97 3f 39 c8 63 d0 49 b4 29 fe | 77 df c5 36 12 ae 96 21 4b 67 cf 07 6a b0 e1 5d | 29 00 00 24 82 fb 4c 4b 30 7b 16 3b 6a c7 2b 62 | cc 7b b0 14 ea 16 0d 74 ad 0f c2 be 8d 39 6e c0 | 2a 84 9f 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 37 6d ef 85 b5 1f 0e 28 d0 8a e5 | d5 d3 1d e3 5f d5 cf 90 00 00 00 1c 00 00 40 05 | 72 f1 07 bf 82 38 a8 c2 32 ec a4 d6 59 1b 7c de | 06 08 a2 81 | libevent_free: release ptr-libevent@0x7fb37004b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aef6c0 | #440 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 59 19 97 9a e3 8b 77 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #440 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #440 | rejected packet: | 59 19 97 9a e3 8b 77 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #440: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35000d120 | handling event EVENT_RETRANSMIT for parent state #355 | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #355 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #355 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49680.944676; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005221 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aef6c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #355 | libevent_malloc: new ptr-libevent@0x7fb37004b7c0 size 128 "road-eastnet-nonat-103" #355: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #355) | 56 ed c8 71 de f9 06 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 2a 83 b1 26 56 49 8c fe 5f bd b2 84 ea a3 88 | a4 f8 b8 d9 ec 49 43 44 95 bd 12 f2 c5 21 82 10 | 03 69 98 1b 4a 24 1f ea 40 8a 0b 91 c9 76 5c 49 | d4 99 e0 74 0f 3f ee 6f 9e 53 54 1a 23 35 59 5a | aa 59 0d cf 6b cd 1c a1 eb 6c 98 6c 37 17 d0 f8 | 3c dc 93 d2 77 45 41 e8 99 25 82 ad 9d 55 e6 13 | c0 f1 0d 8b 61 04 8f 57 63 d5 98 2e 2e 99 6e 3b | 2e 7c 41 b8 5b 06 ba ad 18 18 aa 84 1a 4c 4a ef | 3b 6e c9 03 be ae 7b 01 5e 77 a6 2b 34 36 7e 21 | 7f c5 d3 9e 48 69 2b 5b 00 e3 c7 29 41 93 4a 4f | 3f 0c 86 c3 a8 9a b3 72 ca 66 fb a6 7b 68 f9 97 | 45 bd 92 5e ee 7e 28 d2 1e 8d 24 ad 5b 2c db 57 | 1e 74 10 aa 41 ab d2 f5 21 4c 56 2b c7 8f ce 5e | d8 69 da 43 89 31 85 08 6d d1 b2 1a 22 1c fe b0 | 36 38 83 b8 45 19 23 bb 71 3e 12 a0 c1 d4 c6 f9 | 92 4b 6b b1 a2 bb 20 eb ff a0 77 69 c4 c9 35 d8 | 29 00 00 24 c0 01 1a b2 54 fa cf 80 10 d0 f3 31 | e6 0e 79 92 f9 e8 de f5 3e 1e d4 6a 54 e0 c2 2f | 19 27 3a 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 da f6 01 f4 40 01 a7 a7 77 b7 fc | 3d b7 6f 1f f7 90 79 11 00 00 00 1c 00 00 40 05 | d2 9a 8c 84 e0 9c 3f 77 ed a7 98 65 71 77 a0 dc | b3 15 95 be | libevent_free: release ptr-libevent@0x7fb350012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35000d120 | #355 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 ed c8 71 de f9 06 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #355 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #355 | rejected packet: | 56 ed c8 71 de f9 06 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #355: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33801d710 | handling event EVENT_RETRANSMIT for parent state #413 | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #413 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #413 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49680.951018; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004936 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35000d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #413 | libevent_malloc: new ptr-libevent@0x7fb350012840 size 128 "road-eastnet-nonat-161" #413: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #413) | ea 46 85 e7 fd 9b ca c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a d6 4a 46 94 c5 0e 81 7d ce e7 15 1a 5a 21 6b | d0 32 15 1d df aa 19 22 73 4c 48 c7 c9 6d a8 93 | 29 7e ec 61 b6 83 c3 69 04 a5 60 f9 c5 35 27 f9 | 44 bf c3 99 38 07 63 d7 db de ef 2b 00 c6 3d 6f | 1e 8f 0f f0 f2 98 90 49 cc c1 d2 86 82 6d 83 07 | b6 cd 6e db a4 2f 05 29 fa 3e e9 09 c5 23 64 57 | 0f 6b 66 2d b4 b3 b3 d2 ea e7 1c 7e 8b 59 ce a2 | 2a db b2 33 4a cb 53 6b e5 06 8d cf 28 1c 31 94 | 7e 79 27 07 12 0f ee 03 55 92 90 46 1e 9e 32 06 | e3 69 6e 6a 21 a6 b6 3d c6 89 df ef c7 fa b0 eb | ab 8c ae 81 fa 71 38 65 08 c6 41 65 64 a9 83 b0 | bc c3 01 a6 3a 68 d2 5d bb 35 97 d0 1e e7 f8 04 | 04 04 f6 ff 5e f9 22 b6 f2 9f 86 d9 b4 ae ee 49 | fd 07 2d 26 52 e7 63 86 cc 1a 6e 7f 04 ad 81 4a | a3 d7 7a 6d 6e 53 1b 65 52 8d 28 da bd 54 d5 04 | 1e 3e 9f 74 3c 77 dc 33 e5 c5 fe 6f df d3 a7 16 | 29 00 00 24 85 87 06 d7 9a bf 7b 07 3a ec 94 d1 | cf f4 5c 33 c2 8f dc 32 29 58 27 3f e4 e5 19 81 | 63 f8 b3 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 20 9c 8e 3c 13 0c 4e a0 e8 24 76 | 9d 56 e7 f6 81 08 36 aa 00 00 00 1c 00 00 40 05 | 3c 55 11 1a b1 a6 35 ac 5d bf b2 4d 0c c0 40 68 | 37 73 05 e6 | libevent_free: release ptr-libevent@0x7fb33802ee40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33801d710 | #413 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 46 85 e7 fd 9b ca c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #413 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #413 | rejected packet: | ea 46 85 e7 fd 9b ca c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #413: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0794 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24700 | handling event EVENT_RETRANSMIT for parent state #451 | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #451 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #451 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49680.953396; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001168 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33801d710 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #451 | libevent_malloc: new ptr-libevent@0x7fb33802ee40 size 128 "road-eastnet-nonat-199" #451: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #451) | ba 7b a0 b0 99 57 b7 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 86 c1 bd 46 53 16 86 81 3c 90 d2 1b d5 72 d6 | 90 46 2b fe 71 0a b5 92 27 f1 2a 98 1f 0b 9c 86 | b4 73 fd 62 b2 c4 76 72 65 dc a3 4a 74 c5 fd c6 | 79 b7 24 8c 57 9e 68 29 d1 51 ef 41 d9 35 5f e0 | 38 61 4f 5c 38 99 a1 c4 18 39 cd 7c d3 ce 2b 13 | fc 9c 47 13 18 41 cd b0 e2 7f c5 8a 64 72 a5 44 | 53 3a 53 2d 27 d7 7b 2d 79 06 40 fe 3d 6f 0c 91 | d2 44 b7 35 de 08 ea 0c 51 75 4f ac 93 26 ff 1a | 9b 0e 24 d8 14 0e 9a fc f6 cc 0e 9a dd d9 b9 d2 | 1b 38 2f 39 cf f5 c7 33 b5 34 1b 0e a3 9e 16 b5 | a1 af 82 8d 2c a9 ce 6b 79 b5 5c 3b f7 3b ae 09 | 38 95 45 10 35 73 6b 75 72 ac 01 d0 d8 9c 2a 56 | 79 52 8f 61 80 9d ac 4d cd 53 ef 84 96 01 18 60 | 62 4a 3f 8c ae bb 58 49 e4 bd 6c ac 5f b8 ee 89 | d9 a3 21 bd 37 79 80 9b e7 e0 92 c7 ad 63 83 e1 | b3 a4 a9 38 2d 78 59 50 55 18 b3 a6 f4 4b 9a 44 | 29 00 00 24 c0 83 9a b8 91 8b 33 7b 3e ca 3c 3c | 55 1b 13 ae f8 60 71 22 6b 87 6a 60 f0 da d9 ee | 56 ce cf eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 64 e2 2e 4b 98 7a a3 19 bf 09 d8 | 5a 5f 60 9f 04 ef ea a4 00 00 00 1c 00 00 40 05 | f6 42 3e 9c 74 68 a9 db 08 24 19 e3 18 ae 01 16 | fd d2 98 25 | libevent_free: release ptr-libevent@0x7fb3500180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24700 | #451 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 7b a0 b0 99 57 b7 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #451 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #451 | rejected packet: | ba 7b a0 b0 99 57 b7 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #451: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0698 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c046090 | handling event EVENT_RETRANSMIT for parent state #257 | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #257 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #257 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49680.964753; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007366 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #257 | libevent_malloc: new ptr-libevent@0x7fb3500180b0 size 128 "road-eastnet-nonat-5" #257: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #257) | c0 a3 3d d0 6b df 36 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 d4 14 bb a4 26 08 82 2e 68 9d 43 5b 83 0c 36 | 1f 55 d2 1d bf 09 8f 68 0a 80 73 cf b9 a3 3e fb | 4d 3a 5e 68 e8 aa 15 71 f7 e6 60 e6 9e 7c a9 b9 | e4 7c a0 fd c4 92 d3 66 8d 75 86 7f 7f 0a c5 42 | be bb d7 8c fb b4 ab fa c5 83 64 ff dd e6 56 27 | af 9a f1 86 53 58 3b 72 b7 e4 76 4e c9 2a af 68 | 0c 7e 9d bf 26 26 ae 59 6b f6 99 f5 1c 3d 32 4e | 8e a7 43 0e b2 0c 7f 5d ea 3a c0 50 3e 6f 7e 61 | fc 39 14 9d d7 51 ad 13 b2 22 e7 6c 3e 75 0f f9 | 50 5f 45 31 fb b6 64 15 77 12 e2 82 5e ea a6 ae | e9 ef 71 7b ce a0 63 c0 ec ed c4 35 36 4d 8b ac | a2 1c 05 95 aa 9f 05 c7 da bb 7e 2c 1b be db 0a | e1 a0 b3 b2 bf 79 ee 31 3e 48 4e 05 00 26 ce 87 | 2f 0f 18 80 43 59 d6 73 3e f5 b2 95 2a 4d b8 2d | f4 60 f9 1a 76 3c f3 63 33 e3 37 34 73 88 ed 64 | 6c a7 75 12 ca d0 e5 a3 5b 68 0d 46 dd d7 61 2d | 29 00 00 24 ee 5d 7d 66 4d 0b a2 50 89 9d 46 31 | 30 20 ae b6 b5 b0 95 a5 d1 00 de 3b e5 de 68 17 | ec 12 56 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 5f 0f 32 08 df d5 f3 1e 89 e0 00 | bf de 72 4a a1 a4 e7 89 00 00 00 1c 00 00 40 05 | 60 f8 1e fb ae 99 6b 12 d7 c7 12 5b 86 70 02 5c | 5c f6 f1 68 | libevent_free: release ptr-libevent@0x7fb36c04b8e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c046090 | #257 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c0 a3 3d d0 6b df 36 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #257 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #257 | rejected packet: | c0 a3 3d d0 6b df 36 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #257: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad6ec0 | handling event EVENT_RETRANSMIT for parent state #209 | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #209 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #209 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49680.990091; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.013342 exceeds limit? YES "road-eastnet-nonat-209" #209: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-209" #209: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #461 at 0x557d46af0140 | State DB: adding IKEv2 state #461 in UNDEFINED | pstats #461 ikev2.ike started | Message ID: init #461: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #461: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #461; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-209" #461: initiating v2 parent SA to replace #209 | using existing local IKE proposals for connection road-eastnet-nonat-209 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 461 for state #461 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c046090 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #461 | libevent_malloc: new ptr-libevent@0x7fb36c04b8e0 size 128 | crypto helper 1 resuming | crypto helper 1 starting work-order 461 for state #461 | #461 spent 0.0754 milliseconds in ikev2_parent_outI1() | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 461 | RESET processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #209 ikev2.ike failed too-many-retransmits | pstats #209 ikev2.ike deleted too-many-retransmits | #209 spent 2.68 milliseconds in total | [RE]START processing: state #209 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-209" #209: deleting state (STATE_PARENT_I1) aged 64.015s and NOT sending notification | parent state #209: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #209 "road-eastnet-nonat-209" #209: deleting IKE SA for connection 'road-eastnet-nonat-209' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-209' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-209 | State DB: deleting IKEv2 state #209 in PARENT_I1 | parent state #209: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 461 time elapsed 0.000981 seconds | (#461) spent 0.951 milliseconds in crypto helper computing work-order 461: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 461 for state #461 to event queue | scheduling resume sending helper answer for #461 | libevent_malloc: new ptr-libevent@0x7fb38803c430 size 128 | crypto helper 1 waiting (nothing to do) | stop processing: state #209 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb37403ae20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | in statetime_stop() and could not find #209 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-209 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-209" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-209' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-209" | stop processing: connection "road-eastnet-nonat-209" (in initiate_a_connection() at initiate.c:349) | spent 0.0722 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #461 | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 461 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #461 | **emit ISAKMP Message: | initiator cookie: | 30 e3 71 39 78 d7 e3 f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-209 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 28 73 72 eb a6 69 8c 9e 08 28 d6 16 78 8b f3 f1 | ikev2 g^x 10 b5 c6 3e 5a 68 ff ee f8 e9 ea 04 9a 96 07 cd | ikev2 g^x 19 7e 01 3e f6 8c ec 23 90 c5 34 cb 27 e1 d9 f4 | ikev2 g^x 83 f1 52 a0 20 79 82 b5 63 bf e3 1e 4c 8b e6 11 | ikev2 g^x 56 0c 8d 37 3e 34 a4 1e 35 3f f2 4f c6 52 63 33 | ikev2 g^x 1a 19 3a f7 47 1a 58 cf 14 be b6 13 3a ba 6a 7a | ikev2 g^x c2 7e 4a 7c 6b 24 bd 5d d6 f1 53 6b d9 1a c9 0e | ikev2 g^x b4 0c ad ca 0d 87 78 f9 58 81 24 7b 64 ae 92 0f | ikev2 g^x 11 e7 db e4 1c 12 40 ed e3 44 f4 22 a9 cb c8 e8 | ikev2 g^x 35 d2 0f 26 8c e9 f0 bd 79 b3 71 e1 56 b6 c2 ad | ikev2 g^x c3 25 0b 24 c0 9d 7c 39 2c c7 c4 5c 79 bb 71 e2 | ikev2 g^x 44 92 14 47 75 57 f7 30 ac 8e 27 b4 ce 61 8d 65 | ikev2 g^x 5b 3f 84 a2 85 6e ec 1f 9f 60 e7 ef bd 5d a7 fa | ikev2 g^x a6 23 27 f3 06 ac 82 f0 e3 4d 76 a2 d3 e2 92 c2 | ikev2 g^x 69 39 39 eb 52 01 f2 b3 9d c1 f3 c5 d2 36 e4 c6 | ikev2 g^x 40 e0 76 99 a0 7e 6e 0f 65 8c da 02 f1 c2 ad 1e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 90 76 1f 57 9b 42 3c 9c 17 4b 00 94 e5 bc 1a a6 | IKEv2 nonce 9f 85 30 49 d6 5f c0 4c ce 00 c3 85 0f 0e 5c ab | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 30 e3 71 39 78 d7 e3 f5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d1 | natd_hash: port= 01 f4 | natd_hash: hash= a6 76 5f 86 b3 2d 97 ef 5b 1d 05 17 f4 c4 b8 ec | natd_hash: hash= 0d 36 f1 03 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a6 76 5f 86 b3 2d 97 ef 5b 1d 05 17 f4 c4 b8 ec | Notify data 0d 36 f1 03 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 30 e3 71 39 78 d7 e3 f5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 57 06 a0 ca 17 47 48 ab cc 80 4d 50 ec 37 d9 01 | natd_hash: hash= a5 d0 9e bc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 57 06 a0 ca 17 47 48 ab cc 80 4d 50 ec 37 d9 01 | Notify data a5 d0 9e bc | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #461 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #461: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #461 to 4294967295 after switching state | Message ID: IKE #461 skipping update_recv as MD is fake | Message ID: sent #461 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-209" #461: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.209:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #461) | 30 e3 71 39 78 d7 e3 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 73 72 eb a6 69 8c 9e 08 28 d6 16 78 8b f3 f1 | 10 b5 c6 3e 5a 68 ff ee f8 e9 ea 04 9a 96 07 cd | 19 7e 01 3e f6 8c ec 23 90 c5 34 cb 27 e1 d9 f4 | 83 f1 52 a0 20 79 82 b5 63 bf e3 1e 4c 8b e6 11 | 56 0c 8d 37 3e 34 a4 1e 35 3f f2 4f c6 52 63 33 | 1a 19 3a f7 47 1a 58 cf 14 be b6 13 3a ba 6a 7a | c2 7e 4a 7c 6b 24 bd 5d d6 f1 53 6b d9 1a c9 0e | b4 0c ad ca 0d 87 78 f9 58 81 24 7b 64 ae 92 0f | 11 e7 db e4 1c 12 40 ed e3 44 f4 22 a9 cb c8 e8 | 35 d2 0f 26 8c e9 f0 bd 79 b3 71 e1 56 b6 c2 ad | c3 25 0b 24 c0 9d 7c 39 2c c7 c4 5c 79 bb 71 e2 | 44 92 14 47 75 57 f7 30 ac 8e 27 b4 ce 61 8d 65 | 5b 3f 84 a2 85 6e ec 1f 9f 60 e7 ef bd 5d a7 fa | a6 23 27 f3 06 ac 82 f0 e3 4d 76 a2 d3 e2 92 c2 | 69 39 39 eb 52 01 f2 b3 9d c1 f3 c5 d2 36 e4 c6 | 40 e0 76 99 a0 7e 6e 0f 65 8c da 02 f1 c2 ad 1e | 29 00 00 24 90 76 1f 57 9b 42 3c 9c 17 4b 00 94 | e5 bc 1a a6 9f 85 30 49 d6 5f c0 4c ce 00 c3 85 | 0f 0e 5c ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 76 5f 86 b3 2d 97 ef 5b 1d 05 17 | f4 c4 b8 ec 0d 36 f1 03 00 00 00 1c 00 00 40 05 | 57 06 a0 ca 17 47 48 ab cc 80 4d 50 ec 37 d9 01 | a5 d0 9e bc | state #461 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c04b8e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c046090 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #461 | libevent_malloc: new ptr-libevent@0x7fb37403ae20 size 128 | #461 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49680.991874 | resume sending helper answer for #461 suppresed complete_v2_state_transition() and stole MD | #461 spent 0.485 milliseconds in resume sending helper answer | stop processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38803c430 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 e3 71 39 78 d7 e3 f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #461 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #461 | rejected packet: | 30 e3 71 39 78 d7 e3 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d1 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #461: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0668 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350040840 | handling event EVENT_RETRANSMIT for parent state #414 | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #414 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #414 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49681.023109; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005159 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800c4b0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #414 | libevent_malloc: new ptr-libevent@0x7fb38803c430 size 128 "road-eastnet-nonat-162" #414: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #414) | 9e d5 a6 6b e9 51 f5 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 17 ff 89 e8 3c 16 16 6a 13 a2 4a 6e d7 58 8c | 31 4a 5d a6 06 21 a0 a1 9e a4 d6 9f 9d d0 c9 ef | 81 a2 6a e5 e1 ce f7 5b 3f cb a3 39 af 4b 00 d3 | 8e ea 93 72 09 07 7e f7 07 70 f1 60 90 61 a3 52 | 45 df 81 dd 3b 9f 90 cc 5a ee 79 3a e6 e9 1c 8f | 3e 5d 20 51 b9 06 0a c7 eb 0e 7c 49 84 44 06 9a | 8a 7d 42 8a 3c 02 e8 20 6f 96 b9 43 e4 b6 78 25 | 2a 47 75 c2 a6 5e 09 93 6e 0a 52 61 7e 11 07 98 | e5 ed 70 aa 1a 26 50 15 8a 10 03 2b 04 12 5a 90 | df c8 9d 86 1f 6a 9b b1 b4 ef a4 64 93 b4 1c b9 | a7 2b 05 40 cd d6 1a ea f2 e2 7e 25 9c 0d 5f 1b | 71 7c a0 ab 46 0c fd 1d 5d c2 80 68 45 9c 03 04 | ba 22 16 f6 4e 43 40 2a 18 55 ee ba be b9 c7 28 | a3 19 30 1c 73 7f 70 9d 56 01 fc 31 bf 29 77 0b | f7 40 78 1c 68 3b 66 2d 2e 5b fb 5d 13 f6 84 1d | 63 eb 8e 4a f6 af 8f 02 43 3a 27 60 08 28 58 6a | 29 00 00 24 8a 22 da 4e 47 50 93 9e a6 73 51 af | 87 1e 05 a5 3e cb 07 7d 69 59 69 03 d3 ed 1d 7a | 33 b5 03 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba fb 8a fc 1d 3f b9 dc ba d7 c2 5a | de ae b7 6f 1b 1d e3 06 00 00 00 1c 00 00 40 05 | 6c ca d3 22 34 6c 0b 0a d6 9b 01 8f e9 fa 8a 7e | 51 47 3d 5a | libevent_free: release ptr-libevent@0x7fb3500342b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350040840 | #414 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e d5 a6 6b e9 51 f5 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #414 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #414 | rejected packet: | 9e d5 a6 6b e9 51 f5 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #414: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0705 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350014cc0 | handling event EVENT_RETRANSMIT for parent state #356 | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #356 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #356 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49681.033456; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005491 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350040840 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #356 | libevent_malloc: new ptr-libevent@0x7fb3500342b0 size 128 "road-eastnet-nonat-104" #356: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #356) | ac bc fb 64 b8 05 f9 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 3b ae 20 ec 7a cd 21 f9 ff e0 06 71 c2 e5 55 | 9b 45 49 5f 50 f5 30 9c 0b 3e 8a a2 28 f4 85 c7 | 4f 6f 8c f6 77 7f 00 15 6e 19 1d d1 e0 68 66 87 | 4e df 9c 72 ac b2 8d ab fe f6 05 78 0d c2 c2 f2 | 31 63 92 17 54 19 b6 cf fd 16 6a d8 32 67 48 40 | 84 9f 47 99 c0 29 49 ad 8d 18 53 a5 6f ce c9 03 | 2a bd 3e e5 4f fd 0e 59 73 26 a7 73 de 18 dc 8d | 09 79 73 ae 09 17 25 e9 44 ce 32 60 cd df 52 37 | 66 e2 fc 8e a8 ff 6f bc 73 d9 a9 e6 7e 34 29 30 | c0 25 f8 37 35 6d fc d1 5a 42 45 e2 29 19 ad 5e | b1 89 0e dc 25 33 50 a2 38 82 4f ae e6 4f c3 97 | 55 76 c2 67 8a 3e ac 3d 84 f3 32 ca 54 cc 1c 9f | 23 91 a9 44 f4 93 a5 2a aa cc ed 04 01 4e eb f5 | 00 ac f3 c1 d5 2f 9a 43 89 cf f2 f2 55 7d 1d 3b | d4 57 90 a2 11 f9 23 83 ee a6 72 aa 3b 95 a5 9a | f2 6e 4c 51 df 03 55 77 ff 21 15 db 98 87 cc e3 | 29 00 00 24 80 41 9d 85 d0 e1 49 10 c1 0f c3 d9 | f1 36 ea c7 60 65 b3 e5 0e 51 88 57 20 76 d9 47 | 30 46 2c b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 1f 59 ee ab 85 d8 d4 4a d4 96 c0 | ee 5f a4 59 2f 4a 72 17 00 00 00 1c 00 00 40 05 | 04 5f 5b a5 b0 c4 89 9e 39 c9 c6 97 69 9e e5 9e | 19 14 82 3e | libevent_free: release ptr-libevent@0x7fb350029650 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350014cc0 | #356 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378012bf0 | handling event EVENT_RETRANSMIT for parent state #258 | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #258 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #258 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49681.033633; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006417 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350014cc0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #258 | libevent_malloc: new ptr-libevent@0x7fb350029650 size 128 "road-eastnet-nonat-6" #258: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #258) | f2 0a ee 39 57 38 66 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 84 a5 7f 13 c6 d5 f4 de a1 59 9b a0 a0 80 f1 | 2f 8b 06 61 d1 0f de 44 77 49 a3 76 3f 11 11 d4 | ab 9b 3e 8d 7f a0 dc 2b 42 28 86 6f ac 5b b2 c2 | 4e 03 12 4c 72 0a d1 f2 0b 69 dc 3f 47 15 b3 66 | 0b ed 38 4d 89 9d b6 26 e5 44 a2 c8 18 05 1d ea | b9 5a 63 00 12 16 1b 15 c7 6e b8 4d 60 58 cc f0 | 35 6e d0 c1 0c 7a 3b 52 20 a4 ce 3e e5 c0 cc 56 | 65 b1 16 d6 43 c2 be ea b5 3f 07 6c 04 df 3c 27 | ca 5b 39 2e f2 76 09 d5 9a 31 cd f8 a0 9b 56 3c | 42 b3 87 82 b1 01 3e ef 89 15 5a 1d 00 90 84 19 | 5b 3d 7c ec 45 07 76 99 d3 04 39 db f5 94 ae 9f | 9a 24 93 91 e4 3f ad 43 d2 f2 74 b3 73 89 3f f4 | ac 15 1c 07 3d d0 3a 58 a4 bb b4 b2 b0 c3 65 db | c7 15 7a 2b b3 96 c2 16 55 b0 f5 86 dd bf d9 cf | 01 e1 ae 2e 78 f6 40 62 df cc 04 cf 9d bd 05 f9 | 5f ef 7a 44 a4 51 1c 3a 9b b4 7d 0d 94 46 3e a1 | 29 00 00 24 25 6d bb 73 f8 76 14 9e e8 94 3a 77 | d7 da 85 ed f6 46 fc 67 4e bb 29 38 0b 6c 4c 96 | c6 a5 48 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da 43 d0 a7 5e 1e 6a 3c 4c 0b bd b4 | fc 0a 0a d4 c2 f3 96 56 00 00 00 1c 00 00 40 05 | 20 be 8b da 4d a1 7e 30 5a c5 49 1f 20 a4 27 d3 | b3 85 6c 0e | libevent_free: release ptr-libevent@0x7fb348014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378012bf0 | #258 spent 0.091 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac bc fb 64 b8 05 f9 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #356 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #356 | rejected packet: | ac bc fb 64 b8 05 f9 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #356: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 0a ee 39 57 38 66 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #258 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #258 | rejected packet: | f2 0a ee 39 57 38 66 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #258: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0538 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab2380 | handling event EVENT_RETRANSMIT for parent state #441 | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #441 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #441 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49681.03896; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004303 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #441 | libevent_malloc: new ptr-libevent@0x7fb348014c70 size 128 "road-eastnet-nonat-189" #441: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #441) | 51 22 97 d4 f1 aa 56 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 2c c6 09 06 fb 75 c9 7f c8 2c f2 78 2e 86 cf | 10 e2 71 84 ec 7a d3 00 3b 70 b4 67 49 a1 3c 4d | 21 45 e6 9b ef ae 2b 06 a0 05 7e f8 20 46 fb f7 | 0f d4 3c 68 46 a5 74 b1 69 d3 27 26 91 1f fb ea | a2 29 d1 d5 ec 8d ba a9 55 81 7c dd 8b b0 d5 f0 | 65 df 87 db d6 24 b4 8d 72 d6 b9 0a a2 e0 30 fc | e4 5b 51 8c ab 49 74 dc 67 ef 9d ed b7 2a 83 35 | e7 01 ba 5c 14 ef fc c4 a3 30 10 68 67 0e 82 16 | 7d 82 bc d7 25 ec 2f c1 f6 97 ab 23 a3 9a b0 7c | d2 fc 27 3c 76 c0 04 de 3f f1 57 2b 49 24 75 a8 | f7 b1 cb 9a 6d 04 c0 ee c6 a3 f0 18 d5 7f 4e a7 | 2c 74 2c d5 e8 3f cd c9 69 5b b5 31 78 19 bb d1 | 32 75 82 1c 75 29 51 85 94 3b 48 0b 31 5b 51 f5 | 93 f5 fc 53 3a 80 c0 7f 4c 5e 8d 4e c5 a0 2e 05 | fd c5 76 9f 1a 22 f6 df 9c 77 35 ff d3 0b a0 5e | 73 0d 0d 92 2d ee d7 e3 ed 3d 6b a2 54 4a 19 9a | 29 00 00 24 9c 47 e2 58 3f 57 67 62 b6 2e 0d 3a | cb 75 8a b1 7d cd 2d 8e 6c 75 cc 2c b3 bd 9f b3 | c7 bf c7 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 c2 f5 08 e1 41 ca c3 a8 c7 5d b8 | 30 41 e7 b2 e6 39 d6 66 00 00 00 1c 00 00 40 05 | 92 32 df 91 6d 86 4c 91 9f c0 e2 90 d1 aa b2 8d | 1d 5c 17 a3 | libevent_free: release ptr-libevent@0x7fb344046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab2380 | #441 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 22 97 d4 f1 aa 56 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #441 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #441 | rejected packet: | 51 22 97 d4 f1 aa 56 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #441: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0377 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_RETRANSMIT for parent state #452 | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #452 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #452 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49681.043274; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001149 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab2380 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #452 | libevent_malloc: new ptr-libevent@0x7fb344046040 size 128 "road-eastnet-nonat-200" #452: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #452) | 50 11 a1 bf ed cc 03 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 8a 76 57 c4 9b d0 38 b9 d2 c2 4b 69 ba e2 a2 | 5a 11 4c 0a 45 a5 bd e6 9d dd c0 17 e1 2d b4 38 | 58 7e 63 fb 2b 24 a5 63 e6 a8 3b c4 4f a3 78 62 | 66 71 ba 53 c3 c9 09 13 5d ce 86 73 ab 12 87 fa | 35 c6 ff 8b 42 89 25 72 85 e2 b1 87 71 47 d8 8c | ac 7e ee 22 cc e1 04 85 55 54 54 b2 e0 ad d5 39 | 0a fc 74 d3 64 5e 05 35 2e 1a b0 95 d1 38 f8 9d | e0 83 e6 f4 e2 39 cf ac 1a e7 54 52 1b c6 27 82 | 61 87 37 7f 47 a3 e4 be 08 d5 c5 1a f3 6f 8c 8b | 63 33 54 b5 d2 c3 52 ce c9 11 04 d4 3e 44 cf a0 | cb 89 ea 96 9d 4b f1 9d 8d dc 98 07 bd 7b 2f d6 | 8f 69 b2 51 af f2 60 a1 de 25 ef d3 5a 7c e5 c5 | 23 56 16 2b d4 22 e3 1f 96 12 60 85 a4 b1 18 7f | b7 c2 db 59 66 51 fe 4e 85 1b ae a3 40 84 80 d2 | d2 e6 e1 c5 9e 39 9a 1f 42 76 d0 90 ba 8e cc dd | 5a 7b 9a 97 d8 6d 8b db 68 e9 10 8f 2c 64 9d b8 | 29 00 00 24 ba 51 08 92 39 ed 80 e6 57 c3 97 3c | b4 4a b0 29 f6 7a 02 bc 32 31 68 fb 36 27 e7 7b | 80 17 94 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 cf 89 69 b2 6f 00 24 ae 75 3b 9a | 3a b6 ca 28 54 7e 11 99 00 00 00 1c 00 00 40 05 | 3b ea 73 3d bf 95 ec 19 18 d5 48 b2 c7 6d ef 5f | 10 2b 0f c2 | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | #452 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 11 a1 bf ed cc 03 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #452 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #452 | rejected packet: | 50 11 a1 bf ed cc 03 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #452: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0589 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aaa100 | handling event EVENT_RETRANSMIT for parent state #457 | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #457 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #457 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49681.062589; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.5009 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #457 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-205" #457: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #457) | 3d e3 b8 80 8f bd c5 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 7a cc 82 1e 2d 53 a5 ce 9e 27 c2 26 66 c5 e9 | ca b7 3b d7 b3 d5 8f c0 1e ac 61 93 25 30 44 75 | 16 7f 86 32 17 98 9b b2 bd a4 40 62 a6 0f f6 2b | b1 e8 33 29 3f 84 59 09 aa bb 5e 2f cd e9 1a 72 | c5 38 7c e2 59 e4 bc cf cc fa da 23 96 75 c1 c7 | ad fb a2 86 e8 bf a6 3f 1e fe 2b 41 b8 4f 8a 8f | fc 26 0a 24 5a dd 02 29 13 7a b7 2d e7 62 32 f3 | 6a 17 ae ce 85 51 34 8a 1c 60 c5 a3 0d 63 33 17 | b8 03 02 91 41 6c de d7 2a b4 05 f1 63 80 c5 fa | a4 93 75 6c e4 d1 6b 22 4b c0 ed 28 67 a9 70 75 | f9 13 92 e4 11 7c 99 29 38 c0 6b 83 36 d2 38 17 | 99 86 23 65 2a c3 af 64 bb 12 ca 10 15 c7 5a 01 | e6 2f f0 2b 77 e0 ac b3 ec 7b 00 6e 19 4c 17 4e | c2 c8 73 f2 63 d0 16 98 d3 38 a7 f8 87 36 2b 60 | fd b1 1f f7 a9 42 1c 9e d6 33 ef 51 73 04 4f 2e | c1 59 d4 cb eb 88 5a 87 9b 61 94 46 2e b3 5e 3c | 29 00 00 24 bf 42 01 47 80 24 bc 54 c5 78 43 68 | 88 cb 29 3a 9a 04 f3 2d 0c c7 ac f0 bd ad b4 35 | ec c6 0a 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 d2 27 5a 8f 21 c7 36 56 bd fb 12 | 29 e7 69 7f 19 4f 04 f7 00 00 00 1c 00 00 40 05 | 06 c5 63 f1 7d e9 6e 2f 88 1f 75 73 67 c0 d5 c5 | dc d6 be 87 | libevent_free: release ptr-libevent@0x7fb35c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aaa100 | #457 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d e3 b8 80 8f bd c5 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #457 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #457 | rejected packet: | 3d e3 b8 80 8f bd c5 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #457: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad8480 | handling event EVENT_RETRANSMIT for parent state #210 | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #210 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #210 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49681.063875; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.011936 exceeds limit? YES "road-eastnet-nonat-210" #210: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-210" #210: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #462 at 0x557d46af1700 | State DB: adding IKEv2 state #462 in UNDEFINED | pstats #462 ikev2.ike started | Message ID: init #462: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #462: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #462; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-210" #462: initiating v2 parent SA to replace #210 | using existing local IKE proposals for connection road-eastnet-nonat-210 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 462 for state #462 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aaa100 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #462 | libevent_malloc: new ptr-libevent@0x7fb35c035930 size 128 | #462 spent 0.0679 milliseconds in ikev2_parent_outI1() | RESET processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #210 ikev2.ike failed too-many-retransmits | pstats #210 ikev2.ike deleted too-many-retransmits | #210 spent 2.25 milliseconds in total | [RE]START processing: state #210 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-210" #210: deleting state (STATE_PARENT_I1) aged 64.013s and NOT sending notification | parent state #210: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #210 "road-eastnet-nonat-210" #210: deleting IKE SA for connection 'road-eastnet-nonat-210' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-210' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-210 | State DB: deleting IKEv2 state #210 in PARENT_I1 | crypto helper 2 resuming | parent state #210: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 2 starting work-order 462 for state #462 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 462 | stop processing: state #210 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb36803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad8480 | in statetime_stop() and could not find #210 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-210 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-210" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-210' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-210" | stop processing: connection "road-eastnet-nonat-210" (in initiate_a_connection() at initiate.c:349) | spent 0.0874 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 462 time elapsed 0.000557 seconds | (#462) spent 0.559 milliseconds in crypto helper computing work-order 462: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 462 for state #462 to event queue | scheduling resume sending helper answer for #462 | libevent_malloc: new ptr-libevent@0x7fb380043300 size 128 | crypto helper 2 waiting (nothing to do) | processing resume sending helper answer for #462 | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 462 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #462 | **emit ISAKMP Message: | initiator cookie: | b3 aa 18 e3 bb 76 cd a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-210 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 37 e1 dd 76 b8 92 08 2e 86 ea 59 23 d7 a8 a3 c4 | ikev2 g^x 10 20 64 4d 1a 6e f6 be 88 38 70 1d ff a1 81 97 | ikev2 g^x 56 46 d0 11 ce c6 71 4d d3 b8 e9 f6 8f 98 00 29 | ikev2 g^x 10 68 fe 2f 6a fe 59 74 05 66 7b 78 d6 d0 be bd | ikev2 g^x fb fc 90 3b 61 ee 5a 02 67 1c cb 53 c4 30 e1 1c | ikev2 g^x e1 cf 60 fe b2 ba b8 12 9c c1 21 b7 9c a2 2e d3 | ikev2 g^x f2 85 29 0d c8 10 98 b2 a9 8d 09 29 1f fe 72 bd | ikev2 g^x 6f ac bd 80 e6 e9 9d 07 a0 84 25 09 ab 49 d1 fc | ikev2 g^x a4 e5 0d 0e 5a 9c 8e d8 0e 96 4d 74 82 a0 b4 18 | ikev2 g^x 38 39 81 2c 56 26 db 6b e0 e9 32 19 24 e6 ac f3 | ikev2 g^x 8a 50 27 76 e7 46 84 40 39 2a 33 e3 46 30 98 1e | ikev2 g^x a4 e6 6f e2 bf e7 be a6 d5 b2 77 f8 b0 8c 25 cb | ikev2 g^x 3f 99 0a 63 88 e2 f4 8e b0 ed 00 10 7f f7 a6 31 | ikev2 g^x 7b da 9a 1a 53 83 49 e7 c5 ae 8b 25 41 9e cd 02 | ikev2 g^x 64 ab a9 c7 ab 71 01 ef 57 dd 6f c5 35 5b 12 e5 | ikev2 g^x 9c 28 f2 35 96 11 0c e1 05 5e 94 47 29 58 9d 96 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9f cd 6b 85 44 66 e6 2e a2 be db 56 e9 91 ac b0 | IKEv2 nonce be 57 bf 5f a7 03 66 4a a0 9b 90 be 3c 13 94 4b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b3 aa 18 e3 bb 76 cd a5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d2 | natd_hash: port= 01 f4 | natd_hash: hash= f6 1b 11 78 68 c9 76 e3 37 8a 0f 7e ca ac 37 4e | natd_hash: hash= 36 55 96 e1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f6 1b 11 78 68 c9 76 e3 37 8a 0f 7e ca ac 37 4e | Notify data 36 55 96 e1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b3 aa 18 e3 bb 76 cd a5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 75 7d 89 5c 82 a5 9e b6 a0 43 f2 ed 22 d9 e8 25 | natd_hash: hash= c0 74 c1 73 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 75 7d 89 5c 82 a5 9e b6 a0 43 f2 ed 22 d9 e8 25 | Notify data c0 74 c1 73 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #462 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #462: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #462 to 4294967295 after switching state | Message ID: IKE #462 skipping update_recv as MD is fake | Message ID: sent #462 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-210" #462: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.210:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #462) | b3 aa 18 e3 bb 76 cd a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 e1 dd 76 b8 92 08 2e 86 ea 59 23 d7 a8 a3 c4 | 10 20 64 4d 1a 6e f6 be 88 38 70 1d ff a1 81 97 | 56 46 d0 11 ce c6 71 4d d3 b8 e9 f6 8f 98 00 29 | 10 68 fe 2f 6a fe 59 74 05 66 7b 78 d6 d0 be bd | fb fc 90 3b 61 ee 5a 02 67 1c cb 53 c4 30 e1 1c | e1 cf 60 fe b2 ba b8 12 9c c1 21 b7 9c a2 2e d3 | f2 85 29 0d c8 10 98 b2 a9 8d 09 29 1f fe 72 bd | 6f ac bd 80 e6 e9 9d 07 a0 84 25 09 ab 49 d1 fc | a4 e5 0d 0e 5a 9c 8e d8 0e 96 4d 74 82 a0 b4 18 | 38 39 81 2c 56 26 db 6b e0 e9 32 19 24 e6 ac f3 | 8a 50 27 76 e7 46 84 40 39 2a 33 e3 46 30 98 1e | a4 e6 6f e2 bf e7 be a6 d5 b2 77 f8 b0 8c 25 cb | 3f 99 0a 63 88 e2 f4 8e b0 ed 00 10 7f f7 a6 31 | 7b da 9a 1a 53 83 49 e7 c5 ae 8b 25 41 9e cd 02 | 64 ab a9 c7 ab 71 01 ef 57 dd 6f c5 35 5b 12 e5 | 9c 28 f2 35 96 11 0c e1 05 5e 94 47 29 58 9d 96 | 29 00 00 24 9f cd 6b 85 44 66 e6 2e a2 be db 56 | e9 91 ac b0 be 57 bf 5f a7 03 66 4a a0 9b 90 be | 3c 13 94 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 1b 11 78 68 c9 76 e3 37 8a 0f 7e | ca ac 37 4e 36 55 96 e1 00 00 00 1c 00 00 40 05 | 75 7d 89 5c 82 a5 9e b6 a0 43 f2 ed 22 d9 e8 25 | c0 74 c1 73 | state #462 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aaa100 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad8480 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #462 | libevent_malloc: new ptr-libevent@0x7fb36803b0b0 size 128 | #462 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49681.064942 | resume sending helper answer for #462 suppresed complete_v2_state_transition() and stole MD | #462 spent 0.31 milliseconds in resume sending helper answer | stop processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb380043300 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b3 aa 18 e3 bb 76 cd a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #462 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #462 | rejected packet: | b3 aa 18 e3 bb 76 cd a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d2 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #462: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38000feb0 | handling event EVENT_RETRANSMIT for parent state #415 | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #415 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #415 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49681.089154; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004172 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380027d70 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #415 | libevent_malloc: new ptr-libevent@0x7fb380043300 size 128 "road-eastnet-nonat-163" #415: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #415) | 65 fc 55 c7 f1 44 1e 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 9b 11 f8 2e b4 b5 c5 30 9b 3d a0 a2 4b 27 41 | f3 d8 72 20 8a 56 0a 05 ca 4d 84 e6 cb f6 3e 40 | 63 3e 65 dc a2 c0 87 47 ce 3b 5e 72 88 1b 50 31 | 15 c5 cf 6b 4a 2f c7 ec 02 24 2b 5b d8 13 58 82 | ef 96 ce cf 1b c6 83 84 dd 4e ef ff 6c f9 de 4b | fa f0 63 3e cd 62 10 03 38 09 9e db 49 54 15 3a | a8 3d 15 df b8 ef fb f6 60 02 a0 d4 fd 2e 9b e9 | ce 3a 0e 92 13 6c 3b 4e d2 2c 44 8a 4a 9a 05 6f | c3 bf 63 16 b0 c4 63 88 ff 02 84 93 54 65 74 42 | 97 c9 d1 95 9c 76 cf c6 11 6e 97 99 50 ea 6c f5 | 6f f0 5c 9c c9 57 a9 e3 41 19 f6 b0 38 a3 e5 ef | 84 44 8a 93 ae f1 ef 1d 2e 53 2b d3 a8 41 d5 27 | 64 64 ae fa 1d fd ea 61 22 f5 cc 34 a6 a2 ea 37 | 88 8a b9 05 5f 00 cd a9 3b c3 f2 31 36 31 fa 53 | 3d ba 7c f3 35 4b 65 ab 19 3c 20 1a b3 c4 2a ca | f4 c6 08 71 62 bd 13 1a f6 9c 40 a8 5d ea 27 a8 | 29 00 00 24 e8 b8 58 d7 ae 38 da 44 20 ee 1e 02 | 80 cb 41 b6 8f 71 2c 96 9f ff be f1 a6 fa a0 4e | 6d 67 74 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 e0 03 d8 e5 8b 46 47 10 2c a8 6c | 82 9e b3 1d 1e 26 96 28 00 00 00 1c 00 00 40 05 | bb 40 b0 02 70 34 84 30 58 79 6d d4 87 e5 1d 82 | 6b ed a6 65 | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000feb0 | #415 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 fc 55 c7 f1 44 1e 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #415 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #415 | rejected packet: | 65 fc 55 c7 f1 44 1e 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #415: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0733 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37402ffb0 | handling event EVENT_RETRANSMIT for parent state #453 | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #453 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #453 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49681.101493; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001094 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000feb0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #453 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 "road-eastnet-nonat-201" #453: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #453) | ce fd 6b dc 43 f9 b6 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a fe 9f 71 b9 6e 69 49 23 6a d5 87 63 a6 2d 80 | fc 10 3a 5e 08 f9 cc a8 36 72 0a 5b 2e 86 63 13 | 40 48 02 71 3c 66 28 bf ad d7 fa c6 30 96 5e 17 | bf a0 d6 3f 57 20 44 4e e4 00 ed 65 d2 4f 08 d6 | 20 51 fe 4a 66 fa 02 8d 06 00 db e7 45 a0 fc fc | 8c 97 f6 4d f7 77 a5 6a 79 27 5b a0 e1 46 fb a6 | 23 99 9c 26 32 43 cf 04 80 58 6f 87 cb a5 6d d2 | 76 b6 f1 d1 81 44 27 9c 99 67 9d 01 ca 24 01 04 | 53 a4 a4 40 53 47 8f 99 18 29 ec f0 3e a1 86 13 | dc e4 8b ba 11 0f e1 c3 4b ee 52 62 b4 64 8e 2f | 66 5c ba 6c ee 04 04 ed f9 bf cd 94 0a 45 b8 40 | e4 22 f5 d1 d6 df 3a ed ce c6 15 28 b6 04 76 04 | bd c3 75 e8 63 e6 45 74 6f 79 fc 8f 52 0e 1e 14 | f2 bb ae c1 f9 bb 75 83 86 a8 ff 0c d1 f1 5d 0c | a0 ce 81 b4 8f 58 61 e5 9f 60 57 7c c4 7a 6c 26 | 0d 77 a8 c6 b2 9c 49 0c ea 36 61 b7 06 0a 10 da | 29 00 00 24 e4 ac ab 1b 0b c0 0c 13 54 30 d6 3f | 0a a4 17 49 c8 c8 1a 8d ae d5 3b 39 11 5a 2a f6 | e8 ed 91 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 76 3b e4 72 b5 b8 a8 50 2a b0 80 | 46 e6 9d 5f 02 57 8f 98 00 00 00 1c 00 00 40 05 | 9d b5 75 60 1a f1 a6 46 0c b9 85 72 c6 f1 03 f3 | 4e 7a aa 51 | libevent_free: release ptr-libevent@0x7fb374034460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | #453 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce fd 6b dc 43 f9 b6 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #453 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #453 | rejected packet: | ce fd 6b dc 43 f9 b6 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #453: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #357 | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #357 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #357 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49681.104758; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005155 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #357 | libevent_malloc: new ptr-libevent@0x7fb374034460 size 128 "road-eastnet-nonat-105" #357: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #357) | 01 73 53 b2 ed 0d 4f 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 5d e8 51 f8 88 2e 8f 82 b3 f0 c5 8d a9 64 a4 | a0 30 bf b5 c2 12 6f 84 86 c4 e5 7c 43 ef 90 df | 5d 9c 5c c9 94 45 36 f4 9a c7 87 0d ff 17 4f a4 | bd 30 02 23 c4 49 d7 cd 90 90 63 b2 f0 74 82 ef | 7b ab 5b 1a 9b 56 e3 fd 6b c1 60 57 a4 3d 47 37 | cf 84 69 51 e7 0c 33 60 a6 88 c6 d3 40 f2 c0 67 | 8b b5 93 bc 89 96 e7 49 3d 16 a4 fa 47 99 08 bb | bf 76 ad cc b2 29 51 14 b3 93 c1 93 70 ab fa 85 | 9c 87 13 3b 74 20 3c a9 9f e8 37 97 e1 cf 3a 19 | 47 ba 4f bf 93 41 7a fe 94 33 ee 81 fb be 0f 8d | 00 a6 62 b8 8f 57 b3 51 57 ec 11 f0 29 c2 98 0d | c4 d2 cf 4a 38 f9 e9 bb 93 44 3a af 7c 9c 77 58 | 65 26 12 0d 96 b7 42 97 54 c0 ec f8 c4 63 9f c0 | 21 fc 89 98 11 d0 25 94 6e 52 89 6d 61 9b 1b e0 | 4a d8 54 ed 06 da f5 4b d3 dd 7c 2c 10 b9 6d 1c | a3 ef f1 ff a5 e4 02 74 f7 b0 97 d7 72 10 8b a3 | 29 00 00 24 2c c1 df 10 e0 1b 6c 08 e6 87 0f da | 7b 1d fc 5a dc 06 9f d4 9a 8b 4f 0e 09 60 b7 78 | 83 2e 36 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be 3a 2f 62 a9 83 16 c4 9b 57 fc 3c | bc 9e d0 29 41 57 58 a4 00 00 00 1c 00 00 40 05 | 08 0b c8 d5 d5 c0 e6 e6 c4 8a f3 fb 5c 3f c5 0a | 4e c8 f0 d0 | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #357 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 73 53 b2 ed 0d 4f 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #357 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #357 | rejected packet: | 01 73 53 b2 ed 0d 4f 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #357: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344018460 | handling event EVENT_RETRANSMIT for parent state #259 | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #259 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #259 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49681.136044; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006887 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #259 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 "road-eastnet-nonat-7" #259: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #259) | 69 c4 5c 94 f6 f0 24 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe b3 f9 68 3e 85 57 5d 74 26 b7 37 f5 c1 1c c8 | a9 30 6a e1 51 a4 0f d5 ca 35 4b e9 d0 ec d0 ea | 11 06 1a ad 0a 7c 08 a4 ce 70 10 ef b2 c9 82 43 | 06 fb 99 b0 99 d2 5d a2 87 5b cd a0 9b 7d 7a a3 | 30 f9 78 c0 d7 43 6f f3 cc 53 5a 43 25 d8 61 04 | 58 03 b6 71 c6 21 93 59 b3 7c 3f 84 50 6d 48 95 | ef b8 dc 96 69 dc 88 98 10 47 21 0a 3d 72 57 34 | e5 bd d9 b3 4a 55 2e bb 34 64 f1 be 1c 6f f2 7e | c5 4b 83 c8 2c d8 e9 41 02 95 ff 83 96 69 c2 56 | 98 1b 20 30 7a bc 8b ab ee 27 a0 89 22 93 25 c7 | d2 f1 b0 c8 12 06 e6 8d 9a d7 bd fc 06 14 66 23 | 65 ae e6 9e 37 44 0c f0 0e 0e 78 09 b8 a3 32 c3 | c6 25 1b 97 0b 77 db 90 b8 16 58 5f 15 d2 40 fe | 1c d0 5e e3 88 05 3b ef bc 19 2c a9 73 97 03 9a | 26 fc 47 8b 95 24 fe d4 39 f2 65 5a 9f ee 0c cf | 1a 9b 03 45 52 42 61 4d b6 e7 aa 2c 0c 37 c0 61 | 29 00 00 24 c4 2f 3e 0e 76 3e 59 e7 3e 5c 53 28 | 43 02 fc a9 7a 2b 47 13 2c c2 eb 53 3e b5 40 d1 | 94 dc e6 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 85 30 eb 64 9e 84 09 e0 70 76 01 | 65 fa d3 ac 84 56 a3 b4 00 00 00 1c 00 00 40 05 | 64 83 da b1 99 b6 d9 28 72 08 34 2c 77 b4 36 a0 | 74 09 78 83 | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344018460 | #259 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 c4 5c 94 f6 f0 24 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #259 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #259 | rejected packet: | 69 c4 5c 94 f6 f0 24 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #259: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38000a290 | handling event EVENT_RETRANSMIT for parent state #416 | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #416 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #416 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49681.150359; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004629 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #416 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 "road-eastnet-nonat-164" #416: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #416) | 5d bf 34 43 fd eb 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 9c 12 61 6e 55 5f 3f e9 df f9 16 83 d1 25 2a | 72 5f a1 78 f7 87 25 3a 22 d7 65 e6 11 d9 d3 59 | e3 ba 0c 77 63 47 38 eb 2b 7e 21 79 54 43 77 67 | 7d 43 26 41 55 e2 a8 b7 fe 98 ba 7e ee 6e e7 d1 | f4 f4 66 e8 1d dc d6 4c 00 81 99 f5 5a 7b 73 a7 | 30 2a 46 7a 31 1a a2 5d 7f 98 25 46 aa 6e fe 80 | f5 47 c9 6c 4b 73 63 fa cd 88 eb 14 22 c8 b1 b2 | ad 5f b2 f2 36 1e b4 11 ad 9a b6 4a 8b 3e c1 87 | 99 5d 71 91 57 ac 82 f2 a3 ed 29 f1 0e 50 36 50 | 84 2e 3a 51 9c b6 89 41 dc e0 0d 62 c7 07 fd 92 | b2 9d 62 79 ea 78 ed 7f ed 48 ed 1d 98 d3 08 ff | 02 b4 3e 75 4f aa f5 e9 04 8d 83 d6 4c a8 75 42 | 31 a1 15 df b2 8a e4 30 1f 81 68 86 a3 e6 e3 23 | 56 ac 18 47 57 cf 03 de 91 03 0e d5 5d 28 a8 63 | aa 5c 8c 97 5e 5c eb 84 7c 09 fb 47 84 e9 d6 18 | 63 4d 10 b9 7d 4e 26 06 3f 25 b1 aa e9 d4 6c b6 | 29 00 00 24 b4 c4 67 16 b9 c2 e8 af d8 82 12 ab | bc d9 b4 36 b0 6a ad c4 e5 8c 60 6e da e3 9f 02 | d5 5c 1a 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 19 76 97 4c b0 23 bd 31 57 aa f9 24 | a0 38 a6 39 12 13 22 3e 00 00 00 1c 00 00 40 05 | d7 f1 41 97 86 a8 54 0a 0b 1f 8a 34 7f d0 a2 86 | ea 0e a2 fa | libevent_free: release ptr-libevent@0x7fb380036d70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000a290 | #416 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d bf 34 43 fd eb 2e 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #416 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #416 | rejected packet: | 5d bf 34 43 fd eb 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #416: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90400 | handling event EVENT_RETRANSMIT for parent state #442 | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #442 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #442 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49681.153645; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003056 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000a290 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #442 | libevent_malloc: new ptr-libevent@0x7fb380036d70 size 128 "road-eastnet-nonat-190" #442: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #442) | 87 5c d8 cc 20 15 ba 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 68 c7 3c 11 2f 9c 07 85 86 ab fd 70 b3 a3 4b | 4b 15 db 0c 55 63 48 ae b0 dc 7b 34 ba 58 39 54 | 81 cc 25 fd b5 c7 f7 39 e9 8f 2e f9 b9 70 0e c0 | 6c fd 85 d9 5d cd 9d f6 5f 5d 4e 86 38 b5 78 a7 | d8 3d 3d f5 25 e8 c6 56 da a5 38 73 cf 89 18 32 | cf c9 c3 46 fb 60 20 53 a4 ff ca 61 0a 1f ad 2b | a5 f9 d2 1b d5 73 db 29 4b af 73 16 1f 68 6e 88 | a8 b3 5c d6 b4 01 8a 06 65 2f a3 ad 76 14 68 68 | 9f cb 47 75 86 fb 98 94 58 0a 1b c8 87 0a bf b1 | 97 c2 17 ab 5f e8 c3 11 ea 6b b5 fc 83 10 e7 36 | 12 60 e6 87 bd 62 58 93 cb ac ef ca 4f 7f ed 7c | 32 f8 74 a9 e0 2b 69 44 cf b3 d9 33 28 7b 15 7d | 6b 78 11 47 ae a2 e0 8f 52 91 83 be f4 84 c7 17 | a5 b8 57 df 7a 32 65 6d 3b bd ca 10 c7 fb bf 39 | ca 7b 85 7d 49 00 cc 7c 5f b7 c2 27 37 c0 3c 03 | 4d 75 5e a1 e3 8a 16 a4 15 da ac 76 26 68 0c 96 | 29 00 00 24 bc 7d d1 02 e0 e7 26 b2 02 88 eb 9f | 6d cb 61 e3 66 23 89 34 b9 17 0a 11 8d c9 39 5d | 4a 6a d8 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b b4 fa 62 4d 88 e7 9c 8f 3a a9 82 | e0 af 15 4d 27 f2 cd 63 00 00 00 1c 00 00 40 05 | ff 91 89 9d d7 da 34 d7 9b a8 06 6f f9 4a 9b 25 | 2a 77 df 3e | libevent_free: release ptr-libevent@0x7fb3580300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90400 | #442 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 5c d8 cc 20 15 ba 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #442 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #442 | rejected packet: | 87 5c d8 cc 20 15 ba 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #442: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_RETRANSMIT for parent state #458 | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #458 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #458 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49681.159936; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501226 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90400 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #458 | libevent_malloc: new ptr-libevent@0x7fb3580300e0 size 128 "road-eastnet-nonat-206" #458: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #458) | d8 20 9c 76 6a 13 05 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 f8 70 4a 7e 5c d3 77 41 08 04 2a 79 b8 78 55 | 9f 63 d7 1f d9 bd 04 73 e8 de 1f e6 51 71 d1 c1 | 71 09 97 4a 5c 16 68 a0 aa 69 e9 b4 93 ac ba f6 | 92 85 87 a8 c8 1f 88 3f 36 bb 45 8a 62 53 f9 71 | 32 e3 0c 69 bc 64 74 29 df 76 29 f7 54 0a d6 9e | bf f9 de ca 92 41 8b 95 09 7a 0d 5d 50 17 4e 54 | 40 99 d8 f9 ca e7 ca c6 0c af 31 22 59 39 c6 0f | c7 31 f1 5e c9 b0 5a 0c c9 3f c9 f9 d7 bd 4f d2 | fd 98 c7 19 a0 f3 e9 01 16 f3 fe 75 35 59 15 08 | 13 ea cd 50 33 e8 15 ab 01 f5 9e c1 43 d2 27 90 | 39 d5 e2 89 77 57 ec 66 ab 2d 6c 09 fc 1d 8f 1a | 62 91 d6 59 58 86 af 9e fa f2 4d 80 b6 39 ef 93 | e4 aa 9e 6f 49 aa 2c d4 54 59 f2 01 66 25 3e 6c | 9e 0b 06 28 b9 af 2e bd e7 a4 57 6f f0 5b 4c cd | 6a 03 04 af 85 10 e3 f2 17 ad 37 f3 24 3e 66 fb | 27 c7 a1 c5 2e 32 66 c3 94 bc a6 2b 60 cb 4f f9 | 29 00 00 24 33 eb be f2 9e 94 9d 08 4c d8 00 c2 | f8 2c a4 ef 00 e3 f7 7a 62 72 9a 99 65 d6 f3 0e | ff c8 b6 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 01 77 97 bc 56 25 23 ed d6 15 51 | 7d a3 3f e8 c0 74 6b cf 00 00 00 1c 00 00 40 05 | 8f 1b 57 d9 1a 63 f1 b3 99 7b 22 3d 44 e6 21 51 | 1c 41 cc 24 | libevent_free: release ptr-libevent@0x7fb36802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | #458 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 20 9c 76 6a 13 05 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #458 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #458 | rejected packet: | d8 20 9c 76 6a 13 05 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #458: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0556 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a25d10 | handling event EVENT_RETRANSMIT for parent state #358 | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #358 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #358 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49681.189243; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004942 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #358 | libevent_malloc: new ptr-libevent@0x7fb36802a950 size 128 "road-eastnet-nonat-106" #358: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #358) | 9c 16 21 10 e3 b0 2f 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 b0 5e 24 2c 38 69 f7 5e 0a ef 9c cd 0c a9 a2 | e7 60 22 31 02 17 4e 87 ab da 67 2c 74 68 e6 5c | 3c 13 72 b8 82 de 1f 97 f0 91 0b ef 5f 05 b5 88 | 8f 55 10 d6 ed 84 95 00 12 6f 2a 48 1a 79 36 91 | 49 04 49 1e 83 7f 51 0b cd 40 c4 12 1d 28 81 4a | ff 1e be db 2c 06 48 44 01 2b 86 9e 50 88 79 26 | a2 fe 2d b6 28 25 0f 1c 72 e5 7c 02 81 23 76 48 | e4 63 77 54 94 1c a2 42 e7 62 79 1a 9c c2 d3 a5 | 84 2a 02 f0 5d 86 de 0c ac 44 c1 bc a9 db 93 da | ab e8 d1 96 60 b7 1e 28 8e ce cc cb 77 fb 32 3a | af 1c d9 5d 2b 9d 4c bb 37 50 e3 2c 2a bd a4 df | 6f 99 23 0d 27 83 b0 b4 f9 48 a2 69 86 2e 3a c0 | 5d bf ed 94 bb f2 f3 07 e1 00 d8 2f 62 9b ee ec | b5 9a a1 3e ac 61 be 8a ce 7d 14 b6 c3 13 21 43 | 2f 85 9a 2f fd b3 5f a3 b2 e0 9c 9a 19 21 fa dc | c3 c9 17 3d e7 0b 51 07 b0 13 9d cf 7d 38 e5 ef | 29 00 00 24 31 6e a1 8e 9b bf 74 40 01 d9 c6 2f | f4 95 5e 1f af be c9 b5 67 9c 79 1e 7d 41 57 e9 | 2e 59 a1 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 2b df 62 51 b1 0d 46 7a 83 b8 02 | 18 9c 1e 91 3d 80 67 46 00 00 00 1c 00 00 40 05 | 21 2b d2 d4 2f 80 55 47 29 a9 2f db 69 80 68 e4 | e7 d9 41 df | libevent_free: release ptr-libevent@0x7fb37c014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a25d10 | #358 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9c 16 21 10 e3 b0 2f 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #358 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #358 | rejected packet: | 9c 16 21 10 e3 b0 2f 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #358: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b650 | handling event EVENT_RETRANSMIT for parent state #211 | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #211 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #211 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49681.193539; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.017801 exceeds limit? YES "road-eastnet-nonat-211" #211: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-211" #211: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #463 at 0x557d46af2cc0 | State DB: adding IKEv2 state #463 in UNDEFINED | pstats #463 ikev2.ike started | Message ID: init #463: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #463: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #463; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-211" #463: initiating v2 parent SA to replace #211 | using existing local IKE proposals for connection road-eastnet-nonat-211 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 463 for state #463 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a25d10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #463 | libevent_malloc: new ptr-libevent@0x7fb37c014c70 size 128 | #463 spent 0.0766 milliseconds in ikev2_parent_outI1() | RESET processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 0 resuming | start processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #211 ikev2.ike failed too-many-retransmits | pstats #211 ikev2.ike deleted too-many-retransmits | #211 spent 2.96 milliseconds in total | crypto helper 0 starting work-order 463 for state #463 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 463 | [RE]START processing: state #211 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-211" #211: deleting state (STATE_PARENT_I1) aged 64.019s and NOT sending notification | parent state #211: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #211 "road-eastnet-nonat-211" #211: deleting IKE SA for connection 'road-eastnet-nonat-211' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-211' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-211 | State DB: deleting IKEv2 state #211 in PARENT_I1 | parent state #211: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 463 time elapsed 0.000882 seconds | (#463) spent 0.888 milliseconds in crypto helper computing work-order 463: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 463 for state #463 to event queue | scheduling resume sending helper answer for #463 | libevent_malloc: new ptr-libevent@0x7fb38403c470 size 128 | crypto helper 0 waiting (nothing to do) | stop processing: state #211 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb380032bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b650 | in statetime_stop() and could not find #211 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-211 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-211" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-211' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-211" | stop processing: connection "road-eastnet-nonat-211" (in initiate_a_connection() at initiate.c:349) | spent 0.0575 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #463 | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 463 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #463 | **emit ISAKMP Message: | initiator cookie: | 82 4f 79 37 d2 0d 41 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-211 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 47 90 64 a0 3a db 52 d6 c6 b4 21 5d 30 95 90 4d | ikev2 g^x ec 3e 65 f9 a3 2a c0 c0 7d e8 b2 f7 1e 08 f4 cc | ikev2 g^x 30 5c 17 eb a6 d5 4e 6e 17 f4 ed c0 bb f3 91 4e | ikev2 g^x 29 c8 3b 87 04 44 02 f9 0c 4c 73 bd d1 0e d4 bf | ikev2 g^x c3 01 38 a2 ee a1 61 19 01 62 c9 01 0a 14 69 dd | ikev2 g^x 59 d3 14 b1 8b 13 6d e7 0f 1d 11 59 11 9b 90 f3 | ikev2 g^x aa 66 ef 87 af 13 48 7f 6e c1 0d b9 f9 71 ad 9d | ikev2 g^x fd 12 e0 bc 30 d7 16 13 c9 f0 f8 64 57 36 fa 5b | ikev2 g^x d1 d8 74 64 e5 de 63 84 ef e1 12 12 26 93 3e 5c | ikev2 g^x b3 7f 8e 2c 1b eb d2 40 f2 01 5a e7 a8 30 ce b1 | ikev2 g^x 5c 5e 42 a8 26 40 52 c4 dc ea 04 68 87 26 50 e6 | ikev2 g^x 46 ae 37 b9 e4 fe 3f ef f2 8e a4 4f 04 25 af 76 | ikev2 g^x c9 39 80 05 08 fd ea 60 66 c5 24 89 72 f4 32 ff | ikev2 g^x ed 8b 39 48 50 c3 c4 68 91 e7 fc 82 bb 80 ce 9d | ikev2 g^x b8 47 ce dd c6 cc 21 8c 6f 88 e2 73 75 00 d9 09 | ikev2 g^x 84 88 f6 ce 7e 64 f7 42 86 d8 a7 50 3c 43 db 24 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4c d8 7a cc cf f5 14 f0 01 a0 b3 f6 54 e1 4b f5 | IKEv2 nonce 78 b9 2e d9 dd c8 bf f8 13 79 83 13 b9 47 db df | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 82 4f 79 37 d2 0d 41 4a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d3 | natd_hash: port= 01 f4 | natd_hash: hash= a6 0d e0 3b 3f 2d f3 17 7e c2 11 72 87 7f c1 e4 | natd_hash: hash= a0 63 0f 3f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a6 0d e0 3b 3f 2d f3 17 7e c2 11 72 87 7f c1 e4 | Notify data a0 63 0f 3f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 82 4f 79 37 d2 0d 41 4a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e9 2f a4 cf 6a af 14 cf 3c 1b bf 7a 8b a2 e8 94 | natd_hash: hash= b0 6c 66 23 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e9 2f a4 cf 6a af 14 cf 3c 1b bf 7a 8b a2 e8 94 | Notify data b0 6c 66 23 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #463 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #463: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #463 to 4294967295 after switching state | Message ID: IKE #463 skipping update_recv as MD is fake | Message ID: sent #463 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-211" #463: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.211:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #463) | 82 4f 79 37 d2 0d 41 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 90 64 a0 3a db 52 d6 c6 b4 21 5d 30 95 90 4d | ec 3e 65 f9 a3 2a c0 c0 7d e8 b2 f7 1e 08 f4 cc | 30 5c 17 eb a6 d5 4e 6e 17 f4 ed c0 bb f3 91 4e | 29 c8 3b 87 04 44 02 f9 0c 4c 73 bd d1 0e d4 bf | c3 01 38 a2 ee a1 61 19 01 62 c9 01 0a 14 69 dd | 59 d3 14 b1 8b 13 6d e7 0f 1d 11 59 11 9b 90 f3 | aa 66 ef 87 af 13 48 7f 6e c1 0d b9 f9 71 ad 9d | fd 12 e0 bc 30 d7 16 13 c9 f0 f8 64 57 36 fa 5b | d1 d8 74 64 e5 de 63 84 ef e1 12 12 26 93 3e 5c | b3 7f 8e 2c 1b eb d2 40 f2 01 5a e7 a8 30 ce b1 | 5c 5e 42 a8 26 40 52 c4 dc ea 04 68 87 26 50 e6 | 46 ae 37 b9 e4 fe 3f ef f2 8e a4 4f 04 25 af 76 | c9 39 80 05 08 fd ea 60 66 c5 24 89 72 f4 32 ff | ed 8b 39 48 50 c3 c4 68 91 e7 fc 82 bb 80 ce 9d | b8 47 ce dd c6 cc 21 8c 6f 88 e2 73 75 00 d9 09 | 84 88 f6 ce 7e 64 f7 42 86 d8 a7 50 3c 43 db 24 | 29 00 00 24 4c d8 7a cc cf f5 14 f0 01 a0 b3 f6 | 54 e1 4b f5 78 b9 2e d9 dd c8 bf f8 13 79 83 13 | b9 47 db df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 0d e0 3b 3f 2d f3 17 7e c2 11 72 | 87 7f c1 e4 a0 63 0f 3f 00 00 00 1c 00 00 40 05 | e9 2f a4 cf 6a af 14 cf 3c 1b bf 7a 8b a2 e8 94 | b0 6c 66 23 | state #463 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c014c70 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a25d10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b650 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #463 | libevent_malloc: new ptr-libevent@0x7fb380032bf0 size 128 | #463 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49681.19503 | resume sending helper answer for #463 suppresed complete_v2_state_transition() and stole MD | #463 spent 0.343 milliseconds in resume sending helper answer | stop processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38403c470 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 82 4f 79 37 d2 0d 41 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #463 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #463 | rejected packet: | 82 4f 79 37 d2 0d 41 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d3 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #463: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350018460 | handling event EVENT_RETRANSMIT for parent state #454 | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #454 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #454 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49681.196186; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001081 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840318d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #454 | libevent_malloc: new ptr-libevent@0x7fb38403c470 size 128 "road-eastnet-nonat-202" #454: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #454) | 3e f1 41 2a cb 15 91 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 3c 6a c7 38 95 77 87 5d 1e c8 dc ba 22 fc 03 | 1c 9c 6c 7f 8e 0e fd af 13 dd 37 0a 23 40 7c ce | 87 9a c3 3c b2 29 81 32 66 6c ba 2d 43 73 e4 9f | 34 a2 6c c8 c3 e8 8f d1 b2 45 4b 81 58 b8 9d f6 | d7 6b 98 99 af 72 e9 d0 c7 87 b4 74 61 b8 6f 67 | 18 e9 20 82 3b 32 85 5d b7 fc 19 46 92 6b 65 26 | b2 31 d6 c3 36 5c 46 dd c1 b3 1a ba 4d 4c b4 fb | c9 29 e2 5f 88 92 21 72 05 11 74 76 83 6a f0 05 | 70 a8 4f 78 f0 27 41 4f 18 70 43 44 55 76 41 4e | d4 55 4f 0d be 47 fb 72 63 29 ab 49 16 15 52 01 | 76 0d 0d 3c d4 72 41 c1 63 95 85 97 21 62 a1 0c | 98 62 73 cf ff 81 3f b1 d6 5b a3 17 9c bf 13 ea | 76 47 19 6b ec 4e dd d2 c8 fc 10 8a 93 9d e2 40 | 1a 9a ec ba a4 26 5c 4d 01 9a 6a 47 3b fc ea 48 | 29 30 cf ee 79 66 a8 78 a7 b1 8e ad 2b ce 52 2c | 72 05 7f 8f f6 f4 ff ed 12 0a b1 b7 de 27 bb d0 | 29 00 00 24 42 50 bc e2 16 2b 34 89 d5 4e 59 5a | a4 d3 d2 a4 86 df 60 97 ee fa 90 f6 ad 34 8e f4 | 49 50 59 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 1c 0d 08 a9 24 58 8d 73 8e f2 10 | b3 0d e0 67 52 ae c5 46 00 00 00 1c 00 00 40 05 | 72 a5 1c 62 b2 bc b3 f0 fe 77 e1 0e f2 db 46 ae | 09 80 33 7f | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350018460 | #454 spent 0.087 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3e f1 41 2a cb 15 91 c1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #454 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #454 | rejected packet: | 3e f1 41 2a cb 15 91 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #454: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf00 | handling event EVENT_RETRANSMIT for parent state #417 | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #417 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #417 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49681.210432; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004618 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #417 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-165" #417: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #417) | d9 e4 18 5f 59 64 b9 ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 fd ed 03 c4 13 a8 51 65 6c f8 7b f8 e0 2d 89 | 59 12 b6 d0 fa 5d d3 b6 48 1f 05 4f d0 37 4e 96 | b6 b0 a9 07 5a 84 b2 22 72 c2 6e e4 2c 16 e8 fb | c8 92 b8 74 ce 3f 40 30 b5 60 8c 95 d1 d0 42 81 | 96 4a 3e 9a 08 06 af be 4a d9 72 15 c0 c3 46 78 | d0 1e d0 10 cd c4 48 fd 2d ac c2 45 66 8d 26 84 | dc ff cb c9 a3 60 b9 5c 03 1c 63 7c ad bd 60 96 | ce 2e d7 57 49 16 93 e7 43 2d b6 d5 b4 ce 5b 3b | 96 51 3a 88 ff 32 38 dc 5f 0b a8 74 a0 1a 49 87 | b5 db a2 1f ed 10 a6 d0 7a 48 4a 90 79 4e 5a f9 | 2b 8b 33 88 7e f6 9a 82 54 47 b3 ae d3 d5 19 8e | 35 94 b5 a7 07 70 69 91 1e 2e 08 a0 fa fa bf a8 | 09 5a 06 2f 9a 90 75 b5 b1 fe 11 2e 8d bc e2 8f | fc 8a 4c 02 b2 2c 51 5d d4 fd cc 21 3e c1 63 73 | 47 88 57 72 c3 e3 90 eb 42 71 fd 34 f9 5d 5f ad | 35 a7 22 19 95 d8 2d 82 e5 c2 0e d7 d8 88 22 f6 | 29 00 00 24 df 2c 07 75 0e bd bd 78 6f 85 ca 62 | 53 2e a0 29 e4 f9 3b 0b 22 fe c0 44 7c 40 c5 a3 | 8b 56 a4 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 33 f3 05 bf ce a7 d8 4f e5 99 24 52 | 75 47 3a d4 7d 71 ad 77 00 00 00 1c 00 00 40 05 | 01 69 5d 3d 4a 00 3f a4 76 63 f4 90 ae 45 6d 8b | 22 6e e0 18 | libevent_free: release ptr-libevent@0x7fb3680300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf00 | #417 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 e4 18 5f 59 64 b9 ab | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #417 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #417 | rejected packet: | d9 e4 18 5f 59 64 b9 ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #417: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0667 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3500300a0 | handling event EVENT_RETRANSMIT for parent state #443 | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #443 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #443 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49681.236817; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002689 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf00 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #443 | libevent_malloc: new ptr-libevent@0x7fb3680300e0 size 128 "road-eastnet-nonat-191" #443: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #443) | 99 e5 a7 37 44 6e 78 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 12 f7 51 e4 9b df 2b ce ce f2 ee 7b 13 94 51 | 6a dd a6 05 05 c5 f9 51 17 99 5e 09 04 c9 1f b2 | fd 1f 26 33 db d5 00 aa 13 04 1c 40 7e db ca 5a | d7 f8 59 90 a2 34 4e 73 d9 b4 1b 12 47 af 09 6a | 3d c6 bc 0a 75 d2 59 20 61 0f b0 78 2f f9 96 a8 | bc 6e fc a4 91 79 01 c5 c6 bf 55 5f ca 2a 71 57 | 55 3a c2 55 6a 02 68 58 b9 3f ee 10 26 00 19 6c | a4 9b 2b c5 37 91 ea 3d f7 92 10 15 3e 21 96 87 | 2b 42 57 b1 96 6e 0c 94 b6 11 c4 ca 44 56 8a bf | 72 e1 9f 77 2e b1 9f 72 96 c2 0b cd e9 02 1e ed | f4 40 75 83 23 4e d6 76 72 99 62 9c 55 c4 df 8d | 23 38 27 3c f9 b9 3f 1c 37 14 80 74 3c 7a 5d f8 | 1a 0c 7f 0d 3a 48 23 4c 35 58 8d c3 50 e9 4f d5 | 3a d4 b6 fa d0 f4 f0 02 7b 72 04 9c a6 5b 57 b7 | 6f ac e8 68 3f 0b ab 1c 0a 68 cc 2e 68 e9 56 e5 | 09 9a 32 64 09 77 95 51 f1 d9 2b dd e7 b2 96 44 | 29 00 00 24 d1 ee 39 81 5a e3 54 a6 73 c8 50 03 | 2c 50 da d8 32 42 2b e6 ab ed 1b 51 ff 8e f3 84 | d3 ae 77 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 53 91 6c eb c8 88 e0 f9 9e 54 62 | 8e 3a 67 1c 98 f2 42 50 00 00 00 1c 00 00 40 05 | 84 7e 67 f1 2a 8c cc 0b 8d 85 0d 9d a9 c1 72 b7 | 86 11 2f 01 | libevent_free: release ptr-libevent@0x7fb35003a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3500300a0 | #443 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 e5 a7 37 44 6e 78 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #443 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #443 | rejected packet: | 99 e5 a7 37 44 6e 78 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #443: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374013710 | handling event EVENT_RETRANSMIT for parent state #260 | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #260 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #260 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49681.239111; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007298 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3500300a0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #260 | libevent_malloc: new ptr-libevent@0x7fb35003a770 size 128 "road-eastnet-nonat-8" #260: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #260) | a8 de 56 29 b7 d6 fa 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 e3 e7 0b 5e 0a a2 78 28 90 d4 10 18 db 3b 08 | b2 da 89 a3 10 0a cf 73 47 c7 8b 62 54 ef 17 0b | 52 d6 fe 33 62 21 4b 61 30 79 d1 82 82 85 ea 34 | 5e 16 ec db dd eb 97 56 18 30 74 8c 1f 6e 05 89 | 21 09 2b 1f b9 bc b7 45 38 93 12 7a 5d 44 53 c4 | 90 d3 d5 13 c2 0f fd 6b 37 3e 25 38 05 ed f0 2b | cb 0f 13 a8 c7 9b fe 60 00 1a 65 af 42 72 d4 bd | f1 07 94 0e 72 26 91 81 83 ee ff ef 41 c2 92 80 | a0 7f b9 6c 1f d2 e5 4b 34 fe 68 33 41 4d c0 3b | fb 7e 82 89 76 4f ab b4 81 d9 20 1a 79 fa de 75 | 7d a8 cd 19 c4 08 7c dc 7d 50 74 8e 78 b5 b3 64 | 8b 8f bd fd e8 f9 24 be 78 a0 45 9f 10 40 3e e1 | 49 ba 58 e8 63 d1 38 81 0c 79 61 75 c1 98 81 43 | 9b e0 a1 0d fc da 35 4b 0e a9 e1 35 63 d5 73 64 | db 23 3e 1b a9 3a 4e c0 e5 7f 6a ab 90 f3 cd 49 | 1b bf e5 c9 ab 56 60 25 6c 22 94 4d da ff b4 bb | 29 00 00 24 2b a8 af 62 73 94 e5 0a 7f 70 bf f7 | 73 9f 36 a9 cb 1b e2 09 0a 24 49 93 58 be a0 29 | 94 31 83 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 87 5d ef 8f 65 c8 58 d0 3b 6f e5 | c6 10 af 28 1a 1c e2 ed 00 00 00 1c 00 00 40 05 | 7a 28 e6 3f f8 c3 d1 0c 25 ff 6a 7c a9 a5 77 33 | 24 34 82 26 | libevent_free: release ptr-libevent@0x7fb344014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374013710 | #260 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 de 56 29 b7 d6 fa 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #260 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #260 | rejected packet: | a8 de 56 29 b7 d6 fa 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #260: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0592 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7b910 | handling event EVENT_RETRANSMIT for parent state #359 | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #359 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #359 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49681.263424; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00394 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374013710 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #359 | libevent_malloc: new ptr-libevent@0x7fb344014c70 size 128 "road-eastnet-nonat-107" #359: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #359) | 73 c2 2a a2 cb e2 3d 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 2e 83 fc d4 94 f1 45 60 7e d6 c0 1f 1c e7 33 | 0f bd b7 8a 76 4b 8b 45 55 e6 bb 84 3d 22 78 af | 75 6e da ff d0 e9 4b 87 08 80 14 e9 1e 9e bb 0e | 16 e9 ea 66 ca bd 7c 66 87 ad a8 d9 21 e1 38 83 | 1f 32 ef a7 2f 0e bf 2d 1d 63 39 6b 83 61 62 c6 | 3e 6a a6 28 e7 8f 0a b3 a0 d9 53 fb be 77 6d 21 | 33 ab c4 d4 01 99 45 77 31 5e 2f ff 5a 01 15 07 | d7 80 2f 1a 7e c3 c0 54 fe ea 5a 9f 7b b7 54 0e | 9f aa da f6 69 55 9a 24 0b a7 e8 7e 52 f9 f8 78 | ba 68 8d a1 bc 1f b0 9f 73 b4 50 08 1b 93 cf 3c | ca 2c f0 94 b0 7c a2 eb fc f9 ec 95 a0 6e 85 2f | 2e ef 23 90 9d 23 ef b2 33 25 ac 56 cb 51 63 74 | c1 ab 1f 93 d7 e6 e0 11 36 c8 47 24 fc 03 91 1a | 9f ca af ad 3e 92 13 be 1e e3 b4 78 2a ad 4c d9 | b9 b1 7c 5e 5e 7c 3e c4 e0 d5 55 d6 b9 f7 15 83 | 2f 6c 01 ee d5 14 3b f0 0d dd 1e 11 8b 30 cd e0 | 29 00 00 24 69 b6 35 41 69 53 97 ba 18 48 44 fd | d5 e2 9a 31 05 82 94 36 da fb c0 91 72 56 36 c7 | c4 dd c7 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 a1 1b b6 5c a0 e8 d3 82 8b cf 19 | 85 69 c3 9f 45 ea 96 77 00 00 00 1c 00 00 40 05 | 5b ca 3a 7b b0 51 af 81 eb d5 3c 03 e7 f7 fa 57 | 2f 45 5b b9 | libevent_free: release ptr-libevent@0x7fb37803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7b910 | #359 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 73 c2 2a a2 cb e2 3d 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #359 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #359 | rejected packet: | 73 c2 2a a2 cb e2 3d 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #359: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340025210 | handling event EVENT_RETRANSMIT for parent state #455 | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #455 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #455 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49681.275728; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001719 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7b910 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #455 | libevent_malloc: new ptr-libevent@0x7fb37803b0b0 size 128 "road-eastnet-nonat-203" #455: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #455) | a6 08 27 1f 75 50 39 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 c7 bc 11 60 3e a6 9a 85 6d e5 42 37 d7 18 00 | 0c ea 15 92 bc 93 3a fa 4f c0 cd 9b 9d 21 1a ec | 13 f0 fc 0b a2 84 9a a5 b1 57 c2 a8 ab 33 a5 7b | 04 ac cd 61 b9 a7 e2 6f b1 9a 56 b1 3c b1 a4 2e | 8d 80 e0 ac 78 ee b2 78 51 00 d0 a0 eb cf 06 35 | 9c 7e 2a 73 b1 56 cd fe b7 d8 9d ab 84 62 9b e7 | ab 4d 04 16 06 c3 1a 9c 88 af e1 4b bd a0 09 ac | fd 8a ba 51 00 10 a1 a7 a6 a2 56 74 b5 9b 53 af | 87 60 09 5b 74 75 e3 41 f8 3d 7a cf 0c 36 f7 ea | aa 1b 05 8b 54 d5 b2 e1 fe 9e d4 4e f4 ae 74 22 | 98 23 25 ba ff 74 27 da 25 81 74 09 8c 6b 8b 69 | 54 dc 62 05 8c 02 be b4 b0 c4 25 43 18 99 9f c3 | 41 7e c1 29 f3 a3 60 75 de aa 26 bd a3 38 8c ad | a8 31 89 d2 48 90 d9 19 ce f4 34 9e 9d e7 1c e9 | d3 7f ee 85 33 84 75 6d 04 5b b4 a0 96 a6 93 65 | 8d 1c 3a f8 14 81 03 4c 63 f4 25 e5 59 99 ac 86 | 29 00 00 24 6a 39 a6 75 f8 f4 82 47 b3 0b 2e 10 | f3 31 67 d9 88 26 9d 5b f1 75 40 6b 34 32 86 bb | 7a 07 84 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 cd df 41 37 6e 2d fc 1b 29 38 8e | de fc 0c a0 44 c7 44 d5 00 00 00 1c 00 00 40 05 | 6e c0 59 83 50 2c 8a cc c5 6e 0a 98 ab 1c 00 ee | ff c6 95 31 | libevent_free: release ptr-libevent@0x7fb35804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340025210 | #455 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 08 27 1f 75 50 39 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #455 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #455 | rejected packet: | a6 08 27 1f 75 50 39 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #455: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a43dd0 | handling event EVENT_RETRANSMIT for parent state #418 | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #418 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #418 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49681.277017; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004263 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340025210 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #418 | libevent_malloc: new ptr-libevent@0x7fb35804b850 size 128 "road-eastnet-nonat-166" #418: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #418) | 1c 58 36 d0 b8 a0 d1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 21 69 13 ea 9b 51 f5 f8 3d bc 58 75 ed a9 fd | 17 d1 ac 45 30 9e bb dc f5 67 d6 33 5f f9 21 3b | d7 08 0c bd e4 4c bf b2 e0 66 df d2 39 12 b4 cd | 51 1d 79 99 b2 28 9d 92 25 3d de c7 de 50 60 c0 | b1 e7 b1 2f 20 ba 56 e0 cc d5 d3 89 fb f3 3a 69 | 08 b8 19 34 ad 51 11 33 2c 83 6c 01 df 40 a9 5a | d2 8e ac 81 f5 73 32 a5 92 89 d9 43 53 9f d1 60 | 24 f6 18 43 4f b2 cc 04 87 ab 6f 28 3d 9c e1 be | 1d b6 6f 40 8a 39 f7 27 97 65 7c fa 70 bb d3 47 | 6d aa 41 65 fd 87 5b bf 5a 85 1c ca 2d 31 4b 63 | 3b 57 1d 34 66 19 31 70 16 5e 12 2a 4b 3c f3 aa | c7 b4 1f b1 9b ff 71 77 21 47 b5 ee 99 1f 02 09 | 95 71 68 b7 06 9b 0f 65 04 ee a4 b9 3b 45 42 02 | 7d d2 87 0e 66 c1 75 4c ff 7a f3 83 39 de 46 b2 | 20 fd 8a d9 22 4f c4 77 47 fd 4b 1b 01 cf 2f ef | dc 02 1e 19 bc 0a 3d 9b 32 25 8e a1 b4 27 34 08 | 29 00 00 24 1a d8 6e 71 ca d7 ba 26 1e 49 f1 5f | c1 b0 03 8a 8a 69 67 55 4a ef 6c 1a 26 5d 01 35 | 4b 44 6d e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 63 ba bc 17 58 ec 8f 3d 47 af 87 | d9 d9 f5 4c 16 0e 40 2b 00 00 00 1c 00 00 40 05 | 0c c9 6a 54 72 2b 9b 5b 7b 1a a4 b5 a9 4f 1c b9 | a1 57 0c cc | libevent_free: release ptr-libevent@0x7fb3600180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a43dd0 | #418 spent 0.0943 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c 58 36 d0 b8 a0 d1 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #418 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #418 | rejected packet: | 1c 58 36 d0 b8 a0 d1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #418: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0408 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a30d30 | handling event EVENT_RETRANSMIT for parent state #459 | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #459 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #459 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49681.284284; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500058 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a43dd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #459 | libevent_malloc: new ptr-libevent@0x7fb3600180b0 size 128 "road-eastnet-nonat-207" #459: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #459) | 64 1c f9 72 57 02 e5 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 f4 91 af e8 cc 47 24 c2 b5 4c 3e ed df 87 0c | 09 e0 4b 07 1e 23 c5 7e 86 e2 5a ab 7d 41 06 3d | 7f 7d f9 8e b6 58 c8 fa 4a e7 6e 59 bd 9e 19 5b | d0 22 36 6d 62 9e c7 d4 0e 8a 77 c0 e4 05 9e c6 | 38 14 50 50 10 9e e8 30 b1 17 07 a8 ec 87 4b 21 | 15 4c 43 ee b6 9d 8d a1 9c 18 3d 34 43 97 8f 77 | 9a 8e 35 11 77 6c 19 4c d5 d6 10 76 41 7d 92 29 | ce 7e b0 f8 dd e1 3c da bd 28 65 ea 34 c0 d5 5e | 87 61 2d 03 e2 eb 39 88 92 b2 21 9a 8c ff 81 cd | e0 87 95 3d 88 8d a2 1e 66 0d db a2 7a 79 4c cc | ae 9a d3 e6 87 6a 1b 78 ae 44 bb 23 8a 41 53 1f | af 3f 42 6b ff 45 a9 da 42 e2 38 bd 4c 50 bf a8 | 3b 16 b5 57 9a cf 28 d9 88 40 31 6e bd 9a 3e 51 | 61 82 b6 d4 f2 88 81 2c 57 c3 85 0c a7 ff fd 6c | ed 2a 14 13 51 d6 b5 56 aa 0c 26 20 25 e3 9c 40 | 12 38 26 e0 f5 9a 6e 40 35 0c 6b 0a 6d b3 65 32 | 29 00 00 24 5c 75 af 9e f8 ea 62 49 48 89 05 1e | 77 92 7c c2 74 9a fc 43 04 bc b7 18 cc f7 58 3d | 9b c8 34 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 7f b1 c0 22 56 8e bd 29 fd 39 4f | 5d 90 ed 84 8a 20 f8 23 00 00 00 1c 00 00 40 05 | 58 59 18 6a d1 74 dc 11 3e 54 b0 34 57 9e 0a 5d | 5a f6 05 3b | libevent_free: release ptr-libevent@0x7fb37800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a30d30 | #459 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 1c f9 72 57 02 e5 bf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #459 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #459 | rejected packet: | 64 1c f9 72 57 02 e5 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #459: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46950 | handling event EVENT_RETRANSMIT for parent state #212 | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #212 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #212 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49681.30258; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010035 exceeds limit? YES "road-eastnet-nonat-212" #212: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-212" #212: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #464 at 0x557d46af4280 | State DB: adding IKEv2 state #464 in UNDEFINED | pstats #464 ikev2.ike started | Message ID: init #464: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #464: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #464; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-212" #464: initiating v2 parent SA to replace #212 | using existing local IKE proposals for connection road-eastnet-nonat-212 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 464 for state #464 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a30d30 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #464 | libevent_malloc: new ptr-libevent@0x7fb37800cf80 size 128 | #464 spent 0.0713 milliseconds in ikev2_parent_outI1() | RESET processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 9 resuming | pstats #212 ikev2.ike failed too-many-retransmits | crypto helper 9 starting work-order 464 for state #464 | pstats #212 ikev2.ike deleted too-many-retransmits | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 464 | #212 spent 2.64 milliseconds in total | [RE]START processing: state #212 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-212" #212: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #212: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #212 "road-eastnet-nonat-212" #212: deleting IKE SA for connection 'road-eastnet-nonat-212' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-212' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-212 | State DB: deleting IKEv2 state #212 in PARENT_I1 | parent state #212: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #212 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 464 time elapsed 0.000937 seconds | libevent_free: release ptr-libevent@0x7fb3580180b0 | (#464) spent 0.948 milliseconds in crypto helper computing work-order 464: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46950 | in statetime_stop() and could not find #212 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 9 sending results from work-order 464 for state #464 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #464 Initiating connection road-eastnet-nonat-212 which received a Delete/Notify but must remain up per local policy | libevent_malloc: new ptr-libevent@0x7fb378034680 size 128 | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 9 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-212" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-212' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-212" | stop processing: connection "road-eastnet-nonat-212" (in initiate_a_connection() at initiate.c:349) | spent 0.0821 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #464 | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 464 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #464 | **emit ISAKMP Message: | initiator cookie: | 24 23 49 88 e3 09 10 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-212 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a8 3e 00 a4 b1 da ff 66 fb 46 9b f8 05 c4 d3 4e | ikev2 g^x 1a be d3 c5 f3 29 65 46 ed 6f e5 e1 9c d3 68 c3 | ikev2 g^x 49 3b 6a cd e8 c4 12 c0 42 a0 22 7e 1b 5d 32 aa | ikev2 g^x a0 3a 32 c8 92 e5 3d a9 90 26 7c b6 7a 3a c7 43 | ikev2 g^x 1e d7 d9 ca a9 3b e4 0e ac 4c a3 a2 54 be fa 3a | ikev2 g^x 34 7b 08 69 76 9f f5 86 6b e1 71 f1 ca f2 34 fb | ikev2 g^x f0 af 6d c0 e7 4d 86 2c 35 64 d7 a8 e5 56 44 f4 | ikev2 g^x 1b a3 7b 36 d3 8e bf 68 72 d1 d6 14 19 d5 94 41 | ikev2 g^x 37 2c 85 dd 26 51 82 12 f9 57 28 f6 64 e4 99 2c | ikev2 g^x e5 14 14 38 a6 eb 30 83 5f a9 d8 ce 33 ba b5 e7 | ikev2 g^x 8f 9e 29 5d 17 d7 5f e7 f7 6f 44 97 e9 e3 1d 52 | ikev2 g^x 7d 6b 40 ae 7e e6 9b 70 f4 e4 cb 6b e6 46 d1 1a | ikev2 g^x f1 d4 e8 4a 08 7a 73 f5 ae fa 1c 51 b5 c1 66 db | ikev2 g^x b4 47 cd 7b 34 6f da f9 6b b2 dc 0f 59 56 0e 82 | ikev2 g^x f9 d8 cb f8 b3 e7 8c 71 cf eb c3 24 d5 a5 32 fc | ikev2 g^x 19 3b 14 fc 10 5b ac 0b 65 e1 fc c1 26 0d 3c cc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f8 5a 68 e8 8f 04 5e 9b c3 04 25 38 2e af 26 bb | IKEv2 nonce 12 7b 35 ab f6 8f 9b c1 e5 8b f7 b5 fb ab d6 71 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 24 23 49 88 e3 09 10 30 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d4 | natd_hash: port= 01 f4 | natd_hash: hash= 3e 53 56 65 0c 1b 38 25 05 25 e2 17 1d aa de c6 | natd_hash: hash= 51 81 dc 56 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3e 53 56 65 0c 1b 38 25 05 25 e2 17 1d aa de c6 | Notify data 51 81 dc 56 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 24 23 49 88 e3 09 10 30 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= b6 60 c7 67 b1 c7 40 e8 a5 6f 2e d6 dc 92 69 0c | natd_hash: hash= f8 bb 28 2f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b6 60 c7 67 b1 c7 40 e8 a5 6f 2e d6 dc 92 69 0c | Notify data f8 bb 28 2f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #464 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #464: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #464 to 4294967295 after switching state | Message ID: IKE #464 skipping update_recv as MD is fake | Message ID: sent #464 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-212" #464: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.212:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #464) | 24 23 49 88 e3 09 10 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 3e 00 a4 b1 da ff 66 fb 46 9b f8 05 c4 d3 4e | 1a be d3 c5 f3 29 65 46 ed 6f e5 e1 9c d3 68 c3 | 49 3b 6a cd e8 c4 12 c0 42 a0 22 7e 1b 5d 32 aa | a0 3a 32 c8 92 e5 3d a9 90 26 7c b6 7a 3a c7 43 | 1e d7 d9 ca a9 3b e4 0e ac 4c a3 a2 54 be fa 3a | 34 7b 08 69 76 9f f5 86 6b e1 71 f1 ca f2 34 fb | f0 af 6d c0 e7 4d 86 2c 35 64 d7 a8 e5 56 44 f4 | 1b a3 7b 36 d3 8e bf 68 72 d1 d6 14 19 d5 94 41 | 37 2c 85 dd 26 51 82 12 f9 57 28 f6 64 e4 99 2c | e5 14 14 38 a6 eb 30 83 5f a9 d8 ce 33 ba b5 e7 | 8f 9e 29 5d 17 d7 5f e7 f7 6f 44 97 e9 e3 1d 52 | 7d 6b 40 ae 7e e6 9b 70 f4 e4 cb 6b e6 46 d1 1a | f1 d4 e8 4a 08 7a 73 f5 ae fa 1c 51 b5 c1 66 db | b4 47 cd 7b 34 6f da f9 6b b2 dc 0f 59 56 0e 82 | f9 d8 cb f8 b3 e7 8c 71 cf eb c3 24 d5 a5 32 fc | 19 3b 14 fc 10 5b ac 0b 65 e1 fc c1 26 0d 3c cc | 29 00 00 24 f8 5a 68 e8 8f 04 5e 9b c3 04 25 38 | 2e af 26 bb 12 7b 35 ab f6 8f 9b c1 e5 8b f7 b5 | fb ab d6 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 53 56 65 0c 1b 38 25 05 25 e2 17 | 1d aa de c6 51 81 dc 56 00 00 00 1c 00 00 40 05 | b6 60 c7 67 b1 c7 40 e8 a5 6f 2e d6 dc 92 69 0c | f8 bb 28 2f | state #464 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37800cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a30d30 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46950 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #464 | libevent_malloc: new ptr-libevent@0x7fb3580180b0 size 128 | #464 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49681.304409 | resume sending helper answer for #464 suppresed complete_v2_state_transition() and stole MD | #464 spent 0.581 milliseconds in resume sending helper answer | stop processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb378034680 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 23 49 88 e3 09 10 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #464 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #464 | rejected packet: | 24 23 49 88 e3 09 10 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d4 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #464: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0697 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3800383c0 | handling event EVENT_RETRANSMIT for parent state #444 | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #444 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #444 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49681.309721; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002545 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3780297c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #444 | libevent_malloc: new ptr-libevent@0x7fb38403da90 size 128 "road-eastnet-nonat-192" #444: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #444) | 7f 9a e3 30 35 a2 50 3a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 73 44 16 cd dc 6d af 1e 52 47 5f 1e bd fa ee | 64 00 7c 0c 09 cd 6a b9 96 7a 9e fd 7b 60 d3 11 | 94 7f f3 14 ab de fc 67 4d 77 8c ed ae 35 5e 21 | 92 1a 34 1f 52 96 c6 b4 82 cf e2 da a3 5d a8 40 | 55 b6 be b1 02 f7 4f 09 53 8a 9a 82 43 68 c5 03 | 91 79 7b fa ca eb 01 ae de 9c b8 57 af 0c ad 92 | 90 f7 80 a3 5f 1b 76 77 00 b6 f8 6e 45 fc bc 6c | 08 e0 42 31 50 bd 6d b4 9c ee e1 eb b4 38 73 a9 | 34 e4 98 23 d2 4d e0 d9 b6 c6 f6 dc 56 58 4e 20 | 84 e1 d2 8f 09 7f 4a 9d 26 b0 f3 d6 00 33 87 e7 | 4a de ea 2f 4a 53 b4 0f 48 62 38 e9 50 42 17 64 | 60 9a 88 18 4e 23 6b 6a 5a a4 6b 23 ad 33 67 82 | 97 a8 79 73 5f c7 02 96 5e 91 0e 40 d6 4e f8 b3 | d9 30 5c 69 30 3f 5d 5d 8a 33 e5 82 75 a6 f8 01 | e5 10 de e1 1f 27 d1 2a e8 d2 12 a6 bb 52 29 5c | 7e c1 67 58 19 ab fb 58 65 a2 55 1e 99 be f5 8d | 29 00 00 24 2a ad 1b 39 f3 fd f9 42 4c 00 4a 5c | ed 00 f4 3a 31 ea eb b5 54 5a 5c 9d a2 7d 7c c4 | 61 a7 b5 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 d0 f0 6f a1 ca 95 cb 19 9f 38 2a | 49 20 b8 20 36 38 5c 50 00 00 00 1c 00 00 40 05 | 75 b6 79 50 7c d3 43 75 20 ac ac 20 ab c2 0f 0e | 7d 73 a1 76 | libevent_free: release ptr-libevent@0x7fb38000c460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800383c0 | #444 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 9a e3 30 35 a2 50 3a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #444 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #444 | rejected packet: | 7f 9a e3 30 35 a2 50 3a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #444: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0715 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47e90 | handling event EVENT_RETRANSMIT for parent state #261 | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #261 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #261 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49681.342109; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006321 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800383c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #261 | libevent_malloc: new ptr-libevent@0x7fb38000c460 size 128 "road-eastnet-nonat-9" #261: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #261) | 8b 59 1f 5e 29 ec 79 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 16 bb 69 7b 8c de a9 f0 aa 27 22 0c 50 1e 2b | c0 76 0c 79 99 31 2f f3 35 0b 93 05 6b 25 af d5 | 38 8a 63 51 f1 c7 93 6d 58 cf aa 10 dd 75 1f c8 | 55 42 4b ca 64 4b 8f 25 43 c0 98 a7 58 2f fe 43 | a0 fc e9 fe 8a 4f d9 62 8e db b8 54 42 5d 72 29 | 3d 08 a8 8c 4e d1 f1 b8 76 cf b0 d0 a2 dc ae 18 | 1b 5a 75 da 49 ca 9e c2 09 0d fb 74 50 88 ed a4 | d6 99 da c7 fb 22 1c 94 60 ac 50 76 4c a1 38 f1 | 43 ce 44 aa e7 39 3c 86 9e e1 41 54 48 c3 cb 31 | 48 d9 d1 19 bc cb 0b cc 7d 40 bf 96 af 1e df fb | 0f 62 79 6b f0 8e 05 4f 2e a0 3c cd 46 16 0c 86 | 49 e9 a6 e2 c2 86 c5 8e b2 14 0a be c1 f8 73 ee | bb d0 d9 50 52 32 c3 fa f2 3b b2 ca cc 8c 24 54 | 79 d5 c7 d3 1b 32 b7 28 de dd a1 c3 34 b8 54 c4 | ba 19 90 3e 1a d6 84 33 38 8c c1 45 94 fb 96 9e | 19 4c cd 4d d5 73 7e e1 8a 56 34 ce ca da 7f ec | 29 00 00 24 09 67 1c 9d 6c 7a 1d eb 24 78 5e 1f | a5 24 7e 35 ac a5 c4 f9 a0 f3 f8 63 91 47 e2 76 | a1 4d 73 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 76 e0 4e 77 d9 cf 89 73 cb 13 92 | b0 28 c4 2a 76 4e 4e 20 00 00 00 1c 00 00 40 05 | 7b 1f d5 2f e3 dc 02 0a cf 5f 34 da 40 53 6d 9d | 9b 7e 60 b7 | libevent_free: release ptr-libevent@0x7fb38800a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47e90 | #261 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 59 1f 5e 29 ec 79 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #261 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #261 | rejected packet: | 8b 59 1f 5e 29 ec 79 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #261: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #419 | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #419 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #419 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49681.343395; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004051 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47e90 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #419 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 "road-eastnet-nonat-167" #419: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #419) | 13 42 1a 05 2a a9 f4 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 82 ba 57 e5 18 7f 6d c1 4e 6c 32 74 c7 8d bc | fa 9e 5f 85 57 91 bd e7 d1 f6 a5 cc 56 d4 ef 2c | 82 2b a5 62 6a 68 41 f0 a0 92 fa 2e 12 6a 74 95 | 56 98 09 32 67 8d a9 cf ce e8 4b 16 ca ae fd 57 | 33 7d 99 6a 29 1d 52 35 0b 5c 55 de 21 8b fe 4c | 64 ea 17 c4 c0 64 cd 47 31 4b 7a 08 f8 bd 37 3f | 72 ba 30 cd 0e c2 9d 0f e4 8b 3f b8 4c 2a d4 69 | de 4a 7f 8a a8 eb c0 7f 8f b2 10 0b d8 35 aa 5e | c8 ac 23 ce e4 c8 52 08 91 9c 13 ce 38 17 f1 d8 | db ec 31 93 d6 0d 09 93 5b d1 dc 9c 92 3b e5 29 | 17 5b e6 ee 7f f5 fb 3d 38 b5 23 c0 cf 25 d5 5b | 67 0a 2b 07 fd 68 8f 4c 74 c9 96 0b 9b 44 5c 6b | 0e 2d 70 4b 98 d5 d7 b9 54 dc 11 1e 19 cb 73 3f | 22 ca 80 46 28 a8 4a 20 64 29 4c 39 a5 b7 25 84 | 93 fd 4d 3a a6 fa ab c2 68 fc 5d fb 3c 7c 06 72 | eb 28 8a f5 09 69 59 c1 01 26 88 c4 c6 36 f6 6c | 29 00 00 24 83 3f e0 e8 30 90 0c c2 fd 9a 5c 8a | 88 7b e1 27 5d 3c cc 26 1c 41 3f 95 a3 1e 69 69 | b9 67 17 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 b9 c0 cf 3f 29 65 8b 9d 3a 51 6d | 0f 16 20 c0 79 fc 1d 37 00 00 00 1c 00 00 40 05 | 67 f3 84 dc 78 2e 75 89 44 b5 31 a8 97 13 e9 a5 | b9 b4 3a e4 | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #419 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 13 42 1a 05 2a a9 f4 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #419 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #419 | rejected packet: | 13 42 1a 05 2a a9 f4 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #419: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25c80 | handling event EVENT_RETRANSMIT for parent state #360 | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #360 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #360 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49681.352716; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006232 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #360 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 "road-eastnet-nonat-108" #360: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #360) | e8 ba f7 ac 97 7a d7 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 a7 6a 2f 0e 47 4f c5 a2 87 88 1c 76 27 25 53 | 18 cf 29 be de 65 a5 ec fa 8e ba d5 95 70 46 1a | 5e 82 ee 5e ea 78 6c 5e e1 5a ba c3 42 fa 62 85 | 96 61 49 94 e4 26 35 02 12 7e c3 49 17 01 2e ad | da 08 aa 31 5d 07 3f 11 e2 3e a1 55 1e 97 51 1d | 21 13 8f d7 77 02 f2 6a 5f 3a a3 ad 67 d3 b3 fe | 4d bc 3d 87 97 56 a8 ed 5e 65 2d 59 2c 08 c6 f6 | e3 33 48 1e c9 5b 10 68 f5 80 0a de 74 5b 48 d5 | 12 63 cb 81 c8 06 b2 4b 2a 11 1e ef 99 9b bd 96 | 3d 2d 68 30 3c a5 df b7 7c b9 96 9a 90 b4 80 82 | 7f 32 39 5b 15 a6 11 ef 5c ad af 36 92 59 32 87 | 1f b6 1c c4 37 ef 0e 8f d4 cd 1f 34 87 b5 54 45 | 4f b4 69 d7 3d 68 0c fa bd 14 4f 0f ca d9 05 b6 | 6c 12 d4 47 46 2e 28 86 0e 8a 52 14 fe d2 d6 83 | e9 62 c7 35 25 a1 d0 50 cc af ac b0 fd 2d 90 37 | 95 46 1a 19 98 e1 af 75 ba a4 1b aa b9 40 54 be | 29 00 00 24 1b 6f 95 ad 44 06 60 87 4d 33 ad b6 | 0a 54 4e 5c c3 38 27 ff 28 86 c4 a8 14 ff fc 45 | 4c 10 47 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 71 5e 67 a4 d4 de c3 91 7e 75 5e | 86 6a 2f 03 c9 58 fc 3e 00 00 00 1c 00 00 40 05 | 42 65 a4 4c 2a f8 3a 2c 53 a5 43 50 55 9d ce 16 | 71 5f ac c0 | libevent_free: release ptr-libevent@0x7fb344035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c80 | #360 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 ba f7 ac 97 7a d7 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #360 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #360 | rejected packet: | e8 ba f7 ac 97 7a d7 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #360: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0491 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38400a290 | handling event EVENT_RETRANSMIT for parent state #456 | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #456 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #456 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49681.385986; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.005225 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c80 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #456 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 "road-eastnet-nonat-204" #456: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #456) | 9d 73 90 c6 28 50 00 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 3f ed 93 2c 95 9a 36 92 4d 4f a2 60 c1 a4 c9 | 4f 89 23 1f d1 62 f5 78 d3 b5 53 89 10 3d be a6 | 0b 7e 28 8a f8 9f 39 90 86 39 f9 58 de b8 41 b5 | 4e b5 7b 74 44 63 cc 49 07 82 fe 85 49 2e bc 7a | f9 73 7c 32 a7 c0 6d 69 27 6b 58 3d ad d1 e3 ec | cc a2 3b ff 29 b9 68 35 71 ee f8 63 67 14 1d 54 | bd cd c0 94 2f 62 7a 35 f4 12 35 06 31 ee 52 8b | 29 f1 3d 4d 88 53 c4 ee a1 13 19 c9 95 9c 3a b3 | 01 50 95 2e cb 29 cc 04 53 67 66 58 33 78 91 44 | bb 06 02 b6 52 69 e1 7c 4a 36 de 14 7e d4 42 89 | da ed 12 fd e2 7c 6b 02 ab fa 82 91 36 f1 eb 4f | a3 22 e5 0e 96 4e 45 d1 d5 c3 b4 13 59 96 05 fe | 42 25 83 c3 8d 08 66 f5 9f c5 f5 d6 78 e8 30 c4 | 64 8d 48 0b ea 1f e9 05 9f 8a 0b 97 9c 51 d8 74 | a8 a9 43 c8 84 d8 11 55 a3 8c 0b ac d0 92 1d f4 | 61 b1 7f 3d f8 aa 52 a8 9b c7 bf 12 0c da 76 e4 | 29 00 00 24 6d 34 cd c2 13 6b 2e 99 a8 cb ee 2a | a0 eb 8c a9 1d 65 aa 5b 5f 82 85 1d 0e 9e 60 f1 | 7a ed 45 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ef 03 64 ba 5e b8 36 8b cc 07 48 65 | d5 6f 6e 8b 3d 6d 57 bb 00 00 00 1c 00 00 40 05 | 07 ad 51 48 59 7f 26 2d fc 42 e0 9c c0 43 00 49 | 58 00 de b8 | libevent_free: release ptr-libevent@0x7fb38402bf10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400a290 | #456 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d 73 90 c6 28 50 00 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #456 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #456 | rejected packet: | 9d 73 90 c6 28 50 00 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #456: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0802 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a92f80 | handling event EVENT_RETRANSMIT for parent state #460 | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #460 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #460 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49681.392342; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500243 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400a290 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #460 | libevent_malloc: new ptr-libevent@0x7fb38402bf10 size 128 "road-eastnet-nonat-208" #460: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #460) | 23 48 f5 22 8d 37 9a d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 df d9 22 d0 fa 01 d1 aa 88 df 6a 8b 18 c0 09 | 4f 5b 80 db c5 12 8b 47 ef 35 50 bc b0 af 99 c5 | f9 cf 10 a6 63 8f ba 03 da 7f 0b b3 54 11 ba 9c | bb 06 80 77 61 12 b6 fe 2b bb 2c 7d 23 ed 7a 74 | 17 31 cb cb 95 4c d6 8f 31 04 dc 07 37 df 2d f4 | 1c ed 0c bb 28 ba e2 23 2d 3d a3 b2 fc 6f 50 eb | 56 d2 5b 1e f1 ad 23 2f 3e 55 c4 35 e9 32 f6 24 | 86 b3 e7 fd 04 0f 6f 72 db 37 4f bd d9 fe 64 c2 | 83 ac 83 05 91 73 42 0a a1 0c 3e 29 3c 20 67 b6 | 92 37 23 8d 25 df 18 a0 fa c2 98 93 ab ff 5f 64 | 7c d6 b8 fc 1d 90 5c 26 98 2d 8b b3 56 38 e2 7c | 20 da c8 bf 8d be 1d 6d f8 c5 88 bf 2f 3a f2 41 | 78 28 51 f9 69 ab 11 20 67 51 52 04 40 a5 c7 0c | 37 f0 c6 5d f9 95 c0 b8 47 6e 71 8e 99 56 3a 5f | e1 5c d4 8d c1 97 29 9c 26 a6 ac 65 11 ae 68 ef | 23 72 8e c9 45 c4 63 78 1b 5c 81 47 6e 58 87 ff | 29 00 00 24 25 2a f3 c2 d1 34 f2 28 be 54 0b a4 | 22 e2 98 59 02 dc 2f 37 5b b6 b4 bd 10 49 91 58 | 87 4d 98 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c c8 5d 4c 09 cc 17 d5 22 fc 7b d0 | 43 ae fd 90 5d 04 da 2b 00 00 00 1c 00 00 40 05 | 07 a4 f0 f7 58 53 22 23 25 cf 1a 07 69 10 b8 4a | 16 e3 ac d7 | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f80 | #460 spent 0.0976 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 48 f5 22 8d 37 9a d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #460 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #460 | rejected packet: | 23 48 f5 22 8d 37 9a d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #460: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad17c0 | handling event EVENT_RETRANSMIT for parent state #213 | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #213 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #213 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49681.399636; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.019432 exceeds limit? YES "road-eastnet-nonat-213" #213: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-213" #213: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #465 at 0x557d46af5840 | State DB: adding IKEv2 state #465 in UNDEFINED | pstats #465 ikev2.ike started | Message ID: init #465: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #465: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #465; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-213" #465: initiating v2 parent SA to replace #213 | using existing local IKE proposals for connection road-eastnet-nonat-213 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 465 for state #465 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a92f80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #465 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 | #465 spent 0.0896 milliseconds in ikev2_parent_outI1() | RESET processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #213 ikev2.ike failed too-many-retransmits | pstats #213 ikev2.ike deleted too-many-retransmits | #213 spent 2.72 milliseconds in total | [RE]START processing: state #213 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-213" #213: deleting state (STATE_PARENT_I1) aged 64.023s and NOT sending notification | crypto helper 10 resuming | parent state #213: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #213 "road-eastnet-nonat-213" #213: deleting IKE SA for connection 'road-eastnet-nonat-213' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-213' added to the list and scheduled for 0 seconds | crypto helper 10 starting work-order 465 for state #465 | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 465 | in connection_discard for connection road-eastnet-nonat-213 | State DB: deleting IKEv2 state #213 in PARENT_I1 | parent state #213: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #213 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 465 time elapsed 0.000631 seconds | libevent_free: release ptr-libevent@0x7fb35402a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad17c0 | in statetime_stop() and could not find #213 | (#465) spent 0.635 milliseconds in crypto helper computing work-order 465: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 465 for state #465 to event queue | scheduling resume sending helper answer for #465 | libevent_malloc: new ptr-libevent@0x7fb37c014c70 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 10 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-213 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-213" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-213' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-213" | stop processing: connection "road-eastnet-nonat-213" (in initiate_a_connection() at initiate.c:349) | spent 0.0716 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #465 | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 465 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #465 | **emit ISAKMP Message: | initiator cookie: | 61 8e 23 d2 13 62 a1 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-213 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3e ff ad a6 69 28 f7 dc 3e 12 16 a3 b8 12 d1 0c | ikev2 g^x e2 d9 c7 08 64 20 6b 95 e2 f7 13 3f fe 41 07 b0 | ikev2 g^x 63 aa 7f 3d 77 9f f9 e2 21 16 88 33 88 34 63 be | ikev2 g^x 66 c4 e1 0f 6d 0e 67 89 ae 7f d4 2b da 09 0e c2 | ikev2 g^x 3d 5d ed e3 b1 da e4 45 10 b1 c5 e8 5c a0 b7 e1 | ikev2 g^x 45 c7 74 34 87 11 e9 20 8e bf a9 d5 b7 7f 3e c8 | ikev2 g^x 87 13 ea b0 4c 38 35 35 21 28 ca 99 cb 90 60 a1 | ikev2 g^x 8c 47 23 f8 9b b8 e8 b3 af 65 36 19 01 0f 99 db | ikev2 g^x 11 cb f7 6b 11 70 78 e3 5e f3 08 79 6c d7 3e 9c | ikev2 g^x aa 63 ab c1 3b 94 5d c4 f5 a3 7c fb 68 79 fd 4d | ikev2 g^x ad 0f 3b a0 62 30 54 4e 21 46 20 c3 e3 03 c6 e1 | ikev2 g^x b9 0f 7d fe 4b b3 60 7d 63 ba a2 4c 73 2e f3 b8 | ikev2 g^x 3b 22 a2 5f eb 6e f7 60 a7 f7 13 33 69 2d a4 92 | ikev2 g^x 73 a6 b3 6f 83 80 a4 99 0d 08 29 5e d9 35 92 ae | ikev2 g^x 9f af 0f c2 f8 4b f3 a5 f1 21 b9 71 6a 24 94 9a | ikev2 g^x 22 03 aa 3e 91 42 1b 0b b8 8a 56 9b 18 21 37 6d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d0 d3 37 6e 16 17 0d f3 9a b3 75 28 da 73 bd b0 | IKEv2 nonce 37 5f e8 7c ed 64 dd a2 58 d5 25 f4 40 05 3d 62 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 61 8e 23 d2 13 62 a1 46 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d5 | natd_hash: port= 01 f4 | natd_hash: hash= b5 42 81 75 52 0a 3a ff 0f 6a b7 c3 61 92 38 6c | natd_hash: hash= 3b df 54 bd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b5 42 81 75 52 0a 3a ff 0f 6a b7 c3 61 92 38 6c | Notify data 3b df 54 bd | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 61 8e 23 d2 13 62 a1 46 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ac 90 18 d8 00 f9 15 ad 07 5e df 3f 97 c5 48 08 | natd_hash: hash= 0a 92 84 e5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ac 90 18 d8 00 f9 15 ad 07 5e df 3f 97 c5 48 08 | Notify data 0a 92 84 e5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #465 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #465: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #465 to 4294967295 after switching state | Message ID: IKE #465 skipping update_recv as MD is fake | Message ID: sent #465 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-213" #465: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.213:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #465) | 61 8e 23 d2 13 62 a1 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e ff ad a6 69 28 f7 dc 3e 12 16 a3 b8 12 d1 0c | e2 d9 c7 08 64 20 6b 95 e2 f7 13 3f fe 41 07 b0 | 63 aa 7f 3d 77 9f f9 e2 21 16 88 33 88 34 63 be | 66 c4 e1 0f 6d 0e 67 89 ae 7f d4 2b da 09 0e c2 | 3d 5d ed e3 b1 da e4 45 10 b1 c5 e8 5c a0 b7 e1 | 45 c7 74 34 87 11 e9 20 8e bf a9 d5 b7 7f 3e c8 | 87 13 ea b0 4c 38 35 35 21 28 ca 99 cb 90 60 a1 | 8c 47 23 f8 9b b8 e8 b3 af 65 36 19 01 0f 99 db | 11 cb f7 6b 11 70 78 e3 5e f3 08 79 6c d7 3e 9c | aa 63 ab c1 3b 94 5d c4 f5 a3 7c fb 68 79 fd 4d | ad 0f 3b a0 62 30 54 4e 21 46 20 c3 e3 03 c6 e1 | b9 0f 7d fe 4b b3 60 7d 63 ba a2 4c 73 2e f3 b8 | 3b 22 a2 5f eb 6e f7 60 a7 f7 13 33 69 2d a4 92 | 73 a6 b3 6f 83 80 a4 99 0d 08 29 5e d9 35 92 ae | 9f af 0f c2 f8 4b f3 a5 f1 21 b9 71 6a 24 94 9a | 22 03 aa 3e 91 42 1b 0b b8 8a 56 9b 18 21 37 6d | 29 00 00 24 d0 d3 37 6e 16 17 0d f3 9a b3 75 28 | da 73 bd b0 37 5f e8 7c ed 64 dd a2 58 d5 25 f4 | 40 05 3d 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 42 81 75 52 0a 3a ff 0f 6a b7 c3 | 61 92 38 6c 3b df 54 bd 00 00 00 1c 00 00 40 05 | ac 90 18 d8 00 f9 15 ad 07 5e df 3f 97 c5 48 08 | 0a 92 84 e5 | state #465 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a92f80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad17c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #465 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 | #465 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49681.401067 | resume sending helper answer for #465 suppresed complete_v2_state_transition() and stole MD | #465 spent 0.469 milliseconds in resume sending helper answer | stop processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c014c70 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 8e 23 d2 13 62 a1 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #465 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #465 | rejected packet: | 61 8e 23 d2 13 62 a1 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d5 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #465: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a50110 | handling event EVENT_RETRANSMIT for parent state #445 | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #445 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #445 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49681.403259; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002803 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #445 | libevent_malloc: new ptr-libevent@0x7fb37c014c70 size 128 "road-eastnet-nonat-193" #445: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #445) | b4 2e 78 cc c5 f6 9b 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a ba 44 5e e8 04 0b 1d 80 c6 75 3f 8a bb 68 32 | 06 11 b8 93 58 a0 e3 d0 41 9a dc df 91 ac 0b 46 | b8 6d fc ac c1 e9 09 52 48 47 7e 50 d3 96 46 49 | 4c db ea ed bd 20 06 58 05 cd d9 91 57 1d 80 4d | 27 35 e2 86 24 5f 4e 32 bf 57 32 fe 52 fe 8f 11 | 64 dd f6 c1 cf a0 23 81 27 d1 05 22 c7 e8 81 e4 | 67 a9 8c 32 ef 56 b6 40 b1 5f 41 a6 60 fd 00 92 | 0a e3 78 9b f2 03 2c 98 1e 8c fc 31 fc 9b e2 d2 | 0c f9 17 3c fe e3 b4 da 8e 06 ef 92 fc 84 24 e8 | 41 6f 79 14 e9 fb a1 a0 07 48 de 12 d6 84 2d 7e | 90 30 a3 38 3d 28 16 c5 17 69 90 4c 1a 42 aa f9 | c8 01 fd 3b 2e 46 f9 3b 3c c2 87 e4 f3 79 4f c7 | 11 59 a6 e8 26 10 94 45 c9 46 e9 8c ab e9 1d 28 | 48 da 5b 23 c8 48 65 23 9b 45 8d ab 8d 58 2e 78 | 34 e4 38 1d 80 97 ed 49 5c 38 3d af 3b ec ad d6 | 83 24 62 c1 f1 7d c9 59 93 3c f3 1e db d1 30 e4 | 29 00 00 24 43 99 24 d2 66 51 b3 d4 1c 15 bd 40 | 1f a6 87 a7 4d 01 75 d0 ba dd bc 61 a0 08 b2 b5 | 88 d8 85 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 20 6b 9d 83 bc 81 44 79 c4 11 cc | c3 90 0e 2f 55 7c a4 51 00 00 00 1c 00 00 40 05 | c1 5a b3 1c bf d8 ae 9a 12 a9 ee 41 24 11 a3 d4 | f8 37 2e 14 | libevent_free: release ptr-libevent@0x7fb37404b5c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a50110 | #445 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 2e 78 cc c5 f6 9b 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #445 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #445 | rejected packet: | b4 2e 78 cc c5 f6 9b 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #445: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c018460 | handling event EVENT_RETRANSMIT for parent state #420 | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #420 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #420 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49681.416597; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003673 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a50110 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #420 | libevent_malloc: new ptr-libevent@0x7fb37404b5c0 size 128 "road-eastnet-nonat-168" #420: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #420) | 38 01 94 6e be 3a 28 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c e6 6f 10 c2 18 44 e2 34 88 94 b1 6e ad 96 2f | 7e f2 2f d5 05 74 10 9d b0 ed 16 ba d1 bb 6a 81 | 3b 36 bb 33 64 6a 4b 49 98 6b 61 6b 38 a7 f0 f9 | 85 f1 ea 1f 82 7f 75 2e b8 87 48 fb ca 42 ad 54 | 59 d3 d4 98 fc e3 db 9e 06 1c 4d 0a 68 e2 82 b1 | b4 79 61 9d ef 49 6d 74 7e f5 a5 55 9d ac 1f 86 | bc 38 61 c3 ec 65 14 03 d9 05 f4 3a a0 cf b9 81 | ea f9 8e 26 2a 33 57 de f0 0c 7b 3a 31 62 59 7d | 0a 51 80 e9 b3 45 96 f0 0f c4 ba 78 af bf d6 5a | 60 67 ef 7e 3d 35 d6 cc 9c c8 4a 58 b2 0f d6 d7 | a4 37 58 a2 99 5b 23 f1 45 8d 6c d3 30 bc 9f 64 | 97 c5 ef 20 d5 b9 a3 78 d6 da 52 f2 da 0c 22 0a | a7 af 15 bc c7 88 8c 82 a8 a3 ee 2f 8a ad 53 b2 | a0 1b 8a 3b ba 0a 34 48 34 2f ad da 72 63 db 61 | 9e b4 c4 95 69 50 db f5 62 4c 82 15 0a a2 7d 3d | 5b 37 5a 63 75 a1 9d 88 2f 4d 72 7d 91 14 f6 58 | 29 00 00 24 a2 fc 3c 40 ce 99 e3 62 f3 97 ac 0a | d5 d9 6a e9 cb 20 69 0b 55 a4 ef ef 10 02 28 ef | bc 3f 93 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 0a f7 67 8f e9 41 30 08 68 43 0c | 01 13 f9 c1 61 fa 63 aa 00 00 00 1c 00 00 40 05 | ef 1c 5b ca 2a 2f ea 7b fb 12 61 31 e7 f2 9d c7 | 67 58 3e 74 | libevent_free: release ptr-libevent@0x7fb34c01a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c018460 | #420 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 01 94 6e be 3a 28 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #420 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #420 | rejected packet: | 38 01 94 6e be 3a 28 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #420: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0479 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338017ea0 | handling event EVENT_RETRANSMIT for parent state #361 | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #361 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #361 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49681.422864; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.008205 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c018460 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #361 | libevent_malloc: new ptr-libevent@0x7fb34c01a4e0 size 128 "road-eastnet-nonat-109" #361: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #361) | 9c f5 2d c8 50 35 55 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe f7 f3 f1 6a 76 6a 9a e6 0e 10 b4 e5 b5 16 07 | 0f 90 8a f4 dc 9f 27 b0 2a 41 17 f0 21 60 87 50 | 11 a6 84 2e 86 94 e1 65 4d 1a 59 ce 11 45 d2 c5 | 09 df ce 0a 2c f9 3e 7e cb 59 88 eb 93 1a 26 06 | 39 22 a5 57 b6 f2 5b 4c fe 56 6a 26 49 df e6 84 | b9 e4 e4 41 19 a0 e8 70 69 c2 51 79 76 2e 80 40 | 6f 9e 4b a9 87 c2 02 65 d3 3e 05 60 b6 af 86 d7 | 52 3c 7a 52 e9 69 b8 2a e6 43 99 6c 72 d9 7c 1a | 8d c9 5b fb a3 c2 fc 51 d5 fc c8 85 ff 46 8f 64 | e3 d3 a7 99 28 b1 43 6d 9b 9d 50 e1 af 1a d6 ff | 7e fd 10 23 a2 a6 f9 9b d2 06 fa 0f 91 01 67 9f | 42 43 ac e6 4f ae 3e 00 59 5d 7a cf b3 59 12 67 | 0d c1 86 cf 82 5d 20 9e 98 97 ec b2 7e be 63 74 | b3 15 a1 c0 63 a7 5d 61 bb b3 2f 2d 42 15 59 57 | 72 ca 0b d8 9e d0 1b 84 91 fd db 5e 8f 2f 62 ed | 99 8c a3 a5 ec ef 08 26 6f ab 64 68 6b 97 9d 3e | 29 00 00 24 5d 7a 1f c2 56 77 bf 60 f2 37 f5 ed | 4d 94 c3 a6 58 e2 5f 6e 1b f6 b4 76 e5 69 0c 98 | 27 55 cd c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 71 91 34 7a e2 ba d5 01 f3 c5 56 | ba 5f 83 71 00 17 86 15 00 00 00 1c 00 00 40 05 | e0 46 0d f9 99 b9 47 b4 35 a0 04 20 4b 9b 45 ee | 1c f7 92 53 | libevent_free: release ptr-libevent@0x7fb35403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338017ea0 | #361 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9c f5 2d c8 50 35 55 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #361 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #361 | rejected packet: | 9c f5 2d c8 50 35 55 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #361: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0697 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1aec0 | handling event EVENT_RETRANSMIT for parent state #262 | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #262 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #262 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49681.445228; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006407 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338017ea0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #262 | libevent_malloc: new ptr-libevent@0x7fb35403b0b0 size 128 "road-eastnet-nonat-10" #262: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #262) | 6c b6 05 ad 53 aa 46 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 71 41 19 2f e2 7d 30 6b 4e a1 e7 5c d2 fe 4f | e0 61 ad 09 53 0e a0 57 08 e6 8a c7 a8 ab 86 63 | b8 6a 7f 66 41 dd b7 63 7a df 2e dc eb 44 db ac | 84 60 8a 30 6d a6 8e c8 9b e0 4a d0 70 9a 6f d7 | 2b c0 d7 cf ec 52 70 50 23 5f 91 08 50 21 38 8b | 76 60 df cc d7 e8 a2 a1 14 d7 95 47 31 84 95 aa | a3 81 92 3c a4 0d 4b 28 d7 90 8d 56 f9 3c bf bc | 84 88 bc cf 92 1a d8 6c 91 60 d7 c8 53 4c 8f 1b | 33 3d 36 12 cc 21 af 62 59 3d a6 91 f5 8f 40 b1 | 5e 20 75 cb 09 ce 69 22 f7 ce 4e 56 bd 5c 4e 69 | 85 a0 6f 08 1d 3c a0 71 93 00 3c 05 be a2 5e a3 | 18 1e 44 5a 4d ed 58 8b 10 8f 38 84 6b ea 6f 25 | 2a 8f 86 0f 8b b5 6e ce 72 db 55 37 c3 3e 68 45 | 52 fb fc c3 b0 3a 37 24 8c 65 c9 ec 5e 24 2b c3 | 69 bc 27 c7 b0 7f 81 12 a0 6d 38 e6 33 39 b8 2c | 2a b9 3c 7a 5e 19 74 c7 ec ac 4b b5 b2 ea 83 d8 | 29 00 00 24 a4 15 8c 3a a3 1b 1e b6 c4 22 d7 fc | ab 68 38 21 36 11 f7 0b d4 9b 74 fb 1e 21 f2 3a | 1b 0d d1 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 64 14 a1 e8 e4 eb 96 cf 02 78 71 | fb d0 4f 54 fd 2f 47 94 00 00 00 1c 00 00 40 05 | f3 5b 09 5c ae 75 15 23 50 5d 21 6a e9 8d 68 9d | ed b0 04 c4 | libevent_free: release ptr-libevent@0x7fb3600300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1aec0 | #262 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c b6 05 ad 53 aa 46 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #262 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #262 | rejected packet: | 6c b6 05 ad 53 aa 46 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #262: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.048 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388043350 | handling event EVENT_RETRANSMIT for parent state #446 | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #446 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #446 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49681.467506; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002174 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1aec0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #446 | libevent_malloc: new ptr-libevent@0x7fb3600300e0 size 128 "road-eastnet-nonat-194" #446: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #446) | 88 1d ae ca 37 da 9c 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a c2 f6 76 62 03 08 9a a8 98 a1 67 18 76 36 6f | f2 14 09 7e 5a 52 4f 9f 19 c8 ba 89 bc 37 1d 8e | 11 c7 c7 24 c8 21 0f 20 96 1c 89 74 ee 2d eb 0f | d9 40 32 aa 68 91 41 4a dd 21 15 90 12 e4 8b c9 | 4d 5c 9c dd a5 b1 90 8f 14 47 58 25 b1 c4 3a 4d | f0 56 c6 bf 57 58 f2 ac e6 d1 1a 63 f9 d8 c3 1a | a4 3b 86 89 ab bf 3e 5a 25 6f 85 ba 03 4e 84 c0 | a7 2c b9 17 b5 20 be c6 c5 13 97 18 56 e3 27 c2 | f9 d2 f9 ff 5e 3c 1b 93 48 e2 17 63 4c c3 83 be | b7 98 15 95 f6 a1 48 ea 20 9c e6 f3 53 b1 cd 88 | 53 a7 49 3f 59 99 9e 83 6d e2 88 bb a9 e3 fc 02 | 29 31 b8 83 4f 47 15 6b 71 12 58 3e 96 a5 76 cc | 0b 52 1f 8d 6c b2 63 0d 85 4d 51 f2 5f f7 f4 97 | 20 32 4c 0f 1c ff 39 c3 f0 0e d9 00 b3 27 e0 af | 29 89 02 52 1a 56 5c 18 4f a4 87 c7 25 17 55 3d | f8 28 8f d9 14 95 ef 08 7c ea 8b df 87 e5 f7 5e | 29 00 00 24 5e f7 7f 32 12 e9 cf 93 a5 5f 05 08 | 2b 32 36 a4 d8 35 51 26 4c a4 53 84 4a 3d 2b 33 | 5f dc 90 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bd 76 de 3d 7d 38 3c 23 fa c5 a8 aa | 98 15 c0 6a 4a ab a4 fc 00 00 00 1c 00 00 40 05 | 7b cf 42 04 70 bc 06 e9 71 4c e8 ba 2d 5f 18 79 | 9f 19 93 8c | libevent_free: release ptr-libevent@0x7fb388020cc0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388043350 | #446 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 88 1d ae ca 37 da 9c 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #446 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #446 | rejected packet: | 88 1d ae ca 37 da 9c 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #446: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0479 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1da10 | handling event EVENT_RETRANSMIT for parent state #214 | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #214 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #214 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49681.47782; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008326 exceeds limit? YES "road-eastnet-nonat-214" #214: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-214" #214: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #466 at 0x557d46af6e00 | State DB: adding IKEv2 state #466 in UNDEFINED | pstats #466 ikev2.ike started | Message ID: init #466: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #466: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #466; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-214" #466: initiating v2 parent SA to replace #214 | using existing local IKE proposals for connection road-eastnet-nonat-214 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 466 for state #466 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb388043350 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #466 | libevent_malloc: new ptr-libevent@0x7fb388020cc0 size 128 | #466 spent 0.0716 milliseconds in ikev2_parent_outI1() | RESET processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 14 resuming | start processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #214 ikev2.ike failed too-many-retransmits | pstats #214 ikev2.ike deleted too-many-retransmits | crypto helper 14 starting work-order 466 for state #466 | #214 spent 2.52 milliseconds in total | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 466 | [RE]START processing: state #214 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-214" #214: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #214: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #214 "road-eastnet-nonat-214" #214: deleting IKE SA for connection 'road-eastnet-nonat-214' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-214' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-214 | State DB: deleting IKEv2 state #214 in PARENT_I1 | parent state #214: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #214 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 466 time elapsed 0.000907 seconds | libevent_free: release ptr-libevent@0x7fb37c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1da10 | (#466) spent 0.914 milliseconds in crypto helper computing work-order 466: ikev2_outI1 KE (pcr) | in statetime_stop() and could not find #214 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 14 sending results from work-order 466 for state #466 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #466 Initiating connection road-eastnet-nonat-214 which received a Delete/Notify but must remain up per local policy | libevent_malloc: new ptr-libevent@0x7fb370039e20 size 128 | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 14 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-214" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-214' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-214" | stop processing: connection "road-eastnet-nonat-214" (in initiate_a_connection() at initiate.c:349) | spent 0.0706 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #466 | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 466 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #466 | **emit ISAKMP Message: | initiator cookie: | d8 f3 8e 44 6b 2f 1e a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-214 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4c e1 1c b6 a8 45 43 90 db 9b 35 75 1f aa 92 f9 | ikev2 g^x d6 e2 6f 34 81 df f8 c5 fb 61 93 34 a9 9a d6 e7 | ikev2 g^x 4f 19 4e 64 91 79 4b bc 74 e5 43 7f 1c fd f5 46 | ikev2 g^x 67 4f b3 d8 c9 4d 2d c9 eb 26 c5 ea 6c 36 ba 25 | ikev2 g^x 06 8c 1d c8 05 71 c9 48 a5 ca a6 91 9c 00 5f c8 | ikev2 g^x af c1 a9 4d 01 92 ef ab 3a e6 5a 67 89 38 c9 af | ikev2 g^x 19 fe 4d 6b 76 3f 95 f8 65 3e 4b 5b 24 34 56 32 | ikev2 g^x 9f dd 59 97 7b 03 2f 23 ce fb e6 f8 e4 68 93 ff | ikev2 g^x ad 3a cf f3 67 73 9d e1 9b 2a d0 84 d4 ba 4d fe | ikev2 g^x 72 3c 74 29 f1 ab eb eb fd d6 c3 47 54 02 c4 5f | ikev2 g^x 85 e4 bc a9 88 7b 25 6d 99 c6 f0 38 89 09 7c 47 | ikev2 g^x 72 c2 61 46 a0 1d 59 09 82 b5 5f b7 e1 f1 5c 0d | ikev2 g^x 50 1d c9 01 1e 1c 93 24 6c e4 5b 27 7f 49 97 85 | ikev2 g^x 14 7e 19 88 ae dd 1a b6 56 79 35 3e ff bd 7d 4e | ikev2 g^x 47 80 ff 35 79 4b c6 1c b6 e7 5a d2 8f b2 aa 73 | ikev2 g^x 6a 88 5b 1d bb 78 3e 8d f2 9b 06 47 8f 4b 75 e7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4b 18 d5 35 7f 58 ef 5d 8f 25 3f b5 cb 0b 31 6c | IKEv2 nonce 2d c9 a6 3f f9 92 29 72 9b 38 37 11 6a b0 a4 2c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d8 f3 8e 44 6b 2f 1e a5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d6 | natd_hash: port= 01 f4 | natd_hash: hash= 05 d8 47 26 17 c1 8a e8 09 00 37 fb f1 38 56 14 | natd_hash: hash= b9 a5 7b 42 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 05 d8 47 26 17 c1 8a e8 09 00 37 fb f1 38 56 14 | Notify data b9 a5 7b 42 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d8 f3 8e 44 6b 2f 1e a5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 10 91 19 bc 27 f8 ea 8a 40 18 2c 45 b2 2a 2d 38 | natd_hash: hash= 23 45 ab e1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 10 91 19 bc 27 f8 ea 8a 40 18 2c 45 b2 2a 2d 38 | Notify data 23 45 ab e1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #466 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #466: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #466 to 4294967295 after switching state | Message ID: IKE #466 skipping update_recv as MD is fake | Message ID: sent #466 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-214" #466: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.214:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #466) | d8 f3 8e 44 6b 2f 1e a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c e1 1c b6 a8 45 43 90 db 9b 35 75 1f aa 92 f9 | d6 e2 6f 34 81 df f8 c5 fb 61 93 34 a9 9a d6 e7 | 4f 19 4e 64 91 79 4b bc 74 e5 43 7f 1c fd f5 46 | 67 4f b3 d8 c9 4d 2d c9 eb 26 c5 ea 6c 36 ba 25 | 06 8c 1d c8 05 71 c9 48 a5 ca a6 91 9c 00 5f c8 | af c1 a9 4d 01 92 ef ab 3a e6 5a 67 89 38 c9 af | 19 fe 4d 6b 76 3f 95 f8 65 3e 4b 5b 24 34 56 32 | 9f dd 59 97 7b 03 2f 23 ce fb e6 f8 e4 68 93 ff | ad 3a cf f3 67 73 9d e1 9b 2a d0 84 d4 ba 4d fe | 72 3c 74 29 f1 ab eb eb fd d6 c3 47 54 02 c4 5f | 85 e4 bc a9 88 7b 25 6d 99 c6 f0 38 89 09 7c 47 | 72 c2 61 46 a0 1d 59 09 82 b5 5f b7 e1 f1 5c 0d | 50 1d c9 01 1e 1c 93 24 6c e4 5b 27 7f 49 97 85 | 14 7e 19 88 ae dd 1a b6 56 79 35 3e ff bd 7d 4e | 47 80 ff 35 79 4b c6 1c b6 e7 5a d2 8f b2 aa 73 | 6a 88 5b 1d bb 78 3e 8d f2 9b 06 47 8f 4b 75 e7 | 29 00 00 24 4b 18 d5 35 7f 58 ef 5d 8f 25 3f b5 | cb 0b 31 6c 2d c9 a6 3f f9 92 29 72 9b 38 37 11 | 6a b0 a4 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 d8 47 26 17 c1 8a e8 09 00 37 fb | f1 38 56 14 b9 a5 7b 42 00 00 00 1c 00 00 40 05 | 10 91 19 bc 27 f8 ea 8a 40 18 2c 45 b2 2a 2d 38 | 23 45 ab e1 | state #466 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388020cc0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb388043350 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388043350 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #466 | libevent_malloc: new ptr-libevent@0x7fb37c00cf80 size 128 | #466 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49681.47939 | resume sending helper answer for #466 suppresed complete_v2_state_transition() and stole MD | #466 spent 0.38 milliseconds in resume sending helper answer | stop processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb370039e20 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 f3 8e 44 6b 2f 1e a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #466 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #466 | rejected packet: | d8 f3 8e 44 6b 2f 1e a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d6 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #466: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36003b100 | handling event EVENT_RETRANSMIT for parent state #421 | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #421 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #421 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49681.488583; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004347 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370046090 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #421 | libevent_malloc: new ptr-libevent@0x7fb35402a950 size 128 "road-eastnet-nonat-169" #421: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #421) | 53 46 78 d0 f9 b4 2b ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 1e 13 6f 9e 9e 28 7d 48 cb 8f 21 ad 12 23 0d | 2e 17 4b ec 60 47 24 f9 49 65 0f b8 05 f3 b2 c5 | 35 0c dd 44 2a 04 47 c6 96 e8 e3 9d da 44 54 8d | d0 16 cf 7d 24 e8 e0 cd a8 2c 8e 39 d3 b2 8b 7f | 72 0a 52 da e9 14 4a cc 17 a9 78 b8 cd 5e be 1d | b9 b5 cd 7b b6 5f 02 22 ea c4 0a a6 8f a3 01 6c | 5b 53 24 36 89 d6 72 ef 99 b2 12 aa fb cb aa db | b2 d1 08 23 c1 6a e2 dd cd 0b 52 1b 08 f4 07 44 | f6 bb f7 14 71 89 1d 05 a9 2e 9d 11 f6 47 e7 7b | 5c 89 c0 6a 79 44 41 55 07 e9 d4 c5 65 08 95 21 | 02 27 ea de 7e 8f c1 e5 b3 56 d5 44 30 34 c9 29 | 25 c6 6c f5 76 8d bd 58 fa 4e 08 93 a9 a8 12 bd | 8c 61 44 c0 18 3b 6c f3 4a 89 60 c3 7a 98 37 61 | d4 a6 d5 c6 6d e0 61 22 11 f5 b2 91 df 3b aa 2c | 62 52 60 02 03 f1 56 8c f6 e3 d9 1e 59 30 5a b8 | cf c5 38 a8 40 43 1f 7b 8b 5b 7c d9 77 f7 d9 ba | 29 00 00 24 41 49 08 f2 3f 7f 22 d1 7a a9 25 e2 | 15 a5 3d 37 9b e8 6b f7 56 6b 10 73 05 1d f4 b0 | b9 8c f9 c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 d0 78 7d 22 f6 6d e2 e5 b7 d3 9b | 09 f6 2a 83 8c 96 39 01 00 00 00 1c 00 00 40 05 | 72 19 84 dc d4 59 5b 35 51 4f b6 9f 34 c6 2f ea | b9 aa 04 8a | libevent_free: release ptr-libevent@0x7fb360023dd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36003b100 | #421 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 46 78 d0 f9 b4 2b ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #421 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #421 | rejected packet: | 53 46 78 d0 f9 b4 2b ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #421: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0501 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad6ec0 | handling event EVENT_RETRANSMIT for parent state #461 | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #461 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #461 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49681.492877; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501003 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36003b100 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #461 | libevent_malloc: new ptr-libevent@0x7fb360023dd0 size 128 "road-eastnet-nonat-209" #461: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #461) | 30 e3 71 39 78 d7 e3 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 73 72 eb a6 69 8c 9e 08 28 d6 16 78 8b f3 f1 | 10 b5 c6 3e 5a 68 ff ee f8 e9 ea 04 9a 96 07 cd | 19 7e 01 3e f6 8c ec 23 90 c5 34 cb 27 e1 d9 f4 | 83 f1 52 a0 20 79 82 b5 63 bf e3 1e 4c 8b e6 11 | 56 0c 8d 37 3e 34 a4 1e 35 3f f2 4f c6 52 63 33 | 1a 19 3a f7 47 1a 58 cf 14 be b6 13 3a ba 6a 7a | c2 7e 4a 7c 6b 24 bd 5d d6 f1 53 6b d9 1a c9 0e | b4 0c ad ca 0d 87 78 f9 58 81 24 7b 64 ae 92 0f | 11 e7 db e4 1c 12 40 ed e3 44 f4 22 a9 cb c8 e8 | 35 d2 0f 26 8c e9 f0 bd 79 b3 71 e1 56 b6 c2 ad | c3 25 0b 24 c0 9d 7c 39 2c c7 c4 5c 79 bb 71 e2 | 44 92 14 47 75 57 f7 30 ac 8e 27 b4 ce 61 8d 65 | 5b 3f 84 a2 85 6e ec 1f 9f 60 e7 ef bd 5d a7 fa | a6 23 27 f3 06 ac 82 f0 e3 4d 76 a2 d3 e2 92 c2 | 69 39 39 eb 52 01 f2 b3 9d c1 f3 c5 d2 36 e4 c6 | 40 e0 76 99 a0 7e 6e 0f 65 8c da 02 f1 c2 ad 1e | 29 00 00 24 90 76 1f 57 9b 42 3c 9c 17 4b 00 94 | e5 bc 1a a6 9f 85 30 49 d6 5f c0 4c ce 00 c3 85 | 0f 0e 5c ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 76 5f 86 b3 2d 97 ef 5b 1d 05 17 | f4 c4 b8 ec 0d 36 f1 03 00 00 00 1c 00 00 40 05 | 57 06 a0 ca 17 47 48 ab cc 80 4d 50 ec 37 d9 01 | a5 d0 9e bc | libevent_free: release ptr-libevent@0x7fb37403ae20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | #461 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 e3 71 39 78 d7 e3 f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #461 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #461 | rejected packet: | 30 e3 71 39 78 d7 e3 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #461: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0786 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c012630 | handling event EVENT_RETRANSMIT for parent state #362 | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #362 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #362 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49681.526213; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004833 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #362 | libevent_malloc: new ptr-libevent@0x7fb37403ae20 size 128 "road-eastnet-nonat-110" #362: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #362) | 79 e0 7b db bf e0 df 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 58 27 86 c5 f9 8c cf 89 68 d1 9e c2 2a c8 4a | da 7d d8 07 8a b5 64 43 22 f7 a6 30 97 ca b8 f5 | c8 25 5f 3f d2 8e be 62 d3 8d 6c cf 71 bf 76 63 | d9 07 8d b1 c5 9f c3 a7 b8 7e e5 00 03 0b c1 0d | 22 f4 89 95 0c d8 00 e4 8c ba a0 1b ac fa 89 c6 | 67 62 f6 a7 e4 8c 4f c8 c7 77 79 53 f8 98 39 2d | 3b 30 0a e1 da cb f1 fc f0 30 13 27 47 13 e0 65 | 0b da e5 87 6f 0e 6c c0 89 03 ab 2a 82 c5 34 95 | 15 34 67 de 5a aa b5 07 35 bc 95 aa 82 00 b1 16 | 8e 6b 21 e0 45 a5 66 95 6e 83 16 8f 2b ee 03 ef | 02 de 36 db b0 c0 f4 e2 d2 1e 0d be d8 91 f7 72 | cd 14 33 51 64 d5 dd d5 3d 65 70 28 c3 2f 57 3f | 4b 4b d5 8c f2 92 b3 0c 9f 8d a0 2f 9a 5f 9d a8 | 0d ae cd 5e 77 75 b7 48 bb 27 68 90 7e 0e 8d 10 | 86 bf a4 47 df bb 7b cb 34 23 b8 08 15 f3 7f 6d | 51 d5 ae f8 b3 60 44 e0 56 71 c5 a9 57 5a 24 c6 | 29 00 00 24 3b 79 7f e5 5c de f0 ae 26 7a 15 81 | 35 42 e6 f3 1d 66 3a 94 36 41 6a 99 ae e0 a8 96 | 08 73 ec d2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 91 48 5f b0 47 d4 61 2c f1 27 03 | 24 75 2b 95 c4 3a 3e 58 00 00 00 1c 00 00 40 05 | ec 66 fb 7f d2 86 12 b1 2b 4e 47 12 62 c8 23 32 | 13 d6 12 8d | libevent_free: release ptr-libevent@0x7fb36c04b970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012630 | #362 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 e0 7b db bf e0 df 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #362 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #362 | rejected packet: | 79 e0 7b db bf e0 df 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #362: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0453 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7e4d0 | handling event EVENT_RETRANSMIT for parent state #422 | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #422 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #422 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49681.556506; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004418 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012630 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #422 | libevent_malloc: new ptr-libevent@0x7fb36c04b970 size 128 "road-eastnet-nonat-170" #422: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #422) | b8 e0 2b 96 c7 45 5a 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 6c 40 a5 03 bc 57 72 c1 66 d6 ac 89 5b f4 c1 | d0 36 2b 40 f8 23 54 39 34 b5 82 a2 ec a9 be f0 | 9e 2a fb a5 33 fb bf 78 6a 65 ee e2 5e 78 b2 97 | 57 06 96 a7 85 bc b5 2f 57 ad dd 92 ec d4 39 15 | 9d 72 7c 3a f0 31 6f b3 e0 1f fa e2 bb 36 ae ad | 14 69 bc c7 2b b8 d3 5c 99 5b e0 8a c5 e8 54 ff | a1 c6 b4 be 7e 54 b5 cb 08 e2 27 e4 e9 7a 16 60 | ce 85 f4 97 da 4f 4d 09 2e 8c 52 19 57 93 83 db | 87 b1 16 b3 51 00 56 5d 37 6d b9 b3 a2 bd 99 3b | aa 47 42 33 bb 18 39 df 45 15 55 a1 5a 1e 8d 44 | 65 5b 06 c8 ce 40 9d 80 8b 2e ca 26 d1 79 fd 78 | 43 19 a6 31 62 db c5 b6 b4 99 3e 3d 0f 92 3a 22 | 67 54 41 d3 95 c5 98 ed 1d fc 1c 5c cc 1c ff 1e | 72 31 d9 fd 8f 7a 3f e9 62 8e 84 af f0 f7 f0 8d | 9b 73 d6 fc ff bc e5 4a d7 b9 1b 80 22 88 c1 56 | e0 bb 60 af 81 19 d7 73 ec 24 2d 0b 96 d4 fa 10 | 29 00 00 24 2b c3 8d 3d 91 5a 53 1a b5 f4 6d b1 | 02 bf f8 18 e1 84 d7 9f a5 0d 77 07 91 b8 4d 3f | 04 89 f2 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 85 d2 75 8f 47 7e 81 98 63 03 9f | 1d 8c c0 94 92 93 75 cc 00 00 00 1c 00 00 40 05 | 2a 28 b7 7f 38 5f e0 65 f6 1d 4d c9 d5 6f ea f1 | c9 85 fb 5d | libevent_free: release ptr-libevent@0x7fb374024f80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | #422 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 e0 2b 96 c7 45 5a 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #422 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #422 | rejected packet: | b8 e0 2b 96 c7 45 5a 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #422: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0451 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8ee00 | handling event EVENT_RETRANSMIT for parent state #215 | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #215 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #215 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49681.560786; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007599 exceeds limit? YES "road-eastnet-nonat-215" #215: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-215" #215: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #467 at 0x557d46af83c0 | State DB: adding IKEv2 state #467 in UNDEFINED | pstats #467 ikev2.ike started | Message ID: init #467: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #467: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #467; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-215" #467: initiating v2 parent SA to replace #215 | using existing local IKE proposals for connection road-eastnet-nonat-215 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 467 for state #467 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7e4d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #467 | libevent_malloc: new ptr-libevent@0x7fb374024f80 size 128 | #467 spent 0.0728 milliseconds in ikev2_parent_outI1() | crypto helper 15 resuming | RESET processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 15 starting work-order 467 for state #467 | start processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 467 | pstats #215 ikev2.ike failed too-many-retransmits | pstats #215 ikev2.ike deleted too-many-retransmits | #215 spent 2.66 milliseconds in total | [RE]START processing: state #215 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-215" #215: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #215: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #215 "road-eastnet-nonat-215" #215: deleting IKE SA for connection 'road-eastnet-nonat-215' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-215' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-215 | State DB: deleting IKEv2 state #215 in PARENT_I1 | parent state #215: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #215 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 467 time elapsed 0.000571 seconds | libevent_free: release ptr-libevent@0x7fb368035930 | (#467) spent 0.57 milliseconds in crypto helper computing work-order 467: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee00 | in statetime_stop() and could not find #215 | crypto helper 15 sending results from work-order 467 for state #467 to event queue | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #467 | libevent_malloc: new ptr-libevent@0x7fb37401f6b0 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 15 waiting (nothing to do) Initiating connection road-eastnet-nonat-215 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-215" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-215' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-215" | stop processing: connection "road-eastnet-nonat-215" (in initiate_a_connection() at initiate.c:349) | spent 0.0627 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #467 | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 467 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #467 | **emit ISAKMP Message: | initiator cookie: | be 07 ac 9a b2 b5 64 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-215 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6e 4e 05 41 e0 9c 82 57 92 0a 9a c0 ac b7 0e 16 | ikev2 g^x 8f cf 40 f2 c1 21 c6 0e 53 7f 71 9b 23 53 ab 32 | ikev2 g^x ef 64 72 bf 1c eb 94 98 29 9f 35 3d 25 d3 1c 5f | ikev2 g^x e7 9d 00 19 e2 0a 16 20 a6 ea 3a 6d 7b 32 8e 93 | ikev2 g^x 96 ee 8d 09 fc 5d f8 27 b9 ca 49 09 65 ce cf 30 | ikev2 g^x 67 2e f4 4f 3d ad 29 2d 5a 4c 68 40 7f 94 6f ad | ikev2 g^x f5 98 12 1b 59 74 90 02 ab ae 6a 47 c6 cb f0 fe | ikev2 g^x 1e 5f 8d 21 2a 5d 11 fe 17 3b 75 9d 65 5c 76 a0 | ikev2 g^x e4 ca 7c e0 c8 8a 37 49 e6 36 2e 9d 9d 6c be 13 | ikev2 g^x f2 87 dd 81 d0 10 4c ee c7 ac d9 53 97 d2 c8 92 | ikev2 g^x 06 a5 e1 c9 c7 93 30 ee d6 3d ac 47 98 50 1f 6d | ikev2 g^x d0 3a db 8b df 20 7f 6b 55 4b d3 fe b0 df 95 14 | ikev2 g^x 4e 40 f5 72 7e 0c bb 04 da d9 d2 07 87 d2 e0 72 | ikev2 g^x 1c 20 5b 2d c2 5e 0e 89 32 b0 a4 ac ae 09 91 0a | ikev2 g^x ac c6 1c cc d1 3b 35 35 b5 b5 4c 01 ce b4 2e ea | ikev2 g^x cd 79 86 98 20 31 06 5b 6a 88 36 07 19 32 e2 40 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 65 a2 6f 51 03 e0 c3 95 a1 17 d9 10 35 d2 c8 05 | IKEv2 nonce 2a 6d 6f d8 b4 c3 4c 08 92 7c 46 6b 3f 11 55 1a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= be 07 ac 9a b2 b5 64 59 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d7 | natd_hash: port= 01 f4 | natd_hash: hash= 48 95 f5 c4 0f 53 2d de 04 94 5d f4 44 07 bd 21 | natd_hash: hash= 62 32 e6 d2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 48 95 f5 c4 0f 53 2d de 04 94 5d f4 44 07 bd 21 | Notify data 62 32 e6 d2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= be 07 ac 9a b2 b5 64 59 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d8 32 98 63 8b 4a fe f1 1f e4 de 6d 0f 9b fc 4d | natd_hash: hash= cc 8b 9a c1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d8 32 98 63 8b 4a fe f1 1f e4 de 6d 0f 9b fc 4d | Notify data cc 8b 9a c1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #467 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #467: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #467 to 4294967295 after switching state | Message ID: IKE #467 skipping update_recv as MD is fake | Message ID: sent #467 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-215" #467: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.215:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #467) | be 07 ac 9a b2 b5 64 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 4e 05 41 e0 9c 82 57 92 0a 9a c0 ac b7 0e 16 | 8f cf 40 f2 c1 21 c6 0e 53 7f 71 9b 23 53 ab 32 | ef 64 72 bf 1c eb 94 98 29 9f 35 3d 25 d3 1c 5f | e7 9d 00 19 e2 0a 16 20 a6 ea 3a 6d 7b 32 8e 93 | 96 ee 8d 09 fc 5d f8 27 b9 ca 49 09 65 ce cf 30 | 67 2e f4 4f 3d ad 29 2d 5a 4c 68 40 7f 94 6f ad | f5 98 12 1b 59 74 90 02 ab ae 6a 47 c6 cb f0 fe | 1e 5f 8d 21 2a 5d 11 fe 17 3b 75 9d 65 5c 76 a0 | e4 ca 7c e0 c8 8a 37 49 e6 36 2e 9d 9d 6c be 13 | f2 87 dd 81 d0 10 4c ee c7 ac d9 53 97 d2 c8 92 | 06 a5 e1 c9 c7 93 30 ee d6 3d ac 47 98 50 1f 6d | d0 3a db 8b df 20 7f 6b 55 4b d3 fe b0 df 95 14 | 4e 40 f5 72 7e 0c bb 04 da d9 d2 07 87 d2 e0 72 | 1c 20 5b 2d c2 5e 0e 89 32 b0 a4 ac ae 09 91 0a | ac c6 1c cc d1 3b 35 35 b5 b5 4c 01 ce b4 2e ea | cd 79 86 98 20 31 06 5b 6a 88 36 07 19 32 e2 40 | 29 00 00 24 65 a2 6f 51 03 e0 c3 95 a1 17 d9 10 | 35 d2 c8 05 2a 6d 6f d8 b4 c3 4c 08 92 7c 46 6b | 3f 11 55 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 95 f5 c4 0f 53 2d de 04 94 5d f4 | 44 07 bd 21 62 32 e6 d2 00 00 00 1c 00 00 40 05 | d8 32 98 63 8b 4a fe f1 1f e4 de 6d 0f 9b fc 4d | cc 8b 9a c1 | state #467 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374024f80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7e4d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #467 | libevent_malloc: new ptr-libevent@0x7fb374024f80 size 128 | #467 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49681.561923 | resume sending helper answer for #467 suppresed complete_v2_state_transition() and stole MD | #467 spent 0.324 milliseconds in resume sending helper answer | stop processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37401f6b0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be 07 ac 9a b2 b5 64 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #467 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #467 | rejected packet: | be 07 ac 9a b2 b5 64 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d7 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #467: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_RETRANSMIT for parent state #457 | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #457 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #457 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49681.564107; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002418 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374023ce0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #457 | libevent_malloc: new ptr-libevent@0x7fb37401f6b0 size 128 "road-eastnet-nonat-205" #457: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #457) | 3d e3 b8 80 8f bd c5 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 7a cc 82 1e 2d 53 a5 ce 9e 27 c2 26 66 c5 e9 | ca b7 3b d7 b3 d5 8f c0 1e ac 61 93 25 30 44 75 | 16 7f 86 32 17 98 9b b2 bd a4 40 62 a6 0f f6 2b | b1 e8 33 29 3f 84 59 09 aa bb 5e 2f cd e9 1a 72 | c5 38 7c e2 59 e4 bc cf cc fa da 23 96 75 c1 c7 | ad fb a2 86 e8 bf a6 3f 1e fe 2b 41 b8 4f 8a 8f | fc 26 0a 24 5a dd 02 29 13 7a b7 2d e7 62 32 f3 | 6a 17 ae ce 85 51 34 8a 1c 60 c5 a3 0d 63 33 17 | b8 03 02 91 41 6c de d7 2a b4 05 f1 63 80 c5 fa | a4 93 75 6c e4 d1 6b 22 4b c0 ed 28 67 a9 70 75 | f9 13 92 e4 11 7c 99 29 38 c0 6b 83 36 d2 38 17 | 99 86 23 65 2a c3 af 64 bb 12 ca 10 15 c7 5a 01 | e6 2f f0 2b 77 e0 ac b3 ec 7b 00 6e 19 4c 17 4e | c2 c8 73 f2 63 d0 16 98 d3 38 a7 f8 87 36 2b 60 | fd b1 1f f7 a9 42 1c 9e d6 33 ef 51 73 04 4f 2e | c1 59 d4 cb eb 88 5a 87 9b 61 94 46 2e b3 5e 3c | 29 00 00 24 bf 42 01 47 80 24 bc 54 c5 78 43 68 | 88 cb 29 3a 9a 04 f3 2d 0c c7 ac f0 bd ad b4 35 | ec c6 0a 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 d2 27 5a 8f 21 c7 36 56 bd fb 12 | 29 e7 69 7f 19 4f 04 f7 00 00 00 1c 00 00 40 05 | 06 c5 63 f1 7d e9 6e 2f 88 1f 75 73 67 c0 d5 c5 | dc d6 be 87 | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | #457 spent 0.0916 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d e3 b8 80 8f bd c5 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #457 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #457 | rejected packet: | 3d e3 b8 80 8f bd c5 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #457: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad8480 | handling event EVENT_RETRANSMIT for parent state #462 | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #462 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #462 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49681.565349; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500407 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #462 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-210" #462: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #462) | b3 aa 18 e3 bb 76 cd a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 e1 dd 76 b8 92 08 2e 86 ea 59 23 d7 a8 a3 c4 | 10 20 64 4d 1a 6e f6 be 88 38 70 1d ff a1 81 97 | 56 46 d0 11 ce c6 71 4d d3 b8 e9 f6 8f 98 00 29 | 10 68 fe 2f 6a fe 59 74 05 66 7b 78 d6 d0 be bd | fb fc 90 3b 61 ee 5a 02 67 1c cb 53 c4 30 e1 1c | e1 cf 60 fe b2 ba b8 12 9c c1 21 b7 9c a2 2e d3 | f2 85 29 0d c8 10 98 b2 a9 8d 09 29 1f fe 72 bd | 6f ac bd 80 e6 e9 9d 07 a0 84 25 09 ab 49 d1 fc | a4 e5 0d 0e 5a 9c 8e d8 0e 96 4d 74 82 a0 b4 18 | 38 39 81 2c 56 26 db 6b e0 e9 32 19 24 e6 ac f3 | 8a 50 27 76 e7 46 84 40 39 2a 33 e3 46 30 98 1e | a4 e6 6f e2 bf e7 be a6 d5 b2 77 f8 b0 8c 25 cb | 3f 99 0a 63 88 e2 f4 8e b0 ed 00 10 7f f7 a6 31 | 7b da 9a 1a 53 83 49 e7 c5 ae 8b 25 41 9e cd 02 | 64 ab a9 c7 ab 71 01 ef 57 dd 6f c5 35 5b 12 e5 | 9c 28 f2 35 96 11 0c e1 05 5e 94 47 29 58 9d 96 | 29 00 00 24 9f cd 6b 85 44 66 e6 2e a2 be db 56 | e9 91 ac b0 be 57 bf 5f a7 03 66 4a a0 9b 90 be | 3c 13 94 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 1b 11 78 68 c9 76 e3 37 8a 0f 7e | ca ac 37 4e 36 55 96 e1 00 00 00 1c 00 00 40 05 | 75 7d 89 5c 82 a5 9e b6 a0 43 f2 ed 22 d9 e8 25 | c0 74 c1 73 | libevent_free: release ptr-libevent@0x7fb36803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad8480 | #462 spent 0.0845 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b3 aa 18 e3 bb 76 cd a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #462 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #462 | rejected packet: | b3 aa 18 e3 bb 76 cd a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #462: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6e010 | handling event EVENT_RETRANSMIT for parent state #263 | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #263 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #263 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49681.568603; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005308 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad8480 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #263 | libevent_malloc: new ptr-libevent@0x7fb36803b0b0 size 128 "road-eastnet-nonat-11" #263: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #263) | ca df fa 2e cc 97 0a e0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 35 4e f5 b3 06 6a 55 0c f2 3d 49 3f 7e 31 f9 | fb cf 08 8d 9e dd 74 b4 ae 16 46 b6 d3 2d d7 81 | a5 4c 1e 3c 51 d2 5c 80 19 32 ae 15 f6 f1 83 90 | 89 74 e1 7a 65 6e b3 e6 37 19 f8 4c fe 75 98 41 | ac 4f 10 33 24 18 c2 b3 2c d3 58 72 8c df 81 d4 | 59 38 86 31 ec e0 a1 c4 d1 46 91 6e e8 5d e0 23 | 68 ef 05 cb cd 03 0b e1 cd 09 50 09 e9 ff 48 e3 | 8e ec a4 98 4e a5 2a 21 fb 32 20 aa 01 94 37 a3 | 4a a0 06 10 8c 55 c7 ef f3 db 52 f2 2f 93 75 5e | 89 12 79 f7 25 8b 5c 7e 90 0c 79 f1 46 9c 39 dc | 62 04 8a 23 65 3e da dc e9 e6 17 7c 76 c0 74 b4 | 38 86 ca da 50 ae fc f8 de 6d 6d ce d9 7f cd c0 | 85 4e f8 c9 04 41 9d 47 8a 73 e9 b5 4a cc 14 ad | 16 95 76 51 b8 09 27 ef 06 ca 3a bb ff 24 77 42 | cc fc 6e a1 e6 2b bd 33 6d f5 6a df 58 56 a8 4b | 96 18 0e 2a e9 ec 68 a9 e4 55 e7 47 98 67 01 11 | 29 00 00 24 1f 89 c4 e0 c8 b8 15 d0 01 8c 72 b7 | b9 51 02 35 29 86 83 18 da 61 92 fd 67 fb 67 7c | 20 e3 84 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 89 6c b7 69 49 4f f4 6b c0 cb 25 | 85 ed a6 01 12 ce 48 f3 00 00 00 1c 00 00 40 05 | 1c d7 2d 11 fa 53 cc ec b9 10 e5 08 27 61 79 62 | 96 79 33 55 | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6e010 | #263 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca df fa 2e cc 97 0a e0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #263 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #263 | rejected packet: | ca df fa 2e cc 97 0a e0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #263: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fa300 | handling event EVENT_RETRANSMIT for parent state #447 | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #447 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #447 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49681.575885; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00124 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6e010 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #447 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 "road-eastnet-nonat-195" #447: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #447) | 38 12 e6 81 e7 94 57 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 06 2b 67 fa f3 85 ef c9 87 64 80 c6 08 7f 26 | 45 8a d6 b2 f0 0d 75 25 97 6d 45 07 fd cb e4 04 | bf 7e ab 4e 45 57 81 c7 b5 29 22 16 b5 58 17 73 | fb 06 1c 20 f6 01 42 43 d1 e6 cb 7e a1 aa b9 6e | 26 8c bc f7 62 2d 79 d5 2d 49 41 71 09 9e b4 75 | ea 9e f2 7f e9 07 f0 a5 64 1a db a1 ff 4f ee 2e | 4f 3b 9e aa ac 22 2d 9f 1b 37 bc cf 47 d1 ca f1 | 85 86 f8 a5 9e 4a f1 ed 2d 36 8a 97 fa 17 f5 2d | 74 78 21 72 1b 33 88 07 44 c7 17 ee 95 f3 cb cb | 74 32 bb 69 59 ac ab 47 c6 9c ea 80 62 ae 1f 88 | 81 9b 37 d9 2d eb b0 eb c8 de b9 11 87 9a a9 5b | 92 c9 38 b1 30 9b d0 b1 7f 2a dc 10 02 4c 1e 0e | 28 73 54 43 6f 78 74 45 0e 5e 40 cb d7 a1 f6 9b | 8d bf eb b3 ff de 36 ad 5d d5 a1 e7 e2 d9 b6 74 | 11 52 d9 17 88 a2 35 0f d7 23 95 ef eb 8f 58 a1 | ef f0 f0 24 22 5b dd f5 64 21 6b 5a 10 90 d6 b9 | 29 00 00 24 c8 ed 9d b9 b2 64 8b 9d 5d 85 10 8f | bc bb 1d 46 c9 3a dd 35 d0 ed 23 11 cf 06 d9 fd | be 51 4b 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 28 c6 de 25 95 4a 27 58 aa 1c c2 | 15 34 6b e8 d4 2b c8 d2 00 00 00 1c 00 00 40 05 | dc 67 81 1e 74 e8 91 b7 d4 fb 94 8c c2 c6 73 c6 | 89 a9 30 0d | libevent_free: release ptr-libevent@0x7fb34c03a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fa300 | #447 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 12 e6 81 e7 94 57 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #447 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #447 | rejected packet: | 38 12 e6 81 e7 94 57 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #447: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0893 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa34c0 | handling event EVENT_RETRANSMIT for parent state #363 | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #363 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #363 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49681.594283; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00588 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fa300 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #363 | libevent_malloc: new ptr-libevent@0x7fb34c03a770 size 128 "road-eastnet-nonat-111" #363: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #363) | 51 61 7f 08 48 15 06 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 a4 74 58 c5 f7 d1 13 97 f0 a1 32 ec ba 3b 12 | 2a d1 a7 2b 3c 6a 89 b1 af 9f ef 60 99 3f 2b 97 | 5a 99 67 3e 04 49 9e e1 18 dd 5b 9a 36 f4 31 c2 | 53 fb e0 15 b1 f1 17 18 c0 6a ef 59 2d 9b 43 90 | f2 8c 3e 64 6c 64 9b 41 4d c8 83 ed 81 03 01 ef | 94 98 ac cb 77 3f 19 e2 3d 9a 98 04 76 6b 13 b3 | cd 7b 90 ce b0 33 d0 e1 b7 52 ee 6b 51 23 7a ea | a8 cb 6b 19 dd 2c 75 92 bf 4f 96 8d 61 90 60 ba | ac 55 20 f8 f6 10 ca 5a 43 53 71 3b 48 a8 5f 63 | 88 26 59 cb be 95 f5 90 58 5a 07 1f 8c 1f 49 2e | ab c9 b4 33 89 02 d4 f8 ad 34 05 81 7c 83 7c ee | b9 f5 ea 3c 82 86 1f 8e fd dd f8 79 c6 1d d2 66 | eb 43 cd 6b f4 5d 2f 21 06 e6 55 35 36 2a fc 16 | 28 b4 a8 e2 ec 6d b6 b7 1a 42 16 71 43 4d 93 a5 | b9 be 7c 8b c2 15 e3 5b 72 eb 03 26 dc 93 d9 17 | b6 f6 7f 82 7f 35 e0 76 a8 41 7c 2a 12 6a fc 61 | 29 00 00 24 05 ae 65 e3 84 b1 1a 26 06 06 7b dc | a8 83 38 36 54 1a c8 5b 72 97 b6 83 dc f9 79 7c | dc 6e a1 e8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 05 ad f7 99 b0 88 ad 41 82 57 31 | e5 ff 67 18 3e 77 ff e2 00 00 00 1c 00 00 40 05 | a3 ac d5 a3 ef 34 92 9f a8 df c6 0f 83 0b 12 93 | d2 32 5e d3 | libevent_free: release ptr-libevent@0x7fb380022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa34c0 | #363 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 61 7f 08 48 15 06 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #363 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #363 | rejected packet: | 51 61 7f 08 48 15 06 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #363: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c012bf0 | handling event EVENT_RETRANSMIT for parent state #423 | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #423 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #423 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49681.6266; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004581 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa34c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #423 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 "road-eastnet-nonat-171" #423: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #423) | 0d af b2 c4 93 36 1d aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 70 3e db fb be 8b b3 fd 73 c0 a9 96 0b 3d a8 | e8 36 31 e7 9c ec 5a 7d ff 70 f6 37 85 23 83 66 | b2 fa b4 b8 d5 45 16 aa a6 25 06 9f 8e 8e bf 87 | eb 95 12 b7 4e e4 06 f4 d1 f8 40 ef 32 40 e6 a6 | 6e f4 f8 67 e1 5b 90 26 e6 0e 43 21 0c 13 d6 b5 | 8e c1 48 f1 b8 e8 39 77 8f 82 36 7b 93 75 c8 ab | 84 91 17 9b a4 7d 3c 17 79 cf 26 b4 a0 3c f6 3b | 8a 9e f2 22 e0 37 3d 4a 22 71 37 fa af 63 94 e0 | 5d cb 53 25 8c 9f 3c aa f6 38 ac 60 e7 b7 a3 49 | 84 5c ea cd 1a 4a 52 75 d6 46 93 25 09 85 d1 82 | dd 53 68 4b de 95 3f 19 ff d3 86 0a c0 38 25 ae | 80 9b b3 ed 25 0e b6 ad 72 55 3f 58 28 54 96 74 | 26 60 4c 26 05 26 c2 53 24 50 7e 5b 35 6b ca a1 | e8 d8 01 f8 35 32 32 e5 07 d9 c6 ca 24 0c 96 3a | 31 97 ac ed 1f 95 1e 6e 00 fc 4a 03 2a 9c 00 a0 | bd e4 04 9f 5c 17 08 9c 92 06 6e 29 32 98 a2 91 | 29 00 00 24 ce f0 94 25 9a 41 87 5c 3e 7f f2 93 | 02 a0 d4 6b b2 dd 60 48 d2 68 61 fc a3 c4 4b 4a | b6 d0 3f b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 fb df b4 aa 7f 08 b4 87 40 7c 29 | 54 a9 d0 e2 e4 44 95 43 00 00 00 1c 00 00 40 05 | b2 9a 73 50 a7 57 97 7d 3b 57 52 b7 42 61 08 84 | 33 0c bd 82 | libevent_free: release ptr-libevent@0x7fb340040790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | #423 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d af b2 c4 93 36 1d aa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #423 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #423 | rejected packet: | 0d af b2 c4 93 36 1d aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #423: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36801d710 | handling event EVENT_RETRANSMIT for parent state #448 | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #448 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #448 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49681.656188; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003444 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #448 | libevent_malloc: new ptr-libevent@0x7fb340040790 size 128 "road-eastnet-nonat-196" #448: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #448) | ea d6 68 25 ae ee 80 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 2e 7f 22 4b d6 ee 79 95 7d ea e6 94 56 fc 59 | 41 1c 12 66 f4 de 00 d4 6a e6 f4 4c 67 01 c3 97 | d7 f0 7f 15 19 52 1c e1 e7 cb 10 43 bf 32 f7 97 | 3f 7d 76 9e 8f 5c 2d a2 10 89 27 a3 31 39 40 6f | 23 b5 50 de a5 26 d5 37 1d bc c7 b0 be 51 02 45 | 35 60 2b d9 a4 52 16 a6 1b 75 6d 90 d7 94 82 b4 | dd 41 db 2a cd 7c b4 ec 00 64 fe 2d 52 b4 ab 6f | a1 8a dc c4 d8 32 f4 27 d3 99 3c 5b 3c 30 47 ed | 06 54 fe bf 5a 80 4f d3 cd d3 63 ab 7a 0a c4 81 | eb 86 4b 9a 37 9c a7 bc 09 9b f1 b6 f5 69 f2 05 | c2 89 b2 f3 ca 58 71 7c 0b b2 02 99 cf da 83 99 | b9 82 4c 58 38 5d 2d be 03 71 b3 5f 32 1a 82 30 | 6f ca 79 08 7e ac dc 25 d6 1a ad 46 a4 8d 7c 47 | 64 b8 24 1d 37 d9 41 0f 8b 4e 16 65 d2 41 4b ab | d2 0e 95 38 92 91 3a 77 ae cf 19 35 ef c9 91 13 | b4 90 b2 24 68 10 9d af 29 52 a9 15 24 f7 4d 93 | 29 00 00 24 f3 0f f3 36 25 a9 50 89 21 ce 62 13 | d8 e8 8d 8d c3 33 f9 d1 62 a2 a6 a0 e9 3e 64 7f | fb b2 90 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 d7 4f 67 97 77 e0 a3 2c fc 24 e7 | 7a a9 1a d4 d3 98 14 3c 00 00 00 1c 00 00 40 05 | 18 00 5b 20 2e 1c a9 8b 56 50 4b 4f f1 d3 fc 60 | 9d dd 28 85 | libevent_free: release ptr-libevent@0x7fb368046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36801d710 | #448 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a5af90 | handling event EVENT_RETRANSMIT for parent state #216 | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #216 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #216 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49681.65637; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.014492 exceeds limit? YES "road-eastnet-nonat-216" #216: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-216" #216: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #468 at 0x557d46af9980 | State DB: adding IKEv2 state #468 in UNDEFINED | pstats #468 ikev2.ike started | Message ID: init #468: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #468: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #468; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-216" #468: initiating v2 parent SA to replace #216 | using existing local IKE proposals for connection road-eastnet-nonat-216 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 468 for state #468 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36801d710 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #468 | libevent_malloc: new ptr-libevent@0x7fb368046040 size 128 | #468 spent 0.0858 milliseconds in ikev2_parent_outI1() | RESET processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #216 ikev2.ike failed too-many-retransmits | pstats #216 ikev2.ike deleted too-many-retransmits | #216 spent 2.51 milliseconds in total | [RE]START processing: state #216 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-216" #216: deleting state (STATE_PARENT_I1) aged 64.016s and NOT sending notification | parent state #216: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #216 "road-eastnet-nonat-216" #216: deleting IKE SA for connection 'road-eastnet-nonat-216' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-216' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-216 | State DB: deleting IKEv2 state #216 in PARENT_I1 | parent state #216: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #216 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb35801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5af90 | in statetime_stop() and could not find #216 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea d6 68 25 ae ee 80 d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #448 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #448 | rejected packet: | ea d6 68 25 ae ee 80 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c4 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #448: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-216 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-216" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-216' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-216" | stop processing: connection "road-eastnet-nonat-216" (in initiate_a_connection() at initiate.c:349) | spent 0.0628 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x557d46a8d840 | handling event EVENT_RETRANSMIT for parent state #364 | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #364 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #364 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49681.657772; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00578 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5af90 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #364 | libevent_malloc: new ptr-libevent@0x7fb35801d920 size 128 "road-eastnet-nonat-112" #364: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #364) | 33 be fb 4e a0 1f 6e f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 2a 42 5d a7 d8 6e 30 43 82 cd c7 8b 99 36 58 | d8 cb c2 34 66 ff 8a 30 2d b5 6a f0 e0 25 f9 40 | 18 b9 ba e3 e0 90 ff f4 cd 9b 1b 34 38 ee bc bc | a0 41 ef 4f 47 94 f5 37 14 2e 5c 6e 0f a6 94 db | 88 81 75 e1 ca 78 c8 9f 91 97 49 cc 62 0b 7c 24 | 05 6f 34 9d ba a1 13 0a 58 7e 2f 7a ad f7 32 fc | 1d 0c 87 25 75 e1 21 b8 48 fb 8f 7c d6 35 a3 1a | ae f0 b3 f0 3b da b9 9b f9 3d d2 6d c0 fe 81 68 | c2 c7 a1 4c 73 5e 1c b4 3a 58 ed b8 29 5f 91 4a | f8 66 00 af 13 4e e2 0d 66 a8 97 6e 0e 81 4f 92 | 8c 69 2c e3 38 08 3d ee 34 5d c4 0d 5d 92 19 a0 | ed a9 9d c5 1f 5c c0 55 9f 77 6e f9 34 95 4c 9a | 1b 67 cf ca 63 f1 13 a2 4f fd 39 a9 a7 28 45 69 | a8 39 46 14 38 17 c4 c7 52 5d 03 e8 bd 24 28 07 | 48 28 79 7d f7 c5 f9 df 10 a1 d2 ba 0c 72 5c 57 | de c7 d6 50 9c eb 46 ad 18 84 34 9f f7 a9 0f 36 | 29 00 00 24 57 1c 59 6e 8c 59 64 04 26 7e c7 7d | 57 3e 20 cd ce 8c 1c 54 8d 44 77 eb 53 6a 1b 23 | 5a 68 d6 45 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 b7 ef ef bc 35 4f 63 6b 7a c6 35 | bb 1f b7 d6 68 94 93 4f 00 00 00 1c 00 00 40 05 | 20 e3 22 42 33 64 b9 da db 7f 44 ff d7 76 e4 71 | c9 1d dc 40 | libevent_free: release ptr-libevent@0x7fb338023e10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8d840 | #364 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 be fb 4e a0 1f 6e f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #364 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #364 | rejected packet: | 33 be fb 4e a0 1f 6e f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #364: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0573 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | crypto helper 19 resuming | crypto helper 19 starting work-order 468 for state #468 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 468 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 468 time elapsed 0.000989 seconds | (#468) spent 0.983 milliseconds in crypto helper computing work-order 468: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 468 for state #468 to event queue | scheduling resume sending helper answer for #468 | libevent_malloc: new ptr-libevent@0x7fb36803f270 size 128 | crypto helper 19 waiting (nothing to do) | processing resume sending helper answer for #468 | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 468 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #468 | **emit ISAKMP Message: | initiator cookie: | 7d 98 8a 9d 47 30 f3 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-216 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6e 4d 82 7b ce 67 f5 e3 c7 ef 1e 88 97 12 6b 1f | ikev2 g^x 83 b8 f4 6b 5d e2 86 e0 e9 f2 9b 39 cc 52 e7 74 | ikev2 g^x 42 1d 82 da 97 54 f4 cf 8c bb 44 74 5b 79 77 99 | ikev2 g^x b7 64 d2 5d 6f 79 ec 9a 9b f2 ae b8 84 7a 6f f8 | ikev2 g^x bd c4 91 ab 33 ef 63 16 a0 41 ba 3f f0 a6 76 33 | ikev2 g^x 99 9d 4e fa 10 3d a9 b0 fd 9d 95 6a 6d e1 64 80 | ikev2 g^x d6 f4 63 87 42 a4 40 d5 c9 d1 7b e6 b6 16 87 12 | ikev2 g^x 6b a3 97 13 be 62 fd d1 99 d3 9b d9 d0 66 91 ae | ikev2 g^x 70 9a 30 e7 e3 dd b0 da 82 fe e4 f0 44 cc b3 94 | ikev2 g^x 0b 57 c5 e6 97 4b 2c 01 fc cf bd 64 1e a3 1b 36 | ikev2 g^x a4 86 4a 71 7a 5d 83 15 27 9a 5b c7 b1 4b fa cd | ikev2 g^x 49 2c bf cb fb 1f 32 58 4d 30 7f 18 2a 34 d2 95 | ikev2 g^x e4 1f 33 09 6a df d3 45 5e 2c d0 94 30 dc 69 26 | ikev2 g^x e1 ac dd 8a 80 89 5d 10 3f 35 db e7 62 f2 ea e4 | ikev2 g^x 46 d5 0d ed 2d ad c4 c0 e6 d7 96 39 cc 2d f8 c8 | ikev2 g^x 62 6c cf 39 6f 6d 88 19 5a ed 59 0b b3 2a c0 06 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 92 6b ec 6b 64 1a 9e 4e ed 8a 02 4d da d7 da b0 | IKEv2 nonce 19 37 ca 67 a4 74 bd db b5 b1 e8 9c 42 18 dc 88 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7d 98 8a 9d 47 30 f3 de | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d8 | natd_hash: port= 01 f4 | natd_hash: hash= 3f 7e f5 e7 e8 50 e9 16 af a5 e6 5b b1 d0 cb b5 | natd_hash: hash= 42 f7 79 13 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3f 7e f5 e7 e8 50 e9 16 af a5 e6 5b b1 d0 cb b5 | Notify data 42 f7 79 13 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7d 98 8a 9d 47 30 f3 de | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f3 f2 fc c6 17 9d d4 89 d0 fb 82 c7 ed b0 98 6a | natd_hash: hash= 20 f1 09 0b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f3 f2 fc c6 17 9d d4 89 d0 fb 82 c7 ed b0 98 6a | Notify data 20 f1 09 0b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #468 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #468: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #468 to 4294967295 after switching state | Message ID: IKE #468 skipping update_recv as MD is fake | Message ID: sent #468 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-216" #468: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.216:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #468) | 7d 98 8a 9d 47 30 f3 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 4d 82 7b ce 67 f5 e3 c7 ef 1e 88 97 12 6b 1f | 83 b8 f4 6b 5d e2 86 e0 e9 f2 9b 39 cc 52 e7 74 | 42 1d 82 da 97 54 f4 cf 8c bb 44 74 5b 79 77 99 | b7 64 d2 5d 6f 79 ec 9a 9b f2 ae b8 84 7a 6f f8 | bd c4 91 ab 33 ef 63 16 a0 41 ba 3f f0 a6 76 33 | 99 9d 4e fa 10 3d a9 b0 fd 9d 95 6a 6d e1 64 80 | d6 f4 63 87 42 a4 40 d5 c9 d1 7b e6 b6 16 87 12 | 6b a3 97 13 be 62 fd d1 99 d3 9b d9 d0 66 91 ae | 70 9a 30 e7 e3 dd b0 da 82 fe e4 f0 44 cc b3 94 | 0b 57 c5 e6 97 4b 2c 01 fc cf bd 64 1e a3 1b 36 | a4 86 4a 71 7a 5d 83 15 27 9a 5b c7 b1 4b fa cd | 49 2c bf cb fb 1f 32 58 4d 30 7f 18 2a 34 d2 95 | e4 1f 33 09 6a df d3 45 5e 2c d0 94 30 dc 69 26 | e1 ac dd 8a 80 89 5d 10 3f 35 db e7 62 f2 ea e4 | 46 d5 0d ed 2d ad c4 c0 e6 d7 96 39 cc 2d f8 c8 | 62 6c cf 39 6f 6d 88 19 5a ed 59 0b b3 2a c0 06 | 29 00 00 24 92 6b ec 6b 64 1a 9e 4e ed 8a 02 4d | da d7 da b0 19 37 ca 67 a4 74 bd db b5 b1 e8 9c | 42 18 dc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f 7e f5 e7 e8 50 e9 16 af a5 e6 5b | b1 d0 cb b5 42 f7 79 13 00 00 00 1c 00 00 40 05 | f3 f2 fc c6 17 9d d4 89 d0 fb 82 c7 ed b0 98 6a | 20 f1 09 0b | state #468 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb368046040 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36801d710 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8d840 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #468 | libevent_malloc: new ptr-libevent@0x7fb338023e10 size 128 | #468 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49681.659853 | resume sending helper answer for #468 suppresed complete_v2_state_transition() and stole MD | #468 spent 0.383 milliseconds in resume sending helper answer | stop processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36803f270 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 98 8a 9d 47 30 f3 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #468 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #468 | rejected packet: | 7d 98 8a 9d 47 30 f3 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #468: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90400 | handling event EVENT_RETRANSMIT for parent state #458 | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #458 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #458 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49681.661012; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002302 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1da10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #458 | libevent_malloc: new ptr-libevent@0x7fb36803f270 size 128 "road-eastnet-nonat-206" #458: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #458) | d8 20 9c 76 6a 13 05 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 f8 70 4a 7e 5c d3 77 41 08 04 2a 79 b8 78 55 | 9f 63 d7 1f d9 bd 04 73 e8 de 1f e6 51 71 d1 c1 | 71 09 97 4a 5c 16 68 a0 aa 69 e9 b4 93 ac ba f6 | 92 85 87 a8 c8 1f 88 3f 36 bb 45 8a 62 53 f9 71 | 32 e3 0c 69 bc 64 74 29 df 76 29 f7 54 0a d6 9e | bf f9 de ca 92 41 8b 95 09 7a 0d 5d 50 17 4e 54 | 40 99 d8 f9 ca e7 ca c6 0c af 31 22 59 39 c6 0f | c7 31 f1 5e c9 b0 5a 0c c9 3f c9 f9 d7 bd 4f d2 | fd 98 c7 19 a0 f3 e9 01 16 f3 fe 75 35 59 15 08 | 13 ea cd 50 33 e8 15 ab 01 f5 9e c1 43 d2 27 90 | 39 d5 e2 89 77 57 ec 66 ab 2d 6c 09 fc 1d 8f 1a | 62 91 d6 59 58 86 af 9e fa f2 4d 80 b6 39 ef 93 | e4 aa 9e 6f 49 aa 2c d4 54 59 f2 01 66 25 3e 6c | 9e 0b 06 28 b9 af 2e bd e7 a4 57 6f f0 5b 4c cd | 6a 03 04 af 85 10 e3 f2 17 ad 37 f3 24 3e 66 fb | 27 c7 a1 c5 2e 32 66 c3 94 bc a6 2b 60 cb 4f f9 | 29 00 00 24 33 eb be f2 9e 94 9d 08 4c d8 00 c2 | f8 2c a4 ef 00 e3 f7 7a 62 72 9a 99 65 d6 f3 0e | ff c8 b6 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 01 77 97 bc 56 25 23 ed d6 15 51 | 7d a3 3f e8 c0 74 6b cf 00 00 00 1c 00 00 40 05 | 8f 1b 57 d9 1a 63 f1 b3 99 7b 22 3d 44 e6 21 51 | 1c 41 cc 24 | libevent_free: release ptr-libevent@0x7fb3580300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90400 | #458 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 20 9c 76 6a 13 05 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #458 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #458 | rejected packet: | d8 20 9c 76 6a 13 05 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #458: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0412 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388009ed0 | handling event EVENT_RETRANSMIT for parent state #264 | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #264 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #264 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49681.683299; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006194 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90400 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #264 | libevent_malloc: new ptr-libevent@0x7fb3580300e0 size 128 "road-eastnet-nonat-12" #264: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #264) | 8e fe 0e 1c bf 0e 6b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 85 0f 2d e4 cd 04 0b 17 96 14 35 20 98 98 7c | 43 94 0e c0 cb 2a ed cd 26 f3 f4 fd 71 0a b3 35 | 8d c8 ce 92 67 ce 39 72 cf 1d 58 73 86 98 2b a0 | 6f 55 7b 13 d0 1f 62 3b 93 93 85 3e 36 cd 86 27 | b4 c1 9a bd c4 db 39 19 44 28 ec a5 e9 1c 59 a2 | a7 fc b2 f8 f1 72 da 9c 2a b8 36 d3 61 88 51 dc | 4d 20 86 6a 14 25 ef 10 b3 1b 09 52 6d 00 f9 db | 75 0a 80 38 3b 18 7c 9c fd c8 c9 4e b1 e2 84 70 | a4 dd 3f 85 ce 8c cb 20 5c 6a 42 21 65 c4 fd 15 | 7a 47 92 65 67 69 9e be f3 7a e9 66 c9 56 bd d2 | 3c 4a 76 68 b7 3f ce 1d 64 64 a7 2c 71 37 b4 c4 | 53 38 1c 79 97 95 2a 69 1c 36 40 41 3d 05 9c ba | 4d 38 e3 a6 a7 6c e9 b1 59 1a 9f ab 80 0a d9 8e | ac 39 5a 0c e3 b3 9d c1 3d 5d 32 c8 42 00 f8 4c | 3a fb 9c 36 7f 16 43 4c 95 29 48 05 f2 b7 02 75 | 54 25 c2 90 a5 04 3b fa ca 77 9e 55 e7 39 19 34 | 29 00 00 24 0b 7d f5 1c 67 a7 5b 6f d5 5f 23 1c | de ee af 0f ed f9 a1 fa b5 71 92 a8 5a 39 25 fa | 7d a0 ff 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 4e 74 d9 6a 11 61 e7 2b 9e b3 5d | fa c6 10 84 a3 ff e4 72 00 00 00 1c 00 00 40 05 | 61 d2 3a 09 fc 3f e9 c0 9a fa 15 52 e0 d4 39 3d | 0f 2b c4 10 | libevent_free: release ptr-libevent@0x7fb38801d010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388009ed0 | #264 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e fe 0e 1c bf 0e 6b 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #264 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #264 | rejected packet: | 8e fe 0e 1c bf 0e 6b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #264: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b650 | handling event EVENT_RETRANSMIT for parent state #463 | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #463 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #463 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49681.69561; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50058 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388009ed0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #463 | libevent_malloc: new ptr-libevent@0x7fb38801d010 size 128 "road-eastnet-nonat-211" #463: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #463) | 82 4f 79 37 d2 0d 41 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 90 64 a0 3a db 52 d6 c6 b4 21 5d 30 95 90 4d | ec 3e 65 f9 a3 2a c0 c0 7d e8 b2 f7 1e 08 f4 cc | 30 5c 17 eb a6 d5 4e 6e 17 f4 ed c0 bb f3 91 4e | 29 c8 3b 87 04 44 02 f9 0c 4c 73 bd d1 0e d4 bf | c3 01 38 a2 ee a1 61 19 01 62 c9 01 0a 14 69 dd | 59 d3 14 b1 8b 13 6d e7 0f 1d 11 59 11 9b 90 f3 | aa 66 ef 87 af 13 48 7f 6e c1 0d b9 f9 71 ad 9d | fd 12 e0 bc 30 d7 16 13 c9 f0 f8 64 57 36 fa 5b | d1 d8 74 64 e5 de 63 84 ef e1 12 12 26 93 3e 5c | b3 7f 8e 2c 1b eb d2 40 f2 01 5a e7 a8 30 ce b1 | 5c 5e 42 a8 26 40 52 c4 dc ea 04 68 87 26 50 e6 | 46 ae 37 b9 e4 fe 3f ef f2 8e a4 4f 04 25 af 76 | c9 39 80 05 08 fd ea 60 66 c5 24 89 72 f4 32 ff | ed 8b 39 48 50 c3 c4 68 91 e7 fc 82 bb 80 ce 9d | b8 47 ce dd c6 cc 21 8c 6f 88 e2 73 75 00 d9 09 | 84 88 f6 ce 7e 64 f7 42 86 d8 a7 50 3c 43 db 24 | 29 00 00 24 4c d8 7a cc cf f5 14 f0 01 a0 b3 f6 | 54 e1 4b f5 78 b9 2e d9 dd c8 bf f8 13 79 83 13 | b9 47 db df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 0d e0 3b 3f 2d f3 17 7e c2 11 72 | 87 7f c1 e4 a0 63 0f 3f 00 00 00 1c 00 00 40 05 | e9 2f a4 cf 6a af 14 cf 3c 1b bf 7a 8b a2 e8 94 | b0 6c 66 23 | libevent_free: release ptr-libevent@0x7fb380032bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b650 | #463 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388015720 | handling event EVENT_RETRANSMIT for parent state #424 | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #424 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #424 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49681.695747; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004288 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b650 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #424 | libevent_malloc: new ptr-libevent@0x7fb380032bf0 size 128 "road-eastnet-nonat-172" #424: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #424) | e5 61 ef 5f 7f e3 58 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c da e9 09 30 1c 29 bb e6 91 cb 4e 69 4d ec 03 | b5 f9 29 7a 23 48 20 ed f7 47 c2 fe 06 e6 43 d7 | dd db db 34 94 8c 85 3b 55 9b f4 3a 74 ed 7a a1 | b8 84 40 94 dc 5c ed 16 d0 73 2d 49 36 0b 9a 1d | 7a 62 45 16 8d 9c 63 79 31 b8 8c 83 f1 0e b1 7f | 67 fe bc d6 57 49 2e 4d c3 49 48 a7 55 5f ff d0 | 14 68 fc 6f 72 30 bd 46 7b 9a 8c f4 dc c7 37 1c | e4 a4 8f 19 bc e7 61 cc 6b 11 48 dd 4e 4a 37 e3 | ee aa ab b1 b2 36 8e 89 eb 7e b7 77 69 a0 09 80 | 3c 6b fc 75 71 9a f3 bd 94 2c c9 c7 7f d3 9b 98 | 01 34 f8 57 09 1c 44 77 27 2b 95 8b 42 b2 1e 03 | d7 04 87 d9 03 b3 37 7c 1d b7 57 41 2d 16 5a a8 | dc c5 ad 48 e5 82 26 97 54 fe f5 c0 fe b9 29 58 | 35 ce 2a 1a 65 c3 c1 3a f9 04 5b 80 08 58 bc a4 | 5f 74 90 a2 3e 82 ee a6 80 5f 67 41 cd ba a6 4f | 66 85 f6 7c 29 e8 a5 11 0e c2 6f 44 c1 41 6a eb | 29 00 00 24 7c 1f b6 fc f1 5f 8d 51 2e 05 d2 13 | e2 d8 d5 f5 0f 0a 46 07 58 f7 ec 9e c5 1c 22 09 | 2c cd 2f ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 d1 0c 8f d2 91 2d a0 36 f1 93 d6 | bd 3f 30 ca a6 e2 8d 8a 00 00 00 1c 00 00 40 05 | 48 c0 59 12 12 13 1e e0 ba de 8c 06 ba c3 58 23 | f1 28 ea 8c | libevent_free: release ptr-libevent@0x7fb3600407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388015720 | #424 spent 0.0706 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 82 4f 79 37 d2 0d 41 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #463 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #463 | rejected packet: | 82 4f 79 37 d2 0d 41 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #463: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 61 ef 5f 7f e3 58 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #424 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #424 | rejected packet: | e5 61 ef 5f 7f e3 58 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #424: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0354 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abe780 | handling event EVENT_RETRANSMIT for parent state #365 | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #365 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #365 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49681.727032; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005021 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388015720 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #365 | libevent_malloc: new ptr-libevent@0x7fb3600407f0 size 128 "road-eastnet-nonat-113" #365: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #365) | 85 67 19 58 d7 3c f0 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 c9 07 e2 a7 25 a6 09 ab 7f e9 5d 7e 7f 47 e1 | 9f 44 d1 91 14 4d 9b 8f 5d 22 2a 52 a8 98 ff b2 | 6b 6a b0 36 7f fd 95 da a0 25 8f 6e 16 7f 04 38 | 86 c2 bd 33 bf fc a5 26 c4 b6 f6 70 3e fd c6 4a | 25 c8 b3 a8 9f a8 44 89 83 a1 8c aa b8 af 7f e3 | 16 bb 17 56 79 89 e8 f0 01 49 b8 07 c4 c2 fd 27 | 4f 8e 62 66 4b 11 2b 01 9f f2 8c 2a 44 d1 a6 b0 | 37 65 5b 66 a4 8d e5 2d a7 91 fd e3 72 91 ef 62 | 52 0e c8 e1 f3 04 05 43 a3 3a 3c 61 1b d7 eb bd | 6b 38 06 f9 ff f3 a7 b2 e7 89 6b 9c da 79 fc be | 85 2e 71 9d 7f 61 aa 1d 41 bd c5 f4 78 4a e7 2c | 3d fa 74 f7 ca 33 00 f8 ee a6 a8 8a 16 63 2d 1b | 61 9d fa 4c a8 ca 3a 31 b1 cd 60 8d cb 56 88 b6 | 81 05 15 ed cf 3d b4 c9 19 7e d9 8d 29 23 d3 64 | ec 0b 35 05 39 3b e0 f1 75 19 f5 f3 4f 99 e8 61 | bd bd 06 53 be 50 6f 6a cb bc 2d c6 18 e6 53 b2 | 29 00 00 24 e5 25 b4 c0 9c 12 3e 53 68 a2 43 fb | 88 db 47 7b b4 96 4d ec 31 20 f7 c3 1c a9 eb e1 | 62 8a 8b 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 90 3b 10 25 ca fe 1f 3b 58 67 93 fa | 3d a3 98 00 cc 36 84 a7 00 00 00 1c 00 00 40 05 | 55 c6 52 e3 aa aa 60 c0 64 26 bb 2b 79 4e a4 42 | 73 1e 76 57 | libevent_free: release ptr-libevent@0x7fb3880269d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe780 | #365 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 67 19 58 d7 3c f0 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #365 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #365 | rejected packet: | 85 67 19 58 d7 3c f0 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #365: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acec40 | handling event EVENT_RETRANSMIT for parent state #449 | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #449 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #449 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49681.750355; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002028 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe780 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #449 | libevent_malloc: new ptr-libevent@0x7fb3880269d0 size 128 "road-eastnet-nonat-197" #449: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #449) | ea 52 41 06 29 be 32 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c f6 72 22 70 e3 8e 6a 67 c3 d0 4a 0b 7f 5b cf | 2d 68 56 81 95 56 3f 4d 2a 1e 61 1a 59 76 f5 26 | 54 d5 6a 01 f4 8a a1 63 50 3e a3 b6 d1 85 12 bf | 8c a7 c8 b2 9c d2 7e 12 ce 8a 8f 97 a7 10 c6 36 | 55 54 39 bd 73 f0 07 97 c0 8f d8 2f a2 5e 50 05 | cb 9d 1a b8 ce 20 6a 30 ff 7d 3d 2a 89 9c e8 f9 | db 68 6b e7 d3 12 f3 5c 42 81 cc 9e c7 d6 ab 3b | 07 00 72 f9 2b bb 2c 8f 88 74 45 a7 1f 5a 2d 17 | 94 3e ec e0 ce a9 ab 72 79 45 76 ba 8c 1f 40 56 | 6d 7a 46 42 83 af a1 98 c5 23 1e 58 16 d7 79 25 | b7 cc 17 53 0a 7f 1c 45 dc 0f 11 52 e6 bb 5f 53 | 8d b5 f6 fb 27 2b 60 33 a4 cd 4d e9 7c 6b 4b 17 | 81 ec cb ca e4 d2 97 9b 61 33 64 a7 c9 1d 12 b0 | ff a4 81 cf f4 75 a2 54 63 07 9b 1c 61 4f 70 9a | f2 61 b3 19 96 98 3c 7b 44 1f aa 65 b4 bf d7 a8 | 55 c2 75 de ff 71 8c 90 1b 3c c3 a8 3f fe 54 f3 | 29 00 00 24 43 77 8d 20 c7 95 c9 d5 6a 2d 87 1f | da 3a b4 7e 55 a2 17 ed 53 70 56 79 ef 21 f9 7e | 28 b4 26 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 9b 7e ce 31 a7 8d 1a 50 79 db 89 | b3 07 e5 e2 b0 c0 20 fc 00 00 00 1c 00 00 40 05 | eb cc 39 a0 b6 a4 78 79 56 5f 29 29 93 1e cc 18 | 29 12 ff 3b | libevent_free: release ptr-libevent@0x7fb37c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acec40 | #449 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 52 41 06 29 be 32 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #449 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #449 | rejected packet: | ea 52 41 06 29 be 32 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #449: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338012bf0 | handling event EVENT_RETRANSMIT for parent state #425 | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #425 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #425 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49681.758656; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004806 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acec40 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #425 | libevent_malloc: new ptr-libevent@0x7fb37c02a950 size 128 "road-eastnet-nonat-173" #425: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #425) | f7 cf 50 4a 74 06 05 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 92 89 d6 89 4e 50 5f b7 2f 6b 96 d5 81 21 07 | ab 44 17 58 90 1d 7b 64 81 e9 17 d7 bd fe aa 4b | 0a 10 ad 93 a3 c3 87 5f f5 66 29 fb c9 3a c9 b1 | 31 b0 a9 ee c4 90 84 b7 e6 dd 91 e8 75 48 e7 2e | 93 2f d6 a2 f7 4b f6 49 3f d9 f6 d0 5a d6 d1 dd | 4f 9d c2 ed c5 18 e2 07 13 e3 28 e5 ef cc 0a 8a | 3b 35 e0 3e 37 bc 79 9f 2a 04 4a f3 9c f9 c1 fe | 06 93 6a fc 31 07 8c 82 e2 3d 36 5b 4c 64 57 29 | 42 03 5c 40 11 83 46 58 6b 89 40 fb 97 9c 72 d8 | 16 d1 a0 21 3d 63 55 3f 12 ce 3e bc a1 a4 b1 4f | 21 3c 91 be 83 c8 57 a7 2b 28 e1 48 64 02 57 7e | 42 a3 f1 45 48 e1 db 05 2e fb d4 4c 7c 8a 0a 60 | 5f f4 86 80 46 9a e0 d0 18 11 1a 4d bb 7c 02 87 | bf 2e e0 bb 87 e9 5f b8 47 04 4d f1 27 cf b3 29 | 9c 1a d0 ad 05 bc 03 0c 16 0c 3a 7e 72 1b 12 70 | b9 a4 26 8b 78 5c b2 39 ba 99 5c 08 5d fd 0b bd | 29 00 00 24 5f 48 0d c0 35 2d 82 0c 4e 37 c0 2d | fb 4b f1 c7 3e 7f d8 da d2 4b 1d 20 b9 ad b0 f8 | d9 af 0c f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 91 c4 e4 6c ee a0 d8 c3 62 ab 89 | a1 7e a7 1c b9 03 c3 d0 00 00 00 1c 00 00 40 05 | 62 01 4a 70 10 9c f9 53 26 65 4b 23 2c 02 6b 53 | 25 3b 71 4a | libevent_free: release ptr-libevent@0x7fb35003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338012bf0 | #425 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 cf 50 4a 74 06 05 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #425 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #425 | rejected packet: | f7 cf 50 4a 74 06 05 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #425: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.048 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #217 | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #217 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #217 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49681.77998; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.026939 exceeds limit? YES "road-eastnet-nonat-217" #217: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-217" #217: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #469 at 0x557d46afaf40 | State DB: adding IKEv2 state #469 in UNDEFINED | pstats #469 ikev2.ike started | Message ID: init #469: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #469: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #469; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-217" #469: initiating v2 parent SA to replace #217 | using existing local IKE proposals for connection road-eastnet-nonat-217 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 469 for state #469 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb338012bf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #469 | libevent_malloc: new ptr-libevent@0x7fb35003b0b0 size 128 | #469 spent 0.0761 milliseconds in ikev2_parent_outI1() | crypto helper 6 resuming | crypto helper 6 starting work-order 469 for state #469 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 469 | RESET processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #217 ikev2.ike failed too-many-retransmits | pstats #217 ikev2.ike deleted too-many-retransmits | #217 spent 2.51 milliseconds in total | [RE]START processing: state #217 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-217" #217: deleting state (STATE_PARENT_I1) aged 64.030s and NOT sending notification | parent state #217: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #217 "road-eastnet-nonat-217" #217: deleting IKE SA for connection 'road-eastnet-nonat-217' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-217' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-217 | State DB: deleting IKEv2 state #217 in PARENT_I1 | parent state #217: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 469 time elapsed 0.000545 seconds | (#469) spent 0.549 milliseconds in crypto helper computing work-order 469: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 469 for state #469 to event queue | scheduling resume sending helper answer for #469 | libevent_malloc: new ptr-libevent@0x7fb36c039e30 size 128 | crypto helper 6 waiting (nothing to do) | stop processing: state #217 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3540407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | in statetime_stop() and could not find #217 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-217 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-217" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-217' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-217" | stop processing: connection "road-eastnet-nonat-217" (in initiate_a_connection() at initiate.c:349) | spent 0.0586 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #469 | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 469 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #469 | **emit ISAKMP Message: | initiator cookie: | 29 4a 77 5f 7a c1 26 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-217 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 36 e1 17 9f 01 39 e1 e9 f8 e3 b4 37 56 6e 01 9e | ikev2 g^x d8 db 78 19 20 a1 ab 6d c3 e8 12 cd f6 c3 2c 5f | ikev2 g^x d5 86 61 6c a8 d4 5b 57 ac f5 b7 f0 24 de ac 90 | ikev2 g^x a1 9c 51 ce 2d 7a 33 35 b1 68 02 e0 5a 9f bf ac | ikev2 g^x 1b d8 19 f9 b4 68 45 14 e7 fd c5 a9 74 d6 09 6d | ikev2 g^x f9 4a 25 95 f8 f0 1c 13 dd 36 12 79 4b 27 2a bb | ikev2 g^x 86 17 86 e1 0e 04 a7 ab e3 0c 51 78 89 39 a0 df | ikev2 g^x c7 a9 56 0a e4 9a f1 58 c7 a1 12 21 f0 18 d0 d0 | ikev2 g^x 21 0e 73 e6 4f d3 13 37 a8 aa e3 89 21 ab a3 7c | ikev2 g^x d5 ac 7b aa ea d7 ff a4 b9 b2 c3 7f 9b 07 77 17 | ikev2 g^x 36 8f 4e a7 40 03 46 9c db 93 b3 16 3c e2 7f c0 | ikev2 g^x 58 42 83 4f fa 88 71 3b b7 86 e5 ca 62 88 5c 9f | ikev2 g^x 93 c4 59 82 fb 9e 5a 96 92 16 5f 68 0e 83 59 2f | ikev2 g^x 70 32 51 a7 ce dd b8 93 09 66 27 ff 7a e6 c4 cc | ikev2 g^x d2 87 46 9e b6 49 85 48 3f a7 ef 43 8a 5c ae e6 | ikev2 g^x 2c b0 88 25 66 2b 82 4c a9 2f 05 19 54 70 c3 9c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 36 8f c2 cf 02 b6 2e 75 ac 6c a4 55 9f 56 a2 b8 | IKEv2 nonce 31 83 97 a5 56 a5 c5 7a ba 53 78 14 83 c8 c0 c3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 29 4a 77 5f 7a c1 26 66 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d9 | natd_hash: port= 01 f4 | natd_hash: hash= e3 d6 3c 93 bb 1b 68 50 cd c9 2f b8 25 99 9e c0 | natd_hash: hash= 3a 2f 1f 80 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e3 d6 3c 93 bb 1b 68 50 cd c9 2f b8 25 99 9e c0 | Notify data 3a 2f 1f 80 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 29 4a 77 5f 7a c1 26 66 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e5 a0 2e 8f cb 71 f8 0c 42 a7 95 8f 73 2e c5 90 | natd_hash: hash= e5 8b 3a 32 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e5 a0 2e 8f cb 71 f8 0c 42 a7 95 8f 73 2e c5 90 | Notify data e5 8b 3a 32 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #469 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #469: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #469 to 4294967295 after switching state | Message ID: IKE #469 skipping update_recv as MD is fake | Message ID: sent #469 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-217" #469: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.217:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #469) | 29 4a 77 5f 7a c1 26 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 e1 17 9f 01 39 e1 e9 f8 e3 b4 37 56 6e 01 9e | d8 db 78 19 20 a1 ab 6d c3 e8 12 cd f6 c3 2c 5f | d5 86 61 6c a8 d4 5b 57 ac f5 b7 f0 24 de ac 90 | a1 9c 51 ce 2d 7a 33 35 b1 68 02 e0 5a 9f bf ac | 1b d8 19 f9 b4 68 45 14 e7 fd c5 a9 74 d6 09 6d | f9 4a 25 95 f8 f0 1c 13 dd 36 12 79 4b 27 2a bb | 86 17 86 e1 0e 04 a7 ab e3 0c 51 78 89 39 a0 df | c7 a9 56 0a e4 9a f1 58 c7 a1 12 21 f0 18 d0 d0 | 21 0e 73 e6 4f d3 13 37 a8 aa e3 89 21 ab a3 7c | d5 ac 7b aa ea d7 ff a4 b9 b2 c3 7f 9b 07 77 17 | 36 8f 4e a7 40 03 46 9c db 93 b3 16 3c e2 7f c0 | 58 42 83 4f fa 88 71 3b b7 86 e5 ca 62 88 5c 9f | 93 c4 59 82 fb 9e 5a 96 92 16 5f 68 0e 83 59 2f | 70 32 51 a7 ce dd b8 93 09 66 27 ff 7a e6 c4 cc | d2 87 46 9e b6 49 85 48 3f a7 ef 43 8a 5c ae e6 | 2c b0 88 25 66 2b 82 4c a9 2f 05 19 54 70 c3 9c | 29 00 00 24 36 8f c2 cf 02 b6 2e 75 ac 6c a4 55 | 9f 56 a2 b8 31 83 97 a5 56 a5 c5 7a ba 53 78 14 | 83 c8 c0 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 d6 3c 93 bb 1b 68 50 cd c9 2f b8 | 25 99 9e c0 3a 2f 1f 80 00 00 00 1c 00 00 40 05 | e5 a0 2e 8f cb 71 f8 0c 42 a7 95 8f 73 2e c5 90 | e5 8b 3a 32 | state #469 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35003b0b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb338012bf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #469 | libevent_malloc: new ptr-libevent@0x7fb3540407f0 size 128 | #469 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49681.781117 | resume sending helper answer for #469 suppresed complete_v2_state_transition() and stole MD | #469 spent 0.324 milliseconds in resume sending helper answer | stop processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c039e30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 4a 77 5f 7a c1 26 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #469 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #469 | rejected packet: | 29 4a 77 5f 7a c1 26 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d9 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #469: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a43dd0 | handling event EVENT_RETRANSMIT for parent state #459 | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #459 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #459 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49681.785265; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001039 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c018210 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #459 | libevent_malloc: new ptr-libevent@0x7fb36c039e30 size 128 "road-eastnet-nonat-207" #459: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #459) | 64 1c f9 72 57 02 e5 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 f4 91 af e8 cc 47 24 c2 b5 4c 3e ed df 87 0c | 09 e0 4b 07 1e 23 c5 7e 86 e2 5a ab 7d 41 06 3d | 7f 7d f9 8e b6 58 c8 fa 4a e7 6e 59 bd 9e 19 5b | d0 22 36 6d 62 9e c7 d4 0e 8a 77 c0 e4 05 9e c6 | 38 14 50 50 10 9e e8 30 b1 17 07 a8 ec 87 4b 21 | 15 4c 43 ee b6 9d 8d a1 9c 18 3d 34 43 97 8f 77 | 9a 8e 35 11 77 6c 19 4c d5 d6 10 76 41 7d 92 29 | ce 7e b0 f8 dd e1 3c da bd 28 65 ea 34 c0 d5 5e | 87 61 2d 03 e2 eb 39 88 92 b2 21 9a 8c ff 81 cd | e0 87 95 3d 88 8d a2 1e 66 0d db a2 7a 79 4c cc | ae 9a d3 e6 87 6a 1b 78 ae 44 bb 23 8a 41 53 1f | af 3f 42 6b ff 45 a9 da 42 e2 38 bd 4c 50 bf a8 | 3b 16 b5 57 9a cf 28 d9 88 40 31 6e bd 9a 3e 51 | 61 82 b6 d4 f2 88 81 2c 57 c3 85 0c a7 ff fd 6c | ed 2a 14 13 51 d6 b5 56 aa 0c 26 20 25 e3 9c 40 | 12 38 26 e0 f5 9a 6e 40 35 0c 6b 0a 6d b3 65 32 | 29 00 00 24 5c 75 af 9e f8 ea 62 49 48 89 05 1e | 77 92 7c c2 74 9a fc 43 04 bc b7 18 cc f7 58 3d | 9b c8 34 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 7f b1 c0 22 56 8e bd 29 fd 39 4f | 5d 90 ed 84 8a 20 f8 23 00 00 00 1c 00 00 40 05 | 58 59 18 6a d1 74 dc 11 3e 54 b0 34 57 9e 0a 5d | 5a f6 05 3b | libevent_free: release ptr-libevent@0x7fb3600180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a43dd0 | #459 spent 0.0874 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 1c f9 72 57 02 e5 bf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #459 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #459 | rejected packet: | 64 1c f9 72 57 02 e5 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #459: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2e150 | handling event EVENT_RETRANSMIT for parent state #265 | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #265 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #265 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49681.787516; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00521 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a43dd0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #265 | libevent_malloc: new ptr-libevent@0x7fb3600180b0 size 128 "road-eastnet-nonat-13" #265: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #265) | 5e d6 2a e3 fc d6 88 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 2e 3a 15 7c f9 00 41 72 02 12 64 4c 6b 73 52 | bb 8d bc 96 e4 69 5a 27 ff 16 12 40 6d b3 e6 7d | 28 6d d8 d8 46 ae 55 b1 20 60 d0 f0 2c d7 5a 32 | f1 e8 5b 54 2b 16 ec 87 57 a5 e1 c1 08 80 a6 16 | a0 4f 0f 3b 62 e5 8c cb aa 65 e4 d5 87 37 d0 85 | 34 de df b2 ac 15 11 24 c5 c0 e2 ba 8e bf 6a 38 | 92 5b d1 dd 84 fb 29 ef cf 37 36 ed 82 a0 ef 7a | 79 c3 2b da 2f 96 ad 2b 46 50 67 74 44 c2 8f 22 | 65 99 b1 3a 1c fd 70 cc 25 39 6a 77 0a f9 8c f3 | 33 34 af 74 f2 1a 52 31 29 6f 53 43 ce 77 a1 c0 | 4e ad 32 24 24 86 73 ad 16 2d 19 8b 36 54 d6 8f | 96 95 e4 0b 0b df d1 24 22 12 35 73 ac 81 e7 c1 | af 88 20 ae e1 fa 41 09 f0 f6 2b 19 42 79 9e 92 | 6a 95 0b 69 19 21 ee ba 94 35 b0 07 aa 13 f3 40 | 4f 27 f7 e8 7d ea ae b3 14 bf 0c b2 8b a5 e7 1f | 2e 4a 4a 5e 40 8d d3 1a 30 c1 1d 13 0d 61 d3 15 | 29 00 00 24 d2 1b cb fe 42 33 59 cd 17 75 9b cc | f4 b0 0c 18 45 31 71 9f e7 2e 80 d7 48 7b 93 7c | d8 b3 ab 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 77 56 b7 16 48 fa 98 9b c1 2d 60 | a6 6c bc 07 2c 3a ef 47 00 00 00 1c 00 00 40 05 | 5a c9 c6 01 25 8a 31 37 7b d0 f2 6b d1 02 08 77 | 0a b6 4e aa | libevent_free: release ptr-libevent@0x7fb3440407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2e150 | #265 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e d6 2a e3 fc d6 88 0b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #265 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #265 | rejected packet: | 5e d6 2a e3 fc d6 88 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #265: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0472 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd80 | handling event EVENT_RETRANSMIT for parent state #366 | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #366 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #366 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49681.788793; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004673 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2e150 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #366 | libevent_malloc: new ptr-libevent@0x7fb3440407f0 size 128 "road-eastnet-nonat-114" #366: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #366) | 3c e6 10 56 de c7 50 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 fc d0 2b 58 ad f1 9a aa 82 c0 57 ae f0 46 70 | a2 7b 22 23 65 30 fe 9c 0d f5 dc 40 c0 ca 9d ee | 6e 66 1d 3a 72 fe dc 88 4a 26 55 69 91 41 bf 12 | 90 50 78 9a 3c 37 7a d2 58 65 01 98 28 27 ba 6d | 00 33 b4 2e 8f 98 78 f3 cd 21 f0 18 dd 51 cb 68 | 4f 92 9d 38 c4 06 c1 6c cf 60 41 a1 18 22 f2 93 | 34 0c 55 d7 b5 30 6c c4 9c ad 0a aa 9b 11 9f 59 | 49 ac e6 72 dc 82 61 fc 42 ea d8 0b 5d 7d f2 47 | 0f e6 10 b9 1d c6 85 40 80 3f b3 ee 0f dc 82 fa | 53 40 f0 d9 23 6a 65 60 f3 d7 02 47 6c 0a 6f 61 | 8d 04 17 7d 94 9e 17 80 39 4f b5 db 2d a0 f8 02 | 18 21 68 7d 0e af 20 98 75 39 40 4d 5d 87 d7 7b | 4c 39 3b 20 a9 65 05 04 46 a1 49 0b d9 6d 8f 15 | 4f b4 23 1a 8e 5f 27 66 f0 b0 a6 bd 48 dc 96 c2 | 77 e2 b0 72 b6 2c 19 2f 16 65 ef 29 dd a3 4a de | 9a 82 38 c8 cb 37 99 80 5e bb 4b 53 97 7b f3 fa | 29 00 00 24 7a ad 39 64 9f ec c1 f8 33 94 44 40 | f7 c9 dd b2 6b e5 21 16 26 39 73 9d cd 0b f5 7a | f4 93 09 bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 12 7d c7 e4 80 f6 ae d0 f3 0f 94 | c9 99 cc 19 2a ad fe 8d 00 00 00 1c 00 00 40 05 | 84 74 fa e2 ee 48 6b 8a 7f a7 09 f6 4e 00 6d 26 | 52 0f f6 08 | libevent_free: release ptr-libevent@0x7fb37c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd80 | #366 spent 0.0904 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c e6 10 56 de c7 50 ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #366 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #366 | rejected packet: | 3c e6 10 56 de c7 50 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #366: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0411 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46950 | handling event EVENT_RETRANSMIT for parent state #464 | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #464 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #464 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49681.805048; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500639 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #464 | libevent_malloc: new ptr-libevent@0x7fb37c04b7c0 size 128 "road-eastnet-nonat-212" #464: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #464) | 24 23 49 88 e3 09 10 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 3e 00 a4 b1 da ff 66 fb 46 9b f8 05 c4 d3 4e | 1a be d3 c5 f3 29 65 46 ed 6f e5 e1 9c d3 68 c3 | 49 3b 6a cd e8 c4 12 c0 42 a0 22 7e 1b 5d 32 aa | a0 3a 32 c8 92 e5 3d a9 90 26 7c b6 7a 3a c7 43 | 1e d7 d9 ca a9 3b e4 0e ac 4c a3 a2 54 be fa 3a | 34 7b 08 69 76 9f f5 86 6b e1 71 f1 ca f2 34 fb | f0 af 6d c0 e7 4d 86 2c 35 64 d7 a8 e5 56 44 f4 | 1b a3 7b 36 d3 8e bf 68 72 d1 d6 14 19 d5 94 41 | 37 2c 85 dd 26 51 82 12 f9 57 28 f6 64 e4 99 2c | e5 14 14 38 a6 eb 30 83 5f a9 d8 ce 33 ba b5 e7 | 8f 9e 29 5d 17 d7 5f e7 f7 6f 44 97 e9 e3 1d 52 | 7d 6b 40 ae 7e e6 9b 70 f4 e4 cb 6b e6 46 d1 1a | f1 d4 e8 4a 08 7a 73 f5 ae fa 1c 51 b5 c1 66 db | b4 47 cd 7b 34 6f da f9 6b b2 dc 0f 59 56 0e 82 | f9 d8 cb f8 b3 e7 8c 71 cf eb c3 24 d5 a5 32 fc | 19 3b 14 fc 10 5b ac 0b 65 e1 fc c1 26 0d 3c cc | 29 00 00 24 f8 5a 68 e8 8f 04 5e 9b c3 04 25 38 | 2e af 26 bb 12 7b 35 ab f6 8f 9b c1 e5 8b f7 b5 | fb ab d6 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 53 56 65 0c 1b 38 25 05 25 e2 17 | 1d aa de c6 51 81 dc 56 00 00 00 1c 00 00 40 05 | b6 60 c7 67 b1 c7 40 e8 a5 6f 2e d6 dc 92 69 0c | f8 bb 28 2f | libevent_free: release ptr-libevent@0x7fb3580180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46950 | #464 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 23 49 88 e3 09 10 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #464 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #464 | rejected packet: | 24 23 49 88 e3 09 10 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #464: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378046090 | handling event EVENT_RETRANSMIT for parent state #426 | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #426 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #426 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49681.829348; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004531 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46950 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #426 | libevent_malloc: new ptr-libevent@0x7fb3580180b0 size 128 "road-eastnet-nonat-174" #426: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #426) | 9a cd 73 8e 7d d4 98 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 8c 97 9a 7b 25 95 00 9a 77 62 32 ef ca 9f d6 | 76 8f c1 1d 7b f7 f1 fd 6f 49 39 37 2f 63 23 81 | 71 66 7a 84 28 0c 71 94 62 69 ce 59 2d d7 c5 69 | 55 1a 91 d5 7e 6b 73 77 b1 63 3d e2 98 99 4c 7d | 88 69 a7 7b 5e bc cc b8 0e b3 73 c2 2e 32 ae 8e | 86 79 03 81 0b 4c 54 b4 73 a6 e2 6e 97 ca 67 d3 | 85 98 35 01 61 ca 66 d6 14 1b 0e ed 3a 29 6c 85 | ba 28 d6 d7 db e6 44 77 a6 ce 5b 46 99 7c a1 df | 78 8d f1 17 d8 0f f9 ea 99 30 fc e2 cf b2 41 e0 | b2 47 0b 49 32 f7 03 99 56 d9 28 c3 7a 54 f6 02 | 19 cd 98 7b 73 22 d4 cd 39 3f 7a 0d d8 d7 cd a6 | 8a 6b 30 16 cd 73 f2 96 6c 21 9f bd 4e e5 1b e4 | 55 08 4d 75 fb 1c cb 36 33 b5 70 97 3d ae 1c 0b | fd 17 d6 8a db a7 4c eb 93 47 b3 25 b1 c8 9d b9 | 3c fc 99 0e e7 eb 29 07 c1 90 16 1e 24 76 3c e1 | f0 b6 2f 6d 76 8c 81 1b 13 f1 8a 90 f5 6f 06 29 | 29 00 00 24 9e 79 2e b7 2a 97 cc 4e 5e 3a 53 a1 | 14 f4 9d f2 e0 f1 3a 21 7a b3 38 2d 77 ac 99 ad | 8b c3 54 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 36 a3 f8 78 1e 60 6d 59 1a 44 b3 | 39 63 64 a7 a1 bd a5 d0 00 00 00 1c 00 00 40 05 | 8b d1 e6 ab 49 4a f3 b9 19 1d c0 80 f7 d0 cb 97 | 3f 74 7f 21 | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378046090 | #426 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a cd 73 8e 7d d4 98 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #426 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #426 | rejected packet: | 9a cd 73 8e 7d d4 98 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #426: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0d4c0 | handling event EVENT_RETRANSMIT for parent state #450 | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #450 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #450 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49681.838635; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002384 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378046090 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #450 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 "road-eastnet-nonat-198" #450: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #450) | 6c 66 54 70 e3 85 47 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 7f 52 be 1b be 3e b4 95 6c 7f ea ce 79 84 79 | bb 2c a4 22 02 14 1a c7 80 c9 fc 63 a2 df a7 b4 | 1d c3 3e 47 98 35 3a c5 6d 01 79 cf ce 3b ed 3f | e7 fc 21 90 6a 8f a9 37 0a 15 57 ed e5 84 6d 80 | bc b0 af 24 80 0c 58 35 20 db 3e aa 64 ad 44 83 | d9 34 7e 33 a0 1c 88 af b7 63 e8 97 42 89 19 cf | e1 51 ee bc 36 b3 3f ea ae 0a 36 ea 2a 42 b5 d5 | 2b 9d 6c 67 c3 b5 e3 5c 88 ec 08 73 1a b8 90 c6 | eb c9 08 93 4a fd 61 5f ac b7 cf 92 b0 ce 44 08 | c5 ea 9d d1 33 ae 08 3a 55 1a 54 74 ee 06 12 8c | af 05 f1 32 8b f9 ad 76 e7 15 cf bb 56 d8 0d 22 | aa bf 8f d9 bc 81 33 05 b5 ca b2 64 e4 57 c2 aa | 8a ce 60 a9 03 71 24 23 e8 e9 eb 0e f3 fd cb 40 | 57 21 41 6c 87 a4 12 87 6c a3 20 f1 71 99 97 a1 | c9 bf 28 c9 61 1f 0e d1 0f d5 eb 18 2d 83 11 2c | a4 a9 46 db 50 5e 63 04 e8 1e e0 10 c3 22 6d 3c | 29 00 00 24 60 b3 78 69 cb 9c d2 f7 d6 cf 6b 51 | 75 18 c5 a7 1c 11 fb 00 38 fa 43 80 05 51 ec 75 | df 66 73 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 01 2f 17 96 36 9a 51 cd 6f 6e a8 | c1 69 8d 8a 84 17 97 6b 00 00 00 1c 00 00 40 05 | 07 24 02 da 94 a8 c8 5e ad a8 39 f9 98 2f 5a 91 | 01 02 06 a3 | libevent_free: release ptr-libevent@0x7fb34803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | #450 spent 0.0901 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 66 54 70 e3 85 47 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #450 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #450 | rejected packet: | 6c 66 54 70 e3 85 47 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #450: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a70b50 | handling event EVENT_RETRANSMIT for parent state #367 | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #367 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #367 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49681.849885; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005026 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #367 | libevent_malloc: new ptr-libevent@0x7fb34803b0b0 size 128 "road-eastnet-nonat-115" #367: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #367) | 4a 87 68 98 60 e9 4c f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 0c 97 07 ab 60 f0 87 17 3b e3 ad e6 c0 a4 f8 | bc d0 84 fc 55 d2 65 d6 9f 46 ab 63 b9 cd 86 a7 | 92 52 2d 61 57 c8 33 96 bd 3f e7 29 4c c0 56 81 | 07 2c a6 2e b4 e1 f4 a2 f9 92 52 0a 37 04 e4 51 | 6e 83 7a 8b f6 b0 a9 33 fc 7e 63 8b 04 cb e8 b1 | 89 da ba 9d 79 52 4b 77 ad fe 01 ca be 34 71 25 | 01 b7 c6 b7 a4 d2 8b 5a 4f 28 3e 3a 2c 2d 2b 82 | b6 7f 76 80 3a 8d 21 5e c2 27 da 9c 35 b4 28 8d | 4f 12 52 38 3a d3 0a 5c 8a f9 8f 79 8d 25 d4 f8 | ed f0 27 a3 9a 91 9a 23 17 a2 c5 fb 5c 81 c7 3f | d7 90 16 5d 16 d9 fd c2 ab 94 11 66 13 b9 42 50 | 61 f5 f7 53 fa 66 74 a0 35 1a 38 cb 76 13 72 7a | 71 f8 95 99 2b 70 57 e9 96 87 e1 a7 fa 09 46 16 | 2d 17 ab 0f b3 e3 6d 7d c4 71 f7 b9 01 3d 53 ec | 89 99 23 9b ed fe dc 3d 96 90 a5 f1 6b a2 7c ad | 08 22 28 21 90 c0 9d 24 98 36 19 8c 8e 5f 64 f3 | 29 00 00 24 cc 21 72 ec 84 1b 6c bc be 58 98 1b | fd b2 70 93 97 ae 8a 73 25 e3 f3 ed 6f 6f ad a0 | a3 bc 74 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 20 17 ba 74 ed cb 3d 19 9d 8d 0a | 7d 3c 02 99 ce fc 27 96 00 00 00 1c 00 00 40 05 | be d4 1c 69 d6 46 df 94 c0 c1 0d 02 c5 30 14 7a | ff f7 b4 bf | libevent_free: release ptr-libevent@0x7fb35001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b50 | #367 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 87 68 98 60 e9 4c f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #367 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #367 | rejected packet: | 4a 87 68 98 60 e9 4c f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #367: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0965 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #266 | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #266 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #266 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49681.875249; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007685 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b50 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #266 | libevent_malloc: new ptr-libevent@0x7fb35001d920 size 128 "road-eastnet-nonat-14" #266: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #266) | 6b cc e0 12 8b aa 91 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 c7 f6 72 9c a5 df d1 37 bd 8c a8 3d 12 ac f8 | 22 21 09 d5 08 f4 92 dd f1 6b 1f 81 7b 7f 3b 9d | 10 fa 77 c3 74 a7 03 4d 17 3b 47 94 f2 0e 9e 20 | ba c3 57 67 86 fd d2 e5 0d 53 bc 0e c2 cf a4 3a | ca 89 10 10 9a 9f 52 0e c5 60 b3 38 be 05 37 b4 | a3 6b 5d d8 04 66 d6 b5 93 93 8f 47 58 63 40 52 | 1b f8 2c cb 93 59 07 2b ad c7 18 ca a5 e9 24 fa | 41 de 1f 43 7f 1f 27 30 49 67 c7 c8 16 fd 61 a4 | 21 e9 05 98 46 f1 50 b6 8e 31 ad a9 2c 10 19 f5 | b9 ef 6b d3 e7 07 06 8e bf 18 8b 0a 77 f5 44 4b | 1c 00 21 d9 dc b3 66 3f a9 4b df cd cd bd 25 d2 | 2a cd 52 ad da b3 d3 bc be e7 d4 32 97 da 0f e8 | e2 29 51 0e 96 41 b4 ff 9b 20 c1 68 f8 22 6b 37 | bc 2d 7d 2a 13 01 a1 b3 05 fa c1 ea 1c 1f 45 97 | 4c 05 13 ad eb 35 15 0f f5 10 99 91 9b 3f 29 a1 | 29 e0 29 94 46 69 fe a4 f9 df d3 46 9b f7 d6 fc | 29 00 00 24 85 48 4e 62 cb aa ef f3 1e 98 d2 14 | 8e 36 5f 8a 20 c7 f8 35 5a c8 08 b9 4d a2 67 85 | 59 88 c1 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae c1 7f 5b 24 ac dc 11 ec a1 5c 57 | 31 3f 4b 60 7a 20 b0 c6 00 00 00 1c 00 00 40 05 | 71 38 17 79 8f 5d ce 34 6f 4c c4 ce cc 6f 78 37 | 7e be 6c a5 | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | #266 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b cc e0 12 8b aa 91 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #266 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #266 | rejected packet: | 6b cc e0 12 8b aa 91 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #266: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0552 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38400a290 | handling event EVENT_RETRANSMIT for parent state #460 | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #460 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #460 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49681.893543; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001444 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #460 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 "road-eastnet-nonat-208" #460: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #460) | 23 48 f5 22 8d 37 9a d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 df d9 22 d0 fa 01 d1 aa 88 df 6a 8b 18 c0 09 | 4f 5b 80 db c5 12 8b 47 ef 35 50 bc b0 af 99 c5 | f9 cf 10 a6 63 8f ba 03 da 7f 0b b3 54 11 ba 9c | bb 06 80 77 61 12 b6 fe 2b bb 2c 7d 23 ed 7a 74 | 17 31 cb cb 95 4c d6 8f 31 04 dc 07 37 df 2d f4 | 1c ed 0c bb 28 ba e2 23 2d 3d a3 b2 fc 6f 50 eb | 56 d2 5b 1e f1 ad 23 2f 3e 55 c4 35 e9 32 f6 24 | 86 b3 e7 fd 04 0f 6f 72 db 37 4f bd d9 fe 64 c2 | 83 ac 83 05 91 73 42 0a a1 0c 3e 29 3c 20 67 b6 | 92 37 23 8d 25 df 18 a0 fa c2 98 93 ab ff 5f 64 | 7c d6 b8 fc 1d 90 5c 26 98 2d 8b b3 56 38 e2 7c | 20 da c8 bf 8d be 1d 6d f8 c5 88 bf 2f 3a f2 41 | 78 28 51 f9 69 ab 11 20 67 51 52 04 40 a5 c7 0c | 37 f0 c6 5d f9 95 c0 b8 47 6e 71 8e 99 56 3a 5f | e1 5c d4 8d c1 97 29 9c 26 a6 ac 65 11 ae 68 ef | 23 72 8e c9 45 c4 63 78 1b 5c 81 47 6e 58 87 ff | 29 00 00 24 25 2a f3 c2 d1 34 f2 28 be 54 0b a4 | 22 e2 98 59 02 dc 2f 37 5b b6 b4 bd 10 49 91 58 | 87 4d 98 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c c8 5d 4c 09 cc 17 d5 22 fc 7b d0 | 43 ae fd 90 5d 04 da 2b 00 00 00 1c 00 00 40 05 | 07 a4 f0 f7 58 53 22 23 25 cf 1a 07 69 10 b8 4a | 16 e3 ac d7 | libevent_free: release ptr-libevent@0x7fb38402bf10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400a290 | #460 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 48 f5 22 8d 37 9a d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #460 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #460 | rejected packet: | 23 48 f5 22 8d 37 9a d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #460: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0715 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad17c0 | handling event EVENT_RETRANSMIT for parent state #465 | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #465 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #465 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49681.901907; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50084 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400a290 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #465 | libevent_malloc: new ptr-libevent@0x7fb38402bf10 size 128 "road-eastnet-nonat-213" #465: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #465) | 61 8e 23 d2 13 62 a1 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e ff ad a6 69 28 f7 dc 3e 12 16 a3 b8 12 d1 0c | e2 d9 c7 08 64 20 6b 95 e2 f7 13 3f fe 41 07 b0 | 63 aa 7f 3d 77 9f f9 e2 21 16 88 33 88 34 63 be | 66 c4 e1 0f 6d 0e 67 89 ae 7f d4 2b da 09 0e c2 | 3d 5d ed e3 b1 da e4 45 10 b1 c5 e8 5c a0 b7 e1 | 45 c7 74 34 87 11 e9 20 8e bf a9 d5 b7 7f 3e c8 | 87 13 ea b0 4c 38 35 35 21 28 ca 99 cb 90 60 a1 | 8c 47 23 f8 9b b8 e8 b3 af 65 36 19 01 0f 99 db | 11 cb f7 6b 11 70 78 e3 5e f3 08 79 6c d7 3e 9c | aa 63 ab c1 3b 94 5d c4 f5 a3 7c fb 68 79 fd 4d | ad 0f 3b a0 62 30 54 4e 21 46 20 c3 e3 03 c6 e1 | b9 0f 7d fe 4b b3 60 7d 63 ba a2 4c 73 2e f3 b8 | 3b 22 a2 5f eb 6e f7 60 a7 f7 13 33 69 2d a4 92 | 73 a6 b3 6f 83 80 a4 99 0d 08 29 5e d9 35 92 ae | 9f af 0f c2 f8 4b f3 a5 f1 21 b9 71 6a 24 94 9a | 22 03 aa 3e 91 42 1b 0b b8 8a 56 9b 18 21 37 6d | 29 00 00 24 d0 d3 37 6e 16 17 0d f3 9a b3 75 28 | da 73 bd b0 37 5f e8 7c ed 64 dd a2 58 d5 25 f4 | 40 05 3d 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 42 81 75 52 0a 3a ff 0f 6a b7 c3 | 61 92 38 6c 3b df 54 bd 00 00 00 1c 00 00 40 05 | ac 90 18 d8 00 f9 15 ad 07 5e df 3f 97 c5 48 08 | 0a 92 84 e5 | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad17c0 | #465 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 8e 23 d2 13 62 a1 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #465 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #465 | rejected packet: | 61 8e 23 d2 13 62 a1 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #465: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5da90 | handling event EVENT_RETRANSMIT for parent state #427 | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #427 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #427 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49681.905228; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003435 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad17c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #427 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 "road-eastnet-nonat-175" #427: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #427) | 4d cf ce dc 5e 69 0c 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be f3 80 6d a1 4d bc 3b 63 de fe 7b 5d 35 aa 05 | b1 28 d6 19 4f ca c2 b6 85 f2 21 b1 5f ee 7d c3 | e5 4d ce d8 a2 87 47 56 c6 32 a1 9b 66 32 11 d6 | 2a 42 af 5d 8f 34 c5 d5 6c 06 20 9f 03 7a dd 4b | 48 34 c3 3a 83 64 cc cf 03 38 0f 85 e3 77 24 47 | d5 16 ac 4d 8b 47 b5 03 3d 95 eb ea 92 b9 cf 0a | 68 66 89 9f e9 d7 ae 03 3d 64 75 ac c9 d5 b3 10 | de 8f 17 7b 40 ef 37 ec 93 3c cd 2d 80 d3 81 0e | 06 7b 23 ba 8b 61 0c f3 0a da 72 5d 9c fe 2a 86 | bd e9 e7 fc 88 d7 20 01 3d 62 9b 97 2d 52 60 5a | fa 1e fb 14 48 2b da dc c9 bc 30 8f d1 65 96 cb | 33 cf 05 cd 5e fb 63 36 4b e6 22 41 78 36 97 51 | 7d 03 25 93 d8 95 93 1e 55 d3 a5 af 94 2f 9c 8c | 5f a3 40 23 47 68 5e 3a 9d 49 f6 a2 e8 96 cd ae | 14 48 e0 e0 ab cb ce 26 3e 2f 37 d7 ae b6 aa 01 | 36 16 4f df 45 31 cb 1a 1c 34 5e a5 cc 5a a8 48 | 29 00 00 24 fd 8d 8b b7 46 89 9a fa b3 ab b5 e9 | cc f2 e8 c2 d2 52 f8 a0 49 af 7a 94 c3 9c de 32 | b7 d8 84 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9a c6 fd c2 96 5c 57 4c be 19 76 6e | d6 a6 82 da 0b ee 49 1a 00 00 00 1c 00 00 40 05 | 12 be 5a 47 ba 89 37 fe 5c 7b 97 4a 79 4a eb 43 | ad 50 1a 96 | libevent_free: release ptr-libevent@0x7fb37c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5da90 | #427 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d cf ce dc 5e 69 0c 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #427 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #427 | rejected packet: | 4d cf ce dc 5e 69 0c 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #427: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0578 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800cc10 | handling event EVENT_RETRANSMIT for parent state #368 | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #368 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #368 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49681.919531; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00492 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5da90 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #368 | libevent_malloc: new ptr-libevent@0x7fb37c035930 size 128 "road-eastnet-nonat-116" #368: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #368) | af 44 01 88 e6 16 c8 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 fe d2 29 cf 90 27 2d 78 45 a2 b1 3a ed 0c 48 | 17 b4 e8 54 dd 68 cf 7e 09 7a af 17 ed 4f 89 f8 | c0 ff 46 bb 6c a6 b3 38 fd f1 d2 cc cf d4 db c1 | e0 88 fe 51 49 6d e3 71 01 85 fe f4 a5 9f 85 04 | b6 d1 25 1f bd d7 ec 86 d1 7c 74 4d 2b 88 9b 37 | 88 75 91 51 15 43 e3 94 29 7a fc 34 e7 47 6b 09 | 3f 68 5a af 07 68 67 15 d9 ca f4 fd c3 d0 6c 2d | 70 40 4e 4a 88 cf b4 8b 6f 34 77 1b fd 2c ac c0 | b5 ab 67 28 d7 0d cf 79 56 41 4a ee e4 5c 59 e9 | 16 2d 45 df 3b 83 50 77 d1 1d 25 2e df 41 d7 96 | e0 ae 3d 15 c2 fb 47 fc 22 43 64 51 9d 2b 27 9e | ef d5 13 c7 bc a8 df 51 ba 9e 32 c3 d2 0e 3d 97 | 23 9a d8 1c 93 38 85 21 ff 2a 81 20 c2 e1 c5 96 | 9d d3 5f 74 e3 dc ae 9a 19 d8 eb 6f 38 2d 11 55 | b9 c5 4b fe 45 56 61 1b 03 ae 41 5d 20 26 7b b4 | dd 4c d4 57 72 8f 74 07 75 75 35 67 ae 9c b4 2d | 29 00 00 24 b4 f8 c7 8c ce d2 25 cc 04 b1 28 85 | 4c 50 50 1c af 66 c6 a8 14 6b b6 e9 07 eb 31 8e | 06 0d 7b dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 4f 54 9f 13 b7 58 02 6e 4f 8f 36 | 8b d5 61 f1 61 e4 53 15 00 00 00 1c 00 00 40 05 | 79 7d 7e 8e 6a 0e d7 b1 f9 8e 14 46 7c 3e c2 fe | 69 34 3d 95 | libevent_free: release ptr-libevent@0x7fb36801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800cc10 | #368 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 44 01 88 e6 16 c8 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #368 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #368 | rejected packet: | af 44 01 88 e6 16 c8 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #368: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0715 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cc10 | handling event EVENT_RETRANSMIT for parent state #218 | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #218 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #218 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49681.929133; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009022 exceeds limit? YES "road-eastnet-nonat-218" #218: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-218" #218: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #470 at 0x557d46afc500 | State DB: adding IKEv2 state #470 in UNDEFINED | pstats #470 ikev2.ike started | Message ID: init #470: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #470: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #470; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-218" #470: initiating v2 parent SA to replace #218 | using existing local IKE proposals for connection road-eastnet-nonat-218 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 470 for state #470 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36800cc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #470 | libevent_malloc: new ptr-libevent@0x7fb36801a4e0 size 128 | #470 spent 0.0921 milliseconds in ikev2_parent_outI1() | RESET processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 resuming | crypto helper 11 starting work-order 470 for state #470 | start processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 470 | pstats #218 ikev2.ike failed too-many-retransmits | pstats #218 ikev2.ike deleted too-many-retransmits | #218 spent 2.78 milliseconds in total | [RE]START processing: state #218 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-218" #218: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #218: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #218 "road-eastnet-nonat-218" #218: deleting IKE SA for connection 'road-eastnet-nonat-218' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-218' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-218 | State DB: deleting IKEv2 state #218 in PARENT_I1 | parent state #218: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #218 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 470 time elapsed 0.000557 seconds | libevent_free: release ptr-libevent@0x7fb3780180b0 | (#470) spent 0.567 milliseconds in crypto helper computing work-order 470: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 470 for state #470 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cc10 | in statetime_stop() and could not find #218 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #470 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7fb360034680 size 128 Initiating connection road-eastnet-nonat-218 which received a Delete/Notify but must remain up per local policy | crypto helper 11 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-218" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-218' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-218" | stop processing: connection "road-eastnet-nonat-218" (in initiate_a_connection() at initiate.c:349) | spent 0.0762 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #470 | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 470 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #470 | **emit ISAKMP Message: | initiator cookie: | ab ba b0 28 2b 1d 75 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-218 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 75 e4 df 77 9c ac 7c 40 d9 cc 91 f4 1e 15 f1 e4 | ikev2 g^x bc 57 e7 d5 04 82 1b 0a da 88 66 71 1d 5c c0 4e | ikev2 g^x e9 e1 44 ec a4 a7 01 cc ac 81 2a 8e 12 68 b2 c4 | ikev2 g^x cb fb 38 e3 4b 73 83 33 bf 14 39 b7 96 9c bd 59 | ikev2 g^x d9 ff 78 9c 9b 27 6f 77 fd c9 8a 91 00 a0 bf ad | ikev2 g^x 80 e8 18 ee 7d 76 d2 f5 dc 73 28 11 ea 98 07 d2 | ikev2 g^x 64 7f 44 96 f2 22 04 36 e1 c7 80 69 f0 17 fa 9a | ikev2 g^x d9 3b f0 c2 a7 d3 89 ef c3 be e7 3b 57 5c b5 bf | ikev2 g^x 47 3a cd 92 d8 c8 49 50 dd d0 b8 eb bf 2d 90 2f | ikev2 g^x 70 dc 26 c2 6c 6d 97 1e 52 f7 6d 64 24 1f 5f ad | ikev2 g^x 51 2f 7a 28 09 01 c2 c0 02 41 61 9f 09 3f 66 24 | ikev2 g^x 9a 1a a0 e1 ec c0 36 27 88 be e6 c0 7c 74 30 55 | ikev2 g^x 5b 47 83 d5 de 8f dd bb 1e 36 33 0e 3a 91 ce a0 | ikev2 g^x e2 86 42 d5 a7 ba 66 4a 76 5d 9a 0c 15 60 fc f8 | ikev2 g^x 07 4e ec f8 cb 3b a4 f7 40 7b 9c 98 98 27 e7 40 | ikev2 g^x f3 18 97 7c cd 29 25 1e 88 f4 c6 ab 7c 46 c3 a4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5d 90 f6 17 67 54 dd 2e 4f 57 ce 29 91 07 11 a6 | IKEv2 nonce ab 05 8f 42 d3 b0 74 bf 38 9e 49 fe 79 c7 ca e5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ab ba b0 28 2b 1d 75 a3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 da | natd_hash: port= 01 f4 | natd_hash: hash= 15 04 17 c7 7e 54 6e 6a e8 f5 01 1c 14 c4 b8 fd | natd_hash: hash= 53 6d 0c 45 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 15 04 17 c7 7e 54 6e 6a e8 f5 01 1c 14 c4 b8 fd | Notify data 53 6d 0c 45 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ab ba b0 28 2b 1d 75 a3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ee 06 ba 38 dc 10 50 e4 3e a6 cd 5f 2c e3 74 3b | natd_hash: hash= 2a 18 7d 82 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ee 06 ba 38 dc 10 50 e4 3e a6 cd 5f 2c e3 74 3b | Notify data 2a 18 7d 82 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #470 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #470: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #470 to 4294967295 after switching state | Message ID: IKE #470 skipping update_recv as MD is fake | Message ID: sent #470 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-218" #470: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.218:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #470) | ab ba b0 28 2b 1d 75 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 e4 df 77 9c ac 7c 40 d9 cc 91 f4 1e 15 f1 e4 | bc 57 e7 d5 04 82 1b 0a da 88 66 71 1d 5c c0 4e | e9 e1 44 ec a4 a7 01 cc ac 81 2a 8e 12 68 b2 c4 | cb fb 38 e3 4b 73 83 33 bf 14 39 b7 96 9c bd 59 | d9 ff 78 9c 9b 27 6f 77 fd c9 8a 91 00 a0 bf ad | 80 e8 18 ee 7d 76 d2 f5 dc 73 28 11 ea 98 07 d2 | 64 7f 44 96 f2 22 04 36 e1 c7 80 69 f0 17 fa 9a | d9 3b f0 c2 a7 d3 89 ef c3 be e7 3b 57 5c b5 bf | 47 3a cd 92 d8 c8 49 50 dd d0 b8 eb bf 2d 90 2f | 70 dc 26 c2 6c 6d 97 1e 52 f7 6d 64 24 1f 5f ad | 51 2f 7a 28 09 01 c2 c0 02 41 61 9f 09 3f 66 24 | 9a 1a a0 e1 ec c0 36 27 88 be e6 c0 7c 74 30 55 | 5b 47 83 d5 de 8f dd bb 1e 36 33 0e 3a 91 ce a0 | e2 86 42 d5 a7 ba 66 4a 76 5d 9a 0c 15 60 fc f8 | 07 4e ec f8 cb 3b a4 f7 40 7b 9c 98 98 27 e7 40 | f3 18 97 7c cd 29 25 1e 88 f4 c6 ab 7c 46 c3 a4 | 29 00 00 24 5d 90 f6 17 67 54 dd 2e 4f 57 ce 29 | 91 07 11 a6 ab 05 8f 42 d3 b0 74 bf 38 9e 49 fe | 79 c7 ca e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 04 17 c7 7e 54 6e 6a e8 f5 01 1c | 14 c4 b8 fd 53 6d 0c 45 00 00 00 1c 00 00 40 05 | ee 06 ba 38 dc 10 50 e4 3e a6 cd 5f 2c e3 74 3b | 2a 18 7d 82 | state #470 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36801a4e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36800cc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #470 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 | #470 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49681.930475 | resume sending helper answer for #470 suppresed complete_v2_state_transition() and stole MD | #470 spent 0.457 milliseconds in resume sending helper answer | stop processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb360034680 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab ba b0 28 2b 1d 75 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #470 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #470 | rejected packet: | ab ba b0 28 2b 1d 75 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 da fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #470: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33801d710 | handling event EVENT_RETRANSMIT for parent state #451 | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #451 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #451 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49681.954682; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002454 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36002aab0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #451 | libevent_malloc: new ptr-libevent@0x7fb368035930 size 128 "road-eastnet-nonat-199" #451: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #451) | ba 7b a0 b0 99 57 b7 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 86 c1 bd 46 53 16 86 81 3c 90 d2 1b d5 72 d6 | 90 46 2b fe 71 0a b5 92 27 f1 2a 98 1f 0b 9c 86 | b4 73 fd 62 b2 c4 76 72 65 dc a3 4a 74 c5 fd c6 | 79 b7 24 8c 57 9e 68 29 d1 51 ef 41 d9 35 5f e0 | 38 61 4f 5c 38 99 a1 c4 18 39 cd 7c d3 ce 2b 13 | fc 9c 47 13 18 41 cd b0 e2 7f c5 8a 64 72 a5 44 | 53 3a 53 2d 27 d7 7b 2d 79 06 40 fe 3d 6f 0c 91 | d2 44 b7 35 de 08 ea 0c 51 75 4f ac 93 26 ff 1a | 9b 0e 24 d8 14 0e 9a fc f6 cc 0e 9a dd d9 b9 d2 | 1b 38 2f 39 cf f5 c7 33 b5 34 1b 0e a3 9e 16 b5 | a1 af 82 8d 2c a9 ce 6b 79 b5 5c 3b f7 3b ae 09 | 38 95 45 10 35 73 6b 75 72 ac 01 d0 d8 9c 2a 56 | 79 52 8f 61 80 9d ac 4d cd 53 ef 84 96 01 18 60 | 62 4a 3f 8c ae bb 58 49 e4 bd 6c ac 5f b8 ee 89 | d9 a3 21 bd 37 79 80 9b e7 e0 92 c7 ad 63 83 e1 | b3 a4 a9 38 2d 78 59 50 55 18 b3 a6 f4 4b 9a 44 | 29 00 00 24 c0 83 9a b8 91 8b 33 7b 3e ca 3c 3c | 55 1b 13 ae f8 60 71 22 6b 87 6a 60 f0 da d9 ee | 56 ce cf eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 64 e2 2e 4b 98 7a a3 19 bf 09 d8 | 5a 5f 60 9f 04 ef ea a4 00 00 00 1c 00 00 40 05 | f6 42 3e 9c 74 68 a9 db 08 24 19 e3 18 ae 01 16 | fd d2 98 25 | libevent_free: release ptr-libevent@0x7fb33802ee40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33801d710 | #451 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 7b a0 b0 99 57 b7 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #451 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #451 | rejected packet: | ba 7b a0 b0 99 57 b7 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #451: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12c40 | handling event EVENT_RETRANSMIT for parent state #267 | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #267 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #267 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49681.968066; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007654 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33801d710 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #267 | libevent_malloc: new ptr-libevent@0x7fb33802ee40 size 128 "road-eastnet-nonat-15" #267: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #267) | 6f db 88 0f fe 70 dc 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e ec fe e4 22 11 a7 b5 a2 ee 25 53 3a 2f 1c 0a | 48 51 04 db 46 22 ad 6d 3c 60 e2 cb fb cc f5 7a | 6d 5e c9 24 ec d8 52 4f 96 5b 62 28 fb 9e eb fd | ac e9 f7 6f 4d 1a f9 74 24 29 e6 a2 80 a2 a7 c1 | b9 1c da 76 8c 9d 40 38 6a 26 13 d3 da 72 01 42 | b6 16 9c ca 09 1d 9b a9 90 70 fb 71 d1 ea b4 45 | 95 3b 5d b5 2c c1 00 ea bd 33 e0 43 00 b9 22 f4 | c9 60 90 dc b0 82 03 89 b0 c4 03 22 4b cf 7c 50 | 96 60 35 da 9c 4c f2 64 7d be b4 90 21 9b 54 ab | 96 09 b1 ee 1f 0d db 8e 22 4d 09 d6 43 6f c8 f1 | da 0c fd f4 69 33 b0 96 0f 1a 25 07 1d e6 1b 37 | 20 ff 37 b4 80 d9 a3 78 93 5a eb 5d 36 bd 9e 35 | 1e 0e a9 e8 13 eb 16 8f ff d5 26 ef c2 d5 47 45 | 91 9b e3 0e c5 08 1f 34 46 fe b0 3e f5 ce e1 c7 | 7c 47 c2 2d d2 f7 4c 06 62 a0 ae f2 e6 53 ff 73 | ee d6 e5 9b 28 8e f3 4d ef ad 40 41 9e 20 99 95 | 29 00 00 24 6d 5a fb f5 8a b7 85 2e cf 37 31 c5 | a8 e8 a7 22 a7 58 7e 34 8e 06 61 77 f0 7b 3b ce | d2 d0 22 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 b4 63 c8 b9 e3 2d fa 51 7c 79 27 | ca 3c 7a c2 0c 39 1a 2b 00 00 00 1c 00 00 40 05 | d9 fc ba 6b 91 d3 e0 ee c2 81 f3 1d 92 b2 24 2f | bf 44 6b 65 | libevent_free: release ptr-libevent@0x7fb380011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c40 | #267 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f db 88 0f fe 70 dc 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #267 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #267 | rejected packet: | 6f db 88 0f fe 70 dc 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #267: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0527 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3980 | handling event EVENT_RETRANSMIT for parent state #428 | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #428 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #428 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49681.978382; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003669 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c40 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #428 | libevent_malloc: new ptr-libevent@0x7fb380011f30 size 128 "road-eastnet-nonat-176" #428: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #428) | fb 15 42 71 fe 24 9a a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 50 d4 99 e3 c3 b2 8d 50 f4 55 ae 47 3b 25 61 | 1e c4 05 b1 59 21 46 35 0e 81 55 dd de 7f 65 40 | 00 1a 4e c9 0d 72 6a 7a 8e 31 f2 b8 05 87 95 5f | 92 19 3b d0 26 f7 ef a7 b3 37 5f 37 15 e9 34 12 | 33 cb bc 05 19 62 04 88 c4 b0 11 3c a2 fc 2e a7 | 48 74 27 c5 24 6a b1 84 34 89 1c 11 73 e4 fb e9 | 1b 3e 80 7d 33 32 51 1f 3d 67 11 16 e4 23 05 bd | 3f 72 2d 38 c9 0b 38 c0 12 64 3a 43 5b e7 46 c1 | 2b 7e 29 d4 ef 37 71 a8 e0 71 19 2f a1 c5 6c 53 | 94 fe 4e 57 73 5c 74 b5 d5 7f cc e2 3d a3 30 0d | 02 5c 9d dc 4d a0 93 77 cd b6 58 cb 5c 89 fe a8 | 40 8a c4 11 16 43 cc f4 7d 6e ae 00 27 3a 7c 8c | 12 14 7e db be 5a 42 72 b9 d0 07 1b fd aa 82 51 | 0e fb 68 c6 88 b4 35 6c 93 af 50 1c ff 48 78 d4 | b7 b7 c9 3d bd cb b9 82 34 8d b6 5a ff e7 73 c1 | e0 88 1f 51 42 a1 76 7d 4c 3a 1b 39 03 d3 42 78 | 29 00 00 24 e8 4b ce 8e 1c b5 fd 76 2e 19 5c e4 | 1a 51 b2 57 c5 b9 7b 5b bc c1 c3 17 ad 08 ad 32 | c1 29 cf d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 5a 55 94 7a 84 e5 8b 58 e8 27 7a | 96 44 f5 8a 4c 99 6f 81 00 00 00 1c 00 00 40 05 | 54 c7 00 62 13 8f 45 35 f4 93 09 e0 a0 98 7d 08 | 6e 4a 7d e5 | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3980 | #428 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 15 42 71 fe 24 9a a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #428 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #428 | rejected packet: | fb 15 42 71 fe 24 9a a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #428: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388043350 | handling event EVENT_RETRANSMIT for parent state #466 | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #466 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #466 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49681.979689; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500299 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3980 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #466 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 "road-eastnet-nonat-214" #466: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #466) | d8 f3 8e 44 6b 2f 1e a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c e1 1c b6 a8 45 43 90 db 9b 35 75 1f aa 92 f9 | d6 e2 6f 34 81 df f8 c5 fb 61 93 34 a9 9a d6 e7 | 4f 19 4e 64 91 79 4b bc 74 e5 43 7f 1c fd f5 46 | 67 4f b3 d8 c9 4d 2d c9 eb 26 c5 ea 6c 36 ba 25 | 06 8c 1d c8 05 71 c9 48 a5 ca a6 91 9c 00 5f c8 | af c1 a9 4d 01 92 ef ab 3a e6 5a 67 89 38 c9 af | 19 fe 4d 6b 76 3f 95 f8 65 3e 4b 5b 24 34 56 32 | 9f dd 59 97 7b 03 2f 23 ce fb e6 f8 e4 68 93 ff | ad 3a cf f3 67 73 9d e1 9b 2a d0 84 d4 ba 4d fe | 72 3c 74 29 f1 ab eb eb fd d6 c3 47 54 02 c4 5f | 85 e4 bc a9 88 7b 25 6d 99 c6 f0 38 89 09 7c 47 | 72 c2 61 46 a0 1d 59 09 82 b5 5f b7 e1 f1 5c 0d | 50 1d c9 01 1e 1c 93 24 6c e4 5b 27 7f 49 97 85 | 14 7e 19 88 ae dd 1a b6 56 79 35 3e ff bd 7d 4e | 47 80 ff 35 79 4b c6 1c b6 e7 5a d2 8f b2 aa 73 | 6a 88 5b 1d bb 78 3e 8d f2 9b 06 47 8f 4b 75 e7 | 29 00 00 24 4b 18 d5 35 7f 58 ef 5d 8f 25 3f b5 | cb 0b 31 6c 2d c9 a6 3f f9 92 29 72 9b 38 37 11 | 6a b0 a4 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 d8 47 26 17 c1 8a e8 09 00 37 fb | f1 38 56 14 b9 a5 7b 42 00 00 00 1c 00 00 40 05 | 10 91 19 bc 27 f8 ea 8a 40 18 2c 45 b2 2a 2d 38 | 23 45 ab e1 | libevent_free: release ptr-libevent@0x7fb37c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388043350 | #466 spent 0.0868 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368025320 | handling event EVENT_RETRANSMIT for parent state #369 | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #369 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #369 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49681.979789; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004886 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388043350 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #369 | libevent_malloc: new ptr-libevent@0x7fb37c00cf80 size 128 "road-eastnet-nonat-117" #369: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #369) | ff 18 31 cc 83 7e 2e ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 1f 06 e6 7b ea 4e 17 1c 87 7d 86 73 80 47 50 | cf bf e2 ff 09 37 6a 25 2d 87 f4 71 22 38 1c ca | 11 79 43 67 c5 65 1f f5 07 47 33 ad 73 a4 d3 73 | 51 54 fd df 5a c2 8d 18 cb cc 20 72 8e 07 68 eb | b6 8d ab 31 ba fd fa 9b 7c 59 57 b3 71 f1 91 34 | ea 4b 70 52 a4 6c eb 12 7d 01 23 58 56 9a d3 c0 | a8 35 4b 27 63 af ee d0 37 dd c7 3e 45 5a 0b 60 | bd 6d ed c4 e9 d9 c1 d7 e1 29 a2 3f dc 2c af 7c | e6 74 73 2b 26 15 ca 1c f5 95 b6 33 2f 8c 4a 22 | a1 8d d2 aa 72 d0 9b 41 c8 87 a6 d7 f8 13 c7 cd | 3c d8 62 e2 fc 64 74 ed 50 b1 79 e3 79 44 21 85 | 12 8f 6c 07 3b 37 80 9b 8c 83 41 c0 0e 38 b7 92 | 75 a7 4a 89 81 43 56 e9 67 ee 43 e0 24 9b 53 75 | b9 e5 d1 27 c1 f4 c3 83 7c 57 e4 5e 33 8b e2 10 | c9 ec fe 76 73 25 ae 4b 87 a7 e2 e5 89 5a 08 72 | fc 88 9c 69 9c 14 55 be f9 d1 24 d2 2a 6b bd 35 | 29 00 00 24 03 b6 58 fc c8 79 29 fe 43 44 80 31 | 59 cf 11 77 19 87 27 44 32 ac 84 44 78 ab c0 33 | d7 16 05 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a fa 34 e9 cb c2 b8 b0 71 3e db 9c | 1e f7 0a 0e 8d a9 9b 92 00 00 00 1c 00 00 40 05 | c3 12 1d 90 39 27 a3 80 ba dc 3c b0 c3 6a 52 2a | 1e d7 c5 9b | libevent_free: release ptr-libevent@0x7fb36802ee40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368025320 | #369 spent 0.0688 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 f3 8e 44 6b 2f 1e a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #466 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #466 | rejected packet: | d8 f3 8e 44 6b 2f 1e a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #466: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff 18 31 cc 83 7e 2e ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #369 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #369 | rejected packet: | ff 18 31 cc 83 7e 2e ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #369: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0372 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36003b100 | handling event EVENT_RETRANSMIT for parent state #461 | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #461 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #461 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49681.994057; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002183 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368025320 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #461 | libevent_malloc: new ptr-libevent@0x7fb36802ee40 size 128 "road-eastnet-nonat-209" #461: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #461) | 30 e3 71 39 78 d7 e3 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 73 72 eb a6 69 8c 9e 08 28 d6 16 78 8b f3 f1 | 10 b5 c6 3e 5a 68 ff ee f8 e9 ea 04 9a 96 07 cd | 19 7e 01 3e f6 8c ec 23 90 c5 34 cb 27 e1 d9 f4 | 83 f1 52 a0 20 79 82 b5 63 bf e3 1e 4c 8b e6 11 | 56 0c 8d 37 3e 34 a4 1e 35 3f f2 4f c6 52 63 33 | 1a 19 3a f7 47 1a 58 cf 14 be b6 13 3a ba 6a 7a | c2 7e 4a 7c 6b 24 bd 5d d6 f1 53 6b d9 1a c9 0e | b4 0c ad ca 0d 87 78 f9 58 81 24 7b 64 ae 92 0f | 11 e7 db e4 1c 12 40 ed e3 44 f4 22 a9 cb c8 e8 | 35 d2 0f 26 8c e9 f0 bd 79 b3 71 e1 56 b6 c2 ad | c3 25 0b 24 c0 9d 7c 39 2c c7 c4 5c 79 bb 71 e2 | 44 92 14 47 75 57 f7 30 ac 8e 27 b4 ce 61 8d 65 | 5b 3f 84 a2 85 6e ec 1f 9f 60 e7 ef bd 5d a7 fa | a6 23 27 f3 06 ac 82 f0 e3 4d 76 a2 d3 e2 92 c2 | 69 39 39 eb 52 01 f2 b3 9d c1 f3 c5 d2 36 e4 c6 | 40 e0 76 99 a0 7e 6e 0f 65 8c da 02 f1 c2 ad 1e | 29 00 00 24 90 76 1f 57 9b 42 3c 9c 17 4b 00 94 | e5 bc 1a a6 9f 85 30 49 d6 5f c0 4c ce 00 c3 85 | 0f 0e 5c ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 76 5f 86 b3 2d 97 ef 5b 1d 05 17 | f4 c4 b8 ec 0d 36 f1 03 00 00 00 1c 00 00 40 05 | 57 06 a0 ca 17 47 48 ab cc 80 4d 50 ec 37 d9 01 | a5 d0 9e bc | libevent_free: release ptr-libevent@0x7fb360023dd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36003b100 | #461 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 e3 71 39 78 d7 e3 f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #461 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #461 | rejected packet: | 30 e3 71 39 78 d7 e3 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #461: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c018460 | handling event EVENT_RETRANSMIT for parent state #370 | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #370 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #370 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49682.038421; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004622 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36003b100 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #370 | libevent_malloc: new ptr-libevent@0x7fb360023dd0 size 128 "road-eastnet-nonat-118" #370: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #370) | 4a 80 23 ad fc 41 99 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 13 bc 42 a7 35 39 b2 99 5a ec 69 08 73 18 3f | fe 31 dc bf 22 23 10 df 50 13 8d 04 9e ea 66 93 | 98 fa 79 7f 64 34 1f da 27 d5 8f dc 20 be 18 56 | 17 0e c5 53 3e a4 18 ed 82 41 0e 7f 91 9c e6 cb | ef 35 45 6e 59 c7 b5 4d 35 32 d9 63 30 b7 dd 5d | 28 28 04 d3 d6 a5 84 6f 4c f3 94 90 75 da df 42 | 5a 65 b6 2e cd 5e 42 3b 71 3e 46 f7 4b 13 d1 aa | a5 9c 11 b7 2c 83 34 92 e3 55 46 0b 4b 42 12 08 | 06 02 c9 42 46 42 d0 f1 82 14 36 15 1e 2e d4 a0 | 23 35 a8 d9 5e c2 f8 ca da 81 45 00 34 f6 88 47 | 2f 60 cc ac c2 4b 39 55 8a 1b 8f 66 b3 43 72 fd | 59 52 11 ef 5c 2c 9e b7 b7 6a c6 60 eb 22 9a 4d | e9 c0 4b de 56 c3 d3 e4 19 f0 86 9f a5 38 ef 26 | 39 fb ac 6e b8 32 45 c4 d1 f5 cc bb b2 2f 7b 0b | 6b 6b b1 6f 27 b1 bb 88 e7 c4 d6 31 26 e0 94 2a | ae 90 aa 75 e5 cb 3e 1f 43 13 d3 7b 3c ed 1e b0 | 29 00 00 24 a0 6f 08 ca 5f 92 e1 a2 10 08 5a 34 | 7d b6 05 db 65 e8 3d 88 a0 b3 7d 19 ed 75 36 c4 | 95 ec 9c 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 38 cd 57 b0 33 db 6c e3 f5 95 3e | 28 5e 17 44 43 d3 05 33 00 00 00 1c 00 00 40 05 | 6f b1 ce a1 45 d5 bc 6f 48 f8 db 92 31 a1 28 9a | ba c8 a7 2b | libevent_free: release ptr-libevent@0x7fb3500251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c018460 | #370 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 80 23 ad fc 41 99 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #370 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #370 | rejected packet: | 4a 80 23 ad fc 41 99 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #370: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.066 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab2380 | handling event EVENT_RETRANSMIT for parent state #452 | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #452 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #452 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49682.044778; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002653 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #452 | libevent_malloc: new ptr-libevent@0x7fb3500251c0 size 128 "road-eastnet-nonat-200" #452: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #452) | 50 11 a1 bf ed cc 03 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 8a 76 57 c4 9b d0 38 b9 d2 c2 4b 69 ba e2 a2 | 5a 11 4c 0a 45 a5 bd e6 9d dd c0 17 e1 2d b4 38 | 58 7e 63 fb 2b 24 a5 63 e6 a8 3b c4 4f a3 78 62 | 66 71 ba 53 c3 c9 09 13 5d ce 86 73 ab 12 87 fa | 35 c6 ff 8b 42 89 25 72 85 e2 b1 87 71 47 d8 8c | ac 7e ee 22 cc e1 04 85 55 54 54 b2 e0 ad d5 39 | 0a fc 74 d3 64 5e 05 35 2e 1a b0 95 d1 38 f8 9d | e0 83 e6 f4 e2 39 cf ac 1a e7 54 52 1b c6 27 82 | 61 87 37 7f 47 a3 e4 be 08 d5 c5 1a f3 6f 8c 8b | 63 33 54 b5 d2 c3 52 ce c9 11 04 d4 3e 44 cf a0 | cb 89 ea 96 9d 4b f1 9d 8d dc 98 07 bd 7b 2f d6 | 8f 69 b2 51 af f2 60 a1 de 25 ef d3 5a 7c e5 c5 | 23 56 16 2b d4 22 e3 1f 96 12 60 85 a4 b1 18 7f | b7 c2 db 59 66 51 fe 4e 85 1b ae a3 40 84 80 d2 | d2 e6 e1 c5 9e 39 9a 1f 42 76 d0 90 ba 8e cc dd | 5a 7b 9a 97 d8 6d 8b db 68 e9 10 8f 2c 64 9d b8 | 29 00 00 24 ba 51 08 92 39 ed 80 e6 57 c3 97 3c | b4 4a b0 29 f6 7a 02 bc 32 31 68 fb 36 27 e7 7b | 80 17 94 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 cf 89 69 b2 6f 00 24 ae 75 3b 9a | 3a b6 ca 28 54 7e 11 99 00 00 00 1c 00 00 40 05 | 3b ea 73 3d bf 95 ec 19 18 d5 48 b2 c7 6d ef 5f | 10 2b 0f c2 | libevent_free: release ptr-libevent@0x7fb344046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab2380 | #452 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 11 a1 bf ed cc 03 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #452 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #452 | rejected packet: | 50 11 a1 bf ed cc 03 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #452: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3a590 | handling event EVENT_RETRANSMIT for parent state #219 | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #219 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #219 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49682.047092; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.011677 exceeds limit? YES "road-eastnet-nonat-219" #219: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-219" #219: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #471 at 0x557d46afdac0 | State DB: adding IKEv2 state #471 in UNDEFINED | pstats #471 ikev2.ike started | Message ID: init #471: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #471: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #471; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-219" #471: initiating v2 parent SA to replace #219 | using existing local IKE proposals for connection road-eastnet-nonat-219 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 471 for state #471 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab2380 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #471 | libevent_malloc: new ptr-libevent@0x7fb344046040 size 128 | #471 spent 0.0932 milliseconds in ikev2_parent_outI1() | RESET processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 resuming | start processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #219 ikev2.ike failed too-many-retransmits | pstats #219 ikev2.ike deleted too-many-retransmits | crypto helper 16 starting work-order 471 for state #471 | #219 spent 3.03 milliseconds in total | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 471 | [RE]START processing: state #219 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-219" #219: deleting state (STATE_PARENT_I1) aged 64.013s and NOT sending notification | parent state #219: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #219 "road-eastnet-nonat-219" #219: deleting IKE SA for connection 'road-eastnet-nonat-219' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-219' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-219 | State DB: deleting IKEv2 state #219 in PARENT_I1 | parent state #219: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #219 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb354009640 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 471 time elapsed 0.000985 seconds | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3a590 | (#471) spent 0.989 milliseconds in crypto helper computing work-order 471: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 471 for state #471 to event queue | scheduling resume sending helper answer for #471 | in statetime_stop() and could not find #219 | libevent_malloc: new ptr-libevent@0x7fb36403f0c0 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 16 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-219 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-219" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-219' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-219" | stop processing: connection "road-eastnet-nonat-219" (in initiate_a_connection() at initiate.c:349) | spent 0.065 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #471 | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 471 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #471 | **emit ISAKMP Message: | initiator cookie: | 38 56 99 f6 a3 bb 25 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-219 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 88 5e 08 51 b9 62 c5 b6 68 5e 2f 6f 4f 31 ca 1e | ikev2 g^x 08 9e a2 c5 9c dd 5f fc 7a f4 89 f0 0b b5 e1 ae | ikev2 g^x ce aa 45 81 2c 95 5e ff 06 f3 6a c5 72 bf d7 48 | ikev2 g^x 2c ca 52 8b db 25 1b 5b 4e e1 9e 45 05 12 f0 3a | ikev2 g^x 8b 49 b1 e8 0f d0 bb 39 6c 00 4b 10 55 55 90 f1 | ikev2 g^x ba 94 0f e8 29 de 7e 8e 75 cf 84 46 0b 85 26 8f | ikev2 g^x fc de 6b 35 43 a0 ca 14 c9 c0 f7 23 df 3f 39 44 | ikev2 g^x 98 32 71 b3 fb 93 e6 df 1c 43 a2 c9 a0 c6 73 b4 | ikev2 g^x d7 9f 3f a9 0b f8 14 fb 29 eb 8f cf f7 a9 d2 3c | ikev2 g^x 3d 58 a0 39 7e fa 25 48 bc 4b 7f d7 1d e0 11 34 | ikev2 g^x f6 bf 55 8d 59 da 29 ac d8 c5 88 7a 76 ef 08 52 | ikev2 g^x 7c ac 5e 47 31 67 af 77 3e 74 07 65 f0 71 26 28 | ikev2 g^x 79 4d a8 21 1c fb 74 e9 6b f8 d5 df d3 80 71 f9 | ikev2 g^x 81 36 25 59 61 8d e4 66 0e 09 70 cd be 73 f3 c8 | ikev2 g^x c4 06 a2 0f 1e 6d 0f ec 2b 18 85 83 48 df f6 99 | ikev2 g^x 6d 3a 12 52 38 a5 9e 5e 41 a3 52 37 e7 64 a4 6a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 92 4d df ea 0a bb c1 4f 13 fb 92 4b 10 dc b9 f4 | IKEv2 nonce e6 b4 8b 01 64 45 6e db 5a 13 b9 8e 86 b6 57 0a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 38 56 99 f6 a3 bb 25 a2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 db | natd_hash: port= 01 f4 | natd_hash: hash= 86 76 c9 73 0c 16 7b 39 f7 77 ab 9f f0 85 70 80 | natd_hash: hash= 7e c2 64 d2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 86 76 c9 73 0c 16 7b 39 f7 77 ab 9f f0 85 70 80 | Notify data 7e c2 64 d2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 38 56 99 f6 a3 bb 25 a2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 35 b3 a5 34 11 ae 1a 69 08 cc 74 f0 71 15 8c b8 | natd_hash: hash= eb 5a 8d 90 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 35 b3 a5 34 11 ae 1a 69 08 cc 74 f0 71 15 8c b8 | Notify data eb 5a 8d 90 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #471 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #471: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #471 to 4294967295 after switching state | Message ID: IKE #471 skipping update_recv as MD is fake | Message ID: sent #471 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-219" #471: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.219:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #471) | 38 56 99 f6 a3 bb 25 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 88 5e 08 51 b9 62 c5 b6 68 5e 2f 6f 4f 31 ca 1e | 08 9e a2 c5 9c dd 5f fc 7a f4 89 f0 0b b5 e1 ae | ce aa 45 81 2c 95 5e ff 06 f3 6a c5 72 bf d7 48 | 2c ca 52 8b db 25 1b 5b 4e e1 9e 45 05 12 f0 3a | 8b 49 b1 e8 0f d0 bb 39 6c 00 4b 10 55 55 90 f1 | ba 94 0f e8 29 de 7e 8e 75 cf 84 46 0b 85 26 8f | fc de 6b 35 43 a0 ca 14 c9 c0 f7 23 df 3f 39 44 | 98 32 71 b3 fb 93 e6 df 1c 43 a2 c9 a0 c6 73 b4 | d7 9f 3f a9 0b f8 14 fb 29 eb 8f cf f7 a9 d2 3c | 3d 58 a0 39 7e fa 25 48 bc 4b 7f d7 1d e0 11 34 | f6 bf 55 8d 59 da 29 ac d8 c5 88 7a 76 ef 08 52 | 7c ac 5e 47 31 67 af 77 3e 74 07 65 f0 71 26 28 | 79 4d a8 21 1c fb 74 e9 6b f8 d5 df d3 80 71 f9 | 81 36 25 59 61 8d e4 66 0e 09 70 cd be 73 f3 c8 | c4 06 a2 0f 1e 6d 0f ec 2b 18 85 83 48 df f6 99 | 6d 3a 12 52 38 a5 9e 5e 41 a3 52 37 e7 64 a4 6a | 29 00 00 24 92 4d df ea 0a bb c1 4f 13 fb 92 4b | 10 dc b9 f4 e6 b4 8b 01 64 45 6e db 5a 13 b9 8e | 86 b6 57 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 76 c9 73 0c 16 7b 39 f7 77 ab 9f | f0 85 70 80 7e c2 64 d2 00 00 00 1c 00 00 40 05 | 35 b3 a5 34 11 ae 1a 69 08 cc 74 f0 71 15 8c b8 | eb 5a 8d 90 | state #471 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344046040 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab2380 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #471 | libevent_malloc: new ptr-libevent@0x7fb344046040 size 128 | #471 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49682.048792 | resume sending helper answer for #471 suppresed complete_v2_state_transition() and stole MD | #471 spent 0.453 milliseconds in resume sending helper answer | stop processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36403f0c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 56 99 f6 a3 bb 25 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #471 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #471 | rejected packet: | 38 56 99 f6 a3 bb 25 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 db fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #471: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0581 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8ee00 | handling event EVENT_RETRANSMIT for parent state #467 | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #467 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #467 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49682.062995; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501072 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #467 | libevent_malloc: new ptr-libevent@0x7fb36403f0c0 size 128 "road-eastnet-nonat-215" #467: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #467) | be 07 ac 9a b2 b5 64 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 4e 05 41 e0 9c 82 57 92 0a 9a c0 ac b7 0e 16 | 8f cf 40 f2 c1 21 c6 0e 53 7f 71 9b 23 53 ab 32 | ef 64 72 bf 1c eb 94 98 29 9f 35 3d 25 d3 1c 5f | e7 9d 00 19 e2 0a 16 20 a6 ea 3a 6d 7b 32 8e 93 | 96 ee 8d 09 fc 5d f8 27 b9 ca 49 09 65 ce cf 30 | 67 2e f4 4f 3d ad 29 2d 5a 4c 68 40 7f 94 6f ad | f5 98 12 1b 59 74 90 02 ab ae 6a 47 c6 cb f0 fe | 1e 5f 8d 21 2a 5d 11 fe 17 3b 75 9d 65 5c 76 a0 | e4 ca 7c e0 c8 8a 37 49 e6 36 2e 9d 9d 6c be 13 | f2 87 dd 81 d0 10 4c ee c7 ac d9 53 97 d2 c8 92 | 06 a5 e1 c9 c7 93 30 ee d6 3d ac 47 98 50 1f 6d | d0 3a db 8b df 20 7f 6b 55 4b d3 fe b0 df 95 14 | 4e 40 f5 72 7e 0c bb 04 da d9 d2 07 87 d2 e0 72 | 1c 20 5b 2d c2 5e 0e 89 32 b0 a4 ac ae 09 91 0a | ac c6 1c cc d1 3b 35 35 b5 b5 4c 01 ce b4 2e ea | cd 79 86 98 20 31 06 5b 6a 88 36 07 19 32 e2 40 | 29 00 00 24 65 a2 6f 51 03 e0 c3 95 a1 17 d9 10 | 35 d2 c8 05 2a 6d 6f d8 b4 c3 4c 08 92 7c 46 6b | 3f 11 55 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 95 f5 c4 0f 53 2d de 04 94 5d f4 | 44 07 bd 21 62 32 e6 d2 00 00 00 1c 00 00 40 05 | d8 32 98 63 8b 4a fe f1 1f e4 de 6d 0f 9b fc 4d | cc 8b 9a c1 | libevent_free: release ptr-libevent@0x7fb374024f80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee00 | #467 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be 07 ac 9a b2 b5 64 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #467 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #467 | rejected packet: | be 07 ac 9a b2 b5 64 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #467: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.068 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_RETRANSMIT for parent state #462 | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #462 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #462 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49682.068238; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003296 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee00 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #462 | libevent_malloc: new ptr-libevent@0x7fb374024f80 size 128 "road-eastnet-nonat-210" #462: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #462) | b3 aa 18 e3 bb 76 cd a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 e1 dd 76 b8 92 08 2e 86 ea 59 23 d7 a8 a3 c4 | 10 20 64 4d 1a 6e f6 be 88 38 70 1d ff a1 81 97 | 56 46 d0 11 ce c6 71 4d d3 b8 e9 f6 8f 98 00 29 | 10 68 fe 2f 6a fe 59 74 05 66 7b 78 d6 d0 be bd | fb fc 90 3b 61 ee 5a 02 67 1c cb 53 c4 30 e1 1c | e1 cf 60 fe b2 ba b8 12 9c c1 21 b7 9c a2 2e d3 | f2 85 29 0d c8 10 98 b2 a9 8d 09 29 1f fe 72 bd | 6f ac bd 80 e6 e9 9d 07 a0 84 25 09 ab 49 d1 fc | a4 e5 0d 0e 5a 9c 8e d8 0e 96 4d 74 82 a0 b4 18 | 38 39 81 2c 56 26 db 6b e0 e9 32 19 24 e6 ac f3 | 8a 50 27 76 e7 46 84 40 39 2a 33 e3 46 30 98 1e | a4 e6 6f e2 bf e7 be a6 d5 b2 77 f8 b0 8c 25 cb | 3f 99 0a 63 88 e2 f4 8e b0 ed 00 10 7f f7 a6 31 | 7b da 9a 1a 53 83 49 e7 c5 ae 8b 25 41 9e cd 02 | 64 ab a9 c7 ab 71 01 ef 57 dd 6f c5 35 5b 12 e5 | 9c 28 f2 35 96 11 0c e1 05 5e 94 47 29 58 9d 96 | 29 00 00 24 9f cd 6b 85 44 66 e6 2e a2 be db 56 | e9 91 ac b0 be 57 bf 5f a7 03 66 4a a0 9b 90 be | 3c 13 94 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 1b 11 78 68 c9 76 e3 37 8a 0f 7e | ca ac 37 4e 36 55 96 e1 00 00 00 1c 00 00 40 05 | 75 7d 89 5c 82 a5 9e b6 a0 43 f2 ed 22 d9 e8 25 | c0 74 c1 73 | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | #462 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb380009ed0 | handling event EVENT_RETRANSMIT for parent state #429 | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #429 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #429 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49682.068462; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004793 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #429 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-177" #429: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #429) | b1 3d 9b 75 e9 17 32 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 58 34 a3 ec c6 75 50 25 fe 5f 41 58 c3 98 5a | 11 1f 83 e4 20 79 02 69 b1 3d ac 82 33 8f 44 96 | e7 d5 9d 7b f3 d7 f5 f1 3c 4b 07 77 e3 30 83 22 | 33 90 f7 d8 39 7d 51 da 1f be a3 9d 27 21 e0 23 | 1c c5 b5 f8 01 28 d0 3f bb de 17 8b 08 3e 77 12 | 3b 7e a1 ef 9e 6d 3b c1 0f 78 3f 7f d4 15 3e 67 | bd d8 07 2d 5c 0a f8 3b 6e 03 96 47 2a 3b ad 8d | fd ac a5 a9 41 55 69 70 54 4f c8 07 46 0f 75 8a | 8e 3a c9 5a 0e 6f 91 97 a2 53 99 02 54 c0 74 38 | 8d d6 59 17 7c b6 f5 96 24 2d 36 88 1b c1 a8 f4 | 9a 2c c6 20 9e 9c 1f 79 b7 b2 e2 28 6d c8 dc ea | ab 6f 81 8f 3c 54 99 e1 b5 ac 7a 7b e2 4b b7 47 | cc 01 c3 58 76 3a 5d 7a 87 5a 60 d6 14 71 21 77 | 7d 56 a9 78 8c 67 16 f3 5f ff 22 ed 4c 9c 08 f9 | b7 a6 81 b8 d7 76 0d 66 ab 45 4e 0c 98 69 dc 04 | 8b a0 74 65 f2 0e e3 59 97 ce 63 09 c5 83 7c 9c | 29 00 00 24 cb 81 79 39 c4 59 07 cd 3c 90 56 3e | 9d 57 79 9f 8d e6 58 24 f4 84 cf b6 0e b6 4d 54 | f8 24 7a fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 94 ea 1e 66 81 07 70 ab d6 5a a9 | c0 a7 0f 24 1b cb e7 a4 00 00 00 1c 00 00 40 05 | 17 95 c4 1b c0 e8 ee e6 7e 70 e4 b9 12 c2 c5 ed | 6f 00 57 73 | libevent_free: release ptr-libevent@0x7fb3800223c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380009ed0 | #429 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b3 aa 18 e3 bb 76 cd a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #462 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #462 | rejected packet: | b3 aa 18 e3 bb 76 cd a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #462: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 3d 9b 75 e9 17 32 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #429 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #429 | rejected packet: | b1 3d 9b 75 e9 17 32 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #429: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0573 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374045e40 | handling event EVENT_RETRANSMIT for parent state #371 | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #371 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #371 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49682.100819; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006625 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380009ed0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #371 | libevent_malloc: new ptr-libevent@0x7fb3800223c0 size 128 "road-eastnet-nonat-119" #371: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #371) | ea d3 d9 fc 5b 7e b4 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 af 47 0e 69 de 58 3a 2d 1e 57 76 30 bc 22 a4 | 2e b6 88 1e b3 88 e7 a1 c8 be 2b 4e 69 e2 28 01 | d0 52 c1 fa 78 94 10 52 aa 87 89 5a 02 a4 2d d1 | 6b d9 9b 86 d2 da a0 98 26 8e b9 2f 8a a2 27 af | de 72 28 ad 98 97 b6 15 90 9c ae 3a 16 ae 38 00 | 2e 00 fb 22 bb 46 e6 d4 1f 46 0d dd a1 55 00 4a | ce 15 02 1f 97 d1 0a 8b 6a 9c c8 a8 24 2f 84 76 | 4b d2 ac 8c 05 c7 63 26 60 5d b2 3c e7 66 a9 5d | bd fb b9 24 84 be 9f 9f d0 98 db 75 76 42 5a 2c | 99 3f 96 7c cd 86 57 c4 8b f7 47 04 8d 56 1e 36 | 87 53 98 86 58 32 c9 ce 17 26 19 6b 99 a4 da aa | cb 3c 40 8e 29 32 f1 cd b7 5a 34 1f de 2b 31 8c | 0d 44 f0 ee 94 1a 31 39 88 2c 28 df 02 20 48 5d | 9d 67 4b c6 5a 1a 30 81 19 09 4e 1b ac 9d a3 80 | 78 a7 b1 0a 79 f2 60 13 6a a0 1a 0d 01 b3 b3 40 | 74 bb ba 1f 20 2b 3c 36 9e 56 74 1c ba 16 9e 5f | 29 00 00 24 c2 25 48 18 a9 32 86 16 98 b5 8a 9d | 56 ab 3c 59 82 6e f2 93 a8 6a ca 20 09 df d9 6f | aa 1d 6f e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 eb 88 f4 ae c4 a3 7b f7 07 ac 42 | 0d c0 83 df c2 98 39 e6 00 00 00 1c 00 00 40 05 | 0c 73 7d f6 90 2f 67 26 fc 28 2f df 9c 80 3e da | bc 60 3a 9d | libevent_free: release ptr-libevent@0x7fb374029410 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374045e40 | #371 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea d3 d9 fc 5b 7e b4 e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #371 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #371 | rejected packet: | ea d3 d9 fc 5b 7e b4 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #371: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0716 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38000feb0 | handling event EVENT_RETRANSMIT for parent state #453 | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #453 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #453 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49682.103166; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002767 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374045e40 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #453 | libevent_malloc: new ptr-libevent@0x7fb374029410 size 128 "road-eastnet-nonat-201" #453: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #453) | ce fd 6b dc 43 f9 b6 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a fe 9f 71 b9 6e 69 49 23 6a d5 87 63 a6 2d 80 | fc 10 3a 5e 08 f9 cc a8 36 72 0a 5b 2e 86 63 13 | 40 48 02 71 3c 66 28 bf ad d7 fa c6 30 96 5e 17 | bf a0 d6 3f 57 20 44 4e e4 00 ed 65 d2 4f 08 d6 | 20 51 fe 4a 66 fa 02 8d 06 00 db e7 45 a0 fc fc | 8c 97 f6 4d f7 77 a5 6a 79 27 5b a0 e1 46 fb a6 | 23 99 9c 26 32 43 cf 04 80 58 6f 87 cb a5 6d d2 | 76 b6 f1 d1 81 44 27 9c 99 67 9d 01 ca 24 01 04 | 53 a4 a4 40 53 47 8f 99 18 29 ec f0 3e a1 86 13 | dc e4 8b ba 11 0f e1 c3 4b ee 52 62 b4 64 8e 2f | 66 5c ba 6c ee 04 04 ed f9 bf cd 94 0a 45 b8 40 | e4 22 f5 d1 d6 df 3a ed ce c6 15 28 b6 04 76 04 | bd c3 75 e8 63 e6 45 74 6f 79 fc 8f 52 0e 1e 14 | f2 bb ae c1 f9 bb 75 83 86 a8 ff 0c d1 f1 5d 0c | a0 ce 81 b4 8f 58 61 e5 9f 60 57 7c c4 7a 6c 26 | 0d 77 a8 c6 b2 9c 49 0c ea 36 61 b7 06 0a 10 da | 29 00 00 24 e4 ac ab 1b 0b c0 0c 13 54 30 d6 3f | 0a a4 17 49 c8 c8 1a 8d ae d5 3b 39 11 5a 2a f6 | e8 ed 91 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 76 3b e4 72 b5 b8 a8 50 2a b0 80 | 46 e6 9d 5f 02 57 8f 98 00 00 00 1c 00 00 40 05 | 9d b5 75 60 1a f1 a6 46 0c b9 85 72 c6 f1 03 f3 | 4e 7a aa 51 | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000feb0 | #453 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce fd 6b dc 43 f9 b6 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #453 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #453 | rejected packet: | ce fd 6b dc 43 f9 b6 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #453: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0585 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24680 | handling event EVENT_RETRANSMIT for parent state #268 | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #268 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #268 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49682.124462; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004183 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000feb0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #268 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 "road-eastnet-nonat-16" #268: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #268) | 52 eb eb 01 2e 07 ee 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f4 ef 40 5e f5 2a 5e 5a b8 76 94 37 37 12 d2 32 | 87 80 98 31 81 5e ec c8 c0 10 ea 13 f1 32 fd 22 | 5f da f7 72 2a 67 06 fa cf 7f d5 1a c1 ae f1 92 | 7b 53 ad 16 00 b6 90 61 58 94 dd 7e 4a 9f 32 98 | a2 2e 9b 12 92 70 47 ac 39 ac 02 84 c9 35 b9 57 | 66 95 1c 62 b4 f0 47 38 3f ec 43 4d cf 73 e8 45 | 9f d1 15 db ca 5d 1c f1 70 f1 97 a1 2b 7d 26 5e | 27 c8 08 1e 0d d7 2a 7e 36 db 89 18 87 f0 43 11 | e3 cf c8 31 7d 0e ae 6a 97 23 05 40 5d 11 ea 66 | a1 79 e8 97 cf 5c 5b 3a eb e7 1e c8 25 eb 2f 83 | 00 66 8b 3e 05 72 c5 6e 34 08 88 16 97 1a 13 a9 | db 9b 7b 48 0f 92 cf 65 2a 3e cf 88 08 c6 cf 54 | d9 1b 5a 78 a6 05 e8 73 bf 3a d4 a6 65 47 24 50 | 20 0c 6c 69 e0 29 4a aa 5a 89 69 c7 3c 4d 82 76 | 81 c9 87 1d 60 f0 a9 b6 29 2b 06 98 6d a9 24 c8 | 1d 5c 2b 40 de 5d 36 a1 45 5d 5e 8a 48 e6 0b 26 | 29 00 00 24 f0 fa c9 ee f6 f5 97 a2 44 c5 ea 10 | 5b 58 db 61 17 58 ca 3c df 15 b8 1a de 90 ef 49 | 16 34 e4 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 2c 2a b2 6d be c9 76 69 fe e4 41 | f1 72 73 59 2e 97 3f f1 00 00 00 1c 00 00 40 05 | 31 f5 db e1 45 48 68 14 42 b0 53 d9 a4 6c d5 a0 | 03 9b fe 80 | libevent_free: release ptr-libevent@0x7fb36804b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24680 | #268 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 eb eb 01 2e 07 ee 4b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #268 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #268 | rejected packet: | 52 eb eb 01 2e 07 ee 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #268: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1c480 | handling event EVENT_RETRANSMIT for parent state #220 | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #220 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #220 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49682.148815; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.02795 exceeds limit? YES "road-eastnet-nonat-220" #220: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-220" #220: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #472 at 0x557d46aff080 | State DB: adding IKEv2 state #472 in UNDEFINED | pstats #472 ikev2.ike started | Message ID: init #472: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #472: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #472; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-220" #472: initiating v2 parent SA to replace #220 | using existing local IKE proposals for connection road-eastnet-nonat-220 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 472 for state #472 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b24680 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #472 | libevent_malloc: new ptr-libevent@0x7fb36804b7c0 size 128 | #472 spent 0.0863 milliseconds in ikev2_parent_outI1() | RESET processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #220 ikev2.ike failed too-many-retransmits | pstats #220 ikev2.ike deleted too-many-retransmits | #220 spent 2.68 milliseconds in total | [RE]START processing: state #220 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-220" #220: deleting state (STATE_PARENT_I1) aged 64.029s and NOT sending notification | parent state #220: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #220 "road-eastnet-nonat-220" #220: deleting IKE SA for connection 'road-eastnet-nonat-220' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 4 resuming | crypto helper 4 starting work-order 472 for state #472 | add revival: connection 'road-eastnet-nonat-220' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 472 | in connection_discard for connection road-eastnet-nonat-220 | State DB: deleting IKEv2 state #220 in PARENT_I1 | parent state #220: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #220 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb388032bf0 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 472 time elapsed 0.000576 seconds | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c480 | (#472) spent 0.585 milliseconds in crypto helper computing work-order 472: ikev2_outI1 KE (pcr) | in statetime_stop() and could not find #220 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 4 sending results from work-order 472 for state #472 to event queue | scheduling resume sending helper answer for #472 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-220 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | libevent_malloc: new ptr-libevent@0x7fb358039e30 size 128 | crypto helper 4 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-220" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-220' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-220" | stop processing: connection "road-eastnet-nonat-220" (in initiate_a_connection() at initiate.c:349) | spent 0.068 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #472 | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 472 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #472 | **emit ISAKMP Message: | initiator cookie: | 15 62 43 a0 4c 6d db c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-220 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d9 ef 66 93 1f d2 be 3f b4 cb c3 5b c3 cd ce ec | ikev2 g^x ef 45 09 15 86 85 a5 fc 63 a8 dc f9 dc 2c 7f da | ikev2 g^x ad 3c 83 29 23 b1 9e ba fe be f5 05 08 e8 8e 73 | ikev2 g^x c4 15 c3 1f 80 d3 d0 b8 24 be b3 4f dc ef b0 39 | ikev2 g^x e8 6c 73 46 ce 8d ab 67 58 96 e6 89 9c 38 0e cb | ikev2 g^x 1f b3 47 af cd e8 fe 49 e5 c0 25 80 77 35 f6 06 | ikev2 g^x 6d dc 03 76 f8 34 b8 8e 05 e2 62 37 7a 40 b0 47 | ikev2 g^x 1d 8d 55 22 fa 66 04 34 43 30 87 8a 3b 8d 56 07 | ikev2 g^x f3 21 a4 25 01 21 d4 52 d3 44 c4 73 d4 a8 a2 ea | ikev2 g^x 69 66 8c 26 ab 85 7b a0 65 5b 03 5d 74 e7 7a 63 | ikev2 g^x 38 e1 5f b3 a4 83 48 11 76 d7 fb 96 bd 94 81 0e | ikev2 g^x 12 85 94 cb 17 1c 9e 64 a5 e2 b4 c7 96 eb cd 62 | ikev2 g^x bb 15 1b 96 a4 fb c3 a8 a0 ae 37 79 52 a4 ec 21 | ikev2 g^x 73 e0 47 a7 95 56 ce d5 cc 94 10 bf a2 8a 93 dc | ikev2 g^x 7f ea 6c d5 98 4b fa 19 3a ac 5e 1f 78 6e 08 fc | ikev2 g^x fa 46 b2 55 22 d7 78 a7 75 be f4 63 29 44 fa cb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 19 33 9e e6 d2 ec 99 b2 2a d6 00 cf c3 4d d5 a5 | IKEv2 nonce cb 9d 67 f4 f2 94 3f b0 a2 94 a8 ff 01 8e 5d 28 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 15 62 43 a0 4c 6d db c8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 dc | natd_hash: port= 01 f4 | natd_hash: hash= e5 f6 a8 c3 12 9d 73 0e 92 1b 13 62 b1 83 e3 04 | natd_hash: hash= e0 b3 2c 1d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e5 f6 a8 c3 12 9d 73 0e 92 1b 13 62 b1 83 e3 04 | Notify data e0 b3 2c 1d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 15 62 43 a0 4c 6d db c8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c3 d5 bb 6d 6e 36 db ca 5f b7 b2 05 dd 15 c3 8f | natd_hash: hash= 20 6a e3 5f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c3 d5 bb 6d 6e 36 db ca 5f b7 b2 05 dd 15 c3 8f | Notify data 20 6a e3 5f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #472 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #472: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #472 to 4294967295 after switching state | Message ID: IKE #472 skipping update_recv as MD is fake | Message ID: sent #472 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-220" #472: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.220:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #472) | 15 62 43 a0 4c 6d db c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 ef 66 93 1f d2 be 3f b4 cb c3 5b c3 cd ce ec | ef 45 09 15 86 85 a5 fc 63 a8 dc f9 dc 2c 7f da | ad 3c 83 29 23 b1 9e ba fe be f5 05 08 e8 8e 73 | c4 15 c3 1f 80 d3 d0 b8 24 be b3 4f dc ef b0 39 | e8 6c 73 46 ce 8d ab 67 58 96 e6 89 9c 38 0e cb | 1f b3 47 af cd e8 fe 49 e5 c0 25 80 77 35 f6 06 | 6d dc 03 76 f8 34 b8 8e 05 e2 62 37 7a 40 b0 47 | 1d 8d 55 22 fa 66 04 34 43 30 87 8a 3b 8d 56 07 | f3 21 a4 25 01 21 d4 52 d3 44 c4 73 d4 a8 a2 ea | 69 66 8c 26 ab 85 7b a0 65 5b 03 5d 74 e7 7a 63 | 38 e1 5f b3 a4 83 48 11 76 d7 fb 96 bd 94 81 0e | 12 85 94 cb 17 1c 9e 64 a5 e2 b4 c7 96 eb cd 62 | bb 15 1b 96 a4 fb c3 a8 a0 ae 37 79 52 a4 ec 21 | 73 e0 47 a7 95 56 ce d5 cc 94 10 bf a2 8a 93 dc | 7f ea 6c d5 98 4b fa 19 3a ac 5e 1f 78 6e 08 fc | fa 46 b2 55 22 d7 78 a7 75 be f4 63 29 44 fa cb | 29 00 00 24 19 33 9e e6 d2 ec 99 b2 2a d6 00 cf | c3 4d d5 a5 cb 9d 67 f4 f2 94 3f b0 a2 94 a8 ff | 01 8e 5d 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 f6 a8 c3 12 9d 73 0e 92 1b 13 62 | b1 83 e3 04 e0 b3 2c 1d 00 00 00 1c 00 00 40 05 | c3 d5 bb 6d 6e 36 db ca 5f b7 b2 05 dd 15 c3 8f | 20 6a e3 5f | state #472 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36804b7c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b24680 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24680 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #472 | libevent_malloc: new ptr-libevent@0x7fb388032bf0 size 128 | #472 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49682.150165 | resume sending helper answer for #472 suppresed complete_v2_state_transition() and stole MD | #472 spent 0.479 milliseconds in resume sending helper answer | stop processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb358039e30 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 62 43 a0 4c 6d db c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #472 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #472 | rejected packet: | 15 62 43 a0 4c 6d db c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dc fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #472: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #430 | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #430 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #430 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49682.157359; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003021 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358012630 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #430 | libevent_malloc: new ptr-libevent@0x7fb358039e30 size 128 "road-eastnet-nonat-178" #430: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #430) | fd 31 ba 30 35 2e 2d c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 61 13 a5 cc e9 81 b6 86 fc 6b 16 f1 74 d1 d9 | 72 f7 e2 ba f7 11 d1 79 92 c8 3d 2f 28 42 00 4a | 78 0d 84 65 5e dc 17 2f ba 15 c9 f0 22 4d 0a 3b | 29 55 5d 3f ae dd 3d 32 e8 c3 46 a9 04 47 63 51 | 2f 80 77 91 5f 9c b1 19 0f 94 27 d5 5d fe 9c 81 | eb f7 f8 80 c0 5d c2 5a 33 1a 77 e9 05 ab d6 42 | 13 e3 2a 15 08 f1 ba d2 bf eb 3d 3d ce 2d cd 92 | 09 c3 9f 5e 21 7b 84 9b 7e ad 3a cb 5a e8 5e a4 | 33 a8 4d 41 b7 9c ef db 29 ac 76 73 88 b2 9f 61 | fa 8c 1c 07 e5 8d 13 2c 9f d7 a6 11 29 94 1a 21 | 41 e9 57 a1 8b f3 e6 b9 90 b9 b8 f3 a3 3b 4c 8f | 23 8e 08 2f 27 17 72 8c c0 e7 38 14 1f 4b aa 78 | e1 d2 e5 79 c4 be 0b 93 9e 0c 21 6c d4 2a fe 21 | c7 8e 29 af b0 03 63 38 02 4d 95 ee 76 1a 81 af | a9 96 3e 2d 7b 5a 65 f4 b4 60 bb 2f a9 e9 18 59 | 66 94 d6 32 f1 9f 06 b1 1e 3d 20 4c 29 30 cd 34 | 29 00 00 24 72 14 4a 62 3b 2e 28 0b 02 9a 2b 55 | 37 9d 8e 84 fb c2 f7 70 ad cf 43 07 12 85 de c1 | 7c 78 30 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e0 6b 92 d2 7b 15 90 7f 21 2f b9 04 | b8 30 3c 8f c2 2d 01 6b 00 00 00 1c 00 00 40 05 | 4e cf 7c 8c 30 ae f3 1b a7 47 e4 11 ea a4 73 10 | 14 82 c2 9c | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #430 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 31 ba 30 35 2e 2d c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #430 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #430 | rejected packet: | fd 31 ba 30 35 2e 2d c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #430: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8d840 | handling event EVENT_RETRANSMIT for parent state #468 | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #468 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #468 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49682.160698; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500845 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #468 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 "road-eastnet-nonat-216" #468: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #468) | 7d 98 8a 9d 47 30 f3 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 4d 82 7b ce 67 f5 e3 c7 ef 1e 88 97 12 6b 1f | 83 b8 f4 6b 5d e2 86 e0 e9 f2 9b 39 cc 52 e7 74 | 42 1d 82 da 97 54 f4 cf 8c bb 44 74 5b 79 77 99 | b7 64 d2 5d 6f 79 ec 9a 9b f2 ae b8 84 7a 6f f8 | bd c4 91 ab 33 ef 63 16 a0 41 ba 3f f0 a6 76 33 | 99 9d 4e fa 10 3d a9 b0 fd 9d 95 6a 6d e1 64 80 | d6 f4 63 87 42 a4 40 d5 c9 d1 7b e6 b6 16 87 12 | 6b a3 97 13 be 62 fd d1 99 d3 9b d9 d0 66 91 ae | 70 9a 30 e7 e3 dd b0 da 82 fe e4 f0 44 cc b3 94 | 0b 57 c5 e6 97 4b 2c 01 fc cf bd 64 1e a3 1b 36 | a4 86 4a 71 7a 5d 83 15 27 9a 5b c7 b1 4b fa cd | 49 2c bf cb fb 1f 32 58 4d 30 7f 18 2a 34 d2 95 | e4 1f 33 09 6a df d3 45 5e 2c d0 94 30 dc 69 26 | e1 ac dd 8a 80 89 5d 10 3f 35 db e7 62 f2 ea e4 | 46 d5 0d ed 2d ad c4 c0 e6 d7 96 39 cc 2d f8 c8 | 62 6c cf 39 6f 6d 88 19 5a ed 59 0b b3 2a c0 06 | 29 00 00 24 92 6b ec 6b 64 1a 9e 4e ed 8a 02 4d | da d7 da b0 19 37 ca 67 a4 74 bd db b5 b1 e8 9c | 42 18 dc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f 7e f5 e7 e8 50 e9 16 af a5 e6 5b | b1 d0 cb b5 42 f7 79 13 00 00 00 1c 00 00 40 05 | f3 f2 fc c6 17 9d d4 89 d0 fb 82 c7 ed b0 98 6a | 20 f1 09 0b | libevent_free: release ptr-libevent@0x7fb338023e10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8d840 | #468 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 98 8a 9d 47 30 f3 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #468 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #468 | rejected packet: | 7d 98 8a 9d 47 30 f3 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #468: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36001d710 | handling event EVENT_RETRANSMIT for parent state #372 | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #372 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #372 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49682.167986; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00524 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8d840 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #372 | libevent_malloc: new ptr-libevent@0x7fb338023e10 size 128 "road-eastnet-nonat-120" #372: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #372) | 36 75 19 e8 2f 22 a4 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 1c 43 17 d7 b5 ce d2 b8 29 b2 bf 57 09 8b a5 | 02 ac c4 b7 76 e6 2d d8 ee ee 3c fe f4 66 f4 89 | f0 05 d4 6f 70 58 f2 ac a3 f6 a0 c0 6f e2 88 9c | 40 3f 21 b6 b5 e3 53 20 6c d9 59 5c d3 ed 29 31 | 70 b1 e2 00 f7 0a fb f6 8a 39 29 d2 58 c2 74 92 | 4c 9b 08 3f 44 b8 04 b0 23 1d ad 99 96 41 5c c3 | 74 17 1f 67 0a d8 d1 96 a3 e0 b8 c3 31 5e 35 15 | b4 7d 07 ac 51 6c 39 25 b1 04 61 4c b1 08 c3 a9 | 03 2e 6c 07 f6 12 ea 26 ae ed 42 10 86 bf 00 1f | 2c 3f d3 c3 05 31 1b 23 d0 7f 44 40 17 23 be b1 | ac f2 d9 5c 2d 0f 0e 8d d6 8e 02 9e c2 0d 39 2a | 1e 53 92 9d 45 7f f8 25 a0 3b 40 14 ce aa d7 8e | 3c 97 d8 0a 68 34 c5 e0 01 c0 9d 3c df ab b9 db | 0f 08 4e 9b 7f 31 ba b0 df 14 c3 2e b6 43 df 9c | e8 24 93 e8 93 fa be d8 05 20 58 54 dc 18 b6 a1 | 81 c2 54 d8 9d 63 fd 0b 60 e1 78 75 ef 13 d9 ec | 29 00 00 24 5b 70 e2 22 fb be c5 61 40 e7 92 1f | fe 03 7b 3d 26 2b 9e 50 62 fe 14 ef 7e 0b e5 c1 | 7b 5b 83 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6f bb b6 72 03 25 00 b3 08 33 f3 00 | 3f a7 05 f9 e6 64 00 bb 00 00 00 1c 00 00 40 05 | 5c 2b 76 69 54 27 3e cb 36 ec 86 9b 13 f7 89 7b | 0b 66 55 89 | libevent_free: release ptr-libevent@0x7fb36002ed90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36001d710 | #372 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 75 19 e8 2f 22 a4 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #372 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #372 | rejected packet: | 36 75 19 e8 2f 22 a4 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #372: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388009ed0 | handling event EVENT_RETRANSMIT for parent state #463 | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #463 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #463 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49682.196269; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001239 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36001d710 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #463 | libevent_malloc: new ptr-libevent@0x7fb36002ed90 size 128 "road-eastnet-nonat-211" #463: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #463) | 82 4f 79 37 d2 0d 41 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 90 64 a0 3a db 52 d6 c6 b4 21 5d 30 95 90 4d | ec 3e 65 f9 a3 2a c0 c0 7d e8 b2 f7 1e 08 f4 cc | 30 5c 17 eb a6 d5 4e 6e 17 f4 ed c0 bb f3 91 4e | 29 c8 3b 87 04 44 02 f9 0c 4c 73 bd d1 0e d4 bf | c3 01 38 a2 ee a1 61 19 01 62 c9 01 0a 14 69 dd | 59 d3 14 b1 8b 13 6d e7 0f 1d 11 59 11 9b 90 f3 | aa 66 ef 87 af 13 48 7f 6e c1 0d b9 f9 71 ad 9d | fd 12 e0 bc 30 d7 16 13 c9 f0 f8 64 57 36 fa 5b | d1 d8 74 64 e5 de 63 84 ef e1 12 12 26 93 3e 5c | b3 7f 8e 2c 1b eb d2 40 f2 01 5a e7 a8 30 ce b1 | 5c 5e 42 a8 26 40 52 c4 dc ea 04 68 87 26 50 e6 | 46 ae 37 b9 e4 fe 3f ef f2 8e a4 4f 04 25 af 76 | c9 39 80 05 08 fd ea 60 66 c5 24 89 72 f4 32 ff | ed 8b 39 48 50 c3 c4 68 91 e7 fc 82 bb 80 ce 9d | b8 47 ce dd c6 cc 21 8c 6f 88 e2 73 75 00 d9 09 | 84 88 f6 ce 7e 64 f7 42 86 d8 a7 50 3c 43 db 24 | 29 00 00 24 4c d8 7a cc cf f5 14 f0 01 a0 b3 f6 | 54 e1 4b f5 78 b9 2e d9 dd c8 bf f8 13 79 83 13 | b9 47 db df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 0d e0 3b 3f 2d f3 17 7e c2 11 72 | 87 7f c1 e4 a0 63 0f 3f 00 00 00 1c 00 00 40 05 | e9 2f a4 cf 6a af 14 cf 3c 1b bf 7a 8b a2 e8 94 | b0 6c 66 23 | libevent_free: release ptr-libevent@0x7fb38801d010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388009ed0 | #463 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 82 4f 79 37 d2 0d 41 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #463 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #463 | rejected packet: | 82 4f 79 37 d2 0d 41 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #463: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3840318d0 | handling event EVENT_RETRANSMIT for parent state #454 | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #454 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #454 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49682.197592; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002487 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388009ed0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #454 | libevent_malloc: new ptr-libevent@0x7fb38801d010 size 128 "road-eastnet-nonat-202" #454: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #454) | 3e f1 41 2a cb 15 91 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 3c 6a c7 38 95 77 87 5d 1e c8 dc ba 22 fc 03 | 1c 9c 6c 7f 8e 0e fd af 13 dd 37 0a 23 40 7c ce | 87 9a c3 3c b2 29 81 32 66 6c ba 2d 43 73 e4 9f | 34 a2 6c c8 c3 e8 8f d1 b2 45 4b 81 58 b8 9d f6 | d7 6b 98 99 af 72 e9 d0 c7 87 b4 74 61 b8 6f 67 | 18 e9 20 82 3b 32 85 5d b7 fc 19 46 92 6b 65 26 | b2 31 d6 c3 36 5c 46 dd c1 b3 1a ba 4d 4c b4 fb | c9 29 e2 5f 88 92 21 72 05 11 74 76 83 6a f0 05 | 70 a8 4f 78 f0 27 41 4f 18 70 43 44 55 76 41 4e | d4 55 4f 0d be 47 fb 72 63 29 ab 49 16 15 52 01 | 76 0d 0d 3c d4 72 41 c1 63 95 85 97 21 62 a1 0c | 98 62 73 cf ff 81 3f b1 d6 5b a3 17 9c bf 13 ea | 76 47 19 6b ec 4e dd d2 c8 fc 10 8a 93 9d e2 40 | 1a 9a ec ba a4 26 5c 4d 01 9a 6a 47 3b fc ea 48 | 29 30 cf ee 79 66 a8 78 a7 b1 8e ad 2b ce 52 2c | 72 05 7f 8f f6 f4 ff ed 12 0a b1 b7 de 27 bb d0 | 29 00 00 24 42 50 bc e2 16 2b 34 89 d5 4e 59 5a | a4 d3 d2 a4 86 df 60 97 ee fa 90 f6 ad 34 8e f4 | 49 50 59 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 1c 0d 08 a9 24 58 8d 73 8e f2 10 | b3 0d e0 67 52 ae c5 46 00 00 00 1c 00 00 40 05 | 72 a5 1c 62 b2 bc b3 f0 fe 77 e1 0e f2 db 46 ae | 09 80 33 7f | libevent_free: release ptr-libevent@0x7fb38403c470 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840318d0 | #454 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3e f1 41 2a cb 15 91 c1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #454 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #454 | rejected packet: | 3e f1 41 2a cb 15 91 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #454: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #431 | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #431 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #431 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49682.236894; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004288 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840318d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #431 | libevent_malloc: new ptr-libevent@0x7fb38403c470 size 128 "road-eastnet-nonat-179" #431: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #431) | 47 a9 f6 5d ab 90 59 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 61 b4 c7 cd e1 2c 04 0c 72 d6 80 6f c8 af 30 | 4d b0 b2 1e 8d 4f c3 2d f2 10 58 df a2 cf 51 79 | b1 79 c2 3f a7 35 e3 8e 8c e9 62 c2 7f 62 64 45 | 0a e4 6a 79 06 24 d8 93 a4 d7 88 f6 f8 67 56 ac | da f7 27 22 46 b5 f3 36 fc 59 b8 ef 46 c0 a0 39 | db 63 6d 41 32 18 a5 95 8d 7d ad 6f 27 26 ca df | ed d3 ee 53 fd 4c f5 cc 75 fc e3 f8 93 5a 96 cb | 92 9a 63 48 fa 88 0d 7b 6d 6b ed e6 9a a3 62 cc | f6 ca d1 cc 9a a4 27 97 4e 98 8a fa ec f7 10 73 | 1c 8b 1a f2 37 ea 26 ef 65 c4 24 b5 68 0e 71 36 | f1 1a b0 23 a4 4f b8 8f 75 d7 00 cd 7b 3c ae b6 | d6 4e 42 ae bd d1 a4 92 33 6b 9b 3f 93 ee 1b 13 | 12 06 ae 19 81 16 af 26 23 73 f8 46 07 4b f9 88 | 69 47 c6 fb 6b 2b 62 2c a3 d3 70 f4 52 77 08 a4 | 0e 48 7c ce 5d 87 5a c2 55 50 b0 8a 92 e5 1a 3c | 83 00 60 34 e5 f6 a0 b7 42 00 ef b1 62 a7 9d 6c | 29 00 00 24 71 9e 5f 53 a0 03 f4 e4 24 3a 58 53 | c3 05 4a 1c c7 b1 e2 bd 95 07 98 a5 4b 6a 2d 2f | 6b 11 45 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 46 73 c7 9b 2a a1 6f 39 66 d3 70 | f2 4b 98 95 84 ba e3 3f 00 00 00 1c 00 00 40 05 | 9a b5 4b 5a b1 14 b9 6a 89 15 79 d3 91 3a bb d6 | 0d 4a ca 70 | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #431 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 a9 f6 5d ab 90 59 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #431 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #431 | rejected packet: | 47 a9 f6 5d ab 90 59 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #431: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3fc10 | handling event EVENT_RETRANSMIT for parent state #373 | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #373 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #373 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49682.24122; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005356 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #373 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 "road-eastnet-nonat-121" #373: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #373) | cc d0 7c e3 2d ba 98 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba c9 ec 57 66 ee 6d 75 ec 00 31 9e bb a2 7b 33 | 03 5b e1 5f f9 35 33 83 7e 5f 91 5b a2 92 9a a8 | 8d 3b 36 89 d7 60 3c f0 e0 82 e5 11 6e 43 23 b1 | df d6 90 8f 04 61 87 4f 48 d6 55 c3 74 01 c3 05 | 74 78 5b 86 ae c3 d1 0f 5a c9 e4 c5 26 fd 8f 0b | 7a de b0 bf fa 77 b7 99 27 6d 94 68 54 8f 2e b4 | 27 fc 46 a6 65 3e f8 0d 42 f0 50 03 21 b0 cd 96 | 2d 45 e2 17 2e 0c 5d ab 5d cf b0 76 7e 40 37 71 | ec c6 7f c3 8e c1 e3 0c da 69 0c bb 78 ac ef e6 | fa da 64 48 00 9c 0f d4 5e 3f fd b4 84 a9 1f 83 | f8 16 28 f3 f1 a7 fd f1 9e 6b cf 4b 33 5a 08 dd | 8d d5 23 ac 66 10 69 36 aa 87 aa ab ed ab 68 36 | 4a 70 e5 64 3a 2f 37 bf 5e 42 b9 8e 12 99 78 f7 | 0c 24 39 a4 0c ff 5c 9e b7 31 00 75 be b4 85 09 | f6 93 ec eb a2 a7 69 50 c8 7a 9b 97 aa 4c fd 91 | 2c 8c 14 31 ec 08 42 84 d3 a9 ed d2 74 47 99 ae | 29 00 00 24 b4 0d dc 4f 11 5b a4 50 84 d3 92 d3 | f6 ef 85 ab 3e d2 da 12 30 2f 73 8e 10 d5 43 df | 1d 88 10 ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 85 d9 5b 1c 2d 07 c4 07 50 eb 06 | 15 5f 19 1f ba 90 46 a0 00 00 00 1c 00 00 40 05 | bb 4b 15 0f 4a b6 b1 9b ec 46 e5 86 fe 18 d0 b4 | dc 99 60 c7 | libevent_free: release ptr-libevent@0x7fb34001a190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3fc10 | #373 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc d0 7c e3 2d ba 98 af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #373 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #373 | rejected packet: | cc d0 7c e3 2d ba 98 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #373: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac7f80 | handling event EVENT_RETRANSMIT for parent state #221 | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #221 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #221 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49682.24751; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007495 exceeds limit? YES "road-eastnet-nonat-221" #221: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-221" #221: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #473 at 0x557d46b00640 | State DB: adding IKEv2 state #473 in UNDEFINED | pstats #473 ikev2.ike started | Message ID: init #473: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #473: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #473; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-221" #473: initiating v2 parent SA to replace #221 | using existing local IKE proposals for connection road-eastnet-nonat-221 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 473 for state #473 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a3fc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #473 | libevent_malloc: new ptr-libevent@0x7fb34001a190 size 128 | #473 spent 0.093 milliseconds in ikev2_parent_outI1() | RESET processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #221 ikev2.ike failed too-many-retransmits | pstats #221 ikev2.ike deleted too-many-retransmits | #221 spent 2.63 milliseconds in total | [RE]START processing: state #221 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-221" #221: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #221: PARENT_I1(half-open IKE SA) => delete | crypto helper 13 resuming | crypto helper 13 starting work-order 473 for state #473 | State DB: IKEv2 state not found (flush_incomplete_children) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 473 | picked newest_isakmp_sa #0 for #221 "road-eastnet-nonat-221" #221: deleting IKE SA for connection 'road-eastnet-nonat-221' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-221' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-221 | State DB: deleting IKEv2 state #221 in PARENT_I1 | parent state #221: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #221 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 473 time elapsed 0.000588 seconds | libevent_free: release ptr-libevent@0x7fb360035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac7f80 | in statetime_stop() and could not find #221 | (#473) spent 0.588 milliseconds in crypto helper computing work-order 473: ikev2_outI1 KE (pcr) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 13 sending results from work-order 473 for state #473 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #473 Initiating connection road-eastnet-nonat-221 which received a Delete/Notify but must remain up per local policy | libevent_malloc: new ptr-libevent@0x7fb35c039e20 size 128 | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 13 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-221" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-221' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-221" | stop processing: connection "road-eastnet-nonat-221" (in initiate_a_connection() at initiate.c:349) | spent 0.07 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #473 | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 473 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #473 | **emit ISAKMP Message: | initiator cookie: | 78 01 12 66 35 d7 75 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-221 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fd 47 0f 4f 77 38 bb e7 c9 71 64 11 49 78 07 db | ikev2 g^x 61 1c cd 26 23 f1 f6 1d 25 30 16 ce 14 27 83 ce | ikev2 g^x 42 30 8f 08 74 8c 5a 73 8c d4 32 61 41 1b ee 9b | ikev2 g^x f9 31 2e 33 9d 12 db b8 cb 33 3f 38 d9 dd c3 f9 | ikev2 g^x 20 b6 40 e8 ca 08 02 ce df 71 6c f1 5d 52 08 e6 | ikev2 g^x 58 10 57 a2 32 8d ae 1d 5e 7d c4 ce e0 91 e8 67 | ikev2 g^x ef d4 89 2c c0 b5 6a 92 6e 51 6d 9b 9d 21 b2 11 | ikev2 g^x 63 ad d9 36 26 eb dc c5 60 5b ef 4a 3f 29 d2 75 | ikev2 g^x 9a 29 b2 ce 56 3f a4 11 28 44 4d 82 14 b3 ff 08 | ikev2 g^x f3 34 c5 89 41 5b 00 60 7c 63 69 55 27 25 23 fa | ikev2 g^x 32 38 62 77 fb 7a 33 df 62 71 61 b7 15 ec 0a 13 | ikev2 g^x 14 36 a9 93 fd 25 0e 0d b3 44 f4 62 07 ce 96 88 | ikev2 g^x f0 a4 9b c6 5b 9f 17 d2 94 b3 dd 9f 08 c2 33 c2 | ikev2 g^x 59 53 80 d3 e8 b8 bc 9f 9d b9 55 bf 1b b3 90 a8 | ikev2 g^x 46 84 0d b5 c1 2a b7 bd df e2 56 3f f0 a8 af c2 | ikev2 g^x b3 ab 6b 5f 0e ca 69 45 20 54 b6 94 83 c5 3d bb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4a 32 17 be 17 e6 be 0c a5 f0 d0 1f f3 82 ee d0 | IKEv2 nonce 20 e4 2f 26 27 39 fc fe 8a c9 3a 42 bb 40 ba 29 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 78 01 12 66 35 d7 75 44 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 dd | natd_hash: port= 01 f4 | natd_hash: hash= d9 8a 84 70 d7 06 66 bf 35 02 d1 dc b7 f5 da 2f | natd_hash: hash= 6f 36 dc 4c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d9 8a 84 70 d7 06 66 bf 35 02 d1 dc b7 f5 da 2f | Notify data 6f 36 dc 4c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 78 01 12 66 35 d7 75 44 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 22 8e 50 95 0f 93 c8 cc 9c 03 8c bf 24 39 56 cd | natd_hash: hash= 71 d7 b1 e2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 22 8e 50 95 0f 93 c8 cc 9c 03 8c bf 24 39 56 cd | Notify data 71 d7 b1 e2 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #473 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #473: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #473 to 4294967295 after switching state | Message ID: IKE #473 skipping update_recv as MD is fake | Message ID: sent #473 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-221" #473: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.221:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #473) | 78 01 12 66 35 d7 75 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 47 0f 4f 77 38 bb e7 c9 71 64 11 49 78 07 db | 61 1c cd 26 23 f1 f6 1d 25 30 16 ce 14 27 83 ce | 42 30 8f 08 74 8c 5a 73 8c d4 32 61 41 1b ee 9b | f9 31 2e 33 9d 12 db b8 cb 33 3f 38 d9 dd c3 f9 | 20 b6 40 e8 ca 08 02 ce df 71 6c f1 5d 52 08 e6 | 58 10 57 a2 32 8d ae 1d 5e 7d c4 ce e0 91 e8 67 | ef d4 89 2c c0 b5 6a 92 6e 51 6d 9b 9d 21 b2 11 | 63 ad d9 36 26 eb dc c5 60 5b ef 4a 3f 29 d2 75 | 9a 29 b2 ce 56 3f a4 11 28 44 4d 82 14 b3 ff 08 | f3 34 c5 89 41 5b 00 60 7c 63 69 55 27 25 23 fa | 32 38 62 77 fb 7a 33 df 62 71 61 b7 15 ec 0a 13 | 14 36 a9 93 fd 25 0e 0d b3 44 f4 62 07 ce 96 88 | f0 a4 9b c6 5b 9f 17 d2 94 b3 dd 9f 08 c2 33 c2 | 59 53 80 d3 e8 b8 bc 9f 9d b9 55 bf 1b b3 90 a8 | 46 84 0d b5 c1 2a b7 bd df e2 56 3f f0 a8 af c2 | b3 ab 6b 5f 0e ca 69 45 20 54 b6 94 83 c5 3d bb | 29 00 00 24 4a 32 17 be 17 e6 be 0c a5 f0 d0 1f | f3 82 ee d0 20 e4 2f 26 27 39 fc fe 8a c9 3a 42 | bb 40 ba 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 8a 84 70 d7 06 66 bf 35 02 d1 dc | b7 f5 da 2f 6f 36 dc 4c 00 00 00 1c 00 00 40 05 | 22 8e 50 95 0f 93 c8 cc 9c 03 8c bf 24 39 56 cd | 71 d7 b1 e2 | state #473 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34001a190 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a3fc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac7f80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #473 | libevent_malloc: new ptr-libevent@0x7fb360035930 size 128 | #473 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49682.248848 | resume sending helper answer for #473 suppresed complete_v2_state_transition() and stole MD | #473 spent 0.458 milliseconds in resume sending helper answer | stop processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c039e20 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 01 12 66 35 d7 75 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #473 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #473 | rejected packet: | 78 01 12 66 35 d7 75 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dd fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #473: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0596 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #269 | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #269 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #269 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49682.263038; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00639 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c046090 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #269 | libevent_malloc: new ptr-libevent@0x7fb354009640 size 128 "road-eastnet-nonat-17" #269: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #269) | 42 2b 66 77 50 7b f1 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 1a b0 80 05 00 53 b8 88 37 a8 0d e8 4e c0 81 | 57 b8 c1 99 be 60 6c 42 36 80 aa e8 7e 86 e2 1b | dc 47 d3 0f cf c7 46 a8 c8 47 ce ff 99 14 e6 14 | 37 44 15 18 25 7b d6 ca f2 0f 00 2d 17 01 df 08 | ac fe e9 d3 2b 32 d0 3c 75 39 46 f3 2a a6 98 c3 | 1d b7 82 4a b4 92 84 4b b3 2d b3 71 d7 06 52 b9 | 9c eb 15 89 b5 c8 16 c5 e1 29 05 f5 12 64 42 f4 | a0 b3 32 62 fe 43 4c 1c 4e 1e 53 37 a8 e8 52 23 | 53 0e 82 46 38 b3 95 ea 7e 47 ae 7b 38 c7 ec ac | 8c 74 78 5b e3 a1 ba 65 7c 63 27 19 55 d3 7e f5 | 2f 36 c3 b3 a1 0f 84 2a 85 17 e4 09 e8 35 c4 82 | 08 59 25 c5 6f 5d dc d6 ee 2f dc 6b 0a a2 5d f8 | d2 8d a0 b1 da 71 a0 b2 68 ba c7 d1 ba 7e e6 81 | d8 e3 b3 84 de 3a 47 64 3d 04 00 a0 60 be 1c 4f | 52 66 df 3f 77 fe 53 0c dd cd ed 75 7e 76 02 77 | cc 4e de 99 d4 98 4e 1e 30 09 c0 9e cb c6 a1 c0 | 29 00 00 24 b8 ee 66 5c df cb 58 d0 1b a4 60 c3 | 1b 92 52 a8 29 57 57 d2 02 37 76 e3 2d 2f 31 c7 | 4b 37 7d fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 73 36 11 68 b5 eb 4b 5f e8 3f ce | 5b fc b9 99 cc 0c 05 c7 00 00 00 1c 00 00 40 05 | 7f dd 18 35 5d 55 ec 33 76 f4 f0 dc 77 e6 e3 3b | 97 a2 2b d9 | libevent_free: release ptr-libevent@0x7fb36804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #269 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 2b 66 77 50 7b f1 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #269 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #269 | rejected packet: | 42 2b 66 77 50 7b f1 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #269: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7b910 | handling event EVENT_RETRANSMIT for parent state #455 | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #455 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #455 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49682.276308; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002299 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #455 | libevent_malloc: new ptr-libevent@0x7fb36804b850 size 128 "road-eastnet-nonat-203" #455: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #455) | a6 08 27 1f 75 50 39 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 c7 bc 11 60 3e a6 9a 85 6d e5 42 37 d7 18 00 | 0c ea 15 92 bc 93 3a fa 4f c0 cd 9b 9d 21 1a ec | 13 f0 fc 0b a2 84 9a a5 b1 57 c2 a8 ab 33 a5 7b | 04 ac cd 61 b9 a7 e2 6f b1 9a 56 b1 3c b1 a4 2e | 8d 80 e0 ac 78 ee b2 78 51 00 d0 a0 eb cf 06 35 | 9c 7e 2a 73 b1 56 cd fe b7 d8 9d ab 84 62 9b e7 | ab 4d 04 16 06 c3 1a 9c 88 af e1 4b bd a0 09 ac | fd 8a ba 51 00 10 a1 a7 a6 a2 56 74 b5 9b 53 af | 87 60 09 5b 74 75 e3 41 f8 3d 7a cf 0c 36 f7 ea | aa 1b 05 8b 54 d5 b2 e1 fe 9e d4 4e f4 ae 74 22 | 98 23 25 ba ff 74 27 da 25 81 74 09 8c 6b 8b 69 | 54 dc 62 05 8c 02 be b4 b0 c4 25 43 18 99 9f c3 | 41 7e c1 29 f3 a3 60 75 de aa 26 bd a3 38 8c ad | a8 31 89 d2 48 90 d9 19 ce f4 34 9e 9d e7 1c e9 | d3 7f ee 85 33 84 75 6d 04 5b b4 a0 96 a6 93 65 | 8d 1c 3a f8 14 81 03 4c 63 f4 25 e5 59 99 ac 86 | 29 00 00 24 6a 39 a6 75 f8 f4 82 47 b3 0b 2e 10 | f3 31 67 d9 88 26 9d 5b f1 75 40 6b 34 32 86 bb | 7a 07 84 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 cd df 41 37 6e 2d fc 1b 29 38 8e | de fc 0c a0 44 c7 44 d5 00 00 00 1c 00 00 40 05 | 6e c0 59 83 50 2c 8a cc c5 6e 0a 98 ab 1c 00 ee | ff c6 95 31 | libevent_free: release ptr-libevent@0x7fb37803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7b910 | #455 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 08 27 1f 75 50 39 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #455 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #455 | rejected packet: | a6 08 27 1f 75 50 39 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #455: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338012bf0 | handling event EVENT_RETRANSMIT for parent state #469 | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #469 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #469 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49682.280589; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499472 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7b910 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #469 | libevent_malloc: new ptr-libevent@0x7fb37803b0b0 size 128 "road-eastnet-nonat-217" #469: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #469) | 29 4a 77 5f 7a c1 26 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 e1 17 9f 01 39 e1 e9 f8 e3 b4 37 56 6e 01 9e | d8 db 78 19 20 a1 ab 6d c3 e8 12 cd f6 c3 2c 5f | d5 86 61 6c a8 d4 5b 57 ac f5 b7 f0 24 de ac 90 | a1 9c 51 ce 2d 7a 33 35 b1 68 02 e0 5a 9f bf ac | 1b d8 19 f9 b4 68 45 14 e7 fd c5 a9 74 d6 09 6d | f9 4a 25 95 f8 f0 1c 13 dd 36 12 79 4b 27 2a bb | 86 17 86 e1 0e 04 a7 ab e3 0c 51 78 89 39 a0 df | c7 a9 56 0a e4 9a f1 58 c7 a1 12 21 f0 18 d0 d0 | 21 0e 73 e6 4f d3 13 37 a8 aa e3 89 21 ab a3 7c | d5 ac 7b aa ea d7 ff a4 b9 b2 c3 7f 9b 07 77 17 | 36 8f 4e a7 40 03 46 9c db 93 b3 16 3c e2 7f c0 | 58 42 83 4f fa 88 71 3b b7 86 e5 ca 62 88 5c 9f | 93 c4 59 82 fb 9e 5a 96 92 16 5f 68 0e 83 59 2f | 70 32 51 a7 ce dd b8 93 09 66 27 ff 7a e6 c4 cc | d2 87 46 9e b6 49 85 48 3f a7 ef 43 8a 5c ae e6 | 2c b0 88 25 66 2b 82 4c a9 2f 05 19 54 70 c3 9c | 29 00 00 24 36 8f c2 cf 02 b6 2e 75 ac 6c a4 55 | 9f 56 a2 b8 31 83 97 a5 56 a5 c5 7a ba 53 78 14 | 83 c8 c0 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 d6 3c 93 bb 1b 68 50 cd c9 2f b8 | 25 99 9e c0 3a 2f 1f 80 00 00 00 1c 00 00 40 05 | e5 a0 2e 8f cb 71 f8 0c 42 a7 95 8f 73 2e c5 90 | e5 8b 3a 32 | libevent_free: release ptr-libevent@0x7fb3540407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338012bf0 | #469 spent 0.0866 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 4a 77 5f 7a c1 26 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #469 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #469 | rejected packet: | 29 4a 77 5f 7a c1 26 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #469: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #374 | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #374 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #374 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49682.295907; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005825 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338012bf0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #374 | libevent_malloc: new ptr-libevent@0x7fb3540407f0 size 128 "road-eastnet-nonat-122" #374: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #374) | 2b af 1b 03 10 38 37 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 c3 14 06 9b d8 f1 99 49 48 ff 90 1f 86 00 28 | 44 18 8a f8 52 dc 7d 04 1b d5 bc 43 4d 6c cb 67 | f8 0d 9d 6d d0 66 c5 1d 7e 62 70 73 1c 71 41 b4 | dd 81 08 b3 22 a9 c5 05 00 35 5b 00 07 16 93 d5 | 94 c1 6c 23 e3 4f fb cc 11 67 47 b3 e1 b1 07 89 | ea c0 9e a2 65 96 87 08 be 34 63 54 73 84 17 c6 | d1 75 fb 5b 8e 80 b1 4e bc e5 80 b5 fc 51 6b 8e | af 49 e6 d5 05 a1 42 3f 30 13 b7 fe 10 06 81 bc | 26 72 22 45 7f 9f 88 7e f2 4d d6 4b 6d 85 6b 06 | 69 00 b6 2d 19 97 b0 06 ca c7 30 d2 02 d3 f6 37 | 5e 73 21 4a 86 ec 60 ca fd d2 ed d8 05 2b db 6c | a9 01 2a 23 f7 1d d9 64 5b e9 5e 20 76 8d 16 0a | bf cd f0 54 2a 72 e9 f6 56 5e 90 80 56 52 68 ca | 9f 40 22 7c 1e b1 d0 73 7b 7b 65 7f 5f 3b b2 a4 | 2d 12 04 bd 89 d0 f1 f1 ba b3 be 3d 20 c5 f8 84 | bc fa 4d 90 8e a5 a8 51 48 43 7b 6c ed ea 9f e0 | 29 00 00 24 8b e7 71 0b f0 6c d4 66 d8 89 de 00 | 61 f0 41 76 89 f5 bb 07 5f 2d 78 ac d6 5e eb 30 | 2f 0d 98 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 37 47 83 86 42 9b 81 4e c6 41 b6 | af 4f 24 3f ee d6 bb bd 00 00 00 1c 00 00 40 05 | 2f d6 db c3 63 be 1c 54 fe 3c c7 2a 35 82 32 22 | 47 30 b2 bc | libevent_free: release ptr-libevent@0x7fb3700300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #374 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2b af 1b 03 10 38 37 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #374 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #374 | rejected packet: | 2b af 1b 03 10 38 37 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #374: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0514 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd80 | handling event EVENT_RETRANSMIT for parent state #464 | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #464 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #464 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49682.306141; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001732 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #464 | libevent_malloc: new ptr-libevent@0x7fb3700300e0 size 128 "road-eastnet-nonat-212" #464: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #464) | 24 23 49 88 e3 09 10 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 3e 00 a4 b1 da ff 66 fb 46 9b f8 05 c4 d3 4e | 1a be d3 c5 f3 29 65 46 ed 6f e5 e1 9c d3 68 c3 | 49 3b 6a cd e8 c4 12 c0 42 a0 22 7e 1b 5d 32 aa | a0 3a 32 c8 92 e5 3d a9 90 26 7c b6 7a 3a c7 43 | 1e d7 d9 ca a9 3b e4 0e ac 4c a3 a2 54 be fa 3a | 34 7b 08 69 76 9f f5 86 6b e1 71 f1 ca f2 34 fb | f0 af 6d c0 e7 4d 86 2c 35 64 d7 a8 e5 56 44 f4 | 1b a3 7b 36 d3 8e bf 68 72 d1 d6 14 19 d5 94 41 | 37 2c 85 dd 26 51 82 12 f9 57 28 f6 64 e4 99 2c | e5 14 14 38 a6 eb 30 83 5f a9 d8 ce 33 ba b5 e7 | 8f 9e 29 5d 17 d7 5f e7 f7 6f 44 97 e9 e3 1d 52 | 7d 6b 40 ae 7e e6 9b 70 f4 e4 cb 6b e6 46 d1 1a | f1 d4 e8 4a 08 7a 73 f5 ae fa 1c 51 b5 c1 66 db | b4 47 cd 7b 34 6f da f9 6b b2 dc 0f 59 56 0e 82 | f9 d8 cb f8 b3 e7 8c 71 cf eb c3 24 d5 a5 32 fc | 19 3b 14 fc 10 5b ac 0b 65 e1 fc c1 26 0d 3c cc | 29 00 00 24 f8 5a 68 e8 8f 04 5e 9b c3 04 25 38 | 2e af 26 bb 12 7b 35 ab f6 8f 9b c1 e5 8b f7 b5 | fb ab d6 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 53 56 65 0c 1b 38 25 05 25 e2 17 | 1d aa de c6 51 81 dc 56 00 00 00 1c 00 00 40 05 | b6 60 c7 67 b1 c7 40 e8 a5 6f 2e d6 dc 92 69 0c | f8 bb 28 2f | libevent_free: release ptr-libevent@0x7fb37c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd80 | #464 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 23 49 88 e3 09 10 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #464 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #464 | rejected packet: | 24 23 49 88 e3 09 10 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #464: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0474 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c040840 | handling event EVENT_RETRANSMIT for parent state #432 | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #432 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #432 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49682.321423; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003447 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #432 | libevent_malloc: new ptr-libevent@0x7fb37c04b7c0 size 128 "road-eastnet-nonat-180" #432: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #432) | 9e 5c f1 81 be b3 cc bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 a7 44 cc 56 0f 1f a1 57 e9 97 90 cf 04 1e 5b | e0 0e 7b 47 ef c0 b0 6b 28 ba 80 69 c9 1b 38 ab | 77 4e c9 e0 e5 8e ac 7e e2 16 87 36 5e 9c 78 7a | 88 e7 f8 df f3 43 04 06 de 41 bf fc 2c aa 5f 0d | 69 d9 8b 25 79 3a 55 bd c2 56 12 76 16 fc d9 a5 | 9c 10 c0 69 f3 49 ac 1b 12 69 8b 54 81 c5 66 b4 | ce 87 81 ab 4c 4a 3c be 13 a8 a6 c4 c4 ee d3 f3 | e4 6c 08 82 35 56 98 d0 52 0e 3c b5 9f cf 94 45 | b1 ff 7d 1f 92 70 cf 8e d1 c1 37 a6 37 65 ee ce | 20 a0 2f 74 83 20 8b e8 b7 59 69 69 3d 2e af d9 | 5c 5b c8 f5 d1 97 f9 58 4c 4b b5 5a 72 21 7a ff | 15 e2 cf de 63 20 f5 1b 33 44 6d 86 26 89 fe a9 | ef 26 23 fc 07 42 35 ac 53 4d 00 7f 36 93 50 78 | ef 61 a9 fd 99 64 73 27 a0 12 f0 71 a5 ef 01 e0 | f5 fa 65 6f 20 9b da c4 8d 30 72 f1 87 a2 6d e6 | e6 3b 2c 57 3c e1 2d 99 93 66 b2 b3 c7 c3 45 c6 | 29 00 00 24 97 c3 cd 2d d6 91 ce 3c 3a 10 07 b4 | 90 19 a9 e3 82 ea 52 87 8f 88 50 41 d4 a6 e1 e6 | 2e 3c 74 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b b0 51 e2 58 5c b1 15 1d eb ed 97 | 2a 88 5d 96 2e c9 a1 f8 00 00 00 1c 00 00 40 05 | 78 1a 23 ab e8 fa 74 f8 b4 b9 8c 5c d8 d3 f5 f5 | 1c a1 eb 5a | libevent_free: release ptr-libevent@0x7fb34c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c040840 | #432 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e 5c f1 81 be b3 cc bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #432 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #432 | rejected packet: | 9e 5c f1 81 be b3 cc bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #432: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0457 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #270 | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #270 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #270 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49682.345787; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005497 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c040840 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #270 | libevent_malloc: new ptr-libevent@0x7fb34c00cf80 size 128 "road-eastnet-nonat-18" #270: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #270) | 98 aa bb 79 2f f5 b5 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 24 f6 25 5f fa 71 0f 39 53 f1 8f 92 58 3c 59 | 8e c2 2e 28 53 ea 0d 58 1c b1 76 25 4f 77 d3 40 | 6f 45 9c 78 a8 01 99 46 d7 6e 57 ac 51 cd 32 20 | 87 d7 3c c9 3f 5e e0 a6 46 8c bc bb d2 2a 3a 19 | 0d 30 25 7b 8c f0 eb f6 7f 48 bd 51 fc 7c 03 2d | 42 fb c9 54 0b f3 df 3f 56 f4 9e 74 f1 22 86 89 | d4 fe 7d ea 34 26 2a 49 b7 c2 c2 c5 bf 06 dd 36 | be de 23 aa bf 61 22 5f 62 e1 04 e4 81 81 b4 1a | 94 68 45 c7 43 f9 2b f7 9c c7 da c1 6c f9 e0 19 | 3d 12 26 17 de 58 8c 74 5a 7c d1 ae 99 12 b1 cc | 7c fd 41 5e df 12 73 ff fe 24 d4 ac e3 4a 14 3c | a7 57 18 de 1a f8 e3 60 98 66 b7 e2 de d9 ef 30 | 7b 0c d1 7a 6d 0b f9 31 66 84 79 8b 8b 50 77 51 | 23 58 84 77 80 ea dc 70 95 5b e4 15 8d 98 42 aa | fa 93 a8 7a d7 2a 0d 51 24 2f ee fa 92 74 05 47 | d0 38 43 8c 6f cb 3f 1f 04 0b e8 57 ca ea 33 7e | 29 00 00 24 dd 5a f6 1e bd fb cd ef 92 3b 56 16 | bd 57 a2 0f d1 d5 f5 02 97 f4 10 bb 15 09 d8 8e | c9 9b 97 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 15 18 7d df ec 83 30 72 5b 68 c2 | 08 e3 c3 a4 d5 a2 af 25 00 00 00 1c 00 00 40 05 | b3 09 33 34 02 38 11 d4 03 64 9d 03 c3 5d 2b 94 | 2e 30 63 d3 | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #270 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 aa bb 79 2f f5 b5 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #270 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #270 | rejected packet: | 98 aa bb 79 2f f5 b5 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #270: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #222 | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #222 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #222 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49682.351106; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009474 exceeds limit? YES "road-eastnet-nonat-222" #222: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-222" #222: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #474 at 0x557d46b01c00 | State DB: adding IKEv2 state #474 in UNDEFINED | pstats #474 ikev2.ike started | Message ID: init #474: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #474: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #474; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-222" #474: initiating v2 parent SA to replace #222 | using existing local IKE proposals for connection road-eastnet-nonat-222 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 474 for state #474 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb378005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #474 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 | #474 spent 0.0997 milliseconds in ikev2_parent_outI1() | crypto helper 17 resuming | RESET processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 17 starting work-order 474 for state #474 | start processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #222 ikev2.ike failed too-many-retransmits | pstats #222 ikev2.ike deleted too-many-retransmits | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 474 | #222 spent 2.62 milliseconds in total | [RE]START processing: state #222 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-222" #222: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #222: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #222 "road-eastnet-nonat-222" #222: deleting IKE SA for connection 'road-eastnet-nonat-222' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-222' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-222 | State DB: deleting IKEv2 state #222 in PARENT_I1 | parent state #222: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #222 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | in statetime_stop() and could not find #222 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-222 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-222" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-222' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-222" | stop processing: connection "road-eastnet-nonat-222" (in initiate_a_connection() at initiate.c:349) | spent 0.08 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 474 time elapsed 0.001 seconds | (#474) spent 1 milliseconds in crypto helper computing work-order 474: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 474 for state #474 to event queue | scheduling resume sending helper answer for #474 | libevent_malloc: new ptr-libevent@0x7fb35003b1c0 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #474 | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 474 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #474 | **emit ISAKMP Message: | initiator cookie: | 0f db c1 fb 9f 17 ff 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-222 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 05 1b 5f a0 e0 ea b4 6f d8 89 26 cf ee 32 1a 5c | ikev2 g^x 28 fd cc 88 df ac 76 71 06 f6 f9 47 1d 52 2b f1 | ikev2 g^x 5a b8 ae 1c d0 f8 c1 49 c7 7c ed 42 b3 cb ec d1 | ikev2 g^x cd 02 cf 31 b3 56 f6 e1 d0 7b 2f 03 00 08 68 a8 | ikev2 g^x 8c e2 7f 21 83 8d a7 f5 0e 07 fa ee 88 4b c9 7c | ikev2 g^x 96 80 b8 d5 42 4d 28 ea bb cc 27 3f c4 d8 6e 4d | ikev2 g^x d5 70 bc b9 0a 5f 21 c3 31 6b f1 91 46 6a 01 67 | ikev2 g^x 1a 7e a6 f1 0c 4d 62 51 b1 a2 3c 89 97 d5 4a 44 | ikev2 g^x a9 bc 59 2f a3 d1 5e 07 95 15 69 ac 72 1f 9c ba | ikev2 g^x 63 7f 02 e1 05 f8 26 4f fe cb 35 8d 42 06 b7 4a | ikev2 g^x a1 e1 b3 5c f5 2a 05 2b b1 4d 29 89 16 f1 e4 7b | ikev2 g^x dc e2 55 b9 29 ad b8 79 4e bb 9a 44 92 25 af e6 | ikev2 g^x 8f 1c 0d 27 3a fe 2f c8 95 15 ef 6f 1b 1e 7a 94 | ikev2 g^x a3 8c 31 92 cc 09 2b ca d2 98 1d 32 a4 3c 30 c1 | ikev2 g^x 96 ab 37 bb 0d bc c5 cd 1c ca 91 c5 fa 2a c9 92 | ikev2 g^x 70 fb 0c 4c 99 ec 29 a2 72 d8 22 a0 d3 24 0d 76 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b8 e3 46 90 e1 5a 71 46 9e cc 2f c2 22 0c 77 5a | IKEv2 nonce b9 94 a5 51 d5 e9 c9 19 b8 4f d2 8d f8 17 d9 c0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0f db c1 fb 9f 17 ff 9c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 de | natd_hash: port= 01 f4 | natd_hash: hash= f0 82 ca 85 05 ee 86 5d c3 66 e4 91 24 1c 89 d5 | natd_hash: hash= b4 33 f3 c7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f0 82 ca 85 05 ee 86 5d c3 66 e4 91 24 1c 89 d5 | Notify data b4 33 f3 c7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0f db c1 fb 9f 17 ff 9c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d7 2a e5 02 23 f5 bb 26 e7 1d 38 9f 9f c2 ec a7 | natd_hash: hash= 48 2b cd 07 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d7 2a e5 02 23 f5 bb 26 e7 1d 38 9f 9f c2 ec a7 | Notify data 48 2b cd 07 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #474 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #474: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #474 to 4294967295 after switching state | Message ID: IKE #474 skipping update_recv as MD is fake | Message ID: sent #474 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-222" #474: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.222:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #474) | 0f db c1 fb 9f 17 ff 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 1b 5f a0 e0 ea b4 6f d8 89 26 cf ee 32 1a 5c | 28 fd cc 88 df ac 76 71 06 f6 f9 47 1d 52 2b f1 | 5a b8 ae 1c d0 f8 c1 49 c7 7c ed 42 b3 cb ec d1 | cd 02 cf 31 b3 56 f6 e1 d0 7b 2f 03 00 08 68 a8 | 8c e2 7f 21 83 8d a7 f5 0e 07 fa ee 88 4b c9 7c | 96 80 b8 d5 42 4d 28 ea bb cc 27 3f c4 d8 6e 4d | d5 70 bc b9 0a 5f 21 c3 31 6b f1 91 46 6a 01 67 | 1a 7e a6 f1 0c 4d 62 51 b1 a2 3c 89 97 d5 4a 44 | a9 bc 59 2f a3 d1 5e 07 95 15 69 ac 72 1f 9c ba | 63 7f 02 e1 05 f8 26 4f fe cb 35 8d 42 06 b7 4a | a1 e1 b3 5c f5 2a 05 2b b1 4d 29 89 16 f1 e4 7b | dc e2 55 b9 29 ad b8 79 4e bb 9a 44 92 25 af e6 | 8f 1c 0d 27 3a fe 2f c8 95 15 ef 6f 1b 1e 7a 94 | a3 8c 31 92 cc 09 2b ca d2 98 1d 32 a4 3c 30 c1 | 96 ab 37 bb 0d bc c5 cd 1c ca 91 c5 fa 2a c9 92 | 70 fb 0c 4c 99 ec 29 a2 72 d8 22 a0 d3 24 0d 76 | 29 00 00 24 b8 e3 46 90 e1 5a 71 46 9e cc 2f c2 | 22 0c 77 5a b9 94 a5 51 d5 e9 c9 19 b8 4f d2 8d | f8 17 d9 c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 82 ca 85 05 ee 86 5d c3 66 e4 91 | 24 1c 89 d5 b4 33 f3 c7 00 00 00 1c 00 00 40 05 | d7 2a e5 02 23 f5 bb 26 e7 1d 38 9f 9f c2 ec a7 | 48 2b cd 07 | state #474 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb378005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #474 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 | #474 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49682.353037 | resume sending helper answer for #474 suppresed complete_v2_state_transition() and stole MD | #474 spent 0.6 milliseconds in resume sending helper answer | stop processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35003b1c0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0f db c1 fb 9f 17 ff 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #474 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #474 | rejected packet: | 0f db c1 fb 9f 17 ff 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 de fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #474: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0705 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #375 | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #375 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #375 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49682.357267; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003968 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c480 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #375 | libevent_malloc: new ptr-libevent@0x7fb35003b1c0 size 128 "road-eastnet-nonat-123" #375: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #375) | a4 09 26 11 42 9e 51 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b 77 05 ad 49 62 16 46 be f5 65 08 84 ad 14 8b | 54 2c 99 1d e2 97 87 23 80 81 89 f0 4c d0 eb 92 | 7b 0b 4f bb c5 8e f0 7c 4a e9 4e f5 41 3b c0 9c | 84 74 7a 28 42 6c 3e a3 44 ba 29 11 96 09 9b f3 | 38 05 36 bd 24 dc d4 f1 69 9a 67 13 96 b5 cc 0e | 5b 85 9c bc 45 e5 5b 70 a0 86 01 2f a9 6f b7 16 | e5 8c 0d ae 1d 65 f5 53 d8 97 9b 0e 3c f7 8c b4 | 84 cb c7 3a c6 10 40 ea de 5f 63 4c 12 d8 3f ca | 6d 62 70 f0 93 72 e5 53 fe e2 f7 48 e3 16 ec 2c | 0c 51 77 44 87 3b cf 71 6a 9d b3 31 8e cc be f2 | 83 ce be c0 12 f1 01 88 ca 5d f3 fc 95 bc f7 5a | 34 7b 8e 4b 02 d0 59 3f ca a0 78 bc ef 69 51 e1 | 59 c6 1a ee b3 5f f4 fe ba ab aa 32 83 46 24 8b | 44 0a ac 7f 47 be 12 69 64 f5 8a a0 c3 66 33 2a | d1 fe cd 2b 6e fd 1c 22 43 71 36 d1 05 aa f3 a0 | 34 64 36 1b 5f af f2 60 88 b6 fd ad 79 17 84 9b | 29 00 00 24 a2 f8 9d 2f 08 fe df 02 8f a0 29 1e | b3 67 52 e4 00 d5 8c 7f 4e 12 c2 f7 f5 b4 05 71 | a4 8b 3b 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 12 2b 6b 99 24 aa d2 31 8d d6 a9 cf | 86 3d 5f d7 43 66 7f 91 00 00 00 1c 00 00 40 05 | 3d 40 65 0f bf b0 2e 03 30 63 c3 7a f7 f2 38 a3 | 20 e1 e4 b2 | libevent_free: release ptr-libevent@0x7fb348023e80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #375 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 09 26 11 42 9e 51 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #375 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #375 | rejected packet: | a4 09 26 11 42 9e 51 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #375: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0734 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25c80 | handling event EVENT_RETRANSMIT for parent state #456 | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #456 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #456 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49682.386647; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.005886 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #456 | libevent_malloc: new ptr-libevent@0x7fb348023e80 size 128 "road-eastnet-nonat-204" #456: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #456) | 9d 73 90 c6 28 50 00 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 3f ed 93 2c 95 9a 36 92 4d 4f a2 60 c1 a4 c9 | 4f 89 23 1f d1 62 f5 78 d3 b5 53 89 10 3d be a6 | 0b 7e 28 8a f8 9f 39 90 86 39 f9 58 de b8 41 b5 | 4e b5 7b 74 44 63 cc 49 07 82 fe 85 49 2e bc 7a | f9 73 7c 32 a7 c0 6d 69 27 6b 58 3d ad d1 e3 ec | cc a2 3b ff 29 b9 68 35 71 ee f8 63 67 14 1d 54 | bd cd c0 94 2f 62 7a 35 f4 12 35 06 31 ee 52 8b | 29 f1 3d 4d 88 53 c4 ee a1 13 19 c9 95 9c 3a b3 | 01 50 95 2e cb 29 cc 04 53 67 66 58 33 78 91 44 | bb 06 02 b6 52 69 e1 7c 4a 36 de 14 7e d4 42 89 | da ed 12 fd e2 7c 6b 02 ab fa 82 91 36 f1 eb 4f | a3 22 e5 0e 96 4e 45 d1 d5 c3 b4 13 59 96 05 fe | 42 25 83 c3 8d 08 66 f5 9f c5 f5 d6 78 e8 30 c4 | 64 8d 48 0b ea 1f e9 05 9f 8a 0b 97 9c 51 d8 74 | a8 a9 43 c8 84 d8 11 55 a3 8c 0b ac d0 92 1d f4 | 61 b1 7f 3d f8 aa 52 a8 9b c7 bf 12 0c da 76 e4 | 29 00 00 24 6d 34 cd c2 13 6b 2e 99 a8 cb ee 2a | a0 eb 8c a9 1d 65 aa 5b 5f 82 85 1d 0e 9e 60 f1 | 7a ed 45 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ef 03 64 ba 5e b8 36 8b cc 07 48 65 | d5 6f 6e 8b 3d 6d 57 bb 00 00 00 1c 00 00 40 05 | 07 ad 51 48 59 7f 26 2d fc 42 e0 9c c0 43 00 49 | 58 00 de b8 | libevent_free: release ptr-libevent@0x7fb344035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c80 | #456 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d 73 90 c6 28 50 00 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #456 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #456 | rejected packet: | 9d 73 90 c6 28 50 00 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #456: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0749 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348048a60 | handling event EVENT_RETRANSMIT for parent state #433 | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #433 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #433 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49682.394082; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003769 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #433 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 "road-eastnet-nonat-181" #433: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #433) | 23 e1 68 16 6a df f6 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 84 65 c0 62 66 6e cb 40 26 80 c7 11 7a b1 77 | 8f 7b 14 21 bf 47 61 54 80 80 4f 40 4b 14 8f 6c | 7f 20 33 7a 32 bd 20 39 a9 e7 e4 8c 88 5e 71 0c | b4 34 07 ea 3b 74 7a 69 d0 40 c2 8a ce 14 e0 29 | f7 f8 fb 45 30 ce 02 50 b6 4b d6 fe ce bd d7 fd | d9 af 2b 59 d1 37 75 ed 60 7b 97 1e bb b5 21 2d | 82 af 47 6c fd b3 b6 b4 1a e4 0b 54 80 93 91 9a | 7c 67 57 2c 37 bc 4a ba 6c 68 8e 7c 69 ae 25 35 | f6 73 82 3e e0 ba 6e 40 b9 c2 c0 d3 bd 9e 54 14 | 66 2e 22 5d 66 78 db 66 26 82 fa c1 4b 7c 9e 34 | 57 34 cb 3c 56 da ee df b8 34 f8 14 c2 9b 3b a3 | d6 4c a8 fb 55 30 94 15 c4 87 b2 b9 65 70 e9 f6 | 5f 9b ae 28 67 59 78 af d0 1e d8 d4 2a 4a 91 32 | 25 06 fb ff be c0 6a 2f e3 60 0d e2 75 08 92 ca | 55 96 9f 26 37 e4 6c 28 e7 f1 08 78 9b ac 4e 5b | 3b 11 9e bf 95 59 23 96 7a 89 87 42 71 70 51 75 | 29 00 00 24 bc 75 9d d0 ff b6 ae 90 e3 29 fd fb | 27 30 03 9d 8d 6e b5 df cd e3 e0 48 35 b6 7e d4 | 5d 99 20 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 1d b4 53 81 6d 12 3c 62 05 25 08 | f2 c7 73 02 9c 59 76 4d 00 00 00 1c 00 00 40 05 | 9b bb 33 9d d0 7d d5 98 fe 91 d5 bc 36 50 81 f5 | 28 37 64 3d | libevent_free: release ptr-libevent@0x7fb36403ae90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348048a60 | #433 spent 0.173 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 e1 68 16 6a df f6 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #433 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #433 | rejected packet: | 23 e1 68 16 6a df f6 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #433: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0695 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38400a290 | handling event EVENT_RETRANSMIT for parent state #465 | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #465 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #465 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49682.402469; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001402 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348048a60 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #465 | libevent_malloc: new ptr-libevent@0x7fb36403ae90 size 128 "road-eastnet-nonat-213" #465: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #465) | 61 8e 23 d2 13 62 a1 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e ff ad a6 69 28 f7 dc 3e 12 16 a3 b8 12 d1 0c | e2 d9 c7 08 64 20 6b 95 e2 f7 13 3f fe 41 07 b0 | 63 aa 7f 3d 77 9f f9 e2 21 16 88 33 88 34 63 be | 66 c4 e1 0f 6d 0e 67 89 ae 7f d4 2b da 09 0e c2 | 3d 5d ed e3 b1 da e4 45 10 b1 c5 e8 5c a0 b7 e1 | 45 c7 74 34 87 11 e9 20 8e bf a9 d5 b7 7f 3e c8 | 87 13 ea b0 4c 38 35 35 21 28 ca 99 cb 90 60 a1 | 8c 47 23 f8 9b b8 e8 b3 af 65 36 19 01 0f 99 db | 11 cb f7 6b 11 70 78 e3 5e f3 08 79 6c d7 3e 9c | aa 63 ab c1 3b 94 5d c4 f5 a3 7c fb 68 79 fd 4d | ad 0f 3b a0 62 30 54 4e 21 46 20 c3 e3 03 c6 e1 | b9 0f 7d fe 4b b3 60 7d 63 ba a2 4c 73 2e f3 b8 | 3b 22 a2 5f eb 6e f7 60 a7 f7 13 33 69 2d a4 92 | 73 a6 b3 6f 83 80 a4 99 0d 08 29 5e d9 35 92 ae | 9f af 0f c2 f8 4b f3 a5 f1 21 b9 71 6a 24 94 9a | 22 03 aa 3e 91 42 1b 0b b8 8a 56 9b 18 21 37 6d | 29 00 00 24 d0 d3 37 6e 16 17 0d f3 9a b3 75 28 | da 73 bd b0 37 5f e8 7c ed 64 dd a2 58 d5 25 f4 | 40 05 3d 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 42 81 75 52 0a 3a ff 0f 6a b7 c3 | 61 92 38 6c 3b df 54 bd 00 00 00 1c 00 00 40 05 | ac 90 18 d8 00 f9 15 ad 07 5e df 3f 97 c5 48 08 | 0a 92 84 e5 | libevent_free: release ptr-libevent@0x7fb38402bf10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400a290 | #465 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 8e 23 d2 13 62 a1 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #465 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #465 | rejected packet: | 61 8e 23 d2 13 62 a1 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #465: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45350 | handling event EVENT_RETRANSMIT for parent state #376 | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #376 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #376 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49682.42481; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005995 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400a290 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #376 | libevent_malloc: new ptr-libevent@0x7fb38402bf10 size 128 "road-eastnet-nonat-124" #376: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #376) | ea 6d 1c 44 16 cc 7c db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 30 8d f2 73 36 66 21 18 72 ab a6 1d 5b ca 9c | 0a 7e 8f ea 73 27 8a 58 d5 e4 26 95 19 96 87 0c | 7f 07 37 1c 70 d2 60 3e 98 51 eb 57 bf 72 e0 8c | 84 ad 4f b6 dc 5c 36 41 e2 77 e0 9c 8d 51 16 fc | 84 d9 54 f9 85 4d 98 72 f2 d6 3d 1b 19 f0 da ce | ab 3f 23 52 e0 3a 3c 0f e9 38 61 5a c2 41 30 12 | 05 82 0c cb c8 c2 1e a1 4f f2 c3 e1 3d da 41 26 | 24 be f6 af 3e e8 2f 87 ee 1b 93 a1 f0 e9 53 da | 3a 2e 85 7e d2 d0 a7 3b eb 29 ab 65 b7 78 9f f6 | c5 fd a3 19 78 40 8c d9 48 7b 2c 4c e7 26 6f 53 | d3 ac b1 b4 ba da af d2 ab 50 63 75 e1 1d 99 d0 | b8 31 ac 7d e7 18 55 91 d3 ac 44 fc d3 74 62 7f | ce 91 66 95 28 b3 47 a1 94 fd 56 15 40 09 da b9 | 56 ba 99 10 ef 74 77 7b 2d 9f e1 06 40 6f 4c 27 | 16 1c 00 6e 75 bf e7 e8 68 0b d5 e5 14 e8 f6 62 | 49 c7 45 85 8e da 35 35 ec 65 cf 2e 56 35 57 b4 | 29 00 00 24 b2 22 59 8f 2f 17 3c be 86 a7 a1 89 | a7 cd 11 4f 04 a8 63 56 c2 46 93 de 35 e3 be b3 | 5b e4 fb 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 73 25 29 4a e6 52 0b aa f7 7d 73 | 68 37 ec c6 59 a7 02 18 00 00 00 1c 00 00 40 05 | a9 5a 00 6b 7f 85 e1 a6 d7 c4 fa 5e b7 b1 99 68 | fa 78 21 65 | libevent_free: release ptr-libevent@0x7fb374034da0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45350 | #376 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 6d 1c 44 16 cc 7c db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #376 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #376 | rejected packet: | ea 6d 1c 44 16 cc 7c db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #376: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cc10 | handling event EVENT_RETRANSMIT for parent state #470 | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #470 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #470 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49682.431122; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500647 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45350 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #470 | libevent_malloc: new ptr-libevent@0x7fb374034da0 size 128 "road-eastnet-nonat-218" #470: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #470) | ab ba b0 28 2b 1d 75 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 e4 df 77 9c ac 7c 40 d9 cc 91 f4 1e 15 f1 e4 | bc 57 e7 d5 04 82 1b 0a da 88 66 71 1d 5c c0 4e | e9 e1 44 ec a4 a7 01 cc ac 81 2a 8e 12 68 b2 c4 | cb fb 38 e3 4b 73 83 33 bf 14 39 b7 96 9c bd 59 | d9 ff 78 9c 9b 27 6f 77 fd c9 8a 91 00 a0 bf ad | 80 e8 18 ee 7d 76 d2 f5 dc 73 28 11 ea 98 07 d2 | 64 7f 44 96 f2 22 04 36 e1 c7 80 69 f0 17 fa 9a | d9 3b f0 c2 a7 d3 89 ef c3 be e7 3b 57 5c b5 bf | 47 3a cd 92 d8 c8 49 50 dd d0 b8 eb bf 2d 90 2f | 70 dc 26 c2 6c 6d 97 1e 52 f7 6d 64 24 1f 5f ad | 51 2f 7a 28 09 01 c2 c0 02 41 61 9f 09 3f 66 24 | 9a 1a a0 e1 ec c0 36 27 88 be e6 c0 7c 74 30 55 | 5b 47 83 d5 de 8f dd bb 1e 36 33 0e 3a 91 ce a0 | e2 86 42 d5 a7 ba 66 4a 76 5d 9a 0c 15 60 fc f8 | 07 4e ec f8 cb 3b a4 f7 40 7b 9c 98 98 27 e7 40 | f3 18 97 7c cd 29 25 1e 88 f4 c6 ab 7c 46 c3 a4 | 29 00 00 24 5d 90 f6 17 67 54 dd 2e 4f 57 ce 29 | 91 07 11 a6 ab 05 8f 42 d3 b0 74 bf 38 9e 49 fe | 79 c7 ca e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 04 17 c7 7e 54 6e 6a e8 f5 01 1c | 14 c4 b8 fd 53 6d 0c 45 00 00 00 1c 00 00 40 05 | ee 06 ba 38 dc 10 50 e4 3e a6 cd 5f 2c e3 74 3b | 2a 18 7d 82 | libevent_free: release ptr-libevent@0x7fb3780180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cc10 | #470 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab ba b0 28 2b 1d 75 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #470 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #470 | rejected packet: | ab ba b0 28 2b 1d 75 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #470: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0682 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7e490 | handling event EVENT_RETRANSMIT for parent state #223 | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #223 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #223 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49682.45647; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010342 exceeds limit? YES "road-eastnet-nonat-223" #223: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-223" #223: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #475 at 0x557d46b031c0 | State DB: adding IKEv2 state #475 in UNDEFINED | pstats #475 ikev2.ike started | Message ID: init #475: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #475: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #475; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-223" #475: initiating v2 parent SA to replace #223 | using existing local IKE proposals for connection road-eastnet-nonat-223 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 475 for state #475 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2cc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #475 | libevent_malloc: new ptr-libevent@0x7fb3780180b0 size 128 | #475 spent 0.0674 milliseconds in ikev2_parent_outI1() | RESET processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #223 ikev2.ike failed too-many-retransmits | pstats #223 ikev2.ike deleted too-many-retransmits | #223 spent 2.66 milliseconds in total | [RE]START processing: state #223 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-223" #223: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #223: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #223 "road-eastnet-nonat-223" #223: deleting IKE SA for connection 'road-eastnet-nonat-223' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-223' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-223 | State DB: deleting IKEv2 state #223 in PARENT_I1 | parent state #223: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 18 resuming | crypto helper 18 starting work-order 475 for state #475 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 475 | stop processing: state #223 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb36001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e490 | in statetime_stop() and could not find #223 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-223 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-223" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-223' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-223" | stop processing: connection "road-eastnet-nonat-223" (in initiate_a_connection() at initiate.c:349) | spent 0.058 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 475 time elapsed 0.000569 seconds | (#475) spent 0.572 milliseconds in crypto helper computing work-order 475: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 475 for state #475 to event queue | scheduling resume sending helper answer for #475 | libevent_malloc: new ptr-libevent@0x7fb35403f170 size 128 | crypto helper 18 waiting (nothing to do) | processing resume sending helper answer for #475 | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 475 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #475 | **emit ISAKMP Message: | initiator cookie: | f3 25 a8 40 a9 16 90 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-223 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f2 fc dc 84 62 e7 1f 29 92 4f 29 58 18 7b 3f c4 | ikev2 g^x 0b 92 35 41 3d 7d f5 49 ac e4 08 33 00 55 13 7e | ikev2 g^x 41 c8 1f ab 98 7a 30 c3 af c3 cf 6c 36 f8 c9 eb | ikev2 g^x 2e 6e a4 90 d5 52 a2 8a 0e 83 47 aa 06 91 44 23 | ikev2 g^x e7 ef 3d 2e 37 19 57 6f 45 ce 1d 86 c2 e7 46 ee | ikev2 g^x 18 2a 29 c4 ec 14 a5 7f 72 bc 78 02 59 a2 ca 1d | ikev2 g^x b2 b0 a4 5c 1b 84 48 bf bd 56 e0 d5 a2 ad cf a0 | ikev2 g^x ed 67 0d 74 38 b9 ba e0 64 fd 1a b6 82 cc d6 8a | ikev2 g^x 07 94 d5 49 9d 7f 16 e0 7c 51 29 17 d6 08 40 72 | ikev2 g^x fd c6 fa 75 b2 47 30 6b 15 b9 55 b9 02 dd d8 c4 | ikev2 g^x c6 0d e1 61 7d 87 80 e1 c1 30 9f 40 92 6e 85 e9 | ikev2 g^x ef ce 2d ce 71 79 64 d3 dd 63 ec db 24 83 38 23 | ikev2 g^x 73 f2 c1 e6 cf bd 52 ef 73 4d 97 4a 32 ac ae 30 | ikev2 g^x 6c 19 3c 8f 59 15 1c e0 c6 b3 5b a5 c9 da d5 d9 | ikev2 g^x 5d 32 c2 2c c5 8a 99 8b d0 ac 6f 05 fa 9a 82 9e | ikev2 g^x fa 91 c3 17 c1 28 24 70 4e 52 7c 04 70 68 57 b3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d6 06 09 cd b7 26 a0 ec bf 9a 6e 13 e8 2b d8 44 | IKEv2 nonce aa f3 29 4e 9f 5a e2 23 56 33 79 1c 13 aa 41 35 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f3 25 a8 40 a9 16 90 ac | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 df | natd_hash: port= 01 f4 | natd_hash: hash= 57 5a 5b 76 80 70 09 57 e9 61 f5 b2 db 52 90 c9 | natd_hash: hash= 67 ea 13 33 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 57 5a 5b 76 80 70 09 57 e9 61 f5 b2 db 52 90 c9 | Notify data 67 ea 13 33 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f3 25 a8 40 a9 16 90 ac | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6b c7 4e 4d 75 42 5c 91 03 17 f3 17 f4 9d bf bf | natd_hash: hash= b8 92 f0 13 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6b c7 4e 4d 75 42 5c 91 03 17 f3 17 f4 9d bf bf | Notify data b8 92 f0 13 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #475 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #475: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #475 to 4294967295 after switching state | Message ID: IKE #475 skipping update_recv as MD is fake | Message ID: sent #475 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-223" #475: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.223:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #475) | f3 25 a8 40 a9 16 90 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 fc dc 84 62 e7 1f 29 92 4f 29 58 18 7b 3f c4 | 0b 92 35 41 3d 7d f5 49 ac e4 08 33 00 55 13 7e | 41 c8 1f ab 98 7a 30 c3 af c3 cf 6c 36 f8 c9 eb | 2e 6e a4 90 d5 52 a2 8a 0e 83 47 aa 06 91 44 23 | e7 ef 3d 2e 37 19 57 6f 45 ce 1d 86 c2 e7 46 ee | 18 2a 29 c4 ec 14 a5 7f 72 bc 78 02 59 a2 ca 1d | b2 b0 a4 5c 1b 84 48 bf bd 56 e0 d5 a2 ad cf a0 | ed 67 0d 74 38 b9 ba e0 64 fd 1a b6 82 cc d6 8a | 07 94 d5 49 9d 7f 16 e0 7c 51 29 17 d6 08 40 72 | fd c6 fa 75 b2 47 30 6b 15 b9 55 b9 02 dd d8 c4 | c6 0d e1 61 7d 87 80 e1 c1 30 9f 40 92 6e 85 e9 | ef ce 2d ce 71 79 64 d3 dd 63 ec db 24 83 38 23 | 73 f2 c1 e6 cf bd 52 ef 73 4d 97 4a 32 ac ae 30 | 6c 19 3c 8f 59 15 1c e0 c6 b3 5b a5 c9 da d5 d9 | 5d 32 c2 2c c5 8a 99 8b d0 ac 6f 05 fa 9a 82 9e | fa 91 c3 17 c1 28 24 70 4e 52 7c 04 70 68 57 b3 | 29 00 00 24 d6 06 09 cd b7 26 a0 ec bf 9a 6e 13 | e8 2b d8 44 aa f3 29 4e 9f 5a e2 23 56 33 79 1c | 13 aa 41 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 5a 5b 76 80 70 09 57 e9 61 f5 b2 | db 52 90 c9 67 ea 13 33 00 00 00 1c 00 00 40 05 | 6b c7 4e 4d 75 42 5c 91 03 17 f3 17 f4 9d bf bf | b8 92 f0 13 | state #475 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3780180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2cc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #475 | libevent_malloc: new ptr-libevent@0x7fb36001d920 size 128 | #475 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49682.457588 | resume sending helper answer for #475 suppresed complete_v2_state_transition() and stole MD | #475 spent 0.344 milliseconds in resume sending helper answer | stop processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35403f170 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 25 a8 40 a9 16 90 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #475 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #475 | rejected packet: | f3 25 a8 40 a9 16 90 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 df fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #475: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0408 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #271 | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #271 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #271 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49682.463761; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005844 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354025320 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #271 | libevent_malloc: new ptr-libevent@0x7fb35403f170 size 128 "road-eastnet-nonat-19" #271: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #271) | 7d 5f ba e3 47 14 e8 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 b7 7f 1c 9b af 52 72 9a 96 12 4e c3 f7 5f 8a | 48 37 54 79 d7 e3 fa 14 73 ed 20 d0 0f 82 32 1d | 91 7e 9e e7 72 47 b7 f9 8c ea 5f f8 df 55 12 c4 | 92 bb 9f b6 bd 08 63 49 16 85 39 f9 e1 a5 b1 3c | c9 58 9d 54 19 7c 80 7a 60 14 04 1b 66 54 39 2c | 16 d8 67 8c 1c 17 da 4b 4f 1f bb d2 83 f8 37 fc | 93 5f 92 af 49 5f 4c f2 18 ce 79 e8 01 4b 07 77 | 80 53 3f 3e 68 e0 6b 21 fa 6f 05 3a 1d 5f f9 c2 | 5b 34 da 08 fc 81 e1 b6 3f ef a7 e1 31 76 84 4b | db 66 e5 6b 4f 6c 18 0f ea 47 e4 2c 6a c6 c7 06 | 5d 0a 4e 6f d5 bc 0f 88 7b d7 82 6f 83 51 d3 f6 | 3f a3 4c ff 85 ee cb 4b c1 01 38 69 a0 a8 36 14 | 78 3e d3 db 38 75 17 e9 a4 a3 59 d1 1c af a4 4d | 60 05 9d fd 70 d0 ca cf 0e 66 4b c6 c1 40 c4 3b | 1b 74 97 05 ab 30 3b 52 e7 0a 00 36 d3 75 ae 4d | 76 9f 37 1c a2 58 eb 22 e1 c0 ab af b2 c0 c6 2e | 29 00 00 24 7c 82 5e 31 94 0b 65 4a 1d 71 08 ad | 0f 28 62 96 1d 12 64 f9 13 f9 d7 4a bb 8e a2 2a | 74 49 fb 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 80 df fd 55 81 8a 62 6a df 6a a7 | 9f a0 5f ab 49 a7 33 15 00 00 00 1c 00 00 40 05 | 73 c3 81 b2 53 ff c8 44 e3 9d 4d 41 12 c0 55 97 | b5 95 22 52 | libevent_free: release ptr-libevent@0x7fb3380407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | #271 spent 0.0988 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 5f ba e3 47 14 e8 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #271 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #271 | rejected packet: | 7d 5f ba e3 47 14 e8 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #271: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358018460 | handling event EVENT_RETRANSMIT for parent state #434 | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #434 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #434 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49682.465001; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004557 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #434 | libevent_malloc: new ptr-libevent@0x7fb3380407f0 size 128 "road-eastnet-nonat-182" #434: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #434) | 68 bd 27 f7 1a 5f c8 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b 8d dc 86 f4 61 cd 63 4f 12 1a 89 63 c0 18 0e | da c1 2f 67 00 48 49 fe 80 58 30 87 77 1f 60 f1 | 91 93 c4 dd 6a 33 66 a0 69 fa 20 95 f6 9a 11 c7 | fd d3 c3 ff f1 0e a6 05 ba 58 f9 c6 b4 81 c1 3f | 58 b5 fa d8 f3 85 c4 ec 19 40 f6 9f ac 5a 0e 85 | ab f8 54 8d ff fd 0f ef d3 5b 98 8a 75 38 18 ce | f2 7b e8 23 92 dc 6c 70 3f 25 92 19 2b 60 a6 82 | 30 c7 b8 84 44 df 82 d3 8a 4d fc 1d 9c e4 51 d6 | 72 15 3a 4a d5 64 0f 79 a2 e3 fa 27 32 de fa 9b | 0a b6 71 85 29 d5 43 a6 b2 3c 95 42 d3 be 1c 80 | e1 df 27 cf e0 47 6a aa 9d f0 da 55 04 28 85 87 | 1e 7a 6c 89 a7 1a 78 3d cf 4e 43 87 8f 82 da c7 | 06 01 34 b1 a1 6a 5d 22 18 fe 03 9e 0d 36 91 39 | 6c bb 36 1a 00 1b a4 da c4 26 ba 72 4d 2a 35 43 | a5 6f 44 e2 75 40 5e f0 90 a9 5a 70 fc 57 4c e2 | 21 84 c8 a9 9b df a7 2e 69 2b 50 04 e1 24 b1 85 | 29 00 00 24 24 e6 ca a8 b3 30 fc 67 22 ff 0b c1 | 23 a4 8f 2a ae b5 6d 78 43 33 67 66 1b 96 07 82 | 43 a1 52 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e1 30 9f db e9 ff d2 de 10 c0 b8 22 | 86 59 ab dc 44 02 05 1c 00 00 00 1c 00 00 40 05 | 2d 24 f4 0c 2e f5 a0 c9 e2 14 db 8f 00 ef 15 a2 | 0d 97 11 53 | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358018460 | #434 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 bd 27 f7 1a 5f c8 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #434 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #434 | rejected packet: | 68 bd 27 f7 1a 5f c8 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #434: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0404 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3980 | handling event EVENT_RETRANSMIT for parent state #466 | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #466 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #466 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49682.480276; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000886 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #466 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 "road-eastnet-nonat-214" #466: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #466) | d8 f3 8e 44 6b 2f 1e a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c e1 1c b6 a8 45 43 90 db 9b 35 75 1f aa 92 f9 | d6 e2 6f 34 81 df f8 c5 fb 61 93 34 a9 9a d6 e7 | 4f 19 4e 64 91 79 4b bc 74 e5 43 7f 1c fd f5 46 | 67 4f b3 d8 c9 4d 2d c9 eb 26 c5 ea 6c 36 ba 25 | 06 8c 1d c8 05 71 c9 48 a5 ca a6 91 9c 00 5f c8 | af c1 a9 4d 01 92 ef ab 3a e6 5a 67 89 38 c9 af | 19 fe 4d 6b 76 3f 95 f8 65 3e 4b 5b 24 34 56 32 | 9f dd 59 97 7b 03 2f 23 ce fb e6 f8 e4 68 93 ff | ad 3a cf f3 67 73 9d e1 9b 2a d0 84 d4 ba 4d fe | 72 3c 74 29 f1 ab eb eb fd d6 c3 47 54 02 c4 5f | 85 e4 bc a9 88 7b 25 6d 99 c6 f0 38 89 09 7c 47 | 72 c2 61 46 a0 1d 59 09 82 b5 5f b7 e1 f1 5c 0d | 50 1d c9 01 1e 1c 93 24 6c e4 5b 27 7f 49 97 85 | 14 7e 19 88 ae dd 1a b6 56 79 35 3e ff bd 7d 4e | 47 80 ff 35 79 4b c6 1c b6 e7 5a d2 8f b2 aa 73 | 6a 88 5b 1d bb 78 3e 8d f2 9b 06 47 8f 4b 75 e7 | 29 00 00 24 4b 18 d5 35 7f 58 ef 5d 8f 25 3f b5 | cb 0b 31 6c 2d c9 a6 3f f9 92 29 72 9b 38 37 11 | 6a b0 a4 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 d8 47 26 17 c1 8a e8 09 00 37 fb | f1 38 56 14 b9 a5 7b 42 00 00 00 1c 00 00 40 05 | 10 91 19 bc 27 f8 ea 8a 40 18 2c 45 b2 2a 2d 38 | 23 45 ab e1 | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3980 | #466 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 f3 8e 44 6b 2f 1e a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #466 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #466 | rejected packet: | d8 f3 8e 44 6b 2f 1e a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #466: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #377 | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #377 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #377 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49682.488579; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004822 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3980 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #377 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 "road-eastnet-nonat-125" #377: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #377) | 7d b7 6a 31 9c d6 86 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 bf 7a 35 d2 37 1e c0 a2 92 6a 98 80 72 24 5e | 1f 3c b2 01 23 5f 15 bf ce e9 e4 d7 08 a3 2a 60 | 60 1e 2a e8 5a e7 a9 d5 87 39 6d 3f 34 3f c0 1b | ca fe dc 77 c6 7e 84 64 73 35 57 0c ed b5 74 11 | bb 72 6b af 00 a6 5c 48 1d a9 ae e0 21 6e f9 6c | fe 77 59 9f 79 f0 27 e3 f8 d3 03 12 c5 8c 01 06 | 76 43 6f e7 91 25 19 a3 05 2c 5f 40 7b 60 ce d6 | c7 0a 22 7e c1 15 e4 29 ab c3 9b 6d 58 d6 08 88 | eb 2e fc 26 54 22 7d d9 71 73 77 93 47 47 52 c7 | 2f be 59 30 ba ca e1 78 87 6d cb 35 72 6f 4d 3b | a0 93 98 95 e4 6c 43 b1 50 a4 aa 69 98 d4 ed e8 | 9d 30 82 39 85 51 32 50 b9 91 12 7b 77 d2 d0 9f | 64 b8 21 58 96 89 58 eb 1b a0 e3 48 15 3e 58 3b | 7f 5d 13 52 09 44 ad 12 73 77 70 1d 29 a3 72 c1 | 6f bc 36 26 b2 07 f9 32 34 75 b2 cb 8d 27 b8 92 | 36 ef 06 e2 e3 5e 94 66 19 de e4 ee 30 db 10 64 | 29 00 00 24 40 c7 66 20 2c ab 25 81 a4 29 77 75 | 63 eb 29 35 21 bb d9 a5 a3 5d 38 ec 5b 5c 03 34 | 11 83 53 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 20 88 86 59 0d 66 18 17 be e2 6d | 8e c3 55 fc 50 ba 92 3e 00 00 00 1c 00 00 40 05 | a3 24 68 23 82 72 27 ee 2c 96 9c 16 80 ee e0 88 | 08 9f bc a7 | libevent_free: release ptr-libevent@0x7fb3780300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #377 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d b7 6a 31 9c d6 86 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #377 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #377 | rejected packet: | 7d b7 6a 31 9c d6 86 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #377: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000cc10 | handling event EVENT_RETRANSMIT for parent state #435 | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #435 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #435 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49682.534941; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006262 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #435 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 "road-eastnet-nonat-183" #435: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #435) | 02 95 c8 9c 02 70 ef 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 be 1c 3f a4 66 94 b1 76 a3 9b 53 73 2f 7f 23 | 4a e8 16 a3 16 f5 f7 58 2e fa f9 cc e5 72 42 dd | 79 82 dc a3 32 45 63 e7 97 5f 0c 3f 10 0e f2 af | 36 1e 6e 10 67 9c 3e 6a f7 f3 72 ba 54 df 6c 10 | a0 1c 0f 6a ce 67 71 2a a3 c4 d3 9c 88 b9 f7 04 | 30 84 58 1f bb cd f1 cd f3 e2 04 50 7f cf d2 c2 | 26 c1 1c 97 d9 a2 05 dc 96 89 90 50 ae 56 a0 13 | ef 2a 24 f0 f6 4d a9 8e e9 e9 a2 eb 42 50 42 ab | 0a 3d 04 3e 57 0c 0a e1 00 9d 75 a3 60 15 b7 e8 | 84 24 4c a7 d1 ab 72 3e f4 8b ef 1a c8 cc 7d af | ee 55 f6 12 cd b9 d1 90 77 f0 61 3d 61 12 ee f8 | 94 b3 64 a2 07 62 d6 b1 81 57 84 c9 8b ff 25 ea | 74 4a 3e 9b d6 88 62 0a dc b0 05 5d 90 03 c9 cd | 54 3d 83 cb 36 ad ef 96 f9 28 73 d8 df b8 72 79 | d4 6d 08 a8 b3 a6 c9 bf ea 29 05 5f 61 ed 03 82 | b8 9d e9 c7 c9 a7 67 16 08 0f e7 ba 6a 6d 38 69 | 29 00 00 24 ae 8f 34 92 0a 08 8b 7b 30 37 54 ea | a0 43 df e6 ae f8 bc fe 70 d8 fd fe ce a5 f7 5d | fb 76 aa 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 34 e7 f7 2a 07 1c be c1 53 fb c8 | 09 7a b0 5a 0f 53 bf 3c 00 00 00 1c 00 00 40 05 | 75 09 e1 26 ec 40 37 83 67 2f 03 41 48 5a 4e 60 | ef 86 00 50 | libevent_free: release ptr-libevent@0x7fb34003b010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000cc10 | #435 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 95 c8 9c 02 70 ef 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #435 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #435 | rejected packet: | 02 95 c8 9c 02 70 ef 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #435: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #272 | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #272 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #272 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49682.548242; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005822 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000cc10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #272 | libevent_malloc: new ptr-libevent@0x7fb34003b010 size 128 "road-eastnet-nonat-20" #272: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #272) | ff cb fd 37 8d 6e 61 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 04 b7 27 a5 a7 b8 66 d1 97 95 af 66 c3 e5 98 | ee b7 4e e8 fe 54 c0 2a 2c 35 b6 d6 11 41 10 b4 | 18 af 3b 75 f0 d4 8b ed 8c 54 fb a5 3b 9b 6b cd | 03 d4 cf 02 df ad 03 af ed 19 0c 47 fd 76 33 3e | 24 82 13 9d 24 33 be 90 d1 7f 59 52 78 71 71 b7 | d4 30 a1 93 8a 23 ef e8 5d 07 26 a3 58 a3 1a 46 | 2d 58 6b b7 bb c2 88 9f da 41 df 19 fa 55 01 88 | 63 f9 88 36 bf 3a 39 63 56 a1 2c 9c 43 fd a5 21 | f8 58 cf ff 69 0b 98 4e 19 2a 44 99 da 01 4c 80 | 0c 1f 77 fa 46 a9 9d c9 0d f6 84 3d b7 03 9e fa | 58 be 5a 4e 84 f9 db ea 37 27 1e 20 1a 6d 70 a9 | 48 8d a5 77 92 42 17 cb 45 b8 22 eb 9d 91 c6 90 | e3 e5 f3 a4 52 f9 ea e1 ca a2 a3 45 53 91 dc 5f | 97 6f 49 81 28 51 8e dc 29 b1 94 f1 3b a3 22 d7 | 94 cf 3a 4b 92 c4 95 64 a5 39 a2 3f 8c 62 a2 f6 | c1 95 97 06 70 da 53 50 e5 31 15 be f9 f5 d7 98 | 29 00 00 24 f6 15 1a 90 c8 9a 0e fb 04 05 1c c3 | 59 55 fa d7 2d f2 b7 dc b4 87 c3 61 27 da cc e0 | 74 b4 47 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee f8 1c 9f 4c fe 24 8c 43 92 80 29 | 12 02 33 5d 78 63 e2 5e 00 00 00 1c 00 00 40 05 | 82 23 9a b6 38 a9 7d af e0 d8 2e 1b 87 38 33 1a | f5 86 95 cf | libevent_free: release ptr-libevent@0x7fb370035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #272 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a3a590 | handling event EVENT_RETRANSMIT for parent state #471 | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #471 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #471 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49682.548377; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499585 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #471 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 "road-eastnet-nonat-219" #471: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #471) | 38 56 99 f6 a3 bb 25 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 88 5e 08 51 b9 62 c5 b6 68 5e 2f 6f 4f 31 ca 1e | 08 9e a2 c5 9c dd 5f fc 7a f4 89 f0 0b b5 e1 ae | ce aa 45 81 2c 95 5e ff 06 f3 6a c5 72 bf d7 48 | 2c ca 52 8b db 25 1b 5b 4e e1 9e 45 05 12 f0 3a | 8b 49 b1 e8 0f d0 bb 39 6c 00 4b 10 55 55 90 f1 | ba 94 0f e8 29 de 7e 8e 75 cf 84 46 0b 85 26 8f | fc de 6b 35 43 a0 ca 14 c9 c0 f7 23 df 3f 39 44 | 98 32 71 b3 fb 93 e6 df 1c 43 a2 c9 a0 c6 73 b4 | d7 9f 3f a9 0b f8 14 fb 29 eb 8f cf f7 a9 d2 3c | 3d 58 a0 39 7e fa 25 48 bc 4b 7f d7 1d e0 11 34 | f6 bf 55 8d 59 da 29 ac d8 c5 88 7a 76 ef 08 52 | 7c ac 5e 47 31 67 af 77 3e 74 07 65 f0 71 26 28 | 79 4d a8 21 1c fb 74 e9 6b f8 d5 df d3 80 71 f9 | 81 36 25 59 61 8d e4 66 0e 09 70 cd be 73 f3 c8 | c4 06 a2 0f 1e 6d 0f ec 2b 18 85 83 48 df f6 99 | 6d 3a 12 52 38 a5 9e 5e 41 a3 52 37 e7 64 a4 6a | 29 00 00 24 92 4d df ea 0a bb c1 4f 13 fb 92 4b | 10 dc b9 f4 e6 b4 8b 01 64 45 6e db 5a 13 b9 8e | 86 b6 57 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 76 c9 73 0c 16 7b 39 f7 77 ab 9f | f0 85 70 80 7e c2 64 d2 00 00 00 1c 00 00 40 05 | 35 b3 a5 34 11 ae 1a 69 08 cc 74 f0 71 15 8c b8 | eb 5a 8d 90 | libevent_free: release ptr-libevent@0x7fb344046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3a590 | #471 spent 0.0721 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff cb fd 37 8d 6e 61 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #272 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #272 | rejected packet: | ff cb fd 37 8d 6e 61 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #272: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 56 99 f6 a3 bb 25 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #471 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #471 | rejected packet: | 38 56 99 f6 a3 bb 25 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #471: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.038 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #467 | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #467 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #467 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49682.563936; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002013 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #467 | libevent_malloc: new ptr-libevent@0x7fb344046040 size 128 "road-eastnet-nonat-215" #467: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #467) | be 07 ac 9a b2 b5 64 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 4e 05 41 e0 9c 82 57 92 0a 9a c0 ac b7 0e 16 | 8f cf 40 f2 c1 21 c6 0e 53 7f 71 9b 23 53 ab 32 | ef 64 72 bf 1c eb 94 98 29 9f 35 3d 25 d3 1c 5f | e7 9d 00 19 e2 0a 16 20 a6 ea 3a 6d 7b 32 8e 93 | 96 ee 8d 09 fc 5d f8 27 b9 ca 49 09 65 ce cf 30 | 67 2e f4 4f 3d ad 29 2d 5a 4c 68 40 7f 94 6f ad | f5 98 12 1b 59 74 90 02 ab ae 6a 47 c6 cb f0 fe | 1e 5f 8d 21 2a 5d 11 fe 17 3b 75 9d 65 5c 76 a0 | e4 ca 7c e0 c8 8a 37 49 e6 36 2e 9d 9d 6c be 13 | f2 87 dd 81 d0 10 4c ee c7 ac d9 53 97 d2 c8 92 | 06 a5 e1 c9 c7 93 30 ee d6 3d ac 47 98 50 1f 6d | d0 3a db 8b df 20 7f 6b 55 4b d3 fe b0 df 95 14 | 4e 40 f5 72 7e 0c bb 04 da d9 d2 07 87 d2 e0 72 | 1c 20 5b 2d c2 5e 0e 89 32 b0 a4 ac ae 09 91 0a | ac c6 1c cc d1 3b 35 35 b5 b5 4c 01 ce b4 2e ea | cd 79 86 98 20 31 06 5b 6a 88 36 07 19 32 e2 40 | 29 00 00 24 65 a2 6f 51 03 e0 c3 95 a1 17 d9 10 | 35 d2 c8 05 2a 6d 6f d8 b4 c3 4c 08 92 7c 46 6b | 3f 11 55 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 95 f5 c4 0f 53 2d de 04 94 5d f4 | 44 07 bd 21 62 32 e6 d2 00 00 00 1c 00 00 40 05 | d8 32 98 63 8b 4a fe f1 1f e4 de 6d 0f 9b fc 4d | cc 8b 9a c1 | libevent_free: release ptr-libevent@0x7fb36403f0c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | #467 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be 07 ac 9a b2 b5 64 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #467 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #467 | rejected packet: | be 07 ac 9a b2 b5 64 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #467: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0516 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374023ce0 | handling event EVENT_RETRANSMIT for parent state #457 | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #457 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #457 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49682.565204; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003515 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #457 | libevent_malloc: new ptr-libevent@0x7fb36403f0c0 size 128 "road-eastnet-nonat-205" #457: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #457) | 3d e3 b8 80 8f bd c5 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 7a cc 82 1e 2d 53 a5 ce 9e 27 c2 26 66 c5 e9 | ca b7 3b d7 b3 d5 8f c0 1e ac 61 93 25 30 44 75 | 16 7f 86 32 17 98 9b b2 bd a4 40 62 a6 0f f6 2b | b1 e8 33 29 3f 84 59 09 aa bb 5e 2f cd e9 1a 72 | c5 38 7c e2 59 e4 bc cf cc fa da 23 96 75 c1 c7 | ad fb a2 86 e8 bf a6 3f 1e fe 2b 41 b8 4f 8a 8f | fc 26 0a 24 5a dd 02 29 13 7a b7 2d e7 62 32 f3 | 6a 17 ae ce 85 51 34 8a 1c 60 c5 a3 0d 63 33 17 | b8 03 02 91 41 6c de d7 2a b4 05 f1 63 80 c5 fa | a4 93 75 6c e4 d1 6b 22 4b c0 ed 28 67 a9 70 75 | f9 13 92 e4 11 7c 99 29 38 c0 6b 83 36 d2 38 17 | 99 86 23 65 2a c3 af 64 bb 12 ca 10 15 c7 5a 01 | e6 2f f0 2b 77 e0 ac b3 ec 7b 00 6e 19 4c 17 4e | c2 c8 73 f2 63 d0 16 98 d3 38 a7 f8 87 36 2b 60 | fd b1 1f f7 a9 42 1c 9e d6 33 ef 51 73 04 4f 2e | c1 59 d4 cb eb 88 5a 87 9b 61 94 46 2e b3 5e 3c | 29 00 00 24 bf 42 01 47 80 24 bc 54 c5 78 43 68 | 88 cb 29 3a 9a 04 f3 2d 0c c7 ac f0 bd ad b4 35 | ec c6 0a 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 d2 27 5a 8f 21 c7 36 56 bd fb 12 | 29 e7 69 7f 19 4f 04 f7 00 00 00 1c 00 00 40 05 | 06 c5 63 f1 7d e9 6e 2f 88 1f 75 73 67 c0 d5 c5 | dc d6 be 87 | libevent_free: release ptr-libevent@0x7fb37401f6b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374023ce0 | #457 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #378 | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #378 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #378 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49682.565319; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004716 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374023ce0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #378 | libevent_malloc: new ptr-libevent@0x7fb37401f6b0 size 128 "road-eastnet-nonat-126" #378: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #378) | 92 97 bf d9 57 64 2b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 7e 95 c3 59 64 68 1e dc 08 f2 0b df c0 d3 85 | e4 57 68 76 f4 90 dc 14 fc b4 13 07 10 44 a8 8d | 11 66 84 12 ea 03 ab ca df 00 f5 13 ba 15 16 97 | c3 ae f2 09 b4 c2 1e 65 f4 d4 ef 76 85 ff a3 4a | ac ec 61 57 66 09 9f 4c b2 b0 4b 1a 98 fe 62 e6 | 55 f4 45 b9 db aa 2b bf cb d7 f6 c7 03 42 ad 34 | c6 d8 65 c8 40 fd 09 2c 94 7c 3b f3 2f 0a 0e 1d | 89 ee 1f 04 2f 4d 06 ee d1 19 c4 2e 99 32 3d c2 | d8 62 64 5d 3c 19 32 29 e6 a4 d4 41 97 46 6e 74 | 98 69 50 bd e9 22 20 c8 a0 94 d0 e1 2c ac e0 d4 | 3d 6d 89 f8 65 d2 f8 6c 5d 07 8b 5f be 6f 9f a2 | e3 9a 7d 49 fc a1 b3 f5 34 84 25 08 1b bf 82 69 | 97 0b c6 17 ae 91 38 6f 37 30 af 60 73 cd d7 76 | 1c 53 8a ed 55 8d 3b a6 b0 09 19 d4 bd 91 ad 63 | d2 44 97 69 9c 25 f2 23 5f d4 fb c5 78 47 07 23 | 75 fb 33 32 09 b8 13 e4 4b fc ad 29 45 c0 60 e8 | 29 00 00 24 45 ad fc 22 10 a1 61 46 e5 0c 1e 06 | 27 43 7b e2 4e f3 c7 89 82 92 48 5f 08 ae ee 54 | 20 02 7f 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb d4 ce a5 02 7b 5e 75 a8 72 0f 9e | 6c 02 05 b4 a6 0e 08 51 00 00 00 1c 00 00 40 05 | 67 63 47 aa c8 01 74 31 fc 9f e6 c6 9d 96 80 21 | f6 7a 37 28 | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #378 spent 0.081 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d e3 b8 80 8f bd c5 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #457 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #457 | rejected packet: | 3d e3 b8 80 8f bd c5 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #457: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.048 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 97 bf d9 57 64 2b d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #378 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #378 | rejected packet: | 92 97 bf d9 57 64 2b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #378: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #436 | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #436 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #436 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49682.593658; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004854 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #436 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 "road-eastnet-nonat-184" #436: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #436) | cc d9 b7 db 44 05 84 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 3c 80 f9 ec ce 19 79 1b 2a 4e 88 36 86 a9 d8 | 85 e2 ee 1a ce 49 16 7b 84 5e 31 fc e1 84 f2 62 | 83 ed 4d eb 9f 6a c2 85 84 04 f4 d9 bd aa ee 02 | 08 1b 87 fa b5 ac ff f6 a9 3e 63 6d 16 01 77 f5 | 2b 3e 1b 6e c7 66 ff fb 38 8c 19 c9 7b b1 fe 10 | bc 5c c8 26 33 9f ff 45 76 a0 23 85 19 e3 31 de | 28 8c dd 45 56 45 3b fb b4 0d 18 e3 cd 81 8e 00 | 0b f6 17 10 a2 e0 44 20 37 74 e1 31 a8 10 b7 14 | cf 9a 72 a5 9f 1a 4b 15 1a b2 c9 bb 99 44 1e 31 | 11 05 e2 cf 98 40 c9 ef aa 8c fe 19 58 f6 d5 62 | cf d6 d5 ea 4e 24 4c 33 16 1d 0c db 05 43 98 5e | d3 1a 94 c0 4b ed 3c 02 54 4b fc ca 99 42 ac 4b | fc 8a 3c 6f 70 38 23 05 eb da 77 20 a0 4e 73 f3 | af d2 c3 64 0d 77 b8 54 17 69 4d 1e a8 53 83 4b | 8b 72 92 0a 4d 90 87 b2 56 ec 43 2c 41 d7 64 66 | 71 79 54 ef 65 56 ba 6d 1d e6 d1 dc ad 99 41 fe | 29 00 00 24 a3 ee 0b 44 35 bf 27 26 10 74 6f 1a | d2 86 21 80 e6 fa 2e 6d 1e 83 9b 58 c8 96 87 8e | e4 1b 77 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 51 98 88 78 46 d0 e6 54 3d 62 ae | 5f a3 54 6d d3 39 61 c5 00 00 00 1c 00 00 40 05 | f1 9f 10 2a 1c da 5a 4c b5 8c 1e 6e 78 d5 be 31 | 9e a0 0c c1 | libevent_free: release ptr-libevent@0x7fb34800f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #436 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc d9 b7 db 44 05 84 19 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #436 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #436 | rejected packet: | cc d9 b7 db 44 05 84 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #436: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.073 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3940 | handling event EVENT_RETRANSMIT for parent state #224 | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #224 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #224 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49682.621042; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006669 exceeds limit? YES "road-eastnet-nonat-224" #224: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-224" #224: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #476 at 0x557d46b04780 | State DB: adding IKEv2 state #476 in UNDEFINED | pstats #476 ikev2.ike started | Message ID: init #476: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #476: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #476; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-224" #476: initiating v2 parent SA to replace #224 | using existing local IKE proposals for connection road-eastnet-nonat-224 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 476 for state #476 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34400d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #476 | libevent_malloc: new ptr-libevent@0x7fb34800f1a0 size 128 | crypto helper 7 resuming | #476 spent 0.0828 milliseconds in ikev2_parent_outI1() | crypto helper 7 starting work-order 476 for state #476 | RESET processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 476 | start processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #224 ikev2.ike failed too-many-retransmits | pstats #224 ikev2.ike deleted too-many-retransmits | #224 spent 2.64 milliseconds in total | [RE]START processing: state #224 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-224" #224: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #224: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #224 "road-eastnet-nonat-224" #224: deleting IKE SA for connection 'road-eastnet-nonat-224' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-224' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-224 | State DB: deleting IKEv2 state #224 in PARENT_I1 | parent state #224: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #224 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb358035930 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 476 time elapsed 0.000552 seconds | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3940 | (#476) spent 0.561 milliseconds in crypto helper computing work-order 476: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 476 for state #476 to event queue | in statetime_stop() and could not find #224 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #476 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7fb348034680 size 128 Initiating connection road-eastnet-nonat-224 which received a Delete/Notify but must remain up per local policy | crypto helper 7 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-224" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-224' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-224" | stop processing: connection "road-eastnet-nonat-224" (in initiate_a_connection() at initiate.c:349) | spent 0.0637 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #476 | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 476 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #476 | **emit ISAKMP Message: | initiator cookie: | 49 8c 7a 08 2e cc 2c 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-224 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4a 8e 65 66 a1 7b b1 8a 9d 19 04 71 0a 79 27 ce | ikev2 g^x 6b 54 47 32 ba 6e a8 65 c3 0d 42 b2 0f 96 a2 a0 | ikev2 g^x 61 e2 94 05 83 68 df 22 7a 41 44 d2 4f e1 67 a1 | ikev2 g^x 60 b4 59 da 81 10 89 57 9a 5f 7b e1 cb f8 3b 1c | ikev2 g^x 6b e5 1e 2a 7e 02 80 cb 9a b1 16 8c f4 74 52 c7 | ikev2 g^x 1b 8b b0 44 c6 c4 32 f3 a4 5d f0 73 3e b1 fa a1 | ikev2 g^x b2 71 e4 e2 5a 6e 52 66 e3 b8 09 2b 71 a1 10 d1 | ikev2 g^x 10 3c 31 b6 a5 93 a0 0f f1 c2 e3 a3 6b 1d 4a 8c | ikev2 g^x d0 ba 9f ac 0a e4 67 88 a7 bb ab 52 59 75 2a f3 | ikev2 g^x 7e 3d 81 45 67 16 9e 61 0a ee 09 44 27 d0 34 eb | ikev2 g^x a1 e6 bf 3e 15 23 17 f4 a9 f6 b0 c4 cb fa e4 c1 | ikev2 g^x c5 79 db 37 a8 57 54 eb d1 68 1c ef 18 56 41 83 | ikev2 g^x e2 52 4d 7d eb e3 4a db 5d d0 82 39 0c 54 56 aa | ikev2 g^x 04 9a 1e d5 4b e1 50 f6 49 eb 07 2f b8 68 4b 6e | ikev2 g^x ca 4e 01 63 ab c2 da 21 fb e2 14 e9 0d 0e ff 26 | ikev2 g^x 78 8b ff 8b 3a 63 7f c4 a4 eb a1 d4 bb 4b 60 67 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 04 bd 81 be 7c f6 28 8b 7d 46 a5 cd 03 dc d6 e4 | IKEv2 nonce 08 bf 60 ad d1 ef ac 3f a3 21 88 37 52 bb 5d 17 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 49 8c 7a 08 2e cc 2c 75 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e0 | natd_hash: port= 01 f4 | natd_hash: hash= a6 ab 9f 05 ae 62 3b 7f e7 ce 4f 13 2e 4b 82 3c | natd_hash: hash= e1 44 b7 89 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a6 ab 9f 05 ae 62 3b 7f e7 ce 4f 13 2e 4b 82 3c | Notify data e1 44 b7 89 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 49 8c 7a 08 2e cc 2c 75 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f1 c5 d9 81 d6 d6 94 d2 dd 0e e2 5d 61 59 c7 43 | natd_hash: hash= 61 40 b6 b1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f1 c5 d9 81 d6 d6 94 d2 dd 0e e2 5d 61 59 c7 43 | Notify data 61 40 b6 b1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #476 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #476: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #476 to 4294967295 after switching state | Message ID: IKE #476 skipping update_recv as MD is fake | Message ID: sent #476 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-224" #476: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.224:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #476) | 49 8c 7a 08 2e cc 2c 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 8e 65 66 a1 7b b1 8a 9d 19 04 71 0a 79 27 ce | 6b 54 47 32 ba 6e a8 65 c3 0d 42 b2 0f 96 a2 a0 | 61 e2 94 05 83 68 df 22 7a 41 44 d2 4f e1 67 a1 | 60 b4 59 da 81 10 89 57 9a 5f 7b e1 cb f8 3b 1c | 6b e5 1e 2a 7e 02 80 cb 9a b1 16 8c f4 74 52 c7 | 1b 8b b0 44 c6 c4 32 f3 a4 5d f0 73 3e b1 fa a1 | b2 71 e4 e2 5a 6e 52 66 e3 b8 09 2b 71 a1 10 d1 | 10 3c 31 b6 a5 93 a0 0f f1 c2 e3 a3 6b 1d 4a 8c | d0 ba 9f ac 0a e4 67 88 a7 bb ab 52 59 75 2a f3 | 7e 3d 81 45 67 16 9e 61 0a ee 09 44 27 d0 34 eb | a1 e6 bf 3e 15 23 17 f4 a9 f6 b0 c4 cb fa e4 c1 | c5 79 db 37 a8 57 54 eb d1 68 1c ef 18 56 41 83 | e2 52 4d 7d eb e3 4a db 5d d0 82 39 0c 54 56 aa | 04 9a 1e d5 4b e1 50 f6 49 eb 07 2f b8 68 4b 6e | ca 4e 01 63 ab c2 da 21 fb e2 14 e9 0d 0e ff 26 | 78 8b ff 8b 3a 63 7f c4 a4 eb a1 d4 bb 4b 60 67 | 29 00 00 24 04 bd 81 be 7c f6 28 8b 7d 46 a5 cd | 03 dc d6 e4 08 bf 60 ad d1 ef ac 3f a3 21 88 37 | 52 bb 5d 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 ab 9f 05 ae 62 3b 7f e7 ce 4f 13 | 2e 4b 82 3c e1 44 b7 89 00 00 00 1c 00 00 40 05 | f1 c5 d9 81 d6 d6 94 d2 dd 0e e2 5d 61 59 c7 43 | 61 40 b6 b1 | state #476 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34800f1a0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34400d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3940 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #476 | libevent_malloc: new ptr-libevent@0x7fb358035930 size 128 | #476 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49682.622218 | resume sending helper answer for #476 suppresed complete_v2_state_transition() and stole MD | #476 spent 0.345 milliseconds in resume sending helper answer | stop processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb348034680 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 8c 7a 08 2e cc 2c 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #476 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #476 | rejected packet: | 49 8c 7a 08 2e cc 2c 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e0 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #476: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24680 | handling event EVENT_RETRANSMIT for parent state #472 | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #472 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #472 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49682.650415; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50025 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348012630 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #472 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 "road-eastnet-nonat-220" #472: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #472) | 15 62 43 a0 4c 6d db c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 ef 66 93 1f d2 be 3f b4 cb c3 5b c3 cd ce ec | ef 45 09 15 86 85 a5 fc 63 a8 dc f9 dc 2c 7f da | ad 3c 83 29 23 b1 9e ba fe be f5 05 08 e8 8e 73 | c4 15 c3 1f 80 d3 d0 b8 24 be b3 4f dc ef b0 39 | e8 6c 73 46 ce 8d ab 67 58 96 e6 89 9c 38 0e cb | 1f b3 47 af cd e8 fe 49 e5 c0 25 80 77 35 f6 06 | 6d dc 03 76 f8 34 b8 8e 05 e2 62 37 7a 40 b0 47 | 1d 8d 55 22 fa 66 04 34 43 30 87 8a 3b 8d 56 07 | f3 21 a4 25 01 21 d4 52 d3 44 c4 73 d4 a8 a2 ea | 69 66 8c 26 ab 85 7b a0 65 5b 03 5d 74 e7 7a 63 | 38 e1 5f b3 a4 83 48 11 76 d7 fb 96 bd 94 81 0e | 12 85 94 cb 17 1c 9e 64 a5 e2 b4 c7 96 eb cd 62 | bb 15 1b 96 a4 fb c3 a8 a0 ae 37 79 52 a4 ec 21 | 73 e0 47 a7 95 56 ce d5 cc 94 10 bf a2 8a 93 dc | 7f ea 6c d5 98 4b fa 19 3a ac 5e 1f 78 6e 08 fc | fa 46 b2 55 22 d7 78 a7 75 be f4 63 29 44 fa cb | 29 00 00 24 19 33 9e e6 d2 ec 99 b2 2a d6 00 cf | c3 4d d5 a5 cb 9d 67 f4 f2 94 3f b0 a2 94 a8 ff | 01 8e 5d 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 f6 a8 c3 12 9d 73 0e 92 1b 13 62 | b1 83 e3 04 e0 b3 2c 1d 00 00 00 1c 00 00 40 05 | c3 d5 bb 6d 6e 36 db ca 5f b7 b2 05 dd 15 c3 8f | 20 6a e3 5f | libevent_free: release ptr-libevent@0x7fb388032bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24680 | #472 spent 0.206 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 62 43 a0 4c 6d db c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #472 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #472 | rejected packet: | 15 62 43 a0 4c 6d db c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #472: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0889 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34001fa80 | handling event EVENT_RETRANSMIT for parent state #437 | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #437 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #437 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49682.660858; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003132 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24680 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #437 | libevent_malloc: new ptr-libevent@0x7fb388032bf0 size 128 "road-eastnet-nonat-185" #437: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #437) | 31 51 d4 f7 c8 fe c5 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d 4d c3 c5 4f ca 6c d8 d4 84 06 d4 ea 89 80 6d | 99 d1 7f e1 cb 80 24 55 fd df 90 fb 02 92 ff c9 | f0 47 14 8d 77 1a bb 9c 7c dd 17 b9 16 19 6b 74 | ec 88 72 db 3e 1a c4 54 69 dd d8 16 b9 56 68 f6 | 6a 0a 44 9f 3f b5 a3 4b 08 8a 18 15 d1 69 95 71 | d9 52 3a e9 65 ee 70 4d ea 9c f5 16 84 a6 99 9c | ab ff 36 83 9d b6 9f c3 53 f1 00 51 ea c6 f5 a2 | 5c ce 33 c2 cf de 1d c7 31 1f d6 91 bf f2 7f 9f | fc 6e d8 c8 43 fd a2 ec ed d4 2e e3 1a 35 b1 d0 | de 28 47 6a 6b a3 42 0c 4a 1a 4e 13 17 87 94 71 | f7 93 75 92 ea b9 03 fc c2 41 93 f1 c9 f7 b4 4d | 3c f1 35 28 f5 5e 37 14 cf 3e ce 38 da e2 53 26 | df e6 e9 23 b5 8c b6 45 18 8f e2 54 89 f9 96 79 | aa 6a 79 aa cf b4 ec 3d e4 21 6c a5 14 2c 68 b2 | 1b 56 0e 23 e2 48 c6 68 81 fb b5 23 23 53 e6 4a | 1c 61 e2 7a 67 e5 f5 84 ba 68 ce a3 e9 a9 c8 e3 | 29 00 00 24 02 5e bf 69 6a 09 af cb c5 28 ba 2f | be c6 fe 19 42 f8 ee f5 0b 73 06 5b 41 10 d0 e5 | 69 e3 64 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 6b 27 8e 3d c1 6d e7 fb 64 0d 99 | 79 35 e1 df 31 89 9b 32 00 00 00 1c 00 00 40 05 | dc 48 f6 93 16 4d 8a fc 81 8e 30 65 58 3a 8c 28 | 32 6e e0 6b | libevent_free: release ptr-libevent@0x7fb3400343b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34001fa80 | #437 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 31 51 d4 f7 c8 fe c5 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #437 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #437 | rejected packet: | 31 51 d4 f7 c8 fe c5 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #437: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0818 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #468 | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #468 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #468 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49682.662179; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002326 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34001fa80 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #468 | libevent_malloc: new ptr-libevent@0x7fb3400343b0 size 128 "road-eastnet-nonat-216" #468: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #468) | 7d 98 8a 9d 47 30 f3 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 4d 82 7b ce 67 f5 e3 c7 ef 1e 88 97 12 6b 1f | 83 b8 f4 6b 5d e2 86 e0 e9 f2 9b 39 cc 52 e7 74 | 42 1d 82 da 97 54 f4 cf 8c bb 44 74 5b 79 77 99 | b7 64 d2 5d 6f 79 ec 9a 9b f2 ae b8 84 7a 6f f8 | bd c4 91 ab 33 ef 63 16 a0 41 ba 3f f0 a6 76 33 | 99 9d 4e fa 10 3d a9 b0 fd 9d 95 6a 6d e1 64 80 | d6 f4 63 87 42 a4 40 d5 c9 d1 7b e6 b6 16 87 12 | 6b a3 97 13 be 62 fd d1 99 d3 9b d9 d0 66 91 ae | 70 9a 30 e7 e3 dd b0 da 82 fe e4 f0 44 cc b3 94 | 0b 57 c5 e6 97 4b 2c 01 fc cf bd 64 1e a3 1b 36 | a4 86 4a 71 7a 5d 83 15 27 9a 5b c7 b1 4b fa cd | 49 2c bf cb fb 1f 32 58 4d 30 7f 18 2a 34 d2 95 | e4 1f 33 09 6a df d3 45 5e 2c d0 94 30 dc 69 26 | e1 ac dd 8a 80 89 5d 10 3f 35 db e7 62 f2 ea e4 | 46 d5 0d ed 2d ad c4 c0 e6 d7 96 39 cc 2d f8 c8 | 62 6c cf 39 6f 6d 88 19 5a ed 59 0b b3 2a c0 06 | 29 00 00 24 92 6b ec 6b 64 1a 9e 4e ed 8a 02 4d | da d7 da b0 19 37 ca 67 a4 74 bd db b5 b1 e8 9c | 42 18 dc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f 7e f5 e7 e8 50 e9 16 af a5 e6 5b | b1 d0 cb b5 42 f7 79 13 00 00 00 1c 00 00 40 05 | f3 f2 fc c6 17 9d d4 89 d0 fb 82 c7 ed b0 98 6a | 20 f1 09 0b | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #468 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a1da10 | handling event EVENT_RETRANSMIT for parent state #458 | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #458 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #458 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49682.662315; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003605 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #458 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 "road-eastnet-nonat-206" #458: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #458) | d8 20 9c 76 6a 13 05 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 f8 70 4a 7e 5c d3 77 41 08 04 2a 79 b8 78 55 | 9f 63 d7 1f d9 bd 04 73 e8 de 1f e6 51 71 d1 c1 | 71 09 97 4a 5c 16 68 a0 aa 69 e9 b4 93 ac ba f6 | 92 85 87 a8 c8 1f 88 3f 36 bb 45 8a 62 53 f9 71 | 32 e3 0c 69 bc 64 74 29 df 76 29 f7 54 0a d6 9e | bf f9 de ca 92 41 8b 95 09 7a 0d 5d 50 17 4e 54 | 40 99 d8 f9 ca e7 ca c6 0c af 31 22 59 39 c6 0f | c7 31 f1 5e c9 b0 5a 0c c9 3f c9 f9 d7 bd 4f d2 | fd 98 c7 19 a0 f3 e9 01 16 f3 fe 75 35 59 15 08 | 13 ea cd 50 33 e8 15 ab 01 f5 9e c1 43 d2 27 90 | 39 d5 e2 89 77 57 ec 66 ab 2d 6c 09 fc 1d 8f 1a | 62 91 d6 59 58 86 af 9e fa f2 4d 80 b6 39 ef 93 | e4 aa 9e 6f 49 aa 2c d4 54 59 f2 01 66 25 3e 6c | 9e 0b 06 28 b9 af 2e bd e7 a4 57 6f f0 5b 4c cd | 6a 03 04 af 85 10 e3 f2 17 ad 37 f3 24 3e 66 fb | 27 c7 a1 c5 2e 32 66 c3 94 bc a6 2b 60 cb 4f f9 | 29 00 00 24 33 eb be f2 9e 94 9d 08 4c d8 00 c2 | f8 2c a4 ef 00 e3 f7 7a 62 72 9a 99 65 d6 f3 0e | ff c8 b6 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 01 77 97 bc 56 25 23 ed d6 15 51 | 7d a3 3f e8 c0 74 6b cf 00 00 00 1c 00 00 40 05 | 8f 1b 57 d9 1a 63 f1 b3 99 7b 22 3d 44 e6 21 51 | 1c 41 cc 24 | libevent_free: release ptr-libevent@0x7fb36803f270 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1da10 | #458 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a4bfd0 | handling event EVENT_RETRANSMIT for parent state #273 | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #273 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #273 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49682.662447; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007492 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1da10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #273 | libevent_malloc: new ptr-libevent@0x7fb36803f270 size 128 "road-eastnet-nonat-21" #273: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #273) | ed 1f ad f4 73 76 3f ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad fb 2c d6 61 18 78 ff ff 9e ac 8e 11 6e 5b 0a | 17 90 d5 cd a5 72 c6 44 33 06 36 88 ef 85 f7 fd | d1 32 bf e5 b4 df 1c 2a 44 4b 64 5a 5c fa a6 e7 | a7 88 cd 98 18 db 83 1c de 12 34 1a 01 c0 6e 90 | b0 37 b6 8e 3f bc 29 ae 17 56 d9 4e 3e aa f9 1a | 05 22 37 90 a3 98 0c 9d fd 31 f5 89 2b 79 38 70 | a3 3c e3 a6 be b6 20 06 92 92 77 84 f9 e1 f6 43 | 50 c4 75 3f ce 2c 7f a3 83 07 1e 29 12 48 86 d5 | b6 e2 61 df c8 2b 9c ea 45 c9 6b 62 38 f9 06 23 | 9b a2 90 c4 51 19 47 e4 c9 9e bb 38 c5 ea 4c 2c | 24 15 a0 60 6e 12 c1 7a cd 75 9f 6a 97 65 4f 9f | 6f aa 7c 8b b3 99 29 be 41 56 ad 5d 52 77 c8 87 | f1 18 76 ec 44 be fb bf 14 5e 22 ec 7b 78 cb 22 | 16 62 54 b4 5f 5e ed e0 38 14 64 69 82 ec fb 0f | 84 be 3a 69 27 17 b5 b0 42 81 a7 3b e2 19 f7 47 | ac 1d 3d ca 8c d0 ae cf 0d f7 a8 a2 36 9e 94 83 | 29 00 00 24 a4 16 d5 7c 26 cc bd 52 fc 33 91 77 | f2 08 cb df 04 12 5c f5 f3 31 f7 87 08 22 5b ef | 2b 8c 5b 44 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 3d 78 9d 41 51 b9 57 ea 0d 4a 5f | 38 c6 cb 30 ec f2 21 4b 00 00 00 1c 00 00 40 05 | bd ec 33 2a 1b 35 fa ad 7a ef 73 f7 d9 b0 09 33 | b4 e9 3f 2e | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4bfd0 | #273 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a70b10 | handling event EVENT_RETRANSMIT for parent state #379 | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #379 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #379 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49682.662579; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004444 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4bfd0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #379 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 "road-eastnet-nonat-127" #379: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #379) | ac d4 3b e7 18 ea 52 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 79 a1 28 22 6c 83 3f 06 54 d9 39 13 0e d2 1a | 91 c2 ca c5 f2 c4 4e d5 78 8f 04 34 b9 34 73 b2 | 0e 75 71 ec 03 a6 5b c6 fa 6d a8 f4 41 1e af 26 | a4 e1 0a 58 77 48 aa f7 f9 4b 31 cf 6b f4 65 97 | 07 66 c4 32 08 bd d1 a1 48 aa 20 4b 65 4e 17 6e | 1d 1d 3e be b4 1e 7a 49 6a 64 0a fb 44 89 ba 45 | 90 86 8a 0e 4e 08 c0 05 da d1 a0 ff 5a ee c2 33 | ff d9 1a 6f ee 08 fd 7e aa 64 53 f4 84 74 c5 cf | 19 1a 29 d4 bf 47 bd 52 17 99 38 57 75 f7 85 58 | a7 b0 c8 4e e1 95 2d 4b f1 9c 5e eb 85 14 0d 87 | ff dd 17 9a ad 51 c0 99 e2 a6 60 c5 a5 7e 68 46 | b9 5c 04 3b 76 a0 9e 3d f7 9a 42 72 b5 92 be a4 | 61 c4 dd 5e a0 a3 58 05 90 20 32 7d b8 9d ca 34 | 36 d3 6d 56 98 49 60 97 da 87 f8 14 51 ea cf 16 | 79 9b 7d e5 00 7a 74 76 25 99 77 5a ef df a7 1c | e5 07 de ab dc 8b 19 85 17 de fd 62 d8 d6 3b b0 | 29 00 00 24 7a e9 60 d7 4c 8b 32 bf 82 0a a8 9a | c0 af 7e 52 e6 dc b9 f1 3b fb 0d 8e 4f c7 9d 86 | 5c d7 7a af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b e2 54 69 3e 49 d9 e9 7b 2c 62 f7 | a1 9b 3b a0 68 bf 42 11 00 00 00 1c 00 00 40 05 | 0c ab 0f ab 0f 86 37 d7 85 f7 e9 a7 f4 f2 01 1e | 28 ca 40 2a | libevent_free: release ptr-libevent@0x7fb34c034410 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b10 | #379 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 98 8a 9d 47 30 f3 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #468 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #468 | rejected packet: | 7d 98 8a 9d 47 30 f3 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #468: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 20 9c 76 6a 13 05 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #458 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #458 | rejected packet: | d8 20 9c 76 6a 13 05 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #458: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 1f ad f4 73 76 3f ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #273 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #273 | rejected packet: | ed 1f ad f4 73 76 3f ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #273: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac d4 3b e7 18 ea 52 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #379 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #379 | rejected packet: | ac d4 3b e7 18 ea 52 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #379: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0694 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c00cfd0 | handling event EVENT_RETRANSMIT for parent state #438 | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #438 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #438 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49682.745126; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004733 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #438 | libevent_malloc: new ptr-libevent@0x7fb34c034410 size 128 "road-eastnet-nonat-186" #438: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #438) | 41 3e 80 fb 50 ac d5 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 f5 0a 72 18 b4 76 75 f6 01 ed 57 e5 f7 fc 77 | 49 c0 b9 2a a0 da 30 6d 64 aa a5 e7 d9 21 f7 0d | 91 be 59 58 e0 73 bb 49 e3 e7 3d e2 78 8a 04 ac | e2 97 a4 99 a2 30 e0 4b a8 00 c0 ee 42 04 60 c2 | 77 26 36 9f ca 4c 02 7c fe 9f ae b6 ae 04 ad 9a | 8f d0 27 5f 92 70 2c be 09 55 2c 26 bd b6 4c 20 | bf 73 30 d0 44 67 97 1f 1b 2e b0 03 d6 27 ac d2 | 9a 9e e4 f7 c7 3b 09 97 22 3c 54 79 43 94 36 23 | 17 e9 e5 03 2b e9 58 e3 73 9f 26 68 9a d9 44 87 | db f9 8f 3e f3 46 76 36 18 c6 80 3a ce aa cb fb | 5f dd ff d6 eb 23 75 c4 e2 35 1f 1d 81 9e 2a 45 | d7 f8 e7 91 af a5 b6 a5 46 57 1a 8c 96 c0 29 4e | 8e dc e8 e6 2d 92 82 6a 85 02 3a ad 02 27 a8 84 | 8c be 58 97 e6 a0 56 65 e3 b8 11 05 1f 19 4d bc | 68 44 f8 dd 63 ea 12 b6 6d 02 31 e2 3c 83 0c 90 | bb ff 2c 31 86 51 81 cf b9 63 dd 72 3b ea de db | 29 00 00 24 65 91 ed 0a d4 1d 29 43 43 2f 3a 60 | 71 14 cd 7a ee 7f 0c dc 85 e8 36 48 85 1d 6f 9b | 44 a1 8a 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 a7 76 d6 c0 45 d0 97 b1 a7 8c de | d2 b0 18 be bd b1 c7 45 00 00 00 1c 00 00 40 05 | 93 a1 f0 74 30 f5 50 67 ed 62 ea 87 43 47 97 7c | d7 55 2f e9 | libevent_free: release ptr-libevent@0x7fb36c0296b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00cfd0 | #438 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7fec0 | handling event EVENT_RETRANSMIT for parent state #274 | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #274 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #274 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49682.745262; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005057 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00cfd0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #274 | libevent_malloc: new ptr-libevent@0x7fb36c0296b0 size 128 "road-eastnet-nonat-22" #274: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #274) | 97 f1 23 53 d2 3b 4d 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 bf aa 44 4c 86 42 20 d8 9e 9a 10 8c 03 23 1c | 55 12 c5 05 17 54 35 db 09 ea 86 4f 1e 8f 7b 32 | 9a 2a b0 4c f2 e7 18 73 a1 a0 fd e2 40 07 2c 7c | b0 86 fe c9 c0 0a 24 ee 0b e2 8f 65 27 f4 ce d4 | 26 d0 8a 70 5c 4d 46 36 4c d7 e9 bc 9b 95 2b 48 | 94 a5 c8 98 b4 23 f8 e0 8f 7c 6d 1d 50 c7 fe 04 | 1c ce 6b 59 2b ed cf 4a 5b 4f 67 9e cc 11 c0 53 | 7c 50 d5 3e bd 07 f0 e3 56 2a 0b ae b3 c0 99 43 | bb 92 8e 39 19 7e 1e c2 71 84 a0 76 9a 0f 7a 85 | 50 cf 0d 7d 85 0a 08 cc ee a1 bd c3 88 dd 8a de | e2 9f 70 d5 bb 76 44 f0 e2 0f 12 4d ae 88 a5 a4 | 51 38 bf fa 0f 38 f4 4c bb e3 25 bf 62 88 5c 87 | e1 a2 de e1 56 a5 9f 6b ce 90 dc 86 6d 26 32 32 | 64 ae 0b ac fa 3a f6 9e fa 00 00 26 02 a9 70 2e | af 79 3d a8 07 0b 81 d4 53 f3 46 fc 05 11 f6 55 | 0d 1d 8f a8 e0 93 58 07 b0 a8 c9 54 c5 14 a2 da | 29 00 00 24 59 ef 9f ca 6d 42 ee 4c de 0a 4a 8e | ec df b4 6b 0d dd 66 fa b2 ad 6d 66 92 77 f9 cb | 4b 49 7a f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8d 80 80 1b 6e 73 7e e3 fb 20 6a a8 | f2 02 f1 bf e6 58 62 ac 00 00 00 1c 00 00 40 05 | 31 9f 40 90 8f 0e 1c 6e 4b 7e bf d8 97 47 82 19 | e1 cf 25 c8 | libevent_free: release ptr-libevent@0x7fb34402a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7fec0 | #274 spent 0.0707 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 3e 80 fb 50 ac d5 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #438 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #438 | rejected packet: | 41 3e 80 fb 50 ac d5 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #438: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 f1 23 53 d2 3b 4d 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #274 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #274 | rejected packet: | 97 f1 23 53 d2 3b 4d 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #274: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0376 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac7f80 | handling event EVENT_RETRANSMIT for parent state #473 | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #473 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #473 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49682.749567; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500719 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7fec0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #473 | libevent_malloc: new ptr-libevent@0x7fb34402a950 size 128 "road-eastnet-nonat-221" #473: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #473) | 78 01 12 66 35 d7 75 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 47 0f 4f 77 38 bb e7 c9 71 64 11 49 78 07 db | 61 1c cd 26 23 f1 f6 1d 25 30 16 ce 14 27 83 ce | 42 30 8f 08 74 8c 5a 73 8c d4 32 61 41 1b ee 9b | f9 31 2e 33 9d 12 db b8 cb 33 3f 38 d9 dd c3 f9 | 20 b6 40 e8 ca 08 02 ce df 71 6c f1 5d 52 08 e6 | 58 10 57 a2 32 8d ae 1d 5e 7d c4 ce e0 91 e8 67 | ef d4 89 2c c0 b5 6a 92 6e 51 6d 9b 9d 21 b2 11 | 63 ad d9 36 26 eb dc c5 60 5b ef 4a 3f 29 d2 75 | 9a 29 b2 ce 56 3f a4 11 28 44 4d 82 14 b3 ff 08 | f3 34 c5 89 41 5b 00 60 7c 63 69 55 27 25 23 fa | 32 38 62 77 fb 7a 33 df 62 71 61 b7 15 ec 0a 13 | 14 36 a9 93 fd 25 0e 0d b3 44 f4 62 07 ce 96 88 | f0 a4 9b c6 5b 9f 17 d2 94 b3 dd 9f 08 c2 33 c2 | 59 53 80 d3 e8 b8 bc 9f 9d b9 55 bf 1b b3 90 a8 | 46 84 0d b5 c1 2a b7 bd df e2 56 3f f0 a8 af c2 | b3 ab 6b 5f 0e ca 69 45 20 54 b6 94 83 c5 3d bb | 29 00 00 24 4a 32 17 be 17 e6 be 0c a5 f0 d0 1f | f3 82 ee d0 20 e4 2f 26 27 39 fc fe 8a c9 3a 42 | bb 40 ba 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 8a 84 70 d7 06 66 bf 35 02 d1 dc | b7 f5 da 2f 6f 36 dc 4c 00 00 00 1c 00 00 40 05 | 22 8e 50 95 0f 93 c8 cc 9c 03 8c bf 24 39 56 cd | 71 d7 b1 e2 | libevent_free: release ptr-libevent@0x7fb360035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac7f80 | #473 spent 0.2 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 01 12 66 35 d7 75 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #473 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #473 | rejected packet: | 78 01 12 66 35 d7 75 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #473: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad0280 | handling event EVENT_RETRANSMIT for parent state #380 | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #380 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #380 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49682.751939; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005761 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac7f80 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #380 | libevent_malloc: new ptr-libevent@0x7fb360035930 size 128 "road-eastnet-nonat-128" #380: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #380) | 8c 85 b9 1f be 6e 3d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 1e de d9 e8 4b 77 f1 86 35 82 03 5f ce 7b cb | 0a c9 87 87 aa 3a 74 01 02 fc e1 64 e0 07 7c 06 | dd ed c8 68 23 d7 e1 98 d6 47 ab 77 d0 38 d7 b3 | 2e d4 c4 52 2d e3 2c bc 34 35 8e 16 9e 83 9d 76 | 9f cc 43 a2 24 c5 ff 0f ed 32 bf e5 c9 3b bb e7 | a4 cc 2a 54 79 4f 13 6e 29 6d 75 36 6c 87 01 9c | 1f e0 d3 9f 4c c1 24 b9 2b d8 7b fa 2a d1 70 cc | f1 73 67 12 91 0a 83 03 b6 96 60 5a f8 fb a0 1a | 92 b6 0c fb e9 77 6e a8 e9 d4 02 be 0d 82 27 ba | 20 48 7d ed 5d 31 52 4a 59 63 6f 7e c4 3e 2e ac | 5e 97 a4 c4 d3 ae 3d fa a4 3b fb c2 de b4 5c 6c | f2 4a 19 f4 47 5a 00 3f 78 e7 bc 36 32 f4 d0 ce | 7c 2d 58 ca fa c4 cc 95 9e a4 78 b5 2d fd 23 cb | 2a 9d bc 7a 8a bb 88 97 8b fb 82 e5 e3 af 23 95 | 4e ed 5d 7c 45 af c0 e7 bb 20 cb e5 da 63 b4 54 | a8 b6 35 4f 40 f2 02 b1 8a 9f 38 00 e7 8b 27 93 | 29 00 00 24 e9 59 12 f8 16 a7 9f df 69 ae 67 26 | 7d 68 3d f0 e8 95 32 e5 ac 44 49 ce 96 5b 71 84 | 56 84 ec f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 47 26 04 c2 b4 0a 38 20 0b c5 38 | 8f 45 ae 49 d1 6f dd cf 00 00 00 1c 00 00 40 05 | 48 d9 a4 21 0f e8 6e ab 23 f4 84 7b 2a 45 72 13 | eb 6b 5f 3a | libevent_free: release ptr-libevent@0x7fb37c023b10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad0280 | #380 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c 85 b9 1f be 6e 3d 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #380 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #380 | rejected packet: | 8c 85 b9 1f be 6e 3d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #380: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0599 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a97080 | handling event EVENT_RETRANSMIT for parent state #225 | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #225 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #225 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49682.775262; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.02281 exceeds limit? YES "road-eastnet-nonat-225" #225: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-225" #225: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #477 at 0x557d46b05d40 | State DB: adding IKEv2 state #477 in UNDEFINED | pstats #477 ikev2.ike started | Message ID: init #477: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #477: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #477; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-225" #477: initiating v2 parent SA to replace #225 | using existing local IKE proposals for connection road-eastnet-nonat-225 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 477 for state #477 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad0280 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #477 | libevent_malloc: new ptr-libevent@0x7fb37c023b10 size 128 | #477 spent 0.0692 milliseconds in ikev2_parent_outI1() | RESET processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #225 ikev2.ike failed too-many-retransmits | crypto helper 8 resuming | crypto helper 8 starting work-order 477 for state #477 | pstats #225 ikev2.ike deleted too-many-retransmits | #225 spent 2.66 milliseconds in total | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 477 | [RE]START processing: state #225 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-225" #225: deleting state (STATE_PARENT_I1) aged 64.024s and NOT sending notification | parent state #225: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #225 "road-eastnet-nonat-225" #225: deleting IKE SA for connection 'road-eastnet-nonat-225' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-225' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-225 | State DB: deleting IKEv2 state #225 in PARENT_I1 | parent state #225: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 477 time elapsed 0.000575 seconds | stop processing: state #225 from 192.1.2.23:500 (in delete_state() at state.c:1143) | (#477) spent 0.578 milliseconds in crypto helper computing work-order 477: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 477 for state #477 to event queue | scheduling resume sending helper answer for #477 | libevent_free: release ptr-libevent@0x7fb35000cf80 | libevent_malloc: new ptr-libevent@0x7fb34c03f170 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a97080 | in statetime_stop() and could not find #225 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 8 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-225 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-225" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-225' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-225" | stop processing: connection "road-eastnet-nonat-225" (in initiate_a_connection() at initiate.c:349) | spent 0.0583 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #477 | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 477 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #477 | **emit ISAKMP Message: | initiator cookie: | 3f 73 6c 52 e2 16 12 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-225 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8a 68 39 c4 34 ea c1 cb 39 a9 f7 a9 af 21 c4 2f | ikev2 g^x 59 10 95 11 49 04 1e 26 c9 8f 50 f5 a4 65 8f b4 | ikev2 g^x 05 5b e9 56 60 ee a1 83 15 a3 b3 99 a1 69 bb 30 | ikev2 g^x cc 2b 98 3b 1e 30 46 76 ff 8d 39 41 4c 02 aa c6 | ikev2 g^x 7d 2f 3c 38 bb 54 54 f3 fb 6c ca 8e 5a 70 15 52 | ikev2 g^x 0e f8 6d 99 7c 6a 3b f5 58 74 0d 21 2e 4e 88 07 | ikev2 g^x 53 e0 50 d2 f7 38 33 9c 1e ad d9 ed 1d 96 b7 80 | ikev2 g^x 22 e0 8f bd a1 c0 a3 2c 94 20 d5 25 06 a2 7f 34 | ikev2 g^x 69 08 93 f9 8f 4f 23 ac b8 84 4e a5 b6 4c a2 fd | ikev2 g^x 75 2b 4c 8f 39 aa c3 bd 56 04 f8 29 c7 f1 40 cc | ikev2 g^x 9b 1a e4 8b 46 36 dc 67 52 7b 4f 7f 89 4e ad be | ikev2 g^x 6b 62 8d 22 67 f2 df e5 dd fb ec d6 50 89 50 9f | ikev2 g^x ee 43 32 27 75 9c 8a 33 f8 2e e0 8a 42 cb be 39 | ikev2 g^x aa d8 09 f8 75 cc 7e 70 d1 1d e9 02 66 48 e7 a9 | ikev2 g^x 85 21 80 86 49 7c d0 81 50 d6 7a 61 62 60 a5 9e | ikev2 g^x 15 19 da e7 5d f6 40 da d1 f3 3f 04 ae f2 b4 4a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ff dc d7 b1 fd dc f2 f7 49 64 0a 31 e9 e7 85 40 | IKEv2 nonce 8d 4a be e6 65 0c 38 4a f9 ed 0f 7d 4d 19 c2 7b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3f 73 6c 52 e2 16 12 7c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e1 | natd_hash: port= 01 f4 | natd_hash: hash= f2 0f c5 61 64 4d d6 f7 e8 8d a8 de cf 04 b2 c9 | natd_hash: hash= 0c b8 8a b5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f2 0f c5 61 64 4d d6 f7 e8 8d a8 de cf 04 b2 c9 | Notify data 0c b8 8a b5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3f 73 6c 52 e2 16 12 7c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 72 d7 c9 34 b9 dc 3d 33 a4 7e ff 3a 57 4e 49 6e | natd_hash: hash= fe 3e 47 b9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 72 d7 c9 34 b9 dc 3d 33 a4 7e ff 3a 57 4e 49 6e | Notify data fe 3e 47 b9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #477 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #477: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #477 to 4294967295 after switching state | Message ID: IKE #477 skipping update_recv as MD is fake | Message ID: sent #477 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-225" #477: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.225:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #477) | 3f 73 6c 52 e2 16 12 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 68 39 c4 34 ea c1 cb 39 a9 f7 a9 af 21 c4 2f | 59 10 95 11 49 04 1e 26 c9 8f 50 f5 a4 65 8f b4 | 05 5b e9 56 60 ee a1 83 15 a3 b3 99 a1 69 bb 30 | cc 2b 98 3b 1e 30 46 76 ff 8d 39 41 4c 02 aa c6 | 7d 2f 3c 38 bb 54 54 f3 fb 6c ca 8e 5a 70 15 52 | 0e f8 6d 99 7c 6a 3b f5 58 74 0d 21 2e 4e 88 07 | 53 e0 50 d2 f7 38 33 9c 1e ad d9 ed 1d 96 b7 80 | 22 e0 8f bd a1 c0 a3 2c 94 20 d5 25 06 a2 7f 34 | 69 08 93 f9 8f 4f 23 ac b8 84 4e a5 b6 4c a2 fd | 75 2b 4c 8f 39 aa c3 bd 56 04 f8 29 c7 f1 40 cc | 9b 1a e4 8b 46 36 dc 67 52 7b 4f 7f 89 4e ad be | 6b 62 8d 22 67 f2 df e5 dd fb ec d6 50 89 50 9f | ee 43 32 27 75 9c 8a 33 f8 2e e0 8a 42 cb be 39 | aa d8 09 f8 75 cc 7e 70 d1 1d e9 02 66 48 e7 a9 | 85 21 80 86 49 7c d0 81 50 d6 7a 61 62 60 a5 9e | 15 19 da e7 5d f6 40 da d1 f3 3f 04 ae f2 b4 4a | 29 00 00 24 ff dc d7 b1 fd dc f2 f7 49 64 0a 31 | e9 e7 85 40 8d 4a be e6 65 0c 38 4a f9 ed 0f 7d | 4d 19 c2 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 0f c5 61 64 4d d6 f7 e8 8d a8 de | cf 04 b2 c9 0c b8 8a b5 00 00 00 1c 00 00 40 05 | 72 d7 c9 34 b9 dc 3d 33 a4 7e ff 3a 57 4e 49 6e | fe 3e 47 b9 | state #477 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c023b10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad0280 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a97080 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #477 | libevent_malloc: new ptr-libevent@0x7fb37c023b10 size 128 | #477 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49682.776416 | resume sending helper answer for #477 suppresed complete_v2_state_transition() and stole MD | #477 spent 0.321 milliseconds in resume sending helper answer | stop processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c03f170 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f 73 6c 52 e2 16 12 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #477 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #477 | rejected packet: | 3f 73 6c 52 e2 16 12 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e1 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #477: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7b910 | handling event EVENT_RETRANSMIT for parent state #469 | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #469 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #469 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49682.782593; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001476 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e490 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #469 | libevent_malloc: new ptr-libevent@0x7fb34c03f170 size 128 "road-eastnet-nonat-217" #469: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #469) | 29 4a 77 5f 7a c1 26 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 e1 17 9f 01 39 e1 e9 f8 e3 b4 37 56 6e 01 9e | d8 db 78 19 20 a1 ab 6d c3 e8 12 cd f6 c3 2c 5f | d5 86 61 6c a8 d4 5b 57 ac f5 b7 f0 24 de ac 90 | a1 9c 51 ce 2d 7a 33 35 b1 68 02 e0 5a 9f bf ac | 1b d8 19 f9 b4 68 45 14 e7 fd c5 a9 74 d6 09 6d | f9 4a 25 95 f8 f0 1c 13 dd 36 12 79 4b 27 2a bb | 86 17 86 e1 0e 04 a7 ab e3 0c 51 78 89 39 a0 df | c7 a9 56 0a e4 9a f1 58 c7 a1 12 21 f0 18 d0 d0 | 21 0e 73 e6 4f d3 13 37 a8 aa e3 89 21 ab a3 7c | d5 ac 7b aa ea d7 ff a4 b9 b2 c3 7f 9b 07 77 17 | 36 8f 4e a7 40 03 46 9c db 93 b3 16 3c e2 7f c0 | 58 42 83 4f fa 88 71 3b b7 86 e5 ca 62 88 5c 9f | 93 c4 59 82 fb 9e 5a 96 92 16 5f 68 0e 83 59 2f | 70 32 51 a7 ce dd b8 93 09 66 27 ff 7a e6 c4 cc | d2 87 46 9e b6 49 85 48 3f a7 ef 43 8a 5c ae e6 | 2c b0 88 25 66 2b 82 4c a9 2f 05 19 54 70 c3 9c | 29 00 00 24 36 8f c2 cf 02 b6 2e 75 ac 6c a4 55 | 9f 56 a2 b8 31 83 97 a5 56 a5 c5 7a ba 53 78 14 | 83 c8 c0 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 d6 3c 93 bb 1b 68 50 cd c9 2f b8 | 25 99 9e c0 3a 2f 1f 80 00 00 00 1c 00 00 40 05 | e5 a0 2e 8f cb 71 f8 0c 42 a7 95 8f 73 2e c5 90 | e5 8b 3a 32 | libevent_free: release ptr-libevent@0x7fb37803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7b910 | #469 spent 0.0843 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 4a 77 5f 7a c1 26 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #469 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #469 | rejected packet: | 29 4a 77 5f 7a c1 26 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #469: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c018210 | handling event EVENT_RETRANSMIT for parent state #459 | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #459 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #459 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49682.786853; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002627 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7b910 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #459 | libevent_malloc: new ptr-libevent@0x7fb37803b0b0 size 128 "road-eastnet-nonat-207" #459: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #459) | 64 1c f9 72 57 02 e5 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 f4 91 af e8 cc 47 24 c2 b5 4c 3e ed df 87 0c | 09 e0 4b 07 1e 23 c5 7e 86 e2 5a ab 7d 41 06 3d | 7f 7d f9 8e b6 58 c8 fa 4a e7 6e 59 bd 9e 19 5b | d0 22 36 6d 62 9e c7 d4 0e 8a 77 c0 e4 05 9e c6 | 38 14 50 50 10 9e e8 30 b1 17 07 a8 ec 87 4b 21 | 15 4c 43 ee b6 9d 8d a1 9c 18 3d 34 43 97 8f 77 | 9a 8e 35 11 77 6c 19 4c d5 d6 10 76 41 7d 92 29 | ce 7e b0 f8 dd e1 3c da bd 28 65 ea 34 c0 d5 5e | 87 61 2d 03 e2 eb 39 88 92 b2 21 9a 8c ff 81 cd | e0 87 95 3d 88 8d a2 1e 66 0d db a2 7a 79 4c cc | ae 9a d3 e6 87 6a 1b 78 ae 44 bb 23 8a 41 53 1f | af 3f 42 6b ff 45 a9 da 42 e2 38 bd 4c 50 bf a8 | 3b 16 b5 57 9a cf 28 d9 88 40 31 6e bd 9a 3e 51 | 61 82 b6 d4 f2 88 81 2c 57 c3 85 0c a7 ff fd 6c | ed 2a 14 13 51 d6 b5 56 aa 0c 26 20 25 e3 9c 40 | 12 38 26 e0 f5 9a 6e 40 35 0c 6b 0a 6d b3 65 32 | 29 00 00 24 5c 75 af 9e f8 ea 62 49 48 89 05 1e | 77 92 7c c2 74 9a fc 43 04 bc b7 18 cc f7 58 3d | 9b c8 34 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 7f b1 c0 22 56 8e bd 29 fd 39 4f | 5d 90 ed 84 8a 20 f8 23 00 00 00 1c 00 00 40 05 | 58 59 18 6a d1 74 dc 11 3e 54 b0 34 57 9e 0a 5d | 5a f6 05 3b | libevent_free: release ptr-libevent@0x7fb36c039e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c018210 | #459 spent 0.0983 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 1c f9 72 57 02 e5 bf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #459 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #459 | rejected packet: | 64 1c f9 72 57 02 e5 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #459: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0395 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1c440 | handling event EVENT_RETRANSMIT for parent state #439 | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #439 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #439 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49682.814237; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003355 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c018210 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #439 | libevent_malloc: new ptr-libevent@0x7fb36c039e30 size 128 "road-eastnet-nonat-187" #439: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #439) | 47 50 75 67 1d 00 52 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 10 e6 27 54 79 a5 06 ab 7b 5d 27 c9 72 11 8a | be 8d 9d bf 52 e0 ac e0 58 f4 00 83 0a 18 2a d4 | 41 71 ec e9 2e f0 05 ec e8 a2 ec d2 28 ce f8 d4 | e5 81 d8 3c 87 bc 89 6a 8b 0a 1a e2 d3 eb 38 44 | e6 af 0a 47 aa 17 06 2d e7 33 df 52 16 8d b3 fb | d9 67 8e 07 e3 c9 9e 52 cf 8d 56 fb 7c c2 93 d9 | 9d 49 6e f0 2c fb ae b5 5c 7d 08 de 63 dc 9b 39 | 2d fb 3d b8 63 14 a9 ce d9 19 af ff bb a7 b1 81 | 41 c7 41 67 e7 53 2b fa 68 10 a5 13 3f f8 0f e7 | 33 85 43 eb a8 54 d5 5b fd f4 a1 1e d5 4f 32 99 | 86 f6 ec 22 05 a8 98 ec cb 6f de 01 77 3a 63 2b | 85 0f 08 c2 e9 6d 60 39 18 10 c9 3c 04 a6 69 c0 | 90 8a 6f 1c 7a 2e 85 ad 4f 29 5f 48 49 12 08 e4 | 72 3f d7 cc 42 6d 91 5a f7 f3 7b 44 dc 38 f7 05 | b2 bf 70 89 ab 24 52 cd cd c1 b3 61 99 9d a9 28 | e2 c4 12 1d de cd 37 64 c2 e0 70 28 45 34 de 67 | 29 00 00 24 d9 2f 24 9b 75 f5 ca 1e 2e 7d f4 06 | 41 a2 89 f3 ae c7 ae 61 65 4e 5f 7f 65 dd c2 12 | ae ae 3a 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 fd b4 2f 23 17 b8 9b d8 0c 2a 45 | b9 34 13 eb df 7c 42 33 00 00 00 1c 00 00 40 05 | f1 b3 a4 02 7a 60 50 36 46 44 d9 88 f9 29 1a 5f | aa 01 32 cb | libevent_free: release ptr-libevent@0x7fb34403a3d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c440 | #439 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 50 75 67 1d 00 52 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #439 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #439 | rejected packet: | 47 50 75 67 1d 00 52 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #439: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a60690 | handling event EVENT_RETRANSMIT for parent state #275 | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #275 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #275 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49682.834613; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004098 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c440 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #275 | libevent_malloc: new ptr-libevent@0x7fb34403a3d0 size 128 "road-eastnet-nonat-23" #275: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #275) | 8e 8a 90 cd 9e 92 16 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 db ff f3 45 8d 77 6b ab 4c f5 59 93 99 02 27 | 95 ea ea f3 ac f8 d0 0c f4 e4 a7 81 ed dc a2 2e | 80 d4 21 01 5a 1a 55 9b d3 86 c5 c8 54 08 80 87 | 53 03 95 88 ee 42 5d b8 52 8e fe 84 14 38 79 44 | c3 51 49 fc 97 0d 59 e0 5f 4b c0 5e f8 ec 96 9d | 9d 66 a2 14 38 ec b6 d3 b6 6a cc ee b5 48 0a 5e | 6f de 87 79 9d 43 73 e3 c3 11 60 66 e8 ee 7a 7d | c3 f9 f0 de 79 dc 04 3a 85 85 52 d2 92 21 fc 86 | 8d fd 20 94 86 24 05 6c 2b cb ee c9 04 8f 0f 93 | 01 a5 e2 2b 0c 12 b9 e6 3a 6c ef c0 32 59 e5 d2 | 3b 11 a2 9f 2d 5e e0 2d 8c 75 47 73 37 0b fd dc | 38 6f 1e 5d 62 ac ab 3b f8 90 5d 68 0c 10 a4 e3 | 5d d1 15 9f 1f d5 11 83 81 be 1d a7 8f 91 34 60 | 10 68 8c b7 8b 5a e8 bb 55 32 b6 ac 66 fb 13 bc | 8d 01 0f 0f f6 d9 7e e8 52 a6 18 9d f5 fb ae f8 | d6 4a f4 34 c9 7a eb 6e cd 1f ad 11 86 f4 37 e0 | 29 00 00 24 82 2a d3 ed 88 6f 6d 2b 95 fc ef 17 | cd da 04 83 d9 0b fe c7 f7 7a 31 0a 69 4f 17 0b | 3b dd fa 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 12 f4 6b 5c 7a 37 1f d4 51 59 a4 | 33 90 ab 79 b6 80 74 7b 00 00 00 1c 00 00 40 05 | 6b 59 3d 2d 41 62 79 69 4f 0b fb 7b cf 22 15 97 | 6d 57 a6 24 | libevent_free: release ptr-libevent@0x7fb3880210c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a60690 | #275 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 8a 90 cd 9e 92 16 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #275 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #275 | rejected packet: | 8e 8a 90 cd 9e 92 16 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #275: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0471 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358017ea0 | handling event EVENT_RETRANSMIT for parent state #381 | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #381 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #381 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49682.83599; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004453 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a60690 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #381 | libevent_malloc: new ptr-libevent@0x7fb3880210c0 size 128 "road-eastnet-nonat-129" #381: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #381) | 1e fb 19 74 69 81 f6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 15 4d 3c 26 b9 8e 71 c8 4c 65 3c 93 c4 f8 5c | 0c 69 48 07 1f b0 40 db 39 45 4f 12 5d b7 64 ce | f6 36 76 d1 4f f2 c3 d5 d1 3f c7 4e dd 69 ef bd | 2e 06 de 7f fb 43 32 b5 94 31 7c 96 1c 09 3c 05 | c9 f9 e9 6e f6 32 3d b2 3f 7a 40 e8 05 db 42 df | 50 a9 3b 1b be f2 2b d2 43 70 99 24 25 7e b9 8b | 88 12 28 70 28 9b b9 5b b0 6d 48 da 44 23 6b 4d | 59 ff ee 67 e5 c7 db c0 7c 7f a2 4b 21 92 3a a1 | fd 14 25 80 1a 91 48 40 e9 5b 63 e7 84 7c b3 99 | 02 c6 5d 6d b6 28 24 98 77 5e dc c9 be 98 c3 d6 | b6 bc 7a bf 31 81 8d c7 ba a9 27 81 82 5a 2f b7 | 23 3d 16 95 ba b5 4a 07 29 09 4c 3e c5 38 81 20 | 6c 0f d0 d6 67 62 46 f9 bc 6b c6 8e 7d a5 ce 50 | f1 0f 9a 64 d5 01 da 1f 72 e3 1b 16 9a ec 02 45 | ef 03 20 b4 4d cb ac e4 80 48 13 be cc c9 5e 11 | 9a f4 a2 21 ee 6b 6d 92 17 77 1f 86 a2 bd ac 89 | 29 00 00 24 5b c1 91 12 e1 44 84 05 fe aa f1 fc | b1 6d 8f ce 01 29 aa f2 75 b6 aa e9 3c cb db 81 | 72 99 63 d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 78 cd 6f 27 81 4c 4a f4 57 06 82 | fb 0a 60 ad 54 dd e0 6c 00 00 00 1c 00 00 40 05 | 73 d8 f7 cb c0 0b a5 77 76 9f 97 28 b6 7f a1 0e | 85 3a 80 ee | libevent_free: release ptr-libevent@0x7fb35802ed90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358017ea0 | #381 spent 0.0955 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e fb 19 74 69 81 f6 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #381 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #381 | rejected packet: | 1e fb 19 74 69 81 f6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #381: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #474 | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #474 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #474 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49682.853253; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500216 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #474 | libevent_malloc: new ptr-libevent@0x7fb35802ed90 size 128 "road-eastnet-nonat-222" #474: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #474) | 0f db c1 fb 9f 17 ff 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 1b 5f a0 e0 ea b4 6f d8 89 26 cf ee 32 1a 5c | 28 fd cc 88 df ac 76 71 06 f6 f9 47 1d 52 2b f1 | 5a b8 ae 1c d0 f8 c1 49 c7 7c ed 42 b3 cb ec d1 | cd 02 cf 31 b3 56 f6 e1 d0 7b 2f 03 00 08 68 a8 | 8c e2 7f 21 83 8d a7 f5 0e 07 fa ee 88 4b c9 7c | 96 80 b8 d5 42 4d 28 ea bb cc 27 3f c4 d8 6e 4d | d5 70 bc b9 0a 5f 21 c3 31 6b f1 91 46 6a 01 67 | 1a 7e a6 f1 0c 4d 62 51 b1 a2 3c 89 97 d5 4a 44 | a9 bc 59 2f a3 d1 5e 07 95 15 69 ac 72 1f 9c ba | 63 7f 02 e1 05 f8 26 4f fe cb 35 8d 42 06 b7 4a | a1 e1 b3 5c f5 2a 05 2b b1 4d 29 89 16 f1 e4 7b | dc e2 55 b9 29 ad b8 79 4e bb 9a 44 92 25 af e6 | 8f 1c 0d 27 3a fe 2f c8 95 15 ef 6f 1b 1e 7a 94 | a3 8c 31 92 cc 09 2b ca d2 98 1d 32 a4 3c 30 c1 | 96 ab 37 bb 0d bc c5 cd 1c ca 91 c5 fa 2a c9 92 | 70 fb 0c 4c 99 ec 29 a2 72 d8 22 a0 d3 24 0d 76 | 29 00 00 24 b8 e3 46 90 e1 5a 71 46 9e cc 2f c2 | 22 0c 77 5a b9 94 a5 51 d5 e9 c9 19 b8 4f d2 8d | f8 17 d9 c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 82 ca 85 05 ee 86 5d c3 66 e4 91 | 24 1c 89 d5 b4 33 f3 c7 00 00 00 1c 00 00 40 05 | d7 2a e5 02 23 f5 bb 26 e7 1d 38 9f 9f c2 ec a7 | 48 2b cd 07 | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #474 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0f db c1 fb 9f 17 ff 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #474 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #474 | rejected packet: | 0f db c1 fb 9f 17 ff 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #474: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a92f40 | handling event EVENT_RETRANSMIT for parent state #226 | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #226 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #226 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49682.886706; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.014025 exceeds limit? YES "road-eastnet-nonat-226" #226: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-226" #226: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #478 at 0x557d46b07300 | State DB: adding IKEv2 state #478 in UNDEFINED | pstats #478 ikev2.ike started | Message ID: init #478: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #478: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #478; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-226" #478: initiating v2 parent SA to replace #226 | using existing local IKE proposals for connection road-eastnet-nonat-226 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 478 for state #478 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb340005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #478 | libevent_malloc: new ptr-libevent@0x7fb378009640 size 128 | #478 spent 0.159 milliseconds in ikev2_parent_outI1() | RESET processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #226 ikev2.ike failed too-many-retransmits | pstats #226 ikev2.ike deleted too-many-retransmits | #226 spent 2.62 milliseconds in total | [RE]START processing: state #226 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-226" #226: deleting state (STATE_PARENT_I1) aged 64.015s and NOT sending notification | crypto helper 12 resuming | parent state #226: PARENT_I1(half-open IKE SA) => delete | crypto helper 12 starting work-order 478 for state #478 | State DB: IKEv2 state not found (flush_incomplete_children) | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 478 | picked newest_isakmp_sa #0 for #226 "road-eastnet-nonat-226" #226: deleting IKE SA for connection 'road-eastnet-nonat-226' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-226' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-226 | State DB: deleting IKEv2 state #226 in PARENT_I1 | parent state #226: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 478 time elapsed 0.001418 seconds | (#478) spent 1.42 milliseconds in crypto helper computing work-order 478: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 478 for state #478 to event queue | stop processing: state #226 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb38003dab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f40 | in statetime_stop() and could not find #226 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-226 which received a Delete/Notify but must remain up per local policy | scheduling resume sending helper answer for #478 | libevent_malloc: new ptr-libevent@0x7fb340039ba0 size 128 | crypto helper 12 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-226" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-226' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-226" | stop processing: connection "road-eastnet-nonat-226" (in initiate_a_connection() at initiate.c:349) | spent 0.173 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #478 | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 478 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #478 | **emit ISAKMP Message: | initiator cookie: | b4 9c 7f a0 55 ec 5f 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-226 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c4 86 bb f8 93 0c cc df 70 83 3b a1 9a e0 b8 e3 | ikev2 g^x ef 6e a7 55 12 1e 4a a1 3c fd 3e f8 52 71 57 ec | ikev2 g^x d1 b9 27 97 72 c7 60 a2 ce b1 45 33 01 2b 7a c1 | ikev2 g^x 6c 56 fd d5 59 18 5e d3 c3 75 ef 36 1c 65 ec f7 | ikev2 g^x 03 c0 d4 70 7b b6 e1 35 71 9d 76 5b 7d 21 d4 3b | ikev2 g^x 12 1e 6c 03 cf 08 78 60 b5 ba 22 6e 40 93 8e c7 | ikev2 g^x 49 b5 59 bf 7f 87 44 20 2c 36 31 fc 69 d8 21 31 | ikev2 g^x 6c 62 2a ef c7 55 7b 01 a6 27 b6 8c 28 9f 7c ac | ikev2 g^x d4 27 6c f1 7c 85 40 4e 23 a1 d4 02 e3 38 52 92 | ikev2 g^x 5f 62 3c 6f 58 9e 47 5e 72 b1 b1 7d 8d 92 b6 d3 | ikev2 g^x be e0 0a 4d 01 e0 16 9f 01 75 9d 1c 68 e3 f5 d9 | ikev2 g^x 8e 19 b8 2b 12 45 ac 03 e0 b6 4d 98 39 5a 75 d7 | ikev2 g^x 7c b1 b9 f8 a3 a2 b1 d2 49 e7 b2 11 f2 c6 a7 7f | ikev2 g^x 57 72 f8 df 1f 7a 3c df 19 c0 28 fb f6 f4 59 df | ikev2 g^x f9 cb e8 e4 b5 73 46 61 ef 64 d4 38 66 2b 1c f7 | ikev2 g^x d4 31 c9 51 2e 93 97 3b f3 a7 d3 d3 06 a7 f6 99 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 19 2b 71 2c 92 77 f3 24 92 84 03 b5 44 5b d7 aa | IKEv2 nonce 5e 03 e6 f3 27 6d 26 be 26 c2 0f f8 de ad c4 67 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b4 9c 7f a0 55 ec 5f 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e2 | natd_hash: port= 01 f4 | natd_hash: hash= ad b7 1a 04 ad be 09 f8 62 42 a2 e6 69 0f ca 24 | natd_hash: hash= af 9b 5c 02 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ad b7 1a 04 ad be 09 f8 62 42 a2 e6 69 0f ca 24 | Notify data af 9b 5c 02 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b4 9c 7f a0 55 ec 5f 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 37 89 76 5f 87 60 25 2e 24 4c ae 3c 7a 86 5f 05 | natd_hash: hash= 9f e3 e5 ad | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 37 89 76 5f 87 60 25 2e 24 4c ae 3c 7a 86 5f 05 | Notify data 9f e3 e5 ad | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #478 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #478: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #478 to 4294967295 after switching state | Message ID: IKE #478 skipping update_recv as MD is fake | Message ID: sent #478 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-226" #478: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.226:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #478) | b4 9c 7f a0 55 ec 5f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 86 bb f8 93 0c cc df 70 83 3b a1 9a e0 b8 e3 | ef 6e a7 55 12 1e 4a a1 3c fd 3e f8 52 71 57 ec | d1 b9 27 97 72 c7 60 a2 ce b1 45 33 01 2b 7a c1 | 6c 56 fd d5 59 18 5e d3 c3 75 ef 36 1c 65 ec f7 | 03 c0 d4 70 7b b6 e1 35 71 9d 76 5b 7d 21 d4 3b | 12 1e 6c 03 cf 08 78 60 b5 ba 22 6e 40 93 8e c7 | 49 b5 59 bf 7f 87 44 20 2c 36 31 fc 69 d8 21 31 | 6c 62 2a ef c7 55 7b 01 a6 27 b6 8c 28 9f 7c ac | d4 27 6c f1 7c 85 40 4e 23 a1 d4 02 e3 38 52 92 | 5f 62 3c 6f 58 9e 47 5e 72 b1 b1 7d 8d 92 b6 d3 | be e0 0a 4d 01 e0 16 9f 01 75 9d 1c 68 e3 f5 d9 | 8e 19 b8 2b 12 45 ac 03 e0 b6 4d 98 39 5a 75 d7 | 7c b1 b9 f8 a3 a2 b1 d2 49 e7 b2 11 f2 c6 a7 7f | 57 72 f8 df 1f 7a 3c df 19 c0 28 fb f6 f4 59 df | f9 cb e8 e4 b5 73 46 61 ef 64 d4 38 66 2b 1c f7 | d4 31 c9 51 2e 93 97 3b f3 a7 d3 d3 06 a7 f6 99 | 29 00 00 24 19 2b 71 2c 92 77 f3 24 92 84 03 b5 | 44 5b d7 aa 5e 03 e6 f3 27 6d 26 be 26 c2 0f f8 | de ad c4 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad b7 1a 04 ad be 09 f8 62 42 a2 e6 | 69 0f ca 24 af 9b 5c 02 00 00 00 1c 00 00 40 05 | 37 89 76 5f 87 60 25 2e 24 4c ae 3c 7a 86 5f 05 | 9f e3 e5 ad | state #478 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb378009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb340005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #478 | libevent_malloc: new ptr-libevent@0x7fb38003dab0 size 128 | #478 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49682.88969 | resume sending helper answer for #478 suppresed complete_v2_state_transition() and stole MD | #478 spent 0.968 milliseconds in resume sending helper answer | stop processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb340039ba0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 9c 7f a0 55 ec 5f 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #478 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #478 | rejected packet: | b4 9c 7f a0 55 ec 5f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e2 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #478: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.135 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #460 | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #460 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #460 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49682.894185; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002086 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3400296b0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #460 | libevent_malloc: new ptr-libevent@0x7fb340039ba0 size 128 "road-eastnet-nonat-208" #460: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #460) | 23 48 f5 22 8d 37 9a d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 df d9 22 d0 fa 01 d1 aa 88 df 6a 8b 18 c0 09 | 4f 5b 80 db c5 12 8b 47 ef 35 50 bc b0 af 99 c5 | f9 cf 10 a6 63 8f ba 03 da 7f 0b b3 54 11 ba 9c | bb 06 80 77 61 12 b6 fe 2b bb 2c 7d 23 ed 7a 74 | 17 31 cb cb 95 4c d6 8f 31 04 dc 07 37 df 2d f4 | 1c ed 0c bb 28 ba e2 23 2d 3d a3 b2 fc 6f 50 eb | 56 d2 5b 1e f1 ad 23 2f 3e 55 c4 35 e9 32 f6 24 | 86 b3 e7 fd 04 0f 6f 72 db 37 4f bd d9 fe 64 c2 | 83 ac 83 05 91 73 42 0a a1 0c 3e 29 3c 20 67 b6 | 92 37 23 8d 25 df 18 a0 fa c2 98 93 ab ff 5f 64 | 7c d6 b8 fc 1d 90 5c 26 98 2d 8b b3 56 38 e2 7c | 20 da c8 bf 8d be 1d 6d f8 c5 88 bf 2f 3a f2 41 | 78 28 51 f9 69 ab 11 20 67 51 52 04 40 a5 c7 0c | 37 f0 c6 5d f9 95 c0 b8 47 6e 71 8e 99 56 3a 5f | e1 5c d4 8d c1 97 29 9c 26 a6 ac 65 11 ae 68 ef | 23 72 8e c9 45 c4 63 78 1b 5c 81 47 6e 58 87 ff | 29 00 00 24 25 2a f3 c2 d1 34 f2 28 be 54 0b a4 | 22 e2 98 59 02 dc 2f 37 5b b6 b4 bd 10 49 91 58 | 87 4d 98 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c c8 5d 4c 09 cc 17 d5 22 fc 7b d0 | 43 ae fd 90 5d 04 da 2b 00 00 00 1c 00 00 40 05 | 07 a4 f0 f7 58 53 22 23 25 cf 1a 07 69 10 b8 4a | 16 e3 ac d7 | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | #460 spent 0.364 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 48 f5 22 8d 37 9a d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #460 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #460 | rejected packet: | 23 48 f5 22 8d 37 9a d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #460: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.177 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8cc0 | handling event EVENT_RETRANSMIT for parent state #382 | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #382 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #382 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49682.904978; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005118 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #382 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 "road-eastnet-nonat-130" #382: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #382) | 8a a7 de 77 ff fe 00 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 1e 05 01 d3 c0 50 0e 07 5a f5 6c 2a f3 ca c5 | f5 6b b5 ce e5 2d 0d 22 8a 9d fc a1 92 f1 21 88 | fe 80 af 87 07 4e ac cb 0e 4c 2f 1f 7c 09 ad 56 | 27 1d 20 e6 ec e9 94 a7 13 47 77 6d 93 7b 8b 31 | 4c 98 f5 11 b5 9a 38 64 29 ba c8 d0 2f a9 37 ca | 1d 9c 45 27 41 6d 78 24 2b 30 7d 43 66 5f da 35 | 99 0b ee f7 a5 dd a9 e7 24 b7 2c 27 c3 b8 3c 38 | 22 f4 c4 26 23 91 a1 6d a7 03 90 dd c7 47 8b e4 | b9 30 db 10 7a b0 86 55 91 13 ed 5a 5c 50 c6 55 | 38 6b 0d bb 7c d6 67 e7 99 0a 0d 7c c8 3b f2 93 | 43 b8 a6 1e f0 04 5a 66 ab 2b 76 49 15 e4 be b6 | e3 ab 9a 84 5b 45 f3 99 3f 3d 94 3a 7f ba c6 2d | c0 e5 16 1f a9 0e c4 b3 c7 a8 37 c7 df 60 6d b0 | 90 7f 5b 83 e7 16 35 cd f8 80 7e 6b 4c 50 19 23 | 8a a3 35 38 cd 8b ef 81 d2 24 34 89 61 4b 37 2c | a1 bc 48 55 f5 65 06 2e e7 6f b3 a0 6e 02 6c 89 | 29 00 00 24 7c cd b7 56 1d 0f 15 7b 08 97 8c a9 | df 91 53 e0 6a 88 48 cc 4c b6 8e 33 b3 57 e0 e8 | 1c 04 d1 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 58 61 cb 76 cc c4 93 e8 81 4f b3 | 54 86 64 27 f4 77 87 8f 00 00 00 1c 00 00 40 05 | 27 d0 5f f0 83 ae a8 e6 f3 e6 a6 2d bb 57 f3 83 | 78 36 b0 95 | libevent_free: release ptr-libevent@0x7fb36404b5a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8cc0 | #382 spent 0.428 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a a7 de 77 ff fe 00 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #382 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #382 | rejected packet: | 8a a7 de 77 ff fe 00 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #382: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3380300a0 | handling event EVENT_RETRANSMIT for parent state #440 | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #440 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #440 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49682.929036; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004144 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8cc0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #440 | libevent_malloc: new ptr-libevent@0x7fb36404b5a0 size 128 "road-eastnet-nonat-188" #440: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #440) | 59 19 97 9a e3 8b 77 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 57 86 98 5b 96 d3 77 6a 73 d3 f1 79 83 3d b1 | 25 c0 29 5c f0 c3 a2 69 ec 6a e3 4d 6f cd 0b d7 | 79 9c cb d7 34 fa 78 1e b1 98 79 da 0f ac 84 e0 | 73 c1 06 f8 21 3a aa 0a f4 0e 4d f7 bf 24 b0 23 | 75 13 78 7d aa 97 d6 f9 8b f1 96 43 1f bc e1 e6 | da 7d fb 41 ce 93 49 6e e1 1e f3 c1 41 08 43 3b | 3e e8 ed 1f 4e 08 d4 85 64 9e d1 11 dc 50 e9 45 | 7f a7 7d f7 2b 35 cf 9a d1 cb 6a 05 4f 83 e6 fd | 42 8f 63 21 ff 80 40 b7 e2 26 41 31 52 b6 49 a0 | 77 11 47 93 5f a3 3d 9c 1c 0e 6f 2b 0b b6 1d 42 | d3 1d 45 13 c6 e8 f2 a5 8e c9 4c 05 0a 08 aa 82 | ac e4 27 b7 b2 77 b7 80 38 58 3d 68 92 fd 5e 6a | 38 c8 de 6a 08 ae c9 2d 85 13 3c b9 b9 2c 91 48 | 64 74 4e 5e a1 07 a6 ff 63 67 43 99 ae 3a 36 0a | 11 4e c4 4f 1a ab 97 3f 39 c8 63 d0 49 b4 29 fe | 77 df c5 36 12 ae 96 21 4b 67 cf 07 6a b0 e1 5d | 29 00 00 24 82 fb 4c 4b 30 7b 16 3b 6a c7 2b 62 | cc 7b b0 14 ea 16 0d 74 ad 0f c2 be 8d 39 6e c0 | 2a 84 9f 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 37 6d ef 85 b5 1f 0e 28 d0 8a e5 | d5 d3 1d e3 5f d5 cf 90 00 00 00 1c 00 00 40 05 | 72 f1 07 bf 82 38 a8 c2 32 ec a4 d6 59 1b 7c de | 06 08 a2 81 | libevent_free: release ptr-libevent@0x7fb33803a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3380300a0 | #440 spent 0.446 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 59 19 97 9a e3 8b 77 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #440 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #440 | rejected packet: | 59 19 97 9a e3 8b 77 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #440: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.202 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45350 | handling event EVENT_RETRANSMIT for parent state #470 | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #470 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #470 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49682.933116; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002641 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3380300a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #470 | libevent_malloc: new ptr-libevent@0x7fb33803a770 size 128 "road-eastnet-nonat-218" #470: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #470) | ab ba b0 28 2b 1d 75 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 e4 df 77 9c ac 7c 40 d9 cc 91 f4 1e 15 f1 e4 | bc 57 e7 d5 04 82 1b 0a da 88 66 71 1d 5c c0 4e | e9 e1 44 ec a4 a7 01 cc ac 81 2a 8e 12 68 b2 c4 | cb fb 38 e3 4b 73 83 33 bf 14 39 b7 96 9c bd 59 | d9 ff 78 9c 9b 27 6f 77 fd c9 8a 91 00 a0 bf ad | 80 e8 18 ee 7d 76 d2 f5 dc 73 28 11 ea 98 07 d2 | 64 7f 44 96 f2 22 04 36 e1 c7 80 69 f0 17 fa 9a | d9 3b f0 c2 a7 d3 89 ef c3 be e7 3b 57 5c b5 bf | 47 3a cd 92 d8 c8 49 50 dd d0 b8 eb bf 2d 90 2f | 70 dc 26 c2 6c 6d 97 1e 52 f7 6d 64 24 1f 5f ad | 51 2f 7a 28 09 01 c2 c0 02 41 61 9f 09 3f 66 24 | 9a 1a a0 e1 ec c0 36 27 88 be e6 c0 7c 74 30 55 | 5b 47 83 d5 de 8f dd bb 1e 36 33 0e 3a 91 ce a0 | e2 86 42 d5 a7 ba 66 4a 76 5d 9a 0c 15 60 fc f8 | 07 4e ec f8 cb 3b a4 f7 40 7b 9c 98 98 27 e7 40 | f3 18 97 7c cd 29 25 1e 88 f4 c6 ab 7c 46 c3 a4 | 29 00 00 24 5d 90 f6 17 67 54 dd 2e 4f 57 ce 29 | 91 07 11 a6 ab 05 8f 42 d3 b0 74 bf 38 9e 49 fe | 79 c7 ca e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 04 17 c7 7e 54 6e 6a e8 f5 01 1c | 14 c4 b8 fd 53 6d 0c 45 00 00 00 1c 00 00 40 05 | ee 06 ba 38 dc 10 50 e4 3e a6 cd 5f 2c e3 74 3b | 2a 18 7d 82 | libevent_free: release ptr-libevent@0x7fb374034da0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45350 | #470 spent 0.418 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab ba b0 28 2b 1d 75 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #470 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #470 | rejected packet: | ab ba b0 28 2b 1d 75 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #470: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.198 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37800cc10 | handling event EVENT_RETRANSMIT for parent state #276 | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #276 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #276 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49682.946915; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006432 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45350 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #276 | libevent_malloc: new ptr-libevent@0x7fb374034da0 size 128 "road-eastnet-nonat-24" #276: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #276) | 97 d8 09 67 95 19 ff f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e fe 65 45 24 16 54 b2 a7 14 49 9e 41 08 a6 ad | 8d 38 c1 ab 41 bc c5 70 74 ea 87 6b 47 67 61 c9 | 08 e4 05 10 d8 b1 89 eb 95 ae 5c c6 f1 8d 64 f6 | e2 34 f7 1e 96 bb c8 e4 08 d5 11 49 c7 13 d5 5b | 05 9d 02 33 71 55 11 11 24 9a 7a f7 2f f8 55 e9 | 49 16 da 32 11 31 25 c0 d3 d2 83 15 e8 61 24 52 | f4 f3 a7 f2 34 62 0e d9 54 b7 ea 87 42 a8 29 03 | 05 f5 e1 d2 8f 40 88 3f e8 e4 52 27 80 25 db f2 | 79 7c f2 ce e3 4d 99 fa 0f 82 50 fa bd f3 31 31 | 75 5b 04 3c f4 62 cf 98 a6 3b 30 69 aa fe de 35 | fe 70 61 92 ab 0c 67 96 0d 80 c2 5b c7 8c 3b 7a | 1d cc 0e d5 c6 71 9d 10 b0 4a ac f9 9f b7 d7 6d | 29 1a 45 c3 c8 c4 88 f8 4d dd 53 1c d2 5c 13 5d | 0b 9c e9 d4 6a e6 6d db d7 74 a8 c2 b2 2b 2e 99 | c1 be 2c 7e b9 9a 61 61 42 22 a8 96 77 9d c3 f9 | 9b eb 60 04 cc 7a e8 a6 1b 7a bb 42 2e 5c de 12 | 29 00 00 24 89 93 ef 63 4b 32 f6 be 90 74 d4 cc | df 00 dd 1b b5 27 60 b1 da 93 3c e5 82 5c 18 d4 | 92 56 47 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 b3 01 11 26 92 0f 1e 78 d6 0c e4 | b7 13 47 be 6e 37 68 a6 00 00 00 1c 00 00 40 05 | 24 f3 9b 24 06 cb fe aa 4a 7c a0 cb 8e 4b 56 de | 28 62 03 f5 | libevent_free: release ptr-libevent@0x7fb37801fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37800cc10 | #276 spent 0.191 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 d8 09 67 95 19 ff f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #276 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #276 | rejected packet: | 97 d8 09 67 95 19 ff f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #276: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0811 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cc10 | handling event EVENT_RETRANSMIT for parent state #475 | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #475 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #475 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49682.9583; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500712 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37800cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #475 | libevent_malloc: new ptr-libevent@0x7fb37801fd50 size 128 "road-eastnet-nonat-223" #475: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #475) | f3 25 a8 40 a9 16 90 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 fc dc 84 62 e7 1f 29 92 4f 29 58 18 7b 3f c4 | 0b 92 35 41 3d 7d f5 49 ac e4 08 33 00 55 13 7e | 41 c8 1f ab 98 7a 30 c3 af c3 cf 6c 36 f8 c9 eb | 2e 6e a4 90 d5 52 a2 8a 0e 83 47 aa 06 91 44 23 | e7 ef 3d 2e 37 19 57 6f 45 ce 1d 86 c2 e7 46 ee | 18 2a 29 c4 ec 14 a5 7f 72 bc 78 02 59 a2 ca 1d | b2 b0 a4 5c 1b 84 48 bf bd 56 e0 d5 a2 ad cf a0 | ed 67 0d 74 38 b9 ba e0 64 fd 1a b6 82 cc d6 8a | 07 94 d5 49 9d 7f 16 e0 7c 51 29 17 d6 08 40 72 | fd c6 fa 75 b2 47 30 6b 15 b9 55 b9 02 dd d8 c4 | c6 0d e1 61 7d 87 80 e1 c1 30 9f 40 92 6e 85 e9 | ef ce 2d ce 71 79 64 d3 dd 63 ec db 24 83 38 23 | 73 f2 c1 e6 cf bd 52 ef 73 4d 97 4a 32 ac ae 30 | 6c 19 3c 8f 59 15 1c e0 c6 b3 5b a5 c9 da d5 d9 | 5d 32 c2 2c c5 8a 99 8b d0 ac 6f 05 fa 9a 82 9e | fa 91 c3 17 c1 28 24 70 4e 52 7c 04 70 68 57 b3 | 29 00 00 24 d6 06 09 cd b7 26 a0 ec bf 9a 6e 13 | e8 2b d8 44 aa f3 29 4e 9f 5a e2 23 56 33 79 1c | 13 aa 41 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 5a 5b 76 80 70 09 57 e9 61 f5 b2 | db 52 90 c9 67 ea 13 33 00 00 00 1c 00 00 40 05 | 6b c7 4e 4d 75 42 5c 91 03 17 f3 17 f4 9d bf bf | b8 92 f0 13 | libevent_free: release ptr-libevent@0x7fb36001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cc10 | #475 spent 0.128 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 25 a8 40 a9 16 90 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #475 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #475 | rejected packet: | f3 25 a8 40 a9 16 90 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #475: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0577 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b11680 | handling event EVENT_RETRANSMIT for parent state #383 | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #383 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #383 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49682.976553; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004491 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cc10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #383 | libevent_malloc: new ptr-libevent@0x7fb36001d920 size 128 "road-eastnet-nonat-131" #383: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #383) | 8b a9 fc 25 06 93 a1 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 48 8c d9 3d c6 b0 61 39 4e 19 f7 86 b1 e2 c3 | 03 ba 84 78 9c c4 77 a1 7d 57 91 f5 ae c2 ed b8 | 0b 61 98 04 6f 72 68 b3 63 3d b6 20 12 b2 50 10 | 3d 3c 00 1d b9 ab be 72 ac ba 93 14 3b b2 a4 c2 | 8e b0 47 ba 98 bb 5c 2b e4 da 7c 8d a4 4a d6 89 | a4 b6 36 de 0f 18 04 bb fc 9c 28 b5 1a ee c2 7a | 18 c6 24 27 71 17 17 60 ca 39 4e 5f 5b 71 71 ab | e4 cd 79 1b 79 6b 31 46 63 bb cd 82 d7 96 72 86 | 1d fc 72 1c e4 a4 16 04 29 1f 9e b6 3a fd 62 30 | f1 da dd 12 af 8e 61 c7 51 15 f6 a4 66 22 64 42 | ef d3 2c 09 00 94 20 e3 33 79 f3 1d c7 7c 4e 79 | a7 a8 2d ec 91 f0 bb fb ff 6c 89 63 ff 5d a6 dc | 2c c3 c7 01 d9 71 f9 87 28 4c e4 de 91 08 4b 02 | b3 28 ae a1 4d 26 42 63 01 7b d1 2e 68 17 e3 a7 | 0a 0b eb 5c 62 18 33 2f d3 a6 c9 6b 3c a2 aa a0 | f6 fc 0d 55 8c 1d 7c d8 f9 bd 77 28 68 1c b3 05 | 29 00 00 24 c7 43 5d 92 21 cd 92 00 ce 48 5a 41 | bc 51 f7 9c 7c 73 79 39 5d 67 8e 5d 0e b9 e5 ea | f1 7d 01 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 9e 11 98 e3 85 61 70 79 85 31 a8 | 4f a4 76 88 f9 86 57 fe 00 00 00 1c 00 00 40 05 | fb 7f 30 9d 57 51 30 a9 24 b7 71 f5 04 63 5f 8a | f8 68 fc 05 | libevent_free: release ptr-libevent@0x7fb338048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b11680 | #383 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b a9 fc 25 06 93 a1 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #383 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #383 | rejected packet: | 8b a9 fc 25 06 93 a1 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #383: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12c00 | handling event EVENT_RETRANSMIT for parent state #227 | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #227 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #227 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49682.988855; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010208 exceeds limit? YES "road-eastnet-nonat-227" #227: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-227" #227: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #479 at 0x557d46b088c0 | State DB: adding IKEv2 state #479 in UNDEFINED | pstats #479 ikev2.ike started | Message ID: init #479: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #479: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #479; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-227" #479: initiating v2 parent SA to replace #227 | using existing local IKE proposals for connection road-eastnet-nonat-227 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 479 for state #479 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b11680 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #479 | libevent_malloc: new ptr-libevent@0x7fb338048a10 size 128 | #479 spent 0.0691 milliseconds in ikev2_parent_outI1() | RESET processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #227 ikev2.ike failed too-many-retransmits | pstats #227 ikev2.ike deleted too-many-retransmits | #227 spent 2.57 milliseconds in total | [RE]START processing: state #227 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-227" #227: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #227: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #227 "road-eastnet-nonat-227" #227: deleting IKE SA for connection 'road-eastnet-nonat-227' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-227' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-227 | State DB: deleting IKEv2 state #227 in PARENT_I1 | parent state #227: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 5 resuming | crypto helper 5 starting work-order 479 for state #479 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 479 | stop processing: state #227 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb338035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c00 | in statetime_stop() and could not find #227 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-227 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-227" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-227' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-227" | stop processing: connection "road-eastnet-nonat-227" (in initiate_a_connection() at initiate.c:349) | spent 0.0755 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 479 time elapsed 0.000559 seconds | (#479) spent 0.559 milliseconds in crypto helper computing work-order 479: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 479 for state #479 to event queue | scheduling resume sending helper answer for #479 | libevent_malloc: new ptr-libevent@0x7fb344039b40 size 128 | crypto helper 5 waiting (nothing to do) | processing resume sending helper answer for #479 | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 479 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #479 | **emit ISAKMP Message: | initiator cookie: | cf d2 c5 54 f4 1c f6 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-227 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f8 7f 14 60 4b 10 9d d5 d2 57 b0 91 8f 3f bc 64 | ikev2 g^x f3 21 66 f1 3b 94 f5 72 55 1b ed c6 dd 53 3b 05 | ikev2 g^x c0 1d dd be ad b9 bd d8 0b 5f 4b e3 1c 65 1f 4d | ikev2 g^x f0 ee 1b 33 c4 3a 9d de 12 12 f6 89 59 76 db 59 | ikev2 g^x 58 77 c4 51 cb 4f 4e a0 dc fb d2 f7 62 b4 a7 a3 | ikev2 g^x 1b 68 cb bb e9 09 d6 f0 e4 6b 8d 72 c7 c4 14 34 | ikev2 g^x 39 ae 8e 61 09 3a 83 2f f5 f4 c7 5f d2 2d b0 d4 | ikev2 g^x 26 d7 e0 79 26 1d 45 4b 13 c4 86 65 f4 ae 01 81 | ikev2 g^x 02 a6 0e b2 43 b5 c9 34 60 91 47 c7 ad 72 96 75 | ikev2 g^x c1 19 c1 36 df fe 89 e5 4a ed b6 37 c9 47 46 4a | ikev2 g^x ec 4d e3 1d 06 24 05 ec 83 47 39 85 ec 30 13 7d | ikev2 g^x 3c 3d d1 56 09 9f a0 06 ca 9a 1a b3 23 55 50 9a | ikev2 g^x b8 7d cc bd 04 23 e1 7e 80 5a 10 c7 17 c0 8f 7a | ikev2 g^x 89 c6 a1 6e 48 75 0a bf 79 1f 97 1f 66 26 95 b2 | ikev2 g^x 3f 11 75 2c 3f 93 e4 16 06 22 12 43 49 c5 4b bb | ikev2 g^x 85 1e 39 53 e2 84 3e 8e cf ad ff a8 7d 04 99 42 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ce ca 8a 00 13 b6 bd c6 7f bf 18 48 13 5d 00 cd | IKEv2 nonce e5 1d be f3 d6 a7 2f 7b 66 35 3d e6 f4 91 6b 6a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cf d2 c5 54 f4 1c f6 86 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e3 | natd_hash: port= 01 f4 | natd_hash: hash= 82 e1 6d ff 62 21 60 0d e9 4e cd 21 6e a6 95 f9 | natd_hash: hash= 84 a3 ab 9c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 82 e1 6d ff 62 21 60 0d e9 4e cd 21 6e a6 95 f9 | Notify data 84 a3 ab 9c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cf d2 c5 54 f4 1c f6 86 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c0 97 f9 bf 8a bc 59 d7 d0 0f 34 34 05 ac 6e 13 | natd_hash: hash= dc 84 e0 81 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c0 97 f9 bf 8a bc 59 d7 d0 0f 34 34 05 ac 6e 13 | Notify data dc 84 e0 81 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #479 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #479: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #479 to 4294967295 after switching state | Message ID: IKE #479 skipping update_recv as MD is fake | Message ID: sent #479 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-227" #479: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.227:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #479) | cf d2 c5 54 f4 1c f6 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 7f 14 60 4b 10 9d d5 d2 57 b0 91 8f 3f bc 64 | f3 21 66 f1 3b 94 f5 72 55 1b ed c6 dd 53 3b 05 | c0 1d dd be ad b9 bd d8 0b 5f 4b e3 1c 65 1f 4d | f0 ee 1b 33 c4 3a 9d de 12 12 f6 89 59 76 db 59 | 58 77 c4 51 cb 4f 4e a0 dc fb d2 f7 62 b4 a7 a3 | 1b 68 cb bb e9 09 d6 f0 e4 6b 8d 72 c7 c4 14 34 | 39 ae 8e 61 09 3a 83 2f f5 f4 c7 5f d2 2d b0 d4 | 26 d7 e0 79 26 1d 45 4b 13 c4 86 65 f4 ae 01 81 | 02 a6 0e b2 43 b5 c9 34 60 91 47 c7 ad 72 96 75 | c1 19 c1 36 df fe 89 e5 4a ed b6 37 c9 47 46 4a | ec 4d e3 1d 06 24 05 ec 83 47 39 85 ec 30 13 7d | 3c 3d d1 56 09 9f a0 06 ca 9a 1a b3 23 55 50 9a | b8 7d cc bd 04 23 e1 7e 80 5a 10 c7 17 c0 8f 7a | 89 c6 a1 6e 48 75 0a bf 79 1f 97 1f 66 26 95 b2 | 3f 11 75 2c 3f 93 e4 16 06 22 12 43 49 c5 4b bb | 85 1e 39 53 e2 84 3e 8e cf ad ff a8 7d 04 99 42 | 29 00 00 24 ce ca 8a 00 13 b6 bd c6 7f bf 18 48 | 13 5d 00 cd e5 1d be f3 d6 a7 2f 7b 66 35 3d e6 | f4 91 6b 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 e1 6d ff 62 21 60 0d e9 4e cd 21 | 6e a6 95 f9 84 a3 ab 9c 00 00 00 1c 00 00 40 05 | c0 97 f9 bf 8a bc 59 d7 d0 0f 34 34 05 ac 6e 13 | dc 84 e0 81 | state #479 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb338048a10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b11680 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #479 | libevent_malloc: new ptr-libevent@0x7fb338035930 size 128 | #479 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49682.989937 | resume sending helper answer for #479 suppresed complete_v2_state_transition() and stole MD | #479 spent 0.317 milliseconds in resume sending helper answer | stop processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb344039b40 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cf d2 c5 54 f4 1c f6 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #479 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #479 | rejected packet: | cf d2 c5 54 f4 1c f6 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e3 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #479: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368025320 | handling event EVENT_RETRANSMIT for parent state #461 | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #461 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #461 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49682.995133; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003259 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344017ea0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #461 | libevent_malloc: new ptr-libevent@0x7fb344039b40 size 128 "road-eastnet-nonat-209" #461: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #461) | 30 e3 71 39 78 d7 e3 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 73 72 eb a6 69 8c 9e 08 28 d6 16 78 8b f3 f1 | 10 b5 c6 3e 5a 68 ff ee f8 e9 ea 04 9a 96 07 cd | 19 7e 01 3e f6 8c ec 23 90 c5 34 cb 27 e1 d9 f4 | 83 f1 52 a0 20 79 82 b5 63 bf e3 1e 4c 8b e6 11 | 56 0c 8d 37 3e 34 a4 1e 35 3f f2 4f c6 52 63 33 | 1a 19 3a f7 47 1a 58 cf 14 be b6 13 3a ba 6a 7a | c2 7e 4a 7c 6b 24 bd 5d d6 f1 53 6b d9 1a c9 0e | b4 0c ad ca 0d 87 78 f9 58 81 24 7b 64 ae 92 0f | 11 e7 db e4 1c 12 40 ed e3 44 f4 22 a9 cb c8 e8 | 35 d2 0f 26 8c e9 f0 bd 79 b3 71 e1 56 b6 c2 ad | c3 25 0b 24 c0 9d 7c 39 2c c7 c4 5c 79 bb 71 e2 | 44 92 14 47 75 57 f7 30 ac 8e 27 b4 ce 61 8d 65 | 5b 3f 84 a2 85 6e ec 1f 9f 60 e7 ef bd 5d a7 fa | a6 23 27 f3 06 ac 82 f0 e3 4d 76 a2 d3 e2 92 c2 | 69 39 39 eb 52 01 f2 b3 9d c1 f3 c5 d2 36 e4 c6 | 40 e0 76 99 a0 7e 6e 0f 65 8c da 02 f1 c2 ad 1e | 29 00 00 24 90 76 1f 57 9b 42 3c 9c 17 4b 00 94 | e5 bc 1a a6 9f 85 30 49 d6 5f c0 4c ce 00 c3 85 | 0f 0e 5c ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 76 5f 86 b3 2d 97 ef 5b 1d 05 17 | f4 c4 b8 ec 0d 36 f1 03 00 00 00 1c 00 00 40 05 | 57 06 a0 ca 17 47 48 ab cc 80 4d 50 ec 37 d9 01 | a5 d0 9e bc | libevent_free: release ptr-libevent@0x7fb36802ee40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368025320 | #461 spent 0.0968 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 e3 71 39 78 d7 e3 f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #461 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #461 | rejected packet: | 30 e3 71 39 78 d7 e3 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #461: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa1f00 | handling event EVENT_RETRANSMIT for parent state #277 | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #277 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #277 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49683.037436; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005122 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368025320 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #277 | libevent_malloc: new ptr-libevent@0x7fb36802ee40 size 128 "road-eastnet-nonat-25" #277: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #277) | ed b4 5b 7c 9c f8 2d 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 91 10 6d ca 19 82 3a d9 60 7a 42 28 66 35 e5 | 82 e1 76 6a af 41 1a 40 79 5a ee 26 e3 d1 7d 52 | 03 12 d2 f6 99 41 6c 71 1c 80 6b 42 ba dc 3a 1b | b2 e9 12 a6 18 73 56 76 a4 06 05 cc 7a a0 0d 6d | 5e b3 80 19 f7 55 aa 2e 78 b1 66 56 9c 95 5c 32 | ad 95 eb b3 ba 95 95 ac ab 11 2a 2d 88 4f f4 e4 | dc 27 65 85 9d 92 a4 95 34 90 00 dd a5 be b5 ab | 9b 9f 39 46 28 33 16 41 a9 bb 12 e3 aa e6 53 f9 | 68 46 b2 9f c5 cd e9 27 33 0f ce 44 2d af d9 1b | dd 62 0d ac 4f 6c d0 11 3c 43 0a 76 ed 0e 96 8e | 3d ae f9 37 d9 67 c1 41 28 1d b6 2e 37 94 9e d3 | 2d cd 56 12 85 bb 68 4b bc 82 79 db 1e 4d bb bf | 84 00 46 a4 83 fb 2f 52 63 fc 2d 22 07 38 b8 c2 | 10 b3 b9 89 01 dd 44 99 e7 b8 0d b3 ff 24 4d 13 | b0 46 f4 b8 d8 19 4c 50 4a 18 69 03 39 b2 07 55 | 2b c7 e7 99 0d e8 a0 4f a8 e9 77 f9 b1 03 fa af | 29 00 00 24 29 c9 81 60 c0 da c9 2a 2b e1 7f 4a | cf 46 c4 64 f1 f4 1c 69 ff e2 b3 05 a6 db d8 66 | 75 2e e0 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 88 a4 31 ce f7 11 c3 38 da 2b 8a | 45 3d 50 97 02 58 67 d6 00 00 00 1c 00 00 40 05 | 85 8b 47 13 68 9a a2 a7 47 76 c4 a7 6b ba 26 12 | 0d c2 32 9d | libevent_free: release ptr-libevent@0x7fb3740356e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa1f00 | #277 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed b4 5b 7c 9c f8 2d 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #277 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #277 | rejected packet: | ed b4 5b 7c 9c f8 2d 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #277: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38800f8f0 | handling event EVENT_RETRANSMIT for parent state #384 | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #384 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #384 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49683.038713; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005266 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa1f00 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #384 | libevent_malloc: new ptr-libevent@0x7fb3740356e0 size 128 "road-eastnet-nonat-132" #384: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #384) | 86 6f ae 12 4d c0 7a b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d b1 fb 85 46 e4 0b ed 3a 09 27 c9 1d d0 fe 19 | 7a 6b 17 bb 62 8e 54 ac f1 64 67 34 40 ff 38 85 | 4f ff 54 1e 02 a7 af 76 91 63 95 f0 62 9e e7 68 | d4 07 2d a5 05 78 38 e6 00 65 3b 0c 3b 55 b9 34 | 19 27 7d 5e 1b 1f d1 f1 b8 c6 a4 32 36 a3 a1 4d | 77 fc 92 08 8e 44 1c 7b 72 a0 4a 6f ff ad 86 71 | 79 52 e6 49 b1 8f 12 9c 40 bc ec da 58 c7 66 8c | df 54 c1 66 96 41 fb 21 bc f2 5f 23 6c 52 ad 47 | c4 d3 9c 32 fb 09 e2 cc 47 c2 4b 3f 71 c2 e6 99 | 6d b7 94 23 a5 4c 0a 3c be 0e b2 50 04 86 41 e3 | 7a 9c 55 d1 3b 34 0c 3c 9f fd 4c f5 09 73 9f 60 | 56 d6 11 97 6a c5 df ef fe 2f 35 ee 63 fe 39 b0 | 29 b4 b3 01 1b 35 ff 91 b5 b4 bf 86 5f 29 e0 72 | 9b d7 f8 07 0a dc 66 0d 27 38 bb fd d4 42 1b 97 | 0e e9 cb d0 75 c1 5f 7b 20 8d a3 bd 9c d8 be df | 08 8a d8 c8 72 8d 2e 70 0c 78 7d 99 d6 b0 fe c1 | 29 00 00 24 dd a5 d7 0d 86 0a ce 46 70 f7 a4 d8 | 79 8d ab 0d 5a ba 15 d4 6b c1 b8 d3 f7 39 89 32 | f9 a6 bc c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 0a a8 53 d7 f6 23 14 8d 14 98 5a | ec 27 4c a0 59 56 95 73 00 00 00 1c 00 00 40 05 | 5b d2 62 5b 9b b5 2e 9c 89 b9 50 27 01 71 4f 1d | 99 42 bf 80 | libevent_free: release ptr-libevent@0x7fb388037a30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800f8f0 | #384 spent 0.0915 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 6f ae 12 4d c0 7a b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #384 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #384 | rejected packet: | 86 6f ae 12 4d c0 7a b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #384: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0487 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378012bf0 | handling event EVENT_RETRANSMIT for parent state #441 | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #441 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #441 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49683.039976; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005319 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800f8f0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #441 | libevent_malloc: new ptr-libevent@0x7fb388037a30 size 128 "road-eastnet-nonat-189" #441: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #441) | 51 22 97 d4 f1 aa 56 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 2c c6 09 06 fb 75 c9 7f c8 2c f2 78 2e 86 cf | 10 e2 71 84 ec 7a d3 00 3b 70 b4 67 49 a1 3c 4d | 21 45 e6 9b ef ae 2b 06 a0 05 7e f8 20 46 fb f7 | 0f d4 3c 68 46 a5 74 b1 69 d3 27 26 91 1f fb ea | a2 29 d1 d5 ec 8d ba a9 55 81 7c dd 8b b0 d5 f0 | 65 df 87 db d6 24 b4 8d 72 d6 b9 0a a2 e0 30 fc | e4 5b 51 8c ab 49 74 dc 67 ef 9d ed b7 2a 83 35 | e7 01 ba 5c 14 ef fc c4 a3 30 10 68 67 0e 82 16 | 7d 82 bc d7 25 ec 2f c1 f6 97 ab 23 a3 9a b0 7c | d2 fc 27 3c 76 c0 04 de 3f f1 57 2b 49 24 75 a8 | f7 b1 cb 9a 6d 04 c0 ee c6 a3 f0 18 d5 7f 4e a7 | 2c 74 2c d5 e8 3f cd c9 69 5b b5 31 78 19 bb d1 | 32 75 82 1c 75 29 51 85 94 3b 48 0b 31 5b 51 f5 | 93 f5 fc 53 3a 80 c0 7f 4c 5e 8d 4e c5 a0 2e 05 | fd c5 76 9f 1a 22 f6 df 9c 77 35 ff d3 0b a0 5e | 73 0d 0d 92 2d ee d7 e3 ed 3d 6b a2 54 4a 19 9a | 29 00 00 24 9c 47 e2 58 3f 57 67 62 b6 2e 0d 3a | cb 75 8a b1 7d cd 2d 8e 6c 75 cc 2c b3 bd 9f b3 | c7 bf c7 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 c2 f5 08 e1 41 ca c3 a8 c7 5d b8 | 30 41 e7 b2 e6 39 d6 66 00 00 00 1c 00 00 40 05 | 92 32 df 91 6d 86 4c 91 9f c0 e2 90 d1 aa b2 8d | 1d 5c 17 a3 | libevent_free: release ptr-libevent@0x7fb348014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378012bf0 | #441 spent 0.0889 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 22 97 d4 f1 aa 56 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #441 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #441 | rejected packet: | 51 22 97 d4 f1 aa 56 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #441: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0411 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #471 | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #471 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #471 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49683.050214; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001422 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378012bf0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #471 | libevent_malloc: new ptr-libevent@0x7fb348014c70 size 128 "road-eastnet-nonat-219" #471: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #471) | 38 56 99 f6 a3 bb 25 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 88 5e 08 51 b9 62 c5 b6 68 5e 2f 6f 4f 31 ca 1e | 08 9e a2 c5 9c dd 5f fc 7a f4 89 f0 0b b5 e1 ae | ce aa 45 81 2c 95 5e ff 06 f3 6a c5 72 bf d7 48 | 2c ca 52 8b db 25 1b 5b 4e e1 9e 45 05 12 f0 3a | 8b 49 b1 e8 0f d0 bb 39 6c 00 4b 10 55 55 90 f1 | ba 94 0f e8 29 de 7e 8e 75 cf 84 46 0b 85 26 8f | fc de 6b 35 43 a0 ca 14 c9 c0 f7 23 df 3f 39 44 | 98 32 71 b3 fb 93 e6 df 1c 43 a2 c9 a0 c6 73 b4 | d7 9f 3f a9 0b f8 14 fb 29 eb 8f cf f7 a9 d2 3c | 3d 58 a0 39 7e fa 25 48 bc 4b 7f d7 1d e0 11 34 | f6 bf 55 8d 59 da 29 ac d8 c5 88 7a 76 ef 08 52 | 7c ac 5e 47 31 67 af 77 3e 74 07 65 f0 71 26 28 | 79 4d a8 21 1c fb 74 e9 6b f8 d5 df d3 80 71 f9 | 81 36 25 59 61 8d e4 66 0e 09 70 cd be 73 f3 c8 | c4 06 a2 0f 1e 6d 0f ec 2b 18 85 83 48 df f6 99 | 6d 3a 12 52 38 a5 9e 5e 41 a3 52 37 e7 64 a4 6a | 29 00 00 24 92 4d df ea 0a bb c1 4f 13 fb 92 4b | 10 dc b9 f4 e6 b4 8b 01 64 45 6e db 5a 13 b9 8e | 86 b6 57 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 76 c9 73 0c 16 7b 39 f7 77 ab 9f | f0 85 70 80 7e c2 64 d2 00 00 00 1c 00 00 40 05 | 35 b3 a5 34 11 ae 1a 69 08 cc 74 f0 71 15 8c b8 | eb 5a 8d 90 | libevent_free: release ptr-libevent@0x7fb370035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #471 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 56 99 f6 a3 bb 25 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #471 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #471 | rejected packet: | 38 56 99 f6 a3 bb 25 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #471: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8ee00 | handling event EVENT_RETRANSMIT for parent state #462 | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #462 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #462 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49683.06951; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004568 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #462 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 "road-eastnet-nonat-210" #462: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #462) | b3 aa 18 e3 bb 76 cd a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 e1 dd 76 b8 92 08 2e 86 ea 59 23 d7 a8 a3 c4 | 10 20 64 4d 1a 6e f6 be 88 38 70 1d ff a1 81 97 | 56 46 d0 11 ce c6 71 4d d3 b8 e9 f6 8f 98 00 29 | 10 68 fe 2f 6a fe 59 74 05 66 7b 78 d6 d0 be bd | fb fc 90 3b 61 ee 5a 02 67 1c cb 53 c4 30 e1 1c | e1 cf 60 fe b2 ba b8 12 9c c1 21 b7 9c a2 2e d3 | f2 85 29 0d c8 10 98 b2 a9 8d 09 29 1f fe 72 bd | 6f ac bd 80 e6 e9 9d 07 a0 84 25 09 ab 49 d1 fc | a4 e5 0d 0e 5a 9c 8e d8 0e 96 4d 74 82 a0 b4 18 | 38 39 81 2c 56 26 db 6b e0 e9 32 19 24 e6 ac f3 | 8a 50 27 76 e7 46 84 40 39 2a 33 e3 46 30 98 1e | a4 e6 6f e2 bf e7 be a6 d5 b2 77 f8 b0 8c 25 cb | 3f 99 0a 63 88 e2 f4 8e b0 ed 00 10 7f f7 a6 31 | 7b da 9a 1a 53 83 49 e7 c5 ae 8b 25 41 9e cd 02 | 64 ab a9 c7 ab 71 01 ef 57 dd 6f c5 35 5b 12 e5 | 9c 28 f2 35 96 11 0c e1 05 5e 94 47 29 58 9d 96 | 29 00 00 24 9f cd 6b 85 44 66 e6 2e a2 be db 56 | e9 91 ac b0 be 57 bf 5f a7 03 66 4a a0 9b 90 be | 3c 13 94 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 1b 11 78 68 c9 76 e3 37 8a 0f 7e | ca ac 37 4e 36 55 96 e1 00 00 00 1c 00 00 40 05 | 75 7d 89 5c 82 a5 9e b6 a0 43 f2 ed 22 d9 e8 25 | c0 74 c1 73 | libevent_free: release ptr-libevent@0x7fb374024f80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee00 | #462 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b3 aa 18 e3 bb 76 cd a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #462 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #462 | rejected packet: | b3 aa 18 e3 bb 76 cd a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #462: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0762 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac5400 | handling event EVENT_RETRANSMIT for parent state #228 | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #228 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #228 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49683.083867; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009509 exceeds limit? YES "road-eastnet-nonat-228" #228: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-228" #228: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #480 at 0x557d46b09e80 | State DB: adding IKEv2 state #480 in UNDEFINED | pstats #480 ikev2.ike started | Message ID: init #480: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #480: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #480; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-228" #480: initiating v2 parent SA to replace #228 | using existing local IKE proposals for connection road-eastnet-nonat-228 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 480 for state #480 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a8ee00 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #480 | libevent_malloc: new ptr-libevent@0x7fb374024f80 size 128 | #480 spent 0.0881 milliseconds in ikev2_parent_outI1() | crypto helper 3 resuming | RESET processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 starting work-order 480 for state #480 | start processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #228 ikev2.ike failed too-many-retransmits | pstats #228 ikev2.ike deleted too-many-retransmits | #228 spent 2.8 milliseconds in total | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 480 | [RE]START processing: state #228 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-228" #228: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #228: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #228 "road-eastnet-nonat-228" #228: deleting IKE SA for connection 'road-eastnet-nonat-228' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-228' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-228 | State DB: deleting IKEv2 state #228 in PARENT_I1 | parent state #228: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #228 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 480 time elapsed 0.001064 seconds | libevent_free: release ptr-libevent@0x7fb354035930 | (#480) spent 1.07 milliseconds in crypto helper computing work-order 480: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 480 for state #480 to event queue | scheduling resume sending helper answer for #480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac5400 | libevent_malloc: new ptr-libevent@0x7fb338048a10 size 128 | in statetime_stop() and could not find #228 | crypto helper 3 waiting (nothing to do) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-228 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-228" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-228' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-228" | stop processing: connection "road-eastnet-nonat-228" (in initiate_a_connection() at initiate.c:349) | spent 0.0608 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #480 | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 480 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #480 | **emit ISAKMP Message: | initiator cookie: | a0 d0 03 15 77 7b 55 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-228 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 49 81 bc 92 43 cc 20 cb 32 dc a3 83 a6 05 ad 00 | ikev2 g^x 98 6a 1a f3 68 9d 6f 0d 87 ec e9 f6 9a 02 0f 25 | ikev2 g^x 1f da 1c 78 f1 67 23 e0 e2 7f 61 43 d9 1f 5f b6 | ikev2 g^x e6 b8 f2 3c ff c1 08 c4 9f 6c 2a bc 8e ba 45 54 | ikev2 g^x 84 19 36 a3 17 42 a8 a4 75 a3 82 0a 1c 91 e1 7c | ikev2 g^x b0 f8 bf b5 fa 9f 83 82 f9 d4 70 3e e1 df 4f 6b | ikev2 g^x 6b 5d aa 23 00 ad 45 7c d2 ab 83 9c d3 c8 48 f4 | ikev2 g^x a4 1e f5 9c 86 61 b3 f2 25 c7 70 01 ac 67 7a b7 | ikev2 g^x f7 4a 5c 1c 8e 8e 59 fc 33 71 85 33 b4 10 65 ea | ikev2 g^x b8 c2 b9 0f e6 63 11 67 85 ad 57 f7 4e c8 76 85 | ikev2 g^x f8 97 7d db 2b b8 ed 1b 8b 66 54 1e 04 fc 55 3a | ikev2 g^x c8 bb b6 a6 8a 5c 4e fe c9 53 36 0e 42 74 0e b7 | ikev2 g^x bd d3 59 78 0c df 94 62 fd c2 21 a4 0c fb 4f 6c | ikev2 g^x 1c 91 d6 a4 ec 87 92 d0 8f 1e 01 93 bd 89 c0 fe | ikev2 g^x 71 01 53 5c 6f 46 39 61 8b 59 d6 4d 65 9b d8 a3 | ikev2 g^x 15 32 57 28 19 30 26 21 35 36 08 9b 79 f2 1a b0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c8 ff 1d 8a 8a c7 55 8b 0d 6e 9c 13 67 dd f9 00 | IKEv2 nonce d4 15 c8 78 b6 24 b1 bf aa 08 b9 85 7a e8 a9 36 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a0 d0 03 15 77 7b 55 b9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e4 | natd_hash: port= 01 f4 | natd_hash: hash= cb af 61 69 a2 a5 79 11 dc 03 2e 27 8e 1f c8 4a | natd_hash: hash= f0 b2 47 27 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cb af 61 69 a2 a5 79 11 dc 03 2e 27 8e 1f c8 4a | Notify data f0 b2 47 27 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a0 d0 03 15 77 7b 55 b9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 5a ba 74 8a e7 0f 7a 9b 13 6d 0a ce d0 eb db 09 | natd_hash: hash= a2 8a df 80 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5a ba 74 8a e7 0f 7a 9b 13 6d 0a ce d0 eb db 09 | Notify data a2 8a df 80 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #480 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #480: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #480 to 4294967295 after switching state | Message ID: IKE #480 skipping update_recv as MD is fake | Message ID: sent #480 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-228" #480: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.228:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #480) | a0 d0 03 15 77 7b 55 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 81 bc 92 43 cc 20 cb 32 dc a3 83 a6 05 ad 00 | 98 6a 1a f3 68 9d 6f 0d 87 ec e9 f6 9a 02 0f 25 | 1f da 1c 78 f1 67 23 e0 e2 7f 61 43 d9 1f 5f b6 | e6 b8 f2 3c ff c1 08 c4 9f 6c 2a bc 8e ba 45 54 | 84 19 36 a3 17 42 a8 a4 75 a3 82 0a 1c 91 e1 7c | b0 f8 bf b5 fa 9f 83 82 f9 d4 70 3e e1 df 4f 6b | 6b 5d aa 23 00 ad 45 7c d2 ab 83 9c d3 c8 48 f4 | a4 1e f5 9c 86 61 b3 f2 25 c7 70 01 ac 67 7a b7 | f7 4a 5c 1c 8e 8e 59 fc 33 71 85 33 b4 10 65 ea | b8 c2 b9 0f e6 63 11 67 85 ad 57 f7 4e c8 76 85 | f8 97 7d db 2b b8 ed 1b 8b 66 54 1e 04 fc 55 3a | c8 bb b6 a6 8a 5c 4e fe c9 53 36 0e 42 74 0e b7 | bd d3 59 78 0c df 94 62 fd c2 21 a4 0c fb 4f 6c | 1c 91 d6 a4 ec 87 92 d0 8f 1e 01 93 bd 89 c0 fe | 71 01 53 5c 6f 46 39 61 8b 59 d6 4d 65 9b d8 a3 | 15 32 57 28 19 30 26 21 35 36 08 9b 79 f2 1a b0 | 29 00 00 24 c8 ff 1d 8a 8a c7 55 8b 0d 6e 9c 13 | 67 dd f9 00 d4 15 c8 78 b6 24 b1 bf aa 08 b9 85 | 7a e8 a9 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb af 61 69 a2 a5 79 11 dc 03 2e 27 | 8e 1f c8 4a f0 b2 47 27 00 00 00 1c 00 00 40 05 | 5a ba 74 8a e7 0f 7a 9b 13 6d 0a ce d0 eb db 09 | a2 8a df 80 | state #480 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374024f80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a8ee00 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac5400 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #480 | libevent_malloc: new ptr-libevent@0x7fb354035930 size 128 | #480 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49683.085524 | resume sending helper answer for #480 suppresed complete_v2_state_transition() and stole MD | #480 spent 0.321 milliseconds in resume sending helper answer | stop processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb338048a10 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 d0 03 15 77 7b 55 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #480 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #480 | rejected packet: | a0 d0 03 15 77 7b 55 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e4 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #480: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34000f1f0 | handling event EVENT_RETRANSMIT for parent state #385 | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #385 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #385 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49683.102718; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004872 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f40 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #385 | libevent_malloc: new ptr-libevent@0x7fb338048a10 size 128 "road-eastnet-nonat-133" #385: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #385) | dc 0d 67 a5 b0 49 95 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 d2 87 4f 28 1e d2 9a 8d 89 1b 83 29 19 de f5 | e6 63 09 2d e2 e9 61 46 d1 7b 1d 91 3c 38 a6 0f | e9 63 cf 58 08 13 3f 3e 7d f1 19 3d 13 fc 34 b5 | 18 8a e7 0c f9 3c 2c 71 b0 34 a4 05 97 a5 9f c7 | 97 d1 e4 25 37 22 ef 17 fb 52 35 c9 4f 1f 26 16 | 3c 2a 1f 00 10 3c df 46 38 33 44 5d a6 92 e5 d5 | 69 68 b5 76 06 e3 77 b8 1e 01 65 43 01 c9 86 ef | da 65 a5 1f 57 b0 00 8a de a9 34 23 2e 5c 26 a6 | a0 7f 44 a7 f5 75 dd 87 e1 fa 95 ca ff 5e 20 3b | 92 ff 19 e9 6e 3b 74 90 7d f7 38 58 ce a4 6e 3e | 22 98 35 57 a7 19 32 26 90 4e 72 85 8e fc 44 0f | e3 30 88 10 65 63 68 a3 81 e7 a5 04 d1 cf 06 2d | 36 a6 35 6b fb 1a c6 21 82 6b b4 50 a3 0b 89 0a | 70 f4 46 4d b9 30 8c 1b 9a a3 3e a4 57 bb 51 f0 | c0 0a 2a ca 36 ae b3 f0 02 3c c8 b5 bb 6a 7b 96 | 55 84 4d bb 15 b3 47 cf cd 45 3c 4a e8 4b 8f 89 | 29 00 00 24 90 a0 a9 10 09 5c 84 13 2a 39 8b 57 | c5 67 7f 3e 0b 64 03 36 1d 0d c2 a2 27 b3 44 c5 | 83 b2 09 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 9a 97 66 55 a8 9e d7 24 ff 14 54 | 09 c0 45 ac a1 60 51 9f 00 00 00 1c 00 00 40 05 | da 5c 4e 27 00 47 9e f2 1c fc 63 30 21 b4 79 d8 | 3b 38 4e b8 | libevent_free: release ptr-libevent@0x7fb34001e520 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000f1f0 | #385 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 0d 67 a5 b0 49 95 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #385 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #385 | rejected packet: | dc 0d 67 a5 b0 49 95 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #385: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_RETRANSMIT for parent state #278 | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #278 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #278 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49683.112991; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005604 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000f1f0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #278 | libevent_malloc: new ptr-libevent@0x7fb34001e520 size 128 "road-eastnet-nonat-26" #278: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #278) | 08 20 1d 54 94 b3 08 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 a1 ac cd cf 52 aa c1 15 fd 26 f6 ce 5b bb 69 | e2 24 51 98 69 82 96 7a 9b 39 3d bd 86 5c 17 cb | 1b d4 a9 83 ec 80 8d 8d 98 27 4b 99 f4 20 5c e3 | 21 59 7a 6e 94 3a e5 a4 ea 37 74 6c a3 9a 99 f4 | 8f 90 94 d4 bd 67 d7 b9 06 e3 7c d1 d3 76 37 58 | 47 a2 45 8a db 7e f9 85 d6 08 20 a6 bf 2b 7f c1 | 25 eb a0 f8 68 c1 9c c0 38 d2 e7 d9 43 7b cb 27 | 99 db 05 15 9d 31 4d 0f 10 f4 8b 1c a6 46 f5 eb | 21 00 56 37 46 de 0d 94 e5 1c 55 ca 89 03 da 88 | 4e dc 76 55 16 95 7d 63 e2 29 4d 09 2b 25 59 20 | f9 0f f3 3f f2 2e bd 84 bc f5 d7 26 2f 24 33 39 | 9b 95 39 a9 c8 80 99 61 48 09 51 76 c7 02 f7 7e | 9a 29 d4 87 ca 9f 9d b2 ea 2d 4b 02 ce 90 b0 a7 | 7e 1d de da 63 ea 0e 8d 96 e6 95 fb 1c 5e 88 3b | 6e ec 99 33 d7 e2 75 ac ca 10 ec 9b 00 5a c4 5e | 94 67 a1 9a 10 a7 22 d4 3e d5 55 a9 17 c5 c5 72 | 29 00 00 24 16 ad f5 49 a7 87 af 94 50 48 7a 22 | f4 eb b9 a7 0c 25 3c c9 61 3d 03 4a 9f 4c 8f 7c | d3 51 5e 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e fe 64 30 2d 54 01 ce c5 20 30 8e | 57 4b dd bc f4 7a 78 34 00 00 00 1c 00 00 40 05 | c5 ea 3a 3a ae 73 b8 b7 65 be 1b eb 5d 99 4d a3 | 57 6c 56 99 | libevent_free: release ptr-libevent@0x7fb364023a90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | #278 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 20 1d 54 94 b3 08 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #278 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #278 | rejected packet: | 08 20 1d 54 94 b3 08 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #278: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.115 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3940 | handling event EVENT_RETRANSMIT for parent state #476 | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #476 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #476 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49683.12237; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500152 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #476 | libevent_malloc: new ptr-libevent@0x7fb364023a90 size 128 "road-eastnet-nonat-224" #476: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #476) | 49 8c 7a 08 2e cc 2c 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 8e 65 66 a1 7b b1 8a 9d 19 04 71 0a 79 27 ce | 6b 54 47 32 ba 6e a8 65 c3 0d 42 b2 0f 96 a2 a0 | 61 e2 94 05 83 68 df 22 7a 41 44 d2 4f e1 67 a1 | 60 b4 59 da 81 10 89 57 9a 5f 7b e1 cb f8 3b 1c | 6b e5 1e 2a 7e 02 80 cb 9a b1 16 8c f4 74 52 c7 | 1b 8b b0 44 c6 c4 32 f3 a4 5d f0 73 3e b1 fa a1 | b2 71 e4 e2 5a 6e 52 66 e3 b8 09 2b 71 a1 10 d1 | 10 3c 31 b6 a5 93 a0 0f f1 c2 e3 a3 6b 1d 4a 8c | d0 ba 9f ac 0a e4 67 88 a7 bb ab 52 59 75 2a f3 | 7e 3d 81 45 67 16 9e 61 0a ee 09 44 27 d0 34 eb | a1 e6 bf 3e 15 23 17 f4 a9 f6 b0 c4 cb fa e4 c1 | c5 79 db 37 a8 57 54 eb d1 68 1c ef 18 56 41 83 | e2 52 4d 7d eb e3 4a db 5d d0 82 39 0c 54 56 aa | 04 9a 1e d5 4b e1 50 f6 49 eb 07 2f b8 68 4b 6e | ca 4e 01 63 ab c2 da 21 fb e2 14 e9 0d 0e ff 26 | 78 8b ff 8b 3a 63 7f c4 a4 eb a1 d4 bb 4b 60 67 | 29 00 00 24 04 bd 81 be 7c f6 28 8b 7d 46 a5 cd | 03 dc d6 e4 08 bf 60 ad d1 ef ac 3f a3 21 88 37 | 52 bb 5d 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 ab 9f 05 ae 62 3b 7f e7 ce 4f 13 | 2e 4b 82 3c e1 44 b7 89 00 00 00 1c 00 00 40 05 | f1 c5 d9 81 d6 d6 94 d2 dd 0e e2 5d 61 59 c7 43 | 61 40 b6 b1 | libevent_free: release ptr-libevent@0x7fb358035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3940 | #476 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 8c 7a 08 2e cc 2c 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #476 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #476 | rejected packet: | 49 8c 7a 08 2e cc 2c 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #476: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0457 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348012630 | handling event EVENT_RETRANSMIT for parent state #472 | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #472 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #472 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49683.151718; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001553 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3940 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #472 | libevent_malloc: new ptr-libevent@0x7fb358035930 size 128 "road-eastnet-nonat-220" #472: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #472) | 15 62 43 a0 4c 6d db c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 ef 66 93 1f d2 be 3f b4 cb c3 5b c3 cd ce ec | ef 45 09 15 86 85 a5 fc 63 a8 dc f9 dc 2c 7f da | ad 3c 83 29 23 b1 9e ba fe be f5 05 08 e8 8e 73 | c4 15 c3 1f 80 d3 d0 b8 24 be b3 4f dc ef b0 39 | e8 6c 73 46 ce 8d ab 67 58 96 e6 89 9c 38 0e cb | 1f b3 47 af cd e8 fe 49 e5 c0 25 80 77 35 f6 06 | 6d dc 03 76 f8 34 b8 8e 05 e2 62 37 7a 40 b0 47 | 1d 8d 55 22 fa 66 04 34 43 30 87 8a 3b 8d 56 07 | f3 21 a4 25 01 21 d4 52 d3 44 c4 73 d4 a8 a2 ea | 69 66 8c 26 ab 85 7b a0 65 5b 03 5d 74 e7 7a 63 | 38 e1 5f b3 a4 83 48 11 76 d7 fb 96 bd 94 81 0e | 12 85 94 cb 17 1c 9e 64 a5 e2 b4 c7 96 eb cd 62 | bb 15 1b 96 a4 fb c3 a8 a0 ae 37 79 52 a4 ec 21 | 73 e0 47 a7 95 56 ce d5 cc 94 10 bf a2 8a 93 dc | 7f ea 6c d5 98 4b fa 19 3a ac 5e 1f 78 6e 08 fc | fa 46 b2 55 22 d7 78 a7 75 be f4 63 29 44 fa cb | 29 00 00 24 19 33 9e e6 d2 ec 99 b2 2a d6 00 cf | c3 4d d5 a5 cb 9d 67 f4 f2 94 3f b0 a2 94 a8 ff | 01 8e 5d 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 f6 a8 c3 12 9d 73 0e 92 1b 13 62 | b1 83 e3 04 e0 b3 2c 1d 00 00 00 1c 00 00 40 05 | c3 d5 bb 6d 6e 36 db ca 5f b7 b2 05 dd 15 c3 8f | 20 6a e3 5f | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348012630 | #472 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 62 43 a0 4c 6d db c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #472 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #472 | rejected packet: | 15 62 43 a0 4c 6d db c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #472: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0725 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38000a290 | handling event EVENT_RETRANSMIT for parent state #442 | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #442 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #442 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49683.155094; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004505 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348012630 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #442 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 "road-eastnet-nonat-190" #442: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #442) | 87 5c d8 cc 20 15 ba 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 68 c7 3c 11 2f 9c 07 85 86 ab fd 70 b3 a3 4b | 4b 15 db 0c 55 63 48 ae b0 dc 7b 34 ba 58 39 54 | 81 cc 25 fd b5 c7 f7 39 e9 8f 2e f9 b9 70 0e c0 | 6c fd 85 d9 5d cd 9d f6 5f 5d 4e 86 38 b5 78 a7 | d8 3d 3d f5 25 e8 c6 56 da a5 38 73 cf 89 18 32 | cf c9 c3 46 fb 60 20 53 a4 ff ca 61 0a 1f ad 2b | a5 f9 d2 1b d5 73 db 29 4b af 73 16 1f 68 6e 88 | a8 b3 5c d6 b4 01 8a 06 65 2f a3 ad 76 14 68 68 | 9f cb 47 75 86 fb 98 94 58 0a 1b c8 87 0a bf b1 | 97 c2 17 ab 5f e8 c3 11 ea 6b b5 fc 83 10 e7 36 | 12 60 e6 87 bd 62 58 93 cb ac ef ca 4f 7f ed 7c | 32 f8 74 a9 e0 2b 69 44 cf b3 d9 33 28 7b 15 7d | 6b 78 11 47 ae a2 e0 8f 52 91 83 be f4 84 c7 17 | a5 b8 57 df 7a 32 65 6d 3b bd ca 10 c7 fb bf 39 | ca 7b 85 7d 49 00 cc 7c 5f b7 c2 27 37 c0 3c 03 | 4d 75 5e a1 e3 8a 16 a4 15 da ac 76 26 68 0c 96 | 29 00 00 24 bc 7d d1 02 e0 e7 26 b2 02 88 eb 9f | 6d cb 61 e3 66 23 89 34 b9 17 0a 11 8d c9 39 5d | 4a 6a d8 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b b4 fa 62 4d 88 e7 9c 8f 3a a9 82 | e0 af 15 4d 27 f2 cd 63 00 00 00 1c 00 00 40 05 | ff 91 89 9d d7 da 34 d7 9b a8 06 6f f9 4a 9b 25 | 2a 77 df 3e | libevent_free: release ptr-libevent@0x7fb380036d70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000a290 | #442 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 5c d8 cc 20 15 ba 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #442 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #442 | rejected packet: | 87 5c d8 cc 20 15 ba 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #442: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a94500 | handling event EVENT_RETRANSMIT for parent state #386 | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #386 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #386 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49683.161726; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004636 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000a290 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #386 | libevent_malloc: new ptr-libevent@0x7fb380036d70 size 128 "road-eastnet-nonat-134" #386: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #386) | b9 e2 f3 4f 37 4c 11 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f da ec b0 32 6b 35 e3 b5 80 95 66 e9 7f b8 d5 | e2 e0 68 33 cd 76 e0 38 1a b1 5d 56 26 da 9f e0 | 7e 25 7d 36 13 86 62 f1 2c 8d 3f 33 c2 a9 77 5c | 6c 22 2c d9 e8 13 05 5f 5c b6 bf 2d 06 59 25 68 | 04 0a 7e 77 39 77 e2 48 8e 95 f3 7a 6b 62 7a 5c | 74 73 02 c5 eb 3d 85 b2 e4 97 e2 a5 7e c1 fd bd | 8e 39 16 68 05 dd bf 87 fa 57 12 1c 04 ca 0c 29 | 8c f4 e1 ff dd 36 cf 70 de cd 23 dc c6 ae 0f aa | 3b 0f fa f5 80 72 1a cd 74 ba bc e4 a4 6c a0 e3 | 89 9a 36 59 db 27 b5 54 3f 8a aa cb ee 7a 4c 74 | 10 ef 6c 33 3c 46 b9 be 98 4b 1f 0c 9e a1 0f e7 | 70 9c 48 fc 41 5f bc 21 01 43 4c 8e f5 9c e5 23 | bb 93 4c ac ba 5c 01 89 9a 17 4a 24 a8 b9 2c 47 | 70 fc 07 f1 21 a4 d5 20 f9 8f f8 38 ce d5 70 b1 | 42 c9 99 11 ba 5a fc 0c 06 b5 ae ff af e4 68 aa | d7 82 77 58 85 4e fc 74 00 fa 00 8a 91 15 50 9e | 29 00 00 24 84 96 aa 5e b5 f6 6f 99 c5 43 c7 51 | b3 36 1c 3e 65 fe 9c e9 3e a8 cd 03 a7 c9 e1 a9 | 36 56 0e 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 80 4a c6 9c b6 70 28 5d 0a 3a 23 | 72 63 d0 38 6e f2 8f ca 00 00 00 1c 00 00 40 05 | 26 1f 03 bb d7 50 8e c5 c4 3f 03 d2 3a c8 fe 3b | 09 a1 da 1f | libevent_free: release ptr-libevent@0x7fb3380300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94500 | #386 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 e2 f3 4f 37 4c 11 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #386 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #386 | rejected packet: | b9 e2 f3 4f 37 4c 11 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #386: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0804 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350012bf0 | handling event EVENT_RETRANSMIT for parent state #279 | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #279 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #279 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49683.188152; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006248 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94500 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #279 | libevent_malloc: new ptr-libevent@0x7fb3380300e0 size 128 "road-eastnet-nonat-27" #279: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #279) | e3 74 db 6d 09 5b 39 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 0f 5a 1b 7a 8f ca c9 79 23 84 5e dc 90 86 16 | 69 23 cd b6 f6 38 83 88 87 a0 82 5d cb 87 94 7a | a5 f1 35 43 62 38 5c 18 da 06 83 48 7b 51 b2 80 | 57 ee 54 19 13 b6 1b 59 ab b3 f3 ce 4e 70 21 d2 | 1d 3f 07 6b c1 ad 15 8b 16 67 f3 79 c6 3f ee ff | 6b 97 0c 11 61 f6 68 6d 51 5b dc dc 69 1e f2 f8 | 31 6f 04 6f 19 7c a8 a9 37 a2 da ca be a8 40 a8 | d0 ef 42 ba be 70 25 1f 20 b2 dd 25 56 46 50 6a | 55 24 29 65 1f 8b ad 5a c0 f3 1f c2 6d ed 0d 17 | f8 37 85 23 72 0c 7b c5 c8 05 6a d0 1b 38 ca f1 | 63 79 aa 8b f0 75 7e c0 5c 06 26 d0 c2 20 b9 e9 | c7 89 2f ee 84 27 1c 00 f8 3a d5 7e 2a be c2 84 | e4 6a 7c 0c 25 65 bb 41 df ad ea 07 28 2c bc 6e | 24 1b 9a 66 f8 83 86 6a 84 b0 d9 93 6f e5 9a 01 | 17 24 34 ac 82 0a b8 a3 51 37 c3 89 94 09 92 d7 | 0d 37 14 e0 ee 1c 1b 73 ef 46 af cc fd ba 52 42 | 29 00 00 24 f9 6f e2 b3 2b d1 43 b4 d3 29 40 07 | 4f e9 c5 79 33 c1 2e 78 27 6c f8 54 58 c2 d9 c9 | 00 b6 d5 b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 94 ec 05 36 41 29 fa 93 f5 5d d2 | 39 00 ad d2 4d 2f 36 81 00 00 00 1c 00 00 40 05 | 7a 98 d6 69 28 79 15 19 95 89 31 96 52 96 29 94 | 7d 8f c3 a4 | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350012bf0 | #279 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 74 db 6d 09 5b 39 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #279 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #279 | rejected packet: | e3 74 db 6d 09 5b 39 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #279: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0454 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36001d710 | handling event EVENT_RETRANSMIT for parent state #463 | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #463 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #463 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49683.19744; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00241 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #463 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 "road-eastnet-nonat-211" #463: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #463) | 82 4f 79 37 d2 0d 41 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 90 64 a0 3a db 52 d6 c6 b4 21 5d 30 95 90 4d | ec 3e 65 f9 a3 2a c0 c0 7d e8 b2 f7 1e 08 f4 cc | 30 5c 17 eb a6 d5 4e 6e 17 f4 ed c0 bb f3 91 4e | 29 c8 3b 87 04 44 02 f9 0c 4c 73 bd d1 0e d4 bf | c3 01 38 a2 ee a1 61 19 01 62 c9 01 0a 14 69 dd | 59 d3 14 b1 8b 13 6d e7 0f 1d 11 59 11 9b 90 f3 | aa 66 ef 87 af 13 48 7f 6e c1 0d b9 f9 71 ad 9d | fd 12 e0 bc 30 d7 16 13 c9 f0 f8 64 57 36 fa 5b | d1 d8 74 64 e5 de 63 84 ef e1 12 12 26 93 3e 5c | b3 7f 8e 2c 1b eb d2 40 f2 01 5a e7 a8 30 ce b1 | 5c 5e 42 a8 26 40 52 c4 dc ea 04 68 87 26 50 e6 | 46 ae 37 b9 e4 fe 3f ef f2 8e a4 4f 04 25 af 76 | c9 39 80 05 08 fd ea 60 66 c5 24 89 72 f4 32 ff | ed 8b 39 48 50 c3 c4 68 91 e7 fc 82 bb 80 ce 9d | b8 47 ce dd c6 cc 21 8c 6f 88 e2 73 75 00 d9 09 | 84 88 f6 ce 7e 64 f7 42 86 d8 a7 50 3c 43 db 24 | 29 00 00 24 4c d8 7a cc cf f5 14 f0 01 a0 b3 f6 | 54 e1 4b f5 78 b9 2e d9 dd c8 bf f8 13 79 83 13 | b9 47 db df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 0d e0 3b 3f 2d f3 17 7e c2 11 72 | 87 7f c1 e4 a0 63 0f 3f 00 00 00 1c 00 00 40 05 | e9 2f a4 cf 6a af 14 cf 3c 1b bf 7a 8b a2 e8 94 | b0 6c 66 23 | libevent_free: release ptr-libevent@0x7fb36002ed90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36001d710 | #463 spent 0.0991 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 82 4f 79 37 d2 0d 41 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #463 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #463 | rejected packet: | 82 4f 79 37 d2 0d 41 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #463: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0668 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46910 | handling event EVENT_RETRANSMIT for parent state #229 | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #229 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #229 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49683.201718; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010814 exceeds limit? YES "road-eastnet-nonat-229" #229: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-229" #229: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #481 at 0x557d46b0b440 | State DB: adding IKEv2 state #481 in UNDEFINED | pstats #481 ikev2.ike started | Message ID: init #481: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #481: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #481; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-229" #481: initiating v2 parent SA to replace #229 | using existing local IKE proposals for connection road-eastnet-nonat-229 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 481 for state #481 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36001d710 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #481 | libevent_malloc: new ptr-libevent@0x7fb36002ed90 size 128 | #481 spent 0.0694 milliseconds in ikev2_parent_outI1() | RESET processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #229 ikev2.ike failed too-many-retransmits | pstats #229 ikev2.ike deleted too-many-retransmits | #229 spent 2.66 milliseconds in total | crypto helper 1 resuming | crypto helper 1 starting work-order 481 for state #481 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 481 | [RE]START processing: state #229 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-229" #229: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #229: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #229 "road-eastnet-nonat-229" #229: deleting IKE SA for connection 'road-eastnet-nonat-229' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-229' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-229 | State DB: deleting IKEv2 state #229 in PARENT_I1 | parent state #229: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 481 time elapsed 0.000578 seconds | (#481) spent 0.575 milliseconds in crypto helper computing work-order 481: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 481 for state #481 to event queue | scheduling resume sending helper answer for #481 | libevent_malloc: new ptr-libevent@0x7fb388041ce0 size 128 | crypto helper 1 waiting (nothing to do) | stop processing: state #229 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb364012740 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46910 | in statetime_stop() and could not find #229 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-229 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-229" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-229' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-229" | stop processing: connection "road-eastnet-nonat-229" (in initiate_a_connection() at initiate.c:349) | spent 0.0578 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #481 | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 481 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #481 | **emit ISAKMP Message: | initiator cookie: | e8 f0 49 b6 6a 16 76 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-229 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5b 5b 3d e6 1f 63 af 92 47 ff bb 34 96 d0 88 24 | ikev2 g^x 67 3c e1 47 18 9d 62 8e d3 a4 9d b7 75 51 2f 4d | ikev2 g^x c5 c0 85 26 a0 ef 6b 42 e3 31 89 58 06 3e 3f 70 | ikev2 g^x 40 68 5f 34 02 73 08 9e 17 dc ee 6e ae 64 70 e1 | ikev2 g^x 29 5c 9e 3f 09 58 a9 16 14 23 bb 74 7b 7f 22 34 | ikev2 g^x a9 d6 3f fe 74 0f 40 5a 32 4d ac 87 fc 80 7b d4 | ikev2 g^x 2d 54 ec f5 ce b0 c6 dd a4 dd 82 14 e2 9a 36 7e | ikev2 g^x 86 de 04 4a c2 4a 3a 27 d9 82 5e 6e f1 1d d8 3d | ikev2 g^x 86 d1 82 99 be f9 63 b2 56 5a 40 42 2e 8f 30 eb | ikev2 g^x fd db ce cc 5a ac 0e 49 65 64 01 18 b4 1e 60 8d | ikev2 g^x 74 bc e9 b7 46 2e cb e0 1e 2c 67 dc 3f e9 f4 39 | ikev2 g^x 35 52 90 76 39 0a f3 d2 ac 0b 00 19 f2 ca 97 20 | ikev2 g^x b7 c6 bb 7d a2 97 ba e5 14 74 e5 ea 2f 4e 4b 3f | ikev2 g^x 08 53 d9 be 3b dd af 2f 8f 10 fd 09 08 1e b3 13 | ikev2 g^x 6a 37 e4 ce 19 dd d9 84 13 76 b0 6f 6f 43 48 f7 | ikev2 g^x 01 a4 a9 0f 9d fb 63 aa 49 8a 2a b5 59 32 b2 69 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ba a6 3b 25 9f a9 3f 06 4e ea 48 38 eb e2 25 25 | IKEv2 nonce ca e3 dd 6c 01 6e 12 39 f8 cf ff e2 6d 18 2b 14 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e8 f0 49 b6 6a 16 76 36 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e5 | natd_hash: port= 01 f4 | natd_hash: hash= 8a ef 98 84 e9 40 8f 9c 0a de 34 0d 25 31 92 b5 | natd_hash: hash= ca c8 92 af | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8a ef 98 84 e9 40 8f 9c 0a de 34 0d 25 31 92 b5 | Notify data ca c8 92 af | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e8 f0 49 b6 6a 16 76 36 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 81 a9 90 20 77 ac 91 2d 88 99 0f 36 2d 43 7d f6 | natd_hash: hash= 2e 36 29 48 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 81 a9 90 20 77 ac 91 2d 88 99 0f 36 2d 43 7d f6 | Notify data 2e 36 29 48 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #481 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #481: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #481 to 4294967295 after switching state | Message ID: IKE #481 skipping update_recv as MD is fake | Message ID: sent #481 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-229" #481: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.229:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #481) | e8 f0 49 b6 6a 16 76 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 5b 3d e6 1f 63 af 92 47 ff bb 34 96 d0 88 24 | 67 3c e1 47 18 9d 62 8e d3 a4 9d b7 75 51 2f 4d | c5 c0 85 26 a0 ef 6b 42 e3 31 89 58 06 3e 3f 70 | 40 68 5f 34 02 73 08 9e 17 dc ee 6e ae 64 70 e1 | 29 5c 9e 3f 09 58 a9 16 14 23 bb 74 7b 7f 22 34 | a9 d6 3f fe 74 0f 40 5a 32 4d ac 87 fc 80 7b d4 | 2d 54 ec f5 ce b0 c6 dd a4 dd 82 14 e2 9a 36 7e | 86 de 04 4a c2 4a 3a 27 d9 82 5e 6e f1 1d d8 3d | 86 d1 82 99 be f9 63 b2 56 5a 40 42 2e 8f 30 eb | fd db ce cc 5a ac 0e 49 65 64 01 18 b4 1e 60 8d | 74 bc e9 b7 46 2e cb e0 1e 2c 67 dc 3f e9 f4 39 | 35 52 90 76 39 0a f3 d2 ac 0b 00 19 f2 ca 97 20 | b7 c6 bb 7d a2 97 ba e5 14 74 e5 ea 2f 4e 4b 3f | 08 53 d9 be 3b dd af 2f 8f 10 fd 09 08 1e b3 13 | 6a 37 e4 ce 19 dd d9 84 13 76 b0 6f 6f 43 48 f7 | 01 a4 a9 0f 9d fb 63 aa 49 8a 2a b5 59 32 b2 69 | 29 00 00 24 ba a6 3b 25 9f a9 3f 06 4e ea 48 38 | eb e2 25 25 ca e3 dd 6c 01 6e 12 39 f8 cf ff e2 | 6d 18 2b 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a ef 98 84 e9 40 8f 9c 0a de 34 0d | 25 31 92 b5 ca c8 92 af 00 00 00 1c 00 00 40 05 | 81 a9 90 20 77 ac 91 2d 88 99 0f 36 2d 43 7d f6 | 2e 36 29 48 | state #481 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36002ed90 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36001d710 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36001d710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #481 | libevent_malloc: new ptr-libevent@0x7fb364012740 size 128 | #481 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49683.202877 | resume sending helper answer for #481 suppresed complete_v2_state_transition() and stole MD | #481 spent 0.323 milliseconds in resume sending helper answer | stop processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388041ce0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 f0 49 b6 6a 16 76 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #481 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #481 | rejected packet: | e8 f0 49 b6 6a 16 76 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e5 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #481: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad4380 | handling event EVENT_RETRANSMIT for parent state #387 | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #387 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #387 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49683.221076; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005063 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388006950 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #387 | libevent_malloc: new ptr-libevent@0x7fb388041ce0 size 128 "road-eastnet-nonat-135" #387: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #387) | 75 6e e5 e5 6a cd b8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff a4 36 8a d7 5e f8 44 73 70 3f d1 cc 7c 79 90 | 0b d6 30 0a fd 2b 08 93 ae c4 9d c0 92 f3 30 c3 | aa 43 1a b6 dd 00 a6 77 0b 61 7f 7a 6d 22 60 10 | f1 8f 0a bd 4e 21 a1 c5 3c 6d bc 87 58 3a fc 28 | a1 f5 dc 41 f0 99 f6 3d 83 55 3c 93 36 df 67 78 | d6 16 47 a9 dd 0a f6 c9 ed 30 32 20 48 63 8f ce | 8c eb 37 37 cb 50 71 37 bd cb 4b f9 48 98 89 fb | 52 3f d5 c6 89 92 40 89 ae 52 a8 41 db 88 8d ad | 76 89 a2 2c 25 fd cd a1 b3 18 a9 52 92 ca 41 cc | be 86 7c 0a d4 fa d9 2c a1 ce 6b 87 5c 4f 0b a7 | e2 e7 b1 90 b4 88 13 15 0f 2d 50 24 a6 28 8e 8a | 81 90 02 66 38 1d 10 b6 04 db f1 15 7f 9a 7c eb | ec 94 ef 10 22 b8 7f a2 35 e6 24 56 5c e6 40 99 | 8b 09 81 82 27 99 96 55 ae 30 73 4e 23 e9 a5 45 | d0 57 f8 f9 3b 6c 05 9a 46 78 7d b3 62 a4 ed 17 | 2e 15 c3 a2 7d 0c 1c 89 e1 68 08 b6 03 09 76 f8 | 29 00 00 24 11 0e 4a cd 20 fc ce 84 68 c7 a8 ec | 48 5c fe b5 ee 21 2d ef c1 3f a3 a1 30 c1 c0 88 | b1 78 03 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 fb 47 16 eb 64 05 e3 af e5 70 ee | b4 39 fc 1b 30 12 e4 0b 00 00 00 1c 00 00 40 05 | d8 e1 2e 80 87 77 be 81 c0 a4 a8 f5 fc 15 8f 58 | 08 dc e4 8d | libevent_free: release ptr-libevent@0x7fb37002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad4380 | #387 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 6e e5 e5 6a cd b8 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #387 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #387 | rejected packet: | 75 6e e5 e5 6a cd b8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #387: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf00 | handling event EVENT_RETRANSMIT for parent state #443 | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #443 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #443 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49683.237454; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003326 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad4380 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #443 | libevent_malloc: new ptr-libevent@0x7fb37002a950 size 128 "road-eastnet-nonat-191" #443: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #443) | 99 e5 a7 37 44 6e 78 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 12 f7 51 e4 9b df 2b ce ce f2 ee 7b 13 94 51 | 6a dd a6 05 05 c5 f9 51 17 99 5e 09 04 c9 1f b2 | fd 1f 26 33 db d5 00 aa 13 04 1c 40 7e db ca 5a | d7 f8 59 90 a2 34 4e 73 d9 b4 1b 12 47 af 09 6a | 3d c6 bc 0a 75 d2 59 20 61 0f b0 78 2f f9 96 a8 | bc 6e fc a4 91 79 01 c5 c6 bf 55 5f ca 2a 71 57 | 55 3a c2 55 6a 02 68 58 b9 3f ee 10 26 00 19 6c | a4 9b 2b c5 37 91 ea 3d f7 92 10 15 3e 21 96 87 | 2b 42 57 b1 96 6e 0c 94 b6 11 c4 ca 44 56 8a bf | 72 e1 9f 77 2e b1 9f 72 96 c2 0b cd e9 02 1e ed | f4 40 75 83 23 4e d6 76 72 99 62 9c 55 c4 df 8d | 23 38 27 3c f9 b9 3f 1c 37 14 80 74 3c 7a 5d f8 | 1a 0c 7f 0d 3a 48 23 4c 35 58 8d c3 50 e9 4f d5 | 3a d4 b6 fa d0 f4 f0 02 7b 72 04 9c a6 5b 57 b7 | 6f ac e8 68 3f 0b ab 1c 0a 68 cc 2e 68 e9 56 e5 | 09 9a 32 64 09 77 95 51 f1 d9 2b dd e7 b2 96 44 | 29 00 00 24 d1 ee 39 81 5a e3 54 a6 73 c8 50 03 | 2c 50 da d8 32 42 2b e6 ab ed 1b 51 ff 8e f3 84 | d3 ae 77 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 53 91 6c eb c8 88 e0 f9 9e 54 62 | 8e 3a 67 1c 98 f2 42 50 00 00 00 1c 00 00 40 05 | 84 7e 67 f1 2a 8c cc 0b 8d 85 0d 9d a9 c1 72 b7 | 86 11 2f 01 | libevent_free: release ptr-libevent@0x7fb3680300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf00 | #443 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 e5 a7 37 44 6e 78 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #443 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #443 | rejected packet: | 99 e5 a7 37 44 6e 78 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #443: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #280 | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #280 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #280 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49683.242739; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005505 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf00 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #280 | libevent_malloc: new ptr-libevent@0x7fb3680300e0 size 128 "road-eastnet-nonat-28" #280: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #280) | d6 f7 ab 7c 0b ea 69 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca e1 05 9c 2f e1 85 fc d1 c1 5e ec 37 7e 0d 76 | 45 c5 de cd 99 7d 74 0a 48 32 65 23 49 b2 c2 df | ba 7e d2 ef 7c 32 31 03 10 0c 09 94 c0 eb b8 b5 | 06 97 c9 45 66 24 48 7d 72 da ab 98 55 09 59 9c | 31 af 0e c1 8a a9 90 d1 a5 1f 67 f1 af 23 81 27 | 72 13 c8 3c d8 f0 f1 d8 ca c2 a1 9a 92 8c fd 09 | b0 c2 a6 d5 91 c6 84 9b 99 40 a3 ac 3e 94 44 cd | 9a 36 6e be f8 2c 85 77 18 29 38 0d c0 06 06 d0 | a2 de 4c 8d 95 cd da f4 a0 2f bd 4d 70 4f 95 ae | db 5a f3 57 de 7c dd 31 a6 66 ca aa 68 cf 9d 1d | b3 0a 17 80 b5 20 24 43 82 44 17 25 0f 38 64 50 | 75 9d 57 76 b6 2b ee 0e 3f 93 33 cf 3f 9b 45 97 | f9 87 b6 87 a6 ec cb 33 18 44 a7 89 6a 59 c0 2b | ff 8a 7d 67 3d 1a 08 05 fe 9f fa 6c b7 f7 96 5d | a2 3b 23 c8 4a 7c 17 7b 08 d8 db 48 f9 5d 62 1b | 0b 5f d0 c6 c6 a2 28 ed 7c 45 7a f3 33 a6 d2 1f | 29 00 00 24 05 cd b3 b7 f3 87 52 75 9b b2 14 f4 | c3 19 28 f7 78 65 e3 f9 18 22 0f 07 13 10 65 88 | f1 44 b8 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a b5 25 17 f4 1a 4f 2a 05 d2 2d 99 | 3c 89 36 9b 9d 62 ed 5f 00 00 00 1c 00 00 40 05 | ee 9f 85 88 b6 c7 ef c2 a5 c8 d9 f7 7a e7 a6 c3 | 70 03 54 b6 | libevent_free: release ptr-libevent@0x7fb370014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #280 spent 0.0908 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 f7 ab 7c 0b ea 69 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #280 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #280 | rejected packet: | d6 f7 ab 7c 0b ea 69 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #280: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0541 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7fec0 | handling event EVENT_RETRANSMIT for parent state #473 | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #473 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #473 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49683.251037; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002189 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #473 | libevent_malloc: new ptr-libevent@0x7fb370014c70 size 128 "road-eastnet-nonat-221" #473: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #473) | 78 01 12 66 35 d7 75 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 47 0f 4f 77 38 bb e7 c9 71 64 11 49 78 07 db | 61 1c cd 26 23 f1 f6 1d 25 30 16 ce 14 27 83 ce | 42 30 8f 08 74 8c 5a 73 8c d4 32 61 41 1b ee 9b | f9 31 2e 33 9d 12 db b8 cb 33 3f 38 d9 dd c3 f9 | 20 b6 40 e8 ca 08 02 ce df 71 6c f1 5d 52 08 e6 | 58 10 57 a2 32 8d ae 1d 5e 7d c4 ce e0 91 e8 67 | ef d4 89 2c c0 b5 6a 92 6e 51 6d 9b 9d 21 b2 11 | 63 ad d9 36 26 eb dc c5 60 5b ef 4a 3f 29 d2 75 | 9a 29 b2 ce 56 3f a4 11 28 44 4d 82 14 b3 ff 08 | f3 34 c5 89 41 5b 00 60 7c 63 69 55 27 25 23 fa | 32 38 62 77 fb 7a 33 df 62 71 61 b7 15 ec 0a 13 | 14 36 a9 93 fd 25 0e 0d b3 44 f4 62 07 ce 96 88 | f0 a4 9b c6 5b 9f 17 d2 94 b3 dd 9f 08 c2 33 c2 | 59 53 80 d3 e8 b8 bc 9f 9d b9 55 bf 1b b3 90 a8 | 46 84 0d b5 c1 2a b7 bd df e2 56 3f f0 a8 af c2 | b3 ab 6b 5f 0e ca 69 45 20 54 b6 94 83 c5 3d bb | 29 00 00 24 4a 32 17 be 17 e6 be 0c a5 f0 d0 1f | f3 82 ee d0 20 e4 2f 26 27 39 fc fe 8a c9 3a 42 | bb 40 ba 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 8a 84 70 d7 06 66 bf 35 02 d1 dc | b7 f5 da 2f 6f 36 dc 4c 00 00 00 1c 00 00 40 05 | 22 8e 50 95 0f 93 c8 cc 9c 03 8c bf 24 39 56 cd | 71 d7 b1 e2 | libevent_free: release ptr-libevent@0x7fb34402a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7fec0 | #473 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 01 12 66 35 d7 75 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #473 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #473 | rejected packet: | 78 01 12 66 35 d7 75 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #473: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #230 | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #230 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #230 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49683.276383; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007118 exceeds limit? YES "road-eastnet-nonat-230" #230: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-230" #230: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #482 at 0x557d46b0ca00 | State DB: adding IKEv2 state #482 in UNDEFINED | pstats #482 ikev2.ike started | Message ID: init #482: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #482: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #482; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-230" #482: initiating v2 parent SA to replace #230 | using existing local IKE proposals for connection road-eastnet-nonat-230 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 482 for state #482 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7fec0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #482 | libevent_malloc: new ptr-libevent@0x7fb34402a950 size 128 | #482 spent 0.083 milliseconds in ikev2_parent_outI1() | RESET processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #230 ikev2.ike failed too-many-retransmits | pstats #230 ikev2.ike deleted too-many-retransmits | #230 spent 2.61 milliseconds in total | [RE]START processing: state #230 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-230" #230: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #230: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #230 "road-eastnet-nonat-230" #230: deleting IKE SA for connection 'road-eastnet-nonat-230' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-230' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-230 | State DB: deleting IKEv2 state #230 in PARENT_I1 | crypto helper 2 resuming | crypto helper 2 starting work-order 482 for state #482 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 482 | parent state #230: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 482 time elapsed 0.000536 seconds | (#482) spent 0.537 milliseconds in crypto helper computing work-order 482: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 482 for state #482 to event queue | scheduling resume sending helper answer for #482 | stop processing: state #230 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_malloc: new ptr-libevent@0x7fb380041ce0 size 128 | libevent_free: release ptr-libevent@0x7fb364035750 | crypto helper 2 waiting (nothing to do) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | in statetime_stop() and could not find #230 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a97080 | handling event EVENT_RETRANSMIT for parent state #477 | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #477 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #477 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49683.277136; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50072 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #477 | libevent_malloc: new ptr-libevent@0x7fb364035750 size 128 "road-eastnet-nonat-225" #477: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #477) | 3f 73 6c 52 e2 16 12 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 68 39 c4 34 ea c1 cb 39 a9 f7 a9 af 21 c4 2f | 59 10 95 11 49 04 1e 26 c9 8f 50 f5 a4 65 8f b4 | 05 5b e9 56 60 ee a1 83 15 a3 b3 99 a1 69 bb 30 | cc 2b 98 3b 1e 30 46 76 ff 8d 39 41 4c 02 aa c6 | 7d 2f 3c 38 bb 54 54 f3 fb 6c ca 8e 5a 70 15 52 | 0e f8 6d 99 7c 6a 3b f5 58 74 0d 21 2e 4e 88 07 | 53 e0 50 d2 f7 38 33 9c 1e ad d9 ed 1d 96 b7 80 | 22 e0 8f bd a1 c0 a3 2c 94 20 d5 25 06 a2 7f 34 | 69 08 93 f9 8f 4f 23 ac b8 84 4e a5 b6 4c a2 fd | 75 2b 4c 8f 39 aa c3 bd 56 04 f8 29 c7 f1 40 cc | 9b 1a e4 8b 46 36 dc 67 52 7b 4f 7f 89 4e ad be | 6b 62 8d 22 67 f2 df e5 dd fb ec d6 50 89 50 9f | ee 43 32 27 75 9c 8a 33 f8 2e e0 8a 42 cb be 39 | aa d8 09 f8 75 cc 7e 70 d1 1d e9 02 66 48 e7 a9 | 85 21 80 86 49 7c d0 81 50 d6 7a 61 62 60 a5 9e | 15 19 da e7 5d f6 40 da d1 f3 3f 04 ae f2 b4 4a | 29 00 00 24 ff dc d7 b1 fd dc f2 f7 49 64 0a 31 | e9 e7 85 40 8d 4a be e6 65 0c 38 4a f9 ed 0f 7d | 4d 19 c2 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 0f c5 61 64 4d d6 f7 e8 8d a8 de | cf 04 b2 c9 0c b8 8a b5 00 00 00 1c 00 00 40 05 | 72 d7 c9 34 b9 dc 3d 33 a4 7e ff 3a 57 4e 49 6e | fe 3e 47 b9 | libevent_free: release ptr-libevent@0x7fb37c023b10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a97080 | #477 spent 0.081 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f 73 6c 52 e2 16 12 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #477 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #477 | rejected packet: | 3f 73 6c 52 e2 16 12 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #477: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-230 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-230" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-230' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-230" | stop processing: connection "road-eastnet-nonat-230" (in initiate_a_connection() at initiate.c:349) | spent 0.0554 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #482 | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 482 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #482 | **emit ISAKMP Message: | initiator cookie: | 36 c3 54 33 ec a7 b6 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-230 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 79 ed 30 30 be a6 b8 35 5d 7c a5 62 ac c6 13 d8 | ikev2 g^x 83 27 d5 31 a0 fa 4c 2e 40 b9 54 43 42 15 18 78 | ikev2 g^x b3 8c 6a 6c 7d 96 c5 85 70 a8 48 20 22 38 c8 e7 | ikev2 g^x c3 12 d1 63 fb e3 68 d6 08 24 69 60 e5 ac a9 33 | ikev2 g^x 22 f2 2c f6 14 52 ad 1c 12 97 d4 3c 99 28 7f 69 | ikev2 g^x aa d1 18 f8 bc 06 35 f3 dd 4f b8 bc 32 67 80 0d | ikev2 g^x b2 c8 d0 32 11 b6 f1 1a bf 32 1c f4 b1 c8 5d 4d | ikev2 g^x f1 41 f7 45 a7 42 78 6b 31 8f b7 1a 22 f3 fa a7 | ikev2 g^x 3f 96 61 3f ad 03 4e 95 70 ec 28 2e 07 88 02 e8 | ikev2 g^x 35 f1 c5 b3 16 2f 4d b9 e0 29 95 c1 2d e3 e0 37 | ikev2 g^x 5d 57 61 4b 22 78 ec 0c cc 9d f4 89 9a 2d 4f 1d | ikev2 g^x b7 c1 f5 ad 55 54 75 4b 2d 2f 97 b2 b3 0a f4 e5 | ikev2 g^x ca f8 64 9c 52 40 a8 a2 99 0e 3d 9b 5a 9e 1e 2b | ikev2 g^x 75 b0 89 ef b0 bf 99 f4 37 0e 0c 27 d3 f1 9a c6 | ikev2 g^x fd 46 0a d5 dc 88 12 58 b5 c1 7a 5a 1b 30 d2 78 | ikev2 g^x 2b ef 75 09 ea 77 2f b0 ad cc d1 d9 98 94 ca 15 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ba df cf 8a 38 2e 1f 41 21 49 fc b2 01 80 ce b1 | IKEv2 nonce 18 f8 70 f3 ba e7 48 83 d1 e9 62 d6 6c d1 b9 8f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 36 c3 54 33 ec a7 b6 7b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e6 | natd_hash: port= 01 f4 | natd_hash: hash= 54 bb 11 83 48 2f 3f fa 5f 96 d0 ad a2 72 2a 82 | natd_hash: hash= ce ec ef d2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 54 bb 11 83 48 2f 3f fa 5f 96 d0 ad a2 72 2a 82 | Notify data ce ec ef d2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 36 c3 54 33 ec a7 b6 7b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c3 77 e0 b4 3a 22 ca d3 bf 9b f4 e6 b2 71 76 56 | natd_hash: hash= 18 71 d4 99 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c3 77 e0 b4 3a 22 ca d3 bf 9b f4 e6 b2 71 76 56 | Notify data 18 71 d4 99 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #482 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #482: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #482 to 4294967295 after switching state | Message ID: IKE #482 skipping update_recv as MD is fake | Message ID: sent #482 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-230" #482: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.230:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #482) | 36 c3 54 33 ec a7 b6 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 ed 30 30 be a6 b8 35 5d 7c a5 62 ac c6 13 d8 | 83 27 d5 31 a0 fa 4c 2e 40 b9 54 43 42 15 18 78 | b3 8c 6a 6c 7d 96 c5 85 70 a8 48 20 22 38 c8 e7 | c3 12 d1 63 fb e3 68 d6 08 24 69 60 e5 ac a9 33 | 22 f2 2c f6 14 52 ad 1c 12 97 d4 3c 99 28 7f 69 | aa d1 18 f8 bc 06 35 f3 dd 4f b8 bc 32 67 80 0d | b2 c8 d0 32 11 b6 f1 1a bf 32 1c f4 b1 c8 5d 4d | f1 41 f7 45 a7 42 78 6b 31 8f b7 1a 22 f3 fa a7 | 3f 96 61 3f ad 03 4e 95 70 ec 28 2e 07 88 02 e8 | 35 f1 c5 b3 16 2f 4d b9 e0 29 95 c1 2d e3 e0 37 | 5d 57 61 4b 22 78 ec 0c cc 9d f4 89 9a 2d 4f 1d | b7 c1 f5 ad 55 54 75 4b 2d 2f 97 b2 b3 0a f4 e5 | ca f8 64 9c 52 40 a8 a2 99 0e 3d 9b 5a 9e 1e 2b | 75 b0 89 ef b0 bf 99 f4 37 0e 0c 27 d3 f1 9a c6 | fd 46 0a d5 dc 88 12 58 b5 c1 7a 5a 1b 30 d2 78 | 2b ef 75 09 ea 77 2f b0 ad cc d1 d9 98 94 ca 15 | 29 00 00 24 ba df cf 8a 38 2e 1f 41 21 49 fc b2 | 01 80 ce b1 18 f8 70 f3 ba e7 48 83 d1 e9 62 d6 | 6c d1 b9 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 54 bb 11 83 48 2f 3f fa 5f 96 d0 ad | a2 72 2a 82 ce ec ef d2 00 00 00 1c 00 00 40 05 | c3 77 e0 b4 3a 22 ca d3 bf 9b f4 e6 b2 71 76 56 | 18 71 d4 99 | state #482 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34402a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7fec0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a97080 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #482 | libevent_malloc: new ptr-libevent@0x7fb37c023b10 size 128 | #482 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49683.277654 | resume sending helper answer for #482 suppresed complete_v2_state_transition() and stole MD | #482 spent 0.298 milliseconds in resume sending helper answer | stop processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb380041ce0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 c3 54 33 ec a7 b6 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #482 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #482 | rejected packet: | 36 c3 54 33 ec a7 b6 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e6 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #482: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0393 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #388 | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #388 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #388 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49683.287839; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005278 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800153c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #388 | libevent_malloc: new ptr-libevent@0x7fb380041ce0 size 128 "road-eastnet-nonat-136" #388: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #388) | f7 ff cf 56 0b 2d 32 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 17 f0 4b b8 d6 41 9d bc 4a 96 2e 42 ab 77 4e | 7f 54 60 13 56 59 15 20 fc c4 79 98 ae 8f e2 06 | 69 79 8f 5d 63 48 c3 bc 00 b2 f8 7b 8f f4 4d a0 | 8c a9 81 52 3e 4a c4 f8 92 22 05 f0 4d e8 83 0e | f0 26 c0 2c 43 f9 88 43 07 5f 25 9e 50 b5 11 c3 | 73 c8 0e 1f 5c 85 88 1c fc e4 6e f2 9c 07 04 d2 | 2d 14 31 25 c7 f1 fa 00 27 db 06 87 f8 4d 48 60 | a2 9b c5 9a 24 e6 5c 8b 88 aa 13 bf 0e 45 97 1c | aa fb ea 7f ee 38 9d c2 3b dc ac 73 ba e2 2c 03 | 3d dd 91 b1 96 88 2a b1 4e a5 10 5e fe 8f b7 60 | 27 7f 42 c9 c1 97 c4 03 be 93 ba 66 8c 91 b1 77 | 12 50 ef a2 c9 9b f5 15 0b 50 4a dc c3 9e 64 d1 | d8 0c c9 6c 86 d8 1a 40 d2 c3 48 bc 8a 19 fb 47 | d3 3d 4c 63 67 3a 9b 43 54 08 5f 36 9c 29 c6 ed | 7a c1 fa 3a 70 4b f1 9d 3d f8 73 d3 02 37 8f 1c | 0a e4 74 d1 b8 f7 7d a3 cc 04 0d cc 02 1c 9d d7 | 29 00 00 24 d2 a6 cd 06 28 a1 fe ae 1b 89 a2 1d | a1 4a 61 12 14 72 44 a4 a4 a5 e9 38 f2 78 91 07 | 4b 1e 98 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 fc fe 8e 48 65 14 18 f3 7c 80 1c | c9 89 2e 09 96 5d 2c 3e 00 00 00 1c 00 00 40 05 | 5e 49 cb 06 a1 a8 89 d0 e9 f4 c7 34 ac a2 e0 5c | 40 ed 0b 80 | libevent_free: release ptr-libevent@0x7fb3840060f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | #388 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 ff cf 56 0b 2d 32 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #388 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #388 | rejected packet: | f7 ff cf 56 0b 2d 32 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #388: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #464 | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #464 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #464 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49683.308153; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003744 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #464 | libevent_malloc: new ptr-libevent@0x7fb3840060f0 size 128 "road-eastnet-nonat-212" #464: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #464) | 24 23 49 88 e3 09 10 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 3e 00 a4 b1 da ff 66 fb 46 9b f8 05 c4 d3 4e | 1a be d3 c5 f3 29 65 46 ed 6f e5 e1 9c d3 68 c3 | 49 3b 6a cd e8 c4 12 c0 42 a0 22 7e 1b 5d 32 aa | a0 3a 32 c8 92 e5 3d a9 90 26 7c b6 7a 3a c7 43 | 1e d7 d9 ca a9 3b e4 0e ac 4c a3 a2 54 be fa 3a | 34 7b 08 69 76 9f f5 86 6b e1 71 f1 ca f2 34 fb | f0 af 6d c0 e7 4d 86 2c 35 64 d7 a8 e5 56 44 f4 | 1b a3 7b 36 d3 8e bf 68 72 d1 d6 14 19 d5 94 41 | 37 2c 85 dd 26 51 82 12 f9 57 28 f6 64 e4 99 2c | e5 14 14 38 a6 eb 30 83 5f a9 d8 ce 33 ba b5 e7 | 8f 9e 29 5d 17 d7 5f e7 f7 6f 44 97 e9 e3 1d 52 | 7d 6b 40 ae 7e e6 9b 70 f4 e4 cb 6b e6 46 d1 1a | f1 d4 e8 4a 08 7a 73 f5 ae fa 1c 51 b5 c1 66 db | b4 47 cd 7b 34 6f da f9 6b b2 dc 0f 59 56 0e 82 | f9 d8 cb f8 b3 e7 8c 71 cf eb c3 24 d5 a5 32 fc | 19 3b 14 fc 10 5b ac 0b 65 e1 fc c1 26 0d 3c cc | 29 00 00 24 f8 5a 68 e8 8f 04 5e 9b c3 04 25 38 | 2e af 26 bb 12 7b 35 ab f6 8f 9b c1 e5 8b f7 b5 | fb ab d6 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 53 56 65 0c 1b 38 25 05 25 e2 17 | 1d aa de c6 51 81 dc 56 00 00 00 1c 00 00 40 05 | b6 60 c7 67 b1 c7 40 e8 a5 6f 2e d6 dc 92 69 0c | f8 bb 28 2f | libevent_free: release ptr-libevent@0x7fb3700300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #464 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 23 49 88 e3 09 10 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #464 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #464 | rejected packet: | 24 23 49 88 e3 09 10 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #464: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3780297c0 | handling event EVENT_RETRANSMIT for parent state #444 | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #444 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #444 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49683.309424; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002248 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #444 | libevent_malloc: new ptr-libevent@0x7fb3700300e0 size 128 "road-eastnet-nonat-192" #444: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #444) | 7f 9a e3 30 35 a2 50 3a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 73 44 16 cd dc 6d af 1e 52 47 5f 1e bd fa ee | 64 00 7c 0c 09 cd 6a b9 96 7a 9e fd 7b 60 d3 11 | 94 7f f3 14 ab de fc 67 4d 77 8c ed ae 35 5e 21 | 92 1a 34 1f 52 96 c6 b4 82 cf e2 da a3 5d a8 40 | 55 b6 be b1 02 f7 4f 09 53 8a 9a 82 43 68 c5 03 | 91 79 7b fa ca eb 01 ae de 9c b8 57 af 0c ad 92 | 90 f7 80 a3 5f 1b 76 77 00 b6 f8 6e 45 fc bc 6c | 08 e0 42 31 50 bd 6d b4 9c ee e1 eb b4 38 73 a9 | 34 e4 98 23 d2 4d e0 d9 b6 c6 f6 dc 56 58 4e 20 | 84 e1 d2 8f 09 7f 4a 9d 26 b0 f3 d6 00 33 87 e7 | 4a de ea 2f 4a 53 b4 0f 48 62 38 e9 50 42 17 64 | 60 9a 88 18 4e 23 6b 6a 5a a4 6b 23 ad 33 67 82 | 97 a8 79 73 5f c7 02 96 5e 91 0e 40 d6 4e f8 b3 | d9 30 5c 69 30 3f 5d 5d 8a 33 e5 82 75 a6 f8 01 | e5 10 de e1 1f 27 d1 2a e8 d2 12 a6 bb 52 29 5c | 7e c1 67 58 19 ab fb 58 65 a2 55 1e 99 be f5 8d | 29 00 00 24 2a ad 1b 39 f3 fd f9 42 4c 00 4a 5c | ed 00 f4 3a 31 ea eb b5 54 5a 5c 9d a2 7d 7c c4 | 61 a7 b5 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 d0 f0 6f a1 ca 95 cb 19 9f 38 2a | 49 20 b8 20 36 38 5c 50 00 00 00 1c 00 00 40 05 | 75 b6 79 50 7c d3 43 75 20 ac ac 20 ab c2 0f 0e | 7d 73 a1 76 | libevent_free: release ptr-libevent@0x7fb38403da90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3780297c0 | #444 spent 0.0854 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 9a e3 30 35 a2 50 3a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #444 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #444 | rejected packet: | 7f 9a e3 30 35 a2 50 3a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #444: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360018460 | handling event EVENT_RETRANSMIT for parent state #281 | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #281 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #281 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49683.313752; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3780297c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #281 | libevent_malloc: new ptr-libevent@0x7fb38403da90 size 128 "road-eastnet-nonat-29" #281: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #281) | 6e a6 a1 b4 01 a0 0e dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 68 2b 46 8c 2b 9e 7f b4 06 ec 72 36 3a be fa | 50 91 b7 48 61 bc d4 d3 11 dc 1f d6 9a c1 21 a2 | 97 1d cf c0 4e 3d 88 c1 96 35 32 5c c3 c4 b5 d1 | 96 85 b6 1e 34 48 5e 70 e1 97 d1 4d ee c9 36 cd | 07 d4 c1 98 8c 4b f8 c0 2b 58 50 1f 39 3f 7e 62 | c9 4e 54 20 95 c8 4c fc 93 c6 64 05 ff db 54 92 | f9 8c d4 27 f6 69 ac 7b 53 12 4d 7e 22 de e0 4c | 9b 65 6e 55 e2 59 db 77 7d a0 70 9f cd fd b6 7a | 15 79 9a 65 29 97 e4 c6 46 84 7b 52 6e 4e 1b 43 | 80 ec d1 87 3d 75 43 f1 6b 08 60 65 d9 e2 6c 04 | c5 f0 75 0d 72 fe 09 0a a5 0a 64 0c 9d 8e b4 bd | 1a c3 bb 6e f6 92 c0 b5 8c 93 b9 eb e3 12 c7 a1 | bd b7 f3 a0 b9 80 8c 76 59 8f 43 af 0f 58 66 7f | b7 29 f0 c0 1c a1 51 2d c9 c0 ac e0 da 3e 0a fc | dd 42 1f ec 76 07 0c b3 ee 58 80 d8 3b 40 cd 6e | 29 12 48 14 35 22 e0 cf 05 9a 1b 46 91 35 4f 0c | 29 00 00 24 1a c7 00 d3 83 91 04 b5 76 85 d3 69 | a2 08 a9 2c b0 b3 a2 60 be 18 eb 18 2d fd ba 85 | 0c 0a 5c be 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 cf b4 85 53 44 b8 30 db 31 85 32 | 18 7e 13 4c d0 54 13 87 00 00 00 1c 00 00 40 05 | 54 d2 36 85 02 19 96 85 9c 4b 22 1c 55 b4 68 ad | 30 56 22 92 | libevent_free: release ptr-libevent@0x7fb38802d3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360018460 | #281 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6e a6 a1 b4 01 a0 0e dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #281 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #281 | rejected packet: | 6e a6 a1 b4 01 a0 0e dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #281: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358017ea0 | handling event EVENT_RETRANSMIT for parent state #474 | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #474 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #474 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49683.355115; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002078 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #474 | libevent_malloc: new ptr-libevent@0x7fb38802d3a0 size 128 "road-eastnet-nonat-222" #474: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #474) | 0f db c1 fb 9f 17 ff 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 1b 5f a0 e0 ea b4 6f d8 89 26 cf ee 32 1a 5c | 28 fd cc 88 df ac 76 71 06 f6 f9 47 1d 52 2b f1 | 5a b8 ae 1c d0 f8 c1 49 c7 7c ed 42 b3 cb ec d1 | cd 02 cf 31 b3 56 f6 e1 d0 7b 2f 03 00 08 68 a8 | 8c e2 7f 21 83 8d a7 f5 0e 07 fa ee 88 4b c9 7c | 96 80 b8 d5 42 4d 28 ea bb cc 27 3f c4 d8 6e 4d | d5 70 bc b9 0a 5f 21 c3 31 6b f1 91 46 6a 01 67 | 1a 7e a6 f1 0c 4d 62 51 b1 a2 3c 89 97 d5 4a 44 | a9 bc 59 2f a3 d1 5e 07 95 15 69 ac 72 1f 9c ba | 63 7f 02 e1 05 f8 26 4f fe cb 35 8d 42 06 b7 4a | a1 e1 b3 5c f5 2a 05 2b b1 4d 29 89 16 f1 e4 7b | dc e2 55 b9 29 ad b8 79 4e bb 9a 44 92 25 af e6 | 8f 1c 0d 27 3a fe 2f c8 95 15 ef 6f 1b 1e 7a 94 | a3 8c 31 92 cc 09 2b ca d2 98 1d 32 a4 3c 30 c1 | 96 ab 37 bb 0d bc c5 cd 1c ca 91 c5 fa 2a c9 92 | 70 fb 0c 4c 99 ec 29 a2 72 d8 22 a0 d3 24 0d 76 | 29 00 00 24 b8 e3 46 90 e1 5a 71 46 9e cc 2f c2 | 22 0c 77 5a b9 94 a5 51 d5 e9 c9 19 b8 4f d2 8d | f8 17 d9 c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 82 ca 85 05 ee 86 5d c3 66 e4 91 | 24 1c 89 d5 b4 33 f3 c7 00 00 00 1c 00 00 40 05 | d7 2a e5 02 23 f5 bb 26 e7 1d 38 9f 9f c2 ec a7 | 48 2b cd 07 | libevent_free: release ptr-libevent@0x7fb35802ed90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358017ea0 | #474 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46afd000 | handling event EVENT_RETRANSMIT for parent state #389 | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #389 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #389 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49683.355313; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003508 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358017ea0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #389 | libevent_malloc: new ptr-libevent@0x7fb35802ed90 size 128 "road-eastnet-nonat-137" #389: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #389) | 85 39 d1 4d 8b 00 62 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 35 45 30 eb 5a 4e 31 22 74 c6 b3 a4 12 3f 11 | d4 ed 4e ed d9 b9 2a b5 45 b7 bf 2f c4 12 8d f6 | b6 45 8b e7 42 00 82 88 9b 5f 9d ac d3 62 85 20 | 80 d9 92 f9 48 6c 61 18 10 02 b3 60 4a 67 bc f5 | 7f f3 06 fd dd d9 85 7b 8a 61 74 3e b0 54 86 48 | be 68 e1 1d 71 86 b6 10 0b 53 c9 4b c6 1d e3 32 | 0e 9d a0 c1 c2 ea 3f 8d 85 11 04 6b 8c a8 06 e2 | 8a a8 28 44 e2 f4 2d 9b 79 2e 3b 95 17 25 de 38 | b1 b1 27 54 d1 ca 51 cb 05 e4 51 d4 10 05 5a 73 | f7 6e 3f 1e 04 83 05 45 32 c8 e5 83 91 5b d4 46 | cb 00 53 49 8b aa e2 4a 03 fb ec 92 bd 9a d8 ef | c2 f7 13 0e ac 87 cd a2 d6 11 8a 4d b3 76 15 63 | 7e 5d ad ad 19 54 b0 8b cf 33 56 db af c2 f6 2f | 46 e8 3c 3e 30 75 95 b6 ad 6b 4c bd b8 1c f7 d8 | 42 48 45 24 c4 28 be c8 24 78 21 7b 8c a1 5f d5 | 3c 68 c6 b7 92 f7 dd 99 0c 2e 4d 49 3c 4e 34 53 | 29 00 00 24 d4 02 58 a1 15 41 bf 82 7e 15 0d c9 | ca 5c 1f 96 c8 8b 6c 22 75 5c 08 57 5f 06 6b 32 | fe f8 a7 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 ad 3c 1a 7d 4c cc 56 a6 70 0e c9 | dd 4d 28 a6 f3 20 1b cb 00 00 00 1c 00 00 40 05 | e7 a3 be 04 a3 45 3b 11 1b f8 e3 89 48 23 a2 23 | c1 e1 2a f8 | libevent_free: release ptr-libevent@0x7fb3500096b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afd000 | #389 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0f db c1 fb 9f 17 ff 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #474 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #474 | rejected packet: | 0f db c1 fb 9f 17 ff 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #474: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 39 d1 4d 8b 00 62 4d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #389 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #389 | rejected packet: | 85 39 d1 4d 8b 00 62 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #389: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0563 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46adb080 | handling event EVENT_RETRANSMIT for parent state #231 | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #231 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #231 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49683.38466; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006117 exceeds limit? YES "road-eastnet-nonat-231" #231: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-231" #231: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #483 at 0x557d46b0dfc0 | State DB: adding IKEv2 state #483 in UNDEFINED | pstats #483 ikev2.ike started | Message ID: init #483: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #483: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #483; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-231" #483: initiating v2 parent SA to replace #231 | using existing local IKE proposals for connection road-eastnet-nonat-231 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 483 for state #483 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46afd000 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #483 | libevent_malloc: new ptr-libevent@0x7fb3500096b0 size 128 | #483 spent 0.0951 milliseconds in ikev2_parent_outI1() | RESET processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #231 ikev2.ike failed too-many-retransmits | pstats #231 ikev2.ike deleted too-many-retransmits | #231 spent 2.56 milliseconds in total | [RE]START processing: state #231 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-231" #231: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #231: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #231 | crypto helper 0 resuming | crypto helper 0 starting work-order 483 for state #483 "road-eastnet-nonat-231" #231: deleting IKE SA for connection 'road-eastnet-nonat-231' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 483 | add revival: connection 'road-eastnet-nonat-231' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-231 | State DB: deleting IKEv2 state #231 in PARENT_I1 | parent state #231: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 483 time elapsed 0.000671 seconds | stop processing: state #231 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb378035930 | (#483) spent 0.656 milliseconds in crypto helper computing work-order 483: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 483 for state #483 to event queue | scheduling resume sending helper answer for #483 | libevent_malloc: new ptr-libevent@0x7fb384041c10 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adb080 | in statetime_stop() and could not find #231 | crypto helper 0 waiting (nothing to do) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-231 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-231" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-231' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-231" | stop processing: connection "road-eastnet-nonat-231" (in initiate_a_connection() at initiate.c:349) | spent 0.0714 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #483 | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 483 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #483 | **emit ISAKMP Message: | initiator cookie: | 34 4c 65 0f e6 b6 ad e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-231 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f0 14 b4 cd 04 ae 73 27 55 14 94 b2 a9 a9 46 92 | ikev2 g^x bf 38 7f 34 e4 30 01 9b cc 3d 69 9b 72 22 2d c6 | ikev2 g^x c0 5a ca f2 aa f8 34 31 df 85 74 a8 8a c4 71 d3 | ikev2 g^x 18 15 b7 43 a0 c7 52 88 83 cb 13 e3 0b 22 9f 8d | ikev2 g^x 9b 32 7a fd 24 4c 85 ea ba 28 19 ff da 93 b1 bb | ikev2 g^x d8 33 5c 65 db be 0a e0 bd 29 79 f5 94 d3 6b 1b | ikev2 g^x d0 fe 62 1a aa 43 59 54 5f 94 f2 d4 df c7 8c 2c | ikev2 g^x 9f 79 f7 92 9d e8 8c 7a 9a 6a da 8f dd 5b f5 4b | ikev2 g^x 78 88 55 3a 27 f6 46 11 a6 78 da 31 e5 57 e3 ff | ikev2 g^x c3 41 c4 d8 db 92 c7 9b 0b f2 9c 05 a4 6f e4 60 | ikev2 g^x d6 be 30 93 95 25 fb 5e 0e 06 32 43 09 91 4d 90 | ikev2 g^x 0e 89 44 7a 24 99 b2 ff 62 86 54 98 47 bc f9 cf | ikev2 g^x ff 60 15 2b c0 14 62 be bc 88 1f 37 10 d8 42 2b | ikev2 g^x 8e 68 b2 b4 90 d0 f5 fe bf 7c ce c7 6a 70 46 09 | ikev2 g^x 84 97 db 42 58 43 9f f3 46 27 26 32 2b 0c cd 41 | ikev2 g^x 80 81 33 b8 5d 30 60 f3 70 32 7b 81 3a 1a 11 48 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a6 6b eb 02 98 7d a6 5e 59 5e bd f1 ef cf 36 f2 | IKEv2 nonce a9 4b e0 19 61 9c ac e2 ac 17 24 09 0d 96 04 a1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 34 4c 65 0f e6 b6 ad e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e7 | natd_hash: port= 01 f4 | natd_hash: hash= d1 38 08 89 da 41 ff 7d 1c 3d 17 6c 3a eb 05 70 | natd_hash: hash= fa bf ed 59 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d1 38 08 89 da 41 ff 7d 1c 3d 17 6c 3a eb 05 70 | Notify data fa bf ed 59 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 34 4c 65 0f e6 b6 ad e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d4 38 01 a3 1e e4 dd 2e 8e 63 54 12 3f 4d 01 1d | natd_hash: hash= 49 6b 48 46 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d4 38 01 a3 1e e4 dd 2e 8e 63 54 12 3f 4d 01 1d | Notify data 49 6b 48 46 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #483 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #483: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #483 to 4294967295 after switching state | Message ID: IKE #483 skipping update_recv as MD is fake | Message ID: sent #483 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-231" #483: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.231:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #483) | 34 4c 65 0f e6 b6 ad e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 14 b4 cd 04 ae 73 27 55 14 94 b2 a9 a9 46 92 | bf 38 7f 34 e4 30 01 9b cc 3d 69 9b 72 22 2d c6 | c0 5a ca f2 aa f8 34 31 df 85 74 a8 8a c4 71 d3 | 18 15 b7 43 a0 c7 52 88 83 cb 13 e3 0b 22 9f 8d | 9b 32 7a fd 24 4c 85 ea ba 28 19 ff da 93 b1 bb | d8 33 5c 65 db be 0a e0 bd 29 79 f5 94 d3 6b 1b | d0 fe 62 1a aa 43 59 54 5f 94 f2 d4 df c7 8c 2c | 9f 79 f7 92 9d e8 8c 7a 9a 6a da 8f dd 5b f5 4b | 78 88 55 3a 27 f6 46 11 a6 78 da 31 e5 57 e3 ff | c3 41 c4 d8 db 92 c7 9b 0b f2 9c 05 a4 6f e4 60 | d6 be 30 93 95 25 fb 5e 0e 06 32 43 09 91 4d 90 | 0e 89 44 7a 24 99 b2 ff 62 86 54 98 47 bc f9 cf | ff 60 15 2b c0 14 62 be bc 88 1f 37 10 d8 42 2b | 8e 68 b2 b4 90 d0 f5 fe bf 7c ce c7 6a 70 46 09 | 84 97 db 42 58 43 9f f3 46 27 26 32 2b 0c cd 41 | 80 81 33 b8 5d 30 60 f3 70 32 7b 81 3a 1a 11 48 | 29 00 00 24 a6 6b eb 02 98 7d a6 5e 59 5e bd f1 | ef cf 36 f2 a9 4b e0 19 61 9c ac e2 ac 17 24 09 | 0d 96 04 a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d1 38 08 89 da 41 ff 7d 1c 3d 17 6c | 3a eb 05 70 fa bf ed 59 00 00 00 1c 00 00 40 05 | d4 38 01 a3 1e e4 dd 2e 8e 63 54 12 3f 4d 01 1d | 49 6b 48 46 | state #483 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3500096b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46afd000 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adb080 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #483 | libevent_malloc: new ptr-libevent@0x7fb378035930 size 128 | #483 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49683.386007 | resume sending helper answer for #483 suppresed complete_v2_state_transition() and stole MD | #483 spent 0.362 milliseconds in resume sending helper answer | stop processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb384041c10 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 4c 65 0f e6 b6 ad e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #483 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #483 | rejected packet: | 34 4c 65 0f e6 b6 ad e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e7 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #483: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0494 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #478 | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #478 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #478 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49683.389173; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499483 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840223f0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #478 | libevent_malloc: new ptr-libevent@0x7fb384041c10 size 128 "road-eastnet-nonat-226" #478: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #478) | b4 9c 7f a0 55 ec 5f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 86 bb f8 93 0c cc df 70 83 3b a1 9a e0 b8 e3 | ef 6e a7 55 12 1e 4a a1 3c fd 3e f8 52 71 57 ec | d1 b9 27 97 72 c7 60 a2 ce b1 45 33 01 2b 7a c1 | 6c 56 fd d5 59 18 5e d3 c3 75 ef 36 1c 65 ec f7 | 03 c0 d4 70 7b b6 e1 35 71 9d 76 5b 7d 21 d4 3b | 12 1e 6c 03 cf 08 78 60 b5 ba 22 6e 40 93 8e c7 | 49 b5 59 bf 7f 87 44 20 2c 36 31 fc 69 d8 21 31 | 6c 62 2a ef c7 55 7b 01 a6 27 b6 8c 28 9f 7c ac | d4 27 6c f1 7c 85 40 4e 23 a1 d4 02 e3 38 52 92 | 5f 62 3c 6f 58 9e 47 5e 72 b1 b1 7d 8d 92 b6 d3 | be e0 0a 4d 01 e0 16 9f 01 75 9d 1c 68 e3 f5 d9 | 8e 19 b8 2b 12 45 ac 03 e0 b6 4d 98 39 5a 75 d7 | 7c b1 b9 f8 a3 a2 b1 d2 49 e7 b2 11 f2 c6 a7 7f | 57 72 f8 df 1f 7a 3c df 19 c0 28 fb f6 f4 59 df | f9 cb e8 e4 b5 73 46 61 ef 64 d4 38 66 2b 1c f7 | d4 31 c9 51 2e 93 97 3b f3 a7 d3 d3 06 a7 f6 99 | 29 00 00 24 19 2b 71 2c 92 77 f3 24 92 84 03 b5 | 44 5b d7 aa 5e 03 e6 f3 27 6d 26 be 26 c2 0f f8 | de ad c4 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad b7 1a 04 ad be 09 f8 62 42 a2 e6 | 69 0f ca 24 af 9b 5c 02 00 00 00 1c 00 00 40 05 | 37 89 76 5f 87 60 25 2e 24 4c ae 3c 7a 86 5f 05 | 9f e3 e5 ad | libevent_free: release ptr-libevent@0x7fb38003dab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #478 spent 0.0969 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 9c 7f a0 55 ec 5f 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #478 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #478 | rejected packet: | b4 9c 7f a0 55 ec 5f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #478: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378018460 | handling event EVENT_RETRANSMIT for parent state #282 | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #282 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #282 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49683.401441; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004245 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #282 | libevent_malloc: new ptr-libevent@0x7fb38003dab0 size 128 "road-eastnet-nonat-30" #282: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #282) | 46 9b 20 9a e5 8e c3 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 4a 4a 05 a5 e8 31 07 19 01 9a 3a 84 bd 00 2c | 01 26 e2 35 38 1d c2 10 27 23 65 e5 d1 d5 9e 9d | 93 4a 85 e7 79 d0 00 1e a3 c9 7f d0 87 96 13 32 | 3a 52 f9 aa fd 75 0f 57 d6 53 8b a2 5b 2a a9 29 | 20 47 1e e0 f6 79 b4 a2 d0 fd e2 85 9e 06 b0 c5 | 1f eb f9 ce 36 69 1b 53 58 8d aa 02 dd a3 93 19 | 8b 0f e6 94 85 c6 21 ed 47 d3 f5 ea 66 43 13 82 | da f0 e0 63 f7 98 28 5e a4 cb 20 f6 07 ee ef 26 | 67 cb 7a 06 89 6a a0 7d 08 f6 7d ba 27 41 9f 3f | f9 0e 8b 4e f2 9a 91 05 9e 11 34 81 a4 96 af ee | 90 6f f6 67 88 78 72 a1 94 39 66 b1 22 8d 82 7c | 2e db f6 a2 5d 7b a6 60 14 74 1c b3 6d 80 df 10 | f8 59 91 7e 94 04 39 3a 04 77 10 6d 00 3c a4 c9 | 37 8a d9 0b 42 ad 9c 7e 79 d0 0a 68 7a d1 19 02 | 3f 63 fb b2 47 d4 e3 0d 1d 5d 62 cd 37 80 af a2 | 0b a2 8f e1 3f b9 34 fc d9 39 c1 27 65 16 8f 01 | 29 00 00 24 43 cb 25 08 9c 10 6d 8d e0 8b af 6b | 30 64 58 bc 44 4b 07 d1 a3 b6 7d 77 46 d8 bf 81 | 62 ff 7f 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f cf c8 c3 31 5e 18 fc ce 9a 0d be | ec 9d b8 d1 d8 fa d9 18 00 00 00 1c 00 00 40 05 | 91 0b 3b 5a da ea f5 67 3e 89 32 94 c9 4e eb eb | e4 06 4e d6 | libevent_free: release ptr-libevent@0x7fb3700407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378018460 | #282 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 9b 20 9a e5 8e c3 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #282 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #282 | rejected packet: | 46 9b 20 9a e5 8e c3 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #282: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348048a60 | handling event EVENT_RETRANSMIT for parent state #465 | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #465 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #465 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49683.402722; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001655 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #465 | libevent_malloc: new ptr-libevent@0x7fb3700407f0 size 128 "road-eastnet-nonat-213" #465: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #465) | 61 8e 23 d2 13 62 a1 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e ff ad a6 69 28 f7 dc 3e 12 16 a3 b8 12 d1 0c | e2 d9 c7 08 64 20 6b 95 e2 f7 13 3f fe 41 07 b0 | 63 aa 7f 3d 77 9f f9 e2 21 16 88 33 88 34 63 be | 66 c4 e1 0f 6d 0e 67 89 ae 7f d4 2b da 09 0e c2 | 3d 5d ed e3 b1 da e4 45 10 b1 c5 e8 5c a0 b7 e1 | 45 c7 74 34 87 11 e9 20 8e bf a9 d5 b7 7f 3e c8 | 87 13 ea b0 4c 38 35 35 21 28 ca 99 cb 90 60 a1 | 8c 47 23 f8 9b b8 e8 b3 af 65 36 19 01 0f 99 db | 11 cb f7 6b 11 70 78 e3 5e f3 08 79 6c d7 3e 9c | aa 63 ab c1 3b 94 5d c4 f5 a3 7c fb 68 79 fd 4d | ad 0f 3b a0 62 30 54 4e 21 46 20 c3 e3 03 c6 e1 | b9 0f 7d fe 4b b3 60 7d 63 ba a2 4c 73 2e f3 b8 | 3b 22 a2 5f eb 6e f7 60 a7 f7 13 33 69 2d a4 92 | 73 a6 b3 6f 83 80 a4 99 0d 08 29 5e d9 35 92 ae | 9f af 0f c2 f8 4b f3 a5 f1 21 b9 71 6a 24 94 9a | 22 03 aa 3e 91 42 1b 0b b8 8a 56 9b 18 21 37 6d | 29 00 00 24 d0 d3 37 6e 16 17 0d f3 9a b3 75 28 | da 73 bd b0 37 5f e8 7c ed 64 dd a2 58 d5 25 f4 | 40 05 3d 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 42 81 75 52 0a 3a ff 0f 6a b7 c3 | 61 92 38 6c 3b df 54 bd 00 00 00 1c 00 00 40 05 | ac 90 18 d8 00 f9 15 ad 07 5e df 3f 97 c5 48 08 | 0a 92 84 e5 | libevent_free: release ptr-libevent@0x7fb36403ae90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348048a60 | #465 spent 0.086 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 8e 23 d2 13 62 a1 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #465 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #465 | rejected packet: | 61 8e 23 d2 13 62 a1 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #465: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0493 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #445 | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #445 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #445 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49683.403975; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003519 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348048a60 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #445 | libevent_malloc: new ptr-libevent@0x7fb36403ae90 size 128 "road-eastnet-nonat-193" #445: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #445) | b4 2e 78 cc c5 f6 9b 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a ba 44 5e e8 04 0b 1d 80 c6 75 3f 8a bb 68 32 | 06 11 b8 93 58 a0 e3 d0 41 9a dc df 91 ac 0b 46 | b8 6d fc ac c1 e9 09 52 48 47 7e 50 d3 96 46 49 | 4c db ea ed bd 20 06 58 05 cd d9 91 57 1d 80 4d | 27 35 e2 86 24 5f 4e 32 bf 57 32 fe 52 fe 8f 11 | 64 dd f6 c1 cf a0 23 81 27 d1 05 22 c7 e8 81 e4 | 67 a9 8c 32 ef 56 b6 40 b1 5f 41 a6 60 fd 00 92 | 0a e3 78 9b f2 03 2c 98 1e 8c fc 31 fc 9b e2 d2 | 0c f9 17 3c fe e3 b4 da 8e 06 ef 92 fc 84 24 e8 | 41 6f 79 14 e9 fb a1 a0 07 48 de 12 d6 84 2d 7e | 90 30 a3 38 3d 28 16 c5 17 69 90 4c 1a 42 aa f9 | c8 01 fd 3b 2e 46 f9 3b 3c c2 87 e4 f3 79 4f c7 | 11 59 a6 e8 26 10 94 45 c9 46 e9 8c ab e9 1d 28 | 48 da 5b 23 c8 48 65 23 9b 45 8d ab 8d 58 2e 78 | 34 e4 38 1d 80 97 ed 49 5c 38 3d af 3b ec ad d6 | 83 24 62 c1 f1 7d c9 59 93 3c f3 1e db d1 30 e4 | 29 00 00 24 43 99 24 d2 66 51 b3 d4 1c 15 bd 40 | 1f a6 87 a7 4d 01 75 d0 ba dd bc 61 a0 08 b2 b5 | 88 d8 85 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 20 6b 9d 83 bc 81 44 79 c4 11 cc | c3 90 0e 2f 55 7c a4 51 00 00 00 1c 00 00 40 05 | c1 5a b3 1c bf d8 ae 9a 12 a9 ee 41 24 11 a3 d4 | f8 37 2e 14 | libevent_free: release ptr-libevent@0x7fb37c014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | #445 spent 0.0864 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 2e 78 cc c5 f6 9b 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #445 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #445 | rejected packet: | b4 2e 78 cc c5 f6 9b 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #445: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0532 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35804b810 | handling event EVENT_RETRANSMIT for parent state #390 | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #390 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #390 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49683.426247; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003293 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #390 | libevent_malloc: new ptr-libevent@0x7fb37c014c70 size 128 "road-eastnet-nonat-138" #390: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #390) | f0 59 d0 2d 97 92 84 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 a6 bc 87 d6 62 82 0f 67 22 b6 ee c6 47 37 24 | 35 77 67 9d 2b 69 4d 68 d9 17 5e 4e 5b 7c e7 e0 | de 0c 00 17 eb 73 f2 8c 21 62 77 5f ed 93 76 62 | 82 34 a8 dc e3 cb c2 5a 08 71 13 11 3d 4b e6 d1 | 76 57 25 8b a6 9b ab 1b 86 9a b2 3c b4 c5 09 27 | 07 3a 9a 1f b3 ba dc 74 b5 99 e0 70 c7 35 07 15 | 6b eb 79 13 3f 27 25 55 75 85 60 5d d2 d0 ba 32 | 68 73 83 f4 c5 0a 96 0e 4b e5 39 e5 86 02 a4 93 | e2 f4 48 ef 0c f4 c4 74 9a 13 7f eb 1a f7 58 25 | 7f f1 9e dc 6a 9c 5a 01 55 d6 94 fe 2a 9d 15 54 | c4 c7 a9 92 32 84 b6 cb 67 d0 cf 4d c5 e2 bc df | 9f d8 4e db 8f 96 2f 1e c9 d0 ec 6a 9b 77 d4 57 | 6b cf 06 d5 ae fb ea 29 a5 1f 59 cf 78 34 af ff | a5 76 3d 89 27 c1 f8 1c 6e a5 66 a5 63 8a 2d 2f | b3 a7 de f9 71 62 f3 67 56 6c 03 83 1d be 14 17 | 8c 04 f3 ba 5f 3e 7d cb 76 74 94 e2 c9 0a 5a 07 | 29 00 00 24 9a 7c 0d 04 38 99 0e 36 73 a3 ab df | 41 d9 56 ed 47 3b 6b 02 19 aa 87 30 cc 21 65 76 | f4 51 64 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 0a c1 09 04 69 58 cc 7d de 65 69 | 68 f6 ba 86 4e 7f 6a 28 00 00 00 1c 00 00 40 05 | 52 91 09 9c ff 5e 67 81 8a 7d bb c1 ce e0 37 4c | d9 14 ec 51 | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35804b810 | #390 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f0 59 d0 2d 97 92 84 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #390 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #390 | rejected packet: | f0 59 d0 2d 97 92 84 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #390: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37800cc10 | handling event EVENT_RETRANSMIT for parent state #475 | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #475 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #475 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49683.458907; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001319 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35804b810 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #475 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 "road-eastnet-nonat-223" #475: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #475) | f3 25 a8 40 a9 16 90 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 fc dc 84 62 e7 1f 29 92 4f 29 58 18 7b 3f c4 | 0b 92 35 41 3d 7d f5 49 ac e4 08 33 00 55 13 7e | 41 c8 1f ab 98 7a 30 c3 af c3 cf 6c 36 f8 c9 eb | 2e 6e a4 90 d5 52 a2 8a 0e 83 47 aa 06 91 44 23 | e7 ef 3d 2e 37 19 57 6f 45 ce 1d 86 c2 e7 46 ee | 18 2a 29 c4 ec 14 a5 7f 72 bc 78 02 59 a2 ca 1d | b2 b0 a4 5c 1b 84 48 bf bd 56 e0 d5 a2 ad cf a0 | ed 67 0d 74 38 b9 ba e0 64 fd 1a b6 82 cc d6 8a | 07 94 d5 49 9d 7f 16 e0 7c 51 29 17 d6 08 40 72 | fd c6 fa 75 b2 47 30 6b 15 b9 55 b9 02 dd d8 c4 | c6 0d e1 61 7d 87 80 e1 c1 30 9f 40 92 6e 85 e9 | ef ce 2d ce 71 79 64 d3 dd 63 ec db 24 83 38 23 | 73 f2 c1 e6 cf bd 52 ef 73 4d 97 4a 32 ac ae 30 | 6c 19 3c 8f 59 15 1c e0 c6 b3 5b a5 c9 da d5 d9 | 5d 32 c2 2c c5 8a 99 8b d0 ac 6f 05 fa 9a 82 9e | fa 91 c3 17 c1 28 24 70 4e 52 7c 04 70 68 57 b3 | 29 00 00 24 d6 06 09 cd b7 26 a0 ec bf 9a 6e 13 | e8 2b d8 44 aa f3 29 4e 9f 5a e2 23 56 33 79 1c | 13 aa 41 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 5a 5b 76 80 70 09 57 e9 61 f5 b2 | db 52 90 c9 67 ea 13 33 00 00 00 1c 00 00 40 05 | 6b c7 4e 4d 75 42 5c 91 03 17 f3 17 f4 9d bf bf | b8 92 f0 13 | libevent_free: release ptr-libevent@0x7fb37801fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37800cc10 | #475 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 25 a8 40 a9 16 90 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #475 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #475 | rejected packet: | f3 25 a8 40 a9 16 90 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #475: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1aec0 | handling event EVENT_RETRANSMIT for parent state #446 | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #446 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #446 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49683.46819; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002858 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37800cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #446 | libevent_malloc: new ptr-libevent@0x7fb37801fd50 size 128 "road-eastnet-nonat-194" #446: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #446) | 88 1d ae ca 37 da 9c 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a c2 f6 76 62 03 08 9a a8 98 a1 67 18 76 36 6f | f2 14 09 7e 5a 52 4f 9f 19 c8 ba 89 bc 37 1d 8e | 11 c7 c7 24 c8 21 0f 20 96 1c 89 74 ee 2d eb 0f | d9 40 32 aa 68 91 41 4a dd 21 15 90 12 e4 8b c9 | 4d 5c 9c dd a5 b1 90 8f 14 47 58 25 b1 c4 3a 4d | f0 56 c6 bf 57 58 f2 ac e6 d1 1a 63 f9 d8 c3 1a | a4 3b 86 89 ab bf 3e 5a 25 6f 85 ba 03 4e 84 c0 | a7 2c b9 17 b5 20 be c6 c5 13 97 18 56 e3 27 c2 | f9 d2 f9 ff 5e 3c 1b 93 48 e2 17 63 4c c3 83 be | b7 98 15 95 f6 a1 48 ea 20 9c e6 f3 53 b1 cd 88 | 53 a7 49 3f 59 99 9e 83 6d e2 88 bb a9 e3 fc 02 | 29 31 b8 83 4f 47 15 6b 71 12 58 3e 96 a5 76 cc | 0b 52 1f 8d 6c b2 63 0d 85 4d 51 f2 5f f7 f4 97 | 20 32 4c 0f 1c ff 39 c3 f0 0e d9 00 b3 27 e0 af | 29 89 02 52 1a 56 5c 18 4f a4 87 c7 25 17 55 3d | f8 28 8f d9 14 95 ef 08 7c ea 8b df 87 e5 f7 5e | 29 00 00 24 5e f7 7f 32 12 e9 cf 93 a5 5f 05 08 | 2b 32 36 a4 d8 35 51 26 4c a4 53 84 4a 3d 2b 33 | 5f dc 90 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bd 76 de 3d 7d 38 3c 23 fa c5 a8 aa | 98 15 c0 6a 4a ab a4 fc 00 00 00 1c 00 00 40 05 | 7b cf 42 04 70 bc 06 e9 71 4c e8 ba 2d 5f 18 79 | 9f 19 93 8c | libevent_free: release ptr-libevent@0x7fb3600300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1aec0 | #446 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 88 1d ae ca 37 da 9c 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #446 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #446 | rejected packet: | 88 1d ae ca 37 da 9c 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #446: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46adc640 | handling event EVENT_RETRANSMIT for parent state #232 | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #232 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #232 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49683.469487; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005775 exceeds limit? YES "road-eastnet-nonat-232" #232: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-232" #232: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #484 at 0x557d46b0f580 | State DB: adding IKEv2 state #484 in UNDEFINED | pstats #484 ikev2.ike started | Message ID: init #484: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #484: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #484; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-232" #484: initiating v2 parent SA to replace #232 | using existing local IKE proposals for connection road-eastnet-nonat-232 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 484 for state #484 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b1aec0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #484 | libevent_malloc: new ptr-libevent@0x7fb3600300e0 size 128 | #484 spent 0.0907 milliseconds in ikev2_parent_outI1() | RESET processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 resuming | start processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #232 ikev2.ike failed too-many-retransmits | pstats #232 ikev2.ike deleted too-many-retransmits | crypto helper 9 starting work-order 484 for state #484 | #232 spent 2.46 milliseconds in total | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 484 | [RE]START processing: state #232 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-232" #232: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #232: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #232 "road-eastnet-nonat-232" #232: deleting IKE SA for connection 'road-eastnet-nonat-232' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-232' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-232 | State DB: deleting IKEv2 state #232 in PARENT_I1 | parent state #232: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #232 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 484 time elapsed 0.000582 seconds | libevent_free: release ptr-libevent@0x7fb3580407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adc640 | (#484) spent 0.582 milliseconds in crypto helper computing work-order 484: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 484 for state #484 to event queue | in statetime_stop() and could not find #232 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #484 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7fb378034680 size 128 Initiating connection road-eastnet-nonat-232 which received a Delete/Notify but must remain up per local policy | crypto helper 9 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-232" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-232' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-232" | stop processing: connection "road-eastnet-nonat-232" (in initiate_a_connection() at initiate.c:349) | spent 0.0754 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #484 | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 484 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #484 | **emit ISAKMP Message: | initiator cookie: | 74 f2 d9 62 15 c8 1b 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-232 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e6 3b 62 f3 ed f9 47 0c bf 01 45 93 af e9 01 13 | ikev2 g^x b4 4a bb 89 23 94 52 5c ed 86 36 6e eb 69 47 16 | ikev2 g^x 4f 4d 66 99 6d c7 d9 da 05 03 61 83 27 be 84 fb | ikev2 g^x f7 56 2a 10 f6 9b f2 84 b7 d0 85 06 cd 12 0f 3f | ikev2 g^x a6 61 71 e1 4c 4c be b5 23 cc e4 61 ef 62 aa 02 | ikev2 g^x 7f 71 fa f2 27 5a a1 66 46 df 65 7e 72 33 12 a7 | ikev2 g^x d6 b1 80 2f 61 a3 b3 4c c2 28 e7 cf a7 3c 3b 6f | ikev2 g^x 3a a0 e5 2d 1e 20 bd 32 76 a2 9f 45 f7 a6 6e e6 | ikev2 g^x 37 c0 ae 2c 38 01 39 bd 5f e0 3d 65 31 0e f3 37 | ikev2 g^x 25 fd f7 75 ed 4c 70 31 98 89 dd 26 6b f0 c6 86 | ikev2 g^x 26 2c de ac 79 65 19 00 78 ef 2a 8b 1d ed 38 d3 | ikev2 g^x 5d 90 eb e1 29 71 f3 ff 0c 50 ed 12 97 fe f3 76 | ikev2 g^x 44 b9 27 26 27 3a b5 56 98 ce 1d d1 07 e6 e9 5e | ikev2 g^x c0 92 67 d1 b6 25 97 6b 40 80 cf 9a 68 03 d5 29 | ikev2 g^x 53 a9 fd 87 28 85 18 42 c6 5b 08 65 a1 d2 2b 6d | ikev2 g^x e9 34 66 d8 9b 2a 73 2a 5b b8 59 63 5e 1f 84 b9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 71 8e 31 23 c4 63 d2 6d d6 0a c0 cb 7f b2 37 27 | IKEv2 nonce b0 85 2e 73 82 c7 9f d6 c1 fd d8 67 ff 33 43 92 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 74 f2 d9 62 15 c8 1b 5a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e8 | natd_hash: port= 01 f4 | natd_hash: hash= f2 6d 47 d8 30 7b 36 73 b1 0d df 8b 82 69 87 3e | natd_hash: hash= 91 43 68 d6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f2 6d 47 d8 30 7b 36 73 b1 0d df 8b 82 69 87 3e | Notify data 91 43 68 d6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 74 f2 d9 62 15 c8 1b 5a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 23 15 eb e5 a3 5e 20 cf 73 fe 01 cb 79 d0 a6 f2 | natd_hash: hash= 55 38 68 fe | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 23 15 eb e5 a3 5e 20 cf 73 fe 01 cb 79 d0 a6 f2 | Notify data 55 38 68 fe | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #484 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #484: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #484 to 4294967295 after switching state | Message ID: IKE #484 skipping update_recv as MD is fake | Message ID: sent #484 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-232" #484: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.232:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #484) | 74 f2 d9 62 15 c8 1b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 3b 62 f3 ed f9 47 0c bf 01 45 93 af e9 01 13 | b4 4a bb 89 23 94 52 5c ed 86 36 6e eb 69 47 16 | 4f 4d 66 99 6d c7 d9 da 05 03 61 83 27 be 84 fb | f7 56 2a 10 f6 9b f2 84 b7 d0 85 06 cd 12 0f 3f | a6 61 71 e1 4c 4c be b5 23 cc e4 61 ef 62 aa 02 | 7f 71 fa f2 27 5a a1 66 46 df 65 7e 72 33 12 a7 | d6 b1 80 2f 61 a3 b3 4c c2 28 e7 cf a7 3c 3b 6f | 3a a0 e5 2d 1e 20 bd 32 76 a2 9f 45 f7 a6 6e e6 | 37 c0 ae 2c 38 01 39 bd 5f e0 3d 65 31 0e f3 37 | 25 fd f7 75 ed 4c 70 31 98 89 dd 26 6b f0 c6 86 | 26 2c de ac 79 65 19 00 78 ef 2a 8b 1d ed 38 d3 | 5d 90 eb e1 29 71 f3 ff 0c 50 ed 12 97 fe f3 76 | 44 b9 27 26 27 3a b5 56 98 ce 1d d1 07 e6 e9 5e | c0 92 67 d1 b6 25 97 6b 40 80 cf 9a 68 03 d5 29 | 53 a9 fd 87 28 85 18 42 c6 5b 08 65 a1 d2 2b 6d | e9 34 66 d8 9b 2a 73 2a 5b b8 59 63 5e 1f 84 b9 | 29 00 00 24 71 8e 31 23 c4 63 d2 6d d6 0a c0 cb | 7f b2 37 27 b0 85 2e 73 82 c7 9f d6 c1 fd d8 67 | ff 33 43 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 6d 47 d8 30 7b 36 73 b1 0d df 8b | 82 69 87 3e 91 43 68 d6 00 00 00 1c 00 00 40 05 | 23 15 eb e5 a3 5e 20 cf 73 fe 01 cb 79 d0 a6 f2 | 55 38 68 fe | state #484 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3600300e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b1aec0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adc640 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #484 | libevent_malloc: new ptr-libevent@0x7fb3580407f0 size 128 | #484 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49683.470855 | resume sending helper answer for #484 suppresed complete_v2_state_transition() and stole MD | #484 spent 0.479 milliseconds in resume sending helper answer | stop processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb378034680 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 f2 d9 62 15 c8 1b 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #484 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #484 | rejected packet: | 74 f2 d9 62 15 c8 1b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e8 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #484: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acc140 | handling event EVENT_RETRANSMIT for parent state #283 | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #283 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #283 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49683.479047; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005224 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378012890 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #283 | libevent_malloc: new ptr-libevent@0x7fb35000cf80 size 128 "road-eastnet-nonat-31" #283: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #283) | 6d 25 6c e9 9d 21 2c 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b e9 86 64 c6 6f 55 a3 bc 52 39 e5 45 42 b6 cc | f2 a4 d8 e4 d7 c3 31 05 04 56 63 c6 c2 26 bf 59 | 6a b9 a8 fc fa 31 7a 57 4f f1 c0 49 83 9c 61 f6 | ea 6e c3 47 87 15 57 34 67 e5 10 86 61 2d 48 bc | 65 9e 10 ea 92 ad c9 b9 04 73 b8 2e a2 d6 b3 0a | c0 be 8f 2a 6c 99 ba 2f e9 4c 9e ba 98 ae c9 a2 | 11 55 c6 05 57 8e ab ea fe ab c0 66 94 91 31 6d | 5a 61 9a c2 11 87 93 ed bf 92 59 c4 b9 84 ce ab | db 12 40 39 53 0e ae d0 f2 e5 17 3c ea 18 98 24 | 12 e5 c0 95 86 ac ec 82 ab 81 6f 9e 62 08 73 b9 | a8 9d e0 0f 7d f3 2e 0b 7e 07 bc 19 99 3e 51 81 | 29 43 73 f2 dc b1 11 40 fd 25 79 3c 57 b5 ab be | 2e e1 68 18 e4 38 d8 a0 4c 8c 74 5e ff df de 09 | df 96 78 f3 4d 4d f6 30 46 ec df 31 2f 74 61 0b | 81 46 62 97 97 55 58 f5 2a c4 6f df 71 dd ee 98 | ae ac aa b2 0f 96 9a 79 9a bd 7e 1b 8b 95 fc 2d | 29 00 00 24 19 7a 94 41 a3 df 39 c8 6e b5 7e 75 | da 2c b2 db 58 bf cc 1e 51 b1 c7 de c1 0f 32 c8 | 22 50 94 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 90 7d 87 8b 25 a9 47 ca 59 98 98 | 30 6c 9b 73 ee 84 48 a4 00 00 00 1c 00 00 40 05 | 6c 03 cb 30 07 ff 71 63 de 15 87 b9 5c 0f 43 de | 70 36 3d ec | libevent_free: release ptr-libevent@0x7fb3440300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acc140 | #283 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 25 6c e9 9d 21 2c 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #283 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #283 | rejected packet: | 6d 25 6c e9 9d 21 2c 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #283: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358018460 | handling event EVENT_RETRANSMIT for parent state #466 | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #466 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #466 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49683.481346; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001956 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acc140 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #466 | libevent_malloc: new ptr-libevent@0x7fb3440300e0 size 128 "road-eastnet-nonat-214" #466: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #466) | d8 f3 8e 44 6b 2f 1e a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c e1 1c b6 a8 45 43 90 db 9b 35 75 1f aa 92 f9 | d6 e2 6f 34 81 df f8 c5 fb 61 93 34 a9 9a d6 e7 | 4f 19 4e 64 91 79 4b bc 74 e5 43 7f 1c fd f5 46 | 67 4f b3 d8 c9 4d 2d c9 eb 26 c5 ea 6c 36 ba 25 | 06 8c 1d c8 05 71 c9 48 a5 ca a6 91 9c 00 5f c8 | af c1 a9 4d 01 92 ef ab 3a e6 5a 67 89 38 c9 af | 19 fe 4d 6b 76 3f 95 f8 65 3e 4b 5b 24 34 56 32 | 9f dd 59 97 7b 03 2f 23 ce fb e6 f8 e4 68 93 ff | ad 3a cf f3 67 73 9d e1 9b 2a d0 84 d4 ba 4d fe | 72 3c 74 29 f1 ab eb eb fd d6 c3 47 54 02 c4 5f | 85 e4 bc a9 88 7b 25 6d 99 c6 f0 38 89 09 7c 47 | 72 c2 61 46 a0 1d 59 09 82 b5 5f b7 e1 f1 5c 0d | 50 1d c9 01 1e 1c 93 24 6c e4 5b 27 7f 49 97 85 | 14 7e 19 88 ae dd 1a b6 56 79 35 3e ff bd 7d 4e | 47 80 ff 35 79 4b c6 1c b6 e7 5a d2 8f b2 aa 73 | 6a 88 5b 1d bb 78 3e 8d f2 9b 06 47 8f 4b 75 e7 | 29 00 00 24 4b 18 d5 35 7f 58 ef 5d 8f 25 3f b5 | cb 0b 31 6c 2d c9 a6 3f f9 92 29 72 9b 38 37 11 | 6a b0 a4 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 d8 47 26 17 c1 8a e8 09 00 37 fb | f1 38 56 14 b9 a5 7b 42 00 00 00 1c 00 00 40 05 | 10 91 19 bc 27 f8 ea 8a 40 18 2c 45 b2 2a 2d 38 | 23 45 ab e1 | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358018460 | #466 spent 0.094 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 f3 8e 44 6b 2f 1e a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #466 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #466 | rejected packet: | d8 f3 8e 44 6b 2f 1e a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #466: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12c00 | handling event EVENT_RETRANSMIT for parent state #479 | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #479 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #479 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49683.489611; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499674 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #479 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 "road-eastnet-nonat-227" #479: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #479) | cf d2 c5 54 f4 1c f6 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 7f 14 60 4b 10 9d d5 d2 57 b0 91 8f 3f bc 64 | f3 21 66 f1 3b 94 f5 72 55 1b ed c6 dd 53 3b 05 | c0 1d dd be ad b9 bd d8 0b 5f 4b e3 1c 65 1f 4d | f0 ee 1b 33 c4 3a 9d de 12 12 f6 89 59 76 db 59 | 58 77 c4 51 cb 4f 4e a0 dc fb d2 f7 62 b4 a7 a3 | 1b 68 cb bb e9 09 d6 f0 e4 6b 8d 72 c7 c4 14 34 | 39 ae 8e 61 09 3a 83 2f f5 f4 c7 5f d2 2d b0 d4 | 26 d7 e0 79 26 1d 45 4b 13 c4 86 65 f4 ae 01 81 | 02 a6 0e b2 43 b5 c9 34 60 91 47 c7 ad 72 96 75 | c1 19 c1 36 df fe 89 e5 4a ed b6 37 c9 47 46 4a | ec 4d e3 1d 06 24 05 ec 83 47 39 85 ec 30 13 7d | 3c 3d d1 56 09 9f a0 06 ca 9a 1a b3 23 55 50 9a | b8 7d cc bd 04 23 e1 7e 80 5a 10 c7 17 c0 8f 7a | 89 c6 a1 6e 48 75 0a bf 79 1f 97 1f 66 26 95 b2 | 3f 11 75 2c 3f 93 e4 16 06 22 12 43 49 c5 4b bb | 85 1e 39 53 e2 84 3e 8e cf ad ff a8 7d 04 99 42 | 29 00 00 24 ce ca 8a 00 13 b6 bd c6 7f bf 18 48 | 13 5d 00 cd e5 1d be f3 d6 a7 2f 7b 66 35 3d e6 | f4 91 6b 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 e1 6d ff 62 21 60 0d e9 4e cd 21 | 6e a6 95 f9 84 a3 ab 9c 00 00 00 1c 00 00 40 05 | c0 97 f9 bf 8a bc 59 d7 d0 0f 34 34 05 ac 6e 13 | dc 84 e0 81 | libevent_free: release ptr-libevent@0x7fb338035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c00 | #479 spent 0.0943 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cf d2 c5 54 f4 1c f6 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #479 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #479 | rejected packet: | cf d2 c5 54 f4 1c f6 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #479: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3680129a0 | handling event EVENT_RETRANSMIT for parent state #391 | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #391 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #391 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49683.494883; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004124 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c00 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #391 | libevent_malloc: new ptr-libevent@0x7fb338035930 size 128 "road-eastnet-nonat-139" #391: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #391) | 1e 4c 10 d0 5a dd 02 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 44 38 de 57 e6 42 14 4a 75 cb e8 86 f1 15 c7 | b3 6b a5 d0 a3 15 b5 a8 cf fe 21 90 de 4f ce 44 | 4b 9e a3 45 9f e5 e3 4a e1 61 50 92 d7 96 bd 78 | c9 7d fa 56 09 ee b1 46 53 20 fc ad 34 b3 1e e5 | 0c f4 f7 d3 65 bb 8f 18 cc a8 06 7f fc 7e 66 0f | 5a c0 66 08 19 5f fe 23 13 53 7d f1 cb 35 9c bf | b6 cc 27 b3 74 16 78 a5 d0 41 0b 66 96 4e d5 0b | a8 67 13 54 66 95 b9 f4 f4 50 eb 64 58 9c 23 eb | 8d 1e 98 9a 88 3b 5f 86 67 00 79 34 97 29 56 1a | b2 15 47 48 a5 9a 2b a5 34 cb 00 12 67 7f e0 d9 | 3a f8 09 e7 20 e1 52 74 01 fd f4 0c 96 53 a6 b7 | c6 61 c0 6c f5 79 6f b0 c7 2c 95 3d f0 6b 1d 3c | a1 9c 76 2c 42 98 e7 2f 92 d1 8e 08 bb da 6a 80 | de bb 58 dc 69 88 c5 71 37 d4 7b 84 79 2b bc 7c | 3c 5f 6e af 11 b3 52 0f 4a 94 17 dd 26 64 0a 25 | 66 61 88 60 23 0c 83 1b 44 d1 a9 f9 6e 89 2a f7 | 29 00 00 24 f4 e3 20 9c cf 9f 8b a0 c8 c9 bb b9 | ac d4 eb 98 02 de 0f c4 e7 00 7a df 68 e7 4c eb | e6 18 a5 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 3e 10 ca 19 aa 6a 76 c2 f6 15 22 | 58 d4 f7 90 3e 72 98 9d 00 00 00 1c 00 00 40 05 | 94 13 1b ea fd 35 6e 40 4c 88 7a 5c c1 e4 2f 2d | 6d 26 6f 2a | libevent_free: release ptr-libevent@0x7fb38001abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3680129a0 | #391 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 4c 10 d0 5a dd 02 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #391 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #391 | rejected packet: | 1e 4c 10 d0 5a dd 02 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #391: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0479 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35401d710 | handling event EVENT_RETRANSMIT for parent state #392 | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #392 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #392 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49683.559174; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004983 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3680129a0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #392 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 "road-eastnet-nonat-140" #392: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #392) | 10 0f ce a6 80 60 53 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 7c dc 39 42 03 83 1d fc 78 1f a6 0a 82 be ac | 8c 3b 39 1b 2f 80 e7 cb aa b0 35 db d6 f3 de 35 | 37 b1 68 f3 68 1d 2d f4 b0 35 cc 7b dc 22 05 f9 | b7 af f7 1d a4 46 4d 00 a0 fe ea 26 a2 f9 9b 9a | 09 ee 3f e6 65 a7 03 64 d2 2c 26 ad b0 0a b6 6c | b7 a6 17 d4 6e a3 92 2f 34 cc d4 54 77 6b ca 57 | d5 59 3b bf 54 fe aa b8 9e 19 8b 0b 05 8a f7 be | fc d0 1b 7e ca 71 b1 c1 02 6a 82 df ef f5 65 97 | da 1e 51 41 e3 d8 f1 96 c4 03 03 bd 8f 10 04 b2 | c3 58 82 7f ce 35 78 05 db 11 6d 1f 95 52 d4 56 | 49 d1 80 fa 2e f3 ac 1f 38 a0 e5 d5 81 e9 34 d8 | 41 7f 2d 0d 61 dd 7b e7 44 a4 89 c9 0c 7d 05 e4 | 9f 1e 2d 40 16 34 e0 f0 2c f0 ca 39 ea 5a 9b 3c | e7 ee 11 8b d0 d0 71 64 02 96 00 c1 27 19 8e 75 | f0 b3 d3 5e 45 6f c3 79 42 e7 20 9d b5 0d 76 ff | e5 ba 64 52 91 7f bb 6e bc 95 4c d1 a1 34 da e7 | 29 00 00 24 27 55 30 76 6e b8 e9 20 0f 49 9d 0e | 6c f7 55 67 5b a0 fb d4 e7 df 75 53 94 42 2e 19 | d9 ae ec a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 0f f0 e9 84 b6 f5 5d 7e 1b 97 d7 | 89 b2 50 d4 36 fd 91 50 00 00 00 1c 00 00 40 05 | 93 22 be de f9 76 c2 04 2a 35 c8 fb 20 98 3d d6 | 50 a7 79 8d | libevent_free: release ptr-libevent@0x7fb35402ede0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35401d710 | #392 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358009690 | handling event EVENT_RETRANSMIT for parent state #284 | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #284 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #284 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49683.559311; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006401 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35401d710 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #284 | libevent_malloc: new ptr-libevent@0x7fb35402ede0 size 128 "road-eastnet-nonat-32" #284: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #284) | 4f c5 f3 7c 66 c6 91 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba b7 9c a5 65 e1 b6 6c 6d 9d e6 37 7c 5c f0 56 | 41 3d 90 c7 c5 60 97 4a 06 1e 79 6d 8b 7a e1 25 | 8a e0 db 36 d3 fb fd 75 27 2c e6 11 8c 23 25 88 | 33 6a f7 df 2d 31 86 e1 88 c6 aa 1b d4 34 45 16 | 89 ed d8 a3 84 50 47 88 30 89 02 8c a8 40 9f 16 | 7d e6 73 98 ef b8 9b e4 c2 07 6e 64 f9 a7 00 b0 | 51 f9 1e 1e 5d 35 fd 1d 61 a0 8a db ac 3a a5 8e | 67 a3 5b 3b 5e 51 8c 98 11 1d 70 aa 48 6b 1b 38 | fe 3a 74 c3 2d 4b 66 87 e9 a4 65 ed 1c 5b e4 91 | fa be 09 5f aa ec 3b 28 29 ab 52 85 54 9f ad 67 | e9 64 b2 c0 a7 f8 4d 31 5f 8c e9 8e 20 90 9f 65 | 6a 76 61 75 16 6e 59 99 0c 9b cb ca c4 c4 20 96 | 27 41 40 bc 51 ae 53 c0 78 fe 0b f1 3b 9e 38 fe | 94 f7 01 4f 33 dd 41 c6 b8 e2 1f f5 07 d9 60 b6 | 76 7e 73 5f c5 3d 67 e4 c6 ee 71 88 8c 90 3a 18 | 0e 12 ec 6b 94 d2 71 0c c3 11 05 e5 1f bd ac 6a | 29 00 00 24 e8 7e a2 09 c5 c0 d6 dc c4 8f 1b fd | a9 a5 28 29 c6 ee 14 10 31 5e 74 e5 a8 11 e2 fb | 53 d1 4d b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 bd 1e aa d2 1d d0 15 75 cf 8a a1 | 9b e7 2e 78 e9 b8 ab 0e 00 00 00 1c 00 00 40 05 | 98 e6 12 78 17 7a 25 b0 15 91 c2 32 50 43 18 e1 | 21 f2 b2 de | libevent_free: release ptr-libevent@0x7fb358023e50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358009690 | #284 spent 0.0704 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 0f ce a6 80 60 53 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #392 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #392 | rejected packet: | 10 0f ce a6 80 60 53 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #392: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f c5 f3 7c 66 c6 91 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #284 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #284 | rejected packet: | 4f c5 f3 7c 66 c6 91 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #284: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0376 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3a590 | handling event EVENT_RETRANSMIT for parent state #467 | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #467 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #467 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49683.564598; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002675 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358009690 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #467 | libevent_malloc: new ptr-libevent@0x7fb358023e50 size 128 "road-eastnet-nonat-215" #467: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #467) | be 07 ac 9a b2 b5 64 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 4e 05 41 e0 9c 82 57 92 0a 9a c0 ac b7 0e 16 | 8f cf 40 f2 c1 21 c6 0e 53 7f 71 9b 23 53 ab 32 | ef 64 72 bf 1c eb 94 98 29 9f 35 3d 25 d3 1c 5f | e7 9d 00 19 e2 0a 16 20 a6 ea 3a 6d 7b 32 8e 93 | 96 ee 8d 09 fc 5d f8 27 b9 ca 49 09 65 ce cf 30 | 67 2e f4 4f 3d ad 29 2d 5a 4c 68 40 7f 94 6f ad | f5 98 12 1b 59 74 90 02 ab ae 6a 47 c6 cb f0 fe | 1e 5f 8d 21 2a 5d 11 fe 17 3b 75 9d 65 5c 76 a0 | e4 ca 7c e0 c8 8a 37 49 e6 36 2e 9d 9d 6c be 13 | f2 87 dd 81 d0 10 4c ee c7 ac d9 53 97 d2 c8 92 | 06 a5 e1 c9 c7 93 30 ee d6 3d ac 47 98 50 1f 6d | d0 3a db 8b df 20 7f 6b 55 4b d3 fe b0 df 95 14 | 4e 40 f5 72 7e 0c bb 04 da d9 d2 07 87 d2 e0 72 | 1c 20 5b 2d c2 5e 0e 89 32 b0 a4 ac ae 09 91 0a | ac c6 1c cc d1 3b 35 35 b5 b5 4c 01 ce b4 2e ea | cd 79 86 98 20 31 06 5b 6a 88 36 07 19 32 e2 40 | 29 00 00 24 65 a2 6f 51 03 e0 c3 95 a1 17 d9 10 | 35 d2 c8 05 2a 6d 6f d8 b4 c3 4c 08 92 7c 46 6b | 3f 11 55 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 95 f5 c4 0f 53 2d de 04 94 5d f4 | 44 07 bd 21 62 32 e6 d2 00 00 00 1c 00 00 40 05 | d8 32 98 63 8b 4a fe f1 1f e4 de 6d 0f 9b fc 4d | cc 8b 9a c1 | libevent_free: release ptr-libevent@0x7fb344046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3a590 | #467 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be 07 ac 9a b2 b5 64 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #467 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #467 | rejected packet: | be 07 ac 9a b2 b5 64 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #467: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0458 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6e010 | handling event EVENT_RETRANSMIT for parent state #447 | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #447 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #447 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49683.575859; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.001214 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #447 | libevent_malloc: new ptr-libevent@0x7fb344046040 size 128 "road-eastnet-nonat-195" #447: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #447) | 38 12 e6 81 e7 94 57 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 06 2b 67 fa f3 85 ef c9 87 64 80 c6 08 7f 26 | 45 8a d6 b2 f0 0d 75 25 97 6d 45 07 fd cb e4 04 | bf 7e ab 4e 45 57 81 c7 b5 29 22 16 b5 58 17 73 | fb 06 1c 20 f6 01 42 43 d1 e6 cb 7e a1 aa b9 6e | 26 8c bc f7 62 2d 79 d5 2d 49 41 71 09 9e b4 75 | ea 9e f2 7f e9 07 f0 a5 64 1a db a1 ff 4f ee 2e | 4f 3b 9e aa ac 22 2d 9f 1b 37 bc cf 47 d1 ca f1 | 85 86 f8 a5 9e 4a f1 ed 2d 36 8a 97 fa 17 f5 2d | 74 78 21 72 1b 33 88 07 44 c7 17 ee 95 f3 cb cb | 74 32 bb 69 59 ac ab 47 c6 9c ea 80 62 ae 1f 88 | 81 9b 37 d9 2d eb b0 eb c8 de b9 11 87 9a a9 5b | 92 c9 38 b1 30 9b d0 b1 7f 2a dc 10 02 4c 1e 0e | 28 73 54 43 6f 78 74 45 0e 5e 40 cb d7 a1 f6 9b | 8d bf eb b3 ff de 36 ad 5d d5 a1 e7 e2 d9 b6 74 | 11 52 d9 17 88 a2 35 0f d7 23 95 ef eb 8f 58 a1 | ef f0 f0 24 22 5b dd f5 64 21 6b 5a 10 90 d6 b9 | 29 00 00 24 c8 ed 9d b9 b2 64 8b 9d 5d 85 10 8f | bc bb 1d 46 c9 3a dd 35 d0 ed 23 11 cf 06 d9 fd | be 51 4b 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 28 c6 de 25 95 4a 27 58 aa 1c c2 | 15 34 6b e8 d4 2b c8 d2 00 00 00 1c 00 00 40 05 | dc 67 81 1e 74 e8 91 b7 d4 fb 94 8c c2 c6 73 c6 | 89 a9 30 0d | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6e010 | #447 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 12 e6 81 e7 94 57 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #447 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #447 | rejected packet: | 38 12 e6 81 e7 94 57 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #447: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.048 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac5400 | handling event EVENT_RETRANSMIT for parent state #480 | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #480 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #480 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49683.586117; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500593 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6e010 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #480 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 "road-eastnet-nonat-228" #480: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #480) | a0 d0 03 15 77 7b 55 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 81 bc 92 43 cc 20 cb 32 dc a3 83 a6 05 ad 00 | 98 6a 1a f3 68 9d 6f 0d 87 ec e9 f6 9a 02 0f 25 | 1f da 1c 78 f1 67 23 e0 e2 7f 61 43 d9 1f 5f b6 | e6 b8 f2 3c ff c1 08 c4 9f 6c 2a bc 8e ba 45 54 | 84 19 36 a3 17 42 a8 a4 75 a3 82 0a 1c 91 e1 7c | b0 f8 bf b5 fa 9f 83 82 f9 d4 70 3e e1 df 4f 6b | 6b 5d aa 23 00 ad 45 7c d2 ab 83 9c d3 c8 48 f4 | a4 1e f5 9c 86 61 b3 f2 25 c7 70 01 ac 67 7a b7 | f7 4a 5c 1c 8e 8e 59 fc 33 71 85 33 b4 10 65 ea | b8 c2 b9 0f e6 63 11 67 85 ad 57 f7 4e c8 76 85 | f8 97 7d db 2b b8 ed 1b 8b 66 54 1e 04 fc 55 3a | c8 bb b6 a6 8a 5c 4e fe c9 53 36 0e 42 74 0e b7 | bd d3 59 78 0c df 94 62 fd c2 21 a4 0c fb 4f 6c | 1c 91 d6 a4 ec 87 92 d0 8f 1e 01 93 bd 89 c0 fe | 71 01 53 5c 6f 46 39 61 8b 59 d6 4d 65 9b d8 a3 | 15 32 57 28 19 30 26 21 35 36 08 9b 79 f2 1a b0 | 29 00 00 24 c8 ff 1d 8a 8a c7 55 8b 0d 6e 9c 13 | 67 dd f9 00 d4 15 c8 78 b6 24 b1 bf aa 08 b9 85 | 7a e8 a9 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb af 61 69 a2 a5 79 11 dc 03 2e 27 | 8e 1f c8 4a f0 b2 47 27 00 00 00 1c 00 00 40 05 | 5a ba 74 8a e7 0f 7a 9b 13 6d 0a ce d0 eb db 09 | a2 8a df 80 | libevent_free: release ptr-libevent@0x7fb354035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac5400 | #480 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #233 | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #233 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #233 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49683.586315; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.009178 exceeds limit? YES "road-eastnet-nonat-233" #233: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-233" #233: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #485 at 0x557d46b10b40 | State DB: adding IKEv2 state #485 in UNDEFINED | pstats #485 ikev2.ike started | Message ID: init #485: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #485: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #485; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-233" #485: initiating v2 parent SA to replace #233 | using existing local IKE proposals for connection road-eastnet-nonat-233 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 485 for state #485 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ac5400 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #485 | libevent_malloc: new ptr-libevent@0x7fb354035930 size 128 | #485 spent 0.103 milliseconds in ikev2_parent_outI1() | RESET processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #233 ikev2.ike failed too-many-retransmits | pstats #233 ikev2.ike deleted too-many-retransmits | #233 spent 2.59 milliseconds in total | crypto helper 10 resuming | crypto helper 10 starting work-order 485 for state #485 | [RE]START processing: state #233 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-233" #233: deleting state (STATE_PARENT_I1) aged 64.011s and NOT sending notification | parent state #233: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #233 "road-eastnet-nonat-233" #233: deleting IKE SA for connection 'road-eastnet-nonat-233' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-233' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-233 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 485 | State DB: deleting IKEv2 state #233 in PARENT_I1 | parent state #233: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #233 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 485 time elapsed 0.000625 seconds | libevent_free: release ptr-libevent@0x7fb380006900 | (#485) spent 0.63 milliseconds in crypto helper computing work-order 485: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | crypto helper 10 sending results from work-order 485 for state #485 to event queue | scheduling resume sending helper answer for #485 | in statetime_stop() and could not find #233 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb37c034680 size 128 | crypto helper 10 waiting (nothing to do) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 d0 03 15 77 7b 55 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #480 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #480 | rejected packet: | a0 d0 03 15 77 7b 55 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e4 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #480: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0656 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-233 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-233" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-233' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-233" | stop processing: connection "road-eastnet-nonat-233" (in initiate_a_connection() at initiate.c:349) | spent 0.0649 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #485 | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 485 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #485 | **emit ISAKMP Message: | initiator cookie: | 26 20 85 62 4e 58 16 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-233 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0d 04 a6 43 51 7a 0a e3 68 c7 b6 92 c0 2e 14 67 | ikev2 g^x a2 f2 cb 51 e5 ce 35 16 88 d3 54 6d 62 23 37 bb | ikev2 g^x 56 61 2f d6 85 87 83 0f 70 f6 72 39 7f a7 0c c7 | ikev2 g^x 1e 70 d8 7f 4c 38 fa 53 49 29 41 95 c4 be f2 60 | ikev2 g^x 8b f1 ad 4f de df 26 c9 05 54 42 92 f1 01 24 5d | ikev2 g^x 5f 31 21 56 71 00 1c 4f 7f 83 41 cc a7 f5 8b 27 | ikev2 g^x 25 fc 78 92 10 e8 44 60 1c 59 0a 5b 0b c5 c2 c7 | ikev2 g^x 8a b4 bc 89 2b d6 59 5c 8c 78 a1 23 dc b0 6c 50 | ikev2 g^x 12 f1 b3 89 73 06 41 12 b7 a8 52 30 67 21 d0 5c | ikev2 g^x a9 0e cd 21 2b 24 e0 cb a7 f2 11 99 34 b7 dd 82 | ikev2 g^x a8 b2 9f 4a 0e 72 6d 9e a6 39 41 fd 0a 77 de bc | ikev2 g^x 1d a1 ee ad 3a 47 74 75 05 d6 38 42 86 69 10 70 | ikev2 g^x a8 ff d8 3e 12 b1 c4 88 03 52 77 9f cb 91 9d 87 | ikev2 g^x ca f5 79 a8 95 63 5f 4e a8 1e 43 7f 48 49 97 d5 | ikev2 g^x 03 8a 20 ac 28 9d 5a 1c 08 20 6e 33 63 3c ac 79 | ikev2 g^x a6 2e 32 53 fd 1d bb 3c 94 09 f3 ea 45 51 42 83 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3d d6 d9 80 a2 0e 12 b1 24 d9 6e f6 52 8a 26 6d | IKEv2 nonce ef 88 17 44 c3 1d 79 ed f7 7c 90 92 c7 d9 57 d0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 26 20 85 62 4e 58 16 4e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e9 | natd_hash: port= 01 f4 | natd_hash: hash= dc 14 52 a7 e7 6d fa 0b e3 0e 97 be 5d 15 66 8b | natd_hash: hash= 43 e6 a9 e4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dc 14 52 a7 e7 6d fa 0b e3 0e 97 be 5d 15 66 8b | Notify data 43 e6 a9 e4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 26 20 85 62 4e 58 16 4e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6d 80 f6 1e bc 0d ea 94 d1 d1 d0 f0 fd 2d 1e 46 | natd_hash: hash= 86 63 b8 47 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6d 80 f6 1e bc 0d ea 94 d1 d1 d0 f0 fd 2d 1e 46 | Notify data 86 63 b8 47 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #485 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #485: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #485 to 4294967295 after switching state | Message ID: IKE #485 skipping update_recv as MD is fake | Message ID: sent #485 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-233" #485: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.233:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #485) | 26 20 85 62 4e 58 16 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 04 a6 43 51 7a 0a e3 68 c7 b6 92 c0 2e 14 67 | a2 f2 cb 51 e5 ce 35 16 88 d3 54 6d 62 23 37 bb | 56 61 2f d6 85 87 83 0f 70 f6 72 39 7f a7 0c c7 | 1e 70 d8 7f 4c 38 fa 53 49 29 41 95 c4 be f2 60 | 8b f1 ad 4f de df 26 c9 05 54 42 92 f1 01 24 5d | 5f 31 21 56 71 00 1c 4f 7f 83 41 cc a7 f5 8b 27 | 25 fc 78 92 10 e8 44 60 1c 59 0a 5b 0b c5 c2 c7 | 8a b4 bc 89 2b d6 59 5c 8c 78 a1 23 dc b0 6c 50 | 12 f1 b3 89 73 06 41 12 b7 a8 52 30 67 21 d0 5c | a9 0e cd 21 2b 24 e0 cb a7 f2 11 99 34 b7 dd 82 | a8 b2 9f 4a 0e 72 6d 9e a6 39 41 fd 0a 77 de bc | 1d a1 ee ad 3a 47 74 75 05 d6 38 42 86 69 10 70 | a8 ff d8 3e 12 b1 c4 88 03 52 77 9f cb 91 9d 87 | ca f5 79 a8 95 63 5f 4e a8 1e 43 7f 48 49 97 d5 | 03 8a 20 ac 28 9d 5a 1c 08 20 6e 33 63 3c ac 79 | a6 2e 32 53 fd 1d bb 3c 94 09 f3 ea 45 51 42 83 | 29 00 00 24 3d d6 d9 80 a2 0e 12 b1 24 d9 6e f6 | 52 8a 26 6d ef 88 17 44 c3 1d 79 ed f7 7c 90 92 | c7 d9 57 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dc 14 52 a7 e7 6d fa 0b e3 0e 97 be | 5d 15 66 8b 43 e6 a9 e4 00 00 00 1c 00 00 40 05 | 6d 80 f6 1e bc 0d ea 94 d1 d1 d0 f0 fd 2d 1e 46 | 86 63 b8 47 | state #485 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb354035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ac5400 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #485 | libevent_malloc: new ptr-libevent@0x7fb354035930 size 128 | #485 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49683.587761 | resume sending helper answer for #485 suppresed complete_v2_state_transition() and stole MD | #485 spent 0.444 milliseconds in resume sending helper answer | stop processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c034680 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 20 85 62 4e 58 16 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #485 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #485 | rejected packet: | 26 20 85 62 4e 58 16 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e9 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #485: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0573 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_RETRANSMIT for parent state #476 | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #476 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #476 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49683.622962; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000744 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c01fda0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #476 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 "road-eastnet-nonat-224" #476: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #476) | 49 8c 7a 08 2e cc 2c 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 8e 65 66 a1 7b b1 8a 9d 19 04 71 0a 79 27 ce | 6b 54 47 32 ba 6e a8 65 c3 0d 42 b2 0f 96 a2 a0 | 61 e2 94 05 83 68 df 22 7a 41 44 d2 4f e1 67 a1 | 60 b4 59 da 81 10 89 57 9a 5f 7b e1 cb f8 3b 1c | 6b e5 1e 2a 7e 02 80 cb 9a b1 16 8c f4 74 52 c7 | 1b 8b b0 44 c6 c4 32 f3 a4 5d f0 73 3e b1 fa a1 | b2 71 e4 e2 5a 6e 52 66 e3 b8 09 2b 71 a1 10 d1 | 10 3c 31 b6 a5 93 a0 0f f1 c2 e3 a3 6b 1d 4a 8c | d0 ba 9f ac 0a e4 67 88 a7 bb ab 52 59 75 2a f3 | 7e 3d 81 45 67 16 9e 61 0a ee 09 44 27 d0 34 eb | a1 e6 bf 3e 15 23 17 f4 a9 f6 b0 c4 cb fa e4 c1 | c5 79 db 37 a8 57 54 eb d1 68 1c ef 18 56 41 83 | e2 52 4d 7d eb e3 4a db 5d d0 82 39 0c 54 56 aa | 04 9a 1e d5 4b e1 50 f6 49 eb 07 2f b8 68 4b 6e | ca 4e 01 63 ab c2 da 21 fb e2 14 e9 0d 0e ff 26 | 78 8b ff 8b 3a 63 7f c4 a4 eb a1 d4 bb 4b 60 67 | 29 00 00 24 04 bd 81 be 7c f6 28 8b 7d 46 a5 cd | 03 dc d6 e4 08 bf 60 ad d1 ef ac 3f a3 21 88 37 | 52 bb 5d 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 ab 9f 05 ae 62 3b 7f e7 ce 4f 13 | 2e 4b 82 3c e1 44 b7 89 00 00 00 1c 00 00 40 05 | f1 c5 d9 81 d6 d6 94 d2 dd 0e e2 5d 61 59 c7 43 | 61 40 b6 b1 | libevent_free: release ptr-libevent@0x7fb364023a90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | #476 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #393 | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #393 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #393 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49683.623166; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00656 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #393 | libevent_malloc: new ptr-libevent@0x7fb364023a90 size 128 "road-eastnet-nonat-141" #393: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #393) | d2 4f c7 97 0e 2c 3e ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 57 42 91 f9 c0 06 25 d3 5e c6 ff a0 b9 c7 9a | f8 73 f5 52 ea b3 b7 0b 33 79 a9 ab be 94 f5 d3 | 47 a2 ed 3f 30 d5 f5 d7 c5 7f 9d d3 ed 4d a0 b4 | f7 ad a1 76 18 49 17 db 8a b9 cb ed 58 a9 0c d9 | 5a 76 b8 cb 07 f9 85 e7 ea fe 63 f8 ee 0b 16 50 | 8f 7f 23 44 74 8a 56 f9 51 93 d3 d4 1e a9 e0 6d | d7 af c4 1a 46 a4 66 f8 55 f1 fc bb 79 62 df 34 | 8f ee 1b 57 26 7e c4 de 20 f4 80 c2 d6 80 72 a1 | aa 53 f1 e8 e4 e6 1c e7 0b 29 98 85 7a 59 d5 aa | 68 b0 88 b1 b9 15 73 53 b5 6a 19 c9 ae 48 c5 a2 | 01 52 4f ea f5 c9 9f b8 90 37 cc 56 4f 8d 78 b9 | 10 dc d8 56 42 a7 88 d4 9d 82 8e d9 33 ab ac 86 | 5e b8 f6 d0 8e 0c aa b2 4f 41 73 62 f2 0c c2 27 | ef ba c6 42 e2 bb a6 b0 c4 15 d3 04 4c 56 e0 5c | ad 92 8b ed ed ba dd c2 b7 4a 92 54 4a ae d4 37 | c3 0d 4f 7c 37 7e 0b 49 1e 1d 38 1e 4b 41 b4 43 | 29 00 00 24 f4 b5 fb 56 01 5f ac 00 1d 31 6b d7 | 01 8d f2 d0 3f 15 27 39 dc 6b 31 7e 82 50 a3 bb | 9c f0 ec f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 9c 87 ea bd bf 36 3e cf 82 b1 7a | 78 3f f7 57 2c cf 08 1f 00 00 00 1c 00 00 40 05 | 77 3b 5d 4c 9c 3f 6e 8a 01 7a d1 9c 5b 89 36 dc | 10 f8 1f e1 | libevent_free: release ptr-libevent@0x7fb34c00f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #393 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 8c 7a 08 2e cc 2c 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #476 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #476 | rejected packet: | 49 8c 7a 08 2e cc 2c 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #476: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 4f c7 97 0e 2c 3e ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #393 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #393 | rejected packet: | d2 4f c7 97 0e 2c 3e ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #393: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0572 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00cc10 | handling event EVENT_RETRANSMIT for parent state #285 | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #285 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #285 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49683.623441; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004592 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #285 | libevent_malloc: new ptr-libevent@0x7fb34c00f1a0 size 128 "road-eastnet-nonat-33" #285: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #285) | 8e b8 37 d5 68 56 5c 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 a4 f2 e0 52 94 4a 81 83 55 c1 41 32 b7 b8 02 | 1f ed 45 79 af ff 8a eb 0a de 74 5c 80 82 ad 8f | b3 d0 39 bf 3b db ca 12 0b a2 0e eb ce 92 b6 11 | 51 c6 b7 d3 f4 87 aa 09 0c f5 bb d2 46 13 91 7d | 65 dc 9e 2a 12 da 3f be a8 bc 4e 1c a1 4c 53 ad | 64 f4 41 68 96 19 bd e1 80 86 91 4f 17 c1 cc 5c | ad 72 12 cc 9c fe d8 85 6a cd 1f 0f cf 61 bc 07 | 09 af 5b a0 a2 6c 2a 6f 4c 7e dd ad 13 55 ed 0e | ce cf e6 c5 66 9e 5a 6a e4 42 78 50 61 c3 d4 73 | e3 47 f2 bc a4 8c 26 64 97 c9 f1 2a c6 63 9c 83 | 60 4f 25 9e cb 7a 10 71 25 9d c1 dd 11 38 34 bc | 7c a1 3b 2b 0d 73 6f f9 3c 0b 62 50 05 38 a7 0e | 31 2d 60 72 dd 2b a2 05 f6 e2 f0 0d 9b c1 b1 9e | c0 ee 0d 2f 64 4b 28 d2 c0 e7 3b 0a 50 ff 03 45 | 45 ff 2c cd 4e 54 17 7d 2b 95 02 32 23 94 0e de | 7b 38 d9 9c b7 e8 7d 2f 56 9c 26 e0 8b a0 e6 38 | 29 00 00 24 e6 a9 52 cb 4c 75 d2 f3 84 20 3b dd | 0e ee e2 12 57 50 c2 6f 3d 4c ae 21 23 00 a4 ca | 8c 87 5b 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 5c 90 12 97 99 4e dd 8f 9a cf 75 | ad 0a 2b a1 31 ad 53 29 00 00 00 1c 00 00 40 05 | f9 f4 9b a0 01 06 28 22 67 53 82 2b ec 0b 3c 23 | 3e d8 d3 7f | libevent_free: release ptr-libevent@0x7fb35c023d80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00cc10 | #285 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e b8 37 d5 68 56 5c 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #285 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #285 | rejected packet: | 8e b8 37 d5 68 56 5c 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #285: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0596 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c012bf0 | handling event EVENT_RETRANSMIT for parent state #448 | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #448 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #448 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49683.656731; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003987 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #448 | libevent_malloc: new ptr-libevent@0x7fb35c023d80 size 128 "road-eastnet-nonat-196" #448: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #448) | ea d6 68 25 ae ee 80 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 2e 7f 22 4b d6 ee 79 95 7d ea e6 94 56 fc 59 | 41 1c 12 66 f4 de 00 d4 6a e6 f4 4c 67 01 c3 97 | d7 f0 7f 15 19 52 1c e1 e7 cb 10 43 bf 32 f7 97 | 3f 7d 76 9e 8f 5c 2d a2 10 89 27 a3 31 39 40 6f | 23 b5 50 de a5 26 d5 37 1d bc c7 b0 be 51 02 45 | 35 60 2b d9 a4 52 16 a6 1b 75 6d 90 d7 94 82 b4 | dd 41 db 2a cd 7c b4 ec 00 64 fe 2d 52 b4 ab 6f | a1 8a dc c4 d8 32 f4 27 d3 99 3c 5b 3c 30 47 ed | 06 54 fe bf 5a 80 4f d3 cd d3 63 ab 7a 0a c4 81 | eb 86 4b 9a 37 9c a7 bc 09 9b f1 b6 f5 69 f2 05 | c2 89 b2 f3 ca 58 71 7c 0b b2 02 99 cf da 83 99 | b9 82 4c 58 38 5d 2d be 03 71 b3 5f 32 1a 82 30 | 6f ca 79 08 7e ac dc 25 d6 1a ad 46 a4 8d 7c 47 | 64 b8 24 1d 37 d9 41 0f 8b 4e 16 65 d2 41 4b ab | d2 0e 95 38 92 91 3a 77 ae cf 19 35 ef c9 91 13 | b4 90 b2 24 68 10 9d af 29 52 a9 15 24 f7 4d 93 | 29 00 00 24 f3 0f f3 36 25 a9 50 89 21 ce 62 13 | d8 e8 8d 8d c3 33 f9 d1 62 a2 a6 a0 e9 3e 64 7f | fb b2 90 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 d7 4f 67 97 77 e0 a3 2c fc 24 e7 | 7a a9 1a d4 d3 98 14 3c 00 00 00 1c 00 00 40 05 | 18 00 5b 20 2e 1c a9 8b 56 50 4b 4f f1 d3 fc 60 | 9d dd 28 85 | libevent_free: release ptr-libevent@0x7fb340040790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | #448 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea d6 68 25 ae ee 80 d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #448 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #448 | rejected packet: | ea d6 68 25 ae ee 80 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #448: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0498 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34001fa80 | handling event EVENT_RETRANSMIT for parent state #468 | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #468 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #468 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49683.662987; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003134 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #468 | libevent_malloc: new ptr-libevent@0x7fb340040790 size 128 "road-eastnet-nonat-216" #468: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #468) | 7d 98 8a 9d 47 30 f3 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 4d 82 7b ce 67 f5 e3 c7 ef 1e 88 97 12 6b 1f | 83 b8 f4 6b 5d e2 86 e0 e9 f2 9b 39 cc 52 e7 74 | 42 1d 82 da 97 54 f4 cf 8c bb 44 74 5b 79 77 99 | b7 64 d2 5d 6f 79 ec 9a 9b f2 ae b8 84 7a 6f f8 | bd c4 91 ab 33 ef 63 16 a0 41 ba 3f f0 a6 76 33 | 99 9d 4e fa 10 3d a9 b0 fd 9d 95 6a 6d e1 64 80 | d6 f4 63 87 42 a4 40 d5 c9 d1 7b e6 b6 16 87 12 | 6b a3 97 13 be 62 fd d1 99 d3 9b d9 d0 66 91 ae | 70 9a 30 e7 e3 dd b0 da 82 fe e4 f0 44 cc b3 94 | 0b 57 c5 e6 97 4b 2c 01 fc cf bd 64 1e a3 1b 36 | a4 86 4a 71 7a 5d 83 15 27 9a 5b c7 b1 4b fa cd | 49 2c bf cb fb 1f 32 58 4d 30 7f 18 2a 34 d2 95 | e4 1f 33 09 6a df d3 45 5e 2c d0 94 30 dc 69 26 | e1 ac dd 8a 80 89 5d 10 3f 35 db e7 62 f2 ea e4 | 46 d5 0d ed 2d ad c4 c0 e6 d7 96 39 cc 2d f8 c8 | 62 6c cf 39 6f 6d 88 19 5a ed 59 0b b3 2a c0 06 | 29 00 00 24 92 6b ec 6b 64 1a 9e 4e ed 8a 02 4d | da d7 da b0 19 37 ca 67 a4 74 bd db b5 b1 e8 9c | 42 18 dc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f 7e f5 e7 e8 50 e9 16 af a5 e6 5b | b1 d0 cb b5 42 f7 79 13 00 00 00 1c 00 00 40 05 | f3 f2 fc c6 17 9d d4 89 d0 fb 82 c7 ed b0 98 6a | 20 f1 09 0b | libevent_free: release ptr-libevent@0x7fb3400343b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34001fa80 | #468 spent 0.0984 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 98 8a 9d 47 30 f3 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #468 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #468 | rejected packet: | 7d 98 8a 9d 47 30 f3 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #468: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370017ea0 | handling event EVENT_RETRANSMIT for parent state #394 | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #394 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #394 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49683.685253; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004058 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34001fa80 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #394 | libevent_malloc: new ptr-libevent@0x7fb3400343b0 size 128 "road-eastnet-nonat-142" #394: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #394) | c6 0a d6 5e 7e fc 84 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 b5 7c 6c c9 f1 d1 76 55 70 0c 53 79 42 59 aa | 1c 78 3a 1c cf 8e ff bf 3c 4f 8e 36 eb fa f5 80 | 9c 26 80 0f 65 74 f8 36 f2 69 55 0c 8f 0e 23 f4 | f2 22 a0 b5 d9 98 7e 1f aa d3 a2 c6 8c ae 8e 98 | 7c 0a f3 ed 8f 8b 88 58 8c d6 33 95 a0 55 9d 22 | 45 bd 30 81 fc 6e e7 86 9a f8 90 92 f7 2d bb 24 | 69 7e b6 2c e3 c4 d3 78 cf 51 21 62 11 c2 15 e2 | b3 a9 82 d8 15 7c 3e 4d bb 85 98 4b 06 e1 32 2f | 7a ee fc 56 3c 9b 3f a7 bb d2 50 44 19 3c 10 75 | d0 ab ea a8 d0 55 74 15 97 4a a8 8a 65 6f 7d 24 | 88 48 f4 59 45 9a aa ed 6e b4 a3 4a 2e c4 97 e3 | ef a9 a3 78 d3 c7 01 a3 80 5f 34 19 5f e9 1a 0b | 22 c3 b3 e4 7b 39 94 40 be d6 c0 25 22 6b 94 43 | 4e 6c a4 23 34 ff 10 49 a6 bf 97 8e b9 5f 55 2d | 28 e5 68 c3 b7 a6 14 92 b7 6a 59 d7 14 cc 2b 2a | 46 b7 9f a5 f7 40 91 f4 58 19 59 a8 c2 3d 8c 54 | 29 00 00 24 48 a4 83 24 df d5 ff 67 2d 1a db a8 | 39 76 5f a5 8c c2 0e 08 ee f5 2b 2a a4 7f 9e 08 | 09 74 ed 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 07 bb 4a c8 d9 c8 75 02 c5 e8 2f | 3d 22 1e b1 bf 8b 35 f7 00 00 00 1c 00 00 40 05 | 6e c1 7a 04 07 74 46 3d 3d f7 4a 09 48 b9 79 2c | 6a b6 13 f4 | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370017ea0 | #394 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c6 0a d6 5e 7e fc 84 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #394 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #394 | rejected packet: | c6 0a d6 5e 7e fc 84 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #394: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350017ea0 | handling event EVENT_RETRANSMIT for parent state #286 | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #286 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #286 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49683.691529; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004092 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370017ea0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #286 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 "road-eastnet-nonat-34" #286: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #286) | a2 ed ea 42 1b 91 7a d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a a6 7d cd 97 e4 f8 0e 4c a8 f7 b1 ec cb f9 8c | 2f 76 7e 20 17 e9 ac 96 37 6c d0 36 42 10 05 54 | c9 b8 65 a2 e7 d3 10 b3 60 78 69 80 3d 25 e3 d0 | 6b b3 ef 43 8d bb 4b f1 6d fd 75 58 b6 64 ea eb | 21 44 51 94 9d af c8 b5 2c d9 89 52 8e 49 92 15 | c8 f5 a7 13 6d cd 71 4c 89 a6 18 b9 37 a2 0d cb | 6e 90 fa f6 c2 05 39 4f e6 3c 7a ff 95 71 4f ea | 6f fa 7f ad 4f d5 8a a0 2f e3 1c 55 7c 9d 2b b7 | f8 c6 43 95 70 9b 3c 8c f8 2e 6e 7f b8 14 5a ab | e6 e2 cc bb a0 95 89 e6 41 f3 31 0c 80 44 7c cc | 26 be 63 d8 03 4f 0e f4 82 c2 32 aa ff f3 ec 67 | 80 f5 48 c4 4e dc 67 68 c5 87 ee 31 77 11 8a 89 | f7 38 08 ed 5a b3 8e c6 08 9c 28 3d e6 49 22 cc | f1 1d ea 6e 27 3f 41 69 56 c6 98 3e aa a5 4b a8 | 83 96 ce 94 b1 ac 7a 4b a0 42 08 47 1d ca 77 fa | 08 50 16 47 c6 8d 84 08 18 b0 a8 93 c0 9a 70 76 | 29 00 00 24 ff d1 37 2d 2c 72 ee aa 08 fb db a4 | 83 ef f7 bd 0a ef 47 b4 41 70 b6 07 5f 86 86 3a | e3 fa 60 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 c0 b7 bc 90 25 46 09 9f 5d 7d 2b | e5 1e 40 45 53 17 97 19 00 00 00 1c 00 00 40 05 | ec a0 d2 60 58 e7 4c 5a 13 5c f5 c2 c9 76 dd 61 | a7 bb 7e 37 | libevent_free: release ptr-libevent@0x7fb350023d80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350017ea0 | #286 spent 0.0873 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 ed ea 42 1b 91 7a d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #286 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #286 | rejected packet: | a2 ed ea 42 1b 91 7a d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #286: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0403 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36001d710 | handling event EVENT_RETRANSMIT for parent state #481 | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #481 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #481 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49683.702796; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499919 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #481 | libevent_malloc: new ptr-libevent@0x7fb350023d80 size 128 "road-eastnet-nonat-229" #481: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #481) | e8 f0 49 b6 6a 16 76 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 5b 3d e6 1f 63 af 92 47 ff bb 34 96 d0 88 24 | 67 3c e1 47 18 9d 62 8e d3 a4 9d b7 75 51 2f 4d | c5 c0 85 26 a0 ef 6b 42 e3 31 89 58 06 3e 3f 70 | 40 68 5f 34 02 73 08 9e 17 dc ee 6e ae 64 70 e1 | 29 5c 9e 3f 09 58 a9 16 14 23 bb 74 7b 7f 22 34 | a9 d6 3f fe 74 0f 40 5a 32 4d ac 87 fc 80 7b d4 | 2d 54 ec f5 ce b0 c6 dd a4 dd 82 14 e2 9a 36 7e | 86 de 04 4a c2 4a 3a 27 d9 82 5e 6e f1 1d d8 3d | 86 d1 82 99 be f9 63 b2 56 5a 40 42 2e 8f 30 eb | fd db ce cc 5a ac 0e 49 65 64 01 18 b4 1e 60 8d | 74 bc e9 b7 46 2e cb e0 1e 2c 67 dc 3f e9 f4 39 | 35 52 90 76 39 0a f3 d2 ac 0b 00 19 f2 ca 97 20 | b7 c6 bb 7d a2 97 ba e5 14 74 e5 ea 2f 4e 4b 3f | 08 53 d9 be 3b dd af 2f 8f 10 fd 09 08 1e b3 13 | 6a 37 e4 ce 19 dd d9 84 13 76 b0 6f 6f 43 48 f7 | 01 a4 a9 0f 9d fb 63 aa 49 8a 2a b5 59 32 b2 69 | 29 00 00 24 ba a6 3b 25 9f a9 3f 06 4e ea 48 38 | eb e2 25 25 ca e3 dd 6c 01 6e 12 39 f8 cf ff e2 | 6d 18 2b 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a ef 98 84 e9 40 8f 9c 0a de 34 0d | 25 31 92 b5 ca c8 92 af 00 00 00 1c 00 00 40 05 | 81 a9 90 20 77 ac 91 2d 88 99 0f 36 2d 43 7d f6 | 2e 36 29 48 | libevent_free: release ptr-libevent@0x7fb364012740 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36001d710 | #481 spent 0.221 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 f0 49 b6 6a 16 76 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #481 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #481 | rejected packet: | e8 f0 49 b6 6a 16 76 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #481: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.104 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab6500 | handling event EVENT_RETRANSMIT for parent state #234 | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #234 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #234 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49683.729285; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.011124 exceeds limit? YES "road-eastnet-nonat-234" #234: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-234" #234: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #486 at 0x557d46b12100 | State DB: adding IKEv2 state #486 in UNDEFINED | pstats #486 ikev2.ike started | Message ID: init #486: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #486: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #486; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-234" #486: initiating v2 parent SA to replace #234 | using existing local IKE proposals for connection road-eastnet-nonat-234 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 486 for state #486 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36001d710 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #486 | libevent_malloc: new ptr-libevent@0x7fb364012740 size 128 | #486 spent 0.104 milliseconds in ikev2_parent_outI1() | RESET processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #234 ikev2.ike failed too-many-retransmits | pstats #234 ikev2.ike deleted too-many-retransmits | #234 spent 2.56 milliseconds in total | [RE]START processing: state #234 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-234" #234: deleting state (STATE_PARENT_I1) aged 64.013s and NOT sending notification | parent state #234: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #234 "road-eastnet-nonat-234" #234: deleting IKE SA for connection 'road-eastnet-nonat-234' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-234' added to the list and scheduled for 0 seconds | crypto helper 14 resuming | crypto helper 14 starting work-order 486 for state #486 | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 486 | in connection_discard for connection road-eastnet-nonat-234 | State DB: deleting IKEv2 state #234 in PARENT_I1 | parent state #234: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #234 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 486 time elapsed 0.000561 seconds | libevent_free: release ptr-libevent@0x7fb384038240 | (#486) spent 0.564 milliseconds in crypto helper computing work-order 486: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab6500 | in statetime_stop() and could not find #234 | crypto helper 14 sending results from work-order 486 for state #486 to event queue | scheduling resume sending helper answer for #486 | libevent_malloc: new ptr-libevent@0x7fb37003f490 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 14 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-234 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-234" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-234' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-234" | stop processing: connection "road-eastnet-nonat-234" (in initiate_a_connection() at initiate.c:349) | spent 0.0688 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #486 | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 486 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #486 | **emit ISAKMP Message: | initiator cookie: | 87 db e2 36 7c f0 df 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-234 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 24 90 89 1b 08 ac ff df cf 1e a7 4d 7b bd 33 5b | ikev2 g^x 51 13 dd 15 4f 57 c0 96 90 46 35 66 7c 24 f4 e0 | ikev2 g^x 0c 27 ca 38 87 f2 ca ce 3e d5 b4 13 12 b8 2b 1b | ikev2 g^x 28 cd b5 9c 97 fa 99 ff ca 60 2f 08 57 c7 43 0b | ikev2 g^x 9a 34 8d 0f cc d3 42 7d 8a 9b 18 49 af 87 e5 0e | ikev2 g^x 60 54 d2 dd 0f 77 79 0a d2 62 1d 4b f7 af 36 a6 | ikev2 g^x 89 10 0e 96 5f f8 fd fd c0 0b 1a 57 52 e4 05 54 | ikev2 g^x 7c e7 03 a6 04 47 19 3c 81 63 a0 84 35 98 42 90 | ikev2 g^x 1a 22 7e c6 ee 29 1f d0 fe 05 cc 68 66 1b 8e f3 | ikev2 g^x 6e 04 59 7b 5f 87 c4 be fb a5 8a bf 90 3d eb 9a | ikev2 g^x 35 8c 2c 40 b3 8e 63 fe 5a 3c 42 89 30 d7 70 57 | ikev2 g^x 1f 4d 37 52 6b 1c 17 6b 78 dd b4 c8 f7 a3 15 58 | ikev2 g^x d1 aa 66 b9 5e c1 c5 d0 ba 3b 05 d7 77 a7 0a 2d | ikev2 g^x c3 f0 02 14 1d 1a a8 4d cb aa 4c 7b 62 3a 6a ee | ikev2 g^x 7e 4e 1c cb d8 20 d4 75 37 c5 87 d5 04 ca 68 48 | ikev2 g^x 13 39 48 6c 64 d9 b7 94 e9 df 23 f3 33 69 d8 cb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 46 3f 4a dc 6e 3d 21 da c5 52 80 db 79 4b 94 5f | IKEv2 nonce 60 de b7 f2 05 82 ab f1 57 25 79 09 be 52 68 b0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 87 db e2 36 7c f0 df 0c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ea | natd_hash: port= 01 f4 | natd_hash: hash= 9e eb dd 20 f6 4f aa b4 b9 d1 56 e6 84 4d e7 2c | natd_hash: hash= 87 e1 c1 3c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9e eb dd 20 f6 4f aa b4 b9 d1 56 e6 84 4d e7 2c | Notify data 87 e1 c1 3c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 87 db e2 36 7c f0 df 0c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= df ec c7 42 be d0 10 8f c9 07 5b a9 94 d2 5a 2d | natd_hash: hash= 6d 05 27 19 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data df ec c7 42 be d0 10 8f c9 07 5b a9 94 d2 5a 2d | Notify data 6d 05 27 19 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #486 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #486: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #486 to 4294967295 after switching state | Message ID: IKE #486 skipping update_recv as MD is fake | Message ID: sent #486 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-234" #486: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.234:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #486) | 87 db e2 36 7c f0 df 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 90 89 1b 08 ac ff df cf 1e a7 4d 7b bd 33 5b | 51 13 dd 15 4f 57 c0 96 90 46 35 66 7c 24 f4 e0 | 0c 27 ca 38 87 f2 ca ce 3e d5 b4 13 12 b8 2b 1b | 28 cd b5 9c 97 fa 99 ff ca 60 2f 08 57 c7 43 0b | 9a 34 8d 0f cc d3 42 7d 8a 9b 18 49 af 87 e5 0e | 60 54 d2 dd 0f 77 79 0a d2 62 1d 4b f7 af 36 a6 | 89 10 0e 96 5f f8 fd fd c0 0b 1a 57 52 e4 05 54 | 7c e7 03 a6 04 47 19 3c 81 63 a0 84 35 98 42 90 | 1a 22 7e c6 ee 29 1f d0 fe 05 cc 68 66 1b 8e f3 | 6e 04 59 7b 5f 87 c4 be fb a5 8a bf 90 3d eb 9a | 35 8c 2c 40 b3 8e 63 fe 5a 3c 42 89 30 d7 70 57 | 1f 4d 37 52 6b 1c 17 6b 78 dd b4 c8 f7 a3 15 58 | d1 aa 66 b9 5e c1 c5 d0 ba 3b 05 d7 77 a7 0a 2d | c3 f0 02 14 1d 1a a8 4d cb aa 4c 7b 62 3a 6a ee | 7e 4e 1c cb d8 20 d4 75 37 c5 87 d5 04 ca 68 48 | 13 39 48 6c 64 d9 b7 94 e9 df 23 f3 33 69 d8 cb | 29 00 00 24 46 3f 4a dc 6e 3d 21 da c5 52 80 db | 79 4b 94 5f 60 de b7 f2 05 82 ab f1 57 25 79 09 | be 52 68 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e eb dd 20 f6 4f aa b4 b9 d1 56 e6 | 84 4d e7 2c 87 e1 c1 3c 00 00 00 1c 00 00 40 05 | df ec c7 42 be d0 10 8f c9 07 5b a9 94 d2 5a 2d | 6d 05 27 19 | state #486 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb364012740 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36001d710 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab6500 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #486 | libevent_malloc: new ptr-libevent@0x7fb364012740 size 128 | #486 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49683.73066 | resume sending helper answer for #486 suppresed complete_v2_state_transition() and stole MD | #486 spent 0.484 milliseconds in resume sending helper answer | stop processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37003f490 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 db e2 36 7c f0 df 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #486 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #486 | rejected packet: | 87 db e2 36 7c f0 df 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ea fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #486: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abe780 | handling event EVENT_RETRANSMIT for parent state #449 | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #449 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #449 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49683.750876; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002549 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3700407b0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #449 | libevent_malloc: new ptr-libevent@0x7fb37003f490 size 128 "road-eastnet-nonat-197" #449: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #449) | ea 52 41 06 29 be 32 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c f6 72 22 70 e3 8e 6a 67 c3 d0 4a 0b 7f 5b cf | 2d 68 56 81 95 56 3f 4d 2a 1e 61 1a 59 76 f5 26 | 54 d5 6a 01 f4 8a a1 63 50 3e a3 b6 d1 85 12 bf | 8c a7 c8 b2 9c d2 7e 12 ce 8a 8f 97 a7 10 c6 36 | 55 54 39 bd 73 f0 07 97 c0 8f d8 2f a2 5e 50 05 | cb 9d 1a b8 ce 20 6a 30 ff 7d 3d 2a 89 9c e8 f9 | db 68 6b e7 d3 12 f3 5c 42 81 cc 9e c7 d6 ab 3b | 07 00 72 f9 2b bb 2c 8f 88 74 45 a7 1f 5a 2d 17 | 94 3e ec e0 ce a9 ab 72 79 45 76 ba 8c 1f 40 56 | 6d 7a 46 42 83 af a1 98 c5 23 1e 58 16 d7 79 25 | b7 cc 17 53 0a 7f 1c 45 dc 0f 11 52 e6 bb 5f 53 | 8d b5 f6 fb 27 2b 60 33 a4 cd 4d e9 7c 6b 4b 17 | 81 ec cb ca e4 d2 97 9b 61 33 64 a7 c9 1d 12 b0 | ff a4 81 cf f4 75 a2 54 63 07 9b 1c 61 4f 70 9a | f2 61 b3 19 96 98 3c 7b 44 1f aa 65 b4 bf d7 a8 | 55 c2 75 de ff 71 8c 90 1b 3c c3 a8 3f fe 54 f3 | 29 00 00 24 43 77 8d 20 c7 95 c9 d5 6a 2d 87 1f | da 3a b4 7e 55 a2 17 ed 53 70 56 79 ef 21 f9 7e | 28 b4 26 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 9b 7e ce 31 a7 8d 1a 50 79 db 89 | b3 07 e5 e2 b0 c0 20 fc 00 00 00 1c 00 00 40 05 | eb cc 39 a0 b6 a4 78 79 56 5f 29 29 93 1e cc 18 | 29 12 ff 3b | libevent_free: release ptr-libevent@0x7fb3880269d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe780 | #449 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 52 41 06 29 be 32 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #449 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #449 | rejected packet: | ea 52 41 06 29 be 32 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #449: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0762 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37400cc10 | handling event EVENT_RETRANSMIT for parent state #395 | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #395 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #395 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49683.761232; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005126 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe780 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #395 | libevent_malloc: new ptr-libevent@0x7fb3880269d0 size 128 "road-eastnet-nonat-143" #395: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #395) | ba 7b 3c 0c 6c 47 ed ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 88 4c 55 7e d1 a2 38 a3 4d 34 44 bf 98 52 f4 22 | 2b 2e d7 52 9d e2 60 32 f1 e9 de 11 e6 81 90 27 | 7f aa b4 cd 92 c7 cc 0a 99 86 49 e0 e9 e5 7f c7 | 53 00 84 30 c4 2b a1 40 94 2b e5 13 32 e0 cc 77 | 9f 67 6c cf 30 e7 4a c4 94 da 5f 5f 42 9a ce 83 | 94 65 21 10 2f c8 9d e9 90 7c c8 a2 24 10 5f eb | b7 e4 01 18 df 72 f4 7a bb ab 13 f9 5e 78 3b bb | fa c9 e1 75 55 1d c1 7d 77 9c f5 dd 9c f1 6d cf | 64 15 f4 f8 06 12 d8 2b 76 e9 8f 68 61 57 5e f9 | ce b7 25 0f 70 50 5b 08 f7 40 3f 01 f6 b5 a6 1b | 6a b5 fe b6 73 a7 04 b2 74 dc 3e 4a 46 a2 06 81 | 11 ce 3e 21 33 d9 a8 2a ee 54 b5 69 d8 57 77 1f | dc ec 39 32 06 54 92 6d 8f 0a ca d2 fd fd bd fb | 1b 7c 6a b6 6b 55 6f cb c2 b7 b7 fb e7 79 1c 7d | c3 44 5b 72 2c bc 4f 59 92 b8 bc 2a d4 d1 be 0f | 33 95 9e 53 f7 bf 90 2f bf b1 8e 5f 51 a1 8b aa | 29 00 00 24 bd 0e 20 29 4b d5 e3 ae 9c 68 67 e1 | 41 5b 48 5c 33 08 9f 5c 1f 4f 9e 6e c3 72 5b 33 | 2c ad 1f 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b1 4d 21 6f 15 00 d4 49 f9 94 84 2e | 85 71 98 cf 82 ff b0 a3 00 00 00 1c 00 00 40 05 | 8a 38 a6 07 76 28 82 e1 53 d4 45 b3 59 f3 34 be | 83 20 f5 6d | libevent_free: release ptr-libevent@0x7fb37401f7f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37400cc10 | #395 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35400cc10 | handling event EVENT_RETRANSMIT for parent state #287 | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #287 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #287 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49683.76141; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005684 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37400cc10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #287 | libevent_malloc: new ptr-libevent@0x7fb37401f7f0 size 128 "road-eastnet-nonat-35" #287: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #287) | 50 65 03 a0 08 b6 fa f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e c0 75 39 cf 17 11 31 32 ce 73 1e 64 99 bc f2 | 7f 98 bb e8 80 c2 38 47 74 80 17 bf 6d 41 27 75 | 39 62 b9 71 ae 1a 47 19 83 cd 81 c0 c8 3d 11 61 | bb 8a a5 d6 29 bd 01 7d f4 ca 44 6d 69 e4 8a 69 | a7 cc 95 e2 b5 6b 25 ca 57 eb 58 2b 4d 53 44 df | 33 8c 6f 33 81 90 ab 83 53 f5 4e 38 ab 63 7b 68 | f5 e4 10 b1 02 5a b6 e7 d6 07 bf 37 24 09 70 4b | bc 69 6e bc 79 b8 a5 58 fa 3b e4 57 c6 64 3b 30 | 47 47 bf b7 ad 67 14 cd 0a eb 04 a2 61 54 d3 a6 | 12 98 21 de 78 b3 bb b5 ae 98 e3 4e 86 f6 80 ab | 82 7f f6 f8 ef c2 b3 23 41 0b ad f4 1d 15 a3 d0 | bf fe 7d f5 bb 15 19 74 8e f2 b9 4c 77 84 ef 53 | 7c be 1b be 09 20 be 00 d9 ce 47 ea 9d 1e 79 80 | e6 b0 92 f0 11 bf e8 8c fd 97 bb 02 bf 46 b7 fa | 29 38 a8 9a ba d7 d1 99 c1 56 93 83 a6 04 d2 fc | 1b 5a ee 22 cc c4 78 02 0c 67 9c 0f 51 14 b2 6f | 29 00 00 24 82 dd 74 7a ae e7 29 d0 0c 9c 0c 72 | 8c 59 8b ec 3e a7 b7 92 7c 72 73 9c 73 da ee 57 | 06 e2 80 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 92 a1 ec 2f 80 2a 27 61 6c 7b 0f | 4c 73 2b 71 f0 03 c4 ea 00 00 00 1c 00 00 40 05 | 71 9b 20 c5 40 26 cd 9d eb 7f a3 62 71 86 bd 52 | 4f c4 9f f6 | libevent_free: release ptr-libevent@0x7fb354023e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400cc10 | #287 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 7b 3c 0c 6c 47 ed ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #395 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #395 | rejected packet: | ba 7b 3c 0c 6c 47 ed ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #395: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 65 03 a0 08 b6 fa f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #287 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #287 | rejected packet: | 50 65 03 a0 08 b6 fa f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #287: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.068 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a97080 | handling event EVENT_RETRANSMIT for parent state #482 | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #482 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #482 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49683.777784; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50013 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #482 | libevent_malloc: new ptr-libevent@0x7fb354023e30 size 128 "road-eastnet-nonat-230" #482: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #482) | 36 c3 54 33 ec a7 b6 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 ed 30 30 be a6 b8 35 5d 7c a5 62 ac c6 13 d8 | 83 27 d5 31 a0 fa 4c 2e 40 b9 54 43 42 15 18 78 | b3 8c 6a 6c 7d 96 c5 85 70 a8 48 20 22 38 c8 e7 | c3 12 d1 63 fb e3 68 d6 08 24 69 60 e5 ac a9 33 | 22 f2 2c f6 14 52 ad 1c 12 97 d4 3c 99 28 7f 69 | aa d1 18 f8 bc 06 35 f3 dd 4f b8 bc 32 67 80 0d | b2 c8 d0 32 11 b6 f1 1a bf 32 1c f4 b1 c8 5d 4d | f1 41 f7 45 a7 42 78 6b 31 8f b7 1a 22 f3 fa a7 | 3f 96 61 3f ad 03 4e 95 70 ec 28 2e 07 88 02 e8 | 35 f1 c5 b3 16 2f 4d b9 e0 29 95 c1 2d e3 e0 37 | 5d 57 61 4b 22 78 ec 0c cc 9d f4 89 9a 2d 4f 1d | b7 c1 f5 ad 55 54 75 4b 2d 2f 97 b2 b3 0a f4 e5 | ca f8 64 9c 52 40 a8 a2 99 0e 3d 9b 5a 9e 1e 2b | 75 b0 89 ef b0 bf 99 f4 37 0e 0c 27 d3 f1 9a c6 | fd 46 0a d5 dc 88 12 58 b5 c1 7a 5a 1b 30 d2 78 | 2b ef 75 09 ea 77 2f b0 ad cc d1 d9 98 94 ca 15 | 29 00 00 24 ba df cf 8a 38 2e 1f 41 21 49 fc b2 | 01 80 ce b1 18 f8 70 f3 ba e7 48 83 d1 e9 62 d6 | 6c d1 b9 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 54 bb 11 83 48 2f 3f fa 5f 96 d0 ad | a2 72 2a 82 ce ec ef d2 00 00 00 1c 00 00 40 05 | c3 77 e0 b4 3a 22 ca d3 bf 9b f4 e6 b2 71 76 56 | 18 71 d4 99 | libevent_free: release ptr-libevent@0x7fb37c023b10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a97080 | #482 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #477 | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #477 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #477 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49683.77792; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001504 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a97080 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #477 | libevent_malloc: new ptr-libevent@0x7fb37c023b10 size 128 "road-eastnet-nonat-225" #477: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #477) | 3f 73 6c 52 e2 16 12 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 68 39 c4 34 ea c1 cb 39 a9 f7 a9 af 21 c4 2f | 59 10 95 11 49 04 1e 26 c9 8f 50 f5 a4 65 8f b4 | 05 5b e9 56 60 ee a1 83 15 a3 b3 99 a1 69 bb 30 | cc 2b 98 3b 1e 30 46 76 ff 8d 39 41 4c 02 aa c6 | 7d 2f 3c 38 bb 54 54 f3 fb 6c ca 8e 5a 70 15 52 | 0e f8 6d 99 7c 6a 3b f5 58 74 0d 21 2e 4e 88 07 | 53 e0 50 d2 f7 38 33 9c 1e ad d9 ed 1d 96 b7 80 | 22 e0 8f bd a1 c0 a3 2c 94 20 d5 25 06 a2 7f 34 | 69 08 93 f9 8f 4f 23 ac b8 84 4e a5 b6 4c a2 fd | 75 2b 4c 8f 39 aa c3 bd 56 04 f8 29 c7 f1 40 cc | 9b 1a e4 8b 46 36 dc 67 52 7b 4f 7f 89 4e ad be | 6b 62 8d 22 67 f2 df e5 dd fb ec d6 50 89 50 9f | ee 43 32 27 75 9c 8a 33 f8 2e e0 8a 42 cb be 39 | aa d8 09 f8 75 cc 7e 70 d1 1d e9 02 66 48 e7 a9 | 85 21 80 86 49 7c d0 81 50 d6 7a 61 62 60 a5 9e | 15 19 da e7 5d f6 40 da d1 f3 3f 04 ae f2 b4 4a | 29 00 00 24 ff dc d7 b1 fd dc f2 f7 49 64 0a 31 | e9 e7 85 40 8d 4a be e6 65 0c 38 4a f9 ed 0f 7d | 4d 19 c2 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 0f c5 61 64 4d d6 f7 e8 8d a8 de | cf 04 b2 c9 0c b8 8a b5 00 00 00 1c 00 00 40 05 | 72 d7 c9 34 b9 dc 3d 33 a4 7e ff 3a 57 4e 49 6e | fe 3e 47 b9 | libevent_free: release ptr-libevent@0x7fb364035750 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | #477 spent 0.0675 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 c3 54 33 ec a7 b6 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #482 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #482 | rejected packet: | 36 c3 54 33 ec a7 b6 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #482: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0451 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f 73 6c 52 e2 16 12 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #477 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #477 | rejected packet: | 3f 73 6c 52 e2 16 12 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #477: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0676 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7e490 | handling event EVENT_RETRANSMIT for parent state #469 | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #469 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #469 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49683.783203; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002086 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #469 | libevent_malloc: new ptr-libevent@0x7fb364035750 size 128 "road-eastnet-nonat-217" #469: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #469) | 29 4a 77 5f 7a c1 26 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 e1 17 9f 01 39 e1 e9 f8 e3 b4 37 56 6e 01 9e | d8 db 78 19 20 a1 ab 6d c3 e8 12 cd f6 c3 2c 5f | d5 86 61 6c a8 d4 5b 57 ac f5 b7 f0 24 de ac 90 | a1 9c 51 ce 2d 7a 33 35 b1 68 02 e0 5a 9f bf ac | 1b d8 19 f9 b4 68 45 14 e7 fd c5 a9 74 d6 09 6d | f9 4a 25 95 f8 f0 1c 13 dd 36 12 79 4b 27 2a bb | 86 17 86 e1 0e 04 a7 ab e3 0c 51 78 89 39 a0 df | c7 a9 56 0a e4 9a f1 58 c7 a1 12 21 f0 18 d0 d0 | 21 0e 73 e6 4f d3 13 37 a8 aa e3 89 21 ab a3 7c | d5 ac 7b aa ea d7 ff a4 b9 b2 c3 7f 9b 07 77 17 | 36 8f 4e a7 40 03 46 9c db 93 b3 16 3c e2 7f c0 | 58 42 83 4f fa 88 71 3b b7 86 e5 ca 62 88 5c 9f | 93 c4 59 82 fb 9e 5a 96 92 16 5f 68 0e 83 59 2f | 70 32 51 a7 ce dd b8 93 09 66 27 ff 7a e6 c4 cc | d2 87 46 9e b6 49 85 48 3f a7 ef 43 8a 5c ae e6 | 2c b0 88 25 66 2b 82 4c a9 2f 05 19 54 70 c3 9c | 29 00 00 24 36 8f c2 cf 02 b6 2e 75 ac 6c a4 55 | 9f 56 a2 b8 31 83 97 a5 56 a5 c5 7a ba 53 78 14 | 83 c8 c0 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 d6 3c 93 bb 1b 68 50 cd c9 2f b8 | 25 99 9e c0 3a 2f 1f 80 00 00 00 1c 00 00 40 05 | e5 a0 2e 8f cb 71 f8 0c 42 a7 95 8f 73 2e c5 90 | e5 8b 3a 32 | libevent_free: release ptr-libevent@0x7fb34c03f170 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e490 | #469 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 4a 77 5f 7a c1 26 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #469 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #469 | rejected packet: | 29 4a 77 5f 7a c1 26 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #469: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #288 | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #288 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #288 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49683.824456; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005815 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e490 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #288 | libevent_malloc: new ptr-libevent@0x7fb34c03f170 size 128 "road-eastnet-nonat-36" #288: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #288) | bf 5c b8 9a ac cd 00 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e dd 69 c1 03 95 4d 9d ab 37 9e bd 4e 38 ec e5 | f2 39 ed 30 ab 4f b4 af 21 e6 29 da a0 8f 8f e9 | 98 9a 5c 5c fe fe ce 8c 1e 28 6b bd f2 27 35 da | c4 21 0a d8 6a ca c2 98 92 8e 38 38 a2 a7 6b ba | 5f d2 6c ce e3 9f f3 13 3d ec 78 7e f5 b7 1e b1 | c9 c9 b0 04 f7 e8 40 14 e7 76 0c 5b a9 d0 33 de | 38 f0 55 f2 f8 c3 51 4e 26 12 33 85 1a 59 5d 06 | e7 63 42 d3 d5 d3 89 6c 22 47 f2 98 c6 f4 da 55 | 13 a9 2a 55 81 33 8b eb 87 ee 13 8e 33 aa a8 42 | 9f da b4 47 d8 37 6a 92 68 90 c1 81 a0 df a1 37 | a4 78 f7 b3 8d d2 2d ce a0 c9 68 dd 56 89 c4 d1 | 63 8d aa 71 1f 08 79 a0 6d 66 a0 3e 16 15 54 65 | d5 46 20 67 d9 5b 61 9c 6a 83 fc f8 ba b1 78 4c | 57 19 a7 94 fa 72 b9 cd d4 1a e2 8c ec 18 65 32 | 0a 6f a6 9d 17 41 ad c3 33 be e4 df 39 be bb 83 | 36 2c fd e8 5d 07 b2 3e e4 4e 6e 8c 65 67 24 e6 | 29 00 00 24 6b 44 05 03 68 15 67 d5 e0 ba b2 f4 | 3c 29 af e5 83 d8 9f ee 30 22 ac b5 c3 ee cd df | dc 79 2d 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 39 d5 43 71 fe 6f b5 ee bc 1b f9 | 48 2a ac fe 4d 86 a5 da 00 00 00 1c 00 00 40 05 | f7 70 11 42 70 0c d7 f2 22 65 12 cb b8 c3 7c 30 | 56 c5 c0 c0 | libevent_free: release ptr-libevent@0x7fb3540300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #288 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 5c b8 9a ac cd 00 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #288 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #288 | rejected packet: | bf 5c b8 9a ac cd 00 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #288: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378046090 | handling event EVENT_RETRANSMIT for parent state #450 | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #450 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #450 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49683.838746; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002495 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #450 | libevent_malloc: new ptr-libevent@0x7fb3540300e0 size 128 "road-eastnet-nonat-198" #450: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #450) | 6c 66 54 70 e3 85 47 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 7f 52 be 1b be 3e b4 95 6c 7f ea ce 79 84 79 | bb 2c a4 22 02 14 1a c7 80 c9 fc 63 a2 df a7 b4 | 1d c3 3e 47 98 35 3a c5 6d 01 79 cf ce 3b ed 3f | e7 fc 21 90 6a 8f a9 37 0a 15 57 ed e5 84 6d 80 | bc b0 af 24 80 0c 58 35 20 db 3e aa 64 ad 44 83 | d9 34 7e 33 a0 1c 88 af b7 63 e8 97 42 89 19 cf | e1 51 ee bc 36 b3 3f ea ae 0a 36 ea 2a 42 b5 d5 | 2b 9d 6c 67 c3 b5 e3 5c 88 ec 08 73 1a b8 90 c6 | eb c9 08 93 4a fd 61 5f ac b7 cf 92 b0 ce 44 08 | c5 ea 9d d1 33 ae 08 3a 55 1a 54 74 ee 06 12 8c | af 05 f1 32 8b f9 ad 76 e7 15 cf bb 56 d8 0d 22 | aa bf 8f d9 bc 81 33 05 b5 ca b2 64 e4 57 c2 aa | 8a ce 60 a9 03 71 24 23 e8 e9 eb 0e f3 fd cb 40 | 57 21 41 6c 87 a4 12 87 6c a3 20 f1 71 99 97 a1 | c9 bf 28 c9 61 1f 0e d1 0f d5 eb 18 2d 83 11 2c | a4 a9 46 db 50 5e 63 04 e8 1e e0 10 c3 22 6d 3c | 29 00 00 24 60 b3 78 69 cb 9c d2 f7 d6 cf 6b 51 | 75 18 c5 a7 1c 11 fb 00 38 fa 43 80 05 51 ec 75 | df 66 73 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 01 2f 17 96 36 9a 51 cd 6f 6e a8 | c1 69 8d 8a 84 17 97 6b 00 00 00 1c 00 00 40 05 | 07 24 02 da 94 a8 c8 5e ad a8 39 f9 98 2f 5a 91 | 01 02 06 a3 | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378046090 | #450 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb360012bf0 | handling event EVENT_RETRANSMIT for parent state #396 | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #396 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #396 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49683.838944; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005282 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378046090 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #396 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 "road-eastnet-nonat-144" #396: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #396) | 34 3a ea ba b4 d5 c3 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 b3 5e a9 7f 93 97 83 00 ac b3 90 fb e7 f1 78 | 95 aa f1 ba 36 2b 6d a3 37 11 74 f8 88 50 3b b9 | 5f 0f a0 79 72 f7 39 e7 3a 2c a8 e0 53 9b be fd | fc bd 96 c1 32 d9 24 ce f7 06 60 ff b3 43 45 a6 | 24 b9 a3 f5 cb 0e b9 aa aa 8e 8f d1 f4 f2 6e c0 | 2d cf 97 8a 96 4c c9 d9 fa 9b b2 4f 23 e7 4e 04 | 32 38 36 77 bf 5c cc 5e 9d b8 9a 89 95 85 a0 cd | 38 05 64 bb 18 47 79 4a 9e e0 36 97 2c 58 a9 ca | 05 7e fc 24 b9 aa 44 5a 5a 1a 01 53 4f 6b 25 9c | 0b 57 f1 a9 6c 20 f6 40 eb 60 95 56 91 d3 93 3b | e3 6f 55 d6 2d 80 8e 1b 25 11 49 ca e7 6a 57 76 | 46 38 51 f8 26 5f df d7 e7 dc 81 fb 26 f9 44 9d | 73 c6 16 4c 9f 24 d8 42 a4 b9 bf 36 76 cf 2d c1 | 81 f5 6e 1c 27 05 14 9e 74 b9 a7 24 89 53 2b 8a | e5 d2 6e 23 b8 62 43 c8 68 d3 55 8e 35 2d 54 67 | 77 ed 1c 39 ec 49 32 f8 1f c9 68 6b 34 67 a6 5c | 29 00 00 24 70 3a 86 3e 59 bb d0 ee e5 b9 db 1d | c8 9a e2 55 5b 79 c1 c3 66 32 3d 49 47 3b f1 44 | bc b6 4a ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 b0 29 ea 4a 03 79 05 a6 d6 5d 03 | 24 78 07 cd 73 8e b4 4c 00 00 00 1c 00 00 40 05 | cb 86 b2 db 9b fe 49 fd e2 3b b4 79 c3 f9 fd 58 | 79 48 29 02 | libevent_free: release ptr-libevent@0x7fb37003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360012bf0 | #396 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 66 54 70 e3 85 47 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #450 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #450 | rejected packet: | 6c 66 54 70 e3 85 47 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #450: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0641 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 3a ea ba b4 d5 c3 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #396 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #396 | rejected packet: | 34 3a ea ba b4 d5 c3 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #396: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0514 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46adb080 | handling event EVENT_RETRANSMIT for parent state #483 | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #483 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #483 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49683.886317; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50031 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #483 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 "road-eastnet-nonat-231" #483: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #483) | 34 4c 65 0f e6 b6 ad e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 14 b4 cd 04 ae 73 27 55 14 94 b2 a9 a9 46 92 | bf 38 7f 34 e4 30 01 9b cc 3d 69 9b 72 22 2d c6 | c0 5a ca f2 aa f8 34 31 df 85 74 a8 8a c4 71 d3 | 18 15 b7 43 a0 c7 52 88 83 cb 13 e3 0b 22 9f 8d | 9b 32 7a fd 24 4c 85 ea ba 28 19 ff da 93 b1 bb | d8 33 5c 65 db be 0a e0 bd 29 79 f5 94 d3 6b 1b | d0 fe 62 1a aa 43 59 54 5f 94 f2 d4 df c7 8c 2c | 9f 79 f7 92 9d e8 8c 7a 9a 6a da 8f dd 5b f5 4b | 78 88 55 3a 27 f6 46 11 a6 78 da 31 e5 57 e3 ff | c3 41 c4 d8 db 92 c7 9b 0b f2 9c 05 a4 6f e4 60 | d6 be 30 93 95 25 fb 5e 0e 06 32 43 09 91 4d 90 | 0e 89 44 7a 24 99 b2 ff 62 86 54 98 47 bc f9 cf | ff 60 15 2b c0 14 62 be bc 88 1f 37 10 d8 42 2b | 8e 68 b2 b4 90 d0 f5 fe bf 7c ce c7 6a 70 46 09 | 84 97 db 42 58 43 9f f3 46 27 26 32 2b 0c cd 41 | 80 81 33 b8 5d 30 60 f3 70 32 7b 81 3a 1a 11 48 | 29 00 00 24 a6 6b eb 02 98 7d a6 5e 59 5e bd f1 | ef cf 36 f2 a9 4b e0 19 61 9c ac e2 ac 17 24 09 | 0d 96 04 a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d1 38 08 89 da 41 ff 7d 1c 3d 17 6c | 3a eb 05 70 fa bf ed 59 00 00 00 1c 00 00 40 05 | d4 38 01 a3 1e e4 dd 2e 8e 63 54 12 3f 4d 01 1d | 49 6b 48 46 | libevent_free: release ptr-libevent@0x7fb378035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adb080 | #483 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 4c 65 0f e6 b6 ad e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #483 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #483 | rejected packet: | 34 4c 65 0f e6 b6 ad e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #483: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3840223f0 | handling event EVENT_RETRANSMIT for parent state #478 | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #478 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #478 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49683.890607; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000917 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adb080 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #478 | libevent_malloc: new ptr-libevent@0x7fb378035930 size 128 "road-eastnet-nonat-226" #478: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #478) | b4 9c 7f a0 55 ec 5f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 86 bb f8 93 0c cc df 70 83 3b a1 9a e0 b8 e3 | ef 6e a7 55 12 1e 4a a1 3c fd 3e f8 52 71 57 ec | d1 b9 27 97 72 c7 60 a2 ce b1 45 33 01 2b 7a c1 | 6c 56 fd d5 59 18 5e d3 c3 75 ef 36 1c 65 ec f7 | 03 c0 d4 70 7b b6 e1 35 71 9d 76 5b 7d 21 d4 3b | 12 1e 6c 03 cf 08 78 60 b5 ba 22 6e 40 93 8e c7 | 49 b5 59 bf 7f 87 44 20 2c 36 31 fc 69 d8 21 31 | 6c 62 2a ef c7 55 7b 01 a6 27 b6 8c 28 9f 7c ac | d4 27 6c f1 7c 85 40 4e 23 a1 d4 02 e3 38 52 92 | 5f 62 3c 6f 58 9e 47 5e 72 b1 b1 7d 8d 92 b6 d3 | be e0 0a 4d 01 e0 16 9f 01 75 9d 1c 68 e3 f5 d9 | 8e 19 b8 2b 12 45 ac 03 e0 b6 4d 98 39 5a 75 d7 | 7c b1 b9 f8 a3 a2 b1 d2 49 e7 b2 11 f2 c6 a7 7f | 57 72 f8 df 1f 7a 3c df 19 c0 28 fb f6 f4 59 df | f9 cb e8 e4 b5 73 46 61 ef 64 d4 38 66 2b 1c f7 | d4 31 c9 51 2e 93 97 3b f3 a7 d3 d3 06 a7 f6 99 | 29 00 00 24 19 2b 71 2c 92 77 f3 24 92 84 03 b5 | 44 5b d7 aa 5e 03 e6 f3 27 6d 26 be 26 c2 0f f8 | de ad c4 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad b7 1a 04 ad be 09 f8 62 42 a2 e6 | 69 0f ca 24 af 9b 5c 02 00 00 00 1c 00 00 40 05 | 37 89 76 5f 87 60 25 2e 24 4c ae 3c 7a 86 5f 05 | 9f e3 e5 ad | libevent_free: release ptr-libevent@0x7fb384041c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840223f0 | #478 spent 0.0933 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 9c 7f a0 55 ec 5f 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #478 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #478 | rejected packet: | b4 9c 7f a0 55 ec 5f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #478: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0411 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a68890 | handling event EVENT_RETRANSMIT for parent state #289 | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #289 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #289 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49683.897872; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005307 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840223f0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #289 | libevent_malloc: new ptr-libevent@0x7fb384041c10 size 128 "road-eastnet-nonat-37" #289: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #289) | 2e 50 46 ff ee 4c e9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 67 60 81 00 e9 c5 12 22 cc 49 d1 8d 87 9d ec | ba e1 ae d7 0f ff 89 2c 01 49 2f 18 a4 d8 5a ff | 94 bb 3c 2d 6c 23 65 3c 9a 45 52 91 05 ff 55 0b | 22 ea fe ea 0a 4e f6 5b 7a 62 13 72 d3 65 de 8a | 6c f3 72 1b af fd 0c 36 3a 05 de a4 6d 9b 92 ce | d9 79 2b 75 ee 9a e2 a1 2c b2 02 b2 85 a2 98 a2 | 3c 63 cc 1f 7e c9 81 88 5b 95 14 a9 db c3 cc 4c | 7d 2a a7 8c 64 c7 93 92 12 cf 28 08 e5 ab 19 fa | 3f 53 9a 5b d7 86 99 40 82 c2 0d 84 83 94 43 d6 | cb b8 b3 06 64 05 bf d9 9d 5b fb 6a 5b 6a d2 16 | 6f b8 75 0b 98 2a 33 7f 2c 96 47 b3 69 76 55 52 | ca 3f b2 34 c4 b8 60 62 c8 0f 07 9c 2a 3e 70 02 | 1f 60 03 3e 97 1e ea 39 09 c8 ac 49 fb 70 ef af | f9 7e 7f f0 e4 2d 18 4d f8 20 f5 71 8f b4 fc be | 11 8b 08 ae 82 4a 27 f4 11 f5 e0 5f 14 7e a2 b5 | 66 07 59 01 f7 8e 64 17 db 17 82 9f be dd 61 54 | 29 00 00 24 70 cb ce 4e e8 fa 33 67 08 21 14 9b | 70 83 d5 d1 77 4f cc 4e 50 51 8a 00 6c d4 e4 19 | 33 47 80 f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 95 9d ea dc 9b 1a b8 2d d8 fe 0a | bb 49 1d 2c c9 ad 47 73 00 00 00 1c 00 00 40 05 | 70 48 4d 18 17 11 80 57 99 3c 90 8c f0 f2 b1 e5 | 98 18 b0 dd | libevent_free: release ptr-libevent@0x7fb374014820 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a68890 | #289 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2e 50 46 ff ee 4c e9 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #289 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #289 | rejected packet: | 2e 50 46 ff ee 4c e9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #289: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5f0d0 | handling event EVENT_RETRANSMIT for parent state #235 | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #235 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #235 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49683.901105; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006617 exceeds limit? YES "road-eastnet-nonat-235" #235: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-235" #235: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #487 at 0x557d46b136c0 | State DB: adding IKEv2 state #487 in UNDEFINED | pstats #487 ikev2.ike started | Message ID: init #487: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #487: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #487; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-235" #487: initiating v2 parent SA to replace #235 | using existing local IKE proposals for connection road-eastnet-nonat-235 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 487 for state #487 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a68890 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #487 | libevent_malloc: new ptr-libevent@0x7fb374014820 size 128 | #487 spent 0.0981 milliseconds in ikev2_parent_outI1() | RESET processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #235 ikev2.ike failed too-many-retransmits | pstats #235 ikev2.ike deleted too-many-retransmits | #235 spent 2.55 milliseconds in total | [RE]START processing: state #235 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-235" #235: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #235: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #235 "road-eastnet-nonat-235" #235: deleting IKE SA for connection 'road-eastnet-nonat-235' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-235' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 15 resuming | in connection_discard for connection road-eastnet-nonat-235 | State DB: deleting IKEv2 state #235 in PARENT_I1 | parent state #235: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 15 starting work-order 487 for state #487 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 487 | stop processing: state #235 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb37c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5f0d0 | in statetime_stop() and could not find #235 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-235 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-235" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-235' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-235" | stop processing: connection "road-eastnet-nonat-235" (in initiate_a_connection() at initiate.c:349) | spent 0.0744 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 487 time elapsed 0.000543 seconds | (#487) spent 0.547 milliseconds in crypto helper computing work-order 487: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 487 for state #487 to event queue | scheduling resume sending helper answer for #487 | libevent_malloc: new ptr-libevent@0x7fb37403f310 size 128 | crypto helper 15 waiting (nothing to do) | processing resume sending helper answer for #487 | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 487 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #487 | **emit ISAKMP Message: | initiator cookie: | b2 6f 13 91 c3 04 27 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-235 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3e b7 3e 1e ea 4f ea 6c e1 7a 2e d9 d3 3e f9 00 | ikev2 g^x 00 b2 10 a9 bd 14 73 d0 5c 75 d0 f7 e2 0a 9c 29 | ikev2 g^x d2 44 ca 2c 07 7b 68 53 85 c3 d3 3e bc e8 07 6e | ikev2 g^x cf f2 af a9 1e bb 29 51 6a f7 01 6c 37 1e c0 ab | ikev2 g^x 85 0c c2 bf ee 4c 81 52 aa 15 a7 f4 22 68 ab 13 | ikev2 g^x 48 79 2b 77 d6 1b 5b ea 43 58 e3 de cb b3 22 8f | ikev2 g^x 5c c4 4c 56 f3 fa d5 2b 81 01 8d d3 c1 a0 72 c2 | ikev2 g^x 36 97 f9 30 4e b1 e3 4c c3 9f 76 1a 47 e2 4c 66 | ikev2 g^x 36 1c 6d 84 88 a7 c0 e7 e9 9d 4f 1d e0 c1 e1 ff | ikev2 g^x 39 d2 b1 a1 49 e4 09 1c dc a0 a7 cd 71 c8 f9 bc | ikev2 g^x 3a bc 26 2f 4d d5 40 96 f5 89 a1 c7 d3 3a 43 fd | ikev2 g^x 96 7a 1b 6f d9 4d de b2 44 44 32 65 9e 2d 89 e0 | ikev2 g^x 92 3a f7 8d c2 fa 4d 91 90 40 ba 6a ed 04 a1 1b | ikev2 g^x cd 46 17 18 d0 bf 88 e4 f7 cd 2c 44 55 8e 08 a0 | ikev2 g^x 65 d8 55 af e5 2c 13 03 b6 20 5e 95 aa 08 a5 20 | ikev2 g^x cd 27 5d 2b dd 8b b7 c9 7d 2d d5 bb 14 9f 9e 7c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f2 e1 64 3c 35 1a 4c dd 7a 16 43 23 ae 79 36 f1 | IKEv2 nonce 02 a6 51 17 6d d2 ae 67 32 63 24 20 73 fc 22 78 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b2 6f 13 91 c3 04 27 8f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 eb | natd_hash: port= 01 f4 | natd_hash: hash= e7 4a 35 08 41 af be cf 3c 4d e0 85 28 9e fb 5b | natd_hash: hash= 11 1f 06 99 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e7 4a 35 08 41 af be cf 3c 4d e0 85 28 9e fb 5b | Notify data 11 1f 06 99 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b2 6f 13 91 c3 04 27 8f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 95 f5 24 fe 51 05 47 87 18 ae 0d 13 a0 36 38 27 | natd_hash: hash= 84 c2 41 68 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 95 f5 24 fe 51 05 47 87 18 ae 0d 13 a0 36 38 27 | Notify data 84 c2 41 68 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #487 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #487: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #487 to 4294967295 after switching state | Message ID: IKE #487 skipping update_recv as MD is fake | Message ID: sent #487 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-235" #487: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.235:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #487) | b2 6f 13 91 c3 04 27 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e b7 3e 1e ea 4f ea 6c e1 7a 2e d9 d3 3e f9 00 | 00 b2 10 a9 bd 14 73 d0 5c 75 d0 f7 e2 0a 9c 29 | d2 44 ca 2c 07 7b 68 53 85 c3 d3 3e bc e8 07 6e | cf f2 af a9 1e bb 29 51 6a f7 01 6c 37 1e c0 ab | 85 0c c2 bf ee 4c 81 52 aa 15 a7 f4 22 68 ab 13 | 48 79 2b 77 d6 1b 5b ea 43 58 e3 de cb b3 22 8f | 5c c4 4c 56 f3 fa d5 2b 81 01 8d d3 c1 a0 72 c2 | 36 97 f9 30 4e b1 e3 4c c3 9f 76 1a 47 e2 4c 66 | 36 1c 6d 84 88 a7 c0 e7 e9 9d 4f 1d e0 c1 e1 ff | 39 d2 b1 a1 49 e4 09 1c dc a0 a7 cd 71 c8 f9 bc | 3a bc 26 2f 4d d5 40 96 f5 89 a1 c7 d3 3a 43 fd | 96 7a 1b 6f d9 4d de b2 44 44 32 65 9e 2d 89 e0 | 92 3a f7 8d c2 fa 4d 91 90 40 ba 6a ed 04 a1 1b | cd 46 17 18 d0 bf 88 e4 f7 cd 2c 44 55 8e 08 a0 | 65 d8 55 af e5 2c 13 03 b6 20 5e 95 aa 08 a5 20 | cd 27 5d 2b dd 8b b7 c9 7d 2d d5 bb 14 9f 9e 7c | 29 00 00 24 f2 e1 64 3c 35 1a 4c dd 7a 16 43 23 | ae 79 36 f1 02 a6 51 17 6d d2 ae 67 32 63 24 20 | 73 fc 22 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 4a 35 08 41 af be cf 3c 4d e0 85 | 28 9e fb 5b 11 1f 06 99 00 00 00 1c 00 00 40 05 | 95 f5 24 fe 51 05 47 87 18 ae 0d 13 a0 36 38 27 | 84 c2 41 68 | state #487 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374014820 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a68890 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5f0d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #487 | libevent_malloc: new ptr-libevent@0x7fb37c0251c0 size 128 | #487 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49683.902379 | resume sending helper answer for #487 suppresed complete_v2_state_transition() and stole MD | #487 spent 0.476 milliseconds in resume sending helper answer | stop processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37403f310 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 6f 13 91 c3 04 27 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #487 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #487 | rejected packet: | b2 6f 13 91 c3 04 27 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 eb fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #487: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #397 | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #397 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #397 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49683.919581; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003242 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37404b580 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #397 | libevent_malloc: new ptr-libevent@0x7fb37403f310 size 128 "road-eastnet-nonat-145" #397: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #397) | b8 96 65 06 95 e1 f4 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 c8 0d f4 cf 12 04 23 b3 8c b0 d5 0f 34 4c a1 | e0 38 a5 84 33 97 be 9e 20 02 11 8c 69 5e 11 d0 | 7f 62 ac d4 51 19 cc 39 4f d4 08 35 17 3d d8 7a | c8 e2 b7 8a c4 ef 87 90 f4 6c ad 03 c1 12 e5 fe | a1 ca 4d a3 a7 26 51 b1 18 00 3f 74 0f 0b 76 79 | bc c1 ba 8c 57 57 64 fe a4 22 c8 a4 ab 19 ab 0c | dd ce 55 14 58 7f a0 3d 7e 01 33 18 3d 67 8f 6a | ca ae 35 2c fc 77 68 f1 26 46 2d 1f 7a bb f6 b6 | 88 41 08 63 25 29 f3 b7 63 ae 0e 14 3f a2 dc 97 | 0e 00 b1 e7 fc 07 d8 8b 49 bf 80 af e9 ed 2e ae | 76 d5 6d 36 b9 2a 02 65 8e ab 6e 62 de 0e 3d f3 | f7 6f bf 03 ee 4b bf 13 13 36 8d f9 63 27 fb 43 | 3f 8c 62 32 8e 36 3e 03 c1 c2 7e e0 16 a2 30 62 | 14 7f 02 fd b0 1d f6 8c 31 34 94 1b 15 18 28 ae | 0e b7 ba 68 7f a5 50 6b 2b de 67 a0 81 07 b2 62 | f5 48 ed c5 05 14 42 21 f6 53 6c 0e 3a 26 2c f6 | 29 00 00 24 27 60 c6 66 70 ae 97 9f 6b 69 4c 25 | 37 ba d9 cf 08 77 b3 59 45 e3 d8 2d 73 dd 52 c3 | cf dc c0 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 57 f9 bf 9f 01 9a 6f 3c 35 55 f3 | 32 2b 15 a5 4a 2d 79 cf 00 00 00 1c 00 00 40 05 | 4f 21 3e 38 45 eb 50 34 34 8d 72 07 46 d4 99 5b | e3 94 74 97 | libevent_free: release ptr-libevent@0x7fb388011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #397 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 96 65 06 95 e1 f4 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #397 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #397 | rejected packet: | b8 96 65 06 95 e1 f4 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #397: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3380300a0 | handling event EVENT_RETRANSMIT for parent state #470 | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #470 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #470 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49683.932934; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002459 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #470 | libevent_malloc: new ptr-libevent@0x7fb388011f30 size 128 "road-eastnet-nonat-218" #470: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #470) | ab ba b0 28 2b 1d 75 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 e4 df 77 9c ac 7c 40 d9 cc 91 f4 1e 15 f1 e4 | bc 57 e7 d5 04 82 1b 0a da 88 66 71 1d 5c c0 4e | e9 e1 44 ec a4 a7 01 cc ac 81 2a 8e 12 68 b2 c4 | cb fb 38 e3 4b 73 83 33 bf 14 39 b7 96 9c bd 59 | d9 ff 78 9c 9b 27 6f 77 fd c9 8a 91 00 a0 bf ad | 80 e8 18 ee 7d 76 d2 f5 dc 73 28 11 ea 98 07 d2 | 64 7f 44 96 f2 22 04 36 e1 c7 80 69 f0 17 fa 9a | d9 3b f0 c2 a7 d3 89 ef c3 be e7 3b 57 5c b5 bf | 47 3a cd 92 d8 c8 49 50 dd d0 b8 eb bf 2d 90 2f | 70 dc 26 c2 6c 6d 97 1e 52 f7 6d 64 24 1f 5f ad | 51 2f 7a 28 09 01 c2 c0 02 41 61 9f 09 3f 66 24 | 9a 1a a0 e1 ec c0 36 27 88 be e6 c0 7c 74 30 55 | 5b 47 83 d5 de 8f dd bb 1e 36 33 0e 3a 91 ce a0 | e2 86 42 d5 a7 ba 66 4a 76 5d 9a 0c 15 60 fc f8 | 07 4e ec f8 cb 3b a4 f7 40 7b 9c 98 98 27 e7 40 | f3 18 97 7c cd 29 25 1e 88 f4 c6 ab 7c 46 c3 a4 | 29 00 00 24 5d 90 f6 17 67 54 dd 2e 4f 57 ce 29 | 91 07 11 a6 ab 05 8f 42 d3 b0 74 bf 38 9e 49 fe | 79 c7 ca e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 04 17 c7 7e 54 6e 6a e8 f5 01 1c | 14 c4 b8 fd 53 6d 0c 45 00 00 00 1c 00 00 40 05 | ee 06 ba 38 dc 10 50 e4 3e a6 cd 5f 2c e3 74 3b | 2a 18 7d 82 | libevent_free: release ptr-libevent@0x7fb33803a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3380300a0 | #470 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab ba b0 28 2b 1d 75 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #470 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #470 | rejected packet: | ab ba b0 28 2b 1d 75 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #470: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36002aab0 | handling event EVENT_RETRANSMIT for parent state #451 | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #451 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #451 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49683.954246; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002018 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3380300a0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #451 | libevent_malloc: new ptr-libevent@0x7fb33803a770 size 128 "road-eastnet-nonat-199" #451: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #451) | ba 7b a0 b0 99 57 b7 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 86 c1 bd 46 53 16 86 81 3c 90 d2 1b d5 72 d6 | 90 46 2b fe 71 0a b5 92 27 f1 2a 98 1f 0b 9c 86 | b4 73 fd 62 b2 c4 76 72 65 dc a3 4a 74 c5 fd c6 | 79 b7 24 8c 57 9e 68 29 d1 51 ef 41 d9 35 5f e0 | 38 61 4f 5c 38 99 a1 c4 18 39 cd 7c d3 ce 2b 13 | fc 9c 47 13 18 41 cd b0 e2 7f c5 8a 64 72 a5 44 | 53 3a 53 2d 27 d7 7b 2d 79 06 40 fe 3d 6f 0c 91 | d2 44 b7 35 de 08 ea 0c 51 75 4f ac 93 26 ff 1a | 9b 0e 24 d8 14 0e 9a fc f6 cc 0e 9a dd d9 b9 d2 | 1b 38 2f 39 cf f5 c7 33 b5 34 1b 0e a3 9e 16 b5 | a1 af 82 8d 2c a9 ce 6b 79 b5 5c 3b f7 3b ae 09 | 38 95 45 10 35 73 6b 75 72 ac 01 d0 d8 9c 2a 56 | 79 52 8f 61 80 9d ac 4d cd 53 ef 84 96 01 18 60 | 62 4a 3f 8c ae bb 58 49 e4 bd 6c ac 5f b8 ee 89 | d9 a3 21 bd 37 79 80 9b e7 e0 92 c7 ad 63 83 e1 | b3 a4 a9 38 2d 78 59 50 55 18 b3 a6 f4 4b 9a 44 | 29 00 00 24 c0 83 9a b8 91 8b 33 7b 3e ca 3c 3c | 55 1b 13 ae f8 60 71 22 6b 87 6a 60 f0 da d9 ee | 56 ce cf eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 64 e2 2e 4b 98 7a a3 19 bf 09 d8 | 5a 5f 60 9f 04 ef ea a4 00 00 00 1c 00 00 40 05 | f6 42 3e 9c 74 68 a9 db 08 24 19 e3 18 ae 01 16 | fd d2 98 25 | libevent_free: release ptr-libevent@0x7fb368035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36002aab0 | #451 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 7b a0 b0 99 57 b7 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #451 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #451 | rejected packet: | ba 7b a0 b0 99 57 b7 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #451: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0696 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46adc640 | handling event EVENT_RETRANSMIT for parent state #484 | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #484 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #484 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49683.971586; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500731 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36002aab0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #484 | libevent_malloc: new ptr-libevent@0x7fb368035930 size 128 "road-eastnet-nonat-232" #484: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #484) | 74 f2 d9 62 15 c8 1b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 3b 62 f3 ed f9 47 0c bf 01 45 93 af e9 01 13 | b4 4a bb 89 23 94 52 5c ed 86 36 6e eb 69 47 16 | 4f 4d 66 99 6d c7 d9 da 05 03 61 83 27 be 84 fb | f7 56 2a 10 f6 9b f2 84 b7 d0 85 06 cd 12 0f 3f | a6 61 71 e1 4c 4c be b5 23 cc e4 61 ef 62 aa 02 | 7f 71 fa f2 27 5a a1 66 46 df 65 7e 72 33 12 a7 | d6 b1 80 2f 61 a3 b3 4c c2 28 e7 cf a7 3c 3b 6f | 3a a0 e5 2d 1e 20 bd 32 76 a2 9f 45 f7 a6 6e e6 | 37 c0 ae 2c 38 01 39 bd 5f e0 3d 65 31 0e f3 37 | 25 fd f7 75 ed 4c 70 31 98 89 dd 26 6b f0 c6 86 | 26 2c de ac 79 65 19 00 78 ef 2a 8b 1d ed 38 d3 | 5d 90 eb e1 29 71 f3 ff 0c 50 ed 12 97 fe f3 76 | 44 b9 27 26 27 3a b5 56 98 ce 1d d1 07 e6 e9 5e | c0 92 67 d1 b6 25 97 6b 40 80 cf 9a 68 03 d5 29 | 53 a9 fd 87 28 85 18 42 c6 5b 08 65 a1 d2 2b 6d | e9 34 66 d8 9b 2a 73 2a 5b b8 59 63 5e 1f 84 b9 | 29 00 00 24 71 8e 31 23 c4 63 d2 6d d6 0a c0 cb | 7f b2 37 27 b0 85 2e 73 82 c7 9f d6 c1 fd d8 67 | ff 33 43 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 6d 47 d8 30 7b 36 73 b1 0d df 8b | 82 69 87 3e 91 43 68 d6 00 00 00 1c 00 00 40 05 | 23 15 eb e5 a3 5e 20 cf 73 fe 01 cb 79 d0 a6 f2 | 55 38 68 fe | libevent_free: release ptr-libevent@0x7fb3580407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adc640 | #484 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 f2 d9 62 15 c8 1b 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #484 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #484 | rejected packet: | 74 f2 d9 62 15 c8 1b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #484: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0391 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38400feb0 | handling event EVENT_RETRANSMIT for parent state #290 | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #290 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #290 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49683.983842; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005434 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adc640 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #290 | libevent_malloc: new ptr-libevent@0x7fb3580407f0 size 128 "road-eastnet-nonat-38" #290: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #290) | d9 b1 5b a3 d1 9c 57 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 dc 77 37 88 c0 74 0b c8 60 da a3 8f 9c e4 42 | 29 fe d5 c9 98 e7 af 66 82 be 95 44 77 f6 93 6f | 24 98 d7 cc c4 a6 16 af 14 a2 ad 53 a8 a5 93 3c | a1 26 c3 2d 65 3f cc 3f f0 9b 21 66 64 c4 82 00 | 30 f1 57 86 bf eb 51 88 bf 71 0a 30 68 dc 14 50 | 80 50 e1 6f 25 74 d9 af 8d f4 b9 89 60 e8 c3 c8 | 3b d5 14 f3 53 b4 96 85 6c 74 39 5d ff ee 22 a4 | ad 4c 82 96 29 6f f2 59 77 4e 48 da 14 23 7a 5c | 78 bb 13 4c f8 05 33 6d 40 79 5d e2 85 b7 6d 6e | b2 54 b0 03 d6 63 64 61 00 6d fd d4 8a 79 cd 3d | f1 25 f9 cf fc 5d a4 f7 ef 48 25 44 50 58 6a b2 | cd 2c dd 4c f0 ff 5e 32 e5 0f bc 63 fa 03 d5 1a | 9a ab 7e 2b 95 53 36 2e 47 c1 65 a2 7b d7 cd db | 40 2b 7a b2 21 b9 e9 6e fc 75 da 49 33 c1 98 35 | c7 9c 09 b3 47 fb 10 3f e1 56 6f be 75 69 b0 33 | f1 cb e8 e7 d6 74 b0 43 37 f7 9f 8c c7 7c d0 1e | 29 00 00 24 f3 df a5 ae 0e f0 b6 8d 6c 86 f6 fd | ac 3e 20 3a 6e ef cc 6e 76 09 43 e5 b3 97 07 d6 | b5 fd b7 b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 90 0c 81 3c 3a d2 14 9a 30 eb 10 | fa 46 c9 fe 37 f4 bb 0e 00 00 00 1c 00 00 40 05 | ea fc 09 da ae 61 e7 e4 dc 7a 6e 5d ad e3 e5 ff | 21 64 e7 65 | libevent_free: release ptr-libevent@0x7fb3840266d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400feb0 | #290 spent 0.0993 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 b1 5b a3 d1 9c 57 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #290 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #290 | rejected packet: | d9 b1 5b a3 d1 9c 57 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #290: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358018460 | handling event EVENT_RETRANSMIT for parent state #479 | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #479 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #479 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49683.991107; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00117 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400feb0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #479 | libevent_malloc: new ptr-libevent@0x7fb3840266d0 size 128 "road-eastnet-nonat-227" #479: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #479) | cf d2 c5 54 f4 1c f6 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 7f 14 60 4b 10 9d d5 d2 57 b0 91 8f 3f bc 64 | f3 21 66 f1 3b 94 f5 72 55 1b ed c6 dd 53 3b 05 | c0 1d dd be ad b9 bd d8 0b 5f 4b e3 1c 65 1f 4d | f0 ee 1b 33 c4 3a 9d de 12 12 f6 89 59 76 db 59 | 58 77 c4 51 cb 4f 4e a0 dc fb d2 f7 62 b4 a7 a3 | 1b 68 cb bb e9 09 d6 f0 e4 6b 8d 72 c7 c4 14 34 | 39 ae 8e 61 09 3a 83 2f f5 f4 c7 5f d2 2d b0 d4 | 26 d7 e0 79 26 1d 45 4b 13 c4 86 65 f4 ae 01 81 | 02 a6 0e b2 43 b5 c9 34 60 91 47 c7 ad 72 96 75 | c1 19 c1 36 df fe 89 e5 4a ed b6 37 c9 47 46 4a | ec 4d e3 1d 06 24 05 ec 83 47 39 85 ec 30 13 7d | 3c 3d d1 56 09 9f a0 06 ca 9a 1a b3 23 55 50 9a | b8 7d cc bd 04 23 e1 7e 80 5a 10 c7 17 c0 8f 7a | 89 c6 a1 6e 48 75 0a bf 79 1f 97 1f 66 26 95 b2 | 3f 11 75 2c 3f 93 e4 16 06 22 12 43 49 c5 4b bb | 85 1e 39 53 e2 84 3e 8e cf ad ff a8 7d 04 99 42 | 29 00 00 24 ce ca 8a 00 13 b6 bd c6 7f bf 18 48 | 13 5d 00 cd e5 1d be f3 d6 a7 2f 7b 66 35 3d e6 | f4 91 6b 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 e1 6d ff 62 21 60 0d e9 4e cd 21 | 6e a6 95 f9 84 a3 ab 9c 00 00 00 1c 00 00 40 05 | c0 97 f9 bf 8a bc 59 d7 d0 0f 34 34 05 ac 6e 13 | dc 84 e0 81 | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358018460 | #479 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb338018460 | handling event EVENT_RETRANSMIT for parent state #398 | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #398 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #398 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49683.991245; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003755 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358018460 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #398 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 "road-eastnet-nonat-146" #398: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #398) | d0 92 7e a2 a7 09 60 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 b4 17 bf 7e 10 d5 e2 12 67 d5 eb 44 fc 6b da | be 3b 71 0a c4 e3 79 bc 55 7d 33 ab 53 2c 63 89 | 9e 95 b9 30 6b 13 a7 4a c4 7b bb 0d b8 d2 26 a2 | 1b 44 de e4 2f 11 41 58 72 a9 de c1 a4 1a 3c de | fb 82 ea df 3c 36 4d b1 bb 32 a7 75 2a 9c da 3d | 04 1d ae c6 9e 47 9c 96 a3 bd 6c 27 32 62 7e ad | 70 24 3a b8 2d 6d 20 b6 31 c7 e4 59 58 b0 08 22 | 82 a6 37 db ba ec 34 68 a5 11 ce c9 83 0a 92 b3 | dd ea d2 26 81 86 3c 25 24 24 ac 6b b8 4a 55 12 | 52 ea 4b 29 23 c3 37 83 f6 36 9b 47 37 10 75 9d | f4 dd 3d a7 8c 08 2f 3c e4 23 53 ed 31 76 a3 fc | 1d a9 fd 55 24 58 0f 2f e2 fa 33 69 e3 52 ce 0b | 40 31 96 92 4b 51 32 bf 2a 17 34 73 b9 0a 6b 90 | de fe 0d 37 2c 91 fd 6c 7a a7 e2 56 e8 ce 17 fa | d6 57 69 b6 c9 3d e4 60 c8 79 32 d0 c0 ff e6 32 | 04 59 72 13 74 5b a6 22 e7 dc df 1b fa 28 85 f9 | 29 00 00 24 ae ec a4 eb 03 5f 45 70 f0 53 21 d7 | 81 1e fd e8 52 41 5f 93 69 78 ae d9 36 11 23 a3 | df 40 91 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de b0 87 87 88 52 10 6b eb de e2 56 | 47 54 e5 87 4e eb 84 92 00 00 00 1c 00 00 40 05 | cf cf 8e 7f dc f9 05 61 ec 0b 32 5d d8 50 5d 1e | f5 62 0b 45 | libevent_free: release ptr-libevent@0x7fb35401fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338018460 | #398 spent 0.0752 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cf d2 c5 54 f4 1c f6 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #479 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #479 | rejected packet: | cf d2 c5 54 f4 1c f6 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #479: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 92 7e a2 a7 09 60 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #398 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #398 | rejected packet: | d0 92 7e a2 a7 09 60 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #398: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0397 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a54250 | handling event EVENT_RETRANSMIT for parent state #236 | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #236 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #236 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49684.034538; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.013527 exceeds limit? YES "road-eastnet-nonat-236" #236: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-236" #236: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #488 at 0x557d46b14c80 | State DB: adding IKEv2 state #488 in UNDEFINED | pstats #488 ikev2.ike started | Message ID: init #488: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #488: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #488; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-236" #488: initiating v2 parent SA to replace #236 | using existing local IKE proposals for connection road-eastnet-nonat-236 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 488 for state #488 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb338018460 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #488 | libevent_malloc: new ptr-libevent@0x7fb35401fd50 size 128 | #488 spent 0.0724 milliseconds in ikev2_parent_outI1() | crypto helper 19 resuming | RESET processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 19 starting work-order 488 for state #488 | start processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 488 | pstats #236 ikev2.ike failed too-many-retransmits | pstats #236 ikev2.ike deleted too-many-retransmits | #236 spent 2.7 milliseconds in total | [RE]START processing: state #236 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-236" #236: deleting state (STATE_PARENT_I1) aged 64.015s and NOT sending notification | parent state #236: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #236 "road-eastnet-nonat-236" #236: deleting IKE SA for connection 'road-eastnet-nonat-236' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-236' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-236 | State DB: deleting IKEv2 state #236 in PARENT_I1 | parent state #236: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #236 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 488 time elapsed 0.000605 seconds | libevent_free: release ptr-libevent@0x7fb388022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a54250 | (#488) spent 0.607 milliseconds in crypto helper computing work-order 488: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 488 for state #488 to event queue | in statetime_stop() and could not find #236 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #488 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7fb368046040 size 128 Initiating connection road-eastnet-nonat-236 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 19 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-236" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-236' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-236" | stop processing: connection "road-eastnet-nonat-236" (in initiate_a_connection() at initiate.c:349) | spent 0.0612 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #488 | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 488 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #488 | **emit ISAKMP Message: | initiator cookie: | 37 96 ab d6 53 2a 39 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-236 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e4 6b 02 0e 68 a2 59 8e ba 48 ba 2f 59 6f a7 3c | ikev2 g^x 62 72 7d 7b ba 57 b5 e0 3c d9 c3 81 1f a5 eb a0 | ikev2 g^x f8 e0 f8 99 8d 15 bc f0 8d dc 6f 5a dd 58 1a 52 | ikev2 g^x b1 f2 33 db c0 8e 7c 70 83 0a 45 59 7c 30 22 a6 | ikev2 g^x 4a 21 8b 6d f6 eb 16 6a d6 89 72 dc 49 39 de 06 | ikev2 g^x cc 4d b2 f5 ec 39 f7 23 79 4b 87 b1 ad 07 ab b7 | ikev2 g^x eb 0d d8 4d 26 fb 93 ca cd 4a bf a4 0c 85 96 15 | ikev2 g^x f6 27 7e a1 82 03 aa 6b de 0f cd 15 f2 d7 a2 0e | ikev2 g^x 43 09 8a 10 1e 3f 10 cc a0 c3 3f de 84 91 b8 33 | ikev2 g^x fb 7f 27 17 12 4f 19 a8 95 31 dd 5a ae 2b f7 bf | ikev2 g^x a0 0e b0 af 11 39 af c9 5f a1 36 16 28 49 42 30 | ikev2 g^x 1e a5 ef c4 10 5d 29 3a 47 d6 e6 ec dc fa 0d fd | ikev2 g^x c5 f6 87 7a d9 cf 3f cd c0 47 6b 05 d4 2f 0b e9 | ikev2 g^x 27 07 f2 3c 1c ec 19 6e 68 a4 e6 aa 11 7d e2 91 | ikev2 g^x 40 12 52 80 36 b2 87 db 98 ff 4a 69 c8 e6 41 e0 | ikev2 g^x 2d e0 85 d9 a0 b6 39 d4 ec ac d1 39 5f ba 20 a9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce dc e4 9b d4 65 6a e5 2d e1 02 7e 1d 58 fd 85 52 | IKEv2 nonce 51 90 f6 a3 d4 da ed 1b d4 69 62 73 cc 62 0f e1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 37 96 ab d6 53 2a 39 3c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ec | natd_hash: port= 01 f4 | natd_hash: hash= bf c6 06 73 dc 37 37 47 57 31 78 5c d0 36 ae c0 | natd_hash: hash= 4d 18 ea 5b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bf c6 06 73 dc 37 37 47 57 31 78 5c d0 36 ae c0 | Notify data 4d 18 ea 5b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 37 96 ab d6 53 2a 39 3c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= b3 8c 92 9f c3 4a f6 44 a7 cb 92 6c 4a 1a 77 59 | natd_hash: hash= 02 36 0d d7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b3 8c 92 9f c3 4a f6 44 a7 cb 92 6c 4a 1a 77 59 | Notify data 02 36 0d d7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #488 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #488: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #488 to 4294967295 after switching state | Message ID: IKE #488 skipping update_recv as MD is fake | Message ID: sent #488 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-236" #488: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.236:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #488) | 37 96 ab d6 53 2a 39 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 6b 02 0e 68 a2 59 8e ba 48 ba 2f 59 6f a7 3c | 62 72 7d 7b ba 57 b5 e0 3c d9 c3 81 1f a5 eb a0 | f8 e0 f8 99 8d 15 bc f0 8d dc 6f 5a dd 58 1a 52 | b1 f2 33 db c0 8e 7c 70 83 0a 45 59 7c 30 22 a6 | 4a 21 8b 6d f6 eb 16 6a d6 89 72 dc 49 39 de 06 | cc 4d b2 f5 ec 39 f7 23 79 4b 87 b1 ad 07 ab b7 | eb 0d d8 4d 26 fb 93 ca cd 4a bf a4 0c 85 96 15 | f6 27 7e a1 82 03 aa 6b de 0f cd 15 f2 d7 a2 0e | 43 09 8a 10 1e 3f 10 cc a0 c3 3f de 84 91 b8 33 | fb 7f 27 17 12 4f 19 a8 95 31 dd 5a ae 2b f7 bf | a0 0e b0 af 11 39 af c9 5f a1 36 16 28 49 42 30 | 1e a5 ef c4 10 5d 29 3a 47 d6 e6 ec dc fa 0d fd | c5 f6 87 7a d9 cf 3f cd c0 47 6b 05 d4 2f 0b e9 | 27 07 f2 3c 1c ec 19 6e 68 a4 e6 aa 11 7d e2 91 | 40 12 52 80 36 b2 87 db 98 ff 4a 69 c8 e6 41 e0 | 2d e0 85 d9 a0 b6 39 d4 ec ac d1 39 5f ba 20 a9 | 29 00 00 24 dc e4 9b d4 65 6a e5 2d e1 02 7e 1d | 58 fd 85 52 51 90 f6 a3 d4 da ed 1b d4 69 62 73 | cc 62 0f e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf c6 06 73 dc 37 37 47 57 31 78 5c | d0 36 ae c0 4d 18 ea 5b 00 00 00 1c 00 00 40 05 | b3 8c 92 9f c3 4a f6 44 a7 cb 92 6c 4a 1a 77 59 | 02 36 0d d7 | state #488 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35401fd50 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb338018460 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a54250 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #488 | libevent_malloc: new ptr-libevent@0x7fb388022480 size 128 | #488 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49684.035697 | resume sending helper answer for #488 suppresed complete_v2_state_transition() and stole MD | #488 spent 0.322 milliseconds in resume sending helper answer | stop processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb368046040 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 96 ab d6 53 2a 39 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #488 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #488 | rejected packet: | 37 96 ab d6 53 2a 39 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #488: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c018460 | handling event EVENT_RETRANSMIT for parent state #452 | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #452 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #452 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49684.044871; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002746 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368024000 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #452 | libevent_malloc: new ptr-libevent@0x7fb368046040 size 128 "road-eastnet-nonat-200" #452: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #452) | 50 11 a1 bf ed cc 03 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 8a 76 57 c4 9b d0 38 b9 d2 c2 4b 69 ba e2 a2 | 5a 11 4c 0a 45 a5 bd e6 9d dd c0 17 e1 2d b4 38 | 58 7e 63 fb 2b 24 a5 63 e6 a8 3b c4 4f a3 78 62 | 66 71 ba 53 c3 c9 09 13 5d ce 86 73 ab 12 87 fa | 35 c6 ff 8b 42 89 25 72 85 e2 b1 87 71 47 d8 8c | ac 7e ee 22 cc e1 04 85 55 54 54 b2 e0 ad d5 39 | 0a fc 74 d3 64 5e 05 35 2e 1a b0 95 d1 38 f8 9d | e0 83 e6 f4 e2 39 cf ac 1a e7 54 52 1b c6 27 82 | 61 87 37 7f 47 a3 e4 be 08 d5 c5 1a f3 6f 8c 8b | 63 33 54 b5 d2 c3 52 ce c9 11 04 d4 3e 44 cf a0 | cb 89 ea 96 9d 4b f1 9d 8d dc 98 07 bd 7b 2f d6 | 8f 69 b2 51 af f2 60 a1 de 25 ef d3 5a 7c e5 c5 | 23 56 16 2b d4 22 e3 1f 96 12 60 85 a4 b1 18 7f | b7 c2 db 59 66 51 fe 4e 85 1b ae a3 40 84 80 d2 | d2 e6 e1 c5 9e 39 9a 1f 42 76 d0 90 ba 8e cc dd | 5a 7b 9a 97 d8 6d 8b db 68 e9 10 8f 2c 64 9d b8 | 29 00 00 24 ba 51 08 92 39 ed 80 e6 57 c3 97 3c | b4 4a b0 29 f6 7a 02 bc 32 31 68 fb 36 27 e7 7b | 80 17 94 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 cf 89 69 b2 6f 00 24 ae 75 3b 9a | 3a b6 ca 28 54 7e 11 99 00 00 00 1c 00 00 40 05 | 3b ea 73 3d bf 95 ec 19 18 d5 48 b2 c7 6d ef 5f | 10 2b 0f c2 | libevent_free: release ptr-libevent@0x7fb3500251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c018460 | #452 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 11 a1 bf ed cc 03 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #452 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #452 | rejected packet: | 50 11 a1 bf ed cc 03 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #452: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35801d710 | handling event EVENT_RETRANSMIT for parent state #399 | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #399 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #399 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49684.048231; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003985 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c018460 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #399 | libevent_malloc: new ptr-libevent@0x7fb3500251c0 size 128 "road-eastnet-nonat-147" #399: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #399) | 9a 35 91 e3 ae 4f 45 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 ce a5 03 ec 4a ee 33 f3 67 48 7b 6f be a9 66 | fb 8e 19 e6 36 60 4c c6 f2 fa ab 4a 53 70 9f a8 | 5d 61 41 57 15 0a 04 a9 c6 86 5d ab 3b 79 47 d9 | 64 c0 42 8c 2d 5e 11 ee 5a b4 7c 00 df db 58 b0 | 10 63 ed d6 5b 1a 63 c2 6e 59 c7 e8 2a 78 4e 44 | 25 ff 91 a5 4f 9f d4 f8 46 f6 2e bb b6 05 d4 45 | 7f ef 54 77 ee f0 2c 99 e2 fe 9b fe 0e 9d c8 14 | ca 70 65 95 d9 6c bd 1f dd d1 55 09 ab fd c5 44 | 6f ba 1f 76 70 5a 17 28 af 45 27 b3 5f fa fe 02 | 6a 08 1d 7c 03 0b fb b8 0b b4 48 92 28 71 ac 6f | 5f 3f a7 45 71 f7 92 e0 6c 9d f2 6c bb 9e 54 7d | 4e c3 05 e2 c9 1e 50 4a ea 5d b8 f4 10 cd bd ed | f5 70 36 5b 63 22 bb 46 fb e4 aa 69 fc 3a 38 34 | d5 97 f3 9a 0b d9 79 ac e6 c8 40 6d e3 6c 66 31 | 20 73 b6 2d f4 7d 52 fd f2 32 69 70 71 7f cd d6 | 06 5e 27 45 05 1c 80 53 a4 80 ee b7 a6 45 c2 7e | 29 00 00 24 a1 6d db 5e 0b f7 f4 70 57 f1 37 cb | cc a0 06 3f 1d 1e 6b 0a b6 35 fa c1 29 23 78 83 | cc 1e 42 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 7c 20 90 94 5e 44 74 17 3c c7 e7 | e8 35 eb 34 00 1c 2e 68 00 00 00 1c 00 00 40 05 | eb 24 3e a6 a5 f2 dc 45 a5 ce 8c 46 9a d0 7a ff | cb 2c 1c 90 | libevent_free: release ptr-libevent@0x7fb35803a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35801d710 | #399 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 35 91 e3 ae 4f 45 29 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #399 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #399 | rejected packet: | 9a 35 91 e3 ae 4f 45 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #399: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0529 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378012bf0 | handling event EVENT_RETRANSMIT for parent state #471 | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #471 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #471 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49684.050533; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001741 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35801d710 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #471 | libevent_malloc: new ptr-libevent@0x7fb35803a770 size 128 "road-eastnet-nonat-219" #471: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #471) | 38 56 99 f6 a3 bb 25 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 88 5e 08 51 b9 62 c5 b6 68 5e 2f 6f 4f 31 ca 1e | 08 9e a2 c5 9c dd 5f fc 7a f4 89 f0 0b b5 e1 ae | ce aa 45 81 2c 95 5e ff 06 f3 6a c5 72 bf d7 48 | 2c ca 52 8b db 25 1b 5b 4e e1 9e 45 05 12 f0 3a | 8b 49 b1 e8 0f d0 bb 39 6c 00 4b 10 55 55 90 f1 | ba 94 0f e8 29 de 7e 8e 75 cf 84 46 0b 85 26 8f | fc de 6b 35 43 a0 ca 14 c9 c0 f7 23 df 3f 39 44 | 98 32 71 b3 fb 93 e6 df 1c 43 a2 c9 a0 c6 73 b4 | d7 9f 3f a9 0b f8 14 fb 29 eb 8f cf f7 a9 d2 3c | 3d 58 a0 39 7e fa 25 48 bc 4b 7f d7 1d e0 11 34 | f6 bf 55 8d 59 da 29 ac d8 c5 88 7a 76 ef 08 52 | 7c ac 5e 47 31 67 af 77 3e 74 07 65 f0 71 26 28 | 79 4d a8 21 1c fb 74 e9 6b f8 d5 df d3 80 71 f9 | 81 36 25 59 61 8d e4 66 0e 09 70 cd be 73 f3 c8 | c4 06 a2 0f 1e 6d 0f ec 2b 18 85 83 48 df f6 99 | 6d 3a 12 52 38 a5 9e 5e 41 a3 52 37 e7 64 a4 6a | 29 00 00 24 92 4d df ea 0a bb c1 4f 13 fb 92 4b | 10 dc b9 f4 e6 b4 8b 01 64 45 6e db 5a 13 b9 8e | 86 b6 57 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 76 c9 73 0c 16 7b 39 f7 77 ab 9f | f0 85 70 80 7e c2 64 d2 00 00 00 1c 00 00 40 05 | 35 b3 a5 34 11 ae 1a 69 08 cc 74 f0 71 15 8c b8 | eb 5a 8d 90 | libevent_free: release ptr-libevent@0x7fb348014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378012bf0 | #471 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 56 99 f6 a3 bb 25 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #471 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #471 | rejected packet: | 38 56 99 f6 a3 bb 25 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #471: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0542 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a903c0 | handling event EVENT_RETRANSMIT for parent state #291 | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #291 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #291 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49684.060122; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006782 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378012bf0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #291 | libevent_malloc: new ptr-libevent@0x7fb348014c70 size 128 "road-eastnet-nonat-39" #291: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #291) | 77 85 93 ea 80 0c b0 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 1c 76 58 29 75 7e d4 f4 bf 59 3f 6e da 30 13 | 97 91 e5 4d 2a 44 30 c6 77 2b e1 aa 90 8a 91 6e | f8 8f d9 e7 ab d5 fb c9 18 4a c7 0e 37 35 b2 f0 | a3 12 8b 8a 64 ba 60 9e 98 18 5b 0a c2 a4 de 16 | 9c ef 90 7b a5 b4 e5 01 26 3c 58 d0 37 33 d3 a2 | f6 fe 76 4d 01 cd 2b d6 3c be b9 eb 0d 8b d4 d7 | c4 c5 12 bf 64 f2 4f a2 ec 8b b1 e0 3a c2 a2 21 | f4 b9 1a d7 ab ef 1a 0d f1 e1 8b 50 27 cf 98 3e | c2 08 00 e6 03 cf bf ee 86 72 2a aa f9 36 e9 49 | e2 ab b6 47 68 84 b5 9d f0 67 c8 08 03 1b 51 9a | 44 fe 69 c7 87 64 78 4a b7 c0 08 da 1d ee c0 bb | be c8 5e a1 c1 cc 41 ab 33 ca fd ed d6 b3 7c b1 | a7 a2 c7 36 15 58 52 6a 99 ee 8c 84 f7 78 81 e9 | 01 61 49 76 ce 6b ac b8 4a dc 03 3e 4e 23 ba 57 | f4 01 5b 74 05 72 0c 07 03 e6 2a 5d b3 8c b8 ef | e7 cd d3 38 e6 37 e3 80 1e bc 5b 24 b7 a5 cb 2c | 29 00 00 24 37 f4 21 d3 cc 8d d5 11 a4 01 4c 20 | b4 32 01 c8 03 d8 fb 70 07 27 01 09 a0 70 e5 36 | d3 fe b6 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 76 dc 7a b2 16 bf 01 10 e9 6f f4 | 8e 92 4c 8c 19 0f b1 8b 00 00 00 1c 00 00 40 05 | 48 a8 ae 2a a4 d2 aa 19 46 f9 d2 d9 d7 e1 ad a4 | ae e0 ac b4 | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a903c0 | #291 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 85 93 ea 80 0c b0 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #291 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #291 | rejected packet: | 77 85 93 ea 80 0c b0 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #291: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6e010 | handling event EVENT_RETRANSMIT for parent state #480 | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #480 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #480 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49684.087441; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001917 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a903c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #480 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-228" #480: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #480) | a0 d0 03 15 77 7b 55 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 81 bc 92 43 cc 20 cb 32 dc a3 83 a6 05 ad 00 | 98 6a 1a f3 68 9d 6f 0d 87 ec e9 f6 9a 02 0f 25 | 1f da 1c 78 f1 67 23 e0 e2 7f 61 43 d9 1f 5f b6 | e6 b8 f2 3c ff c1 08 c4 9f 6c 2a bc 8e ba 45 54 | 84 19 36 a3 17 42 a8 a4 75 a3 82 0a 1c 91 e1 7c | b0 f8 bf b5 fa 9f 83 82 f9 d4 70 3e e1 df 4f 6b | 6b 5d aa 23 00 ad 45 7c d2 ab 83 9c d3 c8 48 f4 | a4 1e f5 9c 86 61 b3 f2 25 c7 70 01 ac 67 7a b7 | f7 4a 5c 1c 8e 8e 59 fc 33 71 85 33 b4 10 65 ea | b8 c2 b9 0f e6 63 11 67 85 ad 57 f7 4e c8 76 85 | f8 97 7d db 2b b8 ed 1b 8b 66 54 1e 04 fc 55 3a | c8 bb b6 a6 8a 5c 4e fe c9 53 36 0e 42 74 0e b7 | bd d3 59 78 0c df 94 62 fd c2 21 a4 0c fb 4f 6c | 1c 91 d6 a4 ec 87 92 d0 8f 1e 01 93 bd 89 c0 fe | 71 01 53 5c 6f 46 39 61 8b 59 d6 4d 65 9b d8 a3 | 15 32 57 28 19 30 26 21 35 36 08 9b 79 f2 1a b0 | 29 00 00 24 c8 ff 1d 8a 8a c7 55 8b 0d 6e 9c 13 | 67 dd f9 00 d4 15 c8 78 b6 24 b1 bf aa 08 b9 85 | 7a e8 a9 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb af 61 69 a2 a5 79 11 dc 03 2e 27 | 8e 1f c8 4a f0 b2 47 27 00 00 00 1c 00 00 40 05 | 5a ba 74 8a e7 0f 7a 9b 13 6d 0a ce d0 eb db 09 | a2 8a df 80 | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6e010 | #480 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 d0 03 15 77 7b 55 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #480 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #480 | rejected packet: | a0 d0 03 15 77 7b 55 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #480: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #485 | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #485 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #485 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49684.088723; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500962 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6e010 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #485 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 "road-eastnet-nonat-233" #485: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #485) | 26 20 85 62 4e 58 16 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 04 a6 43 51 7a 0a e3 68 c7 b6 92 c0 2e 14 67 | a2 f2 cb 51 e5 ce 35 16 88 d3 54 6d 62 23 37 bb | 56 61 2f d6 85 87 83 0f 70 f6 72 39 7f a7 0c c7 | 1e 70 d8 7f 4c 38 fa 53 49 29 41 95 c4 be f2 60 | 8b f1 ad 4f de df 26 c9 05 54 42 92 f1 01 24 5d | 5f 31 21 56 71 00 1c 4f 7f 83 41 cc a7 f5 8b 27 | 25 fc 78 92 10 e8 44 60 1c 59 0a 5b 0b c5 c2 c7 | 8a b4 bc 89 2b d6 59 5c 8c 78 a1 23 dc b0 6c 50 | 12 f1 b3 89 73 06 41 12 b7 a8 52 30 67 21 d0 5c | a9 0e cd 21 2b 24 e0 cb a7 f2 11 99 34 b7 dd 82 | a8 b2 9f 4a 0e 72 6d 9e a6 39 41 fd 0a 77 de bc | 1d a1 ee ad 3a 47 74 75 05 d6 38 42 86 69 10 70 | a8 ff d8 3e 12 b1 c4 88 03 52 77 9f cb 91 9d 87 | ca f5 79 a8 95 63 5f 4e a8 1e 43 7f 48 49 97 d5 | 03 8a 20 ac 28 9d 5a 1c 08 20 6e 33 63 3c ac 79 | a6 2e 32 53 fd 1d bb 3c 94 09 f3 ea 45 51 42 83 | 29 00 00 24 3d d6 d9 80 a2 0e 12 b1 24 d9 6e f6 | 52 8a 26 6d ef 88 17 44 c3 1d 79 ed f7 7c 90 92 | c7 d9 57 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dc 14 52 a7 e7 6d fa 0b e3 0e 97 be | 5d 15 66 8b 43 e6 a9 e4 00 00 00 1c 00 00 40 05 | 6d 80 f6 1e bc 0d ea 94 d1 d1 d0 f0 fd 2d 1e 46 | 86 63 b8 47 | libevent_free: release ptr-libevent@0x7fb354035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #485 spent 0.0893 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 20 85 62 4e 58 16 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #485 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #485 | rejected packet: | 26 20 85 62 4e 58 16 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #485: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0407 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374045e40 | handling event EVENT_RETRANSMIT for parent state #453 | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #453 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #453 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49684.103982; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003583 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #453 | libevent_malloc: new ptr-libevent@0x7fb354035930 size 128 "road-eastnet-nonat-201" #453: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #453) | ce fd 6b dc 43 f9 b6 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a fe 9f 71 b9 6e 69 49 23 6a d5 87 63 a6 2d 80 | fc 10 3a 5e 08 f9 cc a8 36 72 0a 5b 2e 86 63 13 | 40 48 02 71 3c 66 28 bf ad d7 fa c6 30 96 5e 17 | bf a0 d6 3f 57 20 44 4e e4 00 ed 65 d2 4f 08 d6 | 20 51 fe 4a 66 fa 02 8d 06 00 db e7 45 a0 fc fc | 8c 97 f6 4d f7 77 a5 6a 79 27 5b a0 e1 46 fb a6 | 23 99 9c 26 32 43 cf 04 80 58 6f 87 cb a5 6d d2 | 76 b6 f1 d1 81 44 27 9c 99 67 9d 01 ca 24 01 04 | 53 a4 a4 40 53 47 8f 99 18 29 ec f0 3e a1 86 13 | dc e4 8b ba 11 0f e1 c3 4b ee 52 62 b4 64 8e 2f | 66 5c ba 6c ee 04 04 ed f9 bf cd 94 0a 45 b8 40 | e4 22 f5 d1 d6 df 3a ed ce c6 15 28 b6 04 76 04 | bd c3 75 e8 63 e6 45 74 6f 79 fc 8f 52 0e 1e 14 | f2 bb ae c1 f9 bb 75 83 86 a8 ff 0c d1 f1 5d 0c | a0 ce 81 b4 8f 58 61 e5 9f 60 57 7c c4 7a 6c 26 | 0d 77 a8 c6 b2 9c 49 0c ea 36 61 b7 06 0a 10 da | 29 00 00 24 e4 ac ab 1b 0b c0 0c 13 54 30 d6 3f | 0a a4 17 49 c8 c8 1a 8d ae d5 3b 39 11 5a 2a f6 | e8 ed 91 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 76 3b e4 72 b5 b8 a8 50 2a b0 80 | 46 e6 9d 5f 02 57 8f 98 00 00 00 1c 00 00 40 05 | 9d b5 75 60 1a f1 a6 46 0c b9 85 72 c6 f1 03 f3 | 4e 7a aa 51 | libevent_free: release ptr-libevent@0x7fb374029410 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374045e40 | #453 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce fd 6b dc 43 f9 b6 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #453 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #453 | rejected packet: | ce fd 6b dc 43 f9 b6 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #453: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c02aab0 | handling event EVENT_RETRANSMIT for parent state #400 | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #400 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #400 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49684.110258; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003818 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374045e40 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #400 | libevent_malloc: new ptr-libevent@0x7fb374029410 size 128 "road-eastnet-nonat-148" #400: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #400) | 6c f1 c2 e4 ca 88 89 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 14 1f bf 2d 44 6c 78 3f 86 f8 f3 fa a1 a5 9d | a0 a8 08 62 76 01 cc db f3 4e 4a c1 03 ae f2 db | c6 06 da 1a 15 ae 3e f9 fa b6 70 0f b3 7b e5 34 | 8d 5b 06 20 ef d4 aa 62 0d d5 a9 7d 3d 49 08 95 | 77 51 97 14 c6 fe 13 ee ee 9b f0 54 56 73 79 30 | ad d7 b3 17 12 47 8d 8d e8 49 20 41 18 2a 1c c8 | c4 68 99 45 f4 b5 f1 6d d9 34 ec 8a e3 80 cc 67 | 30 b6 d6 0d 11 9e 86 7f 87 2f c0 73 7c 40 eb 31 | 24 34 89 0e ca 7b 62 d2 f6 17 85 8f 75 81 28 9b | 1c a9 03 80 8d 78 61 63 07 3b b3 b9 c4 40 46 d5 | ab 82 5f da 4c aa ce 61 bb ab c0 1a 00 85 50 e6 | e8 f6 9f c8 7f 01 8e 16 ac 04 56 78 cf 7c 43 a9 | f9 c7 26 fb 06 32 92 98 86 3f 37 ca f2 f2 fc bf | 1d e3 ee 48 e8 25 74 7d 16 d9 38 6e ca e9 38 51 | 44 22 32 93 01 95 d0 87 12 07 ff 4c 7e 49 f3 04 | 98 50 fe 91 bd 78 84 00 92 17 d7 f5 e0 e1 d0 43 | 29 00 00 24 aa 21 0d 2f 8b 5a 11 5c 7a 19 73 4d | 8f 68 86 24 6a ba 53 0b 82 59 c5 5c 31 b4 eb 7e | 18 78 2e 54 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 82 bc d9 51 57 ae 67 73 5e 22 78 | a2 06 a4 b1 df 07 78 c3 00 00 00 1c 00 00 40 05 | 48 01 58 d1 13 9f 6e 34 06 7b 6e f6 08 2f fa 1f | f9 ef b6 96 | libevent_free: release ptr-libevent@0x7fb35c03a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c02aab0 | #400 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c f1 c2 e4 ca 88 89 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #400 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #400 | rejected packet: | 6c f1 c2 e4 ca 88 89 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #400: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a34e10 | handling event EVENT_RETRANSMIT for parent state #292 | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #292 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #292 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49684.127555; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005989 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c02aab0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #292 | libevent_malloc: new ptr-libevent@0x7fb35c03a770 size 128 "road-eastnet-nonat-40" #292: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #292) | 87 88 51 7a 60 9d 5a 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 66 a0 4d 60 cb 65 95 3c 93 0d 5e 54 74 22 d5 | b9 4e e2 32 b5 97 c3 a0 c6 6f 16 29 09 b8 29 a7 | 53 85 60 d3 38 df d9 0c a3 64 8e 65 05 77 b2 87 | 1b 54 26 e9 27 44 44 33 65 9f 3e a3 6d dc 58 a3 | 3c 1b b5 56 27 64 d7 00 90 21 cd 7d 46 ab 11 af | ba 96 a3 c8 ee 97 85 92 75 7b ec 2d df 79 07 56 | 45 a8 e2 68 58 3f 02 db 14 25 0e 1f 9b c2 bb 05 | 5a 26 d6 ed 51 8a 97 6d 65 fb 55 2b bb 16 61 e4 | de 73 b2 ef 70 09 3d 76 f2 05 da 1e bd 6c 49 e0 | 44 ef e7 7e 74 41 a3 f7 8a 2e 4b 16 50 e8 de e0 | a4 17 3e ac 86 b1 62 63 2e 1c a5 2b dc 13 3a ee | 9b a0 c2 94 2b ba 80 4c 0b 59 f3 60 75 ff 33 5f | 0b 97 1a 30 63 32 07 17 5c 59 1a 4a db 49 f2 ef | 1e b6 76 4d ca 87 ea 08 32 6d 49 4e d6 81 ee 4c | c7 58 d6 e6 53 ab c7 5b 58 9e 4a 36 b9 18 48 a2 | 61 0a 77 8a 15 c7 1b 51 f1 d5 e0 50 5a 9b 7a 98 | 29 00 00 24 b6 37 4c f0 c9 85 b2 01 0e 7e 3e 08 | 4a 99 af 96 7f b4 c9 1d 28 51 f7 8e 73 35 20 22 | 15 78 52 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 e7 d2 e3 15 0a 06 f3 99 b1 c4 ad | 55 e8 07 46 e3 af eb 45 00 00 00 1c 00 00 40 05 | 9e 69 62 01 15 f2 f4 fe 05 57 a2 2c 87 7a 71 d0 | 0c f9 69 7d | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a34e10 | #292 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 88 51 7a 60 9d 5a 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #292 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #292 | rejected packet: | 87 88 51 7a 60 9d 5a 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #292: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3940 | handling event EVENT_RETRANSMIT for parent state #472 | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #472 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #472 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49684.151834; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001669 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a34e10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #472 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 "road-eastnet-nonat-220" #472: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #472) | 15 62 43 a0 4c 6d db c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 ef 66 93 1f d2 be 3f b4 cb c3 5b c3 cd ce ec | ef 45 09 15 86 85 a5 fc 63 a8 dc f9 dc 2c 7f da | ad 3c 83 29 23 b1 9e ba fe be f5 05 08 e8 8e 73 | c4 15 c3 1f 80 d3 d0 b8 24 be b3 4f dc ef b0 39 | e8 6c 73 46 ce 8d ab 67 58 96 e6 89 9c 38 0e cb | 1f b3 47 af cd e8 fe 49 e5 c0 25 80 77 35 f6 06 | 6d dc 03 76 f8 34 b8 8e 05 e2 62 37 7a 40 b0 47 | 1d 8d 55 22 fa 66 04 34 43 30 87 8a 3b 8d 56 07 | f3 21 a4 25 01 21 d4 52 d3 44 c4 73 d4 a8 a2 ea | 69 66 8c 26 ab 85 7b a0 65 5b 03 5d 74 e7 7a 63 | 38 e1 5f b3 a4 83 48 11 76 d7 fb 96 bd 94 81 0e | 12 85 94 cb 17 1c 9e 64 a5 e2 b4 c7 96 eb cd 62 | bb 15 1b 96 a4 fb c3 a8 a0 ae 37 79 52 a4 ec 21 | 73 e0 47 a7 95 56 ce d5 cc 94 10 bf a2 8a 93 dc | 7f ea 6c d5 98 4b fa 19 3a ac 5e 1f 78 6e 08 fc | fa 46 b2 55 22 d7 78 a7 75 be f4 63 29 44 fa cb | 29 00 00 24 19 33 9e e6 d2 ec 99 b2 2a d6 00 cf | c3 4d d5 a5 cb 9d 67 f4 f2 94 3f b0 a2 94 a8 ff | 01 8e 5d 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 f6 a8 c3 12 9d 73 0e 92 1b 13 62 | b1 83 e3 04 e0 b3 2c 1d 00 00 00 1c 00 00 40 05 | c3 d5 bb 6d 6e 36 db ca 5f b7 b2 05 dd 15 c3 8f | 20 6a e3 5f | libevent_free: release ptr-libevent@0x7fb358035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3940 | #472 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 62 43 a0 4c 6d db c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #472 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #472 | rejected packet: | 15 62 43 a0 4c 6d db c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #472: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.072 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d590 | handling event EVENT_RETRANSMIT for parent state #237 | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #237 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #237 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49684.153254; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007631 exceeds limit? YES "road-eastnet-nonat-237" #237: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-237" #237: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #489 at 0x557d46b16240 | State DB: adding IKEv2 state #489 in UNDEFINED | pstats #489 ikev2.ike started | Message ID: init #489: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #489: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #489; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-237" #489: initiating v2 parent SA to replace #237 | using existing local IKE proposals for connection road-eastnet-nonat-237 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 489 for state #489 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab3940 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #489 | libevent_malloc: new ptr-libevent@0x7fb358035930 size 128 | #489 spent 0.0929 milliseconds in ikev2_parent_outI1() | RESET processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #237 ikev2.ike failed too-many-retransmits | pstats #237 ikev2.ike deleted too-many-retransmits | #237 spent 2.63 milliseconds in total | [RE]START processing: state #237 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-237" #237: deleting state (STATE_PARENT_I1) aged 64.013s and NOT sending notification | parent state #237: PARENT_I1(half-open IKE SA) => delete | crypto helper 6 resuming | crypto helper 6 starting work-order 489 for state #489 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 489 | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #237 "road-eastnet-nonat-237" #237: deleting IKE SA for connection 'road-eastnet-nonat-237' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-237' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-237 | State DB: deleting IKEv2 state #237 in PARENT_I1 | parent state #237: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 489 time elapsed 0.000566 seconds | stop processing: state #237 from 192.1.2.23:500 (in delete_state() at state.c:1143) | (#489) spent 0.569 milliseconds in crypto helper computing work-order 489: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 489 for state #489 to event queue | scheduling resume sending helper answer for #489 | libevent_free: release ptr-libevent@0x7fb3480180b0 | libevent_malloc: new ptr-libevent@0x7fb36c044a20 size 128 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d590 | in statetime_stop() and could not find #237 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 6 waiting (nothing to do) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-237 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-237" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-237' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-237" | stop processing: connection "road-eastnet-nonat-237" (in initiate_a_connection() at initiate.c:349) | spent 0.0848 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #489 | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 489 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #489 | **emit ISAKMP Message: | initiator cookie: | 74 5a 3a 8b 71 1a cc fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-237 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x af 40 61 fd 1b 72 e8 67 07 d1 75 c8 79 f6 15 bf | ikev2 g^x 67 b1 a9 f3 47 1b 5a 9e 7a 16 95 64 09 96 72 95 | ikev2 g^x 1f e3 f8 5f 52 87 20 fb 61 9b db 76 dc 1e b3 ce | ikev2 g^x 79 87 62 5c 6c ce 2b 50 8b 94 05 b2 fd 25 84 04 | ikev2 g^x b4 15 bc 02 70 ed e7 01 0e 47 78 fa 99 0f 24 d8 | ikev2 g^x 6d 25 42 58 57 e1 37 d4 81 eb 71 fc 2c 93 fa a4 | ikev2 g^x c7 e3 ed 35 8a 44 47 43 96 45 a6 cd a3 83 61 0f | ikev2 g^x 10 8b 91 8a 9e 26 b5 05 80 74 cc cf bd 96 a9 68 | ikev2 g^x ec 71 d7 24 8f 0e c4 37 01 d3 fc 0e 4b 59 1a e8 | ikev2 g^x 44 25 f9 54 85 60 35 f6 be ce 52 66 75 73 a9 9b | ikev2 g^x 5c c3 e1 cf 01 12 70 63 56 6d a7 e8 18 d9 6b 45 | ikev2 g^x de 75 11 c2 b6 ad 37 d5 3d 52 a7 75 84 78 8c 7f | ikev2 g^x 86 51 7e 50 9f 10 72 bd c2 69 ef b3 ad 19 2b a0 | ikev2 g^x 12 77 de 7a 6b 6d 21 bf fd 3d 7b 00 2f 59 e3 b9 | ikev2 g^x d0 af c2 b1 28 3c da ec de 08 be a1 d1 4e 94 57 | ikev2 g^x 47 99 d9 10 35 e0 60 cf 3d 10 4e cb 1b b3 b4 f7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 40 6d 68 58 c0 2a c7 cb 28 ac 6f c2 e6 6e 2c b5 | IKEv2 nonce 98 00 fd fe 6e 20 dd ca 12 44 3b 53 ff 69 1e f5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 74 5a 3a 8b 71 1a cc fd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ed | natd_hash: port= 01 f4 | natd_hash: hash= b0 46 ab 03 11 7d bc a6 76 5d 5e 81 f5 21 84 26 | natd_hash: hash= 13 ce 73 a7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b0 46 ab 03 11 7d bc a6 76 5d 5e 81 f5 21 84 26 | Notify data 13 ce 73 a7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 74 5a 3a 8b 71 1a cc fd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f1 f1 80 9f 1b 76 8c da 90 0c 48 79 e2 c4 ce d3 | natd_hash: hash= 45 3b 5d 95 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f1 f1 80 9f 1b 76 8c da 90 0c 48 79 e2 c4 ce d3 | Notify data 45 3b 5d 95 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #489 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #489: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #489 to 4294967295 after switching state | Message ID: IKE #489 skipping update_recv as MD is fake | Message ID: sent #489 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-237" #489: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.237:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #489) | 74 5a 3a 8b 71 1a cc fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 40 61 fd 1b 72 e8 67 07 d1 75 c8 79 f6 15 bf | 67 b1 a9 f3 47 1b 5a 9e 7a 16 95 64 09 96 72 95 | 1f e3 f8 5f 52 87 20 fb 61 9b db 76 dc 1e b3 ce | 79 87 62 5c 6c ce 2b 50 8b 94 05 b2 fd 25 84 04 | b4 15 bc 02 70 ed e7 01 0e 47 78 fa 99 0f 24 d8 | 6d 25 42 58 57 e1 37 d4 81 eb 71 fc 2c 93 fa a4 | c7 e3 ed 35 8a 44 47 43 96 45 a6 cd a3 83 61 0f | 10 8b 91 8a 9e 26 b5 05 80 74 cc cf bd 96 a9 68 | ec 71 d7 24 8f 0e c4 37 01 d3 fc 0e 4b 59 1a e8 | 44 25 f9 54 85 60 35 f6 be ce 52 66 75 73 a9 9b | 5c c3 e1 cf 01 12 70 63 56 6d a7 e8 18 d9 6b 45 | de 75 11 c2 b6 ad 37 d5 3d 52 a7 75 84 78 8c 7f | 86 51 7e 50 9f 10 72 bd c2 69 ef b3 ad 19 2b a0 | 12 77 de 7a 6b 6d 21 bf fd 3d 7b 00 2f 59 e3 b9 | d0 af c2 b1 28 3c da ec de 08 be a1 d1 4e 94 57 | 47 99 d9 10 35 e0 60 cf 3d 10 4e cb 1b b3 b4 f7 | 29 00 00 24 40 6d 68 58 c0 2a c7 cb 28 ac 6f c2 | e6 6e 2c b5 98 00 fd fe 6e 20 dd ca 12 44 3b 53 | ff 69 1e f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 46 ab 03 11 7d bc a6 76 5d 5e 81 | f5 21 84 26 13 ce 73 a7 00 00 00 1c 00 00 40 05 | f1 f1 80 9f 1b 76 8c da 90 0c 48 79 e2 c4 ce d3 | 45 3b 5d 95 | state #489 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb358035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab3940 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d590 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #489 | libevent_malloc: new ptr-libevent@0x7fb3480180b0 size 128 | #489 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49684.154525 | resume sending helper answer for #489 suppresed complete_v2_state_transition() and stole MD | #489 spent 0.381 milliseconds in resume sending helper answer | stop processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c044a20 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 5a 3a 8b 71 1a cc fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #489 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #489 | rejected packet: | 74 5a 3a 8b 71 1a cc fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ed fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #489: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0411 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #401 | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #401 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #401 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49684.177712; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004584 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c01d970 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #401 | libevent_malloc: new ptr-libevent@0x7fb36c044a20 size 128 "road-eastnet-nonat-149" #401: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #401) | 32 2a 52 53 b6 80 03 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 23 97 0d 57 1e 4b f9 07 88 66 bf 34 6e 58 4c | e6 20 66 15 d1 8b df 5a d2 2b 70 66 bf e5 46 ee | 75 f4 eb 71 1f f1 6f e1 d6 58 06 0a 4d 97 04 53 | 74 d3 7a 62 9c 6d fc 73 97 9b c2 cb c3 d3 cb d1 | a7 2a 8a bf ad 15 46 4b ac 4a 21 e7 16 cd 32 18 | f6 83 ab c8 99 38 21 bc e5 81 05 3f fc e4 b5 9f | 7d 77 82 93 0f 69 5a af 5b c2 81 88 55 f6 fa cc | 86 fe 2d 7e 6d ae 3a 9b 57 e6 de 78 5a 36 ba 60 | 3d 56 da 1d 5d 7b 85 49 92 79 e6 7c 62 e6 ba 39 | 70 40 1b 2f 31 49 fc c6 d5 8b 43 aa e6 2d 80 f1 | 00 4e 8e 1a 05 73 d3 15 0d 7c 1c 15 71 3b 45 0a | 71 47 01 7c 8b 3a 4c 28 d2 c5 72 06 09 34 70 7a | 6f eb 8d 51 fc f9 d9 92 d1 00 53 57 7a 80 e8 39 | 37 38 0d 62 49 b3 0f 75 c3 ee 8b a3 66 04 51 8d | 4d ca 16 c5 dc 18 bd ee 26 01 0f c7 9b e6 0b 35 | e3 5e 44 0d 5e 45 e9 f2 25 03 56 4f 95 a8 57 74 | 29 00 00 24 98 0f af 0d 18 0d 49 ab 74 8d 40 09 | a9 19 04 ac c2 29 19 2a e5 21 dd 83 5a 09 3e 6b | 71 16 78 8b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 5b 75 e0 fb 06 ab 59 93 2a 0c bc | 70 9d 3c 6c 4b 98 95 ed 00 00 00 1c 00 00 40 05 | 06 0c a6 cc 70 cf f8 01 75 5d 68 14 0f cc 7e 89 | 81 50 60 0f | libevent_free: release ptr-libevent@0x7fb364045e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | #401 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 2a 52 53 b6 80 03 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #401 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #401 | rejected packet: | 32 2a 52 53 b6 80 03 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #401: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388009ed0 | handling event EVENT_RETRANSMIT for parent state #454 | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #454 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #454 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49684.197986; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002881 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #454 | libevent_malloc: new ptr-libevent@0x7fb364045e60 size 128 "road-eastnet-nonat-202" #454: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #454) | 3e f1 41 2a cb 15 91 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 3c 6a c7 38 95 77 87 5d 1e c8 dc ba 22 fc 03 | 1c 9c 6c 7f 8e 0e fd af 13 dd 37 0a 23 40 7c ce | 87 9a c3 3c b2 29 81 32 66 6c ba 2d 43 73 e4 9f | 34 a2 6c c8 c3 e8 8f d1 b2 45 4b 81 58 b8 9d f6 | d7 6b 98 99 af 72 e9 d0 c7 87 b4 74 61 b8 6f 67 | 18 e9 20 82 3b 32 85 5d b7 fc 19 46 92 6b 65 26 | b2 31 d6 c3 36 5c 46 dd c1 b3 1a ba 4d 4c b4 fb | c9 29 e2 5f 88 92 21 72 05 11 74 76 83 6a f0 05 | 70 a8 4f 78 f0 27 41 4f 18 70 43 44 55 76 41 4e | d4 55 4f 0d be 47 fb 72 63 29 ab 49 16 15 52 01 | 76 0d 0d 3c d4 72 41 c1 63 95 85 97 21 62 a1 0c | 98 62 73 cf ff 81 3f b1 d6 5b a3 17 9c bf 13 ea | 76 47 19 6b ec 4e dd d2 c8 fc 10 8a 93 9d e2 40 | 1a 9a ec ba a4 26 5c 4d 01 9a 6a 47 3b fc ea 48 | 29 30 cf ee 79 66 a8 78 a7 b1 8e ad 2b ce 52 2c | 72 05 7f 8f f6 f4 ff ed 12 0a b1 b7 de 27 bb d0 | 29 00 00 24 42 50 bc e2 16 2b 34 89 d5 4e 59 5a | a4 d3 d2 a4 86 df 60 97 ee fa 90 f6 ad 34 8e f4 | 49 50 59 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 1c 0d 08 a9 24 58 8d 73 8e f2 10 | b3 0d e0 67 52 ae c5 46 00 00 00 1c 00 00 40 05 | 72 a5 1c 62 b2 bc b3 f0 fe 77 e1 0e f2 db 46 ae | 09 80 33 7f | libevent_free: release ptr-libevent@0x7fb38801d010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388009ed0 | #454 spent 0.176 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3e f1 41 2a cb 15 91 c1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #454 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #454 | rejected packet: | 3e f1 41 2a cb 15 91 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #454: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350017ea0 | handling event EVENT_RETRANSMIT for parent state #481 | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #481 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #481 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49684.203355; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000478 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388009ed0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #481 | libevent_malloc: new ptr-libevent@0x7fb38801d010 size 128 "road-eastnet-nonat-229" #481: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #481) | e8 f0 49 b6 6a 16 76 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 5b 3d e6 1f 63 af 92 47 ff bb 34 96 d0 88 24 | 67 3c e1 47 18 9d 62 8e d3 a4 9d b7 75 51 2f 4d | c5 c0 85 26 a0 ef 6b 42 e3 31 89 58 06 3e 3f 70 | 40 68 5f 34 02 73 08 9e 17 dc ee 6e ae 64 70 e1 | 29 5c 9e 3f 09 58 a9 16 14 23 bb 74 7b 7f 22 34 | a9 d6 3f fe 74 0f 40 5a 32 4d ac 87 fc 80 7b d4 | 2d 54 ec f5 ce b0 c6 dd a4 dd 82 14 e2 9a 36 7e | 86 de 04 4a c2 4a 3a 27 d9 82 5e 6e f1 1d d8 3d | 86 d1 82 99 be f9 63 b2 56 5a 40 42 2e 8f 30 eb | fd db ce cc 5a ac 0e 49 65 64 01 18 b4 1e 60 8d | 74 bc e9 b7 46 2e cb e0 1e 2c 67 dc 3f e9 f4 39 | 35 52 90 76 39 0a f3 d2 ac 0b 00 19 f2 ca 97 20 | b7 c6 bb 7d a2 97 ba e5 14 74 e5 ea 2f 4e 4b 3f | 08 53 d9 be 3b dd af 2f 8f 10 fd 09 08 1e b3 13 | 6a 37 e4 ce 19 dd d9 84 13 76 b0 6f 6f 43 48 f7 | 01 a4 a9 0f 9d fb 63 aa 49 8a 2a b5 59 32 b2 69 | 29 00 00 24 ba a6 3b 25 9f a9 3f 06 4e ea 48 38 | eb e2 25 25 ca e3 dd 6c 01 6e 12 39 f8 cf ff e2 | 6d 18 2b 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a ef 98 84 e9 40 8f 9c 0a de 34 0d | 25 31 92 b5 ca c8 92 af 00 00 00 1c 00 00 40 05 | 81 a9 90 20 77 ac 91 2d 88 99 0f 36 2d 43 7d f6 | 2e 36 29 48 | libevent_free: release ptr-libevent@0x7fb350023d80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350017ea0 | #481 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 f0 49 b6 6a 16 76 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #481 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #481 | rejected packet: | e8 f0 49 b6 6a 16 76 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #481: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #293 | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #293 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #293 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49684.218684; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004863 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350017ea0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #293 | libevent_malloc: new ptr-libevent@0x7fb350023d80 size 128 "road-eastnet-nonat-41" #293: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #293) | 98 65 e9 19 f7 80 1b 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 92 fa cc 80 1f 04 ae 31 60 a8 15 7f 6c d4 bb | 0d a3 36 d4 3d 31 2d db c9 a3 65 0b 54 77 b5 90 | 4b f1 85 f9 5b a2 e8 2d 9a 77 1b fe a8 fb ea d0 | 88 2f 01 a5 98 e9 7e 65 f1 01 87 3d 6a 2d 8a 3a | 8e f8 d8 76 3b 1e 19 1d 17 90 3e 76 19 99 52 4a | 6e 00 1d 7b db 96 db 83 88 cd fd 1e bd 7e 5b 89 | ba a0 91 2a b9 ee b5 58 13 b3 5e 5e 59 9d 47 30 | d5 69 4e a7 bd 52 9f d4 e7 9b be ed b8 c7 8e ca | fd 72 11 5d 3c 4e 3f 34 3a cf 63 b2 e1 3a 0c 75 | e0 fd c6 41 05 da 4e 8b 04 c0 eb 84 52 ad 81 69 | 8c d8 b9 f0 3d 70 1f c8 01 a5 b7 5f ee d4 3d 97 | 3f 74 14 bf c1 32 07 23 90 8c c7 74 19 a4 db 67 | e2 81 e3 0a 06 5d bd 34 79 e7 4a 18 70 10 d6 b8 | 84 dc 4f 06 a8 1d f3 4b d5 6f 30 05 6d 56 83 1e | 64 17 96 93 11 0f e7 08 32 35 87 dc fb e0 8f 9f | e0 07 34 5d b8 fb 0d 4c d3 c2 58 00 d5 76 62 90 | 29 00 00 24 6f f2 b6 ca f4 8a a8 b3 ce 34 d7 c6 | a9 bf 42 71 b6 a3 89 33 ed 1d 91 ee 0e 11 98 8d | 12 5e c6 63 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 b6 16 43 43 a6 c6 14 e2 18 67 23 | 58 d4 b6 9a 2d df 39 90 00 00 00 1c 00 00 40 05 | 2a 56 75 a4 c4 51 60 eb 9a b6 a1 bf 9e f8 0f fa | 6b d1 0c 00 | libevent_free: release ptr-libevent@0x7fb33803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #293 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 65 e9 19 f7 80 1b 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #293 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #293 | rejected packet: | 98 65 e9 19 f7 80 1b 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #293: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0573 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab6500 | handling event EVENT_RETRANSMIT for parent state #486 | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #486 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #486 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49684.232019; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501359 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #486 | libevent_malloc: new ptr-libevent@0x7fb33803b0b0 size 128 "road-eastnet-nonat-234" #486: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #486) | 87 db e2 36 7c f0 df 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 90 89 1b 08 ac ff df cf 1e a7 4d 7b bd 33 5b | 51 13 dd 15 4f 57 c0 96 90 46 35 66 7c 24 f4 e0 | 0c 27 ca 38 87 f2 ca ce 3e d5 b4 13 12 b8 2b 1b | 28 cd b5 9c 97 fa 99 ff ca 60 2f 08 57 c7 43 0b | 9a 34 8d 0f cc d3 42 7d 8a 9b 18 49 af 87 e5 0e | 60 54 d2 dd 0f 77 79 0a d2 62 1d 4b f7 af 36 a6 | 89 10 0e 96 5f f8 fd fd c0 0b 1a 57 52 e4 05 54 | 7c e7 03 a6 04 47 19 3c 81 63 a0 84 35 98 42 90 | 1a 22 7e c6 ee 29 1f d0 fe 05 cc 68 66 1b 8e f3 | 6e 04 59 7b 5f 87 c4 be fb a5 8a bf 90 3d eb 9a | 35 8c 2c 40 b3 8e 63 fe 5a 3c 42 89 30 d7 70 57 | 1f 4d 37 52 6b 1c 17 6b 78 dd b4 c8 f7 a3 15 58 | d1 aa 66 b9 5e c1 c5 d0 ba 3b 05 d7 77 a7 0a 2d | c3 f0 02 14 1d 1a a8 4d cb aa 4c 7b 62 3a 6a ee | 7e 4e 1c cb d8 20 d4 75 37 c5 87 d5 04 ca 68 48 | 13 39 48 6c 64 d9 b7 94 e9 df 23 f3 33 69 d8 cb | 29 00 00 24 46 3f 4a dc 6e 3d 21 da c5 52 80 db | 79 4b 94 5f 60 de b7 f2 05 82 ab f1 57 25 79 09 | be 52 68 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e eb dd 20 f6 4f aa b4 b9 d1 56 e6 | 84 4d e7 2c 87 e1 c1 3c 00 00 00 1c 00 00 40 05 | df ec c7 42 be d0 10 8f c9 07 5b a9 94 d2 5a 2d | 6d 05 27 19 | libevent_free: release ptr-libevent@0x7fb364012740 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab6500 | #486 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a52c90 | handling event EVENT_RETRANSMIT for parent state #238 | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #238 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #238 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49684.232184; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.016422 exceeds limit? YES "road-eastnet-nonat-238" #238: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-238" #238: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #490 at 0x557d46b17800 | State DB: adding IKEv2 state #490 in UNDEFINED | pstats #490 ikev2.ike started | Message ID: init #490: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #490: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #490; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-238" #490: initiating v2 parent SA to replace #238 | using existing local IKE proposals for connection road-eastnet-nonat-238 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 490 for state #490 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab6500 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #490 | libevent_malloc: new ptr-libevent@0x7fb364012740 size 128 | #490 spent 0.066 milliseconds in ikev2_parent_outI1() | RESET processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #238 ikev2.ike failed too-many-retransmits | pstats #238 ikev2.ike deleted too-many-retransmits | #238 spent 2.66 milliseconds in total | [RE]START processing: state #238 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-238" #238: deleting state (STATE_PARENT_I1) aged 64.019s and NOT sending notification | parent state #238: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #238 "road-eastnet-nonat-238" #238: deleting IKE SA for connection 'road-eastnet-nonat-238' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-238' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-238 | State DB: deleting IKEv2 state #238 in PARENT_I1 | parent state #238: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 11 resuming | crypto helper 11 starting work-order 490 for state #490 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 490 | stop processing: state #238 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb38803dab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a52c90 | in statetime_stop() and could not find #238 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 db e2 36 7c f0 df 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #486 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #486 | rejected packet: | 87 db e2 36 7c f0 df 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ea 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #486: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-238 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-238" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-238' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-238" | stop processing: connection "road-eastnet-nonat-238" (in initiate_a_connection() at initiate.c:349) | spent 0.0569 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 490 time elapsed 0.000715 seconds | (#490) spent 0.721 milliseconds in crypto helper computing work-order 490: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 490 for state #490 to event queue | scheduling resume sending helper answer for #490 | libevent_malloc: new ptr-libevent@0x7fb36003f3e0 size 128 | crypto helper 11 waiting (nothing to do) | processing resume sending helper answer for #490 | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 490 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #490 | **emit ISAKMP Message: | initiator cookie: | bb 0e 3a 9b 64 67 83 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-238 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x af 47 7f 34 75 b5 49 50 79 df a4 4b 2a 1a ce 17 | ikev2 g^x 54 1a db ef 07 cc bd 63 ec 5f fd 57 bc 8e fa 30 | ikev2 g^x c9 95 d1 71 e6 7c fd 77 3c fd c2 3d 71 c3 96 28 | ikev2 g^x a3 d1 35 26 0a 70 d5 c3 3a fb 74 58 46 86 23 a0 | ikev2 g^x 05 3c 91 b9 ac 6a ea c1 25 7b 4a 3f a3 25 55 72 | ikev2 g^x 1a fa 68 62 a6 28 8d 23 b1 87 6f cc f5 37 d0 47 | ikev2 g^x fc 41 f4 96 78 ec ba 03 b7 d0 87 4f ed d1 99 e0 | ikev2 g^x 0d e4 2b f5 2e 28 88 3d fd a9 fe 89 6e 87 86 2a | ikev2 g^x bc 0f d8 0e c6 4a 2c e3 b3 3a a6 4b 56 b2 d1 a7 | ikev2 g^x b4 82 a8 63 ca 63 fb 28 a9 ae 19 5e d9 12 c8 ba | ikev2 g^x 95 37 7e 44 d0 19 50 2e 50 85 6d 62 52 72 3d eb | ikev2 g^x 4d f4 88 bd 4f 23 95 01 f5 e8 4f 41 c1 7a e2 e9 | ikev2 g^x 09 7e 97 ea 1c b6 21 cd 07 3c 59 f2 8d ef a7 3b | ikev2 g^x 3d d1 60 37 5e c3 67 ad 3c a4 b3 33 59 93 de 51 | ikev2 g^x 98 2d 6e b0 f8 67 26 97 7f 16 7a f1 7d 53 b7 ac | ikev2 g^x 55 64 4e 4e 20 10 14 93 a4 62 e7 45 6c 22 9f d2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e1 87 09 5e 30 4d 93 58 a8 7b ef c0 df 86 01 db | IKEv2 nonce 2f ae 90 07 26 59 14 f1 71 ed 65 8b e5 42 58 e5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= bb 0e 3a 9b 64 67 83 ff | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ee | natd_hash: port= 01 f4 | natd_hash: hash= 1e a7 de 07 e1 64 83 30 46 b8 16 83 02 93 de dc | natd_hash: hash= 12 4e 03 eb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1e a7 de 07 e1 64 83 30 46 b8 16 83 02 93 de dc | Notify data 12 4e 03 eb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= bb 0e 3a 9b 64 67 83 ff | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 41 30 1b e3 e2 bc 6c 0f ca fc a1 2e 9d 87 bf 76 | natd_hash: hash= 3a b7 29 61 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 41 30 1b e3 e2 bc 6c 0f ca fc a1 2e 9d 87 bf 76 | Notify data 3a b7 29 61 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #490 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #490: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #490 to 4294967295 after switching state | Message ID: IKE #490 skipping update_recv as MD is fake | Message ID: sent #490 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-238" #490: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.238:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #490) | bb 0e 3a 9b 64 67 83 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 47 7f 34 75 b5 49 50 79 df a4 4b 2a 1a ce 17 | 54 1a db ef 07 cc bd 63 ec 5f fd 57 bc 8e fa 30 | c9 95 d1 71 e6 7c fd 77 3c fd c2 3d 71 c3 96 28 | a3 d1 35 26 0a 70 d5 c3 3a fb 74 58 46 86 23 a0 | 05 3c 91 b9 ac 6a ea c1 25 7b 4a 3f a3 25 55 72 | 1a fa 68 62 a6 28 8d 23 b1 87 6f cc f5 37 d0 47 | fc 41 f4 96 78 ec ba 03 b7 d0 87 4f ed d1 99 e0 | 0d e4 2b f5 2e 28 88 3d fd a9 fe 89 6e 87 86 2a | bc 0f d8 0e c6 4a 2c e3 b3 3a a6 4b 56 b2 d1 a7 | b4 82 a8 63 ca 63 fb 28 a9 ae 19 5e d9 12 c8 ba | 95 37 7e 44 d0 19 50 2e 50 85 6d 62 52 72 3d eb | 4d f4 88 bd 4f 23 95 01 f5 e8 4f 41 c1 7a e2 e9 | 09 7e 97 ea 1c b6 21 cd 07 3c 59 f2 8d ef a7 3b | 3d d1 60 37 5e c3 67 ad 3c a4 b3 33 59 93 de 51 | 98 2d 6e b0 f8 67 26 97 7f 16 7a f1 7d 53 b7 ac | 55 64 4e 4e 20 10 14 93 a4 62 e7 45 6c 22 9f d2 | 29 00 00 24 e1 87 09 5e 30 4d 93 58 a8 7b ef c0 | df 86 01 db 2f ae 90 07 26 59 14 f1 71 ed 65 8b | e5 42 58 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e a7 de 07 e1 64 83 30 46 b8 16 83 | 02 93 de dc 12 4e 03 eb 00 00 00 1c 00 00 40 05 | 41 30 1b e3 e2 bc 6c 0f ca fc a1 2e 9d 87 bf 76 | 3a b7 29 61 | state #490 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb364012740 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab6500 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a52c90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #490 | libevent_malloc: new ptr-libevent@0x7fb38803dab0 size 128 | #490 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49684.233434 | resume sending helper answer for #490 suppresed complete_v2_state_transition() and stole MD | #490 spent 0.32 milliseconds in resume sending helper answer | stop processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36003f3e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 0e 3a 9b 64 67 83 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #490 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #490 | rejected packet: | bb 0e 3a 9b 64 67 83 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ee fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #490: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0393 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384043260 | handling event EVENT_RETRANSMIT for parent state #402 | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #402 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #402 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49684.24162; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003587 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36001a530 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #402 | libevent_malloc: new ptr-libevent@0x7fb36003f3e0 size 128 "road-eastnet-nonat-150" #402: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #402) | d7 18 0b 56 dd fc 93 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 8f d0 91 ee 0c 2c 6d b1 49 7f e7 a7 c5 b4 b6 | ba 26 c6 73 cd 26 6d 07 75 be 09 23 1b d9 66 18 | 43 89 72 64 b1 d5 06 ca 9d c0 33 e2 98 5e c1 57 | 08 88 8a 2d 7a 4a eb cd 6a ad 0c 5b 60 7a 3c d6 | 1b 41 e1 63 95 9d 48 05 85 b8 3e e9 c2 2c 08 fc | 0a e1 15 60 ae 51 d5 ec 71 41 de 9c 11 57 49 6c | 9b fc 6f 1d 07 87 e1 29 06 e5 0a b9 9d 8f 51 66 | de ed ee d7 d1 94 d4 80 f9 c9 b3 72 40 5d 4f 1f | e8 51 bc 21 99 7c 48 a4 03 69 7e 36 81 2c 93 c5 | 85 f1 72 97 17 d9 4b 16 e1 02 93 16 a0 e9 5a 8c | 18 8b 2d 22 a0 68 e9 52 fc 14 55 90 a6 f2 25 49 | d1 90 07 21 fd a8 a8 15 db 83 f7 be ce 21 31 d0 | 18 03 fd af 89 22 76 d9 16 f9 54 ff a2 a4 03 62 | f9 9f ab 74 f4 75 62 99 a7 8b 91 97 ad 9d c4 9c | 3e 40 41 dc 60 23 02 31 5e 46 98 d3 1a 73 73 14 | dd ff 30 58 0d fa ab 00 11 c3 0b 18 0a c3 bc a2 | 29 00 00 24 22 ce 51 25 1e d0 f6 54 17 83 9f e7 | 7f a6 b8 56 15 08 66 12 32 0f c5 1a 1c 37 04 e4 | a3 f5 17 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 72 8a fb e8 f5 d3 16 73 e6 1b bd | ae fd 45 81 b5 65 c1 51 00 00 00 1c 00 00 40 05 | 63 4e 70 bd 7c b5 4d 3a 8c 2e 79 8c 91 4d 92 d1 | 89 54 24 9e | libevent_free: release ptr-libevent@0x7fb384031e80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384043260 | #402 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 18 0b 56 dd fc 93 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #402 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #402 | rejected packet: | d7 18 0b 56 dd fc 93 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #402: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #473 | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #473 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #473 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49684.250875; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002027 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384043260 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #473 | libevent_malloc: new ptr-libevent@0x7fb384031e80 size 128 "road-eastnet-nonat-221" #473: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #473) | 78 01 12 66 35 d7 75 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 47 0f 4f 77 38 bb e7 c9 71 64 11 49 78 07 db | 61 1c cd 26 23 f1 f6 1d 25 30 16 ce 14 27 83 ce | 42 30 8f 08 74 8c 5a 73 8c d4 32 61 41 1b ee 9b | f9 31 2e 33 9d 12 db b8 cb 33 3f 38 d9 dd c3 f9 | 20 b6 40 e8 ca 08 02 ce df 71 6c f1 5d 52 08 e6 | 58 10 57 a2 32 8d ae 1d 5e 7d c4 ce e0 91 e8 67 | ef d4 89 2c c0 b5 6a 92 6e 51 6d 9b 9d 21 b2 11 | 63 ad d9 36 26 eb dc c5 60 5b ef 4a 3f 29 d2 75 | 9a 29 b2 ce 56 3f a4 11 28 44 4d 82 14 b3 ff 08 | f3 34 c5 89 41 5b 00 60 7c 63 69 55 27 25 23 fa | 32 38 62 77 fb 7a 33 df 62 71 61 b7 15 ec 0a 13 | 14 36 a9 93 fd 25 0e 0d b3 44 f4 62 07 ce 96 88 | f0 a4 9b c6 5b 9f 17 d2 94 b3 dd 9f 08 c2 33 c2 | 59 53 80 d3 e8 b8 bc 9f 9d b9 55 bf 1b b3 90 a8 | 46 84 0d b5 c1 2a b7 bd df e2 56 3f f0 a8 af c2 | b3 ab 6b 5f 0e ca 69 45 20 54 b6 94 83 c5 3d bb | 29 00 00 24 4a 32 17 be 17 e6 be 0c a5 f0 d0 1f | f3 82 ee d0 20 e4 2f 26 27 39 fc fe 8a c9 3a 42 | bb 40 ba 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 8a 84 70 d7 06 66 bf 35 02 d1 dc | b7 f5 da 2f 6f 36 dc 4c 00 00 00 1c 00 00 40 05 | 22 8e 50 95 0f 93 c8 cc 9c 03 8c bf 24 39 56 cd | 71 d7 b1 e2 | libevent_free: release ptr-libevent@0x7fb370014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #473 spent 0.0944 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 01 12 66 35 d7 75 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #473 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #473 | rejected packet: | 78 01 12 66 35 d7 75 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #473: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0401 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #455 | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #455 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #455 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49684.27824; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004231 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #455 | libevent_malloc: new ptr-libevent@0x7fb370014c70 size 128 "road-eastnet-nonat-203" #455: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #455) | a6 08 27 1f 75 50 39 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 c7 bc 11 60 3e a6 9a 85 6d e5 42 37 d7 18 00 | 0c ea 15 92 bc 93 3a fa 4f c0 cd 9b 9d 21 1a ec | 13 f0 fc 0b a2 84 9a a5 b1 57 c2 a8 ab 33 a5 7b | 04 ac cd 61 b9 a7 e2 6f b1 9a 56 b1 3c b1 a4 2e | 8d 80 e0 ac 78 ee b2 78 51 00 d0 a0 eb cf 06 35 | 9c 7e 2a 73 b1 56 cd fe b7 d8 9d ab 84 62 9b e7 | ab 4d 04 16 06 c3 1a 9c 88 af e1 4b bd a0 09 ac | fd 8a ba 51 00 10 a1 a7 a6 a2 56 74 b5 9b 53 af | 87 60 09 5b 74 75 e3 41 f8 3d 7a cf 0c 36 f7 ea | aa 1b 05 8b 54 d5 b2 e1 fe 9e d4 4e f4 ae 74 22 | 98 23 25 ba ff 74 27 da 25 81 74 09 8c 6b 8b 69 | 54 dc 62 05 8c 02 be b4 b0 c4 25 43 18 99 9f c3 | 41 7e c1 29 f3 a3 60 75 de aa 26 bd a3 38 8c ad | a8 31 89 d2 48 90 d9 19 ce f4 34 9e 9d e7 1c e9 | d3 7f ee 85 33 84 75 6d 04 5b b4 a0 96 a6 93 65 | 8d 1c 3a f8 14 81 03 4c 63 f4 25 e5 59 99 ac 86 | 29 00 00 24 6a 39 a6 75 f8 f4 82 47 b3 0b 2e 10 | f3 31 67 d9 88 26 9d 5b f1 75 40 6b 34 32 86 bb | 7a 07 84 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 cd df 41 37 6e 2d fc 1b 29 38 8e | de fc 0c a0 44 c7 44 d5 00 00 00 1c 00 00 40 05 | 6e c0 59 83 50 2c 8a cc c5 6e 0a 98 ab 1c 00 ee | ff c6 95 31 | libevent_free: release ptr-libevent@0x7fb36804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #455 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35400cc10 | handling event EVENT_RETRANSMIT for parent state #482 | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #482 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #482 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49684.278374; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00072 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #482 | libevent_malloc: new ptr-libevent@0x7fb36804b850 size 128 "road-eastnet-nonat-230" #482: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #482) | 36 c3 54 33 ec a7 b6 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 ed 30 30 be a6 b8 35 5d 7c a5 62 ac c6 13 d8 | 83 27 d5 31 a0 fa 4c 2e 40 b9 54 43 42 15 18 78 | b3 8c 6a 6c 7d 96 c5 85 70 a8 48 20 22 38 c8 e7 | c3 12 d1 63 fb e3 68 d6 08 24 69 60 e5 ac a9 33 | 22 f2 2c f6 14 52 ad 1c 12 97 d4 3c 99 28 7f 69 | aa d1 18 f8 bc 06 35 f3 dd 4f b8 bc 32 67 80 0d | b2 c8 d0 32 11 b6 f1 1a bf 32 1c f4 b1 c8 5d 4d | f1 41 f7 45 a7 42 78 6b 31 8f b7 1a 22 f3 fa a7 | 3f 96 61 3f ad 03 4e 95 70 ec 28 2e 07 88 02 e8 | 35 f1 c5 b3 16 2f 4d b9 e0 29 95 c1 2d e3 e0 37 | 5d 57 61 4b 22 78 ec 0c cc 9d f4 89 9a 2d 4f 1d | b7 c1 f5 ad 55 54 75 4b 2d 2f 97 b2 b3 0a f4 e5 | ca f8 64 9c 52 40 a8 a2 99 0e 3d 9b 5a 9e 1e 2b | 75 b0 89 ef b0 bf 99 f4 37 0e 0c 27 d3 f1 9a c6 | fd 46 0a d5 dc 88 12 58 b5 c1 7a 5a 1b 30 d2 78 | 2b ef 75 09 ea 77 2f b0 ad cc d1 d9 98 94 ca 15 | 29 00 00 24 ba df cf 8a 38 2e 1f 41 21 49 fc b2 | 01 80 ce b1 18 f8 70 f3 ba e7 48 83 d1 e9 62 d6 | 6c d1 b9 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 54 bb 11 83 48 2f 3f fa 5f 96 d0 ad | a2 72 2a 82 ce ec ef d2 00 00 00 1c 00 00 40 05 | c3 77 e0 b4 3a 22 ca d3 bf 9b f4 e6 b2 71 76 56 | 18 71 d4 99 | libevent_free: release ptr-libevent@0x7fb354023e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400cc10 | #482 spent 0.0701 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 08 27 1f 75 50 39 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #455 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #455 | rejected packet: | a6 08 27 1f 75 50 39 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #455: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 c3 54 33 ec a7 b6 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #482 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #482 | rejected packet: | 36 c3 54 33 ec a7 b6 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #482: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0362 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368017ea0 | handling event EVENT_RETRANSMIT for parent state #294 | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #294 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #294 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49684.302735; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005987 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400cc10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #294 | libevent_malloc: new ptr-libevent@0x7fb354023e30 size 128 "road-eastnet-nonat-42" #294: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #294) | 9b 31 1a f8 0f be 39 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 dd 24 24 7c 2f 7c cf af 6d 3e 60 a2 73 ad b0 | 5d e0 ad 29 4b 13 6c 37 66 5f 9c 4f e7 c9 e4 11 | 2c 5d 56 30 72 c8 d6 46 26 66 f5 93 56 d4 c3 52 | 85 cc e5 ae f9 42 b4 ed 60 85 06 0a 66 f5 50 1d | b5 97 c3 6d 71 b4 75 b7 83 18 b1 d3 7d 4a 68 8c | b9 4f df 9f 66 87 ec eb 33 88 de f2 6b c6 ea ab | d0 0d f9 06 34 9c 52 b4 c5 c4 6d 94 39 a8 58 51 | 41 ac 6d 52 08 28 9d f6 37 25 c7 7f 2d 48 ab 90 | f6 30 d2 8b 1b 90 e6 12 18 e0 e2 d4 dc 25 fe 81 | c8 41 3f 06 d9 c6 ce a5 91 8f 50 2b 48 2d e5 59 | 7a 24 e5 58 8b 81 4a bc cb 35 59 84 09 16 ee 2d | ba cf 81 ed 91 57 53 ab 0b 04 8a 27 0b c6 e0 ef | db ab 77 93 c2 db 73 a1 76 37 e1 bf 29 0a 3c 98 | 04 2f f5 e3 ff d0 c3 48 62 42 d2 a6 9f a7 c1 a7 | df e6 f0 e2 49 c7 bb 48 bb b6 1d f0 0e d1 19 d7 | 21 c7 76 5c 49 fc f0 be 36 da d1 aa ec 07 53 22 | 29 00 00 24 c9 1f 43 d3 3e f5 11 59 29 27 36 bb | 9f 07 da f1 c2 4b 17 7e d6 e4 43 b9 54 44 c2 2b | 3a e0 9b 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 60 07 d1 2a 2e 6f e5 7f 13 de a6 | da 25 32 50 d9 e2 97 75 00 00 00 1c 00 00 40 05 | de 91 5e 97 33 cf e4 58 2c 2c f0 43 aa ad 93 60 | ec ee 8a 50 | libevent_free: release ptr-libevent@0x7fb368023e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368017ea0 | #294 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9b 31 1a f8 0f be 39 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #294 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #294 | rejected packet: | 9b 31 1a f8 0f be 39 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #294: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.07 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a15810 | handling event EVENT_RETRANSMIT for parent state #403 | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #403 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #403 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49684.308105; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003634 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368017ea0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #403 | libevent_malloc: new ptr-libevent@0x7fb368023e60 size 128 "road-eastnet-nonat-151" #403: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #403) | 32 36 13 09 3a 0c 64 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 1d 1f f9 29 d4 7a 82 e5 c3 ed 2d 91 36 94 a3 | ad 42 95 1c da 49 e7 df be 20 17 de b8 10 02 70 | 99 a0 9d 95 41 a8 00 d1 af 94 26 4c 6c 86 0c 1f | 94 7a 02 35 96 84 54 33 fd cb 84 dd 66 c9 68 48 | c0 82 f1 59 9a 21 1d bc d5 30 03 12 1e e7 09 61 | be 0b 67 1d db fb 9e 1e 17 49 85 95 31 47 f7 2b | 4a 86 6c c9 65 82 f2 1e a6 01 6c ac cd f1 e2 b1 | c0 7c 6b 1c 75 70 5d e8 eb b9 df 8a a0 09 66 57 | 4a b4 92 66 fc a3 08 c8 94 4f 6c 58 0d 44 86 54 | 0d a6 ba 1e d2 d3 f5 98 14 c7 bb cb 0d c6 25 81 | 7d 00 f0 be 73 bc 11 32 a7 22 fe 40 f1 5c 99 a7 | f6 f4 02 31 24 83 16 a4 cb d9 f9 bc 7d ee f9 64 | 7a 45 11 03 43 36 f4 ff f8 3b 61 50 62 1a ea 35 | 94 85 76 d9 cf 8d 05 40 c4 4f 44 89 69 5a 20 63 | bb 17 c4 c0 24 8c 90 9c 7c 82 0c b1 fd 04 ab 4c | 94 5c 67 12 3b 66 e3 71 78 3a f5 9a 05 60 53 5e | 29 00 00 24 96 4a 72 fe 73 4d 43 f4 22 71 ca 5d | 92 02 9d 90 a1 de a3 67 65 d9 a5 3e 5d f5 46 47 | 3c 9d 2b 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 72 77 63 b0 4d c0 15 33 f7 7b 47 | a3 64 95 74 99 05 10 8e 00 00 00 1c 00 00 40 05 | 3b eb 87 4d 47 ff 24 80 19 6f 36 13 fc b8 88 ec | 58 fe 93 a3 | libevent_free: release ptr-libevent@0x7fb35804b970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a15810 | #403 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 36 13 09 3a 0c 64 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #403 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #403 | rejected packet: | 32 36 13 09 3a 0c 64 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #403: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0758 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a76210 | handling event EVENT_RETRANSMIT for parent state #239 | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #239 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #239 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49684.32747; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.024979 exceeds limit? YES "road-eastnet-nonat-239" #239: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-239" #239: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #491 at 0x557d46b18dc0 | State DB: adding IKEv2 state #491 in UNDEFINED | pstats #491 ikev2.ike started | Message ID: init #491: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #491: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #491; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-239" #491: initiating v2 parent SA to replace #239 | using existing local IKE proposals for connection road-eastnet-nonat-239 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 491 for state #491 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a15810 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #491 | libevent_malloc: new ptr-libevent@0x7fb35804b970 size 128 | #491 spent 0.0997 milliseconds in ikev2_parent_outI1() | RESET processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #239 ikev2.ike failed too-many-retransmits | pstats #239 ikev2.ike deleted too-many-retransmits | #239 spent 2.9 milliseconds in total | [RE]START processing: state #239 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-239" #239: deleting state (STATE_PARENT_I1) aged 64.027s and NOT sending notification | parent state #239: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #239 | crypto helper 16 resuming | crypto helper 16 starting work-order 491 for state #491 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 491 "road-eastnet-nonat-239" #239: deleting IKE SA for connection 'road-eastnet-nonat-239' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-239' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-239 | State DB: deleting IKEv2 state #239 in PARENT_I1 | parent state #239: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 491 time elapsed 0.000876 seconds | (#491) spent 0.879 milliseconds in crypto helper computing work-order 491: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 491 for state #491 to event queue | scheduling resume sending helper answer for #491 | libevent_malloc: new ptr-libevent@0x7fb364039970 size 128 | crypto helper 16 waiting (nothing to do) | stop processing: state #239 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb38002d3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a76210 | in statetime_stop() and could not find #239 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-239 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-239" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-239' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-239" | stop processing: connection "road-eastnet-nonat-239" (in initiate_a_connection() at initiate.c:349) | spent 0.074 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #491 | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 491 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #491 | **emit ISAKMP Message: | initiator cookie: | 71 99 e4 22 98 eb 54 3d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-239 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6f ca d2 21 e7 00 d0 58 95 9f 18 d3 07 6f a1 36 | ikev2 g^x 29 0a 07 0a 83 6e be aa 71 cf 9f 04 2d 78 ad e9 | ikev2 g^x 58 fe 50 02 89 22 52 34 18 90 af 07 b5 26 f1 6c | ikev2 g^x b0 11 12 a1 23 de 99 fd fc c2 c0 e2 48 6c 08 1b | ikev2 g^x f6 de 34 df 7c 06 d6 3f 0c 5a 97 94 b5 cd 37 58 | ikev2 g^x 08 26 b0 da 52 89 5c 74 c6 39 52 b5 86 f0 ed 18 | ikev2 g^x e5 f9 91 2e 14 4e 44 f7 64 55 1d 70 ad 8f f1 5d | ikev2 g^x 53 18 a9 5d 0c b5 78 b7 26 b2 7b 9e 90 ef 29 39 | ikev2 g^x 8b 7e b2 68 96 f5 cb 23 fc d4 1f dd be 19 b3 cf | ikev2 g^x 90 29 ab e6 33 3c 02 49 68 ce 65 d3 cd 32 0f 44 | ikev2 g^x 53 2e 1d d6 62 09 24 c9 7c 69 12 6b 73 20 8c a6 | ikev2 g^x 8d 2e 37 7f bc 30 45 fb da d9 2f 0c 0f 60 4b ac | ikev2 g^x 0c 1a 77 7c e4 78 1e 2f d7 92 41 d2 4d 5f 8e ae | ikev2 g^x 49 e0 54 b5 c7 2d bc a1 7a a2 3f 86 07 2c 92 60 | ikev2 g^x e1 f5 de af a0 f0 4b 27 ad e3 b4 c3 ee 7b 2d 0d | ikev2 g^x d8 e3 ea 54 9f 53 a9 b6 54 62 d4 0e 68 4d ff 58 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f6 62 db cd 87 59 ee 6d c7 6e 62 13 a1 8e a7 17 | IKEv2 nonce f8 92 11 7a 45 83 ff 50 63 74 b0 f6 7b f4 74 d1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 71 99 e4 22 98 eb 54 3d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ef | natd_hash: port= 01 f4 | natd_hash: hash= 31 ef b1 40 3a d0 79 c3 55 24 76 d2 d8 cf d4 95 | natd_hash: hash= 18 b0 e0 3a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 31 ef b1 40 3a d0 79 c3 55 24 76 d2 d8 cf d4 95 | Notify data 18 b0 e0 3a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 71 99 e4 22 98 eb 54 3d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ee b1 f7 86 b3 de f8 ed 09 8e 76 56 9a 74 8c 3c | natd_hash: hash= 69 d7 b9 6e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ee b1 f7 86 b3 de f8 ed 09 8e 76 56 9a 74 8c 3c | Notify data 69 d7 b9 6e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #491 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #491: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #491 to 4294967295 after switching state | Message ID: IKE #491 skipping update_recv as MD is fake | Message ID: sent #491 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-239" #491: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.239:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #491) | 71 99 e4 22 98 eb 54 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6f ca d2 21 e7 00 d0 58 95 9f 18 d3 07 6f a1 36 | 29 0a 07 0a 83 6e be aa 71 cf 9f 04 2d 78 ad e9 | 58 fe 50 02 89 22 52 34 18 90 af 07 b5 26 f1 6c | b0 11 12 a1 23 de 99 fd fc c2 c0 e2 48 6c 08 1b | f6 de 34 df 7c 06 d6 3f 0c 5a 97 94 b5 cd 37 58 | 08 26 b0 da 52 89 5c 74 c6 39 52 b5 86 f0 ed 18 | e5 f9 91 2e 14 4e 44 f7 64 55 1d 70 ad 8f f1 5d | 53 18 a9 5d 0c b5 78 b7 26 b2 7b 9e 90 ef 29 39 | 8b 7e b2 68 96 f5 cb 23 fc d4 1f dd be 19 b3 cf | 90 29 ab e6 33 3c 02 49 68 ce 65 d3 cd 32 0f 44 | 53 2e 1d d6 62 09 24 c9 7c 69 12 6b 73 20 8c a6 | 8d 2e 37 7f bc 30 45 fb da d9 2f 0c 0f 60 4b ac | 0c 1a 77 7c e4 78 1e 2f d7 92 41 d2 4d 5f 8e ae | 49 e0 54 b5 c7 2d bc a1 7a a2 3f 86 07 2c 92 60 | e1 f5 de af a0 f0 4b 27 ad e3 b4 c3 ee 7b 2d 0d | d8 e3 ea 54 9f 53 a9 b6 54 62 d4 0e 68 4d ff 58 | 29 00 00 24 f6 62 db cd 87 59 ee 6d c7 6e 62 13 | a1 8e a7 17 f8 92 11 7a 45 83 ff 50 63 74 b0 f6 | 7b f4 74 d1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 ef b1 40 3a d0 79 c3 55 24 76 d2 | d8 cf d4 95 18 b0 e0 3a 00 00 00 1c 00 00 40 05 | ee b1 f7 86 b3 de f8 ed 09 8e 76 56 9a 74 8c 3c | 69 d7 b9 6e | state #491 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35804b970 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a15810 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a76210 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #491 | libevent_malloc: new ptr-libevent@0x7fb38002d3a0 size 128 | #491 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49684.329214 | resume sending helper answer for #491 suppresed complete_v2_state_transition() and stole MD | #491 spent 0.522 milliseconds in resume sending helper answer | stop processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb364039970 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 99 e4 22 98 eb 54 3d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #491 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #491 | rejected packet: | 71 99 e4 22 98 eb 54 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ef fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #491: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0669 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360018460 | handling event EVENT_RETRANSMIT for parent state #474 | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #474 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #474 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49684.356449; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003412 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36400cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #474 | libevent_malloc: new ptr-libevent@0x7fb364039970 size 128 "road-eastnet-nonat-222" #474: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #474) | 0f db c1 fb 9f 17 ff 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 1b 5f a0 e0 ea b4 6f d8 89 26 cf ee 32 1a 5c | 28 fd cc 88 df ac 76 71 06 f6 f9 47 1d 52 2b f1 | 5a b8 ae 1c d0 f8 c1 49 c7 7c ed 42 b3 cb ec d1 | cd 02 cf 31 b3 56 f6 e1 d0 7b 2f 03 00 08 68 a8 | 8c e2 7f 21 83 8d a7 f5 0e 07 fa ee 88 4b c9 7c | 96 80 b8 d5 42 4d 28 ea bb cc 27 3f c4 d8 6e 4d | d5 70 bc b9 0a 5f 21 c3 31 6b f1 91 46 6a 01 67 | 1a 7e a6 f1 0c 4d 62 51 b1 a2 3c 89 97 d5 4a 44 | a9 bc 59 2f a3 d1 5e 07 95 15 69 ac 72 1f 9c ba | 63 7f 02 e1 05 f8 26 4f fe cb 35 8d 42 06 b7 4a | a1 e1 b3 5c f5 2a 05 2b b1 4d 29 89 16 f1 e4 7b | dc e2 55 b9 29 ad b8 79 4e bb 9a 44 92 25 af e6 | 8f 1c 0d 27 3a fe 2f c8 95 15 ef 6f 1b 1e 7a 94 | a3 8c 31 92 cc 09 2b ca d2 98 1d 32 a4 3c 30 c1 | 96 ab 37 bb 0d bc c5 cd 1c ca 91 c5 fa 2a c9 92 | 70 fb 0c 4c 99 ec 29 a2 72 d8 22 a0 d3 24 0d 76 | 29 00 00 24 b8 e3 46 90 e1 5a 71 46 9e cc 2f c2 | 22 0c 77 5a b9 94 a5 51 d5 e9 c9 19 b8 4f d2 8d | f8 17 d9 c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 82 ca 85 05 ee 86 5d c3 66 e4 91 | 24 1c 89 d5 b4 33 f3 c7 00 00 00 1c 00 00 40 05 | d7 2a e5 02 23 f5 bb 26 e7 1d 38 9f 9f c2 ec a7 | 48 2b cd 07 | libevent_free: release ptr-libevent@0x7fb38802d3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360018460 | #474 spent 0.223 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0f db c1 fb 9f 17 ff 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #474 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #474 | rejected packet: | 0f db c1 fb 9f 17 ff 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #474: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0997 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf10 | handling event EVENT_RETRANSMIT for parent state #404 | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #404 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #404 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49684.37904; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004676 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360018460 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #404 | libevent_malloc: new ptr-libevent@0x7fb38802d3a0 size 128 "road-eastnet-nonat-152" #404: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #404) | 4a 5a cc 55 a0 5d f2 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 5c 51 83 ab 6b 01 fa 80 7d 29 db 27 cd 7b c6 | 7f 04 2f 6a 27 69 df b1 41 5e bf ae 45 95 c1 0c | 60 62 91 a3 34 a3 09 ec 77 e7 89 a6 51 09 95 12 | 3b ff b9 99 25 19 b1 ca db 05 e4 39 d2 de d6 52 | 26 ca b9 02 d7 13 18 29 d4 9e 9a 68 e5 5b 44 39 | 54 a0 05 f4 ba 65 c0 95 36 73 37 bc a2 90 45 30 | d7 96 35 a2 19 0f c4 75 70 1c 7f 35 ab a5 29 b5 | 6b 5d 34 07 1e e2 3e 41 ca 0a 85 69 25 b8 27 58 | d4 99 f8 5e 96 15 ec 82 ac 10 04 76 9b 35 64 a2 | 61 5a aa b1 99 cc 29 04 86 b5 f4 cc 47 04 55 8f | c7 28 c5 78 33 30 c8 76 93 6d f5 e2 6a c6 30 01 | 28 59 c4 cc 64 9b 7d 8e 92 4e ac 31 52 df 0e bd | 0a 9d da 2a 1d 60 fa 21 2a 50 98 51 8a 76 ec c4 | d0 d7 c3 bf 4d 91 f8 7a 88 5f bc 07 e6 69 d7 f2 | ab ab b7 dd 41 cf 13 b8 5a 48 6f f6 ea 70 5c d9 | fb 24 71 46 69 e2 7c a6 fa 4a f9 ae 35 11 e2 42 | 29 00 00 24 fe 30 87 af f4 c1 ee 21 b0 88 ac a0 | 02 58 85 f4 de 21 52 28 4c d8 94 b1 9c 53 a3 c4 | 4e 96 a9 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 64 19 b7 d1 4f 25 21 1b 78 33 8e | a2 b3 19 f4 56 5e 34 fd 00 00 00 1c 00 00 40 05 | ec 45 06 4d 08 52 67 71 ea 88 ce 05 15 99 3d c7 | 85 58 3c 64 | libevent_free: release ptr-libevent@0x7fb34401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf10 | #404 spent 0.373 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 5a cc 55 a0 5d f2 1b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #404 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #404 | rejected packet: | 4a 5a cc 55 a0 5d f2 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #404: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.163 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37801d970 | handling event EVENT_RETRANSMIT for parent state #295 | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #295 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #295 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49684.382783; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004558 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #295 | libevent_malloc: new ptr-libevent@0x7fb34401d920 size 128 "road-eastnet-nonat-43" #295: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #295) | 11 ea 13 a7 2a b1 5c 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 c0 f3 39 06 15 d7 07 8e 11 b6 9a 6e 2d b3 34 | 66 03 a5 c2 e2 1f 37 32 46 97 6f cd af d0 2f 18 | 5f 75 66 e4 a1 42 12 53 5e 16 d8 3a 31 65 02 6a | c5 e3 cc f7 d2 22 a4 aa ae 02 3c 06 f6 0c fe fa | e4 54 02 04 c7 56 0a b1 39 1c 79 77 c9 da 62 93 | 00 7e f1 cc 8f 9d de 33 24 4e 12 09 b8 73 ad 99 | 9d bd 21 4e 12 37 5e 79 f1 fe 24 ac 36 8f 56 b3 | d6 c7 5b 74 f8 84 56 d2 c9 9a 89 80 ba ca fa 63 | 61 ef b2 49 26 8d 16 1c 9e 9b a5 d0 8c b1 11 4d | 74 c3 30 50 82 5e f2 2c 5e 21 4f 59 50 07 97 4a | 3b 99 d0 83 20 16 83 be 15 cb 08 01 be 88 1e c0 | 56 de 78 28 a9 82 d7 99 3a 47 be b7 57 13 4d ef | 18 8f 0d 23 65 69 63 f7 5c af 9a 31 54 69 e3 c6 | e4 81 15 9e a2 7e 90 55 50 a1 5a e2 6d 42 36 72 | e6 93 98 8d ab 65 9b 8b b9 2a 79 2b 2d c9 0f 1f | c1 03 48 63 1c 2b 7c f0 db 5a 0a 3e b5 46 b8 79 | 29 00 00 24 64 9e 8b 02 14 e8 a7 dc 3f 42 d2 c4 | 8f dc b3 ff fc 4c fe 98 93 e9 8f 76 eb 2b 38 f4 | b9 5a a0 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c a5 c7 ec 4b 7a cd c4 3e f0 86 6d | ec 0c 21 f9 74 06 3e 81 00 00 00 1c 00 00 40 05 | 6b d7 31 2e aa f4 5b 2c dc 79 88 ab 6c 34 fc ce | 20 91 9b 02 | libevent_free: release ptr-libevent@0x7fb37800f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37801d970 | #295 spent 0.334 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 ea 13 a7 2a b1 5c 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #295 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #295 | rejected packet: | 11 ea 13 a7 2a b1 5c 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #295: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.156 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #456 | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #456 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #456 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49684.38646; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005699 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37801d970 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #456 | libevent_malloc: new ptr-libevent@0x7fb37800f1a0 size 128 "road-eastnet-nonat-204" #456: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #456) | 9d 73 90 c6 28 50 00 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 3f ed 93 2c 95 9a 36 92 4d 4f a2 60 c1 a4 c9 | 4f 89 23 1f d1 62 f5 78 d3 b5 53 89 10 3d be a6 | 0b 7e 28 8a f8 9f 39 90 86 39 f9 58 de b8 41 b5 | 4e b5 7b 74 44 63 cc 49 07 82 fe 85 49 2e bc 7a | f9 73 7c 32 a7 c0 6d 69 27 6b 58 3d ad d1 e3 ec | cc a2 3b ff 29 b9 68 35 71 ee f8 63 67 14 1d 54 | bd cd c0 94 2f 62 7a 35 f4 12 35 06 31 ee 52 8b | 29 f1 3d 4d 88 53 c4 ee a1 13 19 c9 95 9c 3a b3 | 01 50 95 2e cb 29 cc 04 53 67 66 58 33 78 91 44 | bb 06 02 b6 52 69 e1 7c 4a 36 de 14 7e d4 42 89 | da ed 12 fd e2 7c 6b 02 ab fa 82 91 36 f1 eb 4f | a3 22 e5 0e 96 4e 45 d1 d5 c3 b4 13 59 96 05 fe | 42 25 83 c3 8d 08 66 f5 9f c5 f5 d6 78 e8 30 c4 | 64 8d 48 0b ea 1f e9 05 9f 8a 0b 97 9c 51 d8 74 | a8 a9 43 c8 84 d8 11 55 a3 8c 0b ac d0 92 1d f4 | 61 b1 7f 3d f8 aa 52 a8 9b c7 bf 12 0c da 76 e4 | 29 00 00 24 6d 34 cd c2 13 6b 2e 99 a8 cb ee 2a | a0 eb 8c a9 1d 65 aa 5b 5f 82 85 1d 0e 9e 60 f1 | 7a ed 45 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ef 03 64 ba 5e b8 36 8b cc 07 48 65 | d5 6f 6e 8b 3d 6d 57 bb 00 00 00 1c 00 00 40 05 | 07 ad 51 48 59 7f 26 2d fc 42 e0 9c c0 43 00 49 | 58 00 de b8 | libevent_free: release ptr-libevent@0x7fb348023e80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #456 spent 0.307 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d 73 90 c6 28 50 00 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #456 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #456 | rejected packet: | 9d 73 90 c6 28 50 00 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #456: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.159 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360012bf0 | handling event EVENT_RETRANSMIT for parent state #483 | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #483 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #483 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49684.388054; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002047 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #483 | libevent_malloc: new ptr-libevent@0x7fb348023e80 size 128 "road-eastnet-nonat-231" #483: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #483) | 34 4c 65 0f e6 b6 ad e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 14 b4 cd 04 ae 73 27 55 14 94 b2 a9 a9 46 92 | bf 38 7f 34 e4 30 01 9b cc 3d 69 9b 72 22 2d c6 | c0 5a ca f2 aa f8 34 31 df 85 74 a8 8a c4 71 d3 | 18 15 b7 43 a0 c7 52 88 83 cb 13 e3 0b 22 9f 8d | 9b 32 7a fd 24 4c 85 ea ba 28 19 ff da 93 b1 bb | d8 33 5c 65 db be 0a e0 bd 29 79 f5 94 d3 6b 1b | d0 fe 62 1a aa 43 59 54 5f 94 f2 d4 df c7 8c 2c | 9f 79 f7 92 9d e8 8c 7a 9a 6a da 8f dd 5b f5 4b | 78 88 55 3a 27 f6 46 11 a6 78 da 31 e5 57 e3 ff | c3 41 c4 d8 db 92 c7 9b 0b f2 9c 05 a4 6f e4 60 | d6 be 30 93 95 25 fb 5e 0e 06 32 43 09 91 4d 90 | 0e 89 44 7a 24 99 b2 ff 62 86 54 98 47 bc f9 cf | ff 60 15 2b c0 14 62 be bc 88 1f 37 10 d8 42 2b | 8e 68 b2 b4 90 d0 f5 fe bf 7c ce c7 6a 70 46 09 | 84 97 db 42 58 43 9f f3 46 27 26 32 2b 0c cd 41 | 80 81 33 b8 5d 30 60 f3 70 32 7b 81 3a 1a 11 48 | 29 00 00 24 a6 6b eb 02 98 7d a6 5e 59 5e bd f1 | ef cf 36 f2 a9 4b e0 19 61 9c ac e2 ac 17 24 09 | 0d 96 04 a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d1 38 08 89 da 41 ff 7d 1c 3d 17 6c | 3a eb 05 70 fa bf ed 59 00 00 00 1c 00 00 40 05 | d4 38 01 a3 1e e4 dd 2e 8e 63 54 12 3f 4d 01 1d | 49 6b 48 46 | libevent_free: release ptr-libevent@0x7fb37003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360012bf0 | #483 spent 0.225 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 4c 65 0f e6 b6 ad e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #483 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #483 | rejected packet: | 34 4c 65 0f e6 b6 ad e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #483: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.122 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5f0d0 | handling event EVENT_RETRANSMIT for parent state #487 | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #487 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #487 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49684.402525; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500146 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #487 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 "road-eastnet-nonat-235" #487: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #487) | b2 6f 13 91 c3 04 27 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e b7 3e 1e ea 4f ea 6c e1 7a 2e d9 d3 3e f9 00 | 00 b2 10 a9 bd 14 73 d0 5c 75 d0 f7 e2 0a 9c 29 | d2 44 ca 2c 07 7b 68 53 85 c3 d3 3e bc e8 07 6e | cf f2 af a9 1e bb 29 51 6a f7 01 6c 37 1e c0 ab | 85 0c c2 bf ee 4c 81 52 aa 15 a7 f4 22 68 ab 13 | 48 79 2b 77 d6 1b 5b ea 43 58 e3 de cb b3 22 8f | 5c c4 4c 56 f3 fa d5 2b 81 01 8d d3 c1 a0 72 c2 | 36 97 f9 30 4e b1 e3 4c c3 9f 76 1a 47 e2 4c 66 | 36 1c 6d 84 88 a7 c0 e7 e9 9d 4f 1d e0 c1 e1 ff | 39 d2 b1 a1 49 e4 09 1c dc a0 a7 cd 71 c8 f9 bc | 3a bc 26 2f 4d d5 40 96 f5 89 a1 c7 d3 3a 43 fd | 96 7a 1b 6f d9 4d de b2 44 44 32 65 9e 2d 89 e0 | 92 3a f7 8d c2 fa 4d 91 90 40 ba 6a ed 04 a1 1b | cd 46 17 18 d0 bf 88 e4 f7 cd 2c 44 55 8e 08 a0 | 65 d8 55 af e5 2c 13 03 b6 20 5e 95 aa 08 a5 20 | cd 27 5d 2b dd 8b b7 c9 7d 2d d5 bb 14 9f 9e 7c | 29 00 00 24 f2 e1 64 3c 35 1a 4c dd 7a 16 43 23 | ae 79 36 f1 02 a6 51 17 6d d2 ae 67 32 63 24 20 | 73 fc 22 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 4a 35 08 41 af be cf 3c 4d e0 85 | 28 9e fb 5b 11 1f 06 99 00 00 00 1c 00 00 40 05 | 95 f5 24 fe 51 05 47 87 18 ae 0d 13 a0 36 38 27 | 84 c2 41 68 | libevent_free: release ptr-libevent@0x7fb37c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5f0d0 | #487 spent 0.19 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ae48c0 | handling event EVENT_RETRANSMIT for parent state #240 | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #240 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #240 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49684.40276; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010646 exceeds limit? YES "road-eastnet-nonat-240" #240: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-240" #240: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #492 at 0x557d46b1a380 | State DB: adding IKEv2 state #492 in UNDEFINED | pstats #492 ikev2.ike started | Message ID: init #492: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #492: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #492; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-240" #492: initiating v2 parent SA to replace #240 | using existing local IKE proposals for connection road-eastnet-nonat-240 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 492 for state #492 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a5f0d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #492 | libevent_malloc: new ptr-libevent@0x7fb37c0251c0 size 128 | #492 spent 0.118 milliseconds in ikev2_parent_outI1() | RESET processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 4 resuming | start processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #240 ikev2.ike failed too-many-retransmits | pstats #240 ikev2.ike deleted too-many-retransmits | crypto helper 4 starting work-order 492 for state #492 | #240 spent 2.85 milliseconds in total | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 492 | [RE]START processing: state #240 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-240" #240: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #240: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #240 "road-eastnet-nonat-240" #240: deleting IKE SA for connection 'road-eastnet-nonat-240' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-240' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-240 | State DB: deleting IKEv2 state #240 in PARENT_I1 | parent state #240: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #240 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb3480251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae48c0 | in statetime_stop() and could not find #240 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 492 time elapsed 0.000741 seconds | (#492) spent 0.764 milliseconds in crypto helper computing work-order 492: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 492 for state #492 to event queue | scheduling resume sending helper answer for #492 | libevent_malloc: new ptr-libevent@0x7fb35804b970 size 128 recvmsg: received truncated IKE packet (MSG_TRUNC) | crypto helper 4 waiting (nothing to do) | **parse ISAKMP Message (raw): | initiator cookie: | b2 6f 13 91 c3 04 27 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #487 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #487 | rejected packet: | b2 6f 13 91 c3 04 27 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 eb 7d 55 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #487: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0905 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-240 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-240" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-240' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-240" | stop processing: connection "road-eastnet-nonat-240" (in initiate_a_connection() at initiate.c:349) | spent 0.0725 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #492 | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 492 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #492 | **emit ISAKMP Message: | initiator cookie: | d7 99 7d 69 73 b4 2a a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-240 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8e 07 d7 12 79 21 18 05 9a 65 7d 95 08 cf 17 4e | ikev2 g^x 65 ed 52 c0 2d 6f a2 d4 7e 6e 0c fe 68 2e 85 0e | ikev2 g^x c1 f3 a0 f1 34 f9 34 8a e9 6d c0 54 1e 27 54 a6 | ikev2 g^x 0a 27 50 d2 78 b6 25 f7 6a f9 6c d4 40 88 de 0e | ikev2 g^x c5 23 46 17 11 07 59 0b 07 7d f1 44 d8 68 37 f0 | ikev2 g^x 12 d0 4c 6e 87 95 44 91 7a 02 1a aa de e2 f1 34 | ikev2 g^x 10 60 5a 14 6b 10 17 21 f9 34 d9 11 2c 87 8c 26 | ikev2 g^x a1 73 6c 09 6c 7e 33 9d 0e 03 17 61 98 14 aa f1 | ikev2 g^x 55 ad ab 3a b7 4f 37 37 da 8f 18 e7 c8 d3 37 ef | ikev2 g^x 02 82 ee 24 ef c3 bd c3 8a 68 42 60 d6 70 2e 41 | ikev2 g^x 57 9c 7a 60 c3 c6 ac 4a 44 4b 7b 82 88 6e 37 3a | ikev2 g^x e8 a6 66 1b 7b 71 c3 58 de ce c4 1a 99 46 de bc | ikev2 g^x be 62 d4 44 43 62 c0 f6 26 99 83 35 30 7f b5 15 | ikev2 g^x ea a7 50 6e 0e e9 be 43 3b f3 33 1e 18 3f 0c b4 | ikev2 g^x 99 f0 db 6c 50 7f 42 cb 48 b5 b5 92 17 92 32 ed | ikev2 g^x bf e5 25 0e 41 bc 26 2f b8 93 47 2e 04 ee 7f e1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 50 36 54 c1 a9 17 13 4c 62 1f 80 79 be a9 3c 75 | IKEv2 nonce 1a 54 91 d7 53 38 3a 75 de 57 2a 82 16 4a 83 7c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d7 99 7d 69 73 b4 2a a7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f0 | natd_hash: port= 01 f4 | natd_hash: hash= d0 22 3a 78 b0 c2 12 43 88 f6 04 b2 db f8 ae cb | natd_hash: hash= 72 c7 59 0b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d0 22 3a 78 b0 c2 12 43 88 f6 04 b2 db f8 ae cb | Notify data 72 c7 59 0b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d7 99 7d 69 73 b4 2a a7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d7 ae 13 c8 9e aa 6e 0d cf 25 ff 91 a0 20 ef 42 | natd_hash: hash= b6 21 2f 3a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d7 ae 13 c8 9e aa 6e 0d cf 25 ff 91 a0 20 ef 42 | Notify data b6 21 2f 3a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #492 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #492: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #492 to 4294967295 after switching state | Message ID: IKE #492 skipping update_recv as MD is fake | Message ID: sent #492 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-240" #492: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.240:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #492) | d7 99 7d 69 73 b4 2a a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 07 d7 12 79 21 18 05 9a 65 7d 95 08 cf 17 4e | 65 ed 52 c0 2d 6f a2 d4 7e 6e 0c fe 68 2e 85 0e | c1 f3 a0 f1 34 f9 34 8a e9 6d c0 54 1e 27 54 a6 | 0a 27 50 d2 78 b6 25 f7 6a f9 6c d4 40 88 de 0e | c5 23 46 17 11 07 59 0b 07 7d f1 44 d8 68 37 f0 | 12 d0 4c 6e 87 95 44 91 7a 02 1a aa de e2 f1 34 | 10 60 5a 14 6b 10 17 21 f9 34 d9 11 2c 87 8c 26 | a1 73 6c 09 6c 7e 33 9d 0e 03 17 61 98 14 aa f1 | 55 ad ab 3a b7 4f 37 37 da 8f 18 e7 c8 d3 37 ef | 02 82 ee 24 ef c3 bd c3 8a 68 42 60 d6 70 2e 41 | 57 9c 7a 60 c3 c6 ac 4a 44 4b 7b 82 88 6e 37 3a | e8 a6 66 1b 7b 71 c3 58 de ce c4 1a 99 46 de bc | be 62 d4 44 43 62 c0 f6 26 99 83 35 30 7f b5 15 | ea a7 50 6e 0e e9 be 43 3b f3 33 1e 18 3f 0c b4 | 99 f0 db 6c 50 7f 42 cb 48 b5 b5 92 17 92 32 ed | bf e5 25 0e 41 bc 26 2f b8 93 47 2e 04 ee 7f e1 | 29 00 00 24 50 36 54 c1 a9 17 13 4c 62 1f 80 79 | be a9 3c 75 1a 54 91 d7 53 38 3a 75 de 57 2a 82 | 16 4a 83 7c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 22 3a 78 b0 c2 12 43 88 f6 04 b2 | db f8 ae cb 72 c7 59 0b 00 00 00 1c 00 00 40 05 | d7 ae 13 c8 9e aa 6e 0d cf 25 ff 91 a0 20 ef 42 | b6 21 2f 3a | state #492 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c0251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a5f0d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae48c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #492 | libevent_malloc: new ptr-libevent@0x7fb3480251c0 size 128 | #492 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49684.404502 | resume sending helper answer for #492 suppresed complete_v2_state_transition() and stole MD | #492 spent 0.571 milliseconds in resume sending helper answer | stop processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35804b970 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 99 7d 69 73 b4 2a a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #492 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #492 | rejected packet: | d7 99 7d 69 73 b4 2a a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f0 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #492: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0718 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37000d120 | handling event EVENT_RETRANSMIT for parent state #405 | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #405 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #405 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49684.433736; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00382 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800cfd0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #405 | libevent_malloc: new ptr-libevent@0x7fb35804b970 size 128 "road-eastnet-nonat-153" #405: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #405) | be e8 17 81 54 19 aa 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 35 ee 04 e9 c6 8a 5e c2 8c d0 2d 28 00 02 85 | 8c 37 b4 2a 7d 22 9b 7b d7 a1 23 7d 82 8f c4 6b | 57 c4 dd c3 ee aa c0 59 55 41 ec 07 5b d2 96 3f | 84 76 05 f0 b5 2a e8 98 98 d7 99 f0 e6 85 ba e9 | 7a 9d b6 d3 d8 1c ba 13 51 c2 52 69 b1 b0 51 2d | 27 ff ad 85 cb c3 37 19 4d 04 8f 00 5d 8e da a2 | 83 bf af 69 a5 88 8d 6e 4b fc d9 97 99 c9 fb 45 | db d1 9d 19 a0 0a d0 5c 01 fa a2 fa ec 3d 5c 71 | 97 18 03 d4 ac c9 d5 4f 44 b7 51 11 eb 34 8d f4 | ae 35 d6 d0 d3 d3 55 70 23 2c b8 b9 0d e9 30 e3 | 09 45 cd 57 53 d7 0b 66 63 c7 ad 04 26 12 af a0 | 90 e5 43 30 55 a3 78 25 bd ac a0 c8 d8 1b 48 03 | 7d 5e a7 cb e9 7e 28 c2 c1 55 c3 c2 88 18 bb 71 | ea 43 2f 82 f5 b1 df d2 66 a9 f6 d5 fa 01 de ee | e8 cd 12 32 f5 db da 44 b1 63 d9 46 0a 50 55 e5 | e4 13 08 92 13 df ad 90 0b 31 de af 43 48 dc 7b | 29 00 00 24 ad 05 d9 2e f2 d6 c0 cb b5 b3 6e e0 | 64 6e 66 e1 31 b9 1b 6d 0b a1 0e d8 22 30 ee ae | e8 8f 1f eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 93 4e 39 e4 10 9f 0f a5 0f ed 76 | 86 5f 9d 57 55 de 19 a7 00 00 00 1c 00 00 40 05 | eb f0 2f 13 5d 22 43 08 07 64 33 45 d0 5d dc 6e | 5b 6e e5 c1 | libevent_free: release ptr-libevent@0x7fb370029490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37000d120 | #405 spent 0.0999 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be e8 17 81 54 19 aa 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #405 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #405 | rejected packet: | be e8 17 81 54 19 aa 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #405: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c017ea0 | handling event EVENT_RETRANSMIT for parent state #296 | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #296 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #296 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49684.450014; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008521 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37000d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #296 | libevent_malloc: new ptr-libevent@0x7fb370029490 size 128 "road-eastnet-nonat-44" #296: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #296) | 1c da 2e ac 4a 99 24 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 2a 4d fb 46 1d b7 c4 96 00 b1 66 99 7e ce 3b | 3f 48 6e 8c 76 bd 25 cd 72 f7 15 4a f9 69 ef 13 | 61 8a 19 db 25 90 81 55 08 5a cc 41 41 e5 ab d4 | 92 10 f9 d6 8d 49 ef 3f b0 9e f2 80 9b 7b 70 6e | a9 61 7d e0 84 75 fd d1 46 6c 42 61 66 ee 24 20 | 73 fa d1 4c 21 9e a9 c7 16 a9 b3 6f aa 78 ac 00 | 78 f4 c3 83 9c c4 9a 92 64 af b4 ed 81 ba ac a2 | f1 41 08 3e c1 2f b1 ba 03 49 e2 bf 7f db 95 66 | 30 1e c5 ba 28 dd ee 71 21 42 41 ca af c4 be d2 | 90 1d aa 94 fa 3e 05 ce 17 28 d8 85 00 b7 a3 6c | d2 a6 c4 12 ee 02 b6 a5 47 f5 e8 05 85 3f 07 9b | aa 0d 4f 57 c3 15 b2 47 ad f5 11 0a f7 29 da c6 | 9c 86 0c 08 6b ec 00 4d b0 6e 72 d1 b7 c3 86 c8 | 85 d9 c3 07 c3 a7 58 91 99 ee d7 82 f7 95 cb 56 | c0 48 0c 04 c6 c9 83 ce b6 aa 4e 64 f0 9f 73 46 | e9 f5 bb 10 78 a8 77 4a 7b da 32 8f 23 90 cf 6d | 29 00 00 24 ce d0 75 80 6d 1e 36 8f b6 81 e0 37 | 25 cc b5 c9 b7 8f 97 4d 1e ae eb 17 23 86 66 d2 | cc 2a b8 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 83 86 3f b2 b5 92 3c 02 7f 1a c2 | 45 4d 9a 24 f1 5a 66 8d 00 00 00 1c 00 00 40 05 | 7c cb b6 c5 ee bc 2b a0 53 bb 77 45 86 3e ca 93 | 1e 2d 97 d8 | libevent_free: release ptr-libevent@0x7fb37c029710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c017ea0 | #296 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c da 2e ac 4a 99 24 d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #296 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #296 | rejected packet: | 1c da 2e ac 4a 99 24 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #296: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35804b810 | handling event EVENT_RETRANSMIT for parent state #475 | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #475 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #475 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49684.459286; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001698 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #475 | libevent_malloc: new ptr-libevent@0x7fb37c029710 size 128 "road-eastnet-nonat-223" #475: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #475) | f3 25 a8 40 a9 16 90 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 fc dc 84 62 e7 1f 29 92 4f 29 58 18 7b 3f c4 | 0b 92 35 41 3d 7d f5 49 ac e4 08 33 00 55 13 7e | 41 c8 1f ab 98 7a 30 c3 af c3 cf 6c 36 f8 c9 eb | 2e 6e a4 90 d5 52 a2 8a 0e 83 47 aa 06 91 44 23 | e7 ef 3d 2e 37 19 57 6f 45 ce 1d 86 c2 e7 46 ee | 18 2a 29 c4 ec 14 a5 7f 72 bc 78 02 59 a2 ca 1d | b2 b0 a4 5c 1b 84 48 bf bd 56 e0 d5 a2 ad cf a0 | ed 67 0d 74 38 b9 ba e0 64 fd 1a b6 82 cc d6 8a | 07 94 d5 49 9d 7f 16 e0 7c 51 29 17 d6 08 40 72 | fd c6 fa 75 b2 47 30 6b 15 b9 55 b9 02 dd d8 c4 | c6 0d e1 61 7d 87 80 e1 c1 30 9f 40 92 6e 85 e9 | ef ce 2d ce 71 79 64 d3 dd 63 ec db 24 83 38 23 | 73 f2 c1 e6 cf bd 52 ef 73 4d 97 4a 32 ac ae 30 | 6c 19 3c 8f 59 15 1c e0 c6 b3 5b a5 c9 da d5 d9 | 5d 32 c2 2c c5 8a 99 8b d0 ac 6f 05 fa 9a 82 9e | fa 91 c3 17 c1 28 24 70 4e 52 7c 04 70 68 57 b3 | 29 00 00 24 d6 06 09 cd b7 26 a0 ec bf 9a 6e 13 | e8 2b d8 44 aa f3 29 4e 9f 5a e2 23 56 33 79 1c | 13 aa 41 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 5a 5b 76 80 70 09 57 e9 61 f5 b2 | db 52 90 c9 67 ea 13 33 00 00 00 1c 00 00 40 05 | 6b c7 4e 4d 75 42 5c 91 03 17 f3 17 f4 9d bf bf | b8 92 f0 13 | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35804b810 | #475 spent 0.0893 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 25 a8 40 a9 16 90 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #475 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #475 | rejected packet: | f3 25 a8 40 a9 16 90 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #475: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36002aab0 | handling event EVENT_RETRANSMIT for parent state #484 | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #484 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #484 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49684.472643; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001788 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35804b810 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #484 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 "road-eastnet-nonat-232" #484: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #484) | 74 f2 d9 62 15 c8 1b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 3b 62 f3 ed f9 47 0c bf 01 45 93 af e9 01 13 | b4 4a bb 89 23 94 52 5c ed 86 36 6e eb 69 47 16 | 4f 4d 66 99 6d c7 d9 da 05 03 61 83 27 be 84 fb | f7 56 2a 10 f6 9b f2 84 b7 d0 85 06 cd 12 0f 3f | a6 61 71 e1 4c 4c be b5 23 cc e4 61 ef 62 aa 02 | 7f 71 fa f2 27 5a a1 66 46 df 65 7e 72 33 12 a7 | d6 b1 80 2f 61 a3 b3 4c c2 28 e7 cf a7 3c 3b 6f | 3a a0 e5 2d 1e 20 bd 32 76 a2 9f 45 f7 a6 6e e6 | 37 c0 ae 2c 38 01 39 bd 5f e0 3d 65 31 0e f3 37 | 25 fd f7 75 ed 4c 70 31 98 89 dd 26 6b f0 c6 86 | 26 2c de ac 79 65 19 00 78 ef 2a 8b 1d ed 38 d3 | 5d 90 eb e1 29 71 f3 ff 0c 50 ed 12 97 fe f3 76 | 44 b9 27 26 27 3a b5 56 98 ce 1d d1 07 e6 e9 5e | c0 92 67 d1 b6 25 97 6b 40 80 cf 9a 68 03 d5 29 | 53 a9 fd 87 28 85 18 42 c6 5b 08 65 a1 d2 2b 6d | e9 34 66 d8 9b 2a 73 2a 5b b8 59 63 5e 1f 84 b9 | 29 00 00 24 71 8e 31 23 c4 63 d2 6d d6 0a c0 cb | 7f b2 37 27 b0 85 2e 73 82 c7 9f d6 c1 fd d8 67 | ff 33 43 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 6d 47 d8 30 7b 36 73 b1 0d df 8b | 82 69 87 3e 91 43 68 d6 00 00 00 1c 00 00 40 05 | 23 15 eb e5 a3 5e 20 cf 73 fe 01 cb 79 d0 a6 f2 | 55 38 68 fe | libevent_free: release ptr-libevent@0x7fb368035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36002aab0 | #484 spent 0.0829 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 f2 d9 62 15 c8 1b 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #484 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #484 | rejected packet: | 74 f2 d9 62 15 c8 1b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #484: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbbc0 | handling event EVENT_RETRANSMIT for parent state #241 | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #241 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #241 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49684.486883; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006462 exceeds limit? YES "road-eastnet-nonat-241" #241: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-241" #241: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #493 at 0x557d46b1b940 | State DB: adding IKEv2 state #493 in UNDEFINED | pstats #493 ikev2.ike started | Message ID: init #493: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #493: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #493; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-241" #493: initiating v2 parent SA to replace #241 | using existing local IKE proposals for connection road-eastnet-nonat-241 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 493 for state #493 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36002aab0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #493 | libevent_malloc: new ptr-libevent@0x7fb368035930 size 128 | #493 spent 0.0686 milliseconds in ikev2_parent_outI1() | RESET processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 resuming | start processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #241 ikev2.ike failed too-many-retransmits | pstats #241 ikev2.ike deleted too-many-retransmits | crypto helper 13 starting work-order 493 for state #493 | #241 spent 2.72 milliseconds in total | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 493 | [RE]START processing: state #241 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-241" #241: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #241: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #241 "road-eastnet-nonat-241" #241: deleting IKE SA for connection 'road-eastnet-nonat-241' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-241' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-241 | State DB: deleting IKEv2 state #241 in PARENT_I1 | parent state #241: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 493 time elapsed 0.000898 seconds | (#493) spent 0.904 milliseconds in crypto helper computing work-order 493: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 493 for state #493 to event queue | scheduling resume sending helper answer for #493 | libevent_malloc: new ptr-libevent@0x7fb35c03f430 size 128 | stop processing: state #241 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 13 waiting (nothing to do) | libevent_free: release ptr-libevent@0x7fb350035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbbc0 | in statetime_stop() and could not find #241 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-241 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-241" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-241' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-241" | stop processing: connection "road-eastnet-nonat-241" (in initiate_a_connection() at initiate.c:349) | spent 0.0571 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #493 | start processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 493 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #493 | **emit ISAKMP Message: | initiator cookie: | ed 28 a4 bc 11 7c af 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-241 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 97 43 c9 b9 d1 39 88 cf b4 19 83 df 09 c8 d9 33 | ikev2 g^x 6a 66 ab 95 b0 dd 15 4d 5d 4a fa 5d 52 f2 94 c9 | ikev2 g^x 8c 6b 4e fd a3 be 7b 1e 26 3d da ae 4a c7 9d 27 | ikev2 g^x 63 37 11 7d f7 65 a5 40 e2 b8 e7 88 e2 a7 17 fe | ikev2 g^x 35 86 91 9a d8 ce fa 63 4d d8 5f 33 39 8b fd 0b | ikev2 g^x c7 66 ad d7 e3 69 0a d0 e8 2c 35 2b 87 c6 e8 d1 | ikev2 g^x 35 a2 6a bd 14 2b 17 e4 3b 63 91 15 e8 44 4a 0b | ikev2 g^x ee 35 18 44 31 9b e0 f3 11 2e f9 0a f8 94 2e e7 | ikev2 g^x 37 62 af 42 67 9b d9 c2 7a 1d 9a 74 9c 27 5f 4e | ikev2 g^x 6c 61 5b 8d 6f b6 26 7a 65 28 0b d8 63 b2 4d f2 | ikev2 g^x 4f 66 7e 68 e4 09 4f e1 36 c2 c4 fc b8 a8 0d bd | ikev2 g^x 8f 6c 26 6b 1b b4 27 de 4d 65 70 86 b8 d6 2d 91 | ikev2 g^x e7 12 ef a7 86 2f 17 c5 46 49 a0 b2 37 f9 08 9e | ikev2 g^x 05 44 0c 6d 93 fe 69 98 08 f9 28 75 1f 4f 91 2d | ikev2 g^x 39 9f 63 17 e0 d3 1a 4e 52 69 6b 52 15 77 3f 2f | ikev2 g^x 3e 88 cf 00 87 f9 bd f2 03 53 f2 34 f3 a4 6a 9a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a6 a1 ba dd 86 99 b3 8f 47 4a 4d 8f 4a 4e 2e 70 | IKEv2 nonce ee a1 39 80 4f 25 94 bc 3e 73 ee 31 55 0b 3a 56 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ed 28 a4 bc 11 7c af 65 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f1 | natd_hash: port= 01 f4 | natd_hash: hash= 0b ce a8 52 73 2a af 56 99 7a 11 14 f3 b1 9c fe | natd_hash: hash= 91 8b 24 9a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0b ce a8 52 73 2a af 56 99 7a 11 14 f3 b1 9c fe | Notify data 91 8b 24 9a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ed 28 a4 bc 11 7c af 65 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 14 ee cd 8a 22 d5 80 d4 99 d7 ec c4 4c 96 10 11 | natd_hash: hash= ff 51 59 09 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 14 ee cd 8a 22 d5 80 d4 99 d7 ec c4 4c 96 10 11 | Notify data ff 51 59 09 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #493 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #493: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #493 to 4294967295 after switching state | Message ID: IKE #493 skipping update_recv as MD is fake | Message ID: sent #493 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-241" #493: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.241:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #493) | ed 28 a4 bc 11 7c af 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 43 c9 b9 d1 39 88 cf b4 19 83 df 09 c8 d9 33 | 6a 66 ab 95 b0 dd 15 4d 5d 4a fa 5d 52 f2 94 c9 | 8c 6b 4e fd a3 be 7b 1e 26 3d da ae 4a c7 9d 27 | 63 37 11 7d f7 65 a5 40 e2 b8 e7 88 e2 a7 17 fe | 35 86 91 9a d8 ce fa 63 4d d8 5f 33 39 8b fd 0b | c7 66 ad d7 e3 69 0a d0 e8 2c 35 2b 87 c6 e8 d1 | 35 a2 6a bd 14 2b 17 e4 3b 63 91 15 e8 44 4a 0b | ee 35 18 44 31 9b e0 f3 11 2e f9 0a f8 94 2e e7 | 37 62 af 42 67 9b d9 c2 7a 1d 9a 74 9c 27 5f 4e | 6c 61 5b 8d 6f b6 26 7a 65 28 0b d8 63 b2 4d f2 | 4f 66 7e 68 e4 09 4f e1 36 c2 c4 fc b8 a8 0d bd | 8f 6c 26 6b 1b b4 27 de 4d 65 70 86 b8 d6 2d 91 | e7 12 ef a7 86 2f 17 c5 46 49 a0 b2 37 f9 08 9e | 05 44 0c 6d 93 fe 69 98 08 f9 28 75 1f 4f 91 2d | 39 9f 63 17 e0 d3 1a 4e 52 69 6b 52 15 77 3f 2f | 3e 88 cf 00 87 f9 bd f2 03 53 f2 34 f3 a4 6a 9a | 29 00 00 24 a6 a1 ba dd 86 99 b3 8f 47 4a 4d 8f | 4a 4e 2e 70 ee a1 39 80 4f 25 94 bc 3e 73 ee 31 | 55 0b 3a 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b ce a8 52 73 2a af 56 99 7a 11 14 | f3 b1 9c fe 91 8b 24 9a 00 00 00 1c 00 00 40 05 | 14 ee cd 8a 22 d5 80 d4 99 d7 ec c4 4c 96 10 11 | ff 51 59 09 | state #493 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb368035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36002aab0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbbc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #493 | libevent_malloc: new ptr-libevent@0x7fb350035930 size 128 | #493 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49684.488378 | resume sending helper answer for #493 suppresed complete_v2_state_transition() and stole MD | #493 spent 0.348 milliseconds in resume sending helper answer | stop processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c03f430 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 28 a4 bc 11 7c af 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #493 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #493 | rejected packet: | ed 28 a4 bc 11 7c af 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f1 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #493: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c00d120 | handling event EVENT_RETRANSMIT for parent state #406 | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #406 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #406 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49684.507548; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003817 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #406 | libevent_malloc: new ptr-libevent@0x7fb35c03f430 size 128 "road-eastnet-nonat-154" #406: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #406) | 5c 1b 3d 38 ad ed bb 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 1a b6 af ea 21 97 b3 f5 89 b5 95 b7 8e 01 21 | 34 29 bd cd 92 66 af f7 07 14 1e f2 4b ac 69 77 | b3 25 64 1a 72 01 08 14 88 fb 34 a6 91 bd 4c e8 | 74 ed 64 90 06 cb ad 54 67 18 ec c2 f6 32 90 94 | 8a 60 b7 b6 26 ea 31 da ec 24 92 6a 22 25 e6 ae | 79 52 07 43 fe e8 78 1d 19 58 3a 0f 01 09 9b 79 | a8 83 55 03 d0 25 e3 a6 6b 4d b2 09 24 dc 38 c7 | c0 36 e4 53 c2 05 eb 85 aa 76 78 46 e9 fc ba 6a | 9d 2a 99 85 b8 e3 fb 99 44 cb 75 c0 ab ae 6e 11 | 07 c0 ca 22 19 62 ce d5 17 5c e1 b9 18 74 78 be | 34 a1 1c d9 92 69 84 5a 1b b1 7e 28 a9 f2 00 ef | e6 0f 63 2f 7a b6 8d 10 3d 27 b5 f9 29 ad b2 b0 | 65 7c 94 5e 21 5a 98 07 17 36 5b b2 b7 51 51 8d | 3d 77 c7 dd 9a b0 95 69 8a b2 64 fa 98 d0 67 3a | d0 c0 eb c5 e3 82 7f 6a 7e d1 db 5f 16 5a 12 aa | ee c9 5e 0d 7b ae 47 81 60 df bf f4 74 63 48 5d | 29 00 00 24 00 c8 88 3e 7a 51 ef 1c 0c 98 f2 86 | d5 82 58 ca a8 80 65 3f cb c6 86 a8 5f 67 eb c4 | af 88 eb 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c fb 6e 46 7d 68 85 83 cc d1 35 3b | 25 21 b7 36 bf 74 0f f9 00 00 00 1c 00 00 40 05 | ea 1c 8a 1b 9f c4 37 0b d8 b4 d1 29 da 67 72 c1 | 45 ae 67 d8 | libevent_free: release ptr-libevent@0x7fb36401f4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c00d120 | #406 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 1b 3d 38 ad ed bb 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #406 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #406 | rejected packet: | 5c 1b 3d 38 ad ed bb 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #406: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0648 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #297 | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #297 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #297 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49684.515914; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005693 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #297 | libevent_malloc: new ptr-libevent@0x7fb36401f4e0 size 128 "road-eastnet-nonat-45" #297: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #297) | e1 41 d2 51 2f 25 d9 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 ea 0d 0b 39 8c c1 99 18 5a a8 8a 8f 5d 3d 22 | 46 42 ee 49 5d 81 c3 87 32 80 3d 42 65 0e 28 54 | e6 12 c3 e6 03 86 ad ca e9 ea 65 ce 14 e5 73 46 | 61 07 3a 7c 00 7f 71 ec 17 17 d4 44 37 36 26 7a | 8c 65 4b 5e 2f d6 31 47 0e b3 55 90 e6 1c cb 77 | 1c 6d 58 27 57 b3 27 ff b6 e1 e9 7d 1b 10 c2 48 | 70 f7 e7 1e 31 56 ab cf ae 38 32 b8 65 81 ac 00 | 4e 9d 3a 6c 2c 1d fb a6 ff a6 c5 15 4a d1 e9 8c | f6 3b 4a 4d e5 6a 3d e0 b2 a1 f4 29 63 27 5f 0f | 08 89 9b 00 9b 1b 1f 8e 12 d3 c4 4f 3e 13 f5 a5 | 9c 44 af 0f 10 29 67 15 0d b9 b4 26 98 5d 9e 81 | d4 78 c2 73 92 2e 97 4c 48 13 99 b5 01 42 7a 4a | aa bb 3e f2 96 18 19 79 ab c3 39 3b ba ba b8 0b | 06 4a 68 91 6a ff 80 ba f0 6f 51 cd 71 94 91 9b | 14 d1 d2 23 7f bc a7 08 5b 2f eb 14 51 51 4a 55 | ca 92 da a2 1f 6e 9a 88 d0 9b 68 b4 59 e4 e6 5b | 29 00 00 24 a5 fe b0 e3 a2 f4 1f f6 10 ff b8 23 | 13 cf c1 54 86 87 d9 95 be 21 30 83 5b ee 54 e5 | 86 f0 89 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 30 e2 49 c0 1b 21 8e cb 56 2f 44 | 75 d2 75 93 97 72 cd 45 00 00 00 1c 00 00 40 05 | ed 4e b6 34 59 cc 9b 96 b2 cc cc ed 70 1c 55 bb | 38 17 6f fc | libevent_free: release ptr-libevent@0x7fb37002eb80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #297 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 41 d2 51 2f 25 d9 71 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #297 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #297 | rejected packet: | e1 41 d2 51 2f 25 d9 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #297: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0525 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a54250 | handling event EVENT_RETRANSMIT for parent state #488 | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #488 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #488 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49684.537211; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501514 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #488 | libevent_malloc: new ptr-libevent@0x7fb37002eb80 size 128 "road-eastnet-nonat-236" #488: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #488) | 37 96 ab d6 53 2a 39 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 6b 02 0e 68 a2 59 8e ba 48 ba 2f 59 6f a7 3c | 62 72 7d 7b ba 57 b5 e0 3c d9 c3 81 1f a5 eb a0 | f8 e0 f8 99 8d 15 bc f0 8d dc 6f 5a dd 58 1a 52 | b1 f2 33 db c0 8e 7c 70 83 0a 45 59 7c 30 22 a6 | 4a 21 8b 6d f6 eb 16 6a d6 89 72 dc 49 39 de 06 | cc 4d b2 f5 ec 39 f7 23 79 4b 87 b1 ad 07 ab b7 | eb 0d d8 4d 26 fb 93 ca cd 4a bf a4 0c 85 96 15 | f6 27 7e a1 82 03 aa 6b de 0f cd 15 f2 d7 a2 0e | 43 09 8a 10 1e 3f 10 cc a0 c3 3f de 84 91 b8 33 | fb 7f 27 17 12 4f 19 a8 95 31 dd 5a ae 2b f7 bf | a0 0e b0 af 11 39 af c9 5f a1 36 16 28 49 42 30 | 1e a5 ef c4 10 5d 29 3a 47 d6 e6 ec dc fa 0d fd | c5 f6 87 7a d9 cf 3f cd c0 47 6b 05 d4 2f 0b e9 | 27 07 f2 3c 1c ec 19 6e 68 a4 e6 aa 11 7d e2 91 | 40 12 52 80 36 b2 87 db 98 ff 4a 69 c8 e6 41 e0 | 2d e0 85 d9 a0 b6 39 d4 ec ac d1 39 5f ba 20 a9 | 29 00 00 24 dc e4 9b d4 65 6a e5 2d e1 02 7e 1d | 58 fd 85 52 51 90 f6 a3 d4 da ed 1b d4 69 62 73 | cc 62 0f e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf c6 06 73 dc 37 37 47 57 31 78 5c | d0 36 ae c0 4d 18 ea 5b 00 00 00 1c 00 00 40 05 | b3 8c 92 9f c3 4a f6 44 a7 cb 92 6c 4a 1a 77 59 | 02 36 0d d7 | libevent_free: release ptr-libevent@0x7fb388022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a54250 | #488 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 96 ab d6 53 2a 39 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #488 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #488 | rejected packet: | 37 96 ab d6 53 2a 39 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #488: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000d120 | handling event EVENT_RETRANSMIT for parent state #407 | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #407 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #407 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49684.560498; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005567 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a54250 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #407 | libevent_malloc: new ptr-libevent@0x7fb388022480 size 128 "road-eastnet-nonat-155" #407: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #407) | 0e f3 59 3b 18 9b 4c 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 5f 7f 81 27 bd f8 4f 84 8b e5 e1 d9 93 de d8 | ec 64 3c 7a c3 34 95 f3 06 ea 96 b5 7a 1b 8f d9 | c8 72 7c 66 d5 b2 ca 73 d5 43 7d ea c5 0c 84 ce | ea c7 b2 0b b4 5d 2c b0 44 4e 93 91 63 38 66 d7 | 19 d5 08 6f 6d f9 84 4a 63 7a 55 68 05 24 95 3e | 99 aa 1e b1 c3 ab 11 18 fa 12 e7 7c 5e c4 8f e2 | 44 28 c7 70 13 76 b9 dd 3a a6 1c 9b 90 d4 8f 73 | 83 e9 82 03 c0 46 28 ea 33 e9 c1 33 69 9b 00 f8 | f6 cd 83 94 cf a0 a7 5e b8 a0 8a 65 44 ef ec 83 | 35 ff 33 b2 45 4f 06 95 40 67 f8 16 c1 7f cb 23 | 42 69 1a ee 3e 5b 22 ed 9d 49 26 08 ce 24 1f dc | 4a 71 86 ce 70 39 9b 18 48 00 7f 0b fd 35 9a e2 | 3f 9a 8e 15 96 bd 41 9e d7 e9 02 79 05 c7 13 f3 | c8 1e 09 29 1f ca 34 e6 f2 7a 3f 24 4a 98 16 47 | 9a 91 43 46 5c 83 b4 00 84 95 4d df 42 56 5f 61 | 36 41 b7 50 c0 98 6b 76 ff 78 86 a6 38 01 7c 10 | 29 00 00 24 21 43 66 be 17 99 40 cd 23 ec 46 61 | 66 3c a9 d5 4d dd 70 3a b4 cd a8 e6 b6 42 a4 c0 | 0c aa c9 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 43 3c a2 b5 33 c4 3b e7 27 68 b0 | 1d 1f b8 cf bc 05 b9 a9 00 00 00 1c 00 00 40 05 | 76 06 02 ba 2b 08 ee 9d 42 ab b0 60 2b 0a e2 b7 | a2 85 77 a0 | libevent_free: release ptr-libevent@0x7fb36001fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000d120 | #407 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e f3 59 3b 18 9b 4c 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #407 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #407 | rejected packet: | 0e f3 59 3b 18 9b 4c 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #407: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0682 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #457 | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #457 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #457 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49684.566859; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00517 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #457 | libevent_malloc: new ptr-libevent@0x7fb36001fd50 size 128 "road-eastnet-nonat-205" #457: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #457) | 3d e3 b8 80 8f bd c5 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 7a cc 82 1e 2d 53 a5 ce 9e 27 c2 26 66 c5 e9 | ca b7 3b d7 b3 d5 8f c0 1e ac 61 93 25 30 44 75 | 16 7f 86 32 17 98 9b b2 bd a4 40 62 a6 0f f6 2b | b1 e8 33 29 3f 84 59 09 aa bb 5e 2f cd e9 1a 72 | c5 38 7c e2 59 e4 bc cf cc fa da 23 96 75 c1 c7 | ad fb a2 86 e8 bf a6 3f 1e fe 2b 41 b8 4f 8a 8f | fc 26 0a 24 5a dd 02 29 13 7a b7 2d e7 62 32 f3 | 6a 17 ae ce 85 51 34 8a 1c 60 c5 a3 0d 63 33 17 | b8 03 02 91 41 6c de d7 2a b4 05 f1 63 80 c5 fa | a4 93 75 6c e4 d1 6b 22 4b c0 ed 28 67 a9 70 75 | f9 13 92 e4 11 7c 99 29 38 c0 6b 83 36 d2 38 17 | 99 86 23 65 2a c3 af 64 bb 12 ca 10 15 c7 5a 01 | e6 2f f0 2b 77 e0 ac b3 ec 7b 00 6e 19 4c 17 4e | c2 c8 73 f2 63 d0 16 98 d3 38 a7 f8 87 36 2b 60 | fd b1 1f f7 a9 42 1c 9e d6 33 ef 51 73 04 4f 2e | c1 59 d4 cb eb 88 5a 87 9b 61 94 46 2e b3 5e 3c | 29 00 00 24 bf 42 01 47 80 24 bc 54 c5 78 43 68 | 88 cb 29 3a 9a 04 f3 2d 0c c7 ac f0 bd ad b4 35 | ec c6 0a 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 d2 27 5a 8f 21 c7 36 56 bd fb 12 | 29 e7 69 7f 19 4f 04 f7 00 00 00 1c 00 00 40 05 | 06 c5 63 f1 7d e9 6e 2f 88 1f 75 73 67 c0 d5 c5 | dc d6 be 87 | libevent_free: release ptr-libevent@0x7fb36403f0c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | #457 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d e3 b8 80 8f bd c5 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #457 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #457 | rejected packet: | 3d e3 b8 80 8f bd c5 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #457: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.067 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6e010 | handling event EVENT_RETRANSMIT for parent state #485 | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #485 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #485 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49684.590241; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00248 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #485 | libevent_malloc: new ptr-libevent@0x7fb36403f0c0 size 128 "road-eastnet-nonat-233" #485: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #485) | 26 20 85 62 4e 58 16 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 04 a6 43 51 7a 0a e3 68 c7 b6 92 c0 2e 14 67 | a2 f2 cb 51 e5 ce 35 16 88 d3 54 6d 62 23 37 bb | 56 61 2f d6 85 87 83 0f 70 f6 72 39 7f a7 0c c7 | 1e 70 d8 7f 4c 38 fa 53 49 29 41 95 c4 be f2 60 | 8b f1 ad 4f de df 26 c9 05 54 42 92 f1 01 24 5d | 5f 31 21 56 71 00 1c 4f 7f 83 41 cc a7 f5 8b 27 | 25 fc 78 92 10 e8 44 60 1c 59 0a 5b 0b c5 c2 c7 | 8a b4 bc 89 2b d6 59 5c 8c 78 a1 23 dc b0 6c 50 | 12 f1 b3 89 73 06 41 12 b7 a8 52 30 67 21 d0 5c | a9 0e cd 21 2b 24 e0 cb a7 f2 11 99 34 b7 dd 82 | a8 b2 9f 4a 0e 72 6d 9e a6 39 41 fd 0a 77 de bc | 1d a1 ee ad 3a 47 74 75 05 d6 38 42 86 69 10 70 | a8 ff d8 3e 12 b1 c4 88 03 52 77 9f cb 91 9d 87 | ca f5 79 a8 95 63 5f 4e a8 1e 43 7f 48 49 97 d5 | 03 8a 20 ac 28 9d 5a 1c 08 20 6e 33 63 3c ac 79 | a6 2e 32 53 fd 1d bb 3c 94 09 f3 ea 45 51 42 83 | 29 00 00 24 3d d6 d9 80 a2 0e 12 b1 24 d9 6e f6 | 52 8a 26 6d ef 88 17 44 c3 1d 79 ed f7 7c 90 92 | c7 d9 57 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dc 14 52 a7 e7 6d fa 0b e3 0e 97 be | 5d 15 66 8b 43 e6 a9 e4 00 00 00 1c 00 00 40 05 | 6d 80 f6 1e bc 0d ea 94 d1 d1 d0 f0 fd 2d 1e 46 | 86 63 b8 47 | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6e010 | #485 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 20 85 62 4e 58 16 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #485 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #485 | rejected packet: | 26 20 85 62 4e 58 16 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #485: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344012bf0 | handling event EVENT_RETRANSMIT for parent state #298 | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #298 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #298 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49684.602621; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004989 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6e010 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #298 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 "road-eastnet-nonat-46" #298: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #298) | d5 0c ec bc d3 64 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 43 96 23 e5 3a d0 2d 36 cd 43 2d 58 c4 e0 92 a1 | ed 2d e1 4c 45 8b 42 ad 40 76 ab 67 60 92 c4 09 | 73 c4 c7 3c 9d 80 31 b9 bf b9 9e 64 35 e4 39 ba | 2f a8 59 fe 53 09 d8 e0 e9 88 59 30 e2 71 e6 be | 2d 69 bc 6a a7 6e 4f db 2a 6a 88 01 9f d2 1a 54 | 9b 70 8c b4 c5 37 d0 1b eb c3 58 21 ce 79 a3 ff | 4e 1b 84 aa 1e 08 dd 9d 9d 58 7a ba b0 dd 2d 38 | 9e da 29 29 b5 fb 28 78 05 fa 3a 26 c0 d3 4c cf | 22 22 af c7 f1 d8 11 18 01 e3 41 10 fc 1b c9 38 | 58 6b be 13 fa e2 38 5b 8d 00 15 50 84 fd a8 e0 | 20 22 31 ab 99 61 d4 85 a8 6c 2e d8 1f e4 26 c0 | 25 17 38 c7 a5 82 30 0d e2 85 f0 d0 e0 3a 59 87 | 67 7b 0d e4 52 7b 6c 35 93 c6 f4 61 2c 32 e9 62 | b8 57 d1 59 0b 7c af 14 d1 9d bb 91 61 85 75 09 | ed c6 43 19 bf 09 f8 e4 92 e6 1f f3 47 e1 6e 0a | 5a 69 40 30 db b0 00 24 c2 61 94 a9 30 49 e7 0e | 29 00 00 24 4c 0e e1 06 42 9e 4c 74 3b 65 ba d4 | bc 56 1a 69 be b4 c7 ec 29 68 0f 7e 31 97 81 70 | 75 a5 f0 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 96 a5 ca 09 14 9d 81 34 51 5c 38 | 06 b0 7e 03 d4 af 12 47 00 00 00 1c 00 00 40 05 | 1b 14 fa aa 2e 1c b4 a7 92 80 67 79 37 9e 5c 02 | 1f 84 46 7d | libevent_free: release ptr-libevent@0x7fb34401a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344012bf0 | #298 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 0c ec bc d3 64 84 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #298 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #298 | rejected packet: | d5 0c ec bc d3 64 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #298: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c01fda0 | handling event EVENT_RETRANSMIT for parent state #476 | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #476 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #476 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49684.62392; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001702 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #476 | libevent_malloc: new ptr-libevent@0x7fb34401a4e0 size 128 "road-eastnet-nonat-224" #476: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #476) | 49 8c 7a 08 2e cc 2c 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 8e 65 66 a1 7b b1 8a 9d 19 04 71 0a 79 27 ce | 6b 54 47 32 ba 6e a8 65 c3 0d 42 b2 0f 96 a2 a0 | 61 e2 94 05 83 68 df 22 7a 41 44 d2 4f e1 67 a1 | 60 b4 59 da 81 10 89 57 9a 5f 7b e1 cb f8 3b 1c | 6b e5 1e 2a 7e 02 80 cb 9a b1 16 8c f4 74 52 c7 | 1b 8b b0 44 c6 c4 32 f3 a4 5d f0 73 3e b1 fa a1 | b2 71 e4 e2 5a 6e 52 66 e3 b8 09 2b 71 a1 10 d1 | 10 3c 31 b6 a5 93 a0 0f f1 c2 e3 a3 6b 1d 4a 8c | d0 ba 9f ac 0a e4 67 88 a7 bb ab 52 59 75 2a f3 | 7e 3d 81 45 67 16 9e 61 0a ee 09 44 27 d0 34 eb | a1 e6 bf 3e 15 23 17 f4 a9 f6 b0 c4 cb fa e4 c1 | c5 79 db 37 a8 57 54 eb d1 68 1c ef 18 56 41 83 | e2 52 4d 7d eb e3 4a db 5d d0 82 39 0c 54 56 aa | 04 9a 1e d5 4b e1 50 f6 49 eb 07 2f b8 68 4b 6e | ca 4e 01 63 ab c2 da 21 fb e2 14 e9 0d 0e ff 26 | 78 8b ff 8b 3a 63 7f c4 a4 eb a1 d4 bb 4b 60 67 | 29 00 00 24 04 bd 81 be 7c f6 28 8b 7d 46 a5 cd | 03 dc d6 e4 08 bf 60 ad d1 ef ac 3f a3 21 88 37 | 52 bb 5d 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 ab 9f 05 ae 62 3b 7f e7 ce 4f 13 | 2e 4b 82 3c e1 44 b7 89 00 00 00 1c 00 00 40 05 | f1 c5 d9 81 d6 d6 94 d2 dd 0e e2 5d 61 59 c7 43 | 61 40 b6 b1 | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c01fda0 | #476 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ac3ec0 | handling event EVENT_RETRANSMIT for parent state #408 | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #408 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #408 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49684.624064; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005403 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c01fda0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #408 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 "road-eastnet-nonat-156" #408: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #408) | 34 97 74 26 6a e5 a4 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 b4 84 d1 c7 68 61 a7 a8 43 5d 75 52 c1 45 ab | 1c 34 c9 1c fb 58 62 3f d2 e4 63 2f df 8e 65 23 | b3 d6 a9 03 c7 71 70 03 ff 1d bb ac 17 a8 6b 6d | e6 be 80 ad c9 77 c7 17 6a 89 49 48 8d b3 43 d4 | 49 ba db 2f fb d6 1b 93 5a 1f a3 ce 04 89 6c 2c | cc 68 c0 e5 12 10 fe eb 35 b6 6c ba a1 43 99 e7 | 4d 42 5d cb 3f a9 dd f3 e4 5f 32 df 76 2b 7a ba | 94 68 cc b7 71 6f 68 e6 66 e9 1a 0b ff e7 f5 9d | 06 aa 01 3c 32 ad d4 f8 5e 61 a5 fe 63 fb f1 96 | b8 0a 85 b5 ad 42 f9 e3 5a cf 27 5e ec 13 9b d0 | 73 b5 31 d4 d2 24 51 4d f5 0b 85 9e 11 85 42 e0 | 88 fc 0a 42 f4 e7 3d 49 ba 53 8a d7 ce 64 df d3 | 52 60 3d 1b 37 34 8f 8c 6a 9e 6e 25 b4 f3 7c 18 | 7a d1 56 c7 cf 72 57 08 b3 73 0c ad 15 18 33 ce | 9c f7 e6 b3 e4 26 15 89 8c 70 86 37 d6 87 03 97 | 84 4a 45 be 3f 69 21 05 76 54 73 82 39 32 70 e8 | 29 00 00 24 59 44 9e 7a bb 43 7f 93 5b bd e5 23 | c1 87 73 73 05 59 35 01 ab d3 f0 0b c4 05 69 18 | 98 63 3b b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 8e f2 86 2b ac 70 a5 cc 8b e7 7d | ac ad 47 30 21 b0 b0 7f 00 00 00 1c 00 00 40 05 | 79 17 f0 70 ea 4a c6 21 3a b7 c0 97 d4 68 33 32 | 9c c8 09 b0 | libevent_free: release ptr-libevent@0x7fb384027b30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | #408 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 8c 7a 08 2e cc 2c 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #476 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #476 | rejected packet: | 49 8c 7a 08 2e cc 2c 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #476: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 97 74 26 6a e5 a4 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #408 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #408 | rejected packet: | 34 97 74 26 6a e5 a4 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #408: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0357 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d590 | handling event EVENT_RETRANSMIT for parent state #489 | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #489 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #489 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49684.654379; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499854 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #489 | libevent_malloc: new ptr-libevent@0x7fb384027b30 size 128 "road-eastnet-nonat-237" #489: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #489) | 74 5a 3a 8b 71 1a cc fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 40 61 fd 1b 72 e8 67 07 d1 75 c8 79 f6 15 bf | 67 b1 a9 f3 47 1b 5a 9e 7a 16 95 64 09 96 72 95 | 1f e3 f8 5f 52 87 20 fb 61 9b db 76 dc 1e b3 ce | 79 87 62 5c 6c ce 2b 50 8b 94 05 b2 fd 25 84 04 | b4 15 bc 02 70 ed e7 01 0e 47 78 fa 99 0f 24 d8 | 6d 25 42 58 57 e1 37 d4 81 eb 71 fc 2c 93 fa a4 | c7 e3 ed 35 8a 44 47 43 96 45 a6 cd a3 83 61 0f | 10 8b 91 8a 9e 26 b5 05 80 74 cc cf bd 96 a9 68 | ec 71 d7 24 8f 0e c4 37 01 d3 fc 0e 4b 59 1a e8 | 44 25 f9 54 85 60 35 f6 be ce 52 66 75 73 a9 9b | 5c c3 e1 cf 01 12 70 63 56 6d a7 e8 18 d9 6b 45 | de 75 11 c2 b6 ad 37 d5 3d 52 a7 75 84 78 8c 7f | 86 51 7e 50 9f 10 72 bd c2 69 ef b3 ad 19 2b a0 | 12 77 de 7a 6b 6d 21 bf fd 3d 7b 00 2f 59 e3 b9 | d0 af c2 b1 28 3c da ec de 08 be a1 d1 4e 94 57 | 47 99 d9 10 35 e0 60 cf 3d 10 4e cb 1b b3 b4 f7 | 29 00 00 24 40 6d 68 58 c0 2a c7 cb 28 ac 6f c2 | e6 6e 2c b5 98 00 fd fe 6e 20 dd ca 12 44 3b 53 | ff 69 1e f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 46 ab 03 11 7d bc a6 76 5d 5e 81 | f5 21 84 26 13 ce 73 a7 00 00 00 1c 00 00 40 05 | f1 f1 80 9f 1b 76 8c da 90 0c 48 79 e2 c4 ce d3 | 45 3b 5d 95 | libevent_free: release ptr-libevent@0x7fb3480180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d590 | #489 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 5a 3a 8b 71 1a cc fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #489 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #489 | rejected packet: | 74 5a 3a 8b 71 1a cc fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #489: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #242 | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #242 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #242 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49684.656663; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.014225 exceeds limit? YES "road-eastnet-nonat-242" #242: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-242" #242: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #494 at 0x557d46b1cf00 | State DB: adding IKEv2 state #494 in UNDEFINED | pstats #494 ikev2.ike started | Message ID: init #494: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #494: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #494; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-242" #494: initiating v2 parent SA to replace #242 | using existing local IKE proposals for connection road-eastnet-nonat-242 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 494 for state #494 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4d590 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #494 | libevent_malloc: new ptr-libevent@0x7fb3480180b0 size 128 | #494 spent 0.0724 milliseconds in ikev2_parent_outI1() | RESET processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #242 ikev2.ike failed too-many-retransmits | pstats #242 ikev2.ike deleted too-many-retransmits | #242 spent 2.6 milliseconds in total | [RE]START processing: state #242 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-242" #242: deleting state (STATE_PARENT_I1) aged 64.016s and NOT sending notification | parent state #242: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #242 "road-eastnet-nonat-242" #242: deleting IKE SA for connection 'road-eastnet-nonat-242' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-242' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-242 | State DB: deleting IKEv2 state #242 in PARENT_I1 | parent state #242: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 17 resuming | crypto helper 17 starting work-order 494 for state #494 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 494 | stop processing: state #242 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | in statetime_stop() and could not find #242 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-242 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-242" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-242' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-242" | stop processing: connection "road-eastnet-nonat-242" (in initiate_a_connection() at initiate.c:349) | spent 0.0573 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 494 time elapsed 0.000548 seconds | (#494) spent 0.552 milliseconds in crypto helper computing work-order 494: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 494 for state #494 to event queue | scheduling resume sending helper answer for #494 | libevent_malloc: new ptr-libevent@0x7fb35003f4e0 size 128 | crypto helper 17 waiting (nothing to do) | processing resume sending helper answer for #494 | start processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 494 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #494 | **emit ISAKMP Message: | initiator cookie: | 13 d2 ce 8c c5 a0 08 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-242 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8c 2c 3b c1 c9 27 85 62 17 d7 83 f4 4b 2e 0e 16 | ikev2 g^x e2 03 04 ad 7a 8d 40 02 d4 34 9d 1b d3 c9 18 6b | ikev2 g^x 41 26 bf 10 de e3 e0 e1 0e ef 27 5f e0 e8 78 57 | ikev2 g^x b0 c9 a6 38 de ce 8a 7c 37 31 11 56 7d 62 bb 8e | ikev2 g^x c9 f9 f5 6c 82 0f ba cd 3f af 70 4e 17 32 64 c9 | ikev2 g^x d5 e6 2c 41 27 6e 25 48 eb 43 50 ea a4 34 26 c4 | ikev2 g^x 56 d9 54 ab 57 40 f6 c1 9c 20 1b 06 22 84 03 8b | ikev2 g^x e5 53 55 fa 3d 80 8b 5b c2 25 82 15 35 94 6c d0 | ikev2 g^x bb ec ab 60 22 1d 87 23 e3 9e ac fc 16 ce 42 3f | ikev2 g^x ba 0d 8d 04 b9 e7 b2 de 46 3e 4b b3 83 4d ca 89 | ikev2 g^x e2 a0 d6 38 51 9a 05 e2 dc 57 8c 52 b9 1a fa 47 | ikev2 g^x 7e 1e 80 51 ac cf 77 c1 e4 be 78 0f 3d a1 ce 56 | ikev2 g^x 23 61 ff 3d 67 82 ef a5 20 d8 a8 62 8a 37 d6 a0 | ikev2 g^x 87 df 7e 30 b4 77 c6 c9 19 64 23 a5 4f 30 28 ac | ikev2 g^x 43 56 89 18 4a 88 a5 5e d6 97 45 97 2d bb 34 28 | ikev2 g^x 33 0f 79 c6 b2 6c 6b 62 1d d3 42 70 92 9f 6e 55 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 86 c8 ae 9a dc 82 47 ae 63 a3 d2 9c fc 56 5a fd | IKEv2 nonce b5 a1 94 8d 79 cd 12 87 5b f8 39 1c 72 7a 80 86 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 13 d2 ce 8c c5 a0 08 6f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f2 | natd_hash: port= 01 f4 | natd_hash: hash= 31 4f 14 68 3f 9f 2d 22 c7 c5 d4 82 fb 7c 5e ae | natd_hash: hash= ba 6a 24 66 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 31 4f 14 68 3f 9f 2d 22 c7 c5 d4 82 fb 7c 5e ae | Notify data ba 6a 24 66 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 13 d2 ce 8c c5 a0 08 6f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= bc 9f 5c d1 bc 22 73 c4 89 e4 5f 13 b2 ba 1c 19 | natd_hash: hash= 38 03 1c b3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bc 9f 5c d1 bc 22 73 c4 89 e4 5f 13 b2 ba 1c 19 | Notify data 38 03 1c b3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #494 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #494: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #494 to 4294967295 after switching state | Message ID: IKE #494 skipping update_recv as MD is fake | Message ID: sent #494 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-242" #494: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.242:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #494) | 13 d2 ce 8c c5 a0 08 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 2c 3b c1 c9 27 85 62 17 d7 83 f4 4b 2e 0e 16 | e2 03 04 ad 7a 8d 40 02 d4 34 9d 1b d3 c9 18 6b | 41 26 bf 10 de e3 e0 e1 0e ef 27 5f e0 e8 78 57 | b0 c9 a6 38 de ce 8a 7c 37 31 11 56 7d 62 bb 8e | c9 f9 f5 6c 82 0f ba cd 3f af 70 4e 17 32 64 c9 | d5 e6 2c 41 27 6e 25 48 eb 43 50 ea a4 34 26 c4 | 56 d9 54 ab 57 40 f6 c1 9c 20 1b 06 22 84 03 8b | e5 53 55 fa 3d 80 8b 5b c2 25 82 15 35 94 6c d0 | bb ec ab 60 22 1d 87 23 e3 9e ac fc 16 ce 42 3f | ba 0d 8d 04 b9 e7 b2 de 46 3e 4b b3 83 4d ca 89 | e2 a0 d6 38 51 9a 05 e2 dc 57 8c 52 b9 1a fa 47 | 7e 1e 80 51 ac cf 77 c1 e4 be 78 0f 3d a1 ce 56 | 23 61 ff 3d 67 82 ef a5 20 d8 a8 62 8a 37 d6 a0 | 87 df 7e 30 b4 77 c6 c9 19 64 23 a5 4f 30 28 ac | 43 56 89 18 4a 88 a5 5e d6 97 45 97 2d bb 34 28 | 33 0f 79 c6 b2 6c 6b 62 1d d3 42 70 92 9f 6e 55 | 29 00 00 24 86 c8 ae 9a dc 82 47 ae 63 a3 d2 9c | fc 56 5a fd b5 a1 94 8d 79 cd 12 87 5b f8 39 1c | 72 7a 80 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 4f 14 68 3f 9f 2d 22 c7 c5 d4 82 | fb 7c 5e ae ba 6a 24 66 00 00 00 1c 00 00 40 05 | bc 9f 5c d1 bc 22 73 c4 89 e4 5f 13 b2 ba 1c 19 | 38 03 1c b3 | state #494 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3480180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4d590 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #494 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 | #494 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49684.65774 | resume sending helper answer for #494 suppresed complete_v2_state_transition() and stole MD | #494 spent 0.324 milliseconds in resume sending helper answer | stop processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35003f4e0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 13 d2 ce 8c c5 a0 08 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #494 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #494 | rejected packet: | 13 d2 ce 8c c5 a0 08 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #494: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #458 | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #458 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #458 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49684.662895; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004185 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35002a9a0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #458 | libevent_malloc: new ptr-libevent@0x7fb35003f4e0 size 128 "road-eastnet-nonat-206" #458: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #458) | d8 20 9c 76 6a 13 05 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 f8 70 4a 7e 5c d3 77 41 08 04 2a 79 b8 78 55 | 9f 63 d7 1f d9 bd 04 73 e8 de 1f e6 51 71 d1 c1 | 71 09 97 4a 5c 16 68 a0 aa 69 e9 b4 93 ac ba f6 | 92 85 87 a8 c8 1f 88 3f 36 bb 45 8a 62 53 f9 71 | 32 e3 0c 69 bc 64 74 29 df 76 29 f7 54 0a d6 9e | bf f9 de ca 92 41 8b 95 09 7a 0d 5d 50 17 4e 54 | 40 99 d8 f9 ca e7 ca c6 0c af 31 22 59 39 c6 0f | c7 31 f1 5e c9 b0 5a 0c c9 3f c9 f9 d7 bd 4f d2 | fd 98 c7 19 a0 f3 e9 01 16 f3 fe 75 35 59 15 08 | 13 ea cd 50 33 e8 15 ab 01 f5 9e c1 43 d2 27 90 | 39 d5 e2 89 77 57 ec 66 ab 2d 6c 09 fc 1d 8f 1a | 62 91 d6 59 58 86 af 9e fa f2 4d 80 b6 39 ef 93 | e4 aa 9e 6f 49 aa 2c d4 54 59 f2 01 66 25 3e 6c | 9e 0b 06 28 b9 af 2e bd e7 a4 57 6f f0 5b 4c cd | 6a 03 04 af 85 10 e3 f2 17 ad 37 f3 24 3e 66 fb | 27 c7 a1 c5 2e 32 66 c3 94 bc a6 2b 60 cb 4f f9 | 29 00 00 24 33 eb be f2 9e 94 9d 08 4c d8 00 c2 | f8 2c a4 ef 00 e3 f7 7a 62 72 9a 99 65 d6 f3 0e | ff c8 b6 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 01 77 97 bc 56 25 23 ed d6 15 51 | 7d a3 3f e8 c0 74 6b cf 00 00 00 1c 00 00 40 05 | 8f 1b 57 d9 1a 63 f1 b3 99 7b 22 3d 44 e6 21 51 | 1c 41 cc 24 | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #458 spent 0.0974 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 20 9c 76 6a 13 05 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #458 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #458 | rejected packet: | d8 20 9c 76 6a 13 05 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #458: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8ee40 | handling event EVENT_RETRANSMIT for parent state #299 | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #299 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #299 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49684.671175; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004769 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #299 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 "road-eastnet-nonat-47" #299: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #299) | 63 02 bb 51 d9 8c b0 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 17 e8 1c e0 c7 4f 03 2d a7 55 c0 45 bf a2 96 | 6a 0c 0e 0f 3f cb a5 f2 68 03 39 51 c2 b3 0b 30 | 79 44 b0 72 39 7b b4 0b c0 9d 43 f1 cf 9c ab 76 | 17 9c 76 41 f4 97 6b 3d 79 c7 93 3a b0 36 40 75 | 1d 60 59 8c 82 e2 c7 85 c2 1c 97 4a 38 8b 6e ad | 3e 5a 0d 04 9e 51 30 61 82 af ed 37 96 e2 b6 a0 | 3b c4 41 66 ee 44 1e e7 39 9f 7c 2f f5 f2 ff 4b | 36 a8 c8 29 8b eb d2 55 7f fb 10 9c ec 8c 08 d0 | 39 05 1c 07 ac 20 cb cb a4 7c 61 41 78 60 13 d3 | dd a5 39 38 ad f1 86 ff 6a 3c d0 2d b1 eb 7c 82 | 79 91 1f 2f 55 9c db 4d e2 10 be 62 dd e3 5a 7a | 61 63 85 0c fd 8f b4 af 97 73 ef e2 1b 21 c4 96 | e5 df 1b 56 fa 11 08 d6 95 8d 53 f4 13 64 3d 3d | 98 8c 38 c7 52 64 1a 00 95 89 f1 a3 72 e2 fe 87 | 05 b1 bc 3a 2d 8d ca c2 67 8a 86 e8 36 ce a6 73 | 08 10 ff 3d c7 41 a4 c0 53 af 83 9f b4 ac d3 a6 | 29 00 00 24 7e 5d f1 77 88 98 7f 63 50 07 d0 59 | cc bb c0 62 cd 9c cc f3 5d 35 d8 78 d2 ee b4 01 | aa b2 27 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 b5 ac f1 52 82 e1 6d 65 51 7c e0 | ef a0 91 c6 07 cf fb 64 00 00 00 1c 00 00 40 05 | 8f da 92 7d 7b 47 83 cb 10 aa f2 ca 2c a8 73 ac | 13 99 82 ed | libevent_free: release ptr-libevent@0x7fb36c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee40 | #299 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 02 bb 51 d9 8c b0 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #299 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #299 | rejected packet: | 63 02 bb 51 d9 8c b0 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #299: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd40 | handling event EVENT_RETRANSMIT for parent state #409 | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #409 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #409 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49684.694449; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003534 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee40 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #409 | libevent_malloc: new ptr-libevent@0x7fb36c0251c0 size 128 "road-eastnet-nonat-157" #409: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #409) | 0d 5e 25 c2 55 3c 99 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e 9e 5e 2e 09 bf 8f 71 99 55 8d fe 7f 83 64 1f | 09 d9 64 f5 c9 93 8a 5c be 46 9e 22 f6 15 48 5f | a3 27 82 be 44 32 8b ed 4e a8 f7 10 74 01 31 7a | a5 a7 4a e9 16 68 9c 40 cb 7b 6b e4 87 2e b5 7d | 61 20 08 88 29 08 bb bf f5 22 fa fd 47 2b fd 61 | a5 c3 48 69 18 1a 27 78 c3 f3 e3 0b 62 b4 52 0b | 48 72 ce 1d 37 3b 34 c5 fc ba cb 1f 9d e8 de ad | 9b ab 2c 3a d9 69 c6 42 6d b1 05 5a c4 77 34 d1 | ff 6d 2c 38 8e 1f 9c 0a 39 45 f9 c1 2e 9a c1 dd | d2 58 ca fc 7a d1 3f 4c 26 24 eb 54 5d 92 fb 39 | 47 60 ec 18 66 63 9c 19 12 10 f2 b6 7c 18 85 c7 | 6c d1 5b c2 e0 13 21 58 85 48 a4 fc 6e b1 46 84 | 53 a9 5a 65 21 91 66 41 1c 5e ad 4e a2 85 5a 4b | dd 4b fe 45 dc c9 fe ab c9 08 d4 96 88 93 93 aa | 1e 95 b1 87 3d 21 a8 b6 2f fd 18 ff 13 73 04 e2 | 11 aa e4 99 8f 8e f6 da 34 f7 b8 a6 55 2e b3 22 | 29 00 00 24 56 91 a2 13 7d 33 fd 14 52 dc d7 9d | 97 62 ec aa 5a ba e0 81 38 20 1d 66 12 9f da fa | a6 b6 f9 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d7 a6 1d 1c 1e 3f 9a df 29 5a 62 1d | 4b b6 a0 46 97 db 0a 03 00 00 00 1c 00 00 40 05 | b4 37 78 a6 35 8d da 4f 96 64 40 e6 05 68 b6 9e | 6d 2b 7a a6 | libevent_free: release ptr-libevent@0x7fb364014bc0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd40 | #409 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 5e 25 c2 55 3c 99 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #409 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #409 | rejected packet: | 0d 5e 25 c2 55 3c 99 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #409: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #486 | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #486 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #486 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49684.732807; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002147 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd40 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #486 | libevent_malloc: new ptr-libevent@0x7fb364014bc0 size 128 "road-eastnet-nonat-234" #486: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #486) | 87 db e2 36 7c f0 df 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 90 89 1b 08 ac ff df cf 1e a7 4d 7b bd 33 5b | 51 13 dd 15 4f 57 c0 96 90 46 35 66 7c 24 f4 e0 | 0c 27 ca 38 87 f2 ca ce 3e d5 b4 13 12 b8 2b 1b | 28 cd b5 9c 97 fa 99 ff ca 60 2f 08 57 c7 43 0b | 9a 34 8d 0f cc d3 42 7d 8a 9b 18 49 af 87 e5 0e | 60 54 d2 dd 0f 77 79 0a d2 62 1d 4b f7 af 36 a6 | 89 10 0e 96 5f f8 fd fd c0 0b 1a 57 52 e4 05 54 | 7c e7 03 a6 04 47 19 3c 81 63 a0 84 35 98 42 90 | 1a 22 7e c6 ee 29 1f d0 fe 05 cc 68 66 1b 8e f3 | 6e 04 59 7b 5f 87 c4 be fb a5 8a bf 90 3d eb 9a | 35 8c 2c 40 b3 8e 63 fe 5a 3c 42 89 30 d7 70 57 | 1f 4d 37 52 6b 1c 17 6b 78 dd b4 c8 f7 a3 15 58 | d1 aa 66 b9 5e c1 c5 d0 ba 3b 05 d7 77 a7 0a 2d | c3 f0 02 14 1d 1a a8 4d cb aa 4c 7b 62 3a 6a ee | 7e 4e 1c cb d8 20 d4 75 37 c5 87 d5 04 ca 68 48 | 13 39 48 6c 64 d9 b7 94 e9 df 23 f3 33 69 d8 cb | 29 00 00 24 46 3f 4a dc 6e 3d 21 da c5 52 80 db | 79 4b 94 5f 60 de b7 f2 05 82 ab f1 57 25 79 09 | be 52 68 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e eb dd 20 f6 4f aa b4 b9 d1 56 e6 | 84 4d e7 2c 87 e1 c1 3c 00 00 00 1c 00 00 40 05 | df ec c7 42 be d0 10 8f c9 07 5b a9 94 d2 5a 2d | 6d 05 27 19 | libevent_free: release ptr-libevent@0x7fb33803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #486 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 db e2 36 7c f0 df 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #486 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #486 | rejected packet: | 87 db e2 36 7c f0 df 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #486: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0444 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a52c90 | handling event EVENT_RETRANSMIT for parent state #490 | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #490 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #490 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49684.735094; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50166 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #490 | libevent_malloc: new ptr-libevent@0x7fb33803b0b0 size 128 "road-eastnet-nonat-238" #490: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #490) | bb 0e 3a 9b 64 67 83 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 47 7f 34 75 b5 49 50 79 df a4 4b 2a 1a ce 17 | 54 1a db ef 07 cc bd 63 ec 5f fd 57 bc 8e fa 30 | c9 95 d1 71 e6 7c fd 77 3c fd c2 3d 71 c3 96 28 | a3 d1 35 26 0a 70 d5 c3 3a fb 74 58 46 86 23 a0 | 05 3c 91 b9 ac 6a ea c1 25 7b 4a 3f a3 25 55 72 | 1a fa 68 62 a6 28 8d 23 b1 87 6f cc f5 37 d0 47 | fc 41 f4 96 78 ec ba 03 b7 d0 87 4f ed d1 99 e0 | 0d e4 2b f5 2e 28 88 3d fd a9 fe 89 6e 87 86 2a | bc 0f d8 0e c6 4a 2c e3 b3 3a a6 4b 56 b2 d1 a7 | b4 82 a8 63 ca 63 fb 28 a9 ae 19 5e d9 12 c8 ba | 95 37 7e 44 d0 19 50 2e 50 85 6d 62 52 72 3d eb | 4d f4 88 bd 4f 23 95 01 f5 e8 4f 41 c1 7a e2 e9 | 09 7e 97 ea 1c b6 21 cd 07 3c 59 f2 8d ef a7 3b | 3d d1 60 37 5e c3 67 ad 3c a4 b3 33 59 93 de 51 | 98 2d 6e b0 f8 67 26 97 7f 16 7a f1 7d 53 b7 ac | 55 64 4e 4e 20 10 14 93 a4 62 e7 45 6c 22 9f d2 | 29 00 00 24 e1 87 09 5e 30 4d 93 58 a8 7b ef c0 | df 86 01 db 2f ae 90 07 26 59 14 f1 71 ed 65 8b | e5 42 58 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e a7 de 07 e1 64 83 30 46 b8 16 83 | 02 93 de dc 12 4e 03 eb 00 00 00 1c 00 00 40 05 | 41 30 1b e3 e2 bc 6c 0f ca fc a1 2e 9d 87 bf 76 | 3a b7 29 61 | libevent_free: release ptr-libevent@0x7fb38803dab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a52c90 | #490 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 0e 3a 9b 64 67 83 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #490 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #490 | rejected packet: | bb 0e 3a 9b 64 67 83 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #490: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3600129a0 | handling event EVENT_RETRANSMIT for parent state #300 | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #300 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #300 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49684.748407; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004313 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a52c90 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #300 | libevent_malloc: new ptr-libevent@0x7fb38803dab0 size 128 "road-eastnet-nonat-48" #300: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #300) | 5a 7e ff 7d 11 39 dd fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 d7 07 3e b9 b2 ed 0a cc c5 e4 47 ac fb df bc | 0b 82 8a 56 1b e7 c2 b9 79 67 f6 05 c1 b0 1a 41 | e0 93 9f 0d bb 5b 76 5f ac 5e ea 5e 58 49 c4 c3 | 9b f8 0e 2d 48 75 fe 88 ae 81 6e bd fc ad 1e 40 | 65 b9 12 2a 8f 3a b5 a4 e3 d6 7e 50 9a b3 12 10 | be 2b 79 8f 29 34 8f 0b 99 4e 4e 7a 4b 49 42 b4 | 04 b2 ac fc ac a3 5a 98 37 17 c3 a2 f0 f0 c9 79 | df 28 17 de 36 02 c0 b4 1b f3 2c 9d ad d8 f6 f4 | c9 44 36 2c 9a 21 d9 68 8c 86 58 41 ae 59 e7 74 | 88 a3 d3 f6 a3 ef 04 07 90 c9 82 f0 a7 49 d9 a4 | 83 0f b0 90 08 f3 eb 02 f4 ec 40 8a 98 92 d5 38 | 7d db 73 c5 6a 66 84 84 0b 3e ba 92 37 b8 31 bd | 61 f6 57 d8 cd fd ab d5 b0 51 b6 0b 3f 5e a3 a5 | 0b 5e 9e c6 f9 0e 39 09 62 b7 fe 88 e1 1e 94 68 | 7e ba 69 87 7e ff 7f 13 a8 f4 7a 0a b2 7e 1c 3c | 9c 70 0e 6e a8 6f 4b 28 4f f5 1d ce 10 46 27 eb | 29 00 00 24 db d2 83 de 45 20 a2 89 40 10 d1 ad | 44 17 5c 15 2b 8f 9e 84 0d 1b 42 0f a9 75 90 ef | 32 25 81 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 9c e3 05 f1 a6 88 c9 89 5f 4a 78 | 8b 60 50 45 77 4b 7a a3 00 00 00 1c 00 00 40 05 | 2b d5 a3 e8 51 d4 0b 1b d6 4d 4a ff ba 69 1c 93 | 2c 16 fd 8b | libevent_free: release ptr-libevent@0x7fb3500300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3600129a0 | #300 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 7e ff 7d 11 39 dd fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #300 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #300 | rejected packet: | 5a 7e ff 7d 11 39 dd fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #300: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0672 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a73690 | handling event EVENT_RETRANSMIT for parent state #410 | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #410 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #410 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49684.750749; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003927 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3600129a0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #410 | libevent_malloc: new ptr-libevent@0x7fb3500300e0 size 128 "road-eastnet-nonat-158" #410: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #410) | 59 b5 db 36 67 47 70 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 b7 0b 8c f9 95 bc f7 80 78 70 36 f3 fd f2 85 | 36 5b 98 b3 da 7d 8e 19 72 07 91 60 60 8a e6 82 | 67 b3 ba e3 47 c2 28 3a c4 af df a8 61 5d 73 9e | d2 63 4a 41 c1 df 23 58 85 d0 d0 d7 31 64 13 d3 | fc c4 39 95 ba ac 0f ae 94 0f 0a ba f0 76 e9 ae | a0 35 47 51 b9 fa 43 1f 5e 7f a1 99 3d cc 76 ac | 19 ca 51 32 ad cd e2 9d 6b 98 62 47 ad 2c d1 40 | 11 bd ff e1 9d 02 a1 c8 40 a8 ed 91 e5 60 1c 79 | ee 69 bc ed 65 82 b2 85 d5 b1 74 ab f9 fa 7a e9 | f0 dc 57 ef e3 3e 09 b2 80 4a e9 c3 55 5a 97 3e | 39 d4 2d 85 ca cc 9a e5 d4 76 c5 5e 9e c1 e9 7d | 39 17 67 a4 c4 56 99 a0 e7 0c b7 13 22 44 76 46 | 08 b0 60 5a a2 8d 7d 3c 2d 85 7a 7a dd 83 3a 2b | 27 be 2b 38 04 53 2f 3d 0c cd c0 ad bc 4e 6a 91 | 94 3d 91 ac 7d a2 5b fd 39 2e 69 e6 48 9c ae be | 71 e2 83 13 24 ec 5c 04 d1 c5 4a 80 96 3c 2f 11 | 29 00 00 24 e1 88 5c 17 02 b4 80 04 34 b3 a7 d4 | f8 d1 c3 d6 e1 59 82 cb 1f c0 98 16 57 75 53 e7 | ef 70 14 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 ce e5 8e 76 7c ee 72 e4 c9 6c 0a | 7e 11 3d 4e e7 09 5c 04 00 00 00 1c 00 00 40 05 | 2c 17 58 9d 14 87 37 db ad 40 b0 f7 64 73 53 a7 | 0b 3f 01 e6 | libevent_free: release ptr-libevent@0x7fb34403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a73690 | #410 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 59 b5 db 36 67 47 70 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #410 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #410 | rejected packet: | 59 b5 db 36 67 47 70 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #410: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0563 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a97080 | handling event EVENT_RETRANSMIT for parent state #477 | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #477 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #477 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49684.779127; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002711 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a73690 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #477 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 "road-eastnet-nonat-225" #477: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #477) | 3f 73 6c 52 e2 16 12 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 68 39 c4 34 ea c1 cb 39 a9 f7 a9 af 21 c4 2f | 59 10 95 11 49 04 1e 26 c9 8f 50 f5 a4 65 8f b4 | 05 5b e9 56 60 ee a1 83 15 a3 b3 99 a1 69 bb 30 | cc 2b 98 3b 1e 30 46 76 ff 8d 39 41 4c 02 aa c6 | 7d 2f 3c 38 bb 54 54 f3 fb 6c ca 8e 5a 70 15 52 | 0e f8 6d 99 7c 6a 3b f5 58 74 0d 21 2e 4e 88 07 | 53 e0 50 d2 f7 38 33 9c 1e ad d9 ed 1d 96 b7 80 | 22 e0 8f bd a1 c0 a3 2c 94 20 d5 25 06 a2 7f 34 | 69 08 93 f9 8f 4f 23 ac b8 84 4e a5 b6 4c a2 fd | 75 2b 4c 8f 39 aa c3 bd 56 04 f8 29 c7 f1 40 cc | 9b 1a e4 8b 46 36 dc 67 52 7b 4f 7f 89 4e ad be | 6b 62 8d 22 67 f2 df e5 dd fb ec d6 50 89 50 9f | ee 43 32 27 75 9c 8a 33 f8 2e e0 8a 42 cb be 39 | aa d8 09 f8 75 cc 7e 70 d1 1d e9 02 66 48 e7 a9 | 85 21 80 86 49 7c d0 81 50 d6 7a 61 62 60 a5 9e | 15 19 da e7 5d f6 40 da d1 f3 3f 04 ae f2 b4 4a | 29 00 00 24 ff dc d7 b1 fd dc f2 f7 49 64 0a 31 | e9 e7 85 40 8d 4a be e6 65 0c 38 4a f9 ed 0f 7d | 4d 19 c2 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 0f c5 61 64 4d d6 f7 e8 8d a8 de | cf 04 b2 c9 0c b8 8a b5 00 00 00 1c 00 00 40 05 | 72 d7 c9 34 b9 dc 3d 33 a4 7e ff 3a 57 4e 49 6e | fe 3e 47 b9 | libevent_free: release ptr-libevent@0x7fb37c023b10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a97080 | #477 spent 0.175 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f 73 6c 52 e2 16 12 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #477 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #477 | rejected packet: | 3f 73 6c 52 e2 16 12 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #477: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7b910 | handling event EVENT_RETRANSMIT for parent state #459 | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #459 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #459 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49684.787478; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003252 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a97080 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #459 | libevent_malloc: new ptr-libevent@0x7fb37c023b10 size 128 "road-eastnet-nonat-207" #459: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #459) | 64 1c f9 72 57 02 e5 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 f4 91 af e8 cc 47 24 c2 b5 4c 3e ed df 87 0c | 09 e0 4b 07 1e 23 c5 7e 86 e2 5a ab 7d 41 06 3d | 7f 7d f9 8e b6 58 c8 fa 4a e7 6e 59 bd 9e 19 5b | d0 22 36 6d 62 9e c7 d4 0e 8a 77 c0 e4 05 9e c6 | 38 14 50 50 10 9e e8 30 b1 17 07 a8 ec 87 4b 21 | 15 4c 43 ee b6 9d 8d a1 9c 18 3d 34 43 97 8f 77 | 9a 8e 35 11 77 6c 19 4c d5 d6 10 76 41 7d 92 29 | ce 7e b0 f8 dd e1 3c da bd 28 65 ea 34 c0 d5 5e | 87 61 2d 03 e2 eb 39 88 92 b2 21 9a 8c ff 81 cd | e0 87 95 3d 88 8d a2 1e 66 0d db a2 7a 79 4c cc | ae 9a d3 e6 87 6a 1b 78 ae 44 bb 23 8a 41 53 1f | af 3f 42 6b ff 45 a9 da 42 e2 38 bd 4c 50 bf a8 | 3b 16 b5 57 9a cf 28 d9 88 40 31 6e bd 9a 3e 51 | 61 82 b6 d4 f2 88 81 2c 57 c3 85 0c a7 ff fd 6c | ed 2a 14 13 51 d6 b5 56 aa 0c 26 20 25 e3 9c 40 | 12 38 26 e0 f5 9a 6e 40 35 0c 6b 0a 6d b3 65 32 | 29 00 00 24 5c 75 af 9e f8 ea 62 49 48 89 05 1e | 77 92 7c c2 74 9a fc 43 04 bc b7 18 cc f7 58 3d | 9b c8 34 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 7f b1 c0 22 56 8e bd 29 fd 39 4f | 5d 90 ed 84 8a 20 f8 23 00 00 00 1c 00 00 40 05 | 58 59 18 6a d1 74 dc 11 3e 54 b0 34 57 9e 0a 5d | 5a f6 05 3b | libevent_free: release ptr-libevent@0x7fb37803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7b910 | #459 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 1c f9 72 57 02 e5 bf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #459 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #459 | rejected packet: | 64 1c f9 72 57 02 e5 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #459: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35800d120 | handling event EVENT_RETRANSMIT for parent state #243 | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #243 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #243 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49684.791766; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.004432 exceeds limit? YES "road-eastnet-nonat-243" #243: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-243" #243: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #495 at 0x557d46b1e4c0 | State DB: adding IKEv2 state #495 in UNDEFINED | pstats #495 ikev2.ike started | Message ID: init #495: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #495: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #495; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-243" #495: initiating v2 parent SA to replace #243 | using existing local IKE proposals for connection road-eastnet-nonat-243 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 495 for state #495 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7b910 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #495 | libevent_malloc: new ptr-libevent@0x7fb37803b0b0 size 128 | #495 spent 0.0652 milliseconds in ikev2_parent_outI1() | RESET processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 18 resuming | start processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #243 ikev2.ike failed too-many-retransmits | crypto helper 18 starting work-order 495 for state #495 | pstats #243 ikev2.ike deleted too-many-retransmits | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 495 | #243 spent 2.67 milliseconds in total | [RE]START processing: state #243 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-243" #243: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #243: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #243 "road-eastnet-nonat-243" #243: deleting IKE SA for connection 'road-eastnet-nonat-243' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-243' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-243 | State DB: deleting IKEv2 state #243 in PARENT_I1 | parent state #243: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #243 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 495 time elapsed 0.001 seconds | libevent_free: release ptr-libevent@0x7fb358012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800d120 | in statetime_stop() and could not find #243 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#495) spent 0.995 milliseconds in crypto helper computing work-order 495: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 495 for state #495 to event queue | scheduling resume sending helper answer for #495 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7fb354044a20 size 128 Initiating connection road-eastnet-nonat-243 which received a Delete/Notify but must remain up per local policy | crypto helper 18 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-243" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-243' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-243" | stop processing: connection "road-eastnet-nonat-243" (in initiate_a_connection() at initiate.c:349) | spent 0.0784 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #495 | start processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 495 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #495 | **emit ISAKMP Message: | initiator cookie: | 51 22 fa ce 4d 7c ce 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-243 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1c 9b dc 70 14 a2 8d 2e 37 c4 2e 9c 10 fc 27 0a | ikev2 g^x 94 78 5e 85 80 ae e5 be af df cd 9d ab 0a d3 d5 | ikev2 g^x 9a 0e 71 ff 6f 4d f8 da ab bd 5a 72 c3 2a 71 74 | ikev2 g^x 55 f1 2d 29 95 62 4d 7d b1 32 5b 12 fd 0a 2d bb | ikev2 g^x 81 aa ca e6 2a a9 0f 8b 0c cf 1b d2 de 30 5f 1f | ikev2 g^x e8 83 26 da 07 fd 31 9b 9b d4 1b db 2d 4b e3 99 | ikev2 g^x 86 7d a5 a0 d4 7d 59 09 c9 73 32 3d 53 85 e9 6f | ikev2 g^x 12 64 cd cb bc 89 f7 39 4d 28 2c 75 1c 49 0b 3b | ikev2 g^x c2 22 31 40 60 7d 62 ec d8 da 82 4a bd 1e c5 38 | ikev2 g^x c3 d8 6d e6 cb 49 78 ba 18 b4 83 3e 7d f6 6d 50 | ikev2 g^x 16 4d a6 04 f2 a5 8b c2 44 ae 9c 1a 54 68 4c 7d | ikev2 g^x 43 87 34 87 42 6c 4d fd b4 43 f6 3a 97 2e d2 87 | ikev2 g^x c4 99 e8 56 55 a1 ca 43 16 5d 55 9b 16 ed ee c1 | ikev2 g^x b9 bb 2b d6 cf 5a 0d 72 75 6d 1a 0f ae 6e 85 ec | ikev2 g^x 3a e8 4f c3 0e 27 5b 09 2a e5 e1 24 f5 af 32 13 | ikev2 g^x e5 eb fd 29 dd 27 c3 a5 08 cc 6e 72 80 4d 82 6f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1b f3 52 dd f6 a5 80 95 b8 2f 4b 8b f9 eb 65 1b | IKEv2 nonce 6e dd cd 94 b7 dd 16 f5 58 7c d7 e5 e4 3a 80 01 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 51 22 fa ce 4d 7c ce 06 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f3 | natd_hash: port= 01 f4 | natd_hash: hash= ec 3b 51 4a 4c d3 e5 68 1a 7e fa ec e7 02 de b1 | natd_hash: hash= 56 34 9d 92 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ec 3b 51 4a 4c d3 e5 68 1a 7e fa ec e7 02 de b1 | Notify data 56 34 9d 92 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 51 22 fa ce 4d 7c ce 06 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ef ad 01 a7 be a3 55 49 1c 13 e6 d1 01 bd b7 0b | natd_hash: hash= b8 36 16 d5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ef ad 01 a7 be a3 55 49 1c 13 e6 d1 01 bd b7 0b | Notify data b8 36 16 d5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #495 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #495: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #495 to 4294967295 after switching state | Message ID: IKE #495 skipping update_recv as MD is fake | Message ID: sent #495 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-243" #495: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.243:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #495) | 51 22 fa ce 4d 7c ce 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c 9b dc 70 14 a2 8d 2e 37 c4 2e 9c 10 fc 27 0a | 94 78 5e 85 80 ae e5 be af df cd 9d ab 0a d3 d5 | 9a 0e 71 ff 6f 4d f8 da ab bd 5a 72 c3 2a 71 74 | 55 f1 2d 29 95 62 4d 7d b1 32 5b 12 fd 0a 2d bb | 81 aa ca e6 2a a9 0f 8b 0c cf 1b d2 de 30 5f 1f | e8 83 26 da 07 fd 31 9b 9b d4 1b db 2d 4b e3 99 | 86 7d a5 a0 d4 7d 59 09 c9 73 32 3d 53 85 e9 6f | 12 64 cd cb bc 89 f7 39 4d 28 2c 75 1c 49 0b 3b | c2 22 31 40 60 7d 62 ec d8 da 82 4a bd 1e c5 38 | c3 d8 6d e6 cb 49 78 ba 18 b4 83 3e 7d f6 6d 50 | 16 4d a6 04 f2 a5 8b c2 44 ae 9c 1a 54 68 4c 7d | 43 87 34 87 42 6c 4d fd b4 43 f6 3a 97 2e d2 87 | c4 99 e8 56 55 a1 ca 43 16 5d 55 9b 16 ed ee c1 | b9 bb 2b d6 cf 5a 0d 72 75 6d 1a 0f ae 6e 85 ec | 3a e8 4f c3 0e 27 5b 09 2a e5 e1 24 f5 af 32 13 | e5 eb fd 29 dd 27 c3 a5 08 cc 6e 72 80 4d 82 6f | 29 00 00 24 1b f3 52 dd f6 a5 80 95 b8 2f 4b 8b | f9 eb 65 1b 6e dd cd 94 b7 dd 16 f5 58 7c d7 e5 | e4 3a 80 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 3b 51 4a 4c d3 e5 68 1a 7e fa ec | e7 02 de b1 56 34 9d 92 00 00 00 1c 00 00 40 05 | ef ad 01 a7 be a3 55 49 1c 13 e6 d1 01 bd b7 0b | b8 36 16 d5 | state #495 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37803b0b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7b910 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #495 | libevent_malloc: new ptr-libevent@0x7fb358012840 size 128 | #495 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49684.793536 | resume sending helper answer for #495 suppresed complete_v2_state_transition() and stole MD | #495 spent 0.494 milliseconds in resume sending helper answer | stop processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb354044a20 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 22 fa ce 4d 7c ce 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #495 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #495 | rejected packet: | 51 22 fa ce 4d 7c ce 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #495: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c018460 | handling event EVENT_RETRANSMIT for parent state #301 | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #301 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #301 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49684.803741; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005038 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354046090 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #301 | libevent_malloc: new ptr-libevent@0x7fb354044a20 size 128 "road-eastnet-nonat-49" #301: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #301) | 04 2d 84 e7 d7 11 c2 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 3c a0 2e 05 57 66 74 9e 59 04 02 1e 6b 82 64 | 24 cf 86 32 1b 49 63 31 85 6e 91 96 dd e7 a7 21 | 78 ee 5c 0c 83 da 97 1a 0c 46 69 7c d4 8f 0d 6c | 0b 43 52 49 09 9a 24 da 36 13 01 09 31 88 8b 5b | 38 73 77 00 83 94 ba bf 7c fa 22 16 ff 64 be 16 | 43 df 4f 1d b8 18 88 ee 83 b1 c9 32 ce 1f e3 0d | 40 e4 05 2a 7d 12 64 bf de 51 1d 4c d5 99 11 64 | 9a df 9d ae e7 e1 f9 df 89 9a 5f 11 f6 4b 39 47 | 36 de 08 ec a1 59 7b 84 9f e8 cd af ca a0 8a 29 | aa 2e 7e 1a 1d 88 43 74 5c 19 1a 8f 44 5f 83 95 | cc 00 d8 ee 8f cb 95 29 ae 58 5c 08 01 62 ea 7e | 97 e9 bf 6a 36 31 ba 2d 83 4b 4a ef ce 50 36 44 | 4f a8 a5 8e ad 2c 99 bd c1 01 08 ba ee 5e 1c 63 | 9e 50 96 b6 7a 6e 9f de cf c5 73 a0 7c d6 3d 3a | fe 11 5d 0f 1c cb 4b 02 b4 b1 f7 0c 56 bd a2 fe | d4 f1 da 5a fb cc f5 22 d5 c9 55 2b 49 27 7a 02 | 29 00 00 24 9d f4 32 14 da 15 0d 5d b3 86 88 1b | ed 98 fc e3 a3 7a 35 ba 87 aa 0c 85 93 07 0b 69 | 9d 37 a2 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 4c 33 35 25 dc 8b ec 4f 4f 50 86 | 6f 49 f3 b3 44 40 22 71 00 00 00 1c 00 00 40 05 | d2 03 8c 03 1f b3 ee 14 98 31 7f d2 44 da 50 e8 | 1a 08 5c 44 | libevent_free: release ptr-libevent@0x7fb35c014b40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c018460 | #301 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 2d 84 e7 d7 11 c2 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #301 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #301 | rejected packet: | 04 2d 84 e7 d7 11 c2 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #301: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61bd0 | handling event EVENT_RETRANSMIT for parent state #411 | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #411 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #411 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49684.827089; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005334 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c018460 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #411 | libevent_malloc: new ptr-libevent@0x7fb35c014b40 size 128 "road-eastnet-nonat-159" #411: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #411) | dd dd 24 eb b8 cb 50 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd cd 4b b5 b6 e7 18 30 d4 d0 8e 83 03 53 e6 4e | 8d 99 24 ba 33 2f 0c bd fc e2 e9 0d 81 68 aa 7b | 12 93 68 9f 91 0d c2 fa e1 b9 83 26 f0 5b 9b dd | 51 e3 9e ed 34 ea 5f c9 93 72 24 b6 bd 13 cb 5c | 26 fe cc 72 6c e7 c6 21 ed 4e 14 b2 9f a3 3b 3c | 94 f8 1a 98 76 bb 57 e6 0d a9 bd 26 b1 18 3d 50 | 59 31 42 4b 06 7d ba db 70 1e 1c ae a8 d8 de 3a | 81 ee 27 6d 40 cc 4d 6a 4b fc 36 c4 b0 3a 09 0b | 48 47 43 74 dd e5 cb 90 df 6e e3 46 c3 6c 8b 97 | f3 25 7f d4 fd ec f5 56 ff 6b 80 d1 67 dc c0 79 | 70 cf 38 a2 35 5f 37 c9 04 ae 98 e9 6e f3 26 d3 | 47 94 bb 03 5d 71 7b 87 ad 54 4b 93 a3 b0 71 8f | 5f 69 b0 8d 69 3f e2 c0 02 32 57 3f 64 cb 19 71 | 58 00 09 d8 ce 8f 64 c9 55 9e 7c 00 26 28 eb f7 | 6f eb 0e ab 01 fb ae c5 0f da bd 30 07 46 c2 b0 | 5c ea 05 eb 2d 3f 40 91 20 c1 a3 5a 4f 86 98 86 | 29 00 00 24 a3 6a 54 81 57 a4 87 e3 a7 7a 68 dd | 8e 44 5b 6e 2b 5e f0 9a 3e c5 72 e8 17 f4 34 1c | 65 bd e7 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f a2 a7 20 75 c6 9d 9f 5f af fe db | d7 0a 3e e1 5c 28 6c 20 00 00 00 1c 00 00 40 05 | 37 57 74 7e fa 8f cf 8f 09 51 1f a5 a7 dc 5e 89 | 60 7b 2d b3 | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61bd0 | #411 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd dd 24 eb b8 cb 50 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #411 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #411 | rejected packet: | dd dd 24 eb b8 cb 50 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #411: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a76210 | handling event EVENT_RETRANSMIT for parent state #491 | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #491 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #491 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49684.829416; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500202 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #491 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 "road-eastnet-nonat-239" #491: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #491) | 71 99 e4 22 98 eb 54 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6f ca d2 21 e7 00 d0 58 95 9f 18 d3 07 6f a1 36 | 29 0a 07 0a 83 6e be aa 71 cf 9f 04 2d 78 ad e9 | 58 fe 50 02 89 22 52 34 18 90 af 07 b5 26 f1 6c | b0 11 12 a1 23 de 99 fd fc c2 c0 e2 48 6c 08 1b | f6 de 34 df 7c 06 d6 3f 0c 5a 97 94 b5 cd 37 58 | 08 26 b0 da 52 89 5c 74 c6 39 52 b5 86 f0 ed 18 | e5 f9 91 2e 14 4e 44 f7 64 55 1d 70 ad 8f f1 5d | 53 18 a9 5d 0c b5 78 b7 26 b2 7b 9e 90 ef 29 39 | 8b 7e b2 68 96 f5 cb 23 fc d4 1f dd be 19 b3 cf | 90 29 ab e6 33 3c 02 49 68 ce 65 d3 cd 32 0f 44 | 53 2e 1d d6 62 09 24 c9 7c 69 12 6b 73 20 8c a6 | 8d 2e 37 7f bc 30 45 fb da d9 2f 0c 0f 60 4b ac | 0c 1a 77 7c e4 78 1e 2f d7 92 41 d2 4d 5f 8e ae | 49 e0 54 b5 c7 2d bc a1 7a a2 3f 86 07 2c 92 60 | e1 f5 de af a0 f0 4b 27 ad e3 b4 c3 ee 7b 2d 0d | d8 e3 ea 54 9f 53 a9 b6 54 62 d4 0e 68 4d ff 58 | 29 00 00 24 f6 62 db cd 87 59 ee 6d c7 6e 62 13 | a1 8e a7 17 f8 92 11 7a 45 83 ff 50 63 74 b0 f6 | 7b f4 74 d1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 ef b1 40 3a d0 79 c3 55 24 76 d2 | d8 cf d4 95 18 b0 e0 3a 00 00 00 1c 00 00 40 05 | ee b1 f7 86 b3 de f8 ed 09 8e 76 56 9a 74 8c 3c | 69 d7 b9 6e | libevent_free: release ptr-libevent@0x7fb38002d3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a76210 | #491 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 99 e4 22 98 eb 54 3d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #491 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #491 | rejected packet: | 71 99 e4 22 98 eb 54 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #491: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374009690 | handling event EVENT_RETRANSMIT for parent state #302 | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #302 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #302 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49684.869747; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004367 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a76210 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #302 | libevent_malloc: new ptr-libevent@0x7fb38002d3a0 size 128 "road-eastnet-nonat-50" #302: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #302) | 9a b7 d9 69 b7 b5 8b 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 3b 38 5a ca c1 e0 66 18 62 3b 15 6c b6 3b d4 | d7 ad 95 64 47 60 48 b5 a1 40 89 ca 34 68 f4 5c | b5 12 b3 25 90 eb 49 eb b5 40 df ef 79 a7 f8 11 | fd 6b 8c b7 57 dd 67 6c a2 67 a7 4f be 73 1c 93 | d0 14 73 9b 52 53 0b 4e 5f f6 38 f3 b8 8b db d1 | 1c 9f 4f 10 7c 2c fa b8 0b 5c b4 6b 80 d0 b7 e3 | b6 70 3b 9c d9 ad f0 38 ba 59 1a 5a 32 60 56 90 | 00 97 ec 2a 32 4c ce 8c d0 a5 94 f1 33 fd e4 3c | bb e9 7f cc 0d 4c 4c be 2b f0 80 18 d5 0b e3 68 | da 32 8d 6f 53 ff 6f c4 bc c7 44 a5 1e 56 ed 9a | 22 1a 47 85 cc bb d8 71 12 33 c9 06 fb bd 86 04 | 8a 5e c6 10 00 05 dc db 1a ce ef c2 9a df 5b 3e | f1 94 44 f2 93 b5 45 ee f4 39 f1 54 d0 08 74 2f | 98 02 e6 14 93 d3 55 70 9b c1 5c 0a 6d f7 72 e9 | 7a 20 75 0d 8a 45 81 c5 cd 4a 79 7e 2a a7 cf ed | b9 84 dc 2f 1f b1 1b 47 62 4c ef 36 89 f7 2e e1 | 29 00 00 24 4e 70 94 e8 7e 52 b9 fd e3 7f cf aa | b8 11 eb 44 2a e9 8b 91 cb 46 0f b2 fd 17 ad 44 | 7e 6a 9e 6e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 54 86 00 1a 73 2d f1 8e 31 28 7e 7f | 4e 1d 05 b3 46 7f 2d d6 00 00 00 1c 00 00 40 05 | e4 ea 9a e9 78 75 4e 5e 40 77 76 74 52 35 fb 06 | 70 d7 5d cd | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374009690 | #302 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a b7 d9 69 b7 b5 8b 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #302 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #302 | rejected packet: | 9a b7 d9 69 b7 b5 8b 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #302: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0458 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab7a80 | handling event EVENT_RETRANSMIT for parent state #412 | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #412 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #412 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49684.885037; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006223 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374009690 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #412 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 "road-eastnet-nonat-160" #412: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #412) | af 34 f0 93 1d 1b d6 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 73 ca 82 d1 b8 25 7f 04 b5 f2 f7 30 87 a9 41 | a5 4a c9 0d a4 7b 88 6a 9c a7 a5 05 c4 99 82 97 | fe 18 55 31 1a 69 24 11 ef 96 2b 9b 00 09 64 93 | f5 9b 6f 9f 26 02 b8 02 eb ec d6 b9 58 77 37 c4 | 15 13 55 d4 ba a0 8c 70 db 9d 5d b8 50 b2 fb 14 | 70 91 27 3f 52 b9 21 d5 ac 35 9f 2f 74 c2 cd a3 | f5 0a 60 3b 9e 8f df b1 5a c8 44 f1 32 14 8d c9 | 96 70 54 8d 6a b3 1d 9e 55 f7 54 39 be 48 72 05 | 31 be c1 bc a2 b1 92 d9 d7 2b ac 35 4b a3 d1 85 | c8 13 0e 09 13 01 9b 53 39 df da 51 e3 f0 0f b0 | b8 cb 35 90 8d 85 96 9f 9a 47 73 3d e9 c6 9a 9b | 64 e5 27 2a 0d 1b 39 d0 c9 ca 54 89 58 ae ef 63 | 30 57 d5 95 13 d6 7b 07 db 4c 1f 26 15 fc 42 93 | 98 20 27 df a5 2d d6 c3 03 e8 40 00 9e a8 d6 5b | d9 5c 3b 12 b9 90 e7 25 5f 47 7e 86 19 c6 bc 15 | 0b 47 49 10 46 90 3e a8 79 f3 d0 fc 23 1f c9 d1 | 29 00 00 24 a3 90 3f ea a1 9a ff 04 92 34 17 b8 | 6f ef 29 47 17 37 0c c0 67 c5 c5 dd ee 94 92 f1 | d0 ea b7 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 8b 79 f3 42 b6 33 1b 9b 02 cf 5d | 36 ad 4c 1f 32 b9 37 c2 00 00 00 1c 00 00 40 05 | a6 ab fb 7e 68 25 b5 32 b3 ef df 3a 19 eb c4 3f | d0 c1 29 ec | libevent_free: release ptr-libevent@0x7fb34c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab7a80 | #412 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 34 f0 93 1d 1b d6 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #412 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #412 | rejected packet: | af 34 f0 93 1d 1b d6 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #412: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46adb080 | handling event EVENT_RETRANSMIT for parent state #478 | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #478 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #478 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49684.891363; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001673 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab7a80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #478 | libevent_malloc: new ptr-libevent@0x7fb34c0180b0 size 128 "road-eastnet-nonat-226" #478: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #478) | b4 9c 7f a0 55 ec 5f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 86 bb f8 93 0c cc df 70 83 3b a1 9a e0 b8 e3 | ef 6e a7 55 12 1e 4a a1 3c fd 3e f8 52 71 57 ec | d1 b9 27 97 72 c7 60 a2 ce b1 45 33 01 2b 7a c1 | 6c 56 fd d5 59 18 5e d3 c3 75 ef 36 1c 65 ec f7 | 03 c0 d4 70 7b b6 e1 35 71 9d 76 5b 7d 21 d4 3b | 12 1e 6c 03 cf 08 78 60 b5 ba 22 6e 40 93 8e c7 | 49 b5 59 bf 7f 87 44 20 2c 36 31 fc 69 d8 21 31 | 6c 62 2a ef c7 55 7b 01 a6 27 b6 8c 28 9f 7c ac | d4 27 6c f1 7c 85 40 4e 23 a1 d4 02 e3 38 52 92 | 5f 62 3c 6f 58 9e 47 5e 72 b1 b1 7d 8d 92 b6 d3 | be e0 0a 4d 01 e0 16 9f 01 75 9d 1c 68 e3 f5 d9 | 8e 19 b8 2b 12 45 ac 03 e0 b6 4d 98 39 5a 75 d7 | 7c b1 b9 f8 a3 a2 b1 d2 49 e7 b2 11 f2 c6 a7 7f | 57 72 f8 df 1f 7a 3c df 19 c0 28 fb f6 f4 59 df | f9 cb e8 e4 b5 73 46 61 ef 64 d4 38 66 2b 1c f7 | d4 31 c9 51 2e 93 97 3b f3 a7 d3 d3 06 a7 f6 99 | 29 00 00 24 19 2b 71 2c 92 77 f3 24 92 84 03 b5 | 44 5b d7 aa 5e 03 e6 f3 27 6d 26 be 26 c2 0f f8 | de ad c4 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad b7 1a 04 ad be 09 f8 62 42 a2 e6 | 69 0f ca 24 af 9b 5c 02 00 00 00 1c 00 00 40 05 | 37 89 76 5f 87 60 25 2e 24 4c ae 3c 7a 86 5f 05 | 9f e3 e5 ad | libevent_free: release ptr-libevent@0x7fb378035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adb080 | #478 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 9c 7f a0 55 ec 5f 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #478 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #478 | rejected packet: | b4 9c 7f a0 55 ec 5f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #478: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3400296b0 | handling event EVENT_RETRANSMIT for parent state #460 | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #460 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #460 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49684.894647; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002548 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adb080 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #460 | libevent_malloc: new ptr-libevent@0x7fb378035930 size 128 "road-eastnet-nonat-208" #460: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #460) | 23 48 f5 22 8d 37 9a d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 df d9 22 d0 fa 01 d1 aa 88 df 6a 8b 18 c0 09 | 4f 5b 80 db c5 12 8b 47 ef 35 50 bc b0 af 99 c5 | f9 cf 10 a6 63 8f ba 03 da 7f 0b b3 54 11 ba 9c | bb 06 80 77 61 12 b6 fe 2b bb 2c 7d 23 ed 7a 74 | 17 31 cb cb 95 4c d6 8f 31 04 dc 07 37 df 2d f4 | 1c ed 0c bb 28 ba e2 23 2d 3d a3 b2 fc 6f 50 eb | 56 d2 5b 1e f1 ad 23 2f 3e 55 c4 35 e9 32 f6 24 | 86 b3 e7 fd 04 0f 6f 72 db 37 4f bd d9 fe 64 c2 | 83 ac 83 05 91 73 42 0a a1 0c 3e 29 3c 20 67 b6 | 92 37 23 8d 25 df 18 a0 fa c2 98 93 ab ff 5f 64 | 7c d6 b8 fc 1d 90 5c 26 98 2d 8b b3 56 38 e2 7c | 20 da c8 bf 8d be 1d 6d f8 c5 88 bf 2f 3a f2 41 | 78 28 51 f9 69 ab 11 20 67 51 52 04 40 a5 c7 0c | 37 f0 c6 5d f9 95 c0 b8 47 6e 71 8e 99 56 3a 5f | e1 5c d4 8d c1 97 29 9c 26 a6 ac 65 11 ae 68 ef | 23 72 8e c9 45 c4 63 78 1b 5c 81 47 6e 58 87 ff | 29 00 00 24 25 2a f3 c2 d1 34 f2 28 be 54 0b a4 | 22 e2 98 59 02 dc 2f 37 5b b6 b4 bd 10 49 91 58 | 87 4d 98 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c c8 5d 4c 09 cc 17 d5 22 fc 7b d0 | 43 ae fd 90 5d 04 da 2b 00 00 00 1c 00 00 40 05 | 07 a4 f0 f7 58 53 22 23 25 cf 1a 07 69 10 b8 4a | 16 e3 ac d7 | libevent_free: release ptr-libevent@0x7fb340039ba0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3400296b0 | #460 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 48 f5 22 8d 37 9a d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #460 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #460 | rejected packet: | 23 48 f5 22 8d 37 9a d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #460: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0647 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360012bf0 | handling event EVENT_RETRANSMIT for parent state #487 | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #487 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #487 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49684.904052; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001673 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3400296b0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #487 | libevent_malloc: new ptr-libevent@0x7fb340039ba0 size 128 "road-eastnet-nonat-235" #487: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #487) | b2 6f 13 91 c3 04 27 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e b7 3e 1e ea 4f ea 6c e1 7a 2e d9 d3 3e f9 00 | 00 b2 10 a9 bd 14 73 d0 5c 75 d0 f7 e2 0a 9c 29 | d2 44 ca 2c 07 7b 68 53 85 c3 d3 3e bc e8 07 6e | cf f2 af a9 1e bb 29 51 6a f7 01 6c 37 1e c0 ab | 85 0c c2 bf ee 4c 81 52 aa 15 a7 f4 22 68 ab 13 | 48 79 2b 77 d6 1b 5b ea 43 58 e3 de cb b3 22 8f | 5c c4 4c 56 f3 fa d5 2b 81 01 8d d3 c1 a0 72 c2 | 36 97 f9 30 4e b1 e3 4c c3 9f 76 1a 47 e2 4c 66 | 36 1c 6d 84 88 a7 c0 e7 e9 9d 4f 1d e0 c1 e1 ff | 39 d2 b1 a1 49 e4 09 1c dc a0 a7 cd 71 c8 f9 bc | 3a bc 26 2f 4d d5 40 96 f5 89 a1 c7 d3 3a 43 fd | 96 7a 1b 6f d9 4d de b2 44 44 32 65 9e 2d 89 e0 | 92 3a f7 8d c2 fa 4d 91 90 40 ba 6a ed 04 a1 1b | cd 46 17 18 d0 bf 88 e4 f7 cd 2c 44 55 8e 08 a0 | 65 d8 55 af e5 2c 13 03 b6 20 5e 95 aa 08 a5 20 | cd 27 5d 2b dd 8b b7 c9 7d 2d d5 bb 14 9f 9e 7c | 29 00 00 24 f2 e1 64 3c 35 1a 4c dd 7a 16 43 23 | ae 79 36 f1 02 a6 51 17 6d d2 ae 67 32 63 24 20 | 73 fc 22 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 4a 35 08 41 af be cf 3c 4d e0 85 | 28 9e fb 5b 11 1f 06 99 00 00 00 1c 00 00 40 05 | 95 f5 24 fe 51 05 47 87 18 ae 0d 13 a0 36 38 27 | 84 c2 41 68 | libevent_free: release ptr-libevent@0x7fb37003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360012bf0 | #487 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 6f 13 91 c3 04 27 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #487 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #487 | rejected packet: | b2 6f 13 91 c3 04 27 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #487: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae48c0 | handling event EVENT_RETRANSMIT for parent state #492 | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #492 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #492 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49684.904269; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499767 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #492 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 "road-eastnet-nonat-240" #492: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #492) | d7 99 7d 69 73 b4 2a a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 07 d7 12 79 21 18 05 9a 65 7d 95 08 cf 17 4e | 65 ed 52 c0 2d 6f a2 d4 7e 6e 0c fe 68 2e 85 0e | c1 f3 a0 f1 34 f9 34 8a e9 6d c0 54 1e 27 54 a6 | 0a 27 50 d2 78 b6 25 f7 6a f9 6c d4 40 88 de 0e | c5 23 46 17 11 07 59 0b 07 7d f1 44 d8 68 37 f0 | 12 d0 4c 6e 87 95 44 91 7a 02 1a aa de e2 f1 34 | 10 60 5a 14 6b 10 17 21 f9 34 d9 11 2c 87 8c 26 | a1 73 6c 09 6c 7e 33 9d 0e 03 17 61 98 14 aa f1 | 55 ad ab 3a b7 4f 37 37 da 8f 18 e7 c8 d3 37 ef | 02 82 ee 24 ef c3 bd c3 8a 68 42 60 d6 70 2e 41 | 57 9c 7a 60 c3 c6 ac 4a 44 4b 7b 82 88 6e 37 3a | e8 a6 66 1b 7b 71 c3 58 de ce c4 1a 99 46 de bc | be 62 d4 44 43 62 c0 f6 26 99 83 35 30 7f b5 15 | ea a7 50 6e 0e e9 be 43 3b f3 33 1e 18 3f 0c b4 | 99 f0 db 6c 50 7f 42 cb 48 b5 b5 92 17 92 32 ed | bf e5 25 0e 41 bc 26 2f b8 93 47 2e 04 ee 7f e1 | 29 00 00 24 50 36 54 c1 a9 17 13 4c 62 1f 80 79 | be a9 3c 75 1a 54 91 d7 53 38 3a 75 de 57 2a 82 | 16 4a 83 7c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 22 3a 78 b0 c2 12 43 88 f6 04 b2 | db f8 ae cb 72 c7 59 0b 00 00 00 1c 00 00 40 05 | d7 ae 13 c8 9e aa 6e 0d cf 25 ff 91 a0 20 ef 42 | b6 21 2f 3a | libevent_free: release ptr-libevent@0x7fb3480251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae48c0 | #492 spent 0.0835 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 99 7d 69 73 b4 2a a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #492 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #492 | rejected packet: | d7 99 7d 69 73 b4 2a a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #492: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0391 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c03b100 | handling event EVENT_RETRANSMIT for parent state #303 | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #303 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #303 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49684.949502; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00468 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae48c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #303 | libevent_malloc: new ptr-libevent@0x7fb3480251c0 size 128 "road-eastnet-nonat-51" #303: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #303) | 0b e0 0a 79 39 06 c6 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 24 21 b4 0b e3 09 db 3f b6 a5 77 bb 87 5e ad | 66 c7 93 9a 8c 2e 04 3b 08 20 ac 03 a5 76 12 ab | b6 66 99 c7 bf 97 92 b1 32 f2 d4 40 1d 20 9f 0b | 85 c0 47 40 73 82 3c 97 59 5e 7a bf 29 1b 9b 33 | 65 e1 1d e1 06 4b 23 bb cd c3 d7 6f 1f 4d 6a d4 | a5 35 47 13 70 43 5f 27 3f e8 8d 45 36 1b 13 e8 | 52 7a c9 fd 4e c5 bf df 1d ad 19 77 99 5f 83 de | fd ac 63 24 8e b6 c0 c8 ec b2 56 6f 38 d9 99 06 | 17 b7 7e be be 8d 7f 5c 2d b1 d6 35 c6 26 88 21 | 6c 47 69 c2 4b 86 0c 66 51 e7 f5 2d 4c fb e5 79 | 2e e4 ba 11 88 c3 1e d5 cd ce 6d 00 ed f9 6c 2a | 2b 8c 48 d8 fb b0 3c 63 91 8e ae 31 9b af bf 15 | 0b 41 67 9d 12 12 70 9c 8c c1 6a db fc d2 6b 50 | c9 fa d7 b3 18 db 4f f1 d7 45 f6 0f b9 6e 33 c9 | 52 60 cc f3 be 3c 22 f0 a3 35 db d2 db d6 a6 94 | 52 18 e2 de 57 43 68 d8 7b eb ec 67 cd ed 35 3d | 29 00 00 24 80 ff 8a 78 69 ce 7f 51 87 5f 84 ba | c7 a1 f0 8c ea cb 68 68 e4 3e 06 9f 5c 43 cc 06 | 85 44 5c 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 50 a2 4e fc 4d 1b 58 77 6d e9 3b | 74 ac 43 c3 0f 7e 66 e7 00 00 00 1c 00 00 40 05 | d9 44 30 c1 08 7f 7e c4 16 be af c3 f1 e2 c1 72 | 14 da 79 2d | libevent_free: release ptr-libevent@0x7fb35c029490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c03b100 | #303 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b e0 0a 79 39 06 c6 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #303 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #303 | rejected packet: | 0b e0 0a 79 39 06 c6 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #303: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0603 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35000d120 | handling event EVENT_RETRANSMIT for parent state #413 | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #413 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #413 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49684.950821; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004739 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c03b100 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #413 | libevent_malloc: new ptr-libevent@0x7fb35c029490 size 128 "road-eastnet-nonat-161" #413: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #413) | ea 46 85 e7 fd 9b ca c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a d6 4a 46 94 c5 0e 81 7d ce e7 15 1a 5a 21 6b | d0 32 15 1d df aa 19 22 73 4c 48 c7 c9 6d a8 93 | 29 7e ec 61 b6 83 c3 69 04 a5 60 f9 c5 35 27 f9 | 44 bf c3 99 38 07 63 d7 db de ef 2b 00 c6 3d 6f | 1e 8f 0f f0 f2 98 90 49 cc c1 d2 86 82 6d 83 07 | b6 cd 6e db a4 2f 05 29 fa 3e e9 09 c5 23 64 57 | 0f 6b 66 2d b4 b3 b3 d2 ea e7 1c 7e 8b 59 ce a2 | 2a db b2 33 4a cb 53 6b e5 06 8d cf 28 1c 31 94 | 7e 79 27 07 12 0f ee 03 55 92 90 46 1e 9e 32 06 | e3 69 6e 6a 21 a6 b6 3d c6 89 df ef c7 fa b0 eb | ab 8c ae 81 fa 71 38 65 08 c6 41 65 64 a9 83 b0 | bc c3 01 a6 3a 68 d2 5d bb 35 97 d0 1e e7 f8 04 | 04 04 f6 ff 5e f9 22 b6 f2 9f 86 d9 b4 ae ee 49 | fd 07 2d 26 52 e7 63 86 cc 1a 6e 7f 04 ad 81 4a | a3 d7 7a 6d 6e 53 1b 65 52 8d 28 da bd 54 d5 04 | 1e 3e 9f 74 3c 77 dc 33 e5 c5 fe 6f df d3 a7 16 | 29 00 00 24 85 87 06 d7 9a bf 7b 07 3a ec 94 d1 | cf f4 5c 33 c2 8f dc 32 29 58 27 3f e4 e5 19 81 | 63 f8 b3 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 20 9c 8e 3c 13 0c 4e a0 e8 24 76 | 9d 56 e7 f6 81 08 36 aa 00 00 00 1c 00 00 40 05 | 3c 55 11 1a b1 a6 35 ac 5d bf b2 4d 0c c0 40 68 | 37 73 05 e6 | libevent_free: release ptr-libevent@0x7fb350012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35000d120 | #413 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 46 85 e7 fd 9b ca c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #413 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #413 | rejected packet: | ea 46 85 e7 fd 9b ca c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #413: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0706 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0d500 | handling event EVENT_RETRANSMIT for parent state #244 | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #244 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #244 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49684.975167; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.00673 exceeds limit? YES "road-eastnet-nonat-244" #244: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-244" #244: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #496 at 0x557d46b1fa80 | State DB: adding IKEv2 state #496 in UNDEFINED | pstats #496 ikev2.ike started | Message ID: init #496: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #496: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #496; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-244" #496: initiating v2 parent SA to replace #244 | using existing local IKE proposals for connection road-eastnet-nonat-244 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 496 for state #496 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35000d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #496 | libevent_malloc: new ptr-libevent@0x7fb350012840 size 128 | #496 spent 0.091 milliseconds in ikev2_parent_outI1() | RESET processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #244 ikev2.ike failed too-many-retransmits | pstats #244 ikev2.ike deleted too-many-retransmits | crypto helper 7 resuming | crypto helper 7 starting work-order 496 for state #496 | #244 spent 2.54 milliseconds in total | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 496 | [RE]START processing: state #244 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-244" #244: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #244: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #244 "road-eastnet-nonat-244" #244: deleting IKE SA for connection 'road-eastnet-nonat-244' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-244' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-244 | State DB: deleting IKEv2 state #244 in PARENT_I1 | parent state #244: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #244 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 496 time elapsed 0.00076 seconds | libevent_free: release ptr-libevent@0x7fb340045ed0 | (#496) spent 0.698 milliseconds in crypto helper computing work-order 496: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d500 | crypto helper 7 sending results from work-order 496 for state #496 to event queue | in statetime_stop() and could not find #244 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #496 | libevent_malloc: new ptr-libevent@0x7fb34803f490 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-244 which received a Delete/Notify but must remain up per local policy | crypto helper 7 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-244" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-244' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-244" | stop processing: connection "road-eastnet-nonat-244" (in initiate_a_connection() at initiate.c:349) | spent 0.0669 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #496 | start processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 496 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #496 | **emit ISAKMP Message: | initiator cookie: | f5 9f b4 c2 7a 9c 1f 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-244 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ec 8a 03 66 9e a5 16 39 b9 4a bb 3f cb 61 65 42 | ikev2 g^x 8b 18 46 77 70 53 8b 55 8b 35 c6 f2 c8 4d 38 3e | ikev2 g^x 2b 6f 3f c9 8d f1 cb 91 94 06 70 93 28 a0 96 60 | ikev2 g^x 92 d3 00 a2 ef 01 89 68 02 8d 85 25 69 9d e5 95 | ikev2 g^x 69 f6 3b 34 62 4f 63 bc 8e bf 0f 5d c5 bc ea 46 | ikev2 g^x f9 33 76 3d ad c3 1d 5a 73 74 ae ae 16 20 46 35 | ikev2 g^x 9e db 41 74 ad 1f 50 49 89 b1 86 a0 57 06 1e bf | ikev2 g^x 85 a3 93 e1 b5 84 03 d1 1b 0b 7b cd 83 c2 b7 25 | ikev2 g^x da ae 43 dc f0 b6 2a cd 25 9c e3 07 d7 ef 34 20 | ikev2 g^x 0c 00 64 d5 63 1f b1 99 29 80 fe 35 ec 43 23 95 | ikev2 g^x 6a a2 fc 57 a3 69 20 ea 94 fb aa 78 ee 5b 41 20 | ikev2 g^x 62 d9 4d ee fd 29 6e d9 f4 a1 15 cb 28 a0 f5 d3 | ikev2 g^x 5e bd 59 a6 87 61 99 4f 80 5d e6 36 36 11 e0 c2 | ikev2 g^x e5 c9 d7 3c 99 3b 27 4b f7 81 ca 42 93 ee a9 76 | ikev2 g^x e3 2e 24 6c 18 27 a8 24 04 ce 7c dd c7 a8 fd 5b | ikev2 g^x a3 04 bb 87 35 69 9f a6 83 11 9f de e4 40 52 5f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4f 4f 97 a4 0f 74 20 cc 43 f4 64 ac a1 3b a8 cc | IKEv2 nonce 16 af 62 fa 43 5b 11 20 24 9f 33 6a 2d 6e 82 4a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f5 9f b4 c2 7a 9c 1f 77 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f4 | natd_hash: port= 01 f4 | natd_hash: hash= 3c 79 bb 2d d9 d9 21 50 1a 1a 14 0f 62 ed ae c0 | natd_hash: hash= 08 f2 03 40 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3c 79 bb 2d d9 d9 21 50 1a 1a 14 0f 62 ed ae c0 | Notify data 08 f2 03 40 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f5 9f b4 c2 7a 9c 1f 77 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c8 1f b0 a0 de 58 fc c7 c3 79 0d 4a c2 37 42 43 | natd_hash: hash= 8a b6 69 08 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c8 1f b0 a0 de 58 fc c7 c3 79 0d 4a c2 37 42 43 | Notify data 8a b6 69 08 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #496 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #496: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #496 to 4294967295 after switching state | Message ID: IKE #496 skipping update_recv as MD is fake | Message ID: sent #496 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-244" #496: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.244:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #496) | f5 9f b4 c2 7a 9c 1f 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec 8a 03 66 9e a5 16 39 b9 4a bb 3f cb 61 65 42 | 8b 18 46 77 70 53 8b 55 8b 35 c6 f2 c8 4d 38 3e | 2b 6f 3f c9 8d f1 cb 91 94 06 70 93 28 a0 96 60 | 92 d3 00 a2 ef 01 89 68 02 8d 85 25 69 9d e5 95 | 69 f6 3b 34 62 4f 63 bc 8e bf 0f 5d c5 bc ea 46 | f9 33 76 3d ad c3 1d 5a 73 74 ae ae 16 20 46 35 | 9e db 41 74 ad 1f 50 49 89 b1 86 a0 57 06 1e bf | 85 a3 93 e1 b5 84 03 d1 1b 0b 7b cd 83 c2 b7 25 | da ae 43 dc f0 b6 2a cd 25 9c e3 07 d7 ef 34 20 | 0c 00 64 d5 63 1f b1 99 29 80 fe 35 ec 43 23 95 | 6a a2 fc 57 a3 69 20 ea 94 fb aa 78 ee 5b 41 20 | 62 d9 4d ee fd 29 6e d9 f4 a1 15 cb 28 a0 f5 d3 | 5e bd 59 a6 87 61 99 4f 80 5d e6 36 36 11 e0 c2 | e5 c9 d7 3c 99 3b 27 4b f7 81 ca 42 93 ee a9 76 | e3 2e 24 6c 18 27 a8 24 04 ce 7c dd c7 a8 fd 5b | a3 04 bb 87 35 69 9f a6 83 11 9f de e4 40 52 5f | 29 00 00 24 4f 4f 97 a4 0f 74 20 cc 43 f4 64 ac | a1 3b a8 cc 16 af 62 fa 43 5b 11 20 24 9f 33 6a | 2d 6e 82 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 79 bb 2d d9 d9 21 50 1a 1a 14 0f | 62 ed ae c0 08 f2 03 40 00 00 00 1c 00 00 40 05 | c8 1f b0 a0 de 58 fc c7 c3 79 0d 4a c2 37 42 43 | 8a b6 69 08 | state #496 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb350012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35000d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d500 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #496 | libevent_malloc: new ptr-libevent@0x7fb340045ed0 size 128 | #496 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49684.976562 | resume sending helper answer for #496 suppresed complete_v2_state_transition() and stole MD | #496 spent 0.321 milliseconds in resume sending helper answer | stop processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34803f490 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 9f b4 c2 7a 9c 1f 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #496 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #496 | rejected packet: | f5 9f b4 c2 7a 9c 1f 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f4 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #496: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbbc0 | handling event EVENT_RETRANSMIT for parent state #493 | start processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #493 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #493 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49684.988753; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500375 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #493 | libevent_malloc: new ptr-libevent@0x7fb34803f490 size 128 "road-eastnet-nonat-241" #493: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #493) | ed 28 a4 bc 11 7c af 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 43 c9 b9 d1 39 88 cf b4 19 83 df 09 c8 d9 33 | 6a 66 ab 95 b0 dd 15 4d 5d 4a fa 5d 52 f2 94 c9 | 8c 6b 4e fd a3 be 7b 1e 26 3d da ae 4a c7 9d 27 | 63 37 11 7d f7 65 a5 40 e2 b8 e7 88 e2 a7 17 fe | 35 86 91 9a d8 ce fa 63 4d d8 5f 33 39 8b fd 0b | c7 66 ad d7 e3 69 0a d0 e8 2c 35 2b 87 c6 e8 d1 | 35 a2 6a bd 14 2b 17 e4 3b 63 91 15 e8 44 4a 0b | ee 35 18 44 31 9b e0 f3 11 2e f9 0a f8 94 2e e7 | 37 62 af 42 67 9b d9 c2 7a 1d 9a 74 9c 27 5f 4e | 6c 61 5b 8d 6f b6 26 7a 65 28 0b d8 63 b2 4d f2 | 4f 66 7e 68 e4 09 4f e1 36 c2 c4 fc b8 a8 0d bd | 8f 6c 26 6b 1b b4 27 de 4d 65 70 86 b8 d6 2d 91 | e7 12 ef a7 86 2f 17 c5 46 49 a0 b2 37 f9 08 9e | 05 44 0c 6d 93 fe 69 98 08 f9 28 75 1f 4f 91 2d | 39 9f 63 17 e0 d3 1a 4e 52 69 6b 52 15 77 3f 2f | 3e 88 cf 00 87 f9 bd f2 03 53 f2 34 f3 a4 6a 9a | 29 00 00 24 a6 a1 ba dd 86 99 b3 8f 47 4a 4d 8f | 4a 4e 2e 70 ee a1 39 80 4f 25 94 bc 3e 73 ee 31 | 55 0b 3a 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b ce a8 52 73 2a af 56 99 7a 11 14 | f3 b1 9c fe 91 8b 24 9a 00 00 00 1c 00 00 40 05 | 14 ee cd 8a 22 d5 80 d4 99 d7 ec c4 4c 96 10 11 | ff 51 59 09 | libevent_free: release ptr-libevent@0x7fb350035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbbc0 | #493 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 28 a4 bc 11 7c af 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #493 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #493 | rejected packet: | ed 28 a4 bc 11 7c af 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #493: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38400feb0 | handling event EVENT_RETRANSMIT for parent state #479 | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #479 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #479 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49684.99309; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003153 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbbc0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #479 | libevent_malloc: new ptr-libevent@0x7fb350035930 size 128 "road-eastnet-nonat-227" #479: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #479) | cf d2 c5 54 f4 1c f6 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 7f 14 60 4b 10 9d d5 d2 57 b0 91 8f 3f bc 64 | f3 21 66 f1 3b 94 f5 72 55 1b ed c6 dd 53 3b 05 | c0 1d dd be ad b9 bd d8 0b 5f 4b e3 1c 65 1f 4d | f0 ee 1b 33 c4 3a 9d de 12 12 f6 89 59 76 db 59 | 58 77 c4 51 cb 4f 4e a0 dc fb d2 f7 62 b4 a7 a3 | 1b 68 cb bb e9 09 d6 f0 e4 6b 8d 72 c7 c4 14 34 | 39 ae 8e 61 09 3a 83 2f f5 f4 c7 5f d2 2d b0 d4 | 26 d7 e0 79 26 1d 45 4b 13 c4 86 65 f4 ae 01 81 | 02 a6 0e b2 43 b5 c9 34 60 91 47 c7 ad 72 96 75 | c1 19 c1 36 df fe 89 e5 4a ed b6 37 c9 47 46 4a | ec 4d e3 1d 06 24 05 ec 83 47 39 85 ec 30 13 7d | 3c 3d d1 56 09 9f a0 06 ca 9a 1a b3 23 55 50 9a | b8 7d cc bd 04 23 e1 7e 80 5a 10 c7 17 c0 8f 7a | 89 c6 a1 6e 48 75 0a bf 79 1f 97 1f 66 26 95 b2 | 3f 11 75 2c 3f 93 e4 16 06 22 12 43 49 c5 4b bb | 85 1e 39 53 e2 84 3e 8e cf ad ff a8 7d 04 99 42 | 29 00 00 24 ce ca 8a 00 13 b6 bd c6 7f bf 18 48 | 13 5d 00 cd e5 1d be f3 d6 a7 2f 7b 66 35 3d e6 | f4 91 6b 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 e1 6d ff 62 21 60 0d e9 4e cd 21 | 6e a6 95 f9 84 a3 ab 9c 00 00 00 1c 00 00 40 05 | c0 97 f9 bf 8a bc 59 d7 d0 0f 34 34 05 ac 6e 13 | dc 84 e0 81 | libevent_free: release ptr-libevent@0x7fb3840266d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400feb0 | #479 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cf d2 c5 54 f4 1c f6 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #479 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #479 | rejected packet: | cf d2 c5 54 f4 1c f6 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #479: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344017ea0 | handling event EVENT_RETRANSMIT for parent state #461 | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #461 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #461 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49684.996381; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004507 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400feb0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #461 | libevent_malloc: new ptr-libevent@0x7fb3840266d0 size 128 "road-eastnet-nonat-209" #461: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #461) | 30 e3 71 39 78 d7 e3 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 73 72 eb a6 69 8c 9e 08 28 d6 16 78 8b f3 f1 | 10 b5 c6 3e 5a 68 ff ee f8 e9 ea 04 9a 96 07 cd | 19 7e 01 3e f6 8c ec 23 90 c5 34 cb 27 e1 d9 f4 | 83 f1 52 a0 20 79 82 b5 63 bf e3 1e 4c 8b e6 11 | 56 0c 8d 37 3e 34 a4 1e 35 3f f2 4f c6 52 63 33 | 1a 19 3a f7 47 1a 58 cf 14 be b6 13 3a ba 6a 7a | c2 7e 4a 7c 6b 24 bd 5d d6 f1 53 6b d9 1a c9 0e | b4 0c ad ca 0d 87 78 f9 58 81 24 7b 64 ae 92 0f | 11 e7 db e4 1c 12 40 ed e3 44 f4 22 a9 cb c8 e8 | 35 d2 0f 26 8c e9 f0 bd 79 b3 71 e1 56 b6 c2 ad | c3 25 0b 24 c0 9d 7c 39 2c c7 c4 5c 79 bb 71 e2 | 44 92 14 47 75 57 f7 30 ac 8e 27 b4 ce 61 8d 65 | 5b 3f 84 a2 85 6e ec 1f 9f 60 e7 ef bd 5d a7 fa | a6 23 27 f3 06 ac 82 f0 e3 4d 76 a2 d3 e2 92 c2 | 69 39 39 eb 52 01 f2 b3 9d c1 f3 c5 d2 36 e4 c6 | 40 e0 76 99 a0 7e 6e 0f 65 8c da 02 f1 c2 ad 1e | 29 00 00 24 90 76 1f 57 9b 42 3c 9c 17 4b 00 94 | e5 bc 1a a6 9f 85 30 49 d6 5f c0 4c ce 00 c3 85 | 0f 0e 5c ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 76 5f 86 b3 2d 97 ef 5b 1d 05 17 | f4 c4 b8 ec 0d 36 f1 03 00 00 00 1c 00 00 40 05 | 57 06 a0 ca 17 47 48 ab cc 80 4d 50 ec 37 d9 01 | a5 d0 9e bc | libevent_free: release ptr-libevent@0x7fb344039b40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344017ea0 | #461 spent 0.0948 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 e3 71 39 78 d7 e3 f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #461 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #461 | rejected packet: | 30 e3 71 39 78 d7 e3 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #461: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aacc80 | handling event EVENT_RETRANSMIT for parent state #304 | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #304 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #304 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49685.014654; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005943 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344017ea0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #304 | libevent_malloc: new ptr-libevent@0x7fb344039b40 size 128 "road-eastnet-nonat-52" #304: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #304) | a8 9e ad f8 7e d0 8f 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 65 f7 e5 5b 0c d9 66 1f 9e de 27 b7 a9 e5 61 | e4 fa 1d ab 7c 97 a1 bd 20 9d f3 a2 b5 27 bd 1f | 8f a0 e6 70 97 5a a5 25 66 20 75 9f 12 5d d3 39 | 9b 63 a2 db 2b 74 35 c0 72 13 97 27 05 c2 62 b9 | e3 8d 4c df 62 26 b2 ef 71 4f 57 9f 86 a7 ae 23 | 96 73 f6 29 74 fa 2e d9 85 44 9e f4 6e a1 bf c3 | aa ee d5 e9 ef ed b7 f6 19 80 49 92 25 03 a6 fd | 97 ad 05 c1 4c ee d0 28 55 8e 3c fe 56 3a de 43 | 58 54 9b db 87 cd a3 da 37 73 a4 bf 3c b5 ae e4 | 24 52 70 fc 3d a8 8c fa 47 49 00 40 14 e1 2e ac | c2 2a 40 fe b6 ab ac c0 48 61 8f e7 d0 5a d3 f9 | ee 88 91 3d 36 46 3b a6 d1 44 56 83 2a 21 0b 8c | bf 71 69 ea 58 fa fe b7 82 58 cb 6d 26 3b 79 12 | d5 7b af 2b 0b 68 46 9e 23 40 da 39 fc 30 e7 9e | 96 5b ef fa 83 ac 69 ef e9 6f 36 21 f5 e9 e9 e7 | 28 93 fa 84 b2 62 19 86 19 c7 09 bf 96 a9 13 fa | 29 00 00 24 01 38 84 c9 86 37 f1 ee b2 c5 1a 16 | 9c 76 d6 78 f3 8e 1b 3e 7b e2 b1 ac 57 81 00 ff | be 40 7b 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 4d a8 e4 29 87 92 f9 c9 e0 47 d4 | 8d 2b 33 0e 7e 88 7a bd 00 00 00 1c 00 00 40 05 | 14 10 d4 5f c4 9e a3 33 92 fb 64 77 06 27 8a 6c | e3 d6 b0 88 | libevent_free: release ptr-libevent@0x7fb3780407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aacc80 | #304 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 9e ad f8 7e d0 8f 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #304 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #304 | rejected packet: | a8 9e ad f8 7e d0 8f 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #304: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0549 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38800c4b0 | handling event EVENT_RETRANSMIT for parent state #414 | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #414 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #414 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49685.022935; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004985 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aacc80 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #414 | libevent_malloc: new ptr-libevent@0x7fb3780407f0 size 128 "road-eastnet-nonat-162" #414: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #414) | 9e d5 a6 6b e9 51 f5 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 17 ff 89 e8 3c 16 16 6a 13 a2 4a 6e d7 58 8c | 31 4a 5d a6 06 21 a0 a1 9e a4 d6 9f 9d d0 c9 ef | 81 a2 6a e5 e1 ce f7 5b 3f cb a3 39 af 4b 00 d3 | 8e ea 93 72 09 07 7e f7 07 70 f1 60 90 61 a3 52 | 45 df 81 dd 3b 9f 90 cc 5a ee 79 3a e6 e9 1c 8f | 3e 5d 20 51 b9 06 0a c7 eb 0e 7c 49 84 44 06 9a | 8a 7d 42 8a 3c 02 e8 20 6f 96 b9 43 e4 b6 78 25 | 2a 47 75 c2 a6 5e 09 93 6e 0a 52 61 7e 11 07 98 | e5 ed 70 aa 1a 26 50 15 8a 10 03 2b 04 12 5a 90 | df c8 9d 86 1f 6a 9b b1 b4 ef a4 64 93 b4 1c b9 | a7 2b 05 40 cd d6 1a ea f2 e2 7e 25 9c 0d 5f 1b | 71 7c a0 ab 46 0c fd 1d 5d c2 80 68 45 9c 03 04 | ba 22 16 f6 4e 43 40 2a 18 55 ee ba be b9 c7 28 | a3 19 30 1c 73 7f 70 9d 56 01 fc 31 bf 29 77 0b | f7 40 78 1c 68 3b 66 2d 2e 5b fb 5d 13 f6 84 1d | 63 eb 8e 4a f6 af 8f 02 43 3a 27 60 08 28 58 6a | 29 00 00 24 8a 22 da 4e 47 50 93 9e a6 73 51 af | 87 1e 05 a5 3e cb 07 7d 69 59 69 03 d3 ed 1d 7a | 33 b5 03 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba fb 8a fc 1d 3f b9 dc ba d7 c2 5a | de ae b7 6f 1b 1d e3 06 00 00 00 1c 00 00 40 05 | 6c ca d3 22 34 6c 0b 0a d6 9b 01 8f e9 fa 8a 7e | 51 47 3d 5a | libevent_free: release ptr-libevent@0x7fb38803c430 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800c4b0 | #414 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e d5 a6 6b e9 51 f5 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #414 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #414 | rejected packet: | 9e d5 a6 6b e9 51 f5 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #414: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #488 | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #488 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #488 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49685.038218; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002521 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800c4b0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #488 | libevent_malloc: new ptr-libevent@0x7fb38803c430 size 128 "road-eastnet-nonat-236" #488: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #488) | 37 96 ab d6 53 2a 39 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 6b 02 0e 68 a2 59 8e ba 48 ba 2f 59 6f a7 3c | 62 72 7d 7b ba 57 b5 e0 3c d9 c3 81 1f a5 eb a0 | f8 e0 f8 99 8d 15 bc f0 8d dc 6f 5a dd 58 1a 52 | b1 f2 33 db c0 8e 7c 70 83 0a 45 59 7c 30 22 a6 | 4a 21 8b 6d f6 eb 16 6a d6 89 72 dc 49 39 de 06 | cc 4d b2 f5 ec 39 f7 23 79 4b 87 b1 ad 07 ab b7 | eb 0d d8 4d 26 fb 93 ca cd 4a bf a4 0c 85 96 15 | f6 27 7e a1 82 03 aa 6b de 0f cd 15 f2 d7 a2 0e | 43 09 8a 10 1e 3f 10 cc a0 c3 3f de 84 91 b8 33 | fb 7f 27 17 12 4f 19 a8 95 31 dd 5a ae 2b f7 bf | a0 0e b0 af 11 39 af c9 5f a1 36 16 28 49 42 30 | 1e a5 ef c4 10 5d 29 3a 47 d6 e6 ec dc fa 0d fd | c5 f6 87 7a d9 cf 3f cd c0 47 6b 05 d4 2f 0b e9 | 27 07 f2 3c 1c ec 19 6e 68 a4 e6 aa 11 7d e2 91 | 40 12 52 80 36 b2 87 db 98 ff 4a 69 c8 e6 41 e0 | 2d e0 85 d9 a0 b6 39 d4 ec ac d1 39 5f ba 20 a9 | 29 00 00 24 dc e4 9b d4 65 6a e5 2d e1 02 7e 1d | 58 fd 85 52 51 90 f6 a3 d4 da ed 1b d4 69 62 73 | cc 62 0f e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf c6 06 73 dc 37 37 47 57 31 78 5c | d0 36 ae c0 4d 18 ea 5b 00 00 00 1c 00 00 40 05 | b3 8c 92 9f c3 4a f6 44 a7 cb 92 6c 4a 1a 77 59 | 02 36 0d d7 | libevent_free: release ptr-libevent@0x7fb37002eb80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #488 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 96 ab d6 53 2a 39 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #488 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #488 | rejected packet: | 37 96 ab d6 53 2a 39 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #488: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #462 | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #462 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #462 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49685.069527; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004585 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #462 | libevent_malloc: new ptr-libevent@0x7fb37002eb80 size 128 "road-eastnet-nonat-210" #462: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #462) | b3 aa 18 e3 bb 76 cd a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 e1 dd 76 b8 92 08 2e 86 ea 59 23 d7 a8 a3 c4 | 10 20 64 4d 1a 6e f6 be 88 38 70 1d ff a1 81 97 | 56 46 d0 11 ce c6 71 4d d3 b8 e9 f6 8f 98 00 29 | 10 68 fe 2f 6a fe 59 74 05 66 7b 78 d6 d0 be bd | fb fc 90 3b 61 ee 5a 02 67 1c cb 53 c4 30 e1 1c | e1 cf 60 fe b2 ba b8 12 9c c1 21 b7 9c a2 2e d3 | f2 85 29 0d c8 10 98 b2 a9 8d 09 29 1f fe 72 bd | 6f ac bd 80 e6 e9 9d 07 a0 84 25 09 ab 49 d1 fc | a4 e5 0d 0e 5a 9c 8e d8 0e 96 4d 74 82 a0 b4 18 | 38 39 81 2c 56 26 db 6b e0 e9 32 19 24 e6 ac f3 | 8a 50 27 76 e7 46 84 40 39 2a 33 e3 46 30 98 1e | a4 e6 6f e2 bf e7 be a6 d5 b2 77 f8 b0 8c 25 cb | 3f 99 0a 63 88 e2 f4 8e b0 ed 00 10 7f f7 a6 31 | 7b da 9a 1a 53 83 49 e7 c5 ae 8b 25 41 9e cd 02 | 64 ab a9 c7 ab 71 01 ef 57 dd 6f c5 35 5b 12 e5 | 9c 28 f2 35 96 11 0c e1 05 5e 94 47 29 58 9d 96 | 29 00 00 24 9f cd 6b 85 44 66 e6 2e a2 be db 56 | e9 91 ac b0 be 57 bf 5f a7 03 66 4a a0 9b 90 be | 3c 13 94 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 1b 11 78 68 c9 76 e3 37 8a 0f 7e | ca ac 37 4e 36 55 96 e1 00 00 00 1c 00 00 40 05 | 75 7d 89 5c 82 a5 9e b6 a0 43 f2 ed 22 d9 e8 25 | c0 74 c1 73 | libevent_free: release ptr-libevent@0x7fb370035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #462 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b3 aa 18 e3 bb 76 cd a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #462 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #462 | rejected packet: | b3 aa 18 e3 bb 76 cd a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #462: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a903c0 | handling event EVENT_RETRANSMIT for parent state #480 | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #480 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #480 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49685.088869; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003345 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #480 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 "road-eastnet-nonat-228" #480: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #480) | a0 d0 03 15 77 7b 55 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 81 bc 92 43 cc 20 cb 32 dc a3 83 a6 05 ad 00 | 98 6a 1a f3 68 9d 6f 0d 87 ec e9 f6 9a 02 0f 25 | 1f da 1c 78 f1 67 23 e0 e2 7f 61 43 d9 1f 5f b6 | e6 b8 f2 3c ff c1 08 c4 9f 6c 2a bc 8e ba 45 54 | 84 19 36 a3 17 42 a8 a4 75 a3 82 0a 1c 91 e1 7c | b0 f8 bf b5 fa 9f 83 82 f9 d4 70 3e e1 df 4f 6b | 6b 5d aa 23 00 ad 45 7c d2 ab 83 9c d3 c8 48 f4 | a4 1e f5 9c 86 61 b3 f2 25 c7 70 01 ac 67 7a b7 | f7 4a 5c 1c 8e 8e 59 fc 33 71 85 33 b4 10 65 ea | b8 c2 b9 0f e6 63 11 67 85 ad 57 f7 4e c8 76 85 | f8 97 7d db 2b b8 ed 1b 8b 66 54 1e 04 fc 55 3a | c8 bb b6 a6 8a 5c 4e fe c9 53 36 0e 42 74 0e b7 | bd d3 59 78 0c df 94 62 fd c2 21 a4 0c fb 4f 6c | 1c 91 d6 a4 ec 87 92 d0 8f 1e 01 93 bd 89 c0 fe | 71 01 53 5c 6f 46 39 61 8b 59 d6 4d 65 9b d8 a3 | 15 32 57 28 19 30 26 21 35 36 08 9b 79 f2 1a b0 | 29 00 00 24 c8 ff 1d 8a 8a c7 55 8b 0d 6e 9c 13 | 67 dd f9 00 d4 15 c8 78 b6 24 b1 bf aa 08 b9 85 | 7a e8 a9 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb af 61 69 a2 a5 79 11 dc 03 2e 27 | 8e 1f c8 4a f0 b2 47 27 00 00 00 1c 00 00 40 05 | 5a ba 74 8a e7 0f 7a 9b 13 6d 0a ce d0 eb db 09 | a2 8a df 80 | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a903c0 | #480 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 d0 03 15 77 7b 55 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #480 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #480 | rejected packet: | a0 d0 03 15 77 7b 55 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #480: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380027d70 | handling event EVENT_RETRANSMIT for parent state #415 | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #415 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #415 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49685.090134; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005152 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a903c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #415 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-163" #415: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #415) | 65 fc 55 c7 f1 44 1e 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 9b 11 f8 2e b4 b5 c5 30 9b 3d a0 a2 4b 27 41 | f3 d8 72 20 8a 56 0a 05 ca 4d 84 e6 cb f6 3e 40 | 63 3e 65 dc a2 c0 87 47 ce 3b 5e 72 88 1b 50 31 | 15 c5 cf 6b 4a 2f c7 ec 02 24 2b 5b d8 13 58 82 | ef 96 ce cf 1b c6 83 84 dd 4e ef ff 6c f9 de 4b | fa f0 63 3e cd 62 10 03 38 09 9e db 49 54 15 3a | a8 3d 15 df b8 ef fb f6 60 02 a0 d4 fd 2e 9b e9 | ce 3a 0e 92 13 6c 3b 4e d2 2c 44 8a 4a 9a 05 6f | c3 bf 63 16 b0 c4 63 88 ff 02 84 93 54 65 74 42 | 97 c9 d1 95 9c 76 cf c6 11 6e 97 99 50 ea 6c f5 | 6f f0 5c 9c c9 57 a9 e3 41 19 f6 b0 38 a3 e5 ef | 84 44 8a 93 ae f1 ef 1d 2e 53 2b d3 a8 41 d5 27 | 64 64 ae fa 1d fd ea 61 22 f5 cc 34 a6 a2 ea 37 | 88 8a b9 05 5f 00 cd a9 3b c3 f2 31 36 31 fa 53 | 3d ba 7c f3 35 4b 65 ab 19 3c 20 1a b3 c4 2a ca | f4 c6 08 71 62 bd 13 1a f6 9c 40 a8 5d ea 27 a8 | 29 00 00 24 e8 b8 58 d7 ae 38 da 44 20 ee 1e 02 | 80 cb 41 b6 8f 71 2c 96 9f ff be f1 a6 fa a0 4e | 6d 67 74 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 e0 03 d8 e5 8b 46 47 10 2c a8 6c | 82 9e b3 1d 1e 26 96 28 00 00 00 1c 00 00 40 05 | bb 40 b0 02 70 34 84 30 58 79 6d d4 87 e5 1d 82 | 6b ed a6 65 | libevent_free: release ptr-libevent@0x7fb380043300 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380027d70 | #415 spent 0.0987 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 fc 55 c7 f1 44 1e 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #415 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #415 | rejected packet: | 65 fc 55 c7 f1 44 1e 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #415: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0399 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354012630 | handling event EVENT_RETRANSMIT for parent state #305 | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #305 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #305 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49685.091371; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007596 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380027d70 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #305 | libevent_malloc: new ptr-libevent@0x7fb380043300 size 128 "road-eastnet-nonat-53" #305: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #305) | 0e ad 9d c2 5e 8b 6a 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f e9 9f 5a 6d 09 7a 5d 23 c1 f2 37 ec ac 20 ff | 0b 05 30 7f 53 42 af cd 03 b4 6f 3e 30 98 76 c7 | f6 6d 6d 12 6f 8b e0 b3 ea 9f 1c 72 a6 90 d8 7b | c5 96 6d 18 3e 75 5f 76 31 a1 d4 8e 3c 37 16 33 | 4b dd 74 20 e8 c4 62 66 2a 3f ae 2f 41 fd 91 9d | 82 99 62 7a b3 d1 ba 05 ec 0f 82 e6 50 45 b8 02 | a6 bb b5 5a eb 4b 5a 37 8e aa cf ae a4 3c 1d 53 | 50 52 15 71 96 99 84 38 c8 90 39 55 a5 f6 b3 e4 | fd 1f be 6b e2 f1 ec 6b de 7b d5 b2 c2 99 77 3a | 99 91 64 fd 16 0c de 9a 77 95 51 ab fa 63 18 46 | 7f 05 f1 01 08 4a 40 52 ce 73 f7 5e 69 b6 5a cc | 4f 80 84 49 75 3b fb a8 21 4b 60 95 55 81 f4 0d | cb 05 bd e3 26 c4 5a 85 f3 a4 be ed 0d bf dc 15 | 6d 89 c4 7e 34 fc cc cd 95 5c 1d d7 12 73 97 3c | b9 13 4a ef 01 3e 06 0d bc ac d0 d1 a5 d2 76 b5 | 0f e8 f3 1a 11 93 b0 3e ca db 92 a3 66 d7 f8 e1 | 29 00 00 24 f3 38 4c 4d 23 45 96 5c 15 55 c7 5a | 82 60 67 82 ca 1f 2d 10 e7 40 18 d9 8a a9 22 da | 5f 97 93 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 2a f3 b2 21 79 dc dd 37 78 74 cf | d5 e0 cd fd 06 29 e6 7b 00 00 00 1c 00 00 40 05 | 89 f1 13 5f 51 69 37 8e 62 27 27 24 a2 bd 48 85 | 3c 78 e4 8e | libevent_free: release ptr-libevent@0x7fb34802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354012630 | #305 spent 0.0852 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e ad 9d c2 5e 8b 6a 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #305 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #305 | rejected packet: | 0e ad 9d c2 5e 8b 6a 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #305: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0401 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b05240 | handling event EVENT_RETRANSMIT for parent state #245 | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #245 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #245 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49685.10162; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.006216 exceeds limit? YES "road-eastnet-nonat-245" #245: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-245" #245: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #497 at 0x557d46b21040 | State DB: adding IKEv2 state #497 in UNDEFINED | pstats #497 ikev2.ike started | Message ID: init #497: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #497: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #497; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-245" #497: initiating v2 parent SA to replace #245 | using existing local IKE proposals for connection road-eastnet-nonat-245 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 497 for state #497 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb354012630 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #497 | libevent_malloc: new ptr-libevent@0x7fb34802a950 size 128 | #497 spent 0.0689 milliseconds in ikev2_parent_outI1() | RESET processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #245 ikev2.ike failed too-many-retransmits | pstats #245 ikev2.ike deleted too-many-retransmits | #245 spent 2.58 milliseconds in total | [RE]START processing: state #245 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-245" #245: deleting state (STATE_PARENT_I1) aged 64.008s and NOT sending notification | parent state #245: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #245 "road-eastnet-nonat-245" #245: deleting IKE SA for connection 'road-eastnet-nonat-245' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-245' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | crypto helper 8 resuming | crypto helper 8 starting work-order 497 for state #497 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 497 | in connection_discard for connection road-eastnet-nonat-245 | State DB: deleting IKEv2 state #245 in PARENT_I1 | parent state #245: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 497 time elapsed 0.000565 seconds | (#497) spent 0.568 milliseconds in crypto helper computing work-order 497: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 497 for state #497 to event queue | scheduling resume sending helper answer for #497 | libevent_malloc: new ptr-libevent@0x7fb34c03f570 size 128 | crypto helper 8 waiting (nothing to do) | stop processing: state #245 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb338046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b05240 | in statetime_stop() and could not find #245 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-245 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-245" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-245' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-245" | stop processing: connection "road-eastnet-nonat-245" (in initiate_a_connection() at initiate.c:349) | spent 0.0608 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #497 | start processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 497 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #497 | **emit ISAKMP Message: | initiator cookie: | 28 b5 38 f6 69 3c dd 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-245 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 04 4f fe 15 c7 2a a9 dd 3f 1e c4 af 27 5d f3 d2 | ikev2 g^x be f7 13 da e4 cd 00 79 29 61 5f 71 06 40 ec 4d | ikev2 g^x 5b 3c 6a 08 8b 9a 2f 7d 1c cb b0 e7 92 b6 f3 99 | ikev2 g^x d5 a0 ee 16 30 44 37 37 a1 b0 11 d5 bf c1 2a b7 | ikev2 g^x f5 d1 e8 e7 c9 c5 fa 46 9e 9f 3a b8 17 a3 bb fa | ikev2 g^x 54 7b 20 13 28 1b f7 09 b2 95 cc 2b 5d f4 60 59 | ikev2 g^x 43 48 23 26 2f ff 03 e2 92 b6 e4 28 ce 3a 0e b0 | ikev2 g^x 61 13 0a de 56 e6 23 f3 78 da d1 d7 d1 36 d7 28 | ikev2 g^x c6 40 4f d5 36 46 dd 50 a2 1e 26 c4 f5 81 8c a1 | ikev2 g^x f5 29 b8 66 19 89 39 ca 34 48 2c b5 7e 66 e5 bf | ikev2 g^x 86 9d 6e 91 75 02 c6 e8 9c 42 e7 98 64 aa 15 f8 | ikev2 g^x 6c 03 28 e6 79 39 e1 5e 40 0e f9 55 f0 a7 e0 83 | ikev2 g^x fa bb b8 03 f0 19 b9 6c 46 69 2b 63 42 39 b5 e4 | ikev2 g^x 3d 0b 8e 6b 21 0c f2 48 0e 67 57 08 dc 21 c5 f4 | ikev2 g^x 1a 4b 05 96 97 80 b1 ee 12 7e 9f 47 8d c8 b6 e1 | ikev2 g^x 5b 8f 86 2e 8f 92 b6 42 a3 65 04 7b ab ba 17 50 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce bb a3 f2 ad c6 d3 d5 2f 68 33 8b a0 e0 e2 16 25 | IKEv2 nonce 72 ec 6d 1a 07 9d 1d 9e dd 96 6a c8 4e 10 b2 ba | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 28 b5 38 f6 69 3c dd 2d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f5 | natd_hash: port= 01 f4 | natd_hash: hash= 83 bb 68 12 ef 53 e2 45 10 bb c5 e2 24 4d b4 aa | natd_hash: hash= b9 d2 2c 73 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 83 bb 68 12 ef 53 e2 45 10 bb c5 e2 24 4d b4 aa | Notify data b9 d2 2c 73 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 28 b5 38 f6 69 3c dd 2d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 18 cd c3 7e 31 14 45 db 85 92 8b 2e 4a 8c 9b c9 | natd_hash: hash= 08 95 b5 b9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 18 cd c3 7e 31 14 45 db 85 92 8b 2e 4a 8c 9b c9 | Notify data 08 95 b5 b9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #497 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #497: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #497 to 4294967295 after switching state | Message ID: IKE #497 skipping update_recv as MD is fake | Message ID: sent #497 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-245" #497: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.245:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #497) | 28 b5 38 f6 69 3c dd 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 04 4f fe 15 c7 2a a9 dd 3f 1e c4 af 27 5d f3 d2 | be f7 13 da e4 cd 00 79 29 61 5f 71 06 40 ec 4d | 5b 3c 6a 08 8b 9a 2f 7d 1c cb b0 e7 92 b6 f3 99 | d5 a0 ee 16 30 44 37 37 a1 b0 11 d5 bf c1 2a b7 | f5 d1 e8 e7 c9 c5 fa 46 9e 9f 3a b8 17 a3 bb fa | 54 7b 20 13 28 1b f7 09 b2 95 cc 2b 5d f4 60 59 | 43 48 23 26 2f ff 03 e2 92 b6 e4 28 ce 3a 0e b0 | 61 13 0a de 56 e6 23 f3 78 da d1 d7 d1 36 d7 28 | c6 40 4f d5 36 46 dd 50 a2 1e 26 c4 f5 81 8c a1 | f5 29 b8 66 19 89 39 ca 34 48 2c b5 7e 66 e5 bf | 86 9d 6e 91 75 02 c6 e8 9c 42 e7 98 64 aa 15 f8 | 6c 03 28 e6 79 39 e1 5e 40 0e f9 55 f0 a7 e0 83 | fa bb b8 03 f0 19 b9 6c 46 69 2b 63 42 39 b5 e4 | 3d 0b 8e 6b 21 0c f2 48 0e 67 57 08 dc 21 c5 f4 | 1a 4b 05 96 97 80 b1 ee 12 7e 9f 47 8d c8 b6 e1 | 5b 8f 86 2e 8f 92 b6 42 a3 65 04 7b ab ba 17 50 | 29 00 00 24 bb a3 f2 ad c6 d3 d5 2f 68 33 8b a0 | e0 e2 16 25 72 ec 6d 1a 07 9d 1d 9e dd 96 6a c8 | 4e 10 b2 ba 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 bb 68 12 ef 53 e2 45 10 bb c5 e2 | 24 4d b4 aa b9 d2 2c 73 00 00 00 1c 00 00 40 05 | 18 cd c3 7e 31 14 45 db 85 92 8b 2e 4a 8c 9b c9 | 08 95 b5 b9 | state #497 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34802a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb354012630 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b05240 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #497 | libevent_malloc: new ptr-libevent@0x7fb338046040 size 128 | #497 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49685.102868 | resume sending helper answer for #497 suppresed complete_v2_state_transition() and stole MD | #497 spent 0.404 milliseconds in resume sending helper answer | stop processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c03f570 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 b5 38 f6 69 3c dd 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #497 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #497 | rejected packet: | 28 b5 38 f6 69 3c dd 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f5 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #497: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344018460 | handling event EVENT_RETRANSMIT for parent state #416 | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #416 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #416 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49685.151041; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005311 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00cc10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #416 | libevent_malloc: new ptr-libevent@0x7fb34c03f570 size 128 "road-eastnet-nonat-164" #416: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #416) | 5d bf 34 43 fd eb 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 9c 12 61 6e 55 5f 3f e9 df f9 16 83 d1 25 2a | 72 5f a1 78 f7 87 25 3a 22 d7 65 e6 11 d9 d3 59 | e3 ba 0c 77 63 47 38 eb 2b 7e 21 79 54 43 77 67 | 7d 43 26 41 55 e2 a8 b7 fe 98 ba 7e ee 6e e7 d1 | f4 f4 66 e8 1d dc d6 4c 00 81 99 f5 5a 7b 73 a7 | 30 2a 46 7a 31 1a a2 5d 7f 98 25 46 aa 6e fe 80 | f5 47 c9 6c 4b 73 63 fa cd 88 eb 14 22 c8 b1 b2 | ad 5f b2 f2 36 1e b4 11 ad 9a b6 4a 8b 3e c1 87 | 99 5d 71 91 57 ac 82 f2 a3 ed 29 f1 0e 50 36 50 | 84 2e 3a 51 9c b6 89 41 dc e0 0d 62 c7 07 fd 92 | b2 9d 62 79 ea 78 ed 7f ed 48 ed 1d 98 d3 08 ff | 02 b4 3e 75 4f aa f5 e9 04 8d 83 d6 4c a8 75 42 | 31 a1 15 df b2 8a e4 30 1f 81 68 86 a3 e6 e3 23 | 56 ac 18 47 57 cf 03 de 91 03 0e d5 5d 28 a8 63 | aa 5c 8c 97 5e 5c eb 84 7c 09 fb 47 84 e9 d6 18 | 63 4d 10 b9 7d 4e 26 06 3f 25 b1 aa e9 d4 6c b6 | 29 00 00 24 b4 c4 67 16 b9 c2 e8 af d8 82 12 ab | bc d9 b4 36 b0 6a ad c4 e5 8c 60 6e da e3 9f 02 | d5 5c 1a 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 19 76 97 4c b0 23 bd 31 57 aa f9 24 | a0 38 a6 39 12 13 22 3e 00 00 00 1c 00 00 40 05 | d7 f1 41 97 86 a8 54 0a 0b 1f 8a 34 7f d0 a2 86 | ea 0e a2 fa | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344018460 | #416 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d bf 34 43 fd eb 2e 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #416 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #416 | rejected packet: | 5d bf 34 43 fd eb 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #416: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac3ec0 | handling event EVENT_RETRANSMIT for parent state #489 | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #489 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #489 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49685.155332; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000807 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #489 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 "road-eastnet-nonat-237" #489: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #489) | 74 5a 3a 8b 71 1a cc fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 40 61 fd 1b 72 e8 67 07 d1 75 c8 79 f6 15 bf | 67 b1 a9 f3 47 1b 5a 9e 7a 16 95 64 09 96 72 95 | 1f e3 f8 5f 52 87 20 fb 61 9b db 76 dc 1e b3 ce | 79 87 62 5c 6c ce 2b 50 8b 94 05 b2 fd 25 84 04 | b4 15 bc 02 70 ed e7 01 0e 47 78 fa 99 0f 24 d8 | 6d 25 42 58 57 e1 37 d4 81 eb 71 fc 2c 93 fa a4 | c7 e3 ed 35 8a 44 47 43 96 45 a6 cd a3 83 61 0f | 10 8b 91 8a 9e 26 b5 05 80 74 cc cf bd 96 a9 68 | ec 71 d7 24 8f 0e c4 37 01 d3 fc 0e 4b 59 1a e8 | 44 25 f9 54 85 60 35 f6 be ce 52 66 75 73 a9 9b | 5c c3 e1 cf 01 12 70 63 56 6d a7 e8 18 d9 6b 45 | de 75 11 c2 b6 ad 37 d5 3d 52 a7 75 84 78 8c 7f | 86 51 7e 50 9f 10 72 bd c2 69 ef b3 ad 19 2b a0 | 12 77 de 7a 6b 6d 21 bf fd 3d 7b 00 2f 59 e3 b9 | d0 af c2 b1 28 3c da ec de 08 be a1 d1 4e 94 57 | 47 99 d9 10 35 e0 60 cf 3d 10 4e cb 1b b3 b4 f7 | 29 00 00 24 40 6d 68 58 c0 2a c7 cb 28 ac 6f c2 | e6 6e 2c b5 98 00 fd fe 6e 20 dd ca 12 44 3b 53 | ff 69 1e f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 46 ab 03 11 7d bc a6 76 5d 5e 81 | f5 21 84 26 13 ce 73 a7 00 00 00 1c 00 00 40 05 | f1 f1 80 9f 1b 76 8c da 90 0c 48 79 e2 c4 ce d3 | 45 3b 5d 95 | libevent_free: release ptr-libevent@0x7fb384027b30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | #489 spent 0.0986 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 5a 3a 8b 71 1a cc fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #489 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #489 | rejected packet: | 74 5a 3a 8b 71 1a cc fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #489: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0414 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #494 | start processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #494 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #494 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49685.158597; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500857 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #494 | libevent_malloc: new ptr-libevent@0x7fb384027b30 size 128 "road-eastnet-nonat-242" #494: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #494) | 13 d2 ce 8c c5 a0 08 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 2c 3b c1 c9 27 85 62 17 d7 83 f4 4b 2e 0e 16 | e2 03 04 ad 7a 8d 40 02 d4 34 9d 1b d3 c9 18 6b | 41 26 bf 10 de e3 e0 e1 0e ef 27 5f e0 e8 78 57 | b0 c9 a6 38 de ce 8a 7c 37 31 11 56 7d 62 bb 8e | c9 f9 f5 6c 82 0f ba cd 3f af 70 4e 17 32 64 c9 | d5 e6 2c 41 27 6e 25 48 eb 43 50 ea a4 34 26 c4 | 56 d9 54 ab 57 40 f6 c1 9c 20 1b 06 22 84 03 8b | e5 53 55 fa 3d 80 8b 5b c2 25 82 15 35 94 6c d0 | bb ec ab 60 22 1d 87 23 e3 9e ac fc 16 ce 42 3f | ba 0d 8d 04 b9 e7 b2 de 46 3e 4b b3 83 4d ca 89 | e2 a0 d6 38 51 9a 05 e2 dc 57 8c 52 b9 1a fa 47 | 7e 1e 80 51 ac cf 77 c1 e4 be 78 0f 3d a1 ce 56 | 23 61 ff 3d 67 82 ef a5 20 d8 a8 62 8a 37 d6 a0 | 87 df 7e 30 b4 77 c6 c9 19 64 23 a5 4f 30 28 ac | 43 56 89 18 4a 88 a5 5e d6 97 45 97 2d bb 34 28 | 33 0f 79 c6 b2 6c 6b 62 1d d3 42 70 92 9f 6e 55 | 29 00 00 24 86 c8 ae 9a dc 82 47 ae 63 a3 d2 9c | fc 56 5a fd b5 a1 94 8d 79 cd 12 87 5b f8 39 1c | 72 7a 80 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 4f 14 68 3f 9f 2d 22 c7 c5 d4 82 | fb 7c 5e ae ba 6a 24 66 00 00 00 1c 00 00 40 05 | bc 9f 5c d1 bc 22 73 c4 89 e4 5f 13 b2 ba 1c 19 | 38 03 1c b3 | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #494 spent 0.0847 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 13 d2 ce 8c c5 a0 08 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #494 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #494 | rejected packet: | 13 d2 ce 8c c5 a0 08 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #494: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0398 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370012bf0 | handling event EVENT_RETRANSMIT for parent state #306 | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #306 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #306 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49685.168847; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005434 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #306 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 "road-eastnet-nonat-54" #306: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #306) | fd d2 63 50 0e 6e 1e 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc f6 1e 22 b4 91 3a 68 1f d1 67 6d 28 c8 f1 bf | e2 6e 14 07 e3 24 35 86 32 c0 3d 31 76 0e 87 74 | f9 3c 48 85 fb a5 36 8c 2d 66 01 91 c5 ea 8c 52 | 2c 54 17 a9 6d 05 2c 50 21 08 25 54 8a 1b be 0a | 1d bd df b6 06 bd 44 6a d2 67 92 4c 02 bb 81 0c | c5 ff 14 e5 24 16 2f 34 f8 b9 eb 90 9f 21 2d 2e | b4 e3 0a 67 2a 94 b3 b5 79 5e 99 67 ad f2 05 03 | 3c 2d de 97 30 2e 1c 04 bc c1 21 b5 15 d2 d7 d9 | ea a8 e1 e4 5e c5 d4 35 2f fe 33 59 95 e2 b7 3c | 23 52 f4 04 24 af 5a 95 09 7f 61 6c 7a 9b e9 50 | d2 38 26 f9 d3 19 e4 0a 3c be ac cf c6 ff b4 45 | b0 35 a0 dc ec 70 3d 13 ab c2 8a 53 0d 47 68 05 | 67 66 c8 1a af d5 d2 45 a5 c1 6e df ea 2b 64 70 | 05 da 5e 15 ac a3 ed f4 40 10 0f 5a 84 40 9e bc | d6 87 16 fd 3f a2 ff 39 19 ba 66 6d 2d e9 93 fd | b9 22 df b5 78 f4 f7 04 ee c7 91 83 7d a9 ca f1 | 29 00 00 24 c2 6f b9 fd fc 4f db 1a 3d 3f c0 a7 | af 7a 63 dc 70 8f 4c 18 81 55 af 15 16 2b 00 41 | 32 ac cf 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 87 47 9a 56 3f e1 15 1e 01 4b 7f | bb 95 0e 04 49 a0 88 16 00 00 00 1c 00 00 40 05 | 0c f3 ae 84 0d fd 98 31 4d e7 cb a5 de d2 0b 07 | b0 31 98 21 | libevent_free: release ptr-libevent@0x7fb35c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370012bf0 | #306 spent 0.0869 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd d2 63 50 0e 6e 1e 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #306 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #306 | rejected packet: | fd d2 63 50 0e 6e 1e 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #306: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350012bf0 | handling event EVENT_RETRANSMIT for parent state #463 | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #463 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #463 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49685.199122; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004092 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370012bf0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #463 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 "road-eastnet-nonat-211" #463: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #463) | 82 4f 79 37 d2 0d 41 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 90 64 a0 3a db 52 d6 c6 b4 21 5d 30 95 90 4d | ec 3e 65 f9 a3 2a c0 c0 7d e8 b2 f7 1e 08 f4 cc | 30 5c 17 eb a6 d5 4e 6e 17 f4 ed c0 bb f3 91 4e | 29 c8 3b 87 04 44 02 f9 0c 4c 73 bd d1 0e d4 bf | c3 01 38 a2 ee a1 61 19 01 62 c9 01 0a 14 69 dd | 59 d3 14 b1 8b 13 6d e7 0f 1d 11 59 11 9b 90 f3 | aa 66 ef 87 af 13 48 7f 6e c1 0d b9 f9 71 ad 9d | fd 12 e0 bc 30 d7 16 13 c9 f0 f8 64 57 36 fa 5b | d1 d8 74 64 e5 de 63 84 ef e1 12 12 26 93 3e 5c | b3 7f 8e 2c 1b eb d2 40 f2 01 5a e7 a8 30 ce b1 | 5c 5e 42 a8 26 40 52 c4 dc ea 04 68 87 26 50 e6 | 46 ae 37 b9 e4 fe 3f ef f2 8e a4 4f 04 25 af 76 | c9 39 80 05 08 fd ea 60 66 c5 24 89 72 f4 32 ff | ed 8b 39 48 50 c3 c4 68 91 e7 fc 82 bb 80 ce 9d | b8 47 ce dd c6 cc 21 8c 6f 88 e2 73 75 00 d9 09 | 84 88 f6 ce 7e 64 f7 42 86 d8 a7 50 3c 43 db 24 | 29 00 00 24 4c d8 7a cc cf f5 14 f0 01 a0 b3 f6 | 54 e1 4b f5 78 b9 2e d9 dd c8 bf f8 13 79 83 13 | b9 47 db df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 0d e0 3b 3f 2d f3 17 7e c2 11 72 | 87 7f c1 e4 a0 63 0f 3f 00 00 00 1c 00 00 40 05 | e9 2f a4 cf 6a af 14 cf 3c 1b bf 7a 8b a2 e8 94 | b0 6c 66 23 | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350012bf0 | #463 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 82 4f 79 37 d2 0d 41 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #463 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #463 | rejected packet: | 82 4f 79 37 d2 0d 41 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #463: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388009ed0 | handling event EVENT_RETRANSMIT for parent state #481 | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #481 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #481 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49685.204404; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001527 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #481 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 "road-eastnet-nonat-229" #481: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #481) | e8 f0 49 b6 6a 16 76 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 5b 3d e6 1f 63 af 92 47 ff bb 34 96 d0 88 24 | 67 3c e1 47 18 9d 62 8e d3 a4 9d b7 75 51 2f 4d | c5 c0 85 26 a0 ef 6b 42 e3 31 89 58 06 3e 3f 70 | 40 68 5f 34 02 73 08 9e 17 dc ee 6e ae 64 70 e1 | 29 5c 9e 3f 09 58 a9 16 14 23 bb 74 7b 7f 22 34 | a9 d6 3f fe 74 0f 40 5a 32 4d ac 87 fc 80 7b d4 | 2d 54 ec f5 ce b0 c6 dd a4 dd 82 14 e2 9a 36 7e | 86 de 04 4a c2 4a 3a 27 d9 82 5e 6e f1 1d d8 3d | 86 d1 82 99 be f9 63 b2 56 5a 40 42 2e 8f 30 eb | fd db ce cc 5a ac 0e 49 65 64 01 18 b4 1e 60 8d | 74 bc e9 b7 46 2e cb e0 1e 2c 67 dc 3f e9 f4 39 | 35 52 90 76 39 0a f3 d2 ac 0b 00 19 f2 ca 97 20 | b7 c6 bb 7d a2 97 ba e5 14 74 e5 ea 2f 4e 4b 3f | 08 53 d9 be 3b dd af 2f 8f 10 fd 09 08 1e b3 13 | 6a 37 e4 ce 19 dd d9 84 13 76 b0 6f 6f 43 48 f7 | 01 a4 a9 0f 9d fb 63 aa 49 8a 2a b5 59 32 b2 69 | 29 00 00 24 ba a6 3b 25 9f a9 3f 06 4e ea 48 38 | eb e2 25 25 ca e3 dd 6c 01 6e 12 39 f8 cf ff e2 | 6d 18 2b 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a ef 98 84 e9 40 8f 9c 0a de 34 0d | 25 31 92 b5 ca c8 92 af 00 00 00 1c 00 00 40 05 | 81 a9 90 20 77 ac 91 2d 88 99 0f 36 2d 43 7d f6 | 2e 36 29 48 | libevent_free: release ptr-libevent@0x7fb38801d010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388009ed0 | #481 spent 0.0965 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 f0 49 b6 6a 16 76 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #481 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #481 | rejected packet: | e8 f0 49 b6 6a 16 76 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #481: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350018460 | handling event EVENT_RETRANSMIT for parent state #417 | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #417 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #417 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49685.210691; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004877 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388009ed0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #417 | libevent_malloc: new ptr-libevent@0x7fb38801d010 size 128 "road-eastnet-nonat-165" #417: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #417) | d9 e4 18 5f 59 64 b9 ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 fd ed 03 c4 13 a8 51 65 6c f8 7b f8 e0 2d 89 | 59 12 b6 d0 fa 5d d3 b6 48 1f 05 4f d0 37 4e 96 | b6 b0 a9 07 5a 84 b2 22 72 c2 6e e4 2c 16 e8 fb | c8 92 b8 74 ce 3f 40 30 b5 60 8c 95 d1 d0 42 81 | 96 4a 3e 9a 08 06 af be 4a d9 72 15 c0 c3 46 78 | d0 1e d0 10 cd c4 48 fd 2d ac c2 45 66 8d 26 84 | dc ff cb c9 a3 60 b9 5c 03 1c 63 7c ad bd 60 96 | ce 2e d7 57 49 16 93 e7 43 2d b6 d5 b4 ce 5b 3b | 96 51 3a 88 ff 32 38 dc 5f 0b a8 74 a0 1a 49 87 | b5 db a2 1f ed 10 a6 d0 7a 48 4a 90 79 4e 5a f9 | 2b 8b 33 88 7e f6 9a 82 54 47 b3 ae d3 d5 19 8e | 35 94 b5 a7 07 70 69 91 1e 2e 08 a0 fa fa bf a8 | 09 5a 06 2f 9a 90 75 b5 b1 fe 11 2e 8d bc e2 8f | fc 8a 4c 02 b2 2c 51 5d d4 fd cc 21 3e c1 63 73 | 47 88 57 72 c3 e3 90 eb 42 71 fd 34 f9 5d 5f ad | 35 a7 22 19 95 d8 2d 82 e5 c2 0e d7 d8 88 22 f6 | 29 00 00 24 df 2c 07 75 0e bd bd 78 6f 85 ca 62 | 53 2e a0 29 e4 f9 3b 0b 22 fe c0 44 7c 40 c5 a3 | 8b 56 a4 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 33 f3 05 bf ce a7 d8 4f e5 99 24 52 | 75 47 3a d4 7d 71 ad 77 00 00 00 1c 00 00 40 05 | 01 69 5d 3d 4a 00 3f a4 76 63 f4 90 ae 45 6d 8b | 22 6e e0 18 | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350018460 | #417 spent 0.0982 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 e4 18 5f 59 64 b9 ab | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #417 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #417 | rejected packet: | d9 e4 18 5f 59 64 b9 ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #417: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0525 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a82ac0 | handling event EVENT_RETRANSMIT for parent state #246 | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #246 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #246 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49685.23398; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.005745 exceeds limit? YES "road-eastnet-nonat-246" #246: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-246" #246: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #498 at 0x557d46b22600 | State DB: adding IKEv2 state #498 in UNDEFINED | pstats #498 ikev2.ike started | Message ID: init #498: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #498: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #498; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-246" #498: initiating v2 parent SA to replace #246 | using existing local IKE proposals for connection road-eastnet-nonat-246 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 498 for state #498 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb350018460 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #498 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 | #498 spent 0.0854 milliseconds in ikev2_parent_outI1() | RESET processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #246 ikev2.ike failed too-many-retransmits | pstats #246 ikev2.ike deleted too-many-retransmits | #246 spent 2.62 milliseconds in total | crypto helper 12 resuming | crypto helper 12 starting work-order 498 for state #498 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 498 | [RE]START processing: state #246 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-246" #246: deleting state (STATE_PARENT_I1) aged 64.007s and NOT sending notification | parent state #246: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #246 "road-eastnet-nonat-246" #246: deleting IKE SA for connection 'road-eastnet-nonat-246' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-246' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-246 | State DB: deleting IKEv2 state #246 in PARENT_I1 | parent state #246: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #246 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 498 time elapsed 0.000953 seconds | (#498) spent 0.973 milliseconds in crypto helper computing work-order 498: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 498 for state #498 to event queue | libevent_free: release ptr-libevent@0x7fb3780251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a82ac0 | in statetime_stop() and could not find #246 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #498 | libevent_malloc: new ptr-libevent@0x7fb340044850 size 128 | processing global timer EVENT_REVIVE_CONNS | crypto helper 12 waiting (nothing to do) Initiating connection road-eastnet-nonat-246 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-246" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-246' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-246" | stop processing: connection "road-eastnet-nonat-246" (in initiate_a_connection() at initiate.c:349) | spent 0.0607 milliseconds in global timer EVENT_REVIVE_CONNS | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #490 | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #490 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #490 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49685.235229; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001795 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a82ac0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #490 | libevent_malloc: new ptr-libevent@0x7fb3780251c0 size 128 "road-eastnet-nonat-238" #490: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #490) | bb 0e 3a 9b 64 67 83 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 47 7f 34 75 b5 49 50 79 df a4 4b 2a 1a ce 17 | 54 1a db ef 07 cc bd 63 ec 5f fd 57 bc 8e fa 30 | c9 95 d1 71 e6 7c fd 77 3c fd c2 3d 71 c3 96 28 | a3 d1 35 26 0a 70 d5 c3 3a fb 74 58 46 86 23 a0 | 05 3c 91 b9 ac 6a ea c1 25 7b 4a 3f a3 25 55 72 | 1a fa 68 62 a6 28 8d 23 b1 87 6f cc f5 37 d0 47 | fc 41 f4 96 78 ec ba 03 b7 d0 87 4f ed d1 99 e0 | 0d e4 2b f5 2e 28 88 3d fd a9 fe 89 6e 87 86 2a | bc 0f d8 0e c6 4a 2c e3 b3 3a a6 4b 56 b2 d1 a7 | b4 82 a8 63 ca 63 fb 28 a9 ae 19 5e d9 12 c8 ba | 95 37 7e 44 d0 19 50 2e 50 85 6d 62 52 72 3d eb | 4d f4 88 bd 4f 23 95 01 f5 e8 4f 41 c1 7a e2 e9 | 09 7e 97 ea 1c b6 21 cd 07 3c 59 f2 8d ef a7 3b | 3d d1 60 37 5e c3 67 ad 3c a4 b3 33 59 93 de 51 | 98 2d 6e b0 f8 67 26 97 7f 16 7a f1 7d 53 b7 ac | 55 64 4e 4e 20 10 14 93 a4 62 e7 45 6c 22 9f d2 | 29 00 00 24 e1 87 09 5e 30 4d 93 58 a8 7b ef c0 | df 86 01 db 2f ae 90 07 26 59 14 f1 71 ed 65 8b | e5 42 58 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e a7 de 07 e1 64 83 30 46 b8 16 83 | 02 93 de dc 12 4e 03 eb 00 00 00 1c 00 00 40 05 | 41 30 1b e3 e2 bc 6c 0f ca fc a1 2e 9d 87 bf 76 | 3a b7 29 61 | libevent_free: release ptr-libevent@0x7fb33803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #490 spent 0.0833 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 0e 3a 9b 64 67 83 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #490 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #490 | rejected packet: | bb 0e 3a 9b 64 67 83 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #490: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #498 | start processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 498 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #498 | **emit ISAKMP Message: | initiator cookie: | 68 4b 64 40 03 e3 f0 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-246 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e5 69 29 47 91 ea fc 2e df 27 76 0c 26 38 63 6b | ikev2 g^x ee 03 64 3e dd 2d 4f 5c a2 7c 3e 41 2e b2 c6 84 | ikev2 g^x ff d7 8f ca 24 8a 1a 84 04 b4 3e b6 53 38 d4 57 | ikev2 g^x 6d a4 68 41 c6 e5 8c 59 22 a7 fd d7 67 07 36 7e | ikev2 g^x 1e 40 23 48 d2 30 3e 8e d0 0e 2f 85 d4 6b 01 86 | ikev2 g^x 85 76 00 26 45 82 b5 a1 ed 94 31 de 85 9c 6f 9a | ikev2 g^x d2 cc cb 6d 68 f4 36 91 7d 92 94 a9 b3 a0 25 d9 | ikev2 g^x 5a 00 e8 82 c1 6e 50 4f eb 4b c5 77 4d eb ad f8 | ikev2 g^x f9 00 df 08 85 b8 e7 b1 b7 09 70 ca fb b5 96 54 | ikev2 g^x bd be b6 e6 4b 40 d9 6a f9 30 1c a8 77 f3 85 c8 | ikev2 g^x 21 54 2e a4 d4 8e d4 56 c2 16 22 dd 3e 05 97 69 | ikev2 g^x 65 6d 3c 5d 0f 12 01 33 b0 f7 91 7a 47 03 5b 97 | ikev2 g^x 4d 0e 9c 52 05 49 6e 01 9c be f7 12 23 b1 5e c9 | ikev2 g^x 73 97 42 af ac c3 1d 81 30 3b a9 46 14 e0 b0 65 | ikev2 g^x ab d4 ac 96 fd 2b 1a 19 c7 e5 47 a1 84 25 26 11 | ikev2 g^x 99 9a c0 71 dd 5f b8 d7 21 7f 1f c8 a8 a3 e9 18 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 87 96 a9 cf f1 29 2d 50 7c 79 d6 68 62 af 98 cb | IKEv2 nonce 71 a2 fc 0e ae 94 c2 03 22 51 95 ed 81 12 8d c1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 68 4b 64 40 03 e3 f0 8b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f6 | natd_hash: port= 01 f4 | natd_hash: hash= 39 71 da 0a 79 9e f6 1d 6a 6f 5a 6b 39 aa 0c e1 | natd_hash: hash= fb 50 58 ee | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 39 71 da 0a 79 9e f6 1d 6a 6f 5a 6b 39 aa 0c e1 | Notify data fb 50 58 ee | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 68 4b 64 40 03 e3 f0 8b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 43 dd 8c b7 86 3c b2 4e bf 53 d1 4c 55 30 14 19 | natd_hash: hash= fc 2a 32 31 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 43 dd 8c b7 86 3c b2 4e bf 53 d1 4c 55 30 14 19 | Notify data fc 2a 32 31 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #498 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #498: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #498 to 4294967295 after switching state | Message ID: IKE #498 skipping update_recv as MD is fake | Message ID: sent #498 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-246" #498: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.246:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #498) | 68 4b 64 40 03 e3 f0 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 69 29 47 91 ea fc 2e df 27 76 0c 26 38 63 6b | ee 03 64 3e dd 2d 4f 5c a2 7c 3e 41 2e b2 c6 84 | ff d7 8f ca 24 8a 1a 84 04 b4 3e b6 53 38 d4 57 | 6d a4 68 41 c6 e5 8c 59 22 a7 fd d7 67 07 36 7e | 1e 40 23 48 d2 30 3e 8e d0 0e 2f 85 d4 6b 01 86 | 85 76 00 26 45 82 b5 a1 ed 94 31 de 85 9c 6f 9a | d2 cc cb 6d 68 f4 36 91 7d 92 94 a9 b3 a0 25 d9 | 5a 00 e8 82 c1 6e 50 4f eb 4b c5 77 4d eb ad f8 | f9 00 df 08 85 b8 e7 b1 b7 09 70 ca fb b5 96 54 | bd be b6 e6 4b 40 d9 6a f9 30 1c a8 77 f3 85 c8 | 21 54 2e a4 d4 8e d4 56 c2 16 22 dd 3e 05 97 69 | 65 6d 3c 5d 0f 12 01 33 b0 f7 91 7a 47 03 5b 97 | 4d 0e 9c 52 05 49 6e 01 9c be f7 12 23 b1 5e c9 | 73 97 42 af ac c3 1d 81 30 3b a9 46 14 e0 b0 65 | ab d4 ac 96 fd 2b 1a 19 c7 e5 47 a1 84 25 26 11 | 99 9a c0 71 dd 5f b8 d7 21 7f 1f c8 a8 a3 e9 18 | 29 00 00 24 87 96 a9 cf f1 29 2d 50 7c 79 d6 68 | 62 af 98 cb 71 a2 fc 0e ae 94 c2 03 22 51 95 ed | 81 12 8d c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 71 da 0a 79 9e f6 1d 6a 6f 5a 6b | 39 aa 0c e1 fb 50 58 ee 00 00 00 1c 00 00 40 05 | 43 dd 8c b7 86 3c b2 4e bf 53 d1 4c 55 30 14 19 | fc 2a 32 31 | state #498 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb350018460 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #498 | libevent_malloc: new ptr-libevent@0x7fb33803b0b0 size 128 | #498 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49685.235698 | resume sending helper answer for #498 suppresed complete_v2_state_transition() and stole MD | #498 spent 0.301 milliseconds in resume sending helper answer | stop processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb340044850 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 4b 64 40 03 e3 f0 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #498 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #498 | rejected packet: | 68 4b 64 40 03 e3 f0 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #498: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0379 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340025210 | handling event EVENT_RETRANSMIT for parent state #418 | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #418 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #418 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49685.276869; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004115 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340008e80 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #418 | libevent_malloc: new ptr-libevent@0x7fb340044850 size 128 "road-eastnet-nonat-166" #418: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #418) | 1c 58 36 d0 b8 a0 d1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 21 69 13 ea 9b 51 f5 f8 3d bc 58 75 ed a9 fd | 17 d1 ac 45 30 9e bb dc f5 67 d6 33 5f f9 21 3b | d7 08 0c bd e4 4c bf b2 e0 66 df d2 39 12 b4 cd | 51 1d 79 99 b2 28 9d 92 25 3d de c7 de 50 60 c0 | b1 e7 b1 2f 20 ba 56 e0 cc d5 d3 89 fb f3 3a 69 | 08 b8 19 34 ad 51 11 33 2c 83 6c 01 df 40 a9 5a | d2 8e ac 81 f5 73 32 a5 92 89 d9 43 53 9f d1 60 | 24 f6 18 43 4f b2 cc 04 87 ab 6f 28 3d 9c e1 be | 1d b6 6f 40 8a 39 f7 27 97 65 7c fa 70 bb d3 47 | 6d aa 41 65 fd 87 5b bf 5a 85 1c ca 2d 31 4b 63 | 3b 57 1d 34 66 19 31 70 16 5e 12 2a 4b 3c f3 aa | c7 b4 1f b1 9b ff 71 77 21 47 b5 ee 99 1f 02 09 | 95 71 68 b7 06 9b 0f 65 04 ee a4 b9 3b 45 42 02 | 7d d2 87 0e 66 c1 75 4c ff 7a f3 83 39 de 46 b2 | 20 fd 8a d9 22 4f c4 77 47 fd 4b 1b 01 cf 2f ef | dc 02 1e 19 bc 0a 3d 9b 32 25 8e a1 b4 27 34 08 | 29 00 00 24 1a d8 6e 71 ca d7 ba 26 1e 49 f1 5f | c1 b0 03 8a 8a 69 67 55 4a ef 6c 1a 26 5d 01 35 | 4b 44 6d e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 63 ba bc 17 58 ec 8f 3d 47 af 87 | d9 d9 f5 4c 16 0e 40 2b 00 00 00 1c 00 00 40 05 | 0c c9 6a 54 72 2b 9b 5b 7b 1a a4 b5 a9 4f 1c b9 | a1 57 0c cc | libevent_free: release ptr-libevent@0x7fb35804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340025210 | #418 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c 58 36 d0 b8 a0 d1 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #418 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #418 | rejected packet: | 1c 58 36 d0 b8 a0 d1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #418: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0979 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #482 | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #482 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #482 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49685.280223; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002569 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340025210 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #482 | libevent_malloc: new ptr-libevent@0x7fb35804b850 size 128 "road-eastnet-nonat-230" #482: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #482) | 36 c3 54 33 ec a7 b6 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 ed 30 30 be a6 b8 35 5d 7c a5 62 ac c6 13 d8 | 83 27 d5 31 a0 fa 4c 2e 40 b9 54 43 42 15 18 78 | b3 8c 6a 6c 7d 96 c5 85 70 a8 48 20 22 38 c8 e7 | c3 12 d1 63 fb e3 68 d6 08 24 69 60 e5 ac a9 33 | 22 f2 2c f6 14 52 ad 1c 12 97 d4 3c 99 28 7f 69 | aa d1 18 f8 bc 06 35 f3 dd 4f b8 bc 32 67 80 0d | b2 c8 d0 32 11 b6 f1 1a bf 32 1c f4 b1 c8 5d 4d | f1 41 f7 45 a7 42 78 6b 31 8f b7 1a 22 f3 fa a7 | 3f 96 61 3f ad 03 4e 95 70 ec 28 2e 07 88 02 e8 | 35 f1 c5 b3 16 2f 4d b9 e0 29 95 c1 2d e3 e0 37 | 5d 57 61 4b 22 78 ec 0c cc 9d f4 89 9a 2d 4f 1d | b7 c1 f5 ad 55 54 75 4b 2d 2f 97 b2 b3 0a f4 e5 | ca f8 64 9c 52 40 a8 a2 99 0e 3d 9b 5a 9e 1e 2b | 75 b0 89 ef b0 bf 99 f4 37 0e 0c 27 d3 f1 9a c6 | fd 46 0a d5 dc 88 12 58 b5 c1 7a 5a 1b 30 d2 78 | 2b ef 75 09 ea 77 2f b0 ad cc d1 d9 98 94 ca 15 | 29 00 00 24 ba df cf 8a 38 2e 1f 41 21 49 fc b2 | 01 80 ce b1 18 f8 70 f3 ba e7 48 83 d1 e9 62 d6 | 6c d1 b9 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 54 bb 11 83 48 2f 3f fa 5f 96 d0 ad | a2 72 2a 82 ce ec ef d2 00 00 00 1c 00 00 40 05 | c3 77 e0 b4 3a 22 ca d3 bf 9b f4 e6 b2 71 76 56 | 18 71 d4 99 | libevent_free: release ptr-libevent@0x7fb36804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #482 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 c3 54 33 ec a7 b6 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #482 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #482 | rejected packet: | 36 c3 54 33 ec a7 b6 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #482: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0598 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35800d120 | handling event EVENT_RETRANSMIT for parent state #495 | start processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #495 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #495 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49685.293509; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499973 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #495 | libevent_malloc: new ptr-libevent@0x7fb36804b850 size 128 "road-eastnet-nonat-243" #495: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #495) | 51 22 fa ce 4d 7c ce 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c 9b dc 70 14 a2 8d 2e 37 c4 2e 9c 10 fc 27 0a | 94 78 5e 85 80 ae e5 be af df cd 9d ab 0a d3 d5 | 9a 0e 71 ff 6f 4d f8 da ab bd 5a 72 c3 2a 71 74 | 55 f1 2d 29 95 62 4d 7d b1 32 5b 12 fd 0a 2d bb | 81 aa ca e6 2a a9 0f 8b 0c cf 1b d2 de 30 5f 1f | e8 83 26 da 07 fd 31 9b 9b d4 1b db 2d 4b e3 99 | 86 7d a5 a0 d4 7d 59 09 c9 73 32 3d 53 85 e9 6f | 12 64 cd cb bc 89 f7 39 4d 28 2c 75 1c 49 0b 3b | c2 22 31 40 60 7d 62 ec d8 da 82 4a bd 1e c5 38 | c3 d8 6d e6 cb 49 78 ba 18 b4 83 3e 7d f6 6d 50 | 16 4d a6 04 f2 a5 8b c2 44 ae 9c 1a 54 68 4c 7d | 43 87 34 87 42 6c 4d fd b4 43 f6 3a 97 2e d2 87 | c4 99 e8 56 55 a1 ca 43 16 5d 55 9b 16 ed ee c1 | b9 bb 2b d6 cf 5a 0d 72 75 6d 1a 0f ae 6e 85 ec | 3a e8 4f c3 0e 27 5b 09 2a e5 e1 24 f5 af 32 13 | e5 eb fd 29 dd 27 c3 a5 08 cc 6e 72 80 4d 82 6f | 29 00 00 24 1b f3 52 dd f6 a5 80 95 b8 2f 4b 8b | f9 eb 65 1b 6e dd cd 94 b7 dd 16 f5 58 7c d7 e5 | e4 3a 80 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 3b 51 4a 4c d3 e5 68 1a 7e fa ec | e7 02 de b1 56 34 9d 92 00 00 00 1c 00 00 40 05 | ef ad 01 a7 be a3 55 49 1c 13 e6 d1 01 bd b7 0b | b8 36 16 d5 | libevent_free: release ptr-libevent@0x7fb358012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800d120 | #495 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 22 fa ce 4d 7c ce 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #495 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #495 | rejected packet: | 51 22 fa ce 4d 7c ce 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #495: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #464 | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #464 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #464 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49685.309839; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00543 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #464 | libevent_malloc: new ptr-libevent@0x7fb358012840 size 128 "road-eastnet-nonat-212" #464: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #464) | 24 23 49 88 e3 09 10 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 3e 00 a4 b1 da ff 66 fb 46 9b f8 05 c4 d3 4e | 1a be d3 c5 f3 29 65 46 ed 6f e5 e1 9c d3 68 c3 | 49 3b 6a cd e8 c4 12 c0 42 a0 22 7e 1b 5d 32 aa | a0 3a 32 c8 92 e5 3d a9 90 26 7c b6 7a 3a c7 43 | 1e d7 d9 ca a9 3b e4 0e ac 4c a3 a2 54 be fa 3a | 34 7b 08 69 76 9f f5 86 6b e1 71 f1 ca f2 34 fb | f0 af 6d c0 e7 4d 86 2c 35 64 d7 a8 e5 56 44 f4 | 1b a3 7b 36 d3 8e bf 68 72 d1 d6 14 19 d5 94 41 | 37 2c 85 dd 26 51 82 12 f9 57 28 f6 64 e4 99 2c | e5 14 14 38 a6 eb 30 83 5f a9 d8 ce 33 ba b5 e7 | 8f 9e 29 5d 17 d7 5f e7 f7 6f 44 97 e9 e3 1d 52 | 7d 6b 40 ae 7e e6 9b 70 f4 e4 cb 6b e6 46 d1 1a | f1 d4 e8 4a 08 7a 73 f5 ae fa 1c 51 b5 c1 66 db | b4 47 cd 7b 34 6f da f9 6b b2 dc 0f 59 56 0e 82 | f9 d8 cb f8 b3 e7 8c 71 cf eb c3 24 d5 a5 32 fc | 19 3b 14 fc 10 5b ac 0b 65 e1 fc c1 26 0d 3c cc | 29 00 00 24 f8 5a 68 e8 8f 04 5e 9b c3 04 25 38 | 2e af 26 bb 12 7b 35 ab f6 8f 9b c1 e5 8b f7 b5 | fb ab d6 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 53 56 65 0c 1b 38 25 05 25 e2 17 | 1d aa de c6 51 81 dc 56 00 00 00 1c 00 00 40 05 | b6 60 c7 67 b1 c7 40 e8 a5 6f 2e d6 dc 92 69 0c | f8 bb 28 2f | libevent_free: release ptr-libevent@0x7fb3840060f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | #464 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 23 49 88 e3 09 10 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #464 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #464 | rejected packet: | 24 23 49 88 e3 09 10 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #464: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0827 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61bd0 | handling event EVENT_RETRANSMIT for parent state #491 | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #491 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #491 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49685.331203; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001989 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #491 | libevent_malloc: new ptr-libevent@0x7fb3840060f0 size 128 "road-eastnet-nonat-239" #491: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #491) | 71 99 e4 22 98 eb 54 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6f ca d2 21 e7 00 d0 58 95 9f 18 d3 07 6f a1 36 | 29 0a 07 0a 83 6e be aa 71 cf 9f 04 2d 78 ad e9 | 58 fe 50 02 89 22 52 34 18 90 af 07 b5 26 f1 6c | b0 11 12 a1 23 de 99 fd fc c2 c0 e2 48 6c 08 1b | f6 de 34 df 7c 06 d6 3f 0c 5a 97 94 b5 cd 37 58 | 08 26 b0 da 52 89 5c 74 c6 39 52 b5 86 f0 ed 18 | e5 f9 91 2e 14 4e 44 f7 64 55 1d 70 ad 8f f1 5d | 53 18 a9 5d 0c b5 78 b7 26 b2 7b 9e 90 ef 29 39 | 8b 7e b2 68 96 f5 cb 23 fc d4 1f dd be 19 b3 cf | 90 29 ab e6 33 3c 02 49 68 ce 65 d3 cd 32 0f 44 | 53 2e 1d d6 62 09 24 c9 7c 69 12 6b 73 20 8c a6 | 8d 2e 37 7f bc 30 45 fb da d9 2f 0c 0f 60 4b ac | 0c 1a 77 7c e4 78 1e 2f d7 92 41 d2 4d 5f 8e ae | 49 e0 54 b5 c7 2d bc a1 7a a2 3f 86 07 2c 92 60 | e1 f5 de af a0 f0 4b 27 ad e3 b4 c3 ee 7b 2d 0d | d8 e3 ea 54 9f 53 a9 b6 54 62 d4 0e 68 4d ff 58 | 29 00 00 24 f6 62 db cd 87 59 ee 6d c7 6e 62 13 | a1 8e a7 17 f8 92 11 7a 45 83 ff 50 63 74 b0 f6 | 7b f4 74 d1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 ef b1 40 3a d0 79 c3 55 24 76 d2 | d8 cf d4 95 18 b0 e0 3a 00 00 00 1c 00 00 40 05 | ee b1 f7 86 b3 de f8 ed 09 8e 76 56 9a 74 8c 3c | 69 d7 b9 6e | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61bd0 | #491 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a61c10 | handling event EVENT_RETRANSMIT for parent state #307 | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #307 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #307 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49685.331347; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005795 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #307 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 "road-eastnet-nonat-55" #307: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #307) | ae 96 63 e8 bb 6a 85 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 14 ed e9 d6 19 10 2b ec dd 37 28 c8 5c 2b 9d | 4d 1c 56 bb af 08 b5 7a 4b a6 fc d3 e6 37 09 e4 | 3f 1e 28 12 a3 d4 a0 95 36 fb be 53 ba 61 08 91 | a5 59 64 37 32 8f 20 cb c1 4b 24 6f aa 9c 35 eb | 55 d5 bc cd 87 7a 12 07 97 e1 3e 1d fe 09 4e 05 | 56 a9 36 dd e5 c2 2b 14 24 4c 71 52 b8 4a bc e5 | 44 05 b4 12 ae 0a ee 10 63 d4 56 16 75 0e 24 7a | d8 3e 40 79 17 42 50 86 a6 54 47 3f a4 b0 ab e0 | d2 28 b5 9a 24 3f 4a c2 b0 91 11 3a 15 fb b2 26 | f2 b0 63 ef 6f 51 35 98 2f 68 7c a5 78 9f 97 ad | 5a 09 af 4c 24 bb dd dc ab e6 24 53 27 3d 9e 03 | 62 ad 6c f7 99 7f 86 ec 99 0f d4 42 fa 99 b4 e1 | da 5b a4 af 44 6d 6a f4 d7 89 78 8e f4 87 7b 68 | 84 5a 7e 9d b0 43 44 70 16 90 a6 1a d2 cc 8f 85 | 21 0d 25 8b 92 c7 6a 03 1f 2e 4c a1 00 a9 05 b1 | b5 20 9b fc 87 43 c1 10 a6 42 8f 4d 15 f7 48 a2 | 29 00 00 24 9a 25 60 c3 7e e3 91 a3 9d b3 07 0f | ff 92 da ab 25 95 17 32 0d 82 17 4c 51 9e de a9 | 5d 92 35 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b e0 88 15 5c bc 20 c5 96 41 9f 3a | 7e ef 58 59 98 52 f8 6e 00 00 00 1c 00 00 40 05 | 92 3b 5d d1 4e 37 91 81 a5 d6 c2 94 c8 33 2c 33 | 6a d3 7b 36 | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61c10 | #307 spent 0.0729 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 99 e4 22 98 eb 54 3d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #491 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #491 | rejected packet: | 71 99 e4 22 98 eb 54 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #491: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 96 63 e8 bb 6a 85 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #307 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #307 | rejected packet: | ae 96 63 e8 bb 6a 85 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #307: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0402 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47e90 | handling event EVENT_RETRANSMIT for parent state #419 | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #419 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #419 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49685.343615; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004271 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61c10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #419 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 "road-eastnet-nonat-167" #419: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #419) | 13 42 1a 05 2a a9 f4 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 82 ba 57 e5 18 7f 6d c1 4e 6c 32 74 c7 8d bc | fa 9e 5f 85 57 91 bd e7 d1 f6 a5 cc 56 d4 ef 2c | 82 2b a5 62 6a 68 41 f0 a0 92 fa 2e 12 6a 74 95 | 56 98 09 32 67 8d a9 cf ce e8 4b 16 ca ae fd 57 | 33 7d 99 6a 29 1d 52 35 0b 5c 55 de 21 8b fe 4c | 64 ea 17 c4 c0 64 cd 47 31 4b 7a 08 f8 bd 37 3f | 72 ba 30 cd 0e c2 9d 0f e4 8b 3f b8 4c 2a d4 69 | de 4a 7f 8a a8 eb c0 7f 8f b2 10 0b d8 35 aa 5e | c8 ac 23 ce e4 c8 52 08 91 9c 13 ce 38 17 f1 d8 | db ec 31 93 d6 0d 09 93 5b d1 dc 9c 92 3b e5 29 | 17 5b e6 ee 7f f5 fb 3d 38 b5 23 c0 cf 25 d5 5b | 67 0a 2b 07 fd 68 8f 4c 74 c9 96 0b 9b 44 5c 6b | 0e 2d 70 4b 98 d5 d7 b9 54 dc 11 1e 19 cb 73 3f | 22 ca 80 46 28 a8 4a 20 64 29 4c 39 a5 b7 25 84 | 93 fd 4d 3a a6 fa ab c2 68 fc 5d fb 3c 7c 06 72 | eb 28 8a f5 09 69 59 c1 01 26 88 c4 c6 36 f6 6c | 29 00 00 24 83 3f e0 e8 30 90 0c c2 fd 9a 5c 8a | 88 7b e1 27 5d 3c cc 26 1c 41 3f 95 a3 1e 69 69 | b9 67 17 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 b9 c0 cf 3f 29 65 8b 9d 3a 51 6d | 0f 16 20 c0 79 fc 1d 37 00 00 00 1c 00 00 40 05 | 67 f3 84 dc 78 2e 75 89 44 b5 31 a8 97 13 e9 a5 | b9 b4 3a e4 | libevent_free: release ptr-libevent@0x7fb38800a240 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47e90 | #419 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 13 42 1a 05 2a a9 f4 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #419 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #419 | rejected packet: | 13 42 1a 05 2a a9 f4 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #419: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46af78c0 | handling event EVENT_RETRANSMIT for parent state #247 | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #247 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #247 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49685.360939; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007915 exceeds limit? YES "road-eastnet-nonat-247" #247: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-247" #247: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #499 at 0x557d46b23bc0 | State DB: adding IKEv2 state #499 in UNDEFINED | pstats #499 ikev2.ike started | Message ID: init #499: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #499: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #499; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-247" #499: initiating v2 parent SA to replace #247 | using existing local IKE proposals for connection road-eastnet-nonat-247 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 499 for state #499 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47e90 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #499 | libevent_malloc: new ptr-libevent@0x7fb38800a240 size 128 | #499 spent 0.0941 milliseconds in ikev2_parent_outI1() | crypto helper 5 resuming | crypto helper 5 starting work-order 499 for state #499 | RESET processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 499 | start processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #247 ikev2.ike failed too-many-retransmits | pstats #247 ikev2.ike deleted too-many-retransmits | #247 spent 2.7 milliseconds in total | [RE]START processing: state #247 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-247" #247: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #247: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #247 "road-eastnet-nonat-247" #247: deleting IKE SA for connection 'road-eastnet-nonat-247' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-247' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-247 | State DB: deleting IKEv2 state #247 in PARENT_I1 | parent state #247: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #247 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 499 time elapsed 0.000965 seconds | libevent_free: release ptr-libevent@0x7fb380048a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af78c0 | in statetime_stop() and could not find #247 | (#499) spent 0.972 milliseconds in crypto helper computing work-order 499: ikev2_outI1 KE (pcr) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 5 sending results from work-order 499 for state #499 to event queue | processing global timer EVENT_REVIVE_CONNS | scheduling resume sending helper answer for #499 Initiating connection road-eastnet-nonat-247 which received a Delete/Notify but must remain up per local policy | libevent_malloc: new ptr-libevent@0x7fb344040760 size 128 | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 5 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-247" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-247' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-247" | stop processing: connection "road-eastnet-nonat-247" (in initiate_a_connection() at initiate.c:349) | spent 0.09 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #499 | start processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 499 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #499 | **emit ISAKMP Message: | initiator cookie: | c7 9c 2c 36 f8 59 d4 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-247 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4e 36 9d 7e c3 eb 0f f5 55 38 8b 43 25 86 54 ef | ikev2 g^x 6f b9 f8 28 7e 76 ec 92 74 99 fc c9 b6 64 9d ac | ikev2 g^x b4 f5 fc 31 29 96 7b f0 ef 3c 01 28 c3 ad 1c 4d | ikev2 g^x 74 6d b0 ed 64 09 35 18 c6 6a c2 bc 6c f8 72 2c | ikev2 g^x 54 14 82 7e 14 37 d9 e7 9b 9f ce de 7f 99 2e f1 | ikev2 g^x 1f 25 30 b7 54 88 0c c6 03 fe ef 9a c2 4c 16 3a | ikev2 g^x 92 dc d7 50 b6 03 1d 9b e5 26 b1 a0 fd e5 86 9c | ikev2 g^x c1 bb a9 1d c8 aa e0 66 62 a8 ef d5 a3 e5 1c aa | ikev2 g^x 48 a0 13 72 a6 76 d4 63 de 8e 77 d1 a4 a1 70 1a | ikev2 g^x 05 7e fd e9 46 8f d7 69 9c 5d 01 6a 23 bf d1 7c | ikev2 g^x 60 fe 3b 08 36 7c 46 56 5e fa 3e 87 6e f8 5c e5 | ikev2 g^x 62 26 d2 09 02 d7 a8 88 f2 80 8a 7b d3 24 87 ec | ikev2 g^x 98 c6 06 44 cf 2e 14 1f 9a 9e 11 3b 15 35 10 67 | ikev2 g^x 80 78 af 3c 90 b3 be 54 94 f8 6c d9 36 9d 34 3f | ikev2 g^x b2 ee 4f 6f 8b cb 03 13 29 6b 61 bf aa 20 b1 02 | ikev2 g^x 64 9a 46 8c 58 45 74 b6 a7 9c 3f 9f 19 1b d5 f4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ae 3f 5f 22 5a fe fe 91 94 31 fc a8 30 c0 4a f7 | IKEv2 nonce 3c 57 3c 0d ed a5 29 f2 71 dc 56 3a ed 9c a9 5c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c7 9c 2c 36 f8 59 d4 6c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f7 | natd_hash: port= 01 f4 | natd_hash: hash= 43 89 ab ab 1d cc d7 b6 cb 29 1c 48 e7 84 01 ce | natd_hash: hash= 34 15 c4 5f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 43 89 ab ab 1d cc d7 b6 cb 29 1c 48 e7 84 01 ce | Notify data 34 15 c4 5f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c7 9c 2c 36 f8 59 d4 6c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7f 71 39 3d 41 d0 36 ee b9 ed 2b b5 28 d2 9e d8 | natd_hash: hash= 0a 4d 91 1e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7f 71 39 3d 41 d0 36 ee b9 ed 2b b5 28 d2 9e d8 | Notify data 0a 4d 91 1e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #499 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #499: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #499 to 4294967295 after switching state | Message ID: IKE #499 skipping update_recv as MD is fake | Message ID: sent #499 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-247" #499: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.247:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #499) | c7 9c 2c 36 f8 59 d4 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 36 9d 7e c3 eb 0f f5 55 38 8b 43 25 86 54 ef | 6f b9 f8 28 7e 76 ec 92 74 99 fc c9 b6 64 9d ac | b4 f5 fc 31 29 96 7b f0 ef 3c 01 28 c3 ad 1c 4d | 74 6d b0 ed 64 09 35 18 c6 6a c2 bc 6c f8 72 2c | 54 14 82 7e 14 37 d9 e7 9b 9f ce de 7f 99 2e f1 | 1f 25 30 b7 54 88 0c c6 03 fe ef 9a c2 4c 16 3a | 92 dc d7 50 b6 03 1d 9b e5 26 b1 a0 fd e5 86 9c | c1 bb a9 1d c8 aa e0 66 62 a8 ef d5 a3 e5 1c aa | 48 a0 13 72 a6 76 d4 63 de 8e 77 d1 a4 a1 70 1a | 05 7e fd e9 46 8f d7 69 9c 5d 01 6a 23 bf d1 7c | 60 fe 3b 08 36 7c 46 56 5e fa 3e 87 6e f8 5c e5 | 62 26 d2 09 02 d7 a8 88 f2 80 8a 7b d3 24 87 ec | 98 c6 06 44 cf 2e 14 1f 9a 9e 11 3b 15 35 10 67 | 80 78 af 3c 90 b3 be 54 94 f8 6c d9 36 9d 34 3f | b2 ee 4f 6f 8b cb 03 13 29 6b 61 bf aa 20 b1 02 | 64 9a 46 8c 58 45 74 b6 a7 9c 3f 9f 19 1b d5 f4 | 29 00 00 24 ae 3f 5f 22 5a fe fe 91 94 31 fc a8 | 30 c0 4a f7 3c 57 3c 0d ed a5 29 f2 71 dc 56 3a | ed 9c a9 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 89 ab ab 1d cc d7 b6 cb 29 1c 48 | e7 84 01 ce 34 15 c4 5f 00 00 00 1c 00 00 40 05 | 7f 71 39 3d 41 d0 36 ee b9 ed 2b b5 28 d2 9e d8 | 0a 4d 91 1e | state #499 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38800a240 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47e90 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af78c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #499 | libevent_malloc: new ptr-libevent@0x7fb380048a80 size 128 | #499 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49685.362748 | resume sending helper answer for #499 suppresed complete_v2_state_transition() and stole MD | #499 spent 0.473 milliseconds in resume sending helper answer | stop processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb344040760 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 9c 2c 36 f8 59 d4 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #499 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #499 | rejected packet: | c7 9c 2c 36 f8 59 d4 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f7 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #499: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0751 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #483 | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #483 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #483 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49685.389008; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003001 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34401d710 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #483 | libevent_malloc: new ptr-libevent@0x7fb344040760 size 128 "road-eastnet-nonat-231" #483: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #483) | 34 4c 65 0f e6 b6 ad e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 14 b4 cd 04 ae 73 27 55 14 94 b2 a9 a9 46 92 | bf 38 7f 34 e4 30 01 9b cc 3d 69 9b 72 22 2d c6 | c0 5a ca f2 aa f8 34 31 df 85 74 a8 8a c4 71 d3 | 18 15 b7 43 a0 c7 52 88 83 cb 13 e3 0b 22 9f 8d | 9b 32 7a fd 24 4c 85 ea ba 28 19 ff da 93 b1 bb | d8 33 5c 65 db be 0a e0 bd 29 79 f5 94 d3 6b 1b | d0 fe 62 1a aa 43 59 54 5f 94 f2 d4 df c7 8c 2c | 9f 79 f7 92 9d e8 8c 7a 9a 6a da 8f dd 5b f5 4b | 78 88 55 3a 27 f6 46 11 a6 78 da 31 e5 57 e3 ff | c3 41 c4 d8 db 92 c7 9b 0b f2 9c 05 a4 6f e4 60 | d6 be 30 93 95 25 fb 5e 0e 06 32 43 09 91 4d 90 | 0e 89 44 7a 24 99 b2 ff 62 86 54 98 47 bc f9 cf | ff 60 15 2b c0 14 62 be bc 88 1f 37 10 d8 42 2b | 8e 68 b2 b4 90 d0 f5 fe bf 7c ce c7 6a 70 46 09 | 84 97 db 42 58 43 9f f3 46 27 26 32 2b 0c cd 41 | 80 81 33 b8 5d 30 60 f3 70 32 7b 81 3a 1a 11 48 | 29 00 00 24 a6 6b eb 02 98 7d a6 5e 59 5e bd f1 | ef cf 36 f2 a9 4b e0 19 61 9c ac e2 ac 17 24 09 | 0d 96 04 a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d1 38 08 89 da 41 ff 7d 1c 3d 17 6c | 3a eb 05 70 fa bf ed 59 00 00 00 1c 00 00 40 05 | d4 38 01 a3 1e e4 dd 2e 8e 63 54 12 3f 4d 01 1d | 49 6b 48 46 | libevent_free: release ptr-libevent@0x7fb348023e80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #483 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 4c 65 0f e6 b6 ad e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #483 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #483 | rejected packet: | 34 4c 65 0f e6 b6 ad e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #483: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0677 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378018460 | handling event EVENT_RETRANSMIT for parent state #465 | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #465 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #465 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49685.403364; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002297 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #465 | libevent_malloc: new ptr-libevent@0x7fb348023e80 size 128 "road-eastnet-nonat-213" #465: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #465) | 61 8e 23 d2 13 62 a1 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e ff ad a6 69 28 f7 dc 3e 12 16 a3 b8 12 d1 0c | e2 d9 c7 08 64 20 6b 95 e2 f7 13 3f fe 41 07 b0 | 63 aa 7f 3d 77 9f f9 e2 21 16 88 33 88 34 63 be | 66 c4 e1 0f 6d 0e 67 89 ae 7f d4 2b da 09 0e c2 | 3d 5d ed e3 b1 da e4 45 10 b1 c5 e8 5c a0 b7 e1 | 45 c7 74 34 87 11 e9 20 8e bf a9 d5 b7 7f 3e c8 | 87 13 ea b0 4c 38 35 35 21 28 ca 99 cb 90 60 a1 | 8c 47 23 f8 9b b8 e8 b3 af 65 36 19 01 0f 99 db | 11 cb f7 6b 11 70 78 e3 5e f3 08 79 6c d7 3e 9c | aa 63 ab c1 3b 94 5d c4 f5 a3 7c fb 68 79 fd 4d | ad 0f 3b a0 62 30 54 4e 21 46 20 c3 e3 03 c6 e1 | b9 0f 7d fe 4b b3 60 7d 63 ba a2 4c 73 2e f3 b8 | 3b 22 a2 5f eb 6e f7 60 a7 f7 13 33 69 2d a4 92 | 73 a6 b3 6f 83 80 a4 99 0d 08 29 5e d9 35 92 ae | 9f af 0f c2 f8 4b f3 a5 f1 21 b9 71 6a 24 94 9a | 22 03 aa 3e 91 42 1b 0b b8 8a 56 9b 18 21 37 6d | 29 00 00 24 d0 d3 37 6e 16 17 0d f3 9a b3 75 28 | da 73 bd b0 37 5f e8 7c ed 64 dd a2 58 d5 25 f4 | 40 05 3d 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 42 81 75 52 0a 3a ff 0f 6a b7 c3 | 61 92 38 6c 3b df 54 bd 00 00 00 1c 00 00 40 05 | ac 90 18 d8 00 f9 15 ad 07 5e df 3f 97 c5 48 08 | 0a 92 84 e5 | libevent_free: release ptr-libevent@0x7fb3700407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378018460 | #465 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 8e 23 d2 13 62 a1 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #465 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #465 | rejected packet: | 61 8e 23 d2 13 62 a1 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #465: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360012bf0 | handling event EVENT_RETRANSMIT for parent state #492 | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #492 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #492 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49685.405709; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001207 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #492 | libevent_malloc: new ptr-libevent@0x7fb3700407f0 size 128 "road-eastnet-nonat-240" #492: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #492) | d7 99 7d 69 73 b4 2a a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 07 d7 12 79 21 18 05 9a 65 7d 95 08 cf 17 4e | 65 ed 52 c0 2d 6f a2 d4 7e 6e 0c fe 68 2e 85 0e | c1 f3 a0 f1 34 f9 34 8a e9 6d c0 54 1e 27 54 a6 | 0a 27 50 d2 78 b6 25 f7 6a f9 6c d4 40 88 de 0e | c5 23 46 17 11 07 59 0b 07 7d f1 44 d8 68 37 f0 | 12 d0 4c 6e 87 95 44 91 7a 02 1a aa de e2 f1 34 | 10 60 5a 14 6b 10 17 21 f9 34 d9 11 2c 87 8c 26 | a1 73 6c 09 6c 7e 33 9d 0e 03 17 61 98 14 aa f1 | 55 ad ab 3a b7 4f 37 37 da 8f 18 e7 c8 d3 37 ef | 02 82 ee 24 ef c3 bd c3 8a 68 42 60 d6 70 2e 41 | 57 9c 7a 60 c3 c6 ac 4a 44 4b 7b 82 88 6e 37 3a | e8 a6 66 1b 7b 71 c3 58 de ce c4 1a 99 46 de bc | be 62 d4 44 43 62 c0 f6 26 99 83 35 30 7f b5 15 | ea a7 50 6e 0e e9 be 43 3b f3 33 1e 18 3f 0c b4 | 99 f0 db 6c 50 7f 42 cb 48 b5 b5 92 17 92 32 ed | bf e5 25 0e 41 bc 26 2f b8 93 47 2e 04 ee 7f e1 | 29 00 00 24 50 36 54 c1 a9 17 13 4c 62 1f 80 79 | be a9 3c 75 1a 54 91 d7 53 38 3a 75 de 57 2a 82 | 16 4a 83 7c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 22 3a 78 b0 c2 12 43 88 f6 04 b2 | db f8 ae cb 72 c7 59 0b 00 00 00 1c 00 00 40 05 | d7 ae 13 c8 9e aa 6e 0d cf 25 ff 91 a0 20 ef 42 | b6 21 2f 3a | libevent_free: release ptr-libevent@0x7fb37003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360012bf0 | #492 spent 0.0939 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 99 7d 69 73 b4 2a a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #492 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #492 | rejected packet: | d7 99 7d 69 73 b4 2a a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #492: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0417 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a50110 | handling event EVENT_RETRANSMIT for parent state #420 | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #420 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #420 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49685.41695; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004026 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360012bf0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #420 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 "road-eastnet-nonat-168" #420: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #420) | 38 01 94 6e be 3a 28 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c e6 6f 10 c2 18 44 e2 34 88 94 b1 6e ad 96 2f | 7e f2 2f d5 05 74 10 9d b0 ed 16 ba d1 bb 6a 81 | 3b 36 bb 33 64 6a 4b 49 98 6b 61 6b 38 a7 f0 f9 | 85 f1 ea 1f 82 7f 75 2e b8 87 48 fb ca 42 ad 54 | 59 d3 d4 98 fc e3 db 9e 06 1c 4d 0a 68 e2 82 b1 | b4 79 61 9d ef 49 6d 74 7e f5 a5 55 9d ac 1f 86 | bc 38 61 c3 ec 65 14 03 d9 05 f4 3a a0 cf b9 81 | ea f9 8e 26 2a 33 57 de f0 0c 7b 3a 31 62 59 7d | 0a 51 80 e9 b3 45 96 f0 0f c4 ba 78 af bf d6 5a | 60 67 ef 7e 3d 35 d6 cc 9c c8 4a 58 b2 0f d6 d7 | a4 37 58 a2 99 5b 23 f1 45 8d 6c d3 30 bc 9f 64 | 97 c5 ef 20 d5 b9 a3 78 d6 da 52 f2 da 0c 22 0a | a7 af 15 bc c7 88 8c 82 a8 a3 ee 2f 8a ad 53 b2 | a0 1b 8a 3b ba 0a 34 48 34 2f ad da 72 63 db 61 | 9e b4 c4 95 69 50 db f5 62 4c 82 15 0a a2 7d 3d | 5b 37 5a 63 75 a1 9d 88 2f 4d 72 7d 91 14 f6 58 | 29 00 00 24 a2 fc 3c 40 ce 99 e3 62 f3 97 ac 0a | d5 d9 6a e9 cb 20 69 0b 55 a4 ef ef 10 02 28 ef | bc 3f 93 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 0a f7 67 8f e9 41 30 08 68 43 0c | 01 13 f9 c1 61 fa 63 aa 00 00 00 1c 00 00 40 05 | ef 1c 5b ca 2a 2f ea 7b fb 12 61 31 e7 f2 9d c7 | 67 58 3e 74 | libevent_free: release ptr-libevent@0x7fb37404b5c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a50110 | #420 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 01 94 6e be 3a 28 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #420 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #420 | rejected packet: | 38 01 94 6e be 3a 28 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #420: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #308 | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #308 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #308 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49685.421763; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006036 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a50110 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #308 | libevent_malloc: new ptr-libevent@0x7fb37404b5c0 size 128 "road-eastnet-nonat-56" #308: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #308) | 80 0a 88 98 4b f9 e7 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 60 f0 11 1d 6f 3c e8 3a d0 c5 a1 1f 8b f6 d6 | b8 1e e6 d3 27 fa 35 0f 2e 35 7c 6a ac 4d b0 5a | 6b 0b 3b 4a 46 9a c1 e4 d2 3d 95 4c 54 c7 f8 b0 | a3 25 b2 e5 19 52 cf a8 80 64 9a 61 44 3f 5d 89 | b3 ab 84 f7 4d 8d 5e c3 d5 83 26 99 08 7b 56 8e | d5 6a c7 4a 76 f4 45 38 3c fa 31 64 fb a7 68 c6 | c9 63 22 21 ab 35 5e 58 62 e8 99 25 ff 5b 61 ec | 55 a2 5b 36 cc 02 da 3b ef 08 f7 a5 b1 e6 33 04 | 63 ee 2e 9b fc 5a 62 eb 0d 0f da ab 7c b3 2f f6 | 1d 06 62 78 d0 f2 08 dd bd 5a f1 dc aa 18 b1 3b | 54 75 36 28 b8 4d f2 e6 89 e0 6c 9d a4 f4 71 27 | 99 51 48 e8 63 85 2b 41 07 00 9f 7b ff df b2 6f | 90 1f ac 1e 28 94 ef cf 9a 1c cf 53 7f 88 76 ba | 31 4b 32 29 7d 41 fd ba 51 dd cc 44 b9 6c 4f e1 | cf 89 c3 39 c3 eb 26 5a 05 e3 ac c1 a6 d7 ca ae | 7d 27 a2 0d 12 e5 de 71 e2 d1 95 9c b5 ec 14 d8 | 29 00 00 24 d3 c9 38 16 a4 35 41 62 ad 53 1d 3f | a5 70 61 f3 55 11 e2 06 85 67 55 51 bd 50 94 8d | 80 2d 38 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 1c df ea ba 44 23 ff a6 53 af 56 | 8c 58 68 ea 71 49 69 6d 00 00 00 1c 00 00 40 05 | 14 0c bd d4 4b a2 ff 28 87 d9 dd 83 a7 c2 2b 61 | 5c 8c 59 cd | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #308 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 0a 88 98 4b f9 e7 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #308 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #308 | rejected packet: | 80 0a 88 98 4b f9 e7 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #308: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0491 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35804b810 | handling event EVENT_RETRANSMIT for parent state #484 | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #484 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #484 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49685.474105; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00325 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #484 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 "road-eastnet-nonat-232" #484: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #484) | 74 f2 d9 62 15 c8 1b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 3b 62 f3 ed f9 47 0c bf 01 45 93 af e9 01 13 | b4 4a bb 89 23 94 52 5c ed 86 36 6e eb 69 47 16 | 4f 4d 66 99 6d c7 d9 da 05 03 61 83 27 be 84 fb | f7 56 2a 10 f6 9b f2 84 b7 d0 85 06 cd 12 0f 3f | a6 61 71 e1 4c 4c be b5 23 cc e4 61 ef 62 aa 02 | 7f 71 fa f2 27 5a a1 66 46 df 65 7e 72 33 12 a7 | d6 b1 80 2f 61 a3 b3 4c c2 28 e7 cf a7 3c 3b 6f | 3a a0 e5 2d 1e 20 bd 32 76 a2 9f 45 f7 a6 6e e6 | 37 c0 ae 2c 38 01 39 bd 5f e0 3d 65 31 0e f3 37 | 25 fd f7 75 ed 4c 70 31 98 89 dd 26 6b f0 c6 86 | 26 2c de ac 79 65 19 00 78 ef 2a 8b 1d ed 38 d3 | 5d 90 eb e1 29 71 f3 ff 0c 50 ed 12 97 fe f3 76 | 44 b9 27 26 27 3a b5 56 98 ce 1d d1 07 e6 e9 5e | c0 92 67 d1 b6 25 97 6b 40 80 cf 9a 68 03 d5 29 | 53 a9 fd 87 28 85 18 42 c6 5b 08 65 a1 d2 2b 6d | e9 34 66 d8 9b 2a 73 2a 5b b8 59 63 5e 1f 84 b9 | 29 00 00 24 71 8e 31 23 c4 63 d2 6d d6 0a c0 cb | 7f b2 37 27 b0 85 2e 73 82 c7 9f d6 c1 fd d8 67 | ff 33 43 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 6d 47 d8 30 7b 36 73 b1 0d df 8b | 82 69 87 3e 91 43 68 d6 00 00 00 1c 00 00 40 05 | 23 15 eb e5 a3 5e 20 cf 73 fe 01 cb 79 d0 a6 f2 | 55 38 68 fe | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35804b810 | #484 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 f2 d9 62 15 c8 1b 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #484 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #484 | rejected packet: | 74 f2 d9 62 15 c8 1b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #484: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0704 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0d500 | handling event EVENT_RETRANSMIT for parent state #496 | start processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #496 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #496 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49685.477468; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500906 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35804b810 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #496 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 "road-eastnet-nonat-244" #496: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #496) | f5 9f b4 c2 7a 9c 1f 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec 8a 03 66 9e a5 16 39 b9 4a bb 3f cb 61 65 42 | 8b 18 46 77 70 53 8b 55 8b 35 c6 f2 c8 4d 38 3e | 2b 6f 3f c9 8d f1 cb 91 94 06 70 93 28 a0 96 60 | 92 d3 00 a2 ef 01 89 68 02 8d 85 25 69 9d e5 95 | 69 f6 3b 34 62 4f 63 bc 8e bf 0f 5d c5 bc ea 46 | f9 33 76 3d ad c3 1d 5a 73 74 ae ae 16 20 46 35 | 9e db 41 74 ad 1f 50 49 89 b1 86 a0 57 06 1e bf | 85 a3 93 e1 b5 84 03 d1 1b 0b 7b cd 83 c2 b7 25 | da ae 43 dc f0 b6 2a cd 25 9c e3 07 d7 ef 34 20 | 0c 00 64 d5 63 1f b1 99 29 80 fe 35 ec 43 23 95 | 6a a2 fc 57 a3 69 20 ea 94 fb aa 78 ee 5b 41 20 | 62 d9 4d ee fd 29 6e d9 f4 a1 15 cb 28 a0 f5 d3 | 5e bd 59 a6 87 61 99 4f 80 5d e6 36 36 11 e0 c2 | e5 c9 d7 3c 99 3b 27 4b f7 81 ca 42 93 ee a9 76 | e3 2e 24 6c 18 27 a8 24 04 ce 7c dd c7 a8 fd 5b | a3 04 bb 87 35 69 9f a6 83 11 9f de e4 40 52 5f | 29 00 00 24 4f 4f 97 a4 0f 74 20 cc 43 f4 64 ac | a1 3b a8 cc 16 af 62 fa 43 5b 11 20 24 9f 33 6a | 2d 6e 82 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 79 bb 2d d9 d9 21 50 1a 1a 14 0f | 62 ed ae c0 08 f2 03 40 00 00 00 1c 00 00 40 05 | c8 1f b0 a0 de 58 fc c7 c3 79 0d 4a c2 37 42 43 | 8a b6 69 08 | libevent_free: release ptr-libevent@0x7fb340045ed0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d500 | #496 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 9f b4 c2 7a 9c 1f 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #496 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #496 | rejected packet: | f5 9f b4 c2 7a 9c 1f 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #496: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a72150 | handling event EVENT_RETRANSMIT for parent state #248 | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #248 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #248 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49685.479798; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.015362 exceeds limit? YES "road-eastnet-nonat-248" #248: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-248" #248: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #500 at 0x557d46b25180 | State DB: adding IKEv2 state #500 in UNDEFINED | pstats #500 ikev2.ike started | Message ID: init #500: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #500: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #500; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-248" #500: initiating v2 parent SA to replace #248 | using existing local IKE proposals for connection road-eastnet-nonat-248 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 500 for state #500 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0d500 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #500 | libevent_malloc: new ptr-libevent@0x7fb340045ed0 size 128 | #500 spent 0.0997 milliseconds in ikev2_parent_outI1() | crypto helper 3 resuming | RESET processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 3 starting work-order 500 for state #500 | start processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #248 ikev2.ike failed too-many-retransmits | pstats #248 ikev2.ike deleted too-many-retransmits | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 500 | #248 spent 2.72 milliseconds in total | [RE]START processing: state #248 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-248" #248: deleting state (STATE_PARENT_I1) aged 64.017s and NOT sending notification | parent state #248: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #248 "road-eastnet-nonat-248" #248: deleting IKE SA for connection 'road-eastnet-nonat-248' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-248' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-248 | State DB: deleting IKEv2 state #248 in PARENT_I1 | parent state #248: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #248 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 500 time elapsed 0.000715 seconds | libevent_free: release ptr-libevent@0x7fb388027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a72150 | in statetime_stop() and could not find #248 | (#500) spent 0.687 milliseconds in crypto helper computing work-order 500: ikev2_outI1 KE (pcr) | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 3 sending results from work-order 500 for state #500 to event queue | scheduling resume sending helper answer for #500 | processing global timer EVENT_REVIVE_CONNS | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 Initiating connection road-eastnet-nonat-248 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 3 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-248" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-248' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-248" | stop processing: connection "road-eastnet-nonat-248" (in initiate_a_connection() at initiate.c:349) | spent 0.0641 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #500 | start processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 500 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #500 | **emit ISAKMP Message: | initiator cookie: | dc 38 e1 a3 3b e2 b1 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-248 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 79 4a f1 97 41 66 ce d4 ab 90 74 77 4f 00 cb 43 | ikev2 g^x 1f 3a 29 28 bd ab f1 45 3f 88 a4 79 39 fe 2c ee | ikev2 g^x 1b e9 2e 5c de da 76 bf a3 0c cc 93 b6 1b 8c 68 | ikev2 g^x 84 10 8f 55 6f 47 ec 76 41 18 0c b4 50 73 cf e8 | ikev2 g^x 55 11 98 5d d0 8c 2d e1 b9 47 bc d9 dd 4c 8a 72 | ikev2 g^x 7c cf 3b 3b b2 57 cf 3d e0 1d d4 39 94 72 a1 23 | ikev2 g^x 6b 6c 49 1f b9 94 b3 b7 a4 33 d9 35 1a 97 76 7e | ikev2 g^x 8f eb c4 34 d7 30 b6 ff 0b a0 77 62 d6 0a a9 b7 | ikev2 g^x 60 e4 b0 4d 0f 38 4b ae 9a ce 16 98 d0 34 95 01 | ikev2 g^x 44 fe 57 be 26 cf f9 d3 b8 79 e7 d6 d9 c0 2e 7d | ikev2 g^x 90 21 6f 7d c3 bc 04 f3 80 08 f6 e6 0b 6f 05 a0 | ikev2 g^x f8 da 5b cf d5 f7 d1 f1 f5 c0 29 8b c4 a2 cc 29 | ikev2 g^x 8c e2 9a 9c 8f bf ae c2 b0 3f ce e4 df fb 71 f5 | ikev2 g^x f7 13 31 70 b5 0f b2 9e ae 64 eb 2c 73 aa d9 5b | ikev2 g^x 7a b9 c4 3b 46 10 f6 92 a7 5e 0d a0 e7 06 8a 74 | ikev2 g^x 5e 40 71 07 4b d8 c5 08 71 52 bd 30 01 84 10 98 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 73 e7 fd d9 0c 07 09 ec 59 bd 7a b5 40 29 3e 5b | IKEv2 nonce f2 d3 e1 ea 7b 04 b1 b4 b1 5f 03 d2 b4 24 ec 7d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= dc 38 e1 a3 3b e2 b1 39 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f8 | natd_hash: port= 01 f4 | natd_hash: hash= 45 f6 20 af 00 f8 ef 66 b3 21 e2 19 0f ba fb 8a | natd_hash: hash= ed c9 14 86 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 45 f6 20 af 00 f8 ef 66 b3 21 e2 19 0f ba fb 8a | Notify data ed c9 14 86 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= dc 38 e1 a3 3b e2 b1 39 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 70 63 55 d1 ed 70 f9 1a 8c 9d 5a 9a f7 cc 31 61 | natd_hash: hash= 9c 9b 74 c0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 70 63 55 d1 ed 70 f9 1a 8c 9d 5a 9a f7 cc 31 61 | Notify data 9c 9b 74 c0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #500 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #500: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #500 to 4294967295 after switching state | Message ID: IKE #500 skipping update_recv as MD is fake | Message ID: sent #500 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-248" #500: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.248:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #500) | dc 38 e1 a3 3b e2 b1 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 4a f1 97 41 66 ce d4 ab 90 74 77 4f 00 cb 43 | 1f 3a 29 28 bd ab f1 45 3f 88 a4 79 39 fe 2c ee | 1b e9 2e 5c de da 76 bf a3 0c cc 93 b6 1b 8c 68 | 84 10 8f 55 6f 47 ec 76 41 18 0c b4 50 73 cf e8 | 55 11 98 5d d0 8c 2d e1 b9 47 bc d9 dd 4c 8a 72 | 7c cf 3b 3b b2 57 cf 3d e0 1d d4 39 94 72 a1 23 | 6b 6c 49 1f b9 94 b3 b7 a4 33 d9 35 1a 97 76 7e | 8f eb c4 34 d7 30 b6 ff 0b a0 77 62 d6 0a a9 b7 | 60 e4 b0 4d 0f 38 4b ae 9a ce 16 98 d0 34 95 01 | 44 fe 57 be 26 cf f9 d3 b8 79 e7 d6 d9 c0 2e 7d | 90 21 6f 7d c3 bc 04 f3 80 08 f6 e6 0b 6f 05 a0 | f8 da 5b cf d5 f7 d1 f1 f5 c0 29 8b c4 a2 cc 29 | 8c e2 9a 9c 8f bf ae c2 b0 3f ce e4 df fb 71 f5 | f7 13 31 70 b5 0f b2 9e ae 64 eb 2c 73 aa d9 5b | 7a b9 c4 3b 46 10 f6 92 a7 5e 0d a0 e7 06 8a 74 | 5e 40 71 07 4b d8 c5 08 71 52 bd 30 01 84 10 98 | 29 00 00 24 73 e7 fd d9 0c 07 09 ec 59 bd 7a b5 | 40 29 3e 5b f2 d3 e1 ea 7b 04 b1 b4 b1 5f 03 d2 | b4 24 ec 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 f6 20 af 00 f8 ef 66 b3 21 e2 19 | 0f ba fb 8a ed c9 14 86 00 00 00 1c 00 00 40 05 | 70 63 55 d1 ed 70 f9 1a 8c 9d 5a 9a f7 cc 31 61 | 9c 9b 74 c0 | state #500 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb340045ed0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0d500 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a72150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #500 | libevent_malloc: new ptr-libevent@0x7fb388027c10 size 128 | #500 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49685.481266 | resume sending helper answer for #500 suppresed complete_v2_state_transition() and stole MD | #500 spent 0.474 milliseconds in resume sending helper answer | stop processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb338009640 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 38 e1 a3 3b e2 b1 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #500 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #500 | rejected packet: | dc 38 e1 a3 3b e2 b1 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f8 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #500: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acc140 | handling event EVENT_RETRANSMIT for parent state #466 | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #466 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #466 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49685.482476; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003086 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #466 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-214" #466: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #466) | d8 f3 8e 44 6b 2f 1e a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c e1 1c b6 a8 45 43 90 db 9b 35 75 1f aa 92 f9 | d6 e2 6f 34 81 df f8 c5 fb 61 93 34 a9 9a d6 e7 | 4f 19 4e 64 91 79 4b bc 74 e5 43 7f 1c fd f5 46 | 67 4f b3 d8 c9 4d 2d c9 eb 26 c5 ea 6c 36 ba 25 | 06 8c 1d c8 05 71 c9 48 a5 ca a6 91 9c 00 5f c8 | af c1 a9 4d 01 92 ef ab 3a e6 5a 67 89 38 c9 af | 19 fe 4d 6b 76 3f 95 f8 65 3e 4b 5b 24 34 56 32 | 9f dd 59 97 7b 03 2f 23 ce fb e6 f8 e4 68 93 ff | ad 3a cf f3 67 73 9d e1 9b 2a d0 84 d4 ba 4d fe | 72 3c 74 29 f1 ab eb eb fd d6 c3 47 54 02 c4 5f | 85 e4 bc a9 88 7b 25 6d 99 c6 f0 38 89 09 7c 47 | 72 c2 61 46 a0 1d 59 09 82 b5 5f b7 e1 f1 5c 0d | 50 1d c9 01 1e 1c 93 24 6c e4 5b 27 7f 49 97 85 | 14 7e 19 88 ae dd 1a b6 56 79 35 3e ff bd 7d 4e | 47 80 ff 35 79 4b c6 1c b6 e7 5a d2 8f b2 aa 73 | 6a 88 5b 1d bb 78 3e 8d f2 9b 06 47 8f 4b 75 e7 | 29 00 00 24 4b 18 d5 35 7f 58 ef 5d 8f 25 3f b5 | cb 0b 31 6c 2d c9 a6 3f f9 92 29 72 9b 38 37 11 | 6a b0 a4 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 d8 47 26 17 c1 8a e8 09 00 37 fb | f1 38 56 14 b9 a5 7b 42 00 00 00 1c 00 00 40 05 | 10 91 19 bc 27 f8 ea 8a 40 18 2c 45 b2 2a 2d 38 | 23 45 ab e1 | libevent_free: release ptr-libevent@0x7fb3440300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acc140 | #466 spent 0.0983 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 f3 8e 44 6b 2f 1e a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #466 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #466 | rejected packet: | d8 f3 8e 44 6b 2f 1e a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #466: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370046090 | handling event EVENT_RETRANSMIT for parent state #421 | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #421 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #421 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49685.488741; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004505 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acc140 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #421 | libevent_malloc: new ptr-libevent@0x7fb3440300e0 size 128 "road-eastnet-nonat-169" #421: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #421) | 53 46 78 d0 f9 b4 2b ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 1e 13 6f 9e 9e 28 7d 48 cb 8f 21 ad 12 23 0d | 2e 17 4b ec 60 47 24 f9 49 65 0f b8 05 f3 b2 c5 | 35 0c dd 44 2a 04 47 c6 96 e8 e3 9d da 44 54 8d | d0 16 cf 7d 24 e8 e0 cd a8 2c 8e 39 d3 b2 8b 7f | 72 0a 52 da e9 14 4a cc 17 a9 78 b8 cd 5e be 1d | b9 b5 cd 7b b6 5f 02 22 ea c4 0a a6 8f a3 01 6c | 5b 53 24 36 89 d6 72 ef 99 b2 12 aa fb cb aa db | b2 d1 08 23 c1 6a e2 dd cd 0b 52 1b 08 f4 07 44 | f6 bb f7 14 71 89 1d 05 a9 2e 9d 11 f6 47 e7 7b | 5c 89 c0 6a 79 44 41 55 07 e9 d4 c5 65 08 95 21 | 02 27 ea de 7e 8f c1 e5 b3 56 d5 44 30 34 c9 29 | 25 c6 6c f5 76 8d bd 58 fa 4e 08 93 a9 a8 12 bd | 8c 61 44 c0 18 3b 6c f3 4a 89 60 c3 7a 98 37 61 | d4 a6 d5 c6 6d e0 61 22 11 f5 b2 91 df 3b aa 2c | 62 52 60 02 03 f1 56 8c f6 e3 d9 1e 59 30 5a b8 | cf c5 38 a8 40 43 1f 7b 8b 5b 7c d9 77 f7 d9 ba | 29 00 00 24 41 49 08 f2 3f 7f 22 d1 7a a9 25 e2 | 15 a5 3d 37 9b e8 6b f7 56 6b 10 73 05 1d f4 b0 | b9 8c f9 c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 d0 78 7d 22 f6 6d e2 e5 b7 d3 9b | 09 f6 2a 83 8c 96 39 01 00 00 00 1c 00 00 40 05 | 72 19 84 dc d4 59 5b 35 51 4f b6 9f 34 c6 2f ea | b9 aa 04 8a | libevent_free: release ptr-libevent@0x7fb35402a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370046090 | #421 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 46 78 d0 f9 b4 2b ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #421 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #421 | rejected packet: | 53 46 78 d0 f9 b4 2b ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #421: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #493 | start processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #493 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #493 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49685.490083; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001705 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370046090 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #493 | libevent_malloc: new ptr-libevent@0x7fb35402a950 size 128 "road-eastnet-nonat-241" #493: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #493) | ed 28 a4 bc 11 7c af 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 43 c9 b9 d1 39 88 cf b4 19 83 df 09 c8 d9 33 | 6a 66 ab 95 b0 dd 15 4d 5d 4a fa 5d 52 f2 94 c9 | 8c 6b 4e fd a3 be 7b 1e 26 3d da ae 4a c7 9d 27 | 63 37 11 7d f7 65 a5 40 e2 b8 e7 88 e2 a7 17 fe | 35 86 91 9a d8 ce fa 63 4d d8 5f 33 39 8b fd 0b | c7 66 ad d7 e3 69 0a d0 e8 2c 35 2b 87 c6 e8 d1 | 35 a2 6a bd 14 2b 17 e4 3b 63 91 15 e8 44 4a 0b | ee 35 18 44 31 9b e0 f3 11 2e f9 0a f8 94 2e e7 | 37 62 af 42 67 9b d9 c2 7a 1d 9a 74 9c 27 5f 4e | 6c 61 5b 8d 6f b6 26 7a 65 28 0b d8 63 b2 4d f2 | 4f 66 7e 68 e4 09 4f e1 36 c2 c4 fc b8 a8 0d bd | 8f 6c 26 6b 1b b4 27 de 4d 65 70 86 b8 d6 2d 91 | e7 12 ef a7 86 2f 17 c5 46 49 a0 b2 37 f9 08 9e | 05 44 0c 6d 93 fe 69 98 08 f9 28 75 1f 4f 91 2d | 39 9f 63 17 e0 d3 1a 4e 52 69 6b 52 15 77 3f 2f | 3e 88 cf 00 87 f9 bd f2 03 53 f2 34 f3 a4 6a 9a | 29 00 00 24 a6 a1 ba dd 86 99 b3 8f 47 4a 4d 8f | 4a 4e 2e 70 ee a1 39 80 4f 25 94 bc 3e 73 ee 31 | 55 0b 3a 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b ce a8 52 73 2a af 56 99 7a 11 14 | f3 b1 9c fe 91 8b 24 9a 00 00 00 1c 00 00 40 05 | 14 ee cd 8a 22 d5 80 d4 99 d7 ec c4 4c 96 10 11 | ff 51 59 09 | libevent_free: release ptr-libevent@0x7fb34803f490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #493 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 28 a4 bc 11 7c af 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #493 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #493 | rejected packet: | ed 28 a4 bc 11 7c af 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #493: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0582 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35400d120 | handling event EVENT_RETRANSMIT for parent state #309 | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #309 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #309 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49685.519367; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005907 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #309 | libevent_malloc: new ptr-libevent@0x7fb34803f490 size 128 "road-eastnet-nonat-57" #309: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #309) | 90 f2 f2 23 da 96 f5 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 ae c5 2a 76 79 d9 11 80 1f 96 5b 2c 21 55 0e | 52 32 59 59 4d 8b 62 1b 1e 24 ff e4 61 ef 06 93 | bc 09 7d 02 95 4e 35 bb 5f 6e 04 f9 37 8a f2 09 | 6d fa 0e df ec 2a 67 53 c6 cd 21 62 19 ee 00 c8 | c1 d4 ad 74 e9 af 08 d7 51 b7 54 c4 5f 85 6b a2 | 75 c9 cd 93 29 db 83 26 13 60 09 0f 01 6b a6 ba | d6 a0 83 70 f4 77 2d c4 f9 20 b0 ee 09 7b a0 33 | 18 ea 6e 22 92 4b e5 33 07 61 e4 39 b1 8b 5a 98 | 64 4f e0 7f 33 58 7a 46 70 b5 36 54 83 e6 d8 37 | ce 3d 5e 64 00 34 b5 97 2a dc 6b 73 bd d2 1e e9 | b3 9d 99 c9 3c f8 18 03 58 76 b7 9a 2d cb ea 7b | 87 84 d1 8b 6e c6 cd 25 71 71 3e 99 ff 0a 1f c8 | 85 6f a7 e5 39 50 54 2c 26 84 44 cb fa 8a 51 d4 | ba 1f 9f 90 6f 93 95 a4 f9 85 9a b3 12 aa 79 46 | 05 32 e1 d4 7a f2 7a 36 94 b5 70 4b aa c4 3f f8 | f9 83 fb b5 44 81 41 3d b3 33 5c b4 2d 71 df 84 | 29 00 00 24 4c 7f 8f 28 17 31 ae 2a a7 3c 6d 65 | 1e 41 da 23 81 4d 09 fa 18 57 5d 4f dc f4 df 6c | 20 61 c5 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f3 f8 4c d7 1e 43 e6 3f 42 eb 30 72 | de e0 e8 5b 93 4d e7 89 00 00 00 1c 00 00 40 05 | e8 f2 fc 6d 83 fa 04 7a cc 0f 54 6b 70 28 25 4d | 2b f2 eb 8b | libevent_free: release ptr-libevent@0x7fb354012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400d120 | #309 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 f2 f2 23 da 96 f5 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #309 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #309 | rejected packet: | 90 f2 f2 23 da 96 f5 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #309: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c012630 | handling event EVENT_RETRANSMIT for parent state #422 | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #422 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #422 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49685.556647; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004559 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #422 | libevent_malloc: new ptr-libevent@0x7fb354012840 size 128 "road-eastnet-nonat-170" #422: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #422) | b8 e0 2b 96 c7 45 5a 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 6c 40 a5 03 bc 57 72 c1 66 d6 ac 89 5b f4 c1 | d0 36 2b 40 f8 23 54 39 34 b5 82 a2 ec a9 be f0 | 9e 2a fb a5 33 fb bf 78 6a 65 ee e2 5e 78 b2 97 | 57 06 96 a7 85 bc b5 2f 57 ad dd 92 ec d4 39 15 | 9d 72 7c 3a f0 31 6f b3 e0 1f fa e2 bb 36 ae ad | 14 69 bc c7 2b b8 d3 5c 99 5b e0 8a c5 e8 54 ff | a1 c6 b4 be 7e 54 b5 cb 08 e2 27 e4 e9 7a 16 60 | ce 85 f4 97 da 4f 4d 09 2e 8c 52 19 57 93 83 db | 87 b1 16 b3 51 00 56 5d 37 6d b9 b3 a2 bd 99 3b | aa 47 42 33 bb 18 39 df 45 15 55 a1 5a 1e 8d 44 | 65 5b 06 c8 ce 40 9d 80 8b 2e ca 26 d1 79 fd 78 | 43 19 a6 31 62 db c5 b6 b4 99 3e 3d 0f 92 3a 22 | 67 54 41 d3 95 c5 98 ed 1d fc 1c 5c cc 1c ff 1e | 72 31 d9 fd 8f 7a 3f e9 62 8e 84 af f0 f7 f0 8d | 9b 73 d6 fc ff bc e5 4a d7 b9 1b 80 22 88 c1 56 | e0 bb 60 af 81 19 d7 73 ec 24 2d 0b 96 d4 fa 10 | 29 00 00 24 2b c3 8d 3d 91 5a 53 1a b5 f4 6d b1 | 02 bf f8 18 e1 84 d7 9f a5 0d 77 07 91 b8 4d 3f | 04 89 f2 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 85 d2 75 8f 47 7e 81 98 63 03 9f | 1d 8c c0 94 92 93 75 cc 00 00 00 1c 00 00 40 05 | 2a 28 b7 7f 38 5f e0 65 f6 1d 4d c9 d5 6f ea f1 | c9 85 fb 5d | libevent_free: release ptr-libevent@0x7fb36c04b970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012630 | #422 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 e0 2b 96 c7 45 5a 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #422 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #422 | rejected packet: | b8 e0 2b 96 c7 45 5a 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #422: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358009690 | handling event EVENT_RETRANSMIT for parent state #467 | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #467 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #467 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49685.566002; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004079 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012630 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #467 | libevent_malloc: new ptr-libevent@0x7fb36c04b970 size 128 "road-eastnet-nonat-215" #467: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #467) | be 07 ac 9a b2 b5 64 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 4e 05 41 e0 9c 82 57 92 0a 9a c0 ac b7 0e 16 | 8f cf 40 f2 c1 21 c6 0e 53 7f 71 9b 23 53 ab 32 | ef 64 72 bf 1c eb 94 98 29 9f 35 3d 25 d3 1c 5f | e7 9d 00 19 e2 0a 16 20 a6 ea 3a 6d 7b 32 8e 93 | 96 ee 8d 09 fc 5d f8 27 b9 ca 49 09 65 ce cf 30 | 67 2e f4 4f 3d ad 29 2d 5a 4c 68 40 7f 94 6f ad | f5 98 12 1b 59 74 90 02 ab ae 6a 47 c6 cb f0 fe | 1e 5f 8d 21 2a 5d 11 fe 17 3b 75 9d 65 5c 76 a0 | e4 ca 7c e0 c8 8a 37 49 e6 36 2e 9d 9d 6c be 13 | f2 87 dd 81 d0 10 4c ee c7 ac d9 53 97 d2 c8 92 | 06 a5 e1 c9 c7 93 30 ee d6 3d ac 47 98 50 1f 6d | d0 3a db 8b df 20 7f 6b 55 4b d3 fe b0 df 95 14 | 4e 40 f5 72 7e 0c bb 04 da d9 d2 07 87 d2 e0 72 | 1c 20 5b 2d c2 5e 0e 89 32 b0 a4 ac ae 09 91 0a | ac c6 1c cc d1 3b 35 35 b5 b5 4c 01 ce b4 2e ea | cd 79 86 98 20 31 06 5b 6a 88 36 07 19 32 e2 40 | 29 00 00 24 65 a2 6f 51 03 e0 c3 95 a1 17 d9 10 | 35 d2 c8 05 2a 6d 6f d8 b4 c3 4c 08 92 7c 46 6b | 3f 11 55 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 95 f5 c4 0f 53 2d de 04 94 5d f4 | 44 07 bd 21 62 32 e6 d2 00 00 00 1c 00 00 40 05 | d8 32 98 63 8b 4a fe f1 1f e4 de 6d 0f 9b fc 4d | cc 8b 9a c1 | libevent_free: release ptr-libevent@0x7fb358023e50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358009690 | #467 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be 07 ac 9a b2 b5 64 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #467 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #467 | rejected packet: | be 07 ac 9a b2 b5 64 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #467: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0508 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56dd0 | handling event EVENT_RETRANSMIT for parent state #249 | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #249 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #249 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49685.567311; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.010295 exceeds limit? YES "road-eastnet-nonat-249" #249: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-249" #249: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #501 at 0x557d46b26740 | State DB: adding IKEv2 state #501 in UNDEFINED | pstats #501 ikev2.ike started | Message ID: init #501: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #501: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #501; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-249" #501: initiating v2 parent SA to replace #249 | using existing local IKE proposals for connection road-eastnet-nonat-249 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 501 for state #501 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb358009690 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #501 | libevent_malloc: new ptr-libevent@0x7fb358023e50 size 128 | #501 spent 0.0707 milliseconds in ikev2_parent_outI1() | crypto helper 1 resuming | RESET processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 1 starting work-order 501 for state #501 | start processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 501 | pstats #249 ikev2.ike failed too-many-retransmits | pstats #249 ikev2.ike deleted too-many-retransmits | #249 spent 3.01 milliseconds in total | [RE]START processing: state #249 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-249" #249: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #249: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #249 "road-eastnet-nonat-249" #249: deleting IKE SA for connection 'road-eastnet-nonat-249' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-249' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-249 | State DB: deleting IKEv2 state #249 in PARENT_I1 | parent state #249: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #249 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 501 time elapsed 0.000827 seconds | libevent_free: release ptr-libevent@0x7fb3680180b0 | (#501) spent 0.827 milliseconds in crypto helper computing work-order 501: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 501 for state #501 to event queue | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56dd0 | in statetime_stop() and could not find #249 | scheduling resume sending helper answer for #501 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb388047480 size 128 | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-249 which received a Delete/Notify but must remain up per local policy | crypto helper 1 waiting (nothing to do) | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-249" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-249' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-249" | stop processing: connection "road-eastnet-nonat-249" (in initiate_a_connection() at initiate.c:349) | spent 0.0978 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #501 | start processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 501 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #501 | **emit ISAKMP Message: | initiator cookie: | 7a bb eb ab 59 82 f5 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-249 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 87 e6 e7 b7 df 15 1a 88 da d9 de 99 20 d1 37 56 | ikev2 g^x a1 ac 1e 3f d7 4a 79 5c c8 d1 9e 85 c4 f1 dc d8 | ikev2 g^x f1 ca b4 9f 14 60 92 de ad 42 9b 69 57 eb d4 33 | ikev2 g^x 23 a5 0d 4e 25 37 79 9e 75 f6 18 19 e2 36 6a 82 | ikev2 g^x 3e c6 41 e8 fb 1d 27 30 85 3c c4 c4 37 ed 39 57 | ikev2 g^x 59 68 3d d5 92 7b 15 e0 1d da a4 bf 8a 13 2e 99 | ikev2 g^x fa b3 d7 34 a7 e9 ee 45 93 41 ea 47 57 78 a8 c7 | ikev2 g^x 28 3e 80 cf 3a fa c3 5c 40 7e 2d 6e a8 8f 1a 76 | ikev2 g^x 9f e3 ee 0a 5c 09 b9 35 7b e1 73 9e 9a 5b 7e 05 | ikev2 g^x af 57 ba 41 a4 20 67 9b 93 00 a4 77 65 8b 72 e8 | ikev2 g^x ca c2 a7 8c f8 bc 75 a9 2f 52 c5 be ea 41 46 90 | ikev2 g^x 6a 2e 17 cc 87 cc 0a 22 0b d8 b5 c8 dd ab 30 09 | ikev2 g^x 90 3a 1d 65 9d 2f 73 fc c6 06 30 d8 66 83 64 c8 | ikev2 g^x a7 e5 c1 23 61 62 8a 18 87 ad dc 7f 74 de 65 20 | ikev2 g^x fb ed bb 7b ca 02 66 e1 c0 5c b2 b3 41 14 ad 3d | ikev2 g^x 9e 02 fd e0 c6 5b ba ef b1 16 d3 d4 8f 92 d4 90 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0f d0 3c c8 9f 70 8e 25 2a 4f 78 c0 1d 68 16 9a | IKEv2 nonce 4a bb 3c a4 19 fe 19 3a d7 7c 1c 89 23 2f 21 42 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7a bb eb ab 59 82 f5 51 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f9 | natd_hash: port= 01 f4 | natd_hash: hash= 96 3b be 6c 39 30 3e f5 fc f3 31 c5 53 ef 34 5b | natd_hash: hash= ca c1 eb 03 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 96 3b be 6c 39 30 3e f5 fc f3 31 c5 53 ef 34 5b | Notify data ca c1 eb 03 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7a bb eb ab 59 82 f5 51 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 86 82 cd 41 4f 66 70 19 76 ed 27 dd 0a 04 2f 6d | natd_hash: hash= e6 1d 3e b6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 86 82 cd 41 4f 66 70 19 76 ed 27 dd 0a 04 2f 6d | Notify data e6 1d 3e b6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #501 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #501: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #501 to 4294967295 after switching state | Message ID: IKE #501 skipping update_recv as MD is fake | Message ID: sent #501 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-249" #501: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.249:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #501) | 7a bb eb ab 59 82 f5 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 e6 e7 b7 df 15 1a 88 da d9 de 99 20 d1 37 56 | a1 ac 1e 3f d7 4a 79 5c c8 d1 9e 85 c4 f1 dc d8 | f1 ca b4 9f 14 60 92 de ad 42 9b 69 57 eb d4 33 | 23 a5 0d 4e 25 37 79 9e 75 f6 18 19 e2 36 6a 82 | 3e c6 41 e8 fb 1d 27 30 85 3c c4 c4 37 ed 39 57 | 59 68 3d d5 92 7b 15 e0 1d da a4 bf 8a 13 2e 99 | fa b3 d7 34 a7 e9 ee 45 93 41 ea 47 57 78 a8 c7 | 28 3e 80 cf 3a fa c3 5c 40 7e 2d 6e a8 8f 1a 76 | 9f e3 ee 0a 5c 09 b9 35 7b e1 73 9e 9a 5b 7e 05 | af 57 ba 41 a4 20 67 9b 93 00 a4 77 65 8b 72 e8 | ca c2 a7 8c f8 bc 75 a9 2f 52 c5 be ea 41 46 90 | 6a 2e 17 cc 87 cc 0a 22 0b d8 b5 c8 dd ab 30 09 | 90 3a 1d 65 9d 2f 73 fc c6 06 30 d8 66 83 64 c8 | a7 e5 c1 23 61 62 8a 18 87 ad dc 7f 74 de 65 20 | fb ed bb 7b ca 02 66 e1 c0 5c b2 b3 41 14 ad 3d | 9e 02 fd e0 c6 5b ba ef b1 16 d3 d4 8f 92 d4 90 | 29 00 00 24 0f d0 3c c8 9f 70 8e 25 2a 4f 78 c0 | 1d 68 16 9a 4a bb 3c a4 19 fe 19 3a d7 7c 1c 89 | 23 2f 21 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 3b be 6c 39 30 3e f5 fc f3 31 c5 | 53 ef 34 5b ca c1 eb 03 00 00 00 1c 00 00 40 05 | 86 82 cd 41 4f 66 70 19 76 ed 27 dd 0a 04 2f 6d | e6 1d 3e b6 | state #501 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb358023e50 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb358009690 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56dd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #501 | libevent_malloc: new ptr-libevent@0x7fb3680180b0 size 128 | #501 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49685.568833 | resume sending helper answer for #501 suppresed complete_v2_state_transition() and stole MD | #501 spent 0.39 milliseconds in resume sending helper answer | stop processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388047480 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a bb eb ab 59 82 f5 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #501 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #501 | rejected packet: | 7a bb eb ab 59 82 f5 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f9 fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #501: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #485 | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #485 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #485 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49685.592029; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004268 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46910 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #485 | libevent_malloc: new ptr-libevent@0x7fb388047480 size 128 "road-eastnet-nonat-233" #485: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #485) | 26 20 85 62 4e 58 16 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 04 a6 43 51 7a 0a e3 68 c7 b6 92 c0 2e 14 67 | a2 f2 cb 51 e5 ce 35 16 88 d3 54 6d 62 23 37 bb | 56 61 2f d6 85 87 83 0f 70 f6 72 39 7f a7 0c c7 | 1e 70 d8 7f 4c 38 fa 53 49 29 41 95 c4 be f2 60 | 8b f1 ad 4f de df 26 c9 05 54 42 92 f1 01 24 5d | 5f 31 21 56 71 00 1c 4f 7f 83 41 cc a7 f5 8b 27 | 25 fc 78 92 10 e8 44 60 1c 59 0a 5b 0b c5 c2 c7 | 8a b4 bc 89 2b d6 59 5c 8c 78 a1 23 dc b0 6c 50 | 12 f1 b3 89 73 06 41 12 b7 a8 52 30 67 21 d0 5c | a9 0e cd 21 2b 24 e0 cb a7 f2 11 99 34 b7 dd 82 | a8 b2 9f 4a 0e 72 6d 9e a6 39 41 fd 0a 77 de bc | 1d a1 ee ad 3a 47 74 75 05 d6 38 42 86 69 10 70 | a8 ff d8 3e 12 b1 c4 88 03 52 77 9f cb 91 9d 87 | ca f5 79 a8 95 63 5f 4e a8 1e 43 7f 48 49 97 d5 | 03 8a 20 ac 28 9d 5a 1c 08 20 6e 33 63 3c ac 79 | a6 2e 32 53 fd 1d bb 3c 94 09 f3 ea 45 51 42 83 | 29 00 00 24 3d d6 d9 80 a2 0e 12 b1 24 d9 6e f6 | 52 8a 26 6d ef 88 17 44 c3 1d 79 ed f7 7c 90 92 | c7 d9 57 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dc 14 52 a7 e7 6d fa 0b e3 0e 97 be | 5d 15 66 8b 43 e6 a9 e4 00 00 00 1c 00 00 40 05 | 6d 80 f6 1e bc 0d ea 94 d1 d1 d0 f0 fd 2d 1e 46 | 86 63 b8 47 | libevent_free: release ptr-libevent@0x7fb36403f0c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | #485 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 20 85 62 4e 58 16 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #485 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #485 | rejected packet: | 26 20 85 62 4e 58 16 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #485: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b05240 | handling event EVENT_RETRANSMIT for parent state #497 | start processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #497 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #497 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49685.603359; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500491 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #497 | libevent_malloc: new ptr-libevent@0x7fb36403f0c0 size 128 "road-eastnet-nonat-245" #497: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #497) | 28 b5 38 f6 69 3c dd 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 04 4f fe 15 c7 2a a9 dd 3f 1e c4 af 27 5d f3 d2 | be f7 13 da e4 cd 00 79 29 61 5f 71 06 40 ec 4d | 5b 3c 6a 08 8b 9a 2f 7d 1c cb b0 e7 92 b6 f3 99 | d5 a0 ee 16 30 44 37 37 a1 b0 11 d5 bf c1 2a b7 | f5 d1 e8 e7 c9 c5 fa 46 9e 9f 3a b8 17 a3 bb fa | 54 7b 20 13 28 1b f7 09 b2 95 cc 2b 5d f4 60 59 | 43 48 23 26 2f ff 03 e2 92 b6 e4 28 ce 3a 0e b0 | 61 13 0a de 56 e6 23 f3 78 da d1 d7 d1 36 d7 28 | c6 40 4f d5 36 46 dd 50 a2 1e 26 c4 f5 81 8c a1 | f5 29 b8 66 19 89 39 ca 34 48 2c b5 7e 66 e5 bf | 86 9d 6e 91 75 02 c6 e8 9c 42 e7 98 64 aa 15 f8 | 6c 03 28 e6 79 39 e1 5e 40 0e f9 55 f0 a7 e0 83 | fa bb b8 03 f0 19 b9 6c 46 69 2b 63 42 39 b5 e4 | 3d 0b 8e 6b 21 0c f2 48 0e 67 57 08 dc 21 c5 f4 | 1a 4b 05 96 97 80 b1 ee 12 7e 9f 47 8d c8 b6 e1 | 5b 8f 86 2e 8f 92 b6 42 a3 65 04 7b ab ba 17 50 | 29 00 00 24 bb a3 f2 ad c6 d3 d5 2f 68 33 8b a0 | e0 e2 16 25 72 ec 6d 1a 07 9d 1d 9e dd 96 6a c8 | 4e 10 b2 ba 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 bb 68 12 ef 53 e2 45 10 bb c5 e2 | 24 4d b4 aa b9 d2 2c 73 00 00 00 1c 00 00 40 05 | 18 cd c3 7e 31 14 45 db 85 92 8b 2e 4a 8c 9b c9 | 08 95 b5 b9 | libevent_free: release ptr-libevent@0x7fb338046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b05240 | #497 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354012bf0 | handling event EVENT_RETRANSMIT for parent state #310 | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #310 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #310 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49685.603498; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004748 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b05240 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #310 | libevent_malloc: new ptr-libevent@0x7fb338046040 size 128 "road-eastnet-nonat-58" #310: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #310) | 15 02 9e 6f d7 63 29 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 27 e5 1e b0 b8 71 be 19 22 95 4e cb bc fb 75 | e9 3b 56 69 33 4e 64 ad 57 4b 29 1e a9 e6 47 1a | 9f d6 c8 79 0e b5 d1 68 4e cf f5 82 76 ae 1c b5 | 09 2e f5 34 f0 f4 52 a3 a8 36 97 6c 75 c0 43 c4 | ee 87 0e 53 ff 09 f4 54 79 74 c0 ae 90 9a ff fd | 29 25 b3 6a e6 b5 58 cb 0a 34 f3 40 7a e1 f0 00 | e8 b9 84 74 bb 8e 47 15 eb 04 15 5e 50 5c 56 6d | 24 4e c6 f1 73 76 98 a0 94 06 1f 4b 61 2c fc 5d | a8 62 64 09 74 1c b7 15 e9 d3 bf 3e 82 77 60 84 | b7 ec 0f bd 1c 3b 5b 97 d2 ff 90 15 40 4c 65 b9 | 49 3d 03 bf e1 e0 85 d7 23 77 e3 10 9e 84 72 33 | 77 bf bf d8 fb 57 2c a9 b4 49 77 20 46 c0 0f 64 | 28 da 55 aa ac 53 17 bb 64 f6 fe 0e af c2 be 09 | 4d 7e 65 25 98 17 8d d6 a3 3b ed 10 34 62 66 3b | 5f 3c 43 cb 1e 2b fc 0b 3e c7 88 ef 40 72 0f 91 | 73 8c 1b 91 80 50 8f 7f 10 7c a8 7c cd 25 bb 09 | 29 00 00 24 8c b6 d4 9e 94 5a 53 1f e0 86 71 ae | 2a 48 4d 09 6b cb 2a d4 c0 d8 ae 06 c9 7c dd 47 | 64 97 96 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 0a e7 b4 3e 63 13 55 ea 18 77 04 | bd 77 d7 da 99 7b 63 27 00 00 00 1c 00 00 40 05 | 5c 4d 49 83 ef 78 da dd 25 a2 53 b8 0f 9a 33 7f | f6 be 51 b8 | libevent_free: release ptr-libevent@0x7fb36401a420 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354012bf0 | #310 spent 0.0727 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 b5 38 f6 69 3c dd 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #497 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #497 | rejected packet: | 28 b5 38 f6 69 3c dd 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #497: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 02 9e 6f d7 63 29 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #310 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #310 | rejected packet: | 15 02 9e 6f d7 63 29 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #310: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0373 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa34c0 | handling event EVENT_RETRANSMIT for parent state #423 | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #423 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #423 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49685.626786; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004767 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354012bf0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #423 | libevent_malloc: new ptr-libevent@0x7fb36401a420 size 128 "road-eastnet-nonat-171" #423: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #423) | 0d af b2 c4 93 36 1d aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 70 3e db fb be 8b b3 fd 73 c0 a9 96 0b 3d a8 | e8 36 31 e7 9c ec 5a 7d ff 70 f6 37 85 23 83 66 | b2 fa b4 b8 d5 45 16 aa a6 25 06 9f 8e 8e bf 87 | eb 95 12 b7 4e e4 06 f4 d1 f8 40 ef 32 40 e6 a6 | 6e f4 f8 67 e1 5b 90 26 e6 0e 43 21 0c 13 d6 b5 | 8e c1 48 f1 b8 e8 39 77 8f 82 36 7b 93 75 c8 ab | 84 91 17 9b a4 7d 3c 17 79 cf 26 b4 a0 3c f6 3b | 8a 9e f2 22 e0 37 3d 4a 22 71 37 fa af 63 94 e0 | 5d cb 53 25 8c 9f 3c aa f6 38 ac 60 e7 b7 a3 49 | 84 5c ea cd 1a 4a 52 75 d6 46 93 25 09 85 d1 82 | dd 53 68 4b de 95 3f 19 ff d3 86 0a c0 38 25 ae | 80 9b b3 ed 25 0e b6 ad 72 55 3f 58 28 54 96 74 | 26 60 4c 26 05 26 c2 53 24 50 7e 5b 35 6b ca a1 | e8 d8 01 f8 35 32 32 e5 07 d9 c6 ca 24 0c 96 3a | 31 97 ac ed 1f 95 1e 6e 00 fc 4a 03 2a 9c 00 a0 | bd e4 04 9f 5c 17 08 9c 92 06 6e 29 32 98 a2 91 | 29 00 00 24 ce f0 94 25 9a 41 87 5c 3e 7f f2 93 | 02 a0 d4 6b b2 dd 60 48 d2 68 61 fc a3 c4 4b 4a | b6 d0 3f b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 fb df b4 aa 7f 08 b4 87 40 7c 29 | 54 a9 d0 e2 e4 44 95 43 00 00 00 1c 00 00 40 05 | b2 9a 73 50 a7 57 97 7d 3b 57 52 b7 42 61 08 84 | 33 0c bd 82 | libevent_free: release ptr-libevent@0x7fb380022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa34c0 | #423 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d af b2 c4 93 36 1d aa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #423 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #423 | rejected packet: | 0d af b2 c4 93 36 1d aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #423: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac3ec0 | handling event EVENT_RETRANSMIT for parent state #494 | start processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #494 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #494 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49685.660126; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002386 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa34c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #494 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 "road-eastnet-nonat-242" #494: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #494) | 13 d2 ce 8c c5 a0 08 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 2c 3b c1 c9 27 85 62 17 d7 83 f4 4b 2e 0e 16 | e2 03 04 ad 7a 8d 40 02 d4 34 9d 1b d3 c9 18 6b | 41 26 bf 10 de e3 e0 e1 0e ef 27 5f e0 e8 78 57 | b0 c9 a6 38 de ce 8a 7c 37 31 11 56 7d 62 bb 8e | c9 f9 f5 6c 82 0f ba cd 3f af 70 4e 17 32 64 c9 | d5 e6 2c 41 27 6e 25 48 eb 43 50 ea a4 34 26 c4 | 56 d9 54 ab 57 40 f6 c1 9c 20 1b 06 22 84 03 8b | e5 53 55 fa 3d 80 8b 5b c2 25 82 15 35 94 6c d0 | bb ec ab 60 22 1d 87 23 e3 9e ac fc 16 ce 42 3f | ba 0d 8d 04 b9 e7 b2 de 46 3e 4b b3 83 4d ca 89 | e2 a0 d6 38 51 9a 05 e2 dc 57 8c 52 b9 1a fa 47 | 7e 1e 80 51 ac cf 77 c1 e4 be 78 0f 3d a1 ce 56 | 23 61 ff 3d 67 82 ef a5 20 d8 a8 62 8a 37 d6 a0 | 87 df 7e 30 b4 77 c6 c9 19 64 23 a5 4f 30 28 ac | 43 56 89 18 4a 88 a5 5e d6 97 45 97 2d bb 34 28 | 33 0f 79 c6 b2 6c 6b 62 1d d3 42 70 92 9f 6e 55 | 29 00 00 24 86 c8 ae 9a dc 82 47 ae 63 a3 d2 9c | fc 56 5a fd b5 a1 94 8d 79 cd 12 87 5b f8 39 1c | 72 7a 80 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 4f 14 68 3f 9f 2d 22 c7 c5 d4 82 | fb 7c 5e ae ba 6a 24 66 00 00 00 1c 00 00 40 05 | bc 9f 5c d1 bc 22 73 c4 89 e4 5f 13 b2 ba 1c 19 | 38 03 1c b3 | libevent_free: release ptr-libevent@0x7fb384027b30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | #494 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 13 d2 ce 8c c5 a0 08 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #494 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #494 | rejected packet: | 13 d2 ce 8c c5 a0 08 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #494: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c012bf0 | handling event EVENT_RETRANSMIT for parent state #468 | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #468 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #468 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49685.663444; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003591 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #468 | libevent_malloc: new ptr-libevent@0x7fb384027b30 size 128 "road-eastnet-nonat-216" #468: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #468) | 7d 98 8a 9d 47 30 f3 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 4d 82 7b ce 67 f5 e3 c7 ef 1e 88 97 12 6b 1f | 83 b8 f4 6b 5d e2 86 e0 e9 f2 9b 39 cc 52 e7 74 | 42 1d 82 da 97 54 f4 cf 8c bb 44 74 5b 79 77 99 | b7 64 d2 5d 6f 79 ec 9a 9b f2 ae b8 84 7a 6f f8 | bd c4 91 ab 33 ef 63 16 a0 41 ba 3f f0 a6 76 33 | 99 9d 4e fa 10 3d a9 b0 fd 9d 95 6a 6d e1 64 80 | d6 f4 63 87 42 a4 40 d5 c9 d1 7b e6 b6 16 87 12 | 6b a3 97 13 be 62 fd d1 99 d3 9b d9 d0 66 91 ae | 70 9a 30 e7 e3 dd b0 da 82 fe e4 f0 44 cc b3 94 | 0b 57 c5 e6 97 4b 2c 01 fc cf bd 64 1e a3 1b 36 | a4 86 4a 71 7a 5d 83 15 27 9a 5b c7 b1 4b fa cd | 49 2c bf cb fb 1f 32 58 4d 30 7f 18 2a 34 d2 95 | e4 1f 33 09 6a df d3 45 5e 2c d0 94 30 dc 69 26 | e1 ac dd 8a 80 89 5d 10 3f 35 db e7 62 f2 ea e4 | 46 d5 0d ed 2d ad c4 c0 e6 d7 96 39 cc 2d f8 c8 | 62 6c cf 39 6f 6d 88 19 5a ed 59 0b b3 2a c0 06 | 29 00 00 24 92 6b ec 6b 64 1a 9e 4e ed 8a 02 4d | da d7 da b0 19 37 ca 67 a4 74 bd db b5 b1 e8 9c | 42 18 dc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f 7e f5 e7 e8 50 e9 16 af a5 e6 5b | b1 d0 cb b5 42 f7 79 13 00 00 00 1c 00 00 40 05 | f3 f2 fc c6 17 9d d4 89 d0 fb 82 c7 ed b0 98 6a | 20 f1 09 0b | libevent_free: release ptr-libevent@0x7fb340040790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | #468 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 98 8a 9d 47 30 f3 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #468 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #468 | rejected packet: | 7d 98 8a 9d 47 30 f3 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #468: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0571 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46af8e80 | handling event EVENT_RETRANSMIT for parent state #250 | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #250 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #250 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49685.666714; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.008598 exceeds limit? YES "road-eastnet-nonat-250" #250: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-250" #250: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #502 at 0x557d46b27d00 | State DB: adding IKEv2 state #502 in UNDEFINED | pstats #502 ikev2.ike started | Message ID: init #502: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #502: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #502; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-250" #502: initiating v2 parent SA to replace #250 | using existing local IKE proposals for connection road-eastnet-nonat-250 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 502 for state #502 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c012bf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #502 | libevent_malloc: new ptr-libevent@0x7fb340040790 size 128 | #502 spent 0.0866 milliseconds in ikev2_parent_outI1() | RESET processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #250 ikev2.ike failed too-many-retransmits | pstats #250 ikev2.ike deleted too-many-retransmits | #250 spent 2.8 milliseconds in total | [RE]START processing: state #250 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-250" #250: deleting state (STATE_PARENT_I1) aged 64.010s and NOT sending notification | parent state #250: PARENT_I1(half-open IKE SA) => delete | crypto helper 2 resuming | State DB: IKEv2 state not found (flush_incomplete_children) | crypto helper 2 starting work-order 502 for state #502 | picked newest_isakmp_sa #0 for #250 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 502 "road-eastnet-nonat-250" #250: deleting IKE SA for connection 'road-eastnet-nonat-250' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-250' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-250 | State DB: deleting IKEv2 state #250 in PARENT_I1 | parent state #250: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #250 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb37804b7c0 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 502 time elapsed 0.000561 seconds | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af8e80 | (#502) spent 0.572 milliseconds in crypto helper computing work-order 502: ikev2_outI1 KE (pcr) | in statetime_stop() and could not find #250 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 2 sending results from work-order 502 for state #502 to event queue | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-250 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | scheduling resume sending helper answer for #502 | libevent_malloc: new ptr-libevent@0x7fb380047480 size 128 | crypto helper 2 waiting (nothing to do) | start processing: connection "road-eastnet-nonat-250" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-250' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-250" | stop processing: connection "road-eastnet-nonat-250" (in initiate_a_connection() at initiate.c:349) | spent 0.0668 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #502 | start processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 502 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #502 | **emit ISAKMP Message: | initiator cookie: | 49 84 03 55 33 41 14 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-250 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 52 b6 56 c0 55 c6 5a b3 d0 b1 3a cd 2c 2d f1 98 | ikev2 g^x 2b 05 72 d6 2a eb f1 a5 ce 1a 6e fe 9b 76 4a e6 | ikev2 g^x c8 9d 68 cf 67 24 b2 a5 b6 c1 96 48 84 37 b3 8b | ikev2 g^x f1 39 9c c4 10 9d db 1a 8e 7f b3 36 f3 a8 eb bd | ikev2 g^x 2b 28 0c da ff 40 e9 6b c2 33 b1 41 cc 82 3c 97 | ikev2 g^x 2f 0e a7 48 25 26 c1 d7 53 0e 21 ee 94 d4 a0 38 | ikev2 g^x 49 e2 15 f5 13 68 e2 8a cb ba 80 6b ce a6 00 d2 | ikev2 g^x 69 7e 9f 04 65 f3 ae 81 71 49 2a 5f 8f ee 09 49 | ikev2 g^x e3 ff 1b cd 41 64 ae 29 01 91 5e 32 c3 26 78 8f | ikev2 g^x ea 20 2b 0f 18 2d 0a 1f 22 af 98 ef 92 ff 6a 84 | ikev2 g^x 62 82 19 1c 56 bf 8b 8e 12 15 12 c1 19 da 4c cd | ikev2 g^x 49 b3 95 88 b6 66 33 d3 36 cf f2 bd 45 7d 72 a1 | ikev2 g^x 21 21 16 69 39 89 66 de 9b 3d 56 7f ea f5 ce 47 | ikev2 g^x 7a 2e 75 2e cf 9b 6b 32 55 e0 ae 5b c0 56 2e 7e | ikev2 g^x b8 fa 3a ca aa 83 6d 0a b9 cf d2 e5 75 34 ef 7c | ikev2 g^x fd ec 25 52 b8 3d 7b b9 f7 15 a6 0a 76 51 86 5e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9b c1 28 9f 3d 89 a9 b6 3e c7 19 65 88 8e 41 03 | IKEv2 nonce 11 21 a9 0f 26 57 6b e7 b4 25 21 32 2d ba 55 81 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 49 84 03 55 33 41 14 2a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 fa | natd_hash: port= 01 f4 | natd_hash: hash= 1f d1 0c 18 0e bf a2 52 1e 5c d3 e7 df 48 7e 58 | natd_hash: hash= 7f 45 57 fd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1f d1 0c 18 0e bf a2 52 1e 5c d3 e7 df 48 7e 58 | Notify data 7f 45 57 fd | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 49 84 03 55 33 41 14 2a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c9 7e 47 3a 28 a9 19 bc aa dc fd 65 a2 d8 10 d7 | natd_hash: hash= 15 14 41 45 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c9 7e 47 3a 28 a9 19 bc aa dc fd 65 a2 d8 10 d7 | Notify data 15 14 41 45 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #502 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #502: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #502 to 4294967295 after switching state | Message ID: IKE #502 skipping update_recv as MD is fake | Message ID: sent #502 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-250" #502: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.250:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #502) | 49 84 03 55 33 41 14 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 b6 56 c0 55 c6 5a b3 d0 b1 3a cd 2c 2d f1 98 | 2b 05 72 d6 2a eb f1 a5 ce 1a 6e fe 9b 76 4a e6 | c8 9d 68 cf 67 24 b2 a5 b6 c1 96 48 84 37 b3 8b | f1 39 9c c4 10 9d db 1a 8e 7f b3 36 f3 a8 eb bd | 2b 28 0c da ff 40 e9 6b c2 33 b1 41 cc 82 3c 97 | 2f 0e a7 48 25 26 c1 d7 53 0e 21 ee 94 d4 a0 38 | 49 e2 15 f5 13 68 e2 8a cb ba 80 6b ce a6 00 d2 | 69 7e 9f 04 65 f3 ae 81 71 49 2a 5f 8f ee 09 49 | e3 ff 1b cd 41 64 ae 29 01 91 5e 32 c3 26 78 8f | ea 20 2b 0f 18 2d 0a 1f 22 af 98 ef 92 ff 6a 84 | 62 82 19 1c 56 bf 8b 8e 12 15 12 c1 19 da 4c cd | 49 b3 95 88 b6 66 33 d3 36 cf f2 bd 45 7d 72 a1 | 21 21 16 69 39 89 66 de 9b 3d 56 7f ea f5 ce 47 | 7a 2e 75 2e cf 9b 6b 32 55 e0 ae 5b c0 56 2e 7e | b8 fa 3a ca aa 83 6d 0a b9 cf d2 e5 75 34 ef 7c | fd ec 25 52 b8 3d 7b b9 f7 15 a6 0a 76 51 86 5e | 29 00 00 24 9b c1 28 9f 3d 89 a9 b6 3e c7 19 65 | 88 8e 41 03 11 21 a9 0f 26 57 6b e7 b4 25 21 32 | 2d ba 55 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f d1 0c 18 0e bf a2 52 1e 5c d3 e7 | df 48 7e 58 7f 45 57 fd 00 00 00 1c 00 00 40 05 | c9 7e 47 3a 28 a9 19 bc aa dc fd 65 a2 d8 10 d7 | 15 14 41 45 | state #502 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb340040790 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c012bf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #502 | libevent_malloc: new ptr-libevent@0x7fb37804b7c0 size 128 | #502 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49685.668017 | resume sending helper answer for #502 suppresed complete_v2_state_transition() and stole MD | #502 spent 0.444 milliseconds in resume sending helper answer | stop processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb380047480 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 84 03 55 33 41 14 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #502 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #502 | rejected packet: | 49 84 03 55 33 41 14 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fa fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #502: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.089 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc00 | handling event EVENT_RETRANSMIT for parent state #311 | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #311 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #311 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49685.670222; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005451 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800319a0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #311 | libevent_malloc: new ptr-libevent@0x7fb380047480 size 128 "road-eastnet-nonat-59" #311: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #311) | 44 99 87 40 ba 63 67 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 f7 3b 73 41 b9 88 7a e8 c9 5c 33 15 fe 59 eb | fc 54 1c 32 28 ad 56 eb 34 ed 9a d7 b7 26 48 b1 | 97 4e 59 ed 4f 99 cd e8 e6 27 80 3f 35 da 0c a7 | 23 d8 2f 5d 19 c3 94 0e 09 96 31 23 4d f5 99 7a | 2e 77 d3 1f 35 48 ef 9d e1 61 1a 11 39 f8 6e ce | 65 2d d0 de 38 b4 23 52 6e 45 44 65 4d 7b bd c8 | 41 7e 01 a8 b3 39 9f a8 ee a5 53 dc 50 9b 94 2b | 69 df 03 ec 5d 36 9f 33 dc 3d 9c 7a 93 11 41 9c | 33 38 19 c9 cf 1a a3 f8 96 ca d4 d9 26 62 88 91 | 39 58 69 eb 93 1e 87 6a d7 64 14 8d 9c 37 19 fa | c6 b6 78 0e bc 5c f3 4b 97 bf 56 93 52 5a ea e8 | e0 ac be 1b 36 a8 31 6f 20 82 12 c0 13 79 34 1d | 86 03 61 75 0c 12 25 55 a8 61 36 78 64 d8 d0 e0 | d9 d2 a7 01 7f 00 fd 1f 2e 03 76 1e 96 2c 85 64 | f8 86 44 8c a4 8a 04 3f e3 a8 0c 90 29 b2 ad bc | e2 32 ac c2 2b f4 81 23 cf 52 ee cf c4 e3 9c c7 | 29 00 00 24 d3 df f6 74 46 9e 11 7f ae 1b 7e 22 | a8 9e 39 ab f7 77 2a 20 6e a6 c0 c3 6f 0b 0c 6a | a5 08 b1 f9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c b5 fb 2f 48 22 68 cf e1 a0 a0 6d | 16 65 fc 12 3f 30 cc 2d 00 00 00 1c 00 00 40 05 | 5f ba 06 b7 b7 74 50 87 e6 7e 19 f6 51 18 f6 57 | 2a d1 11 81 | libevent_free: release ptr-libevent@0x7fb37c01a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc00 | #311 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 99 87 40 ba 63 67 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #311 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #311 | rejected packet: | 44 99 87 40 ba 63 67 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #311: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0551 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b650 | handling event EVENT_RETRANSMIT for parent state #424 | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #424 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #424 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49685.69552; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004061 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc00 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #424 | libevent_malloc: new ptr-libevent@0x7fb37c01a4e0 size 128 "road-eastnet-nonat-172" #424: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #424) | e5 61 ef 5f 7f e3 58 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c da e9 09 30 1c 29 bb e6 91 cb 4e 69 4d ec 03 | b5 f9 29 7a 23 48 20 ed f7 47 c2 fe 06 e6 43 d7 | dd db db 34 94 8c 85 3b 55 9b f4 3a 74 ed 7a a1 | b8 84 40 94 dc 5c ed 16 d0 73 2d 49 36 0b 9a 1d | 7a 62 45 16 8d 9c 63 79 31 b8 8c 83 f1 0e b1 7f | 67 fe bc d6 57 49 2e 4d c3 49 48 a7 55 5f ff d0 | 14 68 fc 6f 72 30 bd 46 7b 9a 8c f4 dc c7 37 1c | e4 a4 8f 19 bc e7 61 cc 6b 11 48 dd 4e 4a 37 e3 | ee aa ab b1 b2 36 8e 89 eb 7e b7 77 69 a0 09 80 | 3c 6b fc 75 71 9a f3 bd 94 2c c9 c7 7f d3 9b 98 | 01 34 f8 57 09 1c 44 77 27 2b 95 8b 42 b2 1e 03 | d7 04 87 d9 03 b3 37 7c 1d b7 57 41 2d 16 5a a8 | dc c5 ad 48 e5 82 26 97 54 fe f5 c0 fe b9 29 58 | 35 ce 2a 1a 65 c3 c1 3a f9 04 5b 80 08 58 bc a4 | 5f 74 90 a2 3e 82 ee a6 80 5f 67 41 cd ba a6 4f | 66 85 f6 7c 29 e8 a5 11 0e c2 6f 44 c1 41 6a eb | 29 00 00 24 7c 1f b6 fc f1 5f 8d 51 2e 05 d2 13 | e2 d8 d5 f5 0f 0a 46 07 58 f7 ec 9e c5 1c 22 09 | 2c cd 2f ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 d1 0c 8f d2 91 2d a0 36 f1 93 d6 | bd 3f 30 ca a6 e2 8d 8a 00 00 00 1c 00 00 40 05 | 48 c0 59 12 12 13 1e e0 ba de 8c 06 ba c3 58 23 | f1 28 ea 8c | libevent_free: release ptr-libevent@0x7fb380032bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b650 | #424 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 61 ef 5f 7f e3 58 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #424 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #424 | rejected packet: | e5 61 ef 5f 7f e3 58 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #424: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd40 | handling event EVENT_RETRANSMIT for parent state #486 | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #486 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #486 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49685.733818; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003158 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b650 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #486 | libevent_malloc: new ptr-libevent@0x7fb380032bf0 size 128 "road-eastnet-nonat-234" #486: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #486) | 87 db e2 36 7c f0 df 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 90 89 1b 08 ac ff df cf 1e a7 4d 7b bd 33 5b | 51 13 dd 15 4f 57 c0 96 90 46 35 66 7c 24 f4 e0 | 0c 27 ca 38 87 f2 ca ce 3e d5 b4 13 12 b8 2b 1b | 28 cd b5 9c 97 fa 99 ff ca 60 2f 08 57 c7 43 0b | 9a 34 8d 0f cc d3 42 7d 8a 9b 18 49 af 87 e5 0e | 60 54 d2 dd 0f 77 79 0a d2 62 1d 4b f7 af 36 a6 | 89 10 0e 96 5f f8 fd fd c0 0b 1a 57 52 e4 05 54 | 7c e7 03 a6 04 47 19 3c 81 63 a0 84 35 98 42 90 | 1a 22 7e c6 ee 29 1f d0 fe 05 cc 68 66 1b 8e f3 | 6e 04 59 7b 5f 87 c4 be fb a5 8a bf 90 3d eb 9a | 35 8c 2c 40 b3 8e 63 fe 5a 3c 42 89 30 d7 70 57 | 1f 4d 37 52 6b 1c 17 6b 78 dd b4 c8 f7 a3 15 58 | d1 aa 66 b9 5e c1 c5 d0 ba 3b 05 d7 77 a7 0a 2d | c3 f0 02 14 1d 1a a8 4d cb aa 4c 7b 62 3a 6a ee | 7e 4e 1c cb d8 20 d4 75 37 c5 87 d5 04 ca 68 48 | 13 39 48 6c 64 d9 b7 94 e9 df 23 f3 33 69 d8 cb | 29 00 00 24 46 3f 4a dc 6e 3d 21 da c5 52 80 db | 79 4b 94 5f 60 de b7 f2 05 82 ab f1 57 25 79 09 | be 52 68 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e eb dd 20 f6 4f aa b4 b9 d1 56 e6 | 84 4d e7 2c 87 e1 c1 3c 00 00 00 1c 00 00 40 05 | df ec c7 42 be d0 10 8f c9 07 5b a9 94 d2 5a 2d | 6d 05 27 19 | libevent_free: release ptr-libevent@0x7fb364014bc0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd40 | #486 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad43c0 | handling event EVENT_RETRANSMIT for parent state #312 | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #312 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #312 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49685.73395; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006875 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd40 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #312 | libevent_malloc: new ptr-libevent@0x7fb364014bc0 size 128 "road-eastnet-nonat-60" #312: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #312) | 89 42 ee d6 ed 2c a4 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 05 0b 71 54 f5 39 16 26 4c a4 39 04 60 1d 97 | 32 ea c2 30 7f b7 8f 8f 4c 46 3c 6f 52 78 aa c1 | fe e4 77 56 f7 3d d3 8d a6 3a 6f c0 2f fe 6d 02 | eb 98 53 91 b0 a7 62 d0 2e 39 52 a2 2d 9f c5 cb | d2 4b 17 0a 6d 76 74 95 b8 fd f2 4d e7 0c cf 15 | 80 f8 47 f1 16 09 01 ed b3 3a 4f 5c d5 5d 3f 6b | 2f e7 b7 4c e0 6d 6e 67 ff dd 71 47 c8 a4 15 9f | 96 98 1b 13 12 cd c9 a7 cd 82 0e 52 4d 94 b9 96 | db fe 30 4f c9 88 5e 66 97 62 f6 22 94 b7 f8 62 | 1f 97 fa 33 08 02 4b f8 35 6a 66 b6 ae 14 f2 38 | 8b d8 d1 fe 0f da d0 63 b9 64 d3 f1 12 68 13 10 | 0c 76 c3 e9 8c 5d 20 14 45 21 bc 02 62 c8 67 36 | a7 1a 3b 3f d4 a6 2b 0f 1f 20 68 bf 3f f3 da ac | 9d d4 0b a5 4f 9d 4e ee 5d 8a c9 7f a6 63 bd 37 | e4 30 f8 16 a7 79 23 99 5e 45 08 d2 1b c1 59 79 | b3 06 e4 a7 4d 24 33 20 1d ab d6 f6 ee 90 2f 69 | 29 00 00 24 c3 f8 28 4c 1a 7b 0f cd eb 3b df c6 | 33 a5 52 0e 9f e3 e0 c7 7b e0 4f ee 68 74 73 39 | ce 71 25 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 69 21 0b 86 be 66 6f de 2b 5e fc | 58 12 49 3c b2 b4 50 5a 00 00 00 1c 00 00 40 05 | 50 02 4b 6b 30 95 cf bb e1 65 ad fe fd e1 44 d3 | d9 2c f8 74 | libevent_free: release ptr-libevent@0x7fb36c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad43c0 | #312 spent 0.0684 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 db e2 36 7c f0 df 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #486 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #486 | rejected packet: | 87 db e2 36 7c f0 df 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #486: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 42 ee d6 ed 2c a4 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #312 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #312 | rejected packet: | 89 42 ee d6 ed 2c a4 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #312: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.05 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #498 | start processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #498 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #498 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49685.737238; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.50154 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad43c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #498 | libevent_malloc: new ptr-libevent@0x7fb36c04b7c0 size 128 "road-eastnet-nonat-246" #498: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #498) | 68 4b 64 40 03 e3 f0 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 69 29 47 91 ea fc 2e df 27 76 0c 26 38 63 6b | ee 03 64 3e dd 2d 4f 5c a2 7c 3e 41 2e b2 c6 84 | ff d7 8f ca 24 8a 1a 84 04 b4 3e b6 53 38 d4 57 | 6d a4 68 41 c6 e5 8c 59 22 a7 fd d7 67 07 36 7e | 1e 40 23 48 d2 30 3e 8e d0 0e 2f 85 d4 6b 01 86 | 85 76 00 26 45 82 b5 a1 ed 94 31 de 85 9c 6f 9a | d2 cc cb 6d 68 f4 36 91 7d 92 94 a9 b3 a0 25 d9 | 5a 00 e8 82 c1 6e 50 4f eb 4b c5 77 4d eb ad f8 | f9 00 df 08 85 b8 e7 b1 b7 09 70 ca fb b5 96 54 | bd be b6 e6 4b 40 d9 6a f9 30 1c a8 77 f3 85 c8 | 21 54 2e a4 d4 8e d4 56 c2 16 22 dd 3e 05 97 69 | 65 6d 3c 5d 0f 12 01 33 b0 f7 91 7a 47 03 5b 97 | 4d 0e 9c 52 05 49 6e 01 9c be f7 12 23 b1 5e c9 | 73 97 42 af ac c3 1d 81 30 3b a9 46 14 e0 b0 65 | ab d4 ac 96 fd 2b 1a 19 c7 e5 47 a1 84 25 26 11 | 99 9a c0 71 dd 5f b8 d7 21 7f 1f c8 a8 a3 e9 18 | 29 00 00 24 87 96 a9 cf f1 29 2d 50 7c 79 d6 68 | 62 af 98 cb 71 a2 fc 0e ae 94 c2 03 22 51 95 ed | 81 12 8d c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 71 da 0a 79 9e f6 1d 6a 6f 5a 6b | 39 aa 0c e1 fb 50 58 ee 00 00 00 1c 00 00 40 05 | 43 dd 8c b7 86 3c b2 4e bf 53 d1 4c 55 30 14 19 | fc 2a 32 31 | libevent_free: release ptr-libevent@0x7fb33803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #498 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 4b 64 40 03 e3 f0 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #498 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #498 | rejected packet: | 68 4b 64 40 03 e3 f0 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #498: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acec40 | handling event EVENT_RETRANSMIT for parent state #425 | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #425 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #425 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49685.758491; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004641 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #425 | libevent_malloc: new ptr-libevent@0x7fb33803b0b0 size 128 "road-eastnet-nonat-173" #425: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #425) | f7 cf 50 4a 74 06 05 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 92 89 d6 89 4e 50 5f b7 2f 6b 96 d5 81 21 07 | ab 44 17 58 90 1d 7b 64 81 e9 17 d7 bd fe aa 4b | 0a 10 ad 93 a3 c3 87 5f f5 66 29 fb c9 3a c9 b1 | 31 b0 a9 ee c4 90 84 b7 e6 dd 91 e8 75 48 e7 2e | 93 2f d6 a2 f7 4b f6 49 3f d9 f6 d0 5a d6 d1 dd | 4f 9d c2 ed c5 18 e2 07 13 e3 28 e5 ef cc 0a 8a | 3b 35 e0 3e 37 bc 79 9f 2a 04 4a f3 9c f9 c1 fe | 06 93 6a fc 31 07 8c 82 e2 3d 36 5b 4c 64 57 29 | 42 03 5c 40 11 83 46 58 6b 89 40 fb 97 9c 72 d8 | 16 d1 a0 21 3d 63 55 3f 12 ce 3e bc a1 a4 b1 4f | 21 3c 91 be 83 c8 57 a7 2b 28 e1 48 64 02 57 7e | 42 a3 f1 45 48 e1 db 05 2e fb d4 4c 7c 8a 0a 60 | 5f f4 86 80 46 9a e0 d0 18 11 1a 4d bb 7c 02 87 | bf 2e e0 bb 87 e9 5f b8 47 04 4d f1 27 cf b3 29 | 9c 1a d0 ad 05 bc 03 0c 16 0c 3a 7e 72 1b 12 70 | b9 a4 26 8b 78 5c b2 39 ba 99 5c 08 5d fd 0b bd | 29 00 00 24 5f 48 0d c0 35 2d 82 0c 4e 37 c0 2d | fb 4b f1 c7 3e 7f d8 da d2 4b 1d 20 b9 ad b0 f8 | d9 af 0c f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 91 c4 e4 6c ee a0 d8 c3 62 ab 89 | a1 7e a7 1c b9 03 c3 d0 00 00 00 1c 00 00 40 05 | 62 01 4a 70 10 9c f9 53 26 65 4b 23 2c 02 6b 53 | 25 3b 71 4a | libevent_free: release ptr-libevent@0x7fb37c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acec40 | #425 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 cf 50 4a 74 06 05 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #425 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #425 | rejected packet: | f7 cf 50 4a 74 06 05 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #425: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0644 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae0780 | handling event EVENT_RETRANSMIT for parent state #251 | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #251 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #251 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49685.777825; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.007215 exceeds limit? YES "road-eastnet-nonat-251" #251: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-251" #251: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #503 at 0x557d46b292c0 | State DB: adding IKEv2 state #503 in UNDEFINED | pstats #503 ikev2.ike started | Message ID: init #503: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #503: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #503; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-251" #503: initiating v2 parent SA to replace #251 | using existing local IKE proposals for connection road-eastnet-nonat-251 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 503 for state #503 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46acec40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #503 | libevent_malloc: new ptr-libevent@0x7fb37c02a950 size 128 | #503 spent 0.0952 milliseconds in ikev2_parent_outI1() | RESET processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #251 ikev2.ike failed too-many-retransmits | pstats #251 ikev2.ike deleted too-many-retransmits | #251 spent 2.59 milliseconds in total | [RE]START processing: state #251 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-251" #251: deleting state (STATE_PARENT_I1) aged 64.009s and NOT sending notification | parent state #251: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | crypto helper 0 resuming | picked newest_isakmp_sa #0 for #251 "road-eastnet-nonat-251" #251: deleting IKE SA for connection 'road-eastnet-nonat-251' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | crypto helper 0 starting work-order 503 for state #503 | add revival: connection 'road-eastnet-nonat-251' added to the list and scheduled for 0 seconds | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 503 | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-251 | State DB: deleting IKEv2 state #251 in PARENT_I1 | parent state #251: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #251 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb36004b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae0780 | in statetime_stop() and could not find #251 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-251 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 503 time elapsed 0.000564 seconds | (#503) spent 0.602 milliseconds in crypto helper computing work-order 503: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 503 for state #503 to event queue | start processing: connection "road-eastnet-nonat-251" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-251' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | scheduling resume sending helper answer for #503 | libevent_malloc: new ptr-libevent@0x7fb384036e20 size 128 | FOR_EACH_STATE_... in find_phase1_state | crypto helper 0 waiting (nothing to do) | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-251" | stop processing: connection "road-eastnet-nonat-251" (in initiate_a_connection() at initiate.c:349) | spent 0.0753 milliseconds in global timer EVENT_REVIVE_CONNS | processing resume sending helper answer for #503 | start processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 503 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #503 | **emit ISAKMP Message: | initiator cookie: | de 1d 8d 29 e2 13 e9 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-251 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 34 bc c5 bc ee 45 af a6 73 6a 90 e4 26 1b 45 74 | ikev2 g^x 00 ed f2 a3 ec 74 88 4b c9 51 b5 6a 38 9f 0a f7 | ikev2 g^x 89 96 66 a1 cb 3b 36 71 3c 50 00 7f a8 a1 27 84 | ikev2 g^x 14 72 85 f0 e9 87 92 95 57 d6 bb a3 9e eb a3 89 | ikev2 g^x 3b d6 9d 72 8e 22 b1 43 7b 48 2b 91 a9 6c a2 71 | ikev2 g^x 4e b7 05 32 94 32 e3 1e 78 6c 29 24 39 3f 29 25 | ikev2 g^x a5 fc 7d 8a 16 8c 7f 3c 9e 88 a1 a2 0f e7 3d e7 | ikev2 g^x a6 2a 71 17 3f ba 2d 1e 73 4a af 59 81 2a 33 e7 | ikev2 g^x 7c 6b a5 a6 c7 0d 60 09 fe 4a 3a c4 ae f0 db 28 | ikev2 g^x 63 c7 99 7d c2 1a 2a f5 ca 34 59 14 08 64 3e 0e | ikev2 g^x 9e 8a 9a 95 bb 9d 48 ef fa 38 ec e3 2c 15 34 9c | ikev2 g^x e9 d6 59 e6 ff 43 a4 b1 2b ff 91 b3 04 3b c1 be | ikev2 g^x 1e 15 0a dc 58 8d 95 f6 06 1e 22 79 23 6e 88 9c | ikev2 g^x fb 5f 8d 89 36 69 ab a3 c4 17 6b e8 27 27 43 a0 | ikev2 g^x 64 a3 07 0b 2b f0 22 81 09 20 24 c8 81 c7 b3 70 | ikev2 g^x 64 46 cf dc 25 f9 42 3b 6e b0 ff 34 aa 9a 20 98 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e0 7e ea 52 c4 af 5e ed 64 d4 0d e7 b4 32 8f da | IKEv2 nonce 7f e4 cd 7f 6e 0d 4f bd 11 1c 8f fe 10 1a 14 9e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= de 1d 8d 29 e2 13 e9 62 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 fb | natd_hash: port= 01 f4 | natd_hash: hash= 34 eb 39 3d 04 da 34 34 c4 55 20 7b 97 62 11 e4 | natd_hash: hash= f5 1f 2c 3d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 34 eb 39 3d 04 da 34 34 c4 55 20 7b 97 62 11 e4 | Notify data f5 1f 2c 3d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= de 1d 8d 29 e2 13 e9 62 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 56 4f 2a b1 95 be 94 04 9d 7b d6 c2 f3 45 b1 7e | natd_hash: hash= d7 05 c2 82 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 56 4f 2a b1 95 be 94 04 9d 7b d6 c2 f3 45 b1 7e | Notify data d7 05 c2 82 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #503 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #503: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #503 to 4294967295 after switching state | Message ID: IKE #503 skipping update_recv as MD is fake | Message ID: sent #503 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-251" #503: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.251:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #503) | de 1d 8d 29 e2 13 e9 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 bc c5 bc ee 45 af a6 73 6a 90 e4 26 1b 45 74 | 00 ed f2 a3 ec 74 88 4b c9 51 b5 6a 38 9f 0a f7 | 89 96 66 a1 cb 3b 36 71 3c 50 00 7f a8 a1 27 84 | 14 72 85 f0 e9 87 92 95 57 d6 bb a3 9e eb a3 89 | 3b d6 9d 72 8e 22 b1 43 7b 48 2b 91 a9 6c a2 71 | 4e b7 05 32 94 32 e3 1e 78 6c 29 24 39 3f 29 25 | a5 fc 7d 8a 16 8c 7f 3c 9e 88 a1 a2 0f e7 3d e7 | a6 2a 71 17 3f ba 2d 1e 73 4a af 59 81 2a 33 e7 | 7c 6b a5 a6 c7 0d 60 09 fe 4a 3a c4 ae f0 db 28 | 63 c7 99 7d c2 1a 2a f5 ca 34 59 14 08 64 3e 0e | 9e 8a 9a 95 bb 9d 48 ef fa 38 ec e3 2c 15 34 9c | e9 d6 59 e6 ff 43 a4 b1 2b ff 91 b3 04 3b c1 be | 1e 15 0a dc 58 8d 95 f6 06 1e 22 79 23 6e 88 9c | fb 5f 8d 89 36 69 ab a3 c4 17 6b e8 27 27 43 a0 | 64 a3 07 0b 2b f0 22 81 09 20 24 c8 81 c7 b3 70 | 64 46 cf dc 25 f9 42 3b 6e b0 ff 34 aa 9a 20 98 | 29 00 00 24 e0 7e ea 52 c4 af 5e ed 64 d4 0d e7 | b4 32 8f da 7f e4 cd 7f 6e 0d 4f bd 11 1c 8f fe | 10 1a 14 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 eb 39 3d 04 da 34 34 c4 55 20 7b | 97 62 11 e4 f5 1f 2c 3d 00 00 00 1c 00 00 40 05 | 56 4f 2a b1 95 be 94 04 9d 7b d6 c2 f3 45 b1 7e | d7 05 c2 82 | state #503 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c02a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46acec40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae0780 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #503 | libevent_malloc: new ptr-libevent@0x7fb36004b7c0 size 128 | #503 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49685.779176 | resume sending helper answer for #503 suppresed complete_v2_state_transition() and stole MD | #503 spent 0.466 milliseconds in resume sending helper answer | stop processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb384036e20 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 1d 8d 29 e2 13 e9 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #503 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #503 | rejected packet: | de 1d 8d 29 e2 13 e9 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fb fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #503: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0592 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #469 | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #469 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #469 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49685.78437; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003253 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840489a0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #469 | libevent_malloc: new ptr-libevent@0x7fb384036e20 size 128 "road-eastnet-nonat-217" #469: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #469) | 29 4a 77 5f 7a c1 26 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 e1 17 9f 01 39 e1 e9 f8 e3 b4 37 56 6e 01 9e | d8 db 78 19 20 a1 ab 6d c3 e8 12 cd f6 c3 2c 5f | d5 86 61 6c a8 d4 5b 57 ac f5 b7 f0 24 de ac 90 | a1 9c 51 ce 2d 7a 33 35 b1 68 02 e0 5a 9f bf ac | 1b d8 19 f9 b4 68 45 14 e7 fd c5 a9 74 d6 09 6d | f9 4a 25 95 f8 f0 1c 13 dd 36 12 79 4b 27 2a bb | 86 17 86 e1 0e 04 a7 ab e3 0c 51 78 89 39 a0 df | c7 a9 56 0a e4 9a f1 58 c7 a1 12 21 f0 18 d0 d0 | 21 0e 73 e6 4f d3 13 37 a8 aa e3 89 21 ab a3 7c | d5 ac 7b aa ea d7 ff a4 b9 b2 c3 7f 9b 07 77 17 | 36 8f 4e a7 40 03 46 9c db 93 b3 16 3c e2 7f c0 | 58 42 83 4f fa 88 71 3b b7 86 e5 ca 62 88 5c 9f | 93 c4 59 82 fb 9e 5a 96 92 16 5f 68 0e 83 59 2f | 70 32 51 a7 ce dd b8 93 09 66 27 ff 7a e6 c4 cc | d2 87 46 9e b6 49 85 48 3f a7 ef 43 8a 5c ae e6 | 2c b0 88 25 66 2b 82 4c a9 2f 05 19 54 70 c3 9c | 29 00 00 24 36 8f c2 cf 02 b6 2e 75 ac 6c a4 55 | 9f 56 a2 b8 31 83 97 a5 56 a5 c5 7a ba 53 78 14 | 83 c8 c0 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 d6 3c 93 bb 1b 68 50 cd c9 2f b8 | 25 99 9e c0 3a 2f 1f 80 00 00 00 1c 00 00 40 05 | e5 a0 2e 8f cb 71 f8 0c 42 a7 95 8f 73 2e c5 90 | e5 8b 3a 32 | libevent_free: release ptr-libevent@0x7fb364035750 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | #469 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 4a 77 5f 7a c1 26 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #469 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #469 | rejected packet: | 29 4a 77 5f 7a c1 26 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #469: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0476 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #313 | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #313 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #313 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49685.789667; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004304 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #313 | libevent_malloc: new ptr-libevent@0x7fb364035750 size 128 "road-eastnet-nonat-61" #313: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #313) | 5f e0 5b 3a aa b2 0d 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 72 14 0f 17 54 5f cc c5 98 fb 35 26 a3 92 e2 | 11 a3 ad ea c4 71 33 c5 3b 09 0d 86 8a ef c9 16 | 41 6e 6e 33 c5 10 cc f1 5e 47 e9 ca 13 f8 ee 4f | 37 f9 0e ac 70 04 12 68 e2 ae b0 7b dd cb cb ab | d1 0b 9f 48 8f e3 3e b7 e3 65 ca 3d b0 79 98 5c | d4 18 e2 6e 8f 62 4a 4d 34 e2 ac f2 57 5e 56 f3 | 96 24 71 ed eb 39 5a 9f 4d 0a 51 e3 f2 80 2e 9c | c7 e3 0a d7 46 cd 62 d8 70 57 a4 15 e0 2e 57 82 | 00 9c 85 fc cc fb ec 67 7d 2f f7 de 8d 85 b7 9a | ae 6a 14 45 c8 4f c3 df 8d 60 30 87 57 0e a1 b0 | 8b bf f6 18 27 37 f1 3e 81 c1 ec 19 9b f6 db 06 | 57 00 87 5d ef 1f e5 81 9a 44 f2 c0 14 62 b9 b1 | a3 5a 63 7e 11 93 6f 2a 71 ae af 90 3a 04 4e 7a | a3 7a 98 c8 8a bb b2 5a a5 8c d5 d7 51 2b fa cf | d5 ea ac 65 e9 8c f9 24 80 81 e7 38 45 fd 2e f5 | 33 21 e2 b5 ea 65 8b be be 31 9f 87 b8 9f 6c 5b | 29 00 00 24 50 24 81 a9 b8 a1 9e c5 6d 65 2e b2 | 7c 32 12 aa 77 af 34 a7 17 a7 54 1f 7b 13 4b 11 | 43 e0 57 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e d7 79 da 83 ae 02 6d 20 64 f0 64 | 33 fe 2f 85 1b 7e 43 e4 00 00 00 1c 00 00 40 05 | bb f1 5c c9 25 91 06 ec a8 bd 6e 4b ab 50 48 3a | 1c ac 06 f7 | libevent_free: release ptr-libevent@0x7fb34c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | #313 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f e0 5b 3a aa b2 0d 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #313 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #313 | rejected packet: | 5f e0 5b 3a aa b2 0d 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #313: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #495 | start processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #495 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #495 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49685.79494; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001404 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #495 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 "road-eastnet-nonat-243" #495: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #495) | 51 22 fa ce 4d 7c ce 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c 9b dc 70 14 a2 8d 2e 37 c4 2e 9c 10 fc 27 0a | 94 78 5e 85 80 ae e5 be af df cd 9d ab 0a d3 d5 | 9a 0e 71 ff 6f 4d f8 da ab bd 5a 72 c3 2a 71 74 | 55 f1 2d 29 95 62 4d 7d b1 32 5b 12 fd 0a 2d bb | 81 aa ca e6 2a a9 0f 8b 0c cf 1b d2 de 30 5f 1f | e8 83 26 da 07 fd 31 9b 9b d4 1b db 2d 4b e3 99 | 86 7d a5 a0 d4 7d 59 09 c9 73 32 3d 53 85 e9 6f | 12 64 cd cb bc 89 f7 39 4d 28 2c 75 1c 49 0b 3b | c2 22 31 40 60 7d 62 ec d8 da 82 4a bd 1e c5 38 | c3 d8 6d e6 cb 49 78 ba 18 b4 83 3e 7d f6 6d 50 | 16 4d a6 04 f2 a5 8b c2 44 ae 9c 1a 54 68 4c 7d | 43 87 34 87 42 6c 4d fd b4 43 f6 3a 97 2e d2 87 | c4 99 e8 56 55 a1 ca 43 16 5d 55 9b 16 ed ee c1 | b9 bb 2b d6 cf 5a 0d 72 75 6d 1a 0f ae 6e 85 ec | 3a e8 4f c3 0e 27 5b 09 2a e5 e1 24 f5 af 32 13 | e5 eb fd 29 dd 27 c3 a5 08 cc 6e 72 80 4d 82 6f | 29 00 00 24 1b f3 52 dd f6 a5 80 95 b8 2f 4b 8b | f9 eb 65 1b 6e dd cd 94 b7 dd 16 f5 58 7c d7 e5 | e4 3a 80 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 3b 51 4a 4c d3 e5 68 1a 7e fa ec | e7 02 de b1 56 34 9d 92 00 00 00 1c 00 00 40 05 | ef ad 01 a7 be a3 55 49 1c 13 e6 d1 01 bd b7 0b | b8 36 16 d5 | libevent_free: release ptr-libevent@0x7fb36804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #495 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 22 fa ce 4d 7c ce 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #495 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #495 | rejected packet: | 51 22 fa ce 4d 7c ce 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #495: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46950 | handling event EVENT_RETRANSMIT for parent state #426 | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #426 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #426 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49685.829241; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004424 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #426 | libevent_malloc: new ptr-libevent@0x7fb36804b850 size 128 "road-eastnet-nonat-174" #426: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #426) | 9a cd 73 8e 7d d4 98 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 8c 97 9a 7b 25 95 00 9a 77 62 32 ef ca 9f d6 | 76 8f c1 1d 7b f7 f1 fd 6f 49 39 37 2f 63 23 81 | 71 66 7a 84 28 0c 71 94 62 69 ce 59 2d d7 c5 69 | 55 1a 91 d5 7e 6b 73 77 b1 63 3d e2 98 99 4c 7d | 88 69 a7 7b 5e bc cc b8 0e b3 73 c2 2e 32 ae 8e | 86 79 03 81 0b 4c 54 b4 73 a6 e2 6e 97 ca 67 d3 | 85 98 35 01 61 ca 66 d6 14 1b 0e ed 3a 29 6c 85 | ba 28 d6 d7 db e6 44 77 a6 ce 5b 46 99 7c a1 df | 78 8d f1 17 d8 0f f9 ea 99 30 fc e2 cf b2 41 e0 | b2 47 0b 49 32 f7 03 99 56 d9 28 c3 7a 54 f6 02 | 19 cd 98 7b 73 22 d4 cd 39 3f 7a 0d d8 d7 cd a6 | 8a 6b 30 16 cd 73 f2 96 6c 21 9f bd 4e e5 1b e4 | 55 08 4d 75 fb 1c cb 36 33 b5 70 97 3d ae 1c 0b | fd 17 d6 8a db a7 4c eb 93 47 b3 25 b1 c8 9d b9 | 3c fc 99 0e e7 eb 29 07 c1 90 16 1e 24 76 3c e1 | f0 b6 2f 6d 76 8c 81 1b 13 f1 8a 90 f5 6f 06 29 | 29 00 00 24 9e 79 2e b7 2a 97 cc 4e 5e 3a 53 a1 | 14 f4 9d f2 e0 f1 3a 21 7a b3 38 2d 77 ac 99 ad | 8b c3 54 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 36 a3 f8 78 1e 60 6d 59 1a 44 b3 | 39 63 64 a7 a1 bd a5 d0 00 00 00 1c 00 00 40 05 | 8b d1 e6 ab 49 4a f3 b9 19 1d c0 80 f7 d0 cb 97 | 3f 74 7f 21 | libevent_free: release ptr-libevent@0x7fb3580180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46950 | #426 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a cd 73 8e 7d d4 98 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #426 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #426 | rejected packet: | 9a cd 73 8e 7d d4 98 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #426: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0472 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a86b80 | handling event EVENT_RETRANSMIT for parent state #314 | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #314 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #314 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49685.857545; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00475 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46950 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #314 | libevent_malloc: new ptr-libevent@0x7fb3580180b0 size 128 "road-eastnet-nonat-62" #314: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #314) | fd 31 72 f9 64 d3 9c f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 18 14 ac 93 72 6f f5 79 79 36 2d 8e 4c 14 ac | ea 91 ec 03 06 fb 84 ad 5e 18 85 94 4b b8 8e ee | d9 14 0b 8c 64 c8 45 95 1b 91 75 07 f8 e4 ec 03 | 59 35 93 6c 10 48 ab 6b e6 53 29 72 ab ff 3c 2a | 61 16 cb b8 bd 31 a5 f8 2f 5d 57 58 e1 26 7c 2e | d9 c7 b7 a4 21 ac 7f a4 9a 22 28 50 e4 1d c5 8c | 89 bc f7 70 40 e3 4f 71 2a 2a 2e b1 a7 96 2a 7a | 82 34 1a e1 0e c4 48 55 41 7f 5a 8b 68 d2 fd 14 | f7 10 c0 e4 c1 ac fb 5d c6 f8 34 c9 0a 71 0c 1d | 4f 2b 4a ae bd 22 c4 9a db 63 e4 0a ff 3d 5a f9 | dc 19 2e 9a 16 8d df 98 1f 04 7e 59 57 62 0a e6 | b9 93 59 94 b4 3b eb 70 b1 7b 76 4b 9a 71 ee 97 | f5 ac 50 38 4c 04 22 68 a2 68 e3 f1 1d 13 3a e1 | 84 4b 7c 08 19 fb 96 e3 58 71 59 95 c0 bd 55 f5 | 0d 72 3b 29 f3 ae 58 91 30 ad de 16 a2 e3 03 a0 | 02 e9 38 39 b8 a1 6a 55 c4 1d 22 81 8d d1 2c eb | 29 00 00 24 83 8f 4c 82 0e ff 5a 2c de 21 68 5e | 60 c0 57 92 a6 09 5b 7e 12 e1 2a 75 9d 50 83 dd | e3 d1 6f 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 7f 92 43 99 76 22 ce 79 dc 92 3a | aa fb 36 5e 79 bf 23 b0 00 00 00 1c 00 00 40 05 | e5 74 71 ef f2 a4 7e f6 0b b1 36 a7 2f ae f3 30 | ad 50 42 06 | libevent_free: release ptr-libevent@0x7fb35401a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a86b80 | #314 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 31 72 f9 64 d3 9c f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #314 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #314 | rejected packet: | fd 31 72 f9 64 d3 9c f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #314: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46af78c0 | handling event EVENT_RETRANSMIT for parent state #499 | start processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #499 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #499 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49685.863833; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501085 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a86b80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #499 | libevent_malloc: new ptr-libevent@0x7fb35401a4e0 size 128 "road-eastnet-nonat-247" #499: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #499) | c7 9c 2c 36 f8 59 d4 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 36 9d 7e c3 eb 0f f5 55 38 8b 43 25 86 54 ef | 6f b9 f8 28 7e 76 ec 92 74 99 fc c9 b6 64 9d ac | b4 f5 fc 31 29 96 7b f0 ef 3c 01 28 c3 ad 1c 4d | 74 6d b0 ed 64 09 35 18 c6 6a c2 bc 6c f8 72 2c | 54 14 82 7e 14 37 d9 e7 9b 9f ce de 7f 99 2e f1 | 1f 25 30 b7 54 88 0c c6 03 fe ef 9a c2 4c 16 3a | 92 dc d7 50 b6 03 1d 9b e5 26 b1 a0 fd e5 86 9c | c1 bb a9 1d c8 aa e0 66 62 a8 ef d5 a3 e5 1c aa | 48 a0 13 72 a6 76 d4 63 de 8e 77 d1 a4 a1 70 1a | 05 7e fd e9 46 8f d7 69 9c 5d 01 6a 23 bf d1 7c | 60 fe 3b 08 36 7c 46 56 5e fa 3e 87 6e f8 5c e5 | 62 26 d2 09 02 d7 a8 88 f2 80 8a 7b d3 24 87 ec | 98 c6 06 44 cf 2e 14 1f 9a 9e 11 3b 15 35 10 67 | 80 78 af 3c 90 b3 be 54 94 f8 6c d9 36 9d 34 3f | b2 ee 4f 6f 8b cb 03 13 29 6b 61 bf aa 20 b1 02 | 64 9a 46 8c 58 45 74 b6 a7 9c 3f 9f 19 1b d5 f4 | 29 00 00 24 ae 3f 5f 22 5a fe fe 91 94 31 fc a8 | 30 c0 4a f7 3c 57 3c 0d ed a5 29 f2 71 dc 56 3a | ed 9c a9 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 89 ab ab 1d cc d7 b6 cb 29 1c 48 | e7 84 01 ce 34 15 c4 5f 00 00 00 1c 00 00 40 05 | 7f 71 39 3d 41 d0 36 ee b9 ed 2b b5 28 d2 9e d8 | 0a 4d 91 1e | libevent_free: release ptr-libevent@0x7fb380048a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af78c0 | #499 spent 0.0899 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 9c 2c 36 f8 59 d4 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #499 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #499 | rejected packet: | c7 9c 2c 36 f8 59 d4 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #499: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3400296b0 | handling event EVENT_RETRANSMIT for parent state #487 | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #487 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #487 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49685.905106; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002727 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af78c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #487 | libevent_malloc: new ptr-libevent@0x7fb380048a80 size 128 "road-eastnet-nonat-235" #487: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #487) | b2 6f 13 91 c3 04 27 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e b7 3e 1e ea 4f ea 6c e1 7a 2e d9 d3 3e f9 00 | 00 b2 10 a9 bd 14 73 d0 5c 75 d0 f7 e2 0a 9c 29 | d2 44 ca 2c 07 7b 68 53 85 c3 d3 3e bc e8 07 6e | cf f2 af a9 1e bb 29 51 6a f7 01 6c 37 1e c0 ab | 85 0c c2 bf ee 4c 81 52 aa 15 a7 f4 22 68 ab 13 | 48 79 2b 77 d6 1b 5b ea 43 58 e3 de cb b3 22 8f | 5c c4 4c 56 f3 fa d5 2b 81 01 8d d3 c1 a0 72 c2 | 36 97 f9 30 4e b1 e3 4c c3 9f 76 1a 47 e2 4c 66 | 36 1c 6d 84 88 a7 c0 e7 e9 9d 4f 1d e0 c1 e1 ff | 39 d2 b1 a1 49 e4 09 1c dc a0 a7 cd 71 c8 f9 bc | 3a bc 26 2f 4d d5 40 96 f5 89 a1 c7 d3 3a 43 fd | 96 7a 1b 6f d9 4d de b2 44 44 32 65 9e 2d 89 e0 | 92 3a f7 8d c2 fa 4d 91 90 40 ba 6a ed 04 a1 1b | cd 46 17 18 d0 bf 88 e4 f7 cd 2c 44 55 8e 08 a0 | 65 d8 55 af e5 2c 13 03 b6 20 5e 95 aa 08 a5 20 | cd 27 5d 2b dd 8b b7 c9 7d 2d d5 bb 14 9f 9e 7c | 29 00 00 24 f2 e1 64 3c 35 1a 4c dd 7a 16 43 23 | ae 79 36 f1 02 a6 51 17 6d d2 ae 67 32 63 24 20 | 73 fc 22 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 4a 35 08 41 af be cf 3c 4d e0 85 | 28 9e fb 5b 11 1f 06 99 00 00 00 1c 00 00 40 05 | 95 f5 24 fe 51 05 47 87 18 ae 0d 13 a0 36 38 27 | 84 c2 41 68 | libevent_free: release ptr-libevent@0x7fb340039ba0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3400296b0 | #487 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 6f 13 91 c3 04 27 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #487 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #487 | rejected packet: | b2 6f 13 91 c3 04 27 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #487: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad17c0 | handling event EVENT_RETRANSMIT for parent state #427 | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #427 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #427 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49685.905295; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003502 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3400296b0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #427 | libevent_malloc: new ptr-libevent@0x7fb340039ba0 size 128 "road-eastnet-nonat-175" #427: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #427) | 4d cf ce dc 5e 69 0c 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be f3 80 6d a1 4d bc 3b 63 de fe 7b 5d 35 aa 05 | b1 28 d6 19 4f ca c2 b6 85 f2 21 b1 5f ee 7d c3 | e5 4d ce d8 a2 87 47 56 c6 32 a1 9b 66 32 11 d6 | 2a 42 af 5d 8f 34 c5 d5 6c 06 20 9f 03 7a dd 4b | 48 34 c3 3a 83 64 cc cf 03 38 0f 85 e3 77 24 47 | d5 16 ac 4d 8b 47 b5 03 3d 95 eb ea 92 b9 cf 0a | 68 66 89 9f e9 d7 ae 03 3d 64 75 ac c9 d5 b3 10 | de 8f 17 7b 40 ef 37 ec 93 3c cd 2d 80 d3 81 0e | 06 7b 23 ba 8b 61 0c f3 0a da 72 5d 9c fe 2a 86 | bd e9 e7 fc 88 d7 20 01 3d 62 9b 97 2d 52 60 5a | fa 1e fb 14 48 2b da dc c9 bc 30 8f d1 65 96 cb | 33 cf 05 cd 5e fb 63 36 4b e6 22 41 78 36 97 51 | 7d 03 25 93 d8 95 93 1e 55 d3 a5 af 94 2f 9c 8c | 5f a3 40 23 47 68 5e 3a 9d 49 f6 a2 e8 96 cd ae | 14 48 e0 e0 ab cb ce 26 3e 2f 37 d7 ae b6 aa 01 | 36 16 4f df 45 31 cb 1a 1c 34 5e a5 cc 5a a8 48 | 29 00 00 24 fd 8d 8b b7 46 89 9a fa b3 ab b5 e9 | cc f2 e8 c2 d2 52 f8 a0 49 af 7a 94 c3 9c de 32 | b7 d8 84 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9a c6 fd c2 96 5c 57 4c be 19 76 6e | d6 a6 82 da 0b ee 49 1a 00 00 00 1c 00 00 40 05 | 12 be 5a 47 ba 89 37 fe 5c 7b 97 4a 79 4a eb 43 | ad 50 1a 96 | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad17c0 | #427 spent 0.0696 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d cf ce dc 5e 69 0c 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #427 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #427 | rejected packet: | 4d cf ce dc 5e 69 0c 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #427: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0375 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a986c0 | handling event EVENT_RETRANSMIT for parent state #252 | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #252 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #252 keying attempt 1 of 0; retransmit 8 | retransmits: current time 49685.91152; retransmit count 7 exceeds limit? NO; deltatime 64 exceeds limit? YES; monotime 64.011006 exceeds limit? YES "road-eastnet-nonat-252" #252: STATE_PARENT_I1: 60 second timeout exceeded after 7 retransmits. No response (or no acceptable response) to our first IKEv2 message "road-eastnet-nonat-252" #252: starting keying attempt 2 of an unlimited number | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #504 at 0x557d46b2a880 | State DB: adding IKEv2 state #504 in UNDEFINED | pstats #504 ikev2.ike started | Message ID: init #504: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #504: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #504; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-252" #504: initiating v2 parent SA to replace #252 | using existing local IKE proposals for connection road-eastnet-nonat-252 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 504 for state #504 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad17c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #504 | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 | #504 spent 0.0674 milliseconds in ikev2_parent_outI1() | RESET processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | start processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:234) | pstats #252 ikev2.ike failed too-many-retransmits | pstats #252 ikev2.ike deleted too-many-retransmits | #252 spent 2.67 milliseconds in total | [RE]START processing: state #252 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-252" #252: deleting state (STATE_PARENT_I1) aged 64.012s and NOT sending notification | parent state #252: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #252 "road-eastnet-nonat-252" #252: deleting IKE SA for connection 'road-eastnet-nonat-252' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-252' added to the list and scheduled for 0 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 0 seconds | in connection_discard for connection road-eastnet-nonat-252 | State DB: deleting IKEv2 state #252 in PARENT_I1 | crypto helper 9 resuming | crypto helper 9 starting work-order 504 for state #504 | parent state #252: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 504 | stop processing: state #252 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a986c0 | in statetime_stop() and could not find #252 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-252 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-252" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-252' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-252" | stop processing: connection "road-eastnet-nonat-252" (in initiate_a_connection() at initiate.c:349) | spent 0.0576 milliseconds in global timer EVENT_REVIVE_CONNS | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 504 time elapsed 0.000562 seconds | (#504) spent 0.563 milliseconds in crypto helper computing work-order 504: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 504 for state #504 to event queue | scheduling resume sending helper answer for #504 | libevent_malloc: new ptr-libevent@0x7fb378044ad0 size 128 | crypto helper 9 waiting (nothing to do) | processing resume sending helper answer for #504 | start processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 504 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #504 | **emit ISAKMP Message: | initiator cookie: | da 55 48 8d 90 bf 21 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-252 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ac 2a 4d 0b 8b cf db e8 71 42 c9 12 73 26 89 36 | ikev2 g^x f8 7e cd c8 1c 11 8c 7f 9e 09 ce 55 92 dd 78 d1 | ikev2 g^x ad 59 d2 ee 94 4b 61 50 a3 e8 9a 12 3c 5e 9b 79 | ikev2 g^x 67 a9 ab b1 17 c4 72 5d 57 f0 6b d6 9d c6 6d f9 | ikev2 g^x 38 2a f7 f8 e2 f3 15 e5 73 fa 8b 4d 1c fc cc ab | ikev2 g^x b7 f0 3b 90 c7 95 ba 20 f3 82 29 0e d5 86 2e 2f | ikev2 g^x d3 3d 1a 6e 6e 68 d3 8e 2c 1e 30 d3 3d 1a 4b 7f | ikev2 g^x 07 51 04 a3 cd e1 e4 f3 6b 81 ac 0e 5e 25 fc a6 | ikev2 g^x 2d 49 a3 1d 9d 7f 10 1c b8 aa 6d 0b 48 63 e7 ab | ikev2 g^x 47 28 bd cd 66 43 28 3d 25 f6 20 56 e0 bb 73 1a | ikev2 g^x f5 3a ee c2 95 1c 1f 57 8f 41 e9 d9 d4 e4 b4 be | ikev2 g^x f5 98 c0 78 1e 91 5d ba 02 2c 3a cf 04 e6 44 c6 | ikev2 g^x a4 f1 83 88 9a 45 b6 e7 89 2b 45 be 54 48 e8 52 | ikev2 g^x 9b 95 05 7a d4 dd af 6d 96 db 42 ed db 5d 0c bc | ikev2 g^x 83 61 0a c3 fd 33 2c bd cf 88 1b 95 c9 43 7a fa | ikev2 g^x 73 7b 7d 2e f9 6a 53 94 78 2b 4f 21 f2 f3 1d f2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 61 bd 30 86 3d bb 50 44 5f 1b 26 2e 52 63 1b fa | IKEv2 nonce b0 23 2c cb bf bc 70 41 cc 6b 00 dd 9d aa 60 6d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= da 55 48 8d 90 bf 21 04 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 fc | natd_hash: port= 01 f4 | natd_hash: hash= dd b5 bb a3 b0 15 ca 04 17 91 f9 55 5a 59 4c 3b | natd_hash: hash= fd 4e 4a c4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dd b5 bb a3 b0 15 ca 04 17 91 f9 55 5a 59 4c 3b | Notify data fd 4e 4a c4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= da 55 48 8d 90 bf 21 04 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 47 4d 62 c8 1d 9c 5d 27 1b 5d ed df fb db c8 62 | natd_hash: hash= de eb 87 79 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 47 4d 62 c8 1d 9c 5d 27 1b 5d ed df fb db c8 62 | Notify data de eb 87 79 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #504 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #504: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #504 to 4294967295 after switching state | Message ID: IKE #504 skipping update_recv as MD is fake | Message ID: sent #504 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-252" #504: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.252:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #504) | da 55 48 8d 90 bf 21 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ac 2a 4d 0b 8b cf db e8 71 42 c9 12 73 26 89 36 | f8 7e cd c8 1c 11 8c 7f 9e 09 ce 55 92 dd 78 d1 | ad 59 d2 ee 94 4b 61 50 a3 e8 9a 12 3c 5e 9b 79 | 67 a9 ab b1 17 c4 72 5d 57 f0 6b d6 9d c6 6d f9 | 38 2a f7 f8 e2 f3 15 e5 73 fa 8b 4d 1c fc cc ab | b7 f0 3b 90 c7 95 ba 20 f3 82 29 0e d5 86 2e 2f | d3 3d 1a 6e 6e 68 d3 8e 2c 1e 30 d3 3d 1a 4b 7f | 07 51 04 a3 cd e1 e4 f3 6b 81 ac 0e 5e 25 fc a6 | 2d 49 a3 1d 9d 7f 10 1c b8 aa 6d 0b 48 63 e7 ab | 47 28 bd cd 66 43 28 3d 25 f6 20 56 e0 bb 73 1a | f5 3a ee c2 95 1c 1f 57 8f 41 e9 d9 d4 e4 b4 be | f5 98 c0 78 1e 91 5d ba 02 2c 3a cf 04 e6 44 c6 | a4 f1 83 88 9a 45 b6 e7 89 2b 45 be 54 48 e8 52 | 9b 95 05 7a d4 dd af 6d 96 db 42 ed db 5d 0c bc | 83 61 0a c3 fd 33 2c bd cf 88 1b 95 c9 43 7a fa | 73 7b 7d 2e f9 6a 53 94 78 2b 4f 21 f2 f3 1d f2 | 29 00 00 24 61 bd 30 86 3d bb 50 44 5f 1b 26 2e | 52 63 1b fa b0 23 2c cb bf bc 70 41 cc 6b 00 dd | 9d aa 60 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd b5 bb a3 b0 15 ca 04 17 91 f9 55 | 5a 59 4c 3b fd 4e 4a c4 00 00 00 1c 00 00 40 05 | 47 4d 62 c8 1d 9c 5d 27 1b 5d ed df fb db c8 62 | de eb 87 79 | state #504 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad17c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a986c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #504 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 | #504 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49685.912586 | resume sending helper answer for #504 suppresed complete_v2_state_transition() and stole MD | #504 spent 0.317 milliseconds in resume sending helper answer | stop processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb378044ad0 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 55 48 8d 90 bf 21 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #504 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #504 | rejected packet: | da 55 48 8d 90 bf 21 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc fd 7f 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #504: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf50 | handling event EVENT_RETRANSMIT for parent state #315 | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #315 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #315 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49685.924772; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004594 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a910 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #315 | libevent_malloc: new ptr-libevent@0x7fb378044ad0 size 128 "road-eastnet-nonat-63" #315: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #315) | 44 ed db 2c fe 0c f2 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e 87 b1 78 dc 97 f3 7a 79 3b d6 3e 86 ea b2 fa | 5d 34 e2 db 78 24 8f 15 59 97 e5 e6 f6 90 b1 aa | 59 98 1b 57 96 2d 7a a6 68 c9 eb 8b 7d f6 64 68 | a2 48 77 fc cb 5d 8f 0e b2 52 9b 77 09 f1 21 ba | 81 62 c1 7e 82 df 5b 48 60 ba f6 08 04 c2 77 74 | 9c c8 6b 41 93 1d 14 39 f9 1e b0 b2 5b 1d 3c e0 | ca f1 1f 63 24 c8 cc 04 a5 c5 8f 7d 86 30 95 90 | fb a8 83 29 7a f1 ce 8e 64 9a 9f 82 39 eb 4b a4 | b2 6f ce 0a 5b bd e7 1a af 9d af 92 27 aa 66 57 | 8e 91 52 b5 d0 96 33 ee eb 0f 07 5f 2f 56 77 d0 | 9a 1f cb 0e 53 2f d5 4e b4 5b a5 9c 4c 15 af e1 | 28 86 0f 89 11 d9 bc 73 6b a7 3c 58 a9 04 2c eb | f2 53 51 79 62 f5 50 bf 5f 75 e1 7f 28 95 f0 09 | 87 f1 d9 ee 26 2c 8a ee 7d 84 2e 04 f2 6c 42 e0 | 67 e8 19 47 db 94 b6 12 29 d7 1d dc 8f 61 2d e0 | 53 f7 53 7d 18 19 05 ed 93 cb 84 d8 40 1b 1d fe | 29 00 00 24 5f cd cc 5e 9b b5 1f f6 2d c3 6f 0d | 70 ea 63 15 bc b8 5b 49 76 c9 be 04 9e 55 ff 0b | 33 d9 e0 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 2c d3 1b 13 1c a2 69 95 f2 01 8c | cb 3c f6 d6 71 d0 e6 be 00 00 00 1c 00 00 40 05 | b1 bd 1a 4e 17 0a c1 3c 72 20 f5 8a 28 12 f4 7a | a3 f8 1e e7 | libevent_free: release ptr-libevent@0x7fb34c0293f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf50 | #315 spent 0.0961 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ed db 2c fe 0c f2 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #315 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #315 | rejected packet: | 44 ed db 2c fe 0c f2 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #315: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #470 | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #470 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #470 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49685.93404; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003565 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf50 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #470 | libevent_malloc: new ptr-libevent@0x7fb34c0293f0 size 128 "road-eastnet-nonat-218" #470: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #470) | ab ba b0 28 2b 1d 75 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 e4 df 77 9c ac 7c 40 d9 cc 91 f4 1e 15 f1 e4 | bc 57 e7 d5 04 82 1b 0a da 88 66 71 1d 5c c0 4e | e9 e1 44 ec a4 a7 01 cc ac 81 2a 8e 12 68 b2 c4 | cb fb 38 e3 4b 73 83 33 bf 14 39 b7 96 9c bd 59 | d9 ff 78 9c 9b 27 6f 77 fd c9 8a 91 00 a0 bf ad | 80 e8 18 ee 7d 76 d2 f5 dc 73 28 11 ea 98 07 d2 | 64 7f 44 96 f2 22 04 36 e1 c7 80 69 f0 17 fa 9a | d9 3b f0 c2 a7 d3 89 ef c3 be e7 3b 57 5c b5 bf | 47 3a cd 92 d8 c8 49 50 dd d0 b8 eb bf 2d 90 2f | 70 dc 26 c2 6c 6d 97 1e 52 f7 6d 64 24 1f 5f ad | 51 2f 7a 28 09 01 c2 c0 02 41 61 9f 09 3f 66 24 | 9a 1a a0 e1 ec c0 36 27 88 be e6 c0 7c 74 30 55 | 5b 47 83 d5 de 8f dd bb 1e 36 33 0e 3a 91 ce a0 | e2 86 42 d5 a7 ba 66 4a 76 5d 9a 0c 15 60 fc f8 | 07 4e ec f8 cb 3b a4 f7 40 7b 9c 98 98 27 e7 40 | f3 18 97 7c cd 29 25 1e 88 f4 c6 ab 7c 46 c3 a4 | 29 00 00 24 5d 90 f6 17 67 54 dd 2e 4f 57 ce 29 | 91 07 11 a6 ab 05 8f 42 d3 b0 74 bf 38 9e 49 fe | 79 c7 ca e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 04 17 c7 7e 54 6e 6a e8 f5 01 1c | 14 c4 b8 fd 53 6d 0c 45 00 00 00 1c 00 00 40 05 | ee 06 ba 38 dc 10 50 e4 3e a6 cd 5f 2c e3 74 3b | 2a 18 7d 82 | libevent_free: release ptr-libevent@0x7fb388011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #470 spent 0.0989 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab ba b0 28 2b 1d 75 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #470 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #470 | rejected packet: | ab ba b0 28 2b 1d 75 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #470: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35804b810 | handling event EVENT_RETRANSMIT for parent state #496 | start processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #496 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #496 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49685.9783; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001738 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #496 | libevent_malloc: new ptr-libevent@0x7fb388011f30 size 128 "road-eastnet-nonat-244" #496: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #496) | f5 9f b4 c2 7a 9c 1f 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec 8a 03 66 9e a5 16 39 b9 4a bb 3f cb 61 65 42 | 8b 18 46 77 70 53 8b 55 8b 35 c6 f2 c8 4d 38 3e | 2b 6f 3f c9 8d f1 cb 91 94 06 70 93 28 a0 96 60 | 92 d3 00 a2 ef 01 89 68 02 8d 85 25 69 9d e5 95 | 69 f6 3b 34 62 4f 63 bc 8e bf 0f 5d c5 bc ea 46 | f9 33 76 3d ad c3 1d 5a 73 74 ae ae 16 20 46 35 | 9e db 41 74 ad 1f 50 49 89 b1 86 a0 57 06 1e bf | 85 a3 93 e1 b5 84 03 d1 1b 0b 7b cd 83 c2 b7 25 | da ae 43 dc f0 b6 2a cd 25 9c e3 07 d7 ef 34 20 | 0c 00 64 d5 63 1f b1 99 29 80 fe 35 ec 43 23 95 | 6a a2 fc 57 a3 69 20 ea 94 fb aa 78 ee 5b 41 20 | 62 d9 4d ee fd 29 6e d9 f4 a1 15 cb 28 a0 f5 d3 | 5e bd 59 a6 87 61 99 4f 80 5d e6 36 36 11 e0 c2 | e5 c9 d7 3c 99 3b 27 4b f7 81 ca 42 93 ee a9 76 | e3 2e 24 6c 18 27 a8 24 04 ce 7c dd c7 a8 fd 5b | a3 04 bb 87 35 69 9f a6 83 11 9f de e4 40 52 5f | 29 00 00 24 4f 4f 97 a4 0f 74 20 cc 43 f4 64 ac | a1 3b a8 cc 16 af 62 fa 43 5b 11 20 24 9f 33 6a | 2d 6e 82 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 79 bb 2d d9 d9 21 50 1a 1a 14 0f | 62 ed ae c0 08 f2 03 40 00 00 00 1c 00 00 40 05 | c8 1f b0 a0 de 58 fc c7 c3 79 0d 4a c2 37 42 43 | 8a b6 69 08 | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35804b810 | #496 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b12c40 | handling event EVENT_RETRANSMIT for parent state #428 | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #428 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #428 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49685.978436; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003723 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35804b810 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #428 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 "road-eastnet-nonat-176" #428: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #428) | fb 15 42 71 fe 24 9a a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 50 d4 99 e3 c3 b2 8d 50 f4 55 ae 47 3b 25 61 | 1e c4 05 b1 59 21 46 35 0e 81 55 dd de 7f 65 40 | 00 1a 4e c9 0d 72 6a 7a 8e 31 f2 b8 05 87 95 5f | 92 19 3b d0 26 f7 ef a7 b3 37 5f 37 15 e9 34 12 | 33 cb bc 05 19 62 04 88 c4 b0 11 3c a2 fc 2e a7 | 48 74 27 c5 24 6a b1 84 34 89 1c 11 73 e4 fb e9 | 1b 3e 80 7d 33 32 51 1f 3d 67 11 16 e4 23 05 bd | 3f 72 2d 38 c9 0b 38 c0 12 64 3a 43 5b e7 46 c1 | 2b 7e 29 d4 ef 37 71 a8 e0 71 19 2f a1 c5 6c 53 | 94 fe 4e 57 73 5c 74 b5 d5 7f cc e2 3d a3 30 0d | 02 5c 9d dc 4d a0 93 77 cd b6 58 cb 5c 89 fe a8 | 40 8a c4 11 16 43 cc f4 7d 6e ae 00 27 3a 7c 8c | 12 14 7e db be 5a 42 72 b9 d0 07 1b fd aa 82 51 | 0e fb 68 c6 88 b4 35 6c 93 af 50 1c ff 48 78 d4 | b7 b7 c9 3d bd cb b9 82 34 8d b6 5a ff e7 73 c1 | e0 88 1f 51 42 a1 76 7d 4c 3a 1b 39 03 d3 42 78 | 29 00 00 24 e8 4b ce 8e 1c b5 fd 76 2e 19 5c e4 | 1a 51 b2 57 c5 b9 7b 5b bc c1 c3 17 ad 08 ad 32 | c1 29 cf d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 5a 55 94 7a 84 e5 8b 58 e8 27 7a | 96 44 f5 8a 4c 99 6f 81 00 00 00 1c 00 00 40 05 | 54 c7 00 62 13 8f 45 35 f4 93 09 e0 a0 98 7d 08 | 6e 4a 7d e5 | libevent_free: release ptr-libevent@0x7fb380011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c40 | #428 spent 0.0686 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 9f b4 c2 7a 9c 1f 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #496 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #496 | rejected packet: | f5 9f b4 c2 7a 9c 1f 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #496: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 15 42 71 fe 24 9a a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #428 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #428 | rejected packet: | fb 15 42 71 fe 24 9a a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #428: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0369 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a72150 | handling event EVENT_RETRANSMIT for parent state #500 | start processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #500 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #500 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49685.981715; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500449 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #500 | libevent_malloc: new ptr-libevent@0x7fb380011f30 size 128 "road-eastnet-nonat-248" #500: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #500) | dc 38 e1 a3 3b e2 b1 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 4a f1 97 41 66 ce d4 ab 90 74 77 4f 00 cb 43 | 1f 3a 29 28 bd ab f1 45 3f 88 a4 79 39 fe 2c ee | 1b e9 2e 5c de da 76 bf a3 0c cc 93 b6 1b 8c 68 | 84 10 8f 55 6f 47 ec 76 41 18 0c b4 50 73 cf e8 | 55 11 98 5d d0 8c 2d e1 b9 47 bc d9 dd 4c 8a 72 | 7c cf 3b 3b b2 57 cf 3d e0 1d d4 39 94 72 a1 23 | 6b 6c 49 1f b9 94 b3 b7 a4 33 d9 35 1a 97 76 7e | 8f eb c4 34 d7 30 b6 ff 0b a0 77 62 d6 0a a9 b7 | 60 e4 b0 4d 0f 38 4b ae 9a ce 16 98 d0 34 95 01 | 44 fe 57 be 26 cf f9 d3 b8 79 e7 d6 d9 c0 2e 7d | 90 21 6f 7d c3 bc 04 f3 80 08 f6 e6 0b 6f 05 a0 | f8 da 5b cf d5 f7 d1 f1 f5 c0 29 8b c4 a2 cc 29 | 8c e2 9a 9c 8f bf ae c2 b0 3f ce e4 df fb 71 f5 | f7 13 31 70 b5 0f b2 9e ae 64 eb 2c 73 aa d9 5b | 7a b9 c4 3b 46 10 f6 92 a7 5e 0d a0 e7 06 8a 74 | 5e 40 71 07 4b d8 c5 08 71 52 bd 30 01 84 10 98 | 29 00 00 24 73 e7 fd d9 0c 07 09 ec 59 bd 7a b5 | 40 29 3e 5b f2 d3 e1 ea 7b 04 b1 b4 b1 5f 03 d2 | b4 24 ec 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 f6 20 af 00 f8 ef 66 b3 21 e2 19 | 0f ba fb 8a ed c9 14 86 00 00 00 1c 00 00 40 05 | 70 63 55 d1 ed 70 f9 1a 8c 9d 5a 9a f7 cc 31 61 | 9c 9b 74 c0 | libevent_free: release ptr-libevent@0x7fb388027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a72150 | #500 spent 0.0863 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 38 e1 a3 3b e2 b1 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #500 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #500 | rejected packet: | dc 38 e1 a3 3b e2 b1 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #500: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a647d0 | handling event EVENT_RETRANSMIT for parent state #316 | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #316 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #316 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49685.98596; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007039 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a72150 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #316 | libevent_malloc: new ptr-libevent@0x7fb388027c10 size 128 "road-eastnet-nonat-64" #316: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #316) | e8 62 07 3d 83 c9 27 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 67 27 d8 ca da 21 fc 33 ba 4f 94 10 8a c5 3e | 5d c6 ca e9 be 5f 5b 62 d9 f8 5f ef cd 1d 75 de | 4e 46 e5 c8 47 0c 64 48 a0 a0 be ad 1a 88 be 29 | 21 51 4f e4 bd 33 bd be 35 5e 1a f3 c6 5c 72 cc | 14 4f 34 ba 69 93 e8 bf 07 ec 5c 62 f6 72 9d af | 95 ca 7c 71 3b 37 93 92 3a 98 4e 7a 53 2f 9a a8 | 2a b6 32 33 20 cf eb 65 6b e0 73 23 52 d2 61 14 | 64 77 57 5a e0 a6 ac 4c 66 6c 73 74 1e 30 64 d8 | 26 eb 6f 24 f1 a2 d0 b2 6b 58 a7 b2 54 48 ba 72 | 09 ae 65 3c 30 0d df 54 4e 6a 33 e2 26 65 76 99 | ea 2e 2a 30 fa a7 4c 97 4d 74 ba 19 a6 b3 7b 01 | 82 88 fa e7 6a 85 ab 68 48 39 a4 91 e9 e4 44 02 | 10 7a c6 c8 2e 47 03 39 25 a6 92 8c e5 51 eb 52 | f8 c7 61 20 39 65 61 dc 27 00 53 74 46 c8 5c be | 3b 90 c1 02 b8 be b2 17 6b a3 86 6f 65 fa c8 19 | e6 54 1a 74 80 e0 70 41 21 d7 44 54 50 0b cd 29 | 29 00 00 24 89 45 06 65 65 b3 8c d6 0c df 20 90 | 5a e6 b0 5e f6 87 85 10 8d 96 3d 5e 67 1f 54 38 | 77 de f5 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 e4 d3 0f a4 c8 a7 ec 05 e8 fa d2 | 6d 31 a1 ad f7 6f 67 3e 00 00 00 1c 00 00 40 05 | 0a a4 aa 05 10 e6 c7 c4 a5 a6 8e 98 2e fc 0d 29 | 7c 74 b9 43 | libevent_free: release ptr-libevent@0x7fb368023a60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a647d0 | #316 spent 0.0893 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 62 07 3d 83 c9 27 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #316 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #316 | rejected packet: | e8 62 07 3d 83 c9 27 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #316: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0546 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38800c4b0 | handling event EVENT_RETRANSMIT for parent state #488 | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #488 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #488 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49686.039241; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003544 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a647d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #488 | libevent_malloc: new ptr-libevent@0x7fb368023a60 size 128 "road-eastnet-nonat-236" #488: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #488) | 37 96 ab d6 53 2a 39 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 6b 02 0e 68 a2 59 8e ba 48 ba 2f 59 6f a7 3c | 62 72 7d 7b ba 57 b5 e0 3c d9 c3 81 1f a5 eb a0 | f8 e0 f8 99 8d 15 bc f0 8d dc 6f 5a dd 58 1a 52 | b1 f2 33 db c0 8e 7c 70 83 0a 45 59 7c 30 22 a6 | 4a 21 8b 6d f6 eb 16 6a d6 89 72 dc 49 39 de 06 | cc 4d b2 f5 ec 39 f7 23 79 4b 87 b1 ad 07 ab b7 | eb 0d d8 4d 26 fb 93 ca cd 4a bf a4 0c 85 96 15 | f6 27 7e a1 82 03 aa 6b de 0f cd 15 f2 d7 a2 0e | 43 09 8a 10 1e 3f 10 cc a0 c3 3f de 84 91 b8 33 | fb 7f 27 17 12 4f 19 a8 95 31 dd 5a ae 2b f7 bf | a0 0e b0 af 11 39 af c9 5f a1 36 16 28 49 42 30 | 1e a5 ef c4 10 5d 29 3a 47 d6 e6 ec dc fa 0d fd | c5 f6 87 7a d9 cf 3f cd c0 47 6b 05 d4 2f 0b e9 | 27 07 f2 3c 1c ec 19 6e 68 a4 e6 aa 11 7d e2 91 | 40 12 52 80 36 b2 87 db 98 ff 4a 69 c8 e6 41 e0 | 2d e0 85 d9 a0 b6 39 d4 ec ac d1 39 5f ba 20 a9 | 29 00 00 24 dc e4 9b d4 65 6a e5 2d e1 02 7e 1d | 58 fd 85 52 51 90 f6 a3 d4 da ed 1b d4 69 62 73 | cc 62 0f e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf c6 06 73 dc 37 37 47 57 31 78 5c | d0 36 ae c0 4d 18 ea 5b 00 00 00 1c 00 00 40 05 | b3 8c 92 9f c3 4a f6 44 a7 cb 92 6c 4a 1a 77 59 | 02 36 0d d7 | libevent_free: release ptr-libevent@0x7fb38803c430 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800c4b0 | #488 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 96 ab d6 53 2a 39 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #488 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #488 | rejected packet: | 37 96 ab d6 53 2a 39 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #488: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35801d710 | handling event EVENT_RETRANSMIT for parent state #471 | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #471 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #471 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49686.051597; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002805 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800c4b0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #471 | libevent_malloc: new ptr-libevent@0x7fb38803c430 size 128 "road-eastnet-nonat-219" #471: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #471) | 38 56 99 f6 a3 bb 25 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 88 5e 08 51 b9 62 c5 b6 68 5e 2f 6f 4f 31 ca 1e | 08 9e a2 c5 9c dd 5f fc 7a f4 89 f0 0b b5 e1 ae | ce aa 45 81 2c 95 5e ff 06 f3 6a c5 72 bf d7 48 | 2c ca 52 8b db 25 1b 5b 4e e1 9e 45 05 12 f0 3a | 8b 49 b1 e8 0f d0 bb 39 6c 00 4b 10 55 55 90 f1 | ba 94 0f e8 29 de 7e 8e 75 cf 84 46 0b 85 26 8f | fc de 6b 35 43 a0 ca 14 c9 c0 f7 23 df 3f 39 44 | 98 32 71 b3 fb 93 e6 df 1c 43 a2 c9 a0 c6 73 b4 | d7 9f 3f a9 0b f8 14 fb 29 eb 8f cf f7 a9 d2 3c | 3d 58 a0 39 7e fa 25 48 bc 4b 7f d7 1d e0 11 34 | f6 bf 55 8d 59 da 29 ac d8 c5 88 7a 76 ef 08 52 | 7c ac 5e 47 31 67 af 77 3e 74 07 65 f0 71 26 28 | 79 4d a8 21 1c fb 74 e9 6b f8 d5 df d3 80 71 f9 | 81 36 25 59 61 8d e4 66 0e 09 70 cd be 73 f3 c8 | c4 06 a2 0f 1e 6d 0f ec 2b 18 85 83 48 df f6 99 | 6d 3a 12 52 38 a5 9e 5e 41 a3 52 37 e7 64 a4 6a | 29 00 00 24 92 4d df ea 0a bb c1 4f 13 fb 92 4b | 10 dc b9 f4 e6 b4 8b 01 64 45 6e db 5a 13 b9 8e | 86 b6 57 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 76 c9 73 0c 16 7b 39 f7 77 ab 9f | f0 85 70 80 7e c2 64 d2 00 00 00 1c 00 00 40 05 | 35 b3 a5 34 11 ae 1a 69 08 cc 74 f0 71 15 8c b8 | eb 5a 8d 90 | libevent_free: release ptr-libevent@0x7fb35803a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35801d710 | #471 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 56 99 f6 a3 bb 25 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #471 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #471 | rejected packet: | 38 56 99 f6 a3 bb 25 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #471: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47f10 | handling event EVENT_RETRANSMIT for parent state #317 | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #317 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #317 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49686.05489; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005005 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35801d710 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #317 | libevent_malloc: new ptr-libevent@0x7fb35803a770 size 128 "road-eastnet-nonat-65" #317: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #317) | 5c a2 6c e8 b2 28 e0 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 95 b1 4b f7 b4 a2 f3 b1 63 69 55 e2 98 fb 3f | 54 1a 28 48 de 85 37 f8 72 76 27 96 2b db 5e 33 | be af 42 49 c9 29 81 c9 57 56 f4 f8 82 3d a6 af | 88 eb 0d 9f f2 82 74 6e 72 69 04 07 19 3d d2 37 | 11 a5 22 ff d2 62 d9 98 57 a1 83 a7 1e 49 51 44 | e5 97 9b 8d 73 a0 96 d3 53 9b fb 45 84 94 f7 3d | 76 31 fc 24 62 7d a9 38 2a be 46 8d 20 60 df db | 07 4b 68 3b f4 5c 0f 39 ef 4f 67 78 1a 41 5e d9 | 21 46 6b 9d 25 f7 b9 97 47 6b 61 67 28 72 bc ab | 6f b2 d8 94 3c 23 68 03 63 f9 fd 48 53 49 f9 59 | 58 72 d8 2c 34 ca e6 db de 5e 25 73 b8 b7 64 58 | c2 d1 ad 6f 0e ca 13 2e b2 5c 80 d7 ba 3d 3c a9 | 3d f9 8e 60 bf 1b 92 40 5e 5c 05 7e ba c9 a8 db | 73 77 de d1 63 54 7f e1 7b 4e 7b ea 38 36 f5 df | ad 83 e3 b0 ba 8d 91 72 ad 79 42 21 5b 3d 90 52 | 8f 94 65 66 3d 81 71 1c 3b 5e 4d 22 19 2e a8 97 | 29 00 00 24 16 ec e2 f4 0d c3 b4 c6 88 17 fa c1 | 57 1b 6f 8e 72 cf d0 88 9c 45 18 d1 76 a6 22 b7 | e9 88 2c 7a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 7d b4 14 23 b3 6a c1 75 92 cb 9c | f1 ae 10 a4 55 81 67 0f 00 00 00 1c 00 00 40 05 | d3 a6 c6 52 7d d4 a1 eb 3d cd 3f 6c 65 3f cc dd | 6f e3 2d 43 | libevent_free: release ptr-libevent@0x7fb37c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47f10 | #317 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c a2 6c e8 b2 28 e0 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #317 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #317 | rejected packet: | 5c a2 6c e8 b2 28 e0 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #317: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_RETRANSMIT for parent state #429 | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #429 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #429 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49686.069211; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005542 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #429 | libevent_malloc: new ptr-libevent@0x7fb37c01d920 size 128 "road-eastnet-nonat-177" #429: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #429) | b1 3d 9b 75 e9 17 32 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 58 34 a3 ec c6 75 50 25 fe 5f 41 58 c3 98 5a | 11 1f 83 e4 20 79 02 69 b1 3d ac 82 33 8f 44 96 | e7 d5 9d 7b f3 d7 f5 f1 3c 4b 07 77 e3 30 83 22 | 33 90 f7 d8 39 7d 51 da 1f be a3 9d 27 21 e0 23 | 1c c5 b5 f8 01 28 d0 3f bb de 17 8b 08 3e 77 12 | 3b 7e a1 ef 9e 6d 3b c1 0f 78 3f 7f d4 15 3e 67 | bd d8 07 2d 5c 0a f8 3b 6e 03 96 47 2a 3b ad 8d | fd ac a5 a9 41 55 69 70 54 4f c8 07 46 0f 75 8a | 8e 3a c9 5a 0e 6f 91 97 a2 53 99 02 54 c0 74 38 | 8d d6 59 17 7c b6 f5 96 24 2d 36 88 1b c1 a8 f4 | 9a 2c c6 20 9e 9c 1f 79 b7 b2 e2 28 6d c8 dc ea | ab 6f 81 8f 3c 54 99 e1 b5 ac 7a 7b e2 4b b7 47 | cc 01 c3 58 76 3a 5d 7a 87 5a 60 d6 14 71 21 77 | 7d 56 a9 78 8c 67 16 f3 5f ff 22 ed 4c 9c 08 f9 | b7 a6 81 b8 d7 76 0d 66 ab 45 4e 0c 98 69 dc 04 | 8b a0 74 65 f2 0e e3 59 97 ce 63 09 c5 83 7c 9c | 29 00 00 24 cb 81 79 39 c4 59 07 cd 3c 90 56 3e | 9d 57 79 9f 8d e6 58 24 f4 84 cf b6 0e b6 4d 54 | f8 24 7a fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 94 ea 1e 66 81 07 70 ab d6 5a a9 | c0 a7 0f 24 1b cb e7 a4 00 00 00 1c 00 00 40 05 | 17 95 c4 1b c0 e8 ee e6 7e 70 e4 b9 12 c2 c5 ed | 6f 00 57 73 | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | #429 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a56dd0 | handling event EVENT_RETRANSMIT for parent state #501 | start processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #501 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #501 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49686.06939; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500557 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #501 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-249" #501: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #501) | 7a bb eb ab 59 82 f5 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 e6 e7 b7 df 15 1a 88 da d9 de 99 20 d1 37 56 | a1 ac 1e 3f d7 4a 79 5c c8 d1 9e 85 c4 f1 dc d8 | f1 ca b4 9f 14 60 92 de ad 42 9b 69 57 eb d4 33 | 23 a5 0d 4e 25 37 79 9e 75 f6 18 19 e2 36 6a 82 | 3e c6 41 e8 fb 1d 27 30 85 3c c4 c4 37 ed 39 57 | 59 68 3d d5 92 7b 15 e0 1d da a4 bf 8a 13 2e 99 | fa b3 d7 34 a7 e9 ee 45 93 41 ea 47 57 78 a8 c7 | 28 3e 80 cf 3a fa c3 5c 40 7e 2d 6e a8 8f 1a 76 | 9f e3 ee 0a 5c 09 b9 35 7b e1 73 9e 9a 5b 7e 05 | af 57 ba 41 a4 20 67 9b 93 00 a4 77 65 8b 72 e8 | ca c2 a7 8c f8 bc 75 a9 2f 52 c5 be ea 41 46 90 | 6a 2e 17 cc 87 cc 0a 22 0b d8 b5 c8 dd ab 30 09 | 90 3a 1d 65 9d 2f 73 fc c6 06 30 d8 66 83 64 c8 | a7 e5 c1 23 61 62 8a 18 87 ad dc 7f 74 de 65 20 | fb ed bb 7b ca 02 66 e1 c0 5c b2 b3 41 14 ad 3d | 9e 02 fd e0 c6 5b ba ef b1 16 d3 d4 8f 92 d4 90 | 29 00 00 24 0f d0 3c c8 9f 70 8e 25 2a 4f 78 c0 | 1d 68 16 9a 4a bb 3c a4 19 fe 19 3a d7 7c 1c 89 | 23 2f 21 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 3b be 6c 39 30 3e f5 fc f3 31 c5 | 53 ef 34 5b ca c1 eb 03 00 00 00 1c 00 00 40 05 | 86 82 cd 41 4f 66 70 19 76 ed 27 dd 0a 04 2f 6d | e6 1d 3e b6 | libevent_free: release ptr-libevent@0x7fb3680180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56dd0 | #501 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 3d 9b 75 e9 17 32 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #429 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #429 | rejected packet: | b1 3d 9b 75 e9 17 32 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #429: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a bb eb ab 59 82 f5 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #501 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #501 | rejected packet: | 7a bb eb ab 59 82 f5 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #501: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0521 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #497 | start processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #497 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #497 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49686.104762; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001894 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56dd0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #497 | libevent_malloc: new ptr-libevent@0x7fb3680180b0 size 128 "road-eastnet-nonat-245" #497: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #497) | 28 b5 38 f6 69 3c dd 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 04 4f fe 15 c7 2a a9 dd 3f 1e c4 af 27 5d f3 d2 | be f7 13 da e4 cd 00 79 29 61 5f 71 06 40 ec 4d | 5b 3c 6a 08 8b 9a 2f 7d 1c cb b0 e7 92 b6 f3 99 | d5 a0 ee 16 30 44 37 37 a1 b0 11 d5 bf c1 2a b7 | f5 d1 e8 e7 c9 c5 fa 46 9e 9f 3a b8 17 a3 bb fa | 54 7b 20 13 28 1b f7 09 b2 95 cc 2b 5d f4 60 59 | 43 48 23 26 2f ff 03 e2 92 b6 e4 28 ce 3a 0e b0 | 61 13 0a de 56 e6 23 f3 78 da d1 d7 d1 36 d7 28 | c6 40 4f d5 36 46 dd 50 a2 1e 26 c4 f5 81 8c a1 | f5 29 b8 66 19 89 39 ca 34 48 2c b5 7e 66 e5 bf | 86 9d 6e 91 75 02 c6 e8 9c 42 e7 98 64 aa 15 f8 | 6c 03 28 e6 79 39 e1 5e 40 0e f9 55 f0 a7 e0 83 | fa bb b8 03 f0 19 b9 6c 46 69 2b 63 42 39 b5 e4 | 3d 0b 8e 6b 21 0c f2 48 0e 67 57 08 dc 21 c5 f4 | 1a 4b 05 96 97 80 b1 ee 12 7e 9f 47 8d c8 b6 e1 | 5b 8f 86 2e 8f 92 b6 42 a3 65 04 7b ab ba 17 50 | 29 00 00 24 bb a3 f2 ad c6 d3 d5 2f 68 33 8b a0 | e0 e2 16 25 72 ec 6d 1a 07 9d 1d 9e dd 96 6a c8 | 4e 10 b2 ba 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 bb 68 12 ef 53 e2 45 10 bb c5 e2 | 24 4d b4 aa b9 d2 2c 73 00 00 00 1c 00 00 40 05 | 18 cd c3 7e 31 14 45 db 85 92 8b 2e 4a 8c 9b c9 | 08 95 b5 b9 | libevent_free: release ptr-libevent@0x7fb36403f0c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | #497 spent 0.216 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 b5 38 f6 69 3c dd 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #497 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #497 | rejected packet: | 28 b5 38 f6 69 3c dd 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #497: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0942 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c046090 | handling event EVENT_RETRANSMIT for parent state #318 | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #318 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #318 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49686.113233; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00542 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #318 | libevent_malloc: new ptr-libevent@0x7fb36403f0c0 size 128 "road-eastnet-nonat-66" #318: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #318) | b2 9a b8 bc 53 a3 28 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 a5 e6 b7 f3 09 b3 42 4d 70 2a 31 41 4a a2 a1 | da f8 c5 36 7a f2 dc 2d e7 30 c8 c3 07 0a c2 47 | 04 c4 b8 ae 57 b2 7f d1 c1 3e 18 53 e1 5d 14 23 | 04 61 06 e4 91 ef 35 cb ed 7a b9 57 a4 d9 68 76 | fa fd da 0f 58 44 d0 fa 3e 4e 2b ac ca 5d a5 c8 | 76 05 a5 5d 02 6a 96 c6 41 4e 3f 64 57 cd 41 d5 | d0 97 ad ff 58 6a 53 9a 01 1f 6b 3c 24 fe 31 ac | 0d 3c 93 ac 2c da 29 01 1d c2 dd be c2 11 80 ff | b5 b8 9d 4b 81 9c 72 55 6a 84 69 3f d0 ed e9 0c | 2b e3 ca 41 a3 62 7c a2 71 2a 37 58 65 17 c1 53 | cd 34 43 97 e4 05 81 70 70 41 b7 fe ed 43 15 27 | b6 ca b7 9c 9b 05 11 e5 9d 9d 78 a9 d5 63 3e b9 | 63 ef dc 73 f8 b5 32 8d f5 20 3c b0 29 8a 0d 0c | 3e 9f 40 29 07 45 7e 5f 6e e1 39 0d cb 64 2d c9 | 21 f3 18 88 11 a7 78 9d e5 c3 5e 82 9b 66 98 d0 | bb 21 5b 84 f3 89 c9 aa 9f 01 2e d6 67 59 8b 4c | 29 00 00 24 ef 94 98 d7 0c cd d4 f9 7f 97 bf da | 65 7b fd be ba 01 e1 85 cc 2b 5d 20 cf d0 d6 ef | 60 90 51 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 61 27 ec f1 41 a3 45 56 13 d5 ea | 91 6f ea fa 23 e5 f5 e5 00 00 00 1c 00 00 40 05 | d1 cc 61 18 e0 64 68 30 f0 cc 90 9d 95 49 27 67 | 23 d5 d1 7a | libevent_free: release ptr-libevent@0x7fb37c023f10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c046090 | #318 spent 0.212 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 9a b8 bc 53 a3 28 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #318 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #318 | rejected packet: | b2 9a b8 bc 53 a3 28 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #318: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.089 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a34e10 | handling event EVENT_RETRANSMIT for parent state #472 | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #472 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #472 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49686.152674; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002509 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c046090 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #472 | libevent_malloc: new ptr-libevent@0x7fb37c023f10 size 128 "road-eastnet-nonat-220" #472: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #472) | 15 62 43 a0 4c 6d db c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 ef 66 93 1f d2 be 3f b4 cb c3 5b c3 cd ce ec | ef 45 09 15 86 85 a5 fc 63 a8 dc f9 dc 2c 7f da | ad 3c 83 29 23 b1 9e ba fe be f5 05 08 e8 8e 73 | c4 15 c3 1f 80 d3 d0 b8 24 be b3 4f dc ef b0 39 | e8 6c 73 46 ce 8d ab 67 58 96 e6 89 9c 38 0e cb | 1f b3 47 af cd e8 fe 49 e5 c0 25 80 77 35 f6 06 | 6d dc 03 76 f8 34 b8 8e 05 e2 62 37 7a 40 b0 47 | 1d 8d 55 22 fa 66 04 34 43 30 87 8a 3b 8d 56 07 | f3 21 a4 25 01 21 d4 52 d3 44 c4 73 d4 a8 a2 ea | 69 66 8c 26 ab 85 7b a0 65 5b 03 5d 74 e7 7a 63 | 38 e1 5f b3 a4 83 48 11 76 d7 fb 96 bd 94 81 0e | 12 85 94 cb 17 1c 9e 64 a5 e2 b4 c7 96 eb cd 62 | bb 15 1b 96 a4 fb c3 a8 a0 ae 37 79 52 a4 ec 21 | 73 e0 47 a7 95 56 ce d5 cc 94 10 bf a2 8a 93 dc | 7f ea 6c d5 98 4b fa 19 3a ac 5e 1f 78 6e 08 fc | fa 46 b2 55 22 d7 78 a7 75 be f4 63 29 44 fa cb | 29 00 00 24 19 33 9e e6 d2 ec 99 b2 2a d6 00 cf | c3 4d d5 a5 cb 9d 67 f4 f2 94 3f b0 a2 94 a8 ff | 01 8e 5d 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 f6 a8 c3 12 9d 73 0e 92 1b 13 62 | b1 83 e3 04 e0 b3 2c 1d 00 00 00 1c 00 00 40 05 | c3 d5 bb 6d 6e 36 db ca 5f b7 b2 05 dd 15 c3 8f | 20 6a e3 5f | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a34e10 | #472 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 62 43 a0 4c 6d db c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #472 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #472 | rejected packet: | 15 62 43 a0 4c 6d db c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #472: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.068 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344018460 | handling event EVENT_RETRANSMIT for parent state #489 | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #489 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #489 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49686.157018; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002493 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a34e10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #489 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 "road-eastnet-nonat-237" #489: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #489) | 74 5a 3a 8b 71 1a cc fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 40 61 fd 1b 72 e8 67 07 d1 75 c8 79 f6 15 bf | 67 b1 a9 f3 47 1b 5a 9e 7a 16 95 64 09 96 72 95 | 1f e3 f8 5f 52 87 20 fb 61 9b db 76 dc 1e b3 ce | 79 87 62 5c 6c ce 2b 50 8b 94 05 b2 fd 25 84 04 | b4 15 bc 02 70 ed e7 01 0e 47 78 fa 99 0f 24 d8 | 6d 25 42 58 57 e1 37 d4 81 eb 71 fc 2c 93 fa a4 | c7 e3 ed 35 8a 44 47 43 96 45 a6 cd a3 83 61 0f | 10 8b 91 8a 9e 26 b5 05 80 74 cc cf bd 96 a9 68 | ec 71 d7 24 8f 0e c4 37 01 d3 fc 0e 4b 59 1a e8 | 44 25 f9 54 85 60 35 f6 be ce 52 66 75 73 a9 9b | 5c c3 e1 cf 01 12 70 63 56 6d a7 e8 18 d9 6b 45 | de 75 11 c2 b6 ad 37 d5 3d 52 a7 75 84 78 8c 7f | 86 51 7e 50 9f 10 72 bd c2 69 ef b3 ad 19 2b a0 | 12 77 de 7a 6b 6d 21 bf fd 3d 7b 00 2f 59 e3 b9 | d0 af c2 b1 28 3c da ec de 08 be a1 d1 4e 94 57 | 47 99 d9 10 35 e0 60 cf 3d 10 4e cb 1b b3 b4 f7 | 29 00 00 24 40 6d 68 58 c0 2a c7 cb 28 ac 6f c2 | e6 6e 2c b5 98 00 fd fe 6e 20 dd ca 12 44 3b 53 | ff 69 1e f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 46 ab 03 11 7d bc a6 76 5d 5e 81 | f5 21 84 26 13 ce 73 a7 00 00 00 1c 00 00 40 05 | f1 f1 80 9f 1b 76 8c da 90 0c 48 79 e2 c4 ce d3 | 45 3b 5d 95 | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344018460 | #489 spent 0.205 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 5a 3a 8b 71 1a cc fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #489 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #489 | rejected packet: | 74 5a 3a 8b 71 1a cc fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #489: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358012630 | handling event EVENT_RETRANSMIT for parent state #430 | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #430 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #430 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49686.157345; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003007 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344018460 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #430 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 "road-eastnet-nonat-178" #430: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #430) | fd 31 ba 30 35 2e 2d c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 61 13 a5 cc e9 81 b6 86 fc 6b 16 f1 74 d1 d9 | 72 f7 e2 ba f7 11 d1 79 92 c8 3d 2f 28 42 00 4a | 78 0d 84 65 5e dc 17 2f ba 15 c9 f0 22 4d 0a 3b | 29 55 5d 3f ae dd 3d 32 e8 c3 46 a9 04 47 63 51 | 2f 80 77 91 5f 9c b1 19 0f 94 27 d5 5d fe 9c 81 | eb f7 f8 80 c0 5d c2 5a 33 1a 77 e9 05 ab d6 42 | 13 e3 2a 15 08 f1 ba d2 bf eb 3d 3d ce 2d cd 92 | 09 c3 9f 5e 21 7b 84 9b 7e ad 3a cb 5a e8 5e a4 | 33 a8 4d 41 b7 9c ef db 29 ac 76 73 88 b2 9f 61 | fa 8c 1c 07 e5 8d 13 2c 9f d7 a6 11 29 94 1a 21 | 41 e9 57 a1 8b f3 e6 b9 90 b9 b8 f3 a3 3b 4c 8f | 23 8e 08 2f 27 17 72 8c c0 e7 38 14 1f 4b aa 78 | e1 d2 e5 79 c4 be 0b 93 9e 0c 21 6c d4 2a fe 21 | c7 8e 29 af b0 03 63 38 02 4d 95 ee 76 1a 81 af | a9 96 3e 2d 7b 5a 65 f4 b4 60 bb 2f a9 e9 18 59 | 66 94 d6 32 f1 9f 06 b1 1e 3d 20 4c 29 30 cd 34 | 29 00 00 24 72 14 4a 62 3b 2e 28 0b 02 9a 2b 55 | 37 9d 8e 84 fb c2 f7 70 ad cf 43 07 12 85 de c1 | 7c 78 30 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e0 6b 92 d2 7b 15 90 7f 21 2f b9 04 | b8 30 3c 8f c2 2d 01 6b 00 00 00 1c 00 00 40 05 | 4e cf 7c 8c 30 ae f3 1b a7 47 e4 11 ea a4 73 10 | 14 82 c2 9c | libevent_free: release ptr-libevent@0x7fb358039e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358012630 | #430 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 31 ba 30 35 2e 2d c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #430 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #430 | rejected packet: | fd 31 ba 30 35 2e 2d c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #430: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0583 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c012bf0 | handling event EVENT_RETRANSMIT for parent state #502 | start processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #502 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #502 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49686.168631; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500614 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358012630 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #502 | libevent_malloc: new ptr-libevent@0x7fb358039e30 size 128 "road-eastnet-nonat-250" #502: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #502) | 49 84 03 55 33 41 14 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 b6 56 c0 55 c6 5a b3 d0 b1 3a cd 2c 2d f1 98 | 2b 05 72 d6 2a eb f1 a5 ce 1a 6e fe 9b 76 4a e6 | c8 9d 68 cf 67 24 b2 a5 b6 c1 96 48 84 37 b3 8b | f1 39 9c c4 10 9d db 1a 8e 7f b3 36 f3 a8 eb bd | 2b 28 0c da ff 40 e9 6b c2 33 b1 41 cc 82 3c 97 | 2f 0e a7 48 25 26 c1 d7 53 0e 21 ee 94 d4 a0 38 | 49 e2 15 f5 13 68 e2 8a cb ba 80 6b ce a6 00 d2 | 69 7e 9f 04 65 f3 ae 81 71 49 2a 5f 8f ee 09 49 | e3 ff 1b cd 41 64 ae 29 01 91 5e 32 c3 26 78 8f | ea 20 2b 0f 18 2d 0a 1f 22 af 98 ef 92 ff 6a 84 | 62 82 19 1c 56 bf 8b 8e 12 15 12 c1 19 da 4c cd | 49 b3 95 88 b6 66 33 d3 36 cf f2 bd 45 7d 72 a1 | 21 21 16 69 39 89 66 de 9b 3d 56 7f ea f5 ce 47 | 7a 2e 75 2e cf 9b 6b 32 55 e0 ae 5b c0 56 2e 7e | b8 fa 3a ca aa 83 6d 0a b9 cf d2 e5 75 34 ef 7c | fd ec 25 52 b8 3d 7b b9 f7 15 a6 0a 76 51 86 5e | 29 00 00 24 9b c1 28 9f 3d 89 a9 b6 3e c7 19 65 | 88 8e 41 03 11 21 a9 0f 26 57 6b e7 b4 25 21 32 | 2d ba 55 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f d1 0c 18 0e bf a2 52 1e 5c d3 e7 | df 48 7e 58 7f 45 57 fd 00 00 00 1c 00 00 40 05 | c9 7e 47 3a 28 a9 19 bc aa dc fd 65 a2 d8 10 d7 | 15 14 41 45 | libevent_free: release ptr-libevent@0x7fb37804b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | #502 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 84 03 55 33 41 14 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #502 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #502 | rejected packet: | 49 84 03 55 33 41 14 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #502: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800cc10 | handling event EVENT_RETRANSMIT for parent state #319 | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #319 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #319 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49686.174937; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005459 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #319 | libevent_malloc: new ptr-libevent@0x7fb37804b7c0 size 128 "road-eastnet-nonat-67" #319: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #319) | 11 2f c2 e2 55 80 ad fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 29 97 2b 00 80 7a b2 ce 19 1b 94 79 57 61 71 | b5 31 67 66 2a f4 c8 dd 15 9f e0 ad 50 a1 3c 77 | 34 62 bd 4c c6 67 73 04 6a 47 e6 12 64 23 d5 1b | 98 65 2d 83 00 df 2d e7 e4 d4 74 c8 bc 36 30 29 | 44 5a 01 b4 02 e1 00 0f 8d ad 81 f9 8e 46 de 85 | 06 c3 07 15 fc b6 b0 15 06 43 f6 0e a8 fd 09 ef | d8 40 6e 21 d5 b3 5d 25 10 a6 87 71 c1 c1 fe d8 | bf 80 48 df 26 2b e7 63 6d 12 1e cf 0b 06 eb b0 | 7e 3e d5 d0 6b 21 8d aa 41 e8 f8 30 37 35 ac fc | 15 96 69 e5 f5 b2 90 e3 4e fe 2d ad 13 5f a0 e8 | 1c c7 69 35 1d b3 4c 80 f6 b9 3c 2d 05 13 72 b5 | 7e a3 0f 53 4b 80 32 e8 c3 5e b7 f7 2e ae 6c 5b | 24 7a c5 8a 0a 7f 55 0a 11 24 c0 ef fe 17 1d 30 | 05 8e ac 66 5c 3e f2 80 08 7e 41 35 dd 7a 17 b5 | ec 43 f0 d8 c9 61 5b 46 04 99 f3 93 60 24 02 4a | 51 18 18 5f 6c cb 3e f9 d1 40 eb 27 ba 67 3b b9 | 29 00 00 24 b8 88 60 8f 24 78 87 d6 7e a3 09 04 | de 05 ae 45 4d b7 3b ca 2f 96 5c 9a fa 13 da 85 | a2 c0 a1 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 04 44 46 25 45 86 78 cb ac b2 11 | 55 71 47 06 ea 13 d1 6f 00 00 00 1c 00 00 40 05 | 2f 9a c9 00 f1 11 a0 f7 d7 69 9d e9 ea e6 fc 70 | 38 db 7b 3a | libevent_free: release ptr-libevent@0x7fb33801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800cc10 | #319 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 2f c2 e2 55 80 ad fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #319 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #319 | rejected packet: | 11 2f c2 e2 55 80 ad fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #319: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a82ac0 | handling event EVENT_RETRANSMIT for parent state #490 | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #490 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #490 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49686.236257; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002823 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #490 | libevent_malloc: new ptr-libevent@0x7fb33801a4e0 size 128 "road-eastnet-nonat-238" #490: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #490) | bb 0e 3a 9b 64 67 83 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 47 7f 34 75 b5 49 50 79 df a4 4b 2a 1a ce 17 | 54 1a db ef 07 cc bd 63 ec 5f fd 57 bc 8e fa 30 | c9 95 d1 71 e6 7c fd 77 3c fd c2 3d 71 c3 96 28 | a3 d1 35 26 0a 70 d5 c3 3a fb 74 58 46 86 23 a0 | 05 3c 91 b9 ac 6a ea c1 25 7b 4a 3f a3 25 55 72 | 1a fa 68 62 a6 28 8d 23 b1 87 6f cc f5 37 d0 47 | fc 41 f4 96 78 ec ba 03 b7 d0 87 4f ed d1 99 e0 | 0d e4 2b f5 2e 28 88 3d fd a9 fe 89 6e 87 86 2a | bc 0f d8 0e c6 4a 2c e3 b3 3a a6 4b 56 b2 d1 a7 | b4 82 a8 63 ca 63 fb 28 a9 ae 19 5e d9 12 c8 ba | 95 37 7e 44 d0 19 50 2e 50 85 6d 62 52 72 3d eb | 4d f4 88 bd 4f 23 95 01 f5 e8 4f 41 c1 7a e2 e9 | 09 7e 97 ea 1c b6 21 cd 07 3c 59 f2 8d ef a7 3b | 3d d1 60 37 5e c3 67 ad 3c a4 b3 33 59 93 de 51 | 98 2d 6e b0 f8 67 26 97 7f 16 7a f1 7d 53 b7 ac | 55 64 4e 4e 20 10 14 93 a4 62 e7 45 6c 22 9f d2 | 29 00 00 24 e1 87 09 5e 30 4d 93 58 a8 7b ef c0 | df 86 01 db 2f ae 90 07 26 59 14 f1 71 ed 65 8b | e5 42 58 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e a7 de 07 e1 64 83 30 46 b8 16 83 | 02 93 de dc 12 4e 03 eb 00 00 00 1c 00 00 40 05 | 41 30 1b e3 e2 bc 6c 0f ca fc a1 2e 9d 87 bf 76 | 3a b7 29 61 | libevent_free: release ptr-libevent@0x7fb3780251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a82ac0 | #490 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3840318d0 | handling event EVENT_RETRANSMIT for parent state #431 | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #431 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #431 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49686.236393; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003787 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a82ac0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #431 | libevent_malloc: new ptr-libevent@0x7fb3780251c0 size 128 "road-eastnet-nonat-179" #431: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #431) | 47 a9 f6 5d ab 90 59 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 61 b4 c7 cd e1 2c 04 0c 72 d6 80 6f c8 af 30 | 4d b0 b2 1e 8d 4f c3 2d f2 10 58 df a2 cf 51 79 | b1 79 c2 3f a7 35 e3 8e 8c e9 62 c2 7f 62 64 45 | 0a e4 6a 79 06 24 d8 93 a4 d7 88 f6 f8 67 56 ac | da f7 27 22 46 b5 f3 36 fc 59 b8 ef 46 c0 a0 39 | db 63 6d 41 32 18 a5 95 8d 7d ad 6f 27 26 ca df | ed d3 ee 53 fd 4c f5 cc 75 fc e3 f8 93 5a 96 cb | 92 9a 63 48 fa 88 0d 7b 6d 6b ed e6 9a a3 62 cc | f6 ca d1 cc 9a a4 27 97 4e 98 8a fa ec f7 10 73 | 1c 8b 1a f2 37 ea 26 ef 65 c4 24 b5 68 0e 71 36 | f1 1a b0 23 a4 4f b8 8f 75 d7 00 cd 7b 3c ae b6 | d6 4e 42 ae bd d1 a4 92 33 6b 9b 3f 93 ee 1b 13 | 12 06 ae 19 81 16 af 26 23 73 f8 46 07 4b f9 88 | 69 47 c6 fb 6b 2b 62 2c a3 d3 70 f4 52 77 08 a4 | 0e 48 7c ce 5d 87 5a c2 55 50 b0 8a 92 e5 1a 3c | 83 00 60 34 e5 f6 a0 b7 42 00 ef b1 62 a7 9d 6c | 29 00 00 24 71 9e 5f 53 a0 03 f4 e4 24 3a 58 53 | c3 05 4a 1c c7 b1 e2 bd 95 07 98 a5 4b 6a 2d 2f | 6b 11 45 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 46 73 c7 9b 2a a1 6f 39 66 d3 70 | f2 4b 98 95 84 ba e3 3f 00 00 00 1c 00 00 40 05 | 9a b5 4b 5a b1 14 b9 6a 89 15 79 d3 91 3a bb d6 | 0d 4a ca 70 | libevent_free: release ptr-libevent@0x7fb38403c470 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840318d0 | #431 spent 0.0679 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 0e 3a 9b 64 67 83 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #490 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #490 | rejected packet: | bb 0e 3a 9b 64 67 83 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #490: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 a9 f6 5d ab 90 59 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #431 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #431 | rejected packet: | 47 a9 f6 5d ab 90 59 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #431: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0354 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad43c0 | handling event EVENT_RETRANSMIT for parent state #498 | start processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #498 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #498 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49686.238662; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002964 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840318d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #498 | libevent_malloc: new ptr-libevent@0x7fb38403c470 size 128 "road-eastnet-nonat-246" #498: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #498) | 68 4b 64 40 03 e3 f0 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 69 29 47 91 ea fc 2e df 27 76 0c 26 38 63 6b | ee 03 64 3e dd 2d 4f 5c a2 7c 3e 41 2e b2 c6 84 | ff d7 8f ca 24 8a 1a 84 04 b4 3e b6 53 38 d4 57 | 6d a4 68 41 c6 e5 8c 59 22 a7 fd d7 67 07 36 7e | 1e 40 23 48 d2 30 3e 8e d0 0e 2f 85 d4 6b 01 86 | 85 76 00 26 45 82 b5 a1 ed 94 31 de 85 9c 6f 9a | d2 cc cb 6d 68 f4 36 91 7d 92 94 a9 b3 a0 25 d9 | 5a 00 e8 82 c1 6e 50 4f eb 4b c5 77 4d eb ad f8 | f9 00 df 08 85 b8 e7 b1 b7 09 70 ca fb b5 96 54 | bd be b6 e6 4b 40 d9 6a f9 30 1c a8 77 f3 85 c8 | 21 54 2e a4 d4 8e d4 56 c2 16 22 dd 3e 05 97 69 | 65 6d 3c 5d 0f 12 01 33 b0 f7 91 7a 47 03 5b 97 | 4d 0e 9c 52 05 49 6e 01 9c be f7 12 23 b1 5e c9 | 73 97 42 af ac c3 1d 81 30 3b a9 46 14 e0 b0 65 | ab d4 ac 96 fd 2b 1a 19 c7 e5 47 a1 84 25 26 11 | 99 9a c0 71 dd 5f b8 d7 21 7f 1f c8 a8 a3 e9 18 | 29 00 00 24 87 96 a9 cf f1 29 2d 50 7c 79 d6 68 | 62 af 98 cb 71 a2 fc 0e ae 94 c2 03 22 51 95 ed | 81 12 8d c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 71 da 0a 79 9e f6 1d 6a 6f 5a 6b | 39 aa 0c e1 fb 50 58 ee 00 00 00 1c 00 00 40 05 | 43 dd 8c b7 86 3c b2 4e bf 53 d1 4c 55 30 14 19 | fc 2a 32 31 | libevent_free: release ptr-libevent@0x7fb36c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad43c0 | #498 spent 0.0961 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 4b 64 40 03 e3 f0 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #498 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #498 | rejected packet: | 68 4b 64 40 03 e3 f0 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #498: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384043260 | handling event EVENT_RETRANSMIT for parent state #473 | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #473 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #473 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49686.251948; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.0031 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad43c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #473 | libevent_malloc: new ptr-libevent@0x7fb36c04b7c0 size 128 "road-eastnet-nonat-221" #473: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #473) | 78 01 12 66 35 d7 75 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 47 0f 4f 77 38 bb e7 c9 71 64 11 49 78 07 db | 61 1c cd 26 23 f1 f6 1d 25 30 16 ce 14 27 83 ce | 42 30 8f 08 74 8c 5a 73 8c d4 32 61 41 1b ee 9b | f9 31 2e 33 9d 12 db b8 cb 33 3f 38 d9 dd c3 f9 | 20 b6 40 e8 ca 08 02 ce df 71 6c f1 5d 52 08 e6 | 58 10 57 a2 32 8d ae 1d 5e 7d c4 ce e0 91 e8 67 | ef d4 89 2c c0 b5 6a 92 6e 51 6d 9b 9d 21 b2 11 | 63 ad d9 36 26 eb dc c5 60 5b ef 4a 3f 29 d2 75 | 9a 29 b2 ce 56 3f a4 11 28 44 4d 82 14 b3 ff 08 | f3 34 c5 89 41 5b 00 60 7c 63 69 55 27 25 23 fa | 32 38 62 77 fb 7a 33 df 62 71 61 b7 15 ec 0a 13 | 14 36 a9 93 fd 25 0e 0d b3 44 f4 62 07 ce 96 88 | f0 a4 9b c6 5b 9f 17 d2 94 b3 dd 9f 08 c2 33 c2 | 59 53 80 d3 e8 b8 bc 9f 9d b9 55 bf 1b b3 90 a8 | 46 84 0d b5 c1 2a b7 bd df e2 56 3f f0 a8 af c2 | b3 ab 6b 5f 0e ca 69 45 20 54 b6 94 83 c5 3d bb | 29 00 00 24 4a 32 17 be 17 e6 be 0c a5 f0 d0 1f | f3 82 ee d0 20 e4 2f 26 27 39 fc fe 8a c9 3a 42 | bb 40 ba 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 8a 84 70 d7 06 66 bf 35 02 d1 dc | b7 f5 da 2f 6f 36 dc 4c 00 00 00 1c 00 00 40 05 | 22 8e 50 95 0f 93 c8 cc 9c 03 8c bf 24 39 56 cd | 71 d7 b1 e2 | libevent_free: release ptr-libevent@0x7fb384031e80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384043260 | #473 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 01 12 66 35 d7 75 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #473 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #473 | rejected packet: | 78 01 12 66 35 d7 75 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #473: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0534 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #320 | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #320 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #320 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49686.271251; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005471 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384043260 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #320 | libevent_malloc: new ptr-libevent@0x7fb384031e80 size 128 "road-eastnet-nonat-68" #320: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #320) | af c7 ee c1 89 d6 03 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 a8 bd a9 e5 4d 48 c1 fb 45 8d 11 bf a7 3a cc | c9 47 84 c7 e3 5d ec 21 4e d8 5a af 98 89 03 e4 | 61 3a ba 3d 60 86 ef 6f 17 de fb a4 db d7 d8 bb | dd a1 22 38 5e f6 ed 84 ef 59 30 63 60 c1 46 9c | 68 55 6e 9a 1e c0 57 7e 80 7e b6 a3 a2 d8 44 32 | cf 08 62 90 01 f4 f2 5f ed 1f e9 b3 6d aa b3 b5 | 51 0c 08 36 0d 22 74 67 a6 8c ed a0 79 50 51 2d | 0e 2f 3b 92 1e b3 eb 2d 06 7f 88 16 e6 58 28 17 | 60 5d c5 e1 99 65 2e 54 d8 fa ea 82 20 22 7c ff | b3 f5 72 25 7c 83 b1 cd 19 3e 2b da bc a9 3d dd | 76 aa 4a e2 d6 6a 5a 1c c6 a7 82 72 c8 70 00 2c | 36 b2 a4 f0 ac d5 1d 56 89 f2 8b 82 16 da 4e a9 | 45 8b f2 f1 83 02 06 ed 82 d4 33 ad 52 79 3a 05 | a1 a9 14 4d f9 86 6b dc 84 e1 88 2a d3 ae c1 8c | 43 6f 17 24 1b 1e 6c e9 e7 e2 8e 7a 04 41 d1 b0 | a9 68 50 65 7f 85 77 b4 91 10 c3 80 9a 3e 62 10 | 29 00 00 24 2e 21 9d f9 af ba 04 f5 8f 3b a6 14 | 4e db f7 72 ee 4f db 92 91 3b 76 55 23 0e 1b ed | b4 de fd 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 21 4b df 59 d9 64 c3 0f dc d7 26 | ba 28 50 c6 3e 72 d7 ec 00 00 00 1c 00 00 40 05 | d3 cb a5 46 ac a7 4b 5d c8 de d7 e5 bf c8 e6 16 | 1f 0a fc 46 | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #320 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af c7 ee c1 89 d6 03 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #320 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #320 | rejected packet: | af c7 ee c1 89 d6 03 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #320: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae0780 | handling event EVENT_RETRANSMIT for parent state #503 | start processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #503 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #503 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49686.279539; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500363 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #503 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 "road-eastnet-nonat-251" #503: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #503) | de 1d 8d 29 e2 13 e9 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 bc c5 bc ee 45 af a6 73 6a 90 e4 26 1b 45 74 | 00 ed f2 a3 ec 74 88 4b c9 51 b5 6a 38 9f 0a f7 | 89 96 66 a1 cb 3b 36 71 3c 50 00 7f a8 a1 27 84 | 14 72 85 f0 e9 87 92 95 57 d6 bb a3 9e eb a3 89 | 3b d6 9d 72 8e 22 b1 43 7b 48 2b 91 a9 6c a2 71 | 4e b7 05 32 94 32 e3 1e 78 6c 29 24 39 3f 29 25 | a5 fc 7d 8a 16 8c 7f 3c 9e 88 a1 a2 0f e7 3d e7 | a6 2a 71 17 3f ba 2d 1e 73 4a af 59 81 2a 33 e7 | 7c 6b a5 a6 c7 0d 60 09 fe 4a 3a c4 ae f0 db 28 | 63 c7 99 7d c2 1a 2a f5 ca 34 59 14 08 64 3e 0e | 9e 8a 9a 95 bb 9d 48 ef fa 38 ec e3 2c 15 34 9c | e9 d6 59 e6 ff 43 a4 b1 2b ff 91 b3 04 3b c1 be | 1e 15 0a dc 58 8d 95 f6 06 1e 22 79 23 6e 88 9c | fb 5f 8d 89 36 69 ab a3 c4 17 6b e8 27 27 43 a0 | 64 a3 07 0b 2b f0 22 81 09 20 24 c8 81 c7 b3 70 | 64 46 cf dc 25 f9 42 3b 6e b0 ff 34 aa 9a 20 98 | 29 00 00 24 e0 7e ea 52 c4 af 5e ed 64 d4 0d e7 | b4 32 8f da 7f e4 cd 7f 6e 0d 4f bd 11 1c 8f fe | 10 1a 14 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 eb 39 3d 04 da 34 34 c4 55 20 7b | 97 62 11 e4 f5 1f 2c 3d 00 00 00 1c 00 00 40 05 | 56 4f 2a b1 95 be 94 04 9d 7b d6 c2 f3 45 b1 7e | d7 05 c2 82 | libevent_free: release ptr-libevent@0x7fb36004b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae0780 | #503 spent 0.0957 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 1d 8d 29 e2 13 e9 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #503 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #503 | rejected packet: | de 1d 8d 29 e2 13 e9 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #503: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd80 | handling event EVENT_RETRANSMIT for parent state #432 | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #432 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #432 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49686.322786; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00481 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae0780 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #432 | libevent_malloc: new ptr-libevent@0x7fb36004b7c0 size 128 "road-eastnet-nonat-180" #432: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #432) | 9e 5c f1 81 be b3 cc bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 a7 44 cc 56 0f 1f a1 57 e9 97 90 cf 04 1e 5b | e0 0e 7b 47 ef c0 b0 6b 28 ba 80 69 c9 1b 38 ab | 77 4e c9 e0 e5 8e ac 7e e2 16 87 36 5e 9c 78 7a | 88 e7 f8 df f3 43 04 06 de 41 bf fc 2c aa 5f 0d | 69 d9 8b 25 79 3a 55 bd c2 56 12 76 16 fc d9 a5 | 9c 10 c0 69 f3 49 ac 1b 12 69 8b 54 81 c5 66 b4 | ce 87 81 ab 4c 4a 3c be 13 a8 a6 c4 c4 ee d3 f3 | e4 6c 08 82 35 56 98 d0 52 0e 3c b5 9f cf 94 45 | b1 ff 7d 1f 92 70 cf 8e d1 c1 37 a6 37 65 ee ce | 20 a0 2f 74 83 20 8b e8 b7 59 69 69 3d 2e af d9 | 5c 5b c8 f5 d1 97 f9 58 4c 4b b5 5a 72 21 7a ff | 15 e2 cf de 63 20 f5 1b 33 44 6d 86 26 89 fe a9 | ef 26 23 fc 07 42 35 ac 53 4d 00 7f 36 93 50 78 | ef 61 a9 fd 99 64 73 27 a0 12 f0 71 a5 ef 01 e0 | f5 fa 65 6f 20 9b da c4 8d 30 72 f1 87 a2 6d e6 | e6 3b 2c 57 3c e1 2d 99 93 66 b2 b3 c7 c3 45 c6 | 29 00 00 24 97 c3 cd 2d d6 91 ce 3c 3a 10 07 b4 | 90 19 a9 e3 82 ea 52 87 8f 88 50 41 d4 a6 e1 e6 | 2e 3c 74 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b b0 51 e2 58 5c b1 15 1d eb ed 97 | 2a 88 5d 96 2e c9 a1 f8 00 00 00 1c 00 00 40 05 | 78 1a 23 ab e8 fa 74 f8 b4 b9 8c 5c d8 d3 f5 f5 | 1c a1 eb 5a | libevent_free: release ptr-libevent@0x7fb37c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd80 | #432 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e 5c f1 81 be b3 cc bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #432 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #432 | rejected packet: | 9e 5c f1 81 be b3 cc bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #432: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0533 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34000d120 | handling event EVENT_RETRANSMIT for parent state #321 | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #321 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #321 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49686.331097; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005455 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #321 | libevent_malloc: new ptr-libevent@0x7fb37c04b7c0 size 128 "road-eastnet-nonat-69" #321: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #321) | 30 42 c0 64 91 b3 77 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 8b 42 a5 47 61 3e b2 88 66 b3 90 63 22 69 df | e5 f0 68 6a 3f ab 70 bf d6 bc a2 6d 32 d6 bf 56 | 13 cd ae 31 91 9e 97 07 b1 e6 67 da 49 fc 52 44 | f0 97 00 89 4b 4a 7b 7e 72 67 33 77 ed ad d5 60 | 7c 94 7a 09 a1 fe 2b 97 f4 03 f7 65 c2 4f 92 50 | 59 77 e9 77 52 e2 ba 0e f1 c5 36 f7 3f 04 ca 02 | 29 37 fe 9d b2 ee 90 bb 59 f2 25 82 19 bd 15 09 | 7c 21 90 62 70 4c 2f 35 e2 fa b0 32 14 28 ef f3 | f9 26 2a aa 23 e5 00 f2 ed fa 00 25 b3 8d 3e f4 | 4c e5 68 7e bb cf a5 93 21 96 34 22 9d cb 8e c0 | 2d 43 58 e0 8a b9 3b 2b d8 e6 50 0b 36 e9 8a 0b | 9a 7c fa 82 ee ac d3 9d dc ac fe e5 26 e8 d7 a8 | 41 71 b3 21 7a 08 ae 35 2b 19 02 a1 3c d8 d8 79 | 7f 1b 50 2d 1e 74 84 a4 f5 80 19 40 cb b4 59 fe | e2 eb 79 b4 b1 1d a9 7a b4 6e 10 85 42 85 5d e9 | 58 9c 43 c5 54 ce c4 20 7b 73 38 bf 59 44 4d 18 | 29 00 00 24 bf 17 ca 5e f8 c4 94 b8 0b 16 3e 38 | 6b 43 cf 92 04 d6 aa ac 11 4c 2e 2c d1 a0 dc 92 | 64 9e 7b 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 bc 1a f8 41 15 d9 99 65 b2 c4 f3 | df 03 a0 00 26 60 50 c2 00 00 00 1c 00 00 40 05 | fc 37 e7 42 82 1f 76 13 ad 5a b7 fc e2 af d4 9f | 15 d4 13 5b | libevent_free: release ptr-libevent@0x7fb35c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000d120 | #321 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 42 c0 64 91 b3 77 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #321 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #321 | rejected packet: | 30 42 c0 64 91 b3 77 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #321: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0495 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #491 | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #491 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #491 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49686.332369; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003155 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #491 | libevent_malloc: new ptr-libevent@0x7fb35c04b850 size 128 "road-eastnet-nonat-239" #491: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #491) | 71 99 e4 22 98 eb 54 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6f ca d2 21 e7 00 d0 58 95 9f 18 d3 07 6f a1 36 | 29 0a 07 0a 83 6e be aa 71 cf 9f 04 2d 78 ad e9 | 58 fe 50 02 89 22 52 34 18 90 af 07 b5 26 f1 6c | b0 11 12 a1 23 de 99 fd fc c2 c0 e2 48 6c 08 1b | f6 de 34 df 7c 06 d6 3f 0c 5a 97 94 b5 cd 37 58 | 08 26 b0 da 52 89 5c 74 c6 39 52 b5 86 f0 ed 18 | e5 f9 91 2e 14 4e 44 f7 64 55 1d 70 ad 8f f1 5d | 53 18 a9 5d 0c b5 78 b7 26 b2 7b 9e 90 ef 29 39 | 8b 7e b2 68 96 f5 cb 23 fc d4 1f dd be 19 b3 cf | 90 29 ab e6 33 3c 02 49 68 ce 65 d3 cd 32 0f 44 | 53 2e 1d d6 62 09 24 c9 7c 69 12 6b 73 20 8c a6 | 8d 2e 37 7f bc 30 45 fb da d9 2f 0c 0f 60 4b ac | 0c 1a 77 7c e4 78 1e 2f d7 92 41 d2 4d 5f 8e ae | 49 e0 54 b5 c7 2d bc a1 7a a2 3f 86 07 2c 92 60 | e1 f5 de af a0 f0 4b 27 ad e3 b4 c3 ee 7b 2d 0d | d8 e3 ea 54 9f 53 a9 b6 54 62 d4 0e 68 4d ff 58 | 29 00 00 24 f6 62 db cd 87 59 ee 6d c7 6e 62 13 | a1 8e a7 17 f8 92 11 7a 45 83 ff 50 63 74 b0 f6 | 7b f4 74 d1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 ef b1 40 3a d0 79 c3 55 24 76 d2 | d8 cf d4 95 18 b0 e0 3a 00 00 00 1c 00 00 40 05 | ee b1 f7 86 b3 de f8 ed 09 8e 76 56 9a 74 8c 3c | 69 d7 b9 6e | libevent_free: release ptr-libevent@0x7fb3840060f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | #491 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 99 e4 22 98 eb 54 3d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #491 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #491 | rejected packet: | 71 99 e4 22 98 eb 54 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #491: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0549 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36400cc10 | handling event EVENT_RETRANSMIT for parent state #474 | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #474 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #474 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49686.357673; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004636 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #474 | libevent_malloc: new ptr-libevent@0x7fb3840060f0 size 128 "road-eastnet-nonat-222" #474: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #474) | 0f db c1 fb 9f 17 ff 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 1b 5f a0 e0 ea b4 6f d8 89 26 cf ee 32 1a 5c | 28 fd cc 88 df ac 76 71 06 f6 f9 47 1d 52 2b f1 | 5a b8 ae 1c d0 f8 c1 49 c7 7c ed 42 b3 cb ec d1 | cd 02 cf 31 b3 56 f6 e1 d0 7b 2f 03 00 08 68 a8 | 8c e2 7f 21 83 8d a7 f5 0e 07 fa ee 88 4b c9 7c | 96 80 b8 d5 42 4d 28 ea bb cc 27 3f c4 d8 6e 4d | d5 70 bc b9 0a 5f 21 c3 31 6b f1 91 46 6a 01 67 | 1a 7e a6 f1 0c 4d 62 51 b1 a2 3c 89 97 d5 4a 44 | a9 bc 59 2f a3 d1 5e 07 95 15 69 ac 72 1f 9c ba | 63 7f 02 e1 05 f8 26 4f fe cb 35 8d 42 06 b7 4a | a1 e1 b3 5c f5 2a 05 2b b1 4d 29 89 16 f1 e4 7b | dc e2 55 b9 29 ad b8 79 4e bb 9a 44 92 25 af e6 | 8f 1c 0d 27 3a fe 2f c8 95 15 ef 6f 1b 1e 7a 94 | a3 8c 31 92 cc 09 2b ca d2 98 1d 32 a4 3c 30 c1 | 96 ab 37 bb 0d bc c5 cd 1c ca 91 c5 fa 2a c9 92 | 70 fb 0c 4c 99 ec 29 a2 72 d8 22 a0 d3 24 0d 76 | 29 00 00 24 b8 e3 46 90 e1 5a 71 46 9e cc 2f c2 | 22 0c 77 5a b9 94 a5 51 d5 e9 c9 19 b8 4f d2 8d | f8 17 d9 c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 82 ca 85 05 ee 86 5d c3 66 e4 91 | 24 1c 89 d5 b4 33 f3 c7 00 00 00 1c 00 00 40 05 | d7 2a e5 02 23 f5 bb 26 e7 1d 38 9f 9f c2 ec a7 | 48 2b cd 07 | libevent_free: release ptr-libevent@0x7fb364039970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36400cc10 | #474 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0f db c1 fb 9f 17 ff 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #474 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #474 | rejected packet: | 0f db c1 fb 9f 17 ff 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #474: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a86b80 | handling event EVENT_RETRANSMIT for parent state #499 | start processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #499 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #499 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49686.364968; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00222 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36400cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #499 | libevent_malloc: new ptr-libevent@0x7fb364039970 size 128 "road-eastnet-nonat-247" #499: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #499) | c7 9c 2c 36 f8 59 d4 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 36 9d 7e c3 eb 0f f5 55 38 8b 43 25 86 54 ef | 6f b9 f8 28 7e 76 ec 92 74 99 fc c9 b6 64 9d ac | b4 f5 fc 31 29 96 7b f0 ef 3c 01 28 c3 ad 1c 4d | 74 6d b0 ed 64 09 35 18 c6 6a c2 bc 6c f8 72 2c | 54 14 82 7e 14 37 d9 e7 9b 9f ce de 7f 99 2e f1 | 1f 25 30 b7 54 88 0c c6 03 fe ef 9a c2 4c 16 3a | 92 dc d7 50 b6 03 1d 9b e5 26 b1 a0 fd e5 86 9c | c1 bb a9 1d c8 aa e0 66 62 a8 ef d5 a3 e5 1c aa | 48 a0 13 72 a6 76 d4 63 de 8e 77 d1 a4 a1 70 1a | 05 7e fd e9 46 8f d7 69 9c 5d 01 6a 23 bf d1 7c | 60 fe 3b 08 36 7c 46 56 5e fa 3e 87 6e f8 5c e5 | 62 26 d2 09 02 d7 a8 88 f2 80 8a 7b d3 24 87 ec | 98 c6 06 44 cf 2e 14 1f 9a 9e 11 3b 15 35 10 67 | 80 78 af 3c 90 b3 be 54 94 f8 6c d9 36 9d 34 3f | b2 ee 4f 6f 8b cb 03 13 29 6b 61 bf aa 20 b1 02 | 64 9a 46 8c 58 45 74 b6 a7 9c 3f 9f 19 1b d5 f4 | 29 00 00 24 ae 3f 5f 22 5a fe fe 91 94 31 fc a8 | 30 c0 4a f7 3c 57 3c 0d ed a5 29 f2 71 dc 56 3a | ed 9c a9 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 89 ab ab 1d cc d7 b6 cb 29 1c 48 | e7 84 01 ce 34 15 c4 5f 00 00 00 1c 00 00 40 05 | 7f 71 39 3d 41 d0 36 ee b9 ed 2b b5 28 d2 9e d8 | 0a 4d 91 1e | libevent_free: release ptr-libevent@0x7fb35401a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a86b80 | #499 spent 0.363 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 9c 2c 36 f8 59 d4 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #499 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #499 | rejected packet: | c7 9c 2c 36 f8 59 d4 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #499: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25c80 | handling event EVENT_RETRANSMIT for parent state #433 | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #433 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #433 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49686.393524; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003211 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a86b80 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #433 | libevent_malloc: new ptr-libevent@0x7fb35401a4e0 size 128 "road-eastnet-nonat-181" #433: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #433) | 23 e1 68 16 6a df f6 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 84 65 c0 62 66 6e cb 40 26 80 c7 11 7a b1 77 | 8f 7b 14 21 bf 47 61 54 80 80 4f 40 4b 14 8f 6c | 7f 20 33 7a 32 bd 20 39 a9 e7 e4 8c 88 5e 71 0c | b4 34 07 ea 3b 74 7a 69 d0 40 c2 8a ce 14 e0 29 | f7 f8 fb 45 30 ce 02 50 b6 4b d6 fe ce bd d7 fd | d9 af 2b 59 d1 37 75 ed 60 7b 97 1e bb b5 21 2d | 82 af 47 6c fd b3 b6 b4 1a e4 0b 54 80 93 91 9a | 7c 67 57 2c 37 bc 4a ba 6c 68 8e 7c 69 ae 25 35 | f6 73 82 3e e0 ba 6e 40 b9 c2 c0 d3 bd 9e 54 14 | 66 2e 22 5d 66 78 db 66 26 82 fa c1 4b 7c 9e 34 | 57 34 cb 3c 56 da ee df b8 34 f8 14 c2 9b 3b a3 | d6 4c a8 fb 55 30 94 15 c4 87 b2 b9 65 70 e9 f6 | 5f 9b ae 28 67 59 78 af d0 1e d8 d4 2a 4a 91 32 | 25 06 fb ff be c0 6a 2f e3 60 0d e2 75 08 92 ca | 55 96 9f 26 37 e4 6c 28 e7 f1 08 78 9b ac 4e 5b | 3b 11 9e bf 95 59 23 96 7a 89 87 42 71 70 51 75 | 29 00 00 24 bc 75 9d d0 ff b6 ae 90 e3 29 fd fb | 27 30 03 9d 8d 6e b5 df cd e3 e0 48 35 b6 7e d4 | 5d 99 20 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 1d b4 53 81 6d 12 3c 62 05 25 08 | f2 c7 73 02 9c 59 76 4d 00 00 00 1c 00 00 40 05 | 9b bb 33 9d d0 7d d5 98 fe 91 d5 bc 36 50 81 f5 | 28 37 64 3d | libevent_free: release ptr-libevent@0x7fb344035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c80 | #433 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 e1 68 16 6a df f6 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #433 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #433 | rejected packet: | 23 e1 68 16 6a df f6 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #433: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c01da80 | handling event EVENT_RETRANSMIT for parent state #322 | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #322 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #322 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49686.396812; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006098 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #322 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 "road-eastnet-nonat-70" #322: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #322) | 74 03 a5 dd ea 05 2e d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 15 d9 ac 31 7b 6c 04 ac 7a ef e5 0d 89 93 07 | 20 e4 8e 39 86 a0 9c 1e 9f 76 b9 58 4d f2 a7 9f | a9 61 82 a9 75 3f e8 1a c2 92 fe 84 37 ac 33 ad | 65 45 df 2b e1 cb 2c 07 be 4f c4 59 89 1a 1e d4 | bc 00 c9 7a da 51 f8 0e 6d e5 9b 4d 2b 1e 90 8c | a7 76 dd 60 8a 02 12 aa 75 a5 70 c1 65 7c 3e 55 | 89 46 b2 4f 06 dd f5 63 86 b7 00 f0 73 2f 7c 5a | b7 d4 0f 38 d5 4f 7a 42 58 2c 1c 6e 8d df 4f 92 | 63 c6 3f de f4 10 95 80 0d 14 e0 40 1c 6b a7 25 | 78 25 a5 d6 97 e1 6b 90 22 06 bd 2b cc f5 6b ca | 10 6b ac a7 98 1a 94 fa 4c cf 33 fe dc 06 fd b0 | 5f 81 4e 82 91 b8 3e 8a c7 a6 68 81 06 ac 84 f0 | ea 68 69 9c ad 3a 07 bc c5 f3 31 91 30 05 f3 ef | dc 51 d5 f6 ee f9 4a 07 b7 9e 0f 65 ad 3f 41 a0 | d7 70 67 24 31 3b 11 1f 99 26 08 ab a5 8d 87 97 | f5 4d 04 da a2 fb f0 9d b6 5e ca 79 ac fb e6 b9 | 29 00 00 24 7c d4 e7 e5 83 a9 e9 e5 4c 1d 37 7f | 04 0f 2a 2b 54 28 64 c4 b2 05 be 1f 1d 68 a9 5e | 6e 76 88 d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 64 8d 0f b4 d2 3e c7 db eb 6e 9c | 80 67 1d 17 67 fa eb 16 00 00 00 1c 00 00 40 05 | 45 ce 15 93 8c ec f9 76 43 65 cd e9 a3 d1 ec 83 | 45 3c 35 9c | libevent_free: release ptr-libevent@0x7fb35c02ec80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c01da80 | #322 spent 0.0913 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 03 a5 dd ea 05 2e d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #322 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #322 | rejected packet: | 74 03 a5 dd ea 05 2e d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #322: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0413 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378018460 | handling event EVENT_RETRANSMIT for parent state #492 | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #492 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #492 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49686.407081; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002579 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c01da80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #492 | libevent_malloc: new ptr-libevent@0x7fb35c02ec80 size 128 "road-eastnet-nonat-240" #492: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #492) | d7 99 7d 69 73 b4 2a a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 07 d7 12 79 21 18 05 9a 65 7d 95 08 cf 17 4e | 65 ed 52 c0 2d 6f a2 d4 7e 6e 0c fe 68 2e 85 0e | c1 f3 a0 f1 34 f9 34 8a e9 6d c0 54 1e 27 54 a6 | 0a 27 50 d2 78 b6 25 f7 6a f9 6c d4 40 88 de 0e | c5 23 46 17 11 07 59 0b 07 7d f1 44 d8 68 37 f0 | 12 d0 4c 6e 87 95 44 91 7a 02 1a aa de e2 f1 34 | 10 60 5a 14 6b 10 17 21 f9 34 d9 11 2c 87 8c 26 | a1 73 6c 09 6c 7e 33 9d 0e 03 17 61 98 14 aa f1 | 55 ad ab 3a b7 4f 37 37 da 8f 18 e7 c8 d3 37 ef | 02 82 ee 24 ef c3 bd c3 8a 68 42 60 d6 70 2e 41 | 57 9c 7a 60 c3 c6 ac 4a 44 4b 7b 82 88 6e 37 3a | e8 a6 66 1b 7b 71 c3 58 de ce c4 1a 99 46 de bc | be 62 d4 44 43 62 c0 f6 26 99 83 35 30 7f b5 15 | ea a7 50 6e 0e e9 be 43 3b f3 33 1e 18 3f 0c b4 | 99 f0 db 6c 50 7f 42 cb 48 b5 b5 92 17 92 32 ed | bf e5 25 0e 41 bc 26 2f b8 93 47 2e 04 ee 7f e1 | 29 00 00 24 50 36 54 c1 a9 17 13 4c 62 1f 80 79 | be a9 3c 75 1a 54 91 d7 53 38 3a 75 de 57 2a 82 | 16 4a 83 7c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 22 3a 78 b0 c2 12 43 88 f6 04 b2 | db f8 ae cb 72 c7 59 0b 00 00 00 1c 00 00 40 05 | d7 ae 13 c8 9e aa 6e 0d cf 25 ff 91 a0 20 ef 42 | b6 21 2f 3a | libevent_free: release ptr-libevent@0x7fb3700407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378018460 | #492 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 99 7d 69 73 b4 2a a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #492 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #492 | rejected packet: | d7 99 7d 69 73 b4 2a a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #492: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0458 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a986c0 | handling event EVENT_RETRANSMIT for parent state #504 | start processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #504 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #504 keying attempt 2 of 0; retransmit 1 | retransmits: current time 49686.413358; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500772 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #504 | libevent_malloc: new ptr-libevent@0x7fb3700407f0 size 128 "road-eastnet-nonat-252" #504: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #504) | da 55 48 8d 90 bf 21 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ac 2a 4d 0b 8b cf db e8 71 42 c9 12 73 26 89 36 | f8 7e cd c8 1c 11 8c 7f 9e 09 ce 55 92 dd 78 d1 | ad 59 d2 ee 94 4b 61 50 a3 e8 9a 12 3c 5e 9b 79 | 67 a9 ab b1 17 c4 72 5d 57 f0 6b d6 9d c6 6d f9 | 38 2a f7 f8 e2 f3 15 e5 73 fa 8b 4d 1c fc cc ab | b7 f0 3b 90 c7 95 ba 20 f3 82 29 0e d5 86 2e 2f | d3 3d 1a 6e 6e 68 d3 8e 2c 1e 30 d3 3d 1a 4b 7f | 07 51 04 a3 cd e1 e4 f3 6b 81 ac 0e 5e 25 fc a6 | 2d 49 a3 1d 9d 7f 10 1c b8 aa 6d 0b 48 63 e7 ab | 47 28 bd cd 66 43 28 3d 25 f6 20 56 e0 bb 73 1a | f5 3a ee c2 95 1c 1f 57 8f 41 e9 d9 d4 e4 b4 be | f5 98 c0 78 1e 91 5d ba 02 2c 3a cf 04 e6 44 c6 | a4 f1 83 88 9a 45 b6 e7 89 2b 45 be 54 48 e8 52 | 9b 95 05 7a d4 dd af 6d 96 db 42 ed db 5d 0c bc | 83 61 0a c3 fd 33 2c bd cf 88 1b 95 c9 43 7a fa | 73 7b 7d 2e f9 6a 53 94 78 2b 4f 21 f2 f3 1d f2 | 29 00 00 24 61 bd 30 86 3d bb 50 44 5f 1b 26 2e | 52 63 1b fa b0 23 2c cb bf bc 70 41 cc 6b 00 dd | 9d aa 60 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd b5 bb a3 b0 15 ca 04 17 91 f9 55 | 5a 59 4c 3b fd 4e 4a c4 00 00 00 1c 00 00 40 05 | 47 4d 62 c8 1d 9c 5d 27 1b 5d ed df fb db c8 62 | de eb 87 79 | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a986c0 | #504 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 55 48 8d 90 bf 21 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #504 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #504 | rejected packet: | da 55 48 8d 90 bf 21 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #504: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.064 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23110 | handling event EVENT_RETRANSMIT for parent state #323 | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #323 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #323 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49686.450702; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004768 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a986c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #323 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 "road-eastnet-nonat-71" #323: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #323) | fa a0 9f 7c 98 fa b7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 46 00 d1 b1 2f ab 58 ff ae 3e e1 90 df ac 17 | ff f8 20 d8 dc c8 64 44 8b d4 4d 64 77 87 0d 12 | 4f 58 f8 0b b8 23 de 06 cb 6a 5a 17 a1 ce 9c 0e | b9 8f d4 30 b1 62 d8 df cd 4c 66 72 94 9e 12 c2 | 2d 76 67 bf af 09 84 71 96 13 7f 13 e3 92 f9 eb | 91 ae c7 77 a0 91 b1 8b 78 4e 95 7f ad 59 ce f7 | 52 f5 ff c7 0f 12 41 0b 6a 23 2d 80 44 0e 92 7c | 8a 4f 11 47 2b 77 90 68 d7 a1 52 f7 6b 79 db 3f | 94 cd 89 b0 a4 aa 7e 64 52 6b 85 6e 03 da 1f ae | b6 90 2d d1 46 19 b6 66 ea b6 57 b4 c6 78 39 27 | 7f 33 c8 a1 bd 41 e7 ba 08 ef c1 2b 83 3d 1a a5 | d6 cc ec 96 a2 e8 29 ec 44 9c 54 bc 8b 9c d6 9b | cf 36 d1 9f c7 0e 2f 28 11 0b 73 2c 8d e2 76 0d | 66 d9 63 04 c0 20 e3 d1 af b2 68 91 e0 90 8f 15 | 8a 1a f5 c8 e3 0d 24 88 9a 72 7c ad a0 47 9a cf | 87 bf fe bc 41 93 5c 36 c0 33 07 c5 9e ea fb dd | 29 00 00 24 40 e8 32 3c 23 00 84 94 61 80 b2 17 | 1c a2 13 13 eb 56 70 6b 74 c5 2e 36 50 96 1d 9e | 9b cf 84 1b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 d2 f5 ad 3c 92 ba 81 0f fc 09 27 | bf 74 8b d6 da e0 d6 64 00 00 00 1c 00 00 40 05 | e3 ba 50 e3 10 b5 c6 17 22 3f 31 51 2e fe 55 bf | 2d 04 cf 9f | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23110 | #323 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa a0 9f 7c 98 fa b7 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #323 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #323 | rejected packet: | fa a0 9f 7c 98 fa b7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #323: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0482 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c017ea0 | handling event EVENT_RETRANSMIT for parent state #475 | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #475 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #475 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49686.461017; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003429 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23110 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #475 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 "road-eastnet-nonat-223" #475: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #475) | f3 25 a8 40 a9 16 90 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 fc dc 84 62 e7 1f 29 92 4f 29 58 18 7b 3f c4 | 0b 92 35 41 3d 7d f5 49 ac e4 08 33 00 55 13 7e | 41 c8 1f ab 98 7a 30 c3 af c3 cf 6c 36 f8 c9 eb | 2e 6e a4 90 d5 52 a2 8a 0e 83 47 aa 06 91 44 23 | e7 ef 3d 2e 37 19 57 6f 45 ce 1d 86 c2 e7 46 ee | 18 2a 29 c4 ec 14 a5 7f 72 bc 78 02 59 a2 ca 1d | b2 b0 a4 5c 1b 84 48 bf bd 56 e0 d5 a2 ad cf a0 | ed 67 0d 74 38 b9 ba e0 64 fd 1a b6 82 cc d6 8a | 07 94 d5 49 9d 7f 16 e0 7c 51 29 17 d6 08 40 72 | fd c6 fa 75 b2 47 30 6b 15 b9 55 b9 02 dd d8 c4 | c6 0d e1 61 7d 87 80 e1 c1 30 9f 40 92 6e 85 e9 | ef ce 2d ce 71 79 64 d3 dd 63 ec db 24 83 38 23 | 73 f2 c1 e6 cf bd 52 ef 73 4d 97 4a 32 ac ae 30 | 6c 19 3c 8f 59 15 1c e0 c6 b3 5b a5 c9 da d5 d9 | 5d 32 c2 2c c5 8a 99 8b d0 ac 6f 05 fa 9a 82 9e | fa 91 c3 17 c1 28 24 70 4e 52 7c 04 70 68 57 b3 | 29 00 00 24 d6 06 09 cd b7 26 a0 ec bf 9a 6e 13 | e8 2b d8 44 aa f3 29 4e 9f 5a e2 23 56 33 79 1c | 13 aa 41 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 5a 5b 76 80 70 09 57 e9 61 f5 b2 | db 52 90 c9 67 ea 13 33 00 00 00 1c 00 00 40 05 | 6b c7 4e 4d 75 42 5c 91 03 17 f3 17 f4 9d bf bf | b8 92 f0 13 | libevent_free: release ptr-libevent@0x7fb37c029710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c017ea0 | #475 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 25 a8 40 a9 16 90 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #475 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #475 | rejected packet: | f3 25 a8 40 a9 16 90 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #475: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0574 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #434 | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #434 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #434 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49686.464334; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00389 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #434 | libevent_malloc: new ptr-libevent@0x7fb37c029710 size 128 "road-eastnet-nonat-182" #434: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #434) | 68 bd 27 f7 1a 5f c8 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b 8d dc 86 f4 61 cd 63 4f 12 1a 89 63 c0 18 0e | da c1 2f 67 00 48 49 fe 80 58 30 87 77 1f 60 f1 | 91 93 c4 dd 6a 33 66 a0 69 fa 20 95 f6 9a 11 c7 | fd d3 c3 ff f1 0e a6 05 ba 58 f9 c6 b4 81 c1 3f | 58 b5 fa d8 f3 85 c4 ec 19 40 f6 9f ac 5a 0e 85 | ab f8 54 8d ff fd 0f ef d3 5b 98 8a 75 38 18 ce | f2 7b e8 23 92 dc 6c 70 3f 25 92 19 2b 60 a6 82 | 30 c7 b8 84 44 df 82 d3 8a 4d fc 1d 9c e4 51 d6 | 72 15 3a 4a d5 64 0f 79 a2 e3 fa 27 32 de fa 9b | 0a b6 71 85 29 d5 43 a6 b2 3c 95 42 d3 be 1c 80 | e1 df 27 cf e0 47 6a aa 9d f0 da 55 04 28 85 87 | 1e 7a 6c 89 a7 1a 78 3d cf 4e 43 87 8f 82 da c7 | 06 01 34 b1 a1 6a 5d 22 18 fe 03 9e 0d 36 91 39 | 6c bb 36 1a 00 1b a4 da c4 26 ba 72 4d 2a 35 43 | a5 6f 44 e2 75 40 5e f0 90 a9 5a 70 fc 57 4c e2 | 21 84 c8 a9 9b df a7 2e 69 2b 50 04 e1 24 b1 85 | 29 00 00 24 24 e6 ca a8 b3 30 fc 67 22 ff 0b c1 | 23 a4 8f 2a ae b5 6d 78 43 33 67 66 1b 96 07 82 | 43 a1 52 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e1 30 9f db e9 ff d2 de 10 c0 b8 22 | 86 59 ab dc 44 02 05 1c 00 00 00 1c 00 00 40 05 | 2d 24 f4 0c 2e f5 a0 c9 e2 14 db 8f 00 ef 15 a2 | 0d 97 11 53 | libevent_free: release ptr-libevent@0x7fb3380407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | #434 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 bd 27 f7 1a 5f c8 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #434 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #434 | rejected packet: | 68 bd 27 f7 1a 5f c8 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #434: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0609 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12c40 | handling event EVENT_RETRANSMIT for parent state #500 | start processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #500 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #500 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49686.482644; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001378 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #500 | libevent_malloc: new ptr-libevent@0x7fb3380407f0 size 128 "road-eastnet-nonat-248" #500: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #500) | dc 38 e1 a3 3b e2 b1 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 4a f1 97 41 66 ce d4 ab 90 74 77 4f 00 cb 43 | 1f 3a 29 28 bd ab f1 45 3f 88 a4 79 39 fe 2c ee | 1b e9 2e 5c de da 76 bf a3 0c cc 93 b6 1b 8c 68 | 84 10 8f 55 6f 47 ec 76 41 18 0c b4 50 73 cf e8 | 55 11 98 5d d0 8c 2d e1 b9 47 bc d9 dd 4c 8a 72 | 7c cf 3b 3b b2 57 cf 3d e0 1d d4 39 94 72 a1 23 | 6b 6c 49 1f b9 94 b3 b7 a4 33 d9 35 1a 97 76 7e | 8f eb c4 34 d7 30 b6 ff 0b a0 77 62 d6 0a a9 b7 | 60 e4 b0 4d 0f 38 4b ae 9a ce 16 98 d0 34 95 01 | 44 fe 57 be 26 cf f9 d3 b8 79 e7 d6 d9 c0 2e 7d | 90 21 6f 7d c3 bc 04 f3 80 08 f6 e6 0b 6f 05 a0 | f8 da 5b cf d5 f7 d1 f1 f5 c0 29 8b c4 a2 cc 29 | 8c e2 9a 9c 8f bf ae c2 b0 3f ce e4 df fb 71 f5 | f7 13 31 70 b5 0f b2 9e ae 64 eb 2c 73 aa d9 5b | 7a b9 c4 3b 46 10 f6 92 a7 5e 0d a0 e7 06 8a 74 | 5e 40 71 07 4b d8 c5 08 71 52 bd 30 01 84 10 98 | 29 00 00 24 73 e7 fd d9 0c 07 09 ec 59 bd 7a b5 | 40 29 3e 5b f2 d3 e1 ea 7b 04 b1 b4 b1 5f 03 d2 | b4 24 ec 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 f6 20 af 00 f8 ef 66 b3 21 e2 19 | 0f ba fb 8a ed c9 14 86 00 00 00 1c 00 00 40 05 | 70 63 55 d1 ed 70 f9 1a 8c 9d 5a 9a f7 cc 31 61 | 9c 9b 74 c0 | libevent_free: release ptr-libevent@0x7fb380011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c40 | #500 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 38 e1 a3 3b e2 b1 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #500 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #500 | rejected packet: | dc 38 e1 a3 3b e2 b1 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #500: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0941 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370046090 | handling event EVENT_RETRANSMIT for parent state #493 | start processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #493 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #493 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49686.491032; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002654 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c40 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #493 | libevent_malloc: new ptr-libevent@0x7fb380011f30 size 128 "road-eastnet-nonat-241" #493: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #493) | ed 28 a4 bc 11 7c af 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 43 c9 b9 d1 39 88 cf b4 19 83 df 09 c8 d9 33 | 6a 66 ab 95 b0 dd 15 4d 5d 4a fa 5d 52 f2 94 c9 | 8c 6b 4e fd a3 be 7b 1e 26 3d da ae 4a c7 9d 27 | 63 37 11 7d f7 65 a5 40 e2 b8 e7 88 e2 a7 17 fe | 35 86 91 9a d8 ce fa 63 4d d8 5f 33 39 8b fd 0b | c7 66 ad d7 e3 69 0a d0 e8 2c 35 2b 87 c6 e8 d1 | 35 a2 6a bd 14 2b 17 e4 3b 63 91 15 e8 44 4a 0b | ee 35 18 44 31 9b e0 f3 11 2e f9 0a f8 94 2e e7 | 37 62 af 42 67 9b d9 c2 7a 1d 9a 74 9c 27 5f 4e | 6c 61 5b 8d 6f b6 26 7a 65 28 0b d8 63 b2 4d f2 | 4f 66 7e 68 e4 09 4f e1 36 c2 c4 fc b8 a8 0d bd | 8f 6c 26 6b 1b b4 27 de 4d 65 70 86 b8 d6 2d 91 | e7 12 ef a7 86 2f 17 c5 46 49 a0 b2 37 f9 08 9e | 05 44 0c 6d 93 fe 69 98 08 f9 28 75 1f 4f 91 2d | 39 9f 63 17 e0 d3 1a 4e 52 69 6b 52 15 77 3f 2f | 3e 88 cf 00 87 f9 bd f2 03 53 f2 34 f3 a4 6a 9a | 29 00 00 24 a6 a1 ba dd 86 99 b3 8f 47 4a 4d 8f | 4a 4e 2e 70 ee a1 39 80 4f 25 94 bc 3e 73 ee 31 | 55 0b 3a 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b ce a8 52 73 2a af 56 99 7a 11 14 | f3 b1 9c fe 91 8b 24 9a 00 00 00 1c 00 00 40 05 | 14 ee cd 8a 22 d5 80 d4 99 d7 ec c4 4c 96 10 11 | ff 51 59 09 | libevent_free: release ptr-libevent@0x7fb35402a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370046090 | #493 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 28 a4 bc 11 7c af 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #493 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #493 | rejected packet: | ed 28 a4 bc 11 7c af 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #493: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370018460 | handling event EVENT_RETRANSMIT for parent state #324 | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #324 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #324 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49686.518345; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00614 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370046090 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #324 | libevent_malloc: new ptr-libevent@0x7fb35402a950 size 128 "road-eastnet-nonat-72" #324: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #324) | c4 71 4c 47 7a 99 7f 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c dc ba bd 1d 04 54 b8 de 2e 7e 4a 73 d1 75 b4 | 30 69 01 66 67 06 e7 5e ab 90 82 b5 8d a8 6f 99 | a6 8e f4 9a 71 40 de b0 d0 8a d9 b4 ed e4 6f 96 | 72 62 19 62 54 5d 4c 3f 06 3d 1e 94 b0 72 25 98 | 59 31 b4 12 f8 20 4c c4 1b 57 a8 cc e5 a4 fd 8e | b7 00 85 d1 0e c7 4d 3b 7a 7d 11 6d 19 fd 6a 75 | 3a e2 10 64 69 82 7f f7 9f 48 c9 57 2f a9 70 57 | 4e 17 87 f1 7b f1 ed 42 6c 69 0f 53 01 4f 76 4d | 49 de 7e 34 19 26 2c 17 55 79 6b 2b e6 70 a9 41 | 28 a8 e5 5c 9c 0b 01 88 ec 60 31 32 12 e0 5e 2a | d0 1f 1c 62 7b 27 a5 6a b5 82 73 7a c7 4d 6d 07 | a2 fe cc 3c f6 be 38 d5 e6 bc c7 f9 e4 e8 c4 66 | 25 de 6a 66 de d9 be 67 52 10 16 32 1e 81 04 70 | 2e 04 43 17 b2 33 75 6a 97 52 34 c2 f0 d7 69 62 | a8 cb 03 e7 cd 81 0c 55 75 a8 24 c4 ed 92 5e ec | 1a d4 65 0c 31 44 9a 04 50 cf 8e 45 48 fa 6a 9c | 29 00 00 24 a2 70 44 54 09 89 66 44 f1 6d a2 85 | b3 a0 4f a8 16 2e 01 ca af 0e 31 e7 7c 41 b8 c9 | 46 c7 99 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 0b 59 de ec 8b 84 8b 41 7c 2d 20 | 10 87 a7 ee 10 a7 dc 2a 00 00 00 1c 00 00 40 05 | 44 04 bc 04 96 6f cb 2b 3d a9 52 fe 2d cc 35 38 | 9a e2 35 2c | libevent_free: release ptr-libevent@0x7fb3400094d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370018460 | #324 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 71 4c 47 7a 99 7f 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #324 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #324 | rejected packet: | c4 71 4c 47 7a 99 7f 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #324: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #435 | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #435 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #435 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49686.534637; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005958 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370018460 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #435 | libevent_malloc: new ptr-libevent@0x7fb3400094d0 size 128 "road-eastnet-nonat-183" #435: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #435) | 02 95 c8 9c 02 70 ef 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 be 1c 3f a4 66 94 b1 76 a3 9b 53 73 2f 7f 23 | 4a e8 16 a3 16 f5 f7 58 2e fa f9 cc e5 72 42 dd | 79 82 dc a3 32 45 63 e7 97 5f 0c 3f 10 0e f2 af | 36 1e 6e 10 67 9c 3e 6a f7 f3 72 ba 54 df 6c 10 | a0 1c 0f 6a ce 67 71 2a a3 c4 d3 9c 88 b9 f7 04 | 30 84 58 1f bb cd f1 cd f3 e2 04 50 7f cf d2 c2 | 26 c1 1c 97 d9 a2 05 dc 96 89 90 50 ae 56 a0 13 | ef 2a 24 f0 f6 4d a9 8e e9 e9 a2 eb 42 50 42 ab | 0a 3d 04 3e 57 0c 0a e1 00 9d 75 a3 60 15 b7 e8 | 84 24 4c a7 d1 ab 72 3e f4 8b ef 1a c8 cc 7d af | ee 55 f6 12 cd b9 d1 90 77 f0 61 3d 61 12 ee f8 | 94 b3 64 a2 07 62 d6 b1 81 57 84 c9 8b ff 25 ea | 74 4a 3e 9b d6 88 62 0a dc b0 05 5d 90 03 c9 cd | 54 3d 83 cb 36 ad ef 96 f9 28 73 d8 df b8 72 79 | d4 6d 08 a8 b3 a6 c9 bf ea 29 05 5f 61 ed 03 82 | b8 9d e9 c7 c9 a7 67 16 08 0f e7 ba 6a 6d 38 69 | 29 00 00 24 ae 8f 34 92 0a 08 8b 7b 30 37 54 ea | a0 43 df e6 ae f8 bc fe 70 d8 fd fe ce a5 f7 5d | fb 76 aa 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 34 e7 f7 2a 07 1c be c1 53 fb c8 | 09 7a b0 5a 0f 53 bf 3c 00 00 00 1c 00 00 40 05 | 75 09 e1 26 ec 40 37 83 67 2f 03 41 48 5a 4e 60 | ef 86 00 50 | libevent_free: release ptr-libevent@0x7fb3780300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #435 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 95 c8 9c 02 70 ef 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #435 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #435 | rejected packet: | 02 95 c8 9c 02 70 ef 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #435: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0506 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_RETRANSMIT for parent state #501 | start processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #501 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #501 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49686.570935; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002102 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #501 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 "road-eastnet-nonat-249" #501: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #501) | 7a bb eb ab 59 82 f5 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 e6 e7 b7 df 15 1a 88 da d9 de 99 20 d1 37 56 | a1 ac 1e 3f d7 4a 79 5c c8 d1 9e 85 c4 f1 dc d8 | f1 ca b4 9f 14 60 92 de ad 42 9b 69 57 eb d4 33 | 23 a5 0d 4e 25 37 79 9e 75 f6 18 19 e2 36 6a 82 | 3e c6 41 e8 fb 1d 27 30 85 3c c4 c4 37 ed 39 57 | 59 68 3d d5 92 7b 15 e0 1d da a4 bf 8a 13 2e 99 | fa b3 d7 34 a7 e9 ee 45 93 41 ea 47 57 78 a8 c7 | 28 3e 80 cf 3a fa c3 5c 40 7e 2d 6e a8 8f 1a 76 | 9f e3 ee 0a 5c 09 b9 35 7b e1 73 9e 9a 5b 7e 05 | af 57 ba 41 a4 20 67 9b 93 00 a4 77 65 8b 72 e8 | ca c2 a7 8c f8 bc 75 a9 2f 52 c5 be ea 41 46 90 | 6a 2e 17 cc 87 cc 0a 22 0b d8 b5 c8 dd ab 30 09 | 90 3a 1d 65 9d 2f 73 fc c6 06 30 d8 66 83 64 c8 | a7 e5 c1 23 61 62 8a 18 87 ad dc 7f 74 de 65 20 | fb ed bb 7b ca 02 66 e1 c0 5c b2 b3 41 14 ad 3d | 9e 02 fd e0 c6 5b ba ef b1 16 d3 d4 8f 92 d4 90 | 29 00 00 24 0f d0 3c c8 9f 70 8e 25 2a 4f 78 c0 | 1d 68 16 9a 4a bb 3c a4 19 fe 19 3a d7 7c 1c 89 | 23 2f 21 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 3b be 6c 39 30 3e f5 fc f3 31 c5 | 53 ef 34 5b ca c1 eb 03 00 00 00 1c 00 00 40 05 | 86 82 cd 41 4f 66 70 19 76 ed 27 dd 0a 04 2f 6d | e6 1d 3e b6 | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | #501 spent 0.177 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a bb eb ab 59 82 f5 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #501 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #501 | rejected packet: | 7a bb eb ab 59 82 f5 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #501: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0549 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa5fc0 | handling event EVENT_RETRANSMIT for parent state #325 | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #325 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #325 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49686.587295; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004888 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #325 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-73" #325: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #325) | cc 62 92 c7 07 e9 0f 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 78 1e 62 84 10 5f b3 3f 6a 1c 99 15 ef b2 82 | ab 2f bf af 7d 91 0a 7a 06 0b c3 b0 8f 52 23 e0 | 2a 6c c7 c4 de c8 66 7c 42 9d 81 5e 4d 92 4f 0b | 2b a2 91 3c a6 4c 27 12 5d 3b 8e 56 27 02 38 a0 | d6 c6 eb ec 94 e3 d3 7c 60 71 44 03 de ee 1c 20 | b0 a7 fc d5 f0 33 3d 58 40 9a 40 7c 4b ef 22 f2 | e4 98 7c df 9e 84 f0 00 c2 3a 23 ca 54 c0 d4 32 | 78 ec 09 e7 04 f1 06 b2 16 5d 5c 32 c7 62 b8 41 | 9e c8 62 f4 94 dc ed 85 b6 72 ee e7 73 a0 4e 8f | 20 26 e2 05 be 3a 4e 16 75 b9 60 31 64 9c 09 14 | ad be c7 c8 b5 48 83 aa 5c 33 7b 3c 0a 72 26 74 | 75 7b 8e 60 49 df aa 10 6d 2e c8 c2 08 b3 b5 75 | e0 b2 66 ad ea 56 f8 5f 65 d4 40 09 52 2c f1 dd | 08 91 8c 9a aa bf 76 e2 bf e4 1a 3b 53 96 c1 d8 | e5 63 67 aa b1 58 7e 5f 20 cf 8d 72 df da b4 0e | bf a9 5c cc d8 b0 81 7f 8f b4 f2 bf dd 09 8c 23 | 29 00 00 24 bd d5 db 94 ee 32 26 3b fc 5c d2 c6 | e1 33 da da 8c 36 b9 7d d8 b6 53 e3 83 8c 71 5a | ae 9b 26 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 04 08 e6 80 0c ed de 4c 99 bb 24 | eb 89 b5 9f d3 24 a6 8a 00 00 00 1c 00 00 40 05 | 55 23 78 6b d1 b2 f4 84 29 a3 9f e9 4d 04 41 1c | 82 df 78 f0 | libevent_free: release ptr-libevent@0x7fb35c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | #325 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 62 92 c7 07 e9 0f 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #325 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #325 | rejected packet: | cc 62 92 c7 07 e9 0f 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #325: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #436 | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #436 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #436 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49686.594663; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005859 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #436 | libevent_malloc: new ptr-libevent@0x7fb35c0300e0 size 128 "road-eastnet-nonat-184" #436: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #436) | cc d9 b7 db 44 05 84 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 3c 80 f9 ec ce 19 79 1b 2a 4e 88 36 86 a9 d8 | 85 e2 ee 1a ce 49 16 7b 84 5e 31 fc e1 84 f2 62 | 83 ed 4d eb 9f 6a c2 85 84 04 f4 d9 bd aa ee 02 | 08 1b 87 fa b5 ac ff f6 a9 3e 63 6d 16 01 77 f5 | 2b 3e 1b 6e c7 66 ff fb 38 8c 19 c9 7b b1 fe 10 | bc 5c c8 26 33 9f ff 45 76 a0 23 85 19 e3 31 de | 28 8c dd 45 56 45 3b fb b4 0d 18 e3 cd 81 8e 00 | 0b f6 17 10 a2 e0 44 20 37 74 e1 31 a8 10 b7 14 | cf 9a 72 a5 9f 1a 4b 15 1a b2 c9 bb 99 44 1e 31 | 11 05 e2 cf 98 40 c9 ef aa 8c fe 19 58 f6 d5 62 | cf d6 d5 ea 4e 24 4c 33 16 1d 0c db 05 43 98 5e | d3 1a 94 c0 4b ed 3c 02 54 4b fc ca 99 42 ac 4b | fc 8a 3c 6f 70 38 23 05 eb da 77 20 a0 4e 73 f3 | af d2 c3 64 0d 77 b8 54 17 69 4d 1e a8 53 83 4b | 8b 72 92 0a 4d 90 87 b2 56 ec 43 2c 41 d7 64 66 | 71 79 54 ef 65 56 ba 6d 1d e6 d1 dc ad 99 41 fe | 29 00 00 24 a3 ee 0b 44 35 bf 27 26 10 74 6f 1a | d2 86 21 80 e6 fa 2e 6d 1e 83 9b 58 c8 96 87 8e | e4 1b 77 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 51 98 88 78 46 d0 e6 54 3d 62 ae | 5f a3 54 6d d3 39 61 c5 00 00 00 1c 00 00 40 05 | f1 9f 10 2a 1c da 5a 4c b5 8c 1e 6e 78 d5 be 31 | 9e a0 0c c1 | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #436 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc d9 b7 db 44 05 84 19 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #436 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #436 | rejected packet: | cc d9 b7 db 44 05 84 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #436: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.066 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344012bf0 | handling event EVENT_RETRANSMIT for parent state #476 | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #476 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #476 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49686.625027; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002809 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #476 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 "road-eastnet-nonat-224" #476: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #476) | 49 8c 7a 08 2e cc 2c 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 8e 65 66 a1 7b b1 8a 9d 19 04 71 0a 79 27 ce | 6b 54 47 32 ba 6e a8 65 c3 0d 42 b2 0f 96 a2 a0 | 61 e2 94 05 83 68 df 22 7a 41 44 d2 4f e1 67 a1 | 60 b4 59 da 81 10 89 57 9a 5f 7b e1 cb f8 3b 1c | 6b e5 1e 2a 7e 02 80 cb 9a b1 16 8c f4 74 52 c7 | 1b 8b b0 44 c6 c4 32 f3 a4 5d f0 73 3e b1 fa a1 | b2 71 e4 e2 5a 6e 52 66 e3 b8 09 2b 71 a1 10 d1 | 10 3c 31 b6 a5 93 a0 0f f1 c2 e3 a3 6b 1d 4a 8c | d0 ba 9f ac 0a e4 67 88 a7 bb ab 52 59 75 2a f3 | 7e 3d 81 45 67 16 9e 61 0a ee 09 44 27 d0 34 eb | a1 e6 bf 3e 15 23 17 f4 a9 f6 b0 c4 cb fa e4 c1 | c5 79 db 37 a8 57 54 eb d1 68 1c ef 18 56 41 83 | e2 52 4d 7d eb e3 4a db 5d d0 82 39 0c 54 56 aa | 04 9a 1e d5 4b e1 50 f6 49 eb 07 2f b8 68 4b 6e | ca 4e 01 63 ab c2 da 21 fb e2 14 e9 0d 0e ff 26 | 78 8b ff 8b 3a 63 7f c4 a4 eb a1 d4 bb 4b 60 67 | 29 00 00 24 04 bd 81 be 7c f6 28 8b 7d 46 a5 cd | 03 dc d6 e4 08 bf 60 ad d1 ef ac 3f a3 21 88 37 | 52 bb 5d 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 ab 9f 05 ae 62 3b 7f e7 ce 4f 13 | 2e 4b 82 3c e1 44 b7 89 00 00 00 1c 00 00 40 05 | f1 c5 d9 81 d6 d6 94 d2 dd 0e e2 5d 61 59 c7 43 | 61 40 b6 b1 | libevent_free: release ptr-libevent@0x7fb34401a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344012bf0 | #476 spent 0.161 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 8c 7a 08 2e cc 2c 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #476 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #476 | rejected packet: | 49 8c 7a 08 2e cc 2c 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #476: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0656 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac69c0 | handling event EVENT_RETRANSMIT for parent state #326 | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #326 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #326 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49686.655398; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005595 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344012bf0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #326 | libevent_malloc: new ptr-libevent@0x7fb34401a4e0 size 128 "road-eastnet-nonat-74" #326: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #326) | 42 f4 17 bf 0b bc 36 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 f1 42 33 74 d0 fe 82 a0 d4 22 fd 7e 34 64 49 | 4d f5 d3 8f 3e 37 b5 af 12 9f 05 ef b3 72 9a 99 | 78 df 2d 2f c1 8c de 77 86 8e 9d 6b 67 d9 af af | ad cd b2 74 66 27 67 e3 45 6f da e1 b8 1d 10 12 | aa 54 5a 52 9a fc e0 30 8f 8b 79 31 12 59 11 92 | 5a a1 07 c2 c4 b1 d0 f4 f9 0f 04 f7 fe f9 b1 b9 | c8 5b 99 45 a3 87 06 f5 cc 08 82 18 bb f1 79 c6 | 9f 6d fc 2f c8 a5 4a bb b2 a8 2f 54 59 10 ab c2 | 83 cd 07 a2 e9 49 2a 19 10 9b b3 c3 b9 59 af 8a | 82 ad ef ed 34 d0 18 f1 8e 6d d9 f9 1b 1e 64 1d | ec 20 a9 3c a9 39 c4 6f 5c 5b 8b c5 2f aa 09 df | 17 b3 bf d7 16 36 cf cd 3e 0b 96 b5 5a 10 91 84 | f4 f3 63 75 93 27 25 04 41 5d c2 9e 4a 8a 6e e8 | b0 1c 23 7f 1d 44 0d 90 e6 7c 9c aa 0e b4 1e 03 | 9a ca 50 45 b0 6c ee 84 fe cf 35 d4 8b f6 71 45 | c0 43 28 23 ec 38 bc a8 e6 b5 85 28 d9 a1 fe 85 | 29 00 00 24 f7 60 f4 89 79 23 81 74 40 fe e0 94 | 99 4a 8a 5f b0 ba 18 0a 74 b7 e9 e4 4c 15 74 6f | 38 fd 32 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 0a 23 00 01 aa ce 92 9c 9e 81 0a | b1 b8 dc a9 c7 b7 f1 4a 00 00 00 1c 00 00 40 05 | 06 aa ce 4d 77 27 34 16 db f8 8e b3 38 da ae 93 | 3f 43 ba fe | libevent_free: release ptr-libevent@0x7fb36c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac69c0 | #326 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 f4 17 bf 0b bc 36 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #326 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #326 | rejected packet: | 42 f4 17 bf 0b bc 36 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #326: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa34c0 | handling event EVENT_RETRANSMIT for parent state #494 | start processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #494 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #494 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49686.66074; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac69c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #494 | libevent_malloc: new ptr-libevent@0x7fb36c035930 size 128 "road-eastnet-nonat-242" #494: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #494) | 13 d2 ce 8c c5 a0 08 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 2c 3b c1 c9 27 85 62 17 d7 83 f4 4b 2e 0e 16 | e2 03 04 ad 7a 8d 40 02 d4 34 9d 1b d3 c9 18 6b | 41 26 bf 10 de e3 e0 e1 0e ef 27 5f e0 e8 78 57 | b0 c9 a6 38 de ce 8a 7c 37 31 11 56 7d 62 bb 8e | c9 f9 f5 6c 82 0f ba cd 3f af 70 4e 17 32 64 c9 | d5 e6 2c 41 27 6e 25 48 eb 43 50 ea a4 34 26 c4 | 56 d9 54 ab 57 40 f6 c1 9c 20 1b 06 22 84 03 8b | e5 53 55 fa 3d 80 8b 5b c2 25 82 15 35 94 6c d0 | bb ec ab 60 22 1d 87 23 e3 9e ac fc 16 ce 42 3f | ba 0d 8d 04 b9 e7 b2 de 46 3e 4b b3 83 4d ca 89 | e2 a0 d6 38 51 9a 05 e2 dc 57 8c 52 b9 1a fa 47 | 7e 1e 80 51 ac cf 77 c1 e4 be 78 0f 3d a1 ce 56 | 23 61 ff 3d 67 82 ef a5 20 d8 a8 62 8a 37 d6 a0 | 87 df 7e 30 b4 77 c6 c9 19 64 23 a5 4f 30 28 ac | 43 56 89 18 4a 88 a5 5e d6 97 45 97 2d bb 34 28 | 33 0f 79 c6 b2 6c 6b 62 1d d3 42 70 92 9f 6e 55 | 29 00 00 24 86 c8 ae 9a dc 82 47 ae 63 a3 d2 9c | fc 56 5a fd b5 a1 94 8d 79 cd 12 87 5b f8 39 1c | 72 7a 80 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 4f 14 68 3f 9f 2d 22 c7 c5 d4 82 | fb 7c 5e ae ba 6a 24 66 00 00 00 1c 00 00 40 05 | bc 9f 5c d1 bc 22 73 c4 89 e4 5f 13 b2 ba 1c 19 | 38 03 1c b3 | libevent_free: release ptr-libevent@0x7fb380022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa34c0 | #494 spent 0.149 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b24680 | handling event EVENT_RETRANSMIT for parent state #437 | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #437 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #437 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49686.660929; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003203 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa34c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #437 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 "road-eastnet-nonat-185" #437: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #437) | 31 51 d4 f7 c8 fe c5 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d 4d c3 c5 4f ca 6c d8 d4 84 06 d4 ea 89 80 6d | 99 d1 7f e1 cb 80 24 55 fd df 90 fb 02 92 ff c9 | f0 47 14 8d 77 1a bb 9c 7c dd 17 b9 16 19 6b 74 | ec 88 72 db 3e 1a c4 54 69 dd d8 16 b9 56 68 f6 | 6a 0a 44 9f 3f b5 a3 4b 08 8a 18 15 d1 69 95 71 | d9 52 3a e9 65 ee 70 4d ea 9c f5 16 84 a6 99 9c | ab ff 36 83 9d b6 9f c3 53 f1 00 51 ea c6 f5 a2 | 5c ce 33 c2 cf de 1d c7 31 1f d6 91 bf f2 7f 9f | fc 6e d8 c8 43 fd a2 ec ed d4 2e e3 1a 35 b1 d0 | de 28 47 6a 6b a3 42 0c 4a 1a 4e 13 17 87 94 71 | f7 93 75 92 ea b9 03 fc c2 41 93 f1 c9 f7 b4 4d | 3c f1 35 28 f5 5e 37 14 cf 3e ce 38 da e2 53 26 | df e6 e9 23 b5 8c b6 45 18 8f e2 54 89 f9 96 79 | aa 6a 79 aa cf b4 ec 3d e4 21 6c a5 14 2c 68 b2 | 1b 56 0e 23 e2 48 c6 68 81 fb b5 23 23 53 e6 4a | 1c 61 e2 7a 67 e5 f5 84 ba 68 ce a3 e9 a9 c8 e3 | 29 00 00 24 02 5e bf 69 6a 09 af cb c5 28 ba 2f | be c6 fe 19 42 f8 ee f5 0b 73 06 5b 41 10 d0 e5 | 69 e3 64 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 6b 27 8e 3d c1 6d e7 fb 64 0d 99 | 79 35 e1 df 31 89 9b 32 00 00 00 1c 00 00 40 05 | dc 48 f6 93 16 4d 8a fc 81 8e 30 65 58 3a 8c 28 | 32 6e e0 6b | libevent_free: release ptr-libevent@0x7fb388032bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24680 | #437 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 13 d2 ce 8c c5 a0 08 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #494 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #494 | rejected packet: | 13 d2 ce 8c c5 a0 08 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #494: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0682 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 31 51 d4 f7 c8 fe c5 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #437 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #437 | rejected packet: | 31 51 d4 f7 c8 fe c5 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #437: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0574 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358012630 | handling event EVENT_RETRANSMIT for parent state #502 | start processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #502 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #502 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49686.67029; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002273 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24680 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #502 | libevent_malloc: new ptr-libevent@0x7fb388032bf0 size 128 "road-eastnet-nonat-250" #502: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #502) | 49 84 03 55 33 41 14 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 b6 56 c0 55 c6 5a b3 d0 b1 3a cd 2c 2d f1 98 | 2b 05 72 d6 2a eb f1 a5 ce 1a 6e fe 9b 76 4a e6 | c8 9d 68 cf 67 24 b2 a5 b6 c1 96 48 84 37 b3 8b | f1 39 9c c4 10 9d db 1a 8e 7f b3 36 f3 a8 eb bd | 2b 28 0c da ff 40 e9 6b c2 33 b1 41 cc 82 3c 97 | 2f 0e a7 48 25 26 c1 d7 53 0e 21 ee 94 d4 a0 38 | 49 e2 15 f5 13 68 e2 8a cb ba 80 6b ce a6 00 d2 | 69 7e 9f 04 65 f3 ae 81 71 49 2a 5f 8f ee 09 49 | e3 ff 1b cd 41 64 ae 29 01 91 5e 32 c3 26 78 8f | ea 20 2b 0f 18 2d 0a 1f 22 af 98 ef 92 ff 6a 84 | 62 82 19 1c 56 bf 8b 8e 12 15 12 c1 19 da 4c cd | 49 b3 95 88 b6 66 33 d3 36 cf f2 bd 45 7d 72 a1 | 21 21 16 69 39 89 66 de 9b 3d 56 7f ea f5 ce 47 | 7a 2e 75 2e cf 9b 6b 32 55 e0 ae 5b c0 56 2e 7e | b8 fa 3a ca aa 83 6d 0a b9 cf d2 e5 75 34 ef 7c | fd ec 25 52 b8 3d 7b b9 f7 15 a6 0a 76 51 86 5e | 29 00 00 24 9b c1 28 9f 3d 89 a9 b6 3e c7 19 65 | 88 8e 41 03 11 21 a9 0f 26 57 6b e7 b4 25 21 32 | 2d ba 55 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f d1 0c 18 0e bf a2 52 1e 5c d3 e7 | df 48 7e 58 7f 45 57 fd 00 00 00 1c 00 00 40 05 | c9 7e 47 3a 28 a9 19 bc aa dc fd 65 a2 d8 10 d7 | 15 14 41 45 | libevent_free: release ptr-libevent@0x7fb358039e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358012630 | #502 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 84 03 55 33 41 14 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #502 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #502 | rejected packet: | 49 84 03 55 33 41 14 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #502: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a70b10 | handling event EVENT_RETRANSMIT for parent state #438 | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #438 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #438 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49686.745592; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005199 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358012630 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #438 | libevent_malloc: new ptr-libevent@0x7fb358039e30 size 128 "road-eastnet-nonat-186" #438: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #438) | 41 3e 80 fb 50 ac d5 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 f5 0a 72 18 b4 76 75 f6 01 ed 57 e5 f7 fc 77 | 49 c0 b9 2a a0 da 30 6d 64 aa a5 e7 d9 21 f7 0d | 91 be 59 58 e0 73 bb 49 e3 e7 3d e2 78 8a 04 ac | e2 97 a4 99 a2 30 e0 4b a8 00 c0 ee 42 04 60 c2 | 77 26 36 9f ca 4c 02 7c fe 9f ae b6 ae 04 ad 9a | 8f d0 27 5f 92 70 2c be 09 55 2c 26 bd b6 4c 20 | bf 73 30 d0 44 67 97 1f 1b 2e b0 03 d6 27 ac d2 | 9a 9e e4 f7 c7 3b 09 97 22 3c 54 79 43 94 36 23 | 17 e9 e5 03 2b e9 58 e3 73 9f 26 68 9a d9 44 87 | db f9 8f 3e f3 46 76 36 18 c6 80 3a ce aa cb fb | 5f dd ff d6 eb 23 75 c4 e2 35 1f 1d 81 9e 2a 45 | d7 f8 e7 91 af a5 b6 a5 46 57 1a 8c 96 c0 29 4e | 8e dc e8 e6 2d 92 82 6a 85 02 3a ad 02 27 a8 84 | 8c be 58 97 e6 a0 56 65 e3 b8 11 05 1f 19 4d bc | 68 44 f8 dd 63 ea 12 b6 6d 02 31 e2 3c 83 0c 90 | bb ff 2c 31 86 51 81 cf b9 63 dd 72 3b ea de db | 29 00 00 24 65 91 ed 0a d4 1d 29 43 43 2f 3a 60 | 71 14 cd 7a ee 7f 0c dc 85 e8 36 48 85 1d 6f 9b | 44 a1 8a 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 a7 76 d6 c0 45 d0 97 b1 a7 8c de | d2 b0 18 be bd b1 c7 45 00 00 00 1c 00 00 40 05 | 93 a1 f0 74 30 f5 50 67 ed 62 ea 87 43 47 97 7c | d7 55 2f e9 | libevent_free: release ptr-libevent@0x7fb34c034410 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b10 | #438 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 3e 80 fb 50 ac d5 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #438 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #438 | rejected packet: | 41 3e 80 fb 50 ac d5 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #438: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380015160 | handling event EVENT_RETRANSMIT for parent state #327 | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #327 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #327 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49686.776879; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005967 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #327 | libevent_malloc: new ptr-libevent@0x7fb34c034410 size 128 "road-eastnet-nonat-75" #327: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #327) | cd 66 0f 9c 46 d2 2e 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c e2 6e 06 8e ba 7b 55 21 d6 ce 48 6f 3c 92 70 | 71 57 bb 2e 59 88 d0 8e 2a d9 1e 8b 54 64 af 4b | 40 4b af e2 a4 54 08 ce 78 99 d3 6e a5 bc 7d 40 | 54 45 d2 55 e5 04 88 a7 28 8f 77 11 a3 33 32 44 | c5 c1 f3 8c 73 cd 33 50 64 6e 8a 4a 03 1a e8 56 | 33 98 cb 05 7e 52 cf 35 2c 3c 0a 01 ff ea e2 ad | d8 80 22 71 7e 19 d2 b8 ce 67 79 24 c4 a0 f8 77 | 85 18 5e ad 8e 04 46 41 75 9b 16 af 02 fc dc 64 | 32 2e 9e 96 8f b4 82 0b 80 7e 79 12 22 b3 48 72 | b8 08 60 6b fb b5 54 a6 fa 64 f2 f2 1c f2 68 fd | a8 f7 9c d6 a5 ea 11 63 c4 ae d6 34 f7 8d 1a 64 | d2 72 49 10 16 1e e2 1a 26 c5 f0 ec 34 31 4a 5b | 0b 2e 91 90 5e 8e 26 12 f7 2c b6 7b b5 af 3d cb | 78 d2 30 c7 9f 03 58 c5 3d 03 c3 8e 6e cf 73 42 | 63 93 37 70 63 fa 64 09 ea e3 9b 55 c3 1a f4 3d | f3 be ab 22 fa 6d f3 45 4a 46 ad d5 84 8a f0 a1 | 29 00 00 24 90 b8 80 a5 9c 42 2b 50 2e f5 43 e6 | dc 43 6d 4e b8 ec af ce 7f 78 f5 24 c5 c3 2d 65 | bb f0 87 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc f4 a0 b4 bc 1c 55 2f e9 f9 68 07 | 2a e9 06 2c 8b 87 6b db 00 00 00 1c 00 00 40 05 | f6 e0 64 05 d4 ed 34 7f 04 0a 65 5a 6b 64 eb 2c | 7a ff a7 d3 | libevent_free: release ptr-libevent@0x7fb3800269d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380015160 | #327 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cd 66 0f 9c 46 d2 2e 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #327 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #327 | rejected packet: | cd 66 0f 9c 46 d2 2e 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #327: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0756 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a73690 | handling event EVENT_RETRANSMIT for parent state #477 | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #477 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #477 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49686.780225; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003809 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380015160 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #477 | libevent_malloc: new ptr-libevent@0x7fb3800269d0 size 128 "road-eastnet-nonat-225" #477: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #477) | 3f 73 6c 52 e2 16 12 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 68 39 c4 34 ea c1 cb 39 a9 f7 a9 af 21 c4 2f | 59 10 95 11 49 04 1e 26 c9 8f 50 f5 a4 65 8f b4 | 05 5b e9 56 60 ee a1 83 15 a3 b3 99 a1 69 bb 30 | cc 2b 98 3b 1e 30 46 76 ff 8d 39 41 4c 02 aa c6 | 7d 2f 3c 38 bb 54 54 f3 fb 6c ca 8e 5a 70 15 52 | 0e f8 6d 99 7c 6a 3b f5 58 74 0d 21 2e 4e 88 07 | 53 e0 50 d2 f7 38 33 9c 1e ad d9 ed 1d 96 b7 80 | 22 e0 8f bd a1 c0 a3 2c 94 20 d5 25 06 a2 7f 34 | 69 08 93 f9 8f 4f 23 ac b8 84 4e a5 b6 4c a2 fd | 75 2b 4c 8f 39 aa c3 bd 56 04 f8 29 c7 f1 40 cc | 9b 1a e4 8b 46 36 dc 67 52 7b 4f 7f 89 4e ad be | 6b 62 8d 22 67 f2 df e5 dd fb ec d6 50 89 50 9f | ee 43 32 27 75 9c 8a 33 f8 2e e0 8a 42 cb be 39 | aa d8 09 f8 75 cc 7e 70 d1 1d e9 02 66 48 e7 a9 | 85 21 80 86 49 7c d0 81 50 d6 7a 61 62 60 a5 9e | 15 19 da e7 5d f6 40 da d1 f3 3f 04 ae f2 b4 4a | 29 00 00 24 ff dc d7 b1 fd dc f2 f7 49 64 0a 31 | e9 e7 85 40 8d 4a be e6 65 0c 38 4a f9 ed 0f 7d | 4d 19 c2 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 0f c5 61 64 4d d6 f7 e8 8d a8 de | cf 04 b2 c9 0c b8 8a b5 00 00 00 1c 00 00 40 05 | 72 d7 c9 34 b9 dc 3d 33 a4 7e ff 3a 57 4e 49 6e | fe 3e 47 b9 | libevent_free: release ptr-libevent@0x7fb34403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a73690 | #477 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #503 | start processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #503 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #503 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49686.780406; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00123 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a73690 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #503 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 "road-eastnet-nonat-251" #503: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #503) | de 1d 8d 29 e2 13 e9 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 bc c5 bc ee 45 af a6 73 6a 90 e4 26 1b 45 74 | 00 ed f2 a3 ec 74 88 4b c9 51 b5 6a 38 9f 0a f7 | 89 96 66 a1 cb 3b 36 71 3c 50 00 7f a8 a1 27 84 | 14 72 85 f0 e9 87 92 95 57 d6 bb a3 9e eb a3 89 | 3b d6 9d 72 8e 22 b1 43 7b 48 2b 91 a9 6c a2 71 | 4e b7 05 32 94 32 e3 1e 78 6c 29 24 39 3f 29 25 | a5 fc 7d 8a 16 8c 7f 3c 9e 88 a1 a2 0f e7 3d e7 | a6 2a 71 17 3f ba 2d 1e 73 4a af 59 81 2a 33 e7 | 7c 6b a5 a6 c7 0d 60 09 fe 4a 3a c4 ae f0 db 28 | 63 c7 99 7d c2 1a 2a f5 ca 34 59 14 08 64 3e 0e | 9e 8a 9a 95 bb 9d 48 ef fa 38 ec e3 2c 15 34 9c | e9 d6 59 e6 ff 43 a4 b1 2b ff 91 b3 04 3b c1 be | 1e 15 0a dc 58 8d 95 f6 06 1e 22 79 23 6e 88 9c | fb 5f 8d 89 36 69 ab a3 c4 17 6b e8 27 27 43 a0 | 64 a3 07 0b 2b f0 22 81 09 20 24 c8 81 c7 b3 70 | 64 46 cf dc 25 f9 42 3b 6e b0 ff 34 aa 9a 20 98 | 29 00 00 24 e0 7e ea 52 c4 af 5e ed 64 d4 0d e7 | b4 32 8f da 7f e4 cd 7f 6e 0d 4f bd 11 1c 8f fe | 10 1a 14 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 eb 39 3d 04 da 34 34 c4 55 20 7b | 97 62 11 e4 f5 1f 2c 3d 00 00 00 1c 00 00 40 05 | 56 4f 2a b1 95 be 94 04 9d 7b d6 c2 f3 45 b1 7e | d7 05 c2 82 | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #503 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f 73 6c 52 e2 16 12 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #477 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #477 | rejected packet: | 3f 73 6c 52 e2 16 12 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #477: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 1d 8d 29 e2 13 e9 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #503 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #503 | rejected packet: | de 1d 8d 29 e2 13 e9 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #503: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #495 | start processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #495 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #495 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49686.795763; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002227 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #495 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 "road-eastnet-nonat-243" #495: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #495) | 51 22 fa ce 4d 7c ce 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c 9b dc 70 14 a2 8d 2e 37 c4 2e 9c 10 fc 27 0a | 94 78 5e 85 80 ae e5 be af df cd 9d ab 0a d3 d5 | 9a 0e 71 ff 6f 4d f8 da ab bd 5a 72 c3 2a 71 74 | 55 f1 2d 29 95 62 4d 7d b1 32 5b 12 fd 0a 2d bb | 81 aa ca e6 2a a9 0f 8b 0c cf 1b d2 de 30 5f 1f | e8 83 26 da 07 fd 31 9b 9b d4 1b db 2d 4b e3 99 | 86 7d a5 a0 d4 7d 59 09 c9 73 32 3d 53 85 e9 6f | 12 64 cd cb bc 89 f7 39 4d 28 2c 75 1c 49 0b 3b | c2 22 31 40 60 7d 62 ec d8 da 82 4a bd 1e c5 38 | c3 d8 6d e6 cb 49 78 ba 18 b4 83 3e 7d f6 6d 50 | 16 4d a6 04 f2 a5 8b c2 44 ae 9c 1a 54 68 4c 7d | 43 87 34 87 42 6c 4d fd b4 43 f6 3a 97 2e d2 87 | c4 99 e8 56 55 a1 ca 43 16 5d 55 9b 16 ed ee c1 | b9 bb 2b d6 cf 5a 0d 72 75 6d 1a 0f ae 6e 85 ec | 3a e8 4f c3 0e 27 5b 09 2a e5 e1 24 f5 af 32 13 | e5 eb fd 29 dd 27 c3 a5 08 cc 6e 72 80 4d 82 6f | 29 00 00 24 1b f3 52 dd f6 a5 80 95 b8 2f 4b 8b | f9 eb 65 1b 6e dd cd 94 b7 dd 16 f5 58 7c d7 e5 | e4 3a 80 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 3b 51 4a 4c d3 e5 68 1a 7e fa ec | e7 02 de b1 56 34 9d 92 00 00 00 1c 00 00 40 05 | ef ad 01 a7 be a3 55 49 1c 13 e6 d1 01 bd b7 0b | b8 36 16 d5 | libevent_free: release ptr-libevent@0x7fb34c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | #495 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 22 fa ce 4d 7c ce 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #495 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #495 | rejected packet: | 51 22 fa ce 4d 7c ce 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #495: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0483 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c018210 | handling event EVENT_RETRANSMIT for parent state #439 | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #439 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #439 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49686.816066; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005184 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #439 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 "road-eastnet-nonat-187" #439: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #439) | 47 50 75 67 1d 00 52 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 10 e6 27 54 79 a5 06 ab 7b 5d 27 c9 72 11 8a | be 8d 9d bf 52 e0 ac e0 58 f4 00 83 0a 18 2a d4 | 41 71 ec e9 2e f0 05 ec e8 a2 ec d2 28 ce f8 d4 | e5 81 d8 3c 87 bc 89 6a 8b 0a 1a e2 d3 eb 38 44 | e6 af 0a 47 aa 17 06 2d e7 33 df 52 16 8d b3 fb | d9 67 8e 07 e3 c9 9e 52 cf 8d 56 fb 7c c2 93 d9 | 9d 49 6e f0 2c fb ae b5 5c 7d 08 de 63 dc 9b 39 | 2d fb 3d b8 63 14 a9 ce d9 19 af ff bb a7 b1 81 | 41 c7 41 67 e7 53 2b fa 68 10 a5 13 3f f8 0f e7 | 33 85 43 eb a8 54 d5 5b fd f4 a1 1e d5 4f 32 99 | 86 f6 ec 22 05 a8 98 ec cb 6f de 01 77 3a 63 2b | 85 0f 08 c2 e9 6d 60 39 18 10 c9 3c 04 a6 69 c0 | 90 8a 6f 1c 7a 2e 85 ad 4f 29 5f 48 49 12 08 e4 | 72 3f d7 cc 42 6d 91 5a f7 f3 7b 44 dc 38 f7 05 | b2 bf 70 89 ab 24 52 cd cd c1 b3 61 99 9d a9 28 | e2 c4 12 1d de cd 37 64 c2 e0 70 28 45 34 de 67 | 29 00 00 24 d9 2f 24 9b 75 f5 ca 1e 2e 7d f4 06 | 41 a2 89 f3 ae c7 ae 61 65 4e 5f 7f 65 dd c2 12 | ae ae 3a 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 fd b4 2f 23 17 b8 9b d8 0c 2a 45 | b9 34 13 eb df 7c 42 33 00 00 00 1c 00 00 40 05 | f1 b3 a4 02 7a 60 50 36 46 44 d9 88 f9 29 1a 5f | aa 01 32 cb | libevent_free: release ptr-libevent@0x7fb36c039e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c018210 | #439 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 50 75 67 1d 00 52 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #439 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #439 | rejected packet: | 47 50 75 67 1d 00 52 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #439: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a32290 | handling event EVENT_RETRANSMIT for parent state #328 | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #328 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #328 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49686.84336; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005337 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c018210 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #328 | libevent_malloc: new ptr-libevent@0x7fb36c039e30 size 128 "road-eastnet-nonat-76" #328: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #328) | 3c ba 5b c8 fc 4e e4 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 98 1b 56 d7 72 9f 0b ef 82 c1 96 52 5c 5c 9b | e9 aa b3 20 9c 71 f6 1f 7d 62 5f 32 20 71 40 58 | 1c 09 5f be 66 e2 fb 32 6f 32 7b d3 d9 05 2e a9 | ee af 44 08 4c 92 7f 63 3f 26 57 99 85 eb 91 d7 | b7 5a 96 3e 98 ed 26 ea 09 8f 0f 63 53 5d 1c b3 | c9 fb a7 17 72 50 1c 89 8a 1b ec e3 c6 13 99 f4 | 47 85 27 9f 89 00 ee af f6 42 8e 89 20 65 b0 94 | dc 96 45 50 6a fc 55 91 2d 20 a1 71 bd 13 2b 3d | c9 ca ac 78 35 01 26 cc e0 d8 0f 8b 0a 51 cf db | a4 5f b8 de 1d ef 44 4c 67 d2 41 0a 1a da 75 49 | 8b 5c 8d d5 4f ad 96 01 a7 81 6e 64 71 33 1d 13 | c8 f5 a7 cf 94 c9 e6 53 e2 b0 78 13 10 0b c7 61 | e7 11 09 49 e7 5c 3e 3d 81 8a d4 ca 33 cf 4b a6 | 11 a6 1c 3a 1f 08 75 b7 9e 2d 0e 59 2f 13 2a 60 | 81 d0 25 c3 cb 2c 46 fb 68 09 64 52 0e fa 74 b3 | e7 5b 92 47 85 91 91 a7 8f 24 50 93 20 2b b2 73 | 29 00 00 24 bd 04 20 dd 74 64 b5 d8 5a af c3 c3 | 73 08 e8 87 3d 68 41 83 2a a2 ff d2 47 06 97 0f | ee 80 ed c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f8 b1 65 26 56 ad 9d 5c eb eb 90 | 0c 0f 05 c7 3a 68 b0 36 00 00 00 1c 00 00 40 05 | a1 90 c1 14 1b 7b 06 99 a6 d5 54 52 02 f0 92 56 | c7 13 ca 30 | libevent_free: release ptr-libevent@0x7fb36402e9b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a32290 | #328 spent 0.0969 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c ba 5b c8 fc 4e e4 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #328 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #328 | rejected packet: | 3c ba 5b c8 fc 4e e4 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #328: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0453 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab7a80 | handling event EVENT_RETRANSMIT for parent state #478 | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #478 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #478 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49686.892643; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002953 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a32290 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #478 | libevent_malloc: new ptr-libevent@0x7fb36402e9b0 size 128 "road-eastnet-nonat-226" #478: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #478) | b4 9c 7f a0 55 ec 5f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 86 bb f8 93 0c cc df 70 83 3b a1 9a e0 b8 e3 | ef 6e a7 55 12 1e 4a a1 3c fd 3e f8 52 71 57 ec | d1 b9 27 97 72 c7 60 a2 ce b1 45 33 01 2b 7a c1 | 6c 56 fd d5 59 18 5e d3 c3 75 ef 36 1c 65 ec f7 | 03 c0 d4 70 7b b6 e1 35 71 9d 76 5b 7d 21 d4 3b | 12 1e 6c 03 cf 08 78 60 b5 ba 22 6e 40 93 8e c7 | 49 b5 59 bf 7f 87 44 20 2c 36 31 fc 69 d8 21 31 | 6c 62 2a ef c7 55 7b 01 a6 27 b6 8c 28 9f 7c ac | d4 27 6c f1 7c 85 40 4e 23 a1 d4 02 e3 38 52 92 | 5f 62 3c 6f 58 9e 47 5e 72 b1 b1 7d 8d 92 b6 d3 | be e0 0a 4d 01 e0 16 9f 01 75 9d 1c 68 e3 f5 d9 | 8e 19 b8 2b 12 45 ac 03 e0 b6 4d 98 39 5a 75 d7 | 7c b1 b9 f8 a3 a2 b1 d2 49 e7 b2 11 f2 c6 a7 7f | 57 72 f8 df 1f 7a 3c df 19 c0 28 fb f6 f4 59 df | f9 cb e8 e4 b5 73 46 61 ef 64 d4 38 66 2b 1c f7 | d4 31 c9 51 2e 93 97 3b f3 a7 d3 d3 06 a7 f6 99 | 29 00 00 24 19 2b 71 2c 92 77 f3 24 92 84 03 b5 | 44 5b d7 aa 5e 03 e6 f3 27 6d 26 be 26 c2 0f f8 | de ad c4 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad b7 1a 04 ad be 09 f8 62 42 a2 e6 | 69 0f ca 24 af 9b 5c 02 00 00 00 1c 00 00 40 05 | 37 89 76 5f 87 60 25 2e 24 4c ae 3c 7a 86 5f 05 | 9f e3 e5 ad | libevent_free: release ptr-libevent@0x7fb34c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab7a80 | #478 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 9c 7f a0 55 ec 5f 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #478 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #478 | rejected packet: | b4 9c 7f a0 55 ec 5f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #478: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_RETRANSMIT for parent state #329 | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #329 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #329 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49686.902881; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005361 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab7a80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #329 | libevent_malloc: new ptr-libevent@0x7fb34c0180b0 size 128 "road-eastnet-nonat-77" #329: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #329) | 19 44 0d 82 d8 18 b5 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 80 85 65 b3 ae 4b 6e fe 68 73 f2 b6 39 5a b1 | 5a f3 36 2e e0 44 7d b5 ef dd dd fc d0 35 5f bf | 0f f1 a8 56 0e fe 65 1a 64 97 d5 45 02 78 56 12 | 1d c5 a8 57 78 41 5d 67 f5 9c ac 0c ea 30 76 9f | d6 40 74 a9 16 ad b3 48 34 1d 1d 07 41 4e 7d ea | b4 15 07 22 a9 ac 8e c3 4d e5 f2 d1 ad d3 62 0d | 93 58 9b 58 67 7c fc 81 97 3b af 10 63 67 d9 86 | 45 ad 4f a6 97 2e 79 bd 48 03 5d 44 76 7f c4 9f | a3 54 a8 c8 d0 75 76 5f 1b 6c d2 e3 cc 1a fb de | f6 a0 df 0a e9 48 0b 88 3f b0 b9 04 79 1c 8b 83 | a2 11 a4 9f 9b f2 2f 13 89 0d e6 68 c7 78 af a5 | 8d 94 dc 9c 72 14 d9 47 8e b6 09 d8 6c bb 15 13 | 54 68 b1 04 b2 79 ae 72 17 9f ff 8d d0 33 2c 7a | b0 3e e8 0e e9 c9 f6 bd 41 a5 9d 71 93 9d e7 49 | fb 61 fa 0d 56 19 d3 32 c0 8d ba 0e 98 71 48 e0 | 2f 1a 52 9f c2 03 77 7a 8d 1e 4b 1c 30 c4 31 91 | 29 00 00 24 ad 58 5c 32 62 e5 13 15 63 fb 95 0f | de a4 7f f4 a1 1f b7 cf 95 c9 7b a8 76 d2 3e a1 | 6c d4 9d 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 38 9e 59 ae 71 c3 ed 6e 6e 92 c1 | 9f 33 f8 69 87 bc 1f 0c 00 00 00 1c 00 00 40 05 | 49 73 ae f4 7f e8 6a cf 37 86 5a 1d f5 77 0e ad | 19 ee 51 1c | libevent_free: release ptr-libevent@0x7fb34400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | #329 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 19 44 0d 82 d8 18 b5 00 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #329 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #329 | rejected packet: | 19 44 0d 82 d8 18 b5 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #329: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0784 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378018460 | handling event EVENT_RETRANSMIT for parent state #504 | start processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #504 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #504 keying attempt 2 of 0; retransmit 2 | retransmits: current time 49686.915205; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002619 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #504 | libevent_malloc: new ptr-libevent@0x7fb34400cf80 size 128 "road-eastnet-nonat-252" #504: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #504) | da 55 48 8d 90 bf 21 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ac 2a 4d 0b 8b cf db e8 71 42 c9 12 73 26 89 36 | f8 7e cd c8 1c 11 8c 7f 9e 09 ce 55 92 dd 78 d1 | ad 59 d2 ee 94 4b 61 50 a3 e8 9a 12 3c 5e 9b 79 | 67 a9 ab b1 17 c4 72 5d 57 f0 6b d6 9d c6 6d f9 | 38 2a f7 f8 e2 f3 15 e5 73 fa 8b 4d 1c fc cc ab | b7 f0 3b 90 c7 95 ba 20 f3 82 29 0e d5 86 2e 2f | d3 3d 1a 6e 6e 68 d3 8e 2c 1e 30 d3 3d 1a 4b 7f | 07 51 04 a3 cd e1 e4 f3 6b 81 ac 0e 5e 25 fc a6 | 2d 49 a3 1d 9d 7f 10 1c b8 aa 6d 0b 48 63 e7 ab | 47 28 bd cd 66 43 28 3d 25 f6 20 56 e0 bb 73 1a | f5 3a ee c2 95 1c 1f 57 8f 41 e9 d9 d4 e4 b4 be | f5 98 c0 78 1e 91 5d ba 02 2c 3a cf 04 e6 44 c6 | a4 f1 83 88 9a 45 b6 e7 89 2b 45 be 54 48 e8 52 | 9b 95 05 7a d4 dd af 6d 96 db 42 ed db 5d 0c bc | 83 61 0a c3 fd 33 2c bd cf 88 1b 95 c9 43 7a fa | 73 7b 7d 2e f9 6a 53 94 78 2b 4f 21 f2 f3 1d f2 | 29 00 00 24 61 bd 30 86 3d bb 50 44 5f 1b 26 2e | 52 63 1b fa b0 23 2c cb bf bc 70 41 cc 6b 00 dd | 9d aa 60 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd b5 bb a3 b0 15 ca 04 17 91 f9 55 | 5a 59 4c 3b fd 4e 4a c4 00 00 00 1c 00 00 40 05 | 47 4d 62 c8 1d 9c 5d 27 1b 5d ed df fb db c8 62 | de eb 87 79 | libevent_free: release ptr-libevent@0x7fb3700407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378018460 | #504 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 55 48 8d 90 bf 21 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #504 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #504 | rejected packet: | da 55 48 8d 90 bf 21 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #504: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0652 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8cc0 | handling event EVENT_RETRANSMIT for parent state #440 | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #440 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #440 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49686.929576; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004684 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378018460 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #440 | libevent_malloc: new ptr-libevent@0x7fb3700407f0 size 128 "road-eastnet-nonat-188" #440: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #440) | 59 19 97 9a e3 8b 77 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 57 86 98 5b 96 d3 77 6a 73 d3 f1 79 83 3d b1 | 25 c0 29 5c f0 c3 a2 69 ec 6a e3 4d 6f cd 0b d7 | 79 9c cb d7 34 fa 78 1e b1 98 79 da 0f ac 84 e0 | 73 c1 06 f8 21 3a aa 0a f4 0e 4d f7 bf 24 b0 23 | 75 13 78 7d aa 97 d6 f9 8b f1 96 43 1f bc e1 e6 | da 7d fb 41 ce 93 49 6e e1 1e f3 c1 41 08 43 3b | 3e e8 ed 1f 4e 08 d4 85 64 9e d1 11 dc 50 e9 45 | 7f a7 7d f7 2b 35 cf 9a d1 cb 6a 05 4f 83 e6 fd | 42 8f 63 21 ff 80 40 b7 e2 26 41 31 52 b6 49 a0 | 77 11 47 93 5f a3 3d 9c 1c 0e 6f 2b 0b b6 1d 42 | d3 1d 45 13 c6 e8 f2 a5 8e c9 4c 05 0a 08 aa 82 | ac e4 27 b7 b2 77 b7 80 38 58 3d 68 92 fd 5e 6a | 38 c8 de 6a 08 ae c9 2d 85 13 3c b9 b9 2c 91 48 | 64 74 4e 5e a1 07 a6 ff 63 67 43 99 ae 3a 36 0a | 11 4e c4 4f 1a ab 97 3f 39 c8 63 d0 49 b4 29 fe | 77 df c5 36 12 ae 96 21 4b 67 cf 07 6a b0 e1 5d | 29 00 00 24 82 fb 4c 4b 30 7b 16 3b 6a c7 2b 62 | cc 7b b0 14 ea 16 0d 74 ad 0f c2 be 8d 39 6e c0 | 2a 84 9f 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 37 6d ef 85 b5 1f 0e 28 d0 8a e5 | d5 d3 1d e3 5f d5 cf 90 00 00 00 1c 00 00 40 05 | 72 f1 07 bf 82 38 a8 c2 32 ec a4 d6 59 1b 7c de | 06 08 a2 81 | libevent_free: release ptr-libevent@0x7fb36404b5a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8cc0 | #440 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 59 19 97 9a e3 8b 77 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #440 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #440 | rejected packet: | 59 19 97 9a e3 8b 77 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #440: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad5900 | handling event EVENT_RETRANSMIT for parent state #330 | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #330 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #330 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49686.963941; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004793 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8cc0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #330 | libevent_malloc: new ptr-libevent@0x7fb36404b5a0 size 128 "road-eastnet-nonat-78" #330: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #330) | 93 2e 75 96 9e d6 58 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 2c e9 0f 22 91 df 5a 5b ae 3a 65 86 ba 44 9c | 65 4a 79 99 b3 fa 29 29 22 63 49 c3 6b 7a c8 2c | a6 64 55 77 51 a1 d2 b5 c5 ed b9 2b d7 c9 de d5 | 1f 04 ca d2 89 15 35 75 d9 05 25 47 aa 0c 65 5b | a8 0c 57 96 31 e9 78 a6 a3 87 ad 68 36 d2 a1 3b | 88 08 f8 2e 28 6b 99 4e 37 3d 68 42 7a f5 6a 2c | 92 3c 46 2d 02 18 a7 c8 61 9b 40 1b d5 74 a6 72 | 61 b0 45 d7 09 4c 08 2d 1e 0e 8d f9 eb 38 be 36 | 94 bc ee 43 6d c2 1a 9d c9 1b 4a 84 b6 50 10 54 | ae 45 14 8d 9a 31 50 76 61 37 da 64 1e 74 bc 11 | a7 13 ed 80 0f 85 3c d8 35 69 89 6d b4 6c ac f3 | 2f 4a 27 55 17 f4 f5 ce 32 75 dd b4 15 0b 7f 61 | e2 87 b3 bb e4 11 66 8c 15 79 6e d9 14 50 70 fe | f5 12 aa 90 f9 25 da 28 bc a5 c1 1c 8f 54 93 e2 | 5b 5a 53 f7 1c 97 4d 5c c4 f6 b5 86 3f 24 5b 64 | c4 87 cd 28 7a 3e ef 9f 68 95 6b f8 95 8d da 08 | 29 00 00 24 a1 af e5 97 d9 f1 9e 6c 80 91 ab 21 | 08 cf 38 0c a4 d3 fb b3 c7 37 98 b4 a4 0d 72 16 | de e9 9d 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 c9 48 f6 82 8f 0c eb 59 3f 42 40 | 18 2f 27 9b ca 1b 0e 80 00 00 00 1c 00 00 40 05 | 3e 48 b8 70 cf c0 9c 35 6c 64 bb e3 c7 5c 5e 43 | 1f 5c 26 91 | libevent_free: release ptr-libevent@0x7fb34c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad5900 | #330 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 93 2e 75 96 9e d6 58 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #330 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #330 | rejected packet: | 93 2e 75 96 9e d6 58 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #330: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #496 | start processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #496 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #496 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49686.979224; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002662 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad5900 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #496 | libevent_malloc: new ptr-libevent@0x7fb34c0300e0 size 128 "road-eastnet-nonat-244" #496: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #496) | f5 9f b4 c2 7a 9c 1f 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec 8a 03 66 9e a5 16 39 b9 4a bb 3f cb 61 65 42 | 8b 18 46 77 70 53 8b 55 8b 35 c6 f2 c8 4d 38 3e | 2b 6f 3f c9 8d f1 cb 91 94 06 70 93 28 a0 96 60 | 92 d3 00 a2 ef 01 89 68 02 8d 85 25 69 9d e5 95 | 69 f6 3b 34 62 4f 63 bc 8e bf 0f 5d c5 bc ea 46 | f9 33 76 3d ad c3 1d 5a 73 74 ae ae 16 20 46 35 | 9e db 41 74 ad 1f 50 49 89 b1 86 a0 57 06 1e bf | 85 a3 93 e1 b5 84 03 d1 1b 0b 7b cd 83 c2 b7 25 | da ae 43 dc f0 b6 2a cd 25 9c e3 07 d7 ef 34 20 | 0c 00 64 d5 63 1f b1 99 29 80 fe 35 ec 43 23 95 | 6a a2 fc 57 a3 69 20 ea 94 fb aa 78 ee 5b 41 20 | 62 d9 4d ee fd 29 6e d9 f4 a1 15 cb 28 a0 f5 d3 | 5e bd 59 a6 87 61 99 4f 80 5d e6 36 36 11 e0 c2 | e5 c9 d7 3c 99 3b 27 4b f7 81 ca 42 93 ee a9 76 | e3 2e 24 6c 18 27 a8 24 04 ce 7c dd c7 a8 fd 5b | a3 04 bb 87 35 69 9f a6 83 11 9f de e4 40 52 5f | 29 00 00 24 4f 4f 97 a4 0f 74 20 cc 43 f4 64 ac | a1 3b a8 cc 16 af 62 fa 43 5b 11 20 24 9f 33 6a | 2d 6e 82 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 79 bb 2d d9 d9 21 50 1a 1a 14 0f | 62 ed ae c0 08 f2 03 40 00 00 00 1c 00 00 40 05 | c8 1f b0 a0 de 58 fc c7 c3 79 0d 4a c2 37 42 43 | 8a b6 69 08 | libevent_free: release ptr-libevent@0x7fb388011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #496 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 9f b4 c2 7a 9c 1f 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #496 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #496 | rejected packet: | f5 9f b4 c2 7a 9c 1f 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #496: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0542 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbbc0 | handling event EVENT_RETRANSMIT for parent state #479 | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #479 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #479 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49686.993509; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003572 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #479 | libevent_malloc: new ptr-libevent@0x7fb388011f30 size 128 "road-eastnet-nonat-227" #479: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #479) | cf d2 c5 54 f4 1c f6 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 7f 14 60 4b 10 9d d5 d2 57 b0 91 8f 3f bc 64 | f3 21 66 f1 3b 94 f5 72 55 1b ed c6 dd 53 3b 05 | c0 1d dd be ad b9 bd d8 0b 5f 4b e3 1c 65 1f 4d | f0 ee 1b 33 c4 3a 9d de 12 12 f6 89 59 76 db 59 | 58 77 c4 51 cb 4f 4e a0 dc fb d2 f7 62 b4 a7 a3 | 1b 68 cb bb e9 09 d6 f0 e4 6b 8d 72 c7 c4 14 34 | 39 ae 8e 61 09 3a 83 2f f5 f4 c7 5f d2 2d b0 d4 | 26 d7 e0 79 26 1d 45 4b 13 c4 86 65 f4 ae 01 81 | 02 a6 0e b2 43 b5 c9 34 60 91 47 c7 ad 72 96 75 | c1 19 c1 36 df fe 89 e5 4a ed b6 37 c9 47 46 4a | ec 4d e3 1d 06 24 05 ec 83 47 39 85 ec 30 13 7d | 3c 3d d1 56 09 9f a0 06 ca 9a 1a b3 23 55 50 9a | b8 7d cc bd 04 23 e1 7e 80 5a 10 c7 17 c0 8f 7a | 89 c6 a1 6e 48 75 0a bf 79 1f 97 1f 66 26 95 b2 | 3f 11 75 2c 3f 93 e4 16 06 22 12 43 49 c5 4b bb | 85 1e 39 53 e2 84 3e 8e cf ad ff a8 7d 04 99 42 | 29 00 00 24 ce ca 8a 00 13 b6 bd c6 7f bf 18 48 | 13 5d 00 cd e5 1d be f3 d6 a7 2f 7b 66 35 3d e6 | f4 91 6b 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 e1 6d ff 62 21 60 0d e9 4e cd 21 | 6e a6 95 f9 84 a3 ab 9c 00 00 00 1c 00 00 40 05 | c0 97 f9 bf 8a bc 59 d7 d0 0f 34 34 05 ac 6e 13 | dc 84 e0 81 | libevent_free: release ptr-libevent@0x7fb350035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbbc0 | #479 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cf d2 c5 54 f4 1c f6 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #479 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #479 | rejected packet: | cf d2 c5 54 f4 1c f6 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #479: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b06800 | handling event EVENT_RETRANSMIT for parent state #331 | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #331 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #331 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49687.02879; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004958 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbbc0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #331 | libevent_malloc: new ptr-libevent@0x7fb350035930 size 128 "road-eastnet-nonat-79" #331: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #331) | 50 44 b2 3a 07 a7 4e 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 5b 7a 1c 65 ca 17 c3 34 09 e9 50 2c 1a 5f 2c | 3f 1f d0 f4 a9 fc a5 0f b3 e0 23 18 36 32 e0 dd | 70 db 2b a7 8a bb 5e d5 7b c1 26 49 ed 17 f5 fb | 41 8c 70 b6 46 13 5b 7c be 72 85 64 1f cb c2 3b | 7b cd ab 00 d1 f5 c6 c8 ef 4e 43 8b d1 3c de 4e | 97 78 da c1 12 64 cb f5 74 cf 7b 2b a9 ae 8b a5 | dc d3 db 70 7b c5 17 1a a0 d8 61 49 40 f3 77 7a | 26 f5 d7 d4 fc a6 3c ec 56 96 bd ad fa da 9d 95 | 6f c7 43 12 03 de b3 4a 54 ca 56 3c b7 a8 38 f0 | 03 5a 39 ab 50 08 22 eb 87 c3 7d 6f ff ac b9 cb | 79 02 42 01 ae 8a 86 1f cf 39 34 00 58 b3 82 70 | cb f1 c5 9a 1b e0 1b 28 e5 0b 30 ab da 32 50 a9 | 39 71 a2 8b c0 a0 38 d2 35 39 8f d7 36 de a3 f4 | 70 e0 8f a8 7e 36 bd e7 03 3e dd 85 86 be 19 24 | 24 d5 8e aa 7b 0a 66 52 ff 44 f1 22 3a 93 2a 43 | b3 e4 83 93 f3 85 5b 68 a3 1b 91 5b 88 3f ae 95 | 29 00 00 24 03 6b b7 f1 e0 d0 ec 2f 89 98 41 7d | af 5d 2c 7f 97 af 10 99 b6 2e fe 6f ac 7d ce 98 | 66 f3 c3 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f b7 eb 6a 1a 1b 78 47 4b c9 5c d0 | 13 11 3d 6a 14 1b 4d ab 00 00 00 1c 00 00 40 05 | 4a 21 a9 91 28 88 ee e6 d7 a3 92 f2 91 f6 75 81 | f6 52 77 56 | libevent_free: release ptr-libevent@0x7fb360046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b06800 | #331 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 44 b2 3a 07 a7 4e 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #331 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #331 | rejected packet: | 50 44 b2 3a 07 a7 4e 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #331: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38800f8f0 | handling event EVENT_RETRANSMIT for parent state #441 | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #441 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #441 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49687.040077; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00542 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b06800 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #441 | libevent_malloc: new ptr-libevent@0x7fb360046040 size 128 "road-eastnet-nonat-189" #441: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #441) | 51 22 97 d4 f1 aa 56 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 2c c6 09 06 fb 75 c9 7f c8 2c f2 78 2e 86 cf | 10 e2 71 84 ec 7a d3 00 3b 70 b4 67 49 a1 3c 4d | 21 45 e6 9b ef ae 2b 06 a0 05 7e f8 20 46 fb f7 | 0f d4 3c 68 46 a5 74 b1 69 d3 27 26 91 1f fb ea | a2 29 d1 d5 ec 8d ba a9 55 81 7c dd 8b b0 d5 f0 | 65 df 87 db d6 24 b4 8d 72 d6 b9 0a a2 e0 30 fc | e4 5b 51 8c ab 49 74 dc 67 ef 9d ed b7 2a 83 35 | e7 01 ba 5c 14 ef fc c4 a3 30 10 68 67 0e 82 16 | 7d 82 bc d7 25 ec 2f c1 f6 97 ab 23 a3 9a b0 7c | d2 fc 27 3c 76 c0 04 de 3f f1 57 2b 49 24 75 a8 | f7 b1 cb 9a 6d 04 c0 ee c6 a3 f0 18 d5 7f 4e a7 | 2c 74 2c d5 e8 3f cd c9 69 5b b5 31 78 19 bb d1 | 32 75 82 1c 75 29 51 85 94 3b 48 0b 31 5b 51 f5 | 93 f5 fc 53 3a 80 c0 7f 4c 5e 8d 4e c5 a0 2e 05 | fd c5 76 9f 1a 22 f6 df 9c 77 35 ff d3 0b a0 5e | 73 0d 0d 92 2d ee d7 e3 ed 3d 6b a2 54 4a 19 9a | 29 00 00 24 9c 47 e2 58 3f 57 67 62 b6 2e 0d 3a | cb 75 8a b1 7d cd 2d 8e 6c 75 cc 2c b3 bd 9f b3 | c7 bf c7 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 c2 f5 08 e1 41 ca c3 a8 c7 5d b8 | 30 41 e7 b2 e6 39 d6 66 00 00 00 1c 00 00 40 05 | 92 32 df 91 6d 86 4c 91 9f c0 e2 90 d1 aa b2 8d | 1d 5c 17 a3 | libevent_free: release ptr-libevent@0x7fb388037a30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800f8f0 | #441 spent 0.0979 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 22 97 d4 f1 aa 56 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #441 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #441 | rejected packet: | 51 22 97 d4 f1 aa 56 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #441: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c01d710 | handling event EVENT_RETRANSMIT for parent state #332 | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #332 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #332 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49687.087339; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004006 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800f8f0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #332 | libevent_malloc: new ptr-libevent@0x7fb388037a30 size 128 "road-eastnet-nonat-80" #332: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #332) | f6 c6 d2 5e ba a8 2a f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 1a 55 0f 26 2f b6 a0 08 51 81 5d b7 71 b9 2d | c5 80 10 57 cc 9f 39 cd 78 f5 33 cd 29 d9 74 2d | fd fd 10 79 da 5f 98 34 d3 3d e4 28 2e 71 42 b8 | 31 90 4d 52 c2 47 b7 94 df 57 9e 16 03 38 42 c0 | 07 fe 24 67 18 0a bc 2f be 06 80 3f 3f 52 ae de | ee ce 07 d7 03 01 92 16 62 42 5c 77 dc 87 62 e2 | 3a dd 16 7d 8f 37 3d c8 ba 22 d8 ef 9b 9d 2a 3d | e0 2c 5c 39 14 07 d4 e9 80 bd 41 35 a2 65 f5 06 | d6 66 0e 9c 09 15 5b 2c 90 ec 66 68 2a aa 32 c8 | f4 e9 0e 83 19 df 87 aa b7 d2 50 b1 70 7c e8 1d | 69 9d 8f db 7f c7 e2 b0 71 77 37 93 72 6b 02 1f | ff 20 a4 e2 5f 72 65 e8 93 2e 78 8f 02 5c 26 b8 | d6 41 94 30 c6 30 1d fb 21 2d 70 c7 a4 c4 37 64 | d1 d0 93 45 ae 86 94 3c ef 88 96 54 5d 14 dc 13 | 82 20 c0 68 d6 ce 1b eb 97 51 ea 00 31 01 9f 99 | 9c 00 ca 7b c6 e3 21 ad 8a 48 45 1f d8 69 47 47 | 29 00 00 24 92 2b 4a ab c7 31 ef e2 7b 94 b4 08 | 46 bc 96 1f c5 de 4e 6b bb 45 28 4b ff e0 00 6e | 79 8b 88 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 fd 6f fe 83 1d 32 21 59 ad 4f 6d | 1b 98 f5 b3 09 7a d7 45 00 00 00 1c 00 00 40 05 | f2 d1 58 ca ab 44 6f 50 93 d1 3e f5 88 73 05 cc | 3b a4 3c c0 | libevent_free: release ptr-libevent@0x7fb36c02ed30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c01d710 | #332 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 c6 d2 5e ba a8 2a f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #332 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #332 | rejected packet: | f6 c6 d2 5e ba a8 2a f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #332: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #480 | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #480 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #480 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49687.089661; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004137 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c01d710 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #480 | libevent_malloc: new ptr-libevent@0x7fb36c02ed30 size 128 "road-eastnet-nonat-228" #480: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #480) | a0 d0 03 15 77 7b 55 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 81 bc 92 43 cc 20 cb 32 dc a3 83 a6 05 ad 00 | 98 6a 1a f3 68 9d 6f 0d 87 ec e9 f6 9a 02 0f 25 | 1f da 1c 78 f1 67 23 e0 e2 7f 61 43 d9 1f 5f b6 | e6 b8 f2 3c ff c1 08 c4 9f 6c 2a bc 8e ba 45 54 | 84 19 36 a3 17 42 a8 a4 75 a3 82 0a 1c 91 e1 7c | b0 f8 bf b5 fa 9f 83 82 f9 d4 70 3e e1 df 4f 6b | 6b 5d aa 23 00 ad 45 7c d2 ab 83 9c d3 c8 48 f4 | a4 1e f5 9c 86 61 b3 f2 25 c7 70 01 ac 67 7a b7 | f7 4a 5c 1c 8e 8e 59 fc 33 71 85 33 b4 10 65 ea | b8 c2 b9 0f e6 63 11 67 85 ad 57 f7 4e c8 76 85 | f8 97 7d db 2b b8 ed 1b 8b 66 54 1e 04 fc 55 3a | c8 bb b6 a6 8a 5c 4e fe c9 53 36 0e 42 74 0e b7 | bd d3 59 78 0c df 94 62 fd c2 21 a4 0c fb 4f 6c | 1c 91 d6 a4 ec 87 92 d0 8f 1e 01 93 bd 89 c0 fe | 71 01 53 5c 6f 46 39 61 8b 59 d6 4d 65 9b d8 a3 | 15 32 57 28 19 30 26 21 35 36 08 9b 79 f2 1a b0 | 29 00 00 24 c8 ff 1d 8a 8a c7 55 8b 0d 6e 9c 13 | 67 dd f9 00 d4 15 c8 78 b6 24 b1 bf aa 08 b9 85 | 7a e8 a9 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb af 61 69 a2 a5 79 11 dc 03 2e 27 | 8e 1f c8 4a f0 b2 47 27 00 00 00 1c 00 00 40 05 | 5a ba 74 8a e7 0f 7a 9b 13 6d 0a ce d0 eb db 09 | a2 8a df 80 | libevent_free: release ptr-libevent@0x7fb370035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #480 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 d0 03 15 77 7b 55 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #480 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #480 | rejected packet: | a0 d0 03 15 77 7b 55 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #480: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0584 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56dd0 | handling event EVENT_RETRANSMIT for parent state #497 | start processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #497 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #497 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49687.105963; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003095 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #497 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 "road-eastnet-nonat-245" #497: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #497) | 28 b5 38 f6 69 3c dd 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 04 4f fe 15 c7 2a a9 dd 3f 1e c4 af 27 5d f3 d2 | be f7 13 da e4 cd 00 79 29 61 5f 71 06 40 ec 4d | 5b 3c 6a 08 8b 9a 2f 7d 1c cb b0 e7 92 b6 f3 99 | d5 a0 ee 16 30 44 37 37 a1 b0 11 d5 bf c1 2a b7 | f5 d1 e8 e7 c9 c5 fa 46 9e 9f 3a b8 17 a3 bb fa | 54 7b 20 13 28 1b f7 09 b2 95 cc 2b 5d f4 60 59 | 43 48 23 26 2f ff 03 e2 92 b6 e4 28 ce 3a 0e b0 | 61 13 0a de 56 e6 23 f3 78 da d1 d7 d1 36 d7 28 | c6 40 4f d5 36 46 dd 50 a2 1e 26 c4 f5 81 8c a1 | f5 29 b8 66 19 89 39 ca 34 48 2c b5 7e 66 e5 bf | 86 9d 6e 91 75 02 c6 e8 9c 42 e7 98 64 aa 15 f8 | 6c 03 28 e6 79 39 e1 5e 40 0e f9 55 f0 a7 e0 83 | fa bb b8 03 f0 19 b9 6c 46 69 2b 63 42 39 b5 e4 | 3d 0b 8e 6b 21 0c f2 48 0e 67 57 08 dc 21 c5 f4 | 1a 4b 05 96 97 80 b1 ee 12 7e 9f 47 8d c8 b6 e1 | 5b 8f 86 2e 8f 92 b6 42 a3 65 04 7b ab ba 17 50 | 29 00 00 24 bb a3 f2 ad c6 d3 d5 2f 68 33 8b a0 | e0 e2 16 25 72 ec 6d 1a 07 9d 1d 9e dd 96 6a c8 | 4e 10 b2 ba 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 bb 68 12 ef 53 e2 45 10 bb c5 e2 | 24 4d b4 aa b9 d2 2c 73 00 00 00 1c 00 00 40 05 | 18 cd c3 7e 31 14 45 db 85 92 8b 2e 4a 8c 9b c9 | 08 95 b5 b9 | libevent_free: release ptr-libevent@0x7fb3680180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56dd0 | #497 spent 0.177 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 b5 38 f6 69 3c dd 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #497 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #497 | rejected packet: | 28 b5 38 f6 69 3c dd 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #497: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.04 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b610 | handling event EVENT_RETRANSMIT for parent state #333 | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #333 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #333 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49687.153321; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005178 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56dd0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #333 | libevent_malloc: new ptr-libevent@0x7fb3680180b0 size 128 "road-eastnet-nonat-81" #333: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #333) | 36 9c 5e f3 7a 54 db f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df 35 02 78 fc 13 18 22 30 0e d2 c5 c7 5e 7a ef | fc 39 68 66 58 1c a7 d7 f4 43 08 7d f3 9f a3 12 | 83 85 91 2a d6 fa cf 49 c5 3a 4e ef 94 c1 54 16 | 1b 99 b1 a6 48 34 1c b5 c6 ee 58 e5 e4 3c 00 8c | f6 ed dc dd 07 96 4c 6b 8d 5f aa d5 5e f5 20 2e | 3f 32 89 26 7f 4e af 1e 9a 4a 36 89 bf ed bc fa | 5a d9 0b e6 38 d4 55 02 b6 04 ba b9 b2 30 b0 dc | ee 4b 24 b9 ca 12 84 2f 34 21 e3 1c 0e f7 c4 d5 | ce ff 47 39 50 96 0a de ca 62 7f b7 57 aa dc 15 | fa 24 df 17 c7 d0 80 14 18 ef d1 f8 18 5f 36 22 | 2a ba 77 eb 0a 13 5b 8b 27 f6 fa ad 95 0f 09 90 | 17 80 57 73 91 84 22 c2 f7 e1 0e dd b5 d9 e2 7e | 44 ff ae 13 c1 78 7c 90 56 b5 79 a1 5d 2f 9a 4e | 56 4b 74 fa 8f 64 20 07 77 6a 9d cf 03 50 e4 f8 | 0d 1d ad 75 e0 c0 52 df 18 df 4e ac 10 5a bf 8c | 35 df 7e 38 e0 d8 bf ff 6f 7d 3a 37 d3 86 c3 73 | 29 00 00 24 0e 6c f9 b7 77 8c 01 48 47 c0 c4 ac | 2c 92 5d 4f bc 4c de 69 52 73 e8 16 78 88 9e ed | d3 2e 55 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 3c 0e c8 f8 59 38 94 13 7f 9d fb | 64 4c f1 0b 3e 49 1c bd 00 00 00 1c 00 00 40 05 | 19 5d c9 52 f0 58 98 88 cd 4a c6 e4 d4 78 0a 3b | 9f f4 40 6f | libevent_free: release ptr-libevent@0x7fb388048a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b610 | #333 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 9c 5e f3 7a 54 db f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #333 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #333 | rejected packet: | 36 9c 5e f3 7a 54 db f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #333: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348012630 | handling event EVENT_RETRANSMIT for parent state #442 | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #442 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #442 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49687.154601; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004012 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b610 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #442 | libevent_malloc: new ptr-libevent@0x7fb388048a80 size 128 "road-eastnet-nonat-190" #442: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #442) | 87 5c d8 cc 20 15 ba 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 68 c7 3c 11 2f 9c 07 85 86 ab fd 70 b3 a3 4b | 4b 15 db 0c 55 63 48 ae b0 dc 7b 34 ba 58 39 54 | 81 cc 25 fd b5 c7 f7 39 e9 8f 2e f9 b9 70 0e c0 | 6c fd 85 d9 5d cd 9d f6 5f 5d 4e 86 38 b5 78 a7 | d8 3d 3d f5 25 e8 c6 56 da a5 38 73 cf 89 18 32 | cf c9 c3 46 fb 60 20 53 a4 ff ca 61 0a 1f ad 2b | a5 f9 d2 1b d5 73 db 29 4b af 73 16 1f 68 6e 88 | a8 b3 5c d6 b4 01 8a 06 65 2f a3 ad 76 14 68 68 | 9f cb 47 75 86 fb 98 94 58 0a 1b c8 87 0a bf b1 | 97 c2 17 ab 5f e8 c3 11 ea 6b b5 fc 83 10 e7 36 | 12 60 e6 87 bd 62 58 93 cb ac ef ca 4f 7f ed 7c | 32 f8 74 a9 e0 2b 69 44 cf b3 d9 33 28 7b 15 7d | 6b 78 11 47 ae a2 e0 8f 52 91 83 be f4 84 c7 17 | a5 b8 57 df 7a 32 65 6d 3b bd ca 10 c7 fb bf 39 | ca 7b 85 7d 49 00 cc 7c 5f b7 c2 27 37 c0 3c 03 | 4d 75 5e a1 e3 8a 16 a4 15 da ac 76 26 68 0c 96 | 29 00 00 24 bc 7d d1 02 e0 e7 26 b2 02 88 eb 9f | 6d cb 61 e3 66 23 89 34 b9 17 0a 11 8d c9 39 5d | 4a 6a d8 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b b4 fa 62 4d 88 e7 9c 8f 3a a9 82 | e0 af 15 4d 27 f2 cd 63 00 00 00 1c 00 00 40 05 | ff 91 89 9d d7 da 34 d7 9b a8 06 6f f9 4a 9b 25 | 2a 77 df 3e | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348012630 | #442 spent 0.0881 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 5c d8 cc 20 15 ba 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #442 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #442 | rejected packet: | 87 5c d8 cc 20 15 ba 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #442: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350012bf0 | handling event EVENT_RETRANSMIT for parent state #481 | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #481 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #481 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49687.205841; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002964 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348012630 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #481 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 "road-eastnet-nonat-229" #481: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #481) | e8 f0 49 b6 6a 16 76 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 5b 3d e6 1f 63 af 92 47 ff bb 34 96 d0 88 24 | 67 3c e1 47 18 9d 62 8e d3 a4 9d b7 75 51 2f 4d | c5 c0 85 26 a0 ef 6b 42 e3 31 89 58 06 3e 3f 70 | 40 68 5f 34 02 73 08 9e 17 dc ee 6e ae 64 70 e1 | 29 5c 9e 3f 09 58 a9 16 14 23 bb 74 7b 7f 22 34 | a9 d6 3f fe 74 0f 40 5a 32 4d ac 87 fc 80 7b d4 | 2d 54 ec f5 ce b0 c6 dd a4 dd 82 14 e2 9a 36 7e | 86 de 04 4a c2 4a 3a 27 d9 82 5e 6e f1 1d d8 3d | 86 d1 82 99 be f9 63 b2 56 5a 40 42 2e 8f 30 eb | fd db ce cc 5a ac 0e 49 65 64 01 18 b4 1e 60 8d | 74 bc e9 b7 46 2e cb e0 1e 2c 67 dc 3f e9 f4 39 | 35 52 90 76 39 0a f3 d2 ac 0b 00 19 f2 ca 97 20 | b7 c6 bb 7d a2 97 ba e5 14 74 e5 ea 2f 4e 4b 3f | 08 53 d9 be 3b dd af 2f 8f 10 fd 09 08 1e b3 13 | 6a 37 e4 ce 19 dd d9 84 13 76 b0 6f 6f 43 48 f7 | 01 a4 a9 0f 9d fb 63 aa 49 8a 2a b5 59 32 b2 69 | 29 00 00 24 ba a6 3b 25 9f a9 3f 06 4e ea 48 38 | eb e2 25 25 ca e3 dd 6c 01 6e 12 39 f8 cf ff e2 | 6d 18 2b 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a ef 98 84 e9 40 8f 9c 0a de 34 0d | 25 31 92 b5 ca c8 92 af 00 00 00 1c 00 00 40 05 | 81 a9 90 20 77 ac 91 2d 88 99 0f 36 2d 43 7d f6 | 2e 36 29 48 | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350012bf0 | #481 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 f0 49 b6 6a 16 76 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #481 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #481 | rejected packet: | e8 f0 49 b6 6a 16 76 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #481: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0691 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1c490 | handling event EVENT_RETRANSMIT for parent state #334 | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #334 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #334 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49687.228183; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00843 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350012bf0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #334 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 "road-eastnet-nonat-82" #334: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #334) | 99 fb 3f 4d 99 57 72 cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a ca de c8 71 49 e8 30 84 13 c9 a8 49 58 85 47 | 09 f9 f9 59 70 d3 2b 07 44 44 cc 17 14 52 02 aa | 27 07 c2 cd 39 d4 b6 e5 73 79 a9 2f 72 89 bd 61 | d5 62 f8 e8 e6 f1 12 2e 57 7d d0 8e 8b 5d 7b ce | 30 2f b7 61 b2 0b 7b a0 24 5a fe 42 60 21 92 aa | 5a be e9 6d ac f6 2b f8 e4 db ed fe 70 91 ae a8 | 85 c9 a9 89 2d af 8b 90 60 53 0f 7b 1f 54 22 36 | b6 5d 78 20 de 79 62 7d 9d 74 65 df 47 cb 75 b6 | eb 4f 70 ec d4 3f 23 06 d7 65 0a b2 74 f8 e9 72 | 81 4c 29 37 9f 65 5b 7b c1 89 f7 c4 28 5b 64 9b | 59 6b b0 17 bf e7 21 58 4f ad 42 06 42 7b d5 d6 | 2f 45 bc a9 64 87 9f 47 9d 1c 11 c7 6e 0c 53 bf | a5 35 d6 5f eb b3 bf 80 3c b3 0d 2b 91 66 f7 a4 | 98 9c 01 6a 7e ee e3 b3 ad 96 90 67 e0 44 49 71 | 2a 4d 41 3b cc ae 39 dd 1f 03 62 e9 5e 5c bf 21 | 27 f6 9b 3e 24 35 1b f3 b8 96 3c e2 59 58 ea 9a | 29 00 00 24 64 85 28 2f 41 a8 19 c8 06 e4 df 4c | 57 5a d5 28 ae 9b e4 58 e9 c7 cc 4b e4 65 be 72 | 5c d2 98 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 3d 2f a6 85 1f fa fd 47 13 ee 3b | 56 07 59 de 70 93 a0 2d 00 00 00 1c 00 00 40 05 | ab e9 3c 75 bd a4 6c 62 ac eb 51 4e 98 ab 45 51 | fa 01 56 3d | libevent_free: release ptr-libevent@0x7fb34c02ec30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c490 | #334 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 fb 3f 4d 99 57 72 cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #334 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #334 | rejected packet: | 99 fb 3f 4d 99 57 72 cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #334: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0471 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad4380 | handling event EVENT_RETRANSMIT for parent state #443 | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #443 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #443 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49687.237524; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003396 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c490 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #443 | libevent_malloc: new ptr-libevent@0x7fb34c02ec30 size 128 "road-eastnet-nonat-191" #443: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #443) | 99 e5 a7 37 44 6e 78 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 12 f7 51 e4 9b df 2b ce ce f2 ee 7b 13 94 51 | 6a dd a6 05 05 c5 f9 51 17 99 5e 09 04 c9 1f b2 | fd 1f 26 33 db d5 00 aa 13 04 1c 40 7e db ca 5a | d7 f8 59 90 a2 34 4e 73 d9 b4 1b 12 47 af 09 6a | 3d c6 bc 0a 75 d2 59 20 61 0f b0 78 2f f9 96 a8 | bc 6e fc a4 91 79 01 c5 c6 bf 55 5f ca 2a 71 57 | 55 3a c2 55 6a 02 68 58 b9 3f ee 10 26 00 19 6c | a4 9b 2b c5 37 91 ea 3d f7 92 10 15 3e 21 96 87 | 2b 42 57 b1 96 6e 0c 94 b6 11 c4 ca 44 56 8a bf | 72 e1 9f 77 2e b1 9f 72 96 c2 0b cd e9 02 1e ed | f4 40 75 83 23 4e d6 76 72 99 62 9c 55 c4 df 8d | 23 38 27 3c f9 b9 3f 1c 37 14 80 74 3c 7a 5d f8 | 1a 0c 7f 0d 3a 48 23 4c 35 58 8d c3 50 e9 4f d5 | 3a d4 b6 fa d0 f4 f0 02 7b 72 04 9c a6 5b 57 b7 | 6f ac e8 68 3f 0b ab 1c 0a 68 cc 2e 68 e9 56 e5 | 09 9a 32 64 09 77 95 51 f1 d9 2b dd e7 b2 96 44 | 29 00 00 24 d1 ee 39 81 5a e3 54 a6 73 c8 50 03 | 2c 50 da d8 32 42 2b e6 ab ed 1b 51 ff 8e f3 84 | d3 ae 77 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 53 91 6c eb c8 88 e0 f9 9e 54 62 | 8e 3a 67 1c 98 f2 42 50 00 00 00 1c 00 00 40 05 | 84 7e 67 f1 2a 8c cc 0b 8d 85 0d 9d a9 c1 72 b7 | 86 11 2f 01 | libevent_free: release ptr-libevent@0x7fb37002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad4380 | #443 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 e5 a7 37 44 6e 78 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #443 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #443 | rejected packet: | 99 e5 a7 37 44 6e 78 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #443: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0478 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3840318d0 | handling event EVENT_RETRANSMIT for parent state #498 | start processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #498 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #498 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49687.239823; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004125 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad4380 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #498 | libevent_malloc: new ptr-libevent@0x7fb37002a950 size 128 "road-eastnet-nonat-246" #498: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #498) | 68 4b 64 40 03 e3 f0 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 69 29 47 91 ea fc 2e df 27 76 0c 26 38 63 6b | ee 03 64 3e dd 2d 4f 5c a2 7c 3e 41 2e b2 c6 84 | ff d7 8f ca 24 8a 1a 84 04 b4 3e b6 53 38 d4 57 | 6d a4 68 41 c6 e5 8c 59 22 a7 fd d7 67 07 36 7e | 1e 40 23 48 d2 30 3e 8e d0 0e 2f 85 d4 6b 01 86 | 85 76 00 26 45 82 b5 a1 ed 94 31 de 85 9c 6f 9a | d2 cc cb 6d 68 f4 36 91 7d 92 94 a9 b3 a0 25 d9 | 5a 00 e8 82 c1 6e 50 4f eb 4b c5 77 4d eb ad f8 | f9 00 df 08 85 b8 e7 b1 b7 09 70 ca fb b5 96 54 | bd be b6 e6 4b 40 d9 6a f9 30 1c a8 77 f3 85 c8 | 21 54 2e a4 d4 8e d4 56 c2 16 22 dd 3e 05 97 69 | 65 6d 3c 5d 0f 12 01 33 b0 f7 91 7a 47 03 5b 97 | 4d 0e 9c 52 05 49 6e 01 9c be f7 12 23 b1 5e c9 | 73 97 42 af ac c3 1d 81 30 3b a9 46 14 e0 b0 65 | ab d4 ac 96 fd 2b 1a 19 c7 e5 47 a1 84 25 26 11 | 99 9a c0 71 dd 5f b8 d7 21 7f 1f c8 a8 a3 e9 18 | 29 00 00 24 87 96 a9 cf f1 29 2d 50 7c 79 d6 68 | 62 af 98 cb 71 a2 fc 0e ae 94 c2 03 22 51 95 ed | 81 12 8d c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 71 da 0a 79 9e f6 1d 6a 6f 5a 6b | 39 aa 0c e1 fb 50 58 ee 00 00 00 1c 00 00 40 05 | 43 dd 8c b7 86 3c b2 4e bf 53 d1 4c 55 30 14 19 | fc 2a 32 31 | libevent_free: release ptr-libevent@0x7fb38403c470 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840318d0 | #498 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 4b 64 40 03 e3 f0 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #498 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #498 | rejected packet: | 68 4b 64 40 03 e3 f0 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #498: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abd200 | handling event EVENT_RETRANSMIT for parent state #335 | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #335 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #335 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49687.279136; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005622 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840318d0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #335 | libevent_malloc: new ptr-libevent@0x7fb38403c470 size 128 "road-eastnet-nonat-83" #335: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #335) | 43 a2 0c b8 41 14 fb 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 1a ff fe 66 5c 27 50 3c bb 63 46 9d 4f 02 13 | 90 10 26 6b 8b bb ce 8e f8 b1 4e 76 fe b9 96 cb | 8a 27 62 97 df ca 55 0f 1b 21 02 63 f2 9a 56 cf | af a1 0c 10 6a 33 02 6e 92 2e ca f8 26 1a ae eb | 16 92 9e c4 5b 3e 17 4a 65 79 45 19 ed da 56 2e | 51 d3 90 a7 9f 98 36 5a 61 58 65 de 51 88 f2 d6 | 2c 74 21 5b 26 93 04 1f 9d 42 9f 74 af 5b 84 53 | 88 76 a7 2b 50 71 5f 03 19 11 aa 1d 3f 9a 1b be | 3f 66 50 7a 7c c6 ba 3a 1f b1 9f aa e7 d9 54 d2 | 8e 38 49 1c 3f da 85 98 28 e2 8c e3 a0 7e 8b bb | 1f a5 48 ea b8 af 51 41 c3 b5 72 51 f3 06 99 5a | 76 51 df 7b 88 a9 f4 af 6a 05 b3 e4 b4 4c ac 08 | 4f aa 11 34 cc 49 a5 06 8b 79 a3 52 45 cd 64 d8 | 83 12 a6 eb 44 69 b7 c9 e1 51 9a 09 19 b8 97 03 | 64 d6 b8 43 68 0f ed bf 4f 10 12 04 91 a0 82 30 | b8 e7 e9 9e 27 9b 68 9f 56 43 7c 93 6d 87 a8 e5 | 29 00 00 24 42 02 24 73 b2 25 02 dc ca ad a2 1d | 9e f8 54 e2 15 e2 22 5d 3f 7b 60 32 c9 95 b0 ec | b1 7e 62 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 ff c7 be 47 4f 0e b7 8d ed 50 5b | d9 e3 74 cc de e6 b4 2d 00 00 00 1c 00 00 40 05 | 8d 0a fb 98 6b 40 87 d9 54 5c 96 0f 30 79 eb 55 | 16 93 80 76 | libevent_free: release ptr-libevent@0x7fb3440180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abd200 | #335 spent 0.21 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 a2 0c b8 41 14 fb 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #335 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #335 | rejected packet: | 43 a2 0c b8 41 14 fb 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #335: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0942 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340025210 | handling event EVENT_RETRANSMIT for parent state #482 | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #482 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #482 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49687.281572; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003918 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abd200 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #482 | libevent_malloc: new ptr-libevent@0x7fb3440180b0 size 128 "road-eastnet-nonat-230" #482: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #482) | 36 c3 54 33 ec a7 b6 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 ed 30 30 be a6 b8 35 5d 7c a5 62 ac c6 13 d8 | 83 27 d5 31 a0 fa 4c 2e 40 b9 54 43 42 15 18 78 | b3 8c 6a 6c 7d 96 c5 85 70 a8 48 20 22 38 c8 e7 | c3 12 d1 63 fb e3 68 d6 08 24 69 60 e5 ac a9 33 | 22 f2 2c f6 14 52 ad 1c 12 97 d4 3c 99 28 7f 69 | aa d1 18 f8 bc 06 35 f3 dd 4f b8 bc 32 67 80 0d | b2 c8 d0 32 11 b6 f1 1a bf 32 1c f4 b1 c8 5d 4d | f1 41 f7 45 a7 42 78 6b 31 8f b7 1a 22 f3 fa a7 | 3f 96 61 3f ad 03 4e 95 70 ec 28 2e 07 88 02 e8 | 35 f1 c5 b3 16 2f 4d b9 e0 29 95 c1 2d e3 e0 37 | 5d 57 61 4b 22 78 ec 0c cc 9d f4 89 9a 2d 4f 1d | b7 c1 f5 ad 55 54 75 4b 2d 2f 97 b2 b3 0a f4 e5 | ca f8 64 9c 52 40 a8 a2 99 0e 3d 9b 5a 9e 1e 2b | 75 b0 89 ef b0 bf 99 f4 37 0e 0c 27 d3 f1 9a c6 | fd 46 0a d5 dc 88 12 58 b5 c1 7a 5a 1b 30 d2 78 | 2b ef 75 09 ea 77 2f b0 ad cc d1 d9 98 94 ca 15 | 29 00 00 24 ba df cf 8a 38 2e 1f 41 21 49 fc b2 | 01 80 ce b1 18 f8 70 f3 ba e7 48 83 d1 e9 62 d6 | 6c d1 b9 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 54 bb 11 83 48 2f 3f fa 5f 96 d0 ad | a2 72 2a 82 ce ec ef d2 00 00 00 1c 00 00 40 05 | c3 77 e0 b4 3a 22 ca d3 bf 9b f4 e6 b2 71 76 56 | 18 71 d4 99 | libevent_free: release ptr-libevent@0x7fb35804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340025210 | #482 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 c3 54 33 ec a7 b6 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #482 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #482 | rejected packet: | 36 c3 54 33 ec a7 b6 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #482: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0819 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #444 | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #444 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #444 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49687.310893; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003717 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340025210 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #444 | libevent_malloc: new ptr-libevent@0x7fb35804b850 size 128 "road-eastnet-nonat-192" #444: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #444) | 7f 9a e3 30 35 a2 50 3a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 73 44 16 cd dc 6d af 1e 52 47 5f 1e bd fa ee | 64 00 7c 0c 09 cd 6a b9 96 7a 9e fd 7b 60 d3 11 | 94 7f f3 14 ab de fc 67 4d 77 8c ed ae 35 5e 21 | 92 1a 34 1f 52 96 c6 b4 82 cf e2 da a3 5d a8 40 | 55 b6 be b1 02 f7 4f 09 53 8a 9a 82 43 68 c5 03 | 91 79 7b fa ca eb 01 ae de 9c b8 57 af 0c ad 92 | 90 f7 80 a3 5f 1b 76 77 00 b6 f8 6e 45 fc bc 6c | 08 e0 42 31 50 bd 6d b4 9c ee e1 eb b4 38 73 a9 | 34 e4 98 23 d2 4d e0 d9 b6 c6 f6 dc 56 58 4e 20 | 84 e1 d2 8f 09 7f 4a 9d 26 b0 f3 d6 00 33 87 e7 | 4a de ea 2f 4a 53 b4 0f 48 62 38 e9 50 42 17 64 | 60 9a 88 18 4e 23 6b 6a 5a a4 6b 23 ad 33 67 82 | 97 a8 79 73 5f c7 02 96 5e 91 0e 40 d6 4e f8 b3 | d9 30 5c 69 30 3f 5d 5d 8a 33 e5 82 75 a6 f8 01 | e5 10 de e1 1f 27 d1 2a e8 d2 12 a6 bb 52 29 5c | 7e c1 67 58 19 ab fb 58 65 a2 55 1e 99 be f5 8d | 29 00 00 24 2a ad 1b 39 f3 fd f9 42 4c 00 4a 5c | ed 00 f4 3a 31 ea eb b5 54 5a 5c 9d a2 7d 7c c4 | 61 a7 b5 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 d0 f0 6f a1 ca 95 cb 19 9f 38 2a | 49 20 b8 20 36 38 5c 50 00 00 00 1c 00 00 40 05 | 75 b6 79 50 7c d3 43 75 20 ac ac 20 ab c2 0f 0e | 7d 73 a1 76 | libevent_free: release ptr-libevent@0x7fb3700300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #444 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 9a e3 30 35 a2 50 3a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #444 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #444 | rejected packet: | 7f 9a e3 30 35 a2 50 3a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #444: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acab00 | handling event EVENT_RETRANSMIT for parent state #336 | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #336 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #336 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49687.340142; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005304 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #336 | libevent_malloc: new ptr-libevent@0x7fb3700300e0 size 128 "road-eastnet-nonat-84" #336: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #336) | a0 3a 99 80 e1 01 63 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 8b 11 e3 72 10 b4 96 46 45 1f 06 8b cb 20 43 | 48 5b dc 9f 22 0b 19 f0 6e 5a 41 4f 7b 66 7e 47 | 17 91 cc cc 24 8c c0 85 32 b7 be 23 d1 6d 12 65 | 00 df c3 47 48 17 d9 93 47 4f 9d 2a 81 88 4f 2c | 1f 98 ac a8 85 56 dd 1e 45 4f f7 f9 78 59 b2 90 | d0 96 3c c9 92 dc 80 e7 ee 9e 9f f3 a3 42 a0 87 | f4 8c 84 d8 38 fe 2c f0 0d 7c 15 54 23 ab a7 7c | ab e1 53 7c ba 26 57 e2 9b 0a 0d 44 c4 7c f6 bd | 50 8c ae 85 b6 fa 6e 51 9e 4d 32 a8 2f 5f b7 94 | 33 ef 3d 6b de 80 a9 44 cb a5 48 1f 9d d9 3e 40 | c2 f4 df a8 c7 43 1a 85 1e 99 1c be ad 10 a3 44 | af 83 22 29 2a d8 4c fc aa 9e 40 9e 83 a1 f3 2d | d3 6b 55 b5 8b 94 57 96 1f 06 03 b7 e8 07 4a dc | 94 d8 f3 f3 15 26 15 42 b7 cd 81 18 11 03 dc 3a | 4e 46 ec 2a eb 11 4a a9 f5 ce 5d 26 8e 40 7e f7 | fb 5d b7 76 23 d0 05 cb 25 8d 85 d4 e7 63 e5 fe | 29 00 00 24 20 77 67 42 c0 5c 2e 2c 4f 51 1c e3 | 6e 76 b6 ed 2f 6c dc 89 e9 07 aa bc e6 7b f3 86 | a7 c4 a8 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c e2 e4 55 b2 1e b0 cb dc 5a 76 de | 82 37 47 8c ee 4e fe 03 00 00 00 1c 00 00 40 05 | 1d 8c 0e 3c 37 8c 24 ca 1e c1 4b a0 97 2b 99 7f | 60 3a d2 7b | libevent_free: release ptr-libevent@0x7fb344034470 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab00 | #336 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 3a 99 80 e1 01 63 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #336 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #336 | rejected packet: | a0 3a 99 80 e1 01 63 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #336: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36400cc10 | handling event EVENT_RETRANSMIT for parent state #499 | start processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #499 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #499 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49687.365411; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002663 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab00 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #499 | libevent_malloc: new ptr-libevent@0x7fb344034470 size 128 "road-eastnet-nonat-247" #499: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #499) | c7 9c 2c 36 f8 59 d4 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 36 9d 7e c3 eb 0f f5 55 38 8b 43 25 86 54 ef | 6f b9 f8 28 7e 76 ec 92 74 99 fc c9 b6 64 9d ac | b4 f5 fc 31 29 96 7b f0 ef 3c 01 28 c3 ad 1c 4d | 74 6d b0 ed 64 09 35 18 c6 6a c2 bc 6c f8 72 2c | 54 14 82 7e 14 37 d9 e7 9b 9f ce de 7f 99 2e f1 | 1f 25 30 b7 54 88 0c c6 03 fe ef 9a c2 4c 16 3a | 92 dc d7 50 b6 03 1d 9b e5 26 b1 a0 fd e5 86 9c | c1 bb a9 1d c8 aa e0 66 62 a8 ef d5 a3 e5 1c aa | 48 a0 13 72 a6 76 d4 63 de 8e 77 d1 a4 a1 70 1a | 05 7e fd e9 46 8f d7 69 9c 5d 01 6a 23 bf d1 7c | 60 fe 3b 08 36 7c 46 56 5e fa 3e 87 6e f8 5c e5 | 62 26 d2 09 02 d7 a8 88 f2 80 8a 7b d3 24 87 ec | 98 c6 06 44 cf 2e 14 1f 9a 9e 11 3b 15 35 10 67 | 80 78 af 3c 90 b3 be 54 94 f8 6c d9 36 9d 34 3f | b2 ee 4f 6f 8b cb 03 13 29 6b 61 bf aa 20 b1 02 | 64 9a 46 8c 58 45 74 b6 a7 9c 3f 9f 19 1b d5 f4 | 29 00 00 24 ae 3f 5f 22 5a fe fe 91 94 31 fc a8 | 30 c0 4a f7 3c 57 3c 0d ed a5 29 f2 71 dc 56 3a | ed 9c a9 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 89 ab ab 1d cc d7 b6 cb 29 1c 48 | e7 84 01 ce 34 15 c4 5f 00 00 00 1c 00 00 40 05 | 7f 71 39 3d 41 d0 36 ee b9 ed 2b b5 28 d2 9e d8 | 0a 4d 91 1e | libevent_free: release ptr-libevent@0x7fb364039970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36400cc10 | #499 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 9c 2c 36 f8 59 d4 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #499 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #499 | rejected packet: | c7 9c 2c 36 f8 59 d4 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #499: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34401d710 | handling event EVENT_RETRANSMIT for parent state #483 | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #483 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #483 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49687.38973; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003723 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36400cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #483 | libevent_malloc: new ptr-libevent@0x7fb364039970 size 128 "road-eastnet-nonat-231" #483: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #483) | 34 4c 65 0f e6 b6 ad e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 14 b4 cd 04 ae 73 27 55 14 94 b2 a9 a9 46 92 | bf 38 7f 34 e4 30 01 9b cc 3d 69 9b 72 22 2d c6 | c0 5a ca f2 aa f8 34 31 df 85 74 a8 8a c4 71 d3 | 18 15 b7 43 a0 c7 52 88 83 cb 13 e3 0b 22 9f 8d | 9b 32 7a fd 24 4c 85 ea ba 28 19 ff da 93 b1 bb | d8 33 5c 65 db be 0a e0 bd 29 79 f5 94 d3 6b 1b | d0 fe 62 1a aa 43 59 54 5f 94 f2 d4 df c7 8c 2c | 9f 79 f7 92 9d e8 8c 7a 9a 6a da 8f dd 5b f5 4b | 78 88 55 3a 27 f6 46 11 a6 78 da 31 e5 57 e3 ff | c3 41 c4 d8 db 92 c7 9b 0b f2 9c 05 a4 6f e4 60 | d6 be 30 93 95 25 fb 5e 0e 06 32 43 09 91 4d 90 | 0e 89 44 7a 24 99 b2 ff 62 86 54 98 47 bc f9 cf | ff 60 15 2b c0 14 62 be bc 88 1f 37 10 d8 42 2b | 8e 68 b2 b4 90 d0 f5 fe bf 7c ce c7 6a 70 46 09 | 84 97 db 42 58 43 9f f3 46 27 26 32 2b 0c cd 41 | 80 81 33 b8 5d 30 60 f3 70 32 7b 81 3a 1a 11 48 | 29 00 00 24 a6 6b eb 02 98 7d a6 5e 59 5e bd f1 | ef cf 36 f2 a9 4b e0 19 61 9c ac e2 ac 17 24 09 | 0d 96 04 a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d1 38 08 89 da 41 ff 7d 1c 3d 17 6c | 3a eb 05 70 fa bf ed 59 00 00 00 1c 00 00 40 05 | d4 38 01 a3 1e e4 dd 2e 8e 63 54 12 3f 4d 01 1d | 49 6b 48 46 | libevent_free: release ptr-libevent@0x7fb344040760 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34401d710 | #483 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 4c 65 0f e6 b6 ad e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #483 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #483 | rejected packet: | 34 4c 65 0f e6 b6 ad e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #483: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348048a60 | handling event EVENT_RETRANSMIT for parent state #445 | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #445 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #445 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49687.405021; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004565 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34401d710 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #445 | libevent_malloc: new ptr-libevent@0x7fb344040760 size 128 "road-eastnet-nonat-193" #445: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #445) | b4 2e 78 cc c5 f6 9b 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a ba 44 5e e8 04 0b 1d 80 c6 75 3f 8a bb 68 32 | 06 11 b8 93 58 a0 e3 d0 41 9a dc df 91 ac 0b 46 | b8 6d fc ac c1 e9 09 52 48 47 7e 50 d3 96 46 49 | 4c db ea ed bd 20 06 58 05 cd d9 91 57 1d 80 4d | 27 35 e2 86 24 5f 4e 32 bf 57 32 fe 52 fe 8f 11 | 64 dd f6 c1 cf a0 23 81 27 d1 05 22 c7 e8 81 e4 | 67 a9 8c 32 ef 56 b6 40 b1 5f 41 a6 60 fd 00 92 | 0a e3 78 9b f2 03 2c 98 1e 8c fc 31 fc 9b e2 d2 | 0c f9 17 3c fe e3 b4 da 8e 06 ef 92 fc 84 24 e8 | 41 6f 79 14 e9 fb a1 a0 07 48 de 12 d6 84 2d 7e | 90 30 a3 38 3d 28 16 c5 17 69 90 4c 1a 42 aa f9 | c8 01 fd 3b 2e 46 f9 3b 3c c2 87 e4 f3 79 4f c7 | 11 59 a6 e8 26 10 94 45 c9 46 e9 8c ab e9 1d 28 | 48 da 5b 23 c8 48 65 23 9b 45 8d ab 8d 58 2e 78 | 34 e4 38 1d 80 97 ed 49 5c 38 3d af 3b ec ad d6 | 83 24 62 c1 f1 7d c9 59 93 3c f3 1e db d1 30 e4 | 29 00 00 24 43 99 24 d2 66 51 b3 d4 1c 15 bd 40 | 1f a6 87 a7 4d 01 75 d0 ba dd bc 61 a0 08 b2 b5 | 88 d8 85 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 20 6b 9d 83 bc 81 44 79 c4 11 cc | c3 90 0e 2f 55 7c a4 51 00 00 00 1c 00 00 40 05 | c1 5a b3 1c bf d8 ae 9a 12 a9 ee 41 24 11 a3 d4 | f8 37 2e 14 | libevent_free: release ptr-libevent@0x7fb36403ae90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348048a60 | #445 spent 0.178 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c01d710 | handling event EVENT_RETRANSMIT for parent state #337 | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #337 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #337 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49687.40524; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004946 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348048a60 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #337 | libevent_malloc: new ptr-libevent@0x7fb36403ae90 size 128 "road-eastnet-nonat-85" #337: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #337) | ed 63 58 23 fd c1 76 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 96 54 84 2e e5 91 43 31 05 bf 8d 46 38 09 77 | 34 82 01 41 07 ba 77 ae 0e 58 56 59 e8 aa 03 3b | 7e fb 3d 6d 4d 59 d3 86 8a 20 2c b2 06 03 8a 41 | 33 cf 0e 06 87 87 a2 ab d5 f2 99 a7 84 cd 05 cf | ec d9 29 84 36 3e fc 29 32 e5 d2 77 7d a0 28 f8 | d1 0e 51 2f 73 28 bd 60 66 cf 7b 5c e8 76 7f ee | 0b 3f cc 47 13 a2 8f 86 8a 1d a1 57 96 4b 8e 1d | 54 09 0b 8b e7 94 12 ea 68 37 a0 5a 37 1b 43 96 | 9e 43 fb b9 f4 e3 a4 14 cb 49 50 02 95 69 45 10 | 4f 12 ab e9 0f 1f 01 01 a4 c3 ef 65 1e 2e cf e7 | 08 9d 2c 27 7f 64 fb 91 ba e9 80 4e 20 48 a7 46 | 4e 2b b0 83 ea 9c e6 04 02 2b 8c 1a 52 db c6 17 | d5 9e 92 ca bd cc 2d 80 e6 b4 24 b9 79 b6 76 9a | 0e 8f 39 57 ee 2c 0b 47 20 f0 82 f0 87 6e 0d 85 | f9 ab b8 d1 c1 07 ac ad 62 5b 5a 42 cc c5 f9 04 | de 15 7e d8 03 4b a1 c4 30 01 43 b8 8d 24 8e 44 | 29 00 00 24 47 35 e2 69 12 71 4e bf 5f ce fb f5 | 4b 5d 78 7a 40 67 4e 2b 89 1a 4f 82 42 7d 07 9d | 99 e5 3f 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 a6 ae 66 a0 2e 4a eb 14 83 41 42 | 9c b3 ed 9b 1a cc 9f 9b 00 00 00 1c 00 00 40 05 | 09 b5 68 86 30 d7 ba 9d 35 40 11 f6 5c 40 95 0a | 79 fe 98 fe | libevent_free: release ptr-libevent@0x7fb36c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c01d710 | #337 spent 0.128 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 2e 78 cc c5 f6 9b 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #445 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #445 | rejected packet: | b4 2e 78 cc c5 f6 9b 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #445: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0764 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 63 58 23 fd c1 76 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #337 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #337 | rejected packet: | ed 63 58 23 fd c1 76 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #337: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0542 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37800cc10 | handling event EVENT_RETRANSMIT for parent state #446 | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #446 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #446 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49687.469638; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004306 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c01d710 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #446 | libevent_malloc: new ptr-libevent@0x7fb36c0300e0 size 128 "road-eastnet-nonat-194" #446: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #446) | 88 1d ae ca 37 da 9c 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a c2 f6 76 62 03 08 9a a8 98 a1 67 18 76 36 6f | f2 14 09 7e 5a 52 4f 9f 19 c8 ba 89 bc 37 1d 8e | 11 c7 c7 24 c8 21 0f 20 96 1c 89 74 ee 2d eb 0f | d9 40 32 aa 68 91 41 4a dd 21 15 90 12 e4 8b c9 | 4d 5c 9c dd a5 b1 90 8f 14 47 58 25 b1 c4 3a 4d | f0 56 c6 bf 57 58 f2 ac e6 d1 1a 63 f9 d8 c3 1a | a4 3b 86 89 ab bf 3e 5a 25 6f 85 ba 03 4e 84 c0 | a7 2c b9 17 b5 20 be c6 c5 13 97 18 56 e3 27 c2 | f9 d2 f9 ff 5e 3c 1b 93 48 e2 17 63 4c c3 83 be | b7 98 15 95 f6 a1 48 ea 20 9c e6 f3 53 b1 cd 88 | 53 a7 49 3f 59 99 9e 83 6d e2 88 bb a9 e3 fc 02 | 29 31 b8 83 4f 47 15 6b 71 12 58 3e 96 a5 76 cc | 0b 52 1f 8d 6c b2 63 0d 85 4d 51 f2 5f f7 f4 97 | 20 32 4c 0f 1c ff 39 c3 f0 0e d9 00 b3 27 e0 af | 29 89 02 52 1a 56 5c 18 4f a4 87 c7 25 17 55 3d | f8 28 8f d9 14 95 ef 08 7c ea 8b df 87 e5 f7 5e | 29 00 00 24 5e f7 7f 32 12 e9 cf 93 a5 5f 05 08 | 2b 32 36 a4 d8 35 51 26 4c a4 53 84 4a 3d 2b 33 | 5f dc 90 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bd 76 de 3d 7d 38 3c 23 fa c5 a8 aa | 98 15 c0 6a 4a ab a4 fc 00 00 00 1c 00 00 40 05 | 7b cf 42 04 70 bc 06 e9 71 4c e8 ba 2d 5f 18 79 | 9f 19 93 8c | libevent_free: release ptr-libevent@0x7fb37801fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37800cc10 | #446 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370012890 | handling event EVENT_RETRANSMIT for parent state #338 | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #338 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #338 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49687.469777; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00716 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37800cc10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #338 | libevent_malloc: new ptr-libevent@0x7fb37801fd50 size 128 "road-eastnet-nonat-86" #338: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #338) | 1f e2 d0 d2 e5 84 7f 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db f7 91 cd 84 5c a7 ef c5 4a 9e 2e af a2 43 ea | 45 0a b8 db c5 6e 04 46 ba a1 d5 11 76 fa 91 5a | 21 6e 50 69 5f 4c 63 af d6 32 06 ae 79 8f f8 47 | 06 f3 f5 c6 98 57 e2 e8 f9 93 2e 73 11 9e c7 4b | 81 b1 ab c3 4c 82 50 3e 95 1b 93 8d f3 f1 26 94 | 35 dc 1c 86 75 c4 0b 21 99 da cd 92 fb c9 25 d3 | a1 77 02 1c 94 1f a7 90 d7 35 62 14 3f a4 c2 e2 | 04 47 bb f7 88 43 f1 58 36 ff ad ce 6a c6 3a e5 | ca 19 27 9c c0 b7 91 62 00 c9 17 fb 82 73 f3 dc | 8a f9 f2 d0 2d 78 16 8f d3 1a df 7b 29 7f a7 d2 | 2a 1d 58 77 31 26 e6 25 fd f1 f0 ff b3 be 2a fb | 9a f2 05 45 cd 1a c0 33 3f 3e 0c b1 4a 0e 13 b1 | f3 25 ba 03 ce 1b 65 7e 16 c3 d1 62 05 e6 0b 87 | 27 59 78 26 a7 72 9c cf a5 2a c9 6c 3c 43 6b b4 | dd fc 35 a0 21 8a d9 83 8c b5 e6 a8 c9 3d 42 bd | e0 43 1a dd 83 56 78 b8 0a 0d d3 50 6d 61 d9 5c | 29 00 00 24 53 73 16 e0 68 43 e7 c2 a0 53 68 5d | 7e 07 bf 33 55 30 e6 39 bc d6 66 c9 05 5a fa 29 | b8 4f 54 b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 1b 58 be 75 e4 59 10 d1 29 a5 4a | 19 0e d4 a5 d3 bb ae eb 00 00 00 1c 00 00 40 05 | e1 23 de d4 d9 5f 17 c1 21 ba 79 77 2a ee 0e dd | 91 6b 75 70 | libevent_free: release ptr-libevent@0x7fb37003a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370012890 | #338 spent 0.0676 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 88 1d ae ca 37 da 9c 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #446 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #446 | rejected packet: | 88 1d ae ca 37 da 9c 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #446: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f e2 d0 d2 e5 84 7f 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #338 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #338 | rejected packet: | 1f e2 d0 d2 e5 84 7f 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #338: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.035 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #484 | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #484 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #484 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49687.47604; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005185 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370012890 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #484 | libevent_malloc: new ptr-libevent@0x7fb37003a770 size 128 "road-eastnet-nonat-232" #484: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #484) | 74 f2 d9 62 15 c8 1b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 3b 62 f3 ed f9 47 0c bf 01 45 93 af e9 01 13 | b4 4a bb 89 23 94 52 5c ed 86 36 6e eb 69 47 16 | 4f 4d 66 99 6d c7 d9 da 05 03 61 83 27 be 84 fb | f7 56 2a 10 f6 9b f2 84 b7 d0 85 06 cd 12 0f 3f | a6 61 71 e1 4c 4c be b5 23 cc e4 61 ef 62 aa 02 | 7f 71 fa f2 27 5a a1 66 46 df 65 7e 72 33 12 a7 | d6 b1 80 2f 61 a3 b3 4c c2 28 e7 cf a7 3c 3b 6f | 3a a0 e5 2d 1e 20 bd 32 76 a2 9f 45 f7 a6 6e e6 | 37 c0 ae 2c 38 01 39 bd 5f e0 3d 65 31 0e f3 37 | 25 fd f7 75 ed 4c 70 31 98 89 dd 26 6b f0 c6 86 | 26 2c de ac 79 65 19 00 78 ef 2a 8b 1d ed 38 d3 | 5d 90 eb e1 29 71 f3 ff 0c 50 ed 12 97 fe f3 76 | 44 b9 27 26 27 3a b5 56 98 ce 1d d1 07 e6 e9 5e | c0 92 67 d1 b6 25 97 6b 40 80 cf 9a 68 03 d5 29 | 53 a9 fd 87 28 85 18 42 c6 5b 08 65 a1 d2 2b 6d | e9 34 66 d8 9b 2a 73 2a 5b b8 59 63 5e 1f 84 b9 | 29 00 00 24 71 8e 31 23 c4 63 d2 6d d6 0a c0 cb | 7f b2 37 27 b0 85 2e 73 82 c7 9f d6 c1 fd d8 67 | ff 33 43 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 6d 47 d8 30 7b 36 73 b1 0d df 8b | 82 69 87 3e 91 43 68 d6 00 00 00 1c 00 00 40 05 | 23 15 eb e5 a3 5e 20 cf 73 fe 01 cb 79 d0 a6 f2 | 55 38 68 fe | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #484 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 f2 d9 62 15 c8 1b 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #484 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #484 | rejected packet: | 74 f2 d9 62 15 c8 1b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #484: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0399 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #500 | start processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #500 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #500 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49687.48329; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002024 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #500 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 "road-eastnet-nonat-248" #500: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #500) | dc 38 e1 a3 3b e2 b1 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 4a f1 97 41 66 ce d4 ab 90 74 77 4f 00 cb 43 | 1f 3a 29 28 bd ab f1 45 3f 88 a4 79 39 fe 2c ee | 1b e9 2e 5c de da 76 bf a3 0c cc 93 b6 1b 8c 68 | 84 10 8f 55 6f 47 ec 76 41 18 0c b4 50 73 cf e8 | 55 11 98 5d d0 8c 2d e1 b9 47 bc d9 dd 4c 8a 72 | 7c cf 3b 3b b2 57 cf 3d e0 1d d4 39 94 72 a1 23 | 6b 6c 49 1f b9 94 b3 b7 a4 33 d9 35 1a 97 76 7e | 8f eb c4 34 d7 30 b6 ff 0b a0 77 62 d6 0a a9 b7 | 60 e4 b0 4d 0f 38 4b ae 9a ce 16 98 d0 34 95 01 | 44 fe 57 be 26 cf f9 d3 b8 79 e7 d6 d9 c0 2e 7d | 90 21 6f 7d c3 bc 04 f3 80 08 f6 e6 0b 6f 05 a0 | f8 da 5b cf d5 f7 d1 f1 f5 c0 29 8b c4 a2 cc 29 | 8c e2 9a 9c 8f bf ae c2 b0 3f ce e4 df fb 71 f5 | f7 13 31 70 b5 0f b2 9e ae 64 eb 2c 73 aa d9 5b | 7a b9 c4 3b 46 10 f6 92 a7 5e 0d a0 e7 06 8a 74 | 5e 40 71 07 4b d8 c5 08 71 52 bd 30 01 84 10 98 | 29 00 00 24 73 e7 fd d9 0c 07 09 ec 59 bd 7a b5 | 40 29 3e 5b f2 d3 e1 ea 7b 04 b1 b4 b1 5f 03 d2 | b4 24 ec 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 f6 20 af 00 f8 ef 66 b3 21 e2 19 | 0f ba fb 8a ed c9 14 86 00 00 00 1c 00 00 40 05 | 70 63 55 d1 ed 70 f9 1a 8c 9d 5a 9a f7 cc 31 61 | 9c 9b 74 c0 | libevent_free: release ptr-libevent@0x7fb3380407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | #500 spent 0.0961 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 38 e1 a3 3b e2 b1 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #500 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #500 | rejected packet: | dc 38 e1 a3 3b e2 b1 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #500: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0408 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25cc0 | handling event EVENT_RETRANSMIT for parent state #339 | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #339 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #339 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49687.529562; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00427 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #339 | libevent_malloc: new ptr-libevent@0x7fb3380407f0 size 128 "road-eastnet-nonat-87" #339: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #339) | a2 06 83 e6 4d cf 47 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 60 78 10 c3 0f cc 3e 4e 2e d5 96 c1 d2 76 e3 | 97 d5 35 a5 15 b5 cf 25 fc d1 a9 ed 61 00 ab d3 | f0 a5 f9 6b c8 93 25 3b e7 35 94 5b 27 e6 7c aa | 9f 99 13 73 c8 87 72 6f e3 9a d8 3f f2 60 6d 07 | e2 f2 df 74 8c d9 c0 ea 66 9b 1a f7 3a 35 11 09 | 4c 1a 77 9c 33 ec 8e 52 10 1b 5c 10 4f 88 cf e4 | ab bc 00 8a 49 0d dc 56 57 fd b9 aa 33 dc a2 d8 | 3f a7 e3 81 b2 6c 3d 05 80 c1 9e e7 22 3d 4f 4b | 69 99 65 2e db d4 42 77 f6 d5 da ca 9c 7b 37 94 | 4a 33 ff d3 90 af 06 41 1e af a8 a1 29 27 b8 4e | 94 36 29 4f 90 ae d8 40 e5 f9 f7 60 20 50 ae f6 | 19 f9 e5 ce 63 be 68 f8 75 c8 c0 44 7f 51 fc 3c | fe be 4d e9 10 ea 8c 24 89 c7 41 df 92 c0 7b 00 | f7 f4 82 ce db 65 47 b6 bb fd f3 75 44 d0 1d c4 | 34 92 d9 b1 3f bf c2 cf e2 c7 6c 0d 60 aa 7d 11 | 0e 19 00 e8 57 9d 13 5a 3b a1 80 7a d5 8d 15 4c | 29 00 00 24 1c 60 55 0f db a5 b1 e0 94 27 e9 83 | 86 bb c4 10 2a 23 35 9c a1 96 2d 6f 7e 5d c3 40 | 27 31 c9 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 61 9a 5c 09 fb 4f 1f fe 5c 80 fd | 11 ff 3a 18 d8 5f 68 01 00 00 00 1c 00 00 40 05 | f8 00 9b 14 2d 47 6c 3b ee ab c1 8e 99 04 04 19 | 24 06 94 42 | libevent_free: release ptr-libevent@0x7fb38802c0a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25cc0 | #339 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 06 83 e6 4d cf 47 f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #339 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #339 | rejected packet: | a2 06 83 e6 4d cf 47 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #339: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #501 | start processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #501 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #501 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49687.57191; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003077 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25cc0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #501 | libevent_malloc: new ptr-libevent@0x7fb38802c0a0 size 128 "road-eastnet-nonat-249" #501: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #501) | 7a bb eb ab 59 82 f5 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 e6 e7 b7 df 15 1a 88 da d9 de 99 20 d1 37 56 | a1 ac 1e 3f d7 4a 79 5c c8 d1 9e 85 c4 f1 dc d8 | f1 ca b4 9f 14 60 92 de ad 42 9b 69 57 eb d4 33 | 23 a5 0d 4e 25 37 79 9e 75 f6 18 19 e2 36 6a 82 | 3e c6 41 e8 fb 1d 27 30 85 3c c4 c4 37 ed 39 57 | 59 68 3d d5 92 7b 15 e0 1d da a4 bf 8a 13 2e 99 | fa b3 d7 34 a7 e9 ee 45 93 41 ea 47 57 78 a8 c7 | 28 3e 80 cf 3a fa c3 5c 40 7e 2d 6e a8 8f 1a 76 | 9f e3 ee 0a 5c 09 b9 35 7b e1 73 9e 9a 5b 7e 05 | af 57 ba 41 a4 20 67 9b 93 00 a4 77 65 8b 72 e8 | ca c2 a7 8c f8 bc 75 a9 2f 52 c5 be ea 41 46 90 | 6a 2e 17 cc 87 cc 0a 22 0b d8 b5 c8 dd ab 30 09 | 90 3a 1d 65 9d 2f 73 fc c6 06 30 d8 66 83 64 c8 | a7 e5 c1 23 61 62 8a 18 87 ad dc 7f 74 de 65 20 | fb ed bb 7b ca 02 66 e1 c0 5c b2 b3 41 14 ad 3d | 9e 02 fd e0 c6 5b ba ef b1 16 d3 d4 8f 92 d4 90 | 29 00 00 24 0f d0 3c c8 9f 70 8e 25 2a 4f 78 c0 | 1d 68 16 9a 4a bb 3c a4 19 fe 19 3a d7 7c 1c 89 | 23 2f 21 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 3b be 6c 39 30 3e f5 fc f3 31 c5 | 53 ef 34 5b ca c1 eb 03 00 00 00 1c 00 00 40 05 | 86 82 cd 41 4f 66 70 19 76 ed 27 dd 0a 04 2f 6d | e6 1d 3e b6 | libevent_free: release ptr-libevent@0x7fb3780300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #501 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a bb eb ab 59 82 f5 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #501 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #501 | rejected packet: | 7a bb eb ab 59 82 f5 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #501: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0524 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3a590 | handling event EVENT_RETRANSMIT for parent state #447 | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #447 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #447 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49687.576262; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.001617 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #447 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 "road-eastnet-nonat-195" #447: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #447) | 38 12 e6 81 e7 94 57 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 06 2b 67 fa f3 85 ef c9 87 64 80 c6 08 7f 26 | 45 8a d6 b2 f0 0d 75 25 97 6d 45 07 fd cb e4 04 | bf 7e ab 4e 45 57 81 c7 b5 29 22 16 b5 58 17 73 | fb 06 1c 20 f6 01 42 43 d1 e6 cb 7e a1 aa b9 6e | 26 8c bc f7 62 2d 79 d5 2d 49 41 71 09 9e b4 75 | ea 9e f2 7f e9 07 f0 a5 64 1a db a1 ff 4f ee 2e | 4f 3b 9e aa ac 22 2d 9f 1b 37 bc cf 47 d1 ca f1 | 85 86 f8 a5 9e 4a f1 ed 2d 36 8a 97 fa 17 f5 2d | 74 78 21 72 1b 33 88 07 44 c7 17 ee 95 f3 cb cb | 74 32 bb 69 59 ac ab 47 c6 9c ea 80 62 ae 1f 88 | 81 9b 37 d9 2d eb b0 eb c8 de b9 11 87 9a a9 5b | 92 c9 38 b1 30 9b d0 b1 7f 2a dc 10 02 4c 1e 0e | 28 73 54 43 6f 78 74 45 0e 5e 40 cb d7 a1 f6 9b | 8d bf eb b3 ff de 36 ad 5d d5 a1 e7 e2 d9 b6 74 | 11 52 d9 17 88 a2 35 0f d7 23 95 ef eb 8f 58 a1 | ef f0 f0 24 22 5b dd f5 64 21 6b 5a 10 90 d6 b9 | 29 00 00 24 c8 ed 9d b9 b2 64 8b 9d 5d 85 10 8f | bc bb 1d 46 c9 3a dd 35 d0 ed 23 11 cf 06 d9 fd | be 51 4b 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 28 c6 de 25 95 4a 27 58 aa 1c c2 | 15 34 6b e8 d4 2b c8 d2 00 00 00 1c 00 00 40 05 | dc 67 81 1e 74 e8 91 b7 d4 fb 94 8c c2 c6 73 c6 | 89 a9 30 0d | libevent_free: release ptr-libevent@0x7fb344046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3a590 | #447 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 12 e6 81 e7 94 57 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #447 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #447 | rejected packet: | 38 12 e6 81 e7 94 57 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #447: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46910 | handling event EVENT_RETRANSMIT for parent state #485 | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #485 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #485 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49687.592604; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004843 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #485 | libevent_malloc: new ptr-libevent@0x7fb344046040 size 128 "road-eastnet-nonat-233" #485: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #485) | 26 20 85 62 4e 58 16 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 04 a6 43 51 7a 0a e3 68 c7 b6 92 c0 2e 14 67 | a2 f2 cb 51 e5 ce 35 16 88 d3 54 6d 62 23 37 bb | 56 61 2f d6 85 87 83 0f 70 f6 72 39 7f a7 0c c7 | 1e 70 d8 7f 4c 38 fa 53 49 29 41 95 c4 be f2 60 | 8b f1 ad 4f de df 26 c9 05 54 42 92 f1 01 24 5d | 5f 31 21 56 71 00 1c 4f 7f 83 41 cc a7 f5 8b 27 | 25 fc 78 92 10 e8 44 60 1c 59 0a 5b 0b c5 c2 c7 | 8a b4 bc 89 2b d6 59 5c 8c 78 a1 23 dc b0 6c 50 | 12 f1 b3 89 73 06 41 12 b7 a8 52 30 67 21 d0 5c | a9 0e cd 21 2b 24 e0 cb a7 f2 11 99 34 b7 dd 82 | a8 b2 9f 4a 0e 72 6d 9e a6 39 41 fd 0a 77 de bc | 1d a1 ee ad 3a 47 74 75 05 d6 38 42 86 69 10 70 | a8 ff d8 3e 12 b1 c4 88 03 52 77 9f cb 91 9d 87 | ca f5 79 a8 95 63 5f 4e a8 1e 43 7f 48 49 97 d5 | 03 8a 20 ac 28 9d 5a 1c 08 20 6e 33 63 3c ac 79 | a6 2e 32 53 fd 1d bb 3c 94 09 f3 ea 45 51 42 83 | 29 00 00 24 3d d6 d9 80 a2 0e 12 b1 24 d9 6e f6 | 52 8a 26 6d ef 88 17 44 c3 1d 79 ed f7 7c 90 92 | c7 d9 57 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dc 14 52 a7 e7 6d fa 0b e3 0e 97 be | 5d 15 66 8b 43 e6 a9 e4 00 00 00 1c 00 00 40 05 | 6d 80 f6 1e bc 0d ea 94 d1 d1 d0 f0 fd 2d 1e 46 | 86 63 b8 47 | libevent_free: release ptr-libevent@0x7fb388047480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46910 | #485 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 20 85 62 4e 58 16 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #485 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #485 | rejected packet: | 26 20 85 62 4e 58 16 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #485: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #340 | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #340 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #340 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49687.600889; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00699 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46910 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #340 | libevent_malloc: new ptr-libevent@0x7fb388047480 size 128 "road-eastnet-nonat-88" #340: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #340) | 06 b4 2a d6 65 92 42 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 29 a3 64 49 07 ee 29 df 38 b6 8e cf 9e 1e 2e | b5 cf 5c 9d df 90 0b 24 c7 00 d1 e9 e7 d5 9f 86 | b0 59 b0 c3 a3 da d8 a1 12 f7 d8 f8 0e b3 79 c6 | 53 3d ef a8 ea 62 cb cf 67 47 98 25 86 4a be 53 | 9d 43 a7 c0 c8 ef 24 bd 84 89 4d 1e d4 43 4c 6d | a9 e8 b8 a2 ac 6e 98 24 1f 18 dc ca 27 cf d8 28 | a6 29 25 bd 63 2f 94 ef bf ef cd 28 af b3 c4 14 | c2 24 5c 8a a7 98 ce 81 da e6 36 b6 6f 19 b3 9c | 61 e9 12 2d 81 4f 37 09 f9 11 51 0b 0a 15 3c 25 | dc 56 9d bc 1a 37 30 79 ad 58 f9 75 6f 1b 9e ed | af 69 6e f2 46 86 c0 e7 9c f5 ce 51 f7 2f 69 1c | c5 ca c9 df 4e 7a 80 a9 78 c1 72 af 2f 09 7a f4 | 7b e9 80 c9 52 10 9d 4e 28 29 82 d9 cd 16 a6 20 | 67 0a 26 62 77 51 4a e8 62 40 48 56 bb c1 3c 45 | c4 fb 9d d0 c4 57 ec 56 11 1b 76 f9 cd ac 15 3f | 9b 2c e1 a4 49 9f 96 e5 41 42 75 44 0c a4 b4 45 | 29 00 00 24 ae e0 e3 5e aa a2 ee b4 ba fd 41 25 | ff 71 9d 02 44 71 da b9 6c 12 19 98 91 a3 35 04 | b4 f3 15 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 9b ba f5 3a f3 63 5f fe ea b4 e7 | 7e cf 7e 1a ac 8a 91 ce 00 00 00 1c 00 00 40 05 | 7a 1b 4b 67 34 a5 a3 ba cf 0b c3 8e 76 85 1a 07 | b5 81 41 18 | libevent_free: release ptr-libevent@0x7fb3700251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #340 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 b4 2a d6 65 92 42 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #340 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #340 | rejected packet: | 06 b4 2a d6 65 92 42 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #340: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0696 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00cc10 | handling event EVENT_RETRANSMIT for parent state #448 | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #448 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #448 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49687.657281; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004537 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #448 | libevent_malloc: new ptr-libevent@0x7fb3700251c0 size 128 "road-eastnet-nonat-196" #448: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #448) | ea d6 68 25 ae ee 80 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 2e 7f 22 4b d6 ee 79 95 7d ea e6 94 56 fc 59 | 41 1c 12 66 f4 de 00 d4 6a e6 f4 4c 67 01 c3 97 | d7 f0 7f 15 19 52 1c e1 e7 cb 10 43 bf 32 f7 97 | 3f 7d 76 9e 8f 5c 2d a2 10 89 27 a3 31 39 40 6f | 23 b5 50 de a5 26 d5 37 1d bc c7 b0 be 51 02 45 | 35 60 2b d9 a4 52 16 a6 1b 75 6d 90 d7 94 82 b4 | dd 41 db 2a cd 7c b4 ec 00 64 fe 2d 52 b4 ab 6f | a1 8a dc c4 d8 32 f4 27 d3 99 3c 5b 3c 30 47 ed | 06 54 fe bf 5a 80 4f d3 cd d3 63 ab 7a 0a c4 81 | eb 86 4b 9a 37 9c a7 bc 09 9b f1 b6 f5 69 f2 05 | c2 89 b2 f3 ca 58 71 7c 0b b2 02 99 cf da 83 99 | b9 82 4c 58 38 5d 2d be 03 71 b3 5f 32 1a 82 30 | 6f ca 79 08 7e ac dc 25 d6 1a ad 46 a4 8d 7c 47 | 64 b8 24 1d 37 d9 41 0f 8b 4e 16 65 d2 41 4b ab | d2 0e 95 38 92 91 3a 77 ae cf 19 35 ef c9 91 13 | b4 90 b2 24 68 10 9d af 29 52 a9 15 24 f7 4d 93 | 29 00 00 24 f3 0f f3 36 25 a9 50 89 21 ce 62 13 | d8 e8 8d 8d c3 33 f9 d1 62 a2 a6 a0 e9 3e 64 7f | fb b2 90 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 d7 4f 67 97 77 e0 a3 2c fc 24 e7 | 7a a9 1a d4 d3 98 14 3c 00 00 00 1c 00 00 40 05 | 18 00 5b 20 2e 1c a9 8b 56 50 4b 4f f1 d3 fc 60 | 9d dd 28 85 | libevent_free: release ptr-libevent@0x7fb35c023d80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00cc10 | #448 spent 0.175 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea d6 68 25 ae ee 80 d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #448 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #448 | rejected packet: | ea d6 68 25 ae ee 80 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #448: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0762 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b07dc0 | handling event EVENT_RETRANSMIT for parent state #341 | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #341 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #341 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49687.661675; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005255 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00cc10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #341 | libevent_malloc: new ptr-libevent@0x7fb35c023d80 size 128 "road-eastnet-nonat-89" #341: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #341) | 49 c3 42 79 ad a4 02 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 28 2b 3a 23 5f 9c 41 a8 c4 b1 54 27 b8 a0 a8 | a4 06 9f e8 bd 51 0b 54 b6 c3 33 24 5b b7 ea 09 | 0f d7 aa 52 2f c6 c6 78 f1 af 48 22 da 41 1f 06 | 45 43 46 fc b0 c6 2f 1b c2 df 83 35 32 87 c5 a5 | b2 fd 30 3e 95 a2 12 80 00 0f 09 dd 41 c2 48 21 | 60 8b 18 12 e2 f7 cf 1e de 64 8d 80 92 30 17 55 | ad 93 96 5a 50 26 d3 cf d9 c9 40 82 d0 c1 d7 8c | 1b c3 86 4b 02 cc 46 e2 fc 73 8a b5 ae 23 f0 12 | e2 a2 8c 5d c9 4d fa 9f 2b e7 d4 9f 15 6e 8f 91 | 94 64 45 c0 fe f3 80 9a 4c e2 d7 66 20 dd 41 dc | 6b 9b c8 3f df d1 ab 15 c5 36 9b b6 cb 01 6b 62 | c9 d1 d0 ae bf 44 a3 4d 59 dd 52 35 90 0f 89 8a | f2 c1 bf c6 f6 a5 a8 2e c6 a8 d7 de 94 ea f6 00 | 11 3a e4 a5 1c cc 19 f4 1b 95 ff 82 80 6f 79 ae | 97 c0 6f ca 24 fa 61 b5 2e 87 00 ef d7 62 ce 06 | 06 5f 50 40 c4 2f 8b 3a fb 06 a7 11 50 8a 1f ce | 29 00 00 24 b0 2a b8 49 b5 4b c9 98 47 c3 4a b6 | 54 a6 a4 dc f8 8a 35 db 6a e0 ae b8 2b 87 41 53 | a2 41 a5 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e a8 6f b4 ec 17 85 04 80 69 75 d9 | db 5a 4e 4f c9 9c a6 7b 00 00 00 1c 00 00 40 05 | 47 20 cd 59 bf 11 9f 21 41 41 cd 45 1c bb 06 ab | 5f ca 38 7e | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b07dc0 | #341 spent 0.176 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 c3 42 79 ad a4 02 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #341 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #341 | rejected packet: | 49 c3 42 79 ad a4 02 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #341: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0762 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24680 | handling event EVENT_RETRANSMIT for parent state #502 | start processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #502 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #502 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49687.672068; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004051 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #502 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 "road-eastnet-nonat-250" #502: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #502) | 49 84 03 55 33 41 14 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 b6 56 c0 55 c6 5a b3 d0 b1 3a cd 2c 2d f1 98 | 2b 05 72 d6 2a eb f1 a5 ce 1a 6e fe 9b 76 4a e6 | c8 9d 68 cf 67 24 b2 a5 b6 c1 96 48 84 37 b3 8b | f1 39 9c c4 10 9d db 1a 8e 7f b3 36 f3 a8 eb bd | 2b 28 0c da ff 40 e9 6b c2 33 b1 41 cc 82 3c 97 | 2f 0e a7 48 25 26 c1 d7 53 0e 21 ee 94 d4 a0 38 | 49 e2 15 f5 13 68 e2 8a cb ba 80 6b ce a6 00 d2 | 69 7e 9f 04 65 f3 ae 81 71 49 2a 5f 8f ee 09 49 | e3 ff 1b cd 41 64 ae 29 01 91 5e 32 c3 26 78 8f | ea 20 2b 0f 18 2d 0a 1f 22 af 98 ef 92 ff 6a 84 | 62 82 19 1c 56 bf 8b 8e 12 15 12 c1 19 da 4c cd | 49 b3 95 88 b6 66 33 d3 36 cf f2 bd 45 7d 72 a1 | 21 21 16 69 39 89 66 de 9b 3d 56 7f ea f5 ce 47 | 7a 2e 75 2e cf 9b 6b 32 55 e0 ae 5b c0 56 2e 7e | b8 fa 3a ca aa 83 6d 0a b9 cf d2 e5 75 34 ef 7c | fd ec 25 52 b8 3d 7b b9 f7 15 a6 0a 76 51 86 5e | 29 00 00 24 9b c1 28 9f 3d 89 a9 b6 3e c7 19 65 | 88 8e 41 03 11 21 a9 0f 26 57 6b e7 b4 25 21 32 | 2d ba 55 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f d1 0c 18 0e bf a2 52 1e 5c d3 e7 | df 48 7e 58 7f 45 57 fd 00 00 00 1c 00 00 40 05 | c9 7e 47 3a 28 a9 19 bc aa dc fd 65 a2 d8 10 d7 | 15 14 41 45 | libevent_free: release ptr-libevent@0x7fb388032bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24680 | #502 spent 0.176 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 84 03 55 33 41 14 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #502 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #502 | rejected packet: | 49 84 03 55 33 41 14 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #502: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0713 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b650 | handling event EVENT_RETRANSMIT for parent state #486 | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #486 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #486 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49687.734477; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003817 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24680 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #486 | libevent_malloc: new ptr-libevent@0x7fb388032bf0 size 128 "road-eastnet-nonat-234" #486: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #486) | 87 db e2 36 7c f0 df 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 90 89 1b 08 ac ff df cf 1e a7 4d 7b bd 33 5b | 51 13 dd 15 4f 57 c0 96 90 46 35 66 7c 24 f4 e0 | 0c 27 ca 38 87 f2 ca ce 3e d5 b4 13 12 b8 2b 1b | 28 cd b5 9c 97 fa 99 ff ca 60 2f 08 57 c7 43 0b | 9a 34 8d 0f cc d3 42 7d 8a 9b 18 49 af 87 e5 0e | 60 54 d2 dd 0f 77 79 0a d2 62 1d 4b f7 af 36 a6 | 89 10 0e 96 5f f8 fd fd c0 0b 1a 57 52 e4 05 54 | 7c e7 03 a6 04 47 19 3c 81 63 a0 84 35 98 42 90 | 1a 22 7e c6 ee 29 1f d0 fe 05 cc 68 66 1b 8e f3 | 6e 04 59 7b 5f 87 c4 be fb a5 8a bf 90 3d eb 9a | 35 8c 2c 40 b3 8e 63 fe 5a 3c 42 89 30 d7 70 57 | 1f 4d 37 52 6b 1c 17 6b 78 dd b4 c8 f7 a3 15 58 | d1 aa 66 b9 5e c1 c5 d0 ba 3b 05 d7 77 a7 0a 2d | c3 f0 02 14 1d 1a a8 4d cb aa 4c 7b 62 3a 6a ee | 7e 4e 1c cb d8 20 d4 75 37 c5 87 d5 04 ca 68 48 | 13 39 48 6c 64 d9 b7 94 e9 df 23 f3 33 69 d8 cb | 29 00 00 24 46 3f 4a dc 6e 3d 21 da c5 52 80 db | 79 4b 94 5f 60 de b7 f2 05 82 ab f1 57 25 79 09 | be 52 68 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e eb dd 20 f6 4f aa b4 b9 d1 56 e6 | 84 4d e7 2c 87 e1 c1 3c 00 00 00 1c 00 00 40 05 | df ec c7 42 be d0 10 8f c9 07 5b a9 94 d2 5a 2d | 6d 05 27 19 | libevent_free: release ptr-libevent@0x7fb380032bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b650 | #486 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 db e2 36 7c f0 df 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #486 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #486 | rejected packet: | 87 db e2 36 7c f0 df 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #486: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c012890 | handling event EVENT_RETRANSMIT for parent state #342 | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #342 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #342 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49687.750777; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005511 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b650 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #342 | libevent_malloc: new ptr-libevent@0x7fb380032bf0 size 128 "road-eastnet-nonat-90" #342: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #342) | 92 0e 5c 44 35 6f 61 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 4b 3f 50 56 cd 4f c8 69 53 e3 02 d0 e2 c4 4b | b8 26 12 0d 2f 95 d4 df 65 d2 22 1d a5 8a 76 36 | 0f 44 f3 88 67 5b a4 93 af 87 fb e7 03 3d f3 3d | ce 49 25 06 46 21 51 fe e6 a5 e0 3f 25 17 b0 d7 | 71 9b 71 32 36 21 5f b7 2a ee 25 9c 8a 04 76 c2 | 55 e4 ab 4e 7c 02 05 d1 d2 21 09 a2 51 a4 92 f0 | 79 2b 73 03 6e bc d5 33 3d 90 f5 1b b7 cb cd e9 | 74 b4 08 87 c4 a4 7c ab 86 b2 e8 fe f3 2e a7 14 | da 5c 13 a2 0a 83 be 25 a6 25 48 21 ec 98 11 c6 | 1d 49 83 e7 e3 39 34 26 fb d4 24 cb d2 66 1f a9 | 8b 7b 97 28 60 bf e3 df fc be 83 7a 91 a4 90 3a | af ad 2d 44 70 c8 0c 11 ab e1 87 f9 88 5b 04 d8 | 04 03 d4 08 d3 e9 32 2b 30 9c 93 90 d3 62 4a 73 | df 00 65 61 53 f7 33 9c 73 ad fe 53 5a 29 aa 93 | da 76 97 14 51 4b d0 f8 fb 54 f6 6e 4f 99 ad 4b | 75 e5 97 56 5f 2e 08 fb ed 71 37 6a 4a ad d6 62 | 29 00 00 24 02 01 86 b0 0f 40 c1 16 7f df 21 87 | ce a9 58 2f 27 7b 28 e0 c6 1c d2 35 82 80 ac e4 | ab 80 e7 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 56 62 15 04 08 91 44 63 ec 81 3e 0b | 9f 8e c8 3c d5 eb af f0 00 00 00 1c 00 00 40 05 | 60 c3 81 cb a9 a6 9e ac 92 76 43 f4 51 0d 3b 6e | 52 02 3f 95 | libevent_free: release ptr-libevent@0x7fb36c03a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012890 | #342 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 0e 5c 44 35 6f 61 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #342 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #342 | rejected packet: | 92 0e 5c 44 35 6f 61 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #342: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3700407b0 | handling event EVENT_RETRANSMIT for parent state #449 | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #449 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #449 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49687.752118; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003791 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012890 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #449 | libevent_malloc: new ptr-libevent@0x7fb36c03a770 size 128 "road-eastnet-nonat-197" #449: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #449) | ea 52 41 06 29 be 32 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c f6 72 22 70 e3 8e 6a 67 c3 d0 4a 0b 7f 5b cf | 2d 68 56 81 95 56 3f 4d 2a 1e 61 1a 59 76 f5 26 | 54 d5 6a 01 f4 8a a1 63 50 3e a3 b6 d1 85 12 bf | 8c a7 c8 b2 9c d2 7e 12 ce 8a 8f 97 a7 10 c6 36 | 55 54 39 bd 73 f0 07 97 c0 8f d8 2f a2 5e 50 05 | cb 9d 1a b8 ce 20 6a 30 ff 7d 3d 2a 89 9c e8 f9 | db 68 6b e7 d3 12 f3 5c 42 81 cc 9e c7 d6 ab 3b | 07 00 72 f9 2b bb 2c 8f 88 74 45 a7 1f 5a 2d 17 | 94 3e ec e0 ce a9 ab 72 79 45 76 ba 8c 1f 40 56 | 6d 7a 46 42 83 af a1 98 c5 23 1e 58 16 d7 79 25 | b7 cc 17 53 0a 7f 1c 45 dc 0f 11 52 e6 bb 5f 53 | 8d b5 f6 fb 27 2b 60 33 a4 cd 4d e9 7c 6b 4b 17 | 81 ec cb ca e4 d2 97 9b 61 33 64 a7 c9 1d 12 b0 | ff a4 81 cf f4 75 a2 54 63 07 9b 1c 61 4f 70 9a | f2 61 b3 19 96 98 3c 7b 44 1f aa 65 b4 bf d7 a8 | 55 c2 75 de ff 71 8c 90 1b 3c c3 a8 3f fe 54 f3 | 29 00 00 24 43 77 8d 20 c7 95 c9 d5 6a 2d 87 1f | da 3a b4 7e 55 a2 17 ed 53 70 56 79 ef 21 f9 7e | 28 b4 26 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 9b 7e ce 31 a7 8d 1a 50 79 db 89 | b3 07 e5 e2 b0 c0 20 fc 00 00 00 1c 00 00 40 05 | eb cc 39 a0 b6 a4 78 79 56 5f 29 29 93 1e cc 18 | 29 12 ff 3b | libevent_free: release ptr-libevent@0x7fb37003f490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3700407b0 | #449 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 52 41 06 29 be 32 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #449 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #449 | rejected packet: | ea 52 41 06 29 be 32 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #449: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0399 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a73690 | handling event EVENT_RETRANSMIT for parent state #503 | start processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #503 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #503 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49687.781371; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002195 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3700407b0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #503 | libevent_malloc: new ptr-libevent@0x7fb37003f490 size 128 "road-eastnet-nonat-251" #503: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #503) | de 1d 8d 29 e2 13 e9 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 bc c5 bc ee 45 af a6 73 6a 90 e4 26 1b 45 74 | 00 ed f2 a3 ec 74 88 4b c9 51 b5 6a 38 9f 0a f7 | 89 96 66 a1 cb 3b 36 71 3c 50 00 7f a8 a1 27 84 | 14 72 85 f0 e9 87 92 95 57 d6 bb a3 9e eb a3 89 | 3b d6 9d 72 8e 22 b1 43 7b 48 2b 91 a9 6c a2 71 | 4e b7 05 32 94 32 e3 1e 78 6c 29 24 39 3f 29 25 | a5 fc 7d 8a 16 8c 7f 3c 9e 88 a1 a2 0f e7 3d e7 | a6 2a 71 17 3f ba 2d 1e 73 4a af 59 81 2a 33 e7 | 7c 6b a5 a6 c7 0d 60 09 fe 4a 3a c4 ae f0 db 28 | 63 c7 99 7d c2 1a 2a f5 ca 34 59 14 08 64 3e 0e | 9e 8a 9a 95 bb 9d 48 ef fa 38 ec e3 2c 15 34 9c | e9 d6 59 e6 ff 43 a4 b1 2b ff 91 b3 04 3b c1 be | 1e 15 0a dc 58 8d 95 f6 06 1e 22 79 23 6e 88 9c | fb 5f 8d 89 36 69 ab a3 c4 17 6b e8 27 27 43 a0 | 64 a3 07 0b 2b f0 22 81 09 20 24 c8 81 c7 b3 70 | 64 46 cf dc 25 f9 42 3b 6e b0 ff 34 aa 9a 20 98 | 29 00 00 24 e0 7e ea 52 c4 af 5e ed 64 d4 0d e7 | b4 32 8f da 7f e4 cd 7f 6e 0d 4f bd 11 1c 8f fe | 10 1a 14 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 eb 39 3d 04 da 34 34 c4 55 20 7b | 97 62 11 e4 f5 1f 2c 3d 00 00 00 1c 00 00 40 05 | 56 4f 2a b1 95 be 94 04 9d 7b d6 c2 f3 45 b1 7e | d7 05 c2 82 | libevent_free: release ptr-libevent@0x7fb34403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a73690 | #503 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 1d 8d 29 e2 13 e9 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #503 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #503 | rejected packet: | de 1d 8d 29 e2 13 e9 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #503: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38800feb0 | handling event EVENT_RETRANSMIT for parent state #343 | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #343 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #343 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49687.828678; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005186 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a73690 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #343 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 "road-eastnet-nonat-91" #343: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #343) | ae 78 c6 a9 8f e8 66 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 9d b8 ed 06 43 12 ec 4c 45 2d d2 98 f8 e4 c2 | 36 59 63 a7 5a 33 ff 67 e3 f9 f4 1f 01 a9 3a 4c | 55 90 c8 83 a0 29 a8 aa 4f ac db f2 6f 11 94 39 | df dd ed a8 03 f3 60 cc f4 5f c8 16 76 2c 18 b3 | 52 5b 1b ac 7a 46 b0 6c 28 af 43 e8 e9 1f 42 2d | 46 d8 e4 d3 78 66 14 97 ce c1 cd 0c 3c 65 65 46 | 46 82 84 7e d0 a7 70 e0 17 0f db 9a 4e 29 93 92 | 21 22 73 35 c9 ca 2f af 9d 0a 64 5c 81 08 63 7f | e9 bd 70 7e 9e c2 db 6e 8e 2d a9 2d 3d e8 0e 81 | cf 97 9f 13 45 5f d0 17 a5 46 81 8f f6 9c 9c dd | 6d 72 b6 df 14 55 64 61 52 e1 4b 46 36 b7 06 8a | 6d 94 56 ae f7 f9 54 fa 14 95 61 ab b8 b6 ec c3 | e8 2c f9 02 e7 ab 10 28 9e 67 38 42 93 d6 89 7e | bb 6a dc 83 42 00 3f 72 de b7 9e 71 be 55 39 21 | 54 8b a5 97 b3 b2 06 f8 5f 7f 26 67 9a c1 3f 7e | 51 39 34 0f ac 86 ce 7b e6 99 54 4b 79 6e 8f 0a | 29 00 00 24 65 6f dc 77 c3 29 54 5a 74 6e 49 3d | 05 2a fe cf 26 c9 29 fa f4 9d 54 09 a5 a6 15 69 | 11 b4 0e 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 ad 81 e7 cf f7 25 7c 0f 5a 2a 07 | aa 17 3c 2f 54 ca c3 2d 00 00 00 1c 00 00 40 05 | 5d 1d e0 9d fe 43 fa fd 70 69 f4 3c 05 77 9a 1e | 38 96 d9 39 | libevent_free: release ptr-libevent@0x7fb384032b00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800feb0 | #343 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 78 c6 a9 8f e8 66 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #343 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #343 | rejected packet: | ae 78 c6 a9 8f e8 66 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #343: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0554 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #450 | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #450 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #450 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49687.839984; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003733 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800feb0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #450 | libevent_malloc: new ptr-libevent@0x7fb384032b00 size 128 "road-eastnet-nonat-198" #450: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #450) | 6c 66 54 70 e3 85 47 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 7f 52 be 1b be 3e b4 95 6c 7f ea ce 79 84 79 | bb 2c a4 22 02 14 1a c7 80 c9 fc 63 a2 df a7 b4 | 1d c3 3e 47 98 35 3a c5 6d 01 79 cf ce 3b ed 3f | e7 fc 21 90 6a 8f a9 37 0a 15 57 ed e5 84 6d 80 | bc b0 af 24 80 0c 58 35 20 db 3e aa 64 ad 44 83 | d9 34 7e 33 a0 1c 88 af b7 63 e8 97 42 89 19 cf | e1 51 ee bc 36 b3 3f ea ae 0a 36 ea 2a 42 b5 d5 | 2b 9d 6c 67 c3 b5 e3 5c 88 ec 08 73 1a b8 90 c6 | eb c9 08 93 4a fd 61 5f ac b7 cf 92 b0 ce 44 08 | c5 ea 9d d1 33 ae 08 3a 55 1a 54 74 ee 06 12 8c | af 05 f1 32 8b f9 ad 76 e7 15 cf bb 56 d8 0d 22 | aa bf 8f d9 bc 81 33 05 b5 ca b2 64 e4 57 c2 aa | 8a ce 60 a9 03 71 24 23 e8 e9 eb 0e f3 fd cb 40 | 57 21 41 6c 87 a4 12 87 6c a3 20 f1 71 99 97 a1 | c9 bf 28 c9 61 1f 0e d1 0f d5 eb 18 2d 83 11 2c | a4 a9 46 db 50 5e 63 04 e8 1e e0 10 c3 22 6d 3c | 29 00 00 24 60 b3 78 69 cb 9c d2 f7 d6 cf 6b 51 | 75 18 c5 a7 1c 11 fb 00 38 fa 43 80 05 51 ec 75 | df 66 73 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 01 2f 17 96 36 9a 51 cd 6f 6e a8 | c1 69 8d 8a 84 17 97 6b 00 00 00 1c 00 00 40 05 | 07 24 02 da 94 a8 c8 5e ad a8 39 f9 98 2f 5a 91 | 01 02 06 a3 | libevent_free: release ptr-libevent@0x7fb3540300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #450 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 66 54 70 e3 85 47 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #450 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #450 | rejected packet: | 6c 66 54 70 e3 85 47 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #450: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46af78c0 | handling event EVENT_RETRANSMIT for parent state #487 | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #487 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #487 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49687.905294; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002915 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #487 | libevent_malloc: new ptr-libevent@0x7fb3540300e0 size 128 "road-eastnet-nonat-235" #487: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #487) | b2 6f 13 91 c3 04 27 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e b7 3e 1e ea 4f ea 6c e1 7a 2e d9 d3 3e f9 00 | 00 b2 10 a9 bd 14 73 d0 5c 75 d0 f7 e2 0a 9c 29 | d2 44 ca 2c 07 7b 68 53 85 c3 d3 3e bc e8 07 6e | cf f2 af a9 1e bb 29 51 6a f7 01 6c 37 1e c0 ab | 85 0c c2 bf ee 4c 81 52 aa 15 a7 f4 22 68 ab 13 | 48 79 2b 77 d6 1b 5b ea 43 58 e3 de cb b3 22 8f | 5c c4 4c 56 f3 fa d5 2b 81 01 8d d3 c1 a0 72 c2 | 36 97 f9 30 4e b1 e3 4c c3 9f 76 1a 47 e2 4c 66 | 36 1c 6d 84 88 a7 c0 e7 e9 9d 4f 1d e0 c1 e1 ff | 39 d2 b1 a1 49 e4 09 1c dc a0 a7 cd 71 c8 f9 bc | 3a bc 26 2f 4d d5 40 96 f5 89 a1 c7 d3 3a 43 fd | 96 7a 1b 6f d9 4d de b2 44 44 32 65 9e 2d 89 e0 | 92 3a f7 8d c2 fa 4d 91 90 40 ba 6a ed 04 a1 1b | cd 46 17 18 d0 bf 88 e4 f7 cd 2c 44 55 8e 08 a0 | 65 d8 55 af e5 2c 13 03 b6 20 5e 95 aa 08 a5 20 | cd 27 5d 2b dd 8b b7 c9 7d 2d d5 bb 14 9f 9e 7c | 29 00 00 24 f2 e1 64 3c 35 1a 4c dd 7a 16 43 23 | ae 79 36 f1 02 a6 51 17 6d d2 ae 67 32 63 24 20 | 73 fc 22 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 4a 35 08 41 af be cf 3c 4d e0 85 | 28 9e fb 5b 11 1f 06 99 00 00 00 1c 00 00 40 05 | 95 f5 24 fe 51 05 47 87 18 ae 0d 13 a0 36 38 27 | 84 c2 41 68 | libevent_free: release ptr-libevent@0x7fb380048a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af78c0 | #487 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 6f 13 91 c3 04 27 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #487 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #487 | rejected packet: | b2 6f 13 91 c3 04 27 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #487: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38000f8f0 | handling event EVENT_RETRANSMIT for parent state #344 | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #344 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #344 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49687.909599; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006857 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af78c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #344 | libevent_malloc: new ptr-libevent@0x7fb380048a80 size 128 "road-eastnet-nonat-92" #344: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #344) | 60 fe 47 d5 bc 7e ec f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 bf a8 75 45 e6 9b 9e 36 c4 f8 00 7b fa ed 16 | 45 48 19 73 f0 43 47 d5 85 f3 cd c8 97 6e 50 a8 | 7b 63 a3 ce ea 05 ae 44 e5 a2 e6 29 a8 16 bc 48 | 78 95 49 07 f7 17 ad 10 48 2e fd 23 74 21 44 c0 | b4 d3 48 b2 fb bc c3 28 df 8a d3 09 ec 63 04 28 | 7e 5a 51 87 52 03 32 ff 61 0c 39 ac c3 26 d9 35 | 88 8a 8d fe 64 9e 7c 7f c3 22 7b 8b 9e 96 8b 3d | b8 ef 81 b1 6a 3f 8a 50 49 73 5d ab 49 f3 99 5e | ad 5d e8 43 6f bd 70 02 a0 6f d4 12 c9 ee f2 55 | f1 fb cb 6e d0 ab 61 ad a4 39 c4 fa f3 3f c7 bf | 5f f1 ac db cc 36 aa 36 32 7b 50 a5 5a 12 e0 c2 | fb c0 54 26 8a e0 81 02 71 55 03 a2 11 c1 ce 2c | 62 50 df 4c eb da 5d 3d 81 bf 56 fd c4 6a 45 b3 | f3 c4 00 14 0a f0 d4 72 ad 8f 3b 97 e7 25 ea 81 | 48 23 bb ad 52 e9 90 df 74 31 fa 3e 85 2d 9b f0 | 97 f2 67 07 62 f1 e0 1b eb 9c 9b f7 2c 83 46 40 | 29 00 00 24 59 47 a1 36 35 51 2c e7 ec 59 96 c4 | c5 6a 0f fd 9f 62 7d 5e ad fa 8e 0f 35 43 8c 01 | 6a c9 a8 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 37 18 00 bf d4 a8 37 15 69 ae 4c | fc 2f e7 92 f0 22 70 f2 00 00 00 1c 00 00 40 05 | 33 e5 40 5c 05 2f 5b 7d e0 96 06 6b 07 18 0b d5 | ca 3f e3 4a | libevent_free: release ptr-libevent@0x7fb3800211f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | #344 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 60 fe 47 d5 bc 7e ec f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #344 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #344 | rejected packet: | 60 fe 47 d5 bc 7e ec f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #344: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_RETRANSMIT for parent state #504 | start processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #504 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #504 keying attempt 2 of 0; retransmit 3 | retransmits: current time 49687.916869; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004283 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #504 | libevent_malloc: new ptr-libevent@0x7fb3800211f0 size 128 "road-eastnet-nonat-252" #504: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #504) | da 55 48 8d 90 bf 21 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ac 2a 4d 0b 8b cf db e8 71 42 c9 12 73 26 89 36 | f8 7e cd c8 1c 11 8c 7f 9e 09 ce 55 92 dd 78 d1 | ad 59 d2 ee 94 4b 61 50 a3 e8 9a 12 3c 5e 9b 79 | 67 a9 ab b1 17 c4 72 5d 57 f0 6b d6 9d c6 6d f9 | 38 2a f7 f8 e2 f3 15 e5 73 fa 8b 4d 1c fc cc ab | b7 f0 3b 90 c7 95 ba 20 f3 82 29 0e d5 86 2e 2f | d3 3d 1a 6e 6e 68 d3 8e 2c 1e 30 d3 3d 1a 4b 7f | 07 51 04 a3 cd e1 e4 f3 6b 81 ac 0e 5e 25 fc a6 | 2d 49 a3 1d 9d 7f 10 1c b8 aa 6d 0b 48 63 e7 ab | 47 28 bd cd 66 43 28 3d 25 f6 20 56 e0 bb 73 1a | f5 3a ee c2 95 1c 1f 57 8f 41 e9 d9 d4 e4 b4 be | f5 98 c0 78 1e 91 5d ba 02 2c 3a cf 04 e6 44 c6 | a4 f1 83 88 9a 45 b6 e7 89 2b 45 be 54 48 e8 52 | 9b 95 05 7a d4 dd af 6d 96 db 42 ed db 5d 0c bc | 83 61 0a c3 fd 33 2c bd cf 88 1b 95 c9 43 7a fa | 73 7b 7d 2e f9 6a 53 94 78 2b 4f 21 f2 f3 1d f2 | 29 00 00 24 61 bd 30 86 3d bb 50 44 5f 1b 26 2e | 52 63 1b fa b0 23 2c cb bf bc 70 41 cc 6b 00 dd | 9d aa 60 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd b5 bb a3 b0 15 ca 04 17 91 f9 55 | 5a 59 4c 3b fd 4e 4a c4 00 00 00 1c 00 00 40 05 | 47 4d 62 c8 1d 9c 5d 27 1b 5d ed df fb db c8 62 | de eb 87 79 | libevent_free: release ptr-libevent@0x7fb34400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | #504 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 55 48 8d 90 bf 21 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #504 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #504 | rejected packet: | da 55 48 8d 90 bf 21 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #504: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3380300a0 | handling event EVENT_RETRANSMIT for parent state #451 | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #451 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #451 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49687.956112; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003884 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #451 | libevent_malloc: new ptr-libevent@0x7fb34400cf80 size 128 "road-eastnet-nonat-199" #451: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #451) | ba 7b a0 b0 99 57 b7 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 86 c1 bd 46 53 16 86 81 3c 90 d2 1b d5 72 d6 | 90 46 2b fe 71 0a b5 92 27 f1 2a 98 1f 0b 9c 86 | b4 73 fd 62 b2 c4 76 72 65 dc a3 4a 74 c5 fd c6 | 79 b7 24 8c 57 9e 68 29 d1 51 ef 41 d9 35 5f e0 | 38 61 4f 5c 38 99 a1 c4 18 39 cd 7c d3 ce 2b 13 | fc 9c 47 13 18 41 cd b0 e2 7f c5 8a 64 72 a5 44 | 53 3a 53 2d 27 d7 7b 2d 79 06 40 fe 3d 6f 0c 91 | d2 44 b7 35 de 08 ea 0c 51 75 4f ac 93 26 ff 1a | 9b 0e 24 d8 14 0e 9a fc f6 cc 0e 9a dd d9 b9 d2 | 1b 38 2f 39 cf f5 c7 33 b5 34 1b 0e a3 9e 16 b5 | a1 af 82 8d 2c a9 ce 6b 79 b5 5c 3b f7 3b ae 09 | 38 95 45 10 35 73 6b 75 72 ac 01 d0 d8 9c 2a 56 | 79 52 8f 61 80 9d ac 4d cd 53 ef 84 96 01 18 60 | 62 4a 3f 8c ae bb 58 49 e4 bd 6c ac 5f b8 ee 89 | d9 a3 21 bd 37 79 80 9b e7 e0 92 c7 ad 63 83 e1 | b3 a4 a9 38 2d 78 59 50 55 18 b3 a6 f4 4b 9a 44 | 29 00 00 24 c0 83 9a b8 91 8b 33 7b 3e ca 3c 3c | 55 1b 13 ae f8 60 71 22 6b 87 6a 60 f0 da d9 ee | 56 ce cf eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 64 e2 2e 4b 98 7a a3 19 bf 09 d8 | 5a 5f 60 9f 04 ef ea a4 00 00 00 1c 00 00 40 05 | f6 42 3e 9c 74 68 a9 db 08 24 19 e3 18 ae 01 16 | fd d2 98 25 | libevent_free: release ptr-libevent@0x7fb33803a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3380300a0 | #451 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 7b a0 b0 99 57 b7 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #451 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #451 | rejected packet: | ba 7b a0 b0 99 57 b7 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #451: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c017ea0 | handling event EVENT_RETRANSMIT for parent state #345 | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #345 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #345 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49688.032489; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00564 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3380300a0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #345 | libevent_malloc: new ptr-libevent@0x7fb33803a770 size 128 "road-eastnet-nonat-93" #345: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #345) | cc 1b db ff 37 55 f7 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 67 e9 25 ad 99 4c 76 71 a1 a8 5d 6b de 51 32 | eb 5c 8d 84 1c 3d 17 6c c1 5f 62 71 5b 44 16 fb | e4 d2 85 4c 64 49 cc e5 df 14 a2 74 3d 7a c6 c8 | 61 7c 32 bd 88 6d 99 62 9c 43 b2 d1 2b 52 46 39 | c0 c1 fe 0b d3 8c b7 41 43 fa 07 e4 ca 66 08 b9 | e3 73 79 86 ee fe 88 31 4e 3f 00 50 43 af ba 2c | 0f 81 55 13 ff ba 58 17 5f 8e c8 12 2b 5c fa c6 | ef 92 c1 91 f7 d8 64 09 28 37 f9 29 29 da 06 11 | 98 a0 90 28 27 02 35 70 61 dc cd b3 af 6b a5 cc | 33 40 2b 71 fe b4 6e 27 bc 87 0b 2e 49 cd 22 6a | fe 62 e7 dd 24 a7 1f 41 fb 60 e1 86 0c 80 50 0b | a0 a0 c9 f7 8f 75 a4 e1 64 72 0c 28 9b b9 6c ed | 86 a3 26 05 ab b4 ae 03 ec cc ce 40 59 4c 63 89 | f5 0c b7 8c 77 de 51 59 14 48 7e 85 50 2b 34 5c | b7 79 6c 71 db 1b 6c 37 06 89 c8 05 98 a4 3e 07 | 39 20 3f 60 a2 a7 3c 0b 2f 8f 18 e7 35 c0 2b f1 | 29 00 00 24 20 33 be 81 19 1f 5e fe 6d 68 36 2c | 95 1b cf 17 03 6e cb aa fd 3d 3c 1f 01 7c 3e 25 | c7 e0 c9 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 24 83 28 6d 9e 08 a8 13 dd 36 c1 | 4e 58 4a c0 e0 a3 35 28 00 00 00 1c 00 00 40 05 | 65 c0 95 0a 9d 33 80 de 00 4a d8 7a 37 18 f6 5b | 66 48 2b 46 | libevent_free: release ptr-libevent@0x7fb36c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | #345 spent 0.185 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 1b db ff 37 55 f7 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #345 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #345 | rejected packet: | cc 1b db ff 37 55 f7 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #345: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0789 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a647d0 | handling event EVENT_RETRANSMIT for parent state #488 | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #488 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #488 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49688.04097; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005273 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #488 | libevent_malloc: new ptr-libevent@0x7fb36c04b850 size 128 "road-eastnet-nonat-236" #488: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #488) | 37 96 ab d6 53 2a 39 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 6b 02 0e 68 a2 59 8e ba 48 ba 2f 59 6f a7 3c | 62 72 7d 7b ba 57 b5 e0 3c d9 c3 81 1f a5 eb a0 | f8 e0 f8 99 8d 15 bc f0 8d dc 6f 5a dd 58 1a 52 | b1 f2 33 db c0 8e 7c 70 83 0a 45 59 7c 30 22 a6 | 4a 21 8b 6d f6 eb 16 6a d6 89 72 dc 49 39 de 06 | cc 4d b2 f5 ec 39 f7 23 79 4b 87 b1 ad 07 ab b7 | eb 0d d8 4d 26 fb 93 ca cd 4a bf a4 0c 85 96 15 | f6 27 7e a1 82 03 aa 6b de 0f cd 15 f2 d7 a2 0e | 43 09 8a 10 1e 3f 10 cc a0 c3 3f de 84 91 b8 33 | fb 7f 27 17 12 4f 19 a8 95 31 dd 5a ae 2b f7 bf | a0 0e b0 af 11 39 af c9 5f a1 36 16 28 49 42 30 | 1e a5 ef c4 10 5d 29 3a 47 d6 e6 ec dc fa 0d fd | c5 f6 87 7a d9 cf 3f cd c0 47 6b 05 d4 2f 0b e9 | 27 07 f2 3c 1c ec 19 6e 68 a4 e6 aa 11 7d e2 91 | 40 12 52 80 36 b2 87 db 98 ff 4a 69 c8 e6 41 e0 | 2d e0 85 d9 a0 b6 39 d4 ec ac d1 39 5f ba 20 a9 | 29 00 00 24 dc e4 9b d4 65 6a e5 2d e1 02 7e 1d | 58 fd 85 52 51 90 f6 a3 d4 da ed 1b d4 69 62 73 | cc 62 0f e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf c6 06 73 dc 37 37 47 57 31 78 5c | d0 36 ae c0 4d 18 ea 5b 00 00 00 1c 00 00 40 05 | b3 8c 92 9f c3 4a f6 44 a7 cb 92 6c 4a 1a 77 59 | 02 36 0d d7 | libevent_free: release ptr-libevent@0x7fb368023a60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a647d0 | #488 spent 0.202 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 96 ab d6 53 2a 39 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #488 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #488 | rejected packet: | 37 96 ab d6 53 2a 39 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #488: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0892 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368024000 | handling event EVENT_RETRANSMIT for parent state #452 | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #452 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #452 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49688.04548; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003355 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a647d0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #452 | libevent_malloc: new ptr-libevent@0x7fb368023a60 size 128 "road-eastnet-nonat-200" #452: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #452) | 50 11 a1 bf ed cc 03 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 8a 76 57 c4 9b d0 38 b9 d2 c2 4b 69 ba e2 a2 | 5a 11 4c 0a 45 a5 bd e6 9d dd c0 17 e1 2d b4 38 | 58 7e 63 fb 2b 24 a5 63 e6 a8 3b c4 4f a3 78 62 | 66 71 ba 53 c3 c9 09 13 5d ce 86 73 ab 12 87 fa | 35 c6 ff 8b 42 89 25 72 85 e2 b1 87 71 47 d8 8c | ac 7e ee 22 cc e1 04 85 55 54 54 b2 e0 ad d5 39 | 0a fc 74 d3 64 5e 05 35 2e 1a b0 95 d1 38 f8 9d | e0 83 e6 f4 e2 39 cf ac 1a e7 54 52 1b c6 27 82 | 61 87 37 7f 47 a3 e4 be 08 d5 c5 1a f3 6f 8c 8b | 63 33 54 b5 d2 c3 52 ce c9 11 04 d4 3e 44 cf a0 | cb 89 ea 96 9d 4b f1 9d 8d dc 98 07 bd 7b 2f d6 | 8f 69 b2 51 af f2 60 a1 de 25 ef d3 5a 7c e5 c5 | 23 56 16 2b d4 22 e3 1f 96 12 60 85 a4 b1 18 7f | b7 c2 db 59 66 51 fe 4e 85 1b ae a3 40 84 80 d2 | d2 e6 e1 c5 9e 39 9a 1f 42 76 d0 90 ba 8e cc dd | 5a 7b 9a 97 d8 6d 8b db 68 e9 10 8f 2c 64 9d b8 | 29 00 00 24 ba 51 08 92 39 ed 80 e6 57 c3 97 3c | b4 4a b0 29 f6 7a 02 bc 32 31 68 fb 36 27 e7 7b | 80 17 94 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 cf 89 69 b2 6f 00 24 ae 75 3b 9a | 3a b6 ca 28 54 7e 11 99 00 00 00 1c 00 00 40 05 | 3b ea 73 3d bf 95 ec 19 18 d5 48 b2 c7 6d ef 5f | 10 2b 0f c2 | libevent_free: release ptr-libevent@0x7fb368046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368024000 | #452 spent 0.224 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 11 a1 bf ed cc 03 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #452 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #452 | rejected packet: | 50 11 a1 bf ed cc 03 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #452: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.11 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #453 | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #453 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #453 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49688.105096; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004697 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368024000 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #453 | libevent_malloc: new ptr-libevent@0x7fb368046040 size 128 "road-eastnet-nonat-201" #453: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #453) | ce fd 6b dc 43 f9 b6 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a fe 9f 71 b9 6e 69 49 23 6a d5 87 63 a6 2d 80 | fc 10 3a 5e 08 f9 cc a8 36 72 0a 5b 2e 86 63 13 | 40 48 02 71 3c 66 28 bf ad d7 fa c6 30 96 5e 17 | bf a0 d6 3f 57 20 44 4e e4 00 ed 65 d2 4f 08 d6 | 20 51 fe 4a 66 fa 02 8d 06 00 db e7 45 a0 fc fc | 8c 97 f6 4d f7 77 a5 6a 79 27 5b a0 e1 46 fb a6 | 23 99 9c 26 32 43 cf 04 80 58 6f 87 cb a5 6d d2 | 76 b6 f1 d1 81 44 27 9c 99 67 9d 01 ca 24 01 04 | 53 a4 a4 40 53 47 8f 99 18 29 ec f0 3e a1 86 13 | dc e4 8b ba 11 0f e1 c3 4b ee 52 62 b4 64 8e 2f | 66 5c ba 6c ee 04 04 ed f9 bf cd 94 0a 45 b8 40 | e4 22 f5 d1 d6 df 3a ed ce c6 15 28 b6 04 76 04 | bd c3 75 e8 63 e6 45 74 6f 79 fc 8f 52 0e 1e 14 | f2 bb ae c1 f9 bb 75 83 86 a8 ff 0c d1 f1 5d 0c | a0 ce 81 b4 8f 58 61 e5 9f 60 57 7c c4 7a 6c 26 | 0d 77 a8 c6 b2 9c 49 0c ea 36 61 b7 06 0a 10 da | 29 00 00 24 e4 ac ab 1b 0b c0 0c 13 54 30 d6 3f | 0a a4 17 49 c8 c8 1a 8d ae d5 3b 39 11 5a 2a f6 | e8 ed 91 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 76 3b e4 72 b5 b8 a8 50 2a b0 80 | 46 e6 9d 5f 02 57 8f 98 00 00 00 1c 00 00 40 05 | 9d b5 75 60 1a f1 a6 46 0c b9 85 72 c6 f1 03 f3 | 4e 7a aa 51 | libevent_free: release ptr-libevent@0x7fb354035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #453 spent 0.429 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce fd 6b dc 43 f9 b6 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #453 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #453 | rejected packet: | ce fd 6b dc 43 f9 b6 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #453: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.215 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #346 | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #346 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #346 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49688.141037; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005811 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #346 | libevent_malloc: new ptr-libevent@0x7fb354035930 size 128 "road-eastnet-nonat-94" #346: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #346) | 5b 73 99 01 85 6b a6 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 41 a4 66 03 78 2f 0c ac 28 0c 6f a0 f5 98 a8 | ad fe 06 fd 8c a4 d4 c6 03 17 f9 3c ee f7 59 ef | a4 19 f6 d6 98 a9 45 18 c4 fa 1a 04 5e 12 ad 25 | a2 eb 73 ff 50 f7 5b d9 ac 0d a3 60 63 86 dc 11 | 24 c2 5c cb 2a 8c 8f dd 11 7a 54 9c db e5 07 72 | 1d 04 b8 06 80 b0 2c 7d 70 61 0f 2e ec 51 90 ed | 50 75 e9 44 ba 97 aa c3 93 f0 e7 8e a0 59 5a ef | f5 79 47 07 02 c6 5c 62 a1 be 60 af ef 55 0d f9 | 00 ac 18 13 2d 62 0e 5a 5f 40 32 8a 49 30 5f 84 | 37 da 16 c6 63 1e a6 4e a5 65 94 59 c6 7a b2 c5 | 75 c7 8f 68 de d4 77 8e 92 40 c9 5c ee b4 80 ea | 42 78 86 4f 14 c5 47 55 13 d1 41 8b fd ef 2c 61 | b8 ff 39 92 97 ea a2 69 91 9d 1f f6 fd bd a6 d6 | 98 cc 57 23 b2 ed be c2 71 55 a4 d5 18 54 fe df | 4d ab de e9 5b 44 57 81 1d 33 6c d4 fe 06 43 32 | b0 07 7c ba 8d 9c bd 13 85 9c b0 70 80 5b 02 74 | 29 00 00 24 86 39 a6 9d e4 88 31 1e 1a 48 0c df | 5d 51 c2 7f eb 35 e1 75 45 71 5e 9b 45 ec 98 56 | 3e 47 8a 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 d4 6c 5c e3 02 f1 ae 0d a6 ae 25 | 4a 2c de d9 71 00 3f 70 00 00 00 1c 00 00 40 05 | 9a e2 a2 47 57 d0 42 27 78 4a 19 6f 7e 1c 29 7f | 7a 88 26 9b | libevent_free: release ptr-libevent@0x7fb364008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #346 spent 0.441 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5b 73 99 01 85 6b a6 c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #346 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #346 | rejected packet: | 5b 73 99 01 85 6b a6 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #346: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.212 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a34e10 | handling event EVENT_RETRANSMIT for parent state #489 | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #489 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #489 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49688.157976; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003451 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #489 | libevent_malloc: new ptr-libevent@0x7fb364008e30 size 128 "road-eastnet-nonat-237" #489: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #489) | 74 5a 3a 8b 71 1a cc fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 40 61 fd 1b 72 e8 67 07 d1 75 c8 79 f6 15 bf | 67 b1 a9 f3 47 1b 5a 9e 7a 16 95 64 09 96 72 95 | 1f e3 f8 5f 52 87 20 fb 61 9b db 76 dc 1e b3 ce | 79 87 62 5c 6c ce 2b 50 8b 94 05 b2 fd 25 84 04 | b4 15 bc 02 70 ed e7 01 0e 47 78 fa 99 0f 24 d8 | 6d 25 42 58 57 e1 37 d4 81 eb 71 fc 2c 93 fa a4 | c7 e3 ed 35 8a 44 47 43 96 45 a6 cd a3 83 61 0f | 10 8b 91 8a 9e 26 b5 05 80 74 cc cf bd 96 a9 68 | ec 71 d7 24 8f 0e c4 37 01 d3 fc 0e 4b 59 1a e8 | 44 25 f9 54 85 60 35 f6 be ce 52 66 75 73 a9 9b | 5c c3 e1 cf 01 12 70 63 56 6d a7 e8 18 d9 6b 45 | de 75 11 c2 b6 ad 37 d5 3d 52 a7 75 84 78 8c 7f | 86 51 7e 50 9f 10 72 bd c2 69 ef b3 ad 19 2b a0 | 12 77 de 7a 6b 6d 21 bf fd 3d 7b 00 2f 59 e3 b9 | d0 af c2 b1 28 3c da ec de 08 be a1 d1 4e 94 57 | 47 99 d9 10 35 e0 60 cf 3d 10 4e cb 1b b3 b4 f7 | 29 00 00 24 40 6d 68 58 c0 2a c7 cb 28 ac 6f c2 | e6 6e 2c b5 98 00 fd fe 6e 20 dd ca 12 44 3b 53 | ff 69 1e f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 46 ab 03 11 7d bc a6 76 5d 5e 81 | f5 21 84 26 13 ce 73 a7 00 00 00 1c 00 00 40 05 | f1 f1 80 9f 1b 76 8c da 90 0c 48 79 e2 c4 ce d3 | 45 3b 5d 95 | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a34e10 | #489 spent 0.473 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 5a 3a 8b 71 1a cc fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #489 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #489 | rejected packet: | 74 5a 3a 8b 71 1a cc fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #489: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.214 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #454 | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #454 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #454 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49688.199002; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003897 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a34e10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #454 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 "road-eastnet-nonat-202" #454: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #454) | 3e f1 41 2a cb 15 91 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 3c 6a c7 38 95 77 87 5d 1e c8 dc ba 22 fc 03 | 1c 9c 6c 7f 8e 0e fd af 13 dd 37 0a 23 40 7c ce | 87 9a c3 3c b2 29 81 32 66 6c ba 2d 43 73 e4 9f | 34 a2 6c c8 c3 e8 8f d1 b2 45 4b 81 58 b8 9d f6 | d7 6b 98 99 af 72 e9 d0 c7 87 b4 74 61 b8 6f 67 | 18 e9 20 82 3b 32 85 5d b7 fc 19 46 92 6b 65 26 | b2 31 d6 c3 36 5c 46 dd c1 b3 1a ba 4d 4c b4 fb | c9 29 e2 5f 88 92 21 72 05 11 74 76 83 6a f0 05 | 70 a8 4f 78 f0 27 41 4f 18 70 43 44 55 76 41 4e | d4 55 4f 0d be 47 fb 72 63 29 ab 49 16 15 52 01 | 76 0d 0d 3c d4 72 41 c1 63 95 85 97 21 62 a1 0c | 98 62 73 cf ff 81 3f b1 d6 5b a3 17 9c bf 13 ea | 76 47 19 6b ec 4e dd d2 c8 fc 10 8a 93 9d e2 40 | 1a 9a ec ba a4 26 5c 4d 01 9a 6a 47 3b fc ea 48 | 29 30 cf ee 79 66 a8 78 a7 b1 8e ad 2b ce 52 2c | 72 05 7f 8f f6 f4 ff ed 12 0a b1 b7 de 27 bb d0 | 29 00 00 24 42 50 bc e2 16 2b 34 89 d5 4e 59 5a | a4 d3 d2 a4 86 df 60 97 ee fa 90 f6 ad 34 8e f4 | 49 50 59 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 1c 0d 08 a9 24 58 8d 73 8e f2 10 | b3 0d e0 67 52 ae c5 46 00 00 00 1c 00 00 40 05 | 72 a5 1c 62 b2 bc b3 f0 fe 77 e1 0e f2 db 46 ae | 09 80 33 7f | libevent_free: release ptr-libevent@0x7fb364045e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | #454 spent 0.608 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3e f1 41 2a cb 15 91 c1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #454 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #454 | rejected packet: | 3e f1 41 2a cb 15 91 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #454: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.301 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800cc10 | handling event EVENT_RETRANSMIT for parent state #490 | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #490 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #490 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49688.238128; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004694 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #490 | libevent_malloc: new ptr-libevent@0x7fb364045e60 size 128 "road-eastnet-nonat-238" #490: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #490) | bb 0e 3a 9b 64 67 83 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 47 7f 34 75 b5 49 50 79 df a4 4b 2a 1a ce 17 | 54 1a db ef 07 cc bd 63 ec 5f fd 57 bc 8e fa 30 | c9 95 d1 71 e6 7c fd 77 3c fd c2 3d 71 c3 96 28 | a3 d1 35 26 0a 70 d5 c3 3a fb 74 58 46 86 23 a0 | 05 3c 91 b9 ac 6a ea c1 25 7b 4a 3f a3 25 55 72 | 1a fa 68 62 a6 28 8d 23 b1 87 6f cc f5 37 d0 47 | fc 41 f4 96 78 ec ba 03 b7 d0 87 4f ed d1 99 e0 | 0d e4 2b f5 2e 28 88 3d fd a9 fe 89 6e 87 86 2a | bc 0f d8 0e c6 4a 2c e3 b3 3a a6 4b 56 b2 d1 a7 | b4 82 a8 63 ca 63 fb 28 a9 ae 19 5e d9 12 c8 ba | 95 37 7e 44 d0 19 50 2e 50 85 6d 62 52 72 3d eb | 4d f4 88 bd 4f 23 95 01 f5 e8 4f 41 c1 7a e2 e9 | 09 7e 97 ea 1c b6 21 cd 07 3c 59 f2 8d ef a7 3b | 3d d1 60 37 5e c3 67 ad 3c a4 b3 33 59 93 de 51 | 98 2d 6e b0 f8 67 26 97 7f 16 7a f1 7d 53 b7 ac | 55 64 4e 4e 20 10 14 93 a4 62 e7 45 6c 22 9f d2 | 29 00 00 24 e1 87 09 5e 30 4d 93 58 a8 7b ef c0 | df 86 01 db 2f ae 90 07 26 59 14 f1 71 ed 65 8b | e5 42 58 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e a7 de 07 e1 64 83 30 46 b8 16 83 | 02 93 de dc 12 4e 03 eb 00 00 00 1c 00 00 40 05 | 41 30 1b e3 e2 bc 6c 0f ca fc a1 2e 9d 87 bf 76 | 3a b7 29 61 | libevent_free: release ptr-libevent@0x7fb33801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800cc10 | #490 spent 0.312 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 0e 3a 9b 64 67 83 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #490 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #490 | rejected packet: | bb 0e 3a 9b 64 67 83 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #490: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.156 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a88140 | handling event EVENT_RETRANSMIT for parent state #347 | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #347 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #347 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49688.246758; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00616 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800cc10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #347 | libevent_malloc: new ptr-libevent@0x7fb33801a4e0 size 128 "road-eastnet-nonat-95" #347: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #347) | f8 38 0d 6d 39 93 09 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 c4 2f 67 81 91 d8 d3 fb 76 27 6a 79 d1 72 21 | 27 8a 05 07 53 b8 7f 41 86 ef e3 fa f6 78 ef f1 | 52 89 ca 2d 9e 75 06 3f de f7 86 92 8e de 82 39 | 74 b5 33 59 34 5d 7a 07 32 58 2d 1b 54 b4 4a 71 | 82 e9 69 4b d1 23 61 8d 33 9d 70 70 80 3d e7 06 | 38 6a 56 ed 6a ce 44 ea 5c f0 e5 ab 75 42 57 8c | 73 f2 e6 32 f6 2b 78 17 cc 77 d1 36 52 bb 7b 23 | 6f c5 5a f4 da 8c 20 ce 25 5e 2c b4 61 29 ba 22 | 7b 74 2f 22 bd 61 49 7e ed ee f8 95 fd 44 ae 87 | 6a 9a b0 84 48 37 7e bb 35 e6 e2 f6 4e 13 6b 95 | 47 4c 2d 6c a3 db 3d 5d ad 81 79 5f 80 e7 3e ed | bb b5 a8 97 95 f7 34 a1 ef 98 52 3c fa 6c 7f 37 | f7 78 d5 45 99 4e d1 38 57 29 2f b0 94 21 1c a5 | 4f 3d 71 d0 fc 88 a0 06 b8 26 ee 84 19 ff 4c 00 | 47 77 6c e4 d3 3a ee 07 05 6f 06 56 6c 1b 9a 2e | 15 bd 41 a6 3a 78 6e d5 2a 86 74 c6 d6 01 f5 e6 | 29 00 00 24 2a 8c 4f 9a ed e1 ff e1 d2 8e 39 06 | cc ef a0 3d 7a d8 6e 61 bc 37 8f e1 33 0d 03 68 | 11 db e1 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 e5 1f 89 e2 f9 a8 3f 54 c4 5a dc | 3f 1e 16 e7 e3 67 75 63 00 00 00 1c 00 00 40 05 | d2 37 e4 48 b8 f6 61 3d d7 15 bc 92 37 84 81 61 | b6 43 37 f7 | libevent_free: release ptr-libevent@0x7fb364034150 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a88140 | #347 spent 0.254 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 38 0d 6d 39 93 09 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #347 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #347 | rejected packet: | f8 38 0d 6d 39 93 09 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #347: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.123 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #455 | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #455 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #455 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49688.280294; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006285 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a88140 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #455 | libevent_malloc: new ptr-libevent@0x7fb364034150 size 128 "road-eastnet-nonat-203" #455: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #455) | a6 08 27 1f 75 50 39 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 c7 bc 11 60 3e a6 9a 85 6d e5 42 37 d7 18 00 | 0c ea 15 92 bc 93 3a fa 4f c0 cd 9b 9d 21 1a ec | 13 f0 fc 0b a2 84 9a a5 b1 57 c2 a8 ab 33 a5 7b | 04 ac cd 61 b9 a7 e2 6f b1 9a 56 b1 3c b1 a4 2e | 8d 80 e0 ac 78 ee b2 78 51 00 d0 a0 eb cf 06 35 | 9c 7e 2a 73 b1 56 cd fe b7 d8 9d ab 84 62 9b e7 | ab 4d 04 16 06 c3 1a 9c 88 af e1 4b bd a0 09 ac | fd 8a ba 51 00 10 a1 a7 a6 a2 56 74 b5 9b 53 af | 87 60 09 5b 74 75 e3 41 f8 3d 7a cf 0c 36 f7 ea | aa 1b 05 8b 54 d5 b2 e1 fe 9e d4 4e f4 ae 74 22 | 98 23 25 ba ff 74 27 da 25 81 74 09 8c 6b 8b 69 | 54 dc 62 05 8c 02 be b4 b0 c4 25 43 18 99 9f c3 | 41 7e c1 29 f3 a3 60 75 de aa 26 bd a3 38 8c ad | a8 31 89 d2 48 90 d9 19 ce f4 34 9e 9d e7 1c e9 | d3 7f ee 85 33 84 75 6d 04 5b b4 a0 96 a6 93 65 | 8d 1c 3a f8 14 81 03 4c 63 f4 25 e5 59 99 ac 86 | 29 00 00 24 6a 39 a6 75 f8 f4 82 47 b3 0b 2e 10 | f3 31 67 d9 88 26 9d 5b f1 75 40 6b 34 32 86 bb | 7a 07 84 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 cd df 41 37 6e 2d fc 1b 29 38 8e | de fc 0c a0 44 c7 44 d5 00 00 00 1c 00 00 40 05 | 6e c0 59 83 50 2c 8a cc c5 6e 0a 98 ab 1c 00 ee | ff c6 95 31 | libevent_free: release ptr-libevent@0x7fb370014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #455 spent 0.186 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 08 27 1f 75 50 39 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #455 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #455 | rejected packet: | a6 08 27 1f 75 50 39 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #455: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0774 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34000d120 | handling event EVENT_RETRANSMIT for parent state #491 | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #491 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #491 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49688.333734; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00452 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #491 | libevent_malloc: new ptr-libevent@0x7fb370014c70 size 128 "road-eastnet-nonat-239" #491: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #491) | 71 99 e4 22 98 eb 54 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6f ca d2 21 e7 00 d0 58 95 9f 18 d3 07 6f a1 36 | 29 0a 07 0a 83 6e be aa 71 cf 9f 04 2d 78 ad e9 | 58 fe 50 02 89 22 52 34 18 90 af 07 b5 26 f1 6c | b0 11 12 a1 23 de 99 fd fc c2 c0 e2 48 6c 08 1b | f6 de 34 df 7c 06 d6 3f 0c 5a 97 94 b5 cd 37 58 | 08 26 b0 da 52 89 5c 74 c6 39 52 b5 86 f0 ed 18 | e5 f9 91 2e 14 4e 44 f7 64 55 1d 70 ad 8f f1 5d | 53 18 a9 5d 0c b5 78 b7 26 b2 7b 9e 90 ef 29 39 | 8b 7e b2 68 96 f5 cb 23 fc d4 1f dd be 19 b3 cf | 90 29 ab e6 33 3c 02 49 68 ce 65 d3 cd 32 0f 44 | 53 2e 1d d6 62 09 24 c9 7c 69 12 6b 73 20 8c a6 | 8d 2e 37 7f bc 30 45 fb da d9 2f 0c 0f 60 4b ac | 0c 1a 77 7c e4 78 1e 2f d7 92 41 d2 4d 5f 8e ae | 49 e0 54 b5 c7 2d bc a1 7a a2 3f 86 07 2c 92 60 | e1 f5 de af a0 f0 4b 27 ad e3 b4 c3 ee 7b 2d 0d | d8 e3 ea 54 9f 53 a9 b6 54 62 d4 0e 68 4d ff 58 | 29 00 00 24 f6 62 db cd 87 59 ee 6d c7 6e 62 13 | a1 8e a7 17 f8 92 11 7a 45 83 ff 50 63 74 b0 f6 | 7b f4 74 d1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 ef b1 40 3a d0 79 c3 55 24 76 d2 | d8 cf d4 95 18 b0 e0 3a 00 00 00 1c 00 00 40 05 | ee b1 f7 86 b3 de f8 ed 09 8e 76 56 9a 74 8c 3c | 69 d7 b9 6e | libevent_free: release ptr-libevent@0x7fb35c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000d120 | #491 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 99 e4 22 98 eb 54 3d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #491 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #491 | rejected packet: | 71 99 e4 22 98 eb 54 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #491: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b246c0 | handling event EVENT_RETRANSMIT for parent state #348 | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #348 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #348 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49688.350021; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004707 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #348 | libevent_malloc: new ptr-libevent@0x7fb35c04b850 size 128 "road-eastnet-nonat-96" #348: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #348) | a7 7d 9d ff 1a 60 65 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce d5 f5 8b 39 60 35 a5 25 70 07 1c 5c b5 0b 9d | 0f b2 5b 4a 01 34 b6 83 42 d7 d4 4c ad da 68 4a | 8b 4a 32 5f 36 06 f1 98 73 58 e9 72 c0 73 68 ca | 50 81 07 47 ff 17 19 96 47 97 94 3d f6 b6 04 3a | d9 53 26 2d 26 d4 5a 00 db 52 8b 30 4a 2f d3 5e | 57 21 6b c8 30 e6 41 d6 77 b5 33 c3 1e eb 09 f5 | f6 92 94 59 ce 0f f4 b6 13 a7 e6 12 2c 94 0a 0e | a5 49 7d ed 7d 57 a6 dd 0c c8 f5 e3 ab f6 df fb | 13 a2 c5 ce cd 5e 51 7c 83 34 62 82 09 e1 e3 72 | 31 4c 58 be 93 6e 60 9d a5 4a 65 3b 0e 6c 76 16 | ff b5 3c 17 b2 e3 b4 72 ba 47 1e 9f c9 b0 43 a7 | f0 b4 e5 71 a8 38 7d f3 55 a8 70 6c f5 0c ea e3 | 99 31 47 d9 67 2c ef 74 72 f0 71 8a 3c da e4 22 | d8 c1 06 32 4c 16 22 97 a9 d9 5c c1 eb 63 08 aa | 52 12 c2 6f 92 9a fe 31 31 61 1a 04 4f a6 29 e5 | bd ba 74 54 e9 68 1b 89 03 52 57 66 34 af 35 4f | 29 00 00 24 d4 8c 07 58 36 6c 0d 91 39 7f ba 4b | 55 80 94 2b 15 6a 3d d9 23 c6 de 68 59 32 ea bf | f7 3a e2 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c1 c6 46 d6 42 6c c3 80 0a 8c 20 90 | 81 74 5d e8 06 92 e7 f6 00 00 00 1c 00 00 40 05 | 5c 1e 6e a7 c5 99 b7 4d bd dd e2 f9 8e 11 ad b4 | 92 1e 01 ed | libevent_free: release ptr-libevent@0x7fb34c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b246c0 | #348 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 7d 9d ff 1a 60 65 e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #348 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #348 | rejected packet: | a7 7d 9d ff 1a 60 65 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #348: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37801d970 | handling event EVENT_RETRANSMIT for parent state #456 | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #456 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #456 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49688.387344; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006583 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b246c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #456 | libevent_malloc: new ptr-libevent@0x7fb34c035930 size 128 "road-eastnet-nonat-204" #456: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #456) | 9d 73 90 c6 28 50 00 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 3f ed 93 2c 95 9a 36 92 4d 4f a2 60 c1 a4 c9 | 4f 89 23 1f d1 62 f5 78 d3 b5 53 89 10 3d be a6 | 0b 7e 28 8a f8 9f 39 90 86 39 f9 58 de b8 41 b5 | 4e b5 7b 74 44 63 cc 49 07 82 fe 85 49 2e bc 7a | f9 73 7c 32 a7 c0 6d 69 27 6b 58 3d ad d1 e3 ec | cc a2 3b ff 29 b9 68 35 71 ee f8 63 67 14 1d 54 | bd cd c0 94 2f 62 7a 35 f4 12 35 06 31 ee 52 8b | 29 f1 3d 4d 88 53 c4 ee a1 13 19 c9 95 9c 3a b3 | 01 50 95 2e cb 29 cc 04 53 67 66 58 33 78 91 44 | bb 06 02 b6 52 69 e1 7c 4a 36 de 14 7e d4 42 89 | da ed 12 fd e2 7c 6b 02 ab fa 82 91 36 f1 eb 4f | a3 22 e5 0e 96 4e 45 d1 d5 c3 b4 13 59 96 05 fe | 42 25 83 c3 8d 08 66 f5 9f c5 f5 d6 78 e8 30 c4 | 64 8d 48 0b ea 1f e9 05 9f 8a 0b 97 9c 51 d8 74 | a8 a9 43 c8 84 d8 11 55 a3 8c 0b ac d0 92 1d f4 | 61 b1 7f 3d f8 aa 52 a8 9b c7 bf 12 0c da 76 e4 | 29 00 00 24 6d 34 cd c2 13 6b 2e 99 a8 cb ee 2a | a0 eb 8c a9 1d 65 aa 5b 5f 82 85 1d 0e 9e 60 f1 | 7a ed 45 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ef 03 64 ba 5e b8 36 8b cc 07 48 65 | d5 6f 6e 8b 3d 6d 57 bb 00 00 00 1c 00 00 40 05 | 07 ad 51 48 59 7f 26 2d fc 42 e0 9c c0 43 00 49 | 58 00 de b8 | libevent_free: release ptr-libevent@0x7fb37800f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37801d970 | #456 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d 73 90 c6 28 50 00 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #456 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #456 | rejected packet: | 9d 73 90 c6 28 50 00 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #456: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c01da80 | handling event EVENT_RETRANSMIT for parent state #492 | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #492 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #492 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49688.407639; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003137 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37801d970 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #492 | libevent_malloc: new ptr-libevent@0x7fb37800f1a0 size 128 "road-eastnet-nonat-240" #492: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #492) | d7 99 7d 69 73 b4 2a a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 07 d7 12 79 21 18 05 9a 65 7d 95 08 cf 17 4e | 65 ed 52 c0 2d 6f a2 d4 7e 6e 0c fe 68 2e 85 0e | c1 f3 a0 f1 34 f9 34 8a e9 6d c0 54 1e 27 54 a6 | 0a 27 50 d2 78 b6 25 f7 6a f9 6c d4 40 88 de 0e | c5 23 46 17 11 07 59 0b 07 7d f1 44 d8 68 37 f0 | 12 d0 4c 6e 87 95 44 91 7a 02 1a aa de e2 f1 34 | 10 60 5a 14 6b 10 17 21 f9 34 d9 11 2c 87 8c 26 | a1 73 6c 09 6c 7e 33 9d 0e 03 17 61 98 14 aa f1 | 55 ad ab 3a b7 4f 37 37 da 8f 18 e7 c8 d3 37 ef | 02 82 ee 24 ef c3 bd c3 8a 68 42 60 d6 70 2e 41 | 57 9c 7a 60 c3 c6 ac 4a 44 4b 7b 82 88 6e 37 3a | e8 a6 66 1b 7b 71 c3 58 de ce c4 1a 99 46 de bc | be 62 d4 44 43 62 c0 f6 26 99 83 35 30 7f b5 15 | ea a7 50 6e 0e e9 be 43 3b f3 33 1e 18 3f 0c b4 | 99 f0 db 6c 50 7f 42 cb 48 b5 b5 92 17 92 32 ed | bf e5 25 0e 41 bc 26 2f b8 93 47 2e 04 ee 7f e1 | 29 00 00 24 50 36 54 c1 a9 17 13 4c 62 1f 80 79 | be a9 3c 75 1a 54 91 d7 53 38 3a 75 de 57 2a 82 | 16 4a 83 7c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 22 3a 78 b0 c2 12 43 88 f6 04 b2 | db f8 ae cb 72 c7 59 0b 00 00 00 1c 00 00 40 05 | d7 ae 13 c8 9e aa 6e 0d cf 25 ff 91 a0 20 ef 42 | b6 21 2f 3a | libevent_free: release ptr-libevent@0x7fb35c02ec80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c01da80 | #492 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 99 7d 69 73 b4 2a a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #492 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #492 | rejected packet: | d7 99 7d 69 73 b4 2a a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #492: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab90c0 | handling event EVENT_RETRANSMIT for parent state #349 | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #349 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #349 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49688.456938; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006689 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c01da80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #349 | libevent_malloc: new ptr-libevent@0x7fb35c02ec80 size 128 "road-eastnet-nonat-97" #349: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #349) | 84 94 92 07 09 8b 01 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e7 8e 3a 36 94 c3 d9 80 af 87 82 89 a3 71 41 9f | e6 44 09 3c bc 67 77 29 06 f4 ae 77 a3 9d 60 1d | 0a c3 1b 6a f7 b0 e9 13 94 a5 ce ce a7 52 56 d7 | 84 e9 4e d5 99 7f 7c fb f5 b7 93 ee 65 0d 15 55 | 04 2d a2 78 15 79 38 de 23 c4 7d 82 d0 7f 5f 98 | a6 33 cb b9 33 39 5b 48 a5 eb 5c 5c 81 d0 ca 8c | f1 d5 2b 41 d5 80 88 70 6d 08 d5 9e c9 be 4a d6 | 16 61 b8 6d a8 4e 60 a2 94 6c 33 db 5b 42 45 bb | 02 30 28 9a 37 b4 00 e3 81 c4 fd 79 89 1a f9 a5 | 2d 14 0f 8f c7 04 8a 63 e3 4c c8 23 59 80 dd 4f | 13 40 1c 8c 06 1f 4a 77 c9 3e 21 20 cb 58 47 cb | c0 5d 53 b2 99 fb 04 a7 a3 35 71 6b 00 88 75 8a | 99 0c dd 71 02 4e 48 62 56 32 bf a2 8c b2 87 7c | 45 a3 56 eb 30 b8 7e 62 54 0f 19 2a 8e 1f 1c bd | cc fa 91 16 33 60 18 c9 3d f1 ea d9 79 83 28 b3 | ee b8 50 9e a8 3a a5 db fe df 37 7d ce de f7 60 | 29 00 00 24 8e 8f cc b6 0d fd cb ad 0f 95 32 a9 | a9 4b b8 56 89 46 30 eb 8f f5 1c d9 09 ec 14 75 | 5c 37 d2 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea f1 98 2b 6b f5 c7 7c ec d8 88 00 | 36 4b b7 7c e3 5b 66 cb 00 00 00 1c 00 00 40 05 | 49 36 ed 90 92 0a 38 5a 43 cd 17 7a 90 9b e6 10 | 1f ed 97 63 | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab90c0 | #349 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 94 92 07 09 8b 01 c4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #349 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #349 | rejected packet: | 84 94 92 07 09 8b 01 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #349: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12c40 | handling event EVENT_RETRANSMIT for parent state #493 | start processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #493 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #493 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49688.491242; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002864 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab90c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #493 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 "road-eastnet-nonat-241" #493: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #493) | ed 28 a4 bc 11 7c af 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 43 c9 b9 d1 39 88 cf b4 19 83 df 09 c8 d9 33 | 6a 66 ab 95 b0 dd 15 4d 5d 4a fa 5d 52 f2 94 c9 | 8c 6b 4e fd a3 be 7b 1e 26 3d da ae 4a c7 9d 27 | 63 37 11 7d f7 65 a5 40 e2 b8 e7 88 e2 a7 17 fe | 35 86 91 9a d8 ce fa 63 4d d8 5f 33 39 8b fd 0b | c7 66 ad d7 e3 69 0a d0 e8 2c 35 2b 87 c6 e8 d1 | 35 a2 6a bd 14 2b 17 e4 3b 63 91 15 e8 44 4a 0b | ee 35 18 44 31 9b e0 f3 11 2e f9 0a f8 94 2e e7 | 37 62 af 42 67 9b d9 c2 7a 1d 9a 74 9c 27 5f 4e | 6c 61 5b 8d 6f b6 26 7a 65 28 0b d8 63 b2 4d f2 | 4f 66 7e 68 e4 09 4f e1 36 c2 c4 fc b8 a8 0d bd | 8f 6c 26 6b 1b b4 27 de 4d 65 70 86 b8 d6 2d 91 | e7 12 ef a7 86 2f 17 c5 46 49 a0 b2 37 f9 08 9e | 05 44 0c 6d 93 fe 69 98 08 f9 28 75 1f 4f 91 2d | 39 9f 63 17 e0 d3 1a 4e 52 69 6b 52 15 77 3f 2f | 3e 88 cf 00 87 f9 bd f2 03 53 f2 34 f3 a4 6a 9a | 29 00 00 24 a6 a1 ba dd 86 99 b3 8f 47 4a 4d 8f | 4a 4e 2e 70 ee a1 39 80 4f 25 94 bc 3e 73 ee 31 | 55 0b 3a 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b ce a8 52 73 2a af 56 99 7a 11 14 | f3 b1 9c fe 91 8b 24 9a 00 00 00 1c 00 00 40 05 | 14 ee cd 8a 22 d5 80 d4 99 d7 ec c4 4c 96 10 11 | ff 51 59 09 | libevent_free: release ptr-libevent@0x7fb380011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c40 | #493 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 28 a4 bc 11 7c af 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #493 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #493 | rejected packet: | ed 28 a4 bc 11 7c af 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #493: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37802a9a0 | handling event EVENT_RETRANSMIT for parent state #350 | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #350 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #350 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49688.538549; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004562 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c40 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #350 | libevent_malloc: new ptr-libevent@0x7fb380011f30 size 128 "road-eastnet-nonat-98" #350: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #350) | 40 3f 8a 6a 3f ea 6b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee ea 5c 1b 2d cc 1b 57 9c 51 33 ce c2 ed 39 3b | d5 b7 1c c2 6d 3d 6f 5f ba 5c 85 39 fb a1 11 1d | ec 11 21 bd c2 b6 25 81 4a 85 2d 0f 85 73 9e fb | a1 4c 57 38 85 7e 31 44 0a 93 0c da 6d f0 93 22 | ea f6 8a 91 67 64 50 56 68 c0 c2 6d f2 4b e0 19 | 4b 14 40 46 ec 4d e3 7d d1 0f 0b 72 f6 ab 45 80 | 03 a2 d3 a8 ff e3 ae 4e 7b 0a 5c 1e da 4a b5 ed | 95 94 b9 4b 3c c2 85 4e cd 4a 91 b6 1f 72 c1 aa | c6 85 8f ca 28 3b ab 17 e7 f1 83 c4 ae 08 27 14 | 18 32 e7 a1 65 f1 da e5 f8 9c a1 45 4b c6 41 38 | 3d f5 8c c5 56 e5 06 ff b3 a3 fd f2 89 c2 8c 0e | 41 65 f9 6f e4 16 5e 64 06 38 6c 0e 32 c8 d5 26 | 50 db 25 f3 e4 e0 37 8b 04 62 7e a1 89 aa 8e 24 | 47 48 9e 92 05 5e 29 4c b7 2e ed e9 6d 8a 54 a2 | 85 8b e4 f5 76 e6 c8 0e c4 53 cb 98 41 4b 77 41 | 74 9f 3a d4 11 79 37 50 cf fb e2 04 ed 15 0c fe | 29 00 00 24 03 ee f5 21 ef 32 aa b5 bd 88 40 59 | 47 cc 90 0f 4b 5f 82 19 9f 96 a8 bf f3 8c 9d 85 | 66 d4 51 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 b2 cf 38 e9 ab 0b d5 10 0e c3 6c | 99 ae 6e 40 7a a8 97 3d 00 00 00 1c 00 00 40 05 | f6 5d 8e f9 dd 59 4b 5a 6d 88 5a 23 64 29 55 dd | f6 46 db 31 | libevent_free: release ptr-libevent@0x7fb37801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | #350 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 40 3f 8a 6a 3f ea 6b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #350 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #350 | rejected packet: | 40 3f 8a 6a 3f ea 6b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #350: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000d120 | handling event EVENT_RETRANSMIT for parent state #457 | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #457 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #457 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49688.567847; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006158 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #457 | libevent_malloc: new ptr-libevent@0x7fb37801a4e0 size 128 "road-eastnet-nonat-205" #457: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #457) | 3d e3 b8 80 8f bd c5 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 7a cc 82 1e 2d 53 a5 ce 9e 27 c2 26 66 c5 e9 | ca b7 3b d7 b3 d5 8f c0 1e ac 61 93 25 30 44 75 | 16 7f 86 32 17 98 9b b2 bd a4 40 62 a6 0f f6 2b | b1 e8 33 29 3f 84 59 09 aa bb 5e 2f cd e9 1a 72 | c5 38 7c e2 59 e4 bc cf cc fa da 23 96 75 c1 c7 | ad fb a2 86 e8 bf a6 3f 1e fe 2b 41 b8 4f 8a 8f | fc 26 0a 24 5a dd 02 29 13 7a b7 2d e7 62 32 f3 | 6a 17 ae ce 85 51 34 8a 1c 60 c5 a3 0d 63 33 17 | b8 03 02 91 41 6c de d7 2a b4 05 f1 63 80 c5 fa | a4 93 75 6c e4 d1 6b 22 4b c0 ed 28 67 a9 70 75 | f9 13 92 e4 11 7c 99 29 38 c0 6b 83 36 d2 38 17 | 99 86 23 65 2a c3 af 64 bb 12 ca 10 15 c7 5a 01 | e6 2f f0 2b 77 e0 ac b3 ec 7b 00 6e 19 4c 17 4e | c2 c8 73 f2 63 d0 16 98 d3 38 a7 f8 87 36 2b 60 | fd b1 1f f7 a9 42 1c 9e d6 33 ef 51 73 04 4f 2e | c1 59 d4 cb eb 88 5a 87 9b 61 94 46 2e b3 5e 3c | 29 00 00 24 bf 42 01 47 80 24 bc 54 c5 78 43 68 | 88 cb 29 3a 9a 04 f3 2d 0c c7 ac f0 bd ad b4 35 | ec c6 0a 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 d2 27 5a 8f 21 c7 36 56 bd fb 12 | 29 e7 69 7f 19 4f 04 f7 00 00 00 1c 00 00 40 05 | 06 c5 63 f1 7d e9 6e 2f 88 1f 75 73 67 c0 d5 c5 | dc d6 be 87 | libevent_free: release ptr-libevent@0x7fb36001fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000d120 | #457 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d e3 b8 80 8f bd c5 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #457 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #457 | rejected packet: | 3d e3 b8 80 8f bd c5 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #457: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34800cc10 | handling event EVENT_RETRANSMIT for parent state #351 | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #351 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #351 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49688.634134; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004653 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #351 | libevent_malloc: new ptr-libevent@0x7fb36001fd50 size 128 "road-eastnet-nonat-99" #351: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #351) | de 65 5f af ec 9c 14 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 61 44 ff 3b 7e 79 78 30 98 a5 1d ec cd 39 0f | a6 1b 66 bf d1 4c f4 43 49 5b 37 74 a3 cb a8 c4 | 02 cd b2 04 1f 9b 50 46 08 d0 17 33 f5 19 85 e1 | a2 5a 8d ef 3b 1f 98 53 d1 3d 4a 2f ac 4f 19 d0 | 75 e8 7a 46 60 ff e1 45 61 55 45 47 1e ee 0e a7 | 97 fc 88 fd 13 ff 6e 23 a4 a1 77 61 b8 b4 8c fd | 22 67 ad f7 22 ca bf 94 41 28 f0 31 09 ce da 26 | 10 fa 8e 66 f4 04 b3 cf 07 07 c2 53 27 d6 cc 39 | 2e fc 33 61 76 a3 a9 c9 4a 2e 0c b9 d2 ce 1e 75 | 25 69 23 a7 b0 58 cb 85 2c 74 fd 6d 3e 51 8a ff | 12 ff 22 b0 95 e5 25 84 fd 26 ce 3e 10 f5 db d4 | fe ab 71 45 0f 50 b9 5c e4 ab 89 ce f3 bc f0 b4 | b1 6f 9b 78 15 e0 b4 c0 f6 ed 55 2b 17 d3 9e 21 | ed d2 5e 21 58 74 e4 d8 96 cd 20 e3 10 b4 fa 8b | 7f 1f 1a 01 c5 db 60 d3 81 25 a3 55 50 d2 42 6d | 88 7f 5d 84 22 e5 ff 47 18 aa ac 46 b6 f6 e6 e3 | 29 00 00 24 5e 0c 91 cb 9e cc c4 3b ec b3 88 06 | 52 11 4c 47 a6 59 04 4b 44 ce c4 33 03 72 36 ef | b1 45 a0 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 90 e3 e4 9d 06 64 22 91 ff 91 cd | 3f cb ba 24 72 7e a3 02 00 00 00 1c 00 00 40 05 | 98 60 2c ab 59 ec de c3 24 7f bd 6f 4e 02 75 9a | 41 d6 b1 3b | libevent_free: release ptr-libevent@0x7fb340012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800cc10 | #351 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 65 5f af ec 9c 14 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #351 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #351 | rejected packet: | de 65 5f af ec 9c 14 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #351: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac69c0 | handling event EVENT_RETRANSMIT for parent state #494 | start processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #494 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #494 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49688.661638; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003898 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #494 | libevent_malloc: new ptr-libevent@0x7fb340012840 size 128 "road-eastnet-nonat-242" #494: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #494) | 13 d2 ce 8c c5 a0 08 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 2c 3b c1 c9 27 85 62 17 d7 83 f4 4b 2e 0e 16 | e2 03 04 ad 7a 8d 40 02 d4 34 9d 1b d3 c9 18 6b | 41 26 bf 10 de e3 e0 e1 0e ef 27 5f e0 e8 78 57 | b0 c9 a6 38 de ce 8a 7c 37 31 11 56 7d 62 bb 8e | c9 f9 f5 6c 82 0f ba cd 3f af 70 4e 17 32 64 c9 | d5 e6 2c 41 27 6e 25 48 eb 43 50 ea a4 34 26 c4 | 56 d9 54 ab 57 40 f6 c1 9c 20 1b 06 22 84 03 8b | e5 53 55 fa 3d 80 8b 5b c2 25 82 15 35 94 6c d0 | bb ec ab 60 22 1d 87 23 e3 9e ac fc 16 ce 42 3f | ba 0d 8d 04 b9 e7 b2 de 46 3e 4b b3 83 4d ca 89 | e2 a0 d6 38 51 9a 05 e2 dc 57 8c 52 b9 1a fa 47 | 7e 1e 80 51 ac cf 77 c1 e4 be 78 0f 3d a1 ce 56 | 23 61 ff 3d 67 82 ef a5 20 d8 a8 62 8a 37 d6 a0 | 87 df 7e 30 b4 77 c6 c9 19 64 23 a5 4f 30 28 ac | 43 56 89 18 4a 88 a5 5e d6 97 45 97 2d bb 34 28 | 33 0f 79 c6 b2 6c 6b 62 1d d3 42 70 92 9f 6e 55 | 29 00 00 24 86 c8 ae 9a dc 82 47 ae 63 a3 d2 9c | fc 56 5a fd b5 a1 94 8d 79 cd 12 87 5b f8 39 1c | 72 7a 80 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 4f 14 68 3f 9f 2d 22 c7 c5 d4 82 | fb 7c 5e ae ba 6a 24 66 00 00 00 1c 00 00 40 05 | bc 9f 5c d1 bc 22 73 c4 89 e4 5f 13 b2 ba 1c 19 | 38 03 1c b3 | libevent_free: release ptr-libevent@0x7fb36c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac69c0 | #494 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 13 d2 ce 8c c5 a0 08 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #494 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #494 | rejected packet: | 13 d2 ce 8c c5 a0 08 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #494: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0716 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35002a9a0 | handling event EVENT_RETRANSMIT for parent state #458 | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #458 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #458 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49688.663971; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005261 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac69c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #458 | libevent_malloc: new ptr-libevent@0x7fb36c035930 size 128 "road-eastnet-nonat-206" #458: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #458) | d8 20 9c 76 6a 13 05 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 f8 70 4a 7e 5c d3 77 41 08 04 2a 79 b8 78 55 | 9f 63 d7 1f d9 bd 04 73 e8 de 1f e6 51 71 d1 c1 | 71 09 97 4a 5c 16 68 a0 aa 69 e9 b4 93 ac ba f6 | 92 85 87 a8 c8 1f 88 3f 36 bb 45 8a 62 53 f9 71 | 32 e3 0c 69 bc 64 74 29 df 76 29 f7 54 0a d6 9e | bf f9 de ca 92 41 8b 95 09 7a 0d 5d 50 17 4e 54 | 40 99 d8 f9 ca e7 ca c6 0c af 31 22 59 39 c6 0f | c7 31 f1 5e c9 b0 5a 0c c9 3f c9 f9 d7 bd 4f d2 | fd 98 c7 19 a0 f3 e9 01 16 f3 fe 75 35 59 15 08 | 13 ea cd 50 33 e8 15 ab 01 f5 9e c1 43 d2 27 90 | 39 d5 e2 89 77 57 ec 66 ab 2d 6c 09 fc 1d 8f 1a | 62 91 d6 59 58 86 af 9e fa f2 4d 80 b6 39 ef 93 | e4 aa 9e 6f 49 aa 2c d4 54 59 f2 01 66 25 3e 6c | 9e 0b 06 28 b9 af 2e bd e7 a4 57 6f f0 5b 4c cd | 6a 03 04 af 85 10 e3 f2 17 ad 37 f3 24 3e 66 fb | 27 c7 a1 c5 2e 32 66 c3 94 bc a6 2b 60 cb 4f f9 | 29 00 00 24 33 eb be f2 9e 94 9d 08 4c d8 00 c2 | f8 2c a4 ef 00 e3 f7 7a 62 72 9a 99 65 d6 f3 0e | ff c8 b6 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 01 77 97 bc 56 25 23 ed d6 15 51 | 7d a3 3f e8 c0 74 6b cf 00 00 00 1c 00 00 40 05 | 8f 1b 57 d9 1a 63 f1 b3 99 7b 22 3d 44 e6 21 51 | 1c 41 cc 24 | libevent_free: release ptr-libevent@0x7fb35003f4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35002a9a0 | #458 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 20 9c 76 6a 13 05 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #458 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #458 | rejected packet: | d8 20 9c 76 6a 13 05 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #458: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0237 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a276e0 | handling event EVENT_RETRANSMIT for parent state #352 | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #352 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #352 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49688.719297; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005479 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35002a9a0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #352 | libevent_malloc: new ptr-libevent@0x7fb35003f4e0 size 128 "road-eastnet-nonat-100" #352: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #352) | 3c 05 1d c4 fe 50 38 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 64 8b 09 fa 7a d8 0e 19 4a a4 83 62 a1 a5 5a | 68 fc 46 c2 41 24 c2 81 0b b7 86 21 9c 81 02 7e | 4c e7 e3 a1 0b b2 cb 85 40 50 15 e6 9b 8e ec db | 69 e6 fa 1a ac be 36 c2 a1 ef 3e db b6 5e 52 af | 7e 52 8f f4 e4 02 53 3c 7f 96 73 09 3f 4e 1d 14 | 6d c2 31 fa 5c 39 98 fc 2c b5 f5 9e 00 af 34 e4 | 5f b6 a3 65 94 fe 46 6a 1b e5 e1 4a 56 bd a5 cf | 0a 77 7e 2c 49 79 6d b8 e1 4a 50 3f 05 7c c4 09 | eb 02 3b 50 92 11 5f 9f 53 e6 1e bd 8d 02 31 1b | ce 66 73 68 3b 0d 47 9f bd 24 08 62 f6 ab c3 d7 | a4 43 e9 f4 a6 cc 3c 8d f5 af 10 2b 54 da 75 ae | 02 35 c6 d0 b8 2f b0 bf cd b2 cd e7 d2 23 bb 30 | 31 a6 56 6a 41 57 91 fb 46 1d ee de f8 63 bc 4e | 2b 81 4f df b1 c0 cc c0 21 f9 64 98 54 3d 15 93 | 9d f2 7c 39 a9 8b 0c c2 f7 bb 99 15 ac 9c c2 51 | 1b f2 0a ec 9e 8c 56 18 67 8a fb 62 ed 27 4d ad | 29 00 00 24 a2 bb a3 dc 18 69 ac 45 10 e2 b1 d4 | a3 1c d3 0a 99 a1 33 f7 93 76 f6 b4 72 bd d3 aa | d5 07 c1 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 31 52 a7 9d 89 a3 6a 1c 72 78 4c | e5 d1 1b 1c 74 f4 f6 22 00 00 00 1c 00 00 40 05 | fc b9 a7 1f 0a 98 43 79 23 71 2c ac b0 a5 bd 76 | ba 72 e4 ab | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a276e0 | #352 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c 05 1d c4 fe 50 38 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #352 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #352 | rejected packet: | 3c 05 1d c4 fe 50 38 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #352: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0687 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a97080 | handling event EVENT_RETRANSMIT for parent state #459 | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #459 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #459 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49688.788682; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004456 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a276e0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #459 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 "road-eastnet-nonat-207" #459: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #459) | 64 1c f9 72 57 02 e5 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 f4 91 af e8 cc 47 24 c2 b5 4c 3e ed df 87 0c | 09 e0 4b 07 1e 23 c5 7e 86 e2 5a ab 7d 41 06 3d | 7f 7d f9 8e b6 58 c8 fa 4a e7 6e 59 bd 9e 19 5b | d0 22 36 6d 62 9e c7 d4 0e 8a 77 c0 e4 05 9e c6 | 38 14 50 50 10 9e e8 30 b1 17 07 a8 ec 87 4b 21 | 15 4c 43 ee b6 9d 8d a1 9c 18 3d 34 43 97 8f 77 | 9a 8e 35 11 77 6c 19 4c d5 d6 10 76 41 7d 92 29 | ce 7e b0 f8 dd e1 3c da bd 28 65 ea 34 c0 d5 5e | 87 61 2d 03 e2 eb 39 88 92 b2 21 9a 8c ff 81 cd | e0 87 95 3d 88 8d a2 1e 66 0d db a2 7a 79 4c cc | ae 9a d3 e6 87 6a 1b 78 ae 44 bb 23 8a 41 53 1f | af 3f 42 6b ff 45 a9 da 42 e2 38 bd 4c 50 bf a8 | 3b 16 b5 57 9a cf 28 d9 88 40 31 6e bd 9a 3e 51 | 61 82 b6 d4 f2 88 81 2c 57 c3 85 0c a7 ff fd 6c | ed 2a 14 13 51 d6 b5 56 aa 0c 26 20 25 e3 9c 40 | 12 38 26 e0 f5 9a 6e 40 35 0c 6b 0a 6d b3 65 32 | 29 00 00 24 5c 75 af 9e f8 ea 62 49 48 89 05 1e | 77 92 7c c2 74 9a fc 43 04 bc b7 18 cc f7 58 3d | 9b c8 34 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 7f b1 c0 22 56 8e bd 29 fd 39 4f | 5d 90 ed 84 8a 20 f8 23 00 00 00 1c 00 00 40 05 | 58 59 18 6a d1 74 dc 11 3e 54 b0 34 57 9e 0a 5d | 5a f6 05 3b | libevent_free: release ptr-libevent@0x7fb37c023b10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a97080 | #459 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 1c f9 72 57 02 e5 bf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #459 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #459 | rejected packet: | 64 1c f9 72 57 02 e5 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #459: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0768 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #495 | start processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #495 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #495 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49688.797031; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003495 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a97080 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #495 | libevent_malloc: new ptr-libevent@0x7fb37c023b10 size 128 "road-eastnet-nonat-243" #495: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #495) | 51 22 fa ce 4d 7c ce 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c 9b dc 70 14 a2 8d 2e 37 c4 2e 9c 10 fc 27 0a | 94 78 5e 85 80 ae e5 be af df cd 9d ab 0a d3 d5 | 9a 0e 71 ff 6f 4d f8 da ab bd 5a 72 c3 2a 71 74 | 55 f1 2d 29 95 62 4d 7d b1 32 5b 12 fd 0a 2d bb | 81 aa ca e6 2a a9 0f 8b 0c cf 1b d2 de 30 5f 1f | e8 83 26 da 07 fd 31 9b 9b d4 1b db 2d 4b e3 99 | 86 7d a5 a0 d4 7d 59 09 c9 73 32 3d 53 85 e9 6f | 12 64 cd cb bc 89 f7 39 4d 28 2c 75 1c 49 0b 3b | c2 22 31 40 60 7d 62 ec d8 da 82 4a bd 1e c5 38 | c3 d8 6d e6 cb 49 78 ba 18 b4 83 3e 7d f6 6d 50 | 16 4d a6 04 f2 a5 8b c2 44 ae 9c 1a 54 68 4c 7d | 43 87 34 87 42 6c 4d fd b4 43 f6 3a 97 2e d2 87 | c4 99 e8 56 55 a1 ca 43 16 5d 55 9b 16 ed ee c1 | b9 bb 2b d6 cf 5a 0d 72 75 6d 1a 0f ae 6e 85 ec | 3a e8 4f c3 0e 27 5b 09 2a e5 e1 24 f5 af 32 13 | e5 eb fd 29 dd 27 c3 a5 08 cc 6e 72 80 4d 82 6f | 29 00 00 24 1b f3 52 dd f6 a5 80 95 b8 2f 4b 8b | f9 eb 65 1b 6e dd cd 94 b7 dd 16 f5 58 7c d7 e5 | e4 3a 80 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 3b 51 4a 4c d3 e5 68 1a 7e fa ec | e7 02 de b1 56 34 9d 92 00 00 00 1c 00 00 40 05 | ef ad 01 a7 be a3 55 49 1c 13 e6 d1 01 bd b7 0b | b8 36 16 d5 | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #495 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 22 fa ce 4d 7c ce 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #495 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #495 | rejected packet: | 51 22 fa ce 4d 7c ce 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #495: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #353 | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #353 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #353 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49688.81537; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00486 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #353 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 "road-eastnet-nonat-101" #353: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #353) | 5c b8 33 04 f9 07 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 8b 11 fb 47 ec 02 c4 cd 08 09 04 3c c8 57 b9 | e6 56 8a 75 16 cb 27 a3 a8 a8 cd 60 5a 5e 10 a0 | 4c ee d4 ee 70 90 76 03 9c dd ae bd 31 4c 66 16 | b3 e1 1d be 33 f8 41 0b c4 3c 71 6f 90 30 0f da | 26 bc 55 a4 9b 68 89 99 78 6a 9f bd 9b 59 ca 66 | 9f 28 bb 1c cf d9 04 9c 3f 50 e0 a8 9a c8 86 3c | 22 ad 41 27 f3 c4 bb fb ef e9 6e f8 88 7e 34 6e | 75 ca 2d 80 b4 0c d7 c1 72 ce 98 2e 70 ec 4e 80 | a8 95 d8 c8 1d 5c 97 5c c0 a0 b9 5c ac 3a c3 07 | 2c c5 07 1e 3d 08 d1 ba e4 93 f5 5b dd cb 89 0a | 36 eb de 45 ac 11 de 24 b8 2b b2 28 d9 84 7e 81 | 6c e6 ca 34 e5 ab 3a f5 d9 8f 51 9e f8 46 26 92 | bb e9 13 c3 32 db 48 bf d1 a9 ef 9e d6 1f 7a 90 | cf e0 f7 95 4c 0f 73 ac 90 00 08 6f f7 6f bb 88 | dc 53 20 17 f7 7a 4b e1 b0 e3 53 ab c1 68 9e bb | 8c bb e3 6d 1e 44 fc 28 be 03 40 b8 4e ff ea 55 | 29 00 00 24 d0 f4 4a 20 b5 18 6c ce 45 6d d4 e9 | 3d b2 3f bf 9f b6 c1 be 4d 22 b8 3f d5 b7 20 9c | 7a 5b 5b 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 c3 92 4c 0f 96 63 0f 6f bc 3d e6 | 99 69 47 3f a6 34 81 2c 00 00 00 1c 00 00 40 05 | ce 29 c6 74 fd 99 32 be d7 3c ba 39 8c e5 64 d3 | 17 27 91 5a | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #353 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c b8 33 04 f9 07 ca 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #353 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #353 | rejected packet: | 5c b8 33 04 f9 07 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #353: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a84000 | handling event EVENT_RETRANSMIT for parent state #354 | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #354 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #354 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49688.867638; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004861 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #354 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 "road-eastnet-nonat-102" #354: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #354) | 72 4c 85 c6 74 09 42 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 1b e9 65 bc 73 bc c5 81 57 1a 7b 1b db 4b 3f | 32 d5 0d b7 6a 65 f1 0a 67 34 33 c1 2c 23 e5 f2 | 41 57 12 1f 62 7d 04 aa d4 c7 47 71 78 e8 f0 df | 48 86 0b 9f 4e 36 6e 72 bd ec 74 1b dd 83 0a ab | df 0b c7 29 5d 45 26 d8 31 4b 64 db c5 65 76 90 | cd 52 7e 2d 27 67 7a 01 34 ba b6 3f e3 9a 85 48 | e4 51 41 5f 21 41 ff 88 e4 cc aa c0 b6 13 70 92 | 13 45 bf db 76 ed 1c 31 eb 2b 1f af 38 c5 ca 82 | 0b fb bb d7 57 27 bd 26 60 cb 6b 22 18 4a df 09 | ae e5 bd 33 88 7d ef 21 1c 95 13 3d a5 02 60 08 | e7 d2 1b 72 0a 7b aa 01 9d 47 2a 4d 32 3f 9b ec | 5b 5a ea 31 68 bb 1a dc 15 be 3d d6 a0 c0 98 db | 7b 5b 3d 8f ce 9b 6c 43 56 11 be e1 16 78 07 0a | 06 29 bd c7 77 7e 17 95 3a 22 27 47 9f 23 32 f6 | 37 27 d0 b4 53 1e 36 9f c8 05 75 2f 68 c9 35 72 | da 2e a9 d1 44 f4 35 64 d4 0a 4b c0 71 73 52 a8 | 29 00 00 24 72 5c 82 6f 5d 6b bd 69 39 4b 52 31 | 75 ca 0e e7 64 bc 08 f8 b5 d4 6f 1f bc a5 fc 80 | 56 52 35 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 33 77 7a c0 93 c5 bf 78 5c 8c bc | 79 60 cc b9 7e aa 2e bb 00 00 00 1c 00 00 40 05 | df 4b d5 4e cf 64 0d 4d 4f 32 d9 61 e4 8d 05 c9 | 9f e3 12 70 | libevent_free: release ptr-libevent@0x7fb338023a60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a84000 | #354 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 4c 85 c6 74 09 42 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #354 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #354 | rejected packet: | 72 4c 85 c6 74 09 42 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #354: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0451 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46adb080 | handling event EVENT_RETRANSMIT for parent state #460 | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #460 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #460 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49688.895913; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003814 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #460 | libevent_malloc: new ptr-libevent@0x7fb338023a60 size 128 "road-eastnet-nonat-208" #460: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #460) | 23 48 f5 22 8d 37 9a d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 df d9 22 d0 fa 01 d1 aa 88 df 6a 8b 18 c0 09 | 4f 5b 80 db c5 12 8b 47 ef 35 50 bc b0 af 99 c5 | f9 cf 10 a6 63 8f ba 03 da 7f 0b b3 54 11 ba 9c | bb 06 80 77 61 12 b6 fe 2b bb 2c 7d 23 ed 7a 74 | 17 31 cb cb 95 4c d6 8f 31 04 dc 07 37 df 2d f4 | 1c ed 0c bb 28 ba e2 23 2d 3d a3 b2 fc 6f 50 eb | 56 d2 5b 1e f1 ad 23 2f 3e 55 c4 35 e9 32 f6 24 | 86 b3 e7 fd 04 0f 6f 72 db 37 4f bd d9 fe 64 c2 | 83 ac 83 05 91 73 42 0a a1 0c 3e 29 3c 20 67 b6 | 92 37 23 8d 25 df 18 a0 fa c2 98 93 ab ff 5f 64 | 7c d6 b8 fc 1d 90 5c 26 98 2d 8b b3 56 38 e2 7c | 20 da c8 bf 8d be 1d 6d f8 c5 88 bf 2f 3a f2 41 | 78 28 51 f9 69 ab 11 20 67 51 52 04 40 a5 c7 0c | 37 f0 c6 5d f9 95 c0 b8 47 6e 71 8e 99 56 3a 5f | e1 5c d4 8d c1 97 29 9c 26 a6 ac 65 11 ae 68 ef | 23 72 8e c9 45 c4 63 78 1b 5c 81 47 6e 58 87 ff | 29 00 00 24 25 2a f3 c2 d1 34 f2 28 be 54 0b a4 | 22 e2 98 59 02 dc 2f 37 5b b6 b4 bd 10 49 91 58 | 87 4d 98 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c c8 5d 4c 09 cc 17 d5 22 fc 7b d0 | 43 ae fd 90 5d 04 da 2b 00 00 00 1c 00 00 40 05 | 07 a4 f0 f7 58 53 22 23 25 cf 1a 07 69 10 b8 4a | 16 e3 ac d7 | libevent_free: release ptr-libevent@0x7fb378035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adb080 | #460 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 48 f5 22 8d 37 9a d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #460 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #460 | rejected packet: | 23 48 f5 22 8d 37 9a d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #460: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aef6c0 | handling event EVENT_RETRANSMIT for parent state #355 | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #355 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #355 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49688.944275; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00482 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adb080 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #355 | libevent_malloc: new ptr-libevent@0x7fb378035930 size 128 "road-eastnet-nonat-103" #355: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #355) | 56 ed c8 71 de f9 06 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 2a 83 b1 26 56 49 8c fe 5f bd b2 84 ea a3 88 | a4 f8 b8 d9 ec 49 43 44 95 bd 12 f2 c5 21 82 10 | 03 69 98 1b 4a 24 1f ea 40 8a 0b 91 c9 76 5c 49 | d4 99 e0 74 0f 3f ee 6f 9e 53 54 1a 23 35 59 5a | aa 59 0d cf 6b cd 1c a1 eb 6c 98 6c 37 17 d0 f8 | 3c dc 93 d2 77 45 41 e8 99 25 82 ad 9d 55 e6 13 | c0 f1 0d 8b 61 04 8f 57 63 d5 98 2e 2e 99 6e 3b | 2e 7c 41 b8 5b 06 ba ad 18 18 aa 84 1a 4c 4a ef | 3b 6e c9 03 be ae 7b 01 5e 77 a6 2b 34 36 7e 21 | 7f c5 d3 9e 48 69 2b 5b 00 e3 c7 29 41 93 4a 4f | 3f 0c 86 c3 a8 9a b3 72 ca 66 fb a6 7b 68 f9 97 | 45 bd 92 5e ee 7e 28 d2 1e 8d 24 ad 5b 2c db 57 | 1e 74 10 aa 41 ab d2 f5 21 4c 56 2b c7 8f ce 5e | d8 69 da 43 89 31 85 08 6d d1 b2 1a 22 1c fe b0 | 36 38 83 b8 45 19 23 bb 71 3e 12 a0 c1 d4 c6 f9 | 92 4b 6b b1 a2 bb 20 eb ff a0 77 69 c4 c9 35 d8 | 29 00 00 24 c0 01 1a b2 54 fa cf 80 10 d0 f3 31 | e6 0e 79 92 f9 e8 de f5 3e 1e d4 6a 54 e0 c2 2f | 19 27 3a 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 da f6 01 f4 40 01 a7 a7 77 b7 fc | 3d b7 6f 1f f7 90 79 11 00 00 00 1c 00 00 40 05 | d2 9a 8c 84 e0 9c 3f 77 ed a7 98 65 71 77 a0 dc | b3 15 95 be | libevent_free: release ptr-libevent@0x7fb37004b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aef6c0 | #355 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 ed c8 71 de f9 06 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #355 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #355 | rejected packet: | 56 ed c8 71 de f9 06 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #355: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad5900 | handling event EVENT_RETRANSMIT for parent state #496 | start processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #496 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #496 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49688.980575; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004013 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aef6c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #496 | libevent_malloc: new ptr-libevent@0x7fb37004b7c0 size 128 "road-eastnet-nonat-244" #496: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #496) | f5 9f b4 c2 7a 9c 1f 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec 8a 03 66 9e a5 16 39 b9 4a bb 3f cb 61 65 42 | 8b 18 46 77 70 53 8b 55 8b 35 c6 f2 c8 4d 38 3e | 2b 6f 3f c9 8d f1 cb 91 94 06 70 93 28 a0 96 60 | 92 d3 00 a2 ef 01 89 68 02 8d 85 25 69 9d e5 95 | 69 f6 3b 34 62 4f 63 bc 8e bf 0f 5d c5 bc ea 46 | f9 33 76 3d ad c3 1d 5a 73 74 ae ae 16 20 46 35 | 9e db 41 74 ad 1f 50 49 89 b1 86 a0 57 06 1e bf | 85 a3 93 e1 b5 84 03 d1 1b 0b 7b cd 83 c2 b7 25 | da ae 43 dc f0 b6 2a cd 25 9c e3 07 d7 ef 34 20 | 0c 00 64 d5 63 1f b1 99 29 80 fe 35 ec 43 23 95 | 6a a2 fc 57 a3 69 20 ea 94 fb aa 78 ee 5b 41 20 | 62 d9 4d ee fd 29 6e d9 f4 a1 15 cb 28 a0 f5 d3 | 5e bd 59 a6 87 61 99 4f 80 5d e6 36 36 11 e0 c2 | e5 c9 d7 3c 99 3b 27 4b f7 81 ca 42 93 ee a9 76 | e3 2e 24 6c 18 27 a8 24 04 ce 7c dd c7 a8 fd 5b | a3 04 bb 87 35 69 9f a6 83 11 9f de e4 40 52 5f | 29 00 00 24 4f 4f 97 a4 0f 74 20 cc 43 f4 64 ac | a1 3b a8 cc 16 af 62 fa 43 5b 11 20 24 9f 33 6a | 2d 6e 82 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 79 bb 2d d9 d9 21 50 1a 1a 14 0f | 62 ed ae c0 08 f2 03 40 00 00 00 1c 00 00 40 05 | c8 1f b0 a0 de 58 fc c7 c3 79 0d 4a c2 37 42 43 | 8a b6 69 08 | libevent_free: release ptr-libevent@0x7fb34c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad5900 | #496 spent 0.208 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 9f b4 c2 7a 9c 1f 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #496 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #496 | rejected packet: | f5 9f b4 c2 7a 9c 1f 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #496: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0761 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38400feb0 | handling event EVENT_RETRANSMIT for parent state #461 | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #461 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #461 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49688.998001; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006127 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad5900 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #461 | libevent_malloc: new ptr-libevent@0x7fb34c0300e0 size 128 "road-eastnet-nonat-209" #461: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #461) | 30 e3 71 39 78 d7 e3 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 73 72 eb a6 69 8c 9e 08 28 d6 16 78 8b f3 f1 | 10 b5 c6 3e 5a 68 ff ee f8 e9 ea 04 9a 96 07 cd | 19 7e 01 3e f6 8c ec 23 90 c5 34 cb 27 e1 d9 f4 | 83 f1 52 a0 20 79 82 b5 63 bf e3 1e 4c 8b e6 11 | 56 0c 8d 37 3e 34 a4 1e 35 3f f2 4f c6 52 63 33 | 1a 19 3a f7 47 1a 58 cf 14 be b6 13 3a ba 6a 7a | c2 7e 4a 7c 6b 24 bd 5d d6 f1 53 6b d9 1a c9 0e | b4 0c ad ca 0d 87 78 f9 58 81 24 7b 64 ae 92 0f | 11 e7 db e4 1c 12 40 ed e3 44 f4 22 a9 cb c8 e8 | 35 d2 0f 26 8c e9 f0 bd 79 b3 71 e1 56 b6 c2 ad | c3 25 0b 24 c0 9d 7c 39 2c c7 c4 5c 79 bb 71 e2 | 44 92 14 47 75 57 f7 30 ac 8e 27 b4 ce 61 8d 65 | 5b 3f 84 a2 85 6e ec 1f 9f 60 e7 ef bd 5d a7 fa | a6 23 27 f3 06 ac 82 f0 e3 4d 76 a2 d3 e2 92 c2 | 69 39 39 eb 52 01 f2 b3 9d c1 f3 c5 d2 36 e4 c6 | 40 e0 76 99 a0 7e 6e 0f 65 8c da 02 f1 c2 ad 1e | 29 00 00 24 90 76 1f 57 9b 42 3c 9c 17 4b 00 94 | e5 bc 1a a6 9f 85 30 49 d6 5f c0 4c ce 00 c3 85 | 0f 0e 5c ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 76 5f 86 b3 2d 97 ef 5b 1d 05 17 | f4 c4 b8 ec 0d 36 f1 03 00 00 00 1c 00 00 40 05 | 57 06 a0 ca 17 47 48 ab cc 80 4d 50 ec 37 d9 01 | a5 d0 9e bc | libevent_free: release ptr-libevent@0x7fb3840266d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400feb0 | #461 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 e3 71 39 78 d7 e3 f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #461 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #461 | rejected packet: | 30 e3 71 39 78 d7 e3 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #461: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0619 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350040840 | handling event EVENT_RETRANSMIT for parent state #356 | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #356 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #356 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49689.03334; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005375 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400feb0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #356 | libevent_malloc: new ptr-libevent@0x7fb3840266d0 size 128 "road-eastnet-nonat-104" #356: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #356) | ac bc fb 64 b8 05 f9 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 3b ae 20 ec 7a cd 21 f9 ff e0 06 71 c2 e5 55 | 9b 45 49 5f 50 f5 30 9c 0b 3e 8a a2 28 f4 85 c7 | 4f 6f 8c f6 77 7f 00 15 6e 19 1d d1 e0 68 66 87 | 4e df 9c 72 ac b2 8d ab fe f6 05 78 0d c2 c2 f2 | 31 63 92 17 54 19 b6 cf fd 16 6a d8 32 67 48 40 | 84 9f 47 99 c0 29 49 ad 8d 18 53 a5 6f ce c9 03 | 2a bd 3e e5 4f fd 0e 59 73 26 a7 73 de 18 dc 8d | 09 79 73 ae 09 17 25 e9 44 ce 32 60 cd df 52 37 | 66 e2 fc 8e a8 ff 6f bc 73 d9 a9 e6 7e 34 29 30 | c0 25 f8 37 35 6d fc d1 5a 42 45 e2 29 19 ad 5e | b1 89 0e dc 25 33 50 a2 38 82 4f ae e6 4f c3 97 | 55 76 c2 67 8a 3e ac 3d 84 f3 32 ca 54 cc 1c 9f | 23 91 a9 44 f4 93 a5 2a aa cc ed 04 01 4e eb f5 | 00 ac f3 c1 d5 2f 9a 43 89 cf f2 f2 55 7d 1d 3b | d4 57 90 a2 11 f9 23 83 ee a6 72 aa 3b 95 a5 9a | f2 6e 4c 51 df 03 55 77 ff 21 15 db 98 87 cc e3 | 29 00 00 24 80 41 9d 85 d0 e1 49 10 c1 0f c3 d9 | f1 36 ea c7 60 65 b3 e5 0e 51 88 57 20 76 d9 47 | 30 46 2c b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 1f 59 ee ab 85 d8 d4 4a d4 96 c0 | ee 5f a4 59 2f 4a 72 17 00 00 00 1c 00 00 40 05 | 04 5f 5b a5 b0 c4 89 9e 39 c9 c6 97 69 9e e5 9e | 19 14 82 3e | libevent_free: release ptr-libevent@0x7fb3500342b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350040840 | #356 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac bc fb 64 b8 05 f9 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #356 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #356 | rejected packet: | ac bc fb 64 b8 05 f9 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #356: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #462 | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #462 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #462 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49689.070665; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005723 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350040840 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #462 | libevent_malloc: new ptr-libevent@0x7fb3500342b0 size 128 "road-eastnet-nonat-210" #462: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #462) | b3 aa 18 e3 bb 76 cd a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 e1 dd 76 b8 92 08 2e 86 ea 59 23 d7 a8 a3 c4 | 10 20 64 4d 1a 6e f6 be 88 38 70 1d ff a1 81 97 | 56 46 d0 11 ce c6 71 4d d3 b8 e9 f6 8f 98 00 29 | 10 68 fe 2f 6a fe 59 74 05 66 7b 78 d6 d0 be bd | fb fc 90 3b 61 ee 5a 02 67 1c cb 53 c4 30 e1 1c | e1 cf 60 fe b2 ba b8 12 9c c1 21 b7 9c a2 2e d3 | f2 85 29 0d c8 10 98 b2 a9 8d 09 29 1f fe 72 bd | 6f ac bd 80 e6 e9 9d 07 a0 84 25 09 ab 49 d1 fc | a4 e5 0d 0e 5a 9c 8e d8 0e 96 4d 74 82 a0 b4 18 | 38 39 81 2c 56 26 db 6b e0 e9 32 19 24 e6 ac f3 | 8a 50 27 76 e7 46 84 40 39 2a 33 e3 46 30 98 1e | a4 e6 6f e2 bf e7 be a6 d5 b2 77 f8 b0 8c 25 cb | 3f 99 0a 63 88 e2 f4 8e b0 ed 00 10 7f f7 a6 31 | 7b da 9a 1a 53 83 49 e7 c5 ae 8b 25 41 9e cd 02 | 64 ab a9 c7 ab 71 01 ef 57 dd 6f c5 35 5b 12 e5 | 9c 28 f2 35 96 11 0c e1 05 5e 94 47 29 58 9d 96 | 29 00 00 24 9f cd 6b 85 44 66 e6 2e a2 be db 56 | e9 91 ac b0 be 57 bf 5f a7 03 66 4a a0 9b 90 be | 3c 13 94 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 1b 11 78 68 c9 76 e3 37 8a 0f 7e | ca ac 37 4e 36 55 96 e1 00 00 00 1c 00 00 40 05 | 75 7d 89 5c 82 a5 9e b6 a0 43 f2 ed 22 d9 e8 25 | c0 74 c1 73 | libevent_free: release ptr-libevent@0x7fb37002eb80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #462 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b3 aa 18 e3 bb 76 cd a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #462 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #462 | rejected packet: | b3 aa 18 e3 bb 76 cd a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #462: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0641 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37402ffb0 | handling event EVENT_RETRANSMIT for parent state #357 | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #357 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #357 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49689.10499; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005387 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #357 | libevent_malloc: new ptr-libevent@0x7fb37002eb80 size 128 "road-eastnet-nonat-105" #357: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #357) | 01 73 53 b2 ed 0d 4f 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 5d e8 51 f8 88 2e 8f 82 b3 f0 c5 8d a9 64 a4 | a0 30 bf b5 c2 12 6f 84 86 c4 e5 7c 43 ef 90 df | 5d 9c 5c c9 94 45 36 f4 9a c7 87 0d ff 17 4f a4 | bd 30 02 23 c4 49 d7 cd 90 90 63 b2 f0 74 82 ef | 7b ab 5b 1a 9b 56 e3 fd 6b c1 60 57 a4 3d 47 37 | cf 84 69 51 e7 0c 33 60 a6 88 c6 d3 40 f2 c0 67 | 8b b5 93 bc 89 96 e7 49 3d 16 a4 fa 47 99 08 bb | bf 76 ad cc b2 29 51 14 b3 93 c1 93 70 ab fa 85 | 9c 87 13 3b 74 20 3c a9 9f e8 37 97 e1 cf 3a 19 | 47 ba 4f bf 93 41 7a fe 94 33 ee 81 fb be 0f 8d | 00 a6 62 b8 8f 57 b3 51 57 ec 11 f0 29 c2 98 0d | c4 d2 cf 4a 38 f9 e9 bb 93 44 3a af 7c 9c 77 58 | 65 26 12 0d 96 b7 42 97 54 c0 ec f8 c4 63 9f c0 | 21 fc 89 98 11 d0 25 94 6e 52 89 6d 61 9b 1b e0 | 4a d8 54 ed 06 da f5 4b d3 dd 7c 2c 10 b9 6d 1c | a3 ef f1 ff a5 e4 02 74 f7 b0 97 d7 72 10 8b a3 | 29 00 00 24 2c c1 df 10 e0 1b 6c 08 e6 87 0f da | 7b 1d fc 5a dc 06 9f d4 9a 8b 4f 0e 09 60 b7 78 | 83 2e 36 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be 3a 2f 62 a9 83 16 c4 9b 57 fc 3c | bc 9e d0 29 41 57 58 a4 00 00 00 1c 00 00 40 05 | 08 0b c8 d5 d5 c0 e6 e6 c4 8a f3 fb 5c 3f c5 0a | 4e c8 f0 d0 | libevent_free: release ptr-libevent@0x7fb374034460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | #357 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 73 53 b2 ed 0d 4f 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #357 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #357 | rejected packet: | 01 73 53 b2 ed 0d 4f 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #357: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #497 | start processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #497 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #497 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49689.106251; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003383 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #497 | libevent_malloc: new ptr-libevent@0x7fb374034460 size 128 "road-eastnet-nonat-245" #497: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #497) | 28 b5 38 f6 69 3c dd 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 04 4f fe 15 c7 2a a9 dd 3f 1e c4 af 27 5d f3 d2 | be f7 13 da e4 cd 00 79 29 61 5f 71 06 40 ec 4d | 5b 3c 6a 08 8b 9a 2f 7d 1c cb b0 e7 92 b6 f3 99 | d5 a0 ee 16 30 44 37 37 a1 b0 11 d5 bf c1 2a b7 | f5 d1 e8 e7 c9 c5 fa 46 9e 9f 3a b8 17 a3 bb fa | 54 7b 20 13 28 1b f7 09 b2 95 cc 2b 5d f4 60 59 | 43 48 23 26 2f ff 03 e2 92 b6 e4 28 ce 3a 0e b0 | 61 13 0a de 56 e6 23 f3 78 da d1 d7 d1 36 d7 28 | c6 40 4f d5 36 46 dd 50 a2 1e 26 c4 f5 81 8c a1 | f5 29 b8 66 19 89 39 ca 34 48 2c b5 7e 66 e5 bf | 86 9d 6e 91 75 02 c6 e8 9c 42 e7 98 64 aa 15 f8 | 6c 03 28 e6 79 39 e1 5e 40 0e f9 55 f0 a7 e0 83 | fa bb b8 03 f0 19 b9 6c 46 69 2b 63 42 39 b5 e4 | 3d 0b 8e 6b 21 0c f2 48 0e 67 57 08 dc 21 c5 f4 | 1a 4b 05 96 97 80 b1 ee 12 7e 9f 47 8d c8 b6 e1 | 5b 8f 86 2e 8f 92 b6 42 a3 65 04 7b ab ba 17 50 | 29 00 00 24 bb a3 f2 ad c6 d3 d5 2f 68 33 8b a0 | e0 e2 16 25 72 ec 6d 1a 07 9d 1d 9e dd 96 6a c8 | 4e 10 b2 ba 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 bb 68 12 ef 53 e2 45 10 bb c5 e2 | 24 4d b4 aa b9 d2 2c 73 00 00 00 1c 00 00 40 05 | 18 cd c3 7e 31 14 45 db 85 92 8b 2e 4a 8c 9b c9 | 08 95 b5 b9 | libevent_free: release ptr-libevent@0x7fb370035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #497 spent 0.0868 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 b5 38 f6 69 3c dd 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #497 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #497 | rejected packet: | 28 b5 38 f6 69 3c dd 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #497: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.041 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_RETRANSMIT for parent state #358 | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #358 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #358 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49689.189527; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005226 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #358 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 "road-eastnet-nonat-106" #358: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #358) | 9c 16 21 10 e3 b0 2f 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 b0 5e 24 2c 38 69 f7 5e 0a ef 9c cd 0c a9 a2 | e7 60 22 31 02 17 4e 87 ab da 67 2c 74 68 e6 5c | 3c 13 72 b8 82 de 1f 97 f0 91 0b ef 5f 05 b5 88 | 8f 55 10 d6 ed 84 95 00 12 6f 2a 48 1a 79 36 91 | 49 04 49 1e 83 7f 51 0b cd 40 c4 12 1d 28 81 4a | ff 1e be db 2c 06 48 44 01 2b 86 9e 50 88 79 26 | a2 fe 2d b6 28 25 0f 1c 72 e5 7c 02 81 23 76 48 | e4 63 77 54 94 1c a2 42 e7 62 79 1a 9c c2 d3 a5 | 84 2a 02 f0 5d 86 de 0c ac 44 c1 bc a9 db 93 da | ab e8 d1 96 60 b7 1e 28 8e ce cc cb 77 fb 32 3a | af 1c d9 5d 2b 9d 4c bb 37 50 e3 2c 2a bd a4 df | 6f 99 23 0d 27 83 b0 b4 f9 48 a2 69 86 2e 3a c0 | 5d bf ed 94 bb f2 f3 07 e1 00 d8 2f 62 9b ee ec | b5 9a a1 3e ac 61 be 8a ce 7d 14 b6 c3 13 21 43 | 2f 85 9a 2f fd b3 5f a3 b2 e0 9c 9a 19 21 fa dc | c3 c9 17 3d e7 0b 51 07 b0 13 9d cf 7d 38 e5 ef | 29 00 00 24 31 6e a1 8e 9b bf 74 40 01 d9 c6 2f | f4 95 5e 1f af be c9 b5 67 9c 79 1e 7d 41 57 e9 | 2e 59 a1 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 2b df 62 51 b1 0d 46 7a 83 b8 02 | 18 9c 1e 91 3d 80 67 46 00 00 00 1c 00 00 40 05 | 21 2b d2 d4 2f 80 55 47 29 a9 2f db 69 80 68 e4 | e7 d9 41 df | libevent_free: release ptr-libevent@0x7fb36802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | #358 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9c 16 21 10 e3 b0 2f 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #358 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #358 | rejected packet: | 9c 16 21 10 e3 b0 2f 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #358: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370012bf0 | handling event EVENT_RETRANSMIT for parent state #463 | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #463 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #463 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49689.199871; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004841 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #463 | libevent_malloc: new ptr-libevent@0x7fb36802a950 size 128 "road-eastnet-nonat-211" #463: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #463) | 82 4f 79 37 d2 0d 41 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 90 64 a0 3a db 52 d6 c6 b4 21 5d 30 95 90 4d | ec 3e 65 f9 a3 2a c0 c0 7d e8 b2 f7 1e 08 f4 cc | 30 5c 17 eb a6 d5 4e 6e 17 f4 ed c0 bb f3 91 4e | 29 c8 3b 87 04 44 02 f9 0c 4c 73 bd d1 0e d4 bf | c3 01 38 a2 ee a1 61 19 01 62 c9 01 0a 14 69 dd | 59 d3 14 b1 8b 13 6d e7 0f 1d 11 59 11 9b 90 f3 | aa 66 ef 87 af 13 48 7f 6e c1 0d b9 f9 71 ad 9d | fd 12 e0 bc 30 d7 16 13 c9 f0 f8 64 57 36 fa 5b | d1 d8 74 64 e5 de 63 84 ef e1 12 12 26 93 3e 5c | b3 7f 8e 2c 1b eb d2 40 f2 01 5a e7 a8 30 ce b1 | 5c 5e 42 a8 26 40 52 c4 dc ea 04 68 87 26 50 e6 | 46 ae 37 b9 e4 fe 3f ef f2 8e a4 4f 04 25 af 76 | c9 39 80 05 08 fd ea 60 66 c5 24 89 72 f4 32 ff | ed 8b 39 48 50 c3 c4 68 91 e7 fc 82 bb 80 ce 9d | b8 47 ce dd c6 cc 21 8c 6f 88 e2 73 75 00 d9 09 | 84 88 f6 ce 7e 64 f7 42 86 d8 a7 50 3c 43 db 24 | 29 00 00 24 4c d8 7a cc cf f5 14 f0 01 a0 b3 f6 | 54 e1 4b f5 78 b9 2e d9 dd c8 bf f8 13 79 83 13 | b9 47 db df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 0d e0 3b 3f 2d f3 17 7e c2 11 72 | 87 7f c1 e4 a0 63 0f 3f 00 00 00 1c 00 00 40 05 | e9 2f a4 cf 6a af 14 cf 3c 1b bf 7a 8b a2 e8 94 | b0 6c 66 23 | libevent_free: release ptr-libevent@0x7fb35c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370012bf0 | #463 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 82 4f 79 37 d2 0d 41 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #463 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #463 | rejected packet: | 82 4f 79 37 d2 0d 41 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #463: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad4380 | handling event EVENT_RETRANSMIT for parent state #498 | start processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #498 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #498 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49689.241226; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005528 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370012bf0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #498 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 "road-eastnet-nonat-246" #498: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #498) | 68 4b 64 40 03 e3 f0 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 69 29 47 91 ea fc 2e df 27 76 0c 26 38 63 6b | ee 03 64 3e dd 2d 4f 5c a2 7c 3e 41 2e b2 c6 84 | ff d7 8f ca 24 8a 1a 84 04 b4 3e b6 53 38 d4 57 | 6d a4 68 41 c6 e5 8c 59 22 a7 fd d7 67 07 36 7e | 1e 40 23 48 d2 30 3e 8e d0 0e 2f 85 d4 6b 01 86 | 85 76 00 26 45 82 b5 a1 ed 94 31 de 85 9c 6f 9a | d2 cc cb 6d 68 f4 36 91 7d 92 94 a9 b3 a0 25 d9 | 5a 00 e8 82 c1 6e 50 4f eb 4b c5 77 4d eb ad f8 | f9 00 df 08 85 b8 e7 b1 b7 09 70 ca fb b5 96 54 | bd be b6 e6 4b 40 d9 6a f9 30 1c a8 77 f3 85 c8 | 21 54 2e a4 d4 8e d4 56 c2 16 22 dd 3e 05 97 69 | 65 6d 3c 5d 0f 12 01 33 b0 f7 91 7a 47 03 5b 97 | 4d 0e 9c 52 05 49 6e 01 9c be f7 12 23 b1 5e c9 | 73 97 42 af ac c3 1d 81 30 3b a9 46 14 e0 b0 65 | ab d4 ac 96 fd 2b 1a 19 c7 e5 47 a1 84 25 26 11 | 99 9a c0 71 dd 5f b8 d7 21 7f 1f c8 a8 a3 e9 18 | 29 00 00 24 87 96 a9 cf f1 29 2d 50 7c 79 d6 68 | 62 af 98 cb 71 a2 fc 0e ae 94 c2 03 22 51 95 ed | 81 12 8d c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 71 da 0a 79 9e f6 1d 6a 6f 5a 6b | 39 aa 0c e1 fb 50 58 ee 00 00 00 1c 00 00 40 05 | 43 dd 8c b7 86 3c b2 4e bf 53 d1 4c 55 30 14 19 | fc 2a 32 31 | libevent_free: release ptr-libevent@0x7fb37002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad4380 | #498 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 4b 64 40 03 e3 f0 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #498 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #498 | rejected packet: | 68 4b 64 40 03 e3 f0 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #498: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374013710 | handling event EVENT_RETRANSMIT for parent state #359 | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #359 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #359 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49689.263564; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00408 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad4380 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #359 | libevent_malloc: new ptr-libevent@0x7fb37002a950 size 128 "road-eastnet-nonat-107" #359: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #359) | 73 c2 2a a2 cb e2 3d 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 2e 83 fc d4 94 f1 45 60 7e d6 c0 1f 1c e7 33 | 0f bd b7 8a 76 4b 8b 45 55 e6 bb 84 3d 22 78 af | 75 6e da ff d0 e9 4b 87 08 80 14 e9 1e 9e bb 0e | 16 e9 ea 66 ca bd 7c 66 87 ad a8 d9 21 e1 38 83 | 1f 32 ef a7 2f 0e bf 2d 1d 63 39 6b 83 61 62 c6 | 3e 6a a6 28 e7 8f 0a b3 a0 d9 53 fb be 77 6d 21 | 33 ab c4 d4 01 99 45 77 31 5e 2f ff 5a 01 15 07 | d7 80 2f 1a 7e c3 c0 54 fe ea 5a 9f 7b b7 54 0e | 9f aa da f6 69 55 9a 24 0b a7 e8 7e 52 f9 f8 78 | ba 68 8d a1 bc 1f b0 9f 73 b4 50 08 1b 93 cf 3c | ca 2c f0 94 b0 7c a2 eb fc f9 ec 95 a0 6e 85 2f | 2e ef 23 90 9d 23 ef b2 33 25 ac 56 cb 51 63 74 | c1 ab 1f 93 d7 e6 e0 11 36 c8 47 24 fc 03 91 1a | 9f ca af ad 3e 92 13 be 1e e3 b4 78 2a ad 4c d9 | b9 b1 7c 5e 5e 7c 3e c4 e0 d5 55 d6 b9 f7 15 83 | 2f 6c 01 ee d5 14 3b f0 0d dd 1e 11 8b 30 cd e0 | 29 00 00 24 69 b6 35 41 69 53 97 ba 18 48 44 fd | d5 e2 9a 31 05 82 94 36 da fb c0 91 72 56 36 c7 | c4 dd c7 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 a1 1b b6 5c a0 e8 d3 82 8b cf 19 | 85 69 c3 9f 45 ea 96 77 00 00 00 1c 00 00 40 05 | 5b ca 3a 7b b0 51 af 81 eb d5 3c 03 e7 f7 fa 57 | 2f 45 5b b9 | libevent_free: release ptr-libevent@0x7fb344014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374013710 | #359 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 73 c2 2a a2 cb e2 3d 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #359 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #359 | rejected packet: | 73 c2 2a a2 cb e2 3d 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #359: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0503 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35800d120 | handling event EVENT_RETRANSMIT for parent state #464 | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #464 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #464 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49689.310911; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006502 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374013710 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #464 | libevent_malloc: new ptr-libevent@0x7fb344014c70 size 128 "road-eastnet-nonat-212" #464: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #464) | 24 23 49 88 e3 09 10 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 3e 00 a4 b1 da ff 66 fb 46 9b f8 05 c4 d3 4e | 1a be d3 c5 f3 29 65 46 ed 6f e5 e1 9c d3 68 c3 | 49 3b 6a cd e8 c4 12 c0 42 a0 22 7e 1b 5d 32 aa | a0 3a 32 c8 92 e5 3d a9 90 26 7c b6 7a 3a c7 43 | 1e d7 d9 ca a9 3b e4 0e ac 4c a3 a2 54 be fa 3a | 34 7b 08 69 76 9f f5 86 6b e1 71 f1 ca f2 34 fb | f0 af 6d c0 e7 4d 86 2c 35 64 d7 a8 e5 56 44 f4 | 1b a3 7b 36 d3 8e bf 68 72 d1 d6 14 19 d5 94 41 | 37 2c 85 dd 26 51 82 12 f9 57 28 f6 64 e4 99 2c | e5 14 14 38 a6 eb 30 83 5f a9 d8 ce 33 ba b5 e7 | 8f 9e 29 5d 17 d7 5f e7 f7 6f 44 97 e9 e3 1d 52 | 7d 6b 40 ae 7e e6 9b 70 f4 e4 cb 6b e6 46 d1 1a | f1 d4 e8 4a 08 7a 73 f5 ae fa 1c 51 b5 c1 66 db | b4 47 cd 7b 34 6f da f9 6b b2 dc 0f 59 56 0e 82 | f9 d8 cb f8 b3 e7 8c 71 cf eb c3 24 d5 a5 32 fc | 19 3b 14 fc 10 5b ac 0b 65 e1 fc c1 26 0d 3c cc | 29 00 00 24 f8 5a 68 e8 8f 04 5e 9b c3 04 25 38 | 2e af 26 bb 12 7b 35 ab f6 8f 9b c1 e5 8b f7 b5 | fb ab d6 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 53 56 65 0c 1b 38 25 05 25 e2 17 | 1d aa de c6 51 81 dc 56 00 00 00 1c 00 00 40 05 | b6 60 c7 67 b1 c7 40 e8 a5 6f 2e d6 dc 92 69 0c | f8 bb 28 2f | libevent_free: release ptr-libevent@0x7fb358012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800d120 | #464 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 23 49 88 e3 09 10 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #464 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #464 | rejected packet: | 24 23 49 88 e3 09 10 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #464: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #360 | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #360 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #360 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49689.353245; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006761 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #360 | libevent_malloc: new ptr-libevent@0x7fb358012840 size 128 "road-eastnet-nonat-108" #360: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #360) | e8 ba f7 ac 97 7a d7 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 a7 6a 2f 0e 47 4f c5 a2 87 88 1c 76 27 25 53 | 18 cf 29 be de 65 a5 ec fa 8e ba d5 95 70 46 1a | 5e 82 ee 5e ea 78 6c 5e e1 5a ba c3 42 fa 62 85 | 96 61 49 94 e4 26 35 02 12 7e c3 49 17 01 2e ad | da 08 aa 31 5d 07 3f 11 e2 3e a1 55 1e 97 51 1d | 21 13 8f d7 77 02 f2 6a 5f 3a a3 ad 67 d3 b3 fe | 4d bc 3d 87 97 56 a8 ed 5e 65 2d 59 2c 08 c6 f6 | e3 33 48 1e c9 5b 10 68 f5 80 0a de 74 5b 48 d5 | 12 63 cb 81 c8 06 b2 4b 2a 11 1e ef 99 9b bd 96 | 3d 2d 68 30 3c a5 df b7 7c b9 96 9a 90 b4 80 82 | 7f 32 39 5b 15 a6 11 ef 5c ad af 36 92 59 32 87 | 1f b6 1c c4 37 ef 0e 8f d4 cd 1f 34 87 b5 54 45 | 4f b4 69 d7 3d 68 0c fa bd 14 4f 0f ca d9 05 b6 | 6c 12 d4 47 46 2e 28 86 0e 8a 52 14 fe d2 d6 83 | e9 62 c7 35 25 a1 d0 50 cc af ac b0 fd 2d 90 37 | 95 46 1a 19 98 e1 af 75 ba a4 1b aa b9 40 54 be | 29 00 00 24 1b 6f 95 ad 44 06 60 87 4d 33 ad b6 | 0a 54 4e 5c c3 38 27 ff 28 86 c4 a8 14 ff fc 45 | 4c 10 47 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 71 5e 67 a4 d4 de c3 91 7e 75 5e | 86 6a 2f 03 c9 58 fc 3e 00 00 00 1c 00 00 40 05 | 42 65 a4 4c 2a f8 3a 2c 53 a5 43 50 55 9d ce 16 | 71 5f ac c0 | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #360 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 ba f7 ac 97 7a d7 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #360 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #360 | rejected packet: | e8 ba f7 ac 97 7a d7 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #360: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acab00 | handling event EVENT_RETRANSMIT for parent state #499 | start processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #499 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #499 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49689.366616; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003868 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #499 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 "road-eastnet-nonat-247" #499: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #499) | c7 9c 2c 36 f8 59 d4 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 36 9d 7e c3 eb 0f f5 55 38 8b 43 25 86 54 ef | 6f b9 f8 28 7e 76 ec 92 74 99 fc c9 b6 64 9d ac | b4 f5 fc 31 29 96 7b f0 ef 3c 01 28 c3 ad 1c 4d | 74 6d b0 ed 64 09 35 18 c6 6a c2 bc 6c f8 72 2c | 54 14 82 7e 14 37 d9 e7 9b 9f ce de 7f 99 2e f1 | 1f 25 30 b7 54 88 0c c6 03 fe ef 9a c2 4c 16 3a | 92 dc d7 50 b6 03 1d 9b e5 26 b1 a0 fd e5 86 9c | c1 bb a9 1d c8 aa e0 66 62 a8 ef d5 a3 e5 1c aa | 48 a0 13 72 a6 76 d4 63 de 8e 77 d1 a4 a1 70 1a | 05 7e fd e9 46 8f d7 69 9c 5d 01 6a 23 bf d1 7c | 60 fe 3b 08 36 7c 46 56 5e fa 3e 87 6e f8 5c e5 | 62 26 d2 09 02 d7 a8 88 f2 80 8a 7b d3 24 87 ec | 98 c6 06 44 cf 2e 14 1f 9a 9e 11 3b 15 35 10 67 | 80 78 af 3c 90 b3 be 54 94 f8 6c d9 36 9d 34 3f | b2 ee 4f 6f 8b cb 03 13 29 6b 61 bf aa 20 b1 02 | 64 9a 46 8c 58 45 74 b6 a7 9c 3f 9f 19 1b d5 f4 | 29 00 00 24 ae 3f 5f 22 5a fe fe 91 94 31 fc a8 | 30 c0 4a f7 3c 57 3c 0d ed a5 29 f2 71 dc 56 3a | ed 9c a9 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 89 ab ab 1d cc d7 b6 cb 29 1c 48 | e7 84 01 ce 34 15 c4 5f 00 00 00 1c 00 00 40 05 | 7f 71 39 3d 41 d0 36 ee b9 ed 2b b5 28 d2 9e d8 | 0a 4d 91 1e | libevent_free: release ptr-libevent@0x7fb344034470 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab00 | #499 spent 0.0848 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 9c 2c 36 f8 59 d4 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #499 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #499 | rejected packet: | c7 9c 2c 36 f8 59 d4 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #499: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #465 | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #465 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #465 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49689.404875; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003808 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab00 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #465 | libevent_malloc: new ptr-libevent@0x7fb344034470 size 128 "road-eastnet-nonat-213" #465: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #465) | 61 8e 23 d2 13 62 a1 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e ff ad a6 69 28 f7 dc 3e 12 16 a3 b8 12 d1 0c | e2 d9 c7 08 64 20 6b 95 e2 f7 13 3f fe 41 07 b0 | 63 aa 7f 3d 77 9f f9 e2 21 16 88 33 88 34 63 be | 66 c4 e1 0f 6d 0e 67 89 ae 7f d4 2b da 09 0e c2 | 3d 5d ed e3 b1 da e4 45 10 b1 c5 e8 5c a0 b7 e1 | 45 c7 74 34 87 11 e9 20 8e bf a9 d5 b7 7f 3e c8 | 87 13 ea b0 4c 38 35 35 21 28 ca 99 cb 90 60 a1 | 8c 47 23 f8 9b b8 e8 b3 af 65 36 19 01 0f 99 db | 11 cb f7 6b 11 70 78 e3 5e f3 08 79 6c d7 3e 9c | aa 63 ab c1 3b 94 5d c4 f5 a3 7c fb 68 79 fd 4d | ad 0f 3b a0 62 30 54 4e 21 46 20 c3 e3 03 c6 e1 | b9 0f 7d fe 4b b3 60 7d 63 ba a2 4c 73 2e f3 b8 | 3b 22 a2 5f eb 6e f7 60 a7 f7 13 33 69 2d a4 92 | 73 a6 b3 6f 83 80 a4 99 0d 08 29 5e d9 35 92 ae | 9f af 0f c2 f8 4b f3 a5 f1 21 b9 71 6a 24 94 9a | 22 03 aa 3e 91 42 1b 0b b8 8a 56 9b 18 21 37 6d | 29 00 00 24 d0 d3 37 6e 16 17 0d f3 9a b3 75 28 | da 73 bd b0 37 5f e8 7c ed 64 dd a2 58 d5 25 f4 | 40 05 3d 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 42 81 75 52 0a 3a ff 0f 6a b7 c3 | 61 92 38 6c 3b df 54 bd 00 00 00 1c 00 00 40 05 | ac 90 18 d8 00 f9 15 ad 07 5e df 3f 97 c5 48 08 | 0a 92 84 e5 | libevent_free: release ptr-libevent@0x7fb348023e80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #465 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 8e 23 d2 13 62 a1 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #465 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #465 | rejected packet: | 61 8e 23 d2 13 62 a1 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #465: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0539 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c018460 | handling event EVENT_RETRANSMIT for parent state #361 | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #361 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #361 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49689.423169; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00851 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #361 | libevent_malloc: new ptr-libevent@0x7fb348023e80 size 128 "road-eastnet-nonat-109" #361: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #361) | 9c f5 2d c8 50 35 55 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe f7 f3 f1 6a 76 6a 9a e6 0e 10 b4 e5 b5 16 07 | 0f 90 8a f4 dc 9f 27 b0 2a 41 17 f0 21 60 87 50 | 11 a6 84 2e 86 94 e1 65 4d 1a 59 ce 11 45 d2 c5 | 09 df ce 0a 2c f9 3e 7e cb 59 88 eb 93 1a 26 06 | 39 22 a5 57 b6 f2 5b 4c fe 56 6a 26 49 df e6 84 | b9 e4 e4 41 19 a0 e8 70 69 c2 51 79 76 2e 80 40 | 6f 9e 4b a9 87 c2 02 65 d3 3e 05 60 b6 af 86 d7 | 52 3c 7a 52 e9 69 b8 2a e6 43 99 6c 72 d9 7c 1a | 8d c9 5b fb a3 c2 fc 51 d5 fc c8 85 ff 46 8f 64 | e3 d3 a7 99 28 b1 43 6d 9b 9d 50 e1 af 1a d6 ff | 7e fd 10 23 a2 a6 f9 9b d2 06 fa 0f 91 01 67 9f | 42 43 ac e6 4f ae 3e 00 59 5d 7a cf b3 59 12 67 | 0d c1 86 cf 82 5d 20 9e 98 97 ec b2 7e be 63 74 | b3 15 a1 c0 63 a7 5d 61 bb b3 2f 2d 42 15 59 57 | 72 ca 0b d8 9e d0 1b 84 91 fd db 5e 8f 2f 62 ed | 99 8c a3 a5 ec ef 08 26 6f ab 64 68 6b 97 9d 3e | 29 00 00 24 5d 7a 1f c2 56 77 bf 60 f2 37 f5 ed | 4d 94 c3 a6 58 e2 5f 6e 1b f6 b4 76 e5 69 0c 98 | 27 55 cd c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 71 91 34 7a e2 ba d5 01 f3 c5 56 | ba 5f 83 71 00 17 86 15 00 00 00 1c 00 00 40 05 | e0 46 0d f9 99 b9 47 b4 35 a0 04 20 4b 9b 45 ee | 1c f7 92 53 | libevent_free: release ptr-libevent@0x7fb34c01a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c018460 | #361 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9c f5 2d c8 50 35 55 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #361 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #361 | rejected packet: | 9c f5 2d c8 50 35 55 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #361: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0514 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338018460 | handling event EVENT_RETRANSMIT for parent state #466 | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #466 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #466 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49689.483503; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004113 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c018460 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #466 | libevent_malloc: new ptr-libevent@0x7fb34c01a4e0 size 128 "road-eastnet-nonat-214" #466: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #466) | d8 f3 8e 44 6b 2f 1e a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c e1 1c b6 a8 45 43 90 db 9b 35 75 1f aa 92 f9 | d6 e2 6f 34 81 df f8 c5 fb 61 93 34 a9 9a d6 e7 | 4f 19 4e 64 91 79 4b bc 74 e5 43 7f 1c fd f5 46 | 67 4f b3 d8 c9 4d 2d c9 eb 26 c5 ea 6c 36 ba 25 | 06 8c 1d c8 05 71 c9 48 a5 ca a6 91 9c 00 5f c8 | af c1 a9 4d 01 92 ef ab 3a e6 5a 67 89 38 c9 af | 19 fe 4d 6b 76 3f 95 f8 65 3e 4b 5b 24 34 56 32 | 9f dd 59 97 7b 03 2f 23 ce fb e6 f8 e4 68 93 ff | ad 3a cf f3 67 73 9d e1 9b 2a d0 84 d4 ba 4d fe | 72 3c 74 29 f1 ab eb eb fd d6 c3 47 54 02 c4 5f | 85 e4 bc a9 88 7b 25 6d 99 c6 f0 38 89 09 7c 47 | 72 c2 61 46 a0 1d 59 09 82 b5 5f b7 e1 f1 5c 0d | 50 1d c9 01 1e 1c 93 24 6c e4 5b 27 7f 49 97 85 | 14 7e 19 88 ae dd 1a b6 56 79 35 3e ff bd 7d 4e | 47 80 ff 35 79 4b c6 1c b6 e7 5a d2 8f b2 aa 73 | 6a 88 5b 1d bb 78 3e 8d f2 9b 06 47 8f 4b 75 e7 | 29 00 00 24 4b 18 d5 35 7f 58 ef 5d 8f 25 3f b5 | cb 0b 31 6c 2d c9 a6 3f f9 92 29 72 9b 38 37 11 | 6a b0 a4 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 d8 47 26 17 c1 8a e8 09 00 37 fb | f1 38 56 14 b9 a5 7b 42 00 00 00 1c 00 00 40 05 | 10 91 19 bc 27 f8 ea 8a 40 18 2c 45 b2 2a 2d 38 | 23 45 ab e1 | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338018460 | #466 spent 0.226 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 f3 8e 44 6b 2f 1e a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #466 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #466 | rejected packet: | d8 f3 8e 44 6b 2f 1e a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #466: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0999 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #500 | start processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #500 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #500 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49689.484974; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003708 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #500 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-248" #500: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #500) | dc 38 e1 a3 3b e2 b1 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 4a f1 97 41 66 ce d4 ab 90 74 77 4f 00 cb 43 | 1f 3a 29 28 bd ab f1 45 3f 88 a4 79 39 fe 2c ee | 1b e9 2e 5c de da 76 bf a3 0c cc 93 b6 1b 8c 68 | 84 10 8f 55 6f 47 ec 76 41 18 0c b4 50 73 cf e8 | 55 11 98 5d d0 8c 2d e1 b9 47 bc d9 dd 4c 8a 72 | 7c cf 3b 3b b2 57 cf 3d e0 1d d4 39 94 72 a1 23 | 6b 6c 49 1f b9 94 b3 b7 a4 33 d9 35 1a 97 76 7e | 8f eb c4 34 d7 30 b6 ff 0b a0 77 62 d6 0a a9 b7 | 60 e4 b0 4d 0f 38 4b ae 9a ce 16 98 d0 34 95 01 | 44 fe 57 be 26 cf f9 d3 b8 79 e7 d6 d9 c0 2e 7d | 90 21 6f 7d c3 bc 04 f3 80 08 f6 e6 0b 6f 05 a0 | f8 da 5b cf d5 f7 d1 f1 f5 c0 29 8b c4 a2 cc 29 | 8c e2 9a 9c 8f bf ae c2 b0 3f ce e4 df fb 71 f5 | f7 13 31 70 b5 0f b2 9e ae 64 eb 2c 73 aa d9 5b | 7a b9 c4 3b 46 10 f6 92 a7 5e 0d a0 e7 06 8a 74 | 5e 40 71 07 4b d8 c5 08 71 52 bd 30 01 84 10 98 | 29 00 00 24 73 e7 fd d9 0c 07 09 ec 59 bd 7a b5 | 40 29 3e 5b f2 d3 e1 ea 7b 04 b1 b4 b1 5f 03 d2 | b4 24 ec 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 f6 20 af 00 f8 ef 66 b3 21 e2 19 | 0f ba fb 8a ed c9 14 86 00 00 00 1c 00 00 40 05 | 70 63 55 d1 ed 70 f9 1a 8c 9d 5a 9a f7 cc 31 61 | 9c 9b 74 c0 | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #500 spent 0.177 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 38 e1 a3 3b e2 b1 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #500 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #500 | rejected packet: | dc 38 e1 a3 3b e2 b1 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #500: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0892 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad6ec0 | handling event EVENT_RETRANSMIT for parent state #362 | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #362 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #362 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49689.526382; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005002 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #362 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 "road-eastnet-nonat-110" #362: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #362) | 79 e0 7b db bf e0 df 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 58 27 86 c5 f9 8c cf 89 68 d1 9e c2 2a c8 4a | da 7d d8 07 8a b5 64 43 22 f7 a6 30 97 ca b8 f5 | c8 25 5f 3f d2 8e be 62 d3 8d 6c cf 71 bf 76 63 | d9 07 8d b1 c5 9f c3 a7 b8 7e e5 00 03 0b c1 0d | 22 f4 89 95 0c d8 00 e4 8c ba a0 1b ac fa 89 c6 | 67 62 f6 a7 e4 8c 4f c8 c7 77 79 53 f8 98 39 2d | 3b 30 0a e1 da cb f1 fc f0 30 13 27 47 13 e0 65 | 0b da e5 87 6f 0e 6c c0 89 03 ab 2a 82 c5 34 95 | 15 34 67 de 5a aa b5 07 35 bc 95 aa 82 00 b1 16 | 8e 6b 21 e0 45 a5 66 95 6e 83 16 8f 2b ee 03 ef | 02 de 36 db b0 c0 f4 e2 d2 1e 0d be d8 91 f7 72 | cd 14 33 51 64 d5 dd d5 3d 65 70 28 c3 2f 57 3f | 4b 4b d5 8c f2 92 b3 0c 9f 8d a0 2f 9a 5f 9d a8 | 0d ae cd 5e 77 75 b7 48 bb 27 68 90 7e 0e 8d 10 | 86 bf a4 47 df bb 7b cb 34 23 b8 08 15 f3 7f 6d | 51 d5 ae f8 b3 60 44 e0 56 71 c5 a9 57 5a 24 c6 | 29 00 00 24 3b 79 7f e5 5c de f0 ae 26 7a 15 81 | 35 42 e6 f3 1d 66 3a 94 36 41 6a 99 ae e0 a8 96 | 08 73 ec d2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 91 48 5f b0 47 d4 61 2c f1 27 03 | 24 75 2b 95 c4 3a 3e 58 00 00 00 1c 00 00 40 05 | ec 66 fb 7f d2 86 12 b1 2b 4e 47 12 62 c8 23 32 | 13 d6 12 8d | libevent_free: release ptr-libevent@0x7fb37403ae20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | #362 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 e0 7b db bf e0 df 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #362 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #362 | rejected packet: | 79 e0 7b db bf e0 df 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #362: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c012630 | handling event EVENT_RETRANSMIT for parent state #467 | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #467 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #467 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49689.566752; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004829 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #467 | libevent_malloc: new ptr-libevent@0x7fb37403ae20 size 128 "road-eastnet-nonat-215" #467: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #467) | be 07 ac 9a b2 b5 64 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 4e 05 41 e0 9c 82 57 92 0a 9a c0 ac b7 0e 16 | 8f cf 40 f2 c1 21 c6 0e 53 7f 71 9b 23 53 ab 32 | ef 64 72 bf 1c eb 94 98 29 9f 35 3d 25 d3 1c 5f | e7 9d 00 19 e2 0a 16 20 a6 ea 3a 6d 7b 32 8e 93 | 96 ee 8d 09 fc 5d f8 27 b9 ca 49 09 65 ce cf 30 | 67 2e f4 4f 3d ad 29 2d 5a 4c 68 40 7f 94 6f ad | f5 98 12 1b 59 74 90 02 ab ae 6a 47 c6 cb f0 fe | 1e 5f 8d 21 2a 5d 11 fe 17 3b 75 9d 65 5c 76 a0 | e4 ca 7c e0 c8 8a 37 49 e6 36 2e 9d 9d 6c be 13 | f2 87 dd 81 d0 10 4c ee c7 ac d9 53 97 d2 c8 92 | 06 a5 e1 c9 c7 93 30 ee d6 3d ac 47 98 50 1f 6d | d0 3a db 8b df 20 7f 6b 55 4b d3 fe b0 df 95 14 | 4e 40 f5 72 7e 0c bb 04 da d9 d2 07 87 d2 e0 72 | 1c 20 5b 2d c2 5e 0e 89 32 b0 a4 ac ae 09 91 0a | ac c6 1c cc d1 3b 35 35 b5 b5 4c 01 ce b4 2e ea | cd 79 86 98 20 31 06 5b 6a 88 36 07 19 32 e2 40 | 29 00 00 24 65 a2 6f 51 03 e0 c3 95 a1 17 d9 10 | 35 d2 c8 05 2a 6d 6f d8 b4 c3 4c 08 92 7c 46 6b | 3f 11 55 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 95 f5 c4 0f 53 2d de 04 94 5d f4 | 44 07 bd 21 62 32 e6 d2 00 00 00 1c 00 00 40 05 | d8 32 98 63 8b 4a fe f1 1f e4 de 6d 0f 9b fc 4d | cc 8b 9a c1 | libevent_free: release ptr-libevent@0x7fb36c04b970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012630 | #467 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be 07 ac 9a b2 b5 64 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #467 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #467 | rejected packet: | be 07 ac 9a b2 b5 64 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #467: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25cc0 | handling event EVENT_RETRANSMIT for parent state #501 | start processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #501 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #501 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49689.573095; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004262 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012630 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #501 | libevent_malloc: new ptr-libevent@0x7fb36c04b970 size 128 "road-eastnet-nonat-249" #501: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #501) | 7a bb eb ab 59 82 f5 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 e6 e7 b7 df 15 1a 88 da d9 de 99 20 d1 37 56 | a1 ac 1e 3f d7 4a 79 5c c8 d1 9e 85 c4 f1 dc d8 | f1 ca b4 9f 14 60 92 de ad 42 9b 69 57 eb d4 33 | 23 a5 0d 4e 25 37 79 9e 75 f6 18 19 e2 36 6a 82 | 3e c6 41 e8 fb 1d 27 30 85 3c c4 c4 37 ed 39 57 | 59 68 3d d5 92 7b 15 e0 1d da a4 bf 8a 13 2e 99 | fa b3 d7 34 a7 e9 ee 45 93 41 ea 47 57 78 a8 c7 | 28 3e 80 cf 3a fa c3 5c 40 7e 2d 6e a8 8f 1a 76 | 9f e3 ee 0a 5c 09 b9 35 7b e1 73 9e 9a 5b 7e 05 | af 57 ba 41 a4 20 67 9b 93 00 a4 77 65 8b 72 e8 | ca c2 a7 8c f8 bc 75 a9 2f 52 c5 be ea 41 46 90 | 6a 2e 17 cc 87 cc 0a 22 0b d8 b5 c8 dd ab 30 09 | 90 3a 1d 65 9d 2f 73 fc c6 06 30 d8 66 83 64 c8 | a7 e5 c1 23 61 62 8a 18 87 ad dc 7f 74 de 65 20 | fb ed bb 7b ca 02 66 e1 c0 5c b2 b3 41 14 ad 3d | 9e 02 fd e0 c6 5b ba ef b1 16 d3 d4 8f 92 d4 90 | 29 00 00 24 0f d0 3c c8 9f 70 8e 25 2a 4f 78 c0 | 1d 68 16 9a 4a bb 3c a4 19 fe 19 3a d7 7c 1c 89 | 23 2f 21 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 3b be 6c 39 30 3e f5 fc f3 31 c5 | 53 ef 34 5b ca c1 eb 03 00 00 00 1c 00 00 40 05 | 86 82 cd 41 4f 66 70 19 76 ed 27 dd 0a 04 2f 6d | e6 1d 3e b6 | libevent_free: release ptr-libevent@0x7fb38802c0a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25cc0 | #501 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a bb eb ab 59 82 f5 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #501 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #501 | rejected packet: | 7a bb eb ab 59 82 f5 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #501: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fa300 | handling event EVENT_RETRANSMIT for parent state #363 | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #363 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #363 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49689.594369; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005966 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25cc0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #363 | libevent_malloc: new ptr-libevent@0x7fb38802c0a0 size 128 "road-eastnet-nonat-111" #363: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #363) | 51 61 7f 08 48 15 06 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 a4 74 58 c5 f7 d1 13 97 f0 a1 32 ec ba 3b 12 | 2a d1 a7 2b 3c 6a 89 b1 af 9f ef 60 99 3f 2b 97 | 5a 99 67 3e 04 49 9e e1 18 dd 5b 9a 36 f4 31 c2 | 53 fb e0 15 b1 f1 17 18 c0 6a ef 59 2d 9b 43 90 | f2 8c 3e 64 6c 64 9b 41 4d c8 83 ed 81 03 01 ef | 94 98 ac cb 77 3f 19 e2 3d 9a 98 04 76 6b 13 b3 | cd 7b 90 ce b0 33 d0 e1 b7 52 ee 6b 51 23 7a ea | a8 cb 6b 19 dd 2c 75 92 bf 4f 96 8d 61 90 60 ba | ac 55 20 f8 f6 10 ca 5a 43 53 71 3b 48 a8 5f 63 | 88 26 59 cb be 95 f5 90 58 5a 07 1f 8c 1f 49 2e | ab c9 b4 33 89 02 d4 f8 ad 34 05 81 7c 83 7c ee | b9 f5 ea 3c 82 86 1f 8e fd dd f8 79 c6 1d d2 66 | eb 43 cd 6b f4 5d 2f 21 06 e6 55 35 36 2a fc 16 | 28 b4 a8 e2 ec 6d b6 b7 1a 42 16 71 43 4d 93 a5 | b9 be 7c 8b c2 15 e3 5b 72 eb 03 26 dc 93 d9 17 | b6 f6 7f 82 7f 35 e0 76 a8 41 7c 2a 12 6a fc 61 | 29 00 00 24 05 ae 65 e3 84 b1 1a 26 06 06 7b dc | a8 83 38 36 54 1a c8 5b 72 97 b6 83 dc f9 79 7c | dc 6e a1 e8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 05 ad f7 99 b0 88 ad 41 82 57 31 | e5 ff 67 18 3e 77 ff e2 00 00 00 1c 00 00 40 05 | a3 ac d5 a3 ef 34 92 9f a8 df c6 0f 83 0b 12 93 | d2 32 5e d3 | libevent_free: release ptr-libevent@0x7fb34c03a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fa300 | #363 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 61 7f 08 48 15 06 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #363 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #363 | rejected packet: | 51 61 7f 08 48 15 06 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #363: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5af90 | handling event EVENT_RETRANSMIT for parent state #364 | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #364 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #364 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49689.657674; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005682 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fa300 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #364 | libevent_malloc: new ptr-libevent@0x7fb34c03a770 size 128 "road-eastnet-nonat-112" #364: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #364) | 33 be fb 4e a0 1f 6e f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 2a 42 5d a7 d8 6e 30 43 82 cd c7 8b 99 36 58 | d8 cb c2 34 66 ff 8a 30 2d b5 6a f0 e0 25 f9 40 | 18 b9 ba e3 e0 90 ff f4 cd 9b 1b 34 38 ee bc bc | a0 41 ef 4f 47 94 f5 37 14 2e 5c 6e 0f a6 94 db | 88 81 75 e1 ca 78 c8 9f 91 97 49 cc 62 0b 7c 24 | 05 6f 34 9d ba a1 13 0a 58 7e 2f 7a ad f7 32 fc | 1d 0c 87 25 75 e1 21 b8 48 fb 8f 7c d6 35 a3 1a | ae f0 b3 f0 3b da b9 9b f9 3d d2 6d c0 fe 81 68 | c2 c7 a1 4c 73 5e 1c b4 3a 58 ed b8 29 5f 91 4a | f8 66 00 af 13 4e e2 0d 66 a8 97 6e 0e 81 4f 92 | 8c 69 2c e3 38 08 3d ee 34 5d c4 0d 5d 92 19 a0 | ed a9 9d c5 1f 5c c0 55 9f 77 6e f9 34 95 4c 9a | 1b 67 cf ca 63 f1 13 a2 4f fd 39 a9 a7 28 45 69 | a8 39 46 14 38 17 c4 c7 52 5d 03 e8 bd 24 28 07 | 48 28 79 7d f7 c5 f9 df 10 a1 d2 ba 0c 72 5c 57 | de c7 d6 50 9c eb 46 ad 18 84 34 9f f7 a9 0f 36 | 29 00 00 24 57 1c 59 6e 8c 59 64 04 26 7e c7 7d | 57 3e 20 cd ce 8c 1c 54 8d 44 77 eb 53 6a 1b 23 | 5a 68 d6 45 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 b7 ef ef bc 35 4f 63 6b 7a c6 35 | bb 1f b7 d6 68 94 93 4f 00 00 00 1c 00 00 40 05 | 20 e3 22 42 33 64 b9 da db 7f 44 ff d7 76 e4 71 | c9 1d dc 40 | libevent_free: release ptr-libevent@0x7fb35801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5af90 | #364 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 be fb 4e a0 1f 6e f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #364 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #364 | rejected packet: | 33 be fb 4e a0 1f 6e f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #364: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac3ec0 | handling event EVENT_RETRANSMIT for parent state #468 | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #468 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #468 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49689.664962; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005109 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5af90 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #468 | libevent_malloc: new ptr-libevent@0x7fb35801d920 size 128 "road-eastnet-nonat-216" #468: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #468) | 7d 98 8a 9d 47 30 f3 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 4d 82 7b ce 67 f5 e3 c7 ef 1e 88 97 12 6b 1f | 83 b8 f4 6b 5d e2 86 e0 e9 f2 9b 39 cc 52 e7 74 | 42 1d 82 da 97 54 f4 cf 8c bb 44 74 5b 79 77 99 | b7 64 d2 5d 6f 79 ec 9a 9b f2 ae b8 84 7a 6f f8 | bd c4 91 ab 33 ef 63 16 a0 41 ba 3f f0 a6 76 33 | 99 9d 4e fa 10 3d a9 b0 fd 9d 95 6a 6d e1 64 80 | d6 f4 63 87 42 a4 40 d5 c9 d1 7b e6 b6 16 87 12 | 6b a3 97 13 be 62 fd d1 99 d3 9b d9 d0 66 91 ae | 70 9a 30 e7 e3 dd b0 da 82 fe e4 f0 44 cc b3 94 | 0b 57 c5 e6 97 4b 2c 01 fc cf bd 64 1e a3 1b 36 | a4 86 4a 71 7a 5d 83 15 27 9a 5b c7 b1 4b fa cd | 49 2c bf cb fb 1f 32 58 4d 30 7f 18 2a 34 d2 95 | e4 1f 33 09 6a df d3 45 5e 2c d0 94 30 dc 69 26 | e1 ac dd 8a 80 89 5d 10 3f 35 db e7 62 f2 ea e4 | 46 d5 0d ed 2d ad c4 c0 e6 d7 96 39 cc 2d f8 c8 | 62 6c cf 39 6f 6d 88 19 5a ed 59 0b b3 2a c0 06 | 29 00 00 24 92 6b ec 6b 64 1a 9e 4e ed 8a 02 4d | da d7 da b0 19 37 ca 67 a4 74 bd db b5 b1 e8 9c | 42 18 dc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f 7e f5 e7 e8 50 e9 16 af a5 e6 5b | b1 d0 cb b5 42 f7 79 13 00 00 00 1c 00 00 40 05 | f3 f2 fc c6 17 9d d4 89 d0 fb 82 c7 ed b0 98 6a | 20 f1 09 0b | libevent_free: release ptr-libevent@0x7fb384027b30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | #468 spent 0.0877 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 98 8a 9d 47 30 f3 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #468 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #468 | rejected packet: | 7d 98 8a 9d 47 30 f3 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #468: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b07dc0 | handling event EVENT_RETRANSMIT for parent state #502 | start processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #502 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #502 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49689.672197; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.00418 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #502 | libevent_malloc: new ptr-libevent@0x7fb384027b30 size 128 "road-eastnet-nonat-250" #502: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #502) | 49 84 03 55 33 41 14 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 b6 56 c0 55 c6 5a b3 d0 b1 3a cd 2c 2d f1 98 | 2b 05 72 d6 2a eb f1 a5 ce 1a 6e fe 9b 76 4a e6 | c8 9d 68 cf 67 24 b2 a5 b6 c1 96 48 84 37 b3 8b | f1 39 9c c4 10 9d db 1a 8e 7f b3 36 f3 a8 eb bd | 2b 28 0c da ff 40 e9 6b c2 33 b1 41 cc 82 3c 97 | 2f 0e a7 48 25 26 c1 d7 53 0e 21 ee 94 d4 a0 38 | 49 e2 15 f5 13 68 e2 8a cb ba 80 6b ce a6 00 d2 | 69 7e 9f 04 65 f3 ae 81 71 49 2a 5f 8f ee 09 49 | e3 ff 1b cd 41 64 ae 29 01 91 5e 32 c3 26 78 8f | ea 20 2b 0f 18 2d 0a 1f 22 af 98 ef 92 ff 6a 84 | 62 82 19 1c 56 bf 8b 8e 12 15 12 c1 19 da 4c cd | 49 b3 95 88 b6 66 33 d3 36 cf f2 bd 45 7d 72 a1 | 21 21 16 69 39 89 66 de 9b 3d 56 7f ea f5 ce 47 | 7a 2e 75 2e cf 9b 6b 32 55 e0 ae 5b c0 56 2e 7e | b8 fa 3a ca aa 83 6d 0a b9 cf d2 e5 75 34 ef 7c | fd ec 25 52 b8 3d 7b b9 f7 15 a6 0a 76 51 86 5e | 29 00 00 24 9b c1 28 9f 3d 89 a9 b6 3e c7 19 65 | 88 8e 41 03 11 21 a9 0f 26 57 6b e7 b4 25 21 32 | 2d ba 55 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f d1 0c 18 0e bf a2 52 1e 5c d3 e7 | df 48 7e 58 7f 45 57 fd 00 00 00 1c 00 00 40 05 | c9 7e 47 3a 28 a9 19 bc aa dc fd 65 a2 d8 10 d7 | 15 14 41 45 | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b07dc0 | #502 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 84 03 55 33 41 14 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #502 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #502 | rejected packet: | 49 84 03 55 33 41 14 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #502: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388015720 | handling event EVENT_RETRANSMIT for parent state #365 | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #365 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #365 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49689.726478; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004467 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #365 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 "road-eastnet-nonat-113" #365: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #365) | 85 67 19 58 d7 3c f0 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 c9 07 e2 a7 25 a6 09 ab 7f e9 5d 7e 7f 47 e1 | 9f 44 d1 91 14 4d 9b 8f 5d 22 2a 52 a8 98 ff b2 | 6b 6a b0 36 7f fd 95 da a0 25 8f 6e 16 7f 04 38 | 86 c2 bd 33 bf fc a5 26 c4 b6 f6 70 3e fd c6 4a | 25 c8 b3 a8 9f a8 44 89 83 a1 8c aa b8 af 7f e3 | 16 bb 17 56 79 89 e8 f0 01 49 b8 07 c4 c2 fd 27 | 4f 8e 62 66 4b 11 2b 01 9f f2 8c 2a 44 d1 a6 b0 | 37 65 5b 66 a4 8d e5 2d a7 91 fd e3 72 91 ef 62 | 52 0e c8 e1 f3 04 05 43 a3 3a 3c 61 1b d7 eb bd | 6b 38 06 f9 ff f3 a7 b2 e7 89 6b 9c da 79 fc be | 85 2e 71 9d 7f 61 aa 1d 41 bd c5 f4 78 4a e7 2c | 3d fa 74 f7 ca 33 00 f8 ee a6 a8 8a 16 63 2d 1b | 61 9d fa 4c a8 ca 3a 31 b1 cd 60 8d cb 56 88 b6 | 81 05 15 ed cf 3d b4 c9 19 7e d9 8d 29 23 d3 64 | ec 0b 35 05 39 3b e0 f1 75 19 f5 f3 4f 99 e8 61 | bd bd 06 53 be 50 6f 6a cb bc 2d c6 18 e6 53 b2 | 29 00 00 24 e5 25 b4 c0 9c 12 3e 53 68 a2 43 fb | 88 db 47 7b b4 96 4d ec 31 20 f7 c3 1c a9 eb e1 | 62 8a 8b 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 90 3b 10 25 ca fe 1f 3b 58 67 93 fa | 3d a3 98 00 cc 36 84 a7 00 00 00 1c 00 00 40 05 | 55 c6 52 e3 aa aa 60 c0 64 26 bb 2b 79 4e a4 42 | 73 1e 76 57 | libevent_free: release ptr-libevent@0x7fb3600407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388015720 | #365 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 67 19 58 d7 3c f0 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #365 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #365 | rejected packet: | 85 67 19 58 d7 3c f0 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #365: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.062 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3700407b0 | handling event EVENT_RETRANSMIT for parent state #503 | start processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #503 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #503 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49689.782815; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003639 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388015720 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #503 | libevent_malloc: new ptr-libevent@0x7fb3600407f0 size 128 "road-eastnet-nonat-251" #503: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #503) | de 1d 8d 29 e2 13 e9 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 bc c5 bc ee 45 af a6 73 6a 90 e4 26 1b 45 74 | 00 ed f2 a3 ec 74 88 4b c9 51 b5 6a 38 9f 0a f7 | 89 96 66 a1 cb 3b 36 71 3c 50 00 7f a8 a1 27 84 | 14 72 85 f0 e9 87 92 95 57 d6 bb a3 9e eb a3 89 | 3b d6 9d 72 8e 22 b1 43 7b 48 2b 91 a9 6c a2 71 | 4e b7 05 32 94 32 e3 1e 78 6c 29 24 39 3f 29 25 | a5 fc 7d 8a 16 8c 7f 3c 9e 88 a1 a2 0f e7 3d e7 | a6 2a 71 17 3f ba 2d 1e 73 4a af 59 81 2a 33 e7 | 7c 6b a5 a6 c7 0d 60 09 fe 4a 3a c4 ae f0 db 28 | 63 c7 99 7d c2 1a 2a f5 ca 34 59 14 08 64 3e 0e | 9e 8a 9a 95 bb 9d 48 ef fa 38 ec e3 2c 15 34 9c | e9 d6 59 e6 ff 43 a4 b1 2b ff 91 b3 04 3b c1 be | 1e 15 0a dc 58 8d 95 f6 06 1e 22 79 23 6e 88 9c | fb 5f 8d 89 36 69 ab a3 c4 17 6b e8 27 27 43 a0 | 64 a3 07 0b 2b f0 22 81 09 20 24 c8 81 c7 b3 70 | 64 46 cf dc 25 f9 42 3b 6e b0 ff 34 aa 9a 20 98 | 29 00 00 24 e0 7e ea 52 c4 af 5e ed 64 d4 0d e7 | b4 32 8f da 7f e4 cd 7f 6e 0d 4f bd 11 1c 8f fe | 10 1a 14 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 eb 39 3d 04 da 34 34 c4 55 20 7b | 97 62 11 e4 f5 1f 2c 3d 00 00 00 1c 00 00 40 05 | 56 4f 2a b1 95 be 94 04 9d 7b d6 c2 f3 45 b1 7e | d7 05 c2 82 | libevent_free: release ptr-libevent@0x7fb37003f490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3700407b0 | #503 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 1d 8d 29 e2 13 e9 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #503 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #503 | rejected packet: | de 1d 8d 29 e2 13 e9 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #503: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3840489a0 | handling event EVENT_RETRANSMIT for parent state #469 | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #469 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #469 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49689.786131; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005014 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3700407b0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #469 | libevent_malloc: new ptr-libevent@0x7fb37003f490 size 128 "road-eastnet-nonat-217" #469: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #469) | 29 4a 77 5f 7a c1 26 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 e1 17 9f 01 39 e1 e9 f8 e3 b4 37 56 6e 01 9e | d8 db 78 19 20 a1 ab 6d c3 e8 12 cd f6 c3 2c 5f | d5 86 61 6c a8 d4 5b 57 ac f5 b7 f0 24 de ac 90 | a1 9c 51 ce 2d 7a 33 35 b1 68 02 e0 5a 9f bf ac | 1b d8 19 f9 b4 68 45 14 e7 fd c5 a9 74 d6 09 6d | f9 4a 25 95 f8 f0 1c 13 dd 36 12 79 4b 27 2a bb | 86 17 86 e1 0e 04 a7 ab e3 0c 51 78 89 39 a0 df | c7 a9 56 0a e4 9a f1 58 c7 a1 12 21 f0 18 d0 d0 | 21 0e 73 e6 4f d3 13 37 a8 aa e3 89 21 ab a3 7c | d5 ac 7b aa ea d7 ff a4 b9 b2 c3 7f 9b 07 77 17 | 36 8f 4e a7 40 03 46 9c db 93 b3 16 3c e2 7f c0 | 58 42 83 4f fa 88 71 3b b7 86 e5 ca 62 88 5c 9f | 93 c4 59 82 fb 9e 5a 96 92 16 5f 68 0e 83 59 2f | 70 32 51 a7 ce dd b8 93 09 66 27 ff 7a e6 c4 cc | d2 87 46 9e b6 49 85 48 3f a7 ef 43 8a 5c ae e6 | 2c b0 88 25 66 2b 82 4c a9 2f 05 19 54 70 c3 9c | 29 00 00 24 36 8f c2 cf 02 b6 2e 75 ac 6c a4 55 | 9f 56 a2 b8 31 83 97 a5 56 a5 c5 7a ba 53 78 14 | 83 c8 c0 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 d6 3c 93 bb 1b 68 50 cd c9 2f b8 | 25 99 9e c0 3a 2f 1f 80 00 00 00 1c 00 00 40 05 | e5 a0 2e 8f cb 71 f8 0c 42 a7 95 8f 73 2e c5 90 | e5 8b 3a 32 | libevent_free: release ptr-libevent@0x7fb384036e20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840489a0 | #469 spent 0.0983 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 4a 77 5f 7a c1 26 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #469 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #469 | rejected packet: | 29 4a 77 5f 7a c1 26 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #469: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0398 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2e150 | handling event EVENT_RETRANSMIT for parent state #366 | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #366 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #366 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49689.78837; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00425 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840489a0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #366 | libevent_malloc: new ptr-libevent@0x7fb384036e20 size 128 "road-eastnet-nonat-114" #366: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #366) | 3c e6 10 56 de c7 50 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 fc d0 2b 58 ad f1 9a aa 82 c0 57 ae f0 46 70 | a2 7b 22 23 65 30 fe 9c 0d f5 dc 40 c0 ca 9d ee | 6e 66 1d 3a 72 fe dc 88 4a 26 55 69 91 41 bf 12 | 90 50 78 9a 3c 37 7a d2 58 65 01 98 28 27 ba 6d | 00 33 b4 2e 8f 98 78 f3 cd 21 f0 18 dd 51 cb 68 | 4f 92 9d 38 c4 06 c1 6c cf 60 41 a1 18 22 f2 93 | 34 0c 55 d7 b5 30 6c c4 9c ad 0a aa 9b 11 9f 59 | 49 ac e6 72 dc 82 61 fc 42 ea d8 0b 5d 7d f2 47 | 0f e6 10 b9 1d c6 85 40 80 3f b3 ee 0f dc 82 fa | 53 40 f0 d9 23 6a 65 60 f3 d7 02 47 6c 0a 6f 61 | 8d 04 17 7d 94 9e 17 80 39 4f b5 db 2d a0 f8 02 | 18 21 68 7d 0e af 20 98 75 39 40 4d 5d 87 d7 7b | 4c 39 3b 20 a9 65 05 04 46 a1 49 0b d9 6d 8f 15 | 4f b4 23 1a 8e 5f 27 66 f0 b0 a6 bd 48 dc 96 c2 | 77 e2 b0 72 b6 2c 19 2f 16 65 ef 29 dd a3 4a de | 9a 82 38 c8 cb 37 99 80 5e bb 4b 53 97 7b f3 fa | 29 00 00 24 7a ad 39 64 9f ec c1 f8 33 94 44 40 | f7 c9 dd b2 6b e5 21 16 26 39 73 9d cd 0b f5 7a | f4 93 09 bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 12 7d c7 e4 80 f6 ae d0 f3 0f 94 | c9 99 cc 19 2a ad fe 8d 00 00 00 1c 00 00 40 05 | 84 74 fa e2 ee 48 6b 8a 7f a7 09 f6 4e 00 6d 26 | 52 0f f6 08 | libevent_free: release ptr-libevent@0x7fb3440407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2e150 | #366 spent 0.0843 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c e6 10 56 de c7 50 ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #366 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #366 | rejected packet: | 3c e6 10 56 de c7 50 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #366: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0d4c0 | handling event EVENT_RETRANSMIT for parent state #367 | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #367 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #367 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49689.849634; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004775 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2e150 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #367 | libevent_malloc: new ptr-libevent@0x7fb3440407f0 size 128 "road-eastnet-nonat-115" #367: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #367) | 4a 87 68 98 60 e9 4c f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 0c 97 07 ab 60 f0 87 17 3b e3 ad e6 c0 a4 f8 | bc d0 84 fc 55 d2 65 d6 9f 46 ab 63 b9 cd 86 a7 | 92 52 2d 61 57 c8 33 96 bd 3f e7 29 4c c0 56 81 | 07 2c a6 2e b4 e1 f4 a2 f9 92 52 0a 37 04 e4 51 | 6e 83 7a 8b f6 b0 a9 33 fc 7e 63 8b 04 cb e8 b1 | 89 da ba 9d 79 52 4b 77 ad fe 01 ca be 34 71 25 | 01 b7 c6 b7 a4 d2 8b 5a 4f 28 3e 3a 2c 2d 2b 82 | b6 7f 76 80 3a 8d 21 5e c2 27 da 9c 35 b4 28 8d | 4f 12 52 38 3a d3 0a 5c 8a f9 8f 79 8d 25 d4 f8 | ed f0 27 a3 9a 91 9a 23 17 a2 c5 fb 5c 81 c7 3f | d7 90 16 5d 16 d9 fd c2 ab 94 11 66 13 b9 42 50 | 61 f5 f7 53 fa 66 74 a0 35 1a 38 cb 76 13 72 7a | 71 f8 95 99 2b 70 57 e9 96 87 e1 a7 fa 09 46 16 | 2d 17 ab 0f b3 e3 6d 7d c4 71 f7 b9 01 3d 53 ec | 89 99 23 9b ed fe dc 3d 96 90 a5 f1 6b a2 7c ad | 08 22 28 21 90 c0 9d 24 98 36 19 8c 8e 5f 64 f3 | 29 00 00 24 cc 21 72 ec 84 1b 6c bc be 58 98 1b | fd b2 70 93 97 ae 8a 73 25 e3 f3 ed 6f 6f ad a0 | a3 bc 74 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 20 17 ba 74 ed cb 3d 19 9d 8d 0a | 7d 3c 02 99 ce fc 27 96 00 00 00 1c 00 00 40 05 | be d4 1c 69 d6 46 df 94 c0 c1 0d 02 c5 30 14 7a | ff f7 b4 bf | libevent_free: release ptr-libevent@0x7fb34803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | #367 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 87 68 98 60 e9 4c f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #367 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #367 | rejected packet: | 4a 87 68 98 60 e9 4c f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #367: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38000f8f0 | handling event EVENT_RETRANSMIT for parent state #504 | start processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #504 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #504 keying attempt 2 of 0; retransmit 4 | retransmits: current time 49689.917939; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005353 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #504 | libevent_malloc: new ptr-libevent@0x7fb34803b0b0 size 128 "road-eastnet-nonat-252" #504: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #504) | da 55 48 8d 90 bf 21 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ac 2a 4d 0b 8b cf db e8 71 42 c9 12 73 26 89 36 | f8 7e cd c8 1c 11 8c 7f 9e 09 ce 55 92 dd 78 d1 | ad 59 d2 ee 94 4b 61 50 a3 e8 9a 12 3c 5e 9b 79 | 67 a9 ab b1 17 c4 72 5d 57 f0 6b d6 9d c6 6d f9 | 38 2a f7 f8 e2 f3 15 e5 73 fa 8b 4d 1c fc cc ab | b7 f0 3b 90 c7 95 ba 20 f3 82 29 0e d5 86 2e 2f | d3 3d 1a 6e 6e 68 d3 8e 2c 1e 30 d3 3d 1a 4b 7f | 07 51 04 a3 cd e1 e4 f3 6b 81 ac 0e 5e 25 fc a6 | 2d 49 a3 1d 9d 7f 10 1c b8 aa 6d 0b 48 63 e7 ab | 47 28 bd cd 66 43 28 3d 25 f6 20 56 e0 bb 73 1a | f5 3a ee c2 95 1c 1f 57 8f 41 e9 d9 d4 e4 b4 be | f5 98 c0 78 1e 91 5d ba 02 2c 3a cf 04 e6 44 c6 | a4 f1 83 88 9a 45 b6 e7 89 2b 45 be 54 48 e8 52 | 9b 95 05 7a d4 dd af 6d 96 db 42 ed db 5d 0c bc | 83 61 0a c3 fd 33 2c bd cf 88 1b 95 c9 43 7a fa | 73 7b 7d 2e f9 6a 53 94 78 2b 4f 21 f2 f3 1d f2 | 29 00 00 24 61 bd 30 86 3d bb 50 44 5f 1b 26 2e | 52 63 1b fa b0 23 2c cb bf bc 70 41 cc 6b 00 dd | 9d aa 60 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd b5 bb a3 b0 15 ca 04 17 91 f9 55 | 5a 59 4c 3b fd 4e 4a c4 00 00 00 1c 00 00 40 05 | 47 4d 62 c8 1d 9c 5d 27 1b 5d ed df fb db c8 62 | de eb 87 79 | libevent_free: release ptr-libevent@0x7fb3800211f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | #504 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 55 48 8d 90 bf 21 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #504 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #504 | rejected packet: | da 55 48 8d 90 bf 21 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #504: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0482 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5da90 | handling event EVENT_RETRANSMIT for parent state #368 | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #368 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #368 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49689.919223; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004612 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #368 | libevent_malloc: new ptr-libevent@0x7fb3800211f0 size 128 "road-eastnet-nonat-116" #368: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #368) | af 44 01 88 e6 16 c8 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 fe d2 29 cf 90 27 2d 78 45 a2 b1 3a ed 0c 48 | 17 b4 e8 54 dd 68 cf 7e 09 7a af 17 ed 4f 89 f8 | c0 ff 46 bb 6c a6 b3 38 fd f1 d2 cc cf d4 db c1 | e0 88 fe 51 49 6d e3 71 01 85 fe f4 a5 9f 85 04 | b6 d1 25 1f bd d7 ec 86 d1 7c 74 4d 2b 88 9b 37 | 88 75 91 51 15 43 e3 94 29 7a fc 34 e7 47 6b 09 | 3f 68 5a af 07 68 67 15 d9 ca f4 fd c3 d0 6c 2d | 70 40 4e 4a 88 cf b4 8b 6f 34 77 1b fd 2c ac c0 | b5 ab 67 28 d7 0d cf 79 56 41 4a ee e4 5c 59 e9 | 16 2d 45 df 3b 83 50 77 d1 1d 25 2e df 41 d7 96 | e0 ae 3d 15 c2 fb 47 fc 22 43 64 51 9d 2b 27 9e | ef d5 13 c7 bc a8 df 51 ba 9e 32 c3 d2 0e 3d 97 | 23 9a d8 1c 93 38 85 21 ff 2a 81 20 c2 e1 c5 96 | 9d d3 5f 74 e3 dc ae 9a 19 d8 eb 6f 38 2d 11 55 | b9 c5 4b fe 45 56 61 1b 03 ae 41 5d 20 26 7b b4 | dd 4c d4 57 72 8f 74 07 75 75 35 67 ae 9c b4 2d | 29 00 00 24 b4 f8 c7 8c ce d2 25 cc 04 b1 28 85 | 4c 50 50 1c af 66 c6 a8 14 6b b6 e9 07 eb 31 8e | 06 0d 7b dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 4f 54 9f 13 b7 58 02 6e 4f 8f 36 | 8b d5 61 f1 61 e4 53 15 00 00 00 1c 00 00 40 05 | 79 7d 7e 8e 6a 0e d7 b1 f9 8e 14 46 7c 3e c2 fe | 69 34 3d 95 | libevent_free: release ptr-libevent@0x7fb37c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5da90 | #368 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 44 01 88 e6 16 c8 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #368 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #368 | rejected packet: | af 44 01 88 e6 16 c8 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #368: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0629 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf50 | handling event EVENT_RETRANSMIT for parent state #470 | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #470 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #470 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49689.934544; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004069 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5da90 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #470 | libevent_malloc: new ptr-libevent@0x7fb37c035930 size 128 "road-eastnet-nonat-218" #470: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #470) | ab ba b0 28 2b 1d 75 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 e4 df 77 9c ac 7c 40 d9 cc 91 f4 1e 15 f1 e4 | bc 57 e7 d5 04 82 1b 0a da 88 66 71 1d 5c c0 4e | e9 e1 44 ec a4 a7 01 cc ac 81 2a 8e 12 68 b2 c4 | cb fb 38 e3 4b 73 83 33 bf 14 39 b7 96 9c bd 59 | d9 ff 78 9c 9b 27 6f 77 fd c9 8a 91 00 a0 bf ad | 80 e8 18 ee 7d 76 d2 f5 dc 73 28 11 ea 98 07 d2 | 64 7f 44 96 f2 22 04 36 e1 c7 80 69 f0 17 fa 9a | d9 3b f0 c2 a7 d3 89 ef c3 be e7 3b 57 5c b5 bf | 47 3a cd 92 d8 c8 49 50 dd d0 b8 eb bf 2d 90 2f | 70 dc 26 c2 6c 6d 97 1e 52 f7 6d 64 24 1f 5f ad | 51 2f 7a 28 09 01 c2 c0 02 41 61 9f 09 3f 66 24 | 9a 1a a0 e1 ec c0 36 27 88 be e6 c0 7c 74 30 55 | 5b 47 83 d5 de 8f dd bb 1e 36 33 0e 3a 91 ce a0 | e2 86 42 d5 a7 ba 66 4a 76 5d 9a 0c 15 60 fc f8 | 07 4e ec f8 cb 3b a4 f7 40 7b 9c 98 98 27 e7 40 | f3 18 97 7c cd 29 25 1e 88 f4 c6 ab 7c 46 c3 a4 | 29 00 00 24 5d 90 f6 17 67 54 dd 2e 4f 57 ce 29 | 91 07 11 a6 ab 05 8f 42 d3 b0 74 bf 38 9e 49 fe | 79 c7 ca e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 04 17 c7 7e 54 6e 6a e8 f5 01 1c | 14 c4 b8 fd 53 6d 0c 45 00 00 00 1c 00 00 40 05 | ee 06 ba 38 dc 10 50 e4 3e a6 cd 5f 2c e3 74 3b | 2a 18 7d 82 | libevent_free: release ptr-libevent@0x7fb34c0293f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf50 | #470 spent 0.0975 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab ba b0 28 2b 1d 75 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #470 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #470 | rejected packet: | ab ba b0 28 2b 1d 75 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #470: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388043350 | handling event EVENT_RETRANSMIT for parent state #369 | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #369 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #369 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49689.979818; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004915 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf50 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #369 | libevent_malloc: new ptr-libevent@0x7fb34c0293f0 size 128 "road-eastnet-nonat-117" #369: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #369) | ff 18 31 cc 83 7e 2e ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 1f 06 e6 7b ea 4e 17 1c 87 7d 86 73 80 47 50 | cf bf e2 ff 09 37 6a 25 2d 87 f4 71 22 38 1c ca | 11 79 43 67 c5 65 1f f5 07 47 33 ad 73 a4 d3 73 | 51 54 fd df 5a c2 8d 18 cb cc 20 72 8e 07 68 eb | b6 8d ab 31 ba fd fa 9b 7c 59 57 b3 71 f1 91 34 | ea 4b 70 52 a4 6c eb 12 7d 01 23 58 56 9a d3 c0 | a8 35 4b 27 63 af ee d0 37 dd c7 3e 45 5a 0b 60 | bd 6d ed c4 e9 d9 c1 d7 e1 29 a2 3f dc 2c af 7c | e6 74 73 2b 26 15 ca 1c f5 95 b6 33 2f 8c 4a 22 | a1 8d d2 aa 72 d0 9b 41 c8 87 a6 d7 f8 13 c7 cd | 3c d8 62 e2 fc 64 74 ed 50 b1 79 e3 79 44 21 85 | 12 8f 6c 07 3b 37 80 9b 8c 83 41 c0 0e 38 b7 92 | 75 a7 4a 89 81 43 56 e9 67 ee 43 e0 24 9b 53 75 | b9 e5 d1 27 c1 f4 c3 83 7c 57 e4 5e 33 8b e2 10 | c9 ec fe 76 73 25 ae 4b 87 a7 e2 e5 89 5a 08 72 | fc 88 9c 69 9c 14 55 be f9 d1 24 d2 2a 6b bd 35 | 29 00 00 24 03 b6 58 fc c8 79 29 fe 43 44 80 31 | 59 cf 11 77 19 87 27 44 32 ac 84 44 78 ab c0 33 | d7 16 05 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a fa 34 e9 cb c2 b8 b0 71 3e db 9c | 1e f7 0a 0e 8d a9 9b 92 00 00 00 1c 00 00 40 05 | c3 12 1d 90 39 27 a3 80 ba dc 3c b0 c3 6a 52 2a | 1e d7 c5 9b | libevent_free: release ptr-libevent@0x7fb37c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388043350 | #369 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff 18 31 cc 83 7e 2e ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #369 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #369 | rejected packet: | ff 18 31 cc 83 7e 2e ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #369: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0789 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36003b100 | handling event EVENT_RETRANSMIT for parent state #370 | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #370 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #370 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49690.039236; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005437 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388043350 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #370 | libevent_malloc: new ptr-libevent@0x7fb37c00cf80 size 128 "road-eastnet-nonat-118" #370: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #370) | 4a 80 23 ad fc 41 99 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 13 bc 42 a7 35 39 b2 99 5a ec 69 08 73 18 3f | fe 31 dc bf 22 23 10 df 50 13 8d 04 9e ea 66 93 | 98 fa 79 7f 64 34 1f da 27 d5 8f dc 20 be 18 56 | 17 0e c5 53 3e a4 18 ed 82 41 0e 7f 91 9c e6 cb | ef 35 45 6e 59 c7 b5 4d 35 32 d9 63 30 b7 dd 5d | 28 28 04 d3 d6 a5 84 6f 4c f3 94 90 75 da df 42 | 5a 65 b6 2e cd 5e 42 3b 71 3e 46 f7 4b 13 d1 aa | a5 9c 11 b7 2c 83 34 92 e3 55 46 0b 4b 42 12 08 | 06 02 c9 42 46 42 d0 f1 82 14 36 15 1e 2e d4 a0 | 23 35 a8 d9 5e c2 f8 ca da 81 45 00 34 f6 88 47 | 2f 60 cc ac c2 4b 39 55 8a 1b 8f 66 b3 43 72 fd | 59 52 11 ef 5c 2c 9e b7 b7 6a c6 60 eb 22 9a 4d | e9 c0 4b de 56 c3 d3 e4 19 f0 86 9f a5 38 ef 26 | 39 fb ac 6e b8 32 45 c4 d1 f5 cc bb b2 2f 7b 0b | 6b 6b b1 6f 27 b1 bb 88 e7 c4 d6 31 26 e0 94 2a | ae 90 aa 75 e5 cb 3e 1f 43 13 d3 7b 3c ed 1e b0 | 29 00 00 24 a0 6f 08 ca 5f 92 e1 a2 10 08 5a 34 | 7d b6 05 db 65 e8 3d 88 a0 b3 7d 19 ed 75 36 c4 | 95 ec 9c 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 38 cd 57 b0 33 db 6c e3 f5 95 3e | 28 5e 17 44 43 d3 05 33 00 00 00 1c 00 00 40 05 | 6f b1 ce a1 45 d5 bc 6f 48 f8 db 92 31 a1 28 9a | ba c8 a7 2b | libevent_free: release ptr-libevent@0x7fb360023dd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36003b100 | #370 spent 0.211 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 80 23 ad fc 41 99 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #370 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #370 | rejected packet: | 4a 80 23 ad fc 41 99 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #370: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0951 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38800c4b0 | handling event EVENT_RETRANSMIT for parent state #471 | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #471 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #471 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49690.052697; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003905 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36003b100 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #471 | libevent_malloc: new ptr-libevent@0x7fb360023dd0 size 128 "road-eastnet-nonat-219" #471: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #471) | 38 56 99 f6 a3 bb 25 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 88 5e 08 51 b9 62 c5 b6 68 5e 2f 6f 4f 31 ca 1e | 08 9e a2 c5 9c dd 5f fc 7a f4 89 f0 0b b5 e1 ae | ce aa 45 81 2c 95 5e ff 06 f3 6a c5 72 bf d7 48 | 2c ca 52 8b db 25 1b 5b 4e e1 9e 45 05 12 f0 3a | 8b 49 b1 e8 0f d0 bb 39 6c 00 4b 10 55 55 90 f1 | ba 94 0f e8 29 de 7e 8e 75 cf 84 46 0b 85 26 8f | fc de 6b 35 43 a0 ca 14 c9 c0 f7 23 df 3f 39 44 | 98 32 71 b3 fb 93 e6 df 1c 43 a2 c9 a0 c6 73 b4 | d7 9f 3f a9 0b f8 14 fb 29 eb 8f cf f7 a9 d2 3c | 3d 58 a0 39 7e fa 25 48 bc 4b 7f d7 1d e0 11 34 | f6 bf 55 8d 59 da 29 ac d8 c5 88 7a 76 ef 08 52 | 7c ac 5e 47 31 67 af 77 3e 74 07 65 f0 71 26 28 | 79 4d a8 21 1c fb 74 e9 6b f8 d5 df d3 80 71 f9 | 81 36 25 59 61 8d e4 66 0e 09 70 cd be 73 f3 c8 | c4 06 a2 0f 1e 6d 0f ec 2b 18 85 83 48 df f6 99 | 6d 3a 12 52 38 a5 9e 5e 41 a3 52 37 e7 64 a4 6a | 29 00 00 24 92 4d df ea 0a bb c1 4f 13 fb 92 4b | 10 dc b9 f4 e6 b4 8b 01 64 45 6e db 5a 13 b9 8e | 86 b6 57 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 76 c9 73 0c 16 7b 39 f7 77 ab 9f | f0 85 70 80 7e c2 64 d2 00 00 00 1c 00 00 40 05 | 35 b3 a5 34 11 ae 1a 69 08 cc 74 f0 71 15 8c b8 | eb 5a 8d 90 | libevent_free: release ptr-libevent@0x7fb38803c430 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800c4b0 | #471 spent 0.192 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 56 99 f6 a3 bb 25 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #471 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #471 | rejected packet: | 38 56 99 f6 a3 bb 25 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #471: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0851 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380009ed0 | handling event EVENT_RETRANSMIT for parent state #371 | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #371 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #371 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49690.101119; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006925 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800c4b0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #371 | libevent_malloc: new ptr-libevent@0x7fb38803c430 size 128 "road-eastnet-nonat-119" #371: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #371) | ea d3 d9 fc 5b 7e b4 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 af 47 0e 69 de 58 3a 2d 1e 57 76 30 bc 22 a4 | 2e b6 88 1e b3 88 e7 a1 c8 be 2b 4e 69 e2 28 01 | d0 52 c1 fa 78 94 10 52 aa 87 89 5a 02 a4 2d d1 | 6b d9 9b 86 d2 da a0 98 26 8e b9 2f 8a a2 27 af | de 72 28 ad 98 97 b6 15 90 9c ae 3a 16 ae 38 00 | 2e 00 fb 22 bb 46 e6 d4 1f 46 0d dd a1 55 00 4a | ce 15 02 1f 97 d1 0a 8b 6a 9c c8 a8 24 2f 84 76 | 4b d2 ac 8c 05 c7 63 26 60 5d b2 3c e7 66 a9 5d | bd fb b9 24 84 be 9f 9f d0 98 db 75 76 42 5a 2c | 99 3f 96 7c cd 86 57 c4 8b f7 47 04 8d 56 1e 36 | 87 53 98 86 58 32 c9 ce 17 26 19 6b 99 a4 da aa | cb 3c 40 8e 29 32 f1 cd b7 5a 34 1f de 2b 31 8c | 0d 44 f0 ee 94 1a 31 39 88 2c 28 df 02 20 48 5d | 9d 67 4b c6 5a 1a 30 81 19 09 4e 1b ac 9d a3 80 | 78 a7 b1 0a 79 f2 60 13 6a a0 1a 0d 01 b3 b3 40 | 74 bb ba 1f 20 2b 3c 36 9e 56 74 1c ba 16 9e 5f | 29 00 00 24 c2 25 48 18 a9 32 86 16 98 b5 8a 9d | 56 ab 3c 59 82 6e f2 93 a8 6a ca 20 09 df d9 6f | aa 1d 6f e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 eb 88 f4 ae c4 a3 7b f7 07 ac 42 | 0d c0 83 df c2 98 39 e6 00 00 00 1c 00 00 40 05 | 0c 73 7d f6 90 2f 67 26 fc 28 2f df 9c 80 3e da | bc 60 3a 9d | libevent_free: release ptr-libevent@0x7fb3800223c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380009ed0 | #371 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea d3 d9 fc 5b 7e b4 e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #371 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #371 | rejected packet: | ea d3 d9 fc 5b 7e b4 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #371: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.077 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c046090 | handling event EVENT_RETRANSMIT for parent state #472 | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #472 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #472 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49690.153477; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003312 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380009ed0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #472 | libevent_malloc: new ptr-libevent@0x7fb3800223c0 size 128 "road-eastnet-nonat-220" #472: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #472) | 15 62 43 a0 4c 6d db c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 ef 66 93 1f d2 be 3f b4 cb c3 5b c3 cd ce ec | ef 45 09 15 86 85 a5 fc 63 a8 dc f9 dc 2c 7f da | ad 3c 83 29 23 b1 9e ba fe be f5 05 08 e8 8e 73 | c4 15 c3 1f 80 d3 d0 b8 24 be b3 4f dc ef b0 39 | e8 6c 73 46 ce 8d ab 67 58 96 e6 89 9c 38 0e cb | 1f b3 47 af cd e8 fe 49 e5 c0 25 80 77 35 f6 06 | 6d dc 03 76 f8 34 b8 8e 05 e2 62 37 7a 40 b0 47 | 1d 8d 55 22 fa 66 04 34 43 30 87 8a 3b 8d 56 07 | f3 21 a4 25 01 21 d4 52 d3 44 c4 73 d4 a8 a2 ea | 69 66 8c 26 ab 85 7b a0 65 5b 03 5d 74 e7 7a 63 | 38 e1 5f b3 a4 83 48 11 76 d7 fb 96 bd 94 81 0e | 12 85 94 cb 17 1c 9e 64 a5 e2 b4 c7 96 eb cd 62 | bb 15 1b 96 a4 fb c3 a8 a0 ae 37 79 52 a4 ec 21 | 73 e0 47 a7 95 56 ce d5 cc 94 10 bf a2 8a 93 dc | 7f ea 6c d5 98 4b fa 19 3a ac 5e 1f 78 6e 08 fc | fa 46 b2 55 22 d7 78 a7 75 be f4 63 29 44 fa cb | 29 00 00 24 19 33 9e e6 d2 ec 99 b2 2a d6 00 cf | c3 4d d5 a5 cb 9d 67 f4 f2 94 3f b0 a2 94 a8 ff | 01 8e 5d 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 f6 a8 c3 12 9d 73 0e 92 1b 13 62 | b1 83 e3 04 e0 b3 2c 1d 00 00 00 1c 00 00 40 05 | c3 d5 bb 6d 6e 36 db ca 5f b7 b2 05 dd 15 c3 8f | 20 6a e3 5f | libevent_free: release ptr-libevent@0x7fb37c023f10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c046090 | #472 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 62 43 a0 4c 6d db c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #472 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #472 | rejected packet: | 15 62 43 a0 4c 6d db c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #472: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8d840 | handling event EVENT_RETRANSMIT for parent state #372 | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #372 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #372 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49690.167785; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005039 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c046090 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #372 | libevent_malloc: new ptr-libevent@0x7fb37c023f10 size 128 "road-eastnet-nonat-120" #372: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #372) | 36 75 19 e8 2f 22 a4 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 1c 43 17 d7 b5 ce d2 b8 29 b2 bf 57 09 8b a5 | 02 ac c4 b7 76 e6 2d d8 ee ee 3c fe f4 66 f4 89 | f0 05 d4 6f 70 58 f2 ac a3 f6 a0 c0 6f e2 88 9c | 40 3f 21 b6 b5 e3 53 20 6c d9 59 5c d3 ed 29 31 | 70 b1 e2 00 f7 0a fb f6 8a 39 29 d2 58 c2 74 92 | 4c 9b 08 3f 44 b8 04 b0 23 1d ad 99 96 41 5c c3 | 74 17 1f 67 0a d8 d1 96 a3 e0 b8 c3 31 5e 35 15 | b4 7d 07 ac 51 6c 39 25 b1 04 61 4c b1 08 c3 a9 | 03 2e 6c 07 f6 12 ea 26 ae ed 42 10 86 bf 00 1f | 2c 3f d3 c3 05 31 1b 23 d0 7f 44 40 17 23 be b1 | ac f2 d9 5c 2d 0f 0e 8d d6 8e 02 9e c2 0d 39 2a | 1e 53 92 9d 45 7f f8 25 a0 3b 40 14 ce aa d7 8e | 3c 97 d8 0a 68 34 c5 e0 01 c0 9d 3c df ab b9 db | 0f 08 4e 9b 7f 31 ba b0 df 14 c3 2e b6 43 df 9c | e8 24 93 e8 93 fa be d8 05 20 58 54 dc 18 b6 a1 | 81 c2 54 d8 9d 63 fd 0b 60 e1 78 75 ef 13 d9 ec | 29 00 00 24 5b 70 e2 22 fb be c5 61 40 e7 92 1f | fe 03 7b 3d 26 2b 9e 50 62 fe 14 ef 7e 0b e5 c1 | 7b 5b 83 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6f bb b6 72 03 25 00 b3 08 33 f3 00 | 3f a7 05 f9 e6 64 00 bb 00 00 00 1c 00 00 40 05 | 5c 2b 76 69 54 27 3e cb 36 ec 86 9b 13 f7 89 7b | 0b 66 55 89 | libevent_free: release ptr-libevent@0x7fb338023e10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8d840 | #372 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 75 19 e8 2f 22 a4 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #372 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #372 | rejected packet: | 36 75 19 e8 2f 22 a4 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #372: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #373 | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #373 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #373 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49690.242096; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006232 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8d840 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #373 | libevent_malloc: new ptr-libevent@0x7fb338023e10 size 128 "road-eastnet-nonat-121" #373: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #373) | cc d0 7c e3 2d ba 98 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba c9 ec 57 66 ee 6d 75 ec 00 31 9e bb a2 7b 33 | 03 5b e1 5f f9 35 33 83 7e 5f 91 5b a2 92 9a a8 | 8d 3b 36 89 d7 60 3c f0 e0 82 e5 11 6e 43 23 b1 | df d6 90 8f 04 61 87 4f 48 d6 55 c3 74 01 c3 05 | 74 78 5b 86 ae c3 d1 0f 5a c9 e4 c5 26 fd 8f 0b | 7a de b0 bf fa 77 b7 99 27 6d 94 68 54 8f 2e b4 | 27 fc 46 a6 65 3e f8 0d 42 f0 50 03 21 b0 cd 96 | 2d 45 e2 17 2e 0c 5d ab 5d cf b0 76 7e 40 37 71 | ec c6 7f c3 8e c1 e3 0c da 69 0c bb 78 ac ef e6 | fa da 64 48 00 9c 0f d4 5e 3f fd b4 84 a9 1f 83 | f8 16 28 f3 f1 a7 fd f1 9e 6b cf 4b 33 5a 08 dd | 8d d5 23 ac 66 10 69 36 aa 87 aa ab ed ab 68 36 | 4a 70 e5 64 3a 2f 37 bf 5e 42 b9 8e 12 99 78 f7 | 0c 24 39 a4 0c ff 5c 9e b7 31 00 75 be b4 85 09 | f6 93 ec eb a2 a7 69 50 c8 7a 9b 97 aa 4c fd 91 | 2c 8c 14 31 ec 08 42 84 d3 a9 ed d2 74 47 99 ae | 29 00 00 24 b4 0d dc 4f 11 5b a4 50 84 d3 92 d3 | f6 ef 85 ab 3e d2 da 12 30 2f 73 8e 10 d5 43 df | 1d 88 10 ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 85 d9 5b 1c 2d 07 c4 07 50 eb 06 | 15 5f 19 1f ba 90 46 a0 00 00 00 1c 00 00 40 05 | bb 4b 15 0f 4a b6 b1 9b ec 46 e5 86 fe 18 d0 b4 | dc 99 60 c7 | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #373 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc d0 7c e3 2d ba 98 af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #373 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #373 | rejected packet: | cc d0 7c e3 2d ba 98 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #373: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad43c0 | handling event EVENT_RETRANSMIT for parent state #473 | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #473 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #473 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49690.252373; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003525 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #473 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 "road-eastnet-nonat-221" #473: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #473) | 78 01 12 66 35 d7 75 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 47 0f 4f 77 38 bb e7 c9 71 64 11 49 78 07 db | 61 1c cd 26 23 f1 f6 1d 25 30 16 ce 14 27 83 ce | 42 30 8f 08 74 8c 5a 73 8c d4 32 61 41 1b ee 9b | f9 31 2e 33 9d 12 db b8 cb 33 3f 38 d9 dd c3 f9 | 20 b6 40 e8 ca 08 02 ce df 71 6c f1 5d 52 08 e6 | 58 10 57 a2 32 8d ae 1d 5e 7d c4 ce e0 91 e8 67 | ef d4 89 2c c0 b5 6a 92 6e 51 6d 9b 9d 21 b2 11 | 63 ad d9 36 26 eb dc c5 60 5b ef 4a 3f 29 d2 75 | 9a 29 b2 ce 56 3f a4 11 28 44 4d 82 14 b3 ff 08 | f3 34 c5 89 41 5b 00 60 7c 63 69 55 27 25 23 fa | 32 38 62 77 fb 7a 33 df 62 71 61 b7 15 ec 0a 13 | 14 36 a9 93 fd 25 0e 0d b3 44 f4 62 07 ce 96 88 | f0 a4 9b c6 5b 9f 17 d2 94 b3 dd 9f 08 c2 33 c2 | 59 53 80 d3 e8 b8 bc 9f 9d b9 55 bf 1b b3 90 a8 | 46 84 0d b5 c1 2a b7 bd df e2 56 3f f0 a8 af c2 | b3 ab 6b 5f 0e ca 69 45 20 54 b6 94 83 c5 3d bb | 29 00 00 24 4a 32 17 be 17 e6 be 0c a5 f0 d0 1f | f3 82 ee d0 20 e4 2f 26 27 39 fc fe 8a c9 3a 42 | bb 40 ba 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 8a 84 70 d7 06 66 bf 35 02 d1 dc | b7 f5 da 2f 6f 36 dc 4c 00 00 00 1c 00 00 40 05 | 22 8e 50 95 0f 93 c8 cc 9c 03 8c bf 24 39 56 cd | 71 d7 b1 e2 | libevent_free: release ptr-libevent@0x7fb36c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad43c0 | #473 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 01 12 66 35 d7 75 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #473 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #473 | rejected packet: | 78 01 12 66 35 d7 75 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #473: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0435 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338012bf0 | handling event EVENT_RETRANSMIT for parent state #374 | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #374 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #374 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49690.295749; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005667 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad43c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #374 | libevent_malloc: new ptr-libevent@0x7fb36c04b7c0 size 128 "road-eastnet-nonat-122" #374: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #374) | 2b af 1b 03 10 38 37 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 c3 14 06 9b d8 f1 99 49 48 ff 90 1f 86 00 28 | 44 18 8a f8 52 dc 7d 04 1b d5 bc 43 4d 6c cb 67 | f8 0d 9d 6d d0 66 c5 1d 7e 62 70 73 1c 71 41 b4 | dd 81 08 b3 22 a9 c5 05 00 35 5b 00 07 16 93 d5 | 94 c1 6c 23 e3 4f fb cc 11 67 47 b3 e1 b1 07 89 | ea c0 9e a2 65 96 87 08 be 34 63 54 73 84 17 c6 | d1 75 fb 5b 8e 80 b1 4e bc e5 80 b5 fc 51 6b 8e | af 49 e6 d5 05 a1 42 3f 30 13 b7 fe 10 06 81 bc | 26 72 22 45 7f 9f 88 7e f2 4d d6 4b 6d 85 6b 06 | 69 00 b6 2d 19 97 b0 06 ca c7 30 d2 02 d3 f6 37 | 5e 73 21 4a 86 ec 60 ca fd d2 ed d8 05 2b db 6c | a9 01 2a 23 f7 1d d9 64 5b e9 5e 20 76 8d 16 0a | bf cd f0 54 2a 72 e9 f6 56 5e 90 80 56 52 68 ca | 9f 40 22 7c 1e b1 d0 73 7b 7b 65 7f 5f 3b b2 a4 | 2d 12 04 bd 89 d0 f1 f1 ba b3 be 3d 20 c5 f8 84 | bc fa 4d 90 8e a5 a8 51 48 43 7b 6c ed ea 9f e0 | 29 00 00 24 8b e7 71 0b f0 6c d4 66 d8 89 de 00 | 61 f0 41 76 89 f5 bb 07 5f 2d 78 ac d6 5e eb 30 | 2f 0d 98 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 37 47 83 86 42 9b 81 4e c6 41 b6 | af 4f 24 3f ee d6 bb bd 00 00 00 1c 00 00 40 05 | 2f d6 db c3 63 be 1c 54 fe 3c c7 2a 35 82 32 22 | 47 30 b2 bc | libevent_free: release ptr-libevent@0x7fb3540407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338012bf0 | #374 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2b af 1b 03 10 38 37 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #374 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #374 | rejected packet: | 2b af 1b 03 10 38 37 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #374: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0512 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1c480 | handling event EVENT_RETRANSMIT for parent state #375 | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #375 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #375 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49690.358225; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004926 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338012bf0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #375 | libevent_malloc: new ptr-libevent@0x7fb3540407f0 size 128 "road-eastnet-nonat-123" #375: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #375) | a4 09 26 11 42 9e 51 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b 77 05 ad 49 62 16 46 be f5 65 08 84 ad 14 8b | 54 2c 99 1d e2 97 87 23 80 81 89 f0 4c d0 eb 92 | 7b 0b 4f bb c5 8e f0 7c 4a e9 4e f5 41 3b c0 9c | 84 74 7a 28 42 6c 3e a3 44 ba 29 11 96 09 9b f3 | 38 05 36 bd 24 dc d4 f1 69 9a 67 13 96 b5 cc 0e | 5b 85 9c bc 45 e5 5b 70 a0 86 01 2f a9 6f b7 16 | e5 8c 0d ae 1d 65 f5 53 d8 97 9b 0e 3c f7 8c b4 | 84 cb c7 3a c6 10 40 ea de 5f 63 4c 12 d8 3f ca | 6d 62 70 f0 93 72 e5 53 fe e2 f7 48 e3 16 ec 2c | 0c 51 77 44 87 3b cf 71 6a 9d b3 31 8e cc be f2 | 83 ce be c0 12 f1 01 88 ca 5d f3 fc 95 bc f7 5a | 34 7b 8e 4b 02 d0 59 3f ca a0 78 bc ef 69 51 e1 | 59 c6 1a ee b3 5f f4 fe ba ab aa 32 83 46 24 8b | 44 0a ac 7f 47 be 12 69 64 f5 8a a0 c3 66 33 2a | d1 fe cd 2b 6e fd 1c 22 43 71 36 d1 05 aa f3 a0 | 34 64 36 1b 5f af f2 60 88 b6 fd ad 79 17 84 9b | 29 00 00 24 a2 f8 9d 2f 08 fe df 02 8f a0 29 1e | b3 67 52 e4 00 d5 8c 7f 4e 12 c2 f7 f5 b4 05 71 | a4 8b 3b 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 12 2b 6b 99 24 aa d2 31 8d d6 a9 cf | 86 3d 5f d7 43 66 7f 91 00 00 00 1c 00 00 40 05 | 3d 40 65 0f bf b0 2e 03 30 63 c3 7a f7 f2 38 a3 | 20 e1 e4 b2 | libevent_free: release ptr-libevent@0x7fb35003b1c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c480 | #375 spent 0.439 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #474 | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #474 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #474 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49690.358735; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005698 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c480 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #474 | libevent_malloc: new ptr-libevent@0x7fb35003b1c0 size 128 "road-eastnet-nonat-222" #474: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #474) | 0f db c1 fb 9f 17 ff 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 1b 5f a0 e0 ea b4 6f d8 89 26 cf ee 32 1a 5c | 28 fd cc 88 df ac 76 71 06 f6 f9 47 1d 52 2b f1 | 5a b8 ae 1c d0 f8 c1 49 c7 7c ed 42 b3 cb ec d1 | cd 02 cf 31 b3 56 f6 e1 d0 7b 2f 03 00 08 68 a8 | 8c e2 7f 21 83 8d a7 f5 0e 07 fa ee 88 4b c9 7c | 96 80 b8 d5 42 4d 28 ea bb cc 27 3f c4 d8 6e 4d | d5 70 bc b9 0a 5f 21 c3 31 6b f1 91 46 6a 01 67 | 1a 7e a6 f1 0c 4d 62 51 b1 a2 3c 89 97 d5 4a 44 | a9 bc 59 2f a3 d1 5e 07 95 15 69 ac 72 1f 9c ba | 63 7f 02 e1 05 f8 26 4f fe cb 35 8d 42 06 b7 4a | a1 e1 b3 5c f5 2a 05 2b b1 4d 29 89 16 f1 e4 7b | dc e2 55 b9 29 ad b8 79 4e bb 9a 44 92 25 af e6 | 8f 1c 0d 27 3a fe 2f c8 95 15 ef 6f 1b 1e 7a 94 | a3 8c 31 92 cc 09 2b ca d2 98 1d 32 a4 3c 30 c1 | 96 ab 37 bb 0d bc c5 cd 1c ca 91 c5 fa 2a c9 92 | 70 fb 0c 4c 99 ec 29 a2 72 d8 22 a0 d3 24 0d 76 | 29 00 00 24 b8 e3 46 90 e1 5a 71 46 9e cc 2f c2 | 22 0c 77 5a b9 94 a5 51 d5 e9 c9 19 b8 4f d2 8d | f8 17 d9 c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 82 ca 85 05 ee 86 5d c3 66 e4 91 | 24 1c 89 d5 b4 33 f3 c7 00 00 00 1c 00 00 40 05 | d7 2a e5 02 23 f5 bb 26 e7 1d 38 9f 9f c2 ec a7 | 48 2b cd 07 | libevent_free: release ptr-libevent@0x7fb3840060f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | #474 spent 0.329 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 09 26 11 42 9e 51 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #375 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #375 | rejected packet: | a4 09 26 11 42 9e 51 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #375: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.202 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0f db c1 fb 9f 17 ff 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #474 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #474 | rejected packet: | 0f db c1 fb 9f 17 ff 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #474: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.176 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38400a290 | handling event EVENT_RETRANSMIT for parent state #376 | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #376 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #376 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49690.424743; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005928 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #376 | libevent_malloc: new ptr-libevent@0x7fb3840060f0 size 128 "road-eastnet-nonat-124" #376: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #376) | ea 6d 1c 44 16 cc 7c db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 30 8d f2 73 36 66 21 18 72 ab a6 1d 5b ca 9c | 0a 7e 8f ea 73 27 8a 58 d5 e4 26 95 19 96 87 0c | 7f 07 37 1c 70 d2 60 3e 98 51 eb 57 bf 72 e0 8c | 84 ad 4f b6 dc 5c 36 41 e2 77 e0 9c 8d 51 16 fc | 84 d9 54 f9 85 4d 98 72 f2 d6 3d 1b 19 f0 da ce | ab 3f 23 52 e0 3a 3c 0f e9 38 61 5a c2 41 30 12 | 05 82 0c cb c8 c2 1e a1 4f f2 c3 e1 3d da 41 26 | 24 be f6 af 3e e8 2f 87 ee 1b 93 a1 f0 e9 53 da | 3a 2e 85 7e d2 d0 a7 3b eb 29 ab 65 b7 78 9f f6 | c5 fd a3 19 78 40 8c d9 48 7b 2c 4c e7 26 6f 53 | d3 ac b1 b4 ba da af d2 ab 50 63 75 e1 1d 99 d0 | b8 31 ac 7d e7 18 55 91 d3 ac 44 fc d3 74 62 7f | ce 91 66 95 28 b3 47 a1 94 fd 56 15 40 09 da b9 | 56 ba 99 10 ef 74 77 7b 2d 9f e1 06 40 6f 4c 27 | 16 1c 00 6e 75 bf e7 e8 68 0b d5 e5 14 e8 f6 62 | 49 c7 45 85 8e da 35 35 ec 65 cf 2e 56 35 57 b4 | 29 00 00 24 b2 22 59 8f 2f 17 3c be 86 a7 a1 89 | a7 cd 11 4f 04 a8 63 56 c2 46 93 de 35 e3 be b3 | 5b e4 fb 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 73 25 29 4a e6 52 0b aa f7 7d 73 | 68 37 ec c6 59 a7 02 18 00 00 00 1c 00 00 40 05 | a9 5a 00 6b 7f 85 e1 a6 d7 c4 fa 5e b7 b1 99 68 | fa 78 21 65 | libevent_free: release ptr-libevent@0x7fb38402bf10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400a290 | #376 spent 0.448 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 6d 1c 44 16 cc 7c db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #376 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #376 | rejected packet: | ea 6d 1c 44 16 cc 7c db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #376: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23110 | handling event EVENT_RETRANSMIT for parent state #475 | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #475 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #475 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49690.461729; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004141 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400a290 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #475 | libevent_malloc: new ptr-libevent@0x7fb38402bf10 size 128 "road-eastnet-nonat-223" #475: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #475) | f3 25 a8 40 a9 16 90 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 fc dc 84 62 e7 1f 29 92 4f 29 58 18 7b 3f c4 | 0b 92 35 41 3d 7d f5 49 ac e4 08 33 00 55 13 7e | 41 c8 1f ab 98 7a 30 c3 af c3 cf 6c 36 f8 c9 eb | 2e 6e a4 90 d5 52 a2 8a 0e 83 47 aa 06 91 44 23 | e7 ef 3d 2e 37 19 57 6f 45 ce 1d 86 c2 e7 46 ee | 18 2a 29 c4 ec 14 a5 7f 72 bc 78 02 59 a2 ca 1d | b2 b0 a4 5c 1b 84 48 bf bd 56 e0 d5 a2 ad cf a0 | ed 67 0d 74 38 b9 ba e0 64 fd 1a b6 82 cc d6 8a | 07 94 d5 49 9d 7f 16 e0 7c 51 29 17 d6 08 40 72 | fd c6 fa 75 b2 47 30 6b 15 b9 55 b9 02 dd d8 c4 | c6 0d e1 61 7d 87 80 e1 c1 30 9f 40 92 6e 85 e9 | ef ce 2d ce 71 79 64 d3 dd 63 ec db 24 83 38 23 | 73 f2 c1 e6 cf bd 52 ef 73 4d 97 4a 32 ac ae 30 | 6c 19 3c 8f 59 15 1c e0 c6 b3 5b a5 c9 da d5 d9 | 5d 32 c2 2c c5 8a 99 8b d0 ac 6f 05 fa 9a 82 9e | fa 91 c3 17 c1 28 24 70 4e 52 7c 04 70 68 57 b3 | 29 00 00 24 d6 06 09 cd b7 26 a0 ec bf 9a 6e 13 | e8 2b d8 44 aa f3 29 4e 9f 5a e2 23 56 33 79 1c | 13 aa 41 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 5a 5b 76 80 70 09 57 e9 61 f5 b2 | db 52 90 c9 67 ea 13 33 00 00 00 1c 00 00 40 05 | 6b c7 4e 4d 75 42 5c 91 03 17 f3 17 f4 9d bf bf | b8 92 f0 13 | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23110 | #475 spent 0.483 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 25 a8 40 a9 16 90 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #475 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #475 | rejected packet: | f3 25 a8 40 a9 16 90 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #475: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.202 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3980 | handling event EVENT_RETRANSMIT for parent state #377 | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #377 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #377 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49690.489639; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005882 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23110 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #377 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 "road-eastnet-nonat-125" #377: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #377) | 7d b7 6a 31 9c d6 86 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 bf 7a 35 d2 37 1e c0 a2 92 6a 98 80 72 24 5e | 1f 3c b2 01 23 5f 15 bf ce e9 e4 d7 08 a3 2a 60 | 60 1e 2a e8 5a e7 a9 d5 87 39 6d 3f 34 3f c0 1b | ca fe dc 77 c6 7e 84 64 73 35 57 0c ed b5 74 11 | bb 72 6b af 00 a6 5c 48 1d a9 ae e0 21 6e f9 6c | fe 77 59 9f 79 f0 27 e3 f8 d3 03 12 c5 8c 01 06 | 76 43 6f e7 91 25 19 a3 05 2c 5f 40 7b 60 ce d6 | c7 0a 22 7e c1 15 e4 29 ab c3 9b 6d 58 d6 08 88 | eb 2e fc 26 54 22 7d d9 71 73 77 93 47 47 52 c7 | 2f be 59 30 ba ca e1 78 87 6d cb 35 72 6f 4d 3b | a0 93 98 95 e4 6c 43 b1 50 a4 aa 69 98 d4 ed e8 | 9d 30 82 39 85 51 32 50 b9 91 12 7b 77 d2 d0 9f | 64 b8 21 58 96 89 58 eb 1b a0 e3 48 15 3e 58 3b | 7f 5d 13 52 09 44 ad 12 73 77 70 1d 29 a3 72 c1 | 6f bc 36 26 b2 07 f9 32 34 75 b2 cb 8d 27 b8 92 | 36 ef 06 e2 e3 5e 94 66 19 de e4 ee 30 db 10 64 | 29 00 00 24 40 c7 66 20 2c ab 25 81 a4 29 77 75 | 63 eb 29 35 21 bb d9 a5 a3 5d 38 ec 5b 5c 03 34 | 11 83 53 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 20 88 86 59 0d 66 18 17 be e2 6d | 8e c3 55 fc 50 ba 92 3e 00 00 00 1c 00 00 40 05 | a3 24 68 23 82 72 27 ee 2c 96 9c 16 80 ee e0 88 | 08 9f bc a7 | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3980 | #377 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d b7 6a 31 9c d6 86 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #377 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #377 | rejected packet: | 7d b7 6a 31 9c d6 86 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #377: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0588 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374023ce0 | handling event EVENT_RETRANSMIT for parent state #378 | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #378 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #378 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49690.567008; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006405 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3980 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #378 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 "road-eastnet-nonat-126" #378: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #378) | 92 97 bf d9 57 64 2b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 7e 95 c3 59 64 68 1e dc 08 f2 0b df c0 d3 85 | e4 57 68 76 f4 90 dc 14 fc b4 13 07 10 44 a8 8d | 11 66 84 12 ea 03 ab ca df 00 f5 13 ba 15 16 97 | c3 ae f2 09 b4 c2 1e 65 f4 d4 ef 76 85 ff a3 4a | ac ec 61 57 66 09 9f 4c b2 b0 4b 1a 98 fe 62 e6 | 55 f4 45 b9 db aa 2b bf cb d7 f6 c7 03 42 ad 34 | c6 d8 65 c8 40 fd 09 2c 94 7c 3b f3 2f 0a 0e 1d | 89 ee 1f 04 2f 4d 06 ee d1 19 c4 2e 99 32 3d c2 | d8 62 64 5d 3c 19 32 29 e6 a4 d4 41 97 46 6e 74 | 98 69 50 bd e9 22 20 c8 a0 94 d0 e1 2c ac e0 d4 | 3d 6d 89 f8 65 d2 f8 6c 5d 07 8b 5f be 6f 9f a2 | e3 9a 7d 49 fc a1 b3 f5 34 84 25 08 1b bf 82 69 | 97 0b c6 17 ae 91 38 6f 37 30 af 60 73 cd d7 76 | 1c 53 8a ed 55 8d 3b a6 b0 09 19 d4 bd 91 ad 63 | d2 44 97 69 9c 25 f2 23 5f d4 fb c5 78 47 07 23 | 75 fb 33 32 09 b8 13 e4 4b fc ad 29 45 c0 60 e8 | 29 00 00 24 45 ad fc 22 10 a1 61 46 e5 0c 1e 06 | 27 43 7b e2 4e f3 c7 89 82 92 48 5f 08 ae ee 54 | 20 02 7f 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb d4 ce a5 02 7b 5e 75 a8 72 0f 9e | 6c 02 05 b4 a6 0e 08 51 00 00 00 1c 00 00 40 05 | 67 63 47 aa c8 01 74 31 fc 9f e6 c6 9d 96 80 21 | f6 7a 37 28 | libevent_free: release ptr-libevent@0x7fb37401f6b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374023ce0 | #378 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 97 bf d9 57 64 2b d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #378 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #378 | rejected packet: | 92 97 bf d9 57 64 2b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #378: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #476 | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #476 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #476 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49690.625316; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003098 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374023ce0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #476 | libevent_malloc: new ptr-libevent@0x7fb37401f6b0 size 128 "road-eastnet-nonat-224" #476: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #476) | 49 8c 7a 08 2e cc 2c 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 8e 65 66 a1 7b b1 8a 9d 19 04 71 0a 79 27 ce | 6b 54 47 32 ba 6e a8 65 c3 0d 42 b2 0f 96 a2 a0 | 61 e2 94 05 83 68 df 22 7a 41 44 d2 4f e1 67 a1 | 60 b4 59 da 81 10 89 57 9a 5f 7b e1 cb f8 3b 1c | 6b e5 1e 2a 7e 02 80 cb 9a b1 16 8c f4 74 52 c7 | 1b 8b b0 44 c6 c4 32 f3 a4 5d f0 73 3e b1 fa a1 | b2 71 e4 e2 5a 6e 52 66 e3 b8 09 2b 71 a1 10 d1 | 10 3c 31 b6 a5 93 a0 0f f1 c2 e3 a3 6b 1d 4a 8c | d0 ba 9f ac 0a e4 67 88 a7 bb ab 52 59 75 2a f3 | 7e 3d 81 45 67 16 9e 61 0a ee 09 44 27 d0 34 eb | a1 e6 bf 3e 15 23 17 f4 a9 f6 b0 c4 cb fa e4 c1 | c5 79 db 37 a8 57 54 eb d1 68 1c ef 18 56 41 83 | e2 52 4d 7d eb e3 4a db 5d d0 82 39 0c 54 56 aa | 04 9a 1e d5 4b e1 50 f6 49 eb 07 2f b8 68 4b 6e | ca 4e 01 63 ab c2 da 21 fb e2 14 e9 0d 0e ff 26 | 78 8b ff 8b 3a 63 7f c4 a4 eb a1 d4 bb 4b 60 67 | 29 00 00 24 04 bd 81 be 7c f6 28 8b 7d 46 a5 cd | 03 dc d6 e4 08 bf 60 ad d1 ef ac 3f a3 21 88 37 | 52 bb 5d 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 ab 9f 05 ae 62 3b 7f e7 ce 4f 13 | 2e 4b 82 3c e1 44 b7 89 00 00 00 1c 00 00 40 05 | f1 c5 d9 81 d6 d6 94 d2 dd 0e e2 5d 61 59 c7 43 | 61 40 b6 b1 | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #476 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 8c 7a 08 2e cc 2c 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #476 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #476 | rejected packet: | 49 8c 7a 08 2e cc 2c 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #476: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4bfd0 | handling event EVENT_RETRANSMIT for parent state #379 | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #379 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #379 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49690.662592; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004457 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #379 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 "road-eastnet-nonat-127" #379: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #379) | ac d4 3b e7 18 ea 52 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 79 a1 28 22 6c 83 3f 06 54 d9 39 13 0e d2 1a | 91 c2 ca c5 f2 c4 4e d5 78 8f 04 34 b9 34 73 b2 | 0e 75 71 ec 03 a6 5b c6 fa 6d a8 f4 41 1e af 26 | a4 e1 0a 58 77 48 aa f7 f9 4b 31 cf 6b f4 65 97 | 07 66 c4 32 08 bd d1 a1 48 aa 20 4b 65 4e 17 6e | 1d 1d 3e be b4 1e 7a 49 6a 64 0a fb 44 89 ba 45 | 90 86 8a 0e 4e 08 c0 05 da d1 a0 ff 5a ee c2 33 | ff d9 1a 6f ee 08 fd 7e aa 64 53 f4 84 74 c5 cf | 19 1a 29 d4 bf 47 bd 52 17 99 38 57 75 f7 85 58 | a7 b0 c8 4e e1 95 2d 4b f1 9c 5e eb 85 14 0d 87 | ff dd 17 9a ad 51 c0 99 e2 a6 60 c5 a5 7e 68 46 | b9 5c 04 3b 76 a0 9e 3d f7 9a 42 72 b5 92 be a4 | 61 c4 dd 5e a0 a3 58 05 90 20 32 7d b8 9d ca 34 | 36 d3 6d 56 98 49 60 97 da 87 f8 14 51 ea cf 16 | 79 9b 7d e5 00 7a 74 76 25 99 77 5a ef df a7 1c | e5 07 de ab dc 8b 19 85 17 de fd 62 d8 d6 3b b0 | 29 00 00 24 7a e9 60 d7 4c 8b 32 bf 82 0a a8 9a | c0 af 7e 52 e6 dc b9 f1 3b fb 0d 8e 4f c7 9d 86 | 5c d7 7a af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b e2 54 69 3e 49 d9 e9 7b 2c 62 f7 | a1 9b 3b a0 68 bf 42 11 00 00 00 1c 00 00 40 05 | 0c ab 0f ab 0f 86 37 d7 85 f7 e9 a7 f4 f2 01 1e | 28 ca 40 2a | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4bfd0 | #379 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac d4 3b e7 18 ea 52 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #379 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #379 | rejected packet: | ac d4 3b e7 18 ea 52 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #379: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0668 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac7f80 | handling event EVENT_RETRANSMIT for parent state #380 | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #380 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #380 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49690.752001; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005823 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4bfd0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #380 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 "road-eastnet-nonat-128" #380: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #380) | 8c 85 b9 1f be 6e 3d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 1e de d9 e8 4b 77 f1 86 35 82 03 5f ce 7b cb | 0a c9 87 87 aa 3a 74 01 02 fc e1 64 e0 07 7c 06 | dd ed c8 68 23 d7 e1 98 d6 47 ab 77 d0 38 d7 b3 | 2e d4 c4 52 2d e3 2c bc 34 35 8e 16 9e 83 9d 76 | 9f cc 43 a2 24 c5 ff 0f ed 32 bf e5 c9 3b bb e7 | a4 cc 2a 54 79 4f 13 6e 29 6d 75 36 6c 87 01 9c | 1f e0 d3 9f 4c c1 24 b9 2b d8 7b fa 2a d1 70 cc | f1 73 67 12 91 0a 83 03 b6 96 60 5a f8 fb a0 1a | 92 b6 0c fb e9 77 6e a8 e9 d4 02 be 0d 82 27 ba | 20 48 7d ed 5d 31 52 4a 59 63 6f 7e c4 3e 2e ac | 5e 97 a4 c4 d3 ae 3d fa a4 3b fb c2 de b4 5c 6c | f2 4a 19 f4 47 5a 00 3f 78 e7 bc 36 32 f4 d0 ce | 7c 2d 58 ca fa c4 cc 95 9e a4 78 b5 2d fd 23 cb | 2a 9d bc 7a 8a bb 88 97 8b fb 82 e5 e3 af 23 95 | 4e ed 5d 7c 45 af c0 e7 bb 20 cb e5 da 63 b4 54 | a8 b6 35 4f 40 f2 02 b1 8a 9f 38 00 e7 8b 27 93 | 29 00 00 24 e9 59 12 f8 16 a7 9f df 69 ae 67 26 | 7d 68 3d f0 e8 95 32 e5 ac 44 49 ce 96 5b 71 84 | 56 84 ec f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 47 26 04 c2 b4 0a 38 20 0b c5 38 | 8f 45 ae 49 d1 6f dd cf 00 00 00 1c 00 00 40 05 | 48 d9 a4 21 0f e8 6e ab 23 f4 84 7b 2a 45 72 13 | eb 6b 5f 3a | libevent_free: release ptr-libevent@0x7fb360035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac7f80 | #380 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c 85 b9 1f be 6e 3d 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #380 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #380 | rejected packet: | 8c 85 b9 1f be 6e 3d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #380: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380015160 | handling event EVENT_RETRANSMIT for parent state #477 | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #477 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #477 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49690.781279; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004863 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac7f80 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #477 | libevent_malloc: new ptr-libevent@0x7fb360035930 size 128 "road-eastnet-nonat-225" #477: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #477) | 3f 73 6c 52 e2 16 12 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 68 39 c4 34 ea c1 cb 39 a9 f7 a9 af 21 c4 2f | 59 10 95 11 49 04 1e 26 c9 8f 50 f5 a4 65 8f b4 | 05 5b e9 56 60 ee a1 83 15 a3 b3 99 a1 69 bb 30 | cc 2b 98 3b 1e 30 46 76 ff 8d 39 41 4c 02 aa c6 | 7d 2f 3c 38 bb 54 54 f3 fb 6c ca 8e 5a 70 15 52 | 0e f8 6d 99 7c 6a 3b f5 58 74 0d 21 2e 4e 88 07 | 53 e0 50 d2 f7 38 33 9c 1e ad d9 ed 1d 96 b7 80 | 22 e0 8f bd a1 c0 a3 2c 94 20 d5 25 06 a2 7f 34 | 69 08 93 f9 8f 4f 23 ac b8 84 4e a5 b6 4c a2 fd | 75 2b 4c 8f 39 aa c3 bd 56 04 f8 29 c7 f1 40 cc | 9b 1a e4 8b 46 36 dc 67 52 7b 4f 7f 89 4e ad be | 6b 62 8d 22 67 f2 df e5 dd fb ec d6 50 89 50 9f | ee 43 32 27 75 9c 8a 33 f8 2e e0 8a 42 cb be 39 | aa d8 09 f8 75 cc 7e 70 d1 1d e9 02 66 48 e7 a9 | 85 21 80 86 49 7c d0 81 50 d6 7a 61 62 60 a5 9e | 15 19 da e7 5d f6 40 da d1 f3 3f 04 ae f2 b4 4a | 29 00 00 24 ff dc d7 b1 fd dc f2 f7 49 64 0a 31 | e9 e7 85 40 8d 4a be e6 65 0c 38 4a f9 ed 0f 7d | 4d 19 c2 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 0f c5 61 64 4d d6 f7 e8 8d a8 de | cf 04 b2 c9 0c b8 8a b5 00 00 00 1c 00 00 40 05 | 72 d7 c9 34 b9 dc 3d 33 a4 7e ff 3a 57 4e 49 6e | fe 3e 47 b9 | libevent_free: release ptr-libevent@0x7fb3800269d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380015160 | #477 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f 73 6c 52 e2 16 12 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #477 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #477 | rejected packet: | 3f 73 6c 52 e2 16 12 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #477: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0476 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a60690 | handling event EVENT_RETRANSMIT for parent state #381 | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #381 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #381 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49690.836616; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005079 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380015160 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #381 | libevent_malloc: new ptr-libevent@0x7fb3800269d0 size 128 "road-eastnet-nonat-129" #381: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #381) | 1e fb 19 74 69 81 f6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 15 4d 3c 26 b9 8e 71 c8 4c 65 3c 93 c4 f8 5c | 0c 69 48 07 1f b0 40 db 39 45 4f 12 5d b7 64 ce | f6 36 76 d1 4f f2 c3 d5 d1 3f c7 4e dd 69 ef bd | 2e 06 de 7f fb 43 32 b5 94 31 7c 96 1c 09 3c 05 | c9 f9 e9 6e f6 32 3d b2 3f 7a 40 e8 05 db 42 df | 50 a9 3b 1b be f2 2b d2 43 70 99 24 25 7e b9 8b | 88 12 28 70 28 9b b9 5b b0 6d 48 da 44 23 6b 4d | 59 ff ee 67 e5 c7 db c0 7c 7f a2 4b 21 92 3a a1 | fd 14 25 80 1a 91 48 40 e9 5b 63 e7 84 7c b3 99 | 02 c6 5d 6d b6 28 24 98 77 5e dc c9 be 98 c3 d6 | b6 bc 7a bf 31 81 8d c7 ba a9 27 81 82 5a 2f b7 | 23 3d 16 95 ba b5 4a 07 29 09 4c 3e c5 38 81 20 | 6c 0f d0 d6 67 62 46 f9 bc 6b c6 8e 7d a5 ce 50 | f1 0f 9a 64 d5 01 da 1f 72 e3 1b 16 9a ec 02 45 | ef 03 20 b4 4d cb ac e4 80 48 13 be cc c9 5e 11 | 9a f4 a2 21 ee 6b 6d 92 17 77 1f 86 a2 bd ac 89 | 29 00 00 24 5b c1 91 12 e1 44 84 05 fe aa f1 fc | b1 6d 8f ce 01 29 aa f2 75 b6 aa e9 3c cb db 81 | 72 99 63 d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 78 cd 6f 27 81 4c 4a f4 57 06 82 | fb 0a 60 ad 54 dd e0 6c 00 00 00 1c 00 00 40 05 | 73 d8 f7 cb c0 0b a5 77 76 9f 97 28 b6 7f a1 0e | 85 3a 80 ee | libevent_free: release ptr-libevent@0x7fb3880210c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a60690 | #381 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e fb 19 74 69 81 f6 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #381 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #381 | rejected packet: | 1e fb 19 74 69 81 f6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #381: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0712 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a32290 | handling event EVENT_RETRANSMIT for parent state #478 | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #478 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #478 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49690.894005; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004315 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a60690 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #478 | libevent_malloc: new ptr-libevent@0x7fb3880210c0 size 128 "road-eastnet-nonat-226" #478: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #478) | b4 9c 7f a0 55 ec 5f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 86 bb f8 93 0c cc df 70 83 3b a1 9a e0 b8 e3 | ef 6e a7 55 12 1e 4a a1 3c fd 3e f8 52 71 57 ec | d1 b9 27 97 72 c7 60 a2 ce b1 45 33 01 2b 7a c1 | 6c 56 fd d5 59 18 5e d3 c3 75 ef 36 1c 65 ec f7 | 03 c0 d4 70 7b b6 e1 35 71 9d 76 5b 7d 21 d4 3b | 12 1e 6c 03 cf 08 78 60 b5 ba 22 6e 40 93 8e c7 | 49 b5 59 bf 7f 87 44 20 2c 36 31 fc 69 d8 21 31 | 6c 62 2a ef c7 55 7b 01 a6 27 b6 8c 28 9f 7c ac | d4 27 6c f1 7c 85 40 4e 23 a1 d4 02 e3 38 52 92 | 5f 62 3c 6f 58 9e 47 5e 72 b1 b1 7d 8d 92 b6 d3 | be e0 0a 4d 01 e0 16 9f 01 75 9d 1c 68 e3 f5 d9 | 8e 19 b8 2b 12 45 ac 03 e0 b6 4d 98 39 5a 75 d7 | 7c b1 b9 f8 a3 a2 b1 d2 49 e7 b2 11 f2 c6 a7 7f | 57 72 f8 df 1f 7a 3c df 19 c0 28 fb f6 f4 59 df | f9 cb e8 e4 b5 73 46 61 ef 64 d4 38 66 2b 1c f7 | d4 31 c9 51 2e 93 97 3b f3 a7 d3 d3 06 a7 f6 99 | 29 00 00 24 19 2b 71 2c 92 77 f3 24 92 84 03 b5 | 44 5b d7 aa 5e 03 e6 f3 27 6d 26 be 26 c2 0f f8 | de ad c4 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad b7 1a 04 ad be 09 f8 62 42 a2 e6 | 69 0f ca 24 af 9b 5c 02 00 00 00 1c 00 00 40 05 | 37 89 76 5f 87 60 25 2e 24 4c ae 3c 7a 86 5f 05 | 9f e3 e5 ad | libevent_free: release ptr-libevent@0x7fb36402e9b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a32290 | #478 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 9c 7f a0 55 ec 5f 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #478 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #478 | rejected packet: | b4 9c 7f a0 55 ec 5f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #478: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #382 | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #382 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #382 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49690.905302; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005442 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a32290 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #382 | libevent_malloc: new ptr-libevent@0x7fb36402e9b0 size 128 "road-eastnet-nonat-130" #382: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #382) | 8a a7 de 77 ff fe 00 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 1e 05 01 d3 c0 50 0e 07 5a f5 6c 2a f3 ca c5 | f5 6b b5 ce e5 2d 0d 22 8a 9d fc a1 92 f1 21 88 | fe 80 af 87 07 4e ac cb 0e 4c 2f 1f 7c 09 ad 56 | 27 1d 20 e6 ec e9 94 a7 13 47 77 6d 93 7b 8b 31 | 4c 98 f5 11 b5 9a 38 64 29 ba c8 d0 2f a9 37 ca | 1d 9c 45 27 41 6d 78 24 2b 30 7d 43 66 5f da 35 | 99 0b ee f7 a5 dd a9 e7 24 b7 2c 27 c3 b8 3c 38 | 22 f4 c4 26 23 91 a1 6d a7 03 90 dd c7 47 8b e4 | b9 30 db 10 7a b0 86 55 91 13 ed 5a 5c 50 c6 55 | 38 6b 0d bb 7c d6 67 e7 99 0a 0d 7c c8 3b f2 93 | 43 b8 a6 1e f0 04 5a 66 ab 2b 76 49 15 e4 be b6 | e3 ab 9a 84 5b 45 f3 99 3f 3d 94 3a 7f ba c6 2d | c0 e5 16 1f a9 0e c4 b3 c7 a8 37 c7 df 60 6d b0 | 90 7f 5b 83 e7 16 35 cd f8 80 7e 6b 4c 50 19 23 | 8a a3 35 38 cd 8b ef 81 d2 24 34 89 61 4b 37 2c | a1 bc 48 55 f5 65 06 2e e7 6f b3 a0 6e 02 6c 89 | 29 00 00 24 7c cd b7 56 1d 0f 15 7b 08 97 8c a9 | df 91 53 e0 6a 88 48 cc 4c b6 8e 33 b3 57 e0 e8 | 1c 04 d1 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 58 61 cb 76 cc c4 93 e8 81 4f b3 | 54 86 64 27 f4 77 87 8f 00 00 00 1c 00 00 40 05 | 27 d0 5f f0 83 ae a8 e6 f3 e6 a6 2d bb 57 f3 83 | 78 36 b0 95 | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | #382 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a a7 de 77 ff fe 00 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #382 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #382 | rejected packet: | 8a a7 de 77 ff fe 00 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #382: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cc10 | handling event EVENT_RETRANSMIT for parent state #383 | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #383 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #383 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49690.976603; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004541 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #383 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 "road-eastnet-nonat-131" #383: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #383) | 8b a9 fc 25 06 93 a1 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 48 8c d9 3d c6 b0 61 39 4e 19 f7 86 b1 e2 c3 | 03 ba 84 78 9c c4 77 a1 7d 57 91 f5 ae c2 ed b8 | 0b 61 98 04 6f 72 68 b3 63 3d b6 20 12 b2 50 10 | 3d 3c 00 1d b9 ab be 72 ac ba 93 14 3b b2 a4 c2 | 8e b0 47 ba 98 bb 5c 2b e4 da 7c 8d a4 4a d6 89 | a4 b6 36 de 0f 18 04 bb fc 9c 28 b5 1a ee c2 7a | 18 c6 24 27 71 17 17 60 ca 39 4e 5f 5b 71 71 ab | e4 cd 79 1b 79 6b 31 46 63 bb cd 82 d7 96 72 86 | 1d fc 72 1c e4 a4 16 04 29 1f 9e b6 3a fd 62 30 | f1 da dd 12 af 8e 61 c7 51 15 f6 a4 66 22 64 42 | ef d3 2c 09 00 94 20 e3 33 79 f3 1d c7 7c 4e 79 | a7 a8 2d ec 91 f0 bb fb ff 6c 89 63 ff 5d a6 dc | 2c c3 c7 01 d9 71 f9 87 28 4c e4 de 91 08 4b 02 | b3 28 ae a1 4d 26 42 63 01 7b d1 2e 68 17 e3 a7 | 0a 0b eb 5c 62 18 33 2f d3 a6 c9 6b 3c a2 aa a0 | f6 fc 0d 55 8c 1d 7c d8 f9 bd 77 28 68 1c b3 05 | 29 00 00 24 c7 43 5d 92 21 cd 92 00 ce 48 5a 41 | bc 51 f7 9c 7c 73 79 39 5d 67 8e 5d 0e b9 e5 ea | f1 7d 01 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 9e 11 98 e3 85 61 70 79 85 31 a8 | 4f a4 76 88 f9 86 57 fe 00 00 00 1c 00 00 40 05 | fb 7f 30 9d 57 51 30 a9 24 b7 71 f5 04 63 5f 8a | f8 68 fc 05 | libevent_free: release ptr-libevent@0x7fb36001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cc10 | #383 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b a9 fc 25 06 93 a1 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #383 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #383 | rejected packet: | 8b a9 fc 25 06 93 a1 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #383: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #479 | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #479 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #479 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49690.994906; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004969 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cc10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #479 | libevent_malloc: new ptr-libevent@0x7fb36001d920 size 128 "road-eastnet-nonat-227" #479: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #479) | cf d2 c5 54 f4 1c f6 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 7f 14 60 4b 10 9d d5 d2 57 b0 91 8f 3f bc 64 | f3 21 66 f1 3b 94 f5 72 55 1b ed c6 dd 53 3b 05 | c0 1d dd be ad b9 bd d8 0b 5f 4b e3 1c 65 1f 4d | f0 ee 1b 33 c4 3a 9d de 12 12 f6 89 59 76 db 59 | 58 77 c4 51 cb 4f 4e a0 dc fb d2 f7 62 b4 a7 a3 | 1b 68 cb bb e9 09 d6 f0 e4 6b 8d 72 c7 c4 14 34 | 39 ae 8e 61 09 3a 83 2f f5 f4 c7 5f d2 2d b0 d4 | 26 d7 e0 79 26 1d 45 4b 13 c4 86 65 f4 ae 01 81 | 02 a6 0e b2 43 b5 c9 34 60 91 47 c7 ad 72 96 75 | c1 19 c1 36 df fe 89 e5 4a ed b6 37 c9 47 46 4a | ec 4d e3 1d 06 24 05 ec 83 47 39 85 ec 30 13 7d | 3c 3d d1 56 09 9f a0 06 ca 9a 1a b3 23 55 50 9a | b8 7d cc bd 04 23 e1 7e 80 5a 10 c7 17 c0 8f 7a | 89 c6 a1 6e 48 75 0a bf 79 1f 97 1f 66 26 95 b2 | 3f 11 75 2c 3f 93 e4 16 06 22 12 43 49 c5 4b bb | 85 1e 39 53 e2 84 3e 8e cf ad ff a8 7d 04 99 42 | 29 00 00 24 ce ca 8a 00 13 b6 bd c6 7f bf 18 48 | 13 5d 00 cd e5 1d be f3 d6 a7 2f 7b 66 35 3d e6 | f4 91 6b 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 e1 6d ff 62 21 60 0d e9 4e cd 21 | 6e a6 95 f9 84 a3 ab 9c 00 00 00 1c 00 00 40 05 | c0 97 f9 bf 8a bc 59 d7 d0 0f 34 34 05 ac 6e 13 | dc 84 e0 81 | libevent_free: release ptr-libevent@0x7fb388011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #479 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cf d2 c5 54 f4 1c f6 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #479 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #479 | rejected packet: | cf d2 c5 54 f4 1c f6 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #479: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa1f00 | handling event EVENT_RETRANSMIT for parent state #384 | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #384 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #384 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49691.039211; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005764 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #384 | libevent_malloc: new ptr-libevent@0x7fb388011f30 size 128 "road-eastnet-nonat-132" #384: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #384) | 86 6f ae 12 4d c0 7a b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d b1 fb 85 46 e4 0b ed 3a 09 27 c9 1d d0 fe 19 | 7a 6b 17 bb 62 8e 54 ac f1 64 67 34 40 ff 38 85 | 4f ff 54 1e 02 a7 af 76 91 63 95 f0 62 9e e7 68 | d4 07 2d a5 05 78 38 e6 00 65 3b 0c 3b 55 b9 34 | 19 27 7d 5e 1b 1f d1 f1 b8 c6 a4 32 36 a3 a1 4d | 77 fc 92 08 8e 44 1c 7b 72 a0 4a 6f ff ad 86 71 | 79 52 e6 49 b1 8f 12 9c 40 bc ec da 58 c7 66 8c | df 54 c1 66 96 41 fb 21 bc f2 5f 23 6c 52 ad 47 | c4 d3 9c 32 fb 09 e2 cc 47 c2 4b 3f 71 c2 e6 99 | 6d b7 94 23 a5 4c 0a 3c be 0e b2 50 04 86 41 e3 | 7a 9c 55 d1 3b 34 0c 3c 9f fd 4c f5 09 73 9f 60 | 56 d6 11 97 6a c5 df ef fe 2f 35 ee 63 fe 39 b0 | 29 b4 b3 01 1b 35 ff 91 b5 b4 bf 86 5f 29 e0 72 | 9b d7 f8 07 0a dc 66 0d 27 38 bb fd d4 42 1b 97 | 0e e9 cb d0 75 c1 5f 7b 20 8d a3 bd 9c d8 be df | 08 8a d8 c8 72 8d 2e 70 0c 78 7d 99 d6 b0 fe c1 | 29 00 00 24 dd a5 d7 0d 86 0a ce 46 70 f7 a4 d8 | 79 8d ab 0d 5a ba 15 d4 6b c1 b8 d3 f7 39 89 32 | f9 a6 bc c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 0a a8 53 d7 f6 23 14 8d 14 98 5a | ec 27 4c a0 59 56 95 73 00 00 00 1c 00 00 40 05 | 5b d2 62 5b 9b b5 2e 9c 89 b9 50 27 01 71 4f 1d | 99 42 bf 80 | libevent_free: release ptr-libevent@0x7fb3740356e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa1f00 | #384 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 6f ae 12 4d c0 7a b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #384 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #384 | rejected packet: | 86 6f ae 12 4d c0 7a b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #384: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c01d710 | handling event EVENT_RETRANSMIT for parent state #480 | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #480 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #480 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49691.090508; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004984 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa1f00 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #480 | libevent_malloc: new ptr-libevent@0x7fb3740356e0 size 128 "road-eastnet-nonat-228" #480: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #480) | a0 d0 03 15 77 7b 55 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 81 bc 92 43 cc 20 cb 32 dc a3 83 a6 05 ad 00 | 98 6a 1a f3 68 9d 6f 0d 87 ec e9 f6 9a 02 0f 25 | 1f da 1c 78 f1 67 23 e0 e2 7f 61 43 d9 1f 5f b6 | e6 b8 f2 3c ff c1 08 c4 9f 6c 2a bc 8e ba 45 54 | 84 19 36 a3 17 42 a8 a4 75 a3 82 0a 1c 91 e1 7c | b0 f8 bf b5 fa 9f 83 82 f9 d4 70 3e e1 df 4f 6b | 6b 5d aa 23 00 ad 45 7c d2 ab 83 9c d3 c8 48 f4 | a4 1e f5 9c 86 61 b3 f2 25 c7 70 01 ac 67 7a b7 | f7 4a 5c 1c 8e 8e 59 fc 33 71 85 33 b4 10 65 ea | b8 c2 b9 0f e6 63 11 67 85 ad 57 f7 4e c8 76 85 | f8 97 7d db 2b b8 ed 1b 8b 66 54 1e 04 fc 55 3a | c8 bb b6 a6 8a 5c 4e fe c9 53 36 0e 42 74 0e b7 | bd d3 59 78 0c df 94 62 fd c2 21 a4 0c fb 4f 6c | 1c 91 d6 a4 ec 87 92 d0 8f 1e 01 93 bd 89 c0 fe | 71 01 53 5c 6f 46 39 61 8b 59 d6 4d 65 9b d8 a3 | 15 32 57 28 19 30 26 21 35 36 08 9b 79 f2 1a b0 | 29 00 00 24 c8 ff 1d 8a 8a c7 55 8b 0d 6e 9c 13 | 67 dd f9 00 d4 15 c8 78 b6 24 b1 bf aa 08 b9 85 | 7a e8 a9 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb af 61 69 a2 a5 79 11 dc 03 2e 27 | 8e 1f c8 4a f0 b2 47 27 00 00 00 1c 00 00 40 05 | 5a ba 74 8a e7 0f 7a 9b 13 6d 0a ce d0 eb db 09 | a2 8a df 80 | libevent_free: release ptr-libevent@0x7fb36c02ed30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c01d710 | #480 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 d0 03 15 77 7b 55 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #480 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #480 | rejected packet: | a0 d0 03 15 77 7b 55 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #480: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a92f40 | handling event EVENT_RETRANSMIT for parent state #385 | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #385 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #385 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49691.102803; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004957 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c01d710 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #385 | libevent_malloc: new ptr-libevent@0x7fb36c02ed30 size 128 "road-eastnet-nonat-133" #385: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #385) | dc 0d 67 a5 b0 49 95 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 d2 87 4f 28 1e d2 9a 8d 89 1b 83 29 19 de f5 | e6 63 09 2d e2 e9 61 46 d1 7b 1d 91 3c 38 a6 0f | e9 63 cf 58 08 13 3f 3e 7d f1 19 3d 13 fc 34 b5 | 18 8a e7 0c f9 3c 2c 71 b0 34 a4 05 97 a5 9f c7 | 97 d1 e4 25 37 22 ef 17 fb 52 35 c9 4f 1f 26 16 | 3c 2a 1f 00 10 3c df 46 38 33 44 5d a6 92 e5 d5 | 69 68 b5 76 06 e3 77 b8 1e 01 65 43 01 c9 86 ef | da 65 a5 1f 57 b0 00 8a de a9 34 23 2e 5c 26 a6 | a0 7f 44 a7 f5 75 dd 87 e1 fa 95 ca ff 5e 20 3b | 92 ff 19 e9 6e 3b 74 90 7d f7 38 58 ce a4 6e 3e | 22 98 35 57 a7 19 32 26 90 4e 72 85 8e fc 44 0f | e3 30 88 10 65 63 68 a3 81 e7 a5 04 d1 cf 06 2d | 36 a6 35 6b fb 1a c6 21 82 6b b4 50 a3 0b 89 0a | 70 f4 46 4d b9 30 8c 1b 9a a3 3e a4 57 bb 51 f0 | c0 0a 2a ca 36 ae b3 f0 02 3c c8 b5 bb 6a 7b 96 | 55 84 4d bb 15 b3 47 cf cd 45 3c 4a e8 4b 8f 89 | 29 00 00 24 90 a0 a9 10 09 5c 84 13 2a 39 8b 57 | c5 67 7f 3e 0b 64 03 36 1d 0d c2 a2 27 b3 44 c5 | 83 b2 09 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 9a 97 66 55 a8 9e d7 24 ff 14 54 | 09 c0 45 ac a1 60 51 9f 00 00 00 1c 00 00 40 05 | da 5c 4e 27 00 47 9e f2 1c fc 63 30 21 b4 79 d8 | 3b 38 4e b8 | libevent_free: release ptr-libevent@0x7fb338048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f40 | #385 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 0d 67 a5 b0 49 95 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #385 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #385 | rejected packet: | dc 0d 67 a5 b0 49 95 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #385: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38000a290 | handling event EVENT_RETRANSMIT for parent state #386 | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #386 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #386 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49691.162138; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005048 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f40 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #386 | libevent_malloc: new ptr-libevent@0x7fb338048a10 size 128 "road-eastnet-nonat-134" #386: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #386) | b9 e2 f3 4f 37 4c 11 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f da ec b0 32 6b 35 e3 b5 80 95 66 e9 7f b8 d5 | e2 e0 68 33 cd 76 e0 38 1a b1 5d 56 26 da 9f e0 | 7e 25 7d 36 13 86 62 f1 2c 8d 3f 33 c2 a9 77 5c | 6c 22 2c d9 e8 13 05 5f 5c b6 bf 2d 06 59 25 68 | 04 0a 7e 77 39 77 e2 48 8e 95 f3 7a 6b 62 7a 5c | 74 73 02 c5 eb 3d 85 b2 e4 97 e2 a5 7e c1 fd bd | 8e 39 16 68 05 dd bf 87 fa 57 12 1c 04 ca 0c 29 | 8c f4 e1 ff dd 36 cf 70 de cd 23 dc c6 ae 0f aa | 3b 0f fa f5 80 72 1a cd 74 ba bc e4 a4 6c a0 e3 | 89 9a 36 59 db 27 b5 54 3f 8a aa cb ee 7a 4c 74 | 10 ef 6c 33 3c 46 b9 be 98 4b 1f 0c 9e a1 0f e7 | 70 9c 48 fc 41 5f bc 21 01 43 4c 8e f5 9c e5 23 | bb 93 4c ac ba 5c 01 89 9a 17 4a 24 a8 b9 2c 47 | 70 fc 07 f1 21 a4 d5 20 f9 8f f8 38 ce d5 70 b1 | 42 c9 99 11 ba 5a fc 0c 06 b5 ae ff af e4 68 aa | d7 82 77 58 85 4e fc 74 00 fa 00 8a 91 15 50 9e | 29 00 00 24 84 96 aa 5e b5 f6 6f 99 c5 43 c7 51 | b3 36 1c 3e 65 fe 9c e9 3e a8 cd 03 a7 c9 e1 a9 | 36 56 0e 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 80 4a c6 9c b6 70 28 5d 0a 3a 23 | 72 63 d0 38 6e f2 8f ca 00 00 00 1c 00 00 40 05 | 26 1f 03 bb d7 50 8e c5 c4 3f 03 d2 3a c8 fe 3b | 09 a1 da 1f | libevent_free: release ptr-libevent@0x7fb380036d70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000a290 | #386 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 e2 f3 4f 37 4c 11 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #386 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #386 | rejected packet: | b9 e2 f3 4f 37 4c 11 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #386: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348012630 | handling event EVENT_RETRANSMIT for parent state #481 | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #481 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #481 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49691.206415; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003538 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000a290 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #481 | libevent_malloc: new ptr-libevent@0x7fb380036d70 size 128 "road-eastnet-nonat-229" #481: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #481) | e8 f0 49 b6 6a 16 76 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 5b 3d e6 1f 63 af 92 47 ff bb 34 96 d0 88 24 | 67 3c e1 47 18 9d 62 8e d3 a4 9d b7 75 51 2f 4d | c5 c0 85 26 a0 ef 6b 42 e3 31 89 58 06 3e 3f 70 | 40 68 5f 34 02 73 08 9e 17 dc ee 6e ae 64 70 e1 | 29 5c 9e 3f 09 58 a9 16 14 23 bb 74 7b 7f 22 34 | a9 d6 3f fe 74 0f 40 5a 32 4d ac 87 fc 80 7b d4 | 2d 54 ec f5 ce b0 c6 dd a4 dd 82 14 e2 9a 36 7e | 86 de 04 4a c2 4a 3a 27 d9 82 5e 6e f1 1d d8 3d | 86 d1 82 99 be f9 63 b2 56 5a 40 42 2e 8f 30 eb | fd db ce cc 5a ac 0e 49 65 64 01 18 b4 1e 60 8d | 74 bc e9 b7 46 2e cb e0 1e 2c 67 dc 3f e9 f4 39 | 35 52 90 76 39 0a f3 d2 ac 0b 00 19 f2 ca 97 20 | b7 c6 bb 7d a2 97 ba e5 14 74 e5 ea 2f 4e 4b 3f | 08 53 d9 be 3b dd af 2f 8f 10 fd 09 08 1e b3 13 | 6a 37 e4 ce 19 dd d9 84 13 76 b0 6f 6f 43 48 f7 | 01 a4 a9 0f 9d fb 63 aa 49 8a 2a b5 59 32 b2 69 | 29 00 00 24 ba a6 3b 25 9f a9 3f 06 4e ea 48 38 | eb e2 25 25 ca e3 dd 6c 01 6e 12 39 f8 cf ff e2 | 6d 18 2b 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a ef 98 84 e9 40 8f 9c 0a de 34 0d | 25 31 92 b5 ca c8 92 af 00 00 00 1c 00 00 40 05 | 81 a9 90 20 77 ac 91 2d 88 99 0f 36 2d 43 7d f6 | 2e 36 29 48 | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348012630 | #481 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 f0 49 b6 6a 16 76 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #481 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #481 | rejected packet: | e8 f0 49 b6 6a 16 76 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #481: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388006950 | handling event EVENT_RETRANSMIT for parent state #387 | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #387 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #387 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49691.221742; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005729 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348012630 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #387 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 "road-eastnet-nonat-135" #387: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #387) | 75 6e e5 e5 6a cd b8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff a4 36 8a d7 5e f8 44 73 70 3f d1 cc 7c 79 90 | 0b d6 30 0a fd 2b 08 93 ae c4 9d c0 92 f3 30 c3 | aa 43 1a b6 dd 00 a6 77 0b 61 7f 7a 6d 22 60 10 | f1 8f 0a bd 4e 21 a1 c5 3c 6d bc 87 58 3a fc 28 | a1 f5 dc 41 f0 99 f6 3d 83 55 3c 93 36 df 67 78 | d6 16 47 a9 dd 0a f6 c9 ed 30 32 20 48 63 8f ce | 8c eb 37 37 cb 50 71 37 bd cb 4b f9 48 98 89 fb | 52 3f d5 c6 89 92 40 89 ae 52 a8 41 db 88 8d ad | 76 89 a2 2c 25 fd cd a1 b3 18 a9 52 92 ca 41 cc | be 86 7c 0a d4 fa d9 2c a1 ce 6b 87 5c 4f 0b a7 | e2 e7 b1 90 b4 88 13 15 0f 2d 50 24 a6 28 8e 8a | 81 90 02 66 38 1d 10 b6 04 db f1 15 7f 9a 7c eb | ec 94 ef 10 22 b8 7f a2 35 e6 24 56 5c e6 40 99 | 8b 09 81 82 27 99 96 55 ae 30 73 4e 23 e9 a5 45 | d0 57 f8 f9 3b 6c 05 9a 46 78 7d b3 62 a4 ed 17 | 2e 15 c3 a2 7d 0c 1c 89 e1 68 08 b6 03 09 76 f8 | 29 00 00 24 11 0e 4a cd 20 fc ce 84 68 c7 a8 ec | 48 5c fe b5 ee 21 2d ef c1 3f a3 a1 30 c1 c0 88 | b1 78 03 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 fb 47 16 eb 64 05 e3 af e5 70 ee | b4 39 fc 1b 30 12 e4 0b 00 00 00 1c 00 00 40 05 | d8 e1 2e 80 87 77 be 81 c0 a4 a8 f5 fc 15 8f 58 | 08 dc e4 8d | libevent_free: release ptr-libevent@0x7fb388041ce0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388006950 | #387 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 6e e5 e5 6a cd b8 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #387 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #387 | rejected packet: | 75 6e e5 e5 6a cd b8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #387: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.055 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abd200 | handling event EVENT_RETRANSMIT for parent state #482 | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #482 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #482 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49691.283059; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005405 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388006950 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #482 | libevent_malloc: new ptr-libevent@0x7fb388041ce0 size 128 "road-eastnet-nonat-230" #482: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #482) | 36 c3 54 33 ec a7 b6 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 ed 30 30 be a6 b8 35 5d 7c a5 62 ac c6 13 d8 | 83 27 d5 31 a0 fa 4c 2e 40 b9 54 43 42 15 18 78 | b3 8c 6a 6c 7d 96 c5 85 70 a8 48 20 22 38 c8 e7 | c3 12 d1 63 fb e3 68 d6 08 24 69 60 e5 ac a9 33 | 22 f2 2c f6 14 52 ad 1c 12 97 d4 3c 99 28 7f 69 | aa d1 18 f8 bc 06 35 f3 dd 4f b8 bc 32 67 80 0d | b2 c8 d0 32 11 b6 f1 1a bf 32 1c f4 b1 c8 5d 4d | f1 41 f7 45 a7 42 78 6b 31 8f b7 1a 22 f3 fa a7 | 3f 96 61 3f ad 03 4e 95 70 ec 28 2e 07 88 02 e8 | 35 f1 c5 b3 16 2f 4d b9 e0 29 95 c1 2d e3 e0 37 | 5d 57 61 4b 22 78 ec 0c cc 9d f4 89 9a 2d 4f 1d | b7 c1 f5 ad 55 54 75 4b 2d 2f 97 b2 b3 0a f4 e5 | ca f8 64 9c 52 40 a8 a2 99 0e 3d 9b 5a 9e 1e 2b | 75 b0 89 ef b0 bf 99 f4 37 0e 0c 27 d3 f1 9a c6 | fd 46 0a d5 dc 88 12 58 b5 c1 7a 5a 1b 30 d2 78 | 2b ef 75 09 ea 77 2f b0 ad cc d1 d9 98 94 ca 15 | 29 00 00 24 ba df cf 8a 38 2e 1f 41 21 49 fc b2 | 01 80 ce b1 18 f8 70 f3 ba e7 48 83 d1 e9 62 d6 | 6c d1 b9 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 54 bb 11 83 48 2f 3f fa 5f 96 d0 ad | a2 72 2a 82 ce ec ef d2 00 00 00 1c 00 00 40 05 | c3 77 e0 b4 3a 22 ca d3 bf 9b f4 e6 b2 71 76 56 | 18 71 d4 99 | libevent_free: release ptr-libevent@0x7fb3440180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abd200 | #482 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 c3 54 33 ec a7 b6 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #482 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #482 | rejected packet: | 36 c3 54 33 ec a7 b6 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #482: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3800153c0 | handling event EVENT_RETRANSMIT for parent state #388 | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #388 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #388 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49691.287348; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004787 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abd200 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #388 | libevent_malloc: new ptr-libevent@0x7fb3440180b0 size 128 "road-eastnet-nonat-136" #388: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #388) | f7 ff cf 56 0b 2d 32 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 17 f0 4b b8 d6 41 9d bc 4a 96 2e 42 ab 77 4e | 7f 54 60 13 56 59 15 20 fc c4 79 98 ae 8f e2 06 | 69 79 8f 5d 63 48 c3 bc 00 b2 f8 7b 8f f4 4d a0 | 8c a9 81 52 3e 4a c4 f8 92 22 05 f0 4d e8 83 0e | f0 26 c0 2c 43 f9 88 43 07 5f 25 9e 50 b5 11 c3 | 73 c8 0e 1f 5c 85 88 1c fc e4 6e f2 9c 07 04 d2 | 2d 14 31 25 c7 f1 fa 00 27 db 06 87 f8 4d 48 60 | a2 9b c5 9a 24 e6 5c 8b 88 aa 13 bf 0e 45 97 1c | aa fb ea 7f ee 38 9d c2 3b dc ac 73 ba e2 2c 03 | 3d dd 91 b1 96 88 2a b1 4e a5 10 5e fe 8f b7 60 | 27 7f 42 c9 c1 97 c4 03 be 93 ba 66 8c 91 b1 77 | 12 50 ef a2 c9 9b f5 15 0b 50 4a dc c3 9e 64 d1 | d8 0c c9 6c 86 d8 1a 40 d2 c3 48 bc 8a 19 fb 47 | d3 3d 4c 63 67 3a 9b 43 54 08 5f 36 9c 29 c6 ed | 7a c1 fa 3a 70 4b f1 9d 3d f8 73 d3 02 37 8f 1c | 0a e4 74 d1 b8 f7 7d a3 cc 04 0d cc 02 1c 9d d7 | 29 00 00 24 d2 a6 cd 06 28 a1 fe ae 1b 89 a2 1d | a1 4a 61 12 14 72 44 a4 a4 a5 e9 38 f2 78 91 07 | 4b 1e 98 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 fc fe 8e 48 65 14 18 f3 7c 80 1c | c9 89 2e 09 96 5d 2c 3e 00 00 00 1c 00 00 40 05 | 5e 49 cb 06 a1 a8 89 d0 e9 f4 c7 34 ac a2 e0 5c | 40 ed 0b 80 | libevent_free: release ptr-libevent@0x7fb380041ce0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800153c0 | #388 spent 0.0857 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 ff cf 56 0b 2d 32 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #388 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #388 | rejected packet: | f7 ff cf 56 0b 2d 32 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #388: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0406 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358017ea0 | handling event EVENT_RETRANSMIT for parent state #389 | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #389 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #389 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49691.356625; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00482 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800153c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #389 | libevent_malloc: new ptr-libevent@0x7fb380041ce0 size 128 "road-eastnet-nonat-137" #389: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #389) | 85 39 d1 4d 8b 00 62 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 35 45 30 eb 5a 4e 31 22 74 c6 b3 a4 12 3f 11 | d4 ed 4e ed d9 b9 2a b5 45 b7 bf 2f c4 12 8d f6 | b6 45 8b e7 42 00 82 88 9b 5f 9d ac d3 62 85 20 | 80 d9 92 f9 48 6c 61 18 10 02 b3 60 4a 67 bc f5 | 7f f3 06 fd dd d9 85 7b 8a 61 74 3e b0 54 86 48 | be 68 e1 1d 71 86 b6 10 0b 53 c9 4b c6 1d e3 32 | 0e 9d a0 c1 c2 ea 3f 8d 85 11 04 6b 8c a8 06 e2 | 8a a8 28 44 e2 f4 2d 9b 79 2e 3b 95 17 25 de 38 | b1 b1 27 54 d1 ca 51 cb 05 e4 51 d4 10 05 5a 73 | f7 6e 3f 1e 04 83 05 45 32 c8 e5 83 91 5b d4 46 | cb 00 53 49 8b aa e2 4a 03 fb ec 92 bd 9a d8 ef | c2 f7 13 0e ac 87 cd a2 d6 11 8a 4d b3 76 15 63 | 7e 5d ad ad 19 54 b0 8b cf 33 56 db af c2 f6 2f | 46 e8 3c 3e 30 75 95 b6 ad 6b 4c bd b8 1c f7 d8 | 42 48 45 24 c4 28 be c8 24 78 21 7b 8c a1 5f d5 | 3c 68 c6 b7 92 f7 dd 99 0c 2e 4d 49 3c 4e 34 53 | 29 00 00 24 d4 02 58 a1 15 41 bf 82 7e 15 0d c9 | ca 5c 1f 96 c8 8b 6c 22 75 5c 08 57 5f 06 6b 32 | fe f8 a7 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 ad 3c 1a 7d 4c cc 56 a6 70 0e c9 | dd 4d 28 a6 f3 20 1b cb 00 00 00 1c 00 00 40 05 | e7 a3 be 04 a3 45 3b 11 1b f8 e3 89 48 23 a2 23 | c1 e1 2a f8 | libevent_free: release ptr-libevent@0x7fb35802ed90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358017ea0 | #389 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 39 d1 4d 8b 00 62 4d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #389 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #389 | rejected packet: | 85 39 d1 4d 8b 00 62 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #389: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36400cc10 | handling event EVENT_RETRANSMIT for parent state #483 | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #483 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #483 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49691.390889; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004882 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358017ea0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #483 | libevent_malloc: new ptr-libevent@0x7fb35802ed90 size 128 "road-eastnet-nonat-231" #483: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #483) | 34 4c 65 0f e6 b6 ad e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 14 b4 cd 04 ae 73 27 55 14 94 b2 a9 a9 46 92 | bf 38 7f 34 e4 30 01 9b cc 3d 69 9b 72 22 2d c6 | c0 5a ca f2 aa f8 34 31 df 85 74 a8 8a c4 71 d3 | 18 15 b7 43 a0 c7 52 88 83 cb 13 e3 0b 22 9f 8d | 9b 32 7a fd 24 4c 85 ea ba 28 19 ff da 93 b1 bb | d8 33 5c 65 db be 0a e0 bd 29 79 f5 94 d3 6b 1b | d0 fe 62 1a aa 43 59 54 5f 94 f2 d4 df c7 8c 2c | 9f 79 f7 92 9d e8 8c 7a 9a 6a da 8f dd 5b f5 4b | 78 88 55 3a 27 f6 46 11 a6 78 da 31 e5 57 e3 ff | c3 41 c4 d8 db 92 c7 9b 0b f2 9c 05 a4 6f e4 60 | d6 be 30 93 95 25 fb 5e 0e 06 32 43 09 91 4d 90 | 0e 89 44 7a 24 99 b2 ff 62 86 54 98 47 bc f9 cf | ff 60 15 2b c0 14 62 be bc 88 1f 37 10 d8 42 2b | 8e 68 b2 b4 90 d0 f5 fe bf 7c ce c7 6a 70 46 09 | 84 97 db 42 58 43 9f f3 46 27 26 32 2b 0c cd 41 | 80 81 33 b8 5d 30 60 f3 70 32 7b 81 3a 1a 11 48 | 29 00 00 24 a6 6b eb 02 98 7d a6 5e 59 5e bd f1 | ef cf 36 f2 a9 4b e0 19 61 9c ac e2 ac 17 24 09 | 0d 96 04 a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d1 38 08 89 da 41 ff 7d 1c 3d 17 6c | 3a eb 05 70 fa bf ed 59 00 00 00 1c 00 00 40 05 | d4 38 01 a3 1e e4 dd 2e 8e 63 54 12 3f 4d 01 1d | 49 6b 48 46 | libevent_free: release ptr-libevent@0x7fb364039970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36400cc10 | #483 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 4c 65 0f e6 b6 ad e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #483 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #483 | rejected packet: | 34 4c 65 0f e6 b6 ad e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #483: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0477 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #390 | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #390 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #390 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49691.428144; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00519 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36400cc10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #390 | libevent_malloc: new ptr-libevent@0x7fb364039970 size 128 "road-eastnet-nonat-138" #390: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #390) | f0 59 d0 2d 97 92 84 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 a6 bc 87 d6 62 82 0f 67 22 b6 ee c6 47 37 24 | 35 77 67 9d 2b 69 4d 68 d9 17 5e 4e 5b 7c e7 e0 | de 0c 00 17 eb 73 f2 8c 21 62 77 5f ed 93 76 62 | 82 34 a8 dc e3 cb c2 5a 08 71 13 11 3d 4b e6 d1 | 76 57 25 8b a6 9b ab 1b 86 9a b2 3c b4 c5 09 27 | 07 3a 9a 1f b3 ba dc 74 b5 99 e0 70 c7 35 07 15 | 6b eb 79 13 3f 27 25 55 75 85 60 5d d2 d0 ba 32 | 68 73 83 f4 c5 0a 96 0e 4b e5 39 e5 86 02 a4 93 | e2 f4 48 ef 0c f4 c4 74 9a 13 7f eb 1a f7 58 25 | 7f f1 9e dc 6a 9c 5a 01 55 d6 94 fe 2a 9d 15 54 | c4 c7 a9 92 32 84 b6 cb 67 d0 cf 4d c5 e2 bc df | 9f d8 4e db 8f 96 2f 1e c9 d0 ec 6a 9b 77 d4 57 | 6b cf 06 d5 ae fb ea 29 a5 1f 59 cf 78 34 af ff | a5 76 3d 89 27 c1 f8 1c 6e a5 66 a5 63 8a 2d 2f | b3 a7 de f9 71 62 f3 67 56 6c 03 83 1d be 14 17 | 8c 04 f3 ba 5f 3e 7d cb 76 74 94 e2 c9 0a 5a 07 | 29 00 00 24 9a 7c 0d 04 38 99 0e 36 73 a3 ab df | 41 d9 56 ed 47 3b 6b 02 19 aa 87 30 cc 21 65 76 | f4 51 64 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 0a c1 09 04 69 58 cc 7d de 65 69 | 68 f6 ba 86 4e 7f 6a 28 00 00 00 1c 00 00 40 05 | 52 91 09 9c ff 5e 67 81 8a 7d bb c1 ce e0 37 4c | d9 14 ec 51 | libevent_free: release ptr-libevent@0x7fb37c014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | #390 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f0 59 d0 2d 97 92 84 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #390 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #390 | rejected packet: | f0 59 d0 2d 97 92 84 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #390: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370012890 | handling event EVENT_RETRANSMIT for parent state #484 | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #484 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #484 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49691.476431; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005576 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #484 | libevent_malloc: new ptr-libevent@0x7fb37c014c70 size 128 "road-eastnet-nonat-232" #484: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #484) | 74 f2 d9 62 15 c8 1b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 3b 62 f3 ed f9 47 0c bf 01 45 93 af e9 01 13 | b4 4a bb 89 23 94 52 5c ed 86 36 6e eb 69 47 16 | 4f 4d 66 99 6d c7 d9 da 05 03 61 83 27 be 84 fb | f7 56 2a 10 f6 9b f2 84 b7 d0 85 06 cd 12 0f 3f | a6 61 71 e1 4c 4c be b5 23 cc e4 61 ef 62 aa 02 | 7f 71 fa f2 27 5a a1 66 46 df 65 7e 72 33 12 a7 | d6 b1 80 2f 61 a3 b3 4c c2 28 e7 cf a7 3c 3b 6f | 3a a0 e5 2d 1e 20 bd 32 76 a2 9f 45 f7 a6 6e e6 | 37 c0 ae 2c 38 01 39 bd 5f e0 3d 65 31 0e f3 37 | 25 fd f7 75 ed 4c 70 31 98 89 dd 26 6b f0 c6 86 | 26 2c de ac 79 65 19 00 78 ef 2a 8b 1d ed 38 d3 | 5d 90 eb e1 29 71 f3 ff 0c 50 ed 12 97 fe f3 76 | 44 b9 27 26 27 3a b5 56 98 ce 1d d1 07 e6 e9 5e | c0 92 67 d1 b6 25 97 6b 40 80 cf 9a 68 03 d5 29 | 53 a9 fd 87 28 85 18 42 c6 5b 08 65 a1 d2 2b 6d | e9 34 66 d8 9b 2a 73 2a 5b b8 59 63 5e 1f 84 b9 | 29 00 00 24 71 8e 31 23 c4 63 d2 6d d6 0a c0 cb | 7f b2 37 27 b0 85 2e 73 82 c7 9f d6 c1 fd d8 67 | ff 33 43 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 6d 47 d8 30 7b 36 73 b1 0d df 8b | 82 69 87 3e 91 43 68 d6 00 00 00 1c 00 00 40 05 | 23 15 eb e5 a3 5e 20 cf 73 fe 01 cb 79 d0 a6 f2 | 55 38 68 fe | libevent_free: release ptr-libevent@0x7fb37003a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370012890 | #484 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 f2 d9 62 15 c8 1b 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #484 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #484 | rejected packet: | 74 f2 d9 62 15 c8 1b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #484: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12c00 | handling event EVENT_RETRANSMIT for parent state #391 | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #391 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #391 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49691.495705; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004946 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370012890 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #391 | libevent_malloc: new ptr-libevent@0x7fb37003a770 size 128 "road-eastnet-nonat-139" #391: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #391) | 1e 4c 10 d0 5a dd 02 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 44 38 de 57 e6 42 14 4a 75 cb e8 86 f1 15 c7 | b3 6b a5 d0 a3 15 b5 a8 cf fe 21 90 de 4f ce 44 | 4b 9e a3 45 9f e5 e3 4a e1 61 50 92 d7 96 bd 78 | c9 7d fa 56 09 ee b1 46 53 20 fc ad 34 b3 1e e5 | 0c f4 f7 d3 65 bb 8f 18 cc a8 06 7f fc 7e 66 0f | 5a c0 66 08 19 5f fe 23 13 53 7d f1 cb 35 9c bf | b6 cc 27 b3 74 16 78 a5 d0 41 0b 66 96 4e d5 0b | a8 67 13 54 66 95 b9 f4 f4 50 eb 64 58 9c 23 eb | 8d 1e 98 9a 88 3b 5f 86 67 00 79 34 97 29 56 1a | b2 15 47 48 a5 9a 2b a5 34 cb 00 12 67 7f e0 d9 | 3a f8 09 e7 20 e1 52 74 01 fd f4 0c 96 53 a6 b7 | c6 61 c0 6c f5 79 6f b0 c7 2c 95 3d f0 6b 1d 3c | a1 9c 76 2c 42 98 e7 2f 92 d1 8e 08 bb da 6a 80 | de bb 58 dc 69 88 c5 71 37 d4 7b 84 79 2b bc 7c | 3c 5f 6e af 11 b3 52 0f 4a 94 17 dd 26 64 0a 25 | 66 61 88 60 23 0c 83 1b 44 d1 a9 f9 6e 89 2a f7 | 29 00 00 24 f4 e3 20 9c cf 9f 8b a0 c8 c9 bb b9 | ac d4 eb 98 02 de 0f c4 e7 00 7a df 68 e7 4c eb | e6 18 a5 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 3e 10 ca 19 aa 6a 76 c2 f6 15 22 | 58 d4 f7 90 3e 72 98 9d 00 00 00 1c 00 00 40 05 | 94 13 1b ea fd 35 6e 40 4c 88 7a 5c c1 e4 2f 2d | 6d 26 6f 2a | libevent_free: release ptr-libevent@0x7fb338035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c00 | #391 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 4c 10 d0 5a dd 02 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #391 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #391 | rejected packet: | 1e 4c 10 d0 5a dd 02 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #391: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.048 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3680129a0 | handling event EVENT_RETRANSMIT for parent state #392 | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #392 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #392 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49691.561069; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006878 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c00 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #392 | libevent_malloc: new ptr-libevent@0x7fb338035930 size 128 "road-eastnet-nonat-140" #392: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #392) | 10 0f ce a6 80 60 53 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 7c dc 39 42 03 83 1d fc 78 1f a6 0a 82 be ac | 8c 3b 39 1b 2f 80 e7 cb aa b0 35 db d6 f3 de 35 | 37 b1 68 f3 68 1d 2d f4 b0 35 cc 7b dc 22 05 f9 | b7 af f7 1d a4 46 4d 00 a0 fe ea 26 a2 f9 9b 9a | 09 ee 3f e6 65 a7 03 64 d2 2c 26 ad b0 0a b6 6c | b7 a6 17 d4 6e a3 92 2f 34 cc d4 54 77 6b ca 57 | d5 59 3b bf 54 fe aa b8 9e 19 8b 0b 05 8a f7 be | fc d0 1b 7e ca 71 b1 c1 02 6a 82 df ef f5 65 97 | da 1e 51 41 e3 d8 f1 96 c4 03 03 bd 8f 10 04 b2 | c3 58 82 7f ce 35 78 05 db 11 6d 1f 95 52 d4 56 | 49 d1 80 fa 2e f3 ac 1f 38 a0 e5 d5 81 e9 34 d8 | 41 7f 2d 0d 61 dd 7b e7 44 a4 89 c9 0c 7d 05 e4 | 9f 1e 2d 40 16 34 e0 f0 2c f0 ca 39 ea 5a 9b 3c | e7 ee 11 8b d0 d0 71 64 02 96 00 c1 27 19 8e 75 | f0 b3 d3 5e 45 6f c3 79 42 e7 20 9d b5 0d 76 ff | e5 ba 64 52 91 7f bb 6e bc 95 4c d1 a1 34 da e7 | 29 00 00 24 27 55 30 76 6e b8 e9 20 0f 49 9d 0e | 6c f7 55 67 5b a0 fb d4 e7 df 75 53 94 42 2e 19 | d9 ae ec a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 0f f0 e9 84 b6 f5 5d 7e 1b 97 d7 | 89 b2 50 d4 36 fd 91 50 00 00 00 1c 00 00 40 05 | 93 22 be de f9 76 c2 04 2a 35 c8 fb 20 98 3d d6 | 50 a7 79 8d | libevent_free: release ptr-libevent@0x7fb38001abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3680129a0 | #392 spent 0.202 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 0f ce a6 80 60 53 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #392 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #392 | rejected packet: | 10 0f ce a6 80 60 53 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #392: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0921 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3a590 | handling event EVENT_RETRANSMIT for parent state #485 | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #485 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #485 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49691.593527; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005766 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3680129a0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #485 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 "road-eastnet-nonat-233" #485: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #485) | 26 20 85 62 4e 58 16 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 04 a6 43 51 7a 0a e3 68 c7 b6 92 c0 2e 14 67 | a2 f2 cb 51 e5 ce 35 16 88 d3 54 6d 62 23 37 bb | 56 61 2f d6 85 87 83 0f 70 f6 72 39 7f a7 0c c7 | 1e 70 d8 7f 4c 38 fa 53 49 29 41 95 c4 be f2 60 | 8b f1 ad 4f de df 26 c9 05 54 42 92 f1 01 24 5d | 5f 31 21 56 71 00 1c 4f 7f 83 41 cc a7 f5 8b 27 | 25 fc 78 92 10 e8 44 60 1c 59 0a 5b 0b c5 c2 c7 | 8a b4 bc 89 2b d6 59 5c 8c 78 a1 23 dc b0 6c 50 | 12 f1 b3 89 73 06 41 12 b7 a8 52 30 67 21 d0 5c | a9 0e cd 21 2b 24 e0 cb a7 f2 11 99 34 b7 dd 82 | a8 b2 9f 4a 0e 72 6d 9e a6 39 41 fd 0a 77 de bc | 1d a1 ee ad 3a 47 74 75 05 d6 38 42 86 69 10 70 | a8 ff d8 3e 12 b1 c4 88 03 52 77 9f cb 91 9d 87 | ca f5 79 a8 95 63 5f 4e a8 1e 43 7f 48 49 97 d5 | 03 8a 20 ac 28 9d 5a 1c 08 20 6e 33 63 3c ac 79 | a6 2e 32 53 fd 1d bb 3c 94 09 f3 ea 45 51 42 83 | 29 00 00 24 3d d6 d9 80 a2 0e 12 b1 24 d9 6e f6 | 52 8a 26 6d ef 88 17 44 c3 1d 79 ed f7 7c 90 92 | c7 d9 57 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dc 14 52 a7 e7 6d fa 0b e3 0e 97 be | 5d 15 66 8b 43 e6 a9 e4 00 00 00 1c 00 00 40 05 | 6d 80 f6 1e bc 0d ea 94 d1 d1 d0 f0 fd 2d 1e 46 | 86 63 b8 47 | libevent_free: release ptr-libevent@0x7fb344046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3a590 | #485 spent 0.263 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 20 85 62 4e 58 16 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #485 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #485 | rejected packet: | 26 20 85 62 4e 58 16 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #485: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.136 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_RETRANSMIT for parent state #393 | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #393 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #393 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49691.624105; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007499 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #393 | libevent_malloc: new ptr-libevent@0x7fb344046040 size 128 "road-eastnet-nonat-141" #393: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #393) | d2 4f c7 97 0e 2c 3e ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 57 42 91 f9 c0 06 25 d3 5e c6 ff a0 b9 c7 9a | f8 73 f5 52 ea b3 b7 0b 33 79 a9 ab be 94 f5 d3 | 47 a2 ed 3f 30 d5 f5 d7 c5 7f 9d d3 ed 4d a0 b4 | f7 ad a1 76 18 49 17 db 8a b9 cb ed 58 a9 0c d9 | 5a 76 b8 cb 07 f9 85 e7 ea fe 63 f8 ee 0b 16 50 | 8f 7f 23 44 74 8a 56 f9 51 93 d3 d4 1e a9 e0 6d | d7 af c4 1a 46 a4 66 f8 55 f1 fc bb 79 62 df 34 | 8f ee 1b 57 26 7e c4 de 20 f4 80 c2 d6 80 72 a1 | aa 53 f1 e8 e4 e6 1c e7 0b 29 98 85 7a 59 d5 aa | 68 b0 88 b1 b9 15 73 53 b5 6a 19 c9 ae 48 c5 a2 | 01 52 4f ea f5 c9 9f b8 90 37 cc 56 4f 8d 78 b9 | 10 dc d8 56 42 a7 88 d4 9d 82 8e d9 33 ab ac 86 | 5e b8 f6 d0 8e 0c aa b2 4f 41 73 62 f2 0c c2 27 | ef ba c6 42 e2 bb a6 b0 c4 15 d3 04 4c 56 e0 5c | ad 92 8b ed ed ba dd c2 b7 4a 92 54 4a ae d4 37 | c3 0d 4f 7c 37 7e 0b 49 1e 1d 38 1e 4b 41 b4 43 | 29 00 00 24 f4 b5 fb 56 01 5f ac 00 1d 31 6b d7 | 01 8d f2 d0 3f 15 27 39 dc 6b 31 7e 82 50 a3 bb | 9c f0 ec f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 9c 87 ea bd bf 36 3e cf 82 b1 7a | 78 3f f7 57 2c cf 08 1f 00 00 00 1c 00 00 40 05 | 77 3b 5d 4c 9c 3f 6e 8a 01 7a d1 9c 5b 89 36 dc | 10 f8 1f e1 | libevent_free: release ptr-libevent@0x7fb364023a90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | #393 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 4f c7 97 0e 2c 3e ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #393 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #393 | rejected packet: | d2 4f c7 97 0e 2c 3e ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #393: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0711 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34001fa80 | handling event EVENT_RETRANSMIT for parent state #394 | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #394 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #394 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49691.68654; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005345 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #394 | libevent_malloc: new ptr-libevent@0x7fb364023a90 size 128 "road-eastnet-nonat-142" #394: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #394) | c6 0a d6 5e 7e fc 84 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 b5 7c 6c c9 f1 d1 76 55 70 0c 53 79 42 59 aa | 1c 78 3a 1c cf 8e ff bf 3c 4f 8e 36 eb fa f5 80 | 9c 26 80 0f 65 74 f8 36 f2 69 55 0c 8f 0e 23 f4 | f2 22 a0 b5 d9 98 7e 1f aa d3 a2 c6 8c ae 8e 98 | 7c 0a f3 ed 8f 8b 88 58 8c d6 33 95 a0 55 9d 22 | 45 bd 30 81 fc 6e e7 86 9a f8 90 92 f7 2d bb 24 | 69 7e b6 2c e3 c4 d3 78 cf 51 21 62 11 c2 15 e2 | b3 a9 82 d8 15 7c 3e 4d bb 85 98 4b 06 e1 32 2f | 7a ee fc 56 3c 9b 3f a7 bb d2 50 44 19 3c 10 75 | d0 ab ea a8 d0 55 74 15 97 4a a8 8a 65 6f 7d 24 | 88 48 f4 59 45 9a aa ed 6e b4 a3 4a 2e c4 97 e3 | ef a9 a3 78 d3 c7 01 a3 80 5f 34 19 5f e9 1a 0b | 22 c3 b3 e4 7b 39 94 40 be d6 c0 25 22 6b 94 43 | 4e 6c a4 23 34 ff 10 49 a6 bf 97 8e b9 5f 55 2d | 28 e5 68 c3 b7 a6 14 92 b7 6a 59 d7 14 cc 2b 2a | 46 b7 9f a5 f7 40 91 f4 58 19 59 a8 c2 3d 8c 54 | 29 00 00 24 48 a4 83 24 df d5 ff 67 2d 1a db a8 | 39 76 5f a5 8c c2 0e 08 ee f5 2b 2a a4 7f 9e 08 | 09 74 ed 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 07 bb 4a c8 d9 c8 75 02 c5 e8 2f | 3d 22 1e b1 bf 8b 35 f7 00 00 00 1c 00 00 40 05 | 6e c1 7a 04 07 74 46 3d 3d f7 4a 09 48 b9 79 2c | 6a b6 13 f4 | libevent_free: release ptr-libevent@0x7fb3400343b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34001fa80 | #394 spent 0.19 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c6 0a d6 5e 7e fc 84 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #394 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #394 | rejected packet: | c6 0a d6 5e 7e fc 84 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #394: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0764 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24680 | handling event EVENT_RETRANSMIT for parent state #486 | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #486 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #486 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49691.73596; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.0053 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34001fa80 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #486 | libevent_malloc: new ptr-libevent@0x7fb3400343b0 size 128 "road-eastnet-nonat-234" #486: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #486) | 87 db e2 36 7c f0 df 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 90 89 1b 08 ac ff df cf 1e a7 4d 7b bd 33 5b | 51 13 dd 15 4f 57 c0 96 90 46 35 66 7c 24 f4 e0 | 0c 27 ca 38 87 f2 ca ce 3e d5 b4 13 12 b8 2b 1b | 28 cd b5 9c 97 fa 99 ff ca 60 2f 08 57 c7 43 0b | 9a 34 8d 0f cc d3 42 7d 8a 9b 18 49 af 87 e5 0e | 60 54 d2 dd 0f 77 79 0a d2 62 1d 4b f7 af 36 a6 | 89 10 0e 96 5f f8 fd fd c0 0b 1a 57 52 e4 05 54 | 7c e7 03 a6 04 47 19 3c 81 63 a0 84 35 98 42 90 | 1a 22 7e c6 ee 29 1f d0 fe 05 cc 68 66 1b 8e f3 | 6e 04 59 7b 5f 87 c4 be fb a5 8a bf 90 3d eb 9a | 35 8c 2c 40 b3 8e 63 fe 5a 3c 42 89 30 d7 70 57 | 1f 4d 37 52 6b 1c 17 6b 78 dd b4 c8 f7 a3 15 58 | d1 aa 66 b9 5e c1 c5 d0 ba 3b 05 d7 77 a7 0a 2d | c3 f0 02 14 1d 1a a8 4d cb aa 4c 7b 62 3a 6a ee | 7e 4e 1c cb d8 20 d4 75 37 c5 87 d5 04 ca 68 48 | 13 39 48 6c 64 d9 b7 94 e9 df 23 f3 33 69 d8 cb | 29 00 00 24 46 3f 4a dc 6e 3d 21 da c5 52 80 db | 79 4b 94 5f 60 de b7 f2 05 82 ab f1 57 25 79 09 | be 52 68 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e eb dd 20 f6 4f aa b4 b9 d1 56 e6 | 84 4d e7 2c 87 e1 c1 3c 00 00 00 1c 00 00 40 05 | df ec c7 42 be d0 10 8f c9 07 5b a9 94 d2 5a 2d | 6d 05 27 19 | libevent_free: release ptr-libevent@0x7fb388032bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24680 | #486 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 db e2 36 7c f0 df 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #486 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #486 | rejected packet: | 87 db e2 36 7c f0 df 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #486: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0568 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abe780 | handling event EVENT_RETRANSMIT for parent state #395 | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #395 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #395 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49691.762249; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006143 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24680 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #395 | libevent_malloc: new ptr-libevent@0x7fb388032bf0 size 128 "road-eastnet-nonat-143" #395: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #395) | ba 7b 3c 0c 6c 47 ed ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 88 4c 55 7e d1 a2 38 a3 4d 34 44 bf 98 52 f4 22 | 2b 2e d7 52 9d e2 60 32 f1 e9 de 11 e6 81 90 27 | 7f aa b4 cd 92 c7 cc 0a 99 86 49 e0 e9 e5 7f c7 | 53 00 84 30 c4 2b a1 40 94 2b e5 13 32 e0 cc 77 | 9f 67 6c cf 30 e7 4a c4 94 da 5f 5f 42 9a ce 83 | 94 65 21 10 2f c8 9d e9 90 7c c8 a2 24 10 5f eb | b7 e4 01 18 df 72 f4 7a bb ab 13 f9 5e 78 3b bb | fa c9 e1 75 55 1d c1 7d 77 9c f5 dd 9c f1 6d cf | 64 15 f4 f8 06 12 d8 2b 76 e9 8f 68 61 57 5e f9 | ce b7 25 0f 70 50 5b 08 f7 40 3f 01 f6 b5 a6 1b | 6a b5 fe b6 73 a7 04 b2 74 dc 3e 4a 46 a2 06 81 | 11 ce 3e 21 33 d9 a8 2a ee 54 b5 69 d8 57 77 1f | dc ec 39 32 06 54 92 6d 8f 0a ca d2 fd fd bd fb | 1b 7c 6a b6 6b 55 6f cb c2 b7 b7 fb e7 79 1c 7d | c3 44 5b 72 2c bc 4f 59 92 b8 bc 2a d4 d1 be 0f | 33 95 9e 53 f7 bf 90 2f bf b1 8e 5f 51 a1 8b aa | 29 00 00 24 bd 0e 20 29 4b d5 e3 ae 9c 68 67 e1 | 41 5b 48 5c 33 08 9f 5c 1f 4f 9e 6e c3 72 5b 33 | 2c ad 1f 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b1 4d 21 6f 15 00 d4 49 f9 94 84 2e | 85 71 98 cf 82 ff b0 a3 00 00 00 1c 00 00 40 05 | 8a 38 a6 07 76 28 82 e1 53 d4 45 b3 59 f3 34 be | 83 20 f5 6d | libevent_free: release ptr-libevent@0x7fb3880269d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe780 | #395 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 7b 3c 0c 6c 47 ed ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #395 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #395 | rejected packet: | ba 7b 3c 0c 6c 47 ed ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #395: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378046090 | handling event EVENT_RETRANSMIT for parent state #396 | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #396 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #396 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49691.839563; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005901 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe780 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #396 | libevent_malloc: new ptr-libevent@0x7fb3880269d0 size 128 "road-eastnet-nonat-144" #396: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #396) | 34 3a ea ba b4 d5 c3 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 b3 5e a9 7f 93 97 83 00 ac b3 90 fb e7 f1 78 | 95 aa f1 ba 36 2b 6d a3 37 11 74 f8 88 50 3b b9 | 5f 0f a0 79 72 f7 39 e7 3a 2c a8 e0 53 9b be fd | fc bd 96 c1 32 d9 24 ce f7 06 60 ff b3 43 45 a6 | 24 b9 a3 f5 cb 0e b9 aa aa 8e 8f d1 f4 f2 6e c0 | 2d cf 97 8a 96 4c c9 d9 fa 9b b2 4f 23 e7 4e 04 | 32 38 36 77 bf 5c cc 5e 9d b8 9a 89 95 85 a0 cd | 38 05 64 bb 18 47 79 4a 9e e0 36 97 2c 58 a9 ca | 05 7e fc 24 b9 aa 44 5a 5a 1a 01 53 4f 6b 25 9c | 0b 57 f1 a9 6c 20 f6 40 eb 60 95 56 91 d3 93 3b | e3 6f 55 d6 2d 80 8e 1b 25 11 49 ca e7 6a 57 76 | 46 38 51 f8 26 5f df d7 e7 dc 81 fb 26 f9 44 9d | 73 c6 16 4c 9f 24 d8 42 a4 b9 bf 36 76 cf 2d c1 | 81 f5 6e 1c 27 05 14 9e 74 b9 a7 24 89 53 2b 8a | e5 d2 6e 23 b8 62 43 c8 68 d3 55 8e 35 2d 54 67 | 77 ed 1c 39 ec 49 32 f8 1f c9 68 6b 34 67 a6 5c | 29 00 00 24 70 3a 86 3e 59 bb d0 ee e5 b9 db 1d | c8 9a e2 55 5b 79 c1 c3 66 32 3d 49 47 3b f1 44 | bc b6 4a ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 b0 29 ea 4a 03 79 05 a6 d6 5d 03 | 24 78 07 cd 73 8e b4 4c 00 00 00 1c 00 00 40 05 | cb 86 b2 db 9b fe 49 fd e2 3b b4 79 c3 f9 fd 58 | 79 48 29 02 | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378046090 | #396 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 3a ea ba b4 d5 c3 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #396 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #396 | rejected packet: | 34 3a ea ba b4 d5 c3 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #396: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #487 | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #487 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #487 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49691.906895; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004516 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378046090 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #487 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 "road-eastnet-nonat-235" #487: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #487) | b2 6f 13 91 c3 04 27 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e b7 3e 1e ea 4f ea 6c e1 7a 2e d9 d3 3e f9 00 | 00 b2 10 a9 bd 14 73 d0 5c 75 d0 f7 e2 0a 9c 29 | d2 44 ca 2c 07 7b 68 53 85 c3 d3 3e bc e8 07 6e | cf f2 af a9 1e bb 29 51 6a f7 01 6c 37 1e c0 ab | 85 0c c2 bf ee 4c 81 52 aa 15 a7 f4 22 68 ab 13 | 48 79 2b 77 d6 1b 5b ea 43 58 e3 de cb b3 22 8f | 5c c4 4c 56 f3 fa d5 2b 81 01 8d d3 c1 a0 72 c2 | 36 97 f9 30 4e b1 e3 4c c3 9f 76 1a 47 e2 4c 66 | 36 1c 6d 84 88 a7 c0 e7 e9 9d 4f 1d e0 c1 e1 ff | 39 d2 b1 a1 49 e4 09 1c dc a0 a7 cd 71 c8 f9 bc | 3a bc 26 2f 4d d5 40 96 f5 89 a1 c7 d3 3a 43 fd | 96 7a 1b 6f d9 4d de b2 44 44 32 65 9e 2d 89 e0 | 92 3a f7 8d c2 fa 4d 91 90 40 ba 6a ed 04 a1 1b | cd 46 17 18 d0 bf 88 e4 f7 cd 2c 44 55 8e 08 a0 | 65 d8 55 af e5 2c 13 03 b6 20 5e 95 aa 08 a5 20 | cd 27 5d 2b dd 8b b7 c9 7d 2d d5 bb 14 9f 9e 7c | 29 00 00 24 f2 e1 64 3c 35 1a 4c dd 7a 16 43 23 | ae 79 36 f1 02 a6 51 17 6d d2 ae 67 32 63 24 20 | 73 fc 22 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 4a 35 08 41 af be cf 3c 4d e0 85 | 28 9e fb 5b 11 1f 06 99 00 00 00 1c 00 00 40 05 | 95 f5 24 fe 51 05 47 87 18 ae 0d 13 a0 36 38 27 | 84 c2 41 68 | libevent_free: release ptr-libevent@0x7fb3540300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #487 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 6f 13 91 c3 04 27 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #487 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #487 | rejected packet: | b2 6f 13 91 c3 04 27 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #487: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0577 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37404b580 | handling event EVENT_RETRANSMIT for parent state #397 | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #397 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #397 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49691.920246; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003907 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #397 | libevent_malloc: new ptr-libevent@0x7fb3540300e0 size 128 "road-eastnet-nonat-145" #397: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #397) | b8 96 65 06 95 e1 f4 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 c8 0d f4 cf 12 04 23 b3 8c b0 d5 0f 34 4c a1 | e0 38 a5 84 33 97 be 9e 20 02 11 8c 69 5e 11 d0 | 7f 62 ac d4 51 19 cc 39 4f d4 08 35 17 3d d8 7a | c8 e2 b7 8a c4 ef 87 90 f4 6c ad 03 c1 12 e5 fe | a1 ca 4d a3 a7 26 51 b1 18 00 3f 74 0f 0b 76 79 | bc c1 ba 8c 57 57 64 fe a4 22 c8 a4 ab 19 ab 0c | dd ce 55 14 58 7f a0 3d 7e 01 33 18 3d 67 8f 6a | ca ae 35 2c fc 77 68 f1 26 46 2d 1f 7a bb f6 b6 | 88 41 08 63 25 29 f3 b7 63 ae 0e 14 3f a2 dc 97 | 0e 00 b1 e7 fc 07 d8 8b 49 bf 80 af e9 ed 2e ae | 76 d5 6d 36 b9 2a 02 65 8e ab 6e 62 de 0e 3d f3 | f7 6f bf 03 ee 4b bf 13 13 36 8d f9 63 27 fb 43 | 3f 8c 62 32 8e 36 3e 03 c1 c2 7e e0 16 a2 30 62 | 14 7f 02 fd b0 1d f6 8c 31 34 94 1b 15 18 28 ae | 0e b7 ba 68 7f a5 50 6b 2b de 67 a0 81 07 b2 62 | f5 48 ed c5 05 14 42 21 f6 53 6c 0e 3a 26 2c f6 | 29 00 00 24 27 60 c6 66 70 ae 97 9f 6b 69 4c 25 | 37 ba d9 cf 08 77 b3 59 45 e3 d8 2d 73 dd 52 c3 | cf dc c0 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 57 f9 bf 9f 01 9a 6f 3c 35 55 f3 | 32 2b 15 a5 4a 2d 79 cf 00 00 00 1c 00 00 40 05 | 4f 21 3e 38 45 eb 50 34 34 8d 72 07 46 d4 99 5b | e3 94 74 97 | libevent_free: release ptr-libevent@0x7fb37403f310 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37404b580 | #397 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 96 65 06 95 e1 f4 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #397 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #397 | rejected packet: | b8 96 65 06 95 e1 f4 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #397: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358018460 | handling event EVENT_RETRANSMIT for parent state #398 | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #398 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #398 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49691.992545; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005055 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37404b580 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #398 | libevent_malloc: new ptr-libevent@0x7fb37403f310 size 128 "road-eastnet-nonat-146" #398: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #398) | d0 92 7e a2 a7 09 60 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 b4 17 bf 7e 10 d5 e2 12 67 d5 eb 44 fc 6b da | be 3b 71 0a c4 e3 79 bc 55 7d 33 ab 53 2c 63 89 | 9e 95 b9 30 6b 13 a7 4a c4 7b bb 0d b8 d2 26 a2 | 1b 44 de e4 2f 11 41 58 72 a9 de c1 a4 1a 3c de | fb 82 ea df 3c 36 4d b1 bb 32 a7 75 2a 9c da 3d | 04 1d ae c6 9e 47 9c 96 a3 bd 6c 27 32 62 7e ad | 70 24 3a b8 2d 6d 20 b6 31 c7 e4 59 58 b0 08 22 | 82 a6 37 db ba ec 34 68 a5 11 ce c9 83 0a 92 b3 | dd ea d2 26 81 86 3c 25 24 24 ac 6b b8 4a 55 12 | 52 ea 4b 29 23 c3 37 83 f6 36 9b 47 37 10 75 9d | f4 dd 3d a7 8c 08 2f 3c e4 23 53 ed 31 76 a3 fc | 1d a9 fd 55 24 58 0f 2f e2 fa 33 69 e3 52 ce 0b | 40 31 96 92 4b 51 32 bf 2a 17 34 73 b9 0a 6b 90 | de fe 0d 37 2c 91 fd 6c 7a a7 e2 56 e8 ce 17 fa | d6 57 69 b6 c9 3d e4 60 c8 79 32 d0 c0 ff e6 32 | 04 59 72 13 74 5b a6 22 e7 dc df 1b fa 28 85 f9 | 29 00 00 24 ae ec a4 eb 03 5f 45 70 f0 53 21 d7 | 81 1e fd e8 52 41 5f 93 69 78 ae d9 36 11 23 a3 | df 40 91 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de b0 87 87 88 52 10 6b eb de e2 56 | 47 54 e5 87 4e eb 84 92 00 00 00 1c 00 00 40 05 | cf cf 8e 7f dc f9 05 61 ec 0b 32 5d d8 50 5d 1e | f5 62 0b 45 | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358018460 | #398 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 92 7e a2 a7 09 60 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #398 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #398 | rejected packet: | d0 92 7e a2 a7 09 60 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #398: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c017ea0 | handling event EVENT_RETRANSMIT for parent state #488 | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #488 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #488 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49692.041856; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006159 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358018460 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #488 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 "road-eastnet-nonat-236" #488: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #488) | 37 96 ab d6 53 2a 39 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 6b 02 0e 68 a2 59 8e ba 48 ba 2f 59 6f a7 3c | 62 72 7d 7b ba 57 b5 e0 3c d9 c3 81 1f a5 eb a0 | f8 e0 f8 99 8d 15 bc f0 8d dc 6f 5a dd 58 1a 52 | b1 f2 33 db c0 8e 7c 70 83 0a 45 59 7c 30 22 a6 | 4a 21 8b 6d f6 eb 16 6a d6 89 72 dc 49 39 de 06 | cc 4d b2 f5 ec 39 f7 23 79 4b 87 b1 ad 07 ab b7 | eb 0d d8 4d 26 fb 93 ca cd 4a bf a4 0c 85 96 15 | f6 27 7e a1 82 03 aa 6b de 0f cd 15 f2 d7 a2 0e | 43 09 8a 10 1e 3f 10 cc a0 c3 3f de 84 91 b8 33 | fb 7f 27 17 12 4f 19 a8 95 31 dd 5a ae 2b f7 bf | a0 0e b0 af 11 39 af c9 5f a1 36 16 28 49 42 30 | 1e a5 ef c4 10 5d 29 3a 47 d6 e6 ec dc fa 0d fd | c5 f6 87 7a d9 cf 3f cd c0 47 6b 05 d4 2f 0b e9 | 27 07 f2 3c 1c ec 19 6e 68 a4 e6 aa 11 7d e2 91 | 40 12 52 80 36 b2 87 db 98 ff 4a 69 c8 e6 41 e0 | 2d e0 85 d9 a0 b6 39 d4 ec ac d1 39 5f ba 20 a9 | 29 00 00 24 dc e4 9b d4 65 6a e5 2d e1 02 7e 1d | 58 fd 85 52 51 90 f6 a3 d4 da ed 1b d4 69 62 73 | cc 62 0f e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf c6 06 73 dc 37 37 47 57 31 78 5c | d0 36 ae c0 4d 18 ea 5b 00 00 00 1c 00 00 40 05 | b3 8c 92 9f c3 4a f6 44 a7 cb 92 6c 4a 1a 77 59 | 02 36 0d d7 | libevent_free: release ptr-libevent@0x7fb36c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | #488 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 96 ab d6 53 2a 39 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #488 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #488 | rejected packet: | 37 96 ab d6 53 2a 39 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #488: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0418 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c018460 | handling event EVENT_RETRANSMIT for parent state #399 | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #399 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #399 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49692.050139; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005893 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #399 | libevent_malloc: new ptr-libevent@0x7fb36c04b850 size 128 "road-eastnet-nonat-147" #399: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #399) | 9a 35 91 e3 ae 4f 45 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 ce a5 03 ec 4a ee 33 f3 67 48 7b 6f be a9 66 | fb 8e 19 e6 36 60 4c c6 f2 fa ab 4a 53 70 9f a8 | 5d 61 41 57 15 0a 04 a9 c6 86 5d ab 3b 79 47 d9 | 64 c0 42 8c 2d 5e 11 ee 5a b4 7c 00 df db 58 b0 | 10 63 ed d6 5b 1a 63 c2 6e 59 c7 e8 2a 78 4e 44 | 25 ff 91 a5 4f 9f d4 f8 46 f6 2e bb b6 05 d4 45 | 7f ef 54 77 ee f0 2c 99 e2 fe 9b fe 0e 9d c8 14 | ca 70 65 95 d9 6c bd 1f dd d1 55 09 ab fd c5 44 | 6f ba 1f 76 70 5a 17 28 af 45 27 b3 5f fa fe 02 | 6a 08 1d 7c 03 0b fb b8 0b b4 48 92 28 71 ac 6f | 5f 3f a7 45 71 f7 92 e0 6c 9d f2 6c bb 9e 54 7d | 4e c3 05 e2 c9 1e 50 4a ea 5d b8 f4 10 cd bd ed | f5 70 36 5b 63 22 bb 46 fb e4 aa 69 fc 3a 38 34 | d5 97 f3 9a 0b d9 79 ac e6 c8 40 6d e3 6c 66 31 | 20 73 b6 2d f4 7d 52 fd f2 32 69 70 71 7f cd d6 | 06 5e 27 45 05 1c 80 53 a4 80 ee b7 a6 45 c2 7e | 29 00 00 24 a1 6d db 5e 0b f7 f4 70 57 f1 37 cb | cc a0 06 3f 1d 1e 6b 0a b6 35 fa c1 29 23 78 83 | cc 1e 42 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 7c 20 90 94 5e 44 74 17 3c c7 e7 | e8 35 eb 34 00 1c 2e 68 00 00 00 1c 00 00 40 05 | eb 24 3e a6 a5 f2 dc 45 a5 ce 8c 46 9a d0 7a ff | cb 2c 1c 90 | libevent_free: release ptr-libevent@0x7fb3500251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c018460 | #399 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 35 91 e3 ae 4f 45 29 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #399 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #399 | rejected packet: | 9a 35 91 e3 ae 4f 45 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #399: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0551 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374045e40 | handling event EVENT_RETRANSMIT for parent state #400 | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #400 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #400 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49692.111493; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005053 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c018460 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #400 | libevent_malloc: new ptr-libevent@0x7fb3500251c0 size 128 "road-eastnet-nonat-148" #400: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #400) | 6c f1 c2 e4 ca 88 89 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 14 1f bf 2d 44 6c 78 3f 86 f8 f3 fa a1 a5 9d | a0 a8 08 62 76 01 cc db f3 4e 4a c1 03 ae f2 db | c6 06 da 1a 15 ae 3e f9 fa b6 70 0f b3 7b e5 34 | 8d 5b 06 20 ef d4 aa 62 0d d5 a9 7d 3d 49 08 95 | 77 51 97 14 c6 fe 13 ee ee 9b f0 54 56 73 79 30 | ad d7 b3 17 12 47 8d 8d e8 49 20 41 18 2a 1c c8 | c4 68 99 45 f4 b5 f1 6d d9 34 ec 8a e3 80 cc 67 | 30 b6 d6 0d 11 9e 86 7f 87 2f c0 73 7c 40 eb 31 | 24 34 89 0e ca 7b 62 d2 f6 17 85 8f 75 81 28 9b | 1c a9 03 80 8d 78 61 63 07 3b b3 b9 c4 40 46 d5 | ab 82 5f da 4c aa ce 61 bb ab c0 1a 00 85 50 e6 | e8 f6 9f c8 7f 01 8e 16 ac 04 56 78 cf 7c 43 a9 | f9 c7 26 fb 06 32 92 98 86 3f 37 ca f2 f2 fc bf | 1d e3 ee 48 e8 25 74 7d 16 d9 38 6e ca e9 38 51 | 44 22 32 93 01 95 d0 87 12 07 ff 4c 7e 49 f3 04 | 98 50 fe 91 bd 78 84 00 92 17 d7 f5 e0 e1 d0 43 | 29 00 00 24 aa 21 0d 2f 8b 5a 11 5c 7a 19 73 4d | 8f 68 86 24 6a ba 53 0b 82 59 c5 5c 31 b4 eb 7e | 18 78 2e 54 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 82 bc d9 51 57 ae 67 73 5e 22 78 | a2 06 a4 b1 df 07 78 c3 00 00 00 1c 00 00 40 05 | 48 01 58 d1 13 9f 6e 34 06 7b 6e f6 08 2f fa 1f | f9 ef b6 96 | libevent_free: release ptr-libevent@0x7fb374029410 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374045e40 | #400 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c f1 c2 e4 ca 88 89 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #400 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #400 | rejected packet: | 6c f1 c2 e4 ca 88 89 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #400: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0694 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #489 | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #489 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #489 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49692.158895; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00437 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374045e40 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #489 | libevent_malloc: new ptr-libevent@0x7fb374029410 size 128 "road-eastnet-nonat-237" #489: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #489) | 74 5a 3a 8b 71 1a cc fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 40 61 fd 1b 72 e8 67 07 d1 75 c8 79 f6 15 bf | 67 b1 a9 f3 47 1b 5a 9e 7a 16 95 64 09 96 72 95 | 1f e3 f8 5f 52 87 20 fb 61 9b db 76 dc 1e b3 ce | 79 87 62 5c 6c ce 2b 50 8b 94 05 b2 fd 25 84 04 | b4 15 bc 02 70 ed e7 01 0e 47 78 fa 99 0f 24 d8 | 6d 25 42 58 57 e1 37 d4 81 eb 71 fc 2c 93 fa a4 | c7 e3 ed 35 8a 44 47 43 96 45 a6 cd a3 83 61 0f | 10 8b 91 8a 9e 26 b5 05 80 74 cc cf bd 96 a9 68 | ec 71 d7 24 8f 0e c4 37 01 d3 fc 0e 4b 59 1a e8 | 44 25 f9 54 85 60 35 f6 be ce 52 66 75 73 a9 9b | 5c c3 e1 cf 01 12 70 63 56 6d a7 e8 18 d9 6b 45 | de 75 11 c2 b6 ad 37 d5 3d 52 a7 75 84 78 8c 7f | 86 51 7e 50 9f 10 72 bd c2 69 ef b3 ad 19 2b a0 | 12 77 de 7a 6b 6d 21 bf fd 3d 7b 00 2f 59 e3 b9 | d0 af c2 b1 28 3c da ec de 08 be a1 d1 4e 94 57 | 47 99 d9 10 35 e0 60 cf 3d 10 4e cb 1b b3 b4 f7 | 29 00 00 24 40 6d 68 58 c0 2a c7 cb 28 ac 6f c2 | e6 6e 2c b5 98 00 fd fe 6e 20 dd ca 12 44 3b 53 | ff 69 1e f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 46 ab 03 11 7d bc a6 76 5d 5e 81 | f5 21 84 26 13 ce 73 a7 00 00 00 1c 00 00 40 05 | f1 f1 80 9f 1b 76 8c da 90 0c 48 79 e2 c4 ce d3 | 45 3b 5d 95 | libevent_free: release ptr-libevent@0x7fb364008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #489 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 5a 3a 8b 71 1a cc fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #489 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #489 | rejected packet: | 74 5a 3a 8b 71 1a cc fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #489: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0471 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c01d970 | handling event EVENT_RETRANSMIT for parent state #401 | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #401 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #401 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49692.179185; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006057 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #401 | libevent_malloc: new ptr-libevent@0x7fb364008e30 size 128 "road-eastnet-nonat-149" #401: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #401) | 32 2a 52 53 b6 80 03 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 23 97 0d 57 1e 4b f9 07 88 66 bf 34 6e 58 4c | e6 20 66 15 d1 8b df 5a d2 2b 70 66 bf e5 46 ee | 75 f4 eb 71 1f f1 6f e1 d6 58 06 0a 4d 97 04 53 | 74 d3 7a 62 9c 6d fc 73 97 9b c2 cb c3 d3 cb d1 | a7 2a 8a bf ad 15 46 4b ac 4a 21 e7 16 cd 32 18 | f6 83 ab c8 99 38 21 bc e5 81 05 3f fc e4 b5 9f | 7d 77 82 93 0f 69 5a af 5b c2 81 88 55 f6 fa cc | 86 fe 2d 7e 6d ae 3a 9b 57 e6 de 78 5a 36 ba 60 | 3d 56 da 1d 5d 7b 85 49 92 79 e6 7c 62 e6 ba 39 | 70 40 1b 2f 31 49 fc c6 d5 8b 43 aa e6 2d 80 f1 | 00 4e 8e 1a 05 73 d3 15 0d 7c 1c 15 71 3b 45 0a | 71 47 01 7c 8b 3a 4c 28 d2 c5 72 06 09 34 70 7a | 6f eb 8d 51 fc f9 d9 92 d1 00 53 57 7a 80 e8 39 | 37 38 0d 62 49 b3 0f 75 c3 ee 8b a3 66 04 51 8d | 4d ca 16 c5 dc 18 bd ee 26 01 0f c7 9b e6 0b 35 | e3 5e 44 0d 5e 45 e9 f2 25 03 56 4f 95 a8 57 74 | 29 00 00 24 98 0f af 0d 18 0d 49 ab 74 8d 40 09 | a9 19 04 ac c2 29 19 2a e5 21 dd 83 5a 09 3e 6b | 71 16 78 8b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 5b 75 e0 fb 06 ab 59 93 2a 0c bc | 70 9d 3c 6c 4b 98 95 ed 00 00 00 1c 00 00 40 05 | 06 0c a6 cc 70 cf f8 01 75 5d 68 14 0f cc 7e 89 | 81 50 60 0f | libevent_free: release ptr-libevent@0x7fb36c044a20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c01d970 | #401 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 2a 52 53 b6 80 03 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #401 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #401 | rejected packet: | 32 2a 52 53 b6 80 03 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #401: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #490 | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #490 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #490 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49692.238487; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005053 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c01d970 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #490 | libevent_malloc: new ptr-libevent@0x7fb36c044a20 size 128 "road-eastnet-nonat-238" #490: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #490) | bb 0e 3a 9b 64 67 83 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 47 7f 34 75 b5 49 50 79 df a4 4b 2a 1a ce 17 | 54 1a db ef 07 cc bd 63 ec 5f fd 57 bc 8e fa 30 | c9 95 d1 71 e6 7c fd 77 3c fd c2 3d 71 c3 96 28 | a3 d1 35 26 0a 70 d5 c3 3a fb 74 58 46 86 23 a0 | 05 3c 91 b9 ac 6a ea c1 25 7b 4a 3f a3 25 55 72 | 1a fa 68 62 a6 28 8d 23 b1 87 6f cc f5 37 d0 47 | fc 41 f4 96 78 ec ba 03 b7 d0 87 4f ed d1 99 e0 | 0d e4 2b f5 2e 28 88 3d fd a9 fe 89 6e 87 86 2a | bc 0f d8 0e c6 4a 2c e3 b3 3a a6 4b 56 b2 d1 a7 | b4 82 a8 63 ca 63 fb 28 a9 ae 19 5e d9 12 c8 ba | 95 37 7e 44 d0 19 50 2e 50 85 6d 62 52 72 3d eb | 4d f4 88 bd 4f 23 95 01 f5 e8 4f 41 c1 7a e2 e9 | 09 7e 97 ea 1c b6 21 cd 07 3c 59 f2 8d ef a7 3b | 3d d1 60 37 5e c3 67 ad 3c a4 b3 33 59 93 de 51 | 98 2d 6e b0 f8 67 26 97 7f 16 7a f1 7d 53 b7 ac | 55 64 4e 4e 20 10 14 93 a4 62 e7 45 6c 22 9f d2 | 29 00 00 24 e1 87 09 5e 30 4d 93 58 a8 7b ef c0 | df 86 01 db 2f ae 90 07 26 59 14 f1 71 ed 65 8b | e5 42 58 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e a7 de 07 e1 64 83 30 46 b8 16 83 | 02 93 de dc 12 4e 03 eb 00 00 00 1c 00 00 40 05 | 41 30 1b e3 e2 bc 6c 0f ca fc a1 2e 9d 87 bf 76 | 3a b7 29 61 | libevent_free: release ptr-libevent@0x7fb364045e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | #490 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 0e 3a 9b 64 67 83 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #490 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #490 | rejected packet: | bb 0e 3a 9b 64 67 83 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #490: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36001a530 | handling event EVENT_RETRANSMIT for parent state #402 | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #402 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #402 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49692.242832; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004799 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #402 | libevent_malloc: new ptr-libevent@0x7fb364045e60 size 128 "road-eastnet-nonat-150" #402: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #402) | d7 18 0b 56 dd fc 93 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 8f d0 91 ee 0c 2c 6d b1 49 7f e7 a7 c5 b4 b6 | ba 26 c6 73 cd 26 6d 07 75 be 09 23 1b d9 66 18 | 43 89 72 64 b1 d5 06 ca 9d c0 33 e2 98 5e c1 57 | 08 88 8a 2d 7a 4a eb cd 6a ad 0c 5b 60 7a 3c d6 | 1b 41 e1 63 95 9d 48 05 85 b8 3e e9 c2 2c 08 fc | 0a e1 15 60 ae 51 d5 ec 71 41 de 9c 11 57 49 6c | 9b fc 6f 1d 07 87 e1 29 06 e5 0a b9 9d 8f 51 66 | de ed ee d7 d1 94 d4 80 f9 c9 b3 72 40 5d 4f 1f | e8 51 bc 21 99 7c 48 a4 03 69 7e 36 81 2c 93 c5 | 85 f1 72 97 17 d9 4b 16 e1 02 93 16 a0 e9 5a 8c | 18 8b 2d 22 a0 68 e9 52 fc 14 55 90 a6 f2 25 49 | d1 90 07 21 fd a8 a8 15 db 83 f7 be ce 21 31 d0 | 18 03 fd af 89 22 76 d9 16 f9 54 ff a2 a4 03 62 | f9 9f ab 74 f4 75 62 99 a7 8b 91 97 ad 9d c4 9c | 3e 40 41 dc 60 23 02 31 5e 46 98 d3 1a 73 73 14 | dd ff 30 58 0d fa ab 00 11 c3 0b 18 0a c3 bc a2 | 29 00 00 24 22 ce 51 25 1e d0 f6 54 17 83 9f e7 | 7f a6 b8 56 15 08 66 12 32 0f c5 1a 1c 37 04 e4 | a3 f5 17 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 72 8a fb e8 f5 d3 16 73 e6 1b bd | ae fd 45 81 b5 65 c1 51 00 00 00 1c 00 00 40 05 | 63 4e 70 bd 7c b5 4d 3a 8c 2e 79 8c 91 4d 92 d1 | 89 54 24 9e | libevent_free: release ptr-libevent@0x7fb36003f3e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36001a530 | #402 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 18 0b 56 dd fc 93 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #402 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #402 | rejected packet: | d7 18 0b 56 dd fc 93 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #402: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368017ea0 | handling event EVENT_RETRANSMIT for parent state #403 | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #403 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #403 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49692.309124; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004653 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36001a530 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #403 | libevent_malloc: new ptr-libevent@0x7fb36003f3e0 size 128 "road-eastnet-nonat-151" #403: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #403) | 32 36 13 09 3a 0c 64 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 1d 1f f9 29 d4 7a 82 e5 c3 ed 2d 91 36 94 a3 | ad 42 95 1c da 49 e7 df be 20 17 de b8 10 02 70 | 99 a0 9d 95 41 a8 00 d1 af 94 26 4c 6c 86 0c 1f | 94 7a 02 35 96 84 54 33 fd cb 84 dd 66 c9 68 48 | c0 82 f1 59 9a 21 1d bc d5 30 03 12 1e e7 09 61 | be 0b 67 1d db fb 9e 1e 17 49 85 95 31 47 f7 2b | 4a 86 6c c9 65 82 f2 1e a6 01 6c ac cd f1 e2 b1 | c0 7c 6b 1c 75 70 5d e8 eb b9 df 8a a0 09 66 57 | 4a b4 92 66 fc a3 08 c8 94 4f 6c 58 0d 44 86 54 | 0d a6 ba 1e d2 d3 f5 98 14 c7 bb cb 0d c6 25 81 | 7d 00 f0 be 73 bc 11 32 a7 22 fe 40 f1 5c 99 a7 | f6 f4 02 31 24 83 16 a4 cb d9 f9 bc 7d ee f9 64 | 7a 45 11 03 43 36 f4 ff f8 3b 61 50 62 1a ea 35 | 94 85 76 d9 cf 8d 05 40 c4 4f 44 89 69 5a 20 63 | bb 17 c4 c0 24 8c 90 9c 7c 82 0c b1 fd 04 ab 4c | 94 5c 67 12 3b 66 e3 71 78 3a f5 9a 05 60 53 5e | 29 00 00 24 96 4a 72 fe 73 4d 43 f4 22 71 ca 5d | 92 02 9d 90 a1 de a3 67 65 d9 a5 3e 5d f5 46 47 | 3c 9d 2b 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 72 77 63 b0 4d c0 15 33 f7 7b 47 | a3 64 95 74 99 05 10 8e 00 00 00 1c 00 00 40 05 | 3b eb 87 4d 47 ff 24 80 19 6f 36 13 fc b8 88 ec | 58 fe 93 a3 | libevent_free: release ptr-libevent@0x7fb368023e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368017ea0 | #403 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 36 13 09 3a 0c 64 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #403 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #403 | rejected packet: | 32 36 13 09 3a 0c 64 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #403: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0699 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #491 | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #491 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #491 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49692.334477; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005263 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368017ea0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #491 | libevent_malloc: new ptr-libevent@0x7fb368023e60 size 128 "road-eastnet-nonat-239" #491: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #491) | 71 99 e4 22 98 eb 54 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6f ca d2 21 e7 00 d0 58 95 9f 18 d3 07 6f a1 36 | 29 0a 07 0a 83 6e be aa 71 cf 9f 04 2d 78 ad e9 | 58 fe 50 02 89 22 52 34 18 90 af 07 b5 26 f1 6c | b0 11 12 a1 23 de 99 fd fc c2 c0 e2 48 6c 08 1b | f6 de 34 df 7c 06 d6 3f 0c 5a 97 94 b5 cd 37 58 | 08 26 b0 da 52 89 5c 74 c6 39 52 b5 86 f0 ed 18 | e5 f9 91 2e 14 4e 44 f7 64 55 1d 70 ad 8f f1 5d | 53 18 a9 5d 0c b5 78 b7 26 b2 7b 9e 90 ef 29 39 | 8b 7e b2 68 96 f5 cb 23 fc d4 1f dd be 19 b3 cf | 90 29 ab e6 33 3c 02 49 68 ce 65 d3 cd 32 0f 44 | 53 2e 1d d6 62 09 24 c9 7c 69 12 6b 73 20 8c a6 | 8d 2e 37 7f bc 30 45 fb da d9 2f 0c 0f 60 4b ac | 0c 1a 77 7c e4 78 1e 2f d7 92 41 d2 4d 5f 8e ae | 49 e0 54 b5 c7 2d bc a1 7a a2 3f 86 07 2c 92 60 | e1 f5 de af a0 f0 4b 27 ad e3 b4 c3 ee 7b 2d 0d | d8 e3 ea 54 9f 53 a9 b6 54 62 d4 0e 68 4d ff 58 | 29 00 00 24 f6 62 db cd 87 59 ee 6d c7 6e 62 13 | a1 8e a7 17 f8 92 11 7a 45 83 ff 50 63 74 b0 f6 | 7b f4 74 d1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 ef b1 40 3a d0 79 c3 55 24 76 d2 | d8 cf d4 95 18 b0 e0 3a 00 00 00 1c 00 00 40 05 | ee b1 f7 86 b3 de f8 ed 09 8e 76 56 9a 74 8c 3c | 69 d7 b9 6e | libevent_free: release ptr-libevent@0x7fb370014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #491 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 99 e4 22 98 eb 54 3d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #491 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #491 | rejected packet: | 71 99 e4 22 98 eb 54 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #491: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0468 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360018460 | handling event EVENT_RETRANSMIT for parent state #404 | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #404 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #404 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49692.379768; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005404 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #404 | libevent_malloc: new ptr-libevent@0x7fb370014c70 size 128 "road-eastnet-nonat-152" #404: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #404) | 4a 5a cc 55 a0 5d f2 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 5c 51 83 ab 6b 01 fa 80 7d 29 db 27 cd 7b c6 | 7f 04 2f 6a 27 69 df b1 41 5e bf ae 45 95 c1 0c | 60 62 91 a3 34 a3 09 ec 77 e7 89 a6 51 09 95 12 | 3b ff b9 99 25 19 b1 ca db 05 e4 39 d2 de d6 52 | 26 ca b9 02 d7 13 18 29 d4 9e 9a 68 e5 5b 44 39 | 54 a0 05 f4 ba 65 c0 95 36 73 37 bc a2 90 45 30 | d7 96 35 a2 19 0f c4 75 70 1c 7f 35 ab a5 29 b5 | 6b 5d 34 07 1e e2 3e 41 ca 0a 85 69 25 b8 27 58 | d4 99 f8 5e 96 15 ec 82 ac 10 04 76 9b 35 64 a2 | 61 5a aa b1 99 cc 29 04 86 b5 f4 cc 47 04 55 8f | c7 28 c5 78 33 30 c8 76 93 6d f5 e2 6a c6 30 01 | 28 59 c4 cc 64 9b 7d 8e 92 4e ac 31 52 df 0e bd | 0a 9d da 2a 1d 60 fa 21 2a 50 98 51 8a 76 ec c4 | d0 d7 c3 bf 4d 91 f8 7a 88 5f bc 07 e6 69 d7 f2 | ab ab b7 dd 41 cf 13 b8 5a 48 6f f6 ea 70 5c d9 | fb 24 71 46 69 e2 7c a6 fa 4a f9 ae 35 11 e2 42 | 29 00 00 24 fe 30 87 af f4 c1 ee 21 b0 88 ac a0 | 02 58 85 f4 de 21 52 28 4c d8 94 b1 9c 53 a3 c4 | 4e 96 a9 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 64 19 b7 d1 4f 25 21 1b 78 33 8e | a2 b3 19 f4 56 5e 34 fd 00 00 00 1c 00 00 40 05 | ec 45 06 4d 08 52 67 71 ea 88 ce 05 15 99 3d c7 | 85 58 3c 64 | libevent_free: release ptr-libevent@0x7fb38802d3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360018460 | #404 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 5a cc 55 a0 5d f2 1b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #404 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #404 | rejected packet: | 4a 5a cc 55 a0 5d f2 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #404: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0686 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37801d970 | handling event EVENT_RETRANSMIT for parent state #492 | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #492 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #492 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49692.409163; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004661 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360018460 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #492 | libevent_malloc: new ptr-libevent@0x7fb38802d3a0 size 128 "road-eastnet-nonat-240" #492: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #492) | d7 99 7d 69 73 b4 2a a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 07 d7 12 79 21 18 05 9a 65 7d 95 08 cf 17 4e | 65 ed 52 c0 2d 6f a2 d4 7e 6e 0c fe 68 2e 85 0e | c1 f3 a0 f1 34 f9 34 8a e9 6d c0 54 1e 27 54 a6 | 0a 27 50 d2 78 b6 25 f7 6a f9 6c d4 40 88 de 0e | c5 23 46 17 11 07 59 0b 07 7d f1 44 d8 68 37 f0 | 12 d0 4c 6e 87 95 44 91 7a 02 1a aa de e2 f1 34 | 10 60 5a 14 6b 10 17 21 f9 34 d9 11 2c 87 8c 26 | a1 73 6c 09 6c 7e 33 9d 0e 03 17 61 98 14 aa f1 | 55 ad ab 3a b7 4f 37 37 da 8f 18 e7 c8 d3 37 ef | 02 82 ee 24 ef c3 bd c3 8a 68 42 60 d6 70 2e 41 | 57 9c 7a 60 c3 c6 ac 4a 44 4b 7b 82 88 6e 37 3a | e8 a6 66 1b 7b 71 c3 58 de ce c4 1a 99 46 de bc | be 62 d4 44 43 62 c0 f6 26 99 83 35 30 7f b5 15 | ea a7 50 6e 0e e9 be 43 3b f3 33 1e 18 3f 0c b4 | 99 f0 db 6c 50 7f 42 cb 48 b5 b5 92 17 92 32 ed | bf e5 25 0e 41 bc 26 2f b8 93 47 2e 04 ee 7f e1 | 29 00 00 24 50 36 54 c1 a9 17 13 4c 62 1f 80 79 | be a9 3c 75 1a 54 91 d7 53 38 3a 75 de 57 2a 82 | 16 4a 83 7c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 22 3a 78 b0 c2 12 43 88 f6 04 b2 | db f8 ae cb 72 c7 59 0b 00 00 00 1c 00 00 40 05 | d7 ae 13 c8 9e aa 6e 0d cf 25 ff 91 a0 20 ef 42 | b6 21 2f 3a | libevent_free: release ptr-libevent@0x7fb37800f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37801d970 | #492 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 99 7d 69 73 b4 2a a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #492 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #492 | rejected packet: | d7 99 7d 69 73 b4 2a a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #492: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0631 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35800cfd0 | handling event EVENT_RETRANSMIT for parent state #405 | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #405 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #405 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49692.434538; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004622 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37801d970 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #405 | libevent_malloc: new ptr-libevent@0x7fb37800f1a0 size 128 "road-eastnet-nonat-153" #405: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #405) | be e8 17 81 54 19 aa 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 35 ee 04 e9 c6 8a 5e c2 8c d0 2d 28 00 02 85 | 8c 37 b4 2a 7d 22 9b 7b d7 a1 23 7d 82 8f c4 6b | 57 c4 dd c3 ee aa c0 59 55 41 ec 07 5b d2 96 3f | 84 76 05 f0 b5 2a e8 98 98 d7 99 f0 e6 85 ba e9 | 7a 9d b6 d3 d8 1c ba 13 51 c2 52 69 b1 b0 51 2d | 27 ff ad 85 cb c3 37 19 4d 04 8f 00 5d 8e da a2 | 83 bf af 69 a5 88 8d 6e 4b fc d9 97 99 c9 fb 45 | db d1 9d 19 a0 0a d0 5c 01 fa a2 fa ec 3d 5c 71 | 97 18 03 d4 ac c9 d5 4f 44 b7 51 11 eb 34 8d f4 | ae 35 d6 d0 d3 d3 55 70 23 2c b8 b9 0d e9 30 e3 | 09 45 cd 57 53 d7 0b 66 63 c7 ad 04 26 12 af a0 | 90 e5 43 30 55 a3 78 25 bd ac a0 c8 d8 1b 48 03 | 7d 5e a7 cb e9 7e 28 c2 c1 55 c3 c2 88 18 bb 71 | ea 43 2f 82 f5 b1 df d2 66 a9 f6 d5 fa 01 de ee | e8 cd 12 32 f5 db da 44 b1 63 d9 46 0a 50 55 e5 | e4 13 08 92 13 df ad 90 0b 31 de af 43 48 dc 7b | 29 00 00 24 ad 05 d9 2e f2 d6 c0 cb b5 b3 6e e0 | 64 6e 66 e1 31 b9 1b 6d 0b a1 0e d8 22 30 ee ae | e8 8f 1f eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 93 4e 39 e4 10 9f 0f a5 0f ed 76 | 86 5f 9d 57 55 de 19 a7 00 00 00 1c 00 00 40 05 | eb f0 2f 13 5d 22 43 08 07 64 33 45 d0 5d dc 6e | 5b 6e e5 c1 | libevent_free: release ptr-libevent@0x7fb35804b970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800cfd0 | #405 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be e8 17 81 54 19 aa 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #405 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #405 | rejected packet: | be e8 17 81 54 19 aa 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #405: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab90c0 | handling event EVENT_RETRANSMIT for parent state #493 | start processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #493 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #493 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49692.492817; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004439 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800cfd0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #493 | libevent_malloc: new ptr-libevent@0x7fb35804b970 size 128 "road-eastnet-nonat-241" #493: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #493) | ed 28 a4 bc 11 7c af 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 43 c9 b9 d1 39 88 cf b4 19 83 df 09 c8 d9 33 | 6a 66 ab 95 b0 dd 15 4d 5d 4a fa 5d 52 f2 94 c9 | 8c 6b 4e fd a3 be 7b 1e 26 3d da ae 4a c7 9d 27 | 63 37 11 7d f7 65 a5 40 e2 b8 e7 88 e2 a7 17 fe | 35 86 91 9a d8 ce fa 63 4d d8 5f 33 39 8b fd 0b | c7 66 ad d7 e3 69 0a d0 e8 2c 35 2b 87 c6 e8 d1 | 35 a2 6a bd 14 2b 17 e4 3b 63 91 15 e8 44 4a 0b | ee 35 18 44 31 9b e0 f3 11 2e f9 0a f8 94 2e e7 | 37 62 af 42 67 9b d9 c2 7a 1d 9a 74 9c 27 5f 4e | 6c 61 5b 8d 6f b6 26 7a 65 28 0b d8 63 b2 4d f2 | 4f 66 7e 68 e4 09 4f e1 36 c2 c4 fc b8 a8 0d bd | 8f 6c 26 6b 1b b4 27 de 4d 65 70 86 b8 d6 2d 91 | e7 12 ef a7 86 2f 17 c5 46 49 a0 b2 37 f9 08 9e | 05 44 0c 6d 93 fe 69 98 08 f9 28 75 1f 4f 91 2d | 39 9f 63 17 e0 d3 1a 4e 52 69 6b 52 15 77 3f 2f | 3e 88 cf 00 87 f9 bd f2 03 53 f2 34 f3 a4 6a 9a | 29 00 00 24 a6 a1 ba dd 86 99 b3 8f 47 4a 4d 8f | 4a 4e 2e 70 ee a1 39 80 4f 25 94 bc 3e 73 ee 31 | 55 0b 3a 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b ce a8 52 73 2a af 56 99 7a 11 14 | f3 b1 9c fe 91 8b 24 9a 00 00 00 1c 00 00 40 05 | 14 ee cd 8a 22 d5 80 d4 99 d7 ec c4 4c 96 10 11 | ff 51 59 09 | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab90c0 | #493 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 28 a4 bc 11 7c af 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #493 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #493 | rejected packet: | ed 28 a4 bc 11 7c af 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #493: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c017ea0 | handling event EVENT_RETRANSMIT for parent state #406 | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #406 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #406 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49692.509087; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005356 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab90c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #406 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 "road-eastnet-nonat-154" #406: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #406) | 5c 1b 3d 38 ad ed bb 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 1a b6 af ea 21 97 b3 f5 89 b5 95 b7 8e 01 21 | 34 29 bd cd 92 66 af f7 07 14 1e f2 4b ac 69 77 | b3 25 64 1a 72 01 08 14 88 fb 34 a6 91 bd 4c e8 | 74 ed 64 90 06 cb ad 54 67 18 ec c2 f6 32 90 94 | 8a 60 b7 b6 26 ea 31 da ec 24 92 6a 22 25 e6 ae | 79 52 07 43 fe e8 78 1d 19 58 3a 0f 01 09 9b 79 | a8 83 55 03 d0 25 e3 a6 6b 4d b2 09 24 dc 38 c7 | c0 36 e4 53 c2 05 eb 85 aa 76 78 46 e9 fc ba 6a | 9d 2a 99 85 b8 e3 fb 99 44 cb 75 c0 ab ae 6e 11 | 07 c0 ca 22 19 62 ce d5 17 5c e1 b9 18 74 78 be | 34 a1 1c d9 92 69 84 5a 1b b1 7e 28 a9 f2 00 ef | e6 0f 63 2f 7a b6 8d 10 3d 27 b5 f9 29 ad b2 b0 | 65 7c 94 5e 21 5a 98 07 17 36 5b b2 b7 51 51 8d | 3d 77 c7 dd 9a b0 95 69 8a b2 64 fa 98 d0 67 3a | d0 c0 eb c5 e3 82 7f 6a 7e d1 db 5f 16 5a 12 aa | ee c9 5e 0d 7b ae 47 81 60 df bf f4 74 63 48 5d | 29 00 00 24 00 c8 88 3e 7a 51 ef 1c 0c 98 f2 86 | d5 82 58 ca a8 80 65 3f cb c6 86 a8 5f 67 eb c4 | af 88 eb 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c fb 6e 46 7d 68 85 83 cc d1 35 3b | 25 21 b7 36 bf 74 0f f9 00 00 00 1c 00 00 40 05 | ea 1c 8a 1b 9f c4 37 0b d8 b4 d1 29 da 67 72 c1 | 45 ae 67 d8 | libevent_free: release ptr-libevent@0x7fb35c03f430 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | #406 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 1b 3d 38 ad ed bb 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #406 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #406 | rejected packet: | 5c 1b 3d 38 ad ed bb 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #406: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a54250 | handling event EVENT_RETRANSMIT for parent state #407 | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #407 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #407 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49692.561386; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006455 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #407 | libevent_malloc: new ptr-libevent@0x7fb35c03f430 size 128 "road-eastnet-nonat-155" #407: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #407) | 0e f3 59 3b 18 9b 4c 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 5f 7f 81 27 bd f8 4f 84 8b e5 e1 d9 93 de d8 | ec 64 3c 7a c3 34 95 f3 06 ea 96 b5 7a 1b 8f d9 | c8 72 7c 66 d5 b2 ca 73 d5 43 7d ea c5 0c 84 ce | ea c7 b2 0b b4 5d 2c b0 44 4e 93 91 63 38 66 d7 | 19 d5 08 6f 6d f9 84 4a 63 7a 55 68 05 24 95 3e | 99 aa 1e b1 c3 ab 11 18 fa 12 e7 7c 5e c4 8f e2 | 44 28 c7 70 13 76 b9 dd 3a a6 1c 9b 90 d4 8f 73 | 83 e9 82 03 c0 46 28 ea 33 e9 c1 33 69 9b 00 f8 | f6 cd 83 94 cf a0 a7 5e b8 a0 8a 65 44 ef ec 83 | 35 ff 33 b2 45 4f 06 95 40 67 f8 16 c1 7f cb 23 | 42 69 1a ee 3e 5b 22 ed 9d 49 26 08 ce 24 1f dc | 4a 71 86 ce 70 39 9b 18 48 00 7f 0b fd 35 9a e2 | 3f 9a 8e 15 96 bd 41 9e d7 e9 02 79 05 c7 13 f3 | c8 1e 09 29 1f ca 34 e6 f2 7a 3f 24 4a 98 16 47 | 9a 91 43 46 5c 83 b4 00 84 95 4d df 42 56 5f 61 | 36 41 b7 50 c0 98 6b 76 ff 78 86 a6 38 01 7c 10 | 29 00 00 24 21 43 66 be 17 99 40 cd 23 ec 46 61 | 66 3c a9 d5 4d dd 70 3a b4 cd a8 e6 b6 42 a4 c0 | 0c aa c9 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 43 3c a2 b5 33 c4 3b e7 27 68 b0 | 1d 1f b8 cf bc 05 b9 a9 00 00 00 1c 00 00 40 05 | 76 06 02 ba 2b 08 ee 9d 42 ab b0 60 2b 0a e2 b7 | a2 85 77 a0 | libevent_free: release ptr-libevent@0x7fb388022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a54250 | #407 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e f3 59 3b 18 9b 4c 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #407 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #407 | rejected packet: | 0e f3 59 3b 18 9b 4c 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #407: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c01fda0 | handling event EVENT_RETRANSMIT for parent state #408 | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #408 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #408 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49692.624758; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006097 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a54250 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #408 | libevent_malloc: new ptr-libevent@0x7fb388022480 size 128 "road-eastnet-nonat-156" #408: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #408) | 34 97 74 26 6a e5 a4 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 b4 84 d1 c7 68 61 a7 a8 43 5d 75 52 c1 45 ab | 1c 34 c9 1c fb 58 62 3f d2 e4 63 2f df 8e 65 23 | b3 d6 a9 03 c7 71 70 03 ff 1d bb ac 17 a8 6b 6d | e6 be 80 ad c9 77 c7 17 6a 89 49 48 8d b3 43 d4 | 49 ba db 2f fb d6 1b 93 5a 1f a3 ce 04 89 6c 2c | cc 68 c0 e5 12 10 fe eb 35 b6 6c ba a1 43 99 e7 | 4d 42 5d cb 3f a9 dd f3 e4 5f 32 df 76 2b 7a ba | 94 68 cc b7 71 6f 68 e6 66 e9 1a 0b ff e7 f5 9d | 06 aa 01 3c 32 ad d4 f8 5e 61 a5 fe 63 fb f1 96 | b8 0a 85 b5 ad 42 f9 e3 5a cf 27 5e ec 13 9b d0 | 73 b5 31 d4 d2 24 51 4d f5 0b 85 9e 11 85 42 e0 | 88 fc 0a 42 f4 e7 3d 49 ba 53 8a d7 ce 64 df d3 | 52 60 3d 1b 37 34 8f 8c 6a 9e 6e 25 b4 f3 7c 18 | 7a d1 56 c7 cf 72 57 08 b3 73 0c ad 15 18 33 ce | 9c f7 e6 b3 e4 26 15 89 8c 70 86 37 d6 87 03 97 | 84 4a 45 be 3f 69 21 05 76 54 73 82 39 32 70 e8 | 29 00 00 24 59 44 9e 7a bb 43 7f 93 5b bd e5 23 | c1 87 73 73 05 59 35 01 ab d3 f0 0b c4 05 69 18 | 98 63 3b b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 8e f2 86 2b ac 70 a5 cc 8b e7 7d | ac ad 47 30 21 b0 b0 7f 00 00 00 1c 00 00 40 05 | 79 17 f0 70 ea 4a c6 21 3a b7 c0 97 d4 68 33 32 | 9c c8 09 b0 | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c01fda0 | #408 spent 0.278 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 97 74 26 6a e5 a4 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #408 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #408 | rejected packet: | 34 97 74 26 6a e5 a4 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #408: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.157 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34800cc10 | handling event EVENT_RETRANSMIT for parent state #494 | start processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #494 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #494 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49692.662535; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004795 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c01fda0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #494 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 "road-eastnet-nonat-242" #494: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #494) | 13 d2 ce 8c c5 a0 08 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 2c 3b c1 c9 27 85 62 17 d7 83 f4 4b 2e 0e 16 | e2 03 04 ad 7a 8d 40 02 d4 34 9d 1b d3 c9 18 6b | 41 26 bf 10 de e3 e0 e1 0e ef 27 5f e0 e8 78 57 | b0 c9 a6 38 de ce 8a 7c 37 31 11 56 7d 62 bb 8e | c9 f9 f5 6c 82 0f ba cd 3f af 70 4e 17 32 64 c9 | d5 e6 2c 41 27 6e 25 48 eb 43 50 ea a4 34 26 c4 | 56 d9 54 ab 57 40 f6 c1 9c 20 1b 06 22 84 03 8b | e5 53 55 fa 3d 80 8b 5b c2 25 82 15 35 94 6c d0 | bb ec ab 60 22 1d 87 23 e3 9e ac fc 16 ce 42 3f | ba 0d 8d 04 b9 e7 b2 de 46 3e 4b b3 83 4d ca 89 | e2 a0 d6 38 51 9a 05 e2 dc 57 8c 52 b9 1a fa 47 | 7e 1e 80 51 ac cf 77 c1 e4 be 78 0f 3d a1 ce 56 | 23 61 ff 3d 67 82 ef a5 20 d8 a8 62 8a 37 d6 a0 | 87 df 7e 30 b4 77 c6 c9 19 64 23 a5 4f 30 28 ac | 43 56 89 18 4a 88 a5 5e d6 97 45 97 2d bb 34 28 | 33 0f 79 c6 b2 6c 6b 62 1d d3 42 70 92 9f 6e 55 | 29 00 00 24 86 c8 ae 9a dc 82 47 ae 63 a3 d2 9c | fc 56 5a fd b5 a1 94 8d 79 cd 12 87 5b f8 39 1c | 72 7a 80 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 4f 14 68 3f 9f 2d 22 c7 c5 d4 82 | fb 7c 5e ae ba 6a 24 66 00 00 00 1c 00 00 40 05 | bc 9f 5c d1 bc 22 73 c4 89 e4 5f 13 b2 ba 1c 19 | 38 03 1c b3 | libevent_free: release ptr-libevent@0x7fb340012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800cc10 | #494 spent 0.614 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 13 d2 ce 8c c5 a0 08 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #494 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #494 | rejected packet: | 13 d2 ce 8c c5 a0 08 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #494: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.279 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8ee40 | handling event EVENT_RETRANSMIT for parent state #409 | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #409 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #409 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49692.695765; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00485 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800cc10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #409 | libevent_malloc: new ptr-libevent@0x7fb340012840 size 128 "road-eastnet-nonat-157" #409: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #409) | 0d 5e 25 c2 55 3c 99 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e 9e 5e 2e 09 bf 8f 71 99 55 8d fe 7f 83 64 1f | 09 d9 64 f5 c9 93 8a 5c be 46 9e 22 f6 15 48 5f | a3 27 82 be 44 32 8b ed 4e a8 f7 10 74 01 31 7a | a5 a7 4a e9 16 68 9c 40 cb 7b 6b e4 87 2e b5 7d | 61 20 08 88 29 08 bb bf f5 22 fa fd 47 2b fd 61 | a5 c3 48 69 18 1a 27 78 c3 f3 e3 0b 62 b4 52 0b | 48 72 ce 1d 37 3b 34 c5 fc ba cb 1f 9d e8 de ad | 9b ab 2c 3a d9 69 c6 42 6d b1 05 5a c4 77 34 d1 | ff 6d 2c 38 8e 1f 9c 0a 39 45 f9 c1 2e 9a c1 dd | d2 58 ca fc 7a d1 3f 4c 26 24 eb 54 5d 92 fb 39 | 47 60 ec 18 66 63 9c 19 12 10 f2 b6 7c 18 85 c7 | 6c d1 5b c2 e0 13 21 58 85 48 a4 fc 6e b1 46 84 | 53 a9 5a 65 21 91 66 41 1c 5e ad 4e a2 85 5a 4b | dd 4b fe 45 dc c9 fe ab c9 08 d4 96 88 93 93 aa | 1e 95 b1 87 3d 21 a8 b6 2f fd 18 ff 13 73 04 e2 | 11 aa e4 99 8f 8e f6 da 34 f7 b8 a6 55 2e b3 22 | 29 00 00 24 56 91 a2 13 7d 33 fd 14 52 dc d7 9d | 97 62 ec aa 5a ba e0 81 38 20 1d 66 12 9f da fa | a6 b6 f9 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d7 a6 1d 1c 1e 3f 9a df 29 5a 62 1d | 4b b6 a0 46 97 db 0a 03 00 00 00 1c 00 00 40 05 | b4 37 78 a6 35 8d da 4f 96 64 40 e6 05 68 b6 9e | 6d 2b 7a a6 | libevent_free: release ptr-libevent@0x7fb36c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee40 | #409 spent 0.578 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 5e 25 c2 55 3c 99 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #409 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #409 | rejected packet: | 0d 5e 25 c2 55 3c 99 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #409: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.307 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3600129a0 | handling event EVENT_RETRANSMIT for parent state #410 | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #410 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #410 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49692.751893; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005071 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee40 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #410 | libevent_malloc: new ptr-libevent@0x7fb36c0251c0 size 128 "road-eastnet-nonat-158" #410: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #410) | 59 b5 db 36 67 47 70 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 b7 0b 8c f9 95 bc f7 80 78 70 36 f3 fd f2 85 | 36 5b 98 b3 da 7d 8e 19 72 07 91 60 60 8a e6 82 | 67 b3 ba e3 47 c2 28 3a c4 af df a8 61 5d 73 9e | d2 63 4a 41 c1 df 23 58 85 d0 d0 d7 31 64 13 d3 | fc c4 39 95 ba ac 0f ae 94 0f 0a ba f0 76 e9 ae | a0 35 47 51 b9 fa 43 1f 5e 7f a1 99 3d cc 76 ac | 19 ca 51 32 ad cd e2 9d 6b 98 62 47 ad 2c d1 40 | 11 bd ff e1 9d 02 a1 c8 40 a8 ed 91 e5 60 1c 79 | ee 69 bc ed 65 82 b2 85 d5 b1 74 ab f9 fa 7a e9 | f0 dc 57 ef e3 3e 09 b2 80 4a e9 c3 55 5a 97 3e | 39 d4 2d 85 ca cc 9a e5 d4 76 c5 5e 9e c1 e9 7d | 39 17 67 a4 c4 56 99 a0 e7 0c b7 13 22 44 76 46 | 08 b0 60 5a a2 8d 7d 3c 2d 85 7a 7a dd 83 3a 2b | 27 be 2b 38 04 53 2f 3d 0c cd c0 ad bc 4e 6a 91 | 94 3d 91 ac 7d a2 5b fd 39 2e 69 e6 48 9c ae be | 71 e2 83 13 24 ec 5c 04 d1 c5 4a 80 96 3c 2f 11 | 29 00 00 24 e1 88 5c 17 02 b4 80 04 34 b3 a7 d4 | f8 d1 c3 d6 e1 59 82 cb 1f c0 98 16 57 75 53 e7 | ef 70 14 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 ce e5 8e 76 7c ee 72 e4 c9 6c 0a | 7e 11 3d 4e e7 09 5c 04 00 00 00 1c 00 00 40 05 | 2c 17 58 9d 14 87 37 db ad 40 b0 f7 64 73 53 a7 | 0b 3f 01 e6 | libevent_free: release ptr-libevent@0x7fb3500300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3600129a0 | #410 spent 0.336 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 59 b5 db 36 67 47 70 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #410 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #410 | rejected packet: | 59 b5 db 36 67 47 70 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #410: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.149 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a97080 | handling event EVENT_RETRANSMIT for parent state #495 | start processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #495 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #495 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49692.797533; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.003997 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3600129a0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #495 | libevent_malloc: new ptr-libevent@0x7fb3500300e0 size 128 "road-eastnet-nonat-243" #495: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #495) | 51 22 fa ce 4d 7c ce 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c 9b dc 70 14 a2 8d 2e 37 c4 2e 9c 10 fc 27 0a | 94 78 5e 85 80 ae e5 be af df cd 9d ab 0a d3 d5 | 9a 0e 71 ff 6f 4d f8 da ab bd 5a 72 c3 2a 71 74 | 55 f1 2d 29 95 62 4d 7d b1 32 5b 12 fd 0a 2d bb | 81 aa ca e6 2a a9 0f 8b 0c cf 1b d2 de 30 5f 1f | e8 83 26 da 07 fd 31 9b 9b d4 1b db 2d 4b e3 99 | 86 7d a5 a0 d4 7d 59 09 c9 73 32 3d 53 85 e9 6f | 12 64 cd cb bc 89 f7 39 4d 28 2c 75 1c 49 0b 3b | c2 22 31 40 60 7d 62 ec d8 da 82 4a bd 1e c5 38 | c3 d8 6d e6 cb 49 78 ba 18 b4 83 3e 7d f6 6d 50 | 16 4d a6 04 f2 a5 8b c2 44 ae 9c 1a 54 68 4c 7d | 43 87 34 87 42 6c 4d fd b4 43 f6 3a 97 2e d2 87 | c4 99 e8 56 55 a1 ca 43 16 5d 55 9b 16 ed ee c1 | b9 bb 2b d6 cf 5a 0d 72 75 6d 1a 0f ae 6e 85 ec | 3a e8 4f c3 0e 27 5b 09 2a e5 e1 24 f5 af 32 13 | e5 eb fd 29 dd 27 c3 a5 08 cc 6e 72 80 4d 82 6f | 29 00 00 24 1b f3 52 dd f6 a5 80 95 b8 2f 4b 8b | f9 eb 65 1b 6e dd cd 94 b7 dd 16 f5 58 7c d7 e5 | e4 3a 80 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 3b 51 4a 4c d3 e5 68 1a 7e fa ec | e7 02 de b1 56 34 9d 92 00 00 00 1c 00 00 40 05 | ef ad 01 a7 be a3 55 49 1c 13 e6 d1 01 bd b7 0b | b8 36 16 d5 | libevent_free: release ptr-libevent@0x7fb37c023b10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a97080 | #495 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 22 fa ce 4d 7c ce 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #495 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #495 | rejected packet: | 51 22 fa ce 4d 7c ce 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #495: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c018460 | handling event EVENT_RETRANSMIT for parent state #411 | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #411 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #411 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49692.828025; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00627 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a97080 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #411 | libevent_malloc: new ptr-libevent@0x7fb37c023b10 size 128 "road-eastnet-nonat-159" #411: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #411) | dd dd 24 eb b8 cb 50 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd cd 4b b5 b6 e7 18 30 d4 d0 8e 83 03 53 e6 4e | 8d 99 24 ba 33 2f 0c bd fc e2 e9 0d 81 68 aa 7b | 12 93 68 9f 91 0d c2 fa e1 b9 83 26 f0 5b 9b dd | 51 e3 9e ed 34 ea 5f c9 93 72 24 b6 bd 13 cb 5c | 26 fe cc 72 6c e7 c6 21 ed 4e 14 b2 9f a3 3b 3c | 94 f8 1a 98 76 bb 57 e6 0d a9 bd 26 b1 18 3d 50 | 59 31 42 4b 06 7d ba db 70 1e 1c ae a8 d8 de 3a | 81 ee 27 6d 40 cc 4d 6a 4b fc 36 c4 b0 3a 09 0b | 48 47 43 74 dd e5 cb 90 df 6e e3 46 c3 6c 8b 97 | f3 25 7f d4 fd ec f5 56 ff 6b 80 d1 67 dc c0 79 | 70 cf 38 a2 35 5f 37 c9 04 ae 98 e9 6e f3 26 d3 | 47 94 bb 03 5d 71 7b 87 ad 54 4b 93 a3 b0 71 8f | 5f 69 b0 8d 69 3f e2 c0 02 32 57 3f 64 cb 19 71 | 58 00 09 d8 ce 8f 64 c9 55 9e 7c 00 26 28 eb f7 | 6f eb 0e ab 01 fb ae c5 0f da bd 30 07 46 c2 b0 | 5c ea 05 eb 2d 3f 40 91 20 c1 a3 5a 4f 86 98 86 | 29 00 00 24 a3 6a 54 81 57 a4 87 e3 a7 7a 68 dd | 8e 44 5b 6e 2b 5e f0 9a 3e c5 72 e8 17 f4 34 1c | 65 bd e7 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f a2 a7 20 75 c6 9d 9f 5f af fe db | d7 0a 3e e1 5c 28 6c 20 00 00 00 1c 00 00 40 05 | 37 57 74 7e fa 8f cf 8f 09 51 1f a5 a7 dc 5e 89 | 60 7b 2d b3 | libevent_free: release ptr-libevent@0x7fb35c014b40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c018460 | #411 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd dd 24 eb b8 cb 50 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #411 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #411 | rejected packet: | dd dd 24 eb b8 cb 50 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #411: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.06 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374009690 | handling event EVENT_RETRANSMIT for parent state #412 | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #412 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #412 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49692.887118; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008304 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c018460 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #412 | libevent_malloc: new ptr-libevent@0x7fb35c014b40 size 128 "road-eastnet-nonat-160" #412: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #412) | af 34 f0 93 1d 1b d6 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 73 ca 82 d1 b8 25 7f 04 b5 f2 f7 30 87 a9 41 | a5 4a c9 0d a4 7b 88 6a 9c a7 a5 05 c4 99 82 97 | fe 18 55 31 1a 69 24 11 ef 96 2b 9b 00 09 64 93 | f5 9b 6f 9f 26 02 b8 02 eb ec d6 b9 58 77 37 c4 | 15 13 55 d4 ba a0 8c 70 db 9d 5d b8 50 b2 fb 14 | 70 91 27 3f 52 b9 21 d5 ac 35 9f 2f 74 c2 cd a3 | f5 0a 60 3b 9e 8f df b1 5a c8 44 f1 32 14 8d c9 | 96 70 54 8d 6a b3 1d 9e 55 f7 54 39 be 48 72 05 | 31 be c1 bc a2 b1 92 d9 d7 2b ac 35 4b a3 d1 85 | c8 13 0e 09 13 01 9b 53 39 df da 51 e3 f0 0f b0 | b8 cb 35 90 8d 85 96 9f 9a 47 73 3d e9 c6 9a 9b | 64 e5 27 2a 0d 1b 39 d0 c9 ca 54 89 58 ae ef 63 | 30 57 d5 95 13 d6 7b 07 db 4c 1f 26 15 fc 42 93 | 98 20 27 df a5 2d d6 c3 03 e8 40 00 9e a8 d6 5b | d9 5c 3b 12 b9 90 e7 25 5f 47 7e 86 19 c6 bc 15 | 0b 47 49 10 46 90 3e a8 79 f3 d0 fc 23 1f c9 d1 | 29 00 00 24 a3 90 3f ea a1 9a ff 04 92 34 17 b8 | 6f ef 29 47 17 37 0c c0 67 c5 c5 dd ee 94 92 f1 | d0 ea b7 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 8b 79 f3 42 b6 33 1b 9b 02 cf 5d | 36 ad 4c 1f 32 b9 37 c2 00 00 00 1c 00 00 40 05 | a6 ab fb 7e 68 25 b5 32 b3 ef df 3a 19 eb c4 3f | d0 c1 29 ec | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374009690 | #412 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 34 f0 93 1d 1b d6 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #412 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #412 | rejected packet: | af 34 f0 93 1d 1b d6 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #412: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0695 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c03b100 | handling event EVENT_RETRANSMIT for parent state #413 | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #413 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #413 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49692.951489; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005407 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374009690 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #413 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 "road-eastnet-nonat-161" #413: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #413) | ea 46 85 e7 fd 9b ca c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a d6 4a 46 94 c5 0e 81 7d ce e7 15 1a 5a 21 6b | d0 32 15 1d df aa 19 22 73 4c 48 c7 c9 6d a8 93 | 29 7e ec 61 b6 83 c3 69 04 a5 60 f9 c5 35 27 f9 | 44 bf c3 99 38 07 63 d7 db de ef 2b 00 c6 3d 6f | 1e 8f 0f f0 f2 98 90 49 cc c1 d2 86 82 6d 83 07 | b6 cd 6e db a4 2f 05 29 fa 3e e9 09 c5 23 64 57 | 0f 6b 66 2d b4 b3 b3 d2 ea e7 1c 7e 8b 59 ce a2 | 2a db b2 33 4a cb 53 6b e5 06 8d cf 28 1c 31 94 | 7e 79 27 07 12 0f ee 03 55 92 90 46 1e 9e 32 06 | e3 69 6e 6a 21 a6 b6 3d c6 89 df ef c7 fa b0 eb | ab 8c ae 81 fa 71 38 65 08 c6 41 65 64 a9 83 b0 | bc c3 01 a6 3a 68 d2 5d bb 35 97 d0 1e e7 f8 04 | 04 04 f6 ff 5e f9 22 b6 f2 9f 86 d9 b4 ae ee 49 | fd 07 2d 26 52 e7 63 86 cc 1a 6e 7f 04 ad 81 4a | a3 d7 7a 6d 6e 53 1b 65 52 8d 28 da bd 54 d5 04 | 1e 3e 9f 74 3c 77 dc 33 e5 c5 fe 6f df d3 a7 16 | 29 00 00 24 85 87 06 d7 9a bf 7b 07 3a ec 94 d1 | cf f4 5c 33 c2 8f dc 32 29 58 27 3f e4 e5 19 81 | 63 f8 b3 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 20 9c 8e 3c 13 0c 4e a0 e8 24 76 | 9d 56 e7 f6 81 08 36 aa 00 00 00 1c 00 00 40 05 | 3c 55 11 1a b1 a6 35 ac 5d bf b2 4d 0c c0 40 68 | 37 73 05 e6 | libevent_free: release ptr-libevent@0x7fb35c029490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c03b100 | #413 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 46 85 e7 fd 9b ca c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #413 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #413 | rejected packet: | ea 46 85 e7 fd 9b ca c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #413: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aef6c0 | handling event EVENT_RETRANSMIT for parent state #496 | start processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #496 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #496 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49692.981789; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005227 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c03b100 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #496 | libevent_malloc: new ptr-libevent@0x7fb35c029490 size 128 "road-eastnet-nonat-244" #496: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #496) | f5 9f b4 c2 7a 9c 1f 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec 8a 03 66 9e a5 16 39 b9 4a bb 3f cb 61 65 42 | 8b 18 46 77 70 53 8b 55 8b 35 c6 f2 c8 4d 38 3e | 2b 6f 3f c9 8d f1 cb 91 94 06 70 93 28 a0 96 60 | 92 d3 00 a2 ef 01 89 68 02 8d 85 25 69 9d e5 95 | 69 f6 3b 34 62 4f 63 bc 8e bf 0f 5d c5 bc ea 46 | f9 33 76 3d ad c3 1d 5a 73 74 ae ae 16 20 46 35 | 9e db 41 74 ad 1f 50 49 89 b1 86 a0 57 06 1e bf | 85 a3 93 e1 b5 84 03 d1 1b 0b 7b cd 83 c2 b7 25 | da ae 43 dc f0 b6 2a cd 25 9c e3 07 d7 ef 34 20 | 0c 00 64 d5 63 1f b1 99 29 80 fe 35 ec 43 23 95 | 6a a2 fc 57 a3 69 20 ea 94 fb aa 78 ee 5b 41 20 | 62 d9 4d ee fd 29 6e d9 f4 a1 15 cb 28 a0 f5 d3 | 5e bd 59 a6 87 61 99 4f 80 5d e6 36 36 11 e0 c2 | e5 c9 d7 3c 99 3b 27 4b f7 81 ca 42 93 ee a9 76 | e3 2e 24 6c 18 27 a8 24 04 ce 7c dd c7 a8 fd 5b | a3 04 bb 87 35 69 9f a6 83 11 9f de e4 40 52 5f | 29 00 00 24 4f 4f 97 a4 0f 74 20 cc 43 f4 64 ac | a1 3b a8 cc 16 af 62 fa 43 5b 11 20 24 9f 33 6a | 2d 6e 82 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 79 bb 2d d9 d9 21 50 1a 1a 14 0f | 62 ed ae c0 08 f2 03 40 00 00 00 1c 00 00 40 05 | c8 1f b0 a0 de 58 fc c7 c3 79 0d 4a c2 37 42 43 | 8a b6 69 08 | libevent_free: release ptr-libevent@0x7fb37004b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aef6c0 | #496 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 9f b4 c2 7a 9c 1f 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #496 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #496 | rejected packet: | f5 9f b4 c2 7a 9c 1f 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #496: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0493 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aacc80 | handling event EVENT_RETRANSMIT for parent state #414 | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #414 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #414 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49693.024087; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006137 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aef6c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #414 | libevent_malloc: new ptr-libevent@0x7fb37004b7c0 size 128 "road-eastnet-nonat-162" #414: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #414) | 9e d5 a6 6b e9 51 f5 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 17 ff 89 e8 3c 16 16 6a 13 a2 4a 6e d7 58 8c | 31 4a 5d a6 06 21 a0 a1 9e a4 d6 9f 9d d0 c9 ef | 81 a2 6a e5 e1 ce f7 5b 3f cb a3 39 af 4b 00 d3 | 8e ea 93 72 09 07 7e f7 07 70 f1 60 90 61 a3 52 | 45 df 81 dd 3b 9f 90 cc 5a ee 79 3a e6 e9 1c 8f | 3e 5d 20 51 b9 06 0a c7 eb 0e 7c 49 84 44 06 9a | 8a 7d 42 8a 3c 02 e8 20 6f 96 b9 43 e4 b6 78 25 | 2a 47 75 c2 a6 5e 09 93 6e 0a 52 61 7e 11 07 98 | e5 ed 70 aa 1a 26 50 15 8a 10 03 2b 04 12 5a 90 | df c8 9d 86 1f 6a 9b b1 b4 ef a4 64 93 b4 1c b9 | a7 2b 05 40 cd d6 1a ea f2 e2 7e 25 9c 0d 5f 1b | 71 7c a0 ab 46 0c fd 1d 5d c2 80 68 45 9c 03 04 | ba 22 16 f6 4e 43 40 2a 18 55 ee ba be b9 c7 28 | a3 19 30 1c 73 7f 70 9d 56 01 fc 31 bf 29 77 0b | f7 40 78 1c 68 3b 66 2d 2e 5b fb 5d 13 f6 84 1d | 63 eb 8e 4a f6 af 8f 02 43 3a 27 60 08 28 58 6a | 29 00 00 24 8a 22 da 4e 47 50 93 9e a6 73 51 af | 87 1e 05 a5 3e cb 07 7d 69 59 69 03 d3 ed 1d 7a | 33 b5 03 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba fb 8a fc 1d 3f b9 dc ba d7 c2 5a | de ae b7 6f 1b 1d e3 06 00 00 00 1c 00 00 40 05 | 6c ca d3 22 34 6c 0b 0a d6 9b 01 8f e9 fa 8a 7e | 51 47 3d 5a | libevent_free: release ptr-libevent@0x7fb3780407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aacc80 | #414 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e d5 a6 6b e9 51 f5 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #414 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #414 | rejected packet: | 9e d5 a6 6b e9 51 f5 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #414: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a903c0 | handling event EVENT_RETRANSMIT for parent state #415 | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #415 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #415 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49693.091455; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006473 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aacc80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #415 | libevent_malloc: new ptr-libevent@0x7fb3780407f0 size 128 "road-eastnet-nonat-163" #415: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #415) | 65 fc 55 c7 f1 44 1e 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 9b 11 f8 2e b4 b5 c5 30 9b 3d a0 a2 4b 27 41 | f3 d8 72 20 8a 56 0a 05 ca 4d 84 e6 cb f6 3e 40 | 63 3e 65 dc a2 c0 87 47 ce 3b 5e 72 88 1b 50 31 | 15 c5 cf 6b 4a 2f c7 ec 02 24 2b 5b d8 13 58 82 | ef 96 ce cf 1b c6 83 84 dd 4e ef ff 6c f9 de 4b | fa f0 63 3e cd 62 10 03 38 09 9e db 49 54 15 3a | a8 3d 15 df b8 ef fb f6 60 02 a0 d4 fd 2e 9b e9 | ce 3a 0e 92 13 6c 3b 4e d2 2c 44 8a 4a 9a 05 6f | c3 bf 63 16 b0 c4 63 88 ff 02 84 93 54 65 74 42 | 97 c9 d1 95 9c 76 cf c6 11 6e 97 99 50 ea 6c f5 | 6f f0 5c 9c c9 57 a9 e3 41 19 f6 b0 38 a3 e5 ef | 84 44 8a 93 ae f1 ef 1d 2e 53 2b d3 a8 41 d5 27 | 64 64 ae fa 1d fd ea 61 22 f5 cc 34 a6 a2 ea 37 | 88 8a b9 05 5f 00 cd a9 3b c3 f2 31 36 31 fa 53 | 3d ba 7c f3 35 4b 65 ab 19 3c 20 1a b3 c4 2a ca | f4 c6 08 71 62 bd 13 1a f6 9c 40 a8 5d ea 27 a8 | 29 00 00 24 e8 b8 58 d7 ae 38 da 44 20 ee 1e 02 | 80 cb 41 b6 8f 71 2c 96 9f ff be f1 a6 fa a0 4e | 6d 67 74 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 e0 03 d8 e5 8b 46 47 10 2c a8 6c | 82 9e b3 1d 1e 26 96 28 00 00 00 1c 00 00 40 05 | bb 40 b0 02 70 34 84 30 58 79 6d d4 87 e5 1d 82 | 6b ed a6 65 | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a903c0 | #415 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 fc 55 c7 f1 44 1e 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #415 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #415 | rejected packet: | 65 fc 55 c7 f1 44 1e 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #415: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0481 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37402ffb0 | handling event EVENT_RETRANSMIT for parent state #497 | start processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #497 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #497 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49693.107749; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004881 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a903c0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #497 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-245" #497: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #497) | 28 b5 38 f6 69 3c dd 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 04 4f fe 15 c7 2a a9 dd 3f 1e c4 af 27 5d f3 d2 | be f7 13 da e4 cd 00 79 29 61 5f 71 06 40 ec 4d | 5b 3c 6a 08 8b 9a 2f 7d 1c cb b0 e7 92 b6 f3 99 | d5 a0 ee 16 30 44 37 37 a1 b0 11 d5 bf c1 2a b7 | f5 d1 e8 e7 c9 c5 fa 46 9e 9f 3a b8 17 a3 bb fa | 54 7b 20 13 28 1b f7 09 b2 95 cc 2b 5d f4 60 59 | 43 48 23 26 2f ff 03 e2 92 b6 e4 28 ce 3a 0e b0 | 61 13 0a de 56 e6 23 f3 78 da d1 d7 d1 36 d7 28 | c6 40 4f d5 36 46 dd 50 a2 1e 26 c4 f5 81 8c a1 | f5 29 b8 66 19 89 39 ca 34 48 2c b5 7e 66 e5 bf | 86 9d 6e 91 75 02 c6 e8 9c 42 e7 98 64 aa 15 f8 | 6c 03 28 e6 79 39 e1 5e 40 0e f9 55 f0 a7 e0 83 | fa bb b8 03 f0 19 b9 6c 46 69 2b 63 42 39 b5 e4 | 3d 0b 8e 6b 21 0c f2 48 0e 67 57 08 dc 21 c5 f4 | 1a 4b 05 96 97 80 b1 ee 12 7e 9f 47 8d c8 b6 e1 | 5b 8f 86 2e 8f 92 b6 42 a3 65 04 7b ab ba 17 50 | 29 00 00 24 bb a3 f2 ad c6 d3 d5 2f 68 33 8b a0 | e0 e2 16 25 72 ec 6d 1a 07 9d 1d 9e dd 96 6a c8 | 4e 10 b2 ba 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 bb 68 12 ef 53 e2 45 10 bb c5 e2 | 24 4d b4 aa b9 d2 2c 73 00 00 00 1c 00 00 40 05 | 18 cd c3 7e 31 14 45 db 85 92 8b 2e 4a 8c 9b c9 | 08 95 b5 b9 | libevent_free: release ptr-libevent@0x7fb374034460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | #497 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 b5 38 f6 69 3c dd 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #497 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #497 | rejected packet: | 28 b5 38 f6 69 3c dd 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #497: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0482 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c00cc10 | handling event EVENT_RETRANSMIT for parent state #416 | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #416 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #416 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49693.152037; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006307 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #416 | libevent_malloc: new ptr-libevent@0x7fb374034460 size 128 "road-eastnet-nonat-164" #416: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #416) | 5d bf 34 43 fd eb 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 9c 12 61 6e 55 5f 3f e9 df f9 16 83 d1 25 2a | 72 5f a1 78 f7 87 25 3a 22 d7 65 e6 11 d9 d3 59 | e3 ba 0c 77 63 47 38 eb 2b 7e 21 79 54 43 77 67 | 7d 43 26 41 55 e2 a8 b7 fe 98 ba 7e ee 6e e7 d1 | f4 f4 66 e8 1d dc d6 4c 00 81 99 f5 5a 7b 73 a7 | 30 2a 46 7a 31 1a a2 5d 7f 98 25 46 aa 6e fe 80 | f5 47 c9 6c 4b 73 63 fa cd 88 eb 14 22 c8 b1 b2 | ad 5f b2 f2 36 1e b4 11 ad 9a b6 4a 8b 3e c1 87 | 99 5d 71 91 57 ac 82 f2 a3 ed 29 f1 0e 50 36 50 | 84 2e 3a 51 9c b6 89 41 dc e0 0d 62 c7 07 fd 92 | b2 9d 62 79 ea 78 ed 7f ed 48 ed 1d 98 d3 08 ff | 02 b4 3e 75 4f aa f5 e9 04 8d 83 d6 4c a8 75 42 | 31 a1 15 df b2 8a e4 30 1f 81 68 86 a3 e6 e3 23 | 56 ac 18 47 57 cf 03 de 91 03 0e d5 5d 28 a8 63 | aa 5c 8c 97 5e 5c eb 84 7c 09 fb 47 84 e9 d6 18 | 63 4d 10 b9 7d 4e 26 06 3f 25 b1 aa e9 d4 6c b6 | 29 00 00 24 b4 c4 67 16 b9 c2 e8 af d8 82 12 ab | bc d9 b4 36 b0 6a ad c4 e5 8c 60 6e da e3 9f 02 | d5 5c 1a 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 19 76 97 4c b0 23 bd 31 57 aa f9 24 | a0 38 a6 39 12 13 22 3e 00 00 00 1c 00 00 40 05 | d7 f1 41 97 86 a8 54 0a 0b 1f 8a 34 7f d0 a2 86 | ea 0e a2 fa | libevent_free: release ptr-libevent@0x7fb34c03f570 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00cc10 | #416 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d bf 34 43 fd eb 2e 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #416 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #416 | rejected packet: | 5d bf 34 43 fd eb 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #416: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.067 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388009ed0 | handling event EVENT_RETRANSMIT for parent state #417 | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #417 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #417 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49693.211419; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005605 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00cc10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #417 | libevent_malloc: new ptr-libevent@0x7fb34c03f570 size 128 "road-eastnet-nonat-165" #417: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #417) | d9 e4 18 5f 59 64 b9 ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 fd ed 03 c4 13 a8 51 65 6c f8 7b f8 e0 2d 89 | 59 12 b6 d0 fa 5d d3 b6 48 1f 05 4f d0 37 4e 96 | b6 b0 a9 07 5a 84 b2 22 72 c2 6e e4 2c 16 e8 fb | c8 92 b8 74 ce 3f 40 30 b5 60 8c 95 d1 d0 42 81 | 96 4a 3e 9a 08 06 af be 4a d9 72 15 c0 c3 46 78 | d0 1e d0 10 cd c4 48 fd 2d ac c2 45 66 8d 26 84 | dc ff cb c9 a3 60 b9 5c 03 1c 63 7c ad bd 60 96 | ce 2e d7 57 49 16 93 e7 43 2d b6 d5 b4 ce 5b 3b | 96 51 3a 88 ff 32 38 dc 5f 0b a8 74 a0 1a 49 87 | b5 db a2 1f ed 10 a6 d0 7a 48 4a 90 79 4e 5a f9 | 2b 8b 33 88 7e f6 9a 82 54 47 b3 ae d3 d5 19 8e | 35 94 b5 a7 07 70 69 91 1e 2e 08 a0 fa fa bf a8 | 09 5a 06 2f 9a 90 75 b5 b1 fe 11 2e 8d bc e2 8f | fc 8a 4c 02 b2 2c 51 5d d4 fd cc 21 3e c1 63 73 | 47 88 57 72 c3 e3 90 eb 42 71 fd 34 f9 5d 5f ad | 35 a7 22 19 95 d8 2d 82 e5 c2 0e d7 d8 88 22 f6 | 29 00 00 24 df 2c 07 75 0e bd bd 78 6f 85 ca 62 | 53 2e a0 29 e4 f9 3b 0b 22 fe c0 44 7c 40 c5 a3 | 8b 56 a4 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 33 f3 05 bf ce a7 d8 4f e5 99 24 52 | 75 47 3a d4 7d 71 ad 77 00 00 00 1c 00 00 40 05 | 01 69 5d 3d 4a 00 3f a4 76 63 f4 90 ae 45 6d 8b | 22 6e e0 18 | libevent_free: release ptr-libevent@0x7fb38801d010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388009ed0 | #417 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 e4 18 5f 59 64 b9 ab | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #417 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #417 | rejected packet: | d9 e4 18 5f 59 64 b9 ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #417: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0658 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370012bf0 | handling event EVENT_RETRANSMIT for parent state #498 | start processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #498 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #498 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49693.242756; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.007058 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388009ed0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #498 | libevent_malloc: new ptr-libevent@0x7fb38801d010 size 128 "road-eastnet-nonat-246" #498: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #498) | 68 4b 64 40 03 e3 f0 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 69 29 47 91 ea fc 2e df 27 76 0c 26 38 63 6b | ee 03 64 3e dd 2d 4f 5c a2 7c 3e 41 2e b2 c6 84 | ff d7 8f ca 24 8a 1a 84 04 b4 3e b6 53 38 d4 57 | 6d a4 68 41 c6 e5 8c 59 22 a7 fd d7 67 07 36 7e | 1e 40 23 48 d2 30 3e 8e d0 0e 2f 85 d4 6b 01 86 | 85 76 00 26 45 82 b5 a1 ed 94 31 de 85 9c 6f 9a | d2 cc cb 6d 68 f4 36 91 7d 92 94 a9 b3 a0 25 d9 | 5a 00 e8 82 c1 6e 50 4f eb 4b c5 77 4d eb ad f8 | f9 00 df 08 85 b8 e7 b1 b7 09 70 ca fb b5 96 54 | bd be b6 e6 4b 40 d9 6a f9 30 1c a8 77 f3 85 c8 | 21 54 2e a4 d4 8e d4 56 c2 16 22 dd 3e 05 97 69 | 65 6d 3c 5d 0f 12 01 33 b0 f7 91 7a 47 03 5b 97 | 4d 0e 9c 52 05 49 6e 01 9c be f7 12 23 b1 5e c9 | 73 97 42 af ac c3 1d 81 30 3b a9 46 14 e0 b0 65 | ab d4 ac 96 fd 2b 1a 19 c7 e5 47 a1 84 25 26 11 | 99 9a c0 71 dd 5f b8 d7 21 7f 1f c8 a8 a3 e9 18 | 29 00 00 24 87 96 a9 cf f1 29 2d 50 7c 79 d6 68 | 62 af 98 cb 71 a2 fc 0e ae 94 c2 03 22 51 95 ed | 81 12 8d c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 71 da 0a 79 9e f6 1d 6a 6f 5a 6b | 39 aa 0c e1 fb 50 58 ee 00 00 00 1c 00 00 40 05 | 43 dd 8c b7 86 3c b2 4e bf 53 d1 4c 55 30 14 19 | fc 2a 32 31 | libevent_free: release ptr-libevent@0x7fb35c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370012bf0 | #498 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 4b 64 40 03 e3 f0 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #498 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #498 | rejected packet: | 68 4b 64 40 03 e3 f0 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #498: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0688 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340008e80 | handling event EVENT_RETRANSMIT for parent state #418 | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #418 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #418 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49693.27811; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005356 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370012bf0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #418 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 "road-eastnet-nonat-166" #418: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #418) | 1c 58 36 d0 b8 a0 d1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 21 69 13 ea 9b 51 f5 f8 3d bc 58 75 ed a9 fd | 17 d1 ac 45 30 9e bb dc f5 67 d6 33 5f f9 21 3b | d7 08 0c bd e4 4c bf b2 e0 66 df d2 39 12 b4 cd | 51 1d 79 99 b2 28 9d 92 25 3d de c7 de 50 60 c0 | b1 e7 b1 2f 20 ba 56 e0 cc d5 d3 89 fb f3 3a 69 | 08 b8 19 34 ad 51 11 33 2c 83 6c 01 df 40 a9 5a | d2 8e ac 81 f5 73 32 a5 92 89 d9 43 53 9f d1 60 | 24 f6 18 43 4f b2 cc 04 87 ab 6f 28 3d 9c e1 be | 1d b6 6f 40 8a 39 f7 27 97 65 7c fa 70 bb d3 47 | 6d aa 41 65 fd 87 5b bf 5a 85 1c ca 2d 31 4b 63 | 3b 57 1d 34 66 19 31 70 16 5e 12 2a 4b 3c f3 aa | c7 b4 1f b1 9b ff 71 77 21 47 b5 ee 99 1f 02 09 | 95 71 68 b7 06 9b 0f 65 04 ee a4 b9 3b 45 42 02 | 7d d2 87 0e 66 c1 75 4c ff 7a f3 83 39 de 46 b2 | 20 fd 8a d9 22 4f c4 77 47 fd 4b 1b 01 cf 2f ef | dc 02 1e 19 bc 0a 3d 9b 32 25 8e a1 b4 27 34 08 | 29 00 00 24 1a d8 6e 71 ca d7 ba 26 1e 49 f1 5f | c1 b0 03 8a 8a 69 67 55 4a ef 6c 1a 26 5d 01 35 | 4b 44 6d e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 63 ba bc 17 58 ec 8f 3d 47 af 87 | d9 d9 f5 4c 16 0e 40 2b 00 00 00 1c 00 00 40 05 | 0c c9 6a 54 72 2b 9b 5b 7b 1a a4 b5 a9 4f 1c b9 | a1 57 0c cc | libevent_free: release ptr-libevent@0x7fb340044850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340008e80 | #418 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c 58 36 d0 b8 a0 d1 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #418 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #418 | rejected packet: | 1c 58 36 d0 b8 a0 d1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #418: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0621 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61c10 | handling event EVENT_RETRANSMIT for parent state #419 | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #419 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #419 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49693.344489; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005145 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340008e80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #419 | libevent_malloc: new ptr-libevent@0x7fb340044850 size 128 "road-eastnet-nonat-167" #419: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #419) | 13 42 1a 05 2a a9 f4 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 82 ba 57 e5 18 7f 6d c1 4e 6c 32 74 c7 8d bc | fa 9e 5f 85 57 91 bd e7 d1 f6 a5 cc 56 d4 ef 2c | 82 2b a5 62 6a 68 41 f0 a0 92 fa 2e 12 6a 74 95 | 56 98 09 32 67 8d a9 cf ce e8 4b 16 ca ae fd 57 | 33 7d 99 6a 29 1d 52 35 0b 5c 55 de 21 8b fe 4c | 64 ea 17 c4 c0 64 cd 47 31 4b 7a 08 f8 bd 37 3f | 72 ba 30 cd 0e c2 9d 0f e4 8b 3f b8 4c 2a d4 69 | de 4a 7f 8a a8 eb c0 7f 8f b2 10 0b d8 35 aa 5e | c8 ac 23 ce e4 c8 52 08 91 9c 13 ce 38 17 f1 d8 | db ec 31 93 d6 0d 09 93 5b d1 dc 9c 92 3b e5 29 | 17 5b e6 ee 7f f5 fb 3d 38 b5 23 c0 cf 25 d5 5b | 67 0a 2b 07 fd 68 8f 4c 74 c9 96 0b 9b 44 5c 6b | 0e 2d 70 4b 98 d5 d7 b9 54 dc 11 1e 19 cb 73 3f | 22 ca 80 46 28 a8 4a 20 64 29 4c 39 a5 b7 25 84 | 93 fd 4d 3a a6 fa ab c2 68 fc 5d fb 3c 7c 06 72 | eb 28 8a f5 09 69 59 c1 01 26 88 c4 c6 36 f6 6c | 29 00 00 24 83 3f e0 e8 30 90 0c c2 fd 9a 5c 8a | 88 7b e1 27 5d 3c cc 26 1c 41 3f 95 a3 1e 69 69 | b9 67 17 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 b9 c0 cf 3f 29 65 8b 9d 3a 51 6d | 0f 16 20 c0 79 fc 1d 37 00 00 00 1c 00 00 40 05 | 67 f3 84 dc 78 2e 75 89 44 b5 31 a8 97 13 e9 a5 | b9 b4 3a e4 | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61c10 | #419 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 13 42 1a 05 2a a9 f4 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #419 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #419 | rejected packet: | 13 42 1a 05 2a a9 f4 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #419: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #499 | start processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #499 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #499 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49693.367756; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005008 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61c10 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #499 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 "road-eastnet-nonat-247" #499: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #499) | c7 9c 2c 36 f8 59 d4 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 36 9d 7e c3 eb 0f f5 55 38 8b 43 25 86 54 ef | 6f b9 f8 28 7e 76 ec 92 74 99 fc c9 b6 64 9d ac | b4 f5 fc 31 29 96 7b f0 ef 3c 01 28 c3 ad 1c 4d | 74 6d b0 ed 64 09 35 18 c6 6a c2 bc 6c f8 72 2c | 54 14 82 7e 14 37 d9 e7 9b 9f ce de 7f 99 2e f1 | 1f 25 30 b7 54 88 0c c6 03 fe ef 9a c2 4c 16 3a | 92 dc d7 50 b6 03 1d 9b e5 26 b1 a0 fd e5 86 9c | c1 bb a9 1d c8 aa e0 66 62 a8 ef d5 a3 e5 1c aa | 48 a0 13 72 a6 76 d4 63 de 8e 77 d1 a4 a1 70 1a | 05 7e fd e9 46 8f d7 69 9c 5d 01 6a 23 bf d1 7c | 60 fe 3b 08 36 7c 46 56 5e fa 3e 87 6e f8 5c e5 | 62 26 d2 09 02 d7 a8 88 f2 80 8a 7b d3 24 87 ec | 98 c6 06 44 cf 2e 14 1f 9a 9e 11 3b 15 35 10 67 | 80 78 af 3c 90 b3 be 54 94 f8 6c d9 36 9d 34 3f | b2 ee 4f 6f 8b cb 03 13 29 6b 61 bf aa 20 b1 02 | 64 9a 46 8c 58 45 74 b6 a7 9c 3f 9f 19 1b d5 f4 | 29 00 00 24 ae 3f 5f 22 5a fe fe 91 94 31 fc a8 | 30 c0 4a f7 3c 57 3c 0d ed a5 29 f2 71 dc 56 3a | ed 9c a9 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 89 ab ab 1d cc d7 b6 cb 29 1c 48 | e7 84 01 ce 34 15 c4 5f 00 00 00 1c 00 00 40 05 | 7f 71 39 3d 41 d0 36 ee b9 ed 2b b5 28 d2 9e d8 | 0a 4d 91 1e | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #499 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 9c 2c 36 f8 59 d4 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #499 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #499 | rejected packet: | c7 9c 2c 36 f8 59 d4 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #499: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360012bf0 | handling event EVENT_RETRANSMIT for parent state #420 | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #420 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #420 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49693.418131; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005207 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #420 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 "road-eastnet-nonat-168" #420: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #420) | 38 01 94 6e be 3a 28 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c e6 6f 10 c2 18 44 e2 34 88 94 b1 6e ad 96 2f | 7e f2 2f d5 05 74 10 9d b0 ed 16 ba d1 bb 6a 81 | 3b 36 bb 33 64 6a 4b 49 98 6b 61 6b 38 a7 f0 f9 | 85 f1 ea 1f 82 7f 75 2e b8 87 48 fb ca 42 ad 54 | 59 d3 d4 98 fc e3 db 9e 06 1c 4d 0a 68 e2 82 b1 | b4 79 61 9d ef 49 6d 74 7e f5 a5 55 9d ac 1f 86 | bc 38 61 c3 ec 65 14 03 d9 05 f4 3a a0 cf b9 81 | ea f9 8e 26 2a 33 57 de f0 0c 7b 3a 31 62 59 7d | 0a 51 80 e9 b3 45 96 f0 0f c4 ba 78 af bf d6 5a | 60 67 ef 7e 3d 35 d6 cc 9c c8 4a 58 b2 0f d6 d7 | a4 37 58 a2 99 5b 23 f1 45 8d 6c d3 30 bc 9f 64 | 97 c5 ef 20 d5 b9 a3 78 d6 da 52 f2 da 0c 22 0a | a7 af 15 bc c7 88 8c 82 a8 a3 ee 2f 8a ad 53 b2 | a0 1b 8a 3b ba 0a 34 48 34 2f ad da 72 63 db 61 | 9e b4 c4 95 69 50 db f5 62 4c 82 15 0a a2 7d 3d | 5b 37 5a 63 75 a1 9d 88 2f 4d 72 7d 91 14 f6 58 | 29 00 00 24 a2 fc 3c 40 ce 99 e3 62 f3 97 ac 0a | d5 d9 6a e9 cb 20 69 0b 55 a4 ef ef 10 02 28 ef | bc 3f 93 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 0a f7 67 8f e9 41 30 08 68 43 0c | 01 13 f9 c1 61 fa 63 aa 00 00 00 1c 00 00 40 05 | ef 1c 5b ca 2a 2f ea 7b fb 12 61 31 e7 f2 9d c7 | 67 58 3e 74 | libevent_free: release ptr-libevent@0x7fb37003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360012bf0 | #420 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 01 94 6e be 3a 28 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #420 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #420 | rejected packet: | 38 01 94 6e be 3a 28 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #420: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338018460 | handling event EVENT_RETRANSMIT for parent state #500 | start processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #500 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #500 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49693.485406; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.00414 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360012bf0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #500 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 "road-eastnet-nonat-248" #500: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #500) | dc 38 e1 a3 3b e2 b1 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 4a f1 97 41 66 ce d4 ab 90 74 77 4f 00 cb 43 | 1f 3a 29 28 bd ab f1 45 3f 88 a4 79 39 fe 2c ee | 1b e9 2e 5c de da 76 bf a3 0c cc 93 b6 1b 8c 68 | 84 10 8f 55 6f 47 ec 76 41 18 0c b4 50 73 cf e8 | 55 11 98 5d d0 8c 2d e1 b9 47 bc d9 dd 4c 8a 72 | 7c cf 3b 3b b2 57 cf 3d e0 1d d4 39 94 72 a1 23 | 6b 6c 49 1f b9 94 b3 b7 a4 33 d9 35 1a 97 76 7e | 8f eb c4 34 d7 30 b6 ff 0b a0 77 62 d6 0a a9 b7 | 60 e4 b0 4d 0f 38 4b ae 9a ce 16 98 d0 34 95 01 | 44 fe 57 be 26 cf f9 d3 b8 79 e7 d6 d9 c0 2e 7d | 90 21 6f 7d c3 bc 04 f3 80 08 f6 e6 0b 6f 05 a0 | f8 da 5b cf d5 f7 d1 f1 f5 c0 29 8b c4 a2 cc 29 | 8c e2 9a 9c 8f bf ae c2 b0 3f ce e4 df fb 71 f5 | f7 13 31 70 b5 0f b2 9e ae 64 eb 2c 73 aa d9 5b | 7a b9 c4 3b 46 10 f6 92 a7 5e 0d a0 e7 06 8a 74 | 5e 40 71 07 4b d8 c5 08 71 52 bd 30 01 84 10 98 | 29 00 00 24 73 e7 fd d9 0c 07 09 ec 59 bd 7a b5 | 40 29 3e 5b f2 d3 e1 ea 7b 04 b1 b4 b1 5f 03 d2 | b4 24 ec 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 f6 20 af 00 f8 ef 66 b3 21 e2 19 | 0f ba fb 8a ed c9 14 86 00 00 00 1c 00 00 40 05 | 70 63 55 d1 ed 70 f9 1a 8c 9d 5a 9a f7 cc 31 61 | 9c 9b 74 c0 | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338018460 | #500 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 38 e1 a3 3b e2 b1 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #500 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #500 | rejected packet: | dc 38 e1 a3 3b e2 b1 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #500: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acc140 | handling event EVENT_RETRANSMIT for parent state #421 | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #421 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #421 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49693.489709; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005473 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338018460 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #421 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-169" #421: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #421) | 53 46 78 d0 f9 b4 2b ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 1e 13 6f 9e 9e 28 7d 48 cb 8f 21 ad 12 23 0d | 2e 17 4b ec 60 47 24 f9 49 65 0f b8 05 f3 b2 c5 | 35 0c dd 44 2a 04 47 c6 96 e8 e3 9d da 44 54 8d | d0 16 cf 7d 24 e8 e0 cd a8 2c 8e 39 d3 b2 8b 7f | 72 0a 52 da e9 14 4a cc 17 a9 78 b8 cd 5e be 1d | b9 b5 cd 7b b6 5f 02 22 ea c4 0a a6 8f a3 01 6c | 5b 53 24 36 89 d6 72 ef 99 b2 12 aa fb cb aa db | b2 d1 08 23 c1 6a e2 dd cd 0b 52 1b 08 f4 07 44 | f6 bb f7 14 71 89 1d 05 a9 2e 9d 11 f6 47 e7 7b | 5c 89 c0 6a 79 44 41 55 07 e9 d4 c5 65 08 95 21 | 02 27 ea de 7e 8f c1 e5 b3 56 d5 44 30 34 c9 29 | 25 c6 6c f5 76 8d bd 58 fa 4e 08 93 a9 a8 12 bd | 8c 61 44 c0 18 3b 6c f3 4a 89 60 c3 7a 98 37 61 | d4 a6 d5 c6 6d e0 61 22 11 f5 b2 91 df 3b aa 2c | 62 52 60 02 03 f1 56 8c f6 e3 d9 1e 59 30 5a b8 | cf c5 38 a8 40 43 1f 7b 8b 5b 7c d9 77 f7 d9 ba | 29 00 00 24 41 49 08 f2 3f 7f 22 d1 7a a9 25 e2 | 15 a5 3d 37 9b e8 6b f7 56 6b 10 73 05 1d f4 b0 | b9 8c f9 c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 d0 78 7d 22 f6 6d e2 e5 b7 d3 9b | 09 f6 2a 83 8c 96 39 01 00 00 00 1c 00 00 40 05 | 72 19 84 dc d4 59 5b 35 51 4f b6 9f 34 c6 2f ea | b9 aa 04 8a | libevent_free: release ptr-libevent@0x7fb3440300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acc140 | #421 spent 0.0963 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 46 78 d0 f9 b4 2b ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #421 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #421 | rejected packet: | 53 46 78 d0 f9 b4 2b ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #421: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0409 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35400d120 | handling event EVENT_RETRANSMIT for parent state #422 | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #422 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #422 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49693.558008; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00592 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acc140 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #422 | libevent_malloc: new ptr-libevent@0x7fb3440300e0 size 128 "road-eastnet-nonat-170" #422: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #422) | b8 e0 2b 96 c7 45 5a 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 6c 40 a5 03 bc 57 72 c1 66 d6 ac 89 5b f4 c1 | d0 36 2b 40 f8 23 54 39 34 b5 82 a2 ec a9 be f0 | 9e 2a fb a5 33 fb bf 78 6a 65 ee e2 5e 78 b2 97 | 57 06 96 a7 85 bc b5 2f 57 ad dd 92 ec d4 39 15 | 9d 72 7c 3a f0 31 6f b3 e0 1f fa e2 bb 36 ae ad | 14 69 bc c7 2b b8 d3 5c 99 5b e0 8a c5 e8 54 ff | a1 c6 b4 be 7e 54 b5 cb 08 e2 27 e4 e9 7a 16 60 | ce 85 f4 97 da 4f 4d 09 2e 8c 52 19 57 93 83 db | 87 b1 16 b3 51 00 56 5d 37 6d b9 b3 a2 bd 99 3b | aa 47 42 33 bb 18 39 df 45 15 55 a1 5a 1e 8d 44 | 65 5b 06 c8 ce 40 9d 80 8b 2e ca 26 d1 79 fd 78 | 43 19 a6 31 62 db c5 b6 b4 99 3e 3d 0f 92 3a 22 | 67 54 41 d3 95 c5 98 ed 1d fc 1c 5c cc 1c ff 1e | 72 31 d9 fd 8f 7a 3f e9 62 8e 84 af f0 f7 f0 8d | 9b 73 d6 fc ff bc e5 4a d7 b9 1b 80 22 88 c1 56 | e0 bb 60 af 81 19 d7 73 ec 24 2d 0b 96 d4 fa 10 | 29 00 00 24 2b c3 8d 3d 91 5a 53 1a b5 f4 6d b1 | 02 bf f8 18 e1 84 d7 9f a5 0d 77 07 91 b8 4d 3f | 04 89 f2 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 85 d2 75 8f 47 7e 81 98 63 03 9f | 1d 8c c0 94 92 93 75 cc 00 00 00 1c 00 00 40 05 | 2a 28 b7 7f 38 5f e0 65 f6 1d 4d c9 d5 6f ea f1 | c9 85 fb 5d | libevent_free: release ptr-libevent@0x7fb354012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400d120 | #422 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 e0 2b 96 c7 45 5a 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #422 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #422 | rejected packet: | b8 e0 2b 96 c7 45 5a 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #422: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0459 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c012630 | handling event EVENT_RETRANSMIT for parent state #501 | start processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #501 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #501 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49693.573295; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004462 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #501 | libevent_malloc: new ptr-libevent@0x7fb354012840 size 128 "road-eastnet-nonat-249" #501: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #501) | 7a bb eb ab 59 82 f5 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 e6 e7 b7 df 15 1a 88 da d9 de 99 20 d1 37 56 | a1 ac 1e 3f d7 4a 79 5c c8 d1 9e 85 c4 f1 dc d8 | f1 ca b4 9f 14 60 92 de ad 42 9b 69 57 eb d4 33 | 23 a5 0d 4e 25 37 79 9e 75 f6 18 19 e2 36 6a 82 | 3e c6 41 e8 fb 1d 27 30 85 3c c4 c4 37 ed 39 57 | 59 68 3d d5 92 7b 15 e0 1d da a4 bf 8a 13 2e 99 | fa b3 d7 34 a7 e9 ee 45 93 41 ea 47 57 78 a8 c7 | 28 3e 80 cf 3a fa c3 5c 40 7e 2d 6e a8 8f 1a 76 | 9f e3 ee 0a 5c 09 b9 35 7b e1 73 9e 9a 5b 7e 05 | af 57 ba 41 a4 20 67 9b 93 00 a4 77 65 8b 72 e8 | ca c2 a7 8c f8 bc 75 a9 2f 52 c5 be ea 41 46 90 | 6a 2e 17 cc 87 cc 0a 22 0b d8 b5 c8 dd ab 30 09 | 90 3a 1d 65 9d 2f 73 fc c6 06 30 d8 66 83 64 c8 | a7 e5 c1 23 61 62 8a 18 87 ad dc 7f 74 de 65 20 | fb ed bb 7b ca 02 66 e1 c0 5c b2 b3 41 14 ad 3d | 9e 02 fd e0 c6 5b ba ef b1 16 d3 d4 8f 92 d4 90 | 29 00 00 24 0f d0 3c c8 9f 70 8e 25 2a 4f 78 c0 | 1d 68 16 9a 4a bb 3c a4 19 fe 19 3a d7 7c 1c 89 | 23 2f 21 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 3b be 6c 39 30 3e f5 fc f3 31 c5 | 53 ef 34 5b ca c1 eb 03 00 00 00 1c 00 00 40 05 | 86 82 cd 41 4f 66 70 19 76 ed 27 dd 0a 04 2f 6d | e6 1d 3e b6 | libevent_free: release ptr-libevent@0x7fb36c04b970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012630 | #501 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a bb eb ab 59 82 f5 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #501 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #501 | rejected packet: | 7a bb eb ab 59 82 f5 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #501: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354012bf0 | handling event EVENT_RETRANSMIT for parent state #423 | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #423 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #423 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49693.627596; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005577 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012630 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #423 | libevent_malloc: new ptr-libevent@0x7fb36c04b970 size 128 "road-eastnet-nonat-171" #423: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #423) | 0d af b2 c4 93 36 1d aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 70 3e db fb be 8b b3 fd 73 c0 a9 96 0b 3d a8 | e8 36 31 e7 9c ec 5a 7d ff 70 f6 37 85 23 83 66 | b2 fa b4 b8 d5 45 16 aa a6 25 06 9f 8e 8e bf 87 | eb 95 12 b7 4e e4 06 f4 d1 f8 40 ef 32 40 e6 a6 | 6e f4 f8 67 e1 5b 90 26 e6 0e 43 21 0c 13 d6 b5 | 8e c1 48 f1 b8 e8 39 77 8f 82 36 7b 93 75 c8 ab | 84 91 17 9b a4 7d 3c 17 79 cf 26 b4 a0 3c f6 3b | 8a 9e f2 22 e0 37 3d 4a 22 71 37 fa af 63 94 e0 | 5d cb 53 25 8c 9f 3c aa f6 38 ac 60 e7 b7 a3 49 | 84 5c ea cd 1a 4a 52 75 d6 46 93 25 09 85 d1 82 | dd 53 68 4b de 95 3f 19 ff d3 86 0a c0 38 25 ae | 80 9b b3 ed 25 0e b6 ad 72 55 3f 58 28 54 96 74 | 26 60 4c 26 05 26 c2 53 24 50 7e 5b 35 6b ca a1 | e8 d8 01 f8 35 32 32 e5 07 d9 c6 ca 24 0c 96 3a | 31 97 ac ed 1f 95 1e 6e 00 fc 4a 03 2a 9c 00 a0 | bd e4 04 9f 5c 17 08 9c 92 06 6e 29 32 98 a2 91 | 29 00 00 24 ce f0 94 25 9a 41 87 5c 3e 7f f2 93 | 02 a0 d4 6b b2 dd 60 48 d2 68 61 fc a3 c4 4b 4a | b6 d0 3f b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 fb df b4 aa 7f 08 b4 87 40 7c 29 | 54 a9 d0 e2 e4 44 95 43 00 00 00 1c 00 00 40 05 | b2 9a 73 50 a7 57 97 7d 3b 57 52 b7 42 61 08 84 | 33 0c bd 82 | libevent_free: release ptr-libevent@0x7fb36401a420 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354012bf0 | #423 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d af b2 c4 93 36 1d aa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #423 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #423 | rejected packet: | 0d af b2 c4 93 36 1d aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #423: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac3ec0 | handling event EVENT_RETRANSMIT for parent state #502 | start processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #502 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #502 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49693.673879; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.005862 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354012bf0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #502 | libevent_malloc: new ptr-libevent@0x7fb36401a420 size 128 "road-eastnet-nonat-250" #502: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #502) | 49 84 03 55 33 41 14 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 b6 56 c0 55 c6 5a b3 d0 b1 3a cd 2c 2d f1 98 | 2b 05 72 d6 2a eb f1 a5 ce 1a 6e fe 9b 76 4a e6 | c8 9d 68 cf 67 24 b2 a5 b6 c1 96 48 84 37 b3 8b | f1 39 9c c4 10 9d db 1a 8e 7f b3 36 f3 a8 eb bd | 2b 28 0c da ff 40 e9 6b c2 33 b1 41 cc 82 3c 97 | 2f 0e a7 48 25 26 c1 d7 53 0e 21 ee 94 d4 a0 38 | 49 e2 15 f5 13 68 e2 8a cb ba 80 6b ce a6 00 d2 | 69 7e 9f 04 65 f3 ae 81 71 49 2a 5f 8f ee 09 49 | e3 ff 1b cd 41 64 ae 29 01 91 5e 32 c3 26 78 8f | ea 20 2b 0f 18 2d 0a 1f 22 af 98 ef 92 ff 6a 84 | 62 82 19 1c 56 bf 8b 8e 12 15 12 c1 19 da 4c cd | 49 b3 95 88 b6 66 33 d3 36 cf f2 bd 45 7d 72 a1 | 21 21 16 69 39 89 66 de 9b 3d 56 7f ea f5 ce 47 | 7a 2e 75 2e cf 9b 6b 32 55 e0 ae 5b c0 56 2e 7e | b8 fa 3a ca aa 83 6d 0a b9 cf d2 e5 75 34 ef 7c | fd ec 25 52 b8 3d 7b b9 f7 15 a6 0a 76 51 86 5e | 29 00 00 24 9b c1 28 9f 3d 89 a9 b6 3e c7 19 65 | 88 8e 41 03 11 21 a9 0f 26 57 6b e7 b4 25 21 32 | 2d ba 55 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f d1 0c 18 0e bf a2 52 1e 5c d3 e7 | df 48 7e 58 7f 45 57 fd 00 00 00 1c 00 00 40 05 | c9 7e 47 3a 28 a9 19 bc aa dc fd 65 a2 d8 10 d7 | 15 14 41 45 | libevent_free: release ptr-libevent@0x7fb384027b30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | #502 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 84 03 55 33 41 14 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #502 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #502 | rejected packet: | 49 84 03 55 33 41 14 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #502: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc00 | handling event EVENT_RETRANSMIT for parent state #424 | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #424 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #424 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49693.697246; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005787 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #424 | libevent_malloc: new ptr-libevent@0x7fb384027b30 size 128 "road-eastnet-nonat-172" #424: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #424) | e5 61 ef 5f 7f e3 58 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c da e9 09 30 1c 29 bb e6 91 cb 4e 69 4d ec 03 | b5 f9 29 7a 23 48 20 ed f7 47 c2 fe 06 e6 43 d7 | dd db db 34 94 8c 85 3b 55 9b f4 3a 74 ed 7a a1 | b8 84 40 94 dc 5c ed 16 d0 73 2d 49 36 0b 9a 1d | 7a 62 45 16 8d 9c 63 79 31 b8 8c 83 f1 0e b1 7f | 67 fe bc d6 57 49 2e 4d c3 49 48 a7 55 5f ff d0 | 14 68 fc 6f 72 30 bd 46 7b 9a 8c f4 dc c7 37 1c | e4 a4 8f 19 bc e7 61 cc 6b 11 48 dd 4e 4a 37 e3 | ee aa ab b1 b2 36 8e 89 eb 7e b7 77 69 a0 09 80 | 3c 6b fc 75 71 9a f3 bd 94 2c c9 c7 7f d3 9b 98 | 01 34 f8 57 09 1c 44 77 27 2b 95 8b 42 b2 1e 03 | d7 04 87 d9 03 b3 37 7c 1d b7 57 41 2d 16 5a a8 | dc c5 ad 48 e5 82 26 97 54 fe f5 c0 fe b9 29 58 | 35 ce 2a 1a 65 c3 c1 3a f9 04 5b 80 08 58 bc a4 | 5f 74 90 a2 3e 82 ee a6 80 5f 67 41 cd ba a6 4f | 66 85 f6 7c 29 e8 a5 11 0e c2 6f 44 c1 41 6a eb | 29 00 00 24 7c 1f b6 fc f1 5f 8d 51 2e 05 d2 13 | e2 d8 d5 f5 0f 0a 46 07 58 f7 ec 9e c5 1c 22 09 | 2c cd 2f ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 d1 0c 8f d2 91 2d a0 36 f1 93 d6 | bd 3f 30 ca a6 e2 8d 8a 00 00 00 1c 00 00 40 05 | 48 c0 59 12 12 13 1e e0 ba de 8c 06 ba c3 58 23 | f1 28 ea 8c | libevent_free: release ptr-libevent@0x7fb37c01a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc00 | #424 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 61 ef 5f 7f e3 58 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #424 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #424 | rejected packet: | e5 61 ef 5f 7f e3 58 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #424: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0614 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #425 | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #425 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #425 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49693.759686; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005836 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc00 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #425 | libevent_malloc: new ptr-libevent@0x7fb37c01a4e0 size 128 "road-eastnet-nonat-173" #425: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #425) | f7 cf 50 4a 74 06 05 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 92 89 d6 89 4e 50 5f b7 2f 6b 96 d5 81 21 07 | ab 44 17 58 90 1d 7b 64 81 e9 17 d7 bd fe aa 4b | 0a 10 ad 93 a3 c3 87 5f f5 66 29 fb c9 3a c9 b1 | 31 b0 a9 ee c4 90 84 b7 e6 dd 91 e8 75 48 e7 2e | 93 2f d6 a2 f7 4b f6 49 3f d9 f6 d0 5a d6 d1 dd | 4f 9d c2 ed c5 18 e2 07 13 e3 28 e5 ef cc 0a 8a | 3b 35 e0 3e 37 bc 79 9f 2a 04 4a f3 9c f9 c1 fe | 06 93 6a fc 31 07 8c 82 e2 3d 36 5b 4c 64 57 29 | 42 03 5c 40 11 83 46 58 6b 89 40 fb 97 9c 72 d8 | 16 d1 a0 21 3d 63 55 3f 12 ce 3e bc a1 a4 b1 4f | 21 3c 91 be 83 c8 57 a7 2b 28 e1 48 64 02 57 7e | 42 a3 f1 45 48 e1 db 05 2e fb d4 4c 7c 8a 0a 60 | 5f f4 86 80 46 9a e0 d0 18 11 1a 4d bb 7c 02 87 | bf 2e e0 bb 87 e9 5f b8 47 04 4d f1 27 cf b3 29 | 9c 1a d0 ad 05 bc 03 0c 16 0c 3a 7e 72 1b 12 70 | b9 a4 26 8b 78 5c b2 39 ba 99 5c 08 5d fd 0b bd | 29 00 00 24 5f 48 0d c0 35 2d 82 0c 4e 37 c0 2d | fb 4b f1 c7 3e 7f d8 da d2 4b 1d 20 b9 ad b0 f8 | d9 af 0c f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 91 c4 e4 6c ee a0 d8 c3 62 ab 89 | a1 7e a7 1c b9 03 c3 d0 00 00 00 1c 00 00 40 05 | 62 01 4a 70 10 9c f9 53 26 65 4b 23 2c 02 6b 53 | 25 3b 71 4a | libevent_free: release ptr-libevent@0x7fb33803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #425 spent 0.21 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 cf 50 4a 74 06 05 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #425 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #425 | rejected packet: | f7 cf 50 4a 74 06 05 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #425: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0645 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388015720 | handling event EVENT_RETRANSMIT for parent state #503 | start processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #503 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #503 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49693.784057; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.004881 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #503 | libevent_malloc: new ptr-libevent@0x7fb33803b0b0 size 128 "road-eastnet-nonat-251" #503: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #503) | de 1d 8d 29 e2 13 e9 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 bc c5 bc ee 45 af a6 73 6a 90 e4 26 1b 45 74 | 00 ed f2 a3 ec 74 88 4b c9 51 b5 6a 38 9f 0a f7 | 89 96 66 a1 cb 3b 36 71 3c 50 00 7f a8 a1 27 84 | 14 72 85 f0 e9 87 92 95 57 d6 bb a3 9e eb a3 89 | 3b d6 9d 72 8e 22 b1 43 7b 48 2b 91 a9 6c a2 71 | 4e b7 05 32 94 32 e3 1e 78 6c 29 24 39 3f 29 25 | a5 fc 7d 8a 16 8c 7f 3c 9e 88 a1 a2 0f e7 3d e7 | a6 2a 71 17 3f ba 2d 1e 73 4a af 59 81 2a 33 e7 | 7c 6b a5 a6 c7 0d 60 09 fe 4a 3a c4 ae f0 db 28 | 63 c7 99 7d c2 1a 2a f5 ca 34 59 14 08 64 3e 0e | 9e 8a 9a 95 bb 9d 48 ef fa 38 ec e3 2c 15 34 9c | e9 d6 59 e6 ff 43 a4 b1 2b ff 91 b3 04 3b c1 be | 1e 15 0a dc 58 8d 95 f6 06 1e 22 79 23 6e 88 9c | fb 5f 8d 89 36 69 ab a3 c4 17 6b e8 27 27 43 a0 | 64 a3 07 0b 2b f0 22 81 09 20 24 c8 81 c7 b3 70 | 64 46 cf dc 25 f9 42 3b 6e b0 ff 34 aa 9a 20 98 | 29 00 00 24 e0 7e ea 52 c4 af 5e ed 64 d4 0d e7 | b4 32 8f da 7f e4 cd 7f 6e 0d 4f bd 11 1c 8f fe | 10 1a 14 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 eb 39 3d 04 da 34 34 c4 55 20 7b | 97 62 11 e4 f5 1f 2c 3d 00 00 00 1c 00 00 40 05 | 56 4f 2a b1 95 be 94 04 9d 7b d6 c2 f3 45 b1 7e | d7 05 c2 82 | libevent_free: release ptr-libevent@0x7fb3600407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388015720 | #503 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 1d 8d 29 e2 13 e9 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #503 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #503 | rejected packet: | de 1d 8d 29 e2 13 e9 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #503: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #426 | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #426 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #426 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49693.830389; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005572 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388015720 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #426 | libevent_malloc: new ptr-libevent@0x7fb3600407f0 size 128 "road-eastnet-nonat-174" #426: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #426) | 9a cd 73 8e 7d d4 98 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 8c 97 9a 7b 25 95 00 9a 77 62 32 ef ca 9f d6 | 76 8f c1 1d 7b f7 f1 fd 6f 49 39 37 2f 63 23 81 | 71 66 7a 84 28 0c 71 94 62 69 ce 59 2d d7 c5 69 | 55 1a 91 d5 7e 6b 73 77 b1 63 3d e2 98 99 4c 7d | 88 69 a7 7b 5e bc cc b8 0e b3 73 c2 2e 32 ae 8e | 86 79 03 81 0b 4c 54 b4 73 a6 e2 6e 97 ca 67 d3 | 85 98 35 01 61 ca 66 d6 14 1b 0e ed 3a 29 6c 85 | ba 28 d6 d7 db e6 44 77 a6 ce 5b 46 99 7c a1 df | 78 8d f1 17 d8 0f f9 ea 99 30 fc e2 cf b2 41 e0 | b2 47 0b 49 32 f7 03 99 56 d9 28 c3 7a 54 f6 02 | 19 cd 98 7b 73 22 d4 cd 39 3f 7a 0d d8 d7 cd a6 | 8a 6b 30 16 cd 73 f2 96 6c 21 9f bd 4e e5 1b e4 | 55 08 4d 75 fb 1c cb 36 33 b5 70 97 3d ae 1c 0b | fd 17 d6 8a db a7 4c eb 93 47 b3 25 b1 c8 9d b9 | 3c fc 99 0e e7 eb 29 07 c1 90 16 1e 24 76 3c e1 | f0 b6 2f 6d 76 8c 81 1b 13 f1 8a 90 f5 6f 06 29 | 29 00 00 24 9e 79 2e b7 2a 97 cc 4e 5e 3a 53 a1 | 14 f4 9d f2 e0 f1 3a 21 7a b3 38 2d 77 ac 99 ad | 8b c3 54 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 36 a3 f8 78 1e 60 6d 59 1a 44 b3 | 39 63 64 a7 a1 bd a5 d0 00 00 00 1c 00 00 40 05 | 8b d1 e6 ab 49 4a f3 b9 19 1d c0 80 f7 d0 cb 97 | 3f 74 7f 21 | libevent_free: release ptr-libevent@0x7fb36804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #426 spent 0.138 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a cd 73 8e 7d d4 98 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #426 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #426 | rejected packet: | 9a cd 73 8e 7d d4 98 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #426: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3400296b0 | handling event EVENT_RETRANSMIT for parent state #427 | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #427 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #427 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49693.90677; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004977 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #427 | libevent_malloc: new ptr-libevent@0x7fb36804b850 size 128 "road-eastnet-nonat-175" #427: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #427) | 4d cf ce dc 5e 69 0c 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be f3 80 6d a1 4d bc 3b 63 de fe 7b 5d 35 aa 05 | b1 28 d6 19 4f ca c2 b6 85 f2 21 b1 5f ee 7d c3 | e5 4d ce d8 a2 87 47 56 c6 32 a1 9b 66 32 11 d6 | 2a 42 af 5d 8f 34 c5 d5 6c 06 20 9f 03 7a dd 4b | 48 34 c3 3a 83 64 cc cf 03 38 0f 85 e3 77 24 47 | d5 16 ac 4d 8b 47 b5 03 3d 95 eb ea 92 b9 cf 0a | 68 66 89 9f e9 d7 ae 03 3d 64 75 ac c9 d5 b3 10 | de 8f 17 7b 40 ef 37 ec 93 3c cd 2d 80 d3 81 0e | 06 7b 23 ba 8b 61 0c f3 0a da 72 5d 9c fe 2a 86 | bd e9 e7 fc 88 d7 20 01 3d 62 9b 97 2d 52 60 5a | fa 1e fb 14 48 2b da dc c9 bc 30 8f d1 65 96 cb | 33 cf 05 cd 5e fb 63 36 4b e6 22 41 78 36 97 51 | 7d 03 25 93 d8 95 93 1e 55 d3 a5 af 94 2f 9c 8c | 5f a3 40 23 47 68 5e 3a 9d 49 f6 a2 e8 96 cd ae | 14 48 e0 e0 ab cb ce 26 3e 2f 37 d7 ae b6 aa 01 | 36 16 4f df 45 31 cb 1a 1c 34 5e a5 cc 5a a8 48 | 29 00 00 24 fd 8d 8b b7 46 89 9a fa b3 ab b5 e9 | cc f2 e8 c2 d2 52 f8 a0 49 af 7a 94 c3 9c de 32 | b7 d8 84 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9a c6 fd c2 96 5c 57 4c be 19 76 6e | d6 a6 82 da 0b ee 49 1a 00 00 00 1c 00 00 40 05 | 12 be 5a 47 ba 89 37 fe 5c 7b 97 4a 79 4a eb 43 | ad 50 1a 96 | libevent_free: release ptr-libevent@0x7fb340039ba0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3400296b0 | #427 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d cf ce dc 5e 69 0c 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #427 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #427 | rejected packet: | 4d cf ce dc 5e 69 0c 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #427: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0d4c0 | handling event EVENT_RETRANSMIT for parent state #504 | start processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #504 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #504 keying attempt 2 of 0; retransmit 5 | retransmits: current time 49693.919047; retransmit count 4 exceeds limit? NO; deltatime 8 exceeds limit? NO; monotime 8.006461 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3400296b0 | inserting event EVENT_RETRANSMIT, timeout in 8 seconds for #504 | libevent_malloc: new ptr-libevent@0x7fb340039ba0 size 128 "road-eastnet-nonat-252" #504: STATE_PARENT_I1: retransmission; will wait 8 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #504) | da 55 48 8d 90 bf 21 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ac 2a 4d 0b 8b cf db e8 71 42 c9 12 73 26 89 36 | f8 7e cd c8 1c 11 8c 7f 9e 09 ce 55 92 dd 78 d1 | ad 59 d2 ee 94 4b 61 50 a3 e8 9a 12 3c 5e 9b 79 | 67 a9 ab b1 17 c4 72 5d 57 f0 6b d6 9d c6 6d f9 | 38 2a f7 f8 e2 f3 15 e5 73 fa 8b 4d 1c fc cc ab | b7 f0 3b 90 c7 95 ba 20 f3 82 29 0e d5 86 2e 2f | d3 3d 1a 6e 6e 68 d3 8e 2c 1e 30 d3 3d 1a 4b 7f | 07 51 04 a3 cd e1 e4 f3 6b 81 ac 0e 5e 25 fc a6 | 2d 49 a3 1d 9d 7f 10 1c b8 aa 6d 0b 48 63 e7 ab | 47 28 bd cd 66 43 28 3d 25 f6 20 56 e0 bb 73 1a | f5 3a ee c2 95 1c 1f 57 8f 41 e9 d9 d4 e4 b4 be | f5 98 c0 78 1e 91 5d ba 02 2c 3a cf 04 e6 44 c6 | a4 f1 83 88 9a 45 b6 e7 89 2b 45 be 54 48 e8 52 | 9b 95 05 7a d4 dd af 6d 96 db 42 ed db 5d 0c bc | 83 61 0a c3 fd 33 2c bd cf 88 1b 95 c9 43 7a fa | 73 7b 7d 2e f9 6a 53 94 78 2b 4f 21 f2 f3 1d f2 | 29 00 00 24 61 bd 30 86 3d bb 50 44 5f 1b 26 2e | 52 63 1b fa b0 23 2c cb bf bc 70 41 cc 6b 00 dd | 9d aa 60 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd b5 bb a3 b0 15 ca 04 17 91 f9 55 | 5a 59 4c 3b fd 4e 4a c4 00 00 00 1c 00 00 40 05 | 47 4d 62 c8 1d 9c 5d 27 1b 5d ed df fb db c8 62 | de eb 87 79 | libevent_free: release ptr-libevent@0x7fb34803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | #504 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 55 48 8d 90 bf 21 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #504 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #504 | rejected packet: | da 55 48 8d 90 bf 21 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #504: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0457 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35804b810 | handling event EVENT_RETRANSMIT for parent state #428 | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #428 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #428 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49693.979335; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004622 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #428 | libevent_malloc: new ptr-libevent@0x7fb34803b0b0 size 128 "road-eastnet-nonat-176" #428: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #428) | fb 15 42 71 fe 24 9a a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 50 d4 99 e3 c3 b2 8d 50 f4 55 ae 47 3b 25 61 | 1e c4 05 b1 59 21 46 35 0e 81 55 dd de 7f 65 40 | 00 1a 4e c9 0d 72 6a 7a 8e 31 f2 b8 05 87 95 5f | 92 19 3b d0 26 f7 ef a7 b3 37 5f 37 15 e9 34 12 | 33 cb bc 05 19 62 04 88 c4 b0 11 3c a2 fc 2e a7 | 48 74 27 c5 24 6a b1 84 34 89 1c 11 73 e4 fb e9 | 1b 3e 80 7d 33 32 51 1f 3d 67 11 16 e4 23 05 bd | 3f 72 2d 38 c9 0b 38 c0 12 64 3a 43 5b e7 46 c1 | 2b 7e 29 d4 ef 37 71 a8 e0 71 19 2f a1 c5 6c 53 | 94 fe 4e 57 73 5c 74 b5 d5 7f cc e2 3d a3 30 0d | 02 5c 9d dc 4d a0 93 77 cd b6 58 cb 5c 89 fe a8 | 40 8a c4 11 16 43 cc f4 7d 6e ae 00 27 3a 7c 8c | 12 14 7e db be 5a 42 72 b9 d0 07 1b fd aa 82 51 | 0e fb 68 c6 88 b4 35 6c 93 af 50 1c ff 48 78 d4 | b7 b7 c9 3d bd cb b9 82 34 8d b6 5a ff e7 73 c1 | e0 88 1f 51 42 a1 76 7d 4c 3a 1b 39 03 d3 42 78 | 29 00 00 24 e8 4b ce 8e 1c b5 fd 76 2e 19 5c e4 | 1a 51 b2 57 c5 b9 7b 5b bc c1 c3 17 ad 08 ad 32 | c1 29 cf d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 5a 55 94 7a 84 e5 8b 58 e8 27 7a | 96 44 f5 8a 4c 99 6f 81 00 00 00 1c 00 00 40 05 | 54 c7 00 62 13 8f 45 35 f4 93 09 e0 a0 98 7d 08 | 6e 4a 7d e5 | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35804b810 | #428 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 15 42 71 fe 24 9a a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #428 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #428 | rejected packet: | fb 15 42 71 fe 24 9a a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #428: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47f10 | handling event EVENT_RETRANSMIT for parent state #429 | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #429 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #429 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49694.070716; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007047 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35804b810 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #429 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 "road-eastnet-nonat-177" #429: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #429) | b1 3d 9b 75 e9 17 32 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 58 34 a3 ec c6 75 50 25 fe 5f 41 58 c3 98 5a | 11 1f 83 e4 20 79 02 69 b1 3d ac 82 33 8f 44 96 | e7 d5 9d 7b f3 d7 f5 f1 3c 4b 07 77 e3 30 83 22 | 33 90 f7 d8 39 7d 51 da 1f be a3 9d 27 21 e0 23 | 1c c5 b5 f8 01 28 d0 3f bb de 17 8b 08 3e 77 12 | 3b 7e a1 ef 9e 6d 3b c1 0f 78 3f 7f d4 15 3e 67 | bd d8 07 2d 5c 0a f8 3b 6e 03 96 47 2a 3b ad 8d | fd ac a5 a9 41 55 69 70 54 4f c8 07 46 0f 75 8a | 8e 3a c9 5a 0e 6f 91 97 a2 53 99 02 54 c0 74 38 | 8d d6 59 17 7c b6 f5 96 24 2d 36 88 1b c1 a8 f4 | 9a 2c c6 20 9e 9c 1f 79 b7 b2 e2 28 6d c8 dc ea | ab 6f 81 8f 3c 54 99 e1 b5 ac 7a 7b e2 4b b7 47 | cc 01 c3 58 76 3a 5d 7a 87 5a 60 d6 14 71 21 77 | 7d 56 a9 78 8c 67 16 f3 5f ff 22 ed 4c 9c 08 f9 | b7 a6 81 b8 d7 76 0d 66 ab 45 4e 0c 98 69 dc 04 | 8b a0 74 65 f2 0e e3 59 97 ce 63 09 c5 83 7c 9c | 29 00 00 24 cb 81 79 39 c4 59 07 cd 3c 90 56 3e | 9d 57 79 9f 8d e6 58 24 f4 84 cf b6 0e b6 4d 54 | f8 24 7a fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 94 ea 1e 66 81 07 70 ab d6 5a a9 | c0 a7 0f 24 1b cb e7 a4 00 00 00 1c 00 00 40 05 | 17 95 c4 1b c0 e8 ee e6 7e 70 e4 b9 12 c2 c5 ed | 6f 00 57 73 | libevent_free: release ptr-libevent@0x7fb37c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47f10 | #429 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 3d 9b 75 e9 17 32 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #429 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #429 | rejected packet: | b1 3d 9b 75 e9 17 32 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #429: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344018460 | handling event EVENT_RETRANSMIT for parent state #430 | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #430 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #430 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49694.159061; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004723 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #430 | libevent_malloc: new ptr-libevent@0x7fb37c01d920 size 128 "road-eastnet-nonat-178" #430: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #430) | fd 31 ba 30 35 2e 2d c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 61 13 a5 cc e9 81 b6 86 fc 6b 16 f1 74 d1 d9 | 72 f7 e2 ba f7 11 d1 79 92 c8 3d 2f 28 42 00 4a | 78 0d 84 65 5e dc 17 2f ba 15 c9 f0 22 4d 0a 3b | 29 55 5d 3f ae dd 3d 32 e8 c3 46 a9 04 47 63 51 | 2f 80 77 91 5f 9c b1 19 0f 94 27 d5 5d fe 9c 81 | eb f7 f8 80 c0 5d c2 5a 33 1a 77 e9 05 ab d6 42 | 13 e3 2a 15 08 f1 ba d2 bf eb 3d 3d ce 2d cd 92 | 09 c3 9f 5e 21 7b 84 9b 7e ad 3a cb 5a e8 5e a4 | 33 a8 4d 41 b7 9c ef db 29 ac 76 73 88 b2 9f 61 | fa 8c 1c 07 e5 8d 13 2c 9f d7 a6 11 29 94 1a 21 | 41 e9 57 a1 8b f3 e6 b9 90 b9 b8 f3 a3 3b 4c 8f | 23 8e 08 2f 27 17 72 8c c0 e7 38 14 1f 4b aa 78 | e1 d2 e5 79 c4 be 0b 93 9e 0c 21 6c d4 2a fe 21 | c7 8e 29 af b0 03 63 38 02 4d 95 ee 76 1a 81 af | a9 96 3e 2d 7b 5a 65 f4 b4 60 bb 2f a9 e9 18 59 | 66 94 d6 32 f1 9f 06 b1 1e 3d 20 4c 29 30 cd 34 | 29 00 00 24 72 14 4a 62 3b 2e 28 0b 02 9a 2b 55 | 37 9d 8e 84 fb c2 f7 70 ad cf 43 07 12 85 de c1 | 7c 78 30 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e0 6b 92 d2 7b 15 90 7f 21 2f b9 04 | b8 30 3c 8f c2 2d 01 6b 00 00 00 1c 00 00 40 05 | 4e cf 7c 8c 30 ae f3 1b a7 47 e4 11 ea a4 73 10 | 14 82 c2 9c | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344018460 | #430 spent 0.554 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 31 ba 30 35 2e 2d c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #430 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #430 | rejected packet: | fd 31 ba 30 35 2e 2d c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #430: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0741 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a82ac0 | handling event EVENT_RETRANSMIT for parent state #431 | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #431 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #431 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49694.237846; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00524 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344018460 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #431 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 "road-eastnet-nonat-179" #431: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #431) | 47 a9 f6 5d ab 90 59 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 61 b4 c7 cd e1 2c 04 0c 72 d6 80 6f c8 af 30 | 4d b0 b2 1e 8d 4f c3 2d f2 10 58 df a2 cf 51 79 | b1 79 c2 3f a7 35 e3 8e 8c e9 62 c2 7f 62 64 45 | 0a e4 6a 79 06 24 d8 93 a4 d7 88 f6 f8 67 56 ac | da f7 27 22 46 b5 f3 36 fc 59 b8 ef 46 c0 a0 39 | db 63 6d 41 32 18 a5 95 8d 7d ad 6f 27 26 ca df | ed d3 ee 53 fd 4c f5 cc 75 fc e3 f8 93 5a 96 cb | 92 9a 63 48 fa 88 0d 7b 6d 6b ed e6 9a a3 62 cc | f6 ca d1 cc 9a a4 27 97 4e 98 8a fa ec f7 10 73 | 1c 8b 1a f2 37 ea 26 ef 65 c4 24 b5 68 0e 71 36 | f1 1a b0 23 a4 4f b8 8f 75 d7 00 cd 7b 3c ae b6 | d6 4e 42 ae bd d1 a4 92 33 6b 9b 3f 93 ee 1b 13 | 12 06 ae 19 81 16 af 26 23 73 f8 46 07 4b f9 88 | 69 47 c6 fb 6b 2b 62 2c a3 d3 70 f4 52 77 08 a4 | 0e 48 7c ce 5d 87 5a c2 55 50 b0 8a 92 e5 1a 3c | 83 00 60 34 e5 f6 a0 b7 42 00 ef b1 62 a7 9d 6c | 29 00 00 24 71 9e 5f 53 a0 03 f4 e4 24 3a 58 53 | c3 05 4a 1c c7 b1 e2 bd 95 07 98 a5 4b 6a 2d 2f | 6b 11 45 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 46 73 c7 9b 2a a1 6f 39 66 d3 70 | f2 4b 98 95 84 ba e3 3f 00 00 00 1c 00 00 40 05 | 9a b5 4b 5a b1 14 b9 6a 89 15 79 d3 91 3a bb d6 | 0d 4a ca 70 | libevent_free: release ptr-libevent@0x7fb3780251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a82ac0 | #431 spent 0.0958 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 a9 f6 5d ab 90 59 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #431 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #431 | rejected packet: | 47 a9 f6 5d ab 90 59 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #431: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae0780 | handling event EVENT_RETRANSMIT for parent state #432 | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #432 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #432 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49694.324129; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006153 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a82ac0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #432 | libevent_malloc: new ptr-libevent@0x7fb3780251c0 size 128 "road-eastnet-nonat-180" #432: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #432) | 9e 5c f1 81 be b3 cc bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 a7 44 cc 56 0f 1f a1 57 e9 97 90 cf 04 1e 5b | e0 0e 7b 47 ef c0 b0 6b 28 ba 80 69 c9 1b 38 ab | 77 4e c9 e0 e5 8e ac 7e e2 16 87 36 5e 9c 78 7a | 88 e7 f8 df f3 43 04 06 de 41 bf fc 2c aa 5f 0d | 69 d9 8b 25 79 3a 55 bd c2 56 12 76 16 fc d9 a5 | 9c 10 c0 69 f3 49 ac 1b 12 69 8b 54 81 c5 66 b4 | ce 87 81 ab 4c 4a 3c be 13 a8 a6 c4 c4 ee d3 f3 | e4 6c 08 82 35 56 98 d0 52 0e 3c b5 9f cf 94 45 | b1 ff 7d 1f 92 70 cf 8e d1 c1 37 a6 37 65 ee ce | 20 a0 2f 74 83 20 8b e8 b7 59 69 69 3d 2e af d9 | 5c 5b c8 f5 d1 97 f9 58 4c 4b b5 5a 72 21 7a ff | 15 e2 cf de 63 20 f5 1b 33 44 6d 86 26 89 fe a9 | ef 26 23 fc 07 42 35 ac 53 4d 00 7f 36 93 50 78 | ef 61 a9 fd 99 64 73 27 a0 12 f0 71 a5 ef 01 e0 | f5 fa 65 6f 20 9b da c4 8d 30 72 f1 87 a2 6d e6 | e6 3b 2c 57 3c e1 2d 99 93 66 b2 b3 c7 c3 45 c6 | 29 00 00 24 97 c3 cd 2d d6 91 ce 3c 3a 10 07 b4 | 90 19 a9 e3 82 ea 52 87 8f 88 50 41 d4 a6 e1 e6 | 2e 3c 74 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b b0 51 e2 58 5c b1 15 1d eb ed 97 | 2a 88 5d 96 2e c9 a1 f8 00 00 00 1c 00 00 40 05 | 78 1a 23 ab e8 fa 74 f8 b4 b9 8c 5c d8 d3 f5 f5 | 1c a1 eb 5a | libevent_free: release ptr-libevent@0x7fb36004b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae0780 | #432 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e 5c f1 81 be b3 cc bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #432 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #432 | rejected packet: | 9e 5c f1 81 be b3 cc bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #432: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a86b80 | handling event EVENT_RETRANSMIT for parent state #433 | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #433 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #433 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49694.39443; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004117 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae0780 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #433 | libevent_malloc: new ptr-libevent@0x7fb36004b7c0 size 128 "road-eastnet-nonat-181" #433: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #433) | 23 e1 68 16 6a df f6 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 84 65 c0 62 66 6e cb 40 26 80 c7 11 7a b1 77 | 8f 7b 14 21 bf 47 61 54 80 80 4f 40 4b 14 8f 6c | 7f 20 33 7a 32 bd 20 39 a9 e7 e4 8c 88 5e 71 0c | b4 34 07 ea 3b 74 7a 69 d0 40 c2 8a ce 14 e0 29 | f7 f8 fb 45 30 ce 02 50 b6 4b d6 fe ce bd d7 fd | d9 af 2b 59 d1 37 75 ed 60 7b 97 1e bb b5 21 2d | 82 af 47 6c fd b3 b6 b4 1a e4 0b 54 80 93 91 9a | 7c 67 57 2c 37 bc 4a ba 6c 68 8e 7c 69 ae 25 35 | f6 73 82 3e e0 ba 6e 40 b9 c2 c0 d3 bd 9e 54 14 | 66 2e 22 5d 66 78 db 66 26 82 fa c1 4b 7c 9e 34 | 57 34 cb 3c 56 da ee df b8 34 f8 14 c2 9b 3b a3 | d6 4c a8 fb 55 30 94 15 c4 87 b2 b9 65 70 e9 f6 | 5f 9b ae 28 67 59 78 af d0 1e d8 d4 2a 4a 91 32 | 25 06 fb ff be c0 6a 2f e3 60 0d e2 75 08 92 ca | 55 96 9f 26 37 e4 6c 28 e7 f1 08 78 9b ac 4e 5b | 3b 11 9e bf 95 59 23 96 7a 89 87 42 71 70 51 75 | 29 00 00 24 bc 75 9d d0 ff b6 ae 90 e3 29 fd fb | 27 30 03 9d 8d 6e b5 df cd e3 e0 48 35 b6 7e d4 | 5d 99 20 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 1d b4 53 81 6d 12 3c 62 05 25 08 | f2 c7 73 02 9c 59 76 4d 00 00 00 1c 00 00 40 05 | 9b bb 33 9d d0 7d d5 98 fe 91 d5 bc 36 50 81 f5 | 28 37 64 3d | libevent_free: release ptr-libevent@0x7fb35401a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a86b80 | #433 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 e1 68 16 6a df f6 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #433 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #433 | rejected packet: | 23 e1 68 16 6a df f6 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #433: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c017ea0 | handling event EVENT_RETRANSMIT for parent state #434 | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #434 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #434 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49694.465785; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005341 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a86b80 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #434 | libevent_malloc: new ptr-libevent@0x7fb35401a4e0 size 128 "road-eastnet-nonat-182" #434: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #434) | 68 bd 27 f7 1a 5f c8 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b 8d dc 86 f4 61 cd 63 4f 12 1a 89 63 c0 18 0e | da c1 2f 67 00 48 49 fe 80 58 30 87 77 1f 60 f1 | 91 93 c4 dd 6a 33 66 a0 69 fa 20 95 f6 9a 11 c7 | fd d3 c3 ff f1 0e a6 05 ba 58 f9 c6 b4 81 c1 3f | 58 b5 fa d8 f3 85 c4 ec 19 40 f6 9f ac 5a 0e 85 | ab f8 54 8d ff fd 0f ef d3 5b 98 8a 75 38 18 ce | f2 7b e8 23 92 dc 6c 70 3f 25 92 19 2b 60 a6 82 | 30 c7 b8 84 44 df 82 d3 8a 4d fc 1d 9c e4 51 d6 | 72 15 3a 4a d5 64 0f 79 a2 e3 fa 27 32 de fa 9b | 0a b6 71 85 29 d5 43 a6 b2 3c 95 42 d3 be 1c 80 | e1 df 27 cf e0 47 6a aa 9d f0 da 55 04 28 85 87 | 1e 7a 6c 89 a7 1a 78 3d cf 4e 43 87 8f 82 da c7 | 06 01 34 b1 a1 6a 5d 22 18 fe 03 9e 0d 36 91 39 | 6c bb 36 1a 00 1b a4 da c4 26 ba 72 4d 2a 35 43 | a5 6f 44 e2 75 40 5e f0 90 a9 5a 70 fc 57 4c e2 | 21 84 c8 a9 9b df a7 2e 69 2b 50 04 e1 24 b1 85 | 29 00 00 24 24 e6 ca a8 b3 30 fc 67 22 ff 0b c1 | 23 a4 8f 2a ae b5 6d 78 43 33 67 66 1b 96 07 82 | 43 a1 52 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e1 30 9f db e9 ff d2 de 10 c0 b8 22 | 86 59 ab dc 44 02 05 1c 00 00 00 1c 00 00 40 05 | 2d 24 f4 0c 2e f5 a0 c9 e2 14 db 8f 00 ef 15 a2 | 0d 97 11 53 | libevent_free: release ptr-libevent@0x7fb37c029710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c017ea0 | #434 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 bd 27 f7 1a 5f c8 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #434 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #434 | rejected packet: | 68 bd 27 f7 1a 5f c8 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #434: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370018460 | handling event EVENT_RETRANSMIT for parent state #435 | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #435 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #435 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49694.536098; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007419 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #435 | libevent_malloc: new ptr-libevent@0x7fb37c029710 size 128 "road-eastnet-nonat-183" #435: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #435) | 02 95 c8 9c 02 70 ef 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 be 1c 3f a4 66 94 b1 76 a3 9b 53 73 2f 7f 23 | 4a e8 16 a3 16 f5 f7 58 2e fa f9 cc e5 72 42 dd | 79 82 dc a3 32 45 63 e7 97 5f 0c 3f 10 0e f2 af | 36 1e 6e 10 67 9c 3e 6a f7 f3 72 ba 54 df 6c 10 | a0 1c 0f 6a ce 67 71 2a a3 c4 d3 9c 88 b9 f7 04 | 30 84 58 1f bb cd f1 cd f3 e2 04 50 7f cf d2 c2 | 26 c1 1c 97 d9 a2 05 dc 96 89 90 50 ae 56 a0 13 | ef 2a 24 f0 f6 4d a9 8e e9 e9 a2 eb 42 50 42 ab | 0a 3d 04 3e 57 0c 0a e1 00 9d 75 a3 60 15 b7 e8 | 84 24 4c a7 d1 ab 72 3e f4 8b ef 1a c8 cc 7d af | ee 55 f6 12 cd b9 d1 90 77 f0 61 3d 61 12 ee f8 | 94 b3 64 a2 07 62 d6 b1 81 57 84 c9 8b ff 25 ea | 74 4a 3e 9b d6 88 62 0a dc b0 05 5d 90 03 c9 cd | 54 3d 83 cb 36 ad ef 96 f9 28 73 d8 df b8 72 79 | d4 6d 08 a8 b3 a6 c9 bf ea 29 05 5f 61 ed 03 82 | b8 9d e9 c7 c9 a7 67 16 08 0f e7 ba 6a 6d 38 69 | 29 00 00 24 ae 8f 34 92 0a 08 8b 7b 30 37 54 ea | a0 43 df e6 ae f8 bc fe 70 d8 fd fe ce a5 f7 5d | fb 76 aa 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 34 e7 f7 2a 07 1c be c1 53 fb c8 | 09 7a b0 5a 0f 53 bf 3c 00 00 00 1c 00 00 40 05 | 75 09 e1 26 ec 40 37 83 67 2f 03 41 48 5a 4e 60 | ef 86 00 50 | libevent_free: release ptr-libevent@0x7fb3400094d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370018460 | #435 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 95 c8 9c 02 70 ef 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #435 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #435 | rejected packet: | 02 95 c8 9c 02 70 ef 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #435: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa5fc0 | handling event EVENT_RETRANSMIT for parent state #436 | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #436 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #436 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49694.595402; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006598 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370018460 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #436 | libevent_malloc: new ptr-libevent@0x7fb3400094d0 size 128 "road-eastnet-nonat-184" #436: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #436) | cc d9 b7 db 44 05 84 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 3c 80 f9 ec ce 19 79 1b 2a 4e 88 36 86 a9 d8 | 85 e2 ee 1a ce 49 16 7b 84 5e 31 fc e1 84 f2 62 | 83 ed 4d eb 9f 6a c2 85 84 04 f4 d9 bd aa ee 02 | 08 1b 87 fa b5 ac ff f6 a9 3e 63 6d 16 01 77 f5 | 2b 3e 1b 6e c7 66 ff fb 38 8c 19 c9 7b b1 fe 10 | bc 5c c8 26 33 9f ff 45 76 a0 23 85 19 e3 31 de | 28 8c dd 45 56 45 3b fb b4 0d 18 e3 cd 81 8e 00 | 0b f6 17 10 a2 e0 44 20 37 74 e1 31 a8 10 b7 14 | cf 9a 72 a5 9f 1a 4b 15 1a b2 c9 bb 99 44 1e 31 | 11 05 e2 cf 98 40 c9 ef aa 8c fe 19 58 f6 d5 62 | cf d6 d5 ea 4e 24 4c 33 16 1d 0c db 05 43 98 5e | d3 1a 94 c0 4b ed 3c 02 54 4b fc ca 99 42 ac 4b | fc 8a 3c 6f 70 38 23 05 eb da 77 20 a0 4e 73 f3 | af d2 c3 64 0d 77 b8 54 17 69 4d 1e a8 53 83 4b | 8b 72 92 0a 4d 90 87 b2 56 ec 43 2c 41 d7 64 66 | 71 79 54 ef 65 56 ba 6d 1d e6 d1 dc ad 99 41 fe | 29 00 00 24 a3 ee 0b 44 35 bf 27 26 10 74 6f 1a | d2 86 21 80 e6 fa 2e 6d 1e 83 9b 58 c8 96 87 8e | e4 1b 77 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 51 98 88 78 46 d0 e6 54 3d 62 ae | 5f a3 54 6d d3 39 61 c5 00 00 00 1c 00 00 40 05 | f1 9f 10 2a 1c da 5a 4c b5 8c 1e 6e 78 d5 be 31 | 9e a0 0c c1 | libevent_free: release ptr-libevent@0x7fb35c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | #436 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc d9 b7 db 44 05 84 19 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #436 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #436 | rejected packet: | cc d9 b7 db 44 05 84 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #436: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa34c0 | handling event EVENT_RETRANSMIT for parent state #437 | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #437 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #437 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49694.661684; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.003958 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #437 | libevent_malloc: new ptr-libevent@0x7fb35c0300e0 size 128 "road-eastnet-nonat-185" #437: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #437) | 31 51 d4 f7 c8 fe c5 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d 4d c3 c5 4f ca 6c d8 d4 84 06 d4 ea 89 80 6d | 99 d1 7f e1 cb 80 24 55 fd df 90 fb 02 92 ff c9 | f0 47 14 8d 77 1a bb 9c 7c dd 17 b9 16 19 6b 74 | ec 88 72 db 3e 1a c4 54 69 dd d8 16 b9 56 68 f6 | 6a 0a 44 9f 3f b5 a3 4b 08 8a 18 15 d1 69 95 71 | d9 52 3a e9 65 ee 70 4d ea 9c f5 16 84 a6 99 9c | ab ff 36 83 9d b6 9f c3 53 f1 00 51 ea c6 f5 a2 | 5c ce 33 c2 cf de 1d c7 31 1f d6 91 bf f2 7f 9f | fc 6e d8 c8 43 fd a2 ec ed d4 2e e3 1a 35 b1 d0 | de 28 47 6a 6b a3 42 0c 4a 1a 4e 13 17 87 94 71 | f7 93 75 92 ea b9 03 fc c2 41 93 f1 c9 f7 b4 4d | 3c f1 35 28 f5 5e 37 14 cf 3e ce 38 da e2 53 26 | df e6 e9 23 b5 8c b6 45 18 8f e2 54 89 f9 96 79 | aa 6a 79 aa cf b4 ec 3d e4 21 6c a5 14 2c 68 b2 | 1b 56 0e 23 e2 48 c6 68 81 fb b5 23 23 53 e6 4a | 1c 61 e2 7a 67 e5 f5 84 ba 68 ce a3 e9 a9 c8 e3 | 29 00 00 24 02 5e bf 69 6a 09 af cb c5 28 ba 2f | be c6 fe 19 42 f8 ee f5 0b 73 06 5b 41 10 d0 e5 | 69 e3 64 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 6b 27 8e 3d c1 6d e7 fb 64 0d 99 | 79 35 e1 df 31 89 9b 32 00 00 00 1c 00 00 40 05 | dc 48 f6 93 16 4d 8a fc 81 8e 30 65 58 3a 8c 28 | 32 6e e0 6b | libevent_free: release ptr-libevent@0x7fb380022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa34c0 | #437 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 31 51 d4 f7 c8 fe c5 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #437 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #437 | rejected packet: | 31 51 d4 f7 c8 fe c5 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #437: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358012630 | handling event EVENT_RETRANSMIT for parent state #438 | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #438 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #438 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49694.747063; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00667 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa34c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #438 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 "road-eastnet-nonat-186" #438: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #438) | 41 3e 80 fb 50 ac d5 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 f5 0a 72 18 b4 76 75 f6 01 ed 57 e5 f7 fc 77 | 49 c0 b9 2a a0 da 30 6d 64 aa a5 e7 d9 21 f7 0d | 91 be 59 58 e0 73 bb 49 e3 e7 3d e2 78 8a 04 ac | e2 97 a4 99 a2 30 e0 4b a8 00 c0 ee 42 04 60 c2 | 77 26 36 9f ca 4c 02 7c fe 9f ae b6 ae 04 ad 9a | 8f d0 27 5f 92 70 2c be 09 55 2c 26 bd b6 4c 20 | bf 73 30 d0 44 67 97 1f 1b 2e b0 03 d6 27 ac d2 | 9a 9e e4 f7 c7 3b 09 97 22 3c 54 79 43 94 36 23 | 17 e9 e5 03 2b e9 58 e3 73 9f 26 68 9a d9 44 87 | db f9 8f 3e f3 46 76 36 18 c6 80 3a ce aa cb fb | 5f dd ff d6 eb 23 75 c4 e2 35 1f 1d 81 9e 2a 45 | d7 f8 e7 91 af a5 b6 a5 46 57 1a 8c 96 c0 29 4e | 8e dc e8 e6 2d 92 82 6a 85 02 3a ad 02 27 a8 84 | 8c be 58 97 e6 a0 56 65 e3 b8 11 05 1f 19 4d bc | 68 44 f8 dd 63 ea 12 b6 6d 02 31 e2 3c 83 0c 90 | bb ff 2c 31 86 51 81 cf b9 63 dd 72 3b ea de db | 29 00 00 24 65 91 ed 0a d4 1d 29 43 43 2f 3a 60 | 71 14 cd 7a ee 7f 0c dc 85 e8 36 48 85 1d 6f 9b | 44 a1 8a 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 a7 76 d6 c0 45 d0 97 b1 a7 8c de | d2 b0 18 be bd b1 c7 45 00 00 00 1c 00 00 40 05 | 93 a1 f0 74 30 f5 50 67 ed 62 ea 87 43 47 97 7c | d7 55 2f e9 | libevent_free: release ptr-libevent@0x7fb358039e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358012630 | #438 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 3e 80 fb 50 ac d5 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #438 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #438 | rejected packet: | 41 3e 80 fb 50 ac d5 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #438: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #439 | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #439 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #439 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49694.816403; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005521 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358012630 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #439 | libevent_malloc: new ptr-libevent@0x7fb358039e30 size 128 "road-eastnet-nonat-187" #439: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #439) | 47 50 75 67 1d 00 52 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 10 e6 27 54 79 a5 06 ab 7b 5d 27 c9 72 11 8a | be 8d 9d bf 52 e0 ac e0 58 f4 00 83 0a 18 2a d4 | 41 71 ec e9 2e f0 05 ec e8 a2 ec d2 28 ce f8 d4 | e5 81 d8 3c 87 bc 89 6a 8b 0a 1a e2 d3 eb 38 44 | e6 af 0a 47 aa 17 06 2d e7 33 df 52 16 8d b3 fb | d9 67 8e 07 e3 c9 9e 52 cf 8d 56 fb 7c c2 93 d9 | 9d 49 6e f0 2c fb ae b5 5c 7d 08 de 63 dc 9b 39 | 2d fb 3d b8 63 14 a9 ce d9 19 af ff bb a7 b1 81 | 41 c7 41 67 e7 53 2b fa 68 10 a5 13 3f f8 0f e7 | 33 85 43 eb a8 54 d5 5b fd f4 a1 1e d5 4f 32 99 | 86 f6 ec 22 05 a8 98 ec cb 6f de 01 77 3a 63 2b | 85 0f 08 c2 e9 6d 60 39 18 10 c9 3c 04 a6 69 c0 | 90 8a 6f 1c 7a 2e 85 ad 4f 29 5f 48 49 12 08 e4 | 72 3f d7 cc 42 6d 91 5a f7 f3 7b 44 dc 38 f7 05 | b2 bf 70 89 ab 24 52 cd cd c1 b3 61 99 9d a9 28 | e2 c4 12 1d de cd 37 64 c2 e0 70 28 45 34 de 67 | 29 00 00 24 d9 2f 24 9b 75 f5 ca 1e 2e 7d f4 06 | 41 a2 89 f3 ae c7 ae 61 65 4e 5f 7f 65 dd c2 12 | ae ae 3a 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 fd b4 2f 23 17 b8 9b d8 0c 2a 45 | b9 34 13 eb df 7c 42 33 00 00 00 1c 00 00 40 05 | f1 b3 a4 02 7a 60 50 36 46 44 d9 88 f9 29 1a 5f | aa 01 32 cb | libevent_free: release ptr-libevent@0x7fb34c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | #439 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 50 75 67 1d 00 52 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #439 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #439 | rejected packet: | 47 50 75 67 1d 00 52 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #439: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378018460 | handling event EVENT_RETRANSMIT for parent state #440 | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #440 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #440 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49694.930757; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005865 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #440 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 "road-eastnet-nonat-188" #440: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #440) | 59 19 97 9a e3 8b 77 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 57 86 98 5b 96 d3 77 6a 73 d3 f1 79 83 3d b1 | 25 c0 29 5c f0 c3 a2 69 ec 6a e3 4d 6f cd 0b d7 | 79 9c cb d7 34 fa 78 1e b1 98 79 da 0f ac 84 e0 | 73 c1 06 f8 21 3a aa 0a f4 0e 4d f7 bf 24 b0 23 | 75 13 78 7d aa 97 d6 f9 8b f1 96 43 1f bc e1 e6 | da 7d fb 41 ce 93 49 6e e1 1e f3 c1 41 08 43 3b | 3e e8 ed 1f 4e 08 d4 85 64 9e d1 11 dc 50 e9 45 | 7f a7 7d f7 2b 35 cf 9a d1 cb 6a 05 4f 83 e6 fd | 42 8f 63 21 ff 80 40 b7 e2 26 41 31 52 b6 49 a0 | 77 11 47 93 5f a3 3d 9c 1c 0e 6f 2b 0b b6 1d 42 | d3 1d 45 13 c6 e8 f2 a5 8e c9 4c 05 0a 08 aa 82 | ac e4 27 b7 b2 77 b7 80 38 58 3d 68 92 fd 5e 6a | 38 c8 de 6a 08 ae c9 2d 85 13 3c b9 b9 2c 91 48 | 64 74 4e 5e a1 07 a6 ff 63 67 43 99 ae 3a 36 0a | 11 4e c4 4f 1a ab 97 3f 39 c8 63 d0 49 b4 29 fe | 77 df c5 36 12 ae 96 21 4b 67 cf 07 6a b0 e1 5d | 29 00 00 24 82 fb 4c 4b 30 7b 16 3b 6a c7 2b 62 | cc 7b b0 14 ea 16 0d 74 ad 0f c2 be 8d 39 6e c0 | 2a 84 9f 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 37 6d ef 85 b5 1f 0e 28 d0 8a e5 | d5 d3 1d e3 5f d5 cf 90 00 00 00 1c 00 00 40 05 | 72 f1 07 bf 82 38 a8 c2 32 ec a4 d6 59 1b 7c de | 06 08 a2 81 | libevent_free: release ptr-libevent@0x7fb3700407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378018460 | #440 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 59 19 97 9a e3 8b 77 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #440 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #440 | rejected packet: | 59 19 97 9a e3 8b 77 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #440: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0458 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b06800 | handling event EVENT_RETRANSMIT for parent state #441 | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #441 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #441 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49695.041144; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006487 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378018460 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #441 | libevent_malloc: new ptr-libevent@0x7fb3700407f0 size 128 "road-eastnet-nonat-189" #441: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #441) | 51 22 97 d4 f1 aa 56 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 2c c6 09 06 fb 75 c9 7f c8 2c f2 78 2e 86 cf | 10 e2 71 84 ec 7a d3 00 3b 70 b4 67 49 a1 3c 4d | 21 45 e6 9b ef ae 2b 06 a0 05 7e f8 20 46 fb f7 | 0f d4 3c 68 46 a5 74 b1 69 d3 27 26 91 1f fb ea | a2 29 d1 d5 ec 8d ba a9 55 81 7c dd 8b b0 d5 f0 | 65 df 87 db d6 24 b4 8d 72 d6 b9 0a a2 e0 30 fc | e4 5b 51 8c ab 49 74 dc 67 ef 9d ed b7 2a 83 35 | e7 01 ba 5c 14 ef fc c4 a3 30 10 68 67 0e 82 16 | 7d 82 bc d7 25 ec 2f c1 f6 97 ab 23 a3 9a b0 7c | d2 fc 27 3c 76 c0 04 de 3f f1 57 2b 49 24 75 a8 | f7 b1 cb 9a 6d 04 c0 ee c6 a3 f0 18 d5 7f 4e a7 | 2c 74 2c d5 e8 3f cd c9 69 5b b5 31 78 19 bb d1 | 32 75 82 1c 75 29 51 85 94 3b 48 0b 31 5b 51 f5 | 93 f5 fc 53 3a 80 c0 7f 4c 5e 8d 4e c5 a0 2e 05 | fd c5 76 9f 1a 22 f6 df 9c 77 35 ff d3 0b a0 5e | 73 0d 0d 92 2d ee d7 e3 ed 3d 6b a2 54 4a 19 9a | 29 00 00 24 9c 47 e2 58 3f 57 67 62 b6 2e 0d 3a | cb 75 8a b1 7d cd 2d 8e 6c 75 cc 2c b3 bd 9f b3 | c7 bf c7 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 c2 f5 08 e1 41 ca c3 a8 c7 5d b8 | 30 41 e7 b2 e6 39 d6 66 00 00 00 1c 00 00 40 05 | 92 32 df 91 6d 86 4c 91 9f c0 e2 90 d1 aa b2 8d | 1d 5c 17 a3 | libevent_free: release ptr-libevent@0x7fb360046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b06800 | #441 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 22 97 d4 f1 aa 56 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #441 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #441 | rejected packet: | 51 22 97 d4 f1 aa 56 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #441: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0446 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b610 | handling event EVENT_RETRANSMIT for parent state #442 | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #442 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #442 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49695.155523; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004934 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b06800 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #442 | libevent_malloc: new ptr-libevent@0x7fb360046040 size 128 "road-eastnet-nonat-190" #442: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #442) | 87 5c d8 cc 20 15 ba 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 68 c7 3c 11 2f 9c 07 85 86 ab fd 70 b3 a3 4b | 4b 15 db 0c 55 63 48 ae b0 dc 7b 34 ba 58 39 54 | 81 cc 25 fd b5 c7 f7 39 e9 8f 2e f9 b9 70 0e c0 | 6c fd 85 d9 5d cd 9d f6 5f 5d 4e 86 38 b5 78 a7 | d8 3d 3d f5 25 e8 c6 56 da a5 38 73 cf 89 18 32 | cf c9 c3 46 fb 60 20 53 a4 ff ca 61 0a 1f ad 2b | a5 f9 d2 1b d5 73 db 29 4b af 73 16 1f 68 6e 88 | a8 b3 5c d6 b4 01 8a 06 65 2f a3 ad 76 14 68 68 | 9f cb 47 75 86 fb 98 94 58 0a 1b c8 87 0a bf b1 | 97 c2 17 ab 5f e8 c3 11 ea 6b b5 fc 83 10 e7 36 | 12 60 e6 87 bd 62 58 93 cb ac ef ca 4f 7f ed 7c | 32 f8 74 a9 e0 2b 69 44 cf b3 d9 33 28 7b 15 7d | 6b 78 11 47 ae a2 e0 8f 52 91 83 be f4 84 c7 17 | a5 b8 57 df 7a 32 65 6d 3b bd ca 10 c7 fb bf 39 | ca 7b 85 7d 49 00 cc 7c 5f b7 c2 27 37 c0 3c 03 | 4d 75 5e a1 e3 8a 16 a4 15 da ac 76 26 68 0c 96 | 29 00 00 24 bc 7d d1 02 e0 e7 26 b2 02 88 eb 9f | 6d cb 61 e3 66 23 89 34 b9 17 0a 11 8d c9 39 5d | 4a 6a d8 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b b4 fa 62 4d 88 e7 9c 8f 3a a9 82 | e0 af 15 4d 27 f2 cd 63 00 00 00 1c 00 00 40 05 | ff 91 89 9d d7 da 34 d7 9b a8 06 6f f9 4a 9b 25 | 2a 77 df 3e | libevent_free: release ptr-libevent@0x7fb388048a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b610 | #442 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 5c d8 cc 20 15 ba 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #442 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #442 | rejected packet: | 87 5c d8 cc 20 15 ba 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #442: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0731 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1c490 | handling event EVENT_RETRANSMIT for parent state #443 | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #443 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #443 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49695.23909; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004962 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b610 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #443 | libevent_malloc: new ptr-libevent@0x7fb388048a80 size 128 "road-eastnet-nonat-191" #443: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #443) | 99 e5 a7 37 44 6e 78 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 12 f7 51 e4 9b df 2b ce ce f2 ee 7b 13 94 51 | 6a dd a6 05 05 c5 f9 51 17 99 5e 09 04 c9 1f b2 | fd 1f 26 33 db d5 00 aa 13 04 1c 40 7e db ca 5a | d7 f8 59 90 a2 34 4e 73 d9 b4 1b 12 47 af 09 6a | 3d c6 bc 0a 75 d2 59 20 61 0f b0 78 2f f9 96 a8 | bc 6e fc a4 91 79 01 c5 c6 bf 55 5f ca 2a 71 57 | 55 3a c2 55 6a 02 68 58 b9 3f ee 10 26 00 19 6c | a4 9b 2b c5 37 91 ea 3d f7 92 10 15 3e 21 96 87 | 2b 42 57 b1 96 6e 0c 94 b6 11 c4 ca 44 56 8a bf | 72 e1 9f 77 2e b1 9f 72 96 c2 0b cd e9 02 1e ed | f4 40 75 83 23 4e d6 76 72 99 62 9c 55 c4 df 8d | 23 38 27 3c f9 b9 3f 1c 37 14 80 74 3c 7a 5d f8 | 1a 0c 7f 0d 3a 48 23 4c 35 58 8d c3 50 e9 4f d5 | 3a d4 b6 fa d0 f4 f0 02 7b 72 04 9c a6 5b 57 b7 | 6f ac e8 68 3f 0b ab 1c 0a 68 cc 2e 68 e9 56 e5 | 09 9a 32 64 09 77 95 51 f1 d9 2b dd e7 b2 96 44 | 29 00 00 24 d1 ee 39 81 5a e3 54 a6 73 c8 50 03 | 2c 50 da d8 32 42 2b e6 ab ed 1b 51 ff 8e f3 84 | d3 ae 77 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 53 91 6c eb c8 88 e0 f9 9e 54 62 | 8e 3a 67 1c 98 f2 42 50 00 00 00 1c 00 00 40 05 | 84 7e 67 f1 2a 8c cc 0b 8d 85 0d 9d a9 c1 72 b7 | 86 11 2f 01 | libevent_free: release ptr-libevent@0x7fb34c02ec30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c490 | #443 spent 0.436 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 e5 a7 37 44 6e 78 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #443 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #443 | rejected packet: | 99 e5 a7 37 44 6e 78 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #443: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.211 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340025210 | handling event EVENT_RETRANSMIT for parent state #444 | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #444 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #444 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49695.311997; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004821 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c490 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #444 | libevent_malloc: new ptr-libevent@0x7fb34c02ec30 size 128 "road-eastnet-nonat-192" #444: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #444) | 7f 9a e3 30 35 a2 50 3a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 73 44 16 cd dc 6d af 1e 52 47 5f 1e bd fa ee | 64 00 7c 0c 09 cd 6a b9 96 7a 9e fd 7b 60 d3 11 | 94 7f f3 14 ab de fc 67 4d 77 8c ed ae 35 5e 21 | 92 1a 34 1f 52 96 c6 b4 82 cf e2 da a3 5d a8 40 | 55 b6 be b1 02 f7 4f 09 53 8a 9a 82 43 68 c5 03 | 91 79 7b fa ca eb 01 ae de 9c b8 57 af 0c ad 92 | 90 f7 80 a3 5f 1b 76 77 00 b6 f8 6e 45 fc bc 6c | 08 e0 42 31 50 bd 6d b4 9c ee e1 eb b4 38 73 a9 | 34 e4 98 23 d2 4d e0 d9 b6 c6 f6 dc 56 58 4e 20 | 84 e1 d2 8f 09 7f 4a 9d 26 b0 f3 d6 00 33 87 e7 | 4a de ea 2f 4a 53 b4 0f 48 62 38 e9 50 42 17 64 | 60 9a 88 18 4e 23 6b 6a 5a a4 6b 23 ad 33 67 82 | 97 a8 79 73 5f c7 02 96 5e 91 0e 40 d6 4e f8 b3 | d9 30 5c 69 30 3f 5d 5d 8a 33 e5 82 75 a6 f8 01 | e5 10 de e1 1f 27 d1 2a e8 d2 12 a6 bb 52 29 5c | 7e c1 67 58 19 ab fb 58 65 a2 55 1e 99 be f5 8d | 29 00 00 24 2a ad 1b 39 f3 fd f9 42 4c 00 4a 5c | ed 00 f4 3a 31 ea eb b5 54 5a 5c 9d a2 7d 7c c4 | 61 a7 b5 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 d0 f0 6f a1 ca 95 cb 19 9f 38 2a | 49 20 b8 20 36 38 5c 50 00 00 00 1c 00 00 40 05 | 75 b6 79 50 7c d3 43 75 20 ac ac 20 ab c2 0f 0e | 7d 73 a1 76 | libevent_free: release ptr-libevent@0x7fb35804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340025210 | #444 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 9a e3 30 35 a2 50 3a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #444 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #444 | rejected packet: | 7f 9a e3 30 35 a2 50 3a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #444: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0457 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34401d710 | handling event EVENT_RETRANSMIT for parent state #445 | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #445 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #445 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49695.405404; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004948 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340025210 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #445 | libevent_malloc: new ptr-libevent@0x7fb35804b850 size 128 "road-eastnet-nonat-193" #445: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #445) | b4 2e 78 cc c5 f6 9b 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a ba 44 5e e8 04 0b 1d 80 c6 75 3f 8a bb 68 32 | 06 11 b8 93 58 a0 e3 d0 41 9a dc df 91 ac 0b 46 | b8 6d fc ac c1 e9 09 52 48 47 7e 50 d3 96 46 49 | 4c db ea ed bd 20 06 58 05 cd d9 91 57 1d 80 4d | 27 35 e2 86 24 5f 4e 32 bf 57 32 fe 52 fe 8f 11 | 64 dd f6 c1 cf a0 23 81 27 d1 05 22 c7 e8 81 e4 | 67 a9 8c 32 ef 56 b6 40 b1 5f 41 a6 60 fd 00 92 | 0a e3 78 9b f2 03 2c 98 1e 8c fc 31 fc 9b e2 d2 | 0c f9 17 3c fe e3 b4 da 8e 06 ef 92 fc 84 24 e8 | 41 6f 79 14 e9 fb a1 a0 07 48 de 12 d6 84 2d 7e | 90 30 a3 38 3d 28 16 c5 17 69 90 4c 1a 42 aa f9 | c8 01 fd 3b 2e 46 f9 3b 3c c2 87 e4 f3 79 4f c7 | 11 59 a6 e8 26 10 94 45 c9 46 e9 8c ab e9 1d 28 | 48 da 5b 23 c8 48 65 23 9b 45 8d ab 8d 58 2e 78 | 34 e4 38 1d 80 97 ed 49 5c 38 3d af 3b ec ad d6 | 83 24 62 c1 f1 7d c9 59 93 3c f3 1e db d1 30 e4 | 29 00 00 24 43 99 24 d2 66 51 b3 d4 1c 15 bd 40 | 1f a6 87 a7 4d 01 75 d0 ba dd bc 61 a0 08 b2 b5 | 88 d8 85 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 20 6b 9d 83 bc 81 44 79 c4 11 cc | c3 90 0e 2f 55 7c a4 51 00 00 00 1c 00 00 40 05 | c1 5a b3 1c bf d8 ae 9a 12 a9 ee 41 24 11 a3 d4 | f8 37 2e 14 | libevent_free: release ptr-libevent@0x7fb344040760 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34401d710 | #445 spent 0.215 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 2e 78 cc c5 f6 9b 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #445 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #445 | rejected packet: | b4 2e 78 cc c5 f6 9b 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #445: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.104 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c01d710 | handling event EVENT_RETRANSMIT for parent state #446 | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #446 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #446 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49695.470931; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005599 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34401d710 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #446 | libevent_malloc: new ptr-libevent@0x7fb344040760 size 128 "road-eastnet-nonat-194" #446: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #446) | 88 1d ae ca 37 da 9c 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a c2 f6 76 62 03 08 9a a8 98 a1 67 18 76 36 6f | f2 14 09 7e 5a 52 4f 9f 19 c8 ba 89 bc 37 1d 8e | 11 c7 c7 24 c8 21 0f 20 96 1c 89 74 ee 2d eb 0f | d9 40 32 aa 68 91 41 4a dd 21 15 90 12 e4 8b c9 | 4d 5c 9c dd a5 b1 90 8f 14 47 58 25 b1 c4 3a 4d | f0 56 c6 bf 57 58 f2 ac e6 d1 1a 63 f9 d8 c3 1a | a4 3b 86 89 ab bf 3e 5a 25 6f 85 ba 03 4e 84 c0 | a7 2c b9 17 b5 20 be c6 c5 13 97 18 56 e3 27 c2 | f9 d2 f9 ff 5e 3c 1b 93 48 e2 17 63 4c c3 83 be | b7 98 15 95 f6 a1 48 ea 20 9c e6 f3 53 b1 cd 88 | 53 a7 49 3f 59 99 9e 83 6d e2 88 bb a9 e3 fc 02 | 29 31 b8 83 4f 47 15 6b 71 12 58 3e 96 a5 76 cc | 0b 52 1f 8d 6c b2 63 0d 85 4d 51 f2 5f f7 f4 97 | 20 32 4c 0f 1c ff 39 c3 f0 0e d9 00 b3 27 e0 af | 29 89 02 52 1a 56 5c 18 4f a4 87 c7 25 17 55 3d | f8 28 8f d9 14 95 ef 08 7c ea 8b df 87 e5 f7 5e | 29 00 00 24 5e f7 7f 32 12 e9 cf 93 a5 5f 05 08 | 2b 32 36 a4 d8 35 51 26 4c a4 53 84 4a 3d 2b 33 | 5f dc 90 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bd 76 de 3d 7d 38 3c 23 fa c5 a8 aa | 98 15 c0 6a 4a ab a4 fc 00 00 00 1c 00 00 40 05 | 7b cf 42 04 70 bc 06 e9 71 4c e8 ba 2d 5f 18 79 | 9f 19 93 8c | libevent_free: release ptr-libevent@0x7fb36c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c01d710 | #446 spent 0.221 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 88 1d ae ca 37 da 9c 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #446 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #446 | rejected packet: | 88 1d ae ca 37 da 9c 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #446: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0961 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #447 | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #447 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #447 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49695.577436; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.002791 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c01d710 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #447 | libevent_malloc: new ptr-libevent@0x7fb36c0300e0 size 128 "road-eastnet-nonat-195" #447: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #447) | 38 12 e6 81 e7 94 57 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 06 2b 67 fa f3 85 ef c9 87 64 80 c6 08 7f 26 | 45 8a d6 b2 f0 0d 75 25 97 6d 45 07 fd cb e4 04 | bf 7e ab 4e 45 57 81 c7 b5 29 22 16 b5 58 17 73 | fb 06 1c 20 f6 01 42 43 d1 e6 cb 7e a1 aa b9 6e | 26 8c bc f7 62 2d 79 d5 2d 49 41 71 09 9e b4 75 | ea 9e f2 7f e9 07 f0 a5 64 1a db a1 ff 4f ee 2e | 4f 3b 9e aa ac 22 2d 9f 1b 37 bc cf 47 d1 ca f1 | 85 86 f8 a5 9e 4a f1 ed 2d 36 8a 97 fa 17 f5 2d | 74 78 21 72 1b 33 88 07 44 c7 17 ee 95 f3 cb cb | 74 32 bb 69 59 ac ab 47 c6 9c ea 80 62 ae 1f 88 | 81 9b 37 d9 2d eb b0 eb c8 de b9 11 87 9a a9 5b | 92 c9 38 b1 30 9b d0 b1 7f 2a dc 10 02 4c 1e 0e | 28 73 54 43 6f 78 74 45 0e 5e 40 cb d7 a1 f6 9b | 8d bf eb b3 ff de 36 ad 5d d5 a1 e7 e2 d9 b6 74 | 11 52 d9 17 88 a2 35 0f d7 23 95 ef eb 8f 58 a1 | ef f0 f0 24 22 5b dd f5 64 21 6b 5a 10 90 d6 b9 | 29 00 00 24 c8 ed 9d b9 b2 64 8b 9d 5d 85 10 8f | bc bb 1d 46 c9 3a dd 35 d0 ed 23 11 cf 06 d9 fd | be 51 4b 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 28 c6 de 25 95 4a 27 58 aa 1c c2 | 15 34 6b e8 d4 2b c8 d2 00 00 00 1c 00 00 40 05 | dc 67 81 1e 74 e8 91 b7 d4 fb 94 8c c2 c6 73 c6 | 89 a9 30 0d | libevent_free: release ptr-libevent@0x7fb3780300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #447 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 12 e6 81 e7 94 57 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #447 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #447 | rejected packet: | 38 12 e6 81 e7 94 57 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #447: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0676 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #448 | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #448 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #448 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49695.658844; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.0061 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #448 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 "road-eastnet-nonat-196" #448: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #448) | ea d6 68 25 ae ee 80 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 2e 7f 22 4b d6 ee 79 95 7d ea e6 94 56 fc 59 | 41 1c 12 66 f4 de 00 d4 6a e6 f4 4c 67 01 c3 97 | d7 f0 7f 15 19 52 1c e1 e7 cb 10 43 bf 32 f7 97 | 3f 7d 76 9e 8f 5c 2d a2 10 89 27 a3 31 39 40 6f | 23 b5 50 de a5 26 d5 37 1d bc c7 b0 be 51 02 45 | 35 60 2b d9 a4 52 16 a6 1b 75 6d 90 d7 94 82 b4 | dd 41 db 2a cd 7c b4 ec 00 64 fe 2d 52 b4 ab 6f | a1 8a dc c4 d8 32 f4 27 d3 99 3c 5b 3c 30 47 ed | 06 54 fe bf 5a 80 4f d3 cd d3 63 ab 7a 0a c4 81 | eb 86 4b 9a 37 9c a7 bc 09 9b f1 b6 f5 69 f2 05 | c2 89 b2 f3 ca 58 71 7c 0b b2 02 99 cf da 83 99 | b9 82 4c 58 38 5d 2d be 03 71 b3 5f 32 1a 82 30 | 6f ca 79 08 7e ac dc 25 d6 1a ad 46 a4 8d 7c 47 | 64 b8 24 1d 37 d9 41 0f 8b 4e 16 65 d2 41 4b ab | d2 0e 95 38 92 91 3a 77 ae cf 19 35 ef c9 91 13 | b4 90 b2 24 68 10 9d af 29 52 a9 15 24 f7 4d 93 | 29 00 00 24 f3 0f f3 36 25 a9 50 89 21 ce 62 13 | d8 e8 8d 8d c3 33 f9 d1 62 a2 a6 a0 e9 3e 64 7f | fb b2 90 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 d7 4f 67 97 77 e0 a3 2c fc 24 e7 | 7a a9 1a d4 d3 98 14 3c 00 00 00 1c 00 00 40 05 | 18 00 5b 20 2e 1c a9 8b 56 50 4b 4f f1 d3 fc 60 | 9d dd 28 85 | libevent_free: release ptr-libevent@0x7fb3700251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #448 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea d6 68 25 ae ee 80 d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #448 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #448 | rejected packet: | ea d6 68 25 ae ee 80 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #448: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c012890 | handling event EVENT_RETRANSMIT for parent state #449 | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #449 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #449 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49695.754108; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005781 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #449 | libevent_malloc: new ptr-libevent@0x7fb3700251c0 size 128 "road-eastnet-nonat-197" #449: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #449) | ea 52 41 06 29 be 32 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c f6 72 22 70 e3 8e 6a 67 c3 d0 4a 0b 7f 5b cf | 2d 68 56 81 95 56 3f 4d 2a 1e 61 1a 59 76 f5 26 | 54 d5 6a 01 f4 8a a1 63 50 3e a3 b6 d1 85 12 bf | 8c a7 c8 b2 9c d2 7e 12 ce 8a 8f 97 a7 10 c6 36 | 55 54 39 bd 73 f0 07 97 c0 8f d8 2f a2 5e 50 05 | cb 9d 1a b8 ce 20 6a 30 ff 7d 3d 2a 89 9c e8 f9 | db 68 6b e7 d3 12 f3 5c 42 81 cc 9e c7 d6 ab 3b | 07 00 72 f9 2b bb 2c 8f 88 74 45 a7 1f 5a 2d 17 | 94 3e ec e0 ce a9 ab 72 79 45 76 ba 8c 1f 40 56 | 6d 7a 46 42 83 af a1 98 c5 23 1e 58 16 d7 79 25 | b7 cc 17 53 0a 7f 1c 45 dc 0f 11 52 e6 bb 5f 53 | 8d b5 f6 fb 27 2b 60 33 a4 cd 4d e9 7c 6b 4b 17 | 81 ec cb ca e4 d2 97 9b 61 33 64 a7 c9 1d 12 b0 | ff a4 81 cf f4 75 a2 54 63 07 9b 1c 61 4f 70 9a | f2 61 b3 19 96 98 3c 7b 44 1f aa 65 b4 bf d7 a8 | 55 c2 75 de ff 71 8c 90 1b 3c c3 a8 3f fe 54 f3 | 29 00 00 24 43 77 8d 20 c7 95 c9 d5 6a 2d 87 1f | da 3a b4 7e 55 a2 17 ed 53 70 56 79 ef 21 f9 7e | 28 b4 26 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 9b 7e ce 31 a7 8d 1a 50 79 db 89 | b3 07 e5 e2 b0 c0 20 fc 00 00 00 1c 00 00 40 05 | eb cc 39 a0 b6 a4 78 79 56 5f 29 29 93 1e cc 18 | 29 12 ff 3b | libevent_free: release ptr-libevent@0x7fb36c03a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012890 | #449 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 52 41 06 29 be 32 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #449 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #449 | rejected packet: | ea 52 41 06 29 be 32 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #449: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0611 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38800feb0 | handling event EVENT_RETRANSMIT for parent state #450 | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #450 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #450 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49695.84048; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004229 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012890 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #450 | libevent_malloc: new ptr-libevent@0x7fb36c03a770 size 128 "road-eastnet-nonat-198" #450: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #450) | 6c 66 54 70 e3 85 47 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 7f 52 be 1b be 3e b4 95 6c 7f ea ce 79 84 79 | bb 2c a4 22 02 14 1a c7 80 c9 fc 63 a2 df a7 b4 | 1d c3 3e 47 98 35 3a c5 6d 01 79 cf ce 3b ed 3f | e7 fc 21 90 6a 8f a9 37 0a 15 57 ed e5 84 6d 80 | bc b0 af 24 80 0c 58 35 20 db 3e aa 64 ad 44 83 | d9 34 7e 33 a0 1c 88 af b7 63 e8 97 42 89 19 cf | e1 51 ee bc 36 b3 3f ea ae 0a 36 ea 2a 42 b5 d5 | 2b 9d 6c 67 c3 b5 e3 5c 88 ec 08 73 1a b8 90 c6 | eb c9 08 93 4a fd 61 5f ac b7 cf 92 b0 ce 44 08 | c5 ea 9d d1 33 ae 08 3a 55 1a 54 74 ee 06 12 8c | af 05 f1 32 8b f9 ad 76 e7 15 cf bb 56 d8 0d 22 | aa bf 8f d9 bc 81 33 05 b5 ca b2 64 e4 57 c2 aa | 8a ce 60 a9 03 71 24 23 e8 e9 eb 0e f3 fd cb 40 | 57 21 41 6c 87 a4 12 87 6c a3 20 f1 71 99 97 a1 | c9 bf 28 c9 61 1f 0e d1 0f d5 eb 18 2d 83 11 2c | a4 a9 46 db 50 5e 63 04 e8 1e e0 10 c3 22 6d 3c | 29 00 00 24 60 b3 78 69 cb 9c d2 f7 d6 cf 6b 51 | 75 18 c5 a7 1c 11 fb 00 38 fa 43 80 05 51 ec 75 | df 66 73 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 01 2f 17 96 36 9a 51 cd 6f 6e a8 | c1 69 8d 8a 84 17 97 6b 00 00 00 1c 00 00 40 05 | 07 24 02 da 94 a8 c8 5e ad a8 39 f9 98 2f 5a 91 | 01 02 06 a3 | libevent_free: release ptr-libevent@0x7fb384032b00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800feb0 | #450 spent 0.163 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 66 54 70 e3 85 47 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #450 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #450 | rejected packet: | 6c 66 54 70 e3 85 47 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #450: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.071 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_RETRANSMIT for parent state #451 | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #451 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #451 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49695.956925; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004697 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800feb0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #451 | libevent_malloc: new ptr-libevent@0x7fb384032b00 size 128 "road-eastnet-nonat-199" #451: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #451) | ba 7b a0 b0 99 57 b7 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 86 c1 bd 46 53 16 86 81 3c 90 d2 1b d5 72 d6 | 90 46 2b fe 71 0a b5 92 27 f1 2a 98 1f 0b 9c 86 | b4 73 fd 62 b2 c4 76 72 65 dc a3 4a 74 c5 fd c6 | 79 b7 24 8c 57 9e 68 29 d1 51 ef 41 d9 35 5f e0 | 38 61 4f 5c 38 99 a1 c4 18 39 cd 7c d3 ce 2b 13 | fc 9c 47 13 18 41 cd b0 e2 7f c5 8a 64 72 a5 44 | 53 3a 53 2d 27 d7 7b 2d 79 06 40 fe 3d 6f 0c 91 | d2 44 b7 35 de 08 ea 0c 51 75 4f ac 93 26 ff 1a | 9b 0e 24 d8 14 0e 9a fc f6 cc 0e 9a dd d9 b9 d2 | 1b 38 2f 39 cf f5 c7 33 b5 34 1b 0e a3 9e 16 b5 | a1 af 82 8d 2c a9 ce 6b 79 b5 5c 3b f7 3b ae 09 | 38 95 45 10 35 73 6b 75 72 ac 01 d0 d8 9c 2a 56 | 79 52 8f 61 80 9d ac 4d cd 53 ef 84 96 01 18 60 | 62 4a 3f 8c ae bb 58 49 e4 bd 6c ac 5f b8 ee 89 | d9 a3 21 bd 37 79 80 9b e7 e0 92 c7 ad 63 83 e1 | b3 a4 a9 38 2d 78 59 50 55 18 b3 a6 f4 4b 9a 44 | 29 00 00 24 c0 83 9a b8 91 8b 33 7b 3e ca 3c 3c | 55 1b 13 ae f8 60 71 22 6b 87 6a 60 f0 da d9 ee | 56 ce cf eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 64 e2 2e 4b 98 7a a3 19 bf 09 d8 | 5a 5f 60 9f 04 ef ea a4 00 00 00 1c 00 00 40 05 | f6 42 3e 9c 74 68 a9 db 08 24 19 e3 18 ae 01 16 | fd d2 98 25 | libevent_free: release ptr-libevent@0x7fb34400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | #451 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 7b a0 b0 99 57 b7 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #451 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #451 | rejected packet: | ba 7b a0 b0 99 57 b7 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #451: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0753 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a647d0 | handling event EVENT_RETRANSMIT for parent state #452 | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #452 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #452 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49696.047289; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005164 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #452 | libevent_malloc: new ptr-libevent@0x7fb34400cf80 size 128 "road-eastnet-nonat-200" #452: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #452) | 50 11 a1 bf ed cc 03 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 8a 76 57 c4 9b d0 38 b9 d2 c2 4b 69 ba e2 a2 | 5a 11 4c 0a 45 a5 bd e6 9d dd c0 17 e1 2d b4 38 | 58 7e 63 fb 2b 24 a5 63 e6 a8 3b c4 4f a3 78 62 | 66 71 ba 53 c3 c9 09 13 5d ce 86 73 ab 12 87 fa | 35 c6 ff 8b 42 89 25 72 85 e2 b1 87 71 47 d8 8c | ac 7e ee 22 cc e1 04 85 55 54 54 b2 e0 ad d5 39 | 0a fc 74 d3 64 5e 05 35 2e 1a b0 95 d1 38 f8 9d | e0 83 e6 f4 e2 39 cf ac 1a e7 54 52 1b c6 27 82 | 61 87 37 7f 47 a3 e4 be 08 d5 c5 1a f3 6f 8c 8b | 63 33 54 b5 d2 c3 52 ce c9 11 04 d4 3e 44 cf a0 | cb 89 ea 96 9d 4b f1 9d 8d dc 98 07 bd 7b 2f d6 | 8f 69 b2 51 af f2 60 a1 de 25 ef d3 5a 7c e5 c5 | 23 56 16 2b d4 22 e3 1f 96 12 60 85 a4 b1 18 7f | b7 c2 db 59 66 51 fe 4e 85 1b ae a3 40 84 80 d2 | d2 e6 e1 c5 9e 39 9a 1f 42 76 d0 90 ba 8e cc dd | 5a 7b 9a 97 d8 6d 8b db 68 e9 10 8f 2c 64 9d b8 | 29 00 00 24 ba 51 08 92 39 ed 80 e6 57 c3 97 3c | b4 4a b0 29 f6 7a 02 bc 32 31 68 fb 36 27 e7 7b | 80 17 94 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 cf 89 69 b2 6f 00 24 ae 75 3b 9a | 3a b6 ca 28 54 7e 11 99 00 00 00 1c 00 00 40 05 | 3b ea 73 3d bf 95 ec 19 18 d5 48 b2 c7 6d ef 5f | 10 2b 0f c2 | libevent_free: release ptr-libevent@0x7fb368023a60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a647d0 | #452 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 11 a1 bf ed cc 03 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #452 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #452 | rejected packet: | 50 11 a1 bf ed cc 03 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #452: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368024000 | handling event EVENT_RETRANSMIT for parent state #453 | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #453 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #453 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49696.105587; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005188 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a647d0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #453 | libevent_malloc: new ptr-libevent@0x7fb368023a60 size 128 "road-eastnet-nonat-201" #453: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #453) | ce fd 6b dc 43 f9 b6 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a fe 9f 71 b9 6e 69 49 23 6a d5 87 63 a6 2d 80 | fc 10 3a 5e 08 f9 cc a8 36 72 0a 5b 2e 86 63 13 | 40 48 02 71 3c 66 28 bf ad d7 fa c6 30 96 5e 17 | bf a0 d6 3f 57 20 44 4e e4 00 ed 65 d2 4f 08 d6 | 20 51 fe 4a 66 fa 02 8d 06 00 db e7 45 a0 fc fc | 8c 97 f6 4d f7 77 a5 6a 79 27 5b a0 e1 46 fb a6 | 23 99 9c 26 32 43 cf 04 80 58 6f 87 cb a5 6d d2 | 76 b6 f1 d1 81 44 27 9c 99 67 9d 01 ca 24 01 04 | 53 a4 a4 40 53 47 8f 99 18 29 ec f0 3e a1 86 13 | dc e4 8b ba 11 0f e1 c3 4b ee 52 62 b4 64 8e 2f | 66 5c ba 6c ee 04 04 ed f9 bf cd 94 0a 45 b8 40 | e4 22 f5 d1 d6 df 3a ed ce c6 15 28 b6 04 76 04 | bd c3 75 e8 63 e6 45 74 6f 79 fc 8f 52 0e 1e 14 | f2 bb ae c1 f9 bb 75 83 86 a8 ff 0c d1 f1 5d 0c | a0 ce 81 b4 8f 58 61 e5 9f 60 57 7c c4 7a 6c 26 | 0d 77 a8 c6 b2 9c 49 0c ea 36 61 b7 06 0a 10 da | 29 00 00 24 e4 ac ab 1b 0b c0 0c 13 54 30 d6 3f | 0a a4 17 49 c8 c8 1a 8d ae d5 3b 39 11 5a 2a f6 | e8 ed 91 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 76 3b e4 72 b5 b8 a8 50 2a b0 80 | 46 e6 9d 5f 02 57 8f 98 00 00 00 1c 00 00 40 05 | 9d b5 75 60 1a f1 a6 46 0c b9 85 72 c6 f1 03 f3 | 4e 7a aa 51 | libevent_free: release ptr-libevent@0x7fb368046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368024000 | #453 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce fd 6b dc 43 f9 b6 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #453 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #453 | rejected packet: | ce fd 6b dc 43 f9 b6 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #453: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a34e10 | handling event EVENT_RETRANSMIT for parent state #454 | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #454 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #454 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49696.19989; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004785 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368024000 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #454 | libevent_malloc: new ptr-libevent@0x7fb368046040 size 128 "road-eastnet-nonat-202" #454: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #454) | 3e f1 41 2a cb 15 91 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 3c 6a c7 38 95 77 87 5d 1e c8 dc ba 22 fc 03 | 1c 9c 6c 7f 8e 0e fd af 13 dd 37 0a 23 40 7c ce | 87 9a c3 3c b2 29 81 32 66 6c ba 2d 43 73 e4 9f | 34 a2 6c c8 c3 e8 8f d1 b2 45 4b 81 58 b8 9d f6 | d7 6b 98 99 af 72 e9 d0 c7 87 b4 74 61 b8 6f 67 | 18 e9 20 82 3b 32 85 5d b7 fc 19 46 92 6b 65 26 | b2 31 d6 c3 36 5c 46 dd c1 b3 1a ba 4d 4c b4 fb | c9 29 e2 5f 88 92 21 72 05 11 74 76 83 6a f0 05 | 70 a8 4f 78 f0 27 41 4f 18 70 43 44 55 76 41 4e | d4 55 4f 0d be 47 fb 72 63 29 ab 49 16 15 52 01 | 76 0d 0d 3c d4 72 41 c1 63 95 85 97 21 62 a1 0c | 98 62 73 cf ff 81 3f b1 d6 5b a3 17 9c bf 13 ea | 76 47 19 6b ec 4e dd d2 c8 fc 10 8a 93 9d e2 40 | 1a 9a ec ba a4 26 5c 4d 01 9a 6a 47 3b fc ea 48 | 29 30 cf ee 79 66 a8 78 a7 b1 8e ad 2b ce 52 2c | 72 05 7f 8f f6 f4 ff ed 12 0a b1 b7 de 27 bb d0 | 29 00 00 24 42 50 bc e2 16 2b 34 89 d5 4e 59 5a | a4 d3 d2 a4 86 df 60 97 ee fa 90 f6 ad 34 8e f4 | 49 50 59 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 1c 0d 08 a9 24 58 8d 73 8e f2 10 | b3 0d e0 67 52 ae c5 46 00 00 00 1c 00 00 40 05 | 72 a5 1c 62 b2 bc b3 f0 fe 77 e1 0e f2 db 46 ae | 09 80 33 7f | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a34e10 | #454 spent 0.0982 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3e f1 41 2a cb 15 91 c1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #454 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #454 | rejected packet: | 3e f1 41 2a cb 15 91 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #454: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0586 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a88140 | handling event EVENT_RETRANSMIT for parent state #455 | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #455 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #455 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49696.282158; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008149 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a34e10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #455 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 "road-eastnet-nonat-203" #455: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #455) | a6 08 27 1f 75 50 39 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 c7 bc 11 60 3e a6 9a 85 6d e5 42 37 d7 18 00 | 0c ea 15 92 bc 93 3a fa 4f c0 cd 9b 9d 21 1a ec | 13 f0 fc 0b a2 84 9a a5 b1 57 c2 a8 ab 33 a5 7b | 04 ac cd 61 b9 a7 e2 6f b1 9a 56 b1 3c b1 a4 2e | 8d 80 e0 ac 78 ee b2 78 51 00 d0 a0 eb cf 06 35 | 9c 7e 2a 73 b1 56 cd fe b7 d8 9d ab 84 62 9b e7 | ab 4d 04 16 06 c3 1a 9c 88 af e1 4b bd a0 09 ac | fd 8a ba 51 00 10 a1 a7 a6 a2 56 74 b5 9b 53 af | 87 60 09 5b 74 75 e3 41 f8 3d 7a cf 0c 36 f7 ea | aa 1b 05 8b 54 d5 b2 e1 fe 9e d4 4e f4 ae 74 22 | 98 23 25 ba ff 74 27 da 25 81 74 09 8c 6b 8b 69 | 54 dc 62 05 8c 02 be b4 b0 c4 25 43 18 99 9f c3 | 41 7e c1 29 f3 a3 60 75 de aa 26 bd a3 38 8c ad | a8 31 89 d2 48 90 d9 19 ce f4 34 9e 9d e7 1c e9 | d3 7f ee 85 33 84 75 6d 04 5b b4 a0 96 a6 93 65 | 8d 1c 3a f8 14 81 03 4c 63 f4 25 e5 59 99 ac 86 | 29 00 00 24 6a 39 a6 75 f8 f4 82 47 b3 0b 2e 10 | f3 31 67 d9 88 26 9d 5b f1 75 40 6b 34 32 86 bb | 7a 07 84 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 cd df 41 37 6e 2d fc 1b 29 38 8e | de fc 0c a0 44 c7 44 d5 00 00 00 1c 00 00 40 05 | 6e c0 59 83 50 2c 8a cc c5 6e 0a 98 ab 1c 00 ee | ff c6 95 31 | libevent_free: release ptr-libevent@0x7fb364034150 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a88140 | #455 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 08 27 1f 75 50 39 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #455 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #455 | rejected packet: | a6 08 27 1f 75 50 39 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #455: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0427 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35400f1f0 | handling event EVENT_RETRANSMIT for parent state #253 | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #253 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #253 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49696.290553; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007229 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a88140 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #253 | libevent_malloc: new ptr-libevent@0x7fb364034150 size 128 "road-eastnet-nonat-1" #253: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #253) | 54 6a b3 63 15 2d 54 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 a1 ec de cb a0 5d c1 1a bd 04 af 6b c8 65 41 | 5e 52 49 f5 a0 69 ab 28 22 ed fc 77 d0 a0 c1 09 | 24 c3 68 ac f8 52 b1 01 40 3f 24 70 5d fa bb e6 | 18 17 b8 60 62 5c 25 b7 91 1b 32 be a8 33 c7 03 | d3 9b 4d ca 93 cb 69 27 56 25 f1 0e f0 75 9b f1 | 6f a5 25 09 c0 56 aa ed be 25 e6 7b 20 95 b5 00 | 7f 1a 1b 09 1c 04 5e 80 38 55 80 90 08 7b dd ce | 4f 11 1a be 0d 38 69 ab e8 df ca 75 0d 3f c0 1b | 66 36 7e b8 6f b9 34 13 07 77 35 27 1b 68 f3 4e | 59 d6 7e de a5 ba 53 3b 79 89 bf fd cf 6b c9 05 | 32 48 47 96 e8 02 b8 8c 85 5e 07 cf ed 73 28 31 | 7f b0 4a 57 00 7a 0b 42 b6 34 c6 f8 0c c3 11 82 | b9 52 df 83 77 94 ac c4 6e d0 af 9f 9c 46 4a 9d | 6a 59 79 91 e9 aa 6f 46 f9 bf 64 56 57 97 6b ca | 02 fc e7 a2 5d cb d3 e6 be 89 40 eb 8b 5f bf bb | ea e1 78 af e4 9a d6 bc 8f 45 8e 59 45 6b cc 3f | 29 00 00 24 5b 81 82 6a 34 1f 0c 89 b3 0b 07 6c | d0 e3 bd fa b4 1c af f3 18 56 94 10 92 25 11 f0 | 48 f8 d2 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 79 2b 18 11 0c 23 de f4 d0 de e0 | 77 97 22 a5 08 48 2f ff 00 00 00 1c 00 00 40 05 | c8 d4 47 db f6 e8 46 67 19 87 ae df 18 10 c7 ab | 9f a6 71 f9 | libevent_free: release ptr-libevent@0x7fb35403a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400f1f0 | #253 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 6a b3 63 15 2d 54 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #253 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #253 | rejected packet: | 54 6a b3 63 15 2d 54 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #253: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b246c0 | handling event EVENT_RETRANSMIT for parent state #456 | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #456 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #456 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49696.388899; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008138 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400f1f0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #456 | libevent_malloc: new ptr-libevent@0x7fb35403a770 size 128 "road-eastnet-nonat-204" #456: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #456) | 9d 73 90 c6 28 50 00 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 3f ed 93 2c 95 9a 36 92 4d 4f a2 60 c1 a4 c9 | 4f 89 23 1f d1 62 f5 78 d3 b5 53 89 10 3d be a6 | 0b 7e 28 8a f8 9f 39 90 86 39 f9 58 de b8 41 b5 | 4e b5 7b 74 44 63 cc 49 07 82 fe 85 49 2e bc 7a | f9 73 7c 32 a7 c0 6d 69 27 6b 58 3d ad d1 e3 ec | cc a2 3b ff 29 b9 68 35 71 ee f8 63 67 14 1d 54 | bd cd c0 94 2f 62 7a 35 f4 12 35 06 31 ee 52 8b | 29 f1 3d 4d 88 53 c4 ee a1 13 19 c9 95 9c 3a b3 | 01 50 95 2e cb 29 cc 04 53 67 66 58 33 78 91 44 | bb 06 02 b6 52 69 e1 7c 4a 36 de 14 7e d4 42 89 | da ed 12 fd e2 7c 6b 02 ab fa 82 91 36 f1 eb 4f | a3 22 e5 0e 96 4e 45 d1 d5 c3 b4 13 59 96 05 fe | 42 25 83 c3 8d 08 66 f5 9f c5 f5 d6 78 e8 30 c4 | 64 8d 48 0b ea 1f e9 05 9f 8a 0b 97 9c 51 d8 74 | a8 a9 43 c8 84 d8 11 55 a3 8c 0b ac d0 92 1d f4 | 61 b1 7f 3d f8 aa 52 a8 9b c7 bf 12 0c da 76 e4 | 29 00 00 24 6d 34 cd c2 13 6b 2e 99 a8 cb ee 2a | a0 eb 8c a9 1d 65 aa 5b 5f 82 85 1d 0e 9e 60 f1 | 7a ed 45 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ef 03 64 ba 5e b8 36 8b cc 07 48 65 | d5 6f 6e 8b 3d 6d 57 bb 00 00 00 1c 00 00 40 05 | 07 ad 51 48 59 7f 26 2d fc 42 e0 9c c0 43 00 49 | 58 00 de b8 | libevent_free: release ptr-libevent@0x7fb34c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b246c0 | #456 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d 73 90 c6 28 50 00 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #456 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #456 | rejected packet: | 9d 73 90 c6 28 50 00 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #456: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0502 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25c40 | handling event EVENT_RETRANSMIT for parent state #254 | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #254 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #254 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49696.545371; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008156 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b246c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #254 | libevent_malloc: new ptr-libevent@0x7fb34c035930 size 128 "road-eastnet-nonat-2" #254: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #254) | b9 c6 03 da 3d 1b ba 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca 92 e7 94 15 6c 86 1d 96 e8 8f 04 2b 4c 31 1c | f2 c3 f1 85 7b fe b5 54 f7 1b c1 2a 4c 6d 01 5c | 34 19 7c 9d d1 b6 95 21 d0 08 d9 67 bb dc e0 e1 | 38 6b 59 b4 76 fc 39 ee a0 2d f2 f5 62 c4 0a 49 | 6b 3c f0 00 22 80 8c 1c 36 99 55 b9 ef cb 76 99 | 5c 12 4c 07 84 ad f5 48 ab 42 10 f5 2e d6 e5 5c | 9d d4 b0 9f 16 b4 b4 bb b3 53 f3 e9 cc 93 ad 3b | a8 c4 f0 7f 9d 9d e3 f4 df 44 9c 28 b2 72 cb b6 | 4b 6a f0 9c 2e 22 ce 4f d0 b2 c9 a3 7c 48 1e 03 | a8 3d 92 67 11 0c a8 c0 fd 76 08 be 4f 01 6d 12 | 3e 0b 87 da bc 3d 45 99 0f 30 cb 9d 8c 96 4d 32 | 07 37 42 c8 ca 8d d9 f2 2b 81 33 b1 a2 49 5c 82 | 69 0d 94 76 f5 ef d0 bf fa db a3 8e db 15 f4 34 | c3 81 4c 6a 47 45 9d c9 09 00 1e 8a 46 70 b4 51 | 30 c0 17 29 a6 05 17 9f 61 e3 d5 9e b5 26 aa b7 | f8 4d 8f 98 15 36 79 53 4c 2f e1 9e 49 63 a8 23 | 29 00 00 24 b7 98 fa 02 fe fe ce ce 94 a2 bc d0 | 60 0d 7b 30 0c f7 48 0b 72 92 ee ec 3d 65 36 1c | 6e c0 df 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3a c0 39 9e 3d 58 28 13 41 2f 06 c7 | b4 3e d7 c2 8d 41 7c 7d 00 00 00 1c 00 00 40 05 | 08 0f dc c4 71 f2 0f bc 45 99 87 81 91 93 b1 3d | 30 5f 17 8f | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c40 | #254 spent 0.354 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 c6 03 da 3d 1b ba 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #254 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #254 | rejected packet: | b9 c6 03 da 3d 1b ba 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #254: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.123 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37802a9a0 | handling event EVENT_RETRANSMIT for parent state #457 | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #457 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #457 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49696.568985; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007296 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c40 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #457 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 "road-eastnet-nonat-205" #457: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #457) | 3d e3 b8 80 8f bd c5 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 7a cc 82 1e 2d 53 a5 ce 9e 27 c2 26 66 c5 e9 | ca b7 3b d7 b3 d5 8f c0 1e ac 61 93 25 30 44 75 | 16 7f 86 32 17 98 9b b2 bd a4 40 62 a6 0f f6 2b | b1 e8 33 29 3f 84 59 09 aa bb 5e 2f cd e9 1a 72 | c5 38 7c e2 59 e4 bc cf cc fa da 23 96 75 c1 c7 | ad fb a2 86 e8 bf a6 3f 1e fe 2b 41 b8 4f 8a 8f | fc 26 0a 24 5a dd 02 29 13 7a b7 2d e7 62 32 f3 | 6a 17 ae ce 85 51 34 8a 1c 60 c5 a3 0d 63 33 17 | b8 03 02 91 41 6c de d7 2a b4 05 f1 63 80 c5 fa | a4 93 75 6c e4 d1 6b 22 4b c0 ed 28 67 a9 70 75 | f9 13 92 e4 11 7c 99 29 38 c0 6b 83 36 d2 38 17 | 99 86 23 65 2a c3 af 64 bb 12 ca 10 15 c7 5a 01 | e6 2f f0 2b 77 e0 ac b3 ec 7b 00 6e 19 4c 17 4e | c2 c8 73 f2 63 d0 16 98 d3 38 a7 f8 87 36 2b 60 | fd b1 1f f7 a9 42 1c 9e d6 33 ef 51 73 04 4f 2e | c1 59 d4 cb eb 88 5a 87 9b 61 94 46 2e b3 5e 3c | 29 00 00 24 bf 42 01 47 80 24 bc 54 c5 78 43 68 | 88 cb 29 3a 9a 04 f3 2d 0c c7 ac f0 bd ad b4 35 | ec c6 0a 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 d2 27 5a 8f 21 c7 36 56 bd fb 12 | 29 e7 69 7f 19 4f 04 f7 00 00 00 1c 00 00 40 05 | 06 c5 63 f1 7d e9 6e 2f 88 1f 75 73 67 c0 d5 c5 | dc d6 be 87 | libevent_free: release ptr-libevent@0x7fb37801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | #457 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d e3 b8 80 8f bd c5 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #457 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #457 | rejected packet: | 3d e3 b8 80 8f bd c5 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #457: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0649 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac69c0 | handling event EVENT_RETRANSMIT for parent state #458 | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #458 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #458 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49696.664394; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005684 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #458 | libevent_malloc: new ptr-libevent@0x7fb37801a4e0 size 128 "road-eastnet-nonat-206" #458: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #458) | d8 20 9c 76 6a 13 05 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 f8 70 4a 7e 5c d3 77 41 08 04 2a 79 b8 78 55 | 9f 63 d7 1f d9 bd 04 73 e8 de 1f e6 51 71 d1 c1 | 71 09 97 4a 5c 16 68 a0 aa 69 e9 b4 93 ac ba f6 | 92 85 87 a8 c8 1f 88 3f 36 bb 45 8a 62 53 f9 71 | 32 e3 0c 69 bc 64 74 29 df 76 29 f7 54 0a d6 9e | bf f9 de ca 92 41 8b 95 09 7a 0d 5d 50 17 4e 54 | 40 99 d8 f9 ca e7 ca c6 0c af 31 22 59 39 c6 0f | c7 31 f1 5e c9 b0 5a 0c c9 3f c9 f9 d7 bd 4f d2 | fd 98 c7 19 a0 f3 e9 01 16 f3 fe 75 35 59 15 08 | 13 ea cd 50 33 e8 15 ab 01 f5 9e c1 43 d2 27 90 | 39 d5 e2 89 77 57 ec 66 ab 2d 6c 09 fc 1d 8f 1a | 62 91 d6 59 58 86 af 9e fa f2 4d 80 b6 39 ef 93 | e4 aa 9e 6f 49 aa 2c d4 54 59 f2 01 66 25 3e 6c | 9e 0b 06 28 b9 af 2e bd e7 a4 57 6f f0 5b 4c cd | 6a 03 04 af 85 10 e3 f2 17 ad 37 f3 24 3e 66 fb | 27 c7 a1 c5 2e 32 66 c3 94 bc a6 2b 60 cb 4f f9 | 29 00 00 24 33 eb be f2 9e 94 9d 08 4c d8 00 c2 | f8 2c a4 ef 00 e3 f7 7a 62 72 9a 99 65 d6 f3 0e | ff c8 b6 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 01 77 97 bc 56 25 23 ed d6 15 51 | 7d a3 3f e8 c0 74 6b cf 00 00 00 1c 00 00 40 05 | 8f 1b 57 d9 1a 63 f1 b3 99 7b 22 3d 44 e6 21 51 | 1c 41 cc 24 | libevent_free: release ptr-libevent@0x7fb36c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac69c0 | #458 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 20 9c 76 6a 13 05 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #458 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #458 | rejected packet: | d8 20 9c 76 6a 13 05 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #458: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0485 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368040840 | handling event EVENT_RETRANSMIT for parent state #255 | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #255 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #255 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49696.691676; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007081 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac69c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #255 | libevent_malloc: new ptr-libevent@0x7fb36c035930 size 128 "road-eastnet-nonat-3" #255: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #255) | b4 62 7d 49 a4 92 20 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 95 bd 0c ae 75 b5 e3 ef c4 cd 00 43 ea 3e 9a | 02 ba 07 e1 c1 bd 5d f0 a8 a6 51 3a 4a 21 e5 46 | 19 59 a0 93 a8 07 b1 7f 53 68 e9 d8 63 85 c8 12 | 71 98 74 63 ac c1 5d a5 39 9f c3 9e 95 82 52 3e | e1 41 18 21 d4 2e 9c 8d e0 71 8e d0 6d 4b 68 7e | 1c df fa cf ed ca 99 59 64 68 ed b3 9c 61 13 df | 2f ad b1 5a 3f dc 76 f5 58 69 91 b1 8b 83 c7 6f | 0b 08 55 fc ba 8b aa 73 16 1a 51 59 6d 0d 21 1f | bf 66 60 21 f1 49 bc 92 8c 9a be 6c 52 be 72 e6 | 19 b6 47 f8 33 cc b5 e6 ed 41 53 62 da 9d 6d 34 | fc ee 0f bf 23 f3 09 d7 96 22 fd c9 6e c0 31 60 | 95 22 90 57 96 ed 6a f6 05 50 b8 1b 34 71 5d dd | a7 c1 ab 82 e5 96 d7 d0 ac 36 1c 30 9d ee a7 97 | 6f 15 b5 89 4e c4 f6 f6 b5 08 23 bf cb 9e 75 f3 | f9 e0 ea 95 d8 eb 73 6d e3 2b 25 8d e5 17 c9 6e | f4 0f 23 e9 e4 7e dc 78 3c ae 82 7e 2a c2 1f 84 | 29 00 00 24 27 f0 79 05 ca 38 9d 60 17 70 37 05 | 8f c8 d2 c0 f8 4f 0f 05 b1 d0 9d 9d 43 88 90 d5 | 2d 20 4e 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 58 2d ab c5 84 ac e3 ea 3f b2 97 06 | b2 08 24 4c 91 11 e0 2a 00 00 00 1c 00 00 40 05 | ca ca c2 3f 11 62 54 7a 69 58 46 70 0a 1d a0 10 | 47 7f 3a 1d | libevent_free: release ptr-libevent@0x7fb3680345d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368040840 | #255 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 62 7d 49 a4 92 20 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #255 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #255 | rejected packet: | b4 62 7d 49 a4 92 20 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #255: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.069 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a276e0 | handling event EVENT_RETRANSMIT for parent state #459 | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #459 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #459 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49696.790071; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005845 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368040840 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #459 | libevent_malloc: new ptr-libevent@0x7fb3680345d0 size 128 "road-eastnet-nonat-207" #459: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #459) | 64 1c f9 72 57 02 e5 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 f4 91 af e8 cc 47 24 c2 b5 4c 3e ed df 87 0c | 09 e0 4b 07 1e 23 c5 7e 86 e2 5a ab 7d 41 06 3d | 7f 7d f9 8e b6 58 c8 fa 4a e7 6e 59 bd 9e 19 5b | d0 22 36 6d 62 9e c7 d4 0e 8a 77 c0 e4 05 9e c6 | 38 14 50 50 10 9e e8 30 b1 17 07 a8 ec 87 4b 21 | 15 4c 43 ee b6 9d 8d a1 9c 18 3d 34 43 97 8f 77 | 9a 8e 35 11 77 6c 19 4c d5 d6 10 76 41 7d 92 29 | ce 7e b0 f8 dd e1 3c da bd 28 65 ea 34 c0 d5 5e | 87 61 2d 03 e2 eb 39 88 92 b2 21 9a 8c ff 81 cd | e0 87 95 3d 88 8d a2 1e 66 0d db a2 7a 79 4c cc | ae 9a d3 e6 87 6a 1b 78 ae 44 bb 23 8a 41 53 1f | af 3f 42 6b ff 45 a9 da 42 e2 38 bd 4c 50 bf a8 | 3b 16 b5 57 9a cf 28 d9 88 40 31 6e bd 9a 3e 51 | 61 82 b6 d4 f2 88 81 2c 57 c3 85 0c a7 ff fd 6c | ed 2a 14 13 51 d6 b5 56 aa 0c 26 20 25 e3 9c 40 | 12 38 26 e0 f5 9a 6e 40 35 0c 6b 0a 6d b3 65 32 | 29 00 00 24 5c 75 af 9e f8 ea 62 49 48 89 05 1e | 77 92 7c c2 74 9a fc 43 04 bc b7 18 cc f7 58 3d | 9b c8 34 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 7f b1 c0 22 56 8e bd 29 fd 39 4f | 5d 90 ed 84 8a 20 f8 23 00 00 00 1c 00 00 40 05 | 58 59 18 6a d1 74 dc 11 3e 54 b0 34 57 9e 0a 5d | 5a f6 05 3b | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a276e0 | #459 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 1c f9 72 57 02 e5 bf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #459 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #459 | rejected packet: | 64 1c f9 72 57 02 e5 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #459: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0453 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0a940 | handling event EVENT_RETRANSMIT for parent state #256 | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #256 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #256 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49696.828367; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007165 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a276e0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #256 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 "road-eastnet-nonat-4" #256: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #256) | af ff 14 5c e8 87 a5 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1a 1f 56 51 1c ec cd e5 db 48 26 c8 dc 41 fd 54 | a8 2a f3 18 64 e6 88 a2 77 94 ce b8 37 5b 43 37 | 15 71 aa 40 2b 14 32 13 87 73 76 ea dc 9c c2 0d | 5f 66 9f c3 96 de 76 09 50 94 85 73 09 16 fd 60 | e5 22 cf 96 3d 7f 8a d5 69 b3 f6 e0 d1 b6 2a b1 | 46 24 36 96 12 35 a6 66 31 6c fc 27 fd 14 5f 55 | dc 4d 24 0c d2 4a 10 86 34 a8 27 78 27 27 b0 f6 | f0 8d 2e 1b c6 a5 de fc 9e fb ab ed 9f 6c dc 3c | 42 c9 5c a1 4a e3 4a 45 da e8 44 a1 f6 8a 36 fd | f6 c8 42 59 48 f3 30 69 ad 20 74 c3 02 1b f3 f8 | 3b 14 80 5c e4 55 cc fa 49 75 80 37 c4 a0 eb 78 | 5a ba 01 b2 91 5d ef fc 1f 18 54 22 3c e6 ac 42 | 22 26 d6 93 0e 7d c7 67 e5 47 f0 ab 43 0b cd e4 | d0 9c fd 7d 64 aa cd 20 be f3 31 9f f9 fd e9 74 | f6 4d 79 65 aa 69 d2 c1 c0 27 e2 43 4d 23 a2 bd | 81 a0 4b 66 29 06 06 b0 e0 6b c0 d6 29 53 e1 5f | 29 00 00 24 68 30 70 dd 8d a8 3f ec 7e 36 6c 6a | a3 ce 4b 67 03 0b 93 d7 9a 32 93 85 56 0b 5c 0e | c5 0b 8c 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e 28 6b 61 6f db 11 ce 62 1a 99 08 | cd 34 ea 3b 0e 7b 2c f1 00 00 00 1c 00 00 40 05 | f7 c5 67 63 b0 24 3f 1b e9 07 39 23 b4 29 1b da | 4e b1 36 66 | libevent_free: release ptr-libevent@0x7fb3700180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0a940 | #256 spent 0.164 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af ff 14 5c e8 87 a5 b8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #256 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #256 | rejected packet: | af ff 14 5c e8 87 a5 b8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #256: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a84000 | handling event EVENT_RETRANSMIT for parent state #460 | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #460 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #460 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49696.896778; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004679 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0a940 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #460 | libevent_malloc: new ptr-libevent@0x7fb3700180b0 size 128 "road-eastnet-nonat-208" #460: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #460) | 23 48 f5 22 8d 37 9a d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 df d9 22 d0 fa 01 d1 aa 88 df 6a 8b 18 c0 09 | 4f 5b 80 db c5 12 8b 47 ef 35 50 bc b0 af 99 c5 | f9 cf 10 a6 63 8f ba 03 da 7f 0b b3 54 11 ba 9c | bb 06 80 77 61 12 b6 fe 2b bb 2c 7d 23 ed 7a 74 | 17 31 cb cb 95 4c d6 8f 31 04 dc 07 37 df 2d f4 | 1c ed 0c bb 28 ba e2 23 2d 3d a3 b2 fc 6f 50 eb | 56 d2 5b 1e f1 ad 23 2f 3e 55 c4 35 e9 32 f6 24 | 86 b3 e7 fd 04 0f 6f 72 db 37 4f bd d9 fe 64 c2 | 83 ac 83 05 91 73 42 0a a1 0c 3e 29 3c 20 67 b6 | 92 37 23 8d 25 df 18 a0 fa c2 98 93 ab ff 5f 64 | 7c d6 b8 fc 1d 90 5c 26 98 2d 8b b3 56 38 e2 7c | 20 da c8 bf 8d be 1d 6d f8 c5 88 bf 2f 3a f2 41 | 78 28 51 f9 69 ab 11 20 67 51 52 04 40 a5 c7 0c | 37 f0 c6 5d f9 95 c0 b8 47 6e 71 8e 99 56 3a 5f | e1 5c d4 8d c1 97 29 9c 26 a6 ac 65 11 ae 68 ef | 23 72 8e c9 45 c4 63 78 1b 5c 81 47 6e 58 87 ff | 29 00 00 24 25 2a f3 c2 d1 34 f2 28 be 54 0b a4 | 22 e2 98 59 02 dc 2f 37 5b b6 b4 bd 10 49 91 58 | 87 4d 98 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c c8 5d 4c 09 cc 17 d5 22 fc 7b d0 | 43 ae fd 90 5d 04 da 2b 00 00 00 1c 00 00 40 05 | 07 a4 f0 f7 58 53 22 23 25 cf 1a 07 69 10 b8 4a | 16 e3 ac d7 | libevent_free: release ptr-libevent@0x7fb338023a60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a84000 | #460 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 48 f5 22 8d 37 9a d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #460 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #460 | rejected packet: | 23 48 f5 22 8d 37 9a d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #460: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24700 | handling event EVENT_RETRANSMIT for parent state #257 | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #257 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #257 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49696.965067; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00768 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #257 | libevent_malloc: new ptr-libevent@0x7fb338023a60 size 128 "road-eastnet-nonat-5" #257: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #257) | c0 a3 3d d0 6b df 36 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 d4 14 bb a4 26 08 82 2e 68 9d 43 5b 83 0c 36 | 1f 55 d2 1d bf 09 8f 68 0a 80 73 cf b9 a3 3e fb | 4d 3a 5e 68 e8 aa 15 71 f7 e6 60 e6 9e 7c a9 b9 | e4 7c a0 fd c4 92 d3 66 8d 75 86 7f 7f 0a c5 42 | be bb d7 8c fb b4 ab fa c5 83 64 ff dd e6 56 27 | af 9a f1 86 53 58 3b 72 b7 e4 76 4e c9 2a af 68 | 0c 7e 9d bf 26 26 ae 59 6b f6 99 f5 1c 3d 32 4e | 8e a7 43 0e b2 0c 7f 5d ea 3a c0 50 3e 6f 7e 61 | fc 39 14 9d d7 51 ad 13 b2 22 e7 6c 3e 75 0f f9 | 50 5f 45 31 fb b6 64 15 77 12 e2 82 5e ea a6 ae | e9 ef 71 7b ce a0 63 c0 ec ed c4 35 36 4d 8b ac | a2 1c 05 95 aa 9f 05 c7 da bb 7e 2c 1b be db 0a | e1 a0 b3 b2 bf 79 ee 31 3e 48 4e 05 00 26 ce 87 | 2f 0f 18 80 43 59 d6 73 3e f5 b2 95 2a 4d b8 2d | f4 60 f9 1a 76 3c f3 63 33 e3 37 34 73 88 ed 64 | 6c a7 75 12 ca d0 e5 a3 5b 68 0d 46 dd d7 61 2d | 29 00 00 24 ee 5d 7d 66 4d 0b a2 50 89 9d 46 31 | 30 20 ae b6 b5 b0 95 a5 d1 00 de 3b e5 de 68 17 | ec 12 56 79 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 5f 0f 32 08 df d5 f3 1e 89 e0 00 | bf de 72 4a a1 a4 e7 89 00 00 00 1c 00 00 40 05 | 60 f8 1e fb ae 99 6b 12 d7 c7 12 5b 86 70 02 5c | 5c f6 f1 68 | libevent_free: release ptr-libevent@0x7fb3500180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24700 | #257 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c0 a3 3d d0 6b df 36 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #257 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #257 | rejected packet: | c0 a3 3d d0 6b df 36 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 05 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-5" #257: ERROR: asynchronous network error report on eth0 (192.1.3.5:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad5900 | handling event EVENT_RETRANSMIT for parent state #461 | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #461 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #461 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49696.998375; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006501 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #461 | libevent_malloc: new ptr-libevent@0x7fb3500180b0 size 128 "road-eastnet-nonat-209" #461: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #461) | 30 e3 71 39 78 d7 e3 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 73 72 eb a6 69 8c 9e 08 28 d6 16 78 8b f3 f1 | 10 b5 c6 3e 5a 68 ff ee f8 e9 ea 04 9a 96 07 cd | 19 7e 01 3e f6 8c ec 23 90 c5 34 cb 27 e1 d9 f4 | 83 f1 52 a0 20 79 82 b5 63 bf e3 1e 4c 8b e6 11 | 56 0c 8d 37 3e 34 a4 1e 35 3f f2 4f c6 52 63 33 | 1a 19 3a f7 47 1a 58 cf 14 be b6 13 3a ba 6a 7a | c2 7e 4a 7c 6b 24 bd 5d d6 f1 53 6b d9 1a c9 0e | b4 0c ad ca 0d 87 78 f9 58 81 24 7b 64 ae 92 0f | 11 e7 db e4 1c 12 40 ed e3 44 f4 22 a9 cb c8 e8 | 35 d2 0f 26 8c e9 f0 bd 79 b3 71 e1 56 b6 c2 ad | c3 25 0b 24 c0 9d 7c 39 2c c7 c4 5c 79 bb 71 e2 | 44 92 14 47 75 57 f7 30 ac 8e 27 b4 ce 61 8d 65 | 5b 3f 84 a2 85 6e ec 1f 9f 60 e7 ef bd 5d a7 fa | a6 23 27 f3 06 ac 82 f0 e3 4d 76 a2 d3 e2 92 c2 | 69 39 39 eb 52 01 f2 b3 9d c1 f3 c5 d2 36 e4 c6 | 40 e0 76 99 a0 7e 6e 0f 65 8c da 02 f1 c2 ad 1e | 29 00 00 24 90 76 1f 57 9b 42 3c 9c 17 4b 00 94 | e5 bc 1a a6 9f 85 30 49 d6 5f c0 4c ce 00 c3 85 | 0f 0e 5c ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 76 5f 86 b3 2d 97 ef 5b 1d 05 17 | f4 c4 b8 ec 0d 36 f1 03 00 00 00 1c 00 00 40 05 | 57 06 a0 ca 17 47 48 ab cc 80 4d 50 ec 37 d9 01 | a5 d0 9e bc | libevent_free: release ptr-libevent@0x7fb34c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad5900 | #461 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 e3 71 39 78 d7 e3 f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #461 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #461 | rejected packet: | 30 e3 71 39 78 d7 e3 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #461: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0898 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350014cc0 | handling event EVENT_RETRANSMIT for parent state #258 | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #258 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #258 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49697.033789; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006573 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad5900 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #258 | libevent_malloc: new ptr-libevent@0x7fb34c0300e0 size 128 "road-eastnet-nonat-6" #258: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #258) | f2 0a ee 39 57 38 66 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e2 84 a5 7f 13 c6 d5 f4 de a1 59 9b a0 a0 80 f1 | 2f 8b 06 61 d1 0f de 44 77 49 a3 76 3f 11 11 d4 | ab 9b 3e 8d 7f a0 dc 2b 42 28 86 6f ac 5b b2 c2 | 4e 03 12 4c 72 0a d1 f2 0b 69 dc 3f 47 15 b3 66 | 0b ed 38 4d 89 9d b6 26 e5 44 a2 c8 18 05 1d ea | b9 5a 63 00 12 16 1b 15 c7 6e b8 4d 60 58 cc f0 | 35 6e d0 c1 0c 7a 3b 52 20 a4 ce 3e e5 c0 cc 56 | 65 b1 16 d6 43 c2 be ea b5 3f 07 6c 04 df 3c 27 | ca 5b 39 2e f2 76 09 d5 9a 31 cd f8 a0 9b 56 3c | 42 b3 87 82 b1 01 3e ef 89 15 5a 1d 00 90 84 19 | 5b 3d 7c ec 45 07 76 99 d3 04 39 db f5 94 ae 9f | 9a 24 93 91 e4 3f ad 43 d2 f2 74 b3 73 89 3f f4 | ac 15 1c 07 3d d0 3a 58 a4 bb b4 b2 b0 c3 65 db | c7 15 7a 2b b3 96 c2 16 55 b0 f5 86 dd bf d9 cf | 01 e1 ae 2e 78 f6 40 62 df cc 04 cf 9d bd 05 f9 | 5f ef 7a 44 a4 51 1c 3a 9b b4 7d 0d 94 46 3e a1 | 29 00 00 24 25 6d bb 73 f8 76 14 9e e8 94 3a 77 | d7 da 85 ed f6 46 fc 67 4e bb 29 38 0b 6c 4c 96 | c6 a5 48 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da 43 d0 a7 5e 1e 6a 3c 4c 0b bd b4 | fc 0a 0a d4 c2 f3 96 56 00 00 00 1c 00 00 40 05 | 20 be 8b da 4d a1 7e 30 5a c5 49 1f 20 a4 27 d3 | b3 85 6c 0e | libevent_free: release ptr-libevent@0x7fb350029650 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350014cc0 | #258 spent 0.159 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 0a ee 39 57 38 66 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #258 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #258 | rejected packet: | f2 0a ee 39 57 38 66 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 06 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-6" #258: ERROR: asynchronous network error report on eth0 (192.1.3.6:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0677 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350040840 | handling event EVENT_RETRANSMIT for parent state #462 | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #462 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #462 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49697.072155; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007213 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350014cc0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #462 | libevent_malloc: new ptr-libevent@0x7fb350029650 size 128 "road-eastnet-nonat-210" #462: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #462) | b3 aa 18 e3 bb 76 cd a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 e1 dd 76 b8 92 08 2e 86 ea 59 23 d7 a8 a3 c4 | 10 20 64 4d 1a 6e f6 be 88 38 70 1d ff a1 81 97 | 56 46 d0 11 ce c6 71 4d d3 b8 e9 f6 8f 98 00 29 | 10 68 fe 2f 6a fe 59 74 05 66 7b 78 d6 d0 be bd | fb fc 90 3b 61 ee 5a 02 67 1c cb 53 c4 30 e1 1c | e1 cf 60 fe b2 ba b8 12 9c c1 21 b7 9c a2 2e d3 | f2 85 29 0d c8 10 98 b2 a9 8d 09 29 1f fe 72 bd | 6f ac bd 80 e6 e9 9d 07 a0 84 25 09 ab 49 d1 fc | a4 e5 0d 0e 5a 9c 8e d8 0e 96 4d 74 82 a0 b4 18 | 38 39 81 2c 56 26 db 6b e0 e9 32 19 24 e6 ac f3 | 8a 50 27 76 e7 46 84 40 39 2a 33 e3 46 30 98 1e | a4 e6 6f e2 bf e7 be a6 d5 b2 77 f8 b0 8c 25 cb | 3f 99 0a 63 88 e2 f4 8e b0 ed 00 10 7f f7 a6 31 | 7b da 9a 1a 53 83 49 e7 c5 ae 8b 25 41 9e cd 02 | 64 ab a9 c7 ab 71 01 ef 57 dd 6f c5 35 5b 12 e5 | 9c 28 f2 35 96 11 0c e1 05 5e 94 47 29 58 9d 96 | 29 00 00 24 9f cd 6b 85 44 66 e6 2e a2 be db 56 | e9 91 ac b0 be 57 bf 5f a7 03 66 4a a0 9b 90 be | 3c 13 94 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 1b 11 78 68 c9 76 e3 37 8a 0f 7e | ca ac 37 4e 36 55 96 e1 00 00 00 1c 00 00 40 05 | 75 7d 89 5c 82 a5 9e b6 a0 43 f2 ed 22 d9 e8 25 | c0 74 c1 73 | libevent_free: release ptr-libevent@0x7fb3500342b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350040840 | #462 spent 0.234 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b3 aa 18 e3 bb 76 cd a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #462 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #462 | rejected packet: | b3 aa 18 e3 bb 76 cd a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #462: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0977 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #259 | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #259 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #259 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49697.135652; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006495 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350040840 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #259 | libevent_malloc: new ptr-libevent@0x7fb3500342b0 size 128 "road-eastnet-nonat-7" #259: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #259) | 69 c4 5c 94 f6 f0 24 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe b3 f9 68 3e 85 57 5d 74 26 b7 37 f5 c1 1c c8 | a9 30 6a e1 51 a4 0f d5 ca 35 4b e9 d0 ec d0 ea | 11 06 1a ad 0a 7c 08 a4 ce 70 10 ef b2 c9 82 43 | 06 fb 99 b0 99 d2 5d a2 87 5b cd a0 9b 7d 7a a3 | 30 f9 78 c0 d7 43 6f f3 cc 53 5a 43 25 d8 61 04 | 58 03 b6 71 c6 21 93 59 b3 7c 3f 84 50 6d 48 95 | ef b8 dc 96 69 dc 88 98 10 47 21 0a 3d 72 57 34 | e5 bd d9 b3 4a 55 2e bb 34 64 f1 be 1c 6f f2 7e | c5 4b 83 c8 2c d8 e9 41 02 95 ff 83 96 69 c2 56 | 98 1b 20 30 7a bc 8b ab ee 27 a0 89 22 93 25 c7 | d2 f1 b0 c8 12 06 e6 8d 9a d7 bd fc 06 14 66 23 | 65 ae e6 9e 37 44 0c f0 0e 0e 78 09 b8 a3 32 c3 | c6 25 1b 97 0b 77 db 90 b8 16 58 5f 15 d2 40 fe | 1c d0 5e e3 88 05 3b ef bc 19 2c a9 73 97 03 9a | 26 fc 47 8b 95 24 fe d4 39 f2 65 5a 9f ee 0c cf | 1a 9b 03 45 52 42 61 4d b6 e7 aa 2c 0c 37 c0 61 | 29 00 00 24 c4 2f 3e 0e 76 3e 59 e7 3e 5c 53 28 | 43 02 fc a9 7a 2b 47 13 2c c2 eb 53 3e b5 40 d1 | 94 dc e6 02 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 11 85 30 eb 64 9e 84 09 e0 70 76 01 | 65 fa d3 ac 84 56 a3 b4 00 00 00 1c 00 00 40 05 | 64 83 da b1 99 b6 d9 28 72 08 34 2c 77 b4 36 a0 | 74 09 78 83 | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #259 spent 0.204 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 c4 5c 94 f6 f0 24 cf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #259 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #259 | rejected packet: | 69 c4 5c 94 f6 f0 24 cf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #259: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0839 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_RETRANSMIT for parent state #463 | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #463 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #463 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49697.201165; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006135 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #463 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 "road-eastnet-nonat-211" #463: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #463) | 82 4f 79 37 d2 0d 41 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 90 64 a0 3a db 52 d6 c6 b4 21 5d 30 95 90 4d | ec 3e 65 f9 a3 2a c0 c0 7d e8 b2 f7 1e 08 f4 cc | 30 5c 17 eb a6 d5 4e 6e 17 f4 ed c0 bb f3 91 4e | 29 c8 3b 87 04 44 02 f9 0c 4c 73 bd d1 0e d4 bf | c3 01 38 a2 ee a1 61 19 01 62 c9 01 0a 14 69 dd | 59 d3 14 b1 8b 13 6d e7 0f 1d 11 59 11 9b 90 f3 | aa 66 ef 87 af 13 48 7f 6e c1 0d b9 f9 71 ad 9d | fd 12 e0 bc 30 d7 16 13 c9 f0 f8 64 57 36 fa 5b | d1 d8 74 64 e5 de 63 84 ef e1 12 12 26 93 3e 5c | b3 7f 8e 2c 1b eb d2 40 f2 01 5a e7 a8 30 ce b1 | 5c 5e 42 a8 26 40 52 c4 dc ea 04 68 87 26 50 e6 | 46 ae 37 b9 e4 fe 3f ef f2 8e a4 4f 04 25 af 76 | c9 39 80 05 08 fd ea 60 66 c5 24 89 72 f4 32 ff | ed 8b 39 48 50 c3 c4 68 91 e7 fc 82 bb 80 ce 9d | b8 47 ce dd c6 cc 21 8c 6f 88 e2 73 75 00 d9 09 | 84 88 f6 ce 7e 64 f7 42 86 d8 a7 50 3c 43 db 24 | 29 00 00 24 4c d8 7a cc cf f5 14 f0 01 a0 b3 f6 | 54 e1 4b f5 78 b9 2e d9 dd c8 bf f8 13 79 83 13 | b9 47 db df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 0d e0 3b 3f 2d f3 17 7e c2 11 72 | 87 7f c1 e4 a0 63 0f 3f 00 00 00 1c 00 00 40 05 | e9 2f a4 cf 6a af 14 cf 3c 1b bf 7a 8b a2 e8 94 | b0 6c 66 23 | libevent_free: release ptr-libevent@0x7fb36802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | #463 spent 0.185 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 82 4f 79 37 d2 0d 41 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #463 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #463 | rejected packet: | 82 4f 79 37 d2 0d 41 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #463: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0419 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3500300a0 | handling event EVENT_RETRANSMIT for parent state #260 | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #260 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #260 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49697.23949; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007677 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #260 | libevent_malloc: new ptr-libevent@0x7fb36802a950 size 128 "road-eastnet-nonat-8" #260: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #260) | a8 de 56 29 b7 d6 fa 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 e3 e7 0b 5e 0a a2 78 28 90 d4 10 18 db 3b 08 | b2 da 89 a3 10 0a cf 73 47 c7 8b 62 54 ef 17 0b | 52 d6 fe 33 62 21 4b 61 30 79 d1 82 82 85 ea 34 | 5e 16 ec db dd eb 97 56 18 30 74 8c 1f 6e 05 89 | 21 09 2b 1f b9 bc b7 45 38 93 12 7a 5d 44 53 c4 | 90 d3 d5 13 c2 0f fd 6b 37 3e 25 38 05 ed f0 2b | cb 0f 13 a8 c7 9b fe 60 00 1a 65 af 42 72 d4 bd | f1 07 94 0e 72 26 91 81 83 ee ff ef 41 c2 92 80 | a0 7f b9 6c 1f d2 e5 4b 34 fe 68 33 41 4d c0 3b | fb 7e 82 89 76 4f ab b4 81 d9 20 1a 79 fa de 75 | 7d a8 cd 19 c4 08 7c dc 7d 50 74 8e 78 b5 b3 64 | 8b 8f bd fd e8 f9 24 be 78 a0 45 9f 10 40 3e e1 | 49 ba 58 e8 63 d1 38 81 0c 79 61 75 c1 98 81 43 | 9b e0 a1 0d fc da 35 4b 0e a9 e1 35 63 d5 73 64 | db 23 3e 1b a9 3a 4e c0 e5 7f 6a ab 90 f3 cd 49 | 1b bf e5 c9 ab 56 60 25 6c 22 94 4d da ff b4 bb | 29 00 00 24 2b a8 af 62 73 94 e5 0a 7f 70 bf f7 | 73 9f 36 a9 cb 1b e2 09 0a 24 49 93 58 be a0 29 | 94 31 83 1c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 87 5d ef 8f 65 c8 58 d0 3b 6f e5 | c6 10 af 28 1a 1c e2 ed 00 00 00 1c 00 00 40 05 | 7a 28 e6 3f f8 c3 d1 0c 25 ff 6a 7c a9 a5 77 33 | 24 34 82 26 | libevent_free: release ptr-libevent@0x7fb35003a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3500300a0 | #260 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 de 56 29 b7 d6 fa 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #260 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #260 | rejected packet: | a8 de 56 29 b7 d6 fa 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 08 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-8" #260: ERROR: asynchronous network error report on eth0 (192.1.3.8:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374013710 | handling event EVENT_RETRANSMIT for parent state #464 | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #464 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #464 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49697.311808; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007399 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3500300a0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #464 | libevent_malloc: new ptr-libevent@0x7fb35003a770 size 128 "road-eastnet-nonat-212" #464: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #464) | 24 23 49 88 e3 09 10 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 3e 00 a4 b1 da ff 66 fb 46 9b f8 05 c4 d3 4e | 1a be d3 c5 f3 29 65 46 ed 6f e5 e1 9c d3 68 c3 | 49 3b 6a cd e8 c4 12 c0 42 a0 22 7e 1b 5d 32 aa | a0 3a 32 c8 92 e5 3d a9 90 26 7c b6 7a 3a c7 43 | 1e d7 d9 ca a9 3b e4 0e ac 4c a3 a2 54 be fa 3a | 34 7b 08 69 76 9f f5 86 6b e1 71 f1 ca f2 34 fb | f0 af 6d c0 e7 4d 86 2c 35 64 d7 a8 e5 56 44 f4 | 1b a3 7b 36 d3 8e bf 68 72 d1 d6 14 19 d5 94 41 | 37 2c 85 dd 26 51 82 12 f9 57 28 f6 64 e4 99 2c | e5 14 14 38 a6 eb 30 83 5f a9 d8 ce 33 ba b5 e7 | 8f 9e 29 5d 17 d7 5f e7 f7 6f 44 97 e9 e3 1d 52 | 7d 6b 40 ae 7e e6 9b 70 f4 e4 cb 6b e6 46 d1 1a | f1 d4 e8 4a 08 7a 73 f5 ae fa 1c 51 b5 c1 66 db | b4 47 cd 7b 34 6f da f9 6b b2 dc 0f 59 56 0e 82 | f9 d8 cb f8 b3 e7 8c 71 cf eb c3 24 d5 a5 32 fc | 19 3b 14 fc 10 5b ac 0b 65 e1 fc c1 26 0d 3c cc | 29 00 00 24 f8 5a 68 e8 8f 04 5e 9b c3 04 25 38 | 2e af 26 bb 12 7b 35 ab f6 8f 9b c1 e5 8b f7 b5 | fb ab d6 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 53 56 65 0c 1b 38 25 05 25 e2 17 | 1d aa de c6 51 81 dc 56 00 00 00 1c 00 00 40 05 | b6 60 c7 67 b1 c7 40 e8 a5 6f 2e d6 dc 92 69 0c | f8 bb 28 2f | libevent_free: release ptr-libevent@0x7fb344014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374013710 | #464 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 23 49 88 e3 09 10 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #464 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #464 | rejected packet: | 24 23 49 88 e3 09 10 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #464: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3800383c0 | handling event EVENT_RETRANSMIT for parent state #261 | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #261 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #261 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49697.343078; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00729 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374013710 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #261 | libevent_malloc: new ptr-libevent@0x7fb344014c70 size 128 "road-eastnet-nonat-9" #261: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #261) | 8b 59 1f 5e 29 ec 79 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 16 bb 69 7b 8c de a9 f0 aa 27 22 0c 50 1e 2b | c0 76 0c 79 99 31 2f f3 35 0b 93 05 6b 25 af d5 | 38 8a 63 51 f1 c7 93 6d 58 cf aa 10 dd 75 1f c8 | 55 42 4b ca 64 4b 8f 25 43 c0 98 a7 58 2f fe 43 | a0 fc e9 fe 8a 4f d9 62 8e db b8 54 42 5d 72 29 | 3d 08 a8 8c 4e d1 f1 b8 76 cf b0 d0 a2 dc ae 18 | 1b 5a 75 da 49 ca 9e c2 09 0d fb 74 50 88 ed a4 | d6 99 da c7 fb 22 1c 94 60 ac 50 76 4c a1 38 f1 | 43 ce 44 aa e7 39 3c 86 9e e1 41 54 48 c3 cb 31 | 48 d9 d1 19 bc cb 0b cc 7d 40 bf 96 af 1e df fb | 0f 62 79 6b f0 8e 05 4f 2e a0 3c cd 46 16 0c 86 | 49 e9 a6 e2 c2 86 c5 8e b2 14 0a be c1 f8 73 ee | bb d0 d9 50 52 32 c3 fa f2 3b b2 ca cc 8c 24 54 | 79 d5 c7 d3 1b 32 b7 28 de dd a1 c3 34 b8 54 c4 | ba 19 90 3e 1a d6 84 33 38 8c c1 45 94 fb 96 9e | 19 4c cd 4d d5 73 7e e1 8a 56 34 ce ca da 7f ec | 29 00 00 24 09 67 1c 9d 6c 7a 1d eb 24 78 5e 1f | a5 24 7e 35 ac a5 c4 f9 a0 f3 f8 63 91 47 e2 76 | a1 4d 73 cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 76 e0 4e 77 d9 cf 89 73 cb 13 92 | b0 28 c4 2a 76 4e 4e 20 00 00 00 1c 00 00 40 05 | 7b 1f d5 2f e3 dc 02 0a cf 5f 34 da 40 53 6d 9d | 9b 7e 60 b7 | libevent_free: release ptr-libevent@0x7fb38000c460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800383c0 | #261 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 59 1f 5e 29 ec 79 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #261 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #261 | rejected packet: | 8b 59 1f 5e 29 ec 79 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #261: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acab00 | handling event EVENT_RETRANSMIT for parent state #465 | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #465 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #465 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49697.405389; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004322 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800383c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #465 | libevent_malloc: new ptr-libevent@0x7fb38000c460 size 128 "road-eastnet-nonat-213" #465: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #465) | 61 8e 23 d2 13 62 a1 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e ff ad a6 69 28 f7 dc 3e 12 16 a3 b8 12 d1 0c | e2 d9 c7 08 64 20 6b 95 e2 f7 13 3f fe 41 07 b0 | 63 aa 7f 3d 77 9f f9 e2 21 16 88 33 88 34 63 be | 66 c4 e1 0f 6d 0e 67 89 ae 7f d4 2b da 09 0e c2 | 3d 5d ed e3 b1 da e4 45 10 b1 c5 e8 5c a0 b7 e1 | 45 c7 74 34 87 11 e9 20 8e bf a9 d5 b7 7f 3e c8 | 87 13 ea b0 4c 38 35 35 21 28 ca 99 cb 90 60 a1 | 8c 47 23 f8 9b b8 e8 b3 af 65 36 19 01 0f 99 db | 11 cb f7 6b 11 70 78 e3 5e f3 08 79 6c d7 3e 9c | aa 63 ab c1 3b 94 5d c4 f5 a3 7c fb 68 79 fd 4d | ad 0f 3b a0 62 30 54 4e 21 46 20 c3 e3 03 c6 e1 | b9 0f 7d fe 4b b3 60 7d 63 ba a2 4c 73 2e f3 b8 | 3b 22 a2 5f eb 6e f7 60 a7 f7 13 33 69 2d a4 92 | 73 a6 b3 6f 83 80 a4 99 0d 08 29 5e d9 35 92 ae | 9f af 0f c2 f8 4b f3 a5 f1 21 b9 71 6a 24 94 9a | 22 03 aa 3e 91 42 1b 0b b8 8a 56 9b 18 21 37 6d | 29 00 00 24 d0 d3 37 6e 16 17 0d f3 9a b3 75 28 | da 73 bd b0 37 5f e8 7c ed 64 dd a2 58 d5 25 f4 | 40 05 3d 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 42 81 75 52 0a 3a ff 0f 6a b7 c3 | 61 92 38 6c 3b df 54 bd 00 00 00 1c 00 00 40 05 | ac 90 18 d8 00 f9 15 ad 07 5e df 3f 97 c5 48 08 | 0a 92 84 e5 | libevent_free: release ptr-libevent@0x7fb344034470 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab00 | #465 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 8e 23 d2 13 62 a1 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #465 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #465 | rejected packet: | 61 8e 23 d2 13 62 a1 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #465: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338017ea0 | handling event EVENT_RETRANSMIT for parent state #262 | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #262 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #262 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49697.445677; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006856 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acab00 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #262 | libevent_malloc: new ptr-libevent@0x7fb344034470 size 128 "road-eastnet-nonat-10" #262: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #262) | 6c b6 05 ad 53 aa 46 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 71 41 19 2f e2 7d 30 6b 4e a1 e7 5c d2 fe 4f | e0 61 ad 09 53 0e a0 57 08 e6 8a c7 a8 ab 86 63 | b8 6a 7f 66 41 dd b7 63 7a df 2e dc eb 44 db ac | 84 60 8a 30 6d a6 8e c8 9b e0 4a d0 70 9a 6f d7 | 2b c0 d7 cf ec 52 70 50 23 5f 91 08 50 21 38 8b | 76 60 df cc d7 e8 a2 a1 14 d7 95 47 31 84 95 aa | a3 81 92 3c a4 0d 4b 28 d7 90 8d 56 f9 3c bf bc | 84 88 bc cf 92 1a d8 6c 91 60 d7 c8 53 4c 8f 1b | 33 3d 36 12 cc 21 af 62 59 3d a6 91 f5 8f 40 b1 | 5e 20 75 cb 09 ce 69 22 f7 ce 4e 56 bd 5c 4e 69 | 85 a0 6f 08 1d 3c a0 71 93 00 3c 05 be a2 5e a3 | 18 1e 44 5a 4d ed 58 8b 10 8f 38 84 6b ea 6f 25 | 2a 8f 86 0f 8b b5 6e ce 72 db 55 37 c3 3e 68 45 | 52 fb fc c3 b0 3a 37 24 8c 65 c9 ec 5e 24 2b c3 | 69 bc 27 c7 b0 7f 81 12 a0 6d 38 e6 33 39 b8 2c | 2a b9 3c 7a 5e 19 74 c7 ec ac 4b b5 b2 ea 83 d8 | 29 00 00 24 a4 15 8c 3a a3 1b 1e b6 c4 22 d7 fc | ab 68 38 21 36 11 f7 0b d4 9b 74 fb 1e 21 f2 3a | 1b 0d d1 83 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f1 64 14 a1 e8 e4 eb 96 cf 02 78 71 | fb d0 4f 54 fd 2f 47 94 00 00 00 1c 00 00 40 05 | f3 5b 09 5c ae 75 15 23 50 5d 21 6a e9 8d 68 9d | ed b0 04 c4 | libevent_free: release ptr-libevent@0x7fb35403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338017ea0 | #262 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c b6 05 ad 53 aa 46 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #262 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #262 | rejected packet: | 6c b6 05 ad 53 aa 46 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #262: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c018460 | handling event EVENT_RETRANSMIT for parent state #466 | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #466 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #466 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49697.485046; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005656 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338017ea0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #466 | libevent_malloc: new ptr-libevent@0x7fb35403b0b0 size 128 "road-eastnet-nonat-214" #466: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #466) | d8 f3 8e 44 6b 2f 1e a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c e1 1c b6 a8 45 43 90 db 9b 35 75 1f aa 92 f9 | d6 e2 6f 34 81 df f8 c5 fb 61 93 34 a9 9a d6 e7 | 4f 19 4e 64 91 79 4b bc 74 e5 43 7f 1c fd f5 46 | 67 4f b3 d8 c9 4d 2d c9 eb 26 c5 ea 6c 36 ba 25 | 06 8c 1d c8 05 71 c9 48 a5 ca a6 91 9c 00 5f c8 | af c1 a9 4d 01 92 ef ab 3a e6 5a 67 89 38 c9 af | 19 fe 4d 6b 76 3f 95 f8 65 3e 4b 5b 24 34 56 32 | 9f dd 59 97 7b 03 2f 23 ce fb e6 f8 e4 68 93 ff | ad 3a cf f3 67 73 9d e1 9b 2a d0 84 d4 ba 4d fe | 72 3c 74 29 f1 ab eb eb fd d6 c3 47 54 02 c4 5f | 85 e4 bc a9 88 7b 25 6d 99 c6 f0 38 89 09 7c 47 | 72 c2 61 46 a0 1d 59 09 82 b5 5f b7 e1 f1 5c 0d | 50 1d c9 01 1e 1c 93 24 6c e4 5b 27 7f 49 97 85 | 14 7e 19 88 ae dd 1a b6 56 79 35 3e ff bd 7d 4e | 47 80 ff 35 79 4b c6 1c b6 e7 5a d2 8f b2 aa 73 | 6a 88 5b 1d bb 78 3e 8d f2 9b 06 47 8f 4b 75 e7 | 29 00 00 24 4b 18 d5 35 7f 58 ef 5d 8f 25 3f b5 | cb 0b 31 6c 2d c9 a6 3f f9 92 29 72 9b 38 37 11 | 6a b0 a4 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 d8 47 26 17 c1 8a e8 09 00 37 fb | f1 38 56 14 b9 a5 7b 42 00 00 00 1c 00 00 40 05 | 10 91 19 bc 27 f8 ea 8a 40 18 2c 45 b2 2a 2d 38 | 23 45 ab e1 | libevent_free: release ptr-libevent@0x7fb34c01a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c018460 | #466 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 f3 8e 44 6b 2f 1e a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #466 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #466 | rejected packet: | d8 f3 8e 44 6b 2f 1e a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #466: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad6ec0 | handling event EVENT_RETRANSMIT for parent state #467 | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #467 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #467 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49697.567548; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005625 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c018460 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #467 | libevent_malloc: new ptr-libevent@0x7fb34c01a4e0 size 128 "road-eastnet-nonat-215" #467: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #467) | be 07 ac 9a b2 b5 64 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 4e 05 41 e0 9c 82 57 92 0a 9a c0 ac b7 0e 16 | 8f cf 40 f2 c1 21 c6 0e 53 7f 71 9b 23 53 ab 32 | ef 64 72 bf 1c eb 94 98 29 9f 35 3d 25 d3 1c 5f | e7 9d 00 19 e2 0a 16 20 a6 ea 3a 6d 7b 32 8e 93 | 96 ee 8d 09 fc 5d f8 27 b9 ca 49 09 65 ce cf 30 | 67 2e f4 4f 3d ad 29 2d 5a 4c 68 40 7f 94 6f ad | f5 98 12 1b 59 74 90 02 ab ae 6a 47 c6 cb f0 fe | 1e 5f 8d 21 2a 5d 11 fe 17 3b 75 9d 65 5c 76 a0 | e4 ca 7c e0 c8 8a 37 49 e6 36 2e 9d 9d 6c be 13 | f2 87 dd 81 d0 10 4c ee c7 ac d9 53 97 d2 c8 92 | 06 a5 e1 c9 c7 93 30 ee d6 3d ac 47 98 50 1f 6d | d0 3a db 8b df 20 7f 6b 55 4b d3 fe b0 df 95 14 | 4e 40 f5 72 7e 0c bb 04 da d9 d2 07 87 d2 e0 72 | 1c 20 5b 2d c2 5e 0e 89 32 b0 a4 ac ae 09 91 0a | ac c6 1c cc d1 3b 35 35 b5 b5 4c 01 ce b4 2e ea | cd 79 86 98 20 31 06 5b 6a 88 36 07 19 32 e2 40 | 29 00 00 24 65 a2 6f 51 03 e0 c3 95 a1 17 d9 10 | 35 d2 c8 05 2a 6d 6f d8 b4 c3 4c 08 92 7c 46 6b | 3f 11 55 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 95 f5 c4 0f 53 2d de 04 94 5d f4 | 44 07 bd 21 62 32 e6 d2 00 00 00 1c 00 00 40 05 | d8 32 98 63 8b 4a fe f1 1f e4 de 6d 0f 9b fc 4d | cc 8b 9a c1 | libevent_free: release ptr-libevent@0x7fb37403ae20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | #467 spent 0.44 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be 07 ac 9a b2 b5 64 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #467 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #467 | rejected packet: | be 07 ac 9a b2 b5 64 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #467: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.221 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad8480 | handling event EVENT_RETRANSMIT for parent state #263 | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #263 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #263 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49697.569446; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006151 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #263 | libevent_malloc: new ptr-libevent@0x7fb37403ae20 size 128 "road-eastnet-nonat-11" #263: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #263) | ca df fa 2e cc 97 0a e0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 39 35 4e f5 b3 06 6a 55 0c f2 3d 49 3f 7e 31 f9 | fb cf 08 8d 9e dd 74 b4 ae 16 46 b6 d3 2d d7 81 | a5 4c 1e 3c 51 d2 5c 80 19 32 ae 15 f6 f1 83 90 | 89 74 e1 7a 65 6e b3 e6 37 19 f8 4c fe 75 98 41 | ac 4f 10 33 24 18 c2 b3 2c d3 58 72 8c df 81 d4 | 59 38 86 31 ec e0 a1 c4 d1 46 91 6e e8 5d e0 23 | 68 ef 05 cb cd 03 0b e1 cd 09 50 09 e9 ff 48 e3 | 8e ec a4 98 4e a5 2a 21 fb 32 20 aa 01 94 37 a3 | 4a a0 06 10 8c 55 c7 ef f3 db 52 f2 2f 93 75 5e | 89 12 79 f7 25 8b 5c 7e 90 0c 79 f1 46 9c 39 dc | 62 04 8a 23 65 3e da dc e9 e6 17 7c 76 c0 74 b4 | 38 86 ca da 50 ae fc f8 de 6d 6d ce d9 7f cd c0 | 85 4e f8 c9 04 41 9d 47 8a 73 e9 b5 4a cc 14 ad | 16 95 76 51 b8 09 27 ef 06 ca 3a bb ff 24 77 42 | cc fc 6e a1 e6 2b bd 33 6d f5 6a df 58 56 a8 4b | 96 18 0e 2a e9 ec 68 a9 e4 55 e7 47 98 67 01 11 | 29 00 00 24 1f 89 c4 e0 c8 b8 15 d0 01 8c 72 b7 | b9 51 02 35 29 86 83 18 da 61 92 fd 67 fb 67 7c | 20 e3 84 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 89 6c b7 69 49 4f f4 6b c0 cb 25 | 85 ed a6 01 12 ce 48 f3 00 00 00 1c 00 00 40 05 | 1c d7 2d 11 fa 53 cc ec b9 10 e5 08 27 61 79 62 | 96 79 33 55 | libevent_free: release ptr-libevent@0x7fb36803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad8480 | #263 spent 0.4 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ca df fa 2e cc 97 0a e0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #263 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #263 | rejected packet: | ca df fa 2e cc 97 0a e0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-11" #263: ERROR: asynchronous network error report on eth0 (192.1.3.11:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.228 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5af90 | handling event EVENT_RETRANSMIT for parent state #468 | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #468 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #468 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49697.666904; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007051 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad8480 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #468 | libevent_malloc: new ptr-libevent@0x7fb36803b0b0 size 128 "road-eastnet-nonat-216" #468: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #468) | 7d 98 8a 9d 47 30 f3 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 4d 82 7b ce 67 f5 e3 c7 ef 1e 88 97 12 6b 1f | 83 b8 f4 6b 5d e2 86 e0 e9 f2 9b 39 cc 52 e7 74 | 42 1d 82 da 97 54 f4 cf 8c bb 44 74 5b 79 77 99 | b7 64 d2 5d 6f 79 ec 9a 9b f2 ae b8 84 7a 6f f8 | bd c4 91 ab 33 ef 63 16 a0 41 ba 3f f0 a6 76 33 | 99 9d 4e fa 10 3d a9 b0 fd 9d 95 6a 6d e1 64 80 | d6 f4 63 87 42 a4 40 d5 c9 d1 7b e6 b6 16 87 12 | 6b a3 97 13 be 62 fd d1 99 d3 9b d9 d0 66 91 ae | 70 9a 30 e7 e3 dd b0 da 82 fe e4 f0 44 cc b3 94 | 0b 57 c5 e6 97 4b 2c 01 fc cf bd 64 1e a3 1b 36 | a4 86 4a 71 7a 5d 83 15 27 9a 5b c7 b1 4b fa cd | 49 2c bf cb fb 1f 32 58 4d 30 7f 18 2a 34 d2 95 | e4 1f 33 09 6a df d3 45 5e 2c d0 94 30 dc 69 26 | e1 ac dd 8a 80 89 5d 10 3f 35 db e7 62 f2 ea e4 | 46 d5 0d ed 2d ad c4 c0 e6 d7 96 39 cc 2d f8 c8 | 62 6c cf 39 6f 6d 88 19 5a ed 59 0b b3 2a c0 06 | 29 00 00 24 92 6b ec 6b 64 1a 9e 4e ed 8a 02 4d | da d7 da b0 19 37 ca 67 a4 74 bd db b5 b1 e8 9c | 42 18 dc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f 7e f5 e7 e8 50 e9 16 af a5 e6 5b | b1 d0 cb b5 42 f7 79 13 00 00 00 1c 00 00 40 05 | f3 f2 fc c6 17 9d d4 89 d0 fb 82 c7 ed b0 98 6a | 20 f1 09 0b | libevent_free: release ptr-libevent@0x7fb35801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5af90 | #468 spent 0.35 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 98 8a 9d 47 30 f3 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #468 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #468 | rejected packet: | 7d 98 8a 9d 47 30 f3 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #468: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.191 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90400 | handling event EVENT_RETRANSMIT for parent state #264 | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #264 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #264 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49697.683618; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006513 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5af90 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #264 | libevent_malloc: new ptr-libevent@0x7fb35801d920 size 128 "road-eastnet-nonat-12" #264: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #264) | 8e fe 0e 1c bf 0e 6b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bc 85 0f 2d e4 cd 04 0b 17 96 14 35 20 98 98 7c | 43 94 0e c0 cb 2a ed cd 26 f3 f4 fd 71 0a b3 35 | 8d c8 ce 92 67 ce 39 72 cf 1d 58 73 86 98 2b a0 | 6f 55 7b 13 d0 1f 62 3b 93 93 85 3e 36 cd 86 27 | b4 c1 9a bd c4 db 39 19 44 28 ec a5 e9 1c 59 a2 | a7 fc b2 f8 f1 72 da 9c 2a b8 36 d3 61 88 51 dc | 4d 20 86 6a 14 25 ef 10 b3 1b 09 52 6d 00 f9 db | 75 0a 80 38 3b 18 7c 9c fd c8 c9 4e b1 e2 84 70 | a4 dd 3f 85 ce 8c cb 20 5c 6a 42 21 65 c4 fd 15 | 7a 47 92 65 67 69 9e be f3 7a e9 66 c9 56 bd d2 | 3c 4a 76 68 b7 3f ce 1d 64 64 a7 2c 71 37 b4 c4 | 53 38 1c 79 97 95 2a 69 1c 36 40 41 3d 05 9c ba | 4d 38 e3 a6 a7 6c e9 b1 59 1a 9f ab 80 0a d9 8e | ac 39 5a 0c e3 b3 9d c1 3d 5d 32 c8 42 00 f8 4c | 3a fb 9c 36 7f 16 43 4c 95 29 48 05 f2 b7 02 75 | 54 25 c2 90 a5 04 3b fa ca 77 9e 55 e7 39 19 34 | 29 00 00 24 0b 7d f5 1c 67 a7 5b 6f d5 5f 23 1c | de ee af 0f ed f9 a1 fa b5 71 92 a8 5a 39 25 fa | 7d a0 ff 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 4e 74 d9 6a 11 61 e7 2b 9e b3 5d | fa c6 10 84 a3 ff e4 72 00 00 00 1c 00 00 40 05 | 61 d2 3a 09 fc 3f e9 c0 9a fa 15 52 e0 d4 39 3d | 0f 2b c4 10 | libevent_free: release ptr-libevent@0x7fb3580300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90400 | #264 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e fe 0e 1c bf 0e 6b 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #264 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #264 | rejected packet: | 8e fe 0e 1c bf 0e 6b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #264: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0572 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3700407b0 | handling event EVENT_RETRANSMIT for parent state #469 | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #469 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #469 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49697.787999; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006882 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90400 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #469 | libevent_malloc: new ptr-libevent@0x7fb3580300e0 size 128 "road-eastnet-nonat-217" #469: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #469) | 29 4a 77 5f 7a c1 26 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 e1 17 9f 01 39 e1 e9 f8 e3 b4 37 56 6e 01 9e | d8 db 78 19 20 a1 ab 6d c3 e8 12 cd f6 c3 2c 5f | d5 86 61 6c a8 d4 5b 57 ac f5 b7 f0 24 de ac 90 | a1 9c 51 ce 2d 7a 33 35 b1 68 02 e0 5a 9f bf ac | 1b d8 19 f9 b4 68 45 14 e7 fd c5 a9 74 d6 09 6d | f9 4a 25 95 f8 f0 1c 13 dd 36 12 79 4b 27 2a bb | 86 17 86 e1 0e 04 a7 ab e3 0c 51 78 89 39 a0 df | c7 a9 56 0a e4 9a f1 58 c7 a1 12 21 f0 18 d0 d0 | 21 0e 73 e6 4f d3 13 37 a8 aa e3 89 21 ab a3 7c | d5 ac 7b aa ea d7 ff a4 b9 b2 c3 7f 9b 07 77 17 | 36 8f 4e a7 40 03 46 9c db 93 b3 16 3c e2 7f c0 | 58 42 83 4f fa 88 71 3b b7 86 e5 ca 62 88 5c 9f | 93 c4 59 82 fb 9e 5a 96 92 16 5f 68 0e 83 59 2f | 70 32 51 a7 ce dd b8 93 09 66 27 ff 7a e6 c4 cc | d2 87 46 9e b6 49 85 48 3f a7 ef 43 8a 5c ae e6 | 2c b0 88 25 66 2b 82 4c a9 2f 05 19 54 70 c3 9c | 29 00 00 24 36 8f c2 cf 02 b6 2e 75 ac 6c a4 55 | 9f 56 a2 b8 31 83 97 a5 56 a5 c5 7a ba 53 78 14 | 83 c8 c0 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 d6 3c 93 bb 1b 68 50 cd c9 2f b8 | 25 99 9e c0 3a 2f 1f 80 00 00 00 1c 00 00 40 05 | e5 a0 2e 8f cb 71 f8 0c 42 a7 95 8f 73 2e c5 90 | e5 8b 3a 32 | libevent_free: release ptr-libevent@0x7fb37003f490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3700407b0 | #469 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a43dd0 | handling event EVENT_RETRANSMIT for parent state #265 | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #265 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #265 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49697.788144; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005838 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3700407b0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #265 | libevent_malloc: new ptr-libevent@0x7fb37003f490 size 128 "road-eastnet-nonat-13" #265: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #265) | 5e d6 2a e3 fc d6 88 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 2e 3a 15 7c f9 00 41 72 02 12 64 4c 6b 73 52 | bb 8d bc 96 e4 69 5a 27 ff 16 12 40 6d b3 e6 7d | 28 6d d8 d8 46 ae 55 b1 20 60 d0 f0 2c d7 5a 32 | f1 e8 5b 54 2b 16 ec 87 57 a5 e1 c1 08 80 a6 16 | a0 4f 0f 3b 62 e5 8c cb aa 65 e4 d5 87 37 d0 85 | 34 de df b2 ac 15 11 24 c5 c0 e2 ba 8e bf 6a 38 | 92 5b d1 dd 84 fb 29 ef cf 37 36 ed 82 a0 ef 7a | 79 c3 2b da 2f 96 ad 2b 46 50 67 74 44 c2 8f 22 | 65 99 b1 3a 1c fd 70 cc 25 39 6a 77 0a f9 8c f3 | 33 34 af 74 f2 1a 52 31 29 6f 53 43 ce 77 a1 c0 | 4e ad 32 24 24 86 73 ad 16 2d 19 8b 36 54 d6 8f | 96 95 e4 0b 0b df d1 24 22 12 35 73 ac 81 e7 c1 | af 88 20 ae e1 fa 41 09 f0 f6 2b 19 42 79 9e 92 | 6a 95 0b 69 19 21 ee ba 94 35 b0 07 aa 13 f3 40 | 4f 27 f7 e8 7d ea ae b3 14 bf 0c b2 8b a5 e7 1f | 2e 4a 4a 5e 40 8d d3 1a 30 c1 1d 13 0d 61 d3 15 | 29 00 00 24 d2 1b cb fe 42 33 59 cd 17 75 9b cc | f4 b0 0c 18 45 31 71 9f e7 2e 80 d7 48 7b 93 7c | d8 b3 ab 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 77 56 b7 16 48 fa 98 9b c1 2d 60 | a6 6c bc 07 2c 3a ef 47 00 00 00 1c 00 00 40 05 | 5a c9 c6 01 25 8a 31 37 7b d0 f2 6b d1 02 08 77 | 0a b6 4e aa | libevent_free: release ptr-libevent@0x7fb3600180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a43dd0 | #265 spent 0.0731 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 4a 77 5f 7a c1 26 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #469 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #469 | rejected packet: | 29 4a 77 5f 7a c1 26 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #469: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e d6 2a e3 fc d6 88 0b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #265 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #265 | rejected packet: | 5e d6 2a e3 fc d6 88 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #265: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0379 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a70b50 | handling event EVENT_RETRANSMIT for parent state #266 | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #266 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #266 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49697.875474; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00791 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a43dd0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #266 | libevent_malloc: new ptr-libevent@0x7fb3600180b0 size 128 "road-eastnet-nonat-14" #266: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #266) | 6b cc e0 12 8b aa 91 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 c7 f6 72 9c a5 df d1 37 bd 8c a8 3d 12 ac f8 | 22 21 09 d5 08 f4 92 dd f1 6b 1f 81 7b 7f 3b 9d | 10 fa 77 c3 74 a7 03 4d 17 3b 47 94 f2 0e 9e 20 | ba c3 57 67 86 fd d2 e5 0d 53 bc 0e c2 cf a4 3a | ca 89 10 10 9a 9f 52 0e c5 60 b3 38 be 05 37 b4 | a3 6b 5d d8 04 66 d6 b5 93 93 8f 47 58 63 40 52 | 1b f8 2c cb 93 59 07 2b ad c7 18 ca a5 e9 24 fa | 41 de 1f 43 7f 1f 27 30 49 67 c7 c8 16 fd 61 a4 | 21 e9 05 98 46 f1 50 b6 8e 31 ad a9 2c 10 19 f5 | b9 ef 6b d3 e7 07 06 8e bf 18 8b 0a 77 f5 44 4b | 1c 00 21 d9 dc b3 66 3f a9 4b df cd cd bd 25 d2 | 2a cd 52 ad da b3 d3 bc be e7 d4 32 97 da 0f e8 | e2 29 51 0e 96 41 b4 ff 9b 20 c1 68 f8 22 6b 37 | bc 2d 7d 2a 13 01 a1 b3 05 fa c1 ea 1c 1f 45 97 | 4c 05 13 ad eb 35 15 0f f5 10 99 91 9b 3f 29 a1 | 29 e0 29 94 46 69 fe a4 f9 df d3 46 9b f7 d6 fc | 29 00 00 24 85 48 4e 62 cb aa ef f3 1e 98 d2 14 | 8e 36 5f 8a 20 c7 f8 35 5a c8 08 b9 4d a2 67 85 | 59 88 c1 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae c1 7f 5b 24 ac dc 11 ec a1 5c 57 | 31 3f 4b 60 7a 20 b0 c6 00 00 00 1c 00 00 40 05 | 71 38 17 79 8f 5d ce 34 6f 4c c4 ce cc 6f 78 37 | 7e be 6c a5 | libevent_free: release ptr-libevent@0x7fb35001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b50 | #266 spent 0.178 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b cc e0 12 8b aa 91 d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #266 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #266 | rejected packet: | 6b cc e0 12 8b aa 91 d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #266: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0701 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a5da90 | handling event EVENT_RETRANSMIT for parent state #470 | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #470 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #470 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49697.935853; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005378 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b50 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #470 | libevent_malloc: new ptr-libevent@0x7fb35001d920 size 128 "road-eastnet-nonat-218" #470: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #470) | ab ba b0 28 2b 1d 75 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 e4 df 77 9c ac 7c 40 d9 cc 91 f4 1e 15 f1 e4 | bc 57 e7 d5 04 82 1b 0a da 88 66 71 1d 5c c0 4e | e9 e1 44 ec a4 a7 01 cc ac 81 2a 8e 12 68 b2 c4 | cb fb 38 e3 4b 73 83 33 bf 14 39 b7 96 9c bd 59 | d9 ff 78 9c 9b 27 6f 77 fd c9 8a 91 00 a0 bf ad | 80 e8 18 ee 7d 76 d2 f5 dc 73 28 11 ea 98 07 d2 | 64 7f 44 96 f2 22 04 36 e1 c7 80 69 f0 17 fa 9a | d9 3b f0 c2 a7 d3 89 ef c3 be e7 3b 57 5c b5 bf | 47 3a cd 92 d8 c8 49 50 dd d0 b8 eb bf 2d 90 2f | 70 dc 26 c2 6c 6d 97 1e 52 f7 6d 64 24 1f 5f ad | 51 2f 7a 28 09 01 c2 c0 02 41 61 9f 09 3f 66 24 | 9a 1a a0 e1 ec c0 36 27 88 be e6 c0 7c 74 30 55 | 5b 47 83 d5 de 8f dd bb 1e 36 33 0e 3a 91 ce a0 | e2 86 42 d5 a7 ba 66 4a 76 5d 9a 0c 15 60 fc f8 | 07 4e ec f8 cb 3b a4 f7 40 7b 9c 98 98 27 e7 40 | f3 18 97 7c cd 29 25 1e 88 f4 c6 ab 7c 46 c3 a4 | 29 00 00 24 5d 90 f6 17 67 54 dd 2e 4f 57 ce 29 | 91 07 11 a6 ab 05 8f 42 d3 b0 74 bf 38 9e 49 fe | 79 c7 ca e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 04 17 c7 7e 54 6e 6a e8 f5 01 1c | 14 c4 b8 fd 53 6d 0c 45 00 00 00 1c 00 00 40 05 | ee 06 ba 38 dc 10 50 e4 3e a6 cd 5f 2c e3 74 3b | 2a 18 7d 82 | libevent_free: release ptr-libevent@0x7fb37c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5da90 | #470 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab ba b0 28 2b 1d 75 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #470 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #470 | rejected packet: | ab ba b0 28 2b 1d 75 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #470: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0807 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33801d710 | handling event EVENT_RETRANSMIT for parent state #267 | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #267 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #267 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49697.968204; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007792 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5da90 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #267 | libevent_malloc: new ptr-libevent@0x7fb37c035930 size 128 "road-eastnet-nonat-15" #267: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #267) | 6f db 88 0f fe 70 dc 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e ec fe e4 22 11 a7 b5 a2 ee 25 53 3a 2f 1c 0a | 48 51 04 db 46 22 ad 6d 3c 60 e2 cb fb cc f5 7a | 6d 5e c9 24 ec d8 52 4f 96 5b 62 28 fb 9e eb fd | ac e9 f7 6f 4d 1a f9 74 24 29 e6 a2 80 a2 a7 c1 | b9 1c da 76 8c 9d 40 38 6a 26 13 d3 da 72 01 42 | b6 16 9c ca 09 1d 9b a9 90 70 fb 71 d1 ea b4 45 | 95 3b 5d b5 2c c1 00 ea bd 33 e0 43 00 b9 22 f4 | c9 60 90 dc b0 82 03 89 b0 c4 03 22 4b cf 7c 50 | 96 60 35 da 9c 4c f2 64 7d be b4 90 21 9b 54 ab | 96 09 b1 ee 1f 0d db 8e 22 4d 09 d6 43 6f c8 f1 | da 0c fd f4 69 33 b0 96 0f 1a 25 07 1d e6 1b 37 | 20 ff 37 b4 80 d9 a3 78 93 5a eb 5d 36 bd 9e 35 | 1e 0e a9 e8 13 eb 16 8f ff d5 26 ef c2 d5 47 45 | 91 9b e3 0e c5 08 1f 34 46 fe b0 3e f5 ce e1 c7 | 7c 47 c2 2d d2 f7 4c 06 62 a0 ae f2 e6 53 ff 73 | ee d6 e5 9b 28 8e f3 4d ef ad 40 41 9e 20 99 95 | 29 00 00 24 6d 5a fb f5 8a b7 85 2e cf 37 31 c5 | a8 e8 a7 22 a7 58 7e 34 8e 06 61 77 f0 7b 3b ce | d2 d0 22 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 b4 63 c8 b9 e3 2d fa 51 7c 79 27 | ca 3c 7a c2 0c 39 1a 2b 00 00 00 1c 00 00 40 05 | d9 fc ba 6b 91 d3 e0 ee c2 81 f3 1d 92 b2 24 2f | bf 44 6b 65 | libevent_free: release ptr-libevent@0x7fb33802ee40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33801d710 | #267 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f db 88 0f fe 70 dc 8d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #267 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #267 | rejected packet: | 6f db 88 0f fe 70 dc 8d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #267: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36003b100 | handling event EVENT_RETRANSMIT for parent state #471 | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #471 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #471 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49698.053595; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004803 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33801d710 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #471 | libevent_malloc: new ptr-libevent@0x7fb33802ee40 size 128 "road-eastnet-nonat-219" #471: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #471) | 38 56 99 f6 a3 bb 25 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 88 5e 08 51 b9 62 c5 b6 68 5e 2f 6f 4f 31 ca 1e | 08 9e a2 c5 9c dd 5f fc 7a f4 89 f0 0b b5 e1 ae | ce aa 45 81 2c 95 5e ff 06 f3 6a c5 72 bf d7 48 | 2c ca 52 8b db 25 1b 5b 4e e1 9e 45 05 12 f0 3a | 8b 49 b1 e8 0f d0 bb 39 6c 00 4b 10 55 55 90 f1 | ba 94 0f e8 29 de 7e 8e 75 cf 84 46 0b 85 26 8f | fc de 6b 35 43 a0 ca 14 c9 c0 f7 23 df 3f 39 44 | 98 32 71 b3 fb 93 e6 df 1c 43 a2 c9 a0 c6 73 b4 | d7 9f 3f a9 0b f8 14 fb 29 eb 8f cf f7 a9 d2 3c | 3d 58 a0 39 7e fa 25 48 bc 4b 7f d7 1d e0 11 34 | f6 bf 55 8d 59 da 29 ac d8 c5 88 7a 76 ef 08 52 | 7c ac 5e 47 31 67 af 77 3e 74 07 65 f0 71 26 28 | 79 4d a8 21 1c fb 74 e9 6b f8 d5 df d3 80 71 f9 | 81 36 25 59 61 8d e4 66 0e 09 70 cd be 73 f3 c8 | c4 06 a2 0f 1e 6d 0f ec 2b 18 85 83 48 df f6 99 | 6d 3a 12 52 38 a5 9e 5e 41 a3 52 37 e7 64 a4 6a | 29 00 00 24 92 4d df ea 0a bb c1 4f 13 fb 92 4b | 10 dc b9 f4 e6 b4 8b 01 64 45 6e db 5a 13 b9 8e | 86 b6 57 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 76 c9 73 0c 16 7b 39 f7 77 ab 9f | f0 85 70 80 7e c2 64 d2 00 00 00 1c 00 00 40 05 | 35 b3 a5 34 11 ae 1a 69 08 cc 74 f0 71 15 8c b8 | eb 5a 8d 90 | libevent_free: release ptr-libevent@0x7fb360023dd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36003b100 | #471 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 56 99 f6 a3 bb 25 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #471 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #471 | rejected packet: | 38 56 99 f6 a3 bb 25 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #471: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38000feb0 | handling event EVENT_RETRANSMIT for parent state #268 | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #268 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #268 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49698.124919; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00464 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36003b100 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #268 | libevent_malloc: new ptr-libevent@0x7fb360023dd0 size 128 "road-eastnet-nonat-16" #268: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #268) | 52 eb eb 01 2e 07 ee 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f4 ef 40 5e f5 2a 5e 5a b8 76 94 37 37 12 d2 32 | 87 80 98 31 81 5e ec c8 c0 10 ea 13 f1 32 fd 22 | 5f da f7 72 2a 67 06 fa cf 7f d5 1a c1 ae f1 92 | 7b 53 ad 16 00 b6 90 61 58 94 dd 7e 4a 9f 32 98 | a2 2e 9b 12 92 70 47 ac 39 ac 02 84 c9 35 b9 57 | 66 95 1c 62 b4 f0 47 38 3f ec 43 4d cf 73 e8 45 | 9f d1 15 db ca 5d 1c f1 70 f1 97 a1 2b 7d 26 5e | 27 c8 08 1e 0d d7 2a 7e 36 db 89 18 87 f0 43 11 | e3 cf c8 31 7d 0e ae 6a 97 23 05 40 5d 11 ea 66 | a1 79 e8 97 cf 5c 5b 3a eb e7 1e c8 25 eb 2f 83 | 00 66 8b 3e 05 72 c5 6e 34 08 88 16 97 1a 13 a9 | db 9b 7b 48 0f 92 cf 65 2a 3e cf 88 08 c6 cf 54 | d9 1b 5a 78 a6 05 e8 73 bf 3a d4 a6 65 47 24 50 | 20 0c 6c 69 e0 29 4a aa 5a 89 69 c7 3c 4d 82 76 | 81 c9 87 1d 60 f0 a9 b6 29 2b 06 98 6d a9 24 c8 | 1d 5c 2b 40 de 5d 36 a1 45 5d 5e 8a 48 e6 0b 26 | 29 00 00 24 f0 fa c9 ee f6 f5 97 a2 44 c5 ea 10 | 5b 58 db 61 17 58 ca 3c df 15 b8 1a de 90 ef 49 | 16 34 e4 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 2c 2a b2 6d be c9 76 69 fe e4 41 | f1 72 73 59 2e 97 3f f1 00 00 00 1c 00 00 40 05 | 31 f5 db e1 45 48 68 14 42 b0 53 d9 a4 6c d5 a0 | 03 9b fe 80 | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000feb0 | #268 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 52 eb eb 01 2e 07 ee 4b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #268 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #268 | rejected packet: | 52 eb eb 01 2e 07 ee 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 10 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-16" #268: ERROR: asynchronous network error report on eth0 (192.1.3.16:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0782 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380009ed0 | handling event EVENT_RETRANSMIT for parent state #472 | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #472 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #472 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49698.155233; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005068 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000feb0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #472 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 "road-eastnet-nonat-220" #472: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #472) | 15 62 43 a0 4c 6d db c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 ef 66 93 1f d2 be 3f b4 cb c3 5b c3 cd ce ec | ef 45 09 15 86 85 a5 fc 63 a8 dc f9 dc 2c 7f da | ad 3c 83 29 23 b1 9e ba fe be f5 05 08 e8 8e 73 | c4 15 c3 1f 80 d3 d0 b8 24 be b3 4f dc ef b0 39 | e8 6c 73 46 ce 8d ab 67 58 96 e6 89 9c 38 0e cb | 1f b3 47 af cd e8 fe 49 e5 c0 25 80 77 35 f6 06 | 6d dc 03 76 f8 34 b8 8e 05 e2 62 37 7a 40 b0 47 | 1d 8d 55 22 fa 66 04 34 43 30 87 8a 3b 8d 56 07 | f3 21 a4 25 01 21 d4 52 d3 44 c4 73 d4 a8 a2 ea | 69 66 8c 26 ab 85 7b a0 65 5b 03 5d 74 e7 7a 63 | 38 e1 5f b3 a4 83 48 11 76 d7 fb 96 bd 94 81 0e | 12 85 94 cb 17 1c 9e 64 a5 e2 b4 c7 96 eb cd 62 | bb 15 1b 96 a4 fb c3 a8 a0 ae 37 79 52 a4 ec 21 | 73 e0 47 a7 95 56 ce d5 cc 94 10 bf a2 8a 93 dc | 7f ea 6c d5 98 4b fa 19 3a ac 5e 1f 78 6e 08 fc | fa 46 b2 55 22 d7 78 a7 75 be f4 63 29 44 fa cb | 29 00 00 24 19 33 9e e6 d2 ec 99 b2 2a d6 00 cf | c3 4d d5 a5 cb 9d 67 f4 f2 94 3f b0 a2 94 a8 ff | 01 8e 5d 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 f6 a8 c3 12 9d 73 0e 92 1b 13 62 | b1 83 e3 04 e0 b3 2c 1d 00 00 00 1c 00 00 40 05 | c3 d5 bb 6d 6e 36 db ca 5f b7 b2 05 dd 15 c3 8f | 20 6a e3 5f | libevent_free: release ptr-libevent@0x7fb3800223c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380009ed0 | #472 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 62 43 a0 4c 6d db c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #472 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #472 | rejected packet: | 15 62 43 a0 4c 6d db c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #472: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0639 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #473 | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #473 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #473 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49698.253635; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004787 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380009ed0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #473 | libevent_malloc: new ptr-libevent@0x7fb3800223c0 size 128 "road-eastnet-nonat-221" #473: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #473) | 78 01 12 66 35 d7 75 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 47 0f 4f 77 38 bb e7 c9 71 64 11 49 78 07 db | 61 1c cd 26 23 f1 f6 1d 25 30 16 ce 14 27 83 ce | 42 30 8f 08 74 8c 5a 73 8c d4 32 61 41 1b ee 9b | f9 31 2e 33 9d 12 db b8 cb 33 3f 38 d9 dd c3 f9 | 20 b6 40 e8 ca 08 02 ce df 71 6c f1 5d 52 08 e6 | 58 10 57 a2 32 8d ae 1d 5e 7d c4 ce e0 91 e8 67 | ef d4 89 2c c0 b5 6a 92 6e 51 6d 9b 9d 21 b2 11 | 63 ad d9 36 26 eb dc c5 60 5b ef 4a 3f 29 d2 75 | 9a 29 b2 ce 56 3f a4 11 28 44 4d 82 14 b3 ff 08 | f3 34 c5 89 41 5b 00 60 7c 63 69 55 27 25 23 fa | 32 38 62 77 fb 7a 33 df 62 71 61 b7 15 ec 0a 13 | 14 36 a9 93 fd 25 0e 0d b3 44 f4 62 07 ce 96 88 | f0 a4 9b c6 5b 9f 17 d2 94 b3 dd 9f 08 c2 33 c2 | 59 53 80 d3 e8 b8 bc 9f 9d b9 55 bf 1b b3 90 a8 | 46 84 0d b5 c1 2a b7 bd df e2 56 3f f0 a8 af c2 | b3 ab 6b 5f 0e ca 69 45 20 54 b6 94 83 c5 3d bb | 29 00 00 24 4a 32 17 be 17 e6 be 0c a5 f0 d0 1f | f3 82 ee d0 20 e4 2f 26 27 39 fc fe 8a c9 3a 42 | bb 40 ba 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 8a 84 70 d7 06 66 bf 35 02 d1 dc | b7 f5 da 2f 6f 36 dc 4c 00 00 00 1c 00 00 40 05 | 22 8e 50 95 0f 93 c8 cc 9c 03 8c bf 24 39 56 cd | 71 d7 b1 e2 | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #473 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 01 12 66 35 d7 75 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #473 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #473 | rejected packet: | 78 01 12 66 35 d7 75 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #473: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0433 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c046090 | handling event EVENT_RETRANSMIT for parent state #269 | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #269 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #269 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49698.262902; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006254 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #269 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 "road-eastnet-nonat-17" #269: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #269) | 42 2b 66 77 50 7b f1 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 1a b0 80 05 00 53 b8 88 37 a8 0d e8 4e c0 81 | 57 b8 c1 99 be 60 6c 42 36 80 aa e8 7e 86 e2 1b | dc 47 d3 0f cf c7 46 a8 c8 47 ce ff 99 14 e6 14 | 37 44 15 18 25 7b d6 ca f2 0f 00 2d 17 01 df 08 | ac fe e9 d3 2b 32 d0 3c 75 39 46 f3 2a a6 98 c3 | 1d b7 82 4a b4 92 84 4b b3 2d b3 71 d7 06 52 b9 | 9c eb 15 89 b5 c8 16 c5 e1 29 05 f5 12 64 42 f4 | a0 b3 32 62 fe 43 4c 1c 4e 1e 53 37 a8 e8 52 23 | 53 0e 82 46 38 b3 95 ea 7e 47 ae 7b 38 c7 ec ac | 8c 74 78 5b e3 a1 ba 65 7c 63 27 19 55 d3 7e f5 | 2f 36 c3 b3 a1 0f 84 2a 85 17 e4 09 e8 35 c4 82 | 08 59 25 c5 6f 5d dc d6 ee 2f dc 6b 0a a2 5d f8 | d2 8d a0 b1 da 71 a0 b2 68 ba c7 d1 ba 7e e6 81 | d8 e3 b3 84 de 3a 47 64 3d 04 00 a0 60 be 1c 4f | 52 66 df 3f 77 fe 53 0c dd cd ed 75 7e 76 02 77 | cc 4e de 99 d4 98 4e 1e 30 09 c0 9e cb c6 a1 c0 | 29 00 00 24 b8 ee 66 5c df cb 58 d0 1b a4 60 c3 | 1b 92 52 a8 29 57 57 d2 02 37 76 e3 2d 2f 31 c7 | 4b 37 7d fa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 73 36 11 68 b5 eb 4b 5f e8 3f ce | 5b fc b9 99 cc 0c 05 c7 00 00 00 1c 00 00 40 05 | 7f dd 18 35 5d 55 ec 33 76 f4 f0 dc 77 e6 e3 3b | 97 a2 2b d9 | libevent_free: release ptr-libevent@0x7fb354009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c046090 | #269 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 2b 66 77 50 7b f1 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #269 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #269 | rejected packet: | 42 2b 66 77 50 7b f1 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #269: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0607 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c040840 | handling event EVENT_RETRANSMIT for parent state #270 | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #270 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #270 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49698.34623; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00594 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c046090 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #270 | libevent_malloc: new ptr-libevent@0x7fb354009640 size 128 "road-eastnet-nonat-18" #270: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #270) | 98 aa bb 79 2f f5 b5 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 24 f6 25 5f fa 71 0f 39 53 f1 8f 92 58 3c 59 | 8e c2 2e 28 53 ea 0d 58 1c b1 76 25 4f 77 d3 40 | 6f 45 9c 78 a8 01 99 46 d7 6e 57 ac 51 cd 32 20 | 87 d7 3c c9 3f 5e e0 a6 46 8c bc bb d2 2a 3a 19 | 0d 30 25 7b 8c f0 eb f6 7f 48 bd 51 fc 7c 03 2d | 42 fb c9 54 0b f3 df 3f 56 f4 9e 74 f1 22 86 89 | d4 fe 7d ea 34 26 2a 49 b7 c2 c2 c5 bf 06 dd 36 | be de 23 aa bf 61 22 5f 62 e1 04 e4 81 81 b4 1a | 94 68 45 c7 43 f9 2b f7 9c c7 da c1 6c f9 e0 19 | 3d 12 26 17 de 58 8c 74 5a 7c d1 ae 99 12 b1 cc | 7c fd 41 5e df 12 73 ff fe 24 d4 ac e3 4a 14 3c | a7 57 18 de 1a f8 e3 60 98 66 b7 e2 de d9 ef 30 | 7b 0c d1 7a 6d 0b f9 31 66 84 79 8b 8b 50 77 51 | 23 58 84 77 80 ea dc 70 95 5b e4 15 8d 98 42 aa | fa 93 a8 7a d7 2a 0d 51 24 2f ee fa 92 74 05 47 | d0 38 43 8c 6f cb 3f 1f 04 0b e8 57 ca ea 33 7e | 29 00 00 24 dd 5a f6 1e bd fb cd ef 92 3b 56 16 | bd 57 a2 0f d1 d5 f5 02 97 f4 10 bb 15 09 d8 8e | c9 9b 97 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 15 18 7d df ec 83 30 72 5b 68 c2 | 08 e3 c3 a4 d5 a2 af 25 00 00 00 1c 00 00 40 05 | b3 09 33 34 02 38 11 d4 03 64 9d 03 c3 5d 2b 94 | 2e 30 63 d3 | libevent_free: release ptr-libevent@0x7fb34c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c040840 | #270 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 aa bb 79 2f f5 b5 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #270 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #270 | rejected packet: | 98 aa bb 79 2f f5 b5 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 12 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-18" #270: ERROR: asynchronous network error report on eth0 (192.1.3.18:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1c480 | handling event EVENT_RETRANSMIT for parent state #474 | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #474 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #474 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49698.359533; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006496 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c040840 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #474 | libevent_malloc: new ptr-libevent@0x7fb34c00cf80 size 128 "road-eastnet-nonat-222" #474: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #474) | 0f db c1 fb 9f 17 ff 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 1b 5f a0 e0 ea b4 6f d8 89 26 cf ee 32 1a 5c | 28 fd cc 88 df ac 76 71 06 f6 f9 47 1d 52 2b f1 | 5a b8 ae 1c d0 f8 c1 49 c7 7c ed 42 b3 cb ec d1 | cd 02 cf 31 b3 56 f6 e1 d0 7b 2f 03 00 08 68 a8 | 8c e2 7f 21 83 8d a7 f5 0e 07 fa ee 88 4b c9 7c | 96 80 b8 d5 42 4d 28 ea bb cc 27 3f c4 d8 6e 4d | d5 70 bc b9 0a 5f 21 c3 31 6b f1 91 46 6a 01 67 | 1a 7e a6 f1 0c 4d 62 51 b1 a2 3c 89 97 d5 4a 44 | a9 bc 59 2f a3 d1 5e 07 95 15 69 ac 72 1f 9c ba | 63 7f 02 e1 05 f8 26 4f fe cb 35 8d 42 06 b7 4a | a1 e1 b3 5c f5 2a 05 2b b1 4d 29 89 16 f1 e4 7b | dc e2 55 b9 29 ad b8 79 4e bb 9a 44 92 25 af e6 | 8f 1c 0d 27 3a fe 2f c8 95 15 ef 6f 1b 1e 7a 94 | a3 8c 31 92 cc 09 2b ca d2 98 1d 32 a4 3c 30 c1 | 96 ab 37 bb 0d bc c5 cd 1c ca 91 c5 fa 2a c9 92 | 70 fb 0c 4c 99 ec 29 a2 72 d8 22 a0 d3 24 0d 76 | 29 00 00 24 b8 e3 46 90 e1 5a 71 46 9e cc 2f c2 | 22 0c 77 5a b9 94 a5 51 d5 e9 c9 19 b8 4f d2 8d | f8 17 d9 c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 82 ca 85 05 ee 86 5d c3 66 e4 91 | 24 1c 89 d5 b4 33 f3 c7 00 00 00 1c 00 00 40 05 | d7 2a e5 02 23 f5 bb 26 e7 1d 38 9f 9f c2 ec a7 | 48 2b cd 07 | libevent_free: release ptr-libevent@0x7fb35003b1c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c480 | #474 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0f db c1 fb 9f 17 ff 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #474 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #474 | rejected packet: | 0f db c1 fb 9f 17 ff 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #474: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38400a290 | handling event EVENT_RETRANSMIT for parent state #475 | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #475 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #475 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49698.462906; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005318 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c480 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #475 | libevent_malloc: new ptr-libevent@0x7fb35003b1c0 size 128 "road-eastnet-nonat-223" #475: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #475) | f3 25 a8 40 a9 16 90 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 fc dc 84 62 e7 1f 29 92 4f 29 58 18 7b 3f c4 | 0b 92 35 41 3d 7d f5 49 ac e4 08 33 00 55 13 7e | 41 c8 1f ab 98 7a 30 c3 af c3 cf 6c 36 f8 c9 eb | 2e 6e a4 90 d5 52 a2 8a 0e 83 47 aa 06 91 44 23 | e7 ef 3d 2e 37 19 57 6f 45 ce 1d 86 c2 e7 46 ee | 18 2a 29 c4 ec 14 a5 7f 72 bc 78 02 59 a2 ca 1d | b2 b0 a4 5c 1b 84 48 bf bd 56 e0 d5 a2 ad cf a0 | ed 67 0d 74 38 b9 ba e0 64 fd 1a b6 82 cc d6 8a | 07 94 d5 49 9d 7f 16 e0 7c 51 29 17 d6 08 40 72 | fd c6 fa 75 b2 47 30 6b 15 b9 55 b9 02 dd d8 c4 | c6 0d e1 61 7d 87 80 e1 c1 30 9f 40 92 6e 85 e9 | ef ce 2d ce 71 79 64 d3 dd 63 ec db 24 83 38 23 | 73 f2 c1 e6 cf bd 52 ef 73 4d 97 4a 32 ac ae 30 | 6c 19 3c 8f 59 15 1c e0 c6 b3 5b a5 c9 da d5 d9 | 5d 32 c2 2c c5 8a 99 8b d0 ac 6f 05 fa 9a 82 9e | fa 91 c3 17 c1 28 24 70 4e 52 7c 04 70 68 57 b3 | 29 00 00 24 d6 06 09 cd b7 26 a0 ec bf 9a 6e 13 | e8 2b d8 44 aa f3 29 4e 9f 5a e2 23 56 33 79 1c | 13 aa 41 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 5a 5b 76 80 70 09 57 e9 61 f5 b2 | db 52 90 c9 67 ea 13 33 00 00 00 1c 00 00 40 05 | 6b c7 4e 4d 75 42 5c 91 03 17 f3 17 f4 9d bf bf | b8 92 f0 13 | libevent_free: release ptr-libevent@0x7fb38402bf10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400a290 | #475 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 25 a8 40 a9 16 90 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #475 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #475 | rejected packet: | f3 25 a8 40 a9 16 90 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #475: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354025320 | handling event EVENT_RETRANSMIT for parent state #271 | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #271 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #271 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49698.464181; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006264 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400a290 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #271 | libevent_malloc: new ptr-libevent@0x7fb38402bf10 size 128 "road-eastnet-nonat-19" #271: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #271) | 7d 5f ba e3 47 14 e8 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 b7 7f 1c 9b af 52 72 9a 96 12 4e c3 f7 5f 8a | 48 37 54 79 d7 e3 fa 14 73 ed 20 d0 0f 82 32 1d | 91 7e 9e e7 72 47 b7 f9 8c ea 5f f8 df 55 12 c4 | 92 bb 9f b6 bd 08 63 49 16 85 39 f9 e1 a5 b1 3c | c9 58 9d 54 19 7c 80 7a 60 14 04 1b 66 54 39 2c | 16 d8 67 8c 1c 17 da 4b 4f 1f bb d2 83 f8 37 fc | 93 5f 92 af 49 5f 4c f2 18 ce 79 e8 01 4b 07 77 | 80 53 3f 3e 68 e0 6b 21 fa 6f 05 3a 1d 5f f9 c2 | 5b 34 da 08 fc 81 e1 b6 3f ef a7 e1 31 76 84 4b | db 66 e5 6b 4f 6c 18 0f ea 47 e4 2c 6a c6 c7 06 | 5d 0a 4e 6f d5 bc 0f 88 7b d7 82 6f 83 51 d3 f6 | 3f a3 4c ff 85 ee cb 4b c1 01 38 69 a0 a8 36 14 | 78 3e d3 db 38 75 17 e9 a4 a3 59 d1 1c af a4 4d | 60 05 9d fd 70 d0 ca cf 0e 66 4b c6 c1 40 c4 3b | 1b 74 97 05 ab 30 3b 52 e7 0a 00 36 d3 75 ae 4d | 76 9f 37 1c a2 58 eb 22 e1 c0 ab af b2 c0 c6 2e | 29 00 00 24 7c 82 5e 31 94 0b 65 4a 1d 71 08 ad | 0f 28 62 96 1d 12 64 f9 13 f9 d7 4a bb 8e a2 2a | 74 49 fb 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 80 df fd 55 81 8a 62 6a df 6a a7 | 9f a0 5f ab 49 a7 33 15 00 00 00 1c 00 00 40 05 | 73 c3 81 b2 53 ff c8 44 e3 9d 4d 41 12 c0 55 97 | b5 95 22 52 | libevent_free: release ptr-libevent@0x7fb35403f170 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354025320 | #271 spent 0.0985 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 5f ba e3 47 14 e8 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #271 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #271 | rejected packet: | 7d 5f ba e3 47 14 e8 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #271: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000cc10 | handling event EVENT_RETRANSMIT for parent state #272 | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #272 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #272 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49698.549475; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007055 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354025320 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #272 | libevent_malloc: new ptr-libevent@0x7fb35403f170 size 128 "road-eastnet-nonat-20" #272: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #272) | ff cb fd 37 8d 6e 61 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 04 b7 27 a5 a7 b8 66 d1 97 95 af 66 c3 e5 98 | ee b7 4e e8 fe 54 c0 2a 2c 35 b6 d6 11 41 10 b4 | 18 af 3b 75 f0 d4 8b ed 8c 54 fb a5 3b 9b 6b cd | 03 d4 cf 02 df ad 03 af ed 19 0c 47 fd 76 33 3e | 24 82 13 9d 24 33 be 90 d1 7f 59 52 78 71 71 b7 | d4 30 a1 93 8a 23 ef e8 5d 07 26 a3 58 a3 1a 46 | 2d 58 6b b7 bb c2 88 9f da 41 df 19 fa 55 01 88 | 63 f9 88 36 bf 3a 39 63 56 a1 2c 9c 43 fd a5 21 | f8 58 cf ff 69 0b 98 4e 19 2a 44 99 da 01 4c 80 | 0c 1f 77 fa 46 a9 9d c9 0d f6 84 3d b7 03 9e fa | 58 be 5a 4e 84 f9 db ea 37 27 1e 20 1a 6d 70 a9 | 48 8d a5 77 92 42 17 cb 45 b8 22 eb 9d 91 c6 90 | e3 e5 f3 a4 52 f9 ea e1 ca a2 a3 45 53 91 dc 5f | 97 6f 49 81 28 51 8e dc 29 b1 94 f1 3b a3 22 d7 | 94 cf 3a 4b 92 c4 95 64 a5 39 a2 3f 8c 62 a2 f6 | c1 95 97 06 70 da 53 50 e5 31 15 be f9 f5 d7 98 | 29 00 00 24 f6 15 1a 90 c8 9a 0e fb 04 05 1c c3 | 59 55 fa d7 2d f2 b7 dc b4 87 c3 61 27 da cc e0 | 74 b4 47 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ee f8 1c 9f 4c fe 24 8c 43 92 80 29 | 12 02 33 5d 78 63 e2 5e 00 00 00 1c 00 00 40 05 | 82 23 9a b6 38 a9 7d af e0 d8 2e 1b 87 38 33 1a | f5 86 95 cf | libevent_free: release ptr-libevent@0x7fb34003b010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000cc10 | #272 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff cb fd 37 8d 6e 61 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #272 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #272 | rejected packet: | ff cb fd 37 8d 6e 61 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #272: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0612 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374023ce0 | handling event EVENT_RETRANSMIT for parent state #476 | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #476 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #476 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49698.626891; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.004673 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000cc10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #476 | libevent_malloc: new ptr-libevent@0x7fb34003b010 size 128 "road-eastnet-nonat-224" #476: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #476) | 49 8c 7a 08 2e cc 2c 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 8e 65 66 a1 7b b1 8a 9d 19 04 71 0a 79 27 ce | 6b 54 47 32 ba 6e a8 65 c3 0d 42 b2 0f 96 a2 a0 | 61 e2 94 05 83 68 df 22 7a 41 44 d2 4f e1 67 a1 | 60 b4 59 da 81 10 89 57 9a 5f 7b e1 cb f8 3b 1c | 6b e5 1e 2a 7e 02 80 cb 9a b1 16 8c f4 74 52 c7 | 1b 8b b0 44 c6 c4 32 f3 a4 5d f0 73 3e b1 fa a1 | b2 71 e4 e2 5a 6e 52 66 e3 b8 09 2b 71 a1 10 d1 | 10 3c 31 b6 a5 93 a0 0f f1 c2 e3 a3 6b 1d 4a 8c | d0 ba 9f ac 0a e4 67 88 a7 bb ab 52 59 75 2a f3 | 7e 3d 81 45 67 16 9e 61 0a ee 09 44 27 d0 34 eb | a1 e6 bf 3e 15 23 17 f4 a9 f6 b0 c4 cb fa e4 c1 | c5 79 db 37 a8 57 54 eb d1 68 1c ef 18 56 41 83 | e2 52 4d 7d eb e3 4a db 5d d0 82 39 0c 54 56 aa | 04 9a 1e d5 4b e1 50 f6 49 eb 07 2f b8 68 4b 6e | ca 4e 01 63 ab c2 da 21 fb e2 14 e9 0d 0e ff 26 | 78 8b ff 8b 3a 63 7f c4 a4 eb a1 d4 bb 4b 60 67 | 29 00 00 24 04 bd 81 be 7c f6 28 8b 7d 46 a5 cd | 03 dc d6 e4 08 bf 60 ad d1 ef ac 3f a3 21 88 37 | 52 bb 5d 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 ab 9f 05 ae 62 3b 7f e7 ce 4f 13 | 2e 4b 82 3c e1 44 b7 89 00 00 00 1c 00 00 40 05 | f1 c5 d9 81 d6 d6 94 d2 dd 0e e2 5d 61 59 c7 43 | 61 40 b6 b1 | libevent_free: release ptr-libevent@0x7fb37401f6b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374023ce0 | #476 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 8c 7a 08 2e cc 2c 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #476 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #476 | rejected packet: | 49 8c 7a 08 2e cc 2c 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #476: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1da10 | handling event EVENT_RETRANSMIT for parent state #273 | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #273 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #273 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49698.663159; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008204 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374023ce0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #273 | libevent_malloc: new ptr-libevent@0x7fb37401f6b0 size 128 "road-eastnet-nonat-21" #273: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #273) | ed 1f ad f4 73 76 3f ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ad fb 2c d6 61 18 78 ff ff 9e ac 8e 11 6e 5b 0a | 17 90 d5 cd a5 72 c6 44 33 06 36 88 ef 85 f7 fd | d1 32 bf e5 b4 df 1c 2a 44 4b 64 5a 5c fa a6 e7 | a7 88 cd 98 18 db 83 1c de 12 34 1a 01 c0 6e 90 | b0 37 b6 8e 3f bc 29 ae 17 56 d9 4e 3e aa f9 1a | 05 22 37 90 a3 98 0c 9d fd 31 f5 89 2b 79 38 70 | a3 3c e3 a6 be b6 20 06 92 92 77 84 f9 e1 f6 43 | 50 c4 75 3f ce 2c 7f a3 83 07 1e 29 12 48 86 d5 | b6 e2 61 df c8 2b 9c ea 45 c9 6b 62 38 f9 06 23 | 9b a2 90 c4 51 19 47 e4 c9 9e bb 38 c5 ea 4c 2c | 24 15 a0 60 6e 12 c1 7a cd 75 9f 6a 97 65 4f 9f | 6f aa 7c 8b b3 99 29 be 41 56 ad 5d 52 77 c8 87 | f1 18 76 ec 44 be fb bf 14 5e 22 ec 7b 78 cb 22 | 16 62 54 b4 5f 5e ed e0 38 14 64 69 82 ec fb 0f | 84 be 3a 69 27 17 b5 b0 42 81 a7 3b e2 19 f7 47 | ac 1d 3d ca 8c d0 ae cf 0d f7 a8 a2 36 9e 94 83 | 29 00 00 24 a4 16 d5 7c 26 cc bd 52 fc 33 91 77 | f2 08 cb df 04 12 5c f5 f3 31 f7 87 08 22 5b ef | 2b 8c 5b 44 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 3d 78 9d 41 51 b9 57 ea 0d 4a 5f | 38 c6 cb 30 ec f2 21 4b 00 00 00 1c 00 00 40 05 | bd ec 33 2a 1b 35 fa ad 7a ef 73 f7 d9 b0 09 33 | b4 e9 3f 2e | libevent_free: release ptr-libevent@0x7fb36803f270 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1da10 | #273 spent 0.0993 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 1f ad f4 73 76 3f ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #273 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #273 | rejected packet: | ed 1f ad f4 73 76 3f ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #273: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c00cfd0 | handling event EVENT_RETRANSMIT for parent state #274 | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #274 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #274 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49698.745484; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005279 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1da10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #274 | libevent_malloc: new ptr-libevent@0x7fb36803f270 size 128 "road-eastnet-nonat-22" #274: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #274) | 97 f1 23 53 d2 3b 4d 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 bf aa 44 4c 86 42 20 d8 9e 9a 10 8c 03 23 1c | 55 12 c5 05 17 54 35 db 09 ea 86 4f 1e 8f 7b 32 | 9a 2a b0 4c f2 e7 18 73 a1 a0 fd e2 40 07 2c 7c | b0 86 fe c9 c0 0a 24 ee 0b e2 8f 65 27 f4 ce d4 | 26 d0 8a 70 5c 4d 46 36 4c d7 e9 bc 9b 95 2b 48 | 94 a5 c8 98 b4 23 f8 e0 8f 7c 6d 1d 50 c7 fe 04 | 1c ce 6b 59 2b ed cf 4a 5b 4f 67 9e cc 11 c0 53 | 7c 50 d5 3e bd 07 f0 e3 56 2a 0b ae b3 c0 99 43 | bb 92 8e 39 19 7e 1e c2 71 84 a0 76 9a 0f 7a 85 | 50 cf 0d 7d 85 0a 08 cc ee a1 bd c3 88 dd 8a de | e2 9f 70 d5 bb 76 44 f0 e2 0f 12 4d ae 88 a5 a4 | 51 38 bf fa 0f 38 f4 4c bb e3 25 bf 62 88 5c 87 | e1 a2 de e1 56 a5 9f 6b ce 90 dc 86 6d 26 32 32 | 64 ae 0b ac fa 3a f6 9e fa 00 00 26 02 a9 70 2e | af 79 3d a8 07 0b 81 d4 53 f3 46 fc 05 11 f6 55 | 0d 1d 8f a8 e0 93 58 07 b0 a8 c9 54 c5 14 a2 da | 29 00 00 24 59 ef 9f ca 6d 42 ee 4c de 0a 4a 8e | ec df b4 6b 0d dd 66 fa b2 ad 6d 66 92 77 f9 cb | 4b 49 7a f0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8d 80 80 1b 6e 73 7e e3 fb 20 6a a8 | f2 02 f1 bf e6 58 62 ac 00 00 00 1c 00 00 40 05 | 31 9f 40 90 8f 0e 1c 6e 4b 7e bf d8 97 47 82 19 | e1 cf 25 c8 | libevent_free: release ptr-libevent@0x7fb36c0296b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00cfd0 | #274 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 f1 23 53 d2 3b 4d 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #274 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #274 | rejected packet: | 97 f1 23 53 d2 3b 4d 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 16 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-22" #274: ERROR: asynchronous network error report on eth0 (192.1.3.22:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac7f80 | handling event EVENT_RETRANSMIT for parent state #477 | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #477 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #477 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49698.782786; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00637 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00cfd0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #477 | libevent_malloc: new ptr-libevent@0x7fb36c0296b0 size 128 "road-eastnet-nonat-225" #477: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #477) | 3f 73 6c 52 e2 16 12 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 68 39 c4 34 ea c1 cb 39 a9 f7 a9 af 21 c4 2f | 59 10 95 11 49 04 1e 26 c9 8f 50 f5 a4 65 8f b4 | 05 5b e9 56 60 ee a1 83 15 a3 b3 99 a1 69 bb 30 | cc 2b 98 3b 1e 30 46 76 ff 8d 39 41 4c 02 aa c6 | 7d 2f 3c 38 bb 54 54 f3 fb 6c ca 8e 5a 70 15 52 | 0e f8 6d 99 7c 6a 3b f5 58 74 0d 21 2e 4e 88 07 | 53 e0 50 d2 f7 38 33 9c 1e ad d9 ed 1d 96 b7 80 | 22 e0 8f bd a1 c0 a3 2c 94 20 d5 25 06 a2 7f 34 | 69 08 93 f9 8f 4f 23 ac b8 84 4e a5 b6 4c a2 fd | 75 2b 4c 8f 39 aa c3 bd 56 04 f8 29 c7 f1 40 cc | 9b 1a e4 8b 46 36 dc 67 52 7b 4f 7f 89 4e ad be | 6b 62 8d 22 67 f2 df e5 dd fb ec d6 50 89 50 9f | ee 43 32 27 75 9c 8a 33 f8 2e e0 8a 42 cb be 39 | aa d8 09 f8 75 cc 7e 70 d1 1d e9 02 66 48 e7 a9 | 85 21 80 86 49 7c d0 81 50 d6 7a 61 62 60 a5 9e | 15 19 da e7 5d f6 40 da d1 f3 3f 04 ae f2 b4 4a | 29 00 00 24 ff dc d7 b1 fd dc f2 f7 49 64 0a 31 | e9 e7 85 40 8d 4a be e6 65 0c 38 4a f9 ed 0f 7d | 4d 19 c2 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 0f c5 61 64 4d d6 f7 e8 8d a8 de | cf 04 b2 c9 0c b8 8a b5 00 00 00 1c 00 00 40 05 | 72 d7 c9 34 b9 dc 3d 33 a4 7e ff 3a 57 4e 49 6e | fe 3e 47 b9 | libevent_free: release ptr-libevent@0x7fb360035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac7f80 | #477 spent 0.129 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f 73 6c 52 e2 16 12 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #477 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #477 | rejected packet: | 3f 73 6c 52 e2 16 12 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #477: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0488 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1c440 | handling event EVENT_RETRANSMIT for parent state #275 | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #275 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #275 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49698.836104; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005589 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac7f80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #275 | libevent_malloc: new ptr-libevent@0x7fb360035930 size 128 "road-eastnet-nonat-23" #275: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #275) | 8e 8a 90 cd 9e 92 16 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 db ff f3 45 8d 77 6b ab 4c f5 59 93 99 02 27 | 95 ea ea f3 ac f8 d0 0c f4 e4 a7 81 ed dc a2 2e | 80 d4 21 01 5a 1a 55 9b d3 86 c5 c8 54 08 80 87 | 53 03 95 88 ee 42 5d b8 52 8e fe 84 14 38 79 44 | c3 51 49 fc 97 0d 59 e0 5f 4b c0 5e f8 ec 96 9d | 9d 66 a2 14 38 ec b6 d3 b6 6a cc ee b5 48 0a 5e | 6f de 87 79 9d 43 73 e3 c3 11 60 66 e8 ee 7a 7d | c3 f9 f0 de 79 dc 04 3a 85 85 52 d2 92 21 fc 86 | 8d fd 20 94 86 24 05 6c 2b cb ee c9 04 8f 0f 93 | 01 a5 e2 2b 0c 12 b9 e6 3a 6c ef c0 32 59 e5 d2 | 3b 11 a2 9f 2d 5e e0 2d 8c 75 47 73 37 0b fd dc | 38 6f 1e 5d 62 ac ab 3b f8 90 5d 68 0c 10 a4 e3 | 5d d1 15 9f 1f d5 11 83 81 be 1d a7 8f 91 34 60 | 10 68 8c b7 8b 5a e8 bb 55 32 b6 ac 66 fb 13 bc | 8d 01 0f 0f f6 d9 7e e8 52 a6 18 9d f5 fb ae f8 | d6 4a f4 34 c9 7a eb 6e cd 1f ad 11 86 f4 37 e0 | 29 00 00 24 82 2a d3 ed 88 6f 6d 2b 95 fc ef 17 | cd da 04 83 d9 0b fe c7 f7 7a 31 0a 69 4f 17 0b | 3b dd fa 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a2 12 f4 6b 5c 7a 37 1f d4 51 59 a4 | 33 90 ab 79 b6 80 74 7b 00 00 00 1c 00 00 40 05 | 6b 59 3d 2d 41 62 79 69 4f 0b fb 7b cf 22 15 97 | 6d 57 a6 24 | libevent_free: release ptr-libevent@0x7fb34403a3d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c440 | #275 spent 0.522 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e 8a 90 cd 9e 92 16 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #275 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #275 | rejected packet: | 8e 8a 90 cd 9e 92 16 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #275: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0476 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a60690 | handling event EVENT_RETRANSMIT for parent state #478 | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #478 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #478 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49698.89481; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00512 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c440 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #478 | libevent_malloc: new ptr-libevent@0x7fb34403a3d0 size 128 "road-eastnet-nonat-226" #478: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #478) | b4 9c 7f a0 55 ec 5f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 86 bb f8 93 0c cc df 70 83 3b a1 9a e0 b8 e3 | ef 6e a7 55 12 1e 4a a1 3c fd 3e f8 52 71 57 ec | d1 b9 27 97 72 c7 60 a2 ce b1 45 33 01 2b 7a c1 | 6c 56 fd d5 59 18 5e d3 c3 75 ef 36 1c 65 ec f7 | 03 c0 d4 70 7b b6 e1 35 71 9d 76 5b 7d 21 d4 3b | 12 1e 6c 03 cf 08 78 60 b5 ba 22 6e 40 93 8e c7 | 49 b5 59 bf 7f 87 44 20 2c 36 31 fc 69 d8 21 31 | 6c 62 2a ef c7 55 7b 01 a6 27 b6 8c 28 9f 7c ac | d4 27 6c f1 7c 85 40 4e 23 a1 d4 02 e3 38 52 92 | 5f 62 3c 6f 58 9e 47 5e 72 b1 b1 7d 8d 92 b6 d3 | be e0 0a 4d 01 e0 16 9f 01 75 9d 1c 68 e3 f5 d9 | 8e 19 b8 2b 12 45 ac 03 e0 b6 4d 98 39 5a 75 d7 | 7c b1 b9 f8 a3 a2 b1 d2 49 e7 b2 11 f2 c6 a7 7f | 57 72 f8 df 1f 7a 3c df 19 c0 28 fb f6 f4 59 df | f9 cb e8 e4 b5 73 46 61 ef 64 d4 38 66 2b 1c f7 | d4 31 c9 51 2e 93 97 3b f3 a7 d3 d3 06 a7 f6 99 | 29 00 00 24 19 2b 71 2c 92 77 f3 24 92 84 03 b5 | 44 5b d7 aa 5e 03 e6 f3 27 6d 26 be 26 c2 0f f8 | de ad c4 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad b7 1a 04 ad be 09 f8 62 42 a2 e6 | 69 0f ca 24 af 9b 5c 02 00 00 00 1c 00 00 40 05 | 37 89 76 5f 87 60 25 2e 24 4c ae 3c 7a 86 5f 05 | 9f e3 e5 ad | libevent_free: release ptr-libevent@0x7fb3880210c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a60690 | #478 spent 0.183 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 9c 7f a0 55 ec 5f 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #478 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #478 | rejected packet: | b4 9c 7f a0 55 ec 5f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #478: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0684 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45350 | handling event EVENT_RETRANSMIT for parent state #276 | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #276 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #276 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49698.947203; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00672 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a60690 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #276 | libevent_malloc: new ptr-libevent@0x7fb3880210c0 size 128 "road-eastnet-nonat-24" #276: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #276) | 97 d8 09 67 95 19 ff f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e fe 65 45 24 16 54 b2 a7 14 49 9e 41 08 a6 ad | 8d 38 c1 ab 41 bc c5 70 74 ea 87 6b 47 67 61 c9 | 08 e4 05 10 d8 b1 89 eb 95 ae 5c c6 f1 8d 64 f6 | e2 34 f7 1e 96 bb c8 e4 08 d5 11 49 c7 13 d5 5b | 05 9d 02 33 71 55 11 11 24 9a 7a f7 2f f8 55 e9 | 49 16 da 32 11 31 25 c0 d3 d2 83 15 e8 61 24 52 | f4 f3 a7 f2 34 62 0e d9 54 b7 ea 87 42 a8 29 03 | 05 f5 e1 d2 8f 40 88 3f e8 e4 52 27 80 25 db f2 | 79 7c f2 ce e3 4d 99 fa 0f 82 50 fa bd f3 31 31 | 75 5b 04 3c f4 62 cf 98 a6 3b 30 69 aa fe de 35 | fe 70 61 92 ab 0c 67 96 0d 80 c2 5b c7 8c 3b 7a | 1d cc 0e d5 c6 71 9d 10 b0 4a ac f9 9f b7 d7 6d | 29 1a 45 c3 c8 c4 88 f8 4d dd 53 1c d2 5c 13 5d | 0b 9c e9 d4 6a e6 6d db d7 74 a8 c2 b2 2b 2e 99 | c1 be 2c 7e b9 9a 61 61 42 22 a8 96 77 9d c3 f9 | 9b eb 60 04 cc 7a e8 a6 1b 7a bb 42 2e 5c de 12 | 29 00 00 24 89 93 ef 63 4b 32 f6 be 90 74 d4 cc | df 00 dd 1b b5 27 60 b1 da 93 3c e5 82 5c 18 d4 | 92 56 47 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 b3 01 11 26 92 0f 1e 78 d6 0c e4 | b7 13 47 be 6e 37 68 a6 00 00 00 1c 00 00 40 05 | 24 f3 9b 24 06 cb fe aa 4a 7c a0 cb 8e 4b 56 de | 28 62 03 f5 | libevent_free: release ptr-libevent@0x7fb374034da0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45350 | #276 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 97 d8 09 67 95 19 ff f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #276 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #276 | rejected packet: | 97 d8 09 67 95 19 ff f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 18 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-24" #276: ERROR: asynchronous network error report on eth0 (192.1.3.24:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0628 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cc10 | handling event EVENT_RETRANSMIT for parent state #479 | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #479 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #479 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49698.995562; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005625 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45350 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #479 | libevent_malloc: new ptr-libevent@0x7fb374034da0 size 128 "road-eastnet-nonat-227" #479: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #479) | cf d2 c5 54 f4 1c f6 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 7f 14 60 4b 10 9d d5 d2 57 b0 91 8f 3f bc 64 | f3 21 66 f1 3b 94 f5 72 55 1b ed c6 dd 53 3b 05 | c0 1d dd be ad b9 bd d8 0b 5f 4b e3 1c 65 1f 4d | f0 ee 1b 33 c4 3a 9d de 12 12 f6 89 59 76 db 59 | 58 77 c4 51 cb 4f 4e a0 dc fb d2 f7 62 b4 a7 a3 | 1b 68 cb bb e9 09 d6 f0 e4 6b 8d 72 c7 c4 14 34 | 39 ae 8e 61 09 3a 83 2f f5 f4 c7 5f d2 2d b0 d4 | 26 d7 e0 79 26 1d 45 4b 13 c4 86 65 f4 ae 01 81 | 02 a6 0e b2 43 b5 c9 34 60 91 47 c7 ad 72 96 75 | c1 19 c1 36 df fe 89 e5 4a ed b6 37 c9 47 46 4a | ec 4d e3 1d 06 24 05 ec 83 47 39 85 ec 30 13 7d | 3c 3d d1 56 09 9f a0 06 ca 9a 1a b3 23 55 50 9a | b8 7d cc bd 04 23 e1 7e 80 5a 10 c7 17 c0 8f 7a | 89 c6 a1 6e 48 75 0a bf 79 1f 97 1f 66 26 95 b2 | 3f 11 75 2c 3f 93 e4 16 06 22 12 43 49 c5 4b bb | 85 1e 39 53 e2 84 3e 8e cf ad ff a8 7d 04 99 42 | 29 00 00 24 ce ca 8a 00 13 b6 bd c6 7f bf 18 48 | 13 5d 00 cd e5 1d be f3 d6 a7 2f 7b 66 35 3d e6 | f4 91 6b 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 e1 6d ff 62 21 60 0d e9 4e cd 21 | 6e a6 95 f9 84 a3 ab 9c 00 00 00 1c 00 00 40 05 | c0 97 f9 bf 8a bc 59 d7 d0 0f 34 34 05 ac 6e 13 | dc 84 e0 81 | libevent_free: release ptr-libevent@0x7fb36001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cc10 | #479 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cf d2 c5 54 f4 1c f6 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #479 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #479 | rejected packet: | cf d2 c5 54 f4 1c f6 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #479: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368025320 | handling event EVENT_RETRANSMIT for parent state #277 | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #277 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #277 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49699.037862; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005548 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cc10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #277 | libevent_malloc: new ptr-libevent@0x7fb36001d920 size 128 "road-eastnet-nonat-25" #277: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #277) | ed b4 5b 7c 9c f8 2d 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 91 10 6d ca 19 82 3a d9 60 7a 42 28 66 35 e5 | 82 e1 76 6a af 41 1a 40 79 5a ee 26 e3 d1 7d 52 | 03 12 d2 f6 99 41 6c 71 1c 80 6b 42 ba dc 3a 1b | b2 e9 12 a6 18 73 56 76 a4 06 05 cc 7a a0 0d 6d | 5e b3 80 19 f7 55 aa 2e 78 b1 66 56 9c 95 5c 32 | ad 95 eb b3 ba 95 95 ac ab 11 2a 2d 88 4f f4 e4 | dc 27 65 85 9d 92 a4 95 34 90 00 dd a5 be b5 ab | 9b 9f 39 46 28 33 16 41 a9 bb 12 e3 aa e6 53 f9 | 68 46 b2 9f c5 cd e9 27 33 0f ce 44 2d af d9 1b | dd 62 0d ac 4f 6c d0 11 3c 43 0a 76 ed 0e 96 8e | 3d ae f9 37 d9 67 c1 41 28 1d b6 2e 37 94 9e d3 | 2d cd 56 12 85 bb 68 4b bc 82 79 db 1e 4d bb bf | 84 00 46 a4 83 fb 2f 52 63 fc 2d 22 07 38 b8 c2 | 10 b3 b9 89 01 dd 44 99 e7 b8 0d b3 ff 24 4d 13 | b0 46 f4 b8 d8 19 4c 50 4a 18 69 03 39 b2 07 55 | 2b c7 e7 99 0d e8 a0 4f a8 e9 77 f9 b1 03 fa af | 29 00 00 24 29 c9 81 60 c0 da c9 2a 2b e1 7f 4a | cf 46 c4 64 f1 f4 1c 69 ff e2 b3 05 a6 db d8 66 | 75 2e e0 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 88 a4 31 ce f7 11 c3 38 da 2b 8a | 45 3d 50 97 02 58 67 d6 00 00 00 1c 00 00 40 05 | 85 8b 47 13 68 9a a2 a7 47 76 c4 a7 6b ba 26 12 | 0d c2 32 9d | libevent_free: release ptr-libevent@0x7fb36802ee40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368025320 | #277 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed b4 5b 7c 9c f8 2d 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #277 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #277 | rejected packet: | ed b4 5b 7c 9c f8 2d 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #277: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa1f00 | handling event EVENT_RETRANSMIT for parent state #480 | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #480 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #480 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49699.09215; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006626 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368025320 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #480 | libevent_malloc: new ptr-libevent@0x7fb36802ee40 size 128 "road-eastnet-nonat-228" #480: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #480) | a0 d0 03 15 77 7b 55 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 81 bc 92 43 cc 20 cb 32 dc a3 83 a6 05 ad 00 | 98 6a 1a f3 68 9d 6f 0d 87 ec e9 f6 9a 02 0f 25 | 1f da 1c 78 f1 67 23 e0 e2 7f 61 43 d9 1f 5f b6 | e6 b8 f2 3c ff c1 08 c4 9f 6c 2a bc 8e ba 45 54 | 84 19 36 a3 17 42 a8 a4 75 a3 82 0a 1c 91 e1 7c | b0 f8 bf b5 fa 9f 83 82 f9 d4 70 3e e1 df 4f 6b | 6b 5d aa 23 00 ad 45 7c d2 ab 83 9c d3 c8 48 f4 | a4 1e f5 9c 86 61 b3 f2 25 c7 70 01 ac 67 7a b7 | f7 4a 5c 1c 8e 8e 59 fc 33 71 85 33 b4 10 65 ea | b8 c2 b9 0f e6 63 11 67 85 ad 57 f7 4e c8 76 85 | f8 97 7d db 2b b8 ed 1b 8b 66 54 1e 04 fc 55 3a | c8 bb b6 a6 8a 5c 4e fe c9 53 36 0e 42 74 0e b7 | bd d3 59 78 0c df 94 62 fd c2 21 a4 0c fb 4f 6c | 1c 91 d6 a4 ec 87 92 d0 8f 1e 01 93 bd 89 c0 fe | 71 01 53 5c 6f 46 39 61 8b 59 d6 4d 65 9b d8 a3 | 15 32 57 28 19 30 26 21 35 36 08 9b 79 f2 1a b0 | 29 00 00 24 c8 ff 1d 8a 8a c7 55 8b 0d 6e 9c 13 | 67 dd f9 00 d4 15 c8 78 b6 24 b1 bf aa 08 b9 85 | 7a e8 a9 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb af 61 69 a2 a5 79 11 dc 03 2e 27 | 8e 1f c8 4a f0 b2 47 27 00 00 00 1c 00 00 40 05 | 5a ba 74 8a e7 0f 7a 9b 13 6d 0a ce d0 eb db 09 | a2 8a df 80 | libevent_free: release ptr-libevent@0x7fb3740356e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa1f00 | #480 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 d0 03 15 77 7b 55 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #480 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #480 | rejected packet: | a0 d0 03 15 77 7b 55 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #480: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34000f1f0 | handling event EVENT_RETRANSMIT for parent state #278 | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #278 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #278 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49699.113432; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006045 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa1f00 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #278 | libevent_malloc: new ptr-libevent@0x7fb3740356e0 size 128 "road-eastnet-nonat-26" #278: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #278) | 08 20 1d 54 94 b3 08 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 a1 ac cd cf 52 aa c1 15 fd 26 f6 ce 5b bb 69 | e2 24 51 98 69 82 96 7a 9b 39 3d bd 86 5c 17 cb | 1b d4 a9 83 ec 80 8d 8d 98 27 4b 99 f4 20 5c e3 | 21 59 7a 6e 94 3a e5 a4 ea 37 74 6c a3 9a 99 f4 | 8f 90 94 d4 bd 67 d7 b9 06 e3 7c d1 d3 76 37 58 | 47 a2 45 8a db 7e f9 85 d6 08 20 a6 bf 2b 7f c1 | 25 eb a0 f8 68 c1 9c c0 38 d2 e7 d9 43 7b cb 27 | 99 db 05 15 9d 31 4d 0f 10 f4 8b 1c a6 46 f5 eb | 21 00 56 37 46 de 0d 94 e5 1c 55 ca 89 03 da 88 | 4e dc 76 55 16 95 7d 63 e2 29 4d 09 2b 25 59 20 | f9 0f f3 3f f2 2e bd 84 bc f5 d7 26 2f 24 33 39 | 9b 95 39 a9 c8 80 99 61 48 09 51 76 c7 02 f7 7e | 9a 29 d4 87 ca 9f 9d b2 ea 2d 4b 02 ce 90 b0 a7 | 7e 1d de da 63 ea 0e 8d 96 e6 95 fb 1c 5e 88 3b | 6e ec 99 33 d7 e2 75 ac ca 10 ec 9b 00 5a c4 5e | 94 67 a1 9a 10 a7 22 d4 3e d5 55 a9 17 c5 c5 72 | 29 00 00 24 16 ad f5 49 a7 87 af 94 50 48 7a 22 | f4 eb b9 a7 0c 25 3c c9 61 3d 03 4a 9f 4c 8f 7c | d3 51 5e 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e fe 64 30 2d 54 01 ce c5 20 30 8e | 57 4b dd bc f4 7a 78 34 00 00 00 1c 00 00 40 05 | c5 ea 3a 3a ae 73 b8 b7 65 be 1b eb 5d 99 4d a3 | 57 6c 56 99 | libevent_free: release ptr-libevent@0x7fb34001e520 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000f1f0 | #278 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 20 1d 54 94 b3 08 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #278 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #278 | rejected packet: | 08 20 1d 54 94 b3 08 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #278: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0651 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a94500 | handling event EVENT_RETRANSMIT for parent state #279 | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #279 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #279 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49699.188814; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00691 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000f1f0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #279 | libevent_malloc: new ptr-libevent@0x7fb34001e520 size 128 "road-eastnet-nonat-27" #279: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #279) | e3 74 db 6d 09 5b 39 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 0f 5a 1b 7a 8f ca c9 79 23 84 5e dc 90 86 16 | 69 23 cd b6 f6 38 83 88 87 a0 82 5d cb 87 94 7a | a5 f1 35 43 62 38 5c 18 da 06 83 48 7b 51 b2 80 | 57 ee 54 19 13 b6 1b 59 ab b3 f3 ce 4e 70 21 d2 | 1d 3f 07 6b c1 ad 15 8b 16 67 f3 79 c6 3f ee ff | 6b 97 0c 11 61 f6 68 6d 51 5b dc dc 69 1e f2 f8 | 31 6f 04 6f 19 7c a8 a9 37 a2 da ca be a8 40 a8 | d0 ef 42 ba be 70 25 1f 20 b2 dd 25 56 46 50 6a | 55 24 29 65 1f 8b ad 5a c0 f3 1f c2 6d ed 0d 17 | f8 37 85 23 72 0c 7b c5 c8 05 6a d0 1b 38 ca f1 | 63 79 aa 8b f0 75 7e c0 5c 06 26 d0 c2 20 b9 e9 | c7 89 2f ee 84 27 1c 00 f8 3a d5 7e 2a be c2 84 | e4 6a 7c 0c 25 65 bb 41 df ad ea 07 28 2c bc 6e | 24 1b 9a 66 f8 83 86 6a 84 b0 d9 93 6f e5 9a 01 | 17 24 34 ac 82 0a b8 a3 51 37 c3 89 94 09 92 d7 | 0d 37 14 e0 ee 1c 1b 73 ef 46 af cc fd ba 52 42 | 29 00 00 24 f9 6f e2 b3 2b d1 43 b4 d3 29 40 07 | 4f e9 c5 79 33 c1 2e 78 27 6c f8 54 58 c2 d9 c9 | 00 b6 d5 b4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de 94 ec 05 36 41 29 fa 93 f5 5d d2 | 39 00 ad d2 4d 2f 36 81 00 00 00 1c 00 00 40 05 | 7a 98 d6 69 28 79 15 19 95 89 31 96 52 96 29 94 | 7d 8f c3 a4 | libevent_free: release ptr-libevent@0x7fb3380300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94500 | #279 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e3 74 db 6d 09 5b 39 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #279 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #279 | rejected packet: | e3 74 db 6d 09 5b 39 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #279: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38000a290 | handling event EVENT_RETRANSMIT for parent state #481 | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #481 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #481 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49699.208144; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005267 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94500 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #481 | libevent_malloc: new ptr-libevent@0x7fb3380300e0 size 128 "road-eastnet-nonat-229" #481: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #481) | e8 f0 49 b6 6a 16 76 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 5b 3d e6 1f 63 af 92 47 ff bb 34 96 d0 88 24 | 67 3c e1 47 18 9d 62 8e d3 a4 9d b7 75 51 2f 4d | c5 c0 85 26 a0 ef 6b 42 e3 31 89 58 06 3e 3f 70 | 40 68 5f 34 02 73 08 9e 17 dc ee 6e ae 64 70 e1 | 29 5c 9e 3f 09 58 a9 16 14 23 bb 74 7b 7f 22 34 | a9 d6 3f fe 74 0f 40 5a 32 4d ac 87 fc 80 7b d4 | 2d 54 ec f5 ce b0 c6 dd a4 dd 82 14 e2 9a 36 7e | 86 de 04 4a c2 4a 3a 27 d9 82 5e 6e f1 1d d8 3d | 86 d1 82 99 be f9 63 b2 56 5a 40 42 2e 8f 30 eb | fd db ce cc 5a ac 0e 49 65 64 01 18 b4 1e 60 8d | 74 bc e9 b7 46 2e cb e0 1e 2c 67 dc 3f e9 f4 39 | 35 52 90 76 39 0a f3 d2 ac 0b 00 19 f2 ca 97 20 | b7 c6 bb 7d a2 97 ba e5 14 74 e5 ea 2f 4e 4b 3f | 08 53 d9 be 3b dd af 2f 8f 10 fd 09 08 1e b3 13 | 6a 37 e4 ce 19 dd d9 84 13 76 b0 6f 6f 43 48 f7 | 01 a4 a9 0f 9d fb 63 aa 49 8a 2a b5 59 32 b2 69 | 29 00 00 24 ba a6 3b 25 9f a9 3f 06 4e ea 48 38 | eb e2 25 25 ca e3 dd 6c 01 6e 12 39 f8 cf ff e2 | 6d 18 2b 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a ef 98 84 e9 40 8f 9c 0a de 34 0d | 25 31 92 b5 ca c8 92 af 00 00 00 1c 00 00 40 05 | 81 a9 90 20 77 ac 91 2d 88 99 0f 36 2d 43 7d f6 | 2e 36 29 48 | libevent_free: release ptr-libevent@0x7fb380036d70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000a290 | #481 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 f0 49 b6 6a 16 76 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #481 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #481 | rejected packet: | e8 f0 49 b6 6a 16 76 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #481: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf00 | handling event EVENT_RETRANSMIT for parent state #280 | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #280 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #280 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49699.242423; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005189 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000a290 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #280 | libevent_malloc: new ptr-libevent@0x7fb380036d70 size 128 "road-eastnet-nonat-28" #280: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #280) | d6 f7 ab 7c 0b ea 69 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca e1 05 9c 2f e1 85 fc d1 c1 5e ec 37 7e 0d 76 | 45 c5 de cd 99 7d 74 0a 48 32 65 23 49 b2 c2 df | ba 7e d2 ef 7c 32 31 03 10 0c 09 94 c0 eb b8 b5 | 06 97 c9 45 66 24 48 7d 72 da ab 98 55 09 59 9c | 31 af 0e c1 8a a9 90 d1 a5 1f 67 f1 af 23 81 27 | 72 13 c8 3c d8 f0 f1 d8 ca c2 a1 9a 92 8c fd 09 | b0 c2 a6 d5 91 c6 84 9b 99 40 a3 ac 3e 94 44 cd | 9a 36 6e be f8 2c 85 77 18 29 38 0d c0 06 06 d0 | a2 de 4c 8d 95 cd da f4 a0 2f bd 4d 70 4f 95 ae | db 5a f3 57 de 7c dd 31 a6 66 ca aa 68 cf 9d 1d | b3 0a 17 80 b5 20 24 43 82 44 17 25 0f 38 64 50 | 75 9d 57 76 b6 2b ee 0e 3f 93 33 cf 3f 9b 45 97 | f9 87 b6 87 a6 ec cb 33 18 44 a7 89 6a 59 c0 2b | ff 8a 7d 67 3d 1a 08 05 fe 9f fa 6c b7 f7 96 5d | a2 3b 23 c8 4a 7c 17 7b 08 d8 db 48 f9 5d 62 1b | 0b 5f d0 c6 c6 a2 28 ed 7c 45 7a f3 33 a6 d2 1f | 29 00 00 24 05 cd b3 b7 f3 87 52 75 9b b2 14 f4 | c3 19 28 f7 78 65 e3 f9 18 22 0f 07 13 10 65 88 | f1 44 b8 c7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a b5 25 17 f4 1a 4f 2a 05 d2 2d 99 | 3c 89 36 9b 9d 62 ed 5f 00 00 00 1c 00 00 40 05 | ee 9f 85 88 b6 c7 ef c2 a5 c8 d9 f7 7a e7 a6 c3 | 70 03 54 b6 | libevent_free: release ptr-libevent@0x7fb3680300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf00 | #280 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 f7 ab 7c 0b ea 69 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #280 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #280 | rejected packet: | d6 f7 ab 7c 0b ea 69 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #280: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388006950 | handling event EVENT_RETRANSMIT for parent state #482 | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #482 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #482 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49699.283715; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006061 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf00 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #482 | libevent_malloc: new ptr-libevent@0x7fb3680300e0 size 128 "road-eastnet-nonat-230" #482: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #482) | 36 c3 54 33 ec a7 b6 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 ed 30 30 be a6 b8 35 5d 7c a5 62 ac c6 13 d8 | 83 27 d5 31 a0 fa 4c 2e 40 b9 54 43 42 15 18 78 | b3 8c 6a 6c 7d 96 c5 85 70 a8 48 20 22 38 c8 e7 | c3 12 d1 63 fb e3 68 d6 08 24 69 60 e5 ac a9 33 | 22 f2 2c f6 14 52 ad 1c 12 97 d4 3c 99 28 7f 69 | aa d1 18 f8 bc 06 35 f3 dd 4f b8 bc 32 67 80 0d | b2 c8 d0 32 11 b6 f1 1a bf 32 1c f4 b1 c8 5d 4d | f1 41 f7 45 a7 42 78 6b 31 8f b7 1a 22 f3 fa a7 | 3f 96 61 3f ad 03 4e 95 70 ec 28 2e 07 88 02 e8 | 35 f1 c5 b3 16 2f 4d b9 e0 29 95 c1 2d e3 e0 37 | 5d 57 61 4b 22 78 ec 0c cc 9d f4 89 9a 2d 4f 1d | b7 c1 f5 ad 55 54 75 4b 2d 2f 97 b2 b3 0a f4 e5 | ca f8 64 9c 52 40 a8 a2 99 0e 3d 9b 5a 9e 1e 2b | 75 b0 89 ef b0 bf 99 f4 37 0e 0c 27 d3 f1 9a c6 | fd 46 0a d5 dc 88 12 58 b5 c1 7a 5a 1b 30 d2 78 | 2b ef 75 09 ea 77 2f b0 ad cc d1 d9 98 94 ca 15 | 29 00 00 24 ba df cf 8a 38 2e 1f 41 21 49 fc b2 | 01 80 ce b1 18 f8 70 f3 ba e7 48 83 d1 e9 62 d6 | 6c d1 b9 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 54 bb 11 83 48 2f 3f fa 5f 96 d0 ad | a2 72 2a 82 ce ec ef d2 00 00 00 1c 00 00 40 05 | c3 77 e0 b4 3a 22 ca d3 bf 9b f4 e6 b2 71 76 56 | 18 71 d4 99 | libevent_free: release ptr-libevent@0x7fb388041ce0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388006950 | #482 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 c3 54 33 ec a7 b6 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #482 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #482 | rejected packet: | 36 c3 54 33 ec a7 b6 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #482: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3780297c0 | handling event EVENT_RETRANSMIT for parent state #281 | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #281 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #281 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49699.314977; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009225 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388006950 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #281 | libevent_malloc: new ptr-libevent@0x7fb388041ce0 size 128 "road-eastnet-nonat-29" #281: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #281) | 6e a6 a1 b4 01 a0 0e dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 68 2b 46 8c 2b 9e 7f b4 06 ec 72 36 3a be fa | 50 91 b7 48 61 bc d4 d3 11 dc 1f d6 9a c1 21 a2 | 97 1d cf c0 4e 3d 88 c1 96 35 32 5c c3 c4 b5 d1 | 96 85 b6 1e 34 48 5e 70 e1 97 d1 4d ee c9 36 cd | 07 d4 c1 98 8c 4b f8 c0 2b 58 50 1f 39 3f 7e 62 | c9 4e 54 20 95 c8 4c fc 93 c6 64 05 ff db 54 92 | f9 8c d4 27 f6 69 ac 7b 53 12 4d 7e 22 de e0 4c | 9b 65 6e 55 e2 59 db 77 7d a0 70 9f cd fd b6 7a | 15 79 9a 65 29 97 e4 c6 46 84 7b 52 6e 4e 1b 43 | 80 ec d1 87 3d 75 43 f1 6b 08 60 65 d9 e2 6c 04 | c5 f0 75 0d 72 fe 09 0a a5 0a 64 0c 9d 8e b4 bd | 1a c3 bb 6e f6 92 c0 b5 8c 93 b9 eb e3 12 c7 a1 | bd b7 f3 a0 b9 80 8c 76 59 8f 43 af 0f 58 66 7f | b7 29 f0 c0 1c a1 51 2d c9 c0 ac e0 da 3e 0a fc | dd 42 1f ec 76 07 0c b3 ee 58 80 d8 3b 40 cd 6e | 29 12 48 14 35 22 e0 cf 05 9a 1b 46 91 35 4f 0c | 29 00 00 24 1a c7 00 d3 83 91 04 b5 76 85 d3 69 | a2 08 a9 2c b0 b3 a2 60 be 18 eb 18 2d fd ba 85 | 0c 0a 5c be 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 cf b4 85 53 44 b8 30 db 31 85 32 | 18 7e 13 4c d0 54 13 87 00 00 00 1c 00 00 40 05 | 54 d2 36 85 02 19 96 85 9c 4b 22 1c 55 b4 68 ad | 30 56 22 92 | libevent_free: release ptr-libevent@0x7fb38403da90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3780297c0 | #281 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6e a6 a1 b4 01 a0 0e dd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #281 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #281 | rejected packet: | 6e a6 a1 b4 01 a0 0e dd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #281: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358017ea0 | handling event EVENT_RETRANSMIT for parent state #483 | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #483 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #483 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49699.39131; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005303 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3780297c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #483 | libevent_malloc: new ptr-libevent@0x7fb38403da90 size 128 "road-eastnet-nonat-231" #483: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #483) | 34 4c 65 0f e6 b6 ad e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 14 b4 cd 04 ae 73 27 55 14 94 b2 a9 a9 46 92 | bf 38 7f 34 e4 30 01 9b cc 3d 69 9b 72 22 2d c6 | c0 5a ca f2 aa f8 34 31 df 85 74 a8 8a c4 71 d3 | 18 15 b7 43 a0 c7 52 88 83 cb 13 e3 0b 22 9f 8d | 9b 32 7a fd 24 4c 85 ea ba 28 19 ff da 93 b1 bb | d8 33 5c 65 db be 0a e0 bd 29 79 f5 94 d3 6b 1b | d0 fe 62 1a aa 43 59 54 5f 94 f2 d4 df c7 8c 2c | 9f 79 f7 92 9d e8 8c 7a 9a 6a da 8f dd 5b f5 4b | 78 88 55 3a 27 f6 46 11 a6 78 da 31 e5 57 e3 ff | c3 41 c4 d8 db 92 c7 9b 0b f2 9c 05 a4 6f e4 60 | d6 be 30 93 95 25 fb 5e 0e 06 32 43 09 91 4d 90 | 0e 89 44 7a 24 99 b2 ff 62 86 54 98 47 bc f9 cf | ff 60 15 2b c0 14 62 be bc 88 1f 37 10 d8 42 2b | 8e 68 b2 b4 90 d0 f5 fe bf 7c ce c7 6a 70 46 09 | 84 97 db 42 58 43 9f f3 46 27 26 32 2b 0c cd 41 | 80 81 33 b8 5d 30 60 f3 70 32 7b 81 3a 1a 11 48 | 29 00 00 24 a6 6b eb 02 98 7d a6 5e 59 5e bd f1 | ef cf 36 f2 a9 4b e0 19 61 9c ac e2 ac 17 24 09 | 0d 96 04 a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d1 38 08 89 da 41 ff 7d 1c 3d 17 6c | 3a eb 05 70 fa bf ed 59 00 00 00 1c 00 00 40 05 | d4 38 01 a3 1e e4 dd 2e 8e 63 54 12 3f 4d 01 1d | 49 6b 48 46 | libevent_free: release ptr-libevent@0x7fb35802ed90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358017ea0 | #483 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 4c 65 0f e6 b6 ad e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #483 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #483 | rejected packet: | 34 4c 65 0f e6 b6 ad e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #483: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0519 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #282 | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #282 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #282 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49699.402596; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.0054 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358017ea0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #282 | libevent_malloc: new ptr-libevent@0x7fb35802ed90 size 128 "road-eastnet-nonat-30" #282: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #282) | 46 9b 20 9a e5 8e c3 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 4a 4a 05 a5 e8 31 07 19 01 9a 3a 84 bd 00 2c | 01 26 e2 35 38 1d c2 10 27 23 65 e5 d1 d5 9e 9d | 93 4a 85 e7 79 d0 00 1e a3 c9 7f d0 87 96 13 32 | 3a 52 f9 aa fd 75 0f 57 d6 53 8b a2 5b 2a a9 29 | 20 47 1e e0 f6 79 b4 a2 d0 fd e2 85 9e 06 b0 c5 | 1f eb f9 ce 36 69 1b 53 58 8d aa 02 dd a3 93 19 | 8b 0f e6 94 85 c6 21 ed 47 d3 f5 ea 66 43 13 82 | da f0 e0 63 f7 98 28 5e a4 cb 20 f6 07 ee ef 26 | 67 cb 7a 06 89 6a a0 7d 08 f6 7d ba 27 41 9f 3f | f9 0e 8b 4e f2 9a 91 05 9e 11 34 81 a4 96 af ee | 90 6f f6 67 88 78 72 a1 94 39 66 b1 22 8d 82 7c | 2e db f6 a2 5d 7b a6 60 14 74 1c b3 6d 80 df 10 | f8 59 91 7e 94 04 39 3a 04 77 10 6d 00 3c a4 c9 | 37 8a d9 0b 42 ad 9c 7e 79 d0 0a 68 7a d1 19 02 | 3f 63 fb b2 47 d4 e3 0d 1d 5d 62 cd 37 80 af a2 | 0b a2 8f e1 3f b9 34 fc d9 39 c1 27 65 16 8f 01 | 29 00 00 24 43 cb 25 08 9c 10 6d 8d e0 8b af 6b | 30 64 58 bc 44 4b 07 d1 a3 b6 7d 77 46 d8 bf 81 | 62 ff 7f 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f cf c8 c3 31 5e 18 fc ce 9a 0d be | ec 9d b8 d1 d8 fa d9 18 00 00 00 1c 00 00 40 05 | 91 0b 3b 5a da ea f5 67 3e 89 32 94 c9 4e eb eb | e4 06 4e d6 | libevent_free: release ptr-libevent@0x7fb38003dab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #282 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 9b 20 9a e5 8e c3 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #282 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #282 | rejected packet: | 46 9b 20 9a e5 8e c3 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #282: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #484 | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #484 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #484 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49699.477899; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007044 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #484 | libevent_malloc: new ptr-libevent@0x7fb38003dab0 size 128 "road-eastnet-nonat-232" #484: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #484) | 74 f2 d9 62 15 c8 1b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 3b 62 f3 ed f9 47 0c bf 01 45 93 af e9 01 13 | b4 4a bb 89 23 94 52 5c ed 86 36 6e eb 69 47 16 | 4f 4d 66 99 6d c7 d9 da 05 03 61 83 27 be 84 fb | f7 56 2a 10 f6 9b f2 84 b7 d0 85 06 cd 12 0f 3f | a6 61 71 e1 4c 4c be b5 23 cc e4 61 ef 62 aa 02 | 7f 71 fa f2 27 5a a1 66 46 df 65 7e 72 33 12 a7 | d6 b1 80 2f 61 a3 b3 4c c2 28 e7 cf a7 3c 3b 6f | 3a a0 e5 2d 1e 20 bd 32 76 a2 9f 45 f7 a6 6e e6 | 37 c0 ae 2c 38 01 39 bd 5f e0 3d 65 31 0e f3 37 | 25 fd f7 75 ed 4c 70 31 98 89 dd 26 6b f0 c6 86 | 26 2c de ac 79 65 19 00 78 ef 2a 8b 1d ed 38 d3 | 5d 90 eb e1 29 71 f3 ff 0c 50 ed 12 97 fe f3 76 | 44 b9 27 26 27 3a b5 56 98 ce 1d d1 07 e6 e9 5e | c0 92 67 d1 b6 25 97 6b 40 80 cf 9a 68 03 d5 29 | 53 a9 fd 87 28 85 18 42 c6 5b 08 65 a1 d2 2b 6d | e9 34 66 d8 9b 2a 73 2a 5b b8 59 63 5e 1f 84 b9 | 29 00 00 24 71 8e 31 23 c4 63 d2 6d d6 0a c0 cb | 7f b2 37 27 b0 85 2e 73 82 c7 9f d6 c1 fd d8 67 | ff 33 43 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 6d 47 d8 30 7b 36 73 b1 0d df 8b | 82 69 87 3e 91 43 68 d6 00 00 00 1c 00 00 40 05 | 23 15 eb e5 a3 5e 20 cf 73 fe 01 cb 79 d0 a6 f2 | 55 38 68 fe | libevent_free: release ptr-libevent@0x7fb37c014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | #484 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 f2 d9 62 15 c8 1b 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #484 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #484 | rejected packet: | 74 f2 d9 62 15 c8 1b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #484: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0765 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378012890 | handling event EVENT_RETRANSMIT for parent state #283 | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #283 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #283 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49699.479275; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005452 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #283 | libevent_malloc: new ptr-libevent@0x7fb37c014c70 size 128 "road-eastnet-nonat-31" #283: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #283) | 6d 25 6c e9 9d 21 2c 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b e9 86 64 c6 6f 55 a3 bc 52 39 e5 45 42 b6 cc | f2 a4 d8 e4 d7 c3 31 05 04 56 63 c6 c2 26 bf 59 | 6a b9 a8 fc fa 31 7a 57 4f f1 c0 49 83 9c 61 f6 | ea 6e c3 47 87 15 57 34 67 e5 10 86 61 2d 48 bc | 65 9e 10 ea 92 ad c9 b9 04 73 b8 2e a2 d6 b3 0a | c0 be 8f 2a 6c 99 ba 2f e9 4c 9e ba 98 ae c9 a2 | 11 55 c6 05 57 8e ab ea fe ab c0 66 94 91 31 6d | 5a 61 9a c2 11 87 93 ed bf 92 59 c4 b9 84 ce ab | db 12 40 39 53 0e ae d0 f2 e5 17 3c ea 18 98 24 | 12 e5 c0 95 86 ac ec 82 ab 81 6f 9e 62 08 73 b9 | a8 9d e0 0f 7d f3 2e 0b 7e 07 bc 19 99 3e 51 81 | 29 43 73 f2 dc b1 11 40 fd 25 79 3c 57 b5 ab be | 2e e1 68 18 e4 38 d8 a0 4c 8c 74 5e ff df de 09 | df 96 78 f3 4d 4d f6 30 46 ec df 31 2f 74 61 0b | 81 46 62 97 97 55 58 f5 2a c4 6f df 71 dd ee 98 | ae ac aa b2 0f 96 9a 79 9a bd 7e 1b 8b 95 fc 2d | 29 00 00 24 19 7a 94 41 a3 df 39 c8 6e b5 7e 75 | da 2c b2 db 58 bf cc 1e 51 b1 c7 de c1 0f 32 c8 | 22 50 94 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 90 7d 87 8b 25 a9 47 ca 59 98 98 | 30 6c 9b 73 ee 84 48 a4 00 00 00 1c 00 00 40 05 | 6c 03 cb 30 07 ff 71 63 de 15 87 b9 5c 0f 43 de | 70 36 3d ec | libevent_free: release ptr-libevent@0x7fb35000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378012890 | #283 spent 0.182 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 25 6c e9 9d 21 2c 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #283 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #283 | rejected packet: | 6d 25 6c e9 9d 21 2c 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-31" #283: ERROR: asynchronous network error report on eth0 (192.1.3.31:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35401d710 | handling event EVENT_RETRANSMIT for parent state #284 | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #284 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #284 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49699.560669; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007759 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378012890 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #284 | libevent_malloc: new ptr-libevent@0x7fb35000cf80 size 128 "road-eastnet-nonat-32" #284: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #284) | 4f c5 f3 7c 66 c6 91 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba b7 9c a5 65 e1 b6 6c 6d 9d e6 37 7c 5c f0 56 | 41 3d 90 c7 c5 60 97 4a 06 1e 79 6d 8b 7a e1 25 | 8a e0 db 36 d3 fb fd 75 27 2c e6 11 8c 23 25 88 | 33 6a f7 df 2d 31 86 e1 88 c6 aa 1b d4 34 45 16 | 89 ed d8 a3 84 50 47 88 30 89 02 8c a8 40 9f 16 | 7d e6 73 98 ef b8 9b e4 c2 07 6e 64 f9 a7 00 b0 | 51 f9 1e 1e 5d 35 fd 1d 61 a0 8a db ac 3a a5 8e | 67 a3 5b 3b 5e 51 8c 98 11 1d 70 aa 48 6b 1b 38 | fe 3a 74 c3 2d 4b 66 87 e9 a4 65 ed 1c 5b e4 91 | fa be 09 5f aa ec 3b 28 29 ab 52 85 54 9f ad 67 | e9 64 b2 c0 a7 f8 4d 31 5f 8c e9 8e 20 90 9f 65 | 6a 76 61 75 16 6e 59 99 0c 9b cb ca c4 c4 20 96 | 27 41 40 bc 51 ae 53 c0 78 fe 0b f1 3b 9e 38 fe | 94 f7 01 4f 33 dd 41 c6 b8 e2 1f f5 07 d9 60 b6 | 76 7e 73 5f c5 3d 67 e4 c6 ee 71 88 8c 90 3a 18 | 0e 12 ec 6b 94 d2 71 0c c3 11 05 e5 1f bd ac 6a | 29 00 00 24 e8 7e a2 09 c5 c0 d6 dc c4 8f 1b fd | a9 a5 28 29 c6 ee 14 10 31 5e 74 e5 a8 11 e2 fb | 53 d1 4d b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 bd 1e aa d2 1d d0 15 75 cf 8a a1 | 9b e7 2e 78 e9 b8 ab 0e 00 00 00 1c 00 00 40 05 | 98 e6 12 78 17 7a 25 b0 15 91 c2 32 50 43 18 e1 | 21 f2 b2 de | libevent_free: release ptr-libevent@0x7fb35402ede0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35401d710 | #284 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f c5 f3 7c 66 c6 91 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #284 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #284 | rejected packet: | 4f c5 f3 7c 66 c6 91 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #284: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.045 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3680129a0 | handling event EVENT_RETRANSMIT for parent state #485 | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #485 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #485 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49699.594917; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007156 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35401d710 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #485 | libevent_malloc: new ptr-libevent@0x7fb35402ede0 size 128 "road-eastnet-nonat-233" #485: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #485) | 26 20 85 62 4e 58 16 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 04 a6 43 51 7a 0a e3 68 c7 b6 92 c0 2e 14 67 | a2 f2 cb 51 e5 ce 35 16 88 d3 54 6d 62 23 37 bb | 56 61 2f d6 85 87 83 0f 70 f6 72 39 7f a7 0c c7 | 1e 70 d8 7f 4c 38 fa 53 49 29 41 95 c4 be f2 60 | 8b f1 ad 4f de df 26 c9 05 54 42 92 f1 01 24 5d | 5f 31 21 56 71 00 1c 4f 7f 83 41 cc a7 f5 8b 27 | 25 fc 78 92 10 e8 44 60 1c 59 0a 5b 0b c5 c2 c7 | 8a b4 bc 89 2b d6 59 5c 8c 78 a1 23 dc b0 6c 50 | 12 f1 b3 89 73 06 41 12 b7 a8 52 30 67 21 d0 5c | a9 0e cd 21 2b 24 e0 cb a7 f2 11 99 34 b7 dd 82 | a8 b2 9f 4a 0e 72 6d 9e a6 39 41 fd 0a 77 de bc | 1d a1 ee ad 3a 47 74 75 05 d6 38 42 86 69 10 70 | a8 ff d8 3e 12 b1 c4 88 03 52 77 9f cb 91 9d 87 | ca f5 79 a8 95 63 5f 4e a8 1e 43 7f 48 49 97 d5 | 03 8a 20 ac 28 9d 5a 1c 08 20 6e 33 63 3c ac 79 | a6 2e 32 53 fd 1d bb 3c 94 09 f3 ea 45 51 42 83 | 29 00 00 24 3d d6 d9 80 a2 0e 12 b1 24 d9 6e f6 | 52 8a 26 6d ef 88 17 44 c3 1d 79 ed f7 7c 90 92 | c7 d9 57 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dc 14 52 a7 e7 6d fa 0b e3 0e 97 be | 5d 15 66 8b 43 e6 a9 e4 00 00 00 1c 00 00 40 05 | 6d 80 f6 1e bc 0d ea 94 d1 d1 d0 f0 fd 2d 1e 46 | 86 63 b8 47 | libevent_free: release ptr-libevent@0x7fb38001abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3680129a0 | #485 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 20 85 62 4e 58 16 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #485 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #485 | rejected packet: | 26 20 85 62 4e 58 16 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #485: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #285 | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #285 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #285 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49699.62521; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006361 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3680129a0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #285 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 "road-eastnet-nonat-33" #285: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #285) | 8e b8 37 d5 68 56 5c 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 a4 f2 e0 52 94 4a 81 83 55 c1 41 32 b7 b8 02 | 1f ed 45 79 af ff 8a eb 0a de 74 5c 80 82 ad 8f | b3 d0 39 bf 3b db ca 12 0b a2 0e eb ce 92 b6 11 | 51 c6 b7 d3 f4 87 aa 09 0c f5 bb d2 46 13 91 7d | 65 dc 9e 2a 12 da 3f be a8 bc 4e 1c a1 4c 53 ad | 64 f4 41 68 96 19 bd e1 80 86 91 4f 17 c1 cc 5c | ad 72 12 cc 9c fe d8 85 6a cd 1f 0f cf 61 bc 07 | 09 af 5b a0 a2 6c 2a 6f 4c 7e dd ad 13 55 ed 0e | ce cf e6 c5 66 9e 5a 6a e4 42 78 50 61 c3 d4 73 | e3 47 f2 bc a4 8c 26 64 97 c9 f1 2a c6 63 9c 83 | 60 4f 25 9e cb 7a 10 71 25 9d c1 dd 11 38 34 bc | 7c a1 3b 2b 0d 73 6f f9 3c 0b 62 50 05 38 a7 0e | 31 2d 60 72 dd 2b a2 05 f6 e2 f0 0d 9b c1 b1 9e | c0 ee 0d 2f 64 4b 28 d2 c0 e7 3b 0a 50 ff 03 45 | 45 ff 2c cd 4e 54 17 7d 2b 95 02 32 23 94 0e de | 7b 38 d9 9c b7 e8 7d 2f 56 9c 26 e0 8b a0 e6 38 | 29 00 00 24 e6 a9 52 cb 4c 75 d2 f3 84 20 3b dd | 0e ee e2 12 57 50 c2 6f 3d 4c ae 21 23 00 a4 ca | 8c 87 5b 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 5c 90 12 97 99 4e dd 8f 9a cf 75 | ad 0a 2b a1 31 ad 53 29 00 00 00 1c 00 00 40 05 | f9 f4 9b a0 01 06 28 22 67 53 82 2b ec 0b 3c 23 | 3e d8 d3 7f | libevent_free: release ptr-libevent@0x7fb34c00f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #285 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8e b8 37 d5 68 56 5c 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #285 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #285 | rejected packet: | 8e b8 37 d5 68 56 5c 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #285: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0466 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370017ea0 | handling event EVENT_RETRANSMIT for parent state #286 | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #286 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #286 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49699.692547; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00511 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #286 | libevent_malloc: new ptr-libevent@0x7fb34c00f1a0 size 128 "road-eastnet-nonat-34" #286: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #286) | a2 ed ea 42 1b 91 7a d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a a6 7d cd 97 e4 f8 0e 4c a8 f7 b1 ec cb f9 8c | 2f 76 7e 20 17 e9 ac 96 37 6c d0 36 42 10 05 54 | c9 b8 65 a2 e7 d3 10 b3 60 78 69 80 3d 25 e3 d0 | 6b b3 ef 43 8d bb 4b f1 6d fd 75 58 b6 64 ea eb | 21 44 51 94 9d af c8 b5 2c d9 89 52 8e 49 92 15 | c8 f5 a7 13 6d cd 71 4c 89 a6 18 b9 37 a2 0d cb | 6e 90 fa f6 c2 05 39 4f e6 3c 7a ff 95 71 4f ea | 6f fa 7f ad 4f d5 8a a0 2f e3 1c 55 7c 9d 2b b7 | f8 c6 43 95 70 9b 3c 8c f8 2e 6e 7f b8 14 5a ab | e6 e2 cc bb a0 95 89 e6 41 f3 31 0c 80 44 7c cc | 26 be 63 d8 03 4f 0e f4 82 c2 32 aa ff f3 ec 67 | 80 f5 48 c4 4e dc 67 68 c5 87 ee 31 77 11 8a 89 | f7 38 08 ed 5a b3 8e c6 08 9c 28 3d e6 49 22 cc | f1 1d ea 6e 27 3f 41 69 56 c6 98 3e aa a5 4b a8 | 83 96 ce 94 b1 ac 7a 4b a0 42 08 47 1d ca 77 fa | 08 50 16 47 c6 8d 84 08 18 b0 a8 93 c0 9a 70 76 | 29 00 00 24 ff d1 37 2d 2c 72 ee aa 08 fb db a4 | 83 ef f7 bd 0a ef 47 b4 41 70 b6 07 5f 86 86 3a | e3 fa 60 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 c0 b7 bc 90 25 46 09 9f 5d 7d 2b | e5 1e 40 45 53 17 97 19 00 00 00 1c 00 00 40 05 | ec a0 d2 60 58 e7 4c 5a 13 5c f5 c2 c9 76 dd 61 | a7 bb 7e 37 | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370017ea0 | #286 spent 0.183 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 ed ea 42 1b 91 7a d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #286 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #286 | rejected packet: | a2 ed ea 42 1b 91 7a d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #286: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0861 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34001fa80 | handling event EVENT_RETRANSMIT for parent state #486 | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #486 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #486 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49699.736959; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006299 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370017ea0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #486 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 "road-eastnet-nonat-234" #486: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #486) | 87 db e2 36 7c f0 df 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 90 89 1b 08 ac ff df cf 1e a7 4d 7b bd 33 5b | 51 13 dd 15 4f 57 c0 96 90 46 35 66 7c 24 f4 e0 | 0c 27 ca 38 87 f2 ca ce 3e d5 b4 13 12 b8 2b 1b | 28 cd b5 9c 97 fa 99 ff ca 60 2f 08 57 c7 43 0b | 9a 34 8d 0f cc d3 42 7d 8a 9b 18 49 af 87 e5 0e | 60 54 d2 dd 0f 77 79 0a d2 62 1d 4b f7 af 36 a6 | 89 10 0e 96 5f f8 fd fd c0 0b 1a 57 52 e4 05 54 | 7c e7 03 a6 04 47 19 3c 81 63 a0 84 35 98 42 90 | 1a 22 7e c6 ee 29 1f d0 fe 05 cc 68 66 1b 8e f3 | 6e 04 59 7b 5f 87 c4 be fb a5 8a bf 90 3d eb 9a | 35 8c 2c 40 b3 8e 63 fe 5a 3c 42 89 30 d7 70 57 | 1f 4d 37 52 6b 1c 17 6b 78 dd b4 c8 f7 a3 15 58 | d1 aa 66 b9 5e c1 c5 d0 ba 3b 05 d7 77 a7 0a 2d | c3 f0 02 14 1d 1a a8 4d cb aa 4c 7b 62 3a 6a ee | 7e 4e 1c cb d8 20 d4 75 37 c5 87 d5 04 ca 68 48 | 13 39 48 6c 64 d9 b7 94 e9 df 23 f3 33 69 d8 cb | 29 00 00 24 46 3f 4a dc 6e 3d 21 da c5 52 80 db | 79 4b 94 5f 60 de b7 f2 05 82 ab f1 57 25 79 09 | be 52 68 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e eb dd 20 f6 4f aa b4 b9 d1 56 e6 | 84 4d e7 2c 87 e1 c1 3c 00 00 00 1c 00 00 40 05 | df ec c7 42 be d0 10 8f c9 07 5b a9 94 d2 5a 2d | 6d 05 27 19 | libevent_free: release ptr-libevent@0x7fb3400343b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34001fa80 | #486 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 db e2 36 7c f0 df 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #486 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #486 | rejected packet: | 87 db e2 36 7c f0 df 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #486: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37400cc10 | handling event EVENT_RETRANSMIT for parent state #287 | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #287 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #287 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49699.762244; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006518 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34001fa80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #287 | libevent_malloc: new ptr-libevent@0x7fb3400343b0 size 128 "road-eastnet-nonat-35" #287: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #287) | 50 65 03 a0 08 b6 fa f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e c0 75 39 cf 17 11 31 32 ce 73 1e 64 99 bc f2 | 7f 98 bb e8 80 c2 38 47 74 80 17 bf 6d 41 27 75 | 39 62 b9 71 ae 1a 47 19 83 cd 81 c0 c8 3d 11 61 | bb 8a a5 d6 29 bd 01 7d f4 ca 44 6d 69 e4 8a 69 | a7 cc 95 e2 b5 6b 25 ca 57 eb 58 2b 4d 53 44 df | 33 8c 6f 33 81 90 ab 83 53 f5 4e 38 ab 63 7b 68 | f5 e4 10 b1 02 5a b6 e7 d6 07 bf 37 24 09 70 4b | bc 69 6e bc 79 b8 a5 58 fa 3b e4 57 c6 64 3b 30 | 47 47 bf b7 ad 67 14 cd 0a eb 04 a2 61 54 d3 a6 | 12 98 21 de 78 b3 bb b5 ae 98 e3 4e 86 f6 80 ab | 82 7f f6 f8 ef c2 b3 23 41 0b ad f4 1d 15 a3 d0 | bf fe 7d f5 bb 15 19 74 8e f2 b9 4c 77 84 ef 53 | 7c be 1b be 09 20 be 00 d9 ce 47 ea 9d 1e 79 80 | e6 b0 92 f0 11 bf e8 8c fd 97 bb 02 bf 46 b7 fa | 29 38 a8 9a ba d7 d1 99 c1 56 93 83 a6 04 d2 fc | 1b 5a ee 22 cc c4 78 02 0c 67 9c 0f 51 14 b2 6f | 29 00 00 24 82 dd 74 7a ae e7 29 d0 0c 9c 0c 72 | 8c 59 8b ec 3e a7 b7 92 7c 72 73 9c 73 da ee 57 | 06 e2 80 57 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 92 a1 ec 2f 80 2a 27 61 6c 7b 0f | 4c 73 2b 71 f0 03 c4 ea 00 00 00 1c 00 00 40 05 | 71 9b 20 c5 40 26 cd 9d eb 7f a3 62 71 86 bd 52 | 4f c4 9f f6 | libevent_free: release ptr-libevent@0x7fb37401f7f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37400cc10 | #287 spent 0.131 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 65 03 a0 08 b6 fa f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #287 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #287 | rejected packet: | 50 65 03 a0 08 b6 fa f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 23 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-35" #287: ERROR: asynchronous network error report on eth0 (192.1.3.35:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0548 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7e490 | handling event EVENT_RETRANSMIT for parent state #288 | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #288 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #288 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49699.825573; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006932 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37400cc10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #288 | libevent_malloc: new ptr-libevent@0x7fb37401f7f0 size 128 "road-eastnet-nonat-36" #288: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #288) | bf 5c b8 9a ac cd 00 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e dd 69 c1 03 95 4d 9d ab 37 9e bd 4e 38 ec e5 | f2 39 ed 30 ab 4f b4 af 21 e6 29 da a0 8f 8f e9 | 98 9a 5c 5c fe fe ce 8c 1e 28 6b bd f2 27 35 da | c4 21 0a d8 6a ca c2 98 92 8e 38 38 a2 a7 6b ba | 5f d2 6c ce e3 9f f3 13 3d ec 78 7e f5 b7 1e b1 | c9 c9 b0 04 f7 e8 40 14 e7 76 0c 5b a9 d0 33 de | 38 f0 55 f2 f8 c3 51 4e 26 12 33 85 1a 59 5d 06 | e7 63 42 d3 d5 d3 89 6c 22 47 f2 98 c6 f4 da 55 | 13 a9 2a 55 81 33 8b eb 87 ee 13 8e 33 aa a8 42 | 9f da b4 47 d8 37 6a 92 68 90 c1 81 a0 df a1 37 | a4 78 f7 b3 8d d2 2d ce a0 c9 68 dd 56 89 c4 d1 | 63 8d aa 71 1f 08 79 a0 6d 66 a0 3e 16 15 54 65 | d5 46 20 67 d9 5b 61 9c 6a 83 fc f8 ba b1 78 4c | 57 19 a7 94 fa 72 b9 cd d4 1a e2 8c ec 18 65 32 | 0a 6f a6 9d 17 41 ad c3 33 be e4 df 39 be bb 83 | 36 2c fd e8 5d 07 b2 3e e4 4e 6e 8c 65 67 24 e6 | 29 00 00 24 6b 44 05 03 68 15 67 d5 e0 ba b2 f4 | 3c 29 af e5 83 d8 9f ee 30 22 ac b5 c3 ee cd df | dc 79 2d 2d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 39 d5 43 71 fe 6f b5 ee bc 1b f9 | 48 2a ac fe 4d 86 a5 da 00 00 00 1c 00 00 40 05 | f7 70 11 42 70 0c d7 f2 22 65 12 cb b8 c3 7c 30 | 56 c5 c0 c0 | libevent_free: release ptr-libevent@0x7fb34c03f170 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e490 | #288 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 5c b8 9a ac cd 00 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #288 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #288 | rejected packet: | bf 5c b8 9a ac cd 00 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #288: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0695 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3840223f0 | handling event EVENT_RETRANSMIT for parent state #289 | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #289 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #289 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49699.898967; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006402 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e490 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #289 | libevent_malloc: new ptr-libevent@0x7fb34c03f170 size 128 "road-eastnet-nonat-37" #289: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #289) | 2e 50 46 ff ee 4c e9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 11 67 60 81 00 e9 c5 12 22 cc 49 d1 8d 87 9d ec | ba e1 ae d7 0f ff 89 2c 01 49 2f 18 a4 d8 5a ff | 94 bb 3c 2d 6c 23 65 3c 9a 45 52 91 05 ff 55 0b | 22 ea fe ea 0a 4e f6 5b 7a 62 13 72 d3 65 de 8a | 6c f3 72 1b af fd 0c 36 3a 05 de a4 6d 9b 92 ce | d9 79 2b 75 ee 9a e2 a1 2c b2 02 b2 85 a2 98 a2 | 3c 63 cc 1f 7e c9 81 88 5b 95 14 a9 db c3 cc 4c | 7d 2a a7 8c 64 c7 93 92 12 cf 28 08 e5 ab 19 fa | 3f 53 9a 5b d7 86 99 40 82 c2 0d 84 83 94 43 d6 | cb b8 b3 06 64 05 bf d9 9d 5b fb 6a 5b 6a d2 16 | 6f b8 75 0b 98 2a 33 7f 2c 96 47 b3 69 76 55 52 | ca 3f b2 34 c4 b8 60 62 c8 0f 07 9c 2a 3e 70 02 | 1f 60 03 3e 97 1e ea 39 09 c8 ac 49 fb 70 ef af | f9 7e 7f f0 e4 2d 18 4d f8 20 f5 71 8f b4 fc be | 11 8b 08 ae 82 4a 27 f4 11 f5 e0 5f 14 7e a2 b5 | 66 07 59 01 f7 8e 64 17 db 17 82 9f be dd 61 54 | 29 00 00 24 70 cb ce 4e e8 fa 33 67 08 21 14 9b | 70 83 d5 d1 77 4f cc 4e 50 51 8a 00 6c d4 e4 19 | 33 47 80 f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 95 9d ea dc 9b 1a b8 2d d8 fe 0a | bb 49 1d 2c c9 ad 47 73 00 00 00 1c 00 00 40 05 | 70 48 4d 18 17 11 80 57 99 3c 90 8c f0 f2 b1 e5 | 98 18 b0 dd | libevent_free: release ptr-libevent@0x7fb384041c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840223f0 | #289 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2e 50 46 ff ee 4c e9 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #289 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #289 | rejected packet: | 2e 50 46 ff ee 4c e9 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #289: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378046090 | handling event EVENT_RETRANSMIT for parent state #487 | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #487 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #487 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49699.907249; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00487 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840223f0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #487 | libevent_malloc: new ptr-libevent@0x7fb384041c10 size 128 "road-eastnet-nonat-235" #487: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #487) | b2 6f 13 91 c3 04 27 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e b7 3e 1e ea 4f ea 6c e1 7a 2e d9 d3 3e f9 00 | 00 b2 10 a9 bd 14 73 d0 5c 75 d0 f7 e2 0a 9c 29 | d2 44 ca 2c 07 7b 68 53 85 c3 d3 3e bc e8 07 6e | cf f2 af a9 1e bb 29 51 6a f7 01 6c 37 1e c0 ab | 85 0c c2 bf ee 4c 81 52 aa 15 a7 f4 22 68 ab 13 | 48 79 2b 77 d6 1b 5b ea 43 58 e3 de cb b3 22 8f | 5c c4 4c 56 f3 fa d5 2b 81 01 8d d3 c1 a0 72 c2 | 36 97 f9 30 4e b1 e3 4c c3 9f 76 1a 47 e2 4c 66 | 36 1c 6d 84 88 a7 c0 e7 e9 9d 4f 1d e0 c1 e1 ff | 39 d2 b1 a1 49 e4 09 1c dc a0 a7 cd 71 c8 f9 bc | 3a bc 26 2f 4d d5 40 96 f5 89 a1 c7 d3 3a 43 fd | 96 7a 1b 6f d9 4d de b2 44 44 32 65 9e 2d 89 e0 | 92 3a f7 8d c2 fa 4d 91 90 40 ba 6a ed 04 a1 1b | cd 46 17 18 d0 bf 88 e4 f7 cd 2c 44 55 8e 08 a0 | 65 d8 55 af e5 2c 13 03 b6 20 5e 95 aa 08 a5 20 | cd 27 5d 2b dd 8b b7 c9 7d 2d d5 bb 14 9f 9e 7c | 29 00 00 24 f2 e1 64 3c 35 1a 4c dd 7a 16 43 23 | ae 79 36 f1 02 a6 51 17 6d d2 ae 67 32 63 24 20 | 73 fc 22 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 4a 35 08 41 af be cf 3c 4d e0 85 | 28 9e fb 5b 11 1f 06 99 00 00 00 1c 00 00 40 05 | 95 f5 24 fe 51 05 47 87 18 ae 0d 13 a0 36 38 27 | 84 c2 41 68 | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378046090 | #487 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 6f 13 91 c3 04 27 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #487 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #487 | rejected packet: | b2 6f 13 91 c3 04 27 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #487: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46adc640 | handling event EVENT_RETRANSMIT for parent state #290 | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #290 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #290 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49699.984662; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006254 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378046090 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #290 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 "road-eastnet-nonat-38" #290: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #290) | d9 b1 5b a3 d1 9c 57 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 dc 77 37 88 c0 74 0b c8 60 da a3 8f 9c e4 42 | 29 fe d5 c9 98 e7 af 66 82 be 95 44 77 f6 93 6f | 24 98 d7 cc c4 a6 16 af 14 a2 ad 53 a8 a5 93 3c | a1 26 c3 2d 65 3f cc 3f f0 9b 21 66 64 c4 82 00 | 30 f1 57 86 bf eb 51 88 bf 71 0a 30 68 dc 14 50 | 80 50 e1 6f 25 74 d9 af 8d f4 b9 89 60 e8 c3 c8 | 3b d5 14 f3 53 b4 96 85 6c 74 39 5d ff ee 22 a4 | ad 4c 82 96 29 6f f2 59 77 4e 48 da 14 23 7a 5c | 78 bb 13 4c f8 05 33 6d 40 79 5d e2 85 b7 6d 6e | b2 54 b0 03 d6 63 64 61 00 6d fd d4 8a 79 cd 3d | f1 25 f9 cf fc 5d a4 f7 ef 48 25 44 50 58 6a b2 | cd 2c dd 4c f0 ff 5e 32 e5 0f bc 63 fa 03 d5 1a | 9a ab 7e 2b 95 53 36 2e 47 c1 65 a2 7b d7 cd db | 40 2b 7a b2 21 b9 e9 6e fc 75 da 49 33 c1 98 35 | c7 9c 09 b3 47 fb 10 3f e1 56 6f be 75 69 b0 33 | f1 cb e8 e7 d6 74 b0 43 37 f7 9f 8c c7 7c d0 1e | 29 00 00 24 f3 df a5 ae 0e f0 b6 8d 6c 86 f6 fd | ac 3e 20 3a 6e ef cc 6e 76 09 43 e5 b3 97 07 d6 | b5 fd b7 b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 90 0c 81 3c 3a d2 14 9a 30 eb 10 | fa 46 c9 fe 37 f4 bb 0e 00 00 00 1c 00 00 40 05 | ea fc 09 da ae 61 e7 e4 dc 7a 6e 5d ad e3 e5 ff | 21 64 e7 65 | libevent_free: release ptr-libevent@0x7fb3580407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adc640 | #290 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 b1 5b a3 d1 9c 57 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #290 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #290 | rejected packet: | d9 b1 5b a3 d1 9c 57 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #290: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_SHUNT_SCAN | expiring aged bare shunts from shunt table | spent 0.0039 milliseconds in global timer EVENT_SHUNT_SCAN | timer_event_cb: processing event@0x7fb358018460 | handling event EVENT_RETRANSMIT for parent state #488 | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #488 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #488 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49700.043113; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.007416 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adc640 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #488 | libevent_malloc: new ptr-libevent@0x7fb3580407f0 size 128 "road-eastnet-nonat-236" #488: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #488) | 37 96 ab d6 53 2a 39 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 6b 02 0e 68 a2 59 8e ba 48 ba 2f 59 6f a7 3c | 62 72 7d 7b ba 57 b5 e0 3c d9 c3 81 1f a5 eb a0 | f8 e0 f8 99 8d 15 bc f0 8d dc 6f 5a dd 58 1a 52 | b1 f2 33 db c0 8e 7c 70 83 0a 45 59 7c 30 22 a6 | 4a 21 8b 6d f6 eb 16 6a d6 89 72 dc 49 39 de 06 | cc 4d b2 f5 ec 39 f7 23 79 4b 87 b1 ad 07 ab b7 | eb 0d d8 4d 26 fb 93 ca cd 4a bf a4 0c 85 96 15 | f6 27 7e a1 82 03 aa 6b de 0f cd 15 f2 d7 a2 0e | 43 09 8a 10 1e 3f 10 cc a0 c3 3f de 84 91 b8 33 | fb 7f 27 17 12 4f 19 a8 95 31 dd 5a ae 2b f7 bf | a0 0e b0 af 11 39 af c9 5f a1 36 16 28 49 42 30 | 1e a5 ef c4 10 5d 29 3a 47 d6 e6 ec dc fa 0d fd | c5 f6 87 7a d9 cf 3f cd c0 47 6b 05 d4 2f 0b e9 | 27 07 f2 3c 1c ec 19 6e 68 a4 e6 aa 11 7d e2 91 | 40 12 52 80 36 b2 87 db 98 ff 4a 69 c8 e6 41 e0 | 2d e0 85 d9 a0 b6 39 d4 ec ac d1 39 5f ba 20 a9 | 29 00 00 24 dc e4 9b d4 65 6a e5 2d e1 02 7e 1d | 58 fd 85 52 51 90 f6 a3 d4 da ed 1b d4 69 62 73 | cc 62 0f e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf c6 06 73 dc 37 37 47 57 31 78 5c | d0 36 ae c0 4d 18 ea 5b 00 00 00 1c 00 00 40 05 | b3 8c 92 9f c3 4a f6 44 a7 cb 92 6c 4a 1a 77 59 | 02 36 0d d7 | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358018460 | #488 spent 0.241 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 96 ab d6 53 2a 39 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #488 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #488 | rejected packet: | 37 96 ab d6 53 2a 39 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #488: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.104 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378012bf0 | handling event EVENT_RETRANSMIT for parent state #291 | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #291 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #291 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49700.061728; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008388 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358018460 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #291 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 "road-eastnet-nonat-39" #291: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #291) | 77 85 93 ea 80 0c b0 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 1c 76 58 29 75 7e d4 f4 bf 59 3f 6e da 30 13 | 97 91 e5 4d 2a 44 30 c6 77 2b e1 aa 90 8a 91 6e | f8 8f d9 e7 ab d5 fb c9 18 4a c7 0e 37 35 b2 f0 | a3 12 8b 8a 64 ba 60 9e 98 18 5b 0a c2 a4 de 16 | 9c ef 90 7b a5 b4 e5 01 26 3c 58 d0 37 33 d3 a2 | f6 fe 76 4d 01 cd 2b d6 3c be b9 eb 0d 8b d4 d7 | c4 c5 12 bf 64 f2 4f a2 ec 8b b1 e0 3a c2 a2 21 | f4 b9 1a d7 ab ef 1a 0d f1 e1 8b 50 27 cf 98 3e | c2 08 00 e6 03 cf bf ee 86 72 2a aa f9 36 e9 49 | e2 ab b6 47 68 84 b5 9d f0 67 c8 08 03 1b 51 9a | 44 fe 69 c7 87 64 78 4a b7 c0 08 da 1d ee c0 bb | be c8 5e a1 c1 cc 41 ab 33 ca fd ed d6 b3 7c b1 | a7 a2 c7 36 15 58 52 6a 99 ee 8c 84 f7 78 81 e9 | 01 61 49 76 ce 6b ac b8 4a dc 03 3e 4e 23 ba 57 | f4 01 5b 74 05 72 0c 07 03 e6 2a 5d b3 8c b8 ef | e7 cd d3 38 e6 37 e3 80 1e bc 5b 24 b7 a5 cb 2c | 29 00 00 24 37 f4 21 d3 cc 8d d5 11 a4 01 4c 20 | b4 32 01 c8 03 d8 fb 70 07 27 01 09 a0 70 e5 36 | d3 fe b6 72 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 76 dc 7a b2 16 bf 01 10 e9 6f f4 | 8e 92 4c 8c 19 0f b1 8b 00 00 00 1c 00 00 40 05 | 48 a8 ae 2a a4 d2 aa 19 46 f9 d2 d9 d7 e1 ad a4 | ae e0 ac b4 | libevent_free: release ptr-libevent@0x7fb348014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378012bf0 | #291 spent 0.527 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 85 93 ea 80 0c b0 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #291 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #291 | rejected packet: | 77 85 93 ea 80 0c b0 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 27 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-39" #291: ERROR: asynchronous network error report on eth0 (192.1.3.39:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.239 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c02aab0 | handling event EVENT_RETRANSMIT for parent state #292 | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #292 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #292 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49700.128661; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007095 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378012bf0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #292 | libevent_malloc: new ptr-libevent@0x7fb348014c70 size 128 "road-eastnet-nonat-40" #292: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #292) | 87 88 51 7a 60 9d 5a 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 66 a0 4d 60 cb 65 95 3c 93 0d 5e 54 74 22 d5 | b9 4e e2 32 b5 97 c3 a0 c6 6f 16 29 09 b8 29 a7 | 53 85 60 d3 38 df d9 0c a3 64 8e 65 05 77 b2 87 | 1b 54 26 e9 27 44 44 33 65 9f 3e a3 6d dc 58 a3 | 3c 1b b5 56 27 64 d7 00 90 21 cd 7d 46 ab 11 af | ba 96 a3 c8 ee 97 85 92 75 7b ec 2d df 79 07 56 | 45 a8 e2 68 58 3f 02 db 14 25 0e 1f 9b c2 bb 05 | 5a 26 d6 ed 51 8a 97 6d 65 fb 55 2b bb 16 61 e4 | de 73 b2 ef 70 09 3d 76 f2 05 da 1e bd 6c 49 e0 | 44 ef e7 7e 74 41 a3 f7 8a 2e 4b 16 50 e8 de e0 | a4 17 3e ac 86 b1 62 63 2e 1c a5 2b dc 13 3a ee | 9b a0 c2 94 2b ba 80 4c 0b 59 f3 60 75 ff 33 5f | 0b 97 1a 30 63 32 07 17 5c 59 1a 4a db 49 f2 ef | 1e b6 76 4d ca 87 ea 08 32 6d 49 4e d6 81 ee 4c | c7 58 d6 e6 53 ab c7 5b 58 9e 4a 36 b9 18 48 a2 | 61 0a 77 8a 15 c7 1b 51 f1 d5 e0 50 5a 9b 7a 98 | 29 00 00 24 b6 37 4c f0 c9 85 b2 01 0e 7e 3e 08 | 4a 99 af 96 7f b4 c9 1d 28 51 f7 8e 73 35 20 22 | 15 78 52 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 e7 d2 e3 15 0a 06 f3 99 b1 c4 ad | 55 e8 07 46 e3 af eb 45 00 00 00 1c 00 00 40 05 | 9e 69 62 01 15 f2 f4 fe 05 57 a2 2c 87 7a 71 d0 | 0c f9 69 7d | libevent_free: release ptr-libevent@0x7fb35c03a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c02aab0 | #292 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 88 51 7a 60 9d 5a 1f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #292 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #292 | rejected packet: | 87 88 51 7a 60 9d 5a 1f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #292: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0562 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374045e40 | handling event EVENT_RETRANSMIT for parent state #489 | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #489 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #489 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49700.159995; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00547 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c02aab0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #489 | libevent_malloc: new ptr-libevent@0x7fb35c03a770 size 128 "road-eastnet-nonat-237" #489: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #489) | 74 5a 3a 8b 71 1a cc fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 40 61 fd 1b 72 e8 67 07 d1 75 c8 79 f6 15 bf | 67 b1 a9 f3 47 1b 5a 9e 7a 16 95 64 09 96 72 95 | 1f e3 f8 5f 52 87 20 fb 61 9b db 76 dc 1e b3 ce | 79 87 62 5c 6c ce 2b 50 8b 94 05 b2 fd 25 84 04 | b4 15 bc 02 70 ed e7 01 0e 47 78 fa 99 0f 24 d8 | 6d 25 42 58 57 e1 37 d4 81 eb 71 fc 2c 93 fa a4 | c7 e3 ed 35 8a 44 47 43 96 45 a6 cd a3 83 61 0f | 10 8b 91 8a 9e 26 b5 05 80 74 cc cf bd 96 a9 68 | ec 71 d7 24 8f 0e c4 37 01 d3 fc 0e 4b 59 1a e8 | 44 25 f9 54 85 60 35 f6 be ce 52 66 75 73 a9 9b | 5c c3 e1 cf 01 12 70 63 56 6d a7 e8 18 d9 6b 45 | de 75 11 c2 b6 ad 37 d5 3d 52 a7 75 84 78 8c 7f | 86 51 7e 50 9f 10 72 bd c2 69 ef b3 ad 19 2b a0 | 12 77 de 7a 6b 6d 21 bf fd 3d 7b 00 2f 59 e3 b9 | d0 af c2 b1 28 3c da ec de 08 be a1 d1 4e 94 57 | 47 99 d9 10 35 e0 60 cf 3d 10 4e cb 1b b3 b4 f7 | 29 00 00 24 40 6d 68 58 c0 2a c7 cb 28 ac 6f c2 | e6 6e 2c b5 98 00 fd fe 6e 20 dd ca 12 44 3b 53 | ff 69 1e f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 46 ab 03 11 7d bc a6 76 5d 5e 81 | f5 21 84 26 13 ce 73 a7 00 00 00 1c 00 00 40 05 | f1 f1 80 9f 1b 76 8c da 90 0c 48 79 e2 c4 ce d3 | 45 3b 5d 95 | libevent_free: release ptr-libevent@0x7fb374029410 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374045e40 | #489 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 5a 3a 8b 71 1a cc fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #489 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #489 | rejected packet: | 74 5a 3a 8b 71 1a cc fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #489: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0735 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350017ea0 | handling event EVENT_RETRANSMIT for parent state #293 | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #293 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #293 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49700.219424; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005603 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374045e40 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #293 | libevent_malloc: new ptr-libevent@0x7fb374029410 size 128 "road-eastnet-nonat-41" #293: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #293) | 98 65 e9 19 f7 80 1b 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 92 fa cc 80 1f 04 ae 31 60 a8 15 7f 6c d4 bb | 0d a3 36 d4 3d 31 2d db c9 a3 65 0b 54 77 b5 90 | 4b f1 85 f9 5b a2 e8 2d 9a 77 1b fe a8 fb ea d0 | 88 2f 01 a5 98 e9 7e 65 f1 01 87 3d 6a 2d 8a 3a | 8e f8 d8 76 3b 1e 19 1d 17 90 3e 76 19 99 52 4a | 6e 00 1d 7b db 96 db 83 88 cd fd 1e bd 7e 5b 89 | ba a0 91 2a b9 ee b5 58 13 b3 5e 5e 59 9d 47 30 | d5 69 4e a7 bd 52 9f d4 e7 9b be ed b8 c7 8e ca | fd 72 11 5d 3c 4e 3f 34 3a cf 63 b2 e1 3a 0c 75 | e0 fd c6 41 05 da 4e 8b 04 c0 eb 84 52 ad 81 69 | 8c d8 b9 f0 3d 70 1f c8 01 a5 b7 5f ee d4 3d 97 | 3f 74 14 bf c1 32 07 23 90 8c c7 74 19 a4 db 67 | e2 81 e3 0a 06 5d bd 34 79 e7 4a 18 70 10 d6 b8 | 84 dc 4f 06 a8 1d f3 4b d5 6f 30 05 6d 56 83 1e | 64 17 96 93 11 0f e7 08 32 35 87 dc fb e0 8f 9f | e0 07 34 5d b8 fb 0d 4c d3 c2 58 00 d5 76 62 90 | 29 00 00 24 6f f2 b6 ca f4 8a a8 b3 ce 34 d7 c6 | a9 bf 42 71 b6 a3 89 33 ed 1d 91 ee 0e 11 98 8d | 12 5e c6 63 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 b6 16 43 43 a6 c6 14 e2 18 67 23 | 58 d4 b6 9a 2d df 39 90 00 00 00 1c 00 00 40 05 | 2a 56 75 a4 c4 51 60 eb 9a b6 a1 bf 9e f8 0f fa | 6b d1 0c 00 | libevent_free: release ptr-libevent@0x7fb350023d80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350017ea0 | #293 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 98 65 e9 19 f7 80 1b 92 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #293 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #293 | rejected packet: | 98 65 e9 19 f7 80 1b 92 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #293: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c01d970 | handling event EVENT_RETRANSMIT for parent state #490 | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #490 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #490 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49700.239704; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00627 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350017ea0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #490 | libevent_malloc: new ptr-libevent@0x7fb350023d80 size 128 "road-eastnet-nonat-238" #490: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #490) | bb 0e 3a 9b 64 67 83 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 47 7f 34 75 b5 49 50 79 df a4 4b 2a 1a ce 17 | 54 1a db ef 07 cc bd 63 ec 5f fd 57 bc 8e fa 30 | c9 95 d1 71 e6 7c fd 77 3c fd c2 3d 71 c3 96 28 | a3 d1 35 26 0a 70 d5 c3 3a fb 74 58 46 86 23 a0 | 05 3c 91 b9 ac 6a ea c1 25 7b 4a 3f a3 25 55 72 | 1a fa 68 62 a6 28 8d 23 b1 87 6f cc f5 37 d0 47 | fc 41 f4 96 78 ec ba 03 b7 d0 87 4f ed d1 99 e0 | 0d e4 2b f5 2e 28 88 3d fd a9 fe 89 6e 87 86 2a | bc 0f d8 0e c6 4a 2c e3 b3 3a a6 4b 56 b2 d1 a7 | b4 82 a8 63 ca 63 fb 28 a9 ae 19 5e d9 12 c8 ba | 95 37 7e 44 d0 19 50 2e 50 85 6d 62 52 72 3d eb | 4d f4 88 bd 4f 23 95 01 f5 e8 4f 41 c1 7a e2 e9 | 09 7e 97 ea 1c b6 21 cd 07 3c 59 f2 8d ef a7 3b | 3d d1 60 37 5e c3 67 ad 3c a4 b3 33 59 93 de 51 | 98 2d 6e b0 f8 67 26 97 7f 16 7a f1 7d 53 b7 ac | 55 64 4e 4e 20 10 14 93 a4 62 e7 45 6c 22 9f d2 | 29 00 00 24 e1 87 09 5e 30 4d 93 58 a8 7b ef c0 | df 86 01 db 2f ae 90 07 26 59 14 f1 71 ed 65 8b | e5 42 58 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e a7 de 07 e1 64 83 30 46 b8 16 83 | 02 93 de dc 12 4e 03 eb 00 00 00 1c 00 00 40 05 | 41 30 1b e3 e2 bc 6c 0f ca fc a1 2e 9d 87 bf 76 | 3a b7 29 61 | libevent_free: release ptr-libevent@0x7fb36c044a20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c01d970 | #490 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 0e 3a 9b 64 67 83 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #490 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #490 | rejected packet: | bb 0e 3a 9b 64 67 83 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #490: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0608 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35400cc10 | handling event EVENT_RETRANSMIT for parent state #294 | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #294 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #294 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49700.304089; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007341 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c01d970 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #294 | libevent_malloc: new ptr-libevent@0x7fb36c044a20 size 128 "road-eastnet-nonat-42" #294: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #294) | 9b 31 1a f8 0f be 39 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 54 dd 24 24 7c 2f 7c cf af 6d 3e 60 a2 73 ad b0 | 5d e0 ad 29 4b 13 6c 37 66 5f 9c 4f e7 c9 e4 11 | 2c 5d 56 30 72 c8 d6 46 26 66 f5 93 56 d4 c3 52 | 85 cc e5 ae f9 42 b4 ed 60 85 06 0a 66 f5 50 1d | b5 97 c3 6d 71 b4 75 b7 83 18 b1 d3 7d 4a 68 8c | b9 4f df 9f 66 87 ec eb 33 88 de f2 6b c6 ea ab | d0 0d f9 06 34 9c 52 b4 c5 c4 6d 94 39 a8 58 51 | 41 ac 6d 52 08 28 9d f6 37 25 c7 7f 2d 48 ab 90 | f6 30 d2 8b 1b 90 e6 12 18 e0 e2 d4 dc 25 fe 81 | c8 41 3f 06 d9 c6 ce a5 91 8f 50 2b 48 2d e5 59 | 7a 24 e5 58 8b 81 4a bc cb 35 59 84 09 16 ee 2d | ba cf 81 ed 91 57 53 ab 0b 04 8a 27 0b c6 e0 ef | db ab 77 93 c2 db 73 a1 76 37 e1 bf 29 0a 3c 98 | 04 2f f5 e3 ff d0 c3 48 62 42 d2 a6 9f a7 c1 a7 | df e6 f0 e2 49 c7 bb 48 bb b6 1d f0 0e d1 19 d7 | 21 c7 76 5c 49 fc f0 be 36 da d1 aa ec 07 53 22 | 29 00 00 24 c9 1f 43 d3 3e f5 11 59 29 27 36 bb | 9f 07 da f1 c2 4b 17 7e d6 e4 43 b9 54 44 c2 2b | 3a e0 9b 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 60 07 d1 2a 2e 6f e5 7f 13 de a6 | da 25 32 50 d9 e2 97 75 00 00 00 1c 00 00 40 05 | de 91 5e 97 33 cf e4 58 2c 2c f0 43 aa ad 93 60 | ec ee 8a 50 | libevent_free: release ptr-libevent@0x7fb354023e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400cc10 | #294 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9b 31 1a f8 0f be 39 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #294 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #294 | rejected packet: | 9b 31 1a f8 0f be 39 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #294: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0537 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368017ea0 | handling event EVENT_RETRANSMIT for parent state #491 | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #491 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #491 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49700.335405; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006191 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400cc10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #491 | libevent_malloc: new ptr-libevent@0x7fb354023e30 size 128 "road-eastnet-nonat-239" #491: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #491) | 71 99 e4 22 98 eb 54 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6f ca d2 21 e7 00 d0 58 95 9f 18 d3 07 6f a1 36 | 29 0a 07 0a 83 6e be aa 71 cf 9f 04 2d 78 ad e9 | 58 fe 50 02 89 22 52 34 18 90 af 07 b5 26 f1 6c | b0 11 12 a1 23 de 99 fd fc c2 c0 e2 48 6c 08 1b | f6 de 34 df 7c 06 d6 3f 0c 5a 97 94 b5 cd 37 58 | 08 26 b0 da 52 89 5c 74 c6 39 52 b5 86 f0 ed 18 | e5 f9 91 2e 14 4e 44 f7 64 55 1d 70 ad 8f f1 5d | 53 18 a9 5d 0c b5 78 b7 26 b2 7b 9e 90 ef 29 39 | 8b 7e b2 68 96 f5 cb 23 fc d4 1f dd be 19 b3 cf | 90 29 ab e6 33 3c 02 49 68 ce 65 d3 cd 32 0f 44 | 53 2e 1d d6 62 09 24 c9 7c 69 12 6b 73 20 8c a6 | 8d 2e 37 7f bc 30 45 fb da d9 2f 0c 0f 60 4b ac | 0c 1a 77 7c e4 78 1e 2f d7 92 41 d2 4d 5f 8e ae | 49 e0 54 b5 c7 2d bc a1 7a a2 3f 86 07 2c 92 60 | e1 f5 de af a0 f0 4b 27 ad e3 b4 c3 ee 7b 2d 0d | d8 e3 ea 54 9f 53 a9 b6 54 62 d4 0e 68 4d ff 58 | 29 00 00 24 f6 62 db cd 87 59 ee 6d c7 6e 62 13 | a1 8e a7 17 f8 92 11 7a 45 83 ff 50 63 74 b0 f6 | 7b f4 74 d1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 ef b1 40 3a d0 79 c3 55 24 76 d2 | d8 cf d4 95 18 b0 e0 3a 00 00 00 1c 00 00 40 05 | ee b1 f7 86 b3 de f8 ed 09 8e 76 56 9a 74 8c 3c | 69 d7 b9 6e | libevent_free: release ptr-libevent@0x7fb368023e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368017ea0 | #491 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 99 e4 22 98 eb 54 3d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #491 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #491 | rejected packet: | 71 99 e4 22 98 eb 54 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #491: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf10 | handling event EVENT_RETRANSMIT for parent state #295 | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #295 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #295 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49700.383703; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005478 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368017ea0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #295 | libevent_malloc: new ptr-libevent@0x7fb368023e60 size 128 "road-eastnet-nonat-43" #295: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #295) | 11 ea 13 a7 2a b1 5c 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c6 c0 f3 39 06 15 d7 07 8e 11 b6 9a 6e 2d b3 34 | 66 03 a5 c2 e2 1f 37 32 46 97 6f cd af d0 2f 18 | 5f 75 66 e4 a1 42 12 53 5e 16 d8 3a 31 65 02 6a | c5 e3 cc f7 d2 22 a4 aa ae 02 3c 06 f6 0c fe fa | e4 54 02 04 c7 56 0a b1 39 1c 79 77 c9 da 62 93 | 00 7e f1 cc 8f 9d de 33 24 4e 12 09 b8 73 ad 99 | 9d bd 21 4e 12 37 5e 79 f1 fe 24 ac 36 8f 56 b3 | d6 c7 5b 74 f8 84 56 d2 c9 9a 89 80 ba ca fa 63 | 61 ef b2 49 26 8d 16 1c 9e 9b a5 d0 8c b1 11 4d | 74 c3 30 50 82 5e f2 2c 5e 21 4f 59 50 07 97 4a | 3b 99 d0 83 20 16 83 be 15 cb 08 01 be 88 1e c0 | 56 de 78 28 a9 82 d7 99 3a 47 be b7 57 13 4d ef | 18 8f 0d 23 65 69 63 f7 5c af 9a 31 54 69 e3 c6 | e4 81 15 9e a2 7e 90 55 50 a1 5a e2 6d 42 36 72 | e6 93 98 8d ab 65 9b 8b b9 2a 79 2b 2d c9 0f 1f | c1 03 48 63 1c 2b 7c f0 db 5a 0a 3e b5 46 b8 79 | 29 00 00 24 64 9e 8b 02 14 e8 a7 dc 3f 42 d2 c4 | 8f dc b3 ff fc 4c fe 98 93 e9 8f 76 eb 2b 38 f4 | b9 5a a0 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c a5 c7 ec 4b 7a cd c4 3e f0 86 6d | ec 0c 21 f9 74 06 3e 81 00 00 00 1c 00 00 40 05 | 6b d7 31 2e aa f4 5b 2c dc 79 88 ab 6c 34 fc ce | 20 91 9b 02 | libevent_free: release ptr-libevent@0x7fb34401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf10 | #295 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 ea 13 a7 2a b1 5c 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #295 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #295 | rejected packet: | 11 ea 13 a7 2a b1 5c 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-43" #295: ERROR: asynchronous network error report on eth0 (192.1.3.43:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0459 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360018460 | handling event EVENT_RETRANSMIT for parent state #492 | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #492 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #492 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49700.410971; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006469 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf10 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #492 | libevent_malloc: new ptr-libevent@0x7fb34401d920 size 128 "road-eastnet-nonat-240" #492: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #492) | d7 99 7d 69 73 b4 2a a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 07 d7 12 79 21 18 05 9a 65 7d 95 08 cf 17 4e | 65 ed 52 c0 2d 6f a2 d4 7e 6e 0c fe 68 2e 85 0e | c1 f3 a0 f1 34 f9 34 8a e9 6d c0 54 1e 27 54 a6 | 0a 27 50 d2 78 b6 25 f7 6a f9 6c d4 40 88 de 0e | c5 23 46 17 11 07 59 0b 07 7d f1 44 d8 68 37 f0 | 12 d0 4c 6e 87 95 44 91 7a 02 1a aa de e2 f1 34 | 10 60 5a 14 6b 10 17 21 f9 34 d9 11 2c 87 8c 26 | a1 73 6c 09 6c 7e 33 9d 0e 03 17 61 98 14 aa f1 | 55 ad ab 3a b7 4f 37 37 da 8f 18 e7 c8 d3 37 ef | 02 82 ee 24 ef c3 bd c3 8a 68 42 60 d6 70 2e 41 | 57 9c 7a 60 c3 c6 ac 4a 44 4b 7b 82 88 6e 37 3a | e8 a6 66 1b 7b 71 c3 58 de ce c4 1a 99 46 de bc | be 62 d4 44 43 62 c0 f6 26 99 83 35 30 7f b5 15 | ea a7 50 6e 0e e9 be 43 3b f3 33 1e 18 3f 0c b4 | 99 f0 db 6c 50 7f 42 cb 48 b5 b5 92 17 92 32 ed | bf e5 25 0e 41 bc 26 2f b8 93 47 2e 04 ee 7f e1 | 29 00 00 24 50 36 54 c1 a9 17 13 4c 62 1f 80 79 | be a9 3c 75 1a 54 91 d7 53 38 3a 75 de 57 2a 82 | 16 4a 83 7c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 22 3a 78 b0 c2 12 43 88 f6 04 b2 | db f8 ae cb 72 c7 59 0b 00 00 00 1c 00 00 40 05 | d7 ae 13 c8 9e aa 6e 0d cf 25 ff 91 a0 20 ef 42 | b6 21 2f 3a | libevent_free: release ptr-libevent@0x7fb38802d3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360018460 | #492 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 99 7d 69 73 b4 2a a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #492 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #492 | rejected packet: | d7 99 7d 69 73 b4 2a a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #492: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37000d120 | handling event EVENT_RETRANSMIT for parent state #296 | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #296 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #296 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49700.450297; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008804 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360018460 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #296 | libevent_malloc: new ptr-libevent@0x7fb38802d3a0 size 128 "road-eastnet-nonat-44" #296: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #296) | 1c da 2e ac 4a 99 24 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 2a 4d fb 46 1d b7 c4 96 00 b1 66 99 7e ce 3b | 3f 48 6e 8c 76 bd 25 cd 72 f7 15 4a f9 69 ef 13 | 61 8a 19 db 25 90 81 55 08 5a cc 41 41 e5 ab d4 | 92 10 f9 d6 8d 49 ef 3f b0 9e f2 80 9b 7b 70 6e | a9 61 7d e0 84 75 fd d1 46 6c 42 61 66 ee 24 20 | 73 fa d1 4c 21 9e a9 c7 16 a9 b3 6f aa 78 ac 00 | 78 f4 c3 83 9c c4 9a 92 64 af b4 ed 81 ba ac a2 | f1 41 08 3e c1 2f b1 ba 03 49 e2 bf 7f db 95 66 | 30 1e c5 ba 28 dd ee 71 21 42 41 ca af c4 be d2 | 90 1d aa 94 fa 3e 05 ce 17 28 d8 85 00 b7 a3 6c | d2 a6 c4 12 ee 02 b6 a5 47 f5 e8 05 85 3f 07 9b | aa 0d 4f 57 c3 15 b2 47 ad f5 11 0a f7 29 da c6 | 9c 86 0c 08 6b ec 00 4d b0 6e 72 d1 b7 c3 86 c8 | 85 d9 c3 07 c3 a7 58 91 99 ee d7 82 f7 95 cb 56 | c0 48 0c 04 c6 c9 83 ce b6 aa 4e 64 f0 9f 73 46 | e9 f5 bb 10 78 a8 77 4a 7b da 32 8f 23 90 cf 6d | 29 00 00 24 ce d0 75 80 6d 1e 36 8f b6 81 e0 37 | 25 cc b5 c9 b7 8f 97 4d 1e ae eb 17 23 86 66 d2 | cc 2a b8 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 83 86 3f b2 b5 92 3c 02 7f 1a c2 | 45 4d 9a 24 f1 5a 66 8d 00 00 00 1c 00 00 40 05 | 7c cb b6 c5 ee bc 2b a0 53 bb 77 45 86 3e ca 93 | 1e 2d 97 d8 | libevent_free: release ptr-libevent@0x7fb370029490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37000d120 | #296 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c da 2e ac 4a 99 24 d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #296 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #296 | rejected packet: | 1c da 2e ac 4a 99 24 d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #296: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35800cfd0 | handling event EVENT_RETRANSMIT for parent state #493 | start processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #493 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #493 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49700.493557; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005179 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37000d120 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #493 | libevent_malloc: new ptr-libevent@0x7fb370029490 size 128 "road-eastnet-nonat-241" #493: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #493) | ed 28 a4 bc 11 7c af 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 43 c9 b9 d1 39 88 cf b4 19 83 df 09 c8 d9 33 | 6a 66 ab 95 b0 dd 15 4d 5d 4a fa 5d 52 f2 94 c9 | 8c 6b 4e fd a3 be 7b 1e 26 3d da ae 4a c7 9d 27 | 63 37 11 7d f7 65 a5 40 e2 b8 e7 88 e2 a7 17 fe | 35 86 91 9a d8 ce fa 63 4d d8 5f 33 39 8b fd 0b | c7 66 ad d7 e3 69 0a d0 e8 2c 35 2b 87 c6 e8 d1 | 35 a2 6a bd 14 2b 17 e4 3b 63 91 15 e8 44 4a 0b | ee 35 18 44 31 9b e0 f3 11 2e f9 0a f8 94 2e e7 | 37 62 af 42 67 9b d9 c2 7a 1d 9a 74 9c 27 5f 4e | 6c 61 5b 8d 6f b6 26 7a 65 28 0b d8 63 b2 4d f2 | 4f 66 7e 68 e4 09 4f e1 36 c2 c4 fc b8 a8 0d bd | 8f 6c 26 6b 1b b4 27 de 4d 65 70 86 b8 d6 2d 91 | e7 12 ef a7 86 2f 17 c5 46 49 a0 b2 37 f9 08 9e | 05 44 0c 6d 93 fe 69 98 08 f9 28 75 1f 4f 91 2d | 39 9f 63 17 e0 d3 1a 4e 52 69 6b 52 15 77 3f 2f | 3e 88 cf 00 87 f9 bd f2 03 53 f2 34 f3 a4 6a 9a | 29 00 00 24 a6 a1 ba dd 86 99 b3 8f 47 4a 4d 8f | 4a 4e 2e 70 ee a1 39 80 4f 25 94 bc 3e 73 ee 31 | 55 0b 3a 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b ce a8 52 73 2a af 56 99 7a 11 14 | f3 b1 9c fe 91 8b 24 9a 00 00 00 1c 00 00 40 05 | 14 ee cd 8a 22 d5 80 d4 99 d7 ec c4 4c 96 10 11 | ff 51 59 09 | libevent_free: release ptr-libevent@0x7fb35804b970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800cfd0 | #493 spent 0.0994 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 28 a4 bc 11 7c af 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #493 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #493 | rejected packet: | ed 28 a4 bc 11 7c af 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #493: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0604 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c00d120 | handling event EVENT_RETRANSMIT for parent state #297 | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #297 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #297 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49700.516866; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006645 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800cfd0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #297 | libevent_malloc: new ptr-libevent@0x7fb35804b970 size 128 "road-eastnet-nonat-45" #297: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #297) | e1 41 d2 51 2f 25 d9 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 ea 0d 0b 39 8c c1 99 18 5a a8 8a 8f 5d 3d 22 | 46 42 ee 49 5d 81 c3 87 32 80 3d 42 65 0e 28 54 | e6 12 c3 e6 03 86 ad ca e9 ea 65 ce 14 e5 73 46 | 61 07 3a 7c 00 7f 71 ec 17 17 d4 44 37 36 26 7a | 8c 65 4b 5e 2f d6 31 47 0e b3 55 90 e6 1c cb 77 | 1c 6d 58 27 57 b3 27 ff b6 e1 e9 7d 1b 10 c2 48 | 70 f7 e7 1e 31 56 ab cf ae 38 32 b8 65 81 ac 00 | 4e 9d 3a 6c 2c 1d fb a6 ff a6 c5 15 4a d1 e9 8c | f6 3b 4a 4d e5 6a 3d e0 b2 a1 f4 29 63 27 5f 0f | 08 89 9b 00 9b 1b 1f 8e 12 d3 c4 4f 3e 13 f5 a5 | 9c 44 af 0f 10 29 67 15 0d b9 b4 26 98 5d 9e 81 | d4 78 c2 73 92 2e 97 4c 48 13 99 b5 01 42 7a 4a | aa bb 3e f2 96 18 19 79 ab c3 39 3b ba ba b8 0b | 06 4a 68 91 6a ff 80 ba f0 6f 51 cd 71 94 91 9b | 14 d1 d2 23 7f bc a7 08 5b 2f eb 14 51 51 4a 55 | ca 92 da a2 1f 6e 9a 88 d0 9b 68 b4 59 e4 e6 5b | 29 00 00 24 a5 fe b0 e3 a2 f4 1f f6 10 ff b8 23 | 13 cf c1 54 86 87 d9 95 be 21 30 83 5b ee 54 e5 | 86 f0 89 0d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 30 e2 49 c0 1b 21 8e cb 56 2f 44 | 75 d2 75 93 97 72 cd 45 00 00 00 1c 00 00 40 05 | ed 4e b6 34 59 cc 9b 96 b2 cc cc ed 70 1c 55 bb | 38 17 6f fc | libevent_free: release ptr-libevent@0x7fb36401f4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c00d120 | #297 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e1 41 d2 51 2f 25 d9 71 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #297 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #297 | rejected packet: | e1 41 d2 51 2f 25 d9 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #297: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6e010 | handling event EVENT_RETRANSMIT for parent state #298 | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #298 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #298 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49700.604148; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006516 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #298 | libevent_malloc: new ptr-libevent@0x7fb36401f4e0 size 128 "road-eastnet-nonat-46" #298: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #298) | d5 0c ec bc d3 64 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 43 96 23 e5 3a d0 2d 36 cd 43 2d 58 c4 e0 92 a1 | ed 2d e1 4c 45 8b 42 ad 40 76 ab 67 60 92 c4 09 | 73 c4 c7 3c 9d 80 31 b9 bf b9 9e 64 35 e4 39 ba | 2f a8 59 fe 53 09 d8 e0 e9 88 59 30 e2 71 e6 be | 2d 69 bc 6a a7 6e 4f db 2a 6a 88 01 9f d2 1a 54 | 9b 70 8c b4 c5 37 d0 1b eb c3 58 21 ce 79 a3 ff | 4e 1b 84 aa 1e 08 dd 9d 9d 58 7a ba b0 dd 2d 38 | 9e da 29 29 b5 fb 28 78 05 fa 3a 26 c0 d3 4c cf | 22 22 af c7 f1 d8 11 18 01 e3 41 10 fc 1b c9 38 | 58 6b be 13 fa e2 38 5b 8d 00 15 50 84 fd a8 e0 | 20 22 31 ab 99 61 d4 85 a8 6c 2e d8 1f e4 26 c0 | 25 17 38 c7 a5 82 30 0d e2 85 f0 d0 e0 3a 59 87 | 67 7b 0d e4 52 7b 6c 35 93 c6 f4 61 2c 32 e9 62 | b8 57 d1 59 0b 7c af 14 d1 9d bb 91 61 85 75 09 | ed c6 43 19 bf 09 f8 e4 92 e6 1f f3 47 e1 6e 0a | 5a 69 40 30 db b0 00 24 c2 61 94 a9 30 49 e7 0e | 29 00 00 24 4c 0e e1 06 42 9e 4c 74 3b 65 ba d4 | bc 56 1a 69 be b4 c7 ec 29 68 0f 7e 31 97 81 70 | 75 a5 f0 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 96 a5 ca 09 14 9d 81 34 51 5c 38 | 06 b0 7e 03 d4 af 12 47 00 00 00 1c 00 00 40 05 | 1b 14 fa aa 2e 1c b4 a7 92 80 67 79 37 9e 5c 02 | 1f 84 46 7d | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6e010 | #298 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 0c ec bc d3 64 84 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #298 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #298 | rejected packet: | d5 0c ec bc d3 64 84 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #298: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c01fda0 | handling event EVENT_RETRANSMIT for parent state #494 | start processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #494 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #494 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49700.663453; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005713 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6e010 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #494 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 "road-eastnet-nonat-242" #494: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #494) | 13 d2 ce 8c c5 a0 08 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 2c 3b c1 c9 27 85 62 17 d7 83 f4 4b 2e 0e 16 | e2 03 04 ad 7a 8d 40 02 d4 34 9d 1b d3 c9 18 6b | 41 26 bf 10 de e3 e0 e1 0e ef 27 5f e0 e8 78 57 | b0 c9 a6 38 de ce 8a 7c 37 31 11 56 7d 62 bb 8e | c9 f9 f5 6c 82 0f ba cd 3f af 70 4e 17 32 64 c9 | d5 e6 2c 41 27 6e 25 48 eb 43 50 ea a4 34 26 c4 | 56 d9 54 ab 57 40 f6 c1 9c 20 1b 06 22 84 03 8b | e5 53 55 fa 3d 80 8b 5b c2 25 82 15 35 94 6c d0 | bb ec ab 60 22 1d 87 23 e3 9e ac fc 16 ce 42 3f | ba 0d 8d 04 b9 e7 b2 de 46 3e 4b b3 83 4d ca 89 | e2 a0 d6 38 51 9a 05 e2 dc 57 8c 52 b9 1a fa 47 | 7e 1e 80 51 ac cf 77 c1 e4 be 78 0f 3d a1 ce 56 | 23 61 ff 3d 67 82 ef a5 20 d8 a8 62 8a 37 d6 a0 | 87 df 7e 30 b4 77 c6 c9 19 64 23 a5 4f 30 28 ac | 43 56 89 18 4a 88 a5 5e d6 97 45 97 2d bb 34 28 | 33 0f 79 c6 b2 6c 6b 62 1d d3 42 70 92 9f 6e 55 | 29 00 00 24 86 c8 ae 9a dc 82 47 ae 63 a3 d2 9c | fc 56 5a fd b5 a1 94 8d 79 cd 12 87 5b f8 39 1c | 72 7a 80 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 4f 14 68 3f 9f 2d 22 c7 c5 d4 82 | fb 7c 5e ae ba 6a 24 66 00 00 00 1c 00 00 40 05 | bc 9f 5c d1 bc 22 73 c4 89 e4 5f 13 b2 ba 1c 19 | 38 03 1c b3 | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c01fda0 | #494 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 13 d2 ce 8c c5 a0 08 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #494 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #494 | rejected packet: | 13 d2 ce 8c c5 a0 08 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #494: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #299 | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #299 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #299 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49700.672743; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006337 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c01fda0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #299 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 "road-eastnet-nonat-47" #299: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #299) | 63 02 bb 51 d9 8c b0 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3c 17 e8 1c e0 c7 4f 03 2d a7 55 c0 45 bf a2 96 | 6a 0c 0e 0f 3f cb a5 f2 68 03 39 51 c2 b3 0b 30 | 79 44 b0 72 39 7b b4 0b c0 9d 43 f1 cf 9c ab 76 | 17 9c 76 41 f4 97 6b 3d 79 c7 93 3a b0 36 40 75 | 1d 60 59 8c 82 e2 c7 85 c2 1c 97 4a 38 8b 6e ad | 3e 5a 0d 04 9e 51 30 61 82 af ed 37 96 e2 b6 a0 | 3b c4 41 66 ee 44 1e e7 39 9f 7c 2f f5 f2 ff 4b | 36 a8 c8 29 8b eb d2 55 7f fb 10 9c ec 8c 08 d0 | 39 05 1c 07 ac 20 cb cb a4 7c 61 41 78 60 13 d3 | dd a5 39 38 ad f1 86 ff 6a 3c d0 2d b1 eb 7c 82 | 79 91 1f 2f 55 9c db 4d e2 10 be 62 dd e3 5a 7a | 61 63 85 0c fd 8f b4 af 97 73 ef e2 1b 21 c4 96 | e5 df 1b 56 fa 11 08 d6 95 8d 53 f4 13 64 3d 3d | 98 8c 38 c7 52 64 1a 00 95 89 f1 a3 72 e2 fe 87 | 05 b1 bc 3a 2d 8d ca c2 67 8a 86 e8 36 ce a6 73 | 08 10 ff 3d c7 41 a4 c0 53 af 83 9f b4 ac d3 a6 | 29 00 00 24 7e 5d f1 77 88 98 7f 63 50 07 d0 59 | cc bb c0 62 cd 9c cc f3 5d 35 d8 78 d2 ee b4 01 | aa b2 27 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 b5 ac f1 52 82 e1 6d 65 51 7c e0 | ef a0 91 c6 07 cf fb 64 00 00 00 1c 00 00 40 05 | 8f da 92 7d 7b 47 83 cb 10 aa f2 ca 2c a8 73 ac | 13 99 82 ed | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #299 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 63 02 bb 51 d9 8c b0 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #299 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #299 | rejected packet: | 63 02 bb 51 d9 8c b0 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #299: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0439 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a52c90 | handling event EVENT_RETRANSMIT for parent state #300 | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #300 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #300 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49700.750107; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006013 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #300 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 "road-eastnet-nonat-48" #300: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #300) | 5a 7e ff 7d 11 39 dd fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 d7 07 3e b9 b2 ed 0a cc c5 e4 47 ac fb df bc | 0b 82 8a 56 1b e7 c2 b9 79 67 f6 05 c1 b0 1a 41 | e0 93 9f 0d bb 5b 76 5f ac 5e ea 5e 58 49 c4 c3 | 9b f8 0e 2d 48 75 fe 88 ae 81 6e bd fc ad 1e 40 | 65 b9 12 2a 8f 3a b5 a4 e3 d6 7e 50 9a b3 12 10 | be 2b 79 8f 29 34 8f 0b 99 4e 4e 7a 4b 49 42 b4 | 04 b2 ac fc ac a3 5a 98 37 17 c3 a2 f0 f0 c9 79 | df 28 17 de 36 02 c0 b4 1b f3 2c 9d ad d8 f6 f4 | c9 44 36 2c 9a 21 d9 68 8c 86 58 41 ae 59 e7 74 | 88 a3 d3 f6 a3 ef 04 07 90 c9 82 f0 a7 49 d9 a4 | 83 0f b0 90 08 f3 eb 02 f4 ec 40 8a 98 92 d5 38 | 7d db 73 c5 6a 66 84 84 0b 3e ba 92 37 b8 31 bd | 61 f6 57 d8 cd fd ab d5 b0 51 b6 0b 3f 5e a3 a5 | 0b 5e 9e c6 f9 0e 39 09 62 b7 fe 88 e1 1e 94 68 | 7e ba 69 87 7e ff 7f 13 a8 f4 7a 0a b2 7e 1c 3c | 9c 70 0e 6e a8 6f 4b 28 4f f5 1d ce 10 46 27 eb | 29 00 00 24 db d2 83 de 45 20 a2 89 40 10 d1 ad | 44 17 5c 15 2b 8f 9e 84 0d 1b 42 0f a9 75 90 ef | 32 25 81 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 9c e3 05 f1 a6 88 c9 89 5f 4a 78 | 8b 60 50 45 77 4b 7a a3 00 00 00 1c 00 00 40 05 | 2b d5 a3 e8 51 d4 0b 1b d6 4d 4a ff ba 69 1c 93 | 2c 16 fd 8b | libevent_free: release ptr-libevent@0x7fb38803dab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a52c90 | #300 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5a 7e ff 7d 11 39 dd fb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #300 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #300 | rejected packet: | 5a 7e ff 7d 11 39 dd fb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #300: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3600129a0 | handling event EVENT_RETRANSMIT for parent state #495 | start processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #495 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #495 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49700.798406; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00487 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a52c90 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #495 | libevent_malloc: new ptr-libevent@0x7fb38803dab0 size 128 "road-eastnet-nonat-243" #495: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #495) | 51 22 fa ce 4d 7c ce 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c 9b dc 70 14 a2 8d 2e 37 c4 2e 9c 10 fc 27 0a | 94 78 5e 85 80 ae e5 be af df cd 9d ab 0a d3 d5 | 9a 0e 71 ff 6f 4d f8 da ab bd 5a 72 c3 2a 71 74 | 55 f1 2d 29 95 62 4d 7d b1 32 5b 12 fd 0a 2d bb | 81 aa ca e6 2a a9 0f 8b 0c cf 1b d2 de 30 5f 1f | e8 83 26 da 07 fd 31 9b 9b d4 1b db 2d 4b e3 99 | 86 7d a5 a0 d4 7d 59 09 c9 73 32 3d 53 85 e9 6f | 12 64 cd cb bc 89 f7 39 4d 28 2c 75 1c 49 0b 3b | c2 22 31 40 60 7d 62 ec d8 da 82 4a bd 1e c5 38 | c3 d8 6d e6 cb 49 78 ba 18 b4 83 3e 7d f6 6d 50 | 16 4d a6 04 f2 a5 8b c2 44 ae 9c 1a 54 68 4c 7d | 43 87 34 87 42 6c 4d fd b4 43 f6 3a 97 2e d2 87 | c4 99 e8 56 55 a1 ca 43 16 5d 55 9b 16 ed ee c1 | b9 bb 2b d6 cf 5a 0d 72 75 6d 1a 0f ae 6e 85 ec | 3a e8 4f c3 0e 27 5b 09 2a e5 e1 24 f5 af 32 13 | e5 eb fd 29 dd 27 c3 a5 08 cc 6e 72 80 4d 82 6f | 29 00 00 24 1b f3 52 dd f6 a5 80 95 b8 2f 4b 8b | f9 eb 65 1b 6e dd cd 94 b7 dd 16 f5 58 7c d7 e5 | e4 3a 80 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 3b 51 4a 4c d3 e5 68 1a 7e fa ec | e7 02 de b1 56 34 9d 92 00 00 00 1c 00 00 40 05 | ef ad 01 a7 be a3 55 49 1c 13 e6 d1 01 bd b7 0b | b8 36 16 d5 | libevent_free: release ptr-libevent@0x7fb3500300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3600129a0 | #495 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 22 fa ce 4d 7c ce 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #495 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #495 | rejected packet: | 51 22 fa ce 4d 7c ce 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #495: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354046090 | handling event EVENT_RETRANSMIT for parent state #301 | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #301 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #301 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49700.804698; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005995 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3600129a0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #301 | libevent_malloc: new ptr-libevent@0x7fb3500300e0 size 128 "road-eastnet-nonat-49" #301: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #301) | 04 2d 84 e7 d7 11 c2 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 3c a0 2e 05 57 66 74 9e 59 04 02 1e 6b 82 64 | 24 cf 86 32 1b 49 63 31 85 6e 91 96 dd e7 a7 21 | 78 ee 5c 0c 83 da 97 1a 0c 46 69 7c d4 8f 0d 6c | 0b 43 52 49 09 9a 24 da 36 13 01 09 31 88 8b 5b | 38 73 77 00 83 94 ba bf 7c fa 22 16 ff 64 be 16 | 43 df 4f 1d b8 18 88 ee 83 b1 c9 32 ce 1f e3 0d | 40 e4 05 2a 7d 12 64 bf de 51 1d 4c d5 99 11 64 | 9a df 9d ae e7 e1 f9 df 89 9a 5f 11 f6 4b 39 47 | 36 de 08 ec a1 59 7b 84 9f e8 cd af ca a0 8a 29 | aa 2e 7e 1a 1d 88 43 74 5c 19 1a 8f 44 5f 83 95 | cc 00 d8 ee 8f cb 95 29 ae 58 5c 08 01 62 ea 7e | 97 e9 bf 6a 36 31 ba 2d 83 4b 4a ef ce 50 36 44 | 4f a8 a5 8e ad 2c 99 bd c1 01 08 ba ee 5e 1c 63 | 9e 50 96 b6 7a 6e 9f de cf c5 73 a0 7c d6 3d 3a | fe 11 5d 0f 1c cb 4b 02 b4 b1 f7 0c 56 bd a2 fe | d4 f1 da 5a fb cc f5 22 d5 c9 55 2b 49 27 7a 02 | 29 00 00 24 9d f4 32 14 da 15 0d 5d b3 86 88 1b | ed 98 fc e3 a3 7a 35 ba 87 aa 0c 85 93 07 0b 69 | 9d 37 a2 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4d 4c 33 35 25 dc 8b ec 4f 4f 50 86 | 6f 49 f3 b3 44 40 22 71 00 00 00 1c 00 00 40 05 | d2 03 8c 03 1f b3 ee 14 98 31 7f d2 44 da 50 e8 | 1a 08 5c 44 | libevent_free: release ptr-libevent@0x7fb354044a20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354046090 | #301 spent 0.0974 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 04 2d 84 e7 d7 11 c2 a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #301 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #301 | rejected packet: | 04 2d 84 e7 d7 11 c2 a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #301: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a76210 | handling event EVENT_RETRANSMIT for parent state #302 | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #302 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #302 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49700.870965; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005585 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354046090 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #302 | libevent_malloc: new ptr-libevent@0x7fb354044a20 size 128 "road-eastnet-nonat-50" #302: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #302) | 9a b7 d9 69 b7 b5 8b 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 30 3b 38 5a ca c1 e0 66 18 62 3b 15 6c b6 3b d4 | d7 ad 95 64 47 60 48 b5 a1 40 89 ca 34 68 f4 5c | b5 12 b3 25 90 eb 49 eb b5 40 df ef 79 a7 f8 11 | fd 6b 8c b7 57 dd 67 6c a2 67 a7 4f be 73 1c 93 | d0 14 73 9b 52 53 0b 4e 5f f6 38 f3 b8 8b db d1 | 1c 9f 4f 10 7c 2c fa b8 0b 5c b4 6b 80 d0 b7 e3 | b6 70 3b 9c d9 ad f0 38 ba 59 1a 5a 32 60 56 90 | 00 97 ec 2a 32 4c ce 8c d0 a5 94 f1 33 fd e4 3c | bb e9 7f cc 0d 4c 4c be 2b f0 80 18 d5 0b e3 68 | da 32 8d 6f 53 ff 6f c4 bc c7 44 a5 1e 56 ed 9a | 22 1a 47 85 cc bb d8 71 12 33 c9 06 fb bd 86 04 | 8a 5e c6 10 00 05 dc db 1a ce ef c2 9a df 5b 3e | f1 94 44 f2 93 b5 45 ee f4 39 f1 54 d0 08 74 2f | 98 02 e6 14 93 d3 55 70 9b c1 5c 0a 6d f7 72 e9 | 7a 20 75 0d 8a 45 81 c5 cd 4a 79 7e 2a a7 cf ed | b9 84 dc 2f 1f b1 1b 47 62 4c ef 36 89 f7 2e e1 | 29 00 00 24 4e 70 94 e8 7e 52 b9 fd e3 7f cf aa | b8 11 eb 44 2a e9 8b 91 cb 46 0f b2 fd 17 ad 44 | 7e 6a 9e 6e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 54 86 00 1a 73 2d f1 8e 31 28 7e 7f | 4e 1d 05 b3 46 7f 2d d6 00 00 00 1c 00 00 40 05 | e4 ea 9a e9 78 75 4e 5e 40 77 76 74 52 35 fb 06 | 70 d7 5d cd | libevent_free: release ptr-libevent@0x7fb38002d3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a76210 | #302 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a b7 d9 69 b7 b5 8b 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #302 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #302 | rejected packet: | 9a b7 d9 69 b7 b5 8b 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #302: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae48c0 | handling event EVENT_RETRANSMIT for parent state #303 | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #303 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #303 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49700.950284; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005462 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a76210 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #303 | libevent_malloc: new ptr-libevent@0x7fb38002d3a0 size 128 "road-eastnet-nonat-51" #303: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #303) | 0b e0 0a 79 39 06 c6 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 24 21 b4 0b e3 09 db 3f b6 a5 77 bb 87 5e ad | 66 c7 93 9a 8c 2e 04 3b 08 20 ac 03 a5 76 12 ab | b6 66 99 c7 bf 97 92 b1 32 f2 d4 40 1d 20 9f 0b | 85 c0 47 40 73 82 3c 97 59 5e 7a bf 29 1b 9b 33 | 65 e1 1d e1 06 4b 23 bb cd c3 d7 6f 1f 4d 6a d4 | a5 35 47 13 70 43 5f 27 3f e8 8d 45 36 1b 13 e8 | 52 7a c9 fd 4e c5 bf df 1d ad 19 77 99 5f 83 de | fd ac 63 24 8e b6 c0 c8 ec b2 56 6f 38 d9 99 06 | 17 b7 7e be be 8d 7f 5c 2d b1 d6 35 c6 26 88 21 | 6c 47 69 c2 4b 86 0c 66 51 e7 f5 2d 4c fb e5 79 | 2e e4 ba 11 88 c3 1e d5 cd ce 6d 00 ed f9 6c 2a | 2b 8c 48 d8 fb b0 3c 63 91 8e ae 31 9b af bf 15 | 0b 41 67 9d 12 12 70 9c 8c c1 6a db fc d2 6b 50 | c9 fa d7 b3 18 db 4f f1 d7 45 f6 0f b9 6e 33 c9 | 52 60 cc f3 be 3c 22 f0 a3 35 db d2 db d6 a6 94 | 52 18 e2 de 57 43 68 d8 7b eb ec 67 cd ed 35 3d | 29 00 00 24 80 ff 8a 78 69 ce 7f 51 87 5f 84 ba | c7 a1 f0 8c ea cb 68 68 e4 3e 06 9f 5c 43 cc 06 | 85 44 5c 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a9 50 a2 4e fc 4d 1b 58 77 6d e9 3b | 74 ac 43 c3 0f 7e 66 e7 00 00 00 1c 00 00 40 05 | d9 44 30 c1 08 7f 7e c4 16 be af c3 f1 e2 c1 72 | 14 da 79 2d | libevent_free: release ptr-libevent@0x7fb3480251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae48c0 | #303 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0b e0 0a 79 39 06 c6 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #303 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #303 | rejected packet: | 0b e0 0a 79 39 06 c6 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 33 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-51" #303: ERROR: asynchronous network error report on eth0 (192.1.3.51:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c03b100 | handling event EVENT_RETRANSMIT for parent state #496 | start processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #496 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #496 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49700.982579; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006017 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae48c0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #496 | libevent_malloc: new ptr-libevent@0x7fb3480251c0 size 128 "road-eastnet-nonat-244" #496: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #496) | f5 9f b4 c2 7a 9c 1f 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec 8a 03 66 9e a5 16 39 b9 4a bb 3f cb 61 65 42 | 8b 18 46 77 70 53 8b 55 8b 35 c6 f2 c8 4d 38 3e | 2b 6f 3f c9 8d f1 cb 91 94 06 70 93 28 a0 96 60 | 92 d3 00 a2 ef 01 89 68 02 8d 85 25 69 9d e5 95 | 69 f6 3b 34 62 4f 63 bc 8e bf 0f 5d c5 bc ea 46 | f9 33 76 3d ad c3 1d 5a 73 74 ae ae 16 20 46 35 | 9e db 41 74 ad 1f 50 49 89 b1 86 a0 57 06 1e bf | 85 a3 93 e1 b5 84 03 d1 1b 0b 7b cd 83 c2 b7 25 | da ae 43 dc f0 b6 2a cd 25 9c e3 07 d7 ef 34 20 | 0c 00 64 d5 63 1f b1 99 29 80 fe 35 ec 43 23 95 | 6a a2 fc 57 a3 69 20 ea 94 fb aa 78 ee 5b 41 20 | 62 d9 4d ee fd 29 6e d9 f4 a1 15 cb 28 a0 f5 d3 | 5e bd 59 a6 87 61 99 4f 80 5d e6 36 36 11 e0 c2 | e5 c9 d7 3c 99 3b 27 4b f7 81 ca 42 93 ee a9 76 | e3 2e 24 6c 18 27 a8 24 04 ce 7c dd c7 a8 fd 5b | a3 04 bb 87 35 69 9f a6 83 11 9f de e4 40 52 5f | 29 00 00 24 4f 4f 97 a4 0f 74 20 cc 43 f4 64 ac | a1 3b a8 cc 16 af 62 fa 43 5b 11 20 24 9f 33 6a | 2d 6e 82 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 79 bb 2d d9 d9 21 50 1a 1a 14 0f | 62 ed ae c0 08 f2 03 40 00 00 00 1c 00 00 40 05 | c8 1f b0 a0 de 58 fc c7 c3 79 0d 4a c2 37 42 43 | 8a b6 69 08 | libevent_free: release ptr-libevent@0x7fb35c029490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c03b100 | #496 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 9f b4 c2 7a 9c 1f 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #496 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #496 | rejected packet: | f5 9f b4 c2 7a 9c 1f 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #496: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344017ea0 | handling event EVENT_RETRANSMIT for parent state #304 | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #304 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #304 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49701.015893; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007182 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c03b100 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #304 | libevent_malloc: new ptr-libevent@0x7fb35c029490 size 128 "road-eastnet-nonat-52" #304: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #304) | a8 9e ad f8 7e d0 8f 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 65 f7 e5 5b 0c d9 66 1f 9e de 27 b7 a9 e5 61 | e4 fa 1d ab 7c 97 a1 bd 20 9d f3 a2 b5 27 bd 1f | 8f a0 e6 70 97 5a a5 25 66 20 75 9f 12 5d d3 39 | 9b 63 a2 db 2b 74 35 c0 72 13 97 27 05 c2 62 b9 | e3 8d 4c df 62 26 b2 ef 71 4f 57 9f 86 a7 ae 23 | 96 73 f6 29 74 fa 2e d9 85 44 9e f4 6e a1 bf c3 | aa ee d5 e9 ef ed b7 f6 19 80 49 92 25 03 a6 fd | 97 ad 05 c1 4c ee d0 28 55 8e 3c fe 56 3a de 43 | 58 54 9b db 87 cd a3 da 37 73 a4 bf 3c b5 ae e4 | 24 52 70 fc 3d a8 8c fa 47 49 00 40 14 e1 2e ac | c2 2a 40 fe b6 ab ac c0 48 61 8f e7 d0 5a d3 f9 | ee 88 91 3d 36 46 3b a6 d1 44 56 83 2a 21 0b 8c | bf 71 69 ea 58 fa fe b7 82 58 cb 6d 26 3b 79 12 | d5 7b af 2b 0b 68 46 9e 23 40 da 39 fc 30 e7 9e | 96 5b ef fa 83 ac 69 ef e9 6f 36 21 f5 e9 e9 e7 | 28 93 fa 84 b2 62 19 86 19 c7 09 bf 96 a9 13 fa | 29 00 00 24 01 38 84 c9 86 37 f1 ee b2 c5 1a 16 | 9c 76 d6 78 f3 8e 1b 3e 7b e2 b1 ac 57 81 00 ff | be 40 7b 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 4d a8 e4 29 87 92 f9 c9 e0 47 d4 | 8d 2b 33 0e 7e 88 7a bd 00 00 00 1c 00 00 40 05 | 14 10 d4 5f c4 9e a3 33 92 fb 64 77 06 27 8a 6c | e3 d6 b0 88 | libevent_free: release ptr-libevent@0x7fb344039b40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344017ea0 | #304 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a8 9e ad f8 7e d0 8f 50 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #304 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #304 | rejected packet: | a8 9e ad f8 7e d0 8f 50 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #304: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0642 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380027d70 | handling event EVENT_RETRANSMIT for parent state #305 | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #305 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #305 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49701.093302; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.009527 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344017ea0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #305 | libevent_malloc: new ptr-libevent@0x7fb344039b40 size 128 "road-eastnet-nonat-53" #305: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #305) | 0e ad 9d c2 5e 8b 6a 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f e9 9f 5a 6d 09 7a 5d 23 c1 f2 37 ec ac 20 ff | 0b 05 30 7f 53 42 af cd 03 b4 6f 3e 30 98 76 c7 | f6 6d 6d 12 6f 8b e0 b3 ea 9f 1c 72 a6 90 d8 7b | c5 96 6d 18 3e 75 5f 76 31 a1 d4 8e 3c 37 16 33 | 4b dd 74 20 e8 c4 62 66 2a 3f ae 2f 41 fd 91 9d | 82 99 62 7a b3 d1 ba 05 ec 0f 82 e6 50 45 b8 02 | a6 bb b5 5a eb 4b 5a 37 8e aa cf ae a4 3c 1d 53 | 50 52 15 71 96 99 84 38 c8 90 39 55 a5 f6 b3 e4 | fd 1f be 6b e2 f1 ec 6b de 7b d5 b2 c2 99 77 3a | 99 91 64 fd 16 0c de 9a 77 95 51 ab fa 63 18 46 | 7f 05 f1 01 08 4a 40 52 ce 73 f7 5e 69 b6 5a cc | 4f 80 84 49 75 3b fb a8 21 4b 60 95 55 81 f4 0d | cb 05 bd e3 26 c4 5a 85 f3 a4 be ed 0d bf dc 15 | 6d 89 c4 7e 34 fc cc cd 95 5c 1d d7 12 73 97 3c | b9 13 4a ef 01 3e 06 0d bc ac d0 d1 a5 d2 76 b5 | 0f e8 f3 1a 11 93 b0 3e ca db 92 a3 66 d7 f8 e1 | 29 00 00 24 f3 38 4c 4d 23 45 96 5c 15 55 c7 5a | 82 60 67 82 ca 1f 2d 10 e7 40 18 d9 8a a9 22 da | 5f 97 93 ac 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 2a f3 b2 21 79 dc dd 37 78 74 cf | d5 e0 cd fd 06 29 e6 7b 00 00 00 1c 00 00 40 05 | 89 f1 13 5f 51 69 37 8e 62 27 27 24 a2 bd 48 85 | 3c 78 e4 8e | libevent_free: release ptr-libevent@0x7fb380043300 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380027d70 | #305 spent 0.291 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e ad 9d c2 5e 8b 6a 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #305 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #305 | rejected packet: | 0e ad 9d c2 5e 8b 6a 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #305: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.129 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a903c0 | handling event EVENT_RETRANSMIT for parent state #497 | start processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #497 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #497 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49701.108911; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006043 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380027d70 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #497 | libevent_malloc: new ptr-libevent@0x7fb380043300 size 128 "road-eastnet-nonat-245" #497: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #497) | 28 b5 38 f6 69 3c dd 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 04 4f fe 15 c7 2a a9 dd 3f 1e c4 af 27 5d f3 d2 | be f7 13 da e4 cd 00 79 29 61 5f 71 06 40 ec 4d | 5b 3c 6a 08 8b 9a 2f 7d 1c cb b0 e7 92 b6 f3 99 | d5 a0 ee 16 30 44 37 37 a1 b0 11 d5 bf c1 2a b7 | f5 d1 e8 e7 c9 c5 fa 46 9e 9f 3a b8 17 a3 bb fa | 54 7b 20 13 28 1b f7 09 b2 95 cc 2b 5d f4 60 59 | 43 48 23 26 2f ff 03 e2 92 b6 e4 28 ce 3a 0e b0 | 61 13 0a de 56 e6 23 f3 78 da d1 d7 d1 36 d7 28 | c6 40 4f d5 36 46 dd 50 a2 1e 26 c4 f5 81 8c a1 | f5 29 b8 66 19 89 39 ca 34 48 2c b5 7e 66 e5 bf | 86 9d 6e 91 75 02 c6 e8 9c 42 e7 98 64 aa 15 f8 | 6c 03 28 e6 79 39 e1 5e 40 0e f9 55 f0 a7 e0 83 | fa bb b8 03 f0 19 b9 6c 46 69 2b 63 42 39 b5 e4 | 3d 0b 8e 6b 21 0c f2 48 0e 67 57 08 dc 21 c5 f4 | 1a 4b 05 96 97 80 b1 ee 12 7e 9f 47 8d c8 b6 e1 | 5b 8f 86 2e 8f 92 b6 42 a3 65 04 7b ab ba 17 50 | 29 00 00 24 bb a3 f2 ad c6 d3 d5 2f 68 33 8b a0 | e0 e2 16 25 72 ec 6d 1a 07 9d 1d 9e dd 96 6a c8 | 4e 10 b2 ba 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 bb 68 12 ef 53 e2 45 10 bb c5 e2 | 24 4d b4 aa b9 d2 2c 73 00 00 00 1c 00 00 40 05 | 18 cd c3 7e 31 14 45 db 85 92 8b 2e 4a 8c 9b c9 | 08 95 b5 b9 | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a903c0 | #497 spent 0.297 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 b5 38 f6 69 3c dd 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #497 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #497 | rejected packet: | 28 b5 38 f6 69 3c dd 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #497: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.132 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #306 | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #306 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #306 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49701.169501; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006088 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a903c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #306 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-54" #306: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #306) | fd d2 63 50 0e 6e 1e 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc f6 1e 22 b4 91 3a 68 1f d1 67 6d 28 c8 f1 bf | e2 6e 14 07 e3 24 35 86 32 c0 3d 31 76 0e 87 74 | f9 3c 48 85 fb a5 36 8c 2d 66 01 91 c5 ea 8c 52 | 2c 54 17 a9 6d 05 2c 50 21 08 25 54 8a 1b be 0a | 1d bd df b6 06 bd 44 6a d2 67 92 4c 02 bb 81 0c | c5 ff 14 e5 24 16 2f 34 f8 b9 eb 90 9f 21 2d 2e | b4 e3 0a 67 2a 94 b3 b5 79 5e 99 67 ad f2 05 03 | 3c 2d de 97 30 2e 1c 04 bc c1 21 b5 15 d2 d7 d9 | ea a8 e1 e4 5e c5 d4 35 2f fe 33 59 95 e2 b7 3c | 23 52 f4 04 24 af 5a 95 09 7f 61 6c 7a 9b e9 50 | d2 38 26 f9 d3 19 e4 0a 3c be ac cf c6 ff b4 45 | b0 35 a0 dc ec 70 3d 13 ab c2 8a 53 0d 47 68 05 | 67 66 c8 1a af d5 d2 45 a5 c1 6e df ea 2b 64 70 | 05 da 5e 15 ac a3 ed f4 40 10 0f 5a 84 40 9e bc | d6 87 16 fd 3f a2 ff 39 19 ba 66 6d 2d e9 93 fd | b9 22 df b5 78 f4 f7 04 ee c7 91 83 7d a9 ca f1 | 29 00 00 24 c2 6f b9 fd fc 4f db 1a 3d 3f c0 a7 | af 7a 63 dc 70 8f 4c 18 81 55 af 15 16 2b 00 41 | 32 ac cf 3c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 87 47 9a 56 3f e1 15 1e 01 4b 7f | bb 95 0e 04 49 a0 88 16 00 00 00 1c 00 00 40 05 | 0c f3 ae 84 0d fd 98 31 4d e7 cb a5 de d2 0b 07 | b0 31 98 21 | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #306 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd d2 63 50 0e 6e 1e 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #306 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #306 | rejected packet: | fd d2 63 50 0e 6e 1e 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #306: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.046 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388009ed0 | handling event EVENT_RETRANSMIT for parent state #498 | start processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #498 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #498 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49701.243821; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.008123 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #498 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 "road-eastnet-nonat-246" #498: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #498) | 68 4b 64 40 03 e3 f0 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 69 29 47 91 ea fc 2e df 27 76 0c 26 38 63 6b | ee 03 64 3e dd 2d 4f 5c a2 7c 3e 41 2e b2 c6 84 | ff d7 8f ca 24 8a 1a 84 04 b4 3e b6 53 38 d4 57 | 6d a4 68 41 c6 e5 8c 59 22 a7 fd d7 67 07 36 7e | 1e 40 23 48 d2 30 3e 8e d0 0e 2f 85 d4 6b 01 86 | 85 76 00 26 45 82 b5 a1 ed 94 31 de 85 9c 6f 9a | d2 cc cb 6d 68 f4 36 91 7d 92 94 a9 b3 a0 25 d9 | 5a 00 e8 82 c1 6e 50 4f eb 4b c5 77 4d eb ad f8 | f9 00 df 08 85 b8 e7 b1 b7 09 70 ca fb b5 96 54 | bd be b6 e6 4b 40 d9 6a f9 30 1c a8 77 f3 85 c8 | 21 54 2e a4 d4 8e d4 56 c2 16 22 dd 3e 05 97 69 | 65 6d 3c 5d 0f 12 01 33 b0 f7 91 7a 47 03 5b 97 | 4d 0e 9c 52 05 49 6e 01 9c be f7 12 23 b1 5e c9 | 73 97 42 af ac c3 1d 81 30 3b a9 46 14 e0 b0 65 | ab d4 ac 96 fd 2b 1a 19 c7 e5 47 a1 84 25 26 11 | 99 9a c0 71 dd 5f b8 d7 21 7f 1f c8 a8 a3 e9 18 | 29 00 00 24 87 96 a9 cf f1 29 2d 50 7c 79 d6 68 | 62 af 98 cb 71 a2 fc 0e ae 94 c2 03 22 51 95 ed | 81 12 8d c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 71 da 0a 79 9e f6 1d 6a 6f 5a 6b | 39 aa 0c e1 fb 50 58 ee 00 00 00 1c 00 00 40 05 | 43 dd 8c b7 86 3c b2 4e bf 53 d1 4c 55 30 14 19 | fc 2a 32 31 | libevent_free: release ptr-libevent@0x7fb38801d010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388009ed0 | #498 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 4b 64 40 03 e3 f0 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #498 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #498 | rejected packet: | 68 4b 64 40 03 e3 f0 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #498: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0493 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61bd0 | handling event EVENT_RETRANSMIT for parent state #307 | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #307 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #307 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49701.333145; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007593 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388009ed0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #307 | libevent_malloc: new ptr-libevent@0x7fb38801d010 size 128 "road-eastnet-nonat-55" #307: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #307) | ae 96 63 e8 bb 6a 85 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 14 ed e9 d6 19 10 2b ec dd 37 28 c8 5c 2b 9d | 4d 1c 56 bb af 08 b5 7a 4b a6 fc d3 e6 37 09 e4 | 3f 1e 28 12 a3 d4 a0 95 36 fb be 53 ba 61 08 91 | a5 59 64 37 32 8f 20 cb c1 4b 24 6f aa 9c 35 eb | 55 d5 bc cd 87 7a 12 07 97 e1 3e 1d fe 09 4e 05 | 56 a9 36 dd e5 c2 2b 14 24 4c 71 52 b8 4a bc e5 | 44 05 b4 12 ae 0a ee 10 63 d4 56 16 75 0e 24 7a | d8 3e 40 79 17 42 50 86 a6 54 47 3f a4 b0 ab e0 | d2 28 b5 9a 24 3f 4a c2 b0 91 11 3a 15 fb b2 26 | f2 b0 63 ef 6f 51 35 98 2f 68 7c a5 78 9f 97 ad | 5a 09 af 4c 24 bb dd dc ab e6 24 53 27 3d 9e 03 | 62 ad 6c f7 99 7f 86 ec 99 0f d4 42 fa 99 b4 e1 | da 5b a4 af 44 6d 6a f4 d7 89 78 8e f4 87 7b 68 | 84 5a 7e 9d b0 43 44 70 16 90 a6 1a d2 cc 8f 85 | 21 0d 25 8b 92 c7 6a 03 1f 2e 4c a1 00 a9 05 b1 | b5 20 9b fc 87 43 c1 10 a6 42 8f 4d 15 f7 48 a2 | 29 00 00 24 9a 25 60 c3 7e e3 91 a3 9d b3 07 0f | ff 92 da ab 25 95 17 32 0d 82 17 4c 51 9e de a9 | 5d 92 35 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b e0 88 15 5c bc 20 c5 96 41 9f 3a | 7e ef 58 59 98 52 f8 6e 00 00 00 1c 00 00 40 05 | 92 3b 5d d1 4e 37 91 81 a5 d6 c2 94 c8 33 2c 33 | 6a d3 7b 36 | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61bd0 | #307 spent 0.118 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 96 63 e8 bb 6a 85 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #307 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #307 | rejected packet: | ae 96 63 e8 bb 6a 85 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #307: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0458 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61c10 | handling event EVENT_RETRANSMIT for parent state #499 | start processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #499 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #499 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49701.368442; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005694 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #499 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 "road-eastnet-nonat-247" #499: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #499) | c7 9c 2c 36 f8 59 d4 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 36 9d 7e c3 eb 0f f5 55 38 8b 43 25 86 54 ef | 6f b9 f8 28 7e 76 ec 92 74 99 fc c9 b6 64 9d ac | b4 f5 fc 31 29 96 7b f0 ef 3c 01 28 c3 ad 1c 4d | 74 6d b0 ed 64 09 35 18 c6 6a c2 bc 6c f8 72 2c | 54 14 82 7e 14 37 d9 e7 9b 9f ce de 7f 99 2e f1 | 1f 25 30 b7 54 88 0c c6 03 fe ef 9a c2 4c 16 3a | 92 dc d7 50 b6 03 1d 9b e5 26 b1 a0 fd e5 86 9c | c1 bb a9 1d c8 aa e0 66 62 a8 ef d5 a3 e5 1c aa | 48 a0 13 72 a6 76 d4 63 de 8e 77 d1 a4 a1 70 1a | 05 7e fd e9 46 8f d7 69 9c 5d 01 6a 23 bf d1 7c | 60 fe 3b 08 36 7c 46 56 5e fa 3e 87 6e f8 5c e5 | 62 26 d2 09 02 d7 a8 88 f2 80 8a 7b d3 24 87 ec | 98 c6 06 44 cf 2e 14 1f 9a 9e 11 3b 15 35 10 67 | 80 78 af 3c 90 b3 be 54 94 f8 6c d9 36 9d 34 3f | b2 ee 4f 6f 8b cb 03 13 29 6b 61 bf aa 20 b1 02 | 64 9a 46 8c 58 45 74 b6 a7 9c 3f 9f 19 1b d5 f4 | 29 00 00 24 ae 3f 5f 22 5a fe fe 91 94 31 fc a8 | 30 c0 4a f7 3c 57 3c 0d ed a5 29 f2 71 dc 56 3a | ed 9c a9 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 89 ab ab 1d cc d7 b6 cb 29 1c 48 | e7 84 01 ce 34 15 c4 5f 00 00 00 1c 00 00 40 05 | 7f 71 39 3d 41 d0 36 ee b9 ed 2b b5 28 d2 9e d8 | 0a 4d 91 1e | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61c10 | #499 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 9c 2c 36 f8 59 d4 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #499 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #499 | rejected packet: | c7 9c 2c 36 f8 59 d4 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #499: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a50110 | handling event EVENT_RETRANSMIT for parent state #308 | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #308 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #308 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49701.422728; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007001 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61c10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #308 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 "road-eastnet-nonat-56" #308: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #308) | 80 0a 88 98 4b f9 e7 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 60 f0 11 1d 6f 3c e8 3a d0 c5 a1 1f 8b f6 d6 | b8 1e e6 d3 27 fa 35 0f 2e 35 7c 6a ac 4d b0 5a | 6b 0b 3b 4a 46 9a c1 e4 d2 3d 95 4c 54 c7 f8 b0 | a3 25 b2 e5 19 52 cf a8 80 64 9a 61 44 3f 5d 89 | b3 ab 84 f7 4d 8d 5e c3 d5 83 26 99 08 7b 56 8e | d5 6a c7 4a 76 f4 45 38 3c fa 31 64 fb a7 68 c6 | c9 63 22 21 ab 35 5e 58 62 e8 99 25 ff 5b 61 ec | 55 a2 5b 36 cc 02 da 3b ef 08 f7 a5 b1 e6 33 04 | 63 ee 2e 9b fc 5a 62 eb 0d 0f da ab 7c b3 2f f6 | 1d 06 62 78 d0 f2 08 dd bd 5a f1 dc aa 18 b1 3b | 54 75 36 28 b8 4d f2 e6 89 e0 6c 9d a4 f4 71 27 | 99 51 48 e8 63 85 2b 41 07 00 9f 7b ff df b2 6f | 90 1f ac 1e 28 94 ef cf 9a 1c cf 53 7f 88 76 ba | 31 4b 32 29 7d 41 fd ba 51 dd cc 44 b9 6c 4f e1 | cf 89 c3 39 c3 eb 26 5a 05 e3 ac c1 a6 d7 ca ae | 7d 27 a2 0d 12 e5 de 71 e2 d1 95 9c b5 ec 14 d8 | 29 00 00 24 d3 c9 38 16 a4 35 41 62 ad 53 1d 3f | a5 70 61 f3 55 11 e2 06 85 67 55 51 bd 50 94 8d | 80 2d 38 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 1c df ea ba 44 23 ff a6 53 af 56 | 8c 58 68 ea 71 49 69 6d 00 00 00 1c 00 00 40 05 | 14 0c bd d4 4b a2 ff 28 87 d9 dd 83 a7 c2 2b 61 | 5c 8c 59 cd | libevent_free: release ptr-libevent@0x7fb37404b5c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a50110 | #308 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 80 0a 88 98 4b f9 e7 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #308 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #308 | rejected packet: | 80 0a 88 98 4b f9 e7 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 38 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-56" #308: ERROR: asynchronous network error report on eth0 (192.1.3.56:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.07 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360012bf0 | handling event EVENT_RETRANSMIT for parent state #500 | start processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #500 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #500 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49701.487149; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005883 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a50110 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #500 | libevent_malloc: new ptr-libevent@0x7fb37404b5c0 size 128 "road-eastnet-nonat-248" #500: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #500) | dc 38 e1 a3 3b e2 b1 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 4a f1 97 41 66 ce d4 ab 90 74 77 4f 00 cb 43 | 1f 3a 29 28 bd ab f1 45 3f 88 a4 79 39 fe 2c ee | 1b e9 2e 5c de da 76 bf a3 0c cc 93 b6 1b 8c 68 | 84 10 8f 55 6f 47 ec 76 41 18 0c b4 50 73 cf e8 | 55 11 98 5d d0 8c 2d e1 b9 47 bc d9 dd 4c 8a 72 | 7c cf 3b 3b b2 57 cf 3d e0 1d d4 39 94 72 a1 23 | 6b 6c 49 1f b9 94 b3 b7 a4 33 d9 35 1a 97 76 7e | 8f eb c4 34 d7 30 b6 ff 0b a0 77 62 d6 0a a9 b7 | 60 e4 b0 4d 0f 38 4b ae 9a ce 16 98 d0 34 95 01 | 44 fe 57 be 26 cf f9 d3 b8 79 e7 d6 d9 c0 2e 7d | 90 21 6f 7d c3 bc 04 f3 80 08 f6 e6 0b 6f 05 a0 | f8 da 5b cf d5 f7 d1 f1 f5 c0 29 8b c4 a2 cc 29 | 8c e2 9a 9c 8f bf ae c2 b0 3f ce e4 df fb 71 f5 | f7 13 31 70 b5 0f b2 9e ae 64 eb 2c 73 aa d9 5b | 7a b9 c4 3b 46 10 f6 92 a7 5e 0d a0 e7 06 8a 74 | 5e 40 71 07 4b d8 c5 08 71 52 bd 30 01 84 10 98 | 29 00 00 24 73 e7 fd d9 0c 07 09 ec 59 bd 7a b5 | 40 29 3e 5b f2 d3 e1 ea 7b 04 b1 b4 b1 5f 03 d2 | b4 24 ec 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 f6 20 af 00 f8 ef 66 b3 21 e2 19 | 0f ba fb 8a ed c9 14 86 00 00 00 1c 00 00 40 05 | 70 63 55 d1 ed 70 f9 1a 8c 9d 5a 9a f7 cc 31 61 | 9c 9b 74 c0 | libevent_free: release ptr-libevent@0x7fb37003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360012bf0 | #500 spent 0.183 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 38 e1 a3 3b e2 b1 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #500 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #500 | rejected packet: | dc 38 e1 a3 3b e2 b1 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #500: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0794 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #309 | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #309 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #309 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49701.520707; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007247 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360012bf0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #309 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 "road-eastnet-nonat-57" #309: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #309) | 90 f2 f2 23 da 96 f5 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 ae c5 2a 76 79 d9 11 80 1f 96 5b 2c 21 55 0e | 52 32 59 59 4d 8b 62 1b 1e 24 ff e4 61 ef 06 93 | bc 09 7d 02 95 4e 35 bb 5f 6e 04 f9 37 8a f2 09 | 6d fa 0e df ec 2a 67 53 c6 cd 21 62 19 ee 00 c8 | c1 d4 ad 74 e9 af 08 d7 51 b7 54 c4 5f 85 6b a2 | 75 c9 cd 93 29 db 83 26 13 60 09 0f 01 6b a6 ba | d6 a0 83 70 f4 77 2d c4 f9 20 b0 ee 09 7b a0 33 | 18 ea 6e 22 92 4b e5 33 07 61 e4 39 b1 8b 5a 98 | 64 4f e0 7f 33 58 7a 46 70 b5 36 54 83 e6 d8 37 | ce 3d 5e 64 00 34 b5 97 2a dc 6b 73 bd d2 1e e9 | b3 9d 99 c9 3c f8 18 03 58 76 b7 9a 2d cb ea 7b | 87 84 d1 8b 6e c6 cd 25 71 71 3e 99 ff 0a 1f c8 | 85 6f a7 e5 39 50 54 2c 26 84 44 cb fa 8a 51 d4 | ba 1f 9f 90 6f 93 95 a4 f9 85 9a b3 12 aa 79 46 | 05 32 e1 d4 7a f2 7a 36 94 b5 70 4b aa c4 3f f8 | f9 83 fb b5 44 81 41 3d b3 33 5c b4 2d 71 df 84 | 29 00 00 24 4c 7f 8f 28 17 31 ae 2a a7 3c 6d 65 | 1e 41 da 23 81 4d 09 fa 18 57 5d 4f dc f4 df 6c | 20 61 c5 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f3 f8 4c d7 1e 43 e6 3f 42 eb 30 72 | de e0 e8 5b 93 4d e7 89 00 00 00 1c 00 00 40 05 | e8 f2 fc 6d 83 fa 04 7a cc 0f 54 6b 70 28 25 4d | 2b f2 eb 8b | libevent_free: release ptr-libevent@0x7fb34803f490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #309 spent 0.443 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 90 f2 f2 23 da 96 f5 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #309 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #309 | rejected packet: | 90 f2 f2 23 da 96 f5 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #309: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.2 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35400d120 | handling event EVENT_RETRANSMIT for parent state #501 | start processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #501 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #501 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49701.574545; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.005712 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #501 | libevent_malloc: new ptr-libevent@0x7fb34803f490 size 128 "road-eastnet-nonat-249" #501: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #501) | 7a bb eb ab 59 82 f5 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 e6 e7 b7 df 15 1a 88 da d9 de 99 20 d1 37 56 | a1 ac 1e 3f d7 4a 79 5c c8 d1 9e 85 c4 f1 dc d8 | f1 ca b4 9f 14 60 92 de ad 42 9b 69 57 eb d4 33 | 23 a5 0d 4e 25 37 79 9e 75 f6 18 19 e2 36 6a 82 | 3e c6 41 e8 fb 1d 27 30 85 3c c4 c4 37 ed 39 57 | 59 68 3d d5 92 7b 15 e0 1d da a4 bf 8a 13 2e 99 | fa b3 d7 34 a7 e9 ee 45 93 41 ea 47 57 78 a8 c7 | 28 3e 80 cf 3a fa c3 5c 40 7e 2d 6e a8 8f 1a 76 | 9f e3 ee 0a 5c 09 b9 35 7b e1 73 9e 9a 5b 7e 05 | af 57 ba 41 a4 20 67 9b 93 00 a4 77 65 8b 72 e8 | ca c2 a7 8c f8 bc 75 a9 2f 52 c5 be ea 41 46 90 | 6a 2e 17 cc 87 cc 0a 22 0b d8 b5 c8 dd ab 30 09 | 90 3a 1d 65 9d 2f 73 fc c6 06 30 d8 66 83 64 c8 | a7 e5 c1 23 61 62 8a 18 87 ad dc 7f 74 de 65 20 | fb ed bb 7b ca 02 66 e1 c0 5c b2 b3 41 14 ad 3d | 9e 02 fd e0 c6 5b ba ef b1 16 d3 d4 8f 92 d4 90 | 29 00 00 24 0f d0 3c c8 9f 70 8e 25 2a 4f 78 c0 | 1d 68 16 9a 4a bb 3c a4 19 fe 19 3a d7 7c 1c 89 | 23 2f 21 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 3b be 6c 39 30 3e f5 fc f3 31 c5 | 53 ef 34 5b ca c1 eb 03 00 00 00 1c 00 00 40 05 | 86 82 cd 41 4f 66 70 19 76 ed 27 dd 0a 04 2f 6d | e6 1d 3e b6 | libevent_free: release ptr-libevent@0x7fb354012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400d120 | #501 spent 0.187 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a bb eb ab 59 82 f5 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #501 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #501 | rejected packet: | 7a bb eb ab 59 82 f5 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #501: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0826 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b05240 | handling event EVENT_RETRANSMIT for parent state #310 | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #310 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #310 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49701.604946; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006196 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #310 | libevent_malloc: new ptr-libevent@0x7fb354012840 size 128 "road-eastnet-nonat-58" #310: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #310) | 15 02 9e 6f d7 63 29 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 27 e5 1e b0 b8 71 be 19 22 95 4e cb bc fb 75 | e9 3b 56 69 33 4e 64 ad 57 4b 29 1e a9 e6 47 1a | 9f d6 c8 79 0e b5 d1 68 4e cf f5 82 76 ae 1c b5 | 09 2e f5 34 f0 f4 52 a3 a8 36 97 6c 75 c0 43 c4 | ee 87 0e 53 ff 09 f4 54 79 74 c0 ae 90 9a ff fd | 29 25 b3 6a e6 b5 58 cb 0a 34 f3 40 7a e1 f0 00 | e8 b9 84 74 bb 8e 47 15 eb 04 15 5e 50 5c 56 6d | 24 4e c6 f1 73 76 98 a0 94 06 1f 4b 61 2c fc 5d | a8 62 64 09 74 1c b7 15 e9 d3 bf 3e 82 77 60 84 | b7 ec 0f bd 1c 3b 5b 97 d2 ff 90 15 40 4c 65 b9 | 49 3d 03 bf e1 e0 85 d7 23 77 e3 10 9e 84 72 33 | 77 bf bf d8 fb 57 2c a9 b4 49 77 20 46 c0 0f 64 | 28 da 55 aa ac 53 17 bb 64 f6 fe 0e af c2 be 09 | 4d 7e 65 25 98 17 8d d6 a3 3b ed 10 34 62 66 3b | 5f 3c 43 cb 1e 2b fc 0b 3e c7 88 ef 40 72 0f 91 | 73 8c 1b 91 80 50 8f 7f 10 7c a8 7c cd 25 bb 09 | 29 00 00 24 8c b6 d4 9e 94 5a 53 1f e0 86 71 ae | 2a 48 4d 09 6b cb 2a d4 c0 d8 ae 06 c9 7c dd 47 | 64 97 96 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 0a e7 b4 3e 63 13 55 ea 18 77 04 | bd 77 d7 da 99 7b 63 27 00 00 00 1c 00 00 40 05 | 5c 4d 49 83 ef 78 da dd 25 a2 53 b8 0f 9a 33 7f | f6 be 51 b8 | libevent_free: release ptr-libevent@0x7fb338046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b05240 | #310 spent 0.182 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 02 9e 6f d7 63 29 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #310 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #310 | rejected packet: | 15 02 9e 6f d7 63 29 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #310: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0314 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3800319a0 | handling event EVENT_RETRANSMIT for parent state #311 | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #311 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #311 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49701.671324; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006553 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b05240 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #311 | libevent_malloc: new ptr-libevent@0x7fb338046040 size 128 "road-eastnet-nonat-59" #311: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #311) | 44 99 87 40 ba 63 67 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 f7 3b 73 41 b9 88 7a e8 c9 5c 33 15 fe 59 eb | fc 54 1c 32 28 ad 56 eb 34 ed 9a d7 b7 26 48 b1 | 97 4e 59 ed 4f 99 cd e8 e6 27 80 3f 35 da 0c a7 | 23 d8 2f 5d 19 c3 94 0e 09 96 31 23 4d f5 99 7a | 2e 77 d3 1f 35 48 ef 9d e1 61 1a 11 39 f8 6e ce | 65 2d d0 de 38 b4 23 52 6e 45 44 65 4d 7b bd c8 | 41 7e 01 a8 b3 39 9f a8 ee a5 53 dc 50 9b 94 2b | 69 df 03 ec 5d 36 9f 33 dc 3d 9c 7a 93 11 41 9c | 33 38 19 c9 cf 1a a3 f8 96 ca d4 d9 26 62 88 91 | 39 58 69 eb 93 1e 87 6a d7 64 14 8d 9c 37 19 fa | c6 b6 78 0e bc 5c f3 4b 97 bf 56 93 52 5a ea e8 | e0 ac be 1b 36 a8 31 6f 20 82 12 c0 13 79 34 1d | 86 03 61 75 0c 12 25 55 a8 61 36 78 64 d8 d0 e0 | d9 d2 a7 01 7f 00 fd 1f 2e 03 76 1e 96 2c 85 64 | f8 86 44 8c a4 8a 04 3f e3 a8 0c 90 29 b2 ad bc | e2 32 ac c2 2b f4 81 23 cf 52 ee cf c4 e3 9c c7 | 29 00 00 24 d3 df f6 74 46 9e 11 7f ae 1b 7e 22 | a8 9e 39 ab f7 77 2a 20 6e a6 c0 c3 6f 0b 0c 6a | a5 08 b1 f9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c b5 fb 2f 48 22 68 cf e1 a0 a0 6d | 16 65 fc 12 3f 30 cc 2d 00 00 00 1c 00 00 40 05 | 5f ba 06 b7 b7 74 50 87 e6 7e 19 f6 51 18 f6 57 | 2a d1 11 81 | libevent_free: release ptr-libevent@0x7fb380047480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800319a0 | #311 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 99 87 40 ba 63 67 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #311 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #311 | rejected packet: | 44 99 87 40 ba 63 67 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #311: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb354012bf0 | handling event EVENT_RETRANSMIT for parent state #502 | start processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #502 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #502 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49701.674575; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006558 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800319a0 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #502 | libevent_malloc: new ptr-libevent@0x7fb380047480 size 128 "road-eastnet-nonat-250" #502: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #502) | 49 84 03 55 33 41 14 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 b6 56 c0 55 c6 5a b3 d0 b1 3a cd 2c 2d f1 98 | 2b 05 72 d6 2a eb f1 a5 ce 1a 6e fe 9b 76 4a e6 | c8 9d 68 cf 67 24 b2 a5 b6 c1 96 48 84 37 b3 8b | f1 39 9c c4 10 9d db 1a 8e 7f b3 36 f3 a8 eb bd | 2b 28 0c da ff 40 e9 6b c2 33 b1 41 cc 82 3c 97 | 2f 0e a7 48 25 26 c1 d7 53 0e 21 ee 94 d4 a0 38 | 49 e2 15 f5 13 68 e2 8a cb ba 80 6b ce a6 00 d2 | 69 7e 9f 04 65 f3 ae 81 71 49 2a 5f 8f ee 09 49 | e3 ff 1b cd 41 64 ae 29 01 91 5e 32 c3 26 78 8f | ea 20 2b 0f 18 2d 0a 1f 22 af 98 ef 92 ff 6a 84 | 62 82 19 1c 56 bf 8b 8e 12 15 12 c1 19 da 4c cd | 49 b3 95 88 b6 66 33 d3 36 cf f2 bd 45 7d 72 a1 | 21 21 16 69 39 89 66 de 9b 3d 56 7f ea f5 ce 47 | 7a 2e 75 2e cf 9b 6b 32 55 e0 ae 5b c0 56 2e 7e | b8 fa 3a ca aa 83 6d 0a b9 cf d2 e5 75 34 ef 7c | fd ec 25 52 b8 3d 7b b9 f7 15 a6 0a 76 51 86 5e | 29 00 00 24 9b c1 28 9f 3d 89 a9 b6 3e c7 19 65 | 88 8e 41 03 11 21 a9 0f 26 57 6b e7 b4 25 21 32 | 2d ba 55 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f d1 0c 18 0e bf a2 52 1e 5c d3 e7 | df 48 7e 58 7f 45 57 fd 00 00 00 1c 00 00 40 05 | c9 7e 47 3a 28 a9 19 bc aa dc fd 65 a2 d8 10 d7 | 15 14 41 45 | libevent_free: release ptr-libevent@0x7fb36401a420 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354012bf0 | #502 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 84 03 55 33 41 14 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #502 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #502 | rejected packet: | 49 84 03 55 33 41 14 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #502: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.039 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd40 | handling event EVENT_RETRANSMIT for parent state #312 | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #312 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #312 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49701.734852; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007777 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354012bf0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #312 | libevent_malloc: new ptr-libevent@0x7fb36401a420 size 128 "road-eastnet-nonat-60" #312: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #312) | 89 42 ee d6 ed 2c a4 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b9 05 0b 71 54 f5 39 16 26 4c a4 39 04 60 1d 97 | 32 ea c2 30 7f b7 8f 8f 4c 46 3c 6f 52 78 aa c1 | fe e4 77 56 f7 3d d3 8d a6 3a 6f c0 2f fe 6d 02 | eb 98 53 91 b0 a7 62 d0 2e 39 52 a2 2d 9f c5 cb | d2 4b 17 0a 6d 76 74 95 b8 fd f2 4d e7 0c cf 15 | 80 f8 47 f1 16 09 01 ed b3 3a 4f 5c d5 5d 3f 6b | 2f e7 b7 4c e0 6d 6e 67 ff dd 71 47 c8 a4 15 9f | 96 98 1b 13 12 cd c9 a7 cd 82 0e 52 4d 94 b9 96 | db fe 30 4f c9 88 5e 66 97 62 f6 22 94 b7 f8 62 | 1f 97 fa 33 08 02 4b f8 35 6a 66 b6 ae 14 f2 38 | 8b d8 d1 fe 0f da d0 63 b9 64 d3 f1 12 68 13 10 | 0c 76 c3 e9 8c 5d 20 14 45 21 bc 02 62 c8 67 36 | a7 1a 3b 3f d4 a6 2b 0f 1f 20 68 bf 3f f3 da ac | 9d d4 0b a5 4f 9d 4e ee 5d 8a c9 7f a6 63 bd 37 | e4 30 f8 16 a7 79 23 99 5e 45 08 d2 1b c1 59 79 | b3 06 e4 a7 4d 24 33 20 1d ab d6 f6 ee 90 2f 69 | 29 00 00 24 c3 f8 28 4c 1a 7b 0f cd eb 3b df c6 | 33 a5 52 0e 9f e3 e0 c7 7b e0 4f ee 68 74 73 39 | ce 71 25 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 69 21 0b 86 be 66 6f de 2b 5e fc | 58 12 49 3c b2 b4 50 5a 00 00 00 1c 00 00 40 05 | 50 02 4b 6b 30 95 cf bb e1 65 ad fe fd e1 44 d3 | d9 2c f8 74 | libevent_free: release ptr-libevent@0x7fb364014bc0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd40 | #312 spent 0.171 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 89 42 ee d6 ed 2c a4 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #312 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #312 | rejected packet: | 89 42 ee d6 ed 2c a4 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-60" #312: ERROR: asynchronous network error report on eth0 (192.1.3.60:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0741 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #503 | start processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #503 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #503 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49701.785213; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.006037 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd40 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #503 | libevent_malloc: new ptr-libevent@0x7fb364014bc0 size 128 "road-eastnet-nonat-251" #503: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #503) | de 1d 8d 29 e2 13 e9 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 bc c5 bc ee 45 af a6 73 6a 90 e4 26 1b 45 74 | 00 ed f2 a3 ec 74 88 4b c9 51 b5 6a 38 9f 0a f7 | 89 96 66 a1 cb 3b 36 71 3c 50 00 7f a8 a1 27 84 | 14 72 85 f0 e9 87 92 95 57 d6 bb a3 9e eb a3 89 | 3b d6 9d 72 8e 22 b1 43 7b 48 2b 91 a9 6c a2 71 | 4e b7 05 32 94 32 e3 1e 78 6c 29 24 39 3f 29 25 | a5 fc 7d 8a 16 8c 7f 3c 9e 88 a1 a2 0f e7 3d e7 | a6 2a 71 17 3f ba 2d 1e 73 4a af 59 81 2a 33 e7 | 7c 6b a5 a6 c7 0d 60 09 fe 4a 3a c4 ae f0 db 28 | 63 c7 99 7d c2 1a 2a f5 ca 34 59 14 08 64 3e 0e | 9e 8a 9a 95 bb 9d 48 ef fa 38 ec e3 2c 15 34 9c | e9 d6 59 e6 ff 43 a4 b1 2b ff 91 b3 04 3b c1 be | 1e 15 0a dc 58 8d 95 f6 06 1e 22 79 23 6e 88 9c | fb 5f 8d 89 36 69 ab a3 c4 17 6b e8 27 27 43 a0 | 64 a3 07 0b 2b f0 22 81 09 20 24 c8 81 c7 b3 70 | 64 46 cf dc 25 f9 42 3b 6e b0 ff 34 aa 9a 20 98 | 29 00 00 24 e0 7e ea 52 c4 af 5e ed 64 d4 0d e7 | b4 32 8f da 7f e4 cd 7f 6e 0d 4f bd 11 1c 8f fe | 10 1a 14 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 eb 39 3d 04 da 34 34 c4 55 20 7b | 97 62 11 e4 f5 1f 2c 3d 00 00 00 1c 00 00 40 05 | 56 4f 2a b1 95 be 94 04 9d 7b d6 c2 f3 45 b1 7e | d7 05 c2 82 | libevent_free: release ptr-libevent@0x7fb33803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #503 spent 0.098 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 1d 8d 29 e2 13 e9 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #503 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #503 | rejected packet: | de 1d 8d 29 e2 13 e9 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #503: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0415 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_RETRANSMIT for parent state #313 | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #313 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #313 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49701.790489; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005126 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #313 | libevent_malloc: new ptr-libevent@0x7fb33803b0b0 size 128 "road-eastnet-nonat-61" #313: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #313) | 5f e0 5b 3a aa b2 0d 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 72 14 0f 17 54 5f cc c5 98 fb 35 26 a3 92 e2 | 11 a3 ad ea c4 71 33 c5 3b 09 0d 86 8a ef c9 16 | 41 6e 6e 33 c5 10 cc f1 5e 47 e9 ca 13 f8 ee 4f | 37 f9 0e ac 70 04 12 68 e2 ae b0 7b dd cb cb ab | d1 0b 9f 48 8f e3 3e b7 e3 65 ca 3d b0 79 98 5c | d4 18 e2 6e 8f 62 4a 4d 34 e2 ac f2 57 5e 56 f3 | 96 24 71 ed eb 39 5a 9f 4d 0a 51 e3 f2 80 2e 9c | c7 e3 0a d7 46 cd 62 d8 70 57 a4 15 e0 2e 57 82 | 00 9c 85 fc cc fb ec 67 7d 2f f7 de 8d 85 b7 9a | ae 6a 14 45 c8 4f c3 df 8d 60 30 87 57 0e a1 b0 | 8b bf f6 18 27 37 f1 3e 81 c1 ec 19 9b f6 db 06 | 57 00 87 5d ef 1f e5 81 9a 44 f2 c0 14 62 b9 b1 | a3 5a 63 7e 11 93 6f 2a 71 ae af 90 3a 04 4e 7a | a3 7a 98 c8 8a bb b2 5a a5 8c d5 d7 51 2b fa cf | d5 ea ac 65 e9 8c f9 24 80 81 e7 38 45 fd 2e f5 | 33 21 e2 b5 ea 65 8b be be 31 9f 87 b8 9f 6c 5b | 29 00 00 24 50 24 81 a9 b8 a1 9e c5 6d 65 2e b2 | 7c 32 12 aa 77 af 34 a7 17 a7 54 1f 7b 13 4b 11 | 43 e0 57 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5e d7 79 da 83 ae 02 6d 20 64 f0 64 | 33 fe 2f 85 1b 7e 43 e4 00 00 00 1c 00 00 40 05 | bb f1 5c c9 25 91 06 ec a8 bd 6e 4b ab 50 48 3a | 1c ac 06 f7 | libevent_free: release ptr-libevent@0x7fb364035750 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | #313 spent 0.0882 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5f e0 5b 3a aa b2 0d 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #313 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #313 | rejected packet: | 5f e0 5b 3a aa b2 0d 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #313: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0396 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46950 | handling event EVENT_RETRANSMIT for parent state #314 | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #314 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #314 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49701.858797; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006002 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a01150 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #314 | libevent_malloc: new ptr-libevent@0x7fb364035750 size 128 "road-eastnet-nonat-62" #314: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #314) | fd 31 72 f9 64 d3 9c f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 18 14 ac 93 72 6f f5 79 79 36 2d 8e 4c 14 ac | ea 91 ec 03 06 fb 84 ad 5e 18 85 94 4b b8 8e ee | d9 14 0b 8c 64 c8 45 95 1b 91 75 07 f8 e4 ec 03 | 59 35 93 6c 10 48 ab 6b e6 53 29 72 ab ff 3c 2a | 61 16 cb b8 bd 31 a5 f8 2f 5d 57 58 e1 26 7c 2e | d9 c7 b7 a4 21 ac 7f a4 9a 22 28 50 e4 1d c5 8c | 89 bc f7 70 40 e3 4f 71 2a 2a 2e b1 a7 96 2a 7a | 82 34 1a e1 0e c4 48 55 41 7f 5a 8b 68 d2 fd 14 | f7 10 c0 e4 c1 ac fb 5d c6 f8 34 c9 0a 71 0c 1d | 4f 2b 4a ae bd 22 c4 9a db 63 e4 0a ff 3d 5a f9 | dc 19 2e 9a 16 8d df 98 1f 04 7e 59 57 62 0a e6 | b9 93 59 94 b4 3b eb 70 b1 7b 76 4b 9a 71 ee 97 | f5 ac 50 38 4c 04 22 68 a2 68 e3 f1 1d 13 3a e1 | 84 4b 7c 08 19 fb 96 e3 58 71 59 95 c0 bd 55 f5 | 0d 72 3b 29 f3 ae 58 91 30 ad de 16 a2 e3 03 a0 | 02 e9 38 39 b8 a1 6a 55 c4 1d 22 81 8d d1 2c eb | 29 00 00 24 83 8f 4c 82 0e ff 5a 2c de 21 68 5e | 60 c0 57 92 a6 09 5b 7e 12 e1 2a 75 9d 50 83 dd | e3 d1 6f 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 7f 92 43 99 76 22 ce 79 dc 92 3a | aa fb 36 5e 79 bf 23 b0 00 00 00 1c 00 00 40 05 | e5 74 71 ef f2 a4 7e f6 0b b1 36 a7 2f ae f3 30 | ad 50 42 06 | libevent_free: release ptr-libevent@0x7fb3580180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46950 | #314 spent 0.176 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 31 72 f9 64 d3 9c f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #314 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #314 | rejected packet: | fd 31 72 f9 64 d3 9c f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #314: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0815 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3400296b0 | handling event EVENT_RETRANSMIT for parent state #504 | start processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #504 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #504 keying attempt 2 of 0; retransmit 6 | retransmits: current time 49701.920156; retransmit count 5 exceeds limit? NO; deltatime 16 exceeds limit? NO; monotime 16.00757 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46950 | inserting event EVENT_RETRANSMIT, timeout in 16 seconds for #504 | libevent_malloc: new ptr-libevent@0x7fb3580180b0 size 128 "road-eastnet-nonat-252" #504: STATE_PARENT_I1: retransmission; will wait 16 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #504) | da 55 48 8d 90 bf 21 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ac 2a 4d 0b 8b cf db e8 71 42 c9 12 73 26 89 36 | f8 7e cd c8 1c 11 8c 7f 9e 09 ce 55 92 dd 78 d1 | ad 59 d2 ee 94 4b 61 50 a3 e8 9a 12 3c 5e 9b 79 | 67 a9 ab b1 17 c4 72 5d 57 f0 6b d6 9d c6 6d f9 | 38 2a f7 f8 e2 f3 15 e5 73 fa 8b 4d 1c fc cc ab | b7 f0 3b 90 c7 95 ba 20 f3 82 29 0e d5 86 2e 2f | d3 3d 1a 6e 6e 68 d3 8e 2c 1e 30 d3 3d 1a 4b 7f | 07 51 04 a3 cd e1 e4 f3 6b 81 ac 0e 5e 25 fc a6 | 2d 49 a3 1d 9d 7f 10 1c b8 aa 6d 0b 48 63 e7 ab | 47 28 bd cd 66 43 28 3d 25 f6 20 56 e0 bb 73 1a | f5 3a ee c2 95 1c 1f 57 8f 41 e9 d9 d4 e4 b4 be | f5 98 c0 78 1e 91 5d ba 02 2c 3a cf 04 e6 44 c6 | a4 f1 83 88 9a 45 b6 e7 89 2b 45 be 54 48 e8 52 | 9b 95 05 7a d4 dd af 6d 96 db 42 ed db 5d 0c bc | 83 61 0a c3 fd 33 2c bd cf 88 1b 95 c9 43 7a fa | 73 7b 7d 2e f9 6a 53 94 78 2b 4f 21 f2 f3 1d f2 | 29 00 00 24 61 bd 30 86 3d bb 50 44 5f 1b 26 2e | 52 63 1b fa b0 23 2c cb bf bc 70 41 cc 6b 00 dd | 9d aa 60 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd b5 bb a3 b0 15 ca 04 17 91 f9 55 | 5a 59 4c 3b fd 4e 4a c4 00 00 00 1c 00 00 40 05 | 47 4d 62 c8 1d 9c 5d 27 1b 5d ed df fb db c8 62 | de eb 87 79 | libevent_free: release ptr-libevent@0x7fb340039ba0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3400296b0 | #504 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 55 48 8d 90 bf 21 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #504 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #504 | rejected packet: | da 55 48 8d 90 bf 21 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #504: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0416 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37802a910 | handling event EVENT_RETRANSMIT for parent state #315 | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #315 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #315 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49701.925436; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005258 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3400296b0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #315 | libevent_malloc: new ptr-libevent@0x7fb340039ba0 size 128 "road-eastnet-nonat-63" #315: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #315) | 44 ed db 2c fe 0c f2 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e 87 b1 78 dc 97 f3 7a 79 3b d6 3e 86 ea b2 fa | 5d 34 e2 db 78 24 8f 15 59 97 e5 e6 f6 90 b1 aa | 59 98 1b 57 96 2d 7a a6 68 c9 eb 8b 7d f6 64 68 | a2 48 77 fc cb 5d 8f 0e b2 52 9b 77 09 f1 21 ba | 81 62 c1 7e 82 df 5b 48 60 ba f6 08 04 c2 77 74 | 9c c8 6b 41 93 1d 14 39 f9 1e b0 b2 5b 1d 3c e0 | ca f1 1f 63 24 c8 cc 04 a5 c5 8f 7d 86 30 95 90 | fb a8 83 29 7a f1 ce 8e 64 9a 9f 82 39 eb 4b a4 | b2 6f ce 0a 5b bd e7 1a af 9d af 92 27 aa 66 57 | 8e 91 52 b5 d0 96 33 ee eb 0f 07 5f 2f 56 77 d0 | 9a 1f cb 0e 53 2f d5 4e b4 5b a5 9c 4c 15 af e1 | 28 86 0f 89 11 d9 bc 73 6b a7 3c 58 a9 04 2c eb | f2 53 51 79 62 f5 50 bf 5f 75 e1 7f 28 95 f0 09 | 87 f1 d9 ee 26 2c 8a ee 7d 84 2e 04 f2 6c 42 e0 | 67 e8 19 47 db 94 b6 12 29 d7 1d dc 8f 61 2d e0 | 53 f7 53 7d 18 19 05 ed 93 cb 84 d8 40 1b 1d fe | 29 00 00 24 5f cd cc 5e 9b b5 1f f6 2d c3 6f 0d | 70 ea 63 15 bc b8 5b 49 76 c9 be 04 9e 55 ff 0b | 33 d9 e0 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 47 2c d3 1b 13 1c a2 69 95 f2 01 8c | cb 3c f6 d6 71 d0 e6 be 00 00 00 1c 00 00 40 05 | b1 bd 1a 4e 17 0a c1 3c 72 20 f5 8a 28 12 f4 7a | a3 f8 1e e7 | libevent_free: release ptr-libevent@0x7fb378044ad0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37802a910 | #315 spent 0.0869 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 44 ed db 2c fe 0c f2 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #315 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #315 | rejected packet: | 44 ed db 2c fe 0c f2 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-63" #315: ERROR: asynchronous network error report on eth0 (192.1.3.63:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0399 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a72150 | handling event EVENT_RETRANSMIT for parent state #316 | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #316 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #316 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49701.986714; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007793 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a910 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #316 | libevent_malloc: new ptr-libevent@0x7fb378044ad0 size 128 "road-eastnet-nonat-64" #316: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #316) | e8 62 07 3d 83 c9 27 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db 67 27 d8 ca da 21 fc 33 ba 4f 94 10 8a c5 3e | 5d c6 ca e9 be 5f 5b 62 d9 f8 5f ef cd 1d 75 de | 4e 46 e5 c8 47 0c 64 48 a0 a0 be ad 1a 88 be 29 | 21 51 4f e4 bd 33 bd be 35 5e 1a f3 c6 5c 72 cc | 14 4f 34 ba 69 93 e8 bf 07 ec 5c 62 f6 72 9d af | 95 ca 7c 71 3b 37 93 92 3a 98 4e 7a 53 2f 9a a8 | 2a b6 32 33 20 cf eb 65 6b e0 73 23 52 d2 61 14 | 64 77 57 5a e0 a6 ac 4c 66 6c 73 74 1e 30 64 d8 | 26 eb 6f 24 f1 a2 d0 b2 6b 58 a7 b2 54 48 ba 72 | 09 ae 65 3c 30 0d df 54 4e 6a 33 e2 26 65 76 99 | ea 2e 2a 30 fa a7 4c 97 4d 74 ba 19 a6 b3 7b 01 | 82 88 fa e7 6a 85 ab 68 48 39 a4 91 e9 e4 44 02 | 10 7a c6 c8 2e 47 03 39 25 a6 92 8c e5 51 eb 52 | f8 c7 61 20 39 65 61 dc 27 00 53 74 46 c8 5c be | 3b 90 c1 02 b8 be b2 17 6b a3 86 6f 65 fa c8 19 | e6 54 1a 74 80 e0 70 41 21 d7 44 54 50 0b cd 29 | 29 00 00 24 89 45 06 65 65 b3 8c d6 0c df 20 90 | 5a e6 b0 5e f6 87 85 10 8d 96 3d 5e 67 1f 54 38 | 77 de f5 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 e4 d3 0f a4 c8 a7 ec 05 e8 fa d2 | 6d 31 a1 ad f7 6f 67 3e 00 00 00 1c 00 00 40 05 | 0a a4 aa 05 10 e6 c7 c4 a5 a6 8e 98 2e fc 0d 29 | 7c 74 b9 43 | libevent_free: release ptr-libevent@0x7fb388027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a72150 | #316 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 62 07 3d 83 c9 27 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #316 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #316 | rejected packet: | e8 62 07 3d 83 c9 27 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 40 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-64" #316: ERROR: asynchronous network error report on eth0 (192.1.3.64:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35801d710 | handling event EVENT_RETRANSMIT for parent state #317 | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #317 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #317 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49702.056115; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00623 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a72150 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #317 | libevent_malloc: new ptr-libevent@0x7fb388027c10 size 128 "road-eastnet-nonat-65" #317: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #317) | 5c a2 6c e8 b2 28 e0 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc 95 b1 4b f7 b4 a2 f3 b1 63 69 55 e2 98 fb 3f | 54 1a 28 48 de 85 37 f8 72 76 27 96 2b db 5e 33 | be af 42 49 c9 29 81 c9 57 56 f4 f8 82 3d a6 af | 88 eb 0d 9f f2 82 74 6e 72 69 04 07 19 3d d2 37 | 11 a5 22 ff d2 62 d9 98 57 a1 83 a7 1e 49 51 44 | e5 97 9b 8d 73 a0 96 d3 53 9b fb 45 84 94 f7 3d | 76 31 fc 24 62 7d a9 38 2a be 46 8d 20 60 df db | 07 4b 68 3b f4 5c 0f 39 ef 4f 67 78 1a 41 5e d9 | 21 46 6b 9d 25 f7 b9 97 47 6b 61 67 28 72 bc ab | 6f b2 d8 94 3c 23 68 03 63 f9 fd 48 53 49 f9 59 | 58 72 d8 2c 34 ca e6 db de 5e 25 73 b8 b7 64 58 | c2 d1 ad 6f 0e ca 13 2e b2 5c 80 d7 ba 3d 3c a9 | 3d f9 8e 60 bf 1b 92 40 5e 5c 05 7e ba c9 a8 db | 73 77 de d1 63 54 7f e1 7b 4e 7b ea 38 36 f5 df | ad 83 e3 b0 ba 8d 91 72 ad 79 42 21 5b 3d 90 52 | 8f 94 65 66 3d 81 71 1c 3b 5e 4d 22 19 2e a8 97 | 29 00 00 24 16 ec e2 f4 0d c3 b4 c6 88 17 fa c1 | 57 1b 6f 8e 72 cf d0 88 9c 45 18 d1 76 a6 22 b7 | e9 88 2c 7a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d4 7d b4 14 23 b3 6a c1 75 92 cb 9c | f1 ae 10 a4 55 81 67 0f 00 00 00 1c 00 00 40 05 | d3 a6 c6 52 7d d4 a1 eb 3d cd 3f 6c 65 3f cc dd | 6f e3 2d 43 | libevent_free: release ptr-libevent@0x7fb35803a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35801d710 | #317 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c a2 6c e8 b2 28 e0 f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #317 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #317 | rejected packet: | 5c a2 6c e8 b2 28 e0 f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 41 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-65" #317: ERROR: asynchronous network error report on eth0 (192.1.3.65:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0457 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #318 | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #318 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #318 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49702.114412; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006599 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35801d710 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #318 | libevent_malloc: new ptr-libevent@0x7fb35803a770 size 128 "road-eastnet-nonat-66" #318: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #318) | b2 9a b8 bc 53 a3 28 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 a5 e6 b7 f3 09 b3 42 4d 70 2a 31 41 4a a2 a1 | da f8 c5 36 7a f2 dc 2d e7 30 c8 c3 07 0a c2 47 | 04 c4 b8 ae 57 b2 7f d1 c1 3e 18 53 e1 5d 14 23 | 04 61 06 e4 91 ef 35 cb ed 7a b9 57 a4 d9 68 76 | fa fd da 0f 58 44 d0 fa 3e 4e 2b ac ca 5d a5 c8 | 76 05 a5 5d 02 6a 96 c6 41 4e 3f 64 57 cd 41 d5 | d0 97 ad ff 58 6a 53 9a 01 1f 6b 3c 24 fe 31 ac | 0d 3c 93 ac 2c da 29 01 1d c2 dd be c2 11 80 ff | b5 b8 9d 4b 81 9c 72 55 6a 84 69 3f d0 ed e9 0c | 2b e3 ca 41 a3 62 7c a2 71 2a 37 58 65 17 c1 53 | cd 34 43 97 e4 05 81 70 70 41 b7 fe ed 43 15 27 | b6 ca b7 9c 9b 05 11 e5 9d 9d 78 a9 d5 63 3e b9 | 63 ef dc 73 f8 b5 32 8d f5 20 3c b0 29 8a 0d 0c | 3e 9f 40 29 07 45 7e 5f 6e e1 39 0d cb 64 2d c9 | 21 f3 18 88 11 a7 78 9d e5 c3 5e 82 9b 66 98 d0 | bb 21 5b 84 f3 89 c9 aa 9f 01 2e d6 67 59 8b 4c | 29 00 00 24 ef 94 98 d7 0c cd d4 f9 7f 97 bf da | 65 7b fd be ba 01 e1 85 cc 2b 5d 20 cf d0 d6 ef | 60 90 51 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 61 27 ec f1 41 a3 45 56 13 d5 ea | 91 6f ea fa 23 e5 f5 e5 00 00 00 1c 00 00 40 05 | d1 cc 61 18 e0 64 68 30 f0 cc 90 9d 95 49 27 67 | 23 d5 d1 7a | libevent_free: release ptr-libevent@0x7fb36403f0c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | #318 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 9a b8 bc 53 a3 28 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #318 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #318 | rejected packet: | b2 9a b8 bc 53 a3 28 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #318: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0492 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c012bf0 | handling event EVENT_RETRANSMIT for parent state #319 | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #319 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #319 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49702.175826; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006348 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #319 | libevent_malloc: new ptr-libevent@0x7fb36403f0c0 size 128 "road-eastnet-nonat-67" #319: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #319) | 11 2f c2 e2 55 80 ad fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 29 97 2b 00 80 7a b2 ce 19 1b 94 79 57 61 71 | b5 31 67 66 2a f4 c8 dd 15 9f e0 ad 50 a1 3c 77 | 34 62 bd 4c c6 67 73 04 6a 47 e6 12 64 23 d5 1b | 98 65 2d 83 00 df 2d e7 e4 d4 74 c8 bc 36 30 29 | 44 5a 01 b4 02 e1 00 0f 8d ad 81 f9 8e 46 de 85 | 06 c3 07 15 fc b6 b0 15 06 43 f6 0e a8 fd 09 ef | d8 40 6e 21 d5 b3 5d 25 10 a6 87 71 c1 c1 fe d8 | bf 80 48 df 26 2b e7 63 6d 12 1e cf 0b 06 eb b0 | 7e 3e d5 d0 6b 21 8d aa 41 e8 f8 30 37 35 ac fc | 15 96 69 e5 f5 b2 90 e3 4e fe 2d ad 13 5f a0 e8 | 1c c7 69 35 1d b3 4c 80 f6 b9 3c 2d 05 13 72 b5 | 7e a3 0f 53 4b 80 32 e8 c3 5e b7 f7 2e ae 6c 5b | 24 7a c5 8a 0a 7f 55 0a 11 24 c0 ef fe 17 1d 30 | 05 8e ac 66 5c 3e f2 80 08 7e 41 35 dd 7a 17 b5 | ec 43 f0 d8 c9 61 5b 46 04 99 f3 93 60 24 02 4a | 51 18 18 5f 6c cb 3e f9 d1 40 eb 27 ba 67 3b b9 | 29 00 00 24 b8 88 60 8f 24 78 87 d6 7e a3 09 04 | de 05 ae 45 4d b7 3b ca 2f 96 5c 9a fa 13 da 85 | a2 c0 a1 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 04 44 46 25 45 86 78 cb ac b2 11 | 55 71 47 06 ea 13 d1 6f 00 00 00 1c 00 00 40 05 | 2f 9a c9 00 f1 11 a0 f7 d7 69 9d e9 ea e6 fc 70 | 38 db 7b 3a | libevent_free: release ptr-libevent@0x7fb37804b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | #319 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 2f c2 e2 55 80 ad fc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #319 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #319 | rejected packet: | 11 2f c2 e2 55 80 ad fc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 43 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-67" #319: ERROR: asynchronous network error report on eth0 (192.1.3.67:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0476 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384043260 | handling event EVENT_RETRANSMIT for parent state #320 | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #320 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #320 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49702.273359; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007579 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #320 | libevent_malloc: new ptr-libevent@0x7fb37804b7c0 size 128 "road-eastnet-nonat-68" #320: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #320) | af c7 ee c1 89 d6 03 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 21 a8 bd a9 e5 4d 48 c1 fb 45 8d 11 bf a7 3a cc | c9 47 84 c7 e3 5d ec 21 4e d8 5a af 98 89 03 e4 | 61 3a ba 3d 60 86 ef 6f 17 de fb a4 db d7 d8 bb | dd a1 22 38 5e f6 ed 84 ef 59 30 63 60 c1 46 9c | 68 55 6e 9a 1e c0 57 7e 80 7e b6 a3 a2 d8 44 32 | cf 08 62 90 01 f4 f2 5f ed 1f e9 b3 6d aa b3 b5 | 51 0c 08 36 0d 22 74 67 a6 8c ed a0 79 50 51 2d | 0e 2f 3b 92 1e b3 eb 2d 06 7f 88 16 e6 58 28 17 | 60 5d c5 e1 99 65 2e 54 d8 fa ea 82 20 22 7c ff | b3 f5 72 25 7c 83 b1 cd 19 3e 2b da bc a9 3d dd | 76 aa 4a e2 d6 6a 5a 1c c6 a7 82 72 c8 70 00 2c | 36 b2 a4 f0 ac d5 1d 56 89 f2 8b 82 16 da 4e a9 | 45 8b f2 f1 83 02 06 ed 82 d4 33 ad 52 79 3a 05 | a1 a9 14 4d f9 86 6b dc 84 e1 88 2a d3 ae c1 8c | 43 6f 17 24 1b 1e 6c e9 e7 e2 8e 7a 04 41 d1 b0 | a9 68 50 65 7f 85 77 b4 91 10 c3 80 9a 3e 62 10 | 29 00 00 24 2e 21 9d f9 af ba 04 f5 8f 3b a6 14 | 4e db f7 72 ee 4f db 92 91 3b 76 55 23 0e 1b ed | b4 de fd 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 21 4b df 59 d9 64 c3 0f dc d7 26 | ba 28 50 c6 3e 72 d7 ec 00 00 00 1c 00 00 40 05 | d3 cb a5 46 ac a7 4b 5d c8 de d7 e5 bf c8 e6 16 | 1f 0a fc 46 | libevent_free: release ptr-libevent@0x7fb384031e80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384043260 | #320 spent 0.478 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af c7 ee c1 89 d6 03 e4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #320 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #320 | rejected packet: | af c7 ee c1 89 d6 03 e4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #320: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.214 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd80 | handling event EVENT_RETRANSMIT for parent state #321 | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #321 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #321 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49702.333233; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007591 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384043260 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #321 | libevent_malloc: new ptr-libevent@0x7fb384031e80 size 128 "road-eastnet-nonat-69" #321: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #321) | 30 42 c0 64 91 b3 77 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 8b 42 a5 47 61 3e b2 88 66 b3 90 63 22 69 df | e5 f0 68 6a 3f ab 70 bf d6 bc a2 6d 32 d6 bf 56 | 13 cd ae 31 91 9e 97 07 b1 e6 67 da 49 fc 52 44 | f0 97 00 89 4b 4a 7b 7e 72 67 33 77 ed ad d5 60 | 7c 94 7a 09 a1 fe 2b 97 f4 03 f7 65 c2 4f 92 50 | 59 77 e9 77 52 e2 ba 0e f1 c5 36 f7 3f 04 ca 02 | 29 37 fe 9d b2 ee 90 bb 59 f2 25 82 19 bd 15 09 | 7c 21 90 62 70 4c 2f 35 e2 fa b0 32 14 28 ef f3 | f9 26 2a aa 23 e5 00 f2 ed fa 00 25 b3 8d 3e f4 | 4c e5 68 7e bb cf a5 93 21 96 34 22 9d cb 8e c0 | 2d 43 58 e0 8a b9 3b 2b d8 e6 50 0b 36 e9 8a 0b | 9a 7c fa 82 ee ac d3 9d dc ac fe e5 26 e8 d7 a8 | 41 71 b3 21 7a 08 ae 35 2b 19 02 a1 3c d8 d8 79 | 7f 1b 50 2d 1e 74 84 a4 f5 80 19 40 cb b4 59 fe | e2 eb 79 b4 b1 1d a9 7a b4 6e 10 85 42 85 5d e9 | 58 9c 43 c5 54 ce c4 20 7b 73 38 bf 59 44 4d 18 | 29 00 00 24 bf 17 ca 5e f8 c4 94 b8 0b 16 3e 38 | 6b 43 cf 92 04 d6 aa ac 11 4c 2e 2c d1 a0 dc 92 | 64 9e 7b 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 bc 1a f8 41 15 d9 99 65 b2 c4 f3 | df 03 a0 00 26 60 50 c2 00 00 00 1c 00 00 40 05 | fc 37 e7 42 82 1f 76 13 ad 5a b7 fc e2 af d4 9f | 15 d4 13 5b | libevent_free: release ptr-libevent@0x7fb37c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd80 | #321 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 42 c0 64 91 b3 77 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #321 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #321 | rejected packet: | 30 42 c0 64 91 b3 77 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #321: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.053 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25c80 | handling event EVENT_RETRANSMIT for parent state #322 | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #322 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #322 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49702.397547; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006833 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #322 | libevent_malloc: new ptr-libevent@0x7fb37c04b7c0 size 128 "road-eastnet-nonat-70" #322: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #322) | 74 03 a5 dd ea 05 2e d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 15 d9 ac 31 7b 6c 04 ac 7a ef e5 0d 89 93 07 | 20 e4 8e 39 86 a0 9c 1e 9f 76 b9 58 4d f2 a7 9f | a9 61 82 a9 75 3f e8 1a c2 92 fe 84 37 ac 33 ad | 65 45 df 2b e1 cb 2c 07 be 4f c4 59 89 1a 1e d4 | bc 00 c9 7a da 51 f8 0e 6d e5 9b 4d 2b 1e 90 8c | a7 76 dd 60 8a 02 12 aa 75 a5 70 c1 65 7c 3e 55 | 89 46 b2 4f 06 dd f5 63 86 b7 00 f0 73 2f 7c 5a | b7 d4 0f 38 d5 4f 7a 42 58 2c 1c 6e 8d df 4f 92 | 63 c6 3f de f4 10 95 80 0d 14 e0 40 1c 6b a7 25 | 78 25 a5 d6 97 e1 6b 90 22 06 bd 2b cc f5 6b ca | 10 6b ac a7 98 1a 94 fa 4c cf 33 fe dc 06 fd b0 | 5f 81 4e 82 91 b8 3e 8a c7 a6 68 81 06 ac 84 f0 | ea 68 69 9c ad 3a 07 bc c5 f3 31 91 30 05 f3 ef | dc 51 d5 f6 ee f9 4a 07 b7 9e 0f 65 ad 3f 41 a0 | d7 70 67 24 31 3b 11 1f 99 26 08 ab a5 8d 87 97 | f5 4d 04 da a2 fb f0 9d b6 5e ca 79 ac fb e6 b9 | 29 00 00 24 7c d4 e7 e5 83 a9 e9 e5 4c 1d 37 7f | 04 0f 2a 2b 54 28 64 c4 b2 05 be 1f 1d 68 a9 5e | 6e 76 88 d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 64 8d 0f b4 d2 3e c7 db eb 6e 9c | 80 67 1d 17 67 fa eb 16 00 00 00 1c 00 00 40 05 | 45 ce 15 93 8c ec f9 76 43 65 cd e9 a3 d1 ec 83 | 45 3c 35 9c | libevent_free: release ptr-libevent@0x7fb344035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c80 | #322 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 03 a5 dd ea 05 2e d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #322 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #322 | rejected packet: | 74 03 a5 dd ea 05 2e d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #322: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0676 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a986c0 | handling event EVENT_RETRANSMIT for parent state #323 | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #323 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #323 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49702.451917; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005983 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #323 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 "road-eastnet-nonat-71" #323: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #323) | fa a0 9f 7c 98 fa b7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 46 00 d1 b1 2f ab 58 ff ae 3e e1 90 df ac 17 | ff f8 20 d8 dc c8 64 44 8b d4 4d 64 77 87 0d 12 | 4f 58 f8 0b b8 23 de 06 cb 6a 5a 17 a1 ce 9c 0e | b9 8f d4 30 b1 62 d8 df cd 4c 66 72 94 9e 12 c2 | 2d 76 67 bf af 09 84 71 96 13 7f 13 e3 92 f9 eb | 91 ae c7 77 a0 91 b1 8b 78 4e 95 7f ad 59 ce f7 | 52 f5 ff c7 0f 12 41 0b 6a 23 2d 80 44 0e 92 7c | 8a 4f 11 47 2b 77 90 68 d7 a1 52 f7 6b 79 db 3f | 94 cd 89 b0 a4 aa 7e 64 52 6b 85 6e 03 da 1f ae | b6 90 2d d1 46 19 b6 66 ea b6 57 b4 c6 78 39 27 | 7f 33 c8 a1 bd 41 e7 ba 08 ef c1 2b 83 3d 1a a5 | d6 cc ec 96 a2 e8 29 ec 44 9c 54 bc 8b 9c d6 9b | cf 36 d1 9f c7 0e 2f 28 11 0b 73 2c 8d e2 76 0d | 66 d9 63 04 c0 20 e3 d1 af b2 68 91 e0 90 8f 15 | 8a 1a f5 c8 e3 0d 24 88 9a 72 7c ad a0 47 9a cf | 87 bf fe bc 41 93 5c 36 c0 33 07 c5 9e ea fb dd | 29 00 00 24 40 e8 32 3c 23 00 84 94 61 80 b2 17 | 1c a2 13 13 eb 56 70 6b 74 c5 2e 36 50 96 1d 9e | 9b cf 84 1b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 d2 f5 ad 3c 92 ba 81 0f fc 09 27 | bf 74 8b d6 da e0 d6 64 00 00 00 1c 00 00 40 05 | e3 ba 50 e3 10 b5 c6 17 22 3f 31 51 2e fe 55 bf | 2d 04 cf 9f | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a986c0 | #323 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fa a0 9f 7c 98 fa b7 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #323 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #323 | rejected packet: | fa a0 9f 7c 98 fa b7 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #323: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0516 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370046090 | handling event EVENT_RETRANSMIT for parent state #324 | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #324 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #324 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49702.519231; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007026 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a986c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #324 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 "road-eastnet-nonat-72" #324: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #324) | c4 71 4c 47 7a 99 7f 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c dc ba bd 1d 04 54 b8 de 2e 7e 4a 73 d1 75 b4 | 30 69 01 66 67 06 e7 5e ab 90 82 b5 8d a8 6f 99 | a6 8e f4 9a 71 40 de b0 d0 8a d9 b4 ed e4 6f 96 | 72 62 19 62 54 5d 4c 3f 06 3d 1e 94 b0 72 25 98 | 59 31 b4 12 f8 20 4c c4 1b 57 a8 cc e5 a4 fd 8e | b7 00 85 d1 0e c7 4d 3b 7a 7d 11 6d 19 fd 6a 75 | 3a e2 10 64 69 82 7f f7 9f 48 c9 57 2f a9 70 57 | 4e 17 87 f1 7b f1 ed 42 6c 69 0f 53 01 4f 76 4d | 49 de 7e 34 19 26 2c 17 55 79 6b 2b e6 70 a9 41 | 28 a8 e5 5c 9c 0b 01 88 ec 60 31 32 12 e0 5e 2a | d0 1f 1c 62 7b 27 a5 6a b5 82 73 7a c7 4d 6d 07 | a2 fe cc 3c f6 be 38 d5 e6 bc c7 f9 e4 e8 c4 66 | 25 de 6a 66 de d9 be 67 52 10 16 32 1e 81 04 70 | 2e 04 43 17 b2 33 75 6a 97 52 34 c2 f0 d7 69 62 | a8 cb 03 e7 cd 81 0c 55 75 a8 24 c4 ed 92 5e ec | 1a d4 65 0c 31 44 9a 04 50 cf 8e 45 48 fa 6a 9c | 29 00 00 24 a2 70 44 54 09 89 66 44 f1 6d a2 85 | b3 a0 4f a8 16 2e 01 ca af 0e 31 e7 7c 41 b8 c9 | 46 c7 99 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 0b 59 de ec 8b 84 8b 41 7c 2d 20 | 10 87 a7 ee 10 a7 dc 2a 00 00 00 1c 00 00 40 05 | 44 04 bc 04 96 6f cb 2b 3d a9 52 fe 2d cc 35 38 | 9a e2 35 2c | libevent_free: release ptr-libevent@0x7fb35402a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370046090 | #324 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 71 4c 47 7a 99 7f 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #324 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #324 | rejected packet: | c4 71 4c 47 7a 99 7f 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 48 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-72" #324: ERROR: asynchronous network error report on eth0 (192.1.3.72:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_RETRANSMIT for parent state #325 | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #325 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #325 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49702.588528; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006121 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370046090 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #325 | libevent_malloc: new ptr-libevent@0x7fb35402a950 size 128 "road-eastnet-nonat-73" #325: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #325) | cc 62 92 c7 07 e9 0f 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 78 1e 62 84 10 5f b3 3f 6a 1c 99 15 ef b2 82 | ab 2f bf af 7d 91 0a 7a 06 0b c3 b0 8f 52 23 e0 | 2a 6c c7 c4 de c8 66 7c 42 9d 81 5e 4d 92 4f 0b | 2b a2 91 3c a6 4c 27 12 5d 3b 8e 56 27 02 38 a0 | d6 c6 eb ec 94 e3 d3 7c 60 71 44 03 de ee 1c 20 | b0 a7 fc d5 f0 33 3d 58 40 9a 40 7c 4b ef 22 f2 | e4 98 7c df 9e 84 f0 00 c2 3a 23 ca 54 c0 d4 32 | 78 ec 09 e7 04 f1 06 b2 16 5d 5c 32 c7 62 b8 41 | 9e c8 62 f4 94 dc ed 85 b6 72 ee e7 73 a0 4e 8f | 20 26 e2 05 be 3a 4e 16 75 b9 60 31 64 9c 09 14 | ad be c7 c8 b5 48 83 aa 5c 33 7b 3c 0a 72 26 74 | 75 7b 8e 60 49 df aa 10 6d 2e c8 c2 08 b3 b5 75 | e0 b2 66 ad ea 56 f8 5f 65 d4 40 09 52 2c f1 dd | 08 91 8c 9a aa bf 76 e2 bf e4 1a 3b 53 96 c1 d8 | e5 63 67 aa b1 58 7e 5f 20 cf 8d 72 df da b4 0e | bf a9 5c cc d8 b0 81 7f 8f b4 f2 bf dd 09 8c 23 | 29 00 00 24 bd d5 db 94 ee 32 26 3b fc 5c d2 c6 | e1 33 da da 8c 36 b9 7d d8 b6 53 e3 83 8c 71 5a | ae 9b 26 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 04 08 e6 80 0c ed de 4c 99 bb 24 | eb 89 b5 9f d3 24 a6 8a 00 00 00 1c 00 00 40 05 | 55 23 78 6b d1 b2 f4 84 29 a3 9f e9 4d 04 41 1c | 82 df 78 f0 | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | #325 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 62 92 c7 07 e9 0f 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #325 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #325 | rejected packet: | cc 62 92 c7 07 e9 0f 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #325: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0578 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344012bf0 | handling event EVENT_RETRANSMIT for parent state #326 | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #326 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #326 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49702.656874; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007071 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #326 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 "road-eastnet-nonat-74" #326: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #326) | 42 f4 17 bf 0b bc 36 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 f1 42 33 74 d0 fe 82 a0 d4 22 fd 7e 34 64 49 | 4d f5 d3 8f 3e 37 b5 af 12 9f 05 ef b3 72 9a 99 | 78 df 2d 2f c1 8c de 77 86 8e 9d 6b 67 d9 af af | ad cd b2 74 66 27 67 e3 45 6f da e1 b8 1d 10 12 | aa 54 5a 52 9a fc e0 30 8f 8b 79 31 12 59 11 92 | 5a a1 07 c2 c4 b1 d0 f4 f9 0f 04 f7 fe f9 b1 b9 | c8 5b 99 45 a3 87 06 f5 cc 08 82 18 bb f1 79 c6 | 9f 6d fc 2f c8 a5 4a bb b2 a8 2f 54 59 10 ab c2 | 83 cd 07 a2 e9 49 2a 19 10 9b b3 c3 b9 59 af 8a | 82 ad ef ed 34 d0 18 f1 8e 6d d9 f9 1b 1e 64 1d | ec 20 a9 3c a9 39 c4 6f 5c 5b 8b c5 2f aa 09 df | 17 b3 bf d7 16 36 cf cd 3e 0b 96 b5 5a 10 91 84 | f4 f3 63 75 93 27 25 04 41 5d c2 9e 4a 8a 6e e8 | b0 1c 23 7f 1d 44 0d 90 e6 7c 9c aa 0e b4 1e 03 | 9a ca 50 45 b0 6c ee 84 fe cf 35 d4 8b f6 71 45 | c0 43 28 23 ec 38 bc a8 e6 b5 85 28 d9 a1 fe 85 | 29 00 00 24 f7 60 f4 89 79 23 81 74 40 fe e0 94 | 99 4a 8a 5f b0 ba 18 0a 74 b7 e9 e4 4c 15 74 6f | 38 fd 32 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 0a 23 00 01 aa ce 92 9c 9e 81 0a | b1 b8 dc a9 c7 b7 f1 4a 00 00 00 1c 00 00 40 05 | 06 aa ce 4d 77 27 34 16 db f8 8e b3 38 da ae 93 | 3f 43 ba fe | libevent_free: release ptr-libevent@0x7fb34401a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344012bf0 | #326 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 42 f4 17 bf 0b bc 36 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #326 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #326 | rejected packet: | 42 f4 17 bf 0b bc 36 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #326: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a70b10 | handling event EVENT_RETRANSMIT for parent state #327 | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #327 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #327 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49702.778164; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007252 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344012bf0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #327 | libevent_malloc: new ptr-libevent@0x7fb34401a4e0 size 128 "road-eastnet-nonat-75" #327: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #327) | cd 66 0f 9c 46 d2 2e 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c e2 6e 06 8e ba 7b 55 21 d6 ce 48 6f 3c 92 70 | 71 57 bb 2e 59 88 d0 8e 2a d9 1e 8b 54 64 af 4b | 40 4b af e2 a4 54 08 ce 78 99 d3 6e a5 bc 7d 40 | 54 45 d2 55 e5 04 88 a7 28 8f 77 11 a3 33 32 44 | c5 c1 f3 8c 73 cd 33 50 64 6e 8a 4a 03 1a e8 56 | 33 98 cb 05 7e 52 cf 35 2c 3c 0a 01 ff ea e2 ad | d8 80 22 71 7e 19 d2 b8 ce 67 79 24 c4 a0 f8 77 | 85 18 5e ad 8e 04 46 41 75 9b 16 af 02 fc dc 64 | 32 2e 9e 96 8f b4 82 0b 80 7e 79 12 22 b3 48 72 | b8 08 60 6b fb b5 54 a6 fa 64 f2 f2 1c f2 68 fd | a8 f7 9c d6 a5 ea 11 63 c4 ae d6 34 f7 8d 1a 64 | d2 72 49 10 16 1e e2 1a 26 c5 f0 ec 34 31 4a 5b | 0b 2e 91 90 5e 8e 26 12 f7 2c b6 7b b5 af 3d cb | 78 d2 30 c7 9f 03 58 c5 3d 03 c3 8e 6e cf 73 42 | 63 93 37 70 63 fa 64 09 ea e3 9b 55 c3 1a f4 3d | f3 be ab 22 fa 6d f3 45 4a 46 ad d5 84 8a f0 a1 | 29 00 00 24 90 b8 80 a5 9c 42 2b 50 2e f5 43 e6 | dc 43 6d 4e b8 ec af ce 7f 78 f5 24 c5 c3 2d 65 | bb f0 87 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc f4 a0 b4 bc 1c 55 2f e9 f9 68 07 | 2a e9 06 2c 8b 87 6b db 00 00 00 1c 00 00 40 05 | f6 e0 64 05 d4 ed 34 7f 04 0a 65 5a 6b 64 eb 2c | 7a ff a7 d3 | libevent_free: release ptr-libevent@0x7fb34c034410 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b10 | #327 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cd 66 0f 9c 46 d2 2e 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #327 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #327 | rejected packet: | cd 66 0f 9c 46 d2 2e 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #327: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0672 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c018210 | handling event EVENT_RETRANSMIT for parent state #328 | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #328 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #328 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49702.844544; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006521 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #328 | libevent_malloc: new ptr-libevent@0x7fb34c034410 size 128 "road-eastnet-nonat-76" #328: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #328) | 3c ba 5b c8 fc 4e e4 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 98 1b 56 d7 72 9f 0b ef 82 c1 96 52 5c 5c 9b | e9 aa b3 20 9c 71 f6 1f 7d 62 5f 32 20 71 40 58 | 1c 09 5f be 66 e2 fb 32 6f 32 7b d3 d9 05 2e a9 | ee af 44 08 4c 92 7f 63 3f 26 57 99 85 eb 91 d7 | b7 5a 96 3e 98 ed 26 ea 09 8f 0f 63 53 5d 1c b3 | c9 fb a7 17 72 50 1c 89 8a 1b ec e3 c6 13 99 f4 | 47 85 27 9f 89 00 ee af f6 42 8e 89 20 65 b0 94 | dc 96 45 50 6a fc 55 91 2d 20 a1 71 bd 13 2b 3d | c9 ca ac 78 35 01 26 cc e0 d8 0f 8b 0a 51 cf db | a4 5f b8 de 1d ef 44 4c 67 d2 41 0a 1a da 75 49 | 8b 5c 8d d5 4f ad 96 01 a7 81 6e 64 71 33 1d 13 | c8 f5 a7 cf 94 c9 e6 53 e2 b0 78 13 10 0b c7 61 | e7 11 09 49 e7 5c 3e 3d 81 8a d4 ca 33 cf 4b a6 | 11 a6 1c 3a 1f 08 75 b7 9e 2d 0e 59 2f 13 2a 60 | 81 d0 25 c3 cb 2c 46 fb 68 09 64 52 0e fa 74 b3 | e7 5b 92 47 85 91 91 a7 8f 24 50 93 20 2b b2 73 | 29 00 00 24 bd 04 20 dd 74 64 b5 d8 5a af c3 c3 | 73 08 e8 87 3d 68 41 83 2a a2 ff d2 47 06 97 0f | ee 80 ed c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f8 b1 65 26 56 ad 9d 5c eb eb 90 | 0c 0f 05 c7 3a 68 b0 36 00 00 00 1c 00 00 40 05 | a1 90 c1 14 1b 7b 06 99 a6 d5 54 52 02 f0 92 56 | c7 13 ca 30 | libevent_free: release ptr-libevent@0x7fb36c039e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c018210 | #328 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c ba 5b c8 fc 4e e4 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #328 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #328 | rejected packet: | 3c ba 5b c8 fc 4e e4 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #328: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab7a80 | handling event EVENT_RETRANSMIT for parent state #329 | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #329 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #329 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49702.903875; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006355 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c018210 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #329 | libevent_malloc: new ptr-libevent@0x7fb36c039e30 size 128 "road-eastnet-nonat-77" #329: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #329) | 19 44 0d 82 d8 18 b5 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 80 85 65 b3 ae 4b 6e fe 68 73 f2 b6 39 5a b1 | 5a f3 36 2e e0 44 7d b5 ef dd dd fc d0 35 5f bf | 0f f1 a8 56 0e fe 65 1a 64 97 d5 45 02 78 56 12 | 1d c5 a8 57 78 41 5d 67 f5 9c ac 0c ea 30 76 9f | d6 40 74 a9 16 ad b3 48 34 1d 1d 07 41 4e 7d ea | b4 15 07 22 a9 ac 8e c3 4d e5 f2 d1 ad d3 62 0d | 93 58 9b 58 67 7c fc 81 97 3b af 10 63 67 d9 86 | 45 ad 4f a6 97 2e 79 bd 48 03 5d 44 76 7f c4 9f | a3 54 a8 c8 d0 75 76 5f 1b 6c d2 e3 cc 1a fb de | f6 a0 df 0a e9 48 0b 88 3f b0 b9 04 79 1c 8b 83 | a2 11 a4 9f 9b f2 2f 13 89 0d e6 68 c7 78 af a5 | 8d 94 dc 9c 72 14 d9 47 8e b6 09 d8 6c bb 15 13 | 54 68 b1 04 b2 79 ae 72 17 9f ff 8d d0 33 2c 7a | b0 3e e8 0e e9 c9 f6 bd 41 a5 9d 71 93 9d e7 49 | fb 61 fa 0d 56 19 d3 32 c0 8d ba 0e 98 71 48 e0 | 2f 1a 52 9f c2 03 77 7a 8d 1e 4b 1c 30 c4 31 91 | 29 00 00 24 ad 58 5c 32 62 e5 13 15 63 fb 95 0f | de a4 7f f4 a1 1f b7 cf 95 c9 7b a8 76 d2 3e a1 | 6c d4 9d 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 38 9e 59 ae 71 c3 ed 6e 6e 92 c1 | 9f 33 f8 69 87 bc 1f 0c 00 00 00 1c 00 00 40 05 | 49 73 ae f4 7f e8 6a cf 37 86 5a 1d f5 77 0e ad | 19 ee 51 1c | libevent_free: release ptr-libevent@0x7fb34c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab7a80 | #329 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 19 44 0d 82 d8 18 b5 00 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #329 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #329 | rejected packet: | 19 44 0d 82 d8 18 b5 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-77" #329: ERROR: asynchronous network error report on eth0 (192.1.3.77:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0636 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469f8cc0 | handling event EVENT_RETRANSMIT for parent state #330 | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #330 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #330 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49702.965222; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006074 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab7a80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #330 | libevent_malloc: new ptr-libevent@0x7fb34c0180b0 size 128 "road-eastnet-nonat-78" #330: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #330) | 93 2e 75 96 9e d6 58 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b4 2c e9 0f 22 91 df 5a 5b ae 3a 65 86 ba 44 9c | 65 4a 79 99 b3 fa 29 29 22 63 49 c3 6b 7a c8 2c | a6 64 55 77 51 a1 d2 b5 c5 ed b9 2b d7 c9 de d5 | 1f 04 ca d2 89 15 35 75 d9 05 25 47 aa 0c 65 5b | a8 0c 57 96 31 e9 78 a6 a3 87 ad 68 36 d2 a1 3b | 88 08 f8 2e 28 6b 99 4e 37 3d 68 42 7a f5 6a 2c | 92 3c 46 2d 02 18 a7 c8 61 9b 40 1b d5 74 a6 72 | 61 b0 45 d7 09 4c 08 2d 1e 0e 8d f9 eb 38 be 36 | 94 bc ee 43 6d c2 1a 9d c9 1b 4a 84 b6 50 10 54 | ae 45 14 8d 9a 31 50 76 61 37 da 64 1e 74 bc 11 | a7 13 ed 80 0f 85 3c d8 35 69 89 6d b4 6c ac f3 | 2f 4a 27 55 17 f4 f5 ce 32 75 dd b4 15 0b 7f 61 | e2 87 b3 bb e4 11 66 8c 15 79 6e d9 14 50 70 fe | f5 12 aa 90 f9 25 da 28 bc a5 c1 1c 8f 54 93 e2 | 5b 5a 53 f7 1c 97 4d 5c c4 f6 b5 86 3f 24 5b 64 | c4 87 cd 28 7a 3e ef 9f 68 95 6b f8 95 8d da 08 | 29 00 00 24 a1 af e5 97 d9 f1 9e 6c 80 91 ab 21 | 08 cf 38 0c a4 d3 fb b3 c7 37 98 b4 a4 0d 72 16 | de e9 9d 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 c9 48 f6 82 8f 0c eb 59 3f 42 40 | 18 2f 27 9b ca 1b 0e 80 00 00 00 1c 00 00 40 05 | 3e 48 b8 70 cf c0 9c 35 6c 64 bb e3 c7 5c 5e 43 | 1f 5c 26 91 | libevent_free: release ptr-libevent@0x7fb36404b5a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8cc0 | #330 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 93 2e 75 96 9e d6 58 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #330 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #330 | rejected packet: | 93 2e 75 96 9e d6 58 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #330: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0547 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbbc0 | handling event EVENT_RETRANSMIT for parent state #331 | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #331 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #331 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49703.029609; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005777 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469f8cc0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #331 | libevent_malloc: new ptr-libevent@0x7fb36404b5a0 size 128 "road-eastnet-nonat-79" #331: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #331) | 50 44 b2 3a 07 a7 4e 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 5b 7a 1c 65 ca 17 c3 34 09 e9 50 2c 1a 5f 2c | 3f 1f d0 f4 a9 fc a5 0f b3 e0 23 18 36 32 e0 dd | 70 db 2b a7 8a bb 5e d5 7b c1 26 49 ed 17 f5 fb | 41 8c 70 b6 46 13 5b 7c be 72 85 64 1f cb c2 3b | 7b cd ab 00 d1 f5 c6 c8 ef 4e 43 8b d1 3c de 4e | 97 78 da c1 12 64 cb f5 74 cf 7b 2b a9 ae 8b a5 | dc d3 db 70 7b c5 17 1a a0 d8 61 49 40 f3 77 7a | 26 f5 d7 d4 fc a6 3c ec 56 96 bd ad fa da 9d 95 | 6f c7 43 12 03 de b3 4a 54 ca 56 3c b7 a8 38 f0 | 03 5a 39 ab 50 08 22 eb 87 c3 7d 6f ff ac b9 cb | 79 02 42 01 ae 8a 86 1f cf 39 34 00 58 b3 82 70 | cb f1 c5 9a 1b e0 1b 28 e5 0b 30 ab da 32 50 a9 | 39 71 a2 8b c0 a0 38 d2 35 39 8f d7 36 de a3 f4 | 70 e0 8f a8 7e 36 bd e7 03 3e dd 85 86 be 19 24 | 24 d5 8e aa 7b 0a 66 52 ff 44 f1 22 3a 93 2a 43 | b3 e4 83 93 f3 85 5b 68 a3 1b 91 5b 88 3f ae 95 | 29 00 00 24 03 6b b7 f1 e0 d0 ec 2f 89 98 41 7d | af 5d 2c 7f 97 af 10 99 b6 2e fe 6f ac 7d ce 98 | 66 f3 c3 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f b7 eb 6a 1a 1b 78 47 4b c9 5c d0 | 13 11 3d 6a 14 1b 4d ab 00 00 00 1c 00 00 40 05 | 4a 21 a9 91 28 88 ee e6 d7 a3 92 f2 91 f6 75 81 | f6 52 77 56 | libevent_free: release ptr-libevent@0x7fb350035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbbc0 | #331 spent 0.335 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 44 b2 3a 07 a7 4e 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #331 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #331 | rejected packet: | 50 44 b2 3a 07 a7 4e 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #331: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.164 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38800f8f0 | handling event EVENT_RETRANSMIT for parent state #332 | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #332 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #332 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49703.089262; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005929 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbbc0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #332 | libevent_malloc: new ptr-libevent@0x7fb350035930 size 128 "road-eastnet-nonat-80" #332: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #332) | f6 c6 d2 5e ba a8 2a f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 1a 55 0f 26 2f b6 a0 08 51 81 5d b7 71 b9 2d | c5 80 10 57 cc 9f 39 cd 78 f5 33 cd 29 d9 74 2d | fd fd 10 79 da 5f 98 34 d3 3d e4 28 2e 71 42 b8 | 31 90 4d 52 c2 47 b7 94 df 57 9e 16 03 38 42 c0 | 07 fe 24 67 18 0a bc 2f be 06 80 3f 3f 52 ae de | ee ce 07 d7 03 01 92 16 62 42 5c 77 dc 87 62 e2 | 3a dd 16 7d 8f 37 3d c8 ba 22 d8 ef 9b 9d 2a 3d | e0 2c 5c 39 14 07 d4 e9 80 bd 41 35 a2 65 f5 06 | d6 66 0e 9c 09 15 5b 2c 90 ec 66 68 2a aa 32 c8 | f4 e9 0e 83 19 df 87 aa b7 d2 50 b1 70 7c e8 1d | 69 9d 8f db 7f c7 e2 b0 71 77 37 93 72 6b 02 1f | ff 20 a4 e2 5f 72 65 e8 93 2e 78 8f 02 5c 26 b8 | d6 41 94 30 c6 30 1d fb 21 2d 70 c7 a4 c4 37 64 | d1 d0 93 45 ae 86 94 3c ef 88 96 54 5d 14 dc 13 | 82 20 c0 68 d6 ce 1b eb 97 51 ea 00 31 01 9f 99 | 9c 00 ca 7b c6 e3 21 ad 8a 48 45 1f d8 69 47 47 | 29 00 00 24 92 2b 4a ab c7 31 ef e2 7b 94 b4 08 | 46 bc 96 1f c5 de 4e 6b bb 45 28 4b ff e0 00 6e | 79 8b 88 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 fd 6f fe 83 1d 32 21 59 ad 4f 6d | 1b 98 f5 b3 09 7a d7 45 00 00 00 1c 00 00 40 05 | f2 d1 58 ca ab 44 6f 50 93 d1 3e f5 88 73 05 cc | 3b a4 3c c0 | libevent_free: release ptr-libevent@0x7fb388037a30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800f8f0 | #332 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 c6 d2 5e ba a8 2a f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #332 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #332 | rejected packet: | f6 c6 d2 5e ba a8 2a f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 50 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-80" #332: ERROR: asynchronous network error report on eth0 (192.1.3.80:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a56dd0 | handling event EVENT_RETRANSMIT for parent state #333 | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #333 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #333 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49703.154573; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00643 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800f8f0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #333 | libevent_malloc: new ptr-libevent@0x7fb388037a30 size 128 "road-eastnet-nonat-81" #333: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #333) | 36 9c 5e f3 7a 54 db f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df 35 02 78 fc 13 18 22 30 0e d2 c5 c7 5e 7a ef | fc 39 68 66 58 1c a7 d7 f4 43 08 7d f3 9f a3 12 | 83 85 91 2a d6 fa cf 49 c5 3a 4e ef 94 c1 54 16 | 1b 99 b1 a6 48 34 1c b5 c6 ee 58 e5 e4 3c 00 8c | f6 ed dc dd 07 96 4c 6b 8d 5f aa d5 5e f5 20 2e | 3f 32 89 26 7f 4e af 1e 9a 4a 36 89 bf ed bc fa | 5a d9 0b e6 38 d4 55 02 b6 04 ba b9 b2 30 b0 dc | ee 4b 24 b9 ca 12 84 2f 34 21 e3 1c 0e f7 c4 d5 | ce ff 47 39 50 96 0a de ca 62 7f b7 57 aa dc 15 | fa 24 df 17 c7 d0 80 14 18 ef d1 f8 18 5f 36 22 | 2a ba 77 eb 0a 13 5b 8b 27 f6 fa ad 95 0f 09 90 | 17 80 57 73 91 84 22 c2 f7 e1 0e dd b5 d9 e2 7e | 44 ff ae 13 c1 78 7c 90 56 b5 79 a1 5d 2f 9a 4e | 56 4b 74 fa 8f 64 20 07 77 6a 9d cf 03 50 e4 f8 | 0d 1d ad 75 e0 c0 52 df 18 df 4e ac 10 5a bf 8c | 35 df 7e 38 e0 d8 bf ff 6f 7d 3a 37 d3 86 c3 73 | 29 00 00 24 0e 6c f9 b7 77 8c 01 48 47 c0 c4 ac | 2c 92 5d 4f bc 4c de 69 52 73 e8 16 78 88 9e ed | d3 2e 55 f7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f 3c 0e c8 f8 59 38 94 13 7f 9d fb | 64 4c f1 0b 3e 49 1c bd 00 00 00 1c 00 00 40 05 | 19 5d c9 52 f0 58 98 88 cd 4a c6 e4 d4 78 0a 3b | 9f f4 40 6f | libevent_free: release ptr-libevent@0x7fb3680180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56dd0 | #333 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 9c 5e f3 7a 54 db f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #333 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #333 | rejected packet: | 36 9c 5e f3 7a 54 db f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #333: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350012bf0 | handling event EVENT_RETRANSMIT for parent state #334 | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #334 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #334 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49703.22989; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.010137 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56dd0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #334 | libevent_malloc: new ptr-libevent@0x7fb3680180b0 size 128 "road-eastnet-nonat-82" #334: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #334) | 99 fb 3f 4d 99 57 72 cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a ca de c8 71 49 e8 30 84 13 c9 a8 49 58 85 47 | 09 f9 f9 59 70 d3 2b 07 44 44 cc 17 14 52 02 aa | 27 07 c2 cd 39 d4 b6 e5 73 79 a9 2f 72 89 bd 61 | d5 62 f8 e8 e6 f1 12 2e 57 7d d0 8e 8b 5d 7b ce | 30 2f b7 61 b2 0b 7b a0 24 5a fe 42 60 21 92 aa | 5a be e9 6d ac f6 2b f8 e4 db ed fe 70 91 ae a8 | 85 c9 a9 89 2d af 8b 90 60 53 0f 7b 1f 54 22 36 | b6 5d 78 20 de 79 62 7d 9d 74 65 df 47 cb 75 b6 | eb 4f 70 ec d4 3f 23 06 d7 65 0a b2 74 f8 e9 72 | 81 4c 29 37 9f 65 5b 7b c1 89 f7 c4 28 5b 64 9b | 59 6b b0 17 bf e7 21 58 4f ad 42 06 42 7b d5 d6 | 2f 45 bc a9 64 87 9f 47 9d 1c 11 c7 6e 0c 53 bf | a5 35 d6 5f eb b3 bf 80 3c b3 0d 2b 91 66 f7 a4 | 98 9c 01 6a 7e ee e3 b3 ad 96 90 67 e0 44 49 71 | 2a 4d 41 3b cc ae 39 dd 1f 03 62 e9 5e 5c bf 21 | 27 f6 9b 3e 24 35 1b f3 b8 96 3c e2 59 58 ea 9a | 29 00 00 24 64 85 28 2f 41 a8 19 c8 06 e4 df 4c | 57 5a d5 28 ae 9b e4 58 e9 c7 cc 4b e4 65 be 72 | 5c d2 98 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 3d 2f a6 85 1f fa fd 47 13 ee 3b | 56 07 59 de 70 93 a0 2d 00 00 00 1c 00 00 40 05 | ab e9 3c 75 bd a4 6c 62 ac eb 51 4e 98 ab 45 51 | fa 01 56 3d | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350012bf0 | #334 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 fb 3f 4d 99 57 72 cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #334 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #334 | rejected packet: | 99 fb 3f 4d 99 57 72 cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #334: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0473 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3840318d0 | handling event EVENT_RETRANSMIT for parent state #335 | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #335 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #335 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49703.281144; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00763 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350012bf0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #335 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 "road-eastnet-nonat-83" #335: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #335) | 43 a2 0c b8 41 14 fb 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 80 1a ff fe 66 5c 27 50 3c bb 63 46 9d 4f 02 13 | 90 10 26 6b 8b bb ce 8e f8 b1 4e 76 fe b9 96 cb | 8a 27 62 97 df ca 55 0f 1b 21 02 63 f2 9a 56 cf | af a1 0c 10 6a 33 02 6e 92 2e ca f8 26 1a ae eb | 16 92 9e c4 5b 3e 17 4a 65 79 45 19 ed da 56 2e | 51 d3 90 a7 9f 98 36 5a 61 58 65 de 51 88 f2 d6 | 2c 74 21 5b 26 93 04 1f 9d 42 9f 74 af 5b 84 53 | 88 76 a7 2b 50 71 5f 03 19 11 aa 1d 3f 9a 1b be | 3f 66 50 7a 7c c6 ba 3a 1f b1 9f aa e7 d9 54 d2 | 8e 38 49 1c 3f da 85 98 28 e2 8c e3 a0 7e 8b bb | 1f a5 48 ea b8 af 51 41 c3 b5 72 51 f3 06 99 5a | 76 51 df 7b 88 a9 f4 af 6a 05 b3 e4 b4 4c ac 08 | 4f aa 11 34 cc 49 a5 06 8b 79 a3 52 45 cd 64 d8 | 83 12 a6 eb 44 69 b7 c9 e1 51 9a 09 19 b8 97 03 | 64 d6 b8 43 68 0f ed bf 4f 10 12 04 91 a0 82 30 | b8 e7 e9 9e 27 9b 68 9f 56 43 7c 93 6d 87 a8 e5 | 29 00 00 24 42 02 24 73 b2 25 02 dc ca ad a2 1d | 9e f8 54 e2 15 e2 22 5d 3f 7b 60 32 c9 95 b0 ec | b1 7e 62 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 ff c7 be 47 4f 0e b7 8d ed 50 5b | d9 e3 74 cc de e6 b4 2d 00 00 00 1c 00 00 40 05 | 8d 0a fb 98 6b 40 87 d9 54 5c 96 0f 30 79 eb 55 | 16 93 80 76 | libevent_free: release ptr-libevent@0x7fb38403c470 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840318d0 | #335 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 a2 0c b8 41 14 fb 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #335 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #335 | rejected packet: | 43 a2 0c b8 41 14 fb 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #335: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0452 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #336 | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #336 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #336 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49703.341446; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006608 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840318d0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #336 | libevent_malloc: new ptr-libevent@0x7fb38403c470 size 128 "road-eastnet-nonat-84" #336: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #336) | a0 3a 99 80 e1 01 63 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 8b 11 e3 72 10 b4 96 46 45 1f 06 8b cb 20 43 | 48 5b dc 9f 22 0b 19 f0 6e 5a 41 4f 7b 66 7e 47 | 17 91 cc cc 24 8c c0 85 32 b7 be 23 d1 6d 12 65 | 00 df c3 47 48 17 d9 93 47 4f 9d 2a 81 88 4f 2c | 1f 98 ac a8 85 56 dd 1e 45 4f f7 f9 78 59 b2 90 | d0 96 3c c9 92 dc 80 e7 ee 9e 9f f3 a3 42 a0 87 | f4 8c 84 d8 38 fe 2c f0 0d 7c 15 54 23 ab a7 7c | ab e1 53 7c ba 26 57 e2 9b 0a 0d 44 c4 7c f6 bd | 50 8c ae 85 b6 fa 6e 51 9e 4d 32 a8 2f 5f b7 94 | 33 ef 3d 6b de 80 a9 44 cb a5 48 1f 9d d9 3e 40 | c2 f4 df a8 c7 43 1a 85 1e 99 1c be ad 10 a3 44 | af 83 22 29 2a d8 4c fc aa 9e 40 9e 83 a1 f3 2d | d3 6b 55 b5 8b 94 57 96 1f 06 03 b7 e8 07 4a dc | 94 d8 f3 f3 15 26 15 42 b7 cd 81 18 11 03 dc 3a | 4e 46 ec 2a eb 11 4a a9 f5 ce 5d 26 8e 40 7e f7 | fb 5d b7 76 23 d0 05 cb 25 8d 85 d4 e7 63 e5 fe | 29 00 00 24 20 77 67 42 c0 5c 2e 2c 4f 51 1c e3 | 6e 76 b6 ed 2f 6c dc 89 e9 07 aa bc e6 7b f3 86 | a7 c4 a8 7e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c e2 e4 55 b2 1e b0 cb dc 5a 76 de | 82 37 47 8c ee 4e fe 03 00 00 00 1c 00 00 40 05 | 1d 8c 0e 3c 37 8c 24 ca 1e c1 4b a0 97 2b 99 7f | 60 3a d2 7b | libevent_free: release ptr-libevent@0x7fb3700300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #336 spent 0.132 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 3a 99 80 e1 01 63 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #336 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #336 | rejected packet: | a0 3a 99 80 e1 01 63 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 54 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-84" #336: ERROR: asynchronous network error report on eth0 (192.1.3.84:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348048a60 | handling event EVENT_RETRANSMIT for parent state #337 | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #337 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #337 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49703.405785; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005491 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #337 | libevent_malloc: new ptr-libevent@0x7fb3700300e0 size 128 "road-eastnet-nonat-85" #337: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #337) | ed 63 58 23 fd c1 76 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 96 54 84 2e e5 91 43 31 05 bf 8d 46 38 09 77 | 34 82 01 41 07 ba 77 ae 0e 58 56 59 e8 aa 03 3b | 7e fb 3d 6d 4d 59 d3 86 8a 20 2c b2 06 03 8a 41 | 33 cf 0e 06 87 87 a2 ab d5 f2 99 a7 84 cd 05 cf | ec d9 29 84 36 3e fc 29 32 e5 d2 77 7d a0 28 f8 | d1 0e 51 2f 73 28 bd 60 66 cf 7b 5c e8 76 7f ee | 0b 3f cc 47 13 a2 8f 86 8a 1d a1 57 96 4b 8e 1d | 54 09 0b 8b e7 94 12 ea 68 37 a0 5a 37 1b 43 96 | 9e 43 fb b9 f4 e3 a4 14 cb 49 50 02 95 69 45 10 | 4f 12 ab e9 0f 1f 01 01 a4 c3 ef 65 1e 2e cf e7 | 08 9d 2c 27 7f 64 fb 91 ba e9 80 4e 20 48 a7 46 | 4e 2b b0 83 ea 9c e6 04 02 2b 8c 1a 52 db c6 17 | d5 9e 92 ca bd cc 2d 80 e6 b4 24 b9 79 b6 76 9a | 0e 8f 39 57 ee 2c 0b 47 20 f0 82 f0 87 6e 0d 85 | f9 ab b8 d1 c1 07 ac ad 62 5b 5a 42 cc c5 f9 04 | de 15 7e d8 03 4b a1 c4 30 01 43 b8 8d 24 8e 44 | 29 00 00 24 47 35 e2 69 12 71 4e bf 5f ce fb f5 | 4b 5d 78 7a 40 67 4e 2b 89 1a 4f 82 42 7d 07 9d | 99 e5 3f 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 a6 ae 66 a0 2e 4a eb 14 83 41 42 | 9c b3 ed 9b 1a cc 9f 9b 00 00 00 1c 00 00 40 05 | 09 b5 68 86 30 d7 ba 9d 35 40 11 f6 5c 40 95 0a | 79 fe 98 fe | libevent_free: release ptr-libevent@0x7fb36403ae90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348048a60 | #337 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 63 58 23 fd c1 76 bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #337 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #337 | rejected packet: | ed 63 58 23 fd c1 76 bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #337: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0472 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37800cc10 | handling event EVENT_RETRANSMIT for parent state #338 | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #338 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #338 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49703.471124; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008507 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348048a60 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #338 | libevent_malloc: new ptr-libevent@0x7fb36403ae90 size 128 "road-eastnet-nonat-86" #338: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #338) | 1f e2 d0 d2 e5 84 7f 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | db f7 91 cd 84 5c a7 ef c5 4a 9e 2e af a2 43 ea | 45 0a b8 db c5 6e 04 46 ba a1 d5 11 76 fa 91 5a | 21 6e 50 69 5f 4c 63 af d6 32 06 ae 79 8f f8 47 | 06 f3 f5 c6 98 57 e2 e8 f9 93 2e 73 11 9e c7 4b | 81 b1 ab c3 4c 82 50 3e 95 1b 93 8d f3 f1 26 94 | 35 dc 1c 86 75 c4 0b 21 99 da cd 92 fb c9 25 d3 | a1 77 02 1c 94 1f a7 90 d7 35 62 14 3f a4 c2 e2 | 04 47 bb f7 88 43 f1 58 36 ff ad ce 6a c6 3a e5 | ca 19 27 9c c0 b7 91 62 00 c9 17 fb 82 73 f3 dc | 8a f9 f2 d0 2d 78 16 8f d3 1a df 7b 29 7f a7 d2 | 2a 1d 58 77 31 26 e6 25 fd f1 f0 ff b3 be 2a fb | 9a f2 05 45 cd 1a c0 33 3f 3e 0c b1 4a 0e 13 b1 | f3 25 ba 03 ce 1b 65 7e 16 c3 d1 62 05 e6 0b 87 | 27 59 78 26 a7 72 9c cf a5 2a c9 6c 3c 43 6b b4 | dd fc 35 a0 21 8a d9 83 8c b5 e6 a8 c9 3d 42 bd | e0 43 1a dd 83 56 78 b8 0a 0d d3 50 6d 61 d9 5c | 29 00 00 24 53 73 16 e0 68 43 e7 c2 a0 53 68 5d | 7e 07 bf 33 55 30 e6 39 bc d6 66 c9 05 5a fa 29 | b8 4f 54 b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 1b 58 be 75 e4 59 10 d1 29 a5 4a | 19 0e d4 a5 d3 bb ae eb 00 00 00 1c 00 00 40 05 | e1 23 de d4 d9 5f 17 c1 21 ba 79 77 2a ee 0e dd | 91 6b 75 70 | libevent_free: release ptr-libevent@0x7fb37801fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37800cc10 | #338 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1f e2 d0 d2 e5 84 7f 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #338 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #338 | rejected packet: | 1f e2 d0 d2 e5 84 7f 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #338: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #339 | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #339 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #339 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49703.530417; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005125 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37800cc10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #339 | libevent_malloc: new ptr-libevent@0x7fb37801fd50 size 128 "road-eastnet-nonat-87" #339: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #339) | a2 06 83 e6 4d cf 47 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 60 78 10 c3 0f cc 3e 4e 2e d5 96 c1 d2 76 e3 | 97 d5 35 a5 15 b5 cf 25 fc d1 a9 ed 61 00 ab d3 | f0 a5 f9 6b c8 93 25 3b e7 35 94 5b 27 e6 7c aa | 9f 99 13 73 c8 87 72 6f e3 9a d8 3f f2 60 6d 07 | e2 f2 df 74 8c d9 c0 ea 66 9b 1a f7 3a 35 11 09 | 4c 1a 77 9c 33 ec 8e 52 10 1b 5c 10 4f 88 cf e4 | ab bc 00 8a 49 0d dc 56 57 fd b9 aa 33 dc a2 d8 | 3f a7 e3 81 b2 6c 3d 05 80 c1 9e e7 22 3d 4f 4b | 69 99 65 2e db d4 42 77 f6 d5 da ca 9c 7b 37 94 | 4a 33 ff d3 90 af 06 41 1e af a8 a1 29 27 b8 4e | 94 36 29 4f 90 ae d8 40 e5 f9 f7 60 20 50 ae f6 | 19 f9 e5 ce 63 be 68 f8 75 c8 c0 44 7f 51 fc 3c | fe be 4d e9 10 ea 8c 24 89 c7 41 df 92 c0 7b 00 | f7 f4 82 ce db 65 47 b6 bb fd f3 75 44 d0 1d c4 | 34 92 d9 b1 3f bf c2 cf e2 c7 6c 0d 60 aa 7d 11 | 0e 19 00 e8 57 9d 13 5a 3b a1 80 7a d5 8d 15 4c | 29 00 00 24 1c 60 55 0f db a5 b1 e0 94 27 e9 83 | 86 bb c4 10 2a 23 35 9c a1 96 2d 6f 7e 5d c3 40 | 27 31 c9 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 61 9a 5c 09 fb 4f 1f fe 5c 80 fd | 11 ff 3a 18 d8 5f 68 01 00 00 00 1c 00 00 40 05 | f8 00 9b 14 2d 47 6c 3b ee ab c1 8e 99 04 04 19 | 24 06 94 42 | libevent_free: release ptr-libevent@0x7fb3380407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | #339 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 06 83 e6 4d cf 47 f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #339 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #339 | rejected packet: | a2 06 83 e6 4d cf 47 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #339: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46910 | handling event EVENT_RETRANSMIT for parent state #340 | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #340 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #340 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49703.601727; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007828 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #340 | libevent_malloc: new ptr-libevent@0x7fb3380407f0 size 128 "road-eastnet-nonat-88" #340: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #340) | 06 b4 2a d6 65 92 42 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 29 a3 64 49 07 ee 29 df 38 b6 8e cf 9e 1e 2e | b5 cf 5c 9d df 90 0b 24 c7 00 d1 e9 e7 d5 9f 86 | b0 59 b0 c3 a3 da d8 a1 12 f7 d8 f8 0e b3 79 c6 | 53 3d ef a8 ea 62 cb cf 67 47 98 25 86 4a be 53 | 9d 43 a7 c0 c8 ef 24 bd 84 89 4d 1e d4 43 4c 6d | a9 e8 b8 a2 ac 6e 98 24 1f 18 dc ca 27 cf d8 28 | a6 29 25 bd 63 2f 94 ef bf ef cd 28 af b3 c4 14 | c2 24 5c 8a a7 98 ce 81 da e6 36 b6 6f 19 b3 9c | 61 e9 12 2d 81 4f 37 09 f9 11 51 0b 0a 15 3c 25 | dc 56 9d bc 1a 37 30 79 ad 58 f9 75 6f 1b 9e ed | af 69 6e f2 46 86 c0 e7 9c f5 ce 51 f7 2f 69 1c | c5 ca c9 df 4e 7a 80 a9 78 c1 72 af 2f 09 7a f4 | 7b e9 80 c9 52 10 9d 4e 28 29 82 d9 cd 16 a6 20 | 67 0a 26 62 77 51 4a e8 62 40 48 56 bb c1 3c 45 | c4 fb 9d d0 c4 57 ec 56 11 1b 76 f9 cd ac 15 3f | 9b 2c e1 a4 49 9f 96 e5 41 42 75 44 0c a4 b4 45 | 29 00 00 24 ae e0 e3 5e aa a2 ee b4 ba fd 41 25 | ff 71 9d 02 44 71 da b9 6c 12 19 98 91 a3 35 04 | b4 f3 15 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 9b ba f5 3a f3 63 5f fe ea b4 e7 | 7e cf 7e 1a ac 8a 91 ce 00 00 00 1c 00 00 40 05 | 7a 1b 4b 67 34 a5 a3 ba cf 0b c3 8e 76 85 1a 07 | b5 81 41 18 | libevent_free: release ptr-libevent@0x7fb388047480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46910 | #340 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 b4 2a d6 65 92 42 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #340 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #340 | rejected packet: | 06 b4 2a d6 65 92 42 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #340: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0635 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00cc10 | handling event EVENT_RETRANSMIT for parent state #341 | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #341 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #341 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49703.663067; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006647 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46910 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #341 | libevent_malloc: new ptr-libevent@0x7fb388047480 size 128 "road-eastnet-nonat-89" #341: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #341) | 49 c3 42 79 ad a4 02 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 28 2b 3a 23 5f 9c 41 a8 c4 b1 54 27 b8 a0 a8 | a4 06 9f e8 bd 51 0b 54 b6 c3 33 24 5b b7 ea 09 | 0f d7 aa 52 2f c6 c6 78 f1 af 48 22 da 41 1f 06 | 45 43 46 fc b0 c6 2f 1b c2 df 83 35 32 87 c5 a5 | b2 fd 30 3e 95 a2 12 80 00 0f 09 dd 41 c2 48 21 | 60 8b 18 12 e2 f7 cf 1e de 64 8d 80 92 30 17 55 | ad 93 96 5a 50 26 d3 cf d9 c9 40 82 d0 c1 d7 8c | 1b c3 86 4b 02 cc 46 e2 fc 73 8a b5 ae 23 f0 12 | e2 a2 8c 5d c9 4d fa 9f 2b e7 d4 9f 15 6e 8f 91 | 94 64 45 c0 fe f3 80 9a 4c e2 d7 66 20 dd 41 dc | 6b 9b c8 3f df d1 ab 15 c5 36 9b b6 cb 01 6b 62 | c9 d1 d0 ae bf 44 a3 4d 59 dd 52 35 90 0f 89 8a | f2 c1 bf c6 f6 a5 a8 2e c6 a8 d7 de 94 ea f6 00 | 11 3a e4 a5 1c cc 19 f4 1b 95 ff 82 80 6f 79 ae | 97 c0 6f ca 24 fa 61 b5 2e 87 00 ef d7 62 ce 06 | 06 5f 50 40 c4 2f 8b 3a fb 06 a7 11 50 8a 1f ce | 29 00 00 24 b0 2a b8 49 b5 4b c9 98 47 c3 4a b6 | 54 a6 a4 dc f8 8a 35 db 6a e0 ae b8 2b 87 41 53 | a2 41 a5 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e a8 6f b4 ec 17 85 04 80 69 75 d9 | db 5a 4e 4f c9 9c a6 7b 00 00 00 1c 00 00 40 05 | 47 20 cd 59 bf 11 9f 21 41 41 cd 45 1c bb 06 ab | 5f ca 38 7e | libevent_free: release ptr-libevent@0x7fb35c023d80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00cc10 | #341 spent 0.122 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 c3 42 79 ad a4 02 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #341 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #341 | rejected packet: | 49 c3 42 79 ad a4 02 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #341: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0852 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b650 | handling event EVENT_RETRANSMIT for parent state #342 | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #342 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #342 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49703.751463; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006197 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00cc10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #342 | libevent_malloc: new ptr-libevent@0x7fb35c023d80 size 128 "road-eastnet-nonat-90" #342: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #342) | 92 0e 5c 44 35 6f 61 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 4b 3f 50 56 cd 4f c8 69 53 e3 02 d0 e2 c4 4b | b8 26 12 0d 2f 95 d4 df 65 d2 22 1d a5 8a 76 36 | 0f 44 f3 88 67 5b a4 93 af 87 fb e7 03 3d f3 3d | ce 49 25 06 46 21 51 fe e6 a5 e0 3f 25 17 b0 d7 | 71 9b 71 32 36 21 5f b7 2a ee 25 9c 8a 04 76 c2 | 55 e4 ab 4e 7c 02 05 d1 d2 21 09 a2 51 a4 92 f0 | 79 2b 73 03 6e bc d5 33 3d 90 f5 1b b7 cb cd e9 | 74 b4 08 87 c4 a4 7c ab 86 b2 e8 fe f3 2e a7 14 | da 5c 13 a2 0a 83 be 25 a6 25 48 21 ec 98 11 c6 | 1d 49 83 e7 e3 39 34 26 fb d4 24 cb d2 66 1f a9 | 8b 7b 97 28 60 bf e3 df fc be 83 7a 91 a4 90 3a | af ad 2d 44 70 c8 0c 11 ab e1 87 f9 88 5b 04 d8 | 04 03 d4 08 d3 e9 32 2b 30 9c 93 90 d3 62 4a 73 | df 00 65 61 53 f7 33 9c 73 ad fe 53 5a 29 aa 93 | da 76 97 14 51 4b d0 f8 fb 54 f6 6e 4f 99 ad 4b | 75 e5 97 56 5f 2e 08 fb ed 71 37 6a 4a ad d6 62 | 29 00 00 24 02 01 86 b0 0f 40 c1 16 7f df 21 87 | ce a9 58 2f 27 7b 28 e0 c6 1c d2 35 82 80 ac e4 | ab 80 e7 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 56 62 15 04 08 91 44 63 ec 81 3e 0b | 9f 8e c8 3c d5 eb af f0 00 00 00 1c 00 00 40 05 | 60 c3 81 cb a9 a6 9e ac 92 76 43 f4 51 0d 3b 6e | 52 02 3f 95 | libevent_free: release ptr-libevent@0x7fb380032bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b650 | #342 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 0e 5c 44 35 6f 61 f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #342 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #342 | rejected packet: | 92 0e 5c 44 35 6f 61 f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-90" #342: ERROR: asynchronous network error report on eth0 (192.1.3.90:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a73690 | handling event EVENT_RETRANSMIT for parent state #343 | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #343 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #343 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49703.829826; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006334 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b650 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #343 | libevent_malloc: new ptr-libevent@0x7fb380032bf0 size 128 "road-eastnet-nonat-91" #343: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #343) | ae 78 c6 a9 8f e8 66 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 9d b8 ed 06 43 12 ec 4c 45 2d d2 98 f8 e4 c2 | 36 59 63 a7 5a 33 ff 67 e3 f9 f4 1f 01 a9 3a 4c | 55 90 c8 83 a0 29 a8 aa 4f ac db f2 6f 11 94 39 | df dd ed a8 03 f3 60 cc f4 5f c8 16 76 2c 18 b3 | 52 5b 1b ac 7a 46 b0 6c 28 af 43 e8 e9 1f 42 2d | 46 d8 e4 d3 78 66 14 97 ce c1 cd 0c 3c 65 65 46 | 46 82 84 7e d0 a7 70 e0 17 0f db 9a 4e 29 93 92 | 21 22 73 35 c9 ca 2f af 9d 0a 64 5c 81 08 63 7f | e9 bd 70 7e 9e c2 db 6e 8e 2d a9 2d 3d e8 0e 81 | cf 97 9f 13 45 5f d0 17 a5 46 81 8f f6 9c 9c dd | 6d 72 b6 df 14 55 64 61 52 e1 4b 46 36 b7 06 8a | 6d 94 56 ae f7 f9 54 fa 14 95 61 ab b8 b6 ec c3 | e8 2c f9 02 e7 ab 10 28 9e 67 38 42 93 d6 89 7e | bb 6a dc 83 42 00 3f 72 de b7 9e 71 be 55 39 21 | 54 8b a5 97 b3 b2 06 f8 5f 7f 26 67 9a c1 3f 7e | 51 39 34 0f ac 86 ce 7b e6 99 54 4b 79 6e 8f 0a | 29 00 00 24 65 6f dc 77 c3 29 54 5a 74 6e 49 3d | 05 2a fe cf 26 c9 29 fa f4 9d 54 09 a5 a6 15 69 | 11 b4 0e 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 ad 81 e7 cf f7 25 7c 0f 5a 2a 07 | aa 17 3c 2f 54 ca c3 2d 00 00 00 1c 00 00 40 05 | 5d 1d e0 9d fe 43 fa fd 70 69 f4 3c 05 77 9a 1e | 38 96 d9 39 | libevent_free: release ptr-libevent@0x7fb34403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a73690 | #343 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 78 c6 a9 8f e8 66 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #343 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #343 | rejected packet: | ae 78 c6 a9 8f e8 66 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #343: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0662 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46af78c0 | handling event EVENT_RETRANSMIT for parent state #344 | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #344 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #344 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49703.911198; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008456 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a73690 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #344 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 "road-eastnet-nonat-92" #344: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #344) | 60 fe 47 d5 bc 7e ec f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 90 bf a8 75 45 e6 9b 9e 36 c4 f8 00 7b fa ed 16 | 45 48 19 73 f0 43 47 d5 85 f3 cd c8 97 6e 50 a8 | 7b 63 a3 ce ea 05 ae 44 e5 a2 e6 29 a8 16 bc 48 | 78 95 49 07 f7 17 ad 10 48 2e fd 23 74 21 44 c0 | b4 d3 48 b2 fb bc c3 28 df 8a d3 09 ec 63 04 28 | 7e 5a 51 87 52 03 32 ff 61 0c 39 ac c3 26 d9 35 | 88 8a 8d fe 64 9e 7c 7f c3 22 7b 8b 9e 96 8b 3d | b8 ef 81 b1 6a 3f 8a 50 49 73 5d ab 49 f3 99 5e | ad 5d e8 43 6f bd 70 02 a0 6f d4 12 c9 ee f2 55 | f1 fb cb 6e d0 ab 61 ad a4 39 c4 fa f3 3f c7 bf | 5f f1 ac db cc 36 aa 36 32 7b 50 a5 5a 12 e0 c2 | fb c0 54 26 8a e0 81 02 71 55 03 a2 11 c1 ce 2c | 62 50 df 4c eb da 5d 3d 81 bf 56 fd c4 6a 45 b3 | f3 c4 00 14 0a f0 d4 72 ad 8f 3b 97 e7 25 ea 81 | 48 23 bb ad 52 e9 90 df 74 31 fa 3e 85 2d 9b f0 | 97 f2 67 07 62 f1 e0 1b eb 9c 9b f7 2c 83 46 40 | 29 00 00 24 59 47 a1 36 35 51 2c e7 ec 59 96 c4 | c5 6a 0f fd 9f 62 7d 5e ad fa 8e 0f 35 43 8c 01 | 6a c9 a8 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 37 18 00 bf d4 a8 37 15 69 ae 4c | fc 2f e7 92 f0 22 70 f2 00 00 00 1c 00 00 40 05 | 33 e5 40 5c 05 2f 5b 7d e0 96 06 6b 07 18 0b d5 | ca 3f e3 4a | libevent_free: release ptr-libevent@0x7fb380048a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af78c0 | #344 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 60 fe 47 d5 bc 7e ec f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #344 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #344 | rejected packet: | 60 fe 47 d5 bc 7e ec f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #344: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3380300a0 | handling event EVENT_RETRANSMIT for parent state #345 | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #345 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #345 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49704.033558; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006709 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46af78c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #345 | libevent_malloc: new ptr-libevent@0x7fb380048a80 size 128 "road-eastnet-nonat-93" #345: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #345) | cc 1b db ff 37 55 f7 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 67 e9 25 ad 99 4c 76 71 a1 a8 5d 6b de 51 32 | eb 5c 8d 84 1c 3d 17 6c c1 5f 62 71 5b 44 16 fb | e4 d2 85 4c 64 49 cc e5 df 14 a2 74 3d 7a c6 c8 | 61 7c 32 bd 88 6d 99 62 9c 43 b2 d1 2b 52 46 39 | c0 c1 fe 0b d3 8c b7 41 43 fa 07 e4 ca 66 08 b9 | e3 73 79 86 ee fe 88 31 4e 3f 00 50 43 af ba 2c | 0f 81 55 13 ff ba 58 17 5f 8e c8 12 2b 5c fa c6 | ef 92 c1 91 f7 d8 64 09 28 37 f9 29 29 da 06 11 | 98 a0 90 28 27 02 35 70 61 dc cd b3 af 6b a5 cc | 33 40 2b 71 fe b4 6e 27 bc 87 0b 2e 49 cd 22 6a | fe 62 e7 dd 24 a7 1f 41 fb 60 e1 86 0c 80 50 0b | a0 a0 c9 f7 8f 75 a4 e1 64 72 0c 28 9b b9 6c ed | 86 a3 26 05 ab b4 ae 03 ec cc ce 40 59 4c 63 89 | f5 0c b7 8c 77 de 51 59 14 48 7e 85 50 2b 34 5c | b7 79 6c 71 db 1b 6c 37 06 89 c8 05 98 a4 3e 07 | 39 20 3f 60 a2 a7 3c 0b 2f 8f 18 e7 35 c0 2b f1 | 29 00 00 24 20 33 be 81 19 1f 5e fe 6d 68 36 2c | 95 1b cf 17 03 6e cb aa fd 3d 3c 1f 01 7c 3e 25 | c7 e0 c9 bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fc 24 83 28 6d 9e 08 a8 13 dd 36 c1 | 4e 58 4a c0 e0 a3 35 28 00 00 00 1c 00 00 40 05 | 65 c0 95 0a 9d 33 80 de 00 4a d8 7a 37 18 f6 5b | 66 48 2b 46 | libevent_free: release ptr-libevent@0x7fb33803a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3380300a0 | #345 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 1b db ff 37 55 f7 09 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #345 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #345 | rejected packet: | cc 1b db ff 37 55 f7 09 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-93" #345: ERROR: asynchronous network error report on eth0 (192.1.3.93:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0436 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #346 | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #346 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #346 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49704.141881; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006655 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3380300a0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #346 | libevent_malloc: new ptr-libevent@0x7fb33803a770 size 128 "road-eastnet-nonat-94" #346: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #346) | 5b 73 99 01 85 6b a6 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 41 a4 66 03 78 2f 0c ac 28 0c 6f a0 f5 98 a8 | ad fe 06 fd 8c a4 d4 c6 03 17 f9 3c ee f7 59 ef | a4 19 f6 d6 98 a9 45 18 c4 fa 1a 04 5e 12 ad 25 | a2 eb 73 ff 50 f7 5b d9 ac 0d a3 60 63 86 dc 11 | 24 c2 5c cb 2a 8c 8f dd 11 7a 54 9c db e5 07 72 | 1d 04 b8 06 80 b0 2c 7d 70 61 0f 2e ec 51 90 ed | 50 75 e9 44 ba 97 aa c3 93 f0 e7 8e a0 59 5a ef | f5 79 47 07 02 c6 5c 62 a1 be 60 af ef 55 0d f9 | 00 ac 18 13 2d 62 0e 5a 5f 40 32 8a 49 30 5f 84 | 37 da 16 c6 63 1e a6 4e a5 65 94 59 c6 7a b2 c5 | 75 c7 8f 68 de d4 77 8e 92 40 c9 5c ee b4 80 ea | 42 78 86 4f 14 c5 47 55 13 d1 41 8b fd ef 2c 61 | b8 ff 39 92 97 ea a2 69 91 9d 1f f6 fd bd a6 d6 | 98 cc 57 23 b2 ed be c2 71 55 a4 d5 18 54 fe df | 4d ab de e9 5b 44 57 81 1d 33 6c d4 fe 06 43 32 | b0 07 7c ba 8d 9c bd 13 85 9c b0 70 80 5b 02 74 | 29 00 00 24 86 39 a6 9d e4 88 31 1e 1a 48 0c df | 5d 51 c2 7f eb 35 e1 75 45 71 5e 9b 45 ec 98 56 | 3e 47 8a 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 d4 6c 5c e3 02 f1 ae 0d a6 ae 25 | 4a 2c de d9 71 00 3f 70 00 00 00 1c 00 00 40 05 | 9a e2 a2 47 57 d0 42 27 78 4a 19 6f 7e 1c 29 7f | 7a 88 26 9b | libevent_free: release ptr-libevent@0x7fb354035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #346 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5b 73 99 01 85 6b a6 c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #346 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #346 | rejected packet: | 5b 73 99 01 85 6b a6 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-94" #346: ERROR: asynchronous network error report on eth0 (192.1.3.94:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0449 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33800cc10 | handling event EVENT_RETRANSMIT for parent state #347 | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #347 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #347 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49704.248139; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007541 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #347 | libevent_malloc: new ptr-libevent@0x7fb354035930 size 128 "road-eastnet-nonat-95" #347: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #347) | f8 38 0d 6d 39 93 09 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 c4 2f 67 81 91 d8 d3 fb 76 27 6a 79 d1 72 21 | 27 8a 05 07 53 b8 7f 41 86 ef e3 fa f6 78 ef f1 | 52 89 ca 2d 9e 75 06 3f de f7 86 92 8e de 82 39 | 74 b5 33 59 34 5d 7a 07 32 58 2d 1b 54 b4 4a 71 | 82 e9 69 4b d1 23 61 8d 33 9d 70 70 80 3d e7 06 | 38 6a 56 ed 6a ce 44 ea 5c f0 e5 ab 75 42 57 8c | 73 f2 e6 32 f6 2b 78 17 cc 77 d1 36 52 bb 7b 23 | 6f c5 5a f4 da 8c 20 ce 25 5e 2c b4 61 29 ba 22 | 7b 74 2f 22 bd 61 49 7e ed ee f8 95 fd 44 ae 87 | 6a 9a b0 84 48 37 7e bb 35 e6 e2 f6 4e 13 6b 95 | 47 4c 2d 6c a3 db 3d 5d ad 81 79 5f 80 e7 3e ed | bb b5 a8 97 95 f7 34 a1 ef 98 52 3c fa 6c 7f 37 | f7 78 d5 45 99 4e d1 38 57 29 2f b0 94 21 1c a5 | 4f 3d 71 d0 fc 88 a0 06 b8 26 ee 84 19 ff 4c 00 | 47 77 6c e4 d3 3a ee 07 05 6f 06 56 6c 1b 9a 2e | 15 bd 41 a6 3a 78 6e d5 2a 86 74 c6 d6 01 f5 e6 | 29 00 00 24 2a 8c 4f 9a ed e1 ff e1 d2 8e 39 06 | cc ef a0 3d 7a d8 6e 61 bc 37 8f e1 33 0d 03 68 | 11 db e1 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 61 e5 1f 89 e2 f9 a8 3f 54 c4 5a dc | 3f 1e 16 e7 e3 67 75 63 00 00 00 1c 00 00 40 05 | d2 37 e4 48 b8 f6 61 3d d7 15 bc 92 37 84 81 61 | b6 43 37 f7 | libevent_free: release ptr-libevent@0x7fb33801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800cc10 | #347 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f8 38 0d 6d 39 93 09 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #347 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #347 | rejected packet: | f8 38 0d 6d 39 93 09 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #347: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0512 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34000d120 | handling event EVENT_RETRANSMIT for parent state #348 | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #348 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #348 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49704.350513; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005199 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800cc10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #348 | libevent_malloc: new ptr-libevent@0x7fb33801a4e0 size 128 "road-eastnet-nonat-96" #348: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #348) | a7 7d 9d ff 1a 60 65 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ce d5 f5 8b 39 60 35 a5 25 70 07 1c 5c b5 0b 9d | 0f b2 5b 4a 01 34 b6 83 42 d7 d4 4c ad da 68 4a | 8b 4a 32 5f 36 06 f1 98 73 58 e9 72 c0 73 68 ca | 50 81 07 47 ff 17 19 96 47 97 94 3d f6 b6 04 3a | d9 53 26 2d 26 d4 5a 00 db 52 8b 30 4a 2f d3 5e | 57 21 6b c8 30 e6 41 d6 77 b5 33 c3 1e eb 09 f5 | f6 92 94 59 ce 0f f4 b6 13 a7 e6 12 2c 94 0a 0e | a5 49 7d ed 7d 57 a6 dd 0c c8 f5 e3 ab f6 df fb | 13 a2 c5 ce cd 5e 51 7c 83 34 62 82 09 e1 e3 72 | 31 4c 58 be 93 6e 60 9d a5 4a 65 3b 0e 6c 76 16 | ff b5 3c 17 b2 e3 b4 72 ba 47 1e 9f c9 b0 43 a7 | f0 b4 e5 71 a8 38 7d f3 55 a8 70 6c f5 0c ea e3 | 99 31 47 d9 67 2c ef 74 72 f0 71 8a 3c da e4 22 | d8 c1 06 32 4c 16 22 97 a9 d9 5c c1 eb 63 08 aa | 52 12 c2 6f 92 9a fe 31 31 61 1a 04 4f a6 29 e5 | bd ba 74 54 e9 68 1b 89 03 52 57 66 34 af 35 4f | 29 00 00 24 d4 8c 07 58 36 6c 0d 91 39 7f ba 4b | 55 80 94 2b 15 6a 3d d9 23 c6 de 68 59 32 ea bf | f7 3a e2 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c1 c6 46 d6 42 6c c3 80 0a 8c 20 90 | 81 74 5d e8 06 92 e7 f6 00 00 00 1c 00 00 40 05 | 5c 1e 6e a7 c5 99 b7 4d bd dd e2 f9 8e 11 ad b4 | 92 1e 01 ed | libevent_free: release ptr-libevent@0x7fb35c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000d120 | #348 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 7d 9d ff 1a 60 65 e1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #348 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #348 | rejected packet: | a7 7d 9d ff 1a 60 65 e1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #348: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0481 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c01da80 | handling event EVENT_RETRANSMIT for parent state #349 | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #349 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #349 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49704.457851; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007602 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #349 | libevent_malloc: new ptr-libevent@0x7fb35c04b850 size 128 "road-eastnet-nonat-97" #349: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #349) | 84 94 92 07 09 8b 01 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e7 8e 3a 36 94 c3 d9 80 af 87 82 89 a3 71 41 9f | e6 44 09 3c bc 67 77 29 06 f4 ae 77 a3 9d 60 1d | 0a c3 1b 6a f7 b0 e9 13 94 a5 ce ce a7 52 56 d7 | 84 e9 4e d5 99 7f 7c fb f5 b7 93 ee 65 0d 15 55 | 04 2d a2 78 15 79 38 de 23 c4 7d 82 d0 7f 5f 98 | a6 33 cb b9 33 39 5b 48 a5 eb 5c 5c 81 d0 ca 8c | f1 d5 2b 41 d5 80 88 70 6d 08 d5 9e c9 be 4a d6 | 16 61 b8 6d a8 4e 60 a2 94 6c 33 db 5b 42 45 bb | 02 30 28 9a 37 b4 00 e3 81 c4 fd 79 89 1a f9 a5 | 2d 14 0f 8f c7 04 8a 63 e3 4c c8 23 59 80 dd 4f | 13 40 1c 8c 06 1f 4a 77 c9 3e 21 20 cb 58 47 cb | c0 5d 53 b2 99 fb 04 a7 a3 35 71 6b 00 88 75 8a | 99 0c dd 71 02 4e 48 62 56 32 bf a2 8c b2 87 7c | 45 a3 56 eb 30 b8 7e 62 54 0f 19 2a 8e 1f 1c bd | cc fa 91 16 33 60 18 c9 3d f1 ea d9 79 83 28 b3 | ee b8 50 9e a8 3a a5 db fe df 37 7d ce de f7 60 | 29 00 00 24 8e 8f cc b6 0d fd cb ad 0f 95 32 a9 | a9 4b b8 56 89 46 30 eb 8f f5 1c d9 09 ec 14 75 | 5c 37 d2 fc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea f1 98 2b 6b f5 c7 7c ec d8 88 00 | 36 4b b7 7c e3 5b 66 cb 00 00 00 1c 00 00 40 05 | 49 36 ed 90 92 0a 38 5a 43 cd 17 7a 90 9b e6 10 | 1f ed 97 63 | libevent_free: release ptr-libevent@0x7fb35c02ec80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c01da80 | #349 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 84 94 92 07 09 8b 01 c4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #349 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #349 | rejected packet: | 84 94 92 07 09 8b 01 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #349: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12c40 | handling event EVENT_RETRANSMIT for parent state #350 | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #350 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #350 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49704.540158; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006171 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c01da80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #350 | libevent_malloc: new ptr-libevent@0x7fb35c02ec80 size 128 "road-eastnet-nonat-98" #350: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #350) | 40 3f 8a 6a 3f ea 6b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ee ea 5c 1b 2d cc 1b 57 9c 51 33 ce c2 ed 39 3b | d5 b7 1c c2 6d 3d 6f 5f ba 5c 85 39 fb a1 11 1d | ec 11 21 bd c2 b6 25 81 4a 85 2d 0f 85 73 9e fb | a1 4c 57 38 85 7e 31 44 0a 93 0c da 6d f0 93 22 | ea f6 8a 91 67 64 50 56 68 c0 c2 6d f2 4b e0 19 | 4b 14 40 46 ec 4d e3 7d d1 0f 0b 72 f6 ab 45 80 | 03 a2 d3 a8 ff e3 ae 4e 7b 0a 5c 1e da 4a b5 ed | 95 94 b9 4b 3c c2 85 4e cd 4a 91 b6 1f 72 c1 aa | c6 85 8f ca 28 3b ab 17 e7 f1 83 c4 ae 08 27 14 | 18 32 e7 a1 65 f1 da e5 f8 9c a1 45 4b c6 41 38 | 3d f5 8c c5 56 e5 06 ff b3 a3 fd f2 89 c2 8c 0e | 41 65 f9 6f e4 16 5e 64 06 38 6c 0e 32 c8 d5 26 | 50 db 25 f3 e4 e0 37 8b 04 62 7e a1 89 aa 8e 24 | 47 48 9e 92 05 5e 29 4c b7 2e ed e9 6d 8a 54 a2 | 85 8b e4 f5 76 e6 c8 0e c4 53 cb 98 41 4b 77 41 | 74 9f 3a d4 11 79 37 50 cf fb e2 04 ed 15 0c fe | 29 00 00 24 03 ee f5 21 ef 32 aa b5 bd 88 40 59 | 47 cc 90 0f 4b 5f 82 19 9f 96 a8 bf f3 8c 9d 85 | 66 d4 51 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 b2 cf 38 e9 ab 0b d5 10 0e c3 6c | 99 ae 6e 40 7a a8 97 3d 00 00 00 1c 00 00 40 05 | f6 5d 8e f9 dd 59 4b 5a 6d 88 5a 23 64 29 55 dd | f6 46 db 31 | libevent_free: release ptr-libevent@0x7fb380011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c40 | #350 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 40 3f 8a 6a 3f ea 6b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #350 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #350 | rejected packet: | 40 3f 8a 6a 3f ea 6b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 62 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-98" #350: ERROR: asynchronous network error report on eth0 (192.1.3.98:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000d120 | handling event EVENT_RETRANSMIT for parent state #351 | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #351 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #351 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49704.635486; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006005 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c40 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #351 | libevent_malloc: new ptr-libevent@0x7fb380011f30 size 128 "road-eastnet-nonat-99" #351: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #351) | de 65 5f af ec 9c 14 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 61 44 ff 3b 7e 79 78 30 98 a5 1d ec cd 39 0f | a6 1b 66 bf d1 4c f4 43 49 5b 37 74 a3 cb a8 c4 | 02 cd b2 04 1f 9b 50 46 08 d0 17 33 f5 19 85 e1 | a2 5a 8d ef 3b 1f 98 53 d1 3d 4a 2f ac 4f 19 d0 | 75 e8 7a 46 60 ff e1 45 61 55 45 47 1e ee 0e a7 | 97 fc 88 fd 13 ff 6e 23 a4 a1 77 61 b8 b4 8c fd | 22 67 ad f7 22 ca bf 94 41 28 f0 31 09 ce da 26 | 10 fa 8e 66 f4 04 b3 cf 07 07 c2 53 27 d6 cc 39 | 2e fc 33 61 76 a3 a9 c9 4a 2e 0c b9 d2 ce 1e 75 | 25 69 23 a7 b0 58 cb 85 2c 74 fd 6d 3e 51 8a ff | 12 ff 22 b0 95 e5 25 84 fd 26 ce 3e 10 f5 db d4 | fe ab 71 45 0f 50 b9 5c e4 ab 89 ce f3 bc f0 b4 | b1 6f 9b 78 15 e0 b4 c0 f6 ed 55 2b 17 d3 9e 21 | ed d2 5e 21 58 74 e4 d8 96 cd 20 e3 10 b4 fa 8b | 7f 1f 1a 01 c5 db 60 d3 81 25 a3 55 50 d2 42 6d | 88 7f 5d 84 22 e5 ff 47 18 aa ac 46 b6 f6 e6 e3 | 29 00 00 24 5e 0c 91 cb 9e cc c4 3b ec b3 88 06 | 52 11 4c 47 a6 59 04 4b 44 ce c4 33 03 72 36 ef | b1 45 a0 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 94 90 e3 e4 9d 06 64 22 91 ff 91 cd | 3f cb ba 24 72 7e a3 02 00 00 00 1c 00 00 40 05 | 98 60 2c ab 59 ec de c3 24 7f bd 6f 4e 02 75 9a | 41 d6 b1 3b | libevent_free: release ptr-libevent@0x7fb36001fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000d120 | #351 spent 0.16 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 65 5f af ec 9c 14 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #351 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #351 | rejected packet: | de 65 5f af ec 9c 14 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #351: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35002a9a0 | handling event EVENT_RETRANSMIT for parent state #352 | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #352 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #352 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49704.720885; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007067 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #352 | libevent_malloc: new ptr-libevent@0x7fb36001fd50 size 128 "road-eastnet-nonat-100" #352: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #352) | 3c 05 1d c4 fe 50 38 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 64 8b 09 fa 7a d8 0e 19 4a a4 83 62 a1 a5 5a | 68 fc 46 c2 41 24 c2 81 0b b7 86 21 9c 81 02 7e | 4c e7 e3 a1 0b b2 cb 85 40 50 15 e6 9b 8e ec db | 69 e6 fa 1a ac be 36 c2 a1 ef 3e db b6 5e 52 af | 7e 52 8f f4 e4 02 53 3c 7f 96 73 09 3f 4e 1d 14 | 6d c2 31 fa 5c 39 98 fc 2c b5 f5 9e 00 af 34 e4 | 5f b6 a3 65 94 fe 46 6a 1b e5 e1 4a 56 bd a5 cf | 0a 77 7e 2c 49 79 6d b8 e1 4a 50 3f 05 7c c4 09 | eb 02 3b 50 92 11 5f 9f 53 e6 1e bd 8d 02 31 1b | ce 66 73 68 3b 0d 47 9f bd 24 08 62 f6 ab c3 d7 | a4 43 e9 f4 a6 cc 3c 8d f5 af 10 2b 54 da 75 ae | 02 35 c6 d0 b8 2f b0 bf cd b2 cd e7 d2 23 bb 30 | 31 a6 56 6a 41 57 91 fb 46 1d ee de f8 63 bc 4e | 2b 81 4f df b1 c0 cc c0 21 f9 64 98 54 3d 15 93 | 9d f2 7c 39 a9 8b 0c c2 f7 bb 99 15 ac 9c c2 51 | 1b f2 0a ec 9e 8c 56 18 67 8a fb 62 ed 27 4d ad | 29 00 00 24 a2 bb a3 dc 18 69 ac 45 10 e2 b1 d4 | a3 1c d3 0a 99 a1 33 f7 93 76 f6 b4 72 bd d3 aa | d5 07 c1 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3d 31 52 a7 9d 89 a3 6a 1c 72 78 4c | e5 d1 1b 1c 74 f4 f6 22 00 00 00 1c 00 00 40 05 | fc b9 a7 1f 0a 98 43 79 23 71 2c ac b0 a5 bd 76 | ba 72 e4 ab | libevent_free: release ptr-libevent@0x7fb35003f4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35002a9a0 | #352 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c 05 1d c4 fe 50 38 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #352 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #352 | rejected packet: | 3c 05 1d c4 fe 50 38 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #352: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0491 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #353 | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #353 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #353 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49704.817243; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006733 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35002a9a0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #353 | libevent_malloc: new ptr-libevent@0x7fb35003f4e0 size 128 "road-eastnet-nonat-101" #353: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #353) | 5c b8 33 04 f9 07 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 8b 11 fb 47 ec 02 c4 cd 08 09 04 3c c8 57 b9 | e6 56 8a 75 16 cb 27 a3 a8 a8 cd 60 5a 5e 10 a0 | 4c ee d4 ee 70 90 76 03 9c dd ae bd 31 4c 66 16 | b3 e1 1d be 33 f8 41 0b c4 3c 71 6f 90 30 0f da | 26 bc 55 a4 9b 68 89 99 78 6a 9f bd 9b 59 ca 66 | 9f 28 bb 1c cf d9 04 9c 3f 50 e0 a8 9a c8 86 3c | 22 ad 41 27 f3 c4 bb fb ef e9 6e f8 88 7e 34 6e | 75 ca 2d 80 b4 0c d7 c1 72 ce 98 2e 70 ec 4e 80 | a8 95 d8 c8 1d 5c 97 5c c0 a0 b9 5c ac 3a c3 07 | 2c c5 07 1e 3d 08 d1 ba e4 93 f5 5b dd cb 89 0a | 36 eb de 45 ac 11 de 24 b8 2b b2 28 d9 84 7e 81 | 6c e6 ca 34 e5 ab 3a f5 d9 8f 51 9e f8 46 26 92 | bb e9 13 c3 32 db 48 bf d1 a9 ef 9e d6 1f 7a 90 | cf e0 f7 95 4c 0f 73 ac 90 00 08 6f f7 6f bb 88 | dc 53 20 17 f7 7a 4b e1 b0 e3 53 ab c1 68 9e bb | 8c bb e3 6d 1e 44 fc 28 be 03 40 b8 4e ff ea 55 | 29 00 00 24 d0 f4 4a 20 b5 18 6c ce 45 6d d4 e9 | 3d b2 3f bf 9f b6 c1 be 4d 22 b8 3f d5 b7 20 9c | 7a 5b 5b 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 c3 92 4c 0f 96 63 0f 6f bc 3d e6 | 99 69 47 3f a6 34 81 2c 00 00 00 1c 00 00 40 05 | ce 29 c6 74 fd 99 32 be d7 3c ba 39 8c e5 64 d3 | 17 27 91 5a | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #353 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c b8 33 04 f9 07 ca 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #353 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #353 | rejected packet: | 5c b8 33 04 f9 07 ca 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 65 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-101" #353: ERROR: asynchronous network error report on eth0 (192.1.3.101:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #354 | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #354 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #354 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49704.868622; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005845 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #354 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 "road-eastnet-nonat-102" #354: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #354) | 72 4c 85 c6 74 09 42 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 1b e9 65 bc 73 bc c5 81 57 1a 7b 1b db 4b 3f | 32 d5 0d b7 6a 65 f1 0a 67 34 33 c1 2c 23 e5 f2 | 41 57 12 1f 62 7d 04 aa d4 c7 47 71 78 e8 f0 df | 48 86 0b 9f 4e 36 6e 72 bd ec 74 1b dd 83 0a ab | df 0b c7 29 5d 45 26 d8 31 4b 64 db c5 65 76 90 | cd 52 7e 2d 27 67 7a 01 34 ba b6 3f e3 9a 85 48 | e4 51 41 5f 21 41 ff 88 e4 cc aa c0 b6 13 70 92 | 13 45 bf db 76 ed 1c 31 eb 2b 1f af 38 c5 ca 82 | 0b fb bb d7 57 27 bd 26 60 cb 6b 22 18 4a df 09 | ae e5 bd 33 88 7d ef 21 1c 95 13 3d a5 02 60 08 | e7 d2 1b 72 0a 7b aa 01 9d 47 2a 4d 32 3f 9b ec | 5b 5a ea 31 68 bb 1a dc 15 be 3d d6 a0 c0 98 db | 7b 5b 3d 8f ce 9b 6c 43 56 11 be e1 16 78 07 0a | 06 29 bd c7 77 7e 17 95 3a 22 27 47 9f 23 32 f6 | 37 27 d0 b4 53 1e 36 9f c8 05 75 2f 68 c9 35 72 | da 2e a9 d1 44 f4 35 64 d4 0a 4b c0 71 73 52 a8 | 29 00 00 24 72 5c 82 6f 5d 6b bd 69 39 4b 52 31 | 75 ca 0e e7 64 bc 08 f8 b5 d4 6f 1f bc a5 fc 80 | 56 52 35 49 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 33 77 7a c0 93 c5 bf 78 5c 8c bc | 79 60 cc b9 7e aa 2e bb 00 00 00 1c 00 00 40 05 | df 4b d5 4e cf 64 0d 4d 4f 32 d9 61 e4 8d 05 c9 | 9f e3 12 70 | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #354 spent 0.128 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 72 4c 85 c6 74 09 42 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #354 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #354 | rejected packet: | 72 4c 85 c6 74 09 42 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #354: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0483 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46adb080 | handling event EVENT_RETRANSMIT for parent state #355 | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #355 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #355 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49704.945954; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006499 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #355 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 "road-eastnet-nonat-103" #355: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #355) | 56 ed c8 71 de f9 06 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fc 2a 83 b1 26 56 49 8c fe 5f bd b2 84 ea a3 88 | a4 f8 b8 d9 ec 49 43 44 95 bd 12 f2 c5 21 82 10 | 03 69 98 1b 4a 24 1f ea 40 8a 0b 91 c9 76 5c 49 | d4 99 e0 74 0f 3f ee 6f 9e 53 54 1a 23 35 59 5a | aa 59 0d cf 6b cd 1c a1 eb 6c 98 6c 37 17 d0 f8 | 3c dc 93 d2 77 45 41 e8 99 25 82 ad 9d 55 e6 13 | c0 f1 0d 8b 61 04 8f 57 63 d5 98 2e 2e 99 6e 3b | 2e 7c 41 b8 5b 06 ba ad 18 18 aa 84 1a 4c 4a ef | 3b 6e c9 03 be ae 7b 01 5e 77 a6 2b 34 36 7e 21 | 7f c5 d3 9e 48 69 2b 5b 00 e3 c7 29 41 93 4a 4f | 3f 0c 86 c3 a8 9a b3 72 ca 66 fb a6 7b 68 f9 97 | 45 bd 92 5e ee 7e 28 d2 1e 8d 24 ad 5b 2c db 57 | 1e 74 10 aa 41 ab d2 f5 21 4c 56 2b c7 8f ce 5e | d8 69 da 43 89 31 85 08 6d d1 b2 1a 22 1c fe b0 | 36 38 83 b8 45 19 23 bb 71 3e 12 a0 c1 d4 c6 f9 | 92 4b 6b b1 a2 bb 20 eb ff a0 77 69 c4 c9 35 d8 | 29 00 00 24 c0 01 1a b2 54 fa cf 80 10 d0 f3 31 | e6 0e 79 92 f9 e8 de f5 3e 1e d4 6a 54 e0 c2 2f | 19 27 3a 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 da f6 01 f4 40 01 a7 a7 77 b7 fc | 3d b7 6f 1f f7 90 79 11 00 00 00 1c 00 00 40 05 | d2 9a 8c 84 e0 9c 3f 77 ed a7 98 65 71 77 a0 dc | b3 15 95 be | libevent_free: release ptr-libevent@0x7fb378035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adb080 | #355 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 56 ed c8 71 de f9 06 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #355 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #355 | rejected packet: | 56 ed c8 71 de f9 06 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #355: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38400feb0 | handling event EVENT_RETRANSMIT for parent state #356 | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #356 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #356 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49705.034274; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006309 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adb080 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #356 | libevent_malloc: new ptr-libevent@0x7fb378035930 size 128 "road-eastnet-nonat-104" #356: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #356) | ac bc fb 64 b8 05 f9 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9e 3b ae 20 ec 7a cd 21 f9 ff e0 06 71 c2 e5 55 | 9b 45 49 5f 50 f5 30 9c 0b 3e 8a a2 28 f4 85 c7 | 4f 6f 8c f6 77 7f 00 15 6e 19 1d d1 e0 68 66 87 | 4e df 9c 72 ac b2 8d ab fe f6 05 78 0d c2 c2 f2 | 31 63 92 17 54 19 b6 cf fd 16 6a d8 32 67 48 40 | 84 9f 47 99 c0 29 49 ad 8d 18 53 a5 6f ce c9 03 | 2a bd 3e e5 4f fd 0e 59 73 26 a7 73 de 18 dc 8d | 09 79 73 ae 09 17 25 e9 44 ce 32 60 cd df 52 37 | 66 e2 fc 8e a8 ff 6f bc 73 d9 a9 e6 7e 34 29 30 | c0 25 f8 37 35 6d fc d1 5a 42 45 e2 29 19 ad 5e | b1 89 0e dc 25 33 50 a2 38 82 4f ae e6 4f c3 97 | 55 76 c2 67 8a 3e ac 3d 84 f3 32 ca 54 cc 1c 9f | 23 91 a9 44 f4 93 a5 2a aa cc ed 04 01 4e eb f5 | 00 ac f3 c1 d5 2f 9a 43 89 cf f2 f2 55 7d 1d 3b | d4 57 90 a2 11 f9 23 83 ee a6 72 aa 3b 95 a5 9a | f2 6e 4c 51 df 03 55 77 ff 21 15 db 98 87 cc e3 | 29 00 00 24 80 41 9d 85 d0 e1 49 10 c1 0f c3 d9 | f1 36 ea c7 60 65 b3 e5 0e 51 88 57 20 76 d9 47 | 30 46 2c b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 1f 59 ee ab 85 d8 d4 4a d4 96 c0 | ee 5f a4 59 2f 4a 72 17 00 00 00 1c 00 00 40 05 | 04 5f 5b a5 b0 c4 89 9e 39 c9 c6 97 69 9e e5 9e | 19 14 82 3e | libevent_free: release ptr-libevent@0x7fb3840266d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400feb0 | #356 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac bc fb 64 b8 05 f9 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #356 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #356 | rejected packet: | ac bc fb 64 b8 05 f9 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #356: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0627 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #357 | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #357 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #357 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49705.105659; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006056 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400feb0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #357 | libevent_malloc: new ptr-libevent@0x7fb3840266d0 size 128 "road-eastnet-nonat-105" #357: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #357) | 01 73 53 b2 ed 0d 4f 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 71 5d e8 51 f8 88 2e 8f 82 b3 f0 c5 8d a9 64 a4 | a0 30 bf b5 c2 12 6f 84 86 c4 e5 7c 43 ef 90 df | 5d 9c 5c c9 94 45 36 f4 9a c7 87 0d ff 17 4f a4 | bd 30 02 23 c4 49 d7 cd 90 90 63 b2 f0 74 82 ef | 7b ab 5b 1a 9b 56 e3 fd 6b c1 60 57 a4 3d 47 37 | cf 84 69 51 e7 0c 33 60 a6 88 c6 d3 40 f2 c0 67 | 8b b5 93 bc 89 96 e7 49 3d 16 a4 fa 47 99 08 bb | bf 76 ad cc b2 29 51 14 b3 93 c1 93 70 ab fa 85 | 9c 87 13 3b 74 20 3c a9 9f e8 37 97 e1 cf 3a 19 | 47 ba 4f bf 93 41 7a fe 94 33 ee 81 fb be 0f 8d | 00 a6 62 b8 8f 57 b3 51 57 ec 11 f0 29 c2 98 0d | c4 d2 cf 4a 38 f9 e9 bb 93 44 3a af 7c 9c 77 58 | 65 26 12 0d 96 b7 42 97 54 c0 ec f8 c4 63 9f c0 | 21 fc 89 98 11 d0 25 94 6e 52 89 6d 61 9b 1b e0 | 4a d8 54 ed 06 da f5 4b d3 dd 7c 2c 10 b9 6d 1c | a3 ef f1 ff a5 e4 02 74 f7 b0 97 d7 72 10 8b a3 | 29 00 00 24 2c c1 df 10 e0 1b 6c 08 e6 87 0f da | 7b 1d fc 5a dc 06 9f d4 9a 8b 4f 0e 09 60 b7 78 | 83 2e 36 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 be 3a 2f 62 a9 83 16 c4 9b 57 fc 3c | bc 9e d0 29 41 57 58 a4 00 00 00 1c 00 00 40 05 | 08 0b c8 d5 d5 c0 e6 e6 c4 8a f3 fb 5c 3f c5 0a | 4e c8 f0 d0 | libevent_free: release ptr-libevent@0x7fb37002eb80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #357 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 01 73 53 b2 ed 0d 4f 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #357 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #357 | rejected packet: | 01 73 53 b2 ed 0d 4f 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #357: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0472 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_RETRANSMIT for parent state #358 | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #358 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #358 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49705.190968; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006667 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #358 | libevent_malloc: new ptr-libevent@0x7fb37002eb80 size 128 "road-eastnet-nonat-106" #358: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #358) | 9c 16 21 10 e3 b0 2f 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 b0 5e 24 2c 38 69 f7 5e 0a ef 9c cd 0c a9 a2 | e7 60 22 31 02 17 4e 87 ab da 67 2c 74 68 e6 5c | 3c 13 72 b8 82 de 1f 97 f0 91 0b ef 5f 05 b5 88 | 8f 55 10 d6 ed 84 95 00 12 6f 2a 48 1a 79 36 91 | 49 04 49 1e 83 7f 51 0b cd 40 c4 12 1d 28 81 4a | ff 1e be db 2c 06 48 44 01 2b 86 9e 50 88 79 26 | a2 fe 2d b6 28 25 0f 1c 72 e5 7c 02 81 23 76 48 | e4 63 77 54 94 1c a2 42 e7 62 79 1a 9c c2 d3 a5 | 84 2a 02 f0 5d 86 de 0c ac 44 c1 bc a9 db 93 da | ab e8 d1 96 60 b7 1e 28 8e ce cc cb 77 fb 32 3a | af 1c d9 5d 2b 9d 4c bb 37 50 e3 2c 2a bd a4 df | 6f 99 23 0d 27 83 b0 b4 f9 48 a2 69 86 2e 3a c0 | 5d bf ed 94 bb f2 f3 07 e1 00 d8 2f 62 9b ee ec | b5 9a a1 3e ac 61 be 8a ce 7d 14 b6 c3 13 21 43 | 2f 85 9a 2f fd b3 5f a3 b2 e0 9c 9a 19 21 fa dc | c3 c9 17 3d e7 0b 51 07 b0 13 9d cf 7d 38 e5 ef | 29 00 00 24 31 6e a1 8e 9b bf 74 40 01 d9 c6 2f | f4 95 5e 1f af be c9 b5 67 9c 79 1e 7d 41 57 e9 | 2e 59 a1 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 2b df 62 51 b1 0d 46 7a 83 b8 02 | 18 9c 1e 91 3d 80 67 46 00 00 00 1c 00 00 40 05 | 21 2b d2 d4 2f 80 55 47 29 a9 2f db 69 80 68 e4 | e7 d9 41 df | libevent_free: release ptr-libevent@0x7fb370035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | #358 spent 0.139 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9c 16 21 10 e3 b0 2f 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #358 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #358 | rejected packet: | 9c 16 21 10 e3 b0 2f 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-106" #358: ERROR: asynchronous network error report on eth0 (192.1.3.106:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0489 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad4380 | handling event EVENT_RETRANSMIT for parent state #359 | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #359 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #359 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49705.264284; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.0048 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #359 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 "road-eastnet-nonat-107" #359: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #359) | 73 c2 2a a2 cb e2 3d 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ae 2e 83 fc d4 94 f1 45 60 7e d6 c0 1f 1c e7 33 | 0f bd b7 8a 76 4b 8b 45 55 e6 bb 84 3d 22 78 af | 75 6e da ff d0 e9 4b 87 08 80 14 e9 1e 9e bb 0e | 16 e9 ea 66 ca bd 7c 66 87 ad a8 d9 21 e1 38 83 | 1f 32 ef a7 2f 0e bf 2d 1d 63 39 6b 83 61 62 c6 | 3e 6a a6 28 e7 8f 0a b3 a0 d9 53 fb be 77 6d 21 | 33 ab c4 d4 01 99 45 77 31 5e 2f ff 5a 01 15 07 | d7 80 2f 1a 7e c3 c0 54 fe ea 5a 9f 7b b7 54 0e | 9f aa da f6 69 55 9a 24 0b a7 e8 7e 52 f9 f8 78 | ba 68 8d a1 bc 1f b0 9f 73 b4 50 08 1b 93 cf 3c | ca 2c f0 94 b0 7c a2 eb fc f9 ec 95 a0 6e 85 2f | 2e ef 23 90 9d 23 ef b2 33 25 ac 56 cb 51 63 74 | c1 ab 1f 93 d7 e6 e0 11 36 c8 47 24 fc 03 91 1a | 9f ca af ad 3e 92 13 be 1e e3 b4 78 2a ad 4c d9 | b9 b1 7c 5e 5e 7c 3e c4 e0 d5 55 d6 b9 f7 15 83 | 2f 6c 01 ee d5 14 3b f0 0d dd 1e 11 8b 30 cd e0 | 29 00 00 24 69 b6 35 41 69 53 97 ba 18 48 44 fd | d5 e2 9a 31 05 82 94 36 da fb c0 91 72 56 36 c7 | c4 dd c7 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 a1 1b b6 5c a0 e8 d3 82 8b cf 19 | 85 69 c3 9f 45 ea 96 77 00 00 00 1c 00 00 40 05 | 5b ca 3a 7b b0 51 af 81 eb d5 3c 03 e7 f7 fa 57 | 2f 45 5b b9 | libevent_free: release ptr-libevent@0x7fb37002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad4380 | #359 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 73 c2 2a a2 cb e2 3d 7a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #359 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #359 | rejected packet: | 73 c2 2a a2 cb e2 3d 7a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #359: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35800d120 | handling event EVENT_RETRANSMIT for parent state #360 | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #360 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #360 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49705.354619; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008135 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad4380 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #360 | libevent_malloc: new ptr-libevent@0x7fb37002a950 size 128 "road-eastnet-nonat-108" #360: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #360) | e8 ba f7 ac 97 7a d7 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 a7 6a 2f 0e 47 4f c5 a2 87 88 1c 76 27 25 53 | 18 cf 29 be de 65 a5 ec fa 8e ba d5 95 70 46 1a | 5e 82 ee 5e ea 78 6c 5e e1 5a ba c3 42 fa 62 85 | 96 61 49 94 e4 26 35 02 12 7e c3 49 17 01 2e ad | da 08 aa 31 5d 07 3f 11 e2 3e a1 55 1e 97 51 1d | 21 13 8f d7 77 02 f2 6a 5f 3a a3 ad 67 d3 b3 fe | 4d bc 3d 87 97 56 a8 ed 5e 65 2d 59 2c 08 c6 f6 | e3 33 48 1e c9 5b 10 68 f5 80 0a de 74 5b 48 d5 | 12 63 cb 81 c8 06 b2 4b 2a 11 1e ef 99 9b bd 96 | 3d 2d 68 30 3c a5 df b7 7c b9 96 9a 90 b4 80 82 | 7f 32 39 5b 15 a6 11 ef 5c ad af 36 92 59 32 87 | 1f b6 1c c4 37 ef 0e 8f d4 cd 1f 34 87 b5 54 45 | 4f b4 69 d7 3d 68 0c fa bd 14 4f 0f ca d9 05 b6 | 6c 12 d4 47 46 2e 28 86 0e 8a 52 14 fe d2 d6 83 | e9 62 c7 35 25 a1 d0 50 cc af ac b0 fd 2d 90 37 | 95 46 1a 19 98 e1 af 75 ba a4 1b aa b9 40 54 be | 29 00 00 24 1b 6f 95 ad 44 06 60 87 4d 33 ad b6 | 0a 54 4e 5c c3 38 27 ff 28 86 c4 a8 14 ff fc 45 | 4c 10 47 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 71 5e 67 a4 d4 de c3 91 7e 75 5e | 86 6a 2f 03 c9 58 fc 3e 00 00 00 1c 00 00 40 05 | 42 65 a4 4c 2a f8 3a 2c 53 a5 43 50 55 9d ce 16 | 71 5f ac c0 | libevent_free: release ptr-libevent@0x7fb358012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800d120 | #360 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 ba f7 ac 97 7a d7 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #360 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #360 | rejected packet: | e8 ba f7 ac 97 7a d7 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-108" #360: ERROR: asynchronous network error report on eth0 (192.1.3.108:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #361 | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #361 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #361 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49705.424912; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.010253 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #361 | libevent_malloc: new ptr-libevent@0x7fb358012840 size 128 "road-eastnet-nonat-109" #361: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #361) | 9c f5 2d c8 50 35 55 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe f7 f3 f1 6a 76 6a 9a e6 0e 10 b4 e5 b5 16 07 | 0f 90 8a f4 dc 9f 27 b0 2a 41 17 f0 21 60 87 50 | 11 a6 84 2e 86 94 e1 65 4d 1a 59 ce 11 45 d2 c5 | 09 df ce 0a 2c f9 3e 7e cb 59 88 eb 93 1a 26 06 | 39 22 a5 57 b6 f2 5b 4c fe 56 6a 26 49 df e6 84 | b9 e4 e4 41 19 a0 e8 70 69 c2 51 79 76 2e 80 40 | 6f 9e 4b a9 87 c2 02 65 d3 3e 05 60 b6 af 86 d7 | 52 3c 7a 52 e9 69 b8 2a e6 43 99 6c 72 d9 7c 1a | 8d c9 5b fb a3 c2 fc 51 d5 fc c8 85 ff 46 8f 64 | e3 d3 a7 99 28 b1 43 6d 9b 9d 50 e1 af 1a d6 ff | 7e fd 10 23 a2 a6 f9 9b d2 06 fa 0f 91 01 67 9f | 42 43 ac e6 4f ae 3e 00 59 5d 7a cf b3 59 12 67 | 0d c1 86 cf 82 5d 20 9e 98 97 ec b2 7e be 63 74 | b3 15 a1 c0 63 a7 5d 61 bb b3 2f 2d 42 15 59 57 | 72 ca 0b d8 9e d0 1b 84 91 fd db 5e 8f 2f 62 ed | 99 8c a3 a5 ec ef 08 26 6f ab 64 68 6b 97 9d 3e | 29 00 00 24 5d 7a 1f c2 56 77 bf 60 f2 37 f5 ed | 4d 94 c3 a6 58 e2 5f 6e 1b f6 b4 76 e5 69 0c 98 | 27 55 cd c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 71 91 34 7a e2 ba d5 01 f3 c5 56 | ba 5f 83 71 00 17 86 15 00 00 00 1c 00 00 40 05 | e0 46 0d f9 99 b9 47 b4 35 a0 04 20 4b 9b 45 ee | 1c f7 92 53 | libevent_free: release ptr-libevent@0x7fb348023e80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #361 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9c f5 2d c8 50 35 55 d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #361 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #361 | rejected packet: | 9c f5 2d c8 50 35 55 d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #361: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0741 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #362 | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #362 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #362 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49705.527343; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005963 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #362 | libevent_malloc: new ptr-libevent@0x7fb348023e80 size 128 "road-eastnet-nonat-110" #362: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #362) | 79 e0 7b db bf e0 df 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 58 27 86 c5 f9 8c cf 89 68 d1 9e c2 2a c8 4a | da 7d d8 07 8a b5 64 43 22 f7 a6 30 97 ca b8 f5 | c8 25 5f 3f d2 8e be 62 d3 8d 6c cf 71 bf 76 63 | d9 07 8d b1 c5 9f c3 a7 b8 7e e5 00 03 0b c1 0d | 22 f4 89 95 0c d8 00 e4 8c ba a0 1b ac fa 89 c6 | 67 62 f6 a7 e4 8c 4f c8 c7 77 79 53 f8 98 39 2d | 3b 30 0a e1 da cb f1 fc f0 30 13 27 47 13 e0 65 | 0b da e5 87 6f 0e 6c c0 89 03 ab 2a 82 c5 34 95 | 15 34 67 de 5a aa b5 07 35 bc 95 aa 82 00 b1 16 | 8e 6b 21 e0 45 a5 66 95 6e 83 16 8f 2b ee 03 ef | 02 de 36 db b0 c0 f4 e2 d2 1e 0d be d8 91 f7 72 | cd 14 33 51 64 d5 dd d5 3d 65 70 28 c3 2f 57 3f | 4b 4b d5 8c f2 92 b3 0c 9f 8d a0 2f 9a 5f 9d a8 | 0d ae cd 5e 77 75 b7 48 bb 27 68 90 7e 0e 8d 10 | 86 bf a4 47 df bb 7b cb 34 23 b8 08 15 f3 7f 6d | 51 d5 ae f8 b3 60 44 e0 56 71 c5 a9 57 5a 24 c6 | 29 00 00 24 3b 79 7f e5 5c de f0 ae 26 7a 15 81 | 35 42 e6 f3 1d 66 3a 94 36 41 6a 99 ae e0 a8 96 | 08 73 ec d2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 91 48 5f b0 47 d4 61 2c f1 27 03 | 24 75 2b 95 c4 3a 3e 58 00 00 00 1c 00 00 40 05 | ec 66 fb 7f d2 86 12 b1 2b 4e 47 12 62 c8 23 32 | 13 d6 12 8d | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #362 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 79 e0 7b db bf e0 df 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #362 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #362 | rejected packet: | 79 e0 7b db bf e0 df 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #362: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25cc0 | handling event EVENT_RETRANSMIT for parent state #363 | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #363 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #363 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49705.595659; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007256 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #363 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 "road-eastnet-nonat-111" #363: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #363) | 51 61 7f 08 48 15 06 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 a4 74 58 c5 f7 d1 13 97 f0 a1 32 ec ba 3b 12 | 2a d1 a7 2b 3c 6a 89 b1 af 9f ef 60 99 3f 2b 97 | 5a 99 67 3e 04 49 9e e1 18 dd 5b 9a 36 f4 31 c2 | 53 fb e0 15 b1 f1 17 18 c0 6a ef 59 2d 9b 43 90 | f2 8c 3e 64 6c 64 9b 41 4d c8 83 ed 81 03 01 ef | 94 98 ac cb 77 3f 19 e2 3d 9a 98 04 76 6b 13 b3 | cd 7b 90 ce b0 33 d0 e1 b7 52 ee 6b 51 23 7a ea | a8 cb 6b 19 dd 2c 75 92 bf 4f 96 8d 61 90 60 ba | ac 55 20 f8 f6 10 ca 5a 43 53 71 3b 48 a8 5f 63 | 88 26 59 cb be 95 f5 90 58 5a 07 1f 8c 1f 49 2e | ab c9 b4 33 89 02 d4 f8 ad 34 05 81 7c 83 7c ee | b9 f5 ea 3c 82 86 1f 8e fd dd f8 79 c6 1d d2 66 | eb 43 cd 6b f4 5d 2f 21 06 e6 55 35 36 2a fc 16 | 28 b4 a8 e2 ec 6d b6 b7 1a 42 16 71 43 4d 93 a5 | b9 be 7c 8b c2 15 e3 5b 72 eb 03 26 dc 93 d9 17 | b6 f6 7f 82 7f 35 e0 76 a8 41 7c 2a 12 6a fc 61 | 29 00 00 24 05 ae 65 e3 84 b1 1a 26 06 06 7b dc | a8 83 38 36 54 1a c8 5b 72 97 b6 83 dc f9 79 7c | dc 6e a1 e8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 05 ad f7 99 b0 88 ad 41 82 57 31 | e5 ff 67 18 3e 77 ff e2 00 00 00 1c 00 00 40 05 | a3 ac d5 a3 ef 34 92 9f a8 df c6 0f 83 0b 12 93 | d2 32 5e d3 | libevent_free: release ptr-libevent@0x7fb38802c0a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25cc0 | #363 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 61 7f 08 48 15 06 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #363 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #363 | rejected packet: | 51 61 7f 08 48 15 06 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #363: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fa300 | handling event EVENT_RETRANSMIT for parent state #364 | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #364 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #364 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49705.658937; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006945 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25cc0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #364 | libevent_malloc: new ptr-libevent@0x7fb38802c0a0 size 128 "road-eastnet-nonat-112" #364: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #364) | 33 be fb 4e a0 1f 6e f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 2a 42 5d a7 d8 6e 30 43 82 cd c7 8b 99 36 58 | d8 cb c2 34 66 ff 8a 30 2d b5 6a f0 e0 25 f9 40 | 18 b9 ba e3 e0 90 ff f4 cd 9b 1b 34 38 ee bc bc | a0 41 ef 4f 47 94 f5 37 14 2e 5c 6e 0f a6 94 db | 88 81 75 e1 ca 78 c8 9f 91 97 49 cc 62 0b 7c 24 | 05 6f 34 9d ba a1 13 0a 58 7e 2f 7a ad f7 32 fc | 1d 0c 87 25 75 e1 21 b8 48 fb 8f 7c d6 35 a3 1a | ae f0 b3 f0 3b da b9 9b f9 3d d2 6d c0 fe 81 68 | c2 c7 a1 4c 73 5e 1c b4 3a 58 ed b8 29 5f 91 4a | f8 66 00 af 13 4e e2 0d 66 a8 97 6e 0e 81 4f 92 | 8c 69 2c e3 38 08 3d ee 34 5d c4 0d 5d 92 19 a0 | ed a9 9d c5 1f 5c c0 55 9f 77 6e f9 34 95 4c 9a | 1b 67 cf ca 63 f1 13 a2 4f fd 39 a9 a7 28 45 69 | a8 39 46 14 38 17 c4 c7 52 5d 03 e8 bd 24 28 07 | 48 28 79 7d f7 c5 f9 df 10 a1 d2 ba 0c 72 5c 57 | de c7 d6 50 9c eb 46 ad 18 84 34 9f f7 a9 0f 36 | 29 00 00 24 57 1c 59 6e 8c 59 64 04 26 7e c7 7d | 57 3e 20 cd ce 8c 1c 54 8d 44 77 eb 53 6a 1b 23 | 5a 68 d6 45 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 22 b7 ef ef bc 35 4f 63 6b 7a c6 35 | bb 1f b7 d6 68 94 93 4f 00 00 00 1c 00 00 40 05 | 20 e3 22 42 33 64 b9 da db 7f 44 ff d7 76 e4 71 | c9 1d dc 40 | libevent_free: release ptr-libevent@0x7fb34c03a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fa300 | #364 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 be fb 4e a0 1f 6e f8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #364 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #364 | rejected packet: | 33 be fb 4e a0 1f 6e f8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #364: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b07dc0 | handling event EVENT_RETRANSMIT for parent state #365 | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #365 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #365 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49705.727497; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005486 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fa300 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #365 | libevent_malloc: new ptr-libevent@0x7fb34c03a770 size 128 "road-eastnet-nonat-113" #365: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #365) | 85 67 19 58 d7 3c f0 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 c9 07 e2 a7 25 a6 09 ab 7f e9 5d 7e 7f 47 e1 | 9f 44 d1 91 14 4d 9b 8f 5d 22 2a 52 a8 98 ff b2 | 6b 6a b0 36 7f fd 95 da a0 25 8f 6e 16 7f 04 38 | 86 c2 bd 33 bf fc a5 26 c4 b6 f6 70 3e fd c6 4a | 25 c8 b3 a8 9f a8 44 89 83 a1 8c aa b8 af 7f e3 | 16 bb 17 56 79 89 e8 f0 01 49 b8 07 c4 c2 fd 27 | 4f 8e 62 66 4b 11 2b 01 9f f2 8c 2a 44 d1 a6 b0 | 37 65 5b 66 a4 8d e5 2d a7 91 fd e3 72 91 ef 62 | 52 0e c8 e1 f3 04 05 43 a3 3a 3c 61 1b d7 eb bd | 6b 38 06 f9 ff f3 a7 b2 e7 89 6b 9c da 79 fc be | 85 2e 71 9d 7f 61 aa 1d 41 bd c5 f4 78 4a e7 2c | 3d fa 74 f7 ca 33 00 f8 ee a6 a8 8a 16 63 2d 1b | 61 9d fa 4c a8 ca 3a 31 b1 cd 60 8d cb 56 88 b6 | 81 05 15 ed cf 3d b4 c9 19 7e d9 8d 29 23 d3 64 | ec 0b 35 05 39 3b e0 f1 75 19 f5 f3 4f 99 e8 61 | bd bd 06 53 be 50 6f 6a cb bc 2d c6 18 e6 53 b2 | 29 00 00 24 e5 25 b4 c0 9c 12 3e 53 68 a2 43 fb | 88 db 47 7b b4 96 4d ec 31 20 f7 c3 1c a9 eb e1 | 62 8a 8b 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 90 3b 10 25 ca fe 1f 3b 58 67 93 fa | 3d a3 98 00 cc 36 84 a7 00 00 00 1c 00 00 40 05 | 55 c6 52 e3 aa aa 60 c0 64 26 bb 2b 79 4e a4 42 | 73 1e 76 57 | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b07dc0 | #365 spent 0.182 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 67 19 58 d7 3c f0 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #365 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #365 | rejected packet: | 85 67 19 58 d7 3c f0 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #365: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0521 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3840489a0 | handling event EVENT_RETRANSMIT for parent state #366 | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #366 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #366 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49705.789847; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005727 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #366 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 "road-eastnet-nonat-114" #366: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #366) | 3c e6 10 56 de c7 50 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 fc d0 2b 58 ad f1 9a aa 82 c0 57 ae f0 46 70 | a2 7b 22 23 65 30 fe 9c 0d f5 dc 40 c0 ca 9d ee | 6e 66 1d 3a 72 fe dc 88 4a 26 55 69 91 41 bf 12 | 90 50 78 9a 3c 37 7a d2 58 65 01 98 28 27 ba 6d | 00 33 b4 2e 8f 98 78 f3 cd 21 f0 18 dd 51 cb 68 | 4f 92 9d 38 c4 06 c1 6c cf 60 41 a1 18 22 f2 93 | 34 0c 55 d7 b5 30 6c c4 9c ad 0a aa 9b 11 9f 59 | 49 ac e6 72 dc 82 61 fc 42 ea d8 0b 5d 7d f2 47 | 0f e6 10 b9 1d c6 85 40 80 3f b3 ee 0f dc 82 fa | 53 40 f0 d9 23 6a 65 60 f3 d7 02 47 6c 0a 6f 61 | 8d 04 17 7d 94 9e 17 80 39 4f b5 db 2d a0 f8 02 | 18 21 68 7d 0e af 20 98 75 39 40 4d 5d 87 d7 7b | 4c 39 3b 20 a9 65 05 04 46 a1 49 0b d9 6d 8f 15 | 4f b4 23 1a 8e 5f 27 66 f0 b0 a6 bd 48 dc 96 c2 | 77 e2 b0 72 b6 2c 19 2f 16 65 ef 29 dd a3 4a de | 9a 82 38 c8 cb 37 99 80 5e bb 4b 53 97 7b f3 fa | 29 00 00 24 7a ad 39 64 9f ec c1 f8 33 94 44 40 | f7 c9 dd b2 6b e5 21 16 26 39 73 9d cd 0b f5 7a | f4 93 09 bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 12 7d c7 e4 80 f6 ae d0 f3 0f 94 | c9 99 cc 19 2a ad fe 8d 00 00 00 1c 00 00 40 05 | 84 74 fa e2 ee 48 6b 8a 7f a7 09 f6 4e 00 6d 26 | 52 0f f6 08 | libevent_free: release ptr-libevent@0x7fb384036e20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840489a0 | #366 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3c e6 10 56 de c7 50 ef | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #366 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #366 | rejected packet: | 3c e6 10 56 de c7 50 ef 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #366: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0665 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2e150 | handling event EVENT_RETRANSMIT for parent state #367 | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #367 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #367 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49705.851213; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006354 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840489a0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #367 | libevent_malloc: new ptr-libevent@0x7fb384036e20 size 128 "road-eastnet-nonat-115" #367: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #367) | 4a 87 68 98 60 e9 4c f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 0c 97 07 ab 60 f0 87 17 3b e3 ad e6 c0 a4 f8 | bc d0 84 fc 55 d2 65 d6 9f 46 ab 63 b9 cd 86 a7 | 92 52 2d 61 57 c8 33 96 bd 3f e7 29 4c c0 56 81 | 07 2c a6 2e b4 e1 f4 a2 f9 92 52 0a 37 04 e4 51 | 6e 83 7a 8b f6 b0 a9 33 fc 7e 63 8b 04 cb e8 b1 | 89 da ba 9d 79 52 4b 77 ad fe 01 ca be 34 71 25 | 01 b7 c6 b7 a4 d2 8b 5a 4f 28 3e 3a 2c 2d 2b 82 | b6 7f 76 80 3a 8d 21 5e c2 27 da 9c 35 b4 28 8d | 4f 12 52 38 3a d3 0a 5c 8a f9 8f 79 8d 25 d4 f8 | ed f0 27 a3 9a 91 9a 23 17 a2 c5 fb 5c 81 c7 3f | d7 90 16 5d 16 d9 fd c2 ab 94 11 66 13 b9 42 50 | 61 f5 f7 53 fa 66 74 a0 35 1a 38 cb 76 13 72 7a | 71 f8 95 99 2b 70 57 e9 96 87 e1 a7 fa 09 46 16 | 2d 17 ab 0f b3 e3 6d 7d c4 71 f7 b9 01 3d 53 ec | 89 99 23 9b ed fe dc 3d 96 90 a5 f1 6b a2 7c ad | 08 22 28 21 90 c0 9d 24 98 36 19 8c 8e 5f 64 f3 | 29 00 00 24 cc 21 72 ec 84 1b 6c bc be 58 98 1b | fd b2 70 93 97 ae 8a 73 25 e3 f3 ed 6f 6f ad a0 | a3 bc 74 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 20 17 ba 74 ed cb 3d 19 9d 8d 0a | 7d 3c 02 99 ce fc 27 96 00 00 00 1c 00 00 40 05 | be d4 1c 69 d6 46 df 94 c0 c1 0d 02 c5 30 14 7a | ff f7 b4 bf | libevent_free: release ptr-libevent@0x7fb3440407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2e150 | #367 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 87 68 98 60 e9 4c f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #367 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #367 | rejected packet: | 4a 87 68 98 60 e9 4c f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #367: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38000f8f0 | handling event EVENT_RETRANSMIT for parent state #368 | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #368 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #368 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49705.920539; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005928 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2e150 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #368 | libevent_malloc: new ptr-libevent@0x7fb3440407f0 size 128 "road-eastnet-nonat-116" #368: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #368) | af 44 01 88 e6 16 c8 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 fe d2 29 cf 90 27 2d 78 45 a2 b1 3a ed 0c 48 | 17 b4 e8 54 dd 68 cf 7e 09 7a af 17 ed 4f 89 f8 | c0 ff 46 bb 6c a6 b3 38 fd f1 d2 cc cf d4 db c1 | e0 88 fe 51 49 6d e3 71 01 85 fe f4 a5 9f 85 04 | b6 d1 25 1f bd d7 ec 86 d1 7c 74 4d 2b 88 9b 37 | 88 75 91 51 15 43 e3 94 29 7a fc 34 e7 47 6b 09 | 3f 68 5a af 07 68 67 15 d9 ca f4 fd c3 d0 6c 2d | 70 40 4e 4a 88 cf b4 8b 6f 34 77 1b fd 2c ac c0 | b5 ab 67 28 d7 0d cf 79 56 41 4a ee e4 5c 59 e9 | 16 2d 45 df 3b 83 50 77 d1 1d 25 2e df 41 d7 96 | e0 ae 3d 15 c2 fb 47 fc 22 43 64 51 9d 2b 27 9e | ef d5 13 c7 bc a8 df 51 ba 9e 32 c3 d2 0e 3d 97 | 23 9a d8 1c 93 38 85 21 ff 2a 81 20 c2 e1 c5 96 | 9d d3 5f 74 e3 dc ae 9a 19 d8 eb 6f 38 2d 11 55 | b9 c5 4b fe 45 56 61 1b 03 ae 41 5d 20 26 7b b4 | dd 4c d4 57 72 8f 74 07 75 75 35 67 ae 9c b4 2d | 29 00 00 24 b4 f8 c7 8c ce d2 25 cc 04 b1 28 85 | 4c 50 50 1c af 66 c6 a8 14 6b b6 e9 07 eb 31 8e | 06 0d 7b dd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 4f 54 9f 13 b7 58 02 6e 4f 8f 36 | 8b d5 61 f1 61 e4 53 15 00 00 00 1c 00 00 40 05 | 79 7d 7e 8e 6a 0e d7 b1 f9 8e 14 46 7c 3e c2 fe | 69 34 3d 95 | libevent_free: release ptr-libevent@0x7fb3800211f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | #368 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 44 01 88 e6 16 c8 e2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #368 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #368 | rejected packet: | af 44 01 88 e6 16 c8 e2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #368: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf50 | handling event EVENT_RETRANSMIT for parent state #369 | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #369 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #369 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49705.980856; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005953 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #369 | libevent_malloc: new ptr-libevent@0x7fb3800211f0 size 128 "road-eastnet-nonat-117" #369: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #369) | ff 18 31 cc 83 7e 2e ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 1f 06 e6 7b ea 4e 17 1c 87 7d 86 73 80 47 50 | cf bf e2 ff 09 37 6a 25 2d 87 f4 71 22 38 1c ca | 11 79 43 67 c5 65 1f f5 07 47 33 ad 73 a4 d3 73 | 51 54 fd df 5a c2 8d 18 cb cc 20 72 8e 07 68 eb | b6 8d ab 31 ba fd fa 9b 7c 59 57 b3 71 f1 91 34 | ea 4b 70 52 a4 6c eb 12 7d 01 23 58 56 9a d3 c0 | a8 35 4b 27 63 af ee d0 37 dd c7 3e 45 5a 0b 60 | bd 6d ed c4 e9 d9 c1 d7 e1 29 a2 3f dc 2c af 7c | e6 74 73 2b 26 15 ca 1c f5 95 b6 33 2f 8c 4a 22 | a1 8d d2 aa 72 d0 9b 41 c8 87 a6 d7 f8 13 c7 cd | 3c d8 62 e2 fc 64 74 ed 50 b1 79 e3 79 44 21 85 | 12 8f 6c 07 3b 37 80 9b 8c 83 41 c0 0e 38 b7 92 | 75 a7 4a 89 81 43 56 e9 67 ee 43 e0 24 9b 53 75 | b9 e5 d1 27 c1 f4 c3 83 7c 57 e4 5e 33 8b e2 10 | c9 ec fe 76 73 25 ae 4b 87 a7 e2 e5 89 5a 08 72 | fc 88 9c 69 9c 14 55 be f9 d1 24 d2 2a 6b bd 35 | 29 00 00 24 03 b6 58 fc c8 79 29 fe 43 44 80 31 | 59 cf 11 77 19 87 27 44 32 ac 84 44 78 ab c0 33 | d7 16 05 58 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a fa 34 e9 cb c2 b8 b0 71 3e db 9c | 1e f7 0a 0e 8d a9 9b 92 00 00 00 1c 00 00 40 05 | c3 12 1d 90 39 27 a3 80 ba dc 3c b0 c3 6a 52 2a | 1e d7 c5 9b | libevent_free: release ptr-libevent@0x7fb34c0293f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf50 | #369 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ff 18 31 cc 83 7e 2e ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #369 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #369 | rejected packet: | ff 18 31 cc 83 7e 2e ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #369: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388043350 | handling event EVENT_RETRANSMIT for parent state #370 | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #370 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #370 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49706.041125; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007326 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf50 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #370 | libevent_malloc: new ptr-libevent@0x7fb34c0293f0 size 128 "road-eastnet-nonat-118" #370: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #370) | 4a 80 23 ad fc 41 99 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 13 bc 42 a7 35 39 b2 99 5a ec 69 08 73 18 3f | fe 31 dc bf 22 23 10 df 50 13 8d 04 9e ea 66 93 | 98 fa 79 7f 64 34 1f da 27 d5 8f dc 20 be 18 56 | 17 0e c5 53 3e a4 18 ed 82 41 0e 7f 91 9c e6 cb | ef 35 45 6e 59 c7 b5 4d 35 32 d9 63 30 b7 dd 5d | 28 28 04 d3 d6 a5 84 6f 4c f3 94 90 75 da df 42 | 5a 65 b6 2e cd 5e 42 3b 71 3e 46 f7 4b 13 d1 aa | a5 9c 11 b7 2c 83 34 92 e3 55 46 0b 4b 42 12 08 | 06 02 c9 42 46 42 d0 f1 82 14 36 15 1e 2e d4 a0 | 23 35 a8 d9 5e c2 f8 ca da 81 45 00 34 f6 88 47 | 2f 60 cc ac c2 4b 39 55 8a 1b 8f 66 b3 43 72 fd | 59 52 11 ef 5c 2c 9e b7 b7 6a c6 60 eb 22 9a 4d | e9 c0 4b de 56 c3 d3 e4 19 f0 86 9f a5 38 ef 26 | 39 fb ac 6e b8 32 45 c4 d1 f5 cc bb b2 2f 7b 0b | 6b 6b b1 6f 27 b1 bb 88 e7 c4 d6 31 26 e0 94 2a | ae 90 aa 75 e5 cb 3e 1f 43 13 d3 7b 3c ed 1e b0 | 29 00 00 24 a0 6f 08 ca 5f 92 e1 a2 10 08 5a 34 | 7d b6 05 db 65 e8 3d 88 a0 b3 7d 19 ed 75 36 c4 | 95 ec 9c 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 38 cd 57 b0 33 db 6c e3 f5 95 3e | 28 5e 17 44 43 d3 05 33 00 00 00 1c 00 00 40 05 | 6f b1 ce a1 45 d5 bc 6f 48 f8 db 92 31 a1 28 9a | ba c8 a7 2b | libevent_free: release ptr-libevent@0x7fb37c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388043350 | #370 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 80 23 ad fc 41 99 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #370 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #370 | rejected packet: | 4a 80 23 ad fc 41 99 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #370: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0674 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38800c4b0 | handling event EVENT_RETRANSMIT for parent state #371 | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #371 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #371 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49706.102493; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008299 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388043350 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #371 | libevent_malloc: new ptr-libevent@0x7fb37c00cf80 size 128 "road-eastnet-nonat-119" #371: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #371) | ea d3 d9 fc 5b 7e b4 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 af 47 0e 69 de 58 3a 2d 1e 57 76 30 bc 22 a4 | 2e b6 88 1e b3 88 e7 a1 c8 be 2b 4e 69 e2 28 01 | d0 52 c1 fa 78 94 10 52 aa 87 89 5a 02 a4 2d d1 | 6b d9 9b 86 d2 da a0 98 26 8e b9 2f 8a a2 27 af | de 72 28 ad 98 97 b6 15 90 9c ae 3a 16 ae 38 00 | 2e 00 fb 22 bb 46 e6 d4 1f 46 0d dd a1 55 00 4a | ce 15 02 1f 97 d1 0a 8b 6a 9c c8 a8 24 2f 84 76 | 4b d2 ac 8c 05 c7 63 26 60 5d b2 3c e7 66 a9 5d | bd fb b9 24 84 be 9f 9f d0 98 db 75 76 42 5a 2c | 99 3f 96 7c cd 86 57 c4 8b f7 47 04 8d 56 1e 36 | 87 53 98 86 58 32 c9 ce 17 26 19 6b 99 a4 da aa | cb 3c 40 8e 29 32 f1 cd b7 5a 34 1f de 2b 31 8c | 0d 44 f0 ee 94 1a 31 39 88 2c 28 df 02 20 48 5d | 9d 67 4b c6 5a 1a 30 81 19 09 4e 1b ac 9d a3 80 | 78 a7 b1 0a 79 f2 60 13 6a a0 1a 0d 01 b3 b3 40 | 74 bb ba 1f 20 2b 3c 36 9e 56 74 1c ba 16 9e 5f | 29 00 00 24 c2 25 48 18 a9 32 86 16 98 b5 8a 9d | 56 ab 3c 59 82 6e f2 93 a8 6a ca 20 09 df d9 6f | aa 1d 6f e0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 eb 88 f4 ae c4 a3 7b f7 07 ac 42 | 0d c0 83 df c2 98 39 e6 00 00 00 1c 00 00 40 05 | 0c 73 7d f6 90 2f 67 26 fc 28 2f df 9c 80 3e da | bc 60 3a 9d | libevent_free: release ptr-libevent@0x7fb38803c430 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800c4b0 | #371 spent 0.174 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea d3 d9 fc 5b 7e b4 e6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #371 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #371 | rejected packet: | ea d3 d9 fc 5b 7e b4 e6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 77 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-119" #371: ERROR: asynchronous network error report on eth0 (192.1.3.119:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0617 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c046090 | handling event EVENT_RETRANSMIT for parent state #372 | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #372 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #372 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49706.168882; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006136 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800c4b0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #372 | libevent_malloc: new ptr-libevent@0x7fb38803c430 size 128 "road-eastnet-nonat-120" #372: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #372) | 36 75 19 e8 2f 22 a4 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 1c 43 17 d7 b5 ce d2 b8 29 b2 bf 57 09 8b a5 | 02 ac c4 b7 76 e6 2d d8 ee ee 3c fe f4 66 f4 89 | f0 05 d4 6f 70 58 f2 ac a3 f6 a0 c0 6f e2 88 9c | 40 3f 21 b6 b5 e3 53 20 6c d9 59 5c d3 ed 29 31 | 70 b1 e2 00 f7 0a fb f6 8a 39 29 d2 58 c2 74 92 | 4c 9b 08 3f 44 b8 04 b0 23 1d ad 99 96 41 5c c3 | 74 17 1f 67 0a d8 d1 96 a3 e0 b8 c3 31 5e 35 15 | b4 7d 07 ac 51 6c 39 25 b1 04 61 4c b1 08 c3 a9 | 03 2e 6c 07 f6 12 ea 26 ae ed 42 10 86 bf 00 1f | 2c 3f d3 c3 05 31 1b 23 d0 7f 44 40 17 23 be b1 | ac f2 d9 5c 2d 0f 0e 8d d6 8e 02 9e c2 0d 39 2a | 1e 53 92 9d 45 7f f8 25 a0 3b 40 14 ce aa d7 8e | 3c 97 d8 0a 68 34 c5 e0 01 c0 9d 3c df ab b9 db | 0f 08 4e 9b 7f 31 ba b0 df 14 c3 2e b6 43 df 9c | e8 24 93 e8 93 fa be d8 05 20 58 54 dc 18 b6 a1 | 81 c2 54 d8 9d 63 fd 0b 60 e1 78 75 ef 13 d9 ec | 29 00 00 24 5b 70 e2 22 fb be c5 61 40 e7 92 1f | fe 03 7b 3d 26 2b 9e 50 62 fe 14 ef 7e 0b e5 c1 | 7b 5b 83 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6f bb b6 72 03 25 00 b3 08 33 f3 00 | 3f a7 05 f9 e6 64 00 bb 00 00 00 1c 00 00 40 05 | 5c 2b 76 69 54 27 3e cb 36 ec 86 9b 13 f7 89 7b | 0b 66 55 89 | libevent_free: release ptr-libevent@0x7fb37c023f10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c046090 | #372 spent 0.157 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 75 19 e8 2f 22 a4 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #372 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #372 | rejected packet: | 36 75 19 e8 2f 22 a4 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #372: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0777 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8d840 | handling event EVENT_RETRANSMIT for parent state #373 | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #373 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #373 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49706.243284; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00742 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c046090 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #373 | libevent_malloc: new ptr-libevent@0x7fb37c023f10 size 128 "road-eastnet-nonat-121" #373: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #373) | cc d0 7c e3 2d ba 98 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba c9 ec 57 66 ee 6d 75 ec 00 31 9e bb a2 7b 33 | 03 5b e1 5f f9 35 33 83 7e 5f 91 5b a2 92 9a a8 | 8d 3b 36 89 d7 60 3c f0 e0 82 e5 11 6e 43 23 b1 | df d6 90 8f 04 61 87 4f 48 d6 55 c3 74 01 c3 05 | 74 78 5b 86 ae c3 d1 0f 5a c9 e4 c5 26 fd 8f 0b | 7a de b0 bf fa 77 b7 99 27 6d 94 68 54 8f 2e b4 | 27 fc 46 a6 65 3e f8 0d 42 f0 50 03 21 b0 cd 96 | 2d 45 e2 17 2e 0c 5d ab 5d cf b0 76 7e 40 37 71 | ec c6 7f c3 8e c1 e3 0c da 69 0c bb 78 ac ef e6 | fa da 64 48 00 9c 0f d4 5e 3f fd b4 84 a9 1f 83 | f8 16 28 f3 f1 a7 fd f1 9e 6b cf 4b 33 5a 08 dd | 8d d5 23 ac 66 10 69 36 aa 87 aa ab ed ab 68 36 | 4a 70 e5 64 3a 2f 37 bf 5e 42 b9 8e 12 99 78 f7 | 0c 24 39 a4 0c ff 5c 9e b7 31 00 75 be b4 85 09 | f6 93 ec eb a2 a7 69 50 c8 7a 9b 97 aa 4c fd 91 | 2c 8c 14 31 ec 08 42 84 d3 a9 ed d2 74 47 99 ae | 29 00 00 24 b4 0d dc 4f 11 5b a4 50 84 d3 92 d3 | f6 ef 85 ab 3e d2 da 12 30 2f 73 8e 10 d5 43 df | 1d 88 10 ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 85 d9 5b 1c 2d 07 c4 07 50 eb 06 | 15 5f 19 1f ba 90 46 a0 00 00 00 1c 00 00 40 05 | bb 4b 15 0f 4a b6 b1 9b ec 46 e5 86 fe 18 d0 b4 | dc 99 60 c7 | libevent_free: release ptr-libevent@0x7fb338023e10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8d840 | #373 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc d0 7c e3 2d ba 98 af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #373 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #373 | rejected packet: | cc d0 7c e3 2d ba 98 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #373: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.047 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad43c0 | handling event EVENT_RETRANSMIT for parent state #374 | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #374 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #374 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49706.296576; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006494 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8d840 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #374 | libevent_malloc: new ptr-libevent@0x7fb338023e10 size 128 "road-eastnet-nonat-122" #374: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #374) | 2b af 1b 03 10 38 37 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 c3 14 06 9b d8 f1 99 49 48 ff 90 1f 86 00 28 | 44 18 8a f8 52 dc 7d 04 1b d5 bc 43 4d 6c cb 67 | f8 0d 9d 6d d0 66 c5 1d 7e 62 70 73 1c 71 41 b4 | dd 81 08 b3 22 a9 c5 05 00 35 5b 00 07 16 93 d5 | 94 c1 6c 23 e3 4f fb cc 11 67 47 b3 e1 b1 07 89 | ea c0 9e a2 65 96 87 08 be 34 63 54 73 84 17 c6 | d1 75 fb 5b 8e 80 b1 4e bc e5 80 b5 fc 51 6b 8e | af 49 e6 d5 05 a1 42 3f 30 13 b7 fe 10 06 81 bc | 26 72 22 45 7f 9f 88 7e f2 4d d6 4b 6d 85 6b 06 | 69 00 b6 2d 19 97 b0 06 ca c7 30 d2 02 d3 f6 37 | 5e 73 21 4a 86 ec 60 ca fd d2 ed d8 05 2b db 6c | a9 01 2a 23 f7 1d d9 64 5b e9 5e 20 76 8d 16 0a | bf cd f0 54 2a 72 e9 f6 56 5e 90 80 56 52 68 ca | 9f 40 22 7c 1e b1 d0 73 7b 7b 65 7f 5f 3b b2 a4 | 2d 12 04 bd 89 d0 f1 f1 ba b3 be 3d 20 c5 f8 84 | bc fa 4d 90 8e a5 a8 51 48 43 7b 6c ed ea 9f e0 | 29 00 00 24 8b e7 71 0b f0 6c d4 66 d8 89 de 00 | 61 f0 41 76 89 f5 bb 07 5f 2d 78 ac d6 5e eb 30 | 2f 0d 98 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 37 47 83 86 42 9b 81 4e c6 41 b6 | af 4f 24 3f ee d6 bb bd 00 00 00 1c 00 00 40 05 | 2f d6 db c3 63 be 1c 54 fe 3c c7 2a 35 82 32 22 | 47 30 b2 bc | libevent_free: release ptr-libevent@0x7fb36c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad43c0 | #374 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2b af 1b 03 10 38 37 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #374 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #374 | rejected packet: | 2b af 1b 03 10 38 37 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #374: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0664 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338012bf0 | handling event EVENT_RETRANSMIT for parent state #375 | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #375 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #375 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49706.359928; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006629 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad43c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #375 | libevent_malloc: new ptr-libevent@0x7fb36c04b7c0 size 128 "road-eastnet-nonat-123" #375: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #375) | a4 09 26 11 42 9e 51 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b 77 05 ad 49 62 16 46 be f5 65 08 84 ad 14 8b | 54 2c 99 1d e2 97 87 23 80 81 89 f0 4c d0 eb 92 | 7b 0b 4f bb c5 8e f0 7c 4a e9 4e f5 41 3b c0 9c | 84 74 7a 28 42 6c 3e a3 44 ba 29 11 96 09 9b f3 | 38 05 36 bd 24 dc d4 f1 69 9a 67 13 96 b5 cc 0e | 5b 85 9c bc 45 e5 5b 70 a0 86 01 2f a9 6f b7 16 | e5 8c 0d ae 1d 65 f5 53 d8 97 9b 0e 3c f7 8c b4 | 84 cb c7 3a c6 10 40 ea de 5f 63 4c 12 d8 3f ca | 6d 62 70 f0 93 72 e5 53 fe e2 f7 48 e3 16 ec 2c | 0c 51 77 44 87 3b cf 71 6a 9d b3 31 8e cc be f2 | 83 ce be c0 12 f1 01 88 ca 5d f3 fc 95 bc f7 5a | 34 7b 8e 4b 02 d0 59 3f ca a0 78 bc ef 69 51 e1 | 59 c6 1a ee b3 5f f4 fe ba ab aa 32 83 46 24 8b | 44 0a ac 7f 47 be 12 69 64 f5 8a a0 c3 66 33 2a | d1 fe cd 2b 6e fd 1c 22 43 71 36 d1 05 aa f3 a0 | 34 64 36 1b 5f af f2 60 88 b6 fd ad 79 17 84 9b | 29 00 00 24 a2 f8 9d 2f 08 fe df 02 8f a0 29 1e | b3 67 52 e4 00 d5 8c 7f 4e 12 c2 f7 f5 b4 05 71 | a4 8b 3b 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 12 2b 6b 99 24 aa d2 31 8d d6 a9 cf | 86 3d 5f d7 43 66 7f 91 00 00 00 1c 00 00 40 05 | 3d 40 65 0f bf b0 2e 03 30 63 c3 7a f7 f2 38 a3 | 20 e1 e4 b2 | libevent_free: release ptr-libevent@0x7fb3540407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338012bf0 | #375 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 09 26 11 42 9e 51 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #375 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #375 | rejected packet: | a4 09 26 11 42 9e 51 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-123" #375: ERROR: asynchronous network error report on eth0 (192.1.3.123:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0735 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #376 | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #376 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #376 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49706.425277; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006462 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338012bf0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #376 | libevent_malloc: new ptr-libevent@0x7fb3540407f0 size 128 "road-eastnet-nonat-124" #376: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #376) | ea 6d 1c 44 16 cc 7c db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 30 8d f2 73 36 66 21 18 72 ab a6 1d 5b ca 9c | 0a 7e 8f ea 73 27 8a 58 d5 e4 26 95 19 96 87 0c | 7f 07 37 1c 70 d2 60 3e 98 51 eb 57 bf 72 e0 8c | 84 ad 4f b6 dc 5c 36 41 e2 77 e0 9c 8d 51 16 fc | 84 d9 54 f9 85 4d 98 72 f2 d6 3d 1b 19 f0 da ce | ab 3f 23 52 e0 3a 3c 0f e9 38 61 5a c2 41 30 12 | 05 82 0c cb c8 c2 1e a1 4f f2 c3 e1 3d da 41 26 | 24 be f6 af 3e e8 2f 87 ee 1b 93 a1 f0 e9 53 da | 3a 2e 85 7e d2 d0 a7 3b eb 29 ab 65 b7 78 9f f6 | c5 fd a3 19 78 40 8c d9 48 7b 2c 4c e7 26 6f 53 | d3 ac b1 b4 ba da af d2 ab 50 63 75 e1 1d 99 d0 | b8 31 ac 7d e7 18 55 91 d3 ac 44 fc d3 74 62 7f | ce 91 66 95 28 b3 47 a1 94 fd 56 15 40 09 da b9 | 56 ba 99 10 ef 74 77 7b 2d 9f e1 06 40 6f 4c 27 | 16 1c 00 6e 75 bf e7 e8 68 0b d5 e5 14 e8 f6 62 | 49 c7 45 85 8e da 35 35 ec 65 cf 2e 56 35 57 b4 | 29 00 00 24 b2 22 59 8f 2f 17 3c be 86 a7 a1 89 | a7 cd 11 4f 04 a8 63 56 c2 46 93 de 35 e3 be b3 | 5b e4 fb 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 92 73 25 29 4a e6 52 0b aa f7 7d 73 | 68 37 ec c6 59 a7 02 18 00 00 00 1c 00 00 40 05 | a9 5a 00 6b 7f 85 e1 a6 d7 c4 fa 5e b7 b1 99 68 | fa 78 21 65 | libevent_free: release ptr-libevent@0x7fb3840060f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | #376 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 6d 1c 44 16 cc 7c db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #376 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #376 | rejected packet: | ea 6d 1c 44 16 cc 7c db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #376: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a23110 | handling event EVENT_RETRANSMIT for parent state #377 | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #377 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #377 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49706.490643; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006886 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #377 | libevent_malloc: new ptr-libevent@0x7fb3840060f0 size 128 "road-eastnet-nonat-125" #377: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #377) | 7d b7 6a 31 9c d6 86 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 bf 7a 35 d2 37 1e c0 a2 92 6a 98 80 72 24 5e | 1f 3c b2 01 23 5f 15 bf ce e9 e4 d7 08 a3 2a 60 | 60 1e 2a e8 5a e7 a9 d5 87 39 6d 3f 34 3f c0 1b | ca fe dc 77 c6 7e 84 64 73 35 57 0c ed b5 74 11 | bb 72 6b af 00 a6 5c 48 1d a9 ae e0 21 6e f9 6c | fe 77 59 9f 79 f0 27 e3 f8 d3 03 12 c5 8c 01 06 | 76 43 6f e7 91 25 19 a3 05 2c 5f 40 7b 60 ce d6 | c7 0a 22 7e c1 15 e4 29 ab c3 9b 6d 58 d6 08 88 | eb 2e fc 26 54 22 7d d9 71 73 77 93 47 47 52 c7 | 2f be 59 30 ba ca e1 78 87 6d cb 35 72 6f 4d 3b | a0 93 98 95 e4 6c 43 b1 50 a4 aa 69 98 d4 ed e8 | 9d 30 82 39 85 51 32 50 b9 91 12 7b 77 d2 d0 9f | 64 b8 21 58 96 89 58 eb 1b a0 e3 48 15 3e 58 3b | 7f 5d 13 52 09 44 ad 12 73 77 70 1d 29 a3 72 c1 | 6f bc 36 26 b2 07 f9 32 34 75 b2 cb 8d 27 b8 92 | 36 ef 06 e2 e3 5e 94 66 19 de e4 ee 30 db 10 64 | 29 00 00 24 40 c7 66 20 2c ab 25 81 a4 29 77 75 | 63 eb 29 35 21 bb d9 a5 a3 5d 38 ec 5b 5c 03 34 | 11 83 53 07 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 20 88 86 59 0d 66 18 17 be e2 6d | 8e c3 55 fc 50 ba 92 3e 00 00 00 1c 00 00 40 05 | a3 24 68 23 82 72 27 ee 2c 96 9c 16 80 ee e0 88 | 08 9f bc a7 | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23110 | #377 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d b7 6a 31 9c d6 86 e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #377 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #377 | rejected packet: | 7d b7 6a 31 9c d6 86 e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #377: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0634 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab3980 | handling event EVENT_RETRANSMIT for parent state #378 | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #378 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #378 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49706.56803; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007427 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23110 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #378 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 "road-eastnet-nonat-126" #378: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #378) | 92 97 bf d9 57 64 2b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 7e 95 c3 59 64 68 1e dc 08 f2 0b df c0 d3 85 | e4 57 68 76 f4 90 dc 14 fc b4 13 07 10 44 a8 8d | 11 66 84 12 ea 03 ab ca df 00 f5 13 ba 15 16 97 | c3 ae f2 09 b4 c2 1e 65 f4 d4 ef 76 85 ff a3 4a | ac ec 61 57 66 09 9f 4c b2 b0 4b 1a 98 fe 62 e6 | 55 f4 45 b9 db aa 2b bf cb d7 f6 c7 03 42 ad 34 | c6 d8 65 c8 40 fd 09 2c 94 7c 3b f3 2f 0a 0e 1d | 89 ee 1f 04 2f 4d 06 ee d1 19 c4 2e 99 32 3d c2 | d8 62 64 5d 3c 19 32 29 e6 a4 d4 41 97 46 6e 74 | 98 69 50 bd e9 22 20 c8 a0 94 d0 e1 2c ac e0 d4 | 3d 6d 89 f8 65 d2 f8 6c 5d 07 8b 5f be 6f 9f a2 | e3 9a 7d 49 fc a1 b3 f5 34 84 25 08 1b bf 82 69 | 97 0b c6 17 ae 91 38 6f 37 30 af 60 73 cd d7 76 | 1c 53 8a ed 55 8d 3b a6 b0 09 19 d4 bd 91 ad 63 | d2 44 97 69 9c 25 f2 23 5f d4 fb c5 78 47 07 23 | 75 fb 33 32 09 b8 13 e4 4b fc ad 29 45 c0 60 e8 | 29 00 00 24 45 ad fc 22 10 a1 61 46 e5 0c 1e 06 | 27 43 7b e2 4e f3 c7 89 82 92 48 5f 08 ae ee 54 | 20 02 7f 19 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb d4 ce a5 02 7b 5e 75 a8 72 0f 9e | 6c 02 05 b4 a6 0e 08 51 00 00 00 1c 00 00 40 05 | 67 63 47 aa c8 01 74 31 fc 9f e6 c6 9d 96 80 21 | f6 7a 37 28 | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3980 | #378 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 97 bf d9 57 64 2b d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #378 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #378 | rejected packet: | 92 97 bf d9 57 64 2b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #378: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #379 | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #379 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #379 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49706.663374; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005239 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3980 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #379 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 "road-eastnet-nonat-127" #379: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #379) | ac d4 3b e7 18 ea 52 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 79 a1 28 22 6c 83 3f 06 54 d9 39 13 0e d2 1a | 91 c2 ca c5 f2 c4 4e d5 78 8f 04 34 b9 34 73 b2 | 0e 75 71 ec 03 a6 5b c6 fa 6d a8 f4 41 1e af 26 | a4 e1 0a 58 77 48 aa f7 f9 4b 31 cf 6b f4 65 97 | 07 66 c4 32 08 bd d1 a1 48 aa 20 4b 65 4e 17 6e | 1d 1d 3e be b4 1e 7a 49 6a 64 0a fb 44 89 ba 45 | 90 86 8a 0e 4e 08 c0 05 da d1 a0 ff 5a ee c2 33 | ff d9 1a 6f ee 08 fd 7e aa 64 53 f4 84 74 c5 cf | 19 1a 29 d4 bf 47 bd 52 17 99 38 57 75 f7 85 58 | a7 b0 c8 4e e1 95 2d 4b f1 9c 5e eb 85 14 0d 87 | ff dd 17 9a ad 51 c0 99 e2 a6 60 c5 a5 7e 68 46 | b9 5c 04 3b 76 a0 9e 3d f7 9a 42 72 b5 92 be a4 | 61 c4 dd 5e a0 a3 58 05 90 20 32 7d b8 9d ca 34 | 36 d3 6d 56 98 49 60 97 da 87 f8 14 51 ea cf 16 | 79 9b 7d e5 00 7a 74 76 25 99 77 5a ef df a7 1c | e5 07 de ab dc 8b 19 85 17 de fd 62 d8 d6 3b b0 | 29 00 00 24 7a e9 60 d7 4c 8b 32 bf 82 0a a8 9a | c0 af 7e 52 e6 dc b9 f1 3b fb 0d 8e 4f c7 9d 86 | 5c d7 7a af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8b e2 54 69 3e 49 d9 e9 7b 2c 62 f7 | a1 9b 3b a0 68 bf 42 11 00 00 00 1c 00 00 40 05 | 0c ab 0f ab 0f 86 37 d7 85 f7 e9 a7 f4 f2 01 1e | 28 ca 40 2a | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #379 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ac d4 3b e7 18 ea 52 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #379 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #379 | rejected packet: | ac d4 3b e7 18 ea 52 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #379: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a4bfd0 | handling event EVENT_RETRANSMIT for parent state #380 | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #380 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #380 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49706.752833; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006655 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #380 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 "road-eastnet-nonat-128" #380: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #380) | 8c 85 b9 1f be 6e 3d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 1e de d9 e8 4b 77 f1 86 35 82 03 5f ce 7b cb | 0a c9 87 87 aa 3a 74 01 02 fc e1 64 e0 07 7c 06 | dd ed c8 68 23 d7 e1 98 d6 47 ab 77 d0 38 d7 b3 | 2e d4 c4 52 2d e3 2c bc 34 35 8e 16 9e 83 9d 76 | 9f cc 43 a2 24 c5 ff 0f ed 32 bf e5 c9 3b bb e7 | a4 cc 2a 54 79 4f 13 6e 29 6d 75 36 6c 87 01 9c | 1f e0 d3 9f 4c c1 24 b9 2b d8 7b fa 2a d1 70 cc | f1 73 67 12 91 0a 83 03 b6 96 60 5a f8 fb a0 1a | 92 b6 0c fb e9 77 6e a8 e9 d4 02 be 0d 82 27 ba | 20 48 7d ed 5d 31 52 4a 59 63 6f 7e c4 3e 2e ac | 5e 97 a4 c4 d3 ae 3d fa a4 3b fb c2 de b4 5c 6c | f2 4a 19 f4 47 5a 00 3f 78 e7 bc 36 32 f4 d0 ce | 7c 2d 58 ca fa c4 cc 95 9e a4 78 b5 2d fd 23 cb | 2a 9d bc 7a 8a bb 88 97 8b fb 82 e5 e3 af 23 95 | 4e ed 5d 7c 45 af c0 e7 bb 20 cb e5 da 63 b4 54 | a8 b6 35 4f 40 f2 02 b1 8a 9f 38 00 e7 8b 27 93 | 29 00 00 24 e9 59 12 f8 16 a7 9f df 69 ae 67 26 | 7d 68 3d f0 e8 95 32 e5 ac 44 49 ce 96 5b 71 84 | 56 84 ec f2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d 47 26 04 c2 b4 0a 38 20 0b c5 38 | 8f 45 ae 49 d1 6f dd cf 00 00 00 1c 00 00 40 05 | 48 d9 a4 21 0f e8 6e ab 23 f4 84 7b 2a 45 72 13 | eb 6b 5f 3a | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4bfd0 | #380 spent 0.124 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c 85 b9 1f be 6e 3d 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #380 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #380 | rejected packet: | 8c 85 b9 1f be 6e 3d 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #380: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380015160 | handling event EVENT_RETRANSMIT for parent state #381 | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #381 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #381 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49706.838196; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006659 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a4bfd0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #381 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 "road-eastnet-nonat-129" #381: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #381) | 1e fb 19 74 69 81 f6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f 15 4d 3c 26 b9 8e 71 c8 4c 65 3c 93 c4 f8 5c | 0c 69 48 07 1f b0 40 db 39 45 4f 12 5d b7 64 ce | f6 36 76 d1 4f f2 c3 d5 d1 3f c7 4e dd 69 ef bd | 2e 06 de 7f fb 43 32 b5 94 31 7c 96 1c 09 3c 05 | c9 f9 e9 6e f6 32 3d b2 3f 7a 40 e8 05 db 42 df | 50 a9 3b 1b be f2 2b d2 43 70 99 24 25 7e b9 8b | 88 12 28 70 28 9b b9 5b b0 6d 48 da 44 23 6b 4d | 59 ff ee 67 e5 c7 db c0 7c 7f a2 4b 21 92 3a a1 | fd 14 25 80 1a 91 48 40 e9 5b 63 e7 84 7c b3 99 | 02 c6 5d 6d b6 28 24 98 77 5e dc c9 be 98 c3 d6 | b6 bc 7a bf 31 81 8d c7 ba a9 27 81 82 5a 2f b7 | 23 3d 16 95 ba b5 4a 07 29 09 4c 3e c5 38 81 20 | 6c 0f d0 d6 67 62 46 f9 bc 6b c6 8e 7d a5 ce 50 | f1 0f 9a 64 d5 01 da 1f 72 e3 1b 16 9a ec 02 45 | ef 03 20 b4 4d cb ac e4 80 48 13 be cc c9 5e 11 | 9a f4 a2 21 ee 6b 6d 92 17 77 1f 86 a2 bd ac 89 | 29 00 00 24 5b c1 91 12 e1 44 84 05 fe aa f1 fc | b1 6d 8f ce 01 29 aa f2 75 b6 aa e9 3c cb db 81 | 72 99 63 d9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 78 cd 6f 27 81 4c 4a f4 57 06 82 | fb 0a 60 ad 54 dd e0 6c 00 00 00 1c 00 00 40 05 | 73 d8 f7 cb c0 0b a5 77 76 9f 97 28 b6 7f a1 0e | 85 3a 80 ee | libevent_free: release ptr-libevent@0x7fb3800269d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380015160 | #381 spent 0.233 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e fb 19 74 69 81 f6 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #381 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #381 | rejected packet: | 1e fb 19 74 69 81 f6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #381: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.102 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a32290 | handling event EVENT_RETRANSMIT for parent state #382 | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #382 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #382 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49706.906718; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006858 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380015160 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #382 | libevent_malloc: new ptr-libevent@0x7fb3800269d0 size 128 "road-eastnet-nonat-130" #382: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #382) | 8a a7 de 77 ff fe 00 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 1e 05 01 d3 c0 50 0e 07 5a f5 6c 2a f3 ca c5 | f5 6b b5 ce e5 2d 0d 22 8a 9d fc a1 92 f1 21 88 | fe 80 af 87 07 4e ac cb 0e 4c 2f 1f 7c 09 ad 56 | 27 1d 20 e6 ec e9 94 a7 13 47 77 6d 93 7b 8b 31 | 4c 98 f5 11 b5 9a 38 64 29 ba c8 d0 2f a9 37 ca | 1d 9c 45 27 41 6d 78 24 2b 30 7d 43 66 5f da 35 | 99 0b ee f7 a5 dd a9 e7 24 b7 2c 27 c3 b8 3c 38 | 22 f4 c4 26 23 91 a1 6d a7 03 90 dd c7 47 8b e4 | b9 30 db 10 7a b0 86 55 91 13 ed 5a 5c 50 c6 55 | 38 6b 0d bb 7c d6 67 e7 99 0a 0d 7c c8 3b f2 93 | 43 b8 a6 1e f0 04 5a 66 ab 2b 76 49 15 e4 be b6 | e3 ab 9a 84 5b 45 f3 99 3f 3d 94 3a 7f ba c6 2d | c0 e5 16 1f a9 0e c4 b3 c7 a8 37 c7 df 60 6d b0 | 90 7f 5b 83 e7 16 35 cd f8 80 7e 6b 4c 50 19 23 | 8a a3 35 38 cd 8b ef 81 d2 24 34 89 61 4b 37 2c | a1 bc 48 55 f5 65 06 2e e7 6f b3 a0 6e 02 6c 89 | 29 00 00 24 7c cd b7 56 1d 0f 15 7b 08 97 8c a9 | df 91 53 e0 6a 88 48 cc 4c b6 8e 33 b3 57 e0 e8 | 1c 04 d1 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 58 61 cb 76 cc c4 93 e8 81 4f b3 | 54 86 64 27 f4 77 87 8f 00 00 00 1c 00 00 40 05 | 27 d0 5f f0 83 ae a8 e6 f3 e6 a6 2d bb 57 f3 83 | 78 36 b0 95 | libevent_free: release ptr-libevent@0x7fb36402e9b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a32290 | #382 spent 0.248 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a a7 de 77 ff fe 00 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #382 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #382 | rejected packet: | 8a a7 de 77 ff fe 00 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 82 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-130" #382: ERROR: asynchronous network error report on eth0 (192.1.3.130:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.122 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_RETRANSMIT for parent state #383 | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #383 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #383 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49706.978249; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006187 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a32290 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #383 | libevent_malloc: new ptr-libevent@0x7fb36402e9b0 size 128 "road-eastnet-nonat-131" #383: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #383) | 8b a9 fc 25 06 93 a1 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 48 8c d9 3d c6 b0 61 39 4e 19 f7 86 b1 e2 c3 | 03 ba 84 78 9c c4 77 a1 7d 57 91 f5 ae c2 ed b8 | 0b 61 98 04 6f 72 68 b3 63 3d b6 20 12 b2 50 10 | 3d 3c 00 1d b9 ab be 72 ac ba 93 14 3b b2 a4 c2 | 8e b0 47 ba 98 bb 5c 2b e4 da 7c 8d a4 4a d6 89 | a4 b6 36 de 0f 18 04 bb fc 9c 28 b5 1a ee c2 7a | 18 c6 24 27 71 17 17 60 ca 39 4e 5f 5b 71 71 ab | e4 cd 79 1b 79 6b 31 46 63 bb cd 82 d7 96 72 86 | 1d fc 72 1c e4 a4 16 04 29 1f 9e b6 3a fd 62 30 | f1 da dd 12 af 8e 61 c7 51 15 f6 a4 66 22 64 42 | ef d3 2c 09 00 94 20 e3 33 79 f3 1d c7 7c 4e 79 | a7 a8 2d ec 91 f0 bb fb ff 6c 89 63 ff 5d a6 dc | 2c c3 c7 01 d9 71 f9 87 28 4c e4 de 91 08 4b 02 | b3 28 ae a1 4d 26 42 63 01 7b d1 2e 68 17 e3 a7 | 0a 0b eb 5c 62 18 33 2f d3 a6 c9 6b 3c a2 aa a0 | f6 fc 0d 55 8c 1d 7c d8 f9 bd 77 28 68 1c b3 05 | 29 00 00 24 c7 43 5d 92 21 cd 92 00 ce 48 5a 41 | bc 51 f7 9c 7c 73 79 39 5d 67 8e 5d 0e b9 e5 ea | f1 7d 01 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 9e 11 98 e3 85 61 70 79 85 31 a8 | 4f a4 76 88 f9 86 57 fe 00 00 00 1c 00 00 40 05 | fb 7f 30 9d 57 51 30 a9 24 b7 71 f5 04 63 5f 8a | f8 68 fc 05 | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | #383 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b a9 fc 25 06 93 a1 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #383 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #383 | rejected packet: | 8b a9 fc 25 06 93 a1 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #383: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.061 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_RETRANSMIT for parent state #384 | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #384 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #384 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49707.040609; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007162 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c00d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #384 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 "road-eastnet-nonat-132" #384: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #384) | 86 6f ae 12 4d c0 7a b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d b1 fb 85 46 e4 0b ed 3a 09 27 c9 1d d0 fe 19 | 7a 6b 17 bb 62 8e 54 ac f1 64 67 34 40 ff 38 85 | 4f ff 54 1e 02 a7 af 76 91 63 95 f0 62 9e e7 68 | d4 07 2d a5 05 78 38 e6 00 65 3b 0c 3b 55 b9 34 | 19 27 7d 5e 1b 1f d1 f1 b8 c6 a4 32 36 a3 a1 4d | 77 fc 92 08 8e 44 1c 7b 72 a0 4a 6f ff ad 86 71 | 79 52 e6 49 b1 8f 12 9c 40 bc ec da 58 c7 66 8c | df 54 c1 66 96 41 fb 21 bc f2 5f 23 6c 52 ad 47 | c4 d3 9c 32 fb 09 e2 cc 47 c2 4b 3f 71 c2 e6 99 | 6d b7 94 23 a5 4c 0a 3c be 0e b2 50 04 86 41 e3 | 7a 9c 55 d1 3b 34 0c 3c 9f fd 4c f5 09 73 9f 60 | 56 d6 11 97 6a c5 df ef fe 2f 35 ee 63 fe 39 b0 | 29 b4 b3 01 1b 35 ff 91 b5 b4 bf 86 5f 29 e0 72 | 9b d7 f8 07 0a dc 66 0d 27 38 bb fd d4 42 1b 97 | 0e e9 cb d0 75 c1 5f 7b 20 8d a3 bd 9c d8 be df | 08 8a d8 c8 72 8d 2e 70 0c 78 7d 99 d6 b0 fe c1 | 29 00 00 24 dd a5 d7 0d 86 0a ce 46 70 f7 a4 d8 | 79 8d ab 0d 5a ba 15 d4 6b c1 b8 d3 f7 39 89 32 | f9 a6 bc c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea 0a a8 53 d7 f6 23 14 8d 14 98 5a | ec 27 4c a0 59 56 95 73 00 00 00 1c 00 00 40 05 | 5b d2 62 5b 9b b5 2e 9c 89 b9 50 27 01 71 4f 1d | 99 42 bf 80 | libevent_free: release ptr-libevent@0x7fb388011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | #384 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 86 6f ae 12 4d c0 7a b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #384 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #384 | rejected packet: | 86 6f ae 12 4d c0 7a b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #384: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c01d710 | handling event EVENT_RETRANSMIT for parent state #385 | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #385 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #385 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49707.104656; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00681 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #385 | libevent_malloc: new ptr-libevent@0x7fb388011f30 size 128 "road-eastnet-nonat-133" #385: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #385) | dc 0d 67 a5 b0 49 95 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 d2 87 4f 28 1e d2 9a 8d 89 1b 83 29 19 de f5 | e6 63 09 2d e2 e9 61 46 d1 7b 1d 91 3c 38 a6 0f | e9 63 cf 58 08 13 3f 3e 7d f1 19 3d 13 fc 34 b5 | 18 8a e7 0c f9 3c 2c 71 b0 34 a4 05 97 a5 9f c7 | 97 d1 e4 25 37 22 ef 17 fb 52 35 c9 4f 1f 26 16 | 3c 2a 1f 00 10 3c df 46 38 33 44 5d a6 92 e5 d5 | 69 68 b5 76 06 e3 77 b8 1e 01 65 43 01 c9 86 ef | da 65 a5 1f 57 b0 00 8a de a9 34 23 2e 5c 26 a6 | a0 7f 44 a7 f5 75 dd 87 e1 fa 95 ca ff 5e 20 3b | 92 ff 19 e9 6e 3b 74 90 7d f7 38 58 ce a4 6e 3e | 22 98 35 57 a7 19 32 26 90 4e 72 85 8e fc 44 0f | e3 30 88 10 65 63 68 a3 81 e7 a5 04 d1 cf 06 2d | 36 a6 35 6b fb 1a c6 21 82 6b b4 50 a3 0b 89 0a | 70 f4 46 4d b9 30 8c 1b 9a a3 3e a4 57 bb 51 f0 | c0 0a 2a ca 36 ae b3 f0 02 3c c8 b5 bb 6a 7b 96 | 55 84 4d bb 15 b3 47 cf cd 45 3c 4a e8 4b 8f 89 | 29 00 00 24 90 a0 a9 10 09 5c 84 13 2a 39 8b 57 | c5 67 7f 3e 0b 64 03 36 1d 0d c2 a2 27 b3 44 c5 | 83 b2 09 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 9a 97 66 55 a8 9e d7 24 ff 14 54 | 09 c0 45 ac a1 60 51 9f 00 00 00 1c 00 00 40 05 | da 5c 4e 27 00 47 9e f2 1c fc 63 30 21 b4 79 d8 | 3b 38 4e b8 | libevent_free: release ptr-libevent@0x7fb36c02ed30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c01d710 | #385 spent 0.133 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 0d 67 a5 b0 49 95 64 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #385 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #385 | rejected packet: | dc 0d 67 a5 b0 49 95 64 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #385: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a92f40 | handling event EVENT_RETRANSMIT for parent state #386 | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #386 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #386 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49707.163988; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006898 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c01d710 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #386 | libevent_malloc: new ptr-libevent@0x7fb36c02ed30 size 128 "road-eastnet-nonat-134" #386: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #386) | b9 e2 f3 4f 37 4c 11 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f da ec b0 32 6b 35 e3 b5 80 95 66 e9 7f b8 d5 | e2 e0 68 33 cd 76 e0 38 1a b1 5d 56 26 da 9f e0 | 7e 25 7d 36 13 86 62 f1 2c 8d 3f 33 c2 a9 77 5c | 6c 22 2c d9 e8 13 05 5f 5c b6 bf 2d 06 59 25 68 | 04 0a 7e 77 39 77 e2 48 8e 95 f3 7a 6b 62 7a 5c | 74 73 02 c5 eb 3d 85 b2 e4 97 e2 a5 7e c1 fd bd | 8e 39 16 68 05 dd bf 87 fa 57 12 1c 04 ca 0c 29 | 8c f4 e1 ff dd 36 cf 70 de cd 23 dc c6 ae 0f aa | 3b 0f fa f5 80 72 1a cd 74 ba bc e4 a4 6c a0 e3 | 89 9a 36 59 db 27 b5 54 3f 8a aa cb ee 7a 4c 74 | 10 ef 6c 33 3c 46 b9 be 98 4b 1f 0c 9e a1 0f e7 | 70 9c 48 fc 41 5f bc 21 01 43 4c 8e f5 9c e5 23 | bb 93 4c ac ba 5c 01 89 9a 17 4a 24 a8 b9 2c 47 | 70 fc 07 f1 21 a4 d5 20 f9 8f f8 38 ce d5 70 b1 | 42 c9 99 11 ba 5a fc 0c 06 b5 ae ff af e4 68 aa | d7 82 77 58 85 4e fc 74 00 fa 00 8a 91 15 50 9e | 29 00 00 24 84 96 aa 5e b5 f6 6f 99 c5 43 c7 51 | b3 36 1c 3e 65 fe 9c e9 3e a8 cd 03 a7 c9 e1 a9 | 36 56 0e 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 80 4a c6 9c b6 70 28 5d 0a 3a 23 | 72 63 d0 38 6e f2 8f ca 00 00 00 1c 00 00 40 05 | 26 1f 03 bb d7 50 8e c5 c4 3f 03 d2 3a c8 fe 3b | 09 a1 da 1f | libevent_free: release ptr-libevent@0x7fb338048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f40 | #386 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 e2 f3 4f 37 4c 11 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #386 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #386 | rejected packet: | b9 e2 f3 4f 37 4c 11 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #386: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0616 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348012630 | handling event EVENT_RETRANSMIT for parent state #387 | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #387 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #387 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49707.222412; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006399 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f40 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #387 | libevent_malloc: new ptr-libevent@0x7fb338048a10 size 128 "road-eastnet-nonat-135" #387: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #387) | 75 6e e5 e5 6a cd b8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ff a4 36 8a d7 5e f8 44 73 70 3f d1 cc 7c 79 90 | 0b d6 30 0a fd 2b 08 93 ae c4 9d c0 92 f3 30 c3 | aa 43 1a b6 dd 00 a6 77 0b 61 7f 7a 6d 22 60 10 | f1 8f 0a bd 4e 21 a1 c5 3c 6d bc 87 58 3a fc 28 | a1 f5 dc 41 f0 99 f6 3d 83 55 3c 93 36 df 67 78 | d6 16 47 a9 dd 0a f6 c9 ed 30 32 20 48 63 8f ce | 8c eb 37 37 cb 50 71 37 bd cb 4b f9 48 98 89 fb | 52 3f d5 c6 89 92 40 89 ae 52 a8 41 db 88 8d ad | 76 89 a2 2c 25 fd cd a1 b3 18 a9 52 92 ca 41 cc | be 86 7c 0a d4 fa d9 2c a1 ce 6b 87 5c 4f 0b a7 | e2 e7 b1 90 b4 88 13 15 0f 2d 50 24 a6 28 8e 8a | 81 90 02 66 38 1d 10 b6 04 db f1 15 7f 9a 7c eb | ec 94 ef 10 22 b8 7f a2 35 e6 24 56 5c e6 40 99 | 8b 09 81 82 27 99 96 55 ae 30 73 4e 23 e9 a5 45 | d0 57 f8 f9 3b 6c 05 9a 46 78 7d b3 62 a4 ed 17 | 2e 15 c3 a2 7d 0c 1c 89 e1 68 08 b6 03 09 76 f8 | 29 00 00 24 11 0e 4a cd 20 fc ce 84 68 c7 a8 ec | 48 5c fe b5 ee 21 2d ef c1 3f a3 a1 30 c1 c0 88 | b1 78 03 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 fb 47 16 eb 64 05 e3 af e5 70 ee | b4 39 fc 1b 30 12 e4 0b 00 00 00 1c 00 00 40 05 | d8 e1 2e 80 87 77 be 81 c0 a4 a8 f5 fc 15 8f 58 | 08 dc e4 8d | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348012630 | #387 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 75 6e e5 e5 6a cd b8 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #387 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #387 | rejected packet: | 75 6e e5 e5 6a cd b8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 87 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-135" #387: ERROR: asynchronous network error report on eth0 (192.1.3.135:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.052 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abd200 | handling event EVENT_RETRANSMIT for parent state #388 | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #388 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #388 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49707.288721; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00616 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348012630 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #388 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 "road-eastnet-nonat-136" #388: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #388) | f7 ff cf 56 0b 2d 32 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b2 17 f0 4b b8 d6 41 9d bc 4a 96 2e 42 ab 77 4e | 7f 54 60 13 56 59 15 20 fc c4 79 98 ae 8f e2 06 | 69 79 8f 5d 63 48 c3 bc 00 b2 f8 7b 8f f4 4d a0 | 8c a9 81 52 3e 4a c4 f8 92 22 05 f0 4d e8 83 0e | f0 26 c0 2c 43 f9 88 43 07 5f 25 9e 50 b5 11 c3 | 73 c8 0e 1f 5c 85 88 1c fc e4 6e f2 9c 07 04 d2 | 2d 14 31 25 c7 f1 fa 00 27 db 06 87 f8 4d 48 60 | a2 9b c5 9a 24 e6 5c 8b 88 aa 13 bf 0e 45 97 1c | aa fb ea 7f ee 38 9d c2 3b dc ac 73 ba e2 2c 03 | 3d dd 91 b1 96 88 2a b1 4e a5 10 5e fe 8f b7 60 | 27 7f 42 c9 c1 97 c4 03 be 93 ba 66 8c 91 b1 77 | 12 50 ef a2 c9 9b f5 15 0b 50 4a dc c3 9e 64 d1 | d8 0c c9 6c 86 d8 1a 40 d2 c3 48 bc 8a 19 fb 47 | d3 3d 4c 63 67 3a 9b 43 54 08 5f 36 9c 29 c6 ed | 7a c1 fa 3a 70 4b f1 9d 3d f8 73 d3 02 37 8f 1c | 0a e4 74 d1 b8 f7 7d a3 cc 04 0d cc 02 1c 9d d7 | 29 00 00 24 d2 a6 cd 06 28 a1 fe ae 1b 89 a2 1d | a1 4a 61 12 14 72 44 a4 a4 a5 e9 38 f2 78 91 07 | 4b 1e 98 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 fc fe 8e 48 65 14 18 f3 7c 80 1c | c9 89 2e 09 96 5d 2c 3e 00 00 00 1c 00 00 40 05 | 5e 49 cb 06 a1 a8 89 d0 e9 f4 c7 34 ac a2 e0 5c | 40 ed 0b 80 | libevent_free: release ptr-libevent@0x7fb3440180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abd200 | #388 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 ff cf 56 0b 2d 32 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #388 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #388 | rejected packet: | f7 ff cf 56 0b 2d 32 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #388: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0432 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3800153c0 | handling event EVENT_RETRANSMIT for parent state #389 | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #389 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #389 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49707.358038; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006233 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abd200 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #389 | libevent_malloc: new ptr-libevent@0x7fb3440180b0 size 128 "road-eastnet-nonat-137" #389: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #389) | 85 39 d1 4d 8b 00 62 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 33 35 45 30 eb 5a 4e 31 22 74 c6 b3 a4 12 3f 11 | d4 ed 4e ed d9 b9 2a b5 45 b7 bf 2f c4 12 8d f6 | b6 45 8b e7 42 00 82 88 9b 5f 9d ac d3 62 85 20 | 80 d9 92 f9 48 6c 61 18 10 02 b3 60 4a 67 bc f5 | 7f f3 06 fd dd d9 85 7b 8a 61 74 3e b0 54 86 48 | be 68 e1 1d 71 86 b6 10 0b 53 c9 4b c6 1d e3 32 | 0e 9d a0 c1 c2 ea 3f 8d 85 11 04 6b 8c a8 06 e2 | 8a a8 28 44 e2 f4 2d 9b 79 2e 3b 95 17 25 de 38 | b1 b1 27 54 d1 ca 51 cb 05 e4 51 d4 10 05 5a 73 | f7 6e 3f 1e 04 83 05 45 32 c8 e5 83 91 5b d4 46 | cb 00 53 49 8b aa e2 4a 03 fb ec 92 bd 9a d8 ef | c2 f7 13 0e ac 87 cd a2 d6 11 8a 4d b3 76 15 63 | 7e 5d ad ad 19 54 b0 8b cf 33 56 db af c2 f6 2f | 46 e8 3c 3e 30 75 95 b6 ad 6b 4c bd b8 1c f7 d8 | 42 48 45 24 c4 28 be c8 24 78 21 7b 8c a1 5f d5 | 3c 68 c6 b7 92 f7 dd 99 0c 2e 4d 49 3c 4e 34 53 | 29 00 00 24 d4 02 58 a1 15 41 bf 82 7e 15 0d c9 | ca 5c 1f 96 c8 8b 6c 22 75 5c 08 57 5f 06 6b 32 | fe f8 a7 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 ad 3c 1a 7d 4c cc 56 a6 70 0e c9 | dd 4d 28 a6 f3 20 1b cb 00 00 00 1c 00 00 40 05 | e7 a3 be 04 a3 45 3b 11 1b f8 e3 89 48 23 a2 23 | c1 e1 2a f8 | libevent_free: release ptr-libevent@0x7fb380041ce0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800153c0 | #389 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 39 d1 4d 8b 00 62 4d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #389 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #389 | rejected packet: | 85 39 d1 4d 8b 00 62 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #389: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36400cc10 | handling event EVENT_RETRANSMIT for parent state #390 | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #390 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #390 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49707.429357; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006403 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800153c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #390 | libevent_malloc: new ptr-libevent@0x7fb380041ce0 size 128 "road-eastnet-nonat-138" #390: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #390) | f0 59 d0 2d 97 92 84 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 a6 bc 87 d6 62 82 0f 67 22 b6 ee c6 47 37 24 | 35 77 67 9d 2b 69 4d 68 d9 17 5e 4e 5b 7c e7 e0 | de 0c 00 17 eb 73 f2 8c 21 62 77 5f ed 93 76 62 | 82 34 a8 dc e3 cb c2 5a 08 71 13 11 3d 4b e6 d1 | 76 57 25 8b a6 9b ab 1b 86 9a b2 3c b4 c5 09 27 | 07 3a 9a 1f b3 ba dc 74 b5 99 e0 70 c7 35 07 15 | 6b eb 79 13 3f 27 25 55 75 85 60 5d d2 d0 ba 32 | 68 73 83 f4 c5 0a 96 0e 4b e5 39 e5 86 02 a4 93 | e2 f4 48 ef 0c f4 c4 74 9a 13 7f eb 1a f7 58 25 | 7f f1 9e dc 6a 9c 5a 01 55 d6 94 fe 2a 9d 15 54 | c4 c7 a9 92 32 84 b6 cb 67 d0 cf 4d c5 e2 bc df | 9f d8 4e db 8f 96 2f 1e c9 d0 ec 6a 9b 77 d4 57 | 6b cf 06 d5 ae fb ea 29 a5 1f 59 cf 78 34 af ff | a5 76 3d 89 27 c1 f8 1c 6e a5 66 a5 63 8a 2d 2f | b3 a7 de f9 71 62 f3 67 56 6c 03 83 1d be 14 17 | 8c 04 f3 ba 5f 3e 7d cb 76 74 94 e2 c9 0a 5a 07 | 29 00 00 24 9a 7c 0d 04 38 99 0e 36 73 a3 ab df | 41 d9 56 ed 47 3b 6b 02 19 aa 87 30 cc 21 65 76 | f4 51 64 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 0a c1 09 04 69 58 cc 7d de 65 69 | 68 f6 ba 86 4e 7f 6a 28 00 00 00 1c 00 00 40 05 | 52 91 09 9c ff 5e 67 81 8a 7d bb c1 ce e0 37 4c | d9 14 ec 51 | libevent_free: release ptr-libevent@0x7fb364039970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36400cc10 | #390 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f0 59 d0 2d 97 92 84 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #390 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #390 | rejected packet: | f0 59 d0 2d 97 92 84 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #390: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370012890 | handling event EVENT_RETRANSMIT for parent state #391 | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #391 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #391 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49707.496668; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005909 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36400cc10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #391 | libevent_malloc: new ptr-libevent@0x7fb364039970 size 128 "road-eastnet-nonat-139" #391: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #391) | 1e 4c 10 d0 5a dd 02 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 44 38 de 57 e6 42 14 4a 75 cb e8 86 f1 15 c7 | b3 6b a5 d0 a3 15 b5 a8 cf fe 21 90 de 4f ce 44 | 4b 9e a3 45 9f e5 e3 4a e1 61 50 92 d7 96 bd 78 | c9 7d fa 56 09 ee b1 46 53 20 fc ad 34 b3 1e e5 | 0c f4 f7 d3 65 bb 8f 18 cc a8 06 7f fc 7e 66 0f | 5a c0 66 08 19 5f fe 23 13 53 7d f1 cb 35 9c bf | b6 cc 27 b3 74 16 78 a5 d0 41 0b 66 96 4e d5 0b | a8 67 13 54 66 95 b9 f4 f4 50 eb 64 58 9c 23 eb | 8d 1e 98 9a 88 3b 5f 86 67 00 79 34 97 29 56 1a | b2 15 47 48 a5 9a 2b a5 34 cb 00 12 67 7f e0 d9 | 3a f8 09 e7 20 e1 52 74 01 fd f4 0c 96 53 a6 b7 | c6 61 c0 6c f5 79 6f b0 c7 2c 95 3d f0 6b 1d 3c | a1 9c 76 2c 42 98 e7 2f 92 d1 8e 08 bb da 6a 80 | de bb 58 dc 69 88 c5 71 37 d4 7b 84 79 2b bc 7c | 3c 5f 6e af 11 b3 52 0f 4a 94 17 dd 26 64 0a 25 | 66 61 88 60 23 0c 83 1b 44 d1 a9 f9 6e 89 2a f7 | 29 00 00 24 f4 e3 20 9c cf 9f 8b a0 c8 c9 bb b9 | ac d4 eb 98 02 de 0f c4 e7 00 7a df 68 e7 4c eb | e6 18 a5 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 3e 10 ca 19 aa 6a 76 c2 f6 15 22 | 58 d4 f7 90 3e 72 98 9d 00 00 00 1c 00 00 40 05 | 94 13 1b ea fd 35 6e 40 4c 88 7a 5c c1 e4 2f 2d | 6d 26 6f 2a | libevent_free: release ptr-libevent@0x7fb37003a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370012890 | #391 spent 0.0998 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 4c 10 d0 5a dd 02 ca | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #391 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #391 | rejected packet: | 1e 4c 10 d0 5a dd 02 ca 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #391: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0464 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b12c00 | handling event EVENT_RETRANSMIT for parent state #392 | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #392 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #392 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49707.561965; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007774 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370012890 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #392 | libevent_malloc: new ptr-libevent@0x7fb37003a770 size 128 "road-eastnet-nonat-140" #392: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #392) | 10 0f ce a6 80 60 53 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 42 7c dc 39 42 03 83 1d fc 78 1f a6 0a 82 be ac | 8c 3b 39 1b 2f 80 e7 cb aa b0 35 db d6 f3 de 35 | 37 b1 68 f3 68 1d 2d f4 b0 35 cc 7b dc 22 05 f9 | b7 af f7 1d a4 46 4d 00 a0 fe ea 26 a2 f9 9b 9a | 09 ee 3f e6 65 a7 03 64 d2 2c 26 ad b0 0a b6 6c | b7 a6 17 d4 6e a3 92 2f 34 cc d4 54 77 6b ca 57 | d5 59 3b bf 54 fe aa b8 9e 19 8b 0b 05 8a f7 be | fc d0 1b 7e ca 71 b1 c1 02 6a 82 df ef f5 65 97 | da 1e 51 41 e3 d8 f1 96 c4 03 03 bd 8f 10 04 b2 | c3 58 82 7f ce 35 78 05 db 11 6d 1f 95 52 d4 56 | 49 d1 80 fa 2e f3 ac 1f 38 a0 e5 d5 81 e9 34 d8 | 41 7f 2d 0d 61 dd 7b e7 44 a4 89 c9 0c 7d 05 e4 | 9f 1e 2d 40 16 34 e0 f0 2c f0 ca 39 ea 5a 9b 3c | e7 ee 11 8b d0 d0 71 64 02 96 00 c1 27 19 8e 75 | f0 b3 d3 5e 45 6f c3 79 42 e7 20 9d b5 0d 76 ff | e5 ba 64 52 91 7f bb 6e bc 95 4c d1 a1 34 da e7 | 29 00 00 24 27 55 30 76 6e b8 e9 20 0f 49 9d 0e | 6c f7 55 67 5b a0 fb d4 e7 df 75 53 94 42 2e 19 | d9 ae ec a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 0f f0 e9 84 b6 f5 5d 7e 1b 97 d7 | 89 b2 50 d4 36 fd 91 50 00 00 00 1c 00 00 40 05 | 93 22 be de f9 76 c2 04 2a 35 c8 fb 20 98 3d d6 | 50 a7 79 8d | libevent_free: release ptr-libevent@0x7fb338035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c00 | #392 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 0f ce a6 80 60 53 20 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #392 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #392 | rejected packet: | 10 0f ce a6 80 60 53 20 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #392: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a3a590 | handling event EVENT_RETRANSMIT for parent state #393 | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #393 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #393 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49707.624259; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007653 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c00 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #393 | libevent_malloc: new ptr-libevent@0x7fb338035930 size 128 "road-eastnet-nonat-141" #393: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #393) | d2 4f c7 97 0e 2c 3e ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 57 42 91 f9 c0 06 25 d3 5e c6 ff a0 b9 c7 9a | f8 73 f5 52 ea b3 b7 0b 33 79 a9 ab be 94 f5 d3 | 47 a2 ed 3f 30 d5 f5 d7 c5 7f 9d d3 ed 4d a0 b4 | f7 ad a1 76 18 49 17 db 8a b9 cb ed 58 a9 0c d9 | 5a 76 b8 cb 07 f9 85 e7 ea fe 63 f8 ee 0b 16 50 | 8f 7f 23 44 74 8a 56 f9 51 93 d3 d4 1e a9 e0 6d | d7 af c4 1a 46 a4 66 f8 55 f1 fc bb 79 62 df 34 | 8f ee 1b 57 26 7e c4 de 20 f4 80 c2 d6 80 72 a1 | aa 53 f1 e8 e4 e6 1c e7 0b 29 98 85 7a 59 d5 aa | 68 b0 88 b1 b9 15 73 53 b5 6a 19 c9 ae 48 c5 a2 | 01 52 4f ea f5 c9 9f b8 90 37 cc 56 4f 8d 78 b9 | 10 dc d8 56 42 a7 88 d4 9d 82 8e d9 33 ab ac 86 | 5e b8 f6 d0 8e 0c aa b2 4f 41 73 62 f2 0c c2 27 | ef ba c6 42 e2 bb a6 b0 c4 15 d3 04 4c 56 e0 5c | ad 92 8b ed ed ba dd c2 b7 4a 92 54 4a ae d4 37 | c3 0d 4f 7c 37 7e 0b 49 1e 1d 38 1e 4b 41 b4 43 | 29 00 00 24 f4 b5 fb 56 01 5f ac 00 1d 31 6b d7 | 01 8d f2 d0 3f 15 27 39 dc 6b 31 7e 82 50 a3 bb | 9c f0 ec f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c 9c 87 ea bd bf 36 3e cf 82 b1 7a | 78 3f f7 57 2c cf 08 1f 00 00 00 1c 00 00 40 05 | 77 3b 5d 4c 9c 3f 6e 8a 01 7a d1 9c 5b 89 36 dc | 10 f8 1f e1 | libevent_free: release ptr-libevent@0x7fb344046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3a590 | #393 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d2 4f c7 97 0e 2c 3e ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #393 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #393 | rejected packet: | d2 4f c7 97 0e 2c 3e ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-141" #393: ERROR: asynchronous network error report on eth0 (192.1.3.141:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_RETRANSMIT for parent state #394 | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #394 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #394 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49707.687573; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006378 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #394 | libevent_malloc: new ptr-libevent@0x7fb344046040 size 128 "road-eastnet-nonat-142" #394: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #394) | c6 0a d6 5e 7e fc 84 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 b5 7c 6c c9 f1 d1 76 55 70 0c 53 79 42 59 aa | 1c 78 3a 1c cf 8e ff bf 3c 4f 8e 36 eb fa f5 80 | 9c 26 80 0f 65 74 f8 36 f2 69 55 0c 8f 0e 23 f4 | f2 22 a0 b5 d9 98 7e 1f aa d3 a2 c6 8c ae 8e 98 | 7c 0a f3 ed 8f 8b 88 58 8c d6 33 95 a0 55 9d 22 | 45 bd 30 81 fc 6e e7 86 9a f8 90 92 f7 2d bb 24 | 69 7e b6 2c e3 c4 d3 78 cf 51 21 62 11 c2 15 e2 | b3 a9 82 d8 15 7c 3e 4d bb 85 98 4b 06 e1 32 2f | 7a ee fc 56 3c 9b 3f a7 bb d2 50 44 19 3c 10 75 | d0 ab ea a8 d0 55 74 15 97 4a a8 8a 65 6f 7d 24 | 88 48 f4 59 45 9a aa ed 6e b4 a3 4a 2e c4 97 e3 | ef a9 a3 78 d3 c7 01 a3 80 5f 34 19 5f e9 1a 0b | 22 c3 b3 e4 7b 39 94 40 be d6 c0 25 22 6b 94 43 | 4e 6c a4 23 34 ff 10 49 a6 bf 97 8e b9 5f 55 2d | 28 e5 68 c3 b7 a6 14 92 b7 6a 59 d7 14 cc 2b 2a | 46 b7 9f a5 f7 40 91 f4 58 19 59 a8 c2 3d 8c 54 | 29 00 00 24 48 a4 83 24 df d5 ff 67 2d 1a db a8 | 39 76 5f a5 8c c2 0e 08 ee f5 2b 2a a4 7f 9e 08 | 09 74 ed 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 07 bb 4a c8 d9 c8 75 02 c5 e8 2f | 3d 22 1e b1 bf 8b 35 f7 00 00 00 1c 00 00 40 05 | 6e c1 7a 04 07 74 46 3d 3d f7 4a 09 48 b9 79 2c | 6a b6 13 f4 | libevent_free: release ptr-libevent@0x7fb364023a90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | #394 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c6 0a d6 5e 7e fc 84 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #394 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #394 | rejected packet: | c6 0a d6 5e 7e fc 84 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-142" #394: ERROR: asynchronous network error report on eth0 (192.1.3.142:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24680 | handling event EVENT_RETRANSMIT for parent state #395 | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #395 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #395 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49707.763874; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007768 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #395 | libevent_malloc: new ptr-libevent@0x7fb364023a90 size 128 "road-eastnet-nonat-143" #395: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #395) | ba 7b 3c 0c 6c 47 ed ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 88 4c 55 7e d1 a2 38 a3 4d 34 44 bf 98 52 f4 22 | 2b 2e d7 52 9d e2 60 32 f1 e9 de 11 e6 81 90 27 | 7f aa b4 cd 92 c7 cc 0a 99 86 49 e0 e9 e5 7f c7 | 53 00 84 30 c4 2b a1 40 94 2b e5 13 32 e0 cc 77 | 9f 67 6c cf 30 e7 4a c4 94 da 5f 5f 42 9a ce 83 | 94 65 21 10 2f c8 9d e9 90 7c c8 a2 24 10 5f eb | b7 e4 01 18 df 72 f4 7a bb ab 13 f9 5e 78 3b bb | fa c9 e1 75 55 1d c1 7d 77 9c f5 dd 9c f1 6d cf | 64 15 f4 f8 06 12 d8 2b 76 e9 8f 68 61 57 5e f9 | ce b7 25 0f 70 50 5b 08 f7 40 3f 01 f6 b5 a6 1b | 6a b5 fe b6 73 a7 04 b2 74 dc 3e 4a 46 a2 06 81 | 11 ce 3e 21 33 d9 a8 2a ee 54 b5 69 d8 57 77 1f | dc ec 39 32 06 54 92 6d 8f 0a ca d2 fd fd bd fb | 1b 7c 6a b6 6b 55 6f cb c2 b7 b7 fb e7 79 1c 7d | c3 44 5b 72 2c bc 4f 59 92 b8 bc 2a d4 d1 be 0f | 33 95 9e 53 f7 bf 90 2f bf b1 8e 5f 51 a1 8b aa | 29 00 00 24 bd 0e 20 29 4b d5 e3 ae 9c 68 67 e1 | 41 5b 48 5c 33 08 9f 5c 1f 4f 9e 6e c3 72 5b 33 | 2c ad 1f 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b1 4d 21 6f 15 00 d4 49 f9 94 84 2e | 85 71 98 cf 82 ff b0 a3 00 00 00 1c 00 00 40 05 | 8a 38 a6 07 76 28 82 e1 53 d4 45 b3 59 f3 34 be | 83 20 f5 6d | libevent_free: release ptr-libevent@0x7fb388032bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24680 | #395 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 7b 3c 0c 6c 47 ed ae | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #395 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #395 | rejected packet: | ba 7b 3c 0c 6c 47 ed ae 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #395: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0707 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abe780 | handling event EVENT_RETRANSMIT for parent state #396 | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #396 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #396 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49707.841267; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007605 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24680 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #396 | libevent_malloc: new ptr-libevent@0x7fb388032bf0 size 128 "road-eastnet-nonat-144" #396: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #396) | 34 3a ea ba b4 d5 c3 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 b3 5e a9 7f 93 97 83 00 ac b3 90 fb e7 f1 78 | 95 aa f1 ba 36 2b 6d a3 37 11 74 f8 88 50 3b b9 | 5f 0f a0 79 72 f7 39 e7 3a 2c a8 e0 53 9b be fd | fc bd 96 c1 32 d9 24 ce f7 06 60 ff b3 43 45 a6 | 24 b9 a3 f5 cb 0e b9 aa aa 8e 8f d1 f4 f2 6e c0 | 2d cf 97 8a 96 4c c9 d9 fa 9b b2 4f 23 e7 4e 04 | 32 38 36 77 bf 5c cc 5e 9d b8 9a 89 95 85 a0 cd | 38 05 64 bb 18 47 79 4a 9e e0 36 97 2c 58 a9 ca | 05 7e fc 24 b9 aa 44 5a 5a 1a 01 53 4f 6b 25 9c | 0b 57 f1 a9 6c 20 f6 40 eb 60 95 56 91 d3 93 3b | e3 6f 55 d6 2d 80 8e 1b 25 11 49 ca e7 6a 57 76 | 46 38 51 f8 26 5f df d7 e7 dc 81 fb 26 f9 44 9d | 73 c6 16 4c 9f 24 d8 42 a4 b9 bf 36 76 cf 2d c1 | 81 f5 6e 1c 27 05 14 9e 74 b9 a7 24 89 53 2b 8a | e5 d2 6e 23 b8 62 43 c8 68 d3 55 8e 35 2d 54 67 | 77 ed 1c 39 ec 49 32 f8 1f c9 68 6b 34 67 a6 5c | 29 00 00 24 70 3a 86 3e 59 bb d0 ee e5 b9 db 1d | c8 9a e2 55 5b 79 c1 c3 66 32 3d 49 47 3b f1 44 | bc b6 4a ae 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 b0 29 ea 4a 03 79 05 a6 d6 5d 03 | 24 78 07 cd 73 8e b4 4c 00 00 00 1c 00 00 40 05 | cb 86 b2 db 9b fe 49 fd e2 3b b4 79 c3 f9 fd 58 | 79 48 29 02 | libevent_free: release ptr-libevent@0x7fb3880269d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe780 | #396 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 3a ea ba b4 d5 c3 ec | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #396 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #396 | rejected packet: | 34 3a ea ba b4 d5 c3 ec 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #396: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #397 | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #397 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #397 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49707.921589; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00525 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe780 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #397 | libevent_malloc: new ptr-libevent@0x7fb3880269d0 size 128 "road-eastnet-nonat-145" #397: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #397) | b8 96 65 06 95 e1 f4 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 c8 0d f4 cf 12 04 23 b3 8c b0 d5 0f 34 4c a1 | e0 38 a5 84 33 97 be 9e 20 02 11 8c 69 5e 11 d0 | 7f 62 ac d4 51 19 cc 39 4f d4 08 35 17 3d d8 7a | c8 e2 b7 8a c4 ef 87 90 f4 6c ad 03 c1 12 e5 fe | a1 ca 4d a3 a7 26 51 b1 18 00 3f 74 0f 0b 76 79 | bc c1 ba 8c 57 57 64 fe a4 22 c8 a4 ab 19 ab 0c | dd ce 55 14 58 7f a0 3d 7e 01 33 18 3d 67 8f 6a | ca ae 35 2c fc 77 68 f1 26 46 2d 1f 7a bb f6 b6 | 88 41 08 63 25 29 f3 b7 63 ae 0e 14 3f a2 dc 97 | 0e 00 b1 e7 fc 07 d8 8b 49 bf 80 af e9 ed 2e ae | 76 d5 6d 36 b9 2a 02 65 8e ab 6e 62 de 0e 3d f3 | f7 6f bf 03 ee 4b bf 13 13 36 8d f9 63 27 fb 43 | 3f 8c 62 32 8e 36 3e 03 c1 c2 7e e0 16 a2 30 62 | 14 7f 02 fd b0 1d f6 8c 31 34 94 1b 15 18 28 ae | 0e b7 ba 68 7f a5 50 6b 2b de 67 a0 81 07 b2 62 | f5 48 ed c5 05 14 42 21 f6 53 6c 0e 3a 26 2c f6 | 29 00 00 24 27 60 c6 66 70 ae 97 9f 6b 69 4c 25 | 37 ba d9 cf 08 77 b3 59 45 e3 d8 2d 73 dd 52 c3 | cf dc c0 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4b 57 f9 bf 9f 01 9a 6f 3c 35 55 f3 | 32 2b 15 a5 4a 2d 79 cf 00 00 00 1c 00 00 40 05 | 4f 21 3e 38 45 eb 50 34 34 8d 72 07 46 d4 99 5b | e3 94 74 97 | libevent_free: release ptr-libevent@0x7fb3540300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #397 spent 0.36 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 96 65 06 95 e1 f4 12 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #397 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #397 | rejected packet: | b8 96 65 06 95 e1 f4 12 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 91 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-145" #397: ERROR: asynchronous network error report on eth0 (192.1.3.145:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37404b580 | handling event EVENT_RETRANSMIT for parent state #398 | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #398 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #398 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49707.994149; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006659 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #398 | libevent_malloc: new ptr-libevent@0x7fb3540300e0 size 128 "road-eastnet-nonat-146" #398: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #398) | d0 92 7e a2 a7 09 60 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 b4 17 bf 7e 10 d5 e2 12 67 d5 eb 44 fc 6b da | be 3b 71 0a c4 e3 79 bc 55 7d 33 ab 53 2c 63 89 | 9e 95 b9 30 6b 13 a7 4a c4 7b bb 0d b8 d2 26 a2 | 1b 44 de e4 2f 11 41 58 72 a9 de c1 a4 1a 3c de | fb 82 ea df 3c 36 4d b1 bb 32 a7 75 2a 9c da 3d | 04 1d ae c6 9e 47 9c 96 a3 bd 6c 27 32 62 7e ad | 70 24 3a b8 2d 6d 20 b6 31 c7 e4 59 58 b0 08 22 | 82 a6 37 db ba ec 34 68 a5 11 ce c9 83 0a 92 b3 | dd ea d2 26 81 86 3c 25 24 24 ac 6b b8 4a 55 12 | 52 ea 4b 29 23 c3 37 83 f6 36 9b 47 37 10 75 9d | f4 dd 3d a7 8c 08 2f 3c e4 23 53 ed 31 76 a3 fc | 1d a9 fd 55 24 58 0f 2f e2 fa 33 69 e3 52 ce 0b | 40 31 96 92 4b 51 32 bf 2a 17 34 73 b9 0a 6b 90 | de fe 0d 37 2c 91 fd 6c 7a a7 e2 56 e8 ce 17 fa | d6 57 69 b6 c9 3d e4 60 c8 79 32 d0 c0 ff e6 32 | 04 59 72 13 74 5b a6 22 e7 dc df 1b fa 28 85 f9 | 29 00 00 24 ae ec a4 eb 03 5f 45 70 f0 53 21 d7 | 81 1e fd e8 52 41 5f 93 69 78 ae d9 36 11 23 a3 | df 40 91 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 de b0 87 87 88 52 10 6b eb de e2 56 | 47 54 e5 87 4e eb 84 92 00 00 00 1c 00 00 40 05 | cf cf 8e 7f dc f9 05 61 ec 0b 32 5d d8 50 5d 1e | f5 62 0b 45 | libevent_free: release ptr-libevent@0x7fb37403f310 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37404b580 | #398 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 92 7e a2 a7 09 60 b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #398 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #398 | rejected packet: | d0 92 7e a2 a7 09 60 b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 92 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-146" #398: ERROR: asynchronous network error report on eth0 (192.1.3.146:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0572 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c017ea0 | handling event EVENT_RETRANSMIT for parent state #399 | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #399 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #399 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49708.051456; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00721 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37404b580 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #399 | libevent_malloc: new ptr-libevent@0x7fb37403f310 size 128 "road-eastnet-nonat-147" #399: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #399) | 9a 35 91 e3 ae 4f 45 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 ce a5 03 ec 4a ee 33 f3 67 48 7b 6f be a9 66 | fb 8e 19 e6 36 60 4c c6 f2 fa ab 4a 53 70 9f a8 | 5d 61 41 57 15 0a 04 a9 c6 86 5d ab 3b 79 47 d9 | 64 c0 42 8c 2d 5e 11 ee 5a b4 7c 00 df db 58 b0 | 10 63 ed d6 5b 1a 63 c2 6e 59 c7 e8 2a 78 4e 44 | 25 ff 91 a5 4f 9f d4 f8 46 f6 2e bb b6 05 d4 45 | 7f ef 54 77 ee f0 2c 99 e2 fe 9b fe 0e 9d c8 14 | ca 70 65 95 d9 6c bd 1f dd d1 55 09 ab fd c5 44 | 6f ba 1f 76 70 5a 17 28 af 45 27 b3 5f fa fe 02 | 6a 08 1d 7c 03 0b fb b8 0b b4 48 92 28 71 ac 6f | 5f 3f a7 45 71 f7 92 e0 6c 9d f2 6c bb 9e 54 7d | 4e c3 05 e2 c9 1e 50 4a ea 5d b8 f4 10 cd bd ed | f5 70 36 5b 63 22 bb 46 fb e4 aa 69 fc 3a 38 34 | d5 97 f3 9a 0b d9 79 ac e6 c8 40 6d e3 6c 66 31 | 20 73 b6 2d f4 7d 52 fd f2 32 69 70 71 7f cd d6 | 06 5e 27 45 05 1c 80 53 a4 80 ee b7 a6 45 c2 7e | 29 00 00 24 a1 6d db 5e 0b f7 f4 70 57 f1 37 cb | cc a0 06 3f 1d 1e 6b 0a b6 35 fa c1 29 23 78 83 | cc 1e 42 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5b 7c 20 90 94 5e 44 74 17 3c c7 e7 | e8 35 eb 34 00 1c 2e 68 00 00 00 1c 00 00 40 05 | eb 24 3e a6 a5 f2 dc 45 a5 ce 8c 46 9a d0 7a ff | cb 2c 1c 90 | libevent_free: release ptr-libevent@0x7fb36c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | #399 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 35 91 e3 ae 4f 45 29 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #399 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #399 | rejected packet: | 9a 35 91 e3 ae 4f 45 29 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #399: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0599 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c018460 | handling event EVENT_RETRANSMIT for parent state #400 | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #400 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #400 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49708.112842; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006402 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #400 | libevent_malloc: new ptr-libevent@0x7fb36c04b850 size 128 "road-eastnet-nonat-148" #400: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #400) | 6c f1 c2 e4 ca 88 89 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 14 1f bf 2d 44 6c 78 3f 86 f8 f3 fa a1 a5 9d | a0 a8 08 62 76 01 cc db f3 4e 4a c1 03 ae f2 db | c6 06 da 1a 15 ae 3e f9 fa b6 70 0f b3 7b e5 34 | 8d 5b 06 20 ef d4 aa 62 0d d5 a9 7d 3d 49 08 95 | 77 51 97 14 c6 fe 13 ee ee 9b f0 54 56 73 79 30 | ad d7 b3 17 12 47 8d 8d e8 49 20 41 18 2a 1c c8 | c4 68 99 45 f4 b5 f1 6d d9 34 ec 8a e3 80 cc 67 | 30 b6 d6 0d 11 9e 86 7f 87 2f c0 73 7c 40 eb 31 | 24 34 89 0e ca 7b 62 d2 f6 17 85 8f 75 81 28 9b | 1c a9 03 80 8d 78 61 63 07 3b b3 b9 c4 40 46 d5 | ab 82 5f da 4c aa ce 61 bb ab c0 1a 00 85 50 e6 | e8 f6 9f c8 7f 01 8e 16 ac 04 56 78 cf 7c 43 a9 | f9 c7 26 fb 06 32 92 98 86 3f 37 ca f2 f2 fc bf | 1d e3 ee 48 e8 25 74 7d 16 d9 38 6e ca e9 38 51 | 44 22 32 93 01 95 d0 87 12 07 ff 4c 7e 49 f3 04 | 98 50 fe 91 bd 78 84 00 92 17 d7 f5 e0 e1 d0 43 | 29 00 00 24 aa 21 0d 2f 8b 5a 11 5c 7a 19 73 4d | 8f 68 86 24 6a ba 53 0b 82 59 c5 5c 31 b4 eb 7e | 18 78 2e 54 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 82 bc d9 51 57 ae 67 73 5e 22 78 | a2 06 a4 b1 df 07 78 c3 00 00 00 1c 00 00 40 05 | 48 01 58 d1 13 9f 6e 34 06 7b 6e f6 08 2f fa 1f | f9 ef b6 96 | libevent_free: release ptr-libevent@0x7fb3500251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c018460 | #400 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c f1 c2 e4 ca 88 89 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #400 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #400 | rejected packet: | 6c f1 c2 e4 ca 88 89 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #400: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0445 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_RETRANSMIT for parent state #401 | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #401 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #401 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49708.181106; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007978 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c018460 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #401 | libevent_malloc: new ptr-libevent@0x7fb3500251c0 size 128 "road-eastnet-nonat-149" #401: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #401) | 32 2a 52 53 b6 80 03 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 23 97 0d 57 1e 4b f9 07 88 66 bf 34 6e 58 4c | e6 20 66 15 d1 8b df 5a d2 2b 70 66 bf e5 46 ee | 75 f4 eb 71 1f f1 6f e1 d6 58 06 0a 4d 97 04 53 | 74 d3 7a 62 9c 6d fc 73 97 9b c2 cb c3 d3 cb d1 | a7 2a 8a bf ad 15 46 4b ac 4a 21 e7 16 cd 32 18 | f6 83 ab c8 99 38 21 bc e5 81 05 3f fc e4 b5 9f | 7d 77 82 93 0f 69 5a af 5b c2 81 88 55 f6 fa cc | 86 fe 2d 7e 6d ae 3a 9b 57 e6 de 78 5a 36 ba 60 | 3d 56 da 1d 5d 7b 85 49 92 79 e6 7c 62 e6 ba 39 | 70 40 1b 2f 31 49 fc c6 d5 8b 43 aa e6 2d 80 f1 | 00 4e 8e 1a 05 73 d3 15 0d 7c 1c 15 71 3b 45 0a | 71 47 01 7c 8b 3a 4c 28 d2 c5 72 06 09 34 70 7a | 6f eb 8d 51 fc f9 d9 92 d1 00 53 57 7a 80 e8 39 | 37 38 0d 62 49 b3 0f 75 c3 ee 8b a3 66 04 51 8d | 4d ca 16 c5 dc 18 bd ee 26 01 0f c7 9b e6 0b 35 | e3 5e 44 0d 5e 45 e9 f2 25 03 56 4f 95 a8 57 74 | 29 00 00 24 98 0f af 0d 18 0d 49 ab 74 8d 40 09 | a9 19 04 ac c2 29 19 2a e5 21 dd 83 5a 09 3e 6b | 71 16 78 8b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 5b 75 e0 fb 06 ab 59 93 2a 0c bc | 70 9d 3c 6c 4b 98 95 ed 00 00 00 1c 00 00 40 05 | 06 0c a6 cc 70 cf f8 01 75 5d 68 14 0f cc 7e 89 | 81 50 60 0f | libevent_free: release ptr-libevent@0x7fb364008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | #401 spent 0.119 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 2a 52 53 b6 80 03 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #401 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #401 | rejected packet: | 32 2a 52 53 b6 80 03 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 95 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-149" #401: ERROR: asynchronous network error report on eth0 (192.1.3.149:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0441 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #402 | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #402 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #402 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49708.243417; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005384 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #402 | libevent_malloc: new ptr-libevent@0x7fb364008e30 size 128 "road-eastnet-nonat-150" #402: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #402) | d7 18 0b 56 dd fc 93 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 8f d0 91 ee 0c 2c 6d b1 49 7f e7 a7 c5 b4 b6 | ba 26 c6 73 cd 26 6d 07 75 be 09 23 1b d9 66 18 | 43 89 72 64 b1 d5 06 ca 9d c0 33 e2 98 5e c1 57 | 08 88 8a 2d 7a 4a eb cd 6a ad 0c 5b 60 7a 3c d6 | 1b 41 e1 63 95 9d 48 05 85 b8 3e e9 c2 2c 08 fc | 0a e1 15 60 ae 51 d5 ec 71 41 de 9c 11 57 49 6c | 9b fc 6f 1d 07 87 e1 29 06 e5 0a b9 9d 8f 51 66 | de ed ee d7 d1 94 d4 80 f9 c9 b3 72 40 5d 4f 1f | e8 51 bc 21 99 7c 48 a4 03 69 7e 36 81 2c 93 c5 | 85 f1 72 97 17 d9 4b 16 e1 02 93 16 a0 e9 5a 8c | 18 8b 2d 22 a0 68 e9 52 fc 14 55 90 a6 f2 25 49 | d1 90 07 21 fd a8 a8 15 db 83 f7 be ce 21 31 d0 | 18 03 fd af 89 22 76 d9 16 f9 54 ff a2 a4 03 62 | f9 9f ab 74 f4 75 62 99 a7 8b 91 97 ad 9d c4 9c | 3e 40 41 dc 60 23 02 31 5e 46 98 d3 1a 73 73 14 | dd ff 30 58 0d fa ab 00 11 c3 0b 18 0a c3 bc a2 | 29 00 00 24 22 ce 51 25 1e d0 f6 54 17 83 9f e7 | 7f a6 b8 56 15 08 66 12 32 0f c5 1a 1c 37 04 e4 | a3 f5 17 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 72 8a fb e8 f5 d3 16 73 e6 1b bd | ae fd 45 81 b5 65 c1 51 00 00 00 1c 00 00 40 05 | 63 4e 70 bd 7c b5 4d 3a 8c 2e 79 8c 91 4d 92 d1 | 89 54 24 9e | libevent_free: release ptr-libevent@0x7fb364045e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | #402 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 18 0b 56 dd fc 93 82 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #402 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #402 | rejected packet: | d7 18 0b 56 dd fc 93 82 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 96 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-150" #402: ERROR: asynchronous network error report on eth0 (192.1.3.150:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0447 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36001a530 | handling event EVENT_RETRANSMIT for parent state #403 | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #403 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #403 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49708.310737; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006266 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #403 | libevent_malloc: new ptr-libevent@0x7fb364045e60 size 128 "road-eastnet-nonat-151" #403: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #403) | 32 36 13 09 3a 0c 64 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 1d 1f f9 29 d4 7a 82 e5 c3 ed 2d 91 36 94 a3 | ad 42 95 1c da 49 e7 df be 20 17 de b8 10 02 70 | 99 a0 9d 95 41 a8 00 d1 af 94 26 4c 6c 86 0c 1f | 94 7a 02 35 96 84 54 33 fd cb 84 dd 66 c9 68 48 | c0 82 f1 59 9a 21 1d bc d5 30 03 12 1e e7 09 61 | be 0b 67 1d db fb 9e 1e 17 49 85 95 31 47 f7 2b | 4a 86 6c c9 65 82 f2 1e a6 01 6c ac cd f1 e2 b1 | c0 7c 6b 1c 75 70 5d e8 eb b9 df 8a a0 09 66 57 | 4a b4 92 66 fc a3 08 c8 94 4f 6c 58 0d 44 86 54 | 0d a6 ba 1e d2 d3 f5 98 14 c7 bb cb 0d c6 25 81 | 7d 00 f0 be 73 bc 11 32 a7 22 fe 40 f1 5c 99 a7 | f6 f4 02 31 24 83 16 a4 cb d9 f9 bc 7d ee f9 64 | 7a 45 11 03 43 36 f4 ff f8 3b 61 50 62 1a ea 35 | 94 85 76 d9 cf 8d 05 40 c4 4f 44 89 69 5a 20 63 | bb 17 c4 c0 24 8c 90 9c 7c 82 0c b1 fd 04 ab 4c | 94 5c 67 12 3b 66 e3 71 78 3a f5 9a 05 60 53 5e | 29 00 00 24 96 4a 72 fe 73 4d 43 f4 22 71 ca 5d | 92 02 9d 90 a1 de a3 67 65 d9 a5 3e 5d f5 46 47 | 3c 9d 2b 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 97 72 77 63 b0 4d c0 15 33 f7 7b 47 | a3 64 95 74 99 05 10 8e 00 00 00 1c 00 00 40 05 | 3b eb 87 4d 47 ff 24 80 19 6f 36 13 fc b8 88 ec | 58 fe 93 a3 | libevent_free: release ptr-libevent@0x7fb36003f3e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36001a530 | #403 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 36 13 09 3a 0c 64 d7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #403 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #403 | rejected packet: | 32 36 13 09 3a 0c 64 d7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #403: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #404 | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #404 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #404 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49708.381054; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00669 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36001a530 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #404 | libevent_malloc: new ptr-libevent@0x7fb36003f3e0 size 128 "road-eastnet-nonat-152" #404: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #404) | 4a 5a cc 55 a0 5d f2 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 5c 51 83 ab 6b 01 fa 80 7d 29 db 27 cd 7b c6 | 7f 04 2f 6a 27 69 df b1 41 5e bf ae 45 95 c1 0c | 60 62 91 a3 34 a3 09 ec 77 e7 89 a6 51 09 95 12 | 3b ff b9 99 25 19 b1 ca db 05 e4 39 d2 de d6 52 | 26 ca b9 02 d7 13 18 29 d4 9e 9a 68 e5 5b 44 39 | 54 a0 05 f4 ba 65 c0 95 36 73 37 bc a2 90 45 30 | d7 96 35 a2 19 0f c4 75 70 1c 7f 35 ab a5 29 b5 | 6b 5d 34 07 1e e2 3e 41 ca 0a 85 69 25 b8 27 58 | d4 99 f8 5e 96 15 ec 82 ac 10 04 76 9b 35 64 a2 | 61 5a aa b1 99 cc 29 04 86 b5 f4 cc 47 04 55 8f | c7 28 c5 78 33 30 c8 76 93 6d f5 e2 6a c6 30 01 | 28 59 c4 cc 64 9b 7d 8e 92 4e ac 31 52 df 0e bd | 0a 9d da 2a 1d 60 fa 21 2a 50 98 51 8a 76 ec c4 | d0 d7 c3 bf 4d 91 f8 7a 88 5f bc 07 e6 69 d7 f2 | ab ab b7 dd 41 cf 13 b8 5a 48 6f f6 ea 70 5c d9 | fb 24 71 46 69 e2 7c a6 fa 4a f9 ae 35 11 e2 42 | 29 00 00 24 fe 30 87 af f4 c1 ee 21 b0 88 ac a0 | 02 58 85 f4 de 21 52 28 4c d8 94 b1 9c 53 a3 c4 | 4e 96 a9 3b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 20 64 19 b7 d1 4f 25 21 1b 78 33 8e | a2 b3 19 f4 56 5e 34 fd 00 00 00 1c 00 00 40 05 | ec 45 06 4d 08 52 67 71 ea 88 ce 05 15 99 3d c7 | 85 58 3c 64 | libevent_free: release ptr-libevent@0x7fb370014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #404 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4a 5a cc 55 a0 5d f2 1b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #404 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #404 | rejected packet: | 4a 5a cc 55 a0 5d f2 1b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #404: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37801d970 | handling event EVENT_RETRANSMIT for parent state #405 | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #405 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #405 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49708.435404; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005488 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #405 | libevent_malloc: new ptr-libevent@0x7fb370014c70 size 128 "road-eastnet-nonat-153" #405: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #405) | be e8 17 81 54 19 aa 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 35 ee 04 e9 c6 8a 5e c2 8c d0 2d 28 00 02 85 | 8c 37 b4 2a 7d 22 9b 7b d7 a1 23 7d 82 8f c4 6b | 57 c4 dd c3 ee aa c0 59 55 41 ec 07 5b d2 96 3f | 84 76 05 f0 b5 2a e8 98 98 d7 99 f0 e6 85 ba e9 | 7a 9d b6 d3 d8 1c ba 13 51 c2 52 69 b1 b0 51 2d | 27 ff ad 85 cb c3 37 19 4d 04 8f 00 5d 8e da a2 | 83 bf af 69 a5 88 8d 6e 4b fc d9 97 99 c9 fb 45 | db d1 9d 19 a0 0a d0 5c 01 fa a2 fa ec 3d 5c 71 | 97 18 03 d4 ac c9 d5 4f 44 b7 51 11 eb 34 8d f4 | ae 35 d6 d0 d3 d3 55 70 23 2c b8 b9 0d e9 30 e3 | 09 45 cd 57 53 d7 0b 66 63 c7 ad 04 26 12 af a0 | 90 e5 43 30 55 a3 78 25 bd ac a0 c8 d8 1b 48 03 | 7d 5e a7 cb e9 7e 28 c2 c1 55 c3 c2 88 18 bb 71 | ea 43 2f 82 f5 b1 df d2 66 a9 f6 d5 fa 01 de ee | e8 cd 12 32 f5 db da 44 b1 63 d9 46 0a 50 55 e5 | e4 13 08 92 13 df ad 90 0b 31 de af 43 48 dc 7b | 29 00 00 24 ad 05 d9 2e f2 d6 c0 cb b5 b3 6e e0 | 64 6e 66 e1 31 b9 1b 6d 0b a1 0e d8 22 30 ee ae | e8 8f 1f eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 93 4e 39 e4 10 9f 0f a5 0f ed 76 | 86 5f 9d 57 55 de 19 a7 00 00 00 1c 00 00 40 05 | eb f0 2f 13 5d 22 43 08 07 64 33 45 d0 5d dc 6e | 5b 6e e5 c1 | libevent_free: release ptr-libevent@0x7fb37800f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37801d970 | #405 spent 0.147 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be e8 17 81 54 19 aa 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #405 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #405 | rejected packet: | be e8 17 81 54 19 aa 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #405: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ab90c0 | handling event EVENT_RETRANSMIT for parent state #406 | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #406 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #406 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49708.509779; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006048 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37801d970 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #406 | libevent_malloc: new ptr-libevent@0x7fb37800f1a0 size 128 "road-eastnet-nonat-154" #406: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #406) | 5c 1b 3d 38 ad ed bb 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 1a b6 af ea 21 97 b3 f5 89 b5 95 b7 8e 01 21 | 34 29 bd cd 92 66 af f7 07 14 1e f2 4b ac 69 77 | b3 25 64 1a 72 01 08 14 88 fb 34 a6 91 bd 4c e8 | 74 ed 64 90 06 cb ad 54 67 18 ec c2 f6 32 90 94 | 8a 60 b7 b6 26 ea 31 da ec 24 92 6a 22 25 e6 ae | 79 52 07 43 fe e8 78 1d 19 58 3a 0f 01 09 9b 79 | a8 83 55 03 d0 25 e3 a6 6b 4d b2 09 24 dc 38 c7 | c0 36 e4 53 c2 05 eb 85 aa 76 78 46 e9 fc ba 6a | 9d 2a 99 85 b8 e3 fb 99 44 cb 75 c0 ab ae 6e 11 | 07 c0 ca 22 19 62 ce d5 17 5c e1 b9 18 74 78 be | 34 a1 1c d9 92 69 84 5a 1b b1 7e 28 a9 f2 00 ef | e6 0f 63 2f 7a b6 8d 10 3d 27 b5 f9 29 ad b2 b0 | 65 7c 94 5e 21 5a 98 07 17 36 5b b2 b7 51 51 8d | 3d 77 c7 dd 9a b0 95 69 8a b2 64 fa 98 d0 67 3a | d0 c0 eb c5 e3 82 7f 6a 7e d1 db 5f 16 5a 12 aa | ee c9 5e 0d 7b ae 47 81 60 df bf f4 74 63 48 5d | 29 00 00 24 00 c8 88 3e 7a 51 ef 1c 0c 98 f2 86 | d5 82 58 ca a8 80 65 3f cb c6 86 a8 5f 67 eb c4 | af 88 eb 43 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c fb 6e 46 7d 68 85 83 cc d1 35 3b | 25 21 b7 36 bf 74 0f f9 00 00 00 1c 00 00 40 05 | ea 1c 8a 1b 9f c4 37 0b d8 b4 d1 29 da 67 72 c1 | 45 ae 67 d8 | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab90c0 | #406 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5c 1b 3d 38 ad ed bb 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #406 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #406 | rejected packet: | 5c 1b 3d 38 ad ed bb 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #406: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c017ea0 | handling event EVENT_RETRANSMIT for parent state #407 | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #407 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #407 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49708.563079; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008148 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab90c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #407 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 "road-eastnet-nonat-155" #407: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #407) | 0e f3 59 3b 18 9b 4c 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 5f 7f 81 27 bd f8 4f 84 8b e5 e1 d9 93 de d8 | ec 64 3c 7a c3 34 95 f3 06 ea 96 b5 7a 1b 8f d9 | c8 72 7c 66 d5 b2 ca 73 d5 43 7d ea c5 0c 84 ce | ea c7 b2 0b b4 5d 2c b0 44 4e 93 91 63 38 66 d7 | 19 d5 08 6f 6d f9 84 4a 63 7a 55 68 05 24 95 3e | 99 aa 1e b1 c3 ab 11 18 fa 12 e7 7c 5e c4 8f e2 | 44 28 c7 70 13 76 b9 dd 3a a6 1c 9b 90 d4 8f 73 | 83 e9 82 03 c0 46 28 ea 33 e9 c1 33 69 9b 00 f8 | f6 cd 83 94 cf a0 a7 5e b8 a0 8a 65 44 ef ec 83 | 35 ff 33 b2 45 4f 06 95 40 67 f8 16 c1 7f cb 23 | 42 69 1a ee 3e 5b 22 ed 9d 49 26 08 ce 24 1f dc | 4a 71 86 ce 70 39 9b 18 48 00 7f 0b fd 35 9a e2 | 3f 9a 8e 15 96 bd 41 9e d7 e9 02 79 05 c7 13 f3 | c8 1e 09 29 1f ca 34 e6 f2 7a 3f 24 4a 98 16 47 | 9a 91 43 46 5c 83 b4 00 84 95 4d df 42 56 5f 61 | 36 41 b7 50 c0 98 6b 76 ff 78 86 a6 38 01 7c 10 | 29 00 00 24 21 43 66 be 17 99 40 cd 23 ec 46 61 | 66 3c a9 d5 4d dd 70 3a b4 cd a8 e6 b6 42 a4 c0 | 0c aa c9 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 43 3c a2 b5 33 c4 3b e7 27 68 b0 | 1d 1f b8 cf bc 05 b9 a9 00 00 00 1c 00 00 40 05 | 76 06 02 ba 2b 08 ee 9d 42 ab b0 60 2b 0a e2 b7 | a2 85 77 a0 | libevent_free: release ptr-libevent@0x7fb35c03f430 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | #407 spent 0.183 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e f3 59 3b 18 9b 4c 1a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #407 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #407 | rejected packet: | 0e f3 59 3b 18 9b 4c 1a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #407: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0748 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a54250 | handling event EVENT_RETRANSMIT for parent state #408 | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #408 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #408 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49708.625579; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006918 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #408 | libevent_malloc: new ptr-libevent@0x7fb35c03f430 size 128 "road-eastnet-nonat-156" #408: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #408) | 34 97 74 26 6a e5 a4 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 b4 84 d1 c7 68 61 a7 a8 43 5d 75 52 c1 45 ab | 1c 34 c9 1c fb 58 62 3f d2 e4 63 2f df 8e 65 23 | b3 d6 a9 03 c7 71 70 03 ff 1d bb ac 17 a8 6b 6d | e6 be 80 ad c9 77 c7 17 6a 89 49 48 8d b3 43 d4 | 49 ba db 2f fb d6 1b 93 5a 1f a3 ce 04 89 6c 2c | cc 68 c0 e5 12 10 fe eb 35 b6 6c ba a1 43 99 e7 | 4d 42 5d cb 3f a9 dd f3 e4 5f 32 df 76 2b 7a ba | 94 68 cc b7 71 6f 68 e6 66 e9 1a 0b ff e7 f5 9d | 06 aa 01 3c 32 ad d4 f8 5e 61 a5 fe 63 fb f1 96 | b8 0a 85 b5 ad 42 f9 e3 5a cf 27 5e ec 13 9b d0 | 73 b5 31 d4 d2 24 51 4d f5 0b 85 9e 11 85 42 e0 | 88 fc 0a 42 f4 e7 3d 49 ba 53 8a d7 ce 64 df d3 | 52 60 3d 1b 37 34 8f 8c 6a 9e 6e 25 b4 f3 7c 18 | 7a d1 56 c7 cf 72 57 08 b3 73 0c ad 15 18 33 ce | 9c f7 e6 b3 e4 26 15 89 8c 70 86 37 d6 87 03 97 | 84 4a 45 be 3f 69 21 05 76 54 73 82 39 32 70 e8 | 29 00 00 24 59 44 9e 7a bb 43 7f 93 5b bd e5 23 | c1 87 73 73 05 59 35 01 ab d3 f0 0b c4 05 69 18 | 98 63 3b b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 8e f2 86 2b ac 70 a5 cc 8b e7 7d | ac ad 47 30 21 b0 b0 7f 00 00 00 1c 00 00 40 05 | 79 17 f0 70 ea 4a c6 21 3a b7 c0 97 d4 68 33 32 | 9c c8 09 b0 | libevent_free: release ptr-libevent@0x7fb388022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a54250 | #408 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 97 74 26 6a e5 a4 52 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #408 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #408 | rejected packet: | 34 97 74 26 6a e5 a4 52 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #408: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0522 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34800cc10 | handling event EVENT_RETRANSMIT for parent state #409 | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #409 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #409 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49708.696977; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006062 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a54250 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #409 | libevent_malloc: new ptr-libevent@0x7fb388022480 size 128 "road-eastnet-nonat-157" #409: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #409) | 0d 5e 25 c2 55 3c 99 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5e 9e 5e 2e 09 bf 8f 71 99 55 8d fe 7f 83 64 1f | 09 d9 64 f5 c9 93 8a 5c be 46 9e 22 f6 15 48 5f | a3 27 82 be 44 32 8b ed 4e a8 f7 10 74 01 31 7a | a5 a7 4a e9 16 68 9c 40 cb 7b 6b e4 87 2e b5 7d | 61 20 08 88 29 08 bb bf f5 22 fa fd 47 2b fd 61 | a5 c3 48 69 18 1a 27 78 c3 f3 e3 0b 62 b4 52 0b | 48 72 ce 1d 37 3b 34 c5 fc ba cb 1f 9d e8 de ad | 9b ab 2c 3a d9 69 c6 42 6d b1 05 5a c4 77 34 d1 | ff 6d 2c 38 8e 1f 9c 0a 39 45 f9 c1 2e 9a c1 dd | d2 58 ca fc 7a d1 3f 4c 26 24 eb 54 5d 92 fb 39 | 47 60 ec 18 66 63 9c 19 12 10 f2 b6 7c 18 85 c7 | 6c d1 5b c2 e0 13 21 58 85 48 a4 fc 6e b1 46 84 | 53 a9 5a 65 21 91 66 41 1c 5e ad 4e a2 85 5a 4b | dd 4b fe 45 dc c9 fe ab c9 08 d4 96 88 93 93 aa | 1e 95 b1 87 3d 21 a8 b6 2f fd 18 ff 13 73 04 e2 | 11 aa e4 99 8f 8e f6 da 34 f7 b8 a6 55 2e b3 22 | 29 00 00 24 56 91 a2 13 7d 33 fd 14 52 dc d7 9d | 97 62 ec aa 5a ba e0 81 38 20 1d 66 12 9f da fa | a6 b6 f9 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d7 a6 1d 1c 1e 3f 9a df 29 5a 62 1d | 4b b6 a0 46 97 db 0a 03 00 00 00 1c 00 00 40 05 | b4 37 78 a6 35 8d da 4f 96 64 40 e6 05 68 b6 9e | 6d 2b 7a a6 | libevent_free: release ptr-libevent@0x7fb340012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800cc10 | #409 spent 0.223 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d 5e 25 c2 55 3c 99 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #409 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #409 | rejected packet: | 0d 5e 25 c2 55 3c 99 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #409: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.101 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a8ee40 | handling event EVENT_RETRANSMIT for parent state #410 | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #410 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #410 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49708.752466; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005644 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800cc10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #410 | libevent_malloc: new ptr-libevent@0x7fb340012840 size 128 "road-eastnet-nonat-158" #410: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #410) | 59 b5 db 36 67 47 70 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 b7 0b 8c f9 95 bc f7 80 78 70 36 f3 fd f2 85 | 36 5b 98 b3 da 7d 8e 19 72 07 91 60 60 8a e6 82 | 67 b3 ba e3 47 c2 28 3a c4 af df a8 61 5d 73 9e | d2 63 4a 41 c1 df 23 58 85 d0 d0 d7 31 64 13 d3 | fc c4 39 95 ba ac 0f ae 94 0f 0a ba f0 76 e9 ae | a0 35 47 51 b9 fa 43 1f 5e 7f a1 99 3d cc 76 ac | 19 ca 51 32 ad cd e2 9d 6b 98 62 47 ad 2c d1 40 | 11 bd ff e1 9d 02 a1 c8 40 a8 ed 91 e5 60 1c 79 | ee 69 bc ed 65 82 b2 85 d5 b1 74 ab f9 fa 7a e9 | f0 dc 57 ef e3 3e 09 b2 80 4a e9 c3 55 5a 97 3e | 39 d4 2d 85 ca cc 9a e5 d4 76 c5 5e 9e c1 e9 7d | 39 17 67 a4 c4 56 99 a0 e7 0c b7 13 22 44 76 46 | 08 b0 60 5a a2 8d 7d 3c 2d 85 7a 7a dd 83 3a 2b | 27 be 2b 38 04 53 2f 3d 0c cd c0 ad bc 4e 6a 91 | 94 3d 91 ac 7d a2 5b fd 39 2e 69 e6 48 9c ae be | 71 e2 83 13 24 ec 5c 04 d1 c5 4a 80 96 3c 2f 11 | 29 00 00 24 e1 88 5c 17 02 b4 80 04 34 b3 a7 d4 | f8 d1 c3 d6 e1 59 82 cb 1f c0 98 16 57 75 53 e7 | ef 70 14 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 ce e5 8e 76 7c ee 72 e4 c9 6c 0a | 7e 11 3d 4e e7 09 5c 04 00 00 00 1c 00 00 40 05 | 2c 17 58 9d 14 87 37 db ad 40 b0 f7 64 73 53 a7 | 0b 3f 01 e6 | libevent_free: release ptr-libevent@0x7fb36c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee40 | #410 spent 0.24 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 59 b5 db 36 67 47 70 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #410 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #410 | rejected packet: | 59 b5 db 36 67 47 70 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #410: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0638 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a97080 | handling event EVENT_RETRANSMIT for parent state #411 | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #411 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #411 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49708.828903; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007148 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee40 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #411 | libevent_malloc: new ptr-libevent@0x7fb36c0251c0 size 128 "road-eastnet-nonat-159" #411: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #411) | dd dd 24 eb b8 cb 50 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd cd 4b b5 b6 e7 18 30 d4 d0 8e 83 03 53 e6 4e | 8d 99 24 ba 33 2f 0c bd fc e2 e9 0d 81 68 aa 7b | 12 93 68 9f 91 0d c2 fa e1 b9 83 26 f0 5b 9b dd | 51 e3 9e ed 34 ea 5f c9 93 72 24 b6 bd 13 cb 5c | 26 fe cc 72 6c e7 c6 21 ed 4e 14 b2 9f a3 3b 3c | 94 f8 1a 98 76 bb 57 e6 0d a9 bd 26 b1 18 3d 50 | 59 31 42 4b 06 7d ba db 70 1e 1c ae a8 d8 de 3a | 81 ee 27 6d 40 cc 4d 6a 4b fc 36 c4 b0 3a 09 0b | 48 47 43 74 dd e5 cb 90 df 6e e3 46 c3 6c 8b 97 | f3 25 7f d4 fd ec f5 56 ff 6b 80 d1 67 dc c0 79 | 70 cf 38 a2 35 5f 37 c9 04 ae 98 e9 6e f3 26 d3 | 47 94 bb 03 5d 71 7b 87 ad 54 4b 93 a3 b0 71 8f | 5f 69 b0 8d 69 3f e2 c0 02 32 57 3f 64 cb 19 71 | 58 00 09 d8 ce 8f 64 c9 55 9e 7c 00 26 28 eb f7 | 6f eb 0e ab 01 fb ae c5 0f da bd 30 07 46 c2 b0 | 5c ea 05 eb 2d 3f 40 91 20 c1 a3 5a 4f 86 98 86 | 29 00 00 24 a3 6a 54 81 57 a4 87 e3 a7 7a 68 dd | 8e 44 5b 6e 2b 5e f0 9a 3e c5 72 e8 17 f4 34 1c | 65 bd e7 d4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5f a2 a7 20 75 c6 9d 9f 5f af fe db | d7 0a 3e e1 5c 28 6c 20 00 00 00 1c 00 00 40 05 | 37 57 74 7e fa 8f cf 8f 09 51 1f a5 a7 dc 5e 89 | 60 7b 2d b3 | libevent_free: release ptr-libevent@0x7fb37c023b10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a97080 | #411 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dd dd 24 eb b8 cb 50 15 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #411 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #411 | rejected packet: | dd dd 24 eb b8 cb 50 15 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #411: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0506 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c018460 | handling event EVENT_RETRANSMIT for parent state #412 | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #412 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #412 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49708.889224; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.01041 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a97080 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #412 | libevent_malloc: new ptr-libevent@0x7fb37c023b10 size 128 "road-eastnet-nonat-160" #412: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #412) | af 34 f0 93 1d 1b d6 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e0 73 ca 82 d1 b8 25 7f 04 b5 f2 f7 30 87 a9 41 | a5 4a c9 0d a4 7b 88 6a 9c a7 a5 05 c4 99 82 97 | fe 18 55 31 1a 69 24 11 ef 96 2b 9b 00 09 64 93 | f5 9b 6f 9f 26 02 b8 02 eb ec d6 b9 58 77 37 c4 | 15 13 55 d4 ba a0 8c 70 db 9d 5d b8 50 b2 fb 14 | 70 91 27 3f 52 b9 21 d5 ac 35 9f 2f 74 c2 cd a3 | f5 0a 60 3b 9e 8f df b1 5a c8 44 f1 32 14 8d c9 | 96 70 54 8d 6a b3 1d 9e 55 f7 54 39 be 48 72 05 | 31 be c1 bc a2 b1 92 d9 d7 2b ac 35 4b a3 d1 85 | c8 13 0e 09 13 01 9b 53 39 df da 51 e3 f0 0f b0 | b8 cb 35 90 8d 85 96 9f 9a 47 73 3d e9 c6 9a 9b | 64 e5 27 2a 0d 1b 39 d0 c9 ca 54 89 58 ae ef 63 | 30 57 d5 95 13 d6 7b 07 db 4c 1f 26 15 fc 42 93 | 98 20 27 df a5 2d d6 c3 03 e8 40 00 9e a8 d6 5b | d9 5c 3b 12 b9 90 e7 25 5f 47 7e 86 19 c6 bc 15 | 0b 47 49 10 46 90 3e a8 79 f3 d0 fc 23 1f c9 d1 | 29 00 00 24 a3 90 3f ea a1 9a ff 04 92 34 17 b8 | 6f ef 29 47 17 37 0c c0 67 c5 c5 dd ee 94 92 f1 | d0 ea b7 d5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 8b 79 f3 42 b6 33 1b 9b 02 cf 5d | 36 ad 4c 1f 32 b9 37 c2 00 00 00 1c 00 00 40 05 | a6 ab fb 7e 68 25 b5 32 b3 ef df 3a 19 eb c4 3f | d0 c1 29 ec | libevent_free: release ptr-libevent@0x7fb35c014b40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c018460 | #412 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 34 f0 93 1d 1b d6 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #412 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #412 | rejected packet: | af 34 f0 93 1d 1b d6 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #412: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0476 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb374009690 | handling event EVENT_RETRANSMIT for parent state #413 | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #413 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #413 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49708.952521; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006439 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c018460 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #413 | libevent_malloc: new ptr-libevent@0x7fb35c014b40 size 128 "road-eastnet-nonat-161" #413: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #413) | ea 46 85 e7 fd 9b ca c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a d6 4a 46 94 c5 0e 81 7d ce e7 15 1a 5a 21 6b | d0 32 15 1d df aa 19 22 73 4c 48 c7 c9 6d a8 93 | 29 7e ec 61 b6 83 c3 69 04 a5 60 f9 c5 35 27 f9 | 44 bf c3 99 38 07 63 d7 db de ef 2b 00 c6 3d 6f | 1e 8f 0f f0 f2 98 90 49 cc c1 d2 86 82 6d 83 07 | b6 cd 6e db a4 2f 05 29 fa 3e e9 09 c5 23 64 57 | 0f 6b 66 2d b4 b3 b3 d2 ea e7 1c 7e 8b 59 ce a2 | 2a db b2 33 4a cb 53 6b e5 06 8d cf 28 1c 31 94 | 7e 79 27 07 12 0f ee 03 55 92 90 46 1e 9e 32 06 | e3 69 6e 6a 21 a6 b6 3d c6 89 df ef c7 fa b0 eb | ab 8c ae 81 fa 71 38 65 08 c6 41 65 64 a9 83 b0 | bc c3 01 a6 3a 68 d2 5d bb 35 97 d0 1e e7 f8 04 | 04 04 f6 ff 5e f9 22 b6 f2 9f 86 d9 b4 ae ee 49 | fd 07 2d 26 52 e7 63 86 cc 1a 6e 7f 04 ad 81 4a | a3 d7 7a 6d 6e 53 1b 65 52 8d 28 da bd 54 d5 04 | 1e 3e 9f 74 3c 77 dc 33 e5 c5 fe 6f df d3 a7 16 | 29 00 00 24 85 87 06 d7 9a bf 7b 07 3a ec 94 d1 | cf f4 5c 33 c2 8f dc 32 29 58 27 3f e4 e5 19 81 | 63 f8 b3 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 26 20 9c 8e 3c 13 0c 4e a0 e8 24 76 | 9d 56 e7 f6 81 08 36 aa 00 00 00 1c 00 00 40 05 | 3c 55 11 1a b1 a6 35 ac 5d bf b2 4d 0c c0 40 68 | 37 73 05 e6 | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374009690 | #413 spent 0.15 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 46 85 e7 fd 9b ca c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #413 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #413 | rejected packet: | ea 46 85 e7 fd 9b ca c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #413: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0671 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aef6c0 | handling event EVENT_RETRANSMIT for parent state #414 | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #414 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #414 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49709.024885; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006935 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374009690 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #414 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 "road-eastnet-nonat-162" #414: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #414) | 9e d5 a6 6b e9 51 f5 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 17 ff 89 e8 3c 16 16 6a 13 a2 4a 6e d7 58 8c | 31 4a 5d a6 06 21 a0 a1 9e a4 d6 9f 9d d0 c9 ef | 81 a2 6a e5 e1 ce f7 5b 3f cb a3 39 af 4b 00 d3 | 8e ea 93 72 09 07 7e f7 07 70 f1 60 90 61 a3 52 | 45 df 81 dd 3b 9f 90 cc 5a ee 79 3a e6 e9 1c 8f | 3e 5d 20 51 b9 06 0a c7 eb 0e 7c 49 84 44 06 9a | 8a 7d 42 8a 3c 02 e8 20 6f 96 b9 43 e4 b6 78 25 | 2a 47 75 c2 a6 5e 09 93 6e 0a 52 61 7e 11 07 98 | e5 ed 70 aa 1a 26 50 15 8a 10 03 2b 04 12 5a 90 | df c8 9d 86 1f 6a 9b b1 b4 ef a4 64 93 b4 1c b9 | a7 2b 05 40 cd d6 1a ea f2 e2 7e 25 9c 0d 5f 1b | 71 7c a0 ab 46 0c fd 1d 5d c2 80 68 45 9c 03 04 | ba 22 16 f6 4e 43 40 2a 18 55 ee ba be b9 c7 28 | a3 19 30 1c 73 7f 70 9d 56 01 fc 31 bf 29 77 0b | f7 40 78 1c 68 3b 66 2d 2e 5b fb 5d 13 f6 84 1d | 63 eb 8e 4a f6 af 8f 02 43 3a 27 60 08 28 58 6a | 29 00 00 24 8a 22 da 4e 47 50 93 9e a6 73 51 af | 87 1e 05 a5 3e cb 07 7d 69 59 69 03 d3 ed 1d 7a | 33 b5 03 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ba fb 8a fc 1d 3f b9 dc ba d7 c2 5a | de ae b7 6f 1b 1d e3 06 00 00 00 1c 00 00 40 05 | 6c ca d3 22 34 6c 0b 0a d6 9b 01 8f e9 fa 8a 7e | 51 47 3d 5a | libevent_free: release ptr-libevent@0x7fb37004b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aef6c0 | #414 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e d5 a6 6b e9 51 f5 d0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #414 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #414 | rejected packet: | 9e d5 a6 6b e9 51 f5 d0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-162" #414: ERROR: asynchronous network error report on eth0 (192.1.3.162:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0647 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aacc80 | handling event EVENT_RETRANSMIT for parent state #415 | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #415 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #415 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49709.092238; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007256 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aef6c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #415 | libevent_malloc: new ptr-libevent@0x7fb37004b7c0 size 128 "road-eastnet-nonat-163" #415: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #415) | 65 fc 55 c7 f1 44 1e 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 9b 11 f8 2e b4 b5 c5 30 9b 3d a0 a2 4b 27 41 | f3 d8 72 20 8a 56 0a 05 ca 4d 84 e6 cb f6 3e 40 | 63 3e 65 dc a2 c0 87 47 ce 3b 5e 72 88 1b 50 31 | 15 c5 cf 6b 4a 2f c7 ec 02 24 2b 5b d8 13 58 82 | ef 96 ce cf 1b c6 83 84 dd 4e ef ff 6c f9 de 4b | fa f0 63 3e cd 62 10 03 38 09 9e db 49 54 15 3a | a8 3d 15 df b8 ef fb f6 60 02 a0 d4 fd 2e 9b e9 | ce 3a 0e 92 13 6c 3b 4e d2 2c 44 8a 4a 9a 05 6f | c3 bf 63 16 b0 c4 63 88 ff 02 84 93 54 65 74 42 | 97 c9 d1 95 9c 76 cf c6 11 6e 97 99 50 ea 6c f5 | 6f f0 5c 9c c9 57 a9 e3 41 19 f6 b0 38 a3 e5 ef | 84 44 8a 93 ae f1 ef 1d 2e 53 2b d3 a8 41 d5 27 | 64 64 ae fa 1d fd ea 61 22 f5 cc 34 a6 a2 ea 37 | 88 8a b9 05 5f 00 cd a9 3b c3 f2 31 36 31 fa 53 | 3d ba 7c f3 35 4b 65 ab 19 3c 20 1a b3 c4 2a ca | f4 c6 08 71 62 bd 13 1a f6 9c 40 a8 5d ea 27 a8 | 29 00 00 24 e8 b8 58 d7 ae 38 da 44 20 ee 1e 02 | 80 cb 41 b6 8f 71 2c 96 9f ff be f1 a6 fa a0 4e | 6d 67 74 06 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 e0 03 d8 e5 8b 46 47 10 2c a8 6c | 82 9e b3 1d 1e 26 96 28 00 00 00 1c 00 00 40 05 | bb 40 b0 02 70 34 84 30 58 79 6d d4 87 e5 1d 82 | 6b ed a6 65 | libevent_free: release ptr-libevent@0x7fb3780407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aacc80 | #415 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 65 fc 55 c7 f1 44 1e 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #415 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #415 | rejected packet: | 65 fc 55 c7 f1 44 1e 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #415: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0422 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37402ffb0 | handling event EVENT_RETRANSMIT for parent state #416 | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #416 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #416 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49709.152535; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006805 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aacc80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #416 | libevent_malloc: new ptr-libevent@0x7fb3780407f0 size 128 "road-eastnet-nonat-164" #416: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #416) | 5d bf 34 43 fd eb 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 9c 12 61 6e 55 5f 3f e9 df f9 16 83 d1 25 2a | 72 5f a1 78 f7 87 25 3a 22 d7 65 e6 11 d9 d3 59 | e3 ba 0c 77 63 47 38 eb 2b 7e 21 79 54 43 77 67 | 7d 43 26 41 55 e2 a8 b7 fe 98 ba 7e ee 6e e7 d1 | f4 f4 66 e8 1d dc d6 4c 00 81 99 f5 5a 7b 73 a7 | 30 2a 46 7a 31 1a a2 5d 7f 98 25 46 aa 6e fe 80 | f5 47 c9 6c 4b 73 63 fa cd 88 eb 14 22 c8 b1 b2 | ad 5f b2 f2 36 1e b4 11 ad 9a b6 4a 8b 3e c1 87 | 99 5d 71 91 57 ac 82 f2 a3 ed 29 f1 0e 50 36 50 | 84 2e 3a 51 9c b6 89 41 dc e0 0d 62 c7 07 fd 92 | b2 9d 62 79 ea 78 ed 7f ed 48 ed 1d 98 d3 08 ff | 02 b4 3e 75 4f aa f5 e9 04 8d 83 d6 4c a8 75 42 | 31 a1 15 df b2 8a e4 30 1f 81 68 86 a3 e6 e3 23 | 56 ac 18 47 57 cf 03 de 91 03 0e d5 5d 28 a8 63 | aa 5c 8c 97 5e 5c eb 84 7c 09 fb 47 84 e9 d6 18 | 63 4d 10 b9 7d 4e 26 06 3f 25 b1 aa e9 d4 6c b6 | 29 00 00 24 b4 c4 67 16 b9 c2 e8 af d8 82 12 ab | bc d9 b4 36 b0 6a ad c4 e5 8c 60 6e da e3 9f 02 | d5 5c 1a 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 19 76 97 4c b0 23 bd 31 57 aa f9 24 | a0 38 a6 39 12 13 22 3e 00 00 00 1c 00 00 40 05 | d7 f1 41 97 86 a8 54 0a 0b 1f 8a 34 7f d0 a2 86 | ea 0e a2 fa | libevent_free: release ptr-libevent@0x7fb374034460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | #416 spent 0.134 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5d bf 34 43 fd eb 2e 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #416 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #416 | rejected packet: | 5d bf 34 43 fd eb 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #416: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c00cc10 | handling event EVENT_RETRANSMIT for parent state #417 | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #417 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #417 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49709.212863; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007049 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #417 | libevent_malloc: new ptr-libevent@0x7fb374034460 size 128 "road-eastnet-nonat-165" #417: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #417) | d9 e4 18 5f 59 64 b9 ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 fd ed 03 c4 13 a8 51 65 6c f8 7b f8 e0 2d 89 | 59 12 b6 d0 fa 5d d3 b6 48 1f 05 4f d0 37 4e 96 | b6 b0 a9 07 5a 84 b2 22 72 c2 6e e4 2c 16 e8 fb | c8 92 b8 74 ce 3f 40 30 b5 60 8c 95 d1 d0 42 81 | 96 4a 3e 9a 08 06 af be 4a d9 72 15 c0 c3 46 78 | d0 1e d0 10 cd c4 48 fd 2d ac c2 45 66 8d 26 84 | dc ff cb c9 a3 60 b9 5c 03 1c 63 7c ad bd 60 96 | ce 2e d7 57 49 16 93 e7 43 2d b6 d5 b4 ce 5b 3b | 96 51 3a 88 ff 32 38 dc 5f 0b a8 74 a0 1a 49 87 | b5 db a2 1f ed 10 a6 d0 7a 48 4a 90 79 4e 5a f9 | 2b 8b 33 88 7e f6 9a 82 54 47 b3 ae d3 d5 19 8e | 35 94 b5 a7 07 70 69 91 1e 2e 08 a0 fa fa bf a8 | 09 5a 06 2f 9a 90 75 b5 b1 fe 11 2e 8d bc e2 8f | fc 8a 4c 02 b2 2c 51 5d d4 fd cc 21 3e c1 63 73 | 47 88 57 72 c3 e3 90 eb 42 71 fd 34 f9 5d 5f ad | 35 a7 22 19 95 d8 2d 82 e5 c2 0e d7 d8 88 22 f6 | 29 00 00 24 df 2c 07 75 0e bd bd 78 6f 85 ca 62 | 53 2e a0 29 e4 f9 3b 0b 22 fe c0 44 7c 40 c5 a3 | 8b 56 a4 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 33 f3 05 bf ce a7 d8 4f e5 99 24 52 | 75 47 3a d4 7d 71 ad 77 00 00 00 1c 00 00 40 05 | 01 69 5d 3d 4a 00 3f a4 76 63 f4 90 ae 45 6d 8b | 22 6e e0 18 | libevent_free: release ptr-libevent@0x7fb34c03f570 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00cc10 | #417 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d9 e4 18 5f 59 64 b9 ab | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #417 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #417 | rejected packet: | d9 e4 18 5f 59 64 b9 ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #417: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370012bf0 | handling event EVENT_RETRANSMIT for parent state #418 | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #418 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #418 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49709.280135; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007381 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00cc10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #418 | libevent_malloc: new ptr-libevent@0x7fb34c03f570 size 128 "road-eastnet-nonat-166" #418: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #418) | 1c 58 36 d0 b8 a0 d1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 35 21 69 13 ea 9b 51 f5 f8 3d bc 58 75 ed a9 fd | 17 d1 ac 45 30 9e bb dc f5 67 d6 33 5f f9 21 3b | d7 08 0c bd e4 4c bf b2 e0 66 df d2 39 12 b4 cd | 51 1d 79 99 b2 28 9d 92 25 3d de c7 de 50 60 c0 | b1 e7 b1 2f 20 ba 56 e0 cc d5 d3 89 fb f3 3a 69 | 08 b8 19 34 ad 51 11 33 2c 83 6c 01 df 40 a9 5a | d2 8e ac 81 f5 73 32 a5 92 89 d9 43 53 9f d1 60 | 24 f6 18 43 4f b2 cc 04 87 ab 6f 28 3d 9c e1 be | 1d b6 6f 40 8a 39 f7 27 97 65 7c fa 70 bb d3 47 | 6d aa 41 65 fd 87 5b bf 5a 85 1c ca 2d 31 4b 63 | 3b 57 1d 34 66 19 31 70 16 5e 12 2a 4b 3c f3 aa | c7 b4 1f b1 9b ff 71 77 21 47 b5 ee 99 1f 02 09 | 95 71 68 b7 06 9b 0f 65 04 ee a4 b9 3b 45 42 02 | 7d d2 87 0e 66 c1 75 4c ff 7a f3 83 39 de 46 b2 | 20 fd 8a d9 22 4f c4 77 47 fd 4b 1b 01 cf 2f ef | dc 02 1e 19 bc 0a 3d 9b 32 25 8e a1 b4 27 34 08 | 29 00 00 24 1a d8 6e 71 ca d7 ba 26 1e 49 f1 5f | c1 b0 03 8a 8a 69 67 55 4a ef 6c 1a 26 5d 01 35 | 4b 44 6d e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 63 ba bc 17 58 ec 8f 3d 47 af 87 | d9 d9 f5 4c 16 0e 40 2b 00 00 00 1c 00 00 40 05 | 0c c9 6a 54 72 2b 9b 5b 7b 1a a4 b5 a9 4f 1c b9 | a1 57 0c cc | libevent_free: release ptr-libevent@0x7fb35c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370012bf0 | #418 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1c 58 36 d0 b8 a0 d1 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #418 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #418 | rejected packet: | 1c 58 36 d0 b8 a0 d1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #418: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.043 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340008e80 | handling event EVENT_RETRANSMIT for parent state #419 | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #419 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #419 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49709.345444; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.0061 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370012bf0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #419 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 "road-eastnet-nonat-167" #419: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #419) | 13 42 1a 05 2a a9 f4 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6c 82 ba 57 e5 18 7f 6d c1 4e 6c 32 74 c7 8d bc | fa 9e 5f 85 57 91 bd e7 d1 f6 a5 cc 56 d4 ef 2c | 82 2b a5 62 6a 68 41 f0 a0 92 fa 2e 12 6a 74 95 | 56 98 09 32 67 8d a9 cf ce e8 4b 16 ca ae fd 57 | 33 7d 99 6a 29 1d 52 35 0b 5c 55 de 21 8b fe 4c | 64 ea 17 c4 c0 64 cd 47 31 4b 7a 08 f8 bd 37 3f | 72 ba 30 cd 0e c2 9d 0f e4 8b 3f b8 4c 2a d4 69 | de 4a 7f 8a a8 eb c0 7f 8f b2 10 0b d8 35 aa 5e | c8 ac 23 ce e4 c8 52 08 91 9c 13 ce 38 17 f1 d8 | db ec 31 93 d6 0d 09 93 5b d1 dc 9c 92 3b e5 29 | 17 5b e6 ee 7f f5 fb 3d 38 b5 23 c0 cf 25 d5 5b | 67 0a 2b 07 fd 68 8f 4c 74 c9 96 0b 9b 44 5c 6b | 0e 2d 70 4b 98 d5 d7 b9 54 dc 11 1e 19 cb 73 3f | 22 ca 80 46 28 a8 4a 20 64 29 4c 39 a5 b7 25 84 | 93 fd 4d 3a a6 fa ab c2 68 fc 5d fb 3c 7c 06 72 | eb 28 8a f5 09 69 59 c1 01 26 88 c4 c6 36 f6 6c | 29 00 00 24 83 3f e0 e8 30 90 0c c2 fd 9a 5c 8a | 88 7b e1 27 5d 3c cc 26 1c 41 3f 95 a3 1e 69 69 | b9 67 17 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 b9 c0 cf 3f 29 65 8b 9d 3a 51 6d | 0f 16 20 c0 79 fc 1d 37 00 00 00 1c 00 00 40 05 | 67 f3 84 dc 78 2e 75 89 44 b5 31 a8 97 13 e9 a5 | b9 b4 3a e4 | libevent_free: release ptr-libevent@0x7fb340044850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340008e80 | #419 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 13 42 1a 05 2a a9 f4 f2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #419 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #419 | rejected packet: | 13 42 1a 05 2a a9 f4 f2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #419: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #420 | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #420 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #420 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49709.419751; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006827 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340008e80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #420 | libevent_malloc: new ptr-libevent@0x7fb340044850 size 128 "road-eastnet-nonat-168" #420: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #420) | 38 01 94 6e be 3a 28 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c e6 6f 10 c2 18 44 e2 34 88 94 b1 6e ad 96 2f | 7e f2 2f d5 05 74 10 9d b0 ed 16 ba d1 bb 6a 81 | 3b 36 bb 33 64 6a 4b 49 98 6b 61 6b 38 a7 f0 f9 | 85 f1 ea 1f 82 7f 75 2e b8 87 48 fb ca 42 ad 54 | 59 d3 d4 98 fc e3 db 9e 06 1c 4d 0a 68 e2 82 b1 | b4 79 61 9d ef 49 6d 74 7e f5 a5 55 9d ac 1f 86 | bc 38 61 c3 ec 65 14 03 d9 05 f4 3a a0 cf b9 81 | ea f9 8e 26 2a 33 57 de f0 0c 7b 3a 31 62 59 7d | 0a 51 80 e9 b3 45 96 f0 0f c4 ba 78 af bf d6 5a | 60 67 ef 7e 3d 35 d6 cc 9c c8 4a 58 b2 0f d6 d7 | a4 37 58 a2 99 5b 23 f1 45 8d 6c d3 30 bc 9f 64 | 97 c5 ef 20 d5 b9 a3 78 d6 da 52 f2 da 0c 22 0a | a7 af 15 bc c7 88 8c 82 a8 a3 ee 2f 8a ad 53 b2 | a0 1b 8a 3b ba 0a 34 48 34 2f ad da 72 63 db 61 | 9e b4 c4 95 69 50 db f5 62 4c 82 15 0a a2 7d 3d | 5b 37 5a 63 75 a1 9d 88 2f 4d 72 7d 91 14 f6 58 | 29 00 00 24 a2 fc 3c 40 ce 99 e3 62 f3 97 ac 0a | d5 d9 6a e9 cb 20 69 0b 55 a4 ef ef 10 02 28 ef | bc 3f 93 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 0a f7 67 8f e9 41 30 08 68 43 0c | 01 13 f9 c1 61 fa 63 aa 00 00 00 1c 00 00 40 05 | ef 1c 5b ca 2a 2f ea 7b fb 12 61 31 e7 f2 9d c7 | 67 58 3e 74 | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #420 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 01 94 6e be 3a 28 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #420 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #420 | rejected packet: | 38 01 94 6e be 3a 28 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #420: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338018460 | handling event EVENT_RETRANSMIT for parent state #421 | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #421 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #421 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49709.491122; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006886 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #421 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 "road-eastnet-nonat-169" #421: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #421) | 53 46 78 d0 f9 b4 2b ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 1e 13 6f 9e 9e 28 7d 48 cb 8f 21 ad 12 23 0d | 2e 17 4b ec 60 47 24 f9 49 65 0f b8 05 f3 b2 c5 | 35 0c dd 44 2a 04 47 c6 96 e8 e3 9d da 44 54 8d | d0 16 cf 7d 24 e8 e0 cd a8 2c 8e 39 d3 b2 8b 7f | 72 0a 52 da e9 14 4a cc 17 a9 78 b8 cd 5e be 1d | b9 b5 cd 7b b6 5f 02 22 ea c4 0a a6 8f a3 01 6c | 5b 53 24 36 89 d6 72 ef 99 b2 12 aa fb cb aa db | b2 d1 08 23 c1 6a e2 dd cd 0b 52 1b 08 f4 07 44 | f6 bb f7 14 71 89 1d 05 a9 2e 9d 11 f6 47 e7 7b | 5c 89 c0 6a 79 44 41 55 07 e9 d4 c5 65 08 95 21 | 02 27 ea de 7e 8f c1 e5 b3 56 d5 44 30 34 c9 29 | 25 c6 6c f5 76 8d bd 58 fa 4e 08 93 a9 a8 12 bd | 8c 61 44 c0 18 3b 6c f3 4a 89 60 c3 7a 98 37 61 | d4 a6 d5 c6 6d e0 61 22 11 f5 b2 91 df 3b aa 2c | 62 52 60 02 03 f1 56 8c f6 e3 d9 1e 59 30 5a b8 | cf c5 38 a8 40 43 1f 7b 8b 5b 7c d9 77 f7 d9 ba | 29 00 00 24 41 49 08 f2 3f 7f 22 d1 7a a9 25 e2 | 15 a5 3d 37 9b e8 6b f7 56 6b 10 73 05 1d f4 b0 | b9 8c f9 c2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 d0 78 7d 22 f6 6d e2 e5 b7 d3 9b | 09 f6 2a 83 8c 96 39 01 00 00 00 1c 00 00 40 05 | 72 19 84 dc d4 59 5b 35 51 4f b6 9f 34 c6 2f ea | b9 aa 04 8a | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338018460 | #421 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 46 78 d0 f9 b4 2b ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #421 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #421 | rejected packet: | 53 46 78 d0 f9 b4 2b ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #421: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0721 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46acc140 | handling event EVENT_RETRANSMIT for parent state #422 | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #422 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #422 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49709.558496; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006408 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338018460 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #422 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 "road-eastnet-nonat-170" #422: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #422) | b8 e0 2b 96 c7 45 5a 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 6c 40 a5 03 bc 57 72 c1 66 d6 ac 89 5b f4 c1 | d0 36 2b 40 f8 23 54 39 34 b5 82 a2 ec a9 be f0 | 9e 2a fb a5 33 fb bf 78 6a 65 ee e2 5e 78 b2 97 | 57 06 96 a7 85 bc b5 2f 57 ad dd 92 ec d4 39 15 | 9d 72 7c 3a f0 31 6f b3 e0 1f fa e2 bb 36 ae ad | 14 69 bc c7 2b b8 d3 5c 99 5b e0 8a c5 e8 54 ff | a1 c6 b4 be 7e 54 b5 cb 08 e2 27 e4 e9 7a 16 60 | ce 85 f4 97 da 4f 4d 09 2e 8c 52 19 57 93 83 db | 87 b1 16 b3 51 00 56 5d 37 6d b9 b3 a2 bd 99 3b | aa 47 42 33 bb 18 39 df 45 15 55 a1 5a 1e 8d 44 | 65 5b 06 c8 ce 40 9d 80 8b 2e ca 26 d1 79 fd 78 | 43 19 a6 31 62 db c5 b6 b4 99 3e 3d 0f 92 3a 22 | 67 54 41 d3 95 c5 98 ed 1d fc 1c 5c cc 1c ff 1e | 72 31 d9 fd 8f 7a 3f e9 62 8e 84 af f0 f7 f0 8d | 9b 73 d6 fc ff bc e5 4a d7 b9 1b 80 22 88 c1 56 | e0 bb 60 af 81 19 d7 73 ec 24 2d 0b 96 d4 fa 10 | 29 00 00 24 2b c3 8d 3d 91 5a 53 1a b5 f4 6d b1 | 02 bf f8 18 e1 84 d7 9f a5 0d 77 07 91 b8 4d 3f | 04 89 f2 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 85 d2 75 8f 47 7e 81 98 63 03 9f | 1d 8c c0 94 92 93 75 cc 00 00 00 1c 00 00 40 05 | 2a 28 b7 7f 38 5f e0 65 f6 1d 4d c9 d5 6f ea f1 | c9 85 fb 5d | libevent_free: release ptr-libevent@0x7fb3440300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acc140 | #422 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b8 e0 2b 96 c7 45 5a 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #422 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #422 | rejected packet: | b8 e0 2b 96 c7 45 5a 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #422: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0584 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c012630 | handling event EVENT_RETRANSMIT for parent state #423 | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #423 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #423 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49709.628846; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006827 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acc140 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #423 | libevent_malloc: new ptr-libevent@0x7fb3440300e0 size 128 "road-eastnet-nonat-171" #423: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #423) | 0d af b2 c4 93 36 1d aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4d 70 3e db fb be 8b b3 fd 73 c0 a9 96 0b 3d a8 | e8 36 31 e7 9c ec 5a 7d ff 70 f6 37 85 23 83 66 | b2 fa b4 b8 d5 45 16 aa a6 25 06 9f 8e 8e bf 87 | eb 95 12 b7 4e e4 06 f4 d1 f8 40 ef 32 40 e6 a6 | 6e f4 f8 67 e1 5b 90 26 e6 0e 43 21 0c 13 d6 b5 | 8e c1 48 f1 b8 e8 39 77 8f 82 36 7b 93 75 c8 ab | 84 91 17 9b a4 7d 3c 17 79 cf 26 b4 a0 3c f6 3b | 8a 9e f2 22 e0 37 3d 4a 22 71 37 fa af 63 94 e0 | 5d cb 53 25 8c 9f 3c aa f6 38 ac 60 e7 b7 a3 49 | 84 5c ea cd 1a 4a 52 75 d6 46 93 25 09 85 d1 82 | dd 53 68 4b de 95 3f 19 ff d3 86 0a c0 38 25 ae | 80 9b b3 ed 25 0e b6 ad 72 55 3f 58 28 54 96 74 | 26 60 4c 26 05 26 c2 53 24 50 7e 5b 35 6b ca a1 | e8 d8 01 f8 35 32 32 e5 07 d9 c6 ca 24 0c 96 3a | 31 97 ac ed 1f 95 1e 6e 00 fc 4a 03 2a 9c 00 a0 | bd e4 04 9f 5c 17 08 9c 92 06 6e 29 32 98 a2 91 | 29 00 00 24 ce f0 94 25 9a 41 87 5c 3e 7f f2 93 | 02 a0 d4 6b b2 dd 60 48 d2 68 61 fc a3 c4 4b 4a | b6 d0 3f b9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 fb df b4 aa 7f 08 b4 87 40 7c 29 | 54 a9 d0 e2 e4 44 95 43 00 00 00 1c 00 00 40 05 | b2 9a 73 50 a7 57 97 7d 3b 57 52 b7 42 61 08 84 | 33 0c bd 82 | libevent_free: release ptr-libevent@0x7fb36c04b970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012630 | #423 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0d af b2 c4 93 36 1d aa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #423 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #423 | rejected packet: | 0d af b2 c4 93 36 1d aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #423: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0657 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ac3ec0 | handling event EVENT_RETRANSMIT for parent state #424 | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #424 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #424 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49709.69923; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007771 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012630 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #424 | libevent_malloc: new ptr-libevent@0x7fb36c04b970 size 128 "road-eastnet-nonat-172" #424: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #424) | e5 61 ef 5f 7f e3 58 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c da e9 09 30 1c 29 bb e6 91 cb 4e 69 4d ec 03 | b5 f9 29 7a 23 48 20 ed f7 47 c2 fe 06 e6 43 d7 | dd db db 34 94 8c 85 3b 55 9b f4 3a 74 ed 7a a1 | b8 84 40 94 dc 5c ed 16 d0 73 2d 49 36 0b 9a 1d | 7a 62 45 16 8d 9c 63 79 31 b8 8c 83 f1 0e b1 7f | 67 fe bc d6 57 49 2e 4d c3 49 48 a7 55 5f ff d0 | 14 68 fc 6f 72 30 bd 46 7b 9a 8c f4 dc c7 37 1c | e4 a4 8f 19 bc e7 61 cc 6b 11 48 dd 4e 4a 37 e3 | ee aa ab b1 b2 36 8e 89 eb 7e b7 77 69 a0 09 80 | 3c 6b fc 75 71 9a f3 bd 94 2c c9 c7 7f d3 9b 98 | 01 34 f8 57 09 1c 44 77 27 2b 95 8b 42 b2 1e 03 | d7 04 87 d9 03 b3 37 7c 1d b7 57 41 2d 16 5a a8 | dc c5 ad 48 e5 82 26 97 54 fe f5 c0 fe b9 29 58 | 35 ce 2a 1a 65 c3 c1 3a f9 04 5b 80 08 58 bc a4 | 5f 74 90 a2 3e 82 ee a6 80 5f 67 41 cd ba a6 4f | 66 85 f6 7c 29 e8 a5 11 0e c2 6f 44 c1 41 6a eb | 29 00 00 24 7c 1f b6 fc f1 5f 8d 51 2e 05 d2 13 | e2 d8 d5 f5 0f 0a 46 07 58 f7 ec 9e c5 1c 22 09 | 2c cd 2f ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 13 d1 0c 8f d2 91 2d a0 36 f1 93 d6 | bd 3f 30 ca a6 e2 8d 8a 00 00 00 1c 00 00 40 05 | 48 c0 59 12 12 13 1e e0 ba de 8c 06 ba c3 58 23 | f1 28 ea 8c | libevent_free: release ptr-libevent@0x7fb384027b30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | #424 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 61 ef 5f 7f e3 58 2b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #424 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #424 | rejected packet: | e5 61 ef 5f 7f e3 58 2b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ac 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-172" #424: ERROR: asynchronous network error report on eth0 (192.1.3.172:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46abbc00 | handling event EVENT_RETRANSMIT for parent state #425 | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #425 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #425 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49709.760541; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006691 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #425 | libevent_malloc: new ptr-libevent@0x7fb384027b30 size 128 "road-eastnet-nonat-173" #425: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #425) | f7 cf 50 4a 74 06 05 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0a 92 89 d6 89 4e 50 5f b7 2f 6b 96 d5 81 21 07 | ab 44 17 58 90 1d 7b 64 81 e9 17 d7 bd fe aa 4b | 0a 10 ad 93 a3 c3 87 5f f5 66 29 fb c9 3a c9 b1 | 31 b0 a9 ee c4 90 84 b7 e6 dd 91 e8 75 48 e7 2e | 93 2f d6 a2 f7 4b f6 49 3f d9 f6 d0 5a d6 d1 dd | 4f 9d c2 ed c5 18 e2 07 13 e3 28 e5 ef cc 0a 8a | 3b 35 e0 3e 37 bc 79 9f 2a 04 4a f3 9c f9 c1 fe | 06 93 6a fc 31 07 8c 82 e2 3d 36 5b 4c 64 57 29 | 42 03 5c 40 11 83 46 58 6b 89 40 fb 97 9c 72 d8 | 16 d1 a0 21 3d 63 55 3f 12 ce 3e bc a1 a4 b1 4f | 21 3c 91 be 83 c8 57 a7 2b 28 e1 48 64 02 57 7e | 42 a3 f1 45 48 e1 db 05 2e fb d4 4c 7c 8a 0a 60 | 5f f4 86 80 46 9a e0 d0 18 11 1a 4d bb 7c 02 87 | bf 2e e0 bb 87 e9 5f b8 47 04 4d f1 27 cf b3 29 | 9c 1a d0 ad 05 bc 03 0c 16 0c 3a 7e 72 1b 12 70 | b9 a4 26 8b 78 5c b2 39 ba 99 5c 08 5d fd 0b bd | 29 00 00 24 5f 48 0d c0 35 2d 82 0c 4e 37 c0 2d | fb 4b f1 c7 3e 7f d8 da d2 4b 1d 20 b9 ad b0 f8 | d9 af 0c f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 91 c4 e4 6c ee a0 d8 c3 62 ab 89 | a1 7e a7 1c b9 03 c3 d0 00 00 00 1c 00 00 40 05 | 62 01 4a 70 10 9c f9 53 26 65 4b 23 2c 02 6b 53 | 25 3b 71 4a | libevent_free: release ptr-libevent@0x7fb37c01a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc00 | #425 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 cf 50 4a 74 06 05 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #425 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #425 | rejected packet: | f7 cf 50 4a 74 06 05 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #425: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb388015720 | handling event EVENT_RETRANSMIT for parent state #426 | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #426 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #426 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49709.83184; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007023 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc00 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #426 | libevent_malloc: new ptr-libevent@0x7fb37c01a4e0 size 128 "road-eastnet-nonat-174" #426: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #426) | 9a cd 73 8e 7d d4 98 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 8c 97 9a 7b 25 95 00 9a 77 62 32 ef ca 9f d6 | 76 8f c1 1d 7b f7 f1 fd 6f 49 39 37 2f 63 23 81 | 71 66 7a 84 28 0c 71 94 62 69 ce 59 2d d7 c5 69 | 55 1a 91 d5 7e 6b 73 77 b1 63 3d e2 98 99 4c 7d | 88 69 a7 7b 5e bc cc b8 0e b3 73 c2 2e 32 ae 8e | 86 79 03 81 0b 4c 54 b4 73 a6 e2 6e 97 ca 67 d3 | 85 98 35 01 61 ca 66 d6 14 1b 0e ed 3a 29 6c 85 | ba 28 d6 d7 db e6 44 77 a6 ce 5b 46 99 7c a1 df | 78 8d f1 17 d8 0f f9 ea 99 30 fc e2 cf b2 41 e0 | b2 47 0b 49 32 f7 03 99 56 d9 28 c3 7a 54 f6 02 | 19 cd 98 7b 73 22 d4 cd 39 3f 7a 0d d8 d7 cd a6 | 8a 6b 30 16 cd 73 f2 96 6c 21 9f bd 4e e5 1b e4 | 55 08 4d 75 fb 1c cb 36 33 b5 70 97 3d ae 1c 0b | fd 17 d6 8a db a7 4c eb 93 47 b3 25 b1 c8 9d b9 | 3c fc 99 0e e7 eb 29 07 c1 90 16 1e 24 76 3c e1 | f0 b6 2f 6d 76 8c 81 1b 13 f1 8a 90 f5 6f 06 29 | 29 00 00 24 9e 79 2e b7 2a 97 cc 4e 5e 3a 53 a1 | 14 f4 9d f2 e0 f1 3a 21 7a b3 38 2d 77 ac 99 ad | 8b c3 54 da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b4 36 a3 f8 78 1e 60 6d 59 1a 44 b3 | 39 63 64 a7 a1 bd a5 d0 00 00 00 1c 00 00 40 05 | 8b d1 e6 ab 49 4a f3 b9 19 1d c0 80 f7 d0 cb 97 | 3f 74 7f 21 | libevent_free: release ptr-libevent@0x7fb3600407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388015720 | #426 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a cd 73 8e 7d d4 98 03 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #426 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #426 | rejected packet: | 9a cd 73 8e 7d d4 98 03 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #426: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #427 | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #427 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #427 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49709.908106; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006313 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388015720 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #427 | libevent_malloc: new ptr-libevent@0x7fb3600407f0 size 128 "road-eastnet-nonat-175" #427: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #427) | 4d cf ce dc 5e 69 0c 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be f3 80 6d a1 4d bc 3b 63 de fe 7b 5d 35 aa 05 | b1 28 d6 19 4f ca c2 b6 85 f2 21 b1 5f ee 7d c3 | e5 4d ce d8 a2 87 47 56 c6 32 a1 9b 66 32 11 d6 | 2a 42 af 5d 8f 34 c5 d5 6c 06 20 9f 03 7a dd 4b | 48 34 c3 3a 83 64 cc cf 03 38 0f 85 e3 77 24 47 | d5 16 ac 4d 8b 47 b5 03 3d 95 eb ea 92 b9 cf 0a | 68 66 89 9f e9 d7 ae 03 3d 64 75 ac c9 d5 b3 10 | de 8f 17 7b 40 ef 37 ec 93 3c cd 2d 80 d3 81 0e | 06 7b 23 ba 8b 61 0c f3 0a da 72 5d 9c fe 2a 86 | bd e9 e7 fc 88 d7 20 01 3d 62 9b 97 2d 52 60 5a | fa 1e fb 14 48 2b da dc c9 bc 30 8f d1 65 96 cb | 33 cf 05 cd 5e fb 63 36 4b e6 22 41 78 36 97 51 | 7d 03 25 93 d8 95 93 1e 55 d3 a5 af 94 2f 9c 8c | 5f a3 40 23 47 68 5e 3a 9d 49 f6 a2 e8 96 cd ae | 14 48 e0 e0 ab cb ce 26 3e 2f 37 d7 ae b6 aa 01 | 36 16 4f df 45 31 cb 1a 1c 34 5e a5 cc 5a a8 48 | 29 00 00 24 fd 8d 8b b7 46 89 9a fa b3 ab b5 e9 | cc f2 e8 c2 d2 52 f8 a0 49 af 7a 94 c3 9c de 32 | b7 d8 84 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9a c6 fd c2 96 5c 57 4c be 19 76 6e | d6 a6 82 da 0b ee 49 1a 00 00 00 1c 00 00 40 05 | 12 be 5a 47 ba 89 37 fe 5c 7b 97 4a 79 4a eb 43 | ad 50 1a 96 | libevent_free: release ptr-libevent@0x7fb36804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #427 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4d cf ce dc 5e 69 0c 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #427 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #427 | rejected packet: | 4d cf ce dc 5e 69 0c 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #427: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0711 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0d4c0 | handling event EVENT_RETRANSMIT for parent state #428 | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #428 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #428 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49709.980511; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005798 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #428 | libevent_malloc: new ptr-libevent@0x7fb36804b850 size 128 "road-eastnet-nonat-176" #428: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #428) | fb 15 42 71 fe 24 9a a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 50 d4 99 e3 c3 b2 8d 50 f4 55 ae 47 3b 25 61 | 1e c4 05 b1 59 21 46 35 0e 81 55 dd de 7f 65 40 | 00 1a 4e c9 0d 72 6a 7a 8e 31 f2 b8 05 87 95 5f | 92 19 3b d0 26 f7 ef a7 b3 37 5f 37 15 e9 34 12 | 33 cb bc 05 19 62 04 88 c4 b0 11 3c a2 fc 2e a7 | 48 74 27 c5 24 6a b1 84 34 89 1c 11 73 e4 fb e9 | 1b 3e 80 7d 33 32 51 1f 3d 67 11 16 e4 23 05 bd | 3f 72 2d 38 c9 0b 38 c0 12 64 3a 43 5b e7 46 c1 | 2b 7e 29 d4 ef 37 71 a8 e0 71 19 2f a1 c5 6c 53 | 94 fe 4e 57 73 5c 74 b5 d5 7f cc e2 3d a3 30 0d | 02 5c 9d dc 4d a0 93 77 cd b6 58 cb 5c 89 fe a8 | 40 8a c4 11 16 43 cc f4 7d 6e ae 00 27 3a 7c 8c | 12 14 7e db be 5a 42 72 b9 d0 07 1b fd aa 82 51 | 0e fb 68 c6 88 b4 35 6c 93 af 50 1c ff 48 78 d4 | b7 b7 c9 3d bd cb b9 82 34 8d b6 5a ff e7 73 c1 | e0 88 1f 51 42 a1 76 7d 4c 3a 1b 39 03 d3 42 78 | 29 00 00 24 e8 4b ce 8e 1c b5 fd 76 2e 19 5c e4 | 1a 51 b2 57 c5 b9 7b 5b bc c1 c3 17 ad 08 ad 32 | c1 29 cf d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 5a 55 94 7a 84 e5 8b 58 e8 27 7a | 96 44 f5 8a 4c 99 6f 81 00 00 00 1c 00 00 40 05 | 54 c7 00 62 13 8f 45 35 f4 93 09 e0 a0 98 7d 08 | 6e 4a 7d e5 | libevent_free: release ptr-libevent@0x7fb34803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | #428 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fb 15 42 71 fe 24 9a a9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #428 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #428 | rejected packet: | fb 15 42 71 fe 24 9a a9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #428: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0469 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35804b810 | handling event EVENT_RETRANSMIT for parent state #429 | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #429 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #429 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49710.071831; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008162 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #429 | libevent_malloc: new ptr-libevent@0x7fb34803b0b0 size 128 "road-eastnet-nonat-177" #429: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #429) | b1 3d 9b 75 e9 17 32 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 58 34 a3 ec c6 75 50 25 fe 5f 41 58 c3 98 5a | 11 1f 83 e4 20 79 02 69 b1 3d ac 82 33 8f 44 96 | e7 d5 9d 7b f3 d7 f5 f1 3c 4b 07 77 e3 30 83 22 | 33 90 f7 d8 39 7d 51 da 1f be a3 9d 27 21 e0 23 | 1c c5 b5 f8 01 28 d0 3f bb de 17 8b 08 3e 77 12 | 3b 7e a1 ef 9e 6d 3b c1 0f 78 3f 7f d4 15 3e 67 | bd d8 07 2d 5c 0a f8 3b 6e 03 96 47 2a 3b ad 8d | fd ac a5 a9 41 55 69 70 54 4f c8 07 46 0f 75 8a | 8e 3a c9 5a 0e 6f 91 97 a2 53 99 02 54 c0 74 38 | 8d d6 59 17 7c b6 f5 96 24 2d 36 88 1b c1 a8 f4 | 9a 2c c6 20 9e 9c 1f 79 b7 b2 e2 28 6d c8 dc ea | ab 6f 81 8f 3c 54 99 e1 b5 ac 7a 7b e2 4b b7 47 | cc 01 c3 58 76 3a 5d 7a 87 5a 60 d6 14 71 21 77 | 7d 56 a9 78 8c 67 16 f3 5f ff 22 ed 4c 9c 08 f9 | b7 a6 81 b8 d7 76 0d 66 ab 45 4e 0c 98 69 dc 04 | 8b a0 74 65 f2 0e e3 59 97 ce 63 09 c5 83 7c 9c | 29 00 00 24 cb 81 79 39 c4 59 07 cd 3c 90 56 3e | 9d 57 79 9f 8d e6 58 24 f4 84 cf b6 0e b6 4d 54 | f8 24 7a fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 94 ea 1e 66 81 07 70 ab d6 5a a9 | c0 a7 0f 24 1b cb e7 a4 00 00 00 1c 00 00 40 05 | 17 95 c4 1b c0 e8 ee e6 7e 70 e4 b9 12 c2 c5 ed | 6f 00 57 73 | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35804b810 | #429 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b1 3d 9b 75 e9 17 32 ee | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #429 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #429 | rejected packet: | b1 3d 9b 75 e9 17 32 ee 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-177" #429: ERROR: asynchronous network error report on eth0 (192.1.3.177:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0673 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a47f10 | handling event EVENT_RETRANSMIT for parent state #430 | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #430 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #430 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49710.160243; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005905 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35804b810 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #430 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 "road-eastnet-nonat-178" #430: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #430) | fd 31 ba 30 35 2e 2d c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 63 61 13 a5 cc e9 81 b6 86 fc 6b 16 f1 74 d1 d9 | 72 f7 e2 ba f7 11 d1 79 92 c8 3d 2f 28 42 00 4a | 78 0d 84 65 5e dc 17 2f ba 15 c9 f0 22 4d 0a 3b | 29 55 5d 3f ae dd 3d 32 e8 c3 46 a9 04 47 63 51 | 2f 80 77 91 5f 9c b1 19 0f 94 27 d5 5d fe 9c 81 | eb f7 f8 80 c0 5d c2 5a 33 1a 77 e9 05 ab d6 42 | 13 e3 2a 15 08 f1 ba d2 bf eb 3d 3d ce 2d cd 92 | 09 c3 9f 5e 21 7b 84 9b 7e ad 3a cb 5a e8 5e a4 | 33 a8 4d 41 b7 9c ef db 29 ac 76 73 88 b2 9f 61 | fa 8c 1c 07 e5 8d 13 2c 9f d7 a6 11 29 94 1a 21 | 41 e9 57 a1 8b f3 e6 b9 90 b9 b8 f3 a3 3b 4c 8f | 23 8e 08 2f 27 17 72 8c c0 e7 38 14 1f 4b aa 78 | e1 d2 e5 79 c4 be 0b 93 9e 0c 21 6c d4 2a fe 21 | c7 8e 29 af b0 03 63 38 02 4d 95 ee 76 1a 81 af | a9 96 3e 2d 7b 5a 65 f4 b4 60 bb 2f a9 e9 18 59 | 66 94 d6 32 f1 9f 06 b1 1e 3d 20 4c 29 30 cd 34 | 29 00 00 24 72 14 4a 62 3b 2e 28 0b 02 9a 2b 55 | 37 9d 8e 84 fb c2 f7 70 ad cf 43 07 12 85 de c1 | 7c 78 30 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e0 6b 92 d2 7b 15 90 7f 21 2f b9 04 | b8 30 3c 8f c2 2d 01 6b 00 00 00 1c 00 00 40 05 | 4e cf 7c 8c 30 ae f3 1b a7 47 e4 11 ea a4 73 10 | 14 82 c2 9c | libevent_free: release ptr-libevent@0x7fb37c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47f10 | #430 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 31 ba 30 35 2e 2d c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #430 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #430 | rejected packet: | fd 31 ba 30 35 2e 2d c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #430: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0479 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb344018460 | handling event EVENT_RETRANSMIT for parent state #431 | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #431 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #431 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49710.238548; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005942 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #431 | libevent_malloc: new ptr-libevent@0x7fb37c01d920 size 128 "road-eastnet-nonat-179" #431: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #431) | 47 a9 f6 5d ab 90 59 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 61 b4 c7 cd e1 2c 04 0c 72 d6 80 6f c8 af 30 | 4d b0 b2 1e 8d 4f c3 2d f2 10 58 df a2 cf 51 79 | b1 79 c2 3f a7 35 e3 8e 8c e9 62 c2 7f 62 64 45 | 0a e4 6a 79 06 24 d8 93 a4 d7 88 f6 f8 67 56 ac | da f7 27 22 46 b5 f3 36 fc 59 b8 ef 46 c0 a0 39 | db 63 6d 41 32 18 a5 95 8d 7d ad 6f 27 26 ca df | ed d3 ee 53 fd 4c f5 cc 75 fc e3 f8 93 5a 96 cb | 92 9a 63 48 fa 88 0d 7b 6d 6b ed e6 9a a3 62 cc | f6 ca d1 cc 9a a4 27 97 4e 98 8a fa ec f7 10 73 | 1c 8b 1a f2 37 ea 26 ef 65 c4 24 b5 68 0e 71 36 | f1 1a b0 23 a4 4f b8 8f 75 d7 00 cd 7b 3c ae b6 | d6 4e 42 ae bd d1 a4 92 33 6b 9b 3f 93 ee 1b 13 | 12 06 ae 19 81 16 af 26 23 73 f8 46 07 4b f9 88 | 69 47 c6 fb 6b 2b 62 2c a3 d3 70 f4 52 77 08 a4 | 0e 48 7c ce 5d 87 5a c2 55 50 b0 8a 92 e5 1a 3c | 83 00 60 34 e5 f6 a0 b7 42 00 ef b1 62 a7 9d 6c | 29 00 00 24 71 9e 5f 53 a0 03 f4 e4 24 3a 58 53 | c3 05 4a 1c c7 b1 e2 bd 95 07 98 a5 4b 6a 2d 2f | 6b 11 45 33 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 46 73 c7 9b 2a a1 6f 39 66 d3 70 | f2 4b 98 95 84 ba e3 3f 00 00 00 1c 00 00 40 05 | 9a b5 4b 5a b1 14 b9 6a 89 15 79 d3 91 3a bb d6 | 0d 4a ca 70 | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344018460 | #431 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 a9 f6 5d ab 90 59 cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #431 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #431 | rejected packet: | 47 a9 f6 5d ab 90 59 cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #431: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.066 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a82ac0 | handling event EVENT_RETRANSMIT for parent state #432 | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #432 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #432 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49710.325951; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007975 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344018460 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #432 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 "road-eastnet-nonat-180" #432: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #432) | 9e 5c f1 81 be b3 cc bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 48 a7 44 cc 56 0f 1f a1 57 e9 97 90 cf 04 1e 5b | e0 0e 7b 47 ef c0 b0 6b 28 ba 80 69 c9 1b 38 ab | 77 4e c9 e0 e5 8e ac 7e e2 16 87 36 5e 9c 78 7a | 88 e7 f8 df f3 43 04 06 de 41 bf fc 2c aa 5f 0d | 69 d9 8b 25 79 3a 55 bd c2 56 12 76 16 fc d9 a5 | 9c 10 c0 69 f3 49 ac 1b 12 69 8b 54 81 c5 66 b4 | ce 87 81 ab 4c 4a 3c be 13 a8 a6 c4 c4 ee d3 f3 | e4 6c 08 82 35 56 98 d0 52 0e 3c b5 9f cf 94 45 | b1 ff 7d 1f 92 70 cf 8e d1 c1 37 a6 37 65 ee ce | 20 a0 2f 74 83 20 8b e8 b7 59 69 69 3d 2e af d9 | 5c 5b c8 f5 d1 97 f9 58 4c 4b b5 5a 72 21 7a ff | 15 e2 cf de 63 20 f5 1b 33 44 6d 86 26 89 fe a9 | ef 26 23 fc 07 42 35 ac 53 4d 00 7f 36 93 50 78 | ef 61 a9 fd 99 64 73 27 a0 12 f0 71 a5 ef 01 e0 | f5 fa 65 6f 20 9b da c4 8d 30 72 f1 87 a2 6d e6 | e6 3b 2c 57 3c e1 2d 99 93 66 b2 b3 c7 c3 45 c6 | 29 00 00 24 97 c3 cd 2d d6 91 ce 3c 3a 10 07 b4 | 90 19 a9 e3 82 ea 52 87 8f 88 50 41 d4 a6 e1 e6 | 2e 3c 74 db 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b b0 51 e2 58 5c b1 15 1d eb ed 97 | 2a 88 5d 96 2e c9 a1 f8 00 00 00 1c 00 00 40 05 | 78 1a 23 ab e8 fa 74 f8 b4 b9 8c 5c d8 d3 f5 f5 | 1c a1 eb 5a | libevent_free: release ptr-libevent@0x7fb3780251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a82ac0 | #432 spent 0.377 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9e 5c f1 81 be b3 cc bc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #432 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #432 | rejected packet: | 9e 5c f1 81 be b3 cc bc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-180" #432: ERROR: asynchronous network error report on eth0 (192.1.3.180:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae0780 | handling event EVENT_RETRANSMIT for parent state #433 | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #433 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #433 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49710.39554; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005227 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a82ac0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #433 | libevent_malloc: new ptr-libevent@0x7fb3780251c0 size 128 "road-eastnet-nonat-181" #433: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #433) | 23 e1 68 16 6a df f6 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 84 65 c0 62 66 6e cb 40 26 80 c7 11 7a b1 77 | 8f 7b 14 21 bf 47 61 54 80 80 4f 40 4b 14 8f 6c | 7f 20 33 7a 32 bd 20 39 a9 e7 e4 8c 88 5e 71 0c | b4 34 07 ea 3b 74 7a 69 d0 40 c2 8a ce 14 e0 29 | f7 f8 fb 45 30 ce 02 50 b6 4b d6 fe ce bd d7 fd | d9 af 2b 59 d1 37 75 ed 60 7b 97 1e bb b5 21 2d | 82 af 47 6c fd b3 b6 b4 1a e4 0b 54 80 93 91 9a | 7c 67 57 2c 37 bc 4a ba 6c 68 8e 7c 69 ae 25 35 | f6 73 82 3e e0 ba 6e 40 b9 c2 c0 d3 bd 9e 54 14 | 66 2e 22 5d 66 78 db 66 26 82 fa c1 4b 7c 9e 34 | 57 34 cb 3c 56 da ee df b8 34 f8 14 c2 9b 3b a3 | d6 4c a8 fb 55 30 94 15 c4 87 b2 b9 65 70 e9 f6 | 5f 9b ae 28 67 59 78 af d0 1e d8 d4 2a 4a 91 32 | 25 06 fb ff be c0 6a 2f e3 60 0d e2 75 08 92 ca | 55 96 9f 26 37 e4 6c 28 e7 f1 08 78 9b ac 4e 5b | 3b 11 9e bf 95 59 23 96 7a 89 87 42 71 70 51 75 | 29 00 00 24 bc 75 9d d0 ff b6 ae 90 e3 29 fd fb | 27 30 03 9d 8d 6e b5 df cd e3 e0 48 35 b6 7e d4 | 5d 99 20 4f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d3 1d b4 53 81 6d 12 3c 62 05 25 08 | f2 c7 73 02 9c 59 76 4d 00 00 00 1c 00 00 40 05 | 9b bb 33 9d d0 7d d5 98 fe 91 d5 bc 36 50 81 f5 | 28 37 64 3d | libevent_free: release ptr-libevent@0x7fb36004b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae0780 | #433 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 e1 68 16 6a df f6 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #433 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #433 | rejected packet: | 23 e1 68 16 6a df f6 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-181" #433: ERROR: asynchronous network error report on eth0 (192.1.3.181:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a86b80 | handling event EVENT_RETRANSMIT for parent state #434 | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #434 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #434 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49710.466908; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006464 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae0780 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #434 | libevent_malloc: new ptr-libevent@0x7fb36004b7c0 size 128 "road-eastnet-nonat-182" #434: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #434) | 68 bd 27 f7 1a 5f c8 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b 8d dc 86 f4 61 cd 63 4f 12 1a 89 63 c0 18 0e | da c1 2f 67 00 48 49 fe 80 58 30 87 77 1f 60 f1 | 91 93 c4 dd 6a 33 66 a0 69 fa 20 95 f6 9a 11 c7 | fd d3 c3 ff f1 0e a6 05 ba 58 f9 c6 b4 81 c1 3f | 58 b5 fa d8 f3 85 c4 ec 19 40 f6 9f ac 5a 0e 85 | ab f8 54 8d ff fd 0f ef d3 5b 98 8a 75 38 18 ce | f2 7b e8 23 92 dc 6c 70 3f 25 92 19 2b 60 a6 82 | 30 c7 b8 84 44 df 82 d3 8a 4d fc 1d 9c e4 51 d6 | 72 15 3a 4a d5 64 0f 79 a2 e3 fa 27 32 de fa 9b | 0a b6 71 85 29 d5 43 a6 b2 3c 95 42 d3 be 1c 80 | e1 df 27 cf e0 47 6a aa 9d f0 da 55 04 28 85 87 | 1e 7a 6c 89 a7 1a 78 3d cf 4e 43 87 8f 82 da c7 | 06 01 34 b1 a1 6a 5d 22 18 fe 03 9e 0d 36 91 39 | 6c bb 36 1a 00 1b a4 da c4 26 ba 72 4d 2a 35 43 | a5 6f 44 e2 75 40 5e f0 90 a9 5a 70 fc 57 4c e2 | 21 84 c8 a9 9b df a7 2e 69 2b 50 04 e1 24 b1 85 | 29 00 00 24 24 e6 ca a8 b3 30 fc 67 22 ff 0b c1 | 23 a4 8f 2a ae b5 6d 78 43 33 67 66 1b 96 07 82 | 43 a1 52 5d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e1 30 9f db e9 ff d2 de 10 c0 b8 22 | 86 59 ab dc 44 02 05 1c 00 00 00 1c 00 00 40 05 | 2d 24 f4 0c 2e f5 a0 c9 e2 14 db 8f 00 ef 15 a2 | 0d 97 11 53 | libevent_free: release ptr-libevent@0x7fb35401a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a86b80 | #434 spent 0.196 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 bd 27 f7 1a 5f c8 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #434 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #434 | rejected packet: | 68 bd 27 f7 1a 5f c8 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #434: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c017ea0 | handling event EVENT_RETRANSMIT for parent state #435 | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #435 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #435 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49710.537584; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008905 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a86b80 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #435 | libevent_malloc: new ptr-libevent@0x7fb35401a4e0 size 128 "road-eastnet-nonat-183" #435: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #435) | 02 95 c8 9c 02 70 ef 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 be 1c 3f a4 66 94 b1 76 a3 9b 53 73 2f 7f 23 | 4a e8 16 a3 16 f5 f7 58 2e fa f9 cc e5 72 42 dd | 79 82 dc a3 32 45 63 e7 97 5f 0c 3f 10 0e f2 af | 36 1e 6e 10 67 9c 3e 6a f7 f3 72 ba 54 df 6c 10 | a0 1c 0f 6a ce 67 71 2a a3 c4 d3 9c 88 b9 f7 04 | 30 84 58 1f bb cd f1 cd f3 e2 04 50 7f cf d2 c2 | 26 c1 1c 97 d9 a2 05 dc 96 89 90 50 ae 56 a0 13 | ef 2a 24 f0 f6 4d a9 8e e9 e9 a2 eb 42 50 42 ab | 0a 3d 04 3e 57 0c 0a e1 00 9d 75 a3 60 15 b7 e8 | 84 24 4c a7 d1 ab 72 3e f4 8b ef 1a c8 cc 7d af | ee 55 f6 12 cd b9 d1 90 77 f0 61 3d 61 12 ee f8 | 94 b3 64 a2 07 62 d6 b1 81 57 84 c9 8b ff 25 ea | 74 4a 3e 9b d6 88 62 0a dc b0 05 5d 90 03 c9 cd | 54 3d 83 cb 36 ad ef 96 f9 28 73 d8 df b8 72 79 | d4 6d 08 a8 b3 a6 c9 bf ea 29 05 5f 61 ed 03 82 | b8 9d e9 c7 c9 a7 67 16 08 0f e7 ba 6a 6d 38 69 | 29 00 00 24 ae 8f 34 92 0a 08 8b 7b 30 37 54 ea | a0 43 df e6 ae f8 bc fe 70 d8 fd fe ce a5 f7 5d | fb 76 aa 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 34 e7 f7 2a 07 1c be c1 53 fb c8 | 09 7a b0 5a 0f 53 bf 3c 00 00 00 1c 00 00 40 05 | 75 09 e1 26 ec 40 37 83 67 2f 03 41 48 5a 4e 60 | ef 86 00 50 | libevent_free: release ptr-libevent@0x7fb37c029710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c017ea0 | #435 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 02 95 c8 9c 02 70 ef 9a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #435 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #435 | rejected packet: | 02 95 c8 9c 02 70 ef 9a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #435: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.049 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370018460 | handling event EVENT_RETRANSMIT for parent state #436 | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #436 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #436 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49710.596944; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00814 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #436 | libevent_malloc: new ptr-libevent@0x7fb37c029710 size 128 "road-eastnet-nonat-184" #436: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #436) | cc d9 b7 db 44 05 84 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 45 3c 80 f9 ec ce 19 79 1b 2a 4e 88 36 86 a9 d8 | 85 e2 ee 1a ce 49 16 7b 84 5e 31 fc e1 84 f2 62 | 83 ed 4d eb 9f 6a c2 85 84 04 f4 d9 bd aa ee 02 | 08 1b 87 fa b5 ac ff f6 a9 3e 63 6d 16 01 77 f5 | 2b 3e 1b 6e c7 66 ff fb 38 8c 19 c9 7b b1 fe 10 | bc 5c c8 26 33 9f ff 45 76 a0 23 85 19 e3 31 de | 28 8c dd 45 56 45 3b fb b4 0d 18 e3 cd 81 8e 00 | 0b f6 17 10 a2 e0 44 20 37 74 e1 31 a8 10 b7 14 | cf 9a 72 a5 9f 1a 4b 15 1a b2 c9 bb 99 44 1e 31 | 11 05 e2 cf 98 40 c9 ef aa 8c fe 19 58 f6 d5 62 | cf d6 d5 ea 4e 24 4c 33 16 1d 0c db 05 43 98 5e | d3 1a 94 c0 4b ed 3c 02 54 4b fc ca 99 42 ac 4b | fc 8a 3c 6f 70 38 23 05 eb da 77 20 a0 4e 73 f3 | af d2 c3 64 0d 77 b8 54 17 69 4d 1e a8 53 83 4b | 8b 72 92 0a 4d 90 87 b2 56 ec 43 2c 41 d7 64 66 | 71 79 54 ef 65 56 ba 6d 1d e6 d1 dc ad 99 41 fe | 29 00 00 24 a3 ee 0b 44 35 bf 27 26 10 74 6f 1a | d2 86 21 80 e6 fa 2e 6d 1e 83 9b 58 c8 96 87 8e | e4 1b 77 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 69 51 98 88 78 46 d0 e6 54 3d 62 ae | 5f a3 54 6d d3 39 61 c5 00 00 00 1c 00 00 40 05 | f1 9f 10 2a 1c da 5a 4c b5 8c 1e 6e 78 d5 be 31 | 9e a0 0c c1 | libevent_free: release ptr-libevent@0x7fb3400094d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370018460 | #436 spent 0.179 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc d9 b7 db 44 05 84 19 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #436 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #436 | rejected packet: | cc d9 b7 db 44 05 84 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-184" #436: ERROR: asynchronous network error report on eth0 (192.1.3.184:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.065 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa5fc0 | handling event EVENT_RETRANSMIT for parent state #437 | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #437 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #437 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49710.662373; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004647 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370018460 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #437 | libevent_malloc: new ptr-libevent@0x7fb3400094d0 size 128 "road-eastnet-nonat-185" #437: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #437) | 31 51 d4 f7 c8 fe c5 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8d 4d c3 c5 4f ca 6c d8 d4 84 06 d4 ea 89 80 6d | 99 d1 7f e1 cb 80 24 55 fd df 90 fb 02 92 ff c9 | f0 47 14 8d 77 1a bb 9c 7c dd 17 b9 16 19 6b 74 | ec 88 72 db 3e 1a c4 54 69 dd d8 16 b9 56 68 f6 | 6a 0a 44 9f 3f b5 a3 4b 08 8a 18 15 d1 69 95 71 | d9 52 3a e9 65 ee 70 4d ea 9c f5 16 84 a6 99 9c | ab ff 36 83 9d b6 9f c3 53 f1 00 51 ea c6 f5 a2 | 5c ce 33 c2 cf de 1d c7 31 1f d6 91 bf f2 7f 9f | fc 6e d8 c8 43 fd a2 ec ed d4 2e e3 1a 35 b1 d0 | de 28 47 6a 6b a3 42 0c 4a 1a 4e 13 17 87 94 71 | f7 93 75 92 ea b9 03 fc c2 41 93 f1 c9 f7 b4 4d | 3c f1 35 28 f5 5e 37 14 cf 3e ce 38 da e2 53 26 | df e6 e9 23 b5 8c b6 45 18 8f e2 54 89 f9 96 79 | aa 6a 79 aa cf b4 ec 3d e4 21 6c a5 14 2c 68 b2 | 1b 56 0e 23 e2 48 c6 68 81 fb b5 23 23 53 e6 4a | 1c 61 e2 7a 67 e5 f5 84 ba 68 ce a3 e9 a9 c8 e3 | 29 00 00 24 02 5e bf 69 6a 09 af cb c5 28 ba 2f | be c6 fe 19 42 f8 ee f5 0b 73 06 5b 41 10 d0 e5 | 69 e3 64 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 6b 27 8e 3d c1 6d e7 fb 64 0d 99 | 79 35 e1 df 31 89 9b 32 00 00 00 1c 00 00 40 05 | dc 48 f6 93 16 4d 8a fc 81 8e 30 65 58 3a 8c 28 | 32 6e e0 6b | libevent_free: release ptr-libevent@0x7fb35c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | #437 spent 0.191 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 31 51 d4 f7 c8 fe c5 08 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #437 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #437 | rejected packet: | 31 51 d4 f7 c8 fe c5 08 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #437: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aa34c0 | handling event EVENT_RETRANSMIT for parent state #438 | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #438 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #438 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49710.747761; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007368 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #438 | libevent_malloc: new ptr-libevent@0x7fb35c0300e0 size 128 "road-eastnet-nonat-186" #438: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #438) | 41 3e 80 fb 50 ac d5 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 f5 0a 72 18 b4 76 75 f6 01 ed 57 e5 f7 fc 77 | 49 c0 b9 2a a0 da 30 6d 64 aa a5 e7 d9 21 f7 0d | 91 be 59 58 e0 73 bb 49 e3 e7 3d e2 78 8a 04 ac | e2 97 a4 99 a2 30 e0 4b a8 00 c0 ee 42 04 60 c2 | 77 26 36 9f ca 4c 02 7c fe 9f ae b6 ae 04 ad 9a | 8f d0 27 5f 92 70 2c be 09 55 2c 26 bd b6 4c 20 | bf 73 30 d0 44 67 97 1f 1b 2e b0 03 d6 27 ac d2 | 9a 9e e4 f7 c7 3b 09 97 22 3c 54 79 43 94 36 23 | 17 e9 e5 03 2b e9 58 e3 73 9f 26 68 9a d9 44 87 | db f9 8f 3e f3 46 76 36 18 c6 80 3a ce aa cb fb | 5f dd ff d6 eb 23 75 c4 e2 35 1f 1d 81 9e 2a 45 | d7 f8 e7 91 af a5 b6 a5 46 57 1a 8c 96 c0 29 4e | 8e dc e8 e6 2d 92 82 6a 85 02 3a ad 02 27 a8 84 | 8c be 58 97 e6 a0 56 65 e3 b8 11 05 1f 19 4d bc | 68 44 f8 dd 63 ea 12 b6 6d 02 31 e2 3c 83 0c 90 | bb ff 2c 31 86 51 81 cf b9 63 dd 72 3b ea de db | 29 00 00 24 65 91 ed 0a d4 1d 29 43 43 2f 3a 60 | 71 14 cd 7a ee 7f 0c dc 85 e8 36 48 85 1d 6f 9b | 44 a1 8a 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 03 a7 76 d6 c0 45 d0 97 b1 a7 8c de | d2 b0 18 be bd b1 c7 45 00 00 00 1c 00 00 40 05 | 93 a1 f0 74 30 f5 50 67 ed 62 ea 87 43 47 97 7c | d7 55 2f e9 | libevent_free: release ptr-libevent@0x7fb380022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa34c0 | #438 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 41 3e 80 fb 50 ac d5 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #438 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #438 | rejected packet: | 41 3e 80 fb 50 ac d5 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #438: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0606 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb358012630 | handling event EVENT_RETRANSMIT for parent state #439 | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #439 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #439 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49710.818115; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007233 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa34c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #439 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 "road-eastnet-nonat-187" #439: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #439) | 47 50 75 67 1d 00 52 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 10 e6 27 54 79 a5 06 ab 7b 5d 27 c9 72 11 8a | be 8d 9d bf 52 e0 ac e0 58 f4 00 83 0a 18 2a d4 | 41 71 ec e9 2e f0 05 ec e8 a2 ec d2 28 ce f8 d4 | e5 81 d8 3c 87 bc 89 6a 8b 0a 1a e2 d3 eb 38 44 | e6 af 0a 47 aa 17 06 2d e7 33 df 52 16 8d b3 fb | d9 67 8e 07 e3 c9 9e 52 cf 8d 56 fb 7c c2 93 d9 | 9d 49 6e f0 2c fb ae b5 5c 7d 08 de 63 dc 9b 39 | 2d fb 3d b8 63 14 a9 ce d9 19 af ff bb a7 b1 81 | 41 c7 41 67 e7 53 2b fa 68 10 a5 13 3f f8 0f e7 | 33 85 43 eb a8 54 d5 5b fd f4 a1 1e d5 4f 32 99 | 86 f6 ec 22 05 a8 98 ec cb 6f de 01 77 3a 63 2b | 85 0f 08 c2 e9 6d 60 39 18 10 c9 3c 04 a6 69 c0 | 90 8a 6f 1c 7a 2e 85 ad 4f 29 5f 48 49 12 08 e4 | 72 3f d7 cc 42 6d 91 5a f7 f3 7b 44 dc 38 f7 05 | b2 bf 70 89 ab 24 52 cd cd c1 b3 61 99 9d a9 28 | e2 c4 12 1d de cd 37 64 c2 e0 70 28 45 34 de 67 | 29 00 00 24 d9 2f 24 9b 75 f5 ca 1e 2e 7d f4 06 | 41 a2 89 f3 ae c7 ae 61 65 4e 5f 7f 65 dd c2 12 | ae ae 3a 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 fd b4 2f 23 17 b8 9b d8 0c 2a 45 | b9 34 13 eb df 7c 42 33 00 00 00 1c 00 00 40 05 | f1 b3 a4 02 7a 60 50 36 46 44 d9 88 f9 29 1a 5f | aa 01 32 cb | libevent_free: release ptr-libevent@0x7fb358039e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358012630 | #439 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 47 50 75 67 1d 00 52 fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #439 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #439 | rejected packet: | 47 50 75 67 1d 00 52 fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #439: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #440 | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #440 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #440 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49710.931518; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006626 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358012630 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #440 | libevent_malloc: new ptr-libevent@0x7fb358039e30 size 128 "road-eastnet-nonat-188" #440: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #440) | 59 19 97 9a e3 8b 77 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 57 86 98 5b 96 d3 77 6a 73 d3 f1 79 83 3d b1 | 25 c0 29 5c f0 c3 a2 69 ec 6a e3 4d 6f cd 0b d7 | 79 9c cb d7 34 fa 78 1e b1 98 79 da 0f ac 84 e0 | 73 c1 06 f8 21 3a aa 0a f4 0e 4d f7 bf 24 b0 23 | 75 13 78 7d aa 97 d6 f9 8b f1 96 43 1f bc e1 e6 | da 7d fb 41 ce 93 49 6e e1 1e f3 c1 41 08 43 3b | 3e e8 ed 1f 4e 08 d4 85 64 9e d1 11 dc 50 e9 45 | 7f a7 7d f7 2b 35 cf 9a d1 cb 6a 05 4f 83 e6 fd | 42 8f 63 21 ff 80 40 b7 e2 26 41 31 52 b6 49 a0 | 77 11 47 93 5f a3 3d 9c 1c 0e 6f 2b 0b b6 1d 42 | d3 1d 45 13 c6 e8 f2 a5 8e c9 4c 05 0a 08 aa 82 | ac e4 27 b7 b2 77 b7 80 38 58 3d 68 92 fd 5e 6a | 38 c8 de 6a 08 ae c9 2d 85 13 3c b9 b9 2c 91 48 | 64 74 4e 5e a1 07 a6 ff 63 67 43 99 ae 3a 36 0a | 11 4e c4 4f 1a ab 97 3f 39 c8 63 d0 49 b4 29 fe | 77 df c5 36 12 ae 96 21 4b 67 cf 07 6a b0 e1 5d | 29 00 00 24 82 fb 4c 4b 30 7b 16 3b 6a c7 2b 62 | cc 7b b0 14 ea 16 0d 74 ad 0f c2 be 8d 39 6e c0 | 2a 84 9f 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 76 37 6d ef 85 b5 1f 0e 28 d0 8a e5 | d5 d3 1d e3 5f d5 cf 90 00 00 00 1c 00 00 40 05 | 72 f1 07 bf 82 38 a8 c2 32 ec a4 d6 59 1b 7c de | 06 08 a2 81 | libevent_free: release ptr-libevent@0x7fb34c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | #440 spent 0.136 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 59 19 97 9a e3 8b 77 41 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #440 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #440 | rejected packet: | 59 19 97 9a e3 8b 77 41 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #440: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb378018460 | handling event EVENT_RETRANSMIT for parent state #441 | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #441 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #441 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49711.042919; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008262 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #441 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 "road-eastnet-nonat-189" #441: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #441) | 51 22 97 d4 f1 aa 56 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 2c c6 09 06 fb 75 c9 7f c8 2c f2 78 2e 86 cf | 10 e2 71 84 ec 7a d3 00 3b 70 b4 67 49 a1 3c 4d | 21 45 e6 9b ef ae 2b 06 a0 05 7e f8 20 46 fb f7 | 0f d4 3c 68 46 a5 74 b1 69 d3 27 26 91 1f fb ea | a2 29 d1 d5 ec 8d ba a9 55 81 7c dd 8b b0 d5 f0 | 65 df 87 db d6 24 b4 8d 72 d6 b9 0a a2 e0 30 fc | e4 5b 51 8c ab 49 74 dc 67 ef 9d ed b7 2a 83 35 | e7 01 ba 5c 14 ef fc c4 a3 30 10 68 67 0e 82 16 | 7d 82 bc d7 25 ec 2f c1 f6 97 ab 23 a3 9a b0 7c | d2 fc 27 3c 76 c0 04 de 3f f1 57 2b 49 24 75 a8 | f7 b1 cb 9a 6d 04 c0 ee c6 a3 f0 18 d5 7f 4e a7 | 2c 74 2c d5 e8 3f cd c9 69 5b b5 31 78 19 bb d1 | 32 75 82 1c 75 29 51 85 94 3b 48 0b 31 5b 51 f5 | 93 f5 fc 53 3a 80 c0 7f 4c 5e 8d 4e c5 a0 2e 05 | fd c5 76 9f 1a 22 f6 df 9c 77 35 ff d3 0b a0 5e | 73 0d 0d 92 2d ee d7 e3 ed 3d 6b a2 54 4a 19 9a | 29 00 00 24 9c 47 e2 58 3f 57 67 62 b6 2e 0d 3a | cb 75 8a b1 7d cd 2d 8e 6c 75 cc 2c b3 bd 9f b3 | c7 bf c7 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 c2 f5 08 e1 41 ca c3 a8 c7 5d b8 | 30 41 e7 b2 e6 39 d6 66 00 00 00 1c 00 00 40 05 | 92 32 df 91 6d 86 4c 91 9f c0 e2 90 d1 aa b2 8d | 1d 5c 17 a3 | libevent_free: release ptr-libevent@0x7fb3700407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378018460 | #441 spent 0.17 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 22 97 d4 f1 aa 56 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #441 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #441 | rejected packet: | 51 22 97 d4 f1 aa 56 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #441: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b06800 | handling event EVENT_RETRANSMIT for parent state #442 | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #442 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #442 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49711.156332; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005743 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378018460 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #442 | libevent_malloc: new ptr-libevent@0x7fb3700407f0 size 128 "road-eastnet-nonat-190" #442: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #442) | 87 5c d8 cc 20 15 ba 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 68 c7 3c 11 2f 9c 07 85 86 ab fd 70 b3 a3 4b | 4b 15 db 0c 55 63 48 ae b0 dc 7b 34 ba 58 39 54 | 81 cc 25 fd b5 c7 f7 39 e9 8f 2e f9 b9 70 0e c0 | 6c fd 85 d9 5d cd 9d f6 5f 5d 4e 86 38 b5 78 a7 | d8 3d 3d f5 25 e8 c6 56 da a5 38 73 cf 89 18 32 | cf c9 c3 46 fb 60 20 53 a4 ff ca 61 0a 1f ad 2b | a5 f9 d2 1b d5 73 db 29 4b af 73 16 1f 68 6e 88 | a8 b3 5c d6 b4 01 8a 06 65 2f a3 ad 76 14 68 68 | 9f cb 47 75 86 fb 98 94 58 0a 1b c8 87 0a bf b1 | 97 c2 17 ab 5f e8 c3 11 ea 6b b5 fc 83 10 e7 36 | 12 60 e6 87 bd 62 58 93 cb ac ef ca 4f 7f ed 7c | 32 f8 74 a9 e0 2b 69 44 cf b3 d9 33 28 7b 15 7d | 6b 78 11 47 ae a2 e0 8f 52 91 83 be f4 84 c7 17 | a5 b8 57 df 7a 32 65 6d 3b bd ca 10 c7 fb bf 39 | ca 7b 85 7d 49 00 cc 7c 5f b7 c2 27 37 c0 3c 03 | 4d 75 5e a1 e3 8a 16 a4 15 da ac 76 26 68 0c 96 | 29 00 00 24 bc 7d d1 02 e0 e7 26 b2 02 88 eb 9f | 6d cb 61 e3 66 23 89 34 b9 17 0a 11 8d c9 39 5d | 4a 6a d8 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b b4 fa 62 4d 88 e7 9c 8f 3a a9 82 | e0 af 15 4d 27 f2 cd 63 00 00 00 1c 00 00 40 05 | ff 91 89 9d d7 da 34 d7 9b a8 06 6f f9 4a 9b 25 | 2a 77 df 3e | libevent_free: release ptr-libevent@0x7fb360046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b06800 | #442 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 5c d8 cc 20 15 ba 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #442 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #442 | rejected packet: | 87 5c d8 cc 20 15 ba 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #442: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0496 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a2b610 | handling event EVENT_RETRANSMIT for parent state #443 | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #443 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #443 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49711.239789; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005661 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b06800 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #443 | libevent_malloc: new ptr-libevent@0x7fb360046040 size 128 "road-eastnet-nonat-191" #443: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #443) | 99 e5 a7 37 44 6e 78 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 12 f7 51 e4 9b df 2b ce ce f2 ee 7b 13 94 51 | 6a dd a6 05 05 c5 f9 51 17 99 5e 09 04 c9 1f b2 | fd 1f 26 33 db d5 00 aa 13 04 1c 40 7e db ca 5a | d7 f8 59 90 a2 34 4e 73 d9 b4 1b 12 47 af 09 6a | 3d c6 bc 0a 75 d2 59 20 61 0f b0 78 2f f9 96 a8 | bc 6e fc a4 91 79 01 c5 c6 bf 55 5f ca 2a 71 57 | 55 3a c2 55 6a 02 68 58 b9 3f ee 10 26 00 19 6c | a4 9b 2b c5 37 91 ea 3d f7 92 10 15 3e 21 96 87 | 2b 42 57 b1 96 6e 0c 94 b6 11 c4 ca 44 56 8a bf | 72 e1 9f 77 2e b1 9f 72 96 c2 0b cd e9 02 1e ed | f4 40 75 83 23 4e d6 76 72 99 62 9c 55 c4 df 8d | 23 38 27 3c f9 b9 3f 1c 37 14 80 74 3c 7a 5d f8 | 1a 0c 7f 0d 3a 48 23 4c 35 58 8d c3 50 e9 4f d5 | 3a d4 b6 fa d0 f4 f0 02 7b 72 04 9c a6 5b 57 b7 | 6f ac e8 68 3f 0b ab 1c 0a 68 cc 2e 68 e9 56 e5 | 09 9a 32 64 09 77 95 51 f1 d9 2b dd e7 b2 96 44 | 29 00 00 24 d1 ee 39 81 5a e3 54 a6 73 c8 50 03 | 2c 50 da d8 32 42 2b e6 ab ed 1b 51 ff 8e f3 84 | d3 ae 77 7f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 53 91 6c eb c8 88 e0 f9 9e 54 62 | 8e 3a 67 1c 98 f2 42 50 00 00 00 1c 00 00 40 05 | 84 7e 67 f1 2a 8c cc 0b 8d 85 0d 9d a9 c1 72 b7 | 86 11 2f 01 | libevent_free: release ptr-libevent@0x7fb388048a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b610 | #443 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 99 e5 a7 37 44 6e 78 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #443 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #443 | rejected packet: | 99 e5 a7 37 44 6e 78 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #443: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a1c490 | handling event EVENT_RETRANSMIT for parent state #444 | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #444 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #444 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49711.313132; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005956 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b610 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #444 | libevent_malloc: new ptr-libevent@0x7fb388048a80 size 128 "road-eastnet-nonat-192" #444: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #444) | 7f 9a e3 30 35 a2 50 3a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 73 44 16 cd dc 6d af 1e 52 47 5f 1e bd fa ee | 64 00 7c 0c 09 cd 6a b9 96 7a 9e fd 7b 60 d3 11 | 94 7f f3 14 ab de fc 67 4d 77 8c ed ae 35 5e 21 | 92 1a 34 1f 52 96 c6 b4 82 cf e2 da a3 5d a8 40 | 55 b6 be b1 02 f7 4f 09 53 8a 9a 82 43 68 c5 03 | 91 79 7b fa ca eb 01 ae de 9c b8 57 af 0c ad 92 | 90 f7 80 a3 5f 1b 76 77 00 b6 f8 6e 45 fc bc 6c | 08 e0 42 31 50 bd 6d b4 9c ee e1 eb b4 38 73 a9 | 34 e4 98 23 d2 4d e0 d9 b6 c6 f6 dc 56 58 4e 20 | 84 e1 d2 8f 09 7f 4a 9d 26 b0 f3 d6 00 33 87 e7 | 4a de ea 2f 4a 53 b4 0f 48 62 38 e9 50 42 17 64 | 60 9a 88 18 4e 23 6b 6a 5a a4 6b 23 ad 33 67 82 | 97 a8 79 73 5f c7 02 96 5e 91 0e 40 d6 4e f8 b3 | d9 30 5c 69 30 3f 5d 5d 8a 33 e5 82 75 a6 f8 01 | e5 10 de e1 1f 27 d1 2a e8 d2 12 a6 bb 52 29 5c | 7e c1 67 58 19 ab fb 58 65 a2 55 1e 99 be f5 8d | 29 00 00 24 2a ad 1b 39 f3 fd f9 42 4c 00 4a 5c | ed 00 f4 3a 31 ea eb b5 54 5a 5c 9d a2 7d 7c c4 | 61 a7 b5 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 37 d0 f0 6f a1 ca 95 cb 19 9f 38 2a | 49 20 b8 20 36 38 5c 50 00 00 00 1c 00 00 40 05 | 75 b6 79 50 7c d3 43 75 20 ac ac 20 ab c2 0f 0e | 7d 73 a1 76 | libevent_free: release ptr-libevent@0x7fb34c02ec30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c490 | #444 spent 0.154 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f 9a e3 30 35 a2 50 3a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #444 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #444 | rejected packet: | 7f 9a e3 30 35 a2 50 3a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #444: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0625 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340025210 | handling event EVENT_RETRANSMIT for parent state #445 | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #445 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #445 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49711.406519; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006063 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c490 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #445 | libevent_malloc: new ptr-libevent@0x7fb34c02ec30 size 128 "road-eastnet-nonat-193" #445: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #445) | b4 2e 78 cc c5 f6 9b 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a ba 44 5e e8 04 0b 1d 80 c6 75 3f 8a bb 68 32 | 06 11 b8 93 58 a0 e3 d0 41 9a dc df 91 ac 0b 46 | b8 6d fc ac c1 e9 09 52 48 47 7e 50 d3 96 46 49 | 4c db ea ed bd 20 06 58 05 cd d9 91 57 1d 80 4d | 27 35 e2 86 24 5f 4e 32 bf 57 32 fe 52 fe 8f 11 | 64 dd f6 c1 cf a0 23 81 27 d1 05 22 c7 e8 81 e4 | 67 a9 8c 32 ef 56 b6 40 b1 5f 41 a6 60 fd 00 92 | 0a e3 78 9b f2 03 2c 98 1e 8c fc 31 fc 9b e2 d2 | 0c f9 17 3c fe e3 b4 da 8e 06 ef 92 fc 84 24 e8 | 41 6f 79 14 e9 fb a1 a0 07 48 de 12 d6 84 2d 7e | 90 30 a3 38 3d 28 16 c5 17 69 90 4c 1a 42 aa f9 | c8 01 fd 3b 2e 46 f9 3b 3c c2 87 e4 f3 79 4f c7 | 11 59 a6 e8 26 10 94 45 c9 46 e9 8c ab e9 1d 28 | 48 da 5b 23 c8 48 65 23 9b 45 8d ab 8d 58 2e 78 | 34 e4 38 1d 80 97 ed 49 5c 38 3d af 3b ec ad d6 | 83 24 62 c1 f1 7d c9 59 93 3c f3 1e db d1 30 e4 | 29 00 00 24 43 99 24 d2 66 51 b3 d4 1c 15 bd 40 | 1f a6 87 a7 4d 01 75 d0 ba dd bc 61 a0 08 b2 b5 | 88 d8 85 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 20 6b 9d 83 bc 81 44 79 c4 11 cc | c3 90 0e 2f 55 7c a4 51 00 00 00 1c 00 00 40 05 | c1 5a b3 1c bf d8 ae 9a 12 a9 ee 41 24 11 a3 d4 | f8 37 2e 14 | libevent_free: release ptr-libevent@0x7fb35804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340025210 | #445 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 2e 78 cc c5 f6 9b 58 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #445 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #445 | rejected packet: | b4 2e 78 cc c5 f6 9b 58 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #445: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0643 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34401d710 | handling event EVENT_RETRANSMIT for parent state #446 | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #446 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #446 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49711.471906; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006574 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340025210 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #446 | libevent_malloc: new ptr-libevent@0x7fb35804b850 size 128 "road-eastnet-nonat-194" #446: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #446) | 88 1d ae ca 37 da 9c 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a c2 f6 76 62 03 08 9a a8 98 a1 67 18 76 36 6f | f2 14 09 7e 5a 52 4f 9f 19 c8 ba 89 bc 37 1d 8e | 11 c7 c7 24 c8 21 0f 20 96 1c 89 74 ee 2d eb 0f | d9 40 32 aa 68 91 41 4a dd 21 15 90 12 e4 8b c9 | 4d 5c 9c dd a5 b1 90 8f 14 47 58 25 b1 c4 3a 4d | f0 56 c6 bf 57 58 f2 ac e6 d1 1a 63 f9 d8 c3 1a | a4 3b 86 89 ab bf 3e 5a 25 6f 85 ba 03 4e 84 c0 | a7 2c b9 17 b5 20 be c6 c5 13 97 18 56 e3 27 c2 | f9 d2 f9 ff 5e 3c 1b 93 48 e2 17 63 4c c3 83 be | b7 98 15 95 f6 a1 48 ea 20 9c e6 f3 53 b1 cd 88 | 53 a7 49 3f 59 99 9e 83 6d e2 88 bb a9 e3 fc 02 | 29 31 b8 83 4f 47 15 6b 71 12 58 3e 96 a5 76 cc | 0b 52 1f 8d 6c b2 63 0d 85 4d 51 f2 5f f7 f4 97 | 20 32 4c 0f 1c ff 39 c3 f0 0e d9 00 b3 27 e0 af | 29 89 02 52 1a 56 5c 18 4f a4 87 c7 25 17 55 3d | f8 28 8f d9 14 95 ef 08 7c ea 8b df 87 e5 f7 5e | 29 00 00 24 5e f7 7f 32 12 e9 cf 93 a5 5f 05 08 | 2b 32 36 a4 d8 35 51 26 4c a4 53 84 4a 3d 2b 33 | 5f dc 90 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bd 76 de 3d 7d 38 3c 23 fa c5 a8 aa | 98 15 c0 6a 4a ab a4 fc 00 00 00 1c 00 00 40 05 | 7b cf 42 04 70 bc 06 e9 71 4c e8 ba 2d 5f 18 79 | 9f 19 93 8c | libevent_free: release ptr-libevent@0x7fb344040760 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34401d710 | #446 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 88 1d ae ca 37 da 9c 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #446 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #446 | rejected packet: | 88 1d ae ca 37 da 9c 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #446: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.063 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c01d710 | handling event EVENT_RETRANSMIT for parent state #447 | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #447 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #447 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49711.579886; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005241 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34401d710 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #447 | libevent_malloc: new ptr-libevent@0x7fb344040760 size 128 "road-eastnet-nonat-195" #447: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #447) | 38 12 e6 81 e7 94 57 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f 06 2b 67 fa f3 85 ef c9 87 64 80 c6 08 7f 26 | 45 8a d6 b2 f0 0d 75 25 97 6d 45 07 fd cb e4 04 | bf 7e ab 4e 45 57 81 c7 b5 29 22 16 b5 58 17 73 | fb 06 1c 20 f6 01 42 43 d1 e6 cb 7e a1 aa b9 6e | 26 8c bc f7 62 2d 79 d5 2d 49 41 71 09 9e b4 75 | ea 9e f2 7f e9 07 f0 a5 64 1a db a1 ff 4f ee 2e | 4f 3b 9e aa ac 22 2d 9f 1b 37 bc cf 47 d1 ca f1 | 85 86 f8 a5 9e 4a f1 ed 2d 36 8a 97 fa 17 f5 2d | 74 78 21 72 1b 33 88 07 44 c7 17 ee 95 f3 cb cb | 74 32 bb 69 59 ac ab 47 c6 9c ea 80 62 ae 1f 88 | 81 9b 37 d9 2d eb b0 eb c8 de b9 11 87 9a a9 5b | 92 c9 38 b1 30 9b d0 b1 7f 2a dc 10 02 4c 1e 0e | 28 73 54 43 6f 78 74 45 0e 5e 40 cb d7 a1 f6 9b | 8d bf eb b3 ff de 36 ad 5d d5 a1 e7 e2 d9 b6 74 | 11 52 d9 17 88 a2 35 0f d7 23 95 ef eb 8f 58 a1 | ef f0 f0 24 22 5b dd f5 64 21 6b 5a 10 90 d6 b9 | 29 00 00 24 c8 ed 9d b9 b2 64 8b 9d 5d 85 10 8f | bc bb 1d 46 c9 3a dd 35 d0 ed 23 11 cf 06 d9 fd | be 51 4b 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0f 28 c6 de 25 95 4a 27 58 aa 1c c2 | 15 34 6b e8 d4 2b c8 d2 00 00 00 1c 00 00 40 05 | dc 67 81 1e 74 e8 91 b7 d4 fb 94 8c c2 c6 73 c6 | 89 a9 30 0d | libevent_free: release ptr-libevent@0x7fb36c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c01d710 | #447 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 12 e6 81 e7 94 57 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #447 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #447 | rejected packet: | 38 12 e6 81 e7 94 57 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #447: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0595 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #448 | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #448 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #448 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49711.66026; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007516 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c01d710 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #448 | libevent_malloc: new ptr-libevent@0x7fb36c0300e0 size 128 "road-eastnet-nonat-196" #448: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #448) | ea d6 68 25 ae ee 80 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ab 2e 7f 22 4b d6 ee 79 95 7d ea e6 94 56 fc 59 | 41 1c 12 66 f4 de 00 d4 6a e6 f4 4c 67 01 c3 97 | d7 f0 7f 15 19 52 1c e1 e7 cb 10 43 bf 32 f7 97 | 3f 7d 76 9e 8f 5c 2d a2 10 89 27 a3 31 39 40 6f | 23 b5 50 de a5 26 d5 37 1d bc c7 b0 be 51 02 45 | 35 60 2b d9 a4 52 16 a6 1b 75 6d 90 d7 94 82 b4 | dd 41 db 2a cd 7c b4 ec 00 64 fe 2d 52 b4 ab 6f | a1 8a dc c4 d8 32 f4 27 d3 99 3c 5b 3c 30 47 ed | 06 54 fe bf 5a 80 4f d3 cd d3 63 ab 7a 0a c4 81 | eb 86 4b 9a 37 9c a7 bc 09 9b f1 b6 f5 69 f2 05 | c2 89 b2 f3 ca 58 71 7c 0b b2 02 99 cf da 83 99 | b9 82 4c 58 38 5d 2d be 03 71 b3 5f 32 1a 82 30 | 6f ca 79 08 7e ac dc 25 d6 1a ad 46 a4 8d 7c 47 | 64 b8 24 1d 37 d9 41 0f 8b 4e 16 65 d2 41 4b ab | d2 0e 95 38 92 91 3a 77 ae cf 19 35 ef c9 91 13 | b4 90 b2 24 68 10 9d af 29 52 a9 15 24 f7 4d 93 | 29 00 00 24 f3 0f f3 36 25 a9 50 89 21 ce 62 13 | d8 e8 8d 8d c3 33 f9 d1 62 a2 a6 a0 e9 3e 64 7f | fb b2 90 fb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 d7 4f 67 97 77 e0 a3 2c fc 24 e7 | 7a a9 1a d4 d3 98 14 3c 00 00 00 1c 00 00 40 05 | 18 00 5b 20 2e 1c a9 8b 56 50 4b 4f f1 d3 fc 60 | 9d dd 28 85 | libevent_free: release ptr-libevent@0x7fb3780300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #448 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea d6 68 25 ae ee 80 d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #448 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #448 | rejected packet: | ea d6 68 25 ae ee 80 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #448: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #449 | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #449 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #449 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49711.754589; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006262 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #449 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 "road-eastnet-nonat-197" #449: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #449) | ea 52 41 06 29 be 32 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c f6 72 22 70 e3 8e 6a 67 c3 d0 4a 0b 7f 5b cf | 2d 68 56 81 95 56 3f 4d 2a 1e 61 1a 59 76 f5 26 | 54 d5 6a 01 f4 8a a1 63 50 3e a3 b6 d1 85 12 bf | 8c a7 c8 b2 9c d2 7e 12 ce 8a 8f 97 a7 10 c6 36 | 55 54 39 bd 73 f0 07 97 c0 8f d8 2f a2 5e 50 05 | cb 9d 1a b8 ce 20 6a 30 ff 7d 3d 2a 89 9c e8 f9 | db 68 6b e7 d3 12 f3 5c 42 81 cc 9e c7 d6 ab 3b | 07 00 72 f9 2b bb 2c 8f 88 74 45 a7 1f 5a 2d 17 | 94 3e ec e0 ce a9 ab 72 79 45 76 ba 8c 1f 40 56 | 6d 7a 46 42 83 af a1 98 c5 23 1e 58 16 d7 79 25 | b7 cc 17 53 0a 7f 1c 45 dc 0f 11 52 e6 bb 5f 53 | 8d b5 f6 fb 27 2b 60 33 a4 cd 4d e9 7c 6b 4b 17 | 81 ec cb ca e4 d2 97 9b 61 33 64 a7 c9 1d 12 b0 | ff a4 81 cf f4 75 a2 54 63 07 9b 1c 61 4f 70 9a | f2 61 b3 19 96 98 3c 7b 44 1f aa 65 b4 bf d7 a8 | 55 c2 75 de ff 71 8c 90 1b 3c c3 a8 3f fe 54 f3 | 29 00 00 24 43 77 8d 20 c7 95 c9 d5 6a 2d 87 1f | da 3a b4 7e 55 a2 17 ed 53 70 56 79 ef 21 f9 7e | 28 b4 26 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 62 9b 7e ce 31 a7 8d 1a 50 79 db 89 | b3 07 e5 e2 b0 c0 20 fc 00 00 00 1c 00 00 40 05 | eb cc 39 a0 b6 a4 78 79 56 5f 29 29 93 1e cc 18 | 29 12 ff 3b | libevent_free: release ptr-libevent@0x7fb3700251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #449 spent 0.156 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 52 41 06 29 be 32 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #449 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #449 | rejected packet: | ea 52 41 06 29 be 32 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #449: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0749 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c012890 | handling event EVENT_RETRANSMIT for parent state #450 | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #450 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #450 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49711.840981; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00473 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #450 | libevent_malloc: new ptr-libevent@0x7fb3700251c0 size 128 "road-eastnet-nonat-198" #450: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #450) | 6c 66 54 70 e3 85 47 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b 7f 52 be 1b be 3e b4 95 6c 7f ea ce 79 84 79 | bb 2c a4 22 02 14 1a c7 80 c9 fc 63 a2 df a7 b4 | 1d c3 3e 47 98 35 3a c5 6d 01 79 cf ce 3b ed 3f | e7 fc 21 90 6a 8f a9 37 0a 15 57 ed e5 84 6d 80 | bc b0 af 24 80 0c 58 35 20 db 3e aa 64 ad 44 83 | d9 34 7e 33 a0 1c 88 af b7 63 e8 97 42 89 19 cf | e1 51 ee bc 36 b3 3f ea ae 0a 36 ea 2a 42 b5 d5 | 2b 9d 6c 67 c3 b5 e3 5c 88 ec 08 73 1a b8 90 c6 | eb c9 08 93 4a fd 61 5f ac b7 cf 92 b0 ce 44 08 | c5 ea 9d d1 33 ae 08 3a 55 1a 54 74 ee 06 12 8c | af 05 f1 32 8b f9 ad 76 e7 15 cf bb 56 d8 0d 22 | aa bf 8f d9 bc 81 33 05 b5 ca b2 64 e4 57 c2 aa | 8a ce 60 a9 03 71 24 23 e8 e9 eb 0e f3 fd cb 40 | 57 21 41 6c 87 a4 12 87 6c a3 20 f1 71 99 97 a1 | c9 bf 28 c9 61 1f 0e d1 0f d5 eb 18 2d 83 11 2c | a4 a9 46 db 50 5e 63 04 e8 1e e0 10 c3 22 6d 3c | 29 00 00 24 60 b3 78 69 cb 9c d2 f7 d6 cf 6b 51 | 75 18 c5 a7 1c 11 fb 00 38 fa 43 80 05 51 ec 75 | df 66 73 10 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 01 2f 17 96 36 9a 51 cd 6f 6e a8 | c1 69 8d 8a 84 17 97 6b 00 00 00 1c 00 00 40 05 | 07 24 02 da 94 a8 c8 5e ad a8 39 f9 98 2f 5a 91 | 01 02 06 a3 | libevent_free: release ptr-libevent@0x7fb36c03a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012890 | #450 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 66 54 70 e3 85 47 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #450 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #450 | rejected packet: | 6c 66 54 70 e3 85 47 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #450: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0558 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38800feb0 | handling event EVENT_RETRANSMIT for parent state #451 | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #451 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #451 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49711.956399; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004171 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012890 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #451 | libevent_malloc: new ptr-libevent@0x7fb36c03a770 size 128 "road-eastnet-nonat-199" #451: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #451) | ba 7b a0 b0 99 57 b7 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 77 86 c1 bd 46 53 16 86 81 3c 90 d2 1b d5 72 d6 | 90 46 2b fe 71 0a b5 92 27 f1 2a 98 1f 0b 9c 86 | b4 73 fd 62 b2 c4 76 72 65 dc a3 4a 74 c5 fd c6 | 79 b7 24 8c 57 9e 68 29 d1 51 ef 41 d9 35 5f e0 | 38 61 4f 5c 38 99 a1 c4 18 39 cd 7c d3 ce 2b 13 | fc 9c 47 13 18 41 cd b0 e2 7f c5 8a 64 72 a5 44 | 53 3a 53 2d 27 d7 7b 2d 79 06 40 fe 3d 6f 0c 91 | d2 44 b7 35 de 08 ea 0c 51 75 4f ac 93 26 ff 1a | 9b 0e 24 d8 14 0e 9a fc f6 cc 0e 9a dd d9 b9 d2 | 1b 38 2f 39 cf f5 c7 33 b5 34 1b 0e a3 9e 16 b5 | a1 af 82 8d 2c a9 ce 6b 79 b5 5c 3b f7 3b ae 09 | 38 95 45 10 35 73 6b 75 72 ac 01 d0 d8 9c 2a 56 | 79 52 8f 61 80 9d ac 4d cd 53 ef 84 96 01 18 60 | 62 4a 3f 8c ae bb 58 49 e4 bd 6c ac 5f b8 ee 89 | d9 a3 21 bd 37 79 80 9b e7 e0 92 c7 ad 63 83 e1 | b3 a4 a9 38 2d 78 59 50 55 18 b3 a6 f4 4b 9a 44 | 29 00 00 24 c0 83 9a b8 91 8b 33 7b 3e ca 3c 3c | 55 1b 13 ae f8 60 71 22 6b 87 6a 60 f0 da d9 ee | 56 ce cf eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 64 e2 2e 4b 98 7a a3 19 bf 09 d8 | 5a 5f 60 9f 04 ef ea a4 00 00 00 1c 00 00 40 05 | f6 42 3e 9c 74 68 a9 db 08 24 19 e3 18 ae 01 16 | fd d2 98 25 | libevent_free: release ptr-libevent@0x7fb384032b00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800feb0 | #451 spent 0.141 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba 7b a0 b0 99 57 b7 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #451 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #451 | rejected packet: | ba 7b a0 b0 99 57 b7 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #451: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0605 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_RETRANSMIT for parent state #452 | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #452 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #452 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49712.047794; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005669 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800feb0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #452 | libevent_malloc: new ptr-libevent@0x7fb384032b00 size 128 "road-eastnet-nonat-200" #452: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #452) | 50 11 a1 bf ed cc 03 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 8a 76 57 c4 9b d0 38 b9 d2 c2 4b 69 ba e2 a2 | 5a 11 4c 0a 45 a5 bd e6 9d dd c0 17 e1 2d b4 38 | 58 7e 63 fb 2b 24 a5 63 e6 a8 3b c4 4f a3 78 62 | 66 71 ba 53 c3 c9 09 13 5d ce 86 73 ab 12 87 fa | 35 c6 ff 8b 42 89 25 72 85 e2 b1 87 71 47 d8 8c | ac 7e ee 22 cc e1 04 85 55 54 54 b2 e0 ad d5 39 | 0a fc 74 d3 64 5e 05 35 2e 1a b0 95 d1 38 f8 9d | e0 83 e6 f4 e2 39 cf ac 1a e7 54 52 1b c6 27 82 | 61 87 37 7f 47 a3 e4 be 08 d5 c5 1a f3 6f 8c 8b | 63 33 54 b5 d2 c3 52 ce c9 11 04 d4 3e 44 cf a0 | cb 89 ea 96 9d 4b f1 9d 8d dc 98 07 bd 7b 2f d6 | 8f 69 b2 51 af f2 60 a1 de 25 ef d3 5a 7c e5 c5 | 23 56 16 2b d4 22 e3 1f 96 12 60 85 a4 b1 18 7f | b7 c2 db 59 66 51 fe 4e 85 1b ae a3 40 84 80 d2 | d2 e6 e1 c5 9e 39 9a 1f 42 76 d0 90 ba 8e cc dd | 5a 7b 9a 97 d8 6d 8b db 68 e9 10 8f 2c 64 9d b8 | 29 00 00 24 ba 51 08 92 39 ed 80 e6 57 c3 97 3c | b4 4a b0 29 f6 7a 02 bc 32 31 68 fb 36 27 e7 7b | 80 17 94 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 08 cf 89 69 b2 6f 00 24 ae 75 3b 9a | 3a b6 ca 28 54 7e 11 99 00 00 00 1c 00 00 40 05 | 3b ea 73 3d bf 95 ec 19 18 d5 48 b2 c7 6d ef 5f | 10 2b 0f c2 | libevent_free: release ptr-libevent@0x7fb34400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | #452 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 11 a1 bf ed cc 03 70 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #452 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #452 | rejected packet: | 50 11 a1 bf ed cc 03 70 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #452: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0448 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a647d0 | handling event EVENT_RETRANSMIT for parent state #453 | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #453 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #453 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49712.106132; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005733 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #453 | libevent_malloc: new ptr-libevent@0x7fb34400cf80 size 128 "road-eastnet-nonat-201" #453: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #453) | ce fd 6b dc 43 f9 b6 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a fe 9f 71 b9 6e 69 49 23 6a d5 87 63 a6 2d 80 | fc 10 3a 5e 08 f9 cc a8 36 72 0a 5b 2e 86 63 13 | 40 48 02 71 3c 66 28 bf ad d7 fa c6 30 96 5e 17 | bf a0 d6 3f 57 20 44 4e e4 00 ed 65 d2 4f 08 d6 | 20 51 fe 4a 66 fa 02 8d 06 00 db e7 45 a0 fc fc | 8c 97 f6 4d f7 77 a5 6a 79 27 5b a0 e1 46 fb a6 | 23 99 9c 26 32 43 cf 04 80 58 6f 87 cb a5 6d d2 | 76 b6 f1 d1 81 44 27 9c 99 67 9d 01 ca 24 01 04 | 53 a4 a4 40 53 47 8f 99 18 29 ec f0 3e a1 86 13 | dc e4 8b ba 11 0f e1 c3 4b ee 52 62 b4 64 8e 2f | 66 5c ba 6c ee 04 04 ed f9 bf cd 94 0a 45 b8 40 | e4 22 f5 d1 d6 df 3a ed ce c6 15 28 b6 04 76 04 | bd c3 75 e8 63 e6 45 74 6f 79 fc 8f 52 0e 1e 14 | f2 bb ae c1 f9 bb 75 83 86 a8 ff 0c d1 f1 5d 0c | a0 ce 81 b4 8f 58 61 e5 9f 60 57 7c c4 7a 6c 26 | 0d 77 a8 c6 b2 9c 49 0c ea 36 61 b7 06 0a 10 da | 29 00 00 24 e4 ac ab 1b 0b c0 0c 13 54 30 d6 3f | 0a a4 17 49 c8 c8 1a 8d ae d5 3b 39 11 5a 2a f6 | e8 ed 91 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 76 3b e4 72 b5 b8 a8 50 2a b0 80 | 46 e6 9d 5f 02 57 8f 98 00 00 00 1c 00 00 40 05 | 9d b5 75 60 1a f1 a6 46 0c b9 85 72 c6 f1 03 f3 | 4e 7a aa 51 | libevent_free: release ptr-libevent@0x7fb368023a60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a647d0 | #453 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce fd 6b dc 43 f9 b6 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #453 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #453 | rejected packet: | ce fd 6b dc 43 f9 b6 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #453: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0482 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368024000 | handling event EVENT_RETRANSMIT for parent state #454 | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #454 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #454 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49712.199465; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.00436 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a647d0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #454 | libevent_malloc: new ptr-libevent@0x7fb368023a60 size 128 "road-eastnet-nonat-202" #454: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #454) | 3e f1 41 2a cb 15 91 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a0 3c 6a c7 38 95 77 87 5d 1e c8 dc ba 22 fc 03 | 1c 9c 6c 7f 8e 0e fd af 13 dd 37 0a 23 40 7c ce | 87 9a c3 3c b2 29 81 32 66 6c ba 2d 43 73 e4 9f | 34 a2 6c c8 c3 e8 8f d1 b2 45 4b 81 58 b8 9d f6 | d7 6b 98 99 af 72 e9 d0 c7 87 b4 74 61 b8 6f 67 | 18 e9 20 82 3b 32 85 5d b7 fc 19 46 92 6b 65 26 | b2 31 d6 c3 36 5c 46 dd c1 b3 1a ba 4d 4c b4 fb | c9 29 e2 5f 88 92 21 72 05 11 74 76 83 6a f0 05 | 70 a8 4f 78 f0 27 41 4f 18 70 43 44 55 76 41 4e | d4 55 4f 0d be 47 fb 72 63 29 ab 49 16 15 52 01 | 76 0d 0d 3c d4 72 41 c1 63 95 85 97 21 62 a1 0c | 98 62 73 cf ff 81 3f b1 d6 5b a3 17 9c bf 13 ea | 76 47 19 6b ec 4e dd d2 c8 fc 10 8a 93 9d e2 40 | 1a 9a ec ba a4 26 5c 4d 01 9a 6a 47 3b fc ea 48 | 29 30 cf ee 79 66 a8 78 a7 b1 8e ad 2b ce 52 2c | 72 05 7f 8f f6 f4 ff ed 12 0a b1 b7 de 27 bb d0 | 29 00 00 24 42 50 bc e2 16 2b 34 89 d5 4e 59 5a | a4 d3 d2 a4 86 df 60 97 ee fa 90 f6 ad 34 8e f4 | 49 50 59 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 1c 0d 08 a9 24 58 8d 73 8e f2 10 | b3 0d e0 67 52 ae c5 46 00 00 00 1c 00 00 40 05 | 72 a5 1c 62 b2 bc b3 f0 fe 77 e1 0e f2 db 46 ae | 09 80 33 7f | libevent_free: release ptr-libevent@0x7fb368046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368024000 | #454 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3e f1 41 2a cb 15 91 c1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #454 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #454 | rejected packet: | 3e f1 41 2a cb 15 91 c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #454: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0909 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a34e10 | handling event EVENT_RETRANSMIT for parent state #455 | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #455 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #455 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49712.282966; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008957 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368024000 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #455 | libevent_malloc: new ptr-libevent@0x7fb368046040 size 128 "road-eastnet-nonat-203" #455: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #455) | a6 08 27 1f 75 50 39 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d5 c7 bc 11 60 3e a6 9a 85 6d e5 42 37 d7 18 00 | 0c ea 15 92 bc 93 3a fa 4f c0 cd 9b 9d 21 1a ec | 13 f0 fc 0b a2 84 9a a5 b1 57 c2 a8 ab 33 a5 7b | 04 ac cd 61 b9 a7 e2 6f b1 9a 56 b1 3c b1 a4 2e | 8d 80 e0 ac 78 ee b2 78 51 00 d0 a0 eb cf 06 35 | 9c 7e 2a 73 b1 56 cd fe b7 d8 9d ab 84 62 9b e7 | ab 4d 04 16 06 c3 1a 9c 88 af e1 4b bd a0 09 ac | fd 8a ba 51 00 10 a1 a7 a6 a2 56 74 b5 9b 53 af | 87 60 09 5b 74 75 e3 41 f8 3d 7a cf 0c 36 f7 ea | aa 1b 05 8b 54 d5 b2 e1 fe 9e d4 4e f4 ae 74 22 | 98 23 25 ba ff 74 27 da 25 81 74 09 8c 6b 8b 69 | 54 dc 62 05 8c 02 be b4 b0 c4 25 43 18 99 9f c3 | 41 7e c1 29 f3 a3 60 75 de aa 26 bd a3 38 8c ad | a8 31 89 d2 48 90 d9 19 ce f4 34 9e 9d e7 1c e9 | d3 7f ee 85 33 84 75 6d 04 5b b4 a0 96 a6 93 65 | 8d 1c 3a f8 14 81 03 4c 63 f4 25 e5 59 99 ac 86 | 29 00 00 24 6a 39 a6 75 f8 f4 82 47 b3 0b 2e 10 | f3 31 67 d9 88 26 9d 5b f1 75 40 6b 34 32 86 bb | 7a 07 84 1e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 cd df 41 37 6e 2d fc 1b 29 38 8e | de fc 0c a0 44 c7 44 d5 00 00 00 1c 00 00 40 05 | 6e c0 59 83 50 2c 8a cc c5 6e 0a 98 ab 1c 00 ee | ff c6 95 31 | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a34e10 | #455 spent 0.148 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 08 27 1f 75 50 39 d3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #455 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #455 | rejected packet: | a6 08 27 1f 75 50 39 d3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #455: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0106 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35400f1f0 | handling event EVENT_RETRANSMIT for parent state #456 | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #456 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #456 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49712.391123; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.010362 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a34e10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #456 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 "road-eastnet-nonat-204" #456: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #456) | 9d 73 90 c6 28 50 00 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a4 3f ed 93 2c 95 9a 36 92 4d 4f a2 60 c1 a4 c9 | 4f 89 23 1f d1 62 f5 78 d3 b5 53 89 10 3d be a6 | 0b 7e 28 8a f8 9f 39 90 86 39 f9 58 de b8 41 b5 | 4e b5 7b 74 44 63 cc 49 07 82 fe 85 49 2e bc 7a | f9 73 7c 32 a7 c0 6d 69 27 6b 58 3d ad d1 e3 ec | cc a2 3b ff 29 b9 68 35 71 ee f8 63 67 14 1d 54 | bd cd c0 94 2f 62 7a 35 f4 12 35 06 31 ee 52 8b | 29 f1 3d 4d 88 53 c4 ee a1 13 19 c9 95 9c 3a b3 | 01 50 95 2e cb 29 cc 04 53 67 66 58 33 78 91 44 | bb 06 02 b6 52 69 e1 7c 4a 36 de 14 7e d4 42 89 | da ed 12 fd e2 7c 6b 02 ab fa 82 91 36 f1 eb 4f | a3 22 e5 0e 96 4e 45 d1 d5 c3 b4 13 59 96 05 fe | 42 25 83 c3 8d 08 66 f5 9f c5 f5 d6 78 e8 30 c4 | 64 8d 48 0b ea 1f e9 05 9f 8a 0b 97 9c 51 d8 74 | a8 a9 43 c8 84 d8 11 55 a3 8c 0b ac d0 92 1d f4 | 61 b1 7f 3d f8 aa 52 a8 9b c7 bf 12 0c da 76 e4 | 29 00 00 24 6d 34 cd c2 13 6b 2e 99 a8 cb ee 2a | a0 eb 8c a9 1d 65 aa 5b 5f 82 85 1d 0e 9e 60 f1 | 7a ed 45 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ef 03 64 ba 5e b8 36 8b cc 07 48 65 | d5 6f 6e 8b 3d 6d 57 bb 00 00 00 1c 00 00 40 05 | 07 ad 51 48 59 7f 26 2d fc 42 e0 9c c0 43 00 49 | 58 00 de b8 | libevent_free: release ptr-libevent@0x7fb35403a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400f1f0 | #456 spent 0.212 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9d 73 90 c6 28 50 00 4f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #456 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #456 | rejected packet: | 9d 73 90 c6 28 50 00 4f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #456: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.094 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b25c40 | handling event EVENT_RETRANSMIT for parent state #457 | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #457 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #457 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49712.568726; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007037 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400f1f0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #457 | libevent_malloc: new ptr-libevent@0x7fb35403a770 size 128 "road-eastnet-nonat-205" #457: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #457) | 3d e3 b8 80 8f bd c5 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c 7a cc 82 1e 2d 53 a5 ce 9e 27 c2 26 66 c5 e9 | ca b7 3b d7 b3 d5 8f c0 1e ac 61 93 25 30 44 75 | 16 7f 86 32 17 98 9b b2 bd a4 40 62 a6 0f f6 2b | b1 e8 33 29 3f 84 59 09 aa bb 5e 2f cd e9 1a 72 | c5 38 7c e2 59 e4 bc cf cc fa da 23 96 75 c1 c7 | ad fb a2 86 e8 bf a6 3f 1e fe 2b 41 b8 4f 8a 8f | fc 26 0a 24 5a dd 02 29 13 7a b7 2d e7 62 32 f3 | 6a 17 ae ce 85 51 34 8a 1c 60 c5 a3 0d 63 33 17 | b8 03 02 91 41 6c de d7 2a b4 05 f1 63 80 c5 fa | a4 93 75 6c e4 d1 6b 22 4b c0 ed 28 67 a9 70 75 | f9 13 92 e4 11 7c 99 29 38 c0 6b 83 36 d2 38 17 | 99 86 23 65 2a c3 af 64 bb 12 ca 10 15 c7 5a 01 | e6 2f f0 2b 77 e0 ac b3 ec 7b 00 6e 19 4c 17 4e | c2 c8 73 f2 63 d0 16 98 d3 38 a7 f8 87 36 2b 60 | fd b1 1f f7 a9 42 1c 9e d6 33 ef 51 73 04 4f 2e | c1 59 d4 cb eb 88 5a 87 9b 61 94 46 2e b3 5e 3c | 29 00 00 24 bf 42 01 47 80 24 bc 54 c5 78 43 68 | 88 cb 29 3a 9a 04 f3 2d 0c c7 ac f0 bd ad b4 35 | ec c6 0a 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 d2 27 5a 8f 21 c7 36 56 bd fb 12 | 29 e7 69 7f 19 4f 04 f7 00 00 00 1c 00 00 40 05 | 06 c5 63 f1 7d e9 6e 2f 88 1f 75 73 67 c0 d5 c5 | dc d6 be 87 | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c40 | #457 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d e3 b8 80 8f bd c5 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #457 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #457 | rejected packet: | 3d e3 b8 80 8f bd c5 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #457: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0425 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37802a9a0 | handling event EVENT_RETRANSMIT for parent state #458 | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #458 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #458 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49712.665088; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006378 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c40 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #458 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 "road-eastnet-nonat-206" #458: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #458) | d8 20 9c 76 6a 13 05 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 56 f8 70 4a 7e 5c d3 77 41 08 04 2a 79 b8 78 55 | 9f 63 d7 1f d9 bd 04 73 e8 de 1f e6 51 71 d1 c1 | 71 09 97 4a 5c 16 68 a0 aa 69 e9 b4 93 ac ba f6 | 92 85 87 a8 c8 1f 88 3f 36 bb 45 8a 62 53 f9 71 | 32 e3 0c 69 bc 64 74 29 df 76 29 f7 54 0a d6 9e | bf f9 de ca 92 41 8b 95 09 7a 0d 5d 50 17 4e 54 | 40 99 d8 f9 ca e7 ca c6 0c af 31 22 59 39 c6 0f | c7 31 f1 5e c9 b0 5a 0c c9 3f c9 f9 d7 bd 4f d2 | fd 98 c7 19 a0 f3 e9 01 16 f3 fe 75 35 59 15 08 | 13 ea cd 50 33 e8 15 ab 01 f5 9e c1 43 d2 27 90 | 39 d5 e2 89 77 57 ec 66 ab 2d 6c 09 fc 1d 8f 1a | 62 91 d6 59 58 86 af 9e fa f2 4d 80 b6 39 ef 93 | e4 aa 9e 6f 49 aa 2c d4 54 59 f2 01 66 25 3e 6c | 9e 0b 06 28 b9 af 2e bd e7 a4 57 6f f0 5b 4c cd | 6a 03 04 af 85 10 e3 f2 17 ad 37 f3 24 3e 66 fb | 27 c7 a1 c5 2e 32 66 c3 94 bc a6 2b 60 cb 4f f9 | 29 00 00 24 33 eb be f2 9e 94 9d 08 4c d8 00 c2 | f8 2c a4 ef 00 e3 f7 7a 62 72 9a 99 65 d6 f3 0e | ff c8 b6 6c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 01 77 97 bc 56 25 23 ed d6 15 51 | 7d a3 3f e8 c0 74 6b cf 00 00 00 1c 00 00 40 05 | 8f 1b 57 d9 1a 63 f1 b3 99 7b 22 3d 44 e6 21 51 | 1c 41 cc 24 | libevent_free: release ptr-libevent@0x7fb37801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | #458 spent 0.137 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 20 9c 76 6a 13 05 e5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #458 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #458 | rejected packet: | d8 20 9c 76 6a 13 05 e5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #458: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368040840 | handling event EVENT_RETRANSMIT for parent state #459 | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #459 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #459 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49712.789455; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005229 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #459 | libevent_malloc: new ptr-libevent@0x7fb37801a4e0 size 128 "road-eastnet-nonat-207" #459: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #459) | 64 1c f9 72 57 02 e5 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 09 f4 91 af e8 cc 47 24 c2 b5 4c 3e ed df 87 0c | 09 e0 4b 07 1e 23 c5 7e 86 e2 5a ab 7d 41 06 3d | 7f 7d f9 8e b6 58 c8 fa 4a e7 6e 59 bd 9e 19 5b | d0 22 36 6d 62 9e c7 d4 0e 8a 77 c0 e4 05 9e c6 | 38 14 50 50 10 9e e8 30 b1 17 07 a8 ec 87 4b 21 | 15 4c 43 ee b6 9d 8d a1 9c 18 3d 34 43 97 8f 77 | 9a 8e 35 11 77 6c 19 4c d5 d6 10 76 41 7d 92 29 | ce 7e b0 f8 dd e1 3c da bd 28 65 ea 34 c0 d5 5e | 87 61 2d 03 e2 eb 39 88 92 b2 21 9a 8c ff 81 cd | e0 87 95 3d 88 8d a2 1e 66 0d db a2 7a 79 4c cc | ae 9a d3 e6 87 6a 1b 78 ae 44 bb 23 8a 41 53 1f | af 3f 42 6b ff 45 a9 da 42 e2 38 bd 4c 50 bf a8 | 3b 16 b5 57 9a cf 28 d9 88 40 31 6e bd 9a 3e 51 | 61 82 b6 d4 f2 88 81 2c 57 c3 85 0c a7 ff fd 6c | ed 2a 14 13 51 d6 b5 56 aa 0c 26 20 25 e3 9c 40 | 12 38 26 e0 f5 9a 6e 40 35 0c 6b 0a 6d b3 65 32 | 29 00 00 24 5c 75 af 9e f8 ea 62 49 48 89 05 1e | 77 92 7c c2 74 9a fc 43 04 bc b7 18 cc f7 58 3d | 9b c8 34 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ae 7f b1 c0 22 56 8e bd 29 fd 39 4f | 5d 90 ed 84 8a 20 f8 23 00 00 00 1c 00 00 40 05 | 58 59 18 6a d1 74 dc 11 3e 54 b0 34 57 9e 0a 5d | 5a f6 05 3b | libevent_free: release ptr-libevent@0x7fb3680345d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368040840 | #459 spent 0.153 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 1c f9 72 57 02 e5 bf | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #459 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #459 | rejected packet: | 64 1c f9 72 57 02 e5 bf 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #459: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0615 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0a940 | handling event EVENT_RETRANSMIT for parent state #460 | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #460 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #460 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49712.896853; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004754 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368040840 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #460 | libevent_malloc: new ptr-libevent@0x7fb3680345d0 size 128 "road-eastnet-nonat-208" #460: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #460) | 23 48 f5 22 8d 37 9a d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b3 df d9 22 d0 fa 01 d1 aa 88 df 6a 8b 18 c0 09 | 4f 5b 80 db c5 12 8b 47 ef 35 50 bc b0 af 99 c5 | f9 cf 10 a6 63 8f ba 03 da 7f 0b b3 54 11 ba 9c | bb 06 80 77 61 12 b6 fe 2b bb 2c 7d 23 ed 7a 74 | 17 31 cb cb 95 4c d6 8f 31 04 dc 07 37 df 2d f4 | 1c ed 0c bb 28 ba e2 23 2d 3d a3 b2 fc 6f 50 eb | 56 d2 5b 1e f1 ad 23 2f 3e 55 c4 35 e9 32 f6 24 | 86 b3 e7 fd 04 0f 6f 72 db 37 4f bd d9 fe 64 c2 | 83 ac 83 05 91 73 42 0a a1 0c 3e 29 3c 20 67 b6 | 92 37 23 8d 25 df 18 a0 fa c2 98 93 ab ff 5f 64 | 7c d6 b8 fc 1d 90 5c 26 98 2d 8b b3 56 38 e2 7c | 20 da c8 bf 8d be 1d 6d f8 c5 88 bf 2f 3a f2 41 | 78 28 51 f9 69 ab 11 20 67 51 52 04 40 a5 c7 0c | 37 f0 c6 5d f9 95 c0 b8 47 6e 71 8e 99 56 3a 5f | e1 5c d4 8d c1 97 29 9c 26 a6 ac 65 11 ae 68 ef | 23 72 8e c9 45 c4 63 78 1b 5c 81 47 6e 58 87 ff | 29 00 00 24 25 2a f3 c2 d1 34 f2 28 be 54 0b a4 | 22 e2 98 59 02 dc 2f 37 5b b6 b4 bd 10 49 91 58 | 87 4d 98 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9c c8 5d 4c 09 cc 17 d5 22 fc 7b d0 | 43 ae fd 90 5d 04 da 2b 00 00 00 1c 00 00 40 05 | 07 a4 f0 f7 58 53 22 23 25 cf 1a 07 69 10 b8 4a | 16 e3 ac d7 | libevent_free: release ptr-libevent@0x7fb3700180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0a940 | #460 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 48 f5 22 8d 37 9a d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #460 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #460 | rejected packet: | 23 48 f5 22 8d 37 9a d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #460: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0646 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b24700 | handling event EVENT_RETRANSMIT for parent state #461 | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #461 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #461 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49712.999259; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007385 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0a940 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #461 | libevent_malloc: new ptr-libevent@0x7fb3700180b0 size 128 "road-eastnet-nonat-209" #461: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #461) | 30 e3 71 39 78 d7 e3 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 28 73 72 eb a6 69 8c 9e 08 28 d6 16 78 8b f3 f1 | 10 b5 c6 3e 5a 68 ff ee f8 e9 ea 04 9a 96 07 cd | 19 7e 01 3e f6 8c ec 23 90 c5 34 cb 27 e1 d9 f4 | 83 f1 52 a0 20 79 82 b5 63 bf e3 1e 4c 8b e6 11 | 56 0c 8d 37 3e 34 a4 1e 35 3f f2 4f c6 52 63 33 | 1a 19 3a f7 47 1a 58 cf 14 be b6 13 3a ba 6a 7a | c2 7e 4a 7c 6b 24 bd 5d d6 f1 53 6b d9 1a c9 0e | b4 0c ad ca 0d 87 78 f9 58 81 24 7b 64 ae 92 0f | 11 e7 db e4 1c 12 40 ed e3 44 f4 22 a9 cb c8 e8 | 35 d2 0f 26 8c e9 f0 bd 79 b3 71 e1 56 b6 c2 ad | c3 25 0b 24 c0 9d 7c 39 2c c7 c4 5c 79 bb 71 e2 | 44 92 14 47 75 57 f7 30 ac 8e 27 b4 ce 61 8d 65 | 5b 3f 84 a2 85 6e ec 1f 9f 60 e7 ef bd 5d a7 fa | a6 23 27 f3 06 ac 82 f0 e3 4d 76 a2 d3 e2 92 c2 | 69 39 39 eb 52 01 f2 b3 9d c1 f3 c5 d2 36 e4 c6 | 40 e0 76 99 a0 7e 6e 0f 65 8c da 02 f1 c2 ad 1e | 29 00 00 24 90 76 1f 57 9b 42 3c 9c 17 4b 00 94 | e5 bc 1a a6 9f 85 30 49 d6 5f c0 4c ce 00 c3 85 | 0f 0e 5c ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 76 5f 86 b3 2d 97 ef 5b 1d 05 17 | f4 c4 b8 ec 0d 36 f1 03 00 00 00 1c 00 00 40 05 | 57 06 a0 ca 17 47 48 ab cc 80 4d 50 ec 37 d9 01 | a5 d0 9e bc | libevent_free: release ptr-libevent@0x7fb3500180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24700 | #461 spent 0.125 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 e3 71 39 78 d7 e3 f5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #461 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #461 | rejected packet: | 30 e3 71 39 78 d7 e3 f5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #461: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0641 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350014cc0 | handling event EVENT_RETRANSMIT for parent state #462 | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #462 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #462 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49713.071746; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006804 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #462 | libevent_malloc: new ptr-libevent@0x7fb3500180b0 size 128 "road-eastnet-nonat-210" #462: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #462) | b3 aa 18 e3 bb 76 cd a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 e1 dd 76 b8 92 08 2e 86 ea 59 23 d7 a8 a3 c4 | 10 20 64 4d 1a 6e f6 be 88 38 70 1d ff a1 81 97 | 56 46 d0 11 ce c6 71 4d d3 b8 e9 f6 8f 98 00 29 | 10 68 fe 2f 6a fe 59 74 05 66 7b 78 d6 d0 be bd | fb fc 90 3b 61 ee 5a 02 67 1c cb 53 c4 30 e1 1c | e1 cf 60 fe b2 ba b8 12 9c c1 21 b7 9c a2 2e d3 | f2 85 29 0d c8 10 98 b2 a9 8d 09 29 1f fe 72 bd | 6f ac bd 80 e6 e9 9d 07 a0 84 25 09 ab 49 d1 fc | a4 e5 0d 0e 5a 9c 8e d8 0e 96 4d 74 82 a0 b4 18 | 38 39 81 2c 56 26 db 6b e0 e9 32 19 24 e6 ac f3 | 8a 50 27 76 e7 46 84 40 39 2a 33 e3 46 30 98 1e | a4 e6 6f e2 bf e7 be a6 d5 b2 77 f8 b0 8c 25 cb | 3f 99 0a 63 88 e2 f4 8e b0 ed 00 10 7f f7 a6 31 | 7b da 9a 1a 53 83 49 e7 c5 ae 8b 25 41 9e cd 02 | 64 ab a9 c7 ab 71 01 ef 57 dd 6f c5 35 5b 12 e5 | 9c 28 f2 35 96 11 0c e1 05 5e 94 47 29 58 9d 96 | 29 00 00 24 9f cd 6b 85 44 66 e6 2e a2 be db 56 | e9 91 ac b0 be 57 bf 5f a7 03 66 4a a0 9b 90 be | 3c 13 94 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 1b 11 78 68 c9 76 e3 37 8a 0f 7e | ca ac 37 4e 36 55 96 e1 00 00 00 1c 00 00 40 05 | 75 7d 89 5c 82 a5 9e b6 a0 43 f2 ed 22 d9 e8 25 | c0 74 c1 73 | libevent_free: release ptr-libevent@0x7fb350029650 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350014cc0 | #462 spent 0.446 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b3 aa 18 e3 bb 76 cd a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #462 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #462 | rejected packet: | b3 aa 18 e3 bb 76 cd a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #462: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.209 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #463 | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #463 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #463 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49713.201628; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006598 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350014cc0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #463 | libevent_malloc: new ptr-libevent@0x7fb350029650 size 128 "road-eastnet-nonat-211" #463: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #463) | 82 4f 79 37 d2 0d 41 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 90 64 a0 3a db 52 d6 c6 b4 21 5d 30 95 90 4d | ec 3e 65 f9 a3 2a c0 c0 7d e8 b2 f7 1e 08 f4 cc | 30 5c 17 eb a6 d5 4e 6e 17 f4 ed c0 bb f3 91 4e | 29 c8 3b 87 04 44 02 f9 0c 4c 73 bd d1 0e d4 bf | c3 01 38 a2 ee a1 61 19 01 62 c9 01 0a 14 69 dd | 59 d3 14 b1 8b 13 6d e7 0f 1d 11 59 11 9b 90 f3 | aa 66 ef 87 af 13 48 7f 6e c1 0d b9 f9 71 ad 9d | fd 12 e0 bc 30 d7 16 13 c9 f0 f8 64 57 36 fa 5b | d1 d8 74 64 e5 de 63 84 ef e1 12 12 26 93 3e 5c | b3 7f 8e 2c 1b eb d2 40 f2 01 5a e7 a8 30 ce b1 | 5c 5e 42 a8 26 40 52 c4 dc ea 04 68 87 26 50 e6 | 46 ae 37 b9 e4 fe 3f ef f2 8e a4 4f 04 25 af 76 | c9 39 80 05 08 fd ea 60 66 c5 24 89 72 f4 32 ff | ed 8b 39 48 50 c3 c4 68 91 e7 fc 82 bb 80 ce 9d | b8 47 ce dd c6 cc 21 8c 6f 88 e2 73 75 00 d9 09 | 84 88 f6 ce 7e 64 f7 42 86 d8 a7 50 3c 43 db 24 | 29 00 00 24 4c d8 7a cc cf f5 14 f0 01 a0 b3 f6 | 54 e1 4b f5 78 b9 2e d9 dd c8 bf f8 13 79 83 13 | b9 47 db df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 0d e0 3b 3f 2d f3 17 7e c2 11 72 | 87 7f c1 e4 a0 63 0f 3f 00 00 00 1c 00 00 40 05 | e9 2f a4 cf 6a af 14 cf 3c 1b bf 7a 8b a2 e8 94 | b0 6c 66 23 | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #463 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 82 4f 79 37 d2 0d 41 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #463 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #463 | rejected packet: | 82 4f 79 37 d2 0d 41 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-211" #463: ERROR: asynchronous network error report on eth0 (192.1.3.211:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0668 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3500300a0 | handling event EVENT_RETRANSMIT for parent state #464 | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #464 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #464 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49713.312031; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007622 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #464 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 "road-eastnet-nonat-212" #464: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #464) | 24 23 49 88 e3 09 10 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 3e 00 a4 b1 da ff 66 fb 46 9b f8 05 c4 d3 4e | 1a be d3 c5 f3 29 65 46 ed 6f e5 e1 9c d3 68 c3 | 49 3b 6a cd e8 c4 12 c0 42 a0 22 7e 1b 5d 32 aa | a0 3a 32 c8 92 e5 3d a9 90 26 7c b6 7a 3a c7 43 | 1e d7 d9 ca a9 3b e4 0e ac 4c a3 a2 54 be fa 3a | 34 7b 08 69 76 9f f5 86 6b e1 71 f1 ca f2 34 fb | f0 af 6d c0 e7 4d 86 2c 35 64 d7 a8 e5 56 44 f4 | 1b a3 7b 36 d3 8e bf 68 72 d1 d6 14 19 d5 94 41 | 37 2c 85 dd 26 51 82 12 f9 57 28 f6 64 e4 99 2c | e5 14 14 38 a6 eb 30 83 5f a9 d8 ce 33 ba b5 e7 | 8f 9e 29 5d 17 d7 5f e7 f7 6f 44 97 e9 e3 1d 52 | 7d 6b 40 ae 7e e6 9b 70 f4 e4 cb 6b e6 46 d1 1a | f1 d4 e8 4a 08 7a 73 f5 ae fa 1c 51 b5 c1 66 db | b4 47 cd 7b 34 6f da f9 6b b2 dc 0f 59 56 0e 82 | f9 d8 cb f8 b3 e7 8c 71 cf eb c3 24 d5 a5 32 fc | 19 3b 14 fc 10 5b ac 0b 65 e1 fc c1 26 0d 3c cc | 29 00 00 24 f8 5a 68 e8 8f 04 5e 9b c3 04 25 38 | 2e af 26 bb 12 7b 35 ab f6 8f 9b c1 e5 8b f7 b5 | fb ab d6 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 53 56 65 0c 1b 38 25 05 25 e2 17 | 1d aa de c6 51 81 dc 56 00 00 00 1c 00 00 40 05 | b6 60 c7 67 b1 c7 40 e8 a5 6f 2e d6 dc 92 69 0c | f8 bb 28 2f | libevent_free: release ptr-libevent@0x7fb35003a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3500300a0 | #464 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 24 23 49 88 e3 09 10 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #464 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #464 | rejected packet: | 24 23 49 88 e3 09 10 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #464: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0653 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3800383c0 | handling event EVENT_RETRANSMIT for parent state #465 | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #465 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #465 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49713.405434; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004367 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3500300a0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #465 | libevent_malloc: new ptr-libevent@0x7fb35003a770 size 128 "road-eastnet-nonat-213" #465: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #465) | 61 8e 23 d2 13 62 a1 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e ff ad a6 69 28 f7 dc 3e 12 16 a3 b8 12 d1 0c | e2 d9 c7 08 64 20 6b 95 e2 f7 13 3f fe 41 07 b0 | 63 aa 7f 3d 77 9f f9 e2 21 16 88 33 88 34 63 be | 66 c4 e1 0f 6d 0e 67 89 ae 7f d4 2b da 09 0e c2 | 3d 5d ed e3 b1 da e4 45 10 b1 c5 e8 5c a0 b7 e1 | 45 c7 74 34 87 11 e9 20 8e bf a9 d5 b7 7f 3e c8 | 87 13 ea b0 4c 38 35 35 21 28 ca 99 cb 90 60 a1 | 8c 47 23 f8 9b b8 e8 b3 af 65 36 19 01 0f 99 db | 11 cb f7 6b 11 70 78 e3 5e f3 08 79 6c d7 3e 9c | aa 63 ab c1 3b 94 5d c4 f5 a3 7c fb 68 79 fd 4d | ad 0f 3b a0 62 30 54 4e 21 46 20 c3 e3 03 c6 e1 | b9 0f 7d fe 4b b3 60 7d 63 ba a2 4c 73 2e f3 b8 | 3b 22 a2 5f eb 6e f7 60 a7 f7 13 33 69 2d a4 92 | 73 a6 b3 6f 83 80 a4 99 0d 08 29 5e d9 35 92 ae | 9f af 0f c2 f8 4b f3 a5 f1 21 b9 71 6a 24 94 9a | 22 03 aa 3e 91 42 1b 0b b8 8a 56 9b 18 21 37 6d | 29 00 00 24 d0 d3 37 6e 16 17 0d f3 9a b3 75 28 | da 73 bd b0 37 5f e8 7c ed 64 dd a2 58 d5 25 f4 | 40 05 3d 62 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b5 42 81 75 52 0a 3a ff 0f 6a b7 c3 | 61 92 38 6c 3b df 54 bd 00 00 00 1c 00 00 40 05 | ac 90 18 d8 00 f9 15 ad 07 5e df 3f 97 c5 48 08 | 0a 92 84 e5 | libevent_free: release ptr-libevent@0x7fb38000c460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800383c0 | #465 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 8e 23 d2 13 62 a1 46 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #465 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #465 | rejected packet: | 61 8e 23 d2 13 62 a1 46 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #465: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0465 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb338017ea0 | handling event EVENT_RETRANSMIT for parent state #466 | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #466 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #466 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49713.484758; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005368 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800383c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #466 | libevent_malloc: new ptr-libevent@0x7fb38000c460 size 128 "road-eastnet-nonat-214" #466: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #466) | d8 f3 8e 44 6b 2f 1e a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4c e1 1c b6 a8 45 43 90 db 9b 35 75 1f aa 92 f9 | d6 e2 6f 34 81 df f8 c5 fb 61 93 34 a9 9a d6 e7 | 4f 19 4e 64 91 79 4b bc 74 e5 43 7f 1c fd f5 46 | 67 4f b3 d8 c9 4d 2d c9 eb 26 c5 ea 6c 36 ba 25 | 06 8c 1d c8 05 71 c9 48 a5 ca a6 91 9c 00 5f c8 | af c1 a9 4d 01 92 ef ab 3a e6 5a 67 89 38 c9 af | 19 fe 4d 6b 76 3f 95 f8 65 3e 4b 5b 24 34 56 32 | 9f dd 59 97 7b 03 2f 23 ce fb e6 f8 e4 68 93 ff | ad 3a cf f3 67 73 9d e1 9b 2a d0 84 d4 ba 4d fe | 72 3c 74 29 f1 ab eb eb fd d6 c3 47 54 02 c4 5f | 85 e4 bc a9 88 7b 25 6d 99 c6 f0 38 89 09 7c 47 | 72 c2 61 46 a0 1d 59 09 82 b5 5f b7 e1 f1 5c 0d | 50 1d c9 01 1e 1c 93 24 6c e4 5b 27 7f 49 97 85 | 14 7e 19 88 ae dd 1a b6 56 79 35 3e ff bd 7d 4e | 47 80 ff 35 79 4b c6 1c b6 e7 5a d2 8f b2 aa 73 | 6a 88 5b 1d bb 78 3e 8d f2 9b 06 47 8f 4b 75 e7 | 29 00 00 24 4b 18 d5 35 7f 58 ef 5d 8f 25 3f b5 | cb 0b 31 6c 2d c9 a6 3f f9 92 29 72 9b 38 37 11 | 6a b0 a4 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 05 d8 47 26 17 c1 8a e8 09 00 37 fb | f1 38 56 14 b9 a5 7b 42 00 00 00 1c 00 00 40 05 | 10 91 19 bc 27 f8 ea 8a 40 18 2c 45 b2 2a 2d 38 | 23 45 ab e1 | libevent_free: release ptr-libevent@0x7fb35403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338017ea0 | #466 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 f3 8e 44 6b 2f 1e a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #466 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #466 | rejected packet: | d8 f3 8e 44 6b 2f 1e a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-214" #466: ERROR: asynchronous network error report on eth0 (192.1.3.214:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.051 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c018460 | handling event EVENT_RETRANSMIT for parent state #467 | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #467 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #467 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49713.568107; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006184 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338017ea0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #467 | libevent_malloc: new ptr-libevent@0x7fb35403b0b0 size 128 "road-eastnet-nonat-215" #467: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #467) | be 07 ac 9a b2 b5 64 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 4e 05 41 e0 9c 82 57 92 0a 9a c0 ac b7 0e 16 | 8f cf 40 f2 c1 21 c6 0e 53 7f 71 9b 23 53 ab 32 | ef 64 72 bf 1c eb 94 98 29 9f 35 3d 25 d3 1c 5f | e7 9d 00 19 e2 0a 16 20 a6 ea 3a 6d 7b 32 8e 93 | 96 ee 8d 09 fc 5d f8 27 b9 ca 49 09 65 ce cf 30 | 67 2e f4 4f 3d ad 29 2d 5a 4c 68 40 7f 94 6f ad | f5 98 12 1b 59 74 90 02 ab ae 6a 47 c6 cb f0 fe | 1e 5f 8d 21 2a 5d 11 fe 17 3b 75 9d 65 5c 76 a0 | e4 ca 7c e0 c8 8a 37 49 e6 36 2e 9d 9d 6c be 13 | f2 87 dd 81 d0 10 4c ee c7 ac d9 53 97 d2 c8 92 | 06 a5 e1 c9 c7 93 30 ee d6 3d ac 47 98 50 1f 6d | d0 3a db 8b df 20 7f 6b 55 4b d3 fe b0 df 95 14 | 4e 40 f5 72 7e 0c bb 04 da d9 d2 07 87 d2 e0 72 | 1c 20 5b 2d c2 5e 0e 89 32 b0 a4 ac ae 09 91 0a | ac c6 1c cc d1 3b 35 35 b5 b5 4c 01 ce b4 2e ea | cd 79 86 98 20 31 06 5b 6a 88 36 07 19 32 e2 40 | 29 00 00 24 65 a2 6f 51 03 e0 c3 95 a1 17 d9 10 | 35 d2 c8 05 2a 6d 6f d8 b4 c3 4c 08 92 7c 46 6b | 3f 11 55 1a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 95 f5 c4 0f 53 2d de 04 94 5d f4 | 44 07 bd 21 62 32 e6 d2 00 00 00 1c 00 00 40 05 | d8 32 98 63 8b 4a fe f1 1f e4 de 6d 0f 9b fc 4d | cc 8b 9a c1 | libevent_free: release ptr-libevent@0x7fb34c01a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c018460 | #467 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be 07 ac 9a b2 b5 64 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #467 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #467 | rejected packet: | be 07 ac 9a b2 b5 64 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #467: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0548 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ad8480 | handling event EVENT_RETRANSMIT for parent state #468 | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #468 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #468 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49713.666466; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006613 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c018460 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #468 | libevent_malloc: new ptr-libevent@0x7fb34c01a4e0 size 128 "road-eastnet-nonat-216" #468: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #468) | 7d 98 8a 9d 47 30 f3 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 4d 82 7b ce 67 f5 e3 c7 ef 1e 88 97 12 6b 1f | 83 b8 f4 6b 5d e2 86 e0 e9 f2 9b 39 cc 52 e7 74 | 42 1d 82 da 97 54 f4 cf 8c bb 44 74 5b 79 77 99 | b7 64 d2 5d 6f 79 ec 9a 9b f2 ae b8 84 7a 6f f8 | bd c4 91 ab 33 ef 63 16 a0 41 ba 3f f0 a6 76 33 | 99 9d 4e fa 10 3d a9 b0 fd 9d 95 6a 6d e1 64 80 | d6 f4 63 87 42 a4 40 d5 c9 d1 7b e6 b6 16 87 12 | 6b a3 97 13 be 62 fd d1 99 d3 9b d9 d0 66 91 ae | 70 9a 30 e7 e3 dd b0 da 82 fe e4 f0 44 cc b3 94 | 0b 57 c5 e6 97 4b 2c 01 fc cf bd 64 1e a3 1b 36 | a4 86 4a 71 7a 5d 83 15 27 9a 5b c7 b1 4b fa cd | 49 2c bf cb fb 1f 32 58 4d 30 7f 18 2a 34 d2 95 | e4 1f 33 09 6a df d3 45 5e 2c d0 94 30 dc 69 26 | e1 ac dd 8a 80 89 5d 10 3f 35 db e7 62 f2 ea e4 | 46 d5 0d ed 2d ad c4 c0 e6 d7 96 39 cc 2d f8 c8 | 62 6c cf 39 6f 6d 88 19 5a ed 59 0b b3 2a c0 06 | 29 00 00 24 92 6b ec 6b 64 1a 9e 4e ed 8a 02 4d | da d7 da b0 19 37 ca 67 a4 74 bd db b5 b1 e8 9c | 42 18 dc 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f 7e f5 e7 e8 50 e9 16 af a5 e6 5b | b1 d0 cb b5 42 f7 79 13 00 00 00 1c 00 00 40 05 | f3 f2 fc c6 17 9d d4 89 d0 fb 82 c7 ed b0 98 6a | 20 f1 09 0b | libevent_free: release ptr-libevent@0x7fb36803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad8480 | #468 spent 0.162 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 98 8a 9d 47 30 f3 de | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #468 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #468 | rejected packet: | 7d 98 8a 9d 47 30 f3 de 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #468: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.072 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a90400 | handling event EVENT_RETRANSMIT for parent state #469 | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #469 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #469 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49713.787915; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006798 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad8480 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #469 | libevent_malloc: new ptr-libevent@0x7fb36803b0b0 size 128 "road-eastnet-nonat-217" #469: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #469) | 29 4a 77 5f 7a c1 26 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 e1 17 9f 01 39 e1 e9 f8 e3 b4 37 56 6e 01 9e | d8 db 78 19 20 a1 ab 6d c3 e8 12 cd f6 c3 2c 5f | d5 86 61 6c a8 d4 5b 57 ac f5 b7 f0 24 de ac 90 | a1 9c 51 ce 2d 7a 33 35 b1 68 02 e0 5a 9f bf ac | 1b d8 19 f9 b4 68 45 14 e7 fd c5 a9 74 d6 09 6d | f9 4a 25 95 f8 f0 1c 13 dd 36 12 79 4b 27 2a bb | 86 17 86 e1 0e 04 a7 ab e3 0c 51 78 89 39 a0 df | c7 a9 56 0a e4 9a f1 58 c7 a1 12 21 f0 18 d0 d0 | 21 0e 73 e6 4f d3 13 37 a8 aa e3 89 21 ab a3 7c | d5 ac 7b aa ea d7 ff a4 b9 b2 c3 7f 9b 07 77 17 | 36 8f 4e a7 40 03 46 9c db 93 b3 16 3c e2 7f c0 | 58 42 83 4f fa 88 71 3b b7 86 e5 ca 62 88 5c 9f | 93 c4 59 82 fb 9e 5a 96 92 16 5f 68 0e 83 59 2f | 70 32 51 a7 ce dd b8 93 09 66 27 ff 7a e6 c4 cc | d2 87 46 9e b6 49 85 48 3f a7 ef 43 8a 5c ae e6 | 2c b0 88 25 66 2b 82 4c a9 2f 05 19 54 70 c3 9c | 29 00 00 24 36 8f c2 cf 02 b6 2e 75 ac 6c a4 55 | 9f 56 a2 b8 31 83 97 a5 56 a5 c5 7a ba 53 78 14 | 83 c8 c0 c3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 d6 3c 93 bb 1b 68 50 cd c9 2f b8 | 25 99 9e c0 3a 2f 1f 80 00 00 00 1c 00 00 40 05 | e5 a0 2e 8f cb 71 f8 0c 42 a7 95 8f 73 2e c5 90 | e5 8b 3a 32 | libevent_free: release ptr-libevent@0x7fb3580300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90400 | #469 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 29 4a 77 5f 7a c1 26 66 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #469 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #469 | rejected packet: | 29 4a 77 5f 7a c1 26 66 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #469: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0769 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a70b50 | handling event EVENT_RETRANSMIT for parent state #470 | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #470 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #470 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49713.936341; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005866 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90400 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #470 | libevent_malloc: new ptr-libevent@0x7fb3580300e0 size 128 "road-eastnet-nonat-218" #470: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #470) | ab ba b0 28 2b 1d 75 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 e4 df 77 9c ac 7c 40 d9 cc 91 f4 1e 15 f1 e4 | bc 57 e7 d5 04 82 1b 0a da 88 66 71 1d 5c c0 4e | e9 e1 44 ec a4 a7 01 cc ac 81 2a 8e 12 68 b2 c4 | cb fb 38 e3 4b 73 83 33 bf 14 39 b7 96 9c bd 59 | d9 ff 78 9c 9b 27 6f 77 fd c9 8a 91 00 a0 bf ad | 80 e8 18 ee 7d 76 d2 f5 dc 73 28 11 ea 98 07 d2 | 64 7f 44 96 f2 22 04 36 e1 c7 80 69 f0 17 fa 9a | d9 3b f0 c2 a7 d3 89 ef c3 be e7 3b 57 5c b5 bf | 47 3a cd 92 d8 c8 49 50 dd d0 b8 eb bf 2d 90 2f | 70 dc 26 c2 6c 6d 97 1e 52 f7 6d 64 24 1f 5f ad | 51 2f 7a 28 09 01 c2 c0 02 41 61 9f 09 3f 66 24 | 9a 1a a0 e1 ec c0 36 27 88 be e6 c0 7c 74 30 55 | 5b 47 83 d5 de 8f dd bb 1e 36 33 0e 3a 91 ce a0 | e2 86 42 d5 a7 ba 66 4a 76 5d 9a 0c 15 60 fc f8 | 07 4e ec f8 cb 3b a4 f7 40 7b 9c 98 98 27 e7 40 | f3 18 97 7c cd 29 25 1e 88 f4 c6 ab 7c 46 c3 a4 | 29 00 00 24 5d 90 f6 17 67 54 dd 2e 4f 57 ce 29 | 91 07 11 a6 ab 05 8f 42 d3 b0 74 bf 38 9e 49 fe | 79 c7 ca e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 04 17 c7 7e 54 6e 6a e8 f5 01 1c | 14 c4 b8 fd 53 6d 0c 45 00 00 00 1c 00 00 40 05 | ee 06 ba 38 dc 10 50 e4 3e a6 cd 5f 2c e3 74 3b | 2a 18 7d 82 | libevent_free: release ptr-libevent@0x7fb35001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b50 | #470 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab ba b0 28 2b 1d 75 a3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #470 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #470 | rejected packet: | ab ba b0 28 2b 1d 75 a3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #470: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0437 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb33801d710 | handling event EVENT_RETRANSMIT for parent state #471 | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #471 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #471 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49714.0537; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004908 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b50 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #471 | libevent_malloc: new ptr-libevent@0x7fb35001d920 size 128 "road-eastnet-nonat-219" #471: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #471) | 38 56 99 f6 a3 bb 25 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 88 5e 08 51 b9 62 c5 b6 68 5e 2f 6f 4f 31 ca 1e | 08 9e a2 c5 9c dd 5f fc 7a f4 89 f0 0b b5 e1 ae | ce aa 45 81 2c 95 5e ff 06 f3 6a c5 72 bf d7 48 | 2c ca 52 8b db 25 1b 5b 4e e1 9e 45 05 12 f0 3a | 8b 49 b1 e8 0f d0 bb 39 6c 00 4b 10 55 55 90 f1 | ba 94 0f e8 29 de 7e 8e 75 cf 84 46 0b 85 26 8f | fc de 6b 35 43 a0 ca 14 c9 c0 f7 23 df 3f 39 44 | 98 32 71 b3 fb 93 e6 df 1c 43 a2 c9 a0 c6 73 b4 | d7 9f 3f a9 0b f8 14 fb 29 eb 8f cf f7 a9 d2 3c | 3d 58 a0 39 7e fa 25 48 bc 4b 7f d7 1d e0 11 34 | f6 bf 55 8d 59 da 29 ac d8 c5 88 7a 76 ef 08 52 | 7c ac 5e 47 31 67 af 77 3e 74 07 65 f0 71 26 28 | 79 4d a8 21 1c fb 74 e9 6b f8 d5 df d3 80 71 f9 | 81 36 25 59 61 8d e4 66 0e 09 70 cd be 73 f3 c8 | c4 06 a2 0f 1e 6d 0f ec 2b 18 85 83 48 df f6 99 | 6d 3a 12 52 38 a5 9e 5e 41 a3 52 37 e7 64 a4 6a | 29 00 00 24 92 4d df ea 0a bb c1 4f 13 fb 92 4b | 10 dc b9 f4 e6 b4 8b 01 64 45 6e db 5a 13 b9 8e | 86 b6 57 0a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 76 c9 73 0c 16 7b 39 f7 77 ab 9f | f0 85 70 80 7e c2 64 d2 00 00 00 1c 00 00 40 05 | 35 b3 a5 34 11 ae 1a 69 08 cc 74 f0 71 15 8c b8 | eb 5a 8d 90 | libevent_free: release ptr-libevent@0x7fb33802ee40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33801d710 | #471 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 38 56 99 f6 a3 bb 25 a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #471 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #471 | rejected packet: | 38 56 99 f6 a3 bb 25 a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #471: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb38000feb0 | handling event EVENT_RETRANSMIT for parent state #472 | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #472 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #472 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49714.156176; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006011 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33801d710 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #472 | libevent_malloc: new ptr-libevent@0x7fb33802ee40 size 128 "road-eastnet-nonat-220" #472: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #472) | 15 62 43 a0 4c 6d db c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 ef 66 93 1f d2 be 3f b4 cb c3 5b c3 cd ce ec | ef 45 09 15 86 85 a5 fc 63 a8 dc f9 dc 2c 7f da | ad 3c 83 29 23 b1 9e ba fe be f5 05 08 e8 8e 73 | c4 15 c3 1f 80 d3 d0 b8 24 be b3 4f dc ef b0 39 | e8 6c 73 46 ce 8d ab 67 58 96 e6 89 9c 38 0e cb | 1f b3 47 af cd e8 fe 49 e5 c0 25 80 77 35 f6 06 | 6d dc 03 76 f8 34 b8 8e 05 e2 62 37 7a 40 b0 47 | 1d 8d 55 22 fa 66 04 34 43 30 87 8a 3b 8d 56 07 | f3 21 a4 25 01 21 d4 52 d3 44 c4 73 d4 a8 a2 ea | 69 66 8c 26 ab 85 7b a0 65 5b 03 5d 74 e7 7a 63 | 38 e1 5f b3 a4 83 48 11 76 d7 fb 96 bd 94 81 0e | 12 85 94 cb 17 1c 9e 64 a5 e2 b4 c7 96 eb cd 62 | bb 15 1b 96 a4 fb c3 a8 a0 ae 37 79 52 a4 ec 21 | 73 e0 47 a7 95 56 ce d5 cc 94 10 bf a2 8a 93 dc | 7f ea 6c d5 98 4b fa 19 3a ac 5e 1f 78 6e 08 fc | fa 46 b2 55 22 d7 78 a7 75 be f4 63 29 44 fa cb | 29 00 00 24 19 33 9e e6 d2 ec 99 b2 2a d6 00 cf | c3 4d d5 a5 cb 9d 67 f4 f2 94 3f b0 a2 94 a8 ff | 01 8e 5d 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 f6 a8 c3 12 9d 73 0e 92 1b 13 62 | b1 83 e3 04 e0 b3 2c 1d 00 00 00 1c 00 00 40 05 | c3 d5 bb 6d 6e 36 db ca 5f b7 b2 05 dd 15 c3 8f | 20 6a e3 5f | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000feb0 | #472 spent 0.12 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 62 43 a0 4c 6d db c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #472 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #472 | rejected packet: | 15 62 43 a0 4c 6d db c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #472: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380009ed0 | handling event EVENT_RETRANSMIT for parent state #473 | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #473 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #473 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49714.253544; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004696 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000feb0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #473 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 "road-eastnet-nonat-221" #473: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #473) | 78 01 12 66 35 d7 75 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 47 0f 4f 77 38 bb e7 c9 71 64 11 49 78 07 db | 61 1c cd 26 23 f1 f6 1d 25 30 16 ce 14 27 83 ce | 42 30 8f 08 74 8c 5a 73 8c d4 32 61 41 1b ee 9b | f9 31 2e 33 9d 12 db b8 cb 33 3f 38 d9 dd c3 f9 | 20 b6 40 e8 ca 08 02 ce df 71 6c f1 5d 52 08 e6 | 58 10 57 a2 32 8d ae 1d 5e 7d c4 ce e0 91 e8 67 | ef d4 89 2c c0 b5 6a 92 6e 51 6d 9b 9d 21 b2 11 | 63 ad d9 36 26 eb dc c5 60 5b ef 4a 3f 29 d2 75 | 9a 29 b2 ce 56 3f a4 11 28 44 4d 82 14 b3 ff 08 | f3 34 c5 89 41 5b 00 60 7c 63 69 55 27 25 23 fa | 32 38 62 77 fb 7a 33 df 62 71 61 b7 15 ec 0a 13 | 14 36 a9 93 fd 25 0e 0d b3 44 f4 62 07 ce 96 88 | f0 a4 9b c6 5b 9f 17 d2 94 b3 dd 9f 08 c2 33 c2 | 59 53 80 d3 e8 b8 bc 9f 9d b9 55 bf 1b b3 90 a8 | 46 84 0d b5 c1 2a b7 bd df e2 56 3f f0 a8 af c2 | b3 ab 6b 5f 0e ca 69 45 20 54 b6 94 83 c5 3d bb | 29 00 00 24 4a 32 17 be 17 e6 be 0c a5 f0 d0 1f | f3 82 ee d0 20 e4 2f 26 27 39 fc fe 8a c9 3a 42 | bb 40 ba 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d9 8a 84 70 d7 06 66 bf 35 02 d1 dc | b7 f5 da 2f 6f 36 dc 4c 00 00 00 1c 00 00 40 05 | 22 8e 50 95 0f 93 c8 cc 9c 03 8c bf 24 39 56 cd | 71 d7 b1 e2 | libevent_free: release ptr-libevent@0x7fb3800223c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380009ed0 | #473 spent 0.248 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 78 01 12 66 35 d7 75 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #473 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #473 | rejected packet: | 78 01 12 66 35 d7 75 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #473: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.101 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c040840 | handling event EVENT_RETRANSMIT for parent state #474 | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #474 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #474 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49714.360098; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007061 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380009ed0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #474 | libevent_malloc: new ptr-libevent@0x7fb3800223c0 size 128 "road-eastnet-nonat-222" #474: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #474) | 0f db c1 fb 9f 17 ff 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 05 1b 5f a0 e0 ea b4 6f d8 89 26 cf ee 32 1a 5c | 28 fd cc 88 df ac 76 71 06 f6 f9 47 1d 52 2b f1 | 5a b8 ae 1c d0 f8 c1 49 c7 7c ed 42 b3 cb ec d1 | cd 02 cf 31 b3 56 f6 e1 d0 7b 2f 03 00 08 68 a8 | 8c e2 7f 21 83 8d a7 f5 0e 07 fa ee 88 4b c9 7c | 96 80 b8 d5 42 4d 28 ea bb cc 27 3f c4 d8 6e 4d | d5 70 bc b9 0a 5f 21 c3 31 6b f1 91 46 6a 01 67 | 1a 7e a6 f1 0c 4d 62 51 b1 a2 3c 89 97 d5 4a 44 | a9 bc 59 2f a3 d1 5e 07 95 15 69 ac 72 1f 9c ba | 63 7f 02 e1 05 f8 26 4f fe cb 35 8d 42 06 b7 4a | a1 e1 b3 5c f5 2a 05 2b b1 4d 29 89 16 f1 e4 7b | dc e2 55 b9 29 ad b8 79 4e bb 9a 44 92 25 af e6 | 8f 1c 0d 27 3a fe 2f c8 95 15 ef 6f 1b 1e 7a 94 | a3 8c 31 92 cc 09 2b ca d2 98 1d 32 a4 3c 30 c1 | 96 ab 37 bb 0d bc c5 cd 1c ca 91 c5 fa 2a c9 92 | 70 fb 0c 4c 99 ec 29 a2 72 d8 22 a0 d3 24 0d 76 | 29 00 00 24 b8 e3 46 90 e1 5a 71 46 9e cc 2f c2 | 22 0c 77 5a b9 94 a5 51 d5 e9 c9 19 b8 4f d2 8d | f8 17 d9 c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 82 ca 85 05 ee 86 5d c3 66 e4 91 | 24 1c 89 d5 b4 33 f3 c7 00 00 00 1c 00 00 40 05 | d7 2a e5 02 23 f5 bb 26 e7 1d 38 9f 9f c2 ec a7 | 48 2b cd 07 | libevent_free: release ptr-libevent@0x7fb34c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c040840 | #474 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0f db c1 fb 9f 17 ff 9c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #474 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #474 | rejected packet: | 0f db c1 fb 9f 17 ff 9c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #474: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0649 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1c480 | handling event EVENT_RETRANSMIT for parent state #475 | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #475 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #475 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49714.462514; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004926 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c040840 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #475 | libevent_malloc: new ptr-libevent@0x7fb34c00cf80 size 128 "road-eastnet-nonat-223" #475: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #475) | f3 25 a8 40 a9 16 90 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 fc dc 84 62 e7 1f 29 92 4f 29 58 18 7b 3f c4 | 0b 92 35 41 3d 7d f5 49 ac e4 08 33 00 55 13 7e | 41 c8 1f ab 98 7a 30 c3 af c3 cf 6c 36 f8 c9 eb | 2e 6e a4 90 d5 52 a2 8a 0e 83 47 aa 06 91 44 23 | e7 ef 3d 2e 37 19 57 6f 45 ce 1d 86 c2 e7 46 ee | 18 2a 29 c4 ec 14 a5 7f 72 bc 78 02 59 a2 ca 1d | b2 b0 a4 5c 1b 84 48 bf bd 56 e0 d5 a2 ad cf a0 | ed 67 0d 74 38 b9 ba e0 64 fd 1a b6 82 cc d6 8a | 07 94 d5 49 9d 7f 16 e0 7c 51 29 17 d6 08 40 72 | fd c6 fa 75 b2 47 30 6b 15 b9 55 b9 02 dd d8 c4 | c6 0d e1 61 7d 87 80 e1 c1 30 9f 40 92 6e 85 e9 | ef ce 2d ce 71 79 64 d3 dd 63 ec db 24 83 38 23 | 73 f2 c1 e6 cf bd 52 ef 73 4d 97 4a 32 ac ae 30 | 6c 19 3c 8f 59 15 1c e0 c6 b3 5b a5 c9 da d5 d9 | 5d 32 c2 2c c5 8a 99 8b d0 ac 6f 05 fa 9a 82 9e | fa 91 c3 17 c1 28 24 70 4e 52 7c 04 70 68 57 b3 | 29 00 00 24 d6 06 09 cd b7 26 a0 ec bf 9a 6e 13 | e8 2b d8 44 aa f3 29 4e 9f 5a e2 23 56 33 79 1c | 13 aa 41 35 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 57 5a 5b 76 80 70 09 57 e9 61 f5 b2 | db 52 90 c9 67 ea 13 33 00 00 00 1c 00 00 40 05 | 6b c7 4e 4d 75 42 5c 91 03 17 f3 17 f4 9d bf bf | b8 92 f0 13 | libevent_free: release ptr-libevent@0x7fb35003b1c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c480 | #475 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 25 a8 40 a9 16 90 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #475 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #475 | rejected packet: | f3 25 a8 40 a9 16 90 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #475: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0563 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36000cc10 | handling event EVENT_RETRANSMIT for parent state #476 | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #476 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #476 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49714.626979; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004761 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c480 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #476 | libevent_malloc: new ptr-libevent@0x7fb35003b1c0 size 128 "road-eastnet-nonat-224" #476: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #476) | 49 8c 7a 08 2e cc 2c 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4a 8e 65 66 a1 7b b1 8a 9d 19 04 71 0a 79 27 ce | 6b 54 47 32 ba 6e a8 65 c3 0d 42 b2 0f 96 a2 a0 | 61 e2 94 05 83 68 df 22 7a 41 44 d2 4f e1 67 a1 | 60 b4 59 da 81 10 89 57 9a 5f 7b e1 cb f8 3b 1c | 6b e5 1e 2a 7e 02 80 cb 9a b1 16 8c f4 74 52 c7 | 1b 8b b0 44 c6 c4 32 f3 a4 5d f0 73 3e b1 fa a1 | b2 71 e4 e2 5a 6e 52 66 e3 b8 09 2b 71 a1 10 d1 | 10 3c 31 b6 a5 93 a0 0f f1 c2 e3 a3 6b 1d 4a 8c | d0 ba 9f ac 0a e4 67 88 a7 bb ab 52 59 75 2a f3 | 7e 3d 81 45 67 16 9e 61 0a ee 09 44 27 d0 34 eb | a1 e6 bf 3e 15 23 17 f4 a9 f6 b0 c4 cb fa e4 c1 | c5 79 db 37 a8 57 54 eb d1 68 1c ef 18 56 41 83 | e2 52 4d 7d eb e3 4a db 5d d0 82 39 0c 54 56 aa | 04 9a 1e d5 4b e1 50 f6 49 eb 07 2f b8 68 4b 6e | ca 4e 01 63 ab c2 da 21 fb e2 14 e9 0d 0e ff 26 | 78 8b ff 8b 3a 63 7f c4 a4 eb a1 d4 bb 4b 60 67 | 29 00 00 24 04 bd 81 be 7c f6 28 8b 7d 46 a5 cd | 03 dc d6 e4 08 bf 60 ad d1 ef ac 3f a3 21 88 37 | 52 bb 5d 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a6 ab 9f 05 ae 62 3b 7f e7 ce 4f 13 | 2e 4b 82 3c e1 44 b7 89 00 00 00 1c 00 00 40 05 | f1 c5 d9 81 d6 d6 94 d2 dd 0e e2 5d 61 59 c7 43 | 61 40 b6 b1 | libevent_free: release ptr-libevent@0x7fb34003b010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000cc10 | #476 spent 0.217 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 8c 7a 08 2e cc 2c 75 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #476 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #476 | rejected packet: | 49 8c 7a 08 2e cc 2c 75 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #476: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0988 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb36c00cfd0 | handling event EVENT_RETRANSMIT for parent state #477 | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #477 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #477 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49714.782545; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006129 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000cc10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #477 | libevent_malloc: new ptr-libevent@0x7fb34003b010 size 128 "road-eastnet-nonat-225" #477: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #477) | 3f 73 6c 52 e2 16 12 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a 68 39 c4 34 ea c1 cb 39 a9 f7 a9 af 21 c4 2f | 59 10 95 11 49 04 1e 26 c9 8f 50 f5 a4 65 8f b4 | 05 5b e9 56 60 ee a1 83 15 a3 b3 99 a1 69 bb 30 | cc 2b 98 3b 1e 30 46 76 ff 8d 39 41 4c 02 aa c6 | 7d 2f 3c 38 bb 54 54 f3 fb 6c ca 8e 5a 70 15 52 | 0e f8 6d 99 7c 6a 3b f5 58 74 0d 21 2e 4e 88 07 | 53 e0 50 d2 f7 38 33 9c 1e ad d9 ed 1d 96 b7 80 | 22 e0 8f bd a1 c0 a3 2c 94 20 d5 25 06 a2 7f 34 | 69 08 93 f9 8f 4f 23 ac b8 84 4e a5 b6 4c a2 fd | 75 2b 4c 8f 39 aa c3 bd 56 04 f8 29 c7 f1 40 cc | 9b 1a e4 8b 46 36 dc 67 52 7b 4f 7f 89 4e ad be | 6b 62 8d 22 67 f2 df e5 dd fb ec d6 50 89 50 9f | ee 43 32 27 75 9c 8a 33 f8 2e e0 8a 42 cb be 39 | aa d8 09 f8 75 cc 7e 70 d1 1d e9 02 66 48 e7 a9 | 85 21 80 86 49 7c d0 81 50 d6 7a 61 62 60 a5 9e | 15 19 da e7 5d f6 40 da d1 f3 3f 04 ae f2 b4 4a | 29 00 00 24 ff dc d7 b1 fd dc f2 f7 49 64 0a 31 | e9 e7 85 40 8d 4a be e6 65 0c 38 4a f9 ed 0f 7d | 4d 19 c2 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 0f c5 61 64 4d d6 f7 e8 8d a8 de | cf 04 b2 c9 0c b8 8a b5 00 00 00 1c 00 00 40 05 | 72 d7 c9 34 b9 dc 3d 33 a4 7e ff 3a 57 4e 49 6e | fe 3e 47 b9 | libevent_free: release ptr-libevent@0x7fb36c0296b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00cfd0 | #477 spent 0.168 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3f 73 6c 52 e2 16 12 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #477 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #477 | rejected packet: | 3f 73 6c 52 e2 16 12 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #477: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0673 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b1c440 | handling event EVENT_RETRANSMIT for parent state #478 | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #478 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #478 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49714.894967; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005277 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00cfd0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #478 | libevent_malloc: new ptr-libevent@0x7fb36c0296b0 size 128 "road-eastnet-nonat-226" #478: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #478) | b4 9c 7f a0 55 ec 5f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c4 86 bb f8 93 0c cc df 70 83 3b a1 9a e0 b8 e3 | ef 6e a7 55 12 1e 4a a1 3c fd 3e f8 52 71 57 ec | d1 b9 27 97 72 c7 60 a2 ce b1 45 33 01 2b 7a c1 | 6c 56 fd d5 59 18 5e d3 c3 75 ef 36 1c 65 ec f7 | 03 c0 d4 70 7b b6 e1 35 71 9d 76 5b 7d 21 d4 3b | 12 1e 6c 03 cf 08 78 60 b5 ba 22 6e 40 93 8e c7 | 49 b5 59 bf 7f 87 44 20 2c 36 31 fc 69 d8 21 31 | 6c 62 2a ef c7 55 7b 01 a6 27 b6 8c 28 9f 7c ac | d4 27 6c f1 7c 85 40 4e 23 a1 d4 02 e3 38 52 92 | 5f 62 3c 6f 58 9e 47 5e 72 b1 b1 7d 8d 92 b6 d3 | be e0 0a 4d 01 e0 16 9f 01 75 9d 1c 68 e3 f5 d9 | 8e 19 b8 2b 12 45 ac 03 e0 b6 4d 98 39 5a 75 d7 | 7c b1 b9 f8 a3 a2 b1 d2 49 e7 b2 11 f2 c6 a7 7f | 57 72 f8 df 1f 7a 3c df 19 c0 28 fb f6 f4 59 df | f9 cb e8 e4 b5 73 46 61 ef 64 d4 38 66 2b 1c f7 | d4 31 c9 51 2e 93 97 3b f3 a7 d3 d3 06 a7 f6 99 | 29 00 00 24 19 2b 71 2c 92 77 f3 24 92 84 03 b5 | 44 5b d7 aa 5e 03 e6 f3 27 6d 26 be 26 c2 0f f8 | de ad c4 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ad b7 1a 04 ad be 09 f8 62 42 a2 e6 | 69 0f ca 24 af 9b 5c 02 00 00 00 1c 00 00 40 05 | 37 89 76 5f 87 60 25 2e 24 4c ae 3c 7a 86 5f 05 | 9f e3 e5 ad | libevent_free: release ptr-libevent@0x7fb34403a3d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c440 | #478 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b4 9c 7f a0 55 ec 5f 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #478 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #478 | rejected packet: | b4 9c 7f a0 55 ec 5f 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #478: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0624 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a45350 | handling event EVENT_RETRANSMIT for parent state #479 | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #479 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #479 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49714.995379; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005442 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c440 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #479 | libevent_malloc: new ptr-libevent@0x7fb34403a3d0 size 128 "road-eastnet-nonat-227" #479: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #479) | cf d2 c5 54 f4 1c f6 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 7f 14 60 4b 10 9d d5 d2 57 b0 91 8f 3f bc 64 | f3 21 66 f1 3b 94 f5 72 55 1b ed c6 dd 53 3b 05 | c0 1d dd be ad b9 bd d8 0b 5f 4b e3 1c 65 1f 4d | f0 ee 1b 33 c4 3a 9d de 12 12 f6 89 59 76 db 59 | 58 77 c4 51 cb 4f 4e a0 dc fb d2 f7 62 b4 a7 a3 | 1b 68 cb bb e9 09 d6 f0 e4 6b 8d 72 c7 c4 14 34 | 39 ae 8e 61 09 3a 83 2f f5 f4 c7 5f d2 2d b0 d4 | 26 d7 e0 79 26 1d 45 4b 13 c4 86 65 f4 ae 01 81 | 02 a6 0e b2 43 b5 c9 34 60 91 47 c7 ad 72 96 75 | c1 19 c1 36 df fe 89 e5 4a ed b6 37 c9 47 46 4a | ec 4d e3 1d 06 24 05 ec 83 47 39 85 ec 30 13 7d | 3c 3d d1 56 09 9f a0 06 ca 9a 1a b3 23 55 50 9a | b8 7d cc bd 04 23 e1 7e 80 5a 10 c7 17 c0 8f 7a | 89 c6 a1 6e 48 75 0a bf 79 1f 97 1f 66 26 95 b2 | 3f 11 75 2c 3f 93 e4 16 06 22 12 43 49 c5 4b bb | 85 1e 39 53 e2 84 3e 8e cf ad ff a8 7d 04 99 42 | 29 00 00 24 ce ca 8a 00 13 b6 bd c6 7f bf 18 48 | 13 5d 00 cd e5 1d be f3 d6 a7 2f 7b 66 35 3d e6 | f4 91 6b 6a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 e1 6d ff 62 21 60 0d e9 4e cd 21 | 6e a6 95 f9 84 a3 ab 9c 00 00 00 1c 00 00 40 05 | c0 97 f9 bf 8a bc 59 d7 d0 0f 34 34 05 ac 6e 13 | dc 84 e0 81 | libevent_free: release ptr-libevent@0x7fb374034da0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45350 | #479 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cf d2 c5 54 f4 1c f6 86 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #479 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #479 | rejected packet: | cf d2 c5 54 f4 1c f6 86 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #479: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0434 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368025320 | handling event EVENT_RETRANSMIT for parent state #480 | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #480 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #480 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49715.092721; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007197 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45350 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #480 | libevent_malloc: new ptr-libevent@0x7fb374034da0 size 128 "road-eastnet-nonat-228" #480: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #480) | a0 d0 03 15 77 7b 55 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 49 81 bc 92 43 cc 20 cb 32 dc a3 83 a6 05 ad 00 | 98 6a 1a f3 68 9d 6f 0d 87 ec e9 f6 9a 02 0f 25 | 1f da 1c 78 f1 67 23 e0 e2 7f 61 43 d9 1f 5f b6 | e6 b8 f2 3c ff c1 08 c4 9f 6c 2a bc 8e ba 45 54 | 84 19 36 a3 17 42 a8 a4 75 a3 82 0a 1c 91 e1 7c | b0 f8 bf b5 fa 9f 83 82 f9 d4 70 3e e1 df 4f 6b | 6b 5d aa 23 00 ad 45 7c d2 ab 83 9c d3 c8 48 f4 | a4 1e f5 9c 86 61 b3 f2 25 c7 70 01 ac 67 7a b7 | f7 4a 5c 1c 8e 8e 59 fc 33 71 85 33 b4 10 65 ea | b8 c2 b9 0f e6 63 11 67 85 ad 57 f7 4e c8 76 85 | f8 97 7d db 2b b8 ed 1b 8b 66 54 1e 04 fc 55 3a | c8 bb b6 a6 8a 5c 4e fe c9 53 36 0e 42 74 0e b7 | bd d3 59 78 0c df 94 62 fd c2 21 a4 0c fb 4f 6c | 1c 91 d6 a4 ec 87 92 d0 8f 1e 01 93 bd 89 c0 fe | 71 01 53 5c 6f 46 39 61 8b 59 d6 4d 65 9b d8 a3 | 15 32 57 28 19 30 26 21 35 36 08 9b 79 f2 1a b0 | 29 00 00 24 c8 ff 1d 8a 8a c7 55 8b 0d 6e 9c 13 | 67 dd f9 00 d4 15 c8 78 b6 24 b1 bf aa 08 b9 85 | 7a e8 a9 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cb af 61 69 a2 a5 79 11 dc 03 2e 27 | 8e 1f c8 4a f0 b2 47 27 00 00 00 1c 00 00 40 05 | 5a ba 74 8a e7 0f 7a 9b 13 6d 0a ce d0 eb db 09 | a2 8a df 80 | libevent_free: release ptr-libevent@0x7fb36802ee40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368025320 | #480 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 d0 03 15 77 7b 55 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #480 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #480 | rejected packet: | a0 d0 03 15 77 7b 55 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #480: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a94500 | handling event EVENT_RETRANSMIT for parent state #481 | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #481 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #481 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49715.209063; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006186 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368025320 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #481 | libevent_malloc: new ptr-libevent@0x7fb36802ee40 size 128 "road-eastnet-nonat-229" #481: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #481) | e8 f0 49 b6 6a 16 76 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5b 5b 3d e6 1f 63 af 92 47 ff bb 34 96 d0 88 24 | 67 3c e1 47 18 9d 62 8e d3 a4 9d b7 75 51 2f 4d | c5 c0 85 26 a0 ef 6b 42 e3 31 89 58 06 3e 3f 70 | 40 68 5f 34 02 73 08 9e 17 dc ee 6e ae 64 70 e1 | 29 5c 9e 3f 09 58 a9 16 14 23 bb 74 7b 7f 22 34 | a9 d6 3f fe 74 0f 40 5a 32 4d ac 87 fc 80 7b d4 | 2d 54 ec f5 ce b0 c6 dd a4 dd 82 14 e2 9a 36 7e | 86 de 04 4a c2 4a 3a 27 d9 82 5e 6e f1 1d d8 3d | 86 d1 82 99 be f9 63 b2 56 5a 40 42 2e 8f 30 eb | fd db ce cc 5a ac 0e 49 65 64 01 18 b4 1e 60 8d | 74 bc e9 b7 46 2e cb e0 1e 2c 67 dc 3f e9 f4 39 | 35 52 90 76 39 0a f3 d2 ac 0b 00 19 f2 ca 97 20 | b7 c6 bb 7d a2 97 ba e5 14 74 e5 ea 2f 4e 4b 3f | 08 53 d9 be 3b dd af 2f 8f 10 fd 09 08 1e b3 13 | 6a 37 e4 ce 19 dd d9 84 13 76 b0 6f 6f 43 48 f7 | 01 a4 a9 0f 9d fb 63 aa 49 8a 2a b5 59 32 b2 69 | 29 00 00 24 ba a6 3b 25 9f a9 3f 06 4e ea 48 38 | eb e2 25 25 ca e3 dd 6c 01 6e 12 39 f8 cf ff e2 | 6d 18 2b 14 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a ef 98 84 e9 40 8f 9c 0a de 34 0d | 25 31 92 b5 ca c8 92 af 00 00 00 1c 00 00 40 05 | 81 a9 90 20 77 ac 91 2d 88 99 0f 36 2d 43 7d f6 | 2e 36 29 48 | libevent_free: release ptr-libevent@0x7fb3380300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94500 | #481 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e8 f0 49 b6 6a 16 76 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #481 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #481 | rejected packet: | e8 f0 49 b6 6a 16 76 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #481: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0462 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46b0bf00 | handling event EVENT_RETRANSMIT for parent state #482 | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #482 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #482 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49715.283389; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005735 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94500 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #482 | libevent_malloc: new ptr-libevent@0x7fb3380300e0 size 128 "road-eastnet-nonat-230" #482: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #482) | 36 c3 54 33 ec a7 b6 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 ed 30 30 be a6 b8 35 5d 7c a5 62 ac c6 13 d8 | 83 27 d5 31 a0 fa 4c 2e 40 b9 54 43 42 15 18 78 | b3 8c 6a 6c 7d 96 c5 85 70 a8 48 20 22 38 c8 e7 | c3 12 d1 63 fb e3 68 d6 08 24 69 60 e5 ac a9 33 | 22 f2 2c f6 14 52 ad 1c 12 97 d4 3c 99 28 7f 69 | aa d1 18 f8 bc 06 35 f3 dd 4f b8 bc 32 67 80 0d | b2 c8 d0 32 11 b6 f1 1a bf 32 1c f4 b1 c8 5d 4d | f1 41 f7 45 a7 42 78 6b 31 8f b7 1a 22 f3 fa a7 | 3f 96 61 3f ad 03 4e 95 70 ec 28 2e 07 88 02 e8 | 35 f1 c5 b3 16 2f 4d b9 e0 29 95 c1 2d e3 e0 37 | 5d 57 61 4b 22 78 ec 0c cc 9d f4 89 9a 2d 4f 1d | b7 c1 f5 ad 55 54 75 4b 2d 2f 97 b2 b3 0a f4 e5 | ca f8 64 9c 52 40 a8 a2 99 0e 3d 9b 5a 9e 1e 2b | 75 b0 89 ef b0 bf 99 f4 37 0e 0c 27 d3 f1 9a c6 | fd 46 0a d5 dc 88 12 58 b5 c1 7a 5a 1b 30 d2 78 | 2b ef 75 09 ea 77 2f b0 ad cc d1 d9 98 94 ca 15 | 29 00 00 24 ba df cf 8a 38 2e 1f 41 21 49 fc b2 | 01 80 ce b1 18 f8 70 f3 ba e7 48 83 d1 e9 62 d6 | 6c d1 b9 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 54 bb 11 83 48 2f 3f fa 5f 96 d0 ad | a2 72 2a 82 ce ec ef d2 00 00 00 1c 00 00 40 05 | c3 77 e0 b4 3a 22 ca d3 bf 9b f4 e6 b2 71 76 56 | 18 71 d4 99 | libevent_free: release ptr-libevent@0x7fb3680300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf00 | #482 spent 0.203 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 c3 54 33 ec a7 b6 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #482 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #482 | rejected packet: | 36 c3 54 33 ec a7 b6 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #482: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0966 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3780297c0 | handling event EVENT_RETRANSMIT for parent state #483 | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #483 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #483 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49715.392543; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006536 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf00 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #483 | libevent_malloc: new ptr-libevent@0x7fb3680300e0 size 128 "road-eastnet-nonat-231" #483: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #483) | 34 4c 65 0f e6 b6 ad e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f0 14 b4 cd 04 ae 73 27 55 14 94 b2 a9 a9 46 92 | bf 38 7f 34 e4 30 01 9b cc 3d 69 9b 72 22 2d c6 | c0 5a ca f2 aa f8 34 31 df 85 74 a8 8a c4 71 d3 | 18 15 b7 43 a0 c7 52 88 83 cb 13 e3 0b 22 9f 8d | 9b 32 7a fd 24 4c 85 ea ba 28 19 ff da 93 b1 bb | d8 33 5c 65 db be 0a e0 bd 29 79 f5 94 d3 6b 1b | d0 fe 62 1a aa 43 59 54 5f 94 f2 d4 df c7 8c 2c | 9f 79 f7 92 9d e8 8c 7a 9a 6a da 8f dd 5b f5 4b | 78 88 55 3a 27 f6 46 11 a6 78 da 31 e5 57 e3 ff | c3 41 c4 d8 db 92 c7 9b 0b f2 9c 05 a4 6f e4 60 | d6 be 30 93 95 25 fb 5e 0e 06 32 43 09 91 4d 90 | 0e 89 44 7a 24 99 b2 ff 62 86 54 98 47 bc f9 cf | ff 60 15 2b c0 14 62 be bc 88 1f 37 10 d8 42 2b | 8e 68 b2 b4 90 d0 f5 fe bf 7c ce c7 6a 70 46 09 | 84 97 db 42 58 43 9f f3 46 27 26 32 2b 0c cd 41 | 80 81 33 b8 5d 30 60 f3 70 32 7b 81 3a 1a 11 48 | 29 00 00 24 a6 6b eb 02 98 7d a6 5e 59 5e bd f1 | ef cf 36 f2 a9 4b e0 19 61 9c ac e2 ac 17 24 09 | 0d 96 04 a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d1 38 08 89 da 41 ff 7d 1c 3d 17 6c | 3a eb 05 70 fa bf ed 59 00 00 00 1c 00 00 40 05 | d4 38 01 a3 1e e4 dd 2e 8e 63 54 12 3f 4d 01 1d | 49 6b 48 46 | libevent_free: release ptr-libevent@0x7fb38403da90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3780297c0 | #483 spent 0.167 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 34 4c 65 0f e6 b6 ad e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #483 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #483 | rejected packet: | 34 4c 65 0f e6 b6 ad e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #483: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0756 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #484 | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #484 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #484 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49715.477961; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007106 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3780297c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #484 | libevent_malloc: new ptr-libevent@0x7fb38403da90 size 128 "road-eastnet-nonat-232" #484: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #484) | 74 f2 d9 62 15 c8 1b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 3b 62 f3 ed f9 47 0c bf 01 45 93 af e9 01 13 | b4 4a bb 89 23 94 52 5c ed 86 36 6e eb 69 47 16 | 4f 4d 66 99 6d c7 d9 da 05 03 61 83 27 be 84 fb | f7 56 2a 10 f6 9b f2 84 b7 d0 85 06 cd 12 0f 3f | a6 61 71 e1 4c 4c be b5 23 cc e4 61 ef 62 aa 02 | 7f 71 fa f2 27 5a a1 66 46 df 65 7e 72 33 12 a7 | d6 b1 80 2f 61 a3 b3 4c c2 28 e7 cf a7 3c 3b 6f | 3a a0 e5 2d 1e 20 bd 32 76 a2 9f 45 f7 a6 6e e6 | 37 c0 ae 2c 38 01 39 bd 5f e0 3d 65 31 0e f3 37 | 25 fd f7 75 ed 4c 70 31 98 89 dd 26 6b f0 c6 86 | 26 2c de ac 79 65 19 00 78 ef 2a 8b 1d ed 38 d3 | 5d 90 eb e1 29 71 f3 ff 0c 50 ed 12 97 fe f3 76 | 44 b9 27 26 27 3a b5 56 98 ce 1d d1 07 e6 e9 5e | c0 92 67 d1 b6 25 97 6b 40 80 cf 9a 68 03 d5 29 | 53 a9 fd 87 28 85 18 42 c6 5b 08 65 a1 d2 2b 6d | e9 34 66 d8 9b 2a 73 2a 5b b8 59 63 5e 1f 84 b9 | 29 00 00 24 71 8e 31 23 c4 63 d2 6d d6 0a c0 cb | 7f b2 37 27 b0 85 2e 73 82 c7 9f d6 c1 fd d8 67 | ff 33 43 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 6d 47 d8 30 7b 36 73 b1 0d df 8b | 82 69 87 3e 91 43 68 d6 00 00 00 1c 00 00 40 05 | 23 15 eb e5 a3 5e 20 cf 73 fe 01 cb 79 d0 a6 f2 | 55 38 68 fe | libevent_free: release ptr-libevent@0x7fb38003dab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #484 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 f2 d9 62 15 c8 1b 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #484 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #484 | rejected packet: | 74 f2 d9 62 15 c8 1b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #484: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0484 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35401d710 | handling event EVENT_RETRANSMIT for parent state #485 | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #485 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #485 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49715.594315; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006554 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #485 | libevent_malloc: new ptr-libevent@0x7fb38003dab0 size 128 "road-eastnet-nonat-233" #485: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #485) | 26 20 85 62 4e 58 16 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 04 a6 43 51 7a 0a e3 68 c7 b6 92 c0 2e 14 67 | a2 f2 cb 51 e5 ce 35 16 88 d3 54 6d 62 23 37 bb | 56 61 2f d6 85 87 83 0f 70 f6 72 39 7f a7 0c c7 | 1e 70 d8 7f 4c 38 fa 53 49 29 41 95 c4 be f2 60 | 8b f1 ad 4f de df 26 c9 05 54 42 92 f1 01 24 5d | 5f 31 21 56 71 00 1c 4f 7f 83 41 cc a7 f5 8b 27 | 25 fc 78 92 10 e8 44 60 1c 59 0a 5b 0b c5 c2 c7 | 8a b4 bc 89 2b d6 59 5c 8c 78 a1 23 dc b0 6c 50 | 12 f1 b3 89 73 06 41 12 b7 a8 52 30 67 21 d0 5c | a9 0e cd 21 2b 24 e0 cb a7 f2 11 99 34 b7 dd 82 | a8 b2 9f 4a 0e 72 6d 9e a6 39 41 fd 0a 77 de bc | 1d a1 ee ad 3a 47 74 75 05 d6 38 42 86 69 10 70 | a8 ff d8 3e 12 b1 c4 88 03 52 77 9f cb 91 9d 87 | ca f5 79 a8 95 63 5f 4e a8 1e 43 7f 48 49 97 d5 | 03 8a 20 ac 28 9d 5a 1c 08 20 6e 33 63 3c ac 79 | a6 2e 32 53 fd 1d bb 3c 94 09 f3 ea 45 51 42 83 | 29 00 00 24 3d d6 d9 80 a2 0e 12 b1 24 d9 6e f6 | 52 8a 26 6d ef 88 17 44 c3 1d 79 ed f7 7c 90 92 | c7 d9 57 d0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dc 14 52 a7 e7 6d fa 0b e3 0e 97 be | 5d 15 66 8b 43 e6 a9 e4 00 00 00 1c 00 00 40 05 | 6d 80 f6 1e bc 0d ea 94 d1 d1 d0 f0 fd 2d 1e 46 | 86 63 b8 47 | libevent_free: release ptr-libevent@0x7fb35402ede0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35401d710 | #485 spent 0.155 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 20 85 62 4e 58 16 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #485 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #485 | rejected packet: | 26 20 85 62 4e 58 16 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #485: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.07 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370017ea0 | handling event EVENT_RETRANSMIT for parent state #486 | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #486 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #486 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49715.736769; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006109 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35401d710 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #486 | libevent_malloc: new ptr-libevent@0x7fb35402ede0 size 128 "road-eastnet-nonat-234" #486: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #486) | 87 db e2 36 7c f0 df 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 90 89 1b 08 ac ff df cf 1e a7 4d 7b bd 33 5b | 51 13 dd 15 4f 57 c0 96 90 46 35 66 7c 24 f4 e0 | 0c 27 ca 38 87 f2 ca ce 3e d5 b4 13 12 b8 2b 1b | 28 cd b5 9c 97 fa 99 ff ca 60 2f 08 57 c7 43 0b | 9a 34 8d 0f cc d3 42 7d 8a 9b 18 49 af 87 e5 0e | 60 54 d2 dd 0f 77 79 0a d2 62 1d 4b f7 af 36 a6 | 89 10 0e 96 5f f8 fd fd c0 0b 1a 57 52 e4 05 54 | 7c e7 03 a6 04 47 19 3c 81 63 a0 84 35 98 42 90 | 1a 22 7e c6 ee 29 1f d0 fe 05 cc 68 66 1b 8e f3 | 6e 04 59 7b 5f 87 c4 be fb a5 8a bf 90 3d eb 9a | 35 8c 2c 40 b3 8e 63 fe 5a 3c 42 89 30 d7 70 57 | 1f 4d 37 52 6b 1c 17 6b 78 dd b4 c8 f7 a3 15 58 | d1 aa 66 b9 5e c1 c5 d0 ba 3b 05 d7 77 a7 0a 2d | c3 f0 02 14 1d 1a a8 4d cb aa 4c 7b 62 3a 6a ee | 7e 4e 1c cb d8 20 d4 75 37 c5 87 d5 04 ca 68 48 | 13 39 48 6c 64 d9 b7 94 e9 df 23 f3 33 69 d8 cb | 29 00 00 24 46 3f 4a dc 6e 3d 21 da c5 52 80 db | 79 4b 94 5f 60 de b7 f2 05 82 ab f1 57 25 79 09 | be 52 68 b0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9e eb dd 20 f6 4f aa b4 b9 d1 56 e6 | 84 4d e7 2c 87 e1 c1 3c 00 00 00 1c 00 00 40 05 | df ec c7 42 be d0 10 8f c9 07 5b a9 94 d2 5a 2d | 6d 05 27 19 | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370017ea0 | #486 spent 0.165 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 db e2 36 7c f0 df 0c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #486 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #486 | rejected packet: | 87 db e2 36 7c f0 df 0c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #486: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0671 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3840223f0 | handling event EVENT_RETRANSMIT for parent state #487 | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #487 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #487 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49715.908096; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005717 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370017ea0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #487 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 "road-eastnet-nonat-235" #487: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #487) | b2 6f 13 91 c3 04 27 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e b7 3e 1e ea 4f ea 6c e1 7a 2e d9 d3 3e f9 00 | 00 b2 10 a9 bd 14 73 d0 5c 75 d0 f7 e2 0a 9c 29 | d2 44 ca 2c 07 7b 68 53 85 c3 d3 3e bc e8 07 6e | cf f2 af a9 1e bb 29 51 6a f7 01 6c 37 1e c0 ab | 85 0c c2 bf ee 4c 81 52 aa 15 a7 f4 22 68 ab 13 | 48 79 2b 77 d6 1b 5b ea 43 58 e3 de cb b3 22 8f | 5c c4 4c 56 f3 fa d5 2b 81 01 8d d3 c1 a0 72 c2 | 36 97 f9 30 4e b1 e3 4c c3 9f 76 1a 47 e2 4c 66 | 36 1c 6d 84 88 a7 c0 e7 e9 9d 4f 1d e0 c1 e1 ff | 39 d2 b1 a1 49 e4 09 1c dc a0 a7 cd 71 c8 f9 bc | 3a bc 26 2f 4d d5 40 96 f5 89 a1 c7 d3 3a 43 fd | 96 7a 1b 6f d9 4d de b2 44 44 32 65 9e 2d 89 e0 | 92 3a f7 8d c2 fa 4d 91 90 40 ba 6a ed 04 a1 1b | cd 46 17 18 d0 bf 88 e4 f7 cd 2c 44 55 8e 08 a0 | 65 d8 55 af e5 2c 13 03 b6 20 5e 95 aa 08 a5 20 | cd 27 5d 2b dd 8b b7 c9 7d 2d d5 bb 14 9f 9e 7c | 29 00 00 24 f2 e1 64 3c 35 1a 4c dd 7a 16 43 23 | ae 79 36 f1 02 a6 51 17 6d d2 ae 67 32 63 24 20 | 73 fc 22 78 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 4a 35 08 41 af be cf 3c 4d e0 85 | 28 9e fb 5b 11 1f 06 99 00 00 00 1c 00 00 40 05 | 95 f5 24 fe 51 05 47 87 18 ae 0d 13 a0 36 38 27 | 84 c2 41 68 | libevent_free: release ptr-libevent@0x7fb384041c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840223f0 | #487 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 6f 13 91 c3 04 27 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #487 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #487 | rejected packet: | b2 6f 13 91 c3 04 27 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 eb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-235" #487: ERROR: asynchronous network error report on eth0 (192.1.3.235:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0438 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46adc640 | handling event EVENT_RETRANSMIT for parent state #488 | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #488 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #488 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49716.04246; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006763 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840223f0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #488 | libevent_malloc: new ptr-libevent@0x7fb384041c10 size 128 "road-eastnet-nonat-236" #488: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #488) | 37 96 ab d6 53 2a 39 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 6b 02 0e 68 a2 59 8e ba 48 ba 2f 59 6f a7 3c | 62 72 7d 7b ba 57 b5 e0 3c d9 c3 81 1f a5 eb a0 | f8 e0 f8 99 8d 15 bc f0 8d dc 6f 5a dd 58 1a 52 | b1 f2 33 db c0 8e 7c 70 83 0a 45 59 7c 30 22 a6 | 4a 21 8b 6d f6 eb 16 6a d6 89 72 dc 49 39 de 06 | cc 4d b2 f5 ec 39 f7 23 79 4b 87 b1 ad 07 ab b7 | eb 0d d8 4d 26 fb 93 ca cd 4a bf a4 0c 85 96 15 | f6 27 7e a1 82 03 aa 6b de 0f cd 15 f2 d7 a2 0e | 43 09 8a 10 1e 3f 10 cc a0 c3 3f de 84 91 b8 33 | fb 7f 27 17 12 4f 19 a8 95 31 dd 5a ae 2b f7 bf | a0 0e b0 af 11 39 af c9 5f a1 36 16 28 49 42 30 | 1e a5 ef c4 10 5d 29 3a 47 d6 e6 ec dc fa 0d fd | c5 f6 87 7a d9 cf 3f cd c0 47 6b 05 d4 2f 0b e9 | 27 07 f2 3c 1c ec 19 6e 68 a4 e6 aa 11 7d e2 91 | 40 12 52 80 36 b2 87 db 98 ff 4a 69 c8 e6 41 e0 | 2d e0 85 d9 a0 b6 39 d4 ec ac d1 39 5f ba 20 a9 | 29 00 00 24 dc e4 9b d4 65 6a e5 2d e1 02 7e 1d | 58 fd 85 52 51 90 f6 a3 d4 da ed 1b d4 69 62 73 | cc 62 0f e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf c6 06 73 dc 37 37 47 57 31 78 5c | d0 36 ae c0 4d 18 ea 5b 00 00 00 1c 00 00 40 05 | b3 8c 92 9f c3 4a f6 44 a7 cb 92 6c 4a 1a 77 59 | 02 36 0d d7 | libevent_free: release ptr-libevent@0x7fb3580407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adc640 | #488 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 37 96 ab d6 53 2a 39 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #488 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #488 | rejected packet: | 37 96 ab d6 53 2a 39 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #488: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35c02aab0 | handling event EVENT_RETRANSMIT for parent state #489 | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #489 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #489 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49716.159877; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005352 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adc640 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #489 | libevent_malloc: new ptr-libevent@0x7fb3580407f0 size 128 "road-eastnet-nonat-237" #489: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #489) | 74 5a 3a 8b 71 1a cc fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 40 61 fd 1b 72 e8 67 07 d1 75 c8 79 f6 15 bf | 67 b1 a9 f3 47 1b 5a 9e 7a 16 95 64 09 96 72 95 | 1f e3 f8 5f 52 87 20 fb 61 9b db 76 dc 1e b3 ce | 79 87 62 5c 6c ce 2b 50 8b 94 05 b2 fd 25 84 04 | b4 15 bc 02 70 ed e7 01 0e 47 78 fa 99 0f 24 d8 | 6d 25 42 58 57 e1 37 d4 81 eb 71 fc 2c 93 fa a4 | c7 e3 ed 35 8a 44 47 43 96 45 a6 cd a3 83 61 0f | 10 8b 91 8a 9e 26 b5 05 80 74 cc cf bd 96 a9 68 | ec 71 d7 24 8f 0e c4 37 01 d3 fc 0e 4b 59 1a e8 | 44 25 f9 54 85 60 35 f6 be ce 52 66 75 73 a9 9b | 5c c3 e1 cf 01 12 70 63 56 6d a7 e8 18 d9 6b 45 | de 75 11 c2 b6 ad 37 d5 3d 52 a7 75 84 78 8c 7f | 86 51 7e 50 9f 10 72 bd c2 69 ef b3 ad 19 2b a0 | 12 77 de 7a 6b 6d 21 bf fd 3d 7b 00 2f 59 e3 b9 | d0 af c2 b1 28 3c da ec de 08 be a1 d1 4e 94 57 | 47 99 d9 10 35 e0 60 cf 3d 10 4e cb 1b b3 b4 f7 | 29 00 00 24 40 6d 68 58 c0 2a c7 cb 28 ac 6f c2 | e6 6e 2c b5 98 00 fd fe 6e 20 dd ca 12 44 3b 53 | ff 69 1e f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 46 ab 03 11 7d bc a6 76 5d 5e 81 | f5 21 84 26 13 ce 73 a7 00 00 00 1c 00 00 40 05 | f1 f1 80 9f 1b 76 8c da 90 0c 48 79 e2 c4 ce d3 | 45 3b 5d 95 | libevent_free: release ptr-libevent@0x7fb35c03a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c02aab0 | #489 spent 0.166 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 74 5a 3a 8b 71 1a cc fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #489 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #489 | rejected packet: | 74 5a 3a 8b 71 1a cc fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #489: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0677 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350017ea0 | handling event EVENT_RETRANSMIT for parent state #490 | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #490 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #490 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49716.239283; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005849 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c02aab0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #490 | libevent_malloc: new ptr-libevent@0x7fb35c03a770 size 128 "road-eastnet-nonat-238" #490: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #490) | bb 0e 3a 9b 64 67 83 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 47 7f 34 75 b5 49 50 79 df a4 4b 2a 1a ce 17 | 54 1a db ef 07 cc bd 63 ec 5f fd 57 bc 8e fa 30 | c9 95 d1 71 e6 7c fd 77 3c fd c2 3d 71 c3 96 28 | a3 d1 35 26 0a 70 d5 c3 3a fb 74 58 46 86 23 a0 | 05 3c 91 b9 ac 6a ea c1 25 7b 4a 3f a3 25 55 72 | 1a fa 68 62 a6 28 8d 23 b1 87 6f cc f5 37 d0 47 | fc 41 f4 96 78 ec ba 03 b7 d0 87 4f ed d1 99 e0 | 0d e4 2b f5 2e 28 88 3d fd a9 fe 89 6e 87 86 2a | bc 0f d8 0e c6 4a 2c e3 b3 3a a6 4b 56 b2 d1 a7 | b4 82 a8 63 ca 63 fb 28 a9 ae 19 5e d9 12 c8 ba | 95 37 7e 44 d0 19 50 2e 50 85 6d 62 52 72 3d eb | 4d f4 88 bd 4f 23 95 01 f5 e8 4f 41 c1 7a e2 e9 | 09 7e 97 ea 1c b6 21 cd 07 3c 59 f2 8d ef a7 3b | 3d d1 60 37 5e c3 67 ad 3c a4 b3 33 59 93 de 51 | 98 2d 6e b0 f8 67 26 97 7f 16 7a f1 7d 53 b7 ac | 55 64 4e 4e 20 10 14 93 a4 62 e7 45 6c 22 9f d2 | 29 00 00 24 e1 87 09 5e 30 4d 93 58 a8 7b ef c0 | df 86 01 db 2f ae 90 07 26 59 14 f1 71 ed 65 8b | e5 42 58 e5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e a7 de 07 e1 64 83 30 46 b8 16 83 | 02 93 de dc 12 4e 03 eb 00 00 00 1c 00 00 40 05 | 41 30 1b e3 e2 bc 6c 0f ca fc a1 2e 9d 87 bf 76 | 3a b7 29 61 | libevent_free: release ptr-libevent@0x7fb350023d80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350017ea0 | #490 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bb 0e 3a 9b 64 67 83 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #490 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #490 | rejected packet: | bb 0e 3a 9b 64 67 83 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #490: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb35400cc10 | handling event EVENT_RETRANSMIT for parent state #491 | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #491 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #491 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49716.335621; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006407 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350017ea0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #491 | libevent_malloc: new ptr-libevent@0x7fb350023d80 size 128 "road-eastnet-nonat-239" #491: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #491) | 71 99 e4 22 98 eb 54 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6f ca d2 21 e7 00 d0 58 95 9f 18 d3 07 6f a1 36 | 29 0a 07 0a 83 6e be aa 71 cf 9f 04 2d 78 ad e9 | 58 fe 50 02 89 22 52 34 18 90 af 07 b5 26 f1 6c | b0 11 12 a1 23 de 99 fd fc c2 c0 e2 48 6c 08 1b | f6 de 34 df 7c 06 d6 3f 0c 5a 97 94 b5 cd 37 58 | 08 26 b0 da 52 89 5c 74 c6 39 52 b5 86 f0 ed 18 | e5 f9 91 2e 14 4e 44 f7 64 55 1d 70 ad 8f f1 5d | 53 18 a9 5d 0c b5 78 b7 26 b2 7b 9e 90 ef 29 39 | 8b 7e b2 68 96 f5 cb 23 fc d4 1f dd be 19 b3 cf | 90 29 ab e6 33 3c 02 49 68 ce 65 d3 cd 32 0f 44 | 53 2e 1d d6 62 09 24 c9 7c 69 12 6b 73 20 8c a6 | 8d 2e 37 7f bc 30 45 fb da d9 2f 0c 0f 60 4b ac | 0c 1a 77 7c e4 78 1e 2f d7 92 41 d2 4d 5f 8e ae | 49 e0 54 b5 c7 2d bc a1 7a a2 3f 86 07 2c 92 60 | e1 f5 de af a0 f0 4b 27 ad e3 b4 c3 ee 7b 2d 0d | d8 e3 ea 54 9f 53 a9 b6 54 62 d4 0e 68 4d ff 58 | 29 00 00 24 f6 62 db cd 87 59 ee 6d c7 6e 62 13 | a1 8e a7 17 f8 92 11 7a 45 83 ff 50 63 74 b0 f6 | 7b f4 74 d1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 ef b1 40 3a d0 79 c3 55 24 76 d2 | d8 cf d4 95 18 b0 e0 3a 00 00 00 1c 00 00 40 05 | ee b1 f7 86 b3 de f8 ed 09 8e 76 56 9a 74 8c 3c | 69 d7 b9 6e | libevent_free: release ptr-libevent@0x7fb354023e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400cc10 | #491 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 71 99 e4 22 98 eb 54 3d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #491 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #491 | rejected packet: | 71 99 e4 22 98 eb 54 3d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #491: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0443 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a7cf10 | handling event EVENT_RETRANSMIT for parent state #492 | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #492 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #492 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49716.41093; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006428 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400cc10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #492 | libevent_malloc: new ptr-libevent@0x7fb354023e30 size 128 "road-eastnet-nonat-240" #492: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #492) | d7 99 7d 69 73 b4 2a a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e 07 d7 12 79 21 18 05 9a 65 7d 95 08 cf 17 4e | 65 ed 52 c0 2d 6f a2 d4 7e 6e 0c fe 68 2e 85 0e | c1 f3 a0 f1 34 f9 34 8a e9 6d c0 54 1e 27 54 a6 | 0a 27 50 d2 78 b6 25 f7 6a f9 6c d4 40 88 de 0e | c5 23 46 17 11 07 59 0b 07 7d f1 44 d8 68 37 f0 | 12 d0 4c 6e 87 95 44 91 7a 02 1a aa de e2 f1 34 | 10 60 5a 14 6b 10 17 21 f9 34 d9 11 2c 87 8c 26 | a1 73 6c 09 6c 7e 33 9d 0e 03 17 61 98 14 aa f1 | 55 ad ab 3a b7 4f 37 37 da 8f 18 e7 c8 d3 37 ef | 02 82 ee 24 ef c3 bd c3 8a 68 42 60 d6 70 2e 41 | 57 9c 7a 60 c3 c6 ac 4a 44 4b 7b 82 88 6e 37 3a | e8 a6 66 1b 7b 71 c3 58 de ce c4 1a 99 46 de bc | be 62 d4 44 43 62 c0 f6 26 99 83 35 30 7f b5 15 | ea a7 50 6e 0e e9 be 43 3b f3 33 1e 18 3f 0c b4 | 99 f0 db 6c 50 7f 42 cb 48 b5 b5 92 17 92 32 ed | bf e5 25 0e 41 bc 26 2f b8 93 47 2e 04 ee 7f e1 | 29 00 00 24 50 36 54 c1 a9 17 13 4c 62 1f 80 79 | be a9 3c 75 1a 54 91 d7 53 38 3a 75 de 57 2a 82 | 16 4a 83 7c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 22 3a 78 b0 c2 12 43 88 f6 04 b2 | db f8 ae cb 72 c7 59 0b 00 00 00 1c 00 00 40 05 | d7 ae 13 c8 9e aa 6e 0d cf 25 ff 91 a0 20 ef 42 | b6 21 2f 3a | libevent_free: release ptr-libevent@0x7fb34401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf10 | #492 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d7 99 7d 69 73 b4 2a a7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #492 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #492 | rejected packet: | d7 99 7d 69 73 b4 2a a7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #492: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0832 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37000d120 | handling event EVENT_RETRANSMIT for parent state #493 | start processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #493 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #493 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49716.493301; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.004923 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf10 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #493 | libevent_malloc: new ptr-libevent@0x7fb34401d920 size 128 "road-eastnet-nonat-241" #493: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #493) | ed 28 a4 bc 11 7c af 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 97 43 c9 b9 d1 39 88 cf b4 19 83 df 09 c8 d9 33 | 6a 66 ab 95 b0 dd 15 4d 5d 4a fa 5d 52 f2 94 c9 | 8c 6b 4e fd a3 be 7b 1e 26 3d da ae 4a c7 9d 27 | 63 37 11 7d f7 65 a5 40 e2 b8 e7 88 e2 a7 17 fe | 35 86 91 9a d8 ce fa 63 4d d8 5f 33 39 8b fd 0b | c7 66 ad d7 e3 69 0a d0 e8 2c 35 2b 87 c6 e8 d1 | 35 a2 6a bd 14 2b 17 e4 3b 63 91 15 e8 44 4a 0b | ee 35 18 44 31 9b e0 f3 11 2e f9 0a f8 94 2e e7 | 37 62 af 42 67 9b d9 c2 7a 1d 9a 74 9c 27 5f 4e | 6c 61 5b 8d 6f b6 26 7a 65 28 0b d8 63 b2 4d f2 | 4f 66 7e 68 e4 09 4f e1 36 c2 c4 fc b8 a8 0d bd | 8f 6c 26 6b 1b b4 27 de 4d 65 70 86 b8 d6 2d 91 | e7 12 ef a7 86 2f 17 c5 46 49 a0 b2 37 f9 08 9e | 05 44 0c 6d 93 fe 69 98 08 f9 28 75 1f 4f 91 2d | 39 9f 63 17 e0 d3 1a 4e 52 69 6b 52 15 77 3f 2f | 3e 88 cf 00 87 f9 bd f2 03 53 f2 34 f3 a4 6a 9a | 29 00 00 24 a6 a1 ba dd 86 99 b3 8f 47 4a 4d 8f | 4a 4e 2e 70 ee a1 39 80 4f 25 94 bc 3e 73 ee 31 | 55 0b 3a 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0b ce a8 52 73 2a af 56 99 7a 11 14 | f3 b1 9c fe 91 8b 24 9a 00 00 00 1c 00 00 40 05 | 14 ee cd 8a 22 d5 80 d4 99 d7 ec c4 4c 96 10 11 | ff 51 59 09 | libevent_free: release ptr-libevent@0x7fb370029490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37000d120 | #493 spent 0.158 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 28 a4 bc 11 7c af 65 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #493 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #493 | rejected packet: | ed 28 a4 bc 11 7c af 65 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #493: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0541 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a6e010 | handling event EVENT_RETRANSMIT for parent state #494 | start processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #494 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #494 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49716.663785; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006045 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37000d120 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #494 | libevent_malloc: new ptr-libevent@0x7fb370029490 size 128 "road-eastnet-nonat-242" #494: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #494) | 13 d2 ce 8c c5 a0 08 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 2c 3b c1 c9 27 85 62 17 d7 83 f4 4b 2e 0e 16 | e2 03 04 ad 7a 8d 40 02 d4 34 9d 1b d3 c9 18 6b | 41 26 bf 10 de e3 e0 e1 0e ef 27 5f e0 e8 78 57 | b0 c9 a6 38 de ce 8a 7c 37 31 11 56 7d 62 bb 8e | c9 f9 f5 6c 82 0f ba cd 3f af 70 4e 17 32 64 c9 | d5 e6 2c 41 27 6e 25 48 eb 43 50 ea a4 34 26 c4 | 56 d9 54 ab 57 40 f6 c1 9c 20 1b 06 22 84 03 8b | e5 53 55 fa 3d 80 8b 5b c2 25 82 15 35 94 6c d0 | bb ec ab 60 22 1d 87 23 e3 9e ac fc 16 ce 42 3f | ba 0d 8d 04 b9 e7 b2 de 46 3e 4b b3 83 4d ca 89 | e2 a0 d6 38 51 9a 05 e2 dc 57 8c 52 b9 1a fa 47 | 7e 1e 80 51 ac cf 77 c1 e4 be 78 0f 3d a1 ce 56 | 23 61 ff 3d 67 82 ef a5 20 d8 a8 62 8a 37 d6 a0 | 87 df 7e 30 b4 77 c6 c9 19 64 23 a5 4f 30 28 ac | 43 56 89 18 4a 88 a5 5e d6 97 45 97 2d bb 34 28 | 33 0f 79 c6 b2 6c 6b 62 1d d3 42 70 92 9f 6e 55 | 29 00 00 24 86 c8 ae 9a dc 82 47 ae 63 a3 d2 9c | fc 56 5a fd b5 a1 94 8d 79 cd 12 87 5b f8 39 1c | 72 7a 80 86 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 31 4f 14 68 3f 9f 2d 22 c7 c5 d4 82 | fb 7c 5e ae ba 6a 24 66 00 00 00 1c 00 00 40 05 | bc 9f 5c d1 bc 22 73 c4 89 e4 5f 13 b2 ba 1c 19 | 38 03 1c b3 | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6e010 | #494 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 13 d2 ce 8c c5 a0 08 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #494 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #494 | rejected packet: | 13 d2 ce 8c c5 a0 08 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #494: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a52c90 | handling event EVENT_RETRANSMIT for parent state #495 | start processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #495 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #495 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49716.79914; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005604 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6e010 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #495 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 "road-eastnet-nonat-243" #495: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #495) | 51 22 fa ce 4d 7c ce 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c 9b dc 70 14 a2 8d 2e 37 c4 2e 9c 10 fc 27 0a | 94 78 5e 85 80 ae e5 be af df cd 9d ab 0a d3 d5 | 9a 0e 71 ff 6f 4d f8 da ab bd 5a 72 c3 2a 71 74 | 55 f1 2d 29 95 62 4d 7d b1 32 5b 12 fd 0a 2d bb | 81 aa ca e6 2a a9 0f 8b 0c cf 1b d2 de 30 5f 1f | e8 83 26 da 07 fd 31 9b 9b d4 1b db 2d 4b e3 99 | 86 7d a5 a0 d4 7d 59 09 c9 73 32 3d 53 85 e9 6f | 12 64 cd cb bc 89 f7 39 4d 28 2c 75 1c 49 0b 3b | c2 22 31 40 60 7d 62 ec d8 da 82 4a bd 1e c5 38 | c3 d8 6d e6 cb 49 78 ba 18 b4 83 3e 7d f6 6d 50 | 16 4d a6 04 f2 a5 8b c2 44 ae 9c 1a 54 68 4c 7d | 43 87 34 87 42 6c 4d fd b4 43 f6 3a 97 2e d2 87 | c4 99 e8 56 55 a1 ca 43 16 5d 55 9b 16 ed ee c1 | b9 bb 2b d6 cf 5a 0d 72 75 6d 1a 0f ae 6e 85 ec | 3a e8 4f c3 0e 27 5b 09 2a e5 e1 24 f5 af 32 13 | e5 eb fd 29 dd 27 c3 a5 08 cc 6e 72 80 4d 82 6f | 29 00 00 24 1b f3 52 dd f6 a5 80 95 b8 2f 4b 8b | f9 eb 65 1b 6e dd cd 94 b7 dd 16 f5 58 7c d7 e5 | e4 3a 80 01 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ec 3b 51 4a 4c d3 e5 68 1a 7e fa ec | e7 02 de b1 56 34 9d 92 00 00 00 1c 00 00 40 05 | ef ad 01 a7 be a3 55 49 1c 13 e6 d1 01 bd b7 0b | b8 36 16 d5 | libevent_free: release ptr-libevent@0x7fb38803dab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a52c90 | #495 spent 0.172 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 22 fa ce 4d 7c ce 06 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #495 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #495 | rejected packet: | 51 22 fa ce 4d 7c ce 06 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #495: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0711 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46ae48c0 | handling event EVENT_RETRANSMIT for parent state #496 | start processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #496 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #496 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49716.982657; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006095 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a52c90 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #496 | libevent_malloc: new ptr-libevent@0x7fb38803dab0 size 128 "road-eastnet-nonat-244" #496: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #496) | f5 9f b4 c2 7a 9c 1f 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec 8a 03 66 9e a5 16 39 b9 4a bb 3f cb 61 65 42 | 8b 18 46 77 70 53 8b 55 8b 35 c6 f2 c8 4d 38 3e | 2b 6f 3f c9 8d f1 cb 91 94 06 70 93 28 a0 96 60 | 92 d3 00 a2 ef 01 89 68 02 8d 85 25 69 9d e5 95 | 69 f6 3b 34 62 4f 63 bc 8e bf 0f 5d c5 bc ea 46 | f9 33 76 3d ad c3 1d 5a 73 74 ae ae 16 20 46 35 | 9e db 41 74 ad 1f 50 49 89 b1 86 a0 57 06 1e bf | 85 a3 93 e1 b5 84 03 d1 1b 0b 7b cd 83 c2 b7 25 | da ae 43 dc f0 b6 2a cd 25 9c e3 07 d7 ef 34 20 | 0c 00 64 d5 63 1f b1 99 29 80 fe 35 ec 43 23 95 | 6a a2 fc 57 a3 69 20 ea 94 fb aa 78 ee 5b 41 20 | 62 d9 4d ee fd 29 6e d9 f4 a1 15 cb 28 a0 f5 d3 | 5e bd 59 a6 87 61 99 4f 80 5d e6 36 36 11 e0 c2 | e5 c9 d7 3c 99 3b 27 4b f7 81 ca 42 93 ee a9 76 | e3 2e 24 6c 18 27 a8 24 04 ce 7c dd c7 a8 fd 5b | a3 04 bb 87 35 69 9f a6 83 11 9f de e4 40 52 5f | 29 00 00 24 4f 4f 97 a4 0f 74 20 cc 43 f4 64 ac | a1 3b a8 cc 16 af 62 fa 43 5b 11 20 24 9f 33 6a | 2d 6e 82 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 79 bb 2d d9 d9 21 50 1a 1a 14 0f | 62 ed ae c0 08 f2 03 40 00 00 00 1c 00 00 40 05 | c8 1f b0 a0 de 58 fc c7 c3 79 0d 4a c2 37 42 43 | 8a b6 69 08 | libevent_free: release ptr-libevent@0x7fb3480251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae48c0 | #496 spent 0.151 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 9f b4 c2 7a 9c 1f 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #496 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #496 | rejected packet: | f5 9f b4 c2 7a 9c 1f 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #496: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.076 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380027d70 | handling event EVENT_RETRANSMIT for parent state #497 | start processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #497 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #497 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49717.109091; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006223 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae48c0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #497 | libevent_malloc: new ptr-libevent@0x7fb3480251c0 size 128 "road-eastnet-nonat-245" #497: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #497) | 28 b5 38 f6 69 3c dd 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 04 4f fe 15 c7 2a a9 dd 3f 1e c4 af 27 5d f3 d2 | be f7 13 da e4 cd 00 79 29 61 5f 71 06 40 ec 4d | 5b 3c 6a 08 8b 9a 2f 7d 1c cb b0 e7 92 b6 f3 99 | d5 a0 ee 16 30 44 37 37 a1 b0 11 d5 bf c1 2a b7 | f5 d1 e8 e7 c9 c5 fa 46 9e 9f 3a b8 17 a3 bb fa | 54 7b 20 13 28 1b f7 09 b2 95 cc 2b 5d f4 60 59 | 43 48 23 26 2f ff 03 e2 92 b6 e4 28 ce 3a 0e b0 | 61 13 0a de 56 e6 23 f3 78 da d1 d7 d1 36 d7 28 | c6 40 4f d5 36 46 dd 50 a2 1e 26 c4 f5 81 8c a1 | f5 29 b8 66 19 89 39 ca 34 48 2c b5 7e 66 e5 bf | 86 9d 6e 91 75 02 c6 e8 9c 42 e7 98 64 aa 15 f8 | 6c 03 28 e6 79 39 e1 5e 40 0e f9 55 f0 a7 e0 83 | fa bb b8 03 f0 19 b9 6c 46 69 2b 63 42 39 b5 e4 | 3d 0b 8e 6b 21 0c f2 48 0e 67 57 08 dc 21 c5 f4 | 1a 4b 05 96 97 80 b1 ee 12 7e 9f 47 8d c8 b6 e1 | 5b 8f 86 2e 8f 92 b6 42 a3 65 04 7b ab ba 17 50 | 29 00 00 24 bb a3 f2 ad c6 d3 d5 2f 68 33 8b a0 | e0 e2 16 25 72 ec 6d 1a 07 9d 1d 9e dd 96 6a c8 | 4e 10 b2 ba 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 bb 68 12 ef 53 e2 45 10 bb c5 e2 | 24 4d b4 aa b9 d2 2c 73 00 00 00 1c 00 00 40 05 | 18 cd c3 7e 31 14 45 db 85 92 8b 2e 4a 8c 9b c9 | 08 95 b5 b9 | libevent_free: release ptr-libevent@0x7fb380043300 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380027d70 | #497 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 b5 38 f6 69 3c dd 2d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #497 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #497 | rejected packet: | 28 b5 38 f6 69 3c dd 2d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #497: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.044 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #498 | start processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #498 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #498 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49717.24346; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007762 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380027d70 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #498 | libevent_malloc: new ptr-libevent@0x7fb380043300 size 128 "road-eastnet-nonat-246" #498: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #498) | 68 4b 64 40 03 e3 f0 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e5 69 29 47 91 ea fc 2e df 27 76 0c 26 38 63 6b | ee 03 64 3e dd 2d 4f 5c a2 7c 3e 41 2e b2 c6 84 | ff d7 8f ca 24 8a 1a 84 04 b4 3e b6 53 38 d4 57 | 6d a4 68 41 c6 e5 8c 59 22 a7 fd d7 67 07 36 7e | 1e 40 23 48 d2 30 3e 8e d0 0e 2f 85 d4 6b 01 86 | 85 76 00 26 45 82 b5 a1 ed 94 31 de 85 9c 6f 9a | d2 cc cb 6d 68 f4 36 91 7d 92 94 a9 b3 a0 25 d9 | 5a 00 e8 82 c1 6e 50 4f eb 4b c5 77 4d eb ad f8 | f9 00 df 08 85 b8 e7 b1 b7 09 70 ca fb b5 96 54 | bd be b6 e6 4b 40 d9 6a f9 30 1c a8 77 f3 85 c8 | 21 54 2e a4 d4 8e d4 56 c2 16 22 dd 3e 05 97 69 | 65 6d 3c 5d 0f 12 01 33 b0 f7 91 7a 47 03 5b 97 | 4d 0e 9c 52 05 49 6e 01 9c be f7 12 23 b1 5e c9 | 73 97 42 af ac c3 1d 81 30 3b a9 46 14 e0 b0 65 | ab d4 ac 96 fd 2b 1a 19 c7 e5 47 a1 84 25 26 11 | 99 9a c0 71 dd 5f b8 d7 21 7f 1f c8 a8 a3 e9 18 | 29 00 00 24 87 96 a9 cf f1 29 2d 50 7c 79 d6 68 | 62 af 98 cb 71 a2 fc 0e ae 94 c2 03 22 51 95 ed | 81 12 8d c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 71 da 0a 79 9e f6 1d 6a 6f 5a 6b | 39 aa 0c e1 fb 50 58 ee 00 00 00 1c 00 00 40 05 | 43 dd 8c b7 86 3c b2 4e bf 53 d1 4c 55 30 14 19 | fc 2a 32 31 | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #498 spent 0.143 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 4b 64 40 03 e3 f0 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #498 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #498 | rejected packet: | 68 4b 64 40 03 e3 f0 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-246" #498: ERROR: asynchronous network error report on eth0 (192.1.3.246:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0632 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a61bd0 | handling event EVENT_RETRANSMIT for parent state #499 | start processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #499 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #499 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49717.368873; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006125 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #499 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 "road-eastnet-nonat-247" #499: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #499) | c7 9c 2c 36 f8 59 d4 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 36 9d 7e c3 eb 0f f5 55 38 8b 43 25 86 54 ef | 6f b9 f8 28 7e 76 ec 92 74 99 fc c9 b6 64 9d ac | b4 f5 fc 31 29 96 7b f0 ef 3c 01 28 c3 ad 1c 4d | 74 6d b0 ed 64 09 35 18 c6 6a c2 bc 6c f8 72 2c | 54 14 82 7e 14 37 d9 e7 9b 9f ce de 7f 99 2e f1 | 1f 25 30 b7 54 88 0c c6 03 fe ef 9a c2 4c 16 3a | 92 dc d7 50 b6 03 1d 9b e5 26 b1 a0 fd e5 86 9c | c1 bb a9 1d c8 aa e0 66 62 a8 ef d5 a3 e5 1c aa | 48 a0 13 72 a6 76 d4 63 de 8e 77 d1 a4 a1 70 1a | 05 7e fd e9 46 8f d7 69 9c 5d 01 6a 23 bf d1 7c | 60 fe 3b 08 36 7c 46 56 5e fa 3e 87 6e f8 5c e5 | 62 26 d2 09 02 d7 a8 88 f2 80 8a 7b d3 24 87 ec | 98 c6 06 44 cf 2e 14 1f 9a 9e 11 3b 15 35 10 67 | 80 78 af 3c 90 b3 be 54 94 f8 6c d9 36 9d 34 3f | b2 ee 4f 6f 8b cb 03 13 29 6b 61 bf aa 20 b1 02 | 64 9a 46 8c 58 45 74 b6 a7 9c 3f 9f 19 1b d5 f4 | 29 00 00 24 ae 3f 5f 22 5a fe fe 91 94 31 fc a8 | 30 c0 4a f7 3c 57 3c 0d ed a5 29 f2 71 dc 56 3a | ed 9c a9 5c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 43 89 ab ab 1d cc d7 b6 cb 29 1c 48 | e7 84 01 ce 34 15 c4 5f 00 00 00 1c 00 00 40 05 | 7f 71 39 3d 41 d0 36 ee b9 ed 2b b5 28 d2 9e d8 | 0a 4d 91 1e | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61bd0 | #499 spent 0.142 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c7 9c 2c 36 f8 59 d4 6c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #499 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #499 | rejected packet: | c7 9c 2c 36 f8 59 d4 6c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #499: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0701 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a50110 | handling event EVENT_RETRANSMIT for parent state #500 | start processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #500 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #500 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49717.488285; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007019 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #500 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 "road-eastnet-nonat-248" #500: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #500) | dc 38 e1 a3 3b e2 b1 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 79 4a f1 97 41 66 ce d4 ab 90 74 77 4f 00 cb 43 | 1f 3a 29 28 bd ab f1 45 3f 88 a4 79 39 fe 2c ee | 1b e9 2e 5c de da 76 bf a3 0c cc 93 b6 1b 8c 68 | 84 10 8f 55 6f 47 ec 76 41 18 0c b4 50 73 cf e8 | 55 11 98 5d d0 8c 2d e1 b9 47 bc d9 dd 4c 8a 72 | 7c cf 3b 3b b2 57 cf 3d e0 1d d4 39 94 72 a1 23 | 6b 6c 49 1f b9 94 b3 b7 a4 33 d9 35 1a 97 76 7e | 8f eb c4 34 d7 30 b6 ff 0b a0 77 62 d6 0a a9 b7 | 60 e4 b0 4d 0f 38 4b ae 9a ce 16 98 d0 34 95 01 | 44 fe 57 be 26 cf f9 d3 b8 79 e7 d6 d9 c0 2e 7d | 90 21 6f 7d c3 bc 04 f3 80 08 f6 e6 0b 6f 05 a0 | f8 da 5b cf d5 f7 d1 f1 f5 c0 29 8b c4 a2 cc 29 | 8c e2 9a 9c 8f bf ae c2 b0 3f ce e4 df fb 71 f5 | f7 13 31 70 b5 0f b2 9e ae 64 eb 2c 73 aa d9 5b | 7a b9 c4 3b 46 10 f6 92 a7 5e 0d a0 e7 06 8a 74 | 5e 40 71 07 4b d8 c5 08 71 52 bd 30 01 84 10 98 | 29 00 00 24 73 e7 fd d9 0c 07 09 ec 59 bd 7a b5 | 40 29 3e 5b f2 d3 e1 ea 7b 04 b1 b4 b1 5f 03 d2 | b4 24 ec 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 f6 20 af 00 f8 ef 66 b3 21 e2 19 | 0f ba fb 8a ed c9 14 86 00 00 00 1c 00 00 40 05 | 70 63 55 d1 ed 70 f9 1a 8c 9d 5a 9a f7 cc 31 61 | 9c 9b 74 c0 | libevent_free: release ptr-libevent@0x7fb37404b5c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a50110 | #500 spent 0.144 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 38 e1 a3 3b e2 b1 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #500 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #500 | rejected packet: | dc 38 e1 a3 3b e2 b1 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #500: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0654 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #501 | start processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #501 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #501 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49717.574666; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.005833 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a50110 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #501 | libevent_malloc: new ptr-libevent@0x7fb37404b5c0 size 128 "road-eastnet-nonat-249" #501: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #501) | 7a bb eb ab 59 82 f5 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 87 e6 e7 b7 df 15 1a 88 da d9 de 99 20 d1 37 56 | a1 ac 1e 3f d7 4a 79 5c c8 d1 9e 85 c4 f1 dc d8 | f1 ca b4 9f 14 60 92 de ad 42 9b 69 57 eb d4 33 | 23 a5 0d 4e 25 37 79 9e 75 f6 18 19 e2 36 6a 82 | 3e c6 41 e8 fb 1d 27 30 85 3c c4 c4 37 ed 39 57 | 59 68 3d d5 92 7b 15 e0 1d da a4 bf 8a 13 2e 99 | fa b3 d7 34 a7 e9 ee 45 93 41 ea 47 57 78 a8 c7 | 28 3e 80 cf 3a fa c3 5c 40 7e 2d 6e a8 8f 1a 76 | 9f e3 ee 0a 5c 09 b9 35 7b e1 73 9e 9a 5b 7e 05 | af 57 ba 41 a4 20 67 9b 93 00 a4 77 65 8b 72 e8 | ca c2 a7 8c f8 bc 75 a9 2f 52 c5 be ea 41 46 90 | 6a 2e 17 cc 87 cc 0a 22 0b d8 b5 c8 dd ab 30 09 | 90 3a 1d 65 9d 2f 73 fc c6 06 30 d8 66 83 64 c8 | a7 e5 c1 23 61 62 8a 18 87 ad dc 7f 74 de 65 20 | fb ed bb 7b ca 02 66 e1 c0 5c b2 b3 41 14 ad 3d | 9e 02 fd e0 c6 5b ba ef b1 16 d3 d4 8f 92 d4 90 | 29 00 00 24 0f d0 3c c8 9f 70 8e 25 2a 4f 78 c0 | 1d 68 16 9a 4a bb 3c a4 19 fe 19 3a d7 7c 1c 89 | 23 2f 21 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 3b be 6c 39 30 3e f5 fc f3 31 c5 | 53 ef 34 5b ca c1 eb 03 00 00 00 1c 00 00 40 05 | 86 82 cd 41 4f 66 70 19 76 ed 27 dd 0a 04 2f 6d | e6 1d 3e b6 | libevent_free: release ptr-libevent@0x7fb34803f490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #501 spent 0.146 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7a bb eb ab 59 82 f5 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #501 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #501 | rejected packet: | 7a bb eb ab 59 82 f5 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #501: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0674 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb3800319a0 | handling event EVENT_RETRANSMIT for parent state #502 | start processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #502 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #502 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49717.675064; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.007047 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #502 | libevent_malloc: new ptr-libevent@0x7fb34803f490 size 128 "road-eastnet-nonat-250" #502: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #502) | 49 84 03 55 33 41 14 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 b6 56 c0 55 c6 5a b3 d0 b1 3a cd 2c 2d f1 98 | 2b 05 72 d6 2a eb f1 a5 ce 1a 6e fe 9b 76 4a e6 | c8 9d 68 cf 67 24 b2 a5 b6 c1 96 48 84 37 b3 8b | f1 39 9c c4 10 9d db 1a 8e 7f b3 36 f3 a8 eb bd | 2b 28 0c da ff 40 e9 6b c2 33 b1 41 cc 82 3c 97 | 2f 0e a7 48 25 26 c1 d7 53 0e 21 ee 94 d4 a0 38 | 49 e2 15 f5 13 68 e2 8a cb ba 80 6b ce a6 00 d2 | 69 7e 9f 04 65 f3 ae 81 71 49 2a 5f 8f ee 09 49 | e3 ff 1b cd 41 64 ae 29 01 91 5e 32 c3 26 78 8f | ea 20 2b 0f 18 2d 0a 1f 22 af 98 ef 92 ff 6a 84 | 62 82 19 1c 56 bf 8b 8e 12 15 12 c1 19 da 4c cd | 49 b3 95 88 b6 66 33 d3 36 cf f2 bd 45 7d 72 a1 | 21 21 16 69 39 89 66 de 9b 3d 56 7f ea f5 ce 47 | 7a 2e 75 2e cf 9b 6b 32 55 e0 ae 5b c0 56 2e 7e | b8 fa 3a ca aa 83 6d 0a b9 cf d2 e5 75 34 ef 7c | fd ec 25 52 b8 3d 7b b9 f7 15 a6 0a 76 51 86 5e | 29 00 00 24 9b c1 28 9f 3d 89 a9 b6 3e c7 19 65 | 88 8e 41 03 11 21 a9 0f 26 57 6b e7 b4 25 21 32 | 2d ba 55 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1f d1 0c 18 0e bf a2 52 1e 5c d3 e7 | df 48 7e 58 7f 45 57 fd 00 00 00 1c 00 00 40 05 | c9 7e 47 3a 28 a9 19 bc aa dc fd 65 a2 d8 10 d7 | 15 14 41 45 | libevent_free: release ptr-libevent@0x7fb380047480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800319a0 | #502 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 49 84 03 55 33 41 14 2a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #502 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #502 | rejected packet: | 49 84 03 55 33 41 14 2a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #502: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0592 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a9dd40 | handling event EVENT_RETRANSMIT for parent state #503 | start processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #503 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #503 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49717.785431; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.006255 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800319a0 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #503 | libevent_malloc: new ptr-libevent@0x7fb380047480 size 128 "road-eastnet-nonat-251" #503: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #503) | de 1d 8d 29 e2 13 e9 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 34 bc c5 bc ee 45 af a6 73 6a 90 e4 26 1b 45 74 | 00 ed f2 a3 ec 74 88 4b c9 51 b5 6a 38 9f 0a f7 | 89 96 66 a1 cb 3b 36 71 3c 50 00 7f a8 a1 27 84 | 14 72 85 f0 e9 87 92 95 57 d6 bb a3 9e eb a3 89 | 3b d6 9d 72 8e 22 b1 43 7b 48 2b 91 a9 6c a2 71 | 4e b7 05 32 94 32 e3 1e 78 6c 29 24 39 3f 29 25 | a5 fc 7d 8a 16 8c 7f 3c 9e 88 a1 a2 0f e7 3d e7 | a6 2a 71 17 3f ba 2d 1e 73 4a af 59 81 2a 33 e7 | 7c 6b a5 a6 c7 0d 60 09 fe 4a 3a c4 ae f0 db 28 | 63 c7 99 7d c2 1a 2a f5 ca 34 59 14 08 64 3e 0e | 9e 8a 9a 95 bb 9d 48 ef fa 38 ec e3 2c 15 34 9c | e9 d6 59 e6 ff 43 a4 b1 2b ff 91 b3 04 3b c1 be | 1e 15 0a dc 58 8d 95 f6 06 1e 22 79 23 6e 88 9c | fb 5f 8d 89 36 69 ab a3 c4 17 6b e8 27 27 43 a0 | 64 a3 07 0b 2b f0 22 81 09 20 24 c8 81 c7 b3 70 | 64 46 cf dc 25 f9 42 3b 6e b0 ff 34 aa 9a 20 98 | 29 00 00 24 e0 7e ea 52 c4 af 5e ed 64 d4 0d e7 | b4 32 8f da 7f e4 cd 7f 6e 0d 4f bd 11 1c 8f fe | 10 1a 14 9e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 eb 39 3d 04 da 34 34 c4 55 20 7b | 97 62 11 e4 f5 1f 2c 3d 00 00 00 1c 00 00 40 05 | 56 4f 2a b1 95 be 94 04 9d 7b d6 c2 f3 45 b1 7e | d7 05 c2 82 | libevent_free: release ptr-libevent@0x7fb364014bc0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd40 | #503 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | de 1d 8d 29 e2 13 e9 62 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #503 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #503 | rejected packet: | de 1d 8d 29 e2 13 e9 62 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #503: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x557d46a46950 | handling event EVENT_RETRANSMIT for parent state #504 | start processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #504 attempt 3 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #504 keying attempt 2 of 0; retransmit 7 | retransmits: current time 49717.921114; retransmit count 6 exceeds limit? NO; deltatime 32 exceeds limit? NO; monotime 32.008528 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a9dd40 | inserting event EVENT_RETRANSMIT, timeout in 32 seconds for #504 | libevent_malloc: new ptr-libevent@0x7fb364014bc0 size 128 "road-eastnet-nonat-252" #504: STATE_PARENT_I1: retransmission; will wait 32 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #504) | da 55 48 8d 90 bf 21 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ac 2a 4d 0b 8b cf db e8 71 42 c9 12 73 26 89 36 | f8 7e cd c8 1c 11 8c 7f 9e 09 ce 55 92 dd 78 d1 | ad 59 d2 ee 94 4b 61 50 a3 e8 9a 12 3c 5e 9b 79 | 67 a9 ab b1 17 c4 72 5d 57 f0 6b d6 9d c6 6d f9 | 38 2a f7 f8 e2 f3 15 e5 73 fa 8b 4d 1c fc cc ab | b7 f0 3b 90 c7 95 ba 20 f3 82 29 0e d5 86 2e 2f | d3 3d 1a 6e 6e 68 d3 8e 2c 1e 30 d3 3d 1a 4b 7f | 07 51 04 a3 cd e1 e4 f3 6b 81 ac 0e 5e 25 fc a6 | 2d 49 a3 1d 9d 7f 10 1c b8 aa 6d 0b 48 63 e7 ab | 47 28 bd cd 66 43 28 3d 25 f6 20 56 e0 bb 73 1a | f5 3a ee c2 95 1c 1f 57 8f 41 e9 d9 d4 e4 b4 be | f5 98 c0 78 1e 91 5d ba 02 2c 3a cf 04 e6 44 c6 | a4 f1 83 88 9a 45 b6 e7 89 2b 45 be 54 48 e8 52 | 9b 95 05 7a d4 dd af 6d 96 db 42 ed db 5d 0c bc | 83 61 0a c3 fd 33 2c bd cf 88 1b 95 c9 43 7a fa | 73 7b 7d 2e f9 6a 53 94 78 2b 4f 21 f2 f3 1d f2 | 29 00 00 24 61 bd 30 86 3d bb 50 44 5f 1b 26 2e | 52 63 1b fa b0 23 2c cb bf bc 70 41 cc 6b 00 dd | 9d aa 60 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd b5 bb a3 b0 15 ca 04 17 91 f9 55 | 5a 59 4c 3b fd 4e 4a c4 00 00 00 1c 00 00 40 05 | 47 4d 62 c8 1d 9c 5d 27 1b 5d ed df fb db c8 62 | de eb 87 79 | libevent_free: release ptr-libevent@0x7fb3580180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46950 | #504 spent 0.176 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 55 48 8d 90 bf 21 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #504 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #504 | rejected packet: | da 55 48 8d 90 bf 21 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #504: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0709 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_PENDING_DDNS | FOR_EACH_CONNECTION_... in connection_check_ddns | FOR_EACH_UNORIENTED_CONNECTION_... in check_orientations | elapsed time in connection_check_ddns for hostname lookup 0.000037 | spent 0.0414 milliseconds in global timer EVENT_PENDING_DDNS | processing global timer EVENT_PENDING_PHASE2 | FOR_EACH_CONNECTION_... in connection_check_phase2 | pending review: connection "road-eastnet-nonat-252" checked | checking connection "road-eastnet-nonat-252" for stuck phase 2s (waited 98, patience 3*10) | connection "road-eastnet-nonat-252" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-252" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #504 requesting EVENT_RETRANSMIT to be deleted | #504 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb364014bc0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd40 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a46950 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #504 | libevent_malloc: new ptr-libevent@0x7fb3580180b0 size 128 | pending review: connection "road-eastnet-nonat-251" checked | checking connection "road-eastnet-nonat-251" for stuck phase 2s (waited 98, patience 3*10) | connection "road-eastnet-nonat-251" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-251" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #503 requesting EVENT_RETRANSMIT to be deleted | #503 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb380047480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800319a0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb3800319a0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #503 | libevent_malloc: new ptr-libevent@0x7fb380047480 size 128 | pending review: connection "road-eastnet-nonat-250" checked | checking connection "road-eastnet-nonat-250" for stuck phase 2s (waited 98, patience 3*10) | connection "road-eastnet-nonat-250" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-250" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #502 requesting EVENT_RETRANSMIT to be deleted | #502 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34803f490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb348005860 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #502 | libevent_malloc: new ptr-libevent@0x7fb34803f490 size 128 | pending review: connection "road-eastnet-nonat-249" checked | checking connection "road-eastnet-nonat-249" for stuck phase 2s (waited 98, patience 3*10) | connection "road-eastnet-nonat-249" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-249" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #501 requesting EVENT_RETRANSMIT to be deleted | #501 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37404b5c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a50110 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a50110 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #501 | libevent_malloc: new ptr-libevent@0x7fb37404b5c0 size 128 | pending review: connection "road-eastnet-nonat-248" checked | checking connection "road-eastnet-nonat-248" for stuck phase 2s (waited 98, patience 3*10) | connection "road-eastnet-nonat-248" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-248" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #500 requesting EVENT_RETRANSMIT to be deleted | #500 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61bd0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a61bd0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #500 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 | pending review: connection "road-eastnet-nonat-247" checked | checking connection "road-eastnet-nonat-247" for stuck phase 2s (waited 98, patience 3*10) | connection "road-eastnet-nonat-247" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-247" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #499 requesting EVENT_RETRANSMIT to be deleted | #499 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb364005860 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #499 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 | pending review: connection "road-eastnet-nonat-246" checked | checking connection "road-eastnet-nonat-246" for stuck phase 2s (waited 98, patience 3*10) | connection "road-eastnet-nonat-246" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-246" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #498 requesting EVENT_RETRANSMIT to be deleted | #498 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb380043300 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380027d70 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb380027d70 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #498 | libevent_malloc: new ptr-libevent@0x7fb380043300 size 128 | pending review: connection "road-eastnet-nonat-245" checked | checking connection "road-eastnet-nonat-245" for stuck phase 2s (waited 98, patience 3*10) | connection "road-eastnet-nonat-245" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-245" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #497 requesting EVENT_RETRANSMIT to be deleted | #497 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3480251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae48c0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46ae48c0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #497 | libevent_malloc: new ptr-libevent@0x7fb3480251c0 size 128 | pending review: connection "road-eastnet-nonat-244" checked | checking connection "road-eastnet-nonat-244" for stuck phase 2s (waited 99, patience 3*10) | connection "road-eastnet-nonat-244" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-244" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #496 requesting EVENT_RETRANSMIT to be deleted | #496 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb38803dab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a52c90 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a52c90 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #496 | libevent_malloc: new ptr-libevent@0x7fb38803dab0 size 128 | pending review: connection "road-eastnet-nonat-243" checked | checking connection "road-eastnet-nonat-243" for stuck phase 2s (waited 99, patience 3*10) | connection "road-eastnet-nonat-243" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-243" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #495 requesting EVENT_RETRANSMIT to be deleted | #495 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6e010 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a6e010 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #495 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 | pending review: connection "road-eastnet-nonat-242" checked | checking connection "road-eastnet-nonat-242" for stuck phase 2s (waited 99, patience 3*10) | connection "road-eastnet-nonat-242" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-242" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #494 requesting EVENT_RETRANSMIT to be deleted | #494 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb370029490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37000d120 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb37000d120 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #494 | libevent_malloc: new ptr-libevent@0x7fb370029490 size 128 | pending review: connection "road-eastnet-nonat-241" checked | checking connection "road-eastnet-nonat-241" for stuck phase 2s (waited 99, patience 3*10) | connection "road-eastnet-nonat-241" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-241" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #493 requesting EVENT_RETRANSMIT to be deleted | #493 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34401d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf10 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a7cf10 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #493 | libevent_malloc: new ptr-libevent@0x7fb34401d920 size 128 | pending review: connection "road-eastnet-nonat-240" checked | checking connection "road-eastnet-nonat-240" for stuck phase 2s (waited 99, patience 3*10) | connection "road-eastnet-nonat-240" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-240" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #492 requesting EVENT_RETRANSMIT to be deleted | #492 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb354023e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400cc10 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb35400cc10 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #492 | libevent_malloc: new ptr-libevent@0x7fb354023e30 size 128 | pending review: connection "road-eastnet-nonat-239" checked | checking connection "road-eastnet-nonat-239" for stuck phase 2s (waited 99, patience 3*10) | connection "road-eastnet-nonat-239" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-239" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #491 requesting EVENT_RETRANSMIT to be deleted | #491 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb350023d80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350017ea0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb350017ea0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #491 | libevent_malloc: new ptr-libevent@0x7fb350023d80 size 128 | pending review: connection "road-eastnet-nonat-238" checked | checking connection "road-eastnet-nonat-238" for stuck phase 2s (waited 99, patience 3*10) | connection "road-eastnet-nonat-238" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-238" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #490 requesting EVENT_RETRANSMIT to be deleted | #490 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35c03a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c02aab0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb35c02aab0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #490 | libevent_malloc: new ptr-libevent@0x7fb35c03a770 size 128 | pending review: connection "road-eastnet-nonat-237" checked | checking connection "road-eastnet-nonat-237" for stuck phase 2s (waited 99, patience 3*10) | connection "road-eastnet-nonat-237" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-237" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #489 requesting EVENT_RETRANSMIT to be deleted | #489 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3580407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adc640 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46adc640 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #489 | libevent_malloc: new ptr-libevent@0x7fb3580407f0 size 128 | pending review: connection "road-eastnet-nonat-236" checked | checking connection "road-eastnet-nonat-236" for stuck phase 2s (waited 99, patience 3*10) | connection "road-eastnet-nonat-236" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-236" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #488 requesting EVENT_RETRANSMIT to be deleted | #488 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb384041c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840223f0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb3840223f0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #488 | libevent_malloc: new ptr-libevent@0x7fb384041c10 size 128 | pending review: connection "road-eastnet-nonat-235" checked | checking connection "road-eastnet-nonat-235" for stuck phase 2s (waited 100, patience 3*10) | connection "road-eastnet-nonat-235" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-235" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #487 requesting EVENT_RETRANSMIT to be deleted | #487 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370017ea0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb370017ea0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #487 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 | pending review: connection "road-eastnet-nonat-234" checked | checking connection "road-eastnet-nonat-234" for stuck phase 2s (waited 100, patience 3*10) | connection "road-eastnet-nonat-234" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-234" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #486 requesting EVENT_RETRANSMIT to be deleted | #486 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35402ede0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35401d710 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb35401d710 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #486 | libevent_malloc: new ptr-libevent@0x7fb35402ede0 size 128 | pending review: connection "road-eastnet-nonat-233" checked | checking connection "road-eastnet-nonat-233" for stuck phase 2s (waited 100, patience 3*10) | connection "road-eastnet-nonat-233" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-233" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #485 requesting EVENT_RETRANSMIT to be deleted | #485 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb38003dab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb340005860 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #485 | libevent_malloc: new ptr-libevent@0x7fb38003dab0 size 128 | pending review: connection "road-eastnet-nonat-232" checked | checking connection "road-eastnet-nonat-232" for stuck phase 2s (waited 100, patience 3*10) | connection "road-eastnet-nonat-232" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-232" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #484 requesting EVENT_RETRANSMIT to be deleted | #484 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb38403da90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3780297c0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb3780297c0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #484 | libevent_malloc: new ptr-libevent@0x7fb38403da90 size 128 | pending review: connection "road-eastnet-nonat-231" checked | checking connection "road-eastnet-nonat-231" for stuck phase 2s (waited 100, patience 3*10) | connection "road-eastnet-nonat-231" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-231" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #483 requesting EVENT_RETRANSMIT to be deleted | #483 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3680300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf00 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46b0bf00 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #483 | libevent_malloc: new ptr-libevent@0x7fb3680300e0 size 128 | pending review: connection "road-eastnet-nonat-230" checked | checking connection "road-eastnet-nonat-230" for stuck phase 2s (waited 100, patience 3*10) | connection "road-eastnet-nonat-230" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-230" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #482 requesting EVENT_RETRANSMIT to be deleted | #482 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3380300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94500 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a94500 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #482 | libevent_malloc: new ptr-libevent@0x7fb3380300e0 size 128 | pending review: connection "road-eastnet-nonat-229" checked | checking connection "road-eastnet-nonat-229" for stuck phase 2s (waited 100, patience 3*10) | connection "road-eastnet-nonat-229" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-229" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #481 requesting EVENT_RETRANSMIT to be deleted | #481 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36802ee40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368025320 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb368025320 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #481 | libevent_malloc: new ptr-libevent@0x7fb36802ee40 size 128 | pending review: connection "road-eastnet-nonat-228" checked | checking connection "road-eastnet-nonat-228" for stuck phase 2s (waited 100, patience 3*10) | connection "road-eastnet-nonat-228" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-228" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #480 requesting EVENT_RETRANSMIT to be deleted | #480 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb374034da0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45350 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a45350 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #480 | libevent_malloc: new ptr-libevent@0x7fb374034da0 size 128 | pending review: connection "road-eastnet-nonat-227" checked | checking connection "road-eastnet-nonat-227" for stuck phase 2s (waited 101, patience 3*10) | connection "road-eastnet-nonat-227" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-227" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #479 requesting EVENT_RETRANSMIT to be deleted | #479 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34403a3d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c440 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46b1c440 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #479 | libevent_malloc: new ptr-libevent@0x7fb34403a3d0 size 128 | pending review: connection "road-eastnet-nonat-226" checked | checking connection "road-eastnet-nonat-226" for stuck phase 2s (waited 101, patience 3*10) | connection "road-eastnet-nonat-226" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-226" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #478 requesting EVENT_RETRANSMIT to be deleted | #478 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36c0296b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00cfd0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb36c00cfd0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #478 | libevent_malloc: new ptr-libevent@0x7fb36c0296b0 size 128 | pending review: connection "road-eastnet-nonat-225" checked | checking connection "road-eastnet-nonat-225" for stuck phase 2s (waited 101, patience 3*10) | connection "road-eastnet-nonat-225" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-225" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #477 requesting EVENT_RETRANSMIT to be deleted | #477 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34003b010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000cc10 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb36000cc10 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #477 | libevent_malloc: new ptr-libevent@0x7fb34003b010 size 128 | pending review: connection "road-eastnet-nonat-224" checked | checking connection "road-eastnet-nonat-224" for stuck phase 2s (waited 101, patience 3*10) | connection "road-eastnet-nonat-224" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-224" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #476 requesting EVENT_RETRANSMIT to be deleted | #476 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35003b1c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c480 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46b1c480 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #476 | libevent_malloc: new ptr-libevent@0x7fb35003b1c0 size 128 | pending review: connection "road-eastnet-nonat-223" checked | checking connection "road-eastnet-nonat-223" for stuck phase 2s (waited 101, patience 3*10) | connection "road-eastnet-nonat-223" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-223" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #475 requesting EVENT_RETRANSMIT to be deleted | #475 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c040840 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb37c040840 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #475 | libevent_malloc: new ptr-libevent@0x7fb34c00cf80 size 128 | pending review: connection "road-eastnet-nonat-222" checked | checking connection "road-eastnet-nonat-222" for stuck phase 2s (waited 101, patience 3*10) | connection "road-eastnet-nonat-222" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-222" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #474 requesting EVENT_RETRANSMIT to be deleted | #474 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3800223c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380009ed0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb380009ed0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #474 | libevent_malloc: new ptr-libevent@0x7fb3800223c0 size 128 | pending review: connection "road-eastnet-nonat-221" checked | checking connection "road-eastnet-nonat-221" for stuck phase 2s (waited 101, patience 3*10) | connection "road-eastnet-nonat-221" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-221" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #473 requesting EVENT_RETRANSMIT to be deleted | #473 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000feb0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb38000feb0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #473 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 | pending review: connection "road-eastnet-nonat-220" checked | checking connection "road-eastnet-nonat-220" for stuck phase 2s (waited 101, patience 3*10) | connection "road-eastnet-nonat-220" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-220" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #472 requesting EVENT_RETRANSMIT to be deleted | #472 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb33802ee40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33801d710 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb33801d710 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #472 | libevent_malloc: new ptr-libevent@0x7fb33802ee40 size 128 | pending review: connection "road-eastnet-nonat-219" checked | checking connection "road-eastnet-nonat-219" for stuck phase 2s (waited 101, patience 3*10) | connection "road-eastnet-nonat-219" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-219" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #471 requesting EVENT_RETRANSMIT to be deleted | #471 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b50 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a70b50 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #471 | libevent_malloc: new ptr-libevent@0x7fb35001d920 size 128 | pending review: connection "road-eastnet-nonat-218" checked | checking connection "road-eastnet-nonat-218" for stuck phase 2s (waited 102, patience 3*10) | connection "road-eastnet-nonat-218" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-218" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #470 requesting EVENT_RETRANSMIT to be deleted | #470 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3580300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90400 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a90400 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #470 | libevent_malloc: new ptr-libevent@0x7fb3580300e0 size 128 | pending review: connection "road-eastnet-nonat-217" checked | checking connection "road-eastnet-nonat-217" for stuck phase 2s (waited 102, patience 3*10) | connection "road-eastnet-nonat-217" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-217" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #469 requesting EVENT_RETRANSMIT to be deleted | #469 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad8480 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46ad8480 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #469 | libevent_malloc: new ptr-libevent@0x7fb36803b0b0 size 128 | pending review: connection "road-eastnet-nonat-216" checked | checking connection "road-eastnet-nonat-216" for stuck phase 2s (waited 102, patience 3*10) | connection "road-eastnet-nonat-216" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-216" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #468 requesting EVENT_RETRANSMIT to be deleted | #468 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34c01a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c018460 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb37c018460 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #468 | libevent_malloc: new ptr-libevent@0x7fb34c01a4e0 size 128 | pending review: connection "road-eastnet-nonat-215" checked | checking connection "road-eastnet-nonat-215" for stuck phase 2s (waited 102, patience 3*10) | connection "road-eastnet-nonat-215" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-215" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #467 requesting EVENT_RETRANSMIT to be deleted | #467 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338017ea0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb338017ea0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #467 | libevent_malloc: new ptr-libevent@0x7fb35403b0b0 size 128 | pending review: connection "road-eastnet-nonat-214" checked | checking connection "road-eastnet-nonat-214" for stuck phase 2s (waited 102, patience 3*10) | connection "road-eastnet-nonat-214" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-214" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #466 requesting EVENT_RETRANSMIT to be deleted | #466 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb38000c460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800383c0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb3800383c0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #466 | libevent_malloc: new ptr-libevent@0x7fb38000c460 size 128 | pending review: connection "road-eastnet-nonat-213" checked | checking connection "road-eastnet-nonat-213" for stuck phase 2s (waited 102, patience 3*10) | connection "road-eastnet-nonat-213" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-213" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #465 requesting EVENT_RETRANSMIT to be deleted | #465 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35003a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3500300a0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb3500300a0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #465 | libevent_malloc: new ptr-libevent@0x7fb35003a770 size 128 | pending review: connection "road-eastnet-nonat-212" checked | checking connection "road-eastnet-nonat-212" for stuck phase 2s (waited 102, patience 3*10) | connection "road-eastnet-nonat-212" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-212" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #464 requesting EVENT_RETRANSMIT to be deleted | #464 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a198d0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #464 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 | pending review: connection "road-eastnet-nonat-211" checked | checking connection "road-eastnet-nonat-211" for stuck phase 2s (waited 102, patience 3*10) | connection "road-eastnet-nonat-211" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-211" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #463 requesting EVENT_RETRANSMIT to be deleted | #463 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb350029650 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350014cc0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb350014cc0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #463 | libevent_malloc: new ptr-libevent@0x7fb350029650 size 128 | pending review: connection "road-eastnet-nonat-210" checked | checking connection "road-eastnet-nonat-210" for stuck phase 2s (waited 102, patience 3*10) | connection "road-eastnet-nonat-210" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-210" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #462 requesting EVENT_RETRANSMIT to be deleted | #462 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3500180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24700 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46b24700 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #462 | libevent_malloc: new ptr-libevent@0x7fb3500180b0 size 128 | pending review: connection "road-eastnet-nonat-209" checked | checking connection "road-eastnet-nonat-209" for stuck phase 2s (waited 103, patience 3*10) | connection "road-eastnet-nonat-209" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-209" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #461 requesting EVENT_RETRANSMIT to be deleted | #461 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3700180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0a940 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46b0a940 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #461 | libevent_malloc: new ptr-libevent@0x7fb3700180b0 size 128 | pending review: connection "road-eastnet-nonat-208" checked | checking connection "road-eastnet-nonat-208" for stuck phase 2s (waited 103, patience 3*10) | connection "road-eastnet-nonat-208" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-208" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #460 requesting EVENT_RETRANSMIT to be deleted | #460 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3680345d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368040840 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb368040840 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #460 | libevent_malloc: new ptr-libevent@0x7fb3680345d0 size 128 | pending review: connection "road-eastnet-nonat-207" checked | checking connection "road-eastnet-nonat-207" for stuck phase 2s (waited 103, patience 3*10) | connection "road-eastnet-nonat-207" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-207" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #459 requesting EVENT_RETRANSMIT to be deleted | #459 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb37802a9a0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #459 | libevent_malloc: new ptr-libevent@0x7fb37801a4e0 size 128 | pending review: connection "road-eastnet-nonat-206" checked | checking connection "road-eastnet-nonat-206" for stuck phase 2s (waited 103, patience 3*10) | connection "road-eastnet-nonat-206" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-206" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #458 requesting EVENT_RETRANSMIT to be deleted | #458 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c40 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46b25c40 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #458 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 | pending review: connection "road-eastnet-nonat-205" checked | checking connection "road-eastnet-nonat-205" for stuck phase 2s (waited 103, patience 3*10) | connection "road-eastnet-nonat-205" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-205" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #457 requesting EVENT_RETRANSMIT to be deleted | #457 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35403a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400f1f0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb35400f1f0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #457 | libevent_malloc: new ptr-libevent@0x7fb35403a770 size 128 | pending review: connection "road-eastnet-nonat-204" checked | checking connection "road-eastnet-nonat-204" for stuck phase 2s (waited 103, patience 3*10) | connection "road-eastnet-nonat-204" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-204" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #456 requesting EVENT_RETRANSMIT to be deleted | #456 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a34e10 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a34e10 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #456 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 | pending review: connection "road-eastnet-nonat-203" checked | checking connection "road-eastnet-nonat-203" for stuck phase 2s (waited 103, patience 3*10) | connection "road-eastnet-nonat-203" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-203" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #455 requesting EVENT_RETRANSMIT to be deleted | #455 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb368046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368024000 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb368024000 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #455 | libevent_malloc: new ptr-libevent@0x7fb368046040 size 128 | pending review: connection "road-eastnet-nonat-202" checked | checking connection "road-eastnet-nonat-202" for stuck phase 2s (waited 103, patience 3*10) | connection "road-eastnet-nonat-202" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-202" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #454 requesting EVENT_RETRANSMIT to be deleted | #454 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb368023a60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a647d0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a647d0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #454 | libevent_malloc: new ptr-libevent@0x7fb368023a60 size 128 | pending review: connection "road-eastnet-nonat-201" checked | checking connection "road-eastnet-nonat-201" for stuck phase 2s (waited 103, patience 3*10) | connection "road-eastnet-nonat-201" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-201" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #453 requesting EVENT_RETRANSMIT to be deleted | #453 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a05290 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #453 | libevent_malloc: new ptr-libevent@0x7fb34400cf80 size 128 | pending review: connection "road-eastnet-nonat-200" checked | checking connection "road-eastnet-nonat-200" for stuck phase 2s (waited 103, patience 3*10) | connection "road-eastnet-nonat-200" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-200" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #452 requesting EVENT_RETRANSMIT to be deleted | #452 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb384032b00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800feb0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb38800feb0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #452 | libevent_malloc: new ptr-libevent@0x7fb384032b00 size 128 | pending review: connection "road-eastnet-nonat-199" checked | checking connection "road-eastnet-nonat-199" for stuck phase 2s (waited 104, patience 3*10) | connection "road-eastnet-nonat-199" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-199" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #451 requesting EVENT_RETRANSMIT to be deleted | #451 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36c03a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012890 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb36c012890 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #451 | libevent_malloc: new ptr-libevent@0x7fb36c03a770 size 128 | pending review: connection "road-eastnet-nonat-198" checked | checking connection "road-eastnet-nonat-198" for stuck phase 2s (waited 104, patience 3*10) | connection "road-eastnet-nonat-198" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-198" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #450 requesting EVENT_RETRANSMIT to be deleted | #450 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3700251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46aecb00 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #450 | libevent_malloc: new ptr-libevent@0x7fb3700251c0 size 128 | pending review: connection "road-eastnet-nonat-197" checked | checking connection "road-eastnet-nonat-197" for stuck phase 2s (waited 104, patience 3*10) | connection "road-eastnet-nonat-197" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-197" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #449 requesting EVENT_RETRANSMIT to be deleted | #449 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3780300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb36800d120 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #449 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 | pending review: connection "road-eastnet-nonat-196" checked | checking connection "road-eastnet-nonat-196" for stuck phase 2s (waited 104, patience 3*10) | connection "road-eastnet-nonat-196" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-196" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #448 requesting EVENT_RETRANSMIT to be deleted | #448 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c01d710 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb37c01d710 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #448 | libevent_malloc: new ptr-libevent@0x7fb36c0300e0 size 128 | pending review: connection "road-eastnet-nonat-195" checked | checking connection "road-eastnet-nonat-195" for stuck phase 2s (waited 104, patience 3*10) | connection "road-eastnet-nonat-195" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-195" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #447 requesting EVENT_RETRANSMIT to be deleted | #447 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb344040760 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34401d710 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb34401d710 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #447 | libevent_malloc: new ptr-libevent@0x7fb344040760 size 128 | pending review: connection "road-eastnet-nonat-194" checked | checking connection "road-eastnet-nonat-194" for stuck phase 2s (waited 104, patience 3*10) | connection "road-eastnet-nonat-194" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-194" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #446 requesting EVENT_RETRANSMIT to be deleted | #446 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340025210 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb340025210 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #446 | libevent_malloc: new ptr-libevent@0x7fb35804b850 size 128 | pending review: connection "road-eastnet-nonat-193" checked | checking connection "road-eastnet-nonat-193" for stuck phase 2s (waited 104, patience 3*10) | connection "road-eastnet-nonat-193" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-193" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #445 requesting EVENT_RETRANSMIT to be deleted | #445 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34c02ec30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c490 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a1c490 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #445 | libevent_malloc: new ptr-libevent@0x7fb34c02ec30 size 128 | pending review: connection "road-eastnet-nonat-192" checked | checking connection "road-eastnet-nonat-192" for stuck phase 2s (waited 104, patience 3*10) | connection "road-eastnet-nonat-192" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-192" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #444 requesting EVENT_RETRANSMIT to be deleted | #444 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb388048a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b610 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a2b610 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #444 | libevent_malloc: new ptr-libevent@0x7fb388048a80 size 128 | pending review: connection "road-eastnet-nonat-191" checked | checking connection "road-eastnet-nonat-191" for stuck phase 2s (waited 104, patience 3*10) | connection "road-eastnet-nonat-191" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-191" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #443 requesting EVENT_RETRANSMIT to be deleted | #443 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb360046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b06800 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46b06800 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #443 | libevent_malloc: new ptr-libevent@0x7fb360046040 size 128 | pending review: connection "road-eastnet-nonat-190" checked | checking connection "road-eastnet-nonat-190" for stuck phase 2s (waited 104, patience 3*10) | connection "road-eastnet-nonat-190" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-190" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #442 requesting EVENT_RETRANSMIT to be deleted | #442 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3700407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378018460 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb378018460 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #442 | libevent_malloc: new ptr-libevent@0x7fb3700407f0 size 128 | pending review: connection "road-eastnet-nonat-189" checked | checking connection "road-eastnet-nonat-189" for stuck phase 2s (waited 104, patience 3*10) | connection "road-eastnet-nonat-189" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-189" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #441 requesting EVENT_RETRANSMIT to be deleted | #441 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb34c00d120 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #441 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 | pending review: connection "road-eastnet-nonat-188" checked | checking connection "road-eastnet-nonat-188" for stuck phase 2s (waited 105, patience 3*10) | connection "road-eastnet-nonat-188" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-188" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #440 requesting EVENT_RETRANSMIT to be deleted | #440 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb358039e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358012630 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb358012630 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #440 | libevent_malloc: new ptr-libevent@0x7fb358039e30 size 128 | pending review: connection "road-eastnet-nonat-187" checked | checking connection "road-eastnet-nonat-187" for stuck phase 2s (waited 105, patience 3*10) | connection "road-eastnet-nonat-187" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-187" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #439 requesting EVENT_RETRANSMIT to be deleted | #439 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb380022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa34c0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46aa34c0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #439 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 | pending review: connection "road-eastnet-nonat-186" checked | checking connection "road-eastnet-nonat-186" for stuck phase 2s (waited 105, patience 3*10) | connection "road-eastnet-nonat-186" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-186" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #438 requesting EVENT_RETRANSMIT to be deleted | #438 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46aa5fc0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #438 | libevent_malloc: new ptr-libevent@0x7fb35c0300e0 size 128 | pending review: connection "road-eastnet-nonat-185" checked | checking connection "road-eastnet-nonat-185" for stuck phase 2s (waited 105, patience 3*10) | connection "road-eastnet-nonat-185" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-185" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #437 requesting EVENT_RETRANSMIT to be deleted | #437 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3400094d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370018460 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb370018460 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #437 | libevent_malloc: new ptr-libevent@0x7fb3400094d0 size 128 | pending review: connection "road-eastnet-nonat-184" checked | checking connection "road-eastnet-nonat-184" for stuck phase 2s (waited 105, patience 3*10) | connection "road-eastnet-nonat-184" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-184" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #436 requesting EVENT_RETRANSMIT to be deleted | #436 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37c029710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c017ea0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb37c017ea0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #436 | libevent_malloc: new ptr-libevent@0x7fb37c029710 size 128 | pending review: connection "road-eastnet-nonat-183" checked | checking connection "road-eastnet-nonat-183" for stuck phase 2s (waited 105, patience 3*10) | connection "road-eastnet-nonat-183" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-183" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #435 requesting EVENT_RETRANSMIT to be deleted | #435 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35401a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a86b80 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a86b80 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #435 | libevent_malloc: new ptr-libevent@0x7fb35401a4e0 size 128 | pending review: connection "road-eastnet-nonat-182" checked | checking connection "road-eastnet-nonat-182" for stuck phase 2s (waited 105, patience 3*10) | connection "road-eastnet-nonat-182" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-182" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #434 requesting EVENT_RETRANSMIT to be deleted | #434 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36004b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae0780 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46ae0780 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #434 | libevent_malloc: new ptr-libevent@0x7fb36004b7c0 size 128 | pending review: connection "road-eastnet-nonat-181" checked | checking connection "road-eastnet-nonat-181" for stuck phase 2s (waited 105, patience 3*10) | connection "road-eastnet-nonat-181" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-181" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #433 requesting EVENT_RETRANSMIT to be deleted | #433 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3780251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a82ac0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a82ac0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #433 | libevent_malloc: new ptr-libevent@0x7fb3780251c0 size 128 | pending review: connection "road-eastnet-nonat-180" checked | checking connection "road-eastnet-nonat-180" for stuck phase 2s (waited 105, patience 3*10) | connection "road-eastnet-nonat-180" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-180" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #432 requesting EVENT_RETRANSMIT to be deleted | #432 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344018460 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb344018460 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #432 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 | pending review: connection "road-eastnet-nonat-179" checked | checking connection "road-eastnet-nonat-179" for stuck phase 2s (waited 105, patience 3*10) | connection "road-eastnet-nonat-179" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-179" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #431 requesting EVENT_RETRANSMIT to be deleted | #431 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37c01d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47f10 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a47f10 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #431 | libevent_malloc: new ptr-libevent@0x7fb37c01d920 size 128 | pending review: connection "road-eastnet-nonat-178" checked | checking connection "road-eastnet-nonat-178" for stuck phase 2s (waited 105, patience 3*10) | connection "road-eastnet-nonat-178" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-178" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #430 requesting EVENT_RETRANSMIT to be deleted | #430 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35804b810 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb35804b810 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #430 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 | pending review: connection "road-eastnet-nonat-177" checked | checking connection "road-eastnet-nonat-177" for stuck phase 2s (waited 105, patience 3*10) | connection "road-eastnet-nonat-177" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-177" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #429 requesting EVENT_RETRANSMIT to be deleted | #429 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46b0d4c0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #429 | libevent_malloc: new ptr-libevent@0x7fb34803b0b0 size 128 | pending review: connection "road-eastnet-nonat-176" checked | checking connection "road-eastnet-nonat-176" for stuck phase 2s (waited 106, patience 3*10) | connection "road-eastnet-nonat-176" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-176" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #428 requesting EVENT_RETRANSMIT to be deleted | #428 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36804b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a6b490 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #428 | libevent_malloc: new ptr-libevent@0x7fb36804b850 size 128 | pending review: connection "road-eastnet-nonat-175" checked | checking connection "road-eastnet-nonat-175" for stuck phase 2s (waited 106, patience 3*10) | connection "road-eastnet-nonat-175" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-175" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #427 requesting EVENT_RETRANSMIT to be deleted | #427 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3600407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388015720 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb388015720 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #427 | libevent_malloc: new ptr-libevent@0x7fb3600407f0 size 128 | pending review: connection "road-eastnet-nonat-174" checked | checking connection "road-eastnet-nonat-174" for stuck phase 2s (waited 106, patience 3*10) | connection "road-eastnet-nonat-174" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-174" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #426 requesting EVENT_RETRANSMIT to be deleted | #426 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37c01a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc00 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46abbc00 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #426 | libevent_malloc: new ptr-libevent@0x7fb37c01a4e0 size 128 | pending review: connection "road-eastnet-nonat-173" checked | checking connection "road-eastnet-nonat-173" for stuck phase 2s (waited 106, patience 3*10) | connection "road-eastnet-nonat-173" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-173" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #425 requesting EVENT_RETRANSMIT to be deleted | #425 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb384027b30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46ac3ec0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #425 | libevent_malloc: new ptr-libevent@0x7fb384027b30 size 128 | pending review: connection "road-eastnet-nonat-172" checked | checking connection "road-eastnet-nonat-172" for stuck phase 2s (waited 106, patience 3*10) | connection "road-eastnet-nonat-172" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-172" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #424 requesting EVENT_RETRANSMIT to be deleted | #424 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36c04b970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012630 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb36c012630 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #424 | libevent_malloc: new ptr-libevent@0x7fb36c04b970 size 128 | pending review: connection "road-eastnet-nonat-171" checked | checking connection "road-eastnet-nonat-171" for stuck phase 2s (waited 106, patience 3*10) | connection "road-eastnet-nonat-171" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-171" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #423 requesting EVENT_RETRANSMIT to be deleted | #423 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3440300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acc140 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46acc140 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #423 | libevent_malloc: new ptr-libevent@0x7fb3440300e0 size 128 | pending review: connection "road-eastnet-nonat-170" checked | checking connection "road-eastnet-nonat-170" for stuck phase 2s (waited 106, patience 3*10) | connection "road-eastnet-nonat-170" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-170" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #422 requesting EVENT_RETRANSMIT to be deleted | #422 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338018460 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb338018460 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #422 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 | pending review: connection "road-eastnet-nonat-169" checked | checking connection "road-eastnet-nonat-169" for stuck phase 2s (waited 106, patience 3*10) | connection "road-eastnet-nonat-169" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-169" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #421 requesting EVENT_RETRANSMIT to be deleted | #421 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a2cb90 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #421 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 | pending review: connection "road-eastnet-nonat-168" checked | checking connection "road-eastnet-nonat-168" for stuck phase 2s (waited 106, patience 3*10) | connection "road-eastnet-nonat-168" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-168" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #420 requesting EVENT_RETRANSMIT to be deleted | #420 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb340044850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340008e80 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb340008e80 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #420 | libevent_malloc: new ptr-libevent@0x7fb340044850 size 128 | pending review: connection "road-eastnet-nonat-167" checked | checking connection "road-eastnet-nonat-167" for stuck phase 2s (waited 106, patience 3*10) | connection "road-eastnet-nonat-167" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-167" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #419 requesting EVENT_RETRANSMIT to be deleted | #419 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370012bf0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb370012bf0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #419 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 | pending review: connection "road-eastnet-nonat-166" checked | checking connection "road-eastnet-nonat-166" for stuck phase 2s (waited 106, patience 3*10) | connection "road-eastnet-nonat-166" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-166" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #418 requesting EVENT_RETRANSMIT to be deleted | #418 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34c03f570 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00cc10 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb34c00cc10 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #418 | libevent_malloc: new ptr-libevent@0x7fb34c03f570 size 128 | pending review: connection "road-eastnet-nonat-165" checked | checking connection "road-eastnet-nonat-165" for stuck phase 2s (waited 106, patience 3*10) | connection "road-eastnet-nonat-165" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-165" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #417 requesting EVENT_RETRANSMIT to be deleted | #417 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb374034460 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb37402ffb0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #417 | libevent_malloc: new ptr-libevent@0x7fb374034460 size 128 | pending review: connection "road-eastnet-nonat-164" checked | checking connection "road-eastnet-nonat-164" for stuck phase 2s (waited 106, patience 3*10) | connection "road-eastnet-nonat-164" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-164" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #416 requesting EVENT_RETRANSMIT to be deleted | #416 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3780407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aacc80 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46aacc80 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #416 | libevent_malloc: new ptr-libevent@0x7fb3780407f0 size 128 | pending review: connection "road-eastnet-nonat-163" checked | checking connection "road-eastnet-nonat-163" for stuck phase 2s (waited 106, patience 3*10) | connection "road-eastnet-nonat-163" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-163" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #415 requesting EVENT_RETRANSMIT to be deleted | #415 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37004b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aef6c0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46aef6c0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #415 | libevent_malloc: new ptr-libevent@0x7fb37004b7c0 size 128 | pending review: connection "road-eastnet-nonat-162" checked | checking connection "road-eastnet-nonat-162" for stuck phase 2s (waited 106, patience 3*10) | connection "road-eastnet-nonat-162" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-162" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #414 requesting EVENT_RETRANSMIT to be deleted | #414 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374009690 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb374009690 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #414 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 | pending review: connection "road-eastnet-nonat-161" checked | checking connection "road-eastnet-nonat-161" for stuck phase 2s (waited 107, patience 3*10) | connection "road-eastnet-nonat-161" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-161" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #413 requesting EVENT_RETRANSMIT to be deleted | #413 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35c014b40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c018460 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb35c018460 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #413 | libevent_malloc: new ptr-libevent@0x7fb35c014b40 size 128 | pending review: connection "road-eastnet-nonat-160" checked | checking connection "road-eastnet-nonat-160" for stuck phase 2s (waited 107, patience 3*10) | connection "road-eastnet-nonat-160" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-160" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #412 requesting EVENT_RETRANSMIT to be deleted | #412 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37c023b10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a97080 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a97080 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #412 | libevent_malloc: new ptr-libevent@0x7fb37c023b10 size 128 | pending review: connection "road-eastnet-nonat-159" checked | checking connection "road-eastnet-nonat-159" for stuck phase 2s (waited 107, patience 3*10) | connection "road-eastnet-nonat-159" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-159" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #411 requesting EVENT_RETRANSMIT to be deleted | #411 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36c0251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee40 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a8ee40 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #411 | libevent_malloc: new ptr-libevent@0x7fb36c0251c0 size 128 | pending review: connection "road-eastnet-nonat-158" checked | checking connection "road-eastnet-nonat-158" for stuck phase 2s (waited 107, patience 3*10) | connection "road-eastnet-nonat-158" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-158" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #410 requesting EVENT_RETRANSMIT to be deleted | #410 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb340012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800cc10 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb34800cc10 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #410 | libevent_malloc: new ptr-libevent@0x7fb340012840 size 128 | pending review: connection "road-eastnet-nonat-157" checked | checking connection "road-eastnet-nonat-157" for stuck phase 2s (waited 107, patience 3*10) | connection "road-eastnet-nonat-157" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-157" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #409 requesting EVENT_RETRANSMIT to be deleted | #409 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb388022480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a54250 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a54250 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #409 | libevent_malloc: new ptr-libevent@0x7fb388022480 size 128 | pending review: connection "road-eastnet-nonat-156" checked | checking connection "road-eastnet-nonat-156" for stuck phase 2s (waited 107, patience 3*10) | connection "road-eastnet-nonat-156" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-156" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #408 requesting EVENT_RETRANSMIT to be deleted | #408 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35c03f430 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb35c017ea0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #408 | libevent_malloc: new ptr-libevent@0x7fb35c03f430 size 128 | pending review: connection "road-eastnet-nonat-155" checked | checking connection "road-eastnet-nonat-155" for stuck phase 2s (waited 107, patience 3*10) | connection "road-eastnet-nonat-155" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-155" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #407 requesting EVENT_RETRANSMIT to be deleted | #407 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab90c0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46ab90c0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #407 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 | pending review: connection "road-eastnet-nonat-154" checked | checking connection "road-eastnet-nonat-154" for stuck phase 2s (waited 107, patience 3*10) | connection "road-eastnet-nonat-154" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-154" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #406 requesting EVENT_RETRANSMIT to be deleted | #406 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37800f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37801d970 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb37801d970 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #406 | libevent_malloc: new ptr-libevent@0x7fb37800f1a0 size 128 | pending review: connection "road-eastnet-nonat-153" checked | checking connection "road-eastnet-nonat-153" for stuck phase 2s (waited 107, patience 3*10) | connection "road-eastnet-nonat-153" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-153" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #405 requesting EVENT_RETRANSMIT to be deleted | #405 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb370014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a81500 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #405 | libevent_malloc: new ptr-libevent@0x7fb370014c70 size 128 | pending review: connection "road-eastnet-nonat-152" checked | checking connection "road-eastnet-nonat-152" for stuck phase 2s (waited 107, patience 3*10) | connection "road-eastnet-nonat-152" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-152" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #404 requesting EVENT_RETRANSMIT to be deleted | #404 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36003f3e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36001a530 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb36001a530 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #404 | libevent_malloc: new ptr-libevent@0x7fb36003f3e0 size 128 | pending review: connection "road-eastnet-nonat-151" checked | checking connection "road-eastnet-nonat-151" for stuck phase 2s (waited 107, patience 3*10) | connection "road-eastnet-nonat-151" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-151" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #403 requesting EVENT_RETRANSMIT to be deleted | #403 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb364045e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a468d0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #403 | libevent_malloc: new ptr-libevent@0x7fb364045e60 size 128 | pending review: connection "road-eastnet-nonat-150" checked | checking connection "road-eastnet-nonat-150" for stuck phase 2s (waited 107, patience 3*10) | connection "road-eastnet-nonat-150" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-150" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #402 requesting EVENT_RETRANSMIT to be deleted | #402 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb364008e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374005860 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb374005860 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #402 | libevent_malloc: new ptr-libevent@0x7fb364008e30 size 128 | pending review: connection "road-eastnet-nonat-149" checked | checking connection "road-eastnet-nonat-149" for stuck phase 2s (waited 107, patience 3*10) | connection "road-eastnet-nonat-149" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-149" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #401 requesting EVENT_RETRANSMIT to be deleted | #401 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3500251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c018460 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb34c018460 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #401 | libevent_malloc: new ptr-libevent@0x7fb3500251c0 size 128 | pending review: connection "road-eastnet-nonat-148" checked | checking connection "road-eastnet-nonat-148" for stuck phase 2s (waited 107, patience 3*10) | connection "road-eastnet-nonat-148" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-148" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #400 requesting EVENT_RETRANSMIT to be deleted | #400 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb36c017ea0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #400 | libevent_malloc: new ptr-libevent@0x7fb36c04b850 size 128 | pending review: connection "road-eastnet-nonat-147" checked | checking connection "road-eastnet-nonat-147" for stuck phase 2s (waited 107, patience 3*10) | connection "road-eastnet-nonat-147" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-147" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #399 requesting EVENT_RETRANSMIT to be deleted | #399 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37403f310 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37404b580 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb37404b580 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #399 | libevent_malloc: new ptr-libevent@0x7fb37403f310 size 128 | pending review: connection "road-eastnet-nonat-146" checked | checking connection "road-eastnet-nonat-146" for stuck phase 2s (waited 108, patience 3*10) | connection "road-eastnet-nonat-146" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-146" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #398 requesting EVENT_RETRANSMIT to be deleted | #398 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3540300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46afe580 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #398 | libevent_malloc: new ptr-libevent@0x7fb3540300e0 size 128 | pending review: connection "road-eastnet-nonat-145" checked | checking connection "road-eastnet-nonat-145" for stuck phase 2s (waited 108, patience 3*10) | connection "road-eastnet-nonat-145" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-145" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #397 requesting EVENT_RETRANSMIT to be deleted | #397 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3880269d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe780 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46abe780 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #397 | libevent_malloc: new ptr-libevent@0x7fb3880269d0 size 128 | pending review: connection "road-eastnet-nonat-144" checked | checking connection "road-eastnet-nonat-144" for stuck phase 2s (waited 108, patience 3*10) | connection "road-eastnet-nonat-144" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-144" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #396 requesting EVENT_RETRANSMIT to be deleted | #396 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb388032bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24680 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46b24680 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #396 | libevent_malloc: new ptr-libevent@0x7fb388032bf0 size 128 | pending review: connection "road-eastnet-nonat-143" checked | checking connection "road-eastnet-nonat-143" for stuck phase 2s (waited 108, patience 3*10) | connection "road-eastnet-nonat-143" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-143" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #395 requesting EVENT_RETRANSMIT to be deleted | #395 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb364023a90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d469fb8a0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #395 | libevent_malloc: new ptr-libevent@0x7fb364023a90 size 128 | pending review: connection "road-eastnet-nonat-142" checked | checking connection "road-eastnet-nonat-142" for stuck phase 2s (waited 108, patience 3*10) | connection "road-eastnet-nonat-142" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-142" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #394 requesting EVENT_RETRANSMIT to be deleted | #394 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb344046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3a590 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a3a590 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #394 | libevent_malloc: new ptr-libevent@0x7fb344046040 size 128 | pending review: connection "road-eastnet-nonat-141" checked | checking connection "road-eastnet-nonat-141" for stuck phase 2s (waited 108, patience 3*10) | connection "road-eastnet-nonat-141" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-141" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #393 requesting EVENT_RETRANSMIT to be deleted | #393 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb338035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c00 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46b12c00 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #393 | libevent_malloc: new ptr-libevent@0x7fb338035930 size 128 | pending review: connection "road-eastnet-nonat-140" checked | checking connection "road-eastnet-nonat-140" for stuck phase 2s (waited 108, patience 3*10) | connection "road-eastnet-nonat-140" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-140" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #392 requesting EVENT_RETRANSMIT to be deleted | #392 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37003a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370012890 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb370012890 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #392 | libevent_malloc: new ptr-libevent@0x7fb37003a770 size 128 | pending review: connection "road-eastnet-nonat-139" checked | checking connection "road-eastnet-nonat-139" for stuck phase 2s (waited 108, patience 3*10) | connection "road-eastnet-nonat-139" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-139" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #391 requesting EVENT_RETRANSMIT to be deleted | #391 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb364039970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36400cc10 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb36400cc10 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #391 | libevent_malloc: new ptr-libevent@0x7fb364039970 size 128 | pending review: connection "road-eastnet-nonat-138" checked | checking connection "road-eastnet-nonat-138" for stuck phase 2s (waited 108, patience 3*10) | connection "road-eastnet-nonat-138" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-138" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #390 requesting EVENT_RETRANSMIT to be deleted | #390 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb380041ce0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800153c0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb3800153c0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #390 | libevent_malloc: new ptr-libevent@0x7fb380041ce0 size 128 | pending review: connection "road-eastnet-nonat-137" checked | checking connection "road-eastnet-nonat-137" for stuck phase 2s (waited 108, patience 3*10) | connection "road-eastnet-nonat-137" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-137" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #389 requesting EVENT_RETRANSMIT to be deleted | #389 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3440180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abd200 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46abd200 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #389 | libevent_malloc: new ptr-libevent@0x7fb3440180b0 size 128 | pending review: connection "road-eastnet-nonat-136" checked | checking connection "road-eastnet-nonat-136" for stuck phase 2s (waited 108, patience 3*10) | connection "road-eastnet-nonat-136" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-136" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #388 requesting EVENT_RETRANSMIT to be deleted | #388 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348012630 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb348012630 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #388 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 | pending review: connection "road-eastnet-nonat-135" checked | checking connection "road-eastnet-nonat-135" for stuck phase 2s (waited 108, patience 3*10) | connection "road-eastnet-nonat-135" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-135" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #387 requesting EVENT_RETRANSMIT to be deleted | #387 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb338048a10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f40 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a92f40 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #387 | libevent_malloc: new ptr-libevent@0x7fb338048a10 size 128 | pending review: connection "road-eastnet-nonat-134" checked | checking connection "road-eastnet-nonat-134" for stuck phase 2s (waited 108, patience 3*10) | connection "road-eastnet-nonat-134" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-134" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #386 requesting EVENT_RETRANSMIT to be deleted | #386 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36c02ed30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c01d710 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb36c01d710 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #386 | libevent_malloc: new ptr-libevent@0x7fb36c02ed30 size 128 | pending review: connection "road-eastnet-nonat-133" checked | checking connection "road-eastnet-nonat-133" for stuck phase 2s (waited 108, patience 3*10) | connection "road-eastnet-nonat-133" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-133" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #385 requesting EVENT_RETRANSMIT to be deleted | #385 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb388011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c005860 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb37c005860 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #385 | libevent_malloc: new ptr-libevent@0x7fb388011f30 size 128 | pending review: connection "road-eastnet-nonat-132" checked | checking connection "road-eastnet-nonat-132" for stuck phase 2s (waited 108, patience 3*10) | connection "road-eastnet-nonat-132" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-132" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #384 requesting EVENT_RETRANSMIT to be deleted | #384 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00d120 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb35c00d120 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #384 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 | pending review: connection "road-eastnet-nonat-131" checked | checking connection "road-eastnet-nonat-131" for stuck phase 2s (waited 109, patience 3*10) | connection "road-eastnet-nonat-131" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-131" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #383 requesting EVENT_RETRANSMIT to be deleted | #383 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36402e9b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a32290 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a32290 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #383 | libevent_malloc: new ptr-libevent@0x7fb36402e9b0 size 128 | pending review: connection "road-eastnet-nonat-130" checked | checking connection "road-eastnet-nonat-130" for stuck phase 2s (waited 109, patience 3*10) | connection "road-eastnet-nonat-130" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-130" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #382 requesting EVENT_RETRANSMIT to be deleted | #382 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3800269d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380015160 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb380015160 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #382 | libevent_malloc: new ptr-libevent@0x7fb3800269d0 size 128 | pending review: connection "road-eastnet-nonat-129" checked | checking connection "road-eastnet-nonat-129" for stuck phase 2s (waited 109, patience 3*10) | connection "road-eastnet-nonat-129" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-129" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #381 requesting EVENT_RETRANSMIT to be deleted | #381 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4bfd0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a4bfd0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #381 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | pending review: connection "road-eastnet-nonat-128" checked | checking connection "road-eastnet-nonat-128" for stuck phase 2s (waited 109, patience 3*10) | connection "road-eastnet-nonat-128" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-128" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #380 requesting EVENT_RETRANSMIT to be deleted | #380 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb388002b20 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #380 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 | pending review: connection "road-eastnet-nonat-127" checked | checking connection "road-eastnet-nonat-127" for stuck phase 2s (waited 109, patience 3*10) | connection "road-eastnet-nonat-127" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-127" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #379 requesting EVENT_RETRANSMIT to be deleted | #379 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3980 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46ab3980 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #379 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 | pending review: connection "road-eastnet-nonat-126" checked | checking connection "road-eastnet-nonat-126" for stuck phase 2s (waited 109, patience 3*10) | connection "road-eastnet-nonat-126" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-126" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #378 requesting EVENT_RETRANSMIT to be deleted | #378 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23110 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a23110 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #378 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 | pending review: connection "road-eastnet-nonat-125" checked | checking connection "road-eastnet-nonat-125" for stuck phase 2s (waited 109, patience 3*10) | connection "road-eastnet-nonat-125" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-125" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #377 requesting EVENT_RETRANSMIT to be deleted | #377 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3840060f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46ab64c0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #377 | libevent_malloc: new ptr-libevent@0x7fb3840060f0 size 128 | pending review: connection "road-eastnet-nonat-124" checked | checking connection "road-eastnet-nonat-124" for stuck phase 2s (waited 109, patience 3*10) | connection "road-eastnet-nonat-124" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-124" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #376 requesting EVENT_RETRANSMIT to be deleted | #376 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3540407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338012bf0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb338012bf0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #376 | libevent_malloc: new ptr-libevent@0x7fb3540407f0 size 128 | pending review: connection "road-eastnet-nonat-123" checked | checking connection "road-eastnet-nonat-123" for stuck phase 2s (waited 109, patience 3*10) | connection "road-eastnet-nonat-123" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-123" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #375 requesting EVENT_RETRANSMIT to be deleted | #375 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad43c0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46ad43c0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #375 | libevent_malloc: new ptr-libevent@0x7fb36c04b7c0 size 128 | pending review: connection "road-eastnet-nonat-122" checked | checking connection "road-eastnet-nonat-122" for stuck phase 2s (waited 109, patience 3*10) | connection "road-eastnet-nonat-122" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-122" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #374 requesting EVENT_RETRANSMIT to be deleted | #374 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb338023e10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8d840 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a8d840 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #374 | libevent_malloc: new ptr-libevent@0x7fb338023e10 size 128 | pending review: connection "road-eastnet-nonat-121" checked | checking connection "road-eastnet-nonat-121" for stuck phase 2s (waited 109, patience 3*10) | connection "road-eastnet-nonat-121" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-121" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #373 requesting EVENT_RETRANSMIT to be deleted | #373 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37c023f10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c046090 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb37c046090 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #373 | libevent_malloc: new ptr-libevent@0x7fb37c023f10 size 128 | pending review: connection "road-eastnet-nonat-120" checked | checking connection "road-eastnet-nonat-120" for stuck phase 2s (waited 109, patience 3*10) | connection "road-eastnet-nonat-120" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-120" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #372 requesting EVENT_RETRANSMIT to be deleted | #372 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb38803c430 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800c4b0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb38800c4b0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #372 | libevent_malloc: new ptr-libevent@0x7fb38803c430 size 128 | pending review: connection "road-eastnet-nonat-119" checked | checking connection "road-eastnet-nonat-119" for stuck phase 2s (waited 109, patience 3*10) | connection "road-eastnet-nonat-119" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-119" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #371 requesting EVENT_RETRANSMIT to be deleted | #371 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37c00cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388043350 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb388043350 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #371 | libevent_malloc: new ptr-libevent@0x7fb37c00cf80 size 128 | pending review: connection "road-eastnet-nonat-118" checked | checking connection "road-eastnet-nonat-118" for stuck phase 2s (waited 109, patience 3*10) | connection "road-eastnet-nonat-118" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-118" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #370 requesting EVENT_RETRANSMIT to be deleted | #370 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34c0293f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf50 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a7cf50 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #370 | libevent_malloc: new ptr-libevent@0x7fb34c0293f0 size 128 | pending review: connection "road-eastnet-nonat-117" checked | checking connection "road-eastnet-nonat-117" for stuck phase 2s (waited 110, patience 3*10) | connection "road-eastnet-nonat-117" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-117" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #369 requesting EVENT_RETRANSMIT to be deleted | #369 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3800211f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb38000f8f0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #369 | libevent_malloc: new ptr-libevent@0x7fb3800211f0 size 128 | pending review: connection "road-eastnet-nonat-116" checked | checking connection "road-eastnet-nonat-116" for stuck phase 2s (waited 110, patience 3*10) | connection "road-eastnet-nonat-116" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-116" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #368 requesting EVENT_RETRANSMIT to be deleted | #368 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3440407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2e150 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a2e150 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #368 | libevent_malloc: new ptr-libevent@0x7fb3440407f0 size 128 | pending review: connection "road-eastnet-nonat-115" checked | checking connection "road-eastnet-nonat-115" for stuck phase 2s (waited 110, patience 3*10) | connection "road-eastnet-nonat-115" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-115" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #367 requesting EVENT_RETRANSMIT to be deleted | #367 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb384036e20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840489a0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb3840489a0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #367 | libevent_malloc: new ptr-libevent@0x7fb384036e20 size 128 | pending review: connection "road-eastnet-nonat-114" checked | checking connection "road-eastnet-nonat-114" for stuck phase 2s (waited 110, patience 3*10) | connection "road-eastnet-nonat-114" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-114" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #366 requesting EVENT_RETRANSMIT to be deleted | #366 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b07dc0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46b07dc0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #366 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 | pending review: connection "road-eastnet-nonat-113" checked | checking connection "road-eastnet-nonat-113" for stuck phase 2s (waited 110, patience 3*10) | connection "road-eastnet-nonat-113" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-113" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #365 requesting EVENT_RETRANSMIT to be deleted | #365 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34c03a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fa300 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d469fa300 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #365 | libevent_malloc: new ptr-libevent@0x7fb34c03a770 size 128 | pending review: connection "road-eastnet-nonat-112" checked | checking connection "road-eastnet-nonat-112" for stuck phase 2s (waited 110, patience 3*10) | connection "road-eastnet-nonat-112" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-112" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #364 requesting EVENT_RETRANSMIT to be deleted | #364 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb38802c0a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25cc0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46b25cc0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #364 | libevent_malloc: new ptr-libevent@0x7fb38802c0a0 size 128 | pending review: connection "road-eastnet-nonat-111" checked | checking connection "road-eastnet-nonat-111" for stuck phase 2s (waited 110, patience 3*10) | connection "road-eastnet-nonat-111" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-111" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #363 requesting EVENT_RETRANSMIT to be deleted | #363 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a38f50 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #363 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 | pending review: connection "road-eastnet-nonat-110" checked | checking connection "road-eastnet-nonat-110" for stuck phase 2s (waited 110, patience 3*10) | connection "road-eastnet-nonat-110" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-110" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #362 requesting EVENT_RETRANSMIT to be deleted | #362 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb348023e80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb384002b20 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #362 | libevent_malloc: new ptr-libevent@0x7fb348023e80 size 128 | pending review: connection "road-eastnet-nonat-109" checked | checking connection "road-eastnet-nonat-109" for stuck phase 2s (waited 110, patience 3*10) | connection "road-eastnet-nonat-109" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-109" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #361 requesting EVENT_RETRANSMIT to be deleted | #361 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb358012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800d120 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb35800d120 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #361 | libevent_malloc: new ptr-libevent@0x7fb358012840 size 128 | pending review: connection "road-eastnet-nonat-108" checked | checking connection "road-eastnet-nonat-108" for stuck phase 2s (waited 110, patience 3*10) | connection "road-eastnet-nonat-108" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-108" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #360 requesting EVENT_RETRANSMIT to be deleted | #360 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37002a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad4380 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46ad4380 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #360 | libevent_malloc: new ptr-libevent@0x7fb37002a950 size 128 | pending review: connection "road-eastnet-nonat-107" checked | checking connection "road-eastnet-nonat-107" for stuck phase 2s (waited 110, patience 3*10) | connection "road-eastnet-nonat-107" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-107" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #359 requesting EVENT_RETRANSMIT to be deleted | #359 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb370035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a4d5d0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a4d5d0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #359 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 | pending review: connection "road-eastnet-nonat-106" checked | checking connection "road-eastnet-nonat-106" for stuck phase 2s (waited 110, patience 3*10) | connection "road-eastnet-nonat-106" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-106" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #358 requesting EVENT_RETRANSMIT to be deleted | #358 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37002eb80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb370005860 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #358 | libevent_malloc: new ptr-libevent@0x7fb37002eb80 size 128 | pending review: connection "road-eastnet-nonat-105" checked | checking connection "road-eastnet-nonat-105" for stuck phase 2s (waited 110, patience 3*10) | connection "road-eastnet-nonat-105" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-105" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #357 requesting EVENT_RETRANSMIT to be deleted | #357 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3840266d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400feb0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb38400feb0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #357 | libevent_malloc: new ptr-libevent@0x7fb3840266d0 size 128 | pending review: connection "road-eastnet-nonat-104" checked | checking connection "road-eastnet-nonat-104" for stuck phase 2s (waited 110, patience 3*10) | connection "road-eastnet-nonat-104" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-104" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #356 requesting EVENT_RETRANSMIT to be deleted | #356 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb378035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adb080 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46adb080 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #356 | libevent_malloc: new ptr-libevent@0x7fb378035930 size 128 | pending review: connection "road-eastnet-nonat-103" checked | checking connection "road-eastnet-nonat-103" for stuck phase 2s (waited 111, patience 3*10) | connection "road-eastnet-nonat-103" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-103" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #355 requesting EVENT_RETRANSMIT to be deleted | #355 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb368005860 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #355 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 | pending review: connection "road-eastnet-nonat-102" checked | checking connection "road-eastnet-nonat-102" for stuck phase 2s (waited 111, patience 3*10) | connection "road-eastnet-nonat-102" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-102" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #354 requesting EVENT_RETRANSMIT to be deleted | #354 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb36c005860 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #354 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 | pending review: connection "road-eastnet-nonat-101" checked | checking connection "road-eastnet-nonat-101" for stuck phase 2s (waited 111, patience 3*10) | connection "road-eastnet-nonat-101" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-101" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #353 requesting EVENT_RETRANSMIT to be deleted | #353 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35003f4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35002a9a0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb35002a9a0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #353 | libevent_malloc: new ptr-libevent@0x7fb35003f4e0 size 128 | pending review: connection "road-eastnet-nonat-100" checked | checking connection "road-eastnet-nonat-100" for stuck phase 2s (waited 111, patience 3*10) | connection "road-eastnet-nonat-100" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-100" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #352 requesting EVENT_RETRANSMIT to be deleted | #352 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36001fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000d120 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb36000d120 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #352 | libevent_malloc: new ptr-libevent@0x7fb36001fd50 size 128 | pending review: connection "road-eastnet-nonat-99" checked | checking connection "road-eastnet-nonat-99" for stuck phase 2s (waited 111, patience 3*10) | connection "road-eastnet-nonat-99" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-99" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #351 requesting EVENT_RETRANSMIT to be deleted | #351 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb380011f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c40 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46b12c40 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #351 | libevent_malloc: new ptr-libevent@0x7fb380011f30 size 128 | pending review: connection "road-eastnet-nonat-98" checked | checking connection "road-eastnet-nonat-98" for stuck phase 2s (waited 111, patience 3*10) | connection "road-eastnet-nonat-98" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-98" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #350 requesting EVENT_RETRANSMIT to be deleted | #350 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35c02ec80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c01da80 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb35c01da80 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #350 | libevent_malloc: new ptr-libevent@0x7fb35c02ec80 size 128 | pending review: connection "road-eastnet-nonat-97" checked | checking connection "road-eastnet-nonat-97" for stuck phase 2s (waited 111, patience 3*10) | connection "road-eastnet-nonat-97" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-97" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #349 requesting EVENT_RETRANSMIT to be deleted | #349 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35c04b850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000d120 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb34000d120 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #349 | libevent_malloc: new ptr-libevent@0x7fb35c04b850 size 128 | pending review: connection "road-eastnet-nonat-96" checked | checking connection "road-eastnet-nonat-96" for stuck phase 2s (waited 111, patience 3*10) | connection "road-eastnet-nonat-96" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-96" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #348 requesting EVENT_RETRANSMIT to be deleted | #348 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb33801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800cc10 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb33800cc10 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #348 | libevent_malloc: new ptr-libevent@0x7fb33801a4e0 size 128 | pending review: connection "road-eastnet-nonat-95" checked | checking connection "road-eastnet-nonat-95" for stuck phase 2s (waited 111, patience 3*10) | connection "road-eastnet-nonat-95" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-95" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #347 requesting EVENT_RETRANSMIT to be deleted | #347 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb354035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb380002b20 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #347 | libevent_malloc: new ptr-libevent@0x7fb354035930 size 128 | pending review: connection "road-eastnet-nonat-94" checked | checking connection "road-eastnet-nonat-94" for stuck phase 2s (waited 111, patience 3*10) | connection "road-eastnet-nonat-94" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-94" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #346 requesting EVENT_RETRANSMIT to be deleted | #346 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb33803a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3380300a0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb3380300a0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #346 | libevent_malloc: new ptr-libevent@0x7fb33803a770 size 128 | pending review: connection "road-eastnet-nonat-93" checked | checking connection "road-eastnet-nonat-93" for stuck phase 2s (waited 111, patience 3*10) | connection "road-eastnet-nonat-93" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-93" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #345 requesting EVENT_RETRANSMIT to be deleted | #345 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb380048a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46af78c0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46af78c0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #345 | libevent_malloc: new ptr-libevent@0x7fb380048a80 size 128 | pending review: connection "road-eastnet-nonat-92" checked | checking connection "road-eastnet-nonat-92" for stuck phase 2s (waited 112, patience 3*10) | connection "road-eastnet-nonat-92" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-92" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #344 requesting EVENT_RETRANSMIT to be deleted | #344 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34403b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a73690 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a73690 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #344 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 | pending review: connection "road-eastnet-nonat-91" checked | checking connection "road-eastnet-nonat-91" for stuck phase 2s (waited 112, patience 3*10) | connection "road-eastnet-nonat-91" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-91" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #343 requesting EVENT_RETRANSMIT to be deleted | #343 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb380032bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b650 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a2b650 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #343 | libevent_malloc: new ptr-libevent@0x7fb380032bf0 size 128 | pending review: connection "road-eastnet-nonat-90" checked | checking connection "road-eastnet-nonat-90" for stuck phase 2s (waited 112, patience 3*10) | connection "road-eastnet-nonat-90" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-90" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #342 requesting EVENT_RETRANSMIT to be deleted | #342 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35c023d80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c00cc10 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb35c00cc10 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #342 | libevent_malloc: new ptr-libevent@0x7fb35c023d80 size 128 | pending review: connection "road-eastnet-nonat-89" checked | checking connection "road-eastnet-nonat-89" for stuck phase 2s (waited 112, patience 3*10) | connection "road-eastnet-nonat-89" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-89" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #341 requesting EVENT_RETRANSMIT to be deleted | #341 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb388047480 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46910 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a46910 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #341 | libevent_malloc: new ptr-libevent@0x7fb388047480 size 128 | pending review: connection "road-eastnet-nonat-88" checked | checking connection "road-eastnet-nonat-88" for stuck phase 2s (waited 112, patience 3*10) | connection "road-eastnet-nonat-88" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-88" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #340 requesting EVENT_RETRANSMIT to be deleted | #340 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3380407f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb358005860 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #340 | libevent_malloc: new ptr-libevent@0x7fb3380407f0 size 128 | pending review: connection "road-eastnet-nonat-87" checked | checking connection "road-eastnet-nonat-87" for stuck phase 2s (waited 112, patience 3*10) | connection "road-eastnet-nonat-87" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-87" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #339 requesting EVENT_RETRANSMIT to be deleted | #339 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37801fd50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37800cc10 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb37800cc10 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #339 | libevent_malloc: new ptr-libevent@0x7fb37801fd50 size 128 | pending review: connection "road-eastnet-nonat-86" checked | checking connection "road-eastnet-nonat-86" for stuck phase 2s (waited 112, patience 3*10) | connection "road-eastnet-nonat-86" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-86" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #338 requesting EVENT_RETRANSMIT to be deleted | #338 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36403ae90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348048a60 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb348048a60 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #338 | libevent_malloc: new ptr-libevent@0x7fb36403ae90 size 128 | pending review: connection "road-eastnet-nonat-85" checked | checking connection "road-eastnet-nonat-85" for stuck phase 2s (waited 112, patience 3*10) | connection "road-eastnet-nonat-85" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-85" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #337 requesting EVENT_RETRANSMIT to be deleted | #337 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3700300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a0a9d0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #337 | libevent_malloc: new ptr-libevent@0x7fb3700300e0 size 128 | pending review: connection "road-eastnet-nonat-84" checked | checking connection "road-eastnet-nonat-84" for stuck phase 2s (waited 112, patience 3*10) | connection "road-eastnet-nonat-84" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-84" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #336 requesting EVENT_RETRANSMIT to be deleted | #336 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb38403c470 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840318d0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb3840318d0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #336 | libevent_malloc: new ptr-libevent@0x7fb38403c470 size 128 | pending review: connection "road-eastnet-nonat-83" checked | checking connection "road-eastnet-nonat-83" for stuck phase 2s (waited 112, patience 3*10) | connection "road-eastnet-nonat-83" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-83" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #335 requesting EVENT_RETRANSMIT to be deleted | #335 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350012bf0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb350012bf0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #335 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 | pending review: connection "road-eastnet-nonat-82" checked | checking connection "road-eastnet-nonat-82" for stuck phase 2s (waited 112, patience 3*10) | connection "road-eastnet-nonat-82" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-82" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #334 requesting EVENT_RETRANSMIT to be deleted | #334 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3680180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56dd0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a56dd0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #334 | libevent_malloc: new ptr-libevent@0x7fb3680180b0 size 128 | pending review: connection "road-eastnet-nonat-81" checked | checking connection "road-eastnet-nonat-81" for stuck phase 2s (waited 112, patience 3*10) | connection "road-eastnet-nonat-81" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-81" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #333 requesting EVENT_RETRANSMIT to be deleted | #333 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb388037a30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800f8f0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb38800f8f0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #333 | libevent_malloc: new ptr-libevent@0x7fb388037a30 size 128 | pending review: connection "road-eastnet-nonat-80" checked | checking connection "road-eastnet-nonat-80" for stuck phase 2s (waited 112, patience 3*10) | connection "road-eastnet-nonat-80" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-80" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #332 requesting EVENT_RETRANSMIT to be deleted | #332 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb350035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbbc0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46abbbc0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #332 | libevent_malloc: new ptr-libevent@0x7fb350035930 size 128 | pending review: connection "road-eastnet-nonat-79" checked | checking connection "road-eastnet-nonat-79" for stuck phase 2s (waited 112, patience 3*10) | connection "road-eastnet-nonat-79" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-79" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #331 requesting EVENT_RETRANSMIT to be deleted | #331 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36404b5a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469f8cc0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d469f8cc0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #331 | libevent_malloc: new ptr-libevent@0x7fb36404b5a0 size 128 | pending review: connection "road-eastnet-nonat-78" checked | checking connection "road-eastnet-nonat-78" for stuck phase 2s (waited 113, patience 3*10) | connection "road-eastnet-nonat-78" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-78" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #330 requesting EVENT_RETRANSMIT to be deleted | #330 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab7a80 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46ab7a80 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #330 | libevent_malloc: new ptr-libevent@0x7fb34c0180b0 size 128 | pending review: connection "road-eastnet-nonat-77" checked | checking connection "road-eastnet-nonat-77" for stuck phase 2s (waited 113, patience 3*10) | connection "road-eastnet-nonat-77" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-77" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #329 requesting EVENT_RETRANSMIT to be deleted | #329 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36c039e30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c018210 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb36c018210 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #329 | libevent_malloc: new ptr-libevent@0x7fb36c039e30 size 128 | pending review: connection "road-eastnet-nonat-76" checked | checking connection "road-eastnet-nonat-76" for stuck phase 2s (waited 113, patience 3*10) | connection "road-eastnet-nonat-76" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-76" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #328 requesting EVENT_RETRANSMIT to be deleted | #328 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34c034410 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b10 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a70b10 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #328 | libevent_malloc: new ptr-libevent@0x7fb34c034410 size 128 | pending review: connection "road-eastnet-nonat-75" checked | checking connection "road-eastnet-nonat-75" for stuck phase 2s (waited 113, patience 3*10) | connection "road-eastnet-nonat-75" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-75" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #327 requesting EVENT_RETRANSMIT to be deleted | #327 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34401a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344012bf0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb344012bf0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #327 | libevent_malloc: new ptr-libevent@0x7fb34401a4e0 size 128 | pending review: connection "road-eastnet-nonat-74" checked | checking connection "road-eastnet-nonat-74" for stuck phase 2s (waited 113, patience 3*10) | connection "road-eastnet-nonat-74" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-74" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #326 requesting EVENT_RETRANSMIT to be deleted | #326 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46b0bf40 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #326 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 | pending review: connection "road-eastnet-nonat-73" checked | checking connection "road-eastnet-nonat-73" for stuck phase 2s (waited 113, patience 3*10) | connection "road-eastnet-nonat-73" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-73" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #325 requesting EVENT_RETRANSMIT to be deleted | #325 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35402a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370046090 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb370046090 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #325 | libevent_malloc: new ptr-libevent@0x7fb35402a950 size 128 | pending review: connection "road-eastnet-nonat-72" checked | checking connection "road-eastnet-nonat-72" for stuck phase 2s (waited 113, patience 3*10) | connection "road-eastnet-nonat-72" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-72" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #324 requesting EVENT_RETRANSMIT to be deleted | #324 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a986c0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a986c0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #324 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 | pending review: connection "road-eastnet-nonat-71" checked | checking connection "road-eastnet-nonat-71" for stuck phase 2s (waited 113, patience 3*10) | connection "road-eastnet-nonat-71" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-71" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #323 requesting EVENT_RETRANSMIT to be deleted | #323 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb344035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c80 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46b25c80 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #323 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 | pending review: connection "road-eastnet-nonat-70" checked | checking connection "road-eastnet-nonat-70" for stuck phase 2s (waited 113, patience 3*10) | connection "road-eastnet-nonat-70" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-70" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #322 requesting EVENT_RETRANSMIT to be deleted | #322 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37c04b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a9dd80 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a9dd80 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #322 | libevent_malloc: new ptr-libevent@0x7fb37c04b7c0 size 128 | pending review: connection "road-eastnet-nonat-69" checked | checking connection "road-eastnet-nonat-69" for stuck phase 2s (waited 113, patience 3*10) | connection "road-eastnet-nonat-69" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-69" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #321 requesting EVENT_RETRANSMIT to be deleted | #321 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb384031e80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384043260 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb384043260 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #321 | libevent_malloc: new ptr-libevent@0x7fb384031e80 size 128 | pending review: connection "road-eastnet-nonat-68" checked | checking connection "road-eastnet-nonat-68" for stuck phase 2s (waited 113, patience 3*10) | connection "road-eastnet-nonat-68" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-68" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #320 requesting EVENT_RETRANSMIT to be deleted | #320 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37804b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c012bf0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb35c012bf0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #320 | libevent_malloc: new ptr-libevent@0x7fb37804b7c0 size 128 | pending review: connection "road-eastnet-nonat-67" checked | checking connection "road-eastnet-nonat-67" for stuck phase 2s (waited 113, patience 3*10) | connection "road-eastnet-nonat-67" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-67" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #319 requesting EVENT_RETRANSMIT to be deleted | #319 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36403f0c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a0a990 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #319 | libevent_malloc: new ptr-libevent@0x7fb36403f0c0 size 128 | pending review: connection "road-eastnet-nonat-66" checked | checking connection "road-eastnet-nonat-66" for stuck phase 2s (waited 113, patience 3*10) | connection "road-eastnet-nonat-66" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-66" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #318 requesting EVENT_RETRANSMIT to be deleted | #318 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35803a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35801d710 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb35801d710 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #318 | libevent_malloc: new ptr-libevent@0x7fb35803a770 size 128 | pending review: connection "road-eastnet-nonat-65" checked | checking connection "road-eastnet-nonat-65" for stuck phase 2s (waited 113, patience 3*10) | connection "road-eastnet-nonat-65" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-65" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #317 requesting EVENT_RETRANSMIT to be deleted | #317 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb388027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a72150 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a72150 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #317 | libevent_malloc: new ptr-libevent@0x7fb388027c10 size 128 | pending review: connection "road-eastnet-nonat-64" checked | checking connection "road-eastnet-nonat-64" for stuck phase 2s (waited 114, patience 3*10) | connection "road-eastnet-nonat-64" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-64" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #316 requesting EVENT_RETRANSMIT to be deleted | #316 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb378044ad0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37802a910 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb37802a910 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #316 | libevent_malloc: new ptr-libevent@0x7fb378044ad0 size 128 | pending review: connection "road-eastnet-nonat-63" checked | checking connection "road-eastnet-nonat-63" for stuck phase 2s (waited 114, patience 3*10) | connection "road-eastnet-nonat-63" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-63" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #315 requesting EVENT_RETRANSMIT to be deleted | #315 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb340039ba0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3400296b0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb3400296b0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #315 | libevent_malloc: new ptr-libevent@0x7fb340039ba0 size 128 | pending review: connection "road-eastnet-nonat-62" checked | checking connection "road-eastnet-nonat-62" for stuck phase 2s (waited 114, patience 3*10) | connection "road-eastnet-nonat-62" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-62" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #314 requesting EVENT_RETRANSMIT to be deleted | #314 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb364035750 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a01150 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a01150 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #314 | libevent_malloc: new ptr-libevent@0x7fb364035750 size 128 | pending review: connection "road-eastnet-nonat-61" checked | checking connection "road-eastnet-nonat-61" for stuck phase 2s (waited 114, patience 3*10) | connection "road-eastnet-nonat-61" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-61" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #313 requesting EVENT_RETRANSMIT to be deleted | #313 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb33803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb33800d120 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #313 | libevent_malloc: new ptr-libevent@0x7fb33803b0b0 size 128 | pending review: connection "road-eastnet-nonat-60" checked | checking connection "road-eastnet-nonat-60" for stuck phase 2s (waited 114, patience 3*10) | connection "road-eastnet-nonat-60" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-60" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #312 requesting EVENT_RETRANSMIT to be deleted | #312 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36401a420 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354012bf0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb354012bf0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #312 | libevent_malloc: new ptr-libevent@0x7fb36401a420 size 128 | pending review: connection "road-eastnet-nonat-59" checked | checking connection "road-eastnet-nonat-59" for stuck phase 2s (waited 114, patience 3*10) | connection "road-eastnet-nonat-59" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-59" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #311 requesting EVENT_RETRANSMIT to be deleted | #311 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb338046040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b05240 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46b05240 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #311 | libevent_malloc: new ptr-libevent@0x7fb338046040 size 128 | pending review: connection "road-eastnet-nonat-58" checked | checking connection "road-eastnet-nonat-58" for stuck phase 2s (waited 114, patience 3*10) | connection "road-eastnet-nonat-58" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-58" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #310 requesting EVENT_RETRANSMIT to be deleted | #310 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb354012840 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400d120 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb35400d120 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #310 | libevent_malloc: new ptr-libevent@0x7fb354012840 size 128 | pending review: connection "road-eastnet-nonat-57" checked | checking connection "road-eastnet-nonat-57" for stuck phase 2s (waited 114, patience 3*10) | connection "road-eastnet-nonat-57" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-57" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #309 requesting EVENT_RETRANSMIT to be deleted | #309 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360012bf0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb360012bf0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #309 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 | pending review: connection "road-eastnet-nonat-56" checked | checking connection "road-eastnet-nonat-56" for stuck phase 2s (waited 114, patience 3*10) | connection "road-eastnet-nonat-56" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-56" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #308 requesting EVENT_RETRANSMIT to be deleted | #308 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61c10 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a61c10 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #308 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 | pending review: connection "road-eastnet-nonat-55" checked | checking connection "road-eastnet-nonat-55" for stuck phase 2s (waited 114, patience 3*10) | connection "road-eastnet-nonat-55" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-55" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #307 requesting EVENT_RETRANSMIT to be deleted | #307 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb38801d010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388009ed0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb388009ed0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #307 | libevent_malloc: new ptr-libevent@0x7fb38801d010 size 128 | pending review: connection "road-eastnet-nonat-54" checked | checking connection "road-eastnet-nonat-54" for stuck phase 2s (waited 114, patience 3*10) | connection "road-eastnet-nonat-54" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-54" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #306 requesting EVENT_RETRANSMIT to be deleted | #306 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a903c0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a903c0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #306 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 | pending review: connection "road-eastnet-nonat-53" checked | checking connection "road-eastnet-nonat-53" for stuck phase 2s (waited 114, patience 3*10) | connection "road-eastnet-nonat-53" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-53" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #305 requesting EVENT_RETRANSMIT to be deleted | #305 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb344039b40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344017ea0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb344017ea0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #305 | libevent_malloc: new ptr-libevent@0x7fb344039b40 size 128 | pending review: connection "road-eastnet-nonat-52" checked | checking connection "road-eastnet-nonat-52" for stuck phase 2s (waited 115, patience 3*10) | connection "road-eastnet-nonat-52" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-52" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #304 requesting EVENT_RETRANSMIT to be deleted | #304 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35c029490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c03b100 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb35c03b100 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #304 | libevent_malloc: new ptr-libevent@0x7fb35c029490 size 128 | pending review: connection "road-eastnet-nonat-51" checked | checking connection "road-eastnet-nonat-51" for stuck phase 2s (waited 115, patience 3*10) | connection "road-eastnet-nonat-51" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-51" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #303 requesting EVENT_RETRANSMIT to be deleted | #303 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb38002d3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a76210 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a76210 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #303 | libevent_malloc: new ptr-libevent@0x7fb38002d3a0 size 128 | pending review: connection "road-eastnet-nonat-50" checked | checking connection "road-eastnet-nonat-50" for stuck phase 2s (waited 115, patience 3*10) | connection "road-eastnet-nonat-50" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-50" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #302 requesting EVENT_RETRANSMIT to be deleted | #302 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb354044a20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354046090 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb354046090 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #302 | libevent_malloc: new ptr-libevent@0x7fb354044a20 size 128 | pending review: connection "road-eastnet-nonat-49" checked | checking connection "road-eastnet-nonat-49" for stuck phase 2s (waited 115, patience 3*10) | connection "road-eastnet-nonat-49" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-49" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #301 requesting EVENT_RETRANSMIT to be deleted | #301 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3500300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3600129a0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb3600129a0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #301 | libevent_malloc: new ptr-libevent@0x7fb3500300e0 size 128 | pending review: connection "road-eastnet-nonat-48" checked | checking connection "road-eastnet-nonat-48" for stuck phase 2s (waited 115, patience 3*10) | connection "road-eastnet-nonat-48" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-48" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #300 requesting EVENT_RETRANSMIT to be deleted | #300 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb34c005860 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #300 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 | pending review: connection "road-eastnet-nonat-47" checked | checking connection "road-eastnet-nonat-47" for stuck phase 2s (waited 115, patience 3*10) | connection "road-eastnet-nonat-47" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-47" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #299 requesting EVENT_RETRANSMIT to be deleted | #299 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c01fda0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb37c01fda0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #299 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 | pending review: connection "road-eastnet-nonat-46" checked | checking connection "road-eastnet-nonat-46" for stuck phase 2s (waited 115, patience 3*10) | connection "road-eastnet-nonat-46" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-46" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #298 requesting EVENT_RETRANSMIT to be deleted | #298 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36401f4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c00d120 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb37c00d120 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #298 | libevent_malloc: new ptr-libevent@0x7fb36401f4e0 size 128 | pending review: connection "road-eastnet-nonat-45" checked | checking connection "road-eastnet-nonat-45" for stuck phase 2s (waited 115, patience 3*10) | connection "road-eastnet-nonat-45" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-45" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #297 requesting EVENT_RETRANSMIT to be deleted | #297 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35804b970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800cfd0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb35800cfd0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #297 | libevent_malloc: new ptr-libevent@0x7fb35804b970 size 128 | pending review: connection "road-eastnet-nonat-44" checked | checking connection "road-eastnet-nonat-44" for stuck phase 2s (waited 115, patience 3*10) | connection "road-eastnet-nonat-44" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-44" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #296 requesting EVENT_RETRANSMIT to be deleted | #296 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb38802d3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360018460 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb360018460 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #296 | libevent_malloc: new ptr-libevent@0x7fb38802d3a0 size 128 | pending review: connection "road-eastnet-nonat-43" checked | checking connection "road-eastnet-nonat-43" for stuck phase 2s (waited 115, patience 3*10) | connection "road-eastnet-nonat-43" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-43" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #295 requesting EVENT_RETRANSMIT to be deleted | #295 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb368023e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368017ea0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb368017ea0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #295 | libevent_malloc: new ptr-libevent@0x7fb368023e60 size 128 | pending review: connection "road-eastnet-nonat-42" checked | checking connection "road-eastnet-nonat-42" for stuck phase 2s (waited 115, patience 3*10) | connection "road-eastnet-nonat-42" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-42" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #294 requesting EVENT_RETRANSMIT to be deleted | #294 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36c044a20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c01d970 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb36c01d970 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #294 | libevent_malloc: new ptr-libevent@0x7fb36c044a20 size 128 | pending review: connection "road-eastnet-nonat-41" checked | checking connection "road-eastnet-nonat-41" for stuck phase 2s (waited 115, patience 3*10) | connection "road-eastnet-nonat-41" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-41" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #293 requesting EVENT_RETRANSMIT to be deleted | #293 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb374029410 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374045e40 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb374045e40 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #293 | libevent_malloc: new ptr-libevent@0x7fb374029410 size 128 | pending review: connection "road-eastnet-nonat-40" checked | checking connection "road-eastnet-nonat-40" for stuck phase 2s (waited 115, patience 3*10) | connection "road-eastnet-nonat-40" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-40" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #292 requesting EVENT_RETRANSMIT to be deleted | #292 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb348014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378012bf0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb378012bf0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #292 | libevent_malloc: new ptr-libevent@0x7fb348014c70 size 128 | pending review: connection "road-eastnet-nonat-39" checked | checking connection "road-eastnet-nonat-39" for stuck phase 2s (waited 115, patience 3*10) | connection "road-eastnet-nonat-39" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-39" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #291 requesting EVENT_RETRANSMIT to be deleted | #291 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358018460 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb358018460 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #291 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 | pending review: connection "road-eastnet-nonat-38" checked | checking connection "road-eastnet-nonat-38" for stuck phase 2s (waited 116, patience 3*10) | connection "road-eastnet-nonat-38" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-38" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #290 requesting EVENT_RETRANSMIT to be deleted | #290 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378046090 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb378046090 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #290 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 | pending review: connection "road-eastnet-nonat-37" checked | checking connection "road-eastnet-nonat-37" for stuck phase 2s (waited 116, patience 3*10) | connection "road-eastnet-nonat-37" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-37" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #289 requesting EVENT_RETRANSMIT to be deleted | #289 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34c03f170 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e490 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a7e490 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #289 | libevent_malloc: new ptr-libevent@0x7fb34c03f170 size 128 | pending review: connection "road-eastnet-nonat-36" checked | checking connection "road-eastnet-nonat-36" for stuck phase 2s (waited 116, patience 3*10) | connection "road-eastnet-nonat-36" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-36" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #288 requesting EVENT_RETRANSMIT to be deleted | #288 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37401f7f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37400cc10 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb37400cc10 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #288 | libevent_malloc: new ptr-libevent@0x7fb37401f7f0 size 128 | pending review: connection "road-eastnet-nonat-35" checked | checking connection "road-eastnet-nonat-35" for stuck phase 2s (waited 116, patience 3*10) | connection "road-eastnet-nonat-35" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-35" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #287 requesting EVENT_RETRANSMIT to be deleted | #287 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3400343b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34001fa80 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb34001fa80 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #287 | libevent_malloc: new ptr-libevent@0x7fb3400343b0 size 128 | pending review: connection "road-eastnet-nonat-34" checked | checking connection "road-eastnet-nonat-34" for stuck phase 2s (waited 116, patience 3*10) | connection "road-eastnet-nonat-34" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-34" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #286 requesting EVENT_RETRANSMIT to be deleted | #286 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34c00f1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a02770 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #286 | libevent_malloc: new ptr-libevent@0x7fb34c00f1a0 size 128 | pending review: connection "road-eastnet-nonat-33" checked | checking connection "road-eastnet-nonat-33" for stuck phase 2s (waited 116, patience 3*10) | connection "road-eastnet-nonat-33" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-33" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #285 requesting EVENT_RETRANSMIT to be deleted | #285 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb38001abe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3680129a0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb3680129a0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #285 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 | pending review: connection "road-eastnet-nonat-32" checked | checking connection "road-eastnet-nonat-32" for stuck phase 2s (waited 116, patience 3*10) | connection "road-eastnet-nonat-32" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-32" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #284 requesting EVENT_RETRANSMIT to be deleted | #284 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35000cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378012890 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb378012890 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #284 | libevent_malloc: new ptr-libevent@0x7fb35000cf80 size 128 | pending review: connection "road-eastnet-nonat-31" checked | checking connection "road-eastnet-nonat-31" for stuck phase 2s (waited 116, patience 3*10) | connection "road-eastnet-nonat-31" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-31" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #283 requesting EVENT_RETRANSMIT to be deleted | #283 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37c014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb354005860 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #283 | libevent_malloc: new ptr-libevent@0x7fb37c014c70 size 128 | pending review: connection "road-eastnet-nonat-30" checked | checking connection "road-eastnet-nonat-30" for stuck phase 2s (waited 116, patience 3*10) | connection "road-eastnet-nonat-30" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-30" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #282 requesting EVENT_RETRANSMIT to be deleted | #282 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35802ed90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358017ea0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb358017ea0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #282 | libevent_malloc: new ptr-libevent@0x7fb35802ed90 size 128 | pending review: connection "road-eastnet-nonat-29" checked | checking connection "road-eastnet-nonat-29" for stuck phase 2s (waited 116, patience 3*10) | connection "road-eastnet-nonat-29" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-29" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #281 requesting EVENT_RETRANSMIT to be deleted | #281 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb388041ce0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388006950 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb388006950 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #281 | libevent_malloc: new ptr-libevent@0x7fb388041ce0 size 128 | pending review: connection "road-eastnet-nonat-28" checked | checking connection "road-eastnet-nonat-28" for stuck phase 2s (waited 116, patience 3*10) | connection "road-eastnet-nonat-28" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-28" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #280 requesting EVENT_RETRANSMIT to be deleted | #280 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb380036d70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000a290 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb38000a290 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #280 | libevent_malloc: new ptr-libevent@0x7fb380036d70 size 128 | pending review: connection "road-eastnet-nonat-27" checked | checking connection "road-eastnet-nonat-27" for stuck phase 2s (waited 116, patience 3*10) | connection "road-eastnet-nonat-27" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-27" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #279 requesting EVENT_RETRANSMIT to be deleted | #279 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34001e520 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000f1f0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb34000f1f0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #279 | libevent_malloc: new ptr-libevent@0x7fb34001e520 size 128 | pending review: connection "road-eastnet-nonat-26" checked | checking connection "road-eastnet-nonat-26" for stuck phase 2s (waited 116, patience 3*10) | connection "road-eastnet-nonat-26" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-26" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #278 requesting EVENT_RETRANSMIT to be deleted | #278 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3740356e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa1f00 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46aa1f00 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #278 | libevent_malloc: new ptr-libevent@0x7fb3740356e0 size 128 | pending review: connection "road-eastnet-nonat-25" checked | checking connection "road-eastnet-nonat-25" for stuck phase 2s (waited 116, patience 3*10) | connection "road-eastnet-nonat-25" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-25" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #277 requesting EVENT_RETRANSMIT to be deleted | #277 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36001d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cc10 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a2cc10 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #277 | libevent_malloc: new ptr-libevent@0x7fb36001d920 size 128 | pending review: connection "road-eastnet-nonat-24" checked | checking connection "road-eastnet-nonat-24" for stuck phase 2s (waited 117, patience 3*10) | connection "road-eastnet-nonat-24" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-24" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #276 requesting EVENT_RETRANSMIT to be deleted | #276 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3880210c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a60690 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a60690 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #276 | libevent_malloc: new ptr-libevent@0x7fb3880210c0 size 128 | pending review: connection "road-eastnet-nonat-23" checked | checking connection "road-eastnet-nonat-23" for stuck phase 2s (waited 117, patience 3*10) | connection "road-eastnet-nonat-23" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-23" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #275 requesting EVENT_RETRANSMIT to be deleted | #275 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb360035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac7f80 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46ac7f80 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #275 | libevent_malloc: new ptr-libevent@0x7fb360035930 size 128 | pending review: connection "road-eastnet-nonat-22" checked | checking connection "road-eastnet-nonat-22" for stuck phase 2s (waited 117, patience 3*10) | connection "road-eastnet-nonat-22" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-22" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #274 requesting EVENT_RETRANSMIT to be deleted | #274 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36803f270 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1da10 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a1da10 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #274 | libevent_malloc: new ptr-libevent@0x7fb36803f270 size 128 | pending review: connection "road-eastnet-nonat-21" checked | checking connection "road-eastnet-nonat-21" for stuck phase 2s (waited 117, patience 3*10) | connection "road-eastnet-nonat-21" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-21" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #273 requesting EVENT_RETRANSMIT to be deleted | #273 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37401f6b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374023ce0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb374023ce0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #273 | libevent_malloc: new ptr-libevent@0x7fb37401f6b0 size 128 | pending review: connection "road-eastnet-nonat-20" checked | checking connection "road-eastnet-nonat-20" for stuck phase 2s (waited 117, patience 3*10) | connection "road-eastnet-nonat-20" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-20" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #272 requesting EVENT_RETRANSMIT to be deleted | #272 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35403f170 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354025320 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb354025320 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #272 | libevent_malloc: new ptr-libevent@0x7fb35403f170 size 128 | pending review: connection "road-eastnet-nonat-19" checked | checking connection "road-eastnet-nonat-19" for stuck phase 2s (waited 117, patience 3*10) | connection "road-eastnet-nonat-19" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-19" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #271 requesting EVENT_RETRANSMIT to be deleted | #271 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb38402bf10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400a290 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb38400a290 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #271 | libevent_malloc: new ptr-libevent@0x7fb38402bf10 size 128 | pending review: connection "road-eastnet-nonat-18" checked | checking connection "road-eastnet-nonat-18" for stuck phase 2s (waited 117, patience 3*10) | connection "road-eastnet-nonat-18" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-18" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #270 requesting EVENT_RETRANSMIT to be deleted | #270 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb354009640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c046090 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb35c046090 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #270 | libevent_malloc: new ptr-libevent@0x7fb354009640 size 128 | pending review: connection "road-eastnet-nonat-17" checked | checking connection "road-eastnet-nonat-17" for stuck phase 2s (waited 117, patience 3*10) | connection "road-eastnet-nonat-17" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-17" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #269 requesting EVENT_RETRANSMIT to be deleted | #269 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb35c005860 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #269 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 | pending review: connection "road-eastnet-nonat-16" checked | checking connection "road-eastnet-nonat-16" for stuck phase 2s (waited 117, patience 3*10) | connection "road-eastnet-nonat-16" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-16" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #268 requesting EVENT_RETRANSMIT to be deleted | #268 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb360023dd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36003b100 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb36003b100 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #268 | libevent_malloc: new ptr-libevent@0x7fb360023dd0 size 128 | pending review: connection "road-eastnet-nonat-15" checked | checking connection "road-eastnet-nonat-15" for stuck phase 2s (waited 118, patience 3*10) | connection "road-eastnet-nonat-15" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-15" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #267 requesting EVENT_RETRANSMIT to be deleted | #267 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5da90 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a5da90 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #267 | libevent_malloc: new ptr-libevent@0x7fb37c035930 size 128 | pending review: connection "road-eastnet-nonat-14" checked | checking connection "road-eastnet-nonat-14" for stuck phase 2s (waited 118, patience 3*10) | connection "road-eastnet-nonat-14" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-14" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #266 requesting EVENT_RETRANSMIT to be deleted | #266 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3600180b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a43dd0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a43dd0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #266 | libevent_malloc: new ptr-libevent@0x7fb3600180b0 size 128 | pending review: connection "road-eastnet-nonat-13" checked | checking connection "road-eastnet-nonat-13" for stuck phase 2s (waited 118, patience 3*10) | connection "road-eastnet-nonat-13" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-13" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #265 requesting EVENT_RETRANSMIT to be deleted | #265 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37003f490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3700407b0 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb3700407b0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #265 | libevent_malloc: new ptr-libevent@0x7fb37003f490 size 128 | pending review: connection "road-eastnet-nonat-12" checked | checking connection "road-eastnet-nonat-12" for stuck phase 2s (waited 118, patience 3*10) | connection "road-eastnet-nonat-12" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-12" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #264 requesting EVENT_RETRANSMIT to be deleted | #264 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb35801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5af90 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a5af90 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #264 | libevent_malloc: new ptr-libevent@0x7fb35801d920 size 128 | pending review: connection "road-eastnet-nonat-11" checked | checking connection "road-eastnet-nonat-11" for stuck phase 2s (waited 118, patience 3*10) | connection "road-eastnet-nonat-11" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-11" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #263 requesting EVENT_RETRANSMIT to be deleted | #263 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb37403ae20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46ad6ec0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #263 | libevent_malloc: new ptr-libevent@0x7fb37403ae20 size 128 | pending review: connection "road-eastnet-nonat-10" checked | checking connection "road-eastnet-nonat-10" for stuck phase 2s (waited 118, patience 3*10) | connection "road-eastnet-nonat-10" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-10" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #262 requesting EVENT_RETRANSMIT to be deleted | #262 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb344034470 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acab00 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46acab00 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #262 | libevent_malloc: new ptr-libevent@0x7fb344034470 size 128 | pending review: connection "road-eastnet-nonat-9" checked | checking connection "road-eastnet-nonat-9" for stuck phase 2s (waited 118, patience 3*10) | connection "road-eastnet-nonat-9" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-9" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #261 requesting EVENT_RETRANSMIT to be deleted | #261 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb344014c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374013710 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb374013710 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #261 | libevent_malloc: new ptr-libevent@0x7fb344014c70 size 128 | pending review: connection "road-eastnet-nonat-8" checked | checking connection "road-eastnet-nonat-8" for stuck phase 2s (waited 118, patience 3*10) | connection "road-eastnet-nonat-8" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-8" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #260 requesting EVENT_RETRANSMIT to be deleted | #260 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36802a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a23190 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #260 | libevent_malloc: new ptr-libevent@0x7fb36802a950 size 128 | pending review: connection "road-eastnet-nonat-7" checked | checking connection "road-eastnet-nonat-7" for stuck phase 2s (waited 118, patience 3*10) | connection "road-eastnet-nonat-7" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-7" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #259 requesting EVENT_RETRANSMIT to be deleted | #259 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb3500342b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350040840 | event_schedule: new EVENT_SA_REPLACE-pe@0x7fb350040840 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #259 | libevent_malloc: new ptr-libevent@0x7fb3500342b0 size 128 | pending review: connection "road-eastnet-nonat-6" checked | checking connection "road-eastnet-nonat-6" for stuck phase 2s (waited 118, patience 3*10) | connection "road-eastnet-nonat-6" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-6" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #258 requesting EVENT_RETRANSMIT to be deleted | #258 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34c0300e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad5900 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46ad5900 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #258 | libevent_malloc: new ptr-libevent@0x7fb34c0300e0 size 128 | pending review: connection "road-eastnet-nonat-5" checked | checking connection "road-eastnet-nonat-5" for stuck phase 2s (waited 119, patience 3*10) | connection "road-eastnet-nonat-5" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-5" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #257 requesting EVENT_RETRANSMIT to be deleted | #257 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb338023a60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a84000 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a84000 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #257 | libevent_malloc: new ptr-libevent@0x7fb338023a60 size 128 | pending review: connection "road-eastnet-nonat-4" checked | checking connection "road-eastnet-nonat-4" for stuck phase 2s (waited 119, patience 3*10) | connection "road-eastnet-nonat-4" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-4" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #256 requesting EVENT_RETRANSMIT to be deleted | #256 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a276e0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a276e0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #256 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 | pending review: connection "road-eastnet-nonat-3" checked | checking connection "road-eastnet-nonat-3" for stuck phase 2s (waited 119, patience 3*10) | connection "road-eastnet-nonat-3" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-3" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #255 requesting EVENT_RETRANSMIT to be deleted | #255 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb36c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac69c0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46ac69c0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #255 | libevent_malloc: new ptr-libevent@0x7fb36c035930 size 128 | pending review: connection "road-eastnet-nonat-2" checked | checking connection "road-eastnet-nonat-2" for stuck phase 2s (waited 119, patience 3*10) | connection "road-eastnet-nonat-2" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-2" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #254 requesting EVENT_RETRANSMIT to be deleted | #254 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb34c035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b246c0 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46b246c0 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #254 | libevent_malloc: new ptr-libevent@0x7fb34c035930 size 128 | pending review: connection "road-eastnet-nonat-1" checked | checking connection "road-eastnet-nonat-1" for stuck phase 2s (waited 119, patience 3*10) | connection "road-eastnet-nonat-1" stuck, restarting pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-1" took too long -- replacing phase 1 | FOR_EACH_STATE_... in find_phase1_state | state #253 requesting EVENT_RETRANSMIT to be deleted | #253 STATE_PARENT_I1: retransmits: cleared | libevent_free: release ptr-libevent@0x7fb364034150 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a88140 | event_schedule: new EVENT_SA_REPLACE-pe@0x557d46a88140 | inserting event EVENT_SA_REPLACE, timeout in 0 seconds for #253 | libevent_malloc: new ptr-libevent@0x7fb364034150 size 128 | pending review: connection "road-eastnet-nonat-base" was not up, skipped | spent 5.21 milliseconds in global timer EVENT_PENDING_PHASE2 | timer_event_cb: processing event@0x557d46a46950 | handling event EVENT_SA_REPLACE for parent state #504 | start processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #504 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #505 at 0x557d46b2be40 | State DB: adding IKEv2 state #505 in UNDEFINED | pstats #505 ikev2.ike started | Message ID: init #505: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #505: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #505; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #505 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-252" #505: initiating v2 parent SA to replace #504 | using existing local IKE proposals for connection road-eastnet-nonat-252 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 505 for state #505 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46af8e80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #505 | libevent_malloc: new ptr-libevent@0x7fb384038240 size 128 | #505 spent 0.0651 milliseconds in ikev2_parent_outI1() | crypto helper 10 resuming | RESET processing: state #505 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 10 starting work-order 505 for state #505 | event_schedule: new EVENT_SA_EXPIRE-pe@0x7fb37800d120 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 505 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #504 | libevent_malloc: new ptr-libevent@0x7fb3380251c0 size 128 | libevent_free: release ptr-libevent@0x7fb3580180b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a46950 | #504 spent 0.112 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a88140 | handling event EVENT_SA_REPLACE for parent state #253 | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #253 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #506 at 0x557d46b2f6e0 | State DB: adding IKEv2 state #506 in UNDEFINED | pstats #506 ikev2.ike started | Message ID: init #506: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #506: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #506; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #506 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-1" #506: initiating v2 parent SA to replace #253 | using existing local IKE proposals for connection road-eastnet-nonat-1 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 506 for state #506 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a46950 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #506 | libevent_malloc: new ptr-libevent@0x7fb3580180b0 size 128 | #506 spent 0.0688 milliseconds in ikev2_parent_outI1() | crypto helper 14 resuming | RESET processing: state #506 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x7fb38400a3e0 | crypto helper 14 starting work-order 506 for state #506 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #253 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 506 | libevent_malloc: new ptr-libevent@0x7fb37c03b0b0 size 128 | libevent_free: release ptr-libevent@0x7fb364034150 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a88140 | #253 spent 0.119 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a6e010 | handling event EVENT_SA_REPLACE for parent state #495 | start processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #495 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #507 at 0x557d46b30d50 | State DB: adding IKEv2 state #507 in UNDEFINED | pstats #507 ikev2.ike started | Message ID: init #507: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #507: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #507; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #507 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-243" #507: initiating v2 parent SA to replace #495 | using existing local IKE proposals for connection road-eastnet-nonat-243 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 507 for state #507 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a88140 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #507 | libevent_malloc: new ptr-libevent@0x7fb364034150 size 128 | #507 spent 0.0617 milliseconds in ikev2_parent_outI1() | crypto helper 15 resuming | crypto helper 15 starting work-order 507 for state #507 | RESET processing: state #507 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x7fb38000a3e0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #495 | libevent_malloc: new ptr-libevent@0x7fb36401f860 size 128 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 507 | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a6e010 | #495 spent 0.109 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37000d120 | handling event EVENT_SA_REPLACE for parent state #494 | start processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #494 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #508 at 0x557d46b323c0 | State DB: adding IKEv2 state #508 in UNDEFINED | pstats #508 ikev2.ike started | Message ID: init #508: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #508: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #508; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #508 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-242" #508: initiating v2 parent SA to replace #494 | using existing local IKE proposals for connection road-eastnet-nonat-242 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 508 for state #508 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a6e010 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #508 | libevent_malloc: new ptr-libevent@0x7fb3540180b0 size 128 | #508 spent 0.0613 milliseconds in ikev2_parent_outI1() | crypto helper 19 resuming | RESET processing: state #508 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 19 starting work-order 508 for state #508 | event_schedule: new EVENT_SA_EXPIRE-pe@0x7fb38800a3e0 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 508 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #494 | libevent_malloc: new ptr-libevent@0x7fb348009640 size 128 | libevent_free: release ptr-libevent@0x7fb370029490 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb37000d120 | #494 spent 0.103 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3840223f0 | handling event EVENT_SA_REPLACE for parent state #488 | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #488 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #509 at 0x557d46b33a30 | State DB: adding IKEv2 state #509 in UNDEFINED | pstats #509 ikev2.ike started | Message ID: init #509: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #509: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #509; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #509 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-236" #509: initiating v2 parent SA to replace #488 | using existing local IKE proposals for connection road-eastnet-nonat-236 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 509 for state #509 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37000d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #509 | libevent_malloc: new ptr-libevent@0x7fb370029490 size 128 | #509 spent 0.0603 milliseconds in ikev2_parent_outI1() | crypto helper 6 resuming | RESET processing: state #509 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46906b40 | crypto helper 6 starting work-order 509 for state #509 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #488 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 509 | libevent_malloc: new ptr-libevent@0x7fb33802a950 size 128 | libevent_free: release ptr-libevent@0x7fb384041c10 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb3840223f0 | #488 spent 0.103 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_SA_REPLACE for parent state #354 | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #354 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #510 at 0x557d46b350a0 | State DB: adding IKEv2 state #510 in UNDEFINED | pstats #510 ikev2.ike started | Message ID: init #510: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #510: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #510; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #510 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-102" #510: initiating v2 parent SA to replace #354 | using existing local IKE proposals for connection road-eastnet-nonat-102 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 510 for state #510 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb3840223f0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #510 | libevent_malloc: new ptr-libevent@0x7fb384041c10 size 128 | #510 spent 0.0744 milliseconds in ikev2_parent_outI1() | crypto helper 11 resuming | RESET processing: state #510 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 11 starting work-order 510 for state #510 | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a90440 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 510 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #354 | libevent_malloc: new ptr-libevent@0x557d46906b80 size 128 | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb36c005860 | #354 spent 0.117 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_SA_REPLACE for parent state #340 | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #340 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #511 at 0x557d46b36710 | State DB: adding IKEv2 state #511 in UNDEFINED | pstats #511 ikev2.ike started | Message ID: init #511: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #511: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #511; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #511 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-88" #511: initiating v2 parent SA to replace #340 | using existing local IKE proposals for connection road-eastnet-nonat-88 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 511 for state #511 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a42790 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #511 | libevent_malloc: new ptr-libevent@0x7fb34000cf80 size 128 | #511 spent 0.057 milliseconds in ikev2_parent_outI1() | RESET processing: state #511 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a69e50 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #340 | crypto helper 16 resuming | libevent_malloc: new ptr-libevent@0x557d469d92d0 size 128 | crypto helper 16 starting work-order 511 for state #511 | libevent_free: release ptr-libevent@0x7fb3380407f0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb358005860 | #340 spent 0.112 milliseconds in timer_event_cb() EVENT_SA_REPLACE | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 511 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370012890 | handling event EVENT_SA_REPLACE for parent state #392 | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #392 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #512 at 0x557d46b37d80 | State DB: adding IKEv2 state #512 in UNDEFINED | pstats #512 ikev2.ike started | Message ID: init #512: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #512: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #512; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #512 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-140" #512: initiating v2 parent SA to replace #392 | using existing local IKE proposals for connection road-eastnet-nonat-140 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 512 for state #512 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb358005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #512 | libevent_malloc: new ptr-libevent@0x7fb3380407f0 size 128 | #512 spent 0.0735 milliseconds in ikev2_parent_outI1() | crypto helper 4 resuming | RESET processing: state #512 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a672d0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #392 | libevent_malloc: new ptr-libevent@0x557d46a30d30 size 128 | libevent_free: release ptr-libevent@0x7fb37003a770 | crypto helper 4 starting work-order 512 for state #512 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb370012890 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 512 | #392 spent 0.118 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a4d5d0 | handling event EVENT_SA_REPLACE for parent state #359 | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #359 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #513 at 0x557d46b393f0 | State DB: adding IKEv2 state #513 in UNDEFINED | pstats #513 ikev2.ike started | Message ID: init #513: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #513: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #513; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #513 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-107" #513: initiating v2 parent SA to replace #359 | using existing local IKE proposals for connection road-eastnet-nonat-107 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 513 for state #513 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb370012890 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #513 | libevent_malloc: new ptr-libevent@0x7fb37003a770 size 128 | #513 spent 0.0569 milliseconds in ikev2_parent_outI1() | RESET processing: state #513 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b0a980 | crypto helper 13 resuming | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #359 | libevent_malloc: new ptr-libevent@0x557d46a28ab0 size 128 | libevent_free: release ptr-libevent@0x7fb370035930 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a4d5d0 | crypto helper 13 starting work-order 513 for state #513 | #359 spent 0.103 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 513 | timer_event_cb: processing event@0x7fb3680129a0 | handling event EVENT_SA_REPLACE for parent state #285 | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #285 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #514 at 0x557d46b3aa60 | State DB: adding IKEv2 state #514 in UNDEFINED | pstats #514 ikev2.ike started | Message ID: init #514: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #514: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #514; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #514 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-33" #514: initiating v2 parent SA to replace #285 | using existing local IKE proposals for connection road-eastnet-nonat-33 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 514 for state #514 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4d5d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #514 | libevent_malloc: new ptr-libevent@0x7fb370035930 size 128 | #514 spent 0.0419 milliseconds in ikev2_parent_outI1() | crypto helper 17 resuming | RESET processing: state #514 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a1c450 | crypto helper 17 starting work-order 514 for state #514 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #285 | libevent_malloc: new ptr-libevent@0x557d46a67330 size 128 | libevent_free: release ptr-libevent@0x7fb38001abe0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb3680129a0 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 514 | #285 spent 0.0768 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb344012bf0 | handling event EVENT_SA_REPLACE for parent state #327 | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #327 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #515 at 0x557d46b3c0d0 | State DB: adding IKEv2 state #515 in UNDEFINED | pstats #515 ikev2.ike started | Message ID: init #515: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #515: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #515; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #515 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-75" #515: initiating v2 parent SA to replace #327 | using existing local IKE proposals for connection road-eastnet-nonat-75 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 515 for state #515 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb3680129a0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #515 | libevent_malloc: new ptr-libevent@0x7fb38001abe0 size 128 | #515 spent 0.0399 milliseconds in ikev2_parent_outI1() | crypto helper 18 resuming | RESET processing: state #515 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a2b5d0 | crypto helper 18 starting work-order 515 for state #515 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #327 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 515 | libevent_malloc: new ptr-libevent@0x557d46a56e30 size 128 | libevent_free: release ptr-libevent@0x7fb34401a4e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb344012bf0 | #327 spent 0.0825 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a9dd80 | handling event EVENT_SA_REPLACE for parent state #322 | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #322 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #516 at 0x557d46b3d740 | State DB: adding IKEv2 state #516 in UNDEFINED | pstats #516 ikev2.ike started | Message ID: init #516: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #516: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #516; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #516 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-70" #516: initiating v2 parent SA to replace #322 | using existing local IKE proposals for connection road-eastnet-nonat-70 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 516 for state #516 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb344012bf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #516 | libevent_malloc: new ptr-libevent@0x7fb34401a4e0 size 128 | #516 spent 0.0434 milliseconds in ikev2_parent_outI1() | RESET processing: state #516 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 7 resuming | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d469fbb00 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #322 | crypto helper 7 starting work-order 516 for state #516 | libevent_malloc: new ptr-libevent@0x557d469e1b60 size 128 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 516 | libevent_free: release ptr-libevent@0x7fb37c04b7c0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a9dd80 | #322 spent 0.0787 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c03b100 | handling event EVENT_SA_REPLACE for parent state #304 | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #304 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #517 at 0x557d46b3edb0 | State DB: adding IKEv2 state #517 in UNDEFINED | pstats #517 ikev2.ike started | Message ID: init #517: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #517: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #517; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #517 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-52" #517: initiating v2 parent SA to replace #304 | using existing local IKE proposals for connection road-eastnet-nonat-52 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 517 for state #517 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9dd80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #517 | libevent_malloc: new ptr-libevent@0x7fb37c04b7c0 size 128 | #517 spent 0.0395 milliseconds in ikev2_parent_outI1() | crypto helper 8 resuming | RESET processing: state #517 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 8 starting work-order 517 for state #517 | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a6f550 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 517 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #304 | libevent_malloc: new ptr-libevent@0x557d46af7900 size 128 | libevent_free: release ptr-libevent@0x7fb35c029490 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb35c03b100 | #304 spent 0.0756 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35800cfd0 | handling event EVENT_SA_REPLACE for parent state #297 | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #297 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #518 at 0x557d46b40420 | State DB: adding IKEv2 state #518 in UNDEFINED | pstats #518 ikev2.ike started | Message ID: init #518: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #518: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #518; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #518 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-45" #518: initiating v2 parent SA to replace #297 | using existing local IKE proposals for connection road-eastnet-nonat-45 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 518 for state #518 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a45310 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #518 | libevent_malloc: new ptr-libevent@0x7fb35c029490 size 128 | #518 spent 0.0398 milliseconds in ikev2_parent_outI1() | RESET processing: state #518 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 12 resuming | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a1af10 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #297 | libevent_malloc: new ptr-libevent@0x557d46acab40 size 128 | crypto helper 12 starting work-order 518 for state #518 | libevent_free: release ptr-libevent@0x7fb35804b970 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 518 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb35800cfd0 | #297 spent 0.075 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c012bf0 | handling event EVENT_SA_REPLACE for parent state #320 | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #320 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #519 at 0x557d46b41a90 | State DB: adding IKEv2 state #519 in UNDEFINED | pstats #519 ikev2.ike started | Message ID: init #519: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #519: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #519; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #519 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-68" #519: initiating v2 parent SA to replace #320 | using existing local IKE proposals for connection road-eastnet-nonat-68 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 519 for state #519 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35800cfd0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #519 | libevent_malloc: new ptr-libevent@0x7fb35804b970 size 128 | #519 spent 0.0397 milliseconds in ikev2_parent_outI1() | crypto helper 5 resuming | RESET processing: state #519 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a7ced0 | crypto helper 5 starting work-order 519 for state #519 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #320 | libevent_malloc: new ptr-libevent@0x557d46afe5c0 size 128 | libevent_free: release ptr-libevent@0x7fb37804b7c0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb35c012bf0 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 519 | #320 spent 0.0719 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c00d120 | handling event EVENT_SA_REPLACE for parent state #384 | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #384 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #520 at 0x557d46b43100 | State DB: adding IKEv2 state #520 in UNDEFINED | pstats #520 ikev2.ike started | Message ID: init #520: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #520: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #520; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #520 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-132" #520: initiating v2 parent SA to replace #384 | using existing local IKE proposals for connection road-eastnet-nonat-132 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 520 for state #520 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c012bf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #520 | libevent_malloc: new ptr-libevent@0x7fb37804b7c0 size 128 | #520 spent 0.0534 milliseconds in ikev2_parent_outI1() | RESET processing: state #520 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a94540 | crypto helper 3 resuming | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #384 | libevent_malloc: new ptr-libevent@0x557d46a7ecc0 size 128 | crypto helper 3 starting work-order 520 for state #520 | libevent_free: release ptr-libevent@0x7fb35c012840 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 520 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb35c00d120 | #384 spent 0.0852 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34000f1f0 | handling event EVENT_SA_REPLACE for parent state #279 | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #279 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #521 at 0x557d46b44770 | State DB: adding IKEv2 state #521 in UNDEFINED | pstats #521 ikev2.ike started | Message ID: init #521: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #521: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #521; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #521 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-27" #521: initiating v2 parent SA to replace #279 | using existing local IKE proposals for connection road-eastnet-nonat-27 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 521 for state #521 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c00d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #521 | libevent_malloc: new ptr-libevent@0x7fb35c012840 size 128 | #521 spent 0.0373 milliseconds in ikev2_parent_outI1() | RESET processing: state #521 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a9b1c0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #279 | libevent_malloc: new ptr-libevent@0x557d46a65d10 size 128 | libevent_free: release ptr-libevent@0x7fb34001e520 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb34000f1f0 | crypto helper 1 resuming | #279 spent 0.0746 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 1 starting work-order 521 for state #521 | timer_event_cb: processing event@0x557d46ab7a80 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 521 | handling event EVENT_SA_REPLACE for parent state #330 | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #330 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #522 at 0x557d46b45de0 | State DB: adding IKEv2 state #522 in UNDEFINED | pstats #522 ikev2.ike started | Message ID: init #522: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #522: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #522; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #522 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-78" #522: initiating v2 parent SA to replace #330 | using existing local IKE proposals for connection road-eastnet-nonat-78 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 522 for state #522 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34000f1f0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #522 | libevent_malloc: new ptr-libevent@0x7fb34001e520 size 128 | #522 spent 0.0477 milliseconds in ikev2_parent_outI1() | RESET processing: state #522 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a855c0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #330 | crypto helper 2 resuming | libevent_malloc: new ptr-libevent@0x557d46aa8b40 size 128 | libevent_free: release ptr-libevent@0x7fb34c0180b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46ab7a80 | crypto helper 2 starting work-order 522 for state #522 | #330 spent 0.0831 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 522 | timer_event_cb: processing event@0x7fb3600129a0 | handling event EVENT_SA_REPLACE for parent state #301 | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #301 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #523 at 0x557d46b47450 | State DB: adding IKEv2 state #523 in UNDEFINED | pstats #523 ikev2.ike started | Message ID: init #523: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #523: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #523; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #523 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-49" #523: initiating v2 parent SA to replace #301 | using existing local IKE proposals for connection road-eastnet-nonat-49 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 523 for state #523 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab7a80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #523 | libevent_malloc: new ptr-libevent@0x7fb34c0180b0 size 128 | #523 spent 0.0386 milliseconds in ikev2_parent_outI1() | crypto helper 0 resuming | RESET processing: state #523 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a2cbd0 | crypto helper 0 starting work-order 523 for state #523 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #301 | libevent_malloc: new ptr-libevent@0x557d46aae240 size 128 | libevent_free: release ptr-libevent@0x7fb3500300e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb3600129a0 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 523 | #301 spent 0.0739 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388006950 | handling event EVENT_SA_REPLACE for parent state #281 | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #281 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #524 at 0x557d46b48ac0 | State DB: adding IKEv2 state #524 in UNDEFINED | pstats #524 ikev2.ike started | Message ID: init #524: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #524: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #524; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #524 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-29" #524: initiating v2 parent SA to replace #281 | using existing local IKE proposals for connection road-eastnet-nonat-29 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 524 for state #524 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb3600129a0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #524 | libevent_malloc: new ptr-libevent@0x7fb3500300e0 size 128 | #524 spent 0.0407 milliseconds in ikev2_parent_outI1() | RESET processing: state #524 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 9 resuming | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46aaf800 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #281 | libevent_malloc: new ptr-libevent@0x557d46addb80 size 128 | libevent_free: release ptr-libevent@0x7fb388041ce0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb388006950 | crypto helper 9 starting work-order 524 for state #524 | #281 spent 0.0745 milliseconds in timer_event_cb() EVENT_SA_REPLACE | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 524 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46abbbc0 | handling event EVENT_SA_REPLACE for parent state #332 | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #332 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #525 at 0x557d46b4a130 | State DB: adding IKEv2 state #525 in UNDEFINED | pstats #525 ikev2.ike started | Message ID: init #525: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #525: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #525; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #525 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-80" #525: initiating v2 parent SA to replace #332 | using existing local IKE proposals for connection road-eastnet-nonat-80 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 525 for state #525 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ae8980 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #525 | libevent_malloc: new ptr-libevent@0x7fb388041ce0 size 128 | #525 spent 0.0363 milliseconds in ikev2_parent_outI1() | RESET processing: state #525 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a49450 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #332 | libevent_malloc: new ptr-libevent@0x557d46ae1cc0 size 128 | libevent_free: release ptr-libevent@0x7fb350035930 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46abbbc0 | #332 spent 0.0575 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a32290 | handling event EVENT_SA_REPLACE for parent state #383 | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #383 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #526 at 0x557d46b4b7a0 | State DB: adding IKEv2 state #526 in UNDEFINED | pstats #526 ikev2.ike started | Message ID: init #526: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #526: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #526; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #526 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-131" #526: initiating v2 parent SA to replace #383 | using existing local IKE proposals for connection road-eastnet-nonat-131 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 526 for state #526 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46abbbc0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #526 | libevent_malloc: new ptr-libevent@0x7fb350035930 size 128 | #526 spent 0.0353 milliseconds in ikev2_parent_outI1() | RESET processing: state #526 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a23150 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #383 | libevent_malloc: new ptr-libevent@0x557d46ae3280 size 128 | libevent_free: release ptr-libevent@0x7fb36402e9b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a32290 | #383 spent 0.055 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a72150 | handling event EVENT_SA_REPLACE for parent state #317 | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #317 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #527 at 0x557d46b4ce10 | State DB: adding IKEv2 state #527 in UNDEFINED | pstats #527 ikev2.ike started | Message ID: init #527: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #527: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #527; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #527 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-65" #527: initiating v2 parent SA to replace #317 | using existing local IKE proposals for connection road-eastnet-nonat-65 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 527 for state #527 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a32290 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #527 | libevent_malloc: new ptr-libevent@0x7fb36402e9b0 size 128 | #527 spent 0.0431 milliseconds in ikev2_parent_outI1() | RESET processing: state #527 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46ad4340 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #317 | libevent_malloc: new ptr-libevent@0x557d46ae73c0 size 128 | libevent_free: release ptr-libevent@0x7fb388027c10 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a72150 | #317 spent 0.0633 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b12c40 | handling event EVENT_SA_REPLACE for parent state #351 | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #351 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #528 at 0x557d46b4e480 | State DB: adding IKEv2 state #528 in UNDEFINED | pstats #528 ikev2.ike started | Message ID: init #528: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #528: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #528; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #528 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-99" #528: initiating v2 parent SA to replace #351 | using existing local IKE proposals for connection road-eastnet-nonat-99 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 528 for state #528 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a72150 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #528 | libevent_malloc: new ptr-libevent@0x7fb388027c10 size 128 | #528 spent 0.0381 milliseconds in ikev2_parent_outI1() | RESET processing: state #528 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46ab0dc0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #351 | libevent_malloc: new ptr-libevent@0x557d46aee080 size 128 | libevent_free: release ptr-libevent@0x7fb380011f30 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46b12c40 | #351 spent 0.0577 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378012890 | handling event EVENT_SA_REPLACE for parent state #284 | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #284 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #529 at 0x557d46b4faf0 | State DB: adding IKEv2 state #529 in UNDEFINED | pstats #529 ikev2.ike started | Message ID: init #529: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #529: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #529; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #529 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-32" #529: initiating v2 parent SA to replace #284 | using existing local IKE proposals for connection road-eastnet-nonat-32 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 529 for state #529 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b12c40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #529 | libevent_malloc: new ptr-libevent@0x7fb380011f30 size 128 | #529 spent 0.0378 milliseconds in ikev2_parent_outI1() | RESET processing: state #529 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46acd680 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #284 | libevent_malloc: new ptr-libevent@0x557d46af4d40 size 128 | libevent_free: release ptr-libevent@0x7fb35000cf80 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb378012890 | #284 spent 0.0576 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c01d710 | handling event EVENT_SA_REPLACE for parent state #386 | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #386 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #530 at 0x557d46b51160 | State DB: adding IKEv2 state #530 in UNDEFINED | pstats #530 ikev2.ike started | Message ID: init #530: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #530: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #530; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #530 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-134" #530: initiating v2 parent SA to replace #386 | using existing local IKE proposals for connection road-eastnet-nonat-134 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 530 for state #530 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb378012890 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #530 | libevent_malloc: new ptr-libevent@0x7fb35000cf80 size 128 | #530 spent 0.0353 milliseconds in ikev2_parent_outI1() | RESET processing: state #530 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46aba600 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #386 | libevent_malloc: new ptr-libevent@0x557d46afa440 size 128 | libevent_free: release ptr-libevent@0x7fb36c02ed30 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb36c01d710 | #386 spent 0.0548 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a73690 | handling event EVENT_SA_REPLACE for parent state #344 | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #344 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #531 at 0x557d46b527d0 | State DB: adding IKEv2 state #531 in UNDEFINED | pstats #531 ikev2.ike started | Message ID: init #531: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #531: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #531; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #531 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-92" #531: initiating v2 parent SA to replace #344 | using existing local IKE proposals for connection road-eastnet-nonat-92 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 531 for state #531 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c01d710 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #531 | libevent_malloc: new ptr-libevent@0x7fb36c02ed30 size 128 | #531 spent 0.0364 milliseconds in ikev2_parent_outI1() | RESET processing: state #531 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46abe740 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #344 | libevent_malloc: new ptr-libevent@0x557d46afba00 size 128 | libevent_free: release ptr-libevent@0x7fb34403b0b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a73690 | #344 spent 0.0566 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ac7f80 | handling event EVENT_SA_REPLACE for parent state #275 | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #275 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #532 at 0x557d46b53e40 | State DB: adding IKEv2 state #532 in UNDEFINED | pstats #532 ikev2.ike started | Message ID: init #532: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #532: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #532; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #532 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-23" #532: initiating v2 parent SA to replace #275 | using existing local IKE proposals for connection road-eastnet-nonat-23 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 532 for state #532 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a3fc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #532 | libevent_malloc: new ptr-libevent@0x7fb34403b0b0 size 128 | #532 spent 0.0504 milliseconds in ikev2_parent_outI1() | RESET processing: state #532 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46ab2380 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #275 | libevent_malloc: new ptr-libevent@0x557d46b01100 size 128 | libevent_free: release ptr-libevent@0x7fb360035930 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46ac7f80 | #275 spent 0.0698 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a5af90 | handling event EVENT_SA_REPLACE for parent state #264 | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #264 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #533 at 0x557d46b554b0 | State DB: adding IKEv2 state #533 in UNDEFINED | pstats #533 ikev2.ike started | Message ID: init #533: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #533: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #533; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #533 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-12" #533: initiating v2 parent SA to replace #264 | using existing local IKE proposals for connection road-eastnet-nonat-12 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 533 for state #533 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ac7f80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #533 | libevent_malloc: new ptr-libevent@0x7fb360035930 size 128 | #533 spent 0.036 milliseconds in ikev2_parent_outI1() | RESET processing: state #533 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a7e4d0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #264 | libevent_malloc: new ptr-libevent@0x557d46b03c80 size 128 | libevent_free: release ptr-libevent@0x7fb35801d920 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a5af90 | #264 spent 0.0553 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368017ea0 | handling event EVENT_SA_REPLACE for parent state #295 | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #295 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #534 at 0x557d46b56b20 | State DB: adding IKEv2 state #534 in UNDEFINED | pstats #534 ikev2.ike started | Message ID: init #534: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #534: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #534; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #534 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-43" #534: initiating v2 parent SA to replace #295 | using existing local IKE proposals for connection road-eastnet-nonat-43 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 534 for state #534 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a5af90 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #534 | libevent_malloc: new ptr-libevent@0x7fb35801d920 size 128 | #534 spent 0.0358 milliseconds in ikev2_parent_outI1() | RESET processing: state #534 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a92f80 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #295 | libevent_malloc: new ptr-libevent@0x557d46afcfc0 size 128 | libevent_free: release ptr-libevent@0x7fb368023e60 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb368017ea0 | #295 spent 0.0549 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38400a290 | handling event EVENT_SA_REPLACE for parent state #271 | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #271 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #535 at 0x557d46b58190 | State DB: adding IKEv2 state #535 in UNDEFINED | pstats #535 ikev2.ike started | Message ID: init #535: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #535: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #535; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #535 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-19" #535: initiating v2 parent SA to replace #271 | using existing local IKE proposals for connection road-eastnet-nonat-19 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 535 for state #535 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb368017ea0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #535 | libevent_malloc: new ptr-libevent@0x7fb368023e60 size 128 | #535 spent 0.0361 milliseconds in ikev2_parent_outI1() | RESET processing: state #535 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46aaa100 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #271 | libevent_malloc: new ptr-libevent@0x557d46b11600 size 128 | libevent_free: release ptr-libevent@0x7fb38402bf10 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb38400a290 | #271 spent 0.0566 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a8d840 | handling event EVENT_SA_REPLACE for parent state #374 | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #374 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #536 at 0x557d46b59800 | State DB: adding IKEv2 state #536 in UNDEFINED | pstats #536 ikev2.ike started | Message ID: init #536: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #536: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #536; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #536 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-122" #536: initiating v2 parent SA to replace #374 | using existing local IKE proposals for connection road-eastnet-nonat-122 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 536 for state #536 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb38400a290 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #536 | libevent_malloc: new ptr-libevent@0x7fb38402bf10 size 128 | #536 spent 0.0355 milliseconds in ikev2_parent_outI1() | RESET processing: state #536 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46aecac0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #374 | libevent_malloc: new ptr-libevent@0x557d46b14180 size 128 | libevent_free: release ptr-libevent@0x7fb338023e10 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a8d840 | #374 spent 0.0547 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374005860 | handling event EVENT_SA_REPLACE for parent state #402 | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #402 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #537 at 0x557d46b5ae70 | State DB: adding IKEv2 state #537 in UNDEFINED | pstats #537 ikev2.ike started | Message ID: init #537: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #537: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #537; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #537 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-150" #537: initiating v2 parent SA to replace #402 | using existing local IKE proposals for connection road-eastnet-nonat-150 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 537 for state #537 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a8d840 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #537 | libevent_malloc: new ptr-libevent@0x7fb338023e10 size 128 | #537 spent 0.0362 milliseconds in ikev2_parent_outI1() | RESET processing: state #537 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46ac1340 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #402 | libevent_malloc: new ptr-libevent@0x557d46b15740 size 128 | libevent_free: release ptr-libevent@0x7fb364008e30 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb374005860 | #402 spent 0.0555 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354046090 | handling event EVENT_SA_REPLACE for parent state #302 | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #302 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #538 at 0x557d46b5c4e0 | State DB: adding IKEv2 state #538 in UNDEFINED | pstats #538 ikev2.ike started | Message ID: init #538: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #538: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #538; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #538 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-50" #538: initiating v2 parent SA to replace #302 | using existing local IKE proposals for connection road-eastnet-nonat-50 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 538 for state #538 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb374005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #538 | libevent_malloc: new ptr-libevent@0x7fb364008e30 size 128 | #538 spent 0.0393 milliseconds in ikev2_parent_outI1() | RESET processing: state #538 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b026c0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #302 | libevent_malloc: new ptr-libevent@0x557d46b16d00 size 128 | libevent_free: release ptr-libevent@0x7fb354044a20 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb354046090 | #302 spent 0.0598 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a43dd0 | handling event EVENT_SA_REPLACE for parent state #266 | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #266 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #539 at 0x557d46b5db50 | State DB: adding IKEv2 state #539 in UNDEFINED | pstats #539 ikev2.ike started | Message ID: init #539: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #539: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #539; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #539 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-14" #539: initiating v2 parent SA to replace #266 | using existing local IKE proposals for connection road-eastnet-nonat-14 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 539 for state #539 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab3940 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #539 | libevent_malloc: new ptr-libevent@0x7fb354044a20 size 128 | #539 spent 0.036 milliseconds in ikev2_parent_outI1() | RESET processing: state #539 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a68890 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #266 | libevent_malloc: new ptr-libevent@0x557d46b182c0 size 128 | libevent_free: release ptr-libevent@0x7fb3600180b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a43dd0 | #266 spent 0.0554 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a23110 | handling event EVENT_SA_REPLACE for parent state #378 | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #378 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #540 at 0x557d46b5f1c0 | State DB: adding IKEv2 state #540 in UNDEFINED | pstats #540 ikev2.ike started | Message ID: init #540: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #540: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #540; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #540 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-126" #540: initiating v2 parent SA to replace #378 | using existing local IKE proposals for connection road-eastnet-nonat-126 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 540 for state #540 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a43dd0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #540 | libevent_malloc: new ptr-libevent@0x7fb3600180b0 size 128 | #540 spent 0.0696 milliseconds in ikev2_parent_outI1() | RESET processing: state #540 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b12bc0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #378 | libevent_malloc: new ptr-libevent@0x557d46b1ae40 size 128 | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a23110 | #378 spent 0.0907 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a60690 | handling event EVENT_SA_REPLACE for parent state #276 | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #276 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #541 at 0x557d46b60830 | State DB: adding IKEv2 state #541 in UNDEFINED | pstats #541 ikev2.ike started | Message ID: init #541: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #541: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #541; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #541 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-24" #541: initiating v2 parent SA to replace #276 | using existing local IKE proposals for connection road-eastnet-nonat-24 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 541 for state #541 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a23110 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #541 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 | #541 spent 0.0377 milliseconds in ikev2_parent_outI1() | RESET processing: state #541 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46ac5400 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #276 | libevent_malloc: new ptr-libevent@0x557d46b1d9c0 size 128 | libevent_free: release ptr-libevent@0x7fb3880210c0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a60690 | #276 spent 0.0582 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ac69c0 | handling event EVENT_SA_REPLACE for parent state #255 | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #255 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #542 at 0x557d46b61ea0 | State DB: adding IKEv2 state #542 in UNDEFINED | pstats #542 ikev2.ike started | Message ID: init #542: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #542: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #542; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #542 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-3" #542: initiating v2 parent SA to replace #255 | using existing local IKE proposals for connection road-eastnet-nonat-3 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 542 for state #542 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a60690 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #542 | libevent_malloc: new ptr-libevent@0x7fb3880210c0 size 128 | #542 spent 0.0384 milliseconds in ikev2_parent_outI1() | RESET processing: state #542 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a7fec0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #255 | libevent_malloc: new ptr-libevent@0x557d46b1ef80 size 128 | libevent_free: release ptr-libevent@0x7fb36c035930 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46ac69c0 | #255 spent 0.0585 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad6ec0 | handling event EVENT_SA_REPLACE for parent state #263 | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #263 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #543 at 0x557d46b63510 | State DB: adding IKEv2 state #543 in UNDEFINED | pstats #543 ikev2.ike started | Message ID: init #543: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #543: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #543; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #543 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-11" #543: initiating v2 parent SA to replace #263 | using existing local IKE proposals for connection road-eastnet-nonat-11 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 543 for state #543 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ac69c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #543 | libevent_malloc: new ptr-libevent@0x7fb36c035930 size 128 | #543 spent 0.0562 milliseconds in ikev2_parent_outI1() | RESET processing: state #543 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a8ee00 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #263 | libevent_malloc: new ptr-libevent@0x557d46b20540 size 128 | libevent_free: release ptr-libevent@0x7fb37403ae20 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46ad6ec0 | #263 spent 0.0764 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378046090 | handling event EVENT_SA_REPLACE for parent state #290 | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #290 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #544 at 0x557d46b64b80 | State DB: adding IKEv2 state #544 in UNDEFINED | pstats #544 ikev2.ike started | Message ID: init #544: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #544: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #544; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #544 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-38" #544: initiating v2 parent SA to replace #290 | using existing local IKE proposals for connection road-eastnet-nonat-38 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 544 for state #544 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad6ec0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #544 | libevent_malloc: new ptr-libevent@0x7fb37403ae20 size 128 | #544 spent 0.0394 milliseconds in ikev2_parent_outI1() | RESET processing: state #544 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b09380 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #290 | libevent_malloc: new ptr-libevent@0x557d46b21b00 size 128 | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb378046090 | #290 spent 0.0589 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_SA_REPLACE for parent state #358 | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #358 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #545 at 0x557d46b661f0 | State DB: adding IKEv2 state #545 in UNDEFINED | pstats #545 ikev2.ike started | Message ID: init #545: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #545: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #545; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #545 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-106" #545: initiating v2 parent SA to replace #358 | using existing local IKE proposals for connection road-eastnet-nonat-106 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 545 for state #545 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb378046090 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #545 | libevent_malloc: new ptr-libevent@0x7fb35802a950 size 128 | #545 spent 0.0377 milliseconds in ikev2_parent_outI1() | RESET processing: state #545 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46ab6500 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #358 | libevent_malloc: new ptr-libevent@0x557d46b230c0 size 128 | libevent_free: release ptr-libevent@0x7fb37002eb80 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb370005860 | #358 spent 0.058 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ac3ec0 | handling event EVENT_SA_REPLACE for parent state #425 | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #425 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #546 at 0x557d46b67860 | State DB: adding IKEv2 state #546 in UNDEFINED | pstats #546 ikev2.ike started | Message ID: init #546: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #546: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #546; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #546 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-173" #546: initiating v2 parent SA to replace #425 | using existing local IKE proposals for connection road-eastnet-nonat-173 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 546 for state #546 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad17c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #546 | libevent_malloc: new ptr-libevent@0x7fb37002eb80 size 128 | #546 spent 0.0361 milliseconds in ikev2_parent_outI1() | RESET processing: state #546 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46acec40 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #425 | libevent_malloc: new ptr-libevent@0x557d46b27200 size 128 | libevent_free: release ptr-libevent@0x7fb384027b30 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46ac3ec0 | #425 spent 0.0689 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37400cc10 | handling event EVENT_SA_REPLACE for parent state #288 | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #288 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #547 at 0x557d46b68ed0 | State DB: adding IKEv2 state #547 in UNDEFINED | pstats #547 ikev2.ike started | Message ID: init #547: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #547: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #547; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #547 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-36" #547: initiating v2 parent SA to replace #288 | using existing local IKE proposals for connection road-eastnet-nonat-36 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 547 for state #547 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ac3ec0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #547 | libevent_malloc: new ptr-libevent@0x7fb384027b30 size 128 | #547 spent 0.0413 milliseconds in ikev2_parent_outI1() | RESET processing: state #547 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b0d500 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #288 | libevent_malloc: new ptr-libevent@0x557d46b287c0 size 128 | libevent_free: release ptr-libevent@0x7fb37401f7f0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb37400cc10 | #288 spent 0.0612 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a84000 | handling event EVENT_SA_REPLACE for parent state #257 | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #257 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #548 at 0x557d46b6a540 | State DB: adding IKEv2 state #548 in UNDEFINED | pstats #548 ikev2.ike started | Message ID: init #548: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #548: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #548; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #548 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-5" #548: initiating v2 parent SA to replace #257 | using existing local IKE proposals for connection road-eastnet-nonat-5 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 548 for state #548 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37400cc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #548 | libevent_malloc: new ptr-libevent@0x7fb37401f7f0 size 128 | #548 spent 0.0374 milliseconds in ikev2_parent_outI1() | RESET processing: state #548 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a7b910 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #257 | libevent_malloc: new ptr-libevent@0x557d46b29d80 size 128 | libevent_free: release ptr-libevent@0x7fb338023a60 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a84000 | #257 spent 0.0573 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_SA_REPLACE for parent state #377 | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #377 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #549 at 0x557d46b6bbb0 | State DB: adding IKEv2 state #549 in UNDEFINED | pstats #549 ikev2.ike started | Message ID: init #549: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #549: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #549; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #549 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-125" #549: initiating v2 parent SA to replace #377 | using existing local IKE proposals for connection road-eastnet-nonat-125 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 549 for state #549 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a84000 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #549 | libevent_malloc: new ptr-libevent@0x7fb338023a60 size 128 | #549 spent 0.0373 milliseconds in ikev2_parent_outI1() | RESET processing: state #549 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a4d590 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #377 | libevent_malloc: new ptr-libevent@0x557d46b2b340 size 128 | libevent_free: release ptr-libevent@0x7fb3840060f0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46ab64c0 | #377 spent 0.0572 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2b650 | handling event EVENT_SA_REPLACE for parent state #343 | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #343 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #550 at 0x557d46b6d220 | State DB: adding IKEv2 state #550 in UNDEFINED | pstats #550 ikev2.ike started | Message ID: init #550: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #550: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #550; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #550 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-91" #550: initiating v2 parent SA to replace #343 | using existing local IKE proposals for connection road-eastnet-nonat-91 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 550 for state #550 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab64c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #550 | libevent_malloc: new ptr-libevent@0x7fb3840060f0 size 128 | #550 spent 0.0361 milliseconds in ikev2_parent_outI1() | RESET processing: state #550 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b1c400 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #343 | libevent_malloc: new ptr-libevent@0x557d46b2c900 size 128 | libevent_free: release ptr-libevent@0x7fb380032bf0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a2b650 | #343 spent 0.0559 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a903c0 | handling event EVENT_SA_REPLACE for parent state #306 | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #306 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #551 at 0x557d46b6e890 | State DB: adding IKEv2 state #551 in UNDEFINED | pstats #551 ikev2.ike started | Message ID: init #551: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #551: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #551; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #551 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-54" #551: initiating v2 parent SA to replace #306 | using existing local IKE proposals for connection road-eastnet-nonat-54 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 551 for state #551 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2b650 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #551 | libevent_malloc: new ptr-libevent@0x7fb380032bf0 size 128 | #551 spent 0.0379 milliseconds in ikev2_parent_outI1() | RESET processing: state #551 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a15810 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #306 | libevent_malloc: new ptr-libevent@0x557d469dabe0 size 128 | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a903c0 | #306 spent 0.0593 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46acab00 | handling event EVENT_SA_REPLACE for parent state #262 | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #262 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #552 at 0x557d46b6ff00 | State DB: adding IKEv2 state #552 in UNDEFINED | pstats #552 ikev2.ike started | Message ID: init #552: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #552: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #552; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #552 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-10" #552: initiating v2 parent SA to replace #262 | using existing local IKE proposals for connection road-eastnet-nonat-10 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 552 for state #552 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a903c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #552 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 | #552 spent 0.0368 milliseconds in ikev2_parent_outI1() | RESET processing: state #552 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a9dd40 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #262 | libevent_malloc: new ptr-libevent@0x557d469dbb90 size 128 | libevent_free: release ptr-libevent@0x7fb344034470 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46acab00 | #262 spent 0.0568 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c018210 | handling event EVENT_SA_REPLACE for parent state #329 | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #329 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #553 at 0x557d46b71570 | State DB: adding IKEv2 state #553 in UNDEFINED | pstats #553 ikev2.ike started | Message ID: init #553: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #553: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #553; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #553 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-77" #553: initiating v2 parent SA to replace #329 | using existing local IKE proposals for connection road-eastnet-nonat-77 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 553 for state #553 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46acab00 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #553 | libevent_malloc: new ptr-libevent@0x7fb344034470 size 128 | #553 spent 0.0353 milliseconds in ikev2_parent_outI1() | RESET processing: state #553 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a73690 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #329 | libevent_malloc: new ptr-libevent@0x557d469dbc20 size 128 | libevent_free: release ptr-libevent@0x7fb36c039e30 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb36c018210 | #329 spent 0.0563 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c01da80 | handling event EVENT_SA_REPLACE for parent state #350 | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #350 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #554 at 0x557d46b72be0 | State DB: adding IKEv2 state #554 in UNDEFINED | pstats #554 ikev2.ike started | Message ID: init #554: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #554: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #554; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #554 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-98" #554: initiating v2 parent SA to replace #350 | using existing local IKE proposals for connection road-eastnet-nonat-98 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 554 for state #554 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c018210 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #554 | libevent_malloc: new ptr-libevent@0x7fb36c039e30 size 128 | #554 spent 0.0368 milliseconds in ikev2_parent_outI1() | RESET processing: state #554 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a7ed50 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #350 | libevent_malloc: new ptr-libevent@0x557d46b74250 size 128 | libevent_free: release ptr-libevent@0x7fb35c02ec80 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb35c01da80 | #350 spent 0.0567 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c005860 | handling event EVENT_SA_REPLACE for parent state #385 | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #385 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #555 at 0x557d46b742e0 | State DB: adding IKEv2 state #555 in UNDEFINED | pstats #555 ikev2.ike started | Message ID: init #555: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #555: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #555; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #555 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-133" #555: initiating v2 parent SA to replace #385 | using existing local IKE proposals for connection road-eastnet-nonat-133 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 555 for state #555 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c01da80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #555 | libevent_malloc: new ptr-libevent@0x7fb35c02ec80 size 128 | #555 spent 0.0728 milliseconds in ikev2_parent_outI1() | RESET processing: state #555 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d469dbcb0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #385 | libevent_malloc: new ptr-libevent@0x557d46b75950 size 128 | libevent_free: release ptr-libevent@0x7fb388011f30 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb37c005860 | #385 spent 0.0991 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469f8cc0 | handling event EVENT_SA_REPLACE for parent state #331 | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #331 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #556 at 0x557d46b759e0 | State DB: adding IKEv2 state #556 in UNDEFINED | pstats #556 ikev2.ike started | Message ID: init #556: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #556: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #556; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #556 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-79" #556: initiating v2 parent SA to replace #331 | using existing local IKE proposals for connection road-eastnet-nonat-79 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 556 for state #556 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #556 | libevent_malloc: new ptr-libevent@0x7fb388011f30 size 128 | #556 spent 0.0587 milliseconds in ikev2_parent_outI1() | RESET processing: state #556 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a16db0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #331 | libevent_malloc: new ptr-libevent@0x557d46b77050 size 128 | libevent_free: release ptr-libevent@0x7fb36404b5a0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d469f8cc0 | #331 spent 0.0876 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7e490 | handling event EVENT_SA_REPLACE for parent state #289 | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #289 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #557 at 0x557d46b770e0 | State DB: adding IKEv2 state #557 in UNDEFINED | pstats #557 ikev2.ike started | Message ID: init #557: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #557: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #557; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #557 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-37" #557: initiating v2 parent SA to replace #289 | using existing local IKE proposals for connection road-eastnet-nonat-37 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 557 for state #557 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469f8cc0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #557 | libevent_malloc: new ptr-libevent@0x7fb36404b5a0 size 128 | #557 spent 0.0708 milliseconds in ikev2_parent_outI1() | RESET processing: state #557 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d469e05a0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #289 | libevent_malloc: new ptr-libevent@0x557d46b78750 size 128 | libevent_free: release ptr-libevent@0x7fb34c03f170 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a7e490 | #289 spent 0.0998 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374013710 | handling event EVENT_SA_REPLACE for parent state #261 | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #261 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #558 at 0x557d46b787e0 | State DB: adding IKEv2 state #558 in UNDEFINED | pstats #558 ikev2.ike started | Message ID: init #558: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #558: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #558; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #558 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-9" #558: initiating v2 parent SA to replace #261 | using existing local IKE proposals for connection road-eastnet-nonat-9 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 558 for state #558 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7e490 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #558 | libevent_malloc: new ptr-libevent@0x7fb34c03f170 size 128 | #558 spent 0.0697 milliseconds in ikev2_parent_outI1() | RESET processing: state #558 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d469ef4e0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #261 | libevent_malloc: new ptr-libevent@0x557d46b79e50 size 128 | libevent_free: release ptr-libevent@0x7fb344014c70 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb374013710 | #261 spent 0.111 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358017ea0 | handling event EVENT_SA_REPLACE for parent state #282 | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #282 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #559 at 0x557d46b79ee0 | State DB: adding IKEv2 state #559 in UNDEFINED | pstats #559 ikev2.ike started | Message ID: init #559: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #559: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #559; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #559 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-30" #559: initiating v2 parent SA to replace #282 | using existing local IKE proposals for connection road-eastnet-nonat-30 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 559 for state #559 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb374013710 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #559 | libevent_malloc: new ptr-libevent@0x7fb344014c70 size 128 | #559 spent 0.0575 milliseconds in ikev2_parent_outI1() | RESET processing: state #559 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d469e8820 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #282 | libevent_malloc: new ptr-libevent@0x557d46b7b550 size 128 | libevent_free: release ptr-libevent@0x7fb35802ed90 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb358017ea0 | #282 spent 0.0859 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374023ce0 | handling event EVENT_SA_REPLACE for parent state #273 | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #273 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #560 at 0x557d46b7b5e0 | State DB: adding IKEv2 state #560 in UNDEFINED | pstats #560 ikev2.ike started | Message ID: init #560: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #560: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #560; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #560 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-21" #560: initiating v2 parent SA to replace #273 | using existing local IKE proposals for connection road-eastnet-nonat-21 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 560 for state #560 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb358017ea0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #560 | libevent_malloc: new ptr-libevent@0x7fb35802ed90 size 128 | #560 spent 0.055 milliseconds in ikev2_parent_outI1() | RESET processing: state #560 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a24730 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #273 | libevent_malloc: new ptr-libevent@0x557d46b7cc50 size 128 | libevent_free: release ptr-libevent@0x7fb37401f6b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb374023ce0 | #273 spent 0.0837 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c00cc10 | handling event EVENT_SA_REPLACE for parent state #342 | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #342 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #561 at 0x557d46b7cce0 | State DB: adding IKEv2 state #561 in UNDEFINED | pstats #561 ikev2.ike started | Message ID: init #561: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #561: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #561; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #561 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-90" #561: initiating v2 parent SA to replace #342 | using existing local IKE proposals for connection road-eastnet-nonat-90 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 561 for state #561 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb374023ce0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #561 | libevent_malloc: new ptr-libevent@0x7fb37401f6b0 size 128 | #561 spent 0.0562 milliseconds in ikev2_parent_outI1() | RESET processing: state #561 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d469ddbf0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #342 | libevent_malloc: new ptr-libevent@0x557d46b7e350 size 128 | libevent_free: release ptr-libevent@0x7fb35c023d80 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb35c00cc10 | #342 spent 0.0845 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb360012bf0 | handling event EVENT_SA_REPLACE for parent state #309 | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #309 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #562 at 0x557d46b7e3e0 | State DB: adding IKEv2 state #562 in UNDEFINED | pstats #562 ikev2.ike started | Message ID: init #562: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #562: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #562; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #562 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-57" #562: initiating v2 parent SA to replace #309 | using existing local IKE proposals for connection road-eastnet-nonat-57 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 562 for state #562 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c00cc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #562 | libevent_malloc: new ptr-libevent@0x7fb35c023d80 size 128 | #562 spent 0.0535 milliseconds in ikev2_parent_outI1() | RESET processing: state #562 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a011f0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #309 | libevent_malloc: new ptr-libevent@0x557d46b7fa50 size 128 | libevent_free: release ptr-libevent@0x7fb37003b0b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb360012bf0 | #309 spent 0.082 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378012bf0 | handling event EVENT_SA_REPLACE for parent state #292 | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #292 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #563 at 0x557d46b7fae0 | State DB: adding IKEv2 state #563 in UNDEFINED | pstats #563 ikev2.ike started | Message ID: init #563: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #563: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #563; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #563 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-40" #563: initiating v2 parent SA to replace #292 | using existing local IKE proposals for connection road-eastnet-nonat-40 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 563 for state #563 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb360012bf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #563 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 | #563 spent 0.0544 milliseconds in ikev2_parent_outI1() | RESET processing: state #563 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d469e5ca0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #292 | libevent_malloc: new ptr-libevent@0x557d46b81150 size 128 | libevent_free: release ptr-libevent@0x7fb348014c70 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb378012bf0 | #292 spent 0.084 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb360018460 | handling event EVENT_SA_REPLACE for parent state #296 | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #296 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #564 at 0x557d46b811e0 | State DB: adding IKEv2 state #564 in UNDEFINED | pstats #564 ikev2.ike started | Message ID: init #564: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #564: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #564; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #564 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-44" #564: initiating v2 parent SA to replace #296 | using existing local IKE proposals for connection road-eastnet-nonat-44 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 564 for state #564 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb378012bf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #564 | libevent_malloc: new ptr-libevent@0x7fb348014c70 size 128 | #564 spent 0.0549 milliseconds in ikev2_parent_outI1() | RESET processing: state #564 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d469f4be0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #296 | libevent_malloc: new ptr-libevent@0x557d46b82850 size 128 | libevent_free: release ptr-libevent@0x7fb38802d3a0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb360018460 | #296 spent 0.0851 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a76210 | handling event EVENT_SA_REPLACE for parent state #303 | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #303 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #565 at 0x557d46b828e0 | State DB: adding IKEv2 state #565 in UNDEFINED | pstats #565 ikev2.ike started | Message ID: init #565: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #565: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #565; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #565 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-51" #565: initiating v2 parent SA to replace #303 | using existing local IKE proposals for connection road-eastnet-nonat-51 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 565 for state #565 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb360018460 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #565 | libevent_malloc: new ptr-libevent@0x7fb38802d3a0 size 128 | #565 spent 0.0517 milliseconds in ikev2_parent_outI1() | RESET processing: state #565 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d469e7260 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #303 | libevent_malloc: new ptr-libevent@0x557d46b83f50 size 128 | libevent_free: release ptr-libevent@0x7fb38002d3a0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a76210 | #303 spent 0.0752 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358018460 | handling event EVENT_SA_REPLACE for parent state #291 | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #291 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #566 at 0x557d46b83fe0 | State DB: adding IKEv2 state #566 in UNDEFINED | pstats #566 ikev2.ike started | Message ID: init #566: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #566: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #566; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #566 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-39" #566: initiating v2 parent SA to replace #291 | using existing local IKE proposals for connection road-eastnet-nonat-39 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 566 for state #566 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a76210 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #566 | libevent_malloc: new ptr-libevent@0x7fb38002d3a0 size 128 | #566 spent 0.0397 milliseconds in ikev2_parent_outI1() | RESET processing: state #566 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a2f770 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #291 | libevent_malloc: new ptr-libevent@0x557d46b85650 size 128 | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb358018460 | #291 spent 0.0757 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb380015160 | handling event EVENT_SA_REPLACE for parent state #382 | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #382 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #567 at 0x557d46b856e0 | State DB: adding IKEv2 state #567 in UNDEFINED | pstats #567 ikev2.ike started | Message ID: init #567: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #567: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #567; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #567 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-130" #567: initiating v2 parent SA to replace #382 | using existing local IKE proposals for connection road-eastnet-nonat-130 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 567 for state #567 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb358018460 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #567 | libevent_malloc: new ptr-libevent@0x7fb3580251c0 size 128 | #567 spent 0.0365 milliseconds in ikev2_parent_outI1() | RESET processing: state #567 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d469f2060 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #382 | libevent_malloc: new ptr-libevent@0x557d46b86d50 size 128 | libevent_free: release ptr-libevent@0x7fb3800269d0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb380015160 | #382 spent 0.0564 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_SA_REPLACE for parent state #286 | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #286 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #568 at 0x557d46b86de0 | State DB: adding IKEv2 state #568 in UNDEFINED | pstats #568 ikev2.ike started | Message ID: init #568: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #568: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #568; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #568 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-34" #568: initiating v2 parent SA to replace #286 | using existing local IKE proposals for connection road-eastnet-nonat-34 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 568 for state #568 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb380015160 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #568 | libevent_malloc: new ptr-libevent@0x7fb3800269d0 size 128 | #568 spent 0.0409 milliseconds in ikev2_parent_outI1() | RESET processing: state #568 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a272b0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #286 | libevent_malloc: new ptr-libevent@0x557d46b88450 size 128 | libevent_free: release ptr-libevent@0x7fb34c00f1a0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a02770 | #286 spent 0.061 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37800cc10 | handling event EVENT_SA_REPLACE for parent state #339 | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #339 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #569 at 0x557d46b884e0 | State DB: adding IKEv2 state #569 in UNDEFINED | pstats #569 ikev2.ike started | Message ID: init #569: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #569: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #569; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #569 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-87" #569: initiating v2 parent SA to replace #339 | using existing local IKE proposals for connection road-eastnet-nonat-87 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 569 for state #569 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a02770 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #569 | libevent_malloc: new ptr-libevent@0x7fb34c00f1a0 size 128 | #569 spent 0.0678 milliseconds in ikev2_parent_outI1() | RESET processing: state #569 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a027b0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #339 | libevent_malloc: new ptr-libevent@0x557d46b89b50 size 128 | libevent_free: release ptr-libevent@0x7fb37801fd50 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb37800cc10 | #339 spent 0.0995 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb33800cc10 | handling event EVENT_SA_REPLACE for parent state #348 | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #348 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #570 at 0x557d46b89be0 | State DB: adding IKEv2 state #570 in UNDEFINED | pstats #570 ikev2.ike started | Message ID: init #570: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #570: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #570; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #570 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-96" #570: initiating v2 parent SA to replace #348 | using existing local IKE proposals for connection road-eastnet-nonat-96 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 570 for state #570 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37800cc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #570 | libevent_malloc: new ptr-libevent@0x7fb37801fd50 size 128 | #570 spent 0.0941 milliseconds in ikev2_parent_outI1() | RESET processing: state #570 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d469f8d60 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #348 | libevent_malloc: new ptr-libevent@0x557d46b8b250 size 128 | libevent_free: release ptr-libevent@0x7fb33801a4e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb33800cc10 | #348 spent 0.123 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c00d120 | handling event EVENT_SA_REPLACE for parent state #298 | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #298 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #571 at 0x557d46b8b2e0 | State DB: adding IKEv2 state #571 in UNDEFINED | pstats #571 ikev2.ike started | Message ID: init #571: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #571: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #571; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #571 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-46" #571: initiating v2 parent SA to replace #298 | using existing local IKE proposals for connection road-eastnet-nonat-46 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 571 for state #571 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb33800cc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #571 | libevent_malloc: new ptr-libevent@0x7fb33801a4e0 size 128 | #571 spent 0.0485 milliseconds in ikev2_parent_outI1() | RESET processing: state #571 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d469f7760 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #298 | libevent_malloc: new ptr-libevent@0x557d46b8c950 size 128 | libevent_free: release ptr-libevent@0x7fb36401f4e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb37c00d120 | #298 spent 0.0767 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3700407b0 | handling event EVENT_SA_REPLACE for parent state #265 | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #265 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #572 at 0x557d46b8c9e0 | State DB: adding IKEv2 state #572 in UNDEFINED | pstats #572 ikev2.ike started | Message ID: init #572: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #572: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #572; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #572 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-13" #572: initiating v2 parent SA to replace #265 | using existing local IKE proposals for connection road-eastnet-nonat-13 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 572 for state #572 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c00d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #572 | libevent_malloc: new ptr-libevent@0x7fb36401f4e0 size 128 | #572 spent 0.0538 milliseconds in ikev2_parent_outI1() | RESET processing: state #572 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d469fd070 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #265 | libevent_malloc: new ptr-libevent@0x557d46b8e050 size 128 | libevent_free: release ptr-libevent@0x7fb37003f490 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb3700407b0 | #265 spent 0.0771 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350012bf0 | handling event EVENT_SA_REPLACE for parent state #335 | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #335 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #573 at 0x557d46b8e0e0 | State DB: adding IKEv2 state #573 in UNDEFINED | pstats #573 ikev2.ike started | Message ID: init #573: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #573: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #573; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #573 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-83" #573: initiating v2 parent SA to replace #335 | using existing local IKE proposals for connection road-eastnet-nonat-83 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 573 for state #573 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb3700407b0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #573 | libevent_malloc: new ptr-libevent@0x7fb37003f490 size 128 | #573 spent 0.0367 milliseconds in ikev2_parent_outI1() | RESET processing: state #573 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a18370 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #335 | libevent_malloc: new ptr-libevent@0x557d46b8f750 size 128 | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb350012bf0 | #335 spent 0.0563 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388043350 | handling event EVENT_SA_REPLACE for parent state #371 | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #371 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #574 at 0x557d46b8f7e0 | State DB: adding IKEv2 state #574 in UNDEFINED | pstats #574 ikev2.ike started | Message ID: init #574: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #574: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #574; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #574 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-119" #574: initiating v2 parent SA to replace #371 | using existing local IKE proposals for connection road-eastnet-nonat-119 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 574 for state #574 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb350012bf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #574 | libevent_malloc: new ptr-libevent@0x7fb37001d920 size 128 | #574 spent 0.0375 milliseconds in ikev2_parent_outI1() | RESET processing: state #574 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a03d30 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #371 | libevent_malloc: new ptr-libevent@0x557d46b90e50 size 128 | libevent_free: release ptr-libevent@0x7fb37c00cf80 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb388043350 | #371 spent 0.0571 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a01150 | handling event EVENT_SA_REPLACE for parent state #314 | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #314 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #575 at 0x557d46b90ee0 | State DB: adding IKEv2 state #575 in UNDEFINED | pstats #575 ikev2.ike started | Message ID: init #575: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #575: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #575; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #575 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-62" #575: initiating v2 parent SA to replace #314 | using existing local IKE proposals for connection road-eastnet-nonat-62 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 575 for state #575 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb388043350 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #575 | libevent_malloc: new ptr-libevent@0x7fb37c00cf80 size 128 | #575 spent 0.0362 milliseconds in ikev2_parent_outI1() | RESET processing: state #575 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d469ec960 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #314 | libevent_malloc: new ptr-libevent@0x557d46b92550 size 128 | libevent_free: release ptr-libevent@0x7fb364035750 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a01150 | #314 spent 0.0556 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36000d120 | handling event EVENT_SA_REPLACE for parent state #352 | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #352 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #576 at 0x557d46b925e0 | State DB: adding IKEv2 state #576 in UNDEFINED | pstats #576 ikev2.ike started | Message ID: init #576: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #576: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #576; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #576 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-100" #576: initiating v2 parent SA to replace #352 | using existing local IKE proposals for connection road-eastnet-nonat-100 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 576 for state #576 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a01150 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #576 | libevent_malloc: new ptr-libevent@0x7fb364035750 size 128 | #576 spent 0.0349 milliseconds in ikev2_parent_outI1() | RESET processing: state #576 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a65da0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #352 | libevent_malloc: new ptr-libevent@0x557d46b93c50 size 128 | libevent_free: release ptr-libevent@0x7fb36001fd50 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb36000d120 | #352 spent 0.0553 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a5da90 | handling event EVENT_SA_REPLACE for parent state #267 | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #267 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #577 at 0x557d46b93ce0 | State DB: adding IKEv2 state #577 in UNDEFINED | pstats #577 ikev2.ike started | Message ID: init #577: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #577: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #577; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #577 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-15" #577: initiating v2 parent SA to replace #267 | using existing local IKE proposals for connection road-eastnet-nonat-15 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 577 for state #577 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36000d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #577 | libevent_malloc: new ptr-libevent@0x7fb36001fd50 size 128 | #577 spent 0.0638 milliseconds in ikev2_parent_outI1() | RESET processing: state #577 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46aa8bd0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #267 | libevent_malloc: new ptr-libevent@0x557d46b95350 size 128 | libevent_free: release ptr-libevent@0x7fb37c035930 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a5da90 | #267 spent 0.094 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_SA_REPLACE for parent state #395 | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #395 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #578 at 0x557d46b953e0 | State DB: adding IKEv2 state #578 in UNDEFINED | pstats #578 ikev2.ike started | Message ID: init #578: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #578: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #578; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #578 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-143" #578: initiating v2 parent SA to replace #395 | using existing local IKE proposals for connection road-eastnet-nonat-143 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 578 for state #578 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a5da90 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #578 | libevent_malloc: new ptr-libevent@0x7fb37c035930 size 128 | #578 spent 0.0362 milliseconds in ikev2_parent_outI1() | RESET processing: state #578 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46aae2d0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #395 | libevent_malloc: new ptr-libevent@0x557d46b96a50 size 128 | libevent_free: release ptr-libevent@0x7fb364023a90 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d469fb8a0 | #395 spent 0.0558 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a4bfd0 | handling event EVENT_SA_REPLACE for parent state #381 | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #381 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #579 at 0x557d46b96ae0 | State DB: adding IKEv2 state #579 in UNDEFINED | pstats #579 ikev2.ike started | Message ID: init #579: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #579: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #579; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #579 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-129" #579: initiating v2 parent SA to replace #381 | using existing local IKE proposals for connection road-eastnet-nonat-129 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 579 for state #579 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469fb8a0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #579 | libevent_malloc: new ptr-libevent@0x7fb364023a90 size 128 | #579 spent 0.0357 milliseconds in ikev2_parent_outI1() | RESET processing: state #579 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46addc10 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #381 | libevent_malloc: new ptr-libevent@0x557d46b98150 size 128 | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a4bfd0 | #381 spent 0.0567 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3840489a0 | handling event EVENT_SA_REPLACE for parent state #367 | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #367 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #580 at 0x557d46b981e0 | State DB: adding IKEv2 state #580 in UNDEFINED | pstats #580 ikev2.ike started | Message ID: init #580: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #580: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #580; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #580 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-115" #580: initiating v2 parent SA to replace #367 | using existing local IKE proposals for connection road-eastnet-nonat-115 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 580 for state #580 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4bfd0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #580 | libevent_malloc: new ptr-libevent@0x7fb344009640 size 128 | #580 spent 0.0351 milliseconds in ikev2_parent_outI1() | RESET processing: state #580 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46ae1d50 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #367 | libevent_malloc: new ptr-libevent@0x557d46b99850 size 128 | libevent_free: release ptr-libevent@0x7fb384036e20 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb3840489a0 | #367 spent 0.0552 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c046090 | handling event EVENT_SA_REPLACE for parent state #373 | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #373 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #581 at 0x557d46b998e0 | State DB: adding IKEv2 state #581 in UNDEFINED | pstats #581 ikev2.ike started | Message ID: init #581: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #581: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #581; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #581 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-121" #581: initiating v2 parent SA to replace #373 | using existing local IKE proposals for connection road-eastnet-nonat-121 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 581 for state #581 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb3840489a0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #581 | libevent_malloc: new ptr-libevent@0x7fb384036e20 size 128 | #581 spent 0.0381 milliseconds in ikev2_parent_outI1() | RESET processing: state #581 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46ae3310 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #373 | libevent_malloc: new ptr-libevent@0x557d46b9af50 size 128 | libevent_free: release ptr-libevent@0x7fb37c023f10 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb37c046090 | #373 spent 0.0573 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab3980 | handling event EVENT_SA_REPLACE for parent state #379 | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #379 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #582 at 0x557d46b9afe0 | State DB: adding IKEv2 state #582 in UNDEFINED | pstats #582 ikev2.ike started | Message ID: init #582: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #582: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #582; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #582 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-127" #582: initiating v2 parent SA to replace #379 | using existing local IKE proposals for connection road-eastnet-nonat-127 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 582 for state #582 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c046090 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #582 | libevent_malloc: new ptr-libevent@0x7fb37c023f10 size 128 | #582 spent 0.038 milliseconds in ikev2_parent_outI1() | RESET processing: state #582 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46ae7450 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #379 | libevent_malloc: new ptr-libevent@0x557d46b9c650 size 128 | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46ab3980 | #379 spent 0.0747 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad5900 | handling event EVENT_SA_REPLACE for parent state #258 | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #258 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #583 at 0x557d46b9c6e0 | State DB: adding IKEv2 state #583 in UNDEFINED | pstats #583 ikev2.ike started | Message ID: init #583: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #583: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #583; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #583 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-6" #583: initiating v2 parent SA to replace #258 | using existing local IKE proposals for connection road-eastnet-nonat-6 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 583 for state #583 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab3980 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #583 | libevent_malloc: new ptr-libevent@0x7fb374017f50 size 128 | #583 spent 0.05 milliseconds in ikev2_parent_outI1() | RESET processing: state #583 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46aee110 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #258 | libevent_malloc: new ptr-libevent@0x557d46b9dd50 size 128 | libevent_free: release ptr-libevent@0x7fb34c0300e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46ad5900 | #258 spent 0.0698 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad4380 | handling event EVENT_SA_REPLACE for parent state #360 | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #360 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #584 at 0x557d46b9dde0 | State DB: adding IKEv2 state #584 in UNDEFINED | pstats #584 ikev2.ike started | Message ID: init #584: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #584: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #584; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #584 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-108" #584: initiating v2 parent SA to replace #360 | using existing local IKE proposals for connection road-eastnet-nonat-108 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 584 for state #584 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad5900 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #584 | libevent_malloc: new ptr-libevent@0x7fb34c0300e0 size 128 | #584 spent 0.0367 milliseconds in ikev2_parent_outI1() | RESET processing: state #584 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46af4dd0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #360 | libevent_malloc: new ptr-libevent@0x557d46b9f450 size 128 | libevent_free: release ptr-libevent@0x7fb37002a950 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46ad4380 | #360 spent 0.0563 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a61c10 | handling event EVENT_SA_REPLACE for parent state #308 | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #308 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #585 at 0x557d46b9f4e0 | State DB: adding IKEv2 state #585 in UNDEFINED | pstats #585 ikev2.ike started | Message ID: init #585: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #585: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #585; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #585 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-56" #585: initiating v2 parent SA to replace #308 | using existing local IKE proposals for connection road-eastnet-nonat-56 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 585 for state #585 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad4380 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #585 | libevent_malloc: new ptr-libevent@0x7fb37002a950 size 128 | #585 spent 0.0371 milliseconds in ikev2_parent_outI1() | RESET processing: state #585 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46afa4d0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #308 | libevent_malloc: new ptr-libevent@0x557d46ba0b50 size 128 | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a61c10 | #308 spent 0.0566 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b246c0 | handling event EVENT_SA_REPLACE for parent state #254 | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #254 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #586 at 0x557d46ba0be0 | State DB: adding IKEv2 state #586 in UNDEFINED | pstats #586 ikev2.ike started | Message ID: init #586: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #586: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #586; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #586 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-2" #586: initiating v2 parent SA to replace #254 | using existing local IKE proposals for connection road-eastnet-nonat-2 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 586 for state #586 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a61c10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #586 | libevent_malloc: new ptr-libevent@0x7fb37c0180b0 size 128 | #586 spent 0.0363 milliseconds in ikev2_parent_outI1() | RESET processing: state #586 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46afba90 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #254 | libevent_malloc: new ptr-libevent@0x557d46ba2250 size 128 | libevent_free: release ptr-libevent@0x7fb34c035930 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46b246c0 | #254 spent 0.0556 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469fa300 | handling event EVENT_SA_REPLACE for parent state #365 | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #365 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #587 at 0x557d46ba22e0 | State DB: adding IKEv2 state #587 in UNDEFINED | pstats #587 ikev2.ike started | Message ID: init #587: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #587: UNDEFINED(ignore) => PARENT_I0(ignore) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 506 time elapsed 0.006328 seconds | Message ID: init_ike #587; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | (#506) spent 0.995 milliseconds in crypto helper computing work-order 506: ikev2_outI1 KE (pcr) | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 505 time elapsed 0.006457 seconds | crypto helper 14 sending results from work-order 506 for state #506 to event queue | (#505) spent 0.985 milliseconds in crypto helper computing work-order 505: ikev2_outI1 KE (pcr) | scheduling resume sending helper answer for #506 | crypto helper 10 sending results from work-order 505 for state #505 to event queue | libevent_malloc: new ptr-libevent@0x7fb37004a770 size 128 | scheduling resume sending helper answer for #505 | suspend processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | crypto helper 14 starting work-order 525 for state #525 | libevent_malloc: new ptr-libevent@0x7fb37c02a950 size 128 | start processing: state #587 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | crypto helper 10 starting work-order 526 for state #526 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 525 "road-eastnet-nonat-113" #587: initiating v2 parent SA to replace #365 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 526 | using existing local IKE proposals for connection road-eastnet-nonat-113 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 587 for state #587 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b246c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #587 | libevent_malloc: new ptr-libevent@0x7fb34c035930 size 128 | #587 spent 0.0709 milliseconds in ikev2_parent_outI1() | RESET processing: state #587 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b01190 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #365 | libevent_malloc: new ptr-libevent@0x557d46ba3950 size 128 | libevent_free: release ptr-libevent@0x7fb34c03a770 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d469fa300 | #365 spent 0.0937 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_SA_REPLACE for parent state #269 | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #269 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #588 at 0x557d46ba39e0 | State DB: adding IKEv2 state #588 in UNDEFINED | pstats #588 ikev2.ike started | Message ID: init #588: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #588: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #588; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #588 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-17" #588: initiating v2 parent SA to replace #269 | using existing local IKE proposals for connection road-eastnet-nonat-17 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 588 for state #588 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d469fa300 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #588 | libevent_malloc: new ptr-libevent@0x7fb34c03a770 size 128 | #588 spent 0.0406 milliseconds in ikev2_parent_outI1() | RESET processing: state #588 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b03d10 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #269 | libevent_malloc: new ptr-libevent@0x557d46ba5050 size 128 | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb35c005860 | #269 spent 0.0606 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388009ed0 | handling event EVENT_SA_REPLACE for parent state #307 | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #307 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #589 at 0x557d46ba50e0 | State DB: adding IKEv2 state #589 in UNDEFINED | pstats #589 ikev2.ike started | Message ID: init #589: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #589: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #589; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #589 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-55" #589: initiating v2 parent SA to replace #307 | using existing local IKE proposals for connection road-eastnet-nonat-55 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 589 for state #589 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #589 | libevent_malloc: new ptr-libevent@0x7fb34800cf80 size 128 | #589 spent 0.0353 milliseconds in ikev2_parent_outI1() | RESET processing: state #589 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46afd050 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #307 | libevent_malloc: new ptr-libevent@0x557d46ba6750 size 128 | libevent_free: release ptr-libevent@0x7fb38801d010 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb388009ed0 | #307 spent 0.0549 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b05240 | handling event EVENT_SA_REPLACE for parent state #311 | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #311 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #590 at 0x557d46ba67e0 | State DB: adding IKEv2 state #590 in UNDEFINED | pstats #590 ikev2.ike started | Message ID: init #590: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #590: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #590; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #590 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-59" #590: initiating v2 parent SA to replace #311 | using existing local IKE proposals for connection road-eastnet-nonat-59 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 590 for state #590 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb388009ed0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #590 | libevent_malloc: new ptr-libevent@0x7fb38801d010 size 128 | #590 spent 0.0359 milliseconds in ikev2_parent_outI1() | RESET processing: state #590 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b11690 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #311 | libevent_malloc: new ptr-libevent@0x557d46ba7e50 size 128 | libevent_free: release ptr-libevent@0x7fb338046040 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46b05240 | #311 spent 0.0552 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a276e0 | handling event EVENT_SA_REPLACE for parent state #256 | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #256 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #591 at 0x557d46ba7ee0 | State DB: adding IKEv2 state #591 in UNDEFINED | pstats #591 ikev2.ike started | Message ID: init #591: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #591: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #591; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #591 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-4" #591: initiating v2 parent SA to replace #256 | using existing local IKE proposals for connection road-eastnet-nonat-4 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 591 for state #591 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b05240 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #591 | libevent_malloc: new ptr-libevent@0x7fb338046040 size 128 | #591 spent 0.0387 milliseconds in ikev2_parent_outI1() | RESET processing: state #591 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b14210 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #256 | libevent_malloc: new ptr-libevent@0x557d46ba9550 size 128 | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a276e0 | #256 spent 0.0584 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_SA_REPLACE for parent state #260 | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #260 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #592 at 0x557d46ba95e0 | State DB: adding IKEv2 state #592 in UNDEFINED | pstats #592 ikev2.ike started | Message ID: init #592: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #592: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #592; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #592 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-8" #592: initiating v2 parent SA to replace #260 | using existing local IKE proposals for connection road-eastnet-nonat-8 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 592 for state #592 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a276e0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #592 | libevent_malloc: new ptr-libevent@0x7fb38000fb00 size 128 | #592 spent 0.0369 milliseconds in ikev2_parent_outI1() | RESET processing: state #592 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b157d0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #260 | libevent_malloc: new ptr-libevent@0x557d46baac50 size 128 | libevent_free: release ptr-libevent@0x7fb36802a950 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a23190 | #260 spent 0.0563 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350040840 | handling event EVENT_SA_REPLACE for parent state #259 | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #259 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #593 at 0x557d46baace0 | State DB: adding IKEv2 state #593 in UNDEFINED | pstats #593 ikev2.ike started | Message ID: init #593: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #593: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #593; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #593 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-7" #593: initiating v2 parent SA to replace #259 | using existing local IKE proposals for connection road-eastnet-nonat-7 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 593 for state #593 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a23190 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #593 | libevent_malloc: new ptr-libevent@0x7fb36802a950 size 128 | #593 spent 0.0358 milliseconds in ikev2_parent_outI1() | RESET processing: state #593 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b16d90 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #259 | libevent_malloc: new ptr-libevent@0x557d46bac350 size 128 | libevent_free: release ptr-libevent@0x7fb3500342b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb350040840 | #259 spent 0.0552 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38800f8f0 | handling event EVENT_SA_REPLACE for parent state #333 | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #333 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #594 at 0x557d46bac3e0 | State DB: adding IKEv2 state #594 in UNDEFINED | pstats #594 ikev2.ike started | Message ID: init #594: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #594: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #594; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #594 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-81" #594: initiating v2 parent SA to replace #333 | using existing local IKE proposals for connection road-eastnet-nonat-81 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 594 for state #594 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb350040840 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #594 | libevent_malloc: new ptr-libevent@0x7fb3500342b0 size 128 | #594 spent 0.0666 milliseconds in ikev2_parent_outI1() | RESET processing: state #594 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b18350 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #333 | libevent_malloc: new ptr-libevent@0x557d46bada50 size 128 | libevent_free: release ptr-libevent@0x7fb388037a30 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb38800f8f0 | #333 spent 0.101 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb384043260 | handling event EVENT_SA_REPLACE for parent state #321 | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #321 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #595 at 0x557d46badae0 | State DB: adding IKEv2 state #595 in UNDEFINED | pstats #595 ikev2.ike started | Message ID: init #595: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #595: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #595; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #595 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-69" #595: initiating v2 parent SA to replace #321 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 513 time elapsed 0.006049 seconds | using existing local IKE proposals for connection road-eastnet-nonat-69 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | (#513) spent 0.63 milliseconds in crypto helper computing work-order 513: ikev2_outI1 KE (pcr) | adding ikev2_outI1 KE work-order 595 for state #595 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb38800f8f0 | crypto helper 13 sending results from work-order 513 for state #513 to event queue | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #595 | libevent_malloc: new ptr-libevent@0x7fb388037a30 size 128 | scheduling resume sending helper answer for #513 | #595 spent 0.0656 milliseconds in ikev2_parent_outI1() | libevent_malloc: new ptr-libevent@0x7fb35c0511f0 size 128 | RESET processing: state #595 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 13 starting work-order 527 for state #527 | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b1aed0 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 527 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #321 | libevent_malloc: new ptr-libevent@0x557d46baf150 size 128 | libevent_free: release ptr-libevent@0x7fb384031e80 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb384043260 | #321 spent 0.0985 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35801d710 | handling event EVENT_SA_REPLACE for parent state #318 | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #318 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #596 at 0x557d46baf1e0 | State DB: adding IKEv2 state #596 in UNDEFINED | pstats #596 ikev2.ike started | Message ID: init #596: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #596: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #596; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #596 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-66" #596: initiating v2 parent SA to replace #318 | using existing local IKE proposals for connection road-eastnet-nonat-66 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 596 for state #596 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb384043260 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #596 | libevent_malloc: new ptr-libevent@0x7fb384031e80 size 128 | #596 spent 0.0427 milliseconds in ikev2_parent_outI1() | RESET processing: state #596 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b1da50 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #318 | libevent_malloc: new ptr-libevent@0x557d46bb0850 size 128 | libevent_free: release ptr-libevent@0x7fb35803a770 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb35801d710 | #318 spent 0.063 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a1da10 | handling event EVENT_SA_REPLACE for parent state #274 | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #274 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #597 at 0x557d46bb08e0 | State DB: adding IKEv2 state #597 in UNDEFINED | pstats #597 ikev2.ike started | Message ID: init #597: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #597: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #597; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #597 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-22" #597: initiating v2 parent SA to replace #274 | using existing local IKE proposals for connection road-eastnet-nonat-22 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 597 for state #597 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35801d710 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #597 | libevent_malloc: new ptr-libevent@0x7fb35803a770 size 128 | #597 spent 0.0395 milliseconds in ikev2_parent_outI1() | RESET processing: state #597 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b1f010 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #274 | libevent_malloc: new ptr-libevent@0x557d46bb1f50 size 128 | libevent_free: release ptr-libevent@0x7fb36803f270 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a1da10 | #274 spent 0.0592 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a46910 | handling event EVENT_SA_REPLACE for parent state #341 | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #341 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #598 at 0x557d46bb1fe0 | State DB: adding IKEv2 state #598 in UNDEFINED | pstats #598 ikev2.ike started | Message ID: init #598: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #598: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #598; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #598 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-89" #598: initiating v2 parent SA to replace #341 | using existing local IKE proposals for connection road-eastnet-nonat-89 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 598 for state #598 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a1da10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #598 | libevent_malloc: new ptr-libevent@0x7fb36803f270 size 128 | #598 spent 0.0367 milliseconds in ikev2_parent_outI1() | RESET processing: state #598 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b205d0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #341 | libevent_malloc: new ptr-libevent@0x557d46bb3650 size 128 | libevent_free: release ptr-libevent@0x7fb388047480 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a46910 | #341 spent 0.0567 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37802a910 | handling event EVENT_SA_REPLACE for parent state #316 | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #316 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #599 at 0x557d46bb36e0 | State DB: adding IKEv2 state #599 in UNDEFINED | pstats #599 ikev2.ike started | Message ID: init #599: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #599: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #599; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #599 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-64" #599: initiating v2 parent SA to replace #316 | using existing local IKE proposals for connection road-eastnet-nonat-64 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 599 for state #599 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a46910 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #599 | libevent_malloc: new ptr-libevent@0x7fb388047480 size 128 | #599 spent 0.0364 milliseconds in ikev2_parent_outI1() | RESET processing: state #599 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b21b90 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #316 | libevent_malloc: new ptr-libevent@0x557d46bb4d50 size 128 | libevent_free: release ptr-libevent@0x7fb378044ad0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb37802a910 | #316 spent 0.0563 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_SA_REPLACE for parent state #380 | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #380 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #600 at 0x557d46bb4de0 | State DB: adding IKEv2 state #600 in UNDEFINED | pstats #600 ikev2.ike started | Message ID: init #600: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #600: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #600; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #600 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-128" #600: initiating v2 parent SA to replace #380 | using existing local IKE proposals for connection road-eastnet-nonat-128 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 600 for state #600 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37802a910 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #600 | libevent_malloc: new ptr-libevent@0x7fb378044ad0 size 128 | #600 spent 0.0379 milliseconds in ikev2_parent_outI1() | RESET processing: state #600 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b23150 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #380 | libevent_malloc: new ptr-libevent@0x557d46bb6450 size 128 | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb388002b20 | #380 spent 0.0578 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36003b100 | handling event EVENT_SA_REPLACE for parent state #268 | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #268 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #601 at 0x557d46bb64e0 | State DB: adding IKEv2 state #601 in UNDEFINED | pstats #601 ikev2.ike started | Message ID: init #601: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #601: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #601; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #601 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-16" #601: initiating v2 parent SA to replace #268 | using existing local IKE proposals for connection road-eastnet-nonat-16 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 601 for state #601 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb388002b20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #601 | libevent_malloc: new ptr-libevent@0x7fb37400cf80 size 128 | #601 spent 0.0366 milliseconds in ikev2_parent_outI1() | RESET processing: state #601 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b27290 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #268 | libevent_malloc: new ptr-libevent@0x557d46bb7b50 size 128 | libevent_free: release ptr-libevent@0x7fb360023dd0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb36003b100 | #268 spent 0.0564 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46af78c0 | handling event EVENT_SA_REPLACE for parent state #345 | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #345 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #602 at 0x557d46bb7be0 | State DB: adding IKEv2 state #602 in UNDEFINED | pstats #602 ikev2.ike started | Message ID: init #602: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #602: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #602; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #602 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-93" #602: initiating v2 parent SA to replace #345 | using existing local IKE proposals for connection road-eastnet-nonat-93 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 602 for state #602 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36003b100 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #602 | libevent_malloc: new ptr-libevent@0x7fb360023dd0 size 128 | #602 spent 0.0407 milliseconds in ikev2_parent_outI1() | RESET processing: state #602 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b28850 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #345 | libevent_malloc: new ptr-libevent@0x557d46bb9250 size 128 | libevent_free: release ptr-libevent@0x7fb380048a80 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46af78c0 | #345 spent 0.0604 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3380300a0 | handling event EVENT_SA_REPLACE for parent state #346 | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #346 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #603 at 0x557d46bb92e0 | State DB: adding IKEv2 state #603 in UNDEFINED | pstats #603 ikev2.ike started | Message ID: init #603: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #603: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #603; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #603 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-94" #603: initiating v2 parent SA to replace #346 | using existing local IKE proposals for connection road-eastnet-nonat-94 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 603 for state #603 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46af78c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #603 | libevent_malloc: new ptr-libevent@0x7fb380048a80 size 128 | #603 spent 0.0365 milliseconds in ikev2_parent_outI1() | RESET processing: state #603 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b29e10 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #346 | libevent_malloc: new ptr-libevent@0x557d46bba950 size 128 | libevent_free: release ptr-libevent@0x7fb33803a770 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb3380300a0 | #346 spent 0.0691 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354025320 | handling event EVENT_SA_REPLACE for parent state #272 | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #272 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #604 at 0x557d46bba9e0 | State DB: adding IKEv2 state #604 in UNDEFINED | pstats #604 ikev2.ike started | Message ID: init #604: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #604: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #604; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #604 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-20" #604: initiating v2 parent SA to replace #272 | using existing local IKE proposals for connection road-eastnet-nonat-20 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 604 for state #604 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb3380300a0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #604 | libevent_malloc: new ptr-libevent@0x7fb33803a770 size 128 | #604 spent 0.0381 milliseconds in ikev2_parent_outI1() | RESET processing: state #604 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b2b3d0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #272 | libevent_malloc: new ptr-libevent@0x557d46bbc050 size 128 | libevent_free: release ptr-libevent@0x7fb35403f170 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb354025320 | #272 spent 0.0575 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_SA_REPLACE for parent state #337 | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #337 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #605 at 0x557d46bbc0e0 | State DB: adding IKEv2 state #605 in UNDEFINED | pstats #605 ikev2.ike started | Message ID: init #605: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #605: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #605; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #605 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-85" #605: initiating v2 parent SA to replace #337 | using existing local IKE proposals for connection road-eastnet-nonat-85 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 605 for state #605 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb354025320 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #605 | libevent_malloc: new ptr-libevent@0x7fb35403f170 size 128 | #605 spent 0.0361 milliseconds in ikev2_parent_outI1() | RESET processing: state #605 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b2c990 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #337 | libevent_malloc: new ptr-libevent@0x557d46bbd750 size 128 | libevent_free: release ptr-libevent@0x7fb3700300e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a0a9d0 | #337 spent 0.0553 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c040840 | handling event EVENT_SA_REPLACE for parent state #475 | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #475 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #606 at 0x557d46bbd7e0 | State DB: adding IKEv2 state #606 in UNDEFINED | pstats #606 ikev2.ike started | Message ID: init #606: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #606: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #606; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #606 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-223" #606: initiating v2 parent SA to replace #475 | using existing local IKE proposals for connection road-eastnet-nonat-223 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 606 for state #606 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a0a9d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #606 | libevent_malloc: new ptr-libevent@0x7fb3700300e0 size 128 | #606 spent 0.0344 milliseconds in ikev2_parent_outI1() | RESET processing: state #606 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46af6380 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #475 | libevent_malloc: new ptr-libevent@0x557d46bbee50 size 128 | libevent_free: release ptr-libevent@0x7fb34c00cf80 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb37c040840 | #475 spent 0.054 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34001fa80 | handling event EVENT_SA_REPLACE for parent state #287 | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #287 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #607 at 0x557d46bbeee0 | State DB: adding IKEv2 state #607 in UNDEFINED | pstats #607 ikev2.ike started | Message ID: init #607: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #607: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #607; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #607 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-35" #607: initiating v2 parent SA to replace #287 | using existing local IKE proposals for connection road-eastnet-nonat-35 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 607 for state #607 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c040840 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #607 | libevent_malloc: new ptr-libevent@0x7fb34c00cf80 size 128 | #607 spent 0.0357 milliseconds in ikev2_parent_outI1() | RESET processing: state #607 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46abbc40 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #287 | libevent_malloc: new ptr-libevent@0x557d46bc0550 size 128 | libevent_free: release ptr-libevent@0x7fb3400343b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb34001fa80 | #287 spent 0.0554 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354012bf0 | handling event EVENT_SA_REPLACE for parent state #312 | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #312 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #608 at 0x557d46bc05e0 | State DB: adding IKEv2 state #608 in UNDEFINED | pstats #608 ikev2.ike started | Message ID: init #608: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #608: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #608; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #608 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-60" #608: initiating v2 parent SA to replace #312 | using existing local IKE proposals for connection road-eastnet-nonat-60 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 608 for state #608 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34001fa80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #608 | libevent_malloc: new ptr-libevent@0x7fb3400343b0 size 128 | #608 spent 0.0361 milliseconds in ikev2_parent_outI1() | RESET processing: state #608 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46ad9ac0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #312 | libevent_malloc: new ptr-libevent@0x557d46bc1c50 size 128 | libevent_free: release ptr-libevent@0x7fb36401a420 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb354012bf0 | #312 spent 0.0565 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3800153c0 | handling event EVENT_SA_REPLACE for parent state #390 | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #390 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #609 at 0x557d46bc1ce0 | State DB: adding IKEv2 state #609 in UNDEFINED | pstats #609 ikev2.ike started | Message ID: init #609: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #609: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #609; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #609 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-138" #609: initiating v2 parent SA to replace #390 | using existing local IKE proposals for connection road-eastnet-nonat-138 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 609 for state #609 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb354012bf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #609 | libevent_malloc: new ptr-libevent@0x7fb36401a420 size 128 | #609 spent 0.0358 milliseconds in ikev2_parent_outI1() | RESET processing: state #609 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46ab39c0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #390 | libevent_malloc: new ptr-libevent@0x557d46bc3350 size 128 | libevent_free: release ptr-libevent@0x7fb380041ce0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb3800153c0 | #390 spent 0.0551 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c046090 | handling event EVENT_SA_REPLACE for parent state #270 | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #270 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #610 at 0x557d46bc33e0 | State DB: adding IKEv2 state #610 in UNDEFINED | pstats #610 ikev2.ike started | Message ID: init #610: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #610: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #610; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #610 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-18" #610: initiating v2 parent SA to replace #270 | using existing local IKE proposals for connection road-eastnet-nonat-18 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 610 for state #610 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb3800153c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #610 | libevent_malloc: new ptr-libevent@0x7fb380041ce0 size 128 | #610 spent 0.0354 milliseconds in ikev2_parent_outI1() | RESET processing: state #610 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46af3800 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #270 | libevent_malloc: new ptr-libevent@0x557d46bc4a50 size 128 | libevent_free: release ptr-libevent@0x7fb354009640 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb35c046090 | #270 spent 0.0548 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0d4c0 | handling event EVENT_SA_REPLACE for parent state #429 | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #429 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #611 at 0x557d46bc4ae0 | State DB: adding IKEv2 state #611 in UNDEFINED | pstats #611 ikev2.ike started | Message ID: init #611: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #611: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #611; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #611 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-177" #611: initiating v2 parent SA to replace #429 | using existing local IKE proposals for connection road-eastnet-nonat-177 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 611 for state #611 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c046090 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #611 | libevent_malloc: new ptr-libevent@0x7fb354009640 size 128 | #611 spent 0.0359 milliseconds in ikev2_parent_outI1() | RESET processing: state #611 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46aecb40 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #429 | libevent_malloc: new ptr-libevent@0x557d46bc6150 size 128 | libevent_free: release ptr-libevent@0x7fb34803b0b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46b0d4c0 | #429 spent 0.0552 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370046090 | handling event EVENT_SA_REPLACE for parent state #325 | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #325 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #612 at 0x557d46bc61e0 | State DB: adding IKEv2 state #612 in UNDEFINED | pstats #612 ikev2.ike started | Message ID: init #612: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #612: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #612; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #612 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-73" #612: initiating v2 parent SA to replace #325 | using existing local IKE proposals for connection road-eastnet-nonat-73 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 612 for state #612 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0d4c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #612 | libevent_malloc: new ptr-libevent@0x7fb34803b0b0 size 128 | #612 spent 0.0563 milliseconds in ikev2_parent_outI1() | RESET processing: state #612 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46ac2900 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #325 | libevent_malloc: new ptr-libevent@0x557d46bc7850 size 128 | libevent_free: release ptr-libevent@0x7fb35402a950 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb370046090 | #325 spent 0.0762 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_SA_REPLACE for parent state #283 | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #283 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #613 at 0x557d46bc78e0 | State DB: adding IKEv2 state #613 in UNDEFINED | pstats #613 ikev2.ike started | Message ID: init #613: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #613: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #613; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #613 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-31" #613: initiating v2 parent SA to replace #283 | using existing local IKE proposals for connection road-eastnet-nonat-31 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 613 for state #613 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb370046090 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #613 | libevent_malloc: new ptr-libevent@0x7fb35402a950 size 128 | #613 spent 0.0357 milliseconds in ikev2_parent_outI1() | RESET processing: state #613 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46af0c80 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #283 | libevent_malloc: new ptr-libevent@0x557d46bc8f50 size 128 | libevent_free: release ptr-libevent@0x7fb37c014c70 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb354005860 | #283 spent 0.0679 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c01fda0 | handling event EVENT_SA_REPLACE for parent state #299 | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #299 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #614 at 0x557d46bc8fe0 | State DB: adding IKEv2 state #614 in UNDEFINED | pstats #614 ikev2.ike started | Message ID: init #614: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #614: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #614; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #614 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-47" #614: initiating v2 parent SA to replace #299 | using existing local IKE proposals for connection road-eastnet-nonat-47 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 614 for state #614 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb354005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #614 | libevent_malloc: new ptr-libevent@0x7fb37c014c70 size 128 | #614 spent 0.0394 milliseconds in ikev2_parent_outI1() | RESET processing: state #614 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a74cd0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #299 | libevent_malloc: new ptr-libevent@0x557d46bca650 size 128 | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb37c01fda0 | #299 spent 0.0588 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2cc10 | handling event EVENT_SA_REPLACE for parent state #277 | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #277 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #615 at 0x557d46bca6e0 | State DB: adding IKEv2 state #615 in UNDEFINED | pstats #615 ikev2.ike started | Message ID: init #615: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #615: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #615; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #615 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-25" #615: initiating v2 parent SA to replace #277 | using existing local IKE proposals for connection road-eastnet-nonat-25 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 615 for state #615 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c01fda0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #615 | libevent_malloc: new ptr-libevent@0x7fb380006900 size 128 | #615 spent 0.0347 milliseconds in ikev2_parent_outI1() | RESET processing: state #615 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a77850 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #277 | libevent_malloc: new ptr-libevent@0x557d46bcbd50 size 128 | libevent_free: release ptr-libevent@0x7fb36001d920 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a2cc10 | #277 spent 0.0541 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c01d970 | handling event EVENT_SA_REPLACE for parent state #294 | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #294 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #616 at 0x557d46bcbde0 | State DB: adding IKEv2 state #616 in UNDEFINED | pstats #616 ikev2.ike started | Message ID: init #616: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #616: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #616; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #616 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-42" #616: initiating v2 parent SA to replace #294 | using existing local IKE proposals for connection road-eastnet-nonat-42 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 616 for state #616 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2cc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #616 | libevent_malloc: new ptr-libevent@0x7fb36001d920 size 128 | #616 spent 0.0383 milliseconds in ikev2_parent_outI1() | RESET processing: state #616 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a63210 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #294 | libevent_malloc: new ptr-libevent@0x557d46bcd450 size 128 | libevent_free: release ptr-libevent@0x7fb36c044a20 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb36c01d970 | #294 spent 0.058 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37402ffb0 | handling event EVENT_SA_REPLACE for parent state #417 | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #417 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #617 at 0x557d46bcd4e0 | State DB: adding IKEv2 state #617 in UNDEFINED | pstats #617 ikev2.ike started | Message ID: init #617: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #617: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #617; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #617 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-165" #617: initiating v2 parent SA to replace #417 | using existing local IKE proposals for connection road-eastnet-nonat-165 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 617 for state #617 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c01d970 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #617 | libevent_malloc: new ptr-libevent@0x7fb36c044a20 size 128 | #617 spent 0.0345 milliseconds in ikev2_parent_outI1() | RESET processing: state #617 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a4ebd0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #417 | libevent_malloc: new ptr-libevent@0x557d46bceb50 size 128 | libevent_free: release ptr-libevent@0x7fb374034460 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb37402ffb0 | #417 spent 0.054 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36400cc10 | handling event EVENT_SA_REPLACE for parent state #391 | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #391 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #618 at 0x557d46bcebe0 | State DB: adding IKEv2 state #618 in UNDEFINED | pstats #618 ikev2.ike started | Message ID: init #618: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #618: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #618; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #618 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-139" #618: initiating v2 parent SA to replace #391 | using existing local IKE proposals for connection road-eastnet-nonat-139 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 618 for state #618 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37402ffb0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #618 | libevent_malloc: new ptr-libevent@0x7fb374034460 size 128 | #618 spent 0.0438 milliseconds in ikev2_parent_outI1() | RESET processing: state #618 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46ae9fc0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #391 | libevent_malloc: new ptr-libevent@0x557d46bd0250 size 128 | libevent_free: release ptr-libevent@0x7fb364039970 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb36400cc10 | #391 spent 0.0729 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aacc80 | handling event EVENT_SA_REPLACE for parent state #416 | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #416 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #619 at 0x557d46bd02e0 | State DB: adding IKEv2 state #619 in UNDEFINED | pstats #619 ikev2.ike started | Message ID: init #619: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #619: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #619; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #619 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-164" #619: initiating v2 parent SA to replace #416 | using existing local IKE proposals for connection road-eastnet-nonat-164 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 619 for state #619 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36400cc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #619 | libevent_malloc: new ptr-libevent@0x7fb364039970 size 128 | #619 spent 0.0587 milliseconds in ikev2_parent_outI1() | RESET processing: state #619 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a9f380 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #416 | libevent_malloc: new ptr-libevent@0x557d46bd1950 size 128 | libevent_free: release ptr-libevent@0x7fb3780407f0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46aacc80 | #416 spent 0.0882 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3400296b0 | handling event EVENT_SA_REPLACE for parent state #315 | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #315 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #620 at 0x557d46bd19e0 | State DB: adding IKEv2 state #620 in UNDEFINED | pstats #620 ikev2.ike started | Message ID: init #620: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #620: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #620; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #620 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-63" #620: initiating v2 parent SA to replace #315 | using existing local IKE proposals for connection road-eastnet-nonat-63 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 620 for state #620 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aacc80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #620 | libevent_malloc: new ptr-libevent@0x7fb3780407f0 size 128 | #620 spent 0.055 milliseconds in ikev2_parent_outI1() | RESET processing: state #620 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46abfd80 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #315 | libevent_malloc: new ptr-libevent@0x557d46bd3050 size 128 | libevent_free: release ptr-libevent@0x7fb340039ba0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb3400296b0 | #315 spent 0.0872 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb344017ea0 | handling event EVENT_SA_REPLACE for parent state #305 | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #305 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #621 at 0x557d46bd30e0 | State DB: adding IKEv2 state #621 in UNDEFINED | pstats #621 ikev2.ike started | Message ID: init #621: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #621: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #621; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #621 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-53" #621: initiating v2 parent SA to replace #305 | using existing local IKE proposals for connection road-eastnet-nonat-53 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 621 for state #621 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb3400296b0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #621 | libevent_malloc: new ptr-libevent@0x7fb340039ba0 size 128 | #621 spent 0.0531 milliseconds in ikev2_parent_outI1() | RESET processing: state #621 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b0bf80 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #305 | libevent_malloc: new ptr-libevent@0x557d46bd4750 size 128 | libevent_free: release ptr-libevent@0x7fb344039b40 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb344017ea0 | #305 spent 0.0835 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_SA_REPLACE for parent state #313 | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #313 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #622 at 0x557d46bd47e0 | State DB: adding IKEv2 state #622 in UNDEFINED | pstats #622 ikev2.ike started | Message ID: init #622: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #622: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #622; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #622 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-61" #622: initiating v2 parent SA to replace #313 | using existing local IKE proposals for connection road-eastnet-nonat-61 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 622 for state #622 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb344017ea0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #622 | libevent_malloc: new ptr-libevent@0x7fb344039b40 size 128 | #622 spent 0.053 milliseconds in ikev2_parent_outI1() | RESET processing: state #622 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46aa0940 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #313 | libevent_malloc: new ptr-libevent@0x557d46bd5e50 size 128 | libevent_free: release ptr-libevent@0x7fb33803b0b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb33800d120 | #313 spent 0.0811 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_SA_REPLACE for parent state #319 | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #319 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #623 at 0x557d46bd5ee0 | State DB: adding IKEv2 state #623 in UNDEFINED | pstats #623 ikev2.ike started | Message ID: init #623: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #623: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #623; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #623 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-67" #623: initiating v2 parent SA to replace #319 | using existing local IKE proposals for connection road-eastnet-nonat-67 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 623 for state #623 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb33800d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #623 | libevent_malloc: new ptr-libevent@0x7fb33803b0b0 size 128 | #623 spent 0.0568 milliseconds in ikev2_parent_outI1() | RESET processing: state #623 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a25d10 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #319 | libevent_malloc: new ptr-libevent@0x557d46bd7550 size 128 | libevent_free: release ptr-libevent@0x7fb36403f0c0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a0a990 | #319 spent 0.0868 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36000cc10 | handling event EVENT_SA_REPLACE for parent state #477 | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #477 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #624 at 0x557d46bd75e0 | State DB: adding IKEv2 state #624 in UNDEFINED | pstats #624 ikev2.ike started | Message ID: init #624: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #624: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #624; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #624 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-225" #624: initiating v2 parent SA to replace #477 | using existing local IKE proposals for connection road-eastnet-nonat-225 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 624 for state #624 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a0a990 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #624 | libevent_malloc: new ptr-libevent@0x7fb36403f0c0 size 128 | #624 spent 0.0682 milliseconds in ikev2_parent_outI1() | RESET processing: state #624 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46ad0280 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #477 | libevent_malloc: new ptr-libevent@0x557d46bd8c50 size 128 | libevent_free: release ptr-libevent@0x7fb34003b010 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb36000cc10 | #477 spent 0.0973 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38000a290 | handling event EVENT_SA_REPLACE for parent state #280 | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #280 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #625 at 0x557d46bd8ce0 | State DB: adding IKEv2 state #625 in UNDEFINED | pstats #625 ikev2.ike started | Message ID: init #625: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #625: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #625; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #625 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-28" #625: initiating v2 parent SA to replace #280 | using existing local IKE proposals for connection road-eastnet-nonat-28 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 625 for state #625 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36000cc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #625 | libevent_malloc: new ptr-libevent@0x7fb34003b010 size 128 | #625 spent 0.0622 milliseconds in ikev2_parent_outI1() | RESET processing: state #625 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a5f0d0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #280 | libevent_malloc: new ptr-libevent@0x557d46bda350 size 128 | libevent_free: release ptr-libevent@0x7fb380036d70 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb38000a290 | #280 spent 0.0916 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aa1f00 | handling event EVENT_SA_REPLACE for parent state #278 | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #278 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #626 at 0x557d46bda3e0 | State DB: adding IKEv2 state #626 in UNDEFINED | pstats #626 ikev2.ike started | Message ID: init #626: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #626: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #626; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #626 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-26" #626: initiating v2 parent SA to replace #278 | using existing local IKE proposals for connection road-eastnet-nonat-26 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 626 for state #626 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb38000a290 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #626 | libevent_malloc: new ptr-libevent@0x7fb380036d70 size 128 | #626 spent 0.0553 milliseconds in ikev2_parent_outI1() | RESET processing: state #626 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a7a350 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #278 | libevent_malloc: new ptr-libevent@0x557d46bdba50 size 128 | libevent_free: release ptr-libevent@0x7fb3740356e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46aa1f00 | #278 spent 0.0848 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c018460 | handling event EVENT_SA_REPLACE for parent state #413 | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #413 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #627 at 0x557d46bdbae0 | State DB: adding IKEv2 state #627 in UNDEFINED | pstats #627 ikev2.ike started | Message ID: init #627: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #627: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #627; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #627 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-161" #627: initiating v2 parent SA to replace #413 | using existing local IKE proposals for connection road-eastnet-nonat-161 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 627 for state #627 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aa1f00 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #627 | libevent_malloc: new ptr-libevent@0x7fb3740356e0 size 128 | #627 spent 0.0609 milliseconds in ikev2_parent_outI1() | RESET processing: state #627 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a7a390 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #413 | libevent_malloc: new ptr-libevent@0x557d46bdd150 size 128 | libevent_free: release ptr-libevent@0x7fb35c014b40 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb35c018460 | #413 spent 0.0903 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b24680 | handling event EVENT_SA_REPLACE for parent state #396 | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #396 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #628 at 0x557d46bdd1e0 | State DB: adding IKEv2 state #628 in UNDEFINED | pstats #628 ikev2.ike started | Message ID: init #628: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #628: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #628; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #628 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-144" #628: initiating v2 parent SA to replace #396 | using existing local IKE proposals for connection road-eastnet-nonat-144 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 628 for state #628 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c018460 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #628 | libevent_malloc: new ptr-libevent@0x7fb35c014b40 size 128 | #628 spent 0.0557 milliseconds in ikev2_parent_outI1() | RESET processing: state #628 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a9c7a0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #396 | libevent_malloc: new ptr-libevent@0x557d46bde850 size 128 | libevent_free: release ptr-libevent@0x7fb388032bf0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46b24680 | #396 spent 0.0854 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b25c80 | handling event EVENT_SA_REPLACE for parent state #323 | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #323 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #629 at 0x557d46bde8e0 | State DB: adding IKEv2 state #629 in UNDEFINED | pstats #629 ikev2.ike started | Message ID: init #629: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #629: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #629; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #629 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-71" #629: initiating v2 parent SA to replace #323 | using existing local IKE proposals for connection road-eastnet-nonat-71 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 629 for state #629 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b24680 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #629 | libevent_malloc: new ptr-libevent@0x7fb388032bf0 size 128 | #629 spent 0.0409 milliseconds in ikev2_parent_outI1() | RESET processing: state #629 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a89700 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #323 | libevent_malloc: new ptr-libevent@0x557d46bdff50 size 128 | libevent_free: release ptr-libevent@0x7fb344035930 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46b25c80 | #323 spent 0.0627 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370012bf0 | handling event EVENT_SA_REPLACE for parent state #419 | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #419 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #630 at 0x557d46bdffe0 | State DB: adding IKEv2 state #630 in UNDEFINED | pstats #630 ikev2.ike started | Message ID: init #630: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #630: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #630; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #630 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-167" #630: initiating v2 parent SA to replace #419 | using existing local IKE proposals for connection road-eastnet-nonat-167 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 630 for state #630 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b25c80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #630 | libevent_malloc: new ptr-libevent@0x7fb344035930 size 128 | #630 spent 0.0379 milliseconds in ikev2_parent_outI1() | RESET processing: state #630 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46ae4840 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #419 | libevent_malloc: new ptr-libevent@0x557d46be1650 size 128 | libevent_free: release ptr-libevent@0x7fb35c0251c0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb370012bf0 | #419 spent 0.0582 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_SA_REPLACE for parent state #300 | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #300 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #631 at 0x557d46be16e0 | State DB: adding IKEv2 state #631 in UNDEFINED | pstats #631 ikev2.ike started | Message ID: init #631: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #631: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #631; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #631 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-48" #631: initiating v2 parent SA to replace #300 | using existing local IKE proposals for connection road-eastnet-nonat-48 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 631 for state #631 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb370012bf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #631 | libevent_malloc: new ptr-libevent@0x7fb35c0251c0 size 128 | #631 spent 0.0371 milliseconds in ikev2_parent_outI1() | RESET processing: state #631 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46ae4880 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #300 | libevent_malloc: new ptr-libevent@0x557d46be2d50 size 128 | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb34c005860 | #300 spent 0.0569 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358012630 | handling event EVENT_SA_REPLACE for parent state #440 | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #440 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #632 at 0x557d46be2de0 | State DB: adding IKEv2 state #632 in UNDEFINED | pstats #632 ikev2.ike started | Message ID: init #632: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #632: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #632; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #632 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-188" #632: initiating v2 parent SA to replace #440 | using existing local IKE proposals for connection road-eastnet-nonat-188 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 632 for state #632 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34c005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #632 | libevent_malloc: new ptr-libevent@0x7fb34c009640 size 128 | #632 spent 0.0373 milliseconds in ikev2_parent_outI1() | RESET processing: state #632 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46aeb520 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #440 | libevent_malloc: new ptr-libevent@0x557d46be4450 size 128 | libevent_free: release ptr-libevent@0x7fb358039e30 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb358012630 | #440 spent 0.0574 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a986c0 | handling event EVENT_SA_REPLACE for parent state #324 | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #324 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #633 at 0x557d46be44e0 | State DB: adding IKEv2 state #633 in UNDEFINED | pstats #633 ikev2.ike started | Message ID: init #633: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #633: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #633; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #633 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-72" #633: initiating v2 parent SA to replace #324 | using existing local IKE proposals for connection road-eastnet-nonat-72 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 633 for state #633 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb358012630 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #633 | libevent_malloc: new ptr-libevent@0x7fb358039e30 size 128 | #633 spent 0.0373 milliseconds in ikev2_parent_outI1() | RESET processing: state #633 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b0ea80 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #324 | libevent_malloc: new ptr-libevent@0x557d46be5b50 size 128 | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a986c0 | #324 spent 0.0592 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38000feb0 | handling event EVENT_SA_REPLACE for parent state #473 | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #473 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #634 at 0x557d46be5be0 | State DB: adding IKEv2 state #634 in UNDEFINED | pstats #634 ikev2.ike started | Message ID: init #634: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #634: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #634; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #634 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-221" #634: initiating v2 parent SA to replace #473 | using existing local IKE proposals for connection road-eastnet-nonat-221 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 634 for state #634 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a986c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #634 | libevent_malloc: new ptr-libevent@0x7fb36000cf80 size 128 | #634 spent 0.068 milliseconds in ikev2_parent_outI1() | RESET processing: state #634 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a47e90 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #473 | libevent_malloc: new ptr-libevent@0x557d46be7250 size 128 | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb38000feb0 | #473 spent 0.112 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ae48c0 | handling event EVENT_SA_REPLACE for parent state #497 | start processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #497 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #635 at 0x557d46be72e0 | State DB: adding IKEv2 state #635 in UNDEFINED | pstats #635 ikev2.ike started | Message ID: init #635: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #635: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #635; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #635 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-245" #635: initiating v2 parent SA to replace #497 | using existing local IKE proposals for connection road-eastnet-nonat-245 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 635 for state #635 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb38000feb0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #635 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 | #635 spent 0.0452 milliseconds in ikev2_parent_outI1() | RESET processing: state #635 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46a47ed0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #497 | libevent_malloc: new ptr-libevent@0x557d46be8950 size 128 | libevent_free: release ptr-libevent@0x7fb3480251c0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46ae48c0 | #497 spent 0.0717 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_SA_REPLACE for parent state #398 | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #398 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #636 at 0x557d46be89e0 | State DB: adding IKEv2 state #636 in UNDEFINED | pstats #636 ikev2.ike started | Message ID: init #636: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #636: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #636; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #636 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-146" #636: initiating v2 parent SA to replace #398 | using existing local IKE proposals for connection road-eastnet-nonat-146 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 636 for state #636 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ae48c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #636 | libevent_malloc: new ptr-libevent@0x7fb3480251c0 size 128 | #636 spent 0.0378 milliseconds in ikev2_parent_outI1() | RESET processing: state #636 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d469dac90 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #398 | libevent_malloc: new ptr-libevent@0x557d46bea050 size 128 | libevent_free: release ptr-libevent@0x7fb3540300e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46afe580 | #398 spent 0.059 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46abd200 | handling event EVENT_SA_REPLACE for parent state #389 | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #389 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #637 at 0x557d46bea0e0 | State DB: adding IKEv2 state #637 in UNDEFINED | pstats #637 ikev2.ike started | Message ID: init #637: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #637: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #637; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #637 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-137" #637: initiating v2 parent SA to replace #389 | using existing local IKE proposals for connection road-eastnet-nonat-137 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 637 for state #637 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46afe580 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #637 | libevent_malloc: new ptr-libevent@0x7fb3540300e0 size 128 | #637 spent 0.0402 milliseconds in ikev2_parent_outI1() | RESET processing: state #637 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46beb750 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #389 | libevent_malloc: new ptr-libevent@0x557d46beb790 size 128 | libevent_free: release ptr-libevent@0x7fb3440180b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46abd200 | #389 spent 0.0605 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a90400 | handling event EVENT_SA_REPLACE for parent state #470 | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #470 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #638 at 0x557d46beb820 | State DB: adding IKEv2 state #638 in UNDEFINED | pstats #638 ikev2.ike started | Message ID: init #638: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #638: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #638; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #638 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-218" #638: initiating v2 parent SA to replace #470 | using existing local IKE proposals for connection road-eastnet-nonat-218 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 638 for state #638 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46abd200 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #638 | libevent_malloc: new ptr-libevent@0x7fb3440180b0 size 128 | #638 spent 0.041 milliseconds in ikev2_parent_outI1() | RESET processing: state #638 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46beceb0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #470 | libevent_malloc: new ptr-libevent@0x557d46becef0 size 128 | libevent_free: release ptr-libevent@0x7fb3580300e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a90400 | #470 spent 0.0615 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3800383c0 | handling event EVENT_SA_REPLACE for parent state #466 | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #466 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #639 at 0x557d46becf80 | State DB: adding IKEv2 state #639 in UNDEFINED | pstats #639 ikev2.ike started | Message ID: init #639: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #639: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #639; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #639 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-214" #639: initiating v2 parent SA to replace #466 | using existing local IKE proposals for connection road-eastnet-nonat-214 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 639 for state #639 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a90400 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #639 | libevent_malloc: new ptr-libevent@0x7fb3580300e0 size 128 | #639 spent 0.0496 milliseconds in ikev2_parent_outI1() | RESET processing: state #639 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46bee610 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #466 | libevent_malloc: new ptr-libevent@0x557d46bee650 size 128 | libevent_free: release ptr-libevent@0x7fb38000c460 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb3800383c0 | #466 spent 0.0694 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38800feb0 | handling event EVENT_SA_REPLACE for parent state #452 | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #452 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #640 at 0x557d46bee6e0 | State DB: adding IKEv2 state #640 in UNDEFINED | pstats #640 ikev2.ike started | Message ID: init #640: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #640: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #640; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #640 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-200" #640: initiating v2 parent SA to replace #452 | using existing local IKE proposals for connection road-eastnet-nonat-200 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 640 for state #640 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb3800383c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #640 | libevent_malloc: new ptr-libevent@0x7fb38000c460 size 128 | #640 spent 0.0381 milliseconds in ikev2_parent_outI1() | RESET processing: state #640 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46befd70 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #452 | libevent_malloc: new ptr-libevent@0x557d46befdb0 size 128 | libevent_free: release ptr-libevent@0x7fb384032b00 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb38800feb0 | #452 spent 0.0575 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370017ea0 | handling event EVENT_SA_REPLACE for parent state #487 | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #487 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #641 at 0x557d46befe40 | State DB: adding IKEv2 state #641 in UNDEFINED | pstats #641 ikev2.ike started | Message ID: init #641: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #641: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #641; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #641 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-235" #641: initiating v2 parent SA to replace #487 | using existing local IKE proposals for connection road-eastnet-nonat-235 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 641 for state #641 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb38800feb0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #641 | libevent_malloc: new ptr-libevent@0x7fb384032b00 size 128 | #641 spent 0.0512 milliseconds in ikev2_parent_outI1() | RESET processing: state #641 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46bf14d0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #487 | libevent_malloc: new ptr-libevent@0x557d46bf1510 size 128 | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb370017ea0 | #487 spent 0.0712 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46acc140 | handling event EVENT_SA_REPLACE for parent state #423 | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #423 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #642 at 0x557d46bf15a0 | State DB: adding IKEv2 state #642 in UNDEFINED | pstats #642 ikev2.ike started | Message ID: init #642: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #642: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #642; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #642 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-171" #642: initiating v2 parent SA to replace #423 | using existing local IKE proposals for connection road-eastnet-nonat-171 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 642 for state #642 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb370017ea0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #642 | libevent_malloc: new ptr-libevent@0x7fb360009640 size 128 | #642 spent 0.0384 milliseconds in ikev2_parent_outI1() | RESET processing: state #642 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46bf2c30 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #423 | libevent_malloc: new ptr-libevent@0x557d46bf2c70 size 128 | libevent_free: release ptr-libevent@0x7fb3440300e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46acc140 | #423 spent 0.0716 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348048a60 | handling event EVENT_SA_REPLACE for parent state #338 | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #338 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #643 at 0x557d46bf2d00 | State DB: adding IKEv2 state #643 in UNDEFINED | pstats #643 ikev2.ike started | Message ID: init #643: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #643: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #643; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #643 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-86" #643: initiating v2 parent SA to replace #338 | using existing local IKE proposals for connection road-eastnet-nonat-86 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 643 for state #643 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46acc140 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #643 | libevent_malloc: new ptr-libevent@0x7fb3440300e0 size 128 | #643 spent 0.0361 milliseconds in ikev2_parent_outI1() | RESET processing: state #643 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46bf4390 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #338 | libevent_malloc: new ptr-libevent@0x557d46bf43d0 size 128 | libevent_free: release ptr-libevent@0x7fb36403ae90 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb348048a60 | #338 spent 0.0556 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aef6c0 | handling event EVENT_SA_REPLACE for parent state #415 | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #415 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #644 at 0x557d46bf4460 | State DB: adding IKEv2 state #644 in UNDEFINED | pstats #644 ikev2.ike started | Message ID: init #644: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #644: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #644; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #644 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-163" #644: initiating v2 parent SA to replace #415 | using existing local IKE proposals for connection road-eastnet-nonat-163 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 644 for state #644 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb348048a60 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #644 | libevent_malloc: new ptr-libevent@0x7fb36403ae90 size 128 | #644 spent 0.0372 milliseconds in ikev2_parent_outI1() | RESET processing: state #644 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46bf5af0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #415 | libevent_malloc: new ptr-libevent@0x557d46bf5b30 size 128 | libevent_free: release ptr-libevent@0x7fb37004b7c0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46aef6c0 | #415 spent 0.0565 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a8ee40 | handling event EVENT_SA_REPLACE for parent state #411 | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #411 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #645 at 0x557d46bf5bc0 | State DB: adding IKEv2 state #645 in UNDEFINED | pstats #645 ikev2.ike started | Message ID: init #645: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #645: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #645; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #645 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-159" #645: initiating v2 parent SA to replace #411 | using existing local IKE proposals for connection road-eastnet-nonat-159 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 645 for state #645 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aef6c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #645 | libevent_malloc: new ptr-libevent@0x7fb37004b7c0 size 128 | #645 spent 0.0357 milliseconds in ikev2_parent_outI1() | RESET processing: state #645 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46bf7250 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #411 | libevent_malloc: new ptr-libevent@0x557d46bf7290 size 128 | libevent_free: release ptr-libevent@0x7fb36c0251c0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a8ee40 | #411 spent 0.0554 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a82ac0 | handling event EVENT_SA_REPLACE for parent state #433 | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #433 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #646 at 0x557d46bf7320 | State DB: adding IKEv2 state #646 in UNDEFINED | pstats #646 ikev2.ike started | Message ID: init #646: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #646: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #646; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #646 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-181" #646: initiating v2 parent SA to replace #433 | using existing local IKE proposals for connection road-eastnet-nonat-181 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 646 for state #646 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a8ee40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #646 | libevent_malloc: new ptr-libevent@0x7fb36c0251c0 size 128 | #646 spent 0.0346 milliseconds in ikev2_parent_outI1() | RESET processing: state #646 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46bf89b0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #433 | libevent_malloc: new ptr-libevent@0x557d46bf89f0 size 128 | libevent_free: release ptr-libevent@0x7fb3780251c0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a82ac0 | #433 spent 0.0554 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b25c40 | handling event EVENT_SA_REPLACE for parent state #458 | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #458 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #647 at 0x557d46bf8a80 | State DB: adding IKEv2 state #647 in UNDEFINED | pstats #647 ikev2.ike started | Message ID: init #647: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #647: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #647; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #647 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-206" #647: initiating v2 parent SA to replace #458 | using existing local IKE proposals for connection road-eastnet-nonat-206 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 647 for state #647 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a82ac0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #647 | libevent_malloc: new ptr-libevent@0x7fb3780251c0 size 128 | #647 spent 0.036 milliseconds in ikev2_parent_outI1() | RESET processing: state #647 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46bfa110 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #458 | libevent_malloc: new ptr-libevent@0x557d46bfa150 size 128 | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46b25c40 | #458 spent 0.0563 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388015720 | handling event EVENT_SA_REPLACE for parent state #427 | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #427 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #648 at 0x557d46bfa1e0 | State DB: adding IKEv2 state #648 in UNDEFINED | pstats #648 ikev2.ike started | Message ID: init #648: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #648: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #648; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #648 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-175" #648: initiating v2 parent SA to replace #427 | using existing local IKE proposals for connection road-eastnet-nonat-175 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 648 for state #648 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b25c40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #648 | libevent_malloc: new ptr-libevent@0x7fb35c00cf80 size 128 | #648 spent 0.0363 milliseconds in ikev2_parent_outI1() | RESET processing: state #648 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46bfb870 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #427 | libevent_malloc: new ptr-libevent@0x557d46bfb8b0 size 128 | libevent_free: release ptr-libevent@0x7fb3600407f0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb388015720 | #427 spent 0.0559 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a34e10 | handling event EVENT_SA_REPLACE for parent state #456 | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #456 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #649 at 0x557d46bfb940 | State DB: adding IKEv2 state #649 in UNDEFINED | pstats #649 ikev2.ike started | Message ID: init #649: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #649: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #649; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #649 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-204" #649: initiating v2 parent SA to replace #456 | using existing local IKE proposals for connection road-eastnet-nonat-204 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 649 for state #649 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb388015720 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #649 | libevent_malloc: new ptr-libevent@0x7fb3600407f0 size 128 | #649 spent 0.036 milliseconds in ikev2_parent_outI1() | RESET processing: state #649 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46bfcfd0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #456 | libevent_malloc: new ptr-libevent@0x557d46bfd010 size 128 | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a34e10 | #456 spent 0.059 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_SA_REPLACE for parent state #403 | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #403 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #650 at 0x557d46bfd0a0 | State DB: adding IKEv2 state #650 in UNDEFINED | pstats #650 ikev2.ike started | Message ID: init #650: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #650: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #650; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #650 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-151" #650: initiating v2 parent SA to replace #403 | using existing local IKE proposals for connection road-eastnet-nonat-151 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 650 for state #650 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a34e10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #650 | libevent_malloc: new ptr-libevent@0x7fb38400fb00 size 128 | #650 spent 0.0677 milliseconds in ikev2_parent_outI1() | RESET processing: state #650 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46bfe730 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #403 | libevent_malloc: new ptr-libevent@0x557d46bfe770 size 128 | libevent_free: release ptr-libevent@0x7fb364045e60 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a468d0 | #403 spent 0.0886 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38800c4b0 | handling event EVENT_SA_REPLACE for parent state #372 | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #372 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #651 at 0x557d46bfe800 | State DB: adding IKEv2 state #651 in UNDEFINED | pstats #651 ikev2.ike started | Message ID: init #651: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #651: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #651; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #651 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-120" #651: initiating v2 parent SA to replace #372 | using existing local IKE proposals for connection road-eastnet-nonat-120 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 651 for state #651 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a468d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #651 | libevent_malloc: new ptr-libevent@0x7fb364045e60 size 128 | #651 spent 0.0391 milliseconds in ikev2_parent_outI1() | RESET processing: state #651 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46bffe90 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #372 | libevent_malloc: new ptr-libevent@0x557d46bffed0 size 128 | libevent_free: release ptr-libevent@0x7fb38803c430 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb38800c4b0 | #372 spent 0.0598 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46abe780 | handling event EVENT_SA_REPLACE for parent state #397 | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #397 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #652 at 0x557d46bfff60 | State DB: adding IKEv2 state #652 in UNDEFINED | pstats #652 ikev2.ike started | Message ID: init #652: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #652: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #652; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #652 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-145" #652: initiating v2 parent SA to replace #397 | using existing local IKE proposals for connection road-eastnet-nonat-145 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 652 for state #652 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb38800c4b0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #652 | libevent_malloc: new ptr-libevent@0x7fb38803c430 size 128 | #652 spent 0.0383 milliseconds in ikev2_parent_outI1() | RESET processing: state #652 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c015f0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #397 | libevent_malloc: new ptr-libevent@0x557d46c01630 size 128 | libevent_free: release ptr-libevent@0x7fb3880269d0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46abe780 | #397 spent 0.0581 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35400d120 | handling event EVENT_SA_REPLACE for parent state #310 | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #310 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #653 at 0x557d46c016c0 | State DB: adding IKEv2 state #653 in UNDEFINED | pstats #653 ikev2.ike started | Message ID: init #653: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #653: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #653; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #653 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-58" #653: initiating v2 parent SA to replace #310 | using existing local IKE proposals for connection road-eastnet-nonat-58 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 653 for state #653 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46abe780 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #653 | libevent_malloc: new ptr-libevent@0x7fb3880269d0 size 128 | #653 spent 0.0571 milliseconds in ikev2_parent_outI1() | RESET processing: state #653 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c02d50 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #310 | libevent_malloc: new ptr-libevent@0x557d46c02d90 size 128 | libevent_free: release ptr-libevent@0x7fb354012840 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb35400d120 | #310 spent 0.0771 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b25cc0 | handling event EVENT_SA_REPLACE for parent state #364 | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #364 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #654 at 0x557d46c02e20 | State DB: adding IKEv2 state #654 in UNDEFINED | pstats #654 ikev2.ike started | Message ID: init #654: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #654: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #654; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #654 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-112" #654: initiating v2 parent SA to replace #364 | using existing local IKE proposals for connection road-eastnet-nonat-112 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 654 for state #654 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35400d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #654 | libevent_malloc: new ptr-libevent@0x7fb354012840 size 128 | #654 spent 0.0364 milliseconds in ikev2_parent_outI1() | RESET processing: state #654 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c044b0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #364 | libevent_malloc: new ptr-libevent@0x557d46c044f0 size 128 | libevent_free: release ptr-libevent@0x7fb38802c0a0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46b25cc0 | #364 spent 0.0561 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35804b810 | handling event EVENT_SA_REPLACE for parent state #430 | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #430 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #655 at 0x557d46c04580 | State DB: adding IKEv2 state #655 in UNDEFINED | pstats #655 ikev2.ike started | Message ID: init #655: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #655: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #655; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #655 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-178" #655: initiating v2 parent SA to replace #430 | using existing local IKE proposals for connection road-eastnet-nonat-178 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 655 for state #655 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b25cc0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #655 | libevent_malloc: new ptr-libevent@0x7fb38802c0a0 size 128 | #655 spent 0.036 milliseconds in ikev2_parent_outI1() | RESET processing: state #655 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c05c10 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #430 | libevent_malloc: new ptr-libevent@0x557d46c05c50 size 128 | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb35804b810 | #430 spent 0.0557 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2b610 | handling event EVENT_SA_REPLACE for parent state #444 | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #444 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #656 at 0x557d46c05ce0 | State DB: adding IKEv2 state #656 in UNDEFINED | pstats #656 ikev2.ike started | Message ID: init #656: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #656: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #656; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #656 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-192" #656: initiating v2 parent SA to replace #444 | using existing local IKE proposals for connection road-eastnet-nonat-192 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 656 for state #656 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35804b810 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #656 | libevent_malloc: new ptr-libevent@0x7fb37c012840 size 128 | #656 spent 0.0361 milliseconds in ikev2_parent_outI1() | RESET processing: state #656 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c07370 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #444 | libevent_malloc: new ptr-libevent@0x557d46c073b0 size 128 | libevent_free: release ptr-libevent@0x7fb388048a80 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a2b610 | #444 spent 0.0557 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7cf50 | handling event EVENT_SA_REPLACE for parent state #370 | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #370 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #657 at 0x557d46c07440 | State DB: adding IKEv2 state #657 in UNDEFINED | pstats #657 ikev2.ike started | Message ID: init #657: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #657: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #657; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #657 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-118" #657: initiating v2 parent SA to replace #370 | using existing local IKE proposals for connection road-eastnet-nonat-118 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 657 for state #657 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2b610 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #657 | libevent_malloc: new ptr-libevent@0x7fb388048a80 size 128 | #657 spent 0.0381 milliseconds in ikev2_parent_outI1() | RESET processing: state #657 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c08ad0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #370 | libevent_malloc: new ptr-libevent@0x557d46c08b10 size 128 | libevent_free: release ptr-libevent@0x7fb34c0293f0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a7cf50 | #370 spent 0.0575 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374009690 | handling event EVENT_SA_REPLACE for parent state #414 | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #414 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #658 at 0x557d46c08ba0 | State DB: adding IKEv2 state #658 in UNDEFINED | pstats #658 ikev2.ike started | Message ID: init #658: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #658: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #658; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #658 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-162" #658: initiating v2 parent SA to replace #414 | using existing local IKE proposals for connection road-eastnet-nonat-162 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 658 for state #658 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7cf50 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #658 | libevent_malloc: new ptr-libevent@0x7fb34c0293f0 size 128 | #658 spent 0.036 milliseconds in ikev2_parent_outI1() | RESET processing: state #658 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c0a230 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #414 | libevent_malloc: new ptr-libevent@0x557d46c0a270 size 128 | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb374009690 | #414 spent 0.0557 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c017ea0 | handling event EVENT_SA_REPLACE for parent state #400 | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #400 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #659 at 0x557d46c0a300 | State DB: adding IKEv2 state #659 in UNDEFINED | pstats #659 ikev2.ike started | Message ID: init #659: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #659: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #659; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #659 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-148" #659: initiating v2 parent SA to replace #400 | using existing local IKE proposals for connection road-eastnet-nonat-148 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 659 for state #659 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb374009690 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #659 | libevent_malloc: new ptr-libevent@0x7fb33800cf80 size 128 | #659 spent 0.0347 milliseconds in ikev2_parent_outI1() | RESET processing: state #659 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c0b990 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #400 | libevent_malloc: new ptr-libevent@0x557d46c0b9d0 size 128 | libevent_free: release ptr-libevent@0x7fb36c04b850 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb36c017ea0 | #400 spent 0.0553 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34800cc10 | handling event EVENT_SA_REPLACE for parent state #410 | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #410 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #660 at 0x557d46c0ba60 | State DB: adding IKEv2 state #660 in UNDEFINED | pstats #660 ikev2.ike started | Message ID: init #660: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #660: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #660; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #660 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-158" #660: initiating v2 parent SA to replace #410 | using existing local IKE proposals for connection road-eastnet-nonat-158 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 660 for state #660 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c017ea0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #660 | libevent_malloc: new ptr-libevent@0x7fb36c04b850 size 128 | #660 spent 0.0383 milliseconds in ikev2_parent_outI1() | RESET processing: state #660 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c0d0f0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #410 | libevent_malloc: new ptr-libevent@0x557d46c0d130 size 128 | libevent_free: release ptr-libevent@0x7fb340012840 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb34800cc10 | #410 spent 0.0587 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37801d970 | handling event EVENT_SA_REPLACE for parent state #406 | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #406 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #661 at 0x557d46c0d1c0 | State DB: adding IKEv2 state #661 in UNDEFINED | pstats #661 ikev2.ike started | Message ID: init #661: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #661: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #661; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #661 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-154" #661: initiating v2 parent SA to replace #406 | using existing local IKE proposals for connection road-eastnet-nonat-154 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 661 for state #661 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34800cc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #661 | libevent_malloc: new ptr-libevent@0x7fb340012840 size 128 | #661 spent 0.0359 milliseconds in ikev2_parent_outI1() | RESET processing: state #661 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c0e850 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #406 | libevent_malloc: new ptr-libevent@0x557d46c0e890 size 128 | libevent_free: release ptr-libevent@0x7fb37800f1a0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb37801d970 | #406 spent 0.0554 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2e150 | handling event EVENT_SA_REPLACE for parent state #368 | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #368 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #662 at 0x557d46c0e920 | State DB: adding IKEv2 state #662 in UNDEFINED | pstats #662 ikev2.ike started | Message ID: init #662: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #662: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #662; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #662 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-116" #662: initiating v2 parent SA to replace #368 | using existing local IKE proposals for connection road-eastnet-nonat-116 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 662 for state #662 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37801d970 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #662 | libevent_malloc: new ptr-libevent@0x7fb37800f1a0 size 128 | #662 spent 0.0346 milliseconds in ikev2_parent_outI1() | RESET processing: state #662 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c0ffb0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #368 | libevent_malloc: new ptr-libevent@0x557d46c0fff0 size 128 | libevent_free: release ptr-libevent@0x7fb3440407f0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a2e150 | #368 spent 0.0561 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3840318d0 | handling event EVENT_SA_REPLACE for parent state #336 | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #336 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #663 at 0x557d46c10080 | State DB: adding IKEv2 state #663 in UNDEFINED | pstats #663 ikev2.ike started | Message ID: init #663: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #663: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #663; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #663 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-84" #663: initiating v2 parent SA to replace #336 | using existing local IKE proposals for connection road-eastnet-nonat-84 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 663 for state #663 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2e150 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #663 | libevent_malloc: new ptr-libevent@0x7fb3440407f0 size 128 | #663 spent 0.035 milliseconds in ikev2_parent_outI1() | RESET processing: state #663 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c11710 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #336 | libevent_malloc: new ptr-libevent@0x557d46c11750 size 128 | libevent_free: release ptr-libevent@0x7fb38403c470 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb3840318d0 | #336 spent 0.0546 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad43c0 | handling event EVENT_SA_REPLACE for parent state #375 | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #375 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #664 at 0x557d46c117e0 | State DB: adding IKEv2 state #664 in UNDEFINED | pstats #664 ikev2.ike started | Message ID: init #664: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #664: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #664; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #664 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-123" #664: initiating v2 parent SA to replace #375 | using existing local IKE proposals for connection road-eastnet-nonat-123 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 664 for state #664 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb3840318d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #664 | libevent_malloc: new ptr-libevent@0x7fb38403c470 size 128 | #664 spent 0.0375 milliseconds in ikev2_parent_outI1() | RESET processing: state #664 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c12e70 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #375 | libevent_malloc: new ptr-libevent@0x557d46c12eb0 size 128 | libevent_free: release ptr-libevent@0x7fb36c04b7c0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46ad43c0 | #375 spent 0.0568 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a92f40 | handling event EVENT_SA_REPLACE for parent state #387 | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #387 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #665 at 0x557d46c12f40 | State DB: adding IKEv2 state #665 in UNDEFINED | pstats #665 ikev2.ike started | Message ID: init #665: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #665: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #665; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #665 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-135" #665: initiating v2 parent SA to replace #387 | using existing local IKE proposals for connection road-eastnet-nonat-135 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 665 for state #665 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad43c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #665 | libevent_malloc: new ptr-libevent@0x7fb36c04b7c0 size 128 | #665 spent 0.0373 milliseconds in ikev2_parent_outI1() | RESET processing: state #665 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c145d0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #387 | libevent_malloc: new ptr-libevent@0x557d46c14610 size 128 | libevent_free: release ptr-libevent@0x7fb338048a10 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a92f40 | #387 spent 0.0569 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b12c00 | handling event EVENT_SA_REPLACE for parent state #393 | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #393 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #666 at 0x557d46c146a0 | State DB: adding IKEv2 state #666 in UNDEFINED | pstats #666 ikev2.ike started | Message ID: init #666: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #666: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #666; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #666 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-141" #666: initiating v2 parent SA to replace #393 | using existing local IKE proposals for connection road-eastnet-nonat-141 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 666 for state #666 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a92f40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #666 | libevent_malloc: new ptr-libevent@0x7fb338048a10 size 128 | #666 spent 0.0413 milliseconds in ikev2_parent_outI1() | RESET processing: state #666 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c15d30 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #393 | libevent_malloc: new ptr-libevent@0x557d46c15d70 size 128 | libevent_free: release ptr-libevent@0x7fb338035930 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46b12c00 | #393 spent 0.0606 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c00cc10 | handling event EVENT_SA_REPLACE for parent state #418 | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #418 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #667 at 0x557d46c15e00 | State DB: adding IKEv2 state #667 in UNDEFINED | pstats #667 ikev2.ike started | Message ID: init #667: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #667: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #667; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #667 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-166" #667: initiating v2 parent SA to replace #418 | using existing local IKE proposals for connection road-eastnet-nonat-166 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 667 for state #667 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b12c00 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #667 | libevent_malloc: new ptr-libevent@0x7fb338035930 size 128 | #667 spent 0.0359 milliseconds in ikev2_parent_outI1() | RESET processing: state #667 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c17490 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #418 | libevent_malloc: new ptr-libevent@0x557d46c174d0 size 128 | libevent_free: release ptr-libevent@0x7fb34c03f570 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb34c00cc10 | #418 spent 0.0551 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_SA_REPLACE for parent state #362 | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #362 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #668 at 0x557d46c17560 | State DB: adding IKEv2 state #668 in UNDEFINED | pstats #668 ikev2.ike started | Message ID: init #668: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #668: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #668; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #668 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-110" #668: initiating v2 parent SA to replace #362 | using existing local IKE proposals for connection road-eastnet-nonat-110 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 668 for state #668 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34c00cc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #668 | libevent_malloc: new ptr-libevent@0x7fb34c03f570 size 128 | #668 spent 0.0368 milliseconds in ikev2_parent_outI1() | RESET processing: state #668 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c18bf0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #362 | libevent_malloc: new ptr-libevent@0x557d46c18c30 size 128 | libevent_free: release ptr-libevent@0x7fb348023e80 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb384002b20 | #362 spent 0.0562 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb344018460 | handling event EVENT_SA_REPLACE for parent state #432 | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #432 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #669 at 0x557d46c18cc0 | State DB: adding IKEv2 state #669 in UNDEFINED | pstats #669 ikev2.ike started | Message ID: init #669: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #669: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #669; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #669 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-180" #669: initiating v2 parent SA to replace #432 | using existing local IKE proposals for connection road-eastnet-nonat-180 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 669 for state #669 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb384002b20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #669 | libevent_malloc: new ptr-libevent@0x7fb348023e80 size 128 | #669 spent 0.0358 milliseconds in ikev2_parent_outI1() | RESET processing: state #669 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c1a350 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #432 | libevent_malloc: new ptr-libevent@0x557d46c1a390 size 128 | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb344018460 | #432 spent 0.0736 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37404b580 | handling event EVENT_SA_REPLACE for parent state #399 | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #399 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #670 at 0x557d46c1a420 | State DB: adding IKEv2 state #670 in UNDEFINED | pstats #670 ikev2.ike started | Message ID: init #670: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #670: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #670; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #670 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-147" #670: initiating v2 parent SA to replace #399 | using existing local IKE proposals for connection road-eastnet-nonat-147 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 670 for state #670 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb344018460 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #670 | libevent_malloc: new ptr-libevent@0x7fb38800fb00 size 128 | #670 spent 0.0499 milliseconds in ikev2_parent_outI1() | RESET processing: state #670 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c1bab0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #399 | libevent_malloc: new ptr-libevent@0x557d46c1baf0 size 128 | libevent_free: release ptr-libevent@0x7fb37403f310 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb37404b580 | #399 spent 0.0695 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c017ea0 | handling event EVENT_SA_REPLACE for parent state #436 | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #436 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #671 at 0x557d46c1bb80 | State DB: adding IKEv2 state #671 in UNDEFINED | pstats #671 ikev2.ike started | Message ID: init #671: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #671: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #671; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #671 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-184" #671: initiating v2 parent SA to replace #436 | using existing local IKE proposals for connection road-eastnet-nonat-184 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 671 for state #671 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37404b580 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #671 | libevent_malloc: new ptr-libevent@0x7fb37403f310 size 128 | #671 spent 0.0357 milliseconds in ikev2_parent_outI1() | RESET processing: state #671 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c1d210 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #436 | libevent_malloc: new ptr-libevent@0x557d46c1d250 size 128 | libevent_free: release ptr-libevent@0x7fb37c029710 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb37c017ea0 | #436 spent 0.071 milliseconds in timer_event_cb() EVENT_SA_REPLACE | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 521 time elapsed 0.010604 seconds | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#521) spent 0.599 milliseconds in crypto helper computing work-order 521: ikev2_outI1 KE (pcr) | timer_event_cb: processing event@0x7fb348012630 | handling event EVENT_SA_REPLACE for parent state #388 | crypto helper 1 sending results from work-order 521 for state #521 to event queue | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #388 | replacing stale IKE SA | scheduling resume sending helper answer for #521 | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | libevent_malloc: new ptr-libevent@0x7fb38804efb0 size 128 | creating state object #672 at 0x557d46c1d2e0 | State DB: adding IKEv2 state #672 in UNDEFINED | pstats #672 ikev2.ike started | Message ID: init #672: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #672: UNDEFINED(ignore) => PARENT_I0(ignore) | crypto helper 1 starting work-order 528 for state #528 | Message ID: init_ike #672; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 528 | suspend processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #672 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-136" #672: initiating v2 parent SA to replace #388 | using existing local IKE proposals for connection road-eastnet-nonat-136 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 672 for state #672 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c017ea0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #672 | libevent_malloc: new ptr-libevent@0x7fb37c029710 size 128 | #672 spent 0.068 milliseconds in ikev2_parent_outI1() | RESET processing: state #672 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c1e970 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #388 | libevent_malloc: new ptr-libevent@0x557d46c1e9b0 size 128 | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb348012630 | #388 spent 0.0997 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36001a530 | handling event EVENT_SA_REPLACE for parent state #404 | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #404 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #673 at 0x557d46c1ea40 | State DB: adding IKEv2 state #673 in UNDEFINED | pstats #673 ikev2.ike started | Message ID: init #673: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #673: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #673; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #673 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-152" #673: initiating v2 parent SA to replace #404 | using existing local IKE proposals for connection road-eastnet-nonat-152 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 673 for state #673 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb348012630 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #673 | libevent_malloc: new ptr-libevent@0x7fb340009640 size 128 | #673 spent 0.0385 milliseconds in ikev2_parent_outI1() | RESET processing: state #673 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c200d0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #404 | libevent_malloc: new ptr-libevent@0x557d46c20110 size 128 | libevent_free: release ptr-libevent@0x7fb36003f3e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb36001a530 | #404 spent 0.058 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb338012bf0 | handling event EVENT_SA_REPLACE for parent state #376 | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #376 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #674 at 0x557d46c201a0 | State DB: adding IKEv2 state #674 in UNDEFINED | pstats #674 ikev2.ike started | Message ID: init #674: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #674: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #674; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #674 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-124" #674: initiating v2 parent SA to replace #376 | using existing local IKE proposals for connection road-eastnet-nonat-124 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 674 for state #674 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36001a530 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #674 | libevent_malloc: new ptr-libevent@0x7fb36003f3e0 size 128 | #674 spent 0.0347 milliseconds in ikev2_parent_outI1() | RESET processing: state #674 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c21830 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #376 | libevent_malloc: new ptr-libevent@0x557d46c21870 size 128 | libevent_free: release ptr-libevent@0x7fb3540407f0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb338012bf0 | #376 spent 0.0539 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c012630 | handling event EVENT_SA_REPLACE for parent state #424 | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #424 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #675 at 0x557d46c21900 | State DB: adding IKEv2 state #675 in UNDEFINED | pstats #675 ikev2.ike started | Message ID: init #675: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #675: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #675; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #675 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-172" #675: initiating v2 parent SA to replace #424 | using existing local IKE proposals for connection road-eastnet-nonat-172 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 675 for state #675 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb338012bf0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #675 | libevent_malloc: new ptr-libevent@0x7fb3540407f0 size 128 | #675 spent 0.036 milliseconds in ikev2_parent_outI1() | RESET processing: state #675 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c22f90 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #424 | libevent_malloc: new ptr-libevent@0x557d46c22fd0 size 128 | libevent_free: release ptr-libevent@0x7fb36c04b970 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb36c012630 | #424 spent 0.0567 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34000d120 | handling event EVENT_SA_REPLACE for parent state #349 | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #349 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #676 at 0x557d46c23060 | State DB: adding IKEv2 state #676 in UNDEFINED | pstats #676 ikev2.ike started | Message ID: init #676: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #676: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #676; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #676 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-97" #676: initiating v2 parent SA to replace #349 | using existing local IKE proposals for connection road-eastnet-nonat-97 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 676 for state #676 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c012630 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #676 | libevent_malloc: new ptr-libevent@0x7fb36c04b970 size 128 | #676 spent 0.0361 milliseconds in ikev2_parent_outI1() | RESET processing: state #676 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c246f0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #349 | libevent_malloc: new ptr-libevent@0x557d46c24730 size 128 | libevent_free: release ptr-libevent@0x7fb35c04b850 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb34000d120 | #349 spent 0.0554 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_SA_REPLACE for parent state #355 | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #355 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #677 at 0x557d46c247c0 | State DB: adding IKEv2 state #677 in UNDEFINED | pstats #677 ikev2.ike started | Message ID: init #677: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #677: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #677; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #677 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-103" #677: initiating v2 parent SA to replace #355 | using existing local IKE proposals for connection road-eastnet-nonat-103 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 677 for state #677 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34000d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #677 | libevent_malloc: new ptr-libevent@0x7fb35c04b850 size 128 | #677 spent 0.0355 milliseconds in ikev2_parent_outI1() | RESET processing: state #677 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c25e50 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #355 | libevent_malloc: new ptr-libevent@0x557d46c25e90 size 128 | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb368005860 | #355 spent 0.0549 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374045e40 | handling event EVENT_SA_REPLACE for parent state #293 | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #293 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #678 at 0x557d46c25f20 | State DB: adding IKEv2 state #678 in UNDEFINED | pstats #678 ikev2.ike started | Message ID: init #678: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #678: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #678; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #678 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-41" #678: initiating v2 parent SA to replace #293 | using existing local IKE proposals for connection road-eastnet-nonat-41 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 678 for state #678 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb368005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #678 | libevent_malloc: new ptr-libevent@0x7fb368009640 size 128 | #678 spent 0.0359 milliseconds in ikev2_parent_outI1() | RESET processing: state #678 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c275b0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #293 | libevent_malloc: new ptr-libevent@0x557d46c275f0 size 128 | libevent_free: release ptr-libevent@0x7fb374029410 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb374045e40 | #293 spent 0.0555 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a56dd0 | handling event EVENT_SA_REPLACE for parent state #334 | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #334 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #679 at 0x557d46c27680 | State DB: adding IKEv2 state #679 in UNDEFINED | pstats #679 ikev2.ike started | Message ID: init #679: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #679: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #679; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #679 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-82" #679: initiating v2 parent SA to replace #334 | using existing local IKE proposals for connection road-eastnet-nonat-82 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 679 for state #679 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb374045e40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #679 | libevent_malloc: new ptr-libevent@0x7fb374029410 size 128 | #679 spent 0.0349 milliseconds in ikev2_parent_outI1() | RESET processing: state #679 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c28d10 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #334 | libevent_malloc: new ptr-libevent@0x557d46c28d50 size 128 | libevent_free: release ptr-libevent@0x7fb3680180b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a56dd0 | #334 spent 0.0544 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_SA_REPLACE for parent state #363 | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #363 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #680 at 0x557d46c28de0 | State DB: adding IKEv2 state #680 in UNDEFINED | pstats #680 ikev2.ike started | Message ID: init #680: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #680: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #680; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #680 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-111" #680: initiating v2 parent SA to replace #363 | using existing local IKE proposals for connection road-eastnet-nonat-111 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 680 for state #680 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a56dd0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #680 | libevent_malloc: new ptr-libevent@0x7fb3680180b0 size 128 | #680 spent 0.0541 milliseconds in ikev2_parent_outI1() | RESET processing: state #680 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c2a470 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #363 | libevent_malloc: new ptr-libevent@0x557d46c2a4b0 size 128 | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a38f50 | #363 spent 0.0744 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb338018460 | handling event EVENT_SA_REPLACE for parent state #422 | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #422 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #681 at 0x557d46c2a540 | State DB: adding IKEv2 state #681 in UNDEFINED | pstats #681 ikev2.ike started | Message ID: init #681: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #681: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #681; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #681 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-170" #681: initiating v2 parent SA to replace #422 | using existing local IKE proposals for connection road-eastnet-nonat-170 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 681 for state #681 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a38f50 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #681 | libevent_malloc: new ptr-libevent@0x7fb35c0180b0 size 128 | #681 spent 0.0371 milliseconds in ikev2_parent_outI1() | RESET processing: state #681 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c2bbd0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #422 | libevent_malloc: new ptr-libevent@0x557d46c2bc10 size 128 | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb338018460 | #422 spent 0.0582 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c018460 | handling event EVENT_SA_REPLACE for parent state #401 | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #401 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #682 at 0x557d46c2bca0 | State DB: adding IKEv2 state #682 in UNDEFINED | pstats #682 ikev2.ike started | Message ID: init #682: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #682: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #682; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #682 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-149" #682: initiating v2 parent SA to replace #401 | using existing local IKE proposals for connection road-eastnet-nonat-149 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 682 for state #682 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb338018460 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #682 | libevent_malloc: new ptr-libevent@0x7fb338009640 size 128 | #682 spent 0.0745 milliseconds in ikev2_parent_outI1() | RESET processing: state #682 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c2d330 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #401 | libevent_malloc: new ptr-libevent@0x557d46c2d370 size 128 | libevent_free: release ptr-libevent@0x7fb3500251c0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb34c018460 | #401 spent 0.111 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35002a9a0 | handling event EVENT_SA_REPLACE for parent state #353 | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #353 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #683 at 0x557d46c2d400 | State DB: adding IKEv2 state #683 in UNDEFINED | pstats #683 ikev2.ike started | Message ID: init #683: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #683: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #683; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #683 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-101" #683: initiating v2 parent SA to replace #353 | using existing local IKE proposals for connection road-eastnet-nonat-101 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 683 for state #683 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34c018460 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #683 | libevent_malloc: new ptr-libevent@0x7fb3500251c0 size 128 | #683 spent 0.082 milliseconds in ikev2_parent_outI1() | RESET processing: state #683 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c2ea90 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #353 | libevent_malloc: new ptr-libevent@0x557d46c2ead0 size 128 | libevent_free: release ptr-libevent@0x7fb35003f4e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb35002a9a0 | #353 spent 0.118 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb340008e80 | handling event EVENT_SA_REPLACE for parent state #420 | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #420 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #684 at 0x557d46c2eb60 | State DB: adding IKEv2 state #684 in UNDEFINED | pstats #684 ikev2.ike started | Message ID: init #684: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #684: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #684; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #684 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-168" #684: initiating v2 parent SA to replace #420 | using existing local IKE proposals for connection road-eastnet-nonat-168 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 684 for state #684 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35002a9a0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #684 | libevent_malloc: new ptr-libevent@0x7fb35003f4e0 size 128 | #684 spent 0.08 milliseconds in ikev2_parent_outI1() | RESET processing: state #684 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c301f0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #420 | libevent_malloc: new ptr-libevent@0x557d46c30230 size 128 | libevent_free: release ptr-libevent@0x7fb340044850 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb340008e80 | #420 spent 0.143 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aa34c0 | handling event EVENT_SA_REPLACE for parent state #439 | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #439 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #685 at 0x557d46c302c0 | State DB: adding IKEv2 state #685 in UNDEFINED | pstats #685 ikev2.ike started | Message ID: init #685: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #685: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #685; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #685 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-187" #685: initiating v2 parent SA to replace #439 | using existing local IKE proposals for connection road-eastnet-nonat-187 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 685 for state #685 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb340008e80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #685 | libevent_malloc: new ptr-libevent@0x7fb340044850 size 128 | #685 spent 0.0649 milliseconds in ikev2_parent_outI1() | RESET processing: state #685 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c31950 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #439 | libevent_malloc: new ptr-libevent@0x557d46c31990 size 128 | libevent_free: release ptr-libevent@0x7fb380022480 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46aa34c0 | #439 spent 0.112 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a3a590 | handling event EVENT_SA_REPLACE for parent state #394 | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #394 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #686 at 0x557d46c31a20 | State DB: adding IKEv2 state #686 in UNDEFINED | pstats #686 ikev2.ike started | Message ID: init #686: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #686: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #686; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #686 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-142" #686: initiating v2 parent SA to replace #394 | using existing local IKE proposals for connection road-eastnet-nonat-142 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 686 for state #686 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aa34c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #686 | libevent_malloc: new ptr-libevent@0x7fb380022480 size 128 | #686 spent 0.065 milliseconds in ikev2_parent_outI1() | RESET processing: state #686 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c330b0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #394 | libevent_malloc: new ptr-libevent@0x557d46c330f0 size 128 | libevent_free: release ptr-libevent@0x7fb344046040 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a3a590 | #394 spent 0.0969 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38000f8f0 | handling event EVENT_SA_REPLACE for parent state #369 | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #369 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #687 at 0x557d46c33180 | State DB: adding IKEv2 state #687 in UNDEFINED | pstats #687 ikev2.ike started | Message ID: init #687: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #687: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #687; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 524 time elapsed 0.011702 seconds | start processing: state #687 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | (#524) spent 0.802 milliseconds in crypto helper computing work-order 524: ikev2_outI1 KE (pcr) | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 508 time elapsed 0.01331 seconds "road-eastnet-nonat-117" #687: initiating v2 parent SA to replace #369 | (#508) spent 0.585 milliseconds in crypto helper computing work-order 508: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 508 for state #508 to event queue | using existing local IKE proposals for connection road-eastnet-nonat-117 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | scheduling resume sending helper answer for #508 | adding ikev2_outI1 KE work-order 687 for state #687 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a3a590 | crypto helper 9 sending results from work-order 524 for state #524 to event queue | libevent_malloc: new ptr-libevent@0x7fb368035930 size 128 | crypto helper 19 starting work-order 529 for state #529 | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 510 time elapsed 0.013112 seconds | scheduling resume sending helper answer for #524 | libevent_malloc: new ptr-libevent@0x7fb378051330 size 128 | crypto helper 9 starting work-order 530 for state #530 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 511 time elapsed 0.013 seconds | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #687 | (#510) spent 0.592 milliseconds in crypto helper computing work-order 510: ikev2_outI1 KE (pcr) | libevent_malloc: new ptr-libevent@0x7fb344046040 size 128 | crypto helper 11 sending results from work-order 510 for state #510 to event queue | (#511) spent 1.04 milliseconds in crypto helper computing work-order 511: ikev2_outI1 KE (pcr) | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 530 | crypto helper 16 sending results from work-order 511 for state #511 to event queue | scheduling resume sending helper answer for #510 | scheduling resume sending helper answer for #511 | libevent_malloc: new ptr-libevent@0x7fb36004e850 size 128 | libevent_malloc: new ptr-libevent@0x7fb36404ec60 size 128 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 529 | #687 spent 0.0882 milliseconds in ikev2_parent_outI1() | crypto helper 11 starting work-order 531 for state #531 | crypto helper 16 starting work-order 532 for state #532 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 531 | RESET processing: state #687 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 532 | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c34810 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #369 | libevent_malloc: new ptr-libevent@0x557d46c34850 size 128 | libevent_free: release ptr-libevent@0x7fb3800211f0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb38000f8f0 | #369 spent 0.139 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_SA_REPLACE for parent state #347 | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #347 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #688 at 0x557d46c348e0 | State DB: adding IKEv2 state #688 in UNDEFINED | pstats #688 ikev2.ike started | Message ID: init #688: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #688: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #688; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #688 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-95" #688: initiating v2 parent SA to replace #347 | using existing local IKE proposals for connection road-eastnet-nonat-95 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 688 for state #688 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb38000f8f0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #688 | libevent_malloc: new ptr-libevent@0x7fb3800211f0 size 128 | #688 spent 0.0479 milliseconds in ikev2_parent_outI1() | RESET processing: state #688 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c35f70 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #347 | libevent_malloc: new ptr-libevent@0x557d46c35fb0 size 128 | libevent_free: release ptr-libevent@0x7fb354035930 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb380002b20 | #347 spent 0.0717 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_SA_REPLACE for parent state #326 | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #326 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #689 at 0x557d46c36040 | State DB: adding IKEv2 state #689 in UNDEFINED | pstats #689 ikev2.ike started | Message ID: init #689: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #689: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #689; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #689 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-74" #689: initiating v2 parent SA to replace #326 | using existing local IKE proposals for connection road-eastnet-nonat-74 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 689 for state #689 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb380002b20 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #689 | libevent_malloc: new ptr-libevent@0x7fb354035930 size 128 | #689 spent 0.04 milliseconds in ikev2_parent_outI1() | RESET processing: state #689 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c376d0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #326 | libevent_malloc: new ptr-libevent@0x557d46c37710 size 128 | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46b0bf40 | #326 spent 0.0608 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a70b10 | handling event EVENT_SA_REPLACE for parent state #328 | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #328 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #690 at 0x557d46c377a0 | State DB: adding IKEv2 state #690 in UNDEFINED | pstats #690 ikev2.ike started | Message ID: init #690: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #690: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #690; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #690 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-76" #690: initiating v2 parent SA to replace #328 | using existing local IKE proposals for connection road-eastnet-nonat-76 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 690 for state #690 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0bf40 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #690 | libevent_malloc: new ptr-libevent@0x7fb344012840 size 128 | #690 spent 0.0363 milliseconds in ikev2_parent_outI1() | RESET processing: state #690 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c38e30 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #328 | libevent_malloc: new ptr-libevent@0x557d46c38e70 size 128 | libevent_free: release ptr-libevent@0x7fb34c034410 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a70b10 | #328 spent 0.057 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b06800 | handling event EVENT_SA_REPLACE for parent state #443 | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #443 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #691 at 0x557d46c38f00 | State DB: adding IKEv2 state #691 in UNDEFINED | pstats #691 ikev2.ike started | Message ID: init #691: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #691: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #691; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #691 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-191" #691: initiating v2 parent SA to replace #443 | using existing local IKE proposals for connection road-eastnet-nonat-191 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 691 for state #691 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a70b10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #691 | libevent_malloc: new ptr-libevent@0x7fb34c034410 size 128 | #691 spent 0.0388 milliseconds in ikev2_parent_outI1() | RESET processing: state #691 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c3a590 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #443 | libevent_malloc: new ptr-libevent@0x557d46c3a5d0 size 128 | libevent_free: release ptr-libevent@0x7fb360046040 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46b06800 | #443 spent 0.0593 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35800d120 | handling event EVENT_SA_REPLACE for parent state #361 | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #361 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #692 at 0x557d46c3a660 | State DB: adding IKEv2 state #692 in UNDEFINED | pstats #692 ikev2.ike started | Message ID: init #692: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #692: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #692; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #692 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-109" #692: initiating v2 parent SA to replace #361 | using existing local IKE proposals for connection road-eastnet-nonat-109 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 692 for state #692 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b06800 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #692 | libevent_malloc: new ptr-libevent@0x7fb360046040 size 128 | #692 spent 0.0426 milliseconds in ikev2_parent_outI1() | RESET processing: state #692 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c3bcf0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #361 | libevent_malloc: new ptr-libevent@0x557d46c3bd30 size 128 | libevent_free: release ptr-libevent@0x7fb358012840 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb35800d120 | #361 spent 0.0633 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c017ea0 | handling event EVENT_SA_REPLACE for parent state #408 | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #408 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #693 at 0x557d46c3bdc0 | State DB: adding IKEv2 state #693 in UNDEFINED | pstats #693 ikev2.ike started | Message ID: init #693: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #693: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #693; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #693 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-156" #693: initiating v2 parent SA to replace #408 | using existing local IKE proposals for connection road-eastnet-nonat-156 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 693 for state #693 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35800d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #693 | libevent_malloc: new ptr-libevent@0x7fb358012840 size 128 | #693 spent 0.0393 milliseconds in ikev2_parent_outI1() | RESET processing: state #693 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c3d450 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #408 | libevent_malloc: new ptr-libevent@0x557d46c3d490 size 128 | libevent_free: release ptr-libevent@0x7fb35c03f430 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb35c017ea0 | #408 spent 0.0596 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368025320 | handling event EVENT_SA_REPLACE for parent state #481 | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #481 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #694 at 0x557d46c3d520 | State DB: adding IKEv2 state #694 in UNDEFINED | pstats #694 ikev2.ike started | Message ID: init #694: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #694: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #694; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #694 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-229" #694: initiating v2 parent SA to replace #481 | using existing local IKE proposals for connection road-eastnet-nonat-229 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 694 for state #694 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c017ea0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #694 | libevent_malloc: new ptr-libevent@0x7fb35c03f430 size 128 | #694 spent 0.0356 milliseconds in ikev2_parent_outI1() | RESET processing: state #694 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c3ebb0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #481 | libevent_malloc: new ptr-libevent@0x557d46c3ebf0 size 128 | libevent_free: release ptr-libevent@0x7fb36802ee40 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb368025320 | #481 spent 0.0556 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_SA_REPLACE for parent state #449 | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #449 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #695 at 0x557d46c3ec80 | State DB: adding IKEv2 state #695 in UNDEFINED | pstats #695 ikev2.ike started | Message ID: init #695: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #695: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #695; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #695 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-197" #695: initiating v2 parent SA to replace #449 | using existing local IKE proposals for connection road-eastnet-nonat-197 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 695 for state #695 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb368025320 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #695 | libevent_malloc: new ptr-libevent@0x7fb36802ee40 size 128 | #695 spent 0.0389 milliseconds in ikev2_parent_outI1() | RESET processing: state #695 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c40310 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #449 | libevent_malloc: new ptr-libevent@0x557d46c40350 size 128 | libevent_free: release ptr-libevent@0x7fb3780300e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb36800d120 | #449 spent 0.0604 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb338017ea0 | handling event EVENT_SA_REPLACE for parent state #467 | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #467 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #696 at 0x557d46c403e0 | State DB: adding IKEv2 state #696 in UNDEFINED | pstats #696 ikev2.ike started | Message ID: init #696: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #696: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #696; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #696 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-215" #696: initiating v2 parent SA to replace #467 | using existing local IKE proposals for connection road-eastnet-nonat-215 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 696 for state #696 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36800d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #696 | libevent_malloc: new ptr-libevent@0x7fb3780300e0 size 128 | #696 spent 0.0368 milliseconds in ikev2_parent_outI1() | RESET processing: state #696 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c41a70 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #467 | libevent_malloc: new ptr-libevent@0x557d46c41ab0 size 128 | libevent_free: release ptr-libevent@0x7fb35403b0b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb338017ea0 | #467 spent 0.0581 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_SA_REPLACE for parent state #453 | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #453 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #697 at 0x557d46c41b40 | State DB: adding IKEv2 state #697 in UNDEFINED | pstats #697 ikev2.ike started | Message ID: init #697: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #697: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #697; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #697 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-201" #697: initiating v2 parent SA to replace #453 | using existing local IKE proposals for connection road-eastnet-nonat-201 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 697 for state #697 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb338017ea0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #697 | libevent_malloc: new ptr-libevent@0x7fb35403b0b0 size 128 | #697 spent 0.0374 milliseconds in ikev2_parent_outI1() | RESET processing: state #697 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c431d0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #453 | libevent_malloc: new ptr-libevent@0x557d46c43210 size 128 | libevent_free: release ptr-libevent@0x7fb34400cf80 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a05290 | #453 spent 0.0575 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350014cc0 | handling event EVENT_SA_REPLACE for parent state #463 | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #463 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #698 at 0x557d46c432a0 | State DB: adding IKEv2 state #698 in UNDEFINED | pstats #698 ikev2.ike started | Message ID: init #698: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #698: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #698; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #698 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-211" #698: initiating v2 parent SA to replace #463 | using existing local IKE proposals for connection road-eastnet-nonat-211 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 698 for state #698 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a05290 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #698 | libevent_malloc: new ptr-libevent@0x7fb34400cf80 size 128 | #698 spent 0.0744 milliseconds in ikev2_parent_outI1() | RESET processing: state #698 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c44930 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #463 | libevent_malloc: new ptr-libevent@0x557d46c44970 size 128 | libevent_free: release ptr-libevent@0x7fb350029650 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb350014cc0 | #463 spent 0.107 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb380027d70 | handling event EVENT_SA_REPLACE for parent state #498 | start processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #498 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #699 at 0x557d46c44a00 | State DB: adding IKEv2 state #699 in UNDEFINED | pstats #699 ikev2.ike started | Message ID: init #699: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #699: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #699; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #699 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-246" #699: initiating v2 parent SA to replace #498 | using existing local IKE proposals for connection road-eastnet-nonat-246 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 699 for state #699 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb350014cc0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #699 | libevent_malloc: new ptr-libevent@0x7fb350029650 size 128 | #699 spent 0.0766 milliseconds in ikev2_parent_outI1() | RESET processing: state #699 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c46090 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #498 | libevent_malloc: new ptr-libevent@0x557d46c460d0 size 128 | libevent_free: release ptr-libevent@0x7fb380043300 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb380027d70 | #498 spent 0.131 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38400feb0 | handling event EVENT_SA_REPLACE for parent state #357 | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #357 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #700 at 0x557d46c46160 | State DB: adding IKEv2 state #700 in UNDEFINED | pstats #700 ikev2.ike started | Message ID: init #700: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #700: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #700; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #700 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-105" #700: initiating v2 parent SA to replace #357 | using existing local IKE proposals for connection road-eastnet-nonat-105 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 700 for state #700 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb380027d70 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #700 | libevent_malloc: new ptr-libevent@0x7fb380043300 size 128 | #700 spent 0.0422 milliseconds in ikev2_parent_outI1() | RESET processing: state #700 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c477f0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #357 | libevent_malloc: new ptr-libevent@0x557d46c47830 size 128 | libevent_free: release ptr-libevent@0x7fb3840266d0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb38400feb0 | #357 spent 0.0637 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368024000 | handling event EVENT_SA_REPLACE for parent state #455 | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #455 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #701 at 0x557d46c478c0 | State DB: adding IKEv2 state #701 in UNDEFINED | pstats #701 ikev2.ike started | Message ID: init #701: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #701: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #701; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #701 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-203" #701: initiating v2 parent SA to replace #455 | using existing local IKE proposals for connection road-eastnet-nonat-203 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 701 for state #701 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb38400feb0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #701 | libevent_malloc: new ptr-libevent@0x7fb3840266d0 size 128 | #701 spent 0.0381 milliseconds in ikev2_parent_outI1() | RESET processing: state #701 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c48f50 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #455 | libevent_malloc: new ptr-libevent@0x557d46c48f90 size 128 | libevent_free: release ptr-libevent@0x7fb368046040 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb368024000 | #455 spent 0.0608 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_SA_REPLACE for parent state #450 | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #450 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #702 at 0x557d46c49020 | State DB: adding IKEv2 state #702 in UNDEFINED | pstats #702 ikev2.ike started | Message ID: init #702: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #702: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #702; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #702 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-198" #702: initiating v2 parent SA to replace #450 | using existing local IKE proposals for connection road-eastnet-nonat-198 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 702 for state #702 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb368024000 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #702 | libevent_malloc: new ptr-libevent@0x7fb368046040 size 128 | #702 spent 0.0396 milliseconds in ikev2_parent_outI1() | RESET processing: state #702 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c4a6b0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #450 | libevent_malloc: new ptr-libevent@0x557d46c4a6f0 size 128 | libevent_free: release ptr-libevent@0x7fb3700251c0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46aecb00 | #450 spent 0.0607 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b07dc0 | handling event EVENT_SA_REPLACE for parent state #366 | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #366 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #703 at 0x557d46c4a780 | State DB: adding IKEv2 state #703 in UNDEFINED | pstats #703 ikev2.ike started | Message ID: init #703: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #703: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #703; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #703 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-114" #703: initiating v2 parent SA to replace #366 | using existing local IKE proposals for connection road-eastnet-nonat-114 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 703 for state #703 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aecb00 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #703 | libevent_malloc: new ptr-libevent@0x7fb3700251c0 size 128 | #703 spent 0.0537 milliseconds in ikev2_parent_outI1() | RESET processing: state #703 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c4be10 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #366 | libevent_malloc: new ptr-libevent@0x557d46c4be50 size 128 | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46b07dc0 | #366 spent 0.0821 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b1c440 | handling event EVENT_SA_REPLACE for parent state #479 | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #479 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #704 at 0x557d46c4bee0 | State DB: adding IKEv2 state #704 in UNDEFINED | pstats #704 ikev2.ike started | Message ID: init #704: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #704: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #704; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #704 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-227" #704: initiating v2 parent SA to replace #479 | using existing local IKE proposals for connection road-eastnet-nonat-227 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 704 for state #704 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b07dc0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #704 | libevent_malloc: new ptr-libevent@0x7fb36c02a950 size 128 | #704 spent 0.0808 milliseconds in ikev2_parent_outI1() | RESET processing: state #704 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c4d570 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #479 | libevent_malloc: new ptr-libevent@0x557d46c4d5b0 size 128 | libevent_free: release ptr-libevent@0x7fb34403a3d0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46b1c440 | #479 spent 0.115 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a70b50 | handling event EVENT_SA_REPLACE for parent state #471 | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #471 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #705 at 0x557d46c4d640 | State DB: adding IKEv2 state #705 in UNDEFINED | pstats #705 ikev2.ike started | Message ID: init #705: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #705: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #705; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #705 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-219" #705: initiating v2 parent SA to replace #471 | using existing local IKE proposals for connection road-eastnet-nonat-219 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 705 for state #705 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b1c440 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #705 | libevent_malloc: new ptr-libevent@0x7fb34403a3d0 size 128 | #705 spent 0.0803 milliseconds in ikev2_parent_outI1() | RESET processing: state #705 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c4ecd0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #471 | libevent_malloc: new ptr-libevent@0x557d46c4ed10 size 128 | libevent_free: release ptr-libevent@0x7fb35001d920 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a70b50 | #471 spent 0.118 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370018460 | handling event EVENT_SA_REPLACE for parent state #437 | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #437 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #706 at 0x557d46c4eda0 | State DB: adding IKEv2 state #706 in UNDEFINED | pstats #706 ikev2.ike started | Message ID: init #706: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #706: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #706; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #706 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-185" #706: initiating v2 parent SA to replace #437 | using existing local IKE proposals for connection road-eastnet-nonat-185 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 706 for state #706 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a70b50 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #706 | libevent_malloc: new ptr-libevent@0x7fb35001d920 size 128 | #706 spent 0.0749 milliseconds in ikev2_parent_outI1() | RESET processing: state #706 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c50430 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #437 | libevent_malloc: new ptr-libevent@0x557d46c50470 size 128 | libevent_free: release ptr-libevent@0x7fb3400094d0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb370018460 | #437 spent 0.114 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_SA_REPLACE for parent state #464 | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #464 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #707 at 0x557d46c50500 | State DB: adding IKEv2 state #707 in UNDEFINED | pstats #707 ikev2.ike started | Message ID: init #707: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #707: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #707; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #707 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-212" #707: initiating v2 parent SA to replace #464 | using existing local IKE proposals for connection road-eastnet-nonat-212 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 707 for state #707 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb370018460 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #707 | libevent_malloc: new ptr-libevent@0x7fb3400094d0 size 128 | #707 spent 0.0537 milliseconds in ikev2_parent_outI1() | RESET processing: state #707 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c51b90 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #464 | libevent_malloc: new ptr-libevent@0x557d46c51bd0 size 128 | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a198d0 | #464 spent 0.0778 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_SA_REPLACE for parent state #405 | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #405 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #708 at 0x557d46c51c60 | State DB: adding IKEv2 state #708 in UNDEFINED | pstats #708 ikev2.ike started | Message ID: init #708: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #708: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #708; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #708 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-153" #708: initiating v2 parent SA to replace #405 | using existing local IKE proposals for connection road-eastnet-nonat-153 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 708 for state #708 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a198d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #708 | libevent_malloc: new ptr-libevent@0x7fb35400cf80 size 128 | #708 spent 0.0384 milliseconds in ikev2_parent_outI1() | RESET processing: state #708 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c532f0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #405 | libevent_malloc: new ptr-libevent@0x557d46c53330 size 128 | libevent_free: release ptr-libevent@0x7fb370014c70 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a81500 | #405 spent 0.0602 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a86b80 | handling event EVENT_SA_REPLACE for parent state #435 | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #435 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #709 at 0x557d46c533c0 | State DB: adding IKEv2 state #709 in UNDEFINED | pstats #709 ikev2.ike started | Message ID: init #709: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #709: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #709; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #709 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-183" #709: initiating v2 parent SA to replace #435 | using existing local IKE proposals for connection road-eastnet-nonat-183 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 709 for state #709 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a81500 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #709 | libevent_malloc: new ptr-libevent@0x7fb370014c70 size 128 | #709 spent 0.0354 milliseconds in ikev2_parent_outI1() | RESET processing: state #709 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c54a50 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #435 | libevent_malloc: new ptr-libevent@0x557d46c54a90 size 128 | libevent_free: release ptr-libevent@0x7fb35401a4e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a86b80 | #435 spent 0.0566 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368040840 | handling event EVENT_SA_REPLACE for parent state #460 | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #460 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #710 at 0x557d46c54b20 | State DB: adding IKEv2 state #710 in UNDEFINED | pstats #710 ikev2.ike started | Message ID: init #710: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #710: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #710; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #710 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-208" #710: initiating v2 parent SA to replace #460 | using existing local IKE proposals for connection road-eastnet-nonat-208 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 710 for state #710 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a86b80 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #710 | libevent_malloc: new ptr-libevent@0x7fb35401a4e0 size 128 | #710 spent 0.0377 milliseconds in ikev2_parent_outI1() | RESET processing: state #710 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c561b0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #460 | libevent_malloc: new ptr-libevent@0x557d46c561f0 size 128 | libevent_free: release ptr-libevent@0x7fb3680345d0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb368040840 | #460 spent 0.0578 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aa5fc0 | handling event EVENT_SA_REPLACE for parent state #438 | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #438 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #711 at 0x557d46c56280 | State DB: adding IKEv2 state #711 in UNDEFINED | pstats #711 ikev2.ike started | Message ID: init #711: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #711: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #711; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #711 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-186" #711: initiating v2 parent SA to replace #438 | using existing local IKE proposals for connection road-eastnet-nonat-186 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 711 for state #711 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb368040840 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #711 | libevent_malloc: new ptr-libevent@0x7fb3680345d0 size 128 | #711 spent 0.0349 milliseconds in ikev2_parent_outI1() | RESET processing: state #711 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c57910 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #438 | libevent_malloc: new ptr-libevent@0x557d46c57950 size 128 | libevent_free: release ptr-libevent@0x7fb35c0300e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46aa5fc0 | #438 spent 0.0562 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb340025210 | handling event EVENT_SA_REPLACE for parent state #446 | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #446 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #712 at 0x557d46c579e0 | State DB: adding IKEv2 state #712 in UNDEFINED | pstats #712 ikev2.ike started | Message ID: init #712: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #712: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #712; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #712 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-194" #712: initiating v2 parent SA to replace #446 | using existing local IKE proposals for connection road-eastnet-nonat-194 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 712 for state #712 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46aa5fc0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #712 | libevent_malloc: new ptr-libevent@0x7fb35c0300e0 size 128 | #712 spent 0.0395 milliseconds in ikev2_parent_outI1() | RESET processing: state #712 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c59070 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #446 | libevent_malloc: new ptr-libevent@0x557d46c590b0 size 128 | libevent_free: release ptr-libevent@0x7fb35804b850 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb340025210 | #446 spent 0.0855 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37802a9a0 | handling event EVENT_SA_REPLACE for parent state #459 | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #459 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #713 at 0x557d46c59140 | State DB: adding IKEv2 state #713 in UNDEFINED | pstats #713 ikev2.ike started | Message ID: init #713: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #713: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #713; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #713 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-207" #713: initiating v2 parent SA to replace #459 | using existing local IKE proposals for connection road-eastnet-nonat-207 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 713 for state #713 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb340025210 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #713 | libevent_malloc: new ptr-libevent@0x7fb35804b850 size 128 | #713 spent 0.0431 milliseconds in ikev2_parent_outI1() | RESET processing: state #713 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c5a7d0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #459 | libevent_malloc: new ptr-libevent@0x557d46c5a810 size 128 | libevent_free: release ptr-libevent@0x7fb37801a4e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb37802a9a0 | #459 spent 0.0646 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a97080 | handling event EVENT_SA_REPLACE for parent state #412 | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #412 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #714 at 0x557d46c5a8a0 | State DB: adding IKEv2 state #714 in UNDEFINED | pstats #714 ikev2.ike started | Message ID: init #714: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #714: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #714; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #714 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-160" #714: initiating v2 parent SA to replace #412 | using existing local IKE proposals for connection road-eastnet-nonat-160 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 714 for state #714 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37802a9a0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #714 | libevent_malloc: new ptr-libevent@0x7fb37801a4e0 size 128 | #714 spent 0.0366 milliseconds in ikev2_parent_outI1() | RESET processing: state #714 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c5bf30 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #412 | libevent_malloc: new ptr-libevent@0x557d46c5bf70 size 128 | libevent_free: release ptr-libevent@0x7fb37c023b10 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a97080 | #412 spent 0.0568 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_SA_REPLACE for parent state #421 | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #421 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #715 at 0x557d46c5c000 | State DB: adding IKEv2 state #715 in UNDEFINED | pstats #715 ikev2.ike started | Message ID: init #715: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #715: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #715; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #715 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-169" #715: initiating v2 parent SA to replace #421 | using existing local IKE proposals for connection road-eastnet-nonat-169 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 715 for state #715 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a97080 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #715 | libevent_malloc: new ptr-libevent@0x7fb37c023b10 size 128 | #715 spent 0.0386 milliseconds in ikev2_parent_outI1() | RESET processing: state #715 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c5d690 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #421 | libevent_malloc: new ptr-libevent@0x557d46c5d6d0 size 128 | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a2cb90 | #421 spent 0.0589 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35400f1f0 | handling event EVENT_SA_REPLACE for parent state #457 | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #457 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #716 at 0x557d46c5d760 | State DB: adding IKEv2 state #716 in UNDEFINED | pstats #716 ikev2.ike started | Message ID: init #716: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #716: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #716; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #716 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-205" #716: initiating v2 parent SA to replace #457 | using existing local IKE proposals for connection road-eastnet-nonat-205 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 716 for state #716 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2cb90 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #716 | libevent_malloc: new ptr-libevent@0x7fb364024ff0 size 128 | #716 spent 0.0446 milliseconds in ikev2_parent_outI1() | RESET processing: state #716 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c5edf0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #457 | libevent_malloc: new ptr-libevent@0x557d46c5ee30 size 128 | libevent_free: release ptr-libevent@0x7fb35403a770 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb35400f1f0 | #457 spent 0.0655 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34401d710 | handling event EVENT_SA_REPLACE for parent state #447 | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #447 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #717 at 0x557d46c5eec0 | State DB: adding IKEv2 state #717 in UNDEFINED | pstats #717 ikev2.ike started | Message ID: init #717: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #717: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #717; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #717 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-195" #717: initiating v2 parent SA to replace #447 | using existing local IKE proposals for connection road-eastnet-nonat-195 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 717 for state #717 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35400f1f0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #717 | libevent_malloc: new ptr-libevent@0x7fb35403a770 size 128 | #717 spent 0.0446 milliseconds in ikev2_parent_outI1() | RESET processing: state #717 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c60550 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #447 | libevent_malloc: new ptr-libevent@0x557d46c60590 size 128 | libevent_free: release ptr-libevent@0x7fb344040760 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb34401d710 | #447 spent 0.0654 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a54250 | handling event EVENT_SA_REPLACE for parent state #409 | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #409 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #718 at 0x557d46c60620 | State DB: adding IKEv2 state #718 in UNDEFINED | pstats #718 ikev2.ike started | Message ID: init #718: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #718: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #718; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #718 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-157" #718: initiating v2 parent SA to replace #409 | using existing local IKE proposals for connection road-eastnet-nonat-157 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 718 for state #718 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34401d710 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #718 | libevent_malloc: new ptr-libevent@0x7fb344040760 size 128 | #718 spent 0.0381 milliseconds in ikev2_parent_outI1() | RESET processing: state #718 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c61cb0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #409 | libevent_malloc: new ptr-libevent@0x557d46c61cf0 size 128 | libevent_free: release ptr-libevent@0x7fb388022480 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a54250 | #409 spent 0.0591 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a1c490 | handling event EVENT_SA_REPLACE for parent state #445 | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #445 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #719 at 0x557d46c61d80 | State DB: adding IKEv2 state #719 in UNDEFINED | pstats #719 ikev2.ike started | Message ID: init #719: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #719: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #719; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #719 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-193" #719: initiating v2 parent SA to replace #445 | using existing local IKE proposals for connection road-eastnet-nonat-193 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 719 for state #719 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a54250 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #719 | libevent_malloc: new ptr-libevent@0x7fb388022480 size 128 | #719 spent 0.0389 milliseconds in ikev2_parent_outI1() | RESET processing: state #719 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c63410 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #445 | libevent_malloc: new ptr-libevent@0x557d46c63450 size 128 | libevent_free: release ptr-libevent@0x7fb34c02ec30 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a1c490 | #445 spent 0.0595 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ae0780 | handling event EVENT_SA_REPLACE for parent state #434 | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #434 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #720 at 0x557d46c634e0 | State DB: adding IKEv2 state #720 in UNDEFINED | pstats #720 ikev2.ike started | Message ID: init #720: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #720: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #720; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #720 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-182" #720: initiating v2 parent SA to replace #434 | using existing local IKE proposals for connection road-eastnet-nonat-182 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 720 for state #720 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a1c490 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #720 | libevent_malloc: new ptr-libevent@0x7fb34c02ec30 size 128 | #720 spent 0.037 milliseconds in ikev2_parent_outI1() | RESET processing: state #720 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c64b70 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #434 | libevent_malloc: new ptr-libevent@0x557d46c64bb0 size 128 | libevent_free: release ptr-libevent@0x7fb36004b7c0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46ae0780 | #434 spent 0.0574 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46adb080 | handling event EVENT_SA_REPLACE for parent state #356 | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #356 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #721 at 0x557d46c64c40 | State DB: adding IKEv2 state #721 in UNDEFINED | pstats #721 ikev2.ike started | Message ID: init #721: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #721: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #721; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #721 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-104" #721: initiating v2 parent SA to replace #356 | using existing local IKE proposals for connection road-eastnet-nonat-104 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 721 for state #721 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ae0780 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #721 | libevent_malloc: new ptr-libevent@0x7fb36004b7c0 size 128 | #721 spent 0.0369 milliseconds in ikev2_parent_outI1() | RESET processing: state #721 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c662d0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #356 | libevent_malloc: new ptr-libevent@0x557d46c66310 size 128 | libevent_free: release ptr-libevent@0x7fb378035930 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46adb080 | #356 spent 0.0583 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a47f10 | handling event EVENT_SA_REPLACE for parent state #431 | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #431 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #722 at 0x557d46c663a0 | State DB: adding IKEv2 state #722 in UNDEFINED | pstats #722 ikev2.ike started | Message ID: init #722: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #722: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #722; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #722 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-179" #722: initiating v2 parent SA to replace #431 | using existing local IKE proposals for connection road-eastnet-nonat-179 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 722 for state #722 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46adb080 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #722 | libevent_malloc: new ptr-libevent@0x7fb378035930 size 128 | #722 spent 0.0361 milliseconds in ikev2_parent_outI1() | RESET processing: state #722 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c67a30 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #431 | libevent_malloc: new ptr-libevent@0x557d46c67a70 size 128 | libevent_free: release ptr-libevent@0x7fb37c01d920 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a47f10 | #431 spent 0.0574 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab90c0 | handling event EVENT_SA_REPLACE for parent state #407 | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #407 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #723 at 0x557d46c67b00 | State DB: adding IKEv2 state #723 in UNDEFINED | pstats #723 ikev2.ike started | Message ID: init #723: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #723: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #723; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #723 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-155" #723: initiating v2 parent SA to replace #407 | using existing local IKE proposals for connection road-eastnet-nonat-155 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 723 for state #723 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47f10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #723 | libevent_malloc: new ptr-libevent@0x7fb37c01d920 size 128 | #723 spent 0.0372 milliseconds in ikev2_parent_outI1() | RESET processing: state #723 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c69190 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #407 | libevent_malloc: new ptr-libevent@0x557d46c691d0 size 128 | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46ab90c0 | #407 spent 0.0577 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 515 time elapsed 0.015351 seconds | timer_event_cb: processing event@0x7fb378018460 | (#515) spent 0.611 milliseconds in crypto helper computing work-order 515: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 515 for state #515 to event queue | scheduling resume sending helper answer for #515 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 516 time elapsed 0.015278 seconds | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 517 time elapsed 0.015205 seconds | (#516) spent 1.02 milliseconds in crypto helper computing work-order 516: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 516 for state #516 to event queue | scheduling resume sending helper answer for #516 | libevent_malloc: new ptr-libevent@0x7fb35404e8b0 size 128 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 514 time elapsed 0.015457 seconds | (#517) spent 1.01 milliseconds in crypto helper computing work-order 517: ikev2_outI1 KE (pcr) | (#514) spent 0.616 milliseconds in crypto helper computing work-order 514: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 517 for state #517 to event queue | scheduling resume sending helper answer for #517 | libevent_malloc: new ptr-libevent@0x7fb34c04e700 size 128 | crypto helper 8 starting work-order 534 for state #534 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 534 | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 518 time elapsed 0.015116 seconds | crypto helper 18 starting work-order 533 for state #533 | libevent_malloc: new ptr-libevent@0x7fb34804e3b0 size 128 | crypto helper 17 sending results from work-order 514 for state #514 to event queue | (#518) spent 0.811 milliseconds in crypto helper computing work-order 518: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 518 for state #518 to event queue | scheduling resume sending helper answer for #518 | libevent_malloc: new ptr-libevent@0x7fb34004e2d0 size 128 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 533 | crypto helper 7 starting work-order 535 for state #535 | scheduling resume sending helper answer for #514 | crypto helper 12 starting work-order 536 for state #536 | libevent_malloc: new ptr-libevent@0x7fb35004e5a0 size 128 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 535 | crypto helper 17 starting work-order 537 for state #537 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 536 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 537 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 522 time elapsed 0.015326 seconds | (#522) spent 0.613 milliseconds in crypto helper computing work-order 522: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 522 for state #522 to event queue | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 507 time elapsed 0.016885 seconds | scheduling resume sending helper answer for #522 | handling event EVENT_SA_REPLACE for parent state #442 | (#507) spent 1.04 milliseconds in crypto helper computing work-order 507: ikev2_outI1 KE (pcr) | libevent_malloc: new ptr-libevent@0x7fb38004e900 size 128 | crypto helper 15 sending results from work-order 507 for state #507 to event queue | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | scheduling resume sending helper answer for #507 | crypto helper 2 starting work-order 538 for state #538 | picked newest_isakmp_sa #0 for #442 | replacing stale IKE SA | libevent_malloc: new ptr-libevent@0x7fb374039ac0 size 128 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 538 | crypto helper 15 starting work-order 539 for state #539 | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 539 | creating state object #724 at 0x557d46c69260 | State DB: adding IKEv2 state #724 in UNDEFINED | pstats #724 ikev2.ike started | Message ID: init #724: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #724: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #724; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #724 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-190" #724: initiating v2 parent SA to replace #442 | using existing local IKE proposals for connection road-eastnet-nonat-190 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 724 for state #724 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab90c0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #724 | libevent_malloc: new ptr-libevent@0x7fb36c009640 size 128 | #724 spent 0.0592 milliseconds in ikev2_parent_outI1() | RESET processing: state #724 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c6a8f0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #442 | libevent_malloc: new ptr-libevent@0x557d46c6a930 size 128 | libevent_free: release ptr-libevent@0x7fb3700407f0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb378018460 | #442 spent 0.106 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c01d710 | handling event EVENT_SA_REPLACE for parent state #448 | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #448 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #725 at 0x557d46c6a9c0 | State DB: adding IKEv2 state #725 in UNDEFINED | pstats #725 ikev2.ike started | Message ID: init #725: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #725: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #725; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #725 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-196" #725: initiating v2 parent SA to replace #448 | using existing local IKE proposals for connection road-eastnet-nonat-196 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 725 for state #725 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb378018460 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #725 | libevent_malloc: new ptr-libevent@0x7fb3700407f0 size 128 | #725 spent 0.0394 milliseconds in ikev2_parent_outI1() | RESET processing: state #725 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c6c050 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #448 | libevent_malloc: new ptr-libevent@0x557d46c6c090 size 128 | libevent_free: release ptr-libevent@0x7fb36c0300e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb37c01d710 | #448 spent 0.0606 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c012890 | handling event EVENT_SA_REPLACE for parent state #451 | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #451 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #726 at 0x557d46c6c120 | State DB: adding IKEv2 state #726 in UNDEFINED | pstats #726 ikev2.ike started | Message ID: init #726: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #726: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #726; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #726 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-199" #726: initiating v2 parent SA to replace #451 | using existing local IKE proposals for connection road-eastnet-nonat-199 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 726 for state #726 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c01d710 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #726 | libevent_malloc: new ptr-libevent@0x7fb36c0300e0 size 128 | #726 spent 0.0367 milliseconds in ikev2_parent_outI1() | RESET processing: state #726 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c6d7b0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #451 | libevent_malloc: new ptr-libevent@0x557d46c6d7f0 size 128 | libevent_free: release ptr-libevent@0x7fb36c03a770 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb36c012890 | #451 spent 0.0585 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b24700 | handling event EVENT_SA_REPLACE for parent state #462 | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #462 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #727 at 0x557d46c6d880 | State DB: adding IKEv2 state #727 in UNDEFINED | pstats #727 ikev2.ike started | Message ID: init #727: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #727: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #727; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #727 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-210" #727: initiating v2 parent SA to replace #462 | using existing local IKE proposals for connection road-eastnet-nonat-210 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 727 for state #727 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c012890 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #727 | libevent_malloc: new ptr-libevent@0x7fb36c03a770 size 128 | #727 spent 0.0368 milliseconds in ikev2_parent_outI1() | RESET processing: state #727 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c6ef10 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #462 | libevent_malloc: new ptr-libevent@0x557d46c6ef50 size 128 | libevent_free: release ptr-libevent@0x7fb3500180b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46b24700 | #462 spent 0.0573 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c018460 | handling event EVENT_SA_REPLACE for parent state #468 | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #468 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #728 at 0x557d46c6efe0 | State DB: adding IKEv2 state #728 in UNDEFINED | pstats #728 ikev2.ike started | Message ID: init #728: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #728: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #728; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #728 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-216" #728: initiating v2 parent SA to replace #468 | using existing local IKE proposals for connection road-eastnet-nonat-216 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 728 for state #728 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b24700 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #728 | libevent_malloc: new ptr-libevent@0x7fb3500180b0 size 128 | #728 spent 0.0434 milliseconds in ikev2_parent_outI1() | RESET processing: state #728 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c70670 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #468 | libevent_malloc: new ptr-libevent@0x557d46c706b0 size 128 | libevent_free: release ptr-libevent@0x7fb34c01a4e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb37c018460 | #468 spent 0.0644 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35400cc10 | handling event EVENT_SA_REPLACE for parent state #492 | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #492 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #729 at 0x557d46c70740 | State DB: adding IKEv2 state #729 in UNDEFINED | pstats #729 ikev2.ike started | Message ID: init #729: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #729: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #729; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #729 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-240" #729: initiating v2 parent SA to replace #492 | using existing local IKE proposals for connection road-eastnet-nonat-240 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 729 for state #729 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c018460 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #729 | libevent_malloc: new ptr-libevent@0x7fb34c01a4e0 size 128 | #729 spent 0.0373 milliseconds in ikev2_parent_outI1() | RESET processing: state #729 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c71dd0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #492 | libevent_malloc: new ptr-libevent@0x557d46c71e10 size 128 | libevent_free: release ptr-libevent@0x7fb354023e30 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb35400cc10 | #492 spent 0.0583 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35401d710 | handling event EVENT_SA_REPLACE for parent state #486 | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #486 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #730 at 0x557d46c71ea0 | State DB: adding IKEv2 state #730 in UNDEFINED | pstats #730 ikev2.ike started | Message ID: init #730: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #730: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #730; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #730 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-234" #730: initiating v2 parent SA to replace #486 | using existing local IKE proposals for connection road-eastnet-nonat-234 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 730 for state #730 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35400cc10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #730 | libevent_malloc: new ptr-libevent@0x7fb354023e30 size 128 | #730 spent 0.0387 milliseconds in ikev2_parent_outI1() | RESET processing: state #730 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c73530 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #486 | libevent_malloc: new ptr-libevent@0x557d46c73570 size 128 | libevent_free: release ptr-libevent@0x7fb35402ede0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb35401d710 | #486 spent 0.0589 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_SA_REPLACE for parent state #499 | start processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #499 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #731 at 0x557d46c73600 | State DB: adding IKEv2 state #731 in UNDEFINED | pstats #731 ikev2.ike started | Message ID: init #731: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #731: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #731; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #731 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-247" #731: initiating v2 parent SA to replace #499 | using existing local IKE proposals for connection road-eastnet-nonat-247 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 731 for state #731 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35401d710 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #731 | libevent_malloc: new ptr-libevent@0x7fb35402ede0 size 128 | #731 spent 0.0359 milliseconds in ikev2_parent_outI1() | RESET processing: state #731 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c74c90 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #499 | libevent_malloc: new ptr-libevent@0x557d46c74cd0 size 128 | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb364005860 | #499 spent 0.0561 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb380009ed0 | handling event EVENT_SA_REPLACE for parent state #474 | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #474 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #732 at 0x557d46c74d60 | State DB: adding IKEv2 state #732 in UNDEFINED | pstats #732 ikev2.ike started | Message ID: init #732: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #732: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #732; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #732 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-222" #732: initiating v2 parent SA to replace #474 | using existing local IKE proposals for connection road-eastnet-nonat-222 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 732 for state #732 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb364005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #732 | libevent_malloc: new ptr-libevent@0x7fb364009640 size 128 | #732 spent 0.0398 milliseconds in ikev2_parent_outI1() | RESET processing: state #732 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c763f0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #474 | libevent_malloc: new ptr-libevent@0x557d46c76430 size 128 | libevent_free: release ptr-libevent@0x7fb3800223c0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb380009ed0 | #474 spent 0.06 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb33801d710 | handling event EVENT_SA_REPLACE for parent state #472 | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #472 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #733 at 0x557d46c764c0 | State DB: adding IKEv2 state #733 in UNDEFINED | pstats #733 ikev2.ike started | Message ID: init #733: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #733: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #733; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #733 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-220" #733: initiating v2 parent SA to replace #472 | using existing local IKE proposals for connection road-eastnet-nonat-220 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 733 for state #733 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb380009ed0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #733 | libevent_malloc: new ptr-libevent@0x7fb3800223c0 size 128 | #733 spent 0.036 milliseconds in ikev2_parent_outI1() | RESET processing: state #733 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c77b50 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #472 | libevent_malloc: new ptr-libevent@0x557d46c77b90 size 128 | libevent_free: release ptr-libevent@0x7fb33802ee40 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb33801d710 | #472 spent 0.0569 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46abbc00 | handling event EVENT_SA_REPLACE for parent state #426 | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #426 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #734 at 0x557d46c77c20 | State DB: adding IKEv2 state #734 in UNDEFINED | pstats #734 ikev2.ike started | Message ID: init #734: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #734: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #734; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #734 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-174" #734: initiating v2 parent SA to replace #426 | using existing local IKE proposals for connection road-eastnet-nonat-174 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 734 for state #734 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb33801d710 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #734 | libevent_malloc: new ptr-libevent@0x7fb33802ee40 size 128 | #734 spent 0.0389 milliseconds in ikev2_parent_outI1() | RESET processing: state #734 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c792b0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #426 | libevent_malloc: new ptr-libevent@0x557d46c792f0 size 128 | libevent_free: release ptr-libevent@0x7fb37c01a4e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46abbc00 | #426 spent 0.0596 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c02aab0 | handling event EVENT_SA_REPLACE for parent state #490 | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #490 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #735 at 0x557d46c79380 | State DB: adding IKEv2 state #735 in UNDEFINED | pstats #735 ikev2.ike started | Message ID: init #735: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #735: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #735; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #735 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-238" #735: initiating v2 parent SA to replace #490 | using existing local IKE proposals for connection road-eastnet-nonat-238 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 735 for state #735 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46abbc00 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #735 | libevent_malloc: new ptr-libevent@0x7fb37c01a4e0 size 128 | #735 spent 0.0359 milliseconds in ikev2_parent_outI1() | RESET processing: state #735 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c7aa10 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #490 | libevent_malloc: new ptr-libevent@0x557d46c7aa50 size 128 | libevent_free: release ptr-libevent@0x7fb35c03a770 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb35c02aab0 | #490 spent 0.0561 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3780297c0 | handling event EVENT_SA_REPLACE for parent state #484 | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #484 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #736 at 0x557d46c7aae0 | State DB: adding IKEv2 state #736 in UNDEFINED | pstats #736 ikev2.ike started | Message ID: init #736: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #736: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #736; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #736 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-232" #736: initiating v2 parent SA to replace #484 | using existing local IKE proposals for connection road-eastnet-nonat-232 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 736 for state #736 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c02aab0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #736 | libevent_malloc: new ptr-libevent@0x7fb35c03a770 size 128 | #736 spent 0.0398 milliseconds in ikev2_parent_outI1() | RESET processing: state #736 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c7c170 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #484 | libevent_malloc: new ptr-libevent@0x557d46c7c1b0 size 128 | libevent_free: release ptr-libevent@0x7fb38403da90 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb3780297c0 | #484 spent 0.0612 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_SA_REPLACE for parent state #441 | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #441 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #737 at 0x557d46c7c240 | State DB: adding IKEv2 state #737 in UNDEFINED | pstats #737 ikev2.ike started | Message ID: init #737: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #737: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #737; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 509 time elapsed 0.017554 seconds | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 528 time elapsed 0.005652 seconds | suspend processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | (#528) spent 0.953 milliseconds in crypto helper computing work-order 528: ikev2_outI1 KE (pcr) | start processing: state #737 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | (#509) spent 1.03 milliseconds in crypto helper computing work-order 509: ikev2_outI1 KE (pcr) "road-eastnet-nonat-189" #737: initiating v2 parent SA to replace #441 | crypto helper 1 sending results from work-order 528 for state #528 to event queue | crypto helper 6 sending results from work-order 509 for state #509 to event queue | using existing local IKE proposals for connection road-eastnet-nonat-189 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | scheduling resume sending helper answer for #528 | scheduling resume sending helper answer for #509 | adding ikev2_outI1 KE work-order 737 for state #737 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb3780297c0 | libevent_malloc: new ptr-libevent@0x7fb36c046140 size 128 | libevent_malloc: new ptr-libevent@0x7fb388054710 size 128 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #737 | crypto helper 1 starting work-order 541 for state #541 | crypto helper 6 starting work-order 540 for state #540 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 541 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 540 | libevent_malloc: new ptr-libevent@0x7fb38403da90 size 128 | #737 spent 0.075 milliseconds in ikev2_parent_outI1() | RESET processing: state #737 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c7d8d0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #441 | libevent_malloc: new ptr-libevent@0x557d46c7d910 size 128 | libevent_free: release ptr-libevent@0x7fb34c012840 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb34c00d120 | #441 spent 0.1 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a45350 | handling event EVENT_SA_REPLACE for parent state #480 | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #480 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #738 at 0x557d46c7d9a0 | State DB: adding IKEv2 state #738 in UNDEFINED | pstats #738 ikev2.ike started | Message ID: init #738: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #738: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #738; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #738 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-228" #738: initiating v2 parent SA to replace #480 | using existing local IKE proposals for connection road-eastnet-nonat-228 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 738 for state #738 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb34c00d120 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #738 | libevent_malloc: new ptr-libevent@0x7fb34c012840 size 128 | #738 spent 0.0412 milliseconds in ikev2_parent_outI1() | RESET processing: state #738 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c7f030 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #480 | libevent_malloc: new ptr-libevent@0x557d46c7f070 size 128 | libevent_free: release ptr-libevent@0x7fb374034da0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a45350 | #480 spent 0.0632 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b1c480 | handling event EVENT_SA_REPLACE for parent state #476 | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #476 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #739 at 0x557d46c7f100 | State DB: adding IKEv2 state #739 in UNDEFINED | pstats #739 ikev2.ike started | Message ID: init #739: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #739: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #739; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #739 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-224" #739: initiating v2 parent SA to replace #476 | using existing local IKE proposals for connection road-eastnet-nonat-224 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 739 for state #739 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a45350 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #739 | libevent_malloc: new ptr-libevent@0x7fb374034da0 size 128 | #739 spent 0.0379 milliseconds in ikev2_parent_outI1() | RESET processing: state #739 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c80790 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #476 | libevent_malloc: new ptr-libevent@0x557d46c807d0 size 128 | libevent_free: release ptr-libevent@0x7fb35003b1c0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46b1c480 | #476 spent 0.0581 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a94500 | handling event EVENT_SA_REPLACE for parent state #482 | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #482 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #740 at 0x557d46c80860 | State DB: adding IKEv2 state #740 in UNDEFINED | pstats #740 ikev2.ike started | Message ID: init #740: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #740: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #740; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #740 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-230" #740: initiating v2 parent SA to replace #482 | using existing local IKE proposals for connection road-eastnet-nonat-230 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 740 for state #740 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b1c480 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #740 | libevent_malloc: new ptr-libevent@0x7fb35003b1c0 size 128 | #740 spent 0.0365 milliseconds in ikev2_parent_outI1() | RESET processing: state #740 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c81ef0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #482 | libevent_malloc: new ptr-libevent@0x557d46c81f30 size 128 | libevent_free: release ptr-libevent@0x7fb3380300e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a94500 | #482 spent 0.057 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad8480 | handling event EVENT_SA_REPLACE for parent state #469 | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #469 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #741 at 0x557d46c81fc0 | State DB: adding IKEv2 state #741 in UNDEFINED | pstats #741 ikev2.ike started | Message ID: init #741: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #741: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #741; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #741 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-217" #741: initiating v2 parent SA to replace #469 | using existing local IKE proposals for connection road-eastnet-nonat-217 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 741 for state #741 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a94500 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #741 | libevent_malloc: new ptr-libevent@0x7fb3380300e0 size 128 | #741 spent 0.0387 milliseconds in ikev2_parent_outI1() | RESET processing: state #741 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c83650 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #469 | libevent_malloc: new ptr-libevent@0x557d46c83690 size 128 | libevent_free: release ptr-libevent@0x7fb36803b0b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46ad8480 | #469 spent 0.0588 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a647d0 | handling event EVENT_SA_REPLACE for parent state #454 | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #454 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #742 at 0x557d46c83720 | State DB: adding IKEv2 state #742 in UNDEFINED | pstats #742 ikev2.ike started | Message ID: init #742: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #742: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #742; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #742 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-202" #742: initiating v2 parent SA to replace #454 | using existing local IKE proposals for connection road-eastnet-nonat-202 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 742 for state #742 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad8480 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #742 | libevent_malloc: new ptr-libevent@0x7fb36803b0b0 size 128 | #742 spent 0.037 milliseconds in ikev2_parent_outI1() | RESET processing: state #742 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c84db0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #454 | libevent_malloc: new ptr-libevent@0x557d46c84df0 size 128 | libevent_free: release ptr-libevent@0x7fb368023a60 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a647d0 | #454 spent 0.0573 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_SA_REPLACE for parent state #485 | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #485 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #743 at 0x557d46c84e80 | State DB: adding IKEv2 state #743 in UNDEFINED | pstats #743 ikev2.ike started | Message ID: init #743: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #743: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #743; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #743 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-233" #743: initiating v2 parent SA to replace #485 | using existing local IKE proposals for connection road-eastnet-nonat-233 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 743 for state #743 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a647d0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #743 | libevent_malloc: new ptr-libevent@0x7fb368023a60 size 128 | #743 spent 0.0371 milliseconds in ikev2_parent_outI1() | RESET processing: state #743 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c86510 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #485 | libevent_malloc: new ptr-libevent@0x557d46c86550 size 128 | libevent_free: release ptr-libevent@0x7fb38003dab0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb340005860 | #485 spent 0.0572 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0a940 | handling event EVENT_SA_REPLACE for parent state #461 | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #461 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #744 at 0x557d46c865e0 | State DB: adding IKEv2 state #744 in UNDEFINED | pstats #744 ikev2.ike started | Message ID: init #744: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #744: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #744; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #744 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-209" #744: initiating v2 parent SA to replace #461 | using existing local IKE proposals for connection road-eastnet-nonat-209 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 744 for state #744 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb340005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #744 | libevent_malloc: new ptr-libevent@0x7fb38003dab0 size 128 | #744 spent 0.0357 milliseconds in ikev2_parent_outI1() | RESET processing: state #744 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c87c70 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #461 | libevent_malloc: new ptr-libevent@0x557d46c87cb0 size 128 | libevent_free: release ptr-libevent@0x7fb3700180b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46b0a940 | #461 spent 0.0585 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c00cfd0 | handling event EVENT_SA_REPLACE for parent state #478 | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #478 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #745 at 0x557d46c87d40 | State DB: adding IKEv2 state #745 in UNDEFINED | pstats #745 ikev2.ike started | Message ID: init #745: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #745: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #745; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #745 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-226" #745: initiating v2 parent SA to replace #478 | using existing local IKE proposals for connection road-eastnet-nonat-226 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 745 for state #745 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0a940 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #745 | libevent_malloc: new ptr-libevent@0x7fb3700180b0 size 128 | #745 spent 0.0504 milliseconds in ikev2_parent_outI1() | RESET processing: state #745 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c893d0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #478 | libevent_malloc: new ptr-libevent@0x557d46c89410 size 128 | libevent_free: release ptr-libevent@0x7fb36c0296b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb36c00cfd0 | #478 spent 0.0702 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7cf10 | handling event EVENT_SA_REPLACE for parent state #493 | start processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #493 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #746 at 0x557d46c894a0 | State DB: adding IKEv2 state #746 in UNDEFINED | pstats #746 ikev2.ike started | Message ID: init #746: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #746: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #746; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #746 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-241" #746: initiating v2 parent SA to replace #493 | using existing local IKE proposals for connection road-eastnet-nonat-241 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 746 for state #746 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c00cfd0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #746 | libevent_malloc: new ptr-libevent@0x7fb36c0296b0 size 128 | #746 spent 0.0368 milliseconds in ikev2_parent_outI1() | RESET processing: state #746 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c8ab30 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #493 | libevent_malloc: new ptr-libevent@0x557d46c8ab70 size 128 | libevent_free: release ptr-libevent@0x7fb34401d920 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a7cf10 | #493 spent 0.0569 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a61bd0 | handling event EVENT_SA_REPLACE for parent state #500 | start processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #500 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #747 at 0x557d46c8ac00 | State DB: adding IKEv2 state #747 in UNDEFINED | pstats #747 ikev2.ike started | Message ID: init #747: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #747: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #747; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #747 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-248" #747: initiating v2 parent SA to replace #500 | using existing local IKE proposals for connection road-eastnet-nonat-248 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 747 for state #747 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7cf10 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #747 | libevent_malloc: new ptr-libevent@0x7fb34401d920 size 128 | #747 spent 0.0363 milliseconds in ikev2_parent_outI1() | RESET processing: state #747 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c8c290 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #500 | libevent_malloc: new ptr-libevent@0x557d46c8c2d0 size 128 | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a61bd0 | #500 spent 0.0562 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3500300a0 | handling event EVENT_SA_REPLACE for parent state #465 | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #465 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #748 at 0x557d46c8c360 | State DB: adding IKEv2 state #748 in UNDEFINED | pstats #748 ikev2.ike started | Message ID: init #748: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #748: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #748; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #748 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-213" #748: initiating v2 parent SA to replace #465 | using existing local IKE proposals for connection road-eastnet-nonat-213 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 748 for state #748 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a61bd0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #748 | libevent_malloc: new ptr-libevent@0x7fb3380180b0 size 128 | #748 spent 0.0359 milliseconds in ikev2_parent_outI1() | RESET processing: state #748 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c8d9f0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #465 | libevent_malloc: new ptr-libevent@0x557d46c8da30 size 128 | libevent_free: release ptr-libevent@0x7fb35003a770 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb3500300a0 | #465 spent 0.0554 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_SA_REPLACE for parent state #428 | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #428 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #749 at 0x557d46c8dac0 | State DB: adding IKEv2 state #749 in UNDEFINED | pstats #749 ikev2.ike started | Message ID: init #749: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #749: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #749; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #749 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-176" #749: initiating v2 parent SA to replace #428 | using existing local IKE proposals for connection road-eastnet-nonat-176 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 749 for state #749 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb3500300a0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #749 | libevent_malloc: new ptr-libevent@0x7fb35003a770 size 128 | #749 spent 0.0374 milliseconds in ikev2_parent_outI1() | RESET processing: state #749 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c8f150 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #428 | libevent_malloc: new ptr-libevent@0x557d46c8f190 size 128 | libevent_free: release ptr-libevent@0x7fb36804b850 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a6b490 | #428 spent 0.0571 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3800319a0 | handling event EVENT_SA_REPLACE for parent state #503 | start processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #503 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #750 at 0x557d46c8f220 | State DB: adding IKEv2 state #750 in UNDEFINED | pstats #750 ikev2.ike started | Message ID: init #750: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #750: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #750; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #750 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-251" #750: initiating v2 parent SA to replace #503 | using existing local IKE proposals for connection road-eastnet-nonat-251 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 750 for state #750 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a6b490 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #750 | libevent_malloc: new ptr-libevent@0x7fb36804b850 size 128 | #750 spent 0.0571 milliseconds in ikev2_parent_outI1() | RESET processing: state #750 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46c908b0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #503 | libevent_malloc: new ptr-libevent@0x557d46c908f0 size 128 | libevent_realloc: release ptr-libevent@0x557d46b2c9f0 | libevent_realloc: new ptr-libevent@0x557d46c90980 size 8192 | libevent_free: release ptr-libevent@0x7fb380047480 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb3800319a0 | #503 spent 0.0832 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a52c90 | handling event EVENT_SA_REPLACE for parent state #496 | start processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #496 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #751 at 0x557d46b2c9f0 | State DB: adding IKEv2 state #751 in UNDEFINED | pstats #751 ikev2.ike started | Message ID: init #751: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #751: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #751; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #751 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-244" #751: initiating v2 parent SA to replace #496 | using existing local IKE proposals for connection road-eastnet-nonat-244 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 751 for state #751 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb3800319a0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #751 | libevent_malloc: new ptr-libevent@0x7fb380047480 size 128 | #751 spent 0.0378 milliseconds in ikev2_parent_outI1() | RESET processing: state #751 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b2d4d0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #496 | libevent_malloc: new ptr-libevent@0x557d46b2d510 size 128 | libevent_free: release ptr-libevent@0x7fb38803dab0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a52c90 | #496 spent 0.0586 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0bf00 | handling event EVENT_SA_REPLACE for parent state #483 | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #483 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #752 at 0x557d46c93540 | State DB: adding IKEv2 state #752 in UNDEFINED | pstats #752 ikev2.ike started | Message ID: init #752: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #752: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #752; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #752 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-231" #752: initiating v2 parent SA to replace #483 | using existing local IKE proposals for connection road-eastnet-nonat-231 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 752 for state #752 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46a52c90 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #752 | libevent_malloc: new ptr-libevent@0x7fb38803dab0 size 128 | #752 spent 0.0376 milliseconds in ikev2_parent_outI1() | RESET processing: state #752 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b2d5c0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #483 | libevent_malloc: new ptr-libevent@0x557d46b2d600 size 128 | libevent_free: release ptr-libevent@0x7fb3680300e0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46b0bf00 | #483 spent 0.0578 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350017ea0 | handling event EVENT_SA_REPLACE for parent state #491 | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #491 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #753 at 0x557d46c94bb0 | State DB: adding IKEv2 state #753 in UNDEFINED | pstats #753 ikev2.ike started | Message ID: init #753: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #753: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #753; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #753 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-239" #753: initiating v2 parent SA to replace #491 | using existing local IKE proposals for connection road-eastnet-nonat-239 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 753 for state #753 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0bf00 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #753 | libevent_malloc: new ptr-libevent@0x7fb3680300e0 size 128 | #753 spent 0.0423 milliseconds in ikev2_parent_outI1() | RESET processing: state #753 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b2d6b0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #491 | libevent_malloc: new ptr-libevent@0x557d46b2d6f0 size 128 | libevent_free: release ptr-libevent@0x7fb350023d80 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb350017ea0 | #491 spent 0.0628 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_SA_REPLACE for parent state #502 | start processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #502 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #754 at 0x557d46c96220 | State DB: adding IKEv2 state #754 in UNDEFINED | pstats #754 ikev2.ike started | Message ID: init #754: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #754: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #754; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #754 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-250" #754: initiating v2 parent SA to replace #502 | using existing local IKE proposals for connection road-eastnet-nonat-250 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 754 for state #754 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb350017ea0 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #754 | libevent_malloc: new ptr-libevent@0x7fb350023d80 size 128 | #754 spent 0.0361 milliseconds in ikev2_parent_outI1() | RESET processing: state #754 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b2d7a0 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #502 | libevent_malloc: new ptr-libevent@0x557d46b2d7e0 size 128 | libevent_free: release ptr-libevent@0x7fb34803f490 | free_event_entry: release EVENT_SA_REPLACE-pe@0x7fb348005860 | #502 spent 0.0582 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46adc640 | handling event EVENT_SA_REPLACE for parent state #489 | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #489 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #755 at 0x557d46c97890 | State DB: adding IKEv2 state #755 in UNDEFINED | pstats #755 ikev2.ike started | Message ID: init #755: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #755: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #755; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #755 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-237" #755: initiating v2 parent SA to replace #489 | using existing local IKE proposals for connection road-eastnet-nonat-237 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 755 for state #755 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x7fb348005860 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #755 | libevent_malloc: new ptr-libevent@0x7fb34803f490 size 128 | #755 spent 0.0359 milliseconds in ikev2_parent_outI1() | RESET processing: state #755 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b2d890 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #489 | libevent_malloc: new ptr-libevent@0x557d46b2d8d0 size 128 | libevent_free: release ptr-libevent@0x7fb3580407f0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46adc640 | #489 spent 0.0562 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a50110 | handling event EVENT_SA_REPLACE for parent state #501 | start processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #501 | replacing stale IKE SA | dup_any(fd@-1) -> fd@-1 (in ipsecdoi_replace() at ipsec_doi.c:310) | creating state object #756 at 0x557d46c98f00 | State DB: adding IKEv2 state #756 in UNDEFINED | pstats #756 ikev2.ike started | Message ID: init #756: msgid=0 lastack=4294967295 nextuse=0 lastrecv=4294967295 lastreplied=0 | parent state #756: UNDEFINED(ignore) => PARENT_I0(ignore) | Message ID: init_ike #756; ike: initiator.sent=0->-1 initiator.recv=0->-1 responder.sent=0->-1 responder.recv=0->-1 wip.initiator=0->-1 wip.responder=0->-1 | suspend processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) | start processing: state #756 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:535) "road-eastnet-nonat-249" #756: initiating v2 parent SA to replace #501 | using existing local IKE proposals for connection road-eastnet-nonat-249 (IKE SA initiator selecting KE): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | adding ikev2_outI1 KE work-order 756 for state #756 | event_schedule: new EVENT_CRYPTO_TIMEOUT-pe@0x557d46adc640 | inserting event EVENT_CRYPTO_TIMEOUT, timeout in 60 seconds for #756 | libevent_malloc: new ptr-libevent@0x7fb3580407f0 size 128 | #756 spent 0.0375 milliseconds in ikev2_parent_outI1() | RESET processing: state #756 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in ikev2_parent_outI1() at ikev2_parent.c:610) | event_schedule: new EVENT_SA_EXPIRE-pe@0x557d46b2d980 | inserting event EVENT_SA_EXPIRE, timeout in 0 seconds for #501 | libevent_malloc: new ptr-libevent@0x557d46c9a570 size 128 | libevent_free: release ptr-libevent@0x7fb37404b5c0 | free_event_entry: release EVENT_SA_REPLACE-pe@0x557d46a50110 | #501 spent 0.0577 milliseconds in timer_event_cb() EVENT_SA_REPLACE | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing global timer EVENT_SHUNT_SCAN | expiring aged bare shunts from shunt table | spent 0.00206 milliseconds in global timer EVENT_SHUNT_SCAN | timer_event_cb: processing event@0x7fb37800d120 | handling event EVENT_SA_EXPIRE for parent state #504 | start processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #504 | un-established partial CHILD SA timeout (SA expired) | pstats #504 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #504 ikev2.ike deleted exchange-timeout | #504 spent 1.97 milliseconds in total | [RE]START processing: state #504 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-252" #504: deleting state (STATE_PARENT_I1) aged 34.107s and NOT sending notification | parent state #504: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #504 "road-eastnet-nonat-252" #504: deleting IKE SA for connection 'road-eastnet-nonat-252' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-252' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-252 | State DB: deleting IKEv2 state #504 in PARENT_I1 | parent state #504: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 532 time elapsed 0.007028 seconds | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 527 time elapsed 0.013749 seconds | (#532) spent 0.822 milliseconds in crypto helper computing work-order 532: ikev2_outI1 KE (pcr) | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 520 time elapsed 0.019254 seconds | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 519 time elapsed 0.019349 seconds | crypto helper 16 sending results from work-order 532 for state #532 to event queue | (#527) spent 0.849 milliseconds in crypto helper computing work-order 527: ikev2_outI1 KE (pcr) | (#520) spent 1 milliseconds in crypto helper computing work-order 520: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 520 for state #520 to event queue | scheduling resume sending helper answer for #520 | crypto helper 13 sending results from work-order 527 for state #527 to event queue | scheduling resume sending helper answer for #527 | scheduling resume sending helper answer for #532 | libevent_malloc: new ptr-libevent@0x7fb33804e7a0 size 128 | (#519) spent 0.672 milliseconds in crypto helper computing work-order 519: ikev2_outI1 KE (pcr) | libevent_malloc: new ptr-libevent@0x7fb35c056950 size 128 | libevent_malloc: new ptr-libevent@0x7fb364054370 size 128 | crypto helper 13 starting work-order 543 for state #543 | crypto helper 5 sending results from work-order 519 for state #519 to event queue | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 543 | crypto helper 16 starting work-order 544 for state #544 | scheduling resume sending helper answer for #519 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 544 | libevent_malloc: new ptr-libevent@0x7fb34404e800 size 128 | crypto helper 5 starting work-order 545 for state #545 | crypto helper 3 starting work-order 542 for state #542 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 545 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 542 | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 525 time elapsed 0.014346 seconds | (#525) spent 0.933 milliseconds in crypto helper computing work-order 525: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 525 for state #525 to event queue | scheduling resume sending helper answer for #525 | libevent_malloc: new ptr-libevent@0x7fb370054000 size 128 | crypto helper 14 starting work-order 546 for state #546 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 546 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 537 time elapsed 0.007349 seconds | (#537) spent 1.02 milliseconds in crypto helper computing work-order 537: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 537 for state #537 to event queue | scheduling resume sending helper answer for #537 | libevent_malloc: new ptr-libevent@0x7fb350051bb0 size 128 | crypto helper 17 starting work-order 547 for state #547 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 547 | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 539 time elapsed 0.008407 seconds | (#539) spent 1.02 milliseconds in crypto helper computing work-order 539: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 539 for state #539 to event queue | scheduling resume sending helper answer for #539 | libevent_malloc: new ptr-libevent@0x7fb374054140 size 128 | crypto helper 15 starting work-order 548 for state #548 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 523 time elapsed 0.023751 seconds | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 548 | (#523) spent 0.667 milliseconds in crypto helper computing work-order 523: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 523 for state #523 to event queue | scheduling resume sending helper answer for #523 | libevent_malloc: new ptr-libevent@0x7fb38404e8e0 size 128 | crypto helper 0 starting work-order 549 for state #549 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 549 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 541 time elapsed 0.009023 seconds | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 526 time elapsed 0.020647 seconds | (#541) spent 1.01 milliseconds in crypto helper computing work-order 541: ikev2_outI1 KE (pcr) | (#526) spent 0.599 milliseconds in crypto helper computing work-order 526: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 541 for state #541 to event queue | scheduling resume sending helper answer for #541 | libevent_malloc: new ptr-libevent@0x7fb388059ea0 size 128 | crypto helper 10 sending results from work-order 526 for state #526 to event queue | crypto helper 1 starting work-order 550 for state #550 | scheduling resume sending helper answer for #526 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 550 | libevent_malloc: new ptr-libevent@0x7fb37c051490 size 128 | crypto helper 10 starting work-order 551 for state #551 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 551 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 543 time elapsed 0.007737 seconds | (#543) spent 1.01 milliseconds in crypto helper computing work-order 543: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 543 for state #543 to event queue | scheduling resume sending helper answer for #543 | libevent_malloc: new ptr-libevent@0x7fb35c05c110 size 128 | crypto helper 13 starting work-order 552 for state #552 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 552 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 535 time elapsed 0.014857 seconds | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 533 time elapsed 0.014901 seconds | (#535) spent 0.683 milliseconds in crypto helper computing work-order 535: ikev2_outI1 KE (pcr) | (#533) spent 0.858 milliseconds in crypto helper computing work-order 533: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 533 for state #533 to event queue | scheduling resume sending helper answer for #533 | libevent_malloc: new ptr-libevent@0x7fb354054010 size 128 | crypto helper 7 sending results from work-order 535 for state #535 to event queue | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 536 time elapsed 0.014862 seconds | crypto helper 18 starting work-order 553 for state #553 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 553 | scheduling resume sending helper answer for #535 | (#536) spent 0.6 milliseconds in crypto helper computing work-order 536: ikev2_outI1 KE (pcr) | libevent_malloc: new ptr-libevent@0x7fb348053b10 size 128 | crypto helper 12 sending results from work-order 536 for state #536 to event queue | crypto helper 7 starting work-order 554 for state #554 | scheduling resume sending helper answer for #536 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 554 | libevent_malloc: new ptr-libevent@0x7fb340053a30 size 128 | crypto helper 12 starting work-order 555 for state #555 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 555 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 547 time elapsed 0.00845 seconds | (#547) spent 1.01 milliseconds in crypto helper computing work-order 547: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 547 for state #547 to event queue | scheduling resume sending helper answer for #547 | libevent_malloc: new ptr-libevent@0x7fb3500594c0 size 128 | crypto helper 17 starting work-order 556 for state #556 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 556 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 538 time elapsed 0.015402 seconds | (#538) spent 0.648 milliseconds in crypto helper computing work-order 538: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 538 for state #538 to event queue | scheduling resume sending helper answer for #538 | libevent_malloc: new ptr-libevent@0x7fb3800540c0 size 128 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 512 time elapsed 0.031708 seconds | crypto helper 2 starting work-order 557 for state #557 | (#512) spent 0.736 milliseconds in crypto helper computing work-order 512: ikev2_outI1 KE (pcr) | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 557 | crypto helper 4 sending results from work-order 512 for state #512 to event queue | scheduling resume sending helper answer for #512 | libevent_malloc: new ptr-libevent@0x7fb358034680 size 128 | crypto helper 4 starting work-order 558 for state #558 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 558 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 549 time elapsed 0.008443 seconds | (#549) spent 0.995 milliseconds in crypto helper computing work-order 549: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 549 for state #549 to event queue | scheduling resume sending helper answer for #549 | libevent_malloc: new ptr-libevent@0x7fb384054040 size 128 | crypto helper 0 starting work-order 559 for state #559 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 559 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 540 time elapsed 0.016012 seconds | stop processing: state #504 from 192.1.2.23:500 (in delete_state() at state.c:1143) | (#540) spent 0.625 milliseconds in crypto helper computing work-order 540: ikev2_outI1 KE (pcr) | libevent_free: release ptr-libevent@0x7fb3380251c0 | crypto helper 6 sending results from work-order 540 for state #540 to event queue | free_event_entry: release EVENT_SA_EXPIRE-pe@0x7fb37800d120 | scheduling resume sending helper answer for #540 | in statetime_stop() and could not find #504 | libevent_malloc: new ptr-libevent@0x7fb36c0542e0 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 6 starting work-order 560 for state #560 | timer_event_cb: processing event@0x7fb38800a3e0 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 560 | handling event EVENT_SA_EXPIRE for parent state #494 | start processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #494 | un-established partial CHILD SA timeout (SA expired) | pstats #494 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #494 ikev2.ike deleted exchange-timeout | #494 spent 2.41 milliseconds in total | [RE]START processing: state #494 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-242" #494: deleting state (STATE_PARENT_I1) aged 35.377s and NOT sending notification | parent state #494: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #494 "road-eastnet-nonat-242" #494: deleting IKE SA for connection 'road-eastnet-nonat-242' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-242' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-242 | State DB: deleting IKEv2 state #494 in PARENT_I1 | parent state #494: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 531 time elapsed 0.021821 seconds | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 551 time elapsed 0.008376 seconds | (#531) spent 0.619 milliseconds in crypto helper computing work-order 531: ikev2_outI1 KE (pcr) | (#551) spent 0.578 milliseconds in crypto helper computing work-order 551: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 551 for state #551 to event queue | scheduling resume sending helper answer for #551 | libevent_malloc: new ptr-libevent@0x7fb37c056bd0 size 128 | crypto helper 11 sending results from work-order 531 for state #531 to event queue | scheduling resume sending helper answer for #531 | libevent_malloc: new ptr-libevent@0x7fb360053fb0 size 128 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 529 time elapsed 0.021912 seconds | crypto helper 10 starting work-order 561 for state #561 | (#529) spent 0.661 milliseconds in crypto helper computing work-order 529: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 529 for state #529 to event queue | crypto helper 11 starting work-order 562 for state #562 | scheduling resume sending helper answer for #529 | libevent_malloc: new ptr-libevent@0x7fb368052a70 size 128 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 562 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 561 | crypto helper 19 starting work-order 563 for state #563 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 563 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 552 time elapsed 0.008815 seconds | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 542 time elapsed 0.01655 seconds | (#552) spent 0.975 milliseconds in crypto helper computing work-order 552: ikev2_outI1 KE (pcr) | (#542) spent 1.14 milliseconds in crypto helper computing work-order 542: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 542 for state #542 to event queue | crypto helper 13 sending results from work-order 552 for state #552 to event queue | scheduling resume sending helper answer for #552 | libevent_malloc: new ptr-libevent@0x7fb35c061940 size 128 | scheduling resume sending helper answer for #542 | crypto helper 13 starting work-order 564 for state #564 | libevent_malloc: new ptr-libevent@0x7fb338053ff0 size 128 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 564 | crypto helper 3 starting work-order 565 for state #565 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 565 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 556 time elapsed 0.007412 seconds | (#556) spent 1 milliseconds in crypto helper computing work-order 556: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 556 for state #556 to event queue | scheduling resume sending helper answer for #556 | libevent_malloc: new ptr-libevent@0x7fb35005ec80 size 128 | crypto helper 17 starting work-order 566 for state #566 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 566 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 557 time elapsed 0.007912 seconds | (#557) spent 0.6 milliseconds in crypto helper computing work-order 557: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 557 for state #557 to event queue | scheduling resume sending helper answer for #557 | libevent_malloc: new ptr-libevent@0x7fb3800598f0 size 128 | crypto helper 2 starting work-order 567 for state #567 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 567 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 558 time elapsed 0.008446 seconds | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 530 time elapsed 0.027332 seconds | (#558) spent 0.585 milliseconds in crypto helper computing work-order 558: ikev2_outI1 KE (pcr) | (#530) spent 1.07 milliseconds in crypto helper computing work-order 530: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 558 for state #558 to event queue | scheduling resume sending helper answer for #558 | crypto helper 9 sending results from work-order 530 for state #530 to event queue | libevent_malloc: new ptr-libevent@0x7fb358044d90 size 128 | scheduling resume sending helper answer for #530 | crypto helper 4 starting work-order 568 for state #568 | libevent_malloc: new ptr-libevent@0x7fb37803b0b0 size 128 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 568 | crypto helper 9 starting work-order 569 for state #569 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 569 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 550 time elapsed 0.014417 seconds | (#550) spent 0.616 milliseconds in crypto helper computing work-order 550: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 550 for state #550 to event queue | scheduling resume sending helper answer for #550 | libevent_malloc: new ptr-libevent@0x7fb38805f660 size 128 | crypto helper 1 starting work-order 570 for state #570 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 570 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 570 time elapsed 0.000543 seconds | stop processing: state #494 from 192.1.2.23:500 (in delete_state() at state.c:1143) | (#570) spent 0.548 milliseconds in crypto helper computing work-order 570: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 570 for state #570 to event queue | libevent_free: release ptr-libevent@0x7fb348009640 | scheduling resume sending helper answer for #570 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x7fb38800a3e0 | in statetime_stop() and could not find #494 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb388064e90 size 128 | timer_event_cb: processing event@0x557d46906b40 | crypto helper 1 starting work-order 571 for state #571 | handling event EVENT_SA_EXPIRE for parent state #488 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 571 | start processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #488 | un-established partial CHILD SA timeout (SA expired) | pstats #488 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #488 ikev2.ike deleted exchange-timeout | #488 spent 2.2 milliseconds in total | [RE]START processing: state #488 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-236" #488: deleting state (STATE_PARENT_I1) aged 36.007s and NOT sending notification | parent state #488: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #488 "road-eastnet-nonat-236" #488: deleting IKE SA for connection 'road-eastnet-nonat-236' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-236' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-236 | State DB: deleting IKEv2 state #488 in PARENT_I1 | parent state #488: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 563 time elapsed 0.00796 seconds | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 545 time elapsed 0.022708 seconds | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 544 time elapsed 0.022733 seconds | (#545) spent 0.691 milliseconds in crypto helper computing work-order 545: ikev2_outI1 KE (pcr) | (#563) spent 0.565 milliseconds in crypto helper computing work-order 563: ikev2_outI1 KE (pcr) | (#544) spent 1.04 milliseconds in crypto helper computing work-order 544: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 563 for state #563 to event queue | crypto helper 16 sending results from work-order 544 for state #544 to event queue | scheduling resume sending helper answer for #563 | scheduling resume sending helper answer for #544 | crypto helper 5 sending results from work-order 545 for state #545 to event queue | scheduling resume sending helper answer for #545 | libevent_malloc: new ptr-libevent@0x7fb344053f60 size 128 | crypto helper 5 starting work-order 572 for state #572 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 572 | libevent_malloc: new ptr-libevent@0x7fb3680581d0 size 128 | crypto helper 19 starting work-order 573 for state #573 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 573 | libevent_malloc: new ptr-libevent@0x7fb364059ad0 size 128 | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 534 time elapsed 0.027122 seconds | (#534) spent 0.98 milliseconds in crypto helper computing work-order 534: ikev2_outI1 KE (pcr) | crypto helper 16 starting work-order 574 for state #574 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 574 | crypto helper 8 sending results from work-order 534 for state #534 to event queue | scheduling resume sending helper answer for #534 | libevent_malloc: new ptr-libevent@0x7fb34c053e10 size 128 | crypto helper 8 starting work-order 575 for state #575 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 575 | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 565 time elapsed 0.007075 seconds | (#565) spent 0.974 milliseconds in crypto helper computing work-order 565: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 565 for state #565 to event queue | scheduling resume sending helper answer for #565 | libevent_malloc: new ptr-libevent@0x7fb3380597d0 size 128 | crypto helper 3 starting work-order 576 for state #576 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 576 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 553 time elapsed 0.013105 seconds | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 554 time elapsed 0.013092 seconds | (#553) spent 0.634 milliseconds in crypto helper computing work-order 553: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 553 for state #553 to event queue | (#554) spent 0.988 milliseconds in crypto helper computing work-order 554: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 554 for state #554 to event queue | scheduling resume sending helper answer for #553 | scheduling resume sending helper answer for #554 | libevent_malloc: new ptr-libevent@0x7fb348059270 size 128 | libevent_malloc: new ptr-libevent@0x7fb3540597d0 size 128 | crypto helper 7 starting work-order 577 for state #577 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 577 | crypto helper 18 starting work-order 578 for state #578 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 578 | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 576 time elapsed 0.000948 seconds | (#576) spent 0.952 milliseconds in crypto helper computing work-order 576: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 576 for state #576 to event queue | scheduling resume sending helper answer for #576 | libevent_malloc: new ptr-libevent@0x7fb33805efb0 size 128 | crypto helper 3 starting work-order 579 for state #579 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 579 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 567 time elapsed 0.005652 seconds | (#567) spent 0.583 milliseconds in crypto helper computing work-order 567: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 567 for state #567 to event queue | scheduling resume sending helper answer for #567 | libevent_malloc: new ptr-libevent@0x7fb38005f0d0 size 128 | crypto helper 2 starting work-order 580 for state #580 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 580 | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 548 time elapsed 0.020603 seconds | (#548) spent 0.646 milliseconds in crypto helper computing work-order 548: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 548 for state #548 to event queue | scheduling resume sending helper answer for #548 | libevent_malloc: new ptr-libevent@0x7fb374059970 size 128 | crypto helper 15 starting work-order 581 for state #581 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 581 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 569 time elapsed 0.006555 seconds | (#569) spent 0.968 milliseconds in crypto helper computing work-order 569: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 569 for state #569 to event queue | scheduling resume sending helper answer for #569 | libevent_malloc: new ptr-libevent@0x7fb37804a120 size 128 | crypto helper 9 starting work-order 582 for state #582 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 582 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 560 time elapsed 0.014064 seconds | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 559 time elapsed 0.014119 seconds | (#560) spent 0.647 milliseconds in crypto helper computing work-order 560: ikev2_outI1 KE (pcr) | (#559) spent 0.994 milliseconds in crypto helper computing work-order 559: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 559 for state #559 to event queue | crypto helper 6 sending results from work-order 560 for state #560 to event queue | scheduling resume sending helper answer for #560 | scheduling resume sending helper answer for #559 | libevent_malloc: new ptr-libevent@0x7fb3840581d0 size 128 | libevent_malloc: new ptr-libevent@0x7fb36c059a40 size 128 | crypto helper 6 starting work-order 584 for state #584 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 584 | crypto helper 0 starting work-order 583 for state #583 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 583 | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 562 time elapsed 0.013093 seconds | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 561 time elapsed 0.01311 seconds | (#562) spent 0.626 milliseconds in crypto helper computing work-order 562: ikev2_outI1 KE (pcr) | stop processing: state #488 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 11 sending results from work-order 562 for state #562 to event queue | libevent_free: release ptr-libevent@0x7fb33802a950 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46906b40 | (#561) spent 0.992 milliseconds in crypto helper computing work-order 561: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 561 for state #561 to event queue | scheduling resume sending helper answer for #561 | libevent_malloc: new ptr-libevent@0x7fb37c0596c0 size 128 | in statetime_stop() and could not find #488 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #562 | timer_event_cb: processing event@0x557d46a6f550 | handling event EVENT_SA_EXPIRE for parent state #304 | crypto helper 10 starting work-order 585 for state #585 | start processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | libevent_malloc: new ptr-libevent@0x7fb360059710 size 128 | picked newest_isakmp_sa #0 for #304 | crypto helper 11 starting work-order 586 for state #586 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 585 | un-established partial CHILD SA timeout (SA expired) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 586 | pstats #304 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #304 ikev2.ike deleted exchange-timeout | #304 spent 2.12 milliseconds in total | [RE]START processing: state #304 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-52" #304: deleting state (STATE_PARENT_I1) aged 51.041s and NOT sending notification | parent state #304: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #304 "road-eastnet-nonat-52" #304: deleting IKE SA for connection 'road-eastnet-nonat-52' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-52' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-52 | State DB: deleting IKEv2 state #304 in PARENT_I1 | parent state #304: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 546 time elapsed 0.028089 seconds | (#546) spent 0.591 milliseconds in crypto helper computing work-order 546: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 546 for state #546 to event queue | scheduling resume sending helper answer for #546 | libevent_malloc: new ptr-libevent@0x7fb3700597c0 size 128 | crypto helper 14 starting work-order 587 for state #587 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 587 | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 572 time elapsed 0.007092 seconds | (#572) spent 0.981 milliseconds in crypto helper computing work-order 572: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 572 for state #572 to event queue | scheduling resume sending helper answer for #572 | libevent_malloc: new ptr-libevent@0x7fb3440596f0 size 128 | crypto helper 5 starting work-order 588 for state #588 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 588 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 574 time elapsed 0.007668 seconds | (#574) spent 0.65 milliseconds in crypto helper computing work-order 574: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 574 for state #574 to event queue | scheduling resume sending helper answer for #574 | libevent_malloc: new ptr-libevent@0x7fb36405f230 size 128 | crypto helper 16 starting work-order 589 for state #589 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 589 | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 581 time elapsed 0.009644 seconds | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 580 time elapsed 0.009681 seconds | (#581) spent 0.568 milliseconds in crypto helper computing work-order 581: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 581 for state #581 to event queue | (#580) spent 0.558 milliseconds in crypto helper computing work-order 580: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 580 for state #580 to event queue | scheduling resume sending helper answer for #580 | scheduling resume sending helper answer for #581 | libevent_malloc: new ptr-libevent@0x7fb3800648b0 size 128 | libevent_malloc: new ptr-libevent@0x7fb37405f150 size 128 | crypto helper 2 starting work-order 590 for state #590 | crypto helper 15 starting work-order 591 for state #591 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 590 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 591 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 583 time elapsed 0.009098 seconds | (#583) spent 0.968 milliseconds in crypto helper computing work-order 583: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 583 for state #583 to event queue | scheduling resume sending helper answer for #583 | libevent_malloc: new ptr-libevent@0x7fb38405d9b0 size 128 | crypto helper 0 starting work-order 592 for state #592 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 592 | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 585 time elapsed 0.010018 seconds | (#585) spent 0.972 milliseconds in crypto helper computing work-order 585: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 585 for state #585 to event queue | scheduling resume sending helper answer for #585 | libevent_malloc: new ptr-libevent@0x7fb37c05eea0 size 128 | crypto helper 10 starting work-order 593 for state #593 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 593 | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 586 time elapsed 0.010612 seconds | (#586) spent 0.62 milliseconds in crypto helper computing work-order 586: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 586 for state #586 to event queue | scheduling resume sending helper answer for #586 | libevent_malloc: new ptr-libevent@0x7fb36005ee70 size 128 | crypto helper 11 starting work-order 594 for state #594 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 594 | stop processing: state #304 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46af7900 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a6f550 | in statetime_stop() and could not find #304 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7e4d0 | handling event EVENT_SA_EXPIRE for parent state #264 | start processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #264 | un-established partial CHILD SA timeout (SA expired) | pstats #264 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #264 ikev2.ike deleted exchange-timeout | #264 spent 2.26 milliseconds in total | [RE]START processing: state #264 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-12" #264: deleting state (STATE_PARENT_I1) aged 54.383s and NOT sending notification | parent state #264: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #264 "road-eastnet-nonat-12" #264: deleting IKE SA for connection 'road-eastnet-nonat-12' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-12' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-12 | State DB: deleting IKEv2 state #264 in PARENT_I1 | parent state #264: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 587 time elapsed 0.010676 seconds | (#587) spent 0.553 milliseconds in crypto helper computing work-order 587: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 587 for state #587 to event queue | scheduling resume sending helper answer for #587 | libevent_malloc: new ptr-libevent@0x7fb37005eff0 size 128 | crypto helper 14 starting work-order 595 for state #595 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 595 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 577 time elapsed 0.017449 seconds | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 575 time elapsed 0.018406 seconds | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 578 time elapsed 0.017458 seconds | (#575) spent 0.66 milliseconds in crypto helper computing work-order 575: ikev2_outI1 KE (pcr) | (#577) spent 0.976 milliseconds in crypto helper computing work-order 577: ikev2_outI1 KE (pcr) | (#578) spent 0.996 milliseconds in crypto helper computing work-order 578: ikev2_outI1 KE (pcr) | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 568 time elapsed 0.021099 seconds | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 566 time elapsed 0.022197 seconds | crypto helper 8 sending results from work-order 575 for state #575 to event queue | (#568) spent 0.987 milliseconds in crypto helper computing work-order 568: ikev2_outI1 KE (pcr) | scheduling resume sending helper answer for #575 | (#566) spent 0.708 milliseconds in crypto helper computing work-order 566: ikev2_outI1 KE (pcr) | libevent_malloc: new ptr-libevent@0x7fb34c059570 size 128 | crypto helper 17 sending results from work-order 566 for state #566 to event queue | scheduling resume sending helper answer for #566 | crypto helper 7 sending results from work-order 577 for state #577 to event queue | scheduling resume sending helper answer for #577 | libevent_malloc: new ptr-libevent@0x7fb34805e9d0 size 128 | crypto helper 7 starting work-order 597 for state #597 | crypto helper 4 sending results from work-order 568 for state #568 to event queue | libevent_malloc: new ptr-libevent@0x7fb350044980 size 128 | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 579 time elapsed 0.016549 seconds | crypto helper 18 sending results from work-order 578 for state #578 to event queue | scheduling resume sending helper answer for #578 | libevent_malloc: new ptr-libevent@0x7fb35405ef90 size 128 | scheduling resume sending helper answer for #568 | libevent_malloc: new ptr-libevent@0x7fb358059b60 size 128 | crypto helper 4 starting work-order 600 for state #600 | (#579) spent 0.936 milliseconds in crypto helper computing work-order 579: ikev2_outI1 KE (pcr) | crypto helper 8 starting work-order 596 for state #596 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 597 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 596 | crypto helper 18 starting work-order 599 for state #599 | crypto helper 17 starting work-order 598 for state #598 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 600 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 598 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 599 | crypto helper 3 sending results from work-order 579 for state #579 to event queue | scheduling resume sending helper answer for #579 | libevent_malloc: new ptr-libevent@0x7fb338064790 size 128 | crypto helper 3 starting work-order 601 for state #601 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 601 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 590 time elapsed 0.006842 seconds | (#590) spent 0.588 milliseconds in crypto helper computing work-order 590: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 590 for state #590 to event queue | scheduling resume sending helper answer for #590 | libevent_malloc: new ptr-libevent@0x7fb38006a090 size 128 | crypto helper 2 starting work-order 602 for state #602 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 602 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 602 time elapsed 0.000558 seconds | (#602) spent 0.562 milliseconds in crypto helper computing work-order 602: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 602 for state #602 to event queue | scheduling resume sending helper answer for #602 | libevent_malloc: new ptr-libevent@0x7fb38006f870 size 128 | crypto helper 2 starting work-order 603 for state #603 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 603 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 584 time elapsed 0.015684 seconds | (#584) spent 0.654 milliseconds in crypto helper computing work-order 584: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 584 for state #584 to event queue | scheduling resume sending helper answer for #584 | libevent_malloc: new ptr-libevent@0x7fb36c05f200 size 128 | crypto helper 6 starting work-order 604 for state #604 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 604 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 592 time elapsed 0.007508 seconds | (#592) spent 0.981 milliseconds in crypto helper computing work-order 592: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 592 for state #592 to event queue | scheduling resume sending helper answer for #592 | libevent_malloc: new ptr-libevent@0x7fb384063190 size 128 | crypto helper 0 starting work-order 605 for state #605 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 605 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 571 time elapsed 0.022709 seconds | (#571) spent 0.644 milliseconds in crypto helper computing work-order 571: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 571 for state #571 to event queue | scheduling resume sending helper answer for #571 | libevent_malloc: new ptr-libevent@0x7fb38806a670 size 128 | crypto helper 1 starting work-order 606 for state #606 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 606 | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 593 time elapsed 0.006989 seconds | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 564 time elapsed 0.028306 seconds | (#593) spent 0.963 milliseconds in crypto helper computing work-order 593: ikev2_outI1 KE (pcr) | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 555 time elapsed 0.034282 seconds | (#555) spent 0.618 milliseconds in crypto helper computing work-order 555: ikev2_outI1 KE (pcr) | (#564) spent 0.623 milliseconds in crypto helper computing work-order 564: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 593 for state #593 to event queue | crypto helper 12 sending results from work-order 555 for state #555 to event queue | crypto helper 13 sending results from work-order 564 for state #564 to event queue | scheduling resume sending helper answer for #564 | libevent_malloc: new ptr-libevent@0x7fb35c0643e0 size 128 | scheduling resume sending helper answer for #593 | libevent_malloc: new ptr-libevent@0x7fb37c064680 size 128 | crypto helper 13 starting work-order 607 for state #607 | scheduling resume sending helper answer for #555 | crypto helper 10 starting work-order 608 for state #608 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 608 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 607 | libevent_malloc: new ptr-libevent@0x7fb340059190 size 128 | crypto helper 12 starting work-order 609 for state #609 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 609 | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 588 time elapsed 0.015688 seconds | (#588) spent 0.66 milliseconds in crypto helper computing work-order 588: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 588 for state #588 to event queue | scheduling resume sending helper answer for #588 | libevent_malloc: new ptr-libevent@0x7fb34405eeb0 size 128 | crypto helper 5 starting work-order 610 for state #610 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 610 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 597 time elapsed 0.005393 seconds | (#597) spent 0.572 milliseconds in crypto helper computing work-order 597: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 597 for state #597 to event queue | scheduling resume sending helper answer for #597 | libevent_malloc: new ptr-libevent@0x7fb348064130 size 128 | crypto helper 7 starting work-order 611 for state #611 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 611 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 600 time elapsed 0.006858 seconds | (#600) spent 0.988 milliseconds in crypto helper computing work-order 600: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 600 for state #600 to event queue | scheduling resume sending helper answer for #600 | libevent_malloc: new ptr-libevent@0x7fb35805f320 size 128 | crypto helper 4 starting work-order 612 for state #612 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 612 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 598 time elapsed 0.007388 seconds | (#598) spent 0.603 milliseconds in crypto helper computing work-order 598: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 598 for state #598 to event queue | scheduling resume sending helper answer for #598 | libevent_malloc: new ptr-libevent@0x7fb350065220 size 128 | crypto helper 17 starting work-order 613 for state #613 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 613 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 582 time elapsed 0.025006 seconds | (#582) spent 0.647 milliseconds in crypto helper computing work-order 582: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 582 for state #582 to event queue | scheduling resume sending helper answer for #582 | libevent_malloc: new ptr-libevent@0x7fb37805e790 size 128 | crypto helper 9 starting work-order 614 for state #614 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 614 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 603 time elapsed 0.009405 seconds | (#603) spent 0.789 milliseconds in crypto helper computing work-order 603: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 603 for state #603 to event queue | scheduling resume sending helper answer for #603 | libevent_malloc: new ptr-libevent@0x7fb380075050 size 128 | crypto helper 2 starting work-order 615 for state #615 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 615 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 604 time elapsed 0.015853 seconds | (#604) spent 1.06 milliseconds in crypto helper computing work-order 604: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 604 for state #604 to event queue | scheduling resume sending helper answer for #604 | libevent_malloc: new ptr-libevent@0x7fb36c064a30 size 128 | crypto helper 6 starting work-order 616 for state #616 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 616 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 607 time elapsed 0.01643 seconds | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 589 time elapsed 0.030945 seconds | (#607) spent 0.597 milliseconds in crypto helper computing work-order 607: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 607 for state #607 to event queue | (#589) spent 0.743 milliseconds in crypto helper computing work-order 589: ikev2_outI1 KE (pcr) | scheduling resume sending helper answer for #607 | crypto helper 16 sending results from work-order 589 for state #589 to event queue | scheduling resume sending helper answer for #589 | libevent_malloc: new ptr-libevent@0x7fb364064990 size 128 | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 594 time elapsed 0.022899 seconds | (#594) spent 0.601 milliseconds in crypto helper computing work-order 594: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 594 for state #594 to event queue | scheduling resume sending helper answer for #594 | libevent_malloc: new ptr-libevent@0x7fb3600618f0 size 128 | crypto helper 11 starting work-order 618 for state #618 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 618 | libevent_malloc: new ptr-libevent@0x7fb35c069bc0 size 128 | crypto helper 16 starting work-order 617 for state #617 | crypto helper 13 starting work-order 619 for state #619 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 617 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 619 | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 610 time elapsed 0.016881 seconds | (#610) spent 1.05 milliseconds in crypto helper computing work-order 610: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 610 for state #610 to event queue | scheduling resume sending helper answer for #610 | libevent_malloc: new ptr-libevent@0x7fb3440646e0 size 128 | crypto helper 5 starting work-order 620 for state #620 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 620 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 611 time elapsed 0.016716 seconds | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 596 time elapsed 0.022077 seconds | (#611) spent 0.998 milliseconds in crypto helper computing work-order 611: ikev2_outI1 KE (pcr) | crypto helper 7 sending results from work-order 611 for state #611 to event queue | (#596) spent 0.638 milliseconds in crypto helper computing work-order 596: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 596 for state #596 to event queue | scheduling resume sending helper answer for #596 | libevent_malloc: new ptr-libevent@0x7fb34c05ecd0 size 128 | scheduling resume sending helper answer for #611 | crypto helper 8 starting work-order 621 for state #621 | libevent_malloc: new ptr-libevent@0x7fb348069890 size 128 | crypto helper 7 starting work-order 622 for state #622 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 621 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 622 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 613 time elapsed 0.016243 seconds | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 599 time elapsed 0.023666 seconds | (#599) spent 0.792 milliseconds in crypto helper computing work-order 599: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 599 for state #599 to event queue | scheduling resume sending helper answer for #599 | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 601 time elapsed 0.023632 seconds | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 591 time elapsed 0.030082 seconds | (#601) spent 0.766 milliseconds in crypto helper computing work-order 601: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 601 for state #601 to event queue | libevent_malloc: new ptr-libevent@0x7fb3540647c0 size 128 | scheduling resume sending helper answer for #601 | libevent_malloc: new ptr-libevent@0x7fb338069f70 size 128 | (#591) spent 0.846 milliseconds in crypto helper computing work-order 591: ikev2_outI1 KE (pcr) | crypto helper 3 starting work-order 624 for state #624 | crypto helper 18 starting work-order 623 for state #623 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 624 | crypto helper 15 sending results from work-order 591 for state #591 to event queue | scheduling resume sending helper answer for #591 | libevent_malloc: new ptr-libevent@0x7fb374064930 size 128 | crypto helper 15 starting work-order 625 for state #625 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 625 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 623 | (#613) spent 1.04 milliseconds in crypto helper computing work-order 613: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 613 for state #613 to event queue | scheduling resume sending helper answer for #613 | libevent_malloc: new ptr-libevent@0x7fb35006cb20 size 128 | crypto helper 17 starting work-order 626 for state #626 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 626 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 616 time elapsed 0.008999 seconds | (#616) spent 1 milliseconds in crypto helper computing work-order 616: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 616 for state #616 to event queue | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 573 time elapsed 0.045171 seconds | (#573) spent 0.582 milliseconds in crypto helper computing work-order 573: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 573 for state #573 to event queue | scheduling resume sending helper answer for #573 | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 608 time elapsed 0.022952 seconds | stop processing: state #264 from 192.1.2.23:500 (in delete_state() at state.c:1143) | (#608) spent 0.976 milliseconds in crypto helper computing work-order 608: ikev2_outI1 KE (pcr) | libevent_free: release ptr-libevent@0x557d46b03c80 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a7e4d0 | in statetime_stop() and could not find #264 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469e7260 | handling event EVENT_SA_EXPIRE for parent state #303 | start processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #303 | un-established partial CHILD SA timeout (SA expired) | pstats #303 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #303 ikev2.ike deleted exchange-timeout | #303 spent 1.91 milliseconds in total | [RE]START processing: state #303 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-51" #303: deleting state (STATE_PARENT_I1) aged 51.145s and NOT sending notification | parent state #303: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #303 "road-eastnet-nonat-51" #303: deleting IKE SA for connection 'road-eastnet-nonat-51' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-51' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-51 | State DB: deleting IKEv2 state #303 in PARENT_I1 | parent state #303: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | libevent_malloc: new ptr-libevent@0x7fb368040760 size 128 | crypto helper 19 starting work-order 627 for state #627 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 627 | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 609 time elapsed 0.023875 seconds | (#609) spent 0.973 milliseconds in crypto helper computing work-order 609: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 609 for state #609 to event queue | scheduling resume sending helper answer for #609 | libevent_malloc: new ptr-libevent@0x7fb34005bbe0 size 128 | crypto helper 12 starting work-order 628 for state #628 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 628 | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 628 time elapsed 0.000972 seconds | (#628) spent 0.977 milliseconds in crypto helper computing work-order 628: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 628 for state #628 to event queue | scheduling resume sending helper answer for #628 | libevent_malloc: new ptr-libevent@0x7fb3400613a0 size 128 | crypto helper 12 starting work-order 629 for state #629 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 629 | crypto helper 10 sending results from work-order 608 for state #608 to event queue | scheduling resume sending helper answer for #608 | libevent_malloc: new ptr-libevent@0x7fb37c069e60 size 128 | crypto helper 10 starting work-order 630 for state #630 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 630 | scheduling resume sending helper answer for #616 | libevent_malloc: new ptr-libevent@0x7fb36c06a210 size 128 | crypto helper 6 starting work-order 631 for state #631 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 631 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 619 time elapsed 0.009482 seconds | (#619) spent 1.16 milliseconds in crypto helper computing work-order 619: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 619 for state #619 to event queue | scheduling resume sending helper answer for #619 | libevent_malloc: new ptr-libevent@0x7fb35c06f3a0 size 128 | crypto helper 13 starting work-order 632 for state #632 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 632 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 632 time elapsed 0.000532 seconds | (#632) spent 0.534 milliseconds in crypto helper computing work-order 632: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 632 for state #632 to event queue | scheduling resume sending helper answer for #632 | libevent_malloc: new ptr-libevent@0x7fb35c074b80 size 128 | crypto helper 13 starting work-order 633 for state #633 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 633 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 633 time elapsed 0.000523 seconds | (#633) spent 0.526 milliseconds in crypto helper computing work-order 633: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 633 for state #633 to event queue | scheduling resume sending helper answer for #633 | libevent_malloc: new ptr-libevent@0x7fb35c07a360 size 128 | crypto helper 13 starting work-order 634 for state #634 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 634 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 634 time elapsed 0.000709 seconds | (#634) spent 0.715 milliseconds in crypto helper computing work-order 634: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 634 for state #634 to event queue | scheduling resume sending helper answer for #634 | libevent_malloc: new ptr-libevent@0x7fb35c07fb40 size 128 | crypto helper 13 starting work-order 635 for state #635 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 635 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 635 time elapsed 0.000855 seconds | (#635) spent 0.855 milliseconds in crypto helper computing work-order 635: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 635 for state #635 to event queue | scheduling resume sending helper answer for #635 | libevent_malloc: new ptr-libevent@0x7fb35c085320 size 128 | crypto helper 13 starting work-order 636 for state #636 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 636 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 636 time elapsed 0.000576 seconds | (#636) spent 0.576 milliseconds in crypto helper computing work-order 636: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 636 for state #636 to event queue | scheduling resume sending helper answer for #636 | libevent_malloc: new ptr-libevent@0x7fb35c08ab00 size 128 | crypto helper 13 starting work-order 637 for state #637 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 637 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 637 time elapsed 0.00062 seconds | (#637) spent 0.625 milliseconds in crypto helper computing work-order 637: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 637 for state #637 to event queue | scheduling resume sending helper answer for #637 | libevent_malloc: new ptr-libevent@0x7fb35c0902e0 size 128 | crypto helper 13 starting work-order 638 for state #638 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 638 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 638 time elapsed 0.000539 seconds | (#638) spent 0.541 milliseconds in crypto helper computing work-order 638: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 638 for state #638 to event queue | scheduling resume sending helper answer for #638 | libevent_malloc: new ptr-libevent@0x7fb35c095ac0 size 128 | crypto helper 13 starting work-order 639 for state #639 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 639 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 639 time elapsed 0.000521 seconds | (#639) spent 0.524 milliseconds in crypto helper computing work-order 639: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 639 for state #639 to event queue | scheduling resume sending helper answer for #639 | libevent_malloc: new ptr-libevent@0x7fb35c09b2a0 size 128 | crypto helper 13 starting work-order 640 for state #640 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 640 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 640 time elapsed 0.000531 seconds | (#640) spent 0.533 milliseconds in crypto helper computing work-order 640: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 640 for state #640 to event queue | scheduling resume sending helper answer for #640 | libevent_malloc: new ptr-libevent@0x7fb35c0a0a80 size 128 | crypto helper 13 starting work-order 641 for state #641 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 641 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 641 time elapsed 0.000512 seconds | (#641) spent 0.515 milliseconds in crypto helper computing work-order 641: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 641 for state #641 to event queue | scheduling resume sending helper answer for #641 | libevent_malloc: new ptr-libevent@0x7fb35c0a6260 size 128 | crypto helper 13 starting work-order 642 for state #642 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 642 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 642 time elapsed 0.000523 seconds | (#642) spent 0.525 milliseconds in crypto helper computing work-order 642: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 642 for state #642 to event queue | scheduling resume sending helper answer for #642 | libevent_malloc: new ptr-libevent@0x7fb35c0aba40 size 128 | crypto helper 13 starting work-order 643 for state #643 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 643 | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 624 time elapsed 0.014243 seconds | (#624) spent 1.02 milliseconds in crypto helper computing work-order 624: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 624 for state #624 to event queue | scheduling resume sending helper answer for #624 | libevent_malloc: new ptr-libevent@0x7fb33806f750 size 128 | crypto helper 3 starting work-order 644 for state #644 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 644 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 623 time elapsed 0.014773 seconds | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 614 time elapsed 0.028082 seconds | (#623) spent 0.564 milliseconds in crypto helper computing work-order 623: ikev2_outI1 KE (pcr) | (#614) spent 1.04 milliseconds in crypto helper computing work-order 614: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 623 for state #623 to event queue | scheduling resume sending helper answer for #623 | libevent_malloc: new ptr-libevent@0x7fb354069fa0 size 128 | crypto helper 9 sending results from work-order 614 for state #614 to event queue | crypto helper 18 starting work-order 645 for state #645 | scheduling resume sending helper answer for #614 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 645 | libevent_malloc: new ptr-libevent@0x7fb378012590 size 128 | crypto helper 9 starting work-order 646 for state #646 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 646 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 626 time elapsed 0.014405 seconds | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 615 time elapsed 0.028598 seconds | (#626) spent 0.595 milliseconds in crypto helper computing work-order 626: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 626 for state #626 to event queue | scheduling resume sending helper answer for #626 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 605 time elapsed 0.036452 seconds | libevent_malloc: new ptr-libevent@0x7fb3500722e0 size 128 | (#605) spent 0.629 milliseconds in crypto helper computing work-order 605: ikev2_outI1 KE (pcr) | stop processing: state #303 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 0 sending results from work-order 605 for state #605 to event queue | libevent_free: release ptr-libevent@0x557d46b83f50 | (#615) spent 0.99 milliseconds in crypto helper computing work-order 615: ikev2_outI1 KE (pcr) | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d469e7260 | crypto helper 17 starting work-order 647 for state #647 | in statetime_stop() and could not find #303 | scheduling resume sending helper answer for #605 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 647 | crypto helper 2 sending results from work-order 615 for state #615 to event queue | scheduling resume sending helper answer for #615 | libevent_malloc: new ptr-libevent@0x7fb38007a830 size 128 | crypto helper 2 starting work-order 648 for state #648 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 648 | libevent_malloc: new ptr-libevent@0x7fb38400f680 size 128 | crypto helper 0 starting work-order 649 for state #649 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 649 | timer_event_cb: processing event@0x557d46a9c7a0 | handling event EVENT_SA_EXPIRE for parent state #396 | start processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #396 | un-established partial CHILD SA timeout (SA expired) | pstats #396 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #396 ikev2.ike deleted exchange-timeout | #396 spent 2.37 milliseconds in total | [RE]START processing: state #396 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-144" #396: deleting state (STATE_PARENT_I1) aged 44.270s and NOT sending notification | parent state #396: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #396 "road-eastnet-nonat-144" #396: deleting IKE SA for connection 'road-eastnet-nonat-144' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-144' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-144 | State DB: deleting IKEv2 state #396 in PARENT_I1 | parent state #396: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 631 time elapsed 0.013214 seconds | (#631) spent 1.01 milliseconds in crypto helper computing work-order 631: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 631 for state #631 to event queue | scheduling resume sending helper answer for #631 | libevent_malloc: new ptr-libevent@0x7fb36c06f9f0 size 128 | crypto helper 6 starting work-order 650 for state #650 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 650 | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 621 time elapsed 0.02204 seconds | (#621) spent 0.607 milliseconds in crypto helper computing work-order 621: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 621 for state #621 to event queue | scheduling resume sending helper answer for #621 | libevent_malloc: new ptr-libevent@0x7fb34c064430 size 128 | crypto helper 8 starting work-order 651 for state #651 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 651 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 612 time elapsed 0.037305 seconds | (#612) spent 0.667 milliseconds in crypto helper computing work-order 612: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 612 for state #612 to event queue | scheduling resume sending helper answer for #612 | libevent_malloc: new ptr-libevent@0x7fb358064ae0 size 128 | crypto helper 4 starting work-order 652 for state #652 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 652 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 606 time elapsed 0.04468 seconds | (#606) spent 1.01 milliseconds in crypto helper computing work-order 606: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 606 for state #606 to event queue | scheduling resume sending helper answer for #606 | libevent_malloc: new ptr-libevent@0x7fb38806fe50 size 128 | crypto helper 1 starting work-order 653 for state #653 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 653 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 649 time elapsed 0.010188 seconds | stop processing: state #396 from 192.1.2.23:500 (in delete_state() at state.c:1143) | (#649) spent 0.583 milliseconds in crypto helper computing work-order 649: ikev2_outI1 KE (pcr) | libevent_free: release ptr-libevent@0x557d46bde850 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a9c7a0 | in statetime_stop() and could not find #396 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | crypto helper 0 sending results from work-order 649 for state #649 to event queue | timer_event_cb: processing event@0x557d46c8f150 | scheduling resume sending helper answer for #649 | handling event EVENT_SA_EXPIRE for parent state #428 | libevent_malloc: new ptr-libevent@0x7fb38406b790 size 128 | crypto helper 0 starting work-order 654 for state #654 | start processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 654 | picked newest_isakmp_sa #0 for #428 | un-established partial CHILD SA timeout (SA expired) | pstats #428 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #428 ikev2.ike deleted exchange-timeout | #428 spent 2.07 milliseconds in total | [RE]START processing: state #428 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-176" #428: deleting state (STATE_PARENT_I1) aged 42.138s and NOT sending notification | parent state #428: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #428 "road-eastnet-nonat-176" #428: deleting IKE SA for connection 'road-eastnet-nonat-176' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-176' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-176 | State DB: deleting IKEv2 state #428 in PARENT_I1 | parent state #428: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 650 time elapsed 0.008696 seconds | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 617 time elapsed 0.030689 seconds | (#650) spent 0.974 milliseconds in crypto helper computing work-order 650: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 650 for state #650 to event queue | scheduling resume sending helper answer for #650 | libevent_malloc: new ptr-libevent@0x7fb36c0751d0 size 128 | crypto helper 6 starting work-order 655 for state #655 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 655 | (#617) spent 0.619 milliseconds in crypto helper computing work-order 617: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 617 for state #617 to event queue | scheduling resume sending helper answer for #617 | libevent_malloc: new ptr-libevent@0x7fb36406a1c0 size 128 | crypto helper 16 starting work-order 656 for state #656 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 656 | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 644 time elapsed 0.016027 seconds | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 645 time elapsed 0.015479 seconds | (#644) spent 0.734 milliseconds in crypto helper computing work-order 644: ikev2_outI1 KE (pcr) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 643 time elapsed 0.017727 seconds | crypto helper 3 sending results from work-order 644 for state #644 to event queue | (#643) spent 0.707 milliseconds in crypto helper computing work-order 643: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 643 for state #643 to event queue | (#645) spent 1.02 milliseconds in crypto helper computing work-order 645: ikev2_outI1 KE (pcr) | scheduling resume sending helper answer for #643 | scheduling resume sending helper answer for #644 | libevent_malloc: new ptr-libevent@0x7fb338074f30 size 128 | libevent_malloc: new ptr-libevent@0x7fb35c0b1220 size 128 | crypto helper 3 starting work-order 657 for state #657 | crypto helper 13 starting work-order 658 for state #658 | crypto helper 18 sending results from work-order 645 for state #645 to event queue | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 658 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 657 | scheduling resume sending helper answer for #645 | libevent_malloc: new ptr-libevent@0x7fb35406f780 size 128 | crypto helper 18 starting work-order 659 for state #659 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 659 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 653 time elapsed 0.007648 seconds | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 647 time elapsed 0.015909 seconds | (#647) spent 0.62 milliseconds in crypto helper computing work-order 647: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 647 for state #647 to event queue | scheduling resume sending helper answer for #647 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 648 time elapsed 0.015907 seconds | libevent_malloc: new ptr-libevent@0x7fb350077b10 size 128 | (#648) spent 0.989 milliseconds in crypto helper computing work-order 648: ikev2_outI1 KE (pcr) | crypto helper 17 starting work-order 660 for state #660 | crypto helper 2 sending results from work-order 648 for state #648 to event queue | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 660 | scheduling resume sending helper answer for #648 | libevent_malloc: new ptr-libevent@0x7fb380080010 size 128 | crypto helper 2 starting work-order 661 for state #661 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 661 | (#653) spent 0.996 milliseconds in crypto helper computing work-order 653: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 653 for state #653 to event queue | scheduling resume sending helper answer for #653 | libevent_malloc: new ptr-libevent@0x7fb388075630 size 128 | crypto helper 1 starting work-order 662 for state #662 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 662 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 660 time elapsed 0.000606 seconds | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 618 time elapsed 0.035521 seconds | (#618) spent 1.03 milliseconds in crypto helper computing work-order 618: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 618 for state #618 to event queue | scheduling resume sending helper answer for #618 | libevent_malloc: new ptr-libevent@0x7fb360067120 size 128 | crypto helper 11 starting work-order 663 for state #663 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 663 | (#660) spent 0.612 milliseconds in crypto helper computing work-order 660: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 660 for state #660 to event queue | scheduling resume sending helper answer for #660 | libevent_malloc: new ptr-libevent@0x7fb35007d2f0 size 128 | crypto helper 17 starting work-order 664 for state #664 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 664 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 654 time elapsed 0.006809 seconds | (#654) spent 0.604 milliseconds in crypto helper computing work-order 654: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 654 for state #654 to event queue | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 595 time elapsed 0.057999 seconds | (#595) spent 0.7 milliseconds in crypto helper computing work-order 595: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 595 for state #595 to event queue | scheduling resume sending helper answer for #595 | libevent_malloc: new ptr-libevent@0x7fb3700647d0 size 128 | crypto helper 14 starting work-order 665 for state #665 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 665 | scheduling resume sending helper answer for #654 | libevent_malloc: new ptr-libevent@0x7fb384070f20 size 128 | crypto helper 0 starting work-order 666 for state #666 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 666 | stop processing: state #428 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c8f190 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c8f150 | in statetime_stop() and could not find #428 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c8d9f0 | handling event EVENT_SA_EXPIRE for parent state #465 | start processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #465 | un-established partial CHILD SA timeout (SA expired) | pstats #465 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #465 ikev2.ike deleted exchange-timeout | #465 spent 2.11 milliseconds in total | [RE]START processing: state #465 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-213" #465: deleting state (STATE_PARENT_I1) aged 38.719s and NOT sending notification | parent state #465: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #465 "road-eastnet-nonat-213" #465: deleting IKE SA for connection 'road-eastnet-nonat-213' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-213' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-213 | State DB: deleting IKEv2 state #465 in PARENT_I1 | parent state #465: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 656 time elapsed 0.007105 seconds | (#656) spent 0.731 milliseconds in crypto helper computing work-order 656: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 656 for state #656 to event queue | scheduling resume sending helper answer for #656 | libevent_malloc: new ptr-libevent@0x7fb36406f9a0 size 128 | crypto helper 16 starting work-order 667 for state #667 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 667 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 667 time elapsed 0.000863 seconds | (#667) spent 0.87 milliseconds in crypto helper computing work-order 667: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 667 for state #667 to event queue | scheduling resume sending helper answer for #667 | libevent_malloc: new ptr-libevent@0x7fb364075180 size 128 | crypto helper 16 starting work-order 668 for state #668 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 668 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 668 time elapsed 0.00102 seconds | (#668) spent 1.02 milliseconds in crypto helper computing work-order 668: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 668 for state #668 to event queue | scheduling resume sending helper answer for #668 | libevent_malloc: new ptr-libevent@0x7fb36407a960 size 128 | crypto helper 16 starting work-order 669 for state #669 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 669 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 669 time elapsed 0.001084 seconds | (#669) spent 1.03 milliseconds in crypto helper computing work-order 669: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 669 for state #669 to event queue | scheduling resume sending helper answer for #669 | libevent_malloc: new ptr-libevent@0x7fb364080140 size 128 | crypto helper 16 starting work-order 670 for state #670 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 670 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 670 time elapsed 0.000969 seconds | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 625 time elapsed 0.038361 seconds | (#625) spent 0.79 milliseconds in crypto helper computing work-order 625: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 625 for state #625 to event queue | scheduling resume sending helper answer for #625 | libevent_malloc: new ptr-libevent@0x7fb37406a110 size 128 | crypto helper 15 starting work-order 671 for state #671 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 671 | (#670) spent 0.979 milliseconds in crypto helper computing work-order 670: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 670 for state #670 to event queue | scheduling resume sending helper answer for #670 | libevent_malloc: new ptr-libevent@0x7fb364085920 size 128 | crypto helper 16 starting work-order 672 for state #672 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 672 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 646 time elapsed 0.023549 seconds | (#646) spent 0.581 milliseconds in crypto helper computing work-order 646: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 646 for state #646 to event queue | scheduling resume sending helper answer for #646 | libevent_malloc: new ptr-libevent@0x7fb37804bbf0 size 128 | crypto helper 9 starting work-order 673 for state #673 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 673 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 662 time elapsed 0.009909 seconds | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 627 time elapsed 0.038329 seconds | (#662) spent 1.02 milliseconds in crypto helper computing work-order 662: ikev2_outI1 KE (pcr) | (#627) spent 0.6 milliseconds in crypto helper computing work-order 627: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 662 for state #662 to event queue | scheduling resume sending helper answer for #662 | libevent_malloc: new ptr-libevent@0x7fb38807ae10 size 128 | crypto helper 1 starting work-order 674 for state #674 | crypto helper 19 sending results from work-order 627 for state #627 to event queue | scheduling resume sending helper answer for #627 | libevent_malloc: new ptr-libevent@0x7fb36801a4e0 size 128 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 674 | crypto helper 19 starting work-order 675 for state #675 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 675 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 664 time elapsed 0.011263 seconds | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 630 time elapsed 0.038104 seconds | (#664) spent 1.01 milliseconds in crypto helper computing work-order 664: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 664 for state #664 to event queue | scheduling resume sending helper answer for #664 | libevent_malloc: new ptr-libevent@0x7fb350082ad0 size 128 | (#630) spent 0.659 milliseconds in crypto helper computing work-order 630: ikev2_outI1 KE (pcr) | crypto helper 17 starting work-order 676 for state #676 | crypto helper 10 sending results from work-order 630 for state #630 to event queue | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 676 | scheduling resume sending helper answer for #630 | libevent_malloc: new ptr-libevent@0x7fb37c06c900 size 128 | crypto helper 10 starting work-order 677 for state #677 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 677 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 655 time elapsed 0.017669 seconds | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 666 time elapsed 0.012278 seconds | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 620 time elapsed 0.04744 seconds | (#666) spent 1.05 milliseconds in crypto helper computing work-order 666: ikev2_outI1 KE (pcr) | (#620) spent 1.05 milliseconds in crypto helper computing work-order 620: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 666 for state #666 to event queue | (#655) spent 1.03 milliseconds in crypto helper computing work-order 655: ikev2_outI1 KE (pcr) | scheduling resume sending helper answer for #666 | crypto helper 5 sending results from work-order 620 for state #620 to event queue | libevent_malloc: new ptr-libevent@0x7fb384076770 size 128 | crypto helper 6 sending results from work-order 655 for state #655 to event queue | scheduling resume sending helper answer for #620 | crypto helper 0 starting work-order 678 for state #678 | scheduling resume sending helper answer for #655 | libevent_malloc: new ptr-libevent@0x7fb344069ec0 size 128 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 678 | crypto helper 5 starting work-order 679 for state #679 | libevent_malloc: new ptr-libevent@0x7fb36c077c70 size 128 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 679 | crypto helper 6 starting work-order 680 for state #680 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 680 | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 671 time elapsed 0.007434 seconds | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 657 time elapsed 0.015507 seconds | (#671) spent 1.01 milliseconds in crypto helper computing work-order 671: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 671 for state #671 to event queue | (#657) spent 1.02 milliseconds in crypto helper computing work-order 657: ikev2_outI1 KE (pcr) | scheduling resume sending helper answer for #671 | crypto helper 3 sending results from work-order 657 for state #657 to event queue | libevent_malloc: new ptr-libevent@0x7fb37406f8f0 size 128 | scheduling resume sending helper answer for #657 | crypto helper 15 starting work-order 681 for state #681 | libevent_malloc: new ptr-libevent@0x7fb33807a710 size 128 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 681 | crypto helper 3 starting work-order 682 for state #682 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 682 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 661 time elapsed 0.016047 seconds | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 658 time elapsed 0.017035 seconds | (#661) spent 1.02 milliseconds in crypto helper computing work-order 661: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 661 for state #661 to event queue | scheduling resume sending helper answer for #661 | libevent_malloc: new ptr-libevent@0x7fb3800857f0 size 128 | (#658) spent 1.03 milliseconds in crypto helper computing work-order 658: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 658 for state #658 to event queue | scheduling resume sending helper answer for #658 | libevent_malloc: new ptr-libevent@0x7fb35c0b6a00 size 128 | crypto helper 13 starting work-order 684 for state #684 | crypto helper 2 starting work-order 683 for state #683 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 684 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 683 | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 677 time elapsed 0.005558 seconds | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 665 time elapsed 0.01637 seconds | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 622 time elapsed 0.050504 seconds | (#665) spent 0.622 milliseconds in crypto helper computing work-order 665: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 665 for state #665 to event queue | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 651 time elapsed 0.028456 seconds | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 652 time elapsed 0.028424 seconds | (#651) spent 0.918 milliseconds in crypto helper computing work-order 651: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 651 for state #651 to event queue | (#652) spent 0.823 milliseconds in crypto helper computing work-order 652: ikev2_outI1 KE (pcr) | scheduling resume sending helper answer for #651 | (#622) spent 0.94 milliseconds in crypto helper computing work-order 622: ikev2_outI1 KE (pcr) | scheduling resume sending helper answer for #665 | crypto helper 4 sending results from work-order 652 for state #652 to event queue | scheduling resume sending helper answer for #652 | libevent_malloc: new ptr-libevent@0x7fb35806a310 size 128 | libevent_malloc: new ptr-libevent@0x7fb370069fb0 size 128 | libevent_malloc: new ptr-libevent@0x7fb34c069bf0 size 128 | crypto helper 14 starting work-order 686 for state #686 | crypto helper 7 sending results from work-order 622 for state #622 to event queue | crypto helper 4 starting work-order 685 for state #685 | crypto helper 8 starting work-order 687 for state #687 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 686 | scheduling resume sending helper answer for #622 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 685 | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 687 | libevent_malloc: new ptr-libevent@0x7fb34802a670 size 128 | crypto helper 7 starting work-order 688 for state #688 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 688 | (#677) spent 1.02 milliseconds in crypto helper computing work-order 677: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 677 for state #677 to event queue | scheduling resume sending helper answer for #677 | libevent_malloc: new ptr-libevent@0x7fb37c0720e0 size 128 | crypto helper 10 starting work-order 689 for state #689 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 689 | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 681 time elapsed 0.01192 seconds | (#681) spent 1.01 milliseconds in crypto helper computing work-order 681: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 681 for state #681 to event queue | scheduling resume sending helper answer for #681 | libevent_malloc: new ptr-libevent@0x7fb3740750d0 size 128 | crypto helper 15 starting work-order 690 for state #690 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 690 | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 682 time elapsed 0.012493 seconds | (#682) spent 0.628 milliseconds in crypto helper computing work-order 682: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 682 for state #682 to event queue | scheduling resume sending helper answer for #682 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 659 time elapsed 0.028036 seconds | (#659) spent 0.629 milliseconds in crypto helper computing work-order 659: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 659 for state #659 to event queue | libevent_malloc: new ptr-libevent@0x7fb33807fef0 size 128 | scheduling resume sending helper answer for #659 | libevent_malloc: new ptr-libevent@0x7fb354074f60 size 128 | crypto helper 18 starting work-order 692 for state #692 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 692 | crypto helper 3 starting work-order 691 for state #691 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 691 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 674 time elapsed 0.018062 seconds | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 629 time elapsed 0.054551 seconds | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 663 time elapsed 0.027455 seconds | (#674) spent 1.06 milliseconds in crypto helper computing work-order 674: ikev2_outI1 KE (pcr) | (#663) spent 1.09 milliseconds in crypto helper computing work-order 663: ikev2_outI1 KE (pcr) | (#629) spent 0.708 milliseconds in crypto helper computing work-order 629: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 629 for state #629 to event queue | scheduling resume sending helper answer for #629 | libevent_malloc: new ptr-libevent@0x7fb340066bd0 size 128 | crypto helper 11 sending results from work-order 663 for state #663 to event queue | crypto helper 1 sending results from work-order 674 for state #674 to event queue | scheduling resume sending helper answer for #674 | libevent_malloc: new ptr-libevent@0x7fb3880805f0 size 128 | crypto helper 12 starting work-order 693 for state #693 | scheduling resume sending helper answer for #663 | libevent_malloc: new ptr-libevent@0x7fb36006c900 size 128 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 693 | crypto helper 1 starting work-order 694 for state #694 | crypto helper 11 starting work-order 695 for state #695 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 694 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 695 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 683 time elapsed 0.013086 seconds | (#683) spent 0.6 milliseconds in crypto helper computing work-order 683: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 683 for state #683 to event queue | scheduling resume sending helper answer for #683 | libevent_malloc: new ptr-libevent@0x7fb38008afd0 size 128 | crypto helper 2 starting work-order 696 for state #696 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 696 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 676 time elapsed 0.017761 seconds | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 675 time elapsed 0.019745 seconds | (#676) spent 0.616 milliseconds in crypto helper computing work-order 676: ikev2_outI1 KE (pcr) | (#675) spent 0.602 milliseconds in crypto helper computing work-order 675: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 675 for state #675 to event queue | scheduling resume sending helper answer for #675 | libevent_malloc: new ptr-libevent@0x7fb36804b7c0 size 128 | crypto helper 17 sending results from work-order 676 for state #676 to event queue | crypto helper 19 starting work-order 697 for state #697 | scheduling resume sending helper answer for #676 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 697 | libevent_malloc: new ptr-libevent@0x7fb3500882b0 size 128 | crypto helper 17 starting work-order 698 for state #698 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 698 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 685 time elapsed 0.012658 seconds | (#685) spent 0.59 milliseconds in crypto helper computing work-order 685: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 685 for state #685 to event queue | scheduling resume sending helper answer for #685 | libevent_malloc: new ptr-libevent@0x7fb35806e450 size 128 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 672 time elapsed 0.023239 seconds | crypto helper 4 starting work-order 699 for state #699 | (#672) spent 1.04 milliseconds in crypto helper computing work-order 672: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 672 for state #672 to event queue | scheduling resume sending helper answer for #672 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 699 | libevent_malloc: new ptr-libevent@0x7fb36408b100 size 128 | crypto helper 16 starting work-order 700 for state #700 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 700 | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 689 time elapsed 0.012337 seconds | (#689) spent 0.627 milliseconds in crypto helper computing work-order 689: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 689 for state #689 to event queue | scheduling resume sending helper answer for #689 | libevent_malloc: new ptr-libevent@0x7fb37c03e940 size 128 | crypto helper 10 starting work-order 701 for state #701 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 701 | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 701 time elapsed 0.000542 seconds | (#701) spent 0.545 milliseconds in crypto helper computing work-order 701: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 701 for state #701 to event queue | scheduling resume sending helper answer for #701 | libevent_malloc: new ptr-libevent@0x7fb37c07bc30 size 128 | crypto helper 10 starting work-order 702 for state #702 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 702 | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 702 time elapsed 0.000642 seconds | (#702) spent 0.54 milliseconds in crypto helper computing work-order 702: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 702 for state #702 to event queue | scheduling resume sending helper answer for #702 | libevent_malloc: new ptr-libevent@0x7fb37c0813f0 size 128 | crypto helper 10 starting work-order 703 for state #703 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 703 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 692 time elapsed 0.007013 seconds | (#692) spent 0.628 milliseconds in crypto helper computing work-order 692: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 692 for state #692 to event queue | scheduling resume sending helper answer for #692 | libevent_malloc: new ptr-libevent@0x7fb35407a740 size 128 | crypto helper 18 starting work-order 704 for state #704 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 704 | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 693 time elapsed 0.007468 seconds | (#693) spent 0.989 milliseconds in crypto helper computing work-order 693: ikev2_outI1 KE (pcr) | crypto helper 12 sending results from work-order 693 for state #693 to event queue | scheduling resume sending helper answer for #693 | libevent_malloc: new ptr-libevent@0x7fb34006c3b0 size 128 | crypto helper 12 starting work-order 705 for state #705 | crypto helper 12 doing build KE and nonce (ikev2_outI1 KE); request ID 705 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 694 time elapsed 0.00812 seconds | (#694) spent 0.741 milliseconds in crypto helper computing work-order 694: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 694 for state #694 to event queue | scheduling resume sending helper answer for #694 | libevent_malloc: new ptr-libevent@0x7fb388085dd0 size 128 | crypto helper 1 starting work-order 706 for state #706 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 706 | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 695 time elapsed 0.008751 seconds | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 684 time elapsed 0.020815 seconds | (#695) spent 0.684 milliseconds in crypto helper computing work-order 695: ikev2_outI1 KE (pcr) | (#684) spent 0.625 milliseconds in crypto helper computing work-order 684: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 684 for state #684 to event queue | crypto helper 11 sending results from work-order 695 for state #695 to event queue | scheduling resume sending helper answer for #684 | scheduling resume sending helper answer for #695 | libevent_malloc: new ptr-libevent@0x7fb35c0bc1e0 size 128 | libevent_malloc: new ptr-libevent@0x7fb3600720e0 size 128 | crypto helper 13 starting work-order 707 for state #707 | crypto helper 11 starting work-order 708 for state #708 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 707 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 708 | stop processing: state #465 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c8da30 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c8d9f0 | in statetime_stop() and could not find #465 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7a390 | handling event EVENT_SA_EXPIRE for parent state #413 | start processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #413 | un-established partial CHILD SA timeout (SA expired) | pstats #413 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #413 ikev2.ike deleted exchange-timeout | #413 spent 2.59 milliseconds in total | [RE]START processing: state #413 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-161" #413: deleting state (STATE_PARENT_I1) aged 43.212s and NOT sending notification | parent state #413: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #413 "road-eastnet-nonat-161" #413: deleting IKE SA for connection 'road-eastnet-nonat-161' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-161' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-161 | State DB: deleting IKEv2 state #413 in PARENT_I1 | parent state #413: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 697 time elapsed 0.009965 seconds | (#697) spent 0.59 milliseconds in crypto helper computing work-order 697: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 697 for state #697 to event queue | scheduling resume sending helper answer for #697 | libevent_malloc: new ptr-libevent@0x7fb368064ab0 size 128 | crypto helper 19 starting work-order 709 for state #709 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 709 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 700 time elapsed 0.011009 seconds | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 678 time elapsed 0.027818 seconds | (#700) spent 0.611 milliseconds in crypto helper computing work-order 700: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 700 for state #700 to event queue | scheduling resume sending helper answer for #700 | libevent_malloc: new ptr-libevent@0x7fb3640908e0 size 128 | crypto helper 16 starting work-order 710 for state #710 | (#678) spent 0.666 milliseconds in crypto helper computing work-order 678: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 678 for state #678 to event queue | scheduling resume sending helper answer for #678 | libevent_malloc: new ptr-libevent@0x7fb38407bf50 size 128 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 710 | crypto helper 0 starting work-order 711 for state #711 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 711 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 673 time elapsed 0.034475 seconds | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 679 time elapsed 0.028811 seconds | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 703 time elapsed 0.010278 seconds | (#673) spent 1.07 milliseconds in crypto helper computing work-order 673: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 673 for state #673 to event queue | scheduling resume sending helper answer for #673 | libevent_malloc: new ptr-libevent@0x7fb378068430 size 128 | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 690 time elapsed 0.015931 seconds | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 680 time elapsed 0.028814 seconds | (#690) spent 0.947 milliseconds in crypto helper computing work-order 690: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 690 for state #690 to event queue | (#680) spent 0.621 milliseconds in crypto helper computing work-order 680: ikev2_outI1 KE (pcr) | (#703) spent 0.536 milliseconds in crypto helper computing work-order 703: ikev2_outI1 KE (pcr) | crypto helper 9 starting work-order 712 for state #712 | crypto helper 10 sending results from work-order 703 for state #703 to event queue | scheduling resume sending helper answer for #703 | crypto helper 6 sending results from work-order 680 for state #680 to event queue | scheduling resume sending helper answer for #680 | scheduling resume sending helper answer for #690 | libevent_malloc: new ptr-libevent@0x7fb36c07d450 size 128 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 712 | crypto helper 6 starting work-order 713 for state #713 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 713 | libevent_malloc: new ptr-libevent@0x7fb37407a8b0 size 128 | crypto helper 15 starting work-order 714 for state #714 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 714 | libevent_malloc: new ptr-libevent@0x7fb37c03e1a0 size 128 | crypto helper 10 starting work-order 715 for state #715 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 715 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 704 time elapsed 0.008875 seconds | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 691 time elapsed 0.015846 seconds | (#679) spent 0.803 milliseconds in crypto helper computing work-order 679: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 679 for state #679 to event queue | (#691) spent 0.586 milliseconds in crypto helper computing work-order 691: ikev2_outI1 KE (pcr) | (#704) spent 0.602 milliseconds in crypto helper computing work-order 704: ikev2_outI1 KE (pcr) | crypto helper 3 sending results from work-order 691 for state #691 to event queue | scheduling resume sending helper answer for #679 | scheduling resume sending helper answer for #691 | libevent_malloc: new ptr-libevent@0x7fb34406f6a0 size 128 | libevent_malloc: new ptr-libevent@0x7fb3380856d0 size 128 | crypto helper 5 starting work-order 716 for state #716 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 716 | crypto helper 3 starting work-order 717 for state #717 | crypto helper 3 doing build KE and nonce (ikev2_outI1 KE); request ID 717 | crypto helper 18 sending results from work-order 704 for state #704 to event queue | scheduling resume sending helper answer for #704 | libevent_malloc: new ptr-libevent@0x7fb35407ff20 size 128 | crypto helper 18 starting work-order 718 for state #718 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 718 | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 706 time elapsed 0.007787 seconds | (#706) spent 0.569 milliseconds in crypto helper computing work-order 706: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 706 for state #706 to event queue | scheduling resume sending helper answer for #706 | libevent_malloc: new ptr-libevent@0x7fb38808b5b0 size 128 | crypto helper 1 starting work-order 719 for state #719 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 719 | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 708 time elapsed 0.008663 seconds | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 686 time elapsed 0.028001 seconds | (#708) spent 1.01 milliseconds in crypto helper computing work-order 708: ikev2_outI1 KE (pcr) | (#686) spent 0.61 milliseconds in crypto helper computing work-order 686: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 708 for state #708 to event queue | scheduling resume sending helper answer for #708 | crypto helper 14 sending results from work-order 686 for state #686 to event queue | libevent_malloc: new ptr-libevent@0x7fb3600778c0 size 128 | scheduling resume sending helper answer for #686 | crypto helper 11 starting work-order 720 for state #720 | libevent_malloc: new ptr-libevent@0x7fb37006f790 size 128 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 720 | crypto helper 14 starting work-order 721 for state #721 | crypto helper 14 doing build KE and nonce (ikev2_outI1 KE); request ID 721 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 698 time elapsed 0.016376 seconds | (#698) spent 0.601 milliseconds in crypto helper computing work-order 698: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 698 for state #698 to event queue | scheduling resume sending helper answer for #698 | libevent_malloc: new ptr-libevent@0x7fb35008da90 size 128 | crypto helper 17 starting work-order 722 for state #722 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 722 | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 696 time elapsed 0.016421 seconds | (#696) spent 0.839 milliseconds in crypto helper computing work-order 696: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 696 for state #696 to event queue | scheduling resume sending helper answer for #696 | libevent_malloc: new ptr-libevent@0x7fb3800907b0 size 128 | crypto helper 2 starting work-order 723 for state #723 | crypto helper 2 doing build KE and nonce (ikev2_outI1 KE); request ID 723 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 709 time elapsed 0.006957 seconds | (#709) spent 0.588 milliseconds in crypto helper computing work-order 709: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 709 for state #709 to event queue | scheduling resume sending helper answer for #709 | libevent_malloc: new ptr-libevent@0x7fb36806a2e0 size 128 | crypto helper 19 starting work-order 724 for state #724 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 724 | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 724 time elapsed 0.000534 seconds | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 699 time elapsed 0.016943 seconds | (#724) spent 0.544 milliseconds in crypto helper computing work-order 724: ikev2_outI1 KE (pcr) | (#699) spent 0.583 milliseconds in crypto helper computing work-order 699: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 724 for state #724 to event queue | scheduling resume sending helper answer for #724 | crypto helper 4 sending results from work-order 699 for state #699 to event queue | scheduling resume sending helper answer for #699 | libevent_malloc: new ptr-libevent@0x7fb358073c30 size 128 | libevent_malloc: new ptr-libevent@0x7fb36806fac0 size 128 | crypto helper 4 starting work-order 725 for state #725 | crypto helper 19 starting work-order 726 for state #726 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 725 | crypto helper 19 doing build KE and nonce (ikev2_outI1 KE); request ID 726 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 710 time elapsed 0.006425 seconds | (#710) spent 0.61 milliseconds in crypto helper computing work-order 710: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 710 for state #710 to event queue | scheduling resume sending helper answer for #710 | libevent_malloc: new ptr-libevent@0x7fb3640960c0 size 128 | crypto helper 16 starting work-order 727 for state #727 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 727 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 712 time elapsed 0.006483 seconds | (#712) spent 0.566 milliseconds in crypto helper computing work-order 712: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 712 for state #712 to event queue | scheduling resume sending helper answer for #712 | libevent_malloc: new ptr-libevent@0x7fb37806fdb0 size 128 | crypto helper 9 starting work-order 728 for state #728 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 728 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 718 time elapsed 0.008627 seconds | stop processing: state #413 from 192.1.2.23:500 (in delete_state() at state.c:1143) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 707 time elapsed 0.014749 seconds | libevent_free: release ptr-libevent@0x557d46bdd150 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a7a390 | (#707) spent 0.626 milliseconds in crypto helper computing work-order 707: ikev2_outI1 KE (pcr) | (#718) spent 0.989 milliseconds in crypto helper computing work-order 718: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 707 for state #707 to event queue | in statetime_stop() and could not find #413 | scheduling resume sending helper answer for #707 | crypto helper 18 sending results from work-order 718 for state #718 to event queue | scheduling resume sending helper answer for #718 | libevent_malloc: new ptr-libevent@0x7fb354085700 size 128 | crypto helper 18 starting work-order 729 for state #729 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 729 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb35c0292e0 size 128 | crypto helper 13 starting work-order 730 for state #730 | timer_event_cb: processing event@0x557d46c8c290 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 730 | handling event EVENT_SA_EXPIRE for parent state #500 | start processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #500 | un-established partial CHILD SA timeout (SA expired) | pstats #500 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #500 ikev2.ike deleted exchange-timeout | #500 spent 2.26 milliseconds in total | [RE]START processing: state #500 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-248" #500: deleting state (STATE_PARENT_I1) aged 34.689s and NOT sending notification | parent state #500: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #500 "road-eastnet-nonat-248" #500: deleting IKE SA for connection 'road-eastnet-nonat-248' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-248' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-248 | State DB: deleting IKEv2 state #500 in PARENT_I1 | parent state #500: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 720 time elapsed 0.007022 seconds | (#720) spent 1 milliseconds in crypto helper computing work-order 720: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 720 for state #720 to event queue | scheduling resume sending helper answer for #720 | libevent_malloc: new ptr-libevent@0x7fb36007a360 size 128 | crypto helper 11 starting work-order 731 for state #731 | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 731 | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 722 time elapsed 0.007067 seconds | (#722) spent 0.622 milliseconds in crypto helper computing work-order 722: ikev2_outI1 KE (pcr) | crypto helper 17 sending results from work-order 722 for state #722 to event queue | scheduling resume sending helper answer for #722 | libevent_malloc: new ptr-libevent@0x7fb350093270 size 128 | crypto helper 17 starting work-order 732 for state #732 | crypto helper 17 doing build KE and nonce (ikev2_outI1 KE); request ID 732 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 725 time elapsed 0.006522 seconds | (#725) spent 0.647 milliseconds in crypto helper computing work-order 725: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 725 for state #725 to event queue | scheduling resume sending helper answer for #725 | libevent_malloc: new ptr-libevent@0x7fb358079410 size 128 | crypto helper 4 starting work-order 733 for state #733 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 733 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 727 time elapsed 0.006557 seconds | (#727) spent 0.621 milliseconds in crypto helper computing work-order 727: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 727 for state #727 to event queue | scheduling resume sending helper answer for #727 | libevent_malloc: new ptr-libevent@0x7fb36409b8a0 size 128 | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 711 time elapsed 0.012986 seconds | (#711) spent 0.637 milliseconds in crypto helper computing work-order 711: ikev2_outI1 KE (pcr) | crypto helper 0 sending results from work-order 711 for state #711 to event queue | scheduling resume sending helper answer for #711 | crypto helper 16 starting work-order 734 for state #734 | libevent_malloc: new ptr-libevent@0x7fb384081730 size 128 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 734 | crypto helper 0 starting work-order 735 for state #735 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 735 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 713 time elapsed 0.012548 seconds | (#713) spent 0.641 milliseconds in crypto helper computing work-order 713: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 713 for state #713 to event queue | scheduling resume sending helper answer for #713 | libevent_malloc: new ptr-libevent@0x7fb36c082c30 size 128 | crypto helper 6 starting work-order 736 for state #736 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 736 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 728 time elapsed 0.006779 seconds | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 714 time elapsed 0.013255 seconds | (#728) spent 0.764 milliseconds in crypto helper computing work-order 728: ikev2_outI1 KE (pcr) | (#714) spent 0.793 milliseconds in crypto helper computing work-order 714: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 728 for state #728 to event queue | crypto helper 15 sending results from work-order 714 for state #714 to event queue | scheduling resume sending helper answer for #728 | libevent_malloc: new ptr-libevent@0x7fb378075590 size 128 | scheduling resume sending helper answer for #714 | crypto helper 9 starting work-order 737 for state #737 | libevent_malloc: new ptr-libevent@0x7fb374080090 size 128 | crypto helper 15 starting work-order 738 for state #738 | crypto helper 15 doing build KE and nonce (ikev2_outI1 KE); request ID 738 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 737 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 729 time elapsed 0.00657 seconds | (#729) spent 0.969 milliseconds in crypto helper computing work-order 729: ikev2_outI1 KE (pcr) | crypto helper 18 sending results from work-order 729 for state #729 to event queue | scheduling resume sending helper answer for #729 | libevent_malloc: new ptr-libevent@0x7fb35408aee0 size 128 | crypto helper 18 starting work-order 739 for state #739 | crypto helper 18 doing build KE and nonce (ikev2_outI1 KE); request ID 739 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 730 time elapsed 0.007109 seconds | stop processing: state #500 from 192.1.2.23:500 (in delete_state() at state.c:1143) | (#730) spent 0.611 milliseconds in crypto helper computing work-order 730: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 730 for state #730 to event queue | libevent_free: release ptr-libevent@0x557d46c8c2d0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c8c290 | in statetime_stop() and could not find #500 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | scheduling resume sending helper answer for #730 | libevent_malloc: new ptr-libevent@0x7fb35c02e960 size 128 | timer_event_cb: processing event@0x557d46c8ab30 | handling event EVENT_SA_EXPIRE for parent state #493 | crypto helper 13 starting work-order 740 for state #740 | start processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 740 | picked newest_isakmp_sa #0 for #493 | un-established partial CHILD SA timeout (SA expired) | pstats #493 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #493 ikev2.ike deleted exchange-timeout | #493 spent 2.21 milliseconds in total | [RE]START processing: state #493 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-241" #493: deleting state (STATE_PARENT_I1) aged 35.689s and NOT sending notification | parent state #493: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #493 "road-eastnet-nonat-241" #493: deleting IKE SA for connection 'road-eastnet-nonat-241' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-241' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-241 | State DB: deleting IKEv2 state #493 in PARENT_I1 | parent state #493: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 731 time elapsed 0.00776 seconds | (#731) spent 0.992 milliseconds in crypto helper computing work-order 731: ikev2_outI1 KE (pcr) | crypto helper 11 sending results from work-order 731 for state #731 to event queue | scheduling resume sending helper answer for #731 | libevent_malloc: new ptr-libevent@0x7fb36007fb40 size 128 | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 688 time elapsed 0.042831 seconds | crypto helper 11 starting work-order 741 for state #741 | (#688) spent 0.628 milliseconds in crypto helper computing work-order 688: ikev2_outI1 KE (pcr) | crypto helper 11 doing build KE and nonce (ikev2_outI1 KE); request ID 741 | crypto helper 7 sending results from work-order 688 for state #688 to event queue | scheduling resume sending helper answer for #688 | libevent_malloc: new ptr-libevent@0x7fb3480720d0 size 128 | crypto helper 7 starting work-order 742 for state #742 | crypto helper 7 doing build KE and nonce (ikev2_outI1 KE); request ID 742 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 734 time elapsed 0.008112 seconds | (#734) spent 0.631 milliseconds in crypto helper computing work-order 734: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 734 for state #734 to event queue | scheduling resume sending helper answer for #734 | libevent_malloc: new ptr-libevent@0x7fb3640a1080 size 128 | crypto helper 16 starting work-order 743 for state #743 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 743 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 736 time elapsed 0.0082 seconds | (#736) spent 0.701 milliseconds in crypto helper computing work-order 736: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 736 for state #736 to event queue | scheduling resume sending helper answer for #736 | libevent_malloc: new ptr-libevent@0x7fb36c088410 size 128 | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 715 time elapsed 0.02073 seconds | crypto helper 6 starting work-order 744 for state #744 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 744 | (#715) spent 0.626 milliseconds in crypto helper computing work-order 715: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 715 for state #715 to event queue | scheduling resume sending helper answer for #715 | libevent_malloc: new ptr-libevent@0x7fb37c08aed0 size 128 | crypto helper 10 starting work-order 745 for state #745 | crypto helper 10 doing build KE and nonce (ikev2_outI1 KE); request ID 745 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 737 time elapsed 0.008744 seconds | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 687 time elapsed 0.046893 seconds | (#737) spent 0.574 milliseconds in crypto helper computing work-order 737: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 737 for state #737 to event queue | (#687) spent 1.04 milliseconds in crypto helper computing work-order 687: ikev2_outI1 KE (pcr) | scheduling resume sending helper answer for #737 | crypto helper 8 sending results from work-order 687 for state #687 to event queue | libevent_malloc: new ptr-libevent@0x7fb37807ad70 size 128 | scheduling resume sending helper answer for #687 | crypto helper 9 starting work-order 746 for state #746 | libevent_malloc: new ptr-libevent@0x7fb34c06f420 size 128 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 746 | crypto helper 8 starting work-order 747 for state #747 | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 716 time elapsed 0.021537 seconds | crypto helper 8 doing build KE and nonce (ikev2_outI1 KE); request ID 747 | (#716) spent 0.688 milliseconds in crypto helper computing work-order 716: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 716 for state #716 to event queue | scheduling resume sending helper answer for #716 | libevent_malloc: new ptr-libevent@0x7fb344074e80 size 128 | crypto helper 5 starting work-order 748 for state #748 | crypto helper 5 doing build KE and nonce (ikev2_outI1 KE); request ID 748 | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 746 time elapsed 0.000547 seconds | (#746) spent 0.547 milliseconds in crypto helper computing work-order 746: ikev2_outI1 KE (pcr) | crypto helper 9 sending results from work-order 746 for state #746 to event queue | scheduling resume sending helper answer for #746 | libevent_malloc: new ptr-libevent@0x7fb378080550 size 128 | crypto helper 9 starting work-order 749 for state #749 | crypto helper 9 doing build KE and nonce (ikev2_outI1 KE); request ID 749 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 740 time elapsed 0.007771 seconds | (#740) spent 0.575 milliseconds in crypto helper computing work-order 740: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 740 for state #740 to event queue | scheduling resume sending helper answer for #740 | libevent_malloc: new ptr-libevent@0x7fb35c0ca170 size 128 | crypto helper 13 starting work-order 750 for state #750 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 750 | stop processing: state #493 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c8ab70 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c8ab30 | in statetime_stop() and could not find #493 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469f4be0 | handling event EVENT_SA_EXPIRE for parent state #296 | start processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #296 | un-established partial CHILD SA timeout (SA expired) | pstats #296 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #296 ikev2.ike deleted exchange-timeout | #296 spent 2.06 milliseconds in total | [RE]START processing: state #296 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-44" #296: deleting state (STATE_PARENT_I1) aged 51.744s and NOT sending notification | parent state #296: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #296 "road-eastnet-nonat-44" #296: deleting IKE SA for connection 'road-eastnet-nonat-44' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-44' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-44 | State DB: deleting IKEv2 state #296 in PARENT_I1 | parent state #296: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 750 time elapsed 0.000532 seconds | (#750) spent 0.535 milliseconds in crypto helper computing work-order 750: ikev2_outI1 KE (pcr) | crypto helper 13 sending results from work-order 750 for state #750 to event queue | scheduling resume sending helper answer for #750 | libevent_malloc: new ptr-libevent@0x7fb35c039e20 size 128 | crypto helper 13 starting work-order 751 for state #751 | crypto helper 13 doing build KE and nonce (ikev2_outI1 KE); request ID 751 | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 733 time elapsed 0.014531 seconds | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 735 time elapsed 0.013927 seconds | (#733) spent 0.994 milliseconds in crypto helper computing work-order 733: ikev2_outI1 KE (pcr) | (#735) spent 0.55 milliseconds in crypto helper computing work-order 735: ikev2_outI1 KE (pcr) | crypto helper 4 sending results from work-order 733 for state #733 to event queue | scheduling resume sending helper answer for #733 | crypto helper 0 sending results from work-order 735 for state #735 to event queue | scheduling resume sending helper answer for #735 | libevent_malloc: new ptr-libevent@0x7fb384086f10 size 128 | libevent_malloc: new ptr-libevent@0x7fb35807ebf0 size 128 | crypto helper 0 starting work-order 752 for state #752 | crypto helper 4 starting work-order 753 for state #753 | crypto helper 0 doing build KE and nonce (ikev2_outI1 KE); request ID 752 | crypto helper 4 doing build KE and nonce (ikev2_outI1 KE); request ID 753 | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 743 time elapsed 0.006368 seconds | (#743) spent 0.596 milliseconds in crypto helper computing work-order 743: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 743 for state #743 to event queue | scheduling resume sending helper answer for #743 | libevent_malloc: new ptr-libevent@0x7fb3640a6860 size 128 | crypto helper 16 starting work-order 754 for state #754 | crypto helper 16 doing build KE and nonce (ikev2_outI1 KE); request ID 754 | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 744 time elapsed 0.006211 seconds | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 719 time elapsed 0.025452 seconds | (#744) spent 0.608 milliseconds in crypto helper computing work-order 744: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 744 for state #744 to event queue | (#719) spent 1.02 milliseconds in crypto helper computing work-order 719: ikev2_outI1 KE (pcr) | crypto helper 1 sending results from work-order 719 for state #719 to event queue | scheduling resume sending helper answer for #719 | scheduling resume sending helper answer for #744 | crypto helper 3 finished build KE and nonce (ikev2_outI1 KE); request ID 717 time elapsed 0.02653 seconds | libevent_malloc: new ptr-libevent@0x7fb388090d90 size 128 | (#717) spent 0.825 milliseconds in crypto helper computing work-order 717: ikev2_outI1 KE (pcr) | libevent_malloc: new ptr-libevent@0x7fb36c08dbf0 size 128 | crypto helper 3 sending results from work-order 717 for state #717 to event queue | scheduling resume sending helper answer for #717 | libevent_malloc: new ptr-libevent@0x7fb33808a5d0 size 128 | crypto helper 3 waiting (nothing to do) | crypto helper 6 starting work-order 756 for state #756 | crypto helper 1 starting work-order 755 for state #755 | crypto helper 6 doing build KE and nonce (ikev2_outI1 KE); request ID 756 | crypto helper 1 doing build KE and nonce (ikev2_outI1 KE); request ID 755 | crypto helper 18 finished build KE and nonce (ikev2_outI1 KE); request ID 739 time elapsed 0.01247 seconds | (#739) spent 0.631 milliseconds in crypto helper computing work-order 739: ikev2_outI1 KE (pcr) | crypto helper 9 finished build KE and nonce (ikev2_outI1 KE); request ID 749 time elapsed 0.005702 seconds | crypto helper 18 sending results from work-order 739 for state #739 to event queue | (#749) spent 0.594 milliseconds in crypto helper computing work-order 749: ikev2_outI1 KE (pcr) | scheduling resume sending helper answer for #739 | libevent_malloc: new ptr-libevent@0x7fb3540906c0 size 128 | crypto helper 18 waiting (nothing to do) | crypto helper 9 sending results from work-order 749 for state #749 to event queue | scheduling resume sending helper answer for #749 | libevent_malloc: new ptr-libevent@0x7fb378085d30 size 128 | crypto helper 14 finished build KE and nonce (ikev2_outI1 KE); request ID 721 time elapsed 0.025177 seconds | crypto helper 9 waiting (nothing to do) | (#721) spent 0.607 milliseconds in crypto helper computing work-order 721: ikev2_outI1 KE (pcr) | crypto helper 14 sending results from work-order 721 for state #721 to event queue | scheduling resume sending helper answer for #721 | libevent_malloc: new ptr-libevent@0x7fb370074f70 size 128 | crypto helper 14 waiting (nothing to do) | crypto helper 19 finished build KE and nonce (ikev2_outI1 KE); request ID 726 time elapsed 0.024544 seconds | (#726) spent 1.09 milliseconds in crypto helper computing work-order 726: ikev2_outI1 KE (pcr) | crypto helper 19 sending results from work-order 726 for state #726 to event queue | scheduling resume sending helper answer for #726 | libevent_malloc: new ptr-libevent@0x7fb3680752a0 size 128 | crypto helper 19 waiting (nothing to do) | crypto helper 7 finished build KE and nonce (ikev2_outI1 KE); request ID 742 time elapsed 0.012848 seconds | (#742) spent 0.618 milliseconds in crypto helper computing work-order 742: ikev2_outI1 KE (pcr) | crypto helper 17 finished build KE and nonce (ikev2_outI1 KE); request ID 732 time elapsed 0.020108 seconds | crypto helper 7 sending results from work-order 742 for state #742 to event queue | (#732) spent 0.661 milliseconds in crypto helper computing work-order 732: ikev2_outI1 KE (pcr) | scheduling resume sending helper answer for #742 | crypto helper 17 sending results from work-order 732 for state #732 to event queue | libevent_malloc: new ptr-libevent@0x7fb348077830 size 128 | scheduling resume sending helper answer for #732 | crypto helper 7 waiting (nothing to do) | libevent_malloc: new ptr-libevent@0x7fb350098a50 size 128 | crypto helper 17 waiting (nothing to do) | crypto helper 10 finished build KE and nonce (ikev2_outI1 KE); request ID 745 time elapsed 0.011372 seconds | (#745) spent 0.745 milliseconds in crypto helper computing work-order 745: ikev2_outI1 KE (pcr) | crypto helper 10 sending results from work-order 745 for state #745 to event queue | scheduling resume sending helper answer for #745 | libevent_malloc: new ptr-libevent@0x7fb37c090640 size 128 | crypto helper 10 waiting (nothing to do) | crypto helper 16 finished build KE and nonce (ikev2_outI1 KE); request ID 754 time elapsed 0.006521 seconds | (#754) spent 0.582 milliseconds in crypto helper computing work-order 754: ikev2_outI1 KE (pcr) | crypto helper 16 sending results from work-order 754 for state #754 to event queue | scheduling resume sending helper answer for #754 | libevent_malloc: new ptr-libevent@0x7fb3640ac040 size 128 | crypto helper 16 waiting (nothing to do) | crypto helper 15 finished build KE and nonce (ikev2_outI1 KE); request ID 738 time elapsed 0.019761 seconds | (#738) spent 0.685 milliseconds in crypto helper computing work-order 738: ikev2_outI1 KE (pcr) | crypto helper 15 sending results from work-order 738 for state #738 to event queue | scheduling resume sending helper answer for #738 | libevent_malloc: new ptr-libevent@0x7fb374085870 size 128 | crypto helper 15 waiting (nothing to do) | crypto helper 6 finished build KE and nonce (ikev2_outI1 KE); request ID 756 time elapsed 0.006673 seconds | (#756) spent 0.793 milliseconds in crypto helper computing work-order 756: ikev2_outI1 KE (pcr) | crypto helper 6 sending results from work-order 756 for state #756 to event queue | scheduling resume sending helper answer for #756 | libevent_malloc: new ptr-libevent@0x7fb36c0933d0 size 128 | crypto helper 6 waiting (nothing to do) | crypto helper 5 finished build KE and nonce (ikev2_outI1 KE); request ID 748 time elapsed 0.013167 seconds | (#748) spent 0.925 milliseconds in crypto helper computing work-order 748: ikev2_outI1 KE (pcr) | crypto helper 5 sending results from work-order 748 for state #748 to event queue | scheduling resume sending helper answer for #748 | libevent_malloc: new ptr-libevent@0x7fb34407a660 size 128 | crypto helper 5 waiting (nothing to do) | crypto helper 8 finished build KE and nonce (ikev2_outI1 KE); request ID 747 time elapsed 0.013239 seconds | (#747) spent 0.779 milliseconds in crypto helper computing work-order 747: ikev2_outI1 KE (pcr) | crypto helper 8 sending results from work-order 747 for state #747 to event queue | scheduling resume sending helper answer for #747 | libevent_malloc: new ptr-libevent@0x7fb34c074c00 size 128 | crypto helper 8 waiting (nothing to do) | crypto helper 11 finished build KE and nonce (ikev2_outI1 KE); request ID 741 time elapsed 0.017339 seconds | crypto helper 2 finished build KE and nonce (ikev2_outI1 KE); request ID 723 time elapsed 0.031622 seconds | stop processing: state #296 from 192.1.2.23:500 (in delete_state() at state.c:1143) | (#723) spent 0.673 milliseconds in crypto helper computing work-order 723: ikev2_outI1 KE (pcr) | crypto helper 2 sending results from work-order 723 for state #723 to event queue | libevent_free: release ptr-libevent@0x557d46b82850 | crypto helper 12 finished build KE and nonce (ikev2_outI1 KE); request ID 705 time elapsed 0.042254 seconds | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d469f4be0 | (#705) spent 0.671 milliseconds in crypto helper computing work-order 705: ikev2_outI1 KE (pcr) | in statetime_stop() and could not find #296 | scheduling resume sending helper answer for #723 | crypto helper 13 finished build KE and nonce (ikev2_outI1 KE); request ID 751 time elapsed 0.010521 seconds | libevent_malloc: new ptr-libevent@0x7fb380093250 size 128 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | (#751) spent 0.601 milliseconds in crypto helper computing work-order 751: ikev2_outI1 KE (pcr) | crypto helper 4 finished build KE and nonce (ikev2_outI1 KE); request ID 753 time elapsed 0.009428 seconds | timer_event_cb: processing event@0x557d46a7a350 | handling event EVENT_SA_EXPIRE for parent state #278 | (#753) spent 0.953 milliseconds in crypto helper computing work-order 753: ikev2_outI1 KE (pcr) | (#741) spent 0.977 milliseconds in crypto helper computing work-order 741: ikev2_outI1 KE (pcr) | start processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | crypto helper 11 sending results from work-order 741 for state #741 to event queue | scheduling resume sending helper answer for #741 | libevent_malloc: new ptr-libevent@0x7fb360085320 size 128 | crypto helper 12 sending results from work-order 705 for state #705 to event queue | picked newest_isakmp_sa #0 for #278 | un-established partial CHILD SA timeout (SA expired) | crypto helper 2 waiting (nothing to do) | crypto helper 4 sending results from work-order 753 for state #753 to event queue | crypto helper 11 waiting (nothing to do) | scheduling resume sending helper answer for #753 | libevent_malloc: new ptr-libevent@0x7fb3580843d0 size 128 | scheduling resume sending helper answer for #705 | pstats #278 ikev2.ike failed exchange-timeout | crypto helper 13 sending results from work-order 751 for state #751 to event queue | crypto helper 4 waiting (nothing to do) | libevent_malloc: new ptr-libevent@0x7fb340071b90 size 128 | State DB: IKEv2 state not found (delete_my_family) | scheduling resume sending helper answer for #751 | libevent_malloc: new ptr-libevent@0x7fb35c0cfb20 size 128 | pstats #278 ikev2.ike deleted exchange-timeout | crypto helper 12 waiting (nothing to do) | #278 spent 2.36 milliseconds in total | crypto helper 13 waiting (nothing to do) | [RE]START processing: state #278 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-26" #278: deleting state (STATE_PARENT_I1) aged 53.089s and NOT sending notification | parent state #278: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #278 "road-eastnet-nonat-26" #278: deleting IKE SA for connection 'road-eastnet-nonat-26' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-26' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-26 | State DB: deleting IKEv2 state #278 in PARENT_I1 | parent state #278: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | crypto helper 1 finished build KE and nonce (ikev2_outI1 KE); request ID 755 time elapsed 0.00881 seconds | stop processing: state #278 from 192.1.2.23:500 (in delete_state() at state.c:1143) | (#755) spent 0.617 milliseconds in crypto helper computing work-order 755: ikev2_outI1 KE (pcr) | libevent_free: release ptr-libevent@0x557d46bdba50 | crypto helper 1 sending results from work-order 755 for state #755 to event queue | crypto helper 0 finished build KE and nonce (ikev2_outI1 KE); request ID 752 time elapsed 0.010001 seconds | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a7a350 | (#752) spent 0.613 milliseconds in crypto helper computing work-order 752: ikev2_outI1 KE (pcr) | in statetime_stop() and could not find #278 | scheduling resume sending helper answer for #755 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | libevent_malloc: new ptr-libevent@0x7fb388096570 size 128 | timer_event_cb: processing event@0x557d46c893d0 | crypto helper 0 sending results from work-order 752 for state #752 to event queue | scheduling resume sending helper answer for #752 | crypto helper 1 waiting (nothing to do) | handling event EVENT_SA_EXPIRE for parent state #478 | libevent_malloc: new ptr-libevent@0x7fb3840899b0 size 128 | start processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | crypto helper 0 waiting (nothing to do) | picked newest_isakmp_sa #0 for #478 | un-established partial CHILD SA timeout (SA expired) | pstats #478 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #478 ikev2.ike deleted exchange-timeout | #478 spent 3.46 milliseconds in total | [RE]START processing: state #478 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-226" #478: deleting state (STATE_PARENT_I1) aged 37.309s and NOT sending notification | parent state #478: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #478 "road-eastnet-nonat-226" #478: deleting IKE SA for connection 'road-eastnet-nonat-226' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-226' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-226 | State DB: deleting IKEv2 state #478 in PARENT_I1 | parent state #478: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #478 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c89410 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c893d0 | in statetime_stop() and could not find #478 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c87c70 | handling event EVENT_SA_EXPIRE for parent state #461 | start processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #461 | un-established partial CHILD SA timeout (SA expired) | pstats #461 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #461 ikev2.ike deleted exchange-timeout | #461 spent 2.47 milliseconds in total | [RE]START processing: state #461 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-209" #461: deleting state (STATE_PARENT_I1) aged 39.205s and NOT sending notification | parent state #461: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #461 "road-eastnet-nonat-209" #461: deleting IKE SA for connection 'road-eastnet-nonat-209' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-209' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-209 | State DB: deleting IKEv2 state #461 in PARENT_I1 | parent state #461: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #461 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c87cb0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c87c70 | in statetime_stop() and could not find #461 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a5f0d0 | handling event EVENT_SA_EXPIRE for parent state #280 | start processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #280 | un-established partial CHILD SA timeout (SA expired) | pstats #280 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #280 ikev2.ike deleted exchange-timeout | #280 spent 2.86 milliseconds in total | [RE]START processing: state #280 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-28" #280: deleting state (STATE_PARENT_I1) aged 52.960s and NOT sending notification | parent state #280: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #280 "road-eastnet-nonat-28" #280: deleting IKE SA for connection 'road-eastnet-nonat-28' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-28' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-28 | State DB: deleting IKEv2 state #280 in PARENT_I1 | parent state #280: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #280 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bda350 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a5f0d0 | in statetime_stop() and could not find #280 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c86510 | handling event EVENT_SA_EXPIRE for parent state #485 | start processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #485 | un-established partial CHILD SA timeout (SA expired) | pstats #485 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #485 ikev2.ike deleted exchange-timeout | #485 spent 2.27 milliseconds in total | [RE]START processing: state #485 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-233" #485: deleting state (STATE_PARENT_I1) aged 36.609s and NOT sending notification | parent state #485: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #485 "road-eastnet-nonat-233" #485: deleting IKE SA for connection 'road-eastnet-nonat-233' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-233' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-233 | State DB: deleting IKEv2 state #485 in PARENT_I1 | parent state #485: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #485 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c86550 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c86510 | in statetime_stop() and could not find #485 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c84db0 | handling event EVENT_SA_EXPIRE for parent state #454 | start processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #454 | un-established partial CHILD SA timeout (SA expired) | pstats #454 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #454 ikev2.ike deleted exchange-timeout | #454 spent 2.36 milliseconds in total | [RE]START processing: state #454 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-202" #454: deleting state (STATE_PARENT_I1) aged 40.002s and NOT sending notification | parent state #454: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #454 "road-eastnet-nonat-202" #454: deleting IKE SA for connection 'road-eastnet-nonat-202' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-202' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-202 | State DB: deleting IKEv2 state #454 in PARENT_I1 | parent state #454: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #454 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c84df0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c84db0 | in statetime_stop() and could not find #454 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab2380 | handling event EVENT_SA_EXPIRE for parent state #275 | start processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #275 | un-established partial CHILD SA timeout (SA expired) | pstats #275 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #275 ikev2.ike deleted exchange-timeout | #275 spent 2.87 milliseconds in total | [RE]START processing: state #275 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-23" #275: deleting state (STATE_PARENT_I1) aged 53.367s and NOT sending notification | parent state #275: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #275 "road-eastnet-nonat-23" #275: deleting IKE SA for connection 'road-eastnet-nonat-23' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-23' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-23 | State DB: deleting IKEv2 state #275 in PARENT_I1 | parent state #275: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #275 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b01100 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46ab2380 | in statetime_stop() and could not find #275 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469e5ca0 | handling event EVENT_SA_EXPIRE for parent state #292 | start processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #292 | un-established partial CHILD SA timeout (SA expired) | pstats #292 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #292 ikev2.ike deleted exchange-timeout | #292 spent 2.08 milliseconds in total | [RE]START processing: state #292 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-40" #292: deleting state (STATE_PARENT_I1) aged 52.075s and NOT sending notification | parent state #292: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #292 "road-eastnet-nonat-40" #292: deleting IKE SA for connection 'road-eastnet-nonat-40' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-40' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-40 | State DB: deleting IKEv2 state #292 in PARENT_I1 | parent state #292: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #292 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b81150 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d469e5ca0 | in statetime_stop() and could not find #292 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad0280 | handling event EVENT_SA_EXPIRE for parent state #477 | start processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #477 | un-established partial CHILD SA timeout (SA expired) | pstats #477 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #477 ikev2.ike deleted exchange-timeout | #477 spent 1.98 milliseconds in total | [RE]START processing: state #477 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-225" #477: deleting state (STATE_PARENT_I1) aged 37.420s and NOT sending notification | parent state #477: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #477 "road-eastnet-nonat-225" #477: deleting IKE SA for connection 'road-eastnet-nonat-225' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-225' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-225 | State DB: deleting IKEv2 state #477 in PARENT_I1 | parent state #477: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #477 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bd8c50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46ad0280 | in statetime_stop() and could not find #477 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c83650 | handling event EVENT_SA_EXPIRE for parent state #469 | start processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #469 | un-established partial CHILD SA timeout (SA expired) | pstats #469 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #469 ikev2.ike deleted exchange-timeout | #469 spent 1.71 milliseconds in total | [RE]START processing: state #469 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-217" #469: deleting state (STATE_PARENT_I1) aged 38.416s and NOT sending notification | parent state #469: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #469 "road-eastnet-nonat-217" #469: deleting IKE SA for connection 'road-eastnet-nonat-217' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-217' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-217 | State DB: deleting IKEv2 state #469 in PARENT_I1 | parent state #469: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #469 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c83690 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c83650 | in statetime_stop() and could not find #469 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c81ef0 | handling event EVENT_SA_EXPIRE for parent state #482 | start processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #482 | un-established partial CHILD SA timeout (SA expired) | pstats #482 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #482 ikev2.ike deleted exchange-timeout | #482 spent 1.86 milliseconds in total | [RE]START processing: state #482 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-230" #482: deleting state (STATE_PARENT_I1) aged 36.919s and NOT sending notification | parent state #482: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #482 "road-eastnet-nonat-230" #482: deleting IKE SA for connection 'road-eastnet-nonat-230' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-230' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-230 | State DB: deleting IKEv2 state #482 in PARENT_I1 | parent state #482: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #482 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c81f30 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c81ef0 | in statetime_stop() and could not find #482 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a25d10 | handling event EVENT_SA_EXPIRE for parent state #319 | start processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #319 | un-established partial CHILD SA timeout (SA expired) | pstats #319 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #319 ikev2.ike deleted exchange-timeout | #319 spent 2.29 milliseconds in total | [RE]START processing: state #319 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-67" #319: deleting state (STATE_PARENT_I1) aged 50.028s and NOT sending notification | parent state #319: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #319 "road-eastnet-nonat-67" #319: deleting IKE SA for connection 'road-eastnet-nonat-67' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-67' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-67 | State DB: deleting IKEv2 state #319 in PARENT_I1 | parent state #319: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #319 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bd7550 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a25d10 | in statetime_stop() and could not find #319 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c80790 | handling event EVENT_SA_EXPIRE for parent state #476 | start processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #476 | un-established partial CHILD SA timeout (SA expired) | pstats #476 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #476 ikev2.ike deleted exchange-timeout | #476 spent 2.07 milliseconds in total | [RE]START processing: state #476 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-224" #476: deleting state (STATE_PARENT_I1) aged 37.575s and NOT sending notification | parent state #476: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #476 "road-eastnet-nonat-224" #476: deleting IKE SA for connection 'road-eastnet-nonat-224' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-224' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-224 | State DB: deleting IKEv2 state #476 in PARENT_I1 | parent state #476: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #476 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c807d0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c80790 | in statetime_stop() and could not find #476 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c7f030 | handling event EVENT_SA_EXPIRE for parent state #480 | start processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #480 | un-established partial CHILD SA timeout (SA expired) | pstats #480 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #480 ikev2.ike deleted exchange-timeout | #480 spent 2.38 milliseconds in total | [RE]START processing: state #480 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-228" #480: deleting state (STATE_PARENT_I1) aged 37.112s and NOT sending notification | parent state #480: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #480 "road-eastnet-nonat-228" #480: deleting IKE SA for connection 'road-eastnet-nonat-228' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-228' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-228 | State DB: deleting IKEv2 state #480 in PARENT_I1 | parent state #480: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #480 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c7f070 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c7f030 | in statetime_stop() and could not find #480 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a011f0 | handling event EVENT_SA_EXPIRE for parent state #309 | start processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #309 | un-established partial CHILD SA timeout (SA expired) | pstats #309 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #309 ikev2.ike deleted exchange-timeout | #309 spent 2.98 milliseconds in total | [RE]START processing: state #309 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-57" #309: deleting state (STATE_PARENT_I1) aged 50.684s and NOT sending notification | parent state #309: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #309 "road-eastnet-nonat-57" #309: deleting IKE SA for connection 'road-eastnet-nonat-57' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-57' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-57 | State DB: deleting IKEv2 state #309 in PARENT_I1 | parent state #309: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #309 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b7fa50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a011f0 | in statetime_stop() and could not find #309 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aa0940 | handling event EVENT_SA_EXPIRE for parent state #313 | start processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #313 | un-established partial CHILD SA timeout (SA expired) | pstats #313 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #313 ikev2.ike deleted exchange-timeout | #313 spent 1.87 milliseconds in total | [RE]START processing: state #313 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-61" #313: deleting state (STATE_PARENT_I1) aged 50.412s and NOT sending notification | parent state #313: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #313 "road-eastnet-nonat-61" #313: deleting IKE SA for connection 'road-eastnet-nonat-61' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-61' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-61 | State DB: deleting IKEv2 state #313 in PARENT_I1 | parent state #313: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #313 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bd5e50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46aa0940 | in statetime_stop() and could not find #313 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c7d8d0 | handling event EVENT_SA_EXPIRE for parent state #441 | start processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #441 | un-established partial CHILD SA timeout (SA expired) | pstats #441 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #441 ikev2.ike deleted exchange-timeout | #441 spent 2.34 milliseconds in total | [RE]START processing: state #441 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-189" #441: deleting state (STATE_PARENT_I1) aged 41.162s and NOT sending notification | parent state #441: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #441 "road-eastnet-nonat-189" #441: deleting IKE SA for connection 'road-eastnet-nonat-189' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-189' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-189 | State DB: deleting IKEv2 state #441 in PARENT_I1 | parent state #441: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #441 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c7d910 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c7d8d0 | in statetime_stop() and could not find #441 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #509 | start processing: state #509 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 509 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #509 | **emit ISAKMP Message: | initiator cookie: | 95 a6 50 d0 80 0f 96 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-236 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a3 f6 dc 59 0f c4 05 31 27 1c e1 59 91 71 4f 77 | ikev2 g^x d2 6f b2 3c 4c 42 2c 05 31 c6 b9 01 b3 f9 33 cf | ikev2 g^x 31 3e d8 f2 50 a2 40 4c 26 af b9 c4 f6 6b 9c a0 | ikev2 g^x c3 09 f4 3f 7a cc f4 7f ca 62 75 a2 51 f3 85 34 | ikev2 g^x ba 40 18 72 c0 75 cb 27 ef ac 5f 7a 01 de 2e 52 | ikev2 g^x 48 88 8c 60 ad e7 5b 44 6c 1a e8 d5 6f 53 11 23 | ikev2 g^x 95 be a5 14 60 2b e4 59 8a 11 d1 b5 ed 47 f8 3f | ikev2 g^x 6d e0 61 51 79 49 84 03 99 39 af e7 46 a2 96 23 | ikev2 g^x 10 c9 ad ec 42 e4 52 ee d8 32 7d ed 3a d7 ff 92 | ikev2 g^x 1f 6f 0f 74 38 79 01 20 fa 36 e9 f1 09 08 9c 1e | ikev2 g^x 99 ae 11 ce d8 88 97 aa 9e 87 73 fa fc 1c f1 a5 | ikev2 g^x 50 45 69 bc f8 32 ab 8a a5 aa 99 3b 14 59 27 93 | ikev2 g^x aa af d8 7a 15 d5 3f 8b e4 e9 93 e5 f3 54 80 be | ikev2 g^x f8 1e 00 2e ce b6 01 59 ea 14 bb 0f 04 fa 53 df | ikev2 g^x 7b f6 52 1a 74 66 fb 6f ec f5 da 2e 36 05 f8 e1 | ikev2 g^x f8 ef 5f a4 a1 a4 e5 27 c9 45 68 7f 7b 01 52 89 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9d 39 90 d5 1d b9 a1 ff 3d e2 2c 36 93 f3 ac d0 | IKEv2 nonce 34 e1 bb 65 c7 36 8d 9f be 5b 52 2e e0 af cd 8d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 95 a6 50 d0 80 0f 96 24 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ec | natd_hash: port= 01 f4 | natd_hash: hash= 1b a0 6c aa ff 54 d0 e4 33 5d be 4b d4 00 1f 61 | natd_hash: hash= d7 8c b7 eb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b a0 6c aa ff 54 d0 e4 33 5d be 4b d4 00 1f 61 | Notify data d7 8c b7 eb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 95 a6 50 d0 80 0f 96 24 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= b0 ac c8 3e be 16 32 44 b0 93 80 f1 03 a4 ee b2 | natd_hash: hash= e2 ca 64 08 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b0 ac c8 3e be 16 32 44 b0 93 80 f1 03 a4 ee b2 | Notify data e2 ca 64 08 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #509 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #509 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #509 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #509: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #509 to 4294967295 after switching state | Message ID: IKE #509 skipping update_recv as MD is fake | Message ID: sent #509 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-236" #509: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.236:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #509) | 95 a6 50 d0 80 0f 96 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 f6 dc 59 0f c4 05 31 27 1c e1 59 91 71 4f 77 | d2 6f b2 3c 4c 42 2c 05 31 c6 b9 01 b3 f9 33 cf | 31 3e d8 f2 50 a2 40 4c 26 af b9 c4 f6 6b 9c a0 | c3 09 f4 3f 7a cc f4 7f ca 62 75 a2 51 f3 85 34 | ba 40 18 72 c0 75 cb 27 ef ac 5f 7a 01 de 2e 52 | 48 88 8c 60 ad e7 5b 44 6c 1a e8 d5 6f 53 11 23 | 95 be a5 14 60 2b e4 59 8a 11 d1 b5 ed 47 f8 3f | 6d e0 61 51 79 49 84 03 99 39 af e7 46 a2 96 23 | 10 c9 ad ec 42 e4 52 ee d8 32 7d ed 3a d7 ff 92 | 1f 6f 0f 74 38 79 01 20 fa 36 e9 f1 09 08 9c 1e | 99 ae 11 ce d8 88 97 aa 9e 87 73 fa fc 1c f1 a5 | 50 45 69 bc f8 32 ab 8a a5 aa 99 3b 14 59 27 93 | aa af d8 7a 15 d5 3f 8b e4 e9 93 e5 f3 54 80 be | f8 1e 00 2e ce b6 01 59 ea 14 bb 0f 04 fa 53 df | 7b f6 52 1a 74 66 fb 6f ec f5 da 2e 36 05 f8 e1 | f8 ef 5f a4 a1 a4 e5 27 c9 45 68 7f 7b 01 52 89 | 29 00 00 24 9d 39 90 d5 1d b9 a1 ff 3d e2 2c 36 | 93 f3 ac d0 34 e1 bb 65 c7 36 8d 9f be 5b 52 2e | e0 af cd 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b a0 6c aa ff 54 d0 e4 33 5d be 4b | d4 00 1f 61 d7 8c b7 eb 00 00 00 1c 00 00 40 05 | b0 ac c8 3e be 16 32 44 b0 93 80 f1 03 a4 ee b2 | e2 ca 64 08 | state #509 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb370029490 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37000d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #509 | libevent_malloc: new ptr-libevent@0x557d46b83f50 size 128 | #509 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.196864 | resume sending helper answer for #509 suppresed complete_v2_state_transition() and stole MD | #509 spent 0.316 milliseconds in resume sending helper answer | stop processing: state #509 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c046140 | processing resume sending helper answer for #528 | start processing: state #528 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 528 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #528 | **emit ISAKMP Message: | initiator cookie: | 53 19 92 95 ca 61 53 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-99 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 86 e5 c7 b3 7c 8d 99 d1 d7 29 a2 10 c1 b7 06 0c | ikev2 g^x 17 e9 49 3c 4a c0 5b bd 73 b3 61 f0 c5 97 1a c7 | ikev2 g^x 76 63 76 36 e9 7a 65 e8 6a 3f 9b a2 34 22 f6 b4 | ikev2 g^x 6a 88 a8 f8 7f 41 d3 72 9f 5a 88 ca 6b 48 aa 0d | ikev2 g^x 9f bb 2e af b7 64 43 c0 5f 21 ab ad ca 4c c4 bd | ikev2 g^x 11 a7 3a 9f 89 1f e1 4e cc b3 7c 12 a4 19 cf 86 | ikev2 g^x c6 87 c1 d0 2a 94 8b 9d e9 35 39 07 a6 9c a3 ed | ikev2 g^x a8 ce d3 e4 53 a5 82 df 4f 1f e0 bc b2 92 cb c6 | ikev2 g^x 39 04 f1 75 75 72 f5 1c aa 6f d5 6e 3c f8 04 ed | ikev2 g^x 37 5d a6 8b b9 ef fe 51 d8 f6 f3 f2 4d a5 ca 6d | ikev2 g^x 2e b0 a4 75 6d ce 0d 14 13 47 fc 6e 77 45 1a 17 | ikev2 g^x c4 a3 61 af 3a a4 0b d3 f5 57 8f f2 6f 78 70 d1 | ikev2 g^x c2 a7 16 f6 5c 3a 00 46 05 30 36 7f b8 3f 18 36 | ikev2 g^x 35 33 11 0a 75 c5 6f f6 65 a7 05 28 7c e1 b9 fd | ikev2 g^x 51 6f f2 9e cd 9f 64 c9 9d fe 9b c7 f0 06 55 5a | ikev2 g^x bb ef dc 4c be 29 e4 94 b5 10 3f 65 5d 8b 1c e0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 46 b5 f0 72 e3 2a 70 ff f4 67 d5 b0 a0 ba f1 3f | IKEv2 nonce 75 bf 45 d4 30 d2 c3 b1 ff a8 07 cc a0 44 98 ab | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 53 19 92 95 ca 61 53 b9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 63 | natd_hash: port= 01 f4 | natd_hash: hash= 7b 19 8a cb f1 5b 38 5c d3 a5 bc 6a dc b7 35 41 | natd_hash: hash= 12 44 0c ab | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7b 19 8a cb f1 5b 38 5c d3 a5 bc 6a dc b7 35 41 | Notify data 12 44 0c ab | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 53 19 92 95 ca 61 53 b9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e6 3e dd 6e 01 07 35 ad c6 0c f8 90 bb 33 8c f2 | natd_hash: hash= 78 f1 d6 dc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e6 3e dd 6e 01 07 35 ad c6 0c f8 90 bb 33 8c f2 | Notify data 78 f1 d6 dc | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #528 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #528 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #528 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #528: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #528 to 4294967295 after switching state | Message ID: IKE #528 skipping update_recv as MD is fake | Message ID: sent #528 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-99" #528: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.99:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #528) | 53 19 92 95 ca 61 53 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 e5 c7 b3 7c 8d 99 d1 d7 29 a2 10 c1 b7 06 0c | 17 e9 49 3c 4a c0 5b bd 73 b3 61 f0 c5 97 1a c7 | 76 63 76 36 e9 7a 65 e8 6a 3f 9b a2 34 22 f6 b4 | 6a 88 a8 f8 7f 41 d3 72 9f 5a 88 ca 6b 48 aa 0d | 9f bb 2e af b7 64 43 c0 5f 21 ab ad ca 4c c4 bd | 11 a7 3a 9f 89 1f e1 4e cc b3 7c 12 a4 19 cf 86 | c6 87 c1 d0 2a 94 8b 9d e9 35 39 07 a6 9c a3 ed | a8 ce d3 e4 53 a5 82 df 4f 1f e0 bc b2 92 cb c6 | 39 04 f1 75 75 72 f5 1c aa 6f d5 6e 3c f8 04 ed | 37 5d a6 8b b9 ef fe 51 d8 f6 f3 f2 4d a5 ca 6d | 2e b0 a4 75 6d ce 0d 14 13 47 fc 6e 77 45 1a 17 | c4 a3 61 af 3a a4 0b d3 f5 57 8f f2 6f 78 70 d1 | c2 a7 16 f6 5c 3a 00 46 05 30 36 7f b8 3f 18 36 | 35 33 11 0a 75 c5 6f f6 65 a7 05 28 7c e1 b9 fd | 51 6f f2 9e cd 9f 64 c9 9d fe 9b c7 f0 06 55 5a | bb ef dc 4c be 29 e4 94 b5 10 3f 65 5d 8b 1c e0 | 29 00 00 24 46 b5 f0 72 e3 2a 70 ff f4 67 d5 b0 | a0 ba f1 3f 75 bf 45 d4 30 d2 c3 b1 ff a8 07 cc | a0 44 98 ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 19 8a cb f1 5b 38 5c d3 a5 bc 6a | dc b7 35 41 12 44 0c ab 00 00 00 1c 00 00 40 05 | e6 3e dd 6e 01 07 35 ad c6 0c f8 90 bb 33 8c f2 | 78 f1 d6 dc | state #528 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388027c10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a72150 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #528 | libevent_malloc: new ptr-libevent@0x7fb388027c10 size 128 | #528 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.197204 | resume sending helper answer for #528 suppresed complete_v2_state_transition() and stole MD | #528 spent 0.304 milliseconds in resume sending helper answer | stop processing: state #528 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388054710 | timer_event_cb: processing event@0x557d46b0bf80 | handling event EVENT_SA_EXPIRE for parent state #305 | start processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #305 | un-established partial CHILD SA timeout (SA expired) | pstats #305 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #305 ikev2.ike deleted exchange-timeout | #305 spent 2.79 milliseconds in total | [RE]START processing: state #305 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-53" #305: deleting state (STATE_PARENT_I1) aged 51.115s and NOT sending notification | parent state #305: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #305 "road-eastnet-nonat-53" #305: deleting IKE SA for connection 'road-eastnet-nonat-53' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-53' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-53 | State DB: deleting IKEv2 state #305 in PARENT_I1 | parent state #305: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #305 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bd4750 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b0bf80 | in statetime_stop() and could not find #305 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c7c170 | handling event EVENT_SA_EXPIRE for parent state #484 | start processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #484 | un-established partial CHILD SA timeout (SA expired) | pstats #484 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #484 ikev2.ike deleted exchange-timeout | #484 spent 2.05 milliseconds in total | [RE]START processing: state #484 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-232" #484: deleting state (STATE_PARENT_I1) aged 36.727s and NOT sending notification | parent state #484: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #484 "road-eastnet-nonat-232" #484: deleting IKE SA for connection 'road-eastnet-nonat-232' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-232' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-232 | State DB: deleting IKEv2 state #484 in PARENT_I1 | parent state #484: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #484 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c7c1b0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c7c170 | in statetime_stop() and could not find #484 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c7aa10 | handling event EVENT_SA_EXPIRE for parent state #490 | start processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #490 | un-established partial CHILD SA timeout (SA expired) | pstats #490 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #490 ikev2.ike deleted exchange-timeout | #490 spent 2.2 milliseconds in total | [RE]START processing: state #490 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-238" #490: deleting state (STATE_PARENT_I1) aged 35.965s and NOT sending notification | parent state #490: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #490 "road-eastnet-nonat-238" #490: deleting IKE SA for connection 'road-eastnet-nonat-238' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-238' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-238 | State DB: deleting IKEv2 state #490 in PARENT_I1 | parent state #490: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #490 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c7aa50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c7aa10 | in statetime_stop() and could not find #490 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469fbb00 | handling event EVENT_SA_EXPIRE for parent state #322 | start processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #322 | un-established partial CHILD SA timeout (SA expired) | pstats #322 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #322 ikev2.ike deleted exchange-timeout | #322 spent 2.31 milliseconds in total | [RE]START processing: state #322 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-70" #322: deleting state (STATE_PARENT_I1) aged 49.808s and NOT sending notification | parent state #322: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #322 "road-eastnet-nonat-70" #322: deleting IKE SA for connection 'road-eastnet-nonat-70' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-70' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-70 | State DB: deleting IKEv2 state #322 in PARENT_I1 | parent state #322: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #322 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d469e1b60 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d469fbb00 | in statetime_stop() and could not find #322 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46abe740 | handling event EVENT_SA_EXPIRE for parent state #344 | start processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #344 | un-established partial CHILD SA timeout (SA expired) | pstats #344 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #344 ikev2.ike deleted exchange-timeout | #344 spent 1.88 milliseconds in total | [RE]START processing: state #344 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-92" #344: deleting state (STATE_PARENT_I1) aged 48.295s and NOT sending notification | parent state #344: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #344 "road-eastnet-nonat-92" #344: deleting IKE SA for connection 'road-eastnet-nonat-92' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-92' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-92 | State DB: deleting IKEv2 state #344 in PARENT_I1 | parent state #344: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #344 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46afba00 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46abe740 | in statetime_stop() and could not find #344 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469ddbf0 | handling event EVENT_SA_EXPIRE for parent state #342 | start processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #342 | un-established partial CHILD SA timeout (SA expired) | pstats #342 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #342 ikev2.ike deleted exchange-timeout | #342 spent 2.21 milliseconds in total | [RE]START processing: state #342 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-90" #342: deleting state (STATE_PARENT_I1) aged 48.453s and NOT sending notification | parent state #342: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #342 "road-eastnet-nonat-90" #342: deleting IKE SA for connection 'road-eastnet-nonat-90' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-90' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-90 | State DB: deleting IKEv2 state #342 in PARENT_I1 | parent state #342: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #342 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b7e350 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d469ddbf0 | in statetime_stop() and could not find #342 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46abfd80 | handling event EVENT_SA_EXPIRE for parent state #315 | start processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #315 | un-established partial CHILD SA timeout (SA expired) | pstats #315 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #315 ikev2.ike deleted exchange-timeout | #315 spent 1.78 milliseconds in total | [RE]START processing: state #315 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-63" #315: deleting state (STATE_PARENT_I1) aged 50.278s and NOT sending notification | parent state #315: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #315 "road-eastnet-nonat-63" #315: deleting IKE SA for connection 'road-eastnet-nonat-63' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-63' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-63 | State DB: deleting IKEv2 state #315 in PARENT_I1 | parent state #315: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #315 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bd3050 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46abfd80 | in statetime_stop() and could not find #315 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c792b0 | handling event EVENT_SA_EXPIRE for parent state #426 | start processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #426 | un-established partial CHILD SA timeout (SA expired) | pstats #426 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #426 ikev2.ike deleted exchange-timeout | #426 spent 2.17 milliseconds in total | [RE]START processing: state #426 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-174" #426: deleting state (STATE_PARENT_I1) aged 42.374s and NOT sending notification | parent state #426: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #426 "road-eastnet-nonat-174" #426: deleting IKE SA for connection 'road-eastnet-nonat-174' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-174' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-174 | State DB: deleting IKEv2 state #426 in PARENT_I1 | parent state #426: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #426 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c792f0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c792b0 | in statetime_stop() and could not find #426 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c77b50 | handling event EVENT_SA_EXPIRE for parent state #472 | start processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #472 | un-established partial CHILD SA timeout (SA expired) | pstats #472 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #472 ikev2.ike deleted exchange-timeout | #472 spent 2.28 milliseconds in total | [RE]START processing: state #472 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-220" #472: deleting state (STATE_PARENT_I1) aged 38.048s and NOT sending notification | parent state #472: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #472 "road-eastnet-nonat-220" #472: deleting IKE SA for connection 'road-eastnet-nonat-220' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-220' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-220 | State DB: deleting IKEv2 state #472 in PARENT_I1 | parent state #472: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #472 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c77b90 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c77b50 | in statetime_stop() and could not find #472 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a9f380 | handling event EVENT_SA_EXPIRE for parent state #416 | start processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #416 | un-established partial CHILD SA timeout (SA expired) | pstats #416 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #416 ikev2.ike deleted exchange-timeout | #416 spent 2.7 milliseconds in total | [RE]START processing: state #416 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-164" #416: deleting state (STATE_PARENT_I1) aged 43.053s and NOT sending notification | parent state #416: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #416 "road-eastnet-nonat-164" #416: deleting IKE SA for connection 'road-eastnet-nonat-164' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-164' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-164 | State DB: deleting IKEv2 state #416 in PARENT_I1 | parent state #416: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #416 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bd1950 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a9f380 | in statetime_stop() and could not find #416 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c763f0 | handling event EVENT_SA_EXPIRE for parent state #474 | start processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #474 | un-established partial CHILD SA timeout (SA expired) | pstats #474 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #474 ikev2.ike deleted exchange-timeout | #474 spent 3.01 milliseconds in total | [RE]START processing: state #474 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-222" #474: deleting state (STATE_PARENT_I1) aged 37.846s and NOT sending notification | parent state #474: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #474 "road-eastnet-nonat-222" #474: deleting IKE SA for connection 'road-eastnet-nonat-222' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-222' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-222 | State DB: deleting IKEv2 state #474 in PARENT_I1 | parent state #474: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #474 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c76430 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c763f0 | in statetime_stop() and could not find #474 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c74c90 | handling event EVENT_SA_EXPIRE for parent state #499 | start processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #499 | un-established partial CHILD SA timeout (SA expired) | pstats #499 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #499 ikev2.ike deleted exchange-timeout | #499 spent 2.61 milliseconds in total | [RE]START processing: state #499 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-247" #499: deleting state (STATE_PARENT_I1) aged 34.836s and NOT sending notification | parent state #499: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #499 "road-eastnet-nonat-247" #499: deleting IKE SA for connection 'road-eastnet-nonat-247' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-247' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-247 | State DB: deleting IKEv2 state #499 in PARENT_I1 | parent state #499: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #499 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c74cd0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c74c90 | in statetime_stop() and could not find #499 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a24730 | handling event EVENT_SA_EXPIRE for parent state #273 | start processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #273 | un-established partial CHILD SA timeout (SA expired) | pstats #273 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #273 ikev2.ike deleted exchange-timeout | #273 spent 2.6 milliseconds in total | [RE]START processing: state #273 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-21" #273: deleting state (STATE_PARENT_I1) aged 53.544s and NOT sending notification | parent state #273: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #273 "road-eastnet-nonat-21" #273: deleting IKE SA for connection 'road-eastnet-nonat-21' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-21' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-21 | State DB: deleting IKEv2 state #273 in PARENT_I1 | parent state #273: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #273 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b7cc50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a24730 | in statetime_stop() and could not find #273 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ae9fc0 | handling event EVENT_SA_EXPIRE for parent state #391 | start processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #391 | un-established partial CHILD SA timeout (SA expired) | pstats #391 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #391 ikev2.ike deleted exchange-timeout | #391 spent 2.09 milliseconds in total | [RE]START processing: state #391 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-139" #391: deleting state (STATE_PARENT_I1) aged 44.708s and NOT sending notification | parent state #391: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #391 "road-eastnet-nonat-139" #391: deleting IKE SA for connection 'road-eastnet-nonat-139' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-139' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-139 | State DB: deleting IKEv2 state #391 in PARENT_I1 | parent state #391: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #391 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bd0250 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46ae9fc0 | in statetime_stop() and could not find #391 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c73530 | handling event EVENT_SA_EXPIRE for parent state #486 | start processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #486 | un-established partial CHILD SA timeout (SA expired) | pstats #486 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #486 ikev2.ike deleted exchange-timeout | #486 spent 2.06 milliseconds in total | [RE]START processing: state #486 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-234" #486: deleting state (STATE_PARENT_I1) aged 36.468s and NOT sending notification | parent state #486: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #486 "road-eastnet-nonat-234" #486: deleting IKE SA for connection 'road-eastnet-nonat-234' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-234' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-234 | State DB: deleting IKEv2 state #486 in PARENT_I1 | parent state #486: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #486 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c73570 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c73530 | in statetime_stop() and could not find #486 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c71dd0 | handling event EVENT_SA_EXPIRE for parent state #492 | start processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #492 | un-established partial CHILD SA timeout (SA expired) | pstats #492 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #492 ikev2.ike deleted exchange-timeout | #492 spent 2.29 milliseconds in total | [RE]START processing: state #492 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-240" #492: deleting state (STATE_PARENT_I1) aged 35.795s and NOT sending notification | parent state #492: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #492 "road-eastnet-nonat-240" #492: deleting IKE SA for connection 'road-eastnet-nonat-240' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-240' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-240 | State DB: deleting IKEv2 state #492 in PARENT_I1 | parent state #492: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #492 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c71e10 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c71dd0 | in statetime_stop() and could not find #492 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a4ebd0 | handling event EVENT_SA_EXPIRE for parent state #417 | start processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #417 | un-established partial CHILD SA timeout (SA expired) | pstats #417 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #417 ikev2.ike deleted exchange-timeout | #417 spent 2.02 milliseconds in total | [RE]START processing: state #417 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-165" #417: deleting state (STATE_PARENT_I1) aged 42.993s and NOT sending notification | parent state #417: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #417 "road-eastnet-nonat-165" #417: deleting IKE SA for connection 'road-eastnet-nonat-165' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-165' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-165 | State DB: deleting IKEv2 state #417 in PARENT_I1 | parent state #417: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #417 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bceb50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a4ebd0 | in statetime_stop() and could not find #417 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c70670 | handling event EVENT_SA_EXPIRE for parent state #468 | start processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #468 | un-established partial CHILD SA timeout (SA expired) | pstats #468 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #468 ikev2.ike deleted exchange-timeout | #468 spent 2.55 milliseconds in total | [RE]START processing: state #468 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-216" #468: deleting state (STATE_PARENT_I1) aged 38.541s and NOT sending notification | parent state #468: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #468 "road-eastnet-nonat-216" #468: deleting IKE SA for connection 'road-eastnet-nonat-216' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-216' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-216 | State DB: deleting IKEv2 state #468 in PARENT_I1 | parent state #468: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #468 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c706b0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c70670 | in statetime_stop() and could not find #468 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c6ef10 | handling event EVENT_SA_EXPIRE for parent state #462 | start processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #462 | un-established partial CHILD SA timeout (SA expired) | pstats #462 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #462 ikev2.ike deleted exchange-timeout | #462 spent 2.25 milliseconds in total | [RE]START processing: state #462 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-210" #462: deleting state (STATE_PARENT_I1) aged 39.134s and NOT sending notification | parent state #462: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #462 "road-eastnet-nonat-210" #462: deleting IKE SA for connection 'road-eastnet-nonat-210' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-210' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-210 | State DB: deleting IKEv2 state #462 in PARENT_I1 | parent state #462: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #462 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c6ef50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c6ef10 | in statetime_stop() and could not find #462 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aba600 | handling event EVENT_SA_EXPIRE for parent state #386 | start processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #386 | un-established partial CHILD SA timeout (SA expired) | pstats #386 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #386 ikev2.ike deleted exchange-timeout | #386 spent 2.79 milliseconds in total | [RE]START processing: state #386 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-134" #386: deleting state (STATE_PARENT_I1) aged 45.042s and NOT sending notification | parent state #386: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #386 "road-eastnet-nonat-134" #386: deleting IKE SA for connection 'road-eastnet-nonat-134' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-134' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-134 | State DB: deleting IKEv2 state #386 in PARENT_I1 | parent state #386: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #386 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46afa440 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46aba600 | in statetime_stop() and could not find #386 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469e8820 | handling event EVENT_SA_EXPIRE for parent state #282 | start processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #282 | un-established partial CHILD SA timeout (SA expired) | pstats #282 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #282 ikev2.ike deleted exchange-timeout | #282 spent 2.61 milliseconds in total | [RE]START processing: state #282 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-30" #282: deleting state (STATE_PARENT_I1) aged 52.803s and NOT sending notification | parent state #282: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #282 "road-eastnet-nonat-30" #282: deleting IKE SA for connection 'road-eastnet-nonat-30' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-30' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-30 | State DB: deleting IKEv2 state #282 in PARENT_I1 | parent state #282: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #282 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b7b550 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d469e8820 | in statetime_stop() and could not find #282 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a63210 | handling event EVENT_SA_EXPIRE for parent state #294 | start processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #294 | un-established partial CHILD SA timeout (SA expired) | pstats #294 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #294 ikev2.ike deleted exchange-timeout | #294 spent 2.24 milliseconds in total | [RE]START processing: state #294 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-42" #294: deleting state (STATE_PARENT_I1) aged 51.902s and NOT sending notification | parent state #294: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #294 "road-eastnet-nonat-42" #294: deleting IKE SA for connection 'road-eastnet-nonat-42' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-42' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-42 | State DB: deleting IKEv2 state #294 in PARENT_I1 | parent state #294: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #294 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bcd450 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a63210 | in statetime_stop() and could not find #294 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c6d7b0 | handling event EVENT_SA_EXPIRE for parent state #451 | start processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #451 | un-established partial CHILD SA timeout (SA expired) | pstats #451 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #451 ikev2.ike deleted exchange-timeout | #451 spent 2.42 milliseconds in total | [RE]START processing: state #451 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-199" #451: deleting state (STATE_PARENT_I1) aged 40.247s and NOT sending notification | parent state #451: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #451 "road-eastnet-nonat-199" #451: deleting IKE SA for connection 'road-eastnet-nonat-199' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-199' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-199 | State DB: deleting IKEv2 state #451 in PARENT_I1 | parent state #451: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #451 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c6d7f0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c6d7b0 | in statetime_stop() and could not find #451 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c6c050 | handling event EVENT_SA_EXPIRE for parent state #448 | start processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #448 | un-established partial CHILD SA timeout (SA expired) | pstats #448 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #448 ikev2.ike deleted exchange-timeout | #448 spent 3.41 milliseconds in total | [RE]START processing: state #448 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-196" #448: deleting state (STATE_PARENT_I1) aged 40.548s and NOT sending notification | parent state #448: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #448 "road-eastnet-nonat-196" #448: deleting IKE SA for connection 'road-eastnet-nonat-196' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-196' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-196 | State DB: deleting IKEv2 state #448 in PARENT_I1 | parent state #448: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #448 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c6c090 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c6c050 | in statetime_stop() and could not find #448 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a77850 | handling event EVENT_SA_EXPIRE for parent state #277 | start processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #277 | un-established partial CHILD SA timeout (SA expired) | pstats #277 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #277 ikev2.ike deleted exchange-timeout | #277 spent 1.89 milliseconds in total | [RE]START processing: state #277 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-25" #277: deleting state (STATE_PARENT_I1) aged 53.167s and NOT sending notification | parent state #277: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #277 "road-eastnet-nonat-25" #277: deleting IKE SA for connection 'road-eastnet-nonat-25' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-25' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-25 | State DB: deleting IKEv2 state #277 in PARENT_I1 | parent state #277: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #277 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bcbd50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a77850 | in statetime_stop() and could not find #277 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c6a8f0 | handling event EVENT_SA_EXPIRE for parent state #442 | start processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #442 | un-established partial CHILD SA timeout (SA expired) | pstats #442 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #442 ikev2.ike deleted exchange-timeout | #442 spent 3.36 milliseconds in total | [RE]START processing: state #442 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-190" #442: deleting state (STATE_PARENT_I1) aged 41.050s and NOT sending notification | parent state #442: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #442 "road-eastnet-nonat-190" #442: deleting IKE SA for connection 'road-eastnet-nonat-190' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-190' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-190 | State DB: deleting IKEv2 state #442 in PARENT_I1 | parent state #442: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #442 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c6a930 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c6a8f0 | in statetime_stop() and could not find #442 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #522 | start processing: state #522 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 522 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #522 | **emit ISAKMP Message: | initiator cookie: | 10 b1 a0 1e 00 fa a9 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-78 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8f 03 12 29 26 7f 65 c7 68 c4 9a d0 af 8e ee 58 | ikev2 g^x 00 c2 bb 14 15 7c 0a 86 41 89 01 e3 50 59 e6 9d | ikev2 g^x 21 20 fe 10 1d 52 36 f5 79 ed a1 2e a4 48 7f 36 | ikev2 g^x 55 11 2c 17 77 fe f8 b5 19 dc d2 b7 81 ea a8 4f | ikev2 g^x 58 de c6 bf 75 6a 59 91 22 64 63 fd 91 bc 44 f5 | ikev2 g^x fb fc 62 8d 40 09 00 e8 46 d1 fa ee d8 ea e1 b2 | ikev2 g^x f5 ff 3e 58 e5 93 cd a0 c0 0b 6c d4 34 85 8d de | ikev2 g^x 24 69 63 0b 77 53 a3 8f bc dc 79 d3 e0 07 c6 0f | ikev2 g^x b6 c3 f5 75 53 b4 1f 79 ed 6e d0 df 07 c3 f0 12 | ikev2 g^x 58 d9 7f d3 29 ec fa 74 4a b2 3b 5a bd 60 bd c0 | ikev2 g^x 31 c1 ac c7 51 45 8d 69 c4 5a 44 c1 9e 1d 54 f3 | ikev2 g^x 3f 29 e3 14 29 d3 ff 9f 4c 6d 49 97 9d 65 a8 01 | ikev2 g^x e3 b8 ae c9 76 a9 8a 4c 13 37 d8 a6 c9 90 05 b2 | ikev2 g^x 56 78 1c 8e b1 63 ce 03 b4 28 7f e6 b1 a5 59 d4 | ikev2 g^x f8 a3 6b 86 00 eb 6f c1 03 34 cf 9d 47 16 c9 f4 | ikev2 g^x fc a0 47 b8 e3 a2 18 1a f8 87 2d 2f b9 c5 65 a4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ef 86 5c 01 c3 c5 84 cc db a0 c4 f8 4b 5f 8a 0f | IKEv2 nonce 84 0f d8 a2 60 5e 95 d4 2a 5b da 43 eb c8 3e 92 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 10 b1 a0 1e 00 fa a9 4e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4e | natd_hash: port= 01 f4 | natd_hash: hash= f7 98 24 f3 3c 5a 10 4a 5f ba 19 5c 79 3c 94 1f | natd_hash: hash= f7 ad ac c2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f7 98 24 f3 3c 5a 10 4a 5f ba 19 5c 79 3c 94 1f | Notify data f7 ad ac c2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 10 b1 a0 1e 00 fa a9 4e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 01 72 52 9e ac 8f 8c 48 d1 ab 04 59 e9 b8 14 4b | natd_hash: hash= b7 ae 1e 1b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 01 72 52 9e ac 8f 8c 48 d1 ab 04 59 e9 b8 14 4b | Notify data b7 ae 1e 1b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #522 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #522 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #522 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #522: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #522 to 4294967295 after switching state | Message ID: IKE #522 skipping update_recv as MD is fake | Message ID: sent #522 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-78" #522: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.78:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #522) | 10 b1 a0 1e 00 fa a9 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 03 12 29 26 7f 65 c7 68 c4 9a d0 af 8e ee 58 | 00 c2 bb 14 15 7c 0a 86 41 89 01 e3 50 59 e6 9d | 21 20 fe 10 1d 52 36 f5 79 ed a1 2e a4 48 7f 36 | 55 11 2c 17 77 fe f8 b5 19 dc d2 b7 81 ea a8 4f | 58 de c6 bf 75 6a 59 91 22 64 63 fd 91 bc 44 f5 | fb fc 62 8d 40 09 00 e8 46 d1 fa ee d8 ea e1 b2 | f5 ff 3e 58 e5 93 cd a0 c0 0b 6c d4 34 85 8d de | 24 69 63 0b 77 53 a3 8f bc dc 79 d3 e0 07 c6 0f | b6 c3 f5 75 53 b4 1f 79 ed 6e d0 df 07 c3 f0 12 | 58 d9 7f d3 29 ec fa 74 4a b2 3b 5a bd 60 bd c0 | 31 c1 ac c7 51 45 8d 69 c4 5a 44 c1 9e 1d 54 f3 | 3f 29 e3 14 29 d3 ff 9f 4c 6d 49 97 9d 65 a8 01 | e3 b8 ae c9 76 a9 8a 4c 13 37 d8 a6 c9 90 05 b2 | 56 78 1c 8e b1 63 ce 03 b4 28 7f e6 b1 a5 59 d4 | f8 a3 6b 86 00 eb 6f c1 03 34 cf 9d 47 16 c9 f4 | fc a0 47 b8 e3 a2 18 1a f8 87 2d 2f b9 c5 65 a4 | 29 00 00 24 ef 86 5c 01 c3 c5 84 cc db a0 c4 f8 | 4b 5f 8a 0f 84 0f d8 a2 60 5e 95 d4 2a 5b da 43 | eb c8 3e 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 98 24 f3 3c 5a 10 4a 5f ba 19 5c | 79 3c 94 1f f7 ad ac c2 00 00 00 1c 00 00 40 05 | 01 72 52 9e ac 8f 8c 48 d1 ab 04 59 e9 b8 14 4b | b7 ae 1e 1b | state #522 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34001e520 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34000f1f0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388020d10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #522 | libevent_malloc: new ptr-libevent@0x7fb388054710 size 128 | #522 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.198679 | resume sending helper answer for #522 suppresed complete_v2_state_transition() and stole MD | #522 spent 0.319 milliseconds in resume sending helper answer | stop processing: state #522 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38004e900 | processing resume sending helper answer for #507 | start processing: state #507 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 507 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #507 | **emit ISAKMP Message: | initiator cookie: | da 78 05 0d 9b 70 b9 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-243 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 78 46 e0 88 a0 30 a2 10 b6 db db 18 a9 1a b3 9a | ikev2 g^x c5 54 fb 3f 15 80 c7 25 e6 f4 59 fe 6e fc 4f d8 | ikev2 g^x 8b ec 98 88 97 ce 89 12 e0 f6 7c 60 70 3c 7d 2f | ikev2 g^x 85 8c 92 e6 f5 10 00 45 4e 0d f3 d7 24 70 70 ea | ikev2 g^x f1 31 c4 5b 48 d6 07 d8 da 3d 7f e0 08 dc 0f 9e | ikev2 g^x 22 03 73 c9 0e c4 1b 51 bf f2 38 8e 38 b6 fd d5 | ikev2 g^x 22 d5 92 08 9a e7 f3 0b 25 d0 d9 dd 1b 26 88 06 | ikev2 g^x d6 8f 78 7c 97 0a 2b d5 ae 86 6d 27 bc ca 56 2a | ikev2 g^x 75 f9 bc 7a 04 89 9f bf e0 ea fc 39 80 a6 03 c7 | ikev2 g^x 0c 27 76 fa 8e 3c c4 79 8c d8 25 1c e4 00 76 60 | ikev2 g^x ce 83 c9 6c f4 f0 61 2d eb 79 e9 72 7a 2c 98 fa | ikev2 g^x 1c cb e8 81 62 75 a2 1d ab 8a ff 63 87 4e 5e fa | ikev2 g^x 9c 7c 66 c5 3e 4d ee d7 ea 85 5e 26 e2 62 57 07 | ikev2 g^x b7 3a e7 80 5f 3e 54 3a 0c 1b dd 9d e4 1a 64 e7 | ikev2 g^x dc 8d 0e 26 5e 1d 1f b4 2e 68 e8 a0 88 3b 2a 21 | ikev2 g^x 54 99 7c 47 f7 0c ba 8c f4 5a ab 15 bd ae eb 38 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 49 65 e9 20 14 20 1a 38 1c 59 3c 48 eb 8b 7a 8d | IKEv2 nonce ba 7b 14 a8 53 47 20 f7 ff f7 d4 ec 05 75 53 f3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= da 78 05 0d 9b 70 b9 e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f3 | natd_hash: port= 01 f4 | natd_hash: hash= 9d 67 d1 c8 0a fd 9b 5e 47 d4 f9 45 3b 65 86 81 | natd_hash: hash= 4c 3e 0b eb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9d 67 d1 c8 0a fd 9b 5e 47 d4 f9 45 3b 65 86 81 | Notify data 4c 3e 0b eb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= da 78 05 0d 9b 70 b9 e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9f 6a dc 5d 73 87 7f 7b 13 63 32 fe 29 c9 d7 13 | natd_hash: hash= 68 73 c8 6f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9f 6a dc 5d 73 87 7f 7b 13 63 32 fe 29 c9 d7 13 | Notify data 68 73 c8 6f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #507 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #507 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #507 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #507: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #507 to 4294967295 after switching state | Message ID: IKE #507 skipping update_recv as MD is fake | Message ID: sent #507 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-243" #507: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.243:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #507) | da 78 05 0d 9b 70 b9 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 46 e0 88 a0 30 a2 10 b6 db db 18 a9 1a b3 9a | c5 54 fb 3f 15 80 c7 25 e6 f4 59 fe 6e fc 4f d8 | 8b ec 98 88 97 ce 89 12 e0 f6 7c 60 70 3c 7d 2f | 85 8c 92 e6 f5 10 00 45 4e 0d f3 d7 24 70 70 ea | f1 31 c4 5b 48 d6 07 d8 da 3d 7f e0 08 dc 0f 9e | 22 03 73 c9 0e c4 1b 51 bf f2 38 8e 38 b6 fd d5 | 22 d5 92 08 9a e7 f3 0b 25 d0 d9 dd 1b 26 88 06 | d6 8f 78 7c 97 0a 2b d5 ae 86 6d 27 bc ca 56 2a | 75 f9 bc 7a 04 89 9f bf e0 ea fc 39 80 a6 03 c7 | 0c 27 76 fa 8e 3c c4 79 8c d8 25 1c e4 00 76 60 | ce 83 c9 6c f4 f0 61 2d eb 79 e9 72 7a 2c 98 fa | 1c cb e8 81 62 75 a2 1d ab 8a ff 63 87 4e 5e fa | 9c 7c 66 c5 3e 4d ee d7 ea 85 5e 26 e2 62 57 07 | b7 3a e7 80 5f 3e 54 3a 0c 1b dd 9d e4 1a 64 e7 | dc 8d 0e 26 5e 1d 1f b4 2e 68 e8 a0 88 3b 2a 21 | 54 99 7c 47 f7 0c ba 8c f4 5a ab 15 bd ae eb 38 | 29 00 00 24 49 65 e9 20 14 20 1a 38 1c 59 3c 48 | eb 8b 7a 8d ba 7b 14 a8 53 47 20 f7 ff f7 d4 ec | 05 75 53 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 67 d1 c8 0a fd 9b 5e 47 d4 f9 45 | 3b 65 86 81 4c 3e 0b eb 00 00 00 1c 00 00 40 05 | 9f 6a dc 5d 73 87 7f 7b 13 63 32 fe 29 c9 d7 13 | 68 73 c8 6f | state #507 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb364034150 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a88140 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a88140 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #507 | libevent_malloc: new ptr-libevent@0x7fb38004e900 size 128 | #507 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.199042 | resume sending helper answer for #507 suppresed complete_v2_state_transition() and stole MD | #507 spent 0.349 milliseconds in resume sending helper answer | stop processing: state #507 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb374039ac0 | timer_event_cb: processing event@0x557d469ef4e0 | handling event EVENT_SA_EXPIRE for parent state #261 | start processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #261 | un-established partial CHILD SA timeout (SA expired) | pstats #261 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #261 ikev2.ike deleted exchange-timeout | #261 spent 2.03 milliseconds in total | [RE]START processing: state #261 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-9" #261: deleting state (STATE_PARENT_I1) aged 54.864s and NOT sending notification | parent state #261: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #261 "road-eastnet-nonat-9" #261: deleting IKE SA for connection 'road-eastnet-nonat-9' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-9' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-9 | State DB: deleting IKEv2 state #261 in PARENT_I1 | parent state #261: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #261 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b79e50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d469ef4e0 | in statetime_stop() and could not find #261 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a74cd0 | handling event EVENT_SA_EXPIRE for parent state #299 | start processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #299 | un-established partial CHILD SA timeout (SA expired) | pstats #299 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #299 ikev2.ike deleted exchange-timeout | #299 spent 2.21 milliseconds in total | [RE]START processing: state #299 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-47" #299: deleting state (STATE_PARENT_I1) aged 51.534s and NOT sending notification | parent state #299: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #299 "road-eastnet-nonat-47" #299: deleting IKE SA for connection 'road-eastnet-nonat-47' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-47' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-47 | State DB: deleting IKEv2 state #299 in PARENT_I1 | parent state #299: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #299 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bca650 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a74cd0 | in statetime_stop() and could not find #299 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #518 | start processing: state #518 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 518 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #518 | **emit ISAKMP Message: | initiator cookie: | 76 4a 29 e2 f2 d8 10 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-45 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 07 c8 e5 72 ad e8 a3 0b ee c0 19 d4 04 c4 59 f2 | ikev2 g^x f9 f1 ca 1e 44 30 31 b6 02 9f ea 8d f7 77 56 d9 | ikev2 g^x 34 17 5d e6 6c 33 4b fe c1 d5 87 da 08 49 a5 40 | ikev2 g^x 98 09 8f 0e 2b 61 5a 8d da 29 4b bd c0 aa 20 47 | ikev2 g^x 00 81 73 86 5a d8 e0 95 46 03 64 29 8f 09 e9 05 | ikev2 g^x 09 84 fc 9f 58 0c 86 5c df 03 a7 05 8c 64 28 10 | ikev2 g^x 34 e7 f2 6f 51 06 b7 7b d1 ca 6d cd b3 c2 7b 80 | ikev2 g^x d1 48 6c 1b c4 58 91 31 ee a7 4a 59 32 08 ac f1 | ikev2 g^x fb 22 a3 96 1a 08 94 a4 84 91 22 e8 1e b0 a5 1b | ikev2 g^x a0 ee 59 f9 33 09 49 a4 f5 f9 da 80 62 31 32 f0 | ikev2 g^x d4 2b 3c ed f7 50 71 be ae 41 93 27 28 9d 7a 12 | ikev2 g^x 34 9e 0f 57 03 18 c9 b6 fe 98 3d 22 d1 c6 fe fa | ikev2 g^x 13 55 9a 4d 9d aa b8 6e 37 5c 88 37 98 3a 93 4a | ikev2 g^x fe 8e 63 5e f1 55 52 38 2a df 4e e5 01 10 1b 19 | ikev2 g^x c9 ff a3 28 16 59 44 48 e1 e5 35 ac fe f5 c2 26 | ikev2 g^x 2f 84 3f c3 36 51 80 d7 d9 96 f6 1f 3a 61 bc 30 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce da 23 2e 07 94 56 ee 0d 82 96 38 43 7b 89 61 bd | IKEv2 nonce ba 2a 55 d7 d5 50 63 47 84 e9 fa b5 93 54 75 96 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 76 4a 29 e2 f2 d8 10 a0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2d | natd_hash: port= 01 f4 | natd_hash: hash= 41 48 88 0f 47 92 b8 68 b9 d0 c9 2b 02 14 06 d6 | natd_hash: hash= 2c b1 12 61 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 41 48 88 0f 47 92 b8 68 b9 d0 c9 2b 02 14 06 d6 | Notify data 2c b1 12 61 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 76 4a 29 e2 f2 d8 10 a0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a7 a4 34 d2 94 1c 56 72 07 98 0d cb 3d d8 f1 6e | natd_hash: hash= 48 f0 c0 ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a7 a4 34 d2 94 1c 56 72 07 98 0d cb 3d d8 f1 6e | Notify data 48 f0 c0 ed | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #518 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #518 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #518 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #518: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #518 to 4294967295 after switching state | Message ID: IKE #518 skipping update_recv as MD is fake | Message ID: sent #518 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-45" #518: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.45:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #518) | 76 4a 29 e2 f2 d8 10 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 c8 e5 72 ad e8 a3 0b ee c0 19 d4 04 c4 59 f2 | f9 f1 ca 1e 44 30 31 b6 02 9f ea 8d f7 77 56 d9 | 34 17 5d e6 6c 33 4b fe c1 d5 87 da 08 49 a5 40 | 98 09 8f 0e 2b 61 5a 8d da 29 4b bd c0 aa 20 47 | 00 81 73 86 5a d8 e0 95 46 03 64 29 8f 09 e9 05 | 09 84 fc 9f 58 0c 86 5c df 03 a7 05 8c 64 28 10 | 34 e7 f2 6f 51 06 b7 7b d1 ca 6d cd b3 c2 7b 80 | d1 48 6c 1b c4 58 91 31 ee a7 4a 59 32 08 ac f1 | fb 22 a3 96 1a 08 94 a4 84 91 22 e8 1e b0 a5 1b | a0 ee 59 f9 33 09 49 a4 f5 f9 da 80 62 31 32 f0 | d4 2b 3c ed f7 50 71 be ae 41 93 27 28 9d 7a 12 | 34 9e 0f 57 03 18 c9 b6 fe 98 3d 22 d1 c6 fe fa | 13 55 9a 4d 9d aa b8 6e 37 5c 88 37 98 3a 93 4a | fe 8e 63 5e f1 55 52 38 2a df 4e e5 01 10 1b 19 | c9 ff a3 28 16 59 44 48 e1 e5 35 ac fe f5 c2 26 | 2f 84 3f c3 36 51 80 d7 d9 96 f6 1f 3a 61 bc 30 | 29 00 00 24 da 23 2e 07 94 56 ee 0d 82 96 38 43 | 7b 89 61 bd ba 2a 55 d7 d5 50 63 47 84 e9 fa b5 | 93 54 75 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 48 88 0f 47 92 b8 68 b9 d0 c9 2b | 02 14 06 d6 2c b1 12 61 00 00 00 1c 00 00 40 05 | a7 a4 34 d2 94 1c 56 72 07 98 0d cb 3d d8 f1 6e | 48 f0 c0 ed | state #518 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c029490 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a45310 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374024fd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #518 | libevent_malloc: new ptr-libevent@0x7fb374039ac0 size 128 | #518 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.199479 | resume sending helper answer for #518 suppresed complete_v2_state_transition() and stole MD | #518 spent 0.284 milliseconds in resume sending helper answer | stop processing: state #518 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34004e2d0 | processing resume sending helper answer for #514 | start processing: state #514 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 514 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #514 | **emit ISAKMP Message: | initiator cookie: | 06 7a 17 75 fd ae cb 88 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-33 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d8 5a 8f 50 94 ac f5 36 99 70 0a 59 72 e7 bd 59 | ikev2 g^x 0f 36 90 cd 5c c6 89 e0 75 bc 28 73 40 e2 7d cc | ikev2 g^x 29 c4 5a 70 07 f4 b5 86 f2 2a b0 3c a2 25 4e 6d | ikev2 g^x 20 3c ce c4 4f 4c 58 ae 19 d4 cf fe ba 7b fa f1 | ikev2 g^x f3 e2 9e 67 a4 d8 72 7c d5 14 6c e6 e7 e2 c6 3e | ikev2 g^x 8d 4b 48 dd c7 d4 8e 53 66 3c b7 1b 8d fe 66 bf | ikev2 g^x 89 1e 91 a6 67 0a 3d 11 cd 2a 13 4b 79 22 34 46 | ikev2 g^x 3b be d5 2d 70 4a 7d b9 7c b7 da 21 75 dc 69 65 | ikev2 g^x 39 db b4 a1 e9 27 93 e6 22 84 44 fb 74 c7 5b f7 | ikev2 g^x bf 99 8c 9e d0 24 31 9c 4c cb 86 84 f0 20 fe be | ikev2 g^x c1 25 55 19 f9 b6 06 e1 9a 9a e7 2d 88 3e 42 9f | ikev2 g^x 4c 92 e0 a8 c0 b6 61 d6 11 42 34 e8 2d 23 a1 54 | ikev2 g^x a1 d1 b5 28 f0 8d fb 27 b7 84 29 2c d4 6e d1 c7 | ikev2 g^x 73 d4 1e 76 c8 dc 3a df 8a b5 ac 49 f8 57 58 ac | ikev2 g^x b6 af 74 0a c9 24 9b 82 fe 27 eb 68 17 91 56 97 | ikev2 g^x 2f 25 7a 6c 33 0f 0b 13 88 c8 86 84 02 8c 9c 43 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8d 5a c8 42 22 66 47 71 75 11 01 a3 eb de 43 24 | IKEv2 nonce 8a 8a 1d 52 bb a3 79 20 2f 3a 8b 28 46 f6 14 15 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 06 7a 17 75 fd ae cb 88 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 21 | natd_hash: port= 01 f4 | natd_hash: hash= 27 9b 53 3e 81 94 d1 35 62 13 6f 0f f3 75 0e 22 | natd_hash: hash= e2 b9 70 e9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 27 9b 53 3e 81 94 d1 35 62 13 6f 0f f3 75 0e 22 | Notify data e2 b9 70 e9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 06 7a 17 75 fd ae cb 88 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a7 b7 3f 67 ae fd d1 f6 b8 00 0c 14 27 04 b4 2c | natd_hash: hash= 48 80 6b 64 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a7 b7 3f 67 ae fd d1 f6 b8 00 0c 14 27 04 b4 2c | Notify data 48 80 6b 64 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #514 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #514 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #514 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #514: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #514 to 4294967295 after switching state | Message ID: IKE #514 skipping update_recv as MD is fake | Message ID: sent #514 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-33" #514: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.33:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #514) | 06 7a 17 75 fd ae cb 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 5a 8f 50 94 ac f5 36 99 70 0a 59 72 e7 bd 59 | 0f 36 90 cd 5c c6 89 e0 75 bc 28 73 40 e2 7d cc | 29 c4 5a 70 07 f4 b5 86 f2 2a b0 3c a2 25 4e 6d | 20 3c ce c4 4f 4c 58 ae 19 d4 cf fe ba 7b fa f1 | f3 e2 9e 67 a4 d8 72 7c d5 14 6c e6 e7 e2 c6 3e | 8d 4b 48 dd c7 d4 8e 53 66 3c b7 1b 8d fe 66 bf | 89 1e 91 a6 67 0a 3d 11 cd 2a 13 4b 79 22 34 46 | 3b be d5 2d 70 4a 7d b9 7c b7 da 21 75 dc 69 65 | 39 db b4 a1 e9 27 93 e6 22 84 44 fb 74 c7 5b f7 | bf 99 8c 9e d0 24 31 9c 4c cb 86 84 f0 20 fe be | c1 25 55 19 f9 b6 06 e1 9a 9a e7 2d 88 3e 42 9f | 4c 92 e0 a8 c0 b6 61 d6 11 42 34 e8 2d 23 a1 54 | a1 d1 b5 28 f0 8d fb 27 b7 84 29 2c d4 6e d1 c7 | 73 d4 1e 76 c8 dc 3a df 8a b5 ac 49 f8 57 58 ac | b6 af 74 0a c9 24 9b 82 fe 27 eb 68 17 91 56 97 | 2f 25 7a 6c 33 0f 0b 13 88 c8 86 84 02 8c 9c 43 | 29 00 00 24 8d 5a c8 42 22 66 47 71 75 11 01 a3 | eb de 43 24 8a 8a 1d 52 bb a3 79 20 2f 3a 8b 28 | 46 f6 14 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 9b 53 3e 81 94 d1 35 62 13 6f 0f | f3 75 0e 22 e2 b9 70 e9 00 00 00 1c 00 00 40 05 | a7 b7 3f 67 ae fd d1 f6 b8 00 0c 14 27 04 b4 2c | 48 80 6b 64 | state #514 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb370035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4d5d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #514 | libevent_malloc: new ptr-libevent@0x7fb34004e2d0 size 128 | #514 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.19978 | resume sending helper answer for #514 suppresed complete_v2_state_transition() and stole MD | #514 spent 0.28 milliseconds in resume sending helper answer | stop processing: state #514 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35004e5a0 | processing resume sending helper answer for #517 | start processing: state #517 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 517 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #517 | **emit ISAKMP Message: | initiator cookie: | 33 e5 d4 8b 34 40 4a 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-52 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1d 50 73 53 0b 3c f1 6e 78 85 b7 58 fc 4b ba 17 | ikev2 g^x 6f 80 49 00 4f e5 51 c4 75 f5 c7 25 8f f6 8d 0c | ikev2 g^x 0b 3f 8d 1f fe 93 5e 60 24 81 0f 18 41 a0 49 31 | ikev2 g^x af 56 bf f8 e7 5b 2b a7 03 0f d4 ca d5 35 76 53 | ikev2 g^x f2 2b 65 31 41 bc b7 67 c0 bc c2 52 41 2b f8 94 | ikev2 g^x 04 88 87 86 1a 29 d6 6e 88 cb 09 a4 42 bf f7 4d | ikev2 g^x 7c 53 5b 57 b2 40 3e aa d2 e2 33 0e 70 6d 1a c0 | ikev2 g^x a8 61 dc 8e fd a0 3a 5e ba 87 2d 12 b0 e3 ba 16 | ikev2 g^x a1 1a a9 11 c0 e5 e5 f1 54 08 4c 01 f1 c6 26 4b | ikev2 g^x be a6 4f 3e 3e 89 d5 26 bc 6f ed 31 f1 ee 6b aa | ikev2 g^x d9 5e 96 b1 fa 74 49 cb 9d 97 e7 5d a6 4b d4 74 | ikev2 g^x 6b ae 88 a3 73 a4 87 0a 18 a9 6d e9 8b d7 36 fb | ikev2 g^x 0b 55 06 7d b4 78 db 17 14 99 b7 2e a7 64 89 99 | ikev2 g^x 8c be 1c fc 04 89 99 a4 2c 3b cb 1e d4 8e b5 cb | ikev2 g^x 24 1e bf 9a 75 6f 0b f5 b5 e2 c8 b5 34 36 ee 02 | ikev2 g^x af 62 28 a3 22 fa ec 90 27 af 39 54 b8 b9 0f a2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e2 3f 8f 34 58 87 92 57 56 c3 cd 4d 63 8a 11 89 | IKEv2 nonce ae 2d aa 42 8a b1 46 78 a8 66 d5 93 b2 cc 27 a1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 33 e5 d4 8b 34 40 4a 8f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 34 | natd_hash: port= 01 f4 | natd_hash: hash= 8f 05 9f 42 9e eb 36 9c 33 7d 49 87 a2 9f 49 98 | natd_hash: hash= 50 a4 45 37 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8f 05 9f 42 9e eb 36 9c 33 7d 49 87 a2 9f 49 98 | Notify data 50 a4 45 37 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 33 e5 d4 8b 34 40 4a 8f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 0e 29 0c 93 97 71 7f 1e 78 95 bc a8 9d 55 45 5b | natd_hash: hash= 68 08 38 5d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0e 29 0c 93 97 71 7f 1e 78 95 bc a8 9d 55 45 5b | Notify data 68 08 38 5d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #517 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #517 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #517 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #517: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #517 to 4294967295 after switching state | Message ID: IKE #517 skipping update_recv as MD is fake | Message ID: sent #517 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-52" #517: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.52:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #517) | 33 e5 d4 8b 34 40 4a 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d 50 73 53 0b 3c f1 6e 78 85 b7 58 fc 4b ba 17 | 6f 80 49 00 4f e5 51 c4 75 f5 c7 25 8f f6 8d 0c | 0b 3f 8d 1f fe 93 5e 60 24 81 0f 18 41 a0 49 31 | af 56 bf f8 e7 5b 2b a7 03 0f d4 ca d5 35 76 53 | f2 2b 65 31 41 bc b7 67 c0 bc c2 52 41 2b f8 94 | 04 88 87 86 1a 29 d6 6e 88 cb 09 a4 42 bf f7 4d | 7c 53 5b 57 b2 40 3e aa d2 e2 33 0e 70 6d 1a c0 | a8 61 dc 8e fd a0 3a 5e ba 87 2d 12 b0 e3 ba 16 | a1 1a a9 11 c0 e5 e5 f1 54 08 4c 01 f1 c6 26 4b | be a6 4f 3e 3e 89 d5 26 bc 6f ed 31 f1 ee 6b aa | d9 5e 96 b1 fa 74 49 cb 9d 97 e7 5d a6 4b d4 74 | 6b ae 88 a3 73 a4 87 0a 18 a9 6d e9 8b d7 36 fb | 0b 55 06 7d b4 78 db 17 14 99 b7 2e a7 64 89 99 | 8c be 1c fc 04 89 99 a4 2c 3b cb 1e d4 8e b5 cb | 24 1e bf 9a 75 6f 0b f5 b5 e2 c8 b5 34 36 ee 02 | af 62 28 a3 22 fa ec 90 27 af 39 54 b8 b9 0f a2 | 29 00 00 24 e2 3f 8f 34 58 87 92 57 56 c3 cd 4d | 63 8a 11 89 ae 2d aa 42 8a b1 46 78 a8 66 d5 93 | b2 cc 27 a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 05 9f 42 9e eb 36 9c 33 7d 49 87 | a2 9f 49 98 50 a4 45 37 00 00 00 1c 00 00 40 05 | 0e 29 0c 93 97 71 7f 1e 78 95 bc a8 9d 55 45 5b | 68 08 38 5d | state #517 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c04b7c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a9dd80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #517 | libevent_malloc: new ptr-libevent@0x7fb35004e5a0 size 128 | #517 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.200126 | resume sending helper answer for #517 suppresed complete_v2_state_transition() and stole MD | #517 spent 0.312 milliseconds in resume sending helper answer | stop processing: state #517 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c04e700 | processing resume sending helper answer for #516 | start processing: state #516 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 516 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #516 | **emit ISAKMP Message: | initiator cookie: | b0 c4 a7 65 22 ba 71 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-70 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ba a5 f4 39 29 02 0d 7f e1 ce 23 a9 bd 79 34 2c | ikev2 g^x a4 ae 82 fb f4 56 44 6d 25 c8 ad 22 1c 00 04 e4 | ikev2 g^x fa 03 ad 8f 9f af 4d b2 90 d2 16 5a 2f 17 1a 15 | ikev2 g^x 58 ad df 68 e6 e1 fb 5f 9d 90 81 c9 af 7c 31 12 | ikev2 g^x 41 4f db e0 b3 86 a3 d0 c1 ef c5 7d 64 09 1b b5 | ikev2 g^x 64 47 53 1c 1e 0a 21 b1 e4 af ee 92 77 f9 75 e1 | ikev2 g^x 5f 34 cf 58 ca 97 19 11 a0 06 51 71 71 d4 e4 f2 | ikev2 g^x 1c 41 c8 1b a2 4a a9 ba 46 a4 e3 7f 99 64 8d 28 | ikev2 g^x b1 30 c5 e4 30 76 1f 7e 89 f0 65 32 bc 49 9a 04 | ikev2 g^x b4 60 1a 1e a9 b6 fa 63 35 37 7f 30 be 1f f5 76 | ikev2 g^x ab e0 a2 6b 4f 30 d8 71 5f 4f 3d 2d 14 59 46 da | ikev2 g^x e4 b7 89 ba eb da 77 0f d4 a2 34 b8 81 a0 b1 10 | ikev2 g^x 75 99 1f 3b 28 c3 1f 1e c4 47 fa 5e ff ec d3 2c | ikev2 g^x df d5 7a ea 70 58 26 f9 8b 47 1b ff 87 16 43 25 | ikev2 g^x 36 04 57 b4 43 c6 39 70 f4 c3 6a 94 df b4 49 bf | ikev2 g^x 82 f0 08 cb c7 5f ea 63 07 18 16 54 b0 37 ab e4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b0 da d8 00 45 52 59 a6 aa c3 52 03 be 63 73 c1 | IKEv2 nonce d3 94 57 52 b6 9e 12 41 0c ee a0 24 4c 09 59 fe | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b0 c4 a7 65 22 ba 71 2f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 46 | natd_hash: port= 01 f4 | natd_hash: hash= fb 8b ad 07 50 d4 78 b4 4f 97 b0 fb bb f6 fa fc | natd_hash: hash= 21 38 4b 63 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fb 8b ad 07 50 d4 78 b4 4f 97 b0 fb bb f6 fa fc | Notify data 21 38 4b 63 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b0 c4 a7 65 22 ba 71 2f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d0 ac 8d 25 0b 65 31 b3 b0 11 22 6e da e4 14 65 | natd_hash: hash= f6 1e 50 f5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d0 ac 8d 25 0b 65 31 b3 b0 11 22 6e da e4 14 65 | Notify data f6 1e 50 f5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #516 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #516 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #516 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #516: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #516 to 4294967295 after switching state | Message ID: IKE #516 skipping update_recv as MD is fake | Message ID: sent #516 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-70" #516: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.70:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #516) | b0 c4 a7 65 22 ba 71 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba a5 f4 39 29 02 0d 7f e1 ce 23 a9 bd 79 34 2c | a4 ae 82 fb f4 56 44 6d 25 c8 ad 22 1c 00 04 e4 | fa 03 ad 8f 9f af 4d b2 90 d2 16 5a 2f 17 1a 15 | 58 ad df 68 e6 e1 fb 5f 9d 90 81 c9 af 7c 31 12 | 41 4f db e0 b3 86 a3 d0 c1 ef c5 7d 64 09 1b b5 | 64 47 53 1c 1e 0a 21 b1 e4 af ee 92 77 f9 75 e1 | 5f 34 cf 58 ca 97 19 11 a0 06 51 71 71 d4 e4 f2 | 1c 41 c8 1b a2 4a a9 ba 46 a4 e3 7f 99 64 8d 28 | b1 30 c5 e4 30 76 1f 7e 89 f0 65 32 bc 49 9a 04 | b4 60 1a 1e a9 b6 fa 63 35 37 7f 30 be 1f f5 76 | ab e0 a2 6b 4f 30 d8 71 5f 4f 3d 2d 14 59 46 da | e4 b7 89 ba eb da 77 0f d4 a2 34 b8 81 a0 b1 10 | 75 99 1f 3b 28 c3 1f 1e c4 47 fa 5e ff ec d3 2c | df d5 7a ea 70 58 26 f9 8b 47 1b ff 87 16 43 25 | 36 04 57 b4 43 c6 39 70 f4 c3 6a 94 df b4 49 bf | 82 f0 08 cb c7 5f ea 63 07 18 16 54 b0 37 ab e4 | 29 00 00 24 b0 da d8 00 45 52 59 a6 aa c3 52 03 | be 63 73 c1 d3 94 57 52 b6 9e 12 41 0c ee a0 24 | 4c 09 59 fe 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 8b ad 07 50 d4 78 b4 4f 97 b0 fb | bb f6 fa fc 21 38 4b 63 00 00 00 1c 00 00 40 05 | d0 ac 8d 25 0b 65 31 b3 b0 11 22 6e da e4 14 65 | f6 1e 50 f5 | state #516 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34401a4e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb344012bf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c046090 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #516 | libevent_malloc: new ptr-libevent@0x7fb34c04e700 size 128 | #516 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.200425 | resume sending helper answer for #516 suppresed complete_v2_state_transition() and stole MD | #516 spent 0.281 milliseconds in resume sending helper answer | stop processing: state #516 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34804e3b0 | timer_event_cb: processing event@0x557d46af0c80 | handling event EVENT_SA_EXPIRE for parent state #283 | start processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #283 | un-established partial CHILD SA timeout (SA expired) | pstats #283 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #283 ikev2.ike deleted exchange-timeout | #283 spent 2.31 milliseconds in total | [RE]START processing: state #283 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-31" #283: deleting state (STATE_PARENT_I1) aged 52.728s and NOT sending notification | parent state #283: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #283 "road-eastnet-nonat-31" #283: deleting IKE SA for connection 'road-eastnet-nonat-31' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-31' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-31 | State DB: deleting IKEv2 state #283 in PARENT_I1 | parent state #283: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #283 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bc8f50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46af0c80 | in statetime_stop() and could not find #283 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c69190 | handling event EVENT_SA_EXPIRE for parent state #407 | start processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #407 | un-established partial CHILD SA timeout (SA expired) | pstats #407 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #407 ikev2.ike deleted exchange-timeout | #407 spent 1.94 milliseconds in total | [RE]START processing: state #407 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-155" #407: deleting state (STATE_PARENT_I1) aged 43.646s and NOT sending notification | parent state #407: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #407 "road-eastnet-nonat-155" #407: deleting IKE SA for connection 'road-eastnet-nonat-155' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-155' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-155 | State DB: deleting IKEv2 state #407 in PARENT_I1 | parent state #407: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #407 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c691d0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c69190 | in statetime_stop() and could not find #407 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #515 | start processing: state #515 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 515 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #515 | **emit ISAKMP Message: | initiator cookie: | 1e 61 5a f6 8c 22 37 26 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-75 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 89 55 92 be 2b 5b 80 8f b3 a9 1d 29 a3 45 24 2c | ikev2 g^x b4 ac 16 b3 45 0f 47 41 ac 8c 89 bd 1e 8f b0 6e | ikev2 g^x 42 15 11 69 75 f6 d4 99 d3 aa cd 74 fa 86 b1 c5 | ikev2 g^x 68 d3 c8 15 10 54 b4 74 c1 a4 2b 24 6f c9 a9 9d | ikev2 g^x 25 6f 22 a2 ef 15 14 08 3b 15 a7 b9 a7 91 72 1b | ikev2 g^x 0d fc 51 4a 02 7d 07 e4 28 58 0f 09 52 04 38 5f | ikev2 g^x 70 3e 01 b9 6d 46 32 8a d3 fa e2 05 3c 1f 29 4c | ikev2 g^x 83 37 17 b1 56 48 32 71 51 18 9d f3 b3 04 79 ad | ikev2 g^x 90 59 7d 48 55 a3 92 46 ac 7d 26 6d f7 b5 44 87 | ikev2 g^x b8 ea 9c e5 b0 56 03 2c 9a 01 84 d5 30 98 07 7a | ikev2 g^x d5 ed 5c 95 9f a1 e3 64 9d 5d 5d c1 2f ee f3 c2 | ikev2 g^x 45 c0 b5 58 7b 2b 68 4d 06 07 76 b2 f3 82 a0 63 | ikev2 g^x 45 0a 18 70 71 12 a7 f5 1b f4 8c e5 99 58 7a ae | ikev2 g^x 71 6e 12 6f 9a 9e 61 a0 c1 a0 67 87 58 b1 e2 09 | ikev2 g^x f3 f3 93 cd 56 48 cd 0d 03 13 c0 9c db 17 5d 35 | ikev2 g^x 5e 83 5d 90 8d cf 6f 5f 1d 20 58 52 4c 16 b9 f8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8d d0 d4 e1 35 48 fc d6 75 32 21 71 b5 c7 25 57 | IKEv2 nonce c3 f1 b1 56 20 08 bd ee ec 1b e0 d1 78 47 18 7b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1e 61 5a f6 8c 22 37 26 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4b | natd_hash: port= 01 f4 | natd_hash: hash= 9a 1a 58 76 c4 ef c7 77 69 86 ed 89 8f 43 91 04 | natd_hash: hash= 1b c3 f4 fd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9a 1a 58 76 c4 ef c7 77 69 86 ed 89 8f 43 91 04 | Notify data 1b c3 f4 fd | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1e 61 5a f6 8c 22 37 26 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d2 95 59 dd 21 aa 4e e6 79 3e 78 3f 39 e9 b6 1e | natd_hash: hash= 64 75 99 59 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d2 95 59 dd 21 aa 4e e6 79 3e 78 3f 39 e9 b6 1e | Notify data 64 75 99 59 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #515 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #515 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #515 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #515: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #515 to 4294967295 after switching state | Message ID: IKE #515 skipping update_recv as MD is fake | Message ID: sent #515 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-75" #515: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.75:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #515) | 1e 61 5a f6 8c 22 37 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 55 92 be 2b 5b 80 8f b3 a9 1d 29 a3 45 24 2c | b4 ac 16 b3 45 0f 47 41 ac 8c 89 bd 1e 8f b0 6e | 42 15 11 69 75 f6 d4 99 d3 aa cd 74 fa 86 b1 c5 | 68 d3 c8 15 10 54 b4 74 c1 a4 2b 24 6f c9 a9 9d | 25 6f 22 a2 ef 15 14 08 3b 15 a7 b9 a7 91 72 1b | 0d fc 51 4a 02 7d 07 e4 28 58 0f 09 52 04 38 5f | 70 3e 01 b9 6d 46 32 8a d3 fa e2 05 3c 1f 29 4c | 83 37 17 b1 56 48 32 71 51 18 9d f3 b3 04 79 ad | 90 59 7d 48 55 a3 92 46 ac 7d 26 6d f7 b5 44 87 | b8 ea 9c e5 b0 56 03 2c 9a 01 84 d5 30 98 07 7a | d5 ed 5c 95 9f a1 e3 64 9d 5d 5d c1 2f ee f3 c2 | 45 c0 b5 58 7b 2b 68 4d 06 07 76 b2 f3 82 a0 63 | 45 0a 18 70 71 12 a7 f5 1b f4 8c e5 99 58 7a ae | 71 6e 12 6f 9a 9e 61 a0 c1 a0 67 87 58 b1 e2 09 | f3 f3 93 cd 56 48 cd 0d 03 13 c0 9c db 17 5d 35 | 5e 83 5d 90 8d cf 6f 5f 1d 20 58 52 4c 16 b9 f8 | 29 00 00 24 8d d0 d4 e1 35 48 fc d6 75 32 21 71 | b5 c7 25 57 c3 f1 b1 56 20 08 bd ee ec 1b e0 d1 | 78 47 18 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9a 1a 58 76 c4 ef c7 77 69 86 ed 89 | 8f 43 91 04 1b c3 f4 fd 00 00 00 1c 00 00 40 05 | d2 95 59 dd 21 aa 4e e6 79 3e 78 3f 39 e9 b6 1e | 64 75 99 59 | state #515 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38001abe0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb3680129a0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #515 | libevent_malloc: new ptr-libevent@0x7fb34804e3b0 size 128 | #515 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.200819 | resume sending helper answer for #515 suppresed complete_v2_state_transition() and stole MD | #515 spent 0.28 milliseconds in resume sending helper answer | stop processing: state #515 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35404e8b0 | timer_event_cb: processing event@0x557d46c67a30 | handling event EVENT_SA_EXPIRE for parent state #431 | start processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #431 | un-established partial CHILD SA timeout (SA expired) | pstats #431 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #431 ikev2.ike deleted exchange-timeout | #431 spent 1.92 milliseconds in total | [RE]START processing: state #431 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-179" #431: deleting state (STATE_PARENT_I1) aged 41.969s and NOT sending notification | parent state #431: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #431 "road-eastnet-nonat-179" #431: deleting IKE SA for connection 'road-eastnet-nonat-179' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-179' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-179 | State DB: deleting IKEv2 state #431 in PARENT_I1 | parent state #431: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #431 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c67a70 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c67a30 | in statetime_stop() and could not find #431 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a1c450 | handling event EVENT_SA_EXPIRE for parent state #285 | start processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #285 | un-established partial CHILD SA timeout (SA expired) | pstats #285 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #285 ikev2.ike deleted exchange-timeout | #285 spent 1.96 milliseconds in total | [RE]START processing: state #285 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-33" #285: deleting state (STATE_PARENT_I1) aged 52.583s and NOT sending notification | parent state #285: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #285 "road-eastnet-nonat-33" #285: deleting IKE SA for connection 'road-eastnet-nonat-33' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-33' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-33 | State DB: deleting IKEv2 state #285 in PARENT_I1 | parent state #285: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #285 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46a67330 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a1c450 | in statetime_stop() and could not find #285 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2b5d0 | handling event EVENT_SA_EXPIRE for parent state #327 | start processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #327 | un-established partial CHILD SA timeout (SA expired) | pstats #327 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #327 ikev2.ike deleted exchange-timeout | #327 spent 2.41 milliseconds in total | [RE]START processing: state #327 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-75" #327: deleting state (STATE_PARENT_I1) aged 49.431s and NOT sending notification | parent state #327: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #327 "road-eastnet-nonat-75" #327: deleting IKE SA for connection 'road-eastnet-nonat-75' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-75' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-75 | State DB: deleting IKEv2 state #327 in PARENT_I1 | parent state #327: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #327 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46a56e30 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a2b5d0 | in statetime_stop() and could not find #327 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46acd680 | handling event EVENT_SA_EXPIRE for parent state #284 | start processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #284 | un-established partial CHILD SA timeout (SA expired) | pstats #284 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #284 ikev2.ike deleted exchange-timeout | #284 spent 1.85 milliseconds in total | [RE]START processing: state #284 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-32" #284: deleting state (STATE_PARENT_I1) aged 52.649s and NOT sending notification | parent state #284: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #284 "road-eastnet-nonat-32" #284: deleting IKE SA for connection 'road-eastnet-nonat-32' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-32' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-32 | State DB: deleting IKEv2 state #284 in PARENT_I1 | parent state #284: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #284 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46af4d40 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46acd680 | in statetime_stop() and could not find #284 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469e05a0 | handling event EVENT_SA_EXPIRE for parent state #289 | start processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #289 | un-established partial CHILD SA timeout (SA expired) | pstats #289 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #289 ikev2.ike deleted exchange-timeout | #289 spent 1.98 milliseconds in total | [RE]START processing: state #289 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-37" #289: deleting state (STATE_PARENT_I1) aged 52.309s and NOT sending notification | parent state #289: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #289 "road-eastnet-nonat-37" #289: deleting IKE SA for connection 'road-eastnet-nonat-37' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-37' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-37 | State DB: deleting IKEv2 state #289 in PARENT_I1 | parent state #289: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #289 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b78750 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d469e05a0 | in statetime_stop() and could not find #289 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ac2900 | handling event EVENT_SA_EXPIRE for parent state #325 | start processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #325 | un-established partial CHILD SA timeout (SA expired) | pstats #325 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #325 ikev2.ike deleted exchange-timeout | #325 spent 2.03 milliseconds in total | [RE]START processing: state #325 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-73" #325: deleting state (STATE_PARENT_I1) aged 49.619s and NOT sending notification | parent state #325: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #325 "road-eastnet-nonat-73" #325: deleting IKE SA for connection 'road-eastnet-nonat-73' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-73' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-73 | State DB: deleting IKEv2 state #325 in PARENT_I1 | parent state #325: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #325 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bc7850 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46ac2900 | in statetime_stop() and could not find #325 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c662d0 | handling event EVENT_SA_EXPIRE for parent state #356 | start processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #356 | un-established partial CHILD SA timeout (SA expired) | pstats #356 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #356 ikev2.ike deleted exchange-timeout | #356 spent 2.06 milliseconds in total | [RE]START processing: state #356 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-104" #356: deleting state (STATE_PARENT_I1) aged 47.174s and NOT sending notification | parent state #356: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #356 "road-eastnet-nonat-104" #356: deleting IKE SA for connection 'road-eastnet-nonat-104' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-104' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-104 | State DB: deleting IKEv2 state #356 in PARENT_I1 | parent state #356: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #356 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c66310 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c662d0 | in statetime_stop() and could not find #356 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c64b70 | handling event EVENT_SA_EXPIRE for parent state #434 | start processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #434 | un-established partial CHILD SA timeout (SA expired) | pstats #434 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #434 ikev2.ike deleted exchange-timeout | #434 spent 1.84 milliseconds in total | [RE]START processing: state #434 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-182" #434: deleting state (STATE_PARENT_I1) aged 41.741s and NOT sending notification | parent state #434: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #434 "road-eastnet-nonat-182" #434: deleting IKE SA for connection 'road-eastnet-nonat-182' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-182' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-182 | State DB: deleting IKEv2 state #434 in PARENT_I1 | parent state #434: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #434 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c64bb0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c64b70 | in statetime_stop() and could not find #434 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aecb40 | handling event EVENT_SA_EXPIRE for parent state #429 | start processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #429 | un-established partial CHILD SA timeout (SA expired) | pstats #429 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #429 ikev2.ike deleted exchange-timeout | #429 spent 1.99 milliseconds in total | [RE]START processing: state #429 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-177" #429: deleting state (STATE_PARENT_I1) aged 42.138s and NOT sending notification | parent state #429: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #429 "road-eastnet-nonat-177" #429: deleting IKE SA for connection 'road-eastnet-nonat-177' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-177' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-177 | State DB: deleting IKEv2 state #429 in PARENT_I1 | parent state #429: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #429 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bc6150 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46aecb40 | in statetime_stop() and could not find #429 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c63410 | handling event EVENT_SA_EXPIRE for parent state #445 | start processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #445 | un-established partial CHILD SA timeout (SA expired) | pstats #445 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #445 ikev2.ike deleted exchange-timeout | #445 spent 2.07 milliseconds in total | [RE]START processing: state #445 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-193" #445: deleting state (STATE_PARENT_I1) aged 40.802s and NOT sending notification | parent state #445: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #445 "road-eastnet-nonat-193" #445: deleting IKE SA for connection 'road-eastnet-nonat-193' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-193' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-193 | State DB: deleting IKEv2 state #445 in PARENT_I1 | parent state #445: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #445 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c63450 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c63410 | in statetime_stop() and could not find #445 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c61cb0 | handling event EVENT_SA_EXPIRE for parent state #409 | start processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #409 | un-established partial CHILD SA timeout (SA expired) | pstats #409 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #409 ikev2.ike deleted exchange-timeout | #409 spent 2.9 milliseconds in total | [RE]START processing: state #409 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-157" #409: deleting state (STATE_PARENT_I1) aged 43.511s and NOT sending notification | parent state #409: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #409 "road-eastnet-nonat-157" #409: deleting IKE SA for connection 'road-eastnet-nonat-157' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-157' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-157 | State DB: deleting IKEv2 state #409 in PARENT_I1 | parent state #409: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #409 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c61cf0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c61cb0 | in statetime_stop() and could not find #409 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a16db0 | handling event EVENT_SA_EXPIRE for parent state #331 | start processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #331 | un-established partial CHILD SA timeout (SA expired) | pstats #331 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #331 ikev2.ike deleted exchange-timeout | #331 spent 2.47 milliseconds in total | [RE]START processing: state #331 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-79" #331: deleting state (STATE_PARENT_I1) aged 49.179s and NOT sending notification | parent state #331: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #331 "road-eastnet-nonat-79" #331: deleting IKE SA for connection 'road-eastnet-nonat-79' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-79' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-79 | State DB: deleting IKEv2 state #331 in PARENT_I1 | parent state #331: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #331 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b77050 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a16db0 | in statetime_stop() and could not find #331 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46af3800 | handling event EVENT_SA_EXPIRE for parent state #270 | start processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #270 | un-established partial CHILD SA timeout (SA expired) | pstats #270 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #270 ikev2.ike deleted exchange-timeout | #270 spent 2.25 milliseconds in total | [RE]START processing: state #270 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-18" #270: deleting state (STATE_PARENT_I1) aged 53.862s and NOT sending notification | parent state #270: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #270 "road-eastnet-nonat-18" #270: deleting IKE SA for connection 'road-eastnet-nonat-18' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-18' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-18 | State DB: deleting IKEv2 state #270 in PARENT_I1 | parent state #270: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #270 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bc4a50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46af3800 | in statetime_stop() and could not find #270 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c60550 | handling event EVENT_SA_EXPIRE for parent state #447 | start processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #447 | un-established partial CHILD SA timeout (SA expired) | pstats #447 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #447 ikev2.ike deleted exchange-timeout | #447 spent 5.65 milliseconds in total | [RE]START processing: state #447 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-195" #447: deleting state (STATE_PARENT_I1) aged 40.631s and NOT sending notification | parent state #447: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #447 "road-eastnet-nonat-195" #447: deleting IKE SA for connection 'road-eastnet-nonat-195' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-195' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-195 | State DB: deleting IKEv2 state #447 in PARENT_I1 | parent state #447: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #447 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c60590 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c60550 | in statetime_stop() and could not find #447 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c5edf0 | handling event EVENT_SA_EXPIRE for parent state #457 | start processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #457 | un-established partial CHILD SA timeout (SA expired) | pstats #457 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #457 ikev2.ike deleted exchange-timeout | #457 spent 1.84 milliseconds in total | [RE]START processing: state #457 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-205" #457: deleting state (STATE_PARENT_I1) aged 39.640s and NOT sending notification | parent state #457: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #457 "road-eastnet-nonat-205" #457: deleting IKE SA for connection 'road-eastnet-nonat-205' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-205' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-205 | State DB: deleting IKEv2 state #457 in PARENT_I1 | parent state #457: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #457 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c5ee30 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c5edf0 | in statetime_stop() and could not find #457 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab39c0 | handling event EVENT_SA_EXPIRE for parent state #390 | start processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #390 | un-established partial CHILD SA timeout (SA expired) | pstats #390 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #390 ikev2.ike deleted exchange-timeout | #390 spent 1.89 milliseconds in total | [RE]START processing: state #390 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-138" #390: deleting state (STATE_PARENT_I1) aged 44.779s and NOT sending notification | parent state #390: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #390 "road-eastnet-nonat-138" #390: deleting IKE SA for connection 'road-eastnet-nonat-138' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-138' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-138 | State DB: deleting IKEv2 state #390 in PARENT_I1 | parent state #390: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #390 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bc3350 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46ab39c0 | in statetime_stop() and could not find #390 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c5d690 | handling event EVENT_SA_EXPIRE for parent state #421 | start processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #421 | un-established partial CHILD SA timeout (SA expired) | pstats #421 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #421 ikev2.ike deleted exchange-timeout | #421 spent 2.35 milliseconds in total | [RE]START processing: state #421 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-169" #421: deleting state (STATE_PARENT_I1) aged 42.719s and NOT sending notification | parent state #421: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #421 "road-eastnet-nonat-169" #421: deleting IKE SA for connection 'road-eastnet-nonat-169' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-169' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-169 | State DB: deleting IKEv2 state #421 in PARENT_I1 | parent state #421: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #421 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c5d6d0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c5d690 | in statetime_stop() and could not find #421 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c5bf30 | handling event EVENT_SA_EXPIRE for parent state #412 | start processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #412 | un-established partial CHILD SA timeout (SA expired) | pstats #412 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #412 ikev2.ike deleted exchange-timeout | #412 spent 2.41 milliseconds in total | [RE]START processing: state #412 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-160" #412: deleting state (STATE_PARENT_I1) aged 43.324s and NOT sending notification | parent state #412: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #412 "road-eastnet-nonat-160" #412: deleting IKE SA for connection 'road-eastnet-nonat-160' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-160' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-160 | State DB: deleting IKEv2 state #412 in PARENT_I1 | parent state #412: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #412 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c5bf70 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c5bf30 | in statetime_stop() and could not find #412 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab0dc0 | handling event EVENT_SA_EXPIRE for parent state #351 | start processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #351 | un-established partial CHILD SA timeout (SA expired) | pstats #351 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #351 ikev2.ike deleted exchange-timeout | #351 spent 2.16 milliseconds in total | [RE]START processing: state #351 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-99" #351: deleting state (STATE_PARENT_I1) aged 47.573s and NOT sending notification | parent state #351: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #351 "road-eastnet-nonat-99" #351: deleting IKE SA for connection 'road-eastnet-nonat-99' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-99' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-99 | State DB: deleting IKEv2 state #351 in PARENT_I1 | parent state #351: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #351 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46aee080 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46ab0dc0 | in statetime_stop() and could not find #351 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469dbcb0 | handling event EVENT_SA_EXPIRE for parent state #385 | start processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #385 | un-established partial CHILD SA timeout (SA expired) | pstats #385 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #385 ikev2.ike deleted exchange-timeout | #385 spent 2.67 milliseconds in total | [RE]START processing: state #385 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-133" #385: deleting state (STATE_PARENT_I1) aged 45.105s and NOT sending notification | parent state #385: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #385 "road-eastnet-nonat-133" #385: deleting IKE SA for connection 'road-eastnet-nonat-133' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-133' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-133 | State DB: deleting IKEv2 state #385 in PARENT_I1 | parent state #385: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #385 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b75950 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d469dbcb0 | in statetime_stop() and could not find #385 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad9ac0 | handling event EVENT_SA_EXPIRE for parent state #312 | start processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #312 | un-established partial CHILD SA timeout (SA expired) | pstats #312 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #312 ikev2.ike deleted exchange-timeout | #312 spent 1.86 milliseconds in total | [RE]START processing: state #312 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-60" #312: deleting state (STATE_PARENT_I1) aged 50.475s and NOT sending notification | parent state #312: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #312 "road-eastnet-nonat-60" #312: deleting IKE SA for connection 'road-eastnet-nonat-60' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-60' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-60 | State DB: deleting IKEv2 state #312 in PARENT_I1 | parent state #312: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #312 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bc1c50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46ad9ac0 | in statetime_stop() and could not find #312 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c5a7d0 | handling event EVENT_SA_EXPIRE for parent state #459 | start processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #459 | un-established partial CHILD SA timeout (SA expired) | pstats #459 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #459 ikev2.ike deleted exchange-timeout | #459 spent 2.37 milliseconds in total | [RE]START processing: state #459 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-207" #459: deleting state (STATE_PARENT_I1) aged 39.419s and NOT sending notification | parent state #459: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #459 "road-eastnet-nonat-207" #459: deleting IKE SA for connection 'road-eastnet-nonat-207' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-207' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-207 | State DB: deleting IKEv2 state #459 in PARENT_I1 | parent state #459: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #459 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c5a810 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c5a7d0 | in statetime_stop() and could not find #459 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c59070 | handling event EVENT_SA_EXPIRE for parent state #446 | start processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #446 | un-established partial CHILD SA timeout (SA expired) | pstats #446 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #446 ikev2.ike deleted exchange-timeout | #446 spent 2.05 milliseconds in total | [RE]START processing: state #446 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-194" #446: deleting state (STATE_PARENT_I1) aged 40.737s and NOT sending notification | parent state #446: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #446 "road-eastnet-nonat-194" #446: deleting IKE SA for connection 'road-eastnet-nonat-194' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-194' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-194 | State DB: deleting IKEv2 state #446 in PARENT_I1 | parent state #446: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #446 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c590b0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c59070 | in statetime_stop() and could not find #446 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46abbc40 | handling event EVENT_SA_EXPIRE for parent state #287 | start processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #287 | un-established partial CHILD SA timeout (SA expired) | pstats #287 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #287 ikev2.ike deleted exchange-timeout | #287 spent 2.29 milliseconds in total | [RE]START processing: state #287 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-35" #287: deleting state (STATE_PARENT_I1) aged 52.447s and NOT sending notification | parent state #287: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #287 "road-eastnet-nonat-35" #287: deleting IKE SA for connection 'road-eastnet-nonat-35' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-35' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-35 | State DB: deleting IKEv2 state #287 in PARENT_I1 | parent state #287: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #287 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bc0550 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46abbc40 | in statetime_stop() and could not find #287 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c57910 | handling event EVENT_SA_EXPIRE for parent state #438 | start processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #438 | un-established partial CHILD SA timeout (SA expired) | pstats #438 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #438 ikev2.ike deleted exchange-timeout | #438 spent 1.8 milliseconds in total | [RE]START processing: state #438 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-186" #438: deleting state (STATE_PARENT_I1) aged 41.462s and NOT sending notification | parent state #438: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #438 "road-eastnet-nonat-186" #438: deleting IKE SA for connection 'road-eastnet-nonat-186' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-186' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-186 | State DB: deleting IKEv2 state #438 in PARENT_I1 | parent state #438: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #438 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c57950 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c57910 | in statetime_stop() and could not find #438 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c561b0 | handling event EVENT_SA_EXPIRE for parent state #460 | start processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #460 | un-established partial CHILD SA timeout (SA expired) | pstats #460 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #460 ikev2.ike deleted exchange-timeout | #460 spent 2.78 milliseconds in total | [RE]START processing: state #460 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-208" #460: deleting state (STATE_PARENT_I1) aged 39.311s and NOT sending notification | parent state #460: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #460 "road-eastnet-nonat-208" #460: deleting IKE SA for connection 'road-eastnet-nonat-208' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-208' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-208 | State DB: deleting IKEv2 state #460 in PARENT_I1 | parent state #460: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #460 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c561f0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c561b0 | in statetime_stop() and could not find #460 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7ed50 | handling event EVENT_SA_EXPIRE for parent state #350 | start processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #350 | un-established partial CHILD SA timeout (SA expired) | pstats #350 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #350 ikev2.ike deleted exchange-timeout | #350 spent 2.05 milliseconds in total | [RE]START processing: state #350 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-98" #350: deleting state (STATE_PARENT_I1) aged 47.669s and NOT sending notification | parent state #350: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #350 "road-eastnet-nonat-98" #350: deleting IKE SA for connection 'road-eastnet-nonat-98' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-98' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-98 | State DB: deleting IKEv2 state #350 in PARENT_I1 | parent state #350: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #350 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b74250 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a7ed50 | in statetime_stop() and could not find #350 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46af6380 | handling event EVENT_SA_EXPIRE for parent state #475 | start processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #475 | un-established partial CHILD SA timeout (SA expired) | pstats #475 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #475 ikev2.ike deleted exchange-timeout | #475 spent 2.24 milliseconds in total | [RE]START processing: state #475 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-223" #475: deleting state (STATE_PARENT_I1) aged 37.745s and NOT sending notification | parent state #475: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #475 "road-eastnet-nonat-223" #475: deleting IKE SA for connection 'road-eastnet-nonat-223' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-223' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-223 | State DB: deleting IKEv2 state #475 in PARENT_I1 | parent state #475: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #475 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bbee50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46af6380 | in statetime_stop() and could not find #475 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c54a50 | handling event EVENT_SA_EXPIRE for parent state #435 | start processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #435 | un-established partial CHILD SA timeout (SA expired) | pstats #435 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #435 ikev2.ike deleted exchange-timeout | #435 spent 2.24 milliseconds in total | [RE]START processing: state #435 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-183" #435: deleting state (STATE_PARENT_I1) aged 41.674s and NOT sending notification | parent state #435: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #435 "road-eastnet-nonat-183" #435: deleting IKE SA for connection 'road-eastnet-nonat-183' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-183' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-183 | State DB: deleting IKEv2 state #435 in PARENT_I1 | parent state #435: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #435 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c54a90 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c54a50 | in statetime_stop() and could not find #435 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c532f0 | handling event EVENT_SA_EXPIRE for parent state #405 | start processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #405 | un-established partial CHILD SA timeout (SA expired) | pstats #405 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #405 ikev2.ike deleted exchange-timeout | #405 spent 2.05 milliseconds in total | [RE]START processing: state #405 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-153" #405: deleting state (STATE_PARENT_I1) aged 43.773s and NOT sending notification | parent state #405: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #405 "road-eastnet-nonat-153" #405: deleting IKE SA for connection 'road-eastnet-nonat-153' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-153' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-153 | State DB: deleting IKEv2 state #405 in PARENT_I1 | parent state #405: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #405 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c53330 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c532f0 | in statetime_stop() and could not find #405 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b2c990 | handling event EVENT_SA_EXPIRE for parent state #337 | start processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #337 | un-established partial CHILD SA timeout (SA expired) | pstats #337 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #337 ikev2.ike deleted exchange-timeout | #337 spent 1.97 milliseconds in total | [RE]START processing: state #337 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-85" #337: deleting state (STATE_PARENT_I1) aged 48.803s and NOT sending notification | parent state #337: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #337 "road-eastnet-nonat-85" #337: deleting IKE SA for connection 'road-eastnet-nonat-85' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-85' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-85 | State DB: deleting IKEv2 state #337 in PARENT_I1 | parent state #337: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #337 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bbd750 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b2c990 | in statetime_stop() and could not find #337 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c51b90 | handling event EVENT_SA_EXPIRE for parent state #464 | start processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #464 | un-established partial CHILD SA timeout (SA expired) | pstats #464 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #464 ikev2.ike deleted exchange-timeout | #464 spent 2.48 milliseconds in total | [RE]START processing: state #464 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-212" #464: deleting state (STATE_PARENT_I1) aged 38.899s and NOT sending notification | parent state #464: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #464 "road-eastnet-nonat-212" #464: deleting IKE SA for connection 'road-eastnet-nonat-212' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-212' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-212 | State DB: deleting IKEv2 state #464 in PARENT_I1 | parent state #464: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #464 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c51bd0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c51b90 | in statetime_stop() and could not find #464 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c50430 | handling event EVENT_SA_EXPIRE for parent state #437 | start processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #437 | un-established partial CHILD SA timeout (SA expired) | pstats #437 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #437 ikev2.ike deleted exchange-timeout | #437 spent 2.59 milliseconds in total | [RE]START processing: state #437 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-185" #437: deleting state (STATE_PARENT_I1) aged 41.546s and NOT sending notification | parent state #437: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #437 "road-eastnet-nonat-185" #437: deleting IKE SA for connection 'road-eastnet-nonat-185' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-185' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-185 | State DB: deleting IKEv2 state #437 in PARENT_I1 | parent state #437: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #437 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c50470 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c50430 | in statetime_stop() and could not find #437 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a23150 | handling event EVENT_SA_EXPIRE for parent state #383 | start processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #383 | un-established partial CHILD SA timeout (SA expired) | pstats #383 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #383 ikev2.ike deleted exchange-timeout | #383 spent 2.07 milliseconds in total | [RE]START processing: state #383 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-131" #383: deleting state (STATE_PARENT_I1) aged 45.231s and NOT sending notification | parent state #383: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #383 "road-eastnet-nonat-131" #383: deleting IKE SA for connection 'road-eastnet-nonat-131' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-131' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-131 | State DB: deleting IKEv2 state #383 in PARENT_I1 | parent state #383: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #383 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46ae3280 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a23150 | in statetime_stop() and could not find #383 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad4340 | handling event EVENT_SA_EXPIRE for parent state #317 | start processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #317 | un-established partial CHILD SA timeout (SA expired) | pstats #317 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #317 ikev2.ike deleted exchange-timeout | #317 spent 5.33 milliseconds in total | [RE]START processing: state #317 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-65" #317: deleting state (STATE_PARENT_I1) aged 50.157s and NOT sending notification | parent state #317: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #317 "road-eastnet-nonat-65" #317: deleting IKE SA for connection 'road-eastnet-nonat-65' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-65' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-65 | State DB: deleting IKEv2 state #317 in PARENT_I1 | parent state #317: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #317 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46ae73c0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46ad4340 | in statetime_stop() and could not find #317 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a73690 | handling event EVENT_SA_EXPIRE for parent state #329 | start processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #329 | un-established partial CHILD SA timeout (SA expired) | pstats #329 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #329 ikev2.ike deleted exchange-timeout | #329 spent 2.17 milliseconds in total | [RE]START processing: state #329 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-77" #329: deleting state (STATE_PARENT_I1) aged 49.306s and NOT sending notification | parent state #329: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #329 "road-eastnet-nonat-77" #329: deleting IKE SA for connection 'road-eastnet-nonat-77' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-77' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-77 | State DB: deleting IKEv2 state #329 in PARENT_I1 | parent state #329: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #329 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d469dbc20 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a73690 | in statetime_stop() and could not find #329 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b2b3d0 | handling event EVENT_SA_EXPIRE for parent state #272 | start processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #272 | un-established partial CHILD SA timeout (SA expired) | pstats #272 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #272 ikev2.ike deleted exchange-timeout | #272 spent 2.24 milliseconds in total | [RE]START processing: state #272 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-20" #272: deleting state (STATE_PARENT_I1) aged 53.661s and NOT sending notification | parent state #272: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #272 "road-eastnet-nonat-20" #272: deleting IKE SA for connection 'road-eastnet-nonat-20' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-20' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-20 | State DB: deleting IKEv2 state #272 in PARENT_I1 | parent state #272: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #272 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bbc050 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b2b3d0 | in statetime_stop() and could not find #272 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c4ecd0 | handling event EVENT_SA_EXPIRE for parent state #471 | start processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #471 | un-established partial CHILD SA timeout (SA expired) | pstats #471 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #471 ikev2.ike deleted exchange-timeout | #471 spent 2.53 milliseconds in total | [RE]START processing: state #471 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-219" #471: deleting state (STATE_PARENT_I1) aged 38.155s and NOT sending notification | parent state #471: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #471 "road-eastnet-nonat-219" #471: deleting IKE SA for connection 'road-eastnet-nonat-219' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-219' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-219 | State DB: deleting IKEv2 state #471 in PARENT_I1 | parent state #471: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #471 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c4ed10 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c4ecd0 | in statetime_stop() and could not find #471 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c4d570 | handling event EVENT_SA_EXPIRE for parent state #479 | start processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #479 | un-established partial CHILD SA timeout (SA expired) | pstats #479 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #479 ikev2.ike deleted exchange-timeout | #479 spent 1.85 milliseconds in total | [RE]START processing: state #479 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-227" #479: deleting state (STATE_PARENT_I1) aged 37.213s and NOT sending notification | parent state #479: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #479 "road-eastnet-nonat-227" #479: deleting IKE SA for connection 'road-eastnet-nonat-227' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-227' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-227 | State DB: deleting IKEv2 state #479 in PARENT_I1 | parent state #479: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #479 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c4d5b0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c4d570 | in statetime_stop() and could not find #479 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b29e10 | handling event EVENT_SA_EXPIRE for parent state #346 | start processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #346 | un-established partial CHILD SA timeout (SA expired) | pstats #346 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #346 ikev2.ike deleted exchange-timeout | #346 spent 2.37 milliseconds in total | [RE]START processing: state #346 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-94" #346: deleting state (STATE_PARENT_I1) aged 48.068s and NOT sending notification | parent state #346: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #346 "road-eastnet-nonat-94" #346: deleting IKE SA for connection 'road-eastnet-nonat-94' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-94' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-94 | State DB: deleting IKEv2 state #346 in PARENT_I1 | parent state #346: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #346 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bba950 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b29e10 | in statetime_stop() and could not find #346 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c4be10 | handling event EVENT_SA_EXPIRE for parent state #366 | start processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #366 | un-established partial CHILD SA timeout (SA expired) | pstats #366 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #366 ikev2.ike deleted exchange-timeout | #366 spent 2.3 milliseconds in total | [RE]START processing: state #366 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-114" #366: deleting state (STATE_PARENT_I1) aged 46.420s and NOT sending notification | parent state #366: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #366 "road-eastnet-nonat-114" #366: deleting IKE SA for connection 'road-eastnet-nonat-114' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-114' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-114 | State DB: deleting IKEv2 state #366 in PARENT_I1 | parent state #366: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #366 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c4be50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c4be10 | in statetime_stop() and could not find #366 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c4a6b0 | handling event EVENT_SA_EXPIRE for parent state #450 | start processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #450 | un-established partial CHILD SA timeout (SA expired) | pstats #450 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #450 ikev2.ike deleted exchange-timeout | #450 spent 3.51 milliseconds in total | [RE]START processing: state #450 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-198" #450: deleting state (STATE_PARENT_I1) aged 40.369s and NOT sending notification | parent state #450: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #450 "road-eastnet-nonat-198" #450: deleting IKE SA for connection 'road-eastnet-nonat-198' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-198' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-198 | State DB: deleting IKEv2 state #450 in PARENT_I1 | parent state #450: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #450 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c4a6f0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c4a6b0 | in statetime_stop() and could not find #450 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a9dd40 | handling event EVENT_SA_EXPIRE for parent state #262 | start processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #262 | un-established partial CHILD SA timeout (SA expired) | pstats #262 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #262 ikev2.ike deleted exchange-timeout | #262 spent 2.41 milliseconds in total | [RE]START processing: state #262 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-10" #262: deleting state (STATE_PARENT_I1) aged 54.766s and NOT sending notification | parent state #262: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #262 "road-eastnet-nonat-10" #262: deleting IKE SA for connection 'road-eastnet-nonat-10' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-10' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-10 | State DB: deleting IKEv2 state #262 in PARENT_I1 | parent state #262: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #262 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d469dbb90 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a9dd40 | in statetime_stop() and could not find #262 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b28850 | handling event EVENT_SA_EXPIRE for parent state #345 | start processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #345 | un-established partial CHILD SA timeout (SA expired) | pstats #345 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #345 ikev2.ike deleted exchange-timeout | #345 spent 1.99 milliseconds in total | [RE]START processing: state #345 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-93" #345: deleting state (STATE_PARENT_I1) aged 48.177s and NOT sending notification | parent state #345: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #345 "road-eastnet-nonat-93" #345: deleting IKE SA for connection 'road-eastnet-nonat-93' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-93' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-93 | State DB: deleting IKEv2 state #345 in PARENT_I1 | parent state #345: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #345 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bb9250 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b28850 | in statetime_stop() and could not find #345 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c48f50 | handling event EVENT_SA_EXPIRE for parent state #455 | start processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #455 | un-established partial CHILD SA timeout (SA expired) | pstats #455 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #455 ikev2.ike deleted exchange-timeout | #455 spent 2.11 milliseconds in total | [RE]START processing: state #455 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-203" #455: deleting state (STATE_PARENT_I1) aged 39.930s and NOT sending notification | parent state #455: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #455 "road-eastnet-nonat-203" #455: deleting IKE SA for connection 'road-eastnet-nonat-203' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-203' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-203 | State DB: deleting IKEv2 state #455 in PARENT_I1 | parent state #455: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #455 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c48f90 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c48f50 | in statetime_stop() and could not find #455 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c477f0 | handling event EVENT_SA_EXPIRE for parent state #357 | start processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #357 | un-established partial CHILD SA timeout (SA expired) | pstats #357 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #357 ikev2.ike deleted exchange-timeout | #357 spent 1.91 milliseconds in total | [RE]START processing: state #357 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-105" #357: deleting state (STATE_PARENT_I1) aged 47.104s and NOT sending notification | parent state #357: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #357 "road-eastnet-nonat-105" #357: deleting IKE SA for connection 'road-eastnet-nonat-105' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-105' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-105 | State DB: deleting IKEv2 state #357 in PARENT_I1 | parent state #357: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #357 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c47830 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c477f0 | in statetime_stop() and could not find #357 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b27290 | handling event EVENT_SA_EXPIRE for parent state #268 | start processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #268 | un-established partial CHILD SA timeout (SA expired) | pstats #268 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #268 ikev2.ike deleted exchange-timeout | #268 spent 6.71 milliseconds in total | [RE]START processing: state #268 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-16" #268: deleting state (STATE_PARENT_I1) aged 54.089s and NOT sending notification | parent state #268: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #268 "road-eastnet-nonat-16" #268: deleting IKE SA for connection 'road-eastnet-nonat-16' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-16' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-16 | State DB: deleting IKEv2 state #268 in PARENT_I1 | parent state #268: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #268 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bb7b50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b27290 | in statetime_stop() and could not find #268 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c46090 | handling event EVENT_SA_EXPIRE for parent state #498 | start processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #498 | un-established partial CHILD SA timeout (SA expired) | pstats #498 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #498 ikev2.ike deleted exchange-timeout | #498 spent 2.4 milliseconds in total | [RE]START processing: state #498 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-246" #498: deleting state (STATE_PARENT_I1) aged 34.969s and NOT sending notification | parent state #498: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #498 "road-eastnet-nonat-246" #498: deleting IKE SA for connection 'road-eastnet-nonat-246' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-246' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-246 | State DB: deleting IKEv2 state #498 in PARENT_I1 | parent state #498: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #498 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c460d0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c46090 | in statetime_stop() and could not find #498 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c44930 | handling event EVENT_SA_EXPIRE for parent state #463 | start processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #463 | un-established partial CHILD SA timeout (SA expired) | pstats #463 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #463 ikev2.ike deleted exchange-timeout | #463 spent 2.38 milliseconds in total | [RE]START processing: state #463 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-211" #463: deleting state (STATE_PARENT_I1) aged 39.009s and NOT sending notification | parent state #463: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #463 "road-eastnet-nonat-211" #463: deleting IKE SA for connection 'road-eastnet-nonat-211' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-211' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-211 | State DB: deleting IKEv2 state #463 in PARENT_I1 | parent state #463: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #463 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c44970 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c44930 | in statetime_stop() and could not find #463 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b1c400 | handling event EVENT_SA_EXPIRE for parent state #343 | start processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #343 | un-established partial CHILD SA timeout (SA expired) | pstats #343 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #343 ikev2.ike deleted exchange-timeout | #343 spent 2.52 milliseconds in total | [RE]START processing: state #343 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-91" #343: deleting state (STATE_PARENT_I1) aged 48.381s and NOT sending notification | parent state #343: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #343 "road-eastnet-nonat-91" #343: deleting IKE SA for connection 'road-eastnet-nonat-91' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-91' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-91 | State DB: deleting IKEv2 state #343 in PARENT_I1 | parent state #343: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #343 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b2c900 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b1c400 | in statetime_stop() and could not find #343 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a15810 | handling event EVENT_SA_EXPIRE for parent state #306 | start processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #306 | un-established partial CHILD SA timeout (SA expired) | pstats #306 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #306 ikev2.ike deleted exchange-timeout | #306 spent 1.85 milliseconds in total | [RE]START processing: state #306 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-54" #306: deleting state (STATE_PARENT_I1) aged 51.041s and NOT sending notification | parent state #306: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #306 "road-eastnet-nonat-54" #306: deleting IKE SA for connection 'road-eastnet-nonat-54' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-54' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-54 | State DB: deleting IKEv2 state #306 in PARENT_I1 | parent state #306: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #306 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d469dabe0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a15810 | in statetime_stop() and could not find #306 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b23150 | handling event EVENT_SA_EXPIRE for parent state #380 | start processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #380 | un-established partial CHILD SA timeout (SA expired) | pstats #380 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #380 ikev2.ike deleted exchange-timeout | #380 spent 2.14 milliseconds in total | [RE]START processing: state #380 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-128" #380: deleting state (STATE_PARENT_I1) aged 45.458s and NOT sending notification | parent state #380: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #380 "road-eastnet-nonat-128" #380: deleting IKE SA for connection 'road-eastnet-nonat-128' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-128' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-128 | State DB: deleting IKEv2 state #380 in PARENT_I1 | parent state #380: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #380 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bb6450 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b23150 | in statetime_stop() and could not find #380 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c431d0 | handling event EVENT_SA_EXPIRE for parent state #453 | start processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #453 | un-established partial CHILD SA timeout (SA expired) | pstats #453 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #453 ikev2.ike deleted exchange-timeout | #453 spent 2.12 milliseconds in total | [RE]START processing: state #453 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-201" #453: deleting state (STATE_PARENT_I1) aged 40.104s and NOT sending notification | parent state #453: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #453 "road-eastnet-nonat-201" #453: deleting IKE SA for connection 'road-eastnet-nonat-201' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-201' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-201 | State DB: deleting IKEv2 state #453 in PARENT_I1 | parent state #453: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #453 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c43210 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c431d0 | in statetime_stop() and could not find #453 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c41a70 | handling event EVENT_SA_EXPIRE for parent state #467 | start processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #467 | un-established partial CHILD SA timeout (SA expired) | pstats #467 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #467 ikev2.ike deleted exchange-timeout | #467 spent 2.24 milliseconds in total | [RE]START processing: state #467 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-215" #467: deleting state (STATE_PARENT_I1) aged 38.642s and NOT sending notification | parent state #467: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #467 "road-eastnet-nonat-215" #467: deleting IKE SA for connection 'road-eastnet-nonat-215' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-215' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-215 | State DB: deleting IKEv2 state #467 in PARENT_I1 | parent state #467: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #467 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c41ab0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c41a70 | in statetime_stop() and could not find #467 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b21b90 | handling event EVENT_SA_EXPIRE for parent state #316 | start processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #316 | un-established partial CHILD SA timeout (SA expired) | pstats #316 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #316 ikev2.ike deleted exchange-timeout | #316 spent 2.5 milliseconds in total | [RE]START processing: state #316 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-64" #316: deleting state (STATE_PARENT_I1) aged 50.226s and NOT sending notification | parent state #316: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #316 "road-eastnet-nonat-64" #316: deleting IKE SA for connection 'road-eastnet-nonat-64' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-64' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-64 | State DB: deleting IKEv2 state #316 in PARENT_I1 | parent state #316: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #316 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bb4d50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b21b90 | in statetime_stop() and could not find #316 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c40310 | handling event EVENT_SA_EXPIRE for parent state #449 | start processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #449 | un-established partial CHILD SA timeout (SA expired) | pstats #449 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #449 ikev2.ike deleted exchange-timeout | #449 spent 1.92 milliseconds in total | [RE]START processing: state #449 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-197" #449: deleting state (STATE_PARENT_I1) aged 40.456s and NOT sending notification | parent state #449: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #449 "road-eastnet-nonat-197" #449: deleting IKE SA for connection 'road-eastnet-nonat-197' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-197' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-197 | State DB: deleting IKEv2 state #449 in PARENT_I1 | parent state #449: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #449 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c40350 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c40310 | in statetime_stop() and could not find #449 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c3ebb0 | handling event EVENT_SA_EXPIRE for parent state #481 | start processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #481 | un-established partial CHILD SA timeout (SA expired) | pstats #481 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #481 ikev2.ike deleted exchange-timeout | #481 spent 1.99 milliseconds in total | [RE]START processing: state #481 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-229" #481: deleting state (STATE_PARENT_I1) aged 37.002s and NOT sending notification | parent state #481: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #481 "road-eastnet-nonat-229" #481: deleting IKE SA for connection 'road-eastnet-nonat-229' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-229' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-229 | State DB: deleting IKEv2 state #481 in PARENT_I1 | parent state #481: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #481 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c3ebf0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c3ebb0 | in statetime_stop() and could not find #481 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b1f010 | handling event EVENT_SA_EXPIRE for parent state #274 | start processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #274 | un-established partial CHILD SA timeout (SA expired) | pstats #274 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #274 ikev2.ike deleted exchange-timeout | #274 spent 2.09 milliseconds in total | [RE]START processing: state #274 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-22" #274: deleting state (STATE_PARENT_I1) aged 53.465s and NOT sending notification | parent state #274: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #274 "road-eastnet-nonat-22" #274: deleting IKE SA for connection 'road-eastnet-nonat-22' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-22' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-22 | State DB: deleting IKEv2 state #274 in PARENT_I1 | parent state #274: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #274 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bb1f50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b1f010 | in statetime_stop() and could not find #274 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b205d0 | handling event EVENT_SA_EXPIRE for parent state #341 | start processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #341 | un-established partial CHILD SA timeout (SA expired) | pstats #341 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #341 ikev2.ike deleted exchange-timeout | #341 spent 2 milliseconds in total | [RE]START processing: state #341 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-89" #341: deleting state (STATE_PARENT_I1) aged 48.548s and NOT sending notification | parent state #341: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #341 "road-eastnet-nonat-89" #341: deleting IKE SA for connection 'road-eastnet-nonat-89' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-89' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-89 | State DB: deleting IKEv2 state #341 in PARENT_I1 | parent state #341: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #341 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bb3650 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b205d0 | in statetime_stop() and could not find #341 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c3d450 | handling event EVENT_SA_EXPIRE for parent state #408 | start processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #408 | un-established partial CHILD SA timeout (SA expired) | pstats #408 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #408 ikev2.ike deleted exchange-timeout | #408 spent 2.12 milliseconds in total | [RE]START processing: state #408 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-156" #408: deleting state (STATE_PARENT_I1) aged 43.586s and NOT sending notification | parent state #408: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #408 "road-eastnet-nonat-156" #408: deleting IKE SA for connection 'road-eastnet-nonat-156' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-156' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-156 | State DB: deleting IKEv2 state #408 in PARENT_I1 | parent state #408: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #408 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c3d490 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c3d450 | in statetime_stop() and could not find #408 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c3bcf0 | handling event EVENT_SA_EXPIRE for parent state #361 | start processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #361 | un-established partial CHILD SA timeout (SA expired) | pstats #361 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #361 ikev2.ike deleted exchange-timeout | #361 spent 1.88 milliseconds in total | [RE]START processing: state #361 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-109" #361: deleting state (STATE_PARENT_I1) aged 46.790s and NOT sending notification | parent state #361: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #361 "road-eastnet-nonat-109" #361: deleting IKE SA for connection 'road-eastnet-nonat-109' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-109' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-109 | State DB: deleting IKEv2 state #361 in PARENT_I1 | parent state #361: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #361 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c3bd30 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c3bcf0 | in statetime_stop() and could not find #361 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c38e30 | handling event EVENT_SA_EXPIRE for parent state #328 | start processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #328 | un-established partial CHILD SA timeout (SA expired) | pstats #328 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #328 ikev2.ike deleted exchange-timeout | #328 spent 2.56 milliseconds in total | [RE]START processing: state #328 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-76" #328: deleting state (STATE_PARENT_I1) aged 49.367s and NOT sending notification | parent state #328: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #328 "road-eastnet-nonat-76" #328: deleting IKE SA for connection 'road-eastnet-nonat-76' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-76' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-76 | State DB: deleting IKEv2 state #328 in PARENT_I1 | parent state #328: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #328 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c38e70 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c38e30 | in statetime_stop() and could not find #328 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c3a590 | handling event EVENT_SA_EXPIRE for parent state #443 | start processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #443 | un-established partial CHILD SA timeout (SA expired) | pstats #443 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #443 ikev2.ike deleted exchange-timeout | #443 spent 2.67 milliseconds in total | [RE]START processing: state #443 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-191" #443: deleting state (STATE_PARENT_I1) aged 40.971s and NOT sending notification | parent state #443: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #443 "road-eastnet-nonat-191" #443: deleting IKE SA for connection 'road-eastnet-nonat-191' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-191' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-191 | State DB: deleting IKEv2 state #443 in PARENT_I1 | parent state #443: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #443 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c3a5d0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c3a590 | in statetime_stop() and could not find #443 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38400a3e0 | handling event EVENT_SA_EXPIRE for parent state #253 | start processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #253 | un-established partial CHILD SA timeout (SA expired) | pstats #253 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #253 ikev2.ike deleted exchange-timeout | #253 spent 1.97 milliseconds in total | [RE]START processing: state #253 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-1" #253: deleting state (STATE_PARENT_I1) aged 55.921s and NOT sending notification | parent state #253: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #253 "road-eastnet-nonat-1" #253: deleting IKE SA for connection 'road-eastnet-nonat-1' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-1' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-1 | State DB: deleting IKEv2 state #253 in PARENT_I1 | parent state #253: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #253 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb37c03b0b0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x7fb38400a3e0 | in statetime_stop() and could not find #253 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38000a3e0 | handling event EVENT_SA_EXPIRE for parent state #495 | start processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #495 | un-established partial CHILD SA timeout (SA expired) | pstats #495 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #495 ikev2.ike deleted exchange-timeout | #495 spent 2.56 milliseconds in total | [RE]START processing: state #495 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-243" #495: deleting state (STATE_PARENT_I1) aged 35.412s and NOT sending notification | parent state #495: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #495 "road-eastnet-nonat-243" #495: deleting IKE SA for connection 'road-eastnet-nonat-243' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-243' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-243 | State DB: deleting IKEv2 state #495 in PARENT_I1 | parent state #495: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #495 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x7fb36401f860 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x7fb38000a3e0 | in statetime_stop() and could not find #495 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0a980 | handling event EVENT_SA_EXPIRE for parent state #359 | start processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #359 | un-established partial CHILD SA timeout (SA expired) | pstats #359 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #359 ikev2.ike deleted exchange-timeout | #359 spent 2.53 milliseconds in total | [RE]START processing: state #359 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-107" #359: deleting state (STATE_PARENT_I1) aged 46.946s and NOT sending notification | parent state #359: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #359 "road-eastnet-nonat-107" #359: deleting IKE SA for connection 'road-eastnet-nonat-107' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-107' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-107 | State DB: deleting IKEv2 state #359 in PARENT_I1 | parent state #359: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #359 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46a28ab0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b0a980 | in statetime_stop() and could not find #359 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a49450 | handling event EVENT_SA_EXPIRE for parent state #332 | start processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #332 | un-established partial CHILD SA timeout (SA expired) | pstats #332 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #332 ikev2.ike deleted exchange-timeout | #332 spent 2.56 milliseconds in total | [RE]START processing: state #332 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-80" #332: deleting state (STATE_PARENT_I1) aged 49.122s and NOT sending notification | parent state #332: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #332 "road-eastnet-nonat-80" #332: deleting IKE SA for connection 'road-eastnet-nonat-80' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-80' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-80 | State DB: deleting IKEv2 state #332 in PARENT_I1 | parent state #332: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #332 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46ae1cc0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a49450 | in statetime_stop() and could not find #332 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a4d590 | handling event EVENT_SA_EXPIRE for parent state #377 | start processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #377 | un-established partial CHILD SA timeout (SA expired) | pstats #377 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #377 ikev2.ike deleted exchange-timeout | #377 spent 2.11 milliseconds in total | [RE]START processing: state #377 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-125" #377: deleting state (STATE_PARENT_I1) aged 45.721s and NOT sending notification | parent state #377: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #377 "road-eastnet-nonat-125" #377: deleting IKE SA for connection 'road-eastnet-nonat-125' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-125' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-125 | State DB: deleting IKEv2 state #377 in PARENT_I1 | parent state #377: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #377 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b2b340 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a4d590 | in statetime_stop() and could not find #377 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b1da50 | handling event EVENT_SA_EXPIRE for parent state #318 | start processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #318 | un-established partial CHILD SA timeout (SA expired) | pstats #318 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #318 ikev2.ike deleted exchange-timeout | #318 spent 2.27 milliseconds in total | [RE]START processing: state #318 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-66" #318: deleting state (STATE_PARENT_I1) aged 50.097s and NOT sending notification | parent state #318: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #318 "road-eastnet-nonat-66" #318: deleting IKE SA for connection 'road-eastnet-nonat-66' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-66' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-66 | State DB: deleting IKEv2 state #318 in PARENT_I1 | parent state #318: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #318 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bb0850 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b1da50 | in statetime_stop() and could not find #318 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c376d0 | handling event EVENT_SA_EXPIRE for parent state #326 | start processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #326 | un-established partial CHILD SA timeout (SA expired) | pstats #326 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #326 ikev2.ike deleted exchange-timeout | #326 spent 2.27 milliseconds in total | [RE]START processing: state #326 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-74" #326: deleting state (STATE_PARENT_I1) aged 49.555s and NOT sending notification | parent state #326: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #326 "road-eastnet-nonat-74" #326: deleting IKE SA for connection 'road-eastnet-nonat-74' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-74' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-74 | State DB: deleting IKEv2 state #326 in PARENT_I1 | parent state #326: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #326 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c37710 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c376d0 | in statetime_stop() and could not find #326 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c35f70 | handling event EVENT_SA_EXPIRE for parent state #347 | start processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #347 | un-established partial CHILD SA timeout (SA expired) | pstats #347 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #347 ikev2.ike deleted exchange-timeout | #347 spent 2.66 milliseconds in total | [RE]START processing: state #347 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-95" #347: deleting state (STATE_PARENT_I1) aged 47.965s and NOT sending notification | parent state #347: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #347 "road-eastnet-nonat-95" #347: deleting IKE SA for connection 'road-eastnet-nonat-95' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-95' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-95 | State DB: deleting IKEv2 state #347 in PARENT_I1 | parent state #347: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #347 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c35fb0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c35f70 | in statetime_stop() and could not find #347 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #513 | start processing: state #513 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 513 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #513 | **emit ISAKMP Message: | initiator cookie: | bd e9 59 71 3e 30 66 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-107 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9b f0 aa 56 99 ad 41 e6 3a 19 67 48 fc c0 1b e2 | ikev2 g^x b0 a6 21 9e 13 7a 65 b0 01 64 d4 c2 39 16 1c a3 | ikev2 g^x 09 b7 6f 2c 8c 4c 7e 2a 7c 62 da 59 d9 c0 53 20 | ikev2 g^x 5f 82 b5 8a 0c 51 a0 6c ba 44 d8 ce 26 63 57 92 | ikev2 g^x 46 0f c3 0a ab b0 53 c3 61 49 a1 a6 7a ff cb 8c | ikev2 g^x bc 6b 3c 47 62 03 e7 80 c9 67 73 83 91 0c 93 c6 | ikev2 g^x 56 27 a3 11 5d eb 2a 88 84 eb 3e 27 a2 e6 b8 18 | ikev2 g^x 93 02 c7 f9 fc cb d2 36 3c bd c3 eb 8a f7 b5 95 | ikev2 g^x e0 47 db d1 c8 42 8e 58 81 f5 ad d0 b5 63 86 42 | ikev2 g^x 1f 8b 84 dd 81 ee 70 92 6e b5 c4 39 af 9c 50 3d | ikev2 g^x 9f 95 c9 ea 1e 7c 99 d7 0e b5 ac b0 6c 63 ec ba | ikev2 g^x 8d 5f 65 5d 3b 17 25 63 e7 5c 7b 69 67 54 83 0e | ikev2 g^x c0 9b d7 b5 4f 42 2f 27 87 22 39 48 b7 84 cf cc | ikev2 g^x cf 00 bc d9 c7 6d 6e 28 f3 1c 0e b7 f5 1b dc c5 | ikev2 g^x 59 f5 4a 7b 90 a6 d5 78 62 d3 be d3 63 ef d7 f9 | ikev2 g^x 2c 59 4a 44 cf 7f 3b 21 cd 7f c7 d4 ca 1a a8 49 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a4 bc 37 1e 87 c2 34 b4 23 5a f6 0b b7 2c 74 3f | IKEv2 nonce fd 06 56 c7 93 de 20 49 09 1f b3 6b b5 db c8 d3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= bd e9 59 71 3e 30 66 18 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6b | natd_hash: port= 01 f4 | natd_hash: hash= 0a e5 9a 01 5d 43 fb 6a 98 9b f3 8a be 52 9d de | natd_hash: hash= 46 5a 7a 72 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0a e5 9a 01 5d 43 fb 6a 98 9b f3 8a be 52 9d de | Notify data 46 5a 7a 72 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= bd e9 59 71 3e 30 66 18 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= cc 5a ab 9a 19 3f 91 fb 3e 48 14 36 65 db 7f b9 | natd_hash: hash= 29 d6 f5 30 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cc 5a ab 9a 19 3f 91 fb 3e 48 14 36 65 db 7f b9 | Notify data 29 d6 f5 30 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #513 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #513 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #513 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #513: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #513 to 4294967295 after switching state | Message ID: IKE #513 skipping update_recv as MD is fake | Message ID: sent #513 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-107" #513: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.107:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #513) | bd e9 59 71 3e 30 66 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b f0 aa 56 99 ad 41 e6 3a 19 67 48 fc c0 1b e2 | b0 a6 21 9e 13 7a 65 b0 01 64 d4 c2 39 16 1c a3 | 09 b7 6f 2c 8c 4c 7e 2a 7c 62 da 59 d9 c0 53 20 | 5f 82 b5 8a 0c 51 a0 6c ba 44 d8 ce 26 63 57 92 | 46 0f c3 0a ab b0 53 c3 61 49 a1 a6 7a ff cb 8c | bc 6b 3c 47 62 03 e7 80 c9 67 73 83 91 0c 93 c6 | 56 27 a3 11 5d eb 2a 88 84 eb 3e 27 a2 e6 b8 18 | 93 02 c7 f9 fc cb d2 36 3c bd c3 eb 8a f7 b5 95 | e0 47 db d1 c8 42 8e 58 81 f5 ad d0 b5 63 86 42 | 1f 8b 84 dd 81 ee 70 92 6e b5 c4 39 af 9c 50 3d | 9f 95 c9 ea 1e 7c 99 d7 0e b5 ac b0 6c 63 ec ba | 8d 5f 65 5d 3b 17 25 63 e7 5c 7b 69 67 54 83 0e | c0 9b d7 b5 4f 42 2f 27 87 22 39 48 b7 84 cf cc | cf 00 bc d9 c7 6d 6e 28 f3 1c 0e b7 f5 1b dc c5 | 59 f5 4a 7b 90 a6 d5 78 62 d3 be d3 63 ef d7 f9 | 2c 59 4a 44 cf 7f 3b 21 cd 7f c7 d4 ca 1a a8 49 | 29 00 00 24 a4 bc 37 1e 87 c2 34 b4 23 5a f6 0b | b7 2c 74 3f fd 06 56 c7 93 de 20 49 09 1f b3 6b | b5 db c8 d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a e5 9a 01 5d 43 fb 6a 98 9b f3 8a | be 52 9d de 46 5a 7a 72 00 00 00 1c 00 00 40 05 | cc 5a ab 9a 19 3f 91 fb 3e 48 14 36 65 db 7f b9 | 29 d6 f5 30 | state #513 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37003a770 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb370012890 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354039e80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #513 | libevent_malloc: new ptr-libevent@0x7fb35404e8b0 size 128 | #513 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.204762 | resume sending helper answer for #513 suppresed complete_v2_state_transition() and stole MD | #513 spent 0.315 milliseconds in resume sending helper answer | stop processing: state #513 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c0511f0 | timer_event_cb: processing event@0x557d46b1aed0 | handling event EVENT_SA_EXPIRE for parent state #321 | start processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #321 | un-established partial CHILD SA timeout (SA expired) | pstats #321 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #321 ikev2.ike deleted exchange-timeout | #321 spent 1.83 milliseconds in total | [RE]START processing: state #321 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-69" #321: deleting state (STATE_PARENT_I1) aged 49.880s and NOT sending notification | parent state #321: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #321 "road-eastnet-nonat-69" #321: deleting IKE SA for connection 'road-eastnet-nonat-69' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-69' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-69 | State DB: deleting IKEv2 state #321 in PARENT_I1 | parent state #321: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #321 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46baf150 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b1aed0 | in statetime_stop() and could not find #321 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c34810 | handling event EVENT_SA_EXPIRE for parent state #369 | start processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #369 | un-established partial CHILD SA timeout (SA expired) | pstats #369 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #369 ikev2.ike deleted exchange-timeout | #369 spent 2.8 milliseconds in total | [RE]START processing: state #369 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-117" #369: deleting state (STATE_PARENT_I1) aged 46.231s and NOT sending notification | parent state #369: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #369 "road-eastnet-nonat-117" #369: deleting IKE SA for connection 'road-eastnet-nonat-117' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-117' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-117 | State DB: deleting IKEv2 state #369 in PARENT_I1 | parent state #369: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #369 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c34850 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c34810 | in statetime_stop() and could not find #369 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #510 | start processing: state #510 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 510 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #510 | **emit ISAKMP Message: | initiator cookie: | bc 30 61 cf 1c f5 21 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-102 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7d 16 ac 90 1b e8 fc 3d a1 f6 2f f6 5b aa 38 5f | ikev2 g^x 13 bc 3b ec ce 54 9b 92 94 b5 7c b5 e6 92 4b 0f | ikev2 g^x 82 fe 63 f8 ae e6 73 78 f6 99 0a 42 80 fb a6 71 | ikev2 g^x 1d 6d c1 8b be 9b 09 d6 dc d8 6a 99 20 35 d5 82 | ikev2 g^x 27 70 ed c6 95 de df 76 74 d7 3e 14 50 79 f0 89 | ikev2 g^x ae 4e 98 1c 30 c5 99 94 51 22 91 53 e5 49 a5 a5 | ikev2 g^x 4e d2 de 84 a6 45 26 dc 5a 29 c7 7c 52 2b 31 8d | ikev2 g^x 7b a4 cf c6 13 95 ce 98 5a 32 37 1e 3c f9 dc 95 | ikev2 g^x 74 b2 58 3f bf f8 56 2f b2 ed 28 17 6b fc 7e 85 | ikev2 g^x c4 ca f3 5d 2b 78 55 ad d1 65 97 11 a6 22 08 7c | ikev2 g^x b5 aa 63 e0 e4 66 be 74 9d 1a b0 75 bf 11 a5 cb | ikev2 g^x 35 00 1a 58 9e 5f 9b 3a 5c 4a 5e 5b 7c 41 b5 39 | ikev2 g^x 8c e2 21 3f a3 1f 5d 86 72 e4 89 93 96 9a e1 e9 | ikev2 g^x 74 b9 24 6d 9f d6 67 09 e9 73 bb f9 0b 1c 88 a6 | ikev2 g^x 68 a2 54 4f 6c 95 d8 be 9b cd 89 96 d8 9d 33 48 | ikev2 g^x fb e8 c2 fa 1f fd 3e a7 c4 fc 87 a0 2d d1 0a 3b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a8 33 19 fd 53 f2 7c 45 88 0e ac 9b 8c 61 3a 57 | IKEv2 nonce a6 74 c6 f9 cb 73 c2 48 34 44 1a b7 09 32 3c 47 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= bc 30 61 cf 1c f5 21 bb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 66 | natd_hash: port= 01 f4 | natd_hash: hash= 86 4c e5 d6 4c 06 64 b8 31 f1 40 df 16 6a c3 cc | natd_hash: hash= 04 2a 1f ac | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 86 4c e5 d6 4c 06 64 b8 31 f1 40 df 16 6a c3 cc | Notify data 04 2a 1f ac | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= bc 30 61 cf 1c f5 21 bb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f4 a4 c7 b2 58 33 da 00 b3 aa 2f f5 ea 56 ab cb | natd_hash: hash= 57 27 19 d1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f4 a4 c7 b2 58 33 da 00 b3 aa 2f f5 ea 56 ab cb | Notify data 57 27 19 d1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #510 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #510 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #510 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #510: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #510 to 4294967295 after switching state | Message ID: IKE #510 skipping update_recv as MD is fake | Message ID: sent #510 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-102" #510: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.102:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #510) | bc 30 61 cf 1c f5 21 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7d 16 ac 90 1b e8 fc 3d a1 f6 2f f6 5b aa 38 5f | 13 bc 3b ec ce 54 9b 92 94 b5 7c b5 e6 92 4b 0f | 82 fe 63 f8 ae e6 73 78 f6 99 0a 42 80 fb a6 71 | 1d 6d c1 8b be 9b 09 d6 dc d8 6a 99 20 35 d5 82 | 27 70 ed c6 95 de df 76 74 d7 3e 14 50 79 f0 89 | ae 4e 98 1c 30 c5 99 94 51 22 91 53 e5 49 a5 a5 | 4e d2 de 84 a6 45 26 dc 5a 29 c7 7c 52 2b 31 8d | 7b a4 cf c6 13 95 ce 98 5a 32 37 1e 3c f9 dc 95 | 74 b2 58 3f bf f8 56 2f b2 ed 28 17 6b fc 7e 85 | c4 ca f3 5d 2b 78 55 ad d1 65 97 11 a6 22 08 7c | b5 aa 63 e0 e4 66 be 74 9d 1a b0 75 bf 11 a5 cb | 35 00 1a 58 9e 5f 9b 3a 5c 4a 5e 5b 7c 41 b5 39 | 8c e2 21 3f a3 1f 5d 86 72 e4 89 93 96 9a e1 e9 | 74 b9 24 6d 9f d6 67 09 e9 73 bb f9 0b 1c 88 a6 | 68 a2 54 4f 6c 95 d8 be 9b cd 89 96 d8 9d 33 48 | fb e8 c2 fa 1f fd 3e a7 c4 fc 87 a0 2d d1 0a 3b | 29 00 00 24 a8 33 19 fd 53 f2 7c 45 88 0e ac 9b | 8c 61 3a 57 a6 74 c6 f9 cb 73 c2 48 34 44 1a b7 | 09 32 3c 47 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 4c e5 d6 4c 06 64 b8 31 f1 40 df | 16 6a c3 cc 04 2a 1f ac 00 00 00 1c 00 00 40 05 | f4 a4 c7 b2 58 33 da 00 b3 aa 2f f5 ea 56 ab cb | 57 27 19 d1 | state #510 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb384041c10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb3840223f0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c0346e0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #510 | libevent_malloc: new ptr-libevent@0x7fb35c0511f0 size 128 | #510 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.205195 | resume sending helper answer for #510 suppresed complete_v2_state_transition() and stole MD | #510 spent 0.309 milliseconds in resume sending helper answer | stop processing: state #510 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36004e850 | processing resume sending helper answer for #511 | start processing: state #511 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 511 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #511 | **emit ISAKMP Message: | initiator cookie: | d0 cd fa e1 13 2d 20 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-88 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2d 50 62 2d 29 93 99 de 0e af 50 23 34 5f ad fb | ikev2 g^x 4c bf da 43 26 a3 47 17 44 42 44 91 b3 08 e0 52 | ikev2 g^x 9a 2e 33 64 a4 26 28 05 d5 00 de d9 4e 66 1b ab | ikev2 g^x 5a 6d 0e b8 94 3f 64 cb a8 67 5b 93 62 e2 29 49 | ikev2 g^x 15 ef 3f fd 0a ac 35 c6 4e 73 10 ab 4f 5d 53 8e | ikev2 g^x a4 cf e0 a6 67 4d ad 8c d1 a8 5a 9c 43 ba 9d a7 | ikev2 g^x 4c 51 1b 30 43 59 5b 25 95 48 42 6a b3 83 84 db | ikev2 g^x 91 da 84 92 79 2e e8 75 a7 77 e4 4c 0a eb 8f 66 | ikev2 g^x 34 40 55 c8 da e8 1b 72 62 30 64 22 19 0b c5 6f | ikev2 g^x bb 93 c9 c9 9e c1 e2 88 ad 0f 56 0d bb 0a ec ad | ikev2 g^x e2 01 a6 b4 88 92 57 a6 85 c2 08 b0 1f 07 9c 06 | ikev2 g^x 45 a6 f9 c7 63 ad b8 14 32 f1 4e 6c 2f f3 fa c4 | ikev2 g^x 52 99 fc 99 df 29 80 f9 cd af e8 d8 51 1d ea fc | ikev2 g^x 37 40 3b 2e 41 2d 1b 80 95 af 27 c3 07 65 8b a6 | ikev2 g^x 12 f6 45 c0 ec 6c f8 a8 51 0a 31 05 6c 78 0a ed | ikev2 g^x bf 1c 18 f5 61 de 1f a7 51 bb 0d 25 18 af fc 72 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b3 7b 7f 54 09 ea 11 14 a2 54 1c f4 ef 5a 78 e7 | IKEv2 nonce f0 13 91 b1 46 b7 6f f0 4f 4f 95 a6 39 1b 25 53 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d0 cd fa e1 13 2d 20 e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 58 | natd_hash: port= 01 f4 | natd_hash: hash= 2e ea 0c f9 37 0c 35 90 90 78 51 37 77 43 20 7b | natd_hash: hash= e3 6c 0c 23 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2e ea 0c f9 37 0c 35 90 90 78 51 37 77 43 20 7b | Notify data e3 6c 0c 23 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d0 cd fa e1 13 2d 20 e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2b 3e 6c 54 b9 12 19 37 d1 cc e2 3a 04 74 55 d1 | natd_hash: hash= 46 7f d5 af | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2b 3e 6c 54 b9 12 19 37 d1 cc e2 3a 04 74 55 d1 | Notify data 46 7f d5 af | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #511 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #511 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #511 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #511: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #511 to 4294967295 after switching state | Message ID: IKE #511 skipping update_recv as MD is fake | Message ID: sent #511 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-88" #511: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.88:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #511) | d0 cd fa e1 13 2d 20 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 50 62 2d 29 93 99 de 0e af 50 23 34 5f ad fb | 4c bf da 43 26 a3 47 17 44 42 44 91 b3 08 e0 52 | 9a 2e 33 64 a4 26 28 05 d5 00 de d9 4e 66 1b ab | 5a 6d 0e b8 94 3f 64 cb a8 67 5b 93 62 e2 29 49 | 15 ef 3f fd 0a ac 35 c6 4e 73 10 ab 4f 5d 53 8e | a4 cf e0 a6 67 4d ad 8c d1 a8 5a 9c 43 ba 9d a7 | 4c 51 1b 30 43 59 5b 25 95 48 42 6a b3 83 84 db | 91 da 84 92 79 2e e8 75 a7 77 e4 4c 0a eb 8f 66 | 34 40 55 c8 da e8 1b 72 62 30 64 22 19 0b c5 6f | bb 93 c9 c9 9e c1 e2 88 ad 0f 56 0d bb 0a ec ad | e2 01 a6 b4 88 92 57 a6 85 c2 08 b0 1f 07 9c 06 | 45 a6 f9 c7 63 ad b8 14 32 f1 4e 6c 2f f3 fa c4 | 52 99 fc 99 df 29 80 f9 cd af e8 d8 51 1d ea fc | 37 40 3b 2e 41 2d 1b 80 95 af 27 c3 07 65 8b a6 | 12 f6 45 c0 ec 6c f8 a8 51 0a 31 05 6c 78 0a ed | bf 1c 18 f5 61 de 1f a7 51 bb 0d 25 18 af fc 72 | 29 00 00 24 b3 7b 7f 54 09 ea 11 14 a2 54 1c f4 | ef 5a 78 e7 f0 13 91 b1 46 b7 6f f0 4f 4f 95 a6 | 39 1b 25 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e ea 0c f9 37 0c 35 90 90 78 51 37 | 77 43 20 7b e3 6c 0c 23 00 00 00 1c 00 00 40 05 | 2b 3e 6c 54 b9 12 19 37 d1 cc e2 3a 04 74 55 d1 | 46 7f d5 af | state #511 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34000cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a42790 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360025210 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #511 | libevent_malloc: new ptr-libevent@0x7fb36004e850 size 128 | #511 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.205498 | resume sending helper answer for #511 suppresed complete_v2_state_transition() and stole MD | #511 spent 0.282 milliseconds in resume sending helper answer | stop processing: state #511 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36404ec60 | timer_event_cb: processing event@0x557d46a7b910 | handling event EVENT_SA_EXPIRE for parent state #257 | start processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #257 | un-established partial CHILD SA timeout (SA expired) | pstats #257 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #257 ikev2.ike deleted exchange-timeout | #257 spent 2.72 milliseconds in total | [RE]START processing: state #257 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-5" #257: deleting state (STATE_PARENT_I1) aged 55.250s and NOT sending notification | parent state #257: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #257 "road-eastnet-nonat-5" #257: deleting IKE SA for connection 'road-eastnet-nonat-5' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-5' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-5 | State DB: deleting IKEv2 state #257 in PARENT_I1 | parent state #257: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #257 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b29d80 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a7b910 | in statetime_stop() and could not find #257 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b18350 | handling event EVENT_SA_EXPIRE for parent state #333 | start processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #333 | un-established partial CHILD SA timeout (SA expired) | pstats #333 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #333 ikev2.ike deleted exchange-timeout | #333 spent 2.44 milliseconds in total | [RE]START processing: state #333 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-81" #333: deleting state (STATE_PARENT_I1) aged 49.059s and NOT sending notification | parent state #333: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #333 "road-eastnet-nonat-81" #333: deleting IKE SA for connection 'road-eastnet-nonat-81' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-81' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-81 | State DB: deleting IKEv2 state #333 in PARENT_I1 | parent state #333: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #333 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bada50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b18350 | in statetime_stop() and could not find #333 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #524 | start processing: state #524 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 524 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #524 | **emit ISAKMP Message: | initiator cookie: | ad da d3 24 2d 65 26 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-29 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c1 9b 4d af 9d 8e 16 4e 79 9d 95 9d 88 b2 5e 09 | ikev2 g^x f6 4f d0 1c b0 25 e9 93 be b2 69 1f 36 9c 49 a0 | ikev2 g^x 44 f5 dc ea 0c 18 d3 cf 65 08 01 43 ec 36 05 b8 | ikev2 g^x 2a d7 b3 3b d1 93 c2 8a 31 77 1f 9d 2c c9 a8 3a | ikev2 g^x 11 f5 95 7b c4 81 fc 5d 96 ee bd 44 15 34 22 c1 | ikev2 g^x 71 4a 5f 76 cd 57 fb 11 79 0a f5 62 1b 91 3b de | ikev2 g^x e4 fe 82 b2 18 dc c5 d3 a5 42 a7 79 6d aa 95 f6 | ikev2 g^x 00 d9 74 30 e3 e8 a8 2a 76 02 2c fb 3d 48 e4 b8 | ikev2 g^x da e6 31 2e e9 38 9e d5 03 35 33 93 c3 a5 f1 20 | ikev2 g^x f2 62 cb a8 16 a1 46 60 30 4f 28 ac 47 61 ae 14 | ikev2 g^x 02 70 2b e7 2b 16 7f f2 18 02 58 cb bf df be f3 | ikev2 g^x bd 14 94 03 17 e6 3a 05 80 08 27 04 a8 69 b6 19 | ikev2 g^x 8b 17 87 72 b2 0e 37 35 38 6c 05 37 e1 09 09 e7 | ikev2 g^x 9e 9d 08 8d 77 97 ae 5d 2b cf 0a e1 f9 c1 73 85 | ikev2 g^x fd c0 15 2b 82 a2 5c 29 27 48 fe b2 e1 3e 87 a4 | ikev2 g^x 06 6d 09 b3 f8 4c ea 61 50 a9 b2 37 a9 12 e8 76 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 58 4a df 1f 4b 4b ff 86 2f 20 df 0f ac 70 4d 1f | IKEv2 nonce f0 2d 6f 07 f3 a2 91 54 47 78 60 b6 71 cd e8 59 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ad da d3 24 2d 65 26 ce | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1d | natd_hash: port= 01 f4 | natd_hash: hash= 4c dc d6 72 67 d3 e7 69 f5 94 9f 27 9b e1 4a 44 | natd_hash: hash= 55 e1 6a f7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4c dc d6 72 67 d3 e7 69 f5 94 9f 27 9b e1 4a 44 | Notify data 55 e1 6a f7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ad da d3 24 2d 65 26 ce | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4e 1f a7 8f 6a af 3d 63 0f b3 f8 d5 e1 3f a9 d4 | natd_hash: hash= b3 8f 35 dc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4e 1f a7 8f 6a af 3d 63 0f b3 f8 d5 e1 3f a9 d4 | Notify data b3 8f 35 dc | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #524 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #524 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #524 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #524: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #524 to 4294967295 after switching state | Message ID: IKE #524 skipping update_recv as MD is fake | Message ID: sent #524 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-29" #524: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.29:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #524) | ad da d3 24 2d 65 26 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 9b 4d af 9d 8e 16 4e 79 9d 95 9d 88 b2 5e 09 | f6 4f d0 1c b0 25 e9 93 be b2 69 1f 36 9c 49 a0 | 44 f5 dc ea 0c 18 d3 cf 65 08 01 43 ec 36 05 b8 | 2a d7 b3 3b d1 93 c2 8a 31 77 1f 9d 2c c9 a8 3a | 11 f5 95 7b c4 81 fc 5d 96 ee bd 44 15 34 22 c1 | 71 4a 5f 76 cd 57 fb 11 79 0a f5 62 1b 91 3b de | e4 fe 82 b2 18 dc c5 d3 a5 42 a7 79 6d aa 95 f6 | 00 d9 74 30 e3 e8 a8 2a 76 02 2c fb 3d 48 e4 b8 | da e6 31 2e e9 38 9e d5 03 35 33 93 c3 a5 f1 20 | f2 62 cb a8 16 a1 46 60 30 4f 28 ac 47 61 ae 14 | 02 70 2b e7 2b 16 7f f2 18 02 58 cb bf df be f3 | bd 14 94 03 17 e6 3a 05 80 08 27 04 a8 69 b6 19 | 8b 17 87 72 b2 0e 37 35 38 6c 05 37 e1 09 09 e7 | 9e 9d 08 8d 77 97 ae 5d 2b cf 0a e1 f9 c1 73 85 | fd c0 15 2b 82 a2 5c 29 27 48 fe b2 e1 3e 87 a4 | 06 6d 09 b3 f8 4c ea 61 50 a9 b2 37 a9 12 e8 76 | 29 00 00 24 58 4a df 1f 4b 4b ff 86 2f 20 df 0f | ac 70 4d 1f f0 2d 6f 07 f3 a2 91 54 47 78 60 b6 | 71 cd e8 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c dc d6 72 67 d3 e7 69 f5 94 9f 27 | 9b e1 4a 44 55 e1 6a f7 00 00 00 1c 00 00 40 05 | 4e 1f a7 8f 6a af 3d 63 0f b3 f8 d5 e1 3f a9 d4 | b3 8f 35 dc | state #524 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3500300e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb3600129a0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36401e230 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #524 | libevent_malloc: new ptr-libevent@0x7fb36404ec60 size 128 | #524 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.205897 | resume sending helper answer for #524 suppresed complete_v2_state_transition() and stole MD | #524 spent 0.282 milliseconds in resume sending helper answer | stop processing: state #524 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb378051330 | timer_event_cb: processing event@0x557d46c330b0 | handling event EVENT_SA_EXPIRE for parent state #394 | start processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #394 | un-established partial CHILD SA timeout (SA expired) | pstats #394 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #394 ikev2.ike deleted exchange-timeout | #394 spent 1.96 milliseconds in total | [RE]START processing: state #394 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-142" #394: deleting state (STATE_PARENT_I1) aged 44.525s and NOT sending notification | parent state #394: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #394 "road-eastnet-nonat-142" #394: deleting IKE SA for connection 'road-eastnet-nonat-142' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-142' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-142 | State DB: deleting IKEv2 state #394 in PARENT_I1 | parent state #394: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #394 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c330f0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c330b0 | in statetime_stop() and could not find #394 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #508 | start processing: state #508 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 508 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #508 | **emit ISAKMP Message: | initiator cookie: | dc 3f 02 d2 13 45 35 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-242 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1d a9 32 87 b1 90 82 93 0a 0b 68 7a df 0e cd ea | ikev2 g^x 4e 12 c3 9f a0 a0 db 88 eb 7c 77 42 14 a4 f9 02 | ikev2 g^x a9 02 c1 13 c2 56 17 b8 78 50 73 cf 37 95 03 3b | ikev2 g^x 9f a9 9f 88 fe df 99 cf a6 7c d9 96 30 f6 e3 3c | ikev2 g^x ff da a7 12 b9 67 b1 01 1e 94 44 d3 2d 66 e8 ab | ikev2 g^x 93 b4 41 cb 47 2f 3b b1 72 1a 25 46 61 80 3c 91 | ikev2 g^x fd cc 10 8b 86 fc 21 07 c7 5b 16 7a fe f3 c7 5c | ikev2 g^x b0 46 97 1c 76 a9 4b 9d 86 2e fa 04 56 7b cb a3 | ikev2 g^x b7 fe 1a 7b 4d fe 92 09 4b 17 df a9 9b 0f d4 5b | ikev2 g^x a9 06 58 5c b0 f7 c2 a4 71 cc 56 f7 a4 cb ae b4 | ikev2 g^x 36 1d de 4d 00 ad 9a ec ec ba 71 93 15 4d 0c e2 | ikev2 g^x 83 0f 23 94 d7 c2 0c 19 16 44 17 09 f4 40 84 da | ikev2 g^x 41 ec 50 fa 16 6e 50 f1 55 79 e5 0b 17 dc df d0 | ikev2 g^x 12 ca a0 4b 05 a1 a6 2c 7d 1e e6 72 04 2b 9d f5 | ikev2 g^x f1 0a bd da 88 25 7c 99 8f 11 ec b1 37 2c 76 0e | ikev2 g^x 43 b9 fb 60 6e 3f 37 47 06 8f 9f 3f 60 14 04 eb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 92 60 8e 47 54 65 21 7e 19 d2 97 01 48 40 e2 71 | IKEv2 nonce bf 81 d1 29 42 df a0 d9 5b 12 66 4f bd 5f 3d 97 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= dc 3f 02 d2 13 45 35 59 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f2 | natd_hash: port= 01 f4 | natd_hash: hash= 59 f1 6c fa bf f7 cf e9 0c 8d 98 4e 77 aa d2 f2 | natd_hash: hash= 40 a1 0a 37 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 59 f1 6c fa bf f7 cf e9 0c 8d 98 4e 77 aa d2 f2 | Notify data 40 a1 0a 37 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= dc 3f 02 d2 13 45 35 59 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= bd ae 80 ba 97 bb f2 9c 7c 0e d6 fc 4b ac 9b 03 | natd_hash: hash= c1 38 67 4e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bd ae 80 ba 97 bb f2 9c 7c 0e d6 fc 4b ac 9b 03 | Notify data c1 38 67 4e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #508 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #508 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #508 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #508: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #508 to 4294967295 after switching state | Message ID: IKE #508 skipping update_recv as MD is fake | Message ID: sent #508 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-242" #508: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.242:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #508) | dc 3f 02 d2 13 45 35 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d a9 32 87 b1 90 82 93 0a 0b 68 7a df 0e cd ea | 4e 12 c3 9f a0 a0 db 88 eb 7c 77 42 14 a4 f9 02 | a9 02 c1 13 c2 56 17 b8 78 50 73 cf 37 95 03 3b | 9f a9 9f 88 fe df 99 cf a6 7c d9 96 30 f6 e3 3c | ff da a7 12 b9 67 b1 01 1e 94 44 d3 2d 66 e8 ab | 93 b4 41 cb 47 2f 3b b1 72 1a 25 46 61 80 3c 91 | fd cc 10 8b 86 fc 21 07 c7 5b 16 7a fe f3 c7 5c | b0 46 97 1c 76 a9 4b 9d 86 2e fa 04 56 7b cb a3 | b7 fe 1a 7b 4d fe 92 09 4b 17 df a9 9b 0f d4 5b | a9 06 58 5c b0 f7 c2 a4 71 cc 56 f7 a4 cb ae b4 | 36 1d de 4d 00 ad 9a ec ec ba 71 93 15 4d 0c e2 | 83 0f 23 94 d7 c2 0c 19 16 44 17 09 f4 40 84 da | 41 ec 50 fa 16 6e 50 f1 55 79 e5 0b 17 dc df d0 | 12 ca a0 4b 05 a1 a6 2c 7d 1e e6 72 04 2b 9d f5 | f1 0a bd da 88 25 7c 99 8f 11 ec b1 37 2c 76 0e | 43 b9 fb 60 6e 3f 37 47 06 8f 9f 3f 60 14 04 eb | 29 00 00 24 92 60 8e 47 54 65 21 7e 19 d2 97 01 | 48 40 e2 71 bf 81 d1 29 42 df a0 d9 5b 12 66 4f | bd 5f 3d 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 f1 6c fa bf f7 cf e9 0c 8d 98 4e | 77 aa d2 f2 40 a1 0a 37 00 00 00 1c 00 00 40 05 | bd ae 80 ba 97 bb f2 9c 7c 0e d6 fc 4b ac 9b 03 | c1 38 67 4e | state #508 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3540180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a6e010 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #508 | libevent_malloc: new ptr-libevent@0x7fb378051330 size 128 | #508 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.206285 | resume sending helper answer for #508 suppresed complete_v2_state_transition() and stole MD | #508 spent 0.315 milliseconds in resume sending helper answer | stop processing: state #508 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb368035930 | timer_event_cb: processing event@0x557d46b16d90 | handling event EVENT_SA_EXPIRE for parent state #259 | start processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #259 | un-established partial CHILD SA timeout (SA expired) | pstats #259 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #259 ikev2.ike deleted exchange-timeout | #259 spent 2.74 milliseconds in total | [RE]START processing: state #259 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-7" #259: deleting state (STATE_PARENT_I1) aged 55.078s and NOT sending notification | parent state #259: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #259 "road-eastnet-nonat-7" #259: deleting IKE SA for connection 'road-eastnet-nonat-7' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-7' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-7 | State DB: deleting IKEv2 state #259 in PARENT_I1 | parent state #259: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #259 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bac350 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b16d90 | in statetime_stop() and could not find #259 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c31950 | handling event EVENT_SA_EXPIRE for parent state #439 | start processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #439 | un-established partial CHILD SA timeout (SA expired) | pstats #439 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #439 ikev2.ike deleted exchange-timeout | #439 spent 2.03 milliseconds in total | [RE]START processing: state #439 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-187" #439: deleting state (STATE_PARENT_I1) aged 41.396s and NOT sending notification | parent state #439: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #439 "road-eastnet-nonat-187" #439: deleting IKE SA for connection 'road-eastnet-nonat-187' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-187' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-187 | State DB: deleting IKEv2 state #439 in PARENT_I1 | parent state #439: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #439 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c31990 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c31950 | in statetime_stop() and could not find #439 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c301f0 | handling event EVENT_SA_EXPIRE for parent state #420 | start processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #420 | un-established partial CHILD SA timeout (SA expired) | pstats #420 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #420 ikev2.ike deleted exchange-timeout | #420 spent 2.01 milliseconds in total | [RE]START processing: state #420 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-168" #420: deleting state (STATE_PARENT_I1) aged 42.794s and NOT sending notification | parent state #420: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #420 "road-eastnet-nonat-168" #420: deleting IKE SA for connection 'road-eastnet-nonat-168' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-168' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-168 | State DB: deleting IKEv2 state #420 in PARENT_I1 | parent state #420: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #420 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c30230 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c301f0 | in statetime_stop() and could not find #420 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aaf800 | handling event EVENT_SA_EXPIRE for parent state #281 | start processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #281 | un-established partial CHILD SA timeout (SA expired) | pstats #281 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #281 ikev2.ike deleted exchange-timeout | #281 spent 2.42 milliseconds in total | [RE]START processing: state #281 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-29" #281: deleting state (STATE_PARENT_I1) aged 52.902s and NOT sending notification | parent state #281: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #281 "road-eastnet-nonat-29" #281: deleting IKE SA for connection 'road-eastnet-nonat-29' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-29' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-29 | State DB: deleting IKEv2 state #281 in PARENT_I1 | parent state #281: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #281 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46addb80 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46aaf800 | in statetime_stop() and could not find #281 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0d500 | handling event EVENT_SA_EXPIRE for parent state #288 | start processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #288 | un-established partial CHILD SA timeout (SA expired) | pstats #288 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #288 ikev2.ike deleted exchange-timeout | #288 spent 1.88 milliseconds in total | [RE]START processing: state #288 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-36" #288: deleting state (STATE_PARENT_I1) aged 52.388s and NOT sending notification | parent state #288: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #288 "road-eastnet-nonat-36" #288: deleting IKE SA for connection 'road-eastnet-nonat-36' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-36' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-36 | State DB: deleting IKEv2 state #288 in PARENT_I1 | parent state #288: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #288 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b287c0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b0d500 | in statetime_stop() and could not find #288 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b157d0 | handling event EVENT_SA_EXPIRE for parent state #260 | start processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #260 | un-established partial CHILD SA timeout (SA expired) | pstats #260 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #260 ikev2.ike deleted exchange-timeout | #260 spent 1.88 milliseconds in total | [RE]START processing: state #260 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-8" #260: deleting state (STATE_PARENT_I1) aged 54.975s and NOT sending notification | parent state #260: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #260 "road-eastnet-nonat-8" #260: deleting IKE SA for connection 'road-eastnet-nonat-8' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-8' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-8 | State DB: deleting IKEv2 state #260 in PARENT_I1 | parent state #260: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #260 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46baac50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b157d0 | in statetime_stop() and could not find #260 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c2ea90 | handling event EVENT_SA_EXPIRE for parent state #353 | start processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #353 | un-established partial CHILD SA timeout (SA expired) | pstats #353 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #353 ikev2.ike deleted exchange-timeout | #353 spent 2.51 milliseconds in total | [RE]START processing: state #353 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-101" #353: deleting state (STATE_PARENT_I1) aged 47.397s and NOT sending notification | parent state #353: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #353 "road-eastnet-nonat-101" #353: deleting IKE SA for connection 'road-eastnet-nonat-101' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-101' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-101 | State DB: deleting IKEv2 state #353 in PARENT_I1 | parent state #353: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #353 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c2ead0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c2ea90 | in statetime_stop() and could not find #353 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c2d330 | handling event EVENT_SA_EXPIRE for parent state #401 | start processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #401 | un-established partial CHILD SA timeout (SA expired) | pstats #401 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #401 ikev2.ike deleted exchange-timeout | #401 spent 2.56 milliseconds in total | [RE]START processing: state #401 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-149" #401: deleting state (STATE_PARENT_I1) aged 44.035s and NOT sending notification | parent state #401: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #401 "road-eastnet-nonat-149" #401: deleting IKE SA for connection 'road-eastnet-nonat-149' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-149' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-149 | State DB: deleting IKEv2 state #401 in PARENT_I1 | parent state #401: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #401 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c2d370 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c2d330 | in statetime_stop() and could not find #401 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b14210 | handling event EVENT_SA_EXPIRE for parent state #256 | start processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #256 | un-established partial CHILD SA timeout (SA expired) | pstats #256 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #256 ikev2.ike deleted exchange-timeout | #256 spent 1.88 milliseconds in total | [RE]START processing: state #256 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-4" #256: deleting state (STATE_PARENT_I1) aged 55.386s and NOT sending notification | parent state #256: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #256 "road-eastnet-nonat-4" #256: deleting IKE SA for connection 'road-eastnet-nonat-4' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-4' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-4 | State DB: deleting IKEv2 state #256 in PARENT_I1 | parent state #256: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #256 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46ba9550 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b14210 | in statetime_stop() and could not find #256 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c2bbd0 | handling event EVENT_SA_EXPIRE for parent state #422 | start processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #422 | un-established partial CHILD SA timeout (SA expired) | pstats #422 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #422 ikev2.ike deleted exchange-timeout | #422 spent 2.46 milliseconds in total | [RE]START processing: state #422 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-170" #422: deleting state (STATE_PARENT_I1) aged 42.655s and NOT sending notification | parent state #422: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #422 "road-eastnet-nonat-170" #422: deleting IKE SA for connection 'road-eastnet-nonat-170' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-170' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-170 | State DB: deleting IKEv2 state #422 in PARENT_I1 | parent state #422: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #422 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c2bc10 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c2bbd0 | in statetime_stop() and could not find #422 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c2a470 | handling event EVENT_SA_EXPIRE for parent state #363 | start processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #363 | un-established partial CHILD SA timeout (SA expired) | pstats #363 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #363 ikev2.ike deleted exchange-timeout | #363 spent 2.38 milliseconds in total | [RE]START processing: state #363 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-111" #363: deleting state (STATE_PARENT_I1) aged 46.620s and NOT sending notification | parent state #363: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #363 "road-eastnet-nonat-111" #363: deleting IKE SA for connection 'road-eastnet-nonat-111' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-111' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-111 | State DB: deleting IKEv2 state #363 in PARENT_I1 | parent state #363: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #363 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c2a4b0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c2a470 | in statetime_stop() and could not find #363 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46acec40 | handling event EVENT_SA_EXPIRE for parent state #425 | start processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #425 | un-established partial CHILD SA timeout (SA expired) | pstats #425 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #425 ikev2.ike deleted exchange-timeout | #425 spent 2.62 milliseconds in total | [RE]START processing: state #425 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-173" #425: deleting state (STATE_PARENT_I1) aged 42.454s and NOT sending notification | parent state #425: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #425 "road-eastnet-nonat-173" #425: deleting IKE SA for connection 'road-eastnet-nonat-173' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-173' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-173 | State DB: deleting IKEv2 state #425 in PARENT_I1 | parent state #425: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #425 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b27200 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46acec40 | in statetime_stop() and could not find #425 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b11690 | handling event EVENT_SA_EXPIRE for parent state #311 | start processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #311 | un-established partial CHILD SA timeout (SA expired) | pstats #311 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #311 ikev2.ike deleted exchange-timeout | #311 spent 1.97 milliseconds in total | [RE]START processing: state #311 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-59" #311: deleting state (STATE_PARENT_I1) aged 50.543s and NOT sending notification | parent state #311: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #311 "road-eastnet-nonat-59" #311: deleting IKE SA for connection 'road-eastnet-nonat-59' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-59' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-59 | State DB: deleting IKEv2 state #311 in PARENT_I1 | parent state #311: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #311 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46ba7e50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b11690 | in statetime_stop() and could not find #311 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c28d10 | handling event EVENT_SA_EXPIRE for parent state #334 | start processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #334 | un-established partial CHILD SA timeout (SA expired) | pstats #334 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #334 ikev2.ike deleted exchange-timeout | #334 spent 2.41 milliseconds in total | [RE]START processing: state #334 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-82" #334: deleting state (STATE_PARENT_I1) aged 48.988s and NOT sending notification | parent state #334: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #334 "road-eastnet-nonat-82" #334: deleting IKE SA for connection 'road-eastnet-nonat-82' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-82' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-82 | State DB: deleting IKEv2 state #334 in PARENT_I1 | parent state #334: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #334 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c28d50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c28d10 | in statetime_stop() and could not find #334 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c275b0 | handling event EVENT_SA_EXPIRE for parent state #293 | start processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #293 | un-established partial CHILD SA timeout (SA expired) | pstats #293 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #293 ikev2.ike deleted exchange-timeout | #293 spent 1.98 milliseconds in total | [RE]START processing: state #293 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-41" #293: deleting state (STATE_PARENT_I1) aged 51.994s and NOT sending notification | parent state #293: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #293 "road-eastnet-nonat-41" #293: deleting IKE SA for connection 'road-eastnet-nonat-41' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-41' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-41 | State DB: deleting IKEv2 state #293 in PARENT_I1 | parent state #293: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #293 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c275f0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c275b0 | in statetime_stop() and could not find #293 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46afd050 | handling event EVENT_SA_EXPIRE for parent state #307 | start processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #307 | un-established partial CHILD SA timeout (SA expired) | pstats #307 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #307 ikev2.ike deleted exchange-timeout | #307 spent 1.86 milliseconds in total | [RE]START processing: state #307 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-55" #307: deleting state (STATE_PARENT_I1) aged 50.882s and NOT sending notification | parent state #307: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #307 "road-eastnet-nonat-55" #307: deleting IKE SA for connection 'road-eastnet-nonat-55' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-55' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-55 | State DB: deleting IKEv2 state #307 in PARENT_I1 | parent state #307: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #307 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46ba6750 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46afd050 | in statetime_stop() and could not find #307 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c25e50 | handling event EVENT_SA_EXPIRE for parent state #355 | start processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #355 | un-established partial CHILD SA timeout (SA expired) | pstats #355 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #355 ikev2.ike deleted exchange-timeout | #355 spent 2.96 milliseconds in total | [RE]START processing: state #355 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-103" #355: deleting state (STATE_PARENT_I1) aged 47.270s and NOT sending notification | parent state #355: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #355 "road-eastnet-nonat-103" #355: deleting IKE SA for connection 'road-eastnet-nonat-103' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-103' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-103 | State DB: deleting IKEv2 state #355 in PARENT_I1 | parent state #355: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #355 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c25e90 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c25e50 | in statetime_stop() and could not find #355 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c246f0 | handling event EVENT_SA_EXPIRE for parent state #349 | start processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #349 | un-established partial CHILD SA timeout (SA expired) | pstats #349 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #349 ikev2.ike deleted exchange-timeout | #349 spent 2.93 milliseconds in total | [RE]START processing: state #349 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-97" #349: deleting state (STATE_PARENT_I1) aged 47.759s and NOT sending notification | parent state #349: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #349 "road-eastnet-nonat-97" #349: deleting IKE SA for connection 'road-eastnet-nonat-97' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-97' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-97 | State DB: deleting IKEv2 state #349 in PARENT_I1 | parent state #349: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #349 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c24730 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c246f0 | in statetime_stop() and could not find #349 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a672d0 | handling event EVENT_SA_EXPIRE for parent state #392 | start processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #392 | un-established partial CHILD SA timeout (SA expired) | pstats #392 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #392 ikev2.ike deleted exchange-timeout | #392 spent 2.61 milliseconds in total | [RE]START processing: state #392 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-140" #392: deleting state (STATE_PARENT_I1) aged 44.654s and NOT sending notification | parent state #392: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #392 "road-eastnet-nonat-140" #392: deleting IKE SA for connection 'road-eastnet-nonat-140' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-140' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-140 | State DB: deleting IKEv2 state #392 in PARENT_I1 | parent state #392: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #392 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46a30d30 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a672d0 | in statetime_stop() and could not find #392 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2cbd0 | handling event EVENT_SA_EXPIRE for parent state #301 | start processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #301 | un-established partial CHILD SA timeout (SA expired) | pstats #301 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #301 ikev2.ike deleted exchange-timeout | #301 spent 1.94 milliseconds in total | [RE]START processing: state #301 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-49" #301: deleting state (STATE_PARENT_I1) aged 51.409s and NOT sending notification | parent state #301: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #301 "road-eastnet-nonat-49" #301: deleting IKE SA for connection 'road-eastnet-nonat-49' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-49' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-49 | State DB: deleting IKEv2 state #301 in PARENT_I1 | parent state #301: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #301 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46aae240 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a2cbd0 | in statetime_stop() and could not find #301 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab6500 | handling event EVENT_SA_EXPIRE for parent state #358 | start processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #358 | un-established partial CHILD SA timeout (SA expired) | pstats #358 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #358 ikev2.ike deleted exchange-timeout | #358 spent 1.88 milliseconds in total | [RE]START processing: state #358 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-106" #358: deleting state (STATE_PARENT_I1) aged 47.024s and NOT sending notification | parent state #358: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #358 "road-eastnet-nonat-106" #358: deleting IKE SA for connection 'road-eastnet-nonat-106' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-106' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-106 | State DB: deleting IKEv2 state #358 in PARENT_I1 | parent state #358: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #358 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b230c0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46ab6500 | in statetime_stop() and could not find #358 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b03d10 | handling event EVENT_SA_EXPIRE for parent state #269 | start processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #269 | un-established partial CHILD SA timeout (SA expired) | pstats #269 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #269 ikev2.ike deleted exchange-timeout | #269 spent 2.26 milliseconds in total | [RE]START processing: state #269 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-17" #269: deleting state (STATE_PARENT_I1) aged 53.952s and NOT sending notification | parent state #269: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #269 "road-eastnet-nonat-17" #269: deleting IKE SA for connection 'road-eastnet-nonat-17' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-17' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-17 | State DB: deleting IKEv2 state #269 in PARENT_I1 | parent state #269: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #269 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46ba5050 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b03d10 | in statetime_stop() and could not find #269 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c22f90 | handling event EVENT_SA_EXPIRE for parent state #424 | start processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #424 | un-established partial CHILD SA timeout (SA expired) | pstats #424 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #424 ikev2.ike deleted exchange-timeout | #424 spent 3.99 milliseconds in total | [RE]START processing: state #424 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-172" #424: deleting state (STATE_PARENT_I1) aged 42.519s and NOT sending notification | parent state #424: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #424 "road-eastnet-nonat-172" #424: deleting IKE SA for connection 'road-eastnet-nonat-172' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-172' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-172 | State DB: deleting IKEv2 state #424 in PARENT_I1 | parent state #424: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #424 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c22fd0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c22f90 | in statetime_stop() and could not find #424 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c21830 | handling event EVENT_SA_EXPIRE for parent state #376 | start processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #376 | un-established partial CHILD SA timeout (SA expired) | pstats #376 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #376 ikev2.ike deleted exchange-timeout | #376 spent 2.53 milliseconds in total | [RE]START processing: state #376 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-124" #376: deleting state (STATE_PARENT_I1) aged 45.790s and NOT sending notification | parent state #376: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #376 "road-eastnet-nonat-124" #376: deleting IKE SA for connection 'road-eastnet-nonat-124' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-124' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-124 | State DB: deleting IKEv2 state #376 in PARENT_I1 | parent state #376: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #376 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c21870 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c21830 | in statetime_stop() and could not find #376 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b01190 | handling event EVENT_SA_EXPIRE for parent state #365 | start processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #365 | un-established partial CHILD SA timeout (SA expired) | pstats #365 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #365 ikev2.ike deleted exchange-timeout | #365 spent 2.12 milliseconds in total | [RE]START processing: state #365 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-113" #365: deleting state (STATE_PARENT_I1) aged 46.486s and NOT sending notification | parent state #365: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #365 "road-eastnet-nonat-113" #365: deleting IKE SA for connection 'road-eastnet-nonat-113' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-113' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-113 | State DB: deleting IKEv2 state #365 in PARENT_I1 | parent state #365: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #365 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46ba3950 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b01190 | in statetime_stop() and could not find #365 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c200d0 | handling event EVENT_SA_EXPIRE for parent state #404 | start processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #404 | un-established partial CHILD SA timeout (SA expired) | pstats #404 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #404 ikev2.ike deleted exchange-timeout | #404 spent 2.66 milliseconds in total | [RE]START processing: state #404 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-152" #404: deleting state (STATE_PARENT_I1) aged 43.834s and NOT sending notification | parent state #404: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #404 "road-eastnet-nonat-152" #404: deleting IKE SA for connection 'road-eastnet-nonat-152' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-152' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-152 | State DB: deleting IKEv2 state #404 in PARENT_I1 | parent state #404: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #404 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c20110 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c200d0 | in statetime_stop() and could not find #404 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c1e970 | handling event EVENT_SA_EXPIRE for parent state #388 | start processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #388 | un-established partial CHILD SA timeout (SA expired) | pstats #388 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #388 ikev2.ike deleted exchange-timeout | #388 spent 2.72 milliseconds in total | [RE]START processing: state #388 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-136" #388: deleting state (STATE_PARENT_I1) aged 44.927s and NOT sending notification | parent state #388: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #388 "road-eastnet-nonat-136" #388: deleting IKE SA for connection 'road-eastnet-nonat-136' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-136' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-136 | State DB: deleting IKEv2 state #388 in PARENT_I1 | parent state #388: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #388 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c1e9b0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c1e970 | in statetime_stop() and could not find #388 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b09380 | handling event EVENT_SA_EXPIRE for parent state #290 | start processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #290 | un-established partial CHILD SA timeout (SA expired) | pstats #290 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #290 ikev2.ike deleted exchange-timeout | #290 spent 2.2 milliseconds in total | [RE]START processing: state #290 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-38" #290: deleting state (STATE_PARENT_I1) aged 52.230s and NOT sending notification | parent state #290: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #290 "road-eastnet-nonat-38" #290: deleting IKE SA for connection 'road-eastnet-nonat-38' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-38' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-38 | State DB: deleting IKEv2 state #290 in PARENT_I1 | parent state #290: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #290 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b21b00 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b09380 | in statetime_stop() and could not find #290 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #505 | start processing: state #505 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 505 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #505 | **emit ISAKMP Message: | initiator cookie: | d5 d2 7d 3c 00 e8 ff 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-252 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f5 f3 9e b0 6a 35 4f e1 47 8d 4d 6e 1c 28 4b 2e | ikev2 g^x f7 69 42 28 c7 ef 26 c5 4e 61 c9 92 6c ab 1f 19 | ikev2 g^x f8 92 ce 52 74 4a c5 9f 21 f2 3d 66 b1 02 14 a1 | ikev2 g^x 73 db a1 79 9a e8 39 8a fc 66 2f 00 d5 5a 95 c5 | ikev2 g^x 48 d0 9c 15 fa 0b 1b 42 28 43 67 d3 6e 5e 6f ff | ikev2 g^x c0 b1 6b 27 e0 5d 48 d0 0b 8b bd 52 32 59 4d 42 | ikev2 g^x 3a 7f 12 ad f8 1d 5e cc 39 0c 00 27 ca 10 80 cd | ikev2 g^x 3d 82 51 e1 b2 98 44 61 6d 8a 0e 01 ae d2 a9 b5 | ikev2 g^x 0d a4 1c d6 bb b1 86 67 99 76 77 1d 81 1f e6 0f | ikev2 g^x 87 d6 0e ab 3d 4e 72 d6 1c d8 a8 ba 8b 0d fa b6 | ikev2 g^x 14 aa 5d 05 4f 2b 84 93 9b 6c 60 e2 1b f1 93 07 | ikev2 g^x 29 7a b4 93 fc 89 c0 b0 9e 68 f0 55 5e 91 56 16 | ikev2 g^x 01 5f 10 18 5b bb 2d 47 4a 35 38 2c ad 2e ab d2 | ikev2 g^x 6a b8 26 26 f5 88 20 85 f3 dc ec bd 9d 77 db 98 | ikev2 g^x b1 c5 2e 88 5d 5c 8b a9 e1 00 27 3a d2 4c bd 1c | ikev2 g^x db 98 5a 24 32 a9 2f e9 b8 59 be e8 b6 07 01 6e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce cb e3 59 11 f9 d9 ec ee ad 77 08 0b 98 a8 ef 2e | IKEv2 nonce 9a e0 e5 f5 be 06 9f 6c 9d 77 41 dd ce d1 2a 4c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d5 d2 7d 3c 00 e8 ff 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 fc | natd_hash: port= 01 f4 | natd_hash: hash= 2d ed ee bd 79 c9 6a 8d de 75 89 30 73 98 a0 83 | natd_hash: hash= 98 d8 fd 9d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2d ed ee bd 79 c9 6a 8d de 75 89 30 73 98 a0 83 | Notify data 98 d8 fd 9d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d5 d2 7d 3c 00 e8 ff 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 80 0c 7e 23 1f 19 e5 09 f9 e2 d7 e7 d4 e4 7c f1 | natd_hash: hash= e8 ce ce 76 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 80 0c 7e 23 1f 19 e5 09 f9 e2 d7 e7 d4 e4 7c f1 | Notify data e8 ce ce 76 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #505 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #505 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #505 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #505: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #505 to 4294967295 after switching state | Message ID: IKE #505 skipping update_recv as MD is fake | Message ID: sent #505 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-252" #505: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.252:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #505) | d5 d2 7d 3c 00 e8 ff 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 f3 9e b0 6a 35 4f e1 47 8d 4d 6e 1c 28 4b 2e | f7 69 42 28 c7 ef 26 c5 4e 61 c9 92 6c ab 1f 19 | f8 92 ce 52 74 4a c5 9f 21 f2 3d 66 b1 02 14 a1 | 73 db a1 79 9a e8 39 8a fc 66 2f 00 d5 5a 95 c5 | 48 d0 9c 15 fa 0b 1b 42 28 43 67 d3 6e 5e 6f ff | c0 b1 6b 27 e0 5d 48 d0 0b 8b bd 52 32 59 4d 42 | 3a 7f 12 ad f8 1d 5e cc 39 0c 00 27 ca 10 80 cd | 3d 82 51 e1 b2 98 44 61 6d 8a 0e 01 ae d2 a9 b5 | 0d a4 1c d6 bb b1 86 67 99 76 77 1d 81 1f e6 0f | 87 d6 0e ab 3d 4e 72 d6 1c d8 a8 ba 8b 0d fa b6 | 14 aa 5d 05 4f 2b 84 93 9b 6c 60 e2 1b f1 93 07 | 29 7a b4 93 fc 89 c0 b0 9e 68 f0 55 5e 91 56 16 | 01 5f 10 18 5b bb 2d 47 4a 35 38 2c ad 2e ab d2 | 6a b8 26 26 f5 88 20 85 f3 dc ec bd 9d 77 db 98 | b1 c5 2e 88 5d 5c 8b a9 e1 00 27 3a d2 4c bd 1c | db 98 5a 24 32 a9 2f e9 b8 59 be e8 b6 07 01 6e | 29 00 00 24 cb e3 59 11 f9 d9 ec ee ad 77 08 0b | 98 a8 ef 2e 9a e0 e5 f5 be 06 9f 6c 9d 77 41 dd | ce d1 2a 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d ed ee bd 79 c9 6a 8d de 75 89 30 | 73 98 a0 83 98 d8 fd 9d 00 00 00 1c 00 00 40 05 | 80 0c 7e 23 1f 19 e5 09 f9 e2 d7 e7 d4 e4 7c f1 | e8 ce ce 76 | state #505 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb384038240 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46af8e80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b16d90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #505 | libevent_malloc: new ptr-libevent@0x7fb368035930 size 128 | #505 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.207892 | resume sending helper answer for #505 suppresed complete_v2_state_transition() and stole MD | #505 spent 0.289 milliseconds in resume sending helper answer | stop processing: state #505 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c02a950 | processing resume sending helper answer for #521 | start processing: state #521 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 521 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #521 | **emit ISAKMP Message: | initiator cookie: | e0 39 ae 6e 8d 33 46 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-27 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7f 3f e2 39 d0 87 6e c4 87 ac 4b 7f e8 23 48 99 | ikev2 g^x 92 9e 37 b3 ec 85 70 ac 3f 02 9e 68 20 31 71 0c | ikev2 g^x 97 15 91 c1 a0 ab 9e 8d 27 01 76 49 b6 29 fb 50 | ikev2 g^x 00 fc 65 98 a7 fe a1 a4 36 b9 c4 7c 54 f4 02 af | ikev2 g^x 60 2f d1 df 33 d0 64 d4 55 6b 05 3e b6 be ce 9f | ikev2 g^x 7b 70 7e 57 f4 bd aa cb 97 13 66 4c 9b c5 ee ff | ikev2 g^x 30 5a af e3 f5 d2 79 8f d0 02 64 c0 f6 31 9a 04 | ikev2 g^x 75 4d ca 99 cf 35 0b 0b 63 86 ed 2d 81 69 83 0d | ikev2 g^x 51 34 70 ee ac 2d 1e 34 e9 70 85 c2 2f a2 8f 70 | ikev2 g^x 6f 0d 80 be fa b6 92 2c 33 7f 13 ce 7a 72 1b 7a | ikev2 g^x 2a d2 4a 74 e9 27 c0 27 62 da 50 70 c6 2c 9d f6 | ikev2 g^x 5b a1 c7 10 be 54 64 5f e3 1f 76 be a3 86 5c 67 | ikev2 g^x 3f 34 60 37 96 c6 3f ac 97 7d a3 18 8c c7 ef 72 | ikev2 g^x 1d d2 f4 90 6a 6c 56 d8 e8 0f 74 17 ab b5 fe 66 | ikev2 g^x c6 f5 7b ef 12 de 81 09 98 fb 45 7d d7 c5 4b d6 | ikev2 g^x e3 d8 90 e0 92 65 36 18 47 32 4b 60 90 49 45 9b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 31 24 b3 bc ed 01 bb 4f 4e 94 0b a9 a1 7c 54 38 | IKEv2 nonce d8 7d f8 73 0e b6 38 5d 48 35 f4 71 f1 a3 75 39 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e0 39 ae 6e 8d 33 46 84 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1b | natd_hash: port= 01 f4 | natd_hash: hash= 7c 55 c6 d8 c0 e4 0d bf da ae 94 5b 53 f7 7b d9 | natd_hash: hash= db 38 1b b7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7c 55 c6 d8 c0 e4 0d bf da ae 94 5b 53 f7 7b d9 | Notify data db 38 1b b7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e0 39 ae 6e 8d 33 46 84 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 3e db 6e c8 27 ac a4 d1 7f ba 2d 10 fa 4a 46 d7 | natd_hash: hash= 5d f3 f0 38 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3e db 6e c8 27 ac a4 d1 7f ba 2d 10 fa 4a 46 d7 | Notify data 5d f3 f0 38 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #521 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #521 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #521 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #521: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #521 to 4294967295 after switching state | Message ID: IKE #521 skipping update_recv as MD is fake | Message ID: sent #521 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-27" #521: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.27:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #521) | e0 39 ae 6e 8d 33 46 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 3f e2 39 d0 87 6e c4 87 ac 4b 7f e8 23 48 99 | 92 9e 37 b3 ec 85 70 ac 3f 02 9e 68 20 31 71 0c | 97 15 91 c1 a0 ab 9e 8d 27 01 76 49 b6 29 fb 50 | 00 fc 65 98 a7 fe a1 a4 36 b9 c4 7c 54 f4 02 af | 60 2f d1 df 33 d0 64 d4 55 6b 05 3e b6 be ce 9f | 7b 70 7e 57 f4 bd aa cb 97 13 66 4c 9b c5 ee ff | 30 5a af e3 f5 d2 79 8f d0 02 64 c0 f6 31 9a 04 | 75 4d ca 99 cf 35 0b 0b 63 86 ed 2d 81 69 83 0d | 51 34 70 ee ac 2d 1e 34 e9 70 85 c2 2f a2 8f 70 | 6f 0d 80 be fa b6 92 2c 33 7f 13 ce 7a 72 1b 7a | 2a d2 4a 74 e9 27 c0 27 62 da 50 70 c6 2c 9d f6 | 5b a1 c7 10 be 54 64 5f e3 1f 76 be a3 86 5c 67 | 3f 34 60 37 96 c6 3f ac 97 7d a3 18 8c c7 ef 72 | 1d d2 f4 90 6a 6c 56 d8 e8 0f 74 17 ab b5 fe 66 | c6 f5 7b ef 12 de 81 09 98 fb 45 7d d7 c5 4b d6 | e3 d8 90 e0 92 65 36 18 47 32 4b 60 90 49 45 9b | 29 00 00 24 31 24 b3 bc ed 01 bb 4f 4e 94 0b a9 | a1 7c 54 38 d8 7d f8 73 0e b6 38 5d 48 35 f4 71 | f1 a3 75 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7c 55 c6 d8 c0 e4 0d bf da ae 94 5b | 53 f7 7b d9 db 38 1b b7 00 00 00 1c 00 00 40 05 | 3e db 6e c8 27 ac a4 d1 7f ba 2d 10 fa 4a 46 d7 | 5d f3 f0 38 | state #521 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c00d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c009690 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #521 | libevent_malloc: new ptr-libevent@0x7fb37c02a950 size 128 | #521 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.208229 | resume sending helper answer for #521 suppresed complete_v2_state_transition() and stole MD | #521 spent 0.313 milliseconds in resume sending helper answer | stop processing: state #521 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38804efb0 | timer_event_cb: processing event@0x557d46c1d210 | handling event EVENT_SA_EXPIRE for parent state #436 | start processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #436 | un-established partial CHILD SA timeout (SA expired) | pstats #436 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #436 ikev2.ike deleted exchange-timeout | #436 spent 2.84 milliseconds in total | [RE]START processing: state #436 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-184" #436: deleting state (STATE_PARENT_I1) aged 41.621s and NOT sending notification | parent state #436: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #436 "road-eastnet-nonat-184" #436: deleting IKE SA for connection 'road-eastnet-nonat-184' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-184' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-184 | State DB: deleting IKEv2 state #436 in PARENT_I1 | parent state #436: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #436 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c1d250 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c1d210 | in statetime_stop() and could not find #436 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46afba90 | handling event EVENT_SA_EXPIRE for parent state #254 | start processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #254 | un-established partial CHILD SA timeout (SA expired) | pstats #254 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #254 ikev2.ike deleted exchange-timeout | #254 spent 3.47 milliseconds in total | [RE]START processing: state #254 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-2" #254: deleting state (STATE_PARENT_I1) aged 55.673s and NOT sending notification | parent state #254: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #254 "road-eastnet-nonat-2" #254: deleting IKE SA for connection 'road-eastnet-nonat-2' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-2' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-2 | State DB: deleting IKEv2 state #254 in PARENT_I1 | parent state #254: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #254 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46ba2250 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46afba90 | in statetime_stop() and could not find #254 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | processing resume sending helper answer for #506 | start processing: state #506 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 506 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #506 | **emit ISAKMP Message: | initiator cookie: | 30 9a 49 1f a8 dd 2c 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-1 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 36 2a bc 79 dc b5 44 58 cf f7 90 44 40 11 2e 15 | ikev2 g^x 03 b5 fb 40 91 db b0 e9 cc 93 76 20 f8 11 9e 6d | ikev2 g^x 39 73 1f 61 bc bc 4e ee c9 bc 18 3d 60 7b af 0b | ikev2 g^x 75 cb a0 d6 4f 63 ef 20 98 68 71 d2 13 f7 66 7d | ikev2 g^x d4 5b 49 b9 ac 8b df e8 41 30 6e ff 20 54 14 93 | ikev2 g^x 38 ab ab 4c af e9 0c 3b ab 5e dc 5e ab 90 4b 56 | ikev2 g^x 53 3a 8a b7 18 5b 14 39 76 27 9c 20 d5 a4 eb 39 | ikev2 g^x 1a 6c 7f f0 56 06 81 af ac 7c 4a cd fd 91 a4 9c | ikev2 g^x b0 f5 14 1c 9c 19 b9 58 23 51 01 f1 e5 aa 33 2e | ikev2 g^x 85 93 d7 f3 05 7b 07 5d 5b 1e 49 80 23 cb 1b 4b | ikev2 g^x 93 19 de 20 5b c0 bb 25 ff 6a 7c bd fa 9e d4 b6 | ikev2 g^x 65 89 68 9f 60 cb 4e fc c1 67 16 12 7c fd 7e e9 | ikev2 g^x 66 f2 cd 59 d3 75 d7 f2 51 17 02 7b 63 bd 34 45 | ikev2 g^x 2a 05 0d 75 f1 dd 12 28 48 00 8c f9 1a ee 51 55 | ikev2 g^x 7e 88 c6 eb 9c 50 71 90 5e 37 9e fa ae f7 d3 be | ikev2 g^x 4f ee 4f 56 47 93 59 ae 9d 25 55 9b 6e 17 7d 42 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d6 8b 6d 98 8d 34 54 93 4f 23 9a c7 c6 01 a2 cc | IKEv2 nonce 60 f1 90 b6 c5 32 43 97 ec 6a b8 44 57 ec f9 2c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 30 9a 49 1f a8 dd 2c 6f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 01 | natd_hash: port= 01 f4 | natd_hash: hash= db 76 28 30 1c 61 02 15 0f 11 fb 7e be 62 eb 4a | natd_hash: hash= 99 5c 3d 3b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data db 76 28 30 1c 61 02 15 0f 11 fb 7e be 62 eb 4a | Notify data 99 5c 3d 3b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 30 9a 49 1f a8 dd 2c 6f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7f 22 3b d3 4d cf 74 f6 af fd 39 61 cb 11 ae 8f | natd_hash: hash= 0d e3 22 f7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7f 22 3b d3 4d cf 74 f6 af fd 39 61 cb 11 ae 8f | Notify data 0d e3 22 f7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #506 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #506 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #506 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #506: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #506 to 4294967295 after switching state | Message ID: IKE #506 skipping update_recv as MD is fake | Message ID: sent #506 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-1" #506: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.1:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #506) | 30 9a 49 1f a8 dd 2c 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 2a bc 79 dc b5 44 58 cf f7 90 44 40 11 2e 15 | 03 b5 fb 40 91 db b0 e9 cc 93 76 20 f8 11 9e 6d | 39 73 1f 61 bc bc 4e ee c9 bc 18 3d 60 7b af 0b | 75 cb a0 d6 4f 63 ef 20 98 68 71 d2 13 f7 66 7d | d4 5b 49 b9 ac 8b df e8 41 30 6e ff 20 54 14 93 | 38 ab ab 4c af e9 0c 3b ab 5e dc 5e ab 90 4b 56 | 53 3a 8a b7 18 5b 14 39 76 27 9c 20 d5 a4 eb 39 | 1a 6c 7f f0 56 06 81 af ac 7c 4a cd fd 91 a4 9c | b0 f5 14 1c 9c 19 b9 58 23 51 01 f1 e5 aa 33 2e | 85 93 d7 f3 05 7b 07 5d 5b 1e 49 80 23 cb 1b 4b | 93 19 de 20 5b c0 bb 25 ff 6a 7c bd fa 9e d4 b6 | 65 89 68 9f 60 cb 4e fc c1 67 16 12 7c fd 7e e9 | 66 f2 cd 59 d3 75 d7 f2 51 17 02 7b 63 bd 34 45 | 2a 05 0d 75 f1 dd 12 28 48 00 8c f9 1a ee 51 55 | 7e 88 c6 eb 9c 50 71 90 5e 37 9e fa ae f7 d3 be | 4f ee 4f 56 47 93 59 ae 9d 25 55 9b 6e 17 7d 42 | 29 00 00 24 d6 8b 6d 98 8d 34 54 93 4f 23 9a c7 | c6 01 a2 cc 60 f1 90 b6 c5 32 43 97 ec 6a b8 44 | 57 ec f9 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 76 28 30 1c 61 02 15 0f 11 fb 7e | be 62 eb 4a 99 5c 3d 3b 00 00 00 1c 00 00 40 05 | 7f 22 3b d3 4d cf 74 f6 af fd 39 61 cb 11 ae 8f | 0d e3 22 f7 | state #506 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3580180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a46950 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3880319a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #506 | libevent_malloc: new ptr-libevent@0x7fb38804efb0 size 128 | #506 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.208628 | resume sending helper answer for #506 suppresed complete_v2_state_transition() and stole MD | #506 spent 0.283 milliseconds in resume sending helper answer | stop processing: state #506 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37004a770 | timer_event_cb: processing event@0x557d46c1bab0 | handling event EVENT_SA_EXPIRE for parent state #399 | start processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #399 | un-established partial CHILD SA timeout (SA expired) | pstats #399 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #399 ikev2.ike deleted exchange-timeout | #399 spent 2.08 milliseconds in total | [RE]START processing: state #399 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-147" #399: deleting state (STATE_PARENT_I1) aged 44.165s and NOT sending notification | parent state #399: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #399 "road-eastnet-nonat-147" #399: deleting IKE SA for connection 'road-eastnet-nonat-147' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-147' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-147 | State DB: deleting IKEv2 state #399 in PARENT_I1 | parent state #399: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #399 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c1baf0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c1bab0 | in statetime_stop() and could not find #399 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c1a350 | handling event EVENT_SA_EXPIRE for parent state #432 | start processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #432 | un-established partial CHILD SA timeout (SA expired) | pstats #432 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #432 ikev2.ike deleted exchange-timeout | #432 spent 2.29 milliseconds in total | [RE]START processing: state #432 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-180" #432: deleting state (STATE_PARENT_I1) aged 41.891s and NOT sending notification | parent state #432: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #432 "road-eastnet-nonat-180" #432: deleting IKE SA for connection 'road-eastnet-nonat-180' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-180' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-180 | State DB: deleting IKEv2 state #432 in PARENT_I1 | parent state #432: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #432 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c1a390 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c1a350 | in statetime_stop() and could not find #432 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a855c0 | handling event EVENT_SA_EXPIRE for parent state #330 | start processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #330 | un-established partial CHILD SA timeout (SA expired) | pstats #330 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #330 ikev2.ike deleted exchange-timeout | #330 spent 1.91 milliseconds in total | [RE]START processing: state #330 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-78" #330: deleting state (STATE_PARENT_I1) aged 49.250s and NOT sending notification | parent state #330: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #330 "road-eastnet-nonat-78" #330: deleting IKE SA for connection 'road-eastnet-nonat-78' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-78' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-78 | State DB: deleting IKEv2 state #330 in PARENT_I1 | parent state #330: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #330 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46aa8b40 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a855c0 | in statetime_stop() and could not find #330 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a8ee00 | handling event EVENT_SA_EXPIRE for parent state #263 | start processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #263 | un-established partial CHILD SA timeout (SA expired) | pstats #263 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #263 ikev2.ike deleted exchange-timeout | #263 spent 2.24 milliseconds in total | [RE]START processing: state #263 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-11" #263: deleting state (STATE_PARENT_I1) aged 54.646s and NOT sending notification | parent state #263: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #263 "road-eastnet-nonat-11" #263: deleting IKE SA for connection 'road-eastnet-nonat-11' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-11' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-11 | State DB: deleting IKEv2 state #263 in PARENT_I1 | parent state #263: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #263 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b20540 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a8ee00 | in statetime_stop() and could not find #263 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46afa4d0 | handling event EVENT_SA_EXPIRE for parent state #308 | start processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #308 | un-established partial CHILD SA timeout (SA expired) | pstats #308 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #308 ikev2.ike deleted exchange-timeout | #308 spent 2.43 milliseconds in total | [RE]START processing: state #308 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-56" #308: deleting state (STATE_PARENT_I1) aged 50.794s and NOT sending notification | parent state #308: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #308 "road-eastnet-nonat-56" #308: deleting IKE SA for connection 'road-eastnet-nonat-56' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-56' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-56 | State DB: deleting IKEv2 state #308 in PARENT_I1 | parent state #308: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #308 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46ba0b50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46afa4d0 | in statetime_stop() and could not find #308 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c18bf0 | handling event EVENT_SA_EXPIRE for parent state #362 | start processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #362 | un-established partial CHILD SA timeout (SA expired) | pstats #362 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #362 ikev2.ike deleted exchange-timeout | #362 spent 2.44 milliseconds in total | [RE]START processing: state #362 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-110" #362: deleting state (STATE_PARENT_I1) aged 46.689s and NOT sending notification | parent state #362: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #362 "road-eastnet-nonat-110" #362: deleting IKE SA for connection 'road-eastnet-nonat-110' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-110' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-110 | State DB: deleting IKEv2 state #362 in PARENT_I1 | parent state #362: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #362 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c18c30 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c18bf0 | in statetime_stop() and could not find #362 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c17490 | handling event EVENT_SA_EXPIRE for parent state #418 | start processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #418 | un-established partial CHILD SA timeout (SA expired) | pstats #418 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #418 ikev2.ike deleted exchange-timeout | #418 spent 2.3 milliseconds in total | [RE]START processing: state #418 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-166" #418: deleting state (STATE_PARENT_I1) aged 42.937s and NOT sending notification | parent state #418: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #418 "road-eastnet-nonat-166" #418: deleting IKE SA for connection 'road-eastnet-nonat-166' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-166' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-166 | State DB: deleting IKEv2 state #418 in PARENT_I1 | parent state #418: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #418 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c174d0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c17490 | in statetime_stop() and could not find #418 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46af4dd0 | handling event EVENT_SA_EXPIRE for parent state #360 | start processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #360 | un-established partial CHILD SA timeout (SA expired) | pstats #360 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #360 ikev2.ike deleted exchange-timeout | #360 spent 1.96 milliseconds in total | [RE]START processing: state #360 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-108" #360: deleting state (STATE_PARENT_I1) aged 46.863s and NOT sending notification | parent state #360: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #360 "road-eastnet-nonat-108" #360: deleting IKE SA for connection 'road-eastnet-nonat-108' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-108' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-108 | State DB: deleting IKEv2 state #360 in PARENT_I1 | parent state #360: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #360 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b9f450 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46af4dd0 | in statetime_stop() and could not find #360 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c15d30 | handling event EVENT_SA_EXPIRE for parent state #393 | start processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #393 | un-established partial CHILD SA timeout (SA expired) | pstats #393 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #393 ikev2.ike deleted exchange-timeout | #393 spent 2.41 milliseconds in total | [RE]START processing: state #393 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-141" #393: deleting state (STATE_PARENT_I1) aged 44.593s and NOT sending notification | parent state #393: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #393 "road-eastnet-nonat-141" #393: deleting IKE SA for connection 'road-eastnet-nonat-141' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-141' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-141 | State DB: deleting IKEv2 state #393 in PARENT_I1 | parent state #393: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #393 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c15d70 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c15d30 | in statetime_stop() and could not find #393 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c145d0 | handling event EVENT_SA_EXPIRE for parent state #387 | start processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #387 | un-established partial CHILD SA timeout (SA expired) | pstats #387 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #387 ikev2.ike deleted exchange-timeout | #387 spent 2.06 milliseconds in total | [RE]START processing: state #387 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-135" #387: deleting state (STATE_PARENT_I1) aged 44.994s and NOT sending notification | parent state #387: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #387 "road-eastnet-nonat-135" #387: deleting IKE SA for connection 'road-eastnet-nonat-135' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-135' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-135 | State DB: deleting IKEv2 state #387 in PARENT_I1 | parent state #387: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #387 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c14610 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c145d0 | in statetime_stop() and could not find #387 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7fec0 | handling event EVENT_SA_EXPIRE for parent state #255 | start processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #255 | un-established partial CHILD SA timeout (SA expired) | pstats #255 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #255 ikev2.ike deleted exchange-timeout | #255 spent 1.97 milliseconds in total | [RE]START processing: state #255 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-3" #255: deleting state (STATE_PARENT_I1) aged 55.525s and NOT sending notification | parent state #255: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #255 "road-eastnet-nonat-3" #255: deleting IKE SA for connection 'road-eastnet-nonat-3' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-3' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-3 | State DB: deleting IKEv2 state #255 in PARENT_I1 | parent state #255: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #255 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b1ef80 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a7fec0 | in statetime_stop() and could not find #255 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aee110 | handling event EVENT_SA_EXPIRE for parent state #258 | start processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #258 | un-established partial CHILD SA timeout (SA expired) | pstats #258 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #258 ikev2.ike deleted exchange-timeout | #258 spent 2.28 milliseconds in total | [RE]START processing: state #258 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-6" #258: deleting state (STATE_PARENT_I1) aged 55.183s and NOT sending notification | parent state #258: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #258 "road-eastnet-nonat-6" #258: deleting IKE SA for connection 'road-eastnet-nonat-6' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-6' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-6 | State DB: deleting IKEv2 state #258 in PARENT_I1 | parent state #258: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #258 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b9dd50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46aee110 | in statetime_stop() and could not find #258 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c12e70 | handling event EVENT_SA_EXPIRE for parent state #375 | start processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #375 | un-established partial CHILD SA timeout (SA expired) | pstats #375 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #375 ikev2.ike deleted exchange-timeout | #375 spent 2.57 milliseconds in total | [RE]START processing: state #375 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-123" #375: deleting state (STATE_PARENT_I1) aged 45.857s and NOT sending notification | parent state #375: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #375 "road-eastnet-nonat-123" #375: deleting IKE SA for connection 'road-eastnet-nonat-123' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-123' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-123 | State DB: deleting IKEv2 state #375 in PARENT_I1 | parent state #375: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #375 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c12eb0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c12e70 | in statetime_stop() and could not find #375 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c11710 | handling event EVENT_SA_EXPIRE for parent state #336 | start processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #336 | un-established partial CHILD SA timeout (SA expired) | pstats #336 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #336 ikev2.ike deleted exchange-timeout | #336 spent 2.17 milliseconds in total | [RE]START processing: state #336 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-84" #336: deleting state (STATE_PARENT_I1) aged 48.875s and NOT sending notification | parent state #336: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #336 "road-eastnet-nonat-84" #336: deleting IKE SA for connection 'road-eastnet-nonat-84' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-84' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-84 | State DB: deleting IKEv2 state #336 in PARENT_I1 | parent state #336: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #336 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c11750 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c11710 | in statetime_stop() and could not find #336 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ae7450 | handling event EVENT_SA_EXPIRE for parent state #379 | start processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #379 | un-established partial CHILD SA timeout (SA expired) | pstats #379 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #379 ikev2.ike deleted exchange-timeout | #379 spent 3.67 milliseconds in total | [RE]START processing: state #379 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-127" #379: deleting state (STATE_PARENT_I1) aged 45.554s and NOT sending notification | parent state #379: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #379 "road-eastnet-nonat-127" #379: deleting IKE SA for connection 'road-eastnet-nonat-127' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-127' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-127 | State DB: deleting IKEv2 state #379 in PARENT_I1 | parent state #379: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #379 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b9c650 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46ae7450 | in statetime_stop() and could not find #379 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c0ffb0 | handling event EVENT_SA_EXPIRE for parent state #368 | start processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #368 | un-established partial CHILD SA timeout (SA expired) | pstats #368 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #368 ikev2.ike deleted exchange-timeout | #368 spent 1.87 milliseconds in total | [RE]START processing: state #368 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-116" #368: deleting state (STATE_PARENT_I1) aged 46.295s and NOT sending notification | parent state #368: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #368 "road-eastnet-nonat-116" #368: deleting IKE SA for connection 'road-eastnet-nonat-116' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-116' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-116 | State DB: deleting IKEv2 state #368 in PARENT_I1 | parent state #368: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #368 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c0fff0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c0ffb0 | in statetime_stop() and could not find #368 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c0e850 | handling event EVENT_SA_EXPIRE for parent state #406 | start processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #406 | un-established partial CHILD SA timeout (SA expired) | pstats #406 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #406 ikev2.ike deleted exchange-timeout | #406 spent 2.24 milliseconds in total | [RE]START processing: state #406 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-154" #406: deleting state (STATE_PARENT_I1) aged 43.706s and NOT sending notification | parent state #406: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #406 "road-eastnet-nonat-154" #406: deleting IKE SA for connection 'road-eastnet-nonat-154' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-154' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-154 | State DB: deleting IKEv2 state #406 in PARENT_I1 | parent state #406: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #406 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c0e890 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c0e850 | in statetime_stop() and could not find #406 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a90440 | handling event EVENT_SA_EXPIRE for parent state #354 | start processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #354 | un-established partial CHILD SA timeout (SA expired) | pstats #354 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #354 ikev2.ike deleted exchange-timeout | #354 spent 2.56 milliseconds in total | [RE]START processing: state #354 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-102" #354: deleting state (STATE_PARENT_I1) aged 47.348s and NOT sending notification | parent state #354: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #354 "road-eastnet-nonat-102" #354: deleting IKE SA for connection 'road-eastnet-nonat-102' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-102' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-102 | State DB: deleting IKEv2 state #354 in PARENT_I1 | parent state #354: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #354 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46906b80 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a90440 | in statetime_stop() and could not find #354 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a69e50 | handling event EVENT_SA_EXPIRE for parent state #340 | start processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #340 | un-established partial CHILD SA timeout (SA expired) | pstats #340 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #340 ikev2.ike deleted exchange-timeout | #340 spent 2.87 milliseconds in total | [RE]START processing: state #340 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-88" #340: deleting state (STATE_PARENT_I1) aged 48.617s and NOT sending notification | parent state #340: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #340 "road-eastnet-nonat-88" #340: deleting IKE SA for connection 'road-eastnet-nonat-88' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-88' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-88 | State DB: deleting IKEv2 state #340 in PARENT_I1 | parent state #340: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #340 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d469d92d0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a69e50 | in statetime_stop() and could not find #340 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a9b1c0 | handling event EVENT_SA_EXPIRE for parent state #279 | start processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #279 | un-established partial CHILD SA timeout (SA expired) | pstats #279 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #279 ikev2.ike deleted exchange-timeout | #279 spent 2.27 milliseconds in total | [RE]START processing: state #279 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-27" #279: deleting state (STATE_PARENT_I1) aged 53.029s and NOT sending notification | parent state #279: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #279 "road-eastnet-nonat-27" #279: deleting IKE SA for connection 'road-eastnet-nonat-27' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-27' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-27 | State DB: deleting IKEv2 state #279 in PARENT_I1 | parent state #279: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #279 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46a65d10 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a9b1c0 | in statetime_stop() and could not find #279 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ac5400 | handling event EVENT_SA_EXPIRE for parent state #276 | start processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #276 | un-established partial CHILD SA timeout (SA expired) | pstats #276 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #276 ikev2.ike deleted exchange-timeout | #276 spent 2.68 milliseconds in total | [RE]START processing: state #276 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-24" #276: deleting state (STATE_PARENT_I1) aged 53.270s and NOT sending notification | parent state #276: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #276 "road-eastnet-nonat-24" #276: deleting IKE SA for connection 'road-eastnet-nonat-24' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-24' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-24 | State DB: deleting IKEv2 state #276 in PARENT_I1 | parent state #276: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #276 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b1d9c0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46ac5400 | in statetime_stop() and could not find #276 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ae3310 | handling event EVENT_SA_EXPIRE for parent state #373 | start processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #373 | un-established partial CHILD SA timeout (SA expired) | pstats #373 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #373 ikev2.ike deleted exchange-timeout | #373 spent 2.4 milliseconds in total | [RE]START processing: state #373 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-121" #373: deleting state (STATE_PARENT_I1) aged 45.975s and NOT sending notification | parent state #373: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #373 "road-eastnet-nonat-121" #373: deleting IKE SA for connection 'road-eastnet-nonat-121' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-121' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-121 | State DB: deleting IKEv2 state #373 in PARENT_I1 | parent state #373: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #373 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b9af50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46ae3310 | in statetime_stop() and could not find #373 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c0d0f0 | handling event EVENT_SA_EXPIRE for parent state #410 | start processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #410 | un-established partial CHILD SA timeout (SA expired) | pstats #410 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #410 ikev2.ike deleted exchange-timeout | #410 spent 2.19 milliseconds in total | [RE]START processing: state #410 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-158" #410: deleting state (STATE_PARENT_I1) aged 43.463s and NOT sending notification | parent state #410: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #410 "road-eastnet-nonat-158" #410: deleting IKE SA for connection 'road-eastnet-nonat-158' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-158' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-158 | State DB: deleting IKEv2 state #410 in PARENT_I1 | parent state #410: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #410 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c0d130 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c0d0f0 | in statetime_stop() and could not find #410 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c0b990 | handling event EVENT_SA_EXPIRE for parent state #400 | start processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #400 | un-established partial CHILD SA timeout (SA expired) | pstats #400 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #400 ikev2.ike deleted exchange-timeout | #400 spent 2.7 milliseconds in total | [RE]START processing: state #400 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-148" #400: deleting state (STATE_PARENT_I1) aged 44.104s and NOT sending notification | parent state #400: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #400 "road-eastnet-nonat-148" #400: deleting IKE SA for connection 'road-eastnet-nonat-148' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-148' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-148 | State DB: deleting IKEv2 state #400 in PARENT_I1 | parent state #400: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #400 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c0b9d0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c0b990 | in statetime_stop() and could not find #400 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ae1d50 | handling event EVENT_SA_EXPIRE for parent state #367 | start processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #367 | un-established partial CHILD SA timeout (SA expired) | pstats #367 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #367 ikev2.ike deleted exchange-timeout | #367 spent 1.94 milliseconds in total | [RE]START processing: state #367 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-115" #367: deleting state (STATE_PARENT_I1) aged 46.366s and NOT sending notification | parent state #367: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #367 "road-eastnet-nonat-115" #367: deleting IKE SA for connection 'road-eastnet-nonat-115' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-115' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-115 | State DB: deleting IKEv2 state #367 in PARENT_I1 | parent state #367: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #367 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b99850 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46ae1d50 | in statetime_stop() and could not find #367 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c0a230 | handling event EVENT_SA_EXPIRE for parent state #414 | start processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #414 | un-established partial CHILD SA timeout (SA expired) | pstats #414 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #414 ikev2.ike deleted exchange-timeout | #414 spent 2.47 milliseconds in total | [RE]START processing: state #414 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-162" #414: deleting state (STATE_PARENT_I1) aged 43.193s and NOT sending notification | parent state #414: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #414 "road-eastnet-nonat-162" #414: deleting IKE SA for connection 'road-eastnet-nonat-162' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-162' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-162 | State DB: deleting IKEv2 state #414 in PARENT_I1 | parent state #414: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #414 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c0a270 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c0a230 | in statetime_stop() and could not find #414 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c08ad0 | handling event EVENT_SA_EXPIRE for parent state #370 | start processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #370 | un-established partial CHILD SA timeout (SA expired) | pstats #370 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #370 ikev2.ike deleted exchange-timeout | #370 spent 2.41 milliseconds in total | [RE]START processing: state #370 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-118" #370: deleting state (STATE_PARENT_I1) aged 46.177s and NOT sending notification | parent state #370: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #370 "road-eastnet-nonat-118" #370: deleting IKE SA for connection 'road-eastnet-nonat-118' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-118' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-118 | State DB: deleting IKEv2 state #370 in PARENT_I1 | parent state #370: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #370 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c08b10 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c08ad0 | in statetime_stop() and could not find #370 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b12bc0 | handling event EVENT_SA_EXPIRE for parent state #378 | start processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #378 | un-established partial CHILD SA timeout (SA expired) | pstats #378 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #378 ikev2.ike deleted exchange-timeout | #378 spent 1.98 milliseconds in total | [RE]START processing: state #378 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-126" #378: deleting state (STATE_PARENT_I1) aged 45.650s and NOT sending notification | parent state #378: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #378 "road-eastnet-nonat-126" #378: deleting IKE SA for connection 'road-eastnet-nonat-126' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-126' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-126 | State DB: deleting IKEv2 state #378 in PARENT_I1 | parent state #378: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #378 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b1ae40 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b12bc0 | in statetime_stop() and could not find #378 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46addc10 | handling event EVENT_SA_EXPIRE for parent state #381 | start processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #381 | un-established partial CHILD SA timeout (SA expired) | pstats #381 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #381 ikev2.ike deleted exchange-timeout | #381 spent 2.52 milliseconds in total | [RE]START processing: state #381 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-129" #381: deleting state (STATE_PARENT_I1) aged 45.380s and NOT sending notification | parent state #381: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #381 "road-eastnet-nonat-129" #381: deleting IKE SA for connection 'road-eastnet-nonat-129' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-129' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-129 | State DB: deleting IKEv2 state #381 in PARENT_I1 | parent state #381: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #381 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b98150 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46addc10 | in statetime_stop() and could not find #381 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c07370 | handling event EVENT_SA_EXPIRE for parent state #444 | start processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #444 | un-established partial CHILD SA timeout (SA expired) | pstats #444 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #444 ikev2.ike deleted exchange-timeout | #444 spent 2.39 milliseconds in total | [RE]START processing: state #444 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-192" #444: deleting state (STATE_PARENT_I1) aged 40.904s and NOT sending notification | parent state #444: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #444 "road-eastnet-nonat-192" #444: deleting IKE SA for connection 'road-eastnet-nonat-192' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-192' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-192 | State DB: deleting IKEv2 state #444 in PARENT_I1 | parent state #444: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #444 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c073b0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c07370 | in statetime_stop() and could not find #444 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c05c10 | handling event EVENT_SA_EXPIRE for parent state #430 | start processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #430 | un-established partial CHILD SA timeout (SA expired) | pstats #430 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #430 ikev2.ike deleted exchange-timeout | #430 spent 2.69 milliseconds in total | [RE]START processing: state #430 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-178" #430: deleting state (STATE_PARENT_I1) aged 42.057s and NOT sending notification | parent state #430: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #430 "road-eastnet-nonat-178" #430: deleting IKE SA for connection 'road-eastnet-nonat-178' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-178' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-178 | State DB: deleting IKEv2 state #430 in PARENT_I1 | parent state #430: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #430 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c05c50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c05c10 | in statetime_stop() and could not find #430 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aae2d0 | handling event EVENT_SA_EXPIRE for parent state #395 | start processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #395 | un-established partial CHILD SA timeout (SA expired) | pstats #395 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #395 ikev2.ike deleted exchange-timeout | #395 spent 2.12 milliseconds in total | [RE]START processing: state #395 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-143" #395: deleting state (STATE_PARENT_I1) aged 44.455s and NOT sending notification | parent state #395: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #395 "road-eastnet-nonat-143" #395: deleting IKE SA for connection 'road-eastnet-nonat-143' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-143' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-143 | State DB: deleting IKEv2 state #395 in PARENT_I1 | parent state #395: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #395 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b96a50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46aae2d0 | in statetime_stop() and could not find #395 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c044b0 | handling event EVENT_SA_EXPIRE for parent state #364 | start processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #364 | un-established partial CHILD SA timeout (SA expired) | pstats #364 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #364 ikev2.ike deleted exchange-timeout | #364 spent 1.99 milliseconds in total | [RE]START processing: state #364 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-112" #364: deleting state (STATE_PARENT_I1) aged 46.559s and NOT sending notification | parent state #364: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #364 "road-eastnet-nonat-112" #364: deleting IKE SA for connection 'road-eastnet-nonat-112' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-112' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-112 | State DB: deleting IKEv2 state #364 in PARENT_I1 | parent state #364: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #364 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c044f0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c044b0 | in statetime_stop() and could not find #364 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c02d50 | handling event EVENT_SA_EXPIRE for parent state #310 | start processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #310 | un-established partial CHILD SA timeout (SA expired) | pstats #310 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #310 ikev2.ike deleted exchange-timeout | #310 spent 1.95 milliseconds in total | [RE]START processing: state #310 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-58" #310: deleting state (STATE_PARENT_I1) aged 50.612s and NOT sending notification | parent state #310: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #310 "road-eastnet-nonat-58" #310: deleting IKE SA for connection 'road-eastnet-nonat-58' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-58' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-58 | State DB: deleting IKEv2 state #310 in PARENT_I1 | parent state #310: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #310 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c02d90 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c02d50 | in statetime_stop() and could not find #310 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a94540 | handling event EVENT_SA_EXPIRE for parent state #384 | start processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #384 | un-established partial CHILD SA timeout (SA expired) | pstats #384 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #384 ikev2.ike deleted exchange-timeout | #384 spent 1.82 milliseconds in total | [RE]START processing: state #384 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-132" #384: deleting state (STATE_PARENT_I1) aged 45.177s and NOT sending notification | parent state #384: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #384 "road-eastnet-nonat-132" #384: deleting IKE SA for connection 'road-eastnet-nonat-132' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-132' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-132 | State DB: deleting IKEv2 state #384 in PARENT_I1 | parent state #384: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #384 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46a7ecc0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a94540 | in statetime_stop() and could not find #384 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a68890 | handling event EVENT_SA_EXPIRE for parent state #266 | start processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #266 | un-established partial CHILD SA timeout (SA expired) | pstats #266 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #266 ikev2.ike deleted exchange-timeout | #266 spent 2.2 milliseconds in total | [RE]START processing: state #266 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-14" #266: deleting state (STATE_PARENT_I1) aged 54.344s and NOT sending notification | parent state #266: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #266 "road-eastnet-nonat-14" #266: deleting IKE SA for connection 'road-eastnet-nonat-14' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-14' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-14 | State DB: deleting IKEv2 state #266 in PARENT_I1 | parent state #266: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #266 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b182c0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a68890 | in statetime_stop() and could not find #266 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aa8bd0 | handling event EVENT_SA_EXPIRE for parent state #267 | start processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #267 | un-established partial CHILD SA timeout (SA expired) | pstats #267 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #267 ikev2.ike deleted exchange-timeout | #267 spent 2.06 milliseconds in total | [RE]START processing: state #267 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-15" #267: deleting state (STATE_PARENT_I1) aged 54.251s and NOT sending notification | parent state #267: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #267 "road-eastnet-nonat-15" #267: deleting IKE SA for connection 'road-eastnet-nonat-15' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-15' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-15 | State DB: deleting IKEv2 state #267 in PARENT_I1 | parent state #267: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #267 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b95350 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46aa8bd0 | in statetime_stop() and could not find #267 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c015f0 | handling event EVENT_SA_EXPIRE for parent state #397 | start processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #397 | un-established partial CHILD SA timeout (SA expired) | pstats #397 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #397 ikev2.ike deleted exchange-timeout | #397 spent 2.85 milliseconds in total | [RE]START processing: state #397 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-145" #397: deleting state (STATE_PARENT_I1) aged 44.295s and NOT sending notification | parent state #397: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #397 "road-eastnet-nonat-145" #397: deleting IKE SA for connection 'road-eastnet-nonat-145' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-145' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-145 | State DB: deleting IKEv2 state #397 in PARENT_I1 | parent state #397: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #397 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c01630 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c015f0 | in statetime_stop() and could not find #397 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46bffe90 | handling event EVENT_SA_EXPIRE for parent state #372 | start processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #372 | un-established partial CHILD SA timeout (SA expired) | pstats #372 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #372 ikev2.ike deleted exchange-timeout | #372 spent 2.63 milliseconds in total | [RE]START processing: state #372 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-120" #372: deleting state (STATE_PARENT_I1) aged 46.049s and NOT sending notification | parent state #372: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #372 "road-eastnet-nonat-120" #372: deleting IKE SA for connection 'road-eastnet-nonat-120' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-120' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-120 | State DB: deleting IKEv2 state #372 in PARENT_I1 | parent state #372: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #372 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bffed0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46bffe90 | in statetime_stop() and could not find #372 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a65da0 | handling event EVENT_SA_EXPIRE for parent state #352 | start processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #352 | un-established partial CHILD SA timeout (SA expired) | pstats #352 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #352 ikev2.ike deleted exchange-timeout | #352 spent 2.33 milliseconds in total | [RE]START processing: state #352 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-100" #352: deleting state (STATE_PARENT_I1) aged 47.498s and NOT sending notification | parent state #352: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #352 "road-eastnet-nonat-100" #352: deleting IKE SA for connection 'road-eastnet-nonat-100' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-100' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-100 | State DB: deleting IKEv2 state #352 in PARENT_I1 | parent state #352: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #352 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b93c50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a65da0 | in statetime_stop() and could not find #352 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46bfe730 | handling event EVENT_SA_EXPIRE for parent state #403 | start processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #403 | un-established partial CHILD SA timeout (SA expired) | pstats #403 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #403 ikev2.ike deleted exchange-timeout | #403 spent 2.08 milliseconds in total | [RE]START processing: state #403 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-151" #403: deleting state (STATE_PARENT_I1) aged 43.907s and NOT sending notification | parent state #403: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #403 "road-eastnet-nonat-151" #403: deleting IKE SA for connection 'road-eastnet-nonat-151' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-151' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-151 | State DB: deleting IKEv2 state #403 in PARENT_I1 | parent state #403: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #403 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bfe770 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46bfe730 | in statetime_stop() and could not find #403 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46bfcfd0 | handling event EVENT_SA_EXPIRE for parent state #456 | start processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #456 | un-established partial CHILD SA timeout (SA expired) | pstats #456 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #456 ikev2.ike deleted exchange-timeout | #456 spent 2.5 milliseconds in total | [RE]START processing: state #456 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-204" #456: deleting state (STATE_PARENT_I1) aged 39.831s and NOT sending notification | parent state #456: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #456 "road-eastnet-nonat-204" #456: deleting IKE SA for connection 'road-eastnet-nonat-204' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-204' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-204 | State DB: deleting IKEv2 state #456 in PARENT_I1 | parent state #456: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #456 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bfd010 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46bfcfd0 | in statetime_stop() and could not find #456 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b026c0 | handling event EVENT_SA_EXPIRE for parent state #302 | start processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #302 | un-established partial CHILD SA timeout (SA expired) | pstats #302 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #302 ikev2.ike deleted exchange-timeout | #302 spent 2.37 milliseconds in total | [RE]START processing: state #302 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-50" #302: deleting state (STATE_PARENT_I1) aged 51.346s and NOT sending notification | parent state #302: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #302 "road-eastnet-nonat-50" #302: deleting IKE SA for connection 'road-eastnet-nonat-50' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-50' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-50 | State DB: deleting IKEv2 state #302 in PARENT_I1 | parent state #302: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #302 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b16d00 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b026c0 | in statetime_stop() and could not find #302 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469ec960 | handling event EVENT_SA_EXPIRE for parent state #314 | start processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #314 | un-established partial CHILD SA timeout (SA expired) | pstats #314 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #314 ikev2.ike deleted exchange-timeout | #314 spent 1.95 milliseconds in total | [RE]START processing: state #314 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-62" #314: deleting state (STATE_PARENT_I1) aged 50.359s and NOT sending notification | parent state #314: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #314 "road-eastnet-nonat-62" #314: deleting IKE SA for connection 'road-eastnet-nonat-62' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-62' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-62 | State DB: deleting IKEv2 state #314 in PARENT_I1 | parent state #314: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #314 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b92550 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d469ec960 | in statetime_stop() and could not find #314 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46bfb870 | handling event EVENT_SA_EXPIRE for parent state #427 | start processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #427 | un-established partial CHILD SA timeout (SA expired) | pstats #427 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #427 ikev2.ike deleted exchange-timeout | #427 spent 2.01 milliseconds in total | [RE]START processing: state #427 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-175" #427: deleting state (STATE_PARENT_I1) aged 42.310s and NOT sending notification | parent state #427: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #427 "road-eastnet-nonat-175" #427: deleting IKE SA for connection 'road-eastnet-nonat-175' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-175' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-175 | State DB: deleting IKEv2 state #427 in PARENT_I1 | parent state #427: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #427 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bfb8b0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46bfb870 | in statetime_stop() and could not find #427 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46bfa110 | handling event EVENT_SA_EXPIRE for parent state #458 | start processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #458 | un-established partial CHILD SA timeout (SA expired) | pstats #458 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #458 ikev2.ike deleted exchange-timeout | #458 spent 1.86 milliseconds in total | [RE]START processing: state #458 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-206" #458: deleting state (STATE_PARENT_I1) aged 39.553s and NOT sending notification | parent state #458: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #458 "road-eastnet-nonat-206" #458: deleting IKE SA for connection 'road-eastnet-nonat-206' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-206' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-206 | State DB: deleting IKEv2 state #458 in PARENT_I1 | parent state #458: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #458 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bfa150 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46bfa110 | in statetime_stop() and could not find #458 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a03d30 | handling event EVENT_SA_EXPIRE for parent state #371 | start processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #371 | un-established partial CHILD SA timeout (SA expired) | pstats #371 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #371 ikev2.ike deleted exchange-timeout | #371 spent 2.44 milliseconds in total | [RE]START processing: state #371 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-119" #371: deleting state (STATE_PARENT_I1) aged 46.118s and NOT sending notification | parent state #371: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #371 "road-eastnet-nonat-119" #371: deleting IKE SA for connection 'road-eastnet-nonat-119' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-119' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-119 | State DB: deleting IKEv2 state #371 in PARENT_I1 | parent state #371: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #371 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b90e50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a03d30 | in statetime_stop() and could not find #371 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46bf89b0 | handling event EVENT_SA_EXPIRE for parent state #433 | start processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #433 | un-established partial CHILD SA timeout (SA expired) | pstats #433 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #433 ikev2.ike deleted exchange-timeout | #433 spent 2.47 milliseconds in total | [RE]START processing: state #433 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-181" #433: deleting state (STATE_PARENT_I1) aged 41.822s and NOT sending notification | parent state #433: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #433 "road-eastnet-nonat-181" #433: deleting IKE SA for connection 'road-eastnet-nonat-181' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-181' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-181 | State DB: deleting IKEv2 state #433 in PARENT_I1 | parent state #433: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #433 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bf89f0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46bf89b0 | in statetime_stop() and could not find #433 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46bf7250 | handling event EVENT_SA_EXPIRE for parent state #411 | start processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #411 | un-established partial CHILD SA timeout (SA expired) | pstats #411 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #411 ikev2.ike deleted exchange-timeout | #411 spent 2.07 milliseconds in total | [RE]START processing: state #411 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-159" #411: deleting state (STATE_PARENT_I1) aged 43.390s and NOT sending notification | parent state #411: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #411 "road-eastnet-nonat-159" #411: deleting IKE SA for connection 'road-eastnet-nonat-159' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-159' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-159 | State DB: deleting IKEv2 state #411 in PARENT_I1 | parent state #411: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #411 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bf7290 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46bf7250 | in statetime_stop() and could not find #411 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a1af10 | handling event EVENT_SA_EXPIRE for parent state #297 | start processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #297 | un-established partial CHILD SA timeout (SA expired) | pstats #297 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #297 ikev2.ike deleted exchange-timeout | #297 spent 2.5 milliseconds in total | [RE]START processing: state #297 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-45" #297: deleting state (STATE_PARENT_I1) aged 51.702s and NOT sending notification | parent state #297: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #297 "road-eastnet-nonat-45" #297: deleting IKE SA for connection 'road-eastnet-nonat-45' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-45' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-45 | State DB: deleting IKEv2 state #297 in PARENT_I1 | parent state #297: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #297 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46acab40 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a1af10 | in statetime_stop() and could not find #297 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7ced0 | handling event EVENT_SA_EXPIRE for parent state #320 | start processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #320 | un-established partial CHILD SA timeout (SA expired) | pstats #320 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #320 ikev2.ike deleted exchange-timeout | #320 spent 2.51 milliseconds in total | [RE]START processing: state #320 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-68" #320: deleting state (STATE_PARENT_I1) aged 49.947s and NOT sending notification | parent state #320: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #320 "road-eastnet-nonat-68" #320: deleting IKE SA for connection 'road-eastnet-nonat-68' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-68' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-68 | State DB: deleting IKEv2 state #320 in PARENT_I1 | parent state #320: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #320 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46afe5c0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a7ced0 | in statetime_stop() and could not find #320 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ac1340 | handling event EVENT_SA_EXPIRE for parent state #402 | start processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #402 | un-established partial CHILD SA timeout (SA expired) | pstats #402 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #402 ikev2.ike deleted exchange-timeout | #402 spent 2.51 milliseconds in total | [RE]START processing: state #402 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-150" #402: deleting state (STATE_PARENT_I1) aged 43.974s and NOT sending notification | parent state #402: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #402 "road-eastnet-nonat-150" #402: deleting IKE SA for connection 'road-eastnet-nonat-150' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-150' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-150 | State DB: deleting IKEv2 state #402 in PARENT_I1 | parent state #402: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #402 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b15740 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46ac1340 | in statetime_stop() and could not find #402 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a18370 | handling event EVENT_SA_EXPIRE for parent state #335 | start processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #335 | un-established partial CHILD SA timeout (SA expired) | pstats #335 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #335 ikev2.ike deleted exchange-timeout | #335 spent 2.39 milliseconds in total | [RE]START processing: state #335 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-83" #335: deleting state (STATE_PARENT_I1) aged 48.939s and NOT sending notification | parent state #335: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #335 "road-eastnet-nonat-83" #335: deleting IKE SA for connection 'road-eastnet-nonat-83' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-83' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-83 | State DB: deleting IKEv2 state #335 in PARENT_I1 | parent state #335: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #335 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b8f750 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a18370 | in statetime_stop() and could not find #335 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46bf5af0 | handling event EVENT_SA_EXPIRE for parent state #415 | start processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #415 | un-established partial CHILD SA timeout (SA expired) | pstats #415 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #415 ikev2.ike deleted exchange-timeout | #415 spent 2.2 milliseconds in total | [RE]START processing: state #415 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-163" #415: deleting state (STATE_PARENT_I1) aged 43.127s and NOT sending notification | parent state #415: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #415 "road-eastnet-nonat-163" #415: deleting IKE SA for connection 'road-eastnet-nonat-163' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-163' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-163 | State DB: deleting IKEv2 state #415 in PARENT_I1 | parent state #415: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #415 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bf5b30 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46bf5af0 | in statetime_stop() and could not find #415 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46bf4390 | handling event EVENT_SA_EXPIRE for parent state #338 | start processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #338 | un-established partial CHILD SA timeout (SA expired) | pstats #338 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #338 ikev2.ike deleted exchange-timeout | #338 spent 2.15 milliseconds in total | [RE]START processing: state #338 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-86" #338: deleting state (STATE_PARENT_I1) aged 48.749s and NOT sending notification | parent state #338: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #338 "road-eastnet-nonat-86" #338: deleting IKE SA for connection 'road-eastnet-nonat-86' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-86' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-86 | State DB: deleting IKEv2 state #338 in PARENT_I1 | parent state #338: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #338 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bf43d0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46bf4390 | in statetime_stop() and could not find #338 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469fd070 | handling event EVENT_SA_EXPIRE for parent state #265 | start processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #265 | un-established partial CHILD SA timeout (SA expired) | pstats #265 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #265 ikev2.ike deleted exchange-timeout | #265 spent 1.82 milliseconds in total | [RE]START processing: state #265 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-13" #265: deleting state (STATE_PARENT_I1) aged 54.430s and NOT sending notification | parent state #265: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #265 "road-eastnet-nonat-13" #265: deleting IKE SA for connection 'road-eastnet-nonat-13' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-13' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-13 | State DB: deleting IKEv2 state #265 in PARENT_I1 | parent state #265: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #265 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b8e050 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d469fd070 | in statetime_stop() and could not find #265 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46bf2c30 | handling event EVENT_SA_EXPIRE for parent state #423 | start processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #423 | un-established partial CHILD SA timeout (SA expired) | pstats #423 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #423 ikev2.ike deleted exchange-timeout | #423 spent 2.85 milliseconds in total | [RE]START processing: state #423 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-171" #423: deleting state (STATE_PARENT_I1) aged 42.591s and NOT sending notification | parent state #423: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #423 "road-eastnet-nonat-171" #423: deleting IKE SA for connection 'road-eastnet-nonat-171' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-171' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-171 | State DB: deleting IKEv2 state #423 in PARENT_I1 | parent state #423: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #423 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bf2c70 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46bf2c30 | in statetime_stop() and could not find #423 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46bf14d0 | handling event EVENT_SA_EXPIRE for parent state #487 | start processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #487 | un-established partial CHILD SA timeout (SA expired) | pstats #487 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #487 ikev2.ike deleted exchange-timeout | #487 spent 2.11 milliseconds in total | [RE]START processing: state #487 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-235" #487: deleting state (STATE_PARENT_I1) aged 36.310s and NOT sending notification | parent state #487: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #487 "road-eastnet-nonat-235" #487: deleting IKE SA for connection 'road-eastnet-nonat-235' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-235' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-235 | State DB: deleting IKEv2 state #487 in PARENT_I1 | parent state #487: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #487 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bf1510 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46bf14d0 | in statetime_stop() and could not find #487 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aecac0 | handling event EVENT_SA_EXPIRE for parent state #374 | start processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #374 | un-established partial CHILD SA timeout (SA expired) | pstats #374 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #374 ikev2.ike deleted exchange-timeout | #374 spent 2.18 milliseconds in total | [RE]START processing: state #374 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-122" #374: deleting state (STATE_PARENT_I1) aged 45.922s and NOT sending notification | parent state #374: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #374 "road-eastnet-nonat-122" #374: deleting IKE SA for connection 'road-eastnet-nonat-122' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-122' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-122 | State DB: deleting IKEv2 state #374 in PARENT_I1 | parent state #374: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #374 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b14180 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46aecac0 | in statetime_stop() and could not find #374 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469f7760 | handling event EVENT_SA_EXPIRE for parent state #298 | start processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #298 | un-established partial CHILD SA timeout (SA expired) | pstats #298 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #298 ikev2.ike deleted exchange-timeout | #298 spent 1.91 milliseconds in total | [RE]START processing: state #298 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-46" #298: deleting state (STATE_PARENT_I1) aged 51.615s and NOT sending notification | parent state #298: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #298 "road-eastnet-nonat-46" #298: deleting IKE SA for connection 'road-eastnet-nonat-46' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-46' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-46 | State DB: deleting IKEv2 state #298 in PARENT_I1 | parent state #298: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #298 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b8c950 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d469f7760 | in statetime_stop() and could not find #298 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46befd70 | handling event EVENT_SA_EXPIRE for parent state #452 | start processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #452 | un-established partial CHILD SA timeout (SA expired) | pstats #452 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #452 ikev2.ike deleted exchange-timeout | #452 spent 2.03 milliseconds in total | [RE]START processing: state #452 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-200" #452: deleting state (STATE_PARENT_I1) aged 40.170s and NOT sending notification | parent state #452: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #452 "road-eastnet-nonat-200" #452: deleting IKE SA for connection 'road-eastnet-nonat-200' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-200' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-200 | State DB: deleting IKEv2 state #452 in PARENT_I1 | parent state #452: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #452 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46befdb0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46befd70 | in statetime_stop() and could not find #452 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46bee610 | handling event EVENT_SA_EXPIRE for parent state #466 | start processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #466 | un-established partial CHILD SA timeout (SA expired) | pstats #466 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #466 ikev2.ike deleted exchange-timeout | #466 spent 2.3 milliseconds in total | [RE]START processing: state #466 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-214" #466: deleting state (STATE_PARENT_I1) aged 38.733s and NOT sending notification | parent state #466: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #466 "road-eastnet-nonat-214" #466: deleting IKE SA for connection 'road-eastnet-nonat-214' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-214' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-214 | State DB: deleting IKEv2 state #466 in PARENT_I1 | parent state #466: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #466 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bee650 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46bee610 | in statetime_stop() and could not find #466 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469f8d60 | handling event EVENT_SA_EXPIRE for parent state #348 | start processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #348 | un-established partial CHILD SA timeout (SA expired) | pstats #348 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #348 ikev2.ike deleted exchange-timeout | #348 spent 1.91 milliseconds in total | [RE]START processing: state #348 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-96" #348: deleting state (STATE_PARENT_I1) aged 47.867s and NOT sending notification | parent state #348: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #348 "road-eastnet-nonat-96" #348: deleting IKE SA for connection 'road-eastnet-nonat-96' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-96' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-96 | State DB: deleting IKEv2 state #348 in PARENT_I1 | parent state #348: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #348 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b8b250 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d469f8d60 | in statetime_stop() and could not find #348 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46beceb0 | handling event EVENT_SA_EXPIRE for parent state #470 | start processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #470 | un-established partial CHILD SA timeout (SA expired) | pstats #470 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #470 ikev2.ike deleted exchange-timeout | #470 spent 2.28 milliseconds in total | [RE]START processing: state #470 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-218" #470: deleting state (STATE_PARENT_I1) aged 38.282s and NOT sending notification | parent state #470: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #470 "road-eastnet-nonat-218" #470: deleting IKE SA for connection 'road-eastnet-nonat-218' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-218' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-218 | State DB: deleting IKEv2 state #470 in PARENT_I1 | parent state #470: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #470 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46becef0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46beceb0 | in statetime_stop() and could not find #470 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46beb750 | handling event EVENT_SA_EXPIRE for parent state #389 | start processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #389 | un-established partial CHILD SA timeout (SA expired) | pstats #389 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #389 ikev2.ike deleted exchange-timeout | #389 spent 2.08 milliseconds in total | [RE]START processing: state #389 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-137" #389: deleting state (STATE_PARENT_I1) aged 44.861s and NOT sending notification | parent state #389: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #389 "road-eastnet-nonat-137" #389: deleting IKE SA for connection 'road-eastnet-nonat-137' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-137' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-137 | State DB: deleting IKEv2 state #389 in PARENT_I1 | parent state #389: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #389 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46beb790 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46beb750 | in statetime_stop() and could not find #389 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a92f80 | handling event EVENT_SA_EXPIRE for parent state #295 | start processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #295 | un-established partial CHILD SA timeout (SA expired) | pstats #295 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #295 ikev2.ike deleted exchange-timeout | #295 spent 2.43 milliseconds in total | [RE]START processing: state #295 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-43" #295: deleting state (STATE_PARENT_I1) aged 51.834s and NOT sending notification | parent state #295: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #295 "road-eastnet-nonat-43" #295: deleting IKE SA for connection 'road-eastnet-nonat-43' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-43' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-43 | State DB: deleting IKEv2 state #295 in PARENT_I1 | parent state #295: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #295 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46afcfc0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a92f80 | in statetime_stop() and could not find #295 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aaa100 | handling event EVENT_SA_EXPIRE for parent state #271 | start processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #271 | un-established partial CHILD SA timeout (SA expired) | pstats #271 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #271 ikev2.ike deleted exchange-timeout | #271 spent 2.63 milliseconds in total | [RE]START processing: state #271 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-19" #271: deleting state (STATE_PARENT_I1) aged 53.755s and NOT sending notification | parent state #271: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #271 "road-eastnet-nonat-19" #271: deleting IKE SA for connection 'road-eastnet-nonat-19' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-19' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-19 | State DB: deleting IKEv2 state #271 in PARENT_I1 | parent state #271: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #271 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b11600 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46aaa100 | in statetime_stop() and could not find #271 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a027b0 | handling event EVENT_SA_EXPIRE for parent state #339 | start processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #339 | un-established partial CHILD SA timeout (SA expired) | pstats #339 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #339 ikev2.ike deleted exchange-timeout | #339 spent 2.49 milliseconds in total | [RE]START processing: state #339 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-87" #339: deleting state (STATE_PARENT_I1) aged 48.688s and NOT sending notification | parent state #339: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #339 "road-eastnet-nonat-87" #339: deleting IKE SA for connection 'road-eastnet-nonat-87' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-87' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-87 | State DB: deleting IKEv2 state #339 in PARENT_I1 | parent state #339: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #339 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b89b50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a027b0 | in statetime_stop() and could not find #339 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469dac90 | handling event EVENT_SA_EXPIRE for parent state #398 | start processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #398 | un-established partial CHILD SA timeout (SA expired) | pstats #398 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #398 ikev2.ike deleted exchange-timeout | #398 spent 2.25 milliseconds in total | [RE]START processing: state #398 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-146" #398: deleting state (STATE_PARENT_I1) aged 44.226s and NOT sending notification | parent state #398: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #398 "road-eastnet-nonat-146" #398: deleting IKE SA for connection 'road-eastnet-nonat-146' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-146' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-146 | State DB: deleting IKEv2 state #398 in PARENT_I1 | parent state #398: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #398 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bea050 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d469dac90 | in statetime_stop() and could not find #398 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a47ed0 | handling event EVENT_SA_EXPIRE for parent state #497 | start processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #497 | un-established partial CHILD SA timeout (SA expired) | pstats #497 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #497 ikev2.ike deleted exchange-timeout | #497 spent 2.22 milliseconds in total | [RE]START processing: state #497 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-245" #497: deleting state (STATE_PARENT_I1) aged 35.110s and NOT sending notification | parent state #497: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #497 "road-eastnet-nonat-245" #497: deleting IKE SA for connection 'road-eastnet-nonat-245' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-245' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-245 | State DB: deleting IKEv2 state #497 in PARENT_I1 | parent state #497: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #497 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46be8950 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a47ed0 | in statetime_stop() and could not find #497 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a272b0 | handling event EVENT_SA_EXPIRE for parent state #286 | start processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #286 | un-established partial CHILD SA timeout (SA expired) | pstats #286 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #286 ikev2.ike deleted exchange-timeout | #286 spent 2.03 milliseconds in total | [RE]START processing: state #286 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-34" #286: deleting state (STATE_PARENT_I1) aged 52.526s and NOT sending notification | parent state #286: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #286 "road-eastnet-nonat-34" #286: deleting IKE SA for connection 'road-eastnet-nonat-34' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-34' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-34 | State DB: deleting IKEv2 state #286 in PARENT_I1 | parent state #286: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #286 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b88450 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a272b0 | in statetime_stop() and could not find #286 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a47e90 | handling event EVENT_SA_EXPIRE for parent state #473 | start processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #473 | un-established partial CHILD SA timeout (SA expired) | pstats #473 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #473 ikev2.ike deleted exchange-timeout | #473 spent 2.28 milliseconds in total | [RE]START processing: state #473 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-221" #473: deleting state (STATE_PARENT_I1) aged 37.964s and NOT sending notification | parent state #473: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #473 "road-eastnet-nonat-221" #473: deleting IKE SA for connection 'road-eastnet-nonat-221' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-221' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-221 | State DB: deleting IKEv2 state #473 in PARENT_I1 | parent state #473: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #473 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46be7250 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a47e90 | in statetime_stop() and could not find #473 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0ea80 | handling event EVENT_SA_EXPIRE for parent state #324 | start processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #324 | un-established partial CHILD SA timeout (SA expired) | pstats #324 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #324 ikev2.ike deleted exchange-timeout | #324 spent 1.97 milliseconds in total | [RE]START processing: state #324 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-72" #324: deleting state (STATE_PARENT_I1) aged 49.701s and NOT sending notification | parent state #324: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #324 "road-eastnet-nonat-72" #324: deleting IKE SA for connection 'road-eastnet-nonat-72' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-72' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-72 | State DB: deleting IKEv2 state #324 in PARENT_I1 | parent state #324: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #324 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46be5b50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b0ea80 | in statetime_stop() and could not find #324 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2f770 | handling event EVENT_SA_EXPIRE for parent state #291 | start processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #291 | un-established partial CHILD SA timeout (SA expired) | pstats #291 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #291 ikev2.ike deleted exchange-timeout | #291 spent 2.82 milliseconds in total | [RE]START processing: state #291 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-39" #291: deleting state (STATE_PARENT_I1) aged 52.160s and NOT sending notification | parent state #291: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #291 "road-eastnet-nonat-39" #291: deleting IKE SA for connection 'road-eastnet-nonat-39' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-39' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-39 | State DB: deleting IKEv2 state #291 in PARENT_I1 | parent state #291: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #291 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b85650 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a2f770 | in statetime_stop() and could not find #291 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469f2060 | handling event EVENT_SA_EXPIRE for parent state #382 | start processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #382 | un-established partial CHILD SA timeout (SA expired) | pstats #382 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #382 ikev2.ike deleted exchange-timeout | #382 spent 2.51 milliseconds in total | [RE]START processing: state #382 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-130" #382: deleting state (STATE_PARENT_I1) aged 45.313s and NOT sending notification | parent state #382: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #382 "road-eastnet-nonat-130" #382: deleting IKE SA for connection 'road-eastnet-nonat-130' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-130' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-130 | State DB: deleting IKEv2 state #382 in PARENT_I1 | parent state #382: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #382 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b86d50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d469f2060 | in statetime_stop() and could not find #382 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aeb520 | handling event EVENT_SA_EXPIRE for parent state #440 | start processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #440 | un-established partial CHILD SA timeout (SA expired) | pstats #440 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #440 ikev2.ike deleted exchange-timeout | #440 spent 2.39 milliseconds in total | [RE]START processing: state #440 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-188" #440: deleting state (STATE_PARENT_I1) aged 41.288s and NOT sending notification | parent state #440: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #440 "road-eastnet-nonat-188" #440: deleting IKE SA for connection 'road-eastnet-nonat-188' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-188' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-188 | State DB: deleting IKEv2 state #440 in PARENT_I1 | parent state #440: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #440 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46be4450 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46aeb520 | in statetime_stop() and could not find #440 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b2d980 | handling event EVENT_SA_EXPIRE for parent state #501 | start processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #501 | un-established partial CHILD SA timeout (SA expired) | pstats #501 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #501 ikev2.ike deleted exchange-timeout | #501 spent 2.36 milliseconds in total | [RE]START processing: state #501 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-249" #501: deleting state (STATE_PARENT_I1) aged 34.645s and NOT sending notification | parent state #501: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #501 "road-eastnet-nonat-249" #501: deleting IKE SA for connection 'road-eastnet-nonat-249' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-249' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-249 | State DB: deleting IKEv2 state #501 in PARENT_I1 | parent state #501: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #501 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c9a570 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b2d980 | in statetime_stop() and could not find #501 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ae4880 | handling event EVENT_SA_EXPIRE for parent state #300 | start processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #300 | un-established partial CHILD SA timeout (SA expired) | pstats #300 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #300 ikev2.ike deleted exchange-timeout | #300 spent 2.29 milliseconds in total | [RE]START processing: state #300 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-48" #300: deleting state (STATE_PARENT_I1) aged 51.469s and NOT sending notification | parent state #300: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #300 "road-eastnet-nonat-48" #300: deleting IKE SA for connection 'road-eastnet-nonat-48' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-48' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-48 | State DB: deleting IKEv2 state #300 in PARENT_I1 | parent state #300: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #300 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46be2d50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46ae4880 | in statetime_stop() and could not find #300 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b2d890 | handling event EVENT_SA_EXPIRE for parent state #489 | start processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #489 | un-established partial CHILD SA timeout (SA expired) | pstats #489 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #489 ikev2.ike deleted exchange-timeout | #489 spent 2.44 milliseconds in total | [RE]START processing: state #489 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-237" #489: deleting state (STATE_PARENT_I1) aged 36.059s and NOT sending notification | parent state #489: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #489 "road-eastnet-nonat-237" #489: deleting IKE SA for connection 'road-eastnet-nonat-237' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-237' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-237 | State DB: deleting IKEv2 state #489 in PARENT_I1 | parent state #489: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #489 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b2d8d0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b2d890 | in statetime_stop() and could not find #489 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b2d7a0 | handling event EVENT_SA_EXPIRE for parent state #502 | start processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #502 | un-established partial CHILD SA timeout (SA expired) | pstats #502 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #502 ikev2.ike deleted exchange-timeout | #502 spent 2.08 milliseconds in total | [RE]START processing: state #502 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-250" #502: deleting state (STATE_PARENT_I1) aged 34.545s and NOT sending notification | parent state #502: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #502 "road-eastnet-nonat-250" #502: deleting IKE SA for connection 'road-eastnet-nonat-250' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-250' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-250 | State DB: deleting IKEv2 state #502 in PARENT_I1 | parent state #502: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #502 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b2d7e0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b2d7a0 | in statetime_stop() and could not find #502 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a89700 | handling event EVENT_SA_EXPIRE for parent state #323 | start processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #323 | un-established partial CHILD SA timeout (SA expired) | pstats #323 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #323 ikev2.ike deleted exchange-timeout | #323 spent 2.15 milliseconds in total | [RE]START processing: state #323 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-71" #323: deleting state (STATE_PARENT_I1) aged 49.768s and NOT sending notification | parent state #323: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #323 "road-eastnet-nonat-71" #323: deleting IKE SA for connection 'road-eastnet-nonat-71' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-71' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-71 | State DB: deleting IKEv2 state #323 in PARENT_I1 | parent state #323: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #323 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46bdff50 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46a89700 | in statetime_stop() and could not find #323 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ae4840 | handling event EVENT_SA_EXPIRE for parent state #419 | start processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #419 | un-established partial CHILD SA timeout (SA expired) | pstats #419 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #419 ikev2.ike deleted exchange-timeout | #419 spent 1.84 milliseconds in total | [RE]START processing: state #419 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-167" #419: deleting state (STATE_PARENT_I1) aged 42.874s and NOT sending notification | parent state #419: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #419 "road-eastnet-nonat-167" #419: deleting IKE SA for connection 'road-eastnet-nonat-167' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-167' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-167 | State DB: deleting IKEv2 state #419 in PARENT_I1 | parent state #419: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #419 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46be1650 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46ae4840 | in statetime_stop() and could not find #419 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b2d6b0 | handling event EVENT_SA_EXPIRE for parent state #491 | start processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #491 | un-established partial CHILD SA timeout (SA expired) | pstats #491 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #491 ikev2.ike deleted exchange-timeout | #491 spent 2.37 milliseconds in total | [RE]START processing: state #491 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-239" #491: deleting state (STATE_PARENT_I1) aged 35.885s and NOT sending notification | parent state #491: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #491 "road-eastnet-nonat-239" #491: deleting IKE SA for connection 'road-eastnet-nonat-239' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-239' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-239 | State DB: deleting IKEv2 state #491 in PARENT_I1 | parent state #491: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #491 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b2d6f0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b2d6b0 | in statetime_stop() and could not find #491 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b2d5c0 | handling event EVENT_SA_EXPIRE for parent state #483 | start processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #483 | un-established partial CHILD SA timeout (SA expired) | pstats #483 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #483 ikev2.ike deleted exchange-timeout | #483 spent 2.16 milliseconds in total | [RE]START processing: state #483 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-231" #483: deleting state (STATE_PARENT_I1) aged 36.828s and NOT sending notification | parent state #483: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #483 "road-eastnet-nonat-231" #483: deleting IKE SA for connection 'road-eastnet-nonat-231' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-231' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-231 | State DB: deleting IKEv2 state #483 in PARENT_I1 | parent state #483: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #483 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b2d600 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b2d5c0 | in statetime_stop() and could not find #483 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46c908b0 | handling event EVENT_SA_EXPIRE for parent state #503 | start processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #503 | un-established partial CHILD SA timeout (SA expired) | pstats #503 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #503 ikev2.ike deleted exchange-timeout | #503 spent 2.04 milliseconds in total | [RE]START processing: state #503 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-251" #503: deleting state (STATE_PARENT_I1) aged 34.435s and NOT sending notification | parent state #503: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #503 "road-eastnet-nonat-251" #503: deleting IKE SA for connection 'road-eastnet-nonat-251' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-251' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-251 | State DB: deleting IKEv2 state #503 in PARENT_I1 | parent state #503: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #503 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46c908f0 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46c908b0 | in statetime_stop() and could not find #503 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b2d4d0 | handling event EVENT_SA_EXPIRE for parent state #496 | start processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | picked newest_isakmp_sa #0 for #496 | un-established partial CHILD SA timeout (SA expired) | pstats #496 ikev2.ike failed exchange-timeout | State DB: IKEv2 state not found (delete_my_family) | pstats #496 ikev2.ike deleted exchange-timeout | #496 spent 2.11 milliseconds in total | [RE]START processing: state #496 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in delete_state() at state.c:879) "road-eastnet-nonat-244" #496: deleting state (STATE_PARENT_I1) aged 35.237s and NOT sending notification | parent state #496: PARENT_I1(half-open IKE SA) => delete | State DB: IKEv2 state not found (flush_incomplete_children) | picked newest_isakmp_sa #0 for #496 "road-eastnet-nonat-244" #496: deleting IKE SA for connection 'road-eastnet-nonat-244' but connection is supposed to remain up; schedule EVENT_REVIVE_CONNS | add revival: connection 'road-eastnet-nonat-244' added to the list and scheduled for 5 seconds | global one-shot timer EVENT_REVIVE_CONNS scheduled in 5 seconds | in connection_discard for connection road-eastnet-nonat-244 | State DB: deleting IKEv2 state #496 in PARENT_I1 | parent state #496: PARENT_I1(half-open IKE SA) => UNDEFINED(ignore) | stop processing: state #496 from 192.1.2.23:500 (in delete_state() at state.c:1143) | libevent_free: release ptr-libevent@0x557d46b2d510 | free_event_entry: release EVENT_SA_EXPIRE-pe@0x557d46b2d4d0 | in statetime_stop() and could not find #496 | processing: STOP state #0 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 a6 50 d0 80 0f 96 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #509 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #509 | rejected packet: | 95 a6 50 d0 80 0f 96 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #509: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0482 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 19 92 95 ca 61 53 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #528 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #528 | rejected packet: | 53 19 92 95 ca 61 53 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #528: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0405 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 b1 a0 1e 00 fa a9 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #522 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #522 | rejected packet: | 10 b1 a0 1e 00 fa a9 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #522: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0366 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 78 05 0d 9b 70 b9 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #507 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #507 | rejected packet: | da 78 05 0d 9b 70 b9 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #507: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0364 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 4a 29 e2 f2 d8 10 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #518 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #518 | rejected packet: | 76 4a 29 e2 f2 d8 10 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #518: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0376 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 7a 17 75 fd ae cb 88 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #514 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #514 | rejected packet: | 06 7a 17 75 fd ae cb 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #514: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0356 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 e5 d4 8b 34 40 4a 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #517 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #517 | rejected packet: | 33 e5 d4 8b 34 40 4a 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #517: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0359 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b0 c4 a7 65 22 ba 71 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #516 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #516 | rejected packet: | b0 c4 a7 65 22 ba 71 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #516: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.037 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 61 5a f6 8c 22 37 26 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #515 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #515 | rejected packet: | 1e 61 5a f6 8c 22 37 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #515: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0359 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd e9 59 71 3e 30 66 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #513 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #513 | rejected packet: | bd e9 59 71 3e 30 66 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #513: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0359 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc 30 61 cf 1c f5 21 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #510 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #510 | rejected packet: | bc 30 61 cf 1c f5 21 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #510: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0369 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 cd fa e1 13 2d 20 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #511 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #511 | rejected packet: | d0 cd fa e1 13 2d 20 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #511: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0358 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad da d3 24 2d 65 26 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #524 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #524 | rejected packet: | ad da d3 24 2d 65 26 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #524: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0359 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 3f 02 d2 13 45 35 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #508 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #508 | rejected packet: | dc 3f 02 d2 13 45 35 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #508: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0367 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 d2 7d 3c 00 e8 ff 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #505 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #505 | rejected packet: | d5 d2 7d 3c 00 e8 ff 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #505: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0359 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e0 39 ae 6e 8d 33 46 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #521 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #521 | rejected packet: | e0 39 ae 6e 8d 33 46 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #521: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.036 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 9a 49 1f a8 dd 2c 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #506 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #506 | rejected packet: | 30 9a 49 1f a8 dd 2c 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #506: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0371 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing resume sending helper answer for #520 | start processing: state #520 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 520 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #520 | **emit ISAKMP Message: | initiator cookie: | ce 20 34 a6 bb f7 7e 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-132 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f6 93 1d d8 d2 b1 be 53 4e eb ed b5 53 68 b9 68 | ikev2 g^x 3b 90 1c 10 61 78 23 f6 10 87 d8 bd e4 f5 d6 23 | ikev2 g^x 53 c0 54 e9 4d 15 49 54 f1 a0 df a0 bd 97 7f 49 | ikev2 g^x f3 26 38 fe d6 f7 64 49 d3 1d 69 61 fb 72 b3 74 | ikev2 g^x 62 c9 08 94 a1 27 ba fe 91 a4 0d b0 be 34 09 2c | ikev2 g^x ae 06 17 ab b3 b7 51 c6 26 a5 e8 3e e5 24 f9 a1 | ikev2 g^x f7 68 74 98 63 fd a8 7c d3 13 6d 90 1f 14 c6 a6 | ikev2 g^x 04 85 61 e0 a3 c8 02 54 74 60 3f 87 eb 06 83 74 | ikev2 g^x 5e 85 3d 22 87 46 88 9f d4 fd 35 c2 36 a3 83 41 | ikev2 g^x ab 57 49 d7 e0 f2 53 56 77 35 4b e3 66 a6 da 67 | ikev2 g^x 4f 7e dc 81 d0 4e 81 b5 d9 96 e6 10 f9 24 0e 5e | ikev2 g^x fb e3 82 13 23 20 a1 ed ab 8f 63 39 52 b2 83 84 | ikev2 g^x b9 61 cb cd 44 7f 65 2d cb 8a 27 c6 61 e2 d1 7f | ikev2 g^x 39 5c 98 77 3c 0d d7 d7 5b 79 74 66 3f 68 61 be | ikev2 g^x d1 5d 20 ef 6b 4e 03 30 9a 82 f2 ac 7c ef f0 7d | ikev2 g^x c4 47 c7 7c c8 eb 96 9e c1 9f ef 3d 93 05 11 e1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 10 75 51 a8 ab dc ad 6d a2 4e 44 8c c4 29 f6 ed | IKEv2 nonce 6d f9 db 56 a8 84 be 4b 75 f6 2d c8 a0 76 de b6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ce 20 34 a6 bb f7 7e 60 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 84 | natd_hash: port= 01 f4 | natd_hash: hash= 2a a7 18 b8 de c7 a0 95 e6 f4 d9 c5 62 97 a0 57 | natd_hash: hash= 23 f3 99 e4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2a a7 18 b8 de c7 a0 95 e6 f4 d9 c5 62 97 a0 57 | Notify data 23 f3 99 e4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ce 20 34 a6 bb f7 7e 60 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 3d 7c d2 81 56 1c d6 fe cd 6a 43 28 2b 9f a2 6a | natd_hash: hash= e6 22 f1 8c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3d 7c d2 81 56 1c d6 fe cd 6a 43 28 2b 9f a2 6a | Notify data e6 22 f1 8c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #520 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #520 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #520 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #520: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #520 to 4294967295 after switching state | Message ID: IKE #520 skipping update_recv as MD is fake | Message ID: sent #520 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-132" #520: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.132:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #520) | ce 20 34 a6 bb f7 7e 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 93 1d d8 d2 b1 be 53 4e eb ed b5 53 68 b9 68 | 3b 90 1c 10 61 78 23 f6 10 87 d8 bd e4 f5 d6 23 | 53 c0 54 e9 4d 15 49 54 f1 a0 df a0 bd 97 7f 49 | f3 26 38 fe d6 f7 64 49 d3 1d 69 61 fb 72 b3 74 | 62 c9 08 94 a1 27 ba fe 91 a4 0d b0 be 34 09 2c | ae 06 17 ab b3 b7 51 c6 26 a5 e8 3e e5 24 f9 a1 | f7 68 74 98 63 fd a8 7c d3 13 6d 90 1f 14 c6 a6 | 04 85 61 e0 a3 c8 02 54 74 60 3f 87 eb 06 83 74 | 5e 85 3d 22 87 46 88 9f d4 fd 35 c2 36 a3 83 41 | ab 57 49 d7 e0 f2 53 56 77 35 4b e3 66 a6 da 67 | 4f 7e dc 81 d0 4e 81 b5 d9 96 e6 10 f9 24 0e 5e | fb e3 82 13 23 20 a1 ed ab 8f 63 39 52 b2 83 84 | b9 61 cb cd 44 7f 65 2d cb 8a 27 c6 61 e2 d1 7f | 39 5c 98 77 3c 0d d7 d7 5b 79 74 66 3f 68 61 be | d1 5d 20 ef 6b 4e 03 30 9a 82 f2 ac 7c ef f0 7d | c4 47 c7 7c c8 eb 96 9e c1 9f ef 3d 93 05 11 e1 | 29 00 00 24 10 75 51 a8 ab dc ad 6d a2 4e 44 8c | c4 29 f6 ed 6d f9 db 56 a8 84 be 4b 75 f6 2d c8 | a0 76 de b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a a7 18 b8 de c7 a0 95 e6 f4 d9 c5 | 62 97 a0 57 23 f3 99 e4 00 00 00 1c 00 00 40 05 | 3d 7c d2 81 56 1c d6 fe cd 6a 43 28 2b 9f a2 6a | e6 22 f1 8c | state #520 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37804b7c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c012bf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #520 | libevent_malloc: new ptr-libevent@0x7fb37004a770 size 128 | #520 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.214115 | resume sending helper answer for #520 suppresed complete_v2_state_transition() and stole MD | #520 spent 0.332 milliseconds in resume sending helper answer | stop processing: state #520 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb33804e7a0 | processing resume sending helper answer for #656 | start processing: state #656 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 656 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #656 | **emit ISAKMP Message: | initiator cookie: | be 68 21 bf 92 3b bd 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-192 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 60 52 43 e7 61 15 4a 4d ee d7 b2 46 b1 85 1b a8 | ikev2 g^x b0 82 1f 54 6e 3d 86 2c 4c 72 1b be 1a c9 a9 49 | ikev2 g^x 93 8b d8 d1 12 52 c1 d1 1e 66 c4 3c 2c ea d7 98 | ikev2 g^x 75 c0 9a ec 39 77 d3 3f fe 5e 4c e6 42 6d 23 4b | ikev2 g^x 2b 34 b7 11 db 87 07 d3 52 60 5a 9e 7c 2c 5b ef | ikev2 g^x e6 f9 73 5c 0b ba ad d6 fe 16 9c 1f 42 85 0a 3f | ikev2 g^x c6 40 77 bd 69 5b 49 0e 03 f8 b5 a7 44 3d 92 3e | ikev2 g^x b6 3c 8b 69 c2 36 24 58 2e fe e4 2e cf 17 66 89 | ikev2 g^x 17 19 74 fd 9e 82 52 41 e1 84 14 f6 da 40 64 3c | ikev2 g^x 7a 18 7c f9 1c fa fc 3d 2b ab c7 81 6b 75 f7 02 | ikev2 g^x 62 8e a6 13 db 23 45 dd 44 71 ff f8 9b 82 f6 c5 | ikev2 g^x 35 8a a4 69 84 07 45 3b 4e 8e cf 28 a8 c7 ed c8 | ikev2 g^x 24 90 fd dc c5 ab 7f aa 2d f3 14 d8 aa c0 01 da | ikev2 g^x 83 71 b8 3c 0a d2 2e f1 89 59 c1 75 b8 ab ca f6 | ikev2 g^x ed 19 86 32 78 7f f4 7b 8d e8 39 01 f8 23 b7 bf | ikev2 g^x d8 41 df 63 27 75 88 7d 0c 1a d0 05 c1 b6 21 63 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce da a6 76 b3 cd d9 ef 6f 78 db 6d a7 41 9d 1a c1 | IKEv2 nonce 02 ed b1 b4 d8 5e 1d cc 04 ae df b0 fa 18 8b a1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= be 68 21 bf 92 3b bd 83 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c0 | natd_hash: port= 01 f4 | natd_hash: hash= c9 b6 14 c8 78 3e 8b 14 79 86 4e 98 ba 1c aa fd | natd_hash: hash= 49 33 32 6e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c9 b6 14 c8 78 3e 8b 14 79 86 4e 98 ba 1c aa fd | Notify data 49 33 32 6e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= be 68 21 bf 92 3b bd 83 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ec b2 52 19 30 c6 85 07 d9 5c 18 07 e7 c7 94 94 | natd_hash: hash= 67 61 43 b0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ec b2 52 19 30 c6 85 07 d9 5c 18 07 e7 c7 94 94 | Notify data 67 61 43 b0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #656 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #656 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #656 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #656: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #656 to 4294967295 after switching state | Message ID: IKE #656 skipping update_recv as MD is fake | Message ID: sent #656 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-192" #656: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.192:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #656) | be 68 21 bf 92 3b bd 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 52 43 e7 61 15 4a 4d ee d7 b2 46 b1 85 1b a8 | b0 82 1f 54 6e 3d 86 2c 4c 72 1b be 1a c9 a9 49 | 93 8b d8 d1 12 52 c1 d1 1e 66 c4 3c 2c ea d7 98 | 75 c0 9a ec 39 77 d3 3f fe 5e 4c e6 42 6d 23 4b | 2b 34 b7 11 db 87 07 d3 52 60 5a 9e 7c 2c 5b ef | e6 f9 73 5c 0b ba ad d6 fe 16 9c 1f 42 85 0a 3f | c6 40 77 bd 69 5b 49 0e 03 f8 b5 a7 44 3d 92 3e | b6 3c 8b 69 c2 36 24 58 2e fe e4 2e cf 17 66 89 | 17 19 74 fd 9e 82 52 41 e1 84 14 f6 da 40 64 3c | 7a 18 7c f9 1c fa fc 3d 2b ab c7 81 6b 75 f7 02 | 62 8e a6 13 db 23 45 dd 44 71 ff f8 9b 82 f6 c5 | 35 8a a4 69 84 07 45 3b 4e 8e cf 28 a8 c7 ed c8 | 24 90 fd dc c5 ab 7f aa 2d f3 14 d8 aa c0 01 da | 83 71 b8 3c 0a d2 2e f1 89 59 c1 75 b8 ab ca f6 | ed 19 86 32 78 7f f4 7b 8d e8 39 01 f8 23 b7 bf | d8 41 df 63 27 75 88 7d 0c 1a d0 05 c1 b6 21 63 | 29 00 00 24 da a6 76 b3 cd d9 ef 6f 78 db 6d a7 | 41 9d 1a c1 02 ed b1 b4 d8 5e 1d cc 04 ae df b0 | fa 18 8b a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 b6 14 c8 78 3e 8b 14 79 86 4e 98 | ba 1c aa fd 49 33 32 6e 00 00 00 1c 00 00 40 05 | ec b2 52 19 30 c6 85 07 d9 5c 18 07 e7 c7 94 94 | 67 61 43 b0 | state #656 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35804b810 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35804b810 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #656 | libevent_malloc: new ptr-libevent@0x7fb33804e7a0 size 128 | #656 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.214446 | resume sending helper answer for #656 suppresed complete_v2_state_transition() and stole MD | #656 spent 0.298 milliseconds in resume sending helper answer | stop processing: state #656 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36406f9a0 | processing resume sending helper answer for #720 | start processing: state #720 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 720 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #720 | **emit ISAKMP Message: | initiator cookie: | 2e 33 4d 73 be a7 0e 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-182 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ed ab c5 2c c2 f4 74 ef c7 ee 30 67 5e 1c da 49 | ikev2 g^x 70 61 7e 4d 8d 32 5f 3e 9a ec c2 40 33 9c 3f 67 | ikev2 g^x af 3f 5c 83 67 1b 79 9e b7 b7 35 73 56 5b 8c 3b | ikev2 g^x 0a 1a 2e 82 5d 65 28 71 9b 14 bc 2f fa 09 67 19 | ikev2 g^x b2 66 da 04 38 29 ad e2 f1 65 50 23 4d 85 d5 08 | ikev2 g^x 9a 79 76 49 46 a5 ea 67 8b 56 2d 01 fc 5a ed 64 | ikev2 g^x 0b 12 a4 dd e9 5f 18 7a eb a7 15 69 ee 95 e8 d9 | ikev2 g^x 56 b2 86 02 b9 aa db 6a f8 94 26 91 52 0c 14 ef | ikev2 g^x 19 10 c0 eb 0d 10 8b 4f 19 f6 79 a9 16 1e 94 36 | ikev2 g^x 09 fb 5c 76 4e b9 0e 65 a7 28 d3 fb 8e dd 96 92 | ikev2 g^x 1b 73 43 c6 61 e3 03 3c 0e 78 5b c1 2b aa 38 be | ikev2 g^x 19 84 9e 8e ff b7 65 35 2e 65 78 b8 fe ae d6 cc | ikev2 g^x 05 c7 08 1c 26 02 90 02 f3 16 d5 8a d5 33 30 16 | ikev2 g^x 63 1d e2 87 4f 85 13 e7 cf 51 84 57 b6 4d 0b d7 | ikev2 g^x ad f3 bf 57 f0 ee 36 2a 5d 91 a2 8b 76 c7 7f 4d | ikev2 g^x 7b 7f 59 64 bb c0 6d 44 32 b3 fa 20 34 ab 07 c4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b4 27 97 52 66 73 6d 63 e4 fb b7 f1 ce d3 ed e9 | IKEv2 nonce 19 97 52 e1 e0 b1 81 d7 52 28 6b 0c 38 64 19 17 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 2e 33 4d 73 be a7 0e 6b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b6 | natd_hash: port= 01 f4 | natd_hash: hash= 48 f0 ee 60 72 ed 8f f1 ea b8 ad 81 a1 9e 54 4c | natd_hash: hash= fd ed 06 17 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 48 f0 ee 60 72 ed 8f f1 ea b8 ad 81 a1 9e 54 4c | Notify data fd ed 06 17 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 2e 33 4d 73 be a7 0e 6b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 50 b7 67 3d 54 be ef de 2d a1 bf 2b 46 e3 89 aa | natd_hash: hash= 52 77 9e 8d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 50 b7 67 3d 54 be ef de 2d a1 bf 2b 46 e3 89 aa | Notify data 52 77 9e 8d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #720 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #720 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #720 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #720: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #720 to 4294967295 after switching state | Message ID: IKE #720 skipping update_recv as MD is fake | Message ID: sent #720 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-182" #720: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.182:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #720) | 2e 33 4d 73 be a7 0e 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed ab c5 2c c2 f4 74 ef c7 ee 30 67 5e 1c da 49 | 70 61 7e 4d 8d 32 5f 3e 9a ec c2 40 33 9c 3f 67 | af 3f 5c 83 67 1b 79 9e b7 b7 35 73 56 5b 8c 3b | 0a 1a 2e 82 5d 65 28 71 9b 14 bc 2f fa 09 67 19 | b2 66 da 04 38 29 ad e2 f1 65 50 23 4d 85 d5 08 | 9a 79 76 49 46 a5 ea 67 8b 56 2d 01 fc 5a ed 64 | 0b 12 a4 dd e9 5f 18 7a eb a7 15 69 ee 95 e8 d9 | 56 b2 86 02 b9 aa db 6a f8 94 26 91 52 0c 14 ef | 19 10 c0 eb 0d 10 8b 4f 19 f6 79 a9 16 1e 94 36 | 09 fb 5c 76 4e b9 0e 65 a7 28 d3 fb 8e dd 96 92 | 1b 73 43 c6 61 e3 03 3c 0e 78 5b c1 2b aa 38 be | 19 84 9e 8e ff b7 65 35 2e 65 78 b8 fe ae d6 cc | 05 c7 08 1c 26 02 90 02 f3 16 d5 8a d5 33 30 16 | 63 1d e2 87 4f 85 13 e7 cf 51 84 57 b6 4d 0b d7 | ad f3 bf 57 f0 ee 36 2a 5d 91 a2 8b 76 c7 7f 4d | 7b 7f 59 64 bb c0 6d 44 32 b3 fa 20 34 ab 07 c4 | 29 00 00 24 b4 27 97 52 66 73 6d 63 e4 fb b7 f1 | ce d3 ed e9 19 97 52 e1 e0 b1 81 d7 52 28 6b 0c | 38 64 19 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 f0 ee 60 72 ed 8f f1 ea b8 ad 81 | a1 9e 54 4c fd ed 06 17 00 00 00 1c 00 00 40 05 | 50 b7 67 3d 54 be ef de 2d a1 bf 2b 46 e3 89 aa | 52 77 9e 8d | state #720 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c02ec30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a1c490 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c490 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #720 | libevent_malloc: new ptr-libevent@0x7fb36406f9a0 size 128 | #720 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.214756 | resume sending helper answer for #720 suppresed complete_v2_state_transition() and stole MD | #720 spent 0.287 milliseconds in resume sending helper answer | stop processing: state #720 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36007a360 | processing resume sending helper answer for #732 | start processing: state #732 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 732 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #732 | **emit ISAKMP Message: | initiator cookie: | d0 09 53 dc c6 ab 63 da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-222 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 72 85 fc fd c0 3d 4e f2 6d 8c 5a 48 97 72 ba 8d | ikev2 g^x 76 a1 67 2b 3e f5 0f 59 6a 4a cf 1f 0f 1a 83 6b | ikev2 g^x 02 c4 e6 13 1a a7 be 58 09 e7 95 c5 d3 61 73 f0 | ikev2 g^x 93 30 b7 ea 83 2c 03 35 7b e7 a4 68 e9 c3 34 3d | ikev2 g^x 62 a3 61 5b 4e 45 93 53 18 92 ed db b3 57 ab ed | ikev2 g^x d3 53 e9 06 16 fc 7d fc c5 71 11 b8 0f 5b b1 19 | ikev2 g^x dd 64 cc 6c d3 60 ce 76 d1 ee 24 40 d0 a9 e8 ef | ikev2 g^x b0 05 68 55 4c bc 77 f7 43 d8 3a 34 82 db 7d 83 | ikev2 g^x 19 10 50 8c d2 65 d7 7b e4 c6 64 bb d8 6c a7 36 | ikev2 g^x 7d c4 11 fc dd 75 d9 7e 8a a8 c1 86 35 68 1d 19 | ikev2 g^x 3f e6 94 36 43 37 3c ce 07 24 1a e3 3a b2 b8 d0 | ikev2 g^x 31 23 82 03 07 23 34 27 ac 92 b7 75 a4 35 52 c2 | ikev2 g^x 62 ee a2 c7 e9 86 52 3d d2 a7 12 2a b4 93 13 55 | ikev2 g^x e8 52 4e 73 70 b2 d4 5f 3e 19 02 5a 63 54 72 36 | ikev2 g^x d5 50 42 05 5e b0 23 11 30 64 39 ea 9a e3 b8 0d | ikev2 g^x 4b 4e 16 cb 69 12 46 02 2b 04 d5 67 a1 73 e1 ac | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce fc ee 14 ee 51 1c c8 cf 02 52 60 a5 ed 61 3d 76 | IKEv2 nonce 39 bb ee c9 50 2c 24 3c 5a ec a0 d1 e5 8a bb 04 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d0 09 53 dc c6 ab 63 da | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 de | natd_hash: port= 01 f4 | natd_hash: hash= 2a fa b6 a7 12 75 27 e9 bc d5 98 e9 7d b2 82 ba | natd_hash: hash= 84 f4 53 9f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2a fa b6 a7 12 75 27 e9 bc d5 98 e9 7d b2 82 ba | Notify data 84 f4 53 9f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d0 09 53 dc c6 ab 63 da | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 27 89 f2 84 3a 49 ac a7 94 1d 98 7e 0c c4 b6 09 | natd_hash: hash= ba a0 ac ee | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 27 89 f2 84 3a 49 ac a7 94 1d 98 7e 0c c4 b6 09 | Notify data ba a0 ac ee | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #732 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #732 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #732 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #732: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #732 to 4294967295 after switching state | Message ID: IKE #732 skipping update_recv as MD is fake | Message ID: sent #732 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-222" #732: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.222:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #732) | d0 09 53 dc c6 ab 63 da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 85 fc fd c0 3d 4e f2 6d 8c 5a 48 97 72 ba 8d | 76 a1 67 2b 3e f5 0f 59 6a 4a cf 1f 0f 1a 83 6b | 02 c4 e6 13 1a a7 be 58 09 e7 95 c5 d3 61 73 f0 | 93 30 b7 ea 83 2c 03 35 7b e7 a4 68 e9 c3 34 3d | 62 a3 61 5b 4e 45 93 53 18 92 ed db b3 57 ab ed | d3 53 e9 06 16 fc 7d fc c5 71 11 b8 0f 5b b1 19 | dd 64 cc 6c d3 60 ce 76 d1 ee 24 40 d0 a9 e8 ef | b0 05 68 55 4c bc 77 f7 43 d8 3a 34 82 db 7d 83 | 19 10 50 8c d2 65 d7 7b e4 c6 64 bb d8 6c a7 36 | 7d c4 11 fc dd 75 d9 7e 8a a8 c1 86 35 68 1d 19 | 3f e6 94 36 43 37 3c ce 07 24 1a e3 3a b2 b8 d0 | 31 23 82 03 07 23 34 27 ac 92 b7 75 a4 35 52 c2 | 62 ee a2 c7 e9 86 52 3d d2 a7 12 2a b4 93 13 55 | e8 52 4e 73 70 b2 d4 5f 3e 19 02 5a 63 54 72 36 | d5 50 42 05 5e b0 23 11 30 64 39 ea 9a e3 b8 0d | 4b 4e 16 cb 69 12 46 02 2b 04 d5 67 a1 73 e1 ac | 29 00 00 24 fc ee 14 ee 51 1c c8 cf 02 52 60 a5 | ed 61 3d 76 39 bb ee c9 50 2c 24 3c 5a ec a0 d1 | e5 8a bb 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a fa b6 a7 12 75 27 e9 bc d5 98 e9 | 7d b2 82 ba 84 f4 53 9f 00 00 00 1c 00 00 40 05 | 27 89 f2 84 3a 49 ac a7 94 1d 98 7e 0c c4 b6 09 | ba a0 ac ee | state #732 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb364009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb364005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #732 | libevent_malloc: new ptr-libevent@0x7fb36007a360 size 128 | #732 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.215167 | resume sending helper answer for #732 suppresed complete_v2_state_transition() and stole MD | #732 spent 0.383 milliseconds in resume sending helper answer | stop processing: state #732 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb350098a50 | processing resume sending helper answer for #745 | start processing: state #745 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 745 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #745 | **emit ISAKMP Message: | initiator cookie: | df ac 39 b5 f9 b7 7d 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-226 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3e f7 65 df 71 26 c4 3d a2 90 5c a9 e7 88 ce 69 | ikev2 g^x ff 2d 77 e1 e9 28 b2 ca 63 26 2f 17 f6 30 c1 b6 | ikev2 g^x 39 b0 8c 45 80 54 3e b8 78 2e 6e fd 9a 2b 2a 52 | ikev2 g^x ca 74 04 e0 de 83 7f 71 5a 19 b2 89 32 08 35 52 | ikev2 g^x 70 00 7b 76 28 6d 62 a4 be 64 0c 1f a4 45 57 cd | ikev2 g^x 11 68 13 12 c1 4b 60 df 43 a5 14 ea bf 55 ed 2b | ikev2 g^x 18 e3 70 ee 05 77 1b 59 ad 13 96 57 35 f3 b4 6e | ikev2 g^x 28 41 98 f7 f9 c2 8e d1 b6 81 56 ba 5f 83 59 98 | ikev2 g^x c7 5b ab 64 6f 96 f4 3e 22 b8 09 cc af c2 0e ab | ikev2 g^x 6d a3 ec bb 7e 4b c4 f1 95 3e e6 35 d1 ea 5f d2 | ikev2 g^x 5f 46 72 4a 07 85 6d 10 0c 34 15 0b a2 f3 fd 62 | ikev2 g^x 45 e0 37 8e b4 eb a6 d9 5e 4a c5 3b b8 de e2 bf | ikev2 g^x 9c 19 26 ec 20 49 07 de 03 c8 b8 f2 22 8a b0 69 | ikev2 g^x 7c 4e a6 9f e0 80 50 9a 1a 56 09 a3 d2 31 da 0c | ikev2 g^x 1d 1c 03 93 e7 49 e4 22 b6 cd b0 39 68 08 3e 18 | ikev2 g^x 56 e3 51 94 91 4c f4 14 88 bd 84 2f 7c a2 b8 75 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 55 ae 14 5e ed e8 27 ac 21 93 fd 63 78 8a 19 9d | IKEv2 nonce 55 09 8a 50 52 47 37 07 2f ec 25 35 ae 89 b9 66 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= df ac 39 b5 f9 b7 7d 59 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e2 | natd_hash: port= 01 f4 | natd_hash: hash= 84 71 bd aa 31 18 7e 5b 95 40 b0 64 8c 00 c2 4d | natd_hash: hash= 9c 60 b6 d8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 84 71 bd aa 31 18 7e 5b 95 40 b0 64 8c 00 c2 4d | Notify data 9c 60 b6 d8 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= df ac 39 b5 f9 b7 7d 59 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 96 11 c6 74 b5 44 15 ed 03 ab 9b 4e 68 8e d0 9d | natd_hash: hash= 24 43 c0 9f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 96 11 c6 74 b5 44 15 ed 03 ab 9b 4e 68 8e d0 9d | Notify data 24 43 c0 9f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #745 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #745 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #745 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #745: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #745 to 4294967295 after switching state | Message ID: IKE #745 skipping update_recv as MD is fake | Message ID: sent #745 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-226" #745: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.226:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #745) | df ac 39 b5 f9 b7 7d 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e f7 65 df 71 26 c4 3d a2 90 5c a9 e7 88 ce 69 | ff 2d 77 e1 e9 28 b2 ca 63 26 2f 17 f6 30 c1 b6 | 39 b0 8c 45 80 54 3e b8 78 2e 6e fd 9a 2b 2a 52 | ca 74 04 e0 de 83 7f 71 5a 19 b2 89 32 08 35 52 | 70 00 7b 76 28 6d 62 a4 be 64 0c 1f a4 45 57 cd | 11 68 13 12 c1 4b 60 df 43 a5 14 ea bf 55 ed 2b | 18 e3 70 ee 05 77 1b 59 ad 13 96 57 35 f3 b4 6e | 28 41 98 f7 f9 c2 8e d1 b6 81 56 ba 5f 83 59 98 | c7 5b ab 64 6f 96 f4 3e 22 b8 09 cc af c2 0e ab | 6d a3 ec bb 7e 4b c4 f1 95 3e e6 35 d1 ea 5f d2 | 5f 46 72 4a 07 85 6d 10 0c 34 15 0b a2 f3 fd 62 | 45 e0 37 8e b4 eb a6 d9 5e 4a c5 3b b8 de e2 bf | 9c 19 26 ec 20 49 07 de 03 c8 b8 f2 22 8a b0 69 | 7c 4e a6 9f e0 80 50 9a 1a 56 09 a3 d2 31 da 0c | 1d 1c 03 93 e7 49 e4 22 b6 cd b0 39 68 08 3e 18 | 56 e3 51 94 91 4c f4 14 88 bd 84 2f 7c a2 b8 75 | 29 00 00 24 55 ae 14 5e ed e8 27 ac 21 93 fd 63 | 78 8a 19 9d 55 09 8a 50 52 47 37 07 2f ec 25 35 | ae 89 b9 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 71 bd aa 31 18 7e 5b 95 40 b0 64 | 8c 00 c2 4d 9c 60 b6 d8 00 00 00 1c 00 00 40 05 | 96 11 c6 74 b5 44 15 ed 03 ab 9b 4e 68 8e d0 9d | 24 43 c0 9f | state #745 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3700180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0a940 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0a940 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #745 | libevent_malloc: new ptr-libevent@0x7fb350098a50 size 128 | #745 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.215515 | resume sending helper answer for #745 suppresed complete_v2_state_transition() and stole MD | #745 spent 0.326 milliseconds in resume sending helper answer | stop processing: state #745 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c090640 | processing resume sending helper answer for #741 | start processing: state #741 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 741 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #741 | **emit ISAKMP Message: | initiator cookie: | 62 ac e1 dc 78 47 49 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-217 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 14 75 0b 46 c7 7e 2e 5b 84 9b fc 63 4f 7a bb b1 | ikev2 g^x bb 0b 39 b2 38 45 c4 46 64 96 9b f6 97 0f ad 64 | ikev2 g^x 77 d0 65 ce 45 75 90 09 8d bb 17 97 97 97 b2 fe | ikev2 g^x 7c 98 b0 3c e2 1b b2 75 9e 4f 00 17 88 80 52 35 | ikev2 g^x 5a e1 87 e0 03 97 21 fd f3 19 41 85 49 46 8f ab | ikev2 g^x 34 a9 9a fd f7 fd 73 2c 73 3d 6a 91 77 21 6d 6c | ikev2 g^x 79 4c 5c bb 61 7c 82 81 01 a9 8b f8 96 88 67 ec | ikev2 g^x 5e 9f 63 85 f6 a8 a9 74 84 a6 13 9a 7a ca 36 d7 | ikev2 g^x d6 5d 44 65 ea 98 9a 63 18 26 33 18 de 47 5a c9 | ikev2 g^x 7a 75 34 c1 c7 bd 4c 1d 3b 2c ba b7 c0 6e 1c 7e | ikev2 g^x 83 75 bf 9c ba 83 c0 f2 ba 77 85 7b 33 2b 90 b1 | ikev2 g^x c2 52 77 da 60 67 e2 5a f3 07 0b 1d 76 db f2 c8 | ikev2 g^x dd 92 77 15 ff 35 90 20 f7 3a 79 14 36 0e 74 98 | ikev2 g^x 26 48 0d 10 a8 b8 96 6e a1 d3 39 9c 37 f1 09 c2 | ikev2 g^x d6 18 46 cc 20 41 73 2d 13 cc 4b 13 c4 75 47 56 | ikev2 g^x 6f 8d 2a 56 34 65 b3 20 fa a7 7c 74 84 64 26 20 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 98 46 88 9e 86 0c 01 40 55 4c d6 79 b1 b2 76 d9 | IKEv2 nonce 6d f0 c7 03 be fb 8a 36 84 6a 6b 74 5e 47 68 8e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 62 ac e1 dc 78 47 49 d4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d9 | natd_hash: port= 01 f4 | natd_hash: hash= 41 45 41 a0 85 77 fe f1 d1 6d 6e 5e 4b d5 c9 60 | natd_hash: hash= 59 e4 cf 31 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 41 45 41 a0 85 77 fe f1 d1 6d 6e 5e 4b d5 c9 60 | Notify data 59 e4 cf 31 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 62 ac e1 dc 78 47 49 d4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 3f 98 bf 78 15 51 e4 00 05 0a 6e 9b 09 7f 98 a3 | natd_hash: hash= af 3d 07 7b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3f 98 bf 78 15 51 e4 00 05 0a 6e 9b 09 7f 98 a3 | Notify data af 3d 07 7b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #741 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #741 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #741 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #741: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #741 to 4294967295 after switching state | Message ID: IKE #741 skipping update_recv as MD is fake | Message ID: sent #741 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-217" #741: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.217:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #741) | 62 ac e1 dc 78 47 49 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 14 75 0b 46 c7 7e 2e 5b 84 9b fc 63 4f 7a bb b1 | bb 0b 39 b2 38 45 c4 46 64 96 9b f6 97 0f ad 64 | 77 d0 65 ce 45 75 90 09 8d bb 17 97 97 97 b2 fe | 7c 98 b0 3c e2 1b b2 75 9e 4f 00 17 88 80 52 35 | 5a e1 87 e0 03 97 21 fd f3 19 41 85 49 46 8f ab | 34 a9 9a fd f7 fd 73 2c 73 3d 6a 91 77 21 6d 6c | 79 4c 5c bb 61 7c 82 81 01 a9 8b f8 96 88 67 ec | 5e 9f 63 85 f6 a8 a9 74 84 a6 13 9a 7a ca 36 d7 | d6 5d 44 65 ea 98 9a 63 18 26 33 18 de 47 5a c9 | 7a 75 34 c1 c7 bd 4c 1d 3b 2c ba b7 c0 6e 1c 7e | 83 75 bf 9c ba 83 c0 f2 ba 77 85 7b 33 2b 90 b1 | c2 52 77 da 60 67 e2 5a f3 07 0b 1d 76 db f2 c8 | dd 92 77 15 ff 35 90 20 f7 3a 79 14 36 0e 74 98 | 26 48 0d 10 a8 b8 96 6e a1 d3 39 9c 37 f1 09 c2 | d6 18 46 cc 20 41 73 2d 13 cc 4b 13 c4 75 47 56 | 6f 8d 2a 56 34 65 b3 20 fa a7 7c 74 84 64 26 20 | 29 00 00 24 98 46 88 9e 86 0c 01 40 55 4c d6 79 | b1 b2 76 d9 6d f0 c7 03 be fb 8a 36 84 6a 6b 74 | 5e 47 68 8e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 45 41 a0 85 77 fe f1 d1 6d 6e 5e | 4b d5 c9 60 59 e4 cf 31 00 00 00 1c 00 00 40 05 | 3f 98 bf 78 15 51 e4 00 05 0a 6e 9b 09 7f 98 a3 | af 3d 07 7b | state #741 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3380300e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a94500 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94500 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #741 | libevent_malloc: new ptr-libevent@0x7fb37c090640 size 128 | #741 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.215921 | resume sending helper answer for #741 suppresed complete_v2_state_transition() and stole MD | #741 spent 0.361 milliseconds in resume sending helper answer | stop processing: state #741 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb360085320 | processing resume sending helper answer for #755 | start processing: state #755 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 755 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #755 | **emit ISAKMP Message: | initiator cookie: | 05 2d 15 eb 8d d1 e7 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-237 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2c e4 18 a4 fb 02 3a d9 56 aa ab 1f 07 98 9a b0 | ikev2 g^x 2b 63 06 c0 f4 31 d9 71 70 9c 4c 64 b1 c2 38 28 | ikev2 g^x 6c 15 1d 4f c5 ae a4 a5 43 35 ec 6e d6 ce 63 44 | ikev2 g^x c3 02 3a ce b9 ea 97 ee 29 7b 54 70 d5 96 ff 7e | ikev2 g^x 5e 34 ae 91 d7 79 f6 56 f6 05 21 93 eb 09 d6 2b | ikev2 g^x 31 ea 8c 72 22 32 80 ba 85 c1 fd 23 bc 55 76 a5 | ikev2 g^x 14 11 5f 1c 43 e7 b2 de 38 fc 2c a4 66 eb c7 d0 | ikev2 g^x 28 ae 74 a9 31 19 e1 df eb 9a 57 0f 92 b5 24 1b | ikev2 g^x f9 d6 9a c3 62 89 61 7f a8 28 b7 1b ae 83 62 6a | ikev2 g^x 52 6a f7 36 ac ba a5 54 22 cb 98 46 53 96 c0 75 | ikev2 g^x 28 f7 eb 90 7e f6 0c 82 ec ac f4 3f 47 1c 6c fe | ikev2 g^x 84 02 5a 18 bb f3 1e 67 69 d9 22 9d a1 ce 99 fa | ikev2 g^x c1 d1 64 9b c8 33 d0 0e 5f bd db 94 28 8e dd 95 | ikev2 g^x 12 8f 1e 24 1b 4a d0 41 03 fa d3 6e cf f5 c7 5c | ikev2 g^x e5 af 76 1b 64 bb 0a af 07 04 ed 6b 46 aa c8 6b | ikev2 g^x 3d 72 51 cb d5 1d a8 b3 e5 d3 ab 98 04 42 49 92 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 49 bb cf 23 e0 6f e1 de 61 d1 90 4a 2d 30 38 2f | IKEv2 nonce 6a e7 9f b7 3b 9f e2 b1 72 e4 d8 55 05 54 cd 1b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 05 2d 15 eb 8d d1 e7 6e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ed | natd_hash: port= 01 f4 | natd_hash: hash= cd 9d 20 ec 91 b7 c1 7d 70 e8 e6 28 dd fd cb 82 | natd_hash: hash= 74 04 84 bf | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cd 9d 20 ec 91 b7 c1 7d 70 e8 e6 28 dd fd cb 82 | Notify data 74 04 84 bf | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 05 2d 15 eb 8d d1 e7 6e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e9 ae 1f 41 fd b0 e1 3d 82 1f 24 48 4d 65 7b ae | natd_hash: hash= 19 d4 aa 4e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e9 ae 1f 41 fd b0 e1 3d 82 1f 24 48 4d 65 7b ae | Notify data 19 d4 aa 4e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #755 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #755 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #755 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #755: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #755 to 4294967295 after switching state | Message ID: IKE #755 skipping update_recv as MD is fake | Message ID: sent #755 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-237" #755: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.237:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #755) | 05 2d 15 eb 8d d1 e7 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c e4 18 a4 fb 02 3a d9 56 aa ab 1f 07 98 9a b0 | 2b 63 06 c0 f4 31 d9 71 70 9c 4c 64 b1 c2 38 28 | 6c 15 1d 4f c5 ae a4 a5 43 35 ec 6e d6 ce 63 44 | c3 02 3a ce b9 ea 97 ee 29 7b 54 70 d5 96 ff 7e | 5e 34 ae 91 d7 79 f6 56 f6 05 21 93 eb 09 d6 2b | 31 ea 8c 72 22 32 80 ba 85 c1 fd 23 bc 55 76 a5 | 14 11 5f 1c 43 e7 b2 de 38 fc 2c a4 66 eb c7 d0 | 28 ae 74 a9 31 19 e1 df eb 9a 57 0f 92 b5 24 1b | f9 d6 9a c3 62 89 61 7f a8 28 b7 1b ae 83 62 6a | 52 6a f7 36 ac ba a5 54 22 cb 98 46 53 96 c0 75 | 28 f7 eb 90 7e f6 0c 82 ec ac f4 3f 47 1c 6c fe | 84 02 5a 18 bb f3 1e 67 69 d9 22 9d a1 ce 99 fa | c1 d1 64 9b c8 33 d0 0e 5f bd db 94 28 8e dd 95 | 12 8f 1e 24 1b 4a d0 41 03 fa d3 6e cf f5 c7 5c | e5 af 76 1b 64 bb 0a af 07 04 ed 6b 46 aa c8 6b | 3d 72 51 cb d5 1d a8 b3 e5 d3 ab 98 04 42 49 92 | 29 00 00 24 49 bb cf 23 e0 6f e1 de 61 d1 90 4a | 2d 30 38 2f 6a e7 9f b7 3b 9f e2 b1 72 e4 d8 55 | 05 54 cd 1b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 9d 20 ec 91 b7 c1 7d 70 e8 e6 28 | dd fd cb 82 74 04 84 bf 00 00 00 1c 00 00 40 05 | e9 ae 1f 41 fd b0 e1 3d 82 1f 24 48 4d 65 7b ae | 19 d4 aa 4e | state #755 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34803f490 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb348005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #755 | libevent_malloc: new ptr-libevent@0x7fb360085320 size 128 | #755 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.216291 | resume sending helper answer for #755 suppresed complete_v2_state_transition() and stole MD | #755 spent 0.332 milliseconds in resume sending helper answer | stop processing: state #755 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388096570 | processing resume sending helper answer for #752 | start processing: state #752 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 752 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #752 | **emit ISAKMP Message: | initiator cookie: | c5 64 20 5b 1c 85 54 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-231 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 92 d0 f3 e7 4a 6a f0 e8 90 5f 06 4d e1 8c 9f 3b | ikev2 g^x 1d f4 e3 4b 20 0b 8b 74 a8 b1 fe 8c 8a 59 de d1 | ikev2 g^x 16 28 a6 b3 0f 84 5b 56 83 ac 7e 32 a6 53 36 2a | ikev2 g^x 6a 2f 6a 43 eb c9 c2 27 18 66 c2 b6 33 15 55 47 | ikev2 g^x 34 6d a6 80 80 a8 a9 eb 3d 17 c1 00 cf 82 66 7f | ikev2 g^x 20 cf f6 6a e4 24 60 36 b4 97 22 51 aa 8a e1 03 | ikev2 g^x 48 19 0c a8 78 59 e1 07 72 7c 6b dd c6 e2 ba a3 | ikev2 g^x d9 65 69 17 a7 c0 a3 0a 55 b6 e5 ec fe e5 d7 0c | ikev2 g^x e2 b0 63 ac 57 e2 d2 cf 8d 95 42 f0 b9 eb 11 95 | ikev2 g^x 06 f4 89 63 1b 69 36 d8 f0 18 5a f6 11 36 49 d2 | ikev2 g^x 9c 2e b0 3b ce a1 a2 86 6c 95 83 75 36 ba e8 57 | ikev2 g^x 19 ab ae 24 a8 a8 8b f0 5a 1f 87 f9 4f 41 e2 02 | ikev2 g^x 07 52 df ae 68 e9 dc e7 08 15 ec 9a 14 88 f5 0d | ikev2 g^x e5 d1 7e 0b 47 52 22 7c 78 44 6c 0c 9c d0 6e ef | ikev2 g^x 1c ad c0 bc b6 c3 32 c1 e7 fe 27 7b 2a f8 63 2c | ikev2 g^x ed 16 23 69 56 c8 a9 55 34 58 cf 3c 9f 37 38 a1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4a 83 23 c8 a4 30 70 f0 5a 7c 61 66 38 1d 39 8c | IKEv2 nonce 6e 37 91 1c 03 43 e8 78 33 d5 cf ca 19 09 4b 6d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c5 64 20 5b 1c 85 54 67 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e7 | natd_hash: port= 01 f4 | natd_hash: hash= 3f f8 c0 07 c2 89 1e 18 8b 01 61 d5 b6 df d9 a8 | natd_hash: hash= 3f 00 fb ad | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3f f8 c0 07 c2 89 1e 18 8b 01 61 d5 b6 df d9 a8 | Notify data 3f 00 fb ad | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c5 64 20 5b 1c 85 54 67 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9f 2a cf 58 d8 ce 32 ac 63 1b 6f d8 96 97 22 22 | natd_hash: hash= a5 d1 09 13 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9f 2a cf 58 d8 ce 32 ac 63 1b 6f d8 96 97 22 22 | Notify data a5 d1 09 13 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #752 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #752 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #752 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #752: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #752 to 4294967295 after switching state | Message ID: IKE #752 skipping update_recv as MD is fake | Message ID: sent #752 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-231" #752: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.231:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #752) | c5 64 20 5b 1c 85 54 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 d0 f3 e7 4a 6a f0 e8 90 5f 06 4d e1 8c 9f 3b | 1d f4 e3 4b 20 0b 8b 74 a8 b1 fe 8c 8a 59 de d1 | 16 28 a6 b3 0f 84 5b 56 83 ac 7e 32 a6 53 36 2a | 6a 2f 6a 43 eb c9 c2 27 18 66 c2 b6 33 15 55 47 | 34 6d a6 80 80 a8 a9 eb 3d 17 c1 00 cf 82 66 7f | 20 cf f6 6a e4 24 60 36 b4 97 22 51 aa 8a e1 03 | 48 19 0c a8 78 59 e1 07 72 7c 6b dd c6 e2 ba a3 | d9 65 69 17 a7 c0 a3 0a 55 b6 e5 ec fe e5 d7 0c | e2 b0 63 ac 57 e2 d2 cf 8d 95 42 f0 b9 eb 11 95 | 06 f4 89 63 1b 69 36 d8 f0 18 5a f6 11 36 49 d2 | 9c 2e b0 3b ce a1 a2 86 6c 95 83 75 36 ba e8 57 | 19 ab ae 24 a8 a8 8b f0 5a 1f 87 f9 4f 41 e2 02 | 07 52 df ae 68 e9 dc e7 08 15 ec 9a 14 88 f5 0d | e5 d1 7e 0b 47 52 22 7c 78 44 6c 0c 9c d0 6e ef | 1c ad c0 bc b6 c3 32 c1 e7 fe 27 7b 2a f8 63 2c | ed 16 23 69 56 c8 a9 55 34 58 cf 3c 9f 37 38 a1 | 29 00 00 24 4a 83 23 c8 a4 30 70 f0 5a 7c 61 66 | 38 1d 39 8c 6e 37 91 1c 03 43 e8 78 33 d5 cf ca | 19 09 4b 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f f8 c0 07 c2 89 1e 18 8b 01 61 d5 | b6 df d9 a8 3f 00 fb ad 00 00 00 1c 00 00 40 05 | 9f 2a cf 58 d8 ce 32 ac 63 1b 6f d8 96 97 22 22 | a5 d1 09 13 | state #752 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38803dab0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a52c90 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a52c90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #752 | libevent_malloc: new ptr-libevent@0x7fb388096570 size 128 | #752 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.216593 | resume sending helper answer for #752 suppresed complete_v2_state_transition() and stole MD | #752 spent 0.281 milliseconds in resume sending helper answer | stop processing: state #752 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3840899b0 | processing resume sending helper answer for #753 | start processing: state #753 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 753 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #753 | **emit ISAKMP Message: | initiator cookie: | 43 c3 80 a5 94 99 7d 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-239 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 23 27 47 4f 05 d7 25 44 75 00 7a 90 57 67 26 e6 | ikev2 g^x 4d 97 9a 3a 60 21 e1 3d 90 71 67 27 3f 0b 49 6f | ikev2 g^x 1f b9 14 a1 8d 44 a6 76 24 f5 5a 9b 38 e3 12 49 | ikev2 g^x 11 3f dc 63 03 09 74 e9 a3 fd bb ce e7 70 f7 c2 | ikev2 g^x 6f 48 fd aa a3 1f e4 78 8b 40 4d df 11 7a 5a 41 | ikev2 g^x 45 11 21 74 d6 a5 c3 8b e5 8d 1b 68 d2 3a 6c e4 | ikev2 g^x 4f c3 5b 65 f5 0b 4f 3e 67 74 c2 72 3e 15 1b 5a | ikev2 g^x 2f b9 67 d7 f7 97 99 68 80 00 34 be 80 97 46 a2 | ikev2 g^x f2 cd e6 d7 21 ff f7 0a 95 ea 80 3d 17 5e e5 f1 | ikev2 g^x 89 b6 3a 1b 19 7c 6d e2 e2 ac e0 e8 87 47 58 ca | ikev2 g^x a8 a9 57 8a 48 7a 5e 0e 07 ed 18 d0 02 cd 41 6c | ikev2 g^x 99 f9 79 7c 54 75 6a 80 aa be 2c 8d 68 e7 ab 46 | ikev2 g^x 5f fa db 7a 00 15 1c 42 38 2a 95 67 34 d0 40 37 | ikev2 g^x 9e 59 6e ca ce 71 f9 73 95 33 d2 33 24 16 10 d6 | ikev2 g^x 96 f4 6d 66 ce ae 39 a5 a8 ba 67 7b 0b a7 ec 5c | ikev2 g^x a5 f0 ea d0 7f ca a2 d9 1f b6 4d c8 4d 24 52 7e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 34 e1 23 83 89 3a 65 73 17 62 dd 52 41 3d 56 39 | IKEv2 nonce 99 39 6a 46 38 cd 4e b8 6d 94 84 4d ae 2e 5a 38 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 43 c3 80 a5 94 99 7d 4c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ef | natd_hash: port= 01 f4 | natd_hash: hash= c7 f8 fd 21 17 cf ca 15 a9 8c 89 3d e7 2c 90 ae | natd_hash: hash= 74 d6 49 28 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c7 f8 fd 21 17 cf ca 15 a9 8c 89 3d e7 2c 90 ae | Notify data 74 d6 49 28 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 43 c3 80 a5 94 99 7d 4c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a9 e3 cd d3 57 ef 23 72 b9 af 19 fe 36 9b 4d 39 | natd_hash: hash= 12 5f e6 9a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a9 e3 cd d3 57 ef 23 72 b9 af 19 fe 36 9b 4d 39 | Notify data 12 5f e6 9a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #753 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #753 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #753 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #753: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #753 to 4294967295 after switching state | Message ID: IKE #753 skipping update_recv as MD is fake | Message ID: sent #753 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-239" #753: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.239:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #753) | 43 c3 80 a5 94 99 7d 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 27 47 4f 05 d7 25 44 75 00 7a 90 57 67 26 e6 | 4d 97 9a 3a 60 21 e1 3d 90 71 67 27 3f 0b 49 6f | 1f b9 14 a1 8d 44 a6 76 24 f5 5a 9b 38 e3 12 49 | 11 3f dc 63 03 09 74 e9 a3 fd bb ce e7 70 f7 c2 | 6f 48 fd aa a3 1f e4 78 8b 40 4d df 11 7a 5a 41 | 45 11 21 74 d6 a5 c3 8b e5 8d 1b 68 d2 3a 6c e4 | 4f c3 5b 65 f5 0b 4f 3e 67 74 c2 72 3e 15 1b 5a | 2f b9 67 d7 f7 97 99 68 80 00 34 be 80 97 46 a2 | f2 cd e6 d7 21 ff f7 0a 95 ea 80 3d 17 5e e5 f1 | 89 b6 3a 1b 19 7c 6d e2 e2 ac e0 e8 87 47 58 ca | a8 a9 57 8a 48 7a 5e 0e 07 ed 18 d0 02 cd 41 6c | 99 f9 79 7c 54 75 6a 80 aa be 2c 8d 68 e7 ab 46 | 5f fa db 7a 00 15 1c 42 38 2a 95 67 34 d0 40 37 | 9e 59 6e ca ce 71 f9 73 95 33 d2 33 24 16 10 d6 | 96 f4 6d 66 ce ae 39 a5 a8 ba 67 7b 0b a7 ec 5c | a5 f0 ea d0 7f ca a2 d9 1f b6 4d c8 4d 24 52 7e | 29 00 00 24 34 e1 23 83 89 3a 65 73 17 62 dd 52 | 41 3d 56 39 99 39 6a 46 38 cd 4e b8 6d 94 84 4d | ae 2e 5a 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 f8 fd 21 17 cf ca 15 a9 8c 89 3d | e7 2c 90 ae 74 d6 49 28 00 00 00 1c 00 00 40 05 | a9 e3 cd d3 57 ef 23 72 b9 af 19 fe 36 9b 4d 39 | 12 5f e6 9a | state #753 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3680300e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0bf00 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #753 | libevent_malloc: new ptr-libevent@0x7fb3840899b0 size 128 | #753 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.216909 | resume sending helper answer for #753 suppresed complete_v2_state_transition() and stole MD | #753 spent 0.28 milliseconds in resume sending helper answer | stop processing: state #753 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3580843d0 | processing resume sending helper answer for #705 | start processing: state #705 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 705 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #705 | **emit ISAKMP Message: | initiator cookie: | e4 ea d6 a0 2f c9 a3 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-219 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 73 7c c8 42 8f 06 18 fc 5b 92 d1 29 9a b8 7e 41 | ikev2 g^x f6 a4 31 12 5b 26 92 fd 9f 47 11 64 9e 6f f4 e4 | ikev2 g^x 12 64 a9 5e 66 b6 e1 58 06 5c 6e a4 d8 cd a0 77 | ikev2 g^x d4 f2 75 d0 15 29 94 5e 44 f7 e6 25 17 2d ce d5 | ikev2 g^x b2 ac 28 52 ff 01 37 57 30 3e 89 ab 0b 8f b9 8c | ikev2 g^x 99 a4 b8 00 95 ca 4d be f0 0c 6f e9 1e 6b 01 06 | ikev2 g^x 85 ec 86 52 05 73 ad be b1 77 31 d9 4f 2a bd d2 | ikev2 g^x cb 65 32 9b 1d 91 2b 57 c3 a3 74 9f d6 0f df 80 | ikev2 g^x 71 49 8c 6a 29 4d 67 17 1a 96 61 69 5f ee 1a 4e | ikev2 g^x be 5e a4 e5 77 ac 19 89 87 3e 45 49 18 e7 4c fb | ikev2 g^x bd 46 d7 d5 ca 9c b5 11 06 64 b4 70 c8 30 4d 79 | ikev2 g^x a1 73 5b 2b 6c be 9e 44 fe 0f 31 6c 40 a6 5b 7c | ikev2 g^x f7 75 57 62 c5 d6 88 57 3b 7c e0 26 3f e9 11 e8 | ikev2 g^x e0 a2 3f 0b 6b c6 59 22 42 04 11 16 76 9d a3 7b | ikev2 g^x 56 7a 4e 9e 2e fe 0a a4 c4 36 99 d2 a5 5b 55 6a | ikev2 g^x 02 f9 54 cd b4 25 1d 90 44 15 dc 73 12 b3 5f ee | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2d 29 13 9f c9 17 1e e2 ce e9 19 17 61 b2 63 4d | IKEv2 nonce db 33 56 ec 2e 67 9b a1 ab af 70 d6 30 e4 5f 08 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e4 ea d6 a0 2f c9 a3 34 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 db | natd_hash: port= 01 f4 | natd_hash: hash= 89 a0 7e 4b fe 45 8e e8 50 f5 c0 09 02 48 60 69 | natd_hash: hash= 27 23 d3 25 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 89 a0 7e 4b fe 45 8e e8 50 f5 c0 09 02 48 60 69 | Notify data 27 23 d3 25 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e4 ea d6 a0 2f c9 a3 34 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9f 1d 84 c9 70 7f e4 45 24 70 e4 75 c6 bd 55 ca | natd_hash: hash= 26 ec 6e a8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9f 1d 84 c9 70 7f e4 45 24 70 e4 75 c6 bd 55 ca | Notify data 26 ec 6e a8 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #705 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #705 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #705 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #705: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #705 to 4294967295 after switching state | Message ID: IKE #705 skipping update_recv as MD is fake | Message ID: sent #705 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-219" #705: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.219:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #705) | e4 ea d6 a0 2f c9 a3 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 7c c8 42 8f 06 18 fc 5b 92 d1 29 9a b8 7e 41 | f6 a4 31 12 5b 26 92 fd 9f 47 11 64 9e 6f f4 e4 | 12 64 a9 5e 66 b6 e1 58 06 5c 6e a4 d8 cd a0 77 | d4 f2 75 d0 15 29 94 5e 44 f7 e6 25 17 2d ce d5 | b2 ac 28 52 ff 01 37 57 30 3e 89 ab 0b 8f b9 8c | 99 a4 b8 00 95 ca 4d be f0 0c 6f e9 1e 6b 01 06 | 85 ec 86 52 05 73 ad be b1 77 31 d9 4f 2a bd d2 | cb 65 32 9b 1d 91 2b 57 c3 a3 74 9f d6 0f df 80 | 71 49 8c 6a 29 4d 67 17 1a 96 61 69 5f ee 1a 4e | be 5e a4 e5 77 ac 19 89 87 3e 45 49 18 e7 4c fb | bd 46 d7 d5 ca 9c b5 11 06 64 b4 70 c8 30 4d 79 | a1 73 5b 2b 6c be 9e 44 fe 0f 31 6c 40 a6 5b 7c | f7 75 57 62 c5 d6 88 57 3b 7c e0 26 3f e9 11 e8 | e0 a2 3f 0b 6b c6 59 22 42 04 11 16 76 9d a3 7b | 56 7a 4e 9e 2e fe 0a a4 c4 36 99 d2 a5 5b 55 6a | 02 f9 54 cd b4 25 1d 90 44 15 dc 73 12 b3 5f ee | 29 00 00 24 2d 29 13 9f c9 17 1e e2 ce e9 19 17 | 61 b2 63 4d db 33 56 ec 2e 67 9b a1 ab af 70 d6 | 30 e4 5f 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 89 a0 7e 4b fe 45 8e e8 50 f5 c0 09 | 02 48 60 69 27 23 d3 25 00 00 00 1c 00 00 40 05 | 9f 1d 84 c9 70 7f e4 45 24 70 e4 75 c6 bd 55 ca | 26 ec 6e a8 | state #705 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34403a3d0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b1c440 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c440 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #705 | libevent_malloc: new ptr-libevent@0x7fb3580843d0 size 128 | #705 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.217231 | resume sending helper answer for #705 suppresed complete_v2_state_transition() and stole MD | #705 spent 0.3 milliseconds in resume sending helper answer | stop processing: state #705 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb340071b90 | processing resume sending helper answer for #754 | start processing: state #754 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 754 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #754 | **emit ISAKMP Message: | initiator cookie: | ba fc 0a 40 dd 57 2f 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-250 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 22 dc 3f 52 f7 90 e6 aa 55 28 27 9f 26 90 49 c5 | ikev2 g^x 4e 63 af 84 9c 24 2a 54 88 16 03 62 61 85 f0 75 | ikev2 g^x 96 ac b9 67 9b 1f a3 76 a2 7d d7 2a c2 0d b0 20 | ikev2 g^x 4c 76 ab 99 46 09 ae ba c5 a3 18 d9 2f 6b 75 6f | ikev2 g^x 8c 85 4a 61 60 92 93 9a 69 73 74 b4 71 5f 61 5f | ikev2 g^x 49 20 71 ee 13 df 74 12 52 f5 f7 6e e5 b6 47 13 | ikev2 g^x 81 a6 fd 04 c1 cb 97 6e a6 05 89 f7 1c c8 36 4f | ikev2 g^x 3b 16 b8 6b 1f f4 41 b6 2e 95 ff 58 91 d8 05 7b | ikev2 g^x 75 dd bd f6 54 1d 51 67 0b f9 12 22 e3 6a 7e fe | ikev2 g^x 83 e1 9b fb a2 25 c3 ac 81 7f d9 4f 94 b0 53 63 | ikev2 g^x 18 d5 76 25 b0 fb c2 e8 de d9 06 a6 92 1b 1a 4d | ikev2 g^x b2 14 44 77 4e 1a c6 51 54 6d 23 8f 6a 2b 6f aa | ikev2 g^x d9 e4 ba 5e 32 24 b4 f3 63 3f 1b 0f 79 02 db e4 | ikev2 g^x d2 10 63 1b 77 54 88 79 1a c9 10 a1 5b a8 e0 e0 | ikev2 g^x 2d a9 8a 89 9d 56 82 83 99 43 e6 10 16 f8 bb be | ikev2 g^x 4b 7e 7f d3 79 9f 54 df a5 06 38 28 00 85 76 c9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8f 59 38 2a dd e3 49 a5 d1 b0 e1 2b d5 a2 3b 56 | IKEv2 nonce cd 53 01 3b e1 33 30 4f 0c 29 77 15 19 47 ad 54 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ba fc 0a 40 dd 57 2f 49 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 fa | natd_hash: port= 01 f4 | natd_hash: hash= 45 85 ee 2b ce cb d2 9a af d5 06 f1 d4 8a 29 3f | natd_hash: hash= c9 5e e4 58 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 45 85 ee 2b ce cb d2 9a af d5 06 f1 d4 8a 29 3f | Notify data c9 5e e4 58 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ba fc 0a 40 dd 57 2f 49 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 7f 6d 1a 4d 19 0a 8b 4a ad 47 7e e6 0e aa 08 53 | natd_hash: hash= cf fd 3e 04 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7f 6d 1a 4d 19 0a 8b 4a ad 47 7e e6 0e aa 08 53 | Notify data cf fd 3e 04 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #754 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #754 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #754 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #754: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #754 to 4294967295 after switching state | Message ID: IKE #754 skipping update_recv as MD is fake | Message ID: sent #754 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-250" #754: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.250:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #754) | ba fc 0a 40 dd 57 2f 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 dc 3f 52 f7 90 e6 aa 55 28 27 9f 26 90 49 c5 | 4e 63 af 84 9c 24 2a 54 88 16 03 62 61 85 f0 75 | 96 ac b9 67 9b 1f a3 76 a2 7d d7 2a c2 0d b0 20 | 4c 76 ab 99 46 09 ae ba c5 a3 18 d9 2f 6b 75 6f | 8c 85 4a 61 60 92 93 9a 69 73 74 b4 71 5f 61 5f | 49 20 71 ee 13 df 74 12 52 f5 f7 6e e5 b6 47 13 | 81 a6 fd 04 c1 cb 97 6e a6 05 89 f7 1c c8 36 4f | 3b 16 b8 6b 1f f4 41 b6 2e 95 ff 58 91 d8 05 7b | 75 dd bd f6 54 1d 51 67 0b f9 12 22 e3 6a 7e fe | 83 e1 9b fb a2 25 c3 ac 81 7f d9 4f 94 b0 53 63 | 18 d5 76 25 b0 fb c2 e8 de d9 06 a6 92 1b 1a 4d | b2 14 44 77 4e 1a c6 51 54 6d 23 8f 6a 2b 6f aa | d9 e4 ba 5e 32 24 b4 f3 63 3f 1b 0f 79 02 db e4 | d2 10 63 1b 77 54 88 79 1a c9 10 a1 5b a8 e0 e0 | 2d a9 8a 89 9d 56 82 83 99 43 e6 10 16 f8 bb be | 4b 7e 7f d3 79 9f 54 df a5 06 38 28 00 85 76 c9 | 29 00 00 24 8f 59 38 2a dd e3 49 a5 d1 b0 e1 2b | d5 a2 3b 56 cd 53 01 3b e1 33 30 4f 0c 29 77 15 | 19 47 ad 54 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 85 ee 2b ce cb d2 9a af d5 06 f1 | d4 8a 29 3f c9 5e e4 58 00 00 00 1c 00 00 40 05 | 7f 6d 1a 4d 19 0a 8b 4a ad 47 7e e6 0e aa 08 53 | cf fd 3e 04 | state #754 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb350023d80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb350017ea0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #754 | libevent_malloc: new ptr-libevent@0x7fb340071b90 size 128 | #754 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.21753 | resume sending helper answer for #754 suppresed complete_v2_state_transition() and stole MD | #754 spent 0.279 milliseconds in resume sending helper answer | stop processing: state #754 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3640ac040 | processing resume sending helper answer for #756 | start processing: state #756 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 756 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #756 | **emit ISAKMP Message: | initiator cookie: | ab b5 91 0b be 67 d7 85 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-249 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 76 d0 0b f2 10 30 f6 71 1f 52 95 5b e8 84 71 d8 | ikev2 g^x b6 b3 10 4f b8 55 03 27 62 11 e2 42 15 c0 2e 29 | ikev2 g^x af 7e 73 a6 41 c3 b1 35 90 96 0e 47 d0 76 07 a9 | ikev2 g^x 2b cb 96 02 37 a3 ad 49 a7 3f 01 e5 75 c6 65 12 | ikev2 g^x 57 6e 8d 37 95 0a 16 59 b9 51 41 ba 40 c3 b9 65 | ikev2 g^x 2a 6f f8 33 e2 59 37 70 46 6d 6b 62 cb b6 f2 1e | ikev2 g^x c1 f4 5c 3f f2 8a 2e 11 d3 d5 38 3b 01 cd ba 1e | ikev2 g^x 36 d0 b1 59 ee 21 ba 67 dc 67 7f ac 18 5d ee 64 | ikev2 g^x df 96 2d b0 3b 2f 42 82 e4 47 da e6 c6 85 9c 6a | ikev2 g^x 6e b9 1c 9f de fc 80 2c 8f a9 d1 a8 95 91 00 d2 | ikev2 g^x 9c 44 d3 94 50 87 14 71 86 2d f2 72 6d b8 e3 23 | ikev2 g^x e7 7f e6 3d 7f 22 68 1c b4 f2 79 c8 40 1e 0d ff | ikev2 g^x 0d f9 a8 b4 e4 e9 a4 8d 37 24 73 7b 55 05 6d 7d | ikev2 g^x b4 29 f9 e5 9a b6 d0 4f 47 2d e7 59 1c d4 96 2d | ikev2 g^x 12 ee 9c 8f dd f2 7b ff 88 08 ab 64 b4 ba 21 15 | ikev2 g^x 53 99 9f e0 75 15 e2 71 70 09 49 52 bf ef 18 8c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f2 16 4e f4 49 9c 51 e5 b1 12 94 4d 27 c5 37 4d | IKEv2 nonce 3a 23 1c 11 e4 13 5f 53 31 01 4a 86 80 54 c9 a0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ab b5 91 0b be 67 d7 85 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f9 | natd_hash: port= 01 f4 | natd_hash: hash= 74 ca 45 b8 db a1 b9 58 c3 06 7b b3 ca d9 2a 0e | natd_hash: hash= 01 f5 5c 0a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 74 ca 45 b8 db a1 b9 58 c3 06 7b b3 ca d9 2a 0e | Notify data 01 f5 5c 0a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ab b5 91 0b be 67 d7 85 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= b1 fa be f6 27 73 b2 ce c8 1e 50 4f c1 a6 7d 93 | natd_hash: hash= f4 9a a8 7c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b1 fa be f6 27 73 b2 ce c8 1e 50 4f c1 a6 7d 93 | Notify data f4 9a a8 7c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #756 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #756 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #756 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #756: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #756 to 4294967295 after switching state | Message ID: IKE #756 skipping update_recv as MD is fake | Message ID: sent #756 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-249" #756: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.249:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #756) | ab b5 91 0b be 67 d7 85 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 d0 0b f2 10 30 f6 71 1f 52 95 5b e8 84 71 d8 | b6 b3 10 4f b8 55 03 27 62 11 e2 42 15 c0 2e 29 | af 7e 73 a6 41 c3 b1 35 90 96 0e 47 d0 76 07 a9 | 2b cb 96 02 37 a3 ad 49 a7 3f 01 e5 75 c6 65 12 | 57 6e 8d 37 95 0a 16 59 b9 51 41 ba 40 c3 b9 65 | 2a 6f f8 33 e2 59 37 70 46 6d 6b 62 cb b6 f2 1e | c1 f4 5c 3f f2 8a 2e 11 d3 d5 38 3b 01 cd ba 1e | 36 d0 b1 59 ee 21 ba 67 dc 67 7f ac 18 5d ee 64 | df 96 2d b0 3b 2f 42 82 e4 47 da e6 c6 85 9c 6a | 6e b9 1c 9f de fc 80 2c 8f a9 d1 a8 95 91 00 d2 | 9c 44 d3 94 50 87 14 71 86 2d f2 72 6d b8 e3 23 | e7 7f e6 3d 7f 22 68 1c b4 f2 79 c8 40 1e 0d ff | 0d f9 a8 b4 e4 e9 a4 8d 37 24 73 7b 55 05 6d 7d | b4 29 f9 e5 9a b6 d0 4f 47 2d e7 59 1c d4 96 2d | 12 ee 9c 8f dd f2 7b ff 88 08 ab 64 b4 ba 21 15 | 53 99 9f e0 75 15 e2 71 70 09 49 52 bf ef 18 8c | 29 00 00 24 f2 16 4e f4 49 9c 51 e5 b1 12 94 4d | 27 c5 37 4d 3a 23 1c 11 e4 13 5f 53 31 01 4a 86 | 80 54 c9 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 ca 45 b8 db a1 b9 58 c3 06 7b b3 | ca d9 2a 0e 01 f5 5c 0a 00 00 00 1c 00 00 40 05 | b1 fa be f6 27 73 b2 ce c8 1e 50 4f c1 a6 7d 93 | f4 9a a8 7c | state #756 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3580407f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46adc640 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adc640 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #756 | libevent_malloc: new ptr-libevent@0x7fb3640ac040 size 128 | #756 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.217824 | resume sending helper answer for #756 suppresed complete_v2_state_transition() and stole MD | #756 spent 0.277 milliseconds in resume sending helper answer | stop processing: state #756 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c0933d0 | processing resume sending helper answer for #747 | start processing: state #747 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 747 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #747 | **emit ISAKMP Message: | initiator cookie: | a6 bf d2 f8 ac 64 24 19 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-248 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9a 1f 62 98 e1 72 89 4a 9e 5e 9d f8 09 50 e0 d2 | ikev2 g^x 9c 18 ca 9e 95 27 4b 63 4a 5a 0f ea 35 ee 0f 6e | ikev2 g^x 09 6d 2d ee e2 2e 30 c8 5c e6 23 10 bb dd 92 c4 | ikev2 g^x a1 94 38 18 f7 1a bb b7 fe 7a 6c 77 66 08 c9 a3 | ikev2 g^x d7 20 9b 83 e3 5e fd c7 c5 b8 d7 cb db 7b 13 a8 | ikev2 g^x e4 16 a2 a7 f8 77 c7 96 cb c4 f8 c4 e8 5e bc b6 | ikev2 g^x 11 12 e0 0a e1 e2 98 ca 3c d6 c9 36 5d 1b 6d d8 | ikev2 g^x ff 68 5a 03 20 ef cc 43 d1 3a 80 e8 6b ca bf 39 | ikev2 g^x 66 da f5 51 9f dd 65 c6 1b 01 2d cd e7 68 f6 a3 | ikev2 g^x fc e3 5a 6a e7 8a 74 f2 c5 47 be 6f cb b2 de 7b | ikev2 g^x 5c ef 73 4e 74 52 3d 7e 7d 97 04 e7 a1 bc 8c 22 | ikev2 g^x 0b 61 ff ba 39 29 86 ab 04 59 61 fd e9 7a 43 97 | ikev2 g^x a9 8d dc 37 09 a9 62 1f 96 7a 92 bc 5d 63 69 61 | ikev2 g^x 33 36 28 54 06 b6 87 43 c9 0d 56 0e 50 ad e6 24 | ikev2 g^x b5 8c cd 7b ea 80 41 db a4 b3 86 9b c4 b0 37 e4 | ikev2 g^x a5 6b ef 42 4a f6 29 75 47 2b 95 cd de 0e 06 20 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 72 d2 2d f3 46 d8 fb e8 18 14 33 bc 59 89 85 ec | IKEv2 nonce f1 52 25 c8 16 b1 28 1b 77 62 97 7d df 82 b5 5e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a6 bf d2 f8 ac 64 24 19 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f8 | natd_hash: port= 01 f4 | natd_hash: hash= e9 63 d7 f3 34 77 99 12 4c 20 15 9c 7c fd ab a4 | natd_hash: hash= f7 0f 03 52 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e9 63 d7 f3 34 77 99 12 4c 20 15 9c 7c fd ab a4 | Notify data f7 0f 03 52 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a6 bf d2 f8 ac 64 24 19 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= bd ec 71 30 dd 4a a7 e6 ea 65 3f b5 e2 da 2c 35 | natd_hash: hash= bf 9d 55 db | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bd ec 71 30 dd 4a a7 e6 ea 65 3f b5 e2 da 2c 35 | Notify data bf 9d 55 db | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #747 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #747 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #747 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #747: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #747 to 4294967295 after switching state | Message ID: IKE #747 skipping update_recv as MD is fake | Message ID: sent #747 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-248" #747: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.248:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #747) | a6 bf d2 f8 ac 64 24 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a 1f 62 98 e1 72 89 4a 9e 5e 9d f8 09 50 e0 d2 | 9c 18 ca 9e 95 27 4b 63 4a 5a 0f ea 35 ee 0f 6e | 09 6d 2d ee e2 2e 30 c8 5c e6 23 10 bb dd 92 c4 | a1 94 38 18 f7 1a bb b7 fe 7a 6c 77 66 08 c9 a3 | d7 20 9b 83 e3 5e fd c7 c5 b8 d7 cb db 7b 13 a8 | e4 16 a2 a7 f8 77 c7 96 cb c4 f8 c4 e8 5e bc b6 | 11 12 e0 0a e1 e2 98 ca 3c d6 c9 36 5d 1b 6d d8 | ff 68 5a 03 20 ef cc 43 d1 3a 80 e8 6b ca bf 39 | 66 da f5 51 9f dd 65 c6 1b 01 2d cd e7 68 f6 a3 | fc e3 5a 6a e7 8a 74 f2 c5 47 be 6f cb b2 de 7b | 5c ef 73 4e 74 52 3d 7e 7d 97 04 e7 a1 bc 8c 22 | 0b 61 ff ba 39 29 86 ab 04 59 61 fd e9 7a 43 97 | a9 8d dc 37 09 a9 62 1f 96 7a 92 bc 5d 63 69 61 | 33 36 28 54 06 b6 87 43 c9 0d 56 0e 50 ad e6 24 | b5 8c cd 7b ea 80 41 db a4 b3 86 9b c4 b0 37 e4 | a5 6b ef 42 4a f6 29 75 47 2b 95 cd de 0e 06 20 | 29 00 00 24 72 d2 2d f3 46 d8 fb e8 18 14 33 bc | 59 89 85 ec f1 52 25 c8 16 b1 28 1b 77 62 97 7d | df 82 b5 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 63 d7 f3 34 77 99 12 4c 20 15 9c | 7c fd ab a4 f7 0f 03 52 00 00 00 1c 00 00 40 05 | bd ec 71 30 dd 4a a7 e6 ea 65 3f b5 e2 da 2c 35 | bf 9d 55 db | state #747 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34401d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7cf10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #747 | libevent_malloc: new ptr-libevent@0x7fb36c0933d0 size 128 | #747 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.218158 | resume sending helper answer for #747 suppresed complete_v2_state_transition() and stole MD | #747 spent 0.309 milliseconds in resume sending helper answer | stop processing: state #747 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c074c00 | processing resume sending helper answer for #723 | start processing: state #723 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 723 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #723 | **emit ISAKMP Message: | initiator cookie: | 36 da f7 c5 2f 91 5f 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-155 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 40 26 74 72 fd 9e 9c 10 9c aa ba 2e c0 be be 66 | ikev2 g^x 22 9f 1a 62 8a 9f e6 3f e7 37 3b 1b 58 bb b4 f4 | ikev2 g^x a7 74 cc f5 37 05 fb 5b 1c ba 9d 27 55 34 43 f1 | ikev2 g^x 74 ee 17 2f 42 15 bc 36 96 52 c7 49 68 f2 24 68 | ikev2 g^x 76 d0 e6 45 0e e2 22 75 60 cd ee fd b6 75 20 09 | ikev2 g^x 00 ba 11 5f cb d5 aa dc 11 39 da 45 40 b7 a5 19 | ikev2 g^x c8 d5 2f 89 aa 7e 26 c1 13 b3 e0 94 56 31 ee 6c | ikev2 g^x 7c ec 62 9f 9b b7 d8 bb 9c 47 40 55 ef 32 b3 53 | ikev2 g^x 6c 79 f6 28 33 7a 17 48 72 6f e2 3a 5f f4 48 35 | ikev2 g^x 73 a1 7e b6 79 10 98 c6 44 1b aa ea e8 c1 36 b9 | ikev2 g^x f7 bf 2c ce b0 d0 2c 48 3b cd 2b 55 90 e1 5d 20 | ikev2 g^x f5 96 29 1e ab 81 03 61 9c 1f 05 2b 89 67 64 02 | ikev2 g^x 4e 7c e5 42 a2 f9 61 f6 dc bf 78 f8 b1 ca 56 69 | ikev2 g^x f3 d1 e1 49 87 d2 fb ee 1f 6c 89 a1 b4 e9 5e bd | ikev2 g^x 34 56 05 81 f0 52 8f f2 fb fe 6c 2c 13 77 1c 0f | ikev2 g^x a7 6d fb a5 f4 8e 00 1f f3 70 1f a1 8a 77 8f 5d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6b 53 2d ae 51 68 5a 25 06 10 41 a9 74 bc e4 28 | IKEv2 nonce 01 83 dc b1 fe c7 47 aa 45 92 94 cc 73 9f ae 08 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 36 da f7 c5 2f 91 5f 13 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9b | natd_hash: port= 01 f4 | natd_hash: hash= e6 9b ca 13 30 40 c0 94 4a 3a 13 b5 19 3a 19 0b | natd_hash: hash= be 4d 6e 5e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e6 9b ca 13 30 40 c0 94 4a 3a 13 b5 19 3a 19 0b | Notify data be 4d 6e 5e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 36 da f7 c5 2f 91 5f 13 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= fd 4f 80 57 98 34 ce 28 4d 1c 78 e4 ce 99 f3 3e | natd_hash: hash= f2 93 74 b1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fd 4f 80 57 98 34 ce 28 4d 1c 78 e4 ce 99 f3 3e | Notify data f2 93 74 b1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #723 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #723 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #723 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #723: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #723 to 4294967295 after switching state | Message ID: IKE #723 skipping update_recv as MD is fake | Message ID: sent #723 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-155" #723: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.155:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #723) | 36 da f7 c5 2f 91 5f 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 26 74 72 fd 9e 9c 10 9c aa ba 2e c0 be be 66 | 22 9f 1a 62 8a 9f e6 3f e7 37 3b 1b 58 bb b4 f4 | a7 74 cc f5 37 05 fb 5b 1c ba 9d 27 55 34 43 f1 | 74 ee 17 2f 42 15 bc 36 96 52 c7 49 68 f2 24 68 | 76 d0 e6 45 0e e2 22 75 60 cd ee fd b6 75 20 09 | 00 ba 11 5f cb d5 aa dc 11 39 da 45 40 b7 a5 19 | c8 d5 2f 89 aa 7e 26 c1 13 b3 e0 94 56 31 ee 6c | 7c ec 62 9f 9b b7 d8 bb 9c 47 40 55 ef 32 b3 53 | 6c 79 f6 28 33 7a 17 48 72 6f e2 3a 5f f4 48 35 | 73 a1 7e b6 79 10 98 c6 44 1b aa ea e8 c1 36 b9 | f7 bf 2c ce b0 d0 2c 48 3b cd 2b 55 90 e1 5d 20 | f5 96 29 1e ab 81 03 61 9c 1f 05 2b 89 67 64 02 | 4e 7c e5 42 a2 f9 61 f6 dc bf 78 f8 b1 ca 56 69 | f3 d1 e1 49 87 d2 fb ee 1f 6c 89 a1 b4 e9 5e bd | 34 56 05 81 f0 52 8f f2 fb fe 6c 2c 13 77 1c 0f | a7 6d fb a5 f4 8e 00 1f f3 70 1f a1 8a 77 8f 5d | 29 00 00 24 6b 53 2d ae 51 68 5a 25 06 10 41 a9 | 74 bc e4 28 01 83 dc b1 fe c7 47 aa 45 92 94 cc | 73 9f ae 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 9b ca 13 30 40 c0 94 4a 3a 13 b5 | 19 3a 19 0b be 4d 6e 5e 00 00 00 1c 00 00 40 05 | fd 4f 80 57 98 34 ce 28 4d 1c 78 e4 ce 99 f3 3e | f2 93 74 b1 | state #723 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c01d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a47f10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #723 | libevent_malloc: new ptr-libevent@0x7fb34c074c00 size 128 | #723 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.218454 | resume sending helper answer for #723 suppresed complete_v2_state_transition() and stole MD | #723 spent 0.277 milliseconds in resume sending helper answer | stop processing: state #723 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb380093250 | processing resume sending helper answer for #748 | start processing: state #748 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 748 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #748 | **emit ISAKMP Message: | initiator cookie: | 55 e3 5f af 64 96 c1 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-213 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0d 49 74 0b 85 d8 7e 22 f4 24 c6 c4 1e 33 2b 72 | ikev2 g^x de 21 d5 d8 32 fa 23 15 bc cf cc 93 06 5f 8f 3d | ikev2 g^x 33 17 cb d5 a3 91 ea a4 08 ea 77 c4 ba 4f b2 c8 | ikev2 g^x 77 bd 77 0a 64 bf c5 2e 63 22 69 74 77 90 c3 c0 | ikev2 g^x 7a 1b e6 e3 83 ec f7 b8 33 a0 30 ad 02 6a 84 e6 | ikev2 g^x 8e 7d 03 00 5b 0a 7e 62 09 5c 74 87 75 30 51 f1 | ikev2 g^x 91 ec f5 7e 8c 61 42 33 40 a2 94 e7 01 8f e2 79 | ikev2 g^x 76 aa 01 17 97 36 fd 8f 9e ae fe 3a e2 ba f3 af | ikev2 g^x 94 c5 f1 a9 e6 63 f6 f6 a1 03 7a 65 00 af 54 11 | ikev2 g^x e5 00 90 3d 36 87 b9 d1 e9 b5 0a ae ab dc ad a9 | ikev2 g^x 87 ae db d2 e4 c6 98 b6 7b 34 1d a2 a1 16 a3 c1 | ikev2 g^x 3d 22 9f bf 31 7c 8e 58 98 5c 80 18 f1 bc 29 9b | ikev2 g^x ab 82 89 c0 f7 55 bb a7 65 83 55 92 1e 57 97 a9 | ikev2 g^x dd af 8b bb b0 b4 5a 7b 30 5e b0 29 47 2d 2b 9e | ikev2 g^x 77 6a 4a 54 93 5f 70 12 2d 60 4f 4a 49 09 0e 01 | ikev2 g^x 86 63 18 ee 62 60 24 64 c2 a1 ed 84 95 08 03 88 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 01 dc 8e e5 8a ed 55 ae fd 55 02 d3 da e9 1f 52 | IKEv2 nonce 6e 45 d8 c4 f0 34 cf 2c 20 9a e2 e3 81 59 db b2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 55 e3 5f af 64 96 c1 8b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d5 | natd_hash: port= 01 f4 | natd_hash: hash= 80 15 26 72 3e 77 b9 07 bc 5d 56 07 da e3 bb 84 | natd_hash: hash= 01 39 7d 04 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 80 15 26 72 3e 77 b9 07 bc 5d 56 07 da e3 bb 84 | Notify data 01 39 7d 04 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 55 e3 5f af 64 96 c1 8b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ed b0 75 8e 7f b8 61 e6 fe 70 60 49 2f cb 06 74 | natd_hash: hash= 34 38 55 35 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ed b0 75 8e 7f b8 61 e6 fe 70 60 49 2f cb 06 74 | Notify data 34 38 55 35 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #748 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #748 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #748 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #748: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #748 to 4294967295 after switching state | Message ID: IKE #748 skipping update_recv as MD is fake | Message ID: sent #748 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-213" #748: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.213:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #748) | 55 e3 5f af 64 96 c1 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 49 74 0b 85 d8 7e 22 f4 24 c6 c4 1e 33 2b 72 | de 21 d5 d8 32 fa 23 15 bc cf cc 93 06 5f 8f 3d | 33 17 cb d5 a3 91 ea a4 08 ea 77 c4 ba 4f b2 c8 | 77 bd 77 0a 64 bf c5 2e 63 22 69 74 77 90 c3 c0 | 7a 1b e6 e3 83 ec f7 b8 33 a0 30 ad 02 6a 84 e6 | 8e 7d 03 00 5b 0a 7e 62 09 5c 74 87 75 30 51 f1 | 91 ec f5 7e 8c 61 42 33 40 a2 94 e7 01 8f e2 79 | 76 aa 01 17 97 36 fd 8f 9e ae fe 3a e2 ba f3 af | 94 c5 f1 a9 e6 63 f6 f6 a1 03 7a 65 00 af 54 11 | e5 00 90 3d 36 87 b9 d1 e9 b5 0a ae ab dc ad a9 | 87 ae db d2 e4 c6 98 b6 7b 34 1d a2 a1 16 a3 c1 | 3d 22 9f bf 31 7c 8e 58 98 5c 80 18 f1 bc 29 9b | ab 82 89 c0 f7 55 bb a7 65 83 55 92 1e 57 97 a9 | dd af 8b bb b0 b4 5a 7b 30 5e b0 29 47 2d 2b 9e | 77 6a 4a 54 93 5f 70 12 2d 60 4f 4a 49 09 0e 01 | 86 63 18 ee 62 60 24 64 c2 a1 ed 84 95 08 03 88 | 29 00 00 24 01 dc 8e e5 8a ed 55 ae fd 55 02 d3 | da e9 1f 52 6e 45 d8 c4 f0 34 cf 2c 20 9a e2 e3 | 81 59 db b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 15 26 72 3e 77 b9 07 bc 5d 56 07 | da e3 bb 84 01 39 7d 04 00 00 00 1c 00 00 40 05 | ed b0 75 8e 7f b8 61 e6 fe 70 60 49 2f cb 06 74 | 34 38 55 35 | state #748 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3380180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a61bd0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #748 | libevent_malloc: new ptr-libevent@0x7fb380093250 size 128 | #748 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.218749 | resume sending helper answer for #748 suppresed complete_v2_state_transition() and stole MD | #748 spent 0.276 milliseconds in resume sending helper answer | stop processing: state #748 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34407a660 | processing resume sending helper answer for #738 | start processing: state #738 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 738 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #738 | **emit ISAKMP Message: | initiator cookie: | 25 78 f8 28 10 61 9d 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-228 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f6 51 72 b7 05 5e 83 a3 a0 07 12 24 3e 92 83 b8 | ikev2 g^x 62 3a f9 f5 51 87 2b 5b 57 43 01 a4 66 eb 6e d1 | ikev2 g^x 36 fd bc d6 d3 df 99 92 4a 90 d6 55 13 f9 57 37 | ikev2 g^x 57 21 91 58 59 45 7b fa 72 46 a4 36 22 6f 56 d8 | ikev2 g^x b6 6d e1 0f 87 84 b3 2d 12 ce f5 5a 2e d2 8f f7 | ikev2 g^x 2b 01 97 28 81 dc 2a 4f 14 69 dc 31 63 bc a5 23 | ikev2 g^x 42 8f 99 35 ae 7a 8d f1 f8 fc 1d a7 d5 69 74 4b | ikev2 g^x 4e 98 fb 39 77 73 f9 c2 8d 2f 88 65 14 8e 49 62 | ikev2 g^x b0 f1 74 23 17 c0 59 7f 25 06 94 30 cb 35 da 14 | ikev2 g^x 1a 23 e5 07 95 80 6a cb a7 fe d0 d5 8a 1f 10 96 | ikev2 g^x bf ab f1 96 54 c3 82 d2 6e 6d 0c 64 bb 6a 3c 73 | ikev2 g^x 83 0b fd 52 5c d9 5e a3 74 f9 c3 2b 08 19 82 dd | ikev2 g^x c6 8e eb 37 6d 26 f4 d6 e5 ff ff bd 35 5a 0e 11 | ikev2 g^x 00 7d 5a 8c 85 d6 d6 a8 98 8a 86 a2 3a 0b 85 a4 | ikev2 g^x c6 6f 0c 94 ab 7b d2 e2 18 f7 d7 59 10 f4 62 a1 | ikev2 g^x f4 5c 31 8a df 18 a0 2b 20 3b 40 bf 17 df 1d d5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 97 c7 a3 d7 59 e9 31 22 90 b1 59 6b 1f 7e 8d 5c | IKEv2 nonce 35 7a 89 f4 a1 7c 76 7f ab 92 a2 52 c8 bf 0f 92 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 25 78 f8 28 10 61 9d 6a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e4 | natd_hash: port= 01 f4 | natd_hash: hash= b3 91 a4 00 33 c0 fc 8b 25 9b dc 30 06 39 ac a5 | natd_hash: hash= a1 25 3d b9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b3 91 a4 00 33 c0 fc 8b 25 9b dc 30 06 39 ac a5 | Notify data a1 25 3d b9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 25 78 f8 28 10 61 9d 6a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ba 61 e3 c1 d1 2b 93 b6 88 33 74 02 de a9 63 56 | natd_hash: hash= ec 2a 1e 1d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ba 61 e3 c1 d1 2b 93 b6 88 33 74 02 de a9 63 56 | Notify data ec 2a 1e 1d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #738 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #738 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #738 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #738: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #738 to 4294967295 after switching state | Message ID: IKE #738 skipping update_recv as MD is fake | Message ID: sent #738 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-228" #738: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.228:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #738) | 25 78 f8 28 10 61 9d 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 51 72 b7 05 5e 83 a3 a0 07 12 24 3e 92 83 b8 | 62 3a f9 f5 51 87 2b 5b 57 43 01 a4 66 eb 6e d1 | 36 fd bc d6 d3 df 99 92 4a 90 d6 55 13 f9 57 37 | 57 21 91 58 59 45 7b fa 72 46 a4 36 22 6f 56 d8 | b6 6d e1 0f 87 84 b3 2d 12 ce f5 5a 2e d2 8f f7 | 2b 01 97 28 81 dc 2a 4f 14 69 dc 31 63 bc a5 23 | 42 8f 99 35 ae 7a 8d f1 f8 fc 1d a7 d5 69 74 4b | 4e 98 fb 39 77 73 f9 c2 8d 2f 88 65 14 8e 49 62 | b0 f1 74 23 17 c0 59 7f 25 06 94 30 cb 35 da 14 | 1a 23 e5 07 95 80 6a cb a7 fe d0 d5 8a 1f 10 96 | bf ab f1 96 54 c3 82 d2 6e 6d 0c 64 bb 6a 3c 73 | 83 0b fd 52 5c d9 5e a3 74 f9 c3 2b 08 19 82 dd | c6 8e eb 37 6d 26 f4 d6 e5 ff ff bd 35 5a 0e 11 | 00 7d 5a 8c 85 d6 d6 a8 98 8a 86 a2 3a 0b 85 a4 | c6 6f 0c 94 ab 7b d2 e2 18 f7 d7 59 10 f4 62 a1 | f4 5c 31 8a df 18 a0 2b 20 3b 40 bf 17 df 1d d5 | 29 00 00 24 97 c7 a3 d7 59 e9 31 22 90 b1 59 6b | 1f 7e 8d 5c 35 7a 89 f4 a1 7c 76 7f ab 92 a2 52 | c8 bf 0f 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 91 a4 00 33 c0 fc 8b 25 9b dc 30 | 06 39 ac a5 a1 25 3d b9 00 00 00 1c 00 00 40 05 | ba 61 e3 c1 d1 2b 93 b6 88 33 74 02 de a9 63 56 | ec 2a 1e 1d | state #738 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34c00d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #738 | libevent_malloc: new ptr-libevent@0x7fb34407a660 size 128 | #738 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.219132 | resume sending helper answer for #738 suppresed complete_v2_state_transition() and stole MD | #738 spent 0.347 milliseconds in resume sending helper answer | stop processing: state #738 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb374085870 | processing resume sending helper answer for #722 | start processing: state #722 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 722 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #722 | **emit ISAKMP Message: | initiator cookie: | aa d5 b7 9d 2c 2d ce cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-179 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e4 b1 9e af cf 96 c4 1f a9 84 c9 1e fe 0d 23 0e | ikev2 g^x 53 41 ad 54 73 4d e4 38 06 61 64 5a 7e 50 5d 4b | ikev2 g^x 7b 88 a3 16 c2 7a 44 91 ab 9a ef aa fd 30 6e 1a | ikev2 g^x 1d d2 33 a7 46 ad ce 2a 23 40 98 78 51 d0 bd 75 | ikev2 g^x cb b0 f4 b3 4d 7d 19 05 e0 8b 9b 3f ea 2b b8 7f | ikev2 g^x 3e 4a 4c 83 dc 50 06 15 79 16 52 63 ff 38 b6 0f | ikev2 g^x d8 c3 fa 2f f5 c3 27 82 43 ee e2 17 1f fd 56 25 | ikev2 g^x 4d 01 27 c8 35 e9 4c 3b 07 cc 3e b3 7b 20 e4 14 | ikev2 g^x 25 d6 4c 28 e2 bf c7 2c 41 cf 35 f8 5a 05 57 12 | ikev2 g^x 04 0c ca 49 a7 e8 4a a0 b8 27 d8 fb da 18 09 0a | ikev2 g^x 8c d8 8d af 83 fc 09 54 90 fe e9 ec 6d 97 9f 38 | ikev2 g^x 4e f0 9c 72 3c f6 cb 04 b9 67 19 9d 6a 3a 73 08 | ikev2 g^x d5 1a 3f 89 1b 6f b4 27 4a 1e 40 b2 80 92 bf af | ikev2 g^x 91 29 dd e3 e5 8d 54 1a b2 c3 4e f5 fa 70 5a df | ikev2 g^x 3f f7 11 8b 30 04 85 e6 00 fc df 4a f8 63 a9 ce | ikev2 g^x 38 f2 7c 9e bf e7 aa 6c 51 0c 26 e0 f2 3a 12 6b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7a 35 42 ce 34 04 04 57 a4 48 47 35 56 ae 37 50 | IKEv2 nonce 6d 6b b9 18 e7 0a e4 12 4e ef 0f 1d e0 a7 cb 2b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= aa d5 b7 9d 2c 2d ce cd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b3 | natd_hash: port= 01 f4 | natd_hash: hash= ea a8 f1 c6 be 84 ee 15 46 58 b3 d5 8e ba 1e e7 | natd_hash: hash= f5 a8 48 b9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ea a8 f1 c6 be 84 ee 15 46 58 b3 d5 8e ba 1e e7 | Notify data f5 a8 48 b9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= aa d5 b7 9d 2c 2d ce cd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 03 f5 9e 01 93 c6 ea 77 b1 6c 5c 90 de bb c7 8a | natd_hash: hash= ab c5 48 5b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 03 f5 9e 01 93 c6 ea 77 b1 6c 5c 90 de bb c7 8a | Notify data ab c5 48 5b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #722 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #722 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #722 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #722: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #722 to 4294967295 after switching state | Message ID: IKE #722 skipping update_recv as MD is fake | Message ID: sent #722 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-179" #722: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.179:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #722) | aa d5 b7 9d 2c 2d ce cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 b1 9e af cf 96 c4 1f a9 84 c9 1e fe 0d 23 0e | 53 41 ad 54 73 4d e4 38 06 61 64 5a 7e 50 5d 4b | 7b 88 a3 16 c2 7a 44 91 ab 9a ef aa fd 30 6e 1a | 1d d2 33 a7 46 ad ce 2a 23 40 98 78 51 d0 bd 75 | cb b0 f4 b3 4d 7d 19 05 e0 8b 9b 3f ea 2b b8 7f | 3e 4a 4c 83 dc 50 06 15 79 16 52 63 ff 38 b6 0f | d8 c3 fa 2f f5 c3 27 82 43 ee e2 17 1f fd 56 25 | 4d 01 27 c8 35 e9 4c 3b 07 cc 3e b3 7b 20 e4 14 | 25 d6 4c 28 e2 bf c7 2c 41 cf 35 f8 5a 05 57 12 | 04 0c ca 49 a7 e8 4a a0 b8 27 d8 fb da 18 09 0a | 8c d8 8d af 83 fc 09 54 90 fe e9 ec 6d 97 9f 38 | 4e f0 9c 72 3c f6 cb 04 b9 67 19 9d 6a 3a 73 08 | d5 1a 3f 89 1b 6f b4 27 4a 1e 40 b2 80 92 bf af | 91 29 dd e3 e5 8d 54 1a b2 c3 4e f5 fa 70 5a df | 3f f7 11 8b 30 04 85 e6 00 fc df 4a f8 63 a9 ce | 38 f2 7c 9e bf e7 aa 6c 51 0c 26 e0 f2 3a 12 6b | 29 00 00 24 7a 35 42 ce 34 04 04 57 a4 48 47 35 | 56 ae 37 50 6d 6b b9 18 e7 0a e4 12 4e ef 0f 1d | e0 a7 cb 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea a8 f1 c6 be 84 ee 15 46 58 b3 d5 | 8e ba 1e e7 f5 a8 48 b9 00 00 00 1c 00 00 40 05 | 03 f5 9e 01 93 c6 ea 77 b1 6c 5c 90 de bb c7 8a | ab c5 48 5b | state #722 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb378035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46adb080 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adb080 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #722 | libevent_malloc: new ptr-libevent@0x7fb374085870 size 128 | #722 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.219436 | resume sending helper answer for #722 suppresed complete_v2_state_transition() and stole MD | #722 spent 0.282 milliseconds in resume sending helper answer | stop processing: state #722 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb350093270 | processing resume sending helper answer for #687 | start processing: state #687 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 687 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #687 | **emit ISAKMP Message: | initiator cookie: | ce 83 a7 9c 1c 97 2e 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-117 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6e 94 51 72 79 a4 28 3a f0 f6 12 68 84 e5 2d d5 | ikev2 g^x f6 aa 47 a0 d1 ff f5 a6 1a 2c 25 a6 01 58 40 fc | ikev2 g^x d1 95 56 17 97 c4 d8 d7 89 0f 51 18 3b 4c 8d f6 | ikev2 g^x ee fb ab 56 d0 0a 15 fd 6a c8 e8 89 62 5e b8 5c | ikev2 g^x 57 fe 05 8e e1 ea c9 e7 84 08 05 71 31 9a dd 16 | ikev2 g^x 0a 25 f1 1a 29 58 f8 06 86 68 fa fc 99 8b 12 42 | ikev2 g^x 09 ec 17 e1 a1 09 76 fc 53 b2 55 2f 51 28 14 aa | ikev2 g^x bc fd 76 5f c5 9a ba 18 29 7b 2d ad 6a bf 47 24 | ikev2 g^x 5d a5 36 0f 60 68 25 fb f2 8e 9c 88 47 ac 61 32 | ikev2 g^x b1 6f 1c e3 4c ea 94 2e 13 72 9f 40 c9 32 9e a5 | ikev2 g^x 55 17 b5 71 af 30 28 4f 48 dd 3d 1c db eb 87 a6 | ikev2 g^x 1e c2 d8 26 0c 79 1d 68 4b e4 5c 9d 70 1e da cb | ikev2 g^x bf 7a 87 cd ee 4f da f1 be 6f bd 22 fa fe fa e8 | ikev2 g^x 01 cf f5 ed 00 5b 60 c2 39 47 45 cf d8 5c e9 07 | ikev2 g^x 6f 88 d8 c1 70 38 c4 08 e2 b7 20 9d fc 6d 35 32 | ikev2 g^x 43 d1 2a f8 21 b9 12 49 96 d5 3b 06 a1 81 56 f4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 90 27 10 b2 cf 6a 00 ae d3 c4 a0 c5 23 4c 05 8c | IKEv2 nonce fe 6e fb 12 c4 ef 71 e8 a5 33 dc 9a 79 4a a8 08 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ce 83 a7 9c 1c 97 2e 39 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 75 | natd_hash: port= 01 f4 | natd_hash: hash= 30 e8 b6 32 ca 26 78 2c d2 a8 a0 44 d4 75 0b 9e | natd_hash: hash= 75 b6 57 86 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 30 e8 b6 32 ca 26 78 2c d2 a8 a0 44 d4 75 0b 9e | Notify data 75 b6 57 86 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ce 83 a7 9c 1c 97 2e 39 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c5 19 67 c6 b1 38 40 1d 0b 22 02 fd ab 47 ee cb | natd_hash: hash= 20 29 33 72 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c5 19 67 c6 b1 38 40 1d 0b 22 02 fd ab 47 ee cb | Notify data 20 29 33 72 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #687 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #687 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #687 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #687: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #687 to 4294967295 after switching state | Message ID: IKE #687 skipping update_recv as MD is fake | Message ID: sent #687 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-117" #687: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.117:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #687) | ce 83 a7 9c 1c 97 2e 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 94 51 72 79 a4 28 3a f0 f6 12 68 84 e5 2d d5 | f6 aa 47 a0 d1 ff f5 a6 1a 2c 25 a6 01 58 40 fc | d1 95 56 17 97 c4 d8 d7 89 0f 51 18 3b 4c 8d f6 | ee fb ab 56 d0 0a 15 fd 6a c8 e8 89 62 5e b8 5c | 57 fe 05 8e e1 ea c9 e7 84 08 05 71 31 9a dd 16 | 0a 25 f1 1a 29 58 f8 06 86 68 fa fc 99 8b 12 42 | 09 ec 17 e1 a1 09 76 fc 53 b2 55 2f 51 28 14 aa | bc fd 76 5f c5 9a ba 18 29 7b 2d ad 6a bf 47 24 | 5d a5 36 0f 60 68 25 fb f2 8e 9c 88 47 ac 61 32 | b1 6f 1c e3 4c ea 94 2e 13 72 9f 40 c9 32 9e a5 | 55 17 b5 71 af 30 28 4f 48 dd 3d 1c db eb 87 a6 | 1e c2 d8 26 0c 79 1d 68 4b e4 5c 9d 70 1e da cb | bf 7a 87 cd ee 4f da f1 be 6f bd 22 fa fe fa e8 | 01 cf f5 ed 00 5b 60 c2 39 47 45 cf d8 5c e9 07 | 6f 88 d8 c1 70 38 c4 08 e2 b7 20 9d fc 6d 35 32 | 43 d1 2a f8 21 b9 12 49 96 d5 3b 06 a1 81 56 f4 | 29 00 00 24 90 27 10 b2 cf 6a 00 ae d3 c4 a0 c5 | 23 4c 05 8c fe 6e fb 12 c4 ef 71 e8 a5 33 dc 9a | 79 4a a8 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 e8 b6 32 ca 26 78 2c d2 a8 a0 44 | d4 75 0b 9e 75 b6 57 86 00 00 00 1c 00 00 40 05 | c5 19 67 c6 b1 38 40 1d 0b 22 02 fd ab 47 ee cb | 20 29 33 72 | state #687 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344046040 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a3a590 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #687 | libevent_malloc: new ptr-libevent@0x7fb350093270 size 128 | #687 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.219735 | resume sending helper answer for #687 suppresed complete_v2_state_transition() and stole MD | #687 spent 0.278 milliseconds in resume sending helper answer | stop processing: state #687 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c06f420 | processing resume sending helper answer for #719 | start processing: state #719 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 719 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #719 | **emit ISAKMP Message: | initiator cookie: | a1 e8 20 43 a8 88 d4 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-193 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a8 ab ba d1 12 9a ec ff 2a 8d 05 f1 61 72 fc 12 | ikev2 g^x 50 d0 8b 0a f5 f8 07 f6 3e bb 96 36 70 dc 69 15 | ikev2 g^x 19 13 a2 d6 28 22 91 85 b9 c6 ae 40 f1 6f da 62 | ikev2 g^x 5e 9b e9 42 bc cd 47 a9 39 f2 57 46 62 a2 10 aa | ikev2 g^x d8 dc 57 a1 b1 b0 e1 a2 6e 21 37 a0 e6 91 53 43 | ikev2 g^x 3a 39 b3 13 b9 9a a2 2c 1d 20 6a 6b ed 1a b3 d6 | ikev2 g^x c1 d0 e0 c4 cd b3 32 14 d0 e6 ed 44 76 72 46 07 | ikev2 g^x d4 18 aa 83 01 f8 a3 38 90 94 a1 fe 3b 59 34 42 | ikev2 g^x 25 b7 b1 5f cf ed 7b 9e e4 7a 92 07 5e d0 c7 a2 | ikev2 g^x d0 7e 54 5b 4b f9 50 6a 40 3e 4c 40 b2 5c 33 c4 | ikev2 g^x 63 a9 26 d0 d8 64 ca 1f 4a 1f e3 d6 1f 89 7f 4f | ikev2 g^x 6e 5e 19 7f cb da f9 38 d8 39 8e fa f7 bb 35 44 | ikev2 g^x 19 f4 69 49 42 32 1f e6 a6 69 2b b3 d6 b8 11 37 | ikev2 g^x 64 4d 1e b3 f2 07 24 9a d3 3f 11 59 ae e5 5b 71 | ikev2 g^x 8d b9 39 61 c8 17 f2 28 f6 ff e7 6f 1d 64 87 fa | ikev2 g^x d5 05 27 cd c8 9d a9 d6 a8 55 c4 9b 8a 80 03 48 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 35 05 0b 61 81 12 01 a2 56 70 69 a8 c1 2a 37 d5 | IKEv2 nonce 7f b9 83 93 56 ce 1a 17 bb 38 92 4e 85 53 16 90 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a1 e8 20 43 a8 88 d4 dc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c1 | natd_hash: port= 01 f4 | natd_hash: hash= ea c6 0c 55 e6 7e 39 b7 3e fa e3 87 d8 fd e1 5c | natd_hash: hash= eb b3 f6 df | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ea c6 0c 55 e6 7e 39 b7 3e fa e3 87 d8 fd e1 5c | Notify data eb b3 f6 df | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a1 e8 20 43 a8 88 d4 dc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ea 71 42 1a 2a 30 c7 3c 78 cb 6c ab 7d ed 04 39 | natd_hash: hash= d2 40 14 db | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ea 71 42 1a 2a 30 c7 3c 78 cb 6c ab 7d ed 04 39 | Notify data d2 40 14 db | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #719 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #719 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #719 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #719: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #719 to 4294967295 after switching state | Message ID: IKE #719 skipping update_recv as MD is fake | Message ID: sent #719 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-193" #719: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.193:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #719) | a1 e8 20 43 a8 88 d4 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 ab ba d1 12 9a ec ff 2a 8d 05 f1 61 72 fc 12 | 50 d0 8b 0a f5 f8 07 f6 3e bb 96 36 70 dc 69 15 | 19 13 a2 d6 28 22 91 85 b9 c6 ae 40 f1 6f da 62 | 5e 9b e9 42 bc cd 47 a9 39 f2 57 46 62 a2 10 aa | d8 dc 57 a1 b1 b0 e1 a2 6e 21 37 a0 e6 91 53 43 | 3a 39 b3 13 b9 9a a2 2c 1d 20 6a 6b ed 1a b3 d6 | c1 d0 e0 c4 cd b3 32 14 d0 e6 ed 44 76 72 46 07 | d4 18 aa 83 01 f8 a3 38 90 94 a1 fe 3b 59 34 42 | 25 b7 b1 5f cf ed 7b 9e e4 7a 92 07 5e d0 c7 a2 | d0 7e 54 5b 4b f9 50 6a 40 3e 4c 40 b2 5c 33 c4 | 63 a9 26 d0 d8 64 ca 1f 4a 1f e3 d6 1f 89 7f 4f | 6e 5e 19 7f cb da f9 38 d8 39 8e fa f7 bb 35 44 | 19 f4 69 49 42 32 1f e6 a6 69 2b b3 d6 b8 11 37 | 64 4d 1e b3 f2 07 24 9a d3 3f 11 59 ae e5 5b 71 | 8d b9 39 61 c8 17 f2 28 f6 ff e7 6f 1d 64 87 fa | d5 05 27 cd c8 9d a9 d6 a8 55 c4 9b 8a 80 03 48 | 29 00 00 24 35 05 0b 61 81 12 01 a2 56 70 69 a8 | c1 2a 37 d5 7f b9 83 93 56 ce 1a 17 bb 38 92 4e | 85 53 16 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea c6 0c 55 e6 7e 39 b7 3e fa e3 87 | d8 fd e1 5c eb b3 f6 df 00 00 00 1c 00 00 40 05 | ea 71 42 1a 2a 30 c7 3c 78 cb 6c ab 7d ed 04 39 | d2 40 14 db | state #719 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388022480 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a54250 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a54250 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #719 | libevent_malloc: new ptr-libevent@0x7fb34c06f420 size 128 | #719 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.220033 | resume sending helper answer for #719 suppresed complete_v2_state_transition() and stole MD | #719 spent 0.278 milliseconds in resume sending helper answer | stop processing: state #719 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388090d90 | processing resume sending helper answer for #749 | start processing: state #749 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 749 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #749 | **emit ISAKMP Message: | initiator cookie: | 21 cc df 44 fb 91 db 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-176 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 17 1f c5 e8 8c da 2f 71 6f 87 ca 00 ac 50 65 c6 | ikev2 g^x be 36 51 01 ec 7e 83 51 09 eb 5d e7 2a 9f c8 ad | ikev2 g^x 66 58 cd 80 0a 9c 72 ee c8 d1 c5 20 4f 69 fb 92 | ikev2 g^x 13 65 d4 0e 1d 60 b8 43 6c fd 57 62 48 52 03 58 | ikev2 g^x 1f 30 23 02 a5 49 ac 37 6c b6 2d 96 9d 82 d8 a1 | ikev2 g^x ba c0 ed f3 40 36 e0 13 52 9d 8e 1c 5c b3 e3 4c | ikev2 g^x f2 78 1b 73 09 dc 52 b1 42 32 86 e1 28 0b 10 51 | ikev2 g^x 7f e1 bf a0 7c b2 ef e9 fa 73 6c 5e 12 69 7c 58 | ikev2 g^x 4e 1b 40 29 8f 20 2b 37 6e b7 c7 d7 63 7b 45 40 | ikev2 g^x 89 11 3c 89 89 0f b8 3d 1a 1c c1 76 50 59 ab 17 | ikev2 g^x 87 71 45 bc cb 1e a0 07 a8 8c 7d 0e 05 c2 ec 2b | ikev2 g^x fb 3c 29 c4 ba ca c8 e4 d1 73 b4 1b 53 de b3 a4 | ikev2 g^x 21 14 35 6d 70 c0 9f 7d a6 1f 1c e3 7c a8 3e 43 | ikev2 g^x cc 8e 74 be 9f f4 d4 7a fd 86 b7 9a fc 1b 2b 7e | ikev2 g^x cc df a5 1f 60 66 33 d4 ff 08 25 ca 1f d3 96 a0 | ikev2 g^x da 1e 31 8f a3 a2 b0 5a a2 09 c5 ee 5b 37 a0 f1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ef 4a 18 29 61 bc 8a 68 d0 f0 81 d1 f3 7e a9 a2 | IKEv2 nonce f3 7e 3f 08 52 04 df 8a cd fc 2c b8 d1 9d 3b c1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 21 cc df 44 fb 91 db 61 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b0 | natd_hash: port= 01 f4 | natd_hash: hash= 6c 60 55 07 b3 0c 17 02 3e a6 d0 be 6a 54 3c c2 | natd_hash: hash= 20 5b a4 d7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6c 60 55 07 b3 0c 17 02 3e a6 d0 be 6a 54 3c c2 | Notify data 20 5b a4 d7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 21 cc df 44 fb 91 db 61 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ab 26 2f c6 c0 76 2f 1d 50 c7 79 f8 11 59 56 a7 | natd_hash: hash= 82 5d 60 bb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ab 26 2f c6 c0 76 2f 1d 50 c7 79 f8 11 59 56 a7 | Notify data 82 5d 60 bb | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #749 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #749 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #749 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #749: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #749 to 4294967295 after switching state | Message ID: IKE #749 skipping update_recv as MD is fake | Message ID: sent #749 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-176" #749: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.176:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #749) | 21 cc df 44 fb 91 db 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 1f c5 e8 8c da 2f 71 6f 87 ca 00 ac 50 65 c6 | be 36 51 01 ec 7e 83 51 09 eb 5d e7 2a 9f c8 ad | 66 58 cd 80 0a 9c 72 ee c8 d1 c5 20 4f 69 fb 92 | 13 65 d4 0e 1d 60 b8 43 6c fd 57 62 48 52 03 58 | 1f 30 23 02 a5 49 ac 37 6c b6 2d 96 9d 82 d8 a1 | ba c0 ed f3 40 36 e0 13 52 9d 8e 1c 5c b3 e3 4c | f2 78 1b 73 09 dc 52 b1 42 32 86 e1 28 0b 10 51 | 7f e1 bf a0 7c b2 ef e9 fa 73 6c 5e 12 69 7c 58 | 4e 1b 40 29 8f 20 2b 37 6e b7 c7 d7 63 7b 45 40 | 89 11 3c 89 89 0f b8 3d 1a 1c c1 76 50 59 ab 17 | 87 71 45 bc cb 1e a0 07 a8 8c 7d 0e 05 c2 ec 2b | fb 3c 29 c4 ba ca c8 e4 d1 73 b4 1b 53 de b3 a4 | 21 14 35 6d 70 c0 9f 7d a6 1f 1c e3 7c a8 3e 43 | cc 8e 74 be 9f f4 d4 7a fd 86 b7 9a fc 1b 2b 7e | cc df a5 1f 60 66 33 d4 ff 08 25 ca 1f d3 96 a0 | da 1e 31 8f a3 a2 b0 5a a2 09 c5 ee 5b 37 a0 f1 | 29 00 00 24 ef 4a 18 29 61 bc 8a 68 d0 f0 81 d1 | f3 7e a9 a2 f3 7e 3f 08 52 04 df 8a cd fc 2c b8 | d1 9d 3b c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 60 55 07 b3 0c 17 02 3e a6 d0 be | 6a 54 3c c2 20 5b a4 d7 00 00 00 1c 00 00 40 05 | ab 26 2f c6 c0 76 2f 1d 50 c7 79 f8 11 59 56 a7 | 82 5d 60 bb | state #749 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35003a770 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb3500300a0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3500300a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #749 | libevent_malloc: new ptr-libevent@0x7fb388090d90 size 128 | #749 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.220422 | resume sending helper answer for #749 suppresed complete_v2_state_transition() and stole MD | #749 spent 0.348 milliseconds in resume sending helper answer | stop processing: state #749 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb378085d30 | processing resume sending helper answer for #726 | start processing: state #726 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 726 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #726 | **emit ISAKMP Message: | initiator cookie: | 0c d9 0f fe b0 de fb 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-199 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ba 5a 03 41 cc a5 fd 1a 49 8c 1f 01 a4 d7 6f 42 | ikev2 g^x 4b 04 b3 65 c6 04 c6 d7 7b 8c 73 c5 64 a3 11 05 | ikev2 g^x db ca 95 5a c3 b5 81 cc 3c e0 e0 10 f0 ff 7e 0b | ikev2 g^x ed f4 ad e5 9b 37 9a a2 23 4c 84 01 ff 22 3f 36 | ikev2 g^x 71 71 f2 27 6b 0d e0 3f f7 18 a7 11 1f 03 8b fc | ikev2 g^x 68 47 d9 20 6d ba a0 e4 3e 38 1d 24 82 8d dd ed | ikev2 g^x f0 f3 ff bb 45 10 55 de 96 c4 67 c7 c0 4e b6 ff | ikev2 g^x ff fa 6c 42 29 12 cb 76 59 82 15 5d 1c 3f 19 0a | ikev2 g^x 04 84 40 90 fa 20 d9 8c 32 64 bd 98 62 52 e2 03 | ikev2 g^x bf fb 12 3f 70 5a 23 2e b6 a0 1e da 62 5c 54 65 | ikev2 g^x 28 94 12 c3 ff c8 58 af b7 92 ff e0 c9 41 fa a6 | ikev2 g^x f7 68 bf dc c3 be e7 16 3d 20 d2 d0 0c 4d 6b 0f | ikev2 g^x f1 85 f8 60 c2 47 89 cc 68 3e 26 98 33 a2 77 d0 | ikev2 g^x d7 d8 d6 c2 eb 37 9e b4 c7 a1 fa b6 a2 06 85 67 | ikev2 g^x 8a 85 66 84 52 40 0f 08 d5 73 dd 84 59 ba e4 3b | ikev2 g^x 8d 2f d0 0b 1e 56 e6 0a e8 13 8c bc e0 02 15 0f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5f db 23 af 71 bf 0d 40 27 c3 a7 aa e9 98 98 31 | IKEv2 nonce 72 a3 0b fe 84 2c 87 3c 00 39 ba 62 98 9c 34 f5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0c d9 0f fe b0 de fb 42 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c7 | natd_hash: port= 01 f4 | natd_hash: hash= 67 ba 9f db 5b 15 ef 4c c9 2a 37 4d f7 85 c9 a1 | natd_hash: hash= 4c f4 99 05 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 67 ba 9f db 5b 15 ef 4c c9 2a 37 4d f7 85 c9 a1 | Notify data 4c f4 99 05 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0c d9 0f fe b0 de fb 42 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 17 ee f7 ed 41 32 9d a2 b1 d3 43 b7 8c 71 7a 66 | natd_hash: hash= 24 14 bd f6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 17 ee f7 ed 41 32 9d a2 b1 d3 43 b7 8c 71 7a 66 | Notify data 24 14 bd f6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #726 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #726 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #726 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #726: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #726 to 4294967295 after switching state | Message ID: IKE #726 skipping update_recv as MD is fake | Message ID: sent #726 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-199" #726: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.199:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #726) | 0c d9 0f fe b0 de fb 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba 5a 03 41 cc a5 fd 1a 49 8c 1f 01 a4 d7 6f 42 | 4b 04 b3 65 c6 04 c6 d7 7b 8c 73 c5 64 a3 11 05 | db ca 95 5a c3 b5 81 cc 3c e0 e0 10 f0 ff 7e 0b | ed f4 ad e5 9b 37 9a a2 23 4c 84 01 ff 22 3f 36 | 71 71 f2 27 6b 0d e0 3f f7 18 a7 11 1f 03 8b fc | 68 47 d9 20 6d ba a0 e4 3e 38 1d 24 82 8d dd ed | f0 f3 ff bb 45 10 55 de 96 c4 67 c7 c0 4e b6 ff | ff fa 6c 42 29 12 cb 76 59 82 15 5d 1c 3f 19 0a | 04 84 40 90 fa 20 d9 8c 32 64 bd 98 62 52 e2 03 | bf fb 12 3f 70 5a 23 2e b6 a0 1e da 62 5c 54 65 | 28 94 12 c3 ff c8 58 af b7 92 ff e0 c9 41 fa a6 | f7 68 bf dc c3 be e7 16 3d 20 d2 d0 0c 4d 6b 0f | f1 85 f8 60 c2 47 89 cc 68 3e 26 98 33 a2 77 d0 | d7 d8 d6 c2 eb 37 9e b4 c7 a1 fa b6 a2 06 85 67 | 8a 85 66 84 52 40 0f 08 d5 73 dd 84 59 ba e4 3b | 8d 2f d0 0b 1e 56 e6 0a e8 13 8c bc e0 02 15 0f | 29 00 00 24 5f db 23 af 71 bf 0d 40 27 c3 a7 aa | e9 98 98 31 72 a3 0b fe 84 2c 87 3c 00 39 ba 62 | 98 9c 34 f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 67 ba 9f db 5b 15 ef 4c c9 2a 37 4d | f7 85 c9 a1 4c f4 99 05 00 00 00 1c 00 00 40 05 | 17 ee f7 ed 41 32 9d a2 b1 d3 43 b7 8c 71 7a 66 | 24 14 bd f6 | state #726 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c0300e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c01d710 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c01d710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #726 | libevent_malloc: new ptr-libevent@0x7fb378085d30 size 128 | #726 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.220861 | resume sending helper answer for #726 suppresed complete_v2_state_transition() and stole MD | #726 spent 0.418 milliseconds in resume sending helper answer | stop processing: state #726 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3680752a0 | processing resume sending helper answer for #742 | start processing: state #742 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 742 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #742 | **emit ISAKMP Message: | initiator cookie: | ab 34 f4 95 81 ed c2 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-202 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f7 98 46 2a 24 70 ac 92 50 50 f4 c2 b5 d5 f7 0a | ikev2 g^x d6 9e b1 7a 3e ed 98 33 3d ee f7 e3 13 87 69 c1 | ikev2 g^x b4 a2 57 16 53 d7 41 79 86 3b 2e a4 e6 52 7a 6e | ikev2 g^x 0b 74 58 0e 45 35 85 36 77 6b b0 71 9d 4d a2 91 | ikev2 g^x 8f b5 9e 28 e8 62 a3 5a fa 45 28 9c d1 6e 96 06 | ikev2 g^x 43 8c 31 83 80 4b 1a d0 1a 86 ab ce 70 87 d8 60 | ikev2 g^x 2f 53 50 9f 1c f0 aa 40 e7 82 42 00 ef ac c6 cd | ikev2 g^x 59 7e ba 8e d2 08 a8 07 ab e8 d4 09 1a 34 ae b7 | ikev2 g^x 19 6a 93 47 39 54 0e c1 ff ba c1 49 16 e9 84 6d | ikev2 g^x e4 d4 28 20 7f bb 1c 5a 50 ad ff 27 bb 53 3a 4c | ikev2 g^x fe f2 c6 66 38 c9 62 25 57 6b 7d ae 6f 82 66 61 | ikev2 g^x 8d 1d 48 cd 44 50 c2 df 28 86 79 e8 45 6e a1 90 | ikev2 g^x 4c 22 91 9e dc b2 7e 6c 6c e6 a2 de 0a 17 03 3b | ikev2 g^x bc 26 ef 26 39 74 28 83 5b 3a fc 73 ca d0 c6 57 | ikev2 g^x 8a 02 2c 0e 18 5b 99 8c aa fa 43 b4 a9 f7 75 31 | ikev2 g^x 51 42 a8 eb be 2e 35 d9 44 1d 6b bc c5 2f 8c 87 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 01 dd 2f e6 eb 4b af 32 1c 79 d4 4c 09 c2 78 82 | IKEv2 nonce 23 70 b2 bb 85 ac f9 94 71 a9 92 05 d7 ca 31 27 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ab 34 f4 95 81 ed c2 97 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ca | natd_hash: port= 01 f4 | natd_hash: hash= d5 97 94 2c 62 c6 59 3e 48 9c 81 ce 06 c1 b8 e1 | natd_hash: hash= 6f 64 53 c0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d5 97 94 2c 62 c6 59 3e 48 9c 81 ce 06 c1 b8 e1 | Notify data 6f 64 53 c0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ab 34 f4 95 81 ed c2 97 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6e fc 22 43 8c 0a 59 5f b4 df 17 9d e0 72 a9 ba | natd_hash: hash= 64 42 3f 26 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6e fc 22 43 8c 0a 59 5f b4 df 17 9d e0 72 a9 ba | Notify data 64 42 3f 26 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #742 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #742 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #742 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #742: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #742 to 4294967295 after switching state | Message ID: IKE #742 skipping update_recv as MD is fake | Message ID: sent #742 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-202" #742: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.202:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #742) | ab 34 f4 95 81 ed c2 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f7 98 46 2a 24 70 ac 92 50 50 f4 c2 b5 d5 f7 0a | d6 9e b1 7a 3e ed 98 33 3d ee f7 e3 13 87 69 c1 | b4 a2 57 16 53 d7 41 79 86 3b 2e a4 e6 52 7a 6e | 0b 74 58 0e 45 35 85 36 77 6b b0 71 9d 4d a2 91 | 8f b5 9e 28 e8 62 a3 5a fa 45 28 9c d1 6e 96 06 | 43 8c 31 83 80 4b 1a d0 1a 86 ab ce 70 87 d8 60 | 2f 53 50 9f 1c f0 aa 40 e7 82 42 00 ef ac c6 cd | 59 7e ba 8e d2 08 a8 07 ab e8 d4 09 1a 34 ae b7 | 19 6a 93 47 39 54 0e c1 ff ba c1 49 16 e9 84 6d | e4 d4 28 20 7f bb 1c 5a 50 ad ff 27 bb 53 3a 4c | fe f2 c6 66 38 c9 62 25 57 6b 7d ae 6f 82 66 61 | 8d 1d 48 cd 44 50 c2 df 28 86 79 e8 45 6e a1 90 | 4c 22 91 9e dc b2 7e 6c 6c e6 a2 de 0a 17 03 3b | bc 26 ef 26 39 74 28 83 5b 3a fc 73 ca d0 c6 57 | 8a 02 2c 0e 18 5b 99 8c aa fa 43 b4 a9 f7 75 31 | 51 42 a8 eb be 2e 35 d9 44 1d 6b bc c5 2f 8c 87 | 29 00 00 24 01 dd 2f e6 eb 4b af 32 1c 79 d4 4c | 09 c2 78 82 23 70 b2 bb 85 ac f9 94 71 a9 92 05 | d7 ca 31 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 97 94 2c 62 c6 59 3e 48 9c 81 ce | 06 c1 b8 e1 6f 64 53 c0 00 00 00 1c 00 00 40 05 | 6e fc 22 43 8c 0a 59 5f b4 df 17 9d e0 72 a9 ba | 64 42 3f 26 | state #742 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36803b0b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad8480 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad8480 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #742 | libevent_malloc: new ptr-libevent@0x7fb3680752a0 size 128 | #742 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.221227 | resume sending helper answer for #742 suppresed complete_v2_state_transition() and stole MD | #742 spent 0.327 milliseconds in resume sending helper answer | stop processing: state #742 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb348077830 | processing resume sending helper answer for #721 | start processing: state #721 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 721 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #721 | **emit ISAKMP Message: | initiator cookie: | e2 d2 81 3a 91 66 0b 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-104 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e8 66 4a 11 45 27 41 9e fa 59 58 40 a4 cc e3 66 | ikev2 g^x a4 14 b6 1a 8d ec 4a 94 ae 30 93 f6 e0 2b 48 5e | ikev2 g^x a9 86 4c 46 13 47 37 8b 91 48 67 89 bc 13 95 86 | ikev2 g^x c3 a5 fd 51 f1 60 1a c1 1b ea 4a 3d 68 db 35 cf | ikev2 g^x b9 d2 24 1d 11 fa f4 f5 69 79 96 a5 67 36 23 c2 | ikev2 g^x 21 40 a7 85 5c c3 43 86 61 71 35 04 bc b3 26 45 | ikev2 g^x d5 aa e6 7b c3 47 8d 08 98 e5 21 f1 ac 8e ba f5 | ikev2 g^x 2f f9 eb fc a2 04 fd 35 92 de 29 dd 6d 2d 53 6e | ikev2 g^x ab ec 31 fd 91 c3 8a e1 90 85 af 74 f4 e2 93 a0 | ikev2 g^x ef 1a 10 50 72 25 37 c7 21 d8 7a 5e 58 f6 7c c1 | ikev2 g^x 2d b3 8b e3 6b e8 be b0 e1 38 1c 05 0b d7 f6 07 | ikev2 g^x 9c 25 56 1c 46 bf d1 bd c5 df dd d8 33 23 d8 b0 | ikev2 g^x a2 c8 cb 1c b9 39 f3 85 c7 0b 15 1a 74 ff 55 80 | ikev2 g^x 1c fa 71 d1 23 f1 d9 e4 a0 14 57 46 33 58 01 33 | ikev2 g^x 3e 06 c5 79 b4 72 cb 12 6a 21 9a 81 d4 46 48 66 | ikev2 g^x 8a 9c 2d 86 80 06 17 4f 80 91 2d 38 09 9b 22 b4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a7 2a 51 43 4f d0 b2 2d b6 00 60 33 be ce 9f 17 | IKEv2 nonce 58 67 da 33 8a 89 27 e9 8a 3f 82 9a 4a 50 3e 71 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e2 d2 81 3a 91 66 0b 16 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 68 | natd_hash: port= 01 f4 | natd_hash: hash= 2c 9c ed 7b 0b 4f 45 bf 12 47 14 a7 35 17 86 4b | natd_hash: hash= 30 03 87 f5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2c 9c ed 7b 0b 4f 45 bf 12 47 14 a7 35 17 86 4b | Notify data 30 03 87 f5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e2 d2 81 3a 91 66 0b 16 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 78 3e ba 2e 78 93 3c a4 49 e4 a1 77 52 95 07 b6 | natd_hash: hash= 6d ae 67 c4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 78 3e ba 2e 78 93 3c a4 49 e4 a1 77 52 95 07 b6 | Notify data 6d ae 67 c4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #721 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #721 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #721 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #721: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #721 to 4294967295 after switching state | Message ID: IKE #721 skipping update_recv as MD is fake | Message ID: sent #721 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-104" #721: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.104:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #721) | e2 d2 81 3a 91 66 0b 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 66 4a 11 45 27 41 9e fa 59 58 40 a4 cc e3 66 | a4 14 b6 1a 8d ec 4a 94 ae 30 93 f6 e0 2b 48 5e | a9 86 4c 46 13 47 37 8b 91 48 67 89 bc 13 95 86 | c3 a5 fd 51 f1 60 1a c1 1b ea 4a 3d 68 db 35 cf | b9 d2 24 1d 11 fa f4 f5 69 79 96 a5 67 36 23 c2 | 21 40 a7 85 5c c3 43 86 61 71 35 04 bc b3 26 45 | d5 aa e6 7b c3 47 8d 08 98 e5 21 f1 ac 8e ba f5 | 2f f9 eb fc a2 04 fd 35 92 de 29 dd 6d 2d 53 6e | ab ec 31 fd 91 c3 8a e1 90 85 af 74 f4 e2 93 a0 | ef 1a 10 50 72 25 37 c7 21 d8 7a 5e 58 f6 7c c1 | 2d b3 8b e3 6b e8 be b0 e1 38 1c 05 0b d7 f6 07 | 9c 25 56 1c 46 bf d1 bd c5 df dd d8 33 23 d8 b0 | a2 c8 cb 1c b9 39 f3 85 c7 0b 15 1a 74 ff 55 80 | 1c fa 71 d1 23 f1 d9 e4 a0 14 57 46 33 58 01 33 | 3e 06 c5 79 b4 72 cb 12 6a 21 9a 81 d4 46 48 66 | 8a 9c 2d 86 80 06 17 4f 80 91 2d 38 09 9b 22 b4 | 29 00 00 24 a7 2a 51 43 4f d0 b2 2d b6 00 60 33 | be ce 9f 17 58 67 da 33 8a 89 27 e9 8a 3f 82 9a | 4a 50 3e 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c 9c ed 7b 0b 4f 45 bf 12 47 14 a7 | 35 17 86 4b 30 03 87 f5 00 00 00 1c 00 00 40 05 | 78 3e ba 2e 78 93 3c a4 49 e4 a1 77 52 95 07 b6 | 6d ae 67 c4 | state #721 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36004b7c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ae0780 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34802a9a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #721 | libevent_malloc: new ptr-libevent@0x7fb348077830 size 128 | #721 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.221548 | resume sending helper answer for #721 suppresed complete_v2_state_transition() and stole MD | #721 spent 0.298 milliseconds in resume sending helper answer | stop processing: state #721 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb370074f70 | processing resume sending helper answer for #744 | start processing: state #744 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 744 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #744 | **emit ISAKMP Message: | initiator cookie: | ea 7c f7 bc 9d b4 d4 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-209 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4e 10 35 c8 dc d8 d8 41 53 59 49 7c 7b 44 aa 05 | ikev2 g^x 7f 67 fe c6 28 2a e8 7b 99 25 f4 0d 41 65 04 49 | ikev2 g^x 3f a5 ca 32 7e 94 c7 70 6b d5 d7 5f 8a d3 f2 1c | ikev2 g^x ca 3a c9 ae 29 50 6e c5 9c 99 e5 19 7a ca 2b 5a | ikev2 g^x 20 96 8c 54 9e 1b 8d 21 df 3d 1c ae a9 b2 f2 dd | ikev2 g^x 61 db 05 94 26 c0 73 9c 28 14 1e b4 32 df 8d 11 | ikev2 g^x 60 18 79 0a 1f bd 12 12 40 ca a3 c4 d1 34 dc 28 | ikev2 g^x d8 6d 71 58 2c 9e 25 5c f3 a4 a3 a1 e0 08 9d 79 | ikev2 g^x a3 8b f2 2f 94 27 6a 94 a9 dd 70 db ec f6 52 82 | ikev2 g^x 6e 5a 66 cc 95 16 57 c1 a4 fd 5b c3 f0 1d 4f 6e | ikev2 g^x a7 3b 22 2a eb 3b 0c f6 18 dc ec 5e 03 2f 91 2c | ikev2 g^x 65 23 6f 5e 2b 65 fa e2 5b 10 85 ee 91 82 62 ff | ikev2 g^x 39 4e e7 48 1f 63 84 b9 93 73 90 ab e3 44 21 75 | ikev2 g^x 99 ff ff 9a 14 1d 56 ee 54 ba 7e 72 40 d2 9e 35 | ikev2 g^x 7d d1 3f 98 ac 5b e2 19 e4 12 13 62 7d 18 8e 06 | ikev2 g^x 2d 61 f4 df a4 3e 70 b2 f5 55 a5 83 ab 24 20 04 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 05 e4 d5 07 4d b5 53 19 e9 74 fb 1f 81 a4 d4 c0 | IKEv2 nonce b2 e7 21 de 08 06 9a f0 79 05 4e 6b 6b 45 0a 87 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ea 7c f7 bc 9d b4 d4 c6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d1 | natd_hash: port= 01 f4 | natd_hash: hash= 72 6d 3b fc 06 c6 19 b7 65 37 87 f1 00 58 b3 97 | natd_hash: hash= c1 ac 1d 38 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 72 6d 3b fc 06 c6 19 b7 65 37 87 f1 00 58 b3 97 | Notify data c1 ac 1d 38 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ea 7c f7 bc 9d b4 d4 c6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 84 2a 82 65 99 0a c2 da 62 53 b8 d5 7c fd d4 dd | natd_hash: hash= e5 91 5e 42 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 84 2a 82 65 99 0a c2 da 62 53 b8 d5 7c fd d4 dd | Notify data e5 91 5e 42 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #744 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #744 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #744 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #744: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #744 to 4294967295 after switching state | Message ID: IKE #744 skipping update_recv as MD is fake | Message ID: sent #744 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-209" #744: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.209:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #744) | ea 7c f7 bc 9d b4 d4 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 10 35 c8 dc d8 d8 41 53 59 49 7c 7b 44 aa 05 | 7f 67 fe c6 28 2a e8 7b 99 25 f4 0d 41 65 04 49 | 3f a5 ca 32 7e 94 c7 70 6b d5 d7 5f 8a d3 f2 1c | ca 3a c9 ae 29 50 6e c5 9c 99 e5 19 7a ca 2b 5a | 20 96 8c 54 9e 1b 8d 21 df 3d 1c ae a9 b2 f2 dd | 61 db 05 94 26 c0 73 9c 28 14 1e b4 32 df 8d 11 | 60 18 79 0a 1f bd 12 12 40 ca a3 c4 d1 34 dc 28 | d8 6d 71 58 2c 9e 25 5c f3 a4 a3 a1 e0 08 9d 79 | a3 8b f2 2f 94 27 6a 94 a9 dd 70 db ec f6 52 82 | 6e 5a 66 cc 95 16 57 c1 a4 fd 5b c3 f0 1d 4f 6e | a7 3b 22 2a eb 3b 0c f6 18 dc ec 5e 03 2f 91 2c | 65 23 6f 5e 2b 65 fa e2 5b 10 85 ee 91 82 62 ff | 39 4e e7 48 1f 63 84 b9 93 73 90 ab e3 44 21 75 | 99 ff ff 9a 14 1d 56 ee 54 ba 7e 72 40 d2 9e 35 | 7d d1 3f 98 ac 5b e2 19 e4 12 13 62 7d 18 8e 06 | 2d 61 f4 df a4 3e 70 b2 f5 55 a5 83 ab 24 20 04 | 29 00 00 24 05 e4 d5 07 4d b5 53 19 e9 74 fb 1f | 81 a4 d4 c0 b2 e7 21 de 08 06 9a f0 79 05 4e 6b | 6b 45 0a 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 6d 3b fc 06 c6 19 b7 65 37 87 f1 | 00 58 b3 97 c1 ac 1d 38 00 00 00 1c 00 00 40 05 | 84 2a 82 65 99 0a c2 da 62 53 b8 d5 7c fd d4 dd | e5 91 5e 42 | state #744 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38003dab0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb340005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #744 | libevent_malloc: new ptr-libevent@0x7fb370074f70 size 128 | #744 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.22194 | resume sending helper answer for #744 suppresed complete_v2_state_transition() and stole MD | #744 spent 0.369 milliseconds in resume sending helper answer | stop processing: state #744 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c08dbf0 | processing resume sending helper answer for #717 | start processing: state #717 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 717 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #717 | **emit ISAKMP Message: | initiator cookie: | e9 cc 03 7c e4 bf 38 4d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-195 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 44 0d 73 a5 88 38 ec a8 b6 b3 23 50 23 2d 53 9c | ikev2 g^x f5 59 45 c5 2c 5d 29 a6 50 ea 35 cd ff a5 c3 82 | ikev2 g^x 38 04 6e 7c 97 76 33 80 5e 2e f5 c7 20 1d 6d 52 | ikev2 g^x 54 d4 c8 43 d2 e6 b1 e4 c1 91 68 e9 90 9b 22 d4 | ikev2 g^x 83 38 49 6a 85 b6 95 48 9d 37 d5 48 27 0e 06 98 | ikev2 g^x 9a ac f5 b2 ed 13 5b 90 8e eb 62 80 51 7d 18 ee | ikev2 g^x 32 25 77 49 32 8f 44 94 81 26 5d 5f 72 27 8e 3a | ikev2 g^x 3d 60 20 38 fe 19 ba a8 04 69 ba 2a 74 5a 42 77 | ikev2 g^x 2f 99 5b 7a b9 a8 61 7a f1 75 11 5b a2 50 cd 53 | ikev2 g^x 3e c5 95 48 2d 5a 37 b9 4e c2 b7 10 0b 09 f4 4b | ikev2 g^x bc cd c9 0e 10 07 92 ed 69 ad 1e f1 95 18 c1 9a | ikev2 g^x 1e ea 66 8b 35 9c 7c a7 b1 0e 8e b5 d5 47 b6 9e | ikev2 g^x 92 8b a0 cf f4 db 96 37 1e 82 84 04 16 36 81 77 | ikev2 g^x 8c 3e 2c e7 86 0a bd c6 dd 95 c1 6b fe 52 5f 2a | ikev2 g^x 76 45 bb fe 23 c6 23 bc e6 64 3e f3 0c 6a 8e 66 | ikev2 g^x 27 65 38 a3 1e 94 62 d7 e1 4e 78 ef 7d 9b 33 59 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 84 76 67 8c e9 66 d9 97 e2 c1 c3 44 f5 19 60 fe | IKEv2 nonce 7b e1 dc a7 b1 57 f0 2b 9f 4f 7d 83 f4 f5 26 e7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e9 cc 03 7c e4 bf 38 4d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c3 | natd_hash: port= 01 f4 | natd_hash: hash= 60 0e 85 7e 12 27 fe f4 c2 99 71 9b 7e 21 7b 45 | natd_hash: hash= a0 57 b5 9c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 60 0e 85 7e 12 27 fe f4 c2 99 71 9b 7e 21 7b 45 | Notify data a0 57 b5 9c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e9 cc 03 7c e4 bf 38 4d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f0 35 c9 a1 8e 9b d2 fc 27 bf 2e d5 3b 0c 2d 8b | natd_hash: hash= c9 9a 4f 06 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f0 35 c9 a1 8e 9b d2 fc 27 bf 2e d5 3b 0c 2d 8b | Notify data c9 9a 4f 06 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #717 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #717 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #717 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #717: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #717 to 4294967295 after switching state | Message ID: IKE #717 skipping update_recv as MD is fake | Message ID: sent #717 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-195" #717: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.195:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #717) | e9 cc 03 7c e4 bf 38 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 0d 73 a5 88 38 ec a8 b6 b3 23 50 23 2d 53 9c | f5 59 45 c5 2c 5d 29 a6 50 ea 35 cd ff a5 c3 82 | 38 04 6e 7c 97 76 33 80 5e 2e f5 c7 20 1d 6d 52 | 54 d4 c8 43 d2 e6 b1 e4 c1 91 68 e9 90 9b 22 d4 | 83 38 49 6a 85 b6 95 48 9d 37 d5 48 27 0e 06 98 | 9a ac f5 b2 ed 13 5b 90 8e eb 62 80 51 7d 18 ee | 32 25 77 49 32 8f 44 94 81 26 5d 5f 72 27 8e 3a | 3d 60 20 38 fe 19 ba a8 04 69 ba 2a 74 5a 42 77 | 2f 99 5b 7a b9 a8 61 7a f1 75 11 5b a2 50 cd 53 | 3e c5 95 48 2d 5a 37 b9 4e c2 b7 10 0b 09 f4 4b | bc cd c9 0e 10 07 92 ed 69 ad 1e f1 95 18 c1 9a | 1e ea 66 8b 35 9c 7c a7 b1 0e 8e b5 d5 47 b6 9e | 92 8b a0 cf f4 db 96 37 1e 82 84 04 16 36 81 77 | 8c 3e 2c e7 86 0a bd c6 dd 95 c1 6b fe 52 5f 2a | 76 45 bb fe 23 c6 23 bc e6 64 3e f3 0c 6a 8e 66 | 27 65 38 a3 1e 94 62 d7 e1 4e 78 ef 7d 9b 33 59 | 29 00 00 24 84 76 67 8c e9 66 d9 97 e2 c1 c3 44 | f5 19 60 fe 7b e1 dc a7 b1 57 f0 2b 9f 4f 7d 83 | f4 f5 26 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 0e 85 7e 12 27 fe f4 c2 99 71 9b | 7e 21 7b 45 a0 57 b5 9c 00 00 00 1c 00 00 40 05 | f0 35 c9 a1 8e 9b d2 fc 27 bf 2e d5 3b 0c 2d 8b | c9 9a 4f 06 | state #717 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35403a770 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35400f1f0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400f1f0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #717 | libevent_malloc: new ptr-libevent@0x7fb36c08dbf0 size 128 | #717 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.222454 | resume sending helper answer for #717 suppresed complete_v2_state_transition() and stole MD | #717 spent 0.478 milliseconds in resume sending helper answer | stop processing: state #717 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb33808a5d0 | processing resume sending helper answer for #739 | start processing: state #739 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 739 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #739 | **emit ISAKMP Message: | initiator cookie: | df 19 f5 78 1f 7f 61 d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-224 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 99 b4 0b bb a9 64 88 87 98 2f cf 2f 72 90 24 8e | ikev2 g^x 27 68 e4 41 53 39 08 7e 9a 9d 01 79 8c 46 b5 7e | ikev2 g^x 94 53 70 3e b0 27 b2 82 8a 26 9d e8 0b 19 4b 92 | ikev2 g^x 2b 7d b3 c3 c4 b5 0b 70 2b 92 ac 96 4c 0c 66 2f | ikev2 g^x d2 61 eb 15 ed 06 25 36 5e 2a 3f a8 42 0d d0 94 | ikev2 g^x ae 7d 6f 48 35 8f 38 64 d1 29 e3 a9 12 a1 3b 9a | ikev2 g^x 37 6f f0 36 59 2c 69 bd c2 85 29 7c f5 fb fd db | ikev2 g^x 33 21 05 b9 47 40 46 26 f2 67 5e de 98 c9 70 43 | ikev2 g^x 38 06 63 f6 fd d0 82 9d 53 05 3c 2c 8e 1c cc 05 | ikev2 g^x 21 99 f3 4f 03 c8 cd 4f 9b 06 f6 fa f8 36 e3 35 | ikev2 g^x 25 9b ee fa bd e1 7b 3c 24 42 c1 43 67 a4 52 26 | ikev2 g^x c9 ad a5 ca 68 eb 61 44 9f 85 d4 ad 39 d3 08 f8 | ikev2 g^x 0c 18 de 7d 80 97 a9 b0 17 1e dc 70 64 63 2c 0d | ikev2 g^x bd e4 be 7a df c7 e0 58 87 37 3d c3 42 94 6e f1 | ikev2 g^x 48 66 02 c3 74 33 ab 1e 5e 12 8d 34 8d 1f 0b 16 | ikev2 g^x f3 77 bb 3c fe eb 42 5e 87 af e0 78 62 33 b9 fc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce fc 37 68 c7 2d 53 22 1d 51 4a 71 4e 46 28 97 f7 | IKEv2 nonce 6a 0d 4a 96 60 fa 96 05 69 86 9a bc f2 f0 69 27 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= df 19 f5 78 1f 7f 61 d5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e0 | natd_hash: port= 01 f4 | natd_hash: hash= e0 2a f2 c4 e2 df 1f 60 02 ec 7a 42 09 ed ca d8 | natd_hash: hash= 77 e1 6d 1c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e0 2a f2 c4 e2 df 1f 60 02 ec 7a 42 09 ed ca d8 | Notify data 77 e1 6d 1c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= df 19 f5 78 1f 7f 61 d5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4f 71 3a 48 ff b5 1c f9 41 72 89 68 75 9e 7b ee | natd_hash: hash= 5e b8 7a 66 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4f 71 3a 48 ff b5 1c f9 41 72 89 68 75 9e 7b ee | Notify data 5e b8 7a 66 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #739 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #739 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #739 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #739: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #739 to 4294967295 after switching state | Message ID: IKE #739 skipping update_recv as MD is fake | Message ID: sent #739 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-224" #739: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.224:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #739) | df 19 f5 78 1f 7f 61 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 b4 0b bb a9 64 88 87 98 2f cf 2f 72 90 24 8e | 27 68 e4 41 53 39 08 7e 9a 9d 01 79 8c 46 b5 7e | 94 53 70 3e b0 27 b2 82 8a 26 9d e8 0b 19 4b 92 | 2b 7d b3 c3 c4 b5 0b 70 2b 92 ac 96 4c 0c 66 2f | d2 61 eb 15 ed 06 25 36 5e 2a 3f a8 42 0d d0 94 | ae 7d 6f 48 35 8f 38 64 d1 29 e3 a9 12 a1 3b 9a | 37 6f f0 36 59 2c 69 bd c2 85 29 7c f5 fb fd db | 33 21 05 b9 47 40 46 26 f2 67 5e de 98 c9 70 43 | 38 06 63 f6 fd d0 82 9d 53 05 3c 2c 8e 1c cc 05 | 21 99 f3 4f 03 c8 cd 4f 9b 06 f6 fa f8 36 e3 35 | 25 9b ee fa bd e1 7b 3c 24 42 c1 43 67 a4 52 26 | c9 ad a5 ca 68 eb 61 44 9f 85 d4 ad 39 d3 08 f8 | 0c 18 de 7d 80 97 a9 b0 17 1e dc 70 64 63 2c 0d | bd e4 be 7a df c7 e0 58 87 37 3d c3 42 94 6e f1 | 48 66 02 c3 74 33 ab 1e 5e 12 8d 34 8d 1f 0b 16 | f3 77 bb 3c fe eb 42 5e 87 af e0 78 62 33 b9 fc | 29 00 00 24 fc 37 68 c7 2d 53 22 1d 51 4a 71 4e | 46 28 97 f7 6a 0d 4a 96 60 fa 96 05 69 86 9a bc | f2 f0 69 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e0 2a f2 c4 e2 df 1f 60 02 ec 7a 42 | 09 ed ca d8 77 e1 6d 1c 00 00 00 1c 00 00 40 05 | 4f 71 3a 48 ff b5 1c f9 41 72 89 68 75 9e 7b ee | 5e b8 7a 66 | state #739 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374034da0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a45350 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45350 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #739 | libevent_malloc: new ptr-libevent@0x7fb33808a5d0 size 128 | #739 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.222844 | resume sending helper answer for #739 suppresed complete_v2_state_transition() and stole MD | #739 spent 0.36 milliseconds in resume sending helper answer | stop processing: state #739 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3540906c0 | processing resume sending helper answer for #716 | start processing: state #716 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 716 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #716 | **emit ISAKMP Message: | initiator cookie: | 15 cc 63 e1 75 96 2f 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-205 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 36 dc 43 34 c1 27 75 84 11 ed 21 f4 e0 64 42 f7 | ikev2 g^x c1 3e 43 b3 2e 58 fc be 1b bc 53 63 f4 17 1c 6e | ikev2 g^x 5a 45 c6 f0 ee d5 d4 c6 e3 d7 81 ef f2 fc 94 66 | ikev2 g^x 39 e4 1e d2 9b 3e c7 28 c2 8b bd 93 f2 64 11 f3 | ikev2 g^x 6d 23 8a cd c0 e1 82 ee 9f 75 ce e2 44 b6 22 97 | ikev2 g^x b0 c8 8e 1c c2 54 f6 e5 b0 5a 7c be f1 58 3b af | ikev2 g^x 05 be 31 c0 84 4a ea f9 f1 d6 8f c9 37 52 41 dc | ikev2 g^x 85 26 42 e2 6b 91 5c 08 46 f5 3a 3f 3e 0c a3 55 | ikev2 g^x 9a 1f 55 f0 63 1e 9b 9f b7 db 3f a7 92 12 e2 1c | ikev2 g^x 71 2e e6 9d 0c 47 67 7e f1 af bc 6a f8 c7 1a de | ikev2 g^x 1b cb c2 40 86 c2 28 a1 ad 88 3e 5e b7 2c dd 98 | ikev2 g^x a7 93 94 47 b6 7a 9a 3f be ca 7f 22 14 8e 7e 92 | ikev2 g^x 47 e5 43 10 40 3b 02 34 62 d6 f9 32 a9 14 c7 88 | ikev2 g^x a6 fc a7 e6 13 8f 48 a9 3c 09 bc 34 a6 f2 66 32 | ikev2 g^x 93 05 6b 00 f2 c3 6e 0d b4 b4 e6 20 5c 15 86 46 | ikev2 g^x ac a1 7d 60 75 3b b9 68 18 8d c8 ea 5e c4 4c 21 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 50 21 0d 31 fe d3 b4 a7 ac 53 44 3d ea f7 97 43 | IKEv2 nonce 73 d7 d9 9e ec bb 48 86 85 79 7b 5b 1e 65 bb 90 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 15 cc 63 e1 75 96 2f 68 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 cd | natd_hash: port= 01 f4 | natd_hash: hash= f2 9d 08 f6 6e 7f ce e0 5c 6f 3f b3 3b aa bc 8d | natd_hash: hash= 53 41 77 8e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f2 9d 08 f6 6e 7f ce e0 5c 6f 3f b3 3b aa bc 8d | Notify data 53 41 77 8e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 15 cc 63 e1 75 96 2f 68 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6d 9d 29 89 37 a0 02 51 09 39 ed 22 b1 d6 21 cb | natd_hash: hash= f4 e3 b2 ae | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6d 9d 29 89 37 a0 02 51 09 39 ed 22 b1 d6 21 cb | Notify data f4 e3 b2 ae | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #716 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #716 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #716 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #716: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #716 to 4294967295 after switching state | Message ID: IKE #716 skipping update_recv as MD is fake | Message ID: sent #716 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-205" #716: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.205:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #716) | 15 cc 63 e1 75 96 2f 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 dc 43 34 c1 27 75 84 11 ed 21 f4 e0 64 42 f7 | c1 3e 43 b3 2e 58 fc be 1b bc 53 63 f4 17 1c 6e | 5a 45 c6 f0 ee d5 d4 c6 e3 d7 81 ef f2 fc 94 66 | 39 e4 1e d2 9b 3e c7 28 c2 8b bd 93 f2 64 11 f3 | 6d 23 8a cd c0 e1 82 ee 9f 75 ce e2 44 b6 22 97 | b0 c8 8e 1c c2 54 f6 e5 b0 5a 7c be f1 58 3b af | 05 be 31 c0 84 4a ea f9 f1 d6 8f c9 37 52 41 dc | 85 26 42 e2 6b 91 5c 08 46 f5 3a 3f 3e 0c a3 55 | 9a 1f 55 f0 63 1e 9b 9f b7 db 3f a7 92 12 e2 1c | 71 2e e6 9d 0c 47 67 7e f1 af bc 6a f8 c7 1a de | 1b cb c2 40 86 c2 28 a1 ad 88 3e 5e b7 2c dd 98 | a7 93 94 47 b6 7a 9a 3f be ca 7f 22 14 8e 7e 92 | 47 e5 43 10 40 3b 02 34 62 d6 f9 32 a9 14 c7 88 | a6 fc a7 e6 13 8f 48 a9 3c 09 bc 34 a6 f2 66 32 | 93 05 6b 00 f2 c3 6e 0d b4 b4 e6 20 5c 15 86 46 | ac a1 7d 60 75 3b b9 68 18 8d c8 ea 5e c4 4c 21 | 29 00 00 24 50 21 0d 31 fe d3 b4 a7 ac 53 44 3d | ea f7 97 43 73 d7 d9 9e ec bb 48 86 85 79 7b 5b | 1e 65 bb 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 9d 08 f6 6e 7f ce e0 5c 6f 3f b3 | 3b aa bc 8d 53 41 77 8e 00 00 00 1c 00 00 40 05 | 6d 9d 29 89 37 a0 02 51 09 39 ed 22 b1 d6 21 cb | f4 e3 b2 ae | state #716 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb364024ff0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2cb90 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #716 | libevent_malloc: new ptr-libevent@0x7fb3540906c0 size 128 | #716 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.223189 | resume sending helper answer for #716 suppresed complete_v2_state_transition() and stole MD | #716 spent 0.312 milliseconds in resume sending helper answer | stop processing: state #716 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb344074e80 | processing resume sending helper answer for #750 | start processing: state #750 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 750 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #750 | **emit ISAKMP Message: | initiator cookie: | 66 c6 fb f7 91 6b fb df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-251 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2d 56 4e 6a bf ea d7 ce 8c c5 13 f2 30 fd 41 ab | ikev2 g^x 3e d8 84 16 5c 00 fd 63 27 ec 37 f8 37 ca a8 cf | ikev2 g^x 61 e7 66 f0 cb a2 7d 48 60 51 06 3b ad 0f 96 30 | ikev2 g^x be 5d 4e d4 5e 3e 0f e2 92 ad ec cf 0b 28 1c a1 | ikev2 g^x 4d e9 8b 14 d6 a5 00 40 0b a2 42 6d 65 44 52 2a | ikev2 g^x ed 7b a2 a6 f1 52 01 55 50 fe 38 4d d1 1e 2c 17 | ikev2 g^x 6d dd 7a c3 13 e2 07 81 a0 94 d9 59 df 56 84 98 | ikev2 g^x c0 ad 91 50 e1 93 ec 06 ee 42 aa de c1 18 3f 59 | ikev2 g^x d8 25 7b 7d 03 a8 7e 0b 39 bd 42 00 e3 0b 12 a9 | ikev2 g^x 4a eb 7b cb 8d 49 f5 09 cf 9b 5d e6 19 4e c2 da | ikev2 g^x 42 79 15 bb 81 d0 dc b8 5a e8 5e 28 c3 da 56 65 | ikev2 g^x 77 9c 71 c2 ab 7d 10 b7 63 49 54 6f aa e7 23 17 | ikev2 g^x b2 9a 50 85 92 a3 09 71 79 f6 65 dd 01 fe bd 61 | ikev2 g^x 08 e7 af f9 f6 a9 e5 aa 68 45 84 c6 4c 79 c7 30 | ikev2 g^x ab 0d dd fd 10 65 03 5c 7a 2c 09 2f 85 16 4e ff | ikev2 g^x 01 45 23 1d b3 99 fd e2 fa 7d 09 11 f6 28 34 a9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 75 d2 7b 7e 78 57 6c 86 0e 7d 5d dd 33 fe 29 2d | IKEv2 nonce 0e ba 6e e8 a4 16 ad c2 25 40 f7 7b e3 c5 56 88 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 66 c6 fb f7 91 6b fb df | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 fb | natd_hash: port= 01 f4 | natd_hash: hash= f2 5e f7 09 e0 61 ab 7d 99 d0 bc 4e 5c 13 08 f6 | natd_hash: hash= 77 48 36 b9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f2 5e f7 09 e0 61 ab 7d 99 d0 bc 4e 5c 13 08 f6 | Notify data 77 48 36 b9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 66 c6 fb f7 91 6b fb df | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 33 e2 5b 26 c7 f6 e2 7a ac c6 74 73 96 13 44 cb | natd_hash: hash= f2 2a 57 fe | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 33 e2 5b 26 c7 f6 e2 7a ac c6 74 73 96 13 44 cb | Notify data f2 2a 57 fe | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #750 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #750 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #750 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #750: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #750 to 4294967295 after switching state | Message ID: IKE #750 skipping update_recv as MD is fake | Message ID: sent #750 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-251" #750: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.251:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #750) | 66 c6 fb f7 91 6b fb df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 56 4e 6a bf ea d7 ce 8c c5 13 f2 30 fd 41 ab | 3e d8 84 16 5c 00 fd 63 27 ec 37 f8 37 ca a8 cf | 61 e7 66 f0 cb a2 7d 48 60 51 06 3b ad 0f 96 30 | be 5d 4e d4 5e 3e 0f e2 92 ad ec cf 0b 28 1c a1 | 4d e9 8b 14 d6 a5 00 40 0b a2 42 6d 65 44 52 2a | ed 7b a2 a6 f1 52 01 55 50 fe 38 4d d1 1e 2c 17 | 6d dd 7a c3 13 e2 07 81 a0 94 d9 59 df 56 84 98 | c0 ad 91 50 e1 93 ec 06 ee 42 aa de c1 18 3f 59 | d8 25 7b 7d 03 a8 7e 0b 39 bd 42 00 e3 0b 12 a9 | 4a eb 7b cb 8d 49 f5 09 cf 9b 5d e6 19 4e c2 da | 42 79 15 bb 81 d0 dc b8 5a e8 5e 28 c3 da 56 65 | 77 9c 71 c2 ab 7d 10 b7 63 49 54 6f aa e7 23 17 | b2 9a 50 85 92 a3 09 71 79 f6 65 dd 01 fe bd 61 | 08 e7 af f9 f6 a9 e5 aa 68 45 84 c6 4c 79 c7 30 | ab 0d dd fd 10 65 03 5c 7a 2c 09 2f 85 16 4e ff | 01 45 23 1d b3 99 fd e2 fa 7d 09 11 f6 28 34 a9 | 29 00 00 24 75 d2 7b 7e 78 57 6c 86 0e 7d 5d dd | 33 fe 29 2d 0e ba 6e e8 a4 16 ad c2 25 40 f7 7b | e3 c5 56 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 5e f7 09 e0 61 ab 7d 99 d0 bc 4e | 5c 13 08 f6 77 48 36 b9 00 00 00 1c 00 00 40 05 | 33 e2 5b 26 c7 f6 e2 7a ac c6 74 73 96 13 44 cb | f2 2a 57 fe | state #750 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36804b850 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a6b490 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #750 | libevent_malloc: new ptr-libevent@0x7fb344074e80 size 128 | #750 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.223633 | resume sending helper answer for #750 suppresed complete_v2_state_transition() and stole MD | #750 spent 0.42 milliseconds in resume sending helper answer | stop processing: state #750 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c039e20 | processing resume sending helper answer for #733 | start processing: state #733 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 733 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #733 | **emit ISAKMP Message: | initiator cookie: | c0 b4 40 a7 90 2d ff 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-220 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b7 3d 1c 6b d8 c6 0e 19 a3 7b 9f 82 56 a2 60 d8 | ikev2 g^x ed c3 69 a1 b8 27 54 67 fa 08 0b 9c 2f df a1 84 | ikev2 g^x a3 ea 36 06 89 65 b4 8a 8b b1 53 43 55 1c 2d 9c | ikev2 g^x 45 3c 53 4e 14 b2 1b 7c 54 9f cf 33 2b d7 a1 7f | ikev2 g^x b2 02 42 3d c7 e2 52 e4 03 b6 91 b3 0a 4b 65 e3 | ikev2 g^x 2d 56 d1 33 02 80 68 64 bf e9 65 5e 1c 3c 0e 4e | ikev2 g^x 38 e8 a0 52 6d 84 dc 3a 40 77 a2 99 57 22 be f9 | ikev2 g^x 21 b5 b9 99 7a 73 41 8f bf c0 86 4e a6 c0 45 d1 | ikev2 g^x 82 aa e5 df 8b fa 84 00 fe f2 93 c1 f7 20 82 cd | ikev2 g^x fb 46 94 df db 19 f0 51 0e 9a 5a 9e 48 37 67 ac | ikev2 g^x 46 6d e7 b4 4d 86 4b 1e 9e 7b d3 75 96 a3 a2 a6 | ikev2 g^x 2f a5 5d c9 1a f7 81 bf 8c c3 9a 0d 30 20 4a 43 | ikev2 g^x e0 86 4e 21 5d 25 a1 95 77 9e fb 93 fd 1b 22 6c | ikev2 g^x d4 f7 f2 14 a8 af 6c 58 ec c1 bb 6c 8a db 27 a0 | ikev2 g^x e6 7f 0c 48 39 29 47 c2 4d e2 32 e9 73 91 20 fe | ikev2 g^x 20 a5 dd 53 0f 69 f5 d6 ac 97 fa 75 83 38 83 1b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 38 98 a0 0a e9 5b ce bb 7c 0c e3 8b 78 bd d8 2c | IKEv2 nonce 72 cb ed 4b ee c0 17 92 29 bf 4c 66 8b 54 88 97 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c0 b4 40 a7 90 2d ff 45 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 dc | natd_hash: port= 01 f4 | natd_hash: hash= 2b 90 59 ab 91 26 aa 5f b9 4e 61 e7 ac 87 e3 ab | natd_hash: hash= ff 33 ec 91 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2b 90 59 ab 91 26 aa 5f b9 4e 61 e7 ac 87 e3 ab | Notify data ff 33 ec 91 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c0 b4 40 a7 90 2d ff 45 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ba 8b 12 fb af ac eb b8 53 0c d2 71 52 5e 48 aa | natd_hash: hash= 61 61 f1 39 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ba 8b 12 fb af ac eb b8 53 0c d2 71 52 5e 48 aa | Notify data 61 61 f1 39 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #733 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #733 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #733 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #733: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #733 to 4294967295 after switching state | Message ID: IKE #733 skipping update_recv as MD is fake | Message ID: sent #733 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-220" #733: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.220:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #733) | c0 b4 40 a7 90 2d ff 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 3d 1c 6b d8 c6 0e 19 a3 7b 9f 82 56 a2 60 d8 | ed c3 69 a1 b8 27 54 67 fa 08 0b 9c 2f df a1 84 | a3 ea 36 06 89 65 b4 8a 8b b1 53 43 55 1c 2d 9c | 45 3c 53 4e 14 b2 1b 7c 54 9f cf 33 2b d7 a1 7f | b2 02 42 3d c7 e2 52 e4 03 b6 91 b3 0a 4b 65 e3 | 2d 56 d1 33 02 80 68 64 bf e9 65 5e 1c 3c 0e 4e | 38 e8 a0 52 6d 84 dc 3a 40 77 a2 99 57 22 be f9 | 21 b5 b9 99 7a 73 41 8f bf c0 86 4e a6 c0 45 d1 | 82 aa e5 df 8b fa 84 00 fe f2 93 c1 f7 20 82 cd | fb 46 94 df db 19 f0 51 0e 9a 5a 9e 48 37 67 ac | 46 6d e7 b4 4d 86 4b 1e 9e 7b d3 75 96 a3 a2 a6 | 2f a5 5d c9 1a f7 81 bf 8c c3 9a 0d 30 20 4a 43 | e0 86 4e 21 5d 25 a1 95 77 9e fb 93 fd 1b 22 6c | d4 f7 f2 14 a8 af 6c 58 ec c1 bb 6c 8a db 27 a0 | e6 7f 0c 48 39 29 47 c2 4d e2 32 e9 73 91 20 fe | 20 a5 dd 53 0f 69 f5 d6 ac 97 fa 75 83 38 83 1b | 29 00 00 24 38 98 a0 0a e9 5b ce bb 7c 0c e3 8b | 78 bd d8 2c 72 cb ed 4b ee c0 17 92 29 bf 4c 66 | 8b 54 88 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 90 59 ab 91 26 aa 5f b9 4e 61 e7 | ac 87 e3 ab ff 33 ec 91 00 00 00 1c 00 00 40 05 | ba 8b 12 fb af ac eb b8 53 0c d2 71 52 5e 48 aa | 61 61 f1 39 | state #733 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3800223c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb380009ed0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380009ed0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #733 | libevent_malloc: new ptr-libevent@0x7fb3800223c0 size 128 | #733 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.224164 | resume sending helper answer for #733 suppresed complete_v2_state_transition() and stole MD | #733 spent 0.478 milliseconds in resume sending helper answer | stop processing: state #733 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35807ebf0 | processing resume sending helper answer for #743 | start processing: state #743 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 743 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #743 | **emit ISAKMP Message: | initiator cookie: | 33 68 6a 0b 04 fc 21 19 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-233 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3d 54 1f 6f 5a 66 3f c1 42 1d 47 28 fc 43 9c 32 | ikev2 g^x a7 7f fc 41 a3 9c cc 7a 93 57 ab c6 8a a7 f4 3e | ikev2 g^x 46 34 bd 6b 98 5f 8e a7 fe 4c 9b 90 ee 04 ee 86 | ikev2 g^x 42 1c 02 b1 27 a7 b0 01 e0 8a 3e cf cb 39 6b a0 | ikev2 g^x 4b a4 c4 0c 65 cc 28 25 a4 ad 65 49 aa 92 21 1a | ikev2 g^x 8f a6 23 05 37 8d 6e d1 a2 88 57 12 d3 e8 bd 69 | ikev2 g^x 1c c9 0b 75 f5 df 2d 58 5e a5 72 a2 fb 4c ca 52 | ikev2 g^x 9f 85 66 7f 63 b8 02 bf d7 3e a0 09 53 f4 72 19 | ikev2 g^x 87 d5 3c cb be 53 b9 59 65 7c de 29 3e 98 f6 97 | ikev2 g^x 02 6b 58 24 68 71 6e 3b d0 92 ea b1 ac 32 a9 28 | ikev2 g^x 8e 3a 77 35 b3 34 3c 3d ad 6e 6a 29 9b b7 88 7b | ikev2 g^x 86 bb 62 15 16 30 35 3d 78 71 08 9c bb d0 51 c0 | ikev2 g^x 23 56 79 b7 91 8c 7a d0 c1 ec f6 00 b7 6f 72 d8 | ikev2 g^x 4c 61 2d 3e 9f 3d 71 4d ce 0f 50 83 03 11 bb 0a | ikev2 g^x 99 e2 07 9c b6 80 4a 86 5a 9a aa 9c 1b 0a e1 e2 | ikev2 g^x e8 d9 11 28 45 53 df c8 4d 16 ae c0 7c 32 f4 11 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1a c2 58 3c 56 a7 f0 5a d9 b8 5a 6b cc b3 c9 3f | IKEv2 nonce ec 7f b9 16 85 28 70 f6 0a 4a 2a 42 e9 0f c0 6f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 33 68 6a 0b 04 fc 21 19 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e9 | natd_hash: port= 01 f4 | natd_hash: hash= 2d 52 f6 73 3d e6 8e 99 7b ad bf dc 06 39 16 3e | natd_hash: hash= d4 a9 07 80 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2d 52 f6 73 3d e6 8e 99 7b ad bf dc 06 39 16 3e | Notify data d4 a9 07 80 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 33 68 6a 0b 04 fc 21 19 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d3 9b 09 18 b0 e4 0a b6 7c 3b a5 fa dc 8a ee 1d | natd_hash: hash= 09 1b 83 75 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d3 9b 09 18 b0 e4 0a b6 7c 3b a5 fa dc 8a ee 1d | Notify data 09 1b 83 75 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #743 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #743 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #743 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #743: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #743 to 4294967295 after switching state | Message ID: IKE #743 skipping update_recv as MD is fake | Message ID: sent #743 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-233" #743: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.233:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #743) | 33 68 6a 0b 04 fc 21 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 54 1f 6f 5a 66 3f c1 42 1d 47 28 fc 43 9c 32 | a7 7f fc 41 a3 9c cc 7a 93 57 ab c6 8a a7 f4 3e | 46 34 bd 6b 98 5f 8e a7 fe 4c 9b 90 ee 04 ee 86 | 42 1c 02 b1 27 a7 b0 01 e0 8a 3e cf cb 39 6b a0 | 4b a4 c4 0c 65 cc 28 25 a4 ad 65 49 aa 92 21 1a | 8f a6 23 05 37 8d 6e d1 a2 88 57 12 d3 e8 bd 69 | 1c c9 0b 75 f5 df 2d 58 5e a5 72 a2 fb 4c ca 52 | 9f 85 66 7f 63 b8 02 bf d7 3e a0 09 53 f4 72 19 | 87 d5 3c cb be 53 b9 59 65 7c de 29 3e 98 f6 97 | 02 6b 58 24 68 71 6e 3b d0 92 ea b1 ac 32 a9 28 | 8e 3a 77 35 b3 34 3c 3d ad 6e 6a 29 9b b7 88 7b | 86 bb 62 15 16 30 35 3d 78 71 08 9c bb d0 51 c0 | 23 56 79 b7 91 8c 7a d0 c1 ec f6 00 b7 6f 72 d8 | 4c 61 2d 3e 9f 3d 71 4d ce 0f 50 83 03 11 bb 0a | 99 e2 07 9c b6 80 4a 86 5a 9a aa 9c 1b 0a e1 e2 | e8 d9 11 28 45 53 df c8 4d 16 ae c0 7c 32 f4 11 | 29 00 00 24 1a c2 58 3c 56 a7 f0 5a d9 b8 5a 6b | cc b3 c9 3f ec 7f b9 16 85 28 70 f6 0a 4a 2a 42 | e9 0f c0 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 52 f6 73 3d e6 8e 99 7b ad bf dc | 06 39 16 3e d4 a9 07 80 00 00 00 1c 00 00 40 05 | d3 9b 09 18 b0 e4 0a b6 7c 3b a5 fa dc 8a ee 1d | 09 1b 83 75 | state #743 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb368023a60 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a647d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a647d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #743 | libevent_malloc: new ptr-libevent@0x7fb35807ebf0 size 128 | #743 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.224502 | resume sending helper answer for #743 suppresed complete_v2_state_transition() and stole MD | #743 spent 0.297 milliseconds in resume sending helper answer | stop processing: state #743 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3640a6860 | processing resume sending helper answer for #735 | start processing: state #735 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 735 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #735 | **emit ISAKMP Message: | initiator cookie: | 53 89 83 1d 48 ce 70 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-238 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5a 91 4f e8 ba d0 cf 5a d7 f0 71 fa 46 1a 8a e8 | ikev2 g^x 7d 4a be de 38 b6 47 be 9f b9 8a 22 46 d2 62 91 | ikev2 g^x ca 86 42 c6 77 2f 59 d3 e4 f2 fa 15 7b 3c 27 33 | ikev2 g^x 0c 23 b9 e7 b5 8a b0 8e ec c6 a4 80 d5 32 f2 16 | ikev2 g^x 21 6f 71 5d b4 75 f3 73 d3 f0 4b af 90 08 5b 92 | ikev2 g^x bd 52 84 33 aa 3b 00 4e e0 dc 9e 9b 5c e1 64 90 | ikev2 g^x 46 3d eb f8 93 ab a4 6e 46 c2 33 ef fc 8b d9 14 | ikev2 g^x f9 38 bb 1f e7 fc 89 8f 65 b1 d8 35 5e 99 68 8b | ikev2 g^x 32 06 43 77 f7 fb 44 87 13 38 82 0c ff 88 57 fb | ikev2 g^x f3 b5 78 4d 2f ac 61 eb 6d cb cb e1 13 98 c8 fa | ikev2 g^x 56 54 e2 54 39 9d 99 08 4b 53 de 03 86 18 ea f1 | ikev2 g^x 33 cf bb 45 1d 44 4f fa bc 18 e5 13 24 71 58 c8 | ikev2 g^x a7 32 0b 95 3a 6d 89 f1 b7 95 86 7b 38 71 2b d7 | ikev2 g^x d3 e8 9a bf 1d 2d e6 e7 fe 5f 9d 7e 67 88 57 56 | ikev2 g^x 5a 53 49 ca 89 7f 95 e0 bd 0a 6b 9b e1 e9 d3 17 | ikev2 g^x 9d 45 18 8b 68 cc de 5a 3c 70 99 6e f6 36 78 b9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9d 95 cb 46 13 9a 6a 64 e7 15 0c 4c dc d4 c0 de | IKEv2 nonce a5 95 63 82 d6 ca 4a 90 78 69 d3 72 e7 c1 f1 39 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 53 89 83 1d 48 ce 70 7b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ee | natd_hash: port= 01 f4 | natd_hash: hash= 5c cd 3c 21 f0 20 2e 88 28 a9 40 54 19 d9 0a 26 | natd_hash: hash= 35 63 bc e9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5c cd 3c 21 f0 20 2e 88 28 a9 40 54 19 d9 0a 26 | Notify data 35 63 bc e9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 53 89 83 1d 48 ce 70 7b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4d 3d eb 4a 56 ab 16 38 35 e8 7a d1 b0 99 53 b5 | natd_hash: hash= 30 cb 3d 6b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4d 3d eb 4a 56 ab 16 38 35 e8 7a d1 b0 99 53 b5 | Notify data 30 cb 3d 6b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #735 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #735 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #735 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #735: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #735 to 4294967295 after switching state | Message ID: IKE #735 skipping update_recv as MD is fake | Message ID: sent #735 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-238" #735: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.238:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #735) | 53 89 83 1d 48 ce 70 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a 91 4f e8 ba d0 cf 5a d7 f0 71 fa 46 1a 8a e8 | 7d 4a be de 38 b6 47 be 9f b9 8a 22 46 d2 62 91 | ca 86 42 c6 77 2f 59 d3 e4 f2 fa 15 7b 3c 27 33 | 0c 23 b9 e7 b5 8a b0 8e ec c6 a4 80 d5 32 f2 16 | 21 6f 71 5d b4 75 f3 73 d3 f0 4b af 90 08 5b 92 | bd 52 84 33 aa 3b 00 4e e0 dc 9e 9b 5c e1 64 90 | 46 3d eb f8 93 ab a4 6e 46 c2 33 ef fc 8b d9 14 | f9 38 bb 1f e7 fc 89 8f 65 b1 d8 35 5e 99 68 8b | 32 06 43 77 f7 fb 44 87 13 38 82 0c ff 88 57 fb | f3 b5 78 4d 2f ac 61 eb 6d cb cb e1 13 98 c8 fa | 56 54 e2 54 39 9d 99 08 4b 53 de 03 86 18 ea f1 | 33 cf bb 45 1d 44 4f fa bc 18 e5 13 24 71 58 c8 | a7 32 0b 95 3a 6d 89 f1 b7 95 86 7b 38 71 2b d7 | d3 e8 9a bf 1d 2d e6 e7 fe 5f 9d 7e 67 88 57 56 | 5a 53 49 ca 89 7f 95 e0 bd 0a 6b 9b e1 e9 d3 17 | 9d 45 18 8b 68 cc de 5a 3c 70 99 6e f6 36 78 b9 | 29 00 00 24 9d 95 cb 46 13 9a 6a 64 e7 15 0c 4c | dc d4 c0 de a5 95 63 82 d6 ca 4a 90 78 69 d3 72 | e7 c1 f1 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c cd 3c 21 f0 20 2e 88 28 a9 40 54 | 19 d9 0a 26 35 63 bc e9 00 00 00 1c 00 00 40 05 | 4d 3d eb 4a 56 ab 16 38 35 e8 7a d1 b0 99 53 b5 | 30 cb 3d 6b | state #735 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c01a4e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46abbc00 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #735 | libevent_malloc: new ptr-libevent@0x7fb3640a6860 size 128 | #735 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.224829 | resume sending helper answer for #735 suppresed complete_v2_state_transition() and stole MD | #735 spent 0.305 milliseconds in resume sending helper answer | stop processing: state #735 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb384086f10 | processing resume sending helper answer for #737 | start processing: state #737 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 737 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #737 | **emit ISAKMP Message: | initiator cookie: | 62 bc 01 e6 ef 5b 20 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-189 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f3 66 85 a0 b2 da 45 c4 c8 86 e8 bb 58 04 8f 23 | ikev2 g^x c5 98 b3 86 8c d9 3d e0 66 ea fd 6e 98 4b e0 01 | ikev2 g^x 77 7e 62 b4 42 d4 3c 39 34 2b 32 9b 48 02 57 f1 | ikev2 g^x 43 d9 98 13 95 5e 59 11 5e 01 ff c9 1c bf 20 5a | ikev2 g^x 97 da 26 ae e7 18 db f7 f0 a0 b8 39 fa b2 27 ca | ikev2 g^x 76 61 93 73 f9 9f 90 66 03 e2 33 bb d1 e7 63 33 | ikev2 g^x f7 1f 47 9d 66 dd ce 29 e2 ce fc 79 7d e1 df bf | ikev2 g^x dc 9e e5 af eb e9 5f a2 61 50 44 f7 b3 6f 62 6a | ikev2 g^x 00 64 f2 03 7d a9 73 95 eb b3 13 a0 cd 38 e6 bc | ikev2 g^x e6 82 cc 57 4f 84 63 cc 7c 55 1b ca b1 df c8 fb | ikev2 g^x 40 3b 1d 30 71 fc d6 dd b0 87 15 c1 2d 4f 62 0a | ikev2 g^x d3 3f bd e6 06 ca 4b 23 74 c6 f0 8a 6c 6c 87 c0 | ikev2 g^x a3 d6 77 77 fe 47 ed a9 72 bd 08 ac d9 3e 17 96 | ikev2 g^x 30 05 c0 a7 7a 4d 24 f3 62 68 cf 5a 4b 4a 82 ce | ikev2 g^x 23 28 f5 14 67 63 ea 32 5f 7d 39 c5 98 d8 43 3b | ikev2 g^x d9 8b c6 31 05 9d c5 e0 94 47 37 b4 5b 9f 31 c8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 05 60 52 c6 c7 57 70 5a 1b 6b 34 82 b5 50 99 7f | IKEv2 nonce 74 f0 48 4f 7c 17 db cd 98 c0 39 1a e7 e2 cb 18 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 62 bc 01 e6 ef 5b 20 48 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 bd | natd_hash: port= 01 f4 | natd_hash: hash= 55 ce 96 b7 f8 31 73 c0 a8 ac 4a 38 e0 6c fe c9 | natd_hash: hash= 12 67 fe 8f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 55 ce 96 b7 f8 31 73 c0 a8 ac 4a 38 e0 6c fe c9 | Notify data 12 67 fe 8f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 62 bc 01 e6 ef 5b 20 48 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2c fb 7f 58 95 5f 54 36 dd 15 01 4b 74 42 c4 35 | natd_hash: hash= a5 03 67 5a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2c fb 7f 58 95 5f 54 36 dd 15 01 4b 74 42 c4 35 | Notify data a5 03 67 5a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #737 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #737 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #737 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #737: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #737 to 4294967295 after switching state | Message ID: IKE #737 skipping update_recv as MD is fake | Message ID: sent #737 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-189" #737: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.189:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #737) | 62 bc 01 e6 ef 5b 20 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 66 85 a0 b2 da 45 c4 c8 86 e8 bb 58 04 8f 23 | c5 98 b3 86 8c d9 3d e0 66 ea fd 6e 98 4b e0 01 | 77 7e 62 b4 42 d4 3c 39 34 2b 32 9b 48 02 57 f1 | 43 d9 98 13 95 5e 59 11 5e 01 ff c9 1c bf 20 5a | 97 da 26 ae e7 18 db f7 f0 a0 b8 39 fa b2 27 ca | 76 61 93 73 f9 9f 90 66 03 e2 33 bb d1 e7 63 33 | f7 1f 47 9d 66 dd ce 29 e2 ce fc 79 7d e1 df bf | dc 9e e5 af eb e9 5f a2 61 50 44 f7 b3 6f 62 6a | 00 64 f2 03 7d a9 73 95 eb b3 13 a0 cd 38 e6 bc | e6 82 cc 57 4f 84 63 cc 7c 55 1b ca b1 df c8 fb | 40 3b 1d 30 71 fc d6 dd b0 87 15 c1 2d 4f 62 0a | d3 3f bd e6 06 ca 4b 23 74 c6 f0 8a 6c 6c 87 c0 | a3 d6 77 77 fe 47 ed a9 72 bd 08 ac d9 3e 17 96 | 30 05 c0 a7 7a 4d 24 f3 62 68 cf 5a 4b 4a 82 ce | 23 28 f5 14 67 63 ea 32 5f 7d 39 c5 98 d8 43 3b | d9 8b c6 31 05 9d c5 e0 94 47 37 b4 5b 9f 31 c8 | 29 00 00 24 05 60 52 c6 c7 57 70 5a 1b 6b 34 82 | b5 50 99 7f 74 f0 48 4f 7c 17 db cd 98 c0 39 1a | e7 e2 cb 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 ce 96 b7 f8 31 73 c0 a8 ac 4a 38 | e0 6c fe c9 12 67 fe 8f 00 00 00 1c 00 00 40 05 | 2c fb 7f 58 95 5f 54 36 dd 15 01 4b 74 42 c4 35 | a5 03 67 5a | state #737 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38403da90 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb3780297c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3780297c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #737 | libevent_malloc: new ptr-libevent@0x7fb384086f10 size 128 | #737 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.225166 | resume sending helper answer for #737 suppresed complete_v2_state_transition() and stole MD | #737 spent 0.307 milliseconds in resume sending helper answer | stop processing: state #737 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37807ad70 | processing resume sending helper answer for #746 | start processing: state #746 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 746 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #746 | **emit ISAKMP Message: | initiator cookie: | f7 37 f9 ef 73 ab 62 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-241 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ec d3 29 72 57 bc 83 2e 59 c7 f4 c6 5c 3e da 18 | ikev2 g^x f6 16 d5 05 b4 32 f8 47 60 e6 d5 e8 a6 7d 89 42 | ikev2 g^x 82 4a 4c 03 9b 5b e0 5c f4 ec 3b ce 58 3e 0f d7 | ikev2 g^x 56 dc 82 59 f9 cf 59 04 12 a3 54 12 37 fb d1 ea | ikev2 g^x 36 9c 13 92 72 99 d6 a7 42 5f 4d 49 ac 8b 2b cd | ikev2 g^x 32 c7 55 29 46 4d 74 68 cb 5d e1 7e 03 f3 bd 63 | ikev2 g^x 8b 55 fe bc 55 8f 8b 48 6b 11 21 29 87 1e 76 8a | ikev2 g^x e2 d8 b8 76 db 47 07 03 9d ab fb c5 6d 10 75 bc | ikev2 g^x da a7 8f b2 4f 24 eb 9e 43 a2 a3 e4 50 56 93 18 | ikev2 g^x c4 a1 e9 f8 22 3c a2 54 2e 1c b7 97 b7 4e 3d 26 | ikev2 g^x 8d f2 a4 30 a8 df 1f 7a 1e 6f f0 e5 f8 33 10 24 | ikev2 g^x c0 68 75 e5 96 36 ef 47 b0 86 2f 4d cf ea df f8 | ikev2 g^x 81 cb 73 da 28 a5 cc 66 eb b4 89 33 1e 77 a9 f0 | ikev2 g^x 20 e5 72 31 64 9b 5f 87 2b 0d c9 49 f4 a8 a7 b2 | ikev2 g^x db fb d8 02 de 79 32 bf 41 fa e4 fc a6 6d 9e 9c | ikev2 g^x db 06 92 90 d9 34 01 45 1b 0a 7e 2b a8 ca 95 b4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e3 e6 84 b9 78 ba 0f 63 d4 48 76 09 d5 37 c9 85 | IKEv2 nonce 6c 14 ea c9 21 5e fd 8f e7 46 60 84 c0 9a 70 f4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f7 37 f9 ef 73 ab 62 5a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f1 | natd_hash: port= 01 f4 | natd_hash: hash= 51 43 0b 6f 8b 96 5f 6c af ec fa 55 79 2b ca 5d | natd_hash: hash= e7 59 20 5c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 51 43 0b 6f 8b 96 5f 6c af ec fa 55 79 2b ca 5d | Notify data e7 59 20 5c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f7 37 f9 ef 73 ab 62 5a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= eb aa 4b a8 95 05 be bc 99 5d 97 8e 1c 2b 9a a4 | natd_hash: hash= 18 3b a4 f4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data eb aa 4b a8 95 05 be bc 99 5d 97 8e 1c 2b 9a a4 | Notify data 18 3b a4 f4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #746 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #746 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #746 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #746: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #746 to 4294967295 after switching state | Message ID: IKE #746 skipping update_recv as MD is fake | Message ID: sent #746 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-241" #746: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.241:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #746) | f7 37 f9 ef 73 ab 62 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec d3 29 72 57 bc 83 2e 59 c7 f4 c6 5c 3e da 18 | f6 16 d5 05 b4 32 f8 47 60 e6 d5 e8 a6 7d 89 42 | 82 4a 4c 03 9b 5b e0 5c f4 ec 3b ce 58 3e 0f d7 | 56 dc 82 59 f9 cf 59 04 12 a3 54 12 37 fb d1 ea | 36 9c 13 92 72 99 d6 a7 42 5f 4d 49 ac 8b 2b cd | 32 c7 55 29 46 4d 74 68 cb 5d e1 7e 03 f3 bd 63 | 8b 55 fe bc 55 8f 8b 48 6b 11 21 29 87 1e 76 8a | e2 d8 b8 76 db 47 07 03 9d ab fb c5 6d 10 75 bc | da a7 8f b2 4f 24 eb 9e 43 a2 a3 e4 50 56 93 18 | c4 a1 e9 f8 22 3c a2 54 2e 1c b7 97 b7 4e 3d 26 | 8d f2 a4 30 a8 df 1f 7a 1e 6f f0 e5 f8 33 10 24 | c0 68 75 e5 96 36 ef 47 b0 86 2f 4d cf ea df f8 | 81 cb 73 da 28 a5 cc 66 eb b4 89 33 1e 77 a9 f0 | 20 e5 72 31 64 9b 5f 87 2b 0d c9 49 f4 a8 a7 b2 | db fb d8 02 de 79 32 bf 41 fa e4 fc a6 6d 9e 9c | db 06 92 90 d9 34 01 45 1b 0a 7e 2b a8 ca 95 b4 | 29 00 00 24 e3 e6 84 b9 78 ba 0f 63 d4 48 76 09 | d5 37 c9 85 6c 14 ea c9 21 5e fd 8f e7 46 60 84 | c0 9a 70 f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 43 0b 6f 8b 96 5f 6c af ec fa 55 | 79 2b ca 5d e7 59 20 5c 00 00 00 1c 00 00 40 05 | eb aa 4b a8 95 05 be bc 99 5d 97 8e 1c 2b 9a a4 | 18 3b a4 f4 | state #746 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c0296b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c00cfd0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00cfd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #746 | libevent_malloc: new ptr-libevent@0x7fb37807ad70 size 128 | #746 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.225494 | resume sending helper answer for #746 suppresed complete_v2_state_transition() and stole MD | #746 spent 0.307 milliseconds in resume sending helper answer | stop processing: state #746 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb378080550 | processing resume sending helper answer for #740 | start processing: state #740 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 740 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #740 | **emit ISAKMP Message: | initiator cookie: | 1b 68 e9 bf c7 97 07 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-230 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x bf b3 10 fb dd 28 f6 cb 25 9f 9d 63 17 69 6d 6e | ikev2 g^x e8 71 1d da 03 62 10 04 58 4a b2 60 7e 08 0d 23 | ikev2 g^x e8 11 df 63 3f d9 4c 6b 74 a1 a5 86 cd a9 4f 0b | ikev2 g^x a1 93 6d 81 fa 0f ef 54 ce 9d fd cb 34 8e 77 a2 | ikev2 g^x 87 72 4c 47 7e 84 fe 1b a5 81 30 1c 8c fc c4 9a | ikev2 g^x 0f 98 35 d7 2a 5e 44 55 8a 59 d6 d8 30 0e 7b a6 | ikev2 g^x 2a b2 14 36 a8 38 48 b1 a9 46 59 2b ac de 0d 8e | ikev2 g^x 1c 9d 2b 89 1c 30 40 5d b7 34 94 17 5f 21 6d f3 | ikev2 g^x 8a 9c ff b3 cb 8a d6 33 b7 5b 70 0b 55 e1 7a e1 | ikev2 g^x 7d 1b fc 2c 98 7b 56 b4 9c 01 69 95 c3 40 41 1a | ikev2 g^x 16 ef a0 2a 1b 18 8d 7f de 2f 24 c0 24 36 5a 75 | ikev2 g^x 68 29 82 0e ef 57 e3 38 1e 0b 49 5a de c8 05 03 | ikev2 g^x 5c 7b 63 02 56 7e a1 b0 b5 ab 37 8b 92 4e 92 ec | ikev2 g^x 6a 5b f1 54 78 81 27 2a c2 36 70 26 e0 90 20 5c | ikev2 g^x 71 5f d8 ca cb 70 40 d9 8f a6 1b 60 21 65 09 2b | ikev2 g^x e2 dc 1b fc b7 96 10 f1 3e c1 9c af 69 36 85 93 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce fa 43 15 42 5a db 07 16 30 b5 67 19 b6 84 08 f7 | IKEv2 nonce 7b ea f2 1f b7 28 7e 51 d0 6b f6 fb b4 42 2c ff | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1b 68 e9 bf c7 97 07 a5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e6 | natd_hash: port= 01 f4 | natd_hash: hash= aa 6f 0b 3c 61 32 28 f1 44 65 e1 5e bc c8 e4 f5 | natd_hash: hash= 79 a3 0a bd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data aa 6f 0b 3c 61 32 28 f1 44 65 e1 5e bc c8 e4 f5 | Notify data 79 a3 0a bd | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1b 68 e9 bf c7 97 07 a5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= bc 6f 55 f3 a9 01 d6 c1 3f f8 0f 15 e9 0d 1c 1c | natd_hash: hash= f5 51 2a 5a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bc 6f 55 f3 a9 01 d6 c1 3f f8 0f 15 e9 0d 1c 1c | Notify data f5 51 2a 5a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #740 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #740 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #740 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #740: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #740 to 4294967295 after switching state | Message ID: IKE #740 skipping update_recv as MD is fake | Message ID: sent #740 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-230" #740: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.230:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #740) | 1b 68 e9 bf c7 97 07 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf b3 10 fb dd 28 f6 cb 25 9f 9d 63 17 69 6d 6e | e8 71 1d da 03 62 10 04 58 4a b2 60 7e 08 0d 23 | e8 11 df 63 3f d9 4c 6b 74 a1 a5 86 cd a9 4f 0b | a1 93 6d 81 fa 0f ef 54 ce 9d fd cb 34 8e 77 a2 | 87 72 4c 47 7e 84 fe 1b a5 81 30 1c 8c fc c4 9a | 0f 98 35 d7 2a 5e 44 55 8a 59 d6 d8 30 0e 7b a6 | 2a b2 14 36 a8 38 48 b1 a9 46 59 2b ac de 0d 8e | 1c 9d 2b 89 1c 30 40 5d b7 34 94 17 5f 21 6d f3 | 8a 9c ff b3 cb 8a d6 33 b7 5b 70 0b 55 e1 7a e1 | 7d 1b fc 2c 98 7b 56 b4 9c 01 69 95 c3 40 41 1a | 16 ef a0 2a 1b 18 8d 7f de 2f 24 c0 24 36 5a 75 | 68 29 82 0e ef 57 e3 38 1e 0b 49 5a de c8 05 03 | 5c 7b 63 02 56 7e a1 b0 b5 ab 37 8b 92 4e 92 ec | 6a 5b f1 54 78 81 27 2a c2 36 70 26 e0 90 20 5c | 71 5f d8 ca cb 70 40 d9 8f a6 1b 60 21 65 09 2b | e2 dc 1b fc b7 96 10 f1 3e c1 9c af 69 36 85 93 | 29 00 00 24 fa 43 15 42 5a db 07 16 30 b5 67 19 | b6 84 08 f7 7b ea f2 1f b7 28 7e 51 d0 6b f6 fb | b4 42 2c ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 6f 0b 3c 61 32 28 f1 44 65 e1 5e | bc c8 e4 f5 79 a3 0a bd 00 00 00 1c 00 00 40 05 | bc 6f 55 f3 a9 01 d6 c1 3f f8 0f 15 e9 0d 1c 1c | f5 51 2a 5a | state #740 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35003b1c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b1c480 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c480 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #740 | libevent_malloc: new ptr-libevent@0x7fb378080550 size 128 | #740 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.22602 | resume sending helper answer for #740 suppresed complete_v2_state_transition() and stole MD | #740 spent 0.492 milliseconds in resume sending helper answer | stop processing: state #740 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c0ca170 | processing resume sending helper answer for #751 | start processing: state #751 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 751 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #751 | **emit ISAKMP Message: | initiator cookie: | ae b9 96 92 13 03 18 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-244 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 46 18 de 27 b3 41 d9 b4 97 87 96 94 92 db 34 d5 | ikev2 g^x 56 66 24 e2 24 37 ce bd 92 7b e3 87 23 69 e7 bb | ikev2 g^x 99 85 d4 04 ba ee 4f 3a 2d e4 f5 20 88 1a da 6a | ikev2 g^x 37 fd 29 25 a7 48 4a 55 fa 78 65 6e 2e f9 46 8a | ikev2 g^x 6d b2 51 bd 8a 24 ee 67 2d ab b9 57 1a 5e d8 74 | ikev2 g^x ba ae f9 c0 cf 53 67 dd e4 f0 25 8c f7 8b e5 cc | ikev2 g^x c4 b9 b2 2e 91 da f6 5e 10 27 44 76 09 73 cb 05 | ikev2 g^x ee ff b8 22 52 36 b5 70 b5 f3 a3 21 0c 9b d9 c3 | ikev2 g^x 6e 1e fd a6 b5 36 62 17 f0 b8 95 48 d0 79 59 86 | ikev2 g^x f0 3b ca 96 84 68 69 d6 59 82 c8 2b a6 a6 4f 06 | ikev2 g^x c3 dc 73 a0 8a 74 9c 4d bc d3 4c 09 2f b7 5c 51 | ikev2 g^x 36 1f a0 36 a1 c5 d6 a5 b8 10 87 71 e5 72 18 60 | ikev2 g^x 29 95 15 48 57 c7 bb 89 e1 44 1c f8 fb 56 fa 24 | ikev2 g^x e6 14 3b 9a 5e c3 26 ff 0c 04 49 70 a6 59 7d 65 | ikev2 g^x 41 4e c0 79 9f 67 e9 9e b7 b9 6a 02 99 b0 ea 24 | ikev2 g^x f8 69 67 ed 88 82 6b 65 bd e8 e7 35 b7 cf 86 4f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5f 12 63 14 37 ca 62 06 c8 d7 61 a7 8b 59 9f 9f | IKEv2 nonce dd 4b 86 2c 58 45 7a 5d a8 0a d1 a1 93 37 6f 0b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ae b9 96 92 13 03 18 b4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f4 | natd_hash: port= 01 f4 | natd_hash: hash= 8c 41 84 a3 d1 08 28 c1 a2 36 a7 52 e0 0a 68 b0 | natd_hash: hash= f4 d6 13 58 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8c 41 84 a3 d1 08 28 c1 a2 36 a7 52 e0 0a 68 b0 | Notify data f4 d6 13 58 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ae b9 96 92 13 03 18 b4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6f c5 8f 9c 48 4f ce 63 14 03 29 e5 1c a9 3b f7 | natd_hash: hash= 4c 7b c3 5c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6f c5 8f 9c 48 4f ce 63 14 03 29 e5 1c a9 3b f7 | Notify data 4c 7b c3 5c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #751 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #751 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #751 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #751: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #751 to 4294967295 after switching state | Message ID: IKE #751 skipping update_recv as MD is fake | Message ID: sent #751 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-244" #751: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.244:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #751) | ae b9 96 92 13 03 18 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 18 de 27 b3 41 d9 b4 97 87 96 94 92 db 34 d5 | 56 66 24 e2 24 37 ce bd 92 7b e3 87 23 69 e7 bb | 99 85 d4 04 ba ee 4f 3a 2d e4 f5 20 88 1a da 6a | 37 fd 29 25 a7 48 4a 55 fa 78 65 6e 2e f9 46 8a | 6d b2 51 bd 8a 24 ee 67 2d ab b9 57 1a 5e d8 74 | ba ae f9 c0 cf 53 67 dd e4 f0 25 8c f7 8b e5 cc | c4 b9 b2 2e 91 da f6 5e 10 27 44 76 09 73 cb 05 | ee ff b8 22 52 36 b5 70 b5 f3 a3 21 0c 9b d9 c3 | 6e 1e fd a6 b5 36 62 17 f0 b8 95 48 d0 79 59 86 | f0 3b ca 96 84 68 69 d6 59 82 c8 2b a6 a6 4f 06 | c3 dc 73 a0 8a 74 9c 4d bc d3 4c 09 2f b7 5c 51 | 36 1f a0 36 a1 c5 d6 a5 b8 10 87 71 e5 72 18 60 | 29 95 15 48 57 c7 bb 89 e1 44 1c f8 fb 56 fa 24 | e6 14 3b 9a 5e c3 26 ff 0c 04 49 70 a6 59 7d 65 | 41 4e c0 79 9f 67 e9 9e b7 b9 6a 02 99 b0 ea 24 | f8 69 67 ed 88 82 6b 65 bd e8 e7 35 b7 cf 86 4f | 29 00 00 24 5f 12 63 14 37 ca 62 06 c8 d7 61 a7 | 8b 59 9f 9f dd 4b 86 2c 58 45 7a 5d a8 0a d1 a1 | 93 37 6f 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 41 84 a3 d1 08 28 c1 a2 36 a7 52 | e0 0a 68 b0 f4 d6 13 58 00 00 00 1c 00 00 40 05 | 6f c5 8f 9c 48 4f ce 63 14 03 29 e5 1c a9 3b f7 | 4c 7b c3 5c | state #751 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380047480 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb3800319a0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800319a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #751 | libevent_malloc: new ptr-libevent@0x7fb35c0ca170 size 128 | #751 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.226511 | resume sending helper answer for #751 suppresed complete_v2_state_transition() and stole MD | #751 spent 0.448 milliseconds in resume sending helper answer | stop processing: state #751 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c0cfb20 | processing resume sending helper answer for #688 | start processing: state #688 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 688 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #688 | **emit ISAKMP Message: | initiator cookie: | df 64 65 78 b0 09 88 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-95 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ba 99 2e a4 d8 11 11 ec bc 09 70 a9 ec b4 08 d9 | ikev2 g^x 97 c0 f8 d2 7e e6 f4 f4 ec 88 8f c9 01 b5 07 63 | ikev2 g^x ab 96 32 f0 d1 ff d5 71 24 2d f7 10 7e 41 d7 9a | ikev2 g^x 8a 31 5b f5 cc 4d 4b 6e e0 fe cf 09 59 ae a0 75 | ikev2 g^x ed ad a8 fe 11 4f 77 38 0f 3d 73 54 64 5c 86 e1 | ikev2 g^x 4c f9 f7 be 0f ad 2a 08 14 2f 01 cf 99 bb 08 03 | ikev2 g^x e1 c1 46 1b 92 0e 69 b0 d7 e1 d7 63 33 81 c3 c3 | ikev2 g^x 6e 9a 75 ae ba c8 31 37 9a f9 f5 59 d2 c3 7c 07 | ikev2 g^x c0 44 bd 67 c4 36 13 82 f6 9a 1b bf dd 19 d3 a7 | ikev2 g^x 1f 9b af 3b 56 e1 48 c3 b7 44 f8 fc bf eb 18 f9 | ikev2 g^x dd 29 49 e7 68 79 bf 94 71 6c ee a8 79 a8 b8 32 | ikev2 g^x 64 f6 0a 92 59 a9 6a 2e 51 22 2a 8f f3 dd d7 01 | ikev2 g^x 71 66 37 a9 16 dc 8f 9f 9b 19 8a 04 d9 aa a9 68 | ikev2 g^x c6 3a ea 8d fa b5 5a 51 76 f8 d4 87 5a cd c9 16 | ikev2 g^x aa cc 2c bc 9b 24 ad be ac cc ef b3 e1 6c 96 1e | ikev2 g^x 04 cd 1e 40 8a 89 0a d7 df f5 fd 0b 78 38 cd 04 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 07 2f 3c 32 0e aa 94 89 c6 1e 84 b9 47 5c cc fe | IKEv2 nonce a4 33 57 f3 0c 87 82 2a 55 07 2e 5c 6c 57 05 76 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= df 64 65 78 b0 09 88 8a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5f | natd_hash: port= 01 f4 | natd_hash: hash= c9 20 1b a3 63 d6 96 1d 79 a9 7e 61 d3 77 77 fd | natd_hash: hash= 71 9f 38 b2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c9 20 1b a3 63 d6 96 1d 79 a9 7e 61 d3 77 77 fd | Notify data 71 9f 38 b2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= df 64 65 78 b0 09 88 8a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2c 04 dc 98 db ed 3b 9d e2 b7 4c 25 55 c5 d8 4f | natd_hash: hash= 0d e0 01 76 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2c 04 dc 98 db ed 3b 9d e2 b7 4c 25 55 c5 d8 4f | Notify data 0d e0 01 76 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #688 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #688 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #688 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #688: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #688 to 4294967295 after switching state | Message ID: IKE #688 skipping update_recv as MD is fake | Message ID: sent #688 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-95" #688: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.95:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #688) | df 64 65 78 b0 09 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba 99 2e a4 d8 11 11 ec bc 09 70 a9 ec b4 08 d9 | 97 c0 f8 d2 7e e6 f4 f4 ec 88 8f c9 01 b5 07 63 | ab 96 32 f0 d1 ff d5 71 24 2d f7 10 7e 41 d7 9a | 8a 31 5b f5 cc 4d 4b 6e e0 fe cf 09 59 ae a0 75 | ed ad a8 fe 11 4f 77 38 0f 3d 73 54 64 5c 86 e1 | 4c f9 f7 be 0f ad 2a 08 14 2f 01 cf 99 bb 08 03 | e1 c1 46 1b 92 0e 69 b0 d7 e1 d7 63 33 81 c3 c3 | 6e 9a 75 ae ba c8 31 37 9a f9 f5 59 d2 c3 7c 07 | c0 44 bd 67 c4 36 13 82 f6 9a 1b bf dd 19 d3 a7 | 1f 9b af 3b 56 e1 48 c3 b7 44 f8 fc bf eb 18 f9 | dd 29 49 e7 68 79 bf 94 71 6c ee a8 79 a8 b8 32 | 64 f6 0a 92 59 a9 6a 2e 51 22 2a 8f f3 dd d7 01 | 71 66 37 a9 16 dc 8f 9f 9b 19 8a 04 d9 aa a9 68 | c6 3a ea 8d fa b5 5a 51 76 f8 d4 87 5a cd c9 16 | aa cc 2c bc 9b 24 ad be ac cc ef b3 e1 6c 96 1e | 04 cd 1e 40 8a 89 0a d7 df f5 fd 0b 78 38 cd 04 | 29 00 00 24 07 2f 3c 32 0e aa 94 89 c6 1e 84 b9 | 47 5c cc fe a4 33 57 f3 0c 87 82 2a 55 07 2e 5c | 6c 57 05 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 20 1b a3 63 d6 96 1d 79 a9 7e 61 | d3 77 77 fd 71 9f 38 b2 00 00 00 1c 00 00 40 05 | 2c 04 dc 98 db ed 3b 9d e2 b7 4c 25 55 c5 d8 4f | 0d e0 01 76 | state #688 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3800211f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb38000f8f0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #688 | libevent_malloc: new ptr-libevent@0x7fb35c0cfb20 size 128 | #688 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.226859 | resume sending helper answer for #688 suppresed complete_v2_state_transition() and stole MD | #688 spent 0.33 milliseconds in resume sending helper answer | stop processing: state #688 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3480720d0 | processing resume sending helper answer for #725 | start processing: state #725 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 725 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #725 | **emit ISAKMP Message: | initiator cookie: | 64 5e 88 2e 86 68 44 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-196 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b1 59 d0 5b 9b 94 b3 86 8e 64 38 5a 09 d0 e8 64 | ikev2 g^x cf c2 d4 15 da d7 21 e6 4e 8c 6b 11 1e e8 ad 65 | ikev2 g^x 2b bd ab d1 ec 70 ff c8 0d e9 d2 07 ec f4 0b 5b | ikev2 g^x 5f b2 e7 3b 24 74 0e e2 94 9d 3a 23 3b 5b 55 7c | ikev2 g^x ed 09 9a e3 6a ff ac 51 22 72 69 81 f0 1e 34 21 | ikev2 g^x 12 8d 74 23 22 5b cd 06 6c d7 75 d8 45 5b fb 4d | ikev2 g^x 85 65 7b 46 e7 aa 98 f1 74 d1 b6 9f c8 d1 7d 99 | ikev2 g^x 61 08 9e 85 6a 83 33 63 c7 3f bf f2 9d 91 d4 fd | ikev2 g^x 7f 40 06 4e ba 07 60 0b 06 c4 8b f3 84 f7 92 b4 | ikev2 g^x 2d 08 89 d4 0a 59 ef cd d0 85 03 6f 8f 85 c5 8e | ikev2 g^x 7e 4a 7f 5a 22 e5 ce 0e 62 2d dc cb f4 3c 17 f0 | ikev2 g^x 27 f6 d1 42 16 70 1d 6e 7f 4e 76 12 9c d6 e4 08 | ikev2 g^x 70 2a 6c f3 42 1f 73 22 fe 78 46 af d0 cf 5f fc | ikev2 g^x f9 7d 2b 8c 1f b4 95 d9 11 2f d3 5b 1e ac 55 2b | ikev2 g^x 9d 0e 3d 6a 04 9d 00 d0 a8 13 41 91 76 fd 15 44 | ikev2 g^x 39 7f 60 0b fd e8 a5 da f1 73 89 3e 95 bf 44 8f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 65 31 0e 50 dd ad 39 44 4e c9 44 5c 03 5d cb 07 | IKEv2 nonce 2b 3f e9 f7 c8 48 35 5a 83 42 5a 7c 08 53 78 28 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 64 5e 88 2e 86 68 44 93 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c4 | natd_hash: port= 01 f4 | natd_hash: hash= 42 e1 7e 60 6f 94 83 21 09 67 4d b9 49 66 ea b2 | natd_hash: hash= f6 c4 46 b6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 42 e1 7e 60 6f 94 83 21 09 67 4d b9 49 66 ea b2 | Notify data f6 c4 46 b6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 64 5e 88 2e 86 68 44 93 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2e 88 34 b2 e3 1a 64 25 09 3f 69 42 1a 75 eb 83 | natd_hash: hash= 23 7c 1f dd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2e 88 34 b2 e3 1a 64 25 09 3f 69 42 1a 75 eb 83 | Notify data 23 7c 1f dd | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #725 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #725 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #725 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #725: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #725 to 4294967295 after switching state | Message ID: IKE #725 skipping update_recv as MD is fake | Message ID: sent #725 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-196" #725: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.196:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #725) | 64 5e 88 2e 86 68 44 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 59 d0 5b 9b 94 b3 86 8e 64 38 5a 09 d0 e8 64 | cf c2 d4 15 da d7 21 e6 4e 8c 6b 11 1e e8 ad 65 | 2b bd ab d1 ec 70 ff c8 0d e9 d2 07 ec f4 0b 5b | 5f b2 e7 3b 24 74 0e e2 94 9d 3a 23 3b 5b 55 7c | ed 09 9a e3 6a ff ac 51 22 72 69 81 f0 1e 34 21 | 12 8d 74 23 22 5b cd 06 6c d7 75 d8 45 5b fb 4d | 85 65 7b 46 e7 aa 98 f1 74 d1 b6 9f c8 d1 7d 99 | 61 08 9e 85 6a 83 33 63 c7 3f bf f2 9d 91 d4 fd | 7f 40 06 4e ba 07 60 0b 06 c4 8b f3 84 f7 92 b4 | 2d 08 89 d4 0a 59 ef cd d0 85 03 6f 8f 85 c5 8e | 7e 4a 7f 5a 22 e5 ce 0e 62 2d dc cb f4 3c 17 f0 | 27 f6 d1 42 16 70 1d 6e 7f 4e 76 12 9c d6 e4 08 | 70 2a 6c f3 42 1f 73 22 fe 78 46 af d0 cf 5f fc | f9 7d 2b 8c 1f b4 95 d9 11 2f d3 5b 1e ac 55 2b | 9d 0e 3d 6a 04 9d 00 d0 a8 13 41 91 76 fd 15 44 | 39 7f 60 0b fd e8 a5 da f1 73 89 3e 95 bf 44 8f | 29 00 00 24 65 31 0e 50 dd ad 39 44 4e c9 44 5c | 03 5d cb 07 2b 3f e9 f7 c8 48 35 5a 83 42 5a 7c | 08 53 78 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 e1 7e 60 6f 94 83 21 09 67 4d b9 | 49 66 ea b2 f6 c4 46 b6 00 00 00 1c 00 00 40 05 | 2e 88 34 b2 e3 1a 64 25 09 3f 69 42 1a 75 eb 83 | 23 7c 1f dd | state #725 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3700407f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb378018460 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348018100 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #725 | libevent_malloc: new ptr-libevent@0x7fb3480720d0 size 128 | #725 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.227242 | resume sending helper answer for #725 suppresed complete_v2_state_transition() and stole MD | #725 spent 0.335 milliseconds in resume sending helper answer | stop processing: state #725 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb358079410 | processing resume sending helper answer for #729 | start processing: state #729 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 729 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #729 | **emit ISAKMP Message: | initiator cookie: | 67 a1 5b 23 16 28 fb 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-240 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 08 81 a9 49 57 bf df e1 f1 ea fa f5 92 44 d9 16 | ikev2 g^x 0e ea 66 38 d8 dc 75 6f 21 e1 c4 ca 83 4d 4d a6 | ikev2 g^x a8 40 61 2c 03 9c 81 09 e4 2c db 8c 6b 07 73 a9 | ikev2 g^x f5 96 45 79 32 38 25 d0 cb a7 7f 05 3f 22 9d 55 | ikev2 g^x 94 52 09 92 47 a0 99 ce 8b f9 2b b1 16 c5 6d d5 | ikev2 g^x 5a 5f 80 8e 4a 88 73 f6 19 b4 2a 58 b1 99 a3 f1 | ikev2 g^x cf 10 1d ee 49 52 bf ae ad 75 79 fc 4e 1b 70 c4 | ikev2 g^x fe 0d d5 21 ff c3 16 1c 6a 4f a2 1b da 3f dd 80 | ikev2 g^x b7 98 1e 3c e4 19 40 2c ba 2b 1b 02 76 ef 1d 8c | ikev2 g^x 32 68 18 21 59 6e 3c 68 cf e3 eb 77 5f af 35 46 | ikev2 g^x 5f aa 30 45 02 11 0a b4 a8 8f ff 89 3e 96 86 5d | ikev2 g^x 06 be 71 8d 28 b2 ee 71 59 26 45 c0 3b 2a 27 ad | ikev2 g^x fe 98 e4 a6 a7 ad 6c 8f d2 ce 96 56 c5 bb 39 51 | ikev2 g^x 6a 23 cb d8 31 3d 75 5c 91 5d 1e 01 ca 04 2a 2e | ikev2 g^x 70 54 ab 56 07 f2 3e 14 8f 66 51 e0 bf d5 13 d5 | ikev2 g^x 73 c4 4d 14 6a 43 47 b4 f4 a1 4b 3b 4b 58 bf 93 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ba eb 8a f4 d2 cb 7a 42 9f 66 73 21 de 49 71 25 | IKEv2 nonce d5 fa ae 34 96 57 d1 6a d8 63 50 0d e7 fe 39 7b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 67 a1 5b 23 16 28 fb 57 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f0 | natd_hash: port= 01 f4 | natd_hash: hash= 41 4e 71 12 16 99 de 9d 6a f1 f6 ef 1c a0 b8 7d | natd_hash: hash= 93 f0 39 1e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 41 4e 71 12 16 99 de 9d 6a f1 f6 ef 1c a0 b8 7d | Notify data 93 f0 39 1e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 67 a1 5b 23 16 28 fb 57 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 19 1d 16 93 50 07 d9 58 09 ed 23 95 2e a0 e3 31 | natd_hash: hash= 82 b4 65 2f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 19 1d 16 93 50 07 d9 58 09 ed 23 95 2e a0 e3 31 | Notify data 82 b4 65 2f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #729 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #729 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #729 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #729: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #729 to 4294967295 after switching state | Message ID: IKE #729 skipping update_recv as MD is fake | Message ID: sent #729 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-240" #729: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.240:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #729) | 67 a1 5b 23 16 28 fb 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 81 a9 49 57 bf df e1 f1 ea fa f5 92 44 d9 16 | 0e ea 66 38 d8 dc 75 6f 21 e1 c4 ca 83 4d 4d a6 | a8 40 61 2c 03 9c 81 09 e4 2c db 8c 6b 07 73 a9 | f5 96 45 79 32 38 25 d0 cb a7 7f 05 3f 22 9d 55 | 94 52 09 92 47 a0 99 ce 8b f9 2b b1 16 c5 6d d5 | 5a 5f 80 8e 4a 88 73 f6 19 b4 2a 58 b1 99 a3 f1 | cf 10 1d ee 49 52 bf ae ad 75 79 fc 4e 1b 70 c4 | fe 0d d5 21 ff c3 16 1c 6a 4f a2 1b da 3f dd 80 | b7 98 1e 3c e4 19 40 2c ba 2b 1b 02 76 ef 1d 8c | 32 68 18 21 59 6e 3c 68 cf e3 eb 77 5f af 35 46 | 5f aa 30 45 02 11 0a b4 a8 8f ff 89 3e 96 86 5d | 06 be 71 8d 28 b2 ee 71 59 26 45 c0 3b 2a 27 ad | fe 98 e4 a6 a7 ad 6c 8f d2 ce 96 56 c5 bb 39 51 | 6a 23 cb d8 31 3d 75 5c 91 5d 1e 01 ca 04 2a 2e | 70 54 ab 56 07 f2 3e 14 8f 66 51 e0 bf d5 13 d5 | 73 c4 4d 14 6a 43 47 b4 f4 a1 4b 3b 4b 58 bf 93 | 29 00 00 24 ba eb 8a f4 d2 cb 7a 42 9f 66 73 21 | de 49 71 25 d5 fa ae 34 96 57 d1 6a d8 63 50 0d | e7 fe 39 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 4e 71 12 16 99 de 9d 6a f1 f6 ef | 1c a0 b8 7d 93 f0 39 1e 00 00 00 1c 00 00 40 05 | 19 1d 16 93 50 07 d9 58 09 ed 23 95 2e a0 e3 31 | 82 b4 65 2f | state #729 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c01a4e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c018460 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #729 | libevent_malloc: new ptr-libevent@0x7fb358079410 size 128 | #729 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.227579 | resume sending helper answer for #729 suppresed complete_v2_state_transition() and stole MD | #729 spent 0.314 milliseconds in resume sending helper answer | stop processing: state #729 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35408aee0 | processing resume sending helper answer for #734 | start processing: state #734 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 734 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #734 | **emit ISAKMP Message: | initiator cookie: | 14 ad 8f c6 54 da 73 f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-174 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3e 2f 5d 76 c2 4f 1f 02 6a 67 83 af 07 ab a2 bd | ikev2 g^x 9d b0 56 b4 74 93 21 23 d5 0f 1b 1a 3c 05 90 db | ikev2 g^x 39 cd bb c0 0f 27 b0 be e7 30 10 fc 0c d6 85 d9 | ikev2 g^x f5 60 17 39 55 ca cb 5e 73 d2 3f be 8a 82 60 c9 | ikev2 g^x e1 41 42 b2 6e 78 88 06 40 0c 17 95 c2 17 27 23 | ikev2 g^x 90 bd f0 73 5c ee cb d6 c6 aa 04 22 1d c0 10 38 | ikev2 g^x fb 77 ae 2f 0a 4f c0 01 c1 29 59 fe 35 87 fe 76 | ikev2 g^x 67 9f e2 74 4b ff 95 18 5f 7e 94 c6 c7 e6 07 67 | ikev2 g^x a5 35 e2 f5 32 f0 ec 4b b5 8b 9c f1 7d c8 0f 0c | ikev2 g^x 14 d9 4b c5 b9 27 1c e0 42 84 b9 a8 08 9f 75 1c | ikev2 g^x a2 e5 c6 44 e5 22 9a 7d ee 05 4e 75 55 a6 96 62 | ikev2 g^x 19 7d 76 44 2c a5 59 2c 17 a4 18 38 23 2d 1c 58 | ikev2 g^x 72 f3 bb 2e 0b 81 64 e9 5c 10 3e 22 02 85 a0 c4 | ikev2 g^x 22 29 f1 c6 45 f2 7a 20 5c 0e de 01 c6 aa e1 c8 | ikev2 g^x 76 a4 85 5f 79 3f 64 df 47 3f dc 65 47 83 a7 3a | ikev2 g^x c4 4e f9 47 98 cb 9d 5b c7 13 e3 7c ce 08 53 f9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f6 bf c4 84 2e cb dd 02 8e 3f e7 e1 fb 91 00 da | IKEv2 nonce cb 72 7d c0 8f b1 0e f4 82 ab 9b 50 c3 13 1d b1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 14 ad 8f c6 54 da 73 f6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ae | natd_hash: port= 01 f4 | natd_hash: hash= ac e5 9c 84 e2 ae 2e 54 0f 4c a4 7c d6 9a 1b 89 | natd_hash: hash= f2 f4 09 5b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ac e5 9c 84 e2 ae 2e 54 0f 4c a4 7c d6 9a 1b 89 | Notify data f2 f4 09 5b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 14 ad 8f c6 54 da 73 f6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= fb 5a 36 f0 d4 c4 17 31 be e2 a0 e0 6f e2 a5 d0 | natd_hash: hash= eb e9 f5 19 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fb 5a 36 f0 d4 c4 17 31 be e2 a0 e0 6f e2 a5 d0 | Notify data eb e9 f5 19 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #734 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #734 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #734 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #734: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #734 to 4294967295 after switching state | Message ID: IKE #734 skipping update_recv as MD is fake | Message ID: sent #734 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-174" #734: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.174:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #734) | 14 ad 8f c6 54 da 73 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 2f 5d 76 c2 4f 1f 02 6a 67 83 af 07 ab a2 bd | 9d b0 56 b4 74 93 21 23 d5 0f 1b 1a 3c 05 90 db | 39 cd bb c0 0f 27 b0 be e7 30 10 fc 0c d6 85 d9 | f5 60 17 39 55 ca cb 5e 73 d2 3f be 8a 82 60 c9 | e1 41 42 b2 6e 78 88 06 40 0c 17 95 c2 17 27 23 | 90 bd f0 73 5c ee cb d6 c6 aa 04 22 1d c0 10 38 | fb 77 ae 2f 0a 4f c0 01 c1 29 59 fe 35 87 fe 76 | 67 9f e2 74 4b ff 95 18 5f 7e 94 c6 c7 e6 07 67 | a5 35 e2 f5 32 f0 ec 4b b5 8b 9c f1 7d c8 0f 0c | 14 d9 4b c5 b9 27 1c e0 42 84 b9 a8 08 9f 75 1c | a2 e5 c6 44 e5 22 9a 7d ee 05 4e 75 55 a6 96 62 | 19 7d 76 44 2c a5 59 2c 17 a4 18 38 23 2d 1c 58 | 72 f3 bb 2e 0b 81 64 e9 5c 10 3e 22 02 85 a0 c4 | 22 29 f1 c6 45 f2 7a 20 5c 0e de 01 c6 aa e1 c8 | 76 a4 85 5f 79 3f 64 df 47 3f dc 65 47 83 a7 3a | c4 4e f9 47 98 cb 9d 5b c7 13 e3 7c ce 08 53 f9 | 29 00 00 24 f6 bf c4 84 2e cb dd 02 8e 3f e7 e1 | fb 91 00 da cb 72 7d c0 8f b1 0e f4 82 ab 9b 50 | c3 13 1d b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac e5 9c 84 e2 ae 2e 54 0f 4c a4 7c | d6 9a 1b 89 f2 f4 09 5b 00 00 00 1c 00 00 40 05 | fb 5a 36 f0 d4 c4 17 31 be e2 a0 e0 6f e2 a5 d0 | eb e9 f5 19 | state #734 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb33802ee40 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb33801d710 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33801d710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #734 | libevent_malloc: new ptr-libevent@0x7fb35408aee0 size 128 | #734 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.227889 | resume sending helper answer for #734 suppresed complete_v2_state_transition() and stole MD | #734 spent 0.288 milliseconds in resume sending helper answer | stop processing: state #734 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3640a1080 | processing resume sending helper answer for #714 | start processing: state #714 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 714 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #714 | **emit ISAKMP Message: | initiator cookie: | 93 98 4a 9e f6 25 19 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-160 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x de a8 26 1d 46 1f fe 73 77 0b f1 18 a1 80 90 25 | ikev2 g^x b3 e7 bb 58 9b c2 81 b1 ff 7d b4 22 75 35 d1 db | ikev2 g^x 95 9e 84 cb 19 62 62 9a 6c 7d d1 72 a1 fe db ee | ikev2 g^x 7d a2 91 96 e9 9b 41 e3 91 6e fa 9f 40 d9 46 29 | ikev2 g^x f7 36 a8 4e 69 27 c4 25 e9 34 b9 04 e1 c7 31 18 | ikev2 g^x 0b 28 87 c1 77 45 e4 46 53 25 13 33 a7 ac 03 53 | ikev2 g^x c9 3c 72 4e 74 60 e7 39 94 56 62 6d ee b9 d3 02 | ikev2 g^x 2a 0c 9a 32 f0 7c cb e2 48 4b 2d 51 c1 e5 58 8b | ikev2 g^x a8 23 c6 2c 51 52 24 80 0d 7d cc 16 3e 31 9e e6 | ikev2 g^x 71 52 28 2d b4 b4 3b 62 62 b3 21 2f 59 e6 9d 79 | ikev2 g^x f7 29 e4 95 de 3d 39 1a 26 63 23 12 ff c0 0a 67 | ikev2 g^x e7 ee f9 dc 2e f8 9f 5e 66 07 d9 34 2c d6 a4 14 | ikev2 g^x 99 5a 46 67 f6 74 4b 45 d5 08 b5 1e f0 a5 28 bb | ikev2 g^x ba 71 8c ef 8d 60 fe 98 e8 fa 14 ba 36 d2 6c 68 | ikev2 g^x 4f b0 d8 bf 4e 35 1f 41 60 59 db 50 3c 98 8a ba | ikev2 g^x 0e 23 2e 71 e9 de a7 37 01 ea 4e a2 5e 17 dc 44 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6f 09 61 08 e7 d3 02 a4 23 8b ad 3f 96 41 5b f2 | IKEv2 nonce f4 31 31 36 dc f8 65 88 dd f7 ab 3a d1 d6 75 ec | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 93 98 4a 9e f6 25 19 e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a0 | natd_hash: port= 01 f4 | natd_hash: hash= 01 ff 9b ec fc 4c 87 67 ce 20 05 7e da 19 49 e3 | natd_hash: hash= 4c 6c 24 de | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 01 ff 9b ec fc 4c 87 67 ce 20 05 7e da 19 49 e3 | Notify data 4c 6c 24 de | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 93 98 4a 9e f6 25 19 e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= b1 01 34 da ed 80 ef f8 48 f4 33 a8 8a cf 0d 3f | natd_hash: hash= 2f b5 1c 31 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b1 01 34 da ed 80 ef f8 48 f4 33 a8 8a cf 0d 3f | Notify data 2f b5 1c 31 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #714 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #714 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #714 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #714: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #714 to 4294967295 after switching state | Message ID: IKE #714 skipping update_recv as MD is fake | Message ID: sent #714 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-160" #714: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.160:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #714) | 93 98 4a 9e f6 25 19 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de a8 26 1d 46 1f fe 73 77 0b f1 18 a1 80 90 25 | b3 e7 bb 58 9b c2 81 b1 ff 7d b4 22 75 35 d1 db | 95 9e 84 cb 19 62 62 9a 6c 7d d1 72 a1 fe db ee | 7d a2 91 96 e9 9b 41 e3 91 6e fa 9f 40 d9 46 29 | f7 36 a8 4e 69 27 c4 25 e9 34 b9 04 e1 c7 31 18 | 0b 28 87 c1 77 45 e4 46 53 25 13 33 a7 ac 03 53 | c9 3c 72 4e 74 60 e7 39 94 56 62 6d ee b9 d3 02 | 2a 0c 9a 32 f0 7c cb e2 48 4b 2d 51 c1 e5 58 8b | a8 23 c6 2c 51 52 24 80 0d 7d cc 16 3e 31 9e e6 | 71 52 28 2d b4 b4 3b 62 62 b3 21 2f 59 e6 9d 79 | f7 29 e4 95 de 3d 39 1a 26 63 23 12 ff c0 0a 67 | e7 ee f9 dc 2e f8 9f 5e 66 07 d9 34 2c d6 a4 14 | 99 5a 46 67 f6 74 4b 45 d5 08 b5 1e f0 a5 28 bb | ba 71 8c ef 8d 60 fe 98 e8 fa 14 ba 36 d2 6c 68 | 4f b0 d8 bf 4e 35 1f 41 60 59 db 50 3c 98 8a ba | 0e 23 2e 71 e9 de a7 37 01 ea 4e a2 5e 17 dc 44 | 29 00 00 24 6f 09 61 08 e7 d3 02 a4 23 8b ad 3f | 96 41 5b f2 f4 31 31 36 dc f8 65 88 dd f7 ab 3a | d1 d6 75 ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 ff 9b ec fc 4c 87 67 ce 20 05 7e | da 19 49 e3 4c 6c 24 de 00 00 00 1c 00 00 40 05 | b1 01 34 da ed 80 ef f8 48 f4 33 a8 8a cf 0d 3f | 2f b5 1c 31 | state #714 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37801a4e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37802a9a0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #714 | libevent_malloc: new ptr-libevent@0x7fb3640a1080 size 128 | #714 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.228202 | resume sending helper answer for #714 suppresed complete_v2_state_transition() and stole MD | #714 spent 0.289 milliseconds in resume sending helper answer | stop processing: state #714 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb374080090 | processing resume sending helper answer for #715 | start processing: state #715 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 715 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #715 | **emit ISAKMP Message: | initiator cookie: | 87 f3 33 9b b4 5a 7a db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-169 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2f 32 d6 a1 b7 3c ef ab ae df c7 c4 47 cf 43 3e | ikev2 g^x e7 4d 13 2a bf 71 3b 06 70 19 5f 23 cb d2 4a 6c | ikev2 g^x b7 ad 55 a5 75 a2 bd 13 81 a8 86 77 91 cf 66 64 | ikev2 g^x 4b df 3a 00 d3 10 2e 7c 50 72 e2 b5 34 23 44 5d | ikev2 g^x 49 06 3f 61 27 b3 f6 2b 3a 24 b3 2d ad 3e 0b e7 | ikev2 g^x 98 08 a5 5f e5 eb 5d 79 a1 e5 54 0a c8 0d 72 b0 | ikev2 g^x bc 43 9d f8 27 f1 a9 ec d6 81 08 b0 58 fa 85 a5 | ikev2 g^x bd a3 f0 7d 30 fb 04 80 03 dd b7 91 fd d7 85 9b | ikev2 g^x 8b b8 04 da 0e 45 bc fd bb 40 af 79 c8 eb 61 4d | ikev2 g^x d1 36 0c 58 d4 5c c1 03 78 d1 4f 99 53 dc 30 3c | ikev2 g^x 7e 07 1a 87 fb cc 9f e3 42 35 3a 01 7a d8 f6 e1 | ikev2 g^x 85 49 36 04 18 9c b3 4b 00 44 96 48 ba 1b 91 57 | ikev2 g^x 4a 52 63 3f 06 c0 7e c7 73 42 05 cf 14 6a 96 99 | ikev2 g^x ce df 55 13 54 6e 39 b9 b7 60 f2 29 34 ed a0 4f | ikev2 g^x 37 df c2 18 42 23 f9 6f aa 0b b3 f0 83 72 6b 54 | ikev2 g^x 39 41 64 39 e0 e8 00 e8 59 63 aa 4c 7c 6e 89 ff | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b2 3a 76 ed ee 4c 41 d8 3e b5 c5 39 65 e9 8a 6a | IKEv2 nonce a3 e0 b7 ad 46 df 99 83 e4 f0 93 01 c4 aa 3b 42 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 87 f3 33 9b b4 5a 7a db | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a9 | natd_hash: port= 01 f4 | natd_hash: hash= b2 fe a8 f4 ae 1f 37 b2 cf ca d2 43 9d 58 d0 f7 | natd_hash: hash= e5 db f0 88 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b2 fe a8 f4 ae 1f 37 b2 cf ca d2 43 9d 58 d0 f7 | Notify data e5 db f0 88 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 87 f3 33 9b b4 5a 7a db | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 33 c7 89 bf 1b 04 9e 14 b7 74 ff c8 90 62 35 22 | natd_hash: hash= 26 50 c2 55 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 33 c7 89 bf 1b 04 9e 14 b7 74 ff c8 90 62 35 22 | Notify data 26 50 c2 55 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #715 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #715 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #715 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #715: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #715 to 4294967295 after switching state | Message ID: IKE #715 skipping update_recv as MD is fake | Message ID: sent #715 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-169" #715: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.169:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #715) | 87 f3 33 9b b4 5a 7a db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 32 d6 a1 b7 3c ef ab ae df c7 c4 47 cf 43 3e | e7 4d 13 2a bf 71 3b 06 70 19 5f 23 cb d2 4a 6c | b7 ad 55 a5 75 a2 bd 13 81 a8 86 77 91 cf 66 64 | 4b df 3a 00 d3 10 2e 7c 50 72 e2 b5 34 23 44 5d | 49 06 3f 61 27 b3 f6 2b 3a 24 b3 2d ad 3e 0b e7 | 98 08 a5 5f e5 eb 5d 79 a1 e5 54 0a c8 0d 72 b0 | bc 43 9d f8 27 f1 a9 ec d6 81 08 b0 58 fa 85 a5 | bd a3 f0 7d 30 fb 04 80 03 dd b7 91 fd d7 85 9b | 8b b8 04 da 0e 45 bc fd bb 40 af 79 c8 eb 61 4d | d1 36 0c 58 d4 5c c1 03 78 d1 4f 99 53 dc 30 3c | 7e 07 1a 87 fb cc 9f e3 42 35 3a 01 7a d8 f6 e1 | 85 49 36 04 18 9c b3 4b 00 44 96 48 ba 1b 91 57 | 4a 52 63 3f 06 c0 7e c7 73 42 05 cf 14 6a 96 99 | ce df 55 13 54 6e 39 b9 b7 60 f2 29 34 ed a0 4f | 37 df c2 18 42 23 f9 6f aa 0b b3 f0 83 72 6b 54 | 39 41 64 39 e0 e8 00 e8 59 63 aa 4c 7c 6e 89 ff | 29 00 00 24 b2 3a 76 ed ee 4c 41 d8 3e b5 c5 39 | 65 e9 8a 6a a3 e0 b7 ad 46 df 99 83 e4 f0 93 01 | c4 aa 3b 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 fe a8 f4 ae 1f 37 b2 cf ca d2 43 | 9d 58 d0 f7 e5 db f0 88 00 00 00 1c 00 00 40 05 | 33 c7 89 bf 1b 04 9e 14 b7 74 ff c8 90 62 35 22 | 26 50 c2 55 | state #715 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c023b10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a97080 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a97080 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #715 | libevent_malloc: new ptr-libevent@0x7fb374080090 size 128 | #715 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.228508 | resume sending helper answer for #715 suppresed complete_v2_state_transition() and stole MD | #715 spent 0.285 milliseconds in resume sending helper answer | stop processing: state #715 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c08aed0 | processing resume sending helper answer for #736 | start processing: state #736 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 736 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #736 | **emit ISAKMP Message: | initiator cookie: | 55 f4 27 9b 2c 7e 0c 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-232 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 44 4e 06 40 b2 65 21 5d 08 0a 87 dc 23 78 63 f5 | ikev2 g^x 59 9b 01 94 f1 c6 ee de 2e 54 64 04 7b bf ee 90 | ikev2 g^x 74 b0 cc 16 6d 13 9e 63 f9 06 73 5e 5e 85 4b c6 | ikev2 g^x 1e 30 91 54 94 48 03 60 af 1a 46 14 b6 86 67 6e | ikev2 g^x 56 bb 9d f9 7c bd d8 15 ef da 2d b6 8e e2 c0 fa | ikev2 g^x 6c 86 fc 27 18 08 26 1c 3b c7 8f ab c9 15 f1 b5 | ikev2 g^x 77 17 8f 4e 86 0e 1d 02 0e cb 79 7f 00 de 43 ca | ikev2 g^x 0d 98 67 80 78 be 76 95 19 4f 8e 1c 0f 1f 02 46 | ikev2 g^x b5 24 e0 a5 90 31 f0 6c 94 59 9e 86 fe 50 a7 16 | ikev2 g^x d3 90 18 f9 5a 5e f2 b0 85 c0 8a bb 36 a9 3c e6 | ikev2 g^x 3f 58 61 ed 76 63 9e 91 dd 1d 1d a5 d8 6f 61 e6 | ikev2 g^x 60 34 52 1f c7 3c 4a b9 12 d2 23 01 83 9f e0 72 | ikev2 g^x b0 b1 95 db a2 3d bd 5f 63 44 17 84 2a 1c ae e2 | ikev2 g^x 87 6e eb 4c 2d b2 76 61 6e 10 55 07 2f 21 a9 05 | ikev2 g^x 7b e7 0e 8d 3b 46 3c a2 52 e3 e4 5a a7 20 76 cc | ikev2 g^x 56 d5 06 15 ef aa e4 2d 6f 6f 60 d9 2a 22 ec 23 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 74 fa 10 32 44 33 16 00 ef 17 0b a3 58 ac 5e 66 | IKEv2 nonce 66 dc 61 3e 96 b9 65 fa 72 73 66 81 d0 51 f7 ed | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 55 f4 27 9b 2c 7e 0c 67 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e8 | natd_hash: port= 01 f4 | natd_hash: hash= e4 28 12 e2 be f3 1a 42 9e c5 b7 6c 8d fd 8b 3e | natd_hash: hash= 75 2f e5 8c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e4 28 12 e2 be f3 1a 42 9e c5 b7 6c 8d fd 8b 3e | Notify data 75 2f e5 8c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 55 f4 27 9b 2c 7e 0c 67 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 19 e4 47 16 1b 11 27 dd e0 d9 21 b8 1a e6 c5 9c | natd_hash: hash= 84 34 90 f4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 19 e4 47 16 1b 11 27 dd e0 d9 21 b8 1a e6 c5 9c | Notify data 84 34 90 f4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #736 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #736 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #736 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #736: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #736 to 4294967295 after switching state | Message ID: IKE #736 skipping update_recv as MD is fake | Message ID: sent #736 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-232" #736: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.232:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #736) | 55 f4 27 9b 2c 7e 0c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 4e 06 40 b2 65 21 5d 08 0a 87 dc 23 78 63 f5 | 59 9b 01 94 f1 c6 ee de 2e 54 64 04 7b bf ee 90 | 74 b0 cc 16 6d 13 9e 63 f9 06 73 5e 5e 85 4b c6 | 1e 30 91 54 94 48 03 60 af 1a 46 14 b6 86 67 6e | 56 bb 9d f9 7c bd d8 15 ef da 2d b6 8e e2 c0 fa | 6c 86 fc 27 18 08 26 1c 3b c7 8f ab c9 15 f1 b5 | 77 17 8f 4e 86 0e 1d 02 0e cb 79 7f 00 de 43 ca | 0d 98 67 80 78 be 76 95 19 4f 8e 1c 0f 1f 02 46 | b5 24 e0 a5 90 31 f0 6c 94 59 9e 86 fe 50 a7 16 | d3 90 18 f9 5a 5e f2 b0 85 c0 8a bb 36 a9 3c e6 | 3f 58 61 ed 76 63 9e 91 dd 1d 1d a5 d8 6f 61 e6 | 60 34 52 1f c7 3c 4a b9 12 d2 23 01 83 9f e0 72 | b0 b1 95 db a2 3d bd 5f 63 44 17 84 2a 1c ae e2 | 87 6e eb 4c 2d b2 76 61 6e 10 55 07 2f 21 a9 05 | 7b e7 0e 8d 3b 46 3c a2 52 e3 e4 5a a7 20 76 cc | 56 d5 06 15 ef aa e4 2d 6f 6f 60 d9 2a 22 ec 23 | 29 00 00 24 74 fa 10 32 44 33 16 00 ef 17 0b a3 | 58 ac 5e 66 66 dc 61 3e 96 b9 65 fa 72 73 66 81 | d0 51 f7 ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 28 12 e2 be f3 1a 42 9e c5 b7 6c | 8d fd 8b 3e 75 2f e5 8c 00 00 00 1c 00 00 40 05 | 19 e4 47 16 1b 11 27 dd e0 d9 21 b8 1a e6 c5 9c | 84 34 90 f4 | state #736 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c03a770 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c02aab0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c039e80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #736 | libevent_malloc: new ptr-libevent@0x7fb37c08aed0 size 128 | #736 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.228814 | resume sending helper answer for #736 suppresed complete_v2_state_transition() and stole MD | #736 spent 0.284 milliseconds in resume sending helper answer | stop processing: state #736 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c088410 | processing resume sending helper answer for #730 | start processing: state #730 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 730 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #730 | **emit ISAKMP Message: | initiator cookie: | c1 b9 1a 2f a2 98 4a 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-234 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 52 90 42 68 2d aa ea 2e 10 58 50 76 72 99 aa 32 | ikev2 g^x eb bb 32 a1 c5 3b 39 b6 da 46 5c be 25 37 be ed | ikev2 g^x ef 19 db bb 09 e7 d6 5a e9 9a f4 55 2b 2e a7 bb | ikev2 g^x 7d 7e ab 94 f5 2d 7f 2f 19 2d 9d be 3b 1e 1f bc | ikev2 g^x 50 99 e9 b4 9a 91 0e c6 06 9d 5d 9a ba af 5a 8e | ikev2 g^x 69 1a 0a b7 44 11 98 29 1c 1a dc d0 d0 5d fa 86 | ikev2 g^x 8a 1a e8 5e 7f fc 9d 17 de 62 df a0 79 b7 62 86 | ikev2 g^x 03 fc dc 45 27 d9 98 5e 7e c1 5d 73 17 7b d2 39 | ikev2 g^x a9 02 e8 b3 fe 5b 39 41 98 ea d2 07 3a ff 02 e9 | ikev2 g^x 9c b2 8a 30 03 fa 2c fb df 3c f4 0d 12 f0 fb b7 | ikev2 g^x 2d e5 f6 c1 41 31 4c a6 2b 97 92 32 b8 ab ea d4 | ikev2 g^x 0c b2 3f eb 53 93 29 c9 b9 5f b1 d5 21 34 f2 4d | ikev2 g^x fc e4 2a 50 24 06 56 bc c7 41 5b 59 70 69 cf 96 | ikev2 g^x 1c 5a 5f 05 3e a5 0f f1 a8 c5 92 7e bd 2b fd 46 | ikev2 g^x f0 21 0d 82 1e f5 38 85 81 4e 66 9c 19 55 16 0e | ikev2 g^x 44 6b 58 99 91 1b 47 47 7a f8 3e 28 3f a5 78 ea | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 55 e3 90 65 fa b6 41 c6 1d 4f a6 98 ca 46 e7 a1 | IKEv2 nonce 7a 87 94 e6 4e 60 4a 2e 32 84 98 8c 92 ba 64 89 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c1 b9 1a 2f a2 98 4a 10 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ea | natd_hash: port= 01 f4 | natd_hash: hash= d0 cb 8c 60 04 f9 7c 78 24 b5 81 07 7f 5b 58 33 | natd_hash: hash= fe 16 dc a2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d0 cb 8c 60 04 f9 7c 78 24 b5 81 07 7f 5b 58 33 | Notify data fe 16 dc a2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c1 b9 1a 2f a2 98 4a 10 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6f f5 31 fa 7e c6 ed 0e 01 8d 80 c5 e9 40 f1 ef | natd_hash: hash= d7 29 12 3d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6f f5 31 fa 7e c6 ed 0e 01 8d 80 c5 e9 40 f1 ef | Notify data d7 29 12 3d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #730 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #730 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #730 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #730: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #730 to 4294967295 after switching state | Message ID: IKE #730 skipping update_recv as MD is fake | Message ID: sent #730 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-234" #730: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.234:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #730) | c1 b9 1a 2f a2 98 4a 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 90 42 68 2d aa ea 2e 10 58 50 76 72 99 aa 32 | eb bb 32 a1 c5 3b 39 b6 da 46 5c be 25 37 be ed | ef 19 db bb 09 e7 d6 5a e9 9a f4 55 2b 2e a7 bb | 7d 7e ab 94 f5 2d 7f 2f 19 2d 9d be 3b 1e 1f bc | 50 99 e9 b4 9a 91 0e c6 06 9d 5d 9a ba af 5a 8e | 69 1a 0a b7 44 11 98 29 1c 1a dc d0 d0 5d fa 86 | 8a 1a e8 5e 7f fc 9d 17 de 62 df a0 79 b7 62 86 | 03 fc dc 45 27 d9 98 5e 7e c1 5d 73 17 7b d2 39 | a9 02 e8 b3 fe 5b 39 41 98 ea d2 07 3a ff 02 e9 | 9c b2 8a 30 03 fa 2c fb df 3c f4 0d 12 f0 fb b7 | 2d e5 f6 c1 41 31 4c a6 2b 97 92 32 b8 ab ea d4 | 0c b2 3f eb 53 93 29 c9 b9 5f b1 d5 21 34 f2 4d | fc e4 2a 50 24 06 56 bc c7 41 5b 59 70 69 cf 96 | 1c 5a 5f 05 3e a5 0f f1 a8 c5 92 7e bd 2b fd 46 | f0 21 0d 82 1e f5 38 85 81 4e 66 9c 19 55 16 0e | 44 6b 58 99 91 1b 47 47 7a f8 3e 28 3f a5 78 ea | 29 00 00 24 55 e3 90 65 fa b6 41 c6 1d 4f a6 98 | ca 46 e7 a1 7a 87 94 e6 4e 60 4a 2e 32 84 98 8c | 92 ba 64 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 cb 8c 60 04 f9 7c 78 24 b5 81 07 | 7f 5b 58 33 fe 16 dc a2 00 00 00 1c 00 00 40 05 | 6f f5 31 fa 7e c6 ed 0e 01 8d 80 c5 e9 40 f1 ef | d7 29 12 3d | state #730 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb354023e30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35400cc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #730 | libevent_malloc: new ptr-libevent@0x7fb36c088410 size 128 | #730 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.229137 | resume sending helper answer for #730 suppresed complete_v2_state_transition() and stole MD | #730 spent 0.299 milliseconds in resume sending helper answer | stop processing: state #730 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c02e960 | processing resume sending helper answer for #731 | start processing: state #731 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 731 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #731 | **emit ISAKMP Message: | initiator cookie: | eb e9 70 00 69 c5 c4 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-247 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5c 67 4d f9 7f 74 4c 76 c5 7d ce d6 e6 9c c9 6d | ikev2 g^x b0 c4 70 40 ef 97 97 d2 1c 4e 93 b0 80 9d 3a eb | ikev2 g^x 37 1f 1d 04 0c ef 30 c3 25 21 ef b9 52 fa f8 25 | ikev2 g^x f3 a2 cd d3 47 9d 78 9f 8b c4 7e 38 5c 77 0a c5 | ikev2 g^x d3 21 67 45 0d dd 9e 51 ac e8 fe 88 81 61 87 c2 | ikev2 g^x bf ec 72 79 20 70 3d b9 9b 4a 0a cc 96 c2 0c 1c | ikev2 g^x b4 24 87 a5 62 f8 87 c2 7a b5 bf bd b6 53 b6 6d | ikev2 g^x 19 8f 82 6c 68 5d f7 38 34 94 99 64 71 ca 0c 62 | ikev2 g^x 25 bd 32 0c 2a f6 57 9c 09 73 ce dd 1e 58 8d ff | ikev2 g^x 02 8b 34 0a 54 68 de e5 d0 3e d2 74 a9 f6 24 94 | ikev2 g^x f8 4f 07 60 33 d2 a1 12 0e 69 d9 92 e8 be 55 47 | ikev2 g^x 9e be 0f a2 43 78 15 07 2a 74 35 28 6a 6d 64 ef | ikev2 g^x 98 ba 51 d6 01 0e df f1 ec a7 d0 19 a4 37 69 ad | ikev2 g^x 90 02 2d 4c a7 53 6f b7 ea d5 ab de f2 8a 74 80 | ikev2 g^x 9a 6e ee d2 0f 75 5b 34 33 20 ef e8 cd 1c f4 fb | ikev2 g^x 86 77 5a 4b ee a3 d1 6d 3f c5 96 d8 02 ae e5 6b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b0 eb 9d cd b4 1b 6f 55 a3 ba 16 0e 88 2e d4 ea | IKEv2 nonce 77 6f 8c e6 93 bf f5 13 b8 7e f8 74 0e 59 6f 68 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= eb e9 70 00 69 c5 c4 83 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f7 | natd_hash: port= 01 f4 | natd_hash: hash= bb fd fb f3 6e e4 ad 3c d3 d9 d4 b4 6c e9 ad f0 | natd_hash: hash= 0d 3a ec db | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bb fd fb f3 6e e4 ad 3c d3 d9 d4 b4 6c e9 ad f0 | Notify data 0d 3a ec db | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= eb e9 70 00 69 c5 c4 83 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 69 a1 72 77 b4 3e 53 1b 4f 8c d6 b0 82 44 05 d3 | natd_hash: hash= c0 95 51 82 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 69 a1 72 77 b4 3e 53 1b 4f 8c d6 b0 82 44 05 d3 | Notify data c0 95 51 82 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #731 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #731 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #731 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #731: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #731 to 4294967295 after switching state | Message ID: IKE #731 skipping update_recv as MD is fake | Message ID: sent #731 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-247" #731: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.247:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #731) | eb e9 70 00 69 c5 c4 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 67 4d f9 7f 74 4c 76 c5 7d ce d6 e6 9c c9 6d | b0 c4 70 40 ef 97 97 d2 1c 4e 93 b0 80 9d 3a eb | 37 1f 1d 04 0c ef 30 c3 25 21 ef b9 52 fa f8 25 | f3 a2 cd d3 47 9d 78 9f 8b c4 7e 38 5c 77 0a c5 | d3 21 67 45 0d dd 9e 51 ac e8 fe 88 81 61 87 c2 | bf ec 72 79 20 70 3d b9 9b 4a 0a cc 96 c2 0c 1c | b4 24 87 a5 62 f8 87 c2 7a b5 bf bd b6 53 b6 6d | 19 8f 82 6c 68 5d f7 38 34 94 99 64 71 ca 0c 62 | 25 bd 32 0c 2a f6 57 9c 09 73 ce dd 1e 58 8d ff | 02 8b 34 0a 54 68 de e5 d0 3e d2 74 a9 f6 24 94 | f8 4f 07 60 33 d2 a1 12 0e 69 d9 92 e8 be 55 47 | 9e be 0f a2 43 78 15 07 2a 74 35 28 6a 6d 64 ef | 98 ba 51 d6 01 0e df f1 ec a7 d0 19 a4 37 69 ad | 90 02 2d 4c a7 53 6f b7 ea d5 ab de f2 8a 74 80 | 9a 6e ee d2 0f 75 5b 34 33 20 ef e8 cd 1c f4 fb | 86 77 5a 4b ee a3 d1 6d 3f c5 96 d8 02 ae e5 6b | 29 00 00 24 b0 eb 9d cd b4 1b 6f 55 a3 ba 16 0e | 88 2e d4 ea 77 6f 8c e6 93 bf f5 13 b8 7e f8 74 | 0e 59 6f 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bb fd fb f3 6e e4 ad 3c d3 d9 d4 b4 | 6c e9 ad f0 0d 3a ec db 00 00 00 1c 00 00 40 05 | 69 a1 72 77 b4 3e 53 1b 4f 8c d6 b0 82 44 05 d3 | c0 95 51 82 | state #731 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35402ede0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35401d710 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35401d710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #731 | libevent_malloc: new ptr-libevent@0x7fb35c02e960 size 128 | #731 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.229432 | resume sending helper answer for #731 suppresed complete_v2_state_transition() and stole MD | #731 spent 0.276 milliseconds in resume sending helper answer | stop processing: state #731 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36007fb40 | processing resume sending helper answer for #727 | start processing: state #727 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 727 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #727 | **emit ISAKMP Message: | initiator cookie: | 8b be 7d ad 6e 47 4b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-210 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 03 ce c0 c2 e4 25 8d 86 08 cb bc 52 7c b3 ee 01 | ikev2 g^x 8f ba c4 6d 6c f4 6a 0f 46 b6 08 ec ce 35 fd 9c | ikev2 g^x a3 96 7a 4b 39 46 2f 87 e0 b3 24 68 bd 08 f7 00 | ikev2 g^x de fe bc 6e 99 53 33 72 6d 31 50 a8 3c bf 8e 11 | ikev2 g^x d1 0a 86 13 1f ce ce c3 0f e1 bc 5e 80 8e a2 d6 | ikev2 g^x 27 e8 f2 bf ec d9 e9 f3 3d aa 43 3a 6b 97 d5 34 | ikev2 g^x 59 78 15 39 b7 bd 30 ea b2 e1 44 a5 f8 e8 38 86 | ikev2 g^x 54 db 07 6a ef ad cc 3a 56 0e d2 27 fb 2a 77 ba | ikev2 g^x 36 51 b8 10 07 62 d5 90 4d ca 0a 32 87 1d ce b4 | ikev2 g^x 7e 83 81 e7 d9 b6 8e 25 b8 6b 2b 0c cf a3 60 19 | ikev2 g^x e6 bb d6 4e 72 2e 81 71 f8 13 f2 9a 9e d8 eb 8f | ikev2 g^x a8 36 ae 05 81 aa e7 46 61 6c 3f 81 1b 7b cf f6 | ikev2 g^x 87 cb 65 20 06 d0 84 24 80 2e 3a 60 fb 99 c3 62 | ikev2 g^x 5a 0a 79 d7 36 6c 19 82 db 33 f0 6e 27 96 59 38 | ikev2 g^x 58 4d f2 ec c1 c1 e4 2b e2 58 27 a6 55 42 ca 3e | ikev2 g^x 3f c8 1e 9e 7e b4 88 cc 40 5e 23 e7 74 a8 91 f7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 64 58 e5 0d 0a 27 42 8e 74 e9 35 15 5e 05 1e ab | IKEv2 nonce 85 d6 6f 92 8b 8b 06 7e e2 32 18 1f 9e 03 0b 36 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8b be 7d ad 6e 47 4b cb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d2 | natd_hash: port= 01 f4 | natd_hash: hash= 71 5b 13 d9 03 56 0b 94 2e 9b 60 60 d4 0c 9d 62 | natd_hash: hash= 4a 5b 9a a3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 71 5b 13 d9 03 56 0b 94 2e 9b 60 60 d4 0c 9d 62 | Notify data 4a 5b 9a a3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8b be 7d ad 6e 47 4b cb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 8c 55 6f f9 09 4d e0 77 bd 22 46 44 fb 95 c0 d9 | natd_hash: hash= 83 9d 9f 2c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8c 55 6f f9 09 4d e0 77 bd 22 46 44 fb 95 c0 d9 | Notify data 83 9d 9f 2c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #727 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #727 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #727 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #727: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #727 to 4294967295 after switching state | Message ID: IKE #727 skipping update_recv as MD is fake | Message ID: sent #727 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-210" #727: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.210:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #727) | 8b be 7d ad 6e 47 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 ce c0 c2 e4 25 8d 86 08 cb bc 52 7c b3 ee 01 | 8f ba c4 6d 6c f4 6a 0f 46 b6 08 ec ce 35 fd 9c | a3 96 7a 4b 39 46 2f 87 e0 b3 24 68 bd 08 f7 00 | de fe bc 6e 99 53 33 72 6d 31 50 a8 3c bf 8e 11 | d1 0a 86 13 1f ce ce c3 0f e1 bc 5e 80 8e a2 d6 | 27 e8 f2 bf ec d9 e9 f3 3d aa 43 3a 6b 97 d5 34 | 59 78 15 39 b7 bd 30 ea b2 e1 44 a5 f8 e8 38 86 | 54 db 07 6a ef ad cc 3a 56 0e d2 27 fb 2a 77 ba | 36 51 b8 10 07 62 d5 90 4d ca 0a 32 87 1d ce b4 | 7e 83 81 e7 d9 b6 8e 25 b8 6b 2b 0c cf a3 60 19 | e6 bb d6 4e 72 2e 81 71 f8 13 f2 9a 9e d8 eb 8f | a8 36 ae 05 81 aa e7 46 61 6c 3f 81 1b 7b cf f6 | 87 cb 65 20 06 d0 84 24 80 2e 3a 60 fb 99 c3 62 | 5a 0a 79 d7 36 6c 19 82 db 33 f0 6e 27 96 59 38 | 58 4d f2 ec c1 c1 e4 2b e2 58 27 a6 55 42 ca 3e | 3f c8 1e 9e 7e b4 88 cc 40 5e 23 e7 74 a8 91 f7 | 29 00 00 24 64 58 e5 0d 0a 27 42 8e 74 e9 35 15 | 5e 05 1e ab 85 d6 6f 92 8b 8b 06 7e e2 32 18 1f | 9e 03 0b 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 71 5b 13 d9 03 56 0b 94 2e 9b 60 60 | d4 0c 9d 62 4a 5b 9a a3 00 00 00 1c 00 00 40 05 | 8c 55 6f f9 09 4d e0 77 bd 22 46 44 fb 95 c0 d9 | 83 9d 9f 2c | state #727 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c03a770 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c012890 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012890 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #727 | libevent_malloc: new ptr-libevent@0x7fb36007fb40 size 128 | #727 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.22973 | resume sending helper answer for #727 suppresed complete_v2_state_transition() and stole MD | #727 spent 0.277 milliseconds in resume sending helper answer | stop processing: state #727 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36409b8a0 | processing resume sending helper answer for #711 | start processing: state #711 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 711 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #711 | **emit ISAKMP Message: | initiator cookie: | 46 de dd ae 1b 33 3b 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-186 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1e fb f8 69 eb 92 56 fa e8 6b 80 bd 3a a2 f1 5d | ikev2 g^x e2 2f 9e d6 bd 7f 97 c8 b3 8b 02 5b 38 41 e1 ee | ikev2 g^x 42 a6 3c b3 1b 0e f8 ed 2c 61 73 24 75 ee ff 11 | ikev2 g^x 80 e8 65 c5 04 0b 39 c2 cf a9 e0 e7 ea b8 69 59 | ikev2 g^x 88 22 65 ae 2e 6e ce 7a 3b 8e 9b 5b ae 73 1c 45 | ikev2 g^x a6 ad 6e ff 7d ee 57 ae 75 fe db 29 33 14 d8 3e | ikev2 g^x 84 01 d5 70 75 bc 33 43 cd 9a a0 3d 7a fa c8 fc | ikev2 g^x 80 64 21 7f 34 0e a8 e0 72 05 42 a2 8e f8 64 07 | ikev2 g^x 62 20 d0 e7 cc 2d 35 50 67 31 52 27 ea 4a 4b f5 | ikev2 g^x 65 1f c8 ad 67 9b 47 53 9b 2a 89 ab 3e 19 8c 26 | ikev2 g^x e6 31 27 4a fe b0 71 d9 94 76 e6 64 92 ba 3e 1f | ikev2 g^x 40 a8 76 db 49 ed 4d 4e 20 ff 29 d6 24 a3 26 db | ikev2 g^x a5 a9 f6 f0 13 de f5 16 c5 c8 94 6b 66 f0 42 99 | ikev2 g^x 03 d4 dd a2 4b 2b 63 3c 83 09 26 b0 bf 90 c2 8e | ikev2 g^x ca 70 e7 02 59 40 bb 5d a0 d8 f9 cd ca 9c 92 09 | ikev2 g^x 26 05 b9 92 8a d9 e6 4b fa 8a 50 3c b1 69 e2 b7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c3 2e 34 07 d1 26 64 7f 7d a5 2a e0 34 43 1a f1 | IKEv2 nonce ce 3a 79 7d 9c a6 d5 be 0a 57 a8 05 ad df 51 bf | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 46 de dd ae 1b 33 3b 5a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ba | natd_hash: port= 01 f4 | natd_hash: hash= 39 81 0e 00 c8 04 84 dc 32 f7 ff 89 08 01 7a 69 | natd_hash: hash= 9d 96 cf 86 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 39 81 0e 00 c8 04 84 dc 32 f7 ff 89 08 01 7a 69 | Notify data 9d 96 cf 86 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 46 de dd ae 1b 33 3b 5a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 8b 19 f6 3c e3 44 56 e8 bd d2 d9 5b 06 2a 9c bc | natd_hash: hash= df fe 2c 91 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8b 19 f6 3c e3 44 56 e8 bd d2 d9 5b 06 2a 9c bc | Notify data df fe 2c 91 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #711 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #711 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #711 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #711: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #711 to 4294967295 after switching state | Message ID: IKE #711 skipping update_recv as MD is fake | Message ID: sent #711 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-186" #711: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.186:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #711) | 46 de dd ae 1b 33 3b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1e fb f8 69 eb 92 56 fa e8 6b 80 bd 3a a2 f1 5d | e2 2f 9e d6 bd 7f 97 c8 b3 8b 02 5b 38 41 e1 ee | 42 a6 3c b3 1b 0e f8 ed 2c 61 73 24 75 ee ff 11 | 80 e8 65 c5 04 0b 39 c2 cf a9 e0 e7 ea b8 69 59 | 88 22 65 ae 2e 6e ce 7a 3b 8e 9b 5b ae 73 1c 45 | a6 ad 6e ff 7d ee 57 ae 75 fe db 29 33 14 d8 3e | 84 01 d5 70 75 bc 33 43 cd 9a a0 3d 7a fa c8 fc | 80 64 21 7f 34 0e a8 e0 72 05 42 a2 8e f8 64 07 | 62 20 d0 e7 cc 2d 35 50 67 31 52 27 ea 4a 4b f5 | 65 1f c8 ad 67 9b 47 53 9b 2a 89 ab 3e 19 8c 26 | e6 31 27 4a fe b0 71 d9 94 76 e6 64 92 ba 3e 1f | 40 a8 76 db 49 ed 4d 4e 20 ff 29 d6 24 a3 26 db | a5 a9 f6 f0 13 de f5 16 c5 c8 94 6b 66 f0 42 99 | 03 d4 dd a2 4b 2b 63 3c 83 09 26 b0 bf 90 c2 8e | ca 70 e7 02 59 40 bb 5d a0 d8 f9 cd ca 9c 92 09 | 26 05 b9 92 8a d9 e6 4b fa 8a 50 3c b1 69 e2 b7 | 29 00 00 24 c3 2e 34 07 d1 26 64 7f 7d a5 2a e0 | 34 43 1a f1 ce 3a 79 7d 9c a6 d5 be 0a 57 a8 05 | ad df 51 bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 81 0e 00 c8 04 84 dc 32 f7 ff 89 | 08 01 7a 69 9d 96 cf 86 00 00 00 1c 00 00 40 05 | 8b 19 f6 3c e3 44 56 e8 bd d2 d9 5b 06 2a 9c bc | df fe 2c 91 | state #711 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3680345d0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb368040840 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368040840 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #711 | libevent_malloc: new ptr-libevent@0x7fb36409b8a0 size 128 | #711 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.230027 | resume sending helper answer for #711 suppresed complete_v2_state_transition() and stole MD | #711 spent 0.277 milliseconds in resume sending helper answer | stop processing: state #711 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb384081730 | processing resume sending helper answer for #728 | start processing: state #728 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 728 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #728 | **emit ISAKMP Message: | initiator cookie: | ed 95 ac b7 77 3a 63 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-216 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x da a2 78 27 f5 2b 54 2f 55 96 c5 81 6c 0c a3 b6 | ikev2 g^x 83 12 f5 d9 b8 01 ba b8 d1 a3 42 87 c7 6c 10 0b | ikev2 g^x 63 a4 94 ca d4 f6 e8 4d 22 ce 05 39 88 91 97 f2 | ikev2 g^x bf 09 37 b9 98 b1 d8 26 bb b2 1e 92 29 a1 85 7b | ikev2 g^x d9 b4 11 29 68 ff 40 91 35 9a 09 da d2 cb 07 e0 | ikev2 g^x ae c3 2d ed f0 4b 10 75 57 d6 65 48 df c7 a2 4f | ikev2 g^x 3e 00 5e 43 75 06 44 c7 49 4f d8 29 1c 6d 72 c2 | ikev2 g^x 18 aa 3c c4 95 78 2a 63 17 27 ba 03 8b b4 08 69 | ikev2 g^x 8a 41 ef 22 d5 36 45 8d d5 f1 45 ce bd 99 4c 4d | ikev2 g^x 22 ad 81 3f 5d 00 25 1c ad bf 2e f7 8e 8c 80 7b | ikev2 g^x 93 69 16 30 fc 43 30 2d 8f 1d f1 a2 b8 cf 8e 13 | ikev2 g^x 28 9a d4 35 b3 7b 77 53 24 b9 b6 62 c4 97 31 69 | ikev2 g^x 7f 76 13 0e 62 30 c6 ee 48 5c 32 ac fd 53 7f 7a | ikev2 g^x b6 10 d9 5f 7f 00 e8 b0 6d 1d 12 23 94 fa ae 8f | ikev2 g^x 68 f1 36 29 a4 6a f8 df 72 30 2e d8 f7 b9 49 8c | ikev2 g^x 43 c5 19 cb c2 38 18 75 d9 fc 13 c1 7d d2 e2 e9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e5 63 4e 91 26 c4 75 00 d8 52 0a 1f e4 6e 1e 05 | IKEv2 nonce a3 b4 ec ce fa fc d1 db 89 1d 66 0a aa 77 5c 9d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ed 95 ac b7 77 3a 63 2c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d8 | natd_hash: port= 01 f4 | natd_hash: hash= f2 d6 04 97 64 cb df f6 9c 65 fd 98 bb ed f5 4e | natd_hash: hash= d4 61 43 0a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f2 d6 04 97 64 cb df f6 9c 65 fd 98 bb ed f5 4e | Notify data d4 61 43 0a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ed 95 ac b7 77 3a 63 2c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 5c 17 83 01 62 b0 09 8f af 57 ad 85 0a ed 60 b0 | natd_hash: hash= 19 a9 47 40 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5c 17 83 01 62 b0 09 8f af 57 ad 85 0a ed 60 b0 | Notify data 19 a9 47 40 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #728 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #728 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #728 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #728: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #728 to 4294967295 after switching state | Message ID: IKE #728 skipping update_recv as MD is fake | Message ID: sent #728 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-216" #728: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.216:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #728) | ed 95 ac b7 77 3a 63 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da a2 78 27 f5 2b 54 2f 55 96 c5 81 6c 0c a3 b6 | 83 12 f5 d9 b8 01 ba b8 d1 a3 42 87 c7 6c 10 0b | 63 a4 94 ca d4 f6 e8 4d 22 ce 05 39 88 91 97 f2 | bf 09 37 b9 98 b1 d8 26 bb b2 1e 92 29 a1 85 7b | d9 b4 11 29 68 ff 40 91 35 9a 09 da d2 cb 07 e0 | ae c3 2d ed f0 4b 10 75 57 d6 65 48 df c7 a2 4f | 3e 00 5e 43 75 06 44 c7 49 4f d8 29 1c 6d 72 c2 | 18 aa 3c c4 95 78 2a 63 17 27 ba 03 8b b4 08 69 | 8a 41 ef 22 d5 36 45 8d d5 f1 45 ce bd 99 4c 4d | 22 ad 81 3f 5d 00 25 1c ad bf 2e f7 8e 8c 80 7b | 93 69 16 30 fc 43 30 2d 8f 1d f1 a2 b8 cf 8e 13 | 28 9a d4 35 b3 7b 77 53 24 b9 b6 62 c4 97 31 69 | 7f 76 13 0e 62 30 c6 ee 48 5c 32 ac fd 53 7f 7a | b6 10 d9 5f 7f 00 e8 b0 6d 1d 12 23 94 fa ae 8f | 68 f1 36 29 a4 6a f8 df 72 30 2e d8 f7 b9 49 8c | 43 c5 19 cb c2 38 18 75 d9 fc 13 c1 7d d2 e2 e9 | 29 00 00 24 e5 63 4e 91 26 c4 75 00 d8 52 0a 1f | e4 6e 1e 05 a3 b4 ec ce fa fc d1 db 89 1d 66 0a | aa 77 5c 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 d6 04 97 64 cb df f6 9c 65 fd 98 | bb ed f5 4e d4 61 43 0a 00 00 00 1c 00 00 40 05 | 5c 17 83 01 62 b0 09 8f af 57 ad 85 0a ed 60 b0 | 19 a9 47 40 | state #728 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3500180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b24700 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #728 | libevent_malloc: new ptr-libevent@0x7fb384081730 size 128 | #728 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.230357 | resume sending helper answer for #728 suppresed complete_v2_state_transition() and stole MD | #728 spent 0.309 milliseconds in resume sending helper answer | stop processing: state #728 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb378075590 | processing resume sending helper answer for #713 | start processing: state #713 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 713 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #713 | **emit ISAKMP Message: | initiator cookie: | 20 dc 25 60 99 b6 74 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-207 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c5 1a 96 8e da d9 76 91 00 af bb 9d 79 5c a7 f9 | ikev2 g^x 26 9d cd 16 f2 cf f0 0f dd 87 89 cd 98 91 eb 12 | ikev2 g^x f7 47 01 49 c9 0c ea 1d 57 4d 8d 91 7e f9 5c 7d | ikev2 g^x 62 0f af 55 c6 bc 19 04 21 c1 da f5 0d b7 e3 c7 | ikev2 g^x 41 ab 99 a5 b4 0f 24 bf bd 73 7a 98 7e f2 66 cc | ikev2 g^x 39 17 ee 34 24 36 ea 24 e3 a8 cd 1c e6 e8 5a 7f | ikev2 g^x 02 cb 52 c1 dd 90 79 6c 09 65 91 9c 65 f3 ff 96 | ikev2 g^x 37 cb cc 02 51 48 e0 ea 49 21 16 ff ee ee 96 24 | ikev2 g^x 7e bc 47 96 21 d4 d4 e3 da f1 b1 67 58 e0 84 dd | ikev2 g^x cd 55 51 7a 46 9a 9d 6d 24 17 4a d7 b1 02 0a 7c | ikev2 g^x 2b 10 29 49 15 25 a5 35 a0 5f db 1c 3f d4 d5 d1 | ikev2 g^x ba 0c e0 43 cb 60 ff 0f 6f 32 b4 f2 ed 61 11 ce | ikev2 g^x ac 22 75 61 4c 15 28 19 61 92 f0 56 38 fd 6f 8d | ikev2 g^x 1e 94 22 c4 ed 8e 7c e6 0e 10 58 4f 8b 71 f0 63 | ikev2 g^x d0 57 19 ab 38 9b 18 02 96 06 c0 6a c4 51 d7 5c | ikev2 g^x d1 98 c8 9d dc 57 3d 80 8d bf 2e ee 62 b7 a7 01 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 44 80 b4 97 28 30 0f ac 4f 85 8e 79 66 f6 8c 9d | IKEv2 nonce 57 3e 45 8b 53 c5 51 08 e9 85 21 22 22 bd a5 bf | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 20 dc 25 60 99 b6 74 a0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 cf | natd_hash: port= 01 f4 | natd_hash: hash= 35 16 73 ae ce da d8 0d 5b 76 05 8d 10 2c 6d 16 | natd_hash: hash= 83 97 d4 49 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 35 16 73 ae ce da d8 0d 5b 76 05 8d 10 2c 6d 16 | Notify data 83 97 d4 49 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 20 dc 25 60 99 b6 74 a0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1b 17 49 13 60 8d 27 d3 b4 e3 12 fd 7c ef 9d 70 | natd_hash: hash= 2a 84 34 8f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b 17 49 13 60 8d 27 d3 b4 e3 12 fd 7c ef 9d 70 | Notify data 2a 84 34 8f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #713 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #713 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #713 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #713: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #713 to 4294967295 after switching state | Message ID: IKE #713 skipping update_recv as MD is fake | Message ID: sent #713 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-207" #713: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.207:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #713) | 20 dc 25 60 99 b6 74 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 1a 96 8e da d9 76 91 00 af bb 9d 79 5c a7 f9 | 26 9d cd 16 f2 cf f0 0f dd 87 89 cd 98 91 eb 12 | f7 47 01 49 c9 0c ea 1d 57 4d 8d 91 7e f9 5c 7d | 62 0f af 55 c6 bc 19 04 21 c1 da f5 0d b7 e3 c7 | 41 ab 99 a5 b4 0f 24 bf bd 73 7a 98 7e f2 66 cc | 39 17 ee 34 24 36 ea 24 e3 a8 cd 1c e6 e8 5a 7f | 02 cb 52 c1 dd 90 79 6c 09 65 91 9c 65 f3 ff 96 | 37 cb cc 02 51 48 e0 ea 49 21 16 ff ee ee 96 24 | 7e bc 47 96 21 d4 d4 e3 da f1 b1 67 58 e0 84 dd | cd 55 51 7a 46 9a 9d 6d 24 17 4a d7 b1 02 0a 7c | 2b 10 29 49 15 25 a5 35 a0 5f db 1c 3f d4 d5 d1 | ba 0c e0 43 cb 60 ff 0f 6f 32 b4 f2 ed 61 11 ce | ac 22 75 61 4c 15 28 19 61 92 f0 56 38 fd 6f 8d | 1e 94 22 c4 ed 8e 7c e6 0e 10 58 4f 8b 71 f0 63 | d0 57 19 ab 38 9b 18 02 96 06 c0 6a c4 51 d7 5c | d1 98 c8 9d dc 57 3d 80 8d bf 2e ee 62 b7 a7 01 | 29 00 00 24 44 80 b4 97 28 30 0f ac 4f 85 8e 79 | 66 f6 8c 9d 57 3e 45 8b 53 c5 51 08 e9 85 21 22 | 22 bd a5 bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 16 73 ae ce da d8 0d 5b 76 05 8d | 10 2c 6d 16 83 97 d4 49 00 00 00 1c 00 00 40 05 | 1b 17 49 13 60 8d 27 d3 b4 e3 12 fd 7c ef 9d 70 | 2a 84 34 8f | state #713 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35804b850 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb340025210 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340025210 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #713 | libevent_malloc: new ptr-libevent@0x7fb378075590 size 128 | #713 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.230654 | resume sending helper answer for #713 suppresed complete_v2_state_transition() and stole MD | #713 spent 0.277 milliseconds in resume sending helper answer | stop processing: state #713 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c082c30 | processing resume sending helper answer for #667 | start processing: state #667 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 667 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #667 | **emit ISAKMP Message: | initiator cookie: | 7b d9 27 49 fc 2f 27 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-166 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 96 df f5 cd e2 64 d8 37 7b 17 93 12 89 61 a5 0e | ikev2 g^x 54 43 72 d9 e7 56 eb 78 19 d8 ce 7b ab fc c4 ce | ikev2 g^x 29 4e 82 3c 51 f6 26 9f a7 b1 c1 26 57 58 94 3e | ikev2 g^x 7b 87 b0 70 18 07 62 51 cf ed f0 18 a7 02 45 64 | ikev2 g^x 29 d3 04 3c b6 f3 aa e6 9e b7 08 a5 d0 f8 46 16 | ikev2 g^x 01 f6 5d 3b b2 ab c3 c0 7a 8b fd 23 1e c0 aa 9e | ikev2 g^x 88 07 cd f3 38 23 f9 56 92 5f 01 ff 11 16 9f 7e | ikev2 g^x 88 51 70 b8 3b 7d 47 76 0c 28 0d b3 12 dd e5 34 | ikev2 g^x 27 62 ae d8 22 f8 9e d7 02 23 08 f5 22 88 a1 54 | ikev2 g^x ce e8 4b 93 e9 2c d5 39 6a b2 ee 0e 4a 7c 28 7f | ikev2 g^x b4 be ec 6c 77 cd 49 9f c1 61 d9 cb 36 3e a7 9e | ikev2 g^x a7 7c d6 ff 97 c2 82 05 bf cb cd 80 8d 87 fc a5 | ikev2 g^x 16 bb da c3 6e 7a 00 71 0f 91 4c b0 68 cd 77 21 | ikev2 g^x 13 d2 82 d8 54 7d 82 0e 40 c0 42 f3 49 4c 09 2d | ikev2 g^x 3f 2d f3 fc 4d 1d ea ae d5 68 9c c1 d7 8c 7f 3d | ikev2 g^x 4d 87 88 e0 eb 30 69 4a 07 13 c2 69 06 f4 34 e6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce cf 70 1d 7e 4f db c9 b0 ee c5 af 49 a2 ae b2 09 | IKEv2 nonce b2 1a 80 0c 2c 53 c7 0a 40 2e 76 18 3f 09 61 03 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7b d9 27 49 fc 2f 27 ed | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a6 | natd_hash: port= 01 f4 | natd_hash: hash= dd b0 a3 f1 2d 95 77 d4 30 95 3f d8 d6 55 df fc | natd_hash: hash= a5 31 ef cf | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dd b0 a3 f1 2d 95 77 d4 30 95 3f d8 d6 55 df fc | Notify data a5 31 ef cf | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7b d9 27 49 fc 2f 27 ed | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 40 4e db d5 d8 6b 01 95 ad 35 71 f3 b1 25 66 78 | natd_hash: hash= f8 5d ed 97 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 40 4e db d5 d8 6b 01 95 ad 35 71 f3 b1 25 66 78 | Notify data f8 5d ed 97 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #667 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #667 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #667 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #667: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #667 to 4294967295 after switching state | Message ID: IKE #667 skipping update_recv as MD is fake | Message ID: sent #667 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-166" #667: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.166:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #667) | 7b d9 27 49 fc 2f 27 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 df f5 cd e2 64 d8 37 7b 17 93 12 89 61 a5 0e | 54 43 72 d9 e7 56 eb 78 19 d8 ce 7b ab fc c4 ce | 29 4e 82 3c 51 f6 26 9f a7 b1 c1 26 57 58 94 3e | 7b 87 b0 70 18 07 62 51 cf ed f0 18 a7 02 45 64 | 29 d3 04 3c b6 f3 aa e6 9e b7 08 a5 d0 f8 46 16 | 01 f6 5d 3b b2 ab c3 c0 7a 8b fd 23 1e c0 aa 9e | 88 07 cd f3 38 23 f9 56 92 5f 01 ff 11 16 9f 7e | 88 51 70 b8 3b 7d 47 76 0c 28 0d b3 12 dd e5 34 | 27 62 ae d8 22 f8 9e d7 02 23 08 f5 22 88 a1 54 | ce e8 4b 93 e9 2c d5 39 6a b2 ee 0e 4a 7c 28 7f | b4 be ec 6c 77 cd 49 9f c1 61 d9 cb 36 3e a7 9e | a7 7c d6 ff 97 c2 82 05 bf cb cd 80 8d 87 fc a5 | 16 bb da c3 6e 7a 00 71 0f 91 4c b0 68 cd 77 21 | 13 d2 82 d8 54 7d 82 0e 40 c0 42 f3 49 4c 09 2d | 3f 2d f3 fc 4d 1d ea ae d5 68 9c c1 d7 8c 7f 3d | 4d 87 88 e0 eb 30 69 4a 07 13 c2 69 06 f4 34 e6 | 29 00 00 24 cf 70 1d 7e 4f db c9 b0 ee c5 af 49 | a2 ae b2 09 b2 1a 80 0c 2c 53 c7 0a 40 2e 76 18 | 3f 09 61 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd b0 a3 f1 2d 95 77 d4 30 95 3f d8 | d6 55 df fc a5 31 ef cf 00 00 00 1c 00 00 40 05 | 40 4e db d5 d8 6b 01 95 ad 35 71 f3 b1 25 66 78 | f8 5d ed 97 | state #667 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb338035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b12c00 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #667 | libevent_malloc: new ptr-libevent@0x7fb36c082c30 size 128 | #667 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.230961 | resume sending helper answer for #667 suppresed complete_v2_state_transition() and stole MD | #667 spent 0.288 milliseconds in resume sending helper answer | stop processing: state #667 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb364075180 | processing resume sending helper answer for #685 | start processing: state #685 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 685 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #685 | **emit ISAKMP Message: | initiator cookie: | e0 29 5a 0a 61 0a 1e b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-187 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fe 44 4b 09 14 55 26 a3 28 d3 47 1b 88 52 58 95 | ikev2 g^x 5f 67 dd eb b6 51 c4 6d ea b3 00 9f 27 0b 9e 86 | ikev2 g^x 50 32 3f d4 ef 56 d1 52 a7 51 55 9e a4 19 c2 cd | ikev2 g^x 1e 12 55 b5 15 8f f3 d7 bc da 86 79 a9 47 70 73 | ikev2 g^x f8 8a e1 76 61 55 ae c7 2a a4 37 62 35 b1 6b fe | ikev2 g^x 4c 50 6c cb 7b 12 10 09 92 ba 26 a7 a4 fc db d0 | ikev2 g^x 2f 7e be 44 45 5c 46 c7 04 72 12 a2 3d 84 49 94 | ikev2 g^x 30 c8 bc 4f 39 25 a1 4f 16 a1 c2 1b 4e 22 be 72 | ikev2 g^x b8 4a 5d 48 29 a7 82 7c 4d bd 6f 13 50 85 ca c7 | ikev2 g^x ec 11 98 29 31 a8 99 3e 4e e5 4d 08 c2 a7 9d fe | ikev2 g^x cf 40 e8 27 e0 9b bd 71 82 7f 3e 26 24 fa b0 04 | ikev2 g^x c9 9b 4d f2 2b 42 eb 90 50 35 90 38 b0 1f 38 ac | ikev2 g^x 7a cd f0 e4 b8 ac 72 a9 0b b5 6f 4a 72 d7 7c cc | ikev2 g^x 36 87 5c ca 4d 87 f9 81 63 9f 68 fd 43 d9 83 b9 | ikev2 g^x 17 41 d8 dd 34 e0 30 6b e0 2b 70 c8 04 99 12 51 | ikev2 g^x 60 74 b0 27 54 ca d1 00 a3 92 7e ac 84 49 40 ce | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 52 c9 db 03 45 a7 9c af 05 9f 92 28 17 af f8 90 | IKEv2 nonce e6 9b f5 88 0d 6e 51 b4 99 c6 1e db 36 e3 9e 65 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e0 29 5a 0a 61 0a 1e b2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 bb | natd_hash: port= 01 f4 | natd_hash: hash= 24 35 b6 5e eb 9e a1 93 4b 5b 44 61 9e 29 9b 50 | natd_hash: hash= f2 cb be a7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 24 35 b6 5e eb 9e a1 93 4b 5b 44 61 9e 29 9b 50 | Notify data f2 cb be a7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e0 29 5a 0a 61 0a 1e b2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 8c 5a f2 f1 d8 0a f5 46 ba 17 5e 28 dd 6d 65 44 | natd_hash: hash= db 19 d6 81 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8c 5a f2 f1 d8 0a f5 46 ba 17 5e 28 dd 6d 65 44 | Notify data db 19 d6 81 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #685 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #685 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #685 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #685: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #685 to 4294967295 after switching state | Message ID: IKE #685 skipping update_recv as MD is fake | Message ID: sent #685 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-187" #685: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.187:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #685) | e0 29 5a 0a 61 0a 1e b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 44 4b 09 14 55 26 a3 28 d3 47 1b 88 52 58 95 | 5f 67 dd eb b6 51 c4 6d ea b3 00 9f 27 0b 9e 86 | 50 32 3f d4 ef 56 d1 52 a7 51 55 9e a4 19 c2 cd | 1e 12 55 b5 15 8f f3 d7 bc da 86 79 a9 47 70 73 | f8 8a e1 76 61 55 ae c7 2a a4 37 62 35 b1 6b fe | 4c 50 6c cb 7b 12 10 09 92 ba 26 a7 a4 fc db d0 | 2f 7e be 44 45 5c 46 c7 04 72 12 a2 3d 84 49 94 | 30 c8 bc 4f 39 25 a1 4f 16 a1 c2 1b 4e 22 be 72 | b8 4a 5d 48 29 a7 82 7c 4d bd 6f 13 50 85 ca c7 | ec 11 98 29 31 a8 99 3e 4e e5 4d 08 c2 a7 9d fe | cf 40 e8 27 e0 9b bd 71 82 7f 3e 26 24 fa b0 04 | c9 9b 4d f2 2b 42 eb 90 50 35 90 38 b0 1f 38 ac | 7a cd f0 e4 b8 ac 72 a9 0b b5 6f 4a 72 d7 7c cc | 36 87 5c ca 4d 87 f9 81 63 9f 68 fd 43 d9 83 b9 | 17 41 d8 dd 34 e0 30 6b e0 2b 70 c8 04 99 12 51 | 60 74 b0 27 54 ca d1 00 a3 92 7e ac 84 49 40 ce | 29 00 00 24 52 c9 db 03 45 a7 9c af 05 9f 92 28 | 17 af f8 90 e6 9b f5 88 0d 6e 51 b4 99 c6 1e db | 36 e3 9e 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 35 b6 5e eb 9e a1 93 4b 5b 44 61 | 9e 29 9b 50 f2 cb be a7 00 00 00 1c 00 00 40 05 | 8c 5a f2 f1 d8 0a f5 46 ba 17 5e 28 dd 6d 65 44 | db 19 d6 81 | state #685 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb340044850 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb340008e80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340008e80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #685 | libevent_malloc: new ptr-libevent@0x7fb364075180 size 128 | #685 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.231298 | resume sending helper answer for #685 suppresed complete_v2_state_transition() and stole MD | #685 spent 0.316 milliseconds in resume sending helper answer | stop processing: state #685 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35806e450 | processing resume sending helper answer for #703 | start processing: state #703 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 703 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #703 | **emit ISAKMP Message: | initiator cookie: | ae 90 67 40 0b c3 60 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-114 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fb 19 9b e5 9c 8e 57 c1 33 8b 94 01 97 8d 71 df | ikev2 g^x fd 30 9e 4b 3c d1 62 ac b2 ef 34 9e 04 b9 be 20 | ikev2 g^x 28 4d c1 c0 e4 75 70 3a f1 2f c3 4b 44 fd be 81 | ikev2 g^x 03 75 3c c9 fe 1b 81 d5 34 29 50 d7 8f 3f 70 56 | ikev2 g^x b3 d7 36 46 b1 89 89 80 d0 ec 97 d4 da d5 f4 f3 | ikev2 g^x 90 a5 07 30 19 0d e2 de 67 bb 84 67 ec 14 1d f9 | ikev2 g^x c9 6f 5e a4 ca 2b bd 62 3a a4 de d7 ad b7 a9 69 | ikev2 g^x 14 ce 78 80 17 fa 13 c7 37 12 cc 43 83 21 10 58 | ikev2 g^x 9d 2b 15 15 d8 e4 b1 cd ac 75 15 a1 72 52 09 be | ikev2 g^x 1e 67 15 57 3b 30 67 e6 f1 bc 1b 0d 33 dc 86 88 | ikev2 g^x 03 17 c7 52 df f2 2d 62 41 fb db 4b e5 00 8b 99 | ikev2 g^x 4e 97 2c 6a 81 e0 5c ea fe ad de f5 d3 4c 63 11 | ikev2 g^x e5 8c 09 a5 fe ec f4 22 ed 0d 56 cd ca 1b 22 80 | ikev2 g^x a7 f4 83 61 3b e7 31 76 2e 63 32 19 00 cd 04 39 | ikev2 g^x f0 c5 a6 71 47 ce da 1d cb a8 66 69 90 c8 a9 5a | ikev2 g^x 7f 0c 41 bf 5b ff 6a 04 a1 60 dd 0c e7 19 60 15 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e3 5d d8 49 01 1c f9 e5 e1 ba 04 21 cf 21 a7 36 | IKEv2 nonce 74 86 ff 7d d6 85 f8 5d b2 3c d3 44 a8 44 11 0e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ae 90 67 40 0b c3 60 3e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 72 | natd_hash: port= 01 f4 | natd_hash: hash= e3 c6 13 89 f0 56 8f ca 89 41 0b e7 d5 b7 99 19 | natd_hash: hash= f1 5e ec 03 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e3 c6 13 89 f0 56 8f ca 89 41 0b e7 d5 b7 99 19 | Notify data f1 5e ec 03 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ae 90 67 40 0b c3 60 3e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 48 a2 09 85 61 af ec 54 8b 03 81 ed 23 cb 58 07 | natd_hash: hash= eb 48 95 a0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 48 a2 09 85 61 af ec 54 8b 03 81 ed 23 cb 58 07 | Notify data eb 48 95 a0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #703 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #703 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #703 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #703: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #703 to 4294967295 after switching state | Message ID: IKE #703 skipping update_recv as MD is fake | Message ID: sent #703 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-114" #703: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.114:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #703) | ae 90 67 40 0b c3 60 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 19 9b e5 9c 8e 57 c1 33 8b 94 01 97 8d 71 df | fd 30 9e 4b 3c d1 62 ac b2 ef 34 9e 04 b9 be 20 | 28 4d c1 c0 e4 75 70 3a f1 2f c3 4b 44 fd be 81 | 03 75 3c c9 fe 1b 81 d5 34 29 50 d7 8f 3f 70 56 | b3 d7 36 46 b1 89 89 80 d0 ec 97 d4 da d5 f4 f3 | 90 a5 07 30 19 0d e2 de 67 bb 84 67 ec 14 1d f9 | c9 6f 5e a4 ca 2b bd 62 3a a4 de d7 ad b7 a9 69 | 14 ce 78 80 17 fa 13 c7 37 12 cc 43 83 21 10 58 | 9d 2b 15 15 d8 e4 b1 cd ac 75 15 a1 72 52 09 be | 1e 67 15 57 3b 30 67 e6 f1 bc 1b 0d 33 dc 86 88 | 03 17 c7 52 df f2 2d 62 41 fb db 4b e5 00 8b 99 | 4e 97 2c 6a 81 e0 5c ea fe ad de f5 d3 4c 63 11 | e5 8c 09 a5 fe ec f4 22 ed 0d 56 cd ca 1b 22 80 | a7 f4 83 61 3b e7 31 76 2e 63 32 19 00 cd 04 39 | f0 c5 a6 71 47 ce da 1d cb a8 66 69 90 c8 a9 5a | 7f 0c 41 bf 5b ff 6a 04 a1 60 dd 0c e7 19 60 15 | 29 00 00 24 e3 5d d8 49 01 1c f9 e5 e1 ba 04 21 | cf 21 a7 36 74 86 ff 7d d6 85 f8 5d b2 3c d3 44 | a8 44 11 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 c6 13 89 f0 56 8f ca 89 41 0b e7 | d5 b7 99 19 f1 5e ec 03 00 00 00 1c 00 00 40 05 | 48 a2 09 85 61 af ec 54 8b 03 81 ed 23 cb 58 07 | eb 48 95 a0 | state #703 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3700251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aecb00 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #703 | libevent_malloc: new ptr-libevent@0x7fb35806e450 size 128 | #703 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.231596 | resume sending helper answer for #703 suppresed complete_v2_state_transition() and stole MD | #703 spent 0.275 milliseconds in resume sending helper answer | stop processing: state #703 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c03e1a0 | processing resume sending helper answer for #696 | start processing: state #696 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 696 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #696 | **emit ISAKMP Message: | initiator cookie: | a2 ff 7d bb ae e4 ff 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-215 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b1 47 a3 9f 01 68 3e 72 d7 77 d8 40 15 bd 56 fc | ikev2 g^x 1d 68 27 b1 4e be b1 22 9a e8 2a ba 9c a8 46 6d | ikev2 g^x db 09 7f 12 fa eb 65 08 f4 c9 16 2a 9e 01 b4 17 | ikev2 g^x 36 05 7a c7 1f e8 46 bc c3 50 58 1c e8 e0 92 da | ikev2 g^x 73 ba 9e 07 48 d5 9d f2 d0 7b 6e ea 42 6c 81 be | ikev2 g^x 44 c8 4f 38 a9 d8 4a 5b 62 42 5a 19 4d aa 02 1b | ikev2 g^x 7c d7 6e f1 a3 07 60 f7 3c 4c ac ba 84 59 ee af | ikev2 g^x 37 a6 9c 4c 62 92 69 93 89 e7 42 99 74 73 cf 68 | ikev2 g^x 4f f7 d5 72 0b 6f cf f9 81 78 7b 57 1a 33 23 56 | ikev2 g^x a4 67 f3 6a 02 58 17 74 48 e2 79 13 e4 bc 15 ce | ikev2 g^x ff ef 49 6a 4b df 9e 1e 45 f6 1e 93 0d 6d 9f da | ikev2 g^x 4c 33 f1 96 ea 06 4e 73 51 f1 24 f3 0a 23 b8 4e | ikev2 g^x 17 12 5d ad 67 9f e9 c9 0e cc 9a 39 38 d0 df 99 | ikev2 g^x 31 b1 98 f8 83 61 7a c6 bb a0 15 87 10 f9 0e 97 | ikev2 g^x 6f 73 60 11 87 3c e2 c8 09 90 f8 eb e8 87 a3 83 | ikev2 g^x f4 d2 44 24 91 0c cf 33 42 d7 4c 2d 4e 98 eb 2a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 54 bc d8 ff 7e 29 53 5d f0 b1 9a ed 1a 65 ef 6c | IKEv2 nonce 49 ab 64 6e a4 de ce bb aa 3e 57 0c 70 a3 44 4c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a2 ff 7d bb ae e4 ff 23 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d7 | natd_hash: port= 01 f4 | natd_hash: hash= 81 23 a0 ca af 8e 55 b3 fa 06 dd 4a 8b f7 66 e0 | natd_hash: hash= 0c 39 a9 54 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 81 23 a0 ca af 8e 55 b3 fa 06 dd 4a 8b f7 66 e0 | Notify data 0c 39 a9 54 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a2 ff 7d bb ae e4 ff 23 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e3 f3 b4 3a 4a 7c 3a c4 53 8f 78 d7 9c 55 fe 34 | natd_hash: hash= 05 a1 fc 70 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e3 f3 b4 3a 4a 7c 3a c4 53 8f 78 d7 9c 55 fe 34 | Notify data 05 a1 fc 70 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #696 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #696 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #696 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #696: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #696 to 4294967295 after switching state | Message ID: IKE #696 skipping update_recv as MD is fake | Message ID: sent #696 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-215" #696: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.215:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #696) | a2 ff 7d bb ae e4 ff 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 47 a3 9f 01 68 3e 72 d7 77 d8 40 15 bd 56 fc | 1d 68 27 b1 4e be b1 22 9a e8 2a ba 9c a8 46 6d | db 09 7f 12 fa eb 65 08 f4 c9 16 2a 9e 01 b4 17 | 36 05 7a c7 1f e8 46 bc c3 50 58 1c e8 e0 92 da | 73 ba 9e 07 48 d5 9d f2 d0 7b 6e ea 42 6c 81 be | 44 c8 4f 38 a9 d8 4a 5b 62 42 5a 19 4d aa 02 1b | 7c d7 6e f1 a3 07 60 f7 3c 4c ac ba 84 59 ee af | 37 a6 9c 4c 62 92 69 93 89 e7 42 99 74 73 cf 68 | 4f f7 d5 72 0b 6f cf f9 81 78 7b 57 1a 33 23 56 | a4 67 f3 6a 02 58 17 74 48 e2 79 13 e4 bc 15 ce | ff ef 49 6a 4b df 9e 1e 45 f6 1e 93 0d 6d 9f da | 4c 33 f1 96 ea 06 4e 73 51 f1 24 f3 0a 23 b8 4e | 17 12 5d ad 67 9f e9 c9 0e cc 9a 39 38 d0 df 99 | 31 b1 98 f8 83 61 7a c6 bb a0 15 87 10 f9 0e 97 | 6f 73 60 11 87 3c e2 c8 09 90 f8 eb e8 87 a3 83 | f4 d2 44 24 91 0c cf 33 42 d7 4c 2d 4e 98 eb 2a | 29 00 00 24 54 bc d8 ff 7e 29 53 5d f0 b1 9a ed | 1a 65 ef 6c 49 ab 64 6e a4 de ce bb aa 3e 57 0c | 70 a3 44 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 23 a0 ca af 8e 55 b3 fa 06 dd 4a | 8b f7 66 e0 0c 39 a9 54 00 00 00 1c 00 00 40 05 | e3 f3 b4 3a 4a 7c 3a c4 53 8f 78 d7 9c 55 fe 34 | 05 a1 fc 70 | state #696 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3780300e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36800d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #696 | libevent_malloc: new ptr-libevent@0x7fb37c03e1a0 size 128 | #696 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.23189 | resume sending helper answer for #696 suppresed complete_v2_state_transition() and stole MD | #696 spent 0.275 milliseconds in resume sending helper answer | stop processing: state #696 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3800907b0 | processing resume sending helper answer for #710 | start processing: state #710 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 710 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #710 | **emit ISAKMP Message: | initiator cookie: | 54 dd ed 5a b3 6d d4 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-208 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8e ae f9 c6 c3 35 9e cb 30 7a bb 1c 00 fa 4e a9 | ikev2 g^x ac fe 61 1a 01 79 34 2a aa 66 47 75 0d 14 d5 58 | ikev2 g^x 3d a3 f4 3b 2f fd e3 8f 66 3f d8 83 34 dc f9 53 | ikev2 g^x ad 76 ca 6c 43 c4 37 d5 67 c9 87 27 ce 69 69 cf | ikev2 g^x d7 db c7 63 3d a9 5c 21 2d e2 b8 c4 ed 1d ee 03 | ikev2 g^x ec f9 0e f1 a5 e6 d0 de f8 48 19 8c b1 f7 9b c0 | ikev2 g^x 1e 79 2e 85 00 e0 3b 1a 5c 6b 87 68 67 17 48 2f | ikev2 g^x bc 80 b2 6f 4c 41 39 fa 87 e1 62 4f 73 1b a9 5c | ikev2 g^x 60 de 48 93 9e 02 e2 ec 15 c2 11 32 e4 d6 d4 d8 | ikev2 g^x 5b c1 d7 7b 6b 58 5f d6 b1 1a d4 fb 32 e3 da 05 | ikev2 g^x 6e 83 83 d0 d8 9a e3 19 01 2d e0 27 eb f6 d0 d3 | ikev2 g^x f7 36 9d d5 66 d2 27 1b a7 be 3d df fc 08 16 fa | ikev2 g^x 28 57 f9 eb 66 43 05 f6 6e 1e f9 24 82 ef 4e d5 | ikev2 g^x 64 d8 6a 66 63 24 d1 49 d8 f2 45 0b f7 74 80 63 | ikev2 g^x ff 22 38 7b 7e a0 c3 5f 50 b2 0f dc 7f e8 39 75 | ikev2 g^x 4b 1f f7 7d e6 ab 3d 0d ee 3f a4 d8 d2 50 29 5b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ab 44 c4 18 c2 85 94 a9 eb c4 70 9c ed e6 ea be | IKEv2 nonce 91 bb 1f 29 3e 10 f2 4c ff 43 63 b0 b2 3e 00 8f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 54 dd ed 5a b3 6d d4 73 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d0 | natd_hash: port= 01 f4 | natd_hash: hash= 51 2b 3b c2 86 c3 af b9 48 0a 19 78 34 27 e8 b2 | natd_hash: hash= 13 ec a6 3d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 51 2b 3b c2 86 c3 af b9 48 0a 19 78 34 27 e8 b2 | Notify data 13 ec a6 3d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 54 dd ed 5a b3 6d d4 73 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= dc 19 d9 87 b0 ce ef 70 e8 93 5c 55 1a 39 4b 4f | natd_hash: hash= f8 02 f2 ae | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dc 19 d9 87 b0 ce ef 70 e8 93 5c 55 1a 39 4b 4f | Notify data f8 02 f2 ae | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #710 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #710 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #710 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #710: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #710 to 4294967295 after switching state | Message ID: IKE #710 skipping update_recv as MD is fake | Message ID: sent #710 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-208" #710: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.208:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #710) | 54 dd ed 5a b3 6d d4 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e ae f9 c6 c3 35 9e cb 30 7a bb 1c 00 fa 4e a9 | ac fe 61 1a 01 79 34 2a aa 66 47 75 0d 14 d5 58 | 3d a3 f4 3b 2f fd e3 8f 66 3f d8 83 34 dc f9 53 | ad 76 ca 6c 43 c4 37 d5 67 c9 87 27 ce 69 69 cf | d7 db c7 63 3d a9 5c 21 2d e2 b8 c4 ed 1d ee 03 | ec f9 0e f1 a5 e6 d0 de f8 48 19 8c b1 f7 9b c0 | 1e 79 2e 85 00 e0 3b 1a 5c 6b 87 68 67 17 48 2f | bc 80 b2 6f 4c 41 39 fa 87 e1 62 4f 73 1b a9 5c | 60 de 48 93 9e 02 e2 ec 15 c2 11 32 e4 d6 d4 d8 | 5b c1 d7 7b 6b 58 5f d6 b1 1a d4 fb 32 e3 da 05 | 6e 83 83 d0 d8 9a e3 19 01 2d e0 27 eb f6 d0 d3 | f7 36 9d d5 66 d2 27 1b a7 be 3d df fc 08 16 fa | 28 57 f9 eb 66 43 05 f6 6e 1e f9 24 82 ef 4e d5 | 64 d8 6a 66 63 24 d1 49 d8 f2 45 0b f7 74 80 63 | ff 22 38 7b 7e a0 c3 5f 50 b2 0f dc 7f e8 39 75 | 4b 1f f7 7d e6 ab 3d 0d ee 3f a4 d8 d2 50 29 5b | 29 00 00 24 ab 44 c4 18 c2 85 94 a9 eb c4 70 9c | ed e6 ea be 91 bb 1f 29 3e 10 f2 4c ff 43 63 b0 | b2 3e 00 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 2b 3b c2 86 c3 af b9 48 0a 19 78 | 34 27 e8 b2 13 ec a6 3d 00 00 00 1c 00 00 40 05 | dc 19 d9 87 b0 ce ef 70 e8 93 5c 55 1a 39 4b 4f | f8 02 f2 ae | state #710 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35401a4e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a86b80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a86b80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #710 | libevent_malloc: new ptr-libevent@0x7fb3800907b0 size 128 | #710 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.232221 | resume sending helper answer for #710 suppresed complete_v2_state_transition() and stole MD | #710 spent 0.31 milliseconds in resume sending helper answer | stop processing: state #710 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3640960c0 | processing resume sending helper answer for #718 | start processing: state #718 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 718 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #718 | **emit ISAKMP Message: | initiator cookie: | 0c dd 79 de 47 83 7e 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-157 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x be 66 36 96 31 e2 42 87 3a ac 4a fd 50 98 37 f0 | ikev2 g^x 83 90 d2 c2 b6 a0 f8 1a 23 ee b3 73 7e 59 fe f6 | ikev2 g^x 3c 2e ff a3 b1 53 59 bb 42 87 13 c6 fa 8f f4 66 | ikev2 g^x 20 b5 0d 75 56 3e 90 ab 48 8b aa 14 da 3c 04 07 | ikev2 g^x 7e 5f 8e 9b ff 5d 16 9c d6 cf e7 df 30 34 14 81 | ikev2 g^x fd cb 54 31 0d c6 6e 86 c6 00 5a 1d f1 9f cf 03 | ikev2 g^x 8e 5c cf 50 18 84 b9 7b 0b 61 d1 97 2f 8f 20 3c | ikev2 g^x dd 18 b6 4a e3 bc 56 eb 5e b2 56 15 58 ea 88 9f | ikev2 g^x d5 df 2d 58 7b 95 5a 7d 44 a3 ad 96 a2 23 87 6a | ikev2 g^x e2 84 31 36 80 e1 af d8 10 51 82 08 4c 66 f2 a3 | ikev2 g^x ea 9e 5d 00 97 f9 2d 2b a9 f9 ea 4a 6e 06 95 ef | ikev2 g^x d2 60 f0 da 73 c2 db c1 a6 40 f3 05 1e 08 98 1c | ikev2 g^x f5 d5 15 f1 7a 89 4d 80 89 c5 9d 2a b9 73 5f 7f | ikev2 g^x 20 36 51 5a fc bd 7e e1 b7 e9 61 67 fa 61 13 e9 | ikev2 g^x 12 17 e8 98 3b 6c fb 8a 60 2f e7 0a fd 58 48 e4 | ikev2 g^x a5 27 43 bf 2f 21 79 fe 28 b0 c2 eb b7 6d 95 45 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 89 03 e8 6c ca 23 ce 9e 5d 41 d4 99 d7 86 12 03 | IKEv2 nonce b4 03 11 8f cb d7 3b 25 eb c9 7b e9 f8 3c 7d e7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0c dd 79 de 47 83 7e 13 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9d | natd_hash: port= 01 f4 | natd_hash: hash= b8 7b a6 d5 12 0c 58 96 9f f8 ef 99 e4 3d a3 f6 | natd_hash: hash= b8 7b 36 33 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b8 7b a6 d5 12 0c 58 96 9f f8 ef 99 e4 3d a3 f6 | Notify data b8 7b 36 33 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0c dd 79 de 47 83 7e 13 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ad 02 ae 2f 73 2c a3 41 68 65 8b 86 be f0 98 4f | natd_hash: hash= f3 0c 27 62 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ad 02 ae 2f 73 2c a3 41 68 65 8b 86 be f0 98 4f | Notify data f3 0c 27 62 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #718 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #718 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #718 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #718: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #718 to 4294967295 after switching state | Message ID: IKE #718 skipping update_recv as MD is fake | Message ID: sent #718 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-157" #718: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.157:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #718) | 0c dd 79 de 47 83 7e 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be 66 36 96 31 e2 42 87 3a ac 4a fd 50 98 37 f0 | 83 90 d2 c2 b6 a0 f8 1a 23 ee b3 73 7e 59 fe f6 | 3c 2e ff a3 b1 53 59 bb 42 87 13 c6 fa 8f f4 66 | 20 b5 0d 75 56 3e 90 ab 48 8b aa 14 da 3c 04 07 | 7e 5f 8e 9b ff 5d 16 9c d6 cf e7 df 30 34 14 81 | fd cb 54 31 0d c6 6e 86 c6 00 5a 1d f1 9f cf 03 | 8e 5c cf 50 18 84 b9 7b 0b 61 d1 97 2f 8f 20 3c | dd 18 b6 4a e3 bc 56 eb 5e b2 56 15 58 ea 88 9f | d5 df 2d 58 7b 95 5a 7d 44 a3 ad 96 a2 23 87 6a | e2 84 31 36 80 e1 af d8 10 51 82 08 4c 66 f2 a3 | ea 9e 5d 00 97 f9 2d 2b a9 f9 ea 4a 6e 06 95 ef | d2 60 f0 da 73 c2 db c1 a6 40 f3 05 1e 08 98 1c | f5 d5 15 f1 7a 89 4d 80 89 c5 9d 2a b9 73 5f 7f | 20 36 51 5a fc bd 7e e1 b7 e9 61 67 fa 61 13 e9 | 12 17 e8 98 3b 6c fb 8a 60 2f e7 0a fd 58 48 e4 | a5 27 43 bf 2f 21 79 fe 28 b0 c2 eb b7 6d 95 45 | 29 00 00 24 89 03 e8 6c ca 23 ce 9e 5d 41 d4 99 | d7 86 12 03 b4 03 11 8f cb d7 3b 25 eb c9 7b e9 | f8 3c 7d e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 7b a6 d5 12 0c 58 96 9f f8 ef 99 | e4 3d a3 f6 b8 7b 36 33 00 00 00 1c 00 00 40 05 | ad 02 ae 2f 73 2c a3 41 68 65 8b 86 be f0 98 4f | f3 0c 27 62 | state #718 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344040760 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34401d710 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34401d710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #718 | libevent_malloc: new ptr-libevent@0x7fb3640960c0 size 128 | #718 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.232512 | resume sending helper answer for #718 suppresed complete_v2_state_transition() and stole MD | #718 spent 0.277 milliseconds in resume sending helper answer | stop processing: state #718 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb354085700 | processing resume sending helper answer for #712 | start processing: state #712 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 712 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #712 | **emit ISAKMP Message: | initiator cookie: | cc 56 db b7 23 55 ce 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-194 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 93 df 8d 7e 48 22 64 49 fb b5 e2 a2 dc b8 50 4b | ikev2 g^x ad 6c 59 bf 7f 2d 41 f4 f2 ce 30 80 51 45 ce 32 | ikev2 g^x 71 a3 c4 d8 bc a9 37 56 1f 5e b7 0b c3 7d 7a 94 | ikev2 g^x 96 5b f0 c5 d3 95 0b ab 37 3c 2b 1b 89 34 d4 8a | ikev2 g^x bb f5 48 cc ec 2c f3 5d b9 8c bf f8 d0 8a 72 43 | ikev2 g^x bc ac 8b 06 75 12 f2 db 3b 73 18 e9 5c ba e8 72 | ikev2 g^x fb a8 ce 9c c0 4b 82 4f 9a f1 5a af 77 31 0b 07 | ikev2 g^x 66 ce ea af be 31 11 ca a5 70 ec 43 3f c8 a2 17 | ikev2 g^x 44 95 1d 13 29 48 51 d8 f9 1e 06 a1 cf e1 54 e5 | ikev2 g^x 99 68 5c 3a da 63 33 ed 4d d2 25 dd 51 25 1a 08 | ikev2 g^x b9 43 e0 11 8e 0a 46 c6 51 cd 58 79 c0 d9 94 c1 | ikev2 g^x 9e 7d a5 08 99 f8 a7 56 cc 9a d6 3c c1 7c 79 1e | ikev2 g^x 4b 40 9d a4 b9 7f e5 00 44 51 bf e8 b1 5b 15 8c | ikev2 g^x eb 58 e0 f9 22 15 0c e8 84 6d 51 2a c6 4a aa 29 | ikev2 g^x 1e a4 72 7c 08 fa b1 ea d1 7f 66 aa 4d 4f fb 0c | ikev2 g^x fb 1b d3 9b f8 9a 00 a8 9d e6 49 e0 43 79 c6 38 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 22 6c a7 ec d0 85 2e 53 64 0e 79 9f 11 86 be 1a | IKEv2 nonce d4 75 b2 6e 35 aa f3 7b be 0d d6 fa a5 73 61 93 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cc 56 db b7 23 55 ce 9d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c2 | natd_hash: port= 01 f4 | natd_hash: hash= 93 88 55 31 03 a8 f3 ca 6b 47 12 f6 0d 9b de 88 | natd_hash: hash= 5f ca 38 91 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 93 88 55 31 03 a8 f3 ca 6b 47 12 f6 0d 9b de 88 | Notify data 5f ca 38 91 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cc 56 db b7 23 55 ce 9d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 71 a5 54 81 8c 44 b1 23 48 73 5c a0 27 0f b9 ea | natd_hash: hash= 05 8d 05 a3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 71 a5 54 81 8c 44 b1 23 48 73 5c a0 27 0f b9 ea | Notify data 05 8d 05 a3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #712 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #712 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #712 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #712: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #712 to 4294967295 after switching state | Message ID: IKE #712 skipping update_recv as MD is fake | Message ID: sent #712 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-194" #712: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.194:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #712) | cc 56 db b7 23 55 ce 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 df 8d 7e 48 22 64 49 fb b5 e2 a2 dc b8 50 4b | ad 6c 59 bf 7f 2d 41 f4 f2 ce 30 80 51 45 ce 32 | 71 a3 c4 d8 bc a9 37 56 1f 5e b7 0b c3 7d 7a 94 | 96 5b f0 c5 d3 95 0b ab 37 3c 2b 1b 89 34 d4 8a | bb f5 48 cc ec 2c f3 5d b9 8c bf f8 d0 8a 72 43 | bc ac 8b 06 75 12 f2 db 3b 73 18 e9 5c ba e8 72 | fb a8 ce 9c c0 4b 82 4f 9a f1 5a af 77 31 0b 07 | 66 ce ea af be 31 11 ca a5 70 ec 43 3f c8 a2 17 | 44 95 1d 13 29 48 51 d8 f9 1e 06 a1 cf e1 54 e5 | 99 68 5c 3a da 63 33 ed 4d d2 25 dd 51 25 1a 08 | b9 43 e0 11 8e 0a 46 c6 51 cd 58 79 c0 d9 94 c1 | 9e 7d a5 08 99 f8 a7 56 cc 9a d6 3c c1 7c 79 1e | 4b 40 9d a4 b9 7f e5 00 44 51 bf e8 b1 5b 15 8c | eb 58 e0 f9 22 15 0c e8 84 6d 51 2a c6 4a aa 29 | 1e a4 72 7c 08 fa b1 ea d1 7f 66 aa 4d 4f fb 0c | fb 1b d3 9b f8 9a 00 a8 9d e6 49 e0 43 79 c6 38 | 29 00 00 24 22 6c a7 ec d0 85 2e 53 64 0e 79 9f | 11 86 be 1a d4 75 b2 6e 35 aa f3 7b be 0d d6 fa | a5 73 61 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 88 55 31 03 a8 f3 ca 6b 47 12 f6 | 0d 9b de 88 5f ca 38 91 00 00 00 1c 00 00 40 05 | 71 a5 54 81 8c 44 b1 23 48 73 5c a0 27 0f b9 ea | 05 8d 05 a3 | state #712 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c0300e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aa5fc0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #712 | libevent_malloc: new ptr-libevent@0x7fb354085700 size 128 | #712 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.2328 | resume sending helper answer for #712 suppresed complete_v2_state_transition() and stole MD | #712 spent 0.273 milliseconds in resume sending helper answer | stop processing: state #712 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37806fdb0 | processing resume sending helper answer for #709 | start processing: state #709 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 709 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #709 | **emit ISAKMP Message: | initiator cookie: | e5 c7 07 55 6e da 09 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-183 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5d de 77 2e 7e b4 97 76 d0 4c 88 3a 79 73 30 47 | ikev2 g^x a5 46 d9 6c 5e f5 d0 01 a8 f5 90 31 3a c3 34 0b | ikev2 g^x 92 a1 bf c0 52 89 73 d2 41 a6 c8 7c 00 32 8c e0 | ikev2 g^x 61 01 06 67 0c 70 09 f6 a3 5b 63 77 2c c8 de bd | ikev2 g^x 50 05 fc 33 a9 33 71 99 83 df 95 2b 2d 8e 13 82 | ikev2 g^x 7b 7a 49 72 f3 f8 5a 2e 90 58 f7 40 01 a5 24 bb | ikev2 g^x cf b8 85 6e 52 34 58 c3 42 27 86 ff b5 01 d2 91 | ikev2 g^x e4 1c 23 fc f2 c1 af 9b 00 10 9e 1a a4 65 99 ca | ikev2 g^x fe 91 39 7f 9e c5 f3 e1 49 f5 22 78 d6 1e a3 72 | ikev2 g^x fc e2 3a 47 8a 3c d6 21 02 38 d3 6e 42 de b9 8e | ikev2 g^x 44 7c 9f 39 9d 77 79 b7 b4 a9 f9 4c f7 02 43 2d | ikev2 g^x 3e 2b f9 30 d4 a8 a6 b4 68 42 af 60 21 e7 59 96 | ikev2 g^x 67 d3 1f a3 61 53 50 45 15 9f 37 19 16 e9 8d ad | ikev2 g^x 1d 5f a6 91 01 82 07 22 2e f0 8d a4 82 14 28 84 | ikev2 g^x 82 79 d1 ee a4 a1 98 83 13 94 d9 2c 49 f8 36 3c | ikev2 g^x 29 2a 04 0d bf 91 91 f4 08 b0 48 0b b6 ab 6e 6b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce fb fb fc 22 69 7b 64 5f 88 e3 11 6e bc 63 54 30 | IKEv2 nonce 45 65 33 a0 dd 21 67 36 78 c5 19 65 52 ac 92 5e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e5 c7 07 55 6e da 09 55 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b7 | natd_hash: port= 01 f4 | natd_hash: hash= 74 a3 44 a6 ca 0c 6a 2b 8c d2 4e 18 f9 96 bb f1 | natd_hash: hash= fa 97 0c e7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 74 a3 44 a6 ca 0c 6a 2b 8c d2 4e 18 f9 96 bb f1 | Notify data fa 97 0c e7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e5 c7 07 55 6e da 09 55 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 23 4f 11 65 7a 64 9b ff 7f 73 c3 02 6d 1c 2f c1 | natd_hash: hash= e4 ed 89 d4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 23 4f 11 65 7a 64 9b ff 7f 73 c3 02 6d 1c 2f c1 | Notify data e4 ed 89 d4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #709 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #709 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #709 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #709: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #709 to 4294967295 after switching state | Message ID: IKE #709 skipping update_recv as MD is fake | Message ID: sent #709 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-183" #709: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.183:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #709) | e5 c7 07 55 6e da 09 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5d de 77 2e 7e b4 97 76 d0 4c 88 3a 79 73 30 47 | a5 46 d9 6c 5e f5 d0 01 a8 f5 90 31 3a c3 34 0b | 92 a1 bf c0 52 89 73 d2 41 a6 c8 7c 00 32 8c e0 | 61 01 06 67 0c 70 09 f6 a3 5b 63 77 2c c8 de bd | 50 05 fc 33 a9 33 71 99 83 df 95 2b 2d 8e 13 82 | 7b 7a 49 72 f3 f8 5a 2e 90 58 f7 40 01 a5 24 bb | cf b8 85 6e 52 34 58 c3 42 27 86 ff b5 01 d2 91 | e4 1c 23 fc f2 c1 af 9b 00 10 9e 1a a4 65 99 ca | fe 91 39 7f 9e c5 f3 e1 49 f5 22 78 d6 1e a3 72 | fc e2 3a 47 8a 3c d6 21 02 38 d3 6e 42 de b9 8e | 44 7c 9f 39 9d 77 79 b7 b4 a9 f9 4c f7 02 43 2d | 3e 2b f9 30 d4 a8 a6 b4 68 42 af 60 21 e7 59 96 | 67 d3 1f a3 61 53 50 45 15 9f 37 19 16 e9 8d ad | 1d 5f a6 91 01 82 07 22 2e f0 8d a4 82 14 28 84 | 82 79 d1 ee a4 a1 98 83 13 94 d9 2c 49 f8 36 3c | 29 2a 04 0d bf 91 91 f4 08 b0 48 0b b6 ab 6e 6b | 29 00 00 24 fb fb fc 22 69 7b 64 5f 88 e3 11 6e | bc 63 54 30 45 65 33 a0 dd 21 67 36 78 c5 19 65 | 52 ac 92 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 a3 44 a6 ca 0c 6a 2b 8c d2 4e 18 | f9 96 bb f1 fa 97 0c e7 00 00 00 1c 00 00 40 05 | 23 4f 11 65 7a 64 9b ff 7f 73 c3 02 6d 1c 2f c1 | e4 ed 89 d4 | state #709 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb370014c70 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a81500 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #709 | libevent_malloc: new ptr-libevent@0x7fb37806fdb0 size 128 | #709 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.233125 | resume sending helper answer for #709 suppresed complete_v2_state_transition() and stole MD | #709 spent 0.294 milliseconds in resume sending helper answer | stop processing: state #709 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36806a2e0 | processing resume sending helper answer for #699 | start processing: state #699 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 699 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #699 | **emit ISAKMP Message: | initiator cookie: | 3d 5b 9a 7a 4c 0f 9e 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-246 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3a 09 f9 eb a7 2c d4 98 c3 18 03 6f 47 d0 96 ba | ikev2 g^x 3c f2 05 d8 dc 28 48 bb 27 cf 99 6c 93 c0 c3 83 | ikev2 g^x 62 65 ad 94 56 b3 ed 6c 6f d7 43 5b eb 9a b8 8c | ikev2 g^x cd bc f0 70 f4 67 60 ab 7c 75 e9 55 5d b0 86 b6 | ikev2 g^x 64 db b3 4d b5 b8 2b f5 3d ab b6 8a 7d 99 73 4a | ikev2 g^x 9b 33 fd e0 3a 15 58 67 0c 5b 8e f3 d6 f2 97 a2 | ikev2 g^x 7d 06 3e e7 f9 db 01 b6 96 1e 12 71 96 36 b1 ec | ikev2 g^x b4 4d 68 d3 51 78 4b 90 eb 84 c2 64 e8 b4 4f 2c | ikev2 g^x d3 6a bd c9 98 ce 1f 8e 81 89 21 95 4c 9c ba 75 | ikev2 g^x d7 f1 23 87 ad 5b ff f5 2f b5 a2 44 90 c1 f2 58 | ikev2 g^x be d6 e8 53 b5 24 d2 77 32 37 2b 7a 81 a1 bc 2a | ikev2 g^x 6f b9 14 6a 34 88 fb 2f 9e b0 2b 54 9e 18 aa 92 | ikev2 g^x 83 c2 bb bf fc 01 c9 75 ab 94 44 ea 3a 9c f5 0f | ikev2 g^x 98 b5 4e 1e 59 de 26 f7 a1 d7 7b 72 e7 1f 59 71 | ikev2 g^x 0c b6 98 51 80 1c a2 16 07 3d a3 ac 7a 38 df e5 | ikev2 g^x 57 4a 6f f1 39 e9 67 6c 90 88 41 fd 33 06 1d 56 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 75 7b 0d 72 2a ad 01 e2 32 07 7f 62 c6 47 f1 e7 | IKEv2 nonce 26 b0 2f a6 3b d9 b1 d0 4e 2c e5 dc af ae 5c 7d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3d 5b 9a 7a 4c 0f 9e 59 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f6 | natd_hash: port= 01 f4 | natd_hash: hash= c3 d7 12 af 37 14 12 8a ae d8 ef 8c c0 42 58 74 | natd_hash: hash= 2c 82 0a f0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c3 d7 12 af 37 14 12 8a ae d8 ef 8c c0 42 58 74 | Notify data 2c 82 0a f0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3d 5b 9a 7a 4c 0f 9e 59 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= bb 48 6f d2 a0 ac e9 6e 70 bb 7f d3 67 7d bc 39 | natd_hash: hash= c4 af 08 4e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bb 48 6f d2 a0 ac e9 6e 70 bb 7f d3 67 7d bc 39 | Notify data c4 af 08 4e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #699 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #699 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #699 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #699: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #699 to 4294967295 after switching state | Message ID: IKE #699 skipping update_recv as MD is fake | Message ID: sent #699 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-246" #699: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.246:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #699) | 3d 5b 9a 7a 4c 0f 9e 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3a 09 f9 eb a7 2c d4 98 c3 18 03 6f 47 d0 96 ba | 3c f2 05 d8 dc 28 48 bb 27 cf 99 6c 93 c0 c3 83 | 62 65 ad 94 56 b3 ed 6c 6f d7 43 5b eb 9a b8 8c | cd bc f0 70 f4 67 60 ab 7c 75 e9 55 5d b0 86 b6 | 64 db b3 4d b5 b8 2b f5 3d ab b6 8a 7d 99 73 4a | 9b 33 fd e0 3a 15 58 67 0c 5b 8e f3 d6 f2 97 a2 | 7d 06 3e e7 f9 db 01 b6 96 1e 12 71 96 36 b1 ec | b4 4d 68 d3 51 78 4b 90 eb 84 c2 64 e8 b4 4f 2c | d3 6a bd c9 98 ce 1f 8e 81 89 21 95 4c 9c ba 75 | d7 f1 23 87 ad 5b ff f5 2f b5 a2 44 90 c1 f2 58 | be d6 e8 53 b5 24 d2 77 32 37 2b 7a 81 a1 bc 2a | 6f b9 14 6a 34 88 fb 2f 9e b0 2b 54 9e 18 aa 92 | 83 c2 bb bf fc 01 c9 75 ab 94 44 ea 3a 9c f5 0f | 98 b5 4e 1e 59 de 26 f7 a1 d7 7b 72 e7 1f 59 71 | 0c b6 98 51 80 1c a2 16 07 3d a3 ac 7a 38 df e5 | 57 4a 6f f1 39 e9 67 6c 90 88 41 fd 33 06 1d 56 | 29 00 00 24 75 7b 0d 72 2a ad 01 e2 32 07 7f 62 | c6 47 f1 e7 26 b0 2f a6 3b d9 b1 d0 4e 2c e5 dc | af ae 5c 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 d7 12 af 37 14 12 8a ae d8 ef 8c | c0 42 58 74 2c 82 0a f0 00 00 00 1c 00 00 40 05 | bb 48 6f d2 a0 ac e9 6e 70 bb 7f d3 67 7d bc 39 | c4 af 08 4e | state #699 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb350029650 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb350014cc0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350014cc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #699 | libevent_malloc: new ptr-libevent@0x7fb36806a2e0 size 128 | #699 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.233416 | resume sending helper answer for #699 suppresed complete_v2_state_transition() and stole MD | #699 spent 0.278 milliseconds in resume sending helper answer | stop processing: state #699 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb358073c30 | processing resume sending helper answer for #724 | start processing: state #724 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 724 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #724 | **emit ISAKMP Message: | initiator cookie: | d8 1c 6e 85 91 89 a3 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-190 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1b de 88 5f a9 9d 9f 4a ba 73 08 37 d8 73 92 bd | ikev2 g^x 98 01 1e 07 58 d1 bd 9e 94 c8 19 b3 d8 04 89 00 | ikev2 g^x 76 aa d6 d1 63 6a 07 fa 53 c6 90 66 df e2 97 f3 | ikev2 g^x 3c d9 b0 e1 11 2a ca 4e 08 bd ce bf ec 35 bc f6 | ikev2 g^x 93 75 93 c3 27 5a 87 df ca 9f c6 0c e1 14 ca 81 | ikev2 g^x e7 91 a3 96 b7 0a 4b 1c 36 d4 88 78 ba 01 85 71 | ikev2 g^x c4 53 40 7e 7f 43 33 e9 c4 83 3e 45 df 0f c5 fa | ikev2 g^x 69 a7 38 69 b0 0f d3 83 7e 7b de 5d dd c6 e0 fb | ikev2 g^x 0b e9 aa b1 12 3e 19 c2 56 6e ba b8 9d 18 93 e8 | ikev2 g^x aa 44 6e 8a 6d be 62 4a 02 fd 73 71 b4 38 01 21 | ikev2 g^x 91 1e ce 98 c8 d0 d8 5e 38 8e 55 9c f3 8f 26 1e | ikev2 g^x d2 c2 28 3a 2e de 40 fa 17 cd 9b 8c 58 ec 62 2b | ikev2 g^x d4 b3 1f 01 98 ed 74 7d aa 00 c0 b6 32 cf 56 d0 | ikev2 g^x af 2d a5 2d b1 f9 4a 1c 18 82 b0 e3 c5 fa c0 30 | ikev2 g^x 40 7e 51 dc 60 0c a5 93 8e a7 3a 0f 04 35 78 04 | ikev2 g^x a2 3c f4 bf e9 0c bd da 36 3c 51 23 68 58 10 25 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 64 54 99 ea 39 03 03 79 05 41 c1 1e 77 53 cd 84 | IKEv2 nonce bf 45 30 cc a5 b0 b5 0a 02 05 58 10 79 31 ef cb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d8 1c 6e 85 91 89 a3 54 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 be | natd_hash: port= 01 f4 | natd_hash: hash= f5 23 c5 7e 24 d1 34 b2 de b7 23 38 86 97 29 8a | natd_hash: hash= 57 94 13 c1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f5 23 c5 7e 24 d1 34 b2 de b7 23 38 86 97 29 8a | Notify data 57 94 13 c1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d8 1c 6e 85 91 89 a3 54 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ca f2 42 8a 65 1e 49 7e c6 31 6f 76 92 ca b3 81 | natd_hash: hash= 65 f9 d2 13 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ca f2 42 8a 65 1e 49 7e c6 31 6f 76 92 ca b3 81 | Notify data 65 f9 d2 13 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #724 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #724 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #724 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #724: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #724 to 4294967295 after switching state | Message ID: IKE #724 skipping update_recv as MD is fake | Message ID: sent #724 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-190" #724: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.190:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #724) | d8 1c 6e 85 91 89 a3 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b de 88 5f a9 9d 9f 4a ba 73 08 37 d8 73 92 bd | 98 01 1e 07 58 d1 bd 9e 94 c8 19 b3 d8 04 89 00 | 76 aa d6 d1 63 6a 07 fa 53 c6 90 66 df e2 97 f3 | 3c d9 b0 e1 11 2a ca 4e 08 bd ce bf ec 35 bc f6 | 93 75 93 c3 27 5a 87 df ca 9f c6 0c e1 14 ca 81 | e7 91 a3 96 b7 0a 4b 1c 36 d4 88 78 ba 01 85 71 | c4 53 40 7e 7f 43 33 e9 c4 83 3e 45 df 0f c5 fa | 69 a7 38 69 b0 0f d3 83 7e 7b de 5d dd c6 e0 fb | 0b e9 aa b1 12 3e 19 c2 56 6e ba b8 9d 18 93 e8 | aa 44 6e 8a 6d be 62 4a 02 fd 73 71 b4 38 01 21 | 91 1e ce 98 c8 d0 d8 5e 38 8e 55 9c f3 8f 26 1e | d2 c2 28 3a 2e de 40 fa 17 cd 9b 8c 58 ec 62 2b | d4 b3 1f 01 98 ed 74 7d aa 00 c0 b6 32 cf 56 d0 | af 2d a5 2d b1 f9 4a 1c 18 82 b0 e3 c5 fa c0 30 | 40 7e 51 dc 60 0c a5 93 8e a7 3a 0f 04 35 78 04 | a2 3c f4 bf e9 0c bd da 36 3c 51 23 68 58 10 25 | 29 00 00 24 64 54 99 ea 39 03 03 79 05 41 c1 1e | 77 53 cd 84 bf 45 30 cc a5 b0 b5 0a 02 05 58 10 | 79 31 ef cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 23 c5 7e 24 d1 34 b2 de b7 23 38 | 86 97 29 8a 57 94 13 c1 00 00 00 1c 00 00 40 05 | ca f2 42 8a 65 1e 49 7e c6 31 6f 76 92 ca b3 81 | 65 f9 d2 13 | state #724 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab90c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab90c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #724 | libevent_malloc: new ptr-libevent@0x7fb358073c30 size 128 | #724 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.233707 | resume sending helper answer for #724 suppresed complete_v2_state_transition() and stole MD | #724 spent 0.277 milliseconds in resume sending helper answer | stop processing: state #724 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36806fac0 | processing resume sending helper answer for #679 | start processing: state #679 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 679 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #679 | **emit ISAKMP Message: | initiator cookie: | 21 46 75 e4 c0 e2 30 47 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-82 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3e 7f b6 62 3c af 4b 1e 98 70 97 3a c8 81 5f 8a | ikev2 g^x 6e d2 09 4c 84 07 55 d6 a3 fd c0 be 75 5d 07 47 | ikev2 g^x 8d 3f bb da a3 30 57 a0 7c a7 7f 2e cb 9d cc e7 | ikev2 g^x 13 3b 5b 3b c7 48 f1 bf 28 bc 38 67 c7 62 8b b6 | ikev2 g^x 69 be 87 f5 c0 9f f9 a6 02 9e 30 99 da 23 cc 90 | ikev2 g^x 1e 99 f2 9c f4 fc ed 48 2f 64 79 47 e2 b0 af cd | ikev2 g^x f7 a8 a4 46 c8 cb 84 62 97 96 25 40 61 19 15 7b | ikev2 g^x 98 2f 52 d4 70 b6 21 3c 7b e8 bd 11 c7 68 0b f4 | ikev2 g^x 1b 98 5d 51 c3 19 75 24 08 6b 1c 64 66 29 63 ef | ikev2 g^x 74 57 1e 26 8f e7 df a7 24 f3 96 46 d3 6a e1 e9 | ikev2 g^x d3 26 ea bf b7 66 e0 59 a8 f2 90 ba a8 33 d2 5f | ikev2 g^x aa 5b 61 86 8a 0d 9e 66 48 2c c3 e8 2d e4 2d 40 | ikev2 g^x 05 91 e1 60 c8 b5 52 b7 df 9b 2c ac 58 37 89 f0 | ikev2 g^x 51 8b 09 fc 89 ea 65 b5 1d 2a 49 4e 5e 19 42 75 | ikev2 g^x 54 34 97 85 69 00 2b 59 4b d5 43 ac d7 91 dc c1 | ikev2 g^x 3b 6a d7 05 fb bf e8 2b 60 16 3b e5 78 45 71 f5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 64 67 4a b2 09 ea 77 4a 31 a5 f9 b8 14 17 60 f1 | IKEv2 nonce 91 48 c2 5b e0 29 39 77 90 07 73 81 d3 3a 3a da | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 21 46 75 e4 c0 e2 30 47 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 52 | natd_hash: port= 01 f4 | natd_hash: hash= e8 d2 62 af e1 8e 7e 27 97 6c fa 7b 68 37 2f ee | natd_hash: hash= 47 da c3 0b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e8 d2 62 af e1 8e 7e 27 97 6c fa 7b 68 37 2f ee | Notify data 47 da c3 0b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 21 46 75 e4 c0 e2 30 47 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9d 8c 01 86 03 b8 30 c8 80 85 c7 8b d6 c6 c7 00 | natd_hash: hash= 6a 86 19 60 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9d 8c 01 86 03 b8 30 c8 80 85 c7 8b d6 c6 c7 00 | Notify data 6a 86 19 60 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #679 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #679 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #679 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #679: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #679 to 4294967295 after switching state | Message ID: IKE #679 skipping update_recv as MD is fake | Message ID: sent #679 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-82" #679: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.82:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #679) | 21 46 75 e4 c0 e2 30 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 7f b6 62 3c af 4b 1e 98 70 97 3a c8 81 5f 8a | 6e d2 09 4c 84 07 55 d6 a3 fd c0 be 75 5d 07 47 | 8d 3f bb da a3 30 57 a0 7c a7 7f 2e cb 9d cc e7 | 13 3b 5b 3b c7 48 f1 bf 28 bc 38 67 c7 62 8b b6 | 69 be 87 f5 c0 9f f9 a6 02 9e 30 99 da 23 cc 90 | 1e 99 f2 9c f4 fc ed 48 2f 64 79 47 e2 b0 af cd | f7 a8 a4 46 c8 cb 84 62 97 96 25 40 61 19 15 7b | 98 2f 52 d4 70 b6 21 3c 7b e8 bd 11 c7 68 0b f4 | 1b 98 5d 51 c3 19 75 24 08 6b 1c 64 66 29 63 ef | 74 57 1e 26 8f e7 df a7 24 f3 96 46 d3 6a e1 e9 | d3 26 ea bf b7 66 e0 59 a8 f2 90 ba a8 33 d2 5f | aa 5b 61 86 8a 0d 9e 66 48 2c c3 e8 2d e4 2d 40 | 05 91 e1 60 c8 b5 52 b7 df 9b 2c ac 58 37 89 f0 | 51 8b 09 fc 89 ea 65 b5 1d 2a 49 4e 5e 19 42 75 | 54 34 97 85 69 00 2b 59 4b d5 43 ac d7 91 dc c1 | 3b 6a d7 05 fb bf e8 2b 60 16 3b e5 78 45 71 f5 | 29 00 00 24 64 67 4a b2 09 ea 77 4a 31 a5 f9 b8 | 14 17 60 f1 91 48 c2 5b e0 29 39 77 90 07 73 81 | d3 3a 3a da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 d2 62 af e1 8e 7e 27 97 6c fa 7b | 68 37 2f ee 47 da c3 0b 00 00 00 1c 00 00 40 05 | 9d 8c 01 86 03 b8 30 c8 80 85 c7 8b d6 c6 c7 00 | 6a 86 19 60 | state #679 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374029410 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb374045e40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374045e40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #679 | libevent_malloc: new ptr-libevent@0x7fb36806fac0 size 128 | #679 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.233997 | resume sending helper answer for #679 suppresed complete_v2_state_transition() and stole MD | #679 spent 0.275 milliseconds in resume sending helper answer | stop processing: state #679 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34406f6a0 | processing resume sending helper answer for #706 | start processing: state #706 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 706 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #706 | **emit ISAKMP Message: | initiator cookie: | d6 7f 43 f8 51 c2 59 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-185 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1d ca f6 8d 57 76 e3 b2 b8 21 63 3a d9 6b 17 ac | ikev2 g^x 1d a3 0a a8 65 8a 73 ce 66 97 d8 a3 fe eb da 4b | ikev2 g^x 83 ee ee bc fe 2b d0 aa dd e6 65 08 18 59 e4 95 | ikev2 g^x 09 18 a4 39 b6 a7 f4 f9 2f da ab 36 4c 80 49 63 | ikev2 g^x ef 16 9b fe ec 5c ed 9e ae 36 1a ed 1b d4 af 83 | ikev2 g^x 89 ee bf 02 2f 2a 53 9b 57 89 ac f8 bf 5e 38 99 | ikev2 g^x e4 40 07 3c ed 06 cb ab b3 a6 c6 c0 55 73 07 12 | ikev2 g^x b5 0c 74 dc 1f d0 ce 7b dd e0 58 fe 36 aa 47 3e | ikev2 g^x 4c f7 16 70 36 92 d1 18 ca a6 68 9e a3 3e f4 fd | ikev2 g^x fd 01 7d 36 f6 5e eb 58 0f da ff 7f 73 d0 8f f8 | ikev2 g^x 40 11 40 98 2d 26 98 9d 07 8b f8 c9 08 66 7e 6a | ikev2 g^x 9a 49 1a 01 ed 32 66 90 e2 a6 41 73 76 5c f7 ec | ikev2 g^x 6c 8a d8 8d ad 2e 38 8d 00 f8 49 ba 59 c5 fb ee | ikev2 g^x 6d 7a 7c 5c 87 f2 99 5e 69 88 db e5 5b 1d 7d 33 | ikev2 g^x 71 a2 b7 37 fd 2b c4 8b c8 67 fb a6 f3 ec 68 08 | ikev2 g^x 8e 1b b3 a6 50 20 ca a4 1d 80 b1 97 13 a3 05 ba | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2d c8 fa 54 cd 1d 1f 06 d1 eb d2 15 6f e9 7e 83 | IKEv2 nonce 80 52 a9 d8 d9 e9 24 fc ad 86 d9 31 9c b4 55 e7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d6 7f 43 f8 51 c2 59 cc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b9 | natd_hash: port= 01 f4 | natd_hash: hash= 7b a9 09 9b 3f 46 0d e5 b9 f0 c5 5e 3e 6a b5 e5 | natd_hash: hash= b3 2c 1a 78 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7b a9 09 9b 3f 46 0d e5 b9 f0 c5 5e 3e 6a b5 e5 | Notify data b3 2c 1a 78 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d6 7f 43 f8 51 c2 59 cc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 49 ac ac 8b 9b 7a cc f6 f1 c5 f0 57 32 77 7b 51 | natd_hash: hash= e7 ba 7d 05 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 49 ac ac 8b 9b 7a cc f6 f1 c5 f0 57 32 77 7b 51 | Notify data e7 ba 7d 05 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #706 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #706 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #706 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #706: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #706 to 4294967295 after switching state | Message ID: IKE #706 skipping update_recv as MD is fake | Message ID: sent #706 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-185" #706: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.185:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #706) | d6 7f 43 f8 51 c2 59 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d ca f6 8d 57 76 e3 b2 b8 21 63 3a d9 6b 17 ac | 1d a3 0a a8 65 8a 73 ce 66 97 d8 a3 fe eb da 4b | 83 ee ee bc fe 2b d0 aa dd e6 65 08 18 59 e4 95 | 09 18 a4 39 b6 a7 f4 f9 2f da ab 36 4c 80 49 63 | ef 16 9b fe ec 5c ed 9e ae 36 1a ed 1b d4 af 83 | 89 ee bf 02 2f 2a 53 9b 57 89 ac f8 bf 5e 38 99 | e4 40 07 3c ed 06 cb ab b3 a6 c6 c0 55 73 07 12 | b5 0c 74 dc 1f d0 ce 7b dd e0 58 fe 36 aa 47 3e | 4c f7 16 70 36 92 d1 18 ca a6 68 9e a3 3e f4 fd | fd 01 7d 36 f6 5e eb 58 0f da ff 7f 73 d0 8f f8 | 40 11 40 98 2d 26 98 9d 07 8b f8 c9 08 66 7e 6a | 9a 49 1a 01 ed 32 66 90 e2 a6 41 73 76 5c f7 ec | 6c 8a d8 8d ad 2e 38 8d 00 f8 49 ba 59 c5 fb ee | 6d 7a 7c 5c 87 f2 99 5e 69 88 db e5 5b 1d 7d 33 | 71 a2 b7 37 fd 2b c4 8b c8 67 fb a6 f3 ec 68 08 | 8e 1b b3 a6 50 20 ca a4 1d 80 b1 97 13 a3 05 ba | 29 00 00 24 2d c8 fa 54 cd 1d 1f 06 d1 eb d2 15 | 6f e9 7e 83 80 52 a9 d8 d9 e9 24 fc ad 86 d9 31 | 9c b4 55 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b a9 09 9b 3f 46 0d e5 b9 f0 c5 5e | 3e 6a b5 e5 b3 2c 1a 78 00 00 00 1c 00 00 40 05 | 49 ac ac 8b 9b 7a cc f6 f1 c5 f0 57 32 77 7b 51 | e7 ba 7d 05 | state #706 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35001d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a70b50 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #706 | libevent_malloc: new ptr-libevent@0x7fb34406f6a0 size 128 | #706 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.234323 | resume sending helper answer for #706 suppresed complete_v2_state_transition() and stole MD | #706 spent 0.31 milliseconds in resume sending helper answer | stop processing: state #706 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38808b5b0 | processing resume sending helper answer for #686 | start processing: state #686 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 686 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #686 | **emit ISAKMP Message: | initiator cookie: | 5f 2e 8d 4e 01 51 f9 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-142 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x bd 75 c3 99 94 d0 49 6c f2 41 a1 b9 21 f5 f4 0f | ikev2 g^x cb fa c4 3c b6 ed 66 7c ab e3 f2 e8 2e 27 12 8a | ikev2 g^x 22 59 ec f0 2a 87 a3 8e 7d 1a b5 1d 4d 94 79 69 | ikev2 g^x 0a dc ad bb 09 9e 15 d3 e2 0b 37 2e 62 3a 5c 44 | ikev2 g^x 5a 6a 13 ea 8a d9 81 e1 06 22 79 83 c5 03 93 eb | ikev2 g^x 16 80 9f 99 2a b4 9e 4f 75 89 1d 81 11 99 98 ea | ikev2 g^x 06 e5 44 c5 95 02 6e a5 42 20 16 09 35 8d c1 5f | ikev2 g^x ad 15 d5 1f 1f 57 05 88 ea cc 92 ed db 06 fe 1a | ikev2 g^x 82 63 44 2e 13 aa 34 76 7f e6 11 5f 8c 80 0a e5 | ikev2 g^x 8d 1a df 42 51 89 87 1a fb 90 a6 5f e4 9a dd a4 | ikev2 g^x 37 21 fb b9 b1 e3 09 83 44 2b 65 7d 43 06 5b ba | ikev2 g^x 59 28 4d bc 02 9c 72 d2 e9 d2 e0 e2 4c 4e aa 00 | ikev2 g^x 99 db 57 fa a3 66 fc cb f5 dd e9 0d 8d 84 3c c0 | ikev2 g^x 7d 68 be c5 97 df 85 52 da 1e 7a e7 98 0e 8b 72 | ikev2 g^x 16 20 54 89 82 82 38 c9 be e3 78 0f e2 0f db 8e | ikev2 g^x a1 b9 e8 11 42 59 86 ce 1a 8a 3d 26 c9 25 6e a4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7c b7 7a e3 3e 1b fc dd 37 45 25 f3 05 14 6e 97 | IKEv2 nonce 6f c2 39 be ff eb 0d 21 64 ca 63 97 3b d9 cf d2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5f 2e 8d 4e 01 51 f9 e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8e | natd_hash: port= 01 f4 | natd_hash: hash= b8 06 a5 99 5f ab 55 20 b5 39 ab 53 31 c8 5b 7c | natd_hash: hash= ff 84 61 13 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b8 06 a5 99 5f ab 55 20 b5 39 ab 53 31 c8 5b 7c | Notify data ff 84 61 13 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5f 2e 8d 4e 01 51 f9 e8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2b 33 25 f9 c8 cb 8b a7 92 5d f6 e3 73 04 ce 77 | natd_hash: hash= a4 d5 c0 8c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2b 33 25 f9 c8 cb 8b a7 92 5d f6 e3 73 04 ce 77 | Notify data a4 d5 c0 8c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #686 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #686 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #686 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #686: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #686 to 4294967295 after switching state | Message ID: IKE #686 skipping update_recv as MD is fake | Message ID: sent #686 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-142" #686: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.142:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #686) | 5f 2e 8d 4e 01 51 f9 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd 75 c3 99 94 d0 49 6c f2 41 a1 b9 21 f5 f4 0f | cb fa c4 3c b6 ed 66 7c ab e3 f2 e8 2e 27 12 8a | 22 59 ec f0 2a 87 a3 8e 7d 1a b5 1d 4d 94 79 69 | 0a dc ad bb 09 9e 15 d3 e2 0b 37 2e 62 3a 5c 44 | 5a 6a 13 ea 8a d9 81 e1 06 22 79 83 c5 03 93 eb | 16 80 9f 99 2a b4 9e 4f 75 89 1d 81 11 99 98 ea | 06 e5 44 c5 95 02 6e a5 42 20 16 09 35 8d c1 5f | ad 15 d5 1f 1f 57 05 88 ea cc 92 ed db 06 fe 1a | 82 63 44 2e 13 aa 34 76 7f e6 11 5f 8c 80 0a e5 | 8d 1a df 42 51 89 87 1a fb 90 a6 5f e4 9a dd a4 | 37 21 fb b9 b1 e3 09 83 44 2b 65 7d 43 06 5b ba | 59 28 4d bc 02 9c 72 d2 e9 d2 e0 e2 4c 4e aa 00 | 99 db 57 fa a3 66 fc cb f5 dd e9 0d 8d 84 3c c0 | 7d 68 be c5 97 df 85 52 da 1e 7a e7 98 0e 8b 72 | 16 20 54 89 82 82 38 c9 be e3 78 0f e2 0f db 8e | a1 b9 e8 11 42 59 86 ce 1a 8a 3d 26 c9 25 6e a4 | 29 00 00 24 7c b7 7a e3 3e 1b fc dd 37 45 25 f3 | 05 14 6e 97 6f c2 39 be ff eb 0d 21 64 ca 63 97 | 3b d9 cf d2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 06 a5 99 5f ab 55 20 b5 39 ab 53 | 31 c8 5b 7c ff 84 61 13 00 00 00 1c 00 00 40 05 | 2b 33 25 f9 c8 cb 8b a7 92 5d f6 e3 73 04 ce 77 | a4 d5 c0 8c | state #686 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380022480 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aa34c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa34c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #686 | libevent_malloc: new ptr-libevent@0x7fb38808b5b0 size 128 | #686 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.234613 | resume sending helper answer for #686 suppresed complete_v2_state_transition() and stole MD | #686 spent 0.275 milliseconds in resume sending helper answer | stop processing: state #686 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37006f790 | processing resume sending helper answer for #698 | start processing: state #698 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 698 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #698 | **emit ISAKMP Message: | initiator cookie: | 21 cf dd 23 b6 bd 0a c9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-211 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 92 b6 1b 2d 49 8c b5 f8 7a 69 c7 b2 f5 d8 79 d8 | ikev2 g^x 26 12 23 12 d2 76 1c 08 cb 2b 6c 70 8d 69 a0 f1 | ikev2 g^x 6d c2 d1 02 bc 20 a3 cf 4b db 02 4e 02 bf 9c ef | ikev2 g^x 06 4a dc 18 d2 74 58 2b 58 67 f8 e8 0a ee 59 ea | ikev2 g^x 16 9c 3c 75 07 d4 f6 13 6c 2f a8 d3 16 3a 01 5c | ikev2 g^x ab a0 57 0b d9 a8 0a 28 86 75 df b0 c3 1a 3d 57 | ikev2 g^x 9d 10 56 0c fa 92 43 8e fc 2e 85 4b ae 97 bb eb | ikev2 g^x 66 96 a0 3b 93 fb fc 3e a4 7b 85 51 68 c7 6b 35 | ikev2 g^x 6e be 0c 7d fb 30 17 ba 33 cd c8 32 b2 53 83 47 | ikev2 g^x 2e af e0 72 a9 4e 53 16 57 a9 ed 18 35 80 e6 11 | ikev2 g^x ce ef 2a 39 6c 7a 1c 80 7d 2d 86 be 0f b3 d1 2d | ikev2 g^x 8e 73 69 25 8e 2d cf 22 94 9e 26 1d 06 89 aa 00 | ikev2 g^x f6 e5 b6 1f d1 6d 2a 5a de 51 70 67 1f dc fe 84 | ikev2 g^x 10 da 29 d2 fa dc 69 4c da 42 f1 0d f5 d6 7b 01 | ikev2 g^x 9b 82 d0 81 2c ec 44 13 52 ae 3a 49 a4 a8 b1 17 | ikev2 g^x 13 9a 7a f2 8e 7c 90 d0 e4 37 60 4f 27 eb 74 fb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c7 60 58 05 d8 38 44 75 17 ec b3 37 6c b6 72 ff | IKEv2 nonce f9 94 ef 8a 21 a9 54 7a 0f 5c 8e b8 ba 44 9b ab | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 21 cf dd 23 b6 bd 0a c9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d3 | natd_hash: port= 01 f4 | natd_hash: hash= 6a 1a ed 35 4d 8e 31 1b 88 ca 39 40 08 de 5b cc | natd_hash: hash= 57 86 57 d8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6a 1a ed 35 4d 8e 31 1b 88 ca 39 40 08 de 5b cc | Notify data 57 86 57 d8 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 21 cf dd 23 b6 bd 0a c9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f8 2a d9 b9 24 84 74 c8 e3 0b 5f 27 a7 30 52 df | natd_hash: hash= 0f 06 8f 7c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f8 2a d9 b9 24 84 74 c8 e3 0b 5f 27 a7 30 52 df | Notify data 0f 06 8f 7c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #698 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #698 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #698 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #698: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #698 to 4294967295 after switching state | Message ID: IKE #698 skipping update_recv as MD is fake | Message ID: sent #698 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-211" #698: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.211:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #698) | 21 cf dd 23 b6 bd 0a c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 b6 1b 2d 49 8c b5 f8 7a 69 c7 b2 f5 d8 79 d8 | 26 12 23 12 d2 76 1c 08 cb 2b 6c 70 8d 69 a0 f1 | 6d c2 d1 02 bc 20 a3 cf 4b db 02 4e 02 bf 9c ef | 06 4a dc 18 d2 74 58 2b 58 67 f8 e8 0a ee 59 ea | 16 9c 3c 75 07 d4 f6 13 6c 2f a8 d3 16 3a 01 5c | ab a0 57 0b d9 a8 0a 28 86 75 df b0 c3 1a 3d 57 | 9d 10 56 0c fa 92 43 8e fc 2e 85 4b ae 97 bb eb | 66 96 a0 3b 93 fb fc 3e a4 7b 85 51 68 c7 6b 35 | 6e be 0c 7d fb 30 17 ba 33 cd c8 32 b2 53 83 47 | 2e af e0 72 a9 4e 53 16 57 a9 ed 18 35 80 e6 11 | ce ef 2a 39 6c 7a 1c 80 7d 2d 86 be 0f b3 d1 2d | 8e 73 69 25 8e 2d cf 22 94 9e 26 1d 06 89 aa 00 | f6 e5 b6 1f d1 6d 2a 5a de 51 70 67 1f dc fe 84 | 10 da 29 d2 fa dc 69 4c da 42 f1 0d f5 d6 7b 01 | 9b 82 d0 81 2c ec 44 13 52 ae 3a 49 a4 a8 b1 17 | 13 9a 7a f2 8e 7c 90 d0 e4 37 60 4f 27 eb 74 fb | 29 00 00 24 c7 60 58 05 d8 38 44 75 17 ec b3 37 | 6c b6 72 ff f9 94 ef 8a 21 a9 54 7a 0f 5c 8e b8 | ba 44 9b ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 1a ed 35 4d 8e 31 1b 88 ca 39 40 | 08 de 5b cc 57 86 57 d8 00 00 00 1c 00 00 40 05 | f8 2a d9 b9 24 84 74 c8 e3 0b 5f 27 a7 30 52 df | 0f 06 8f 7c | state #698 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34400cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a05290 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #698 | libevent_malloc: new ptr-libevent@0x7fb37006f790 size 128 | #698 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.234912 | resume sending helper answer for #698 suppresed complete_v2_state_transition() and stole MD | #698 spent 0.287 milliseconds in resume sending helper answer | stop processing: state #698 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35008da90 | processing resume sending helper answer for #708 | start processing: state #708 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 708 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #708 | **emit ISAKMP Message: | initiator cookie: | 83 fb 36 71 76 29 5b 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-153 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 36 da 77 6f a1 f4 e9 2a b9 26 f3 f4 92 2d 46 f4 | ikev2 g^x b0 7a 40 33 85 5f c9 7c 72 d1 cd 54 8c 98 37 24 | ikev2 g^x f9 0f 31 c0 59 59 24 f6 b1 81 e9 3e 4e d8 2e 7c | ikev2 g^x d3 b0 17 2c 94 6a 08 cb de 35 37 9f 1e 5a 20 07 | ikev2 g^x 0c 50 86 38 97 07 6a e1 c5 0b 65 c8 6b 40 d7 23 | ikev2 g^x 14 ad 46 39 49 f8 1f 78 30 1f f3 26 21 9b 0d c6 | ikev2 g^x e7 c6 21 16 0b 17 ff 88 3b 14 95 13 3f 92 c8 82 | ikev2 g^x d7 c4 ee a8 41 71 fd 1b 20 11 da c6 5d 3a 47 d1 | ikev2 g^x ca bc a1 5a 85 26 5d 5a 28 9f 54 25 f5 62 92 f3 | ikev2 g^x fe 06 f5 6b 43 32 33 40 13 b4 f7 f9 75 91 87 ca | ikev2 g^x 2d 29 62 a0 43 63 6e 0a fb 1e d6 2f 78 ad 10 0a | ikev2 g^x 3c 75 ef b9 fa c4 90 84 df 4f cc 90 59 78 ab 87 | ikev2 g^x 9f a2 c3 c2 7f d2 98 4d 55 0c 9e e5 34 c4 ad d0 | ikev2 g^x 3c 21 98 a2 b3 b7 59 1e cb 10 0a be 37 e9 ef d7 | ikev2 g^x 36 78 d7 47 cf 88 0a e6 42 a5 bc 51 bf 4d 18 8e | ikev2 g^x 51 22 ad b5 62 a9 c6 e9 19 d6 ac 7e d0 4b 90 54 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 44 8a 54 75 91 ac 9f 57 e7 e2 61 bb a3 bc dd 31 | IKEv2 nonce 8a 95 c4 e5 bc bb 80 d8 96 43 b6 04 ee a9 3a 2c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 83 fb 36 71 76 29 5b 05 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 99 | natd_hash: port= 01 f4 | natd_hash: hash= b3 36 27 57 09 35 01 20 a6 6d 08 d6 77 61 10 b6 | natd_hash: hash= 75 1c 9b de | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b3 36 27 57 09 35 01 20 a6 6d 08 d6 77 61 10 b6 | Notify data 75 1c 9b de | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 83 fb 36 71 76 29 5b 05 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a5 a2 ff 3d 75 4a 07 bb 58 ea 97 e6 0f 3f 13 76 | natd_hash: hash= 41 34 e3 b6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a5 a2 ff 3d 75 4a 07 bb 58 ea 97 e6 0f 3f 13 76 | Notify data 41 34 e3 b6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #708 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #708 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #708 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #708: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #708 to 4294967295 after switching state | Message ID: IKE #708 skipping update_recv as MD is fake | Message ID: sent #708 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-153" #708: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.153:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #708) | 83 fb 36 71 76 29 5b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 da 77 6f a1 f4 e9 2a b9 26 f3 f4 92 2d 46 f4 | b0 7a 40 33 85 5f c9 7c 72 d1 cd 54 8c 98 37 24 | f9 0f 31 c0 59 59 24 f6 b1 81 e9 3e 4e d8 2e 7c | d3 b0 17 2c 94 6a 08 cb de 35 37 9f 1e 5a 20 07 | 0c 50 86 38 97 07 6a e1 c5 0b 65 c8 6b 40 d7 23 | 14 ad 46 39 49 f8 1f 78 30 1f f3 26 21 9b 0d c6 | e7 c6 21 16 0b 17 ff 88 3b 14 95 13 3f 92 c8 82 | d7 c4 ee a8 41 71 fd 1b 20 11 da c6 5d 3a 47 d1 | ca bc a1 5a 85 26 5d 5a 28 9f 54 25 f5 62 92 f3 | fe 06 f5 6b 43 32 33 40 13 b4 f7 f9 75 91 87 ca | 2d 29 62 a0 43 63 6e 0a fb 1e d6 2f 78 ad 10 0a | 3c 75 ef b9 fa c4 90 84 df 4f cc 90 59 78 ab 87 | 9f a2 c3 c2 7f d2 98 4d 55 0c 9e e5 34 c4 ad d0 | 3c 21 98 a2 b3 b7 59 1e cb 10 0a be 37 e9 ef d7 | 36 78 d7 47 cf 88 0a e6 42 a5 bc 51 bf 4d 18 8e | 51 22 ad b5 62 a9 c6 e9 19 d6 ac 7e d0 4b 90 54 | 29 00 00 24 44 8a 54 75 91 ac 9f 57 e7 e2 61 bb | a3 bc dd 31 8a 95 c4 e5 bc bb 80 d8 96 43 b6 04 | ee a9 3a 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 36 27 57 09 35 01 20 a6 6d 08 d6 | 77 61 10 b6 75 1c 9b de 00 00 00 1c 00 00 40 05 | a5 a2 ff 3d 75 4a 07 bb 58 ea 97 e6 0f 3f 13 76 | 41 34 e3 b6 | state #708 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35400cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a198d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #708 | libevent_malloc: new ptr-libevent@0x7fb35008da90 size 128 | #708 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.235241 | resume sending helper answer for #708 suppresed complete_v2_state_transition() and stole MD | #708 spent 0.31 milliseconds in resume sending helper answer | stop processing: state #708 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3600778c0 | processing resume sending helper answer for #691 | start processing: state #691 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 691 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #691 | **emit ISAKMP Message: | initiator cookie: | a9 9e 25 20 86 2a 5c 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-191 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 81 cc 4c ba 30 5c 6d 22 f8 82 c6 c0 8b 58 68 0c | ikev2 g^x 41 77 59 e0 2a af ff af d4 c1 41 cf 51 4a d3 e1 | ikev2 g^x 69 aa 30 d2 ed c6 c8 af 8b 3b 34 93 40 fa af 54 | ikev2 g^x 65 66 11 b2 ea ba 9d 66 6a 5a ef a5 37 12 11 a4 | ikev2 g^x d3 21 d0 69 7b e5 a1 d7 98 b5 f2 36 e1 00 9b 73 | ikev2 g^x 88 b5 57 a0 86 7c 2b 56 bc dd 7a 01 0a bc 7a c4 | ikev2 g^x 2c ad c5 8b 82 0a e6 1a c3 ec 8b 0c 66 1b 4c be | ikev2 g^x b1 76 b6 01 cd 33 2d 70 ab da 87 4d 5a 37 a3 30 | ikev2 g^x dd a8 b4 78 ad 30 76 5b 99 96 17 20 94 4a 1e ca | ikev2 g^x d4 40 82 a5 98 84 48 26 0c d9 76 15 4d af 29 c8 | ikev2 g^x b0 a4 e1 44 dc ac ff b7 ac 4a 18 e6 fc e7 a5 b6 | ikev2 g^x 38 f8 54 c8 63 11 e6 a6 35 0d a1 81 5f 34 c8 dc | ikev2 g^x 36 f2 0f de c7 04 d3 89 04 e3 b8 e2 42 51 11 b0 | ikev2 g^x e6 10 f4 77 1f be e8 81 80 19 27 1e 32 ff 6a d3 | ikev2 g^x 0d 11 66 8a 3a fc 43 14 97 86 65 03 41 1b 4f aa | ikev2 g^x 60 d5 5e c1 3c ab bd c7 a5 60 2a 06 6e f7 8b 5a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d9 82 2d dc 7a db 9b 9e ba 51 3f f5 55 9b ca 46 | IKEv2 nonce 49 e9 e1 bd e8 b3 c4 b1 15 49 3d a1 c4 aa 80 98 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a9 9e 25 20 86 2a 5c 44 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 bf | natd_hash: port= 01 f4 | natd_hash: hash= e6 10 f7 93 cc 33 bf de b8 46 14 d4 f1 7c bb ef | natd_hash: hash= cf 7a 14 b3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e6 10 f7 93 cc 33 bf de b8 46 14 d4 f1 7c bb ef | Notify data cf 7a 14 b3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a9 9e 25 20 86 2a 5c 44 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 40 bb bb e0 02 00 28 d6 b3 fd 9b cd 5e 9e 97 d3 | natd_hash: hash= 8a 95 58 8d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 40 bb bb e0 02 00 28 d6 b3 fd 9b cd 5e 9e 97 d3 | Notify data 8a 95 58 8d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #691 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #691 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #691 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #691: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #691 to 4294967295 after switching state | Message ID: IKE #691 skipping update_recv as MD is fake | Message ID: sent #691 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-191" #691: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.191:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #691) | a9 9e 25 20 86 2a 5c 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 cc 4c ba 30 5c 6d 22 f8 82 c6 c0 8b 58 68 0c | 41 77 59 e0 2a af ff af d4 c1 41 cf 51 4a d3 e1 | 69 aa 30 d2 ed c6 c8 af 8b 3b 34 93 40 fa af 54 | 65 66 11 b2 ea ba 9d 66 6a 5a ef a5 37 12 11 a4 | d3 21 d0 69 7b e5 a1 d7 98 b5 f2 36 e1 00 9b 73 | 88 b5 57 a0 86 7c 2b 56 bc dd 7a 01 0a bc 7a c4 | 2c ad c5 8b 82 0a e6 1a c3 ec 8b 0c 66 1b 4c be | b1 76 b6 01 cd 33 2d 70 ab da 87 4d 5a 37 a3 30 | dd a8 b4 78 ad 30 76 5b 99 96 17 20 94 4a 1e ca | d4 40 82 a5 98 84 48 26 0c d9 76 15 4d af 29 c8 | b0 a4 e1 44 dc ac ff b7 ac 4a 18 e6 fc e7 a5 b6 | 38 f8 54 c8 63 11 e6 a6 35 0d a1 81 5f 34 c8 dc | 36 f2 0f de c7 04 d3 89 04 e3 b8 e2 42 51 11 b0 | e6 10 f4 77 1f be e8 81 80 19 27 1e 32 ff 6a d3 | 0d 11 66 8a 3a fc 43 14 97 86 65 03 41 1b 4f aa | 60 d5 5e c1 3c ab bd c7 a5 60 2a 06 6e f7 8b 5a | 29 00 00 24 d9 82 2d dc 7a db 9b 9e ba 51 3f f5 | 55 9b ca 46 49 e9 e1 bd e8 b3 c4 b1 15 49 3d a1 | c4 aa 80 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 10 f7 93 cc 33 bf de b8 46 14 d4 | f1 7c bb ef cf 7a 14 b3 00 00 00 1c 00 00 40 05 | 40 bb bb e0 02 00 28 d6 b3 fd 9b cd 5e 9e 97 d3 | 8a 95 58 8d | state #691 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c034410 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a70b10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #691 | libevent_malloc: new ptr-libevent@0x7fb3600778c0 size 128 | #691 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.235531 | resume sending helper answer for #691 suppresed complete_v2_state_transition() and stole MD | #691 spent 0.276 milliseconds in resume sending helper answer | stop processing: state #691 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3380856d0 | processing resume sending helper answer for #704 | start processing: state #704 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 704 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #704 | **emit ISAKMP Message: | initiator cookie: | 23 4c b8 04 68 32 c1 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-227 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 51 3a ac 56 14 08 70 10 a2 34 db f9 cc 75 9b 41 | ikev2 g^x d9 78 33 6d 3e 54 14 96 f1 9f 07 fd 71 d2 bb f4 | ikev2 g^x f5 9d 35 70 a8 82 5c 73 ad 62 0d 20 44 a2 21 f5 | ikev2 g^x 94 5c 04 7b 84 43 ac 51 c9 f9 77 db b1 cf 7e 08 | ikev2 g^x b7 e6 cf a7 f1 9d 4d 37 b6 28 e7 f6 a0 a6 cf 8a | ikev2 g^x 2c a0 7b 96 11 a1 37 54 ae f4 a3 93 55 4b 7e 8b | ikev2 g^x d0 8a 27 00 d5 64 36 b1 c2 d9 ba 29 d8 a2 16 05 | ikev2 g^x dd fb 59 ef 24 58 33 9e ac 2a 88 48 84 e9 53 28 | ikev2 g^x c7 9d 5d bc 44 c8 70 17 d2 d0 d0 a4 35 72 da 6e | ikev2 g^x 9b 84 8e 8c 6d 4d 5b 4f fb cc 6d ee 81 aa f7 23 | ikev2 g^x 07 f9 5f 13 36 5a 45 44 ae 6b c2 b5 0c 64 f9 5d | ikev2 g^x 33 6a 2b a5 33 65 bb cb a4 25 6a c7 fc 53 f4 eb | ikev2 g^x ec fb f4 4a 8c 01 69 1e e8 15 90 da 3e e8 e7 e4 | ikev2 g^x a9 bc 12 b2 3e 67 e9 07 38 7b 7f ab 7c da 25 d2 | ikev2 g^x 97 fc 1f 16 04 10 f4 d2 00 07 db c1 f8 21 00 e5 | ikev2 g^x 11 9f f5 be ae 9a 37 75 35 e1 f5 13 de ae c3 61 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2a fe 38 a0 12 7a 3e d7 16 fa 98 10 a9 db 26 69 | IKEv2 nonce 36 69 61 cd 14 ca 40 97 d2 72 a4 b6 d3 f7 cf 73 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 23 4c b8 04 68 32 c1 56 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e3 | natd_hash: port= 01 f4 | natd_hash: hash= 6b 45 5c 53 3c 72 83 7b 27 77 59 fc 37 eb 14 fc | natd_hash: hash= 78 79 76 26 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6b 45 5c 53 3c 72 83 7b 27 77 59 fc 37 eb 14 fc | Notify data 78 79 76 26 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 23 4c b8 04 68 32 c1 56 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= cc 0a e4 80 a3 0e b9 40 1f 4d be 4b 21 2f 7d 7c | natd_hash: hash= 54 e3 c5 be | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cc 0a e4 80 a3 0e b9 40 1f 4d be 4b 21 2f 7d 7c | Notify data 54 e3 c5 be | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #704 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #704 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #704 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #704: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #704 to 4294967295 after switching state | Message ID: IKE #704 skipping update_recv as MD is fake | Message ID: sent #704 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-227" #704: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.227:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #704) | 23 4c b8 04 68 32 c1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 3a ac 56 14 08 70 10 a2 34 db f9 cc 75 9b 41 | d9 78 33 6d 3e 54 14 96 f1 9f 07 fd 71 d2 bb f4 | f5 9d 35 70 a8 82 5c 73 ad 62 0d 20 44 a2 21 f5 | 94 5c 04 7b 84 43 ac 51 c9 f9 77 db b1 cf 7e 08 | b7 e6 cf a7 f1 9d 4d 37 b6 28 e7 f6 a0 a6 cf 8a | 2c a0 7b 96 11 a1 37 54 ae f4 a3 93 55 4b 7e 8b | d0 8a 27 00 d5 64 36 b1 c2 d9 ba 29 d8 a2 16 05 | dd fb 59 ef 24 58 33 9e ac 2a 88 48 84 e9 53 28 | c7 9d 5d bc 44 c8 70 17 d2 d0 d0 a4 35 72 da 6e | 9b 84 8e 8c 6d 4d 5b 4f fb cc 6d ee 81 aa f7 23 | 07 f9 5f 13 36 5a 45 44 ae 6b c2 b5 0c 64 f9 5d | 33 6a 2b a5 33 65 bb cb a4 25 6a c7 fc 53 f4 eb | ec fb f4 4a 8c 01 69 1e e8 15 90 da 3e e8 e7 e4 | a9 bc 12 b2 3e 67 e9 07 38 7b 7f ab 7c da 25 d2 | 97 fc 1f 16 04 10 f4 d2 00 07 db c1 f8 21 00 e5 | 11 9f f5 be ae 9a 37 75 35 e1 f5 13 de ae c3 61 | 29 00 00 24 2a fe 38 a0 12 7a 3e d7 16 fa 98 10 | a9 db 26 69 36 69 61 cd 14 ca 40 97 d2 72 a4 b6 | d3 f7 cf 73 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 45 5c 53 3c 72 83 7b 27 77 59 fc | 37 eb 14 fc 78 79 76 26 00 00 00 1c 00 00 40 05 | cc 0a e4 80 a3 0e b9 40 1f 4d be 4b 21 2f 7d 7c | 54 e3 c5 be | state #704 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c02a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b07dc0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #704 | libevent_malloc: new ptr-libevent@0x7fb3380856d0 size 128 | #704 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.235822 | resume sending helper answer for #704 suppresed complete_v2_state_transition() and stole MD | #704 spent 0.277 milliseconds in resume sending helper answer | stop processing: state #704 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35407ff20 | processing resume sending helper answer for #672 | start processing: state #672 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 672 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #672 | **emit ISAKMP Message: | initiator cookie: | 8a 51 a3 6f 68 f7 9e 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-136 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x dd e0 86 ed 60 a3 d0 a6 8e 6b 9a 00 e5 84 70 47 | ikev2 g^x 32 b4 99 4f 0d 05 58 a3 bb 0d be c7 e9 7e cd ad | ikev2 g^x 4f e6 63 7d bb e8 41 3e fc 88 30 2c a3 77 90 4d | ikev2 g^x 35 a6 66 a0 1a ec 48 93 2f 14 8c 8f fe d5 df 84 | ikev2 g^x e5 b6 10 27 23 7d 77 97 15 e0 10 30 36 f6 b6 80 | ikev2 g^x 26 8c 8d 3c 23 cd 46 8c fe 9f 38 e4 8e 1c c7 31 | ikev2 g^x b5 28 84 af 9f c7 49 71 f9 9b 12 64 93 29 98 16 | ikev2 g^x 5a 87 88 39 9f ba f9 8b 6b 1a 6c 85 af 62 ca a4 | ikev2 g^x 00 2b d4 50 98 a6 48 d3 a9 8e f3 da 34 94 7c a4 | ikev2 g^x 1a 0a ac 81 46 8c 7d 48 0f ab 18 93 af 03 df 02 | ikev2 g^x df 31 b2 61 3d 21 11 b5 2e d1 3a bd f0 29 fc f6 | ikev2 g^x 44 a4 9e 23 a0 a5 78 a1 b4 fc 98 b3 83 06 25 39 | ikev2 g^x 76 e1 3c 9c b7 9e 50 5c cc a7 ac 96 00 fc 08 6f | ikev2 g^x 31 b8 68 11 66 46 8b 52 dd c4 ea 4d 22 5d d2 e3 | ikev2 g^x b7 89 33 b9 bd 6c 60 86 ae 27 9b 88 9a 4e 35 21 | ikev2 g^x 7b ba 09 1f bd a5 fb 07 d5 d4 0b 0f e2 d2 63 bb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 10 82 d2 ac eb af 8e 07 dc 69 e2 0d 6b 97 c2 9b | IKEv2 nonce 07 bc 50 39 f2 b6 8e 4f f1 fa 6e 4a 37 dd 2d 66 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8a 51 a3 6f 68 f7 9e 63 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 88 | natd_hash: port= 01 f4 | natd_hash: hash= b0 8a eb dc 69 3b 2f bd 92 77 b8 05 58 f7 11 b4 | natd_hash: hash= d0 e4 bf 88 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b0 8a eb dc 69 3b 2f bd 92 77 b8 05 58 f7 11 b4 | Notify data d0 e4 bf 88 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8a 51 a3 6f 68 f7 9e 63 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e2 45 f2 76 d6 58 48 de fd 60 b0 02 91 58 f0 cf | natd_hash: hash= 83 ee 8f 98 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e2 45 f2 76 d6 58 48 de fd 60 b0 02 91 58 f0 cf | Notify data 83 ee 8f 98 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #672 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #672 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #672 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #672: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #672 to 4294967295 after switching state | Message ID: IKE #672 skipping update_recv as MD is fake | Message ID: sent #672 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-136" #672: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.136:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #672) | 8a 51 a3 6f 68 f7 9e 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd e0 86 ed 60 a3 d0 a6 8e 6b 9a 00 e5 84 70 47 | 32 b4 99 4f 0d 05 58 a3 bb 0d be c7 e9 7e cd ad | 4f e6 63 7d bb e8 41 3e fc 88 30 2c a3 77 90 4d | 35 a6 66 a0 1a ec 48 93 2f 14 8c 8f fe d5 df 84 | e5 b6 10 27 23 7d 77 97 15 e0 10 30 36 f6 b6 80 | 26 8c 8d 3c 23 cd 46 8c fe 9f 38 e4 8e 1c c7 31 | b5 28 84 af 9f c7 49 71 f9 9b 12 64 93 29 98 16 | 5a 87 88 39 9f ba f9 8b 6b 1a 6c 85 af 62 ca a4 | 00 2b d4 50 98 a6 48 d3 a9 8e f3 da 34 94 7c a4 | 1a 0a ac 81 46 8c 7d 48 0f ab 18 93 af 03 df 02 | df 31 b2 61 3d 21 11 b5 2e d1 3a bd f0 29 fc f6 | 44 a4 9e 23 a0 a5 78 a1 b4 fc 98 b3 83 06 25 39 | 76 e1 3c 9c b7 9e 50 5c cc a7 ac 96 00 fc 08 6f | 31 b8 68 11 66 46 8b 52 dd c4 ea 4d 22 5d d2 e3 | b7 89 33 b9 bd 6c 60 86 ae 27 9b 88 9a 4e 35 21 | 7b ba 09 1f bd a5 fb 07 d5 d4 0b 0f e2 d2 63 bb | 29 00 00 24 10 82 d2 ac eb af 8e 07 dc 69 e2 0d | 6b 97 c2 9b 07 bc 50 39 f2 b6 8e 4f f1 fa 6e 4a | 37 dd 2d 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 8a eb dc 69 3b 2f bd 92 77 b8 05 | 58 f7 11 b4 d0 e4 bf 88 00 00 00 1c 00 00 40 05 | e2 45 f2 76 d6 58 48 de fd 60 b0 02 91 58 f0 cf | 83 ee 8f 98 | state #672 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c029710 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c017ea0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #672 | libevent_malloc: new ptr-libevent@0x7fb35407ff20 size 128 | #672 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.236154 | resume sending helper answer for #672 suppresed complete_v2_state_transition() and stole MD | #672 spent 0.308 milliseconds in resume sending helper answer | stop processing: state #672 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36408b100 | processing resume sending helper answer for #684 | start processing: state #684 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 684 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #684 | **emit ISAKMP Message: | initiator cookie: | fe 13 79 f4 87 18 7a 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-168 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9c a3 3b ab 91 aa e9 1c 1f 09 51 cd 63 31 b4 f6 | ikev2 g^x 27 05 e2 58 eb 11 21 fc 74 8b a1 04 48 38 e0 4b | ikev2 g^x 3e eb 3c 47 9f e1 28 6a f4 cf cd b0 2f 86 fe 42 | ikev2 g^x 06 be 5c 6a f3 0a ed 96 af 36 41 a8 95 43 50 86 | ikev2 g^x 62 97 ba dc 54 cc 86 ec 1a 93 e8 8c 86 bd 6a fd | ikev2 g^x 31 85 d3 58 12 be df c0 96 2f 7a 9d 76 f8 ee 26 | ikev2 g^x 9a 43 6d a6 d5 f1 30 04 83 a9 49 c2 dc d4 6a 20 | ikev2 g^x 1a a0 77 c4 16 45 81 34 61 94 d1 87 44 ee 60 b8 | ikev2 g^x 64 38 4f 17 86 f2 34 5c ce 1a ca cd cc 73 9e 4c | ikev2 g^x ad 5d 12 fe 07 4f 80 6b 47 cd 8d 28 e2 55 47 11 | ikev2 g^x 39 18 ea a9 6c bb f3 f3 0f 8d 00 15 59 01 c9 80 | ikev2 g^x dc 86 1f df 0c f8 d3 db 42 55 8e 18 b9 71 3f 72 | ikev2 g^x b9 64 4e 7e 16 72 18 aa 5b 2f 5c 3c cd 00 ea 61 | ikev2 g^x 42 52 f3 7e 53 72 7f 07 33 50 b0 ec ed 4c b3 11 | ikev2 g^x eb 58 4d b5 c5 0b 02 4d 09 d9 c0 f7 15 fe ed 15 | ikev2 g^x 67 5b c9 94 30 44 36 30 17 51 bd 8f 69 8a 1e 07 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 67 c4 83 c2 98 c0 7a 1b 9f 67 5e 99 8d ac fc 2a | IKEv2 nonce ad 63 42 f3 d0 ee 64 a2 cf 91 5e 20 6f 96 d3 5f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fe 13 79 f4 87 18 7a 07 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a8 | natd_hash: port= 01 f4 | natd_hash: hash= 1b 82 99 d5 30 8b 22 4c 45 76 09 65 e5 33 b6 41 | natd_hash: hash= 67 45 7b 6a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b 82 99 d5 30 8b 22 4c 45 76 09 65 e5 33 b6 41 | Notify data 67 45 7b 6a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fe 13 79 f4 87 18 7a 07 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c8 40 1d 53 f1 98 45 16 51 e3 1b cc 43 1f 4a 55 | natd_hash: hash= 08 fa fe d9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c8 40 1d 53 f1 98 45 16 51 e3 1b cc 43 1f 4a 55 | Notify data 08 fa fe d9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #684 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #684 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #684 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #684: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #684 to 4294967295 after switching state | Message ID: IKE #684 skipping update_recv as MD is fake | Message ID: sent #684 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-168" #684: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.168:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #684) | fe 13 79 f4 87 18 7a 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c a3 3b ab 91 aa e9 1c 1f 09 51 cd 63 31 b4 f6 | 27 05 e2 58 eb 11 21 fc 74 8b a1 04 48 38 e0 4b | 3e eb 3c 47 9f e1 28 6a f4 cf cd b0 2f 86 fe 42 | 06 be 5c 6a f3 0a ed 96 af 36 41 a8 95 43 50 86 | 62 97 ba dc 54 cc 86 ec 1a 93 e8 8c 86 bd 6a fd | 31 85 d3 58 12 be df c0 96 2f 7a 9d 76 f8 ee 26 | 9a 43 6d a6 d5 f1 30 04 83 a9 49 c2 dc d4 6a 20 | 1a a0 77 c4 16 45 81 34 61 94 d1 87 44 ee 60 b8 | 64 38 4f 17 86 f2 34 5c ce 1a ca cd cc 73 9e 4c | ad 5d 12 fe 07 4f 80 6b 47 cd 8d 28 e2 55 47 11 | 39 18 ea a9 6c bb f3 f3 0f 8d 00 15 59 01 c9 80 | dc 86 1f df 0c f8 d3 db 42 55 8e 18 b9 71 3f 72 | b9 64 4e 7e 16 72 18 aa 5b 2f 5c 3c cd 00 ea 61 | 42 52 f3 7e 53 72 7f 07 33 50 b0 ec ed 4c b3 11 | eb 58 4d b5 c5 0b 02 4d 09 d9 c0 f7 15 fe ed 15 | 67 5b c9 94 30 44 36 30 17 51 bd 8f 69 8a 1e 07 | 29 00 00 24 67 c4 83 c2 98 c0 7a 1b 9f 67 5e 99 | 8d ac fc 2a ad 63 42 f3 d0 ee 64 a2 cf 91 5e 20 | 6f 96 d3 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 82 99 d5 30 8b 22 4c 45 76 09 65 | e5 33 b6 41 67 45 7b 6a 00 00 00 1c 00 00 40 05 | c8 40 1d 53 f1 98 45 16 51 e3 1b cc 43 1f 4a 55 | 08 fa fe d9 | state #684 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35003f4e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35002a9a0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35002a9a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #684 | libevent_malloc: new ptr-libevent@0x7fb36408b100 size 128 | #684 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.236453 | resume sending helper answer for #684 suppresed complete_v2_state_transition() and stole MD | #684 spent 0.276 milliseconds in resume sending helper answer | stop processing: state #684 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c0bc1e0 | processing resume sending helper answer for #678 | start processing: state #678 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 678 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #678 | **emit ISAKMP Message: | initiator cookie: | 6f 4b 14 c1 cc 6f 1e 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-41 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2e 9f 0d f0 04 66 77 dd 93 01 97 d4 e6 2f 63 32 | ikev2 g^x 08 d5 90 21 20 45 70 7a 23 d4 d5 21 f2 1e 5d 61 | ikev2 g^x d1 38 f7 cd 0d a7 dd 8c 8d 4e d1 19 04 72 f0 60 | ikev2 g^x b9 a1 be 10 b3 d5 d9 6f 71 a4 43 ab d4 47 03 ef | ikev2 g^x 16 17 71 a7 79 4c e1 97 0b 36 26 91 25 a7 46 06 | ikev2 g^x 06 c6 86 a0 3d 48 06 59 81 9f 8c 4f 63 ff e7 cb | ikev2 g^x 43 e1 16 d1 2e 14 d6 59 c4 4b 03 1f 4a 2a b1 68 | ikev2 g^x 2e 3a ca a3 c0 9b ec 0d 92 cb 4f d7 26 c4 23 f2 | ikev2 g^x 7c d5 4f ba 74 f9 b7 a5 8e 7b c3 80 00 1d 25 ca | ikev2 g^x c8 b6 e7 a7 82 b3 c1 78 86 73 3b e9 bb cb dc 9e | ikev2 g^x 16 a5 8a cc 34 90 c8 2f 6d 13 78 e8 e7 19 45 83 | ikev2 g^x dc 57 56 49 3f bf 58 bc b2 bb f5 33 21 2c 25 1f | ikev2 g^x a6 7d a4 87 88 3d f9 0c 01 74 fa ba fa 6a a3 ea | ikev2 g^x 56 23 6e 54 12 c1 f7 82 be 6d 43 68 51 8c 0d be | ikev2 g^x 08 4b d8 2e 8d 59 7c 26 08 c9 1c b1 04 3b b0 54 | ikev2 g^x bc 1d c3 bf f4 25 5d 1b 85 94 1b 71 be ed 0f 44 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4e 75 ec 55 47 ad 1d d0 2c e8 2a 32 3b 96 41 fb | IKEv2 nonce 18 33 b6 2f 27 93 6f d4 fa 16 90 bd 2c 77 4a 81 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6f 4b 14 c1 cc 6f 1e 9b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 29 | natd_hash: port= 01 f4 | natd_hash: hash= 45 38 05 46 29 58 72 8b 7e ef 72 dd 2e 27 17 90 | natd_hash: hash= 79 5b 4e 74 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 45 38 05 46 29 58 72 8b 7e ef 72 dd 2e 27 17 90 | Notify data 79 5b 4e 74 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6f 4b 14 c1 cc 6f 1e 9b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 18 2e f1 a2 ca 0d ed 2f 55 5d d8 98 ad 86 50 39 | natd_hash: hash= 38 85 67 2b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 18 2e f1 a2 ca 0d ed 2f 55 5d d8 98 ad 86 50 39 | Notify data 38 85 67 2b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #678 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #678 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #678 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #678: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #678 to 4294967295 after switching state | Message ID: IKE #678 skipping update_recv as MD is fake | Message ID: sent #678 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-41" #678: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.41:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #678) | 6f 4b 14 c1 cc 6f 1e 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2e 9f 0d f0 04 66 77 dd 93 01 97 d4 e6 2f 63 32 | 08 d5 90 21 20 45 70 7a 23 d4 d5 21 f2 1e 5d 61 | d1 38 f7 cd 0d a7 dd 8c 8d 4e d1 19 04 72 f0 60 | b9 a1 be 10 b3 d5 d9 6f 71 a4 43 ab d4 47 03 ef | 16 17 71 a7 79 4c e1 97 0b 36 26 91 25 a7 46 06 | 06 c6 86 a0 3d 48 06 59 81 9f 8c 4f 63 ff e7 cb | 43 e1 16 d1 2e 14 d6 59 c4 4b 03 1f 4a 2a b1 68 | 2e 3a ca a3 c0 9b ec 0d 92 cb 4f d7 26 c4 23 f2 | 7c d5 4f ba 74 f9 b7 a5 8e 7b c3 80 00 1d 25 ca | c8 b6 e7 a7 82 b3 c1 78 86 73 3b e9 bb cb dc 9e | 16 a5 8a cc 34 90 c8 2f 6d 13 78 e8 e7 19 45 83 | dc 57 56 49 3f bf 58 bc b2 bb f5 33 21 2c 25 1f | a6 7d a4 87 88 3d f9 0c 01 74 fa ba fa 6a a3 ea | 56 23 6e 54 12 c1 f7 82 be 6d 43 68 51 8c 0d be | 08 4b d8 2e 8d 59 7c 26 08 c9 1c b1 04 3b b0 54 | bc 1d c3 bf f4 25 5d 1b 85 94 1b 71 be ed 0f 44 | 29 00 00 24 4e 75 ec 55 47 ad 1d d0 2c e8 2a 32 | 3b 96 41 fb 18 33 b6 2f 27 93 6f d4 fa 16 90 bd | 2c 77 4a 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 38 05 46 29 58 72 8b 7e ef 72 dd | 2e 27 17 90 79 5b 4e 74 00 00 00 1c 00 00 40 05 | 18 2e f1 a2 ca 0d ed 2f 55 5d d8 98 ad 86 50 39 | 38 85 67 2b | state #678 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb368009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb368005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #678 | libevent_malloc: new ptr-libevent@0x7fb35c0bc1e0 size 128 | #678 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.23675 | resume sending helper answer for #678 suppresed complete_v2_state_transition() and stole MD | #678 spent 0.277 milliseconds in resume sending helper answer | stop processing: state #678 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38407bf50 | processing resume sending helper answer for #680 | start processing: state #680 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 680 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #680 | **emit ISAKMP Message: | initiator cookie: | f5 24 ca cb ba 88 21 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-111 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d0 2c 8a fa 61 5b dc 75 21 43 9c 59 cd 19 1a f2 | ikev2 g^x af b9 0a dc 0c b9 2c e2 bb 4a 6d 4d 55 00 0f 6d | ikev2 g^x f7 55 26 a5 be c3 6b d0 d6 97 e8 89 bd 9b af d2 | ikev2 g^x 2f a7 07 fa cd 16 db 98 51 25 2f 47 ee 80 b4 75 | ikev2 g^x e5 4e c2 eb f9 dd 90 41 c4 eb ff 65 55 5a 16 e1 | ikev2 g^x 0a 63 9d 2c a4 d7 be 5f bb 29 e9 20 d4 b4 c6 c0 | ikev2 g^x 19 93 f4 ab e8 7c 18 0f 67 18 9d b1 ee e2 c4 b3 | ikev2 g^x db 86 22 91 09 29 2e b1 6d 58 cf 74 cb b0 f3 dc | ikev2 g^x 97 d9 3b fe 88 19 02 5d 3d 14 58 0a 5f 84 05 fc | ikev2 g^x ca 52 61 f1 b4 87 0b 56 9d 30 94 86 cc 24 e5 40 | ikev2 g^x f9 97 d9 e9 cb 69 4b 23 cf 2e bf f3 2b 4d 07 51 | ikev2 g^x 51 02 3a d7 fd 40 d4 5a a1 f4 0a 03 09 91 da ee | ikev2 g^x 03 72 0d 0f a8 f4 7a a3 cc 70 63 19 72 ce 5a 82 | ikev2 g^x 3e 1e 95 5c 92 5c 3e 8e a5 d8 b6 96 00 19 c5 14 | ikev2 g^x 30 e1 2f b7 0e bc 81 b8 ab b7 09 95 46 2e c8 74 | ikev2 g^x df cd ec 80 52 5f c9 db f8 06 24 81 85 22 9d a7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a5 87 f1 2f ce 48 12 7d 6a 67 59 4f 79 27 34 b3 | IKEv2 nonce a6 cd 32 d2 99 ca 81 34 03 a5 ff 6e 74 fd e5 cc | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f5 24 ca cb ba 88 21 d6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6f | natd_hash: port= 01 f4 | natd_hash: hash= a7 d0 80 55 09 28 92 96 a1 13 47 05 9d f7 2b dd | natd_hash: hash= b4 58 66 92 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a7 d0 80 55 09 28 92 96 a1 13 47 05 9d f7 2b dd | Notify data b4 58 66 92 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f5 24 ca cb ba 88 21 d6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6d 86 77 16 04 78 0f de 20 5d c4 c9 23 72 82 0b | natd_hash: hash= af 53 d4 25 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6d 86 77 16 04 78 0f de 20 5d c4 c9 23 72 82 0b | Notify data af 53 d4 25 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #680 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #680 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #680 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #680: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #680 to 4294967295 after switching state | Message ID: IKE #680 skipping update_recv as MD is fake | Message ID: sent #680 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-111" #680: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.111:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #680) | f5 24 ca cb ba 88 21 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 2c 8a fa 61 5b dc 75 21 43 9c 59 cd 19 1a f2 | af b9 0a dc 0c b9 2c e2 bb 4a 6d 4d 55 00 0f 6d | f7 55 26 a5 be c3 6b d0 d6 97 e8 89 bd 9b af d2 | 2f a7 07 fa cd 16 db 98 51 25 2f 47 ee 80 b4 75 | e5 4e c2 eb f9 dd 90 41 c4 eb ff 65 55 5a 16 e1 | 0a 63 9d 2c a4 d7 be 5f bb 29 e9 20 d4 b4 c6 c0 | 19 93 f4 ab e8 7c 18 0f 67 18 9d b1 ee e2 c4 b3 | db 86 22 91 09 29 2e b1 6d 58 cf 74 cb b0 f3 dc | 97 d9 3b fe 88 19 02 5d 3d 14 58 0a 5f 84 05 fc | ca 52 61 f1 b4 87 0b 56 9d 30 94 86 cc 24 e5 40 | f9 97 d9 e9 cb 69 4b 23 cf 2e bf f3 2b 4d 07 51 | 51 02 3a d7 fd 40 d4 5a a1 f4 0a 03 09 91 da ee | 03 72 0d 0f a8 f4 7a a3 cc 70 63 19 72 ce 5a 82 | 3e 1e 95 5c 92 5c 3e 8e a5 d8 b6 96 00 19 c5 14 | 30 e1 2f b7 0e bc 81 b8 ab b7 09 95 46 2e c8 74 | df cd ec 80 52 5f c9 db f8 06 24 81 85 22 9d a7 | 29 00 00 24 a5 87 f1 2f ce 48 12 7d 6a 67 59 4f | 79 27 34 b3 a6 cd 32 d2 99 ca 81 34 03 a5 ff 6e | 74 fd e5 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 d0 80 55 09 28 92 96 a1 13 47 05 | 9d f7 2b dd b4 58 66 92 00 00 00 1c 00 00 40 05 | 6d 86 77 16 04 78 0f de 20 5d c4 c9 23 72 82 0b | af 53 d4 25 | state #680 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3680180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a56dd0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56dd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #680 | libevent_malloc: new ptr-libevent@0x7fb38407bf50 size 128 | #680 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.237046 | resume sending helper answer for #680 suppresed complete_v2_state_transition() and stole MD | #680 spent 0.294 milliseconds in resume sending helper answer | stop processing: state #680 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c07d450 | processing resume sending helper answer for #690 | start processing: state #690 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 690 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #690 | **emit ISAKMP Message: | initiator cookie: | a5 d8 1b 6e 95 a0 38 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-76 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ca b3 24 9a 21 6f 60 b3 71 d4 ab a0 25 f7 eb d1 | ikev2 g^x cb b9 58 9d 93 b9 4d 31 b9 bf af f1 80 33 51 9e | ikev2 g^x b5 91 2a 1a 69 85 ec 97 c2 f1 f6 7b cf 0f 98 34 | ikev2 g^x cc f0 78 7e 20 72 ca ec c1 db 9d af c5 94 72 f0 | ikev2 g^x 9d 8a 9c 63 61 d9 79 76 b4 d5 ff b6 88 bc 5f 00 | ikev2 g^x f9 44 90 fd 47 4f 4d ef 33 81 b4 03 24 b2 94 be | ikev2 g^x 87 74 8d ec 7f 31 ff a0 b9 7a 06 f4 90 af 20 b4 | ikev2 g^x d9 9a 9c db df 5e de 7a 83 76 4f 3b f9 bd 20 fc | ikev2 g^x 39 b4 48 b8 7f 01 a8 08 13 de a8 58 cb b0 5a 11 | ikev2 g^x 7d 48 1d 19 b5 3b 92 c4 7a 09 9c bf 77 f3 7f 94 | ikev2 g^x 69 63 88 b2 cc c5 dd f2 df 7b f2 15 b7 7d d7 15 | ikev2 g^x 62 ec fa 8e 1d 1f f7 e3 89 53 47 50 af 55 33 77 | ikev2 g^x d7 34 f4 ef 07 86 c5 df 5b f7 cf 26 c2 e4 b6 41 | ikev2 g^x ba 90 ea 4c 75 6d 9b 74 97 2c 57 b6 c4 94 c5 0c | ikev2 g^x 7b 86 0a 36 9e cd da 67 90 23 e3 e4 2b 85 7e 93 | ikev2 g^x cf 87 12 15 81 f9 76 1c 9a 69 94 6a 02 3c b9 8e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 86 ae f8 9b 15 cc 78 e0 7f 55 66 22 35 e0 b7 21 | IKEv2 nonce 54 8a fc 02 7b 9e 59 11 ce d8 be 06 f0 76 9a e9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a5 d8 1b 6e 95 a0 38 ac | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4c | natd_hash: port= 01 f4 | natd_hash: hash= d8 b6 97 31 de cc 72 d4 ce 22 00 8a 2b 89 e8 30 | natd_hash: hash= bf 2f b6 28 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d8 b6 97 31 de cc 72 d4 ce 22 00 8a 2b 89 e8 30 | Notify data bf 2f b6 28 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a5 d8 1b 6e 95 a0 38 ac | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= bf c8 d8 e9 c5 00 38 c5 98 1c ab d5 6d a7 2c 3e | natd_hash: hash= 8e a5 66 03 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bf c8 d8 e9 c5 00 38 c5 98 1c ab d5 6d a7 2c 3e | Notify data 8e a5 66 03 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #690 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #690 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #690 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #690: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #690 to 4294967295 after switching state | Message ID: IKE #690 skipping update_recv as MD is fake | Message ID: sent #690 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-76" #690: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.76:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #690) | a5 d8 1b 6e 95 a0 38 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca b3 24 9a 21 6f 60 b3 71 d4 ab a0 25 f7 eb d1 | cb b9 58 9d 93 b9 4d 31 b9 bf af f1 80 33 51 9e | b5 91 2a 1a 69 85 ec 97 c2 f1 f6 7b cf 0f 98 34 | cc f0 78 7e 20 72 ca ec c1 db 9d af c5 94 72 f0 | 9d 8a 9c 63 61 d9 79 76 b4 d5 ff b6 88 bc 5f 00 | f9 44 90 fd 47 4f 4d ef 33 81 b4 03 24 b2 94 be | 87 74 8d ec 7f 31 ff a0 b9 7a 06 f4 90 af 20 b4 | d9 9a 9c db df 5e de 7a 83 76 4f 3b f9 bd 20 fc | 39 b4 48 b8 7f 01 a8 08 13 de a8 58 cb b0 5a 11 | 7d 48 1d 19 b5 3b 92 c4 7a 09 9c bf 77 f3 7f 94 | 69 63 88 b2 cc c5 dd f2 df 7b f2 15 b7 7d d7 15 | 62 ec fa 8e 1d 1f f7 e3 89 53 47 50 af 55 33 77 | d7 34 f4 ef 07 86 c5 df 5b f7 cf 26 c2 e4 b6 41 | ba 90 ea 4c 75 6d 9b 74 97 2c 57 b6 c4 94 c5 0c | 7b 86 0a 36 9e cd da 67 90 23 e3 e4 2b 85 7e 93 | cf 87 12 15 81 f9 76 1c 9a 69 94 6a 02 3c b9 8e | 29 00 00 24 86 ae f8 9b 15 cc 78 e0 7f 55 66 22 | 35 e0 b7 21 54 8a fc 02 7b 9e 59 11 ce d8 be 06 | f0 76 9a e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 b6 97 31 de cc 72 d4 ce 22 00 8a | 2b 89 e8 30 bf 2f b6 28 00 00 00 1c 00 00 40 05 | bf c8 d8 e9 c5 00 38 c5 98 1c ab d5 6d a7 2c 3e | 8e a5 66 03 | state #690 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0bf40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #690 | libevent_malloc: new ptr-libevent@0x7fb36c07d450 size 128 | #690 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.237377 | resume sending helper answer for #690 suppresed complete_v2_state_transition() and stole MD | #690 spent 0.29 milliseconds in resume sending helper answer | stop processing: state #690 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37407a8b0 | processing resume sending helper answer for #673 | start processing: state #673 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 673 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #673 | **emit ISAKMP Message: | initiator cookie: | f4 4a f0 3d b4 3d 3c 25 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-152 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 15 2e 28 e0 6e 6b 91 36 e9 7b 5c 4d ea 67 f2 11 | ikev2 g^x 6c 53 9b eb c8 50 22 a6 67 a8 57 27 ba 98 9b b4 | ikev2 g^x e9 53 e2 e7 39 12 9d 1a b8 95 df 50 89 b9 6d 1c | ikev2 g^x c2 85 59 43 95 c8 ac 8f 53 d2 47 55 bc 74 a8 bb | ikev2 g^x 28 f3 ba 97 8e 1e f2 17 85 ea 84 b3 be 86 51 d1 | ikev2 g^x 91 38 40 54 bb 85 c0 e0 e5 d5 70 2b c4 39 db 6d | ikev2 g^x 4b 3d 95 a6 d5 18 36 7a df 3f c0 b2 8e 51 36 6a | ikev2 g^x ef 02 e1 00 c2 a8 6e a9 10 12 26 9a ee db 58 a9 | ikev2 g^x ab 3b 04 78 41 3a 3f 8b ee d2 5e 48 4b 71 7d f1 | ikev2 g^x 52 f8 9a 0e eb 76 58 35 11 da 4a 05 95 53 81 71 | ikev2 g^x 78 25 df 02 2e c1 be 80 18 4a aa ee 79 3d 23 07 | ikev2 g^x d3 1a 11 f7 6e 6b 01 33 c3 1e bd bb f0 b7 41 e4 | ikev2 g^x 2f ff af 8b 2b 73 a4 f1 55 39 a1 c2 31 b7 e5 bc | ikev2 g^x 14 4f c1 d1 0c 4f 37 65 44 1f 1f 08 6a 1f 2e 2c | ikev2 g^x 11 ed 27 fa 13 cf d7 f1 1d ea 05 12 6d df ec 05 | ikev2 g^x fc 26 9c 3b 34 42 df 39 1d 37 77 1c be a4 76 ec | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ab e5 f6 4a 5c 04 aa f5 86 05 1c 45 9d 40 23 0d | IKEv2 nonce 87 34 72 f6 2c d5 7d fe a7 24 93 f6 e4 ca 8b 59 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f4 4a f0 3d b4 3d 3c 25 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 98 | natd_hash: port= 01 f4 | natd_hash: hash= 83 0f 59 d6 bf b6 98 37 0c 06 6e b8 72 17 35 a4 | natd_hash: hash= 3d ff 36 60 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 83 0f 59 d6 bf b6 98 37 0c 06 6e b8 72 17 35 a4 | Notify data 3d ff 36 60 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f4 4a f0 3d b4 3d 3c 25 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= da e9 98 a0 13 2a 7f 02 39 d7 88 7e 43 33 16 b8 | natd_hash: hash= 3d f0 bb d6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data da e9 98 a0 13 2a 7f 02 39 d7 88 7e 43 33 16 b8 | Notify data 3d f0 bb d6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #673 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #673 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #673 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #673: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #673 to 4294967295 after switching state | Message ID: IKE #673 skipping update_recv as MD is fake | Message ID: sent #673 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-152" #673: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.152:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #673) | f4 4a f0 3d b4 3d 3c 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 2e 28 e0 6e 6b 91 36 e9 7b 5c 4d ea 67 f2 11 | 6c 53 9b eb c8 50 22 a6 67 a8 57 27 ba 98 9b b4 | e9 53 e2 e7 39 12 9d 1a b8 95 df 50 89 b9 6d 1c | c2 85 59 43 95 c8 ac 8f 53 d2 47 55 bc 74 a8 bb | 28 f3 ba 97 8e 1e f2 17 85 ea 84 b3 be 86 51 d1 | 91 38 40 54 bb 85 c0 e0 e5 d5 70 2b c4 39 db 6d | 4b 3d 95 a6 d5 18 36 7a df 3f c0 b2 8e 51 36 6a | ef 02 e1 00 c2 a8 6e a9 10 12 26 9a ee db 58 a9 | ab 3b 04 78 41 3a 3f 8b ee d2 5e 48 4b 71 7d f1 | 52 f8 9a 0e eb 76 58 35 11 da 4a 05 95 53 81 71 | 78 25 df 02 2e c1 be 80 18 4a aa ee 79 3d 23 07 | d3 1a 11 f7 6e 6b 01 33 c3 1e bd bb f0 b7 41 e4 | 2f ff af 8b 2b 73 a4 f1 55 39 a1 c2 31 b7 e5 bc | 14 4f c1 d1 0c 4f 37 65 44 1f 1f 08 6a 1f 2e 2c | 11 ed 27 fa 13 cf d7 f1 1d ea 05 12 6d df ec 05 | fc 26 9c 3b 34 42 df 39 1d 37 77 1c be a4 76 ec | 29 00 00 24 ab e5 f6 4a 5c 04 aa f5 86 05 1c 45 | 9d 40 23 0d 87 34 72 f6 2c d5 7d fe a7 24 93 f6 | e4 ca 8b 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 0f 59 d6 bf b6 98 37 0c 06 6e b8 | 72 17 35 a4 3d ff 36 60 00 00 00 1c 00 00 40 05 | da e9 98 a0 13 2a 7f 02 39 d7 88 7e 43 33 16 b8 | 3d f0 bb d6 | state #673 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb340009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb348012630 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348012630 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #673 | libevent_malloc: new ptr-libevent@0x7fb37407a8b0 size 128 | #673 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.237777 | resume sending helper answer for #673 suppresed complete_v2_state_transition() and stole MD | #673 spent 0.379 milliseconds in resume sending helper answer | stop processing: state #673 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb378068430 | processing resume sending helper answer for #694 | start processing: state #694 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 694 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #694 | **emit ISAKMP Message: | initiator cookie: | 0e 55 f5 b3 fd c8 f6 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-229 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 66 f5 ee 55 73 5c 37 78 44 5f 18 4c b2 81 47 42 | ikev2 g^x ae 69 a9 34 a8 d4 9d 0b 90 c1 b1 7e 21 7d 72 4c | ikev2 g^x 54 93 20 2a f2 92 1d d4 f8 1f 47 36 29 d3 1b 6f | ikev2 g^x 9a 19 dc 80 ff 6e c6 91 f9 df ed 9a 62 30 f5 01 | ikev2 g^x b8 f1 04 a3 53 8d 38 fe 98 e7 59 ff 4d 11 d1 c2 | ikev2 g^x 74 10 60 78 7f 69 54 ea 74 e4 4a 27 75 1a 31 77 | ikev2 g^x ef a3 4e c6 65 ff d7 27 b4 5e d2 ff 26 bd 65 43 | ikev2 g^x da 2a 0b a3 b3 5c 1f d0 f9 5c ec 9a e3 39 79 a7 | ikev2 g^x e1 b2 2d d0 86 12 11 06 eb 7c fb f5 44 48 fb 7a | ikev2 g^x 82 16 10 84 83 c7 1c 9c d8 e9 3c c6 7c 4a 9b 09 | ikev2 g^x 70 75 2c b6 29 44 4a 9d e8 e2 23 11 a1 c0 82 38 | ikev2 g^x b5 09 f8 00 84 ef 12 3d 23 43 5b 89 e5 8c ce f8 | ikev2 g^x 8e 3c ab d2 ca bf 1f 50 d6 c2 77 f8 1b a3 3e 00 | ikev2 g^x 3e 0e 9a 9d 92 de 61 1c 3d 11 7b 3b 3b f8 ec 76 | ikev2 g^x 6c 1a de 42 6f 88 09 08 2c 91 63 7d 68 40 9a 06 | ikev2 g^x d8 f1 66 a0 3a 37 85 ba fa cc 00 41 c2 2c a4 8e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce dd 94 ae 1a 9a 0b 75 c4 7b 33 4c 19 1c 5a d2 2d | IKEv2 nonce 58 3e 32 91 a4 73 44 86 a8 08 b2 01 fb 46 4f e2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0e 55 f5 b3 fd c8 f6 ce | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e5 | natd_hash: port= 01 f4 | natd_hash: hash= 49 27 31 06 cb 4b e9 70 41 8f 8b 42 1b a5 d4 66 | natd_hash: hash= 19 e2 60 f0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 49 27 31 06 cb 4b e9 70 41 8f 8b 42 1b a5 d4 66 | Notify data 19 e2 60 f0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0e 55 f5 b3 fd c8 f6 ce | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 17 ce fc 1b 0a 11 3f 06 90 32 ce 1d 91 fd 6a 88 | natd_hash: hash= d4 bc 2d 95 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 17 ce fc 1b 0a 11 3f 06 90 32 ce 1d 91 fd 6a 88 | Notify data d4 bc 2d 95 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #694 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #694 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #694 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #694: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #694 to 4294967295 after switching state | Message ID: IKE #694 skipping update_recv as MD is fake | Message ID: sent #694 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-229" #694: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.229:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #694) | 0e 55 f5 b3 fd c8 f6 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 f5 ee 55 73 5c 37 78 44 5f 18 4c b2 81 47 42 | ae 69 a9 34 a8 d4 9d 0b 90 c1 b1 7e 21 7d 72 4c | 54 93 20 2a f2 92 1d d4 f8 1f 47 36 29 d3 1b 6f | 9a 19 dc 80 ff 6e c6 91 f9 df ed 9a 62 30 f5 01 | b8 f1 04 a3 53 8d 38 fe 98 e7 59 ff 4d 11 d1 c2 | 74 10 60 78 7f 69 54 ea 74 e4 4a 27 75 1a 31 77 | ef a3 4e c6 65 ff d7 27 b4 5e d2 ff 26 bd 65 43 | da 2a 0b a3 b3 5c 1f d0 f9 5c ec 9a e3 39 79 a7 | e1 b2 2d d0 86 12 11 06 eb 7c fb f5 44 48 fb 7a | 82 16 10 84 83 c7 1c 9c d8 e9 3c c6 7c 4a 9b 09 | 70 75 2c b6 29 44 4a 9d e8 e2 23 11 a1 c0 82 38 | b5 09 f8 00 84 ef 12 3d 23 43 5b 89 e5 8c ce f8 | 8e 3c ab d2 ca bf 1f 50 d6 c2 77 f8 1b a3 3e 00 | 3e 0e 9a 9d 92 de 61 1c 3d 11 7b 3b 3b f8 ec 76 | 6c 1a de 42 6f 88 09 08 2c 91 63 7d 68 40 9a 06 | d8 f1 66 a0 3a 37 85 ba fa cc 00 41 c2 2c a4 8e | 29 00 00 24 dd 94 ae 1a 9a 0b 75 c4 7b 33 4c 19 | 1c 5a d2 2d 58 3e 32 91 a4 73 44 86 a8 08 b2 01 | fb 46 4f e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 49 27 31 06 cb 4b e9 70 41 8f 8b 42 | 1b a5 d4 66 19 e2 60 f0 00 00 00 1c 00 00 40 05 | 17 ce fc 1b 0a 11 3f 06 90 32 ce 1d 91 fd 6a 88 | d4 bc 2d 95 | state #694 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c03f430 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c017ea0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #694 | libevent_malloc: new ptr-libevent@0x7fb378068430 size 128 | #694 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.238238 | resume sending helper answer for #694 suppresed complete_v2_state_transition() and stole MD | #694 spent 0.42 milliseconds in resume sending helper answer | stop processing: state #694 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388085dd0 | processing resume sending helper answer for #695 | start processing: state #695 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 695 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #695 | **emit ISAKMP Message: | initiator cookie: | af 67 24 f2 d5 c7 bc 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-197 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 44 14 e7 c9 33 09 4d 36 12 f9 6d de 10 f0 e5 47 | ikev2 g^x 82 ed 23 45 d4 b6 ce 21 00 04 da b4 2f 94 b8 30 | ikev2 g^x 2f 77 2b 66 13 06 af 85 21 fd ef 57 6a 09 67 67 | ikev2 g^x 37 28 49 9e 18 7d d7 f0 08 1e d6 88 3f e7 a9 18 | ikev2 g^x cf 2f 78 55 e7 d6 fb 4b 07 4e 15 ae c6 2b 26 51 | ikev2 g^x b3 ce ba 2f 1e 38 1f 99 e6 3d 40 73 ee 22 e1 a7 | ikev2 g^x 0d 0b 8c c5 62 02 7e 56 2d 8d 6c 77 fd 6e 2e 61 | ikev2 g^x ca 7e 48 f6 cb 33 41 3b 92 87 6e 0f b5 01 01 1a | ikev2 g^x 7a 26 1b af b8 f9 1b 18 fd 42 1d d8 57 b9 99 f3 | ikev2 g^x a3 88 af 1a 40 b5 fd 9d a8 8b 9a 42 43 ee 86 63 | ikev2 g^x 13 46 c8 29 88 32 aa 0e 70 c3 98 1b 40 71 6c 44 | ikev2 g^x ab 3f 11 fc d3 58 f3 77 22 af df 25 de 81 a9 4a | ikev2 g^x 00 72 bb 64 e2 5c be f4 95 c0 21 c9 6c 9d 40 f4 | ikev2 g^x 7b 46 b5 97 b0 26 ac 1c 91 8d ac 90 5b 92 a1 ab | ikev2 g^x 78 4e 4e 35 b8 bf b8 64 4a a1 5c 4e 46 64 49 0a | ikev2 g^x 0d b6 6c 3d 6b 6f b5 91 f0 48 34 62 b9 68 a6 af | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c0 8b 5f d5 7a 97 79 40 43 e6 f6 3f 54 f6 96 1a | IKEv2 nonce 49 cd f5 d4 43 9d 79 22 51 26 12 49 61 34 44 a2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= af 67 24 f2 d5 c7 bc 4c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c5 | natd_hash: port= 01 f4 | natd_hash: hash= 8a fd 7a d7 4e 83 ac 99 9d 97 07 a9 d5 f6 51 74 | natd_hash: hash= a1 c3 79 42 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8a fd 7a d7 4e 83 ac 99 9d 97 07 a9 d5 f6 51 74 | Notify data a1 c3 79 42 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= af 67 24 f2 d5 c7 bc 4c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d3 52 b4 8f bd 1e ff 85 b5 5d 7c 33 8d 85 60 74 | natd_hash: hash= f7 b3 c4 d9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d3 52 b4 8f bd 1e ff 85 b5 5d 7c 33 8d 85 60 74 | Notify data f7 b3 c4 d9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #695 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #695 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #695 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #695: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #695 to 4294967295 after switching state | Message ID: IKE #695 skipping update_recv as MD is fake | Message ID: sent #695 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-197" #695: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.197:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #695) | af 67 24 f2 d5 c7 bc 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 14 e7 c9 33 09 4d 36 12 f9 6d de 10 f0 e5 47 | 82 ed 23 45 d4 b6 ce 21 00 04 da b4 2f 94 b8 30 | 2f 77 2b 66 13 06 af 85 21 fd ef 57 6a 09 67 67 | 37 28 49 9e 18 7d d7 f0 08 1e d6 88 3f e7 a9 18 | cf 2f 78 55 e7 d6 fb 4b 07 4e 15 ae c6 2b 26 51 | b3 ce ba 2f 1e 38 1f 99 e6 3d 40 73 ee 22 e1 a7 | 0d 0b 8c c5 62 02 7e 56 2d 8d 6c 77 fd 6e 2e 61 | ca 7e 48 f6 cb 33 41 3b 92 87 6e 0f b5 01 01 1a | 7a 26 1b af b8 f9 1b 18 fd 42 1d d8 57 b9 99 f3 | a3 88 af 1a 40 b5 fd 9d a8 8b 9a 42 43 ee 86 63 | 13 46 c8 29 88 32 aa 0e 70 c3 98 1b 40 71 6c 44 | ab 3f 11 fc d3 58 f3 77 22 af df 25 de 81 a9 4a | 00 72 bb 64 e2 5c be f4 95 c0 21 c9 6c 9d 40 f4 | 7b 46 b5 97 b0 26 ac 1c 91 8d ac 90 5b 92 a1 ab | 78 4e 4e 35 b8 bf b8 64 4a a1 5c 4e 46 64 49 0a | 0d b6 6c 3d 6b 6f b5 91 f0 48 34 62 b9 68 a6 af | 29 00 00 24 c0 8b 5f d5 7a 97 79 40 43 e6 f6 3f | 54 f6 96 1a 49 cd f5 d4 43 9d 79 22 51 26 12 49 | 61 34 44 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a fd 7a d7 4e 83 ac 99 9d 97 07 a9 | d5 f6 51 74 a1 c3 79 42 00 00 00 1c 00 00 40 05 | d3 52 b4 8f bd 1e ff 85 b5 5d 7c 33 8d 85 60 74 | f7 b3 c4 d9 | state #695 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36802ee40 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb368025320 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368025320 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #695 | libevent_malloc: new ptr-libevent@0x7fb388085dd0 size 128 | #695 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.238675 | resume sending helper answer for #695 suppresed complete_v2_state_transition() and stole MD | #695 spent 0.393 milliseconds in resume sending helper answer | stop processing: state #695 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3600720e0 | processing resume sending helper answer for #697 | start processing: state #697 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 697 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #697 | **emit ISAKMP Message: | initiator cookie: | d6 28 cf ed 60 7e b1 e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-201 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x cc b1 dd dd 9c 60 58 a9 c7 66 fb 23 cc 00 f7 04 | ikev2 g^x f9 eb 9c de 8f 73 86 22 d9 42 30 60 08 2d ef 14 | ikev2 g^x b6 50 8f 0d 43 3e 37 57 d1 c5 18 fb f8 0e 88 30 | ikev2 g^x 19 36 6b 7c 74 95 4f c4 00 aa 6d 70 5c 70 e4 1b | ikev2 g^x af 06 97 50 19 89 6c f1 77 c6 1e 80 61 54 71 33 | ikev2 g^x 94 67 d0 e4 1e d2 49 c7 d2 75 26 40 9b 38 29 7a | ikev2 g^x 39 9e 94 88 0a 9f 90 00 cf cc cd 5e 03 3f 80 c9 | ikev2 g^x 9d a6 0c 03 5a c2 81 22 47 79 c7 4e 2e 63 70 6d | ikev2 g^x 12 be 62 03 d1 4b 3b 92 59 d8 c4 10 0b e1 2c 6e | ikev2 g^x 7f 5b c2 f8 db a0 f1 b2 bc cf 2f ab d4 30 81 0b | ikev2 g^x 99 67 12 c3 46 3c 3f 42 29 aa 13 3e e8 5b 5b ab | ikev2 g^x 4a 06 c2 00 9d 12 7b ba b5 20 f9 e2 1f 9d 2f 8b | ikev2 g^x 8a b3 7d e3 d1 57 14 4c 7b d3 d9 0d 11 12 94 15 | ikev2 g^x 53 16 e5 df be 4c 89 d6 26 21 be 1f 80 ea d2 39 | ikev2 g^x 1c 6b a8 aa 75 fe 2b 99 57 d4 00 58 a5 b6 36 c0 | ikev2 g^x 15 f3 d2 55 87 c4 0d 66 47 0f 06 26 0e 04 3c 5a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 01 24 ca b1 15 4b b9 0a 03 0f 6f 65 30 b1 82 99 | IKEv2 nonce 4d 99 95 24 13 7a fc 58 9a 3d 81 dd ab d4 21 6f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d6 28 cf ed 60 7e b1 e9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c9 | natd_hash: port= 01 f4 | natd_hash: hash= 68 3d a9 82 f6 57 1d d7 c8 a4 72 46 84 4d cc ed | natd_hash: hash= 86 24 ec 99 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 68 3d a9 82 f6 57 1d d7 c8 a4 72 46 84 4d cc ed | Notify data 86 24 ec 99 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d6 28 cf ed 60 7e b1 e9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 92 72 21 f5 94 19 6f 86 30 0f 49 01 9c c4 ab f1 | natd_hash: hash= 49 76 f6 3d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 92 72 21 f5 94 19 6f 86 30 0f 49 01 9c c4 ab f1 | Notify data 49 76 f6 3d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #697 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #697 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #697 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #697: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #697 to 4294967295 after switching state | Message ID: IKE #697 skipping update_recv as MD is fake | Message ID: sent #697 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-201" #697: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.201:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #697) | d6 28 cf ed 60 7e b1 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc b1 dd dd 9c 60 58 a9 c7 66 fb 23 cc 00 f7 04 | f9 eb 9c de 8f 73 86 22 d9 42 30 60 08 2d ef 14 | b6 50 8f 0d 43 3e 37 57 d1 c5 18 fb f8 0e 88 30 | 19 36 6b 7c 74 95 4f c4 00 aa 6d 70 5c 70 e4 1b | af 06 97 50 19 89 6c f1 77 c6 1e 80 61 54 71 33 | 94 67 d0 e4 1e d2 49 c7 d2 75 26 40 9b 38 29 7a | 39 9e 94 88 0a 9f 90 00 cf cc cd 5e 03 3f 80 c9 | 9d a6 0c 03 5a c2 81 22 47 79 c7 4e 2e 63 70 6d | 12 be 62 03 d1 4b 3b 92 59 d8 c4 10 0b e1 2c 6e | 7f 5b c2 f8 db a0 f1 b2 bc cf 2f ab d4 30 81 0b | 99 67 12 c3 46 3c 3f 42 29 aa 13 3e e8 5b 5b ab | 4a 06 c2 00 9d 12 7b ba b5 20 f9 e2 1f 9d 2f 8b | 8a b3 7d e3 d1 57 14 4c 7b d3 d9 0d 11 12 94 15 | 53 16 e5 df be 4c 89 d6 26 21 be 1f 80 ea d2 39 | 1c 6b a8 aa 75 fe 2b 99 57 d4 00 58 a5 b6 36 c0 | 15 f3 d2 55 87 c4 0d 66 47 0f 06 26 0e 04 3c 5a | 29 00 00 24 01 24 ca b1 15 4b b9 0a 03 0f 6f 65 | 30 b1 82 99 4d 99 95 24 13 7a fc 58 9a 3d 81 dd | ab d4 21 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 3d a9 82 f6 57 1d d7 c8 a4 72 46 | 84 4d cc ed 86 24 ec 99 00 00 00 1c 00 00 40 05 | 92 72 21 f5 94 19 6f 86 30 0f 49 01 9c c4 ab f1 | 49 76 f6 3d | state #697 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35403b0b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb338017ea0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #697 | libevent_malloc: new ptr-libevent@0x7fb3600720e0 size 128 | #697 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.239114 | resume sending helper answer for #697 suppresed complete_v2_state_transition() and stole MD | #697 spent 0.401 milliseconds in resume sending helper answer | stop processing: state #697 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb368064ab0 | processing resume sending helper answer for #700 | start processing: state #700 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 700 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #700 | **emit ISAKMP Message: | initiator cookie: | 00 c1 02 d2 ce 58 22 c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-105 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 92 38 f6 d2 66 d7 37 75 8a f0 3e e3 b7 32 d6 41 | ikev2 g^x f5 9b 8f a2 62 4a c2 2b c9 04 e2 82 df 16 b1 e7 | ikev2 g^x 53 45 e9 b0 d2 33 ee 18 d1 c5 9a 70 cf 68 0f e5 | ikev2 g^x 32 d6 f3 5b 1e ba 36 1e 40 b2 2b 52 74 e4 c5 52 | ikev2 g^x da 47 f2 0c 1b a7 d1 57 3a 88 c8 c9 39 c5 dd 03 | ikev2 g^x 07 4e 94 a0 a1 1d 2c ea 30 74 62 8d 86 0a 47 96 | ikev2 g^x 6e 86 43 84 d1 9e 1d 48 ef 3c 77 aa 61 b1 d6 36 | ikev2 g^x b5 4d f7 2a 16 ea 31 f3 6f f0 30 8c 27 0f 36 c2 | ikev2 g^x 5a 32 4b 7a 99 fa 8a a2 52 1a 48 1a 84 31 7f d9 | ikev2 g^x a1 19 01 60 f3 03 bc b4 7e 3c f2 20 4b db 82 e3 | ikev2 g^x 91 8a 04 5c 39 59 a1 c6 c7 13 9b 06 59 aa 49 26 | ikev2 g^x 58 66 03 6f a1 ee ab cf 66 8f 67 f8 d0 fc b3 18 | ikev2 g^x 94 eb b8 a7 2a a8 67 57 97 49 ca 42 b2 b5 7b d2 | ikev2 g^x 6e 59 f7 fc 58 0c e9 3b 1a b2 35 58 47 0e ce 90 | ikev2 g^x a5 dc 15 a0 5d 7e 82 46 b9 36 49 bb 5b 6e 43 bf | ikev2 g^x 1e 14 f0 70 04 11 dd c3 af 14 0d 1e 44 19 e8 dc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ee 23 8c 3a 20 c2 eb 31 90 b4 e3 3f 38 ea ba 83 | IKEv2 nonce 7e c0 b5 92 52 31 23 9c 2d 4d f8 74 94 8a 3c ad | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 00 c1 02 d2 ce 58 22 c3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 69 | natd_hash: port= 01 f4 | natd_hash: hash= 15 5a 78 4c 93 64 72 5c f7 62 e1 2c d0 64 cd 9a | natd_hash: hash= e4 f1 0f 34 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 15 5a 78 4c 93 64 72 5c f7 62 e1 2c d0 64 cd 9a | Notify data e4 f1 0f 34 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 00 c1 02 d2 ce 58 22 c3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f9 4f 20 e0 84 05 11 01 b8 04 b9 53 7d c7 40 89 | natd_hash: hash= a2 bc 5d 64 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f9 4f 20 e0 84 05 11 01 b8 04 b9 53 7d c7 40 89 | Notify data a2 bc 5d 64 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #700 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #700 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #700 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #700: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #700 to 4294967295 after switching state | Message ID: IKE #700 skipping update_recv as MD is fake | Message ID: sent #700 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-105" #700: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.105:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #700) | 00 c1 02 d2 ce 58 22 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 38 f6 d2 66 d7 37 75 8a f0 3e e3 b7 32 d6 41 | f5 9b 8f a2 62 4a c2 2b c9 04 e2 82 df 16 b1 e7 | 53 45 e9 b0 d2 33 ee 18 d1 c5 9a 70 cf 68 0f e5 | 32 d6 f3 5b 1e ba 36 1e 40 b2 2b 52 74 e4 c5 52 | da 47 f2 0c 1b a7 d1 57 3a 88 c8 c9 39 c5 dd 03 | 07 4e 94 a0 a1 1d 2c ea 30 74 62 8d 86 0a 47 96 | 6e 86 43 84 d1 9e 1d 48 ef 3c 77 aa 61 b1 d6 36 | b5 4d f7 2a 16 ea 31 f3 6f f0 30 8c 27 0f 36 c2 | 5a 32 4b 7a 99 fa 8a a2 52 1a 48 1a 84 31 7f d9 | a1 19 01 60 f3 03 bc b4 7e 3c f2 20 4b db 82 e3 | 91 8a 04 5c 39 59 a1 c6 c7 13 9b 06 59 aa 49 26 | 58 66 03 6f a1 ee ab cf 66 8f 67 f8 d0 fc b3 18 | 94 eb b8 a7 2a a8 67 57 97 49 ca 42 b2 b5 7b d2 | 6e 59 f7 fc 58 0c e9 3b 1a b2 35 58 47 0e ce 90 | a5 dc 15 a0 5d 7e 82 46 b9 36 49 bb 5b 6e 43 bf | 1e 14 f0 70 04 11 dd c3 af 14 0d 1e 44 19 e8 dc | 29 00 00 24 ee 23 8c 3a 20 c2 eb 31 90 b4 e3 3f | 38 ea ba 83 7e c0 b5 92 52 31 23 9c 2d 4d f8 74 | 94 8a 3c ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 5a 78 4c 93 64 72 5c f7 62 e1 2c | d0 64 cd 9a e4 f1 0f 34 00 00 00 1c 00 00 40 05 | f9 4f 20 e0 84 05 11 01 b8 04 b9 53 7d c7 40 89 | a2 bc 5d 64 | state #700 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380043300 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb380027d70 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368034dd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #700 | libevent_malloc: new ptr-libevent@0x7fb368064ab0 size 128 | #700 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.239616 | resume sending helper answer for #700 suppresed complete_v2_state_transition() and stole MD | #700 spent 0.469 milliseconds in resume sending helper answer | stop processing: state #700 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3640908e0 | processing resume sending helper answer for #707 | start processing: state #707 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 707 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #707 | **emit ISAKMP Message: | initiator cookie: | 6d 4e 2c b0 bf cf 55 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-212 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f9 9f d6 3e 98 b0 5f 73 4d ba b3 1d 62 98 ca 06 | ikev2 g^x dd 1e 98 88 ad 43 74 1b 2c 00 fd ed fc 05 58 84 | ikev2 g^x 27 da ca 10 63 1d 7f eb 9d 54 23 18 54 21 fb 77 | ikev2 g^x d0 11 3f 30 03 c7 bb 7b 6c 82 87 1e b2 c4 46 f5 | ikev2 g^x b9 75 85 86 87 c3 a0 25 db 07 f0 41 16 6b 87 67 | ikev2 g^x e8 54 09 98 f1 0a 76 80 fc ed 49 b8 84 22 18 a5 | ikev2 g^x 42 4a 4c 04 5d 3d 8e 7d 10 b9 03 9f 1f 7c 16 e2 | ikev2 g^x b0 5f 6c 5f c5 04 98 72 d0 8b 9d 1d 44 50 bd e3 | ikev2 g^x 32 b2 07 88 7a 5e 63 db 86 1b e1 1b 74 17 01 a7 | ikev2 g^x 1e e1 3a 02 f1 70 78 85 40 5a 51 fc d7 95 05 3c | ikev2 g^x cf 55 a3 5b 30 25 71 8a 68 40 5b 0b 8d cd e7 b1 | ikev2 g^x ed ec b5 28 b7 94 2b d4 3d d1 a5 be b7 54 c0 ea | ikev2 g^x b0 e9 b3 54 58 b9 5e 83 2e 20 37 1b a4 e8 3d 27 | ikev2 g^x 35 25 cf 41 31 d1 6b 1e 93 0a ad 4b b0 9d 1d 04 | ikev2 g^x 42 0a 80 11 8e 38 78 07 10 31 d4 fa 2a 6f d9 7e | ikev2 g^x c7 dc b2 d9 f7 11 7b c9 5d 8e 23 53 ed 2c 2f 94 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a4 fd 7e 3c 32 99 82 33 41 85 15 88 3f 09 19 10 | IKEv2 nonce 37 6d c6 9b 12 9c 73 58 6c cf 6f e0 ec d4 d1 27 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6d 4e 2c b0 bf cf 55 51 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d4 | natd_hash: port= 01 f4 | natd_hash: hash= c5 88 3f af 7f 85 3e a4 01 39 e4 62 4d 36 bd d2 | natd_hash: hash= 6a b8 ee 4c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c5 88 3f af 7f 85 3e a4 01 39 e4 62 4d 36 bd d2 | Notify data 6a b8 ee 4c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6d 4e 2c b0 bf cf 55 51 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 31 2c 50 3f 9f 2d 76 af 33 2c c6 2e 60 90 ae 40 | natd_hash: hash= 55 c4 27 3d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 31 2c 50 3f 9f 2d 76 af 33 2c c6 2e 60 90 ae 40 | Notify data 55 c4 27 3d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #707 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #707 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #707 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #707: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #707 to 4294967295 after switching state | Message ID: IKE #707 skipping update_recv as MD is fake | Message ID: sent #707 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-212" #707: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.212:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #707) | 6d 4e 2c b0 bf cf 55 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 9f d6 3e 98 b0 5f 73 4d ba b3 1d 62 98 ca 06 | dd 1e 98 88 ad 43 74 1b 2c 00 fd ed fc 05 58 84 | 27 da ca 10 63 1d 7f eb 9d 54 23 18 54 21 fb 77 | d0 11 3f 30 03 c7 bb 7b 6c 82 87 1e b2 c4 46 f5 | b9 75 85 86 87 c3 a0 25 db 07 f0 41 16 6b 87 67 | e8 54 09 98 f1 0a 76 80 fc ed 49 b8 84 22 18 a5 | 42 4a 4c 04 5d 3d 8e 7d 10 b9 03 9f 1f 7c 16 e2 | b0 5f 6c 5f c5 04 98 72 d0 8b 9d 1d 44 50 bd e3 | 32 b2 07 88 7a 5e 63 db 86 1b e1 1b 74 17 01 a7 | 1e e1 3a 02 f1 70 78 85 40 5a 51 fc d7 95 05 3c | cf 55 a3 5b 30 25 71 8a 68 40 5b 0b 8d cd e7 b1 | ed ec b5 28 b7 94 2b d4 3d d1 a5 be b7 54 c0 ea | b0 e9 b3 54 58 b9 5e 83 2e 20 37 1b a4 e8 3d 27 | 35 25 cf 41 31 d1 6b 1e 93 0a ad 4b b0 9d 1d 04 | 42 0a 80 11 8e 38 78 07 10 31 d4 fa 2a 6f d9 7e | c7 dc b2 d9 f7 11 7b c9 5d 8e 23 53 ed 2c 2f 94 | 29 00 00 24 a4 fd 7e 3c 32 99 82 33 41 85 15 88 | 3f 09 19 10 37 6d c6 9b 12 9c 73 58 6c cf 6f e0 | ec d4 d1 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 88 3f af 7f 85 3e a4 01 39 e4 62 | 4d 36 bd d2 6a b8 ee 4c 00 00 00 1c 00 00 40 05 | 31 2c 50 3f 9f 2d 76 af 33 2c c6 2e 60 90 ae 40 | 55 c4 27 3d | state #707 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3400094d0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb370018460 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #707 | libevent_malloc: new ptr-libevent@0x7fb3640908e0 size 128 | #707 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.24015 | resume sending helper answer for #707 suppresed complete_v2_state_transition() and stole MD | #707 spent 0.476 milliseconds in resume sending helper answer | stop processing: state #707 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c0292e0 | processing resume sending helper answer for #689 | start processing: state #689 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 689 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #689 | **emit ISAKMP Message: | initiator cookie: | 21 56 6d 63 c6 05 f9 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-74 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 01 41 94 ac c1 3b a7 91 84 87 0b a2 a6 2a 82 7c | ikev2 g^x 5e 57 2f 03 c9 50 17 da 1f 5e 13 47 67 fa 54 af | ikev2 g^x e1 23 cd 52 df c1 70 c5 84 49 39 0b c5 51 17 f4 | ikev2 g^x cd ae 0e 3a e4 ec 94 66 23 c9 e6 22 7e 29 fd 87 | ikev2 g^x 37 38 1c ba 2e c0 60 73 13 eb ed 91 72 d4 bf 43 | ikev2 g^x 0d 48 d2 56 0c 3e 10 c8 f6 a9 5e ca ed 70 78 7a | ikev2 g^x 2d 43 f8 86 71 ad ba a9 b9 a1 81 89 e4 be b1 13 | ikev2 g^x b3 4b e8 ac 5a 2b 85 9a 9a 62 39 e6 1a 55 c2 9a | ikev2 g^x ac ed 6f 11 df 6c a9 36 a9 00 2f 5c 57 3a b9 87 | ikev2 g^x 71 1f 36 18 9d 01 e1 48 c5 c3 af 45 89 3d 96 5f | ikev2 g^x cf f8 ab 91 0e aa d2 78 b3 52 d3 de be 97 7f cc | ikev2 g^x 22 0b ca 63 0a bf 49 dd ee 6f 9a 13 ec 7b 53 68 | ikev2 g^x e0 00 32 aa ec ee 18 65 94 77 ae fc 50 83 e0 b2 | ikev2 g^x 02 cd f1 17 f7 f0 40 67 a4 a9 46 1f 31 e5 bd 59 | ikev2 g^x 77 0b f3 a9 e9 64 9d 77 4a 66 04 24 1e 03 df a8 | ikev2 g^x 95 ea 8c 8a d2 17 91 f2 54 af 53 a6 c5 e9 b2 6f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2a 05 3d 7b 18 e9 5f 31 aa 45 2a 05 20 70 d9 99 | IKEv2 nonce 68 5a eb f1 da 1e dd 98 f0 5c e4 e4 18 70 b6 76 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 21 56 6d 63 c6 05 f9 0e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4a | natd_hash: port= 01 f4 | natd_hash: hash= 6b 08 c4 7c 53 4a 07 2c 37 8f cc 44 c1 c2 6f ad | natd_hash: hash= 52 2d df e3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6b 08 c4 7c 53 4a 07 2c 37 8f cc 44 c1 c2 6f ad | Notify data 52 2d df e3 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 21 56 6d 63 c6 05 f9 0e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 39 71 42 f9 c8 85 a0 ba 5e c8 87 85 6f 23 eb 57 | natd_hash: hash= 95 ba a1 9c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 39 71 42 f9 c8 85 a0 ba 5e c8 87 85 6f 23 eb 57 | Notify data 95 ba a1 9c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #689 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #689 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #689 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #689: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #689 to 4294967295 after switching state | Message ID: IKE #689 skipping update_recv as MD is fake | Message ID: sent #689 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-74" #689: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.74:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #689) | 21 56 6d 63 c6 05 f9 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 01 41 94 ac c1 3b a7 91 84 87 0b a2 a6 2a 82 7c | 5e 57 2f 03 c9 50 17 da 1f 5e 13 47 67 fa 54 af | e1 23 cd 52 df c1 70 c5 84 49 39 0b c5 51 17 f4 | cd ae 0e 3a e4 ec 94 66 23 c9 e6 22 7e 29 fd 87 | 37 38 1c ba 2e c0 60 73 13 eb ed 91 72 d4 bf 43 | 0d 48 d2 56 0c 3e 10 c8 f6 a9 5e ca ed 70 78 7a | 2d 43 f8 86 71 ad ba a9 b9 a1 81 89 e4 be b1 13 | b3 4b e8 ac 5a 2b 85 9a 9a 62 39 e6 1a 55 c2 9a | ac ed 6f 11 df 6c a9 36 a9 00 2f 5c 57 3a b9 87 | 71 1f 36 18 9d 01 e1 48 c5 c3 af 45 89 3d 96 5f | cf f8 ab 91 0e aa d2 78 b3 52 d3 de be 97 7f cc | 22 0b ca 63 0a bf 49 dd ee 6f 9a 13 ec 7b 53 68 | e0 00 32 aa ec ee 18 65 94 77 ae fc 50 83 e0 b2 | 02 cd f1 17 f7 f0 40 67 a4 a9 46 1f 31 e5 bd 59 | 77 0b f3 a9 e9 64 9d 77 4a 66 04 24 1e 03 df a8 | 95 ea 8c 8a d2 17 91 f2 54 af 53 a6 c5 e9 b2 6f | 29 00 00 24 2a 05 3d 7b 18 e9 5f 31 aa 45 2a 05 | 20 70 d9 99 68 5a eb f1 da 1e dd 98 f0 5c e4 e4 | 18 70 b6 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 08 c4 7c 53 4a 07 2c 37 8f cc 44 | c1 c2 6f ad 52 2d df e3 00 00 00 1c 00 00 40 05 | 39 71 42 f9 c8 85 a0 ba 5e c8 87 85 6f 23 eb 57 | 95 ba a1 9c | state #689 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb354035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb380002b20 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #689 | libevent_malloc: new ptr-libevent@0x7fb35c0292e0 size 128 | #689 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.240696 | resume sending helper answer for #689 suppresed complete_v2_state_transition() and stole MD | #689 spent 0.506 milliseconds in resume sending helper answer | stop processing: state #689 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c03e940 | processing resume sending helper answer for #702 | start processing: state #702 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 702 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #702 | **emit ISAKMP Message: | initiator cookie: | 15 f5 25 c3 13 f8 3e d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-198 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f7 23 22 6b 4e e1 f7 16 71 3f cc 94 ff 78 71 9d | ikev2 g^x 2b fa a2 70 c3 2e ae 8a 41 75 24 b2 5c bd de a7 | ikev2 g^x 23 08 94 3d 80 25 9b bb 30 e2 39 68 4c a8 e4 29 | ikev2 g^x 49 31 37 12 c5 eb 36 bd 19 63 9e bb 02 2e 79 f1 | ikev2 g^x d5 79 49 b4 68 b2 2f 57 ce ad b6 e5 93 ed 10 47 | ikev2 g^x c7 f4 e8 7e af a2 87 66 73 2b fe 02 35 20 50 f4 | ikev2 g^x 9f a5 ab b5 64 3f 58 fa 42 fa 9c 6c 95 59 e9 ce | ikev2 g^x 4a e5 f4 54 be d8 66 74 a2 a2 90 6f 88 07 da 7a | ikev2 g^x 49 4b 11 75 25 b5 a8 6e d3 e1 6d f6 61 26 a4 59 | ikev2 g^x c0 01 b5 a8 17 ba 1f 41 41 7b 34 f9 ae 03 0e 4a | ikev2 g^x 5b 82 0f 6f 4a f8 8e 71 36 c5 69 ca 74 e0 5b 22 | ikev2 g^x 74 fb e1 af 0d 04 d4 9e 58 0c 8b a5 0c bc aa 36 | ikev2 g^x 9b de 60 b8 6a 44 18 d6 e6 f7 1e 5f 4f 0f 2c ae | ikev2 g^x cb 0c 20 f0 15 5f 9d 76 45 13 42 ad ce b6 34 58 | ikev2 g^x 61 bf 65 e9 72 77 ab c8 67 23 c2 1d cb 5a b9 e9 | ikev2 g^x 79 63 d4 bb e2 75 dc 84 01 77 ec d7 11 39 db a3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 29 3f 45 8e 5c a6 8f 4f da f4 c3 d1 92 da 38 10 | IKEv2 nonce ed 30 75 5c 71 90 dd de 75 d0 e6 82 d2 61 a3 e3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 15 f5 25 c3 13 f8 3e d2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c6 | natd_hash: port= 01 f4 | natd_hash: hash= 3b d3 44 81 5f 32 17 86 65 0e fb e9 12 7b 72 5f | natd_hash: hash= d2 f6 d2 d1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3b d3 44 81 5f 32 17 86 65 0e fb e9 12 7b 72 5f | Notify data d2 f6 d2 d1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 15 f5 25 c3 13 f8 3e d2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 27 39 6b d9 0c ca bf 20 21 d1 a6 c3 cd c6 e3 21 | natd_hash: hash= 22 00 7c f2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 27 39 6b d9 0c ca bf 20 21 d1 a6 c3 cd c6 e3 21 | Notify data 22 00 7c f2 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #702 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #702 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #702 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #702: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #702 to 4294967295 after switching state | Message ID: IKE #702 skipping update_recv as MD is fake | Message ID: sent #702 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-198" #702: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.198:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #702) | 15 f5 25 c3 13 f8 3e d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f7 23 22 6b 4e e1 f7 16 71 3f cc 94 ff 78 71 9d | 2b fa a2 70 c3 2e ae 8a 41 75 24 b2 5c bd de a7 | 23 08 94 3d 80 25 9b bb 30 e2 39 68 4c a8 e4 29 | 49 31 37 12 c5 eb 36 bd 19 63 9e bb 02 2e 79 f1 | d5 79 49 b4 68 b2 2f 57 ce ad b6 e5 93 ed 10 47 | c7 f4 e8 7e af a2 87 66 73 2b fe 02 35 20 50 f4 | 9f a5 ab b5 64 3f 58 fa 42 fa 9c 6c 95 59 e9 ce | 4a e5 f4 54 be d8 66 74 a2 a2 90 6f 88 07 da 7a | 49 4b 11 75 25 b5 a8 6e d3 e1 6d f6 61 26 a4 59 | c0 01 b5 a8 17 ba 1f 41 41 7b 34 f9 ae 03 0e 4a | 5b 82 0f 6f 4a f8 8e 71 36 c5 69 ca 74 e0 5b 22 | 74 fb e1 af 0d 04 d4 9e 58 0c 8b a5 0c bc aa 36 | 9b de 60 b8 6a 44 18 d6 e6 f7 1e 5f 4f 0f 2c ae | cb 0c 20 f0 15 5f 9d 76 45 13 42 ad ce b6 34 58 | 61 bf 65 e9 72 77 ab c8 67 23 c2 1d cb 5a b9 e9 | 79 63 d4 bb e2 75 dc 84 01 77 ec d7 11 39 db a3 | 29 00 00 24 29 3f 45 8e 5c a6 8f 4f da f4 c3 d1 | 92 da 38 10 ed 30 75 5c 71 90 dd de 75 d0 e6 82 | d2 61 a3 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b d3 44 81 5f 32 17 86 65 0e fb e9 | 12 7b 72 5f d2 f6 d2 d1 00 00 00 1c 00 00 40 05 | 27 39 6b d9 0c ca bf 20 21 d1 a6 c3 cd c6 e3 21 | 22 00 7c f2 | state #702 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb368046040 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb368024000 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368024000 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #702 | libevent_malloc: new ptr-libevent@0x7fb37c03e940 size 128 | #702 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.241195 | resume sending helper answer for #702 suppresed complete_v2_state_transition() and stole MD | #702 spent 0.456 milliseconds in resume sending helper answer | stop processing: state #702 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c0813f0 | processing resume sending helper answer for #693 | start processing: state #693 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 693 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #693 | **emit ISAKMP Message: | initiator cookie: | 8c cd 5b 89 3d b1 c0 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-156 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 82 e2 11 fa f7 47 b1 84 25 8d b1 b9 cc 61 7a d1 | ikev2 g^x 10 c4 99 41 8a c2 39 41 fa f2 fd fe 2d 88 77 1c | ikev2 g^x 45 28 1f 19 11 cd 86 3b 21 90 05 0a 95 68 f9 b5 | ikev2 g^x 66 47 f0 fd f6 ed 91 51 a1 90 e5 3a 68 7d 44 49 | ikev2 g^x 52 7e 11 24 5b 36 2d 9e 45 cf d7 e0 d6 57 a2 7e | ikev2 g^x bf a1 9d 8b 04 a2 cc 30 fe 6f 9d 2d 07 7c c6 a9 | ikev2 g^x ac ec ed 97 f5 f4 d7 97 49 b2 0d 08 4f 28 26 b4 | ikev2 g^x af 6a 98 d7 60 90 49 c5 06 ed 93 e3 18 24 17 de | ikev2 g^x 76 59 7c 05 cb a5 83 81 c6 45 a9 36 d4 c9 e5 a7 | ikev2 g^x d0 88 64 07 2a 87 01 7c 25 df 11 ab 75 b4 6c 03 | ikev2 g^x 37 fb 6f 75 2d f8 ea 20 73 cf 0c cd ba 90 c2 2c | ikev2 g^x 01 10 39 d8 3c b3 37 5e 08 f0 10 c6 bd a5 ce c8 | ikev2 g^x 64 ae 6d 05 92 4e 98 ee d6 94 4c a1 e4 7c b1 13 | ikev2 g^x 3e 00 d0 8a 16 57 67 90 44 2b 00 cd 9b 43 89 4a | ikev2 g^x bd d3 f2 0a 53 1d d1 36 e1 24 9c 6e 9e aa 0f 7b | ikev2 g^x 30 f6 e4 b8 a4 c5 92 c8 e5 b2 55 72 6c 6f d9 28 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 14 85 11 ba f9 3b 72 6e cf bb f5 0a de 80 83 65 | IKEv2 nonce 33 0c 22 f8 ea ad 98 f3 8e 26 41 40 d7 cb 01 41 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8c cd 5b 89 3d b1 c0 87 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9c | natd_hash: port= 01 f4 | natd_hash: hash= 1e f4 9d 3b cc 7d 09 25 54 61 34 fd ae 72 6d c2 | natd_hash: hash= c2 0a 3b 62 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1e f4 9d 3b cc 7d 09 25 54 61 34 fd ae 72 6d c2 | Notify data c2 0a 3b 62 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8c cd 5b 89 3d b1 c0 87 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e8 a1 80 e7 3a b7 e7 08 64 9f b4 0b f3 c9 d4 c2 | natd_hash: hash= cb 3c 43 63 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e8 a1 80 e7 3a b7 e7 08 64 9f b4 0b f3 c9 d4 c2 | Notify data cb 3c 43 63 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #693 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #693 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #693 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #693: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #693 to 4294967295 after switching state | Message ID: IKE #693 skipping update_recv as MD is fake | Message ID: sent #693 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-156" #693: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.156:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #693) | 8c cd 5b 89 3d b1 c0 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 e2 11 fa f7 47 b1 84 25 8d b1 b9 cc 61 7a d1 | 10 c4 99 41 8a c2 39 41 fa f2 fd fe 2d 88 77 1c | 45 28 1f 19 11 cd 86 3b 21 90 05 0a 95 68 f9 b5 | 66 47 f0 fd f6 ed 91 51 a1 90 e5 3a 68 7d 44 49 | 52 7e 11 24 5b 36 2d 9e 45 cf d7 e0 d6 57 a2 7e | bf a1 9d 8b 04 a2 cc 30 fe 6f 9d 2d 07 7c c6 a9 | ac ec ed 97 f5 f4 d7 97 49 b2 0d 08 4f 28 26 b4 | af 6a 98 d7 60 90 49 c5 06 ed 93 e3 18 24 17 de | 76 59 7c 05 cb a5 83 81 c6 45 a9 36 d4 c9 e5 a7 | d0 88 64 07 2a 87 01 7c 25 df 11 ab 75 b4 6c 03 | 37 fb 6f 75 2d f8 ea 20 73 cf 0c cd ba 90 c2 2c | 01 10 39 d8 3c b3 37 5e 08 f0 10 c6 bd a5 ce c8 | 64 ae 6d 05 92 4e 98 ee d6 94 4c a1 e4 7c b1 13 | 3e 00 d0 8a 16 57 67 90 44 2b 00 cd 9b 43 89 4a | bd d3 f2 0a 53 1d d1 36 e1 24 9c 6e 9e aa 0f 7b | 30 f6 e4 b8 a4 c5 92 c8 e5 b2 55 72 6c 6f d9 28 | 29 00 00 24 14 85 11 ba f9 3b 72 6e cf bb f5 0a | de 80 83 65 33 0c 22 f8 ea ad 98 f3 8e 26 41 40 | d7 cb 01 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e f4 9d 3b cc 7d 09 25 54 61 34 fd | ae 72 6d c2 c2 0a 3b 62 00 00 00 1c 00 00 40 05 | e8 a1 80 e7 3a b7 e7 08 64 9f b4 0b f3 c9 d4 c2 | cb 3c 43 63 | state #693 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb358012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35800d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #693 | libevent_malloc: new ptr-libevent@0x7fb37c0813f0 size 128 | #693 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.241687 | resume sending helper answer for #693 suppresed complete_v2_state_transition() and stole MD | #693 spent 0.453 milliseconds in resume sending helper answer | stop processing: state #693 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34006c3b0 | processing resume sending helper answer for #676 | start processing: state #676 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 676 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #676 | **emit ISAKMP Message: | initiator cookie: | 9b 3e ad 4d 72 f4 8b db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-97 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0e 3a fb 7f 58 e3 6d 62 ec 1e 2e 59 c4 32 70 90 | ikev2 g^x 18 12 b4 1d 0b 7a db 79 5b 5b f1 b3 ae 64 53 67 | ikev2 g^x 1a 61 39 5c 66 bf 33 12 e2 07 ee a6 22 5b c8 f1 | ikev2 g^x db 9f 71 60 29 05 1a c7 13 3e 19 22 f4 45 96 09 | ikev2 g^x 3e 1a 53 a5 6e fa ef cb 17 c0 79 5f 39 35 36 4a | ikev2 g^x 56 04 cc 65 b5 06 e3 4b 77 47 11 f6 68 ce 50 3d | ikev2 g^x c0 ba c5 64 4c ea 38 bc 6c 58 32 32 f6 68 41 7e | ikev2 g^x 54 0c c5 6f 06 e5 8f 9b 5d 2e 9f ca 8f 21 e6 f2 | ikev2 g^x 57 64 49 31 d2 36 51 23 ef 32 7b fc e1 c9 40 d8 | ikev2 g^x 83 9f 51 20 e7 a6 c5 57 1c 3e d9 70 f7 a6 d6 01 | ikev2 g^x e3 11 c3 e6 40 27 44 77 36 6c e6 51 a9 4a 34 de | ikev2 g^x ef 68 86 37 6d 3f b8 f2 d1 61 ec 73 99 06 ca 4d | ikev2 g^x 7c 67 1d 21 d8 21 73 af 9e 16 de 97 5d dc 6c 4e | ikev2 g^x f2 c8 de e8 d8 33 7c b9 e3 29 55 17 7b 29 87 79 | ikev2 g^x 3f 1c d3 24 71 d6 95 25 f2 de f6 b8 4e fa c5 5e | ikev2 g^x 38 62 28 cc 5d 35 7d 8a 00 7d 42 e6 36 56 c3 6d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 50 ed 7c 96 0e 66 f7 85 bf de 64 30 8b f8 90 bb | IKEv2 nonce b7 61 8d 4c 88 80 57 a3 f9 36 fa 84 96 9e 05 56 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9b 3e ad 4d 72 f4 8b db | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 61 | natd_hash: port= 01 f4 | natd_hash: hash= e7 b4 72 7b 99 d0 96 09 97 fc e4 db 63 69 04 c8 | natd_hash: hash= 69 8e b3 ef | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e7 b4 72 7b 99 d0 96 09 97 fc e4 db 63 69 04 c8 | Notify data 69 8e b3 ef | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9b 3e ad 4d 72 f4 8b db | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9a 7a 34 f9 3d 74 af 91 e2 55 3d 5a 9c b9 26 70 | natd_hash: hash= 97 7c a3 48 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9a 7a 34 f9 3d 74 af 91 e2 55 3d 5a 9c b9 26 70 | Notify data 97 7c a3 48 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #676 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #676 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #676 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #676: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #676 to 4294967295 after switching state | Message ID: IKE #676 skipping update_recv as MD is fake | Message ID: sent #676 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-97" #676: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.97:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #676) | 9b 3e ad 4d 72 f4 8b db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 3a fb 7f 58 e3 6d 62 ec 1e 2e 59 c4 32 70 90 | 18 12 b4 1d 0b 7a db 79 5b 5b f1 b3 ae 64 53 67 | 1a 61 39 5c 66 bf 33 12 e2 07 ee a6 22 5b c8 f1 | db 9f 71 60 29 05 1a c7 13 3e 19 22 f4 45 96 09 | 3e 1a 53 a5 6e fa ef cb 17 c0 79 5f 39 35 36 4a | 56 04 cc 65 b5 06 e3 4b 77 47 11 f6 68 ce 50 3d | c0 ba c5 64 4c ea 38 bc 6c 58 32 32 f6 68 41 7e | 54 0c c5 6f 06 e5 8f 9b 5d 2e 9f ca 8f 21 e6 f2 | 57 64 49 31 d2 36 51 23 ef 32 7b fc e1 c9 40 d8 | 83 9f 51 20 e7 a6 c5 57 1c 3e d9 70 f7 a6 d6 01 | e3 11 c3 e6 40 27 44 77 36 6c e6 51 a9 4a 34 de | ef 68 86 37 6d 3f b8 f2 d1 61 ec 73 99 06 ca 4d | 7c 67 1d 21 d8 21 73 af 9e 16 de 97 5d dc 6c 4e | f2 c8 de e8 d8 33 7c b9 e3 29 55 17 7b 29 87 79 | 3f 1c d3 24 71 d6 95 25 f2 de f6 b8 4e fa c5 5e | 38 62 28 cc 5d 35 7d 8a 00 7d 42 e6 36 56 c3 6d | 29 00 00 24 50 ed 7c 96 0e 66 f7 85 bf de 64 30 | 8b f8 90 bb b7 61 8d 4c 88 80 57 a3 f9 36 fa 84 | 96 9e 05 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 b4 72 7b 99 d0 96 09 97 fc e4 db | 63 69 04 c8 69 8e b3 ef 00 00 00 1c 00 00 40 05 | 9a 7a 34 f9 3d 74 af 91 e2 55 3d 5a 9c b9 26 70 | 97 7c a3 48 | state #676 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c04b970 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c012630 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012630 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #676 | libevent_malloc: new ptr-libevent@0x7fb34006c3b0 size 128 | #676 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.242192 | resume sending helper answer for #676 suppresed complete_v2_state_transition() and stole MD | #676 spent 0.461 milliseconds in resume sending helper answer | stop processing: state #676 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3500882b0 | processing resume sending helper answer for #692 | start processing: state #692 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 692 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #692 | **emit ISAKMP Message: | initiator cookie: | cc 18 05 4d c7 59 29 89 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-109 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 89 bc 56 c0 b5 d7 1a 19 67 cf 61 47 cf cf cf 69 | ikev2 g^x 0c 5a 9f 01 32 78 de 71 f0 74 81 19 ed 71 d9 b7 | ikev2 g^x 6c 1a 14 67 77 21 31 19 27 f8 20 2e 9b 72 8d e0 | ikev2 g^x fb c3 78 0b 20 93 f6 09 52 76 69 39 6e ac 7c 06 | ikev2 g^x 40 27 58 9f 6d bb 6d 84 cb 61 8e 0f d8 d3 36 d2 | ikev2 g^x ed b2 8a 88 8f 6f f0 1e 1b d7 5a 1c 7d 7e 95 ba | ikev2 g^x 9a dd 6e 5a bb 30 97 01 78 90 d0 34 e6 bb f7 4a | ikev2 g^x 36 d6 7a 11 b8 51 c6 68 c3 31 ea af 66 a8 39 16 | ikev2 g^x 34 04 5f b3 7f 60 a0 eb de 43 b9 ad eb 2c 3a 9e | ikev2 g^x 0e ac 2d 97 3b 24 b1 8f cc 8a 22 51 8c d9 7c 8f | ikev2 g^x 5c bd 64 59 9e 2e 51 e2 19 ad d8 1d 4d 34 4c 24 | ikev2 g^x 22 63 7c ba af a3 27 18 d1 02 9a b0 98 c3 d7 57 | ikev2 g^x 32 dd b6 b7 23 c1 5f 8d ea 84 1f 15 18 04 2a a7 | ikev2 g^x 93 9c 7d f3 d9 4e af b7 ec 8d 2d b2 4a 62 49 e5 | ikev2 g^x 24 51 62 9e 81 79 94 0d 40 f4 e7 84 ba 20 8a 12 | ikev2 g^x 56 3d 86 3c a8 88 5d 08 d2 a2 6b 92 78 f3 25 d4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e1 fc f7 b6 dc b1 8e c8 89 6e ca 67 c4 89 7d 5a | IKEv2 nonce 55 53 f0 73 1a cf eb a7 39 4d 69 f9 f9 7d fe a7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cc 18 05 4d c7 59 29 89 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6d | natd_hash: port= 01 f4 | natd_hash: hash= 7c 62 99 77 fb 76 f7 56 4f 5d 6c 0a a8 89 cf ee | natd_hash: hash= 73 3a 0b 7a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7c 62 99 77 fb 76 f7 56 4f 5d 6c 0a a8 89 cf ee | Notify data 73 3a 0b 7a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cc 18 05 4d c7 59 29 89 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= da 92 6d 9e 8e f1 6a c7 a9 e0 f9 23 03 35 37 00 | natd_hash: hash= ea 8a 41 05 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data da 92 6d 9e 8e f1 6a c7 a9 e0 f9 23 03 35 37 00 | Notify data ea 8a 41 05 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #692 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #692 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #692 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #692: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #692 to 4294967295 after switching state | Message ID: IKE #692 skipping update_recv as MD is fake | Message ID: sent #692 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-109" #692: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.109:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #692) | cc 18 05 4d c7 59 29 89 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 bc 56 c0 b5 d7 1a 19 67 cf 61 47 cf cf cf 69 | 0c 5a 9f 01 32 78 de 71 f0 74 81 19 ed 71 d9 b7 | 6c 1a 14 67 77 21 31 19 27 f8 20 2e 9b 72 8d e0 | fb c3 78 0b 20 93 f6 09 52 76 69 39 6e ac 7c 06 | 40 27 58 9f 6d bb 6d 84 cb 61 8e 0f d8 d3 36 d2 | ed b2 8a 88 8f 6f f0 1e 1b d7 5a 1c 7d 7e 95 ba | 9a dd 6e 5a bb 30 97 01 78 90 d0 34 e6 bb f7 4a | 36 d6 7a 11 b8 51 c6 68 c3 31 ea af 66 a8 39 16 | 34 04 5f b3 7f 60 a0 eb de 43 b9 ad eb 2c 3a 9e | 0e ac 2d 97 3b 24 b1 8f cc 8a 22 51 8c d9 7c 8f | 5c bd 64 59 9e 2e 51 e2 19 ad d8 1d 4d 34 4c 24 | 22 63 7c ba af a3 27 18 d1 02 9a b0 98 c3 d7 57 | 32 dd b6 b7 23 c1 5f 8d ea 84 1f 15 18 04 2a a7 | 93 9c 7d f3 d9 4e af b7 ec 8d 2d b2 4a 62 49 e5 | 24 51 62 9e 81 79 94 0d 40 f4 e7 84 ba 20 8a 12 | 56 3d 86 3c a8 88 5d 08 d2 a2 6b 92 78 f3 25 d4 | 29 00 00 24 e1 fc f7 b6 dc b1 8e c8 89 6e ca 67 | c4 89 7d 5a 55 53 f0 73 1a cf eb a7 39 4d 69 f9 | f9 7d fe a7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7c 62 99 77 fb 76 f7 56 4f 5d 6c 0a | a8 89 cf ee 73 3a 0b 7a 00 00 00 1c 00 00 40 05 | da 92 6d 9e 8e f1 6a c7 a9 e0 f9 23 03 35 37 00 | ea 8a 41 05 | state #692 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb360046040 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b06800 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b06800 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #692 | libevent_malloc: new ptr-libevent@0x7fb3500882b0 size 128 | #692 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.242682 | resume sending helper answer for #692 suppresed complete_v2_state_transition() and stole MD | #692 spent 0.451 milliseconds in resume sending helper answer | stop processing: state #692 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35407a740 | processing resume sending helper answer for #701 | start processing: state #701 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 701 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #701 | **emit ISAKMP Message: | initiator cookie: | 68 ad 39 62 89 bc a6 af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-203 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a9 e0 68 21 de 01 f2 63 62 9a 39 6d 52 af 4b 2d | ikev2 g^x b4 c9 33 56 eb d2 8c 9f ba 59 3a e9 d6 15 7b 7f | ikev2 g^x b8 2e a0 53 fc ae 44 73 e4 45 e3 47 76 a0 22 f6 | ikev2 g^x 14 d0 eb 76 9d 9e 8c 73 ad 3a d7 a8 0e 86 fd 08 | ikev2 g^x 39 c2 76 22 26 07 a7 7e 54 4b d3 f9 34 75 0e c8 | ikev2 g^x 7b 0c 57 fe a5 45 d0 5d 95 94 e2 38 22 7a a4 06 | ikev2 g^x df d7 de 2d 77 d0 62 ec 16 53 18 2e d5 6e 85 3e | ikev2 g^x 9a 44 d4 b5 c9 d7 25 7d 2e 03 d4 fe 50 40 bf 29 | ikev2 g^x f9 da 48 d3 d1 54 1b fe c7 56 87 44 3a 32 7c e0 | ikev2 g^x 5f c5 77 06 8a 05 ef 24 26 bb 7f 33 c5 e9 33 9d | ikev2 g^x a6 cb b0 d2 28 37 19 18 8d 43 4e ce 15 f7 37 9c | ikev2 g^x 6e 46 8e 96 3c 83 cf af 07 cd e9 21 87 3c e8 1c | ikev2 g^x ef ad f0 27 43 77 59 ca 24 3f 93 f9 80 0d 29 96 | ikev2 g^x fc 19 52 7b ce 8d b5 b1 4e 70 76 37 e9 52 61 3e | ikev2 g^x bf 51 35 68 4a 0c b7 29 d7 35 86 dc a6 18 d3 f4 | ikev2 g^x 7b 66 33 c1 28 ff 4b b0 99 bc 28 5a 64 81 7b df | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 88 87 4e bd b4 de bb 6d c9 c8 4e a7 a4 cc 00 9f | IKEv2 nonce 8b 0d 61 d8 a0 b2 27 29 2d 61 32 16 d2 33 a2 36 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 68 ad 39 62 89 bc a6 af | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 cb | natd_hash: port= 01 f4 | natd_hash: hash= 9d a9 8d a4 1c 7e 43 26 3d 83 d5 d2 9e 52 9b c6 | natd_hash: hash= 6d b3 48 31 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9d a9 8d a4 1c 7e 43 26 3d 83 d5 d2 9e 52 9b c6 | Notify data 6d b3 48 31 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 68 ad 39 62 89 bc a6 af | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= dc c2 86 b8 21 a6 32 d2 32 e6 c3 81 d9 7b 5e 50 | natd_hash: hash= bf 6c b1 ec | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dc c2 86 b8 21 a6 32 d2 32 e6 c3 81 d9 7b 5e 50 | Notify data bf 6c b1 ec | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #701 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #701 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #701 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #701: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #701 to 4294967295 after switching state | Message ID: IKE #701 skipping update_recv as MD is fake | Message ID: sent #701 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-203" #701: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.203:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #701) | 68 ad 39 62 89 bc a6 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a9 e0 68 21 de 01 f2 63 62 9a 39 6d 52 af 4b 2d | b4 c9 33 56 eb d2 8c 9f ba 59 3a e9 d6 15 7b 7f | b8 2e a0 53 fc ae 44 73 e4 45 e3 47 76 a0 22 f6 | 14 d0 eb 76 9d 9e 8c 73 ad 3a d7 a8 0e 86 fd 08 | 39 c2 76 22 26 07 a7 7e 54 4b d3 f9 34 75 0e c8 | 7b 0c 57 fe a5 45 d0 5d 95 94 e2 38 22 7a a4 06 | df d7 de 2d 77 d0 62 ec 16 53 18 2e d5 6e 85 3e | 9a 44 d4 b5 c9 d7 25 7d 2e 03 d4 fe 50 40 bf 29 | f9 da 48 d3 d1 54 1b fe c7 56 87 44 3a 32 7c e0 | 5f c5 77 06 8a 05 ef 24 26 bb 7f 33 c5 e9 33 9d | a6 cb b0 d2 28 37 19 18 8d 43 4e ce 15 f7 37 9c | 6e 46 8e 96 3c 83 cf af 07 cd e9 21 87 3c e8 1c | ef ad f0 27 43 77 59 ca 24 3f 93 f9 80 0d 29 96 | fc 19 52 7b ce 8d b5 b1 4e 70 76 37 e9 52 61 3e | bf 51 35 68 4a 0c b7 29 d7 35 86 dc a6 18 d3 f4 | 7b 66 33 c1 28 ff 4b b0 99 bc 28 5a 64 81 7b df | 29 00 00 24 88 87 4e bd b4 de bb 6d c9 c8 4e a7 | a4 cc 00 9f 8b 0d 61 d8 a0 b2 27 29 2d 61 32 16 | d2 33 a2 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d a9 8d a4 1c 7e 43 26 3d 83 d5 d2 | 9e 52 9b c6 6d b3 48 31 00 00 00 1c 00 00 40 05 | dc c2 86 b8 21 a6 32 d2 32 e6 c3 81 d9 7b 5e 50 | bf 6c b1 ec | state #701 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3840266d0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb38400feb0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400feb0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #701 | libevent_malloc: new ptr-libevent@0x7fb35407a740 size 128 | #701 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.243162 | resume sending helper answer for #701 suppresed complete_v2_state_transition() and stole MD | #701 spent 0.444 milliseconds in resume sending helper answer | stop processing: state #701 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c07bc30 | processing resume sending helper answer for #668 | start processing: state #668 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 668 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #668 | **emit ISAKMP Message: | initiator cookie: | 69 d8 43 4c ca 0f 15 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-110 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 41 d2 79 13 fa 3a 8f cb d5 3a 12 ff c1 bd 72 dd | ikev2 g^x ec 4a 69 1d f5 bf 64 dc 82 8e 85 c8 60 0f 31 b8 | ikev2 g^x 2a b5 99 5e 2e db 16 88 62 d0 a8 a0 e7 ed 8c 22 | ikev2 g^x 9b 22 dd 67 cf 53 b2 41 57 e0 6d 62 0b ae a9 e2 | ikev2 g^x a4 33 ef 81 fd 1e 99 10 3c 05 f1 b1 63 cd 1d 4c | ikev2 g^x 81 83 e9 17 13 bb 86 a3 f8 34 d0 be b4 67 f9 24 | ikev2 g^x 19 c5 94 10 ae 8f 69 b3 cd cc d3 2f 95 57 65 09 | ikev2 g^x 5a 47 e0 ce 39 9e ff 8b 27 cb 00 b1 06 c2 96 f3 | ikev2 g^x 87 01 78 7b 55 94 56 97 f0 1a b4 de 45 49 99 29 | ikev2 g^x 41 cb ee bd 0c bf fe c2 39 91 19 f8 ca 82 eb 04 | ikev2 g^x 9b 78 1c 89 01 44 b7 86 45 f1 a7 24 c6 c7 c9 55 | ikev2 g^x 95 6b c2 87 ae 27 a5 78 aa 04 30 8d d9 4e 9d 41 | ikev2 g^x 61 6c de ff f0 c9 f3 64 d3 6c da 3f e7 7d a5 7a | ikev2 g^x cb 07 a2 96 df 94 f1 bf fc cf 2f 7d 5e 6d 6f 1b | ikev2 g^x 83 aa 52 10 ad c1 b7 85 95 a6 c3 93 b1 03 49 41 | ikev2 g^x 3e a1 3a 94 67 5a f2 ab 4f 45 a4 3f 47 2b ce 53 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8b 75 29 44 a0 34 83 1a bc d3 07 46 1a 97 11 01 | IKEv2 nonce 01 9b c6 7d 43 08 5a 1e e3 e6 55 93 99 2b d6 00 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 69 d8 43 4c ca 0f 15 18 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6e | natd_hash: port= 01 f4 | natd_hash: hash= 86 9b 57 88 6a 86 10 db 30 73 b0 26 55 1c 17 3c | natd_hash: hash= 26 62 fc 8d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 86 9b 57 88 6a 86 10 db 30 73 b0 26 55 1c 17 3c | Notify data 26 62 fc 8d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 69 d8 43 4c ca 0f 15 18 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6f 2b 74 b2 0a ff ff 57 56 7c 59 c9 0b 6f 36 1d | natd_hash: hash= 69 a9 e2 f6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6f 2b 74 b2 0a ff ff 57 56 7c 59 c9 0b 6f 36 1d | Notify data 69 a9 e2 f6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #668 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #668 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #668 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #668: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #668 to 4294967295 after switching state | Message ID: IKE #668 skipping update_recv as MD is fake | Message ID: sent #668 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-110" #668: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.110:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #668) | 69 d8 43 4c ca 0f 15 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 41 d2 79 13 fa 3a 8f cb d5 3a 12 ff c1 bd 72 dd | ec 4a 69 1d f5 bf 64 dc 82 8e 85 c8 60 0f 31 b8 | 2a b5 99 5e 2e db 16 88 62 d0 a8 a0 e7 ed 8c 22 | 9b 22 dd 67 cf 53 b2 41 57 e0 6d 62 0b ae a9 e2 | a4 33 ef 81 fd 1e 99 10 3c 05 f1 b1 63 cd 1d 4c | 81 83 e9 17 13 bb 86 a3 f8 34 d0 be b4 67 f9 24 | 19 c5 94 10 ae 8f 69 b3 cd cc d3 2f 95 57 65 09 | 5a 47 e0 ce 39 9e ff 8b 27 cb 00 b1 06 c2 96 f3 | 87 01 78 7b 55 94 56 97 f0 1a b4 de 45 49 99 29 | 41 cb ee bd 0c bf fe c2 39 91 19 f8 ca 82 eb 04 | 9b 78 1c 89 01 44 b7 86 45 f1 a7 24 c6 c7 c9 55 | 95 6b c2 87 ae 27 a5 78 aa 04 30 8d d9 4e 9d 41 | 61 6c de ff f0 c9 f3 64 d3 6c da 3f e7 7d a5 7a | cb 07 a2 96 df 94 f1 bf fc cf 2f 7d 5e 6d 6f 1b | 83 aa 52 10 ad c1 b7 85 95 a6 c3 93 b1 03 49 41 | 3e a1 3a 94 67 5a f2 ab 4f 45 a4 3f 47 2b ce 53 | 29 00 00 24 8b 75 29 44 a0 34 83 1a bc d3 07 46 | 1a 97 11 01 01 9b c6 7d 43 08 5a 1e e3 e6 55 93 | 99 2b d6 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 9b 57 88 6a 86 10 db 30 73 b0 26 | 55 1c 17 3c 26 62 fc 8d 00 00 00 1c 00 00 40 05 | 6f 2b 74 b2 0a ff ff 57 56 7c 59 c9 0b 6f 36 1d | 69 a9 e2 f6 | state #668 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c03f570 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34c00cc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #668 | libevent_malloc: new ptr-libevent@0x7fb37c07bc30 size 128 | #668 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.243631 | resume sending helper answer for #668 suppresed complete_v2_state_transition() and stole MD | #668 spent 0.438 milliseconds in resume sending helper answer | stop processing: state #668 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36407a960 | processing resume sending helper answer for #674 | start processing: state #674 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 674 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #674 | **emit ISAKMP Message: | initiator cookie: | c4 c6 34 70 7c 35 e5 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-124 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8a bc 91 62 ee 2e 6d a2 96 c5 30 6d 1f 92 ed b7 | ikev2 g^x 36 56 8d b5 b9 4e e7 b6 33 c3 4c 5c dd d6 f4 99 | ikev2 g^x 88 c9 81 6d f6 b8 fb 84 e7 0a 5b 99 69 b8 6b 63 | ikev2 g^x 7a 47 28 12 93 aa 96 26 97 8f ff b9 54 0d 01 18 | ikev2 g^x 0b 01 9c b3 8f e0 95 e3 e1 9d 26 36 23 71 6c dc | ikev2 g^x 67 79 37 64 c4 24 a4 8b 9a 37 fa 7c fe 2e 7b 4e | ikev2 g^x 1a d6 c0 1d f0 ba 43 6c c9 02 6f 4f 9f c0 dd 79 | ikev2 g^x 3d 4a c7 9a 21 b7 1e b6 9d 90 fd 88 56 63 07 44 | ikev2 g^x 2e 81 d0 20 01 0b f4 e9 81 1c 3c 49 3e 91 bf 96 | ikev2 g^x a8 41 f1 e1 4c b6 83 f0 23 56 56 ad 6c 9d 70 82 | ikev2 g^x c4 41 64 86 d0 59 a6 a1 c7 b9 ee bc 84 09 46 41 | ikev2 g^x ec ae 2a 69 5c 40 a2 14 21 11 a1 b8 60 07 45 17 | ikev2 g^x 11 d0 1b 33 f1 93 91 61 7c 42 1b f1 6c bf d3 4c | ikev2 g^x 23 c1 b7 fe 96 eb 71 68 e8 19 04 8e 6f cb bd 87 | ikev2 g^x 40 31 f1 46 3f 4f 53 d3 a5 41 35 6c 1a eb f1 20 | ikev2 g^x da d9 d7 75 6a 41 10 84 60 5b cd 6c 15 bb 13 b1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5c 59 fc 58 f4 7f 35 a7 c0 cf f0 29 1a 0b a6 f7 | IKEv2 nonce cf a4 ea bd 59 bd c7 ac 64 c5 cf 21 ff 47 b8 cf | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c4 c6 34 70 7c 35 e5 1e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7c | natd_hash: port= 01 f4 | natd_hash: hash= 49 d6 82 49 46 9b e1 ef 78 a9 24 e2 b6 c7 14 d6 | natd_hash: hash= 61 e8 82 0a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 49 d6 82 49 46 9b e1 ef 78 a9 24 e2 b6 c7 14 d6 | Notify data 61 e8 82 0a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c4 c6 34 70 7c 35 e5 1e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f5 e0 05 f9 c1 de b5 2f 1e 75 ed d6 26 ed d6 71 | natd_hash: hash= 2a 1b 30 01 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f5 e0 05 f9 c1 de b5 2f 1e 75 ed d6 26 ed d6 71 | Notify data 2a 1b 30 01 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #674 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #674 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #674 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #674: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #674 to 4294967295 after switching state | Message ID: IKE #674 skipping update_recv as MD is fake | Message ID: sent #674 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-124" #674: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.124:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #674) | c4 c6 34 70 7c 35 e5 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a bc 91 62 ee 2e 6d a2 96 c5 30 6d 1f 92 ed b7 | 36 56 8d b5 b9 4e e7 b6 33 c3 4c 5c dd d6 f4 99 | 88 c9 81 6d f6 b8 fb 84 e7 0a 5b 99 69 b8 6b 63 | 7a 47 28 12 93 aa 96 26 97 8f ff b9 54 0d 01 18 | 0b 01 9c b3 8f e0 95 e3 e1 9d 26 36 23 71 6c dc | 67 79 37 64 c4 24 a4 8b 9a 37 fa 7c fe 2e 7b 4e | 1a d6 c0 1d f0 ba 43 6c c9 02 6f 4f 9f c0 dd 79 | 3d 4a c7 9a 21 b7 1e b6 9d 90 fd 88 56 63 07 44 | 2e 81 d0 20 01 0b f4 e9 81 1c 3c 49 3e 91 bf 96 | a8 41 f1 e1 4c b6 83 f0 23 56 56 ad 6c 9d 70 82 | c4 41 64 86 d0 59 a6 a1 c7 b9 ee bc 84 09 46 41 | ec ae 2a 69 5c 40 a2 14 21 11 a1 b8 60 07 45 17 | 11 d0 1b 33 f1 93 91 61 7c 42 1b f1 6c bf d3 4c | 23 c1 b7 fe 96 eb 71 68 e8 19 04 8e 6f cb bd 87 | 40 31 f1 46 3f 4f 53 d3 a5 41 35 6c 1a eb f1 20 | da d9 d7 75 6a 41 10 84 60 5b cd 6c 15 bb 13 b1 | 29 00 00 24 5c 59 fc 58 f4 7f 35 a7 c0 cf f0 29 | 1a 0b a6 f7 cf a4 ea bd 59 bd c7 ac 64 c5 cf 21 | ff 47 b8 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 49 d6 82 49 46 9b e1 ef 78 a9 24 e2 | b6 c7 14 d6 61 e8 82 0a 00 00 00 1c 00 00 40 05 | f5 e0 05 f9 c1 de b5 2f 1e 75 ed d6 26 ed d6 71 | 2a 1b 30 01 | state #674 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36003f3e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36001a530 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36001a530 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #674 | libevent_malloc: new ptr-libevent@0x7fb36407a960 size 128 | #674 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.24411 | resume sending helper answer for #674 suppresed complete_v2_state_transition() and stole MD | #674 spent 0.441 milliseconds in resume sending helper answer | stop processing: state #674 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3880805f0 | processing resume sending helper answer for #661 | start processing: state #661 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 661 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #661 | **emit ISAKMP Message: | initiator cookie: | be 95 5c 7b 40 76 8c 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-154 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1f ba ef 56 b8 99 c9 26 b1 07 42 76 09 76 7a 27 | ikev2 g^x 91 a0 41 2b a0 70 93 15 d8 a7 50 fe fc 23 ab 2e | ikev2 g^x a7 36 40 0e 91 38 15 2b 47 d9 88 bf 5c 3a f7 3a | ikev2 g^x b4 a0 b6 a8 c9 29 be 63 86 bd a0 c9 b5 5a 74 81 | ikev2 g^x 42 05 2c e3 63 22 b0 ab 60 c9 91 06 1a ae 70 20 | ikev2 g^x 27 d6 ef fd c0 2f 69 26 17 d1 9e c7 27 24 17 a8 | ikev2 g^x 24 d5 65 3b 9d f2 8c bf b0 68 e5 fe eb 23 a6 60 | ikev2 g^x 73 bb 2c 27 f0 6f 99 ad 46 65 56 ab e0 3b 17 ec | ikev2 g^x 9b 9d ea 8e 8a f2 38 63 83 4a 06 e3 25 cb 1e f9 | ikev2 g^x dc 65 77 ef d0 4a 78 7b 20 56 68 95 c5 c6 26 b7 | ikev2 g^x 22 1a 94 be 24 6f df 64 3f 4c a0 9e 67 50 56 a5 | ikev2 g^x ff de 53 8d 33 a9 a8 0c 5c 5c f2 d7 59 a4 9b b5 | ikev2 g^x ea 88 33 be 31 ed e9 57 b6 13 a2 64 ea cd 03 7a | ikev2 g^x c1 10 e4 c2 97 9a da b1 7b a7 87 15 5b 07 98 84 | ikev2 g^x 7d 87 44 3a 69 2f dc 0c 9d 8a 59 b1 b8 cc a6 60 | ikev2 g^x ec 16 5f 47 d6 09 63 e3 f1 2c 11 ea 7a f9 7f cb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 22 90 73 7f 5c d6 51 86 23 a3 e4 fd 8f 56 6e 8b | IKEv2 nonce 75 d3 87 48 a5 61 18 f5 b1 fb d3 9a 2f 6b 23 26 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= be 95 5c 7b 40 76 8c 10 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9a | natd_hash: port= 01 f4 | natd_hash: hash= 6e 83 26 d5 67 d9 f3 fc 4f ff fa 52 66 7f 8e ec | natd_hash: hash= fb ca 45 a0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6e 83 26 d5 67 d9 f3 fc 4f ff fa 52 66 7f 8e ec | Notify data fb ca 45 a0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= be 95 5c 7b 40 76 8c 10 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d1 0b 7b 8d 87 6a e6 ee 1b bd 92 49 cc 1a ec 1c | natd_hash: hash= a9 25 6e 8a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d1 0b 7b 8d 87 6a e6 ee 1b bd 92 49 cc 1a ec 1c | Notify data a9 25 6e 8a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #661 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #661 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #661 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #661: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #661 to 4294967295 after switching state | Message ID: IKE #661 skipping update_recv as MD is fake | Message ID: sent #661 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-154" #661: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.154:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #661) | be 95 5c 7b 40 76 8c 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f ba ef 56 b8 99 c9 26 b1 07 42 76 09 76 7a 27 | 91 a0 41 2b a0 70 93 15 d8 a7 50 fe fc 23 ab 2e | a7 36 40 0e 91 38 15 2b 47 d9 88 bf 5c 3a f7 3a | b4 a0 b6 a8 c9 29 be 63 86 bd a0 c9 b5 5a 74 81 | 42 05 2c e3 63 22 b0 ab 60 c9 91 06 1a ae 70 20 | 27 d6 ef fd c0 2f 69 26 17 d1 9e c7 27 24 17 a8 | 24 d5 65 3b 9d f2 8c bf b0 68 e5 fe eb 23 a6 60 | 73 bb 2c 27 f0 6f 99 ad 46 65 56 ab e0 3b 17 ec | 9b 9d ea 8e 8a f2 38 63 83 4a 06 e3 25 cb 1e f9 | dc 65 77 ef d0 4a 78 7b 20 56 68 95 c5 c6 26 b7 | 22 1a 94 be 24 6f df 64 3f 4c a0 9e 67 50 56 a5 | ff de 53 8d 33 a9 a8 0c 5c 5c f2 d7 59 a4 9b b5 | ea 88 33 be 31 ed e9 57 b6 13 a2 64 ea cd 03 7a | c1 10 e4 c2 97 9a da b1 7b a7 87 15 5b 07 98 84 | 7d 87 44 3a 69 2f dc 0c 9d 8a 59 b1 b8 cc a6 60 | ec 16 5f 47 d6 09 63 e3 f1 2c 11 ea 7a f9 7f cb | 29 00 00 24 22 90 73 7f 5c d6 51 86 23 a3 e4 fd | 8f 56 6e 8b 75 d3 87 48 a5 61 18 f5 b1 fb d3 9a | 2f 6b 23 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6e 83 26 d5 67 d9 f3 fc 4f ff fa 52 | 66 7f 8e ec fb ca 45 a0 00 00 00 1c 00 00 40 05 | d1 0b 7b 8d 87 6a e6 ee 1b bd 92 49 cc 1a ec 1c | a9 25 6e 8a | state #661 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb340012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34800cc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #661 | libevent_malloc: new ptr-libevent@0x7fb3880805f0 size 128 | #661 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.244583 | resume sending helper answer for #661 suppresed complete_v2_state_transition() and stole MD | #661 spent 0.44 milliseconds in resume sending helper answer | stop processing: state #661 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3800857f0 | processing resume sending helper answer for #682 | start processing: state #682 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 682 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #682 | **emit ISAKMP Message: | initiator cookie: | 1c 63 f5 34 d6 98 db f0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-149 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 23 91 93 4b 82 7b d6 c9 cc b6 dc 38 f0 76 d4 ea | ikev2 g^x b3 f9 d0 20 c5 06 5c 01 f7 82 2c bf 39 d6 f7 d8 | ikev2 g^x e4 7d 68 8b b6 1b e7 ba 01 9e ef 31 f5 4a e4 00 | ikev2 g^x 71 9f 4f 6c f1 66 a6 38 36 4d 16 6e b9 0a 02 f5 | ikev2 g^x 76 26 d7 9e 22 7e 03 cd dc 7a 6e 7a f3 50 38 a2 | ikev2 g^x f7 f1 9b 7e b5 d1 c3 e6 34 54 2a 11 00 e2 cf 05 | ikev2 g^x 84 d5 3c c2 01 67 6d 2f 10 ab ff 3f 5e d3 fc 6f | ikev2 g^x ae a3 ca 06 6d 1c 49 2d 5a 7a e5 04 64 3b 7a e2 | ikev2 g^x 78 f6 c6 9d dc 04 10 4f 6b 84 37 a0 35 9d 5e 5e | ikev2 g^x 43 00 9f e2 ca 77 c0 e3 a6 a6 e9 8c 0e c9 9d 05 | ikev2 g^x f4 7c d1 f5 aa f5 3a 3b df 0d e9 f3 99 52 88 3b | ikev2 g^x 6e 6b e7 b1 a8 09 b9 87 1e 6c dc 1d a6 0c b9 85 | ikev2 g^x 1c 89 ee 82 0e da ca a2 a8 31 12 33 df 1d 7c 66 | ikev2 g^x 57 48 ec d7 e9 e4 6e 69 ac ff cd 56 20 87 16 fd | ikev2 g^x c1 b0 72 78 18 b1 15 83 cc 13 cd 7a 9b d9 1b ea | ikev2 g^x ab 9f c6 a9 54 29 46 07 69 08 0d df 81 94 bd 9f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 44 7b c5 ba aa af dc 31 42 e4 80 90 55 f4 c0 be | IKEv2 nonce 7c cc 43 63 bf 44 9a f8 f4 30 a8 fb 10 97 40 e3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1c 63 f5 34 d6 98 db f0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 95 | natd_hash: port= 01 f4 | natd_hash: hash= 2d a2 48 8b c8 15 0a 38 76 0c ba f3 b9 e8 7a 81 | natd_hash: hash= 52 85 f0 63 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2d a2 48 8b c8 15 0a 38 76 0c ba f3 b9 e8 7a 81 | Notify data 52 85 f0 63 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1c 63 f5 34 d6 98 db f0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 0f 56 36 fd fd 8a 46 5c 86 a2 68 e1 11 7c f5 b4 | natd_hash: hash= 2c 7e 9c 12 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0f 56 36 fd fd 8a 46 5c 86 a2 68 e1 11 7c f5 b4 | Notify data 2c 7e 9c 12 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #682 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #682 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #682 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #682: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #682 to 4294967295 after switching state | Message ID: IKE #682 skipping update_recv as MD is fake | Message ID: sent #682 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-149" #682: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.149:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #682) | 1c 63 f5 34 d6 98 db f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 91 93 4b 82 7b d6 c9 cc b6 dc 38 f0 76 d4 ea | b3 f9 d0 20 c5 06 5c 01 f7 82 2c bf 39 d6 f7 d8 | e4 7d 68 8b b6 1b e7 ba 01 9e ef 31 f5 4a e4 00 | 71 9f 4f 6c f1 66 a6 38 36 4d 16 6e b9 0a 02 f5 | 76 26 d7 9e 22 7e 03 cd dc 7a 6e 7a f3 50 38 a2 | f7 f1 9b 7e b5 d1 c3 e6 34 54 2a 11 00 e2 cf 05 | 84 d5 3c c2 01 67 6d 2f 10 ab ff 3f 5e d3 fc 6f | ae a3 ca 06 6d 1c 49 2d 5a 7a e5 04 64 3b 7a e2 | 78 f6 c6 9d dc 04 10 4f 6b 84 37 a0 35 9d 5e 5e | 43 00 9f e2 ca 77 c0 e3 a6 a6 e9 8c 0e c9 9d 05 | f4 7c d1 f5 aa f5 3a 3b df 0d e9 f3 99 52 88 3b | 6e 6b e7 b1 a8 09 b9 87 1e 6c dc 1d a6 0c b9 85 | 1c 89 ee 82 0e da ca a2 a8 31 12 33 df 1d 7c 66 | 57 48 ec d7 e9 e4 6e 69 ac ff cd 56 20 87 16 fd | c1 b0 72 78 18 b1 15 83 cc 13 cd 7a 9b d9 1b ea | ab 9f c6 a9 54 29 46 07 69 08 0d df 81 94 bd 9f | 29 00 00 24 44 7b c5 ba aa af dc 31 42 e4 80 90 | 55 f4 c0 be 7c cc 43 63 bf 44 9a f8 f4 30 a8 fb | 10 97 40 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d a2 48 8b c8 15 0a 38 76 0c ba f3 | b9 e8 7a 81 52 85 f0 63 00 00 00 1c 00 00 40 05 | 0f 56 36 fd fd 8a 46 5c 86 a2 68 e1 11 7c f5 b4 | 2c 7e 9c 12 | state #682 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb338009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb338018460 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #682 | libevent_malloc: new ptr-libevent@0x7fb3800857f0 size 128 | #682 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.24504 | resume sending helper answer for #682 suppresed complete_v2_state_transition() and stole MD | #682 spent 0.437 milliseconds in resume sending helper answer | stop processing: state #682 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb33807fef0 | processing resume sending helper answer for #663 | start processing: state #663 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 663 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #663 | **emit ISAKMP Message: | initiator cookie: | 79 3e ba b8 29 05 87 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-84 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 37 33 bb 34 f3 54 37 c7 8c dc a0 f1 cf 40 e8 73 | ikev2 g^x 4d 61 cb fb 80 2d 1a 01 88 6a 8b b8 01 53 25 2c | ikev2 g^x 65 96 5d ff d7 d3 f4 f3 eb de 8f 2e 9d 25 1d ba | ikev2 g^x 62 be 02 e6 a1 b3 d0 12 26 cc d4 67 6f 8d 33 f6 | ikev2 g^x fb 60 8a a9 03 0f c4 ae 02 35 7b 99 4e e1 16 a5 | ikev2 g^x ee d3 5b b1 65 88 dc 22 5a d0 4d 4e ee 2c c0 24 | ikev2 g^x 46 97 dd a5 48 e2 b0 56 80 9b bb 68 ed b6 e4 a6 | ikev2 g^x 82 5d 86 21 c6 56 4f 00 61 9e 48 83 5d 1c ae 1e | ikev2 g^x f0 fe e0 f9 d0 af 09 19 1a e7 0d 36 81 b4 ef 45 | ikev2 g^x fc 89 2f 75 93 ae b9 f0 57 e7 58 2b 67 f7 d7 fb | ikev2 g^x e1 1e 09 48 c7 72 2b be da 88 0d c9 88 d7 8e 37 | ikev2 g^x df a2 95 e3 05 1c 20 c9 19 12 4a a3 c8 92 ca 0d | ikev2 g^x 93 be b7 87 ef 2b 8a 9c d5 f2 5d 84 18 5e cd 93 | ikev2 g^x c2 8f 56 ff 9f 94 a6 a4 04 ca 9a 36 29 04 c1 ac | ikev2 g^x 0f c7 63 2e 86 54 2d 98 d7 53 7a 9f fa 34 32 25 | ikev2 g^x 82 89 27 91 24 d9 51 66 79 76 cf e8 c1 b8 34 a5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f2 12 89 96 be 24 7d dc 10 f3 fa c9 66 8f fc 3d | IKEv2 nonce 79 cf 4b f7 e2 58 a9 f9 9e 41 92 7e 29 7a 39 ee | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 79 3e ba b8 29 05 87 ce | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 54 | natd_hash: port= 01 f4 | natd_hash: hash= 49 16 1d 85 03 57 22 43 2e 01 a2 89 42 fd 2a d3 | natd_hash: hash= 68 48 40 6e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 49 16 1d 85 03 57 22 43 2e 01 a2 89 42 fd 2a d3 | Notify data 68 48 40 6e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 79 3e ba b8 29 05 87 ce | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 88 4c 7d b9 50 dc 42 1f 7a 10 6e e7 7e cd db 07 | natd_hash: hash= b5 a9 ee e4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 88 4c 7d b9 50 dc 42 1f 7a 10 6e e7 7e cd db 07 | Notify data b5 a9 ee e4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #663 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #663 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #663 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #663: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #663 to 4294967295 after switching state | Message ID: IKE #663 skipping update_recv as MD is fake | Message ID: sent #663 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-84" #663: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.84:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #663) | 79 3e ba b8 29 05 87 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 33 bb 34 f3 54 37 c7 8c dc a0 f1 cf 40 e8 73 | 4d 61 cb fb 80 2d 1a 01 88 6a 8b b8 01 53 25 2c | 65 96 5d ff d7 d3 f4 f3 eb de 8f 2e 9d 25 1d ba | 62 be 02 e6 a1 b3 d0 12 26 cc d4 67 6f 8d 33 f6 | fb 60 8a a9 03 0f c4 ae 02 35 7b 99 4e e1 16 a5 | ee d3 5b b1 65 88 dc 22 5a d0 4d 4e ee 2c c0 24 | 46 97 dd a5 48 e2 b0 56 80 9b bb 68 ed b6 e4 a6 | 82 5d 86 21 c6 56 4f 00 61 9e 48 83 5d 1c ae 1e | f0 fe e0 f9 d0 af 09 19 1a e7 0d 36 81 b4 ef 45 | fc 89 2f 75 93 ae b9 f0 57 e7 58 2b 67 f7 d7 fb | e1 1e 09 48 c7 72 2b be da 88 0d c9 88 d7 8e 37 | df a2 95 e3 05 1c 20 c9 19 12 4a a3 c8 92 ca 0d | 93 be b7 87 ef 2b 8a 9c d5 f2 5d 84 18 5e cd 93 | c2 8f 56 ff 9f 94 a6 a4 04 ca 9a 36 29 04 c1 ac | 0f c7 63 2e 86 54 2d 98 d7 53 7a 9f fa 34 32 25 | 82 89 27 91 24 d9 51 66 79 76 cf e8 c1 b8 34 a5 | 29 00 00 24 f2 12 89 96 be 24 7d dc 10 f3 fa c9 | 66 8f fc 3d 79 cf 4b f7 e2 58 a9 f9 9e 41 92 7e | 29 7a 39 ee 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 49 16 1d 85 03 57 22 43 2e 01 a2 89 | 42 fd 2a d3 68 48 40 6e 00 00 00 1c 00 00 40 05 | 88 4c 7d b9 50 dc 42 1f 7a 10 6e e7 7e cd db 07 | b5 a9 ee e4 | state #663 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3440407f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2e150 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2e150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #663 | libevent_malloc: new ptr-libevent@0x7fb33807fef0 size 128 | #663 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.245515 | resume sending helper answer for #663 suppresed complete_v2_state_transition() and stole MD | #663 spent 0.444 milliseconds in resume sending helper answer | stop processing: state #663 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36006c900 | processing resume sending helper answer for #681 | start processing: state #681 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 681 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #681 | **emit ISAKMP Message: | initiator cookie: | 43 b3 87 97 a5 28 76 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-170 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c2 69 dd 2f f3 2d 11 ad a5 9c d3 5d da 0a 86 6b | ikev2 g^x 8c 49 25 0c 16 f8 de 41 b0 ac 6e 41 c3 d3 27 1c | ikev2 g^x 5b 54 cb 17 92 04 0e c6 6b 96 94 d9 db ad b8 79 | ikev2 g^x dd c8 5b bf 4b a3 2f 7c 6a 19 e7 ad 1e 53 14 f7 | ikev2 g^x d1 90 70 c6 a3 11 50 75 b1 1c 57 b6 52 72 e5 bf | ikev2 g^x 5f 38 47 3e 16 f7 e0 ac 51 3d 68 76 bd 51 68 b9 | ikev2 g^x 99 0e 7f af 6c 2d 48 06 10 6a 30 cc 70 5d 14 1f | ikev2 g^x f9 cd e8 dc 60 df 2b 6b b6 f3 6f 7e 00 e5 1f df | ikev2 g^x 04 ee 6d 38 b5 09 46 77 da d8 ac d9 bc dd 17 11 | ikev2 g^x 97 7f c0 a3 2a 8e e7 7b d0 22 8a 6e 6e cc 8a d1 | ikev2 g^x ee 68 9a 8f a3 46 20 76 f3 a4 2c f5 c0 c0 1e 77 | ikev2 g^x 2d 20 e2 fc 14 c2 66 73 98 59 19 d7 e6 3d e6 8e | ikev2 g^x 61 67 8e 25 aa c2 61 e0 9d 35 ef 0e be d6 35 38 | ikev2 g^x 8c 18 ce 74 7a be 48 b5 c4 a1 11 de 05 be 64 33 | ikev2 g^x e8 8b ac cd 76 ec 2b 48 c4 d2 9a 3c c7 9d b7 e7 | ikev2 g^x 67 3d c4 7e 7f 8d af 5a 9d 1c 23 aa 32 7a 83 a5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ab ab 32 27 cc 43 85 a1 14 10 62 ae 10 ab 5a 1f | IKEv2 nonce 4b 33 ac a9 a7 81 9d 0d 60 06 a6 87 e7 aa 41 2a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 43 b3 87 97 a5 28 76 b9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 aa | natd_hash: port= 01 f4 | natd_hash: hash= 79 f1 2f 02 50 94 bd e1 85 64 92 73 e1 fc 7b 98 | natd_hash: hash= 62 5d a3 7d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 79 f1 2f 02 50 94 bd e1 85 64 92 73 e1 fc 7b 98 | Notify data 62 5d a3 7d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 43 b3 87 97 a5 28 76 b9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 0f dc 60 fc ac a0 68 fc 96 74 2f 45 a5 ab 4a db | natd_hash: hash= c3 e2 5b 97 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0f dc 60 fc ac a0 68 fc 96 74 2f 45 a5 ab 4a db | Notify data c3 e2 5b 97 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #681 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #681 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #681 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #681: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #681 to 4294967295 after switching state | Message ID: IKE #681 skipping update_recv as MD is fake | Message ID: sent #681 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-170" #681: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.170:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #681) | 43 b3 87 97 a5 28 76 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 69 dd 2f f3 2d 11 ad a5 9c d3 5d da 0a 86 6b | 8c 49 25 0c 16 f8 de 41 b0 ac 6e 41 c3 d3 27 1c | 5b 54 cb 17 92 04 0e c6 6b 96 94 d9 db ad b8 79 | dd c8 5b bf 4b a3 2f 7c 6a 19 e7 ad 1e 53 14 f7 | d1 90 70 c6 a3 11 50 75 b1 1c 57 b6 52 72 e5 bf | 5f 38 47 3e 16 f7 e0 ac 51 3d 68 76 bd 51 68 b9 | 99 0e 7f af 6c 2d 48 06 10 6a 30 cc 70 5d 14 1f | f9 cd e8 dc 60 df 2b 6b b6 f3 6f 7e 00 e5 1f df | 04 ee 6d 38 b5 09 46 77 da d8 ac d9 bc dd 17 11 | 97 7f c0 a3 2a 8e e7 7b d0 22 8a 6e 6e cc 8a d1 | ee 68 9a 8f a3 46 20 76 f3 a4 2c f5 c0 c0 1e 77 | 2d 20 e2 fc 14 c2 66 73 98 59 19 d7 e6 3d e6 8e | 61 67 8e 25 aa c2 61 e0 9d 35 ef 0e be d6 35 38 | 8c 18 ce 74 7a be 48 b5 c4 a1 11 de 05 be 64 33 | e8 8b ac cd 76 ec 2b 48 c4 d2 9a 3c c7 9d b7 e7 | 67 3d c4 7e 7f 8d af 5a 9d 1c 23 aa 32 7a 83 a5 | 29 00 00 24 ab ab 32 27 cc 43 85 a1 14 10 62 ae | 10 ab 5a 1f 4b 33 ac a9 a7 81 9d 0d 60 06 a6 87 | e7 aa 41 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 f1 2f 02 50 94 bd e1 85 64 92 73 | e1 fc 7b 98 62 5d a3 7d 00 00 00 1c 00 00 40 05 | 0f dc 60 fc ac a0 68 fc 96 74 2f 45 a5 ab 4a db | c3 e2 5b 97 | state #681 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c0180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a38f50 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #681 | libevent_malloc: new ptr-libevent@0x7fb36006c900 size 128 | #681 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.245992 | resume sending helper answer for #681 suppresed complete_v2_state_transition() and stole MD | #681 spent 0.45 milliseconds in resume sending helper answer | stop processing: state #681 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3740750d0 | processing resume sending helper answer for #675 | start processing: state #675 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 675 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #675 | **emit ISAKMP Message: | initiator cookie: | 85 15 01 85 89 d4 29 eb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-172 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 27 d4 44 6c 1a 22 e8 b4 f7 a6 6b ca dc 02 79 50 | ikev2 g^x 66 16 b2 bd d5 ad b1 28 e9 83 fb 87 0f b0 39 1f | ikev2 g^x 85 0a 4c 67 84 5a 26 d0 a8 55 ee 04 95 94 30 6a | ikev2 g^x 8b 2f aa d3 6a 76 aa f6 4f 30 a2 ed 90 5e f2 5a | ikev2 g^x 20 ad 0c 4f dc 59 2a a9 a0 b9 a8 76 de cd 23 64 | ikev2 g^x 4f 9a 8d b3 29 80 5a c0 ac 02 65 83 3e 73 4f af | ikev2 g^x 83 bf 4d 9d d9 08 a6 6d 2b 14 3d dc 93 82 28 2c | ikev2 g^x f5 61 0c a2 f1 30 b4 2b 77 cf 96 6d fa 79 62 e9 | ikev2 g^x 63 f1 85 76 cb bf 4a 7a a7 6e b2 0f d2 81 ef 19 | ikev2 g^x 8b 21 8c b4 9f 3f 24 a6 9f da 8c 47 53 28 64 05 | ikev2 g^x fb 7d 95 f0 ba d8 43 62 9a ae 0b 9c e0 5c 3a fb | ikev2 g^x b4 7a 35 d6 09 67 28 a4 a9 e9 29 a4 8a 02 01 83 | ikev2 g^x a9 7a 2f c2 42 8f 69 ec 36 92 a5 62 86 bc 6e 90 | ikev2 g^x 30 c1 46 27 0d 35 15 d4 e6 60 3d 5f 12 ff d2 11 | ikev2 g^x 5b 76 4e f3 c6 f5 a0 f5 20 2c fb d4 41 40 b5 03 | ikev2 g^x 62 81 86 c6 eb ed 0a c9 13 24 16 5c 02 3b c0 ee | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9e c2 e6 fc 35 e6 0d 46 d5 b0 34 c9 0e 50 aa 4b | IKEv2 nonce 78 0d 91 95 d1 89 b8 a7 4b 5a cf a5 b3 98 e6 f4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 85 15 01 85 89 d4 29 eb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ac | natd_hash: port= 01 f4 | natd_hash: hash= 95 c1 ac 8a 35 e1 18 af 1b 41 18 3d da f3 7c 9c | natd_hash: hash= 54 2f 3c 44 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 95 c1 ac 8a 35 e1 18 af 1b 41 18 3d da f3 7c 9c | Notify data 54 2f 3c 44 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 85 15 01 85 89 d4 29 eb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 3b bf 96 55 32 21 74 25 91 ac 0c f9 c5 3a d7 f4 | natd_hash: hash= 94 b6 78 27 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3b bf 96 55 32 21 74 25 91 ac 0c f9 c5 3a d7 f4 | Notify data 94 b6 78 27 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #675 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #675 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #675 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #675: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #675 to 4294967295 after switching state | Message ID: IKE #675 skipping update_recv as MD is fake | Message ID: sent #675 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-172" #675: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.172:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #675) | 85 15 01 85 89 d4 29 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 27 d4 44 6c 1a 22 e8 b4 f7 a6 6b ca dc 02 79 50 | 66 16 b2 bd d5 ad b1 28 e9 83 fb 87 0f b0 39 1f | 85 0a 4c 67 84 5a 26 d0 a8 55 ee 04 95 94 30 6a | 8b 2f aa d3 6a 76 aa f6 4f 30 a2 ed 90 5e f2 5a | 20 ad 0c 4f dc 59 2a a9 a0 b9 a8 76 de cd 23 64 | 4f 9a 8d b3 29 80 5a c0 ac 02 65 83 3e 73 4f af | 83 bf 4d 9d d9 08 a6 6d 2b 14 3d dc 93 82 28 2c | f5 61 0c a2 f1 30 b4 2b 77 cf 96 6d fa 79 62 e9 | 63 f1 85 76 cb bf 4a 7a a7 6e b2 0f d2 81 ef 19 | 8b 21 8c b4 9f 3f 24 a6 9f da 8c 47 53 28 64 05 | fb 7d 95 f0 ba d8 43 62 9a ae 0b 9c e0 5c 3a fb | b4 7a 35 d6 09 67 28 a4 a9 e9 29 a4 8a 02 01 83 | a9 7a 2f c2 42 8f 69 ec 36 92 a5 62 86 bc 6e 90 | 30 c1 46 27 0d 35 15 d4 e6 60 3d 5f 12 ff d2 11 | 5b 76 4e f3 c6 f5 a0 f5 20 2c fb d4 41 40 b5 03 | 62 81 86 c6 eb ed 0a c9 13 24 16 5c 02 3b c0 ee | 29 00 00 24 9e c2 e6 fc 35 e6 0d 46 d5 b0 34 c9 | 0e 50 aa 4b 78 0d 91 95 d1 89 b8 a7 4b 5a cf a5 | b3 98 e6 f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 c1 ac 8a 35 e1 18 af 1b 41 18 3d | da f3 7c 9c 54 2f 3c 44 00 00 00 1c 00 00 40 05 | 3b bf 96 55 32 21 74 25 91 ac 0c f9 c5 3a d7 f4 | 94 b6 78 27 | state #675 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3540407f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb338012bf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #675 | libevent_malloc: new ptr-libevent@0x7fb3740750d0 size 128 | #675 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.246466 | resume sending helper answer for #675 suppresed complete_v2_state_transition() and stole MD | #675 spent 0.444 milliseconds in resume sending helper answer | stop processing: state #675 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36804b7c0 | processing resume sending helper answer for #683 | start processing: state #683 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 683 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #683 | **emit ISAKMP Message: | initiator cookie: | 22 30 a0 37 9e 5e 0c 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-101 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 10 2d bd 08 31 a0 07 0c c4 f5 ac c5 5b e0 c5 60 | ikev2 g^x 90 d1 45 d9 1b e2 dc 82 5b 35 5b ab d0 57 64 0b | ikev2 g^x 0e a8 1f f2 6d fc 5a 7c ad 7a e8 a0 f9 15 5a 35 | ikev2 g^x 68 ff 17 43 ed b1 8e f1 b0 9c 81 b4 3b b5 37 5a | ikev2 g^x 70 13 3a f4 ca a9 f6 46 52 0c ae 55 b0 55 be c6 | ikev2 g^x 1a d7 a6 fb 47 44 eb b7 16 85 b7 dd ff de a0 45 | ikev2 g^x 17 b4 11 35 d4 d0 cf e9 45 97 61 c1 6a d8 a0 c7 | ikev2 g^x d6 0b 85 99 6b 5b c9 dc 9e 76 87 29 b7 8c 8c 9a | ikev2 g^x 95 7a 15 c6 10 17 98 93 f7 09 7a 9a cd d0 13 14 | ikev2 g^x a9 2c 55 a4 60 f1 72 80 2c 28 45 e4 d9 cd f6 01 | ikev2 g^x 55 30 ed 6a 1a 0b 81 c2 8d 64 3f 52 1f 81 ec a6 | ikev2 g^x b3 e6 5c 36 3c 8d 99 60 59 d8 e2 22 76 0c e0 0e | ikev2 g^x be 08 7f ac 91 76 6a 0c f2 45 c3 7c d3 5f 7a 2d | ikev2 g^x 17 ac e6 32 1b a2 9b 38 7f e0 1c c5 b2 87 8c 03 | ikev2 g^x 93 b7 73 13 37 e0 f4 7f 3b 5b c2 ac 8e b6 84 9a | ikev2 g^x 86 44 62 2d 89 5c f8 c8 10 4b 97 4b 7a e5 a2 fd | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 00 a4 f8 e4 0c 48 4a f1 27 f4 8b fc 65 ab 53 d7 | IKEv2 nonce 66 48 7b 24 ce a6 58 75 84 59 a6 a0 2d 45 66 9d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 22 30 a0 37 9e 5e 0c 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 65 | natd_hash: port= 01 f4 | natd_hash: hash= 79 85 ce 75 72 7f 4a a1 68 df 47 f3 a0 b0 e6 2f | natd_hash: hash= 94 7e 65 c2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 79 85 ce 75 72 7f 4a a1 68 df 47 f3 a0 b0 e6 2f | Notify data 94 7e 65 c2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 22 30 a0 37 9e 5e 0c 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 62 77 62 1c e2 c3 88 5f 5a c8 dd e7 a6 ce ac 52 | natd_hash: hash= d0 9f e3 15 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 62 77 62 1c e2 c3 88 5f 5a c8 dd e7 a6 ce ac 52 | Notify data d0 9f e3 15 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #683 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #683 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #683 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #683: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #683 to 4294967295 after switching state | Message ID: IKE #683 skipping update_recv as MD is fake | Message ID: sent #683 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-101" #683: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.101:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #683) | 22 30 a0 37 9e 5e 0c 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 2d bd 08 31 a0 07 0c c4 f5 ac c5 5b e0 c5 60 | 90 d1 45 d9 1b e2 dc 82 5b 35 5b ab d0 57 64 0b | 0e a8 1f f2 6d fc 5a 7c ad 7a e8 a0 f9 15 5a 35 | 68 ff 17 43 ed b1 8e f1 b0 9c 81 b4 3b b5 37 5a | 70 13 3a f4 ca a9 f6 46 52 0c ae 55 b0 55 be c6 | 1a d7 a6 fb 47 44 eb b7 16 85 b7 dd ff de a0 45 | 17 b4 11 35 d4 d0 cf e9 45 97 61 c1 6a d8 a0 c7 | d6 0b 85 99 6b 5b c9 dc 9e 76 87 29 b7 8c 8c 9a | 95 7a 15 c6 10 17 98 93 f7 09 7a 9a cd d0 13 14 | a9 2c 55 a4 60 f1 72 80 2c 28 45 e4 d9 cd f6 01 | 55 30 ed 6a 1a 0b 81 c2 8d 64 3f 52 1f 81 ec a6 | b3 e6 5c 36 3c 8d 99 60 59 d8 e2 22 76 0c e0 0e | be 08 7f ac 91 76 6a 0c f2 45 c3 7c d3 5f 7a 2d | 17 ac e6 32 1b a2 9b 38 7f e0 1c c5 b2 87 8c 03 | 93 b7 73 13 37 e0 f4 7f 3b 5b c2 ac 8e b6 84 9a | 86 44 62 2d 89 5c f8 c8 10 4b 97 4b 7a e5 a2 fd | 29 00 00 24 00 a4 f8 e4 0c 48 4a f1 27 f4 8b fc | 65 ab 53 d7 66 48 7b 24 ce a6 58 75 84 59 a6 a0 | 2d 45 66 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 85 ce 75 72 7f 4a a1 68 df 47 f3 | a0 b0 e6 2f 94 7e 65 c2 00 00 00 1c 00 00 40 05 | 62 77 62 1c e2 c3 88 5f 5a c8 dd e7 a6 ce ac 52 | d0 9f e3 15 | state #683 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3500251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34c018460 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #683 | libevent_malloc: new ptr-libevent@0x7fb36804b7c0 size 128 | #683 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.246922 | resume sending helper answer for #683 suppresed complete_v2_state_transition() and stole MD | #683 spent 0.433 milliseconds in resume sending helper answer | stop processing: state #683 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38008afd0 | processing resume sending helper answer for #659 | start processing: state #659 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 659 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #659 | **emit ISAKMP Message: | initiator cookie: | 77 e1 0b 63 56 ac c5 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-148 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c7 24 71 32 4c a4 b2 25 64 3e 33 ac e5 69 a3 59 | ikev2 g^x 28 37 d7 f5 67 fa 3c 10 89 2a be c8 bc b7 80 db | ikev2 g^x ae ec e3 e9 16 ca 51 c1 06 d1 7f 94 6f c4 fc bb | ikev2 g^x 73 c6 3b c8 e8 42 d0 17 d5 11 01 02 43 ce 2f 5e | ikev2 g^x 6b 05 fe bc 5e fe 6a b1 10 03 5d d6 b0 38 f7 55 | ikev2 g^x ac 53 8c cb fd 56 72 ab 02 ea 39 60 a4 1f 70 3a | ikev2 g^x 0f 44 00 88 6a 7e 20 c3 de 96 d0 8b cd ee 1a d1 | ikev2 g^x 97 7f c1 1c 23 b1 90 63 b7 e9 ab ce 37 30 6e f7 | ikev2 g^x e0 76 ab b8 cd cc 34 16 be e0 9f dc e1 2f 5c 73 | ikev2 g^x b7 57 ad 53 9d 9f 37 a8 12 a5 aa 69 7e bf 56 b7 | ikev2 g^x ef 32 86 fd d8 eb 0a 45 48 20 ef 05 c2 fd 7c 50 | ikev2 g^x 36 ee 5b de 12 13 35 96 43 92 0a 82 37 08 83 d8 | ikev2 g^x f1 44 bf d3 7f 0b c8 9f 06 3d 6f d2 e8 de f4 63 | ikev2 g^x 67 09 a1 ab 1e 3e 96 c6 bd 17 50 90 d2 68 7f b0 | ikev2 g^x 0e ba 2d 2d c6 cc f3 98 8f 85 a9 bf 83 cc 98 34 | ikev2 g^x a4 13 08 89 fb bd 67 8c b6 a0 6e e2 b4 b0 ff ea | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9b 38 e6 b0 44 13 de 09 b0 4f 0f d4 9c 32 85 69 | IKEv2 nonce 0a a7 d3 e0 7e 31 28 18 de 52 8d 12 f4 2d 68 ce | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 77 e1 0b 63 56 ac c5 72 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 94 | natd_hash: port= 01 f4 | natd_hash: hash= 02 04 29 42 78 19 20 e6 c7 17 a6 a2 7a d7 24 ba | natd_hash: hash= d8 b1 f2 6e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 02 04 29 42 78 19 20 e6 c7 17 a6 a2 7a d7 24 ba | Notify data d8 b1 f2 6e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 77 e1 0b 63 56 ac c5 72 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4d a2 f4 dc ca 8a e9 4b bc de 2e 89 0d ba cd c5 | natd_hash: hash= 42 51 87 1c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4d a2 f4 dc ca 8a e9 4b bc de 2e 89 0d ba cd c5 | Notify data 42 51 87 1c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #659 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #659 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #659 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #659: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #659 to 4294967295 after switching state | Message ID: IKE #659 skipping update_recv as MD is fake | Message ID: sent #659 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-148" #659: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.148:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #659) | 77 e1 0b 63 56 ac c5 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 24 71 32 4c a4 b2 25 64 3e 33 ac e5 69 a3 59 | 28 37 d7 f5 67 fa 3c 10 89 2a be c8 bc b7 80 db | ae ec e3 e9 16 ca 51 c1 06 d1 7f 94 6f c4 fc bb | 73 c6 3b c8 e8 42 d0 17 d5 11 01 02 43 ce 2f 5e | 6b 05 fe bc 5e fe 6a b1 10 03 5d d6 b0 38 f7 55 | ac 53 8c cb fd 56 72 ab 02 ea 39 60 a4 1f 70 3a | 0f 44 00 88 6a 7e 20 c3 de 96 d0 8b cd ee 1a d1 | 97 7f c1 1c 23 b1 90 63 b7 e9 ab ce 37 30 6e f7 | e0 76 ab b8 cd cc 34 16 be e0 9f dc e1 2f 5c 73 | b7 57 ad 53 9d 9f 37 a8 12 a5 aa 69 7e bf 56 b7 | ef 32 86 fd d8 eb 0a 45 48 20 ef 05 c2 fd 7c 50 | 36 ee 5b de 12 13 35 96 43 92 0a 82 37 08 83 d8 | f1 44 bf d3 7f 0b c8 9f 06 3d 6f d2 e8 de f4 63 | 67 09 a1 ab 1e 3e 96 c6 bd 17 50 90 d2 68 7f b0 | 0e ba 2d 2d c6 cc f3 98 8f 85 a9 bf 83 cc 98 34 | a4 13 08 89 fb bd 67 8c b6 a0 6e e2 b4 b0 ff ea | 29 00 00 24 9b 38 e6 b0 44 13 de 09 b0 4f 0f d4 | 9c 32 85 69 0a a7 d3 e0 7e 31 28 18 de 52 8d 12 | f4 2d 68 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 04 29 42 78 19 20 e6 c7 17 a6 a2 | 7a d7 24 ba d8 b1 f2 6e 00 00 00 1c 00 00 40 05 | 4d a2 f4 dc ca 8a e9 4b bc de 2e 89 0d ba cd c5 | 42 51 87 1c | state #659 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb33800cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb374009690 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374009690 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #659 | libevent_malloc: new ptr-libevent@0x7fb38008afd0 size 128 | #659 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.247404 | resume sending helper answer for #659 suppresed complete_v2_state_transition() and stole MD | #659 spent 0.454 milliseconds in resume sending helper answer | stop processing: state #659 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb354074f60 | processing resume sending helper answer for #629 | start processing: state #629 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 629 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #629 | **emit ISAKMP Message: | initiator cookie: | f2 94 01 51 22 3f af b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-71 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 69 4a 7c e2 24 38 23 63 44 71 d0 61 ed e2 db 72 | ikev2 g^x e6 61 bd 05 9a 47 1a a4 e0 bf e2 b3 38 98 dc f5 | ikev2 g^x a8 2e 85 9f 39 94 94 de 61 d4 d7 e0 6f d5 4b c2 | ikev2 g^x 89 35 8a 19 c0 0b 46 04 61 a9 d7 30 7b 04 fc 12 | ikev2 g^x e6 01 83 16 c3 75 c5 9f 9a cc 41 f6 3c df 59 2a | ikev2 g^x 0f 08 5d 35 9a ce e8 c9 26 c7 0c bd a0 e0 6f e3 | ikev2 g^x 48 c7 a8 ee 4f b3 e6 8c bc 55 d6 31 9f e3 ee e7 | ikev2 g^x f2 e1 44 07 35 ec 7f 8d d3 6c 7c 13 76 3d eb f9 | ikev2 g^x d5 7d 76 3c 3b a8 5c be 62 a6 f1 e1 77 d6 70 e5 | ikev2 g^x b8 30 16 1f 9c 9e 52 90 ea f1 be d9 f2 c9 5f 95 | ikev2 g^x 77 8c 0a b4 bb a7 f4 25 bc 2d eb e9 11 f1 32 b5 | ikev2 g^x 35 4d 8c 02 40 af 7f 94 52 b2 4c 1d e7 2f e7 74 | ikev2 g^x 72 3e 84 0e 3a 79 5f 30 6a 29 cb 0e ae 9e 72 ab | ikev2 g^x d7 8e 3e b9 a0 36 1f e0 6e 15 d4 61 f3 83 66 72 | ikev2 g^x 3e c1 e8 80 18 c3 99 46 a8 a9 91 ab f2 9d 81 1a | ikev2 g^x 78 1d 17 58 a0 48 32 bb bb 73 79 08 2a 3f 1e 4a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 55 56 e2 01 45 9b b6 83 ff 84 a8 c5 23 34 d8 e3 | IKEv2 nonce d8 71 fd 93 f6 a7 41 77 7b 3f 0d 89 52 a4 4e bc | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f2 94 01 51 22 3f af b0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 47 | natd_hash: port= 01 f4 | natd_hash: hash= da 5d c3 fa ce a9 5d 3b e4 cc 6b 32 6c ae ca 02 | natd_hash: hash= 24 ef 22 16 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data da 5d c3 fa ce a9 5d 3b e4 cc 6b 32 6c ae ca 02 | Notify data 24 ef 22 16 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f2 94 01 51 22 3f af b0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e7 00 f0 76 0a 46 ce 87 53 dc 2a ab ab 46 52 9b | natd_hash: hash= a3 29 a0 f9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e7 00 f0 76 0a 46 ce 87 53 dc 2a ab ab 46 52 9b | Notify data a3 29 a0 f9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #629 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #629 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #629 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #629: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #629 to 4294967295 after switching state | Message ID: IKE #629 skipping update_recv as MD is fake | Message ID: sent #629 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-71" #629: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.71:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #629) | f2 94 01 51 22 3f af b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 4a 7c e2 24 38 23 63 44 71 d0 61 ed e2 db 72 | e6 61 bd 05 9a 47 1a a4 e0 bf e2 b3 38 98 dc f5 | a8 2e 85 9f 39 94 94 de 61 d4 d7 e0 6f d5 4b c2 | 89 35 8a 19 c0 0b 46 04 61 a9 d7 30 7b 04 fc 12 | e6 01 83 16 c3 75 c5 9f 9a cc 41 f6 3c df 59 2a | 0f 08 5d 35 9a ce e8 c9 26 c7 0c bd a0 e0 6f e3 | 48 c7 a8 ee 4f b3 e6 8c bc 55 d6 31 9f e3 ee e7 | f2 e1 44 07 35 ec 7f 8d d3 6c 7c 13 76 3d eb f9 | d5 7d 76 3c 3b a8 5c be 62 a6 f1 e1 77 d6 70 e5 | b8 30 16 1f 9c 9e 52 90 ea f1 be d9 f2 c9 5f 95 | 77 8c 0a b4 bb a7 f4 25 bc 2d eb e9 11 f1 32 b5 | 35 4d 8c 02 40 af 7f 94 52 b2 4c 1d e7 2f e7 74 | 72 3e 84 0e 3a 79 5f 30 6a 29 cb 0e ae 9e 72 ab | d7 8e 3e b9 a0 36 1f e0 6e 15 d4 61 f3 83 66 72 | 3e c1 e8 80 18 c3 99 46 a8 a9 91 ab f2 9d 81 1a | 78 1d 17 58 a0 48 32 bb bb 73 79 08 2a 3f 1e 4a | 29 00 00 24 55 56 e2 01 45 9b b6 83 ff 84 a8 c5 | 23 34 d8 e3 d8 71 fd 93 f6 a7 41 77 7b 3f 0d 89 | 52 a4 4e bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da 5d c3 fa ce a9 5d 3b e4 cc 6b 32 | 6c ae ca 02 24 ef 22 16 00 00 00 1c 00 00 40 05 | e7 00 f0 76 0a 46 ce 87 53 dc 2a ab ab 46 52 9b | a3 29 a0 f9 | state #629 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388032bf0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b24680 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24680 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #629 | libevent_malloc: new ptr-libevent@0x7fb354074f60 size 128 | #629 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.247871 | resume sending helper answer for #629 suppresed complete_v2_state_transition() and stole MD | #629 spent 0.44 milliseconds in resume sending helper answer | stop processing: state #629 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb340066bd0 | processing resume sending helper answer for #658 | start processing: state #658 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 658 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #658 | **emit ISAKMP Message: | initiator cookie: | 18 43 30 64 c9 a9 96 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-162 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x da 8f 2e 30 90 e3 1d b1 3d b8 ff e9 fa 6f c4 d2 | ikev2 g^x 4d cb 05 e4 a2 10 ef 4b 88 26 20 b8 91 62 33 4c | ikev2 g^x d2 2d 7a 12 9c 93 d1 33 4a b1 d4 b6 b7 87 51 88 | ikev2 g^x f1 8b ca 98 0d 93 ed 84 f4 9c 46 f9 61 c4 4d d5 | ikev2 g^x fe 8d 16 c5 0c 88 ef 95 5d eb 19 30 d3 94 29 4a | ikev2 g^x 79 59 d9 d9 11 a3 76 95 63 e1 a4 9a 1e 1c 14 d5 | ikev2 g^x 3c bd 7d c0 47 b6 0d 87 c9 56 be 9c 11 14 ee 07 | ikev2 g^x 7d b5 67 34 d6 13 e8 98 79 52 f2 29 ea 87 a9 a7 | ikev2 g^x 37 70 16 dc 00 c9 cf 42 41 7d 6a af e8 16 61 11 | ikev2 g^x 8c cd 5e 52 bd e4 ca 59 92 fe cb ac d6 88 27 08 | ikev2 g^x e2 59 c0 46 be 04 20 28 16 af 0d 9a e2 2b 53 20 | ikev2 g^x 73 8a 54 b3 af e0 6e 17 fa 1f 2c 68 a0 ba 92 60 | ikev2 g^x 80 f9 61 ae 5c 11 fa e6 67 c8 30 5c f1 ed 8c cf | ikev2 g^x f0 8c f7 ae b7 44 b9 62 19 13 7e 6c 7e 19 e7 af | ikev2 g^x 31 44 0e de dd b1 f8 11 4a 1a 39 5c a5 d6 c9 e9 | ikev2 g^x ca 2b 46 08 aa 6f 5d 69 a8 0c 53 f7 bc ac ed a8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 65 98 11 46 f7 ab 17 c4 6b 7d 49 5b a3 fc aa 94 | IKEv2 nonce dd e0 11 9b 8f 82 94 fd 52 c9 5f f9 d2 67 63 6d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 18 43 30 64 c9 a9 96 ac | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a2 | natd_hash: port= 01 f4 | natd_hash: hash= 84 85 9c d9 b9 94 09 f0 06 58 49 33 bd 1c e4 a5 | natd_hash: hash= 79 c0 7c 32 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 84 85 9c d9 b9 94 09 f0 06 58 49 33 bd 1c e4 a5 | Notify data 79 c0 7c 32 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 18 43 30 64 c9 a9 96 ac | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 33 c9 27 c8 b3 b4 b5 08 35 b6 cc fa 47 61 1b 02 | natd_hash: hash= 31 02 bc 85 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 33 c9 27 c8 b3 b4 b5 08 35 b6 cc fa 47 61 1b 02 | Notify data 31 02 bc 85 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #658 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #658 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #658 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #658: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #658 to 4294967295 after switching state | Message ID: IKE #658 skipping update_recv as MD is fake | Message ID: sent #658 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-162" #658: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.162:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #658) | 18 43 30 64 c9 a9 96 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 8f 2e 30 90 e3 1d b1 3d b8 ff e9 fa 6f c4 d2 | 4d cb 05 e4 a2 10 ef 4b 88 26 20 b8 91 62 33 4c | d2 2d 7a 12 9c 93 d1 33 4a b1 d4 b6 b7 87 51 88 | f1 8b ca 98 0d 93 ed 84 f4 9c 46 f9 61 c4 4d d5 | fe 8d 16 c5 0c 88 ef 95 5d eb 19 30 d3 94 29 4a | 79 59 d9 d9 11 a3 76 95 63 e1 a4 9a 1e 1c 14 d5 | 3c bd 7d c0 47 b6 0d 87 c9 56 be 9c 11 14 ee 07 | 7d b5 67 34 d6 13 e8 98 79 52 f2 29 ea 87 a9 a7 | 37 70 16 dc 00 c9 cf 42 41 7d 6a af e8 16 61 11 | 8c cd 5e 52 bd e4 ca 59 92 fe cb ac d6 88 27 08 | e2 59 c0 46 be 04 20 28 16 af 0d 9a e2 2b 53 20 | 73 8a 54 b3 af e0 6e 17 fa 1f 2c 68 a0 ba 92 60 | 80 f9 61 ae 5c 11 fa e6 67 c8 30 5c f1 ed 8c cf | f0 8c f7 ae b7 44 b9 62 19 13 7e 6c 7e 19 e7 af | 31 44 0e de dd b1 f8 11 4a 1a 39 5c a5 d6 c9 e9 | ca 2b 46 08 aa 6f 5d 69 a8 0c 53 f7 bc ac ed a8 | 29 00 00 24 65 98 11 46 f7 ab 17 c4 6b 7d 49 5b | a3 fc aa 94 dd e0 11 9b 8f 82 94 fd 52 c9 5f f9 | d2 67 63 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 85 9c d9 b9 94 09 f0 06 58 49 33 | bd 1c e4 a5 79 c0 7c 32 00 00 00 1c 00 00 40 05 | 33 c9 27 c8 b3 b4 b5 08 35 b6 cc fa 47 61 1b 02 | 31 02 bc 85 | state #658 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c0293f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7cf50 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #658 | libevent_malloc: new ptr-libevent@0x7fb340066bd0 size 128 | #658 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.248333 | resume sending helper answer for #658 suppresed complete_v2_state_transition() and stole MD | #658 spent 0.437 milliseconds in resume sending helper answer | stop processing: state #658 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c0b6a00 | processing resume sending helper answer for #651 | start processing: state #651 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 651 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #651 | **emit ISAKMP Message: | initiator cookie: | 1a 50 87 84 a9 ff b6 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-120 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1f b0 d0 63 93 36 3e 05 3f d8 d6 98 23 8b d3 09 | ikev2 g^x a6 00 78 13 01 81 1e 9a 9b 73 6c 03 e7 97 c7 1b | ikev2 g^x 0a 84 93 85 00 d2 0f 42 a2 06 09 3e ca 76 f7 20 | ikev2 g^x f7 d8 2e 7e 15 56 e2 ea a5 ef 8c bf ce 15 8f 1a | ikev2 g^x 88 09 23 43 98 ef d2 44 53 11 dd 26 74 25 6f 29 | ikev2 g^x ac 6e a0 99 63 72 d1 be b3 57 f6 ad 0a da 95 1d | ikev2 g^x 18 60 71 f8 41 7d 97 d6 6b 27 e3 ec fd 11 12 f8 | ikev2 g^x 81 67 3a 79 45 6a 47 cd 2e 49 43 bd e0 c1 62 f2 | ikev2 g^x 98 2c 58 06 87 2c 1f f7 a9 0d 52 20 8c e4 05 0f | ikev2 g^x 2e 1c b9 0f 26 b2 5f 0c 36 af 55 16 37 0a 50 fd | ikev2 g^x ed c4 bf 0b 03 c3 8c 74 4e 72 bf bb 10 a3 5f 5d | ikev2 g^x 2a ab df c6 32 de 1f 74 dd dc 29 6a 62 0f ba d6 | ikev2 g^x cd 7f 75 5b 18 56 b2 b2 8b 55 87 e0 a2 48 c7 1b | ikev2 g^x e5 1a 41 ad 6f a6 03 13 4f fb 3b 29 02 ab c7 ab | ikev2 g^x 64 51 03 a8 1c 6b a4 37 1a 86 e8 46 e4 11 b6 ca | ikev2 g^x 91 48 08 9a a4 54 04 35 e3 57 3e 39 2c d0 ca 88 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e4 4b ce 89 22 9c e4 d1 3c 9c 26 a1 ce 1d 7f ff | IKEv2 nonce e4 4b fb 0d e8 f0 df 0e 05 12 8e e2 48 e7 f9 11 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1a 50 87 84 a9 ff b6 9d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 78 | natd_hash: port= 01 f4 | natd_hash: hash= a4 9d 26 4f 15 14 5e 39 05 f8 cb 75 fe 3e e5 7e | natd_hash: hash= f0 bd 45 a1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a4 9d 26 4f 15 14 5e 39 05 f8 cb 75 fe 3e e5 7e | Notify data f0 bd 45 a1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1a 50 87 84 a9 ff b6 9d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ce 3e 0f f6 37 6f 31 d0 cc 66 b0 14 78 6d 46 0e | natd_hash: hash= eb 95 c2 dc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ce 3e 0f f6 37 6f 31 d0 cc 66 b0 14 78 6d 46 0e | Notify data eb 95 c2 dc | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #651 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #651 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #651 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #651: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #651 to 4294967295 after switching state | Message ID: IKE #651 skipping update_recv as MD is fake | Message ID: sent #651 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-120" #651: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.120:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #651) | 1a 50 87 84 a9 ff b6 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f b0 d0 63 93 36 3e 05 3f d8 d6 98 23 8b d3 09 | a6 00 78 13 01 81 1e 9a 9b 73 6c 03 e7 97 c7 1b | 0a 84 93 85 00 d2 0f 42 a2 06 09 3e ca 76 f7 20 | f7 d8 2e 7e 15 56 e2 ea a5 ef 8c bf ce 15 8f 1a | 88 09 23 43 98 ef d2 44 53 11 dd 26 74 25 6f 29 | ac 6e a0 99 63 72 d1 be b3 57 f6 ad 0a da 95 1d | 18 60 71 f8 41 7d 97 d6 6b 27 e3 ec fd 11 12 f8 | 81 67 3a 79 45 6a 47 cd 2e 49 43 bd e0 c1 62 f2 | 98 2c 58 06 87 2c 1f f7 a9 0d 52 20 8c e4 05 0f | 2e 1c b9 0f 26 b2 5f 0c 36 af 55 16 37 0a 50 fd | ed c4 bf 0b 03 c3 8c 74 4e 72 bf bb 10 a3 5f 5d | 2a ab df c6 32 de 1f 74 dd dc 29 6a 62 0f ba d6 | cd 7f 75 5b 18 56 b2 b2 8b 55 87 e0 a2 48 c7 1b | e5 1a 41 ad 6f a6 03 13 4f fb 3b 29 02 ab c7 ab | 64 51 03 a8 1c 6b a4 37 1a 86 e8 46 e4 11 b6 ca | 91 48 08 9a a4 54 04 35 e3 57 3e 39 2c d0 ca 88 | 29 00 00 24 e4 4b ce 89 22 9c e4 d1 3c 9c 26 a1 | ce 1d 7f ff e4 4b fb 0d e8 f0 df 0e 05 12 8e e2 | 48 e7 f9 11 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 9d 26 4f 15 14 5e 39 05 f8 cb 75 | fe 3e e5 7e f0 bd 45 a1 00 00 00 1c 00 00 40 05 | ce 3e 0f f6 37 6f 31 d0 cc 66 b0 14 78 6d 46 0e | eb 95 c2 dc | state #651 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb364045e60 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a468d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #651 | libevent_malloc: new ptr-libevent@0x7fb35c0b6a00 size 128 | #651 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.248794 | resume sending helper answer for #651 suppresed complete_v2_state_transition() and stole MD | #651 spent 0.438 milliseconds in resume sending helper answer | stop processing: state #651 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c069bf0 | processing resume sending helper answer for #677 | start processing: state #677 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 677 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #677 | **emit ISAKMP Message: | initiator cookie: | 50 8d 95 68 b5 8b 23 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-103 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 83 aa a4 8f c6 30 45 92 c5 cf a6 91 01 0a a1 43 | ikev2 g^x f1 38 e4 4c f2 1e 8b fa c7 cd 9a 24 20 65 ff bf | ikev2 g^x b9 f0 d7 e8 39 54 34 3b 5f 78 23 e6 41 b2 72 62 | ikev2 g^x 83 82 8d 5b 8e 9b 83 e0 88 f3 03 08 95 12 34 d3 | ikev2 g^x 98 d1 ba 80 21 88 79 5e ed 78 64 b4 3e 07 35 23 | ikev2 g^x 3f b8 8f 43 78 b2 9f 35 5d ad 57 da 20 57 19 f4 | ikev2 g^x dd 11 96 05 07 92 4e 19 0b bc 45 fd 48 2f 7a 41 | ikev2 g^x ab d6 c2 78 83 b9 51 5f c2 9d bc 1f 01 00 01 1c | ikev2 g^x 96 6e 62 37 71 03 98 70 25 42 9f e1 05 cf 75 d2 | ikev2 g^x 67 9b 63 9b 3f b6 19 96 2f ca 41 d1 e1 b6 6d 22 | ikev2 g^x 8c cb fe d6 b4 86 8e e1 27 c0 a0 24 76 f2 01 5a | ikev2 g^x 83 a9 0f 76 b1 07 35 33 4e 3e e0 dc 79 5e ed 29 | ikev2 g^x 09 64 22 34 77 8d 1f f2 ad 05 7e 1b e5 4c 10 9e | ikev2 g^x 58 06 f7 85 f5 dd f1 d9 0c cc f6 9f 69 01 27 29 | ikev2 g^x 70 68 3f aa 7e a2 7d 6e d3 92 55 84 0e e6 71 17 | ikev2 g^x 1e 78 67 9e 87 bb e2 70 02 96 cb 0b b6 30 ee b4 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 00 70 fb 22 7d 0c 48 97 e3 e3 bb dd b2 69 b0 26 | IKEv2 nonce 7d 9b cc 69 6d 71 bf ad 98 91 5c 5d 16 09 bb c0 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 50 8d 95 68 b5 8b 23 35 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 67 | natd_hash: port= 01 f4 | natd_hash: hash= 09 db ab 8b 76 c6 3a 27 c8 6b 4c e4 2b b7 a4 43 | natd_hash: hash= 65 c8 3b e1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 09 db ab 8b 76 c6 3a 27 c8 6b 4c e4 2b b7 a4 43 | Notify data 65 c8 3b e1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 50 8d 95 68 b5 8b 23 35 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a7 c6 26 92 93 c8 84 fd 1e 45 e2 6d 6b 62 ad e1 | natd_hash: hash= b6 74 b5 46 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a7 c6 26 92 93 c8 84 fd 1e 45 e2 6d 6b 62 ad e1 | Notify data b6 74 b5 46 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #677 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #677 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #677 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #677: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #677 to 4294967295 after switching state | Message ID: IKE #677 skipping update_recv as MD is fake | Message ID: sent #677 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-103" #677: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.103:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #677) | 50 8d 95 68 b5 8b 23 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 83 aa a4 8f c6 30 45 92 c5 cf a6 91 01 0a a1 43 | f1 38 e4 4c f2 1e 8b fa c7 cd 9a 24 20 65 ff bf | b9 f0 d7 e8 39 54 34 3b 5f 78 23 e6 41 b2 72 62 | 83 82 8d 5b 8e 9b 83 e0 88 f3 03 08 95 12 34 d3 | 98 d1 ba 80 21 88 79 5e ed 78 64 b4 3e 07 35 23 | 3f b8 8f 43 78 b2 9f 35 5d ad 57 da 20 57 19 f4 | dd 11 96 05 07 92 4e 19 0b bc 45 fd 48 2f 7a 41 | ab d6 c2 78 83 b9 51 5f c2 9d bc 1f 01 00 01 1c | 96 6e 62 37 71 03 98 70 25 42 9f e1 05 cf 75 d2 | 67 9b 63 9b 3f b6 19 96 2f ca 41 d1 e1 b6 6d 22 | 8c cb fe d6 b4 86 8e e1 27 c0 a0 24 76 f2 01 5a | 83 a9 0f 76 b1 07 35 33 4e 3e e0 dc 79 5e ed 29 | 09 64 22 34 77 8d 1f f2 ad 05 7e 1b e5 4c 10 9e | 58 06 f7 85 f5 dd f1 d9 0c cc f6 9f 69 01 27 29 | 70 68 3f aa 7e a2 7d 6e d3 92 55 84 0e e6 71 17 | 1e 78 67 9e 87 bb e2 70 02 96 cb 0b b6 30 ee b4 | 29 00 00 24 00 70 fb 22 7d 0c 48 97 e3 e3 bb dd | b2 69 b0 26 7d 9b cc 69 6d 71 bf ad 98 91 5c 5d | 16 09 bb c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 db ab 8b 76 c6 3a 27 c8 6b 4c e4 | 2b b7 a4 43 65 c8 3b e1 00 00 00 1c 00 00 40 05 | a7 c6 26 92 93 c8 84 fd 1e 45 e2 6d 6b 62 ad e1 | b6 74 b5 46 | state #677 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c04b850 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34000d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #677 | libevent_malloc: new ptr-libevent@0x7fb34c069bf0 size 128 | #677 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.249256 | resume sending helper answer for #677 suppresed complete_v2_state_transition() and stole MD | #677 spent 0.438 milliseconds in resume sending helper answer | stop processing: state #677 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c0720e0 | processing resume sending helper answer for #657 | start processing: state #657 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 657 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #657 | **emit ISAKMP Message: | initiator cookie: | bf 48 a9 53 c0 7c 6b d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-118 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4e 48 64 7a 76 84 6f 20 71 f2 54 53 61 b4 2f c6 | ikev2 g^x 54 76 e2 72 67 c3 02 01 5f 84 02 0f de 2d ba 04 | ikev2 g^x 6b 3c 60 21 8c fd c8 83 d8 de 0a 87 07 82 2c 85 | ikev2 g^x 16 8f 94 7d 11 fa ef a1 1b 06 7a dc 75 50 fb 5d | ikev2 g^x 8b a8 18 9b 6c fa 90 67 0b 98 3c ce 23 29 77 3a | ikev2 g^x 62 14 dc 91 f1 b1 30 3c 50 5a b7 ab a9 84 e0 d2 | ikev2 g^x ce d6 81 2a 09 a1 f6 27 12 d7 a8 6e 71 b4 d2 a3 | ikev2 g^x 42 60 96 28 6a 9a 98 b3 00 c1 ce 0e fa 8d 64 99 | ikev2 g^x 97 f3 81 78 89 04 b5 01 30 ce 7b 3b 03 13 20 ba | ikev2 g^x f7 13 2c 46 1a 99 04 0c d2 4c 52 fa 53 fc 61 38 | ikev2 g^x f6 1e 41 8e 82 00 e0 91 48 32 35 c0 7e 73 9a b9 | ikev2 g^x b3 a3 fd 92 08 58 7d 9d 6f 3a 6b fb 59 79 43 c3 | ikev2 g^x 78 f1 a6 f1 a4 85 3a d3 46 60 e6 af f5 9f 91 88 | ikev2 g^x 84 4f 9a 31 88 1a e0 60 7b 5c 36 77 35 25 9a 22 | ikev2 g^x 0a f3 1b 51 c9 cc 85 ea ce be 58 28 90 39 31 a8 | ikev2 g^x b5 d3 9f 05 f3 8e b3 99 94 db 0d 61 87 87 60 cd | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b1 1a 4e 72 ee 50 9a 55 3a 6a 4a 22 5c 8a 27 a4 | IKEv2 nonce f8 35 f8 89 7d bb de 47 9d 6c ce cd de bf 5d e6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= bf 48 a9 53 c0 7c 6b d9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 76 | natd_hash: port= 01 f4 | natd_hash: hash= 82 93 fd 1a 46 eb 2b 7c e7 8f 20 da 90 df ff 1b | natd_hash: hash= 3f 1b 91 27 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 82 93 fd 1a 46 eb 2b 7c e7 8f 20 da 90 df ff 1b | Notify data 3f 1b 91 27 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= bf 48 a9 53 c0 7c 6b d9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 66 8b 83 94 36 8b b6 4c fb 21 d6 7a 66 05 fe c3 | natd_hash: hash= a5 94 ca 7e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 66 8b 83 94 36 8b b6 4c fb 21 d6 7a 66 05 fe c3 | Notify data a5 94 ca 7e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #657 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #657 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #657 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #657: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #657 to 4294967295 after switching state | Message ID: IKE #657 skipping update_recv as MD is fake | Message ID: sent #657 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-118" #657: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.118:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #657) | bf 48 a9 53 c0 7c 6b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 48 64 7a 76 84 6f 20 71 f2 54 53 61 b4 2f c6 | 54 76 e2 72 67 c3 02 01 5f 84 02 0f de 2d ba 04 | 6b 3c 60 21 8c fd c8 83 d8 de 0a 87 07 82 2c 85 | 16 8f 94 7d 11 fa ef a1 1b 06 7a dc 75 50 fb 5d | 8b a8 18 9b 6c fa 90 67 0b 98 3c ce 23 29 77 3a | 62 14 dc 91 f1 b1 30 3c 50 5a b7 ab a9 84 e0 d2 | ce d6 81 2a 09 a1 f6 27 12 d7 a8 6e 71 b4 d2 a3 | 42 60 96 28 6a 9a 98 b3 00 c1 ce 0e fa 8d 64 99 | 97 f3 81 78 89 04 b5 01 30 ce 7b 3b 03 13 20 ba | f7 13 2c 46 1a 99 04 0c d2 4c 52 fa 53 fc 61 38 | f6 1e 41 8e 82 00 e0 91 48 32 35 c0 7e 73 9a b9 | b3 a3 fd 92 08 58 7d 9d 6f 3a 6b fb 59 79 43 c3 | 78 f1 a6 f1 a4 85 3a d3 46 60 e6 af f5 9f 91 88 | 84 4f 9a 31 88 1a e0 60 7b 5c 36 77 35 25 9a 22 | 0a f3 1b 51 c9 cc 85 ea ce be 58 28 90 39 31 a8 | b5 d3 9f 05 f3 8e b3 99 94 db 0d 61 87 87 60 cd | 29 00 00 24 b1 1a 4e 72 ee 50 9a 55 3a 6a 4a 22 | 5c 8a 27 a4 f8 35 f8 89 7d bb de 47 9d 6c ce cd | de bf 5d e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 93 fd 1a 46 eb 2b 7c e7 8f 20 da | 90 df ff 1b 3f 1b 91 27 00 00 00 1c 00 00 40 05 | 66 8b 83 94 36 8b b6 4c fb 21 d6 7a 66 05 fe c3 | a5 94 ca 7e | state #657 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388048a80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2b610 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b610 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #657 | libevent_malloc: new ptr-libevent@0x7fb37c0720e0 size 128 | #657 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.249711 | resume sending helper answer for #657 suppresed complete_v2_state_transition() and stole MD | #657 spent 0.43 milliseconds in resume sending helper answer | stop processing: state #657 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb33807a710 | processing resume sending helper answer for #622 | start processing: state #622 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 622 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #622 | **emit ISAKMP Message: | initiator cookie: | da 49 0a b3 65 ff 08 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-61 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8c 40 36 95 be 60 b3 e3 bd c7 ff 07 f3 83 00 12 | ikev2 g^x f5 6b 10 33 d3 d9 c4 b0 f6 be da 2b b1 9a 19 58 | ikev2 g^x 53 f9 8a 25 29 6a 79 82 da bb c2 fa 2c 51 78 6d | ikev2 g^x 66 2a 05 15 73 a7 b9 3e 1c 83 37 33 e7 f7 71 62 | ikev2 g^x 0c 9f 57 2f 7a c5 28 95 89 0c 4b d7 6a d0 b7 1b | ikev2 g^x 21 80 5c 28 7f 9a a4 6d ba 32 aa b8 62 c1 be b9 | ikev2 g^x 1e 50 93 7f bf 93 50 c9 41 bb 39 b6 d1 bb 95 dd | ikev2 g^x b2 a0 84 34 30 54 a8 a6 c8 5e f7 42 75 7c 55 3c | ikev2 g^x 9b ca c8 19 68 29 d0 62 32 30 2c 1d 35 db 78 87 | ikev2 g^x 06 dd 80 a1 55 b4 92 13 11 a1 52 06 d8 bf c1 d8 | ikev2 g^x 08 60 a4 8b 01 50 1c e7 e4 f4 33 ec e2 10 21 b6 | ikev2 g^x 14 e9 ff ce 64 51 80 1d e6 ab 36 5b 4f 73 34 4e | ikev2 g^x 32 2c 17 88 eb c6 5b 95 51 4b 06 b8 67 86 d4 7f | ikev2 g^x 6b d4 4d e7 eb 69 82 a6 9b 31 6c fc ae 3a 4b 50 | ikev2 g^x 0a 0b c3 8d 90 55 90 09 c4 39 73 b7 de f4 8c f8 | ikev2 g^x 43 4b 1b 65 eb 39 32 5c b3 32 de f7 b4 b6 0d 03 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e8 a4 b1 28 90 aa fa fa 7e c7 b0 2c 81 71 e5 06 | IKEv2 nonce ca 8a b3 bc 3e d2 88 e6 58 e0 15 d7 2d 90 46 30 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= da 49 0a b3 65 ff 08 28 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3d | natd_hash: port= 01 f4 | natd_hash: hash= 78 48 cd a5 f1 0b 32 76 b4 1e a7 ed c8 11 a6 bd | natd_hash: hash= 54 4b 50 5e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 78 48 cd a5 f1 0b 32 76 b4 1e a7 ed c8 11 a6 bd | Notify data 54 4b 50 5e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= da 49 0a b3 65 ff 08 28 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= bc ba d4 87 d8 ff 76 ca 98 8e bd 6e 57 4f 18 d4 | natd_hash: hash= 50 09 94 f7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bc ba d4 87 d8 ff 76 ca 98 8e bd 6e 57 4f 18 d4 | Notify data 50 09 94 f7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #622 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #622 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #622 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #622: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #622 to 4294967295 after switching state | Message ID: IKE #622 skipping update_recv as MD is fake | Message ID: sent #622 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-61" #622: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.61:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #622) | da 49 0a b3 65 ff 08 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 40 36 95 be 60 b3 e3 bd c7 ff 07 f3 83 00 12 | f5 6b 10 33 d3 d9 c4 b0 f6 be da 2b b1 9a 19 58 | 53 f9 8a 25 29 6a 79 82 da bb c2 fa 2c 51 78 6d | 66 2a 05 15 73 a7 b9 3e 1c 83 37 33 e7 f7 71 62 | 0c 9f 57 2f 7a c5 28 95 89 0c 4b d7 6a d0 b7 1b | 21 80 5c 28 7f 9a a4 6d ba 32 aa b8 62 c1 be b9 | 1e 50 93 7f bf 93 50 c9 41 bb 39 b6 d1 bb 95 dd | b2 a0 84 34 30 54 a8 a6 c8 5e f7 42 75 7c 55 3c | 9b ca c8 19 68 29 d0 62 32 30 2c 1d 35 db 78 87 | 06 dd 80 a1 55 b4 92 13 11 a1 52 06 d8 bf c1 d8 | 08 60 a4 8b 01 50 1c e7 e4 f4 33 ec e2 10 21 b6 | 14 e9 ff ce 64 51 80 1d e6 ab 36 5b 4f 73 34 4e | 32 2c 17 88 eb c6 5b 95 51 4b 06 b8 67 86 d4 7f | 6b d4 4d e7 eb 69 82 a6 9b 31 6c fc ae 3a 4b 50 | 0a 0b c3 8d 90 55 90 09 c4 39 73 b7 de f4 8c f8 | 43 4b 1b 65 eb 39 32 5c b3 32 de f7 b4 b6 0d 03 | 29 00 00 24 e8 a4 b1 28 90 aa fa fa 7e c7 b0 2c | 81 71 e5 06 ca 8a b3 bc 3e d2 88 e6 58 e0 15 d7 | 2d 90 46 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 48 cd a5 f1 0b 32 76 b4 1e a7 ed | c8 11 a6 bd 54 4b 50 5e 00 00 00 1c 00 00 40 05 | bc ba d4 87 d8 ff 76 ca 98 8e bd 6e 57 4f 18 d4 | 50 09 94 f7 | state #622 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344039b40 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb344017ea0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #622 | libevent_malloc: new ptr-libevent@0x7fb33807a710 size 128 | #622 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.250172 | resume sending helper answer for #622 suppresed complete_v2_state_transition() and stole MD | #622 spent 0.436 milliseconds in resume sending helper answer | stop processing: state #622 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34802a670 | processing resume sending helper answer for #652 | start processing: state #652 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 652 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #652 | **emit ISAKMP Message: | initiator cookie: | cf c2 13 dd be 13 c5 04 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-145 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 22 79 e0 0e 1a 26 5e 51 b7 a5 4e b3 11 14 4a 1a | ikev2 g^x 6b 96 3d 3b 24 26 a6 e1 89 0f fe 91 a7 c1 7a 45 | ikev2 g^x 26 cd 35 4b 8b 6b d6 67 91 8f b2 00 fc d7 fa 63 | ikev2 g^x 2b 58 54 f9 c8 77 8f d8 2a 48 b5 10 ef bf 28 f5 | ikev2 g^x 2b 01 2a b5 18 43 7b d2 1c 14 72 04 8a f2 52 ba | ikev2 g^x 8b 62 38 7c 84 16 57 0c 23 dd 5f e1 6d 4a 6a 89 | ikev2 g^x d0 08 7c 20 3c 72 d9 e8 1e 21 18 8e 13 54 9f 91 | ikev2 g^x d8 28 dd 9e 63 28 ad b3 cc 26 3f ce 02 f8 0d e7 | ikev2 g^x 43 fe 79 b9 17 32 6b 1f 49 79 5c 97 67 4f 3a 29 | ikev2 g^x c2 8a 0e 49 84 d5 bf 8e d2 4f bc 6f 4f 9d 2d 18 | ikev2 g^x 2f fc 66 90 24 12 d6 64 7d 6c 9d 94 39 e8 e1 57 | ikev2 g^x f1 94 1f 02 5b 88 4a 35 7d 48 05 cc fa 83 14 b9 | ikev2 g^x dd e0 c2 0e b0 3a 8a d8 a2 1c f4 35 ef 16 28 20 | ikev2 g^x 4a cf 5a 27 76 56 8a 88 e6 05 ec 34 f1 7b 00 b3 | ikev2 g^x 84 e3 67 51 85 c2 15 5b f0 1a bb bc c2 65 21 ca | ikev2 g^x 2f a8 c5 a1 e4 74 bb e7 a4 40 7f 41 4f 5a 73 b3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a4 50 57 9a 3a 57 4f 84 97 47 60 cc 90 ef 4f 57 | IKEv2 nonce df 90 96 08 71 29 36 b2 5c 92 88 88 e1 f8 f5 c6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cf c2 13 dd be 13 c5 04 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 91 | natd_hash: port= 01 f4 | natd_hash: hash= da c9 d5 de d7 08 a6 7f d2 6a f3 9f 8c b9 dd 2d | natd_hash: hash= 2d b7 3d 20 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data da c9 d5 de d7 08 a6 7f d2 6a f3 9f 8c b9 dd 2d | Notify data 2d b7 3d 20 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cf c2 13 dd be 13 c5 04 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ff d6 25 67 d8 96 d1 7e 81 61 53 f8 7f af e4 0b | natd_hash: hash= e5 df 07 44 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ff d6 25 67 d8 96 d1 7e 81 61 53 f8 7f af e4 0b | Notify data e5 df 07 44 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #652 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #652 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #652 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #652: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #652 to 4294967295 after switching state | Message ID: IKE #652 skipping update_recv as MD is fake | Message ID: sent #652 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-145" #652: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.145:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #652) | cf c2 13 dd be 13 c5 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 79 e0 0e 1a 26 5e 51 b7 a5 4e b3 11 14 4a 1a | 6b 96 3d 3b 24 26 a6 e1 89 0f fe 91 a7 c1 7a 45 | 26 cd 35 4b 8b 6b d6 67 91 8f b2 00 fc d7 fa 63 | 2b 58 54 f9 c8 77 8f d8 2a 48 b5 10 ef bf 28 f5 | 2b 01 2a b5 18 43 7b d2 1c 14 72 04 8a f2 52 ba | 8b 62 38 7c 84 16 57 0c 23 dd 5f e1 6d 4a 6a 89 | d0 08 7c 20 3c 72 d9 e8 1e 21 18 8e 13 54 9f 91 | d8 28 dd 9e 63 28 ad b3 cc 26 3f ce 02 f8 0d e7 | 43 fe 79 b9 17 32 6b 1f 49 79 5c 97 67 4f 3a 29 | c2 8a 0e 49 84 d5 bf 8e d2 4f bc 6f 4f 9d 2d 18 | 2f fc 66 90 24 12 d6 64 7d 6c 9d 94 39 e8 e1 57 | f1 94 1f 02 5b 88 4a 35 7d 48 05 cc fa 83 14 b9 | dd e0 c2 0e b0 3a 8a d8 a2 1c f4 35 ef 16 28 20 | 4a cf 5a 27 76 56 8a 88 e6 05 ec 34 f1 7b 00 b3 | 84 e3 67 51 85 c2 15 5b f0 1a bb bc c2 65 21 ca | 2f a8 c5 a1 e4 74 bb e7 a4 40 7f 41 4f 5a 73 b3 | 29 00 00 24 a4 50 57 9a 3a 57 4f 84 97 47 60 cc | 90 ef 4f 57 df 90 96 08 71 29 36 b2 5c 92 88 88 | e1 f8 f5 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da c9 d5 de d7 08 a6 7f d2 6a f3 9f | 8c b9 dd 2d 2d b7 3d 20 00 00 00 1c 00 00 40 05 | ff d6 25 67 d8 96 d1 7e 81 61 53 f8 7f af e4 0b | e5 df 07 44 | state #652 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38803c430 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb38800c4b0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348039e80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #652 | libevent_malloc: new ptr-libevent@0x7fb34802a670 size 128 | #652 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.25063 | resume sending helper answer for #652 suppresed complete_v2_state_transition() and stole MD | #652 spent 0.435 milliseconds in resume sending helper answer | stop processing: state #652 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35806a310 | processing resume sending helper answer for #665 | start processing: state #665 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 665 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #665 | **emit ISAKMP Message: | initiator cookie: | 17 f4 78 a9 59 a3 a0 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-135 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c5 53 db 21 ce 0d 36 e8 32 4f 09 2d c9 12 93 03 | ikev2 g^x 3f 0d c8 57 d9 b2 d5 94 66 f5 2c af dd d9 9f 30 | ikev2 g^x ab 23 90 f0 60 2c 56 f2 ed e4 3b 19 92 7c 90 60 | ikev2 g^x ad a9 f6 f4 89 a5 b5 8a bd 28 e0 e6 2a e1 c4 4a | ikev2 g^x ab 19 3e 76 a7 cb 3f f5 b4 c1 ac d5 eb a6 51 0b | ikev2 g^x a5 22 3b cf 5d 35 78 58 b3 7e 27 7d a0 c6 9b ff | ikev2 g^x 67 19 62 12 ee 59 54 21 85 49 cb 45 55 53 2d a0 | ikev2 g^x 2d 26 f7 0a c1 cb a3 d2 11 be 8a 38 9f cf c5 aa | ikev2 g^x b6 3b 08 8c da 2a e2 3b d8 47 c3 96 5b 2d 9b 87 | ikev2 g^x 46 cf 56 9a ec 1a 60 92 d6 f2 05 73 ff b2 0b ce | ikev2 g^x e0 8c 45 e1 18 34 9e 24 c1 08 e0 e0 af 89 f2 77 | ikev2 g^x 7e 12 a0 ae df 93 58 3e 41 53 7a 70 bc 01 86 20 | ikev2 g^x e2 3a 31 eb 69 7b 78 f4 7e c8 5b 4a d3 b5 a7 20 | ikev2 g^x ba dd f3 68 f1 50 e0 df d8 9c 38 0c 45 05 f8 e4 | ikev2 g^x 46 fc 25 f3 c6 e0 f9 ac 5e f5 b0 29 3e 15 55 f0 | ikev2 g^x 12 34 52 a4 54 c5 e2 07 e5 c7 8a 47 07 72 65 b1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d3 a0 68 c2 b3 be 73 5d 25 6c 72 85 4c a1 62 e3 | IKEv2 nonce da 82 77 49 9b ae c7 79 c0 29 55 4a d4 14 82 6b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 17 f4 78 a9 59 a3 a0 42 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 87 | natd_hash: port= 01 f4 | natd_hash: hash= 73 0c 4d bd 1f b3 c2 70 27 97 8c 0d 77 2f 10 0a | natd_hash: hash= 09 ce 7a e7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 73 0c 4d bd 1f b3 c2 70 27 97 8c 0d 77 2f 10 0a | Notify data 09 ce 7a e7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 17 f4 78 a9 59 a3 a0 42 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 59 08 d1 ed de 8d 28 01 5d dd 9a 01 fe e8 dd 16 | natd_hash: hash= e2 b8 56 65 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 59 08 d1 ed de 8d 28 01 5d dd 9a 01 fe e8 dd 16 | Notify data e2 b8 56 65 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #665 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #665 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #665 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #665: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #665 to 4294967295 after switching state | Message ID: IKE #665 skipping update_recv as MD is fake | Message ID: sent #665 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-135" #665: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.135:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #665) | 17 f4 78 a9 59 a3 a0 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 53 db 21 ce 0d 36 e8 32 4f 09 2d c9 12 93 03 | 3f 0d c8 57 d9 b2 d5 94 66 f5 2c af dd d9 9f 30 | ab 23 90 f0 60 2c 56 f2 ed e4 3b 19 92 7c 90 60 | ad a9 f6 f4 89 a5 b5 8a bd 28 e0 e6 2a e1 c4 4a | ab 19 3e 76 a7 cb 3f f5 b4 c1 ac d5 eb a6 51 0b | a5 22 3b cf 5d 35 78 58 b3 7e 27 7d a0 c6 9b ff | 67 19 62 12 ee 59 54 21 85 49 cb 45 55 53 2d a0 | 2d 26 f7 0a c1 cb a3 d2 11 be 8a 38 9f cf c5 aa | b6 3b 08 8c da 2a e2 3b d8 47 c3 96 5b 2d 9b 87 | 46 cf 56 9a ec 1a 60 92 d6 f2 05 73 ff b2 0b ce | e0 8c 45 e1 18 34 9e 24 c1 08 e0 e0 af 89 f2 77 | 7e 12 a0 ae df 93 58 3e 41 53 7a 70 bc 01 86 20 | e2 3a 31 eb 69 7b 78 f4 7e c8 5b 4a d3 b5 a7 20 | ba dd f3 68 f1 50 e0 df d8 9c 38 0c 45 05 f8 e4 | 46 fc 25 f3 c6 e0 f9 ac 5e f5 b0 29 3e 15 55 f0 | 12 34 52 a4 54 c5 e2 07 e5 c7 8a 47 07 72 65 b1 | 29 00 00 24 d3 a0 68 c2 b3 be 73 5d 25 6c 72 85 | 4c a1 62 e3 da 82 77 49 9b ae c7 79 c0 29 55 4a | d4 14 82 6b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 0c 4d bd 1f b3 c2 70 27 97 8c 0d | 77 2f 10 0a 09 ce 7a e7 00 00 00 1c 00 00 40 05 | 59 08 d1 ed de 8d 28 01 5d dd 9a 01 fe e8 dd 16 | e2 b8 56 65 | state #665 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c04b7c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad43c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad43c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #665 | libevent_malloc: new ptr-libevent@0x7fb35806a310 size 128 | #665 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.251061 | resume sending helper answer for #665 suppresed complete_v2_state_transition() and stole MD | #665 spent 0.407 milliseconds in resume sending helper answer | stop processing: state #665 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb370069fb0 | processing resume sending helper answer for #666 | start processing: state #666 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 666 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #666 | **emit ISAKMP Message: | initiator cookie: | af 55 d1 c9 76 35 30 c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-141 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5c a3 85 78 4d da 5e d0 32 3e 9d 3d 1a 3d d3 8c | ikev2 g^x 75 15 1f b6 cd 02 be d3 50 94 f0 58 88 ee b8 fc | ikev2 g^x c3 9d d9 05 29 33 e6 db b9 03 a3 91 03 b9 32 e2 | ikev2 g^x 8d fb 3b 7d 1c 57 d3 23 cc ff 02 0a e8 64 c5 f1 | ikev2 g^x e9 72 3f f6 5e 2f 3d 0a 9f 40 47 53 42 c4 5a 15 | ikev2 g^x 56 44 cd da 2b f5 35 b4 37 9d 04 5d 25 e6 c0 9b | ikev2 g^x b3 63 e8 21 ae c1 4f bc fd b7 b4 1b 32 47 ef 1c | ikev2 g^x 87 37 97 c0 17 13 75 a3 52 27 4c 6b eb 0e 51 30 | ikev2 g^x d3 3f 38 9d 4d 1b e4 dc 3e ff 0a f9 c7 c5 15 46 | ikev2 g^x 17 54 ca 31 e4 f9 c3 f7 5a fe 09 54 b8 94 74 b2 | ikev2 g^x b0 37 00 fa f9 27 9d 2b f7 90 e1 a7 8d f1 47 7f | ikev2 g^x e5 3b cd 7d 99 d8 c5 f7 ca ba 6e c7 10 b5 29 30 | ikev2 g^x dd 2c 8d e4 5c 1c f8 af 25 ac 3f 4d c8 75 38 48 | ikev2 g^x f5 61 6b ae 49 2f 44 0d d2 eb a5 27 c3 0a b7 53 | ikev2 g^x 3e b0 4a 01 d2 cc 09 c9 d4 f8 e4 3d 8d 15 85 bd | ikev2 g^x 63 cd 9a fe 1f 70 56 b3 af c7 75 be 72 96 94 7b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce de 7e cf 42 4e bf 8e d5 7b 3b aa 12 1e 0d 89 09 | IKEv2 nonce 17 65 63 a9 70 48 ad 13 bd 01 8c 63 96 2c 21 7c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= af 55 d1 c9 76 35 30 c5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8d | natd_hash: port= 01 f4 | natd_hash: hash= 4e 21 75 3c af 69 72 49 98 23 f2 8c f4 76 7b 19 | natd_hash: hash= c1 d1 00 01 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4e 21 75 3c af 69 72 49 98 23 f2 8c f4 76 7b 19 | Notify data c1 d1 00 01 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= af 55 d1 c9 76 35 30 c5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6a 1a 2b ed 94 cf f9 2f b3 a8 2d 85 01 1b c3 59 | natd_hash: hash= 84 9c 27 2f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6a 1a 2b ed 94 cf f9 2f b3 a8 2d 85 01 1b c3 59 | Notify data 84 9c 27 2f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #666 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #666 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #666 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #666: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #666 to 4294967295 after switching state | Message ID: IKE #666 skipping update_recv as MD is fake | Message ID: sent #666 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-141" #666: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.141:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #666) | af 55 d1 c9 76 35 30 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c a3 85 78 4d da 5e d0 32 3e 9d 3d 1a 3d d3 8c | 75 15 1f b6 cd 02 be d3 50 94 f0 58 88 ee b8 fc | c3 9d d9 05 29 33 e6 db b9 03 a3 91 03 b9 32 e2 | 8d fb 3b 7d 1c 57 d3 23 cc ff 02 0a e8 64 c5 f1 | e9 72 3f f6 5e 2f 3d 0a 9f 40 47 53 42 c4 5a 15 | 56 44 cd da 2b f5 35 b4 37 9d 04 5d 25 e6 c0 9b | b3 63 e8 21 ae c1 4f bc fd b7 b4 1b 32 47 ef 1c | 87 37 97 c0 17 13 75 a3 52 27 4c 6b eb 0e 51 30 | d3 3f 38 9d 4d 1b e4 dc 3e ff 0a f9 c7 c5 15 46 | 17 54 ca 31 e4 f9 c3 f7 5a fe 09 54 b8 94 74 b2 | b0 37 00 fa f9 27 9d 2b f7 90 e1 a7 8d f1 47 7f | e5 3b cd 7d 99 d8 c5 f7 ca ba 6e c7 10 b5 29 30 | dd 2c 8d e4 5c 1c f8 af 25 ac 3f 4d c8 75 38 48 | f5 61 6b ae 49 2f 44 0d d2 eb a5 27 c3 0a b7 53 | 3e b0 4a 01 d2 cc 09 c9 d4 f8 e4 3d 8d 15 85 bd | 63 cd 9a fe 1f 70 56 b3 af c7 75 be 72 96 94 7b | 29 00 00 24 de 7e cf 42 4e bf 8e d5 7b 3b aa 12 | 1e 0d 89 09 17 65 63 a9 70 48 ad 13 bd 01 8c 63 | 96 2c 21 7c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 21 75 3c af 69 72 49 98 23 f2 8c | f4 76 7b 19 c1 d1 00 01 00 00 00 1c 00 00 40 05 | 6a 1a 2b ed 94 cf f9 2f b3 a8 2d 85 01 1b c3 59 | 84 9c 27 2f | state #666 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb338048a10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a92f40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #666 | libevent_malloc: new ptr-libevent@0x7fb370069fb0 size 128 | #666 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.251549 | resume sending helper answer for #666 suppresed complete_v2_state_transition() and stole MD | #666 spent 0.461 milliseconds in resume sending helper answer | stop processing: state #666 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb384076770 | processing resume sending helper answer for #669 | start processing: state #669 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 669 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #669 | **emit ISAKMP Message: | initiator cookie: | 46 a2 b7 1a 0c fe 64 26 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-180 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7e 31 53 7e b2 89 dd d9 14 72 7d 9f c9 13 b2 a7 | ikev2 g^x 63 19 33 b8 10 a2 fe 59 17 6b 7c b7 37 86 65 b5 | ikev2 g^x 65 e2 70 cb 0a 7f 2e 78 64 ed 5e 82 f3 0a 01 66 | ikev2 g^x 19 63 cb 22 32 9a 15 07 e2 8f 9f 13 78 a1 94 38 | ikev2 g^x 6a 3a a9 9c 68 86 57 44 79 fe f5 47 ce f2 42 04 | ikev2 g^x 1b 64 29 d4 d9 a8 31 e2 d6 94 ff 12 34 20 67 33 | ikev2 g^x 3f eb 27 b6 ea 9f 51 b5 31 d7 e4 79 d1 75 2f 2e | ikev2 g^x 0b e0 61 43 30 7c 1e 88 88 5d ae 34 52 7d 83 d2 | ikev2 g^x 70 96 22 1a 57 50 af 3c 3f b0 a5 d1 35 bc b2 a5 | ikev2 g^x 5d a3 98 e3 c3 65 34 bb 25 67 04 de 8f f7 d1 38 | ikev2 g^x 62 08 6f 4a 4f 97 9e 27 42 a1 3c af a0 71 dc e9 | ikev2 g^x 88 9c e5 3e 13 70 8a 7a 18 08 7e f5 c7 28 a8 96 | ikev2 g^x ea c1 cd 65 03 cd 4a 04 4f c8 6b 29 fd ca 51 41 | ikev2 g^x 35 65 3e 5d 3d d3 fe 1c ec d9 09 50 c2 51 46 0d | ikev2 g^x d8 9f 47 d1 97 f0 ab 20 09 d6 b0 da 46 e7 a7 26 | ikev2 g^x 2f 67 cc 15 6a c3 da b4 1c a5 57 88 dc 7d ec 25 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a1 72 a5 b5 61 3e 68 21 f0 1b e4 c9 7e f5 3a 1e | IKEv2 nonce e4 e5 46 a1 1b 4c 51 eb 2c c7 94 6e bc 3a ce d6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 46 a2 b7 1a 0c fe 64 26 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b4 | natd_hash: port= 01 f4 | natd_hash: hash= c3 dd 73 ee 85 14 4c 35 d3 87 b0 51 27 94 ae 1d | natd_hash: hash= 74 91 ea ff | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c3 dd 73 ee 85 14 4c 35 d3 87 b0 51 27 94 ae 1d | Notify data 74 91 ea ff | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 46 a2 b7 1a 0c fe 64 26 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6b 7f 6d de b3 f2 f1 3e 78 85 e6 36 cd 13 84 01 | natd_hash: hash= 5d a6 40 15 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6b 7f 6d de b3 f2 f1 3e 78 85 e6 36 cd 13 84 01 | Notify data 5d a6 40 15 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #669 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #669 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #669 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #669: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #669 to 4294967295 after switching state | Message ID: IKE #669 skipping update_recv as MD is fake | Message ID: sent #669 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-180" #669: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.180:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #669) | 46 a2 b7 1a 0c fe 64 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e 31 53 7e b2 89 dd d9 14 72 7d 9f c9 13 b2 a7 | 63 19 33 b8 10 a2 fe 59 17 6b 7c b7 37 86 65 b5 | 65 e2 70 cb 0a 7f 2e 78 64 ed 5e 82 f3 0a 01 66 | 19 63 cb 22 32 9a 15 07 e2 8f 9f 13 78 a1 94 38 | 6a 3a a9 9c 68 86 57 44 79 fe f5 47 ce f2 42 04 | 1b 64 29 d4 d9 a8 31 e2 d6 94 ff 12 34 20 67 33 | 3f eb 27 b6 ea 9f 51 b5 31 d7 e4 79 d1 75 2f 2e | 0b e0 61 43 30 7c 1e 88 88 5d ae 34 52 7d 83 d2 | 70 96 22 1a 57 50 af 3c 3f b0 a5 d1 35 bc b2 a5 | 5d a3 98 e3 c3 65 34 bb 25 67 04 de 8f f7 d1 38 | 62 08 6f 4a 4f 97 9e 27 42 a1 3c af a0 71 dc e9 | 88 9c e5 3e 13 70 8a 7a 18 08 7e f5 c7 28 a8 96 | ea c1 cd 65 03 cd 4a 04 4f c8 6b 29 fd ca 51 41 | 35 65 3e 5d 3d d3 fe 1c ec d9 09 50 c2 51 46 0d | d8 9f 47 d1 97 f0 ab 20 09 d6 b0 da 46 e7 a7 26 | 2f 67 cc 15 6a c3 da b4 1c a5 57 88 dc 7d ec 25 | 29 00 00 24 a1 72 a5 b5 61 3e 68 21 f0 1b e4 c9 | 7e f5 3a 1e e4 e5 46 a1 1b 4c 51 eb 2c c7 94 6e | bc 3a ce d6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 dd 73 ee 85 14 4c 35 d3 87 b0 51 | 27 94 ae 1d 74 91 ea ff 00 00 00 1c 00 00 40 05 | 6b 7f 6d de b3 f2 f1 3e 78 85 e6 36 cd 13 84 01 | 5d a6 40 15 | state #669 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb348023e80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb384002b20 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #669 | libevent_malloc: new ptr-libevent@0x7fb384076770 size 128 | #669 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.252027 | resume sending helper answer for #669 suppresed complete_v2_state_transition() and stole MD | #669 spent 0.451 milliseconds in resume sending helper answer | stop processing: state #669 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb364080140 | processing resume sending helper answer for #627 | start processing: state #627 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 627 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #627 | **emit ISAKMP Message: | initiator cookie: | 85 ff 81 8d 39 ae d0 f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-161 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f1 b9 1b a0 9a 2c 50 8e 02 95 9b 5f 3b 83 99 4e | ikev2 g^x 07 74 8d 16 ae 8c bf 98 d2 8b cb e9 a7 c0 0d 94 | ikev2 g^x 88 9d dd 9b 54 84 6a 7f 4a dc 84 92 79 46 91 fa | ikev2 g^x 6c 85 8d b3 55 b3 d1 e1 35 12 39 9d da 6c 29 94 | ikev2 g^x 61 2d cc 21 47 bc b2 6d 88 1a 4a 94 f3 43 7b d9 | ikev2 g^x 8f 20 77 79 db 4d 47 13 73 be 1f 12 57 25 9e da | ikev2 g^x cb ff 72 15 51 1f 53 22 a4 a5 4d 16 f4 f5 a8 77 | ikev2 g^x 72 b7 12 ba 58 1a 43 7f ce ef 32 64 0f 90 fb f0 | ikev2 g^x 98 cc 71 a3 6d f2 87 79 fa 29 62 da 22 a4 18 69 | ikev2 g^x 55 35 d1 f8 9d 44 18 aa bf 4b 02 e9 29 b8 5f bd | ikev2 g^x 16 17 ad f8 d3 f6 25 bb 24 f5 6e 8c 20 d9 44 9d | ikev2 g^x 67 1d 54 cc 02 45 19 dc 2a 2c 20 34 4f 14 45 ba | ikev2 g^x 5a 79 14 e1 00 9c 1f b6 a0 9b 07 d7 22 e1 98 15 | ikev2 g^x a7 b0 4f d0 ee 43 65 3a c3 b4 42 49 47 06 50 31 | ikev2 g^x c0 75 69 4b d6 fc bf 2f 2f 07 7d 00 fb 73 c9 83 | ikev2 g^x d0 e8 66 df af 0f bf 7d 27 62 7e bc 01 f7 d2 fa | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e2 15 33 1a 7b 95 48 00 21 d4 69 5b 6e 98 84 ff | IKEv2 nonce 1a 3b 2c ef f5 83 72 31 b0 15 1c 81 c6 0c 3d b8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 85 ff 81 8d 39 ae d0 f7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a1 | natd_hash: port= 01 f4 | natd_hash: hash= 16 ee 1c 29 3c 33 ab 04 ff 5a 9a b8 a2 4b f5 11 | natd_hash: hash= 1c 8a 96 c4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 16 ee 1c 29 3c 33 ab 04 ff 5a 9a b8 a2 4b f5 11 | Notify data 1c 8a 96 c4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 85 ff 81 8d 39 ae d0 f7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c2 8c 6c e3 eb bc 71 3c c4 77 e2 2a 2f 10 8a 7a | natd_hash: hash= 93 a1 3f 6b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c2 8c 6c e3 eb bc 71 3c c4 77 e2 2a 2f 10 8a 7a | Notify data 93 a1 3f 6b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #627 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #627 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #627 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #627: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #627 to 4294967295 after switching state | Message ID: IKE #627 skipping update_recv as MD is fake | Message ID: sent #627 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-161" #627: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.161:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #627) | 85 ff 81 8d 39 ae d0 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 b9 1b a0 9a 2c 50 8e 02 95 9b 5f 3b 83 99 4e | 07 74 8d 16 ae 8c bf 98 d2 8b cb e9 a7 c0 0d 94 | 88 9d dd 9b 54 84 6a 7f 4a dc 84 92 79 46 91 fa | 6c 85 8d b3 55 b3 d1 e1 35 12 39 9d da 6c 29 94 | 61 2d cc 21 47 bc b2 6d 88 1a 4a 94 f3 43 7b d9 | 8f 20 77 79 db 4d 47 13 73 be 1f 12 57 25 9e da | cb ff 72 15 51 1f 53 22 a4 a5 4d 16 f4 f5 a8 77 | 72 b7 12 ba 58 1a 43 7f ce ef 32 64 0f 90 fb f0 | 98 cc 71 a3 6d f2 87 79 fa 29 62 da 22 a4 18 69 | 55 35 d1 f8 9d 44 18 aa bf 4b 02 e9 29 b8 5f bd | 16 17 ad f8 d3 f6 25 bb 24 f5 6e 8c 20 d9 44 9d | 67 1d 54 cc 02 45 19 dc 2a 2c 20 34 4f 14 45 ba | 5a 79 14 e1 00 9c 1f b6 a0 9b 07 d7 22 e1 98 15 | a7 b0 4f d0 ee 43 65 3a c3 b4 42 49 47 06 50 31 | c0 75 69 4b d6 fc bf 2f 2f 07 7d 00 fb 73 c9 83 | d0 e8 66 df af 0f bf 7d 27 62 7e bc 01 f7 d2 fa | 29 00 00 24 e2 15 33 1a 7b 95 48 00 21 d4 69 5b | 6e 98 84 ff 1a 3b 2c ef f5 83 72 31 b0 15 1c 81 | c6 0c 3d b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 ee 1c 29 3c 33 ab 04 ff 5a 9a b8 | a2 4b f5 11 1c 8a 96 c4 00 00 00 1c 00 00 40 05 | c2 8c 6c e3 eb bc 71 3c c4 77 e2 2a 2f 10 8a 7a | 93 a1 3f 6b | state #627 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3740356e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aa1f00 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa1f00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #627 | libevent_malloc: new ptr-libevent@0x7fb364080140 size 128 | #627 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.252506 | resume sending helper answer for #627 suppresed complete_v2_state_transition() and stole MD | #627 spent 0.446 milliseconds in resume sending helper answer | stop processing: state #627 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36801a4e0 | processing resume sending helper answer for #620 | start processing: state #620 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 620 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #620 | **emit ISAKMP Message: | initiator cookie: | 0c 12 15 e7 a2 ca 8d 0b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-63 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c8 3f 5e 3f 99 f7 2c cd 5d 9d 10 28 3d d6 eb 5d | ikev2 g^x d6 70 92 22 81 10 39 84 c3 22 a4 4b 22 26 4e c3 | ikev2 g^x 43 c3 37 59 00 1d 7e 63 45 c0 26 a8 98 4a b1 47 | ikev2 g^x c1 33 a4 a4 90 f5 4b 5f 23 ab b3 25 78 4e f7 a4 | ikev2 g^x f5 a4 93 56 5e 09 41 80 4c 5b e0 55 80 1b 24 4e | ikev2 g^x aa f2 33 07 2b 18 44 d7 f2 64 d4 1c b4 47 33 ae | ikev2 g^x d6 d7 60 0c 88 02 96 73 4b 3e e1 3f 8e 0f cd 2b | ikev2 g^x 4f 43 e0 dc f5 25 3d f1 3c 28 8e 72 59 95 64 7c | ikev2 g^x 38 6c b8 23 04 21 89 f8 a5 70 08 2e 75 aa 14 af | ikev2 g^x e8 5d 1a 6b 12 19 09 99 3e e3 e5 85 d8 78 ef 8d | ikev2 g^x 24 1e c5 bf 13 b7 ef 62 4f 9a 47 1e b2 de 4c a2 | ikev2 g^x 66 69 d3 df fc f2 1b e9 88 8e 7d 9a 64 f1 c5 88 | ikev2 g^x b5 0e 03 d2 24 45 b0 15 4d 1f 26 ae 6d 58 30 94 | ikev2 g^x ad 64 eb 3c 81 d9 0e 5a e4 30 43 31 ff 25 8a 7d | ikev2 g^x 43 87 60 41 58 98 d9 b1 94 9c cb 6c 2b f6 03 9e | ikev2 g^x 5e 6f 4d 36 24 f7 c6 bf 51 85 e7 d4 54 b0 61 7f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e6 bf 33 37 4b e1 e6 6d 80 47 43 de 67 a6 13 22 | IKEv2 nonce fb fc d2 c4 87 31 c8 58 f0 30 ac 5f e0 4a 7b ab | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0c 12 15 e7 a2 ca 8d 0b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3f | natd_hash: port= 01 f4 | natd_hash: hash= 6a 41 62 8d ec b8 5e 72 37 70 1d f8 93 d1 d1 32 | natd_hash: hash= a2 e2 38 e4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6a 41 62 8d ec b8 5e 72 37 70 1d f8 93 d1 d1 32 | Notify data a2 e2 38 e4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0c 12 15 e7 a2 ca 8d 0b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9f 9a 22 83 1f 86 8c 5b a2 81 5b 71 ab 0e 9a 59 | natd_hash: hash= 82 5d 35 a1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9f 9a 22 83 1f 86 8c 5b a2 81 5b 71 ab 0e 9a 59 | Notify data 82 5d 35 a1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #620 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #620 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #620 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #620: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #620 to 4294967295 after switching state | Message ID: IKE #620 skipping update_recv as MD is fake | Message ID: sent #620 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-63" #620: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.63:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #620) | 0c 12 15 e7 a2 ca 8d 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 3f 5e 3f 99 f7 2c cd 5d 9d 10 28 3d d6 eb 5d | d6 70 92 22 81 10 39 84 c3 22 a4 4b 22 26 4e c3 | 43 c3 37 59 00 1d 7e 63 45 c0 26 a8 98 4a b1 47 | c1 33 a4 a4 90 f5 4b 5f 23 ab b3 25 78 4e f7 a4 | f5 a4 93 56 5e 09 41 80 4c 5b e0 55 80 1b 24 4e | aa f2 33 07 2b 18 44 d7 f2 64 d4 1c b4 47 33 ae | d6 d7 60 0c 88 02 96 73 4b 3e e1 3f 8e 0f cd 2b | 4f 43 e0 dc f5 25 3d f1 3c 28 8e 72 59 95 64 7c | 38 6c b8 23 04 21 89 f8 a5 70 08 2e 75 aa 14 af | e8 5d 1a 6b 12 19 09 99 3e e3 e5 85 d8 78 ef 8d | 24 1e c5 bf 13 b7 ef 62 4f 9a 47 1e b2 de 4c a2 | 66 69 d3 df fc f2 1b e9 88 8e 7d 9a 64 f1 c5 88 | b5 0e 03 d2 24 45 b0 15 4d 1f 26 ae 6d 58 30 94 | ad 64 eb 3c 81 d9 0e 5a e4 30 43 31 ff 25 8a 7d | 43 87 60 41 58 98 d9 b1 94 9c cb 6c 2b f6 03 9e | 5e 6f 4d 36 24 f7 c6 bf 51 85 e7 d4 54 b0 61 7f | 29 00 00 24 e6 bf 33 37 4b e1 e6 6d 80 47 43 de | 67 a6 13 22 fb fc d2 c4 87 31 c8 58 f0 30 ac 5f | e0 4a 7b ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 41 62 8d ec b8 5e 72 37 70 1d f8 | 93 d1 d1 32 a2 e2 38 e4 00 00 00 1c 00 00 40 05 | 9f 9a 22 83 1f 86 8c 5b a2 81 5b 71 ab 0e 9a 59 | 82 5d 35 a1 | state #620 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3780407f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aacc80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36801d710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #620 | libevent_malloc: new ptr-libevent@0x7fb36801a4e0 size 128 | #620 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.252847 | resume sending helper answer for #620 suppresed complete_v2_state_transition() and stole MD | #620 spent 0.314 milliseconds in resume sending helper answer | stop processing: state #620 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb344069ec0 | processing resume sending helper answer for #662 | start processing: state #662 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 662 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #662 | **emit ISAKMP Message: | initiator cookie: | 6f f8 26 3d 46 67 06 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-116 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e1 15 32 77 43 3f ae 4b c7 5f 3f 2b dd 7f d3 1e | ikev2 g^x dd c1 5f 13 88 1d 29 8c 3e da 8c 02 5a 8d f6 d1 | ikev2 g^x 3f a3 f0 0a 58 d4 04 d3 f0 b3 db 26 fc 33 ce 46 | ikev2 g^x ec 5c 90 e3 6a 12 91 6d f5 be 55 11 24 66 8b cd | ikev2 g^x 51 d1 6c 4f ab d6 35 10 55 bd 81 f3 c5 9b 26 2d | ikev2 g^x f4 3f 70 2d c2 69 41 11 99 68 6f d6 67 f7 0b 94 | ikev2 g^x 16 15 37 50 dd 26 25 c5 03 89 2e cb 46 72 37 83 | ikev2 g^x a6 ca 48 57 46 11 c8 fc 49 a5 3f 23 f4 8e fd 9b | ikev2 g^x bd 5e f8 86 fe e9 d6 03 94 fe b5 73 a0 97 a8 36 | ikev2 g^x f8 6d 97 05 65 b5 9b 5b a3 4c 3e 56 89 a0 18 c6 | ikev2 g^x 54 22 3c 22 df 8c 9f 6b 24 e7 85 e4 91 73 3e dd | ikev2 g^x 3a 3d 86 ec 02 50 a4 d4 9b 1e ca d9 b8 85 33 11 | ikev2 g^x 56 6c a0 81 f5 30 19 45 f3 7e 2d d0 fe 89 3f 3f | ikev2 g^x 64 51 16 e1 24 be 5d 31 7c b3 98 ff 06 a6 e7 a9 | ikev2 g^x 85 09 74 83 46 27 19 d4 40 fc 28 57 e7 6b be 01 | ikev2 g^x 31 d5 96 a2 39 76 f1 7c 9a 2f 1e 01 ba e4 af 67 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 66 62 42 f7 ff d9 33 d8 69 d9 c8 18 14 3e 2e de | IKEv2 nonce dd 0a 0a 0c a5 a3 31 2b 3b 0a 7e 9b 7e 11 99 22 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6f f8 26 3d 46 67 06 44 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 74 | natd_hash: port= 01 f4 | natd_hash: hash= c3 54 03 6e e6 e0 19 5c f9 e0 4b 25 45 a9 f7 08 | natd_hash: hash= e7 02 7d 4a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c3 54 03 6e e6 e0 19 5c f9 e0 4b 25 45 a9 f7 08 | Notify data e7 02 7d 4a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6f f8 26 3d 46 67 06 44 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 8b cf 33 fc 59 1a 80 29 98 08 22 36 83 94 58 20 | natd_hash: hash= 7d d0 3f 09 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8b cf 33 fc 59 1a 80 29 98 08 22 36 83 94 58 20 | Notify data 7d d0 3f 09 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #662 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #662 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #662 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #662: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #662 to 4294967295 after switching state | Message ID: IKE #662 skipping update_recv as MD is fake | Message ID: sent #662 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-116" #662: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.116:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #662) | 6f f8 26 3d 46 67 06 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e1 15 32 77 43 3f ae 4b c7 5f 3f 2b dd 7f d3 1e | dd c1 5f 13 88 1d 29 8c 3e da 8c 02 5a 8d f6 d1 | 3f a3 f0 0a 58 d4 04 d3 f0 b3 db 26 fc 33 ce 46 | ec 5c 90 e3 6a 12 91 6d f5 be 55 11 24 66 8b cd | 51 d1 6c 4f ab d6 35 10 55 bd 81 f3 c5 9b 26 2d | f4 3f 70 2d c2 69 41 11 99 68 6f d6 67 f7 0b 94 | 16 15 37 50 dd 26 25 c5 03 89 2e cb 46 72 37 83 | a6 ca 48 57 46 11 c8 fc 49 a5 3f 23 f4 8e fd 9b | bd 5e f8 86 fe e9 d6 03 94 fe b5 73 a0 97 a8 36 | f8 6d 97 05 65 b5 9b 5b a3 4c 3e 56 89 a0 18 c6 | 54 22 3c 22 df 8c 9f 6b 24 e7 85 e4 91 73 3e dd | 3a 3d 86 ec 02 50 a4 d4 9b 1e ca d9 b8 85 33 11 | 56 6c a0 81 f5 30 19 45 f3 7e 2d d0 fe 89 3f 3f | 64 51 16 e1 24 be 5d 31 7c b3 98 ff 06 a6 e7 a9 | 85 09 74 83 46 27 19 d4 40 fc 28 57 e7 6b be 01 | 31 d5 96 a2 39 76 f1 7c 9a 2f 1e 01 ba e4 af 67 | 29 00 00 24 66 62 42 f7 ff d9 33 d8 69 d9 c8 18 | 14 3e 2e de dd 0a 0a 0c a5 a3 31 2b 3b 0a 7e 9b | 7e 11 99 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 54 03 6e e6 e0 19 5c f9 e0 4b 25 | 45 a9 f7 08 e7 02 7d 4a 00 00 00 1c 00 00 40 05 | 8b cf 33 fc 59 1a 80 29 98 08 22 36 83 94 58 20 | 7d d0 3f 09 | state #662 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37800f1a0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37801d970 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37801d970 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #662 | libevent_malloc: new ptr-libevent@0x7fb344069ec0 size 128 | #662 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.253168 | resume sending helper answer for #662 suppresed complete_v2_state_transition() and stole MD | #662 spent 0.3 milliseconds in resume sending helper answer | stop processing: state #662 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38807ae10 | processing resume sending helper answer for #671 | start processing: state #671 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 671 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #671 | **emit ISAKMP Message: | initiator cookie: | 1d 22 92 7a 9f 62 65 40 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-184 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x aa 2c 7e 91 0a 22 90 c2 45 ac 5c be 32 c1 2c 12 | ikev2 g^x 60 a0 27 f2 55 e3 d1 89 c8 99 22 25 59 aa a7 04 | ikev2 g^x 17 46 2e ba 00 09 b9 71 47 e5 94 f1 fd 69 0a 57 | ikev2 g^x 38 00 5b 86 84 a5 d3 6a b3 9c 35 a1 da c4 1c 25 | ikev2 g^x 30 41 58 88 f1 bf 1e cf 5a 7d fb 1d 85 56 82 39 | ikev2 g^x 48 55 e9 bc e2 cf e9 2c 33 f4 34 3c 90 b2 b4 75 | ikev2 g^x 55 ca c1 69 86 54 f4 e5 53 67 e4 36 3b 66 24 10 | ikev2 g^x f0 0c b4 a6 bf 13 a9 41 25 2d 85 e0 59 37 ea 35 | ikev2 g^x d2 8a c7 72 04 28 dd 8d 9b 4e ca cb e3 07 69 b0 | ikev2 g^x 38 54 bb b4 47 09 ee 08 0f 47 c5 fd 50 05 d7 4c | ikev2 g^x 28 db 90 75 c2 2f 8c 55 54 db d4 30 5e b3 32 4e | ikev2 g^x 8c 3b 51 5c d3 59 a0 69 16 c0 1d 8a fe c4 69 9c | ikev2 g^x 6b 52 61 76 6f 1f 1d 99 1f 0b 05 d3 73 0a d9 48 | ikev2 g^x 53 6d fb ef 5d b9 22 d3 44 19 94 f4 70 f2 9d 04 | ikev2 g^x d7 54 79 2f 9c a0 ae 3d d3 fe 22 0d 74 1b 5b cc | ikev2 g^x e2 cd 80 63 5d 5b 97 5a 19 0e 2c 9e 2b 0b 57 7c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 89 d7 93 c3 18 08 d5 d6 83 2a 2a be a0 ca 86 6f | IKEv2 nonce 9a 4f 6b 29 8c ce f9 83 c0 a5 93 03 8e 0f 90 b6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1d 22 92 7a 9f 62 65 40 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b8 | natd_hash: port= 01 f4 | natd_hash: hash= b9 a9 60 fe 19 43 95 a6 13 de 16 7a 81 94 84 c9 | natd_hash: hash= e7 e2 6b 0c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b9 a9 60 fe 19 43 95 a6 13 de 16 7a 81 94 84 c9 | Notify data e7 e2 6b 0c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1d 22 92 7a 9f 62 65 40 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 81 51 61 ea 37 80 54 96 3e ae 81 da 9c ed 39 03 | natd_hash: hash= 67 8c 30 56 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 81 51 61 ea 37 80 54 96 3e ae 81 da 9c ed 39 03 | Notify data 67 8c 30 56 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #671 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #671 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #671 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #671: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #671 to 4294967295 after switching state | Message ID: IKE #671 skipping update_recv as MD is fake | Message ID: sent #671 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-184" #671: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.184:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #671) | 1d 22 92 7a 9f 62 65 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 2c 7e 91 0a 22 90 c2 45 ac 5c be 32 c1 2c 12 | 60 a0 27 f2 55 e3 d1 89 c8 99 22 25 59 aa a7 04 | 17 46 2e ba 00 09 b9 71 47 e5 94 f1 fd 69 0a 57 | 38 00 5b 86 84 a5 d3 6a b3 9c 35 a1 da c4 1c 25 | 30 41 58 88 f1 bf 1e cf 5a 7d fb 1d 85 56 82 39 | 48 55 e9 bc e2 cf e9 2c 33 f4 34 3c 90 b2 b4 75 | 55 ca c1 69 86 54 f4 e5 53 67 e4 36 3b 66 24 10 | f0 0c b4 a6 bf 13 a9 41 25 2d 85 e0 59 37 ea 35 | d2 8a c7 72 04 28 dd 8d 9b 4e ca cb e3 07 69 b0 | 38 54 bb b4 47 09 ee 08 0f 47 c5 fd 50 05 d7 4c | 28 db 90 75 c2 2f 8c 55 54 db d4 30 5e b3 32 4e | 8c 3b 51 5c d3 59 a0 69 16 c0 1d 8a fe c4 69 9c | 6b 52 61 76 6f 1f 1d 99 1f 0b 05 d3 73 0a d9 48 | 53 6d fb ef 5d b9 22 d3 44 19 94 f4 70 f2 9d 04 | d7 54 79 2f 9c a0 ae 3d d3 fe 22 0d 74 1b 5b cc | e2 cd 80 63 5d 5b 97 5a 19 0e 2c 9e 2b 0b 57 7c | 29 00 00 24 89 d7 93 c3 18 08 d5 d6 83 2a 2a be | a0 ca 86 6f 9a 4f 6b 29 8c ce f9 83 c0 a5 93 03 | 8e 0f 90 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 a9 60 fe 19 43 95 a6 13 de 16 7a | 81 94 84 c9 e7 e2 6b 0c 00 00 00 1c 00 00 40 05 | 81 51 61 ea 37 80 54 96 3e ae 81 da 9c ed 39 03 | 67 8c 30 56 | state #671 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37403f310 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37404b580 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37404b580 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #671 | libevent_malloc: new ptr-libevent@0x7fb38807ae10 size 128 | #671 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.253467 | resume sending helper answer for #671 suppresed complete_v2_state_transition() and stole MD | #671 spent 0.284 milliseconds in resume sending helper answer | stop processing: state #671 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37406f8f0 | processing resume sending helper answer for #655 | start processing: state #655 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 655 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #655 | **emit ISAKMP Message: | initiator cookie: | 11 f9 62 21 99 31 60 19 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-178 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d2 f2 c8 14 dd 6e 4a d9 42 c0 c4 4a f0 e7 cc ef | ikev2 g^x e7 5d 2e b6 49 23 3e e0 de 3b f5 ff 2f 66 a3 ff | ikev2 g^x d2 2b e0 79 ae 88 e7 91 da fb 2a 14 ef d3 ed 02 | ikev2 g^x fc 9d ab 8d 00 09 6b 86 12 46 d7 1a 25 33 8b 76 | ikev2 g^x 10 a0 b9 ab 87 66 c2 67 94 c5 19 d4 99 8a 3a a4 | ikev2 g^x e0 e5 fb 75 02 61 f9 b6 e5 03 ae 93 bc 63 08 03 | ikev2 g^x 23 87 dd 87 f1 99 04 c1 65 24 a2 b2 0d 42 f1 58 | ikev2 g^x 8f 80 2d d4 5b 45 fc 67 e3 e3 b4 96 3f 0d 08 58 | ikev2 g^x e8 5d 60 1c d9 ae 33 24 88 cd 2b c2 77 69 a9 2e | ikev2 g^x fc 24 c9 ae ae 48 af 44 27 bb a4 49 3a fe fd 12 | ikev2 g^x bf 17 d1 44 1a 6b 13 72 74 3a 58 25 69 e0 e0 38 | ikev2 g^x 37 70 99 09 b2 2d 6f 7e 81 73 3d d1 da fb 1c 86 | ikev2 g^x 50 79 92 bc 8e 3e 67 d4 3a 50 80 1c fe c2 a2 85 | ikev2 g^x 0d fc 0f 2c 8a 52 82 a7 dc bc 81 8b 7e a0 58 ba | ikev2 g^x 52 a1 bb d1 15 13 4d f3 ec 8b 68 65 4f 19 d6 4e | ikev2 g^x b1 55 17 76 9d 5c 64 09 58 93 15 e2 e9 b9 1a c8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 64 6a 25 12 77 44 cd 38 c7 a9 25 d3 2b d2 f7 f1 | IKEv2 nonce 74 31 8d bf 24 ab 69 dc 68 25 0e a3 82 ae d1 ef | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 11 f9 62 21 99 31 60 19 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b2 | natd_hash: port= 01 f4 | natd_hash: hash= 6d aa d6 22 51 86 a0 91 29 6a b4 b9 a5 b0 03 8a | natd_hash: hash= 19 a3 96 50 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6d aa d6 22 51 86 a0 91 29 6a b4 b9 a5 b0 03 8a | Notify data 19 a3 96 50 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 11 f9 62 21 99 31 60 19 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= b7 fb 94 0f 85 81 96 f9 c7 ad ab b4 d9 f2 a7 73 | natd_hash: hash= 54 2b d4 8b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b7 fb 94 0f 85 81 96 f9 c7 ad ab b4 d9 f2 a7 73 | Notify data 54 2b d4 8b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #655 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #655 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #655 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #655: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #655 to 4294967295 after switching state | Message ID: IKE #655 skipping update_recv as MD is fake | Message ID: sent #655 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-178" #655: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.178:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #655) | 11 f9 62 21 99 31 60 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d2 f2 c8 14 dd 6e 4a d9 42 c0 c4 4a f0 e7 cc ef | e7 5d 2e b6 49 23 3e e0 de 3b f5 ff 2f 66 a3 ff | d2 2b e0 79 ae 88 e7 91 da fb 2a 14 ef d3 ed 02 | fc 9d ab 8d 00 09 6b 86 12 46 d7 1a 25 33 8b 76 | 10 a0 b9 ab 87 66 c2 67 94 c5 19 d4 99 8a 3a a4 | e0 e5 fb 75 02 61 f9 b6 e5 03 ae 93 bc 63 08 03 | 23 87 dd 87 f1 99 04 c1 65 24 a2 b2 0d 42 f1 58 | 8f 80 2d d4 5b 45 fc 67 e3 e3 b4 96 3f 0d 08 58 | e8 5d 60 1c d9 ae 33 24 88 cd 2b c2 77 69 a9 2e | fc 24 c9 ae ae 48 af 44 27 bb a4 49 3a fe fd 12 | bf 17 d1 44 1a 6b 13 72 74 3a 58 25 69 e0 e0 38 | 37 70 99 09 b2 2d 6f 7e 81 73 3d d1 da fb 1c 86 | 50 79 92 bc 8e 3e 67 d4 3a 50 80 1c fe c2 a2 85 | 0d fc 0f 2c 8a 52 82 a7 dc bc 81 8b 7e a0 58 ba | 52 a1 bb d1 15 13 4d f3 ec 8b 68 65 4f 19 d6 4e | b1 55 17 76 9d 5c 64 09 58 93 15 e2 e9 b9 1a c8 | 29 00 00 24 64 6a 25 12 77 44 cd 38 c7 a9 25 d3 | 2b d2 f7 f1 74 31 8d bf 24 ab 69 dc 68 25 0e a3 | 82 ae d1 ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d aa d6 22 51 86 a0 91 29 6a b4 b9 | a5 b0 03 8a 19 a3 96 50 00 00 00 1c 00 00 40 05 | b7 fb 94 0f 85 81 96 f9 c7 ad ab b4 d9 f2 a7 73 | 54 2b d4 8b | state #655 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38802c0a0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b25cc0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25cc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #655 | libevent_malloc: new ptr-libevent@0x7fb37406f8f0 size 128 | #655 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.253764 | resume sending helper answer for #655 suppresed complete_v2_state_transition() and stole MD | #655 spent 0.282 milliseconds in resume sending helper answer | stop processing: state #655 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c077c70 | processing resume sending helper answer for #664 | start processing: state #664 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 664 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #664 | **emit ISAKMP Message: | initiator cookie: | 9a a8 29 98 c3 de 5a 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-123 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8a d8 e3 37 12 b2 ef d1 da f8 45 1f e4 d1 c2 83 | ikev2 g^x bd a0 b4 7d 46 7a 1d 21 e7 39 76 71 00 55 ce 6f | ikev2 g^x f0 be cb 41 93 48 b1 e6 9b a0 dc 26 bf 39 0e 5e | ikev2 g^x e2 b9 8f 3d 51 d2 55 33 8b 98 1f 57 b7 08 6b 49 | ikev2 g^x 47 a3 42 1c c7 26 45 fd 43 8f 8a e4 32 11 da b4 | ikev2 g^x 60 41 cc d6 cb 7c cf 3c cf 62 25 19 cb 5f 50 b0 | ikev2 g^x 66 1f 87 29 8a 25 50 d2 76 81 60 2d c0 1a fa e4 | ikev2 g^x 44 6f 51 82 a1 8e 22 65 3d c7 77 00 d7 5d 66 3b | ikev2 g^x 34 e2 14 f5 00 89 95 83 41 4f 2f 17 fd 8a d0 82 | ikev2 g^x f4 75 70 eb 12 8d 3f e0 49 82 73 ea 26 fb 10 63 | ikev2 g^x 49 47 94 a5 80 94 4f 74 c7 e2 49 81 51 fe 91 b7 | ikev2 g^x ae a2 9c 0f 74 e3 9e 7c d9 1b 46 f6 50 85 9b 34 | ikev2 g^x 44 96 a8 da 7c 30 fa 27 4e 96 53 c6 da 8d 0b 8d | ikev2 g^x cd 2a 37 df f6 0b 7f d5 79 cf a5 8a 18 bf 15 d7 | ikev2 g^x 2b 16 dc 57 cd 3e 9a b4 b1 6c bf 76 41 2e dd 85 | ikev2 g^x 20 be 9a b5 82 7e bd 21 3e d7 a0 f1 0d c4 17 21 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8d 10 93 7b d2 8b c4 8f 3e a4 09 2d 41 e1 82 de | IKEv2 nonce 20 3b ef 97 ec 41 fd bf 52 be eb a2 8c 94 3b 60 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9a a8 29 98 c3 de 5a 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7b | natd_hash: port= 01 f4 | natd_hash: hash= c7 9d a1 e9 3f f2 d8 36 8a db 54 8a 88 a2 97 6f | natd_hash: hash= 50 ce f2 f2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c7 9d a1 e9 3f f2 d8 36 8a db 54 8a 88 a2 97 6f | Notify data 50 ce f2 f2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9a a8 29 98 c3 de 5a 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 52 96 33 a1 e3 08 31 cd ae c8 55 ef af 0a fa 55 | natd_hash: hash= 48 74 e2 3c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 52 96 33 a1 e3 08 31 cd ae c8 55 ef af 0a fa 55 | Notify data 48 74 e2 3c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #664 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #664 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #664 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #664: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #664 to 4294967295 after switching state | Message ID: IKE #664 skipping update_recv as MD is fake | Message ID: sent #664 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-123" #664: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.123:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #664) | 9a a8 29 98 c3 de 5a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a d8 e3 37 12 b2 ef d1 da f8 45 1f e4 d1 c2 83 | bd a0 b4 7d 46 7a 1d 21 e7 39 76 71 00 55 ce 6f | f0 be cb 41 93 48 b1 e6 9b a0 dc 26 bf 39 0e 5e | e2 b9 8f 3d 51 d2 55 33 8b 98 1f 57 b7 08 6b 49 | 47 a3 42 1c c7 26 45 fd 43 8f 8a e4 32 11 da b4 | 60 41 cc d6 cb 7c cf 3c cf 62 25 19 cb 5f 50 b0 | 66 1f 87 29 8a 25 50 d2 76 81 60 2d c0 1a fa e4 | 44 6f 51 82 a1 8e 22 65 3d c7 77 00 d7 5d 66 3b | 34 e2 14 f5 00 89 95 83 41 4f 2f 17 fd 8a d0 82 | f4 75 70 eb 12 8d 3f e0 49 82 73 ea 26 fb 10 63 | 49 47 94 a5 80 94 4f 74 c7 e2 49 81 51 fe 91 b7 | ae a2 9c 0f 74 e3 9e 7c d9 1b 46 f6 50 85 9b 34 | 44 96 a8 da 7c 30 fa 27 4e 96 53 c6 da 8d 0b 8d | cd 2a 37 df f6 0b 7f d5 79 cf a5 8a 18 bf 15 d7 | 2b 16 dc 57 cd 3e 9a b4 b1 6c bf 76 41 2e dd 85 | 20 be 9a b5 82 7e bd 21 3e d7 a0 f1 0d c4 17 21 | 29 00 00 24 8d 10 93 7b d2 8b c4 8f 3e a4 09 2d | 41 e1 82 de 20 3b ef 97 ec 41 fd bf 52 be eb a2 | 8c 94 3b 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 9d a1 e9 3f f2 d8 36 8a db 54 8a | 88 a2 97 6f 50 ce f2 f2 00 00 00 1c 00 00 40 05 | 52 96 33 a1 e3 08 31 cd ae c8 55 ef af 0a fa 55 | 48 74 e2 3c | state #664 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38403c470 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb3840318d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840318d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #664 | libevent_malloc: new ptr-libevent@0x7fb36c077c70 size 128 | #664 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.254068 | resume sending helper answer for #664 suppresed complete_v2_state_transition() and stole MD | #664 spent 0.287 milliseconds in resume sending helper answer | stop processing: state #664 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb350082ad0 | processing resume sending helper answer for #630 | start processing: state #630 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 630 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #630 | **emit ISAKMP Message: | initiator cookie: | 7e 20 27 21 e9 84 6e 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-167 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 32 6e c1 86 ef 01 ca cb cf d4 54 3a 37 90 3f aa | ikev2 g^x f9 fd 77 63 7d 3f 32 65 dc 4e 37 40 57 e5 28 ba | ikev2 g^x bc 68 04 4f 0e 5a 8f d4 7b 6c d8 31 01 31 af 70 | ikev2 g^x 7b 5e 07 9a cc 86 39 61 db f1 fe 2c 67 ca e6 87 | ikev2 g^x ee 49 49 c9 ae de 56 6a f7 61 cc 09 1a 0c 64 2d | ikev2 g^x 8a 63 64 38 db 36 06 2f bf 83 5c 9b 3b 72 ea 77 | ikev2 g^x 11 54 9f bd 9e 96 60 11 9f 4c 7d 2d 74 85 68 60 | ikev2 g^x 89 22 b8 8e c9 dc ec 8b d5 1f f0 2e 87 56 1a b3 | ikev2 g^x 98 52 91 5f b4 c4 5a 2d 4c 8e 2a 9c 04 b4 0f 8f | ikev2 g^x ba 3a a8 bb 3a 61 d4 4f bd 6e 59 87 ac 42 74 36 | ikev2 g^x 1d b4 a7 a3 ac b2 f0 31 4d 5c f0 20 80 d9 fb d8 | ikev2 g^x 99 ed a7 f8 3d aa 61 cd 50 cc 92 53 dc 7d 29 df | ikev2 g^x 97 52 04 ff 96 9f de 81 2e 64 0e 76 34 9d 05 2a | ikev2 g^x 60 5d 08 77 dd 6c c0 5f 2b 7a ca 90 dd 00 b8 d0 | ikev2 g^x df 90 44 71 93 d3 cf 23 7d 74 29 93 b8 60 2e c6 | ikev2 g^x 85 82 66 37 7d 41 f3 a2 35 e0 e4 2d 9b 02 5f 72 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f5 41 2a 41 21 19 72 0e 4d 58 ec a2 aa 28 84 44 | IKEv2 nonce db 30 74 6c 53 17 b0 90 75 8e b7 a5 64 9e f4 ec | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7e 20 27 21 e9 84 6e 79 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a7 | natd_hash: port= 01 f4 | natd_hash: hash= 7d 7c 2b 60 60 10 f7 1e 72 a5 e3 04 6f 3b 05 1e | natd_hash: hash= 2d 25 81 27 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7d 7c 2b 60 60 10 f7 1e 72 a5 e3 04 6f 3b 05 1e | Notify data 2d 25 81 27 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7e 20 27 21 e9 84 6e 79 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a3 09 0e 65 34 53 77 41 1c 34 0f 5b 12 a4 a5 f9 | natd_hash: hash= 2c 10 ce dc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a3 09 0e 65 34 53 77 41 1c 34 0f 5b 12 a4 a5 f9 | Notify data 2c 10 ce dc | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #630 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #630 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #630 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #630: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #630 to 4294967295 after switching state | Message ID: IKE #630 skipping update_recv as MD is fake | Message ID: sent #630 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-167" #630: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.167:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #630) | 7e 20 27 21 e9 84 6e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 6e c1 86 ef 01 ca cb cf d4 54 3a 37 90 3f aa | f9 fd 77 63 7d 3f 32 65 dc 4e 37 40 57 e5 28 ba | bc 68 04 4f 0e 5a 8f d4 7b 6c d8 31 01 31 af 70 | 7b 5e 07 9a cc 86 39 61 db f1 fe 2c 67 ca e6 87 | ee 49 49 c9 ae de 56 6a f7 61 cc 09 1a 0c 64 2d | 8a 63 64 38 db 36 06 2f bf 83 5c 9b 3b 72 ea 77 | 11 54 9f bd 9e 96 60 11 9f 4c 7d 2d 74 85 68 60 | 89 22 b8 8e c9 dc ec 8b d5 1f f0 2e 87 56 1a b3 | 98 52 91 5f b4 c4 5a 2d 4c 8e 2a 9c 04 b4 0f 8f | ba 3a a8 bb 3a 61 d4 4f bd 6e 59 87 ac 42 74 36 | 1d b4 a7 a3 ac b2 f0 31 4d 5c f0 20 80 d9 fb d8 | 99 ed a7 f8 3d aa 61 cd 50 cc 92 53 dc 7d 29 df | 97 52 04 ff 96 9f de 81 2e 64 0e 76 34 9d 05 2a | 60 5d 08 77 dd 6c c0 5f 2b 7a ca 90 dd 00 b8 d0 | df 90 44 71 93 d3 cf 23 7d 74 29 93 b8 60 2e c6 | 85 82 66 37 7d 41 f3 a2 35 e0 e4 2d 9b 02 5f 72 | 29 00 00 24 f5 41 2a 41 21 19 72 0e 4d 58 ec a2 | aa 28 84 44 db 30 74 6c 53 17 b0 90 75 8e b7 a5 | 64 9e f4 ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 7c 2b 60 60 10 f7 1e 72 a5 e3 04 | 6f 3b 05 1e 2d 25 81 27 00 00 00 1c 00 00 40 05 | a3 09 0e 65 34 53 77 41 1c 34 0f 5b 12 a4 a5 f9 | 2c 10 ce dc | state #630 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b25c80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #630 | libevent_malloc: new ptr-libevent@0x7fb350082ad0 size 128 | #630 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.254369 | resume sending helper answer for #630 suppresed complete_v2_state_transition() and stole MD | #630 spent 0.286 milliseconds in resume sending helper answer | stop processing: state #630 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c06c900 | processing resume sending helper answer for #625 | start processing: state #625 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 625 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #625 | **emit ISAKMP Message: | initiator cookie: | b6 c6 04 15 67 ea 52 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-28 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fd 2a 66 6b 96 87 d8 b6 87 d1 63 4d 22 c0 e8 43 | ikev2 g^x f1 17 96 ee d2 96 c1 ac af 74 7e 2f c1 03 56 b4 | ikev2 g^x 91 a7 54 2a 18 43 db 7b c1 dc c3 ab 5f 59 ce 4b | ikev2 g^x d9 25 40 3c d0 04 72 2a 68 07 37 d1 10 7c 01 e8 | ikev2 g^x 94 74 57 b7 97 ff 23 78 64 c3 af 87 e5 b7 c6 04 | ikev2 g^x 38 fa 82 8f 53 ae 4c 38 c7 32 43 6f fa 1b 8b c3 | ikev2 g^x 00 04 a1 66 ec f1 75 6b d0 65 36 16 d8 20 06 98 | ikev2 g^x 39 ae 59 43 75 ed d6 5d 3e 27 7d 1f d8 e4 74 3d | ikev2 g^x 30 32 2a 4c ff 09 92 fe 9f c3 2d aa 84 3b 5f 60 | ikev2 g^x 20 10 05 43 02 a4 89 ab c2 89 35 0a ee 99 22 a8 | ikev2 g^x 2c 69 87 17 77 7d f2 12 d8 92 a1 f6 c7 e1 0d d9 | ikev2 g^x 4d 19 7c c7 c9 40 d2 ce 5a d2 7a 84 a2 e5 a3 72 | ikev2 g^x 54 d4 31 df 9f 0f c4 a2 d8 0b 60 39 7a b2 4a 8d | ikev2 g^x 7f a3 22 4d 19 80 0d b1 4f 50 7b 7e 53 1e c7 29 | ikev2 g^x a7 4e d9 78 77 ad 99 a2 33 30 11 e2 f0 b0 26 5e | ikev2 g^x 18 8a 8a 03 05 6f 9e 8c db 1a aa 02 79 b7 97 43 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f1 ab 41 0c 34 c5 d2 8d d1 08 09 15 25 e7 cb cc | IKEv2 nonce 49 7c d8 7c 03 ef 2a 6b eb 41 21 c9 e5 2d 36 9d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b6 c6 04 15 67 ea 52 35 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1c | natd_hash: port= 01 f4 | natd_hash: hash= 29 7d 5f cd 54 76 9a dd 2a e8 13 0f d7 0a 04 ba | natd_hash: hash= 09 3a b6 b4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 29 7d 5f cd 54 76 9a dd 2a e8 13 0f d7 0a 04 ba | Notify data 09 3a b6 b4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b6 c6 04 15 67 ea 52 35 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 72 40 34 7d e5 09 76 67 7d 7e 83 33 4f f6 4f 75 | natd_hash: hash= 66 18 a7 1f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 72 40 34 7d e5 09 76 67 7d 7e 83 33 4f f6 4f 75 | Notify data 66 18 a7 1f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #625 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #625 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #625 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #625: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #625 to 4294967295 after switching state | Message ID: IKE #625 skipping update_recv as MD is fake | Message ID: sent #625 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-28" #625: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.28:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #625) | b6 c6 04 15 67 ea 52 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 2a 66 6b 96 87 d8 b6 87 d1 63 4d 22 c0 e8 43 | f1 17 96 ee d2 96 c1 ac af 74 7e 2f c1 03 56 b4 | 91 a7 54 2a 18 43 db 7b c1 dc c3 ab 5f 59 ce 4b | d9 25 40 3c d0 04 72 2a 68 07 37 d1 10 7c 01 e8 | 94 74 57 b7 97 ff 23 78 64 c3 af 87 e5 b7 c6 04 | 38 fa 82 8f 53 ae 4c 38 c7 32 43 6f fa 1b 8b c3 | 00 04 a1 66 ec f1 75 6b d0 65 36 16 d8 20 06 98 | 39 ae 59 43 75 ed d6 5d 3e 27 7d 1f d8 e4 74 3d | 30 32 2a 4c ff 09 92 fe 9f c3 2d aa 84 3b 5f 60 | 20 10 05 43 02 a4 89 ab c2 89 35 0a ee 99 22 a8 | 2c 69 87 17 77 7d f2 12 d8 92 a1 f6 c7 e1 0d d9 | 4d 19 7c c7 c9 40 d2 ce 5a d2 7a 84 a2 e5 a3 72 | 54 d4 31 df 9f 0f c4 a2 d8 0b 60 39 7a b2 4a 8d | 7f a3 22 4d 19 80 0d b1 4f 50 7b 7e 53 1e c7 29 | a7 4e d9 78 77 ad 99 a2 33 30 11 e2 f0 b0 26 5e | 18 8a 8a 03 05 6f 9e 8c db 1a aa 02 79 b7 97 43 | 29 00 00 24 f1 ab 41 0c 34 c5 d2 8d d1 08 09 15 | 25 e7 cb cc 49 7c d8 7c 03 ef 2a 6b eb 41 21 c9 | e5 2d 36 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 7d 5f cd 54 76 9a dd 2a e8 13 0f | d7 0a 04 ba 09 3a b6 b4 00 00 00 1c 00 00 40 05 | 72 40 34 7d e5 09 76 67 7d 7e 83 33 4f f6 4f 75 | 66 18 a7 1f | state #625 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34003b010 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36000cc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #625 | libevent_malloc: new ptr-libevent@0x7fb37c06c900 size 128 | #625 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.254666 | resume sending helper answer for #625 suppresed complete_v2_state_transition() and stole MD | #625 spent 0.282 milliseconds in resume sending helper answer | stop processing: state #625 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37406a110 | processing resume sending helper answer for #670 | start processing: state #670 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 670 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #670 | **emit ISAKMP Message: | initiator cookie: | 8a 10 9e 23 ac da 71 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-147 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 51 59 15 67 28 ca 74 92 de a7 0b d2 ca 9e 31 ff | ikev2 g^x 0c ec 66 70 2f 96 5c db 29 7a 94 be b4 fb 91 94 | ikev2 g^x 6c 4c 82 7b 86 7c 4d 04 fa 97 64 03 7c 61 e6 12 | ikev2 g^x 7b e8 77 6d ef fc 86 73 90 13 0d e6 78 93 c2 a1 | ikev2 g^x 62 6c 65 c0 8c 1c 5e 39 e1 34 37 c6 58 5b a5 b2 | ikev2 g^x 83 26 7c 7e 1f 15 94 64 d1 51 32 90 eb a2 33 51 | ikev2 g^x b8 56 2a 0b 53 1e d3 ca 3b f5 15 ad 3c b3 c4 4c | ikev2 g^x 87 79 a4 dd de 1d 17 0c ed 28 be 3d 53 69 9f d4 | ikev2 g^x 92 6d e1 f9 c4 1e 3a 32 bc b5 0d 47 92 45 39 27 | ikev2 g^x 1c 6a ba 31 af 07 5a 8a c7 08 ef d0 d2 ac e7 93 | ikev2 g^x 58 56 5f 1a 54 44 df 61 16 7f bc 43 53 9a 9f f7 | ikev2 g^x 61 eb 19 48 e1 7b e1 df c1 5a 57 0c d3 a6 a2 ce | ikev2 g^x ce 01 4a 92 1b ce bd be 46 3d c9 04 aa 1c 6a 49 | ikev2 g^x 39 9e c5 e0 23 32 61 54 07 62 70 d6 2b 4f 7f 12 | ikev2 g^x 86 15 e1 c4 88 04 21 da 99 53 13 ca 40 af d4 cd | ikev2 g^x 0a f5 d7 88 c1 11 17 a1 77 d9 81 26 5a b2 1e b7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f3 83 7b 0d 72 75 fb 36 6b 70 51 59 c6 93 d9 98 | IKEv2 nonce 17 c4 71 7c 93 e7 e0 bd 2f bb ee cf 0d 5e df 17 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8a 10 9e 23 ac da 71 96 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 93 | natd_hash: port= 01 f4 | natd_hash: hash= 46 a9 e0 bc 70 aa 03 d2 53 d4 71 04 68 97 96 57 | natd_hash: hash= 88 52 67 34 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 46 a9 e0 bc 70 aa 03 d2 53 d4 71 04 68 97 96 57 | Notify data 88 52 67 34 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8a 10 9e 23 ac da 71 96 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a6 13 8e aa 70 35 17 a1 68 a2 7c 6b 1f 0d 90 7b | natd_hash: hash= a6 27 3d 24 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a6 13 8e aa 70 35 17 a1 68 a2 7c 6b 1f 0d 90 7b | Notify data a6 27 3d 24 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #670 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #670 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #670 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #670: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #670 to 4294967295 after switching state | Message ID: IKE #670 skipping update_recv as MD is fake | Message ID: sent #670 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-147" #670: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.147:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #670) | 8a 10 9e 23 ac da 71 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 59 15 67 28 ca 74 92 de a7 0b d2 ca 9e 31 ff | 0c ec 66 70 2f 96 5c db 29 7a 94 be b4 fb 91 94 | 6c 4c 82 7b 86 7c 4d 04 fa 97 64 03 7c 61 e6 12 | 7b e8 77 6d ef fc 86 73 90 13 0d e6 78 93 c2 a1 | 62 6c 65 c0 8c 1c 5e 39 e1 34 37 c6 58 5b a5 b2 | 83 26 7c 7e 1f 15 94 64 d1 51 32 90 eb a2 33 51 | b8 56 2a 0b 53 1e d3 ca 3b f5 15 ad 3c b3 c4 4c | 87 79 a4 dd de 1d 17 0c ed 28 be 3d 53 69 9f d4 | 92 6d e1 f9 c4 1e 3a 32 bc b5 0d 47 92 45 39 27 | 1c 6a ba 31 af 07 5a 8a c7 08 ef d0 d2 ac e7 93 | 58 56 5f 1a 54 44 df 61 16 7f bc 43 53 9a 9f f7 | 61 eb 19 48 e1 7b e1 df c1 5a 57 0c d3 a6 a2 ce | ce 01 4a 92 1b ce bd be 46 3d c9 04 aa 1c 6a 49 | 39 9e c5 e0 23 32 61 54 07 62 70 d6 2b 4f 7f 12 | 86 15 e1 c4 88 04 21 da 99 53 13 ca 40 af d4 cd | 0a f5 d7 88 c1 11 17 a1 77 d9 81 26 5a b2 1e b7 | 29 00 00 24 f3 83 7b 0d 72 75 fb 36 6b 70 51 59 | c6 93 d9 98 17 c4 71 7c 93 e7 e0 bd 2f bb ee cf | 0d 5e df 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 a9 e0 bc 70 aa 03 d2 53 d4 71 04 | 68 97 96 57 88 52 67 34 00 00 00 1c 00 00 40 05 | a6 13 8e aa 70 35 17 a1 68 a2 7c 6b 1f 0d 90 7b | a6 27 3d 24 | state #670 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38800fb00 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb344018460 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #670 | libevent_malloc: new ptr-libevent@0x7fb37406a110 size 128 | #670 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.255016 | resume sending helper answer for #670 suppresed complete_v2_state_transition() and stole MD | #670 spent 0.336 milliseconds in resume sending helper answer | stop processing: state #670 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb364085920 | processing resume sending helper answer for #646 | start processing: state #646 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 646 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #646 | **emit ISAKMP Message: | initiator cookie: | b4 5e a6 e5 43 b3 10 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-181 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e9 73 71 28 1c 8f e6 c8 30 15 e8 f2 83 24 73 ba | ikev2 g^x b7 8e 5e ad 23 5e fe f2 57 66 39 2a 10 14 0b 7c | ikev2 g^x 99 94 74 01 76 7d aa 55 2c 68 f1 88 64 b0 b2 92 | ikev2 g^x d0 76 47 86 10 fe 60 a1 91 ba cd e1 7f 16 26 be | ikev2 g^x 94 e7 90 51 31 6b 00 e1 5e 12 3f 7c f5 94 c8 a4 | ikev2 g^x 3b fb 8d 83 6d 50 f6 31 0f 66 c4 51 6b 72 e3 1c | ikev2 g^x db ec 64 33 bf 0c 59 6c f1 5d f9 d8 36 f3 db 7b | ikev2 g^x 00 1f fd 9f 62 d6 fc a4 0c 59 79 dc 40 4d e4 5a | ikev2 g^x 26 f7 7b d3 60 14 f9 91 37 58 78 18 88 14 be e4 | ikev2 g^x 88 8a fa f1 c4 75 a4 31 4f 52 e1 46 5e cf d1 8e | ikev2 g^x 9c f9 b4 26 da 2d a3 97 eb 50 5c 60 d5 bb 8c bb | ikev2 g^x 6d 2b 92 6e 83 db 31 aa 80 60 97 87 f1 28 f7 2b | ikev2 g^x c0 b4 e7 6c 01 76 70 27 2e 05 9c f9 c3 75 6f 18 | ikev2 g^x 38 5e 72 a4 02 3e 9a ec 50 94 23 4d d0 04 67 a1 | ikev2 g^x fb d2 c7 f4 b8 d2 26 01 d0 ac aa dc ef ad 7a 1c | ikev2 g^x f6 27 f6 31 ba cf ef 6b a9 6e f7 2e f2 27 c2 0e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 14 d4 23 b3 ee 67 2f 32 3a 28 a9 26 74 34 22 80 | IKEv2 nonce 70 fc bc e1 f8 e1 fc 3b 8e 87 b8 d5 50 4f 59 29 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b4 5e a6 e5 43 b3 10 9b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b5 | natd_hash: port= 01 f4 | natd_hash: hash= b8 b4 a9 36 84 ee c8 33 36 8f 3f be e9 b7 2c ae | natd_hash: hash= e1 30 41 fa | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b8 b4 a9 36 84 ee c8 33 36 8f 3f be e9 b7 2c ae | Notify data e1 30 41 fa | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b4 5e a6 e5 43 b3 10 9b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6c 77 62 56 82 b3 0f 90 87 bf 6a c6 0c bd a8 c9 | natd_hash: hash= 53 ca 46 6f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6c 77 62 56 82 b3 0f 90 87 bf 6a c6 0c bd a8 c9 | Notify data 53 ca 46 6f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #646 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #646 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #646 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #646: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #646 to 4294967295 after switching state | Message ID: IKE #646 skipping update_recv as MD is fake | Message ID: sent #646 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-181" #646: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.181:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #646) | b4 5e a6 e5 43 b3 10 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e9 73 71 28 1c 8f e6 c8 30 15 e8 f2 83 24 73 ba | b7 8e 5e ad 23 5e fe f2 57 66 39 2a 10 14 0b 7c | 99 94 74 01 76 7d aa 55 2c 68 f1 88 64 b0 b2 92 | d0 76 47 86 10 fe 60 a1 91 ba cd e1 7f 16 26 be | 94 e7 90 51 31 6b 00 e1 5e 12 3f 7c f5 94 c8 a4 | 3b fb 8d 83 6d 50 f6 31 0f 66 c4 51 6b 72 e3 1c | db ec 64 33 bf 0c 59 6c f1 5d f9 d8 36 f3 db 7b | 00 1f fd 9f 62 d6 fc a4 0c 59 79 dc 40 4d e4 5a | 26 f7 7b d3 60 14 f9 91 37 58 78 18 88 14 be e4 | 88 8a fa f1 c4 75 a4 31 4f 52 e1 46 5e cf d1 8e | 9c f9 b4 26 da 2d a3 97 eb 50 5c 60 d5 bb 8c bb | 6d 2b 92 6e 83 db 31 aa 80 60 97 87 f1 28 f7 2b | c0 b4 e7 6c 01 76 70 27 2e 05 9c f9 c3 75 6f 18 | 38 5e 72 a4 02 3e 9a ec 50 94 23 4d d0 04 67 a1 | fb d2 c7 f4 b8 d2 26 01 d0 ac aa dc ef ad 7a 1c | f6 27 f6 31 ba cf ef 6b a9 6e f7 2e f2 27 c2 0e | 29 00 00 24 14 d4 23 b3 ee 67 2f 32 3a 28 a9 26 | 74 34 22 80 70 fc bc e1 f8 e1 fc 3b 8e 87 b8 d5 | 50 4f 59 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 b4 a9 36 84 ee c8 33 36 8f 3f be | e9 b7 2c ae e1 30 41 fa 00 00 00 1c 00 00 40 05 | 6c 77 62 56 82 b3 0f 90 87 bf 6a c6 0c bd a8 c9 | 53 ca 46 6f | state #646 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c0251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a8ee40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #646 | libevent_malloc: new ptr-libevent@0x7fb364085920 size 128 | #646 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.255328 | resume sending helper answer for #646 suppresed complete_v2_state_transition() and stole MD | #646 spent 0.292 milliseconds in resume sending helper answer | stop processing: state #646 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37804bbf0 | processing resume sending helper answer for #527 | start processing: state #527 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 527 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #527 | **emit ISAKMP Message: | initiator cookie: | b8 7b a6 b5 cd 22 30 e3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-65 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9d 68 a6 ce 12 3e 16 ce 0a 40 e3 0d ea db e5 bf | ikev2 g^x b4 0c 0f 14 5d 82 31 6e df 98 3a a9 2b 0d 83 59 | ikev2 g^x a7 51 1f df 33 ed b4 d4 3d 6e 89 89 e1 79 17 6e | ikev2 g^x 79 24 a2 44 83 1f 07 80 b7 73 27 d1 f5 ab e7 f6 | ikev2 g^x fa 73 46 f9 e5 46 01 bb fe 93 76 2e fb d7 ee 39 | ikev2 g^x 18 23 e1 f9 53 17 53 31 0d b4 42 58 f1 f5 27 5f | ikev2 g^x 8f 40 ae 48 c9 9a d1 40 be 99 20 4f f2 5a 11 4a | ikev2 g^x 48 24 79 61 ea 93 68 2f 62 04 56 92 f9 14 43 3b | ikev2 g^x 8a 3e eb 47 ce 87 24 50 5e 1e 23 ea d1 e7 ff ad | ikev2 g^x 92 32 52 12 93 36 c5 47 2c 6c 33 48 33 2a cb ce | ikev2 g^x cd 3b e2 9d 5f 5a 78 ba 2e 4c f5 75 36 53 8e 18 | ikev2 g^x c2 8e 6c ae 9f 48 cd 76 e2 9b 13 a4 86 1e d9 37 | ikev2 g^x 5a 76 08 51 c6 0c c9 7f 15 8d 6a 72 43 9f 44 4a | ikev2 g^x 6e 19 5e f0 ed 1e 32 a1 a1 b9 c3 4c 22 6e 92 40 | ikev2 g^x a0 76 62 be 61 a0 b4 ca 52 4a 39 3c 84 7b 48 7c | ikev2 g^x 26 8e ac a1 a4 17 05 aa f0 10 33 85 e3 3a d9 7e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 42 74 9e 85 d4 ce 77 94 f8 66 9d 51 75 21 75 54 | IKEv2 nonce 57 2f a1 c1 0d 08 6e 7a 4a f7 0f 5f 6b 9a 4f 16 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b8 7b a6 b5 cd 22 30 e3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 41 | natd_hash: port= 01 f4 | natd_hash: hash= c2 fd 65 f3 18 d8 6f 03 d6 0f 2d d6 5f d4 a1 2e | natd_hash: hash= 7e 59 4c 96 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c2 fd 65 f3 18 d8 6f 03 d6 0f 2d d6 5f d4 a1 2e | Notify data 7e 59 4c 96 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b8 7b a6 b5 cd 22 30 e3 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2f dc 51 0a 44 26 e8 79 d1 11 0e dd 4d 4c 69 c6 | natd_hash: hash= 3a 55 a8 94 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2f dc 51 0a 44 26 e8 79 d1 11 0e dd 4d 4c 69 c6 | Notify data 3a 55 a8 94 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #527 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #527 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #527 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #527: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #527 to 4294967295 after switching state | Message ID: IKE #527 skipping update_recv as MD is fake | Message ID: sent #527 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-65" #527: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.65:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #527) | b8 7b a6 b5 cd 22 30 e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9d 68 a6 ce 12 3e 16 ce 0a 40 e3 0d ea db e5 bf | b4 0c 0f 14 5d 82 31 6e df 98 3a a9 2b 0d 83 59 | a7 51 1f df 33 ed b4 d4 3d 6e 89 89 e1 79 17 6e | 79 24 a2 44 83 1f 07 80 b7 73 27 d1 f5 ab e7 f6 | fa 73 46 f9 e5 46 01 bb fe 93 76 2e fb d7 ee 39 | 18 23 e1 f9 53 17 53 31 0d b4 42 58 f1 f5 27 5f | 8f 40 ae 48 c9 9a d1 40 be 99 20 4f f2 5a 11 4a | 48 24 79 61 ea 93 68 2f 62 04 56 92 f9 14 43 3b | 8a 3e eb 47 ce 87 24 50 5e 1e 23 ea d1 e7 ff ad | 92 32 52 12 93 36 c5 47 2c 6c 33 48 33 2a cb ce | cd 3b e2 9d 5f 5a 78 ba 2e 4c f5 75 36 53 8e 18 | c2 8e 6c ae 9f 48 cd 76 e2 9b 13 a4 86 1e d9 37 | 5a 76 08 51 c6 0c c9 7f 15 8d 6a 72 43 9f 44 4a | 6e 19 5e f0 ed 1e 32 a1 a1 b9 c3 4c 22 6e 92 40 | a0 76 62 be 61 a0 b4 ca 52 4a 39 3c 84 7b 48 7c | 26 8e ac a1 a4 17 05 aa f0 10 33 85 e3 3a d9 7e | 29 00 00 24 42 74 9e 85 d4 ce 77 94 f8 66 9d 51 | 75 21 75 54 57 2f a1 c1 0d 08 6e 7a 4a f7 0f 5f | 6b 9a 4f 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 fd 65 f3 18 d8 6f 03 d6 0f 2d d6 | 5f d4 a1 2e 7e 59 4c 96 00 00 00 1c 00 00 40 05 | 2f dc 51 0a 44 26 e8 79 d1 11 0e dd 4d 4c 69 c6 | 3a 55 a8 94 | state #527 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36402e9b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a32290 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a32290 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #527 | libevent_malloc: new ptr-libevent@0x7fb37804bbf0 size 128 | #527 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.255627 | resume sending helper answer for #527 suppresed complete_v2_state_transition() and stole MD | #527 spent 0.286 milliseconds in resume sending helper answer | stop processing: state #527 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c056950 | processing resume sending helper answer for #602 | start processing: state #602 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 602 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #602 | **emit ISAKMP Message: | initiator cookie: | 1c 14 c0 8f 0f 45 46 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-93 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e6 8c 23 15 6d dd 8c f8 78 a6 e7 34 f8 f8 0d e8 | ikev2 g^x 99 69 99 32 7f b5 b1 1a 6e da d3 b0 b9 7c e5 6a | ikev2 g^x 90 1d 3f f0 2f 1f 8d c8 1e 97 79 0b 55 c9 08 97 | ikev2 g^x 7f db 99 9b a0 da 7f 34 8d ab 5f 4b 73 b6 eb 55 | ikev2 g^x ea b1 50 2f e5 f4 17 86 c9 0b 4a 01 40 9a 9a 4d | ikev2 g^x 73 05 29 c2 d1 6e 3d 1b 47 e9 f1 d8 3b a4 6c 31 | ikev2 g^x 0e f0 a8 d8 a1 46 2c 0e ca 2a 6e f9 4f d7 8c 76 | ikev2 g^x 9e 40 ea a6 3f 5f 17 17 a4 a8 fc ae 89 af 6d f1 | ikev2 g^x b3 45 8c 83 c6 8d a4 54 5a e0 e6 e7 89 ee b4 12 | ikev2 g^x 45 f6 b8 c2 94 e3 93 01 1e e6 9f b8 c4 95 33 5e | ikev2 g^x a2 9c 98 2d 5d 32 90 4e 65 40 c0 d0 7c bc 64 79 | ikev2 g^x d3 d5 64 07 12 ee 32 ea f1 d4 a2 dc 98 b8 b6 2e | ikev2 g^x 62 34 35 b4 dc 05 df 63 05 49 b3 40 af 75 cf e4 | ikev2 g^x bf 5e 46 dd df 34 a2 34 68 31 94 44 1b bf 50 ac | ikev2 g^x 43 cc 20 b0 de e5 d9 e2 b0 84 60 50 34 9f 14 06 | ikev2 g^x 39 c9 a8 b8 00 99 c9 35 60 cc 65 3c 94 49 b6 88 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 83 64 aa aa cc 6d 3f 6f 34 ae 10 39 1c a1 82 b7 | IKEv2 nonce e0 19 c5 ec 38 88 da 2f ce 97 9a 5c 92 c8 61 e4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1c 14 c0 8f 0f 45 46 05 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5d | natd_hash: port= 01 f4 | natd_hash: hash= 3c 77 b9 52 2d cf 04 de dd b2 81 99 39 e3 1b 7a | natd_hash: hash= 92 b3 36 9d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3c 77 b9 52 2d cf 04 de dd b2 81 99 39 e3 1b 7a | Notify data 92 b3 36 9d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1c 14 c0 8f 0f 45 46 05 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d6 0f f4 51 34 80 da 92 17 c4 6a c3 ee d2 99 01 | natd_hash: hash= a8 7b c9 18 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d6 0f f4 51 34 80 da 92 17 c4 6a c3 ee d2 99 01 | Notify data a8 7b c9 18 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #602 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #602 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #602 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #602: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #602 to 4294967295 after switching state | Message ID: IKE #602 skipping update_recv as MD is fake | Message ID: sent #602 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-93" #602: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.93:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #602) | 1c 14 c0 8f 0f 45 46 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 8c 23 15 6d dd 8c f8 78 a6 e7 34 f8 f8 0d e8 | 99 69 99 32 7f b5 b1 1a 6e da d3 b0 b9 7c e5 6a | 90 1d 3f f0 2f 1f 8d c8 1e 97 79 0b 55 c9 08 97 | 7f db 99 9b a0 da 7f 34 8d ab 5f 4b 73 b6 eb 55 | ea b1 50 2f e5 f4 17 86 c9 0b 4a 01 40 9a 9a 4d | 73 05 29 c2 d1 6e 3d 1b 47 e9 f1 d8 3b a4 6c 31 | 0e f0 a8 d8 a1 46 2c 0e ca 2a 6e f9 4f d7 8c 76 | 9e 40 ea a6 3f 5f 17 17 a4 a8 fc ae 89 af 6d f1 | b3 45 8c 83 c6 8d a4 54 5a e0 e6 e7 89 ee b4 12 | 45 f6 b8 c2 94 e3 93 01 1e e6 9f b8 c4 95 33 5e | a2 9c 98 2d 5d 32 90 4e 65 40 c0 d0 7c bc 64 79 | d3 d5 64 07 12 ee 32 ea f1 d4 a2 dc 98 b8 b6 2e | 62 34 35 b4 dc 05 df 63 05 49 b3 40 af 75 cf e4 | bf 5e 46 dd df 34 a2 34 68 31 94 44 1b bf 50 ac | 43 cc 20 b0 de e5 d9 e2 b0 84 60 50 34 9f 14 06 | 39 c9 a8 b8 00 99 c9 35 60 cc 65 3c 94 49 b6 88 | 29 00 00 24 83 64 aa aa cc 6d 3f 6f 34 ae 10 39 | 1c a1 82 b7 e0 19 c5 ec 38 88 da 2f ce 97 9a 5c | 92 c8 61 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 77 b9 52 2d cf 04 de dd b2 81 99 | 39 e3 1b 7a 92 b3 36 9d 00 00 00 1c 00 00 40 05 | d6 0f f4 51 34 80 da 92 17 c4 6a c3 ee d2 99 01 | a8 7b c9 18 | state #602 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb360023dd0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36003b100 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c03b100 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #602 | libevent_malloc: new ptr-libevent@0x7fb35c056950 size 128 | #602 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.255928 | resume sending helper answer for #602 suppresed complete_v2_state_transition() and stole MD | #602 spent 0.285 milliseconds in resume sending helper answer | stop processing: state #602 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38006f870 | processing resume sending helper answer for #634 | start processing: state #634 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 634 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #634 | **emit ISAKMP Message: | initiator cookie: | cf 5e f3 d9 0f 8f c8 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-221 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 37 6e 4e 42 21 e8 c2 13 74 c2 ba d4 76 e1 be 3a | ikev2 g^x 17 15 d5 c1 bf ca e3 9e c2 e2 ab ff 65 ee 7a 2c | ikev2 g^x f3 bf 14 cb 54 1e f5 5d 6b 0b 4b a3 c6 42 f2 c5 | ikev2 g^x 00 c2 f8 63 58 12 0f 9c c4 de 06 61 51 86 70 ce | ikev2 g^x 7a 0a 7a ff cc 71 b7 65 f5 cc 38 14 71 81 de 07 | ikev2 g^x b7 fe 20 84 4a ff 1c 5d 53 a3 fb 06 85 18 2b 9b | ikev2 g^x a8 30 c2 b9 8d e1 9c 07 b4 43 af 10 5f 03 0b 44 | ikev2 g^x c6 f5 8b 61 b9 fa 0b 3d 1c 32 63 5f 79 89 62 fd | ikev2 g^x 45 d5 92 76 17 fc 00 05 ef 5e 2c ec c0 11 2e 72 | ikev2 g^x 0f 45 e0 06 cd 9d 57 a6 22 61 8c 9b 78 8d c7 7e | ikev2 g^x 93 4b 6b 11 31 21 df b9 6f b0 e5 90 c6 6a 46 63 | ikev2 g^x 33 24 c9 bf 0d 8d 8a d0 3d 26 dd 1c 91 5a 75 0f | ikev2 g^x 70 13 b1 0c c1 ba 7c c8 70 09 19 0f b5 cd 04 5e | ikev2 g^x 6a af 66 e1 91 d5 09 48 02 32 4f dc 10 ea f4 57 | ikev2 g^x c2 40 bb 53 d3 0b 66 f6 59 f4 9d 9f 3c f5 45 a2 | ikev2 g^x 33 3b d9 2c 95 a0 76 aa 18 c3 43 fd 17 da c0 00 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 30 83 66 63 cd a6 58 35 d0 aa fe c7 9f 22 4a b9 | IKEv2 nonce bb d2 ab 8e e4 52 a2 c8 ac d9 43 99 4a 56 b6 54 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cf 5e f3 d9 0f 8f c8 69 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 dd | natd_hash: port= 01 f4 | natd_hash: hash= 53 4a aa 08 58 24 5b c5 80 af 06 0d d7 f8 bd d3 | natd_hash: hash= f5 50 b0 3c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 53 4a aa 08 58 24 5b c5 80 af 06 0d d7 f8 bd d3 | Notify data f5 50 b0 3c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cf 5e f3 d9 0f 8f c8 69 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d9 15 55 e8 f6 53 18 54 ee 68 b7 cc 78 54 e7 63 | natd_hash: hash= 8d 71 15 9f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d9 15 55 e8 f6 53 18 54 ee 68 b7 cc 78 54 e7 63 | Notify data 8d 71 15 9f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #634 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #634 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #634 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #634: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #634 to 4294967295 after switching state | Message ID: IKE #634 skipping update_recv as MD is fake | Message ID: sent #634 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-221" #634: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.221:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #634) | cf 5e f3 d9 0f 8f c8 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 6e 4e 42 21 e8 c2 13 74 c2 ba d4 76 e1 be 3a | 17 15 d5 c1 bf ca e3 9e c2 e2 ab ff 65 ee 7a 2c | f3 bf 14 cb 54 1e f5 5d 6b 0b 4b a3 c6 42 f2 c5 | 00 c2 f8 63 58 12 0f 9c c4 de 06 61 51 86 70 ce | 7a 0a 7a ff cc 71 b7 65 f5 cc 38 14 71 81 de 07 | b7 fe 20 84 4a ff 1c 5d 53 a3 fb 06 85 18 2b 9b | a8 30 c2 b9 8d e1 9c 07 b4 43 af 10 5f 03 0b 44 | c6 f5 8b 61 b9 fa 0b 3d 1c 32 63 5f 79 89 62 fd | 45 d5 92 76 17 fc 00 05 ef 5e 2c ec c0 11 2e 72 | 0f 45 e0 06 cd 9d 57 a6 22 61 8c 9b 78 8d c7 7e | 93 4b 6b 11 31 21 df b9 6f b0 e5 90 c6 6a 46 63 | 33 24 c9 bf 0d 8d 8a d0 3d 26 dd 1c 91 5a 75 0f | 70 13 b1 0c c1 ba 7c c8 70 09 19 0f b5 cd 04 5e | 6a af 66 e1 91 d5 09 48 02 32 4f dc 10 ea f4 57 | c2 40 bb 53 d3 0b 66 f6 59 f4 9d 9f 3c f5 45 a2 | 33 3b d9 2c 95 a0 76 aa 18 c3 43 fd 17 da c0 00 | 29 00 00 24 30 83 66 63 cd a6 58 35 d0 aa fe c7 | 9f 22 4a b9 bb d2 ab 8e e4 52 a2 c8 ac d9 43 99 | 4a 56 b6 54 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 4a aa 08 58 24 5b c5 80 af 06 0d | d7 f8 bd d3 f5 50 b0 3c 00 00 00 1c 00 00 40 05 | d9 15 55 e8 f6 53 18 54 ee 68 b7 cc 78 54 e7 63 | 8d 71 15 9f | state #634 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36000cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a986c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a986c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #634 | libevent_malloc: new ptr-libevent@0x7fb38006f870 size 128 | #634 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.256253 | resume sending helper answer for #634 suppresed complete_v2_state_transition() and stole MD | #634 spent 0.289 milliseconds in resume sending helper answer | stop processing: state #634 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c07fb40 | processing resume sending helper answer for #621 | start processing: state #621 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 621 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #621 | **emit ISAKMP Message: | initiator cookie: | b6 7b 13 e2 c1 f5 0d 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-53 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f5 57 84 d5 d7 fc 7b 03 ac 28 bd 55 7a cb 22 6d | ikev2 g^x 15 db d6 6e 10 22 25 dd 22 f0 db b6 64 1a 8e 62 | ikev2 g^x 37 1c 3c 87 76 d4 16 13 a1 20 70 51 e2 6c 88 a7 | ikev2 g^x 4c bd 9a e8 61 13 5b 96 2a 3a 11 b0 00 e4 41 12 | ikev2 g^x 45 a6 ec a4 25 97 e4 d4 fc 34 77 25 f0 6b ee ea | ikev2 g^x aa 50 40 a4 2e a8 4f 01 2d e4 44 bf 36 fc 59 62 | ikev2 g^x 62 e1 29 8a f9 0d 17 54 2b f3 92 0f 3e c7 98 e1 | ikev2 g^x c4 70 f5 a6 ce c1 0a 42 4d c9 8d ad 7d 6f 21 10 | ikev2 g^x 8c 9b 74 c6 74 d4 11 03 3c b2 a3 0a ef 7e 1b 84 | ikev2 g^x d0 6a 92 26 b5 27 71 3a d1 01 ed b9 54 c4 f1 85 | ikev2 g^x 17 24 83 a6 8f c1 1c 28 cf 64 6e 6b dc 51 3c 81 | ikev2 g^x 4c 28 f4 1b 29 ea f8 d0 93 36 3e 3f 53 a9 9f e5 | ikev2 g^x bd 65 1d 28 4d 88 e0 98 81 13 8e db f8 e2 17 a6 | ikev2 g^x 46 27 e5 1e a7 24 77 68 b9 82 43 d4 94 92 10 37 | ikev2 g^x d7 3f 29 86 6b cb 84 f7 07 f1 63 aa a8 fc 4a 8a | ikev2 g^x 7a c7 2e 35 5c f7 6f 1e 13 8c ec d2 d0 0f 26 77 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 61 45 c6 88 ed ea 89 96 4e e2 8d aa 07 4f da 3d | IKEv2 nonce da b9 b5 f4 0f 2b 6b 58 d6 df 11 d3 2e b8 7b 4c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b6 7b 13 e2 c1 f5 0d 74 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 35 | natd_hash: port= 01 f4 | natd_hash: hash= ab 1f a9 4a 68 19 c5 3d 06 56 c4 a1 6a 2d 5d 6d | natd_hash: hash= af 09 97 90 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ab 1f a9 4a 68 19 c5 3d 06 56 c4 a1 6a 2d 5d 6d | Notify data af 09 97 90 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b6 7b 13 e2 c1 f5 0d 74 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1d 2c b3 00 93 4a 54 e7 e8 53 57 b8 b6 97 f8 d9 | natd_hash: hash= 75 4e f7 33 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1d 2c b3 00 93 4a 54 e7 e8 53 57 b8 b6 97 f8 d9 | Notify data 75 4e f7 33 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #621 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #621 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #621 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #621: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #621 to 4294967295 after switching state | Message ID: IKE #621 skipping update_recv as MD is fake | Message ID: sent #621 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-53" #621: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.53:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #621) | b6 7b 13 e2 c1 f5 0d 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 57 84 d5 d7 fc 7b 03 ac 28 bd 55 7a cb 22 6d | 15 db d6 6e 10 22 25 dd 22 f0 db b6 64 1a 8e 62 | 37 1c 3c 87 76 d4 16 13 a1 20 70 51 e2 6c 88 a7 | 4c bd 9a e8 61 13 5b 96 2a 3a 11 b0 00 e4 41 12 | 45 a6 ec a4 25 97 e4 d4 fc 34 77 25 f0 6b ee ea | aa 50 40 a4 2e a8 4f 01 2d e4 44 bf 36 fc 59 62 | 62 e1 29 8a f9 0d 17 54 2b f3 92 0f 3e c7 98 e1 | c4 70 f5 a6 ce c1 0a 42 4d c9 8d ad 7d 6f 21 10 | 8c 9b 74 c6 74 d4 11 03 3c b2 a3 0a ef 7e 1b 84 | d0 6a 92 26 b5 27 71 3a d1 01 ed b9 54 c4 f1 85 | 17 24 83 a6 8f c1 1c 28 cf 64 6e 6b dc 51 3c 81 | 4c 28 f4 1b 29 ea f8 d0 93 36 3e 3f 53 a9 9f e5 | bd 65 1d 28 4d 88 e0 98 81 13 8e db f8 e2 17 a6 | 46 27 e5 1e a7 24 77 68 b9 82 43 d4 94 92 10 37 | d7 3f 29 86 6b cb 84 f7 07 f1 63 aa a8 fc 4a 8a | 7a c7 2e 35 5c f7 6f 1e 13 8c ec d2 d0 0f 26 77 | 29 00 00 24 61 45 c6 88 ed ea 89 96 4e e2 8d aa | 07 4f da 3d da b9 b5 f4 0f 2b 6b 58 d6 df 11 d3 | 2e b8 7b 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 1f a9 4a 68 19 c5 3d 06 56 c4 a1 | 6a 2d 5d 6d af 09 97 90 00 00 00 1c 00 00 40 05 | 1d 2c b3 00 93 4a 54 e7 e8 53 57 b8 b6 97 f8 d9 | 75 4e f7 33 | state #621 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb340039ba0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb3400296b0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3400296b0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #621 | libevent_malloc: new ptr-libevent@0x7fb35c07fb40 size 128 | #621 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.256562 | resume sending helper answer for #621 suppresed complete_v2_state_transition() and stole MD | #621 spent 0.285 milliseconds in resume sending helper answer | stop processing: state #621 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c064430 | processing resume sending helper answer for #645 | start processing: state #645 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 645 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #645 | **emit ISAKMP Message: | initiator cookie: | 0c 20 e9 c8 f1 ce 0d 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-159 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 82 8a 31 6e 84 8e ee 47 80 28 3e f7 bd 66 21 ae | ikev2 g^x a7 c9 66 e4 9c 35 61 f1 16 0f 1c cb 4f 8c 10 bf | ikev2 g^x 6e 35 2d be 88 b3 9e db c6 d4 0b 4b 1b d6 0f 24 | ikev2 g^x 0a 6c 6d be b6 de bc 90 ef 4c db b4 25 2b dc 87 | ikev2 g^x 6c 61 9d 02 4b ca cb c9 34 ad 89 73 4a df 91 ac | ikev2 g^x 37 e5 30 b7 38 08 c4 2c f4 c1 86 fe 1b b2 22 0b | ikev2 g^x ce d5 26 69 30 72 a1 b3 13 e0 7e 3f 95 c8 13 b6 | ikev2 g^x b2 52 42 87 85 da fd 89 fa ba 74 99 7e b0 e8 a5 | ikev2 g^x d9 b4 d7 c1 b8 d7 f9 52 8c 9d dd 2b fb 3e 32 c1 | ikev2 g^x 2a f7 f7 b1 ed 12 09 66 4c 2e 36 a5 31 5d 4c 2b | ikev2 g^x dd 02 ec 82 7d 54 39 7e 27 68 b2 8f ba 6c 9c 64 | ikev2 g^x e4 b1 54 a4 a9 83 73 da 3c f1 13 e7 c4 83 f9 34 | ikev2 g^x 4e 29 e4 9b 2c 98 6b 6d 2d 9b 19 b8 a0 13 da 3a | ikev2 g^x a2 7b d4 a1 cd 5e e2 80 01 c5 9e 85 09 f9 cc 94 | ikev2 g^x 06 6d 1b 4d b0 af 7d d7 8a af 03 99 b8 54 31 fd | ikev2 g^x 25 b5 36 4d e2 31 2f 3f 37 34 3b 6c c1 28 54 50 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ea 84 61 f6 e2 d9 2b 57 d4 d8 53 44 1c d8 bc 14 | IKEv2 nonce a4 bf f6 76 ae 29 c0 89 c3 03 25 b0 65 0c c5 3e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0c 20 e9 c8 f1 ce 0d 73 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9f | natd_hash: port= 01 f4 | natd_hash: hash= 0d bc 72 fe 0b 7e b4 5c e5 5d 2f 13 cc b7 37 44 | natd_hash: hash= 34 e3 88 7a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0d bc 72 fe 0b 7e b4 5c e5 5d 2f 13 cc b7 37 44 | Notify data 34 e3 88 7a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0c 20 e9 c8 f1 ce 0d 73 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= bf 80 a0 4f d4 d4 cc 7e 5e 5a ae 95 22 cc 4e 94 | natd_hash: hash= a3 26 fc 44 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bf 80 a0 4f d4 d4 cc 7e 5e 5a ae 95 22 cc 4e 94 | Notify data a3 26 fc 44 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #645 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #645 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #645 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #645: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #645 to 4294967295 after switching state | Message ID: IKE #645 skipping update_recv as MD is fake | Message ID: sent #645 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-159" #645: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.159:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #645) | 0c 20 e9 c8 f1 ce 0d 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 8a 31 6e 84 8e ee 47 80 28 3e f7 bd 66 21 ae | a7 c9 66 e4 9c 35 61 f1 16 0f 1c cb 4f 8c 10 bf | 6e 35 2d be 88 b3 9e db c6 d4 0b 4b 1b d6 0f 24 | 0a 6c 6d be b6 de bc 90 ef 4c db b4 25 2b dc 87 | 6c 61 9d 02 4b ca cb c9 34 ad 89 73 4a df 91 ac | 37 e5 30 b7 38 08 c4 2c f4 c1 86 fe 1b b2 22 0b | ce d5 26 69 30 72 a1 b3 13 e0 7e 3f 95 c8 13 b6 | b2 52 42 87 85 da fd 89 fa ba 74 99 7e b0 e8 a5 | d9 b4 d7 c1 b8 d7 f9 52 8c 9d dd 2b fb 3e 32 c1 | 2a f7 f7 b1 ed 12 09 66 4c 2e 36 a5 31 5d 4c 2b | dd 02 ec 82 7d 54 39 7e 27 68 b2 8f ba 6c 9c 64 | e4 b1 54 a4 a9 83 73 da 3c f1 13 e7 c4 83 f9 34 | 4e 29 e4 9b 2c 98 6b 6d 2d 9b 19 b8 a0 13 da 3a | a2 7b d4 a1 cd 5e e2 80 01 c5 9e 85 09 f9 cc 94 | 06 6d 1b 4d b0 af 7d d7 8a af 03 99 b8 54 31 fd | 25 b5 36 4d e2 31 2f 3f 37 34 3b 6c c1 28 54 50 | 29 00 00 24 ea 84 61 f6 e2 d9 2b 57 d4 d8 53 44 | 1c d8 bc 14 a4 bf f6 76 ae 29 c0 89 c3 03 25 b0 | 65 0c c5 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0d bc 72 fe 0b 7e b4 5c e5 5d 2f 13 | cc b7 37 44 34 e3 88 7a 00 00 00 1c 00 00 40 05 | bf 80 a0 4f d4 d4 cc 7e 5e 5a ae 95 22 cc 4e 94 | a3 26 fc 44 | state #645 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37004b7c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46aef6c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c044df0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #645 | libevent_malloc: new ptr-libevent@0x7fb34c064430 size 128 | #645 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.256866 | resume sending helper answer for #645 suppresed complete_v2_state_transition() and stole MD | #645 spent 0.284 milliseconds in resume sending helper answer | stop processing: state #645 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35406f780 | processing resume sending helper answer for #618 | start processing: state #618 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 618 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #618 | **emit ISAKMP Message: | initiator cookie: | 4c ec 39 dc 68 b5 59 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-139 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x eb 05 80 a5 c5 c3 f9 3c 54 41 f2 ff 45 6c 8e d4 | ikev2 g^x 8c 5e 68 7a a4 b6 14 c3 90 a7 72 c5 37 6e 6f 34 | ikev2 g^x 08 2b b2 1a 80 e0 96 44 12 49 4b 90 a0 23 38 84 | ikev2 g^x 7d 94 15 fa 5a f3 e0 cc 84 03 8f 8b 27 13 09 3a | ikev2 g^x 10 76 9b f5 54 eb 6e 14 d3 82 81 b0 db 0b 18 1a | ikev2 g^x 23 52 e5 6a 71 2c 20 30 0b 2d 6d ca 81 1f 7a 55 | ikev2 g^x e4 4b 85 3d 68 9a 6b d2 c5 64 b0 66 a7 3b 3d 0e | ikev2 g^x 93 9d 5d fa 9a a0 0a bf 68 5b fd ad 7d 7e af d8 | ikev2 g^x 9c 26 a4 24 3a 01 11 20 e2 46 b9 f1 ea 83 9f 1e | ikev2 g^x 92 ae 34 06 9d 01 75 70 1d c6 a8 17 f0 17 d4 e8 | ikev2 g^x 3f a5 fd b3 84 83 5a f3 64 23 e0 0e 62 67 3d 47 | ikev2 g^x bb 61 39 45 8d 5a 36 d7 90 42 a2 1e 97 de 94 c3 | ikev2 g^x fa ba ed 1b ac 33 c2 ed 5f a7 b7 09 79 e9 ef fd | ikev2 g^x d7 73 e1 c8 3d e6 bf ba cf ff dd 60 43 ef 89 b6 | ikev2 g^x 56 0d 72 f9 c8 aa 8e 1a 35 4f 05 5c 43 b5 97 90 | ikev2 g^x 99 49 cf 4e 52 3c a6 31 26 76 2b 78 5b c5 df ff | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f5 f5 e3 7d da 51 1c 42 32 a8 10 86 f8 ee 92 c6 | IKEv2 nonce 41 8c 4c bf 39 0a f7 2f 54 e9 a0 ad 67 1a 3b 2c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4c ec 39 dc 68 b5 59 63 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8b | natd_hash: port= 01 f4 | natd_hash: hash= b9 f8 d9 8a 1f 35 3a 8c 98 12 8b 5d 4d ad 41 c9 | natd_hash: hash= 74 54 12 de | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b9 f8 d9 8a 1f 35 3a 8c 98 12 8b 5d 4d ad 41 c9 | Notify data 74 54 12 de | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4c ec 39 dc 68 b5 59 63 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 37 33 26 b1 70 e0 75 6d 56 a5 af 29 8a b8 60 f1 | natd_hash: hash= 31 e0 30 c5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 37 33 26 b1 70 e0 75 6d 56 a5 af 29 8a b8 60 f1 | Notify data 31 e0 30 c5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #618 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #618 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #618 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #618: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #618 to 4294967295 after switching state | Message ID: IKE #618 skipping update_recv as MD is fake | Message ID: sent #618 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-139" #618: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.139:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #618) | 4c ec 39 dc 68 b5 59 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb 05 80 a5 c5 c3 f9 3c 54 41 f2 ff 45 6c 8e d4 | 8c 5e 68 7a a4 b6 14 c3 90 a7 72 c5 37 6e 6f 34 | 08 2b b2 1a 80 e0 96 44 12 49 4b 90 a0 23 38 84 | 7d 94 15 fa 5a f3 e0 cc 84 03 8f 8b 27 13 09 3a | 10 76 9b f5 54 eb 6e 14 d3 82 81 b0 db 0b 18 1a | 23 52 e5 6a 71 2c 20 30 0b 2d 6d ca 81 1f 7a 55 | e4 4b 85 3d 68 9a 6b d2 c5 64 b0 66 a7 3b 3d 0e | 93 9d 5d fa 9a a0 0a bf 68 5b fd ad 7d 7e af d8 | 9c 26 a4 24 3a 01 11 20 e2 46 b9 f1 ea 83 9f 1e | 92 ae 34 06 9d 01 75 70 1d c6 a8 17 f0 17 d4 e8 | 3f a5 fd b3 84 83 5a f3 64 23 e0 0e 62 67 3d 47 | bb 61 39 45 8d 5a 36 d7 90 42 a2 1e 97 de 94 c3 | fa ba ed 1b ac 33 c2 ed 5f a7 b7 09 79 e9 ef fd | d7 73 e1 c8 3d e6 bf ba cf ff dd 60 43 ef 89 b6 | 56 0d 72 f9 c8 aa 8e 1a 35 4f 05 5c 43 b5 97 90 | 99 49 cf 4e 52 3c a6 31 26 76 2b 78 5b c5 df ff | 29 00 00 24 f5 f5 e3 7d da 51 1c 42 32 a8 10 86 | f8 ee 92 c6 41 8c 4c bf 39 0a f7 2f 54 e9 a0 ad | 67 1a 3b 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 f8 d9 8a 1f 35 3a 8c 98 12 8b 5d | 4d ad 41 c9 74 54 12 de 00 00 00 1c 00 00 40 05 | 37 33 26 b1 70 e0 75 6d 56 a5 af 29 8a b8 60 f1 | 31 e0 30 c5 | state #618 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374034460 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37402ffb0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #618 | libevent_malloc: new ptr-libevent@0x7fb35406f780 size 128 | #618 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.257234 | resume sending helper answer for #618 suppresed complete_v2_state_transition() and stole MD | #618 spent 0.334 milliseconds in resume sending helper answer | stop processing: state #618 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb360067120 | processing resume sending helper answer for #595 | start processing: state #595 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 595 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #595 | **emit ISAKMP Message: | initiator cookie: | 66 ab aa e9 c0 1d b7 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-69 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 95 88 48 07 d2 42 4a 84 d5 c0 a3 1c d8 61 7a 51 | ikev2 g^x c0 04 1f 03 a6 14 4a 32 5e 37 8c 55 58 7b 77 2c | ikev2 g^x fb 55 e5 4e 6e 7e 47 ee 34 35 95 55 b7 b4 f8 60 | ikev2 g^x 9b a6 0e e2 75 cb 31 e2 b7 b1 0c c7 21 34 4e 50 | ikev2 g^x 7e 01 12 0e a8 09 e6 15 2f b7 95 a1 e4 49 25 11 | ikev2 g^x ac 79 61 4c de 52 7d 92 78 d2 3a 93 7f 39 9e ea | ikev2 g^x 46 19 3b 55 df f1 20 bc 73 20 02 d2 83 5b c5 c6 | ikev2 g^x 0b 63 b0 e9 03 aa 59 7f c4 15 87 10 2c 75 31 89 | ikev2 g^x e4 a2 a3 eb 70 c0 6a 70 01 fd e2 c8 7f d0 49 6d | ikev2 g^x 0b 69 e6 19 f8 ef ed 1c b2 75 a1 ef be b8 a0 04 | ikev2 g^x 19 f6 c9 5b af 6f 00 73 b8 d5 c5 23 40 6a a8 85 | ikev2 g^x 63 89 e6 04 8d b9 58 50 ce 42 06 0d 04 dd f1 d0 | ikev2 g^x b1 74 e0 f6 e2 3c fc e3 28 f1 bf eb 46 d0 6e a8 | ikev2 g^x a2 18 6d cf 33 6c 77 01 6e 12 a3 df 95 47 d2 df | ikev2 g^x 9f e9 63 f7 ac ac 70 17 4e 2f 38 fa dc cb 8c 97 | ikev2 g^x 70 a7 26 56 6a e9 c8 f7 90 d3 4d cd 2d 8d 00 8f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 94 2f 5e 13 28 37 ce fc 76 9e ef e3 9f a7 fb e4 | IKEv2 nonce ea 24 27 bd c2 06 13 48 b6 99 58 8b d4 82 fe 13 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 66 ab aa e9 c0 1d b7 c7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 45 | natd_hash: port= 01 f4 | natd_hash: hash= 96 79 3a 6c aa 9d cd 78 ee ff 71 61 9e c1 38 f2 | natd_hash: hash= 06 7e 22 47 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 96 79 3a 6c aa 9d cd 78 ee ff 71 61 9e c1 38 f2 | Notify data 06 7e 22 47 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 66 ab aa e9 c0 1d b7 c7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1a 47 95 0a 50 1d 20 46 3c 7c f6 eb 28 2d 43 03 | natd_hash: hash= 7b 00 02 4e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1a 47 95 0a 50 1d 20 46 3c 7c f6 eb 28 2d 43 03 | Notify data 7b 00 02 4e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #595 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #595 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #595 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #595: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #595 to 4294967295 after switching state | Message ID: IKE #595 skipping update_recv as MD is fake | Message ID: sent #595 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-69" #595: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.69:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #595) | 66 ab aa e9 c0 1d b7 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 88 48 07 d2 42 4a 84 d5 c0 a3 1c d8 61 7a 51 | c0 04 1f 03 a6 14 4a 32 5e 37 8c 55 58 7b 77 2c | fb 55 e5 4e 6e 7e 47 ee 34 35 95 55 b7 b4 f8 60 | 9b a6 0e e2 75 cb 31 e2 b7 b1 0c c7 21 34 4e 50 | 7e 01 12 0e a8 09 e6 15 2f b7 95 a1 e4 49 25 11 | ac 79 61 4c de 52 7d 92 78 d2 3a 93 7f 39 9e ea | 46 19 3b 55 df f1 20 bc 73 20 02 d2 83 5b c5 c6 | 0b 63 b0 e9 03 aa 59 7f c4 15 87 10 2c 75 31 89 | e4 a2 a3 eb 70 c0 6a 70 01 fd e2 c8 7f d0 49 6d | 0b 69 e6 19 f8 ef ed 1c b2 75 a1 ef be b8 a0 04 | 19 f6 c9 5b af 6f 00 73 b8 d5 c5 23 40 6a a8 85 | 63 89 e6 04 8d b9 58 50 ce 42 06 0d 04 dd f1 d0 | b1 74 e0 f6 e2 3c fc e3 28 f1 bf eb 46 d0 6e a8 | a2 18 6d cf 33 6c 77 01 6e 12 a3 df 95 47 d2 df | 9f e9 63 f7 ac ac 70 17 4e 2f 38 fa dc cb 8c 97 | 70 a7 26 56 6a e9 c8 f7 90 d3 4d cd 2d 8d 00 8f | 29 00 00 24 94 2f 5e 13 28 37 ce fc 76 9e ef e3 | 9f a7 fb e4 ea 24 27 bd c2 06 13 48 b6 99 58 8b | d4 82 fe 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 79 3a 6c aa 9d cd 78 ee ff 71 61 | 9e c1 38 f2 06 7e 22 47 00 00 00 1c 00 00 40 05 | 1a 47 95 0a 50 1d 20 46 3c 7c f6 eb 28 2d 43 03 | 7b 00 02 4e | state #595 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388037a30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb38800f8f0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800f8f0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #595 | libevent_malloc: new ptr-libevent@0x7fb360067120 size 128 | #595 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.257696 | resume sending helper answer for #595 suppresed complete_v2_state_transition() and stole MD | #595 spent 0.429 milliseconds in resume sending helper answer | stop processing: state #595 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3700647d0 | processing resume sending helper answer for #660 | start processing: state #660 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 660 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #660 | **emit ISAKMP Message: | initiator cookie: | f4 6f 1b dd c3 97 a8 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-158 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c0 37 97 23 37 8b 84 91 b7 d5 21 d4 0b 62 7c cf | ikev2 g^x df e2 ac 72 2e 0a eb 49 05 1e 0b d1 82 e5 28 a0 | ikev2 g^x 47 bf aa c5 1d ae 5f 11 86 7c 19 a8 50 7c 93 a7 | ikev2 g^x 55 26 f6 b4 50 6b 43 66 6c c7 3d c1 5d f4 f7 0a | ikev2 g^x 0d b0 76 fa d6 23 62 3b 1d 9f 31 fa 3c 7b 58 7d | ikev2 g^x 20 ee 3b e3 02 2d bf 91 fc fc d4 ac 54 85 8f 34 | ikev2 g^x bf 3f 83 61 da 9a ff 82 88 23 3a fb 4a 68 00 0e | ikev2 g^x 90 da 22 07 27 44 0b 38 18 7b fc 7b 8a 26 93 c0 | ikev2 g^x 1e 09 9d 89 91 4e 14 70 0d 4d 2d 4e ab bc 7f 26 | ikev2 g^x aa a9 94 f1 34 22 dd 7b 42 4c a3 e0 64 ec 38 19 | ikev2 g^x e6 3a a1 45 f1 cc d3 8d 48 6c 60 e0 64 aa aa ad | ikev2 g^x 45 97 98 aa 45 d3 c1 ab 72 70 13 f6 87 f5 77 97 | ikev2 g^x bb d6 89 10 72 26 9b 74 6d a2 b8 41 cf 4b ed 68 | ikev2 g^x 80 d1 34 25 2d 5a f2 69 e3 2f e2 d6 b5 73 2b 4f | ikev2 g^x 8b d7 f9 67 93 34 a8 36 26 8a 04 d9 41 75 a6 2d | ikev2 g^x c6 bd e6 a0 4a 9b e7 19 bc a9 be 99 5e cb 41 13 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f1 66 b3 02 a5 40 db 5b d9 27 9e 01 78 88 6e 9e | IKEv2 nonce 88 60 63 b3 32 3e c6 3b 89 b4 92 37 a6 ee de 2f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f4 6f 1b dd c3 97 a8 a6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 9e | natd_hash: port= 01 f4 | natd_hash: hash= 3f 7f 7c 35 fb 6c 2b b5 a9 0e ea 70 a6 e8 51 cd | natd_hash: hash= 42 c4 a3 5b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3f 7f 7c 35 fb 6c 2b b5 a9 0e ea 70 a6 e8 51 cd | Notify data 42 c4 a3 5b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f4 6f 1b dd c3 97 a8 a6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ce 14 69 fa 68 3a 26 bd 8e d9 0e 4d a9 f2 9c 90 | natd_hash: hash= 2d 53 9b 3d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ce 14 69 fa 68 3a 26 bd 8e d9 0e 4d a9 f2 9c 90 | Notify data 2d 53 9b 3d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #660 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #660 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #660 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #660: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #660 to 4294967295 after switching state | Message ID: IKE #660 skipping update_recv as MD is fake | Message ID: sent #660 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-158" #660: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.158:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #660) | f4 6f 1b dd c3 97 a8 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 37 97 23 37 8b 84 91 b7 d5 21 d4 0b 62 7c cf | df e2 ac 72 2e 0a eb 49 05 1e 0b d1 82 e5 28 a0 | 47 bf aa c5 1d ae 5f 11 86 7c 19 a8 50 7c 93 a7 | 55 26 f6 b4 50 6b 43 66 6c c7 3d c1 5d f4 f7 0a | 0d b0 76 fa d6 23 62 3b 1d 9f 31 fa 3c 7b 58 7d | 20 ee 3b e3 02 2d bf 91 fc fc d4 ac 54 85 8f 34 | bf 3f 83 61 da 9a ff 82 88 23 3a fb 4a 68 00 0e | 90 da 22 07 27 44 0b 38 18 7b fc 7b 8a 26 93 c0 | 1e 09 9d 89 91 4e 14 70 0d 4d 2d 4e ab bc 7f 26 | aa a9 94 f1 34 22 dd 7b 42 4c a3 e0 64 ec 38 19 | e6 3a a1 45 f1 cc d3 8d 48 6c 60 e0 64 aa aa ad | 45 97 98 aa 45 d3 c1 ab 72 70 13 f6 87 f5 77 97 | bb d6 89 10 72 26 9b 74 6d a2 b8 41 cf 4b ed 68 | 80 d1 34 25 2d 5a f2 69 e3 2f e2 d6 b5 73 2b 4f | 8b d7 f9 67 93 34 a8 36 26 8a 04 d9 41 75 a6 2d | c6 bd e6 a0 4a 9b e7 19 bc a9 be 99 5e cb 41 13 | 29 00 00 24 f1 66 b3 02 a5 40 db 5b d9 27 9e 01 | 78 88 6e 9e 88 60 63 b3 32 3e c6 3b 89 b4 92 37 | a6 ee de 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f 7f 7c 35 fb 6c 2b b5 a9 0e ea 70 | a6 e8 51 cd 42 c4 a3 5b 00 00 00 1c 00 00 40 05 | ce 14 69 fa 68 3a 26 bd 8e d9 0e 4d a9 f2 9c 90 | 2d 53 9b 3d | state #660 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c04b850 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c017ea0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #660 | libevent_malloc: new ptr-libevent@0x7fb3700647d0 size 128 | #660 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.258163 | resume sending helper answer for #660 suppresed complete_v2_state_transition() and stole MD | #660 spent 0.423 milliseconds in resume sending helper answer | stop processing: state #660 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35007d2f0 | processing resume sending helper answer for #647 | start processing: state #647 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 647 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #647 | **emit ISAKMP Message: | initiator cookie: | a9 15 25 50 c3 89 9b ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-206 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f3 0f 1a 9b c2 c1 27 9f 86 de 54 44 d0 24 9d 6a | ikev2 g^x 45 ee aa 3d 9a 82 6c cc 7f 5a 10 2c 59 c9 22 f3 | ikev2 g^x 34 55 04 3d 8b 40 f1 78 07 5b 1e 30 68 89 14 97 | ikev2 g^x bb 5f 4d f3 15 66 be e0 4a d0 41 bd 55 74 f7 a1 | ikev2 g^x 6b 5c c4 02 57 e6 80 ea 7f cb 60 fd b8 98 71 32 | ikev2 g^x 6d 87 75 4e 58 e3 ec cc 2e d4 bc 64 e8 77 a7 a9 | ikev2 g^x 8d 8d 5b 9b 51 d9 37 9c 0c 0c 7a 22 96 b8 a2 26 | ikev2 g^x 89 d0 75 ed e8 65 8b fc 2a 83 34 29 39 47 fd c0 | ikev2 g^x 22 02 dc 03 48 eb ab 15 4b 4d ed b4 52 db 67 35 | ikev2 g^x cc 06 96 a5 b0 73 95 a7 9a 74 43 21 02 98 b3 07 | ikev2 g^x be a3 dc 76 24 de e8 96 45 29 b9 08 2b da 6c 70 | ikev2 g^x 45 74 38 4c 76 73 8d c4 3a 57 9d 7d bc 8c cb 79 | ikev2 g^x 70 0a 09 47 dc 14 98 38 75 a6 25 2e 9f 4a b1 fc | ikev2 g^x b8 6d 3f 57 fc c2 a2 48 3b 42 ab 67 ad f1 0d 72 | ikev2 g^x 8a d2 0f 62 dc 08 25 a1 63 8c 91 4c 28 7e 0a 45 | ikev2 g^x 95 7c 48 d3 57 c8 ca 2a 17 b1 f3 78 10 3b a0 11 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 25 47 22 11 f3 7d 2a 09 ec 1c bc 5b ea d8 0a 15 | IKEv2 nonce cd 9d 69 8e 1e b3 ca b8 a6 0d 22 5d 28 7b af f6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a9 15 25 50 c3 89 9b ad | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ce | natd_hash: port= 01 f4 | natd_hash: hash= 1c 3c 41 1d 92 d7 b9 38 bc 5b eb cb 32 90 40 77 | natd_hash: hash= f1 b7 dd e6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1c 3c 41 1d 92 d7 b9 38 bc 5b eb cb 32 90 40 77 | Notify data f1 b7 dd e6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a9 15 25 50 c3 89 9b ad | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 63 f4 fa ff 4d 8b 5a 8c fe ca 58 3f 4d 61 7e 87 | natd_hash: hash= 43 3e 7c 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 63 f4 fa ff 4d 8b 5a 8c fe ca 58 3f 4d 61 7e 87 | Notify data 43 3e 7c 36 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #647 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #647 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #647 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #647: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #647 to 4294967295 after switching state | Message ID: IKE #647 skipping update_recv as MD is fake | Message ID: sent #647 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-206" #647: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.206:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #647) | a9 15 25 50 c3 89 9b ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 0f 1a 9b c2 c1 27 9f 86 de 54 44 d0 24 9d 6a | 45 ee aa 3d 9a 82 6c cc 7f 5a 10 2c 59 c9 22 f3 | 34 55 04 3d 8b 40 f1 78 07 5b 1e 30 68 89 14 97 | bb 5f 4d f3 15 66 be e0 4a d0 41 bd 55 74 f7 a1 | 6b 5c c4 02 57 e6 80 ea 7f cb 60 fd b8 98 71 32 | 6d 87 75 4e 58 e3 ec cc 2e d4 bc 64 e8 77 a7 a9 | 8d 8d 5b 9b 51 d9 37 9c 0c 0c 7a 22 96 b8 a2 26 | 89 d0 75 ed e8 65 8b fc 2a 83 34 29 39 47 fd c0 | 22 02 dc 03 48 eb ab 15 4b 4d ed b4 52 db 67 35 | cc 06 96 a5 b0 73 95 a7 9a 74 43 21 02 98 b3 07 | be a3 dc 76 24 de e8 96 45 29 b9 08 2b da 6c 70 | 45 74 38 4c 76 73 8d c4 3a 57 9d 7d bc 8c cb 79 | 70 0a 09 47 dc 14 98 38 75 a6 25 2e 9f 4a b1 fc | b8 6d 3f 57 fc c2 a2 48 3b 42 ab 67 ad f1 0d 72 | 8a d2 0f 62 dc 08 25 a1 63 8c 91 4c 28 7e 0a 45 | 95 7c 48 d3 57 c8 ca 2a 17 b1 f3 78 10 3b a0 11 | 29 00 00 24 25 47 22 11 f3 7d 2a 09 ec 1c bc 5b | ea d8 0a 15 cd 9d 69 8e 1e b3 ca b8 a6 0d 22 5d | 28 7b af f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 3c 41 1d 92 d7 b9 38 bc 5b eb cb | 32 90 40 77 f1 b7 dd e6 00 00 00 1c 00 00 40 05 | 63 f4 fa ff 4d 8b 5a 8c fe ca 58 3f 4d 61 7e 87 | 43 3e 7c 36 | state #647 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3780251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a82ac0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a82ac0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #647 | libevent_malloc: new ptr-libevent@0x7fb35007d2f0 size 128 | #647 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.258473 | resume sending helper answer for #647 suppresed complete_v2_state_transition() and stole MD | #647 spent 0.288 milliseconds in resume sending helper answer | stop processing: state #647 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb350077b10 | processing resume sending helper answer for #648 | start processing: state #648 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 648 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #648 | **emit ISAKMP Message: | initiator cookie: | b9 3d 2a c0 99 78 dc 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-175 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d1 7b a0 b8 ff d9 f3 24 c5 c3 d8 fe 42 9c 4d 77 | ikev2 g^x 77 a6 2f 14 34 b3 64 24 e9 fd 75 86 48 0e 02 3d | ikev2 g^x 29 61 ad 94 16 d0 85 d6 e8 56 c2 ef 63 79 8f 41 | ikev2 g^x 57 5b 33 d0 fc 13 7d 5c da 24 5a b9 25 c8 06 1f | ikev2 g^x 52 14 77 e7 a4 dc b1 90 16 a1 f9 07 e6 89 42 44 | ikev2 g^x 14 11 d5 fc e5 92 89 2d 0e 64 88 0c 41 3b 46 99 | ikev2 g^x d6 26 50 07 c1 0c f4 24 da 69 56 28 7a 00 82 4f | ikev2 g^x 0c 3a af e9 e7 f5 55 29 53 80 5f 77 a4 ce 23 5d | ikev2 g^x 9b 10 b0 b2 48 b8 fc ff 0f 47 dc ca e2 38 a1 5a | ikev2 g^x b6 68 17 c3 f7 a2 7a af f2 60 dd 39 8f cf b9 23 | ikev2 g^x a2 af 01 98 52 e1 93 81 05 30 fb 55 27 53 74 30 | ikev2 g^x 4e c5 de 2a e5 a1 62 ce e0 cf e4 81 03 e4 82 30 | ikev2 g^x b0 0a ce da 25 c7 a9 75 ae 95 0c 31 7d 34 b5 13 | ikev2 g^x 8d b7 30 4c a2 f5 b0 bd 9f 11 16 f0 69 7c 07 96 | ikev2 g^x dc 39 0d a1 91 0f 8e 6b bf ba 41 e2 14 8b c7 d0 | ikev2 g^x 61 8c af 22 83 20 d8 ee a4 27 68 8b 20 f6 53 87 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7f 9a 6e e6 d8 99 8c fa 9e 3a 9d bc 69 5e e6 c5 | IKEv2 nonce 2d a1 c8 09 75 1b 7d 75 dd dd b5 32 5f 0c 0c 55 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b9 3d 2a c0 99 78 dc 24 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 af | natd_hash: port= 01 f4 | natd_hash: hash= 7e 5a 6c 36 b7 e3 94 c7 44 df 76 5a 27 bb 1d a1 | natd_hash: hash= 14 37 1f 63 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7e 5a 6c 36 b7 e3 94 c7 44 df 76 5a 27 bb 1d a1 | Notify data 14 37 1f 63 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b9 3d 2a c0 99 78 dc 24 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= cb 53 89 2a 35 01 2c a3 94 35 40 7a f6 29 fc a1 | natd_hash: hash= 5c fa 01 07 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cb 53 89 2a 35 01 2c a3 94 35 40 7a f6 29 fc a1 | Notify data 5c fa 01 07 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #648 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #648 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #648 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #648: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #648 to 4294967295 after switching state | Message ID: IKE #648 skipping update_recv as MD is fake | Message ID: sent #648 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-175" #648: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.175:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #648) | b9 3d 2a c0 99 78 dc 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 7b a0 b8 ff d9 f3 24 c5 c3 d8 fe 42 9c 4d 77 | 77 a6 2f 14 34 b3 64 24 e9 fd 75 86 48 0e 02 3d | 29 61 ad 94 16 d0 85 d6 e8 56 c2 ef 63 79 8f 41 | 57 5b 33 d0 fc 13 7d 5c da 24 5a b9 25 c8 06 1f | 52 14 77 e7 a4 dc b1 90 16 a1 f9 07 e6 89 42 44 | 14 11 d5 fc e5 92 89 2d 0e 64 88 0c 41 3b 46 99 | d6 26 50 07 c1 0c f4 24 da 69 56 28 7a 00 82 4f | 0c 3a af e9 e7 f5 55 29 53 80 5f 77 a4 ce 23 5d | 9b 10 b0 b2 48 b8 fc ff 0f 47 dc ca e2 38 a1 5a | b6 68 17 c3 f7 a2 7a af f2 60 dd 39 8f cf b9 23 | a2 af 01 98 52 e1 93 81 05 30 fb 55 27 53 74 30 | 4e c5 de 2a e5 a1 62 ce e0 cf e4 81 03 e4 82 30 | b0 0a ce da 25 c7 a9 75 ae 95 0c 31 7d 34 b5 13 | 8d b7 30 4c a2 f5 b0 bd 9f 11 16 f0 69 7c 07 96 | dc 39 0d a1 91 0f 8e 6b bf ba 41 e2 14 8b c7 d0 | 61 8c af 22 83 20 d8 ee a4 27 68 8b 20 f6 53 87 | 29 00 00 24 7f 9a 6e e6 d8 99 8c fa 9e 3a 9d bc | 69 5e e6 c5 2d a1 c8 09 75 1b 7d 75 dd dd b5 32 | 5f 0c 0c 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 5a 6c 36 b7 e3 94 c7 44 df 76 5a | 27 bb 1d a1 14 37 1f 63 00 00 00 1c 00 00 40 05 | cb 53 89 2a 35 01 2c a3 94 35 40 7a f6 29 fc a1 | 5c fa 01 07 | state #648 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c00cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b25c40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #648 | libevent_malloc: new ptr-libevent@0x7fb350077b10 size 128 | #648 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.258779 | resume sending helper answer for #648 suppresed complete_v2_state_transition() and stole MD | #648 spent 0.283 milliseconds in resume sending helper answer | stop processing: state #648 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb380080010 | processing resume sending helper answer for #653 | start processing: state #653 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 653 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #653 | **emit ISAKMP Message: | initiator cookie: | 19 90 a9 40 6e 35 eb 8e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-58 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x cc a0 df ea dc 81 2e 85 84 b3 88 d1 54 50 1f b7 | ikev2 g^x c9 69 78 56 a1 62 6e 3e 83 05 4c c5 0e 7d 43 19 | ikev2 g^x 8c 06 52 c2 a8 47 39 7d 94 80 f0 24 21 75 9e 6f | ikev2 g^x 1a c9 4d 5f cb 04 6f 4e 48 25 b0 ee c9 3a 49 af | ikev2 g^x 9d 29 53 80 25 fe 82 fa ab e2 2f 9c a5 c4 60 41 | ikev2 g^x 00 8e d7 94 37 d0 f2 cc f3 8f c9 88 17 25 4b 93 | ikev2 g^x 4f 2c 01 16 89 ef 44 27 0f 7f bd d6 c8 39 c0 0d | ikev2 g^x 3b 37 3e 31 8d f1 93 95 ef a9 f2 83 75 f5 e9 66 | ikev2 g^x df 0e 5e 66 f8 be ce 8f 89 2d f8 24 18 90 ca 0e | ikev2 g^x ca 2a 03 0e df 25 3b 31 01 c2 15 74 75 2a d5 f1 | ikev2 g^x 83 43 31 31 83 fe 2a 23 9a bf 63 a0 48 cf 76 6d | ikev2 g^x 70 1e 06 b5 a1 3f ca 5e e8 cf fd 49 e7 27 8b f5 | ikev2 g^x e3 c3 9b ac 46 ce 1a c3 b0 62 c4 bf 3b 39 e9 ac | ikev2 g^x 0a 86 26 cd 41 dc 9e 57 6d e5 3f d5 e0 0e 0d 43 | ikev2 g^x 19 a5 50 e0 89 79 ac da 12 c8 36 b4 26 48 75 fe | ikev2 g^x 11 60 3a e4 7f 85 fb 66 94 49 d3 0e e3 76 01 2f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 54 ec 9e 13 c5 d8 7a ef 3a 76 6b b5 4a b4 c9 12 | IKEv2 nonce a6 ab f3 2b 6b be 93 f7 34 95 e6 4e 7f d1 e9 a3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 19 90 a9 40 6e 35 eb 8e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3a | natd_hash: port= 01 f4 | natd_hash: hash= 34 79 56 04 65 8f 33 45 00 ea 05 99 f8 b0 1e db | natd_hash: hash= ca 41 9d cc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 34 79 56 04 65 8f 33 45 00 ea 05 99 f8 b0 1e db | Notify data ca 41 9d cc | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 19 90 a9 40 6e 35 eb 8e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 8e 15 0a 12 2a bb 30 1b c7 7c 01 c4 0d 46 64 bd | natd_hash: hash= fa 92 a2 23 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8e 15 0a 12 2a bb 30 1b c7 7c 01 c4 0d 46 64 bd | Notify data fa 92 a2 23 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #653 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #653 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #653 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #653: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #653 to 4294967295 after switching state | Message ID: IKE #653 skipping update_recv as MD is fake | Message ID: sent #653 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-58" #653: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.58:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #653) | 19 90 a9 40 6e 35 eb 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc a0 df ea dc 81 2e 85 84 b3 88 d1 54 50 1f b7 | c9 69 78 56 a1 62 6e 3e 83 05 4c c5 0e 7d 43 19 | 8c 06 52 c2 a8 47 39 7d 94 80 f0 24 21 75 9e 6f | 1a c9 4d 5f cb 04 6f 4e 48 25 b0 ee c9 3a 49 af | 9d 29 53 80 25 fe 82 fa ab e2 2f 9c a5 c4 60 41 | 00 8e d7 94 37 d0 f2 cc f3 8f c9 88 17 25 4b 93 | 4f 2c 01 16 89 ef 44 27 0f 7f bd d6 c8 39 c0 0d | 3b 37 3e 31 8d f1 93 95 ef a9 f2 83 75 f5 e9 66 | df 0e 5e 66 f8 be ce 8f 89 2d f8 24 18 90 ca 0e | ca 2a 03 0e df 25 3b 31 01 c2 15 74 75 2a d5 f1 | 83 43 31 31 83 fe 2a 23 9a bf 63 a0 48 cf 76 6d | 70 1e 06 b5 a1 3f ca 5e e8 cf fd 49 e7 27 8b f5 | e3 c3 9b ac 46 ce 1a c3 b0 62 c4 bf 3b 39 e9 ac | 0a 86 26 cd 41 dc 9e 57 6d e5 3f d5 e0 0e 0d 43 | 19 a5 50 e0 89 79 ac da 12 c8 36 b4 26 48 75 fe | 11 60 3a e4 7f 85 fb 66 94 49 d3 0e e3 76 01 2f | 29 00 00 24 54 ec 9e 13 c5 d8 7a ef 3a 76 6b b5 | 4a b4 c9 12 a6 ab f3 2b 6b be 93 f7 34 95 e6 4e | 7f d1 e9 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 79 56 04 65 8f 33 45 00 ea 05 99 | f8 b0 1e db ca 41 9d cc 00 00 00 1c 00 00 40 05 | 8e 15 0a 12 2a bb 30 1b c7 7c 01 c4 0d 46 64 bd | fa 92 a2 23 | state #653 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3880269d0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46abe780 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe780 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #653 | libevent_malloc: new ptr-libevent@0x7fb380080010 size 128 | #653 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.259117 | resume sending helper answer for #653 suppresed complete_v2_state_transition() and stole MD | #653 spent 0.315 milliseconds in resume sending helper answer | stop processing: state #653 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388075630 | processing resume sending helper answer for #612 | start processing: state #612 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 612 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #612 | **emit ISAKMP Message: | initiator cookie: | 06 13 d7 c6 41 b2 86 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-73 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 26 8d f1 f4 22 24 65 49 2a a6 70 28 29 5c 96 09 | ikev2 g^x 3e 1e 78 f6 de 7f d4 6d 8f 70 0c e4 5b aa e7 34 | ikev2 g^x 60 3a b8 ce 9c c3 f2 55 c4 78 5c 37 a6 84 38 22 | ikev2 g^x 93 67 fa f8 c2 df 15 e3 9e 8e 26 44 fc e4 fa 8f | ikev2 g^x 57 f5 49 ed 86 e7 16 45 96 6d 10 ea 0c 90 8a 31 | ikev2 g^x e9 a7 90 56 ec d2 20 8b 2a b3 08 b3 f3 33 e4 7b | ikev2 g^x 20 92 e0 01 19 6d 6c ce 7a bf 9a 7b 89 9f 35 9e | ikev2 g^x 58 9d d3 ad 5b d8 c7 e9 b8 71 4b f7 a5 1c ea 1a | ikev2 g^x cc c7 49 f3 04 3d 6a 30 5e 5f 6e 57 b4 d0 06 19 | ikev2 g^x df 2d c3 be a9 ad 0b 91 01 58 72 3d a2 3a 97 fa | ikev2 g^x 3b 4f d0 1f 09 3f ec 9c 6a 4d ad a3 d7 03 7d fb | ikev2 g^x fd d5 f6 df 9c 11 0f 03 14 5d 5b e8 e8 f0 46 2d | ikev2 g^x 46 0e 42 78 aa d4 b4 d3 de c9 9d 1d a1 10 3b 2b | ikev2 g^x 48 75 16 7b f6 27 2f 9d 63 b1 ad df dc bd c2 01 | ikev2 g^x 65 a8 1f 4c aa c7 7b 56 c8 5f 06 1e bb 73 93 0a | ikev2 g^x 1f 90 b0 df 46 4d 2e 1e af 83 bf da a6 c2 4b 21 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 14 45 39 c3 b2 be 10 35 86 8a 8d fa 46 03 d4 c9 | IKEv2 nonce b6 c1 c2 c0 bf 3c af 6e ab be 7e b7 9a 44 cd df | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 06 13 d7 c6 41 b2 86 2e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 49 | natd_hash: port= 01 f4 | natd_hash: hash= bc 94 44 11 03 fc a1 a4 72 04 35 93 3e a4 98 88 | natd_hash: hash= 8e 5c 65 1b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bc 94 44 11 03 fc a1 a4 72 04 35 93 3e a4 98 88 | Notify data 8e 5c 65 1b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 06 13 d7 c6 41 b2 86 2e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 24 c4 24 16 66 f3 44 ba aa f9 26 a7 a0 53 d9 b2 | natd_hash: hash= 41 97 1c a3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 24 c4 24 16 66 f3 44 ba aa f9 26 a7 a0 53 d9 b2 | Notify data 41 97 1c a3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #612 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #612 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #612 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #612: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #612 to 4294967295 after switching state | Message ID: IKE #612 skipping update_recv as MD is fake | Message ID: sent #612 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-73" #612: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.73:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #612) | 06 13 d7 c6 41 b2 86 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 8d f1 f4 22 24 65 49 2a a6 70 28 29 5c 96 09 | 3e 1e 78 f6 de 7f d4 6d 8f 70 0c e4 5b aa e7 34 | 60 3a b8 ce 9c c3 f2 55 c4 78 5c 37 a6 84 38 22 | 93 67 fa f8 c2 df 15 e3 9e 8e 26 44 fc e4 fa 8f | 57 f5 49 ed 86 e7 16 45 96 6d 10 ea 0c 90 8a 31 | e9 a7 90 56 ec d2 20 8b 2a b3 08 b3 f3 33 e4 7b | 20 92 e0 01 19 6d 6c ce 7a bf 9a 7b 89 9f 35 9e | 58 9d d3 ad 5b d8 c7 e9 b8 71 4b f7 a5 1c ea 1a | cc c7 49 f3 04 3d 6a 30 5e 5f 6e 57 b4 d0 06 19 | df 2d c3 be a9 ad 0b 91 01 58 72 3d a2 3a 97 fa | 3b 4f d0 1f 09 3f ec 9c 6a 4d ad a3 d7 03 7d fb | fd d5 f6 df 9c 11 0f 03 14 5d 5b e8 e8 f0 46 2d | 46 0e 42 78 aa d4 b4 d3 de c9 9d 1d a1 10 3b 2b | 48 75 16 7b f6 27 2f 9d 63 b1 ad df dc bd c2 01 | 65 a8 1f 4c aa c7 7b 56 c8 5f 06 1e bb 73 93 0a | 1f 90 b0 df 46 4d 2e 1e af 83 bf da a6 c2 4b 21 | 29 00 00 24 14 45 39 c3 b2 be 10 35 86 8a 8d fa | 46 03 d4 c9 b6 c1 c2 c0 bf 3c af 6e ab be 7e b7 | 9a 44 cd df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bc 94 44 11 03 fc a1 a4 72 04 35 93 | 3e a4 98 88 8e 5c 65 1b 00 00 00 1c 00 00 40 05 | 24 c4 24 16 66 f3 44 ba aa f9 26 a7 a0 53 d9 b2 | 41 97 1c a3 | state #612 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34803b0b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b0d4c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #612 | libevent_malloc: new ptr-libevent@0x7fb388075630 size 128 | #612 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.259429 | resume sending helper answer for #612 suppresed complete_v2_state_transition() and stole MD | #612 spent 0.29 milliseconds in resume sending helper answer | stop processing: state #612 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb358064ae0 | processing resume sending helper answer for #650 | start processing: state #650 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 650 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #650 | **emit ISAKMP Message: | initiator cookie: | 26 33 64 e2 99 22 09 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-151 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f9 93 4c 52 2e 07 4f ef fc d7 92 1e c1 ca 14 b7 | ikev2 g^x f7 a3 82 0b 5f f6 91 b4 15 5e 90 95 7d d0 45 ef | ikev2 g^x 21 f3 08 0e 7d 26 87 e7 ea 79 d3 33 07 49 ba 68 | ikev2 g^x da fd 2d dc e8 dd 8d 3d ac 78 0b 31 13 b9 60 52 | ikev2 g^x d8 60 ef 09 61 af 9d f6 ad 76 cd b0 e6 c4 55 10 | ikev2 g^x bd 0c b1 58 60 30 af 2c 0e 52 bd 65 9f d0 54 d8 | ikev2 g^x 5a 2b 21 18 f2 c5 71 a2 0d 15 04 b5 4a 32 ae 9c | ikev2 g^x 02 2e d4 e0 51 8d 8d 22 83 86 fa d5 f5 1f fc cb | ikev2 g^x 75 6f de 7a e7 e1 af 25 29 c0 d8 e2 f6 b9 34 b5 | ikev2 g^x d7 7a c3 1e c4 99 5b 0e ca 76 77 7c f5 a8 a5 87 | ikev2 g^x 30 0e 18 1b 81 0a 94 65 85 20 c1 1d 31 6e b8 8b | ikev2 g^x eb 6c f5 b0 86 38 4d 10 0a 4a e9 45 4a d4 02 3f | ikev2 g^x 74 10 5c 24 6e 73 2d b5 cc 00 a0 c3 3c 0c 0d 0a | ikev2 g^x 48 d3 1b d4 4e a5 c6 45 3d 90 e1 3d 46 6f 68 4d | ikev2 g^x 0c c4 d4 2f a5 c5 02 ab af a2 e9 3b 3f ee 3a b5 | ikev2 g^x a7 5d 9e 2b da 84 df d1 c6 3f 08 db f2 d2 d5 c6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8d dc df 0c e8 8a 00 84 45 9e d1 82 39 c0 aa 62 | IKEv2 nonce 4b 5e c0 9d 6f b9 50 ba 59 33 ad 5d 19 94 ea 3d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 26 33 64 e2 99 22 09 91 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 97 | natd_hash: port= 01 f4 | natd_hash: hash= dd 84 a4 74 25 14 10 fd bf 0a 02 29 25 c7 89 ed | natd_hash: hash= 1e 29 a1 0f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dd 84 a4 74 25 14 10 fd bf 0a 02 29 25 c7 89 ed | Notify data 1e 29 a1 0f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 26 33 64 e2 99 22 09 91 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9b 4c 2f e4 b9 53 6d ef 7d 4f cc 27 24 fe f9 f6 | natd_hash: hash= 0b 9e 9f 60 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9b 4c 2f e4 b9 53 6d ef 7d 4f cc 27 24 fe f9 f6 | Notify data 0b 9e 9f 60 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #650 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #650 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #650 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #650: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #650 to 4294967295 after switching state | Message ID: IKE #650 skipping update_recv as MD is fake | Message ID: sent #650 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-151" #650: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.151:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #650) | 26 33 64 e2 99 22 09 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 93 4c 52 2e 07 4f ef fc d7 92 1e c1 ca 14 b7 | f7 a3 82 0b 5f f6 91 b4 15 5e 90 95 7d d0 45 ef | 21 f3 08 0e 7d 26 87 e7 ea 79 d3 33 07 49 ba 68 | da fd 2d dc e8 dd 8d 3d ac 78 0b 31 13 b9 60 52 | d8 60 ef 09 61 af 9d f6 ad 76 cd b0 e6 c4 55 10 | bd 0c b1 58 60 30 af 2c 0e 52 bd 65 9f d0 54 d8 | 5a 2b 21 18 f2 c5 71 a2 0d 15 04 b5 4a 32 ae 9c | 02 2e d4 e0 51 8d 8d 22 83 86 fa d5 f5 1f fc cb | 75 6f de 7a e7 e1 af 25 29 c0 d8 e2 f6 b9 34 b5 | d7 7a c3 1e c4 99 5b 0e ca 76 77 7c f5 a8 a5 87 | 30 0e 18 1b 81 0a 94 65 85 20 c1 1d 31 6e b8 8b | eb 6c f5 b0 86 38 4d 10 0a 4a e9 45 4a d4 02 3f | 74 10 5c 24 6e 73 2d b5 cc 00 a0 c3 3c 0c 0d 0a | 48 d3 1b d4 4e a5 c6 45 3d 90 e1 3d 46 6f 68 4d | 0c c4 d4 2f a5 c5 02 ab af a2 e9 3b 3f ee 3a b5 | a7 5d 9e 2b da 84 df d1 c6 3f 08 db f2 d2 d5 c6 | 29 00 00 24 8d dc df 0c e8 8a 00 84 45 9e d1 82 | 39 c0 aa 62 4b 5e c0 9d 6f b9 50 ba 59 33 ad 5d | 19 94 ea 3d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 84 a4 74 25 14 10 fd bf 0a 02 29 | 25 c7 89 ed 1e 29 a1 0f 00 00 00 1c 00 00 40 05 | 9b 4c 2f e4 b9 53 6d ef 7d 4f cc 27 24 fe f9 f6 | 0b 9e 9f 60 | state #650 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38400fb00 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a34e10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a34e10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #650 | libevent_malloc: new ptr-libevent@0x7fb358064ae0 size 128 | #650 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.259735 | resume sending helper answer for #650 suppresed complete_v2_state_transition() and stole MD | #650 spent 0.284 milliseconds in resume sending helper answer | stop processing: state #650 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c0751d0 | processing resume sending helper answer for #644 | start processing: state #644 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 644 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #644 | **emit ISAKMP Message: | initiator cookie: | 50 de 2b d7 45 9f 26 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-163 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a1 58 93 d0 7f 41 ad 9d b7 03 dd f8 2a ea 2a 42 | ikev2 g^x 44 8c 71 98 4a 47 c1 c5 90 95 76 04 f2 e5 ad 38 | ikev2 g^x 71 44 ae 3b fb f2 49 7c 10 82 5e 78 55 e4 fb 2f | ikev2 g^x 3e 12 c9 6c 92 13 53 cb a3 12 6e fd 1b cd fb ca | ikev2 g^x 7e e6 47 e7 44 cb 81 71 95 37 b6 d0 7a dd 37 46 | ikev2 g^x 29 e1 76 40 93 0a 7f 82 5a ad 56 83 a4 e6 22 95 | ikev2 g^x 73 81 6b 3d a5 ef 7e 2a a9 63 f6 f5 16 dd ca 4d | ikev2 g^x c5 1a 4a 2e 98 5c be 8f b6 36 37 ca c3 60 91 97 | ikev2 g^x 68 91 c7 05 a2 20 36 57 76 46 a3 b4 57 65 a3 ec | ikev2 g^x 60 30 bd 82 e8 5f 09 bf c2 16 53 69 e8 db b3 20 | ikev2 g^x f1 da 51 a7 b7 44 97 86 b5 cf 77 2d 02 b0 fe f9 | ikev2 g^x 34 93 f6 86 2f ca 83 a6 a7 79 8c 3f 79 49 ae 69 | ikev2 g^x 69 fc a1 aa 7d 95 b3 6d 7c 9b 21 a7 a7 f1 27 5d | ikev2 g^x 6b 90 30 cd 14 fd ee 1b 3c 9c b0 26 4f ac 21 a1 | ikev2 g^x 51 5e fd f8 e8 96 a5 84 c9 1e 4d dc 41 f5 73 29 | ikev2 g^x 85 06 8a 87 3f 53 f8 64 7e 9c bd 99 b9 0a 9a 0b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e5 0f d1 27 d8 cf bc 47 ad 96 17 e8 c3 9b 62 84 | IKEv2 nonce 21 4e 76 3c 4d 7e 36 68 8b 66 54 7f 11 87 3d b2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 50 de 2b d7 45 9f 26 0a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a3 | natd_hash: port= 01 f4 | natd_hash: hash= 10 d8 9d 5e e4 7d bf 65 2d f1 4a b5 c7 e2 e6 55 | natd_hash: hash= b9 27 ad 86 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 10 d8 9d 5e e4 7d bf 65 2d f1 4a b5 c7 e2 e6 55 | Notify data b9 27 ad 86 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 50 de 2b d7 45 9f 26 0a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e7 08 aa 38 d2 e0 0f 7f 77 98 72 12 74 ed 7d 4c | natd_hash: hash= e8 75 c4 3e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e7 08 aa 38 d2 e0 0f 7f 77 98 72 12 74 ed 7d 4c | Notify data e8 75 c4 3e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #644 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #644 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #644 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #644: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #644 to 4294967295 after switching state | Message ID: IKE #644 skipping update_recv as MD is fake | Message ID: sent #644 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-163" #644: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.163:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #644) | 50 de 2b d7 45 9f 26 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 58 93 d0 7f 41 ad 9d b7 03 dd f8 2a ea 2a 42 | 44 8c 71 98 4a 47 c1 c5 90 95 76 04 f2 e5 ad 38 | 71 44 ae 3b fb f2 49 7c 10 82 5e 78 55 e4 fb 2f | 3e 12 c9 6c 92 13 53 cb a3 12 6e fd 1b cd fb ca | 7e e6 47 e7 44 cb 81 71 95 37 b6 d0 7a dd 37 46 | 29 e1 76 40 93 0a 7f 82 5a ad 56 83 a4 e6 22 95 | 73 81 6b 3d a5 ef 7e 2a a9 63 f6 f5 16 dd ca 4d | c5 1a 4a 2e 98 5c be 8f b6 36 37 ca c3 60 91 97 | 68 91 c7 05 a2 20 36 57 76 46 a3 b4 57 65 a3 ec | 60 30 bd 82 e8 5f 09 bf c2 16 53 69 e8 db b3 20 | f1 da 51 a7 b7 44 97 86 b5 cf 77 2d 02 b0 fe f9 | 34 93 f6 86 2f ca 83 a6 a7 79 8c 3f 79 49 ae 69 | 69 fc a1 aa 7d 95 b3 6d 7c 9b 21 a7 a7 f1 27 5d | 6b 90 30 cd 14 fd ee 1b 3c 9c b0 26 4f ac 21 a1 | 51 5e fd f8 e8 96 a5 84 c9 1e 4d dc 41 f5 73 29 | 85 06 8a 87 3f 53 f8 64 7e 9c bd 99 b9 0a 9a 0b | 29 00 00 24 e5 0f d1 27 d8 cf bc 47 ad 96 17 e8 | c3 9b 62 84 21 4e 76 3c 4d 7e 36 68 8b 66 54 7f | 11 87 3d b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 d8 9d 5e e4 7d bf 65 2d f1 4a b5 | c7 e2 e6 55 b9 27 ad 86 00 00 00 1c 00 00 40 05 | e7 08 aa 38 d2 e0 0f 7f 77 98 72 12 74 ed 7d 4c | e8 75 c4 3e | state #644 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36403ae90 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb348048a60 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348048a60 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #644 | libevent_malloc: new ptr-libevent@0x7fb36c0751d0 size 128 | #644 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.26004 | resume sending helper answer for #644 suppresed complete_v2_state_transition() and stole MD | #644 spent 0.287 milliseconds in resume sending helper answer | stop processing: state #644 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb338074f30 | processing resume sending helper answer for #643 | start processing: state #643 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 643 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #643 | **emit ISAKMP Message: | initiator cookie: | a4 7a 0a 38 ed 45 0a 7e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-86 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2a 1b 74 d4 2c dc 83 3a 41 1b 72 93 cd d9 99 ab | ikev2 g^x a5 3d 31 f7 6e ad 24 72 35 2c 08 59 f7 85 55 ca | ikev2 g^x 70 bd b6 2e 52 cf ef d1 e9 0c c9 34 5b cf 85 8d | ikev2 g^x 51 9c e8 d0 53 f9 5f 56 af 23 8b 00 bf 41 f6 62 | ikev2 g^x 6a 4a d5 2e 51 34 77 b7 47 63 d2 86 3b 81 3e f3 | ikev2 g^x 91 0f a1 86 aa 34 df 5a 12 54 be 0c ac c3 1e 9f | ikev2 g^x 58 01 81 17 a2 3b 0b 37 4c 53 7d 23 99 d9 8f ea | ikev2 g^x f2 0b c5 cd 0a e8 e2 66 37 ad e8 1d 0c de 9c e2 | ikev2 g^x dd e7 b6 c4 7e c8 77 b9 f2 ed e4 1a d3 c9 66 b6 | ikev2 g^x 83 5d e5 e8 44 a9 37 6d 05 50 25 5a a4 01 51 b3 | ikev2 g^x 8f 5f 9b 9b c2 94 66 43 f2 03 b2 0d 87 c8 04 67 | ikev2 g^x bc cc ed 06 fe 82 6a 3f 3b 17 39 2b 40 cb f6 e0 | ikev2 g^x 43 79 fe 36 4a 20 93 44 8d 77 96 8a 0b 1e 19 08 | ikev2 g^x d9 d7 07 85 61 29 11 e7 11 41 78 7c e2 10 eb ac | ikev2 g^x ba 26 45 60 58 71 fa 59 c0 d3 9c 73 92 fb fa 39 | ikev2 g^x c8 c4 cb fb 8a ec 6d 5d e5 9d 4b b8 1c c2 a8 39 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 57 52 8d 13 2d 29 b3 5e 46 06 e9 1d 1e 46 ed 46 | IKEv2 nonce 2e 59 41 8d f8 dd 75 32 e3 62 89 bd 1f 93 2f 7b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a4 7a 0a 38 ed 45 0a 7e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 56 | natd_hash: port= 01 f4 | natd_hash: hash= 64 26 30 b2 61 08 18 b0 78 81 15 48 cb a5 c1 be | natd_hash: hash= b2 a0 a4 44 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 64 26 30 b2 61 08 18 b0 78 81 15 48 cb a5 c1 be | Notify data b2 a0 a4 44 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a4 7a 0a 38 ed 45 0a 7e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 98 48 c3 da 5f a5 9a 05 26 1d 7f 07 40 17 0d 29 | natd_hash: hash= 6b f4 fe 77 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 98 48 c3 da 5f a5 9a 05 26 1d 7f 07 40 17 0d 29 | Notify data 6b f4 fe 77 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #643 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #643 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #643 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #643: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #643 to 4294967295 after switching state | Message ID: IKE #643 skipping update_recv as MD is fake | Message ID: sent #643 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-86" #643: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.86:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #643) | a4 7a 0a 38 ed 45 0a 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 1b 74 d4 2c dc 83 3a 41 1b 72 93 cd d9 99 ab | a5 3d 31 f7 6e ad 24 72 35 2c 08 59 f7 85 55 ca | 70 bd b6 2e 52 cf ef d1 e9 0c c9 34 5b cf 85 8d | 51 9c e8 d0 53 f9 5f 56 af 23 8b 00 bf 41 f6 62 | 6a 4a d5 2e 51 34 77 b7 47 63 d2 86 3b 81 3e f3 | 91 0f a1 86 aa 34 df 5a 12 54 be 0c ac c3 1e 9f | 58 01 81 17 a2 3b 0b 37 4c 53 7d 23 99 d9 8f ea | f2 0b c5 cd 0a e8 e2 66 37 ad e8 1d 0c de 9c e2 | dd e7 b6 c4 7e c8 77 b9 f2 ed e4 1a d3 c9 66 b6 | 83 5d e5 e8 44 a9 37 6d 05 50 25 5a a4 01 51 b3 | 8f 5f 9b 9b c2 94 66 43 f2 03 b2 0d 87 c8 04 67 | bc cc ed 06 fe 82 6a 3f 3b 17 39 2b 40 cb f6 e0 | 43 79 fe 36 4a 20 93 44 8d 77 96 8a 0b 1e 19 08 | d9 d7 07 85 61 29 11 e7 11 41 78 7c e2 10 eb ac | ba 26 45 60 58 71 fa 59 c0 d3 9c 73 92 fb fa 39 | c8 c4 cb fb 8a ec 6d 5d e5 9d 4b b8 1c c2 a8 39 | 29 00 00 24 57 52 8d 13 2d 29 b3 5e 46 06 e9 1d | 1e 46 ed 46 2e 59 41 8d f8 dd 75 32 e3 62 89 bd | 1f 93 2f 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 26 30 b2 61 08 18 b0 78 81 15 48 | cb a5 c1 be b2 a0 a4 44 00 00 00 1c 00 00 40 05 | 98 48 c3 da 5f a5 9a 05 26 1d 7f 07 40 17 0d 29 | 6b f4 fe 77 | state #643 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3440300e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46acc140 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acc140 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #643 | libevent_malloc: new ptr-libevent@0x7fb338074f30 size 128 | #643 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.260352 | resume sending helper answer for #643 suppresed complete_v2_state_transition() and stole MD | #643 spent 0.286 milliseconds in resume sending helper answer | stop processing: state #643 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c0b1220 | processing resume sending helper answer for #617 | start processing: state #617 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 617 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #617 | **emit ISAKMP Message: | initiator cookie: | a7 ae e8 62 0b 46 de 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-165 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fb 6f 00 02 e7 f5 b4 cb 08 b9 65 4f 47 ef 5a 86 | ikev2 g^x e5 51 ca 0c 06 cf fd 0b 72 8c 77 7e b4 38 15 8b | ikev2 g^x 85 87 d6 a6 c5 3f 41 32 55 4b bb 30 5a 6b 55 95 | ikev2 g^x 76 74 f1 ba 57 cb c3 00 58 3b 41 a8 f4 f2 a2 e7 | ikev2 g^x 68 ea bf 0e 0e eb 7d 7c 97 24 f0 ec 9c b2 55 b4 | ikev2 g^x 58 b7 f3 13 c1 89 c2 fb a2 87 ea 86 bf bb c5 33 | ikev2 g^x 1f ae 16 84 83 00 87 63 36 16 fb 84 22 91 c8 7c | ikev2 g^x f3 57 cd 36 c5 a3 58 59 44 20 23 41 12 17 51 69 | ikev2 g^x e0 14 9c 7e ac 9d 23 88 40 7c f8 bc 0c 38 30 cd | ikev2 g^x 77 b7 88 55 c1 fe a2 53 b7 72 b0 12 95 9b b6 64 | ikev2 g^x ae 85 af 35 c8 ab 5f a7 cf c7 bf 9a c6 ed 5a 5b | ikev2 g^x 7a 5d 83 5f 91 52 0f 74 31 d0 db 4a 47 93 a8 88 | ikev2 g^x 7c 5a 55 e6 2b 80 9e dc f5 58 a8 e9 fc 1a 9c 9a | ikev2 g^x 4c bb 40 50 e2 70 35 c8 91 ac 99 df 72 58 53 2c | ikev2 g^x aa 87 b5 1a b6 1a e4 4a 97 dc 1d 01 10 9b 18 a2 | ikev2 g^x 3b 89 6b 81 0b 44 73 ea c4 f2 cc 33 56 05 5e 54 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f7 8e 9a 0f 2e 84 4c 49 d4 15 90 c6 2a 84 51 f1 | IKEv2 nonce f7 2c e6 95 75 a4 8d 77 80 5c ad 8d d1 b6 c5 34 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a7 ae e8 62 0b 46 de 24 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a5 | natd_hash: port= 01 f4 | natd_hash: hash= 8c 1c f0 18 4c 40 28 e4 7a 14 a6 c5 b5 d9 19 b3 | natd_hash: hash= dc 75 08 d7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8c 1c f0 18 4c 40 28 e4 7a 14 a6 c5 b5 d9 19 b3 | Notify data dc 75 08 d7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a7 ae e8 62 0b 46 de 24 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6e 38 75 f1 87 66 04 34 0d e9 7f d7 db 67 24 31 | natd_hash: hash= c8 3b de 05 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6e 38 75 f1 87 66 04 34 0d e9 7f d7 db 67 24 31 | Notify data c8 3b de 05 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #617 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #617 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #617 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #617: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #617 to 4294967295 after switching state | Message ID: IKE #617 skipping update_recv as MD is fake | Message ID: sent #617 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-165" #617: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.165:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #617) | a7 ae e8 62 0b 46 de 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 6f 00 02 e7 f5 b4 cb 08 b9 65 4f 47 ef 5a 86 | e5 51 ca 0c 06 cf fd 0b 72 8c 77 7e b4 38 15 8b | 85 87 d6 a6 c5 3f 41 32 55 4b bb 30 5a 6b 55 95 | 76 74 f1 ba 57 cb c3 00 58 3b 41 a8 f4 f2 a2 e7 | 68 ea bf 0e 0e eb 7d 7c 97 24 f0 ec 9c b2 55 b4 | 58 b7 f3 13 c1 89 c2 fb a2 87 ea 86 bf bb c5 33 | 1f ae 16 84 83 00 87 63 36 16 fb 84 22 91 c8 7c | f3 57 cd 36 c5 a3 58 59 44 20 23 41 12 17 51 69 | e0 14 9c 7e ac 9d 23 88 40 7c f8 bc 0c 38 30 cd | 77 b7 88 55 c1 fe a2 53 b7 72 b0 12 95 9b b6 64 | ae 85 af 35 c8 ab 5f a7 cf c7 bf 9a c6 ed 5a 5b | 7a 5d 83 5f 91 52 0f 74 31 d0 db 4a 47 93 a8 88 | 7c 5a 55 e6 2b 80 9e dc f5 58 a8 e9 fc 1a 9c 9a | 4c bb 40 50 e2 70 35 c8 91 ac 99 df 72 58 53 2c | aa 87 b5 1a b6 1a e4 4a 97 dc 1d 01 10 9b 18 a2 | 3b 89 6b 81 0b 44 73 ea c4 f2 cc 33 56 05 5e 54 | 29 00 00 24 f7 8e 9a 0f 2e 84 4c 49 d4 15 90 c6 | 2a 84 51 f1 f7 2c e6 95 75 a4 8d 77 80 5c ad 8d | d1 b6 c5 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 1c f0 18 4c 40 28 e4 7a 14 a6 c5 | b5 d9 19 b3 dc 75 08 d7 00 00 00 1c 00 00 40 05 | 6e 38 75 f1 87 66 04 34 0d e9 7f d7 db 67 24 31 | c8 3b de 05 | state #617 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c044a20 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c01d970 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c01d970 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #617 | libevent_malloc: new ptr-libevent@0x7fb35c0b1220 size 128 | #617 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.260658 | resume sending helper answer for #617 suppresed complete_v2_state_transition() and stole MD | #617 spent 0.285 milliseconds in resume sending helper answer | stop processing: state #617 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36406a1c0 | processing resume sending helper answer for #631 | start processing: state #631 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 631 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #631 | **emit ISAKMP Message: | initiator cookie: | 70 a3 fd 1e a8 25 3d 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-48 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4f 0c 38 64 bd 90 75 9f 6f 92 36 c8 32 fc 5a 91 | ikev2 g^x 19 c5 27 39 9e 3d 6e fa a9 b4 93 c0 e2 21 ae e7 | ikev2 g^x 29 2b f2 cd be 11 79 2f 14 67 98 68 af ef 6c b7 | ikev2 g^x 7c 49 d4 d5 6b f2 96 c5 5f cd 62 c1 3d f6 b9 c8 | ikev2 g^x 3c 3f 90 e5 94 7d 5f d7 40 b5 3b 30 63 b3 2c 20 | ikev2 g^x e0 19 03 33 6b 20 1a 52 34 8d 2f 82 b2 f4 54 94 | ikev2 g^x ca 7d 83 fa fa 89 e0 76 73 44 23 d0 5a 21 bf 92 | ikev2 g^x 84 e4 00 41 6d 4f b4 c3 ae 75 39 7d af 77 49 89 | ikev2 g^x e4 4d 0f 35 ee 4d e2 83 d4 ca 79 6d 50 9d 01 59 | ikev2 g^x 1b 0d 7b 00 73 41 5a bc 4e d1 a2 f6 87 77 57 2d | ikev2 g^x 41 51 9e 57 ae 82 8c bc 6f 74 da 77 3c ec b4 b7 | ikev2 g^x 0d 67 75 cd a7 d7 60 f9 d7 00 35 db 27 bb fd 96 | ikev2 g^x 6c aa db a4 7d 91 93 be 0c a1 40 3d 78 2c 3a 66 | ikev2 g^x 44 36 30 72 dc 94 7a 66 d9 4b 31 54 35 c3 c0 a7 | ikev2 g^x 65 c4 9e a1 75 e6 4f 67 53 11 26 7b a4 49 c0 3c | ikev2 g^x 58 30 58 88 dc be 09 5c 40 05 2c 8c 1c a4 88 cc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 9b f5 7e 07 2a a5 6a 0a 77 9d e2 3d f9 27 04 9a | IKEv2 nonce c8 ef cd 45 75 cb 40 b5 d2 eb a2 f4 c0 62 4c 0e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 70 a3 fd 1e a8 25 3d 1c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 30 | natd_hash: port= 01 f4 | natd_hash: hash= 2f 3f 68 59 5a 72 2a af 6d a7 43 82 b4 f3 5f a0 | natd_hash: hash= d9 b1 ec af | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2f 3f 68 59 5a 72 2a af 6d a7 43 82 b4 f3 5f a0 | Notify data d9 b1 ec af | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 70 a3 fd 1e a8 25 3d 1c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9d 9a 0e 02 a6 46 77 bd aa 5c 25 4f ad 35 3d af | natd_hash: hash= b0 60 dd da | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9d 9a 0e 02 a6 46 77 bd aa 5c 25 4f ad 35 3d af | Notify data b0 60 dd da | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #631 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #631 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #631 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #631: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #631 to 4294967295 after switching state | Message ID: IKE #631 skipping update_recv as MD is fake | Message ID: sent #631 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-48" #631: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.48:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #631) | 70 a3 fd 1e a8 25 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 0c 38 64 bd 90 75 9f 6f 92 36 c8 32 fc 5a 91 | 19 c5 27 39 9e 3d 6e fa a9 b4 93 c0 e2 21 ae e7 | 29 2b f2 cd be 11 79 2f 14 67 98 68 af ef 6c b7 | 7c 49 d4 d5 6b f2 96 c5 5f cd 62 c1 3d f6 b9 c8 | 3c 3f 90 e5 94 7d 5f d7 40 b5 3b 30 63 b3 2c 20 | e0 19 03 33 6b 20 1a 52 34 8d 2f 82 b2 f4 54 94 | ca 7d 83 fa fa 89 e0 76 73 44 23 d0 5a 21 bf 92 | 84 e4 00 41 6d 4f b4 c3 ae 75 39 7d af 77 49 89 | e4 4d 0f 35 ee 4d e2 83 d4 ca 79 6d 50 9d 01 59 | 1b 0d 7b 00 73 41 5a bc 4e d1 a2 f6 87 77 57 2d | 41 51 9e 57 ae 82 8c bc 6f 74 da 77 3c ec b4 b7 | 0d 67 75 cd a7 d7 60 f9 d7 00 35 db 27 bb fd 96 | 6c aa db a4 7d 91 93 be 0c a1 40 3d 78 2c 3a 66 | 44 36 30 72 dc 94 7a 66 d9 4b 31 54 35 c3 c0 a7 | 65 c4 9e a1 75 e6 4f 67 53 11 26 7b a4 49 c0 3c | 58 30 58 88 dc be 09 5c 40 05 2c 8c 1c a4 88 cc | 29 00 00 24 9b f5 7e 07 2a a5 6a 0a 77 9d e2 3d | f9 27 04 9a c8 ef cd 45 75 cb 40 b5 d2 eb a2 f4 | c0 62 4c 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f 3f 68 59 5a 72 2a af 6d a7 43 82 | b4 f3 5f a0 d9 b1 ec af 00 00 00 1c 00 00 40 05 | 9d 9a 0e 02 a6 46 77 bd aa 5c 25 4f ad 35 3d af | b0 60 dd da | state #631 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c0251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb370012bf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #631 | libevent_malloc: new ptr-libevent@0x7fb36406a1c0 size 128 | #631 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.26096 | resume sending helper answer for #631 suppresed complete_v2_state_transition() and stole MD | #631 spent 0.283 milliseconds in resume sending helper answer | stop processing: state #631 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c06f9f0 | processing resume sending helper answer for #606 | start processing: state #606 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 606 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #606 | **emit ISAKMP Message: | initiator cookie: | 23 c4 ab 3f 0f 4d 11 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-223 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c8 ec 57 8c 95 7b 1b 15 f8 8d ea a4 a3 af fe de | ikev2 g^x c8 50 9d 01 42 a2 a8 d6 b3 0f ab aa a3 20 6b a8 | ikev2 g^x 43 36 ac 25 c0 23 8f 9c cd 38 59 18 58 4d 26 27 | ikev2 g^x 3a c1 0c 20 3d b4 f2 a3 6a 0b 85 ac 0d 0c cb b8 | ikev2 g^x b2 27 34 92 1e d8 c1 ed 04 88 17 ec 3d f0 78 9d | ikev2 g^x 19 06 f9 a8 2e 5e 2f 6e 4a 1c 90 db 5f 93 41 e4 | ikev2 g^x 28 08 f7 7a 45 4e 76 50 c3 e3 6e be cf fb 71 40 | ikev2 g^x 41 9c c6 87 30 7d 0a d4 8c b5 0f c7 31 32 44 ba | ikev2 g^x 3a 9b 83 7d 6b 03 e1 c1 68 94 44 99 8a c0 56 cb | ikev2 g^x 60 44 86 42 73 d4 b2 3a 24 29 f0 d7 e7 c2 92 6f | ikev2 g^x ca 66 01 13 32 22 64 32 e0 45 28 0f 62 51 89 c6 | ikev2 g^x 22 97 d2 d2 ee ea 04 89 40 64 4c 95 db fd 1a 35 | ikev2 g^x 63 e6 0a f3 7f 06 ca e1 8e 13 8f 8e cf e0 ac fd | ikev2 g^x 6c 90 77 9a 8a 33 7c d0 d9 ee f2 a2 51 90 42 0f | ikev2 g^x b9 cb 13 5f 29 0a cb 86 1a e6 6a 5f 79 aa a1 f7 | ikev2 g^x 73 3c 37 36 16 c6 aa 27 ef 60 b2 ed ae a6 69 93 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 16 68 47 01 32 e0 21 95 ec 7e d5 06 76 a0 66 58 | IKEv2 nonce 60 6e 0d de ea 44 b2 e6 49 d7 45 61 92 31 62 13 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 23 c4 ab 3f 0f 4d 11 7f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 df | natd_hash: port= 01 f4 | natd_hash: hash= f0 9e 40 be 82 89 76 10 a5 a5 b3 c0 c6 a6 27 e3 | natd_hash: hash= b1 8f 5e 15 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f0 9e 40 be 82 89 76 10 a5 a5 b3 c0 c6 a6 27 e3 | Notify data b1 8f 5e 15 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 23 c4 ab 3f 0f 4d 11 7f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9e 23 71 0d ac e6 cd ef ec 0b 33 3c 87 a3 e1 e7 | natd_hash: hash= 66 2f 45 0f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9e 23 71 0d ac e6 cd ef ec 0b 33 3c 87 a3 e1 e7 | Notify data 66 2f 45 0f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #606 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #606 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #606 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #606: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #606 to 4294967295 after switching state | Message ID: IKE #606 skipping update_recv as MD is fake | Message ID: sent #606 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-223" #606: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.223:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #606) | 23 c4 ab 3f 0f 4d 11 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 ec 57 8c 95 7b 1b 15 f8 8d ea a4 a3 af fe de | c8 50 9d 01 42 a2 a8 d6 b3 0f ab aa a3 20 6b a8 | 43 36 ac 25 c0 23 8f 9c cd 38 59 18 58 4d 26 27 | 3a c1 0c 20 3d b4 f2 a3 6a 0b 85 ac 0d 0c cb b8 | b2 27 34 92 1e d8 c1 ed 04 88 17 ec 3d f0 78 9d | 19 06 f9 a8 2e 5e 2f 6e 4a 1c 90 db 5f 93 41 e4 | 28 08 f7 7a 45 4e 76 50 c3 e3 6e be cf fb 71 40 | 41 9c c6 87 30 7d 0a d4 8c b5 0f c7 31 32 44 ba | 3a 9b 83 7d 6b 03 e1 c1 68 94 44 99 8a c0 56 cb | 60 44 86 42 73 d4 b2 3a 24 29 f0 d7 e7 c2 92 6f | ca 66 01 13 32 22 64 32 e0 45 28 0f 62 51 89 c6 | 22 97 d2 d2 ee ea 04 89 40 64 4c 95 db fd 1a 35 | 63 e6 0a f3 7f 06 ca e1 8e 13 8f 8e cf e0 ac fd | 6c 90 77 9a 8a 33 7c d0 d9 ee f2 a2 51 90 42 0f | b9 cb 13 5f 29 0a cb 86 1a e6 6a 5f 79 aa a1 f7 | 73 3c 37 36 16 c6 aa 27 ef 60 b2 ed ae a6 69 93 | 29 00 00 24 16 68 47 01 32 e0 21 95 ec 7e d5 06 | 76 a0 66 58 60 6e 0d de ea 44 b2 e6 49 d7 45 61 | 92 31 62 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 9e 40 be 82 89 76 10 a5 a5 b3 c0 | c6 a6 27 e3 b1 8f 5e 15 00 00 00 1c 00 00 40 05 | 9e 23 71 0d ac e6 cd ef ec 0b 33 3c 87 a3 e1 e7 | 66 2f 45 0f | state #606 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3700300e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a0a9d0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #606 | libevent_malloc: new ptr-libevent@0x7fb36c06f9f0 size 128 | #606 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.261276 | resume sending helper answer for #606 suppresed complete_v2_state_transition() and stole MD | #606 spent 0.292 milliseconds in resume sending helper answer | stop processing: state #606 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38806fe50 | processing resume sending helper answer for #649 | start processing: state #649 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 649 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #649 | **emit ISAKMP Message: | initiator cookie: | b6 55 6c 1f f7 96 4e 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-204 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c3 49 68 33 ac be 3a f7 9a 60 a1 54 2b 3b a3 9a | ikev2 g^x 16 92 52 84 04 b4 d7 16 0c 6d 09 72 cc 2b 60 d8 | ikev2 g^x 6a 97 99 35 6d bf d4 59 5a c6 db 05 04 50 9f 26 | ikev2 g^x d5 31 65 a2 a6 90 1f 44 a8 51 46 ef b2 3c 2c 17 | ikev2 g^x 9a 67 6e 63 13 be de f4 ea 50 37 0c 4c b7 bb 87 | ikev2 g^x 98 eb a2 d7 94 7a 4d 7c 27 23 c5 c1 14 ac 3a 62 | ikev2 g^x e3 9e cb 8b a8 b2 7e 85 7f 34 7f d2 53 2b 7f 26 | ikev2 g^x 9b a4 79 e8 f1 d9 12 1a 3f 7d 7b 73 7f 6a 3b d4 | ikev2 g^x c7 66 51 af 5f d5 da 98 4b bc 29 01 fc a4 53 53 | ikev2 g^x c1 e3 c9 29 b1 bd f6 9f 07 80 98 0d 7a 85 07 72 | ikev2 g^x 29 6b 03 79 c5 1e 41 20 d9 9a b8 86 af 78 fe 58 | ikev2 g^x 1c d3 ff 44 d3 cc a9 5e 28 25 58 79 53 d0 f5 40 | ikev2 g^x f8 b2 e5 1b 4e 35 7b 57 c9 98 34 61 e5 1c c6 ce | ikev2 g^x 01 23 71 88 e2 7b b5 18 09 23 c9 7f 18 e2 56 40 | ikev2 g^x 07 80 69 13 04 69 8a 54 da d5 46 08 93 8e 42 66 | ikev2 g^x 37 5b 93 f3 15 98 7b 1b b4 dd 60 45 36 75 a9 82 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d9 9b fe 1b 9a 3b e2 af fd 5f 29 c3 a1 c2 66 f4 | IKEv2 nonce bb f2 c2 62 37 18 46 4f 44 68 ce 27 ad 06 31 85 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b6 55 6c 1f f7 96 4e 31 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 cc | natd_hash: port= 01 f4 | natd_hash: hash= 8e f0 1f cb 60 f7 fc 56 dd ae 47 e3 bc 0d f0 9c | natd_hash: hash= f1 a6 a0 90 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8e f0 1f cb 60 f7 fc 56 dd ae 47 e3 bc 0d f0 9c | Notify data f1 a6 a0 90 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b6 55 6c 1f f7 96 4e 31 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 55 71 01 83 1b 1f 6e 2c 68 ca 2f 55 56 93 29 8e | natd_hash: hash= bc e1 a4 22 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 55 71 01 83 1b 1f 6e 2c 68 ca 2f 55 56 93 29 8e | Notify data bc e1 a4 22 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #649 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #649 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #649 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #649: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #649 to 4294967295 after switching state | Message ID: IKE #649 skipping update_recv as MD is fake | Message ID: sent #649 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-204" #649: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.204:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #649) | b6 55 6c 1f f7 96 4e 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 49 68 33 ac be 3a f7 9a 60 a1 54 2b 3b a3 9a | 16 92 52 84 04 b4 d7 16 0c 6d 09 72 cc 2b 60 d8 | 6a 97 99 35 6d bf d4 59 5a c6 db 05 04 50 9f 26 | d5 31 65 a2 a6 90 1f 44 a8 51 46 ef b2 3c 2c 17 | 9a 67 6e 63 13 be de f4 ea 50 37 0c 4c b7 bb 87 | 98 eb a2 d7 94 7a 4d 7c 27 23 c5 c1 14 ac 3a 62 | e3 9e cb 8b a8 b2 7e 85 7f 34 7f d2 53 2b 7f 26 | 9b a4 79 e8 f1 d9 12 1a 3f 7d 7b 73 7f 6a 3b d4 | c7 66 51 af 5f d5 da 98 4b bc 29 01 fc a4 53 53 | c1 e3 c9 29 b1 bd f6 9f 07 80 98 0d 7a 85 07 72 | 29 6b 03 79 c5 1e 41 20 d9 9a b8 86 af 78 fe 58 | 1c d3 ff 44 d3 cc a9 5e 28 25 58 79 53 d0 f5 40 | f8 b2 e5 1b 4e 35 7b 57 c9 98 34 61 e5 1c c6 ce | 01 23 71 88 e2 7b b5 18 09 23 c9 7f 18 e2 56 40 | 07 80 69 13 04 69 8a 54 da d5 46 08 93 8e 42 66 | 37 5b 93 f3 15 98 7b 1b b4 dd 60 45 36 75 a9 82 | 29 00 00 24 d9 9b fe 1b 9a 3b e2 af fd 5f 29 c3 | a1 c2 66 f4 bb f2 c2 62 37 18 46 4f 44 68 ce 27 | ad 06 31 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e f0 1f cb 60 f7 fc 56 dd ae 47 e3 | bc 0d f0 9c f1 a6 a0 90 00 00 00 1c 00 00 40 05 | 55 71 01 83 1b 1f 6e 2c 68 ca 2f 55 56 93 29 8e | bc e1 a4 22 | state #649 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3600407f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb388015720 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388015720 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #649 | libevent_malloc: new ptr-libevent@0x7fb38806fe50 size 128 | #649 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.261579 | resume sending helper answer for #649 suppresed complete_v2_state_transition() and stole MD | #649 spent 0.282 milliseconds in resume sending helper answer | stop processing: state #649 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38406b790 | processing resume sending helper answer for #654 | start processing: state #654 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 654 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #654 | **emit ISAKMP Message: | initiator cookie: | 5e ee 0b 7f 6c a7 3a d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-112 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 03 66 e0 d6 d9 72 ba 46 dd 41 a1 46 b3 25 74 d2 | ikev2 g^x be 07 06 6c f4 38 9a a1 39 17 cd 0b c4 41 e6 86 | ikev2 g^x ab 2b bd 9b 4e 50 c3 68 a9 fd 5d 77 07 79 12 d7 | ikev2 g^x 06 ad c7 3b 19 6e 8f 00 bd 88 b3 27 81 06 f1 46 | ikev2 g^x b7 d7 a4 24 f6 8a 13 f3 63 a6 44 01 04 ef fd 32 | ikev2 g^x 85 cb bb e9 d7 ec f5 ec 83 a6 6e d9 b1 33 b3 d5 | ikev2 g^x d8 12 93 9e 27 25 43 b4 f4 9d 5a 4e 0d cb 7f c7 | ikev2 g^x ad a0 26 f4 7f 25 7c d9 9a ca 52 6e 2d 83 33 d3 | ikev2 g^x 5b 0c 44 4d 72 d8 0d c3 65 63 57 17 10 5e 19 0d | ikev2 g^x 88 04 84 34 7e 42 22 cf c0 6f 9d 86 b6 ed ec 5f | ikev2 g^x 38 0f 13 28 f6 f9 d2 d2 9a ad 59 58 25 e5 63 dd | ikev2 g^x e3 7b 38 03 55 37 74 26 61 f2 62 84 61 8e c1 fd | ikev2 g^x 89 ae b9 7c 2a 19 e2 22 2f b0 2c c7 27 de 4f cb | ikev2 g^x fd 3c f5 3f fd dd 17 5e 7f 7a 64 3f d9 af d0 1d | ikev2 g^x f0 55 35 5d d7 34 3d 74 24 8b 4f 0e 99 f6 c3 2d | ikev2 g^x 66 87 8b da e2 d5 ca 1a 2a 24 b1 4b 3d ff 64 ec | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 97 bb 4a bf d9 e5 95 75 3b a3 86 b3 f1 af 1a 0c | IKEv2 nonce 45 88 7e 17 0a 91 a5 72 56 0e fd 8c e1 a9 d3 af | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5e ee 0b 7f 6c a7 3a d8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 70 | natd_hash: port= 01 f4 | natd_hash: hash= 2e 88 f8 b3 f2 90 3f 3b ff 2b 5c 52 75 9a 83 d7 | natd_hash: hash= 14 17 86 77 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2e 88 f8 b3 f2 90 3f 3b ff 2b 5c 52 75 9a 83 d7 | Notify data 14 17 86 77 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 5e ee 0b 7f 6c a7 3a d8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2e 13 0c e6 eb 5b 95 e2 c9 2a b6 07 89 5a 9a 41 | natd_hash: hash= 93 58 82 e2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2e 13 0c e6 eb 5b 95 e2 c9 2a b6 07 89 5a 9a 41 | Notify data 93 58 82 e2 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #654 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #654 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #654 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #654: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #654 to 4294967295 after switching state | Message ID: IKE #654 skipping update_recv as MD is fake | Message ID: sent #654 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-112" #654: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.112:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #654) | 5e ee 0b 7f 6c a7 3a d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 66 e0 d6 d9 72 ba 46 dd 41 a1 46 b3 25 74 d2 | be 07 06 6c f4 38 9a a1 39 17 cd 0b c4 41 e6 86 | ab 2b bd 9b 4e 50 c3 68 a9 fd 5d 77 07 79 12 d7 | 06 ad c7 3b 19 6e 8f 00 bd 88 b3 27 81 06 f1 46 | b7 d7 a4 24 f6 8a 13 f3 63 a6 44 01 04 ef fd 32 | 85 cb bb e9 d7 ec f5 ec 83 a6 6e d9 b1 33 b3 d5 | d8 12 93 9e 27 25 43 b4 f4 9d 5a 4e 0d cb 7f c7 | ad a0 26 f4 7f 25 7c d9 9a ca 52 6e 2d 83 33 d3 | 5b 0c 44 4d 72 d8 0d c3 65 63 57 17 10 5e 19 0d | 88 04 84 34 7e 42 22 cf c0 6f 9d 86 b6 ed ec 5f | 38 0f 13 28 f6 f9 d2 d2 9a ad 59 58 25 e5 63 dd | e3 7b 38 03 55 37 74 26 61 f2 62 84 61 8e c1 fd | 89 ae b9 7c 2a 19 e2 22 2f b0 2c c7 27 de 4f cb | fd 3c f5 3f fd dd 17 5e 7f 7a 64 3f d9 af d0 1d | f0 55 35 5d d7 34 3d 74 24 8b 4f 0e 99 f6 c3 2d | 66 87 8b da e2 d5 ca 1a 2a 24 b1 4b 3d ff 64 ec | 29 00 00 24 97 bb 4a bf d9 e5 95 75 3b a3 86 b3 | f1 af 1a 0c 45 88 7e 17 0a 91 a5 72 56 0e fd 8c | e1 a9 d3 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e 88 f8 b3 f2 90 3f 3b ff 2b 5c 52 | 75 9a 83 d7 14 17 86 77 00 00 00 1c 00 00 40 05 | 2e 13 0c e6 eb 5b 95 e2 c9 2a b6 07 89 5a 9a 41 | 93 58 82 e2 | state #654 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb354012840 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35400d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #654 | libevent_malloc: new ptr-libevent@0x7fb38406b790 size 128 | #654 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.261883 | resume sending helper answer for #654 suppresed complete_v2_state_transition() and stole MD | #654 spent 0.284 milliseconds in resume sending helper answer | stop processing: state #654 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb384070f20 | processing resume sending helper answer for #614 | start processing: state #614 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 614 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #614 | **emit ISAKMP Message: | initiator cookie: | e2 44 b3 0f 15 7b db fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-47 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 57 92 e1 08 e5 43 41 79 c5 5d f0 96 29 52 40 c0 | ikev2 g^x 97 e5 c8 ff 05 3e 53 fa 62 76 da bc 72 8a b9 4c | ikev2 g^x f7 18 b8 6a ca 45 53 24 52 f1 8d 1e 49 3a 17 8c | ikev2 g^x ef fa dc 34 b5 f9 4d b5 58 f3 46 8b 4a dd 09 9b | ikev2 g^x ea 93 c2 33 65 02 3e 54 93 99 4f c8 fe a6 b2 d6 | ikev2 g^x af 78 80 dc 24 65 ba 1e a7 5b c2 a5 cc d3 1f 7e | ikev2 g^x cf d7 a5 8a 8b a8 49 5f d7 0f 85 09 d8 92 ad 49 | ikev2 g^x d7 a4 fe c3 04 e8 a3 5b 39 08 a0 31 46 6a 16 61 | ikev2 g^x 4d 3f 91 60 20 e1 05 33 e6 27 94 27 aa 1f fa 73 | ikev2 g^x 54 7a 93 dc 72 57 0e c3 11 46 f1 19 8d 7f 0c 06 | ikev2 g^x 3c c4 e4 73 42 6f 8b 92 68 78 39 66 88 cf c0 3b | ikev2 g^x 5d 6d 07 37 a6 42 2d 6d 6e 59 f0 5e 5c a4 19 79 | ikev2 g^x 26 9e 6d 08 ab 5d 74 ce eb ad 27 d1 db 09 88 c8 | ikev2 g^x f0 a6 93 29 46 42 ee 9f bb 5d 95 45 12 52 b4 73 | ikev2 g^x e2 c1 41 95 83 74 fd cf 99 ef 67 58 02 64 29 39 | ikev2 g^x da 81 64 9c 6a e9 22 3f 8a e7 56 f4 13 9b 71 87 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 86 16 ba 44 69 73 79 7d 89 32 49 92 68 97 7e 5d | IKEv2 nonce 09 b2 8b 2b eb b1 d6 6b 17 01 84 df c9 f4 9b 53 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e2 44 b3 0f 15 7b db fa | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2f | natd_hash: port= 01 f4 | natd_hash: hash= ab 2e 6b fd 7a d6 ac c0 e0 4d 65 46 aa 7e 2f e7 | natd_hash: hash= b8 bb 4d 39 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ab 2e 6b fd 7a d6 ac c0 e0 4d 65 46 aa 7e 2f e7 | Notify data b8 bb 4d 39 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e2 44 b3 0f 15 7b db fa | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1e 6a 1e 6b b1 89 1b 8c 76 4d 90 e8 7d 48 17 e8 | natd_hash: hash= e9 bf 32 eb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1e 6a 1e 6b b1 89 1b 8c 76 4d 90 e8 7d 48 17 e8 | Notify data e9 bf 32 eb | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #614 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #614 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #614 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #614: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #614 to 4294967295 after switching state | Message ID: IKE #614 skipping update_recv as MD is fake | Message ID: sent #614 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-47" #614: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.47:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #614) | e2 44 b3 0f 15 7b db fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 92 e1 08 e5 43 41 79 c5 5d f0 96 29 52 40 c0 | 97 e5 c8 ff 05 3e 53 fa 62 76 da bc 72 8a b9 4c | f7 18 b8 6a ca 45 53 24 52 f1 8d 1e 49 3a 17 8c | ef fa dc 34 b5 f9 4d b5 58 f3 46 8b 4a dd 09 9b | ea 93 c2 33 65 02 3e 54 93 99 4f c8 fe a6 b2 d6 | af 78 80 dc 24 65 ba 1e a7 5b c2 a5 cc d3 1f 7e | cf d7 a5 8a 8b a8 49 5f d7 0f 85 09 d8 92 ad 49 | d7 a4 fe c3 04 e8 a3 5b 39 08 a0 31 46 6a 16 61 | 4d 3f 91 60 20 e1 05 33 e6 27 94 27 aa 1f fa 73 | 54 7a 93 dc 72 57 0e c3 11 46 f1 19 8d 7f 0c 06 | 3c c4 e4 73 42 6f 8b 92 68 78 39 66 88 cf c0 3b | 5d 6d 07 37 a6 42 2d 6d 6e 59 f0 5e 5c a4 19 79 | 26 9e 6d 08 ab 5d 74 ce eb ad 27 d1 db 09 88 c8 | f0 a6 93 29 46 42 ee 9f bb 5d 95 45 12 52 b4 73 | e2 c1 41 95 83 74 fd cf 99 ef 67 58 02 64 29 39 | da 81 64 9c 6a e9 22 3f 8a e7 56 f4 13 9b 71 87 | 29 00 00 24 86 16 ba 44 69 73 79 7d 89 32 49 92 | 68 97 7e 5d 09 b2 8b 2b eb b1 d6 6b 17 01 84 df | c9 f4 9b 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 2e 6b fd 7a d6 ac c0 e0 4d 65 46 | aa 7e 2f e7 b8 bb 4d 39 00 00 00 1c 00 00 40 05 | 1e 6a 1e 6b b1 89 1b 8c 76 4d 90 e8 7d 48 17 e8 | e9 bf 32 eb | state #614 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c014c70 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb354005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #614 | libevent_malloc: new ptr-libevent@0x7fb384070f20 size 128 | #614 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.262282 | resume sending helper answer for #614 suppresed complete_v2_state_transition() and stole MD | #614 spent 0.372 milliseconds in resume sending helper answer | stop processing: state #614 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb378012590 | processing resume sending helper answer for #635 | start processing: state #635 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 635 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #635 | **emit ISAKMP Message: | initiator cookie: | 7e 0d 8c df c3 48 2b 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-245 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d4 a1 90 94 fd 2b 95 44 1e 0a 6b 25 9f 00 c6 33 | ikev2 g^x 1e ef f6 4c b7 2f c3 a0 8a 85 0f b9 65 4e fd c3 | ikev2 g^x 6f 15 46 90 ab 4b 13 e7 e6 d2 34 d9 3f 71 a3 f3 | ikev2 g^x cd 4c de d4 e9 48 5f 32 4d 9a 30 7d 41 3c f4 79 | ikev2 g^x 2b e5 fb f0 14 ee 8a ae 09 42 b4 cd 39 a0 45 79 | ikev2 g^x 5d 03 2c a2 e5 66 e1 29 75 bf 9b 52 cf 30 44 50 | ikev2 g^x e4 1e ec 62 13 8a 29 5c 79 38 61 1b 99 bb f5 ca | ikev2 g^x ba a8 ac e5 19 04 33 7f 0c ca 09 aa 4c 3f 3e 06 | ikev2 g^x 33 f5 34 0d 4c 70 6b 06 18 e0 d0 1f a4 5f d7 bb | ikev2 g^x 48 ac 37 e5 66 fc 98 e8 57 0b a6 aa d5 88 82 ce | ikev2 g^x a0 e0 65 8b 7b a6 21 bb 33 66 9d 59 e2 1a 7d a1 | ikev2 g^x 33 19 a0 59 78 92 a2 99 a5 c2 35 39 ef e5 ee ff | ikev2 g^x 5f 64 b6 1d 72 92 df 75 1d 12 54 49 29 61 d0 c5 | ikev2 g^x df da b5 fe 52 67 91 82 3e 1f de bc 3d ae 33 1b | ikev2 g^x ad 82 07 a5 31 1d 91 23 7e 3c 96 a7 fb 7c 82 d7 | ikev2 g^x 17 7f 18 90 98 0c 8a 7d 26 5d f5 1b b6 e0 92 52 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e3 02 e0 90 9a bb 82 bf e8 0d 7e 04 6c c4 fd f8 | IKEv2 nonce c9 9f eb 32 5f c2 f7 1b 33 85 e7 b3 07 22 69 31 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7e 0d 8c df c3 48 2b 68 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 f5 | natd_hash: port= 01 f4 | natd_hash: hash= 2d 9c 4d b9 97 4f cd 1b fe 43 15 63 13 30 6d 7b | natd_hash: hash= 9c bb 08 d9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2d 9c 4d b9 97 4f cd 1b fe 43 15 63 13 30 6d 7b | Notify data 9c bb 08 d9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7e 0d 8c df c3 48 2b 68 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 77 b2 bc 43 f1 e9 b3 25 e4 85 b2 70 d6 0a 47 cd | natd_hash: hash= b1 cb 75 30 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 77 b2 bc 43 f1 e9 b3 25 e4 85 b2 70 d6 0a 47 cd | Notify data b1 cb 75 30 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #635 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #635 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #635 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #635: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #635 to 4294967295 after switching state | Message ID: IKE #635 skipping update_recv as MD is fake | Message ID: sent #635 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-245" #635: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.245:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #635) | 7e 0d 8c df c3 48 2b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 a1 90 94 fd 2b 95 44 1e 0a 6b 25 9f 00 c6 33 | 1e ef f6 4c b7 2f c3 a0 8a 85 0f b9 65 4e fd c3 | 6f 15 46 90 ab 4b 13 e7 e6 d2 34 d9 3f 71 a3 f3 | cd 4c de d4 e9 48 5f 32 4d 9a 30 7d 41 3c f4 79 | 2b e5 fb f0 14 ee 8a ae 09 42 b4 cd 39 a0 45 79 | 5d 03 2c a2 e5 66 e1 29 75 bf 9b 52 cf 30 44 50 | e4 1e ec 62 13 8a 29 5c 79 38 61 1b 99 bb f5 ca | ba a8 ac e5 19 04 33 7f 0c ca 09 aa 4c 3f 3e 06 | 33 f5 34 0d 4c 70 6b 06 18 e0 d0 1f a4 5f d7 bb | 48 ac 37 e5 66 fc 98 e8 57 0b a6 aa d5 88 82 ce | a0 e0 65 8b 7b a6 21 bb 33 66 9d 59 e2 1a 7d a1 | 33 19 a0 59 78 92 a2 99 a5 c2 35 39 ef e5 ee ff | 5f 64 b6 1d 72 92 df 75 1d 12 54 49 29 61 d0 c5 | df da b5 fe 52 67 91 82 3e 1f de bc 3d ae 33 1b | ad 82 07 a5 31 1d 91 23 7e 3c 96 a7 fb 7c 82 d7 | 17 7f 18 90 98 0c 8a 7d 26 5d f5 1b b6 e0 92 52 | 29 00 00 24 e3 02 e0 90 9a bb 82 bf e8 0d 7e 04 | 6c c4 fd f8 c9 9f eb 32 5f c2 f7 1b 33 85 e7 b3 | 07 22 69 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 9c 4d b9 97 4f cd 1b fe 43 15 63 | 13 30 6d 7b 9c bb 08 d9 00 00 00 1c 00 00 40 05 | 77 b2 bc 43 f1 e9 b3 25 e4 85 b2 70 d6 0a 47 cd | b1 cb 75 30 | state #635 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb38000feb0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000feb0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #635 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 | #635 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.262628 | resume sending helper answer for #635 suppresed complete_v2_state_transition() and stole MD | #635 spent 0.313 milliseconds in resume sending helper answer | stop processing: state #635 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c085320 | processing resume sending helper answer for #642 | start processing: state #642 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 642 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #642 | **emit ISAKMP Message: | initiator cookie: | 28 8b 51 ce ae 5a 3d 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-171 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4b 37 19 62 25 a0 9e 1e 52 48 66 63 35 92 1d df | ikev2 g^x c7 ff 13 b7 59 bd f6 95 87 8d 26 d9 c9 e0 f7 24 | ikev2 g^x 26 42 a2 e4 00 1b 68 a2 f9 e9 ac 5d f5 d7 11 4b | ikev2 g^x 1e 89 7d 46 ef 06 9a 32 1b e9 81 17 06 39 67 f5 | ikev2 g^x 0e f6 1a 5a 55 9b 1e a5 dd e1 43 76 e8 a2 58 b1 | ikev2 g^x 28 a6 3c d6 50 38 49 96 2d 91 42 d7 f8 ec 6a 33 | ikev2 g^x f4 e0 96 4a 58 58 aa e6 0c 5c 8c cb ab 5c e8 04 | ikev2 g^x a5 a1 ab 68 96 f3 f4 a5 e4 ae 1a 96 a0 9a f9 57 | ikev2 g^x 56 09 b6 81 96 72 27 a3 1c 3c 27 45 d5 f1 02 f8 | ikev2 g^x 2a d7 f9 4c 9f 1a a7 8a 5a f3 e7 da 4d 17 8e ac | ikev2 g^x 96 16 46 81 fd 01 db ca b6 72 84 a6 d0 d8 4e 69 | ikev2 g^x c7 79 31 c5 90 b9 16 b2 14 19 41 ef d9 1d 68 fa | ikev2 g^x 44 38 de 48 65 2c ec 8e 99 27 f7 c6 63 4b 60 bf | ikev2 g^x 8d 63 04 69 ea 6c 68 38 f9 a4 27 bd 15 c4 ec 7f | ikev2 g^x 0a d6 93 e5 0b 62 ad e0 de db a0 44 2e ae 03 d3 | ikev2 g^x 4a 90 aa 55 4e a9 22 5e 90 19 cd ff e2 28 23 a0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce cc 92 78 18 36 9d 5d c6 a8 50 3e 53 b3 db 47 67 | IKEv2 nonce 8a c3 3b 19 d4 07 41 62 2d ad 79 2f c7 c6 9c 9d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 28 8b 51 ce ae 5a 3d 6d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ab | natd_hash: port= 01 f4 | natd_hash: hash= 83 04 bb 7b 41 fb 94 b6 5a f7 bf c5 50 0b eb 35 | natd_hash: hash= 93 8a 85 4f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 83 04 bb 7b 41 fb 94 b6 5a f7 bf c5 50 0b eb 35 | Notify data 93 8a 85 4f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 28 8b 51 ce ae 5a 3d 6d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c2 0f 22 62 b9 53 47 a9 22 ed 80 06 c6 98 27 8a | natd_hash: hash= 4f 90 48 63 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c2 0f 22 62 b9 53 47 a9 22 ed 80 06 c6 98 27 8a | Notify data 4f 90 48 63 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #642 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #642 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #642 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #642: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #642 to 4294967295 after switching state | Message ID: IKE #642 skipping update_recv as MD is fake | Message ID: sent #642 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-171" #642: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.171:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #642) | 28 8b 51 ce ae 5a 3d 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 37 19 62 25 a0 9e 1e 52 48 66 63 35 92 1d df | c7 ff 13 b7 59 bd f6 95 87 8d 26 d9 c9 e0 f7 24 | 26 42 a2 e4 00 1b 68 a2 f9 e9 ac 5d f5 d7 11 4b | 1e 89 7d 46 ef 06 9a 32 1b e9 81 17 06 39 67 f5 | 0e f6 1a 5a 55 9b 1e a5 dd e1 43 76 e8 a2 58 b1 | 28 a6 3c d6 50 38 49 96 2d 91 42 d7 f8 ec 6a 33 | f4 e0 96 4a 58 58 aa e6 0c 5c 8c cb ab 5c e8 04 | a5 a1 ab 68 96 f3 f4 a5 e4 ae 1a 96 a0 9a f9 57 | 56 09 b6 81 96 72 27 a3 1c 3c 27 45 d5 f1 02 f8 | 2a d7 f9 4c 9f 1a a7 8a 5a f3 e7 da 4d 17 8e ac | 96 16 46 81 fd 01 db ca b6 72 84 a6 d0 d8 4e 69 | c7 79 31 c5 90 b9 16 b2 14 19 41 ef d9 1d 68 fa | 44 38 de 48 65 2c ec 8e 99 27 f7 c6 63 4b 60 bf | 8d 63 04 69 ea 6c 68 38 f9 a4 27 bd 15 c4 ec 7f | 0a d6 93 e5 0b 62 ad e0 de db a0 44 2e ae 03 d3 | 4a 90 aa 55 4e a9 22 5e 90 19 cd ff e2 28 23 a0 | 29 00 00 24 cc 92 78 18 36 9d 5d c6 a8 50 3e 53 | b3 db 47 67 8a c3 3b 19 d4 07 41 62 2d ad 79 2f | c7 c6 9c 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 04 bb 7b 41 fb 94 b6 5a f7 bf c5 | 50 0b eb 35 93 8a 85 4f 00 00 00 1c 00 00 40 05 | c2 0f 22 62 b9 53 47 a9 22 ed 80 06 c6 98 27 8a | 4f 90 48 63 | state #642 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb360009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb370017ea0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #642 | libevent_malloc: new ptr-libevent@0x7fb35c085320 size 128 | #642 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.26295 | resume sending helper answer for #642 suppresed complete_v2_state_transition() and stole MD | #642 spent 0.306 milliseconds in resume sending helper answer | stop processing: state #642 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c0aba40 | processing resume sending helper answer for #626 | start processing: state #626 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 626 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #626 | **emit ISAKMP Message: | initiator cookie: | 0f ed 5a cf 38 b1 e8 4b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-26 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8f 3d 6d be e1 b5 e5 c2 d3 2d 01 3e 44 32 8c 9c | ikev2 g^x 10 07 5b 6c ed c7 1e e0 bd ad 91 2f 7b 5d 66 20 | ikev2 g^x 1d 49 29 0a fe 5e e1 41 fd 2d 5b db 26 a9 35 00 | ikev2 g^x 65 10 cd fe cb 24 75 0b 38 a9 17 e0 c9 9c 32 cb | ikev2 g^x ac ed eb dc 28 55 86 03 cf 0a 73 6f 60 bd ce 34 | ikev2 g^x 02 6e 30 12 0b ea e0 d6 3e 1e 3f d8 09 a2 8f c4 | ikev2 g^x 00 8b 17 ad 6b dd 80 3e bb 4b 55 43 c0 01 45 68 | ikev2 g^x b9 d4 1f bb e9 85 dd cd 2e 4a b1 73 0f d3 cf 35 | ikev2 g^x 1d cc 81 40 9d 5a 89 f7 17 97 eb a9 9b ce d0 7a | ikev2 g^x ea fd d9 8a 75 55 14 06 7b b5 ea a1 d4 df 99 7f | ikev2 g^x 7d 44 5a 7b dd bb 03 bd 83 27 4b ff 5b 0a f8 f1 | ikev2 g^x 3f f3 6c 7e 81 c9 48 54 92 25 5a 38 2f 94 66 d9 | ikev2 g^x 09 f1 fc 50 b6 b8 4b c6 01 00 9b 5c de e0 c2 70 | ikev2 g^x 94 49 cd f6 f0 cd 84 42 37 97 4f aa 99 fe a6 85 | ikev2 g^x 3a 90 6e ce b7 01 23 71 2b b5 63 d7 be 2a b7 f7 | ikev2 g^x e5 82 55 b8 36 c2 c8 94 47 53 1e 97 b8 37 e2 29 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a0 8c 77 90 d5 d1 0c 21 bb 3d 18 0e 18 70 42 64 | IKEv2 nonce dc 36 73 88 d4 b3 3a 38 9b f1 00 e0 74 bb 2e 48 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0f ed 5a cf 38 b1 e8 4b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1a | natd_hash: port= 01 f4 | natd_hash: hash= e0 58 91 0c 95 19 f3 97 a9 04 fb bb 0f b6 c3 16 | natd_hash: hash= e5 5e 65 45 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e0 58 91 0c 95 19 f3 97 a9 04 fb bb 0f b6 c3 16 | Notify data e5 5e 65 45 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0f ed 5a cf 38 b1 e8 4b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 89 d2 55 f5 43 aa 76 28 9c 2b e8 f0 be 0a 82 5c | natd_hash: hash= 11 ab 36 f1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 89 d2 55 f5 43 aa 76 28 9c 2b e8 f0 be 0a 82 5c | Notify data 11 ab 36 f1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #626 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #626 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #626 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #626: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #626 to 4294967295 after switching state | Message ID: IKE #626 skipping update_recv as MD is fake | Message ID: sent #626 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-26" #626: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.26:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #626) | 0f ed 5a cf 38 b1 e8 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 3d 6d be e1 b5 e5 c2 d3 2d 01 3e 44 32 8c 9c | 10 07 5b 6c ed c7 1e e0 bd ad 91 2f 7b 5d 66 20 | 1d 49 29 0a fe 5e e1 41 fd 2d 5b db 26 a9 35 00 | 65 10 cd fe cb 24 75 0b 38 a9 17 e0 c9 9c 32 cb | ac ed eb dc 28 55 86 03 cf 0a 73 6f 60 bd ce 34 | 02 6e 30 12 0b ea e0 d6 3e 1e 3f d8 09 a2 8f c4 | 00 8b 17 ad 6b dd 80 3e bb 4b 55 43 c0 01 45 68 | b9 d4 1f bb e9 85 dd cd 2e 4a b1 73 0f d3 cf 35 | 1d cc 81 40 9d 5a 89 f7 17 97 eb a9 9b ce d0 7a | ea fd d9 8a 75 55 14 06 7b b5 ea a1 d4 df 99 7f | 7d 44 5a 7b dd bb 03 bd 83 27 4b ff 5b 0a f8 f1 | 3f f3 6c 7e 81 c9 48 54 92 25 5a 38 2f 94 66 d9 | 09 f1 fc 50 b6 b8 4b c6 01 00 9b 5c de e0 c2 70 | 94 49 cd f6 f0 cd 84 42 37 97 4f aa 99 fe a6 85 | 3a 90 6e ce b7 01 23 71 2b b5 63 d7 be 2a b7 f7 | e5 82 55 b8 36 c2 c8 94 47 53 1e 97 b8 37 e2 29 | 29 00 00 24 a0 8c 77 90 d5 d1 0c 21 bb 3d 18 0e | 18 70 42 64 dc 36 73 88 d4 b3 3a 38 9b f1 00 e0 | 74 bb 2e 48 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e0 58 91 0c 95 19 f3 97 a9 04 fb bb | 0f b6 c3 16 e5 5e 65 45 00 00 00 1c 00 00 40 05 | 89 d2 55 f5 43 aa 76 28 9c 2b e8 f0 be 0a 82 5c | 11 ab 36 f1 | state #626 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380036d70 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb38000a290 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000a290 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #626 | libevent_malloc: new ptr-libevent@0x7fb35c0aba40 size 128 | #626 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.263316 | resume sending helper answer for #626 suppresed complete_v2_state_transition() and stole MD | #626 spent 0.347 milliseconds in resume sending helper answer | stop processing: state #626 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3500722e0 | processing resume sending helper answer for #641 | start processing: state #641 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 641 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #641 | **emit ISAKMP Message: | initiator cookie: | 20 9c e2 59 31 cf 6e 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-235 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f8 09 b4 84 ab aa 43 89 78 34 b0 d6 e3 38 d9 6d | ikev2 g^x a2 02 c4 4c ab 4d 8a f8 0e 36 02 d1 bf 26 dc a0 | ikev2 g^x 18 35 ff 92 d6 ab 35 8b 97 0e fa 1f 06 74 86 13 | ikev2 g^x bd 4b d4 10 63 6d 50 fa d1 05 e5 b6 83 80 eb 81 | ikev2 g^x 1d c1 17 7e 74 96 70 4b 8a 7d a7 98 bf 41 d3 e4 | ikev2 g^x 53 6e 45 47 7a d5 ce ad 7c de 29 6d 1c ce bf ee | ikev2 g^x 29 ef db 71 37 1e f4 da 05 b9 c1 9e 94 b8 09 61 | ikev2 g^x 06 d2 e5 30 cb fb 00 e2 3c 1f 90 84 66 2a c9 21 | ikev2 g^x ab 1a 0e 49 5d e5 f7 c2 53 02 87 88 0a 36 0c 6d | ikev2 g^x c1 f9 c6 d4 46 2e 67 22 c6 2f 23 dd 8d d0 33 a7 | ikev2 g^x 3c c4 80 09 35 06 d4 ba c9 54 31 c0 47 e3 77 50 | ikev2 g^x fe d3 cc af 02 88 b5 3d 64 43 bb 82 7f d7 97 a8 | ikev2 g^x 8e 74 10 23 3c 82 a8 eb 61 af 8f 95 ef 01 57 91 | ikev2 g^x 74 35 ea c2 74 76 d5 21 d5 ff e2 5e 1a d1 24 e9 | ikev2 g^x 4f c4 4e 06 0e c3 35 68 7a e5 01 33 ba 0f 7b 79 | ikev2 g^x d3 d6 e7 d9 69 7d 18 4b b8 91 33 33 1e aa 41 47 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce de ff b6 ca 63 e9 cc b9 1f 7c 3e 7c 82 6d ca 20 | IKEv2 nonce ea 43 fd 3c 13 8e a9 32 83 2c 0c 09 45 b1 6a 12 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 20 9c e2 59 31 cf 6e 74 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 eb | natd_hash: port= 01 f4 | natd_hash: hash= 9f d0 71 59 b2 13 20 21 05 f4 92 89 a6 fa df 4f | natd_hash: hash= c5 3e bb 18 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9f d0 71 59 b2 13 20 21 05 f4 92 89 a6 fa df 4f | Notify data c5 3e bb 18 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 20 9c e2 59 31 cf 6e 74 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= da 4e b6 83 cf f5 84 c6 fa 26 59 3a 0c bf c7 47 | natd_hash: hash= bc 79 7e dc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data da 4e b6 83 cf f5 84 c6 fa 26 59 3a 0c bf c7 47 | Notify data bc 79 7e dc | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #641 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #641 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #641 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #641: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #641 to 4294967295 after switching state | Message ID: IKE #641 skipping update_recv as MD is fake | Message ID: sent #641 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-235" #641: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.235:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #641) | 20 9c e2 59 31 cf 6e 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 09 b4 84 ab aa 43 89 78 34 b0 d6 e3 38 d9 6d | a2 02 c4 4c ab 4d 8a f8 0e 36 02 d1 bf 26 dc a0 | 18 35 ff 92 d6 ab 35 8b 97 0e fa 1f 06 74 86 13 | bd 4b d4 10 63 6d 50 fa d1 05 e5 b6 83 80 eb 81 | 1d c1 17 7e 74 96 70 4b 8a 7d a7 98 bf 41 d3 e4 | 53 6e 45 47 7a d5 ce ad 7c de 29 6d 1c ce bf ee | 29 ef db 71 37 1e f4 da 05 b9 c1 9e 94 b8 09 61 | 06 d2 e5 30 cb fb 00 e2 3c 1f 90 84 66 2a c9 21 | ab 1a 0e 49 5d e5 f7 c2 53 02 87 88 0a 36 0c 6d | c1 f9 c6 d4 46 2e 67 22 c6 2f 23 dd 8d d0 33 a7 | 3c c4 80 09 35 06 d4 ba c9 54 31 c0 47 e3 77 50 | fe d3 cc af 02 88 b5 3d 64 43 bb 82 7f d7 97 a8 | 8e 74 10 23 3c 82 a8 eb 61 af 8f 95 ef 01 57 91 | 74 35 ea c2 74 76 d5 21 d5 ff e2 5e 1a d1 24 e9 | 4f c4 4e 06 0e c3 35 68 7a e5 01 33 ba 0f 7b 79 | d3 d6 e7 d9 69 7d 18 4b b8 91 33 33 1e aa 41 47 | 29 00 00 24 de ff b6 ca 63 e9 cc b9 1f 7c 3e 7c | 82 6d ca 20 ea 43 fd 3c 13 8e a9 32 83 2c 0c 09 | 45 b1 6a 12 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f d0 71 59 b2 13 20 21 05 f4 92 89 | a6 fa df 4f c5 3e bb 18 00 00 00 1c 00 00 40 05 | da 4e b6 83 cf f5 84 c6 fa 26 59 3a 0c bf c7 47 | bc 79 7e dc | state #641 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb384032b00 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb38800feb0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800feb0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #641 | libevent_malloc: new ptr-libevent@0x7fb3500722e0 size 128 | #641 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.263622 | resume sending helper answer for #641 suppresed complete_v2_state_transition() and stole MD | #641 spent 0.289 milliseconds in resume sending helper answer | stop processing: state #641 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c0a6260 | processing resume sending helper answer for #605 | start processing: state #605 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 605 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #605 | **emit ISAKMP Message: | initiator cookie: | 7d 69 66 b6 0b 09 69 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-85 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d6 9b 48 45 a7 cd bb af 89 5b c6 84 3e 6b 29 f5 | ikev2 g^x 82 21 ed b8 01 9b e9 d6 eb 48 22 a2 47 4c 8b 00 | ikev2 g^x 72 84 38 7c 84 0f e9 29 65 9f 0e 0b d9 68 a1 08 | ikev2 g^x 85 41 62 70 51 2b 55 5e e7 51 39 59 cd ab dc 26 | ikev2 g^x 7f 43 85 55 c1 52 ee 33 ef c7 05 bb 4f 2b ac bb | ikev2 g^x 45 e8 b5 9c 8c 32 a9 0d 25 75 95 bd 99 f6 bc 7b | ikev2 g^x 41 12 70 0b a9 4f 28 9d 03 5a 76 fc 2d 26 df 1b | ikev2 g^x e3 79 ba fa a5 3f be 69 d9 fb 38 21 c3 3b c5 39 | ikev2 g^x 69 72 3d 42 47 0c 0b a5 70 56 b5 cd e3 db e1 b4 | ikev2 g^x 55 5f 2a 24 b5 b7 72 1d 3c 1e c4 16 a7 e8 bb d4 | ikev2 g^x 1b 31 e8 de 60 cf e9 e1 53 db 5b aa 1e f3 c3 ea | ikev2 g^x 73 35 bd 86 03 0c b1 c2 d4 c2 26 cc 43 5f a7 99 | ikev2 g^x 82 c7 95 6d 26 de e4 a9 78 fc 7c 80 08 50 d4 6d | ikev2 g^x 8a 23 a2 4b 98 e9 f1 f6 58 c1 c4 56 2d b4 d5 be | ikev2 g^x e1 4a 66 10 6a c0 ec 3e 63 d7 99 07 ed 98 3e de | ikev2 g^x 3b 38 1f 2e e8 77 14 e6 cf 9e 3f eb e7 72 77 34 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e5 d6 0e d1 07 36 d0 c9 9d 74 f9 e8 91 f8 2d 2e | IKEv2 nonce ee 7d e8 c8 bf 6d c4 2d b0 02 ab f4 ee 91 2c 37 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7d 69 66 b6 0b 09 69 be | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 55 | natd_hash: port= 01 f4 | natd_hash: hash= a0 1f a0 9c 16 7a 2c 8b 61 32 59 c1 2b 37 d9 c7 | natd_hash: hash= 8d 13 c7 70 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a0 1f a0 9c 16 7a 2c 8b 61 32 59 c1 2b 37 d9 c7 | Notify data 8d 13 c7 70 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7d 69 66 b6 0b 09 69 be | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 0c 6c 27 3d 37 c9 55 25 41 13 59 12 57 c6 07 0e | natd_hash: hash= 1b e6 b3 6d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0c 6c 27 3d 37 c9 55 25 41 13 59 12 57 c6 07 0e | Notify data 1b e6 b3 6d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #605 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #605 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #605 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #605: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #605 to 4294967295 after switching state | Message ID: IKE #605 skipping update_recv as MD is fake | Message ID: sent #605 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-85" #605: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.85:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #605) | 7d 69 66 b6 0b 09 69 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 9b 48 45 a7 cd bb af 89 5b c6 84 3e 6b 29 f5 | 82 21 ed b8 01 9b e9 d6 eb 48 22 a2 47 4c 8b 00 | 72 84 38 7c 84 0f e9 29 65 9f 0e 0b d9 68 a1 08 | 85 41 62 70 51 2b 55 5e e7 51 39 59 cd ab dc 26 | 7f 43 85 55 c1 52 ee 33 ef c7 05 bb 4f 2b ac bb | 45 e8 b5 9c 8c 32 a9 0d 25 75 95 bd 99 f6 bc 7b | 41 12 70 0b a9 4f 28 9d 03 5a 76 fc 2d 26 df 1b | e3 79 ba fa a5 3f be 69 d9 fb 38 21 c3 3b c5 39 | 69 72 3d 42 47 0c 0b a5 70 56 b5 cd e3 db e1 b4 | 55 5f 2a 24 b5 b7 72 1d 3c 1e c4 16 a7 e8 bb d4 | 1b 31 e8 de 60 cf e9 e1 53 db 5b aa 1e f3 c3 ea | 73 35 bd 86 03 0c b1 c2 d4 c2 26 cc 43 5f a7 99 | 82 c7 95 6d 26 de e4 a9 78 fc 7c 80 08 50 d4 6d | 8a 23 a2 4b 98 e9 f1 f6 58 c1 c4 56 2d b4 d5 be | e1 4a 66 10 6a c0 ec 3e 63 d7 99 07 ed 98 3e de | 3b 38 1f 2e e8 77 14 e6 cf 9e 3f eb e7 72 77 34 | 29 00 00 24 e5 d6 0e d1 07 36 d0 c9 9d 74 f9 e8 | 91 f8 2d 2e ee 7d e8 c8 bf 6d c4 2d b0 02 ab f4 | ee 91 2c 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 1f a0 9c 16 7a 2c 8b 61 32 59 c1 | 2b 37 d9 c7 8d 13 c7 70 00 00 00 1c 00 00 40 05 | 0c 6c 27 3d 37 c9 55 25 41 13 59 12 57 c6 07 0e | 1b e6 b3 6d | state #605 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35403f170 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb354025320 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354025320 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #605 | libevent_malloc: new ptr-libevent@0x7fb35c0a6260 size 128 | #605 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.263923 | resume sending helper answer for #605 suppresed complete_v2_state_transition() and stole MD | #605 spent 0.289 milliseconds in resume sending helper answer | stop processing: state #605 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38400f680 | processing resume sending helper answer for #615 | start processing: state #615 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 615 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #615 | **emit ISAKMP Message: | initiator cookie: | 3d 12 6d 03 9d 3a 3f 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-25 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5f f9 00 4e 05 17 74 a7 73 6c 7a 55 de e3 3f bc | ikev2 g^x b6 50 d8 da 7f 1d ba 94 53 90 d9 17 e3 56 27 62 | ikev2 g^x d4 43 27 60 0b a1 f0 f9 c0 27 e9 0b e3 82 e7 85 | ikev2 g^x 80 6a 81 03 53 c7 b9 23 a3 5a 6b a7 5d 76 6f ac | ikev2 g^x e9 13 02 5b 79 2d 66 7b ff 5c a6 74 d0 95 c7 c2 | ikev2 g^x 71 fc d6 11 6a 39 e5 64 21 9e b5 4d 11 be 89 8e | ikev2 g^x 5d 20 22 f2 57 1a ae e9 d9 48 ed e3 e5 74 a0 a2 | ikev2 g^x cc fd e4 70 7c a3 dc a0 27 e6 f1 f2 c5 fb f1 1f | ikev2 g^x 79 67 f9 17 79 f4 c5 25 d5 53 79 6f 85 2b eb a0 | ikev2 g^x 27 7d 23 ed 74 15 b9 2a 82 05 20 2b bb 1e 36 fe | ikev2 g^x 50 40 25 d6 98 23 b1 bd c4 a8 9d 60 26 d6 0b 43 | ikev2 g^x 16 dd 68 58 c3 dd 64 ba de 9f 7e 50 5f 81 e9 94 | ikev2 g^x aa 7d 9b 9b 86 a9 b2 65 a2 14 57 a5 2e a6 24 6f | ikev2 g^x 4f 4e 8d fb e6 1b e7 3b 6c 59 92 d8 48 02 79 8d | ikev2 g^x 9b 5b 3b 8c ae fc 09 50 ce 87 b0 23 2c d7 e5 44 | ikev2 g^x 3c 8a 3a 64 cd a6 2c 8d 5b ba 46 2d 2c b5 ed 4c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7e 29 69 54 1c 75 9f 10 bb 76 c9 d5 f4 45 3d a6 | IKEv2 nonce cd bc 36 61 89 98 84 20 31 27 44 33 6a 69 46 38 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3d 12 6d 03 9d 3a 3f 73 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 19 | natd_hash: port= 01 f4 | natd_hash: hash= 49 5e 77 cc 13 4a a8 38 41 6c 23 4b 5b 37 4e ff | natd_hash: hash= 01 d4 b9 94 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 49 5e 77 cc 13 4a a8 38 41 6c 23 4b 5b 37 4e ff | Notify data 01 d4 b9 94 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 3d 12 6d 03 9d 3a 3f 73 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 52 22 03 e7 9f c3 e4 87 eb 62 51 6b 10 18 8d 12 | natd_hash: hash= 1a 37 2c 77 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 52 22 03 e7 9f c3 e4 87 eb 62 51 6b 10 18 8d 12 | Notify data 1a 37 2c 77 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #615 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #615 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #615 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #615: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #615 to 4294967295 after switching state | Message ID: IKE #615 skipping update_recv as MD is fake | Message ID: sent #615 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-25" #615: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.25:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #615) | 3d 12 6d 03 9d 3a 3f 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f f9 00 4e 05 17 74 a7 73 6c 7a 55 de e3 3f bc | b6 50 d8 da 7f 1d ba 94 53 90 d9 17 e3 56 27 62 | d4 43 27 60 0b a1 f0 f9 c0 27 e9 0b e3 82 e7 85 | 80 6a 81 03 53 c7 b9 23 a3 5a 6b a7 5d 76 6f ac | e9 13 02 5b 79 2d 66 7b ff 5c a6 74 d0 95 c7 c2 | 71 fc d6 11 6a 39 e5 64 21 9e b5 4d 11 be 89 8e | 5d 20 22 f2 57 1a ae e9 d9 48 ed e3 e5 74 a0 a2 | cc fd e4 70 7c a3 dc a0 27 e6 f1 f2 c5 fb f1 1f | 79 67 f9 17 79 f4 c5 25 d5 53 79 6f 85 2b eb a0 | 27 7d 23 ed 74 15 b9 2a 82 05 20 2b bb 1e 36 fe | 50 40 25 d6 98 23 b1 bd c4 a8 9d 60 26 d6 0b 43 | 16 dd 68 58 c3 dd 64 ba de 9f 7e 50 5f 81 e9 94 | aa 7d 9b 9b 86 a9 b2 65 a2 14 57 a5 2e a6 24 6f | 4f 4e 8d fb e6 1b e7 3b 6c 59 92 d8 48 02 79 8d | 9b 5b 3b 8c ae fc 09 50 ce 87 b0 23 2c d7 e5 44 | 3c 8a 3a 64 cd a6 2c 8d 5b ba 46 2d 2c b5 ed 4c | 29 00 00 24 7e 29 69 54 1c 75 9f 10 bb 76 c9 d5 | f4 45 3d a6 cd bc 36 61 89 98 84 20 31 27 44 33 | 6a 69 46 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 49 5e 77 cc 13 4a a8 38 41 6c 23 4b | 5b 37 4e ff 01 d4 b9 94 00 00 00 1c 00 00 40 05 | 52 22 03 e7 9f c3 e4 87 eb 62 51 6b 10 18 8d 12 | 1a 37 2c 77 | state #615 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380006900 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c01fda0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c01fda0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #615 | libevent_malloc: new ptr-libevent@0x7fb38400f680 size 128 | #615 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.264318 | resume sending helper answer for #615 suppresed complete_v2_state_transition() and stole MD | #615 spent 0.379 milliseconds in resume sending helper answer | stop processing: state #615 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38007a830 | processing resume sending helper answer for #624 | start processing: state #624 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 624 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #624 | **emit ISAKMP Message: | initiator cookie: | 91 66 df b6 23 36 44 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-225 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 04 d0 c0 52 11 6f 6b 97 d8 4a 21 40 0d a8 d6 03 | ikev2 g^x 5a 31 7a b1 43 64 89 6d a3 67 7b 89 c5 fb c9 87 | ikev2 g^x fa b6 99 9f 95 c8 70 ce 70 b6 63 79 83 53 ee 5c | ikev2 g^x 03 14 79 98 13 a2 86 e7 a9 ca 4e 70 0d d2 78 f2 | ikev2 g^x 04 e5 33 3e 6c 0d da 0e d7 7f a3 32 5d 10 72 3a | ikev2 g^x e8 21 c5 aa 25 ec 61 02 13 d9 f2 57 e5 85 e2 36 | ikev2 g^x 3b 19 f5 73 53 0e 11 80 95 c9 7a c2 73 f9 c3 f1 | ikev2 g^x 92 7a e8 68 48 16 47 32 d8 fa a5 eb 40 2c 5c d4 | ikev2 g^x e0 f8 c0 97 0f 60 4c 10 92 41 16 02 1b e9 aa 47 | ikev2 g^x 0a fb 2f 7e e8 bd 85 fc 57 ea a3 81 bb 29 8c 27 | ikev2 g^x 15 9c 41 59 04 b5 17 25 e2 28 cf b9 d5 e4 f1 54 | ikev2 g^x 7e 08 6e 40 8c 6b e0 01 f0 a2 bc bd 6a de 51 92 | ikev2 g^x 5d 24 cd 29 bb f6 9e c2 d0 13 ad 94 34 1b 3c cf | ikev2 g^x ae c6 f3 ce c0 2c c8 d1 85 6b 46 14 ce 28 e2 1f | ikev2 g^x cf 9f 53 a4 1f 17 48 36 04 1e 5f e3 ed 6a cc 61 | ikev2 g^x d7 3f 56 7a 05 e3 3d 19 c2 99 b2 48 2d 25 92 b9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 20 57 85 7e 38 82 c6 c2 c2 b9 82 69 7e 4b 89 c1 | IKEv2 nonce c5 70 2d 62 ae 17 de e7 0b 2c 59 f9 31 54 7c 30 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 91 66 df b6 23 36 44 2c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 e1 | natd_hash: port= 01 f4 | natd_hash: hash= 7c de 77 a1 da 64 49 53 60 59 d3 c7 5c d0 d5 e0 | natd_hash: hash= d1 18 19 9b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7c de 77 a1 da 64 49 53 60 59 d3 c7 5c d0 d5 e0 | Notify data d1 18 19 9b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 91 66 df b6 23 36 44 2c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 99 9e a5 9c 48 82 f5 4c 18 c3 dc e9 e9 80 6e 22 | natd_hash: hash= 1b 1d e2 41 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 99 9e a5 9c 48 82 f5 4c 18 c3 dc e9 e9 80 6e 22 | Notify data 1b 1d e2 41 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #624 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #624 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #624 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #624: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #624 to 4294967295 after switching state | Message ID: IKE #624 skipping update_recv as MD is fake | Message ID: sent #624 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-225" #624: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.225:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #624) | 91 66 df b6 23 36 44 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 04 d0 c0 52 11 6f 6b 97 d8 4a 21 40 0d a8 d6 03 | 5a 31 7a b1 43 64 89 6d a3 67 7b 89 c5 fb c9 87 | fa b6 99 9f 95 c8 70 ce 70 b6 63 79 83 53 ee 5c | 03 14 79 98 13 a2 86 e7 a9 ca 4e 70 0d d2 78 f2 | 04 e5 33 3e 6c 0d da 0e d7 7f a3 32 5d 10 72 3a | e8 21 c5 aa 25 ec 61 02 13 d9 f2 57 e5 85 e2 36 | 3b 19 f5 73 53 0e 11 80 95 c9 7a c2 73 f9 c3 f1 | 92 7a e8 68 48 16 47 32 d8 fa a5 eb 40 2c 5c d4 | e0 f8 c0 97 0f 60 4c 10 92 41 16 02 1b e9 aa 47 | 0a fb 2f 7e e8 bd 85 fc 57 ea a3 81 bb 29 8c 27 | 15 9c 41 59 04 b5 17 25 e2 28 cf b9 d5 e4 f1 54 | 7e 08 6e 40 8c 6b e0 01 f0 a2 bc bd 6a de 51 92 | 5d 24 cd 29 bb f6 9e c2 d0 13 ad 94 34 1b 3c cf | ae c6 f3 ce c0 2c c8 d1 85 6b 46 14 ce 28 e2 1f | cf 9f 53 a4 1f 17 48 36 04 1e 5f e3 ed 6a cc 61 | d7 3f 56 7a 05 e3 3d 19 c2 99 b2 48 2d 25 92 b9 | 29 00 00 24 20 57 85 7e 38 82 c6 c2 c2 b9 82 69 | 7e 4b 89 c1 c5 70 2d 62 ae 17 de e7 0b 2c 59 f9 | 31 54 7c 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7c de 77 a1 da 64 49 53 60 59 d3 c7 | 5c d0 d5 e0 d1 18 19 9b 00 00 00 1c 00 00 40 05 | 99 9e a5 9c 48 82 f5 4c 18 c3 dc e9 e9 80 6e 22 | 1b 1d e2 41 | state #624 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36403f0c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a0a990 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #624 | libevent_malloc: new ptr-libevent@0x7fb38007a830 size 128 | #624 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.264792 | resume sending helper answer for #624 suppresed complete_v2_state_transition() and stole MD | #624 spent 0.448 milliseconds in resume sending helper answer | stop processing: state #624 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb33806f750 | processing resume sending helper answer for #623 | start processing: state #623 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 623 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #623 | **emit ISAKMP Message: | initiator cookie: | b9 b9 92 a4 ec 38 7b b1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-67 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 52 f3 7e e2 e6 f9 2a f9 d0 93 e1 a3 9d fe 74 ed | ikev2 g^x 88 55 53 55 78 91 02 79 67 05 d4 47 b7 41 b9 fb | ikev2 g^x f1 19 18 33 40 a4 b0 8c 32 db 0a 07 ba 07 01 e9 | ikev2 g^x c8 5e e2 aa 5a fe 73 d0 43 82 cf ee 31 82 b6 b2 | ikev2 g^x 5e df 34 0e 42 bf b6 f1 fd 55 a4 d8 49 96 21 84 | ikev2 g^x cd ec 4d 1b 66 59 11 58 1d 4a a6 2b 86 62 43 39 | ikev2 g^x e7 71 28 21 32 2a 5c 6b 41 1f 1e a1 24 a8 7e 32 | ikev2 g^x 23 86 5c 25 2e 71 70 af 02 5f a8 b3 61 f2 41 fc | ikev2 g^x a5 63 0a e6 65 ef d6 7d ab cd 41 94 d7 f5 1e 6e | ikev2 g^x a4 d7 27 bd 30 b8 2b ed e0 66 d7 7a 3c 2f 83 9d | ikev2 g^x 91 91 64 73 8a 4d c2 67 18 5a 11 fb bf 8d de 21 | ikev2 g^x 74 5c 7d bc ae 43 a1 bb 17 7c c3 68 7a 37 86 6e | ikev2 g^x 83 ca 1f a2 33 23 44 69 5a e6 2e 90 79 83 57 19 | ikev2 g^x ae e4 1d fa 01 cf 8b fb 73 b3 e0 fb f2 40 fe 50 | ikev2 g^x 44 65 ee e2 51 df 47 88 22 c7 4a bb 66 b3 7d db | ikev2 g^x 0b 53 67 9b 7e 51 76 d3 fd f7 82 53 9e be b5 ff | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6f 2c b0 62 51 9d 8c 96 be a1 aa 9b 8b d2 a8 77 | IKEv2 nonce e2 d2 a6 95 67 e0 34 a3 2d 5d ad 37 32 20 86 8f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b9 b9 92 a4 ec 38 7b b1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 43 | natd_hash: port= 01 f4 | natd_hash: hash= a8 14 ee 41 a8 c3 e5 2e 90 58 14 8d 5a f6 f4 40 | natd_hash: hash= 9d 72 d9 2f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a8 14 ee 41 a8 c3 e5 2e 90 58 14 8d 5a f6 f4 40 | Notify data 9d 72 d9 2f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b9 b9 92 a4 ec 38 7b b1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c6 f2 3a 3c 4a 40 8a 12 05 e3 0f 64 13 e4 22 0b | natd_hash: hash= ff 8f 1a ac | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c6 f2 3a 3c 4a 40 8a 12 05 e3 0f 64 13 e4 22 0b | Notify data ff 8f 1a ac | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #623 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #623 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #623 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #623: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #623 to 4294967295 after switching state | Message ID: IKE #623 skipping update_recv as MD is fake | Message ID: sent #623 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-67" #623: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.67:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #623) | b9 b9 92 a4 ec 38 7b b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 f3 7e e2 e6 f9 2a f9 d0 93 e1 a3 9d fe 74 ed | 88 55 53 55 78 91 02 79 67 05 d4 47 b7 41 b9 fb | f1 19 18 33 40 a4 b0 8c 32 db 0a 07 ba 07 01 e9 | c8 5e e2 aa 5a fe 73 d0 43 82 cf ee 31 82 b6 b2 | 5e df 34 0e 42 bf b6 f1 fd 55 a4 d8 49 96 21 84 | cd ec 4d 1b 66 59 11 58 1d 4a a6 2b 86 62 43 39 | e7 71 28 21 32 2a 5c 6b 41 1f 1e a1 24 a8 7e 32 | 23 86 5c 25 2e 71 70 af 02 5f a8 b3 61 f2 41 fc | a5 63 0a e6 65 ef d6 7d ab cd 41 94 d7 f5 1e 6e | a4 d7 27 bd 30 b8 2b ed e0 66 d7 7a 3c 2f 83 9d | 91 91 64 73 8a 4d c2 67 18 5a 11 fb bf 8d de 21 | 74 5c 7d bc ae 43 a1 bb 17 7c c3 68 7a 37 86 6e | 83 ca 1f a2 33 23 44 69 5a e6 2e 90 79 83 57 19 | ae e4 1d fa 01 cf 8b fb 73 b3 e0 fb f2 40 fe 50 | 44 65 ee e2 51 df 47 88 22 c7 4a bb 66 b3 7d db | 0b 53 67 9b 7e 51 76 d3 fd f7 82 53 9e be b5 ff | 29 00 00 24 6f 2c b0 62 51 9d 8c 96 be a1 aa 9b | 8b d2 a8 77 e2 d2 a6 95 67 e0 34 a3 2d 5d ad 37 | 32 20 86 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a8 14 ee 41 a8 c3 e5 2e 90 58 14 8d | 5a f6 f4 40 9d 72 d9 2f 00 00 00 1c 00 00 40 05 | c6 f2 3a 3c 4a 40 8a 12 05 e3 0f 64 13 e4 22 0b | ff 8f 1a ac | state #623 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb33803b0b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb33800d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #623 | libevent_malloc: new ptr-libevent@0x7fb33806f750 size 128 | #623 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.265264 | resume sending helper answer for #623 suppresed complete_v2_state_transition() and stole MD | #623 spent 0.443 milliseconds in resume sending helper answer | stop processing: state #623 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb354069fa0 | processing resume sending helper answer for #636 | start processing: state #636 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 636 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #636 | **emit ISAKMP Message: | initiator cookie: | ce ed f3 5e ed fa 9c 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-146 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 25 c3 55 ec 4f 5b 4c 21 a7 89 24 6e 2a b9 a9 cb | ikev2 g^x f8 19 9e a3 b5 df ee 5a 2c 71 bc 32 c1 92 74 f8 | ikev2 g^x b0 ab 4f 8f e7 f9 3f 29 7a 8c 9f 2f d7 89 ae 25 | ikev2 g^x 61 ab 3d 60 a3 0e 51 68 4c 02 b2 37 56 25 c1 f8 | ikev2 g^x bb 4a 51 31 0f 4f 85 cb a5 75 3a af 8e dc cc 87 | ikev2 g^x a5 bd 11 5b 66 d2 55 75 a4 74 43 78 e6 bd 37 d2 | ikev2 g^x 03 60 a4 df 8e 0f 50 d9 f0 84 a1 4b 87 50 ad 61 | ikev2 g^x 89 fd 53 a9 95 2c 82 05 31 04 36 b8 df 85 82 bf | ikev2 g^x 91 1b 12 8a 8c 72 93 cc 94 19 4b ed 3b c6 73 96 | ikev2 g^x c9 e4 a9 4f a1 e7 46 f7 b8 64 4d 8b b6 9f c4 71 | ikev2 g^x db ce 40 02 9e 98 7f 48 f3 9a 88 fa a8 90 63 74 | ikev2 g^x 87 33 f7 67 a1 6e 37 63 07 fd f7 f2 21 22 b4 ad | ikev2 g^x 8c e8 70 46 a2 30 3a aa 26 d0 99 b2 70 88 82 11 | ikev2 g^x e4 b8 46 de e2 85 7c 68 ae a6 76 d5 48 a3 de 62 | ikev2 g^x 80 b5 a8 b6 cf c8 b8 fb d0 a3 90 c3 74 cb c4 ea | ikev2 g^x 05 11 15 0d eb a6 bc f1 88 ed c5 82 fd 7e 24 72 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e5 61 c1 f3 64 2d 4c f6 6f 55 99 d2 6d 06 b7 7f | IKEv2 nonce d0 4c 35 18 0b 4c dc f2 04 b9 cd b4 d2 a9 94 17 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ce ed f3 5e ed fa 9c 5d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 92 | natd_hash: port= 01 f4 | natd_hash: hash= e5 4f 92 a8 39 a0 4f db 00 14 5d 39 5e 60 0b f6 | natd_hash: hash= 04 83 59 50 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e5 4f 92 a8 39 a0 4f db 00 14 5d 39 5e 60 0b f6 | Notify data 04 83 59 50 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ce ed f3 5e ed fa 9c 5d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e2 2e ff 0f c7 2f 00 8a f3 ce c3 f8 79 de 24 f9 | natd_hash: hash= 92 17 31 34 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e2 2e ff 0f c7 2f 00 8a f3 ce c3 f8 79 de 24 f9 | Notify data 92 17 31 34 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #636 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #636 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #636 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #636: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #636 to 4294967295 after switching state | Message ID: IKE #636 skipping update_recv as MD is fake | Message ID: sent #636 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-146" #636: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.146:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #636) | ce ed f3 5e ed fa 9c 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 c3 55 ec 4f 5b 4c 21 a7 89 24 6e 2a b9 a9 cb | f8 19 9e a3 b5 df ee 5a 2c 71 bc 32 c1 92 74 f8 | b0 ab 4f 8f e7 f9 3f 29 7a 8c 9f 2f d7 89 ae 25 | 61 ab 3d 60 a3 0e 51 68 4c 02 b2 37 56 25 c1 f8 | bb 4a 51 31 0f 4f 85 cb a5 75 3a af 8e dc cc 87 | a5 bd 11 5b 66 d2 55 75 a4 74 43 78 e6 bd 37 d2 | 03 60 a4 df 8e 0f 50 d9 f0 84 a1 4b 87 50 ad 61 | 89 fd 53 a9 95 2c 82 05 31 04 36 b8 df 85 82 bf | 91 1b 12 8a 8c 72 93 cc 94 19 4b ed 3b c6 73 96 | c9 e4 a9 4f a1 e7 46 f7 b8 64 4d 8b b6 9f c4 71 | db ce 40 02 9e 98 7f 48 f3 9a 88 fa a8 90 63 74 | 87 33 f7 67 a1 6e 37 63 07 fd f7 f2 21 22 b4 ad | 8c e8 70 46 a2 30 3a aa 26 d0 99 b2 70 88 82 11 | e4 b8 46 de e2 85 7c 68 ae a6 76 d5 48 a3 de 62 | 80 b5 a8 b6 cf c8 b8 fb d0 a3 90 c3 74 cb c4 ea | 05 11 15 0d eb a6 bc f1 88 ed c5 82 fd 7e 24 72 | 29 00 00 24 e5 61 c1 f3 64 2d 4c f6 6f 55 99 d2 | 6d 06 b7 7f d0 4c 35 18 0b 4c dc f2 04 b9 cd b4 | d2 a9 94 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 4f 92 a8 39 a0 4f db 00 14 5d 39 | 5e 60 0b f6 04 83 59 50 00 00 00 1c 00 00 40 05 | e2 2e ff 0f c7 2f 00 8a f3 ce c3 f8 79 de 24 f9 | 92 17 31 34 | state #636 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3480251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ae48c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae48c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #636 | libevent_malloc: new ptr-libevent@0x7fb354069fa0 size 128 | #636 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.265637 | resume sending helper answer for #636 suppresed complete_v2_state_transition() and stole MD | #636 spent 0.35 milliseconds in resume sending helper answer | stop processing: state #636 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c08ab00 | processing resume sending helper answer for #638 | start processing: state #638 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 638 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #638 | **emit ISAKMP Message: | initiator cookie: | 73 d4 45 41 ab fb 7a 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-218 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 74 9f 1b 03 84 82 35 ff 90 4c 0e e1 4d 63 0b 6e | ikev2 g^x 25 67 96 c9 b1 5e 9f d5 99 08 91 8b 97 07 16 15 | ikev2 g^x 0c e8 b6 79 cd d7 bc dc 55 ef e3 4b 14 16 41 5b | ikev2 g^x 40 76 1a 52 cc c5 af e0 d7 43 e0 3e 6a bb f6 6e | ikev2 g^x 3a bb da 36 77 2b a1 fe af 56 c4 df 62 b3 73 b9 | ikev2 g^x 52 c1 55 25 5c 52 48 e6 3a 7b f7 12 bf 50 3d 13 | ikev2 g^x 60 2e 98 52 d5 09 1c 91 b8 c2 de 2d 7f f1 06 b2 | ikev2 g^x 39 09 03 76 3e 48 2f e6 27 f7 a9 1d 29 27 2e f9 | ikev2 g^x 47 87 5e 4a 7f 25 ff 26 1e 80 23 47 3f 0d 0c 05 | ikev2 g^x c8 27 d3 ed 98 ba 35 8c d3 ea 22 73 97 01 a0 d4 | ikev2 g^x fe 01 e2 3a 2d fc 4d bf 2f 53 eb 87 c3 5c 58 ef | ikev2 g^x 04 26 0a 51 13 2d 57 56 6a 69 f2 77 0e e6 3d 17 | ikev2 g^x 34 db d2 58 e6 ef 99 7a a5 d2 4f c6 f1 d6 ee ce | ikev2 g^x b8 69 1a 6d d5 e4 12 01 a4 1e 43 89 0e 61 2a 78 | ikev2 g^x 44 0b 0b bb 93 59 d9 ea 7a 2e 42 02 8d af be c7 | ikev2 g^x d3 84 14 a0 3f f3 e5 9f b7 c2 2d 2a 24 01 b0 1c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 5e 9d 7c 45 0d ec 13 66 03 bc 86 eb df 18 53 02 | IKEv2 nonce 81 01 d0 ca be 7b d0 08 90 a7 74 72 28 4f b9 2e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 73 d4 45 41 ab fb 7a 6d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 da | natd_hash: port= 01 f4 | natd_hash: hash= b7 c4 2c 70 3a 67 17 0b be 99 22 e3 81 fa d7 92 | natd_hash: hash= 68 76 9e 84 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b7 c4 2c 70 3a 67 17 0b be 99 22 e3 81 fa d7 92 | Notify data 68 76 9e 84 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 73 d4 45 41 ab fb 7a 6d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 70 aa ac 05 74 24 54 28 15 1e a7 7e 64 95 2b b7 | natd_hash: hash= 84 55 48 79 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 70 aa ac 05 74 24 54 28 15 1e a7 7e 64 95 2b b7 | Notify data 84 55 48 79 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #638 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #638 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #638 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #638: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #638 to 4294967295 after switching state | Message ID: IKE #638 skipping update_recv as MD is fake | Message ID: sent #638 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-218" #638: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.218:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #638) | 73 d4 45 41 ab fb 7a 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 9f 1b 03 84 82 35 ff 90 4c 0e e1 4d 63 0b 6e | 25 67 96 c9 b1 5e 9f d5 99 08 91 8b 97 07 16 15 | 0c e8 b6 79 cd d7 bc dc 55 ef e3 4b 14 16 41 5b | 40 76 1a 52 cc c5 af e0 d7 43 e0 3e 6a bb f6 6e | 3a bb da 36 77 2b a1 fe af 56 c4 df 62 b3 73 b9 | 52 c1 55 25 5c 52 48 e6 3a 7b f7 12 bf 50 3d 13 | 60 2e 98 52 d5 09 1c 91 b8 c2 de 2d 7f f1 06 b2 | 39 09 03 76 3e 48 2f e6 27 f7 a9 1d 29 27 2e f9 | 47 87 5e 4a 7f 25 ff 26 1e 80 23 47 3f 0d 0c 05 | c8 27 d3 ed 98 ba 35 8c d3 ea 22 73 97 01 a0 d4 | fe 01 e2 3a 2d fc 4d bf 2f 53 eb 87 c3 5c 58 ef | 04 26 0a 51 13 2d 57 56 6a 69 f2 77 0e e6 3d 17 | 34 db d2 58 e6 ef 99 7a a5 d2 4f c6 f1 d6 ee ce | b8 69 1a 6d d5 e4 12 01 a4 1e 43 89 0e 61 2a 78 | 44 0b 0b bb 93 59 d9 ea 7a 2e 42 02 8d af be c7 | d3 84 14 a0 3f f3 e5 9f b7 c2 2d 2a 24 01 b0 1c | 29 00 00 24 5e 9d 7c 45 0d ec 13 66 03 bc 86 eb | df 18 53 02 81 01 d0 ca be 7b d0 08 90 a7 74 72 | 28 4f b9 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 c4 2c 70 3a 67 17 0b be 99 22 e3 | 81 fa d7 92 68 76 9e 84 00 00 00 1c 00 00 40 05 | 70 aa ac 05 74 24 54 28 15 1e a7 7e 64 95 2b b7 | 84 55 48 79 | state #638 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3440180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46abd200 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abd200 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #638 | libevent_malloc: new ptr-libevent@0x7fb35c08ab00 size 128 | #638 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.266036 | resume sending helper answer for #638 suppresed complete_v2_state_transition() and stole MD | #638 spent 0.376 milliseconds in resume sending helper answer | stop processing: state #638 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c095ac0 | processing resume sending helper answer for #640 | start processing: state #640 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 640 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #640 | **emit ISAKMP Message: | initiator cookie: | f6 a6 42 61 47 27 64 b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-200 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d8 80 42 6e d7 7a 98 1b e7 63 e1 2e 09 63 bd 4b | ikev2 g^x 42 e8 81 2f 40 d2 71 01 4a dc 7a af 17 d1 73 0a | ikev2 g^x 05 3b 3a ce b3 5d 7f 07 44 b9 ac 40 bd 6f 70 e0 | ikev2 g^x 38 56 e8 ab be 45 c9 63 98 bc 74 58 74 89 72 8a | ikev2 g^x 13 32 c2 ca 9d 72 be 69 88 7f a2 d0 28 52 16 b0 | ikev2 g^x 31 15 8e 9f e5 63 61 e6 1c 3b 95 d5 65 9e 4a fe | ikev2 g^x 1d 24 21 96 2c 5c 93 59 10 e8 5a a8 85 f0 10 e7 | ikev2 g^x 2b 45 5a 9a c7 e2 d8 dd cf ae 48 a2 5b 7d d5 31 | ikev2 g^x 5b 11 70 8a 8c fd 1e 06 e6 9d f7 60 5a ec 36 27 | ikev2 g^x de b1 f3 c3 0b 31 8f ba 37 d6 eb 27 bb 08 95 f5 | ikev2 g^x 50 60 61 71 06 90 ab 76 57 63 08 97 67 3d 78 5e | ikev2 g^x cd 6f 6c 41 fc b6 78 36 36 0e ed 0d 70 0b 31 b2 | ikev2 g^x fa dd a9 a2 95 f8 f1 ba 5b 88 71 81 da 2c 38 d3 | ikev2 g^x ad 78 62 1e ef 32 b4 3f 99 ce e3 5b 67 a3 08 06 | ikev2 g^x ca c6 2b 08 09 1b 2a 0e 74 6f e2 ad 35 3b fe 99 | ikev2 g^x 10 20 b2 e9 6c e4 a0 0e d2 0a d9 68 bf 4e 9b 89 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 55 c2 55 4a 4f 3a 0d 38 f2 68 61 3a 55 3a 39 15 | IKEv2 nonce fe 86 62 ee bc 23 58 c2 1a 6c b1 1b 30 e0 3a 34 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f6 a6 42 61 47 27 64 b2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 c8 | natd_hash: port= 01 f4 | natd_hash: hash= 51 47 0f 0c 07 b2 8c 99 66 34 29 66 06 93 b3 bc | natd_hash: hash= 11 9f 8e 62 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 51 47 0f 0c 07 b2 8c 99 66 34 29 66 06 93 b3 bc | Notify data 11 9f 8e 62 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f6 a6 42 61 47 27 64 b2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 2b 37 ed c1 9f 60 69 a1 71 7c 68 0d 9b ee 86 23 | natd_hash: hash= 55 71 c1 26 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2b 37 ed c1 9f 60 69 a1 71 7c 68 0d 9b ee 86 23 | Notify data 55 71 c1 26 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #640 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #640 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #640 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #640: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #640 to 4294967295 after switching state | Message ID: IKE #640 skipping update_recv as MD is fake | Message ID: sent #640 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-200" #640: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.200:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #640) | f6 a6 42 61 47 27 64 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 80 42 6e d7 7a 98 1b e7 63 e1 2e 09 63 bd 4b | 42 e8 81 2f 40 d2 71 01 4a dc 7a af 17 d1 73 0a | 05 3b 3a ce b3 5d 7f 07 44 b9 ac 40 bd 6f 70 e0 | 38 56 e8 ab be 45 c9 63 98 bc 74 58 74 89 72 8a | 13 32 c2 ca 9d 72 be 69 88 7f a2 d0 28 52 16 b0 | 31 15 8e 9f e5 63 61 e6 1c 3b 95 d5 65 9e 4a fe | 1d 24 21 96 2c 5c 93 59 10 e8 5a a8 85 f0 10 e7 | 2b 45 5a 9a c7 e2 d8 dd cf ae 48 a2 5b 7d d5 31 | 5b 11 70 8a 8c fd 1e 06 e6 9d f7 60 5a ec 36 27 | de b1 f3 c3 0b 31 8f ba 37 d6 eb 27 bb 08 95 f5 | 50 60 61 71 06 90 ab 76 57 63 08 97 67 3d 78 5e | cd 6f 6c 41 fc b6 78 36 36 0e ed 0d 70 0b 31 b2 | fa dd a9 a2 95 f8 f1 ba 5b 88 71 81 da 2c 38 d3 | ad 78 62 1e ef 32 b4 3f 99 ce e3 5b 67 a3 08 06 | ca c6 2b 08 09 1b 2a 0e 74 6f e2 ad 35 3b fe 99 | 10 20 b2 e9 6c e4 a0 0e d2 0a d9 68 bf 4e 9b 89 | 29 00 00 24 55 c2 55 4a 4f 3a 0d 38 f2 68 61 3a | 55 3a 39 15 fe 86 62 ee bc 23 58 c2 1a 6c b1 1b | 30 e0 3a 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 47 0f 0c 07 b2 8c 99 66 34 29 66 | 06 93 b3 bc 11 9f 8e 62 00 00 00 1c 00 00 40 05 | 2b 37 ed c1 9f 60 69 a1 71 7c 68 0d 9b ee 86 23 | 55 71 c1 26 | state #640 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38000c460 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb3800383c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800383c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #640 | libevent_malloc: new ptr-libevent@0x7fb35c095ac0 size 128 | #640 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.266483 | resume sending helper answer for #640 suppresed complete_v2_state_transition() and stole MD | #640 spent 0.417 milliseconds in resume sending helper answer | stop processing: state #640 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c0a0a80 | processing resume sending helper answer for #633 | start processing: state #633 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 633 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #633 | **emit ISAKMP Message: | initiator cookie: | 8a 84 ad af 01 bc 2c c4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-72 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c0 25 a4 2a 19 32 bd a1 aa 5d f2 a6 fc 02 2e d5 | ikev2 g^x 33 ef 4f d1 9c ba fd 65 26 89 b0 76 98 b1 0a 73 | ikev2 g^x 0b 6d cf 55 32 b0 a8 c3 0d ed 7f 57 3e c4 09 bf | ikev2 g^x 8e 3e 0d 52 2e 51 26 3d 83 ba 75 87 bf d4 84 39 | ikev2 g^x a3 f5 4f e1 81 37 40 32 c2 92 5c 7d cd 5a 01 0d | ikev2 g^x 89 3e 2b dc 37 3d ff de 20 7a cf 8d ba 1e bf 39 | ikev2 g^x 3f 0b 59 4c 6d 53 3d 85 05 4f cb 7e 6f ec 84 0e | ikev2 g^x 3b 89 0d 17 39 96 b1 02 d7 7f ec 25 df 6e 69 98 | ikev2 g^x c8 c3 02 da a9 fd 5f ba 17 59 e0 f1 d0 67 1c 1e | ikev2 g^x 0e 5d 3a 2a 95 01 f3 4d 4f 33 98 c7 f4 d2 19 43 | ikev2 g^x 9b 8e 04 5a 6e 98 a7 91 3d c3 66 01 66 da 39 f1 | ikev2 g^x eb 10 86 db 4c d5 5d e9 1d ea cb f5 8e 90 23 18 | ikev2 g^x ed f2 37 09 1a 5d 54 50 41 f5 c4 c4 ca fb 8f 9b | ikev2 g^x f6 29 c4 e8 d3 47 fd 3d 80 73 a9 55 47 1b bc 7c | ikev2 g^x 8f b9 ec 7f e6 92 93 61 f4 fb 2e 1c e7 a7 98 52 | ikev2 g^x 7b b4 1d c6 f1 3d a2 94 00 52 e4 8a 62 1f 4c b8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 89 c4 76 da 63 15 ff 10 2a 9e ce 01 ec ae 76 ed | IKEv2 nonce 0e 33 67 47 23 3b 30 6c 5b 8b fd b9 a5 68 00 52 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8a 84 ad af 01 bc 2c c4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 48 | natd_hash: port= 01 f4 | natd_hash: hash= 21 70 6c 0c d5 a6 51 1a 4a 89 fd d4 db 2f 8d 82 | natd_hash: hash= 0e c5 0a 69 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 21 70 6c 0c d5 a6 51 1a 4a 89 fd d4 db 2f 8d 82 | Notify data 0e c5 0a 69 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8a 84 ad af 01 bc 2c c4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c8 f8 ac 25 9c d4 cc 0a 20 2d 68 79 d5 c6 b3 9a | natd_hash: hash= 28 b4 88 17 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c8 f8 ac 25 9c d4 cc 0a 20 2d 68 79 d5 c6 b3 9a | Notify data 28 b4 88 17 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #633 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #633 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #633 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #633: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #633 to 4294967295 after switching state | Message ID: IKE #633 skipping update_recv as MD is fake | Message ID: sent #633 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-72" #633: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.72:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #633) | 8a 84 ad af 01 bc 2c c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 25 a4 2a 19 32 bd a1 aa 5d f2 a6 fc 02 2e d5 | 33 ef 4f d1 9c ba fd 65 26 89 b0 76 98 b1 0a 73 | 0b 6d cf 55 32 b0 a8 c3 0d ed 7f 57 3e c4 09 bf | 8e 3e 0d 52 2e 51 26 3d 83 ba 75 87 bf d4 84 39 | a3 f5 4f e1 81 37 40 32 c2 92 5c 7d cd 5a 01 0d | 89 3e 2b dc 37 3d ff de 20 7a cf 8d ba 1e bf 39 | 3f 0b 59 4c 6d 53 3d 85 05 4f cb 7e 6f ec 84 0e | 3b 89 0d 17 39 96 b1 02 d7 7f ec 25 df 6e 69 98 | c8 c3 02 da a9 fd 5f ba 17 59 e0 f1 d0 67 1c 1e | 0e 5d 3a 2a 95 01 f3 4d 4f 33 98 c7 f4 d2 19 43 | 9b 8e 04 5a 6e 98 a7 91 3d c3 66 01 66 da 39 f1 | eb 10 86 db 4c d5 5d e9 1d ea cb f5 8e 90 23 18 | ed f2 37 09 1a 5d 54 50 41 f5 c4 c4 ca fb 8f 9b | f6 29 c4 e8 d3 47 fd 3d 80 73 a9 55 47 1b bc 7c | 8f b9 ec 7f e6 92 93 61 f4 fb 2e 1c e7 a7 98 52 | 7b b4 1d c6 f1 3d a2 94 00 52 e4 8a 62 1f 4c b8 | 29 00 00 24 89 c4 76 da 63 15 ff 10 2a 9e ce 01 | ec ae 76 ed 0e 33 67 47 23 3b 30 6c 5b 8b fd b9 | a5 68 00 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 70 6c 0c d5 a6 51 1a 4a 89 fd d4 | db 2f 8d 82 0e c5 0a 69 00 00 00 1c 00 00 40 05 | c8 f8 ac 25 9c d4 cc 0a 20 2d 68 79 d5 c6 b3 9a | 28 b4 88 17 | state #633 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb358039e30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb358012630 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358012630 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #633 | libevent_malloc: new ptr-libevent@0x7fb35c0a0a80 size 128 | #633 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.266957 | resume sending helper answer for #633 suppresed complete_v2_state_transition() and stole MD | #633 spent 0.449 milliseconds in resume sending helper answer | stop processing: state #633 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c07a360 | processing resume sending helper answer for #639 | start processing: state #639 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 639 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #639 | **emit ISAKMP Message: | initiator cookie: | ff 19 a0 3d 97 93 39 95 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-214 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 19 0c 9d e5 77 b8 48 36 e4 03 9e c4 1d f2 2d 78 | ikev2 g^x 44 4c 26 98 f8 6b ee 0b af 31 99 e7 1c 61 bb d4 | ikev2 g^x d7 1b 9a 20 07 ba 04 17 60 e8 fd 18 10 87 29 2c | ikev2 g^x 24 f7 67 ce 57 34 ab 29 f5 cc ea d7 c2 95 67 49 | ikev2 g^x 24 4d 53 fb 24 ca da 47 20 a9 a9 bc c8 65 7a 7b | ikev2 g^x 44 61 86 68 8a ae f2 ac f8 44 ae 53 96 4e 13 15 | ikev2 g^x f8 a1 33 b4 cf f2 c1 fa c8 17 74 56 43 9e ef ec | ikev2 g^x f3 87 44 4e 55 d5 0d a6 d3 56 28 83 eb d0 c0 d4 | ikev2 g^x 3a 2e fd c3 dd 99 de 47 36 b1 e7 13 b8 7e f2 cd | ikev2 g^x a7 06 b3 ea 1c 8a 6d d9 b0 1f 66 79 19 09 77 e8 | ikev2 g^x 7d 50 d8 1c b7 8e b4 d3 82 80 b4 5c 9f c3 d3 38 | ikev2 g^x 28 2d fd c5 5f 8b c4 22 9d f7 e9 ac 69 9d a2 7b | ikev2 g^x 6e b5 3a ed 4f 1a 08 7f f6 b1 69 48 bc 68 e4 78 | ikev2 g^x 10 5b 4b 02 21 b2 70 8c 4e 7e b7 69 85 f2 7c eb | ikev2 g^x aa 75 d3 5c 7d a4 3d 7f 18 fd d4 8b 50 8e 47 6d | ikev2 g^x 12 6e b8 f7 e4 81 64 1a 6f f3 91 ac e6 c8 bf 94 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0a 0d 9f 0a 63 a4 e0 f2 1d d8 95 0c ba e4 b7 d7 | IKEv2 nonce a4 51 17 93 28 8e f1 0a c8 8c 2b 76 37 dd 06 20 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ff 19 a0 3d 97 93 39 95 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 d6 | natd_hash: port= 01 f4 | natd_hash: hash= 7e 9a d0 b6 2b 5a c4 fc 72 66 76 9a 94 bf 3e ef | natd_hash: hash= ac e5 25 66 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7e 9a d0 b6 2b 5a c4 fc 72 66 76 9a 94 bf 3e ef | Notify data ac e5 25 66 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ff 19 a0 3d 97 93 39 95 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= b8 15 7d 61 0d 1b 19 22 14 f1 b2 86 2c 56 e5 70 | natd_hash: hash= 99 3e 7d f1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b8 15 7d 61 0d 1b 19 22 14 f1 b2 86 2c 56 e5 70 | Notify data 99 3e 7d f1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #639 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #639 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #639 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #639: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #639 to 4294967295 after switching state | Message ID: IKE #639 skipping update_recv as MD is fake | Message ID: sent #639 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-214" #639: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.214:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #639) | ff 19 a0 3d 97 93 39 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 19 0c 9d e5 77 b8 48 36 e4 03 9e c4 1d f2 2d 78 | 44 4c 26 98 f8 6b ee 0b af 31 99 e7 1c 61 bb d4 | d7 1b 9a 20 07 ba 04 17 60 e8 fd 18 10 87 29 2c | 24 f7 67 ce 57 34 ab 29 f5 cc ea d7 c2 95 67 49 | 24 4d 53 fb 24 ca da 47 20 a9 a9 bc c8 65 7a 7b | 44 61 86 68 8a ae f2 ac f8 44 ae 53 96 4e 13 15 | f8 a1 33 b4 cf f2 c1 fa c8 17 74 56 43 9e ef ec | f3 87 44 4e 55 d5 0d a6 d3 56 28 83 eb d0 c0 d4 | 3a 2e fd c3 dd 99 de 47 36 b1 e7 13 b8 7e f2 cd | a7 06 b3 ea 1c 8a 6d d9 b0 1f 66 79 19 09 77 e8 | 7d 50 d8 1c b7 8e b4 d3 82 80 b4 5c 9f c3 d3 38 | 28 2d fd c5 5f 8b c4 22 9d f7 e9 ac 69 9d a2 7b | 6e b5 3a ed 4f 1a 08 7f f6 b1 69 48 bc 68 e4 78 | 10 5b 4b 02 21 b2 70 8c 4e 7e b7 69 85 f2 7c eb | aa 75 d3 5c 7d a4 3d 7f 18 fd d4 8b 50 8e 47 6d | 12 6e b8 f7 e4 81 64 1a 6f f3 91 ac e6 c8 bf 94 | 29 00 00 24 0a 0d 9f 0a 63 a4 e0 f2 1d d8 95 0c | ba e4 b7 d7 a4 51 17 93 28 8e f1 0a c8 8c 2b 76 | 37 dd 06 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 9a d0 b6 2b 5a c4 fc 72 66 76 9a | 94 bf 3e ef ac e5 25 66 00 00 00 1c 00 00 40 05 | b8 15 7d 61 0d 1b 19 22 14 f1 b2 86 2c 56 e5 70 | 99 3e 7d f1 | state #639 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3580300e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a90400 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90400 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #639 | libevent_malloc: new ptr-libevent@0x7fb35c07a360 size 128 | #639 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.267449 | resume sending helper answer for #639 suppresed complete_v2_state_transition() and stole MD | #639 spent 0.465 milliseconds in resume sending helper answer | stop processing: state #639 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c09b2a0 | processing resume sending helper answer for #637 | start processing: state #637 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 637 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #637 | **emit ISAKMP Message: | initiator cookie: | b6 9c 40 58 3d 0c 12 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-137 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5c 62 01 a3 0e 36 d8 5c 24 b9 7d 93 50 74 52 09 | ikev2 g^x bf 73 ee 31 ce 48 4d c3 8c 6c 36 26 89 6d a2 98 | ikev2 g^x f6 a5 6f 3e af a0 f7 15 c5 cf 68 f4 0f 09 28 32 | ikev2 g^x 0f 5d 04 46 85 53 2e d9 db 2b a2 c2 d9 bf e4 c3 | ikev2 g^x 50 e3 bc 2c 35 2c e0 d8 71 5e ca 0f 65 92 6f 5f | ikev2 g^x d6 4c 31 d5 82 00 7d 21 65 65 2e f9 16 0f 60 4a | ikev2 g^x 66 fa 76 ba 56 18 68 1b b7 8d e5 ca ec fc bd ec | ikev2 g^x 0a e5 6a b2 41 42 5c a8 2b 3f 1c 15 fb b5 ec c8 | ikev2 g^x f5 63 de 1c 0d a4 25 56 3a 26 7c fa 02 42 4d b8 | ikev2 g^x 43 57 db 48 7f 12 2c 70 ca ba 72 7c fe 19 b1 54 | ikev2 g^x 6b 79 43 ef 00 c1 62 d3 5e ab b6 22 36 80 35 4b | ikev2 g^x e7 1d 17 2b 6d 8a de bd 50 b8 31 a5 18 f8 e0 24 | ikev2 g^x 82 85 b3 30 83 33 ec 95 4e ee a1 d7 bf ce 99 9b | ikev2 g^x c1 6d 33 8b 97 b6 2c 02 a3 d9 39 e4 c5 54 2f 6f | ikev2 g^x 47 4b a7 bf 34 12 36 ee 4b b2 e8 c4 39 ce c1 32 | ikev2 g^x 67 23 86 ac 3a c8 0f 88 60 19 2a 2c 68 03 df 9c | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 37 6b dd e4 0f e2 02 60 45 48 4f 1a ac d9 95 dc | IKEv2 nonce 00 d0 72 b3 54 00 91 51 8b 27 ba 45 47 72 d2 f1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b6 9c 40 58 3d 0c 12 38 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 89 | natd_hash: port= 01 f4 | natd_hash: hash= 15 cf fd fc b2 a7 19 97 63 6c a1 8c 7a b3 9e 5b | natd_hash: hash= 69 33 a4 bb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 15 cf fd fc b2 a7 19 97 63 6c a1 8c 7a b3 9e 5b | Notify data 69 33 a4 bb | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b6 9c 40 58 3d 0c 12 38 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= f0 08 d3 f7 e9 21 31 a2 9d a6 8a 6a ad 66 64 4b | natd_hash: hash= fa 92 42 76 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f0 08 d3 f7 e9 21 31 a2 9d a6 8a 6a ad 66 64 4b | Notify data fa 92 42 76 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #637 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #637 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #637 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #637: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #637 to 4294967295 after switching state | Message ID: IKE #637 skipping update_recv as MD is fake | Message ID: sent #637 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-137" #637: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.137:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #637) | b6 9c 40 58 3d 0c 12 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 62 01 a3 0e 36 d8 5c 24 b9 7d 93 50 74 52 09 | bf 73 ee 31 ce 48 4d c3 8c 6c 36 26 89 6d a2 98 | f6 a5 6f 3e af a0 f7 15 c5 cf 68 f4 0f 09 28 32 | 0f 5d 04 46 85 53 2e d9 db 2b a2 c2 d9 bf e4 c3 | 50 e3 bc 2c 35 2c e0 d8 71 5e ca 0f 65 92 6f 5f | d6 4c 31 d5 82 00 7d 21 65 65 2e f9 16 0f 60 4a | 66 fa 76 ba 56 18 68 1b b7 8d e5 ca ec fc bd ec | 0a e5 6a b2 41 42 5c a8 2b 3f 1c 15 fb b5 ec c8 | f5 63 de 1c 0d a4 25 56 3a 26 7c fa 02 42 4d b8 | 43 57 db 48 7f 12 2c 70 ca ba 72 7c fe 19 b1 54 | 6b 79 43 ef 00 c1 62 d3 5e ab b6 22 36 80 35 4b | e7 1d 17 2b 6d 8a de bd 50 b8 31 a5 18 f8 e0 24 | 82 85 b3 30 83 33 ec 95 4e ee a1 d7 bf ce 99 9b | c1 6d 33 8b 97 b6 2c 02 a3 d9 39 e4 c5 54 2f 6f | 47 4b a7 bf 34 12 36 ee 4b b2 e8 c4 39 ce c1 32 | 67 23 86 ac 3a c8 0f 88 60 19 2a 2c 68 03 df 9c | 29 00 00 24 37 6b dd e4 0f e2 02 60 45 48 4f 1a | ac d9 95 dc 00 d0 72 b3 54 00 91 51 8b 27 ba 45 | 47 72 d2 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 cf fd fc b2 a7 19 97 63 6c a1 8c | 7a b3 9e 5b 69 33 a4 bb 00 00 00 1c 00 00 40 05 | f0 08 d3 f7 e9 21 31 a2 9d a6 8a 6a ad 66 64 4b | fa 92 42 76 | state #637 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3540300e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46afe580 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #637 | libevent_malloc: new ptr-libevent@0x7fb35c09b2a0 size 128 | #637 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.267912 | resume sending helper answer for #637 suppresed complete_v2_state_transition() and stole MD | #637 spent 0.437 milliseconds in resume sending helper answer | stop processing: state #637 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c0902e0 | processing resume sending helper answer for #584 | start processing: state #584 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 584 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #584 | **emit ISAKMP Message: | initiator cookie: | 51 4c b1 7c 25 ce f5 b6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-108 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 37 ef 1f 70 eb 76 7d bc c3 86 b2 99 57 eb 3f 54 | ikev2 g^x c8 7d d3 aa 36 79 bf 95 d1 7e f5 bb 68 ed 90 a1 | ikev2 g^x b9 2c 9e 6e a8 b6 35 e4 01 68 b8 41 06 98 3e 9c | ikev2 g^x d6 35 04 2b bb 27 bd c4 b6 ed 89 cf f7 c6 f3 c2 | ikev2 g^x 46 86 3a 37 38 db cf 96 97 e5 a4 50 07 54 e9 4b | ikev2 g^x 37 df 7c f4 a0 4c d9 7b e1 63 0f 4a 78 e1 d1 d8 | ikev2 g^x f7 06 cc bf de 67 6f 51 a9 2a 50 9b be 39 51 fc | ikev2 g^x 92 f3 11 84 91 d8 2b 24 5f 7d 2e 3c 48 87 2c d7 | ikev2 g^x 4c 9f 31 94 b4 2c e3 04 55 03 e2 7e d5 0a a3 2a | ikev2 g^x 38 e1 ee e0 a2 7f 56 ba 3e dc 86 f1 a3 6d f0 4d | ikev2 g^x 52 ba bb 1e 97 ae 75 5d 2c 82 b4 e6 d4 79 e0 32 | ikev2 g^x 52 cc 28 d9 ea 8b 53 a2 dc 14 d3 22 02 06 5a 89 | ikev2 g^x 92 c4 13 41 83 c4 64 e9 4c ab fb fe 2b d8 3b e7 | ikev2 g^x 19 97 67 99 c8 cc 38 fe fd dd 6a ac 4b 3e a4 60 | ikev2 g^x cb ea 73 88 45 a4 60 2f a9 da 99 e9 bc 21 52 56 | ikev2 g^x 9e 0a 57 2a a8 8f 00 83 ca de 2c ec 2e 21 e3 03 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a2 77 dc 4f a0 fc 59 33 be 45 2b 9d d6 90 d3 11 | IKEv2 nonce 73 91 28 fa 52 9a 31 01 01 35 6b b2 c2 9a 45 77 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 51 4c b1 7c 25 ce f5 b6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6c | natd_hash: port= 01 f4 | natd_hash: hash= ac ee 1f 66 e6 d8 10 e7 e1 61 3e ce 6a b8 0c f1 | natd_hash: hash= 92 f2 95 18 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ac ee 1f 66 e6 d8 10 e7 e1 61 3e ce 6a b8 0c f1 | Notify data 92 f2 95 18 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 51 4c b1 7c 25 ce f5 b6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4c ae 03 75 52 09 7f 6a 63 67 68 3c 65 3b 7c 67 | natd_hash: hash= 85 33 51 c7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4c ae 03 75 52 09 7f 6a 63 67 68 3c 65 3b 7c 67 | Notify data 85 33 51 c7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #584 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #584 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #584 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #584: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #584 to 4294967295 after switching state | Message ID: IKE #584 skipping update_recv as MD is fake | Message ID: sent #584 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-108" #584: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.108:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #584) | 51 4c b1 7c 25 ce f5 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 ef 1f 70 eb 76 7d bc c3 86 b2 99 57 eb 3f 54 | c8 7d d3 aa 36 79 bf 95 d1 7e f5 bb 68 ed 90 a1 | b9 2c 9e 6e a8 b6 35 e4 01 68 b8 41 06 98 3e 9c | d6 35 04 2b bb 27 bd c4 b6 ed 89 cf f7 c6 f3 c2 | 46 86 3a 37 38 db cf 96 97 e5 a4 50 07 54 e9 4b | 37 df 7c f4 a0 4c d9 7b e1 63 0f 4a 78 e1 d1 d8 | f7 06 cc bf de 67 6f 51 a9 2a 50 9b be 39 51 fc | 92 f3 11 84 91 d8 2b 24 5f 7d 2e 3c 48 87 2c d7 | 4c 9f 31 94 b4 2c e3 04 55 03 e2 7e d5 0a a3 2a | 38 e1 ee e0 a2 7f 56 ba 3e dc 86 f1 a3 6d f0 4d | 52 ba bb 1e 97 ae 75 5d 2c 82 b4 e6 d4 79 e0 32 | 52 cc 28 d9 ea 8b 53 a2 dc 14 d3 22 02 06 5a 89 | 92 c4 13 41 83 c4 64 e9 4c ab fb fe 2b d8 3b e7 | 19 97 67 99 c8 cc 38 fe fd dd 6a ac 4b 3e a4 60 | cb ea 73 88 45 a4 60 2f a9 da 99 e9 bc 21 52 56 | 9e 0a 57 2a a8 8f 00 83 ca de 2c ec 2e 21 e3 03 | 29 00 00 24 a2 77 dc 4f a0 fc 59 33 be 45 2b 9d | d6 90 d3 11 73 91 28 fa 52 9a 31 01 01 35 6b b2 | c2 9a 45 77 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac ee 1f 66 e6 d8 10 e7 e1 61 3e ce | 6a b8 0c f1 92 f2 95 18 00 00 00 1c 00 00 40 05 | 4c ae 03 75 52 09 7f 6a 63 67 68 3c 65 3b 7c 67 | 85 33 51 c7 | state #584 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c0300e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad5900 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad5900 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #584 | libevent_malloc: new ptr-libevent@0x7fb35c0902e0 size 128 | #584 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.268379 | resume sending helper answer for #584 suppresed complete_v2_state_transition() and stole MD | #584 spent 0.439 milliseconds in resume sending helper answer | stop processing: state #584 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c05f200 | processing resume sending helper answer for #608 | start processing: state #608 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 608 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #608 | **emit ISAKMP Message: | initiator cookie: | 0c 40 8a ba c0 95 22 c9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-60 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d0 ac 32 20 e6 f2 f3 72 0a ac 9e a1 c0 7e d1 9c | ikev2 g^x ba 7d 04 0a 67 49 79 19 1b b3 e4 99 5c 8a 7f 51 | ikev2 g^x 2f 8a 06 ea 31 95 52 fd e6 c3 f7 54 3b b3 9d 31 | ikev2 g^x 27 18 b7 a2 0b 76 60 35 d5 3e 6c b2 60 48 f8 98 | ikev2 g^x bb 1c 43 2e ba 94 47 ae 1e 5d 46 a4 a9 be fc b5 | ikev2 g^x 9f 5c 2e 2b 32 a1 9d 84 73 52 7b 19 0f 87 44 ee | ikev2 g^x 2c c7 e0 19 73 47 89 45 a9 59 4b d7 0d 9f 39 05 | ikev2 g^x f3 7b a7 83 81 66 77 f6 57 d5 e3 c0 d5 84 80 f9 | ikev2 g^x ee be 18 01 e0 bf f6 46 34 fe af a5 cd 63 66 6b | ikev2 g^x de d7 56 46 3a 36 e4 5e 22 bf 64 7d 8c e2 2d 47 | ikev2 g^x 9e 04 cc 8d 7f d9 cb 06 83 4a e3 29 55 cd 8d 42 | ikev2 g^x e9 49 18 56 c5 a1 65 6c ca 69 c5 84 07 6d b0 58 | ikev2 g^x 2f 95 59 6a b7 c6 f7 02 21 d7 08 bc 5d 1a b0 ee | ikev2 g^x 67 fb 57 c8 f3 65 46 50 18 bb ad 85 2c fd a4 7a | ikev2 g^x 1f 49 86 f5 1e 9f f2 f1 74 80 e2 0f c0 52 94 90 | ikev2 g^x 6d 49 de 10 9d c0 e3 1a d8 90 bc 82 30 91 d0 23 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 18 87 a4 c8 cf 5c 93 83 68 9d 68 8a 28 36 66 32 | IKEv2 nonce 92 60 4e 85 d6 0c 91 d5 ef 20 18 75 65 13 ec f8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0c 40 8a ba c0 95 22 c9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3c | natd_hash: port= 01 f4 | natd_hash: hash= 3e bf 02 dd 26 3f 8a eb 4d 3f 2a d7 62 d7 7d e3 | natd_hash: hash= 99 e0 e7 0a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3e bf 02 dd 26 3f 8a eb 4d 3f 2a d7 62 d7 7d e3 | Notify data 99 e0 e7 0a | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0c 40 8a ba c0 95 22 c9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1c 98 9d 66 2f 94 1b 4c 60 05 a1 e4 50 37 22 f7 | natd_hash: hash= bd 66 62 87 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1c 98 9d 66 2f 94 1b 4c 60 05 a1 e4 50 37 22 f7 | Notify data bd 66 62 87 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #608 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #608 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #608 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #608: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #608 to 4294967295 after switching state | Message ID: IKE #608 skipping update_recv as MD is fake | Message ID: sent #608 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-60" #608: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.60:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #608) | 0c 40 8a ba c0 95 22 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 ac 32 20 e6 f2 f3 72 0a ac 9e a1 c0 7e d1 9c | ba 7d 04 0a 67 49 79 19 1b b3 e4 99 5c 8a 7f 51 | 2f 8a 06 ea 31 95 52 fd e6 c3 f7 54 3b b3 9d 31 | 27 18 b7 a2 0b 76 60 35 d5 3e 6c b2 60 48 f8 98 | bb 1c 43 2e ba 94 47 ae 1e 5d 46 a4 a9 be fc b5 | 9f 5c 2e 2b 32 a1 9d 84 73 52 7b 19 0f 87 44 ee | 2c c7 e0 19 73 47 89 45 a9 59 4b d7 0d 9f 39 05 | f3 7b a7 83 81 66 77 f6 57 d5 e3 c0 d5 84 80 f9 | ee be 18 01 e0 bf f6 46 34 fe af a5 cd 63 66 6b | de d7 56 46 3a 36 e4 5e 22 bf 64 7d 8c e2 2d 47 | 9e 04 cc 8d 7f d9 cb 06 83 4a e3 29 55 cd 8d 42 | e9 49 18 56 c5 a1 65 6c ca 69 c5 84 07 6d b0 58 | 2f 95 59 6a b7 c6 f7 02 21 d7 08 bc 5d 1a b0 ee | 67 fb 57 c8 f3 65 46 50 18 bb ad 85 2c fd a4 7a | 1f 49 86 f5 1e 9f f2 f1 74 80 e2 0f c0 52 94 90 | 6d 49 de 10 9d c0 e3 1a d8 90 bc 82 30 91 d0 23 | 29 00 00 24 18 87 a4 c8 cf 5c 93 83 68 9d 68 8a | 28 36 66 32 92 60 4e 85 d6 0c 91 d5 ef 20 18 75 | 65 13 ec f8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e bf 02 dd 26 3f 8a eb 4d 3f 2a d7 | 62 d7 7d e3 99 e0 e7 0a 00 00 00 1c 00 00 40 05 | 1c 98 9d 66 2f 94 1b 4c 60 05 a1 e4 50 37 22 f7 | bd 66 62 87 | state #608 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3400343b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34001fa80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34001fa80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #608 | libevent_malloc: new ptr-libevent@0x7fb36c05f200 size 128 | #608 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.268838 | resume sending helper answer for #608 suppresed complete_v2_state_transition() and stole MD | #608 spent 0.436 milliseconds in resume sending helper answer | stop processing: state #608 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c069e60 | processing resume sending helper answer for #607 | start processing: state #607 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 607 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #607 | **emit ISAKMP Message: | initiator cookie: | 1d 41 1f c6 ff 0f 27 1d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-35 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9d 29 5d d3 25 1e d3 3b 53 2c 02 04 94 df f0 9e | ikev2 g^x c0 c9 bd c2 0e c6 5b 3e b3 b5 28 a4 b4 de a0 bc | ikev2 g^x 44 35 8d ca 70 6e 31 a6 5c c7 6e 92 aa 89 1d 29 | ikev2 g^x f4 20 9b e4 de 42 28 b3 c8 f4 2f 6a 42 5a 19 f0 | ikev2 g^x 51 f8 ac 34 ce 28 a7 d4 af 5a ec ac 56 96 17 ee | ikev2 g^x 7c 53 68 62 c6 e5 b3 17 31 98 5f 6b 69 9c 2a 00 | ikev2 g^x d4 a4 6e ae ef 2a ab ba 56 64 86 65 05 0f d7 44 | ikev2 g^x f7 e3 bf 1e a4 ed a7 7d fe 8a 1d fb 8d d7 f1 cf | ikev2 g^x e1 7d 41 0d a7 4f 0c f0 68 6a 81 5f b1 24 1b dc | ikev2 g^x 3f da c7 a0 34 fe bc 93 f1 d2 24 a2 86 ef 73 2a | ikev2 g^x e2 6f bf c6 0f a9 6a 2f f3 1d 17 2f 3f d3 72 6e | ikev2 g^x b7 b5 92 74 5f d7 2a 9e 99 d9 04 38 46 4a df 24 | ikev2 g^x 0d bb 8c 68 24 f0 01 b1 77 d7 d1 59 41 dc 96 1a | ikev2 g^x 97 ab d6 d6 b7 b7 b1 29 13 72 38 ec 4d 09 e0 92 | ikev2 g^x 84 95 9d 0a 22 aa 6b 94 be df 8c 5f 62 af f3 3a | ikev2 g^x fb a4 36 0a 7d 82 c0 0a 05 87 7c b0 d2 48 69 07 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0c 6e 31 a9 aa 11 87 13 04 94 3b 5e 65 1f 88 8c | IKEv2 nonce ea 44 4e 42 5d 13 db 22 a9 85 17 06 20 31 3c 2a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1d 41 1f c6 ff 0f 27 1d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 23 | natd_hash: port= 01 f4 | natd_hash: hash= 39 f9 d0 a1 05 b1 12 13 d2 38 28 3a 7b e1 92 d5 | natd_hash: hash= 4d 8b fe 08 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 39 f9 d0 a1 05 b1 12 13 d2 38 28 3a 7b e1 92 d5 | Notify data 4d 8b fe 08 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 1d 41 1f c6 ff 0f 27 1d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 52 35 89 2b 6d df 6f e4 b5 73 99 d5 81 ab e6 da | natd_hash: hash= 1a 9a 77 69 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 52 35 89 2b 6d df 6f e4 b5 73 99 d5 81 ab e6 da | Notify data 1a 9a 77 69 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #607 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #607 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #607 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #607: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #607 to 4294967295 after switching state | Message ID: IKE #607 skipping update_recv as MD is fake | Message ID: sent #607 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-35" #607: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.35:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #607) | 1d 41 1f c6 ff 0f 27 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9d 29 5d d3 25 1e d3 3b 53 2c 02 04 94 df f0 9e | c0 c9 bd c2 0e c6 5b 3e b3 b5 28 a4 b4 de a0 bc | 44 35 8d ca 70 6e 31 a6 5c c7 6e 92 aa 89 1d 29 | f4 20 9b e4 de 42 28 b3 c8 f4 2f 6a 42 5a 19 f0 | 51 f8 ac 34 ce 28 a7 d4 af 5a ec ac 56 96 17 ee | 7c 53 68 62 c6 e5 b3 17 31 98 5f 6b 69 9c 2a 00 | d4 a4 6e ae ef 2a ab ba 56 64 86 65 05 0f d7 44 | f7 e3 bf 1e a4 ed a7 7d fe 8a 1d fb 8d d7 f1 cf | e1 7d 41 0d a7 4f 0c f0 68 6a 81 5f b1 24 1b dc | 3f da c7 a0 34 fe bc 93 f1 d2 24 a2 86 ef 73 2a | e2 6f bf c6 0f a9 6a 2f f3 1d 17 2f 3f d3 72 6e | b7 b5 92 74 5f d7 2a 9e 99 d9 04 38 46 4a df 24 | 0d bb 8c 68 24 f0 01 b1 77 d7 d1 59 41 dc 96 1a | 97 ab d6 d6 b7 b7 b1 29 13 72 38 ec 4d 09 e0 92 | 84 95 9d 0a 22 aa 6b 94 be df 8c 5f 62 af f3 3a | fb a4 36 0a 7d 82 c0 0a 05 87 7c b0 d2 48 69 07 | 29 00 00 24 0c 6e 31 a9 aa 11 87 13 04 94 3b 5e | 65 1f 88 8c ea 44 4e 42 5d 13 db 22 a9 85 17 06 | 20 31 3c 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f9 d0 a1 05 b1 12 13 d2 38 28 3a | 7b e1 92 d5 4d 8b fe 08 00 00 00 1c 00 00 40 05 | 52 35 89 2b 6d df 6f e4 b5 73 99 d5 81 ab e6 da | 1a 9a 77 69 | state #607 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c00cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c040840 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c040840 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #607 | libevent_malloc: new ptr-libevent@0x7fb37c069e60 size 128 | #607 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.269302 | resume sending helper answer for #607 suppresed complete_v2_state_transition() and stole MD | #607 spent 0.439 milliseconds in resume sending helper answer | stop processing: state #607 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c069bc0 | processing resume sending helper answer for #573 | start processing: state #573 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 573 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #573 | **emit ISAKMP Message: | initiator cookie: | ad 3e 6c 78 39 d7 59 85 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-83 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f2 bf 7c c9 f8 3c 5a 65 38 6f b3 01 ce 5b f5 30 | ikev2 g^x a7 ca bf a7 0a 2f 6d 46 e4 95 8f a9 a2 c3 62 81 | ikev2 g^x 94 18 87 7c 67 ac a9 c8 f7 1a 98 84 db 40 bb af | ikev2 g^x 3f 2f 53 16 16 52 73 41 99 39 2a cb ce f0 16 f6 | ikev2 g^x 59 5f 0a b0 20 7c 3d e9 5a a2 88 c5 c1 bb e2 4d | ikev2 g^x 7f ce 41 78 9a 73 4c 9c 78 3b d4 42 d4 ea b6 26 | ikev2 g^x c7 66 8b db 44 b6 63 44 77 ad 6a 85 b2 f6 09 24 | ikev2 g^x d3 1d 9e d9 14 90 b9 f3 03 6a b8 35 9d 2f 7e 69 | ikev2 g^x 38 a8 b1 78 a7 b9 d5 b5 6e 03 4e df f1 29 29 d6 | ikev2 g^x 73 fb 44 0b 0c b8 b6 ff 70 60 7e 98 07 b6 c6 7f | ikev2 g^x c1 02 f7 52 15 2f 51 21 2d 87 70 fa c3 6d a5 50 | ikev2 g^x 6d c2 b7 77 96 5a 3f ba 71 2f 23 99 27 34 36 64 | ikev2 g^x 93 e7 80 7e 69 88 92 68 e6 5b cb fb d5 c9 2a 24 | ikev2 g^x c5 78 ae b1 67 8c 39 a4 a1 f5 8f 57 47 ac be 22 | ikev2 g^x 0c ba 38 7d fd 68 4d 5c f9 30 0d 91 30 9d 25 fc | ikev2 g^x c6 0f 2d 2c 17 7f 55 f6 65 7c 10 de 1f 7f 50 fb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 50 ef b4 44 89 5d 96 3d 4c 55 e3 f3 30 1e a6 1e | IKEv2 nonce 68 57 c5 9e 6a b1 8f fc 63 11 d1 e1 c2 23 29 d3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ad 3e 6c 78 39 d7 59 85 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 53 | natd_hash: port= 01 f4 | natd_hash: hash= eb 0a ea 0a 2d 9d 52 e1 84 99 c3 78 56 e2 02 95 | natd_hash: hash= 3c a9 b9 67 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data eb 0a ea 0a 2d 9d 52 e1 84 99 c3 78 56 e2 02 95 | Notify data 3c a9 b9 67 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ad 3e 6c 78 39 d7 59 85 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 07 da 52 ba 89 af c4 46 3c 5a 2a 18 50 3f 02 03 | natd_hash: hash= d1 88 0a 69 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 07 da 52 ba 89 af c4 46 3c 5a 2a 18 50 3f 02 03 | Notify data d1 88 0a 69 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #573 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #573 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #573 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #573: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #573 to 4294967295 after switching state | Message ID: IKE #573 skipping update_recv as MD is fake | Message ID: sent #573 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-83" #573: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.83:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #573) | ad 3e 6c 78 39 d7 59 85 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 bf 7c c9 f8 3c 5a 65 38 6f b3 01 ce 5b f5 30 | a7 ca bf a7 0a 2f 6d 46 e4 95 8f a9 a2 c3 62 81 | 94 18 87 7c 67 ac a9 c8 f7 1a 98 84 db 40 bb af | 3f 2f 53 16 16 52 73 41 99 39 2a cb ce f0 16 f6 | 59 5f 0a b0 20 7c 3d e9 5a a2 88 c5 c1 bb e2 4d | 7f ce 41 78 9a 73 4c 9c 78 3b d4 42 d4 ea b6 26 | c7 66 8b db 44 b6 63 44 77 ad 6a 85 b2 f6 09 24 | d3 1d 9e d9 14 90 b9 f3 03 6a b8 35 9d 2f 7e 69 | 38 a8 b1 78 a7 b9 d5 b5 6e 03 4e df f1 29 29 d6 | 73 fb 44 0b 0c b8 b6 ff 70 60 7e 98 07 b6 c6 7f | c1 02 f7 52 15 2f 51 21 2d 87 70 fa c3 6d a5 50 | 6d c2 b7 77 96 5a 3f ba 71 2f 23 99 27 34 36 64 | 93 e7 80 7e 69 88 92 68 e6 5b cb fb d5 c9 2a 24 | c5 78 ae b1 67 8c 39 a4 a1 f5 8f 57 47 ac be 22 | 0c ba 38 7d fd 68 4d 5c f9 30 0d 91 30 9d 25 fc | c6 0f 2d 2c 17 7f 55 f6 65 7c 10 de 1f 7f 50 fb | 29 00 00 24 50 ef b4 44 89 5d 96 3d 4c 55 e3 f3 | 30 1e a6 1e 68 57 c5 9e 6a b1 8f fc 63 11 d1 e1 | c2 23 29 d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 0a ea 0a 2d 9d 52 e1 84 99 c3 78 | 56 e2 02 95 3c a9 b9 67 00 00 00 1c 00 00 40 05 | 07 da 52 ba 89 af c4 46 3c 5a 2a 18 50 3f 02 03 | d1 88 0a 69 | state #573 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37003f490 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb3700407b0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3700407b0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #573 | libevent_malloc: new ptr-libevent@0x7fb35c069bc0 size 128 | #573 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.269762 | resume sending helper answer for #573 suppresed complete_v2_state_transition() and stole MD | #573 spent 0.435 milliseconds in resume sending helper answer | stop processing: state #573 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb368040760 | processing resume sending helper answer for #616 | start processing: state #616 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 616 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #616 | **emit ISAKMP Message: | initiator cookie: | 51 51 c2 14 b4 88 86 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-42 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5c 6f 7d 95 94 eb 35 d4 79 fb b8 ed ce b6 0e 8c | ikev2 g^x 0b ac 78 e7 dc 5d 85 9e fc ca bc 30 a0 af fc a7 | ikev2 g^x 83 d0 df 38 f5 b9 0e 7c 6c 0f 7c 9b e7 18 2b b0 | ikev2 g^x b1 47 6e d5 e1 d8 67 a0 a7 53 55 b4 30 4b 4f 05 | ikev2 g^x e0 9f 68 a5 8b 3d 3d f0 54 7c c1 cf 5b d8 d1 7d | ikev2 g^x 73 db c0 6b 87 64 87 39 90 85 4b 1a 6e 4a 55 8d | ikev2 g^x 36 06 71 74 4d 94 c0 cc c3 ca da b9 47 09 e4 21 | ikev2 g^x a9 ad 84 f0 74 96 ac a8 c6 80 80 8d a7 fe 6f 3b | ikev2 g^x 0b 61 80 4f cc e0 18 20 5b bc 01 56 5b 21 5b 7d | ikev2 g^x cf 65 0c bd 2c 1a 83 c9 6d 39 ba 26 63 02 84 48 | ikev2 g^x b0 ba 3f 13 d9 59 1f b5 ff fe 6c cb 2a b4 66 26 | ikev2 g^x 36 f8 c3 21 35 08 08 9d 44 88 c1 93 d8 01 57 ec | ikev2 g^x 98 49 a7 75 ff fd 0f 01 68 c6 f6 cf 50 73 98 74 | ikev2 g^x 99 a3 bf 5c 1f c1 3e 2b 89 23 5e 9c a4 d5 4a 64 | ikev2 g^x 1a 16 30 ca 38 de 10 97 61 4d bb b6 7b 95 79 00 | ikev2 g^x cb 8b 1d 61 ae 38 3a d9 0a 4b 59 fc 82 07 70 c7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6c a0 b2 b3 6c 5a 92 97 4b 6e 2b c9 2c 62 c9 95 | IKEv2 nonce 6b 4d be 03 71 77 39 4f 3f 77 cf a6 3f 8f 1a 3a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 51 51 c2 14 b4 88 86 45 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2a | natd_hash: port= 01 f4 | natd_hash: hash= c5 7b 4c b3 5e 00 28 2b fa 81 9a 72 9b 96 b8 73 | natd_hash: hash= 09 50 16 c0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c5 7b 4c b3 5e 00 28 2b fa 81 9a 72 9b 96 b8 73 | Notify data 09 50 16 c0 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 51 51 c2 14 b4 88 86 45 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 46 0e 22 1c 6d 17 ec 1e 80 d6 7b 39 9b 19 6c 8a | natd_hash: hash= d4 c4 4d a0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 46 0e 22 1c 6d 17 ec 1e 80 d6 7b 39 9b 19 6c 8a | Notify data d4 c4 4d a0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #616 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #616 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #616 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #616: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #616 to 4294967295 after switching state | Message ID: IKE #616 skipping update_recv as MD is fake | Message ID: sent #616 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-42" #616: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.42:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #616) | 51 51 c2 14 b4 88 86 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 6f 7d 95 94 eb 35 d4 79 fb b8 ed ce b6 0e 8c | 0b ac 78 e7 dc 5d 85 9e fc ca bc 30 a0 af fc a7 | 83 d0 df 38 f5 b9 0e 7c 6c 0f 7c 9b e7 18 2b b0 | b1 47 6e d5 e1 d8 67 a0 a7 53 55 b4 30 4b 4f 05 | e0 9f 68 a5 8b 3d 3d f0 54 7c c1 cf 5b d8 d1 7d | 73 db c0 6b 87 64 87 39 90 85 4b 1a 6e 4a 55 8d | 36 06 71 74 4d 94 c0 cc c3 ca da b9 47 09 e4 21 | a9 ad 84 f0 74 96 ac a8 c6 80 80 8d a7 fe 6f 3b | 0b 61 80 4f cc e0 18 20 5b bc 01 56 5b 21 5b 7d | cf 65 0c bd 2c 1a 83 c9 6d 39 ba 26 63 02 84 48 | b0 ba 3f 13 d9 59 1f b5 ff fe 6c cb 2a b4 66 26 | 36 f8 c3 21 35 08 08 9d 44 88 c1 93 d8 01 57 ec | 98 49 a7 75 ff fd 0f 01 68 c6 f6 cf 50 73 98 74 | 99 a3 bf 5c 1f c1 3e 2b 89 23 5e 9c a4 d5 4a 64 | 1a 16 30 ca 38 de 10 97 61 4d bb b6 7b 95 79 00 | cb 8b 1d 61 ae 38 3a d9 0a 4b 59 fc 82 07 70 c7 | 29 00 00 24 6c a0 b2 b3 6c 5a 92 97 4b 6e 2b c9 | 2c 62 c9 95 6b 4d be 03 71 77 39 4f 3f 77 cf a6 | 3f 8f 1a 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 7b 4c b3 5e 00 28 2b fa 81 9a 72 | 9b 96 b8 73 09 50 16 c0 00 00 00 1c 00 00 40 05 | 46 0e 22 1c 6d 17 ec 1e 80 d6 7b 39 9b 19 6c 8a | d4 c4 4d a0 | state #616 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36001d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2cc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #616 | libevent_malloc: new ptr-libevent@0x7fb368040760 size 128 | #616 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.270238 | resume sending helper answer for #616 suppresed complete_v2_state_transition() and stole MD | #616 spent 0.449 milliseconds in resume sending helper answer | stop processing: state #616 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c06a210 | processing resume sending helper answer for #632 | start processing: state #632 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 632 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #632 | **emit ISAKMP Message: | initiator cookie: | 4f 74 43 70 ed 5f 2e 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-188 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f3 00 b8 55 d7 88 c2 72 f0 05 df 85 ec 3a f6 75 | ikev2 g^x c1 ef 75 7f ad 60 cc e9 f1 77 a3 7c d9 0b 5e d5 | ikev2 g^x 5d c2 1a 6e 0a 46 25 ac 06 20 d7 68 9d d2 6e 25 | ikev2 g^x ff 6b 15 79 a6 94 b8 c3 d0 6e 41 bb 8d ed e7 21 | ikev2 g^x 63 3d 1a 26 b0 0a 45 94 1e de 46 6a 6a b6 4f b5 | ikev2 g^x d1 7f 40 6b 2f 4a eb 4d d8 86 e2 e5 25 78 85 80 | ikev2 g^x 6e 6e 80 63 f5 0c 4b a8 f2 cd 0b 82 23 03 99 14 | ikev2 g^x 83 47 9a 20 36 c0 ef de 6d 79 4d 5f 95 db 5d 28 | ikev2 g^x 9f 23 ff a4 10 07 57 b0 78 ff 65 d6 2e 5b 99 08 | ikev2 g^x 70 cf d4 59 3d 0b 5e fb 55 e9 4e f3 7f d6 14 5d | ikev2 g^x 1b 27 9a 34 94 bb 77 54 18 eb 5d 4f b4 d5 7f a1 | ikev2 g^x 84 3d 42 6a c2 f0 c5 b1 ce 30 19 3e 4b 4e a9 58 | ikev2 g^x 62 a0 4c fb aa 00 f1 a2 66 c0 f9 94 d1 cc 56 3e | ikev2 g^x 8f 68 09 9e 6a 9e 42 7d 62 7d f6 ec 9f 62 81 40 | ikev2 g^x 6f 50 24 39 28 5b 86 fd b5 92 57 3f 4d 8a 71 00 | ikev2 g^x f5 59 1b 4f 8b 96 06 35 4a d8 d6 af 37 4a c9 2a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a3 75 cf 0b e7 29 9a ce c3 82 42 b5 ee 71 0d 4b | IKEv2 nonce 51 1b b0 f6 01 1d 7a 9c f9 27 59 b6 ed 31 8f 92 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4f 74 43 70 ed 5f 2e 8c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 bc | natd_hash: port= 01 f4 | natd_hash: hash= 12 4f f5 3c 8b 41 44 6c 4b b5 e9 45 24 d2 05 c0 | natd_hash: hash= c4 f0 a0 78 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 12 4f f5 3c 8b 41 44 6c 4b b5 e9 45 24 d2 05 c0 | Notify data c4 f0 a0 78 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4f 74 43 70 ed 5f 2e 8c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4e 5a fa ec b2 4d 50 c5 f3 4f a7 18 04 21 31 68 | natd_hash: hash= 73 18 f4 1b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4e 5a fa ec b2 4d 50 c5 f3 4f a7 18 04 21 31 68 | Notify data 73 18 f4 1b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #632 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #632 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #632 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #632: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #632 to 4294967295 after switching state | Message ID: IKE #632 skipping update_recv as MD is fake | Message ID: sent #632 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-188" #632: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.188:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #632) | 4f 74 43 70 ed 5f 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 00 b8 55 d7 88 c2 72 f0 05 df 85 ec 3a f6 75 | c1 ef 75 7f ad 60 cc e9 f1 77 a3 7c d9 0b 5e d5 | 5d c2 1a 6e 0a 46 25 ac 06 20 d7 68 9d d2 6e 25 | ff 6b 15 79 a6 94 b8 c3 d0 6e 41 bb 8d ed e7 21 | 63 3d 1a 26 b0 0a 45 94 1e de 46 6a 6a b6 4f b5 | d1 7f 40 6b 2f 4a eb 4d d8 86 e2 e5 25 78 85 80 | 6e 6e 80 63 f5 0c 4b a8 f2 cd 0b 82 23 03 99 14 | 83 47 9a 20 36 c0 ef de 6d 79 4d 5f 95 db 5d 28 | 9f 23 ff a4 10 07 57 b0 78 ff 65 d6 2e 5b 99 08 | 70 cf d4 59 3d 0b 5e fb 55 e9 4e f3 7f d6 14 5d | 1b 27 9a 34 94 bb 77 54 18 eb 5d 4f b4 d5 7f a1 | 84 3d 42 6a c2 f0 c5 b1 ce 30 19 3e 4b 4e a9 58 | 62 a0 4c fb aa 00 f1 a2 66 c0 f9 94 d1 cc 56 3e | 8f 68 09 9e 6a 9e 42 7d 62 7d f6 ec 9f 62 81 40 | 6f 50 24 39 28 5b 86 fd b5 92 57 3f 4d 8a 71 00 | f5 59 1b 4f 8b 96 06 35 4a d8 d6 af 37 4a c9 2a | 29 00 00 24 a3 75 cf 0b e7 29 9a ce c3 82 42 b5 | ee 71 0d 4b 51 1b b0 f6 01 1d 7a 9c f9 27 59 b6 | ed 31 8f 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 12 4f f5 3c 8b 41 44 6c 4b b5 e9 45 | 24 d2 05 c0 c4 f0 a0 78 00 00 00 1c 00 00 40 05 | 4e 5a fa ec b2 4d 50 c5 f3 4f a7 18 04 21 31 68 | 73 18 f4 1b | state #632 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb34c005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #632 | libevent_malloc: new ptr-libevent@0x7fb36c06a210 size 128 | #632 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.27072 | resume sending helper answer for #632 suppresed complete_v2_state_transition() and stole MD | #632 spent 0.458 milliseconds in resume sending helper answer | stop processing: state #632 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c074b80 | processing resume sending helper answer for #619 | start processing: state #619 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 619 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #619 | **emit ISAKMP Message: | initiator cookie: | 7c a6 d3 cf 8d e9 6e 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-164 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3b 41 3d c8 48 51 1a bc 89 19 53 5f a4 19 24 c3 | ikev2 g^x e3 0b 4a e3 0f 42 45 a6 39 c6 57 d2 6b e7 8a 29 | ikev2 g^x 54 31 b8 5a 5e ca 20 13 3b 27 d0 a6 e9 27 50 18 | ikev2 g^x 7f 80 b0 08 d7 99 89 6a 2a 77 90 5c 01 59 bf 6e | ikev2 g^x a3 42 cd 3d fe 3f 1b b7 a2 59 73 50 4f f0 85 2f | ikev2 g^x 5b 47 ed 6a c9 c2 de c6 e6 4d 9c 06 4e 79 b3 57 | ikev2 g^x 16 0b 0c 18 cb 8c 87 3a 4d 2d e4 5d 7e 8e 72 e6 | ikev2 g^x 03 86 34 5a 38 e7 8f f4 c8 0e 9c 94 be d8 f8 e2 | ikev2 g^x ef 60 76 3a 11 35 bb 0b 5b bc 7b 30 30 31 76 fe | ikev2 g^x 82 33 53 86 f3 ab 66 6a c5 76 fc cd d7 c6 d4 81 | ikev2 g^x da 77 52 29 6c 0d 3b 27 bc ea 05 ef 9f 7f 24 4a | ikev2 g^x f2 92 aa 2c 32 64 ed de 3d 7a 9f 48 52 5c 8e 0a | ikev2 g^x 28 51 5e 93 76 ff 56 0b b4 30 27 a7 26 fb 55 52 | ikev2 g^x 34 7e cd 64 5b b0 5f cd 53 2f 69 37 16 38 d2 bb | ikev2 g^x 78 bd 71 9f 1a ae 46 cb f0 6a df 92 c7 03 31 5c | ikev2 g^x ec 23 e4 33 34 45 4e 7d 3b 26 49 2a 7a bf d5 47 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f4 58 66 d0 11 c4 59 15 77 69 0a b7 d7 fe 50 93 | IKEv2 nonce e0 8b 0c 95 ba ce 3e 1f df 8f 0d e4 a9 fd e1 25 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7c a6 d3 cf 8d e9 6e 5d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 a4 | natd_hash: port= 01 f4 | natd_hash: hash= 4e 99 32 4f a5 1a 27 a5 94 99 e5 8e 27 77 64 71 | natd_hash: hash= 58 de 2f 68 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4e 99 32 4f a5 1a 27 a5 94 99 e5 8e 27 77 64 71 | Notify data 58 de 2f 68 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7c a6 d3 cf 8d e9 6e 5d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 01 59 22 5f d1 0a 35 23 dd e9 14 d7 40 c3 82 b7 | natd_hash: hash= 4e 2a 35 54 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 01 59 22 5f d1 0a 35 23 dd e9 14 d7 40 c3 82 b7 | Notify data 4e 2a 35 54 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #619 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #619 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #619 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #619: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #619 to 4294967295 after switching state | Message ID: IKE #619 skipping update_recv as MD is fake | Message ID: sent #619 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-164" #619: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.164:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #619) | 7c a6 d3 cf 8d e9 6e 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 41 3d c8 48 51 1a bc 89 19 53 5f a4 19 24 c3 | e3 0b 4a e3 0f 42 45 a6 39 c6 57 d2 6b e7 8a 29 | 54 31 b8 5a 5e ca 20 13 3b 27 d0 a6 e9 27 50 18 | 7f 80 b0 08 d7 99 89 6a 2a 77 90 5c 01 59 bf 6e | a3 42 cd 3d fe 3f 1b b7 a2 59 73 50 4f f0 85 2f | 5b 47 ed 6a c9 c2 de c6 e6 4d 9c 06 4e 79 b3 57 | 16 0b 0c 18 cb 8c 87 3a 4d 2d e4 5d 7e 8e 72 e6 | 03 86 34 5a 38 e7 8f f4 c8 0e 9c 94 be d8 f8 e2 | ef 60 76 3a 11 35 bb 0b 5b bc 7b 30 30 31 76 fe | 82 33 53 86 f3 ab 66 6a c5 76 fc cd d7 c6 d4 81 | da 77 52 29 6c 0d 3b 27 bc ea 05 ef 9f 7f 24 4a | f2 92 aa 2c 32 64 ed de 3d 7a 9f 48 52 5c 8e 0a | 28 51 5e 93 76 ff 56 0b b4 30 27 a7 26 fb 55 52 | 34 7e cd 64 5b b0 5f cd 53 2f 69 37 16 38 d2 bb | 78 bd 71 9f 1a ae 46 cb f0 6a df 92 c7 03 31 5c | ec 23 e4 33 34 45 4e 7d 3b 26 49 2a 7a bf d5 47 | 29 00 00 24 f4 58 66 d0 11 c4 59 15 77 69 0a b7 | d7 fe 50 93 e0 8b 0c 95 ba ce 3e 1f df 8f 0d e4 | a9 fd e1 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 99 32 4f a5 1a 27 a5 94 99 e5 8e | 27 77 64 71 58 de 2f 68 00 00 00 1c 00 00 40 05 | 01 59 22 5f d1 0a 35 23 dd e9 14 d7 40 c3 82 b7 | 4e 2a 35 54 | state #619 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb364039970 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36400cc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36400cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #619 | libevent_malloc: new ptr-libevent@0x7fb35c074b80 size 128 | #619 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.271193 | resume sending helper answer for #619 suppresed complete_v2_state_transition() and stole MD | #619 spent 0.444 milliseconds in resume sending helper answer | stop processing: state #619 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c06f3a0 | processing resume sending helper answer for #609 | start processing: state #609 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 609 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #609 | **emit ISAKMP Message: | initiator cookie: | c5 84 f5 e6 85 81 a8 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-138 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7b c3 e1 62 dd f7 03 a4 32 17 be e2 28 27 fb f5 | ikev2 g^x 45 a1 b1 50 d0 82 d8 71 c0 db 0f 18 56 ed 9e 71 | ikev2 g^x ab 62 12 3b 1e 2e d7 c2 88 e3 18 ba c6 4d 9e c0 | ikev2 g^x 66 e9 16 dd ad be 48 d4 08 19 fc 5d 95 a1 92 79 | ikev2 g^x 85 f1 22 51 65 65 eb df 48 a7 f9 2c 1f 7c af 78 | ikev2 g^x 1b 32 50 5b 8d 91 14 ab 2f fc 1c e9 0a eb 9d e0 | ikev2 g^x b9 b3 7c a9 c3 93 53 4b 2c 6d 79 29 14 5f 71 42 | ikev2 g^x c0 35 82 62 20 0c b7 12 e5 58 00 96 19 9d 47 ed | ikev2 g^x b5 53 5d 62 96 2a 62 44 51 f9 0e 87 7c 59 64 63 | ikev2 g^x c8 45 7c 86 64 54 df 3f 91 89 ff af 10 5d 3d 75 | ikev2 g^x cd aa cf 4b 0e a3 b7 91 a2 ab 02 7c c6 93 7f f2 | ikev2 g^x 8d 0d 67 2e 43 de f5 19 fe 61 c3 eb ca 89 dc a8 | ikev2 g^x da 1e ca b8 26 01 ff cf 71 b9 ef 31 67 1a 21 e1 | ikev2 g^x 74 9c 98 aa be 62 d9 7f c0 2a df fd 36 dd fe 56 | ikev2 g^x 14 e3 d8 7a f9 88 3d 4e ef 12 e2 a4 b6 e8 07 15 | ikev2 g^x e0 33 aa a7 d0 7f c0 9a ca fe 22 27 40 8f e2 a5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 77 ac 96 72 0b ae 9a e5 43 fe 81 46 33 b5 6c 3b | IKEv2 nonce 53 47 2a ac 8d 43 3c bd 37 47 3d 9d 02 54 00 23 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c5 84 f5 e6 85 81 a8 3f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8a | natd_hash: port= 01 f4 | natd_hash: hash= a7 cb 6e 3a 03 75 5f a3 64 4c ac 8d 50 31 4f 55 | natd_hash: hash= 75 88 9f fa | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a7 cb 6e 3a 03 75 5f a3 64 4c ac 8d 50 31 4f 55 | Notify data 75 88 9f fa | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c5 84 f5 e6 85 81 a8 3f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 69 ea 36 3f 8e fc 87 de be 9f 2d 0a 55 5e aa a3 | natd_hash: hash= 63 b9 97 4b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 69 ea 36 3f 8e fc 87 de be 9f 2d 0a 55 5e aa a3 | Notify data 63 b9 97 4b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #609 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #609 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #609 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #609: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #609 to 4294967295 after switching state | Message ID: IKE #609 skipping update_recv as MD is fake | Message ID: sent #609 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-138" #609: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.138:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #609) | c5 84 f5 e6 85 81 a8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b c3 e1 62 dd f7 03 a4 32 17 be e2 28 27 fb f5 | 45 a1 b1 50 d0 82 d8 71 c0 db 0f 18 56 ed 9e 71 | ab 62 12 3b 1e 2e d7 c2 88 e3 18 ba c6 4d 9e c0 | 66 e9 16 dd ad be 48 d4 08 19 fc 5d 95 a1 92 79 | 85 f1 22 51 65 65 eb df 48 a7 f9 2c 1f 7c af 78 | 1b 32 50 5b 8d 91 14 ab 2f fc 1c e9 0a eb 9d e0 | b9 b3 7c a9 c3 93 53 4b 2c 6d 79 29 14 5f 71 42 | c0 35 82 62 20 0c b7 12 e5 58 00 96 19 9d 47 ed | b5 53 5d 62 96 2a 62 44 51 f9 0e 87 7c 59 64 63 | c8 45 7c 86 64 54 df 3f 91 89 ff af 10 5d 3d 75 | cd aa cf 4b 0e a3 b7 91 a2 ab 02 7c c6 93 7f f2 | 8d 0d 67 2e 43 de f5 19 fe 61 c3 eb ca 89 dc a8 | da 1e ca b8 26 01 ff cf 71 b9 ef 31 67 1a 21 e1 | 74 9c 98 aa be 62 d9 7f c0 2a df fd 36 dd fe 56 | 14 e3 d8 7a f9 88 3d 4e ef 12 e2 a4 b6 e8 07 15 | e0 33 aa a7 d0 7f c0 9a ca fe 22 27 40 8f e2 a5 | 29 00 00 24 77 ac 96 72 0b ae 9a e5 43 fe 81 46 | 33 b5 6c 3b 53 47 2a ac 8d 43 3c bd 37 47 3d 9d | 02 54 00 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 cb 6e 3a 03 75 5f a3 64 4c ac 8d | 50 31 4f 55 75 88 9f fa 00 00 00 1c 00 00 40 05 | 69 ea 36 3f 8e fc 87 de be 9f 2d 0a 55 5e aa a3 | 63 b9 97 4b | state #609 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36401a420 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb354012bf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #609 | libevent_malloc: new ptr-libevent@0x7fb35c06f3a0 size 128 | #609 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.271658 | resume sending helper answer for #609 suppresed complete_v2_state_transition() and stole MD | #609 spent 0.441 milliseconds in resume sending helper answer | stop processing: state #609 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34005bbe0 | processing resume sending helper answer for #628 | start processing: state #628 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 628 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #628 | **emit ISAKMP Message: | initiator cookie: | 95 d4 94 96 e1 1d ee 26 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-144 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7f a8 7c 62 17 42 5a ce 42 3d 33 10 fe b2 8a 88 | ikev2 g^x 92 6e 71 d5 06 86 e5 e0 52 42 37 96 48 d9 83 04 | ikev2 g^x b7 53 69 af a5 e3 7c 5f c2 d6 49 92 b2 ff de 4c | ikev2 g^x db ed 7f de 57 21 99 44 40 b6 62 ee 10 52 80 d1 | ikev2 g^x 26 5f f1 59 44 03 5f 7b f9 65 35 c7 ca 59 14 41 | ikev2 g^x 66 d5 8f 67 2a 79 18 69 6e a9 93 bc a1 d2 56 44 | ikev2 g^x d5 a9 00 22 f4 be 24 66 17 90 eb 2f 6c 5b e9 e6 | ikev2 g^x 01 36 c7 01 8d be 88 5c 2e 67 73 6a 1a 0e cd 08 | ikev2 g^x 4f 7b 9d 2f 56 a8 13 ed e5 f5 79 24 e3 d4 7e ff | ikev2 g^x 39 52 47 37 cf c9 b9 cf 2b 76 1e 42 6a 40 6c a9 | ikev2 g^x d2 de bc b5 5e 46 c7 25 f7 aa 04 2e 75 05 36 b0 | ikev2 g^x fc bb ae 91 9d b4 fd 45 a8 76 c1 47 2f 9f 74 68 | ikev2 g^x d6 62 93 ed b4 f8 e1 d4 e2 dc 95 99 70 b3 6e 18 | ikev2 g^x 5d 8d 13 ec c3 76 44 10 13 a4 af e0 0e 36 d3 4d | ikev2 g^x 5f 8f ac 78 e4 0b 75 55 f3 aa 1e f1 06 83 57 e9 | ikev2 g^x 0f fa 63 a2 f0 49 65 dc 20 79 d0 e9 01 99 ce 92 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ef 3d 18 f0 17 d1 14 e0 14 e9 24 e7 2b c4 61 c2 | IKEv2 nonce 92 c3 eb 7a 8f 6c 14 1b 08 5d cd 09 ea ad df c9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 95 d4 94 96 e1 1d ee 26 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 90 | natd_hash: port= 01 f4 | natd_hash: hash= f8 2e b7 bf 2f 19 c5 96 59 16 43 08 f3 7e 3e 9d | natd_hash: hash= 86 2f 58 f5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f8 2e b7 bf 2f 19 c5 96 59 16 43 08 f3 7e 3e 9d | Notify data 86 2f 58 f5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 95 d4 94 96 e1 1d ee 26 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 25 ae 0e 0b 51 c2 48 e1 f1 ba 50 01 f1 19 07 79 | natd_hash: hash= b9 de b0 4d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 25 ae 0e 0b 51 c2 48 e1 f1 ba 50 01 f1 19 07 79 | Notify data b9 de b0 4d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #628 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #628 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #628 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #628: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #628 to 4294967295 after switching state | Message ID: IKE #628 skipping update_recv as MD is fake | Message ID: sent #628 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-144" #628: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.144:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #628) | 95 d4 94 96 e1 1d ee 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f a8 7c 62 17 42 5a ce 42 3d 33 10 fe b2 8a 88 | 92 6e 71 d5 06 86 e5 e0 52 42 37 96 48 d9 83 04 | b7 53 69 af a5 e3 7c 5f c2 d6 49 92 b2 ff de 4c | db ed 7f de 57 21 99 44 40 b6 62 ee 10 52 80 d1 | 26 5f f1 59 44 03 5f 7b f9 65 35 c7 ca 59 14 41 | 66 d5 8f 67 2a 79 18 69 6e a9 93 bc a1 d2 56 44 | d5 a9 00 22 f4 be 24 66 17 90 eb 2f 6c 5b e9 e6 | 01 36 c7 01 8d be 88 5c 2e 67 73 6a 1a 0e cd 08 | 4f 7b 9d 2f 56 a8 13 ed e5 f5 79 24 e3 d4 7e ff | 39 52 47 37 cf c9 b9 cf 2b 76 1e 42 6a 40 6c a9 | d2 de bc b5 5e 46 c7 25 f7 aa 04 2e 75 05 36 b0 | fc bb ae 91 9d b4 fd 45 a8 76 c1 47 2f 9f 74 68 | d6 62 93 ed b4 f8 e1 d4 e2 dc 95 99 70 b3 6e 18 | 5d 8d 13 ec c3 76 44 10 13 a4 af e0 0e 36 d3 4d | 5f 8f ac 78 e4 0b 75 55 f3 aa 1e f1 06 83 57 e9 | 0f fa 63 a2 f0 49 65 dc 20 79 d0 e9 01 99 ce 92 | 29 00 00 24 ef 3d 18 f0 17 d1 14 e0 14 e9 24 e7 | 2b c4 61 c2 92 c3 eb 7a 8f 6c 14 1b 08 5d cd 09 | ea ad df c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 2e b7 bf 2f 19 c5 96 59 16 43 08 | f3 7e 3e 9d 86 2f 58 f5 00 00 00 1c 00 00 40 05 | 25 ae 0e 0b 51 c2 48 e1 f1 ba 50 01 f1 19 07 79 | b9 de b0 4d | state #628 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c014b40 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c018460 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #628 | libevent_malloc: new ptr-libevent@0x7fb34005bbe0 size 128 | #628 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.272144 | resume sending helper answer for #628 suppresed complete_v2_state_transition() and stole MD | #628 spent 0.457 milliseconds in resume sending helper answer | stop processing: state #628 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3400613a0 | processing resume sending helper answer for #610 | start processing: state #610 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 610 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #610 | **emit ISAKMP Message: | initiator cookie: | 61 d4 76 e8 fd b1 0b 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-18 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 12 8a 16 af af f2 cb a9 02 ff 3e 3d ae 02 b1 75 | ikev2 g^x dc a6 9a 8d 77 a2 72 9d c4 d4 e4 1e d5 6c 54 7d | ikev2 g^x 5c 6a 9a 07 f7 ee 11 8c 25 4e 17 a6 b4 8f e3 97 | ikev2 g^x 33 ae 5b 1d e1 aa 4d 9c 14 18 3d 8d c9 8d a2 6f | ikev2 g^x cc 49 8f 9d 17 34 c4 20 96 b3 e2 03 ed 8c 8d de | ikev2 g^x e3 73 b6 b8 61 9a c3 4a bf 27 d3 2f a8 fe a9 f8 | ikev2 g^x 00 87 44 22 9b 0b 25 c8 66 f5 c0 23 88 06 14 5d | ikev2 g^x 26 0a 98 52 96 46 68 85 8b a8 34 78 ba b4 82 eb | ikev2 g^x 78 95 23 ba 81 62 21 b2 59 bb 25 ed 00 99 e2 d9 | ikev2 g^x bc 0c f2 02 1d be ff ab a8 66 25 8b 4e d9 07 26 | ikev2 g^x 4c 48 db 62 8c 96 22 7a d7 2c 26 7a 28 67 fc ec | ikev2 g^x 0b 44 dc 7e 93 ed 10 51 02 0c 46 dc fa 32 73 51 | ikev2 g^x b0 91 38 ff ee dc a3 8a 63 c7 0a 63 49 4c a8 57 | ikev2 g^x dc a0 35 96 35 c6 37 d0 da 6d 46 79 bf cf e8 4f | ikev2 g^x 26 a6 1b 5c 3a e0 a5 e5 c0 3f 87 73 30 32 59 71 | ikev2 g^x 11 55 e0 04 02 19 e3 7f 10 2f 76 30 3d 2f 19 1e | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 47 ba 8f 29 57 01 a1 62 29 56 13 62 64 9d 16 df | IKEv2 nonce 12 f0 5f 85 ef e3 38 7e a9 49 18 89 d7 eb 36 94 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 61 d4 76 e8 fd b1 0b 0a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 12 | natd_hash: port= 01 f4 | natd_hash: hash= 1b 3c d4 8a e5 4d 08 9a 3a 72 88 9e 1c 04 96 d4 | natd_hash: hash= a5 b0 e4 1d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b 3c d4 8a e5 4d 08 9a 3a 72 88 9e 1c 04 96 d4 | Notify data a5 b0 e4 1d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 61 d4 76 e8 fd b1 0b 0a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 52 67 e1 51 42 cf 44 ba 32 e7 56 bf 02 a0 23 c3 | natd_hash: hash= c5 4f fa a5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 52 67 e1 51 42 cf 44 ba 32 e7 56 bf 02 a0 23 c3 | Notify data c5 4f fa a5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #610 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #610 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #610 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #610: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #610 to 4294967295 after switching state | Message ID: IKE #610 skipping update_recv as MD is fake | Message ID: sent #610 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-18" #610: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.18:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #610) | 61 d4 76 e8 fd b1 0b 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 8a 16 af af f2 cb a9 02 ff 3e 3d ae 02 b1 75 | dc a6 9a 8d 77 a2 72 9d c4 d4 e4 1e d5 6c 54 7d | 5c 6a 9a 07 f7 ee 11 8c 25 4e 17 a6 b4 8f e3 97 | 33 ae 5b 1d e1 aa 4d 9c 14 18 3d 8d c9 8d a2 6f | cc 49 8f 9d 17 34 c4 20 96 b3 e2 03 ed 8c 8d de | e3 73 b6 b8 61 9a c3 4a bf 27 d3 2f a8 fe a9 f8 | 00 87 44 22 9b 0b 25 c8 66 f5 c0 23 88 06 14 5d | 26 0a 98 52 96 46 68 85 8b a8 34 78 ba b4 82 eb | 78 95 23 ba 81 62 21 b2 59 bb 25 ed 00 99 e2 d9 | bc 0c f2 02 1d be ff ab a8 66 25 8b 4e d9 07 26 | 4c 48 db 62 8c 96 22 7a d7 2c 26 7a 28 67 fc ec | 0b 44 dc 7e 93 ed 10 51 02 0c 46 dc fa 32 73 51 | b0 91 38 ff ee dc a3 8a 63 c7 0a 63 49 4c a8 57 | dc a0 35 96 35 c6 37 d0 da 6d 46 79 bf cf e8 4f | 26 a6 1b 5c 3a e0 a5 e5 c0 3f 87 73 30 32 59 71 | 11 55 e0 04 02 19 e3 7f 10 2f 76 30 3d 2f 19 1e | 29 00 00 24 47 ba 8f 29 57 01 a1 62 29 56 13 62 | 64 9d 16 df 12 f0 5f 85 ef e3 38 7e a9 49 18 89 | d7 eb 36 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 3c d4 8a e5 4d 08 9a 3a 72 88 9e | 1c 04 96 d4 a5 b0 e4 1d 00 00 00 1c 00 00 40 05 | 52 67 e1 51 42 cf 44 ba 32 e7 56 bf 02 a0 23 c3 | c5 4f fa a5 | state #610 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380041ce0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb3800153c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800153c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #610 | libevent_malloc: new ptr-libevent@0x7fb3400613a0 size 128 | #610 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.272596 | resume sending helper answer for #610 suppresed complete_v2_state_transition() and stole MD | #610 spent 0.427 milliseconds in resume sending helper answer | stop processing: state #610 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3440646e0 | processing resume sending helper answer for #599 | start processing: state #599 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 599 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #599 | **emit ISAKMP Message: | initiator cookie: | 66 fe 40 6d 20 a0 8e c1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-64 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4b 14 ec 7e f9 cd 40 f5 de 65 65 51 82 b1 59 1d | ikev2 g^x e2 b1 19 0c 5f 42 c2 c5 f2 9e 9f 81 38 a4 92 07 | ikev2 g^x 55 02 a7 a3 99 20 d2 9d 43 eb 91 a3 1f f5 e1 6a | ikev2 g^x ac 0d 32 90 d1 6d 6d 3a 90 4a ce 17 12 9d 8c 47 | ikev2 g^x 7f 85 c0 17 84 a9 65 8a 07 e7 29 51 ac bc 5a bb | ikev2 g^x b5 62 41 b7 ff 6d 04 9f 02 f4 2c 6c 75 b6 4d e5 | ikev2 g^x ee 4c f0 36 66 9b aa 3a 2d 8d 7d de 94 5b 92 78 | ikev2 g^x f4 41 fe 7f 33 1f 2f 29 ac c1 15 b4 b6 4a 26 c7 | ikev2 g^x 44 40 c8 70 6a cd 04 43 6d a5 b7 76 59 c0 45 92 | ikev2 g^x 8f 55 81 59 a2 e1 56 33 98 b8 16 29 a8 ae fe 63 | ikev2 g^x 1b 33 5e 5c a3 3c 37 83 85 62 21 28 50 5e 0d 07 | ikev2 g^x 88 ad 15 73 a5 30 b6 de 4a b6 16 ba 2b d9 18 62 | ikev2 g^x cc bc 5b 60 dc b9 95 66 a2 af af 8b 80 0e c8 c3 | ikev2 g^x 2b ea da 66 ba 0a 43 87 f9 ca 7e 08 04 24 6f de | ikev2 g^x b2 f8 b8 8f 58 ce 58 e7 2d 3c 4f 86 18 6d 41 84 | ikev2 g^x be 0d 41 9c cb 28 5c c2 7a fb af 81 ec 08 20 4d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce da 51 a7 0b 53 11 86 4b c3 b4 4e 3b f4 a2 e2 0f | IKEv2 nonce d9 7b 58 4a f2 c9 2a af f2 68 7d b8 b9 d1 af 67 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 66 fe 40 6d 20 a0 8e c1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 40 | natd_hash: port= 01 f4 | natd_hash: hash= f5 33 56 1d 93 89 b2 9c ef 86 78 c9 a2 2d bb 3b | natd_hash: hash= 37 fa f6 3c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f5 33 56 1d 93 89 b2 9c ef 86 78 c9 a2 2d bb 3b | Notify data 37 fa f6 3c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 66 fe 40 6d 20 a0 8e c1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 92 86 b4 ce 70 36 ee dd 1a cd 75 09 22 54 37 7b | natd_hash: hash= f9 8e 38 96 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 92 86 b4 ce 70 36 ee dd 1a cd 75 09 22 54 37 7b | Notify data f9 8e 38 96 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #599 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #599 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #599 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #599: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #599 to 4294967295 after switching state | Message ID: IKE #599 skipping update_recv as MD is fake | Message ID: sent #599 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-64" #599: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.64:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #599) | 66 fe 40 6d 20 a0 8e c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 14 ec 7e f9 cd 40 f5 de 65 65 51 82 b1 59 1d | e2 b1 19 0c 5f 42 c2 c5 f2 9e 9f 81 38 a4 92 07 | 55 02 a7 a3 99 20 d2 9d 43 eb 91 a3 1f f5 e1 6a | ac 0d 32 90 d1 6d 6d 3a 90 4a ce 17 12 9d 8c 47 | 7f 85 c0 17 84 a9 65 8a 07 e7 29 51 ac bc 5a bb | b5 62 41 b7 ff 6d 04 9f 02 f4 2c 6c 75 b6 4d e5 | ee 4c f0 36 66 9b aa 3a 2d 8d 7d de 94 5b 92 78 | f4 41 fe 7f 33 1f 2f 29 ac c1 15 b4 b6 4a 26 c7 | 44 40 c8 70 6a cd 04 43 6d a5 b7 76 59 c0 45 92 | 8f 55 81 59 a2 e1 56 33 98 b8 16 29 a8 ae fe 63 | 1b 33 5e 5c a3 3c 37 83 85 62 21 28 50 5e 0d 07 | 88 ad 15 73 a5 30 b6 de 4a b6 16 ba 2b d9 18 62 | cc bc 5b 60 dc b9 95 66 a2 af af 8b 80 0e c8 c3 | 2b ea da 66 ba 0a 43 87 f9 ca 7e 08 04 24 6f de | b2 f8 b8 8f 58 ce 58 e7 2d 3c 4f 86 18 6d 41 84 | be 0d 41 9c cb 28 5c c2 7a fb af 81 ec 08 20 4d | 29 00 00 24 da 51 a7 0b 53 11 86 4b c3 b4 4e 3b | f4 a2 e2 0f d9 7b 58 4a f2 c9 2a af f2 68 7d b8 | b9 d1 af 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 33 56 1d 93 89 b2 9c ef 86 78 c9 | a2 2d bb 3b 37 fa f6 3c 00 00 00 1c 00 00 40 05 | 92 86 b4 ce 70 36 ee dd 1a cd 75 09 22 54 37 7b | f9 8e 38 96 | state #599 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388047480 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a46910 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46910 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #599 | libevent_malloc: new ptr-libevent@0x7fb3440646e0 size 128 | #599 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.27306 | resume sending helper answer for #599 suppresed complete_v2_state_transition() and stole MD | #599 spent 0.439 milliseconds in resume sending helper answer | stop processing: state #599 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3540647c0 | processing resume sending helper answer for #591 | start processing: state #591 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 591 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #591 | **emit ISAKMP Message: | initiator cookie: | 39 b3 48 76 36 79 c8 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-4 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 24 53 5e 8b 64 b9 d7 96 a2 1b 6a 63 75 d7 45 6e | ikev2 g^x 48 c4 46 eb 28 75 5e f7 ed 53 29 79 34 d4 d9 29 | ikev2 g^x 02 a5 32 60 5b ab 4f df 45 bd 95 46 90 03 ef f5 | ikev2 g^x ac db f4 fa d3 e6 26 09 6f 6a c9 87 25 cf 58 ee | ikev2 g^x ad d3 59 ca 2b 7a 8d ad c4 25 ee 9e 4f af ad 86 | ikev2 g^x d1 6a 16 30 39 cf 7c 62 83 49 21 82 42 1d 36 20 | ikev2 g^x 76 98 ff ea 9a 86 5a 8b 11 66 3a 24 b9 6b 76 c0 | ikev2 g^x 35 10 36 e5 7e d1 0b bc 77 9c 0f 5a 4b 5b 83 fb | ikev2 g^x 8a 34 bd 69 b1 83 bc 02 8c 52 8a 7a 9a 37 ff 74 | ikev2 g^x 9c 9b a2 16 a4 04 bd c3 ce 15 56 fe 49 fe 9a 67 | ikev2 g^x a2 82 10 83 18 d7 84 55 d8 28 d3 5f e0 e8 98 f9 | ikev2 g^x 81 4a 40 28 8e ad bb d3 fb 65 1b 2e 9e 89 76 02 | ikev2 g^x ac ff 53 1c ae 39 56 f6 49 c6 01 53 51 d7 b4 78 | ikev2 g^x 4c fc d4 a9 d7 40 5e 3d 8b c2 c2 3f be e8 7f 56 | ikev2 g^x f5 bf 7e 5c e0 2b 2b 15 e0 0b ce 31 42 b4 2e b1 | ikev2 g^x 10 3a 57 61 53 b6 64 5e 01 7e ec 80 4e b8 dd f6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7e 65 18 45 e0 bd ae a4 9b b7 1f 7e 50 e9 89 74 | IKEv2 nonce 0f 3a fb 42 e4 b1 ea 44 24 bf e7 f2 99 e4 e9 9c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 39 b3 48 76 36 79 c8 c8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 04 | natd_hash: port= 01 f4 | natd_hash: hash= 1c 75 97 23 fe e8 31 c4 e6 0a d5 b5 9a 0f 0f 77 | natd_hash: hash= 98 14 56 07 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1c 75 97 23 fe e8 31 c4 e6 0a d5 b5 9a 0f 0f 77 | Notify data 98 14 56 07 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 39 b3 48 76 36 79 c8 c8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 51 a7 2c 19 bc 86 01 ef e8 30 63 e0 d2 c5 4d cb | natd_hash: hash= 68 30 7a e4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 51 a7 2c 19 bc 86 01 ef e8 30 63 e0 d2 c5 4d cb | Notify data 68 30 7a e4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #591 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #591 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #591 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #591: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #591 to 4294967295 after switching state | Message ID: IKE #591 skipping update_recv as MD is fake | Message ID: sent #591 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-4" #591: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.4:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #591) | 39 b3 48 76 36 79 c8 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 53 5e 8b 64 b9 d7 96 a2 1b 6a 63 75 d7 45 6e | 48 c4 46 eb 28 75 5e f7 ed 53 29 79 34 d4 d9 29 | 02 a5 32 60 5b ab 4f df 45 bd 95 46 90 03 ef f5 | ac db f4 fa d3 e6 26 09 6f 6a c9 87 25 cf 58 ee | ad d3 59 ca 2b 7a 8d ad c4 25 ee 9e 4f af ad 86 | d1 6a 16 30 39 cf 7c 62 83 49 21 82 42 1d 36 20 | 76 98 ff ea 9a 86 5a 8b 11 66 3a 24 b9 6b 76 c0 | 35 10 36 e5 7e d1 0b bc 77 9c 0f 5a 4b 5b 83 fb | 8a 34 bd 69 b1 83 bc 02 8c 52 8a 7a 9a 37 ff 74 | 9c 9b a2 16 a4 04 bd c3 ce 15 56 fe 49 fe 9a 67 | a2 82 10 83 18 d7 84 55 d8 28 d3 5f e0 e8 98 f9 | 81 4a 40 28 8e ad bb d3 fb 65 1b 2e 9e 89 76 02 | ac ff 53 1c ae 39 56 f6 49 c6 01 53 51 d7 b4 78 | 4c fc d4 a9 d7 40 5e 3d 8b c2 c2 3f be e8 7f 56 | f5 bf 7e 5c e0 2b 2b 15 e0 0b ce 31 42 b4 2e b1 | 10 3a 57 61 53 b6 64 5e 01 7e ec 80 4e b8 dd f6 | 29 00 00 24 7e 65 18 45 e0 bd ae a4 9b b7 1f 7e | 50 e9 89 74 0f 3a fb 42 e4 b1 ea 44 24 bf e7 f2 | 99 e4 e9 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 75 97 23 fe e8 31 c4 e6 0a d5 b5 | 9a 0f 0f 77 98 14 56 07 00 00 00 1c 00 00 40 05 | 51 a7 2c 19 bc 86 01 ef e8 30 63 e0 d2 c5 4d cb | 68 30 7a e4 | state #591 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb338046040 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b05240 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b05240 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #591 | libevent_malloc: new ptr-libevent@0x7fb3540647c0 size 128 | #591 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.27352 | resume sending helper answer for #591 suppresed complete_v2_state_transition() and stole MD | #591 spent 0.435 milliseconds in resume sending helper answer | stop processing: state #591 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb374064930 | processing resume sending helper answer for #601 | start processing: state #601 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 601 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #601 | **emit ISAKMP Message: | initiator cookie: | d7 f7 ca a5 2f 06 a8 a8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-16 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 76 78 ca bd 24 85 88 4c 78 31 a2 d9 e2 a6 11 ea | ikev2 g^x a9 a8 ae 09 a4 bd 1f 95 2e 57 31 42 02 74 1f d6 | ikev2 g^x c5 8b 05 28 72 2e 76 f4 00 72 d0 70 f9 55 b5 84 | ikev2 g^x 94 83 3e 74 df 62 6a cd 44 08 f1 0f e9 7a 32 99 | ikev2 g^x b9 ec 32 40 77 3a c4 d1 0a 6e 00 b8 4c 58 c1 09 | ikev2 g^x 20 0d af 2a d9 0e 8d 53 5e ca 9c e2 9f 27 d8 7e | ikev2 g^x ce b5 b7 c6 10 df 06 bc e3 80 61 af 7d 92 7a 47 | ikev2 g^x 1a 5f 4a 09 fe bf 68 fb 0f 40 54 3e 58 85 5f bb | ikev2 g^x 73 72 f9 bf 1d c8 c3 c9 79 44 0d 07 44 21 4d 95 | ikev2 g^x fb d2 f9 99 1e dc c6 7e 09 bc cb bc e7 f1 64 05 | ikev2 g^x 39 dc f9 f1 b3 05 e0 d4 1d fc a0 60 42 26 ba 23 | ikev2 g^x e3 9b cc 3f d0 ff 12 49 db 17 4a c4 c0 02 73 de | ikev2 g^x 45 c4 7b f5 22 57 16 78 ee 47 e0 a6 d5 4a a0 a8 | ikev2 g^x ea f8 76 af 62 fa 50 0e cd 7b b7 d6 9e d4 f1 8e | ikev2 g^x eb 21 f4 fb f5 f5 7a 25 6c d6 52 91 18 f1 41 03 | ikev2 g^x e3 0e e9 9c 96 a5 c5 a0 5c 45 85 41 73 2b f2 4b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2f 7a 9a b4 ff 1e 6c 6f 1d 55 f4 6e bf e3 3b b9 | IKEv2 nonce 6e ac 92 bf 50 bd ca 89 82 b0 73 dd ad d2 0a 9a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d7 f7 ca a5 2f 06 a8 a8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 10 | natd_hash: port= 01 f4 | natd_hash: hash= 45 7d 4e 6c df 7e 32 d6 75 e4 3a 9b ea 1e dd 62 | natd_hash: hash= f1 90 1e 9d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 45 7d 4e 6c df 7e 32 d6 75 e4 3a 9b ea 1e dd 62 | Notify data f1 90 1e 9d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d7 f7 ca a5 2f 06 a8 a8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a9 5b d2 03 4a 24 da 8f e0 b4 91 a2 3b d8 bb f1 | natd_hash: hash= 5f 38 a9 4c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a9 5b d2 03 4a 24 da 8f e0 b4 91 a2 3b d8 bb f1 | Notify data 5f 38 a9 4c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #601 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #601 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #601 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #601: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #601 to 4294967295 after switching state | Message ID: IKE #601 skipping update_recv as MD is fake | Message ID: sent #601 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-16" #601: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.16:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #601) | d7 f7 ca a5 2f 06 a8 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 78 ca bd 24 85 88 4c 78 31 a2 d9 e2 a6 11 ea | a9 a8 ae 09 a4 bd 1f 95 2e 57 31 42 02 74 1f d6 | c5 8b 05 28 72 2e 76 f4 00 72 d0 70 f9 55 b5 84 | 94 83 3e 74 df 62 6a cd 44 08 f1 0f e9 7a 32 99 | b9 ec 32 40 77 3a c4 d1 0a 6e 00 b8 4c 58 c1 09 | 20 0d af 2a d9 0e 8d 53 5e ca 9c e2 9f 27 d8 7e | ce b5 b7 c6 10 df 06 bc e3 80 61 af 7d 92 7a 47 | 1a 5f 4a 09 fe bf 68 fb 0f 40 54 3e 58 85 5f bb | 73 72 f9 bf 1d c8 c3 c9 79 44 0d 07 44 21 4d 95 | fb d2 f9 99 1e dc c6 7e 09 bc cb bc e7 f1 64 05 | 39 dc f9 f1 b3 05 e0 d4 1d fc a0 60 42 26 ba 23 | e3 9b cc 3f d0 ff 12 49 db 17 4a c4 c0 02 73 de | 45 c4 7b f5 22 57 16 78 ee 47 e0 a6 d5 4a a0 a8 | ea f8 76 af 62 fa 50 0e cd 7b b7 d6 9e d4 f1 8e | eb 21 f4 fb f5 f5 7a 25 6c d6 52 91 18 f1 41 03 | e3 0e e9 9c 96 a5 c5 a0 5c 45 85 41 73 2b f2 4b | 29 00 00 24 2f 7a 9a b4 ff 1e 6c 6f 1d 55 f4 6e | bf e3 3b b9 6e ac 92 bf 50 bd ca 89 82 b0 73 dd | ad d2 0a 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 7d 4e 6c df 7e 32 d6 75 e4 3a 9b | ea 1e dd 62 f1 90 1e 9d 00 00 00 1c 00 00 40 05 | a9 5b d2 03 4a 24 da 8f e0 b4 91 a2 3b d8 bb f1 | 5f 38 a9 4c | state #601 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37400cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb388002b20 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #601 | libevent_malloc: new ptr-libevent@0x7fb374064930 size 128 | #601 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.273976 | resume sending helper answer for #601 suppresed complete_v2_state_transition() and stole MD | #601 spent 0.433 milliseconds in resume sending helper answer | stop processing: state #601 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb338069f70 | processing resume sending helper answer for #596 | start processing: state #596 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 596 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #596 | **emit ISAKMP Message: | initiator cookie: | bf 80 0e 78 80 27 80 d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-66 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1c 1f ba 68 b5 93 5e 04 79 06 b6 a4 32 e4 68 c6 | ikev2 g^x 49 40 88 2b 6f 8a c0 9d d9 bc c8 ed 82 28 3c 30 | ikev2 g^x 4b 6f b2 e3 a8 0d d7 81 63 5c 83 35 fb 65 99 22 | ikev2 g^x ec b9 c7 f6 a3 1e 0c af 7e 02 44 4c 52 41 61 0c | ikev2 g^x fe ec b7 48 f0 10 1f 47 9e bc cb f0 0f ec 73 f6 | ikev2 g^x bf b9 40 d5 39 e3 19 17 5e 22 2d 36 42 33 d5 3a | ikev2 g^x 1c 03 6f c7 3e d1 3d c3 8f b4 e7 6b 4d ea f9 60 | ikev2 g^x 41 83 37 ed 6a c3 22 14 77 3f db 39 0c 56 20 64 | ikev2 g^x 8a 20 ec f2 4b 2b 90 2e 8c 2a 53 89 b4 6a 1f 42 | ikev2 g^x f3 7e f2 d4 fe 7b 90 df c9 c6 1b 36 f4 b5 4a ce | ikev2 g^x 0e df 7b 16 66 bc e8 11 d0 0b 0f dc e2 39 28 97 | ikev2 g^x 4c 94 b9 9e 35 c6 e9 df 5c 0c 47 78 05 93 ac c5 | ikev2 g^x c4 71 dd af e6 5f df 44 80 d0 10 16 32 6a 91 64 | ikev2 g^x 98 ef e2 0e ce a7 57 85 68 b2 6e d9 b5 77 88 45 | ikev2 g^x 6c 4d 65 cf 3b 08 9f b7 f8 9f 35 9c 9d df 1f 59 | ikev2 g^x e7 b7 04 7d ff 8a de 2a 68 53 fb 71 b7 5d ca 93 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1e d8 84 c9 73 9e cb 5e 05 66 de 35 14 40 e8 eb | IKEv2 nonce 0f 43 29 df 2b 1e 3c 7f 1a d8 5a b9 16 e8 fe 9a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= bf 80 0e 78 80 27 80 d5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 42 | natd_hash: port= 01 f4 | natd_hash: hash= 33 20 82 d1 8b 7a 7b 4b 2f 8d 5b 47 cd 08 2a ee | natd_hash: hash= bf 4a 9d 5d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 33 20 82 d1 8b 7a 7b 4b 2f 8d 5b 47 cd 08 2a ee | Notify data bf 4a 9d 5d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= bf 80 0e 78 80 27 80 d5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 15 0d ca c2 1e 7e 24 48 29 6a 67 0e 8c c8 30 24 | natd_hash: hash= 05 f8 a5 d3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 15 0d ca c2 1e 7e 24 48 29 6a 67 0e 8c c8 30 24 | Notify data 05 f8 a5 d3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #596 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #596 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #596 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #596: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #596 to 4294967295 after switching state | Message ID: IKE #596 skipping update_recv as MD is fake | Message ID: sent #596 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-66" #596: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.66:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #596) | bf 80 0e 78 80 27 80 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c 1f ba 68 b5 93 5e 04 79 06 b6 a4 32 e4 68 c6 | 49 40 88 2b 6f 8a c0 9d d9 bc c8 ed 82 28 3c 30 | 4b 6f b2 e3 a8 0d d7 81 63 5c 83 35 fb 65 99 22 | ec b9 c7 f6 a3 1e 0c af 7e 02 44 4c 52 41 61 0c | fe ec b7 48 f0 10 1f 47 9e bc cb f0 0f ec 73 f6 | bf b9 40 d5 39 e3 19 17 5e 22 2d 36 42 33 d5 3a | 1c 03 6f c7 3e d1 3d c3 8f b4 e7 6b 4d ea f9 60 | 41 83 37 ed 6a c3 22 14 77 3f db 39 0c 56 20 64 | 8a 20 ec f2 4b 2b 90 2e 8c 2a 53 89 b4 6a 1f 42 | f3 7e f2 d4 fe 7b 90 df c9 c6 1b 36 f4 b5 4a ce | 0e df 7b 16 66 bc e8 11 d0 0b 0f dc e2 39 28 97 | 4c 94 b9 9e 35 c6 e9 df 5c 0c 47 78 05 93 ac c5 | c4 71 dd af e6 5f df 44 80 d0 10 16 32 6a 91 64 | 98 ef e2 0e ce a7 57 85 68 b2 6e d9 b5 77 88 45 | 6c 4d 65 cf 3b 08 9f b7 f8 9f 35 9c 9d df 1f 59 | e7 b7 04 7d ff 8a de 2a 68 53 fb 71 b7 5d ca 93 | 29 00 00 24 1e d8 84 c9 73 9e cb 5e 05 66 de 35 | 14 40 e8 eb 0f 43 29 df 2b 1e 3c 7f 1a d8 5a b9 | 16 e8 fe 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 33 20 82 d1 8b 7a 7b 4b 2f 8d 5b 47 | cd 08 2a ee bf 4a 9d 5d 00 00 00 1c 00 00 40 05 | 15 0d ca c2 1e 7e 24 48 29 6a 67 0e 8c c8 30 24 | 05 f8 a5 d3 | state #596 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb384031e80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb384043260 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384043260 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #596 | libevent_malloc: new ptr-libevent@0x7fb338069f70 size 128 | #596 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.274437 | resume sending helper answer for #596 suppresed complete_v2_state_transition() and stole MD | #596 spent 0.437 milliseconds in resume sending helper answer | stop processing: state #596 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c05ecd0 | processing resume sending helper answer for #611 | start processing: state #611 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 611 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #611 | **emit ISAKMP Message: | initiator cookie: | 34 ea b3 f2 4f 9b fd 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-177 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 51 65 77 23 f1 8e 59 ad e7 ff 5f de d0 89 eb 8f | ikev2 g^x e9 74 c5 98 7f 21 ce 5f 9a 27 21 a7 98 93 9e 99 | ikev2 g^x e4 27 4e b7 b3 24 fc 80 94 f6 f4 f5 9c fa 3c 88 | ikev2 g^x 3d a1 56 1a 21 1c 0e f5 0b ed e1 09 65 2e 3d d4 | ikev2 g^x 2f 57 58 dc 24 ce 14 24 1c da 0b b5 60 f1 11 17 | ikev2 g^x 1a 17 9e 79 a3 98 e2 85 17 79 fe 96 1e fd 0a 94 | ikev2 g^x db 8d d3 25 e1 09 1f 09 2d e1 61 f8 5e 36 1f 1e | ikev2 g^x c1 70 ed 24 ed f4 d8 4e fd 57 46 fb d1 4f 47 ed | ikev2 g^x 53 5d 31 e7 1e 13 8b 95 3e 46 72 5a c0 f9 1e d0 | ikev2 g^x 00 11 60 68 91 85 15 b6 a5 b9 35 22 09 f5 1e bb | ikev2 g^x 2f 36 9e 4c 45 ba 3b e0 87 f8 18 85 4b f7 b6 9b | ikev2 g^x 48 62 35 a7 22 dd 90 30 ba 7a 3c 10 b3 65 8e 2c | ikev2 g^x 7c d8 4a 70 a8 d5 53 60 76 0c 5d 33 c9 61 54 67 | ikev2 g^x f9 1d 59 23 17 2a 52 2b c0 bf ff e6 44 b3 ef 2a | ikev2 g^x 84 a8 c8 18 68 4e c2 5c 11 a6 2e dc 53 a6 93 01 | ikev2 g^x d4 df b1 45 21 de 1f be f8 d7 e5 8a 4b 8c d0 57 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce db 8b 59 30 04 e8 61 45 59 6e b9 45 4b e0 a8 74 | IKEv2 nonce 27 04 8d 8e 65 dc 44 fc e5 bb c8 b9 d4 93 ad 2c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 34 ea b3 f2 4f 9b fd 59 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 b1 | natd_hash: port= 01 f4 | natd_hash: hash= 2e cb 52 55 02 e3 8d 62 40 06 d9 c3 25 de 61 c2 | natd_hash: hash= 25 e8 55 c6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2e cb 52 55 02 e3 8d 62 40 06 d9 c3 25 de 61 c2 | Notify data 25 e8 55 c6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 34 ea b3 f2 4f 9b fd 59 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4c c7 ad 1d 02 9d 47 2a a9 d3 98 b0 82 03 7b 27 | natd_hash: hash= 1e fc a6 ec | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4c c7 ad 1d 02 9d 47 2a a9 d3 98 b0 82 03 7b 27 | Notify data 1e fc a6 ec | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #611 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #611 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #611 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #611: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #611 to 4294967295 after switching state | Message ID: IKE #611 skipping update_recv as MD is fake | Message ID: sent #611 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-177" #611: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.177:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #611) | 34 ea b3 f2 4f 9b fd 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 65 77 23 f1 8e 59 ad e7 ff 5f de d0 89 eb 8f | e9 74 c5 98 7f 21 ce 5f 9a 27 21 a7 98 93 9e 99 | e4 27 4e b7 b3 24 fc 80 94 f6 f4 f5 9c fa 3c 88 | 3d a1 56 1a 21 1c 0e f5 0b ed e1 09 65 2e 3d d4 | 2f 57 58 dc 24 ce 14 24 1c da 0b b5 60 f1 11 17 | 1a 17 9e 79 a3 98 e2 85 17 79 fe 96 1e fd 0a 94 | db 8d d3 25 e1 09 1f 09 2d e1 61 f8 5e 36 1f 1e | c1 70 ed 24 ed f4 d8 4e fd 57 46 fb d1 4f 47 ed | 53 5d 31 e7 1e 13 8b 95 3e 46 72 5a c0 f9 1e d0 | 00 11 60 68 91 85 15 b6 a5 b9 35 22 09 f5 1e bb | 2f 36 9e 4c 45 ba 3b e0 87 f8 18 85 4b f7 b6 9b | 48 62 35 a7 22 dd 90 30 ba 7a 3c 10 b3 65 8e 2c | 7c d8 4a 70 a8 d5 53 60 76 0c 5d 33 c9 61 54 67 | f9 1d 59 23 17 2a 52 2b c0 bf ff e6 44 b3 ef 2a | 84 a8 c8 18 68 4e c2 5c 11 a6 2e dc 53 a6 93 01 | d4 df b1 45 21 de 1f be f8 d7 e5 8a 4b 8c d0 57 | 29 00 00 24 db 8b 59 30 04 e8 61 45 59 6e b9 45 | 4b e0 a8 74 27 04 8d 8e 65 dc 44 fc e5 bb c8 b9 | d4 93 ad 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e cb 52 55 02 e3 8d 62 40 06 d9 c3 | 25 de 61 c2 25 e8 55 c6 00 00 00 1c 00 00 40 05 | 4c c7 ad 1d 02 9d 47 2a a9 d3 98 b0 82 03 7b 27 | 1e fc a6 ec | state #611 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb354009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c046090 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c014cc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #611 | libevent_malloc: new ptr-libevent@0x7fb34c05ecd0 size 128 | #611 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.27489 | resume sending helper answer for #611 suppresed complete_v2_state_transition() and stole MD | #611 spent 0.43 milliseconds in resume sending helper answer | stop processing: state #611 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb348069890 | processing resume sending helper answer for #592 | start processing: state #592 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 592 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #592 | **emit ISAKMP Message: | initiator cookie: | a1 23 45 d4 95 dd 12 d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-8 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 65 aa 2a 51 f9 3f cc db 28 9d 40 57 76 30 ea e9 | ikev2 g^x 8d e6 d7 38 3a dd ae 4f ff 59 39 ea 16 ad ee 6e | ikev2 g^x 8b 62 8c ca b4 a5 29 fe c0 61 e6 51 27 98 b4 0a | ikev2 g^x 1f eb 1b 79 22 3e 1a 67 1b b4 66 38 e1 9a 6a a2 | ikev2 g^x d0 1e 24 e9 c2 02 a7 7a ce f6 a5 f9 5d be 27 4c | ikev2 g^x 71 60 3e f2 bd 07 c5 5b 34 15 a1 fe 4b da 4c bd | ikev2 g^x 44 c6 05 67 90 ad 62 fe e2 99 3c 11 2a d0 f3 17 | ikev2 g^x 69 1b 22 6b a5 0d 80 74 ae 19 6c 94 76 90 a1 1c | ikev2 g^x 59 0b 47 78 27 d8 48 ac 3b c0 4d 98 1f d5 86 fc | ikev2 g^x d6 cb 0d 55 39 de b7 61 51 01 6d fe 92 8b ba 96 | ikev2 g^x 45 95 1a c6 f8 88 e3 b7 dc ed d9 6d 83 dc 83 68 | ikev2 g^x 4d da 82 e4 55 42 9e db 10 13 37 0e 08 44 e6 b7 | ikev2 g^x 92 01 b4 fc 5c 47 c0 bf f0 3a 42 10 d3 9f ca d3 | ikev2 g^x 90 f7 0f 4b cd cb 5e ac e6 87 b1 ad ed 51 0d 4e | ikev2 g^x 56 09 8e ae e0 0b a3 ad 21 69 a1 8d b6 00 f2 12 | ikev2 g^x 05 e3 09 dd f9 79 f5 d1 86 62 dd e9 ff 12 f6 c1 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 51 68 bd 9e 33 71 03 a6 00 f3 23 81 c3 a4 22 43 | IKEv2 nonce b3 42 e5 96 7c d8 19 4b ab d2 fa d7 63 4d bc 6e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a1 23 45 d4 95 dd 12 d8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 08 | natd_hash: port= 01 f4 | natd_hash: hash= 36 b9 87 25 a7 de 47 1d dc da 4c 20 6f cb f5 ab | natd_hash: hash= 4e bb c1 b5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 36 b9 87 25 a7 de 47 1d dc da 4c 20 6f cb f5 ab | Notify data 4e bb c1 b5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a1 23 45 d4 95 dd 12 d8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 3d 18 a6 af a0 2d 17 8e 57 6e 37 da 3a df 31 9a | natd_hash: hash= 3f 4d c5 fe | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3d 18 a6 af a0 2d 17 8e 57 6e 37 da 3a df 31 9a | Notify data 3f 4d c5 fe | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #592 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #592 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #592 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #592: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #592 to 4294967295 after switching state | Message ID: IKE #592 skipping update_recv as MD is fake | Message ID: sent #592 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-8" #592: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.8:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #592) | a1 23 45 d4 95 dd 12 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 aa 2a 51 f9 3f cc db 28 9d 40 57 76 30 ea e9 | 8d e6 d7 38 3a dd ae 4f ff 59 39 ea 16 ad ee 6e | 8b 62 8c ca b4 a5 29 fe c0 61 e6 51 27 98 b4 0a | 1f eb 1b 79 22 3e 1a 67 1b b4 66 38 e1 9a 6a a2 | d0 1e 24 e9 c2 02 a7 7a ce f6 a5 f9 5d be 27 4c | 71 60 3e f2 bd 07 c5 5b 34 15 a1 fe 4b da 4c bd | 44 c6 05 67 90 ad 62 fe e2 99 3c 11 2a d0 f3 17 | 69 1b 22 6b a5 0d 80 74 ae 19 6c 94 76 90 a1 1c | 59 0b 47 78 27 d8 48 ac 3b c0 4d 98 1f d5 86 fc | d6 cb 0d 55 39 de b7 61 51 01 6d fe 92 8b ba 96 | 45 95 1a c6 f8 88 e3 b7 dc ed d9 6d 83 dc 83 68 | 4d da 82 e4 55 42 9e db 10 13 37 0e 08 44 e6 b7 | 92 01 b4 fc 5c 47 c0 bf f0 3a 42 10 d3 9f ca d3 | 90 f7 0f 4b cd cb 5e ac e6 87 b1 ad ed 51 0d 4e | 56 09 8e ae e0 0b a3 ad 21 69 a1 8d b6 00 f2 12 | 05 e3 09 dd f9 79 f5 d1 86 62 dd e9 ff 12 f6 c1 | 29 00 00 24 51 68 bd 9e 33 71 03 a6 00 f3 23 81 | c3 a4 22 43 b3 42 e5 96 7c d8 19 4b ab d2 fa d7 | 63 4d bc 6e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 b9 87 25 a7 de 47 1d dc da 4c 20 | 6f cb f5 ab 4e bb c1 b5 00 00 00 1c 00 00 40 05 | 3d 18 a6 af a0 2d 17 8e 57 6e 37 da 3a df 31 9a | 3f 4d c5 fe | state #592 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38000fb00 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a276e0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348046090 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #592 | libevent_malloc: new ptr-libevent@0x7fb348069890 size 128 | #592 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.275355 | resume sending helper answer for #592 suppresed complete_v2_state_transition() and stole MD | #592 spent 0.44 milliseconds in resume sending helper answer | stop processing: state #592 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb384063190 | processing resume sending helper answer for #597 | start processing: state #597 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 597 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #597 | **emit ISAKMP Message: | initiator cookie: | b4 11 eb c0 3c ee 82 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-22 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 4b e2 a7 57 e1 0e 89 3c 5e 5c ad af 7e 70 cd ff | ikev2 g^x 21 89 77 18 f4 e7 a2 a2 0b 97 a2 cc 0c 79 62 a6 | ikev2 g^x 53 17 8a bc 8d 3b 08 6c 40 4e e0 76 7d d4 d1 91 | ikev2 g^x bf c5 8b f9 61 7f eb 07 6d 14 8e d7 2e 13 4b b7 | ikev2 g^x 14 c2 d5 04 cf 8a cc ac 4e ae 84 9f 14 5a e5 10 | ikev2 g^x da ae 54 d6 70 48 a3 a7 d0 ef ea bc 55 27 5a 82 | ikev2 g^x 23 5b 52 be c1 f3 53 be bb 7d 21 37 c3 a9 7f 33 | ikev2 g^x c7 62 04 d8 71 42 47 a0 d7 41 5f d1 4d c5 32 46 | ikev2 g^x 77 62 f1 35 9a 43 b7 7e 06 40 63 92 bb 12 f6 65 | ikev2 g^x 95 37 e9 95 f6 44 66 e5 21 74 8a 91 88 04 ad e6 | ikev2 g^x 73 e6 dc 01 ed 0f a5 fb 40 2f 2a d6 15 cc f9 e5 | ikev2 g^x 64 76 7c 1a f7 fd 4f e9 ea 7f 6a ab 40 67 b0 84 | ikev2 g^x 31 a8 8a 3e e0 7c 8e 22 7d 83 59 b3 8c 60 24 8d | ikev2 g^x 8b 1d 5a 54 65 8f 80 6f 96 65 ca 43 c8 a7 28 f6 | ikev2 g^x 55 d4 fa 1a 47 2e 73 c8 9e ce 9b a4 9b 29 e3 96 | ikev2 g^x 97 ae 07 06 04 32 86 2a 42 ce 44 45 22 8b ed a9 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 49 1d 06 1e f3 92 fd 55 9e 0a 50 15 a6 41 c4 55 | IKEv2 nonce df 85 ea d9 9d 51 f8 0d da 8c c6 ac 25 cc 84 3d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b4 11 eb c0 3c ee 82 31 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 16 | natd_hash: port= 01 f4 | natd_hash: hash= 2d c2 73 38 8d 54 94 82 d9 af a8 f8 7c 2d a7 d4 | natd_hash: hash= 83 28 88 71 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2d c2 73 38 8d 54 94 82 d9 af a8 f8 7c 2d a7 d4 | Notify data 83 28 88 71 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b4 11 eb c0 3c ee 82 31 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= dd 49 b4 51 8c 53 2c 7a 9c 58 4d c4 6e bc 08 eb | natd_hash: hash= ca 20 63 19 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dd 49 b4 51 8c 53 2c 7a 9c 58 4d c4 6e bc 08 eb | Notify data ca 20 63 19 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #597 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #597 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #597 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #597: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #597 to 4294967295 after switching state | Message ID: IKE #597 skipping update_recv as MD is fake | Message ID: sent #597 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-22" #597: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.22:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #597) | b4 11 eb c0 3c ee 82 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b e2 a7 57 e1 0e 89 3c 5e 5c ad af 7e 70 cd ff | 21 89 77 18 f4 e7 a2 a2 0b 97 a2 cc 0c 79 62 a6 | 53 17 8a bc 8d 3b 08 6c 40 4e e0 76 7d d4 d1 91 | bf c5 8b f9 61 7f eb 07 6d 14 8e d7 2e 13 4b b7 | 14 c2 d5 04 cf 8a cc ac 4e ae 84 9f 14 5a e5 10 | da ae 54 d6 70 48 a3 a7 d0 ef ea bc 55 27 5a 82 | 23 5b 52 be c1 f3 53 be bb 7d 21 37 c3 a9 7f 33 | c7 62 04 d8 71 42 47 a0 d7 41 5f d1 4d c5 32 46 | 77 62 f1 35 9a 43 b7 7e 06 40 63 92 bb 12 f6 65 | 95 37 e9 95 f6 44 66 e5 21 74 8a 91 88 04 ad e6 | 73 e6 dc 01 ed 0f a5 fb 40 2f 2a d6 15 cc f9 e5 | 64 76 7c 1a f7 fd 4f e9 ea 7f 6a ab 40 67 b0 84 | 31 a8 8a 3e e0 7c 8e 22 7d 83 59 b3 8c 60 24 8d | 8b 1d 5a 54 65 8f 80 6f 96 65 ca 43 c8 a7 28 f6 | 55 d4 fa 1a 47 2e 73 c8 9e ce 9b a4 9b 29 e3 96 | 97 ae 07 06 04 32 86 2a 42 ce 44 45 22 8b ed a9 | 29 00 00 24 49 1d 06 1e f3 92 fd 55 9e 0a 50 15 | a6 41 c4 55 df 85 ea d9 9d 51 f8 0d da 8c c6 ac | 25 cc 84 3d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d c2 73 38 8d 54 94 82 d9 af a8 f8 | 7c 2d a7 d4 83 28 88 71 00 00 00 1c 00 00 40 05 | dd 49 b4 51 8c 53 2c 7a 9c 58 4d c4 6e bc 08 eb | ca 20 63 19 | state #597 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35803a770 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35801d710 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35801d710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #597 | libevent_malloc: new ptr-libevent@0x7fb384063190 size 128 | #597 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.275686 | resume sending helper answer for #597 suppresed complete_v2_state_transition() and stole MD | #597 spent 0.303 milliseconds in resume sending helper answer | stop processing: state #597 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb348064130 | processing resume sending helper answer for #603 | start processing: state #603 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 603 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #603 | **emit ISAKMP Message: | initiator cookie: | fa ea 40 d9 66 be 9a 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-94 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 66 92 c5 c1 75 76 e2 67 5a 25 6a 0b 6a 26 d9 00 | ikev2 g^x 60 88 8f a2 09 bc e1 34 ad d9 cb d7 8f 0c c9 fb | ikev2 g^x 5d 34 e8 7a 58 2c 44 52 32 ff f3 22 30 6c a9 46 | ikev2 g^x 04 15 9a 62 ca cf b2 db c2 74 ba 23 f1 4f 38 d1 | ikev2 g^x 41 e3 74 a5 ba b3 6d 59 07 f6 3b ea 03 a8 2b 84 | ikev2 g^x a0 ed 8d 1c c1 de 56 07 5d c4 0b 77 93 2f 7b 97 | ikev2 g^x 14 b0 d1 04 7b b9 0f f9 37 a9 bc e0 4a 4f 00 f2 | ikev2 g^x 2d 96 5a aa 23 a5 de 2a 49 0f d1 e1 16 3d 5e c0 | ikev2 g^x ad 4a da ab ad 5b 58 e6 5a 4f 98 f0 fc a6 f1 b7 | ikev2 g^x 23 d2 f2 3b e5 a7 21 e7 ea e1 cd 13 d1 70 91 3a | ikev2 g^x 21 85 1b c9 4c 39 e7 cc bc a4 f6 9c d6 c5 38 7d | ikev2 g^x 67 8f f8 b4 07 fc 7b 89 3f 70 75 29 51 a4 a4 f6 | ikev2 g^x f2 64 d3 35 1a 69 f9 96 67 39 7b ea 78 c8 ec c0 | ikev2 g^x ee f5 ef 8b fa 9d ea d8 61 b7 28 83 06 af 52 08 | ikev2 g^x a9 ac 31 1a a8 b0 a9 01 03 7b 63 e4 2e d4 f8 cd | ikev2 g^x 6a 2c 19 36 b8 74 36 aa da ff b3 99 0c f5 14 c0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c1 66 a4 b2 e8 08 5a f7 00 1d be e4 4b 24 90 f6 | IKEv2 nonce 2d 3e 76 77 76 ca 57 42 50 10 a0 64 0f 04 48 75 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fa ea 40 d9 66 be 9a 5d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5e | natd_hash: port= 01 f4 | natd_hash: hash= a5 e6 7e df 78 16 4d e7 97 e4 d0 17 4d c7 b1 fe | natd_hash: hash= f3 78 c1 ee | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a5 e6 7e df 78 16 4d e7 97 e4 d0 17 4d c7 b1 fe | Notify data f3 78 c1 ee | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fa ea 40 d9 66 be 9a 5d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= b6 73 08 f2 9b c6 7e f9 57 b7 a7 5f 43 dc 0e 73 | natd_hash: hash= 16 6a dc 75 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b6 73 08 f2 9b c6 7e f9 57 b7 a7 5f 43 dc 0e 73 | Notify data 16 6a dc 75 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #603 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #603 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #603 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #603: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #603 to 4294967295 after switching state | Message ID: IKE #603 skipping update_recv as MD is fake | Message ID: sent #603 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-94" #603: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.94:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #603) | fa ea 40 d9 66 be 9a 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 92 c5 c1 75 76 e2 67 5a 25 6a 0b 6a 26 d9 00 | 60 88 8f a2 09 bc e1 34 ad d9 cb d7 8f 0c c9 fb | 5d 34 e8 7a 58 2c 44 52 32 ff f3 22 30 6c a9 46 | 04 15 9a 62 ca cf b2 db c2 74 ba 23 f1 4f 38 d1 | 41 e3 74 a5 ba b3 6d 59 07 f6 3b ea 03 a8 2b 84 | a0 ed 8d 1c c1 de 56 07 5d c4 0b 77 93 2f 7b 97 | 14 b0 d1 04 7b b9 0f f9 37 a9 bc e0 4a 4f 00 f2 | 2d 96 5a aa 23 a5 de 2a 49 0f d1 e1 16 3d 5e c0 | ad 4a da ab ad 5b 58 e6 5a 4f 98 f0 fc a6 f1 b7 | 23 d2 f2 3b e5 a7 21 e7 ea e1 cd 13 d1 70 91 3a | 21 85 1b c9 4c 39 e7 cc bc a4 f6 9c d6 c5 38 7d | 67 8f f8 b4 07 fc 7b 89 3f 70 75 29 51 a4 a4 f6 | f2 64 d3 35 1a 69 f9 96 67 39 7b ea 78 c8 ec c0 | ee f5 ef 8b fa 9d ea d8 61 b7 28 83 06 af 52 08 | a9 ac 31 1a a8 b0 a9 01 03 7b 63 e4 2e d4 f8 cd | 6a 2c 19 36 b8 74 36 aa da ff b3 99 0c f5 14 c0 | 29 00 00 24 c1 66 a4 b2 e8 08 5a f7 00 1d be e4 | 4b 24 90 f6 2d 3e 76 77 76 ca 57 42 50 10 a0 64 | 0f 04 48 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 e6 7e df 78 16 4d e7 97 e4 d0 17 | 4d c7 b1 fe f3 78 c1 ee 00 00 00 1c 00 00 40 05 | b6 73 08 f2 9b c6 7e f9 57 b7 a7 5f 43 dc 0e 73 | 16 6a dc 75 | state #603 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380048a80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46af78c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34802ef50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #603 | libevent_malloc: new ptr-libevent@0x7fb348064130 size 128 | #603 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.27599 | resume sending helper answer for #603 suppresed complete_v2_state_transition() and stole MD | #603 spent 0.288 milliseconds in resume sending helper answer | stop processing: state #603 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb380075050 | processing resume sending helper answer for #589 | start processing: state #589 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 589 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #589 | **emit ISAKMP Message: | initiator cookie: | d3 af ea 9d a0 c8 f5 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-55 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 85 de 4e 18 e6 1e 19 90 6b f7 90 15 af f6 7b ab | ikev2 g^x 4e c8 ce d7 0b 8e 81 b9 f2 4f 1d 4f 5c 24 63 06 | ikev2 g^x 65 52 bc 5a 83 ff 1b 21 cb 72 47 f8 8a e5 91 bf | ikev2 g^x 57 3c 5e f9 8a 0f 69 ef dd 9a d9 96 96 d3 e9 53 | ikev2 g^x 62 6d 85 78 9c cd f3 37 3d c3 3f cf 12 49 52 71 | ikev2 g^x f1 91 04 7a b7 09 2f 96 56 e2 dd 46 62 33 b5 bb | ikev2 g^x ad 3c f9 d1 69 f8 6d d3 fc 9b 28 0f 28 e0 3e bf | ikev2 g^x f2 8d 28 0d c0 bd 56 d2 fc f5 11 53 c5 5f 98 5e | ikev2 g^x b5 0e 16 d8 79 1e 33 2e 4d 24 12 5b e7 2c e3 82 | ikev2 g^x 41 23 5b 9c d9 c3 1b 4e c2 1c 19 6a a5 1e 04 2e | ikev2 g^x 8f c8 de 18 5d d7 71 bd 41 ae f2 b5 79 ea 41 40 | ikev2 g^x 17 cc b2 ac f4 29 ea 95 03 3b 8a b9 65 ec 40 16 | ikev2 g^x 4f a4 1c c9 6c af b5 25 5c 3f 1a 3d 18 fe 4c 4f | ikev2 g^x 96 cd 0e a4 e1 ca 37 96 3c 03 bf a5 07 0a 64 5f | ikev2 g^x 91 2f ea fc 4d 6d 98 68 7e 74 f7 83 b0 39 d7 b8 | ikev2 g^x 05 fa 66 7a ad 18 d9 82 14 ae c6 e8 1d a4 b3 22 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8c a0 dd 88 ca d4 16 c6 d2 19 83 fb 91 96 4d 43 | IKEv2 nonce b6 4d b2 a0 b1 2f 06 3d 0c a8 88 7c 52 87 c6 7a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d3 af ea 9d a0 c8 f5 7f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 37 | natd_hash: port= 01 f4 | natd_hash: hash= 18 52 21 ef 0c fd d6 a8 97 22 3e 1c 84 a2 1f 0e | natd_hash: hash= d5 18 e7 d5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 18 52 21 ef 0c fd d6 a8 97 22 3e 1c 84 a2 1f 0e | Notify data d5 18 e7 d5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d3 af ea 9d a0 c8 f5 7f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1e 9e 9c e9 d7 26 c7 2f ea de f3 cf 5b ae 57 9b | natd_hash: hash= ea f6 3e d1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1e 9e 9c e9 d7 26 c7 2f ea de f3 cf 5b ae 57 9b | Notify data ea f6 3e d1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #589 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #589 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #589 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #589: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #589 to 4294967295 after switching state | Message ID: IKE #589 skipping update_recv as MD is fake | Message ID: sent #589 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-55" #589: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.55:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #589) | d3 af ea 9d a0 c8 f5 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 de 4e 18 e6 1e 19 90 6b f7 90 15 af f6 7b ab | 4e c8 ce d7 0b 8e 81 b9 f2 4f 1d 4f 5c 24 63 06 | 65 52 bc 5a 83 ff 1b 21 cb 72 47 f8 8a e5 91 bf | 57 3c 5e f9 8a 0f 69 ef dd 9a d9 96 96 d3 e9 53 | 62 6d 85 78 9c cd f3 37 3d c3 3f cf 12 49 52 71 | f1 91 04 7a b7 09 2f 96 56 e2 dd 46 62 33 b5 bb | ad 3c f9 d1 69 f8 6d d3 fc 9b 28 0f 28 e0 3e bf | f2 8d 28 0d c0 bd 56 d2 fc f5 11 53 c5 5f 98 5e | b5 0e 16 d8 79 1e 33 2e 4d 24 12 5b e7 2c e3 82 | 41 23 5b 9c d9 c3 1b 4e c2 1c 19 6a a5 1e 04 2e | 8f c8 de 18 5d d7 71 bd 41 ae f2 b5 79 ea 41 40 | 17 cc b2 ac f4 29 ea 95 03 3b 8a b9 65 ec 40 16 | 4f a4 1c c9 6c af b5 25 5c 3f 1a 3d 18 fe 4c 4f | 96 cd 0e a4 e1 ca 37 96 3c 03 bf a5 07 0a 64 5f | 91 2f ea fc 4d 6d 98 68 7e 74 f7 83 b0 39 d7 b8 | 05 fa 66 7a ad 18 d9 82 14 ae c6 e8 1d a4 b3 22 | 29 00 00 24 8c a0 dd 88 ca d4 16 c6 d2 19 83 fb | 91 96 4d 43 b6 4d b2 a0 b1 2f 06 3d 0c a8 88 7c | 52 87 c6 7a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 52 21 ef 0c fd d6 a8 97 22 3e 1c | 84 a2 1f 0e d5 18 e7 d5 00 00 00 1c 00 00 40 05 | 1e 9e 9c e9 d7 26 c7 2f ea de f3 cf 5b ae 57 9b | ea f6 3e d1 | state #589 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34800cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #589 | libevent_malloc: new ptr-libevent@0x7fb380075050 size 128 | #589 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.276473 | resume sending helper answer for #589 suppresed complete_v2_state_transition() and stole MD | #589 spent 0.444 milliseconds in resume sending helper answer | stop processing: state #589 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb364064990 | processing resume sending helper answer for #594 | start processing: state #594 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 594 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #594 | **emit ISAKMP Message: | initiator cookie: | 14 02 06 51 b1 9f 6a a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-81 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x bd 01 b3 9f af 09 be 89 fe fb 88 0b 7e e8 81 63 | ikev2 g^x 3e a8 ca 5b cb 2b 71 61 2e 3d 71 13 67 81 27 7f | ikev2 g^x eb 09 e9 81 30 e6 ac e6 a5 a8 3b 20 84 58 c8 8e | ikev2 g^x 6a 8b fc c9 8a c5 b6 c5 c4 e6 6c f7 d0 89 56 fa | ikev2 g^x e1 09 5c fd 09 c4 5c 8e a9 af d1 7a 3b a1 f4 b6 | ikev2 g^x f4 3f 0e 9b a9 94 b9 07 50 f1 fc bf a3 65 7f de | ikev2 g^x 3a 00 2f 52 8f 64 57 78 ce a7 f9 c4 ca 58 9d 51 | ikev2 g^x 1b 37 06 31 32 08 90 da a6 51 c5 05 d8 cf c0 4f | ikev2 g^x 6d 65 03 f8 31 ce 3e 2a 1f 85 59 ce 64 5d bd 91 | ikev2 g^x 39 62 91 67 e1 9a c3 02 a2 c6 12 25 4d 06 14 65 | ikev2 g^x 6d 4a 67 38 16 9a f3 0a 7f 67 14 d2 64 51 73 a3 | ikev2 g^x e8 d4 99 7f 98 eb 17 a7 87 c4 3d ef f7 49 b0 e7 | ikev2 g^x 3a ee 43 b6 89 d7 8e f9 6d 93 94 5f f6 b9 7c ae | ikev2 g^x ad a8 c0 d7 b6 71 30 2a f0 19 1d a7 ef c7 69 67 | ikev2 g^x 34 56 cd 9a ca bc 4f 05 69 d7 a7 23 37 a8 31 2d | ikev2 g^x ac 76 9e 29 2f 6b f3 a4 f9 9b 74 9e 13 92 6d f7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce bd 30 97 0e 1f 3d f9 71 c1 31 b3 cc d2 39 eb d3 | IKEv2 nonce 0e 5f a7 cb d6 93 2f f7 82 b0 8d 4f bd 25 0f a6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 14 02 06 51 b1 9f 6a a2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 51 | natd_hash: port= 01 f4 | natd_hash: hash= b2 ad 41 74 91 af 29 e4 13 15 1e a9 90 db 4d 21 | natd_hash: hash= 18 96 06 09 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b2 ad 41 74 91 af 29 e4 13 15 1e a9 90 db 4d 21 | Notify data 18 96 06 09 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 14 02 06 51 b1 9f 6a a2 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ae cb 83 03 f3 ff ad 0d 96 aa 50 d8 b2 3b f6 cf | natd_hash: hash= f4 56 d5 60 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ae cb 83 03 f3 ff ad 0d 96 aa 50 d8 b2 3b f6 cf | Notify data f4 56 d5 60 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #594 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #594 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #594 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #594: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #594 to 4294967295 after switching state | Message ID: IKE #594 skipping update_recv as MD is fake | Message ID: sent #594 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-81" #594: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.81:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #594) | 14 02 06 51 b1 9f 6a a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd 01 b3 9f af 09 be 89 fe fb 88 0b 7e e8 81 63 | 3e a8 ca 5b cb 2b 71 61 2e 3d 71 13 67 81 27 7f | eb 09 e9 81 30 e6 ac e6 a5 a8 3b 20 84 58 c8 8e | 6a 8b fc c9 8a c5 b6 c5 c4 e6 6c f7 d0 89 56 fa | e1 09 5c fd 09 c4 5c 8e a9 af d1 7a 3b a1 f4 b6 | f4 3f 0e 9b a9 94 b9 07 50 f1 fc bf a3 65 7f de | 3a 00 2f 52 8f 64 57 78 ce a7 f9 c4 ca 58 9d 51 | 1b 37 06 31 32 08 90 da a6 51 c5 05 d8 cf c0 4f | 6d 65 03 f8 31 ce 3e 2a 1f 85 59 ce 64 5d bd 91 | 39 62 91 67 e1 9a c3 02 a2 c6 12 25 4d 06 14 65 | 6d 4a 67 38 16 9a f3 0a 7f 67 14 d2 64 51 73 a3 | e8 d4 99 7f 98 eb 17 a7 87 c4 3d ef f7 49 b0 e7 | 3a ee 43 b6 89 d7 8e f9 6d 93 94 5f f6 b9 7c ae | ad a8 c0 d7 b6 71 30 2a f0 19 1d a7 ef c7 69 67 | 34 56 cd 9a ca bc 4f 05 69 d7 a7 23 37 a8 31 2d | ac 76 9e 29 2f 6b f3 a4 f9 9b 74 9e 13 92 6d f7 | 29 00 00 24 bd 30 97 0e 1f 3d f9 71 c1 31 b3 cc | d2 39 eb d3 0e 5f a7 cb d6 93 2f f7 82 b0 8d 4f | bd 25 0f a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 ad 41 74 91 af 29 e4 13 15 1e a9 | 90 db 4d 21 18 96 06 09 00 00 00 1c 00 00 40 05 | ae cb 83 03 f3 ff ad 0d 96 aa 50 d8 b2 3b f6 cf | f4 56 d5 60 | state #594 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3500342b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb350040840 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364044c30 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #594 | libevent_malloc: new ptr-libevent@0x7fb364064990 size 128 | #594 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.276969 | resume sending helper answer for #594 suppresed complete_v2_state_transition() and stole MD | #594 spent 0.458 milliseconds in resume sending helper answer | stop processing: state #594 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3600618f0 | processing resume sending helper answer for #604 | start processing: state #604 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 604 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #604 | **emit ISAKMP Message: | initiator cookie: | 9c 9a a9 b6 8a 18 20 aa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-20 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 24 db 14 9f c8 04 2c a7 94 4d c0 41 4e 48 db 16 | ikev2 g^x 43 7e f5 96 b7 92 19 68 4f 28 dd 93 9c b2 03 ee | ikev2 g^x 00 e3 3a 70 b5 7f 63 e8 29 5f c1 3e d5 1e 9b 18 | ikev2 g^x 03 51 46 eb e9 1e 7f 95 79 9d a5 6c e6 38 16 02 | ikev2 g^x 06 77 87 00 da 11 bf 13 c1 4d 3a 44 84 ac 6b d3 | ikev2 g^x f7 9d c3 0a 19 49 98 cc af ba f2 e2 42 43 00 0c | ikev2 g^x 55 a9 00 12 93 95 82 e7 62 10 92 7e b5 54 fd bf | ikev2 g^x e8 83 82 ec 9d 8a 27 cf cd 74 11 b0 80 50 2e c7 | ikev2 g^x b3 2a ee 0c ca 12 67 95 57 e8 8f db b1 d7 be ea | ikev2 g^x dc 1c 36 57 ad 82 d5 d6 b8 ca 9d c1 19 69 b7 98 | ikev2 g^x 1a b0 e8 89 42 c5 72 7b 2c ac a1 8f 37 62 b4 d5 | ikev2 g^x d1 07 d7 cf 2b a0 47 98 cd bd cd 39 54 ed 85 7b | ikev2 g^x e7 4a 46 42 99 3a 84 b2 44 0b 60 db 17 1f 1a 47 | ikev2 g^x 96 ad e7 df 64 10 90 db 2e 4b b5 22 6e b2 0f d8 | ikev2 g^x ab 1d 9f cc da 67 78 10 6b ef f0 21 60 7f 46 37 | ikev2 g^x ce e2 4d 55 5c ce 37 f5 05 f9 20 86 fe 7e f4 34 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b3 5a 22 9d ad 8e aa d7 db 87 b7 86 99 f5 d3 0b | IKEv2 nonce 6d dc 71 e3 8c 25 ed 59 9c d6 d9 01 28 70 17 f3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9c 9a a9 b6 8a 18 20 aa | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 14 | natd_hash: port= 01 f4 | natd_hash: hash= c9 ee b6 7a e3 a9 a6 b5 56 be cc 5f 53 8f bf c6 | natd_hash: hash= c1 49 39 f9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c9 ee b6 7a e3 a9 a6 b5 56 be cc 5f 53 8f bf c6 | Notify data c1 49 39 f9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9c 9a a9 b6 8a 18 20 aa | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 8b 15 2f 3d 66 90 78 e5 b9 a0 df af d9 66 18 c4 | natd_hash: hash= 1f 04 f3 7c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8b 15 2f 3d 66 90 78 e5 b9 a0 df af d9 66 18 c4 | Notify data 1f 04 f3 7c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #604 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #604 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #604 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #604: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #604 to 4294967295 after switching state | Message ID: IKE #604 skipping update_recv as MD is fake | Message ID: sent #604 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-20" #604: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.20:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #604) | 9c 9a a9 b6 8a 18 20 aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 db 14 9f c8 04 2c a7 94 4d c0 41 4e 48 db 16 | 43 7e f5 96 b7 92 19 68 4f 28 dd 93 9c b2 03 ee | 00 e3 3a 70 b5 7f 63 e8 29 5f c1 3e d5 1e 9b 18 | 03 51 46 eb e9 1e 7f 95 79 9d a5 6c e6 38 16 02 | 06 77 87 00 da 11 bf 13 c1 4d 3a 44 84 ac 6b d3 | f7 9d c3 0a 19 49 98 cc af ba f2 e2 42 43 00 0c | 55 a9 00 12 93 95 82 e7 62 10 92 7e b5 54 fd bf | e8 83 82 ec 9d 8a 27 cf cd 74 11 b0 80 50 2e c7 | b3 2a ee 0c ca 12 67 95 57 e8 8f db b1 d7 be ea | dc 1c 36 57 ad 82 d5 d6 b8 ca 9d c1 19 69 b7 98 | 1a b0 e8 89 42 c5 72 7b 2c ac a1 8f 37 62 b4 d5 | d1 07 d7 cf 2b a0 47 98 cd bd cd 39 54 ed 85 7b | e7 4a 46 42 99 3a 84 b2 44 0b 60 db 17 1f 1a 47 | 96 ad e7 df 64 10 90 db 2e 4b b5 22 6e b2 0f d8 | ab 1d 9f cc da 67 78 10 6b ef f0 21 60 7f 46 37 | ce e2 4d 55 5c ce 37 f5 05 f9 20 86 fe 7e f4 34 | 29 00 00 24 b3 5a 22 9d ad 8e aa d7 db 87 b7 86 | 99 f5 d3 0b 6d dc 71 e3 8c 25 ed 59 9c d6 d9 01 | 28 70 17 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 ee b6 7a e3 a9 a6 b5 56 be cc 5f | 53 8f bf c6 c1 49 39 f9 00 00 00 1c 00 00 40 05 | 8b 15 2f 3d 66 90 78 e5 b9 a0 df af d9 66 18 c4 | 1f 04 f3 7c | state #604 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb33803a770 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb3380300a0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3380300a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #604 | libevent_malloc: new ptr-libevent@0x7fb3600618f0 size 128 | #604 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.277465 | resume sending helper answer for #604 suppresed complete_v2_state_transition() and stole MD | #604 spent 0.45 milliseconds in resume sending helper answer | stop processing: state #604 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c064a30 | processing resume sending helper answer for #600 | start processing: state #600 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 600 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #600 | **emit ISAKMP Message: | initiator cookie: | b5 8b 9d 63 05 76 9b 43 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-128 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 12 cd c7 d7 3f 0d bb 77 fc d1 1c ab 77 ae 86 ac | ikev2 g^x 26 75 19 1c 77 04 4b 07 7b 30 6a 0f e9 ae b1 4b | ikev2 g^x c2 01 f0 be 77 bc 8d 29 4a 13 80 84 01 ec bb bd | ikev2 g^x 9b b4 e0 a3 b9 74 4d fb 59 f0 b1 62 7c 23 17 59 | ikev2 g^x c2 35 47 24 40 0e 78 ba 49 8d c1 80 7f ff 22 b6 | ikev2 g^x b6 ec 09 5b c1 9f 87 91 ac ef 09 c3 af 78 0a ea | ikev2 g^x 0d 6b a8 42 f1 3e 23 89 64 a8 83 5d 1d d4 84 5e | ikev2 g^x 9f 78 c2 0c 76 ee a4 76 88 78 0a d8 84 b9 ea 14 | ikev2 g^x dd aa 58 60 5c f2 1b 26 59 8d ee 35 91 31 11 6a | ikev2 g^x cf c7 9c 82 87 ed 5c 03 ab 49 fc a4 ec 38 af ae | ikev2 g^x f6 1b bb 87 fe b6 4a 50 60 6c cc b3 1f fa 42 68 | ikev2 g^x 77 69 10 7a 5c 8f 12 4e bd d8 46 98 43 dd e4 54 | ikev2 g^x ef 5e 86 b8 15 8e 41 80 e5 10 0a c9 f6 e4 9a c2 | ikev2 g^x 27 59 fd b1 5d 0b 98 f8 ff 0f 21 7b 55 71 56 50 | ikev2 g^x d6 a8 f9 25 e7 e0 02 03 dc 47 72 cd 38 48 9d 8f | ikev2 g^x 84 5d 29 5a e4 04 82 0c 5c 9a 7a 00 38 a3 32 1f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7c 62 68 cd 4f 9b 4e a6 25 ba ff b3 1c a3 6a 45 | IKEv2 nonce 01 89 4e 8a 82 38 6d ae a7 aa 34 d8 c6 f1 4c f8 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b5 8b 9d 63 05 76 9b 43 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 80 | natd_hash: port= 01 f4 | natd_hash: hash= 87 57 11 53 15 68 5a b5 7f fe 43 f0 b9 a0 3d 5f | natd_hash: hash= 8d 50 a5 03 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 87 57 11 53 15 68 5a b5 7f fe 43 f0 b9 a0 3d 5f | Notify data 8d 50 a5 03 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b5 8b 9d 63 05 76 9b 43 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 6b cb 38 0e d2 0e ef 73 17 ed 32 a7 bd 62 17 c9 | natd_hash: hash= 6a 1f 87 d1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 6b cb 38 0e d2 0e ef 73 17 ed 32 a7 bd 62 17 c9 | Notify data 6a 1f 87 d1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #600 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #600 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #600 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #600: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #600 to 4294967295 after switching state | Message ID: IKE #600 skipping update_recv as MD is fake | Message ID: sent #600 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-128" #600: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.128:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #600) | b5 8b 9d 63 05 76 9b 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 cd c7 d7 3f 0d bb 77 fc d1 1c ab 77 ae 86 ac | 26 75 19 1c 77 04 4b 07 7b 30 6a 0f e9 ae b1 4b | c2 01 f0 be 77 bc 8d 29 4a 13 80 84 01 ec bb bd | 9b b4 e0 a3 b9 74 4d fb 59 f0 b1 62 7c 23 17 59 | c2 35 47 24 40 0e 78 ba 49 8d c1 80 7f ff 22 b6 | b6 ec 09 5b c1 9f 87 91 ac ef 09 c3 af 78 0a ea | 0d 6b a8 42 f1 3e 23 89 64 a8 83 5d 1d d4 84 5e | 9f 78 c2 0c 76 ee a4 76 88 78 0a d8 84 b9 ea 14 | dd aa 58 60 5c f2 1b 26 59 8d ee 35 91 31 11 6a | cf c7 9c 82 87 ed 5c 03 ab 49 fc a4 ec 38 af ae | f6 1b bb 87 fe b6 4a 50 60 6c cc b3 1f fa 42 68 | 77 69 10 7a 5c 8f 12 4e bd d8 46 98 43 dd e4 54 | ef 5e 86 b8 15 8e 41 80 e5 10 0a c9 f6 e4 9a c2 | 27 59 fd b1 5d 0b 98 f8 ff 0f 21 7b 55 71 56 50 | d6 a8 f9 25 e7 e0 02 03 dc 47 72 cd 38 48 9d 8f | 84 5d 29 5a e4 04 82 0c 5c 9a 7a 00 38 a3 32 1f | 29 00 00 24 7c 62 68 cd 4f 9b 4e a6 25 ba ff b3 | 1c a3 6a 45 01 89 4e 8a 82 38 6d ae a7 aa 34 d8 | c6 f1 4c f8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 57 11 53 15 68 5a b5 7f fe 43 f0 | b9 a0 3d 5f 8d 50 a5 03 00 00 00 1c 00 00 40 05 | 6b cb 38 0e d2 0e ef 73 17 ed 32 a7 bd 62 17 c9 | 6a 1f 87 d1 | state #600 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb378044ad0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37802a910 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a910 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #600 | libevent_malloc: new ptr-libevent@0x7fb36c064a30 size 128 | #600 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.277963 | resume sending helper answer for #600 suppresed complete_v2_state_transition() and stole MD | #600 spent 0.46 milliseconds in resume sending helper answer | stop processing: state #600 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35805f320 | processing resume sending helper answer for #598 | start processing: state #598 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 598 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #598 | **emit ISAKMP Message: | initiator cookie: | c9 b5 3a 18 c3 59 d6 00 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-89 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0c 21 c1 2e ba 75 c9 09 d5 c3 93 96 ab d0 78 6e | ikev2 g^x 7c 4e b4 21 7a 51 1d c0 17 80 c7 93 28 da 63 f4 | ikev2 g^x fd 05 0b e2 9e 56 d9 c9 20 88 91 c7 be c0 26 c6 | ikev2 g^x 69 60 dd eb 14 83 d1 89 6a 59 8a ef 06 c9 04 3e | ikev2 g^x d0 46 01 39 27 93 50 40 25 0c 45 25 36 0a 1f bd | ikev2 g^x de f1 21 bc de b9 08 3b f9 ba 42 b3 96 c0 60 b4 | ikev2 g^x 0d 0e 0c 07 28 8c 6f 6a 38 91 1d 88 1e 7b 03 94 | ikev2 g^x e4 fb d6 05 18 52 1a aa e1 e4 5e 96 ad 66 1d 62 | ikev2 g^x b0 d0 05 07 c5 30 11 d1 7f 95 2b b4 ff 32 13 e4 | ikev2 g^x e5 17 5e 41 18 f4 6d c8 fe 66 3f 13 56 7b 86 54 | ikev2 g^x 90 58 c3 20 c7 1a 0c 72 2e b7 70 1d d3 00 7a ae | ikev2 g^x 58 86 4c b8 01 f6 3c 05 9b 47 1a dc a2 b7 00 ef | ikev2 g^x 31 66 ce 4a 0b 4e 88 92 b4 d0 aa ce d7 48 74 fd | ikev2 g^x 97 17 1b be 8b 31 c9 92 66 31 9f b3 84 ef 27 5e | ikev2 g^x 21 dc b5 10 f8 ce 45 64 07 5f 53 8c e7 9a 08 0a | ikev2 g^x 21 62 59 5e b9 02 31 e8 fd 60 6f 2f e1 86 b6 ee | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 48 f3 f3 5d 08 a4 f0 63 dc c0 92 c6 3d c9 7a 45 | IKEv2 nonce 24 bf 25 2a 08 df 59 2f bd 93 33 07 05 c3 f3 24 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c9 b5 3a 18 c3 59 d6 00 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 59 | natd_hash: port= 01 f4 | natd_hash: hash= 36 93 64 b0 1e e6 88 50 1f 76 35 f4 b7 15 8a d3 | natd_hash: hash= 2c 18 77 4c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 36 93 64 b0 1e e6 88 50 1f 76 35 f4 b7 15 8a d3 | Notify data 2c 18 77 4c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c9 b5 3a 18 c3 59 d6 00 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 3a 14 09 59 cd d3 06 ad 37 c8 d5 8f dd 06 36 68 | natd_hash: hash= 88 b8 08 59 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3a 14 09 59 cd d3 06 ad 37 c8 d5 8f dd 06 36 68 | Notify data 88 b8 08 59 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #598 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #598 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #598 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #598: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #598 to 4294967295 after switching state | Message ID: IKE #598 skipping update_recv as MD is fake | Message ID: sent #598 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-89" #598: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.89:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #598) | c9 b5 3a 18 c3 59 d6 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c 21 c1 2e ba 75 c9 09 d5 c3 93 96 ab d0 78 6e | 7c 4e b4 21 7a 51 1d c0 17 80 c7 93 28 da 63 f4 | fd 05 0b e2 9e 56 d9 c9 20 88 91 c7 be c0 26 c6 | 69 60 dd eb 14 83 d1 89 6a 59 8a ef 06 c9 04 3e | d0 46 01 39 27 93 50 40 25 0c 45 25 36 0a 1f bd | de f1 21 bc de b9 08 3b f9 ba 42 b3 96 c0 60 b4 | 0d 0e 0c 07 28 8c 6f 6a 38 91 1d 88 1e 7b 03 94 | e4 fb d6 05 18 52 1a aa e1 e4 5e 96 ad 66 1d 62 | b0 d0 05 07 c5 30 11 d1 7f 95 2b b4 ff 32 13 e4 | e5 17 5e 41 18 f4 6d c8 fe 66 3f 13 56 7b 86 54 | 90 58 c3 20 c7 1a 0c 72 2e b7 70 1d d3 00 7a ae | 58 86 4c b8 01 f6 3c 05 9b 47 1a dc a2 b7 00 ef | 31 66 ce 4a 0b 4e 88 92 b4 d0 aa ce d7 48 74 fd | 97 17 1b be 8b 31 c9 92 66 31 9f b3 84 ef 27 5e | 21 dc b5 10 f8 ce 45 64 07 5f 53 8c e7 9a 08 0a | 21 62 59 5e b9 02 31 e8 fd 60 6f 2f e1 86 b6 ee | 29 00 00 24 48 f3 f3 5d 08 a4 f0 63 dc c0 92 c6 | 3d c9 7a 45 24 bf 25 2a 08 df 59 2f bd 93 33 07 | 05 c3 f3 24 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 93 64 b0 1e e6 88 50 1f 76 35 f4 | b7 15 8a d3 2c 18 77 4c 00 00 00 1c 00 00 40 05 | 3a 14 09 59 cd d3 06 ad 37 c8 d5 8f dd 06 36 68 | 88 b8 08 59 | state #598 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36803f270 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a1da10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1da10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #598 | libevent_malloc: new ptr-libevent@0x7fb35805f320 size 128 | #598 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.278478 | resume sending helper answer for #598 suppresed complete_v2_state_transition() and stole MD | #598 spent 0.476 milliseconds in resume sending helper answer | stop processing: state #598 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb350065220 | processing resume sending helper answer for #582 | start processing: state #582 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 582 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #582 | **emit ISAKMP Message: | initiator cookie: | 36 4a 37 cb 1c b9 ae 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-127 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9f 4f 61 87 c6 78 57 73 4a 5f a1 9a 64 82 d0 e5 | ikev2 g^x 6f 49 6a 86 33 ed b7 39 d6 77 5c f2 31 a0 9f f4 | ikev2 g^x ec 43 a1 b9 ee e5 b8 9b 1f c7 f2 95 28 7d d0 3c | ikev2 g^x ff 5b 16 5d 16 d5 26 95 a7 b7 04 19 40 c9 07 68 | ikev2 g^x b1 7d c4 8c 15 89 44 64 6a 3b 95 b9 d0 ad c1 f3 | ikev2 g^x 68 1f 13 1a 8f ee ba b2 3b 04 d2 cd d6 6f 70 f2 | ikev2 g^x aa 4a f0 c4 b9 45 7c f5 97 5e ea 63 fd 31 8b 63 | ikev2 g^x 9e 99 a5 f5 b9 09 c7 72 66 49 45 08 e0 12 a2 af | ikev2 g^x f0 80 ef 2a 78 c8 ab 6e bd a6 31 fa b7 36 d9 19 | ikev2 g^x d4 8e 57 35 2f a1 d2 8a d8 2a cc fa d0 26 84 24 | ikev2 g^x b9 a6 0a 8f 1b 41 12 b9 03 5a 72 30 93 99 ff 3a | ikev2 g^x e5 ef 85 4d d5 6b b8 f6 bf 6a 3d e4 93 67 8e 91 | ikev2 g^x 9d f8 cf c1 e9 c5 82 41 6a ed e0 1b 1d 7b a2 28 | ikev2 g^x 4c c5 b3 bb af 17 f6 b1 f6 63 47 76 31 fe 54 4d | ikev2 g^x 80 f6 9f bb 7d 94 71 07 12 ba da 93 7c 72 12 96 | ikev2 g^x a5 ce 85 8f e3 3e a3 aa bf b5 d9 b0 4d 73 42 19 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3a 1e 72 ea a0 4e d4 41 98 1d 74 e2 b1 f2 f0 bd | IKEv2 nonce 21 18 c0 9c 2b 6a 10 6d f8 77 54 e9 5f 0c 5c 20 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 36 4a 37 cb 1c b9 ae 1c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7f | natd_hash: port= 01 f4 | natd_hash: hash= 80 1a 0a d4 84 49 b9 2d 3b f6 bc 1c 48 56 f8 6a | natd_hash: hash= ec 07 3c 40 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 80 1a 0a d4 84 49 b9 2d 3b f6 bc 1c 48 56 f8 6a | Notify data ec 07 3c 40 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 36 4a 37 cb 1c b9 ae 1c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4c a0 a2 f3 b5 28 de 62 5d b9 c2 1c 46 ba 05 5c | natd_hash: hash= 22 af fc 09 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4c a0 a2 f3 b5 28 de 62 5d b9 c2 1c 46 ba 05 5c | Notify data 22 af fc 09 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #582 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #582 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #582 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #582: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #582 to 4294967295 after switching state | Message ID: IKE #582 skipping update_recv as MD is fake | Message ID: sent #582 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-127" #582: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.127:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #582) | 36 4a 37 cb 1c b9 ae 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 4f 61 87 c6 78 57 73 4a 5f a1 9a 64 82 d0 e5 | 6f 49 6a 86 33 ed b7 39 d6 77 5c f2 31 a0 9f f4 | ec 43 a1 b9 ee e5 b8 9b 1f c7 f2 95 28 7d d0 3c | ff 5b 16 5d 16 d5 26 95 a7 b7 04 19 40 c9 07 68 | b1 7d c4 8c 15 89 44 64 6a 3b 95 b9 d0 ad c1 f3 | 68 1f 13 1a 8f ee ba b2 3b 04 d2 cd d6 6f 70 f2 | aa 4a f0 c4 b9 45 7c f5 97 5e ea 63 fd 31 8b 63 | 9e 99 a5 f5 b9 09 c7 72 66 49 45 08 e0 12 a2 af | f0 80 ef 2a 78 c8 ab 6e bd a6 31 fa b7 36 d9 19 | d4 8e 57 35 2f a1 d2 8a d8 2a cc fa d0 26 84 24 | b9 a6 0a 8f 1b 41 12 b9 03 5a 72 30 93 99 ff 3a | e5 ef 85 4d d5 6b b8 f6 bf 6a 3d e4 93 67 8e 91 | 9d f8 cf c1 e9 c5 82 41 6a ed e0 1b 1d 7b a2 28 | 4c c5 b3 bb af 17 f6 b1 f6 63 47 76 31 fe 54 4d | 80 f6 9f bb 7d 94 71 07 12 ba da 93 7c 72 12 96 | a5 ce 85 8f e3 3e a3 aa bf b5 d9 b0 4d 73 42 19 | 29 00 00 24 3a 1e 72 ea a0 4e d4 41 98 1d 74 e2 | b1 f2 f0 bd 21 18 c0 9c 2b 6a 10 6d f8 77 54 e9 | 5f 0c 5c 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 1a 0a d4 84 49 b9 2d 3b f6 bc 1c | 48 56 f8 6a ec 07 3c 40 00 00 00 1c 00 00 40 05 | 4c a0 a2 f3 b5 28 de 62 5d b9 c2 1c 46 ba 05 5c | 22 af fc 09 | state #582 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c023f10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c046090 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c046090 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #582 | libevent_malloc: new ptr-libevent@0x7fb350065220 size 128 | #582 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.278978 | resume sending helper answer for #582 suppresed complete_v2_state_transition() and stole MD | #582 spent 0.462 milliseconds in resume sending helper answer | stop processing: state #582 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37805e790 | processing resume sending helper answer for #571 | start processing: state #571 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 571 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #571 | **emit ISAKMP Message: | initiator cookie: | a7 5c 91 a2 a0 c7 d5 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-46 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d2 2d 65 41 a6 d9 4a 2d 30 96 90 44 a8 28 31 37 | ikev2 g^x 20 85 a7 46 f9 e1 3b d0 db 2c f5 64 1e a9 75 76 | ikev2 g^x 5e 93 ea 28 89 51 63 91 c2 89 51 aa db f7 57 7e | ikev2 g^x 26 a7 18 d8 ed ef ae 29 0c 20 23 07 c6 99 8c 3f | ikev2 g^x 4b ac 3d e3 11 e2 e0 88 37 38 4e 28 f5 79 1b f4 | ikev2 g^x c1 45 26 7e 04 84 1e 25 df 1a 20 8e 42 60 ac e6 | ikev2 g^x bb 99 02 1a bf e1 fc 57 bd 08 cc 3f c8 a4 bd 39 | ikev2 g^x 80 32 fa bd 24 5a cf 7c fb ec 2c 26 c2 d6 b7 93 | ikev2 g^x db c7 66 31 ac a7 48 33 9b 97 36 24 dc c4 b1 1f | ikev2 g^x f1 8c bc dc 99 b0 9d 65 3a 26 8d b6 ff f4 30 2e | ikev2 g^x df 5e e6 48 46 c0 2e 8b 04 ae 3d 4f 49 6c 4d a5 | ikev2 g^x a8 2c 10 62 3e 2f 34 53 59 ac 0a 46 80 c4 83 67 | ikev2 g^x 5d 0e af 36 3f c6 bd ce a8 a6 96 6c e7 14 1c 6e | ikev2 g^x ec 46 c8 0c f2 81 fd 9b 02 c0 10 fc f9 7a ad 27 | ikev2 g^x 1e 8c 95 1a 96 66 8d d8 17 9e ab 39 d5 e7 6f 1e | ikev2 g^x 0f 90 04 2f 14 da bc 41 89 5a 60 41 1e 6b d8 88 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce f0 df 30 54 bd 5d 12 41 64 95 81 da e2 16 b7 a5 | IKEv2 nonce 91 f7 f0 c0 97 0a b3 7c fb 37 99 ec 0e 53 6f 50 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a7 5c 91 a2 a0 c7 d5 b4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2e | natd_hash: port= 01 f4 | natd_hash: hash= bf 5d 3c ab cd 1f 05 d6 29 65 59 e2 b6 05 c5 68 | natd_hash: hash= b0 d2 e9 9f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bf 5d 3c ab cd 1f 05 d6 29 65 59 e2 b6 05 c5 68 | Notify data b0 d2 e9 9f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a7 5c 91 a2 a0 c7 d5 b4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= fe 1d 71 04 59 69 a8 7d 1a 5e 10 ed bb 6e 46 db | natd_hash: hash= ec 57 9a 8e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fe 1d 71 04 59 69 a8 7d 1a 5e 10 ed bb 6e 46 db | Notify data ec 57 9a 8e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #571 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #571 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #571 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #571: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #571 to 4294967295 after switching state | Message ID: IKE #571 skipping update_recv as MD is fake | Message ID: sent #571 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-46" #571: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.46:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #571) | a7 5c 91 a2 a0 c7 d5 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d2 2d 65 41 a6 d9 4a 2d 30 96 90 44 a8 28 31 37 | 20 85 a7 46 f9 e1 3b d0 db 2c f5 64 1e a9 75 76 | 5e 93 ea 28 89 51 63 91 c2 89 51 aa db f7 57 7e | 26 a7 18 d8 ed ef ae 29 0c 20 23 07 c6 99 8c 3f | 4b ac 3d e3 11 e2 e0 88 37 38 4e 28 f5 79 1b f4 | c1 45 26 7e 04 84 1e 25 df 1a 20 8e 42 60 ac e6 | bb 99 02 1a bf e1 fc 57 bd 08 cc 3f c8 a4 bd 39 | 80 32 fa bd 24 5a cf 7c fb ec 2c 26 c2 d6 b7 93 | db c7 66 31 ac a7 48 33 9b 97 36 24 dc c4 b1 1f | f1 8c bc dc 99 b0 9d 65 3a 26 8d b6 ff f4 30 2e | df 5e e6 48 46 c0 2e 8b 04 ae 3d 4f 49 6c 4d a5 | a8 2c 10 62 3e 2f 34 53 59 ac 0a 46 80 c4 83 67 | 5d 0e af 36 3f c6 bd ce a8 a6 96 6c e7 14 1c 6e | ec 46 c8 0c f2 81 fd 9b 02 c0 10 fc f9 7a ad 27 | 1e 8c 95 1a 96 66 8d d8 17 9e ab 39 d5 e7 6f 1e | 0f 90 04 2f 14 da bc 41 89 5a 60 41 1e 6b d8 88 | 29 00 00 24 f0 df 30 54 bd 5d 12 41 64 95 81 da | e2 16 b7 a5 91 f7 f0 c0 97 0a b3 7c fb 37 99 ec | 0e 53 6f 50 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 5d 3c ab cd 1f 05 d6 29 65 59 e2 | b6 05 c5 68 b0 d2 e9 9f 00 00 00 1c 00 00 40 05 | fe 1d 71 04 59 69 a8 7d 1a 5e 10 ed bb 6e 46 db | ec 57 9a 8e | state #571 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb33801a4e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb33800cc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #571 | libevent_malloc: new ptr-libevent@0x7fb37805e790 size 128 | #571 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.279459 | resume sending helper answer for #571 suppresed complete_v2_state_transition() and stole MD | #571 spent 0.443 milliseconds in resume sending helper answer | stop processing: state #571 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38806a670 | processing resume sending helper answer for #564 | start processing: state #564 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 564 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #564 | **emit ISAKMP Message: | initiator cookie: | 2f d3 42 a8 8e fb 16 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-44 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x de 57 dc e5 0e c5 b3 5a a5 b1 00 4b 67 ff 85 46 | ikev2 g^x b8 62 d6 0c 0d 31 23 f0 15 92 2b d6 8c 7c a9 f2 | ikev2 g^x d6 dd b2 f6 df 09 a2 a7 d4 4c f5 c8 47 54 16 76 | ikev2 g^x 5a 58 cf d1 ec 54 b5 fc 7d 31 6f bf 81 02 c0 98 | ikev2 g^x 73 35 4a 40 a8 af 1c 13 3b cd 5e 84 ea 44 ca 69 | ikev2 g^x 54 c0 3d 20 b4 71 ba 13 dc 34 f4 0e 7c b2 aa b8 | ikev2 g^x c4 a9 b5 15 a4 bd b0 a0 2f 7e 8e 8d 90 c4 a1 53 | ikev2 g^x 64 09 3f f1 29 9d e6 14 4e 06 d3 b9 04 6d 85 e2 | ikev2 g^x 8e d3 43 4f a5 d9 1f f9 90 f5 65 41 52 ea a0 85 | ikev2 g^x a6 74 7a 70 9b f9 1a 1b c9 8d 45 01 fd 6f 0b c5 | ikev2 g^x 33 01 ed 92 72 46 2e ff 55 83 2c 71 1d ed cc d4 | ikev2 g^x 98 ca f9 5a 85 34 6f be 44 21 e9 c6 d9 23 68 35 | ikev2 g^x 49 8d 06 e2 b6 a8 ec 04 67 19 6a 25 85 e7 25 a3 | ikev2 g^x 44 d2 a7 dc e7 13 d5 3e e1 f8 5a 22 0f ba d0 2d | ikev2 g^x 6f ea 9c 6f 17 1b d4 89 ec ee fc f7 ec b2 46 89 | ikev2 g^x 2d c5 51 79 e6 ba bb f3 15 62 72 06 39 13 5f b6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 96 1c e1 0c 7f e5 9c 1d 77 d9 4f 7d 4d 47 9e 2d | IKEv2 nonce d0 89 bb 2a 04 e6 2e 94 ae 57 6c 89 bf 1f de 2e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 2f d3 42 a8 8e fb 16 96 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2c | natd_hash: port= 01 f4 | natd_hash: hash= f6 46 11 5f cd 69 00 3f 80 ae 94 cd 27 23 87 c3 | natd_hash: hash= ca 0f c2 84 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f6 46 11 5f cd 69 00 3f 80 ae 94 cd 27 23 87 c3 | Notify data ca 0f c2 84 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 2f d3 42 a8 8e fb 16 96 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 00 5b e6 68 40 1a 8f cb 1f 47 b5 45 fe a7 9d c2 | natd_hash: hash= 49 00 ab ac | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 00 5b e6 68 40 1a 8f cb 1f 47 b5 45 fe a7 9d c2 | Notify data 49 00 ab ac | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #564 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #564 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #564 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #564: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #564 to 4294967295 after switching state | Message ID: IKE #564 skipping update_recv as MD is fake | Message ID: sent #564 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-44" #564: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.44:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #564) | 2f d3 42 a8 8e fb 16 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 57 dc e5 0e c5 b3 5a a5 b1 00 4b 67 ff 85 46 | b8 62 d6 0c 0d 31 23 f0 15 92 2b d6 8c 7c a9 f2 | d6 dd b2 f6 df 09 a2 a7 d4 4c f5 c8 47 54 16 76 | 5a 58 cf d1 ec 54 b5 fc 7d 31 6f bf 81 02 c0 98 | 73 35 4a 40 a8 af 1c 13 3b cd 5e 84 ea 44 ca 69 | 54 c0 3d 20 b4 71 ba 13 dc 34 f4 0e 7c b2 aa b8 | c4 a9 b5 15 a4 bd b0 a0 2f 7e 8e 8d 90 c4 a1 53 | 64 09 3f f1 29 9d e6 14 4e 06 d3 b9 04 6d 85 e2 | 8e d3 43 4f a5 d9 1f f9 90 f5 65 41 52 ea a0 85 | a6 74 7a 70 9b f9 1a 1b c9 8d 45 01 fd 6f 0b c5 | 33 01 ed 92 72 46 2e ff 55 83 2c 71 1d ed cc d4 | 98 ca f9 5a 85 34 6f be 44 21 e9 c6 d9 23 68 35 | 49 8d 06 e2 b6 a8 ec 04 67 19 6a 25 85 e7 25 a3 | 44 d2 a7 dc e7 13 d5 3e e1 f8 5a 22 0f ba d0 2d | 6f ea 9c 6f 17 1b d4 89 ec ee fc f7 ec b2 46 89 | 2d c5 51 79 e6 ba bb f3 15 62 72 06 39 13 5f b6 | 29 00 00 24 96 1c e1 0c 7f e5 9c 1d 77 d9 4f 7d | 4d 47 9e 2d d0 89 bb 2a 04 e6 2e 94 ae 57 6c 89 | bf 1f de 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 46 11 5f cd 69 00 3f 80 ae 94 cd | 27 23 87 c3 ca 0f c2 84 00 00 00 1c 00 00 40 05 | 00 5b e6 68 40 1a 8f cb 1f 47 b5 45 fe a7 9d c2 | 49 00 ab ac | state #564 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb348014c70 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb378012bf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #564 | libevent_malloc: new ptr-libevent@0x7fb38806a670 size 128 | #564 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.279912 | resume sending helper answer for #564 suppresed complete_v2_state_transition() and stole MD | #564 spent 0.423 milliseconds in resume sending helper answer | stop processing: state #564 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c0643e0 | processing resume sending helper answer for #555 | start processing: state #555 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 555 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #555 | **emit ISAKMP Message: | initiator cookie: | fd 31 e4 af 59 3e ae 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-133 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 12 85 72 9c cb 7c 09 f8 23 fb f5 57 cd 4e 83 b6 | ikev2 g^x a0 e6 5a 64 5e 52 19 6a 4f a7 4e e3 ab 51 d1 ee | ikev2 g^x b0 ba 52 7b dc b8 e2 a2 b5 3d 66 0c 60 98 2f 4f | ikev2 g^x 13 c0 96 12 cc 2c 3a 0e e9 91 83 23 1e 4e 39 c6 | ikev2 g^x 9f d6 0d da 47 3d 42 93 4d 91 c2 2f 26 04 15 c3 | ikev2 g^x 41 c4 f8 0a d7 03 ee 39 9f 96 ac c4 3e 56 6c 05 | ikev2 g^x 15 ec 80 86 ac 76 e0 e4 08 62 35 f8 6c eb 25 c5 | ikev2 g^x 19 28 f6 9a dc 30 d8 8a 67 5e 34 70 48 34 07 96 | ikev2 g^x e2 ab 1c 7f d5 2c e0 8a 96 fd 4e 98 8d 6c aa ee | ikev2 g^x 67 4d d3 dc 1e 6c 3d db a0 95 a1 d5 a6 74 27 2f | ikev2 g^x b7 3e e6 fe c4 ac 66 d7 25 d1 4f 42 90 09 08 6d | ikev2 g^x 35 3d 9b fe f1 b0 50 00 be c3 ae db 45 71 57 2d | ikev2 g^x 99 1c ee 2e fa c8 1e 96 ae 9a 9e 66 4e ff 6a a6 | ikev2 g^x 84 c5 c3 4f c1 1f de cc 77 17 f0 b0 1e 9a 28 0b | ikev2 g^x 55 f0 78 ac 8b b4 71 fc 1a 17 41 e7 6a 74 62 62 | ikev2 g^x 3d 84 68 6d 3f ac fc 48 f6 30 13 2d 70 6e ad 53 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 71 32 1e 88 23 ee 2f ae 39 9e 7b 59 41 2e 3a 0b | IKEv2 nonce 57 4e 0c 80 35 cd a7 35 65 8c e6 b2 f1 87 a1 b2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fd 31 e4 af 59 3e ae 30 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 85 | natd_hash: port= 01 f4 | natd_hash: hash= 15 53 72 74 e1 5b 37 7b 33 b0 17 78 c1 64 62 a5 | natd_hash: hash= 7c 42 0a ec | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 15 53 72 74 e1 5b 37 7b 33 b0 17 78 c1 64 62 a5 | Notify data 7c 42 0a ec | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= fd 31 e4 af 59 3e ae 30 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ff 46 61 3e 66 71 bd af 2e 4c 91 0c 25 ae 93 92 | natd_hash: hash= d3 06 93 2d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ff 46 61 3e 66 71 bd af 2e 4c 91 0c 25 ae 93 92 | Notify data d3 06 93 2d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #555 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #555 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #555 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #555: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #555 to 4294967295 after switching state | Message ID: IKE #555 skipping update_recv as MD is fake | Message ID: sent #555 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-133" #555: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.133:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #555) | fd 31 e4 af 59 3e ae 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 85 72 9c cb 7c 09 f8 23 fb f5 57 cd 4e 83 b6 | a0 e6 5a 64 5e 52 19 6a 4f a7 4e e3 ab 51 d1 ee | b0 ba 52 7b dc b8 e2 a2 b5 3d 66 0c 60 98 2f 4f | 13 c0 96 12 cc 2c 3a 0e e9 91 83 23 1e 4e 39 c6 | 9f d6 0d da 47 3d 42 93 4d 91 c2 2f 26 04 15 c3 | 41 c4 f8 0a d7 03 ee 39 9f 96 ac c4 3e 56 6c 05 | 15 ec 80 86 ac 76 e0 e4 08 62 35 f8 6c eb 25 c5 | 19 28 f6 9a dc 30 d8 8a 67 5e 34 70 48 34 07 96 | e2 ab 1c 7f d5 2c e0 8a 96 fd 4e 98 8d 6c aa ee | 67 4d d3 dc 1e 6c 3d db a0 95 a1 d5 a6 74 27 2f | b7 3e e6 fe c4 ac 66 d7 25 d1 4f 42 90 09 08 6d | 35 3d 9b fe f1 b0 50 00 be c3 ae db 45 71 57 2d | 99 1c ee 2e fa c8 1e 96 ae 9a 9e 66 4e ff 6a a6 | 84 c5 c3 4f c1 1f de cc 77 17 f0 b0 1e 9a 28 0b | 55 f0 78 ac 8b b4 71 fc 1a 17 41 e7 6a 74 62 62 | 3d 84 68 6d 3f ac fc 48 f6 30 13 2d 70 6e ad 53 | 29 00 00 24 71 32 1e 88 23 ee 2f ae 39 9e 7b 59 | 41 2e 3a 0b 57 4e 0c 80 35 cd a7 35 65 8c e6 b2 | f1 87 a1 b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 53 72 74 e1 5b 37 7b 33 b0 17 78 | c1 64 62 a5 7c 42 0a ec 00 00 00 1c 00 00 40 05 | ff 46 61 3e 66 71 bd af 2e 4c 91 0c 25 ae 93 92 | d3 06 93 2d | state #555 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c02ec80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c01da80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c01da80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #555 | libevent_malloc: new ptr-libevent@0x7fb35c0643e0 size 128 | #555 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.280403 | resume sending helper answer for #555 suppresed complete_v2_state_transition() and stole MD | #555 spent 0.457 milliseconds in resume sending helper answer | stop processing: state #555 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb340059190 | processing resume sending helper answer for #588 | start processing: state #588 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 588 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #588 | **emit ISAKMP Message: | initiator cookie: | 07 e4 97 ab 5f cb 91 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-17 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a5 a6 96 6f 8d 19 77 3f 7b 52 64 d1 7d b8 c3 32 | ikev2 g^x e6 45 b8 da 56 a7 e9 08 27 5a 9f 4a f5 65 0f 19 | ikev2 g^x 1a 87 9c 5a 04 ac c9 78 c0 7b 31 1c 5e fb 7e dd | ikev2 g^x 49 05 d6 20 6e 0b 54 2a 9b 3f 4c f3 f9 b9 1c 60 | ikev2 g^x fd 45 61 e5 98 00 5b 9c 76 47 67 ad ea 1b 21 91 | ikev2 g^x a4 87 87 e0 87 97 79 8f 69 65 91 fd b9 ec ff c4 | ikev2 g^x 7c e3 32 4b a0 5f 86 aa a7 fa 0f b5 34 1b 73 49 | ikev2 g^x 66 c8 24 f8 1f 2b 81 c9 03 bd 50 e2 ed f5 66 6c | ikev2 g^x dd 1f 49 9e f6 da 33 36 e9 d5 b8 a9 47 7f 93 53 | ikev2 g^x 01 8d de 29 38 fb bb 0d a3 c7 a3 88 35 89 50 ea | ikev2 g^x dc 06 47 18 09 d0 b1 af c6 f0 7f 06 49 d3 b7 66 | ikev2 g^x c7 ef 15 23 12 a8 2e ca 41 93 d6 39 56 e0 00 fc | ikev2 g^x da 04 e7 a4 d5 e6 05 93 a8 c3 b6 60 a2 5e 1a 5b | ikev2 g^x a7 0a 03 72 c9 af c9 1d 6d 01 5a c0 73 ce 68 f2 | ikev2 g^x 8a 78 2b 21 30 c3 39 b1 07 f8 a8 5f eb fd ce 8e | ikev2 g^x 91 c1 e4 7a 50 88 f7 d6 5f 29 3f 29 95 a0 44 e0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ca ce e1 5c c7 60 0a 0b 6d 35 6a ab 7c 6e b2 8f | IKEv2 nonce 16 80 da 2b 8c f1 55 28 04 49 6c 0a 9c 6d 0f 34 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 07 e4 97 ab 5f cb 91 ff | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 11 | natd_hash: port= 01 f4 | natd_hash: hash= aa 70 0f 71 4f aa a8 18 56 c1 cb 65 01 88 44 d0 | natd_hash: hash= 16 19 79 73 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data aa 70 0f 71 4f aa a8 18 56 c1 cb 65 01 88 44 d0 | Notify data 16 19 79 73 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 07 e4 97 ab 5f cb 91 ff | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 52 d2 00 b1 18 82 fe 4a 49 3d d9 d7 7e 4f 87 22 | natd_hash: hash= fa 52 4b 2c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 52 d2 00 b1 18 82 fe 4a 49 3d d9 d7 7e 4f 87 22 | Notify data fa 52 4b 2c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #588 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #588 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #588 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #588: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #588 to 4294967295 after switching state | Message ID: IKE #588 skipping update_recv as MD is fake | Message ID: sent #588 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-17" #588: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.17:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #588) | 07 e4 97 ab 5f cb 91 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 a6 96 6f 8d 19 77 3f 7b 52 64 d1 7d b8 c3 32 | e6 45 b8 da 56 a7 e9 08 27 5a 9f 4a f5 65 0f 19 | 1a 87 9c 5a 04 ac c9 78 c0 7b 31 1c 5e fb 7e dd | 49 05 d6 20 6e 0b 54 2a 9b 3f 4c f3 f9 b9 1c 60 | fd 45 61 e5 98 00 5b 9c 76 47 67 ad ea 1b 21 91 | a4 87 87 e0 87 97 79 8f 69 65 91 fd b9 ec ff c4 | 7c e3 32 4b a0 5f 86 aa a7 fa 0f b5 34 1b 73 49 | 66 c8 24 f8 1f 2b 81 c9 03 bd 50 e2 ed f5 66 6c | dd 1f 49 9e f6 da 33 36 e9 d5 b8 a9 47 7f 93 53 | 01 8d de 29 38 fb bb 0d a3 c7 a3 88 35 89 50 ea | dc 06 47 18 09 d0 b1 af c6 f0 7f 06 49 d3 b7 66 | c7 ef 15 23 12 a8 2e ca 41 93 d6 39 56 e0 00 fc | da 04 e7 a4 d5 e6 05 93 a8 c3 b6 60 a2 5e 1a 5b | a7 0a 03 72 c9 af c9 1d 6d 01 5a c0 73 ce 68 f2 | 8a 78 2b 21 30 c3 39 b1 07 f8 a8 5f eb fd ce 8e | 91 c1 e4 7a 50 88 f7 d6 5f 29 3f 29 95 a0 44 e0 | 29 00 00 24 ca ce e1 5c c7 60 0a 0b 6d 35 6a ab | 7c 6e b2 8f 16 80 da 2b 8c f1 55 28 04 49 6c 0a | 9c 6d 0f 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 70 0f 71 4f aa a8 18 56 c1 cb 65 | 01 88 44 d0 16 19 79 73 00 00 00 1c 00 00 40 05 | 52 d2 00 b1 18 82 fe 4a 49 3d d9 d7 7e 4f 87 22 | fa 52 4b 2c | state #588 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c03a770 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469fa300 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34003f560 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #588 | libevent_malloc: new ptr-libevent@0x7fb340059190 size 128 | #588 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.280858 | resume sending helper answer for #588 suppresed complete_v2_state_transition() and stole MD | #588 spent 0.425 milliseconds in resume sending helper answer | stop processing: state #588 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34405eeb0 | processing resume sending helper answer for #593 | start processing: state #593 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 593 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #593 | **emit ISAKMP Message: | initiator cookie: | 08 0c 73 4d 95 6b fc 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-7 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3a 5b 8b 42 5a bf e3 df 41 c2 a5 fe 11 64 91 da | ikev2 g^x 13 85 25 29 02 a6 c9 9c 80 e3 1c ad 21 a7 2f 9a | ikev2 g^x 0b ca 3c ca e9 08 30 c3 5e 68 75 9f 48 b0 b2 2a | ikev2 g^x f3 14 8c ce 4b 9d 68 31 bf e7 06 67 bc f6 a7 2f | ikev2 g^x a5 2e 5d 39 f4 d4 74 52 bf f3 62 0c 0a b9 b5 aa | ikev2 g^x f2 b8 2f 6c d5 d0 6f 96 84 1e db be e8 02 03 7b | ikev2 g^x ee dc b5 2e 60 31 46 be ee 8e cd 6c 10 78 9e 92 | ikev2 g^x 45 23 ed 34 3c a4 82 16 54 50 71 ef 12 97 e8 82 | ikev2 g^x 81 30 89 f1 a9 de 93 55 47 e1 7b c1 4d 96 b7 09 | ikev2 g^x 0a 07 7c 6e 45 c4 9a eb b1 2d 13 6c dd 4d b5 76 | ikev2 g^x f9 0b 32 6e 41 44 dd 36 74 7c 38 ef 89 9d 82 70 | ikev2 g^x 70 19 38 86 e8 a2 d4 b2 17 ea 56 cc e1 b3 09 6e | ikev2 g^x ba 1a 8c a2 bd d7 7e d9 e2 59 e9 c6 5b e8 2e 95 | ikev2 g^x f2 48 7d f5 1f 8e 57 75 2c 61 06 ab aa 3a d4 66 | ikev2 g^x 6f 67 dd 67 06 ad 55 c4 42 9e ec 08 90 bd f1 bb | ikev2 g^x f6 d6 d8 db 80 e0 59 56 25 74 f2 d8 fc 0b 32 67 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8d c7 ae aa 9e 1e 3a 21 f5 55 19 72 d5 db e8 0f | IKEv2 nonce 54 51 8b c7 a2 ee dd f6 89 e2 5f d2 eb 41 c9 1d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 08 0c 73 4d 95 6b fc 9f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 07 | natd_hash: port= 01 f4 | natd_hash: hash= 70 5a 60 25 54 2e 1f 8e 3c a3 d4 e8 65 e4 94 da | natd_hash: hash= 40 a8 f1 52 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 70 5a 60 25 54 2e 1f 8e 3c a3 d4 e8 65 e4 94 da | Notify data 40 a8 f1 52 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 08 0c 73 4d 95 6b fc 9f | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e4 c5 d5 75 de 47 88 58 52 93 1c be 19 a0 a1 72 | natd_hash: hash= fb ef e5 fb | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e4 c5 d5 75 de 47 88 58 52 93 1c be 19 a0 a1 72 | Notify data fb ef e5 fb | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #593 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #593 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #593 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #593: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #593 to 4294967295 after switching state | Message ID: IKE #593 skipping update_recv as MD is fake | Message ID: sent #593 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-7" #593: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.7:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #593) | 08 0c 73 4d 95 6b fc 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3a 5b 8b 42 5a bf e3 df 41 c2 a5 fe 11 64 91 da | 13 85 25 29 02 a6 c9 9c 80 e3 1c ad 21 a7 2f 9a | 0b ca 3c ca e9 08 30 c3 5e 68 75 9f 48 b0 b2 2a | f3 14 8c ce 4b 9d 68 31 bf e7 06 67 bc f6 a7 2f | a5 2e 5d 39 f4 d4 74 52 bf f3 62 0c 0a b9 b5 aa | f2 b8 2f 6c d5 d0 6f 96 84 1e db be e8 02 03 7b | ee dc b5 2e 60 31 46 be ee 8e cd 6c 10 78 9e 92 | 45 23 ed 34 3c a4 82 16 54 50 71 ef 12 97 e8 82 | 81 30 89 f1 a9 de 93 55 47 e1 7b c1 4d 96 b7 09 | 0a 07 7c 6e 45 c4 9a eb b1 2d 13 6c dd 4d b5 76 | f9 0b 32 6e 41 44 dd 36 74 7c 38 ef 89 9d 82 70 | 70 19 38 86 e8 a2 d4 b2 17 ea 56 cc e1 b3 09 6e | ba 1a 8c a2 bd d7 7e d9 e2 59 e9 c6 5b e8 2e 95 | f2 48 7d f5 1f 8e 57 75 2c 61 06 ab aa 3a d4 66 | 6f 67 dd 67 06 ad 55 c4 42 9e ec 08 90 bd f1 bb | f6 d6 d8 db 80 e0 59 56 25 74 f2 d8 fc 0b 32 67 | 29 00 00 24 8d c7 ae aa 9e 1e 3a 21 f5 55 19 72 | d5 db e8 0f 54 51 8b c7 a2 ee dd f6 89 e2 5f d2 | eb 41 c9 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 5a 60 25 54 2e 1f 8e 3c a3 d4 e8 | 65 e4 94 da 40 a8 f1 52 00 00 00 1c 00 00 40 05 | e4 c5 d5 75 de 47 88 58 52 93 1c be 19 a0 a1 72 | fb ef e5 fb | state #593 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36802a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a23190 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #593 | libevent_malloc: new ptr-libevent@0x7fb34405eeb0 size 128 | #593 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.281358 | resume sending helper answer for #593 suppresed complete_v2_state_transition() and stole MD | #593 spent 0.459 milliseconds in resume sending helper answer | stop processing: state #593 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c064680 | processing resume sending helper answer for #532 | start processing: state #532 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 532 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #532 | **emit ISAKMP Message: | initiator cookie: | b2 bb c0 cb 23 86 64 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-23 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f3 33 37 df 77 a4 8e a0 b3 e3 00 cd d4 2d ac fb | ikev2 g^x 58 54 00 1b 4e b6 44 51 03 9f 3e 46 9f 8f df 83 | ikev2 g^x c9 7d 11 8c 39 ac 49 56 ab 5f 41 17 92 3f a3 b0 | ikev2 g^x 7b e1 99 32 00 0e 68 82 bd 92 1f da 3c 9d d6 5e | ikev2 g^x 1a 09 1d eb 8b bd 63 f3 c7 1c 91 de b6 81 48 d2 | ikev2 g^x a0 a0 d6 ca 6c 4d a4 58 b2 e4 43 1e 98 6f d3 dc | ikev2 g^x 45 97 3f 9b f6 f7 45 82 be d0 0f 1c 45 5c 9c 3a | ikev2 g^x c9 3a 6f 09 cd d2 f4 e8 72 09 bb 9c 48 02 f4 93 | ikev2 g^x 79 d2 c5 38 6e e0 b7 1e a4 59 ec 3a e6 82 c4 a8 | ikev2 g^x 46 c4 00 ed 3b 00 2b 60 1c 85 f0 e2 d1 ff 2f 3b | ikev2 g^x f9 d8 e6 be 72 54 6d 2f ce 69 68 10 dd 93 1f 49 | ikev2 g^x fd e3 cd 64 0c aa 7b da bb 78 88 4b eb 80 ba c8 | ikev2 g^x 39 a1 18 86 70 40 67 20 3d 9d ab 72 e5 25 d4 7a | ikev2 g^x 31 49 e3 a6 76 67 2f aa 74 53 9f 57 5f a1 88 a4 | ikev2 g^x ed d9 e3 9b 5a 62 f9 e8 ef 24 03 36 4e 35 9e 0d | ikev2 g^x ce 1c 96 2b 87 5a 84 0b cf 90 a8 01 d2 bb a7 f0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 07 01 44 17 16 f9 66 65 39 42 87 0c 7f 44 e6 59 | IKEv2 nonce 85 b5 ac 74 8c 57 ff 68 a2 f9 2d 4f 6f 8d 12 aa | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b2 bb c0 cb 23 86 64 a6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 17 | natd_hash: port= 01 f4 | natd_hash: hash= 72 d6 21 28 13 22 29 44 67 d8 0e 41 43 e4 97 1f | natd_hash: hash= 21 5e 2f 85 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 72 d6 21 28 13 22 29 44 67 d8 0e 41 43 e4 97 1f | Notify data 21 5e 2f 85 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b2 bb c0 cb 23 86 64 a6 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d5 1f cb 66 19 77 3c 8a 10 7e 62 eb ee 00 e2 86 | natd_hash: hash= a7 15 35 82 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d5 1f cb 66 19 77 3c 8a 10 7e 62 eb ee 00 e2 86 | Notify data a7 15 35 82 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #532 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #532 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #532 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #532: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #532 to 4294967295 after switching state | Message ID: IKE #532 skipping update_recv as MD is fake | Message ID: sent #532 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-23" #532: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.23:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #532) | b2 bb c0 cb 23 86 64 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 33 37 df 77 a4 8e a0 b3 e3 00 cd d4 2d ac fb | 58 54 00 1b 4e b6 44 51 03 9f 3e 46 9f 8f df 83 | c9 7d 11 8c 39 ac 49 56 ab 5f 41 17 92 3f a3 b0 | 7b e1 99 32 00 0e 68 82 bd 92 1f da 3c 9d d6 5e | 1a 09 1d eb 8b bd 63 f3 c7 1c 91 de b6 81 48 d2 | a0 a0 d6 ca 6c 4d a4 58 b2 e4 43 1e 98 6f d3 dc | 45 97 3f 9b f6 f7 45 82 be d0 0f 1c 45 5c 9c 3a | c9 3a 6f 09 cd d2 f4 e8 72 09 bb 9c 48 02 f4 93 | 79 d2 c5 38 6e e0 b7 1e a4 59 ec 3a e6 82 c4 a8 | 46 c4 00 ed 3b 00 2b 60 1c 85 f0 e2 d1 ff 2f 3b | f9 d8 e6 be 72 54 6d 2f ce 69 68 10 dd 93 1f 49 | fd e3 cd 64 0c aa 7b da bb 78 88 4b eb 80 ba c8 | 39 a1 18 86 70 40 67 20 3d 9d ab 72 e5 25 d4 7a | 31 49 e3 a6 76 67 2f aa 74 53 9f 57 5f a1 88 a4 | ed d9 e3 9b 5a 62 f9 e8 ef 24 03 36 4e 35 9e 0d | ce 1c 96 2b 87 5a 84 0b cf 90 a8 01 d2 bb a7 f0 | 29 00 00 24 07 01 44 17 16 f9 66 65 39 42 87 0c | 7f 44 e6 59 85 b5 ac 74 8c 57 ff 68 a2 f9 2d 4f | 6f 8d 12 aa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 d6 21 28 13 22 29 44 67 d8 0e 41 | 43 e4 97 1f 21 5e 2f 85 00 00 00 1c 00 00 40 05 | d5 1f cb 66 19 77 3c 8a 10 7e 62 eb ee 00 e2 86 | a7 15 35 82 | state #532 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34403b0b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a3fc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3fc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #532 | libevent_malloc: new ptr-libevent@0x7fb37c064680 size 128 | #532 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.281834 | resume sending helper answer for #532 suppresed complete_v2_state_transition() and stole MD | #532 spent 0.44 milliseconds in resume sending helper answer | stop processing: state #532 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb364054370 | processing resume sending helper answer for #570 | start processing: state #570 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 570 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #570 | **emit ISAKMP Message: | initiator cookie: | c9 60 e7 45 a7 98 e0 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-96 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 68 68 13 ed 82 59 f7 bf b7 d3 7d 5a 25 b1 e1 fd | ikev2 g^x ce b0 3f a5 fb 8c bd 34 1d e5 2a 9b fc 5b 3e 55 | ikev2 g^x 82 20 27 8a 48 3d 6e 3e 7f dc aa 07 ea 30 a0 2a | ikev2 g^x 9c f4 f8 a8 1d 61 fa e6 e5 a6 d3 c3 23 a2 0d 27 | ikev2 g^x d8 62 e9 78 7e f3 e0 26 9b ba 64 6b b0 e1 50 5c | ikev2 g^x c3 bc cb de d9 53 bf f2 ac d3 d9 69 fb c6 10 8c | ikev2 g^x 38 7d aa 47 ee d8 74 e7 3e ca 1f 48 f0 13 76 f3 | ikev2 g^x 40 f4 69 cb 3d 62 67 20 a1 3b b6 e2 a8 a9 ab a6 | ikev2 g^x 2b 8b a8 99 f0 d1 52 2b b5 e5 e6 49 c7 16 b6 59 | ikev2 g^x f0 d0 ea 1f 2e db 52 ab 01 2b c6 eb cc 72 67 ee | ikev2 g^x fc 53 07 28 c8 cb 95 9e 3a a0 20 2c 1e 66 b0 e9 | ikev2 g^x 12 9c 0c 0c 6b f2 70 25 e0 f9 f8 0e 69 49 c5 be | ikev2 g^x 72 17 9d 25 7c 8e 29 c2 0e 40 fa d6 20 e8 3f 96 | ikev2 g^x ac dd 51 f9 fe 49 86 c9 9b e7 be 19 fb 67 10 1f | ikev2 g^x f3 4b 80 50 1d d2 9f c6 fc 87 3a f9 1d 52 8a ba | ikev2 g^x 10 8e 73 40 ff 99 d5 7e 30 7d e1 68 1c 25 bd b7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ba 1d 83 e5 8b c9 fc 82 14 41 45 77 00 92 fd 3d | IKEv2 nonce da ae b0 d1 cb bd 90 71 29 d7 a3 fd 03 9f fb b5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c9 60 e7 45 a7 98 e0 a0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 60 | natd_hash: port= 01 f4 | natd_hash: hash= fa 68 08 10 0a d6 4b 37 b2 81 b0 b2 14 38 ef bd | natd_hash: hash= ae 4e e0 08 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fa 68 08 10 0a d6 4b 37 b2 81 b0 b2 14 38 ef bd | Notify data ae 4e e0 08 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c9 60 e7 45 a7 98 e0 a0 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 3a 9e a3 24 b1 2a 82 b0 e0 fd 89 6a b8 7b ca cd | natd_hash: hash= 82 b8 2e 9e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3a 9e a3 24 b1 2a 82 b0 e0 fd 89 6a b8 7b ca cd | Notify data 82 b8 2e 9e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #570 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #570 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #570 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #570: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #570 to 4294967295 after switching state | Message ID: IKE #570 skipping update_recv as MD is fake | Message ID: sent #570 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-96" #570: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.96:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #570) | c9 60 e7 45 a7 98 e0 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 68 13 ed 82 59 f7 bf b7 d3 7d 5a 25 b1 e1 fd | ce b0 3f a5 fb 8c bd 34 1d e5 2a 9b fc 5b 3e 55 | 82 20 27 8a 48 3d 6e 3e 7f dc aa 07 ea 30 a0 2a | 9c f4 f8 a8 1d 61 fa e6 e5 a6 d3 c3 23 a2 0d 27 | d8 62 e9 78 7e f3 e0 26 9b ba 64 6b b0 e1 50 5c | c3 bc cb de d9 53 bf f2 ac d3 d9 69 fb c6 10 8c | 38 7d aa 47 ee d8 74 e7 3e ca 1f 48 f0 13 76 f3 | 40 f4 69 cb 3d 62 67 20 a1 3b b6 e2 a8 a9 ab a6 | 2b 8b a8 99 f0 d1 52 2b b5 e5 e6 49 c7 16 b6 59 | f0 d0 ea 1f 2e db 52 ab 01 2b c6 eb cc 72 67 ee | fc 53 07 28 c8 cb 95 9e 3a a0 20 2c 1e 66 b0 e9 | 12 9c 0c 0c 6b f2 70 25 e0 f9 f8 0e 69 49 c5 be | 72 17 9d 25 7c 8e 29 c2 0e 40 fa d6 20 e8 3f 96 | ac dd 51 f9 fe 49 86 c9 9b e7 be 19 fb 67 10 1f | f3 4b 80 50 1d d2 9f c6 fc 87 3a f9 1d 52 8a ba | 10 8e 73 40 ff 99 d5 7e 30 7d e1 68 1c 25 bd b7 | 29 00 00 24 ba 1d 83 e5 8b c9 fc 82 14 41 45 77 | 00 92 fd 3d da ae b0 d1 cb bd 90 71 29 d7 a3 fd | 03 9f fb b5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fa 68 08 10 0a d6 4b 37 b2 81 b0 b2 | 14 38 ef bd ae 4e e0 08 00 00 00 1c 00 00 40 05 | 3a 9e a3 24 b1 2a 82 b0 e0 fd 89 6a b8 7b ca cd | 82 b8 2e 9e | state #570 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37801fd50 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37800cc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364029270 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #570 | libevent_malloc: new ptr-libevent@0x7fb364054370 size 128 | #570 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.282344 | resume sending helper answer for #570 suppresed complete_v2_state_transition() and stole MD | #570 spent 0.473 milliseconds in resume sending helper answer | stop processing: state #570 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388064e90 | processing resume sending helper answer for #546 | start processing: state #546 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 546 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #546 | **emit ISAKMP Message: | initiator cookie: | 6b b3 b7 0f 25 55 d0 22 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-173 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6f 97 dc 92 f6 4f 2c 9f 64 e9 38 e7 a8 c9 b6 7e | ikev2 g^x 05 ff cf 3a 5e 05 b6 cf 17 cf 8d ed 48 a3 fa 9f | ikev2 g^x 24 a8 a6 41 91 3f 77 df 02 a6 05 bb e5 ab cd 67 | ikev2 g^x d8 25 b1 f3 b8 14 51 43 76 86 a6 c8 d3 ba b6 18 | ikev2 g^x bc 07 8c 01 94 c0 38 ea 24 cf c6 97 ad 4b b2 b6 | ikev2 g^x 6f bb 4c fe 23 3e c7 46 59 8c c5 fd 43 6f df ce | ikev2 g^x b5 5a 0d 2c dc 35 13 65 e4 12 f7 f9 80 cc aa 20 | ikev2 g^x b5 ee c7 5a 5a 70 15 d1 3f c3 8a 67 09 11 af 09 | ikev2 g^x 16 32 b4 53 41 90 67 c4 cd f6 da ec eb 5a 4a 3f | ikev2 g^x b2 29 22 df ae 11 4b 8d cc 3a 05 6f 94 4f ad 1b | ikev2 g^x d7 60 13 20 46 f2 cd 62 12 6a 44 77 94 47 13 c4 | ikev2 g^x e5 1a bb 0c f8 12 56 21 05 7d 6d 2b 8c f3 58 da | ikev2 g^x 44 da 7d 6f ce 51 7e 8b 6a af ad 31 4a 3c fd a3 | ikev2 g^x 30 aa 0f f0 5b 6a da 87 b0 6b 48 55 97 b6 71 a6 | ikev2 g^x 60 8f d8 d4 aa a0 85 a4 40 0d 91 d0 21 6b 4b 63 | ikev2 g^x 73 9c 09 ed c8 c0 5f 4c fa cd b4 f8 56 de a6 a5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce ce 6f 16 bc f3 6d 4e 88 a3 1b 4b 4f 8a 74 cd 2e | IKEv2 nonce 04 10 e5 12 90 b1 40 e6 d6 57 95 4a 49 93 ce 51 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6b b3 b7 0f 25 55 d0 22 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 ad | natd_hash: port= 01 f4 | natd_hash: hash= df 2a 45 97 7e 21 38 1c 72 a0 dd 2d 3c 55 6e 57 | natd_hash: hash= 52 8e 65 fc | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data df 2a 45 97 7e 21 38 1c 72 a0 dd 2d 3c 55 6e 57 | Notify data 52 8e 65 fc | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6b b3 b7 0f 25 55 d0 22 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 34 35 71 3c 6d 6a 9d ce aa 0f 6d 3a 2b eb 4b 95 | natd_hash: hash= 7e cd 31 4e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 34 35 71 3c 6d 6a 9d ce aa 0f 6d 3a 2b eb 4b 95 | Notify data 7e cd 31 4e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #546 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #546 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #546 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #546: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #546 to 4294967295 after switching state | Message ID: IKE #546 skipping update_recv as MD is fake | Message ID: sent #546 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-173" #546: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.173:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #546) | 6b b3 b7 0f 25 55 d0 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6f 97 dc 92 f6 4f 2c 9f 64 e9 38 e7 a8 c9 b6 7e | 05 ff cf 3a 5e 05 b6 cf 17 cf 8d ed 48 a3 fa 9f | 24 a8 a6 41 91 3f 77 df 02 a6 05 bb e5 ab cd 67 | d8 25 b1 f3 b8 14 51 43 76 86 a6 c8 d3 ba b6 18 | bc 07 8c 01 94 c0 38 ea 24 cf c6 97 ad 4b b2 b6 | 6f bb 4c fe 23 3e c7 46 59 8c c5 fd 43 6f df ce | b5 5a 0d 2c dc 35 13 65 e4 12 f7 f9 80 cc aa 20 | b5 ee c7 5a 5a 70 15 d1 3f c3 8a 67 09 11 af 09 | 16 32 b4 53 41 90 67 c4 cd f6 da ec eb 5a 4a 3f | b2 29 22 df ae 11 4b 8d cc 3a 05 6f 94 4f ad 1b | d7 60 13 20 46 f2 cd 62 12 6a 44 77 94 47 13 c4 | e5 1a bb 0c f8 12 56 21 05 7d 6d 2b 8c f3 58 da | 44 da 7d 6f ce 51 7e 8b 6a af ad 31 4a 3c fd a3 | 30 aa 0f f0 5b 6a da 87 b0 6b 48 55 97 b6 71 a6 | 60 8f d8 d4 aa a0 85 a4 40 0d 91 d0 21 6b 4b 63 | 73 9c 09 ed c8 c0 5f 4c fa cd b4 f8 56 de a6 a5 | 29 00 00 24 ce 6f 16 bc f3 6d 4e 88 a3 1b 4b 4f | 8a 74 cd 2e 04 10 e5 12 90 b1 40 e6 d6 57 95 4a | 49 93 ce 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 2a 45 97 7e 21 38 1c 72 a0 dd 2d | 3c 55 6e 57 52 8e 65 fc 00 00 00 1c 00 00 40 05 | 34 35 71 3c 6d 6a 9d ce aa 0f 6d 3a 2b eb 4b 95 | 7e cd 31 4e | state #546 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37002eb80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad17c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad17c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #546 | libevent_malloc: new ptr-libevent@0x7fb388064e90 size 128 | #546 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.282798 | resume sending helper answer for #546 suppresed complete_v2_state_transition() and stole MD | #546 spent 0.421 milliseconds in resume sending helper answer | stop processing: state #546 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3700597c0 | processing resume sending helper answer for #587 | start processing: state #587 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 587 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #587 | **emit ISAKMP Message: | initiator cookie: | c3 7c 98 3d b4 74 ab 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-113 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f6 ba c9 c0 d8 66 df e8 7c 54 40 82 4e 21 c1 07 | ikev2 g^x 59 68 7f 81 34 b6 35 92 5b 89 98 f6 ad 25 86 e5 | ikev2 g^x 73 8a 9a f2 4c 57 89 56 da a5 ff d6 a3 7f af f1 | ikev2 g^x f1 2e fb c5 11 47 ee a1 95 f5 26 dc 9e 47 06 cd | ikev2 g^x 34 b9 65 37 bd e1 04 27 c9 ff dc bf 67 78 96 38 | ikev2 g^x 52 9d 88 a0 32 73 3c 23 28 64 dd 93 b3 78 9e 2c | ikev2 g^x f9 cb d6 a4 86 ba f5 1b 60 c2 ad a2 9f 3e 81 a2 | ikev2 g^x f3 45 de 44 3d 28 04 c3 a1 6e 40 b1 4f 46 45 df | ikev2 g^x 5a 2a 79 6c 8f ae b8 30 ef c6 4a 6c 44 7a 01 b2 | ikev2 g^x 1a d8 98 92 1c 93 3e 73 34 b7 46 f8 42 08 19 36 | ikev2 g^x ba 97 66 22 2c 03 8b f7 14 9b 23 5b 0b 56 49 a9 | ikev2 g^x f1 9f 4c c1 da 59 b2 4c 96 91 d8 04 27 b3 bc 68 | ikev2 g^x 94 52 76 73 62 13 56 15 d9 2e 51 2c 30 ed a9 15 | ikev2 g^x 37 ab 85 06 28 93 eb f4 10 09 a8 e7 65 60 d0 d8 | ikev2 g^x c4 01 fb af 1e 97 f6 a3 48 1a 1f f9 86 1a 3d 6b | ikev2 g^x 8c be 9b 4f 2f 82 4e 29 1d 28 1f 1e 06 cf 26 25 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 23 67 1d fb 57 60 2a aa d9 1f a4 c1 63 ac 06 a0 | IKEv2 nonce 22 92 47 d7 31 b6 6b 26 2a 2d 93 db 2d dc c7 6b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c3 7c 98 3d b4 74 ab 99 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 71 | natd_hash: port= 01 f4 | natd_hash: hash= e6 84 7e f9 13 29 fa bb ae 5d 14 1d 96 1e a3 25 | natd_hash: hash= f7 97 44 66 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e6 84 7e f9 13 29 fa bb ae 5d 14 1d 96 1e a3 25 | Notify data f7 97 44 66 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= c3 7c 98 3d b4 74 ab 99 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4c 51 eb 1f 58 50 45 24 34 60 90 38 ee 81 d2 d9 | natd_hash: hash= 53 4c 38 07 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4c 51 eb 1f 58 50 45 24 34 60 90 38 ee 81 d2 d9 | Notify data 53 4c 38 07 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #587 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #587 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #587 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #587: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #587 to 4294967295 after switching state | Message ID: IKE #587 skipping update_recv as MD is fake | Message ID: sent #587 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-113" #587: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.113:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #587) | c3 7c 98 3d b4 74 ab 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 ba c9 c0 d8 66 df e8 7c 54 40 82 4e 21 c1 07 | 59 68 7f 81 34 b6 35 92 5b 89 98 f6 ad 25 86 e5 | 73 8a 9a f2 4c 57 89 56 da a5 ff d6 a3 7f af f1 | f1 2e fb c5 11 47 ee a1 95 f5 26 dc 9e 47 06 cd | 34 b9 65 37 bd e1 04 27 c9 ff dc bf 67 78 96 38 | 52 9d 88 a0 32 73 3c 23 28 64 dd 93 b3 78 9e 2c | f9 cb d6 a4 86 ba f5 1b 60 c2 ad a2 9f 3e 81 a2 | f3 45 de 44 3d 28 04 c3 a1 6e 40 b1 4f 46 45 df | 5a 2a 79 6c 8f ae b8 30 ef c6 4a 6c 44 7a 01 b2 | 1a d8 98 92 1c 93 3e 73 34 b7 46 f8 42 08 19 36 | ba 97 66 22 2c 03 8b f7 14 9b 23 5b 0b 56 49 a9 | f1 9f 4c c1 da 59 b2 4c 96 91 d8 04 27 b3 bc 68 | 94 52 76 73 62 13 56 15 d9 2e 51 2c 30 ed a9 15 | 37 ab 85 06 28 93 eb f4 10 09 a8 e7 65 60 d0 d8 | c4 01 fb af 1e 97 f6 a3 48 1a 1f f9 86 1a 3d 6b | 8c be 9b 4f 2f 82 4e 29 1d 28 1f 1e 06 cf 26 25 | 29 00 00 24 23 67 1d fb 57 60 2a aa d9 1f a4 c1 | 63 ac 06 a0 22 92 47 d7 31 b6 6b 26 2a 2d 93 db | 2d dc c7 6b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 84 7e f9 13 29 fa bb ae 5d 14 1d | 96 1e a3 25 f7 97 44 66 00 00 00 1c 00 00 40 05 | 4c 51 eb 1f 58 50 45 24 34 60 90 38 ee 81 d2 d9 | 53 4c 38 07 | state #587 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b246c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b246c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #587 | libevent_malloc: new ptr-libevent@0x7fb3700597c0 size 128 | #587 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.283319 | resume sending helper answer for #587 suppresed complete_v2_state_transition() and stole MD | #587 spent 0.483 milliseconds in resume sending helper answer | stop processing: state #587 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37005eff0 | processing resume sending helper answer for #578 | start processing: state #578 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 578 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #578 | **emit ISAKMP Message: | initiator cookie: | 68 e2 ee c8 4f 05 0e 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-143 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 84 22 a6 6d d7 fc 8b 0a 14 19 3d f1 fb 0a ed f9 | ikev2 g^x 6f 90 9e 8a 9f a9 d8 ed d1 df 6a a2 d8 b2 22 2e | ikev2 g^x b1 59 73 5e b3 ab 9a 31 51 87 54 fd f4 e8 4e 8d | ikev2 g^x 3f 21 83 6e 35 41 fe 08 72 f5 2d 8d 2a f4 ba e0 | ikev2 g^x 91 8d f0 a1 05 86 67 4b fb b8 b6 6d 1e 1b 25 24 | ikev2 g^x 22 78 8b 7f 2f cf 5d 9a f7 63 da 29 5a 14 94 0b | ikev2 g^x 35 6e 33 f7 ca b2 64 fd 7c 9e 63 2d cf 43 41 22 | ikev2 g^x 59 51 84 8f fb 27 d9 fa 44 51 1e 67 02 f1 d2 0c | ikev2 g^x 45 0f 35 78 a9 8f 35 39 ea c6 d9 8d 03 b0 0f 84 | ikev2 g^x 80 91 04 9f d8 fb ff 28 d3 ab da 21 66 90 1c 59 | ikev2 g^x 8d 41 8b a6 7f 98 ab 4c b6 53 24 a3 ad 53 6f 51 | ikev2 g^x 8f f2 b7 4c d3 82 c2 ad 67 89 34 ab a5 77 52 48 | ikev2 g^x 5e 0b f2 ef f8 d5 a0 42 b1 fe 42 08 88 ca 60 89 | ikev2 g^x 3b cf 5c bd a3 63 ec 76 02 82 7b 9a f3 6f d7 d6 | ikev2 g^x dd e6 17 44 06 f8 37 9b 67 a7 db 60 51 b4 ad 18 | ikev2 g^x 60 cb 7b f0 7e d2 5e 9d 2e 49 2f db ef 23 bd 96 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 46 bf ee 27 91 3e be 20 10 cf 9d 0f e6 4a bd 7e | IKEv2 nonce e9 3b fd c7 94 37 e1 c7 cd 2d 4a 64 84 e7 2b 84 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 68 e2 ee c8 4f 05 0e 80 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8f | natd_hash: port= 01 f4 | natd_hash: hash= a1 0f 29 05 fe c1 9c 12 af b5 65 ca 32 36 33 1d | natd_hash: hash= 77 e8 41 70 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a1 0f 29 05 fe c1 9c 12 af b5 65 ca 32 36 33 1d | Notify data 77 e8 41 70 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 68 e2 ee c8 4f 05 0e 80 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 4a 88 68 5c be 68 1b 50 17 99 f0 8c 97 cf 78 ef | natd_hash: hash= ec cb 25 c1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4a 88 68 5c be 68 1b 50 17 99 f0 8c 97 cf 78 ef | Notify data ec cb 25 c1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #578 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #578 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #578 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #578: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #578 to 4294967295 after switching state | Message ID: IKE #578 skipping update_recv as MD is fake | Message ID: sent #578 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-143" #578: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.143:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #578) | 68 e2 ee c8 4f 05 0e 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 22 a6 6d d7 fc 8b 0a 14 19 3d f1 fb 0a ed f9 | 6f 90 9e 8a 9f a9 d8 ed d1 df 6a a2 d8 b2 22 2e | b1 59 73 5e b3 ab 9a 31 51 87 54 fd f4 e8 4e 8d | 3f 21 83 6e 35 41 fe 08 72 f5 2d 8d 2a f4 ba e0 | 91 8d f0 a1 05 86 67 4b fb b8 b6 6d 1e 1b 25 24 | 22 78 8b 7f 2f cf 5d 9a f7 63 da 29 5a 14 94 0b | 35 6e 33 f7 ca b2 64 fd 7c 9e 63 2d cf 43 41 22 | 59 51 84 8f fb 27 d9 fa 44 51 1e 67 02 f1 d2 0c | 45 0f 35 78 a9 8f 35 39 ea c6 d9 8d 03 b0 0f 84 | 80 91 04 9f d8 fb ff 28 d3 ab da 21 66 90 1c 59 | 8d 41 8b a6 7f 98 ab 4c b6 53 24 a3 ad 53 6f 51 | 8f f2 b7 4c d3 82 c2 ad 67 89 34 ab a5 77 52 48 | 5e 0b f2 ef f8 d5 a0 42 b1 fe 42 08 88 ca 60 89 | 3b cf 5c bd a3 63 ec 76 02 82 7b 9a f3 6f d7 d6 | dd e6 17 44 06 f8 37 9b 67 a7 db 60 51 b4 ad 18 | 60 cb 7b f0 7e d2 5e 9d 2e 49 2f db ef 23 bd 96 | 29 00 00 24 46 bf ee 27 91 3e be 20 10 cf 9d 0f | e6 4a bd 7e e9 3b fd c7 94 37 e1 c7 cd 2d 4a 64 | 84 e7 2b 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 0f 29 05 fe c1 9c 12 af b5 65 ca | 32 36 33 1d 77 e8 41 70 00 00 00 1c 00 00 40 05 | 4a 88 68 5c be 68 1b 50 17 99 f0 8c 97 cf 78 ef | ec cb 25 c1 | state #578 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a5da90 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5da90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #578 | libevent_malloc: new ptr-libevent@0x7fb37005eff0 size 128 | #578 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.283776 | resume sending helper answer for #578 suppresed complete_v2_state_transition() and stole MD | #578 spent 0.423 milliseconds in resume sending helper answer | stop processing: state #578 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35405ef90 | processing resume sending helper answer for #579 | start processing: state #579 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 579 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #579 | **emit ISAKMP Message: | initiator cookie: | f7 57 b5 67 5d 53 5d ab | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-129 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3e 5b ad a3 d5 b5 e0 5b 3c 63 fe 82 fc 8e 12 08 | ikev2 g^x 91 d6 c4 0a 02 eb fa cc 09 df 5f 23 de d8 2b f5 | ikev2 g^x c7 d1 d6 20 b2 e9 e0 44 e8 af 84 2c 0d cf cc f2 | ikev2 g^x 5d 14 d3 a9 26 db 6c d3 5a c5 b6 bb 02 ab 78 5c | ikev2 g^x 8d fd ab e4 18 ac f3 6d 67 ce 9e f1 c9 4e 48 19 | ikev2 g^x 38 ce 5b ee 1f 7e 6a 23 0e c3 35 0a 2d 7b 93 c8 | ikev2 g^x c9 5a 5f 29 c4 9f 5e f1 cc e4 b6 26 ba fc 75 a8 | ikev2 g^x 4e df 30 e0 38 f1 9b 93 15 71 8b 36 cc c8 fb 5e | ikev2 g^x 9c 97 42 2c 87 36 f5 a0 be a8 f9 30 86 f3 27 9c | ikev2 g^x cf e8 6d 6a ec 63 43 19 60 0c 5c 2f 8e b2 0b 0c | ikev2 g^x 5c 25 5d 2a 49 65 27 59 d0 dc 6b b1 3c 0a 06 2c | ikev2 g^x 14 95 03 33 11 da 59 39 c6 df 4f d9 ac c9 48 dc | ikev2 g^x 85 72 4e eb a2 61 cd b4 14 8d 9d 88 fc a5 3d ca | ikev2 g^x dc 4d 1b 8d 2d 5e 50 0b 56 ca d8 dc d3 17 7b 53 | ikev2 g^x 57 13 42 fe 43 06 61 23 81 b7 76 43 10 62 61 76 | ikev2 g^x f6 bc ce 46 30 e9 08 b7 2e e4 25 72 ca 14 7c 12 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 94 e8 55 b4 44 b7 00 bf d8 b6 2e cf 2e 8c 08 03 | IKEv2 nonce dd d5 10 1f dd d7 4a c8 73 e1 d7 76 9d 2b 29 82 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f7 57 b5 67 5d 53 5d ab | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 81 | natd_hash: port= 01 f4 | natd_hash: hash= 4c 52 54 26 54 47 d1 ec 3a 0f bf 18 2b 81 e9 d8 | natd_hash: hash= d6 20 de c2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 4c 52 54 26 54 47 d1 ec 3a 0f bf 18 2b 81 e9 d8 | Notify data d6 20 de c2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f7 57 b5 67 5d 53 5d ab | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e1 d4 5a 12 5b c3 62 c5 dc bb 54 dd 1e 69 c8 f5 | natd_hash: hash= c2 4b d5 7c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e1 d4 5a 12 5b c3 62 c5 dc bb 54 dd 1e 69 c8 f5 | Notify data c2 4b d5 7c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #579 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #579 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #579 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #579: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #579 to 4294967295 after switching state | Message ID: IKE #579 skipping update_recv as MD is fake | Message ID: sent #579 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-129" #579: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.129:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #579) | f7 57 b5 67 5d 53 5d ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 5b ad a3 d5 b5 e0 5b 3c 63 fe 82 fc 8e 12 08 | 91 d6 c4 0a 02 eb fa cc 09 df 5f 23 de d8 2b f5 | c7 d1 d6 20 b2 e9 e0 44 e8 af 84 2c 0d cf cc f2 | 5d 14 d3 a9 26 db 6c d3 5a c5 b6 bb 02 ab 78 5c | 8d fd ab e4 18 ac f3 6d 67 ce 9e f1 c9 4e 48 19 | 38 ce 5b ee 1f 7e 6a 23 0e c3 35 0a 2d 7b 93 c8 | c9 5a 5f 29 c4 9f 5e f1 cc e4 b6 26 ba fc 75 a8 | 4e df 30 e0 38 f1 9b 93 15 71 8b 36 cc c8 fb 5e | 9c 97 42 2c 87 36 f5 a0 be a8 f9 30 86 f3 27 9c | cf e8 6d 6a ec 63 43 19 60 0c 5c 2f 8e b2 0b 0c | 5c 25 5d 2a 49 65 27 59 d0 dc 6b b1 3c 0a 06 2c | 14 95 03 33 11 da 59 39 c6 df 4f d9 ac c9 48 dc | 85 72 4e eb a2 61 cd b4 14 8d 9d 88 fc a5 3d ca | dc 4d 1b 8d 2d 5e 50 0b 56 ca d8 dc d3 17 7b 53 | 57 13 42 fe 43 06 61 23 81 b7 76 43 10 62 61 76 | f6 bc ce 46 30 e9 08 b7 2e e4 25 72 ca 14 7c 12 | 29 00 00 24 94 e8 55 b4 44 b7 00 bf d8 b6 2e cf | 2e 8c 08 03 dd d5 10 1f dd d7 4a c8 73 e1 d7 76 | 9d 2b 29 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 52 54 26 54 47 d1 ec 3a 0f bf 18 | 2b 81 e9 d8 d6 20 de c2 00 00 00 1c 00 00 40 05 | e1 d4 5a 12 5b c3 62 c5 dc bb 54 dd 1e 69 c8 f5 | c2 4b d5 7c | state #579 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb364023a90 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469fb8a0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #579 | libevent_malloc: new ptr-libevent@0x7fb35405ef90 size 128 | #579 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.284269 | resume sending helper answer for #579 suppresed complete_v2_state_transition() and stole MD | #579 spent 0.46 milliseconds in resume sending helper answer | stop processing: state #579 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb338064790 | processing resume sending helper answer for #590 | start processing: state #590 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 590 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #590 | **emit ISAKMP Message: | initiator cookie: | 6c 7d d5 ab c5 87 8a df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-59 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x be 10 c4 6c 74 1b a2 8f 66 7a 62 d2 25 ec 33 a4 | ikev2 g^x 70 d7 c3 96 b8 a1 45 8b 02 09 80 a1 f3 7c 96 6a | ikev2 g^x 39 ed 63 55 b4 78 94 49 5f c4 6b a9 d5 4e f8 12 | ikev2 g^x 1a ac 4b a8 bc a5 a8 12 11 8f ce fd 6b 3c 86 54 | ikev2 g^x ca cb fd 2b 06 f6 33 36 41 59 16 8d 82 7a 0b 1a | ikev2 g^x c7 7f c9 82 7b fe 08 af 9f 61 2b 45 92 6c 6e 24 | ikev2 g^x a4 18 44 e2 17 55 31 77 5a ca 72 7e 7d 88 37 f5 | ikev2 g^x 6d c1 ab 86 9d 67 6d ea ef 9d 8e 62 9d 65 20 07 | ikev2 g^x 45 00 55 47 ac 2c 2b cf 33 ff 98 5d e2 f5 aa c2 | ikev2 g^x 8a a3 0c 25 db 52 4a f6 b5 28 47 29 53 2c f7 88 | ikev2 g^x 0d de 80 45 88 5f 79 8d 46 fb 55 a7 94 65 0d 0e | ikev2 g^x 39 4d a1 ad 42 11 ce f5 0f b0 ea 8b 2c be 25 aa | ikev2 g^x eb 10 3b 8f 68 f9 5b 76 a8 a8 5d fa 34 25 2f aa | ikev2 g^x fd 6c 2c 9f ac 68 3a 0f c6 e4 89 2c c2 fb 6d 39 | ikev2 g^x b5 45 cd 30 f2 bb a2 0c 7b 79 29 25 a0 cb 26 59 | ikev2 g^x 16 3d f7 87 27 3d d0 80 df c0 94 22 c9 92 e3 72 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce aa a1 cb 0a e0 68 cf 8d 79 59 07 9c 1e fd 67 fc | IKEv2 nonce d7 c0 41 c5 19 de f2 e4 bb 83 d9 07 f2 5b 83 76 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6c 7d d5 ab c5 87 8a df | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3b | natd_hash: port= 01 f4 | natd_hash: hash= 96 a4 46 9e 55 3a a4 f8 b6 3f 64 6c 2c e2 55 62 | natd_hash: hash= 44 61 35 d9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 96 a4 46 9e 55 3a a4 f8 b6 3f 64 6c 2c e2 55 62 | Notify data 44 61 35 d9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6c 7d d5 ab c5 87 8a df | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 79 b6 13 d4 15 d9 80 92 7b c3 42 98 a7 4d 57 09 | natd_hash: hash= ac cd 9f ec | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 79 b6 13 d4 15 d9 80 92 7b c3 42 98 a7 4d 57 09 | Notify data ac cd 9f ec | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #590 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #590 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #590 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #590: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #590 to 4294967295 after switching state | Message ID: IKE #590 skipping update_recv as MD is fake | Message ID: sent #590 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-59" #590: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.59:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #590) | 6c 7d d5 ab c5 87 8a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be 10 c4 6c 74 1b a2 8f 66 7a 62 d2 25 ec 33 a4 | 70 d7 c3 96 b8 a1 45 8b 02 09 80 a1 f3 7c 96 6a | 39 ed 63 55 b4 78 94 49 5f c4 6b a9 d5 4e f8 12 | 1a ac 4b a8 bc a5 a8 12 11 8f ce fd 6b 3c 86 54 | ca cb fd 2b 06 f6 33 36 41 59 16 8d 82 7a 0b 1a | c7 7f c9 82 7b fe 08 af 9f 61 2b 45 92 6c 6e 24 | a4 18 44 e2 17 55 31 77 5a ca 72 7e 7d 88 37 f5 | 6d c1 ab 86 9d 67 6d ea ef 9d 8e 62 9d 65 20 07 | 45 00 55 47 ac 2c 2b cf 33 ff 98 5d e2 f5 aa c2 | 8a a3 0c 25 db 52 4a f6 b5 28 47 29 53 2c f7 88 | 0d de 80 45 88 5f 79 8d 46 fb 55 a7 94 65 0d 0e | 39 4d a1 ad 42 11 ce f5 0f b0 ea 8b 2c be 25 aa | eb 10 3b 8f 68 f9 5b 76 a8 a8 5d fa 34 25 2f aa | fd 6c 2c 9f ac 68 3a 0f c6 e4 89 2c c2 fb 6d 39 | b5 45 cd 30 f2 bb a2 0c 7b 79 29 25 a0 cb 26 59 | 16 3d f7 87 27 3d d0 80 df c0 94 22 c9 92 e3 72 | 29 00 00 24 aa a1 cb 0a e0 68 cf 8d 79 59 07 9c | 1e fd 67 fc d7 c0 41 c5 19 de f2 e4 bb 83 d9 07 | f2 5b 83 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 a4 46 9e 55 3a a4 f8 b6 3f 64 6c | 2c e2 55 62 44 61 35 d9 00 00 00 1c 00 00 40 05 | 79 b6 13 d4 15 d9 80 92 7b c3 42 98 a7 4d 57 09 | ac cd 9f ec | state #590 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38801d010 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb388009ed0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388009ed0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #590 | libevent_malloc: new ptr-libevent@0x7fb338064790 size 128 | #590 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.284728 | resume sending helper answer for #590 suppresed complete_v2_state_transition() and stole MD | #590 spent 0.428 milliseconds in resume sending helper answer | stop processing: state #590 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38006a090 | processing resume sending helper answer for #568 | start processing: state #568 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 568 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #568 | **emit ISAKMP Message: | initiator cookie: | 6e 64 73 85 ce f2 b0 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-34 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d6 a3 99 bf 78 b9 d4 1a 84 24 de 04 7c f3 4d c8 | ikev2 g^x 96 8b 02 59 28 04 a0 26 9f 13 67 64 f7 77 7a 65 | ikev2 g^x 5c 17 49 3e 43 8b eb 50 14 de 87 67 95 79 66 a4 | ikev2 g^x ac 29 76 ee dd 7d 07 1f ac 4d a9 5e 2d 67 5f 35 | ikev2 g^x c1 62 fb c8 15 ae a3 12 9b c1 7e 41 bc 7b ec 39 | ikev2 g^x 5b 29 5a 0f 5f 02 56 47 d1 33 0b 64 a8 f0 f9 e0 | ikev2 g^x 79 a9 8c 6d 5d d0 49 7f 45 3b 2b 8e b6 e4 e8 15 | ikev2 g^x de 83 5e 1a 47 c0 32 44 cb e0 50 bd 65 a0 22 bc | ikev2 g^x 0b a6 8b 59 f8 c4 16 dc 3f 1f 41 55 d8 a6 4f 00 | ikev2 g^x f4 0f fd 9e bb a0 ca 89 1c f2 5b 3e b5 1d b0 8a | ikev2 g^x ed 21 82 3c a3 44 7f 36 e9 37 bc ac c1 e1 00 c4 | ikev2 g^x 04 65 71 de 20 77 8c bd 4b 28 11 32 5a 14 67 24 | ikev2 g^x 07 50 c4 30 94 78 de 21 2b 34 e6 c7 52 91 19 f8 | ikev2 g^x 98 c0 be 08 e1 94 2a 06 f0 4f 8e 0c d1 26 ea 08 | ikev2 g^x 99 06 ef 43 9b 53 fc e2 1b 86 fb cc 41 b8 4f 56 | ikev2 g^x b1 9c b0 66 18 e0 a2 81 3f 3a d6 0e 31 c5 b9 d0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 13 36 f4 68 46 c8 45 cb 43 3d ab 7d 06 e4 d0 2e | IKEv2 nonce f6 fd d6 0f 63 23 da 46 eb bc 2f aa 4d ed 12 a3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6e 64 73 85 ce f2 b0 28 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 22 | natd_hash: port= 01 f4 | natd_hash: hash= 96 84 1a 56 ea 9e db cc 8f 31 8a c2 65 e8 4d d8 | natd_hash: hash= 8a 02 34 c8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 96 84 1a 56 ea 9e db cc 8f 31 8a c2 65 e8 4d d8 | Notify data 8a 02 34 c8 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6e 64 73 85 ce f2 b0 28 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 74 34 3f f7 0f 8a 4f 83 f5 c9 a4 b3 22 9c 5e 1d | natd_hash: hash= e6 10 1a 44 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 74 34 3f f7 0f 8a 4f 83 f5 c9 a4 b3 22 9c 5e 1d | Notify data e6 10 1a 44 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #568 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #568 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #568 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #568: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #568 to 4294967295 after switching state | Message ID: IKE #568 skipping update_recv as MD is fake | Message ID: sent #568 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-34" #568: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.34:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #568) | 6e 64 73 85 ce f2 b0 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 a3 99 bf 78 b9 d4 1a 84 24 de 04 7c f3 4d c8 | 96 8b 02 59 28 04 a0 26 9f 13 67 64 f7 77 7a 65 | 5c 17 49 3e 43 8b eb 50 14 de 87 67 95 79 66 a4 | ac 29 76 ee dd 7d 07 1f ac 4d a9 5e 2d 67 5f 35 | c1 62 fb c8 15 ae a3 12 9b c1 7e 41 bc 7b ec 39 | 5b 29 5a 0f 5f 02 56 47 d1 33 0b 64 a8 f0 f9 e0 | 79 a9 8c 6d 5d d0 49 7f 45 3b 2b 8e b6 e4 e8 15 | de 83 5e 1a 47 c0 32 44 cb e0 50 bd 65 a0 22 bc | 0b a6 8b 59 f8 c4 16 dc 3f 1f 41 55 d8 a6 4f 00 | f4 0f fd 9e bb a0 ca 89 1c f2 5b 3e b5 1d b0 8a | ed 21 82 3c a3 44 7f 36 e9 37 bc ac c1 e1 00 c4 | 04 65 71 de 20 77 8c bd 4b 28 11 32 5a 14 67 24 | 07 50 c4 30 94 78 de 21 2b 34 e6 c7 52 91 19 f8 | 98 c0 be 08 e1 94 2a 06 f0 4f 8e 0c d1 26 ea 08 | 99 06 ef 43 9b 53 fc e2 1b 86 fb cc 41 b8 4f 56 | b1 9c b0 66 18 e0 a2 81 3f 3a d6 0e 31 c5 b9 d0 | 29 00 00 24 13 36 f4 68 46 c8 45 cb 43 3d ab 7d | 06 e4 d0 2e f6 fd d6 0f 63 23 da 46 eb bc 2f aa | 4d ed 12 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 84 1a 56 ea 9e db cc 8f 31 8a c2 | 65 e8 4d d8 8a 02 34 c8 00 00 00 1c 00 00 40 05 | 74 34 3f f7 0f 8a 4f 83 f5 c9 a4 b3 22 9c 5e 1d | e6 10 1a 44 | state #568 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3800269d0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb380015160 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380015160 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #568 | libevent_malloc: new ptr-libevent@0x7fb38006a090 size 128 | #568 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.285223 | resume sending helper answer for #568 suppresed complete_v2_state_transition() and stole MD | #568 spent 0.458 milliseconds in resume sending helper answer | stop processing: state #568 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb358059b60 | processing resume sending helper answer for #575 | start processing: state #575 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 575 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #575 | **emit ISAKMP Message: | initiator cookie: | b9 99 36 5a 8c c2 79 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-62 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 22 c8 04 79 a7 ca 7e 22 ae 09 07 e5 fc 49 20 ff | ikev2 g^x d5 2c 7e 22 4c 72 c0 78 1e 2c 5c ec 12 7c 72 d2 | ikev2 g^x 02 e8 75 7b 4a a7 3c c3 16 5c 13 70 ea 37 54 f9 | ikev2 g^x 56 e8 d3 91 10 1a 84 a7 6a bd f8 ed 5e e4 34 35 | ikev2 g^x e4 61 65 f6 21 ef d0 e1 bf 6f 09 fe ff af 3a 45 | ikev2 g^x 86 75 a8 02 ec e4 0e 75 42 6b 01 d8 b1 76 3d b4 | ikev2 g^x dd 64 39 8f d4 1d 82 58 1e c2 7c 1b 86 61 97 0b | ikev2 g^x 7a c0 a1 e4 47 98 4b 18 ef a4 43 98 6c 7e 6d d0 | ikev2 g^x 16 22 ae c2 a0 b2 46 36 87 d4 91 30 13 3f 9a eb | ikev2 g^x 8a 99 16 71 39 ce 4d 5e 49 23 27 dd 31 e1 69 d3 | ikev2 g^x 97 f4 5c 55 69 dc 26 6c 11 fa 11 8a 2a 43 c5 d6 | ikev2 g^x 25 6f 41 fb 1c 99 a2 b8 45 cd 12 29 39 ba ac a3 | ikev2 g^x c6 02 a2 8b a0 be b1 46 84 7b 24 9a f3 d6 f9 65 | ikev2 g^x 1a 69 bd f7 e8 de e9 5a df 78 41 ab f7 29 e1 6b | ikev2 g^x f7 12 cb 1a 99 80 ee c2 16 60 54 4d f3 eb 93 e7 | ikev2 g^x 80 78 df 65 e2 d4 7f 1b 6e a6 c2 48 37 dc 57 12 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce b8 4f 87 74 9c 80 54 81 1f 37 0b 79 c0 75 5b ab | IKEv2 nonce 09 6f 94 95 e5 f3 52 5f 2d 7b fc 69 2d 41 18 98 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b9 99 36 5a 8c c2 79 57 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 3e | natd_hash: port= 01 f4 | natd_hash: hash= cd 17 0c 0b ea 42 91 a8 38 34 87 4d f7 fc 36 4d | natd_hash: hash= 5c d3 fc 11 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cd 17 0c 0b ea 42 91 a8 38 34 87 4d f7 fc 36 4d | Notify data 5c d3 fc 11 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b9 99 36 5a 8c c2 79 57 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d9 91 bf d5 e3 57 28 b5 8a cc 1f cf ff 34 03 80 | natd_hash: hash= 9c e9 c7 70 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d9 91 bf d5 e3 57 28 b5 8a cc 1f cf ff 34 03 80 | Notify data 9c e9 c7 70 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #575 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #575 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #575 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #575: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #575 to 4294967295 after switching state | Message ID: IKE #575 skipping update_recv as MD is fake | Message ID: sent #575 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-62" #575: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.62:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #575) | b9 99 36 5a 8c c2 79 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 c8 04 79 a7 ca 7e 22 ae 09 07 e5 fc 49 20 ff | d5 2c 7e 22 4c 72 c0 78 1e 2c 5c ec 12 7c 72 d2 | 02 e8 75 7b 4a a7 3c c3 16 5c 13 70 ea 37 54 f9 | 56 e8 d3 91 10 1a 84 a7 6a bd f8 ed 5e e4 34 35 | e4 61 65 f6 21 ef d0 e1 bf 6f 09 fe ff af 3a 45 | 86 75 a8 02 ec e4 0e 75 42 6b 01 d8 b1 76 3d b4 | dd 64 39 8f d4 1d 82 58 1e c2 7c 1b 86 61 97 0b | 7a c0 a1 e4 47 98 4b 18 ef a4 43 98 6c 7e 6d d0 | 16 22 ae c2 a0 b2 46 36 87 d4 91 30 13 3f 9a eb | 8a 99 16 71 39 ce 4d 5e 49 23 27 dd 31 e1 69 d3 | 97 f4 5c 55 69 dc 26 6c 11 fa 11 8a 2a 43 c5 d6 | 25 6f 41 fb 1c 99 a2 b8 45 cd 12 29 39 ba ac a3 | c6 02 a2 8b a0 be b1 46 84 7b 24 9a f3 d6 f9 65 | 1a 69 bd f7 e8 de e9 5a df 78 41 ab f7 29 e1 6b | f7 12 cb 1a 99 80 ee c2 16 60 54 4d f3 eb 93 e7 | 80 78 df 65 e2 d4 7f 1b 6e a6 c2 48 37 dc 57 12 | 29 00 00 24 b8 4f 87 74 9c 80 54 81 1f 37 0b 79 | c0 75 5b ab 09 6f 94 95 e5 f3 52 5f 2d 7b fc 69 | 2d 41 18 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 17 0c 0b ea 42 91 a8 38 34 87 4d | f7 fc 36 4d 5c d3 fc 11 00 00 00 1c 00 00 40 05 | d9 91 bf d5 e3 57 28 b5 8a cc 1f cf ff 34 03 80 | 9c e9 c7 70 | state #575 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c00cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb388043350 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358009690 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #575 | libevent_malloc: new ptr-libevent@0x7fb358059b60 size 128 | #575 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.285677 | resume sending helper answer for #575 suppresed complete_v2_state_transition() and stole MD | #575 spent 0.424 milliseconds in resume sending helper answer | stop processing: state #575 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c059570 | processing resume sending helper answer for #577 | start processing: state #577 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 577 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #577 | **emit ISAKMP Message: | initiator cookie: | 9a e9 29 4a fb ed 2f 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-15 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x eb 42 00 89 a8 1c aa c4 50 d8 16 0d 57 8a 4c 0c | ikev2 g^x 65 7f e4 c6 cb 70 da 12 6d e2 7e 03 21 93 d2 33 | ikev2 g^x c0 0e 36 f5 83 0c 2b 56 86 5b 5b 11 98 4d 5e 26 | ikev2 g^x 1b d6 c9 20 6f 52 e9 5a a4 2c 26 ed 04 b2 dc be | ikev2 g^x 5d ce 66 9c 58 f4 61 27 fb c1 4e 8a 69 60 4b bd | ikev2 g^x f0 4f 86 25 0f a2 2a bb fe 4f 50 ef a2 d8 d6 78 | ikev2 g^x 6c 29 24 25 fe 51 e0 6c 3a c0 fd 3f 00 f0 3a f4 | ikev2 g^x 91 32 2d e3 b6 e9 c2 02 b0 11 e2 cc 36 2c 5f 10 | ikev2 g^x d5 2c ac 60 4a b1 d5 39 16 8d 42 4d 99 5c aa 84 | ikev2 g^x 91 c9 31 b0 23 ba 96 66 57 3d 13 7c 31 a0 b2 bf | ikev2 g^x fa 79 80 3a 47 a1 84 04 8d d1 db 1f 63 3d 31 9f | ikev2 g^x 0d 65 07 7c d8 39 05 9e 48 0a ce ef 34 aa 84 80 | ikev2 g^x 97 ab 9b 1c e2 7f e7 6e d5 2d e8 2c da be dd fd | ikev2 g^x a4 36 1e 62 ea bf ea e8 63 2c 01 66 94 be 8d 91 | ikev2 g^x a8 b7 16 4e 15 f7 b4 a4 5f 2d 8d 36 c0 1c 88 7f | ikev2 g^x de 2b af 28 ec 3a 09 33 ee 83 97 d2 90 d0 8d a7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 88 b2 79 ff 2c a8 2c 3e 30 78 3a f8 a3 fb 41 22 | IKEv2 nonce e8 46 1c 6c 2e 90 10 b7 fd 31 f8 c3 36 1a 6c 24 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9a e9 29 4a fb ed 2f 7b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0f | natd_hash: port= 01 f4 | natd_hash: hash= 75 44 a9 8d f4 0a df ee dc c8 f6 79 31 59 33 9e | natd_hash: hash= 08 98 28 4b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 75 44 a9 8d f4 0a df ee dc c8 f6 79 31 59 33 9e | Notify data 08 98 28 4b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9a e9 29 4a fb ed 2f 7b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1f 98 b4 df a5 90 16 30 b3 41 56 5d 2e 2c cf 6b | natd_hash: hash= 1e d4 e3 0a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1f 98 b4 df a5 90 16 30 b3 41 56 5d 2e 2c cf 6b | Notify data 1e d4 e3 0a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #577 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #577 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #577 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #577: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #577 to 4294967295 after switching state | Message ID: IKE #577 skipping update_recv as MD is fake | Message ID: sent #577 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-15" #577: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.15:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #577) | 9a e9 29 4a fb ed 2f 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb 42 00 89 a8 1c aa c4 50 d8 16 0d 57 8a 4c 0c | 65 7f e4 c6 cb 70 da 12 6d e2 7e 03 21 93 d2 33 | c0 0e 36 f5 83 0c 2b 56 86 5b 5b 11 98 4d 5e 26 | 1b d6 c9 20 6f 52 e9 5a a4 2c 26 ed 04 b2 dc be | 5d ce 66 9c 58 f4 61 27 fb c1 4e 8a 69 60 4b bd | f0 4f 86 25 0f a2 2a bb fe 4f 50 ef a2 d8 d6 78 | 6c 29 24 25 fe 51 e0 6c 3a c0 fd 3f 00 f0 3a f4 | 91 32 2d e3 b6 e9 c2 02 b0 11 e2 cc 36 2c 5f 10 | d5 2c ac 60 4a b1 d5 39 16 8d 42 4d 99 5c aa 84 | 91 c9 31 b0 23 ba 96 66 57 3d 13 7c 31 a0 b2 bf | fa 79 80 3a 47 a1 84 04 8d d1 db 1f 63 3d 31 9f | 0d 65 07 7c d8 39 05 9e 48 0a ce ef 34 aa 84 80 | 97 ab 9b 1c e2 7f e7 6e d5 2d e8 2c da be dd fd | a4 36 1e 62 ea bf ea e8 63 2c 01 66 94 be 8d 91 | a8 b7 16 4e 15 f7 b4 a4 5f 2d 8d 36 c0 1c 88 7f | de 2b af 28 ec 3a 09 33 ee 83 97 d2 90 d0 8d a7 | 29 00 00 24 88 b2 79 ff 2c a8 2c 3e 30 78 3a f8 | a3 fb 41 22 e8 46 1c 6c 2e 90 10 b7 fd 31 f8 c3 | 36 1a 6c 24 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 44 a9 8d f4 0a df ee dc c8 f6 79 | 31 59 33 9e 08 98 28 4b 00 00 00 1c 00 00 40 05 | 1f 98 b4 df a5 90 16 30 b3 41 56 5d 2e 2c cf 6b | 1e d4 e3 0a | state #577 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36001fd50 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36000d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c023c10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #577 | libevent_malloc: new ptr-libevent@0x7fb34c059570 size 128 | #577 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.286145 | resume sending helper answer for #577 suppresed complete_v2_state_transition() and stole MD | #577 spent 0.444 milliseconds in resume sending helper answer | stop processing: state #577 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34805e9d0 | processing resume sending helper answer for #566 | start processing: state #566 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 566 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #566 | **emit ISAKMP Message: | initiator cookie: | 88 80 6b f4 b9 8d 66 b5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-39 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x ef c8 5e ab f5 ee a4 b9 98 60 85 05 ca 3b 04 b0 | ikev2 g^x 7d 9f 17 5c c2 7c 2b 4a da 7e 26 15 fc 48 81 31 | ikev2 g^x b4 8e c6 e5 11 7d 74 25 e5 99 ba 1d 58 67 84 5f | ikev2 g^x 89 d2 e2 25 03 e3 33 52 7a ed d7 e2 f5 b6 28 a4 | ikev2 g^x 1d 2f f7 d4 f6 94 af 23 10 a8 8a fc f4 89 a2 3c | ikev2 g^x a5 d5 e3 17 b6 f0 c4 8f 7f 71 4d 6f bb 87 76 f5 | ikev2 g^x a2 04 13 1b a7 e6 0f e4 4c 2d 33 e9 31 87 17 3c | ikev2 g^x cd 1f 22 8b 07 c8 21 5a 22 9c 36 40 a1 0d 7a 52 | ikev2 g^x af 7b bb f0 61 88 95 3a 59 92 5f 05 a1 92 fb 6c | ikev2 g^x 3d 4d bd 20 03 45 e8 a3 b0 a6 b7 00 08 7f 5b e1 | ikev2 g^x f5 a0 c3 e2 5c ca 78 79 72 98 fa 67 35 e4 cc fb | ikev2 g^x 8a b3 33 65 b6 e9 a2 86 fe 7c ee ff 0a 6f 23 a1 | ikev2 g^x 84 0d 45 d3 fd f8 6d 40 31 50 c7 97 1c 51 ef a1 | ikev2 g^x 74 f8 15 00 16 ec 9e e6 ab 9d 53 7c 15 3a f7 d3 | ikev2 g^x 7c 57 1b b1 1c 4b 72 88 0a 87 ab 54 4a 5b c4 c2 | ikev2 g^x 57 bd 4e a5 0a 4c 3d fe 53 4b 65 c4 64 95 29 91 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c8 7c cd e0 b2 c0 7c bc b4 0e 89 92 98 cf b4 cf | IKEv2 nonce 69 f0 3f 2f 7e 50 0c 76 dd c6 f5 df 0c da 14 a5 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 88 80 6b f4 b9 8d 66 b5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 27 | natd_hash: port= 01 f4 | natd_hash: hash= 1b d4 72 88 ba f6 c3 75 62 5e 72 62 65 f9 8a 24 | natd_hash: hash= 3d dc 56 74 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b d4 72 88 ba f6 c3 75 62 5e 72 62 65 f9 8a 24 | Notify data 3d dc 56 74 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 88 80 6b f4 b9 8d 66 b5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 54 09 d9 d9 07 67 4c aa 17 b3 39 aa 94 51 7e e0 | natd_hash: hash= 9c 0e 3e 5d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 54 09 d9 d9 07 67 4c aa 17 b3 39 aa 94 51 7e e0 | Notify data 9c 0e 3e 5d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #566 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #566 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #566 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #566: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #566 to 4294967295 after switching state | Message ID: IKE #566 skipping update_recv as MD is fake | Message ID: sent #566 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-39" #566: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.39:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #566) | 88 80 6b f4 b9 8d 66 b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef c8 5e ab f5 ee a4 b9 98 60 85 05 ca 3b 04 b0 | 7d 9f 17 5c c2 7c 2b 4a da 7e 26 15 fc 48 81 31 | b4 8e c6 e5 11 7d 74 25 e5 99 ba 1d 58 67 84 5f | 89 d2 e2 25 03 e3 33 52 7a ed d7 e2 f5 b6 28 a4 | 1d 2f f7 d4 f6 94 af 23 10 a8 8a fc f4 89 a2 3c | a5 d5 e3 17 b6 f0 c4 8f 7f 71 4d 6f bb 87 76 f5 | a2 04 13 1b a7 e6 0f e4 4c 2d 33 e9 31 87 17 3c | cd 1f 22 8b 07 c8 21 5a 22 9c 36 40 a1 0d 7a 52 | af 7b bb f0 61 88 95 3a 59 92 5f 05 a1 92 fb 6c | 3d 4d bd 20 03 45 e8 a3 b0 a6 b7 00 08 7f 5b e1 | f5 a0 c3 e2 5c ca 78 79 72 98 fa 67 35 e4 cc fb | 8a b3 33 65 b6 e9 a2 86 fe 7c ee ff 0a 6f 23 a1 | 84 0d 45 d3 fd f8 6d 40 31 50 c7 97 1c 51 ef a1 | 74 f8 15 00 16 ec 9e e6 ab 9d 53 7c 15 3a f7 d3 | 7c 57 1b b1 1c 4b 72 88 0a 87 ab 54 4a 5b c4 c2 | 57 bd 4e a5 0a 4c 3d fe 53 4b 65 c4 64 95 29 91 | 29 00 00 24 c8 7c cd e0 b2 c0 7c bc b4 0e 89 92 | 98 cf b4 cf 69 f0 3f 2f 7e 50 0c 76 dd c6 f5 df | 0c da 14 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b d4 72 88 ba f6 c3 75 62 5e 72 62 | 65 f9 8a 24 3d dc 56 74 00 00 00 1c 00 00 40 05 | 54 09 d9 d9 07 67 4c aa 17 b3 39 aa 94 51 7e e0 | 9c 0e 3e 5d | state #566 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38002d3a0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a76210 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348012890 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #566 | libevent_malloc: new ptr-libevent@0x7fb34805e9d0 size 128 | #566 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.286654 | resume sending helper answer for #566 suppresed complete_v2_state_transition() and stole MD | #566 spent 0.486 milliseconds in resume sending helper answer | stop processing: state #566 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb350044980 | processing resume sending helper answer for #572 | start processing: state #572 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 572 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #572 | **emit ISAKMP Message: | initiator cookie: | ae 6d 7f 89 27 62 b0 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-13 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fa 78 66 53 84 1a a1 cc 77 c2 d3 46 14 49 c7 a7 | ikev2 g^x f9 f4 42 bd ed cc 70 a1 f5 f8 c4 d7 3c 91 88 2a | ikev2 g^x 3d 9e 83 b6 af 23 02 04 fc 58 e6 76 b8 bc 6f 3d | ikev2 g^x e3 a8 79 73 32 9c d8 64 d1 bd 4e cb 31 26 96 5f | ikev2 g^x f4 96 4f ff 80 84 2b 76 9a 2c 0b 78 4d c7 a7 39 | ikev2 g^x 8c 0b 43 fe 1a ab fb f6 42 71 6f af b4 37 f9 74 | ikev2 g^x 81 28 44 35 64 2e 59 d7 a3 88 97 bd 34 c6 2c 7c | ikev2 g^x c1 ef 65 e7 0b bd 37 30 3c ee f2 66 0b 28 7a 27 | ikev2 g^x 2a ba 30 fb a3 66 78 77 e9 23 14 b0 c0 ac 30 27 | ikev2 g^x a6 66 34 a1 40 07 ec e7 54 c0 52 99 c7 6b 37 d0 | ikev2 g^x a0 9a 5a 1f ce 21 9c 3f f8 06 85 27 6f 23 30 ad | ikev2 g^x 02 4c 8b 40 ed 46 68 4b c8 97 b7 56 b3 69 62 99 | ikev2 g^x d5 40 a8 dc 62 f6 2f 3e 9e b7 88 dc a5 86 5a 54 | ikev2 g^x ff 1b 85 38 b9 ed bc 18 95 1a ff e6 a7 39 0a 2e | ikev2 g^x e7 55 17 cd d1 2c e0 f8 49 15 7d b6 bb e0 3f af | ikev2 g^x a2 17 66 7c 8f 3c 67 d1 87 3d 7f be bb d3 05 fb | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 7a 95 97 28 24 e4 3f 20 6f 1b b0 b9 00 dc 1a 54 | IKEv2 nonce 3f 6c d8 cc cd 76 a4 2a 0f 96 20 2d fe a2 65 7b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ae 6d 7f 89 27 62 b0 3c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0d | natd_hash: port= 01 f4 | natd_hash: hash= 78 6e 36 01 db 56 da c9 c9 f6 21 e0 9e 8d 5d b9 | natd_hash: hash= d9 f9 82 a2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 78 6e 36 01 db 56 da c9 c9 f6 21 e0 9e 8d 5d b9 | Notify data d9 f9 82 a2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ae 6d 7f 89 27 62 b0 3c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= dc 5e 49 c6 b4 b7 74 61 6f 59 0d 14 88 e4 ba 50 | natd_hash: hash= 0e 62 7e 46 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dc 5e 49 c6 b4 b7 74 61 6f 59 0d 14 88 e4 ba 50 | Notify data 0e 62 7e 46 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #572 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #572 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #572 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #572: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #572 to 4294967295 after switching state | Message ID: IKE #572 skipping update_recv as MD is fake | Message ID: sent #572 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-13" #572: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.13:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #572) | ae 6d 7f 89 27 62 b0 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 78 66 53 84 1a a1 cc 77 c2 d3 46 14 49 c7 a7 | f9 f4 42 bd ed cc 70 a1 f5 f8 c4 d7 3c 91 88 2a | 3d 9e 83 b6 af 23 02 04 fc 58 e6 76 b8 bc 6f 3d | e3 a8 79 73 32 9c d8 64 d1 bd 4e cb 31 26 96 5f | f4 96 4f ff 80 84 2b 76 9a 2c 0b 78 4d c7 a7 39 | 8c 0b 43 fe 1a ab fb f6 42 71 6f af b4 37 f9 74 | 81 28 44 35 64 2e 59 d7 a3 88 97 bd 34 c6 2c 7c | c1 ef 65 e7 0b bd 37 30 3c ee f2 66 0b 28 7a 27 | 2a ba 30 fb a3 66 78 77 e9 23 14 b0 c0 ac 30 27 | a6 66 34 a1 40 07 ec e7 54 c0 52 99 c7 6b 37 d0 | a0 9a 5a 1f ce 21 9c 3f f8 06 85 27 6f 23 30 ad | 02 4c 8b 40 ed 46 68 4b c8 97 b7 56 b3 69 62 99 | d5 40 a8 dc 62 f6 2f 3e 9e b7 88 dc a5 86 5a 54 | ff 1b 85 38 b9 ed bc 18 95 1a ff e6 a7 39 0a 2e | e7 55 17 cd d1 2c e0 f8 49 15 7d b6 bb e0 3f af | a2 17 66 7c 8f 3c 67 d1 87 3d 7f be bb d3 05 fb | 29 00 00 24 7a 95 97 28 24 e4 3f 20 6f 1b b0 b9 | 00 dc 1a 54 3f 6c d8 cc cd 76 a4 2a 0f 96 20 2d | fe a2 65 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 6e 36 01 db 56 da c9 c9 f6 21 e0 | 9e 8d 5d b9 d9 f9 82 a2 00 00 00 1c 00 00 40 05 | dc 5e 49 c6 b4 b7 74 61 6f 59 0d 14 88 e4 ba 50 | 0e 62 7e 46 | state #572 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36401f4e0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c00d120 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #572 | libevent_malloc: new ptr-libevent@0x7fb36401f4e0 size 128 | #572 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.287089 | resume sending helper answer for #572 suppresed complete_v2_state_transition() and stole MD | #572 spent 0.404 milliseconds in resume sending helper answer | stop processing: state #572 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3440596f0 | processing resume sending helper answer for #581 | start processing: state #581 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 581 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #581 | **emit ISAKMP Message: | initiator cookie: | 32 81 f4 dc 89 2b 8b e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-121 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 75 5d a0 37 46 04 87 9a b6 6f c7 58 5f 83 03 92 | ikev2 g^x 02 7c 2a 9d f7 53 2a e5 0b 99 84 74 ec e8 cd 8a | ikev2 g^x 37 bf 28 7a 29 fe a1 eb 1c 5b 7a cb 37 de ef 1a | ikev2 g^x bf c2 4e 23 55 33 da a9 f6 17 3d 8b f1 6d 00 2f | ikev2 g^x 62 ea 42 d9 b5 b8 8f 47 c3 23 ad 53 eb 4c 74 2c | ikev2 g^x e9 34 fd a5 c8 bb c5 80 14 80 c7 0b 8c 50 e2 47 | ikev2 g^x de 21 2d f2 8b b1 5c b6 9a 5d 04 45 b3 11 7d ef | ikev2 g^x e1 83 dd 1e ba b6 e0 ad d4 d2 d2 08 bd 90 e1 fa | ikev2 g^x 94 b8 05 91 5f a8 5e a5 f9 fa e3 25 cd 10 cd 73 | ikev2 g^x 6c 38 de b0 68 38 4f 9e 42 60 5f 63 68 b8 84 1d | ikev2 g^x 1e 04 f9 aa 37 d8 83 d0 d4 62 ad f8 03 24 51 28 | ikev2 g^x 44 a0 bd 38 97 06 60 9d 53 0d 2c c3 79 30 58 3d | ikev2 g^x 74 fe 30 eb c7 d9 28 61 30 6d 56 9a 52 da 0d 3c | ikev2 g^x ba a5 64 a7 7b ba f6 9f 41 d6 92 6f c0 bb 6e 63 | ikev2 g^x 61 ab be e9 7e 12 35 ed 54 b5 c8 d2 0e 78 a4 08 | ikev2 g^x 61 fb 98 ae 3e a3 b4 05 6b 0c e2 c6 c7 c1 c9 60 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce d1 95 dc 3f 02 70 5b 6c 62 02 ec 87 81 84 54 7b | IKEv2 nonce ca 76 e8 0d a8 e7 c8 f2 57 8a a9 b7 73 9c 0c 4b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 32 81 f4 dc 89 2b 8b e7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 79 | natd_hash: port= 01 f4 | natd_hash: hash= b9 ca 9f f5 7d 53 45 e4 91 b2 47 fd fe fb 46 b0 | natd_hash: hash= 89 4e d8 b4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b9 ca 9f f5 7d 53 45 e4 91 b2 47 fd fe fb 46 b0 | Notify data 89 4e d8 b4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 32 81 f4 dc 89 2b 8b e7 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a0 2f bb 08 8b 1a a2 cf 99 1d b1 55 9c d9 bf a8 | natd_hash: hash= b6 d2 07 0a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a0 2f bb 08 8b 1a a2 cf 99 1d b1 55 9c d9 bf a8 | Notify data b6 d2 07 0a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #581 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #581 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #581 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #581: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #581 to 4294967295 after switching state | Message ID: IKE #581 skipping update_recv as MD is fake | Message ID: sent #581 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-121" #581: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.121:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #581) | 32 81 f4 dc 89 2b 8b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 5d a0 37 46 04 87 9a b6 6f c7 58 5f 83 03 92 | 02 7c 2a 9d f7 53 2a e5 0b 99 84 74 ec e8 cd 8a | 37 bf 28 7a 29 fe a1 eb 1c 5b 7a cb 37 de ef 1a | bf c2 4e 23 55 33 da a9 f6 17 3d 8b f1 6d 00 2f | 62 ea 42 d9 b5 b8 8f 47 c3 23 ad 53 eb 4c 74 2c | e9 34 fd a5 c8 bb c5 80 14 80 c7 0b 8c 50 e2 47 | de 21 2d f2 8b b1 5c b6 9a 5d 04 45 b3 11 7d ef | e1 83 dd 1e ba b6 e0 ad d4 d2 d2 08 bd 90 e1 fa | 94 b8 05 91 5f a8 5e a5 f9 fa e3 25 cd 10 cd 73 | 6c 38 de b0 68 38 4f 9e 42 60 5f 63 68 b8 84 1d | 1e 04 f9 aa 37 d8 83 d0 d4 62 ad f8 03 24 51 28 | 44 a0 bd 38 97 06 60 9d 53 0d 2c c3 79 30 58 3d | 74 fe 30 eb c7 d9 28 61 30 6d 56 9a 52 da 0d 3c | ba a5 64 a7 7b ba f6 9f 41 d6 92 6f c0 bb 6e 63 | 61 ab be e9 7e 12 35 ed 54 b5 c8 d2 0e 78 a4 08 | 61 fb 98 ae 3e a3 b4 05 6b 0c e2 c6 c7 c1 c9 60 | 29 00 00 24 d1 95 dc 3f 02 70 5b 6c 62 02 ec 87 | 81 84 54 7b ca 76 e8 0d a8 e7 c8 f2 57 8a a9 b7 | 73 9c 0c 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 ca 9f f5 7d 53 45 e4 91 b2 47 fd | fe fb 46 b0 89 4e d8 b4 00 00 00 1c 00 00 40 05 | a0 2f bb 08 8b 1a a2 cf 99 1d b1 55 9c d9 bf a8 | b6 d2 07 0a | state #581 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb384036e20 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb3840489a0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840489a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #581 | libevent_malloc: new ptr-libevent@0x7fb3440596f0 size 128 | #581 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.287524 | resume sending helper answer for #581 suppresed complete_v2_state_transition() and stole MD | #581 spent 0.416 milliseconds in resume sending helper answer | stop processing: state #581 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37405f150 | processing resume sending helper answer for #585 | start processing: state #585 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 585 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #585 | **emit ISAKMP Message: | initiator cookie: | 4a 2d 06 a5 9b 4b 99 7c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-56 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 64 29 a0 67 33 95 5c 1d b9 11 2a c0 eb 4e 4c a9 | ikev2 g^x e0 4a 90 97 d9 14 6c 5c fa c2 84 25 94 ed 30 2a | ikev2 g^x b0 88 7c 51 d2 d7 ff 29 a2 e1 b8 25 0b 85 ce b7 | ikev2 g^x b2 12 f6 3a bd 7c d3 5e 0a ae 7c e5 dc a9 b5 e0 | ikev2 g^x b1 73 f8 5b c6 30 50 76 ab ce 7d 60 1b 21 f2 24 | ikev2 g^x de 59 93 e2 2f 8b 16 ba cb 3a 00 66 a1 42 8c d0 | ikev2 g^x f2 69 c8 bd a5 c5 17 99 23 d2 e7 08 52 58 cf 46 | ikev2 g^x 18 6a 5f de 56 35 01 8c d2 ff 97 28 1d 1b bb 92 | ikev2 g^x 48 6c 2a ec 7b 82 4c 83 40 17 8c 13 5d fb 0c ea | ikev2 g^x df 44 dc d0 94 b6 10 69 f9 90 b9 8d ee 30 ce 05 | ikev2 g^x e3 86 29 c2 e5 c6 ce 54 2b ff d1 3d 10 ca 32 02 | ikev2 g^x 12 72 23 d7 dd b3 7f b0 17 38 2e 43 6c 10 4a 0f | ikev2 g^x 86 3b b1 4d 71 cb 29 6b f7 89 2e 9c f1 20 88 1c | ikev2 g^x 84 7f 4a a5 ce 80 ec a8 9e f2 52 7b 0c bb 09 70 | ikev2 g^x c6 d1 fd 42 0e b3 07 8b 67 74 82 05 59 36 9e 22 | ikev2 g^x c4 7c b2 4e 57 7b 68 cc 85 67 3b 47 1f 9f c7 67 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 28 e8 a9 33 f5 cb ea 77 ac 0a f0 23 81 90 3e d5 | IKEv2 nonce 9d e8 ea 75 7c 29 f7 bb ce e1 94 cc 81 10 ca e6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4a 2d 06 a5 9b 4b 99 7c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 38 | natd_hash: port= 01 f4 | natd_hash: hash= e1 7f 8b 08 d1 d7 03 c9 45 07 dd 1c f2 db 4d da | natd_hash: hash= 97 13 01 ed | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e1 7f 8b 08 d1 d7 03 c9 45 07 dd 1c f2 db 4d da | Notify data 97 13 01 ed | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 4a 2d 06 a5 9b 4b 99 7c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1b 39 fc df 1f 4f 07 bc 04 62 76 b3 b9 a8 ed 18 | natd_hash: hash= a7 41 03 5e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b 39 fc df 1f 4f 07 bc 04 62 76 b3 b9 a8 ed 18 | Notify data a7 41 03 5e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #585 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #585 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #585 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #585: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #585 to 4294967295 after switching state | Message ID: IKE #585 skipping update_recv as MD is fake | Message ID: sent #585 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-56" #585: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.56:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #585) | 4a 2d 06 a5 9b 4b 99 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 29 a0 67 33 95 5c 1d b9 11 2a c0 eb 4e 4c a9 | e0 4a 90 97 d9 14 6c 5c fa c2 84 25 94 ed 30 2a | b0 88 7c 51 d2 d7 ff 29 a2 e1 b8 25 0b 85 ce b7 | b2 12 f6 3a bd 7c d3 5e 0a ae 7c e5 dc a9 b5 e0 | b1 73 f8 5b c6 30 50 76 ab ce 7d 60 1b 21 f2 24 | de 59 93 e2 2f 8b 16 ba cb 3a 00 66 a1 42 8c d0 | f2 69 c8 bd a5 c5 17 99 23 d2 e7 08 52 58 cf 46 | 18 6a 5f de 56 35 01 8c d2 ff 97 28 1d 1b bb 92 | 48 6c 2a ec 7b 82 4c 83 40 17 8c 13 5d fb 0c ea | df 44 dc d0 94 b6 10 69 f9 90 b9 8d ee 30 ce 05 | e3 86 29 c2 e5 c6 ce 54 2b ff d1 3d 10 ca 32 02 | 12 72 23 d7 dd b3 7f b0 17 38 2e 43 6c 10 4a 0f | 86 3b b1 4d 71 cb 29 6b f7 89 2e 9c f1 20 88 1c | 84 7f 4a a5 ce 80 ec a8 9e f2 52 7b 0c bb 09 70 | c6 d1 fd 42 0e b3 07 8b 67 74 82 05 59 36 9e 22 | c4 7c b2 4e 57 7b 68 cc 85 67 3b 47 1f 9f c7 67 | 29 00 00 24 28 e8 a9 33 f5 cb ea 77 ac 0a f0 23 | 81 90 3e d5 9d e8 ea 75 7c 29 f7 bb ce e1 94 cc | 81 10 ca e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e1 7f 8b 08 d1 d7 03 c9 45 07 dd 1c | f2 db 4d da 97 13 01 ed 00 00 00 1c 00 00 40 05 | 1b 39 fc df 1f 4f 07 bc 04 62 76 b3 b9 a8 ed 18 | a7 41 03 5e | state #585 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37002a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad4380 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad4380 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #585 | libevent_malloc: new ptr-libevent@0x7fb37405f150 size 128 | #585 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.287842 | resume sending helper answer for #585 suppresed complete_v2_state_transition() and stole MD | #585 spent 0.3 milliseconds in resume sending helper answer | stop processing: state #585 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c05eea0 | processing resume sending helper answer for #613 | start processing: state #613 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 613 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #613 | **emit ISAKMP Message: | initiator cookie: | 79 93 08 03 2c b4 dd 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-31 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 9a e1 6a 82 db ed db 74 ee b6 15 12 39 71 33 bf | ikev2 g^x 8a 46 d7 c6 c5 8a 1b 3d a2 de 2e f1 c1 94 33 c0 | ikev2 g^x 34 aa cd 57 d3 68 0a 98 44 dd 52 e4 12 32 bd 16 | ikev2 g^x 0c e2 b3 0c 1d f7 54 42 90 09 2f 70 da 3e dc 46 | ikev2 g^x 26 73 29 3f 4d 95 44 51 c4 ee d0 51 62 f5 23 73 | ikev2 g^x b1 79 05 13 44 f0 8d 5a 13 9f d6 c9 04 56 fa e7 | ikev2 g^x a2 43 d1 96 b2 b6 52 69 ea dc 64 81 12 bc 22 c2 | ikev2 g^x c4 ee a3 e1 69 5f f8 37 1b e7 00 a6 82 ff ee 85 | ikev2 g^x 5b 12 1c 2b ba ff 36 aa 33 29 61 20 53 f5 26 6e | ikev2 g^x e7 36 fb 9e 58 96 08 1a f4 41 81 4b 11 d3 c0 cd | ikev2 g^x 3e d4 7f 23 fd 79 62 dc 64 4c e9 e5 d0 f2 db a5 | ikev2 g^x 1b cd 14 72 42 56 15 bb 0e b4 bb d4 e6 c8 7c c1 | ikev2 g^x 88 7c 43 0b f3 ed 50 68 99 2f e0 93 89 bc b2 e4 | ikev2 g^x 01 54 87 c5 c5 6f e4 ac 60 cf 42 a6 f1 da 67 fd | ikev2 g^x 37 ef 53 de 9e 68 36 8d 63 23 d3 89 29 6d 55 6a | ikev2 g^x db 4d b6 90 4e 9f 31 7b 83 b2 4e 39 37 2c 7c 49 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 38 88 3a 8e 21 d0 99 01 66 b4 5d 84 38 93 2d 4f | IKEv2 nonce e7 27 09 2a 71 43 d3 fd 55 4d 04 8f a5 6a 55 8d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 79 93 08 03 2c b4 dd 57 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1f | natd_hash: port= 01 f4 | natd_hash: hash= 28 b5 7c 10 1e 73 0b 8e c4 8c 67 0d 37 a9 91 c5 | natd_hash: hash= 05 2c 6c b2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 28 b5 7c 10 1e 73 0b 8e c4 8c 67 0d 37 a9 91 c5 | Notify data 05 2c 6c b2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 79 93 08 03 2c b4 dd 57 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 8a 81 ac a2 d8 3f 44 cf aa 4d f4 06 c5 76 63 33 | natd_hash: hash= 40 a4 d1 4c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8a 81 ac a2 d8 3f 44 cf aa 4d f4 06 c5 76 63 33 | Notify data 40 a4 d1 4c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #613 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #613 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #613 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #613: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #613 to 4294967295 after switching state | Message ID: IKE #613 skipping update_recv as MD is fake | Message ID: sent #613 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-31" #613: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.31:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #613) | 79 93 08 03 2c b4 dd 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a e1 6a 82 db ed db 74 ee b6 15 12 39 71 33 bf | 8a 46 d7 c6 c5 8a 1b 3d a2 de 2e f1 c1 94 33 c0 | 34 aa cd 57 d3 68 0a 98 44 dd 52 e4 12 32 bd 16 | 0c e2 b3 0c 1d f7 54 42 90 09 2f 70 da 3e dc 46 | 26 73 29 3f 4d 95 44 51 c4 ee d0 51 62 f5 23 73 | b1 79 05 13 44 f0 8d 5a 13 9f d6 c9 04 56 fa e7 | a2 43 d1 96 b2 b6 52 69 ea dc 64 81 12 bc 22 c2 | c4 ee a3 e1 69 5f f8 37 1b e7 00 a6 82 ff ee 85 | 5b 12 1c 2b ba ff 36 aa 33 29 61 20 53 f5 26 6e | e7 36 fb 9e 58 96 08 1a f4 41 81 4b 11 d3 c0 cd | 3e d4 7f 23 fd 79 62 dc 64 4c e9 e5 d0 f2 db a5 | 1b cd 14 72 42 56 15 bb 0e b4 bb d4 e6 c8 7c c1 | 88 7c 43 0b f3 ed 50 68 99 2f e0 93 89 bc b2 e4 | 01 54 87 c5 c5 6f e4 ac 60 cf 42 a6 f1 da 67 fd | 37 ef 53 de 9e 68 36 8d 63 23 d3 89 29 6d 55 6a | db 4d b6 90 4e 9f 31 7b 83 b2 4e 39 37 2c 7c 49 | 29 00 00 24 38 88 3a 8e 21 d0 99 01 66 b4 5d 84 | 38 93 2d 4f e7 27 09 2a 71 43 d3 fd 55 4d 04 8f | a5 6a 55 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 b5 7c 10 1e 73 0b 8e c4 8c 67 0d | 37 a9 91 c5 05 2c 6c b2 00 00 00 1c 00 00 40 05 | 8a 81 ac a2 d8 3f 44 cf aa 4d f4 06 c5 76 63 33 | 40 a4 d1 4c | state #613 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35402a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb370046090 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370046090 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #613 | libevent_malloc: new ptr-libevent@0x7fb37c05eea0 size 128 | #613 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.288255 | resume sending helper answer for #613 suppresed complete_v2_state_transition() and stole MD | #613 spent 0.392 milliseconds in resume sending helper answer | stop processing: state #613 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35006cb20 | processing resume sending helper answer for #583 | start processing: state #583 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 583 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #583 | **emit ISAKMP Message: | initiator cookie: | ee 37 ee 52 ed a9 c3 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-6 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a5 a4 f5 71 cf 07 11 54 77 c8 dc bd ad 96 f0 01 | ikev2 g^x 5d a4 14 b5 a6 c9 a5 8c 07 7c 60 be a1 8b 30 17 | ikev2 g^x 0d cb bf c7 58 fd 5c f5 d2 3d dd 6b 17 ca fe 28 | ikev2 g^x 75 d1 d9 89 ad e6 fa bf 8a 41 2a 16 1f 72 19 b5 | ikev2 g^x fa b3 fe f4 08 23 24 22 95 34 55 fd ba a3 89 6b | ikev2 g^x f3 72 8f 60 ab 16 03 0b e3 7c 7b 79 7b de 9c 09 | ikev2 g^x e3 e5 5a 50 1f ec 54 0e 6e 2b 44 25 a3 4b b5 b9 | ikev2 g^x 40 85 8c 3d 6b bb 5d 52 c0 1f 28 1d c6 f3 f2 46 | ikev2 g^x f2 e5 18 48 a8 50 9c e8 18 6b e0 d8 c9 f8 99 b3 | ikev2 g^x 9d 7e 38 69 ed ff df 3d 1e 61 57 86 a8 0a e4 e7 | ikev2 g^x b9 e1 4a ad ad 0b 8c 53 f1 1d 20 66 9c 6e 12 ed | ikev2 g^x 4a 64 77 80 75 c0 8e a7 e7 a0 ec 74 74 9a 22 d2 | ikev2 g^x ed 8b 25 d1 aa db 80 ca af 4d 51 c5 3a ff 34 e7 | ikev2 g^x 01 6e ef 37 60 dc 73 7b 12 57 ba 0a 31 0d 83 0a | ikev2 g^x 8c 77 6a 78 fe 86 74 7d 3f c3 4e 0d 39 54 83 b4 | ikev2 g^x 7c 64 dc 24 28 35 25 63 99 9c 79 c9 80 75 2e d0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 71 83 b5 1d 55 d7 27 53 1f 29 9e 3f 3c f1 26 1a | IKEv2 nonce 11 ac 1d 70 ba b0 78 18 67 71 1e 34 60 b9 78 a6 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ee 37 ee 52 ed a9 c3 45 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 06 | natd_hash: port= 01 f4 | natd_hash: hash= 0d 09 e0 45 78 0a 9d ed 5e 85 e2 2d 30 cb b9 bb | natd_hash: hash= dc c5 6e a8 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0d 09 e0 45 78 0a 9d ed 5e 85 e2 2d 30 cb b9 bb | Notify data dc c5 6e a8 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ee 37 ee 52 ed a9 c3 45 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 05 40 6d 6e f0 4a bd dc 3b 91 6d 9b 95 75 10 8f | natd_hash: hash= df 31 bb 10 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 05 40 6d 6e f0 4a bd dc 3b 91 6d 9b 95 75 10 8f | Notify data df 31 bb 10 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #583 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #583 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #583 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #583: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #583 to 4294967295 after switching state | Message ID: IKE #583 skipping update_recv as MD is fake | Message ID: sent #583 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-6" #583: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.6:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #583) | ee 37 ee 52 ed a9 c3 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 a4 f5 71 cf 07 11 54 77 c8 dc bd ad 96 f0 01 | 5d a4 14 b5 a6 c9 a5 8c 07 7c 60 be a1 8b 30 17 | 0d cb bf c7 58 fd 5c f5 d2 3d dd 6b 17 ca fe 28 | 75 d1 d9 89 ad e6 fa bf 8a 41 2a 16 1f 72 19 b5 | fa b3 fe f4 08 23 24 22 95 34 55 fd ba a3 89 6b | f3 72 8f 60 ab 16 03 0b e3 7c 7b 79 7b de 9c 09 | e3 e5 5a 50 1f ec 54 0e 6e 2b 44 25 a3 4b b5 b9 | 40 85 8c 3d 6b bb 5d 52 c0 1f 28 1d c6 f3 f2 46 | f2 e5 18 48 a8 50 9c e8 18 6b e0 d8 c9 f8 99 b3 | 9d 7e 38 69 ed ff df 3d 1e 61 57 86 a8 0a e4 e7 | b9 e1 4a ad ad 0b 8c 53 f1 1d 20 66 9c 6e 12 ed | 4a 64 77 80 75 c0 8e a7 e7 a0 ec 74 74 9a 22 d2 | ed 8b 25 d1 aa db 80 ca af 4d 51 c5 3a ff 34 e7 | 01 6e ef 37 60 dc 73 7b 12 57 ba 0a 31 0d 83 0a | 8c 77 6a 78 fe 86 74 7d 3f c3 4e 0d 39 54 83 b4 | 7c 64 dc 24 28 35 25 63 99 9c 79 c9 80 75 2e d0 | 29 00 00 24 71 83 b5 1d 55 d7 27 53 1f 29 9e 3f | 3c f1 26 1a 11 ac 1d 70 ba b0 78 18 67 71 1e 34 | 60 b9 78 a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0d 09 e0 45 78 0a 9d ed 5e 85 e2 2d | 30 cb b9 bb dc c5 6e a8 00 00 00 1c 00 00 40 05 | 05 40 6d 6e f0 4a bd dc 3b 91 6d 9b 95 75 10 8f | df 31 bb 10 | state #583 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb374017f50 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab3980 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3980 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #583 | libevent_malloc: new ptr-libevent@0x7fb35006cb20 size 128 | #583 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.288552 | resume sending helper answer for #583 suppresed complete_v2_state_transition() and stole MD | #583 spent 0.283 milliseconds in resume sending helper answer | stop processing: state #583 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38405d9b0 | processing resume sending helper answer for #574 | start processing: state #574 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 574 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #574 | **emit ISAKMP Message: | initiator cookie: | e2 ef 8b 16 3f e6 8d 0d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-119 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x f6 80 9b ac b3 38 49 75 b6 22 00 a0 9d 93 a6 e9 | ikev2 g^x 11 43 29 2d 62 04 9b 9a b1 ba de 84 81 0e e7 1d | ikev2 g^x cd ff 5c 76 64 ba 18 74 a3 4a 09 63 04 00 26 2a | ikev2 g^x bf 09 0f 54 5c ff e2 c1 45 f0 c2 f6 3f 0a 9c da | ikev2 g^x 51 50 31 ad 31 4a 14 11 d3 2e c7 7d 83 22 2d bd | ikev2 g^x 53 08 74 70 d6 57 21 06 d4 a1 0f c1 e6 a4 84 5e | ikev2 g^x 1d b6 57 8b 0b 80 4b 3c 9f f1 e4 bd 75 2f d5 2d | ikev2 g^x 21 3a cd 7a 13 59 f2 16 f8 77 82 03 06 0a 42 83 | ikev2 g^x 17 94 64 c4 be 42 b3 21 8f d9 97 d0 cf eb 0f 6b | ikev2 g^x 23 03 9f ee 85 9d 07 b2 6b 9f c9 a7 2a 0b 97 54 | ikev2 g^x 4a 3f d3 58 4a 03 9e d1 76 61 53 9c 9d 3c 44 d8 | ikev2 g^x 20 2a f5 24 51 56 2a d6 31 c3 13 a3 58 26 1e 56 | ikev2 g^x bd 02 c3 74 00 2d 43 63 8c 32 86 92 e8 ff 86 7d | ikev2 g^x 59 2f b3 f9 c6 38 10 32 ef ef 33 bb 6d f1 d0 70 | ikev2 g^x 62 b4 df 27 80 5f fc 95 13 80 c9 0c ec fb e1 f5 | ikev2 g^x c1 58 36 dc de 1d 19 2a ba 67 9f d5 f2 bc 5b d5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 4a 9c 36 dc 2a e9 b0 d6 4b b7 1c 33 3b c4 06 c1 | IKEv2 nonce a7 f4 11 82 75 7b bf 05 3c 37 b2 a8 50 3d 47 0b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e2 ef 8b 16 3f e6 8d 0d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 77 | natd_hash: port= 01 f4 | natd_hash: hash= 1a d4 1c 5f fa 34 64 8a 6c 74 11 d9 dc 03 c5 f2 | natd_hash: hash= 8c e5 1d 48 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1a d4 1c 5f fa 34 64 8a 6c 74 11 d9 dc 03 c5 f2 | Notify data 8c e5 1d 48 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e2 ef 8b 16 3f e6 8d 0d | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 47 f1 9d c3 97 23 03 bd 9f fd 5c 86 a1 b5 d4 44 | natd_hash: hash= 63 f3 1c 6a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 47 f1 9d c3 97 23 03 bd 9f fd 5c 86 a1 b5 d4 44 | Notify data 63 f3 1c 6a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #574 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #574 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #574 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #574: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #574 to 4294967295 after switching state | Message ID: IKE #574 skipping update_recv as MD is fake | Message ID: sent #574 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-119" #574: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.119:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #574) | e2 ef 8b 16 3f e6 8d 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 80 9b ac b3 38 49 75 b6 22 00 a0 9d 93 a6 e9 | 11 43 29 2d 62 04 9b 9a b1 ba de 84 81 0e e7 1d | cd ff 5c 76 64 ba 18 74 a3 4a 09 63 04 00 26 2a | bf 09 0f 54 5c ff e2 c1 45 f0 c2 f6 3f 0a 9c da | 51 50 31 ad 31 4a 14 11 d3 2e c7 7d 83 22 2d bd | 53 08 74 70 d6 57 21 06 d4 a1 0f c1 e6 a4 84 5e | 1d b6 57 8b 0b 80 4b 3c 9f f1 e4 bd 75 2f d5 2d | 21 3a cd 7a 13 59 f2 16 f8 77 82 03 06 0a 42 83 | 17 94 64 c4 be 42 b3 21 8f d9 97 d0 cf eb 0f 6b | 23 03 9f ee 85 9d 07 b2 6b 9f c9 a7 2a 0b 97 54 | 4a 3f d3 58 4a 03 9e d1 76 61 53 9c 9d 3c 44 d8 | 20 2a f5 24 51 56 2a d6 31 c3 13 a3 58 26 1e 56 | bd 02 c3 74 00 2d 43 63 8c 32 86 92 e8 ff 86 7d | 59 2f b3 f9 c6 38 10 32 ef ef 33 bb 6d f1 d0 70 | 62 b4 df 27 80 5f fc 95 13 80 c9 0c ec fb e1 f5 | c1 58 36 dc de 1d 19 2a ba 67 9f d5 f2 bc 5b d5 | 29 00 00 24 4a 9c 36 dc 2a e9 b0 d6 4b b7 1c 33 | 3b c4 06 c1 a7 f4 11 82 75 7b bf 05 3c 37 b2 a8 | 50 3d 47 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a d4 1c 5f fa 34 64 8a 6c 74 11 d9 | dc 03 c5 f2 8c e5 1d 48 00 00 00 1c 00 00 40 05 | 47 f1 9d c3 97 23 03 bd 9f fd 5c 86 a1 b5 d4 44 | 63 f3 1c 6a | state #574 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37001d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb350012bf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #574 | libevent_malloc: new ptr-libevent@0x7fb38405d9b0 size 128 | #574 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.288853 | resume sending helper answer for #574 suppresed complete_v2_state_transition() and stole MD | #574 spent 0.288 milliseconds in resume sending helper answer | stop processing: state #574 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36405f230 | processing resume sending helper answer for #580 | start processing: state #580 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 580 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #580 | **emit ISAKMP Message: | initiator cookie: | ce a6 92 c0 a0 a1 1c a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-115 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x af 62 9c b2 99 63 23 d1 93 84 f8 c6 bc 03 8c f1 | ikev2 g^x 28 b3 ce e8 48 6d fc d0 0e a9 c2 9d 2d 9a 2c cd | ikev2 g^x 1f f0 93 df e5 a9 05 5b c8 c1 47 b3 5a 1c 0b cd | ikev2 g^x a2 95 bb 74 ae 94 51 dd 06 80 d5 6e c5 83 35 38 | ikev2 g^x f8 09 61 ae fb b8 3a ff 4b 57 1e 08 3c 1d 4a 21 | ikev2 g^x e7 43 37 6b 51 c8 a6 a8 1a c1 22 59 61 5e 5f 2f | ikev2 g^x b6 c5 96 ba 63 14 e1 d9 b7 d4 58 9e 9f e1 5d 87 | ikev2 g^x bd 9a bc 7a ff 27 dd 04 5e f7 15 28 0e 6d 1f 5c | ikev2 g^x 93 06 0d ed bd 1d 59 e2 0a 80 53 4c ef 63 50 ee | ikev2 g^x 1f 2d d9 4a 72 41 2a 22 6c b9 de 8d a4 62 87 63 | ikev2 g^x 24 a5 6a 1b a0 db 72 f2 81 6b 35 f5 c1 ba d7 29 | ikev2 g^x dd 15 a9 4a de e2 81 ba 33 50 3e e7 72 50 bf 75 | ikev2 g^x 5d 53 37 19 5e 9d 67 46 30 0c 5e cc a6 e8 91 01 | ikev2 g^x 51 ac c8 25 28 9a 12 77 ef 59 9c 00 f4 9a 34 3b | ikev2 g^x 2c 2f b6 d1 1c 53 57 48 b5 6f 80 17 ae 76 96 dd | ikev2 g^x ad 17 fc cb 17 9f 6e 5a be f9 98 d3 e5 2d d6 4a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 82 b4 09 66 1c 6d c4 04 c2 08 d9 05 f9 60 c9 56 | IKEv2 nonce 60 53 ce b0 69 de c0 ee bf 68 05 62 1b ac 43 c1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ce a6 92 c0 a0 a1 1c a1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 73 | natd_hash: port= 01 f4 | natd_hash: hash= 67 b9 a9 40 de ae b7 bf 06 27 f9 22 83 cc d1 c8 | natd_hash: hash= 91 a6 93 4b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 67 b9 a9 40 de ae b7 bf 06 27 f9 22 83 cc d1 c8 | Notify data 91 a6 93 4b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ce a6 92 c0 a0 a1 1c a1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e8 5b fc c4 4f 3c a4 be 53 5f ca 7e 63 49 41 b9 | natd_hash: hash= 5c fd 73 7b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e8 5b fc c4 4f 3c a4 be 53 5f ca 7e 63 49 41 b9 | Notify data 5c fd 73 7b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #580 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #580 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #580 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #580: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #580 to 4294967295 after switching state | Message ID: IKE #580 skipping update_recv as MD is fake | Message ID: sent #580 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-115" #580: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.115:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #580) | ce a6 92 c0 a0 a1 1c a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 62 9c b2 99 63 23 d1 93 84 f8 c6 bc 03 8c f1 | 28 b3 ce e8 48 6d fc d0 0e a9 c2 9d 2d 9a 2c cd | 1f f0 93 df e5 a9 05 5b c8 c1 47 b3 5a 1c 0b cd | a2 95 bb 74 ae 94 51 dd 06 80 d5 6e c5 83 35 38 | f8 09 61 ae fb b8 3a ff 4b 57 1e 08 3c 1d 4a 21 | e7 43 37 6b 51 c8 a6 a8 1a c1 22 59 61 5e 5f 2f | b6 c5 96 ba 63 14 e1 d9 b7 d4 58 9e 9f e1 5d 87 | bd 9a bc 7a ff 27 dd 04 5e f7 15 28 0e 6d 1f 5c | 93 06 0d ed bd 1d 59 e2 0a 80 53 4c ef 63 50 ee | 1f 2d d9 4a 72 41 2a 22 6c b9 de 8d a4 62 87 63 | 24 a5 6a 1b a0 db 72 f2 81 6b 35 f5 c1 ba d7 29 | dd 15 a9 4a de e2 81 ba 33 50 3e e7 72 50 bf 75 | 5d 53 37 19 5e 9d 67 46 30 0c 5e cc a6 e8 91 01 | 51 ac c8 25 28 9a 12 77 ef 59 9c 00 f4 9a 34 3b | 2c 2f b6 d1 1c 53 57 48 b5 6f 80 17 ae 76 96 dd | ad 17 fc cb 17 9f 6e 5a be f9 98 d3 e5 2d d6 4a | 29 00 00 24 82 b4 09 66 1c 6d c4 04 c2 08 d9 05 | f9 60 c9 56 60 53 ce b0 69 de c0 ee bf 68 05 62 | 1b ac 43 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 67 b9 a9 40 de ae b7 bf 06 27 f9 22 | 83 cc d1 c8 91 a6 93 4b 00 00 00 1c 00 00 40 05 | e8 5b fc c4 4f 3c a4 be 53 5f ca 7e 63 49 41 b9 | 5c fd 73 7b | state #580 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344009640 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a4bfd0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364012790 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #580 | libevent_malloc: new ptr-libevent@0x7fb36405f230 size 128 | #580 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.289235 | resume sending helper answer for #580 suppresed complete_v2_state_transition() and stole MD | #580 spent 0.354 milliseconds in resume sending helper answer | stop processing: state #580 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3800648b0 | processing resume sending helper answer for #545 | start processing: state #545 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 545 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #545 | **emit ISAKMP Message: | initiator cookie: | 40 cb 66 3b 79 de 72 78 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-106 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d1 5b 7a 86 ba 9c 03 fc 9a 35 b3 49 7d b8 a9 eb | ikev2 g^x ce 9b 15 66 7f 3d 65 56 ca 83 c0 b5 c0 d2 9b af | ikev2 g^x bf 94 33 79 9e 6a 89 29 27 fe a1 c8 69 70 d6 9d | ikev2 g^x 72 b4 78 99 de bd 56 1e ee 52 58 81 e5 79 d8 fc | ikev2 g^x 9b 01 47 2e f9 5f ff db 1b 0c 1d 6b d2 24 13 26 | ikev2 g^x 4e 14 5a 53 41 21 88 e6 85 34 1d 40 8d 0c ab 68 | ikev2 g^x 2f 2a e8 36 f9 d2 8e 74 83 80 31 c4 ee f0 6f 04 | ikev2 g^x d8 06 8e 87 47 f7 48 6b 1a 9a d8 72 1e 44 3e 1e | ikev2 g^x 94 73 03 f7 b6 b7 71 80 64 13 af 6f cd 97 48 25 | ikev2 g^x 27 b1 25 73 1d 03 81 9d 9b ed 92 d1 b0 47 c5 19 | ikev2 g^x 43 4b c5 91 96 cb 5e d0 fb 41 6d fb 23 51 8b 64 | ikev2 g^x 9b 4b 49 79 cc de 0f f7 0b c8 5d 39 be 6a 5d a6 | ikev2 g^x e5 65 4b fd f0 3d 65 42 41 d7 16 db 74 2b 56 12 | ikev2 g^x 51 92 12 04 90 41 8b 34 9a 75 ef 99 31 b2 53 fa | ikev2 g^x ec 4e df db 6b 7b 92 59 ae 99 e6 6b a1 12 97 31 | ikev2 g^x ed 33 0d 5e 99 91 c4 04 5f f2 a1 92 4f bd 71 0b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 8b 68 1c b2 c6 cc 60 af d5 80 42 4c 34 71 a0 ef | IKEv2 nonce e4 ac ff 5b e1 55 8c 60 71 90 0a 7e 13 6c 58 9d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 40 cb 66 3b 79 de 72 78 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 6a | natd_hash: port= 01 f4 | natd_hash: hash= 66 b0 98 38 8e 87 51 0e dd 45 6a 77 ed ad b4 ba | natd_hash: hash= d2 48 07 74 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 66 b0 98 38 8e 87 51 0e dd 45 6a 77 ed ad b4 ba | Notify data d2 48 07 74 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 40 cb 66 3b 79 de 72 78 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c8 e4 a8 78 6d 64 59 0e 02 cc 7d 7f 34 3a ae d2 | natd_hash: hash= 96 b2 88 9d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c8 e4 a8 78 6d 64 59 0e 02 cc 7d 7f 34 3a ae d2 | Notify data 96 b2 88 9d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #545 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #545 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #545 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #545: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #545 to 4294967295 after switching state | Message ID: IKE #545 skipping update_recv as MD is fake | Message ID: sent #545 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-106" #545: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.106:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #545) | 40 cb 66 3b 79 de 72 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 5b 7a 86 ba 9c 03 fc 9a 35 b3 49 7d b8 a9 eb | ce 9b 15 66 7f 3d 65 56 ca 83 c0 b5 c0 d2 9b af | bf 94 33 79 9e 6a 89 29 27 fe a1 c8 69 70 d6 9d | 72 b4 78 99 de bd 56 1e ee 52 58 81 e5 79 d8 fc | 9b 01 47 2e f9 5f ff db 1b 0c 1d 6b d2 24 13 26 | 4e 14 5a 53 41 21 88 e6 85 34 1d 40 8d 0c ab 68 | 2f 2a e8 36 f9 d2 8e 74 83 80 31 c4 ee f0 6f 04 | d8 06 8e 87 47 f7 48 6b 1a 9a d8 72 1e 44 3e 1e | 94 73 03 f7 b6 b7 71 80 64 13 af 6f cd 97 48 25 | 27 b1 25 73 1d 03 81 9d 9b ed 92 d1 b0 47 c5 19 | 43 4b c5 91 96 cb 5e d0 fb 41 6d fb 23 51 8b 64 | 9b 4b 49 79 cc de 0f f7 0b c8 5d 39 be 6a 5d a6 | e5 65 4b fd f0 3d 65 42 41 d7 16 db 74 2b 56 12 | 51 92 12 04 90 41 8b 34 9a 75 ef 99 31 b2 53 fa | ec 4e df db 6b 7b 92 59 ae 99 e6 6b a1 12 97 31 | ed 33 0d 5e 99 91 c4 04 5f f2 a1 92 4f bd 71 0b | 29 00 00 24 8b 68 1c b2 c6 cc 60 af d5 80 42 4c | 34 71 a0 ef e4 ac ff 5b e1 55 8c 60 71 90 0a 7e | 13 6c 58 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 b0 98 38 8e 87 51 0e dd 45 6a 77 | ed ad b4 ba d2 48 07 74 00 00 00 1c 00 00 40 05 | c8 e4 a8 78 6d 64 59 0e 02 cc 7d 7f 34 3a ae d2 | 96 b2 88 9d | state #545 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35802a950 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb378046090 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378046090 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #545 | libevent_malloc: new ptr-libevent@0x7fb3800648b0 size 128 | #545 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.289654 | resume sending helper answer for #545 suppresed complete_v2_state_transition() and stole MD | #545 spent 0.403 milliseconds in resume sending helper answer | stop processing: state #545 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb344053f60 | processing resume sending helper answer for #576 | start processing: state #576 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 576 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #576 | **emit ISAKMP Message: | initiator cookie: | bf 1a 7a 05 9e b9 88 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-100 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a3 6f d2 38 de cc 28 85 5f 41 f2 20 5e 07 0c a2 | ikev2 g^x f5 9c 80 ff e4 6c b6 4c 70 e2 b8 6a 47 00 73 46 | ikev2 g^x 8d ba d8 aa 10 38 4b 81 1c 0e 7c 8c 49 18 c5 84 | ikev2 g^x 17 40 52 e1 d0 c8 ff 2a 4c c5 e2 f4 12 7c df 4c | ikev2 g^x 72 b8 6e 95 bf f0 54 ad cb e7 72 b2 87 79 19 c5 | ikev2 g^x 68 98 1d dd 0a f6 a4 d7 0e f0 b6 72 bd 0e dd f4 | ikev2 g^x 27 a1 d9 12 45 04 fa 90 07 e7 b4 6e 9b f9 be 3b | ikev2 g^x 8a ae 24 d0 37 a2 53 8e c0 1f 79 b2 4f 1e 64 17 | ikev2 g^x ea e2 b5 7a 16 8c a0 20 f9 ab 1c da 5d 7f c2 85 | ikev2 g^x bb fd 14 3c a6 d4 28 dd 60 a4 e5 f5 e6 a1 44 e9 | ikev2 g^x 3c 8b 4f 83 ea 38 41 29 16 58 25 9c 89 8c 0a a7 | ikev2 g^x 8c 88 a7 08 b2 d4 73 4c 5c 5f d9 55 aa 40 62 ac | ikev2 g^x d3 e3 2b a2 04 52 6c e3 f3 4f 50 d4 48 ee 05 9d | ikev2 g^x 81 ac 23 4e 1e 8c c1 65 13 fb 68 a8 58 3b 92 a5 | ikev2 g^x 3d 7c 55 6c cc d6 9e 1c 8b 09 aa d0 db 5e 99 f2 | ikev2 g^x 60 34 f9 74 84 15 60 67 96 e9 e7 3c f3 c2 20 e6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c2 a9 a3 da 50 4e 4d cf ec 5e 42 2e d7 97 ed 63 | IKEv2 nonce 43 1b ac 3c 04 ca 8c 9d 5b af 41 cf d4 6c f9 6f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= bf 1a 7a 05 9e b9 88 96 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 64 | natd_hash: port= 01 f4 | natd_hash: hash= bc 7a c0 1e 2b d3 0d 93 af e2 1e a5 35 b0 aa a7 | natd_hash: hash= be b0 46 48 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data bc 7a c0 1e 2b d3 0d 93 af e2 1e a5 35 b0 aa a7 | Notify data be b0 46 48 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= bf 1a 7a 05 9e b9 88 96 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= e4 10 08 2b 3b dd 58 0c 81 68 da dc e5 0f 44 09 | natd_hash: hash= f0 81 fd 9d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e4 10 08 2b 3b dd 58 0c 81 68 da dc e5 0f 44 09 | Notify data f0 81 fd 9d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #576 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #576 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #576 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #576: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #576 to 4294967295 after switching state | Message ID: IKE #576 skipping update_recv as MD is fake | Message ID: sent #576 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-100" #576: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.100:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #576) | bf 1a 7a 05 9e b9 88 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 6f d2 38 de cc 28 85 5f 41 f2 20 5e 07 0c a2 | f5 9c 80 ff e4 6c b6 4c 70 e2 b8 6a 47 00 73 46 | 8d ba d8 aa 10 38 4b 81 1c 0e 7c 8c 49 18 c5 84 | 17 40 52 e1 d0 c8 ff 2a 4c c5 e2 f4 12 7c df 4c | 72 b8 6e 95 bf f0 54 ad cb e7 72 b2 87 79 19 c5 | 68 98 1d dd 0a f6 a4 d7 0e f0 b6 72 bd 0e dd f4 | 27 a1 d9 12 45 04 fa 90 07 e7 b4 6e 9b f9 be 3b | 8a ae 24 d0 37 a2 53 8e c0 1f 79 b2 4f 1e 64 17 | ea e2 b5 7a 16 8c a0 20 f9 ab 1c da 5d 7f c2 85 | bb fd 14 3c a6 d4 28 dd 60 a4 e5 f5 e6 a1 44 e9 | 3c 8b 4f 83 ea 38 41 29 16 58 25 9c 89 8c 0a a7 | 8c 88 a7 08 b2 d4 73 4c 5c 5f d9 55 aa 40 62 ac | d3 e3 2b a2 04 52 6c e3 f3 4f 50 d4 48 ee 05 9d | 81 ac 23 4e 1e 8c c1 65 13 fb 68 a8 58 3b 92 a5 | 3d 7c 55 6c cc d6 9e 1c 8b 09 aa d0 db 5e 99 f2 | 60 34 f9 74 84 15 60 67 96 e9 e7 3c f3 c2 20 e6 | 29 00 00 24 c2 a9 a3 da 50 4e 4d cf ec 5e 42 2e | d7 97 ed 63 43 1b ac 3c 04 ca 8c 9d 5b af 41 cf | d4 6c f9 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bc 7a c0 1e 2b d3 0d 93 af e2 1e a5 | 35 b0 aa a7 be b0 46 48 00 00 00 1c 00 00 40 05 | e4 10 08 2b 3b dd 58 0c 81 68 da dc e5 0f 44 09 | f0 81 fd 9d | state #576 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb364035750 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a01150 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #576 | libevent_malloc: new ptr-libevent@0x7fb344053f60 size 128 | #576 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.289959 | resume sending helper answer for #576 suppresed complete_v2_state_transition() and stole MD | #576 spent 0.289 milliseconds in resume sending helper answer | stop processing: state #576 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb33805efb0 | processing resume sending helper answer for #559 | start processing: state #559 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 559 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #559 | **emit ISAKMP Message: | initiator cookie: | 14 21 4b c7 8f d5 3b 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-30 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x df c5 ec fc 7d 5a a9 f1 38 5b af b6 65 71 32 7c | ikev2 g^x 6c 91 b4 ed fb 0c 87 80 16 02 df 23 7b 3e 1b 10 | ikev2 g^x 70 0b 39 0c 6a 5c de 3d 87 90 91 e3 83 ec db 5a | ikev2 g^x 36 ca c8 b2 b4 db 09 7a 5b e9 7a 17 cc c7 3a 24 | ikev2 g^x 4c ea 7f 5d a9 0a f1 b3 d7 6a a8 13 a7 fa c2 05 | ikev2 g^x e6 77 9a ba 9d 7b 25 0d 3e 0a e2 5f ff cc 63 76 | ikev2 g^x a0 6c db 49 af cc d5 f5 f4 09 78 70 2d fe ff ff | ikev2 g^x cb cc 4a 9b 55 1b 99 f6 dc 93 35 dd 1d 13 21 bf | ikev2 g^x fd 6a ca 65 6a c0 ff ff 32 f1 6d f7 3e 98 69 a7 | ikev2 g^x 0e a1 73 ab ab b1 7e 5d de 57 92 d0 6c 78 24 e7 | ikev2 g^x 4e 0e f0 4a 0a 29 99 48 f2 3b 55 4c 27 2b 57 4a | ikev2 g^x 87 27 2c cf f8 7a b5 07 06 95 37 75 bc 1a f4 d9 | ikev2 g^x 3f 9e cd 96 08 50 67 bf b6 80 17 b5 68 83 2a 43 | ikev2 g^x 38 12 31 e4 eb bb 48 53 dd 1a fa ae 76 4a 72 80 | ikev2 g^x 49 d3 12 0a 1d 01 90 66 b4 ca 1b 0f dc f4 35 b5 | ikev2 g^x 43 43 90 7e d3 10 c4 1b 8d 5a d5 a9 ca 5f b8 48 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce cd 39 6e 7e 0b cb f0 da d0 22 3b 9f 55 4f e9 2f | IKEv2 nonce 87 09 39 35 5d 79 80 bd 46 82 75 62 bf 33 d3 f9 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 14 21 4b c7 8f d5 3b 8a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 1e | natd_hash: port= 01 f4 | natd_hash: hash= cc da c4 44 bb 29 ff dc b3 bb 41 98 be 72 17 e4 | natd_hash: hash= 5a b5 73 e6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data cc da c4 44 bb 29 ff dc b3 bb 41 98 be 72 17 e4 | Notify data 5a b5 73 e6 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 14 21 4b c7 8f d5 3b 8a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 45 80 da 9e 17 9c 16 03 77 58 55 5d 48 f1 3a 54 | natd_hash: hash= 40 de ec ea | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 45 80 da 9e 17 9c 16 03 77 58 55 5d 48 f1 3a 54 | Notify data 40 de ec ea | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #559 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #559 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #559 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #559: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #559 to 4294967295 after switching state | Message ID: IKE #559 skipping update_recv as MD is fake | Message ID: sent #559 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-30" #559: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.30:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #559) | 14 21 4b c7 8f d5 3b 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df c5 ec fc 7d 5a a9 f1 38 5b af b6 65 71 32 7c | 6c 91 b4 ed fb 0c 87 80 16 02 df 23 7b 3e 1b 10 | 70 0b 39 0c 6a 5c de 3d 87 90 91 e3 83 ec db 5a | 36 ca c8 b2 b4 db 09 7a 5b e9 7a 17 cc c7 3a 24 | 4c ea 7f 5d a9 0a f1 b3 d7 6a a8 13 a7 fa c2 05 | e6 77 9a ba 9d 7b 25 0d 3e 0a e2 5f ff cc 63 76 | a0 6c db 49 af cc d5 f5 f4 09 78 70 2d fe ff ff | cb cc 4a 9b 55 1b 99 f6 dc 93 35 dd 1d 13 21 bf | fd 6a ca 65 6a c0 ff ff 32 f1 6d f7 3e 98 69 a7 | 0e a1 73 ab ab b1 7e 5d de 57 92 d0 6c 78 24 e7 | 4e 0e f0 4a 0a 29 99 48 f2 3b 55 4c 27 2b 57 4a | 87 27 2c cf f8 7a b5 07 06 95 37 75 bc 1a f4 d9 | 3f 9e cd 96 08 50 67 bf b6 80 17 b5 68 83 2a 43 | 38 12 31 e4 eb bb 48 53 dd 1a fa ae 76 4a 72 80 | 49 d3 12 0a 1d 01 90 66 b4 ca 1b 0f dc f4 35 b5 | 43 43 90 7e d3 10 c4 1b 8d 5a d5 a9 ca 5f b8 48 | 29 00 00 24 cd 39 6e 7e 0b cb f0 da d0 22 3b 9f | 55 4f e9 2f 87 09 39 35 5d 79 80 bd 46 82 75 62 | bf 33 d3 f9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cc da c4 44 bb 29 ff dc b3 bb 41 98 | be 72 17 e4 5a b5 73 e6 00 00 00 1c 00 00 40 05 | 45 80 da 9e 17 9c 16 03 77 58 55 5d 48 f1 3a 54 | 40 de ec ea | state #559 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344014c70 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb374013710 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374013710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #559 | libevent_malloc: new ptr-libevent@0x7fb33805efb0 size 128 | #559 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.290271 | resume sending helper answer for #559 suppresed complete_v2_state_transition() and stole MD | #559 spent 0.293 milliseconds in resume sending helper answer | stop processing: state #559 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3840581d0 | processing resume sending helper answer for #561 | start processing: state #561 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 561 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #561 | **emit ISAKMP Message: | initiator cookie: | e6 ce b9 a0 0a 53 1e 5c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-90 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7f 46 f6 a4 7c 90 e0 c9 d2 85 20 8f b5 1d b7 c4 | ikev2 g^x f8 f3 b0 78 b0 d2 51 66 8d 4a d8 59 6d 49 84 64 | ikev2 g^x 71 ab fb f5 bc b5 f0 e8 d0 77 d4 03 41 0e 1e 4a | ikev2 g^x d9 b5 75 25 c4 92 0a 2d 74 4a 0c 20 47 6f 34 56 | ikev2 g^x 44 56 ce da b3 ab 68 a5 91 66 d6 77 00 6b 23 58 | ikev2 g^x fc e6 d4 0e 5a 52 c1 f1 b5 a0 ad 99 57 15 c5 c2 | ikev2 g^x d9 2b c3 74 d2 ab 4d 6c 38 2b a8 54 f1 10 ea 73 | ikev2 g^x f7 f3 1a 1a 0b 20 27 ed ef 90 9d 0b e4 63 64 46 | ikev2 g^x f5 cd 8e 24 f9 d7 d2 7f 96 cc 6d 0d 85 5e 94 0f | ikev2 g^x a9 4e 5e ec c5 1b 6b ba 38 a5 5a dc af bc 4a 97 | ikev2 g^x 01 2b d3 7d e0 00 45 8b 2a 4c 3a 26 e1 bd 65 ba | ikev2 g^x 43 5f a9 bd 57 50 f2 28 5b 00 4d 82 f3 42 f1 e0 | ikev2 g^x 6d 90 d6 4d 3a f9 fb 23 4e 48 bf 3a cc 34 f4 a3 | ikev2 g^x 43 3c 8d ad f0 9a db e2 a8 69 3f f5 2a 3e f3 dc | ikev2 g^x 27 48 23 01 97 ea 7c bc 0d a2 a2 b0 86 ec 2e 00 | ikev2 g^x 77 3a 8c 7d fc a5 d4 fd 81 85 16 b0 ff 6b 0e b5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c5 97 1a 8b 29 e3 3d 7a 27 0d 40 2f 83 32 ae 98 | IKEv2 nonce 8d 84 ac e2 dc ec 7a 49 5f 8b 56 23 eb 72 f0 75 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e6 ce b9 a0 0a 53 1e 5c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5a | natd_hash: port= 01 f4 | natd_hash: hash= 04 bc 5d f6 1e a1 6a 54 c3 1f 21 fe 90 fc 7d b7 | natd_hash: hash= bf 9c 0e ab | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 04 bc 5d f6 1e a1 6a 54 c3 1f 21 fe 90 fc 7d b7 | Notify data bf 9c 0e ab | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e6 ce b9 a0 0a 53 1e 5c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a1 82 14 e7 88 f7 7d ff e6 10 b0 c3 6f d3 95 fd | natd_hash: hash= 16 ba 74 48 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a1 82 14 e7 88 f7 7d ff e6 10 b0 c3 6f d3 95 fd | Notify data 16 ba 74 48 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #561 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #561 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #561 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #561: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #561 to 4294967295 after switching state | Message ID: IKE #561 skipping update_recv as MD is fake | Message ID: sent #561 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-90" #561: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.90:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #561) | e6 ce b9 a0 0a 53 1e 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 46 f6 a4 7c 90 e0 c9 d2 85 20 8f b5 1d b7 c4 | f8 f3 b0 78 b0 d2 51 66 8d 4a d8 59 6d 49 84 64 | 71 ab fb f5 bc b5 f0 e8 d0 77 d4 03 41 0e 1e 4a | d9 b5 75 25 c4 92 0a 2d 74 4a 0c 20 47 6f 34 56 | 44 56 ce da b3 ab 68 a5 91 66 d6 77 00 6b 23 58 | fc e6 d4 0e 5a 52 c1 f1 b5 a0 ad 99 57 15 c5 c2 | d9 2b c3 74 d2 ab 4d 6c 38 2b a8 54 f1 10 ea 73 | f7 f3 1a 1a 0b 20 27 ed ef 90 9d 0b e4 63 64 46 | f5 cd 8e 24 f9 d7 d2 7f 96 cc 6d 0d 85 5e 94 0f | a9 4e 5e ec c5 1b 6b ba 38 a5 5a dc af bc 4a 97 | 01 2b d3 7d e0 00 45 8b 2a 4c 3a 26 e1 bd 65 ba | 43 5f a9 bd 57 50 f2 28 5b 00 4d 82 f3 42 f1 e0 | 6d 90 d6 4d 3a f9 fb 23 4e 48 bf 3a cc 34 f4 a3 | 43 3c 8d ad f0 9a db e2 a8 69 3f f5 2a 3e f3 dc | 27 48 23 01 97 ea 7c bc 0d a2 a2 b0 86 ec 2e 00 | 77 3a 8c 7d fc a5 d4 fd 81 85 16 b0 ff 6b 0e b5 | 29 00 00 24 c5 97 1a 8b 29 e3 3d 7a 27 0d 40 2f | 83 32 ae 98 8d 84 ac e2 dc ec 7a 49 5f 8b 56 23 | eb 72 f0 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 04 bc 5d f6 1e a1 6a 54 c3 1f 21 fe | 90 fc 7d b7 bf 9c 0e ab 00 00 00 1c 00 00 40 05 | a1 82 14 e7 88 f7 7d ff e6 10 b0 c3 6f d3 95 fd | 16 ba 74 48 | state #561 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37401f6b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb374023ce0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374023ce0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #561 | libevent_malloc: new ptr-libevent@0x7fb3840581d0 size 128 | #561 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.291026 | resume sending helper answer for #561 suppresed complete_v2_state_transition() and stole MD | #561 spent 0.427 milliseconds in resume sending helper answer | stop processing: state #561 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c0596c0 | processing resume sending helper answer for #586 | start processing: state #586 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 586 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #586 | **emit ISAKMP Message: | initiator cookie: | 9a 3d 1d 73 e3 e0 91 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-2 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 31 56 d8 cc 60 f7 06 cc 59 a5 66 b8 41 54 bb 3e | ikev2 g^x fb c8 6c 81 84 53 c6 13 31 8d 8e 62 d7 09 63 52 | ikev2 g^x 53 8c bb 8d d7 5b e6 4c 25 af 80 11 96 28 b9 4c | ikev2 g^x 79 b0 e7 e5 ff 99 62 bc 0e c5 91 68 49 55 47 3c | ikev2 g^x b1 82 16 08 70 32 cf 34 71 08 a2 e4 fa 17 46 eb | ikev2 g^x c6 40 a2 fa ed 5d 93 66 3c 04 eb 85 7b a4 b8 ca | ikev2 g^x 3b e8 d5 02 43 56 8f ae bb 2c 5c 40 78 bc 5f 3c | ikev2 g^x 52 09 33 a3 7b de 07 81 a6 e1 d6 fc 15 c9 f3 d7 | ikev2 g^x 80 69 07 14 f2 fc 95 be ee 94 aa 9e 80 73 7e 72 | ikev2 g^x 64 ba 5c 65 91 2e 13 ae 0a 47 61 89 10 86 9c 47 | ikev2 g^x d1 e2 cb 92 ce 45 0b 0e 0f d3 3d f2 1d 9f b0 3e | ikev2 g^x 82 b2 a9 6f 50 82 ad d6 b3 d9 b3 ea 4d c2 73 14 | ikev2 g^x 44 b9 ba 13 f3 1d 41 25 5f c2 36 55 c0 ee 19 61 | ikev2 g^x 63 cd 05 72 43 48 d0 6b e9 0e f6 84 a0 68 e3 e5 | ikev2 g^x 72 da 0d d0 be 28 62 56 c3 0f 94 93 0b c0 ef 8b | ikev2 g^x fb 62 f1 5b 0e 46 8d a6 d6 94 eb 9f 3d 88 d0 f3 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 38 81 91 15 7b 18 f0 d0 cf fd 70 7f dd 31 76 38 | IKEv2 nonce 5b ce 20 2d 80 1f cb 93 2f 1b 36 54 69 55 f1 5b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9a 3d 1d 73 e3 e0 91 83 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 02 | natd_hash: port= 01 f4 | natd_hash: hash= ab 17 b2 6d a4 83 a8 67 51 74 0a 4d bc b9 f3 7f | natd_hash: hash= 40 a8 af 25 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ab 17 b2 6d a4 83 a8 67 51 74 0a 4d bc b9 f3 7f | Notify data 40 a8 af 25 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9a 3d 1d 73 e3 e0 91 83 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a2 cc 78 53 7b 53 71 df 77 82 fc 3c 31 48 7e 51 | natd_hash: hash= f3 07 f9 73 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a2 cc 78 53 7b 53 71 df 77 82 fc 3c 31 48 7e 51 | Notify data f3 07 f9 73 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #586 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #586 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #586 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #586: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #586 to 4294967295 after switching state | Message ID: IKE #586 skipping update_recv as MD is fake | Message ID: sent #586 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-2" #586: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.2:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #586) | 9a 3d 1d 73 e3 e0 91 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 56 d8 cc 60 f7 06 cc 59 a5 66 b8 41 54 bb 3e | fb c8 6c 81 84 53 c6 13 31 8d 8e 62 d7 09 63 52 | 53 8c bb 8d d7 5b e6 4c 25 af 80 11 96 28 b9 4c | 79 b0 e7 e5 ff 99 62 bc 0e c5 91 68 49 55 47 3c | b1 82 16 08 70 32 cf 34 71 08 a2 e4 fa 17 46 eb | c6 40 a2 fa ed 5d 93 66 3c 04 eb 85 7b a4 b8 ca | 3b e8 d5 02 43 56 8f ae bb 2c 5c 40 78 bc 5f 3c | 52 09 33 a3 7b de 07 81 a6 e1 d6 fc 15 c9 f3 d7 | 80 69 07 14 f2 fc 95 be ee 94 aa 9e 80 73 7e 72 | 64 ba 5c 65 91 2e 13 ae 0a 47 61 89 10 86 9c 47 | d1 e2 cb 92 ce 45 0b 0e 0f d3 3d f2 1d 9f b0 3e | 82 b2 a9 6f 50 82 ad d6 b3 d9 b3 ea 4d c2 73 14 | 44 b9 ba 13 f3 1d 41 25 5f c2 36 55 c0 ee 19 61 | 63 cd 05 72 43 48 d0 6b e9 0e f6 84 a0 68 e3 e5 | 72 da 0d d0 be 28 62 56 c3 0f 94 93 0b c0 ef 8b | fb 62 f1 5b 0e 46 8d a6 d6 94 eb 9f 3d 88 d0 f3 | 29 00 00 24 38 81 91 15 7b 18 f0 d0 cf fd 70 7f | dd 31 76 38 5b ce 20 2d 80 1f cb 93 2f 1b 36 54 | 69 55 f1 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 17 b2 6d a4 83 a8 67 51 74 0a 4d | bc b9 f3 7f 40 a8 af 25 00 00 00 1c 00 00 40 05 | a2 cc 78 53 7b 53 71 df 77 82 fc 3c 31 48 7e 51 | f3 07 f9 73 | state #586 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37c0180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a61c10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61c10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #586 | libevent_malloc: new ptr-libevent@0x7fb37c0596c0 size 128 | #586 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.291789 | resume sending helper answer for #586 suppresed complete_v2_state_transition() and stole MD | #586 spent 0.73 milliseconds in resume sending helper answer | stop processing: state #586 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36005ee70 | processing resume sending helper answer for #560 | start processing: state #560 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 560 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #560 | **emit ISAKMP Message: | initiator cookie: | 61 ee e9 29 f9 69 ed 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-21 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x e1 5b d2 4d 27 a5 64 87 b5 53 0f 2d 27 23 c3 80 | ikev2 g^x 59 cc 4a 83 42 0a c4 7c 74 74 a9 17 dd e6 bf 21 | ikev2 g^x c5 97 86 51 a0 18 a7 55 17 b7 10 8d 1e b0 a4 7b | ikev2 g^x 87 6d 2d 89 28 1e 78 86 6d a6 2c 5e e4 1e 5e b3 | ikev2 g^x 8b ff f7 4a ed eb 04 dc d3 8b 68 b2 08 51 f1 90 | ikev2 g^x 83 7d 2f 12 5c 80 ab 52 30 6f 5a 2f 21 d3 f6 2a | ikev2 g^x 24 28 c1 3d 11 09 6e 37 07 e3 bd 5a 6b 28 45 fa | ikev2 g^x 2f 6d b4 10 49 37 83 73 b1 f3 31 9b 80 01 11 22 | ikev2 g^x 5f a1 e0 5f 63 e5 ef 6f d7 20 b9 78 da 97 fb dd | ikev2 g^x 03 07 83 ee 70 56 66 02 29 c9 ab 5f 38 ff a9 d5 | ikev2 g^x e9 8a e3 9f e9 fc 01 13 30 ba f0 d8 18 76 b9 3b | ikev2 g^x 5f 09 cc 0c 64 e9 65 14 08 ff dd c9 6a 40 e5 8d | ikev2 g^x e6 ec 0a 5e ab 63 d2 1f a2 70 05 7f 44 94 93 ef | ikev2 g^x d9 cd 76 d1 2d 31 22 90 40 07 c7 7c a2 53 ce 36 | ikev2 g^x 14 46 8f da 4f 94 35 cc 7b b4 58 99 54 67 3b 56 | ikev2 g^x 36 26 06 7f 4a 38 3d 7f b5 57 e0 c9 8a 7c b4 a2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6d da b8 df 8d 0e 39 36 00 cd 36 1c c8 6c 4e d3 | IKEv2 nonce 97 de 45 90 16 f8 97 1f 18 a8 59 71 e2 d8 bb b7 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 61 ee e9 29 f9 69 ed 76 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 15 | natd_hash: port= 01 f4 | natd_hash: hash= b1 4c ac 81 8b a9 9e 5f 7e 2a 07 3b d2 dd f3 4f | natd_hash: hash= 02 d8 73 9b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b1 4c ac 81 8b a9 9e 5f 7e 2a 07 3b d2 dd f3 4f | Notify data 02 d8 73 9b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 61 ee e9 29 f9 69 ed 76 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 0e 12 95 b1 fc 7d ce a6 69 21 08 f2 b2 a7 af 4b | natd_hash: hash= 42 43 c7 4f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0e 12 95 b1 fc 7d ce a6 69 21 08 f2 b2 a7 af 4b | Notify data 42 43 c7 4f | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #560 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #560 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #560 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #560: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #560 to 4294967295 after switching state | Message ID: IKE #560 skipping update_recv as MD is fake | Message ID: sent #560 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-21" #560: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.21:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #560) | 61 ee e9 29 f9 69 ed 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e1 5b d2 4d 27 a5 64 87 b5 53 0f 2d 27 23 c3 80 | 59 cc 4a 83 42 0a c4 7c 74 74 a9 17 dd e6 bf 21 | c5 97 86 51 a0 18 a7 55 17 b7 10 8d 1e b0 a4 7b | 87 6d 2d 89 28 1e 78 86 6d a6 2c 5e e4 1e 5e b3 | 8b ff f7 4a ed eb 04 dc d3 8b 68 b2 08 51 f1 90 | 83 7d 2f 12 5c 80 ab 52 30 6f 5a 2f 21 d3 f6 2a | 24 28 c1 3d 11 09 6e 37 07 e3 bd 5a 6b 28 45 fa | 2f 6d b4 10 49 37 83 73 b1 f3 31 9b 80 01 11 22 | 5f a1 e0 5f 63 e5 ef 6f d7 20 b9 78 da 97 fb dd | 03 07 83 ee 70 56 66 02 29 c9 ab 5f 38 ff a9 d5 | e9 8a e3 9f e9 fc 01 13 30 ba f0 d8 18 76 b9 3b | 5f 09 cc 0c 64 e9 65 14 08 ff dd c9 6a 40 e5 8d | e6 ec 0a 5e ab 63 d2 1f a2 70 05 7f 44 94 93 ef | d9 cd 76 d1 2d 31 22 90 40 07 c7 7c a2 53 ce 36 | 14 46 8f da 4f 94 35 cc 7b b4 58 99 54 67 3b 56 | 36 26 06 7f 4a 38 3d 7f b5 57 e0 c9 8a 7c b4 a2 | 29 00 00 24 6d da b8 df 8d 0e 39 36 00 cd 36 1c | c8 6c 4e d3 97 de 45 90 16 f8 97 1f 18 a8 59 71 | e2 d8 bb b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b1 4c ac 81 8b a9 9e 5f 7e 2a 07 3b | d2 dd f3 4f 02 d8 73 9b 00 00 00 1c 00 00 40 05 | 0e 12 95 b1 fc 7d ce a6 69 21 08 f2 b2 a7 af 4b | 42 43 c7 4f | state #560 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35802ed90 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb358017ea0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360044df0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #560 | libevent_malloc: new ptr-libevent@0x7fb36005ee70 size 128 | #560 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.292257 | resume sending helper answer for #560 suppresed complete_v2_state_transition() and stole MD | #560 spent 0.44 milliseconds in resume sending helper answer | stop processing: state #560 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c059a40 | processing resume sending helper answer for #567 | start processing: state #567 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 567 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #567 | **emit ISAKMP Message: | initiator cookie: | 96 df 1a f7 12 b2 bc 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-130 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 0c 62 fd af 90 2b d8 09 e9 e2 92 5c d3 5d ff be | ikev2 g^x b8 74 9f 04 03 97 8e 9b 87 54 08 07 bc 69 63 5c | ikev2 g^x 4f 7e 94 26 99 2b 45 4b b4 3e 6a bd e9 bf 50 b1 | ikev2 g^x 32 c2 e1 9e 38 52 46 f5 f2 58 78 3e 50 20 3a 74 | ikev2 g^x f6 e9 d3 83 40 c0 04 2b de 3a cc cc 33 57 e8 e4 | ikev2 g^x c3 b8 f3 a1 07 1c a7 aa 33 bf fa f1 88 41 d1 8f | ikev2 g^x 1c 54 38 a4 0f a0 74 99 19 cf dc f3 37 2e 9f 7d | ikev2 g^x cb c6 ff 33 e7 c4 87 6d b4 fc 2c f8 0b d2 97 fc | ikev2 g^x 95 94 a8 fc c3 8e 19 7e db 7c 13 30 0e 23 df 10 | ikev2 g^x 95 1c a4 5e cb 4f f7 55 14 48 f9 01 0e 0f 65 55 | ikev2 g^x b2 e9 d7 a8 7f 12 ac 8a 4e 27 61 a0 92 a0 7c e2 | ikev2 g^x 06 89 a0 28 48 73 b2 44 05 78 cf b7 27 b8 cb 46 | ikev2 g^x e0 4e 1d 1b 19 80 1b 07 1b 7f 13 f8 83 25 91 17 | ikev2 g^x 55 8a 26 9b 93 51 86 39 92 c7 48 b5 62 5f c4 da | ikev2 g^x 35 11 c7 be 49 10 bf 43 bb fd 6a b1 b8 23 97 53 | ikev2 g^x 03 3d 3d d7 05 a5 04 a6 4b fd 36 20 d4 50 2d 15 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2d 33 44 b7 62 bd a9 aa c3 a6 92 61 ee c6 40 8f | IKEv2 nonce 89 af c2 08 6b d9 9a e5 24 30 97 38 3e b1 2f 38 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 96 df 1a f7 12 b2 bc 5e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 82 | natd_hash: port= 01 f4 | natd_hash: hash= 23 cc 91 ff 67 bb 9d ba 9d 71 c8 73 66 2a 2a e8 | natd_hash: hash= 17 18 8e 7d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 23 cc 91 ff 67 bb 9d ba 9d 71 c8 73 66 2a 2a e8 | Notify data 17 18 8e 7d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 96 df 1a f7 12 b2 bc 5e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 5f 92 72 26 a0 e4 d9 83 b3 70 5e 9c 4e 05 aa 9e | natd_hash: hash= 38 2c ea d4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5f 92 72 26 a0 e4 d9 83 b3 70 5e 9c 4e 05 aa 9e | Notify data 38 2c ea d4 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #567 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #567 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #567 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #567: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #567 to 4294967295 after switching state | Message ID: IKE #567 skipping update_recv as MD is fake | Message ID: sent #567 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-130" #567: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.130:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #567) | 96 df 1a f7 12 b2 bc 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c 62 fd af 90 2b d8 09 e9 e2 92 5c d3 5d ff be | b8 74 9f 04 03 97 8e 9b 87 54 08 07 bc 69 63 5c | 4f 7e 94 26 99 2b 45 4b b4 3e 6a bd e9 bf 50 b1 | 32 c2 e1 9e 38 52 46 f5 f2 58 78 3e 50 20 3a 74 | f6 e9 d3 83 40 c0 04 2b de 3a cc cc 33 57 e8 e4 | c3 b8 f3 a1 07 1c a7 aa 33 bf fa f1 88 41 d1 8f | 1c 54 38 a4 0f a0 74 99 19 cf dc f3 37 2e 9f 7d | cb c6 ff 33 e7 c4 87 6d b4 fc 2c f8 0b d2 97 fc | 95 94 a8 fc c3 8e 19 7e db 7c 13 30 0e 23 df 10 | 95 1c a4 5e cb 4f f7 55 14 48 f9 01 0e 0f 65 55 | b2 e9 d7 a8 7f 12 ac 8a 4e 27 61 a0 92 a0 7c e2 | 06 89 a0 28 48 73 b2 44 05 78 cf b7 27 b8 cb 46 | e0 4e 1d 1b 19 80 1b 07 1b 7f 13 f8 83 25 91 17 | 55 8a 26 9b 93 51 86 39 92 c7 48 b5 62 5f c4 da | 35 11 c7 be 49 10 bf 43 bb fd 6a b1 b8 23 97 53 | 03 3d 3d d7 05 a5 04 a6 4b fd 36 20 d4 50 2d 15 | 29 00 00 24 2d 33 44 b7 62 bd a9 aa c3 a6 92 61 | ee c6 40 8f 89 af c2 08 6b d9 9a e5 24 30 97 38 | 3e b1 2f 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 cc 91 ff 67 bb 9d ba 9d 71 c8 73 | 66 2a 2a e8 17 18 8e 7d 00 00 00 1c 00 00 40 05 | 5f 92 72 26 a0 e4 d9 83 b3 70 5e 9c 4e 05 aa 9e | 38 2c ea d4 | state #567 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3580251c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb358018460 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #567 | libevent_malloc: new ptr-libevent@0x7fb36c059a40 size 128 | #567 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.292774 | resume sending helper answer for #567 suppresed complete_v2_state_transition() and stole MD | #567 spent 0.478 milliseconds in resume sending helper answer | stop processing: state #567 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38005f0d0 | processing resume sending helper answer for #548 | start processing: state #548 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 548 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #548 | **emit ISAKMP Message: | initiator cookie: | 6f bf f8 cc f4 7a 9c 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-5 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 20 3a 23 76 43 2c d6 0c 77 f6 be 3f 63 2d ef 87 | ikev2 g^x 5b 0a 43 13 73 5f 72 ec 4f 32 10 0e f0 de 84 7f | ikev2 g^x d4 61 90 d4 eb e1 32 1e e5 8e d7 b5 e2 7a e7 49 | ikev2 g^x 5d f2 fc 7a c6 30 1a 6f 07 cc 95 e2 88 f7 7d 25 | ikev2 g^x 65 7c dd a0 41 59 c3 25 f5 18 42 08 32 24 11 16 | ikev2 g^x 2e 52 4f 9a f3 7a ed ce d9 b4 aa b3 1f ae af 20 | ikev2 g^x 42 b9 b1 ad cd bb ee c0 74 e1 fd 67 f4 5d 34 44 | ikev2 g^x 6a de e6 b7 35 4a f2 eb 39 da 8c cb 41 b2 00 29 | ikev2 g^x 86 07 50 93 e1 bc bf ab 70 b9 fb 51 f1 a7 98 f9 | ikev2 g^x 2b 98 28 e6 c7 3d 74 21 03 5a bb f5 37 9e 89 94 | ikev2 g^x 7c 03 2e 40 d5 60 16 2d d9 fe b8 61 a7 83 f3 1d | ikev2 g^x ff eb 71 d5 80 83 a8 32 43 df 3f 7a 3d 1e 14 01 | ikev2 g^x e8 08 00 8c 59 d3 27 3d e9 52 04 6f 01 93 dc 8f | ikev2 g^x 24 6b 25 9d e9 4a 4b 67 81 c6 ae fd ce 83 60 14 | ikev2 g^x 29 d6 20 63 24 51 e8 f1 7b e4 ef 94 6e af af 7a | ikev2 g^x 65 c0 38 a3 b6 06 be 41 56 5f 9d 49 7b 85 1f be | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 3a 01 9a 17 69 6a fb fe 06 63 3f f6 88 7f 88 c9 | IKEv2 nonce 7d fd b9 fa 66 cd 9e 05 f9 56 87 93 78 28 b7 a2 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6f bf f8 cc f4 7a 9c 38 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 05 | natd_hash: port= 01 f4 | natd_hash: hash= c6 f1 40 91 ab 0d 01 84 cd e5 c5 16 59 f1 09 ef | natd_hash: hash= b4 ca 5b 7d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c6 f1 40 91 ab 0d 01 84 cd e5 c5 16 59 f1 09 ef | Notify data b4 ca 5b 7d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6f bf f8 cc f4 7a 9c 38 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 0b 27 51 7f 3c e8 a2 b4 d8 2e fd 6c 29 e4 91 b0 | natd_hash: hash= 77 83 22 02 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 0b 27 51 7f 3c e8 a2 b4 d8 2e fd 6c 29 e4 91 b0 | Notify data 77 83 22 02 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #548 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #548 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #548 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #548: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #548 to 4294967295 after switching state | Message ID: IKE #548 skipping update_recv as MD is fake | Message ID: sent #548 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-5" #548: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.5:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #548) | 6f bf f8 cc f4 7a 9c 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 3a 23 76 43 2c d6 0c 77 f6 be 3f 63 2d ef 87 | 5b 0a 43 13 73 5f 72 ec 4f 32 10 0e f0 de 84 7f | d4 61 90 d4 eb e1 32 1e e5 8e d7 b5 e2 7a e7 49 | 5d f2 fc 7a c6 30 1a 6f 07 cc 95 e2 88 f7 7d 25 | 65 7c dd a0 41 59 c3 25 f5 18 42 08 32 24 11 16 | 2e 52 4f 9a f3 7a ed ce d9 b4 aa b3 1f ae af 20 | 42 b9 b1 ad cd bb ee c0 74 e1 fd 67 f4 5d 34 44 | 6a de e6 b7 35 4a f2 eb 39 da 8c cb 41 b2 00 29 | 86 07 50 93 e1 bc bf ab 70 b9 fb 51 f1 a7 98 f9 | 2b 98 28 e6 c7 3d 74 21 03 5a bb f5 37 9e 89 94 | 7c 03 2e 40 d5 60 16 2d d9 fe b8 61 a7 83 f3 1d | ff eb 71 d5 80 83 a8 32 43 df 3f 7a 3d 1e 14 01 | e8 08 00 8c 59 d3 27 3d e9 52 04 6f 01 93 dc 8f | 24 6b 25 9d e9 4a 4b 67 81 c6 ae fd ce 83 60 14 | 29 d6 20 63 24 51 e8 f1 7b e4 ef 94 6e af af 7a | 65 c0 38 a3 b6 06 be 41 56 5f 9d 49 7b 85 1f be | 29 00 00 24 3a 01 9a 17 69 6a fb fe 06 63 3f f6 | 88 7f 88 c9 7d fd b9 fa 66 cd 9e 05 f9 56 87 93 | 78 28 b7 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 f1 40 91 ab 0d 01 84 cd e5 c5 16 | 59 f1 09 ef b4 ca 5b 7d 00 00 00 1c 00 00 40 05 | 0b 27 51 7f 3c e8 a2 b4 d8 2e fd 6c 29 e4 91 b0 | 77 83 22 02 | state #548 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37401f7f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37400cc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37400cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #548 | libevent_malloc: new ptr-libevent@0x7fb38005f0d0 size 128 | #548 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.293245 | resume sending helper answer for #548 suppresed complete_v2_state_transition() and stole MD | #548 spent 0.445 milliseconds in resume sending helper answer | stop processing: state #548 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb374059970 | processing resume sending helper answer for #569 | start processing: state #569 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 569 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #569 | **emit ISAKMP Message: | initiator cookie: | 55 2f d6 9f 11 e5 1c 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-87 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 13 ad f3 19 0d b2 66 aa bf 03 d7 00 2e 8a f6 e9 | ikev2 g^x b3 08 01 25 75 89 85 ed a8 02 b4 4e ae da 53 49 | ikev2 g^x 58 9e 82 fc af 45 f7 e5 3a 8a 61 8e 88 c7 af 9a | ikev2 g^x 14 17 d6 60 7e 9b 49 7e fb c7 a3 8f 06 1f 55 04 | ikev2 g^x c8 6c 7d 7d b3 8a be f8 87 7c c7 58 4b a7 87 5d | ikev2 g^x 9c b5 54 d3 ac 08 0e 69 85 4b 91 09 83 8d 76 46 | ikev2 g^x 46 3d 39 9e ac d3 50 29 5e a5 08 c8 9e 48 83 f1 | ikev2 g^x 7a ff ec 7e 14 c7 a3 2d 96 02 b4 ac 09 ec 55 2f | ikev2 g^x 9a bc 9a b9 ae 22 a8 43 ce 46 d4 aa a2 8a 21 94 | ikev2 g^x 31 c8 40 01 99 87 64 fd 79 ff 03 2c 2e 81 52 10 | ikev2 g^x 65 b9 fe d7 6e b5 1b 36 08 b8 c5 40 a2 b3 94 60 | ikev2 g^x c1 5e 51 00 52 ca d5 19 e8 a1 81 66 03 72 10 ef | ikev2 g^x 03 5d 84 88 58 a5 23 01 6a de f9 31 fa 89 4d ec | ikev2 g^x dc d2 db 41 a5 f5 42 96 78 ed 68 a8 33 e3 9e db | ikev2 g^x 24 46 13 b6 1b b4 8e a4 01 2d 3b 33 63 dc 87 44 | ikev2 g^x db c9 90 4c 80 8f a3 e2 b7 82 7f c5 7c be 1e 53 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0e 82 eb 05 c0 49 58 d2 06 74 53 82 bb 2f d8 51 | IKEv2 nonce c7 ad 9e 32 5a e2 85 00 b0 c7 ec f1 8e f6 f3 53 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 55 2f d6 9f 11 e5 1c 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 57 | natd_hash: port= 01 f4 | natd_hash: hash= e2 e7 bd d8 a7 7f 8b fc 64 ee 06 53 59 02 1a 01 | natd_hash: hash= d9 98 46 39 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data e2 e7 bd d8 a7 7f 8b fc 64 ee 06 53 59 02 1a 01 | Notify data d9 98 46 39 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 55 2f d6 9f 11 e5 1c 01 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c0 b7 45 5a 2a e8 30 84 4a 1b 7a 52 bc cd a9 4d | natd_hash: hash= c0 d2 c3 7a | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c0 b7 45 5a 2a e8 30 84 4a 1b 7a 52 bc cd a9 4d | Notify data c0 d2 c3 7a | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #569 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #569 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #569 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #569: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #569 to 4294967295 after switching state | Message ID: IKE #569 skipping update_recv as MD is fake | Message ID: sent #569 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-87" #569: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.87:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #569) | 55 2f d6 9f 11 e5 1c 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 ad f3 19 0d b2 66 aa bf 03 d7 00 2e 8a f6 e9 | b3 08 01 25 75 89 85 ed a8 02 b4 4e ae da 53 49 | 58 9e 82 fc af 45 f7 e5 3a 8a 61 8e 88 c7 af 9a | 14 17 d6 60 7e 9b 49 7e fb c7 a3 8f 06 1f 55 04 | c8 6c 7d 7d b3 8a be f8 87 7c c7 58 4b a7 87 5d | 9c b5 54 d3 ac 08 0e 69 85 4b 91 09 83 8d 76 46 | 46 3d 39 9e ac d3 50 29 5e a5 08 c8 9e 48 83 f1 | 7a ff ec 7e 14 c7 a3 2d 96 02 b4 ac 09 ec 55 2f | 9a bc 9a b9 ae 22 a8 43 ce 46 d4 aa a2 8a 21 94 | 31 c8 40 01 99 87 64 fd 79 ff 03 2c 2e 81 52 10 | 65 b9 fe d7 6e b5 1b 36 08 b8 c5 40 a2 b3 94 60 | c1 5e 51 00 52 ca d5 19 e8 a1 81 66 03 72 10 ef | 03 5d 84 88 58 a5 23 01 6a de f9 31 fa 89 4d ec | dc d2 db 41 a5 f5 42 96 78 ed 68 a8 33 e3 9e db | 24 46 13 b6 1b b4 8e a4 01 2d 3b 33 63 dc 87 44 | db c9 90 4c 80 8f a3 e2 b7 82 7f c5 7c be 1e 53 | 29 00 00 24 0e 82 eb 05 c0 49 58 d2 06 74 53 82 | bb 2f d8 51 c7 ad 9e 32 5a e2 85 00 b0 c7 ec f1 | 8e f6 f3 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 e7 bd d8 a7 7f 8b fc 64 ee 06 53 | 59 02 1a 01 d9 98 46 39 00 00 00 1c 00 00 40 05 | c0 b7 45 5a 2a e8 30 84 4a 1b 7a 52 bc cd a9 4d | c0 d2 c3 7a | state #569 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c00f1a0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a02770 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #569 | libevent_malloc: new ptr-libevent@0x7fb374059970 size 128 | #569 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.293706 | resume sending helper answer for #569 suppresed complete_v2_state_transition() and stole MD | #569 spent 0.437 milliseconds in resume sending helper answer | stop processing: state #569 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37804a120 | processing resume sending helper answer for #563 | start processing: state #563 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 563 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #563 | **emit ISAKMP Message: | initiator cookie: | 36 fd bc 41 27 9a 18 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-40 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 98 f7 f9 df fc 24 98 94 50 1f 5b ee 02 6b 2b 08 | ikev2 g^x 88 ea bb 4c fc 6f 81 4e 18 49 00 df e1 e9 2e 32 | ikev2 g^x 12 86 87 5d ed 60 5b 39 8c 88 3b 45 c5 ff 07 ae | ikev2 g^x 3b 26 9c d0 6d b7 d1 e5 d2 f2 44 e2 99 9a a1 34 | ikev2 g^x 7c cd f0 e6 b4 a0 06 c2 e2 40 86 90 79 ac 53 56 | ikev2 g^x e8 b9 80 5c 54 49 7c e3 25 da dd 1c a3 52 9f ec | ikev2 g^x a4 d2 90 b1 56 ce 5d 5c 20 a2 3b 08 f3 fd d6 30 | ikev2 g^x 42 db da 3e b2 e5 ed 74 de b7 e6 59 ba ed c1 83 | ikev2 g^x 60 66 8c 72 2f 6f ba 9a 85 05 c1 db 9c 7c b8 87 | ikev2 g^x 26 24 9b 4b 8b 4b 67 b9 df 00 bd 07 d0 3b e3 b4 | ikev2 g^x 6c 17 18 f3 f7 d3 9c 27 cf 7d 7a bf 43 d6 d5 cf | ikev2 g^x 69 cf a9 92 09 2e 90 5d 89 35 3e 56 73 21 5e fd | ikev2 g^x 30 0e e9 0b 43 37 81 42 99 01 7c b5 f0 2c f6 9e | ikev2 g^x 45 a9 d9 81 d2 95 68 9f 5d 8d 05 3c e4 03 5d 3b | ikev2 g^x da 10 69 6b 96 bb 32 84 4d a3 95 1d 28 1b ff 6b | ikev2 g^x 19 0c 05 ab 9e ef 24 27 d9 f0 1e 4b 16 13 1f a0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 33 52 d4 42 b8 04 6d 4f 2e 93 5c 6b d5 ad 27 1e | IKEv2 nonce 92 59 33 28 c5 ae 5c 5e 96 b6 02 6f 79 82 8d b3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 36 fd bc 41 27 9a 18 48 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 28 | natd_hash: port= 01 f4 | natd_hash: hash= 1d f0 6f ab 99 46 a7 e5 85 41 6a 05 cc 0a dd eb | natd_hash: hash= 9e 21 24 a7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1d f0 6f ab 99 46 a7 e5 85 41 6a 05 cc 0a dd eb | Notify data 9e 21 24 a7 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 36 fd bc 41 27 9a 18 48 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= fa 0b b1 80 18 a1 01 fe 64 98 07 58 ad c1 ac 04 | natd_hash: hash= 2d 72 07 f3 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data fa 0b b1 80 18 a1 01 fe 64 98 07 58 ad c1 ac 04 | Notify data 2d 72 07 f3 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #563 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #563 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #563 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #563: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #563 to 4294967295 after switching state | Message ID: IKE #563 skipping update_recv as MD is fake | Message ID: sent #563 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-40" #563: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.40:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #563) | 36 fd bc 41 27 9a 18 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 f7 f9 df fc 24 98 94 50 1f 5b ee 02 6b 2b 08 | 88 ea bb 4c fc 6f 81 4e 18 49 00 df e1 e9 2e 32 | 12 86 87 5d ed 60 5b 39 8c 88 3b 45 c5 ff 07 ae | 3b 26 9c d0 6d b7 d1 e5 d2 f2 44 e2 99 9a a1 34 | 7c cd f0 e6 b4 a0 06 c2 e2 40 86 90 79 ac 53 56 | e8 b9 80 5c 54 49 7c e3 25 da dd 1c a3 52 9f ec | a4 d2 90 b1 56 ce 5d 5c 20 a2 3b 08 f3 fd d6 30 | 42 db da 3e b2 e5 ed 74 de b7 e6 59 ba ed c1 83 | 60 66 8c 72 2f 6f ba 9a 85 05 c1 db 9c 7c b8 87 | 26 24 9b 4b 8b 4b 67 b9 df 00 bd 07 d0 3b e3 b4 | 6c 17 18 f3 f7 d3 9c 27 cf 7d 7a bf 43 d6 d5 cf | 69 cf a9 92 09 2e 90 5d 89 35 3e 56 73 21 5e fd | 30 0e e9 0b 43 37 81 42 99 01 7c b5 f0 2c f6 9e | 45 a9 d9 81 d2 95 68 9f 5d 8d 05 3c e4 03 5d 3b | da 10 69 6b 96 bb 32 84 4d a3 95 1d 28 1b ff 6b | 19 0c 05 ab 9e ef 24 27 d9 f0 1e 4b 16 13 1f a0 | 29 00 00 24 33 52 d4 42 b8 04 6d 4f 2e 93 5c 6b | d5 ad 27 1e 92 59 33 28 c5 ae 5c 5e 96 b6 02 6f | 79 82 8d b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d f0 6f ab 99 46 a7 e5 85 41 6a 05 | cc 0a dd eb 9e 21 24 a7 00 00 00 1c 00 00 40 05 | fa 0b b1 80 18 a1 01 fe 64 98 07 58 ad c1 ac 04 | 2d 72 07 f3 | state #563 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37003b0b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb360012bf0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #563 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 | #563 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.294182 | resume sending helper answer for #563 suppresed complete_v2_state_transition() and stole MD | #563 spent 0.448 milliseconds in resume sending helper answer | stop processing: state #563 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3680581d0 | processing resume sending helper answer for #534 | start processing: state #534 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 8 replies to request ID 534 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #534 | **emit ISAKMP Message: | initiator cookie: | b6 c2 42 e3 74 ca 7f 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-43 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 5f e9 15 ad 11 6f 89 c0 a8 02 55 a1 73 88 84 f9 | ikev2 g^x 33 7b 5b 0d 0b 5b d7 57 77 b6 59 c3 92 4f 9c 81 | ikev2 g^x e6 98 a6 a1 b8 34 63 c4 08 b9 bf 0c 69 da d1 2b | ikev2 g^x 1a e8 9b 2f 98 d4 44 3b f0 73 62 cb 71 d6 64 d1 | ikev2 g^x 3a 3d f5 71 2d 7e 29 30 73 8d 8a a7 fc e0 c3 a4 | ikev2 g^x 07 15 fb 3f 7b 6d ac bf dd d0 0f d6 95 19 6d 4e | ikev2 g^x ab a0 86 9d f8 d4 b7 8e e6 1d 84 a8 cb 93 14 ec | ikev2 g^x a8 13 51 b0 91 ca a4 6a 06 06 50 7a df 97 a5 15 | ikev2 g^x 33 7b b0 2a aa 9d 49 82 99 5a 1e f8 ff 91 d1 bb | ikev2 g^x 5f 9c 20 e3 88 f9 89 5c 2d ff 2d 6c 31 e8 44 d4 | ikev2 g^x c0 96 d5 82 e9 c1 04 a4 03 63 11 8d 47 c3 ee f3 | ikev2 g^x 9c d6 e5 95 a9 a9 b4 3b 1f e3 34 6e 77 02 0b 87 | ikev2 g^x cd 18 1a ad 7e 61 e6 d2 80 d4 cd 61 09 82 cc d6 | ikev2 g^x aa 80 fe 73 e7 11 a7 12 0a 61 d0 3f 70 03 0e 25 | ikev2 g^x 0f fa b0 0b f0 75 c7 91 3d 8b 34 3c 45 ce 0a 85 | ikev2 g^x 42 34 96 d7 4e 3f d9 17 73 40 5a 4f bb a1 8b 1a | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 6f d6 0a bf ca bc 9d 1e 75 5d 3f c1 66 5b 32 47 | IKEv2 nonce 90 cf da b2 6c 6d a4 db de c8 e0 a3 3c 0a c8 8c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b6 c2 42 e3 74 ca 7f 02 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 2b | natd_hash: port= 01 f4 | natd_hash: hash= 9b 38 48 7f 05 85 41 6a 46 8b 67 3e 92 3f a4 69 | natd_hash: hash= d3 0a 9f 50 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9b 38 48 7f 05 85 41 6a 46 8b 67 3e 92 3f a4 69 | Notify data d3 0a 9f 50 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= b6 c2 42 e3 74 ca 7f 02 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9b 5d 60 63 c2 dd c6 23 03 14 4c fb 6a ee 61 48 | natd_hash: hash= 2b 45 1b 9e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9b 5d 60 63 c2 dd c6 23 03 14 4c fb 6a ee 61 48 | Notify data 2b 45 1b 9e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #534 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #534 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #534 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #534: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #534 to 4294967295 after switching state | Message ID: IKE #534 skipping update_recv as MD is fake | Message ID: sent #534 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-43" #534: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.43:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #534) | b6 c2 42 e3 74 ca 7f 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f e9 15 ad 11 6f 89 c0 a8 02 55 a1 73 88 84 f9 | 33 7b 5b 0d 0b 5b d7 57 77 b6 59 c3 92 4f 9c 81 | e6 98 a6 a1 b8 34 63 c4 08 b9 bf 0c 69 da d1 2b | 1a e8 9b 2f 98 d4 44 3b f0 73 62 cb 71 d6 64 d1 | 3a 3d f5 71 2d 7e 29 30 73 8d 8a a7 fc e0 c3 a4 | 07 15 fb 3f 7b 6d ac bf dd d0 0f d6 95 19 6d 4e | ab a0 86 9d f8 d4 b7 8e e6 1d 84 a8 cb 93 14 ec | a8 13 51 b0 91 ca a4 6a 06 06 50 7a df 97 a5 15 | 33 7b b0 2a aa 9d 49 82 99 5a 1e f8 ff 91 d1 bb | 5f 9c 20 e3 88 f9 89 5c 2d ff 2d 6c 31 e8 44 d4 | c0 96 d5 82 e9 c1 04 a4 03 63 11 8d 47 c3 ee f3 | 9c d6 e5 95 a9 a9 b4 3b 1f e3 34 6e 77 02 0b 87 | cd 18 1a ad 7e 61 e6 d2 80 d4 cd 61 09 82 cc d6 | aa 80 fe 73 e7 11 a7 12 0a 61 d0 3f 70 03 0e 25 | 0f fa b0 0b f0 75 c7 91 3d 8b 34 3c 45 ce 0a 85 | 42 34 96 d7 4e 3f d9 17 73 40 5a 4f bb a1 8b 1a | 29 00 00 24 6f d6 0a bf ca bc 9d 1e 75 5d 3f c1 | 66 5b 32 47 90 cf da b2 6c 6d a4 db de c8 e0 a3 | 3c 0a c8 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 38 48 7f 05 85 41 6a 46 8b 67 3e | 92 3f a4 69 d3 0a 9f 50 00 00 00 1c 00 00 40 05 | 9b 5d 60 63 c2 dd c6 23 03 14 4c fb 6a ee 61 48 | 2b 45 1b 9e | state #534 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35801d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a5af90 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36801fda0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #534 | libevent_malloc: new ptr-libevent@0x7fb3680581d0 size 128 | #534 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.294634 | resume sending helper answer for #534 suppresed complete_v2_state_transition() and stole MD | #534 spent 0.427 milliseconds in resume sending helper answer | stop processing: state #534 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34c053e10 | processing resume sending helper answer for #554 | start processing: state #554 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 554 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #554 | **emit ISAKMP Message: | initiator cookie: | 25 17 60 01 5a 53 51 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-98 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2d 38 2d f1 00 6f d0 3c a9 89 96 83 23 c7 b8 5d | ikev2 g^x 1a a6 31 2b 2c 51 9d f6 cf 41 37 49 95 49 bb 07 | ikev2 g^x 22 d5 2d 9b fe 69 9e 12 c7 f6 3e 06 e7 18 06 20 | ikev2 g^x c1 aa 51 c6 00 74 fa 4a 11 cc c8 b0 ed 1a e5 e4 | ikev2 g^x c4 39 2f 27 86 6b 56 5d d1 56 6c 92 b1 bb b2 fd | ikev2 g^x e7 5b 8a fa 41 54 ee c3 2f 4b 56 28 c4 84 43 b6 | ikev2 g^x 29 3e 51 c0 e7 fd f5 95 28 1a d0 e0 91 dc f1 6e | ikev2 g^x 39 56 bd a3 9a d5 67 19 93 7a c4 42 65 6a 67 24 | ikev2 g^x 4f 95 02 14 cf 93 bd 7f a6 8b ba d4 40 ea aa 44 | ikev2 g^x bb 51 d0 43 02 22 34 c7 50 c4 3c 24 ec 0b 9e 0b | ikev2 g^x 68 3e 0f 11 f4 55 6d 52 6f 15 ed f6 c8 d2 70 f8 | ikev2 g^x fa 7b 49 45 c1 d7 b6 5b 40 7b 44 9d 47 3c af 30 | ikev2 g^x 36 b9 73 5d 22 5f a7 f6 ce 29 85 12 50 70 19 59 | ikev2 g^x ff e1 64 85 88 18 f5 bb 21 9e 23 15 22 cb 42 8f | ikev2 g^x df e0 fe 4c ee be d0 17 86 a2 52 52 76 91 2f 84 | ikev2 g^x fc 1f 46 9a d7 c0 87 a2 fb 33 8f b3 de 22 8e f6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2a e4 8d 48 f2 e9 35 56 e7 78 9c 50 82 48 8b a6 | IKEv2 nonce d8 56 83 14 85 5c 7b 82 38 7e 5a 90 dc b9 01 eb | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 25 17 60 01 5a 53 51 bb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 62 | natd_hash: port= 01 f4 | natd_hash: hash= a5 6c fa 7e d5 f7 59 ab 33 19 e9 49 9d b2 c4 ad | natd_hash: hash= db 25 ab 32 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a5 6c fa 7e d5 f7 59 ab 33 19 e9 49 9d b2 c4 ad | Notify data db 25 ab 32 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 25 17 60 01 5a 53 51 bb | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 84 c3 f1 b0 ec 53 88 9c d7 9f 3b 91 13 fe 1d e1 | natd_hash: hash= bc ef 10 92 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 84 c3 f1 b0 ec 53 88 9c d7 9f 3b 91 13 fe 1d e1 | Notify data bc ef 10 92 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #554 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #554 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #554 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #554: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #554 to 4294967295 after switching state | Message ID: IKE #554 skipping update_recv as MD is fake | Message ID: sent #554 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-98" #554: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.98:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #554) | 25 17 60 01 5a 53 51 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 38 2d f1 00 6f d0 3c a9 89 96 83 23 c7 b8 5d | 1a a6 31 2b 2c 51 9d f6 cf 41 37 49 95 49 bb 07 | 22 d5 2d 9b fe 69 9e 12 c7 f6 3e 06 e7 18 06 20 | c1 aa 51 c6 00 74 fa 4a 11 cc c8 b0 ed 1a e5 e4 | c4 39 2f 27 86 6b 56 5d d1 56 6c 92 b1 bb b2 fd | e7 5b 8a fa 41 54 ee c3 2f 4b 56 28 c4 84 43 b6 | 29 3e 51 c0 e7 fd f5 95 28 1a d0 e0 91 dc f1 6e | 39 56 bd a3 9a d5 67 19 93 7a c4 42 65 6a 67 24 | 4f 95 02 14 cf 93 bd 7f a6 8b ba d4 40 ea aa 44 | bb 51 d0 43 02 22 34 c7 50 c4 3c 24 ec 0b 9e 0b | 68 3e 0f 11 f4 55 6d 52 6f 15 ed f6 c8 d2 70 f8 | fa 7b 49 45 c1 d7 b6 5b 40 7b 44 9d 47 3c af 30 | 36 b9 73 5d 22 5f a7 f6 ce 29 85 12 50 70 19 59 | ff e1 64 85 88 18 f5 bb 21 9e 23 15 22 cb 42 8f | df e0 fe 4c ee be d0 17 86 a2 52 52 76 91 2f 84 | fc 1f 46 9a d7 c0 87 a2 fb 33 8f b3 de 22 8e f6 | 29 00 00 24 2a e4 8d 48 f2 e9 35 56 e7 78 9c 50 | 82 48 8b a6 d8 56 83 14 85 5c 7b 82 38 7e 5a 90 | dc b9 01 eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 6c fa 7e d5 f7 59 ab 33 19 e9 49 | 9d b2 c4 ad db 25 ab 32 00 00 00 1c 00 00 40 05 | 84 c3 f1 b0 ec 53 88 9c d7 9f 3b 91 13 fe 1d e1 | bc ef 10 92 | state #554 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c039e30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c018210 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #554 | libevent_malloc: new ptr-libevent@0x7fb34c053e10 size 128 | #554 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.295144 | resume sending helper answer for #554 suppresed complete_v2_state_transition() and stole MD | #554 spent 0.48 milliseconds in resume sending helper answer | stop processing: state #554 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb348059270 | processing resume sending helper answer for #553 | start processing: state #553 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 553 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #553 | **emit ISAKMP Message: | initiator cookie: | 9a 41 ad 5b 0b 26 50 71 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-77 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d9 98 9f b9 be 87 16 03 59 fa c6 46 2f 12 bf f9 | ikev2 g^x 9c 48 69 58 ca 2c be 3c 1b 2c 0f 5d 12 16 fe b8 | ikev2 g^x 30 28 bc 11 9d 18 3a 2e 90 9c 49 0c c8 26 aa 51 | ikev2 g^x 1a 9f 8d 14 3c a4 33 0e 49 75 9b b9 aa 38 ce f2 | ikev2 g^x 16 4f ee 39 a5 0c 19 90 f6 fe 17 a7 97 44 51 96 | ikev2 g^x cf b5 e3 78 62 4a 8d 45 65 01 d7 f0 91 ea 83 03 | ikev2 g^x ef ee 72 ad ec d4 2e 42 af 58 6b a8 76 71 c1 a4 | ikev2 g^x 15 40 9a 41 d3 be f4 fc 82 6b 9b 27 44 16 92 88 | ikev2 g^x d2 ec ae 3a ad 37 9a dc be e2 18 f1 a7 5a bd 4f | ikev2 g^x 9f 7b 73 27 86 3a a5 22 07 50 15 6f 01 41 8f 31 | ikev2 g^x a4 8d 9b be 74 93 18 96 e2 bb be 98 d5 3f 3c b0 | ikev2 g^x be 51 bf 90 e0 7d 1d a1 c1 89 14 87 3d 3e 5f 1a | ikev2 g^x 3a 6e 65 d4 e7 b0 94 33 2a d6 83 76 bd a6 19 f2 | ikev2 g^x 31 91 dc c3 17 65 be bd 3f 1a c2 ef f5 43 82 b9 | ikev2 g^x b3 3d 97 1b b0 5f d5 6f 78 93 3d 15 15 8a d3 04 | ikev2 g^x 93 b7 c2 73 86 dc fe 40 7b 4e 06 9a 50 ca 56 13 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 51 58 09 66 02 b7 a8 f0 dd f0 1c 1d b2 fa 84 64 | IKEv2 nonce 76 65 9d d1 36 08 96 10 0a a1 c1 1c e7 da ff a4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9a 41 ad 5b 0b 26 50 71 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4d | natd_hash: port= 01 f4 | natd_hash: hash= 81 41 6f 46 01 b2 f0 28 d5 2d 8d 99 ce e6 b9 ed | natd_hash: hash= 57 d9 9f 7b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 81 41 6f 46 01 b2 f0 28 d5 2d 8d 99 ce e6 b9 ed | Notify data 57 d9 9f 7b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9a 41 ad 5b 0b 26 50 71 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ed c5 55 11 76 93 de 00 6c 52 d8 5a 9c ca 52 d6 | natd_hash: hash= a7 72 5b e1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ed c5 55 11 76 93 de 00 6c 52 d8 5a 9c ca 52 d6 | Notify data a7 72 5b e1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #553 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #553 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #553 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #553: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #553 to 4294967295 after switching state | Message ID: IKE #553 skipping update_recv as MD is fake | Message ID: sent #553 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-77" #553: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.77:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #553) | 9a 41 ad 5b 0b 26 50 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 98 9f b9 be 87 16 03 59 fa c6 46 2f 12 bf f9 | 9c 48 69 58 ca 2c be 3c 1b 2c 0f 5d 12 16 fe b8 | 30 28 bc 11 9d 18 3a 2e 90 9c 49 0c c8 26 aa 51 | 1a 9f 8d 14 3c a4 33 0e 49 75 9b b9 aa 38 ce f2 | 16 4f ee 39 a5 0c 19 90 f6 fe 17 a7 97 44 51 96 | cf b5 e3 78 62 4a 8d 45 65 01 d7 f0 91 ea 83 03 | ef ee 72 ad ec d4 2e 42 af 58 6b a8 76 71 c1 a4 | 15 40 9a 41 d3 be f4 fc 82 6b 9b 27 44 16 92 88 | d2 ec ae 3a ad 37 9a dc be e2 18 f1 a7 5a bd 4f | 9f 7b 73 27 86 3a a5 22 07 50 15 6f 01 41 8f 31 | a4 8d 9b be 74 93 18 96 e2 bb be 98 d5 3f 3c b0 | be 51 bf 90 e0 7d 1d a1 c1 89 14 87 3d 3e 5f 1a | 3a 6e 65 d4 e7 b0 94 33 2a d6 83 76 bd a6 19 f2 | 31 91 dc c3 17 65 be bd 3f 1a c2 ef f5 43 82 b9 | b3 3d 97 1b b0 5f d5 6f 78 93 3d 15 15 8a d3 04 | 93 b7 c2 73 86 dc fe 40 7b 4e 06 9a 50 ca 56 13 | 29 00 00 24 51 58 09 66 02 b7 a8 f0 dd f0 1c 1d | b2 fa 84 64 76 65 9d d1 36 08 96 10 0a a1 c1 1c | e7 da ff a4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 41 6f 46 01 b2 f0 28 d5 2d 8d 99 | ce e6 b9 ed 57 d9 9f 7b 00 00 00 1c 00 00 40 05 | ed c5 55 11 76 93 de 00 6c 52 d8 5a 9c ca 52 d6 | a7 72 5b e1 | state #553 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb344034470 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46acab00 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348030240 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #553 | libevent_malloc: new ptr-libevent@0x7fb348059270 size 128 | #553 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.295606 | resume sending helper answer for #553 suppresed complete_v2_state_transition() and stole MD | #553 spent 0.435 milliseconds in resume sending helper answer | stop processing: state #553 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3540597d0 | processing resume sending helper answer for #565 | start processing: state #565 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 565 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #565 | **emit ISAKMP Message: | initiator cookie: | 62 cf 87 14 c6 62 30 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-51 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1b a0 88 20 e4 4d 45 6c f9 cd ab 1d a2 7b 8a 77 | ikev2 g^x 3f 3e dd 83 a5 c5 aa 0c 1c dc 89 10 ec 2e 1d 4c | ikev2 g^x 42 5c ef 6d ad 49 b0 1e 60 9d 8f 8c b6 97 91 1e | ikev2 g^x fa e2 a1 97 aa fe 08 0f d1 4f 8c 96 f7 66 97 1c | ikev2 g^x 6e fb 33 4a 4e 60 96 cf 7f a6 af 09 ab ce 9a 08 | ikev2 g^x 5e 64 35 ec 21 8a c2 bd 2b 50 c9 95 3c df 67 bc | ikev2 g^x 76 c2 a3 99 52 f2 44 a3 ba 7f 1b 9c 6c be 57 71 | ikev2 g^x 7f aa ab d0 89 27 ef cd 3c c8 cb b6 a6 56 b0 2a | ikev2 g^x dc 32 81 f2 b0 96 30 77 84 9d 47 bf 9b 70 ae 9a | ikev2 g^x c7 54 8e 37 07 9a 5c 45 ac fb 14 0f 30 d7 f4 3e | ikev2 g^x 00 53 c5 25 30 e9 b3 2b a7 d9 d6 c7 f1 6c ee b4 | ikev2 g^x 31 ce 1b b5 18 a7 ca cc 86 23 9e 01 75 cb f1 23 | ikev2 g^x 0c 74 c8 3b 22 ea 10 cb 1f ed bd 4b f5 15 a7 9b | ikev2 g^x 8d e7 27 21 43 d9 02 bf 4e 4f 28 80 57 9a 76 c3 | ikev2 g^x 87 dd 7c 2f d5 cb 47 73 51 a8 31 7d f5 87 87 1b | ikev2 g^x 7f 53 02 3e d3 de e6 6a 94 c6 04 77 83 8c 4f 18 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 73 13 83 30 bb ab 6e 91 50 8f 5b d1 22 88 91 f8 | IKEv2 nonce 87 52 43 c0 f4 4c b0 a5 9d 49 2d 93 43 f4 73 8a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 62 cf 87 14 c6 62 30 44 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 33 | natd_hash: port= 01 f4 | natd_hash: hash= c1 96 b5 11 12 39 51 2e 15 f5 5b 59 6a a7 e2 36 | natd_hash: hash= 4b 38 a6 bf | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c1 96 b5 11 12 39 51 2e 15 f5 5b 59 6a a7 e2 36 | Notify data 4b 38 a6 bf | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 62 cf 87 14 c6 62 30 44 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= b3 11 8b 4a 03 6b 06 af b5 74 1c 0f df 6e b1 a0 | natd_hash: hash= d3 aa 16 5d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data b3 11 8b 4a 03 6b 06 af b5 74 1c 0f df 6e b1 a0 | Notify data d3 aa 16 5d | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #565 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #565 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #565 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #565: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #565 to 4294967295 after switching state | Message ID: IKE #565 skipping update_recv as MD is fake | Message ID: sent #565 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-51" #565: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.51:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #565) | 62 cf 87 14 c6 62 30 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b a0 88 20 e4 4d 45 6c f9 cd ab 1d a2 7b 8a 77 | 3f 3e dd 83 a5 c5 aa 0c 1c dc 89 10 ec 2e 1d 4c | 42 5c ef 6d ad 49 b0 1e 60 9d 8f 8c b6 97 91 1e | fa e2 a1 97 aa fe 08 0f d1 4f 8c 96 f7 66 97 1c | 6e fb 33 4a 4e 60 96 cf 7f a6 af 09 ab ce 9a 08 | 5e 64 35 ec 21 8a c2 bd 2b 50 c9 95 3c df 67 bc | 76 c2 a3 99 52 f2 44 a3 ba 7f 1b 9c 6c be 57 71 | 7f aa ab d0 89 27 ef cd 3c c8 cb b6 a6 56 b0 2a | dc 32 81 f2 b0 96 30 77 84 9d 47 bf 9b 70 ae 9a | c7 54 8e 37 07 9a 5c 45 ac fb 14 0f 30 d7 f4 3e | 00 53 c5 25 30 e9 b3 2b a7 d9 d6 c7 f1 6c ee b4 | 31 ce 1b b5 18 a7 ca cc 86 23 9e 01 75 cb f1 23 | 0c 74 c8 3b 22 ea 10 cb 1f ed bd 4b f5 15 a7 9b | 8d e7 27 21 43 d9 02 bf 4e 4f 28 80 57 9a 76 c3 | 87 dd 7c 2f d5 cb 47 73 51 a8 31 7d f5 87 87 1b | 7f 53 02 3e d3 de e6 6a 94 c6 04 77 83 8c 4f 18 | 29 00 00 24 73 13 83 30 bb ab 6e 91 50 8f 5b d1 | 22 88 91 f8 87 52 43 c0 f4 4c b0 a5 9d 49 2d 93 | 43 f4 73 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c1 96 b5 11 12 39 51 2e 15 f5 5b 59 | 6a a7 e2 36 4b 38 a6 bf 00 00 00 1c 00 00 40 05 | b3 11 8b 4a 03 6b 06 af b5 74 1c 0f df 6e b1 a0 | d3 aa 16 5d | state #565 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38802d3a0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb360018460 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #565 | libevent_malloc: new ptr-libevent@0x7fb3540597d0 size 128 | #565 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.296071 | resume sending helper answer for #565 suppresed complete_v2_state_transition() and stole MD | #565 spent 0.439 milliseconds in resume sending helper answer | stop processing: state #565 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3380597d0 | processing resume sending helper answer for #550 | start processing: state #550 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 550 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #550 | **emit ISAKMP Message: | initiator cookie: | db ff 34 cc aa 26 9d 88 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-91 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x da 8a d7 13 53 9b f1 64 c1 c8 04 0a 8b 03 2b c6 | ikev2 g^x 0d ad 43 39 3f fa d4 31 02 f2 d8 f2 49 42 65 4d | ikev2 g^x e0 c7 6e 23 69 ee af f5 1d 8a 37 e7 f7 88 51 de | ikev2 g^x da e3 c7 6f ce 70 fd 62 27 15 72 b1 74 d5 96 fe | ikev2 g^x 5d 1b a4 a4 ca 31 5b a5 af a2 32 e4 20 19 00 6d | ikev2 g^x fa 74 d0 93 44 c3 c0 75 8e c7 8d 89 fe 62 d3 0e | ikev2 g^x ec 96 32 6f b0 ca 05 63 70 b3 be f1 fd 8a 22 d3 | ikev2 g^x 30 ce 9e d5 e4 e5 4d 92 9a f9 82 cc a2 1d bf 79 | ikev2 g^x e0 be 40 12 35 fa 00 26 4c 97 eb 5c 78 8c 37 10 | ikev2 g^x 77 68 70 27 80 31 92 d4 17 d1 f6 07 6e a8 5c 37 | ikev2 g^x b2 cf 98 7e 16 70 ee da 2f c8 6a 1a cf 99 42 34 | ikev2 g^x 69 17 56 25 2f 75 a2 60 5b 03 8f 41 b4 71 d4 fe | ikev2 g^x d6 39 fc e1 d0 29 d9 e4 01 4d 2d 30 57 34 2a 98 | ikev2 g^x 61 8d 90 1a 37 ab e2 12 47 26 fe 8f 69 f6 20 34 | ikev2 g^x 44 8b 50 13 5b e0 15 0d ae 46 52 1d a4 2f bb f4 | ikev2 g^x 98 b0 5c 9c 64 1b 86 83 6f 11 65 70 23 23 74 6f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e6 6e 02 88 81 a9 8e a7 ae 14 ec 40 05 51 ce e9 | IKEv2 nonce 24 5c 3b c2 0b 49 df 12 27 77 a8 bf ca be 33 ca | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= db ff 34 cc aa 26 9d 88 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5b | natd_hash: port= 01 f4 | natd_hash: hash= dd 11 2c ad 5a 38 a4 00 8e af be fd a7 9a 55 19 | natd_hash: hash= 4d 9f d1 09 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dd 11 2c ad 5a 38 a4 00 8e af be fd a7 9a 55 19 | Notify data 4d 9f d1 09 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= db ff 34 cc aa 26 9d 88 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= aa 58 63 41 f4 3b 9c a5 91 ba 1f 8a 0a d5 9b 23 | natd_hash: hash= 59 28 d4 a7 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data aa 58 63 41 f4 3b 9c a5 91 ba 1f 8a 0a d5 9b 23 | Notify data 59 28 d4 a7 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #550 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #550 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #550 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #550: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #550 to 4294967295 after switching state | Message ID: IKE #550 skipping update_recv as MD is fake | Message ID: sent #550 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-91" #550: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.91:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #550) | db ff 34 cc aa 26 9d 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 8a d7 13 53 9b f1 64 c1 c8 04 0a 8b 03 2b c6 | 0d ad 43 39 3f fa d4 31 02 f2 d8 f2 49 42 65 4d | e0 c7 6e 23 69 ee af f5 1d 8a 37 e7 f7 88 51 de | da e3 c7 6f ce 70 fd 62 27 15 72 b1 74 d5 96 fe | 5d 1b a4 a4 ca 31 5b a5 af a2 32 e4 20 19 00 6d | fa 74 d0 93 44 c3 c0 75 8e c7 8d 89 fe 62 d3 0e | ec 96 32 6f b0 ca 05 63 70 b3 be f1 fd 8a 22 d3 | 30 ce 9e d5 e4 e5 4d 92 9a f9 82 cc a2 1d bf 79 | e0 be 40 12 35 fa 00 26 4c 97 eb 5c 78 8c 37 10 | 77 68 70 27 80 31 92 d4 17 d1 f6 07 6e a8 5c 37 | b2 cf 98 7e 16 70 ee da 2f c8 6a 1a cf 99 42 34 | 69 17 56 25 2f 75 a2 60 5b 03 8f 41 b4 71 d4 fe | d6 39 fc e1 d0 29 d9 e4 01 4d 2d 30 57 34 2a 98 | 61 8d 90 1a 37 ab e2 12 47 26 fe 8f 69 f6 20 34 | 44 8b 50 13 5b e0 15 0d ae 46 52 1d a4 2f bb f4 | 98 b0 5c 9c 64 1b 86 83 6f 11 65 70 23 23 74 6f | 29 00 00 24 e6 6e 02 88 81 a9 8e a7 ae 14 ec 40 | 05 51 ce e9 24 5c 3b c2 0b 49 df 12 27 77 a8 bf | ca be 33 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 11 2c ad 5a 38 a4 00 8e af be fd | a7 9a 55 19 4d 9f d1 09 00 00 00 1c 00 00 40 05 | aa 58 63 41 f4 3b 9c a5 91 ba 1f 8a 0a d5 9b 23 | 59 28 d4 a7 | state #550 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3840060f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab64c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #550 | libevent_malloc: new ptr-libevent@0x7fb3380597d0 size 128 | #550 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.296579 | resume sending helper answer for #550 suppresed complete_v2_state_transition() and stole MD | #550 spent 0.452 milliseconds in resume sending helper answer | stop processing: state #550 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38805f660 | processing resume sending helper answer for #544 | start processing: state #544 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 16 replies to request ID 544 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #544 | **emit ISAKMP Message: | initiator cookie: | 0c c8 e0 5f be 01 79 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-38 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x c9 4b b7 07 59 5a 8f d2 fb d3 5d 33 1e 68 91 b3 | ikev2 g^x a2 26 c9 b9 8a b4 e6 8a 43 31 64 0d 77 e0 f1 15 | ikev2 g^x a1 39 45 b8 6b 02 50 97 06 06 58 9e 3a ef e8 37 | ikev2 g^x e4 7c 57 f1 4d 93 3b f5 c4 5a e8 bb 95 0b 16 30 | ikev2 g^x ae 70 14 a4 78 fb c6 1c 98 e7 86 0d 21 64 8f 8a | ikev2 g^x 57 22 3c 59 65 26 f5 b7 05 65 f5 b3 e4 57 83 07 | ikev2 g^x f5 ce 36 2e 87 c6 da e7 e8 5c 9e ac 52 b5 c7 3a | ikev2 g^x f5 b5 91 44 37 d8 f7 d2 db 23 2c a3 a1 47 55 3d | ikev2 g^x c3 92 ed 16 17 e5 6d f6 27 bc 16 5c 7d af 1b 3d | ikev2 g^x b1 6f 3a d3 6c 01 d7 03 36 b7 2e bf 9e d3 3d 31 | ikev2 g^x 24 06 bc a1 b6 d4 18 fd b7 44 8a a2 c6 1d 54 30 | ikev2 g^x ae a7 68 58 6b 6e 1c 65 90 77 e6 12 7e f0 bb ad | ikev2 g^x f3 9e 62 3f 52 83 0f 79 80 56 f0 97 14 45 da 2a | ikev2 g^x 9f 60 50 4a b5 7b 81 9f 4e 30 c8 19 e2 8e 7e 1a | ikev2 g^x 5f 7d f6 43 0f fd 85 83 e1 ad 46 c1 11 a2 4c 5f | ikev2 g^x ff 7c b9 be 6e 26 8b f7 40 11 92 c6 8b 91 0d ac | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e2 a6 28 8f f1 ed a9 8c ae aa e7 2c 5e dc cc d9 | IKEv2 nonce d9 82 b2 05 50 60 c7 46 e1 4a 89 6c 50 12 77 bd | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0c c8 e0 5f be 01 79 44 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 26 | natd_hash: port= 01 f4 | natd_hash: hash= d8 fb b8 9e 31 b2 48 64 bc b6 ad e6 d8 89 63 35 | natd_hash: hash= 93 98 9f 2c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d8 fb b8 9e 31 b2 48 64 bc b6 ad e6 d8 89 63 35 | Notify data 93 98 9f 2c | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 0c c8 e0 5f be 01 79 44 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c9 4d f1 16 2f aa 6e 90 ec dc a5 b3 7b 2e 5c c9 | natd_hash: hash= 7d 08 18 e1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c9 4d f1 16 2f aa 6e 90 ec dc a5 b3 7b 2e 5c c9 | Notify data 7d 08 18 e1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #544 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #544 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #544 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #544: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #544 to 4294967295 after switching state | Message ID: IKE #544 skipping update_recv as MD is fake | Message ID: sent #544 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-38" #544: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.38:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #544) | 0c c8 e0 5f be 01 79 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 4b b7 07 59 5a 8f d2 fb d3 5d 33 1e 68 91 b3 | a2 26 c9 b9 8a b4 e6 8a 43 31 64 0d 77 e0 f1 15 | a1 39 45 b8 6b 02 50 97 06 06 58 9e 3a ef e8 37 | e4 7c 57 f1 4d 93 3b f5 c4 5a e8 bb 95 0b 16 30 | ae 70 14 a4 78 fb c6 1c 98 e7 86 0d 21 64 8f 8a | 57 22 3c 59 65 26 f5 b7 05 65 f5 b3 e4 57 83 07 | f5 ce 36 2e 87 c6 da e7 e8 5c 9e ac 52 b5 c7 3a | f5 b5 91 44 37 d8 f7 d2 db 23 2c a3 a1 47 55 3d | c3 92 ed 16 17 e5 6d f6 27 bc 16 5c 7d af 1b 3d | b1 6f 3a d3 6c 01 d7 03 36 b7 2e bf 9e d3 3d 31 | 24 06 bc a1 b6 d4 18 fd b7 44 8a a2 c6 1d 54 30 | ae a7 68 58 6b 6e 1c 65 90 77 e6 12 7e f0 bb ad | f3 9e 62 3f 52 83 0f 79 80 56 f0 97 14 45 da 2a | 9f 60 50 4a b5 7b 81 9f 4e 30 c8 19 e2 8e 7e 1a | 5f 7d f6 43 0f fd 85 83 e1 ad 46 c1 11 a2 4c 5f | ff 7c b9 be 6e 26 8b f7 40 11 92 c6 8b 91 0d ac | 29 00 00 24 e2 a6 28 8f f1 ed a9 8c ae aa e7 2c | 5e dc cc d9 d9 82 b2 05 50 60 c7 46 e1 4a 89 6c | 50 12 77 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 fb b8 9e 31 b2 48 64 bc b6 ad e6 | d8 89 63 35 93 98 9f 2c 00 00 00 1c 00 00 40 05 | c9 4d f1 16 2f aa 6e 90 ec dc a5 b3 7b 2e 5c c9 | 7d 08 18 e1 | state #544 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb37403ae20 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ad6ec0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #544 | libevent_malloc: new ptr-libevent@0x7fb38805f660 size 128 | #544 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.296893 | resume sending helper answer for #544 suppresed complete_v2_state_transition() and stole MD | #544 spent 0.288 milliseconds in resume sending helper answer | stop processing: state #544 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb364059ad0 | processing resume sending helper answer for #562 | start processing: state #562 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 562 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #562 | **emit ISAKMP Message: | initiator cookie: | d4 5a 4f 23 43 95 38 c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-57 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 99 21 4a 80 72 e7 1e ab e4 a4 cc 6f ae 76 b4 17 | ikev2 g^x 66 86 d6 e9 31 54 d5 5a 28 1c 74 da 50 fb 86 f4 | ikev2 g^x 2e 76 50 d3 0d b0 af 0a dd f4 b7 13 30 20 64 87 | ikev2 g^x f2 f8 f7 5e 86 a8 52 97 05 ae 0d 56 79 b8 88 83 | ikev2 g^x df 4b 38 d8 fd 5a 52 6b 17 d7 11 45 fc b9 a4 96 | ikev2 g^x 35 56 c5 1b 74 b1 b1 3b 01 57 7f e0 6d fc 5d 6c | ikev2 g^x 21 86 9a 44 ea 45 b1 a1 05 01 3c 3a 83 6c a3 ec | ikev2 g^x 26 13 36 21 83 8a a9 26 0b 6b e0 0b 90 3b db 09 | ikev2 g^x 26 5d d6 57 a5 f5 d7 1c 5a ce 92 a1 4d 1b 39 ba | ikev2 g^x fe d1 57 2e c6 1d 0e d3 ee b4 63 0d c8 a5 b3 10 | ikev2 g^x 07 e3 b7 03 07 bc 65 1b bf b5 ed eb eb 53 36 51 | ikev2 g^x 4a 60 85 66 ce 2a ad 64 2e 22 1f f5 c7 e8 ab 8b | ikev2 g^x 56 4d 1b 92 82 89 69 60 5a 9e d6 65 67 5b 25 d6 | ikev2 g^x b0 fc eb ed e9 a5 d6 c8 1d 10 b2 22 0e 91 e4 cc | ikev2 g^x 73 60 02 ba 62 2c 96 2c 46 34 20 da c9 7c 01 9a | ikev2 g^x b8 13 b1 fa b1 0b 0a 18 a3 97 42 e9 48 2a 9a d0 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 95 d0 5a 24 13 c9 df 14 0f 8d ab 25 8b d1 7e e3 | IKEv2 nonce e1 dc 1c 56 c1 ea 4c 91 e9 f7 07 4a 89 49 ff 32 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d4 5a 4f 23 43 95 38 c5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 39 | natd_hash: port= 01 f4 | natd_hash: hash= a3 58 19 cf a0 1f 48 f9 3e 3b 37 57 fe 6c 89 3e | natd_hash: hash= e8 fd 27 9e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a3 58 19 cf a0 1f 48 f9 3e 3b 37 57 fe 6c 89 3e | Notify data e8 fd 27 9e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d4 5a 4f 23 43 95 38 c5 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 73 2a d5 98 9e 00 e7 3f e4 c4 a7 88 fa 3d 90 0b | natd_hash: hash= ae 11 e9 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 73 2a d5 98 9e 00 e7 3f e4 c4 a7 88 fa 3d 90 0b | Notify data ae 11 e9 36 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #562 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #562 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #562 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #562: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #562 to 4294967295 after switching state | Message ID: IKE #562 skipping update_recv as MD is fake | Message ID: sent #562 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-57" #562: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.57:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #562) | d4 5a 4f 23 43 95 38 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 21 4a 80 72 e7 1e ab e4 a4 cc 6f ae 76 b4 17 | 66 86 d6 e9 31 54 d5 5a 28 1c 74 da 50 fb 86 f4 | 2e 76 50 d3 0d b0 af 0a dd f4 b7 13 30 20 64 87 | f2 f8 f7 5e 86 a8 52 97 05 ae 0d 56 79 b8 88 83 | df 4b 38 d8 fd 5a 52 6b 17 d7 11 45 fc b9 a4 96 | 35 56 c5 1b 74 b1 b1 3b 01 57 7f e0 6d fc 5d 6c | 21 86 9a 44 ea 45 b1 a1 05 01 3c 3a 83 6c a3 ec | 26 13 36 21 83 8a a9 26 0b 6b e0 0b 90 3b db 09 | 26 5d d6 57 a5 f5 d7 1c 5a ce 92 a1 4d 1b 39 ba | fe d1 57 2e c6 1d 0e d3 ee b4 63 0d c8 a5 b3 10 | 07 e3 b7 03 07 bc 65 1b bf b5 ed eb eb 53 36 51 | 4a 60 85 66 ce 2a ad 64 2e 22 1f f5 c7 e8 ab 8b | 56 4d 1b 92 82 89 69 60 5a 9e d6 65 67 5b 25 d6 | b0 fc eb ed e9 a5 d6 c8 1d 10 b2 22 0e 91 e4 cc | 73 60 02 ba 62 2c 96 2c 46 34 20 da c9 7c 01 9a | b8 13 b1 fa b1 0b 0a 18 a3 97 42 e9 48 2a 9a d0 | 29 00 00 24 95 d0 5a 24 13 c9 df 14 0f 8d ab 25 | 8b d1 7e e3 e1 dc 1c 56 c1 ea 4c 91 e9 f7 07 4a | 89 49 ff 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 58 19 cf a0 1f 48 f9 3e 3b 37 57 | fe 6c 89 3e e8 fd 27 9e 00 00 00 1c 00 00 40 05 | 73 2a d5 98 9e 00 e7 3f e4 c4 a7 88 fa 3d 90 0b | ae 11 e9 36 | state #562 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35c023d80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35c00cc10 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36402f780 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #562 | libevent_malloc: new ptr-libevent@0x7fb364059ad0 size 128 | #562 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.297238 | resume sending helper answer for #562 suppresed complete_v2_state_transition() and stole MD | #562 spent 0.32 milliseconds in resume sending helper answer | stop processing: state #562 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb360059710 | processing resume sending helper answer for #519 | start processing: state #519 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 5 replies to request ID 519 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #519 | **emit ISAKMP Message: | initiator cookie: | 36 74 88 6c 2b d4 65 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-68 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 6d 80 4d e8 d2 d9 23 a3 00 9b f7 df 4f fc c6 6e | ikev2 g^x 72 0a d6 44 83 97 e4 01 17 c9 8e 18 c2 f3 5d 0b | ikev2 g^x 06 e3 14 e4 8b dd 35 55 be 4b 2f 8b ab e3 cf ff | ikev2 g^x 80 24 c8 41 ad a4 91 74 f3 18 71 24 3e 71 ce 42 | ikev2 g^x 5e 86 bd 65 21 12 dd cb 90 44 9b 3a 9f 20 2e a7 | ikev2 g^x d0 3f dc 7c b1 53 17 2a e7 d3 a1 43 19 60 0c 5d | ikev2 g^x a4 8c 8d 56 2a 15 54 29 6b e8 1d 43 3b 4c 9f 9b | ikev2 g^x 9c 1c e3 58 55 dd 85 2d 50 d0 5a 79 9c 2c 40 b9 | ikev2 g^x e9 42 08 b9 54 2a 23 6a ed 77 99 24 5b c3 76 38 | ikev2 g^x a0 98 ca 43 c3 7c c7 63 5d d3 19 75 86 36 2c ee | ikev2 g^x b6 7d da ed 30 f6 cc b6 4d dc 14 16 ea be cf c9 | ikev2 g^x 4b 9d 75 9b 36 af 1d fd e9 19 95 e5 30 f3 fb 99 | ikev2 g^x c9 3b 35 b0 77 0a 08 c3 17 b0 a5 ed 7e a1 52 ee | ikev2 g^x 73 a2 4a 26 9d 1c 04 4f b7 86 f3 0e 1b 4b 3b 2a | ikev2 g^x da 3b 8c 88 8e 0d 68 63 4d 3f 3d f1 f7 54 db 7c | ikev2 g^x 16 d8 87 45 15 1c 36 83 91 f6 d9 2e c6 69 c8 c7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 1f 89 a0 a9 be ce 4e ea ec c0 43 e0 93 cd cd c6 | IKEv2 nonce 83 c2 c6 69 70 37 da db 02 17 df 46 c3 38 aa 03 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 36 74 88 6c 2b d4 65 97 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 44 | natd_hash: port= 01 f4 | natd_hash: hash= d5 b0 da 44 b0 25 b8 4b 8c 5b 4c 67 69 d1 51 09 | natd_hash: hash= 6e 53 b8 b5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d5 b0 da 44 b0 25 b8 4b 8c 5b 4c 67 69 d1 51 09 | Notify data 6e 53 b8 b5 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 36 74 88 6c 2b d4 65 97 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 80 05 b4 13 38 cb 24 03 e0 02 b7 5d 8d 12 3d 6f | natd_hash: hash= e6 28 68 a9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 80 05 b4 13 38 cb 24 03 e0 02 b7 5d 8d 12 3d 6f | Notify data e6 28 68 a9 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #519 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #519 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #519 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #519: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #519 to 4294967295 after switching state | Message ID: IKE #519 skipping update_recv as MD is fake | Message ID: sent #519 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-68" #519: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.68:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #519) | 36 74 88 6c 2b d4 65 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 80 4d e8 d2 d9 23 a3 00 9b f7 df 4f fc c6 6e | 72 0a d6 44 83 97 e4 01 17 c9 8e 18 c2 f3 5d 0b | 06 e3 14 e4 8b dd 35 55 be 4b 2f 8b ab e3 cf ff | 80 24 c8 41 ad a4 91 74 f3 18 71 24 3e 71 ce 42 | 5e 86 bd 65 21 12 dd cb 90 44 9b 3a 9f 20 2e a7 | d0 3f dc 7c b1 53 17 2a e7 d3 a1 43 19 60 0c 5d | a4 8c 8d 56 2a 15 54 29 6b e8 1d 43 3b 4c 9f 9b | 9c 1c e3 58 55 dd 85 2d 50 d0 5a 79 9c 2c 40 b9 | e9 42 08 b9 54 2a 23 6a ed 77 99 24 5b c3 76 38 | a0 98 ca 43 c3 7c c7 63 5d d3 19 75 86 36 2c ee | b6 7d da ed 30 f6 cc b6 4d dc 14 16 ea be cf c9 | 4b 9d 75 9b 36 af 1d fd e9 19 95 e5 30 f3 fb 99 | c9 3b 35 b0 77 0a 08 c3 17 b0 a5 ed 7e a1 52 ee | 73 a2 4a 26 9d 1c 04 4f b7 86 f3 0e 1b 4b 3b 2a | da 3b 8c 88 8e 0d 68 63 4d 3f 3d f1 f7 54 db 7c | 16 d8 87 45 15 1c 36 83 91 f6 d9 2e c6 69 c8 c7 | 29 00 00 24 1f 89 a0 a9 be ce 4e ea ec c0 43 e0 | 93 cd cd c6 83 c2 c6 69 70 37 da db 02 17 df 46 | c3 38 aa 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 b0 da 44 b0 25 b8 4b 8c 5b 4c 67 | 69 d1 51 09 6e 53 b8 b5 00 00 00 1c 00 00 40 05 | 80 05 b4 13 38 cb 24 03 e0 02 b7 5d 8d 12 3d 6f | e6 28 68 a9 | state #519 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35804b970 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb35800cfd0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36001d710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #519 | libevent_malloc: new ptr-libevent@0x7fb360059710 size 128 | #519 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.297538 | resume sending helper answer for #519 suppresed complete_v2_state_transition() and stole MD | #519 spent 0.279 milliseconds in resume sending helper answer | stop processing: state #519 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb34404e800 | processing resume sending helper answer for #556 | start processing: state #556 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 556 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #556 | **emit ISAKMP Message: | initiator cookie: | 7f e0 6f 00 84 26 56 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-79 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x de 15 78 aa 6e e9 58 38 6b 46 1e a0 52 bc 83 d3 | ikev2 g^x cf 3c 33 de 82 b7 42 a2 2c 21 00 a9 3e 75 eb cd | ikev2 g^x 10 be b3 c4 82 43 d9 1a af 89 42 df 94 04 7c 60 | ikev2 g^x 14 3d 7a dd 5f 47 e2 da 24 89 04 06 b4 36 fd d6 | ikev2 g^x b5 de d2 50 15 a7 a8 36 fa 6f 62 cd 03 73 82 57 | ikev2 g^x 6a cf 7d e2 0e 29 5a 1b 2a 8a 28 af 96 29 bc 69 | ikev2 g^x 1a 81 07 d6 ad 61 0f 8a 27 b7 1d 98 f7 93 91 2d | ikev2 g^x 0d 00 d6 3c 6b ad 6c 9d db ce 11 c2 cc b5 ef e2 | ikev2 g^x 57 1f 51 2d aa d2 48 9a c3 ef 55 ad d5 6b 90 71 | ikev2 g^x 43 d7 9d 6a df a5 c6 3e 0b 53 aa ee 23 1e 88 a7 | ikev2 g^x 88 a5 c2 c5 7d 46 94 a3 b8 f3 c0 22 9f 4e 9c 57 | ikev2 g^x 20 38 e3 e1 74 97 33 b0 6b 37 ab 55 e4 6b 7f 66 | ikev2 g^x bc ea 73 65 26 88 f8 d8 07 69 6b 02 07 00 f0 e0 | ikev2 g^x 04 4e 23 72 d8 dd 96 e9 45 8d c7 f5 0d 29 06 22 | ikev2 g^x 84 bf e8 45 e1 63 1f c4 d6 f5 dd 33 b2 91 28 59 | ikev2 g^x 36 36 33 ab a5 81 cd 66 0a 4b 61 b1 5a f0 48 ea | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce bb f0 c0 c8 4a 3c 83 ba 45 ba d1 f4 34 ae de c1 | IKEv2 nonce b8 04 dc 84 16 78 e1 c2 d3 f7 29 e4 68 26 70 31 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7f e0 6f 00 84 26 56 77 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 4f | natd_hash: port= 01 f4 | natd_hash: hash= f7 84 b1 fb 5f 89 80 45 53 1d b4 39 35 8e 65 a4 | natd_hash: hash= f5 45 9d 15 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data f7 84 b1 fb 5f 89 80 45 53 1d b4 39 35 8e 65 a4 | Notify data f5 45 9d 15 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7f e0 6f 00 84 26 56 77 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 5d 5c c0 4e dd d9 8e 7f 9a e0 e2 3a 80 a4 20 4e | natd_hash: hash= 23 e0 ef b5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5d 5c c0 4e dd d9 8e 7f 9a e0 e2 3a 80 a4 20 4e | Notify data 23 e0 ef b5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #556 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #556 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #556 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #556: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #556 to 4294967295 after switching state | Message ID: IKE #556 skipping update_recv as MD is fake | Message ID: sent #556 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-79" #556: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.79:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #556) | 7f e0 6f 00 84 26 56 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 15 78 aa 6e e9 58 38 6b 46 1e a0 52 bc 83 d3 | cf 3c 33 de 82 b7 42 a2 2c 21 00 a9 3e 75 eb cd | 10 be b3 c4 82 43 d9 1a af 89 42 df 94 04 7c 60 | 14 3d 7a dd 5f 47 e2 da 24 89 04 06 b4 36 fd d6 | b5 de d2 50 15 a7 a8 36 fa 6f 62 cd 03 73 82 57 | 6a cf 7d e2 0e 29 5a 1b 2a 8a 28 af 96 29 bc 69 | 1a 81 07 d6 ad 61 0f 8a 27 b7 1d 98 f7 93 91 2d | 0d 00 d6 3c 6b ad 6c 9d db ce 11 c2 cc b5 ef e2 | 57 1f 51 2d aa d2 48 9a c3 ef 55 ad d5 6b 90 71 | 43 d7 9d 6a df a5 c6 3e 0b 53 aa ee 23 1e 88 a7 | 88 a5 c2 c5 7d 46 94 a3 b8 f3 c0 22 9f 4e 9c 57 | 20 38 e3 e1 74 97 33 b0 6b 37 ab 55 e4 6b 7f 66 | bc ea 73 65 26 88 f8 d8 07 69 6b 02 07 00 f0 e0 | 04 4e 23 72 d8 dd 96 e9 45 8d c7 f5 0d 29 06 22 | 84 bf e8 45 e1 63 1f c4 d6 f5 dd 33 b2 91 28 59 | 36 36 33 ab a5 81 cd 66 0a 4b 61 b1 5a f0 48 ea | 29 00 00 24 bb f0 c0 c8 4a 3c 83 ba 45 ba d1 f4 | 34 ae de c1 b8 04 dc 84 16 78 e1 c2 d3 f7 29 e4 | 68 26 70 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 84 b1 fb 5f 89 80 45 53 1d b4 39 | 35 8e 65 a4 f5 45 9d 15 00 00 00 1c 00 00 40 05 | 5d 5c c0 4e dd d9 8e 7f 9a e0 e2 3a 80 a4 20 4e | 23 e0 ef b5 | state #556 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388011f30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb37c005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34401fda0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #556 | libevent_malloc: new ptr-libevent@0x7fb34404e800 size 128 | #556 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.297837 | resume sending helper answer for #556 suppresed complete_v2_state_transition() and stole MD | #556 spent 0.279 milliseconds in resume sending helper answer | stop processing: state #556 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35005ec80 | processing resume sending helper answer for #536 | start processing: state #536 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 12 replies to request ID 536 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #536 | **emit ISAKMP Message: | initiator cookie: | cd 74 01 a2 39 d6 cc 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-122 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 53 a9 5f 47 01 bf 55 fc bd 36 63 8b 4d da a2 32 | ikev2 g^x 98 7c 8f 8d a5 10 38 4c bb 7b c0 1e 62 5a 95 3c | ikev2 g^x ab 87 bd b0 4f 05 a5 81 6d 16 fb ef 76 e7 c1 2e | ikev2 g^x 30 1a b2 78 2f 5b bb 53 da 79 ff c6 de 33 c0 9b | ikev2 g^x 96 0d 48 b4 64 0a a9 01 2d 4a d0 58 00 bb 3c 5a | ikev2 g^x b8 df 75 ac 56 24 ea 3b e4 71 b8 47 a2 58 0d 3b | ikev2 g^x 32 c1 40 67 d0 eb 20 07 a9 b4 43 31 fd 92 e2 d3 | ikev2 g^x 5e 9d 2b 29 57 37 d7 12 6b 8f 10 a0 9d 51 1a 5e | ikev2 g^x 59 dd 2a 2e bf c4 30 ee 1c 21 a4 1f 05 1c f1 ca | ikev2 g^x e9 cb 39 c8 e2 40 b2 4d 3b a4 95 5b bf 34 0a 3a | ikev2 g^x df 80 38 7b 51 86 8c a1 11 39 77 8b d5 ae 50 8f | ikev2 g^x 99 a1 0a e0 bd 3f 7e c9 79 53 04 c1 e3 df cd 70 | ikev2 g^x 3e 66 c4 67 c1 e4 73 dd bf 1e f4 11 d7 82 43 b1 | ikev2 g^x 95 c0 67 ed 01 5f 2c b1 0e a8 b7 86 5e a3 ac 38 | ikev2 g^x d4 97 88 0a b4 b8 8a a9 70 ef 6a 55 78 38 3e 25 | ikev2 g^x 5b 0e aa fc 57 7c 94 10 43 b3 19 df 16 34 03 61 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 13 0a a1 55 e1 40 3c ca 6b 43 9b 8e d8 49 6d 03 | IKEv2 nonce c7 22 e9 d4 6e 01 14 b8 c6 77 b4 61 5d 3f ba 8f | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cd 74 01 a2 39 d6 cc 4a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7a | natd_hash: port= 01 f4 | natd_hash: hash= 7b c5 c3 84 79 53 11 43 e1 cc 1f 7c 14 ba b0 c9 | natd_hash: hash= 4b e7 b4 37 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 7b c5 c3 84 79 53 11 43 e1 cc 1f 7c 14 ba b0 c9 | Notify data 4b e7 b4 37 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= cd 74 01 a2 39 d6 cc 4a | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 57 c6 83 93 fa f0 1e 53 76 4a bb b4 87 ee 28 a4 | natd_hash: hash= 6c 5a d1 2c | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 57 c6 83 93 fa f0 1e 53 76 4a bb b4 87 ee 28 a4 | Notify data 6c 5a d1 2c | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #536 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #536 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #536 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #536: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #536 to 4294967295 after switching state | Message ID: IKE #536 skipping update_recv as MD is fake | Message ID: sent #536 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-122" #536: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.122:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #536) | cd 74 01 a2 39 d6 cc 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 a9 5f 47 01 bf 55 fc bd 36 63 8b 4d da a2 32 | 98 7c 8f 8d a5 10 38 4c bb 7b c0 1e 62 5a 95 3c | ab 87 bd b0 4f 05 a5 81 6d 16 fb ef 76 e7 c1 2e | 30 1a b2 78 2f 5b bb 53 da 79 ff c6 de 33 c0 9b | 96 0d 48 b4 64 0a a9 01 2d 4a d0 58 00 bb 3c 5a | b8 df 75 ac 56 24 ea 3b e4 71 b8 47 a2 58 0d 3b | 32 c1 40 67 d0 eb 20 07 a9 b4 43 31 fd 92 e2 d3 | 5e 9d 2b 29 57 37 d7 12 6b 8f 10 a0 9d 51 1a 5e | 59 dd 2a 2e bf c4 30 ee 1c 21 a4 1f 05 1c f1 ca | e9 cb 39 c8 e2 40 b2 4d 3b a4 95 5b bf 34 0a 3a | df 80 38 7b 51 86 8c a1 11 39 77 8b d5 ae 50 8f | 99 a1 0a e0 bd 3f 7e c9 79 53 04 c1 e3 df cd 70 | 3e 66 c4 67 c1 e4 73 dd bf 1e f4 11 d7 82 43 b1 | 95 c0 67 ed 01 5f 2c b1 0e a8 b7 86 5e a3 ac 38 | d4 97 88 0a b4 b8 8a a9 70 ef 6a 55 78 38 3e 25 | 5b 0e aa fc 57 7c 94 10 43 b3 19 df 16 34 03 61 | 29 00 00 24 13 0a a1 55 e1 40 3c ca 6b 43 9b 8e | d8 49 6d 03 c7 22 e9 d4 6e 01 14 b8 c6 77 b4 61 | 5d 3f ba 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b c5 c3 84 79 53 11 43 e1 cc 1f 7c | 14 ba b0 c9 4b e7 b4 37 00 00 00 1c 00 00 40 05 | 57 c6 83 93 fa f0 1e 53 76 4a bb b4 87 ee 28 a4 | 6c 5a d1 2c | state #536 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb38402bf10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb38400a290 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400a290 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #536 | libevent_malloc: new ptr-libevent@0x7fb35005ec80 size 128 | #536 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.298176 | resume sending helper answer for #536 suppresed complete_v2_state_transition() and stole MD | #536 spent 0.314 milliseconds in resume sending helper answer | stop processing: state #536 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb340053a30 | processing resume sending helper answer for #529 | start processing: state #529 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 19 replies to request ID 529 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #529 | **emit ISAKMP Message: | initiator cookie: | 8b 51 05 ec d8 42 82 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-32 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x aa a4 71 e3 1a bf 5d 84 a4 49 8c cf 55 02 33 3c | ikev2 g^x 04 56 09 91 2c bc e4 1c 1e 8d 8e 04 d2 0a d7 b1 | ikev2 g^x 4a e5 e2 44 95 fe 32 42 a2 71 e3 f6 19 58 19 98 | ikev2 g^x 30 f7 7f 68 aa c8 8b 7b ee 46 c1 c6 c6 c6 f3 ef | ikev2 g^x 02 5b 4f e7 12 67 eb f6 96 9c 29 fe 91 93 f1 4f | ikev2 g^x 4a f4 35 c4 14 66 ea 0c db 0c 7f 2e 10 1c 74 5a | ikev2 g^x 14 56 cb 14 d2 be a1 5c fd 36 cb 04 24 8d de d8 | ikev2 g^x e8 38 48 30 9f 46 ce 30 5d cf 53 56 66 09 d2 14 | ikev2 g^x 14 e3 57 c9 a7 57 bf b7 68 e9 aa 2c d3 32 00 e1 | ikev2 g^x b3 c3 fe 68 f4 77 9f 22 ca 38 99 8f 8b f5 3c d3 | ikev2 g^x 43 f0 50 78 d5 57 6c e0 ba 1d 44 37 ac eb 5f ef | ikev2 g^x 6f 86 24 97 13 93 3a 5c 56 88 22 5e 44 fb d8 e1 | ikev2 g^x f7 e8 74 39 ab 08 db ec 08 ca 20 92 ff 5e 35 61 | ikev2 g^x 70 6f 87 e4 a0 cf fa 53 19 69 e6 fc 3d 79 2a 13 | ikev2 g^x 8b 67 ba f1 46 d1 18 14 cc d6 68 98 b6 0e 15 62 | ikev2 g^x 5c 3f 7b 18 fe dd 29 0e 45 5d fb 88 02 b0 e5 a2 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 96 36 53 bc 54 1a 72 c2 86 d5 9a b3 ea b4 b7 ce | IKEv2 nonce 95 13 e3 2c 2f ef 60 48 e2 75 18 75 80 77 ca 40 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8b 51 05 ec d8 42 82 df | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 20 | natd_hash: port= 01 f4 | natd_hash: hash= 14 7d 2e c4 18 c7 50 d0 0c 64 64 44 cf 7c 14 d7 | natd_hash: hash= db 29 be a1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 14 7d 2e c4 18 c7 50 d0 0c 64 64 44 cf 7c 14 d7 | Notify data db 29 be a1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8b 51 05 ec d8 42 82 df | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= df 08 4e 94 1c 1e 0f 0d 40 f7 6e 18 f6 44 35 e2 | natd_hash: hash= c7 6d 58 d5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data df 08 4e 94 1c 1e 0f 0d 40 f7 6e 18 f6 44 35 e2 | Notify data c7 6d 58 d5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #529 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #529 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #529 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #529: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #529 to 4294967295 after switching state | Message ID: IKE #529 skipping update_recv as MD is fake | Message ID: sent #529 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-32" #529: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.32:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #529) | 8b 51 05 ec d8 42 82 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa a4 71 e3 1a bf 5d 84 a4 49 8c cf 55 02 33 3c | 04 56 09 91 2c bc e4 1c 1e 8d 8e 04 d2 0a d7 b1 | 4a e5 e2 44 95 fe 32 42 a2 71 e3 f6 19 58 19 98 | 30 f7 7f 68 aa c8 8b 7b ee 46 c1 c6 c6 c6 f3 ef | 02 5b 4f e7 12 67 eb f6 96 9c 29 fe 91 93 f1 4f | 4a f4 35 c4 14 66 ea 0c db 0c 7f 2e 10 1c 74 5a | 14 56 cb 14 d2 be a1 5c fd 36 cb 04 24 8d de d8 | e8 38 48 30 9f 46 ce 30 5d cf 53 56 66 09 d2 14 | 14 e3 57 c9 a7 57 bf b7 68 e9 aa 2c d3 32 00 e1 | b3 c3 fe 68 f4 77 9f 22 ca 38 99 8f 8b f5 3c d3 | 43 f0 50 78 d5 57 6c e0 ba 1d 44 37 ac eb 5f ef | 6f 86 24 97 13 93 3a 5c 56 88 22 5e 44 fb d8 e1 | f7 e8 74 39 ab 08 db ec 08 ca 20 92 ff 5e 35 61 | 70 6f 87 e4 a0 cf fa 53 19 69 e6 fc 3d 79 2a 13 | 8b 67 ba f1 46 d1 18 14 cc d6 68 98 b6 0e 15 62 | 5c 3f 7b 18 fe dd 29 0e 45 5d fb 88 02 b0 e5 a2 | 29 00 00 24 96 36 53 bc 54 1a 72 c2 86 d5 9a b3 | ea b4 b7 ce 95 13 e3 2c 2f ef 60 48 e2 75 18 75 | 80 77 ca 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 7d 2e c4 18 c7 50 d0 0c 64 64 44 | cf 7c 14 d7 db 29 be a1 00 00 00 1c 00 00 40 05 | df 08 4e 94 1c 1e 0f 0d 40 f7 6e 18 f6 44 35 e2 | c7 6d 58 d5 | state #529 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380011f30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46b12c40 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34001a1e0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #529 | libevent_malloc: new ptr-libevent@0x7fb340053a30 size 128 | #529 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.298476 | resume sending helper answer for #529 suppresed complete_v2_state_transition() and stole MD | #529 spent 0.279 milliseconds in resume sending helper answer | stop processing: state #529 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb368052a70 | processing resume sending helper answer for #557 | start processing: state #557 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 557 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #557 | **emit ISAKMP Message: | initiator cookie: | 2d 38 86 43 43 f3 e1 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-37 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d8 b5 d1 8d 5e 9a 16 4c 4d d9 8d af 2f 02 f9 49 | ikev2 g^x 64 5f 56 86 14 f0 4f 6e 1f 70 fb 5c 5c 41 82 1d | ikev2 g^x 33 6e 56 08 67 54 02 75 6c f9 e1 34 59 7c 6f b1 | ikev2 g^x bb 1f 4d ed 4a a2 b7 f7 4f c1 0c 46 20 0e 28 4a | ikev2 g^x cd 21 92 73 5f 5d 35 8c fe 58 86 0b 7f 07 97 23 | ikev2 g^x d1 0f ec 97 a5 2c 87 13 2d 94 36 17 e9 57 93 bf | ikev2 g^x c4 c1 bd 13 03 ee ba ab 1a a7 44 ce 03 75 29 fe | ikev2 g^x b6 82 6b e3 c2 1c 1a 53 06 87 f8 13 f9 a2 78 a2 | ikev2 g^x 51 a0 ba f9 b0 6c 0b 05 eb fe c7 b6 32 0e 48 84 | ikev2 g^x 7d 7a c1 bd 77 ee ba 29 ff de 64 d5 ef 12 c1 40 | ikev2 g^x d0 a1 05 e1 31 4a 93 c2 70 e2 49 cf 02 83 53 ca | ikev2 g^x 2e cb f9 e3 78 24 ca 8e c8 8c f2 22 dc 20 cb 27 | ikev2 g^x 4a df 51 8a 3b da 00 bb b0 0b a6 42 b8 69 cf 0e | ikev2 g^x a8 cf d0 73 3e bb 78 2d bc 6c 41 8d a7 b8 30 76 | ikev2 g^x 9c 94 b8 c4 16 94 63 de 81 f2 b2 a7 e1 0e 52 f4 | ikev2 g^x ea 2d 43 a0 57 4b af 2d d0 29 08 d0 cb 35 56 38 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce a6 c9 1c ff c9 58 73 10 78 ba f6 c6 7f c6 b2 cd | IKEv2 nonce 72 d9 cc be ea 32 4d 34 a4 2f 7e bf 63 21 24 e1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 2d 38 86 43 43 f3 e1 14 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 25 | natd_hash: port= 01 f4 | natd_hash: hash= 2d 8f df 68 5a a5 1c ad e8 83 e1 98 63 b5 56 36 | natd_hash: hash= 55 d8 0c 2e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 2d 8f df 68 5a a5 1c ad e8 83 e1 98 63 b5 56 36 | Notify data 55 d8 0c 2e | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 2d 38 86 43 43 f3 e1 14 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d5 54 40 ea d7 2a 41 c5 f7 56 0a 7d 70 86 31 1b | natd_hash: hash= a6 62 9a d1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d5 54 40 ea d7 2a 41 c5 f7 56 0a 7d 70 86 31 1b | Notify data a6 62 9a d1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #557 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #557 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #557 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #557: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #557 to 4294967295 after switching state | Message ID: IKE #557 skipping update_recv as MD is fake | Message ID: sent #557 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-37" #557: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.37:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #557) | 2d 38 86 43 43 f3 e1 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 b5 d1 8d 5e 9a 16 4c 4d d9 8d af 2f 02 f9 49 | 64 5f 56 86 14 f0 4f 6e 1f 70 fb 5c 5c 41 82 1d | 33 6e 56 08 67 54 02 75 6c f9 e1 34 59 7c 6f b1 | bb 1f 4d ed 4a a2 b7 f7 4f c1 0c 46 20 0e 28 4a | cd 21 92 73 5f 5d 35 8c fe 58 86 0b 7f 07 97 23 | d1 0f ec 97 a5 2c 87 13 2d 94 36 17 e9 57 93 bf | c4 c1 bd 13 03 ee ba ab 1a a7 44 ce 03 75 29 fe | b6 82 6b e3 c2 1c 1a 53 06 87 f8 13 f9 a2 78 a2 | 51 a0 ba f9 b0 6c 0b 05 eb fe c7 b6 32 0e 48 84 | 7d 7a c1 bd 77 ee ba 29 ff de 64 d5 ef 12 c1 40 | d0 a1 05 e1 31 4a 93 c2 70 e2 49 cf 02 83 53 ca | 2e cb f9 e3 78 24 ca 8e c8 8c f2 22 dc 20 cb 27 | 4a df 51 8a 3b da 00 bb b0 0b a6 42 b8 69 cf 0e | a8 cf d0 73 3e bb 78 2d bc 6c 41 8d a7 b8 30 76 | 9c 94 b8 c4 16 94 63 de 81 f2 b2 a7 e1 0e 52 f4 | ea 2d 43 a0 57 4b af 2d d0 29 08 d0 cb 35 56 38 | 29 00 00 24 a6 c9 1c ff c9 58 73 10 78 ba f6 c6 | 7f c6 b2 cd 72 d9 cc be ea 32 4d 34 a4 2f 7e bf | 63 21 24 e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 8f df 68 5a a5 1c ad e8 83 e1 98 | 63 b5 56 36 55 d8 0c 2e 00 00 00 1c 00 00 40 05 | d5 54 40 ea d7 2a 41 c5 f7 56 0a 7d 70 86 31 1b | a6 62 9a d1 | state #557 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36404b5a0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d469f8cc0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #557 | libevent_malloc: new ptr-libevent@0x7fb368052a70 size 128 | #557 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.298771 | resume sending helper answer for #557 suppresed complete_v2_state_transition() and stole MD | #557 spent 0.276 milliseconds in resume sending helper answer | stop processing: state #557 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3800598f0 | processing resume sending helper answer for #531 | start processing: state #531 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 11 replies to request ID 531 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #531 | **emit ISAKMP Message: | initiator cookie: | 46 30 94 4a d2 7d f5 c4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-92 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 24 38 ea 3c 3d 5a 42 86 1f 4e 31 dc 26 b4 cb f3 | ikev2 g^x 28 85 08 ca 2d 95 b0 12 2a fa 18 5b b7 00 b1 7c | ikev2 g^x bd ff a5 7b 29 c2 33 47 c9 ef 86 d0 13 ba b4 66 | ikev2 g^x 86 47 b1 11 77 85 ec f5 b7 bc b1 c7 50 d2 1f ca | ikev2 g^x 94 86 67 69 97 69 09 d4 54 be 95 8a aa ec f2 d3 | ikev2 g^x 79 b9 f0 64 6c cf a3 3a 0e 4f 10 b3 95 d7 ac 93 | ikev2 g^x 35 e1 6d cf bd f0 36 31 3d 33 d3 c9 48 4d fe d0 | ikev2 g^x f1 f6 04 1f ec c5 c6 c2 db 2b ec 57 12 79 39 c3 | ikev2 g^x 5f ad df 37 fa 08 25 42 22 56 51 36 31 ec 60 0f | ikev2 g^x ac 91 d0 f7 eb 31 60 3a a8 71 8a b0 59 db 4b f5 | ikev2 g^x 2d 2b f9 1e 60 7c 79 92 10 60 1f 4d 62 ac de 57 | ikev2 g^x e1 25 69 68 c7 c9 81 de 74 38 95 72 70 59 28 ad | ikev2 g^x 3f 83 40 72 25 b0 05 47 0c a8 76 76 31 4f d7 5e | ikev2 g^x 97 3f 8e 62 12 fb f1 8b 94 b6 25 12 87 f7 a7 1d | ikev2 g^x 64 44 48 fb f6 a4 1d b5 63 08 35 5b 60 e5 2f 9a | ikev2 g^x 58 b0 a6 c2 fe 47 0b c1 2e a5 79 86 6f de 86 14 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 59 be 45 ef 88 7c 4d 7b b5 b9 64 5e f3 45 90 92 | IKEv2 nonce 62 65 99 56 86 22 51 1b b2 80 99 5a ab 91 ed e4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 46 30 94 4a d2 7d f5 c4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 5c | natd_hash: port= 01 f4 | natd_hash: hash= 1b 80 99 5e ac e8 cb fd 27 87 08 89 9e ad 1b cc | natd_hash: hash= fa 6f da 1b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1b 80 99 5e ac e8 cb fd 27 87 08 89 9e ad 1b cc | Notify data fa 6f da 1b | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 46 30 94 4a d2 7d f5 c4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c1 9e 01 05 8a 2a ce 70 93 29 c8 42 f8 2d b1 4a | natd_hash: hash= bb 93 ae c6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c1 9e 01 05 8a 2a ce 70 93 29 c8 42 f8 2d b1 4a | Notify data bb 93 ae c6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #531 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #531 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #531 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #531: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #531 to 4294967295 after switching state | Message ID: IKE #531 skipping update_recv as MD is fake | Message ID: sent #531 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-92" #531: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.92:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #531) | 46 30 94 4a d2 7d f5 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 38 ea 3c 3d 5a 42 86 1f 4e 31 dc 26 b4 cb f3 | 28 85 08 ca 2d 95 b0 12 2a fa 18 5b b7 00 b1 7c | bd ff a5 7b 29 c2 33 47 c9 ef 86 d0 13 ba b4 66 | 86 47 b1 11 77 85 ec f5 b7 bc b1 c7 50 d2 1f ca | 94 86 67 69 97 69 09 d4 54 be 95 8a aa ec f2 d3 | 79 b9 f0 64 6c cf a3 3a 0e 4f 10 b3 95 d7 ac 93 | 35 e1 6d cf bd f0 36 31 3d 33 d3 c9 48 4d fe d0 | f1 f6 04 1f ec c5 c6 c2 db 2b ec 57 12 79 39 c3 | 5f ad df 37 fa 08 25 42 22 56 51 36 31 ec 60 0f | ac 91 d0 f7 eb 31 60 3a a8 71 8a b0 59 db 4b f5 | 2d 2b f9 1e 60 7c 79 92 10 60 1f 4d 62 ac de 57 | e1 25 69 68 c7 c9 81 de 74 38 95 72 70 59 28 ad | 3f 83 40 72 25 b0 05 47 0c a8 76 76 31 4f d7 5e | 97 3f 8e 62 12 fb f1 8b 94 b6 25 12 87 f7 a7 1d | 64 44 48 fb f6 a4 1d b5 63 08 35 5b 60 e5 2f 9a | 58 b0 a6 c2 fe 47 0b c1 2e a5 79 86 6f de 86 14 | 29 00 00 24 59 be 45 ef 88 7c 4d 7b b5 b9 64 5e | f3 45 90 92 62 65 99 56 86 22 51 1b b2 80 99 5a | ab 91 ed e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 80 99 5e ac e8 cb fd 27 87 08 89 | 9e ad 1b cc fa 6f da 1b 00 00 00 1c 00 00 40 05 | c1 9e 01 05 8a 2a ce 70 93 29 c8 42 f8 2d b1 4a | bb 93 ae c6 | state #531 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c02ed30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb36c01d710 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c01d710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #531 | libevent_malloc: new ptr-libevent@0x7fb3800598f0 size 128 | #531 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.299138 | resume sending helper answer for #531 suppresed complete_v2_state_transition() and stole MD | #531 spent 0.345 milliseconds in resume sending helper answer | stop processing: state #531 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb360053fb0 | processing resume sending helper answer for #530 | start processing: state #530 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 9 replies to request ID 530 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #530 | **emit ISAKMP Message: | initiator cookie: | 92 e6 33 30 14 4d d6 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-134 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 50 f1 30 3a 3b 28 18 17 30 1c 4a 89 10 b7 0d c3 | ikev2 g^x 7c 77 f2 13 78 da 63 f4 44 e1 01 dc 1f 4a 94 bf | ikev2 g^x c2 80 6b 59 ab e9 1c 0b d6 b1 eb 32 26 25 2f 92 | ikev2 g^x 24 9c c4 2a f3 1a d1 be fc b2 3a dd e3 83 df 5f | ikev2 g^x 41 0b ef 7f cf dc 66 d3 2d 40 e2 f2 bf 97 f5 31 | ikev2 g^x 9d c3 63 d9 ae d6 1d 0e a0 ea 26 58 86 c3 be d7 | ikev2 g^x f8 23 f3 04 54 70 65 bb 60 ca 54 65 9a 9c 89 dd | ikev2 g^x 2b 3b 6f 52 f6 af 1c e7 fc fa 5c 10 bf 1c e0 8e | ikev2 g^x 98 9f 5b b8 7e d8 4b e3 4d b8 53 23 0d 4f e9 5a | ikev2 g^x 14 9b 09 2a bf c5 d2 2f 85 7d 28 ac 15 60 25 e2 | ikev2 g^x 2f ad ee 60 6b dd cf 9c 48 62 b3 c3 75 25 11 09 | ikev2 g^x 05 3c 28 83 a6 04 85 69 35 a5 1f 5d 22 29 dc b1 | ikev2 g^x 9a 6b d8 6c e7 80 14 0f 8c 50 7a ac f0 96 90 6a | ikev2 g^x b3 8b e9 96 09 75 da bc 0c 69 50 ec 31 84 cc 57 | ikev2 g^x 4b 12 f9 f4 53 c3 5b 32 43 24 09 27 86 a6 40 9c | ikev2 g^x ba 4c ed 2c 66 0e 26 00 3a d7 7f e7 bb e8 f6 4f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 56 d6 30 4a 9e 35 4a d9 63 c1 ed ae ff d3 7c 9d | IKEv2 nonce 97 39 2d 62 1c 2b 5e d3 ab 26 78 e3 76 c0 40 4a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 92 e6 33 30 14 4d d6 a1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 86 | natd_hash: port= 01 f4 | natd_hash: hash= 23 68 96 99 78 c7 b3 b1 f0 d0 44 83 c6 69 a0 85 | natd_hash: hash= 3a 91 92 b2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 23 68 96 99 78 c7 b3 b1 f0 d0 44 83 c6 69 a0 85 | Notify data 3a 91 92 b2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 92 e6 33 30 14 4d d6 a1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d6 32 b1 7b 23 65 42 ae 2b 55 2e 89 2e ab cb 67 | natd_hash: hash= bf 37 77 de | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d6 32 b1 7b 23 65 42 ae 2b 55 2e 89 2e ab cb 67 | Notify data bf 37 77 de | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #530 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #530 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #530 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #530: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #530 to 4294967295 after switching state | Message ID: IKE #530 skipping update_recv as MD is fake | Message ID: sent #530 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-134" #530: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.134:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #530) | 92 e6 33 30 14 4d d6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 f1 30 3a 3b 28 18 17 30 1c 4a 89 10 b7 0d c3 | 7c 77 f2 13 78 da 63 f4 44 e1 01 dc 1f 4a 94 bf | c2 80 6b 59 ab e9 1c 0b d6 b1 eb 32 26 25 2f 92 | 24 9c c4 2a f3 1a d1 be fc b2 3a dd e3 83 df 5f | 41 0b ef 7f cf dc 66 d3 2d 40 e2 f2 bf 97 f5 31 | 9d c3 63 d9 ae d6 1d 0e a0 ea 26 58 86 c3 be d7 | f8 23 f3 04 54 70 65 bb 60 ca 54 65 9a 9c 89 dd | 2b 3b 6f 52 f6 af 1c e7 fc fa 5c 10 bf 1c e0 8e | 98 9f 5b b8 7e d8 4b e3 4d b8 53 23 0d 4f e9 5a | 14 9b 09 2a bf c5 d2 2f 85 7d 28 ac 15 60 25 e2 | 2f ad ee 60 6b dd cf 9c 48 62 b3 c3 75 25 11 09 | 05 3c 28 83 a6 04 85 69 35 a5 1f 5d 22 29 dc b1 | 9a 6b d8 6c e7 80 14 0f 8c 50 7a ac f0 96 90 6a | b3 8b e9 96 09 75 da bc 0c 69 50 ec 31 84 cc 57 | 4b 12 f9 f4 53 c3 5b 32 43 24 09 27 86 a6 40 9c | ba 4c ed 2c 66 0e 26 00 3a d7 7f e7 bb e8 f6 4f | 29 00 00 24 56 d6 30 4a 9e 35 4a d9 63 c1 ed ae | ff d3 7c 9d 97 39 2d 62 1c 2b 5e d3 ab 26 78 e3 | 76 c0 40 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 68 96 99 78 c7 b3 b1 f0 d0 44 83 | c6 69 a0 85 3a 91 92 b2 00 00 00 1c 00 00 40 05 | d6 32 b1 7b 23 65 42 ae 2b 55 2e 89 2e ab cb 67 | bf 37 77 de | state #530 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb35000cf80 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb378012890 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36004b8a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #530 | libevent_malloc: new ptr-libevent@0x7fb360053fb0 size 128 | #530 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.299441 | resume sending helper answer for #530 suppresed complete_v2_state_transition() and stole MD | #530 spent 0.279 milliseconds in resume sending helper answer | stop processing: state #530 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37803b0b0 | processing resume sending helper answer for #558 | start processing: state #558 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 558 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #558 | **emit ISAKMP Message: | initiator cookie: | a0 bf 59 d3 80 3d 9d 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-9 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 3e 0b 86 6c 08 67 cc 4b bc c3 39 13 37 f4 32 e7 | ikev2 g^x ad d1 3b 50 ca a5 a0 c9 48 a7 c6 40 28 8a ce 88 | ikev2 g^x 48 9a aa f7 90 71 74 ed bc 28 4c d4 56 d7 df 22 | ikev2 g^x 4f 3a d6 3b 4e 8c b0 b3 d6 6a 56 04 3b e0 40 63 | ikev2 g^x 8b 49 82 3f 73 5a 7c fa a1 c4 0c d8 1e 26 25 61 | ikev2 g^x 7f c0 52 f8 2f 3c 28 85 6c 37 5d c8 aa 97 0a 05 | ikev2 g^x 31 61 41 82 78 5c 29 78 03 4d 4e ec d7 92 6b 15 | ikev2 g^x 11 ed d4 89 17 37 84 77 86 0f 5b 00 ae 1d 38 19 | ikev2 g^x 0d ac 0c 19 d4 42 43 c3 c7 86 33 36 3d 13 82 f5 | ikev2 g^x 92 4c 46 6b 6b 92 f0 58 2e 94 0d 8c d2 74 6a 33 | ikev2 g^x f6 10 0d 35 6b 00 74 18 19 fe b3 bd 3b 01 68 c8 | ikev2 g^x 55 16 d5 ec 93 02 71 33 c5 83 15 91 47 19 08 ae | ikev2 g^x d5 86 b5 c3 61 af 99 0a ea 43 2b 44 f9 af ac ea | ikev2 g^x 2c 5e 25 7a e2 4b 89 ff 8e 3b 15 87 08 63 19 5e | ikev2 g^x 81 14 9b c2 be b1 4a a7 00 bb d5 e7 f7 c3 ed f1 | ikev2 g^x 6a 63 70 39 8b 8e 47 62 eb 92 4d 42 f6 a8 77 a5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 07 63 d1 5f 7b 4c 62 77 51 cf 3a c4 f3 0f f8 72 | IKEv2 nonce 58 27 a5 92 6f 1a 94 2c 36 bd c3 e4 e2 d6 9e 5a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a0 bf 59 d3 80 3d 9d 02 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 09 | natd_hash: port= 01 f4 | natd_hash: hash= db 51 b0 40 da 74 9a 4d f5 0e 2f 49 38 da 65 ba | natd_hash: hash= 56 04 b0 54 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data db 51 b0 40 da 74 9a 4d f5 0e 2f 49 38 da 65 ba | Notify data 56 04 b0 54 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a0 bf 59 d3 80 3d 9d 02 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 8b 38 7f 8a 89 4d 10 70 34 f4 f7 39 75 12 38 2e | natd_hash: hash= a0 bb 61 3b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 8b 38 7f 8a 89 4d 10 70 34 f4 f7 39 75 12 38 2e | Notify data a0 bb 61 3b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #558 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #558 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #558 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #558: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #558 to 4294967295 after switching state | Message ID: IKE #558 skipping update_recv as MD is fake | Message ID: sent #558 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-9" #558: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.9:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #558) | a0 bf 59 d3 80 3d 9d 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 0b 86 6c 08 67 cc 4b bc c3 39 13 37 f4 32 e7 | ad d1 3b 50 ca a5 a0 c9 48 a7 c6 40 28 8a ce 88 | 48 9a aa f7 90 71 74 ed bc 28 4c d4 56 d7 df 22 | 4f 3a d6 3b 4e 8c b0 b3 d6 6a 56 04 3b e0 40 63 | 8b 49 82 3f 73 5a 7c fa a1 c4 0c d8 1e 26 25 61 | 7f c0 52 f8 2f 3c 28 85 6c 37 5d c8 aa 97 0a 05 | 31 61 41 82 78 5c 29 78 03 4d 4e ec d7 92 6b 15 | 11 ed d4 89 17 37 84 77 86 0f 5b 00 ae 1d 38 19 | 0d ac 0c 19 d4 42 43 c3 c7 86 33 36 3d 13 82 f5 | 92 4c 46 6b 6b 92 f0 58 2e 94 0d 8c d2 74 6a 33 | f6 10 0d 35 6b 00 74 18 19 fe b3 bd 3b 01 68 c8 | 55 16 d5 ec 93 02 71 33 c5 83 15 91 47 19 08 ae | d5 86 b5 c3 61 af 99 0a ea 43 2b 44 f9 af ac ea | 2c 5e 25 7a e2 4b 89 ff 8e 3b 15 87 08 63 19 5e | 81 14 9b c2 be b1 4a a7 00 bb d5 e7 f7 c3 ed f1 | 6a 63 70 39 8b 8e 47 62 eb 92 4d 42 f6 a8 77 a5 | 29 00 00 24 07 63 d1 5f 7b 4c 62 77 51 cf 3a c4 | f3 0f f8 72 58 27 a5 92 6f 1a 94 2c 36 bd c3 e4 | e2 d6 9e 5a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 51 b0 40 da 74 9a 4d f5 0e 2f 49 | 38 da 65 ba 56 04 b0 54 00 00 00 1c 00 00 40 05 | 8b 38 7f 8a 89 4d 10 70 34 f4 f7 39 75 12 38 2e | a0 bb 61 3b | state #558 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c03f170 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a7e490 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378018100 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #558 | libevent_malloc: new ptr-libevent@0x7fb37803b0b0 size 128 | #558 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.299756 | resume sending helper answer for #558 suppresed complete_v2_state_transition() and stole MD | #558 spent 0.295 milliseconds in resume sending helper answer | stop processing: state #558 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb358044d90 | processing resume sending helper answer for #552 | start processing: state #552 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 552 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #552 | **emit ISAKMP Message: | initiator cookie: | ed eb 93 f8 7e 60 de d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-10 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 8b cb f1 c5 c9 33 2a 34 0e d1 85 1e 48 7b 2b 08 | ikev2 g^x 83 b8 ce 5c a9 55 37 f8 cf f4 8e c5 bc 03 8b a4 | ikev2 g^x ae 96 a2 99 0b 56 12 df 0f 7d da 8a 34 b4 5f 83 | ikev2 g^x 09 a9 33 3c c6 3d 79 dc c7 d3 2a 27 cf 87 82 2e | ikev2 g^x be 41 d5 b9 12 08 ab ba 5d cd 0f e9 8e 49 e8 11 | ikev2 g^x 80 d1 8e 63 8f 28 10 90 ba d3 f9 e8 1d 55 c1 f8 | ikev2 g^x e8 37 30 e5 eb 01 66 f8 b8 97 81 22 9f a7 c1 69 | ikev2 g^x d5 16 ee ab b5 f8 e1 be 84 8c fb 01 eb e4 87 59 | ikev2 g^x 7d 75 49 01 0a 1b 9e a9 46 55 ad d1 ba 32 2e a9 | ikev2 g^x 77 b7 a4 2c bc 42 01 fe 0e fb fb fb bb eb a9 a8 | ikev2 g^x 3e f3 4b e2 8b f1 54 95 68 4b 2a 95 25 78 7a 77 | ikev2 g^x 00 70 42 dc fd 53 48 e3 79 e3 2b ca 77 e5 77 0d | ikev2 g^x e6 9d ff 3e f8 da 34 38 ce 09 d2 79 7e 81 3b 25 | ikev2 g^x 2d 6c d8 d3 b0 67 79 e6 62 d7 c5 cd a3 5d 0d a2 | ikev2 g^x eb 67 42 ca ca d0 84 ca 28 62 c9 94 e7 3b 42 83 | ikev2 g^x 2a 29 90 2e 9c bd e7 c5 5a db e4 f9 d0 a5 4d f5 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e9 97 93 9c 1c ef 16 73 1b 7a 47 b3 b5 28 72 23 | IKEv2 nonce b0 2e 07 f1 0f 02 16 b9 14 bf 9e a1 f9 3f 2a 71 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ed eb 93 f8 7e 60 de d1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0a | natd_hash: port= 01 f4 | natd_hash: hash= 06 4f 42 bf 1d 63 d2 01 e4 5f 1c 60 a2 c9 01 6c | natd_hash: hash= df cd 78 4f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 06 4f 42 bf 1d 63 d2 01 e4 5f 1c 60 a2 c9 01 6c | Notify data df cd 78 4f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= ed eb 93 f8 7e 60 de d1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d8 d7 5c 38 cf 5f 73 a5 21 81 fd 7c d5 fb 18 da | natd_hash: hash= 9b e7 4c d5 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d8 d7 5c 38 cf 5f 73 a5 21 81 fd 7c d5 fb 18 da | Notify data 9b e7 4c d5 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #552 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #552 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #552 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #552: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #552 to 4294967295 after switching state | Message ID: IKE #552 skipping update_recv as MD is fake | Message ID: sent #552 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-10" #552: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.10:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #552) | ed eb 93 f8 7e 60 de d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b cb f1 c5 c9 33 2a 34 0e d1 85 1e 48 7b 2b 08 | 83 b8 ce 5c a9 55 37 f8 cf f4 8e c5 bc 03 8b a4 | ae 96 a2 99 0b 56 12 df 0f 7d da 8a 34 b4 5f 83 | 09 a9 33 3c c6 3d 79 dc c7 d3 2a 27 cf 87 82 2e | be 41 d5 b9 12 08 ab ba 5d cd 0f e9 8e 49 e8 11 | 80 d1 8e 63 8f 28 10 90 ba d3 f9 e8 1d 55 c1 f8 | e8 37 30 e5 eb 01 66 f8 b8 97 81 22 9f a7 c1 69 | d5 16 ee ab b5 f8 e1 be 84 8c fb 01 eb e4 87 59 | 7d 75 49 01 0a 1b 9e a9 46 55 ad d1 ba 32 2e a9 | 77 b7 a4 2c bc 42 01 fe 0e fb fb fb bb eb a9 a8 | 3e f3 4b e2 8b f1 54 95 68 4b 2a 95 25 78 7a 77 | 00 70 42 dc fd 53 48 e3 79 e3 2b ca 77 e5 77 0d | e6 9d ff 3e f8 da 34 38 ce 09 d2 79 7e 81 3b 25 | 2d 6c d8 d3 b0 67 79 e6 62 d7 c5 cd a3 5d 0d a2 | eb 67 42 ca ca d0 84 ca 28 62 c9 94 e7 3b 42 83 | 2a 29 90 2e 9c bd e7 c5 5a db e4 f9 d0 a5 4d f5 | 29 00 00 24 e9 97 93 9c 1c ef 16 73 1b 7a 47 b3 | b5 28 72 23 b0 2e 07 f1 0f 02 16 b9 14 bf 9e a1 | f9 3f 2a 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 4f 42 bf 1d 63 d2 01 e4 5f 1c 60 | a2 c9 01 6c df cd 78 4f 00 00 00 1c 00 00 40 05 | d8 d7 5c 38 cf 5f 73 a5 21 81 fd 7c d5 fb 18 da | 9b e7 4c d5 | state #552 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a903c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358023aa0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #552 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 | #552 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.300162 | resume sending helper answer for #552 suppresed complete_v2_state_transition() and stole MD | #552 spent 0.382 milliseconds in resume sending helper answer | stop processing: state #552 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c061940 | processing resume sending helper answer for #542 | start processing: state #542 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 3 replies to request ID 542 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #542 | **emit ISAKMP Message: | initiator cookie: | 19 ef 59 5e 62 c0 95 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-3 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 2c 79 27 54 07 c6 5d 65 e0 c6 e9 51 3c d2 f7 23 | ikev2 g^x 14 31 ac 33 ad e0 98 39 13 b2 d5 2e 21 16 ef fd | ikev2 g^x fb 26 fb b6 5b 85 f7 f1 d6 8c 2f ce 82 67 51 76 | ikev2 g^x fa d3 54 14 d5 1a 64 a6 27 51 68 bf da d2 0e 9f | ikev2 g^x ba 1d 58 01 63 c6 05 46 a8 1e 48 8c 0f 1a 50 9f | ikev2 g^x c7 02 55 57 2f b0 4c 8c ba 2a 6e 11 20 86 c9 eb | ikev2 g^x f4 2f ad d5 ad 8d b4 c6 8d 1b 09 90 d8 aa fd 33 | ikev2 g^x d8 fc 91 0e 8d 34 75 59 76 d8 c1 fb b1 99 78 79 | ikev2 g^x 99 6e 5c 3f d3 a2 5f 67 1a 09 7c 1f 03 50 f4 93 | ikev2 g^x c2 74 d9 b7 7a 58 a0 62 d2 8e 30 4b 2f b5 4e 54 | ikev2 g^x 8a 34 49 eb c4 db 10 33 ba 37 57 98 9c 56 d1 4f | ikev2 g^x 0c 29 1a f8 25 5e 60 5d 0b 14 86 5d 6d 65 3a dc | ikev2 g^x 8a 6b ce 2c 5e 34 47 64 fc b5 0d 07 ab 4d e8 74 | ikev2 g^x 6d 78 e0 82 76 08 57 ad 18 73 73 dc 20 30 66 40 | ikev2 g^x 79 b4 11 4a 81 e9 e7 f5 9a 6f b2 79 12 d0 43 c6 | ikev2 g^x 72 27 8c 54 92 d4 21 e5 0d 8d 14 e1 53 dd 12 10 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e8 60 30 77 56 3c f1 25 c1 c6 6e 74 5c 37 ec e4 | IKEv2 nonce ad 07 3f bc d0 27 64 9c 2c 2f 3e f0 a2 51 6d 21 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 19 ef 59 5e 62 c0 95 6e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 03 | natd_hash: port= 01 f4 | natd_hash: hash= c8 21 f8 f2 aa c5 02 f5 b9 e8 1d 48 11 f3 ee 20 | natd_hash: hash= 33 c4 de f9 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c8 21 f8 f2 aa c5 02 f5 b9 e8 1d 48 11 f3 ee 20 | Notify data 33 c4 de f9 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 19 ef 59 5e 62 c0 95 6e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 12 90 d2 d6 c0 e9 64 15 7c cf ef 34 31 76 64 b7 | natd_hash: hash= 85 6e 21 7e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 12 90 d2 d6 c0 e9 64 15 7c cf ef 34 31 76 64 b7 | Notify data 85 6e 21 7e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #542 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #542 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #542 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #542: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #542 to 4294967295 after switching state | Message ID: IKE #542 skipping update_recv as MD is fake | Message ID: sent #542 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-3" #542: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.3:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #542) | 19 ef 59 5e 62 c0 95 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 79 27 54 07 c6 5d 65 e0 c6 e9 51 3c d2 f7 23 | 14 31 ac 33 ad e0 98 39 13 b2 d5 2e 21 16 ef fd | fb 26 fb b6 5b 85 f7 f1 d6 8c 2f ce 82 67 51 76 | fa d3 54 14 d5 1a 64 a6 27 51 68 bf da d2 0e 9f | ba 1d 58 01 63 c6 05 46 a8 1e 48 8c 0f 1a 50 9f | c7 02 55 57 2f b0 4c 8c ba 2a 6e 11 20 86 c9 eb | f4 2f ad d5 ad 8d b4 c6 8d 1b 09 90 d8 aa fd 33 | d8 fc 91 0e 8d 34 75 59 76 d8 c1 fb b1 99 78 79 | 99 6e 5c 3f d3 a2 5f 67 1a 09 7c 1f 03 50 f4 93 | c2 74 d9 b7 7a 58 a0 62 d2 8e 30 4b 2f b5 4e 54 | 8a 34 49 eb c4 db 10 33 ba 37 57 98 9c 56 d1 4f | 0c 29 1a f8 25 5e 60 5d 0b 14 86 5d 6d 65 3a dc | 8a 6b ce 2c 5e 34 47 64 fc b5 0d 07 ab 4d e8 74 | 6d 78 e0 82 76 08 57 ad 18 73 73 dc 20 30 66 40 | 79 b4 11 4a 81 e9 e7 f5 9a 6f b2 79 12 d0 43 c6 | 72 27 8c 54 92 d4 21 e5 0d 8d 14 e1 53 dd 12 10 | 29 00 00 24 e8 60 30 77 56 3c f1 25 c1 c6 6e 74 | 5c 37 ec e4 ad 07 3f bc d0 27 64 9c 2c 2f 3e f0 | a2 51 6d 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 21 f8 f2 aa c5 02 f5 b9 e8 1d 48 | 11 f3 ee 20 33 c4 de f9 00 00 00 1c 00 00 40 05 | 12 90 d2 d6 c0 e9 64 15 7c cf ef 34 31 76 64 b7 | 85 6e 21 7e | state #542 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3880210c0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a60690 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a60690 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #542 | libevent_malloc: new ptr-libevent@0x7fb35c061940 size 128 | #542 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.300464 | resume sending helper answer for #542 suppresed complete_v2_state_transition() and stole MD | #542 spent 0.282 milliseconds in resume sending helper answer | stop processing: state #542 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb338053ff0 | processing resume sending helper answer for #547 | start processing: state #547 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 547 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #547 | **emit ISAKMP Message: | initiator cookie: | 08 a9 69 6a 37 31 fe e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-36 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 70 8f 95 a8 08 4a 05 6c b9 8d 6f 47 8b 04 9a 61 | ikev2 g^x e0 b5 a7 54 d7 f6 b0 b2 80 21 f1 25 51 d7 e7 f1 | ikev2 g^x 65 c9 25 83 1a 4e 78 02 4c 52 52 f0 64 27 3f 26 | ikev2 g^x 0b d2 14 48 53 3f 10 9e f7 fb 83 89 e0 a6 40 c0 | ikev2 g^x ac c1 d7 6a 50 16 4b ff 1f bc c1 ba b9 50 75 ab | ikev2 g^x 97 f9 e1 ea ad 67 25 02 53 4f ab 12 78 7a b1 65 | ikev2 g^x e0 48 35 1e 09 a6 85 b6 4d 5c 49 16 55 30 42 5e | ikev2 g^x b9 f1 50 2c e6 5b 8c 18 8c 57 4a 2f 85 11 d0 01 | ikev2 g^x 37 16 99 1c 9d 24 6d 7b 69 12 eb a9 3b c6 79 88 | ikev2 g^x 71 5a fa 14 26 f9 27 29 b3 23 6c 0a 35 18 d6 92 | ikev2 g^x af 76 48 1f d6 d0 94 16 fe ec 88 6c 8a e8 d2 fa | ikev2 g^x 63 24 d6 a1 72 8d c8 45 fa 71 9c b6 4e 87 9a f2 | ikev2 g^x 3d 51 b0 37 f7 2f 94 b2 eb 33 6a 4b b2 e5 fd 10 | ikev2 g^x 52 ad 99 ac 91 e9 f8 db bf d6 1e e7 93 ff 43 02 | ikev2 g^x 2f 77 1f d8 af 33 b2 2b c2 3e 9a f3 55 7a 63 95 | ikev2 g^x 83 04 91 50 3e b6 71 c0 09 49 63 7e 66 a6 12 8b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce eb 3c 18 5d 0c ff c1 c1 a4 88 c6 c0 90 96 2d a5 | IKEv2 nonce 6a 9d d3 7b bb 7c 2c 4c e3 35 60 33 3d d4 c2 76 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 08 a9 69 6a 37 31 fe e9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 24 | natd_hash: port= 01 f4 | natd_hash: hash= 3e 02 45 88 78 27 f3 6f f8 1b fc da 5a fd 16 4d | natd_hash: hash= 6d 84 19 70 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3e 02 45 88 78 27 f3 6f f8 1b fc da 5a fd 16 4d | Notify data 6d 84 19 70 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 08 a9 69 6a 37 31 fe e9 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9b e7 b7 66 bc 65 25 34 6e 71 75 59 14 69 9b 1b | natd_hash: hash= c0 b2 09 dd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9b e7 b7 66 bc 65 25 34 6e 71 75 59 14 69 9b 1b | Notify data c0 b2 09 dd | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #547 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #547 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #547 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #547: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #547 to 4294967295 after switching state | Message ID: IKE #547 skipping update_recv as MD is fake | Message ID: sent #547 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-36" #547: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.36:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #547) | 08 a9 69 6a 37 31 fe e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 70 8f 95 a8 08 4a 05 6c b9 8d 6f 47 8b 04 9a 61 | e0 b5 a7 54 d7 f6 b0 b2 80 21 f1 25 51 d7 e7 f1 | 65 c9 25 83 1a 4e 78 02 4c 52 52 f0 64 27 3f 26 | 0b d2 14 48 53 3f 10 9e f7 fb 83 89 e0 a6 40 c0 | ac c1 d7 6a 50 16 4b ff 1f bc c1 ba b9 50 75 ab | 97 f9 e1 ea ad 67 25 02 53 4f ab 12 78 7a b1 65 | e0 48 35 1e 09 a6 85 b6 4d 5c 49 16 55 30 42 5e | b9 f1 50 2c e6 5b 8c 18 8c 57 4a 2f 85 11 d0 01 | 37 16 99 1c 9d 24 6d 7b 69 12 eb a9 3b c6 79 88 | 71 5a fa 14 26 f9 27 29 b3 23 6c 0a 35 18 d6 92 | af 76 48 1f d6 d0 94 16 fe ec 88 6c 8a e8 d2 fa | 63 24 d6 a1 72 8d c8 45 fa 71 9c b6 4e 87 9a f2 | 3d 51 b0 37 f7 2f 94 b2 eb 33 6a 4b b2 e5 fd 10 | 52 ad 99 ac 91 e9 f8 db bf d6 1e e7 93 ff 43 02 | 2f 77 1f d8 af 33 b2 2b c2 3e 9a f3 55 7a 63 95 | 83 04 91 50 3e b6 71 c0 09 49 63 7e 66 a6 12 8b | 29 00 00 24 eb 3c 18 5d 0c ff c1 c1 a4 88 c6 c0 | 90 96 2d a5 6a 9d d3 7b bb 7c 2c 4c e3 35 60 33 | 3d d4 c2 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 02 45 88 78 27 f3 6f f8 1b fc da | 5a fd 16 4d 6d 84 19 70 00 00 00 1c 00 00 40 05 | 9b e7 b7 66 bc 65 25 34 6e 71 75 59 14 69 9b 1b | c0 b2 09 dd | state #547 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb384027b30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ac3ec0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #547 | libevent_malloc: new ptr-libevent@0x7fb338053ff0 size 128 | #547 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.300763 | resume sending helper answer for #547 suppresed complete_v2_state_transition() and stole MD | #547 spent 0.277 milliseconds in resume sending helper answer | stop processing: state #547 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3500594c0 | processing resume sending helper answer for #549 | start processing: state #549 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 549 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #549 | **emit ISAKMP Message: | initiator cookie: | a0 bc bf eb 69 ec 7d 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-125 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b6 c9 7a 4d 74 30 97 ab 2b b8 9b 8e 28 56 30 35 | ikev2 g^x c9 29 b4 03 c9 c0 54 36 0e 1e 85 00 be e1 eb b6 | ikev2 g^x 10 56 f7 3e 25 85 4e 54 15 d9 dd 76 f8 a2 ef 75 | ikev2 g^x 06 49 0e 79 92 19 04 73 c4 32 36 8f 38 c3 a0 37 | ikev2 g^x 73 31 32 c7 13 ba 49 63 a9 ff 14 ce 76 c3 ca 6b | ikev2 g^x 44 ac 36 b3 fe 8e 49 b3 f2 07 ba 8e 9d 83 a8 90 | ikev2 g^x 1c bc ba b1 a8 32 ac a1 72 6e a4 55 c6 06 26 4d | ikev2 g^x 59 1f 8c 21 e8 f2 1d 39 aa 21 29 2d 13 d2 62 e1 | ikev2 g^x cd a6 44 f2 be e8 53 3c 05 77 b8 a3 16 49 f8 12 | ikev2 g^x a0 eb 6d c0 e5 00 d6 6c dd 16 9c ab b2 0e 15 2a | ikev2 g^x 11 01 e2 8c ef 25 2e ff f8 e7 c3 fa 43 cc 6c 72 | ikev2 g^x c5 e2 33 98 3b f3 05 50 a7 ad 9d 8e 86 bf 56 f5 | ikev2 g^x 69 e1 73 1e c0 3d 04 45 0d d2 2e 9d 3e db 05 1c | ikev2 g^x 6a c1 c4 8e 83 ca c0 f4 84 01 6b be a7 89 db dc | ikev2 g^x 85 98 0f b5 ba 9a cf 4d 5b 70 a7 a4 7a fa 95 48 | ikev2 g^x b4 59 36 8a 67 a3 46 cb 51 b4 47 97 d0 b4 c8 75 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e6 91 2a 43 d1 aa b6 49 a9 57 9a 19 fc 51 19 e5 | IKEv2 nonce 28 8d 93 b9 12 81 37 cd 42 5d c8 08 2e b2 6c 7a | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a0 bc bf eb 69 ec 7d 60 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7d | natd_hash: port= 01 f4 | natd_hash: hash= 00 e5 9d 22 28 c7 c4 27 97 02 c2 92 36 7a d0 48 | natd_hash: hash= 44 31 1b ea | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 00 e5 9d 22 28 c7 c4 27 97 02 c2 92 36 7a d0 48 | Notify data 44 31 1b ea | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= a0 bc bf eb 69 ec 7d 60 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= ac 08 fb c5 91 b8 80 23 e8 68 88 22 35 dd f9 61 | natd_hash: hash= 84 cd 9d 18 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ac 08 fb c5 91 b8 80 23 e8 68 88 22 35 dd f9 61 | Notify data 84 cd 9d 18 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #549 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #549 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #549 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #549: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #549 to 4294967295 after switching state | Message ID: IKE #549 skipping update_recv as MD is fake | Message ID: sent #549 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-125" #549: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.125:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #549) | a0 bc bf eb 69 ec 7d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 c9 7a 4d 74 30 97 ab 2b b8 9b 8e 28 56 30 35 | c9 29 b4 03 c9 c0 54 36 0e 1e 85 00 be e1 eb b6 | 10 56 f7 3e 25 85 4e 54 15 d9 dd 76 f8 a2 ef 75 | 06 49 0e 79 92 19 04 73 c4 32 36 8f 38 c3 a0 37 | 73 31 32 c7 13 ba 49 63 a9 ff 14 ce 76 c3 ca 6b | 44 ac 36 b3 fe 8e 49 b3 f2 07 ba 8e 9d 83 a8 90 | 1c bc ba b1 a8 32 ac a1 72 6e a4 55 c6 06 26 4d | 59 1f 8c 21 e8 f2 1d 39 aa 21 29 2d 13 d2 62 e1 | cd a6 44 f2 be e8 53 3c 05 77 b8 a3 16 49 f8 12 | a0 eb 6d c0 e5 00 d6 6c dd 16 9c ab b2 0e 15 2a | 11 01 e2 8c ef 25 2e ff f8 e7 c3 fa 43 cc 6c 72 | c5 e2 33 98 3b f3 05 50 a7 ad 9d 8e 86 bf 56 f5 | 69 e1 73 1e c0 3d 04 45 0d d2 2e 9d 3e db 05 1c | 6a c1 c4 8e 83 ca c0 f4 84 01 6b be a7 89 db dc | 85 98 0f b5 ba 9a cf 4d 5b 70 a7 a4 7a fa 95 48 | b4 59 36 8a 67 a3 46 cb 51 b4 47 97 d0 b4 c8 75 | 29 00 00 24 e6 91 2a 43 d1 aa b6 49 a9 57 9a 19 | fc 51 19 e5 28 8d 93 b9 12 81 37 cd 42 5d c8 08 | 2e b2 6c 7a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 e5 9d 22 28 c7 c4 27 97 02 c2 92 | 36 7a d0 48 44 31 1b ea 00 00 00 1c 00 00 40 05 | ac 08 fb c5 91 b8 80 23 e8 68 88 22 35 dd f9 61 | 84 cd 9d 18 | state #549 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb338023a60 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a84000 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #549 | libevent_malloc: new ptr-libevent@0x7fb3500594c0 size 128 | #549 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.301083 | resume sending helper answer for #549 suppresed complete_v2_state_transition() and stole MD | #549 spent 0.293 milliseconds in resume sending helper answer | stop processing: state #549 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb384054040 | processing resume sending helper answer for #551 | start processing: state #551 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 551 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #551 | **emit ISAKMP Message: | initiator cookie: | 6d 61 08 83 3f 41 28 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-54 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a1 10 09 30 29 21 c1 f4 7d 5c 69 d9 0d 1d e5 ea | ikev2 g^x 5f e5 a9 db 38 23 61 5f db 1d 40 23 04 f7 e7 7f | ikev2 g^x b8 e0 a4 4d 7c 42 cf 01 84 f7 f3 90 63 0d a6 27 | ikev2 g^x 03 53 27 bf 55 c3 86 69 1e d9 34 0b ea 6d ef b8 | ikev2 g^x 91 72 41 a4 7f 9d 36 67 17 b8 f1 de c9 57 cf 25 | ikev2 g^x 96 88 4b 97 29 55 03 99 2d 0b 7d 25 6e 82 28 00 | ikev2 g^x 28 de a1 1d bf 28 3b 57 86 30 40 b9 3b b3 59 37 | ikev2 g^x b9 3b 89 a1 f7 97 44 8d 31 dc 44 99 58 00 16 65 | ikev2 g^x 19 ab 30 5f 5a 1a 94 95 50 6f 1b d2 58 f8 43 59 | ikev2 g^x 32 7b ce 9f f3 ba d6 9b 84 a1 13 0d 64 7d 87 0a | ikev2 g^x 6a cb 60 60 91 23 18 fa 0b 4c 7f 24 f7 e4 a9 1b | ikev2 g^x da 1e 22 44 6a ff fd e2 c7 3d ff ec 71 14 90 da | ikev2 g^x 2f 14 ba 4f a8 6b df 31 2c a1 a5 6a a3 1d dc f1 | ikev2 g^x 4e 14 ae 37 41 c7 58 f2 d5 00 5d 49 d0 c7 f4 76 | ikev2 g^x a0 bd 4d a8 c2 8b 1f fe b6 2f d7 91 47 6a e8 e1 | ikev2 g^x dd 7d 06 82 4d 33 80 36 54 a3 03 be 52 06 d4 cf | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c1 64 a4 63 7a bd c6 9b 19 d4 3d 64 d3 05 1c 05 | IKEv2 nonce f8 31 a3 bc 62 83 1f 22 d8 12 00 d9 0f 94 f6 5e | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6d 61 08 83 3f 41 28 36 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 36 | natd_hash: port= 01 f4 | natd_hash: hash= 41 12 25 8d 00 b4 d4 c7 fd 0e de ae 25 a5 ca 2c | natd_hash: hash= ce 50 fd 3f | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 41 12 25 8d 00 b4 d4 c7 fd 0e de ae 25 a5 ca 2c | Notify data ce 50 fd 3f | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 6d 61 08 83 3f 41 28 36 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= eb 33 8d 88 55 34 43 12 f6 bf 6c 9e 03 ac c1 f8 | natd_hash: hash= ae e6 a3 5e | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data eb 33 8d 88 55 34 43 12 f6 bf 6c 9e 03 ac c1 f8 | Notify data ae e6 a3 5e | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #551 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #551 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #551 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #551: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #551 to 4294967295 after switching state | Message ID: IKE #551 skipping update_recv as MD is fake | Message ID: sent #551 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-54" #551: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.54:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #551) | 6d 61 08 83 3f 41 28 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 10 09 30 29 21 c1 f4 7d 5c 69 d9 0d 1d e5 ea | 5f e5 a9 db 38 23 61 5f db 1d 40 23 04 f7 e7 7f | b8 e0 a4 4d 7c 42 cf 01 84 f7 f3 90 63 0d a6 27 | 03 53 27 bf 55 c3 86 69 1e d9 34 0b ea 6d ef b8 | 91 72 41 a4 7f 9d 36 67 17 b8 f1 de c9 57 cf 25 | 96 88 4b 97 29 55 03 99 2d 0b 7d 25 6e 82 28 00 | 28 de a1 1d bf 28 3b 57 86 30 40 b9 3b b3 59 37 | b9 3b 89 a1 f7 97 44 8d 31 dc 44 99 58 00 16 65 | 19 ab 30 5f 5a 1a 94 95 50 6f 1b d2 58 f8 43 59 | 32 7b ce 9f f3 ba d6 9b 84 a1 13 0d 64 7d 87 0a | 6a cb 60 60 91 23 18 fa 0b 4c 7f 24 f7 e4 a9 1b | da 1e 22 44 6a ff fd e2 c7 3d ff ec 71 14 90 da | 2f 14 ba 4f a8 6b df 31 2c a1 a5 6a a3 1d dc f1 | 4e 14 ae 37 41 c7 58 f2 d5 00 5d 49 d0 c7 f4 76 | a0 bd 4d a8 c2 8b 1f fe b6 2f d7 91 47 6a e8 e1 | dd 7d 06 82 4d 33 80 36 54 a3 03 be 52 06 d4 cf | 29 00 00 24 c1 64 a4 63 7a bd c6 9b 19 d4 3d 64 | d3 05 1c 05 f8 31 a3 bc 62 83 1f 22 d8 12 00 d9 | 0f 94 f6 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 12 25 8d 00 b4 d4 c7 fd 0e de ae | 25 a5 ca 2c ce 50 fd 3f 00 00 00 1c 00 00 40 05 | eb 33 8d 88 55 34 43 12 f6 bf 6c 9e 03 ac c1 f8 | ae e6 a3 5e | state #551 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb380032bf0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a2b650 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384038200 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #551 | libevent_malloc: new ptr-libevent@0x7fb384054040 size 128 | #551 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.30146 | resume sending helper answer for #551 suppresed complete_v2_state_transition() and stole MD | #551 spent 0.342 milliseconds in resume sending helper answer | stop processing: state #551 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c056bd0 | processing resume sending helper answer for #535 | start processing: state #535 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 7 replies to request ID 535 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #535 | **emit ISAKMP Message: | initiator cookie: | d5 3d 4d d1 1d 8f ff ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-19 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x bd a8 30 7d fa 09 0e 91 b2 9d 3d 19 f4 ee 14 55 | ikev2 g^x 74 eb 7d 16 30 9b 64 08 bd 51 c6 0d 08 b3 39 3b | ikev2 g^x d5 c5 d3 d3 a6 f2 f8 14 c2 6f d7 95 59 0a fe e3 | ikev2 g^x bb a9 65 de c8 14 9e f5 05 83 26 75 c6 4c 05 34 | ikev2 g^x b4 a0 d6 d8 84 8c 16 46 27 7f f1 b6 a1 52 54 4b | ikev2 g^x 1a e2 b8 4d 24 eb ac 25 a2 41 76 22 20 0c f4 96 | ikev2 g^x 27 28 ef 3a 94 b6 4e c6 21 31 ca 90 2d 01 ac 3c | ikev2 g^x d9 6f 71 29 9d 32 e3 06 10 09 09 3f 08 e0 93 76 | ikev2 g^x aa 17 e1 ea 49 4d 7c 42 77 05 f9 17 bf ad af 3b | ikev2 g^x ed b3 91 7e 42 2f 67 a5 df de 4e ff 93 f2 9e 57 | ikev2 g^x 56 30 c0 46 0a 65 8c 18 8f d0 75 64 b5 32 6c 49 | ikev2 g^x 39 97 ce e9 7b c7 0e af 02 39 df da d5 ef 53 47 | ikev2 g^x cb a3 4c 02 a0 b2 1e 76 9e 5a 01 81 ed 62 af 75 | ikev2 g^x 23 20 b9 1a 39 86 e6 f9 03 41 1a d7 4e e7 c4 f5 | ikev2 g^x 82 a8 7a 1b 8c da 94 0c 14 8e 83 05 ac d2 dc 89 | ikev2 g^x 48 f7 0b 1d 07 c9 75 9f ab 81 e0 05 15 0e d1 2f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce c2 c0 89 96 d0 f7 59 31 53 11 f7 4a 36 92 ef 7e | IKEv2 nonce 38 2b 45 e1 10 42 96 da 05 ff a3 7a f0 1b 89 40 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d5 3d 4d d1 1d 8f ff ea | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 13 | natd_hash: port= 01 f4 | natd_hash: hash= 99 9e 60 66 94 a7 a4 7a 54 28 cb 5e bf 06 cf c4 | natd_hash: hash= 93 18 58 c1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 99 9e 60 66 94 a7 a4 7a 54 28 cb 5e bf 06 cf c4 | Notify data 93 18 58 c1 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d5 3d 4d d1 1d 8f ff ea | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c6 37 76 00 c2 f2 29 53 78 dd a2 4d 2d 0a f6 f9 | natd_hash: hash= 70 42 64 5b | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c6 37 76 00 c2 f2 29 53 78 dd a2 4d 2d 0a f6 f9 | Notify data 70 42 64 5b | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #535 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #535 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #535 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #535: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #535 to 4294967295 after switching state | Message ID: IKE #535 skipping update_recv as MD is fake | Message ID: sent #535 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-19" #535: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.19:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #535) | d5 3d 4d d1 1d 8f ff ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd a8 30 7d fa 09 0e 91 b2 9d 3d 19 f4 ee 14 55 | 74 eb 7d 16 30 9b 64 08 bd 51 c6 0d 08 b3 39 3b | d5 c5 d3 d3 a6 f2 f8 14 c2 6f d7 95 59 0a fe e3 | bb a9 65 de c8 14 9e f5 05 83 26 75 c6 4c 05 34 | b4 a0 d6 d8 84 8c 16 46 27 7f f1 b6 a1 52 54 4b | 1a e2 b8 4d 24 eb ac 25 a2 41 76 22 20 0c f4 96 | 27 28 ef 3a 94 b6 4e c6 21 31 ca 90 2d 01 ac 3c | d9 6f 71 29 9d 32 e3 06 10 09 09 3f 08 e0 93 76 | aa 17 e1 ea 49 4d 7c 42 77 05 f9 17 bf ad af 3b | ed b3 91 7e 42 2f 67 a5 df de 4e ff 93 f2 9e 57 | 56 30 c0 46 0a 65 8c 18 8f d0 75 64 b5 32 6c 49 | 39 97 ce e9 7b c7 0e af 02 39 df da d5 ef 53 47 | cb a3 4c 02 a0 b2 1e 76 9e 5a 01 81 ed 62 af 75 | 23 20 b9 1a 39 86 e6 f9 03 41 1a d7 4e e7 c4 f5 | 82 a8 7a 1b 8c da 94 0c 14 8e 83 05 ac d2 dc 89 | 48 f7 0b 1d 07 c9 75 9f ab 81 e0 05 15 0e d1 2f | 29 00 00 24 c2 c0 89 96 d0 f7 59 31 53 11 f7 4a | 36 92 ef 7e 38 2b 45 e1 10 42 96 da 05 ff a3 7a | f0 1b 89 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 9e 60 66 94 a7 a4 7a 54 28 cb 5e | bf 06 cf c4 93 18 58 c1 00 00 00 1c 00 00 40 05 | c6 37 76 00 c2 f2 29 53 78 dd a2 4d 2d 0a f6 f9 | 70 42 64 5b | state #535 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb368023e60 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb368017ea0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #535 | libevent_malloc: new ptr-libevent@0x7fb37c056bd0 size 128 | #535 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.301944 | resume sending helper answer for #535 suppresed complete_v2_state_transition() and stole MD | #535 spent 0.45 milliseconds in resume sending helper answer | stop processing: state #535 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb348053b10 | processing resume sending helper answer for #540 | start processing: state #540 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 6 replies to request ID 540 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #540 | **emit ISAKMP Message: | initiator cookie: | 2b e1 27 8d d0 52 8a f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-126 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x b7 d5 ad a4 cf eb 89 cf 33 00 bc 65 7f 4a 7b 8a | ikev2 g^x 16 3c 55 64 2b 44 36 7b dd 40 e5 4b 69 bb 87 d7 | ikev2 g^x 44 84 65 2c 80 59 b1 0b 26 0d 4b 17 d8 92 89 d5 | ikev2 g^x a8 39 88 9f 65 7f d7 e3 5e f3 f1 e1 69 ed 56 6f | ikev2 g^x 2d da 3b aa a1 f5 57 29 af ff 54 b9 33 17 09 e5 | ikev2 g^x 1c 0d 3c 29 e1 8b c4 f9 51 80 15 5e 1a fa 1a 83 | ikev2 g^x b0 dd b2 13 d6 42 a1 13 6e a2 49 94 b3 88 a5 52 | ikev2 g^x f2 25 96 67 72 ce ef 27 ee 12 d4 a9 81 d9 24 c0 | ikev2 g^x b5 47 34 ae 0d b8 be 17 8f d7 40 55 d5 69 22 bc | ikev2 g^x 39 f7 c5 28 22 3c 68 a5 3a 8d 6f 1f 00 85 29 77 | ikev2 g^x b9 55 ef 45 f0 37 a4 79 52 7d a6 e9 cd 97 64 1b | ikev2 g^x ec a9 e2 6b 2f 70 e3 90 d3 39 85 a7 70 54 7c ee | ikev2 g^x 29 b5 fb 95 bc cd d5 08 47 e2 10 f1 3c fd e5 2c | ikev2 g^x d9 d7 22 81 09 0d fa 53 8d c3 ee c8 2c a9 cf 74 | ikev2 g^x 00 4c 6d d4 7a 67 6f a7 66 48 98 1b c8 e6 db 27 | ikev2 g^x dd 8b f5 35 b4 13 6e 03 ce 21 d0 88 3b 78 0a fd | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 83 64 8b 32 eb dd 3f 5a 87 dd 64 20 2e 87 12 47 | IKEv2 nonce 14 e5 e2 45 bd 12 94 4b dd e7 b2 d7 43 01 e7 8c | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 2b e1 27 8d d0 52 8a f1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 7e | natd_hash: port= 01 f4 | natd_hash: hash= 68 20 26 6c 5f d3 95 5b fe ef 96 45 0a fb 28 79 | natd_hash: hash= 9a 9a 40 12 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 68 20 26 6c 5f d3 95 5b fe ef 96 45 0a fb 28 79 | Notify data 9a 9a 40 12 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 2b e1 27 8d d0 52 8a f1 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 9f b1 04 08 d0 1d 7f 34 66 26 cd 7d 6d a5 dc a3 | natd_hash: hash= 2e 5b 4c 92 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 9f b1 04 08 d0 1d 7f 34 66 26 cd 7d 6d a5 dc a3 | Notify data 2e 5b 4c 92 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #540 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #540 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #540 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #540: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #540 to 4294967295 after switching state | Message ID: IKE #540 skipping update_recv as MD is fake | Message ID: sent #540 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-126" #540: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.126:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #540) | 2b e1 27 8d d0 52 8a f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 d5 ad a4 cf eb 89 cf 33 00 bc 65 7f 4a 7b 8a | 16 3c 55 64 2b 44 36 7b dd 40 e5 4b 69 bb 87 d7 | 44 84 65 2c 80 59 b1 0b 26 0d 4b 17 d8 92 89 d5 | a8 39 88 9f 65 7f d7 e3 5e f3 f1 e1 69 ed 56 6f | 2d da 3b aa a1 f5 57 29 af ff 54 b9 33 17 09 e5 | 1c 0d 3c 29 e1 8b c4 f9 51 80 15 5e 1a fa 1a 83 | b0 dd b2 13 d6 42 a1 13 6e a2 49 94 b3 88 a5 52 | f2 25 96 67 72 ce ef 27 ee 12 d4 a9 81 d9 24 c0 | b5 47 34 ae 0d b8 be 17 8f d7 40 55 d5 69 22 bc | 39 f7 c5 28 22 3c 68 a5 3a 8d 6f 1f 00 85 29 77 | b9 55 ef 45 f0 37 a4 79 52 7d a6 e9 cd 97 64 1b | ec a9 e2 6b 2f 70 e3 90 d3 39 85 a7 70 54 7c ee | 29 b5 fb 95 bc cd d5 08 47 e2 10 f1 3c fd e5 2c | d9 d7 22 81 09 0d fa 53 8d c3 ee c8 2c a9 cf 74 | 00 4c 6d d4 7a 67 6f a7 66 48 98 1b c8 e6 db 27 | dd 8b f5 35 b4 13 6e 03 ce 21 d0 88 3b 78 0a fd | 29 00 00 24 83 64 8b 32 eb dd 3f 5a 87 dd 64 20 | 2e 87 12 47 14 e5 e2 45 bd 12 94 4b dd e7 b2 d7 | 43 01 e7 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 20 26 6c 5f d3 95 5b fe ef 96 45 | 0a fb 28 79 9a 9a 40 12 00 00 00 1c 00 00 40 05 | 9f b1 04 08 d0 1d 7f 34 66 26 cd 7d 6d a5 dc a3 | 2e 5b 4c 92 | state #540 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3600180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a43dd0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34801da80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #540 | libevent_malloc: new ptr-libevent@0x7fb348053b10 size 128 | #540 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.302444 | resume sending helper answer for #540 suppresed complete_v2_state_transition() and stole MD | #540 spent 0.458 milliseconds in resume sending helper answer | stop processing: state #540 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb36c0542e0 | processing resume sending helper answer for #538 | start processing: state #538 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 2 replies to request ID 538 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #538 | **emit ISAKMP Message: | initiator cookie: | 7d c2 7d 21 ef 8d 9c cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-50 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 47 92 33 2e 2c bb fa d3 c8 4f 04 33 a3 d9 67 23 | ikev2 g^x c5 f1 25 5c 53 26 1a cd 8a 43 1a 34 d0 e0 56 a7 | ikev2 g^x 2c 60 2d 8e 0e dd 90 95 15 0a 6b e5 9a cc ab f1 | ikev2 g^x 7c bd 19 8d 97 83 43 89 b4 a0 d7 4a db 0b 32 48 | ikev2 g^x 37 e5 2e a6 a4 51 00 59 4d 06 a6 4f 7e 5a c1 3b | ikev2 g^x 41 2d 91 05 a9 98 a0 d8 9a e1 37 d4 eb e2 b3 93 | ikev2 g^x e7 01 b6 51 59 81 49 b7 c7 db bc 77 53 8d ec 96 | ikev2 g^x aa 77 df f8 25 74 3c 8c 99 15 73 9e 96 a4 29 97 | ikev2 g^x 67 0e 10 a2 47 f8 b3 64 aa 76 27 48 03 49 0b e8 | ikev2 g^x 8e 18 c8 17 4a 26 1c af 91 66 f4 48 af e2 d7 d4 | ikev2 g^x 44 38 3e 28 ac 6b 9e 39 19 3f ae 6e d1 64 ae 00 | ikev2 g^x 5c 63 81 a7 65 f0 45 ba 8a 0c 4d 79 03 55 a4 7a | ikev2 g^x 72 cb f1 39 e4 d0 28 d0 3e 02 49 3c 8a 03 29 fa | ikev2 g^x 32 8b 50 0b ba d4 8f 2b b2 0e bb bd 1c 1c 88 74 | ikev2 g^x fc 9d 0d ed 49 4b 7d c7 5e c8 b1 dc 66 01 28 d7 | ikev2 g^x 81 70 ee a0 95 cd 9e 29 51 a2 d1 8a 79 cc 01 2d | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 0d 80 72 91 5f 6c f2 ee ef b6 16 64 a0 b5 22 be | IKEv2 nonce fd 2c d0 f5 a5 ec b8 1b c0 82 2c aa f7 2e 69 03 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7d c2 7d 21 ef 8d 9c cc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 32 | natd_hash: port= 01 f4 | natd_hash: hash= 50 35 66 94 43 28 e7 40 5b c1 a0 78 2b ba 2a d8 | natd_hash: hash= 0e c9 44 ab | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 50 35 66 94 43 28 e7 40 5b c1 a0 78 2b ba 2a d8 | Notify data 0e c9 44 ab | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 7d c2 7d 21 ef 8d 9c cc | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 3d 34 49 ee e1 5a 54 f0 2b 50 8b e9 80 0b e1 58 | natd_hash: hash= a7 e3 51 fd | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 3d 34 49 ee e1 5a 54 f0 2b 50 8b e9 80 0b e1 58 | Notify data a7 e3 51 fd | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #538 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #538 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #538 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #538: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #538 to 4294967295 after switching state | Message ID: IKE #538 skipping update_recv as MD is fake | Message ID: sent #538 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-50" #538: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.50:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #538) | 7d c2 7d 21 ef 8d 9c cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 92 33 2e 2c bb fa d3 c8 4f 04 33 a3 d9 67 23 | c5 f1 25 5c 53 26 1a cd 8a 43 1a 34 d0 e0 56 a7 | 2c 60 2d 8e 0e dd 90 95 15 0a 6b e5 9a cc ab f1 | 7c bd 19 8d 97 83 43 89 b4 a0 d7 4a db 0b 32 48 | 37 e5 2e a6 a4 51 00 59 4d 06 a6 4f 7e 5a c1 3b | 41 2d 91 05 a9 98 a0 d8 9a e1 37 d4 eb e2 b3 93 | e7 01 b6 51 59 81 49 b7 c7 db bc 77 53 8d ec 96 | aa 77 df f8 25 74 3c 8c 99 15 73 9e 96 a4 29 97 | 67 0e 10 a2 47 f8 b3 64 aa 76 27 48 03 49 0b e8 | 8e 18 c8 17 4a 26 1c af 91 66 f4 48 af e2 d7 d4 | 44 38 3e 28 ac 6b 9e 39 19 3f ae 6e d1 64 ae 00 | 5c 63 81 a7 65 f0 45 ba 8a 0c 4d 79 03 55 a4 7a | 72 cb f1 39 e4 d0 28 d0 3e 02 49 3c 8a 03 29 fa | 32 8b 50 0b ba d4 8f 2b b2 0e bb bd 1c 1c 88 74 | fc 9d 0d ed 49 4b 7d c7 5e c8 b1 dc 66 01 28 d7 | 81 70 ee a0 95 cd 9e 29 51 a2 d1 8a 79 cc 01 2d | 29 00 00 24 0d 80 72 91 5f 6c f2 ee ef b6 16 64 | a0 b5 22 be fd 2c d0 f5 a5 ec b8 1b c0 82 2c aa | f7 2e 69 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 35 66 94 43 28 e7 40 5b c1 a0 78 | 2b ba 2a d8 0e c9 44 ab 00 00 00 1c 00 00 40 05 | 3d 34 49 ee e1 5a 54 f0 2b 50 8b e9 80 0b e1 58 | a7 e3 51 fd | state #538 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb364008e30 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb374005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c03b210 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #538 | libevent_malloc: new ptr-libevent@0x7fb36c0542e0 size 128 | #538 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.302913 | resume sending helper answer for #538 suppresed complete_v2_state_transition() and stole MD | #538 spent 0.438 milliseconds in resume sending helper answer | stop processing: state #538 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb3800540c0 | processing resume sending helper answer for #512 | start processing: state #512 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 4 replies to request ID 512 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #512 | **emit ISAKMP Message: | initiator cookie: | 9c 1d 79 9c 4b 40 5f 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-140 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 1f e6 a4 db c4 02 2d 52 88 50 3f dc 30 82 ed 9f | ikev2 g^x 63 88 9c b5 3c c8 66 4a 37 be a1 3d aa fa fb 17 | ikev2 g^x f9 ac dd ad 9d 5b 20 51 15 fc d2 29 14 d4 2a 6d | ikev2 g^x f3 a0 8d 98 f8 da e0 12 75 4e bd 68 90 36 03 88 | ikev2 g^x 88 b8 f3 20 51 1f f0 57 2a c6 b0 97 a0 49 9c b7 | ikev2 g^x ad 6c f2 a7 06 f7 6a dd f3 22 78 ce 59 21 29 6a | ikev2 g^x 08 15 d7 74 fd 98 b0 83 c8 be 7d 16 eb bf fb 2e | ikev2 g^x e9 27 0a 5a 6e be 90 e4 cb 6a 36 aa 24 29 be 9c | ikev2 g^x ae dd 38 28 10 ed cb 2a 6e a7 2a ab b2 c3 1a ee | ikev2 g^x 88 bd 15 d3 67 e2 06 8e b6 97 80 a6 e7 00 87 5b | ikev2 g^x b8 76 fe 7c 8d d3 5e fd 05 4c 7a d6 96 d1 0a 11 | ikev2 g^x 2d a5 69 d7 c3 12 66 ec 98 02 9e 42 c9 77 fa 4f | ikev2 g^x 17 0c c6 fb 54 4a 9c 65 b5 be 12 f3 a2 73 e2 09 | ikev2 g^x a7 ee 4c 4f 97 4d 4f 10 71 3e 60 12 75 6e d2 f3 | ikev2 g^x dc 13 51 ee 44 b1 77 ed 2b d8 92 98 96 69 e5 ef | ikev2 g^x 91 3c 2e 84 e4 bb af 77 49 ac 6e 66 e2 85 88 c8 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 44 d4 21 93 f2 35 cf a0 d5 a8 8f 1c f3 e0 06 82 | IKEv2 nonce de 41 7f 55 b8 ed f7 b1 6c 3f 58 31 c1 b0 fc 9d | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9c 1d 79 9c 4b 40 5f 8c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 8c | natd_hash: port= 01 f4 | natd_hash: hash= 46 3d ba 6e 50 5c 1f f0 71 43 e4 e1 93 99 c6 4c | natd_hash: hash= 68 18 ff 24 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 46 3d ba 6e 50 5c 1f f0 71 43 e4 e1 93 99 c6 4c | Notify data 68 18 ff 24 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 9c 1d 79 9c 4b 40 5f 8c | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 1e ed 5b 7e 6f 31 a0 f1 10 d5 48 eb 40 5a a7 bd | natd_hash: hash= a4 a8 9e e1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 1e ed 5b 7e 6f 31 a0 f1 10 d5 48 eb 40 5a a7 bd | Notify data a4 a8 9e e1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #512 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #512 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #512 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #512: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #512 to 4294967295 after switching state | Message ID: IKE #512 skipping update_recv as MD is fake | Message ID: sent #512 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-140" #512: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.140:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #512) | 9c 1d 79 9c 4b 40 5f 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f e6 a4 db c4 02 2d 52 88 50 3f dc 30 82 ed 9f | 63 88 9c b5 3c c8 66 4a 37 be a1 3d aa fa fb 17 | f9 ac dd ad 9d 5b 20 51 15 fc d2 29 14 d4 2a 6d | f3 a0 8d 98 f8 da e0 12 75 4e bd 68 90 36 03 88 | 88 b8 f3 20 51 1f f0 57 2a c6 b0 97 a0 49 9c b7 | ad 6c f2 a7 06 f7 6a dd f3 22 78 ce 59 21 29 6a | 08 15 d7 74 fd 98 b0 83 c8 be 7d 16 eb bf fb 2e | e9 27 0a 5a 6e be 90 e4 cb 6a 36 aa 24 29 be 9c | ae dd 38 28 10 ed cb 2a 6e a7 2a ab b2 c3 1a ee | 88 bd 15 d3 67 e2 06 8e b6 97 80 a6 e7 00 87 5b | b8 76 fe 7c 8d d3 5e fd 05 4c 7a d6 96 d1 0a 11 | 2d a5 69 d7 c3 12 66 ec 98 02 9e 42 c9 77 fa 4f | 17 0c c6 fb 54 4a 9c 65 b5 be 12 f3 a2 73 e2 09 | a7 ee 4c 4f 97 4d 4f 10 71 3e 60 12 75 6e d2 f3 | dc 13 51 ee 44 b1 77 ed 2b d8 92 98 96 69 e5 ef | 91 3c 2e 84 e4 bb af 77 49 ac 6e 66 e2 85 88 c8 | 29 00 00 24 44 d4 21 93 f2 35 cf a0 d5 a8 8f 1c | f3 e0 06 82 de 41 7f 55 b8 ed f7 b1 6c 3f 58 31 | c1 b0 fc 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 3d ba 6e 50 5c 1f f0 71 43 e4 e1 | 93 99 c6 4c 68 18 ff 24 00 00 00 1c 00 00 40 05 | 1e ed 5b 7e 6f 31 a0 f1 10 d5 48 eb 40 5a a7 bd | a4 a8 9e e1 | state #512 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb3380407f0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x7fb358005860 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #512 | libevent_malloc: new ptr-libevent@0x7fb3800540c0 size 128 | #512 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.303394 | resume sending helper answer for #512 suppresed complete_v2_state_transition() and stole MD | #512 spent 0.442 milliseconds in resume sending helper answer | stop processing: state #512 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb358034680 | processing resume sending helper answer for #541 | start processing: state #541 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 1 replies to request ID 541 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #541 | **emit ISAKMP Message: | initiator cookie: | e5 6d dc 54 e8 13 c6 f4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-24 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x d6 70 ec f4 97 99 d8 72 ce 1b fb 62 b7 ff 70 b1 | ikev2 g^x d0 af d0 71 cf c9 19 5a 4b 54 67 9f d9 76 16 c5 | ikev2 g^x c2 a4 79 9e 63 b4 60 27 34 54 51 7c ce 20 f6 c6 | ikev2 g^x 4c 4b 74 1f 25 17 6c 4a e1 d4 14 08 5a 16 b4 9b | ikev2 g^x 82 8a 4f 61 af 32 25 98 4f 8b b6 f5 b4 de 0c b8 | ikev2 g^x 8f 1e 39 50 5f 6a 1f e4 ec dd 6a 69 e6 1c 77 5b | ikev2 g^x 51 25 d2 75 cb cb 97 24 6c 0c 79 b7 db 85 62 10 | ikev2 g^x 6e af 06 f5 31 7b 0b d7 96 08 f6 7f 02 1c 78 21 | ikev2 g^x 18 19 57 15 cc 45 e4 91 68 10 8d c0 f5 dd c3 33 | ikev2 g^x 9f d1 8c 61 12 47 98 e4 4a b7 b5 c3 22 ac 54 c9 | ikev2 g^x a2 b0 69 33 63 5c 14 fd d2 8f 89 5d d6 7f 3d 6d | ikev2 g^x f8 ab aa bd b8 f0 3f 92 e9 56 8b 5a 9e 4a 02 6e | ikev2 g^x a1 8e c1 f3 24 ab ef 20 e4 c9 e2 98 e4 c4 c3 92 | ikev2 g^x 49 b8 7b 9b eb b0 61 e1 ff c9 4b 16 04 d8 8e 9c | ikev2 g^x 7e c1 26 a0 a7 e2 6e 1c 6f b6 6c b8 06 b6 36 e1 | ikev2 g^x df 58 24 88 c2 60 0d 9a 51 05 8e 85 c2 9e 66 5b | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce e7 35 32 98 af d0 40 10 f4 80 06 7c f0 2f 64 a5 | IKEv2 nonce 58 9a 04 65 fd dd 75 64 b2 5d 38 dd a9 29 2e d3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e5 6d dc 54 e8 13 c6 f4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 18 | natd_hash: port= 01 f4 | natd_hash: hash= 93 7c fc 09 1a 79 2c 04 02 74 c5 f8 3a d6 61 08 | natd_hash: hash= 3f 8f 87 41 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 93 7c fc 09 1a 79 2c 04 02 74 c5 f8 3a d6 61 08 | Notify data 3f 8f 87 41 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= e5 6d dc 54 e8 13 c6 f4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 30 97 d6 ac 90 33 4d 32 1c 73 f2 d2 db 60 9a 7c | natd_hash: hash= 6e 76 e0 11 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 30 97 d6 ac 90 33 4d 32 1c 73 f2 d2 db 60 9a 7c | Notify data 6e 76 e0 11 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #541 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #541 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #541 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #541: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #541 to 4294967295 after switching state | Message ID: IKE #541 skipping update_recv as MD is fake | Message ID: sent #541 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-24" #541: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.24:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #541) | e5 6d dc 54 e8 13 c6 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 70 ec f4 97 99 d8 72 ce 1b fb 62 b7 ff 70 b1 | d0 af d0 71 cf c9 19 5a 4b 54 67 9f d9 76 16 c5 | c2 a4 79 9e 63 b4 60 27 34 54 51 7c ce 20 f6 c6 | 4c 4b 74 1f 25 17 6c 4a e1 d4 14 08 5a 16 b4 9b | 82 8a 4f 61 af 32 25 98 4f 8b b6 f5 b4 de 0c b8 | 8f 1e 39 50 5f 6a 1f e4 ec dd 6a 69 e6 1c 77 5b | 51 25 d2 75 cb cb 97 24 6c 0c 79 b7 db 85 62 10 | 6e af 06 f5 31 7b 0b d7 96 08 f6 7f 02 1c 78 21 | 18 19 57 15 cc 45 e4 91 68 10 8d c0 f5 dd c3 33 | 9f d1 8c 61 12 47 98 e4 4a b7 b5 c3 22 ac 54 c9 | a2 b0 69 33 63 5c 14 fd d2 8f 89 5d d6 7f 3d 6d | f8 ab aa bd b8 f0 3f 92 e9 56 8b 5a 9e 4a 02 6e | a1 8e c1 f3 24 ab ef 20 e4 c9 e2 98 e4 c4 c3 92 | 49 b8 7b 9b eb b0 61 e1 ff c9 4b 16 04 d8 8e 9c | 7e c1 26 a0 a7 e2 6e 1c 6f b6 6c b8 06 b6 36 e1 | df 58 24 88 c2 60 0d 9a 51 05 8e 85 c2 9e 66 5b | 29 00 00 24 e7 35 32 98 af d0 40 10 f4 80 06 7c | f0 2f 64 a5 58 9a 04 65 fd dd 75 64 b2 5d 38 dd | a9 29 2e d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 7c fc 09 1a 79 2c 04 02 74 c5 f8 | 3a d6 61 08 3f 8f 87 41 00 00 00 1c 00 00 40 05 | 30 97 d6 ac 90 33 4d 32 1c 73 f2 d2 db 60 9a 7c | 6e 76 e0 11 | state #541 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a23110 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #541 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 | #541 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.303856 | resume sending helper answer for #541 suppresed complete_v2_state_transition() and stole MD | #541 spent 0.437 milliseconds in resume sending helper answer | stop processing: state #541 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb388059ea0 | processing resume sending helper answer for #525 | start processing: state #525 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 14 replies to request ID 525 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #525 | **emit ISAKMP Message: | initiator cookie: | aa 0a 50 f6 eb 80 0b d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-80 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x fa f9 a3 5a f1 06 e3 d8 4a 74 cc cb 91 5d 3f e1 | ikev2 g^x 21 df 1c 09 20 b5 fa b8 68 99 55 2e 9c f7 c4 26 | ikev2 g^x 2d 13 5e 73 62 28 0d 5d 1b 19 61 40 3e eb 12 46 | ikev2 g^x d1 3e 37 e2 36 63 3a 09 94 77 c0 7e 6c 49 5a 1c | ikev2 g^x 2a 84 ad 4d a2 2e 20 e1 b3 d6 0e 28 0c 73 33 56 | ikev2 g^x 98 ce 6a 84 5e dd ad 70 fc 04 0c c9 ba 63 4e a9 | ikev2 g^x 26 10 ce 94 47 dd ed 32 a8 e2 94 aa 02 0d 68 a7 | ikev2 g^x 46 c0 e1 ca 9b 37 10 05 10 43 ac 26 3c df ae af | ikev2 g^x 84 82 12 69 3c a5 a9 a4 da 4e 39 e7 22 d4 22 45 | ikev2 g^x 35 cb 06 64 36 de 60 0f 82 92 bc c7 8f dd a7 83 | ikev2 g^x 9c e0 b6 87 e5 ac 79 26 3e f5 8d 2d cd 1a bc 53 | ikev2 g^x c2 a7 57 2e 12 39 97 28 1d a6 53 fc 44 99 8d cf | ikev2 g^x 75 73 64 e4 87 c5 c3 cd d3 07 30 22 82 04 3f 75 | ikev2 g^x fc 56 ce 51 6d 2a 4c a6 f0 62 cd cf f7 11 c5 31 | ikev2 g^x 55 34 34 06 69 e6 6c 30 96 c7 a2 0e e6 93 d4 86 | ikev2 g^x 21 15 7c aa ca 54 c4 d5 3d 13 a0 9d ed ce c0 b7 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 2f 02 54 75 b3 a1 a2 a3 49 b6 96 0f 9b 0f 28 8f | IKEv2 nonce 5d 43 f2 88 27 e5 88 4f 55 a3 28 fe cd 5e 6c d1 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= aa 0a 50 f6 eb 80 0b d8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 50 | natd_hash: port= 01 f4 | natd_hash: hash= 5d 92 6e 19 fc 80 58 4d ee 5f a9 8d 60 2e f6 39 | natd_hash: hash= 2c 8f 9a a2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 5d 92 6e 19 fc 80 58 4d ee 5f a9 8d 60 2e f6 39 | Notify data 2c 8f 9a a2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= aa 0a 50 f6 eb 80 0b d8 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= d9 3c 3f 56 aa 0d 1b ab 4e ad 62 3c 67 74 fc 7e | natd_hash: hash= 8b 17 e3 b0 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data d9 3c 3f 56 aa 0d 1b ab 4e ad 62 3c 67 74 fc 7e | Notify data 8b 17 e3 b0 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #525 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #525 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #525 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #525: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #525 to 4294967295 after switching state | Message ID: IKE #525 skipping update_recv as MD is fake | Message ID: sent #525 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-80" #525: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.80:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #525) | aa 0a 50 f6 eb 80 0b d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa f9 a3 5a f1 06 e3 d8 4a 74 cc cb 91 5d 3f e1 | 21 df 1c 09 20 b5 fa b8 68 99 55 2e 9c f7 c4 26 | 2d 13 5e 73 62 28 0d 5d 1b 19 61 40 3e eb 12 46 | d1 3e 37 e2 36 63 3a 09 94 77 c0 7e 6c 49 5a 1c | 2a 84 ad 4d a2 2e 20 e1 b3 d6 0e 28 0c 73 33 56 | 98 ce 6a 84 5e dd ad 70 fc 04 0c c9 ba 63 4e a9 | 26 10 ce 94 47 dd ed 32 a8 e2 94 aa 02 0d 68 a7 | 46 c0 e1 ca 9b 37 10 05 10 43 ac 26 3c df ae af | 84 82 12 69 3c a5 a9 a4 da 4e 39 e7 22 d4 22 45 | 35 cb 06 64 36 de 60 0f 82 92 bc c7 8f dd a7 83 | 9c e0 b6 87 e5 ac 79 26 3e f5 8d 2d cd 1a bc 53 | c2 a7 57 2e 12 39 97 28 1d a6 53 fc 44 99 8d cf | 75 73 64 e4 87 c5 c3 cd d3 07 30 22 82 04 3f 75 | fc 56 ce 51 6d 2a 4c a6 f0 62 cd cf f7 11 c5 31 | 55 34 34 06 69 e6 6c 30 96 c7 a2 0e e6 93 d4 86 | 21 15 7c aa ca 54 c4 d5 3d 13 a0 9d ed ce c0 b7 | 29 00 00 24 2f 02 54 75 b3 a1 a2 a3 49 b6 96 0f | 9b 0f 28 8f 5d 43 f2 88 27 e5 88 4f 55 a3 28 fe | cd 5e 6c d1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5d 92 6e 19 fc 80 58 4d ee 5f a9 8d | 60 2e f6 39 2c 8f 9a a2 00 00 00 1c 00 00 40 05 | d9 3c 3f 56 aa 0d 1b ab 4e ad 62 3c 67 74 fc 7e | 8b 17 e3 b0 | state #525 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb388041ce0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ae8980 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae8980 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #525 | libevent_malloc: new ptr-libevent@0x7fb388059ea0 size 128 | #525 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.304321 | resume sending helper answer for #525 suppresed complete_v2_state_transition() and stole MD | #525 spent 0.44 milliseconds in resume sending helper answer | stop processing: state #525 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb370054000 | processing resume sending helper answer for #537 | start processing: state #537 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 17 replies to request ID 537 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #537 | **emit ISAKMP Message: | initiator cookie: | d1 5a 93 f7 50 58 86 fd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-150 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 02 fb b2 e9 f5 e0 48 e2 24 d7 b7 90 81 4f a6 cf | ikev2 g^x 4b 14 8e f5 13 4f af 05 2f 84 bf 07 10 88 44 08 | ikev2 g^x 93 8a d9 fc 6f 22 fa 3c c8 70 98 39 d3 4f 21 67 | ikev2 g^x 30 23 4e 48 1b 3c bb d4 79 64 36 c0 17 1e c6 75 | ikev2 g^x 8a 84 dd c6 9f 18 fe 97 4a e5 66 71 01 67 56 d0 | ikev2 g^x 31 45 bd 3f 15 7c 4b 14 f6 e2 75 2e db 9d 87 36 | ikev2 g^x c1 55 2a ef fb 95 d2 cc e7 66 60 2a 50 9c df a0 | ikev2 g^x 4e 6b 6c fc 98 57 d3 ff f6 ab 30 47 15 58 24 c5 | ikev2 g^x 05 24 2b 82 ab 42 7e 2d 14 b1 af 64 00 e3 f0 ff | ikev2 g^x c9 03 29 6e 02 ac 5f cd 18 87 64 c1 df 8b 41 55 | ikev2 g^x df 40 66 85 17 02 00 95 d2 86 68 ed eb b9 5f fb | ikev2 g^x fb b4 ca c2 86 45 6f 55 ef 58 df 3c e1 5f a2 fb | ikev2 g^x 91 dc bf 24 5e 80 76 e4 9f 99 2c 02 e9 6b 6e 98 | ikev2 g^x 01 53 4a 03 27 4f 46 fe 01 ab 6a 3c 9f e3 be 2f | ikev2 g^x c8 ee 29 25 4e 78 52 2a 3e c2 0b a4 ff 2d c1 b2 | ikev2 g^x 21 1d 49 45 c8 7c fb b6 52 62 ee 97 b5 36 16 bc | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 27 a3 e5 a8 20 a1 f0 e2 d4 b5 39 34 87 53 60 68 | IKEv2 nonce 73 e4 69 53 b8 d2 8c 69 1f 4e 6c 2e b8 6d d5 22 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d1 5a 93 f7 50 58 86 fd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 96 | natd_hash: port= 01 f4 | natd_hash: hash= 04 dd f4 fd 4d 77 54 64 d5 cd 35 a0 59 04 f4 07 | natd_hash: hash= 5e 47 05 77 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 04 dd f4 fd 4d 77 54 64 d5 cd 35 a0 59 04 f4 07 | Notify data 5e 47 05 77 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= d1 5a 93 f7 50 58 86 fd | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 52 af de ce e9 7d c2 89 3b cb ea 98 eb 7e 08 db | natd_hash: hash= cf 06 0c f1 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 52 af de ce e9 7d c2 89 3b cb ea 98 eb 7e 08 db | Notify data cf 06 0c f1 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #537 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #537 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #537 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #537: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #537 to 4294967295 after switching state | Message ID: IKE #537 skipping update_recv as MD is fake | Message ID: sent #537 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-150" #537: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.150:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #537) | d1 5a 93 f7 50 58 86 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 fb b2 e9 f5 e0 48 e2 24 d7 b7 90 81 4f a6 cf | 4b 14 8e f5 13 4f af 05 2f 84 bf 07 10 88 44 08 | 93 8a d9 fc 6f 22 fa 3c c8 70 98 39 d3 4f 21 67 | 30 23 4e 48 1b 3c bb d4 79 64 36 c0 17 1e c6 75 | 8a 84 dd c6 9f 18 fe 97 4a e5 66 71 01 67 56 d0 | 31 45 bd 3f 15 7c 4b 14 f6 e2 75 2e db 9d 87 36 | c1 55 2a ef fb 95 d2 cc e7 66 60 2a 50 9c df a0 | 4e 6b 6c fc 98 57 d3 ff f6 ab 30 47 15 58 24 c5 | 05 24 2b 82 ab 42 7e 2d 14 b1 af 64 00 e3 f0 ff | c9 03 29 6e 02 ac 5f cd 18 87 64 c1 df 8b 41 55 | df 40 66 85 17 02 00 95 d2 86 68 ed eb b9 5f fb | fb b4 ca c2 86 45 6f 55 ef 58 df 3c e1 5f a2 fb | 91 dc bf 24 5e 80 76 e4 9f 99 2c 02 e9 6b 6e 98 | 01 53 4a 03 27 4f 46 fe 01 ab 6a 3c 9f e3 be 2f | c8 ee 29 25 4e 78 52 2a 3e c2 0b a4 ff 2d c1 b2 | 21 1d 49 45 c8 7c fb b6 52 62 ee 97 b5 36 16 bc | 29 00 00 24 27 a3 e5 a8 20 a1 f0 e2 d4 b5 39 34 | 87 53 60 68 73 e4 69 53 b8 d2 8c 69 1f 4e 6c 2e | b8 6d d5 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 04 dd f4 fd 4d 77 54 64 d5 cd 35 a0 | 59 04 f4 07 5e 47 05 77 00 00 00 1c 00 00 40 05 | 52 af de ce e9 7d c2 89 3b cb ea 98 eb 7e 08 db | cf 06 0c f1 | state #537 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb338023e10 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46a8d840 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8d840 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #537 | libevent_malloc: new ptr-libevent@0x7fb370054000 size 128 | #537 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.30478 | resume sending helper answer for #537 suppresed complete_v2_state_transition() and stole MD | #537 spent 0.434 milliseconds in resume sending helper answer | stop processing: state #537 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb350051bb0 | processing resume sending helper answer for #526 | start processing: state #526 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 10 replies to request ID 526 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #526 | **emit ISAKMP Message: | initiator cookie: | 2c e7 79 4e 69 36 cf 88 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-131 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 7b a3 00 42 f2 bb 8f 76 46 c4 66 08 4e c7 f9 b2 | ikev2 g^x df 25 c1 de 9e 12 de 72 b5 7e 4f 9a 95 62 19 89 | ikev2 g^x ac 68 cc ad 66 f6 b9 57 74 7f cb 29 ce b4 c5 29 | ikev2 g^x 7e e8 43 36 2e ad 51 7b dd 36 41 60 f4 e5 14 cc | ikev2 g^x a6 af 4e 6f 65 34 88 da 72 82 77 c2 a2 36 84 91 | ikev2 g^x 9b 68 22 79 7f 0d ab 26 4a 42 6f 37 90 81 a7 28 | ikev2 g^x b1 5d 31 ff 90 46 41 d8 33 de 87 0f 27 a2 30 12 | ikev2 g^x e6 4d fd 6b 9a f7 c2 79 27 45 5a 1e 6d 1e cc 92 | ikev2 g^x 13 af fa 4d 53 bb da 63 4a cd 41 8d 7f 7c f0 8e | ikev2 g^x bb 15 d6 24 f8 58 75 56 83 54 56 f5 f0 c8 22 3e | ikev2 g^x 06 23 4d f1 c1 3a e0 0d 5a 45 9e e2 63 18 d4 90 | ikev2 g^x a9 01 18 d9 68 d9 7c b7 d6 21 a4 79 fb 61 05 78 | ikev2 g^x 3b 9e 6f 30 8b 1e 00 d6 c4 b5 8f db ed 31 3f bf | ikev2 g^x 84 21 ff 60 e0 96 6f e7 8a 57 1c 58 41 5f 92 3e | ikev2 g^x a0 80 3c 76 7a 2c 33 23 3b cc d3 da c4 62 04 3c | ikev2 g^x 5a 2e 98 11 59 53 9d 30 e5 65 ae 85 8a f1 f4 19 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 58 2a 43 33 ca da 5e cf d0 c4 3e 45 b3 97 45 72 | IKEv2 nonce b2 67 77 d1 d9 13 d7 0d cb 6a de 8c 71 91 90 96 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 2c e7 79 4e 69 36 cf 88 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 83 | natd_hash: port= 01 f4 | natd_hash: hash= ff 12 0a 6b bb 38 2d fe 8d fe 15 e3 95 3d 21 61 | natd_hash: hash= 33 d3 f6 a2 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data ff 12 0a 6b bb 38 2d fe 8d fe 15 e3 95 3d 21 61 | Notify data 33 d3 f6 a2 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 2c e7 79 4e 69 36 cf 88 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 40 e8 e9 9c 13 3c 3e 2b 80 7f e5 4f 1b 81 50 bc | natd_hash: hash= 99 79 e6 40 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 40 e8 e9 9c 13 3c 3e 2b 80 7f e5 4f 1b 81 50 bc | Notify data 99 79 e6 40 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #526 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #526 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #526 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #526: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #526 to 4294967295 after switching state | Message ID: IKE #526 skipping update_recv as MD is fake | Message ID: sent #526 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-131" #526: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.131:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #526) | 2c e7 79 4e 69 36 cf 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b a3 00 42 f2 bb 8f 76 46 c4 66 08 4e c7 f9 b2 | df 25 c1 de 9e 12 de 72 b5 7e 4f 9a 95 62 19 89 | ac 68 cc ad 66 f6 b9 57 74 7f cb 29 ce b4 c5 29 | 7e e8 43 36 2e ad 51 7b dd 36 41 60 f4 e5 14 cc | a6 af 4e 6f 65 34 88 da 72 82 77 c2 a2 36 84 91 | 9b 68 22 79 7f 0d ab 26 4a 42 6f 37 90 81 a7 28 | b1 5d 31 ff 90 46 41 d8 33 de 87 0f 27 a2 30 12 | e6 4d fd 6b 9a f7 c2 79 27 45 5a 1e 6d 1e cc 92 | 13 af fa 4d 53 bb da 63 4a cd 41 8d 7f 7c f0 8e | bb 15 d6 24 f8 58 75 56 83 54 56 f5 f0 c8 22 3e | 06 23 4d f1 c1 3a e0 0d 5a 45 9e e2 63 18 d4 90 | a9 01 18 d9 68 d9 7c b7 d6 21 a4 79 fb 61 05 78 | 3b 9e 6f 30 8b 1e 00 d6 c4 b5 8f db ed 31 3f bf | 84 21 ff 60 e0 96 6f e7 8a 57 1c 58 41 5f 92 3e | a0 80 3c 76 7a 2c 33 23 3b cc d3 da c4 62 04 3c | 5a 2e 98 11 59 53 9d 30 e5 65 ae 85 8a f1 f4 19 | 29 00 00 24 58 2a 43 33 ca da 5e cf d0 c4 3e 45 | b3 97 45 72 b2 67 77 d1 d9 13 d7 0d cb 6a de 8c | 71 91 90 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 12 0a 6b bb 38 2d fe 8d fe 15 e3 | 95 3d 21 61 33 d3 f6 a2 00 00 00 1c 00 00 40 05 | 40 e8 e9 9c 13 3c 3e 2b 80 7f e5 4f 1b 81 50 bc | 99 79 e6 40 | state #526 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb350035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46abbbc0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350044df0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #526 | libevent_malloc: new ptr-libevent@0x7fb350051bb0 size 128 | #526 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.305249 | resume sending helper answer for #526 suppresed complete_v2_state_transition() and stole MD | #526 spent 0.442 milliseconds in resume sending helper answer | stop processing: state #526 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb37c051490 | processing resume sending helper answer for #533 | start processing: state #533 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 18 replies to request ID 533 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #533 | **emit ISAKMP Message: | initiator cookie: | f6 ef 1a 2f f5 b4 93 7e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-12 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x da a1 df df ca 4b 3c 26 52 53 bf 5e dc 26 41 90 | ikev2 g^x d1 df 23 21 a9 59 bf d6 ae 81 71 a0 81 4c 53 03 | ikev2 g^x 11 33 1a 4b b7 ab 53 01 6d 0e cc 7b 75 21 4e 97 | ikev2 g^x 25 1d 96 f6 6e 9e 8f 9d ff 1d 95 15 28 e4 03 98 | ikev2 g^x 5c 1e 2c f1 4b 5f c6 3a d5 37 62 da 61 45 46 b3 | ikev2 g^x cc 9d 86 7a d3 76 26 6f 3b f0 79 d8 87 45 9d b6 | ikev2 g^x 0b 54 6c d3 f6 87 87 b3 0e 07 df 90 fc 79 cd b8 | ikev2 g^x 24 00 5c 5b 99 aa f0 58 32 9c f1 f5 6b 32 0d 58 | ikev2 g^x f3 21 64 b4 72 d0 94 c8 05 ed d0 c6 3c b0 26 e1 | ikev2 g^x f7 cf eb a0 25 a3 19 2f 51 79 e3 59 1e 5a 51 9a | ikev2 g^x 3e 2a 58 04 1f d3 70 6b 24 34 43 84 0f 4b 98 43 | ikev2 g^x 23 8c c9 a8 bb f3 ad 2f b5 87 c1 54 1c f5 13 a0 | ikev2 g^x 38 03 e5 fc 8b 2f cc 40 23 79 b0 d3 84 0d e1 a0 | ikev2 g^x ea 45 1c 78 35 7d 50 eb b7 64 69 09 33 29 c1 68 | ikev2 g^x b1 bf 88 e9 f3 00 6b e6 58 a7 19 e9 1b b5 e5 43 | ikev2 g^x 74 e7 8d 22 51 ab 73 75 e3 5d e8 92 a5 fc f5 56 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 51 9c ee 13 ee c2 09 ff 20 a1 f7 f3 1a ce 85 4f | IKEv2 nonce 59 c3 37 7c 50 6b 1c 56 90 01 a1 b8 e5 91 ca c4 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f6 ef 1a 2f f5 b4 93 7e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0c | natd_hash: port= 01 f4 | natd_hash: hash= dd ca 1b b3 75 23 bb 76 92 45 1b 72 a0 fb dd 8a | natd_hash: hash= c0 43 64 68 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data dd ca 1b b3 75 23 bb 76 92 45 1b 72 a0 fb dd 8a | Notify data c0 43 64 68 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f6 ef 1a 2f f5 b4 93 7e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= c3 3f 99 f7 37 13 13 a6 f3 67 55 d5 33 83 4f 3f | natd_hash: hash= 53 00 18 49 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data c3 3f 99 f7 37 13 13 a6 f3 67 55 d5 33 83 4f 3f | Notify data 53 00 18 49 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #533 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #533 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #533 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #533: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #533 to 4294967295 after switching state | Message ID: IKE #533 skipping update_recv as MD is fake | Message ID: sent #533 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-12" #533: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.12:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #533) | f6 ef 1a 2f f5 b4 93 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da a1 df df ca 4b 3c 26 52 53 bf 5e dc 26 41 90 | d1 df 23 21 a9 59 bf d6 ae 81 71 a0 81 4c 53 03 | 11 33 1a 4b b7 ab 53 01 6d 0e cc 7b 75 21 4e 97 | 25 1d 96 f6 6e 9e 8f 9d ff 1d 95 15 28 e4 03 98 | 5c 1e 2c f1 4b 5f c6 3a d5 37 62 da 61 45 46 b3 | cc 9d 86 7a d3 76 26 6f 3b f0 79 d8 87 45 9d b6 | 0b 54 6c d3 f6 87 87 b3 0e 07 df 90 fc 79 cd b8 | 24 00 5c 5b 99 aa f0 58 32 9c f1 f5 6b 32 0d 58 | f3 21 64 b4 72 d0 94 c8 05 ed d0 c6 3c b0 26 e1 | f7 cf eb a0 25 a3 19 2f 51 79 e3 59 1e 5a 51 9a | 3e 2a 58 04 1f d3 70 6b 24 34 43 84 0f 4b 98 43 | 23 8c c9 a8 bb f3 ad 2f b5 87 c1 54 1c f5 13 a0 | 38 03 e5 fc 8b 2f cc 40 23 79 b0 d3 84 0d e1 a0 | ea 45 1c 78 35 7d 50 eb b7 64 69 09 33 29 c1 68 | b1 bf 88 e9 f3 00 6b e6 58 a7 19 e9 1b b5 e5 43 | 74 e7 8d 22 51 ab 73 75 e3 5d e8 92 a5 fc f5 56 | 29 00 00 24 51 9c ee 13 ee c2 09 ff 20 a1 f7 f3 | 1a ce 85 4f 59 c3 37 7c 50 6b 1c 56 90 01 a1 b8 | e5 91 ca c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd ca 1b b3 75 23 bb 76 92 45 1b 72 | a0 fb dd 8a c0 43 64 68 00 00 00 1c 00 00 40 05 | c3 3f 99 f7 37 13 13 a6 f3 67 55 d5 33 83 4f 3f | 53 00 18 49 | state #533 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb360035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ac7f80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c025210 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #533 | libevent_malloc: new ptr-libevent@0x7fb37c051490 size 128 | #533 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.305727 | resume sending helper answer for #533 suppresed complete_v2_state_transition() and stole MD | #533 spent 0.452 milliseconds in resume sending helper answer | stop processing: state #533 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb354054010 | processing resume sending helper answer for #543 | start processing: state #543 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 13 replies to request ID 543 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #543 | **emit ISAKMP Message: | initiator cookie: | 8e 44 72 50 b9 d3 dd b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-11 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 41 24 1a 7b 6b 70 54 d6 bd da 9a 74 11 c1 10 4c | ikev2 g^x 35 ce 24 8a 41 de 3b c0 5b 1f ca bb 16 3b d8 1c | ikev2 g^x 1e a4 54 6d 24 65 47 b9 56 f7 04 e6 39 1c d0 98 | ikev2 g^x 83 cb 9e 40 be 51 70 af 81 68 b0 d8 3e 19 c8 15 | ikev2 g^x e4 25 aa 79 9c 90 e2 25 c5 ca b9 8c 40 22 6c 4b | ikev2 g^x 93 ad 78 af 16 d2 3d f3 8d 27 b1 61 55 d3 78 18 | ikev2 g^x 3a 04 68 63 37 a9 4f 5d fc 04 16 94 42 0d da 3b | ikev2 g^x 8c c1 6e d4 a9 31 72 3b 81 99 92 2b 83 15 9c d4 | ikev2 g^x 8b 0e 27 49 4d c1 a2 ac 6c 30 cd b3 8d 5a 76 66 | ikev2 g^x 00 bd 4e 1e 9f 08 70 f9 6c 29 f6 48 96 a2 b3 24 | ikev2 g^x fb 0e ee 0a ff 43 23 ef f7 df b7 1d 3c 50 f5 21 | ikev2 g^x 78 9e f4 1f 72 64 73 81 56 af c6 bf 6f 78 68 b6 | ikev2 g^x 23 6b 4d 8c d4 8f 95 9f e4 07 d6 99 60 6f 4f 68 | ikev2 g^x ff c8 49 ef 62 2d de 2b 39 14 98 51 d2 c8 bb 9f | ikev2 g^x 9f 3c d8 92 38 bf 91 56 69 62 cc 92 f0 79 c0 f7 | ikev2 g^x f4 11 ff 98 80 77 af d0 41 c1 25 02 72 ea c9 c6 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 54 02 f2 6f 33 5c 6e 1c 37 ce 9e 0d c9 7a 13 59 | IKEv2 nonce 0a 74 e5 bf e6 80 24 a7 f4 41 a6 33 04 30 82 74 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8e 44 72 50 b9 d3 dd b4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0b | natd_hash: port= 01 f4 | natd_hash: hash= a3 fb 77 bc e4 59 3f 3a 12 ff e7 0e 5d b1 f7 87 | natd_hash: hash= 35 40 87 23 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a3 fb 77 bc e4 59 3f 3a 12 ff e7 0e 5d b1 f7 87 | Notify data 35 40 87 23 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 8e 44 72 50 b9 d3 dd b4 | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 86 cd c2 c9 ec 15 a4 23 df 3e 79 59 a6 b0 4d 70 | natd_hash: hash= be f0 fe 01 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 86 cd c2 c9 ec 15 a4 23 df 3e 79 59 a6 b0 4d 70 | Notify data be f0 fe 01 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #543 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #543 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #543 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #543: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #543 to 4294967295 after switching state | Message ID: IKE #543 skipping update_recv as MD is fake | Message ID: sent #543 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-11" #543: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.11:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #543) | 8e 44 72 50 b9 d3 dd b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 41 24 1a 7b 6b 70 54 d6 bd da 9a 74 11 c1 10 4c | 35 ce 24 8a 41 de 3b c0 5b 1f ca bb 16 3b d8 1c | 1e a4 54 6d 24 65 47 b9 56 f7 04 e6 39 1c d0 98 | 83 cb 9e 40 be 51 70 af 81 68 b0 d8 3e 19 c8 15 | e4 25 aa 79 9c 90 e2 25 c5 ca b9 8c 40 22 6c 4b | 93 ad 78 af 16 d2 3d f3 8d 27 b1 61 55 d3 78 18 | 3a 04 68 63 37 a9 4f 5d fc 04 16 94 42 0d da 3b | 8c c1 6e d4 a9 31 72 3b 81 99 92 2b 83 15 9c d4 | 8b 0e 27 49 4d c1 a2 ac 6c 30 cd b3 8d 5a 76 66 | 00 bd 4e 1e 9f 08 70 f9 6c 29 f6 48 96 a2 b3 24 | fb 0e ee 0a ff 43 23 ef f7 df b7 1d 3c 50 f5 21 | 78 9e f4 1f 72 64 73 81 56 af c6 bf 6f 78 68 b6 | 23 6b 4d 8c d4 8f 95 9f e4 07 d6 99 60 6f 4f 68 | ff c8 49 ef 62 2d de 2b 39 14 98 51 d2 c8 bb 9f | 9f 3c d8 92 38 bf 91 56 69 62 cc 92 f0 79 c0 f7 | f4 11 ff 98 80 77 af d0 41 c1 25 02 72 ea c9 c6 | 29 00 00 24 54 02 f2 6f 33 5c 6e 1c 37 ce 9e 0d | c9 7a 13 59 0a 74 e5 bf e6 80 24 a7 f4 41 a6 33 | 04 30 82 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 fb 77 bc e4 59 3f 3a 12 ff e7 0e | 5d b1 f7 87 35 40 87 23 00 00 00 1c 00 00 40 05 | 86 cd c2 c9 ec 15 a4 23 df 3e 79 59 a6 b0 4d 70 | be f0 fe 01 | state #543 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb36c035930 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ac69c0 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354046090 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #543 | libevent_malloc: new ptr-libevent@0x7fb354054010 size 128 | #543 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.306208 | resume sending helper answer for #543 suppresed complete_v2_state_transition() and stole MD | #543 spent 0.449 milliseconds in resume sending helper answer | stop processing: state #543 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb35c05c110 | processing resume sending helper answer for #539 | start processing: state #539 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 15 replies to request ID 539 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #539 | **emit ISAKMP Message: | initiator cookie: | f3 ba fb 39 a0 6d aa 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-14 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x a6 bb d0 0a e4 91 67 ed 30 3c 0b a8 5b 47 6e 58 | ikev2 g^x 54 a6 1f 2c 4e 7f d0 b0 bd e3 fb 18 4b 44 d6 1a | ikev2 g^x e7 86 6e da c5 94 ab b3 8d 6a 0d 7a e8 8e da 48 | ikev2 g^x 7f dc 72 ca c7 8b 8f e2 4b c2 09 25 60 11 ac 5f | ikev2 g^x ec 6f 9d 98 47 5c 60 fe c1 7b f0 93 49 fd ed 12 | ikev2 g^x b4 19 6a d0 14 ce f0 70 42 3f 04 32 d9 04 2f b2 | ikev2 g^x ca 5d 42 18 c3 28 44 0e 3f 08 71 5a c8 bd 7b 85 | ikev2 g^x a2 71 ba 72 c1 49 94 26 a9 aa 95 8a 17 20 47 31 | ikev2 g^x 6d db 6f 70 0f 42 41 97 8e fc 16 21 2d b2 dd 9c | ikev2 g^x 7c e3 bd 45 5f 99 25 ca 3b 09 1b ee c5 5d c9 18 | ikev2 g^x 96 1d d7 d1 61 c8 0b 67 e4 93 1e ef 62 98 f5 94 | ikev2 g^x 75 89 49 0d 58 ec c4 e6 07 56 cd e4 b6 53 c7 69 | ikev2 g^x e1 47 2c d5 f5 45 3c 00 11 d4 1f 84 61 b8 f1 04 | ikev2 g^x fb 90 dc 8a 6c 66 1c a2 30 6a 74 1f ab 66 b1 84 | ikev2 g^x d7 b4 5a ef a0 9a f2 72 32 b7 05 ac 32 be 29 ab | ikev2 g^x f5 fd d0 b4 26 2e 08 9b f4 e6 30 ae a7 38 30 21 | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 51 ce ef f2 75 41 8b 68 df 93 8c 40 d9 7b 58 fd | IKEv2 nonce 3b 35 84 b8 48 7a 28 13 ee d4 9f 84 78 f2 6c e3 | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f3 ba fb 39 a0 6d aa 9b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 0e | natd_hash: port= 01 f4 | natd_hash: hash= 74 be bb 4b fb 68 df d5 84 df 76 9e 60 25 a9 1c | natd_hash: hash= de 34 76 1d | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 74 be bb 4b fb 68 df d5 84 df 76 9e 60 25 a9 1c | Notify data de 34 76 1d | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= f3 ba fb 39 a0 6d aa 9b | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= 90 f0 a5 6e 28 7a dc 53 c0 ae 7c b6 a4 4c 57 62 | natd_hash: hash= 61 16 fb b6 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 90 f0 a5 6e 28 7a dc 53 c0 ae 7c b6 a4 4c 57 62 | Notify data 61 16 fb b6 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #539 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #539 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #539 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #539: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #539 to 4294967295 after switching state | Message ID: IKE #539 skipping update_recv as MD is fake | Message ID: sent #539 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-14" #539: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.14:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #539) | f3 ba fb 39 a0 6d aa 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 bb d0 0a e4 91 67 ed 30 3c 0b a8 5b 47 6e 58 | 54 a6 1f 2c 4e 7f d0 b0 bd e3 fb 18 4b 44 d6 1a | e7 86 6e da c5 94 ab b3 8d 6a 0d 7a e8 8e da 48 | 7f dc 72 ca c7 8b 8f e2 4b c2 09 25 60 11 ac 5f | ec 6f 9d 98 47 5c 60 fe c1 7b f0 93 49 fd ed 12 | b4 19 6a d0 14 ce f0 70 42 3f 04 32 d9 04 2f b2 | ca 5d 42 18 c3 28 44 0e 3f 08 71 5a c8 bd 7b 85 | a2 71 ba 72 c1 49 94 26 a9 aa 95 8a 17 20 47 31 | 6d db 6f 70 0f 42 41 97 8e fc 16 21 2d b2 dd 9c | 7c e3 bd 45 5f 99 25 ca 3b 09 1b ee c5 5d c9 18 | 96 1d d7 d1 61 c8 0b 67 e4 93 1e ef 62 98 f5 94 | 75 89 49 0d 58 ec c4 e6 07 56 cd e4 b6 53 c7 69 | e1 47 2c d5 f5 45 3c 00 11 d4 1f 84 61 b8 f1 04 | fb 90 dc 8a 6c 66 1c a2 30 6a 74 1f ab 66 b1 84 | d7 b4 5a ef a0 9a f2 72 32 b7 05 ac 32 be 29 ab | f5 fd d0 b4 26 2e 08 9b f4 e6 30 ae a7 38 30 21 | 29 00 00 24 51 ce ef f2 75 41 8b 68 df 93 8c 40 | d9 7b 58 fd 3b 35 84 b8 48 7a 28 13 ee d4 9f 84 | 78 f2 6c e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 be bb 4b fb 68 df d5 84 df 76 9e | 60 25 a9 1c de 34 76 1d 00 00 00 1c 00 00 40 05 | 90 f0 a5 6e 28 7a dc 53 c0 ae 7c b6 a4 4c 57 62 | 61 16 fb b6 | state #539 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb354044a20 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab3940 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3940 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #539 | libevent_malloc: new ptr-libevent@0x7fb35c05c110 size 128 | #539 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.306662 | resume sending helper answer for #539 suppresed complete_v2_state_transition() and stole MD | #539 spent 0.431 milliseconds in resume sending helper answer | stop processing: state #539 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb374054140 | processing resume sending helper answer for #523 | start processing: state #523 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in resume_handler() at server.c:797) | crypto helper 0 replies to request ID 523 | calling continuation function 0x557d44ed6630 | ikev2_parent_outI1_continue for #523 | **emit ISAKMP Message: | initiator cookie: | 07 bb ac 77 0a 7b 9b 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: ISAKMP_NEXT_NONE (0x0) | ISAKMP version: IKEv2 version 2.0 (rfc4306/rfc5996) (0x20) | exchange type: ISAKMP_v2_IKE_SA_INIT (0x22) | flags: ISAKMP_FLAG_v2_IKE_INIT (0x8) | Message ID: 0 (0x0) | next payload chain: saving message location 'ISAKMP Message'.'next payload type' | using existing local IKE proposals for connection road-eastnet-nonat-49 (IKE SA initiator emitting local proposals): 1:IKE:ENCR=AES_CBC_256,AES_CBC_128;PRF=HMAC_SHA1;INTEG=HMAC_SHA1_96;DH=MODP2048 | Emitting ikev2_proposals ... | ***emit IKEv2 Security Association Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | next payload chain: setting previous 'ISAKMP Message'.'next payload type' to current IKEv2 Security Association Payload (33:ISAKMP_NEXT_v2SA) | next payload chain: saving location 'IKEv2 Security Association Payload'.'next payload type' in 'reply packet' | ****emit IKEv2 Proposal Substructure Payload: | last proposal: v2_PROPOSAL_LAST (0x0) | prop #: 1 (0x1) | proto ID: IKEv2_SEC_PROTO_IKE (0x1) | spi size: 0 (0x0) | # transforms: 5 (0x5) | last substructure: saving location 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 256 (0x100) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_ENCR (0x1) | IKEv2 transform ID: AES_CBC (0xc) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | ******emit IKEv2 Attribute Substructure Payload: | af+type: AF+IKEv2_KEY_LENGTH (0x800e) | length/value: 128 (0x80) | emitting length of IKEv2 Transform Substructure Payload: 12 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_PRF (0x2) | IKEv2 transform ID: PRF_HMAC_SHA1 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_NON_LAST (0x3) | IKEv2 transform type: TRANS_TYPE_INTEG (0x3) | IKEv2 transform ID: AUTH_HMAC_SHA1_96 (0x2) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | *****emit IKEv2 Transform Substructure Payload: | last transform: v2_TRANSFORM_LAST (0x0) | IKEv2 transform type: TRANS_TYPE_DH (0x4) | IKEv2 transform ID: OAKLEY_GROUP_MODP2048 (0xe) | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is v2_TRANSFORM_NON_LAST (0x3) | last substructure: saving location 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' | emitting length of IKEv2 Transform Substructure Payload: 8 | emitting length of IKEv2 Proposal Substructure Payload: 56 | last substructure: checking 'IKEv2 Proposal Substructure Payload'.'IKEv2 Transform Substructure Payload'.'last transform' is 0 | emitting length of IKEv2 Security Association Payload: 60 | last substructure: checking 'IKEv2 Security Association Payload'.'IKEv2 Proposal Substructure Payload'.'last proposal' is 0 | ***emit IKEv2 Key Exchange Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | DH group: OAKLEY_GROUP_MODP2048 (0xe) | next payload chain: setting previous 'IKEv2 Security Association Payload'.'next payload type' to current IKEv2 Key Exchange Payload (34:ISAKMP_NEXT_v2KE) | next payload chain: saving location 'IKEv2 Key Exchange Payload'.'next payload type' in 'reply packet' | emitting 256 raw bytes of ikev2 g^x into IKEv2 Key Exchange Payload | ikev2 g^x 22 32 2d 24 90 2e 75 6c 89 41 22 7c 04 93 61 b1 | ikev2 g^x 39 9b 32 4d 26 76 8c 24 bc 2d ac ee b2 3a 1d 13 | ikev2 g^x 80 14 c2 ce e8 90 ed e7 ec 82 33 fc cf 75 5a 59 | ikev2 g^x 9b c2 1e 9a ce 67 9e d0 32 1d df 06 30 99 8f 42 | ikev2 g^x e3 86 8d f2 a6 5e 6c 60 43 e3 54 7f 8e 10 64 f2 | ikev2 g^x 09 cd aa b7 1e 85 a0 06 7d 3a ff 7a a3 a4 14 fb | ikev2 g^x ff e9 1f 06 7e ad ad 41 ac 22 2e 81 48 aa 18 5d | ikev2 g^x 46 d1 2e ee d8 cb c5 80 a9 94 af ab 7d 0a 94 dd | ikev2 g^x 5d d1 aa 92 aa ee bb 06 90 ba f8 2f 6b 05 81 8b | ikev2 g^x c1 e1 46 3c 9a 94 f0 1c d0 2e 48 d8 93 0d 01 e6 | ikev2 g^x 42 b1 eb d7 08 a6 f8 5f 35 b3 a8 51 ff 1a 28 27 | ikev2 g^x a9 2e 3b 94 f9 50 49 28 9e 67 8b 4b 2e 25 e2 75 | ikev2 g^x a6 af 7a bc 8e e8 70 b4 b8 23 7e 7a 37 d6 c9 3a | ikev2 g^x e0 69 41 d0 87 31 ed a3 a3 e6 b4 1c 66 5c da e4 | ikev2 g^x 72 e0 33 43 7a 69 31 25 86 69 bf c1 c5 6f bd 27 | ikev2 g^x b9 80 4c 20 7c 9b 47 3c 48 70 66 96 58 bd 89 9f | emitting length of IKEv2 Key Exchange Payload: 264 | ***emit IKEv2 Nonce Payload: | next payload type: ISAKMP_NEXT_v2N (0x29) | flags: none (0x0) | next payload chain: ignoring supplied 'IKEv2 Nonce Payload'.'next payload type' value 41:ISAKMP_NEXT_v2N | next payload chain: setting previous 'IKEv2 Key Exchange Payload'.'next payload type' to current IKEv2 Nonce Payload (40:ISAKMP_NEXT_v2Ni) | next payload chain: saving location 'IKEv2 Nonce Payload'.'next payload type' in 'reply packet' | emitting 32 raw bytes of IKEv2 nonce into IKEv2 Nonce Payload | IKEv2 nonce 65 25 bd 90 0a 47 32 65 7b ff a5 6e a2 70 3c 06 | IKEv2 nonce 64 54 94 9b 0c 9e 4e c1 38 45 e7 b8 1b aa f1 7b | emitting length of IKEv2 Nonce Payload: 36 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_IKEV2_FRAGMENTATION_SUPPORTED (0x402e) | next payload chain: setting previous 'IKEv2 Nonce Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting length of IKEv2 Notify Payload: 8 | NAT-Traversal support [enabled] add v2N payloads. | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 07 bb ac 77 0a 7b 9b 5e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 03 31 | natd_hash: port= 01 f4 | natd_hash: hash= 06 c1 b5 e9 b8 b6 f1 9f 93 d5 2c a0 2c fe 30 59 | natd_hash: hash= be 37 e1 f4 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_SOURCE_IP (0x4004) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data 06 c1 b5 e9 b8 b6 f1 9f 93 d5 2c a0 2c fe 30 59 | Notify data be 37 e1 f4 | emitting length of IKEv2 Notify Payload: 28 | natd_hash: rcookie is zero | natd_hash: hasher=0x557d44fac7a0(20) | natd_hash: icookie= 07 bb ac 77 0a 7b 9b 5e | natd_hash: rcookie= 00 00 00 00 00 00 00 00 | natd_hash: ip= c0 01 02 17 | natd_hash: port= 01 f4 | natd_hash: hash= a9 4a 22 b0 e8 8c 8d 17 4d 42 81 df a3 74 1f 8f | natd_hash: hash= e6 9c ea 37 | Adding a v2N Payload | ***emit IKEv2 Notify Payload: | next payload type: ISAKMP_NEXT_v2NONE (0x0) | flags: none (0x0) | Protocol ID: PROTO_v2_RESERVED (0x0) | SPI size: 0 (0x0) | Notify Message Type: v2N_NAT_DETECTION_DESTINATION_IP (0x4005) | next payload chain: setting previous 'IKEv2 Notify Payload'.'next payload type' to current IKEv2 Notify Payload (41:ISAKMP_NEXT_v2N) | next payload chain: saving location 'IKEv2 Notify Payload'.'next payload type' in 'reply packet' | emitting 20 raw bytes of Notify data into IKEv2 Notify Payload | Notify data a9 4a 22 b0 e8 8c 8d 17 4d 42 81 df a3 74 1f 8f | Notify data e6 9c ea 37 | emitting length of IKEv2 Notify Payload: 28 | emitting length of ISAKMP Message: 452 | stop processing: state #523 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in ikev2_parent_outI1_common() at ikev2_parent.c:817) | start processing: state #523 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in complete_v2_state_transition() at ikev2.c:3376) | #523 complete_v2_state_transition() PARENT_I0->PARENT_I1 with status STF_OK | IKEv2: transition from state STATE_PARENT_I0 to state STATE_PARENT_I1 | parent state #523: PARENT_I0(ignore) => PARENT_I1(half-open IKE SA) | Message ID: updating counters for #523 to 4294967295 after switching state | Message ID: IKE #523 skipping update_recv as MD is fake | Message ID: sent #523 request 0; ike: initiator.sent=-1->0 initiator.recv=-1 responder.sent=-1 responder.recv=-1 wip.initiator=-1->0 wip.responder=-1 "road-eastnet-nonat-49" #523: STATE_PARENT_I1: sent v2I1, expected v2R1 | sending V2 reply packet to 192.1.2.23:500 (from 192.1.3.49:500) | sending 452 bytes for STATE_PARENT_I0 through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #523) | 07 bb ac 77 0a 7b 9b 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 32 2d 24 90 2e 75 6c 89 41 22 7c 04 93 61 b1 | 39 9b 32 4d 26 76 8c 24 bc 2d ac ee b2 3a 1d 13 | 80 14 c2 ce e8 90 ed e7 ec 82 33 fc cf 75 5a 59 | 9b c2 1e 9a ce 67 9e d0 32 1d df 06 30 99 8f 42 | e3 86 8d f2 a6 5e 6c 60 43 e3 54 7f 8e 10 64 f2 | 09 cd aa b7 1e 85 a0 06 7d 3a ff 7a a3 a4 14 fb | ff e9 1f 06 7e ad ad 41 ac 22 2e 81 48 aa 18 5d | 46 d1 2e ee d8 cb c5 80 a9 94 af ab 7d 0a 94 dd | 5d d1 aa 92 aa ee bb 06 90 ba f8 2f 6b 05 81 8b | c1 e1 46 3c 9a 94 f0 1c d0 2e 48 d8 93 0d 01 e6 | 42 b1 eb d7 08 a6 f8 5f 35 b3 a8 51 ff 1a 28 27 | a9 2e 3b 94 f9 50 49 28 9e 67 8b 4b 2e 25 e2 75 | a6 af 7a bc 8e e8 70 b4 b8 23 7e 7a 37 d6 c9 3a | e0 69 41 d0 87 31 ed a3 a3 e6 b4 1c 66 5c da e4 | 72 e0 33 43 7a 69 31 25 86 69 bf c1 c5 6f bd 27 | b9 80 4c 20 7c 9b 47 3c 48 70 66 96 58 bd 89 9f | 29 00 00 24 65 25 bd 90 0a 47 32 65 7b ff a5 6e | a2 70 3c 06 64 54 94 9b 0c 9e 4e c1 38 45 e7 b8 | 1b aa f1 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 c1 b5 e9 b8 b6 f1 9f 93 d5 2c a0 | 2c fe 30 59 be 37 e1 f4 00 00 00 1c 00 00 40 05 | a9 4a 22 b0 e8 8c 8d 17 4d 42 81 df a3 74 1f 8f | e6 9c ea 37 | state #523 requesting EVENT_CRYPTO_TIMEOUT to be deleted | libevent_free: release ptr-libevent@0x7fb34c0180b0 | free_event_entry: release EVENT_CRYPTO_TIMEOUT-pe@0x557d46ab7a80 | success_v2_state_transition scheduling EVENT_RETRANSMIT of c->r_interval=500ms | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374014870 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #523 | libevent_malloc: new ptr-libevent@0x7fb374054140 size 128 | #523 STATE_PARENT_I1: retransmits: first event in 0.5 seconds; timeout in 60 seconds; limit of 12 retransmits; current time is 49720.307146 | resume sending helper answer for #523 suppresed complete_v2_state_transition() and stole MD | #523 spent 0.456 milliseconds in resume sending helper answer | stop processing: state #523 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in resume_handler() at server.c:833) | libevent_free: release ptr-libevent@0x7fb38404e8e0 | libevent_realloc: release ptr-libevent@0x557d468b6ac0 | libevent_realloc: new ptr-libevent@0x557d46a1a770 size 768 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce 20 34 a6 bb f7 7e 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #520 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #520 | rejected packet: | ce 20 34 a6 bb f7 7e 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 84 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-132" #520: ERROR: asynchronous network error report on eth0 (192.1.3.132:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0665 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be 68 21 bf 92 3b bd 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #656 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #656 | rejected packet: | be 68 21 bf 92 3b bd 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #656: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0562 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2e 33 4d 73 be a7 0e 6b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #720 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #720 | rejected packet: | 2e 33 4d 73 be a7 0e 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-182" #720: ERROR: asynchronous network error report on eth0 (192.1.3.182:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0521 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 09 53 dc c6 ab 63 da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #732 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #732 | rejected packet: | d0 09 53 dc c6 ab 63 da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #732: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0563 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df ac 39 b5 f9 b7 7d 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #745 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #745 | rejected packet: | df ac 39 b5 f9 b7 7d 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #745: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0527 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 62 ac e1 dc 78 47 49 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #741 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #741 | rejected packet: | 62 ac e1 dc 78 47 49 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #741: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0528 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 05 2d 15 eb 8d d1 e7 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #755 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #755 | rejected packet: | 05 2d 15 eb 8d d1 e7 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #755: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0539 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 64 20 5b 1c 85 54 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #752 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #752 | rejected packet: | c5 64 20 5b 1c 85 54 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #752: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0529 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 c3 80 a5 94 99 7d 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #753 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #753 | rejected packet: | 43 c3 80 a5 94 99 7d 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #753: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0517 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 ea d6 a0 2f c9 a3 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #705 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #705 | rejected packet: | e4 ea d6 a0 2f c9 a3 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #705: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0548 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba fc 0a 40 dd 57 2f 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #754 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #754 | rejected packet: | ba fc 0a 40 dd 57 2f 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #754: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0544 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab b5 91 0b be 67 d7 85 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #756 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #756 | rejected packet: | ab b5 91 0b be 67 d7 85 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #756: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.054 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a6 bf d2 f8 ac 64 24 19 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #747 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #747 | rejected packet: | a6 bf d2 f8 ac 64 24 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-248" #747: ERROR: asynchronous network error report on eth0 (192.1.3.248:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0537 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 da f7 c5 2f 91 5f 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #723 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #723 | rejected packet: | 36 da f7 c5 2f 91 5f 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #723: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0547 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 e3 5f af 64 96 c1 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #748 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #748 | rejected packet: | 55 e3 5f af 64 96 c1 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #748: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.058 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 25 78 f8 28 10 61 9d 6a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #738 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #738 | rejected packet: | 25 78 f8 28 10 61 9d 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-228" #738: ERROR: asynchronous network error report on eth0 (192.1.3.228:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0537 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | aa d5 b7 9d 2c 2d ce cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #722 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #722 | rejected packet: | aa d5 b7 9d 2c 2d ce cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #722: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0543 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce 83 a7 9c 1c 97 2e 39 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #687 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #687 | rejected packet: | ce 83 a7 9c 1c 97 2e 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 75 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-117" #687: ERROR: asynchronous network error report on eth0 (192.1.3.117:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0538 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 e8 20 43 a8 88 d4 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #719 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #719 | rejected packet: | a1 e8 20 43 a8 88 d4 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #719: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0546 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 21 cc df 44 fb 91 db 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #749 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #749 | rejected packet: | 21 cc df 44 fb 91 db 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #749: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0574 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0c d9 0f fe b0 de fb 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #726 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #726 | rejected packet: | 0c d9 0f fe b0 de fb 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #726: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0546 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab 34 f4 95 81 ed c2 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #742 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #742 | rejected packet: | ab 34 f4 95 81 ed c2 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ca 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-202" #742: ERROR: asynchronous network error report on eth0 (192.1.3.202:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0535 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e2 d2 81 3a 91 66 0b 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #721 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #721 | rejected packet: | e2 d2 81 3a 91 66 0b 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #721: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0563 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ea 7c f7 bc 9d b4 d4 c6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #744 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #744 | rejected packet: | ea 7c f7 bc 9d b4 d4 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-209" #744: ERROR: asynchronous network error report on eth0 (192.1.3.209:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0544 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e9 cc 03 7c e4 bf 38 4d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #717 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #717 | rejected packet: | e9 cc 03 7c e4 bf 38 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-195" #717: ERROR: asynchronous network error report on eth0 (192.1.3.195:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0537 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 19 f5 78 1f 7f 61 d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #739 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #739 | rejected packet: | df 19 f5 78 1f 7f 61 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-224" #739: ERROR: asynchronous network error report on eth0 (192.1.3.224:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0553 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 cc 63 e1 75 96 2f 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #716 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #716 | rejected packet: | 15 cc 63 e1 75 96 2f 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #716: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.055 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 c6 fb f7 91 6b fb df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #750 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #750 | rejected packet: | 66 c6 fb f7 91 6b fb df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #750: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0539 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c0 b4 40 a7 90 2d ff 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #733 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #733 | rejected packet: | c0 b4 40 a7 90 2d ff 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #733: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0547 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 68 6a 0b 04 fc 21 19 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #743 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #743 | rejected packet: | 33 68 6a 0b 04 fc 21 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #743: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0549 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 89 83 1d 48 ce 70 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #735 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #735 | rejected packet: | 53 89 83 1d 48 ce 70 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #735: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0535 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 62 bc 01 e6 ef 5b 20 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #737 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #737 | rejected packet: | 62 bc 01 e6 ef 5b 20 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #737: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0593 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | libevent_realloc: release ptr-libevent@0x557d46a1a770 | libevent_realloc: new ptr-libevent@0x557d46a1a770 size 1536 recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 37 f9 ef 73 ab 62 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #746 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #746 | rejected packet: | f7 37 f9 ef 73 ab 62 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #746: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0545 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b 68 e9 bf c7 97 07 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #740 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #740 | rejected packet: | 1b 68 e9 bf c7 97 07 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #740: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0537 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae b9 96 92 13 03 18 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #751 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #751 | rejected packet: | ae b9 96 92 13 03 18 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #751: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0549 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 64 65 78 b0 09 88 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #688 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #688 | rejected packet: | df 64 65 78 b0 09 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #688: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0536 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 5e 88 2e 86 68 44 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #725 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #725 | rejected packet: | 64 5e 88 2e 86 68 44 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #725: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0541 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 67 a1 5b 23 16 28 fb 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #729 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #729 | rejected packet: | 67 a1 5b 23 16 28 fb 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-240" #729: ERROR: asynchronous network error report on eth0 (192.1.3.240:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0565 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 ad 8f c6 54 da 73 f6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #734 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #734 | rejected packet: | 14 ad 8f c6 54 da 73 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ae 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-174" #734: ERROR: asynchronous network error report on eth0 (192.1.3.174:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0537 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 93 98 4a 9e f6 25 19 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #714 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #714 | rejected packet: | 93 98 4a 9e f6 25 19 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #714: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0537 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 f3 33 9b b4 5a 7a db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #715 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #715 | rejected packet: | 87 f3 33 9b b4 5a 7a db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #715: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0556 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 f4 27 9b 2c 7e 0c 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #736 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #736 | rejected packet: | 55 f4 27 9b 2c 7e 0c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #736: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0538 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c1 b9 1a 2f a2 98 4a 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #730 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #730 | rejected packet: | c1 b9 1a 2f a2 98 4a 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #730: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0531 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb e9 70 00 69 c5 c4 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #731 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #731 | rejected packet: | eb e9 70 00 69 c5 c4 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #731: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0558 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b be 7d ad 6e 47 4b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #727 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #727 | rejected packet: | 8b be 7d ad 6e 47 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #727: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0544 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 de dd ae 1b 33 3b 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #711 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #711 | rejected packet: | 46 de dd ae 1b 33 3b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ba 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-186" #711: ERROR: asynchronous network error report on eth0 (192.1.3.186:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.054 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed 95 ac b7 77 3a 63 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #728 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #728 | rejected packet: | ed 95 ac b7 77 3a 63 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-216" #728: ERROR: asynchronous network error report on eth0 (192.1.3.216:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0556 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 dc 25 60 99 b6 74 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #713 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #713 | rejected packet: | 20 dc 25 60 99 b6 74 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #713: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0531 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7b d9 27 49 fc 2f 27 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #667 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #667 | rejected packet: | 7b d9 27 49 fc 2f 27 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #667: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0549 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e0 29 5a 0a 61 0a 1e b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #685 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #685 | rejected packet: | e0 29 5a 0a 61 0a 1e b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #685: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0556 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 90 67 40 0b c3 60 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #703 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #703 | rejected packet: | ae 90 67 40 0b c3 60 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #703: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0534 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 ff 7d bb ae e4 ff 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #696 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #696 | rejected packet: | a2 ff 7d bb ae e4 ff 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #696: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0535 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 54 dd ed 5a b3 6d d4 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #710 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #710 | rejected packet: | 54 dd ed 5a b3 6d d4 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-208" #710: ERROR: asynchronous network error report on eth0 (192.1.3.208:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.054 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 51 a3 6f 68 f7 9e 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #672 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #672 | rejected packet: | 8a 51 a3 6f 68 f7 9e 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #672: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0542 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fe 13 79 f4 87 18 7a 07 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #684 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #684 | rejected packet: | fe 13 79 f4 87 18 7a 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-168" #684: ERROR: asynchronous network error report on eth0 (192.1.3.168:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0542 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f 4b 14 c1 cc 6f 1e 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #678 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #678 | rejected packet: | 6f 4b 14 c1 cc 6f 1e 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 29 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-41" #678: ERROR: asynchronous network error report on eth0 (192.1.3.41:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0574 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f5 24 ca cb ba 88 21 d6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #680 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #680 | rejected packet: | f5 24 ca cb ba 88 21 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-111" #680: ERROR: asynchronous network error report on eth0 (192.1.3.111:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0542 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a5 d8 1b 6e 95 a0 38 ac | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #690 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #690 | rejected packet: | a5 d8 1b 6e 95 a0 38 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-76" #690: ERROR: asynchronous network error report on eth0 (192.1.3.76:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0547 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 4a f0 3d b4 3d 3c 25 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #673 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #673 | rejected packet: | f4 4a f0 3d b4 3d 3c 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 98 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-152" #673: ERROR: asynchronous network error report on eth0 (192.1.3.152:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0486 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0e 55 f5 b3 fd c8 f6 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #694 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #694 | rejected packet: | 0e 55 f5 b3 fd c8 f6 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-229" #694: ERROR: asynchronous network error report on eth0 (192.1.3.229:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0365 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | af 67 24 f2 d5 c7 bc 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #695 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #695 | rejected packet: | af 67 24 f2 d5 c7 bc 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-197" #695: ERROR: asynchronous network error report on eth0 (192.1.3.197:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0358 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 28 cf ed 60 7e b1 e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #697 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #697 | rejected packet: | d6 28 cf ed 60 7e b1 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-201" #697: ERROR: asynchronous network error report on eth0 (192.1.3.201:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0372 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 00 c1 02 d2 ce 58 22 c3 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #700 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #700 | rejected packet: | 00 c1 02 d2 ce 58 22 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 69 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-105" #700: ERROR: asynchronous network error report on eth0 (192.1.3.105:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0487 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 4e 2c b0 bf cf 55 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #707 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #707 | rejected packet: | 6d 4e 2c b0 bf cf 55 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #707: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0393 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 21 56 6d 63 c6 05 f9 0e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #689 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #689 | rejected packet: | 21 56 6d 63 c6 05 f9 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-74" #689: ERROR: asynchronous network error report on eth0 (192.1.3.74:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.038 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 f5 25 c3 13 f8 3e d2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #702 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #702 | rejected packet: | 15 f5 25 c3 13 f8 3e d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-198" #702: ERROR: asynchronous network error report on eth0 (192.1.3.198:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0363 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8c cd 5b 89 3d b1 c0 87 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #693 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #693 | rejected packet: | 8c cd 5b 89 3d b1 c0 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-156" #693: ERROR: asynchronous network error report on eth0 (192.1.3.156:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0357 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9b 3e ad 4d 72 f4 8b db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #676 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #676 | rejected packet: | 9b 3e ad 4d 72 f4 8b db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 61 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-97" #676: ERROR: asynchronous network error report on eth0 (192.1.3.97:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 18 05 4d c7 59 29 89 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #692 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #692 | rejected packet: | cc 18 05 4d c7 59 29 89 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #692: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0362 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 ad 39 62 89 bc a6 af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #701 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #701 | rejected packet: | 68 ad 39 62 89 bc a6 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #701: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0359 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 d8 43 4c ca 0f 15 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #668 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #668 | rejected packet: | 69 d8 43 4c ca 0f 15 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #668: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0376 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c4 c6 34 70 7c 35 e5 1e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #674 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #674 | rejected packet: | c4 c6 34 70 7c 35 e5 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-124" #674: ERROR: asynchronous network error report on eth0 (192.1.3.124:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0361 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be 95 5c 7b 40 76 8c 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #661 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #661 | rejected packet: | be 95 5c 7b 40 76 8c 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-154" #661: ERROR: asynchronous network error report on eth0 (192.1.3.154:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0361 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cf 5e f3 d9 0f 8f c8 69 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #634 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #634 | rejected packet: | cf 5e f3 d9 0f 8f c8 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-221" #634: ERROR: asynchronous network error report on eth0 (192.1.3.221:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0372 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b6 7b 13 e2 c1 f5 0d 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #621 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #621 | rejected packet: | b6 7b 13 e2 c1 f5 0d 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #621: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0362 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0c 20 e9 c8 f1 ce 0d 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #645 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #645 | rejected packet: | 0c 20 e9 c8 f1 ce 0d 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-159" #645: ERROR: asynchronous network error report on eth0 (192.1.3.159:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0361 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4c ec 39 dc 68 b5 59 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #618 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #618 | rejected packet: | 4c ec 39 dc 68 b5 59 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #618: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0366 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 ab aa e9 c0 1d b7 c7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #595 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #595 | rejected packet: | 66 ab aa e9 c0 1d b7 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 45 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-69" #595: ERROR: asynchronous network error report on eth0 (192.1.3.69:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0364 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 6f 1b dd c3 97 a8 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #660 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #660 | rejected packet: | f4 6f 1b dd c3 97 a8 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #660: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0358 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a9 15 25 50 c3 89 9b ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #647 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #647 | rejected packet: | a9 15 25 50 c3 89 9b ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #647: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0369 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 3d 2a c0 99 78 dc 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #648 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #648 | rejected packet: | b9 3d 2a c0 99 78 dc 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #648: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0356 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 19 90 a9 40 6e 35 eb 8e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #653 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #653 | rejected packet: | 19 90 a9 40 6e 35 eb 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #653: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0361 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 13 d7 c6 41 b2 86 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #612 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #612 | rejected packet: | 06 13 d7 c6 41 b2 86 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #612: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0366 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 33 64 e2 99 22 09 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #650 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #650 | rejected packet: | 26 33 64 e2 99 22 09 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #650: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0356 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 de 2b d7 45 9f 26 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #644 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #644 | rejected packet: | 50 de 2b d7 45 9f 26 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #644: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0357 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 7a 0a 38 ed 45 0a 7e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #643 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #643 | rejected packet: | a4 7a 0a 38 ed 45 0a 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #643: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0367 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 ae e8 62 0b 46 de 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #617 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #617 | rejected packet: | a7 ae e8 62 0b 46 de 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #617: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 a3 fd 1e a8 25 3d 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #631 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #631 | rejected packet: | 70 a3 fd 1e a8 25 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #631: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0372 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 c4 ab 3f 0f 4d 11 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #606 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #606 | rejected packet: | 23 c4 ab 3f 0f 4d 11 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 df 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-223" #606: ERROR: asynchronous network error report on eth0 (192.1.3.223:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0372 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b6 55 6c 1f f7 96 4e 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #649 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #649 | rejected packet: | b6 55 6c 1f f7 96 4e 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #649: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0358 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 5e ee 0b 7f 6c a7 3a d8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #654 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #654 | rejected packet: | 5e ee 0b 7f 6c a7 3a d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 70 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-112" #654: ERROR: asynchronous network error report on eth0 (192.1.3.112:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0356 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e2 44 b3 0f 15 7b db fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #614 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #614 | rejected packet: | e2 44 b3 0f 15 7b db fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #614: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0369 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 0d 8c df c3 48 2b 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #635 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #635 | rejected packet: | 7e 0d 8c df c3 48 2b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #635: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0496 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d3 af ea 9d a0 c8 f5 7f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #589 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #589 | rejected packet: | d3 af ea 9d a0 c8 f5 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 37 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-55" #589: ERROR: asynchronous network error report on eth0 (192.1.3.55:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 02 06 51 b1 9f 6a a2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #594 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #594 | rejected packet: | 14 02 06 51 b1 9f 6a a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 51 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-81" #594: ERROR: asynchronous network error report on eth0 (192.1.3.81:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0602 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9c 9a a9 b6 8a 18 20 aa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #604 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #604 | rejected packet: | 9c 9a a9 b6 8a 18 20 aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #604: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0549 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b5 8b 9d 63 05 76 9b 43 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #600 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #600 | rejected packet: | b5 8b 9d 63 05 76 9b 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 80 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-128" #600: ERROR: asynchronous network error report on eth0 (192.1.3.128:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0575 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c9 b5 3a 18 c3 59 d6 00 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #598 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #598 | rejected packet: | c9 b5 3a 18 c3 59 d6 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 59 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-89" #598: ERROR: asynchronous network error report on eth0 (192.1.3.89:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0556 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 4a 37 cb 1c b9 ae 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #582 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #582 | rejected packet: | 36 4a 37 cb 1c b9 ae 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-127" #582: ERROR: asynchronous network error report on eth0 (192.1.3.127:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.055 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 5c 91 a2 a0 c7 d5 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #571 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #571 | rejected packet: | a7 5c 91 a2 a0 c7 d5 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #571: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0573 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2f d3 42 a8 8e fb 16 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #564 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #564 | rejected packet: | 2f d3 42 a8 8e fb 16 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-44" #564: ERROR: asynchronous network error report on eth0 (192.1.3.44:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0589 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | fd 31 e4 af 59 3e ae 30 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #555 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #555 | rejected packet: | fd 31 e4 af 59 3e ae 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 85 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-133" #555: ERROR: asynchronous network error report on eth0 (192.1.3.133:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0583 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 e4 97 ab 5f cb 91 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #588 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #588 | rejected packet: | 07 e4 97 ab 5f cb 91 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #588: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 0c 73 4d 95 6b fc 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #593 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #593 | rejected packet: | 08 0c 73 4d 95 6b fc 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #593: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0544 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 bb c0 cb 23 86 64 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #532 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #532 | rejected packet: | b2 bb c0 cb 23 86 64 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #532: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0582 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c9 60 e7 45 a7 98 e0 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #570 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #570 | rejected packet: | c9 60 e7 45 a7 98 e0 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #570: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0546 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6b b3 b7 0f 25 55 d0 22 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #546 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #546 | rejected packet: | 6b b3 b7 0f 25 55 d0 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ad 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-173" #546: ERROR: asynchronous network error report on eth0 (192.1.3.173:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.054 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c3 7c 98 3d b4 74 ab 99 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #587 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #587 | rejected packet: | c3 7c 98 3d b4 74 ab 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 71 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-113" #587: ERROR: asynchronous network error report on eth0 (192.1.3.113:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0568 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 e2 ee c8 4f 05 0e 80 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #578 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #578 | rejected packet: | 68 e2 ee c8 4f 05 0e 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-143" #578: ERROR: asynchronous network error report on eth0 (192.1.3.143:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0578 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 57 b5 67 5d 53 5d ab | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #579 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #579 | rejected packet: | f7 57 b5 67 5d 53 5d ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #579: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0429 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 7d d5 ab c5 87 8a df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #590 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #590 | rejected packet: | 6c 7d d5 ab c5 87 8a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #590: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0382 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6e 64 73 85 ce f2 b0 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #568 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #568 | rejected packet: | 6e 64 73 85 ce f2 b0 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 22 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-34" #568: ERROR: asynchronous network error report on eth0 (192.1.3.34:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0358 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 99 36 5a 8c c2 79 57 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #575 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #575 | rejected packet: | b9 99 36 5a 8c c2 79 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-62" #575: ERROR: asynchronous network error report on eth0 (192.1.3.62:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0358 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | db ff 34 cc aa 26 9d 88 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #550 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #550 | rejected packet: | db ff 34 cc aa 26 9d 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-91" #550: ERROR: asynchronous network error report on eth0 (192.1.3.91:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.037 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0c c8 e0 5f be 01 79 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #544 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #544 | rejected packet: | 0c c8 e0 5f be 01 79 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #544: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0357 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 5a 4f 23 43 95 38 c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #562 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #562 | rejected packet: | d4 5a 4f 23 43 95 38 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #562: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0361 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 74 88 6c 2b d4 65 97 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #519 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #519 | rejected packet: | 36 74 88 6c 2b d4 65 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 44 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-68" #519: ERROR: asynchronous network error report on eth0 (192.1.3.68:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0467 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f e0 6f 00 84 26 56 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #556 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #556 | rejected packet: | 7f e0 6f 00 84 26 56 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #556: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0528 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cd 74 01 a2 39 d6 cc 4a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #536 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #536 | rejected packet: | cd 74 01 a2 39 d6 cc 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-122" #536: ERROR: asynchronous network error report on eth0 (192.1.3.122:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0584 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 51 05 ec d8 42 82 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #529 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #529 | rejected packet: | 8b 51 05 ec d8 42 82 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #529: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0587 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 38 86 43 43 f3 e1 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #557 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #557 | rejected packet: | 2d 38 86 43 43 f3 e1 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #557: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0564 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 30 94 4a d2 7d f5 c4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #531 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #531 | rejected packet: | 46 30 94 4a d2 7d f5 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #531: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0511 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 e6 33 30 14 4d d6 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #530 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #530 | rejected packet: | 92 e6 33 30 14 4d d6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #530: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0563 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 bf 59 d3 80 3d 9d 02 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #558 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #558 | rejected packet: | a0 bf 59 d3 80 3d 9d 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 09 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-9" #558: ERROR: asynchronous network error report on eth0 (192.1.3.9:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0546 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ed eb 93 f8 7e 60 de d1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #552 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #552 | rejected packet: | ed eb 93 f8 7e 60 de d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-10" #552: ERROR: asynchronous network error report on eth0 (192.1.3.10:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0655 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 19 ef 59 5e 62 c0 95 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #542 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #542 | rejected packet: | 19 ef 59 5e 62 c0 95 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 03 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-3" #542: ERROR: asynchronous network error report on eth0 (192.1.3.3:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0564 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 a9 69 6a 37 31 fe e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #547 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #547 | rejected packet: | 08 a9 69 6a 37 31 fe e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #547: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0576 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 bc bf eb 69 ec 7d 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #549 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #549 | rejected packet: | a0 bc bf eb 69 ec 7d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #549: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0623 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 61 08 83 3f 41 28 36 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #551 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #551 | rejected packet: | 6d 61 08 83 3f 41 28 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 36 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-54" #551: ERROR: asynchronous network error report on eth0 (192.1.3.54:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0594 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 3d 4d d1 1d 8f ff ea | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #535 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #535 | rejected packet: | d5 3d 4d d1 1d 8f ff ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 13 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-19" #535: ERROR: asynchronous network error report on eth0 (192.1.3.19:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0543 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2b e1 27 8d d0 52 8a f1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #540 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #540 | rejected packet: | 2b e1 27 8d d0 52 8a f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-126" #540: ERROR: asynchronous network error report on eth0 (192.1.3.126:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0545 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d c2 7d 21 ef 8d 9c cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #538 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #538 | rejected packet: | 7d c2 7d 21 ef 8d 9c cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 32 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-50" #538: ERROR: asynchronous network error report on eth0 (192.1.3.50:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0592 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9c 1d 79 9c 4b 40 5f 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #512 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #512 | rejected packet: | 9c 1d 79 9c 4b 40 5f 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-140" #512: ERROR: asynchronous network error report on eth0 (192.1.3.140:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0549 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c046090 | handling event EVENT_RETRANSMIT for parent state #516 | start processing: state #516 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #516 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #516 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #516 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.522646; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.322221 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38402d4e0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #516 | libevent_malloc: new ptr-libevent@0x7fb38404e8e0 size 128 "road-eastnet-nonat-70" #516: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #516) | b0 c4 a7 65 22 ba 71 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba a5 f4 39 29 02 0d 7f e1 ce 23 a9 bd 79 34 2c | a4 ae 82 fb f4 56 44 6d 25 c8 ad 22 1c 00 04 e4 | fa 03 ad 8f 9f af 4d b2 90 d2 16 5a 2f 17 1a 15 | 58 ad df 68 e6 e1 fb 5f 9d 90 81 c9 af 7c 31 12 | 41 4f db e0 b3 86 a3 d0 c1 ef c5 7d 64 09 1b b5 | 64 47 53 1c 1e 0a 21 b1 e4 af ee 92 77 f9 75 e1 | 5f 34 cf 58 ca 97 19 11 a0 06 51 71 71 d4 e4 f2 | 1c 41 c8 1b a2 4a a9 ba 46 a4 e3 7f 99 64 8d 28 | b1 30 c5 e4 30 76 1f 7e 89 f0 65 32 bc 49 9a 04 | b4 60 1a 1e a9 b6 fa 63 35 37 7f 30 be 1f f5 76 | ab e0 a2 6b 4f 30 d8 71 5f 4f 3d 2d 14 59 46 da | e4 b7 89 ba eb da 77 0f d4 a2 34 b8 81 a0 b1 10 | 75 99 1f 3b 28 c3 1f 1e c4 47 fa 5e ff ec d3 2c | df d5 7a ea 70 58 26 f9 8b 47 1b ff 87 16 43 25 | 36 04 57 b4 43 c6 39 70 f4 c3 6a 94 df b4 49 bf | 82 f0 08 cb c7 5f ea 63 07 18 16 54 b0 37 ab e4 | 29 00 00 24 b0 da d8 00 45 52 59 a6 aa c3 52 03 | be 63 73 c1 d3 94 57 52 b6 9e 12 41 0c ee a0 24 | 4c 09 59 fe 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 8b ad 07 50 d4 78 b4 4f 97 b0 fb | bb f6 fa fc 21 38 4b 63 00 00 00 1c 00 00 40 05 | d0 ac 8d 25 0b 65 31 b3 b0 11 22 6e da e4 14 65 | f6 1e 50 f5 | libevent_free: release ptr-libevent@0x7fb34c04e700 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c046090 | #516 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #516 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb360025210 | handling event EVENT_RETRANSMIT for parent state #511 | start processing: state #511 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #511 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #511 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #511 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.522784; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.317286 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c046090 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #511 | libevent_malloc: new ptr-libevent@0x7fb34c04e700 size 128 "road-eastnet-nonat-88" #511: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #511) | d0 cd fa e1 13 2d 20 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 50 62 2d 29 93 99 de 0e af 50 23 34 5f ad fb | 4c bf da 43 26 a3 47 17 44 42 44 91 b3 08 e0 52 | 9a 2e 33 64 a4 26 28 05 d5 00 de d9 4e 66 1b ab | 5a 6d 0e b8 94 3f 64 cb a8 67 5b 93 62 e2 29 49 | 15 ef 3f fd 0a ac 35 c6 4e 73 10 ab 4f 5d 53 8e | a4 cf e0 a6 67 4d ad 8c d1 a8 5a 9c 43 ba 9d a7 | 4c 51 1b 30 43 59 5b 25 95 48 42 6a b3 83 84 db | 91 da 84 92 79 2e e8 75 a7 77 e4 4c 0a eb 8f 66 | 34 40 55 c8 da e8 1b 72 62 30 64 22 19 0b c5 6f | bb 93 c9 c9 9e c1 e2 88 ad 0f 56 0d bb 0a ec ad | e2 01 a6 b4 88 92 57 a6 85 c2 08 b0 1f 07 9c 06 | 45 a6 f9 c7 63 ad b8 14 32 f1 4e 6c 2f f3 fa c4 | 52 99 fc 99 df 29 80 f9 cd af e8 d8 51 1d ea fc | 37 40 3b 2e 41 2d 1b 80 95 af 27 c3 07 65 8b a6 | 12 f6 45 c0 ec 6c f8 a8 51 0a 31 05 6c 78 0a ed | bf 1c 18 f5 61 de 1f a7 51 bb 0d 25 18 af fc 72 | 29 00 00 24 b3 7b 7f 54 09 ea 11 14 a2 54 1c f4 | ef 5a 78 e7 f0 13 91 b1 46 b7 6f f0 4f 4f 95 a6 | 39 1b 25 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e ea 0c f9 37 0c 35 90 90 78 51 37 | 77 43 20 7b e3 6c 0c 23 00 00 00 1c 00 00 40 05 | 2b 3e 6c 54 b9 12 19 37 d1 cc e2 3a 04 74 55 d1 | 46 7f d5 af | libevent_free: release ptr-libevent@0x7fb36004e850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360025210 | #511 spent 0.0766 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #511 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34000cc10 | handling event EVENT_RETRANSMIT for parent state #514 | start processing: state #514 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #514 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #514 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #514 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.522891; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.323111 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360025210 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #514 | libevent_malloc: new ptr-libevent@0x7fb36004e850 size 128 "road-eastnet-nonat-33" #514: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #514) | 06 7a 17 75 fd ae cb 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 5a 8f 50 94 ac f5 36 99 70 0a 59 72 e7 bd 59 | 0f 36 90 cd 5c c6 89 e0 75 bc 28 73 40 e2 7d cc | 29 c4 5a 70 07 f4 b5 86 f2 2a b0 3c a2 25 4e 6d | 20 3c ce c4 4f 4c 58 ae 19 d4 cf fe ba 7b fa f1 | f3 e2 9e 67 a4 d8 72 7c d5 14 6c e6 e7 e2 c6 3e | 8d 4b 48 dd c7 d4 8e 53 66 3c b7 1b 8d fe 66 bf | 89 1e 91 a6 67 0a 3d 11 cd 2a 13 4b 79 22 34 46 | 3b be d5 2d 70 4a 7d b9 7c b7 da 21 75 dc 69 65 | 39 db b4 a1 e9 27 93 e6 22 84 44 fb 74 c7 5b f7 | bf 99 8c 9e d0 24 31 9c 4c cb 86 84 f0 20 fe be | c1 25 55 19 f9 b6 06 e1 9a 9a e7 2d 88 3e 42 9f | 4c 92 e0 a8 c0 b6 61 d6 11 42 34 e8 2d 23 a1 54 | a1 d1 b5 28 f0 8d fb 27 b7 84 29 2c d4 6e d1 c7 | 73 d4 1e 76 c8 dc 3a df 8a b5 ac 49 f8 57 58 ac | b6 af 74 0a c9 24 9b 82 fe 27 eb 68 17 91 56 97 | 2f 25 7a 6c 33 0f 0b 13 88 c8 86 84 02 8c 9c 43 | 29 00 00 24 8d 5a c8 42 22 66 47 71 75 11 01 a3 | eb de 43 24 8a 8a 1d 52 bb a3 79 20 2f 3a 8b 28 | 46 f6 14 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 9b 53 3e 81 94 d1 35 62 13 6f 0f | f3 75 0e 22 e2 b9 70 e9 00 00 00 1c 00 00 40 05 | a7 b7 3f 67 ae fd d1 f6 b8 00 0c 14 27 04 b4 2c | 48 80 6b 64 | libevent_free: release ptr-libevent@0x7fb34004e2d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000cc10 | #514 spent 0.0735 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #514 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3880319a0 | handling event EVENT_RETRANSMIT for parent state #506 | start processing: state #506 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #506 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #506 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #506 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.522976; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.314348 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #506 | libevent_malloc: new ptr-libevent@0x7fb34004e2d0 size 128 "road-eastnet-nonat-1" #506: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #506) | 30 9a 49 1f a8 dd 2c 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 2a bc 79 dc b5 44 58 cf f7 90 44 40 11 2e 15 | 03 b5 fb 40 91 db b0 e9 cc 93 76 20 f8 11 9e 6d | 39 73 1f 61 bc bc 4e ee c9 bc 18 3d 60 7b af 0b | 75 cb a0 d6 4f 63 ef 20 98 68 71 d2 13 f7 66 7d | d4 5b 49 b9 ac 8b df e8 41 30 6e ff 20 54 14 93 | 38 ab ab 4c af e9 0c 3b ab 5e dc 5e ab 90 4b 56 | 53 3a 8a b7 18 5b 14 39 76 27 9c 20 d5 a4 eb 39 | 1a 6c 7f f0 56 06 81 af ac 7c 4a cd fd 91 a4 9c | b0 f5 14 1c 9c 19 b9 58 23 51 01 f1 e5 aa 33 2e | 85 93 d7 f3 05 7b 07 5d 5b 1e 49 80 23 cb 1b 4b | 93 19 de 20 5b c0 bb 25 ff 6a 7c bd fa 9e d4 b6 | 65 89 68 9f 60 cb 4e fc c1 67 16 12 7c fd 7e e9 | 66 f2 cd 59 d3 75 d7 f2 51 17 02 7b 63 bd 34 45 | 2a 05 0d 75 f1 dd 12 28 48 00 8c f9 1a ee 51 55 | 7e 88 c6 eb 9c 50 71 90 5e 37 9e fa ae f7 d3 be | 4f ee 4f 56 47 93 59 ae 9d 25 55 9b 6e 17 7d 42 | 29 00 00 24 d6 8b 6d 98 8d 34 54 93 4f 23 9a c7 | c6 01 a2 cc 60 f1 90 b6 c5 32 43 97 ec 6a b8 44 | 57 ec f9 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 76 28 30 1c 61 02 15 0f 11 fb 7e | be 62 eb 4a 99 5c 3d 3b 00 00 00 1c 00 00 40 05 | 7f 22 3b d3 4d cf 74 f6 af fd 39 61 cb 11 ae 8f | 0d e3 22 f7 | libevent_free: release ptr-libevent@0x7fb38804efb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3880319a0 | #506 spent 0.0678 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #506 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350018460 | handling event EVENT_RETRANSMIT for parent state #517 | start processing: state #517 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #517 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #517 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #517 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.523066; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.32294 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3880319a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #517 | libevent_malloc: new ptr-libevent@0x7fb38804efb0 size 128 "road-eastnet-nonat-52" #517: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #517) | 33 e5 d4 8b 34 40 4a 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d 50 73 53 0b 3c f1 6e 78 85 b7 58 fc 4b ba 17 | 6f 80 49 00 4f e5 51 c4 75 f5 c7 25 8f f6 8d 0c | 0b 3f 8d 1f fe 93 5e 60 24 81 0f 18 41 a0 49 31 | af 56 bf f8 e7 5b 2b a7 03 0f d4 ca d5 35 76 53 | f2 2b 65 31 41 bc b7 67 c0 bc c2 52 41 2b f8 94 | 04 88 87 86 1a 29 d6 6e 88 cb 09 a4 42 bf f7 4d | 7c 53 5b 57 b2 40 3e aa d2 e2 33 0e 70 6d 1a c0 | a8 61 dc 8e fd a0 3a 5e ba 87 2d 12 b0 e3 ba 16 | a1 1a a9 11 c0 e5 e5 f1 54 08 4c 01 f1 c6 26 4b | be a6 4f 3e 3e 89 d5 26 bc 6f ed 31 f1 ee 6b aa | d9 5e 96 b1 fa 74 49 cb 9d 97 e7 5d a6 4b d4 74 | 6b ae 88 a3 73 a4 87 0a 18 a9 6d e9 8b d7 36 fb | 0b 55 06 7d b4 78 db 17 14 99 b7 2e a7 64 89 99 | 8c be 1c fc 04 89 99 a4 2c 3b cb 1e d4 8e b5 cb | 24 1e bf 9a 75 6f 0b f5 b5 e2 c8 b5 34 36 ee 02 | af 62 28 a3 22 fa ec 90 27 af 39 54 b8 b9 0f a2 | 29 00 00 24 e2 3f 8f 34 58 87 92 57 56 c3 cd 4d | 63 8a 11 89 ae 2d aa 42 8a b1 46 78 a8 66 d5 93 | b2 cc 27 a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 05 9f 42 9e eb 36 9c 33 7d 49 87 | a2 9f 49 98 50 a4 45 37 00 00 00 1c 00 00 40 05 | 0e 29 0c 93 97 71 7f 1e 78 95 bc a8 9d 55 45 5b | 68 08 38 5d | libevent_free: release ptr-libevent@0x7fb35004e5a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350018460 | #517 spent 0.0749 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #517 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c00d120 | handling event EVENT_RETRANSMIT for parent state #528 | start processing: state #528 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #528 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #528 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #528 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.52315; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.325946 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #528 | libevent_malloc: new ptr-libevent@0x7fb35004e5a0 size 128 "road-eastnet-nonat-99" #528: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #528) | 53 19 92 95 ca 61 53 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 e5 c7 b3 7c 8d 99 d1 d7 29 a2 10 c1 b7 06 0c | 17 e9 49 3c 4a c0 5b bd 73 b3 61 f0 c5 97 1a c7 | 76 63 76 36 e9 7a 65 e8 6a 3f 9b a2 34 22 f6 b4 | 6a 88 a8 f8 7f 41 d3 72 9f 5a 88 ca 6b 48 aa 0d | 9f bb 2e af b7 64 43 c0 5f 21 ab ad ca 4c c4 bd | 11 a7 3a 9f 89 1f e1 4e cc b3 7c 12 a4 19 cf 86 | c6 87 c1 d0 2a 94 8b 9d e9 35 39 07 a6 9c a3 ed | a8 ce d3 e4 53 a5 82 df 4f 1f e0 bc b2 92 cb c6 | 39 04 f1 75 75 72 f5 1c aa 6f d5 6e 3c f8 04 ed | 37 5d a6 8b b9 ef fe 51 d8 f6 f3 f2 4d a5 ca 6d | 2e b0 a4 75 6d ce 0d 14 13 47 fc 6e 77 45 1a 17 | c4 a3 61 af 3a a4 0b d3 f5 57 8f f2 6f 78 70 d1 | c2 a7 16 f6 5c 3a 00 46 05 30 36 7f b8 3f 18 36 | 35 33 11 0a 75 c5 6f f6 65 a7 05 28 7c e1 b9 fd | 51 6f f2 9e cd 9f 64 c9 9d fe 9b c7 f0 06 55 5a | bb ef dc 4c be 29 e4 94 b5 10 3f 65 5d 8b 1c e0 | 29 00 00 24 46 b5 f0 72 e3 2a 70 ff f4 67 d5 b0 | a0 ba f1 3f 75 bf 45 d4 30 d2 c3 b1 ff a8 07 cc | a0 44 98 ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 19 8a cb f1 5b 38 5c d3 a5 bc 6a | dc b7 35 41 12 44 0c ab 00 00 00 1c 00 00 40 05 | e6 3e dd 6e 01 07 35 ad c6 0c f8 90 bb 33 8c f2 | 78 f1 d6 dc | libevent_free: release ptr-libevent@0x7fb388027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00d120 | #528 spent 0.0657 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #528 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7e4d0 | handling event EVENT_RETRANSMIT for parent state #509 | start processing: state #509 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #509 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #509 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #509 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.523231; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.326367 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #509 | libevent_malloc: new ptr-libevent@0x7fb388027c10 size 128 "road-eastnet-nonat-236" #509: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #509) | 95 a6 50 d0 80 0f 96 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 f6 dc 59 0f c4 05 31 27 1c e1 59 91 71 4f 77 | d2 6f b2 3c 4c 42 2c 05 31 c6 b9 01 b3 f9 33 cf | 31 3e d8 f2 50 a2 40 4c 26 af b9 c4 f6 6b 9c a0 | c3 09 f4 3f 7a cc f4 7f ca 62 75 a2 51 f3 85 34 | ba 40 18 72 c0 75 cb 27 ef ac 5f 7a 01 de 2e 52 | 48 88 8c 60 ad e7 5b 44 6c 1a e8 d5 6f 53 11 23 | 95 be a5 14 60 2b e4 59 8a 11 d1 b5 ed 47 f8 3f | 6d e0 61 51 79 49 84 03 99 39 af e7 46 a2 96 23 | 10 c9 ad ec 42 e4 52 ee d8 32 7d ed 3a d7 ff 92 | 1f 6f 0f 74 38 79 01 20 fa 36 e9 f1 09 08 9c 1e | 99 ae 11 ce d8 88 97 aa 9e 87 73 fa fc 1c f1 a5 | 50 45 69 bc f8 32 ab 8a a5 aa 99 3b 14 59 27 93 | aa af d8 7a 15 d5 3f 8b e4 e9 93 e5 f3 54 80 be | f8 1e 00 2e ce b6 01 59 ea 14 bb 0f 04 fa 53 df | 7b f6 52 1a 74 66 fb 6f ec f5 da 2e 36 05 f8 e1 | f8 ef 5f a4 a1 a4 e5 27 c9 45 68 7f 7b 01 52 89 | 29 00 00 24 9d 39 90 d5 1d b9 a1 ff 3d e2 2c 36 | 93 f3 ac d0 34 e1 bb 65 c7 36 8d 9f be 5b 52 2e | e0 af cd 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b a0 6c aa ff 54 d0 e4 33 5d be 4b | d4 00 1f 61 d7 8c b7 eb 00 00 00 1c 00 00 40 05 | b0 ac c8 3e be 16 32 44 b0 93 80 f1 03 a4 ee b2 | e2 ca 64 08 | libevent_free: release ptr-libevent@0x557d46b83f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | #509 spent 0.077 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #509 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348018460 | handling event EVENT_RETRANSMIT for parent state #515 | start processing: state #515 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #515 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #515 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #515 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.523343; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.322524 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #515 | libevent_malloc: new ptr-libevent@0x557d46b83f50 size 128 "road-eastnet-nonat-75" #515: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #515) | 1e 61 5a f6 8c 22 37 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 55 92 be 2b 5b 80 8f b3 a9 1d 29 a3 45 24 2c | b4 ac 16 b3 45 0f 47 41 ac 8c 89 bd 1e 8f b0 6e | 42 15 11 69 75 f6 d4 99 d3 aa cd 74 fa 86 b1 c5 | 68 d3 c8 15 10 54 b4 74 c1 a4 2b 24 6f c9 a9 9d | 25 6f 22 a2 ef 15 14 08 3b 15 a7 b9 a7 91 72 1b | 0d fc 51 4a 02 7d 07 e4 28 58 0f 09 52 04 38 5f | 70 3e 01 b9 6d 46 32 8a d3 fa e2 05 3c 1f 29 4c | 83 37 17 b1 56 48 32 71 51 18 9d f3 b3 04 79 ad | 90 59 7d 48 55 a3 92 46 ac 7d 26 6d f7 b5 44 87 | b8 ea 9c e5 b0 56 03 2c 9a 01 84 d5 30 98 07 7a | d5 ed 5c 95 9f a1 e3 64 9d 5d 5d c1 2f ee f3 c2 | 45 c0 b5 58 7b 2b 68 4d 06 07 76 b2 f3 82 a0 63 | 45 0a 18 70 71 12 a7 f5 1b f4 8c e5 99 58 7a ae | 71 6e 12 6f 9a 9e 61 a0 c1 a0 67 87 58 b1 e2 09 | f3 f3 93 cd 56 48 cd 0d 03 13 c0 9c db 17 5d 35 | 5e 83 5d 90 8d cf 6f 5f 1d 20 58 52 4c 16 b9 f8 | 29 00 00 24 8d d0 d4 e1 35 48 fc d6 75 32 21 71 | b5 c7 25 57 c3 f1 b1 56 20 08 bd ee ec 1b e0 d1 | 78 47 18 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9a 1a 58 76 c4 ef c7 77 69 86 ed 89 | 8f 43 91 04 1b c3 f4 fd 00 00 00 1c 00 00 40 05 | d2 95 59 dd 21 aa 4e e6 79 3e 78 3f 39 e9 b6 1e | 64 75 99 59 | libevent_free: release ptr-libevent@0x7fb34804e3b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348018460 | #515 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #515 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374024fd0 | handling event EVENT_RETRANSMIT for parent state #518 | start processing: state #518 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #518 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #518 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #518 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.523486; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.324007 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #518 | libevent_malloc: new ptr-libevent@0x7fb34804e3b0 size 128 "road-eastnet-nonat-45" #518: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #518) | 76 4a 29 e2 f2 d8 10 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 c8 e5 72 ad e8 a3 0b ee c0 19 d4 04 c4 59 f2 | f9 f1 ca 1e 44 30 31 b6 02 9f ea 8d f7 77 56 d9 | 34 17 5d e6 6c 33 4b fe c1 d5 87 da 08 49 a5 40 | 98 09 8f 0e 2b 61 5a 8d da 29 4b bd c0 aa 20 47 | 00 81 73 86 5a d8 e0 95 46 03 64 29 8f 09 e9 05 | 09 84 fc 9f 58 0c 86 5c df 03 a7 05 8c 64 28 10 | 34 e7 f2 6f 51 06 b7 7b d1 ca 6d cd b3 c2 7b 80 | d1 48 6c 1b c4 58 91 31 ee a7 4a 59 32 08 ac f1 | fb 22 a3 96 1a 08 94 a4 84 91 22 e8 1e b0 a5 1b | a0 ee 59 f9 33 09 49 a4 f5 f9 da 80 62 31 32 f0 | d4 2b 3c ed f7 50 71 be ae 41 93 27 28 9d 7a 12 | 34 9e 0f 57 03 18 c9 b6 fe 98 3d 22 d1 c6 fe fa | 13 55 9a 4d 9d aa b8 6e 37 5c 88 37 98 3a 93 4a | fe 8e 63 5e f1 55 52 38 2a df 4e e5 01 10 1b 19 | c9 ff a3 28 16 59 44 48 e1 e5 35 ac fe f5 c2 26 | 2f 84 3f c3 36 51 80 d7 d9 96 f6 1f 3a 61 bc 30 | 29 00 00 24 da 23 2e 07 94 56 ee 0d 82 96 38 43 | 7b 89 61 bd ba 2a 55 d7 d5 50 63 47 84 e9 fa b5 | 93 54 75 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 48 88 0f 47 92 b8 68 b9 d0 c9 2b | 02 14 06 d6 2c b1 12 61 00 00 00 1c 00 00 40 05 | a7 a4 34 d2 94 1c 56 72 07 98 0d cb 3d d8 f1 6e | 48 f0 c0 ed | libevent_free: release ptr-libevent@0x7fb374039ac0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374024fd0 | #518 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #518 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #508 | start processing: state #508 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #508 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #508 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #508 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.523612; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.317327 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374024fd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #508 | libevent_malloc: new ptr-libevent@0x7fb374039ac0 size 128 "road-eastnet-nonat-242" #508: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #508) | dc 3f 02 d2 13 45 35 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d a9 32 87 b1 90 82 93 0a 0b 68 7a df 0e cd ea | 4e 12 c3 9f a0 a0 db 88 eb 7c 77 42 14 a4 f9 02 | a9 02 c1 13 c2 56 17 b8 78 50 73 cf 37 95 03 3b | 9f a9 9f 88 fe df 99 cf a6 7c d9 96 30 f6 e3 3c | ff da a7 12 b9 67 b1 01 1e 94 44 d3 2d 66 e8 ab | 93 b4 41 cb 47 2f 3b b1 72 1a 25 46 61 80 3c 91 | fd cc 10 8b 86 fc 21 07 c7 5b 16 7a fe f3 c7 5c | b0 46 97 1c 76 a9 4b 9d 86 2e fa 04 56 7b cb a3 | b7 fe 1a 7b 4d fe 92 09 4b 17 df a9 9b 0f d4 5b | a9 06 58 5c b0 f7 c2 a4 71 cc 56 f7 a4 cb ae b4 | 36 1d de 4d 00 ad 9a ec ec ba 71 93 15 4d 0c e2 | 83 0f 23 94 d7 c2 0c 19 16 44 17 09 f4 40 84 da | 41 ec 50 fa 16 6e 50 f1 55 79 e5 0b 17 dc df d0 | 12 ca a0 4b 05 a1 a6 2c 7d 1e e6 72 04 2b 9d f5 | f1 0a bd da 88 25 7c 99 8f 11 ec b1 37 2c 76 0e | 43 b9 fb 60 6e 3f 37 47 06 8f 9f 3f 60 14 04 eb | 29 00 00 24 92 60 8e 47 54 65 21 7e 19 d2 97 01 | 48 40 e2 71 bf 81 d1 29 42 df a0 d9 5b 12 66 4f | bd 5f 3d 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 f1 6c fa bf f7 cf e9 0c 8d 98 4e | 77 aa d2 f2 40 a1 0a 37 00 00 00 1c 00 00 40 05 | bd ae 80 ba 97 bb f2 9c 7c 0e d6 fc 4b ac 9b 03 | c1 38 67 4e | libevent_free: release ptr-libevent@0x7fb378051330 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #508 spent 0.0969 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #508 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36401e230 | handling event EVENT_RETRANSMIT for parent state #524 | start processing: state #524 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #524 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #524 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #524 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.523729; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.317832 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #524 | libevent_malloc: new ptr-libevent@0x7fb378051330 size 128 "road-eastnet-nonat-29" #524: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #524) | ad da d3 24 2d 65 26 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 9b 4d af 9d 8e 16 4e 79 9d 95 9d 88 b2 5e 09 | f6 4f d0 1c b0 25 e9 93 be b2 69 1f 36 9c 49 a0 | 44 f5 dc ea 0c 18 d3 cf 65 08 01 43 ec 36 05 b8 | 2a d7 b3 3b d1 93 c2 8a 31 77 1f 9d 2c c9 a8 3a | 11 f5 95 7b c4 81 fc 5d 96 ee bd 44 15 34 22 c1 | 71 4a 5f 76 cd 57 fb 11 79 0a f5 62 1b 91 3b de | e4 fe 82 b2 18 dc c5 d3 a5 42 a7 79 6d aa 95 f6 | 00 d9 74 30 e3 e8 a8 2a 76 02 2c fb 3d 48 e4 b8 | da e6 31 2e e9 38 9e d5 03 35 33 93 c3 a5 f1 20 | f2 62 cb a8 16 a1 46 60 30 4f 28 ac 47 61 ae 14 | 02 70 2b e7 2b 16 7f f2 18 02 58 cb bf df be f3 | bd 14 94 03 17 e6 3a 05 80 08 27 04 a8 69 b6 19 | 8b 17 87 72 b2 0e 37 35 38 6c 05 37 e1 09 09 e7 | 9e 9d 08 8d 77 97 ae 5d 2b cf 0a e1 f9 c1 73 85 | fd c0 15 2b 82 a2 5c 29 27 48 fe b2 e1 3e 87 a4 | 06 6d 09 b3 f8 4c ea 61 50 a9 b2 37 a9 12 e8 76 | 29 00 00 24 58 4a df 1f 4b 4b ff 86 2f 20 df 0f | ac 70 4d 1f f0 2d 6f 07 f3 a2 91 54 47 78 60 b6 | 71 cd e8 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c dc d6 72 67 d3 e7 69 f5 94 9f 27 | 9b e1 4a 44 55 e1 6a f7 00 00 00 1c 00 00 40 05 | 4e 1f a7 8f 6a af 3d 63 0f b3 f8 d5 e1 3f a9 d4 | b3 8f 35 dc | libevent_free: release ptr-libevent@0x7fb36404ec60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36401e230 | #524 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #524 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354039e80 | handling event EVENT_RETRANSMIT for parent state #513 | start processing: state #513 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #513 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #513 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #513 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.523866; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.319104 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36401e230 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #513 | libevent_malloc: new ptr-libevent@0x7fb36404ec60 size 128 "road-eastnet-nonat-107" #513: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #513) | bd e9 59 71 3e 30 66 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b f0 aa 56 99 ad 41 e6 3a 19 67 48 fc c0 1b e2 | b0 a6 21 9e 13 7a 65 b0 01 64 d4 c2 39 16 1c a3 | 09 b7 6f 2c 8c 4c 7e 2a 7c 62 da 59 d9 c0 53 20 | 5f 82 b5 8a 0c 51 a0 6c ba 44 d8 ce 26 63 57 92 | 46 0f c3 0a ab b0 53 c3 61 49 a1 a6 7a ff cb 8c | bc 6b 3c 47 62 03 e7 80 c9 67 73 83 91 0c 93 c6 | 56 27 a3 11 5d eb 2a 88 84 eb 3e 27 a2 e6 b8 18 | 93 02 c7 f9 fc cb d2 36 3c bd c3 eb 8a f7 b5 95 | e0 47 db d1 c8 42 8e 58 81 f5 ad d0 b5 63 86 42 | 1f 8b 84 dd 81 ee 70 92 6e b5 c4 39 af 9c 50 3d | 9f 95 c9 ea 1e 7c 99 d7 0e b5 ac b0 6c 63 ec ba | 8d 5f 65 5d 3b 17 25 63 e7 5c 7b 69 67 54 83 0e | c0 9b d7 b5 4f 42 2f 27 87 22 39 48 b7 84 cf cc | cf 00 bc d9 c7 6d 6e 28 f3 1c 0e b7 f5 1b dc c5 | 59 f5 4a 7b 90 a6 d5 78 62 d3 be d3 63 ef d7 f9 | 2c 59 4a 44 cf 7f 3b 21 cd 7f c7 d4 ca 1a a8 49 | 29 00 00 24 a4 bc 37 1e 87 c2 34 b4 23 5a f6 0b | b7 2c 74 3f fd 06 56 c7 93 de 20 49 09 1f b3 6b | b5 db c8 d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a e5 9a 01 5d 43 fb 6a 98 9b f3 8a | be 52 9d de 46 5a 7a 72 00 00 00 1c 00 00 40 05 | cc 5a ab 9a 19 3f 91 fb 3e 48 14 36 65 db 7f b9 | 29 d6 f5 30 | libevent_free: release ptr-libevent@0x7fb35404e8b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354039e80 | #513 spent 0.0979 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #513 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a88140 | handling event EVENT_RETRANSMIT for parent state #507 | start processing: state #507 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #507 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #507 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #507 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.523984; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.324942 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354039e80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #507 | libevent_malloc: new ptr-libevent@0x7fb35404e8b0 size 128 "road-eastnet-nonat-243" #507: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #507) | da 78 05 0d 9b 70 b9 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 46 e0 88 a0 30 a2 10 b6 db db 18 a9 1a b3 9a | c5 54 fb 3f 15 80 c7 25 e6 f4 59 fe 6e fc 4f d8 | 8b ec 98 88 97 ce 89 12 e0 f6 7c 60 70 3c 7d 2f | 85 8c 92 e6 f5 10 00 45 4e 0d f3 d7 24 70 70 ea | f1 31 c4 5b 48 d6 07 d8 da 3d 7f e0 08 dc 0f 9e | 22 03 73 c9 0e c4 1b 51 bf f2 38 8e 38 b6 fd d5 | 22 d5 92 08 9a e7 f3 0b 25 d0 d9 dd 1b 26 88 06 | d6 8f 78 7c 97 0a 2b d5 ae 86 6d 27 bc ca 56 2a | 75 f9 bc 7a 04 89 9f bf e0 ea fc 39 80 a6 03 c7 | 0c 27 76 fa 8e 3c c4 79 8c d8 25 1c e4 00 76 60 | ce 83 c9 6c f4 f0 61 2d eb 79 e9 72 7a 2c 98 fa | 1c cb e8 81 62 75 a2 1d ab 8a ff 63 87 4e 5e fa | 9c 7c 66 c5 3e 4d ee d7 ea 85 5e 26 e2 62 57 07 | b7 3a e7 80 5f 3e 54 3a 0c 1b dd 9d e4 1a 64 e7 | dc 8d 0e 26 5e 1d 1f b4 2e 68 e8 a0 88 3b 2a 21 | 54 99 7c 47 f7 0c ba 8c f4 5a ab 15 bd ae eb 38 | 29 00 00 24 49 65 e9 20 14 20 1a 38 1c 59 3c 48 | eb 8b 7a 8d ba 7b 14 a8 53 47 20 f7 ff f7 d4 ec | 05 75 53 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 67 d1 c8 0a fd 9b 5e 47 d4 f9 45 | 3b 65 86 81 4c 3e 0b eb 00 00 00 1c 00 00 40 05 | 9f 6a dc 5d 73 87 7f 7b 13 63 32 fe 29 c9 d7 13 | 68 73 c8 6f | libevent_free: release ptr-libevent@0x7fb38004e900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a88140 | #507 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #507 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b16d90 | handling event EVENT_RETRANSMIT for parent state #505 | start processing: state #505 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #505 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #505 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #505 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.524122; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.31623 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a88140 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #505 | libevent_malloc: new ptr-libevent@0x7fb38004e900 size 128 "road-eastnet-nonat-252" #505: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #505) | d5 d2 7d 3c 00 e8 ff 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 f3 9e b0 6a 35 4f e1 47 8d 4d 6e 1c 28 4b 2e | f7 69 42 28 c7 ef 26 c5 4e 61 c9 92 6c ab 1f 19 | f8 92 ce 52 74 4a c5 9f 21 f2 3d 66 b1 02 14 a1 | 73 db a1 79 9a e8 39 8a fc 66 2f 00 d5 5a 95 c5 | 48 d0 9c 15 fa 0b 1b 42 28 43 67 d3 6e 5e 6f ff | c0 b1 6b 27 e0 5d 48 d0 0b 8b bd 52 32 59 4d 42 | 3a 7f 12 ad f8 1d 5e cc 39 0c 00 27 ca 10 80 cd | 3d 82 51 e1 b2 98 44 61 6d 8a 0e 01 ae d2 a9 b5 | 0d a4 1c d6 bb b1 86 67 99 76 77 1d 81 1f e6 0f | 87 d6 0e ab 3d 4e 72 d6 1c d8 a8 ba 8b 0d fa b6 | 14 aa 5d 05 4f 2b 84 93 9b 6c 60 e2 1b f1 93 07 | 29 7a b4 93 fc 89 c0 b0 9e 68 f0 55 5e 91 56 16 | 01 5f 10 18 5b bb 2d 47 4a 35 38 2c ad 2e ab d2 | 6a b8 26 26 f5 88 20 85 f3 dc ec bd 9d 77 db 98 | b1 c5 2e 88 5d 5c 8b a9 e1 00 27 3a d2 4c bd 1c | db 98 5a 24 32 a9 2f e9 b8 59 be e8 b6 07 01 6e | 29 00 00 24 cb e3 59 11 f9 d9 ec ee ad 77 08 0b | 98 a8 ef 2e 9a e0 e5 f5 be 06 9f 6c 9d 77 41 dd | ce d1 2a 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d ed ee bd 79 c9 6a 8d de 75 89 30 | 73 98 a0 83 98 d8 fd 9d 00 00 00 1c 00 00 40 05 | 80 0c 7e 23 1f 19 e5 09 f9 e2 d7 e7 d4 e4 7c f1 | e8 ce ce 76 | libevent_free: release ptr-libevent@0x7fb368035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b16d90 | #505 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #505 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388020d10 | handling event EVENT_RETRANSMIT for parent state #522 | start processing: state #522 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #522 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #522 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #522 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.524253; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.325574 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b16d90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #522 | libevent_malloc: new ptr-libevent@0x7fb368035930 size 128 "road-eastnet-nonat-78" #522: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #522) | 10 b1 a0 1e 00 fa a9 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 03 12 29 26 7f 65 c7 68 c4 9a d0 af 8e ee 58 | 00 c2 bb 14 15 7c 0a 86 41 89 01 e3 50 59 e6 9d | 21 20 fe 10 1d 52 36 f5 79 ed a1 2e a4 48 7f 36 | 55 11 2c 17 77 fe f8 b5 19 dc d2 b7 81 ea a8 4f | 58 de c6 bf 75 6a 59 91 22 64 63 fd 91 bc 44 f5 | fb fc 62 8d 40 09 00 e8 46 d1 fa ee d8 ea e1 b2 | f5 ff 3e 58 e5 93 cd a0 c0 0b 6c d4 34 85 8d de | 24 69 63 0b 77 53 a3 8f bc dc 79 d3 e0 07 c6 0f | b6 c3 f5 75 53 b4 1f 79 ed 6e d0 df 07 c3 f0 12 | 58 d9 7f d3 29 ec fa 74 4a b2 3b 5a bd 60 bd c0 | 31 c1 ac c7 51 45 8d 69 c4 5a 44 c1 9e 1d 54 f3 | 3f 29 e3 14 29 d3 ff 9f 4c 6d 49 97 9d 65 a8 01 | e3 b8 ae c9 76 a9 8a 4c 13 37 d8 a6 c9 90 05 b2 | 56 78 1c 8e b1 63 ce 03 b4 28 7f e6 b1 a5 59 d4 | f8 a3 6b 86 00 eb 6f c1 03 34 cf 9d 47 16 c9 f4 | fc a0 47 b8 e3 a2 18 1a f8 87 2d 2f b9 c5 65 a4 | 29 00 00 24 ef 86 5c 01 c3 c5 84 cc db a0 c4 f8 | 4b 5f 8a 0f 84 0f d8 a2 60 5e 95 d4 2a 5b da 43 | eb c8 3e 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 98 24 f3 3c 5a 10 4a 5f ba 19 5c | 79 3c 94 1f f7 ad ac c2 00 00 00 1c 00 00 40 05 | 01 72 52 9e ac 8f 8c 48 d1 ab 04 59 e9 b8 14 4b | b7 ae 1e 1b | libevent_free: release ptr-libevent@0x7fb388054710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388020d10 | #522 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #522 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c0346e0 | handling event EVENT_RETRANSMIT for parent state #510 | start processing: state #510 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #510 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #510 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #510 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.524379; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.319184 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388020d10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #510 | libevent_malloc: new ptr-libevent@0x7fb388054710 size 128 "road-eastnet-nonat-102" #510: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #510) | bc 30 61 cf 1c f5 21 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7d 16 ac 90 1b e8 fc 3d a1 f6 2f f6 5b aa 38 5f | 13 bc 3b ec ce 54 9b 92 94 b5 7c b5 e6 92 4b 0f | 82 fe 63 f8 ae e6 73 78 f6 99 0a 42 80 fb a6 71 | 1d 6d c1 8b be 9b 09 d6 dc d8 6a 99 20 35 d5 82 | 27 70 ed c6 95 de df 76 74 d7 3e 14 50 79 f0 89 | ae 4e 98 1c 30 c5 99 94 51 22 91 53 e5 49 a5 a5 | 4e d2 de 84 a6 45 26 dc 5a 29 c7 7c 52 2b 31 8d | 7b a4 cf c6 13 95 ce 98 5a 32 37 1e 3c f9 dc 95 | 74 b2 58 3f bf f8 56 2f b2 ed 28 17 6b fc 7e 85 | c4 ca f3 5d 2b 78 55 ad d1 65 97 11 a6 22 08 7c | b5 aa 63 e0 e4 66 be 74 9d 1a b0 75 bf 11 a5 cb | 35 00 1a 58 9e 5f 9b 3a 5c 4a 5e 5b 7c 41 b5 39 | 8c e2 21 3f a3 1f 5d 86 72 e4 89 93 96 9a e1 e9 | 74 b9 24 6d 9f d6 67 09 e9 73 bb f9 0b 1c 88 a6 | 68 a2 54 4f 6c 95 d8 be 9b cd 89 96 d8 9d 33 48 | fb e8 c2 fa 1f fd 3e a7 c4 fc 87 a0 2d d1 0a 3b | 29 00 00 24 a8 33 19 fd 53 f2 7c 45 88 0e ac 9b | 8c 61 3a 57 a6 74 c6 f9 cb 73 c2 48 34 44 1a b7 | 09 32 3c 47 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 4c e5 d6 4c 06 64 b8 31 f1 40 df | 16 6a c3 cc 04 2a 1f ac 00 00 00 1c 00 00 40 05 | f4 a4 c7 b2 58 33 da 00 b3 aa 2f f5 ea 56 ab cb | 57 27 19 d1 | libevent_free: release ptr-libevent@0x7fb35c0511f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c0346e0 | #510 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #510 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c009690 | handling event EVENT_RETRANSMIT for parent state #521 | start processing: state #521 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #521 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #521 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #521 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.524508; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.316279 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c0346e0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #521 | libevent_malloc: new ptr-libevent@0x7fb35c0511f0 size 128 "road-eastnet-nonat-27" #521: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #521) | e0 39 ae 6e 8d 33 46 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 3f e2 39 d0 87 6e c4 87 ac 4b 7f e8 23 48 99 | 92 9e 37 b3 ec 85 70 ac 3f 02 9e 68 20 31 71 0c | 97 15 91 c1 a0 ab 9e 8d 27 01 76 49 b6 29 fb 50 | 00 fc 65 98 a7 fe a1 a4 36 b9 c4 7c 54 f4 02 af | 60 2f d1 df 33 d0 64 d4 55 6b 05 3e b6 be ce 9f | 7b 70 7e 57 f4 bd aa cb 97 13 66 4c 9b c5 ee ff | 30 5a af e3 f5 d2 79 8f d0 02 64 c0 f6 31 9a 04 | 75 4d ca 99 cf 35 0b 0b 63 86 ed 2d 81 69 83 0d | 51 34 70 ee ac 2d 1e 34 e9 70 85 c2 2f a2 8f 70 | 6f 0d 80 be fa b6 92 2c 33 7f 13 ce 7a 72 1b 7a | 2a d2 4a 74 e9 27 c0 27 62 da 50 70 c6 2c 9d f6 | 5b a1 c7 10 be 54 64 5f e3 1f 76 be a3 86 5c 67 | 3f 34 60 37 96 c6 3f ac 97 7d a3 18 8c c7 ef 72 | 1d d2 f4 90 6a 6c 56 d8 e8 0f 74 17 ab b5 fe 66 | c6 f5 7b ef 12 de 81 09 98 fb 45 7d d7 c5 4b d6 | e3 d8 90 e0 92 65 36 18 47 32 4b 60 90 49 45 9b | 29 00 00 24 31 24 b3 bc ed 01 bb 4f 4e 94 0b a9 | a1 7c 54 38 d8 7d f8 73 0e b6 38 5d 48 35 f4 71 | f1 a3 75 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7c 55 c6 d8 c0 e4 0d bf da ae 94 5b | 53 f7 7b d9 db 38 1b b7 00 00 00 1c 00 00 40 05 | 3e db 6e c8 27 ac a4 d1 7f ba 2d 10 fa 4a 46 d7 | 5d f3 f0 38 | libevent_free: release ptr-libevent@0x7fb37c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c009690 | #521 spent 0.111 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #521 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b0 c4 a7 65 22 ba 71 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #516 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #516 | rejected packet: | b0 c4 a7 65 22 ba 71 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #516: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0659 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 cd fa e1 13 2d 20 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #511 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #511 | rejected packet: | d0 cd fa e1 13 2d 20 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #511: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0571 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 7a 17 75 fd ae cb 88 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #514 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #514 | rejected packet: | 06 7a 17 75 fd ae cb 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #514: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0633 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 9a 49 1f a8 dd 2c 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #506 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #506 | rejected packet: | 30 9a 49 1f a8 dd 2c 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #506: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0601 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 e5 d4 8b 34 40 4a 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #517 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #517 | rejected packet: | 33 e5 d4 8b 34 40 4a 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #517: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.055 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 19 92 95 ca 61 53 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #528 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #528 | rejected packet: | 53 19 92 95 ca 61 53 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #528: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0556 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 a6 50 d0 80 0f 96 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #509 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #509 | rejected packet: | 95 a6 50 d0 80 0f 96 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #509: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.055 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 61 5a f6 8c 22 37 26 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #515 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #515 | rejected packet: | 1e 61 5a f6 8c 22 37 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #515: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0521 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 4a 29 e2 f2 d8 10 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #518 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #518 | rejected packet: | 76 4a 29 e2 f2 d8 10 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #518: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0565 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 3f 02 d2 13 45 35 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #508 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #508 | rejected packet: | dc 3f 02 d2 13 45 35 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #508: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0387 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad da d3 24 2d 65 26 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #524 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #524 | rejected packet: | ad da d3 24 2d 65 26 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #524: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0361 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd e9 59 71 3e 30 66 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #513 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #513 | rejected packet: | bd e9 59 71 3e 30 66 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #513: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0356 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 78 05 0d 9b 70 b9 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #507 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #507 | rejected packet: | da 78 05 0d 9b 70 b9 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #507: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0371 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 d2 7d 3c 00 e8 ff 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #505 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #505 | rejected packet: | d5 d2 7d 3c 00 e8 ff 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #505: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0356 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 b1 a0 1e 00 fa a9 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #522 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #522 | rejected packet: | 10 b1 a0 1e 00 fa a9 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #522: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0357 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc 30 61 cf 1c f5 21 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #510 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #510 | rejected packet: | bc 30 61 cf 1c f5 21 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #510: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0369 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e0 39 ae 6e 8d 33 46 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #521 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #521 | rejected packet: | e0 39 ae 6e 8d 33 46 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #521: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0356 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb370017ea0 | handling event EVENT_RETRANSMIT for parent state #642 | start processing: state #642 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #642 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #642 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #642 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.71482; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.45187 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c009690 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #642 | libevent_malloc: new ptr-libevent@0x7fb37c02a950 size 128 "road-eastnet-nonat-171" #642: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #642) | 28 8b 51 ce ae 5a 3d 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 37 19 62 25 a0 9e 1e 52 48 66 63 35 92 1d df | c7 ff 13 b7 59 bd f6 95 87 8d 26 d9 c9 e0 f7 24 | 26 42 a2 e4 00 1b 68 a2 f9 e9 ac 5d f5 d7 11 4b | 1e 89 7d 46 ef 06 9a 32 1b e9 81 17 06 39 67 f5 | 0e f6 1a 5a 55 9b 1e a5 dd e1 43 76 e8 a2 58 b1 | 28 a6 3c d6 50 38 49 96 2d 91 42 d7 f8 ec 6a 33 | f4 e0 96 4a 58 58 aa e6 0c 5c 8c cb ab 5c e8 04 | a5 a1 ab 68 96 f3 f4 a5 e4 ae 1a 96 a0 9a f9 57 | 56 09 b6 81 96 72 27 a3 1c 3c 27 45 d5 f1 02 f8 | 2a d7 f9 4c 9f 1a a7 8a 5a f3 e7 da 4d 17 8e ac | 96 16 46 81 fd 01 db ca b6 72 84 a6 d0 d8 4e 69 | c7 79 31 c5 90 b9 16 b2 14 19 41 ef d9 1d 68 fa | 44 38 de 48 65 2c ec 8e 99 27 f7 c6 63 4b 60 bf | 8d 63 04 69 ea 6c 68 38 f9 a4 27 bd 15 c4 ec 7f | 0a d6 93 e5 0b 62 ad e0 de db a0 44 2e ae 03 d3 | 4a 90 aa 55 4e a9 22 5e 90 19 cd ff e2 28 23 a0 | 29 00 00 24 cc 92 78 18 36 9d 5d c6 a8 50 3e 53 | b3 db 47 67 8a c3 3b 19 d4 07 41 62 2d ad 79 2f | c7 c6 9c 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 04 bb 7b 41 fb 94 b6 5a f7 bf c5 | 50 0b eb 35 93 8a 85 4f 00 00 00 1c 00 00 40 05 | c2 0f 22 62 b9 53 47 a9 22 ed 80 06 c6 98 27 8a | 4f 90 48 63 | libevent_free: release ptr-libevent@0x7fb35c085320 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370017ea0 | #642 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #642 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388009ed0 | handling event EVENT_RETRANSMIT for parent state #590 | start processing: state #590 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #590 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #590 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #590 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.714959; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.430231 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #590 | libevent_malloc: new ptr-libevent@0x7fb35c085320 size 128 "road-eastnet-nonat-59" #590: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #590) | 6c 7d d5 ab c5 87 8a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be 10 c4 6c 74 1b a2 8f 66 7a 62 d2 25 ec 33 a4 | 70 d7 c3 96 b8 a1 45 8b 02 09 80 a1 f3 7c 96 6a | 39 ed 63 55 b4 78 94 49 5f c4 6b a9 d5 4e f8 12 | 1a ac 4b a8 bc a5 a8 12 11 8f ce fd 6b 3c 86 54 | ca cb fd 2b 06 f6 33 36 41 59 16 8d 82 7a 0b 1a | c7 7f c9 82 7b fe 08 af 9f 61 2b 45 92 6c 6e 24 | a4 18 44 e2 17 55 31 77 5a ca 72 7e 7d 88 37 f5 | 6d c1 ab 86 9d 67 6d ea ef 9d 8e 62 9d 65 20 07 | 45 00 55 47 ac 2c 2b cf 33 ff 98 5d e2 f5 aa c2 | 8a a3 0c 25 db 52 4a f6 b5 28 47 29 53 2c f7 88 | 0d de 80 45 88 5f 79 8d 46 fb 55 a7 94 65 0d 0e | 39 4d a1 ad 42 11 ce f5 0f b0 ea 8b 2c be 25 aa | eb 10 3b 8f 68 f9 5b 76 a8 a8 5d fa 34 25 2f aa | fd 6c 2c 9f ac 68 3a 0f c6 e4 89 2c c2 fb 6d 39 | b5 45 cd 30 f2 bb a2 0c 7b 79 29 25 a0 cb 26 59 | 16 3d f7 87 27 3d d0 80 df c0 94 22 c9 92 e3 72 | 29 00 00 24 aa a1 cb 0a e0 68 cf 8d 79 59 07 9c | 1e fd 67 fc d7 c0 41 c5 19 de f2 e4 bb 83 d9 07 | f2 5b 83 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 a4 46 9e 55 3a a4 f8 b6 3f 64 6c | 2c e2 55 62 44 61 35 d9 00 00 00 1c 00 00 40 05 | 79 b6 13 d4 15 d9 80 92 7b c3 42 98 a7 4d 57 09 | ac cd 9f ec | libevent_free: release ptr-libevent@0x7fb338064790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388009ed0 | #590 spent 0.068 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #590 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374014870 | handling event EVENT_RETRANSMIT for parent state #523 | start processing: state #523 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #523 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #523 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #523 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.715044; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.407898 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388009ed0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #523 | libevent_malloc: new ptr-libevent@0x7fb338064790 size 128 "road-eastnet-nonat-49" #523: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #523) | 07 bb ac 77 0a 7b 9b 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 32 2d 24 90 2e 75 6c 89 41 22 7c 04 93 61 b1 | 39 9b 32 4d 26 76 8c 24 bc 2d ac ee b2 3a 1d 13 | 80 14 c2 ce e8 90 ed e7 ec 82 33 fc cf 75 5a 59 | 9b c2 1e 9a ce 67 9e d0 32 1d df 06 30 99 8f 42 | e3 86 8d f2 a6 5e 6c 60 43 e3 54 7f 8e 10 64 f2 | 09 cd aa b7 1e 85 a0 06 7d 3a ff 7a a3 a4 14 fb | ff e9 1f 06 7e ad ad 41 ac 22 2e 81 48 aa 18 5d | 46 d1 2e ee d8 cb c5 80 a9 94 af ab 7d 0a 94 dd | 5d d1 aa 92 aa ee bb 06 90 ba f8 2f 6b 05 81 8b | c1 e1 46 3c 9a 94 f0 1c d0 2e 48 d8 93 0d 01 e6 | 42 b1 eb d7 08 a6 f8 5f 35 b3 a8 51 ff 1a 28 27 | a9 2e 3b 94 f9 50 49 28 9e 67 8b 4b 2e 25 e2 75 | a6 af 7a bc 8e e8 70 b4 b8 23 7e 7a 37 d6 c9 3a | e0 69 41 d0 87 31 ed a3 a3 e6 b4 1c 66 5c da e4 | 72 e0 33 43 7a 69 31 25 86 69 bf c1 c5 6f bd 27 | b9 80 4c 20 7c 9b 47 3c 48 70 66 96 58 bd 89 9f | 29 00 00 24 65 25 bd 90 0a 47 32 65 7b ff a5 6e | a2 70 3c 06 64 54 94 9b 0c 9e 4e c1 38 45 e7 b8 | 1b aa f1 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 c1 b5 e9 b8 b6 f1 9f 93 d5 2c a0 | 2c fe 30 59 be 37 e1 f4 00 00 00 1c 00 00 40 05 | a9 4a 22 b0 e8 8c 8d 17 4d 42 81 df a3 74 1f 8f | e6 9c ea 37 | libevent_free: release ptr-libevent@0x7fb374054140 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374014870 | #523 spent 0.0721 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #523 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #732 | start processing: state #732 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #732 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #732 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #732 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.715133; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499966 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374014870 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #732 | libevent_malloc: new ptr-libevent@0x7fb374054140 size 128 "road-eastnet-nonat-222" #732: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #732) | d0 09 53 dc c6 ab 63 da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 85 fc fd c0 3d 4e f2 6d 8c 5a 48 97 72 ba 8d | 76 a1 67 2b 3e f5 0f 59 6a 4a cf 1f 0f 1a 83 6b | 02 c4 e6 13 1a a7 be 58 09 e7 95 c5 d3 61 73 f0 | 93 30 b7 ea 83 2c 03 35 7b e7 a4 68 e9 c3 34 3d | 62 a3 61 5b 4e 45 93 53 18 92 ed db b3 57 ab ed | d3 53 e9 06 16 fc 7d fc c5 71 11 b8 0f 5b b1 19 | dd 64 cc 6c d3 60 ce 76 d1 ee 24 40 d0 a9 e8 ef | b0 05 68 55 4c bc 77 f7 43 d8 3a 34 82 db 7d 83 | 19 10 50 8c d2 65 d7 7b e4 c6 64 bb d8 6c a7 36 | 7d c4 11 fc dd 75 d9 7e 8a a8 c1 86 35 68 1d 19 | 3f e6 94 36 43 37 3c ce 07 24 1a e3 3a b2 b8 d0 | 31 23 82 03 07 23 34 27 ac 92 b7 75 a4 35 52 c2 | 62 ee a2 c7 e9 86 52 3d d2 a7 12 2a b4 93 13 55 | e8 52 4e 73 70 b2 d4 5f 3e 19 02 5a 63 54 72 36 | d5 50 42 05 5e b0 23 11 30 64 39 ea 9a e3 b8 0d | 4b 4e 16 cb 69 12 46 02 2b 04 d5 67 a1 73 e1 ac | 29 00 00 24 fc ee 14 ee 51 1c c8 cf 02 52 60 a5 | ed 61 3d 76 39 bb ee c9 50 2c 24 3c 5a ec a0 d1 | e5 8a bb 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a fa b6 a7 12 75 27 e9 bc d5 98 e9 | 7d b2 82 ba 84 f4 53 9f 00 00 00 1c 00 00 40 05 | 27 89 f2 84 3a 49 ac a7 94 1d 98 7e 0c c4 b6 09 | ba a0 ac ee | libevent_free: release ptr-libevent@0x7fb36007a360 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #732 spent 0.067 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #732 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a94500 | handling event EVENT_RETRANSMIT for parent state #741 | start processing: state #741 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #741 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #741 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #741 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.715214; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499293 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #741 | libevent_malloc: new ptr-libevent@0x7fb36007a360 size 128 "road-eastnet-nonat-217" #741: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #741) | 62 ac e1 dc 78 47 49 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 14 75 0b 46 c7 7e 2e 5b 84 9b fc 63 4f 7a bb b1 | bb 0b 39 b2 38 45 c4 46 64 96 9b f6 97 0f ad 64 | 77 d0 65 ce 45 75 90 09 8d bb 17 97 97 97 b2 fe | 7c 98 b0 3c e2 1b b2 75 9e 4f 00 17 88 80 52 35 | 5a e1 87 e0 03 97 21 fd f3 19 41 85 49 46 8f ab | 34 a9 9a fd f7 fd 73 2c 73 3d 6a 91 77 21 6d 6c | 79 4c 5c bb 61 7c 82 81 01 a9 8b f8 96 88 67 ec | 5e 9f 63 85 f6 a8 a9 74 84 a6 13 9a 7a ca 36 d7 | d6 5d 44 65 ea 98 9a 63 18 26 33 18 de 47 5a c9 | 7a 75 34 c1 c7 bd 4c 1d 3b 2c ba b7 c0 6e 1c 7e | 83 75 bf 9c ba 83 c0 f2 ba 77 85 7b 33 2b 90 b1 | c2 52 77 da 60 67 e2 5a f3 07 0b 1d 76 db f2 c8 | dd 92 77 15 ff 35 90 20 f7 3a 79 14 36 0e 74 98 | 26 48 0d 10 a8 b8 96 6e a1 d3 39 9c 37 f1 09 c2 | d6 18 46 cc 20 41 73 2d 13 cc 4b 13 c4 75 47 56 | 6f 8d 2a 56 34 65 b3 20 fa a7 7c 74 84 64 26 20 | 29 00 00 24 98 46 88 9e 86 0c 01 40 55 4c d6 79 | b1 b2 76 d9 6d f0 c7 03 be fb 8a 36 84 6a 6b 74 | 5e 47 68 8e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 45 41 a0 85 77 fe f1 d1 6d 6e 5e | 4b d5 c9 60 59 e4 cf 31 00 00 00 1c 00 00 40 05 | 3f 98 bf 78 15 51 e4 00 05 0a 6e 9b 09 7f 98 a3 | af 3d 07 7b | libevent_free: release ptr-libevent@0x7fb37c090640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94500 | #741 spent 0.0673 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #741 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350017ea0 | handling event EVENT_RETRANSMIT for parent state #754 | start processing: state #754 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #754 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #754 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #754 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.715295; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.497765 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94500 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #754 | libevent_malloc: new ptr-libevent@0x7fb37c090640 size 128 "road-eastnet-nonat-250" #754: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #754) | ba fc 0a 40 dd 57 2f 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 dc 3f 52 f7 90 e6 aa 55 28 27 9f 26 90 49 c5 | 4e 63 af 84 9c 24 2a 54 88 16 03 62 61 85 f0 75 | 96 ac b9 67 9b 1f a3 76 a2 7d d7 2a c2 0d b0 20 | 4c 76 ab 99 46 09 ae ba c5 a3 18 d9 2f 6b 75 6f | 8c 85 4a 61 60 92 93 9a 69 73 74 b4 71 5f 61 5f | 49 20 71 ee 13 df 74 12 52 f5 f7 6e e5 b6 47 13 | 81 a6 fd 04 c1 cb 97 6e a6 05 89 f7 1c c8 36 4f | 3b 16 b8 6b 1f f4 41 b6 2e 95 ff 58 91 d8 05 7b | 75 dd bd f6 54 1d 51 67 0b f9 12 22 e3 6a 7e fe | 83 e1 9b fb a2 25 c3 ac 81 7f d9 4f 94 b0 53 63 | 18 d5 76 25 b0 fb c2 e8 de d9 06 a6 92 1b 1a 4d | b2 14 44 77 4e 1a c6 51 54 6d 23 8f 6a 2b 6f aa | d9 e4 ba 5e 32 24 b4 f3 63 3f 1b 0f 79 02 db e4 | d2 10 63 1b 77 54 88 79 1a c9 10 a1 5b a8 e0 e0 | 2d a9 8a 89 9d 56 82 83 99 43 e6 10 16 f8 bb be | 4b 7e 7f d3 79 9f 54 df a5 06 38 28 00 85 76 c9 | 29 00 00 24 8f 59 38 2a dd e3 49 a5 d1 b0 e1 2b | d5 a2 3b 56 cd 53 01 3b e1 33 30 4f 0c 29 77 15 | 19 47 ad 54 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 85 ee 2b ce cb d2 9a af d5 06 f1 | d4 8a 29 3f c9 5e e4 58 00 00 00 1c 00 00 40 05 | 7f 6d 1a 4d 19 0a 8b 4a ad 47 7e e6 0e aa 08 53 | cf fd 3e 04 | libevent_free: release ptr-libevent@0x7fb340071b90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350017ea0 | #754 spent 0.0653 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #754 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2cc10 | handling event EVENT_RETRANSMIT for parent state #616 | start processing: state #616 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #616 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #616 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #616 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.715374; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.445136 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #616 | libevent_malloc: new ptr-libevent@0x7fb340071b90 size 128 "road-eastnet-nonat-42" #616: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #616) | 51 51 c2 14 b4 88 86 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 6f 7d 95 94 eb 35 d4 79 fb b8 ed ce b6 0e 8c | 0b ac 78 e7 dc 5d 85 9e fc ca bc 30 a0 af fc a7 | 83 d0 df 38 f5 b9 0e 7c 6c 0f 7c 9b e7 18 2b b0 | b1 47 6e d5 e1 d8 67 a0 a7 53 55 b4 30 4b 4f 05 | e0 9f 68 a5 8b 3d 3d f0 54 7c c1 cf 5b d8 d1 7d | 73 db c0 6b 87 64 87 39 90 85 4b 1a 6e 4a 55 8d | 36 06 71 74 4d 94 c0 cc c3 ca da b9 47 09 e4 21 | a9 ad 84 f0 74 96 ac a8 c6 80 80 8d a7 fe 6f 3b | 0b 61 80 4f cc e0 18 20 5b bc 01 56 5b 21 5b 7d | cf 65 0c bd 2c 1a 83 c9 6d 39 ba 26 63 02 84 48 | b0 ba 3f 13 d9 59 1f b5 ff fe 6c cb 2a b4 66 26 | 36 f8 c3 21 35 08 08 9d 44 88 c1 93 d8 01 57 ec | 98 49 a7 75 ff fd 0f 01 68 c6 f6 cf 50 73 98 74 | 99 a3 bf 5c 1f c1 3e 2b 89 23 5e 9c a4 d5 4a 64 | 1a 16 30 ca 38 de 10 97 61 4d bb b6 7b 95 79 00 | cb 8b 1d 61 ae 38 3a d9 0a 4b 59 fc 82 07 70 c7 | 29 00 00 24 6c a0 b2 b3 6c 5a 92 97 4b 6e 2b c9 | 2c 62 c9 95 6b 4d be 03 71 77 39 4f 3f 77 cf a6 | 3f 8f 1a 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 7b 4c b3 5e 00 28 2b fa 81 9a 72 | 9b 96 b8 73 09 50 16 c0 00 00 00 1c 00 00 40 05 | 46 0e 22 1c 6d 17 ec 1e 80 d6 7b 39 9b 19 6c 8a | d4 c4 4d a0 | libevent_free: release ptr-libevent@0x7fb368040760 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cc10 | #616 spent 0.0665 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #616 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c01d970 | handling event EVENT_RETRANSMIT for parent state #617 | start processing: state #617 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #617 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #617 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #617 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.715454; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.454796 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #617 | libevent_malloc: new ptr-libevent@0x7fb368040760 size 128 "road-eastnet-nonat-165" #617: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #617) | a7 ae e8 62 0b 46 de 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 6f 00 02 e7 f5 b4 cb 08 b9 65 4f 47 ef 5a 86 | e5 51 ca 0c 06 cf fd 0b 72 8c 77 7e b4 38 15 8b | 85 87 d6 a6 c5 3f 41 32 55 4b bb 30 5a 6b 55 95 | 76 74 f1 ba 57 cb c3 00 58 3b 41 a8 f4 f2 a2 e7 | 68 ea bf 0e 0e eb 7d 7c 97 24 f0 ec 9c b2 55 b4 | 58 b7 f3 13 c1 89 c2 fb a2 87 ea 86 bf bb c5 33 | 1f ae 16 84 83 00 87 63 36 16 fb 84 22 91 c8 7c | f3 57 cd 36 c5 a3 58 59 44 20 23 41 12 17 51 69 | e0 14 9c 7e ac 9d 23 88 40 7c f8 bc 0c 38 30 cd | 77 b7 88 55 c1 fe a2 53 b7 72 b0 12 95 9b b6 64 | ae 85 af 35 c8 ab 5f a7 cf c7 bf 9a c6 ed 5a 5b | 7a 5d 83 5f 91 52 0f 74 31 d0 db 4a 47 93 a8 88 | 7c 5a 55 e6 2b 80 9e dc f5 58 a8 e9 fc 1a 9c 9a | 4c bb 40 50 e2 70 35 c8 91 ac 99 df 72 58 53 2c | aa 87 b5 1a b6 1a e4 4a 97 dc 1d 01 10 9b 18 a2 | 3b 89 6b 81 0b 44 73 ea c4 f2 cc 33 56 05 5e 54 | 29 00 00 24 f7 8e 9a 0f 2e 84 4c 49 d4 15 90 c6 | 2a 84 51 f1 f7 2c e6 95 75 a4 8d 77 80 5c ad 8d | d1 b6 c5 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 1c f0 18 4c 40 28 e4 7a 14 a6 c5 | b5 d9 19 b3 dc 75 08 d7 00 00 00 1c 00 00 40 05 | 6e 38 75 f1 87 66 04 34 0d e9 7f d7 db 67 24 31 | c8 3b de 05 | libevent_free: release ptr-libevent@0x7fb35c0b1220 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c01d970 | #617 spent 0.0656 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #617 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #755 | start processing: state #755 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #755 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #755 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #755 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.715533; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499242 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c01d970 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #755 | libevent_malloc: new ptr-libevent@0x7fb35c0b1220 size 128 "road-eastnet-nonat-237" #755: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #755) | 05 2d 15 eb 8d d1 e7 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c e4 18 a4 fb 02 3a d9 56 aa ab 1f 07 98 9a b0 | 2b 63 06 c0 f4 31 d9 71 70 9c 4c 64 b1 c2 38 28 | 6c 15 1d 4f c5 ae a4 a5 43 35 ec 6e d6 ce 63 44 | c3 02 3a ce b9 ea 97 ee 29 7b 54 70 d5 96 ff 7e | 5e 34 ae 91 d7 79 f6 56 f6 05 21 93 eb 09 d6 2b | 31 ea 8c 72 22 32 80 ba 85 c1 fd 23 bc 55 76 a5 | 14 11 5f 1c 43 e7 b2 de 38 fc 2c a4 66 eb c7 d0 | 28 ae 74 a9 31 19 e1 df eb 9a 57 0f 92 b5 24 1b | f9 d6 9a c3 62 89 61 7f a8 28 b7 1b ae 83 62 6a | 52 6a f7 36 ac ba a5 54 22 cb 98 46 53 96 c0 75 | 28 f7 eb 90 7e f6 0c 82 ec ac f4 3f 47 1c 6c fe | 84 02 5a 18 bb f3 1e 67 69 d9 22 9d a1 ce 99 fa | c1 d1 64 9b c8 33 d0 0e 5f bd db 94 28 8e dd 95 | 12 8f 1e 24 1b 4a d0 41 03 fa d3 6e cf f5 c7 5c | e5 af 76 1b 64 bb 0a af 07 04 ed 6b 46 aa c8 6b | 3d 72 51 cb d5 1d a8 b3 e5 d3 ab 98 04 42 49 92 | 29 00 00 24 49 bb cf 23 e0 6f e1 de 61 d1 90 4a | 2d 30 38 2f 6a e7 9f b7 3b 9f e2 b1 72 e4 d8 55 | 05 54 cd 1b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 9d 20 ec 91 b7 c1 7d 70 e8 e6 28 | dd fd cb 82 74 04 84 bf 00 00 00 1c 00 00 40 05 | e9 ae 1f 41 fd b0 e1 3d 82 1f 24 48 4d 65 7b ae | 19 d4 aa 4e | libevent_free: release ptr-libevent@0x7fb360085320 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #755 spent 0.0645 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #755 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a52c90 | handling event EVENT_RETRANSMIT for parent state #752 | start processing: state #752 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #752 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #752 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #752 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.715611; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499018 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #752 | libevent_malloc: new ptr-libevent@0x7fb360085320 size 128 "road-eastnet-nonat-231" #752: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #752) | c5 64 20 5b 1c 85 54 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 d0 f3 e7 4a 6a f0 e8 90 5f 06 4d e1 8c 9f 3b | 1d f4 e3 4b 20 0b 8b 74 a8 b1 fe 8c 8a 59 de d1 | 16 28 a6 b3 0f 84 5b 56 83 ac 7e 32 a6 53 36 2a | 6a 2f 6a 43 eb c9 c2 27 18 66 c2 b6 33 15 55 47 | 34 6d a6 80 80 a8 a9 eb 3d 17 c1 00 cf 82 66 7f | 20 cf f6 6a e4 24 60 36 b4 97 22 51 aa 8a e1 03 | 48 19 0c a8 78 59 e1 07 72 7c 6b dd c6 e2 ba a3 | d9 65 69 17 a7 c0 a3 0a 55 b6 e5 ec fe e5 d7 0c | e2 b0 63 ac 57 e2 d2 cf 8d 95 42 f0 b9 eb 11 95 | 06 f4 89 63 1b 69 36 d8 f0 18 5a f6 11 36 49 d2 | 9c 2e b0 3b ce a1 a2 86 6c 95 83 75 36 ba e8 57 | 19 ab ae 24 a8 a8 8b f0 5a 1f 87 f9 4f 41 e2 02 | 07 52 df ae 68 e9 dc e7 08 15 ec 9a 14 88 f5 0d | e5 d1 7e 0b 47 52 22 7c 78 44 6c 0c 9c d0 6e ef | 1c ad c0 bc b6 c3 32 c1 e7 fe 27 7b 2a f8 63 2c | ed 16 23 69 56 c8 a9 55 34 58 cf 3c 9f 37 38 a1 | 29 00 00 24 4a 83 23 c8 a4 30 70 f0 5a 7c 61 66 | 38 1d 39 8c 6e 37 91 1c 03 43 e8 78 33 d5 cf ca | 19 09 4b 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f f8 c0 07 c2 89 1e 18 8b 01 61 d5 | b6 df d9 a8 3f 00 fb ad 00 00 00 1c 00 00 40 05 | 9f 2a cf 58 d8 ce 32 ac 63 1b 6f d8 96 97 22 22 | a5 d1 09 13 | libevent_free: release ptr-libevent@0x7fb388096570 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a52c90 | #752 spent 0.0646 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #752 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #716 | start processing: state #716 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #716 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #716 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #716 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.715693; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.492504 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a52c90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #716 | libevent_malloc: new ptr-libevent@0x7fb388096570 size 128 "road-eastnet-nonat-205" #716: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #716) | 15 cc 63 e1 75 96 2f 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 dc 43 34 c1 27 75 84 11 ed 21 f4 e0 64 42 f7 | c1 3e 43 b3 2e 58 fc be 1b bc 53 63 f4 17 1c 6e | 5a 45 c6 f0 ee d5 d4 c6 e3 d7 81 ef f2 fc 94 66 | 39 e4 1e d2 9b 3e c7 28 c2 8b bd 93 f2 64 11 f3 | 6d 23 8a cd c0 e1 82 ee 9f 75 ce e2 44 b6 22 97 | b0 c8 8e 1c c2 54 f6 e5 b0 5a 7c be f1 58 3b af | 05 be 31 c0 84 4a ea f9 f1 d6 8f c9 37 52 41 dc | 85 26 42 e2 6b 91 5c 08 46 f5 3a 3f 3e 0c a3 55 | 9a 1f 55 f0 63 1e 9b 9f b7 db 3f a7 92 12 e2 1c | 71 2e e6 9d 0c 47 67 7e f1 af bc 6a f8 c7 1a de | 1b cb c2 40 86 c2 28 a1 ad 88 3e 5e b7 2c dd 98 | a7 93 94 47 b6 7a 9a 3f be ca 7f 22 14 8e 7e 92 | 47 e5 43 10 40 3b 02 34 62 d6 f9 32 a9 14 c7 88 | a6 fc a7 e6 13 8f 48 a9 3c 09 bc 34 a6 f2 66 32 | 93 05 6b 00 f2 c3 6e 0d b4 b4 e6 20 5c 15 86 46 | ac a1 7d 60 75 3b b9 68 18 8d c8 ea 5e c4 4c 21 | 29 00 00 24 50 21 0d 31 fe d3 b4 a7 ac 53 44 3d | ea f7 97 43 73 d7 d9 9e ec bb 48 86 85 79 7b 5b | 1e 65 bb 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 9d 08 f6 6e 7f ce e0 5c 6f 3f b3 | 3b aa bc 8d 53 41 77 8e 00 00 00 1c 00 00 40 05 | 6d 9d 29 89 37 a0 02 51 09 39 ed 22 b1 d6 21 cb | f4 e3 b2 ae | libevent_free: release ptr-libevent@0x7fb3540906c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #716 spent 0.0659 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #716 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b1c440 | handling event EVENT_RETRANSMIT for parent state #705 | start processing: state #705 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #705 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #705 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #705 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.715773; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498542 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #705 | libevent_malloc: new ptr-libevent@0x7fb3540906c0 size 128 "road-eastnet-nonat-219" #705: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #705) | e4 ea d6 a0 2f c9 a3 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 7c c8 42 8f 06 18 fc 5b 92 d1 29 9a b8 7e 41 | f6 a4 31 12 5b 26 92 fd 9f 47 11 64 9e 6f f4 e4 | 12 64 a9 5e 66 b6 e1 58 06 5c 6e a4 d8 cd a0 77 | d4 f2 75 d0 15 29 94 5e 44 f7 e6 25 17 2d ce d5 | b2 ac 28 52 ff 01 37 57 30 3e 89 ab 0b 8f b9 8c | 99 a4 b8 00 95 ca 4d be f0 0c 6f e9 1e 6b 01 06 | 85 ec 86 52 05 73 ad be b1 77 31 d9 4f 2a bd d2 | cb 65 32 9b 1d 91 2b 57 c3 a3 74 9f d6 0f df 80 | 71 49 8c 6a 29 4d 67 17 1a 96 61 69 5f ee 1a 4e | be 5e a4 e5 77 ac 19 89 87 3e 45 49 18 e7 4c fb | bd 46 d7 d5 ca 9c b5 11 06 64 b4 70 c8 30 4d 79 | a1 73 5b 2b 6c be 9e 44 fe 0f 31 6c 40 a6 5b 7c | f7 75 57 62 c5 d6 88 57 3b 7c e0 26 3f e9 11 e8 | e0 a2 3f 0b 6b c6 59 22 42 04 11 16 76 9d a3 7b | 56 7a 4e 9e 2e fe 0a a4 c4 36 99 d2 a5 5b 55 6a | 02 f9 54 cd b4 25 1d 90 44 15 dc 73 12 b3 5f ee | 29 00 00 24 2d 29 13 9f c9 17 1e e2 ce e9 19 17 | 61 b2 63 4d db 33 56 ec 2e 67 9b a1 ab af 70 d6 | 30 e4 5f 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 89 a0 7e 4b fe 45 8e e8 50 f5 c0 09 | 02 48 60 69 27 23 d3 25 00 00 00 1c 00 00 40 05 | 9f 1d 84 c9 70 7f e4 45 24 70 e4 75 c6 bd 55 ca | 26 ec 6e a8 | libevent_free: release ptr-libevent@0x7fb3580843d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c440 | #705 spent 0.0706 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #705 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46adc640 | handling event EVENT_RETRANSMIT for parent state #756 | start processing: state #756 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #756 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #756 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #756 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.715857; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498033 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c440 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #756 | libevent_malloc: new ptr-libevent@0x7fb3580843d0 size 128 "road-eastnet-nonat-249" #756: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #756) | ab b5 91 0b be 67 d7 85 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 d0 0b f2 10 30 f6 71 1f 52 95 5b e8 84 71 d8 | b6 b3 10 4f b8 55 03 27 62 11 e2 42 15 c0 2e 29 | af 7e 73 a6 41 c3 b1 35 90 96 0e 47 d0 76 07 a9 | 2b cb 96 02 37 a3 ad 49 a7 3f 01 e5 75 c6 65 12 | 57 6e 8d 37 95 0a 16 59 b9 51 41 ba 40 c3 b9 65 | 2a 6f f8 33 e2 59 37 70 46 6d 6b 62 cb b6 f2 1e | c1 f4 5c 3f f2 8a 2e 11 d3 d5 38 3b 01 cd ba 1e | 36 d0 b1 59 ee 21 ba 67 dc 67 7f ac 18 5d ee 64 | df 96 2d b0 3b 2f 42 82 e4 47 da e6 c6 85 9c 6a | 6e b9 1c 9f de fc 80 2c 8f a9 d1 a8 95 91 00 d2 | 9c 44 d3 94 50 87 14 71 86 2d f2 72 6d b8 e3 23 | e7 7f e6 3d 7f 22 68 1c b4 f2 79 c8 40 1e 0d ff | 0d f9 a8 b4 e4 e9 a4 8d 37 24 73 7b 55 05 6d 7d | b4 29 f9 e5 9a b6 d0 4f 47 2d e7 59 1c d4 96 2d | 12 ee 9c 8f dd f2 7b ff 88 08 ab 64 b4 ba 21 15 | 53 99 9f e0 75 15 e2 71 70 09 49 52 bf ef 18 8c | 29 00 00 24 f2 16 4e f4 49 9c 51 e5 b1 12 94 4d | 27 c5 37 4d 3a 23 1c 11 e4 13 5f 53 31 01 4a 86 | 80 54 c9 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 ca 45 b8 db a1 b9 58 c3 06 7b b3 | ca d9 2a 0e 01 f5 5c 0a 00 00 00 1c 00 00 40 05 | b1 fa be f6 27 73 b2 ce c8 1e 50 4f c1 a6 7d 93 | f4 9a a8 7c | libevent_free: release ptr-libevent@0x7fb3640ac040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adc640 | #756 spent 0.0642 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #756 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a54250 | handling event EVENT_RETRANSMIT for parent state #719 | start processing: state #719 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #719 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #719 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #719 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.715934; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.495901 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adc640 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #719 | libevent_malloc: new ptr-libevent@0x7fb3640ac040 size 128 "road-eastnet-nonat-193" #719: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #719) | a1 e8 20 43 a8 88 d4 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 ab ba d1 12 9a ec ff 2a 8d 05 f1 61 72 fc 12 | 50 d0 8b 0a f5 f8 07 f6 3e bb 96 36 70 dc 69 15 | 19 13 a2 d6 28 22 91 85 b9 c6 ae 40 f1 6f da 62 | 5e 9b e9 42 bc cd 47 a9 39 f2 57 46 62 a2 10 aa | d8 dc 57 a1 b1 b0 e1 a2 6e 21 37 a0 e6 91 53 43 | 3a 39 b3 13 b9 9a a2 2c 1d 20 6a 6b ed 1a b3 d6 | c1 d0 e0 c4 cd b3 32 14 d0 e6 ed 44 76 72 46 07 | d4 18 aa 83 01 f8 a3 38 90 94 a1 fe 3b 59 34 42 | 25 b7 b1 5f cf ed 7b 9e e4 7a 92 07 5e d0 c7 a2 | d0 7e 54 5b 4b f9 50 6a 40 3e 4c 40 b2 5c 33 c4 | 63 a9 26 d0 d8 64 ca 1f 4a 1f e3 d6 1f 89 7f 4f | 6e 5e 19 7f cb da f9 38 d8 39 8e fa f7 bb 35 44 | 19 f4 69 49 42 32 1f e6 a6 69 2b b3 d6 b8 11 37 | 64 4d 1e b3 f2 07 24 9a d3 3f 11 59 ae e5 5b 71 | 8d b9 39 61 c8 17 f2 28 f6 ff e7 6f 1d 64 87 fa | d5 05 27 cd c8 9d a9 d6 a8 55 c4 9b 8a 80 03 48 | 29 00 00 24 35 05 0b 61 81 12 01 a2 56 70 69 a8 | c1 2a 37 d5 7f b9 83 93 56 ce 1a 17 bb 38 92 4e | 85 53 16 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea c6 0c 55 e6 7e 39 b7 3e fa e3 87 | d8 fd e1 5c eb b3 f6 df 00 00 00 1c 00 00 40 05 | ea 71 42 1a 2a 30 c7 3c 78 cb 6c ab 7d ed 04 39 | d2 40 14 db | libevent_free: release ptr-libevent@0x7fb34c06f420 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a54250 | #719 spent 0.0662 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #719 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a47f10 | handling event EVENT_RETRANSMIT for parent state #723 | start processing: state #723 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #723 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #723 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #723 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.716013; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.497559 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a54250 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #723 | libevent_malloc: new ptr-libevent@0x7fb34c06f420 size 128 "road-eastnet-nonat-155" #723: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #723) | 36 da f7 c5 2f 91 5f 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 26 74 72 fd 9e 9c 10 9c aa ba 2e c0 be be 66 | 22 9f 1a 62 8a 9f e6 3f e7 37 3b 1b 58 bb b4 f4 | a7 74 cc f5 37 05 fb 5b 1c ba 9d 27 55 34 43 f1 | 74 ee 17 2f 42 15 bc 36 96 52 c7 49 68 f2 24 68 | 76 d0 e6 45 0e e2 22 75 60 cd ee fd b6 75 20 09 | 00 ba 11 5f cb d5 aa dc 11 39 da 45 40 b7 a5 19 | c8 d5 2f 89 aa 7e 26 c1 13 b3 e0 94 56 31 ee 6c | 7c ec 62 9f 9b b7 d8 bb 9c 47 40 55 ef 32 b3 53 | 6c 79 f6 28 33 7a 17 48 72 6f e2 3a 5f f4 48 35 | 73 a1 7e b6 79 10 98 c6 44 1b aa ea e8 c1 36 b9 | f7 bf 2c ce b0 d0 2c 48 3b cd 2b 55 90 e1 5d 20 | f5 96 29 1e ab 81 03 61 9c 1f 05 2b 89 67 64 02 | 4e 7c e5 42 a2 f9 61 f6 dc bf 78 f8 b1 ca 56 69 | f3 d1 e1 49 87 d2 fb ee 1f 6c 89 a1 b4 e9 5e bd | 34 56 05 81 f0 52 8f f2 fb fe 6c 2c 13 77 1c 0f | a7 6d fb a5 f4 8e 00 1f f3 70 1f a1 8a 77 8f 5d | 29 00 00 24 6b 53 2d ae 51 68 5a 25 06 10 41 a9 | 74 bc e4 28 01 83 dc b1 fe c7 47 aa 45 92 94 cc | 73 9f ae 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 9b ca 13 30 40 c0 94 4a 3a 13 b5 | 19 3a 19 0b be 4d 6e 5e 00 00 00 1c 00 00 40 05 | fd 4f 80 57 98 34 ce 28 4d 1c 78 e4 ce 99 f3 3e | f2 93 74 b1 | libevent_free: release ptr-libevent@0x7fb34c074c00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47f10 | #723 spent 0.0715 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #723 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c01d710 | handling event EVENT_RETRANSMIT for parent state #726 | start processing: state #726 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #726 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #726 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #726 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.716102; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.495241 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #726 | libevent_malloc: new ptr-libevent@0x7fb34c074c00 size 128 "road-eastnet-nonat-199" #726: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #726) | 0c d9 0f fe b0 de fb 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba 5a 03 41 cc a5 fd 1a 49 8c 1f 01 a4 d7 6f 42 | 4b 04 b3 65 c6 04 c6 d7 7b 8c 73 c5 64 a3 11 05 | db ca 95 5a c3 b5 81 cc 3c e0 e0 10 f0 ff 7e 0b | ed f4 ad e5 9b 37 9a a2 23 4c 84 01 ff 22 3f 36 | 71 71 f2 27 6b 0d e0 3f f7 18 a7 11 1f 03 8b fc | 68 47 d9 20 6d ba a0 e4 3e 38 1d 24 82 8d dd ed | f0 f3 ff bb 45 10 55 de 96 c4 67 c7 c0 4e b6 ff | ff fa 6c 42 29 12 cb 76 59 82 15 5d 1c 3f 19 0a | 04 84 40 90 fa 20 d9 8c 32 64 bd 98 62 52 e2 03 | bf fb 12 3f 70 5a 23 2e b6 a0 1e da 62 5c 54 65 | 28 94 12 c3 ff c8 58 af b7 92 ff e0 c9 41 fa a6 | f7 68 bf dc c3 be e7 16 3d 20 d2 d0 0c 4d 6b 0f | f1 85 f8 60 c2 47 89 cc 68 3e 26 98 33 a2 77 d0 | d7 d8 d6 c2 eb 37 9e b4 c7 a1 fa b6 a2 06 85 67 | 8a 85 66 84 52 40 0f 08 d5 73 dd 84 59 ba e4 3b | 8d 2f d0 0b 1e 56 e6 0a e8 13 8c bc e0 02 15 0f | 29 00 00 24 5f db 23 af 71 bf 0d 40 27 c3 a7 aa | e9 98 98 31 72 a3 0b fe 84 2c 87 3c 00 39 ba 62 | 98 9c 34 f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 67 ba 9f db 5b 15 ef 4c c9 2a 37 4d | f7 85 c9 a1 4c f4 99 05 00 00 00 1c 00 00 40 05 | 17 ee f7 ed 41 32 9d a2 b1 d3 43 b7 8c 71 7a 66 | 24 14 bd f6 | libevent_free: release ptr-libevent@0x7fb378085d30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c01d710 | #726 spent 0.0667 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #726 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3780297c0 | handling event EVENT_RETRANSMIT for parent state #737 | start processing: state #737 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #737 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #737 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #737 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.716182; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.491016 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c01d710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #737 | libevent_malloc: new ptr-libevent@0x7fb378085d30 size 128 "road-eastnet-nonat-189" #737: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #737) | 62 bc 01 e6 ef 5b 20 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 66 85 a0 b2 da 45 c4 c8 86 e8 bb 58 04 8f 23 | c5 98 b3 86 8c d9 3d e0 66 ea fd 6e 98 4b e0 01 | 77 7e 62 b4 42 d4 3c 39 34 2b 32 9b 48 02 57 f1 | 43 d9 98 13 95 5e 59 11 5e 01 ff c9 1c bf 20 5a | 97 da 26 ae e7 18 db f7 f0 a0 b8 39 fa b2 27 ca | 76 61 93 73 f9 9f 90 66 03 e2 33 bb d1 e7 63 33 | f7 1f 47 9d 66 dd ce 29 e2 ce fc 79 7d e1 df bf | dc 9e e5 af eb e9 5f a2 61 50 44 f7 b3 6f 62 6a | 00 64 f2 03 7d a9 73 95 eb b3 13 a0 cd 38 e6 bc | e6 82 cc 57 4f 84 63 cc 7c 55 1b ca b1 df c8 fb | 40 3b 1d 30 71 fc d6 dd b0 87 15 c1 2d 4f 62 0a | d3 3f bd e6 06 ca 4b 23 74 c6 f0 8a 6c 6c 87 c0 | a3 d6 77 77 fe 47 ed a9 72 bd 08 ac d9 3e 17 96 | 30 05 c0 a7 7a 4d 24 f3 62 68 cf 5a 4b 4a 82 ce | 23 28 f5 14 67 63 ea 32 5f 7d 39 c5 98 d8 43 3b | d9 8b c6 31 05 9d c5 e0 94 47 37 b4 5b 9f 31 c8 | 29 00 00 24 05 60 52 c6 c7 57 70 5a 1b 6b 34 82 | b5 50 99 7f 74 f0 48 4f 7c 17 db cd 98 c0 39 1a | e7 e2 cb 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 ce 96 b7 f8 31 73 c0 a8 ac 4a 38 | e0 6c fe c9 12 67 fe 8f 00 00 00 1c 00 00 40 05 | 2c fb 7f 58 95 5f 54 36 dd 15 01 4b 74 42 c4 35 | a5 03 67 5a | libevent_free: release ptr-libevent@0x7fb384086f10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3780297c0 | #737 spent 0.0691 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #737 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34802a9a0 | handling event EVENT_RETRANSMIT for parent state #721 | start processing: state #721 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #721 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #721 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #721 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.716272; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.494724 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3780297c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #721 | libevent_malloc: new ptr-libevent@0x7fb384086f10 size 128 "road-eastnet-nonat-104" #721: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #721) | e2 d2 81 3a 91 66 0b 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 66 4a 11 45 27 41 9e fa 59 58 40 a4 cc e3 66 | a4 14 b6 1a 8d ec 4a 94 ae 30 93 f6 e0 2b 48 5e | a9 86 4c 46 13 47 37 8b 91 48 67 89 bc 13 95 86 | c3 a5 fd 51 f1 60 1a c1 1b ea 4a 3d 68 db 35 cf | b9 d2 24 1d 11 fa f4 f5 69 79 96 a5 67 36 23 c2 | 21 40 a7 85 5c c3 43 86 61 71 35 04 bc b3 26 45 | d5 aa e6 7b c3 47 8d 08 98 e5 21 f1 ac 8e ba f5 | 2f f9 eb fc a2 04 fd 35 92 de 29 dd 6d 2d 53 6e | ab ec 31 fd 91 c3 8a e1 90 85 af 74 f4 e2 93 a0 | ef 1a 10 50 72 25 37 c7 21 d8 7a 5e 58 f6 7c c1 | 2d b3 8b e3 6b e8 be b0 e1 38 1c 05 0b d7 f6 07 | 9c 25 56 1c 46 bf d1 bd c5 df dd d8 33 23 d8 b0 | a2 c8 cb 1c b9 39 f3 85 c7 0b 15 1a 74 ff 55 80 | 1c fa 71 d1 23 f1 d9 e4 a0 14 57 46 33 58 01 33 | 3e 06 c5 79 b4 72 cb 12 6a 21 9a 81 d4 46 48 66 | 8a 9c 2d 86 80 06 17 4f 80 91 2d 38 09 9b 22 b4 | 29 00 00 24 a7 2a 51 43 4f d0 b2 2d b6 00 60 33 | be ce 9f 17 58 67 da 33 8a 89 27 e9 8a 3f 82 9a | 4a 50 3e 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c 9c ed 7b 0b 4f 45 bf 12 47 14 a7 | 35 17 86 4b 30 03 87 f5 00 00 00 1c 00 00 40 05 | 78 3e ba 2e 78 93 3c a4 49 e4 a1 77 52 95 07 b6 | 6d ae 67 c4 | libevent_free: release ptr-libevent@0x7fb348077830 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34802a9a0 | #721 spent 0.0825 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #721 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35401d710 | handling event EVENT_RETRANSMIT for parent state #731 | start processing: state #731 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #731 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #731 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #731 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.716364; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.486932 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34802a9a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #731 | libevent_malloc: new ptr-libevent@0x7fb348077830 size 128 "road-eastnet-nonat-247" #731: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #731) | eb e9 70 00 69 c5 c4 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 67 4d f9 7f 74 4c 76 c5 7d ce d6 e6 9c c9 6d | b0 c4 70 40 ef 97 97 d2 1c 4e 93 b0 80 9d 3a eb | 37 1f 1d 04 0c ef 30 c3 25 21 ef b9 52 fa f8 25 | f3 a2 cd d3 47 9d 78 9f 8b c4 7e 38 5c 77 0a c5 | d3 21 67 45 0d dd 9e 51 ac e8 fe 88 81 61 87 c2 | bf ec 72 79 20 70 3d b9 9b 4a 0a cc 96 c2 0c 1c | b4 24 87 a5 62 f8 87 c2 7a b5 bf bd b6 53 b6 6d | 19 8f 82 6c 68 5d f7 38 34 94 99 64 71 ca 0c 62 | 25 bd 32 0c 2a f6 57 9c 09 73 ce dd 1e 58 8d ff | 02 8b 34 0a 54 68 de e5 d0 3e d2 74 a9 f6 24 94 | f8 4f 07 60 33 d2 a1 12 0e 69 d9 92 e8 be 55 47 | 9e be 0f a2 43 78 15 07 2a 74 35 28 6a 6d 64 ef | 98 ba 51 d6 01 0e df f1 ec a7 d0 19 a4 37 69 ad | 90 02 2d 4c a7 53 6f b7 ea d5 ab de f2 8a 74 80 | 9a 6e ee d2 0f 75 5b 34 33 20 ef e8 cd 1c f4 fb | 86 77 5a 4b ee a3 d1 6d 3f c5 96 d8 02 ae e5 6b | 29 00 00 24 b0 eb 9d cd b4 1b 6f 55 a3 ba 16 0e | 88 2e d4 ea 77 6f 8c e6 93 bf f5 13 b8 7e f8 74 | 0e 59 6f 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bb fd fb f3 6e e4 ad 3c d3 d9 d4 b4 | 6c e9 ad f0 0d 3a ec db 00 00 00 1c 00 00 40 05 | 69 a1 72 77 b4 3e 53 1b 4f 8c d6 b0 82 44 05 d3 | c0 95 51 82 | libevent_free: release ptr-libevent@0x7fb35c02e960 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35401d710 | #731 spent 0.0669 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #731 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0a940 | handling event EVENT_RETRANSMIT for parent state #745 | start processing: state #745 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #745 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #745 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #745 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.716444; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500929 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35401d710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #745 | libevent_malloc: new ptr-libevent@0x7fb35c02e960 size 128 "road-eastnet-nonat-226" #745: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #745) | df ac 39 b5 f9 b7 7d 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e f7 65 df 71 26 c4 3d a2 90 5c a9 e7 88 ce 69 | ff 2d 77 e1 e9 28 b2 ca 63 26 2f 17 f6 30 c1 b6 | 39 b0 8c 45 80 54 3e b8 78 2e 6e fd 9a 2b 2a 52 | ca 74 04 e0 de 83 7f 71 5a 19 b2 89 32 08 35 52 | 70 00 7b 76 28 6d 62 a4 be 64 0c 1f a4 45 57 cd | 11 68 13 12 c1 4b 60 df 43 a5 14 ea bf 55 ed 2b | 18 e3 70 ee 05 77 1b 59 ad 13 96 57 35 f3 b4 6e | 28 41 98 f7 f9 c2 8e d1 b6 81 56 ba 5f 83 59 98 | c7 5b ab 64 6f 96 f4 3e 22 b8 09 cc af c2 0e ab | 6d a3 ec bb 7e 4b c4 f1 95 3e e6 35 d1 ea 5f d2 | 5f 46 72 4a 07 85 6d 10 0c 34 15 0b a2 f3 fd 62 | 45 e0 37 8e b4 eb a6 d9 5e 4a c5 3b b8 de e2 bf | 9c 19 26 ec 20 49 07 de 03 c8 b8 f2 22 8a b0 69 | 7c 4e a6 9f e0 80 50 9a 1a 56 09 a3 d2 31 da 0c | 1d 1c 03 93 e7 49 e4 22 b6 cd b0 39 68 08 3e 18 | 56 e3 51 94 91 4c f4 14 88 bd 84 2f 7c a2 b8 75 | 29 00 00 24 55 ae 14 5e ed e8 27 ac 21 93 fd 63 | 78 8a 19 9d 55 09 8a 50 52 47 37 07 2f ec 25 35 | ae 89 b9 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 71 bd aa 31 18 7e 5b 95 40 b0 64 | 8c 00 c2 4d 9c 60 b6 d8 00 00 00 1c 00 00 40 05 | 96 11 c6 74 b5 44 15 ed 03 ab 9b 4e 68 8e d0 9d | 24 43 c0 9f | libevent_free: release ptr-libevent@0x7fb350098a50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0a940 | #745 spent 0.0645 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #745 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a61bd0 | handling event EVENT_RETRANSMIT for parent state #748 | start processing: state #748 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #748 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #748 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #748 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.716524; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.497775 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0a940 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #748 | libevent_malloc: new ptr-libevent@0x7fb350098a50 size 128 "road-eastnet-nonat-213" #748: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #748) | 55 e3 5f af 64 96 c1 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 49 74 0b 85 d8 7e 22 f4 24 c6 c4 1e 33 2b 72 | de 21 d5 d8 32 fa 23 15 bc cf cc 93 06 5f 8f 3d | 33 17 cb d5 a3 91 ea a4 08 ea 77 c4 ba 4f b2 c8 | 77 bd 77 0a 64 bf c5 2e 63 22 69 74 77 90 c3 c0 | 7a 1b e6 e3 83 ec f7 b8 33 a0 30 ad 02 6a 84 e6 | 8e 7d 03 00 5b 0a 7e 62 09 5c 74 87 75 30 51 f1 | 91 ec f5 7e 8c 61 42 33 40 a2 94 e7 01 8f e2 79 | 76 aa 01 17 97 36 fd 8f 9e ae fe 3a e2 ba f3 af | 94 c5 f1 a9 e6 63 f6 f6 a1 03 7a 65 00 af 54 11 | e5 00 90 3d 36 87 b9 d1 e9 b5 0a ae ab dc ad a9 | 87 ae db d2 e4 c6 98 b6 7b 34 1d a2 a1 16 a3 c1 | 3d 22 9f bf 31 7c 8e 58 98 5c 80 18 f1 bc 29 9b | ab 82 89 c0 f7 55 bb a7 65 83 55 92 1e 57 97 a9 | dd af 8b bb b0 b4 5a 7b 30 5e b0 29 47 2d 2b 9e | 77 6a 4a 54 93 5f 70 12 2d 60 4f 4a 49 09 0e 01 | 86 63 18 ee 62 60 24 64 c2 a1 ed 84 95 08 03 88 | 29 00 00 24 01 dc 8e e5 8a ed 55 ae fd 55 02 d3 | da e9 1f 52 6e 45 d8 c4 f0 34 cf 2c 20 9a e2 e3 | 81 59 db b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 15 26 72 3e 77 b9 07 bc 5d 56 07 | da e3 bb 84 01 39 7d 04 00 00 00 1c 00 00 40 05 | ed b0 75 8e 7f b8 61 e6 fe 70 60 49 2f cb 06 74 | 34 38 55 35 | libevent_free: release ptr-libevent@0x7fb380093250 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61bd0 | #748 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #748 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c00cfd0 | handling event EVENT_RETRANSMIT for parent state #746 | start processing: state #746 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #746 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #746 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #746 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.716602; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.491108 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #746 | libevent_malloc: new ptr-libevent@0x7fb380093250 size 128 "road-eastnet-nonat-241" #746: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #746) | f7 37 f9 ef 73 ab 62 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec d3 29 72 57 bc 83 2e 59 c7 f4 c6 5c 3e da 18 | f6 16 d5 05 b4 32 f8 47 60 e6 d5 e8 a6 7d 89 42 | 82 4a 4c 03 9b 5b e0 5c f4 ec 3b ce 58 3e 0f d7 | 56 dc 82 59 f9 cf 59 04 12 a3 54 12 37 fb d1 ea | 36 9c 13 92 72 99 d6 a7 42 5f 4d 49 ac 8b 2b cd | 32 c7 55 29 46 4d 74 68 cb 5d e1 7e 03 f3 bd 63 | 8b 55 fe bc 55 8f 8b 48 6b 11 21 29 87 1e 76 8a | e2 d8 b8 76 db 47 07 03 9d ab fb c5 6d 10 75 bc | da a7 8f b2 4f 24 eb 9e 43 a2 a3 e4 50 56 93 18 | c4 a1 e9 f8 22 3c a2 54 2e 1c b7 97 b7 4e 3d 26 | 8d f2 a4 30 a8 df 1f 7a 1e 6f f0 e5 f8 33 10 24 | c0 68 75 e5 96 36 ef 47 b0 86 2f 4d cf ea df f8 | 81 cb 73 da 28 a5 cc 66 eb b4 89 33 1e 77 a9 f0 | 20 e5 72 31 64 9b 5f 87 2b 0d c9 49 f4 a8 a7 b2 | db fb d8 02 de 79 32 bf 41 fa e4 fc a6 6d 9e 9c | db 06 92 90 d9 34 01 45 1b 0a 7e 2b a8 ca 95 b4 | 29 00 00 24 e3 e6 84 b9 78 ba 0f 63 d4 48 76 09 | d5 37 c9 85 6c 14 ea c9 21 5e fd 8f e7 46 60 84 | c0 9a 70 f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 43 0b 6f 8b 96 5f 6c af ec fa 55 | 79 2b ca 5d e7 59 20 5c 00 00 00 1c 00 00 40 05 | eb aa 4b a8 95 05 be bc 99 5d 97 8e 1c 2b 9a a4 | 18 3b a4 f4 | libevent_free: release ptr-libevent@0x7fb37807ad70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00cfd0 | #746 spent 0.0658 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #746 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b25c80 | handling event EVENT_RETRANSMIT for parent state #630 | start processing: state #630 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #630 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #630 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #630 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.716682; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.462313 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00cfd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #630 | libevent_malloc: new ptr-libevent@0x7fb37807ad70 size 128 "road-eastnet-nonat-167" #630: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #630) | 7e 20 27 21 e9 84 6e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 6e c1 86 ef 01 ca cb cf d4 54 3a 37 90 3f aa | f9 fd 77 63 7d 3f 32 65 dc 4e 37 40 57 e5 28 ba | bc 68 04 4f 0e 5a 8f d4 7b 6c d8 31 01 31 af 70 | 7b 5e 07 9a cc 86 39 61 db f1 fe 2c 67 ca e6 87 | ee 49 49 c9 ae de 56 6a f7 61 cc 09 1a 0c 64 2d | 8a 63 64 38 db 36 06 2f bf 83 5c 9b 3b 72 ea 77 | 11 54 9f bd 9e 96 60 11 9f 4c 7d 2d 74 85 68 60 | 89 22 b8 8e c9 dc ec 8b d5 1f f0 2e 87 56 1a b3 | 98 52 91 5f b4 c4 5a 2d 4c 8e 2a 9c 04 b4 0f 8f | ba 3a a8 bb 3a 61 d4 4f bd 6e 59 87 ac 42 74 36 | 1d b4 a7 a3 ac b2 f0 31 4d 5c f0 20 80 d9 fb d8 | 99 ed a7 f8 3d aa 61 cd 50 cc 92 53 dc 7d 29 df | 97 52 04 ff 96 9f de 81 2e 64 0e 76 34 9d 05 2a | 60 5d 08 77 dd 6c c0 5f 2b 7a ca 90 dd 00 b8 d0 | df 90 44 71 93 d3 cf 23 7d 74 29 93 b8 60 2e c6 | 85 82 66 37 7d 41 f3 a2 35 e0 e4 2d 9b 02 5f 72 | 29 00 00 24 f5 41 2a 41 21 19 72 0e 4d 58 ec a2 | aa 28 84 44 db 30 74 6c 53 17 b0 90 75 8e b7 a5 | 64 9e f4 ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 7c 2b 60 60 10 f7 1e 72 a5 e3 04 | 6f 3b 05 1e 2d 25 81 27 00 00 00 1c 00 00 40 05 | a3 09 0e 65 34 53 77 41 1c 34 0f 5b 12 a4 a5 f9 | 2c 10 ce dc | libevent_free: release ptr-libevent@0x7fb350082ad0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c80 | #630 spent 0.0659 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #630 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #624 | start processing: state #624 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #624 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #624 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #624 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.716761; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.451969 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #624 | libevent_malloc: new ptr-libevent@0x7fb350082ad0 size 128 "road-eastnet-nonat-225" #624: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #624) | 91 66 df b6 23 36 44 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 04 d0 c0 52 11 6f 6b 97 d8 4a 21 40 0d a8 d6 03 | 5a 31 7a b1 43 64 89 6d a3 67 7b 89 c5 fb c9 87 | fa b6 99 9f 95 c8 70 ce 70 b6 63 79 83 53 ee 5c | 03 14 79 98 13 a2 86 e7 a9 ca 4e 70 0d d2 78 f2 | 04 e5 33 3e 6c 0d da 0e d7 7f a3 32 5d 10 72 3a | e8 21 c5 aa 25 ec 61 02 13 d9 f2 57 e5 85 e2 36 | 3b 19 f5 73 53 0e 11 80 95 c9 7a c2 73 f9 c3 f1 | 92 7a e8 68 48 16 47 32 d8 fa a5 eb 40 2c 5c d4 | e0 f8 c0 97 0f 60 4c 10 92 41 16 02 1b e9 aa 47 | 0a fb 2f 7e e8 bd 85 fc 57 ea a3 81 bb 29 8c 27 | 15 9c 41 59 04 b5 17 25 e2 28 cf b9 d5 e4 f1 54 | 7e 08 6e 40 8c 6b e0 01 f0 a2 bc bd 6a de 51 92 | 5d 24 cd 29 bb f6 9e c2 d0 13 ad 94 34 1b 3c cf | ae c6 f3 ce c0 2c c8 d1 85 6b 46 14 ce 28 e2 1f | cf 9f 53 a4 1f 17 48 36 04 1e 5f e3 ed 6a cc 61 | d7 3f 56 7a 05 e3 3d 19 c2 99 b2 48 2d 25 92 b9 | 29 00 00 24 20 57 85 7e 38 82 c6 c2 c2 b9 82 69 | 7e 4b 89 c1 c5 70 2d 62 ae 17 de e7 0b 2c 59 f9 | 31 54 7c 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7c de 77 a1 da 64 49 53 60 59 d3 c7 | 5c d0 d5 e0 d1 18 19 9b 00 00 00 1c 00 00 40 05 | 99 9e a5 9c 48 82 f5 4c 18 c3 dc e9 e9 80 6e 22 | 1b 1d e2 41 | libevent_free: release ptr-libevent@0x7fb38007a830 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | #624 spent 0.0643 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #624 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c01fda0 | handling event EVENT_RETRANSMIT for parent state #615 | start processing: state #615 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #615 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #615 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #615 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.716839; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.452521 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #615 | libevent_malloc: new ptr-libevent@0x7fb38007a830 size 128 "road-eastnet-nonat-25" #615: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #615) | 3d 12 6d 03 9d 3a 3f 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f f9 00 4e 05 17 74 a7 73 6c 7a 55 de e3 3f bc | b6 50 d8 da 7f 1d ba 94 53 90 d9 17 e3 56 27 62 | d4 43 27 60 0b a1 f0 f9 c0 27 e9 0b e3 82 e7 85 | 80 6a 81 03 53 c7 b9 23 a3 5a 6b a7 5d 76 6f ac | e9 13 02 5b 79 2d 66 7b ff 5c a6 74 d0 95 c7 c2 | 71 fc d6 11 6a 39 e5 64 21 9e b5 4d 11 be 89 8e | 5d 20 22 f2 57 1a ae e9 d9 48 ed e3 e5 74 a0 a2 | cc fd e4 70 7c a3 dc a0 27 e6 f1 f2 c5 fb f1 1f | 79 67 f9 17 79 f4 c5 25 d5 53 79 6f 85 2b eb a0 | 27 7d 23 ed 74 15 b9 2a 82 05 20 2b bb 1e 36 fe | 50 40 25 d6 98 23 b1 bd c4 a8 9d 60 26 d6 0b 43 | 16 dd 68 58 c3 dd 64 ba de 9f 7e 50 5f 81 e9 94 | aa 7d 9b 9b 86 a9 b2 65 a2 14 57 a5 2e a6 24 6f | 4f 4e 8d fb e6 1b e7 3b 6c 59 92 d8 48 02 79 8d | 9b 5b 3b 8c ae fc 09 50 ce 87 b0 23 2c d7 e5 44 | 3c 8a 3a 64 cd a6 2c 8d 5b ba 46 2d 2c b5 ed 4c | 29 00 00 24 7e 29 69 54 1c 75 9f 10 bb 76 c9 d5 | f4 45 3d a6 cd bc 36 61 89 98 84 20 31 27 44 33 | 6a 69 46 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 49 5e 77 cc 13 4a a8 38 41 6c 23 4b | 5b 37 4e ff 01 d4 b9 94 00 00 00 1c 00 00 40 05 | 52 22 03 e7 9f c3 e4 87 eb 62 51 6b 10 18 8d 12 | 1a 37 2c 77 | libevent_free: release ptr-libevent@0x7fb38400f680 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c01fda0 | #615 spent 0.0664 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #615 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a61c10 | handling event EVENT_RETRANSMIT for parent state #586 | start processing: state #586 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #586 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #586 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #586 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.716918; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.425129 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c01fda0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #586 | libevent_malloc: new ptr-libevent@0x7fb38400f680 size 128 "road-eastnet-nonat-2" #586: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #586) | 9a 3d 1d 73 e3 e0 91 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 56 d8 cc 60 f7 06 cc 59 a5 66 b8 41 54 bb 3e | fb c8 6c 81 84 53 c6 13 31 8d 8e 62 d7 09 63 52 | 53 8c bb 8d d7 5b e6 4c 25 af 80 11 96 28 b9 4c | 79 b0 e7 e5 ff 99 62 bc 0e c5 91 68 49 55 47 3c | b1 82 16 08 70 32 cf 34 71 08 a2 e4 fa 17 46 eb | c6 40 a2 fa ed 5d 93 66 3c 04 eb 85 7b a4 b8 ca | 3b e8 d5 02 43 56 8f ae bb 2c 5c 40 78 bc 5f 3c | 52 09 33 a3 7b de 07 81 a6 e1 d6 fc 15 c9 f3 d7 | 80 69 07 14 f2 fc 95 be ee 94 aa 9e 80 73 7e 72 | 64 ba 5c 65 91 2e 13 ae 0a 47 61 89 10 86 9c 47 | d1 e2 cb 92 ce 45 0b 0e 0f d3 3d f2 1d 9f b0 3e | 82 b2 a9 6f 50 82 ad d6 b3 d9 b3 ea 4d c2 73 14 | 44 b9 ba 13 f3 1d 41 25 5f c2 36 55 c0 ee 19 61 | 63 cd 05 72 43 48 d0 6b e9 0e f6 84 a0 68 e3 e5 | 72 da 0d d0 be 28 62 56 c3 0f 94 93 0b c0 ef 8b | fb 62 f1 5b 0e 46 8d a6 d6 94 eb 9f 3d 88 d0 f3 | 29 00 00 24 38 81 91 15 7b 18 f0 d0 cf fd 70 7f | dd 31 76 38 5b ce 20 2d 80 1f cb 93 2f 1b 36 54 | 69 55 f1 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 17 b2 6d a4 83 a8 67 51 74 0a 4d | bc b9 f3 7f 40 a8 af 25 00 00 00 1c 00 00 40 05 | a2 cc 78 53 7b 53 71 df 77 82 fc 3c 31 48 7e 51 | f3 07 f9 73 | libevent_free: release ptr-libevent@0x7fb37c0596c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61c10 | #586 spent 0.0667 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #586 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a97080 | handling event EVENT_RETRANSMIT for parent state #715 | start processing: state #715 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #715 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #715 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #715 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.716998; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.48849 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61c10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #715 | libevent_malloc: new ptr-libevent@0x7fb37c0596c0 size 128 "road-eastnet-nonat-169" #715: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #715) | 87 f3 33 9b b4 5a 7a db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 32 d6 a1 b7 3c ef ab ae df c7 c4 47 cf 43 3e | e7 4d 13 2a bf 71 3b 06 70 19 5f 23 cb d2 4a 6c | b7 ad 55 a5 75 a2 bd 13 81 a8 86 77 91 cf 66 64 | 4b df 3a 00 d3 10 2e 7c 50 72 e2 b5 34 23 44 5d | 49 06 3f 61 27 b3 f6 2b 3a 24 b3 2d ad 3e 0b e7 | 98 08 a5 5f e5 eb 5d 79 a1 e5 54 0a c8 0d 72 b0 | bc 43 9d f8 27 f1 a9 ec d6 81 08 b0 58 fa 85 a5 | bd a3 f0 7d 30 fb 04 80 03 dd b7 91 fd d7 85 9b | 8b b8 04 da 0e 45 bc fd bb 40 af 79 c8 eb 61 4d | d1 36 0c 58 d4 5c c1 03 78 d1 4f 99 53 dc 30 3c | 7e 07 1a 87 fb cc 9f e3 42 35 3a 01 7a d8 f6 e1 | 85 49 36 04 18 9c b3 4b 00 44 96 48 ba 1b 91 57 | 4a 52 63 3f 06 c0 7e c7 73 42 05 cf 14 6a 96 99 | ce df 55 13 54 6e 39 b9 b7 60 f2 29 34 ed a0 4f | 37 df c2 18 42 23 f9 6f aa 0b b3 f0 83 72 6b 54 | 39 41 64 39 e0 e8 00 e8 59 63 aa 4c 7c 6e 89 ff | 29 00 00 24 b2 3a 76 ed ee 4c 41 d8 3e b5 c5 39 | 65 e9 8a 6a a3 e0 b7 ad 46 df 99 83 e4 f0 93 01 | c4 aa 3b 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 fe a8 f4 ae 1f 37 b2 cf ca d2 43 | 9d 58 d0 f7 e5 db f0 88 00 00 00 1c 00 00 40 05 | 33 c7 89 bf 1b 04 9e 14 b7 74 ff c8 90 62 35 22 | 26 50 c2 55 | libevent_free: release ptr-libevent@0x7fb374080090 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a97080 | #715 spent 0.068 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #715 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2b610 | handling event EVENT_RETRANSMIT for parent state #657 | start processing: state #657 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #657 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #657 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #657 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.717084; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.467373 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a97080 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #657 | libevent_malloc: new ptr-libevent@0x7fb374080090 size 128 "road-eastnet-nonat-118" #657: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #657) | bf 48 a9 53 c0 7c 6b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 48 64 7a 76 84 6f 20 71 f2 54 53 61 b4 2f c6 | 54 76 e2 72 67 c3 02 01 5f 84 02 0f de 2d ba 04 | 6b 3c 60 21 8c fd c8 83 d8 de 0a 87 07 82 2c 85 | 16 8f 94 7d 11 fa ef a1 1b 06 7a dc 75 50 fb 5d | 8b a8 18 9b 6c fa 90 67 0b 98 3c ce 23 29 77 3a | 62 14 dc 91 f1 b1 30 3c 50 5a b7 ab a9 84 e0 d2 | ce d6 81 2a 09 a1 f6 27 12 d7 a8 6e 71 b4 d2 a3 | 42 60 96 28 6a 9a 98 b3 00 c1 ce 0e fa 8d 64 99 | 97 f3 81 78 89 04 b5 01 30 ce 7b 3b 03 13 20 ba | f7 13 2c 46 1a 99 04 0c d2 4c 52 fa 53 fc 61 38 | f6 1e 41 8e 82 00 e0 91 48 32 35 c0 7e 73 9a b9 | b3 a3 fd 92 08 58 7d 9d 6f 3a 6b fb 59 79 43 c3 | 78 f1 a6 f1 a4 85 3a d3 46 60 e6 af f5 9f 91 88 | 84 4f 9a 31 88 1a e0 60 7b 5c 36 77 35 25 9a 22 | 0a f3 1b 51 c9 cc 85 ea ce be 58 28 90 39 31 a8 | b5 d3 9f 05 f3 8e b3 99 94 db 0d 61 87 87 60 cd | 29 00 00 24 b1 1a 4e 72 ee 50 9a 55 3a 6a 4a 22 | 5c 8a 27 a4 f8 35 f8 89 7d bb de 47 9d 6c ce cd | de bf 5d e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 93 fd 1a 46 eb 2b 7c e7 8f 20 da | 90 df ff 1b 3f 1b 91 27 00 00 00 1c 00 00 40 05 | 66 8b 83 94 36 8b b6 4c fb 21 d6 7a 66 05 fe c3 | a5 94 ca 7e | libevent_free: release ptr-libevent@0x7fb37c0720e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b610 | #657 spent 0.0676 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #657 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad6ec0 | handling event EVENT_RETRANSMIT for parent state #544 | start processing: state #544 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #544 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #544 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #544 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.717165; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.420272 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b610 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #544 | libevent_malloc: new ptr-libevent@0x7fb37c0720e0 size 128 "road-eastnet-nonat-38" #544: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #544) | 0c c8 e0 5f be 01 79 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 4b b7 07 59 5a 8f d2 fb d3 5d 33 1e 68 91 b3 | a2 26 c9 b9 8a b4 e6 8a 43 31 64 0d 77 e0 f1 15 | a1 39 45 b8 6b 02 50 97 06 06 58 9e 3a ef e8 37 | e4 7c 57 f1 4d 93 3b f5 c4 5a e8 bb 95 0b 16 30 | ae 70 14 a4 78 fb c6 1c 98 e7 86 0d 21 64 8f 8a | 57 22 3c 59 65 26 f5 b7 05 65 f5 b3 e4 57 83 07 | f5 ce 36 2e 87 c6 da e7 e8 5c 9e ac 52 b5 c7 3a | f5 b5 91 44 37 d8 f7 d2 db 23 2c a3 a1 47 55 3d | c3 92 ed 16 17 e5 6d f6 27 bc 16 5c 7d af 1b 3d | b1 6f 3a d3 6c 01 d7 03 36 b7 2e bf 9e d3 3d 31 | 24 06 bc a1 b6 d4 18 fd b7 44 8a a2 c6 1d 54 30 | ae a7 68 58 6b 6e 1c 65 90 77 e6 12 7e f0 bb ad | f3 9e 62 3f 52 83 0f 79 80 56 f0 97 14 45 da 2a | 9f 60 50 4a b5 7b 81 9f 4e 30 c8 19 e2 8e 7e 1a | 5f 7d f6 43 0f fd 85 83 e1 ad 46 c1 11 a2 4c 5f | ff 7c b9 be 6e 26 8b f7 40 11 92 c6 8b 91 0d ac | 29 00 00 24 e2 a6 28 8f f1 ed a9 8c ae aa e7 2c | 5e dc cc d9 d9 82 b2 05 50 60 c7 46 e1 4a 89 6c | 50 12 77 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 fb b8 9e 31 b2 48 64 bc b6 ad e6 | d8 89 63 35 93 98 9f 2c 00 00 00 1c 00 00 40 05 | c9 4d f1 16 2f aa 6e 90 ec dc a5 b3 7b 2e 5c c9 | 7d 08 18 e1 | libevent_free: release ptr-libevent@0x7fb38805f660 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | #544 spent 0.0726 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #544 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aa1f00 | handling event EVENT_RETRANSMIT for parent state #627 | start processing: state #627 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #627 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #627 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #627 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.717252; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.464746 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #627 | libevent_malloc: new ptr-libevent@0x7fb38805f660 size 128 "road-eastnet-nonat-161" #627: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #627) | 85 ff 81 8d 39 ae d0 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 b9 1b a0 9a 2c 50 8e 02 95 9b 5f 3b 83 99 4e | 07 74 8d 16 ae 8c bf 98 d2 8b cb e9 a7 c0 0d 94 | 88 9d dd 9b 54 84 6a 7f 4a dc 84 92 79 46 91 fa | 6c 85 8d b3 55 b3 d1 e1 35 12 39 9d da 6c 29 94 | 61 2d cc 21 47 bc b2 6d 88 1a 4a 94 f3 43 7b d9 | 8f 20 77 79 db 4d 47 13 73 be 1f 12 57 25 9e da | cb ff 72 15 51 1f 53 22 a4 a5 4d 16 f4 f5 a8 77 | 72 b7 12 ba 58 1a 43 7f ce ef 32 64 0f 90 fb f0 | 98 cc 71 a3 6d f2 87 79 fa 29 62 da 22 a4 18 69 | 55 35 d1 f8 9d 44 18 aa bf 4b 02 e9 29 b8 5f bd | 16 17 ad f8 d3 f6 25 bb 24 f5 6e 8c 20 d9 44 9d | 67 1d 54 cc 02 45 19 dc 2a 2c 20 34 4f 14 45 ba | 5a 79 14 e1 00 9c 1f b6 a0 9b 07 d7 22 e1 98 15 | a7 b0 4f d0 ee 43 65 3a c3 b4 42 49 47 06 50 31 | c0 75 69 4b d6 fc bf 2f 2f 07 7d 00 fb 73 c9 83 | d0 e8 66 df af 0f bf 7d 27 62 7e bc 01 f7 d2 fa | 29 00 00 24 e2 15 33 1a 7b 95 48 00 21 d4 69 5b | 6e 98 84 ff 1a 3b 2c ef f5 83 72 31 b0 15 1c 81 | c6 0c 3d b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 ee 1c 29 3c 33 ab 04 ff 5a 9a b8 | a2 4b f5 11 1c 8a 96 c4 00 00 00 1c 00 00 40 05 | c2 8c 6c e3 eb bc 71 3c c4 77 e2 2a 2f 10 8a 7a | 93 a1 3f 6b | libevent_free: release ptr-libevent@0x7fb364080140 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa1f00 | #627 spent 0.0667 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #627 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35400cc10 | handling event EVENT_RETRANSMIT for parent state #730 | start processing: state #730 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #730 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #730 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #730 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.717332; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.488195 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa1f00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #730 | libevent_malloc: new ptr-libevent@0x7fb364080140 size 128 "road-eastnet-nonat-234" #730: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #730) | c1 b9 1a 2f a2 98 4a 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 90 42 68 2d aa ea 2e 10 58 50 76 72 99 aa 32 | eb bb 32 a1 c5 3b 39 b6 da 46 5c be 25 37 be ed | ef 19 db bb 09 e7 d6 5a e9 9a f4 55 2b 2e a7 bb | 7d 7e ab 94 f5 2d 7f 2f 19 2d 9d be 3b 1e 1f bc | 50 99 e9 b4 9a 91 0e c6 06 9d 5d 9a ba af 5a 8e | 69 1a 0a b7 44 11 98 29 1c 1a dc d0 d0 5d fa 86 | 8a 1a e8 5e 7f fc 9d 17 de 62 df a0 79 b7 62 86 | 03 fc dc 45 27 d9 98 5e 7e c1 5d 73 17 7b d2 39 | a9 02 e8 b3 fe 5b 39 41 98 ea d2 07 3a ff 02 e9 | 9c b2 8a 30 03 fa 2c fb df 3c f4 0d 12 f0 fb b7 | 2d e5 f6 c1 41 31 4c a6 2b 97 92 32 b8 ab ea d4 | 0c b2 3f eb 53 93 29 c9 b9 5f b1 d5 21 34 f2 4d | fc e4 2a 50 24 06 56 bc c7 41 5b 59 70 69 cf 96 | 1c 5a 5f 05 3e a5 0f f1 a8 c5 92 7e bd 2b fd 46 | f0 21 0d 82 1e f5 38 85 81 4e 66 9c 19 55 16 0e | 44 6b 58 99 91 1b 47 47 7a f8 3e 28 3f a5 78 ea | 29 00 00 24 55 e3 90 65 fa b6 41 c6 1d 4f a6 98 | ca 46 e7 a1 7a 87 94 e6 4e 60 4a 2e 32 84 98 8c | 92 ba 64 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 cb 8c 60 04 f9 7c 78 24 b5 81 07 | 7f 5b 58 33 fe 16 dc a2 00 00 00 1c 00 00 40 05 | 6f f5 31 fa 7e c6 ed 0e 01 8d 80 c5 e9 40 f1 ef | d7 29 12 3d | libevent_free: release ptr-libevent@0x7fb36c088410 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400cc10 | #730 spent 0.0645 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #730 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #709 | start processing: state #709 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #709 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #709 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #709 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.717412; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.484287 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #709 | libevent_malloc: new ptr-libevent@0x7fb36c088410 size 128 "road-eastnet-nonat-183" #709: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #709) | e5 c7 07 55 6e da 09 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5d de 77 2e 7e b4 97 76 d0 4c 88 3a 79 73 30 47 | a5 46 d9 6c 5e f5 d0 01 a8 f5 90 31 3a c3 34 0b | 92 a1 bf c0 52 89 73 d2 41 a6 c8 7c 00 32 8c e0 | 61 01 06 67 0c 70 09 f6 a3 5b 63 77 2c c8 de bd | 50 05 fc 33 a9 33 71 99 83 df 95 2b 2d 8e 13 82 | 7b 7a 49 72 f3 f8 5a 2e 90 58 f7 40 01 a5 24 bb | cf b8 85 6e 52 34 58 c3 42 27 86 ff b5 01 d2 91 | e4 1c 23 fc f2 c1 af 9b 00 10 9e 1a a4 65 99 ca | fe 91 39 7f 9e c5 f3 e1 49 f5 22 78 d6 1e a3 72 | fc e2 3a 47 8a 3c d6 21 02 38 d3 6e 42 de b9 8e | 44 7c 9f 39 9d 77 79 b7 b4 a9 f9 4c f7 02 43 2d | 3e 2b f9 30 d4 a8 a6 b4 68 42 af 60 21 e7 59 96 | 67 d3 1f a3 61 53 50 45 15 9f 37 19 16 e9 8d ad | 1d 5f a6 91 01 82 07 22 2e f0 8d a4 82 14 28 84 | 82 79 d1 ee a4 a1 98 83 13 94 d9 2c 49 f8 36 3c | 29 2a 04 0d bf 91 91 f4 08 b0 48 0b b6 ab 6e 6b | 29 00 00 24 fb fb fc 22 69 7b 64 5f 88 e3 11 6e | bc 63 54 30 45 65 33 a0 dd 21 67 36 78 c5 19 65 | 52 ac 92 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 a3 44 a6 ca 0c 6a 2b 8c d2 4e 18 | f9 96 bb f1 fa 97 0c e7 00 00 00 1c 00 00 40 05 | 23 4f 11 65 7a 64 9b ff 7f 73 c3 02 6d 1c 2f c1 | e4 ed 89 d4 | libevent_free: release ptr-libevent@0x7fb37806fdb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #709 spent 0.0663 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #709 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c039e80 | handling event EVENT_RETRANSMIT for parent state #736 | start processing: state #736 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #736 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #736 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #736 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.71749; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.488676 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #736 | libevent_malloc: new ptr-libevent@0x7fb37806fdb0 size 128 "road-eastnet-nonat-232" #736: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #736) | 55 f4 27 9b 2c 7e 0c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 4e 06 40 b2 65 21 5d 08 0a 87 dc 23 78 63 f5 | 59 9b 01 94 f1 c6 ee de 2e 54 64 04 7b bf ee 90 | 74 b0 cc 16 6d 13 9e 63 f9 06 73 5e 5e 85 4b c6 | 1e 30 91 54 94 48 03 60 af 1a 46 14 b6 86 67 6e | 56 bb 9d f9 7c bd d8 15 ef da 2d b6 8e e2 c0 fa | 6c 86 fc 27 18 08 26 1c 3b c7 8f ab c9 15 f1 b5 | 77 17 8f 4e 86 0e 1d 02 0e cb 79 7f 00 de 43 ca | 0d 98 67 80 78 be 76 95 19 4f 8e 1c 0f 1f 02 46 | b5 24 e0 a5 90 31 f0 6c 94 59 9e 86 fe 50 a7 16 | d3 90 18 f9 5a 5e f2 b0 85 c0 8a bb 36 a9 3c e6 | 3f 58 61 ed 76 63 9e 91 dd 1d 1d a5 d8 6f 61 e6 | 60 34 52 1f c7 3c 4a b9 12 d2 23 01 83 9f e0 72 | b0 b1 95 db a2 3d bd 5f 63 44 17 84 2a 1c ae e2 | 87 6e eb 4c 2d b2 76 61 6e 10 55 07 2f 21 a9 05 | 7b e7 0e 8d 3b 46 3c a2 52 e3 e4 5a a7 20 76 cc | 56 d5 06 15 ef aa e4 2d 6f 6f 60 d9 2a 22 ec 23 | 29 00 00 24 74 fa 10 32 44 33 16 00 ef 17 0b a3 | 58 ac 5e 66 66 dc 61 3e 96 b9 65 fa 72 73 66 81 | d0 51 f7 ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 28 12 e2 be f3 1a 42 9e c5 b7 6c | 8d fd 8b 3e 75 2f e5 8c 00 00 00 1c 00 00 40 05 | 19 e4 47 16 1b 11 27 dd e0 d9 21 b8 1a e6 c5 9c | 84 34 90 f4 | libevent_free: release ptr-libevent@0x7fb37c08aed0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c039e80 | #736 spent 0.0678 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #736 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3700407b0 | handling event EVENT_RETRANSMIT for parent state #573 | start processing: state #573 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #573 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #573 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #573 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.717571; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.447809 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c039e80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #573 | libevent_malloc: new ptr-libevent@0x7fb37c08aed0 size 128 "road-eastnet-nonat-83" #573: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #573) | ad 3e 6c 78 39 d7 59 85 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 bf 7c c9 f8 3c 5a 65 38 6f b3 01 ce 5b f5 30 | a7 ca bf a7 0a 2f 6d 46 e4 95 8f a9 a2 c3 62 81 | 94 18 87 7c 67 ac a9 c8 f7 1a 98 84 db 40 bb af | 3f 2f 53 16 16 52 73 41 99 39 2a cb ce f0 16 f6 | 59 5f 0a b0 20 7c 3d e9 5a a2 88 c5 c1 bb e2 4d | 7f ce 41 78 9a 73 4c 9c 78 3b d4 42 d4 ea b6 26 | c7 66 8b db 44 b6 63 44 77 ad 6a 85 b2 f6 09 24 | d3 1d 9e d9 14 90 b9 f3 03 6a b8 35 9d 2f 7e 69 | 38 a8 b1 78 a7 b9 d5 b5 6e 03 4e df f1 29 29 d6 | 73 fb 44 0b 0c b8 b6 ff 70 60 7e 98 07 b6 c6 7f | c1 02 f7 52 15 2f 51 21 2d 87 70 fa c3 6d a5 50 | 6d c2 b7 77 96 5a 3f ba 71 2f 23 99 27 34 36 64 | 93 e7 80 7e 69 88 92 68 e6 5b cb fb d5 c9 2a 24 | c5 78 ae b1 67 8c 39 a4 a1 f5 8f 57 47 ac be 22 | 0c ba 38 7d fd 68 4d 5c f9 30 0d 91 30 9d 25 fc | c6 0f 2d 2c 17 7f 55 f6 65 7c 10 de 1f 7f 50 fb | 29 00 00 24 50 ef b4 44 89 5d 96 3d 4c 55 e3 f3 | 30 1e a6 1e 68 57 c5 9e 6a b1 8f fc 63 11 d1 e1 | c2 23 29 d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 0a ea 0a 2d 9d 52 e1 84 99 c3 78 | 56 e2 02 95 3c a9 b9 67 00 00 00 1c 00 00 40 05 | 07 da 52 ba 89 af c4 46 3c 5a 2a 18 50 3f 02 03 | d1 88 0a 69 | libevent_free: release ptr-libevent@0x7fb35c069bc0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3700407b0 | #573 spent 0.0664 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #573 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3800383c0 | handling event EVENT_RETRANSMIT for parent state #640 | start processing: state #640 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #640 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #640 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #640 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.717651; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.451168 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3700407b0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #640 | libevent_malloc: new ptr-libevent@0x7fb35c069bc0 size 128 "road-eastnet-nonat-200" #640: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #640) | f6 a6 42 61 47 27 64 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 80 42 6e d7 7a 98 1b e7 63 e1 2e 09 63 bd 4b | 42 e8 81 2f 40 d2 71 01 4a dc 7a af 17 d1 73 0a | 05 3b 3a ce b3 5d 7f 07 44 b9 ac 40 bd 6f 70 e0 | 38 56 e8 ab be 45 c9 63 98 bc 74 58 74 89 72 8a | 13 32 c2 ca 9d 72 be 69 88 7f a2 d0 28 52 16 b0 | 31 15 8e 9f e5 63 61 e6 1c 3b 95 d5 65 9e 4a fe | 1d 24 21 96 2c 5c 93 59 10 e8 5a a8 85 f0 10 e7 | 2b 45 5a 9a c7 e2 d8 dd cf ae 48 a2 5b 7d d5 31 | 5b 11 70 8a 8c fd 1e 06 e6 9d f7 60 5a ec 36 27 | de b1 f3 c3 0b 31 8f ba 37 d6 eb 27 bb 08 95 f5 | 50 60 61 71 06 90 ab 76 57 63 08 97 67 3d 78 5e | cd 6f 6c 41 fc b6 78 36 36 0e ed 0d 70 0b 31 b2 | fa dd a9 a2 95 f8 f1 ba 5b 88 71 81 da 2c 38 d3 | ad 78 62 1e ef 32 b4 3f 99 ce e3 5b 67 a3 08 06 | ca c6 2b 08 09 1b 2a 0e 74 6f e2 ad 35 3b fe 99 | 10 20 b2 e9 6c e4 a0 0e d2 0a d9 68 bf 4e 9b 89 | 29 00 00 24 55 c2 55 4a 4f 3a 0d 38 f2 68 61 3a | 55 3a 39 15 fe 86 62 ee bc 23 58 c2 1a 6c b1 1b | 30 e0 3a 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 47 0f 0c 07 b2 8c 99 66 34 29 66 | 06 93 b3 bc 11 9f 8e 62 00 00 00 1c 00 00 40 05 | 2b 37 ed c1 9f 60 69 a1 71 7c 68 0d 9b ee 86 23 | 55 71 c1 26 | libevent_free: release ptr-libevent@0x7fb35c095ac0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800383c0 | #640 spent 0.0641 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #640 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368018460 | handling event EVENT_RETRANSMIT for parent state #557 | start processing: state #557 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #557 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #557 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #557 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.717729; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.418958 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800383c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #557 | libevent_malloc: new ptr-libevent@0x7fb35c095ac0 size 128 "road-eastnet-nonat-37" #557: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #557) | 2d 38 86 43 43 f3 e1 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 b5 d1 8d 5e 9a 16 4c 4d d9 8d af 2f 02 f9 49 | 64 5f 56 86 14 f0 4f 6e 1f 70 fb 5c 5c 41 82 1d | 33 6e 56 08 67 54 02 75 6c f9 e1 34 59 7c 6f b1 | bb 1f 4d ed 4a a2 b7 f7 4f c1 0c 46 20 0e 28 4a | cd 21 92 73 5f 5d 35 8c fe 58 86 0b 7f 07 97 23 | d1 0f ec 97 a5 2c 87 13 2d 94 36 17 e9 57 93 bf | c4 c1 bd 13 03 ee ba ab 1a a7 44 ce 03 75 29 fe | b6 82 6b e3 c2 1c 1a 53 06 87 f8 13 f9 a2 78 a2 | 51 a0 ba f9 b0 6c 0b 05 eb fe c7 b6 32 0e 48 84 | 7d 7a c1 bd 77 ee ba 29 ff de 64 d5 ef 12 c1 40 | d0 a1 05 e1 31 4a 93 c2 70 e2 49 cf 02 83 53 ca | 2e cb f9 e3 78 24 ca 8e c8 8c f2 22 dc 20 cb 27 | 4a df 51 8a 3b da 00 bb b0 0b a6 42 b8 69 cf 0e | a8 cf d0 73 3e bb 78 2d bc 6c 41 8d a7 b8 30 76 | 9c 94 b8 c4 16 94 63 de 81 f2 b2 a7 e1 0e 52 f4 | ea 2d 43 a0 57 4b af 2d d0 29 08 d0 cb 35 56 38 | 29 00 00 24 a6 c9 1c ff c9 58 73 10 78 ba f6 c6 | 7f c6 b2 cd 72 d9 cc be ea 32 4d 34 a4 2f 7e bf | 63 21 24 e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 8f df 68 5a a5 1c ad e8 83 e1 98 | 63 b5 56 36 55 d8 0c 2e 00 00 00 1c 00 00 40 05 | d5 54 40 ea d7 2a 41 c5 f7 56 0a 7d 70 86 31 1b | a6 62 9a d1 | libevent_free: release ptr-libevent@0x7fb368052a70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368018460 | #557 spent 0.0657 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #557 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #632 | start processing: state #632 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #632 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #632 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #632 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.717807; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.447087 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #632 | libevent_malloc: new ptr-libevent@0x7fb368052a70 size 128 "road-eastnet-nonat-188" #632: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #632) | 4f 74 43 70 ed 5f 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 00 b8 55 d7 88 c2 72 f0 05 df 85 ec 3a f6 75 | c1 ef 75 7f ad 60 cc e9 f1 77 a3 7c d9 0b 5e d5 | 5d c2 1a 6e 0a 46 25 ac 06 20 d7 68 9d d2 6e 25 | ff 6b 15 79 a6 94 b8 c3 d0 6e 41 bb 8d ed e7 21 | 63 3d 1a 26 b0 0a 45 94 1e de 46 6a 6a b6 4f b5 | d1 7f 40 6b 2f 4a eb 4d d8 86 e2 e5 25 78 85 80 | 6e 6e 80 63 f5 0c 4b a8 f2 cd 0b 82 23 03 99 14 | 83 47 9a 20 36 c0 ef de 6d 79 4d 5f 95 db 5d 28 | 9f 23 ff a4 10 07 57 b0 78 ff 65 d6 2e 5b 99 08 | 70 cf d4 59 3d 0b 5e fb 55 e9 4e f3 7f d6 14 5d | 1b 27 9a 34 94 bb 77 54 18 eb 5d 4f b4 d5 7f a1 | 84 3d 42 6a c2 f0 c5 b1 ce 30 19 3e 4b 4e a9 58 | 62 a0 4c fb aa 00 f1 a2 66 c0 f9 94 d1 cc 56 3e | 8f 68 09 9e 6a 9e 42 7d 62 7d f6 ec 9f 62 81 40 | 6f 50 24 39 28 5b 86 fd b5 92 57 3f 4d 8a 71 00 | f5 59 1b 4f 8b 96 06 35 4a d8 d6 af 37 4a c9 2a | 29 00 00 24 a3 75 cf 0b e7 29 9a ce c3 82 42 b5 | ee 71 0d 4b 51 1b b0 f6 01 1d 7a 9c f9 27 59 b6 | ed 31 8f 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 12 4f f5 3c 8b 41 44 6c 4b b5 e9 45 | 24 d2 05 c0 c4 f0 a0 78 00 00 00 1c 00 00 40 05 | 4e 5a fa ec b2 4d 50 c5 f3 4f a7 18 04 21 31 68 | 73 18 f4 1b | libevent_free: release ptr-libevent@0x7fb36c06a210 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #632 spent 0.066 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #632 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354025320 | handling event EVENT_RETRANSMIT for parent state #605 | start processing: state #605 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #605 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #605 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #605 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.717886; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.453963 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #605 | libevent_malloc: new ptr-libevent@0x7fb36c06a210 size 128 "road-eastnet-nonat-85" #605: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #605) | 7d 69 66 b6 0b 09 69 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 9b 48 45 a7 cd bb af 89 5b c6 84 3e 6b 29 f5 | 82 21 ed b8 01 9b e9 d6 eb 48 22 a2 47 4c 8b 00 | 72 84 38 7c 84 0f e9 29 65 9f 0e 0b d9 68 a1 08 | 85 41 62 70 51 2b 55 5e e7 51 39 59 cd ab dc 26 | 7f 43 85 55 c1 52 ee 33 ef c7 05 bb 4f 2b ac bb | 45 e8 b5 9c 8c 32 a9 0d 25 75 95 bd 99 f6 bc 7b | 41 12 70 0b a9 4f 28 9d 03 5a 76 fc 2d 26 df 1b | e3 79 ba fa a5 3f be 69 d9 fb 38 21 c3 3b c5 39 | 69 72 3d 42 47 0c 0b a5 70 56 b5 cd e3 db e1 b4 | 55 5f 2a 24 b5 b7 72 1d 3c 1e c4 16 a7 e8 bb d4 | 1b 31 e8 de 60 cf e9 e1 53 db 5b aa 1e f3 c3 ea | 73 35 bd 86 03 0c b1 c2 d4 c2 26 cc 43 5f a7 99 | 82 c7 95 6d 26 de e4 a9 78 fc 7c 80 08 50 d4 6d | 8a 23 a2 4b 98 e9 f1 f6 58 c1 c4 56 2d b4 d5 be | e1 4a 66 10 6a c0 ec 3e 63 d7 99 07 ed 98 3e de | 3b 38 1f 2e e8 77 14 e6 cf 9e 3f eb e7 72 77 34 | 29 00 00 24 e5 d6 0e d1 07 36 d0 c9 9d 74 f9 e8 | 91 f8 2d 2e ee 7d e8 c8 bf 6d c4 2d b0 02 ab f4 | ee 91 2c 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 1f a0 9c 16 7a 2c 8b 61 32 59 c1 | 2b 37 d9 c7 8d 13 c7 70 00 00 00 1c 00 00 40 05 | 0c 6c 27 3d 37 c9 55 25 41 13 59 12 57 c6 07 0e | 1b e6 b3 6d | libevent_free: release ptr-libevent@0x7fb35c0a6260 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354025320 | #605 spent 0.0667 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #605 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_RETRANSMIT for parent state #593 | start processing: state #593 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #593 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #593 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #593 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.717966; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.436608 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354025320 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #593 | libevent_malloc: new ptr-libevent@0x7fb35c0a6260 size 128 "road-eastnet-nonat-7" #593: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #593) | 08 0c 73 4d 95 6b fc 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3a 5b 8b 42 5a bf e3 df 41 c2 a5 fe 11 64 91 da | 13 85 25 29 02 a6 c9 9c 80 e3 1c ad 21 a7 2f 9a | 0b ca 3c ca e9 08 30 c3 5e 68 75 9f 48 b0 b2 2a | f3 14 8c ce 4b 9d 68 31 bf e7 06 67 bc f6 a7 2f | a5 2e 5d 39 f4 d4 74 52 bf f3 62 0c 0a b9 b5 aa | f2 b8 2f 6c d5 d0 6f 96 84 1e db be e8 02 03 7b | ee dc b5 2e 60 31 46 be ee 8e cd 6c 10 78 9e 92 | 45 23 ed 34 3c a4 82 16 54 50 71 ef 12 97 e8 82 | 81 30 89 f1 a9 de 93 55 47 e1 7b c1 4d 96 b7 09 | 0a 07 7c 6e 45 c4 9a eb b1 2d 13 6c dd 4d b5 76 | f9 0b 32 6e 41 44 dd 36 74 7c 38 ef 89 9d 82 70 | 70 19 38 86 e8 a2 d4 b2 17 ea 56 cc e1 b3 09 6e | ba 1a 8c a2 bd d7 7e d9 e2 59 e9 c6 5b e8 2e 95 | f2 48 7d f5 1f 8e 57 75 2c 61 06 ab aa 3a d4 66 | 6f 67 dd 67 06 ad 55 c4 42 9e ec 08 90 bd f1 bb | f6 d6 d8 db 80 e0 59 56 25 74 f2 d8 fc 0b 32 67 | 29 00 00 24 8d c7 ae aa 9e 1e 3a 21 f5 55 19 72 | d5 db e8 0f 54 51 8b c7 a2 ee dd f6 89 e2 5f d2 | eb 41 c9 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 5a 60 25 54 2e 1f 8e 3c a3 d4 e8 | 65 e4 94 da 40 a8 f1 52 00 00 00 1c 00 00 40 05 | e4 c5 d5 75 de 47 88 58 52 93 1c be 19 a0 a1 72 | fb ef e5 fb | libevent_free: release ptr-libevent@0x7fb34405eeb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | #593 spent 0.0653 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #593 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374013710 | handling event EVENT_RETRANSMIT for parent state #559 | start processing: state #559 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #559 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #559 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #559 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.718044; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.427773 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #559 | libevent_malloc: new ptr-libevent@0x7fb34405eeb0 size 128 "road-eastnet-nonat-30" #559: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #559) | 14 21 4b c7 8f d5 3b 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df c5 ec fc 7d 5a a9 f1 38 5b af b6 65 71 32 7c | 6c 91 b4 ed fb 0c 87 80 16 02 df 23 7b 3e 1b 10 | 70 0b 39 0c 6a 5c de 3d 87 90 91 e3 83 ec db 5a | 36 ca c8 b2 b4 db 09 7a 5b e9 7a 17 cc c7 3a 24 | 4c ea 7f 5d a9 0a f1 b3 d7 6a a8 13 a7 fa c2 05 | e6 77 9a ba 9d 7b 25 0d 3e 0a e2 5f ff cc 63 76 | a0 6c db 49 af cc d5 f5 f4 09 78 70 2d fe ff ff | cb cc 4a 9b 55 1b 99 f6 dc 93 35 dd 1d 13 21 bf | fd 6a ca 65 6a c0 ff ff 32 f1 6d f7 3e 98 69 a7 | 0e a1 73 ab ab b1 7e 5d de 57 92 d0 6c 78 24 e7 | 4e 0e f0 4a 0a 29 99 48 f2 3b 55 4c 27 2b 57 4a | 87 27 2c cf f8 7a b5 07 06 95 37 75 bc 1a f4 d9 | 3f 9e cd 96 08 50 67 bf b6 80 17 b5 68 83 2a 43 | 38 12 31 e4 eb bb 48 53 dd 1a fa ae 76 4a 72 80 | 49 d3 12 0a 1d 01 90 66 b4 ca 1b 0f dc f4 35 b5 | 43 43 90 7e d3 10 c4 1b 8d 5a d5 a9 ca 5f b8 48 | 29 00 00 24 cd 39 6e 7e 0b cb f0 da d0 22 3b 9f | 55 4f e9 2f 87 09 39 35 5d 79 80 bd 46 82 75 62 | bf 33 d3 f9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cc da c4 44 bb 29 ff dc b3 bb 41 98 | be 72 17 e4 5a b5 73 e6 00 00 00 1c 00 00 40 05 | 45 80 da 9e 17 9c 16 03 77 58 55 5d 48 f1 3a 54 | 40 de ec ea | libevent_free: release ptr-libevent@0x7fb33805efb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374013710 | #559 spent 0.0705 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #559 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #576 | start processing: state #576 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #576 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #576 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #576 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.718132; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.428173 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374013710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #576 | libevent_malloc: new ptr-libevent@0x7fb33805efb0 size 128 "road-eastnet-nonat-100" #576: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #576) | bf 1a 7a 05 9e b9 88 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 6f d2 38 de cc 28 85 5f 41 f2 20 5e 07 0c a2 | f5 9c 80 ff e4 6c b6 4c 70 e2 b8 6a 47 00 73 46 | 8d ba d8 aa 10 38 4b 81 1c 0e 7c 8c 49 18 c5 84 | 17 40 52 e1 d0 c8 ff 2a 4c c5 e2 f4 12 7c df 4c | 72 b8 6e 95 bf f0 54 ad cb e7 72 b2 87 79 19 c5 | 68 98 1d dd 0a f6 a4 d7 0e f0 b6 72 bd 0e dd f4 | 27 a1 d9 12 45 04 fa 90 07 e7 b4 6e 9b f9 be 3b | 8a ae 24 d0 37 a2 53 8e c0 1f 79 b2 4f 1e 64 17 | ea e2 b5 7a 16 8c a0 20 f9 ab 1c da 5d 7f c2 85 | bb fd 14 3c a6 d4 28 dd 60 a4 e5 f5 e6 a1 44 e9 | 3c 8b 4f 83 ea 38 41 29 16 58 25 9c 89 8c 0a a7 | 8c 88 a7 08 b2 d4 73 4c 5c 5f d9 55 aa 40 62 ac | d3 e3 2b a2 04 52 6c e3 f3 4f 50 d4 48 ee 05 9d | 81 ac 23 4e 1e 8c c1 65 13 fb 68 a8 58 3b 92 a5 | 3d 7c 55 6c cc d6 9e 1c 8b 09 aa d0 db 5e 99 f2 | 60 34 f9 74 84 15 60 67 96 e9 e7 3c f3 c2 20 e6 | 29 00 00 24 c2 a9 a3 da 50 4e 4d cf ec 5e 42 2e | d7 97 ed 63 43 1b ac 3c 04 ca 8c 9d 5b af 41 cf | d4 6c f9 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bc 7a c0 1e 2b d3 0d 93 af e2 1e a5 | 35 b0 aa a7 be b0 46 48 00 00 00 1c 00 00 40 05 | e4 10 08 2b 3b dd 58 0c 81 68 da dc e5 0f 44 09 | f0 81 fd 9d | libevent_free: release ptr-libevent@0x7fb344053f60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #576 spent 0.0675 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #576 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36004b8a0 | handling event EVENT_RETRANSMIT for parent state #530 | start processing: state #530 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #530 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #530 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #530 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.718213; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.418772 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #530 | libevent_malloc: new ptr-libevent@0x7fb344053f60 size 128 "road-eastnet-nonat-134" #530: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #530) | 92 e6 33 30 14 4d d6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 f1 30 3a 3b 28 18 17 30 1c 4a 89 10 b7 0d c3 | 7c 77 f2 13 78 da 63 f4 44 e1 01 dc 1f 4a 94 bf | c2 80 6b 59 ab e9 1c 0b d6 b1 eb 32 26 25 2f 92 | 24 9c c4 2a f3 1a d1 be fc b2 3a dd e3 83 df 5f | 41 0b ef 7f cf dc 66 d3 2d 40 e2 f2 bf 97 f5 31 | 9d c3 63 d9 ae d6 1d 0e a0 ea 26 58 86 c3 be d7 | f8 23 f3 04 54 70 65 bb 60 ca 54 65 9a 9c 89 dd | 2b 3b 6f 52 f6 af 1c e7 fc fa 5c 10 bf 1c e0 8e | 98 9f 5b b8 7e d8 4b e3 4d b8 53 23 0d 4f e9 5a | 14 9b 09 2a bf c5 d2 2f 85 7d 28 ac 15 60 25 e2 | 2f ad ee 60 6b dd cf 9c 48 62 b3 c3 75 25 11 09 | 05 3c 28 83 a6 04 85 69 35 a5 1f 5d 22 29 dc b1 | 9a 6b d8 6c e7 80 14 0f 8c 50 7a ac f0 96 90 6a | b3 8b e9 96 09 75 da bc 0c 69 50 ec 31 84 cc 57 | 4b 12 f9 f4 53 c3 5b 32 43 24 09 27 86 a6 40 9c | ba 4c ed 2c 66 0e 26 00 3a d7 7f e7 bb e8 f6 4f | 29 00 00 24 56 d6 30 4a 9e 35 4a d9 63 c1 ed ae | ff d3 7c 9d 97 39 2d 62 1c 2b 5e d3 ab 26 78 e3 | 76 c0 40 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 68 96 99 78 c7 b3 b1 f0 d0 44 83 | c6 69 a0 85 3a 91 92 b2 00 00 00 1c 00 00 40 05 | d6 32 b1 7b 23 65 42 ae 2b 55 2e 89 2e ab cb 67 | bf 37 77 de | libevent_free: release ptr-libevent@0x7fb360053fb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36004b8a0 | #530 spent 0.0646 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #530 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36400cc10 | handling event EVENT_RETRANSMIT for parent state #619 | start processing: state #619 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #619 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #619 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #619 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.718291; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.447098 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36004b8a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #619 | libevent_malloc: new ptr-libevent@0x7fb360053fb0 size 128 "road-eastnet-nonat-164" #619: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #619) | 7c a6 d3 cf 8d e9 6e 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 41 3d c8 48 51 1a bc 89 19 53 5f a4 19 24 c3 | e3 0b 4a e3 0f 42 45 a6 39 c6 57 d2 6b e7 8a 29 | 54 31 b8 5a 5e ca 20 13 3b 27 d0 a6 e9 27 50 18 | 7f 80 b0 08 d7 99 89 6a 2a 77 90 5c 01 59 bf 6e | a3 42 cd 3d fe 3f 1b b7 a2 59 73 50 4f f0 85 2f | 5b 47 ed 6a c9 c2 de c6 e6 4d 9c 06 4e 79 b3 57 | 16 0b 0c 18 cb 8c 87 3a 4d 2d e4 5d 7e 8e 72 e6 | 03 86 34 5a 38 e7 8f f4 c8 0e 9c 94 be d8 f8 e2 | ef 60 76 3a 11 35 bb 0b 5b bc 7b 30 30 31 76 fe | 82 33 53 86 f3 ab 66 6a c5 76 fc cd d7 c6 d4 81 | da 77 52 29 6c 0d 3b 27 bc ea 05 ef 9f 7f 24 4a | f2 92 aa 2c 32 64 ed de 3d 7a 9f 48 52 5c 8e 0a | 28 51 5e 93 76 ff 56 0b b4 30 27 a7 26 fb 55 52 | 34 7e cd 64 5b b0 5f cd 53 2f 69 37 16 38 d2 bb | 78 bd 71 9f 1a ae 46 cb f0 6a df 92 c7 03 31 5c | ec 23 e4 33 34 45 4e 7d 3b 26 49 2a 7a bf d5 47 | 29 00 00 24 f4 58 66 d0 11 c4 59 15 77 69 0a b7 | d7 fe 50 93 e0 8b 0c 95 ba ce 3e 1f df 8f 0d e4 | a9 fd e1 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 99 32 4f a5 1a 27 a5 94 99 e5 8e | 27 77 64 71 58 de 2f 68 00 00 00 1c 00 00 40 05 | 01 59 22 5f d1 0a 35 23 dd e9 14 d7 40 c3 82 b7 | 4e 2a 35 54 | libevent_free: release ptr-libevent@0x7fb35c074b80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36400cc10 | #619 spent 0.0654 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #619 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46abe780 | handling event EVENT_RETRANSMIT for parent state #653 | start processing: state #653 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #653 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #653 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #653 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.718368; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.459251 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36400cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #653 | libevent_malloc: new ptr-libevent@0x7fb35c074b80 size 128 "road-eastnet-nonat-58" #653: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #653) | 19 90 a9 40 6e 35 eb 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc a0 df ea dc 81 2e 85 84 b3 88 d1 54 50 1f b7 | c9 69 78 56 a1 62 6e 3e 83 05 4c c5 0e 7d 43 19 | 8c 06 52 c2 a8 47 39 7d 94 80 f0 24 21 75 9e 6f | 1a c9 4d 5f cb 04 6f 4e 48 25 b0 ee c9 3a 49 af | 9d 29 53 80 25 fe 82 fa ab e2 2f 9c a5 c4 60 41 | 00 8e d7 94 37 d0 f2 cc f3 8f c9 88 17 25 4b 93 | 4f 2c 01 16 89 ef 44 27 0f 7f bd d6 c8 39 c0 0d | 3b 37 3e 31 8d f1 93 95 ef a9 f2 83 75 f5 e9 66 | df 0e 5e 66 f8 be ce 8f 89 2d f8 24 18 90 ca 0e | ca 2a 03 0e df 25 3b 31 01 c2 15 74 75 2a d5 f1 | 83 43 31 31 83 fe 2a 23 9a bf 63 a0 48 cf 76 6d | 70 1e 06 b5 a1 3f ca 5e e8 cf fd 49 e7 27 8b f5 | e3 c3 9b ac 46 ce 1a c3 b0 62 c4 bf 3b 39 e9 ac | 0a 86 26 cd 41 dc 9e 57 6d e5 3f d5 e0 0e 0d 43 | 19 a5 50 e0 89 79 ac da 12 c8 36 b4 26 48 75 fe | 11 60 3a e4 7f 85 fb 66 94 49 d3 0e e3 76 01 2f | 29 00 00 24 54 ec 9e 13 c5 d8 7a ef 3a 76 6b b5 | 4a b4 c9 12 a6 ab f3 2b 6b be 93 f7 34 95 e6 4e | 7f d1 e9 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 79 56 04 65 8f 33 45 00 ea 05 99 | f8 b0 1e db ca 41 9d cc 00 00 00 1c 00 00 40 05 | 8e 15 0a 12 2a bb 30 1b c7 7c 01 c4 0d 46 64 bd | fa 92 a2 23 | libevent_free: release ptr-libevent@0x7fb380080010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe780 | #653 spent 0.0652 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #653 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b05240 | handling event EVENT_RETRANSMIT for parent state #591 | start processing: state #591 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #591 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #591 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #591 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.718446; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.444926 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe780 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #591 | libevent_malloc: new ptr-libevent@0x7fb380080010 size 128 "road-eastnet-nonat-4" #591: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #591) | 39 b3 48 76 36 79 c8 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 53 5e 8b 64 b9 d7 96 a2 1b 6a 63 75 d7 45 6e | 48 c4 46 eb 28 75 5e f7 ed 53 29 79 34 d4 d9 29 | 02 a5 32 60 5b ab 4f df 45 bd 95 46 90 03 ef f5 | ac db f4 fa d3 e6 26 09 6f 6a c9 87 25 cf 58 ee | ad d3 59 ca 2b 7a 8d ad c4 25 ee 9e 4f af ad 86 | d1 6a 16 30 39 cf 7c 62 83 49 21 82 42 1d 36 20 | 76 98 ff ea 9a 86 5a 8b 11 66 3a 24 b9 6b 76 c0 | 35 10 36 e5 7e d1 0b bc 77 9c 0f 5a 4b 5b 83 fb | 8a 34 bd 69 b1 83 bc 02 8c 52 8a 7a 9a 37 ff 74 | 9c 9b a2 16 a4 04 bd c3 ce 15 56 fe 49 fe 9a 67 | a2 82 10 83 18 d7 84 55 d8 28 d3 5f e0 e8 98 f9 | 81 4a 40 28 8e ad bb d3 fb 65 1b 2e 9e 89 76 02 | ac ff 53 1c ae 39 56 f6 49 c6 01 53 51 d7 b4 78 | 4c fc d4 a9 d7 40 5e 3d 8b c2 c2 3f be e8 7f 56 | f5 bf 7e 5c e0 2b 2b 15 e0 0b ce 31 42 b4 2e b1 | 10 3a 57 61 53 b6 64 5e 01 7e ec 80 4e b8 dd f6 | 29 00 00 24 7e 65 18 45 e0 bd ae a4 9b b7 1f 7e | 50 e9 89 74 0f 3a fb 42 e4 b1 ea 44 24 bf e7 f2 | 99 e4 e9 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 75 97 23 fe e8 31 c4 e6 0a d5 b5 | 9a 0f 0f 77 98 14 56 07 00 00 00 1c 00 00 40 05 | 51 a7 2c 19 bc 86 01 ef e8 30 63 e0 d2 c5 4d cb | 68 30 7a e4 | libevent_free: release ptr-libevent@0x7fb3540647c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b05240 | #591 spent 0.0662 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #591 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34401fda0 | handling event EVENT_RETRANSMIT for parent state #556 | start processing: state #556 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #556 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #556 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #556 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.718525; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.420688 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b05240 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #556 | libevent_malloc: new ptr-libevent@0x7fb3540647c0 size 128 "road-eastnet-nonat-79" #556: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #556) | 7f e0 6f 00 84 26 56 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 15 78 aa 6e e9 58 38 6b 46 1e a0 52 bc 83 d3 | cf 3c 33 de 82 b7 42 a2 2c 21 00 a9 3e 75 eb cd | 10 be b3 c4 82 43 d9 1a af 89 42 df 94 04 7c 60 | 14 3d 7a dd 5f 47 e2 da 24 89 04 06 b4 36 fd d6 | b5 de d2 50 15 a7 a8 36 fa 6f 62 cd 03 73 82 57 | 6a cf 7d e2 0e 29 5a 1b 2a 8a 28 af 96 29 bc 69 | 1a 81 07 d6 ad 61 0f 8a 27 b7 1d 98 f7 93 91 2d | 0d 00 d6 3c 6b ad 6c 9d db ce 11 c2 cc b5 ef e2 | 57 1f 51 2d aa d2 48 9a c3 ef 55 ad d5 6b 90 71 | 43 d7 9d 6a df a5 c6 3e 0b 53 aa ee 23 1e 88 a7 | 88 a5 c2 c5 7d 46 94 a3 b8 f3 c0 22 9f 4e 9c 57 | 20 38 e3 e1 74 97 33 b0 6b 37 ab 55 e4 6b 7f 66 | bc ea 73 65 26 88 f8 d8 07 69 6b 02 07 00 f0 e0 | 04 4e 23 72 d8 dd 96 e9 45 8d c7 f5 0d 29 06 22 | 84 bf e8 45 e1 63 1f c4 d6 f5 dd 33 b2 91 28 59 | 36 36 33 ab a5 81 cd 66 0a 4b 61 b1 5a f0 48 ea | 29 00 00 24 bb f0 c0 c8 4a 3c 83 ba 45 ba d1 f4 | 34 ae de c1 b8 04 dc 84 16 78 e1 c2 d3 f7 29 e4 | 68 26 70 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 84 b1 fb 5f 89 80 45 53 1d b4 39 | 35 8e 65 a4 f5 45 9d 15 00 00 00 1c 00 00 40 05 | 5d 5c c0 4e dd d9 8e 7f 9a e0 e2 3a 80 a4 20 4e | 23 e0 ef b5 | libevent_free: release ptr-libevent@0x7fb34404e800 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34401fda0 | #556 spent 0.0643 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #556 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c01d710 | handling event EVENT_RETRANSMIT for parent state #531 | start processing: state #531 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #531 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #531 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #531 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.718604; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.419466 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34401fda0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #531 | libevent_malloc: new ptr-libevent@0x7fb34404e800 size 128 "road-eastnet-nonat-92" #531: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #531) | 46 30 94 4a d2 7d f5 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 38 ea 3c 3d 5a 42 86 1f 4e 31 dc 26 b4 cb f3 | 28 85 08 ca 2d 95 b0 12 2a fa 18 5b b7 00 b1 7c | bd ff a5 7b 29 c2 33 47 c9 ef 86 d0 13 ba b4 66 | 86 47 b1 11 77 85 ec f5 b7 bc b1 c7 50 d2 1f ca | 94 86 67 69 97 69 09 d4 54 be 95 8a aa ec f2 d3 | 79 b9 f0 64 6c cf a3 3a 0e 4f 10 b3 95 d7 ac 93 | 35 e1 6d cf bd f0 36 31 3d 33 d3 c9 48 4d fe d0 | f1 f6 04 1f ec c5 c6 c2 db 2b ec 57 12 79 39 c3 | 5f ad df 37 fa 08 25 42 22 56 51 36 31 ec 60 0f | ac 91 d0 f7 eb 31 60 3a a8 71 8a b0 59 db 4b f5 | 2d 2b f9 1e 60 7c 79 92 10 60 1f 4d 62 ac de 57 | e1 25 69 68 c7 c9 81 de 74 38 95 72 70 59 28 ad | 3f 83 40 72 25 b0 05 47 0c a8 76 76 31 4f d7 5e | 97 3f 8e 62 12 fb f1 8b 94 b6 25 12 87 f7 a7 1d | 64 44 48 fb f6 a4 1d b5 63 08 35 5b 60 e5 2f 9a | 58 b0 a6 c2 fe 47 0b c1 2e a5 79 86 6f de 86 14 | 29 00 00 24 59 be 45 ef 88 7c 4d 7b b5 b9 64 5e | f3 45 90 92 62 65 99 56 86 22 51 1b b2 80 99 5a | ab 91 ed e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 80 99 5e ac e8 cb fd 27 87 08 89 | 9e ad 1b cc fa 6f da 1b 00 00 00 1c 00 00 40 05 | c1 9e 01 05 8a 2a ce 70 93 29 c8 42 f8 2d b1 4a | bb 93 ae c6 | libevent_free: release ptr-libevent@0x7fb3800598f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c01d710 | #531 spent 0.0652 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #531 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb384043260 | handling event EVENT_RETRANSMIT for parent state #596 | start processing: state #596 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #596 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #596 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #596 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.718681; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.444244 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c01d710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #596 | libevent_malloc: new ptr-libevent@0x7fb3800598f0 size 128 "road-eastnet-nonat-66" #596: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #596) | bf 80 0e 78 80 27 80 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c 1f ba 68 b5 93 5e 04 79 06 b6 a4 32 e4 68 c6 | 49 40 88 2b 6f 8a c0 9d d9 bc c8 ed 82 28 3c 30 | 4b 6f b2 e3 a8 0d d7 81 63 5c 83 35 fb 65 99 22 | ec b9 c7 f6 a3 1e 0c af 7e 02 44 4c 52 41 61 0c | fe ec b7 48 f0 10 1f 47 9e bc cb f0 0f ec 73 f6 | bf b9 40 d5 39 e3 19 17 5e 22 2d 36 42 33 d5 3a | 1c 03 6f c7 3e d1 3d c3 8f b4 e7 6b 4d ea f9 60 | 41 83 37 ed 6a c3 22 14 77 3f db 39 0c 56 20 64 | 8a 20 ec f2 4b 2b 90 2e 8c 2a 53 89 b4 6a 1f 42 | f3 7e f2 d4 fe 7b 90 df c9 c6 1b 36 f4 b5 4a ce | 0e df 7b 16 66 bc e8 11 d0 0b 0f dc e2 39 28 97 | 4c 94 b9 9e 35 c6 e9 df 5c 0c 47 78 05 93 ac c5 | c4 71 dd af e6 5f df 44 80 d0 10 16 32 6a 91 64 | 98 ef e2 0e ce a7 57 85 68 b2 6e d9 b5 77 88 45 | 6c 4d 65 cf 3b 08 9f b7 f8 9f 35 9c 9d df 1f 59 | e7 b7 04 7d ff 8a de 2a 68 53 fb 71 b7 5d ca 93 | 29 00 00 24 1e d8 84 c9 73 9e cb 5e 05 66 de 35 | 14 40 e8 eb 0f 43 29 df 2b 1e 3c 7f 1a d8 5a b9 | 16 e8 fe 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 33 20 82 d1 8b 7a 7b 4b 2f 8d 5b 47 | cd 08 2a ee bf 4a 9d 5d 00 00 00 1c 00 00 40 05 | 15 0d ca c2 1e 7e 24 48 29 6a 67 0e 8c c8 30 24 | 05 f8 a5 d3 | libevent_free: release ptr-libevent@0x7fb338069f70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384043260 | #596 spent 0.0657 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #596 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c018460 | handling event EVENT_RETRANSMIT for parent state #628 | start processing: state #628 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #628 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #628 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #628 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.718759; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.446615 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384043260 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #628 | libevent_malloc: new ptr-libevent@0x7fb338069f70 size 128 "road-eastnet-nonat-144" #628: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #628) | 95 d4 94 96 e1 1d ee 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f a8 7c 62 17 42 5a ce 42 3d 33 10 fe b2 8a 88 | 92 6e 71 d5 06 86 e5 e0 52 42 37 96 48 d9 83 04 | b7 53 69 af a5 e3 7c 5f c2 d6 49 92 b2 ff de 4c | db ed 7f de 57 21 99 44 40 b6 62 ee 10 52 80 d1 | 26 5f f1 59 44 03 5f 7b f9 65 35 c7 ca 59 14 41 | 66 d5 8f 67 2a 79 18 69 6e a9 93 bc a1 d2 56 44 | d5 a9 00 22 f4 be 24 66 17 90 eb 2f 6c 5b e9 e6 | 01 36 c7 01 8d be 88 5c 2e 67 73 6a 1a 0e cd 08 | 4f 7b 9d 2f 56 a8 13 ed e5 f5 79 24 e3 d4 7e ff | 39 52 47 37 cf c9 b9 cf 2b 76 1e 42 6a 40 6c a9 | d2 de bc b5 5e 46 c7 25 f7 aa 04 2e 75 05 36 b0 | fc bb ae 91 9d b4 fd 45 a8 76 c1 47 2f 9f 74 68 | d6 62 93 ed b4 f8 e1 d4 e2 dc 95 99 70 b3 6e 18 | 5d 8d 13 ec c3 76 44 10 13 a4 af e0 0e 36 d3 4d | 5f 8f ac 78 e4 0b 75 55 f3 aa 1e f1 06 83 57 e9 | 0f fa 63 a2 f0 49 65 dc 20 79 d0 e9 01 99 ce 92 | 29 00 00 24 ef 3d 18 f0 17 d1 14 e0 14 e9 24 e7 | 2b c4 61 c2 92 c3 eb 7a 8f 6c 14 1b 08 5d cd 09 | ea ad df c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 2e b7 bf 2f 19 c5 96 59 16 43 08 | f3 7e 3e 9d 86 2f 58 f5 00 00 00 1c 00 00 40 05 | 25 ae 0e 0b 51 c2 48 e1 f1 ba 50 01 f1 19 07 79 | b9 de b0 4d | libevent_free: release ptr-libevent@0x7fb34005bbe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c018460 | #628 spent 0.0656 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #628 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37802a9a0 | handling event EVENT_RETRANSMIT for parent state #714 | start processing: state #714 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #714 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #714 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #714 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.718837; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.490635 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #714 | libevent_malloc: new ptr-libevent@0x7fb34005bbe0 size 128 "road-eastnet-nonat-160" #714: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #714) | 93 98 4a 9e f6 25 19 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de a8 26 1d 46 1f fe 73 77 0b f1 18 a1 80 90 25 | b3 e7 bb 58 9b c2 81 b1 ff 7d b4 22 75 35 d1 db | 95 9e 84 cb 19 62 62 9a 6c 7d d1 72 a1 fe db ee | 7d a2 91 96 e9 9b 41 e3 91 6e fa 9f 40 d9 46 29 | f7 36 a8 4e 69 27 c4 25 e9 34 b9 04 e1 c7 31 18 | 0b 28 87 c1 77 45 e4 46 53 25 13 33 a7 ac 03 53 | c9 3c 72 4e 74 60 e7 39 94 56 62 6d ee b9 d3 02 | 2a 0c 9a 32 f0 7c cb e2 48 4b 2d 51 c1 e5 58 8b | a8 23 c6 2c 51 52 24 80 0d 7d cc 16 3e 31 9e e6 | 71 52 28 2d b4 b4 3b 62 62 b3 21 2f 59 e6 9d 79 | f7 29 e4 95 de 3d 39 1a 26 63 23 12 ff c0 0a 67 | e7 ee f9 dc 2e f8 9f 5e 66 07 d9 34 2c d6 a4 14 | 99 5a 46 67 f6 74 4b 45 d5 08 b5 1e f0 a5 28 bb | ba 71 8c ef 8d 60 fe 98 e8 fa 14 ba 36 d2 6c 68 | 4f b0 d8 bf 4e 35 1f 41 60 59 db 50 3c 98 8a ba | 0e 23 2e 71 e9 de a7 37 01 ea 4e a2 5e 17 dc 44 | 29 00 00 24 6f 09 61 08 e7 d3 02 a4 23 8b ad 3f | 96 41 5b f2 f4 31 31 36 dc f8 65 88 dd f7 ab 3a | d1 d6 75 ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 ff 9b ec fc 4c 87 67 ce 20 05 7e | da 19 49 e3 4c 6c 24 de 00 00 00 1c 00 00 40 05 | b1 01 34 da ed 80 ef f8 48 f4 33 a8 8a cf 0d 3f | 2f b5 1c 31 | libevent_free: release ptr-libevent@0x7fb3640a1080 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | #714 spent 0.0634 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #714 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad5900 | handling event EVENT_RETRANSMIT for parent state #584 | start processing: state #584 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #584 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #584 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #584 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.718913; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.450534 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #584 | libevent_malloc: new ptr-libevent@0x7fb3640a1080 size 128 "road-eastnet-nonat-108" #584: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #584) | 51 4c b1 7c 25 ce f5 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 ef 1f 70 eb 76 7d bc c3 86 b2 99 57 eb 3f 54 | c8 7d d3 aa 36 79 bf 95 d1 7e f5 bb 68 ed 90 a1 | b9 2c 9e 6e a8 b6 35 e4 01 68 b8 41 06 98 3e 9c | d6 35 04 2b bb 27 bd c4 b6 ed 89 cf f7 c6 f3 c2 | 46 86 3a 37 38 db cf 96 97 e5 a4 50 07 54 e9 4b | 37 df 7c f4 a0 4c d9 7b e1 63 0f 4a 78 e1 d1 d8 | f7 06 cc bf de 67 6f 51 a9 2a 50 9b be 39 51 fc | 92 f3 11 84 91 d8 2b 24 5f 7d 2e 3c 48 87 2c d7 | 4c 9f 31 94 b4 2c e3 04 55 03 e2 7e d5 0a a3 2a | 38 e1 ee e0 a2 7f 56 ba 3e dc 86 f1 a3 6d f0 4d | 52 ba bb 1e 97 ae 75 5d 2c 82 b4 e6 d4 79 e0 32 | 52 cc 28 d9 ea 8b 53 a2 dc 14 d3 22 02 06 5a 89 | 92 c4 13 41 83 c4 64 e9 4c ab fb fe 2b d8 3b e7 | 19 97 67 99 c8 cc 38 fe fd dd 6a ac 4b 3e a4 60 | cb ea 73 88 45 a4 60 2f a9 da 99 e9 bc 21 52 56 | 9e 0a 57 2a a8 8f 00 83 ca de 2c ec 2e 21 e3 03 | 29 00 00 24 a2 77 dc 4f a0 fc 59 33 be 45 2b 9d | d6 90 d3 11 73 91 28 fa 52 9a 31 01 01 35 6b b2 | c2 9a 45 77 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac ee 1f 66 e6 d8 10 e7 e1 61 3e ce | 6a b8 0c f1 92 f2 95 18 00 00 00 1c 00 00 40 05 | 4c ae 03 75 52 09 7f 6a 63 67 68 3c 65 3b 7c 67 | 85 33 51 c7 | libevent_free: release ptr-libevent@0x7fb35c0902e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad5900 | #584 spent 0.0648 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #584 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36001d710 | handling event EVENT_RETRANSMIT for parent state #519 | start processing: state #519 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #519 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #519 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #519 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.718986; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.421448 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad5900 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #519 | libevent_malloc: new ptr-libevent@0x7fb35c0902e0 size 128 "road-eastnet-nonat-68" #519: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #519) | 36 74 88 6c 2b d4 65 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 80 4d e8 d2 d9 23 a3 00 9b f7 df 4f fc c6 6e | 72 0a d6 44 83 97 e4 01 17 c9 8e 18 c2 f3 5d 0b | 06 e3 14 e4 8b dd 35 55 be 4b 2f 8b ab e3 cf ff | 80 24 c8 41 ad a4 91 74 f3 18 71 24 3e 71 ce 42 | 5e 86 bd 65 21 12 dd cb 90 44 9b 3a 9f 20 2e a7 | d0 3f dc 7c b1 53 17 2a e7 d3 a1 43 19 60 0c 5d | a4 8c 8d 56 2a 15 54 29 6b e8 1d 43 3b 4c 9f 9b | 9c 1c e3 58 55 dd 85 2d 50 d0 5a 79 9c 2c 40 b9 | e9 42 08 b9 54 2a 23 6a ed 77 99 24 5b c3 76 38 | a0 98 ca 43 c3 7c c7 63 5d d3 19 75 86 36 2c ee | b6 7d da ed 30 f6 cc b6 4d dc 14 16 ea be cf c9 | 4b 9d 75 9b 36 af 1d fd e9 19 95 e5 30 f3 fb 99 | c9 3b 35 b0 77 0a 08 c3 17 b0 a5 ed 7e a1 52 ee | 73 a2 4a 26 9d 1c 04 4f b7 86 f3 0e 1b 4b 3b 2a | da 3b 8c 88 8e 0d 68 63 4d 3f 3d f1 f7 54 db 7c | 16 d8 87 45 15 1c 36 83 91 f6 d9 2e c6 69 c8 c7 | 29 00 00 24 1f 89 a0 a9 be ce 4e ea ec c0 43 e0 | 93 cd cd c6 83 c2 c6 69 70 37 da db 02 17 df 46 | c3 38 aa 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 b0 da 44 b0 25 b8 4b 8c 5b 4c 67 | 69 d1 51 09 6e 53 b8 b5 00 00 00 1c 00 00 40 05 | 80 05 b4 13 38 cb 24 03 e0 02 b7 5d 8d 12 3d 6f | e6 28 68 a9 | libevent_free: release ptr-libevent@0x7fb360059710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36001d710 | #519 spent 0.0647 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #519 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34401d710 | handling event EVENT_RETRANSMIT for parent state #718 | start processing: state #718 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #718 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #718 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #718 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.719065; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.486553 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36001d710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #718 | libevent_malloc: new ptr-libevent@0x7fb360059710 size 128 "road-eastnet-nonat-157" #718: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #718) | 0c dd 79 de 47 83 7e 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be 66 36 96 31 e2 42 87 3a ac 4a fd 50 98 37 f0 | 83 90 d2 c2 b6 a0 f8 1a 23 ee b3 73 7e 59 fe f6 | 3c 2e ff a3 b1 53 59 bb 42 87 13 c6 fa 8f f4 66 | 20 b5 0d 75 56 3e 90 ab 48 8b aa 14 da 3c 04 07 | 7e 5f 8e 9b ff 5d 16 9c d6 cf e7 df 30 34 14 81 | fd cb 54 31 0d c6 6e 86 c6 00 5a 1d f1 9f cf 03 | 8e 5c cf 50 18 84 b9 7b 0b 61 d1 97 2f 8f 20 3c | dd 18 b6 4a e3 bc 56 eb 5e b2 56 15 58 ea 88 9f | d5 df 2d 58 7b 95 5a 7d 44 a3 ad 96 a2 23 87 6a | e2 84 31 36 80 e1 af d8 10 51 82 08 4c 66 f2 a3 | ea 9e 5d 00 97 f9 2d 2b a9 f9 ea 4a 6e 06 95 ef | d2 60 f0 da 73 c2 db c1 a6 40 f3 05 1e 08 98 1c | f5 d5 15 f1 7a 89 4d 80 89 c5 9d 2a b9 73 5f 7f | 20 36 51 5a fc bd 7e e1 b7 e9 61 67 fa 61 13 e9 | 12 17 e8 98 3b 6c fb 8a 60 2f e7 0a fd 58 48 e4 | a5 27 43 bf 2f 21 79 fe 28 b0 c2 eb b7 6d 95 45 | 29 00 00 24 89 03 e8 6c ca 23 ce 9e 5d 41 d4 99 | d7 86 12 03 b4 03 11 8f cb d7 3b 25 eb c9 7b e9 | f8 3c 7d e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 7b a6 d5 12 0c 58 96 9f f8 ef 99 | e4 3d a3 f6 b8 7b 36 33 00 00 00 1c 00 00 40 05 | ad 02 ae 2f 73 2c a3 41 68 65 8b 86 be f0 98 4f | f3 0c 27 62 | libevent_free: release ptr-libevent@0x7fb3640960c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34401d710 | #718 spent 0.0684 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #718 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38400a290 | handling event EVENT_RETRANSMIT for parent state #536 | start processing: state #536 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #536 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #536 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #536 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.719139; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.420963 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34401d710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #536 | libevent_malloc: new ptr-libevent@0x7fb3640960c0 size 128 "road-eastnet-nonat-122" #536: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #536) | cd 74 01 a2 39 d6 cc 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 a9 5f 47 01 bf 55 fc bd 36 63 8b 4d da a2 32 | 98 7c 8f 8d a5 10 38 4c bb 7b c0 1e 62 5a 95 3c | ab 87 bd b0 4f 05 a5 81 6d 16 fb ef 76 e7 c1 2e | 30 1a b2 78 2f 5b bb 53 da 79 ff c6 de 33 c0 9b | 96 0d 48 b4 64 0a a9 01 2d 4a d0 58 00 bb 3c 5a | b8 df 75 ac 56 24 ea 3b e4 71 b8 47 a2 58 0d 3b | 32 c1 40 67 d0 eb 20 07 a9 b4 43 31 fd 92 e2 d3 | 5e 9d 2b 29 57 37 d7 12 6b 8f 10 a0 9d 51 1a 5e | 59 dd 2a 2e bf c4 30 ee 1c 21 a4 1f 05 1c f1 ca | e9 cb 39 c8 e2 40 b2 4d 3b a4 95 5b bf 34 0a 3a | df 80 38 7b 51 86 8c a1 11 39 77 8b d5 ae 50 8f | 99 a1 0a e0 bd 3f 7e c9 79 53 04 c1 e3 df cd 70 | 3e 66 c4 67 c1 e4 73 dd bf 1e f4 11 d7 82 43 b1 | 95 c0 67 ed 01 5f 2c b1 0e a8 b7 86 5e a3 ac 38 | d4 97 88 0a b4 b8 8a a9 70 ef 6a 55 78 38 3e 25 | 5b 0e aa fc 57 7c 94 10 43 b3 19 df 16 34 03 61 | 29 00 00 24 13 0a a1 55 e1 40 3c ca 6b 43 9b 8e | d8 49 6d 03 c7 22 e9 d4 6e 01 14 b8 c6 77 b4 61 | 5d 3f ba 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b c5 c3 84 79 53 11 43 e1 cc 1f 7c | 14 ba b0 c9 4b e7 b4 37 00 00 00 1c 00 00 40 05 | 57 c6 83 93 fa f0 1e 53 76 4a bb b4 87 ee 28 a4 | 6c 5a d1 2c | libevent_free: release ptr-libevent@0x7fb35005ec80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400a290 | #536 spent 0.0654 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #536 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34001fa80 | handling event EVENT_RETRANSMIT for parent state #608 | start processing: state #608 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #608 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #608 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #608 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.719211; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.450373 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400a290 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #608 | libevent_malloc: new ptr-libevent@0x7fb35005ec80 size 128 "road-eastnet-nonat-60" #608: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #608) | 0c 40 8a ba c0 95 22 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 ac 32 20 e6 f2 f3 72 0a ac 9e a1 c0 7e d1 9c | ba 7d 04 0a 67 49 79 19 1b b3 e4 99 5c 8a 7f 51 | 2f 8a 06 ea 31 95 52 fd e6 c3 f7 54 3b b3 9d 31 | 27 18 b7 a2 0b 76 60 35 d5 3e 6c b2 60 48 f8 98 | bb 1c 43 2e ba 94 47 ae 1e 5d 46 a4 a9 be fc b5 | 9f 5c 2e 2b 32 a1 9d 84 73 52 7b 19 0f 87 44 ee | 2c c7 e0 19 73 47 89 45 a9 59 4b d7 0d 9f 39 05 | f3 7b a7 83 81 66 77 f6 57 d5 e3 c0 d5 84 80 f9 | ee be 18 01 e0 bf f6 46 34 fe af a5 cd 63 66 6b | de d7 56 46 3a 36 e4 5e 22 bf 64 7d 8c e2 2d 47 | 9e 04 cc 8d 7f d9 cb 06 83 4a e3 29 55 cd 8d 42 | e9 49 18 56 c5 a1 65 6c ca 69 c5 84 07 6d b0 58 | 2f 95 59 6a b7 c6 f7 02 21 d7 08 bc 5d 1a b0 ee | 67 fb 57 c8 f3 65 46 50 18 bb ad 85 2c fd a4 7a | 1f 49 86 f5 1e 9f f2 f1 74 80 e2 0f c0 52 94 90 | 6d 49 de 10 9d c0 e3 1a d8 90 bc 82 30 91 d0 23 | 29 00 00 24 18 87 a4 c8 cf 5c 93 83 68 9d 68 8a | 28 36 66 32 92 60 4e 85 d6 0c 91 d5 ef 20 18 75 | 65 13 ec f8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e bf 02 dd 26 3f 8a eb 4d 3f 2a d7 | 62 d7 7d e3 99 e0 e7 0a 00 00 00 1c 00 00 40 05 | 1c 98 9d 66 2f 94 1b 4c 60 05 a1 e4 50 37 22 f7 | bd 66 62 87 | libevent_free: release ptr-libevent@0x7fb36c05f200 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34001fa80 | #608 spent 0.065 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #608 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378012bf0 | handling event EVENT_RETRANSMIT for parent state #564 | start processing: state #564 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #564 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #564 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #564 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.719285; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.439373 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34001fa80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #564 | libevent_malloc: new ptr-libevent@0x7fb36c05f200 size 128 "road-eastnet-nonat-44" #564: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #564) | 2f d3 42 a8 8e fb 16 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 57 dc e5 0e c5 b3 5a a5 b1 00 4b 67 ff 85 46 | b8 62 d6 0c 0d 31 23 f0 15 92 2b d6 8c 7c a9 f2 | d6 dd b2 f6 df 09 a2 a7 d4 4c f5 c8 47 54 16 76 | 5a 58 cf d1 ec 54 b5 fc 7d 31 6f bf 81 02 c0 98 | 73 35 4a 40 a8 af 1c 13 3b cd 5e 84 ea 44 ca 69 | 54 c0 3d 20 b4 71 ba 13 dc 34 f4 0e 7c b2 aa b8 | c4 a9 b5 15 a4 bd b0 a0 2f 7e 8e 8d 90 c4 a1 53 | 64 09 3f f1 29 9d e6 14 4e 06 d3 b9 04 6d 85 e2 | 8e d3 43 4f a5 d9 1f f9 90 f5 65 41 52 ea a0 85 | a6 74 7a 70 9b f9 1a 1b c9 8d 45 01 fd 6f 0b c5 | 33 01 ed 92 72 46 2e ff 55 83 2c 71 1d ed cc d4 | 98 ca f9 5a 85 34 6f be 44 21 e9 c6 d9 23 68 35 | 49 8d 06 e2 b6 a8 ec 04 67 19 6a 25 85 e7 25 a3 | 44 d2 a7 dc e7 13 d5 3e e1 f8 5a 22 0f ba d0 2d | 6f ea 9c 6f 17 1b d4 89 ec ee fc f7 ec b2 46 89 | 2d c5 51 79 e6 ba bb f3 15 62 72 06 39 13 5f b6 | 29 00 00 24 96 1c e1 0c 7f e5 9c 1d 77 d9 4f 7d | 4d 47 9e 2d d0 89 bb 2a 04 e6 2e 94 ae 57 6c 89 | bf 1f de 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 46 11 5f cd 69 00 3f 80 ae 94 cd | 27 23 87 c3 ca 0f c2 84 00 00 00 1c 00 00 40 05 | 00 5b e6 68 40 1a 8f cb 1f 47 b5 45 fe a7 9d c2 | 49 00 ab ac | libevent_free: release ptr-libevent@0x7fb38806a670 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378012bf0 | #564 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #564 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370012bf0 | handling event EVENT_RETRANSMIT for parent state #631 | start processing: state #631 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #631 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #631 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #631 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.719358; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.458398 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #631 | libevent_malloc: new ptr-libevent@0x7fb38806a670 size 128 "road-eastnet-nonat-48" #631: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #631) | 70 a3 fd 1e a8 25 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 0c 38 64 bd 90 75 9f 6f 92 36 c8 32 fc 5a 91 | 19 c5 27 39 9e 3d 6e fa a9 b4 93 c0 e2 21 ae e7 | 29 2b f2 cd be 11 79 2f 14 67 98 68 af ef 6c b7 | 7c 49 d4 d5 6b f2 96 c5 5f cd 62 c1 3d f6 b9 c8 | 3c 3f 90 e5 94 7d 5f d7 40 b5 3b 30 63 b3 2c 20 | e0 19 03 33 6b 20 1a 52 34 8d 2f 82 b2 f4 54 94 | ca 7d 83 fa fa 89 e0 76 73 44 23 d0 5a 21 bf 92 | 84 e4 00 41 6d 4f b4 c3 ae 75 39 7d af 77 49 89 | e4 4d 0f 35 ee 4d e2 83 d4 ca 79 6d 50 9d 01 59 | 1b 0d 7b 00 73 41 5a bc 4e d1 a2 f6 87 77 57 2d | 41 51 9e 57 ae 82 8c bc 6f 74 da 77 3c ec b4 b7 | 0d 67 75 cd a7 d7 60 f9 d7 00 35 db 27 bb fd 96 | 6c aa db a4 7d 91 93 be 0c a1 40 3d 78 2c 3a 66 | 44 36 30 72 dc 94 7a 66 d9 4b 31 54 35 c3 c0 a7 | 65 c4 9e a1 75 e6 4f 67 53 11 26 7b a4 49 c0 3c | 58 30 58 88 dc be 09 5c 40 05 2c 8c 1c a4 88 cc | 29 00 00 24 9b f5 7e 07 2a a5 6a 0a 77 9d e2 3d | f9 27 04 9a c8 ef cd 45 75 cb 40 b5 d2 eb a2 f4 | c0 62 4c 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f 3f 68 59 5a 72 2a af 6d a7 43 82 | b4 f3 5f a0 d9 b1 ec af 00 00 00 1c 00 00 40 05 | 9d 9a 0e 02 a6 46 77 bd aa 5c 25 4f ad 35 3d af | b0 60 dd da | libevent_free: release ptr-libevent@0x7fb36406a1c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370012bf0 | #631 spent 0.0636 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #631 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368025320 | handling event EVENT_RETRANSMIT for parent state #695 | start processing: state #695 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #695 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #695 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #695 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.71943; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.480755 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #695 | libevent_malloc: new ptr-libevent@0x7fb36406a1c0 size 128 "road-eastnet-nonat-197" #695: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #695) | af 67 24 f2 d5 c7 bc 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 14 e7 c9 33 09 4d 36 12 f9 6d de 10 f0 e5 47 | 82 ed 23 45 d4 b6 ce 21 00 04 da b4 2f 94 b8 30 | 2f 77 2b 66 13 06 af 85 21 fd ef 57 6a 09 67 67 | 37 28 49 9e 18 7d d7 f0 08 1e d6 88 3f e7 a9 18 | cf 2f 78 55 e7 d6 fb 4b 07 4e 15 ae c6 2b 26 51 | b3 ce ba 2f 1e 38 1f 99 e6 3d 40 73 ee 22 e1 a7 | 0d 0b 8c c5 62 02 7e 56 2d 8d 6c 77 fd 6e 2e 61 | ca 7e 48 f6 cb 33 41 3b 92 87 6e 0f b5 01 01 1a | 7a 26 1b af b8 f9 1b 18 fd 42 1d d8 57 b9 99 f3 | a3 88 af 1a 40 b5 fd 9d a8 8b 9a 42 43 ee 86 63 | 13 46 c8 29 88 32 aa 0e 70 c3 98 1b 40 71 6c 44 | ab 3f 11 fc d3 58 f3 77 22 af df 25 de 81 a9 4a | 00 72 bb 64 e2 5c be f4 95 c0 21 c9 6c 9d 40 f4 | 7b 46 b5 97 b0 26 ac 1c 91 8d ac 90 5b 92 a1 ab | 78 4e 4e 35 b8 bf b8 64 4a a1 5c 4e 46 64 49 0a | 0d b6 6c 3d 6b 6f b5 91 f0 48 34 62 b9 68 a6 af | 29 00 00 24 c0 8b 5f d5 7a 97 79 40 43 e6 f6 3f | 54 f6 96 1a 49 cd f5 d4 43 9d 79 22 51 26 12 49 | 61 34 44 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a fd 7a d7 4e 83 ac 99 9d 97 07 a9 | d5 f6 51 74 a1 c3 79 42 00 00 00 1c 00 00 40 05 | d3 52 b4 8f bd 1e ff 85 b5 5d 7c 33 8d 85 60 74 | f7 b3 c4 d9 | libevent_free: release ptr-libevent@0x7fb388085dd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368025320 | #695 spent 0.0645 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #695 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38800feb0 | handling event EVENT_RETRANSMIT for parent state #641 | start processing: state #641 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #641 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #641 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #641 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.719501; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.455879 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368025320 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #641 | libevent_malloc: new ptr-libevent@0x7fb388085dd0 size 128 "road-eastnet-nonat-235" #641: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #641) | 20 9c e2 59 31 cf 6e 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 09 b4 84 ab aa 43 89 78 34 b0 d6 e3 38 d9 6d | a2 02 c4 4c ab 4d 8a f8 0e 36 02 d1 bf 26 dc a0 | 18 35 ff 92 d6 ab 35 8b 97 0e fa 1f 06 74 86 13 | bd 4b d4 10 63 6d 50 fa d1 05 e5 b6 83 80 eb 81 | 1d c1 17 7e 74 96 70 4b 8a 7d a7 98 bf 41 d3 e4 | 53 6e 45 47 7a d5 ce ad 7c de 29 6d 1c ce bf ee | 29 ef db 71 37 1e f4 da 05 b9 c1 9e 94 b8 09 61 | 06 d2 e5 30 cb fb 00 e2 3c 1f 90 84 66 2a c9 21 | ab 1a 0e 49 5d e5 f7 c2 53 02 87 88 0a 36 0c 6d | c1 f9 c6 d4 46 2e 67 22 c6 2f 23 dd 8d d0 33 a7 | 3c c4 80 09 35 06 d4 ba c9 54 31 c0 47 e3 77 50 | fe d3 cc af 02 88 b5 3d 64 43 bb 82 7f d7 97 a8 | 8e 74 10 23 3c 82 a8 eb 61 af 8f 95 ef 01 57 91 | 74 35 ea c2 74 76 d5 21 d5 ff e2 5e 1a d1 24 e9 | 4f c4 4e 06 0e c3 35 68 7a e5 01 33 ba 0f 7b 79 | d3 d6 e7 d9 69 7d 18 4b b8 91 33 33 1e aa 41 47 | 29 00 00 24 de ff b6 ca 63 e9 cc b9 1f 7c 3e 7c | 82 6d ca 20 ea 43 fd 3c 13 8e a9 32 83 2c 0c 09 | 45 b1 6a 12 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f d0 71 59 b2 13 20 21 05 f4 92 89 | a6 fa df 4f c5 3e bb 18 00 00 00 1c 00 00 40 05 | da 4e b6 83 cf f5 84 c6 fa 26 59 3a 0c bf c7 47 | bc 79 7e dc | libevent_free: release ptr-libevent@0x7fb3500722e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800feb0 | #641 spent 0.0646 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #641 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36801fda0 | handling event EVENT_RETRANSMIT for parent state #534 | start processing: state #534 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #534 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #534 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #534 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.719573; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.424939 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800feb0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #534 | libevent_malloc: new ptr-libevent@0x7fb3500722e0 size 128 "road-eastnet-nonat-43" #534: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #534) | b6 c2 42 e3 74 ca 7f 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f e9 15 ad 11 6f 89 c0 a8 02 55 a1 73 88 84 f9 | 33 7b 5b 0d 0b 5b d7 57 77 b6 59 c3 92 4f 9c 81 | e6 98 a6 a1 b8 34 63 c4 08 b9 bf 0c 69 da d1 2b | 1a e8 9b 2f 98 d4 44 3b f0 73 62 cb 71 d6 64 d1 | 3a 3d f5 71 2d 7e 29 30 73 8d 8a a7 fc e0 c3 a4 | 07 15 fb 3f 7b 6d ac bf dd d0 0f d6 95 19 6d 4e | ab a0 86 9d f8 d4 b7 8e e6 1d 84 a8 cb 93 14 ec | a8 13 51 b0 91 ca a4 6a 06 06 50 7a df 97 a5 15 | 33 7b b0 2a aa 9d 49 82 99 5a 1e f8 ff 91 d1 bb | 5f 9c 20 e3 88 f9 89 5c 2d ff 2d 6c 31 e8 44 d4 | c0 96 d5 82 e9 c1 04 a4 03 63 11 8d 47 c3 ee f3 | 9c d6 e5 95 a9 a9 b4 3b 1f e3 34 6e 77 02 0b 87 | cd 18 1a ad 7e 61 e6 d2 80 d4 cd 61 09 82 cc d6 | aa 80 fe 73 e7 11 a7 12 0a 61 d0 3f 70 03 0e 25 | 0f fa b0 0b f0 75 c7 91 3d 8b 34 3c 45 ce 0a 85 | 42 34 96 d7 4e 3f d9 17 73 40 5a 4f bb a1 8b 1a | 29 00 00 24 6f d6 0a bf ca bc 9d 1e 75 5d 3f c1 | 66 5b 32 47 90 cf da b2 6c 6d a4 db de c8 e0 a3 | 3c 0a c8 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 38 48 7f 05 85 41 6a 46 8b 67 3e | 92 3f a4 69 d3 0a 9f 50 00 00 00 1c 00 00 40 05 | 9b 5d 60 63 c2 dd c6 23 03 14 4c fb 6a ee 61 48 | 2b 45 1b 9e | libevent_free: release ptr-libevent@0x7fb3680581d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36801fda0 | #534 spent 0.0634 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #534 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350044df0 | handling event EVENT_RETRANSMIT for parent state #526 | start processing: state #526 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #526 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #526 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #526 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.719645; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.414396 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36801fda0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #526 | libevent_malloc: new ptr-libevent@0x7fb3680581d0 size 128 "road-eastnet-nonat-131" #526: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #526) | 2c e7 79 4e 69 36 cf 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b a3 00 42 f2 bb 8f 76 46 c4 66 08 4e c7 f9 b2 | df 25 c1 de 9e 12 de 72 b5 7e 4f 9a 95 62 19 89 | ac 68 cc ad 66 f6 b9 57 74 7f cb 29 ce b4 c5 29 | 7e e8 43 36 2e ad 51 7b dd 36 41 60 f4 e5 14 cc | a6 af 4e 6f 65 34 88 da 72 82 77 c2 a2 36 84 91 | 9b 68 22 79 7f 0d ab 26 4a 42 6f 37 90 81 a7 28 | b1 5d 31 ff 90 46 41 d8 33 de 87 0f 27 a2 30 12 | e6 4d fd 6b 9a f7 c2 79 27 45 5a 1e 6d 1e cc 92 | 13 af fa 4d 53 bb da 63 4a cd 41 8d 7f 7c f0 8e | bb 15 d6 24 f8 58 75 56 83 54 56 f5 f0 c8 22 3e | 06 23 4d f1 c1 3a e0 0d 5a 45 9e e2 63 18 d4 90 | a9 01 18 d9 68 d9 7c b7 d6 21 a4 79 fb 61 05 78 | 3b 9e 6f 30 8b 1e 00 d6 c4 b5 8f db ed 31 3f bf | 84 21 ff 60 e0 96 6f e7 8a 57 1c 58 41 5f 92 3e | a0 80 3c 76 7a 2c 33 23 3b cc d3 da c4 62 04 3c | 5a 2e 98 11 59 53 9d 30 e5 65 ae 85 8a f1 f4 19 | 29 00 00 24 58 2a 43 33 ca da 5e cf d0 c4 3e 45 | b3 97 45 72 b2 67 77 d1 d9 13 d7 0d cb 6a de 8c | 71 91 90 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 12 0a 6b bb 38 2d fe 8d fe 15 e3 | 95 3d 21 61 33 d3 f6 a2 00 00 00 1c 00 00 40 05 | 40 e8 e9 9c 13 3c 3e 2b 80 7f e5 4f 1b 81 50 bc | 99 79 e6 40 | libevent_free: release ptr-libevent@0x7fb350051bb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350044df0 | #526 spent 0.0633 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #526 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35801d710 | handling event EVENT_RETRANSMIT for parent state #597 | start processing: state #597 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #597 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #597 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #597 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.719716; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.44403 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350044df0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #597 | libevent_malloc: new ptr-libevent@0x7fb350051bb0 size 128 "road-eastnet-nonat-22" #597: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #597) | b4 11 eb c0 3c ee 82 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b e2 a7 57 e1 0e 89 3c 5e 5c ad af 7e 70 cd ff | 21 89 77 18 f4 e7 a2 a2 0b 97 a2 cc 0c 79 62 a6 | 53 17 8a bc 8d 3b 08 6c 40 4e e0 76 7d d4 d1 91 | bf c5 8b f9 61 7f eb 07 6d 14 8e d7 2e 13 4b b7 | 14 c2 d5 04 cf 8a cc ac 4e ae 84 9f 14 5a e5 10 | da ae 54 d6 70 48 a3 a7 d0 ef ea bc 55 27 5a 82 | 23 5b 52 be c1 f3 53 be bb 7d 21 37 c3 a9 7f 33 | c7 62 04 d8 71 42 47 a0 d7 41 5f d1 4d c5 32 46 | 77 62 f1 35 9a 43 b7 7e 06 40 63 92 bb 12 f6 65 | 95 37 e9 95 f6 44 66 e5 21 74 8a 91 88 04 ad e6 | 73 e6 dc 01 ed 0f a5 fb 40 2f 2a d6 15 cc f9 e5 | 64 76 7c 1a f7 fd 4f e9 ea 7f 6a ab 40 67 b0 84 | 31 a8 8a 3e e0 7c 8e 22 7d 83 59 b3 8c 60 24 8d | 8b 1d 5a 54 65 8f 80 6f 96 65 ca 43 c8 a7 28 f6 | 55 d4 fa 1a 47 2e 73 c8 9e ce 9b a4 9b 29 e3 96 | 97 ae 07 06 04 32 86 2a 42 ce 44 45 22 8b ed a9 | 29 00 00 24 49 1d 06 1e f3 92 fd 55 9e 0a 50 15 | a6 41 c4 55 df 85 ea d9 9d 51 f8 0d da 8c c6 ac | 25 cc 84 3d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d c2 73 38 8d 54 94 82 d9 af a8 f8 | 7c 2d a7 d4 83 28 88 71 00 00 00 1c 00 00 40 05 | dd 49 b4 51 8c 53 2c 7a 9c 58 4d c4 6e bc 08 eb | ca 20 63 19 | libevent_free: release ptr-libevent@0x7fb384063190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35801d710 | #597 spent 0.0662 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #597 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378018100 | handling event EVENT_RETRANSMIT for parent state #558 | start processing: state #558 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #558 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #558 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #558 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.71979; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.420034 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35801d710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #558 | libevent_malloc: new ptr-libevent@0x7fb384063190 size 128 "road-eastnet-nonat-9" #558: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #558) | a0 bf 59 d3 80 3d 9d 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 0b 86 6c 08 67 cc 4b bc c3 39 13 37 f4 32 e7 | ad d1 3b 50 ca a5 a0 c9 48 a7 c6 40 28 8a ce 88 | 48 9a aa f7 90 71 74 ed bc 28 4c d4 56 d7 df 22 | 4f 3a d6 3b 4e 8c b0 b3 d6 6a 56 04 3b e0 40 63 | 8b 49 82 3f 73 5a 7c fa a1 c4 0c d8 1e 26 25 61 | 7f c0 52 f8 2f 3c 28 85 6c 37 5d c8 aa 97 0a 05 | 31 61 41 82 78 5c 29 78 03 4d 4e ec d7 92 6b 15 | 11 ed d4 89 17 37 84 77 86 0f 5b 00 ae 1d 38 19 | 0d ac 0c 19 d4 42 43 c3 c7 86 33 36 3d 13 82 f5 | 92 4c 46 6b 6b 92 f0 58 2e 94 0d 8c d2 74 6a 33 | f6 10 0d 35 6b 00 74 18 19 fe b3 bd 3b 01 68 c8 | 55 16 d5 ec 93 02 71 33 c5 83 15 91 47 19 08 ae | d5 86 b5 c3 61 af 99 0a ea 43 2b 44 f9 af ac ea | 2c 5e 25 7a e2 4b 89 ff 8e 3b 15 87 08 63 19 5e | 81 14 9b c2 be b1 4a a7 00 bb d5 e7 f7 c3 ed f1 | 6a 63 70 39 8b 8e 47 62 eb 92 4d 42 f6 a8 77 a5 | 29 00 00 24 07 63 d1 5f 7b 4c 62 77 51 cf 3a c4 | f3 0f f8 72 58 27 a5 92 6f 1a 94 2c 36 bd c3 e4 | e2 d6 9e 5a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 51 b0 40 da 74 9a 4d f5 0e 2f 49 | 38 da 65 ba 56 04 b0 54 00 00 00 1c 00 00 40 05 | 8b 38 7f 8a 89 4d 10 70 34 f4 f7 39 75 12 38 2e | a0 bb 61 3b | libevent_free: release ptr-libevent@0x7fb37803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378018100 | #558 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #558 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c012bf0 | handling event EVENT_RETRANSMIT for parent state #554 | start processing: state #554 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #554 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #554 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #554 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.719863; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.424719 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378018100 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #554 | libevent_malloc: new ptr-libevent@0x7fb37803b0b0 size 128 "road-eastnet-nonat-98" #554: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #554) | 25 17 60 01 5a 53 51 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 38 2d f1 00 6f d0 3c a9 89 96 83 23 c7 b8 5d | 1a a6 31 2b 2c 51 9d f6 cf 41 37 49 95 49 bb 07 | 22 d5 2d 9b fe 69 9e 12 c7 f6 3e 06 e7 18 06 20 | c1 aa 51 c6 00 74 fa 4a 11 cc c8 b0 ed 1a e5 e4 | c4 39 2f 27 86 6b 56 5d d1 56 6c 92 b1 bb b2 fd | e7 5b 8a fa 41 54 ee c3 2f 4b 56 28 c4 84 43 b6 | 29 3e 51 c0 e7 fd f5 95 28 1a d0 e0 91 dc f1 6e | 39 56 bd a3 9a d5 67 19 93 7a c4 42 65 6a 67 24 | 4f 95 02 14 cf 93 bd 7f a6 8b ba d4 40 ea aa 44 | bb 51 d0 43 02 22 34 c7 50 c4 3c 24 ec 0b 9e 0b | 68 3e 0f 11 f4 55 6d 52 6f 15 ed f6 c8 d2 70 f8 | fa 7b 49 45 c1 d7 b6 5b 40 7b 44 9d 47 3c af 30 | 36 b9 73 5d 22 5f a7 f6 ce 29 85 12 50 70 19 59 | ff e1 64 85 88 18 f5 bb 21 9e 23 15 22 cb 42 8f | df e0 fe 4c ee be d0 17 86 a2 52 52 76 91 2f 84 | fc 1f 46 9a d7 c0 87 a2 fb 33 8f b3 de 22 8e f6 | 29 00 00 24 2a e4 8d 48 f2 e9 35 56 e7 78 9c 50 | 82 48 8b a6 d8 56 83 14 85 5c 7b 82 38 7e 5a 90 | dc b9 01 eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 6c fa 7e d5 f7 59 ab 33 19 e9 49 | 9d b2 c4 ad db 25 ab 32 00 00 00 1c 00 00 40 05 | 84 c3 f1 b0 ec 53 88 9c d7 9f 3b 91 13 fe 1d e1 | bc ef 10 92 | libevent_free: release ptr-libevent@0x7fb34c053e10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c012bf0 | #554 spent 0.0631 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #554 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b06800 | handling event EVENT_RETRANSMIT for parent state #692 | start processing: state #692 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #692 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #692 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #692 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.719934; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.477252 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #692 | libevent_malloc: new ptr-libevent@0x7fb34c053e10 size 128 "road-eastnet-nonat-109" #692: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #692) | cc 18 05 4d c7 59 29 89 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 bc 56 c0 b5 d7 1a 19 67 cf 61 47 cf cf cf 69 | 0c 5a 9f 01 32 78 de 71 f0 74 81 19 ed 71 d9 b7 | 6c 1a 14 67 77 21 31 19 27 f8 20 2e 9b 72 8d e0 | fb c3 78 0b 20 93 f6 09 52 76 69 39 6e ac 7c 06 | 40 27 58 9f 6d bb 6d 84 cb 61 8e 0f d8 d3 36 d2 | ed b2 8a 88 8f 6f f0 1e 1b d7 5a 1c 7d 7e 95 ba | 9a dd 6e 5a bb 30 97 01 78 90 d0 34 e6 bb f7 4a | 36 d6 7a 11 b8 51 c6 68 c3 31 ea af 66 a8 39 16 | 34 04 5f b3 7f 60 a0 eb de 43 b9 ad eb 2c 3a 9e | 0e ac 2d 97 3b 24 b1 8f cc 8a 22 51 8c d9 7c 8f | 5c bd 64 59 9e 2e 51 e2 19 ad d8 1d 4d 34 4c 24 | 22 63 7c ba af a3 27 18 d1 02 9a b0 98 c3 d7 57 | 32 dd b6 b7 23 c1 5f 8d ea 84 1f 15 18 04 2a a7 | 93 9c 7d f3 d9 4e af b7 ec 8d 2d b2 4a 62 49 e5 | 24 51 62 9e 81 79 94 0d 40 f4 e7 84 ba 20 8a 12 | 56 3d 86 3c a8 88 5d 08 d2 a2 6b 92 78 f3 25 d4 | 29 00 00 24 e1 fc f7 b6 dc b1 8e c8 89 6e ca 67 | c4 89 7d 5a 55 53 f0 73 1a cf eb a7 39 4d 69 f9 | f9 7d fe a7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7c 62 99 77 fb 76 f7 56 4f 5d 6c 0a | a8 89 cf ee 73 3a 0b 7a 00 00 00 1c 00 00 40 05 | da 92 6d 9e 8e f1 6a c7 a9 e0 f9 23 03 35 37 00 | ea 8a 41 05 | libevent_free: release ptr-libevent@0x7fb3500882b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b06800 | #692 spent 0.0649 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #692 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35400f1f0 | handling event EVENT_RETRANSMIT for parent state #717 | start processing: state #717 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #717 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #717 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #717 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.720006; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.497552 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b06800 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #717 | libevent_malloc: new ptr-libevent@0x7fb3500882b0 size 128 "road-eastnet-nonat-195" #717: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #717) | e9 cc 03 7c e4 bf 38 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 0d 73 a5 88 38 ec a8 b6 b3 23 50 23 2d 53 9c | f5 59 45 c5 2c 5d 29 a6 50 ea 35 cd ff a5 c3 82 | 38 04 6e 7c 97 76 33 80 5e 2e f5 c7 20 1d 6d 52 | 54 d4 c8 43 d2 e6 b1 e4 c1 91 68 e9 90 9b 22 d4 | 83 38 49 6a 85 b6 95 48 9d 37 d5 48 27 0e 06 98 | 9a ac f5 b2 ed 13 5b 90 8e eb 62 80 51 7d 18 ee | 32 25 77 49 32 8f 44 94 81 26 5d 5f 72 27 8e 3a | 3d 60 20 38 fe 19 ba a8 04 69 ba 2a 74 5a 42 77 | 2f 99 5b 7a b9 a8 61 7a f1 75 11 5b a2 50 cd 53 | 3e c5 95 48 2d 5a 37 b9 4e c2 b7 10 0b 09 f4 4b | bc cd c9 0e 10 07 92 ed 69 ad 1e f1 95 18 c1 9a | 1e ea 66 8b 35 9c 7c a7 b1 0e 8e b5 d5 47 b6 9e | 92 8b a0 cf f4 db 96 37 1e 82 84 04 16 36 81 77 | 8c 3e 2c e7 86 0a bd c6 dd 95 c1 6b fe 52 5f 2a | 76 45 bb fe 23 c6 23 bc e6 64 3e f3 0c 6a 8e 66 | 27 65 38 a3 1e 94 62 d7 e1 4e 78 ef 7d 9b 33 59 | 29 00 00 24 84 76 67 8c e9 66 d9 97 e2 c1 c3 44 | f5 19 60 fe 7b e1 dc a7 b1 57 f0 2b 9f 4f 7d 83 | f4 f5 26 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 0e 85 7e 12 27 fe f4 c2 99 71 9b | 7e 21 7b 45 a0 57 b5 9c 00 00 00 1c 00 00 40 05 | f0 35 c9 a1 8e 9b d2 fc 27 bf 2e d5 3b 0c 2d 8b | c9 9a 4f 06 | libevent_free: release ptr-libevent@0x7fb36c08dbf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400f1f0 | #717 spent 0.0673 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #717 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3380300a0 | handling event EVENT_RETRANSMIT for parent state #604 | start processing: state #604 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #604 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #604 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #604 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.720088; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.442623 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400f1f0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #604 | libevent_malloc: new ptr-libevent@0x7fb36c08dbf0 size 128 "road-eastnet-nonat-20" #604: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #604) | 9c 9a a9 b6 8a 18 20 aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 db 14 9f c8 04 2c a7 94 4d c0 41 4e 48 db 16 | 43 7e f5 96 b7 92 19 68 4f 28 dd 93 9c b2 03 ee | 00 e3 3a 70 b5 7f 63 e8 29 5f c1 3e d5 1e 9b 18 | 03 51 46 eb e9 1e 7f 95 79 9d a5 6c e6 38 16 02 | 06 77 87 00 da 11 bf 13 c1 4d 3a 44 84 ac 6b d3 | f7 9d c3 0a 19 49 98 cc af ba f2 e2 42 43 00 0c | 55 a9 00 12 93 95 82 e7 62 10 92 7e b5 54 fd bf | e8 83 82 ec 9d 8a 27 cf cd 74 11 b0 80 50 2e c7 | b3 2a ee 0c ca 12 67 95 57 e8 8f db b1 d7 be ea | dc 1c 36 57 ad 82 d5 d6 b8 ca 9d c1 19 69 b7 98 | 1a b0 e8 89 42 c5 72 7b 2c ac a1 8f 37 62 b4 d5 | d1 07 d7 cf 2b a0 47 98 cd bd cd 39 54 ed 85 7b | e7 4a 46 42 99 3a 84 b2 44 0b 60 db 17 1f 1a 47 | 96 ad e7 df 64 10 90 db 2e 4b b5 22 6e b2 0f d8 | ab 1d 9f cc da 67 78 10 6b ef f0 21 60 7f 46 37 | ce e2 4d 55 5c ce 37 f5 05 f9 20 86 fe 7e f4 34 | 29 00 00 24 b3 5a 22 9d ad 8e aa d7 db 87 b7 86 | 99 f5 d3 0b 6d dc 71 e3 8c 25 ed 59 9c d6 d9 01 | 28 70 17 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 ee b6 7a e3 a9 a6 b5 56 be cc 5f | 53 8f bf c6 c1 49 39 f9 00 00 00 1c 00 00 40 05 | 8b 15 2f 3d 66 90 78 e5 b9 a0 df af d9 66 18 c4 | 1f 04 f3 7c | libevent_free: release ptr-libevent@0x7fb3600618f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3380300a0 | #604 spent 0.0707 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #604 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a32290 | handling event EVENT_RETRANSMIT for parent state #527 | start processing: state #527 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #527 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #527 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #527 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.720163; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.464536 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3380300a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #527 | libevent_malloc: new ptr-libevent@0x7fb3600618f0 size 128 "road-eastnet-nonat-65" #527: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #527) | b8 7b a6 b5 cd 22 30 e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9d 68 a6 ce 12 3e 16 ce 0a 40 e3 0d ea db e5 bf | b4 0c 0f 14 5d 82 31 6e df 98 3a a9 2b 0d 83 59 | a7 51 1f df 33 ed b4 d4 3d 6e 89 89 e1 79 17 6e | 79 24 a2 44 83 1f 07 80 b7 73 27 d1 f5 ab e7 f6 | fa 73 46 f9 e5 46 01 bb fe 93 76 2e fb d7 ee 39 | 18 23 e1 f9 53 17 53 31 0d b4 42 58 f1 f5 27 5f | 8f 40 ae 48 c9 9a d1 40 be 99 20 4f f2 5a 11 4a | 48 24 79 61 ea 93 68 2f 62 04 56 92 f9 14 43 3b | 8a 3e eb 47 ce 87 24 50 5e 1e 23 ea d1 e7 ff ad | 92 32 52 12 93 36 c5 47 2c 6c 33 48 33 2a cb ce | cd 3b e2 9d 5f 5a 78 ba 2e 4c f5 75 36 53 8e 18 | c2 8e 6c ae 9f 48 cd 76 e2 9b 13 a4 86 1e d9 37 | 5a 76 08 51 c6 0c c9 7f 15 8d 6a 72 43 9f 44 4a | 6e 19 5e f0 ed 1e 32 a1 a1 b9 c3 4c 22 6e 92 40 | a0 76 62 be 61 a0 b4 ca 52 4a 39 3c 84 7b 48 7c | 26 8e ac a1 a4 17 05 aa f0 10 33 85 e3 3a d9 7e | 29 00 00 24 42 74 9e 85 d4 ce 77 94 f8 66 9d 51 | 75 21 75 54 57 2f a1 c1 0d 08 6e 7a 4a f7 0f 5f | 6b 9a 4f 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 fd 65 f3 18 d8 6f 03 d6 0f 2d d6 | 5f d4 a1 2e 7e 59 4c 96 00 00 00 1c 00 00 40 05 | 2f dc 51 0a 44 26 e8 79 d1 11 0e dd 4d 4c 69 c6 | 3a 55 a8 94 | libevent_free: release ptr-libevent@0x7fb37804bbf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a32290 | #527 spent 0.0633 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #527 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34001a1e0 | handling event EVENT_RETRANSMIT for parent state #529 | start processing: state #529 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #529 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #529 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #529 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.720234; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.421758 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a32290 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #529 | libevent_malloc: new ptr-libevent@0x7fb37804bbf0 size 128 "road-eastnet-nonat-32" #529: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #529) | 8b 51 05 ec d8 42 82 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa a4 71 e3 1a bf 5d 84 a4 49 8c cf 55 02 33 3c | 04 56 09 91 2c bc e4 1c 1e 8d 8e 04 d2 0a d7 b1 | 4a e5 e2 44 95 fe 32 42 a2 71 e3 f6 19 58 19 98 | 30 f7 7f 68 aa c8 8b 7b ee 46 c1 c6 c6 c6 f3 ef | 02 5b 4f e7 12 67 eb f6 96 9c 29 fe 91 93 f1 4f | 4a f4 35 c4 14 66 ea 0c db 0c 7f 2e 10 1c 74 5a | 14 56 cb 14 d2 be a1 5c fd 36 cb 04 24 8d de d8 | e8 38 48 30 9f 46 ce 30 5d cf 53 56 66 09 d2 14 | 14 e3 57 c9 a7 57 bf b7 68 e9 aa 2c d3 32 00 e1 | b3 c3 fe 68 f4 77 9f 22 ca 38 99 8f 8b f5 3c d3 | 43 f0 50 78 d5 57 6c e0 ba 1d 44 37 ac eb 5f ef | 6f 86 24 97 13 93 3a 5c 56 88 22 5e 44 fb d8 e1 | f7 e8 74 39 ab 08 db ec 08 ca 20 92 ff 5e 35 61 | 70 6f 87 e4 a0 cf fa 53 19 69 e6 fc 3d 79 2a 13 | 8b 67 ba f1 46 d1 18 14 cc d6 68 98 b6 0e 15 62 | 5c 3f 7b 18 fe dd 29 0e 45 5d fb 88 02 b0 e5 a2 | 29 00 00 24 96 36 53 bc 54 1a 72 c2 86 d5 9a b3 | ea b4 b7 ce 95 13 e3 2c 2f ef 60 48 e2 75 18 75 | 80 77 ca 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 7d 2e c4 18 c7 50 d0 0c 64 64 44 | cf 7c 14 d7 db 29 be a1 00 00 00 1c 00 00 40 05 | df 08 4e 94 1c 1e 0f 0d 40 f7 6e 18 f6 44 35 e2 | c7 6d 58 d5 | libevent_free: release ptr-libevent@0x7fb340053a30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34001a1e0 | #529 spent 0.0647 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #529 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37802a910 | handling event EVENT_RETRANSMIT for parent state #600 | start processing: state #600 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #600 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #600 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #600 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.720306; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.442343 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34001a1e0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #600 | libevent_malloc: new ptr-libevent@0x7fb340053a30 size 128 "road-eastnet-nonat-128" #600: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #600) | b5 8b 9d 63 05 76 9b 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 cd c7 d7 3f 0d bb 77 fc d1 1c ab 77 ae 86 ac | 26 75 19 1c 77 04 4b 07 7b 30 6a 0f e9 ae b1 4b | c2 01 f0 be 77 bc 8d 29 4a 13 80 84 01 ec bb bd | 9b b4 e0 a3 b9 74 4d fb 59 f0 b1 62 7c 23 17 59 | c2 35 47 24 40 0e 78 ba 49 8d c1 80 7f ff 22 b6 | b6 ec 09 5b c1 9f 87 91 ac ef 09 c3 af 78 0a ea | 0d 6b a8 42 f1 3e 23 89 64 a8 83 5d 1d d4 84 5e | 9f 78 c2 0c 76 ee a4 76 88 78 0a d8 84 b9 ea 14 | dd aa 58 60 5c f2 1b 26 59 8d ee 35 91 31 11 6a | cf c7 9c 82 87 ed 5c 03 ab 49 fc a4 ec 38 af ae | f6 1b bb 87 fe b6 4a 50 60 6c cc b3 1f fa 42 68 | 77 69 10 7a 5c 8f 12 4e bd d8 46 98 43 dd e4 54 | ef 5e 86 b8 15 8e 41 80 e5 10 0a c9 f6 e4 9a c2 | 27 59 fd b1 5d 0b 98 f8 ff 0f 21 7b 55 71 56 50 | d6 a8 f9 25 e7 e0 02 03 dc 47 72 cd 38 48 9d 8f | 84 5d 29 5a e4 04 82 0c 5c 9a 7a 00 38 a3 32 1f | 29 00 00 24 7c 62 68 cd 4f 9b 4e a6 25 ba ff b3 | 1c a3 6a 45 01 89 4e 8a 82 38 6d ae a7 aa 34 d8 | c6 f1 4c f8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 57 11 53 15 68 5a b5 7f fe 43 f0 | b9 a0 3d 5f 8d 50 a5 03 00 00 00 1c 00 00 40 05 | 6b cb 38 0e d2 0e ef 73 17 ed 32 a7 bd 62 17 c9 | 6a 1f 87 d1 | libevent_free: release ptr-libevent@0x7fb36c064a30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37802a910 | #600 spent 0.0644 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #600 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a8ee40 | handling event EVENT_RETRANSMIT for parent state #646 | start processing: state #646 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #646 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #646 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #646 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.720378; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.46505 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a910 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #646 | libevent_malloc: new ptr-libevent@0x7fb36c064a30 size 128 "road-eastnet-nonat-181" #646: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #646) | b4 5e a6 e5 43 b3 10 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e9 73 71 28 1c 8f e6 c8 30 15 e8 f2 83 24 73 ba | b7 8e 5e ad 23 5e fe f2 57 66 39 2a 10 14 0b 7c | 99 94 74 01 76 7d aa 55 2c 68 f1 88 64 b0 b2 92 | d0 76 47 86 10 fe 60 a1 91 ba cd e1 7f 16 26 be | 94 e7 90 51 31 6b 00 e1 5e 12 3f 7c f5 94 c8 a4 | 3b fb 8d 83 6d 50 f6 31 0f 66 c4 51 6b 72 e3 1c | db ec 64 33 bf 0c 59 6c f1 5d f9 d8 36 f3 db 7b | 00 1f fd 9f 62 d6 fc a4 0c 59 79 dc 40 4d e4 5a | 26 f7 7b d3 60 14 f9 91 37 58 78 18 88 14 be e4 | 88 8a fa f1 c4 75 a4 31 4f 52 e1 46 5e cf d1 8e | 9c f9 b4 26 da 2d a3 97 eb 50 5c 60 d5 bb 8c bb | 6d 2b 92 6e 83 db 31 aa 80 60 97 87 f1 28 f7 2b | c0 b4 e7 6c 01 76 70 27 2e 05 9c f9 c3 75 6f 18 | 38 5e 72 a4 02 3e 9a ec 50 94 23 4d d0 04 67 a1 | fb d2 c7 f4 b8 d2 26 01 d0 ac aa dc ef ad 7a 1c | f6 27 f6 31 ba cf ef 6b a9 6e f7 2e f2 27 c2 0e | 29 00 00 24 14 d4 23 b3 ee 67 2f 32 3a 28 a9 26 | 74 34 22 80 70 fc bc e1 f8 e1 fc 3b 8e 87 b8 d5 | 50 4f 59 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 b4 a9 36 84 ee c8 33 36 8f 3f be | e9 b7 2c ae e1 30 41 fa 00 00 00 1c 00 00 40 05 | 6c 77 62 56 82 b3 0f 90 87 bf 6a c6 0c bd a8 c9 | 53 ca 46 6f | libevent_free: release ptr-libevent@0x7fb364085920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee40 | #646 spent 0.0629 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #646 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c012630 | handling event EVENT_RETRANSMIT for parent state #676 | start processing: state #676 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #676 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #676 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #676 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.72045; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.478258 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #676 | libevent_malloc: new ptr-libevent@0x7fb364085920 size 128 "road-eastnet-nonat-97" #676: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #676) | 9b 3e ad 4d 72 f4 8b db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 3a fb 7f 58 e3 6d 62 ec 1e 2e 59 c4 32 70 90 | 18 12 b4 1d 0b 7a db 79 5b 5b f1 b3 ae 64 53 67 | 1a 61 39 5c 66 bf 33 12 e2 07 ee a6 22 5b c8 f1 | db 9f 71 60 29 05 1a c7 13 3e 19 22 f4 45 96 09 | 3e 1a 53 a5 6e fa ef cb 17 c0 79 5f 39 35 36 4a | 56 04 cc 65 b5 06 e3 4b 77 47 11 f6 68 ce 50 3d | c0 ba c5 64 4c ea 38 bc 6c 58 32 32 f6 68 41 7e | 54 0c c5 6f 06 e5 8f 9b 5d 2e 9f ca 8f 21 e6 f2 | 57 64 49 31 d2 36 51 23 ef 32 7b fc e1 c9 40 d8 | 83 9f 51 20 e7 a6 c5 57 1c 3e d9 70 f7 a6 d6 01 | e3 11 c3 e6 40 27 44 77 36 6c e6 51 a9 4a 34 de | ef 68 86 37 6d 3f b8 f2 d1 61 ec 73 99 06 ca 4d | 7c 67 1d 21 d8 21 73 af 9e 16 de 97 5d dc 6c 4e | f2 c8 de e8 d8 33 7c b9 e3 29 55 17 7b 29 87 79 | 3f 1c d3 24 71 d6 95 25 f2 de f6 b8 4e fa c5 5e | 38 62 28 cc 5d 35 7d 8a 00 7d 42 e6 36 56 c3 6d | 29 00 00 24 50 ed 7c 96 0e 66 f7 85 bf de 64 30 | 8b f8 90 bb b7 61 8d 4c 88 80 57 a3 f9 36 fa 84 | 96 9e 05 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 b4 72 7b 99 d0 96 09 97 fc e4 db | 63 69 04 c8 69 8e b3 ef 00 00 00 1c 00 00 40 05 | 9a 7a 34 f9 3d 74 af 91 e2 55 3d 5a 9c b9 26 70 | 97 7c a3 48 | libevent_free: release ptr-libevent@0x7fb34006c3b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012630 | #676 spent 0.063 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #676 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368024000 | handling event EVENT_RETRANSMIT for parent state #702 | start processing: state #702 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #702 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #702 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #702 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.720521; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.479326 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012630 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #702 | libevent_malloc: new ptr-libevent@0x7fb34006c3b0 size 128 "road-eastnet-nonat-198" #702: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #702) | 15 f5 25 c3 13 f8 3e d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f7 23 22 6b 4e e1 f7 16 71 3f cc 94 ff 78 71 9d | 2b fa a2 70 c3 2e ae 8a 41 75 24 b2 5c bd de a7 | 23 08 94 3d 80 25 9b bb 30 e2 39 68 4c a8 e4 29 | 49 31 37 12 c5 eb 36 bd 19 63 9e bb 02 2e 79 f1 | d5 79 49 b4 68 b2 2f 57 ce ad b6 e5 93 ed 10 47 | c7 f4 e8 7e af a2 87 66 73 2b fe 02 35 20 50 f4 | 9f a5 ab b5 64 3f 58 fa 42 fa 9c 6c 95 59 e9 ce | 4a e5 f4 54 be d8 66 74 a2 a2 90 6f 88 07 da 7a | 49 4b 11 75 25 b5 a8 6e d3 e1 6d f6 61 26 a4 59 | c0 01 b5 a8 17 ba 1f 41 41 7b 34 f9 ae 03 0e 4a | 5b 82 0f 6f 4a f8 8e 71 36 c5 69 ca 74 e0 5b 22 | 74 fb e1 af 0d 04 d4 9e 58 0c 8b a5 0c bc aa 36 | 9b de 60 b8 6a 44 18 d6 e6 f7 1e 5f 4f 0f 2c ae | cb 0c 20 f0 15 5f 9d 76 45 13 42 ad ce b6 34 58 | 61 bf 65 e9 72 77 ab c8 67 23 c2 1d cb 5a b9 e9 | 79 63 d4 bb e2 75 dc 84 01 77 ec d7 11 39 db a3 | 29 00 00 24 29 3f 45 8e 5c a6 8f 4f da f4 c3 d1 | 92 da 38 10 ed 30 75 5c 71 90 dd de 75 d0 e6 82 | d2 61 a3 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b d3 44 81 5f 32 17 86 65 0e fb e9 | 12 7b 72 5f d2 f6 d2 d1 00 00 00 1c 00 00 40 05 | 27 39 6b d9 0c ca bf 20 21 d1 a6 c3 cd c6 e3 21 | 22 00 7c f2 | libevent_free: release ptr-libevent@0x7fb37c03e940 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368024000 | #702 spent 0.0644 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #702 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348046090 | handling event EVENT_RETRANSMIT for parent state #592 | start processing: state #592 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #592 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #592 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #592 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.720594; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.445239 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368024000 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #592 | libevent_malloc: new ptr-libevent@0x7fb37c03e940 size 128 "road-eastnet-nonat-8" #592: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #592) | a1 23 45 d4 95 dd 12 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 aa 2a 51 f9 3f cc db 28 9d 40 57 76 30 ea e9 | 8d e6 d7 38 3a dd ae 4f ff 59 39 ea 16 ad ee 6e | 8b 62 8c ca b4 a5 29 fe c0 61 e6 51 27 98 b4 0a | 1f eb 1b 79 22 3e 1a 67 1b b4 66 38 e1 9a 6a a2 | d0 1e 24 e9 c2 02 a7 7a ce f6 a5 f9 5d be 27 4c | 71 60 3e f2 bd 07 c5 5b 34 15 a1 fe 4b da 4c bd | 44 c6 05 67 90 ad 62 fe e2 99 3c 11 2a d0 f3 17 | 69 1b 22 6b a5 0d 80 74 ae 19 6c 94 76 90 a1 1c | 59 0b 47 78 27 d8 48 ac 3b c0 4d 98 1f d5 86 fc | d6 cb 0d 55 39 de b7 61 51 01 6d fe 92 8b ba 96 | 45 95 1a c6 f8 88 e3 b7 dc ed d9 6d 83 dc 83 68 | 4d da 82 e4 55 42 9e db 10 13 37 0e 08 44 e6 b7 | 92 01 b4 fc 5c 47 c0 bf f0 3a 42 10 d3 9f ca d3 | 90 f7 0f 4b cd cb 5e ac e6 87 b1 ad ed 51 0d 4e | 56 09 8e ae e0 0b a3 ad 21 69 a1 8d b6 00 f2 12 | 05 e3 09 dd f9 79 f5 d1 86 62 dd e9 ff 12 f6 c1 | 29 00 00 24 51 68 bd 9e 33 71 03 a6 00 f3 23 81 | c3 a4 22 43 b3 42 e5 96 7c d8 19 4b ab d2 fa d7 | 63 4d bc 6e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 b9 87 25 a7 de 47 1d dc da 4c 20 | 6f cb f5 ab 4e bb c1 b5 00 00 00 1c 00 00 40 05 | 3d 18 a6 af a0 2d 17 8e 57 6e 37 da 3a df 31 9a | 3f 4d c5 fe | libevent_free: release ptr-libevent@0x7fb348069890 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348046090 | #592 spent 0.0646 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #592 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #601 | start processing: state #601 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #601 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #601 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #601 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.720666; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.44669 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348046090 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #601 | libevent_malloc: new ptr-libevent@0x7fb348069890 size 128 "road-eastnet-nonat-16" #601: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #601) | d7 f7 ca a5 2f 06 a8 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 78 ca bd 24 85 88 4c 78 31 a2 d9 e2 a6 11 ea | a9 a8 ae 09 a4 bd 1f 95 2e 57 31 42 02 74 1f d6 | c5 8b 05 28 72 2e 76 f4 00 72 d0 70 f9 55 b5 84 | 94 83 3e 74 df 62 6a cd 44 08 f1 0f e9 7a 32 99 | b9 ec 32 40 77 3a c4 d1 0a 6e 00 b8 4c 58 c1 09 | 20 0d af 2a d9 0e 8d 53 5e ca 9c e2 9f 27 d8 7e | ce b5 b7 c6 10 df 06 bc e3 80 61 af 7d 92 7a 47 | 1a 5f 4a 09 fe bf 68 fb 0f 40 54 3e 58 85 5f bb | 73 72 f9 bf 1d c8 c3 c9 79 44 0d 07 44 21 4d 95 | fb d2 f9 99 1e dc c6 7e 09 bc cb bc e7 f1 64 05 | 39 dc f9 f1 b3 05 e0 d4 1d fc a0 60 42 26 ba 23 | e3 9b cc 3f d0 ff 12 49 db 17 4a c4 c0 02 73 de | 45 c4 7b f5 22 57 16 78 ee 47 e0 a6 d5 4a a0 a8 | ea f8 76 af 62 fa 50 0e cd 7b b7 d6 9e d4 f1 8e | eb 21 f4 fb f5 f5 7a 25 6c d6 52 91 18 f1 41 03 | e3 0e e9 9c 96 a5 c5 a0 5c 45 85 41 73 2b f2 4b | 29 00 00 24 2f 7a 9a b4 ff 1e 6c 6f 1d 55 f4 6e | bf e3 3b b9 6e ac 92 bf 50 bd ca 89 82 b0 73 dd | ad d2 0a 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 7d 4e 6c df 7e 32 d6 75 e4 3a 9b | ea 1e dd 62 f1 90 1e 9d 00 00 00 1c 00 00 40 05 | a9 5b d2 03 4a 24 da 8f e0 b4 91 a2 3b d8 bb f1 | 5f 38 a9 4c | libevent_free: release ptr-libevent@0x7fb374064930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #601 spent 0.0635 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #601 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb360018460 | handling event EVENT_RETRANSMIT for parent state #565 | start processing: state #565 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #565 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #565 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #565 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.720738; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.424667 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #565 | libevent_malloc: new ptr-libevent@0x7fb374064930 size 128 "road-eastnet-nonat-51" #565: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #565) | 62 cf 87 14 c6 62 30 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b a0 88 20 e4 4d 45 6c f9 cd ab 1d a2 7b 8a 77 | 3f 3e dd 83 a5 c5 aa 0c 1c dc 89 10 ec 2e 1d 4c | 42 5c ef 6d ad 49 b0 1e 60 9d 8f 8c b6 97 91 1e | fa e2 a1 97 aa fe 08 0f d1 4f 8c 96 f7 66 97 1c | 6e fb 33 4a 4e 60 96 cf 7f a6 af 09 ab ce 9a 08 | 5e 64 35 ec 21 8a c2 bd 2b 50 c9 95 3c df 67 bc | 76 c2 a3 99 52 f2 44 a3 ba 7f 1b 9c 6c be 57 71 | 7f aa ab d0 89 27 ef cd 3c c8 cb b6 a6 56 b0 2a | dc 32 81 f2 b0 96 30 77 84 9d 47 bf 9b 70 ae 9a | c7 54 8e 37 07 9a 5c 45 ac fb 14 0f 30 d7 f4 3e | 00 53 c5 25 30 e9 b3 2b a7 d9 d6 c7 f1 6c ee b4 | 31 ce 1b b5 18 a7 ca cc 86 23 9e 01 75 cb f1 23 | 0c 74 c8 3b 22 ea 10 cb 1f ed bd 4b f5 15 a7 9b | 8d e7 27 21 43 d9 02 bf 4e 4f 28 80 57 9a 76 c3 | 87 dd 7c 2f d5 cb 47 73 51 a8 31 7d f5 87 87 1b | 7f 53 02 3e d3 de e6 6a 94 c6 04 77 83 8c 4f 18 | 29 00 00 24 73 13 83 30 bb ab 6e 91 50 8f 5b d1 | 22 88 91 f8 87 52 43 c0 f4 4c b0 a5 9d 49 2d 93 | 43 f4 73 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c1 96 b5 11 12 39 51 2e 15 f5 5b 59 | 6a a7 e2 36 4b 38 a6 bf 00 00 00 1c 00 00 40 05 | b3 11 8b 4a 03 6b 06 af b5 74 1c 0f df 6e b1 a0 | d3 aa 16 5d | libevent_free: release ptr-libevent@0x7fb3540597d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360018460 | #565 spent 0.0646 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #565 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3800153c0 | handling event EVENT_RETRANSMIT for parent state #610 | start processing: state #610 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #610 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #610 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #610 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.720809; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.448213 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #610 | libevent_malloc: new ptr-libevent@0x7fb3540597d0 size 128 "road-eastnet-nonat-18" #610: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #610) | 61 d4 76 e8 fd b1 0b 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 8a 16 af af f2 cb a9 02 ff 3e 3d ae 02 b1 75 | dc a6 9a 8d 77 a2 72 9d c4 d4 e4 1e d5 6c 54 7d | 5c 6a 9a 07 f7 ee 11 8c 25 4e 17 a6 b4 8f e3 97 | 33 ae 5b 1d e1 aa 4d 9c 14 18 3d 8d c9 8d a2 6f | cc 49 8f 9d 17 34 c4 20 96 b3 e2 03 ed 8c 8d de | e3 73 b6 b8 61 9a c3 4a bf 27 d3 2f a8 fe a9 f8 | 00 87 44 22 9b 0b 25 c8 66 f5 c0 23 88 06 14 5d | 26 0a 98 52 96 46 68 85 8b a8 34 78 ba b4 82 eb | 78 95 23 ba 81 62 21 b2 59 bb 25 ed 00 99 e2 d9 | bc 0c f2 02 1d be ff ab a8 66 25 8b 4e d9 07 26 | 4c 48 db 62 8c 96 22 7a d7 2c 26 7a 28 67 fc ec | 0b 44 dc 7e 93 ed 10 51 02 0c 46 dc fa 32 73 51 | b0 91 38 ff ee dc a3 8a 63 c7 0a 63 49 4c a8 57 | dc a0 35 96 35 c6 37 d0 da 6d 46 79 bf cf e8 4f | 26 a6 1b 5c 3a e0 a5 e5 c0 3f 87 73 30 32 59 71 | 11 55 e0 04 02 19 e3 7f 10 2f 76 30 3d 2f 19 1e | 29 00 00 24 47 ba 8f 29 57 01 a1 62 29 56 13 62 | 64 9d 16 df 12 f0 5f 85 ef e3 38 7e a9 49 18 89 | d7 eb 36 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 3c d4 8a e5 4d 08 9a 3a 72 88 9e | 1c 04 96 d4 a5 b0 e4 1d 00 00 00 1c 00 00 40 05 | 52 67 e1 51 42 cf 44 ba 32 e7 56 bf 02 a0 23 c3 | c5 4f fa a5 | libevent_free: release ptr-libevent@0x7fb3400613a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800153c0 | #610 spent 0.0644 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #610 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a8d840 | handling event EVENT_RETRANSMIT for parent state #537 | start processing: state #537 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #537 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #537 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #537 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.720881; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.416101 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800153c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #537 | libevent_malloc: new ptr-libevent@0x7fb3400613a0 size 128 "road-eastnet-nonat-150" #537: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #537) | d1 5a 93 f7 50 58 86 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 fb b2 e9 f5 e0 48 e2 24 d7 b7 90 81 4f a6 cf | 4b 14 8e f5 13 4f af 05 2f 84 bf 07 10 88 44 08 | 93 8a d9 fc 6f 22 fa 3c c8 70 98 39 d3 4f 21 67 | 30 23 4e 48 1b 3c bb d4 79 64 36 c0 17 1e c6 75 | 8a 84 dd c6 9f 18 fe 97 4a e5 66 71 01 67 56 d0 | 31 45 bd 3f 15 7c 4b 14 f6 e2 75 2e db 9d 87 36 | c1 55 2a ef fb 95 d2 cc e7 66 60 2a 50 9c df a0 | 4e 6b 6c fc 98 57 d3 ff f6 ab 30 47 15 58 24 c5 | 05 24 2b 82 ab 42 7e 2d 14 b1 af 64 00 e3 f0 ff | c9 03 29 6e 02 ac 5f cd 18 87 64 c1 df 8b 41 55 | df 40 66 85 17 02 00 95 d2 86 68 ed eb b9 5f fb | fb b4 ca c2 86 45 6f 55 ef 58 df 3c e1 5f a2 fb | 91 dc bf 24 5e 80 76 e4 9f 99 2c 02 e9 6b 6e 98 | 01 53 4a 03 27 4f 46 fe 01 ab 6a 3c 9f e3 be 2f | c8 ee 29 25 4e 78 52 2a 3e c2 0b a4 ff 2d c1 b2 | 21 1d 49 45 c8 7c fb b6 52 62 ee 97 b5 36 16 bc | 29 00 00 24 27 a3 e5 a8 20 a1 f0 e2 d4 b5 39 34 | 87 53 60 68 73 e4 69 53 b8 d2 8c 69 1f 4e 6c 2e | b8 6d d5 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 04 dd f4 fd 4d 77 54 64 d5 cd 35 a0 | 59 04 f4 07 5e 47 05 77 00 00 00 1c 00 00 40 05 | 52 af de ce e9 7d c2 89 3b cb ea 98 eb 7e 08 db | cf 06 0c f1 | libevent_free: release ptr-libevent@0x7fb370054000 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8d840 | #537 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #537 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34003f560 | handling event EVENT_RETRANSMIT for parent state #588 | start processing: state #588 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #588 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #588 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #588 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.720954; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.440096 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8d840 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #588 | libevent_malloc: new ptr-libevent@0x7fb370054000 size 128 "road-eastnet-nonat-17" #588: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #588) | 07 e4 97 ab 5f cb 91 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 a6 96 6f 8d 19 77 3f 7b 52 64 d1 7d b8 c3 32 | e6 45 b8 da 56 a7 e9 08 27 5a 9f 4a f5 65 0f 19 | 1a 87 9c 5a 04 ac c9 78 c0 7b 31 1c 5e fb 7e dd | 49 05 d6 20 6e 0b 54 2a 9b 3f 4c f3 f9 b9 1c 60 | fd 45 61 e5 98 00 5b 9c 76 47 67 ad ea 1b 21 91 | a4 87 87 e0 87 97 79 8f 69 65 91 fd b9 ec ff c4 | 7c e3 32 4b a0 5f 86 aa a7 fa 0f b5 34 1b 73 49 | 66 c8 24 f8 1f 2b 81 c9 03 bd 50 e2 ed f5 66 6c | dd 1f 49 9e f6 da 33 36 e9 d5 b8 a9 47 7f 93 53 | 01 8d de 29 38 fb bb 0d a3 c7 a3 88 35 89 50 ea | dc 06 47 18 09 d0 b1 af c6 f0 7f 06 49 d3 b7 66 | c7 ef 15 23 12 a8 2e ca 41 93 d6 39 56 e0 00 fc | da 04 e7 a4 d5 e6 05 93 a8 c3 b6 60 a2 5e 1a 5b | a7 0a 03 72 c9 af c9 1d 6d 01 5a c0 73 ce 68 f2 | 8a 78 2b 21 30 c3 39 b1 07 f8 a8 5f eb fd ce 8e | 91 c1 e4 7a 50 88 f7 d6 5f 29 3f 29 95 a0 44 e0 | 29 00 00 24 ca ce e1 5c c7 60 0a 0b 6d 35 6a ab | 7c 6e b2 8f 16 80 da 2b 8c f1 55 28 04 49 6c 0a | 9c 6d 0f 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 70 0f 71 4f aa a8 18 56 c1 cb 65 | 01 88 44 d0 16 19 79 73 00 00 00 1c 00 00 40 05 | 52 d2 00 b1 18 82 fe 4a 49 3d d9 d7 7e 4f 87 22 | fa 52 4b 2c | libevent_free: release ptr-libevent@0x7fb340059190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34003f560 | #588 spent 0.0628 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #588 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ac3ec0 | handling event EVENT_RETRANSMIT for parent state #547 | start processing: state #547 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #547 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #547 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #547 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.721024; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.420261 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34003f560 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #547 | libevent_malloc: new ptr-libevent@0x7fb340059190 size 128 "road-eastnet-nonat-36" #547: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #547) | 08 a9 69 6a 37 31 fe e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 70 8f 95 a8 08 4a 05 6c b9 8d 6f 47 8b 04 9a 61 | e0 b5 a7 54 d7 f6 b0 b2 80 21 f1 25 51 d7 e7 f1 | 65 c9 25 83 1a 4e 78 02 4c 52 52 f0 64 27 3f 26 | 0b d2 14 48 53 3f 10 9e f7 fb 83 89 e0 a6 40 c0 | ac c1 d7 6a 50 16 4b ff 1f bc c1 ba b9 50 75 ab | 97 f9 e1 ea ad 67 25 02 53 4f ab 12 78 7a b1 65 | e0 48 35 1e 09 a6 85 b6 4d 5c 49 16 55 30 42 5e | b9 f1 50 2c e6 5b 8c 18 8c 57 4a 2f 85 11 d0 01 | 37 16 99 1c 9d 24 6d 7b 69 12 eb a9 3b c6 79 88 | 71 5a fa 14 26 f9 27 29 b3 23 6c 0a 35 18 d6 92 | af 76 48 1f d6 d0 94 16 fe ec 88 6c 8a e8 d2 fa | 63 24 d6 a1 72 8d c8 45 fa 71 9c b6 4e 87 9a f2 | 3d 51 b0 37 f7 2f 94 b2 eb 33 6a 4b b2 e5 fd 10 | 52 ad 99 ac 91 e9 f8 db bf d6 1e e7 93 ff 43 02 | 2f 77 1f d8 af 33 b2 2b c2 3e 9a f3 55 7a 63 95 | 83 04 91 50 3e b6 71 c0 09 49 63 7e 66 a6 12 8b | 29 00 00 24 eb 3c 18 5d 0c ff c1 c1 a4 88 c6 c0 | 90 96 2d a5 6a 9d d3 7b bb 7c 2c 4c e3 35 60 33 | 3d d4 c2 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 02 45 88 78 27 f3 6f f8 1b fc da | 5a fd 16 4d 6d 84 19 70 00 00 00 1c 00 00 40 05 | 9b e7 b7 66 bc 65 25 34 6e 71 75 59 14 69 9b 1b | c0 b2 09 dd | libevent_free: release ptr-libevent@0x7fb338053ff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | #547 spent 0.0833 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #547 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #589 | start processing: state #589 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #589 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #589 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #589 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.721145; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.444672 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #589 | libevent_malloc: new ptr-libevent@0x7fb338053ff0 size 128 "road-eastnet-nonat-55" #589: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #589) | d3 af ea 9d a0 c8 f5 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 de 4e 18 e6 1e 19 90 6b f7 90 15 af f6 7b ab | 4e c8 ce d7 0b 8e 81 b9 f2 4f 1d 4f 5c 24 63 06 | 65 52 bc 5a 83 ff 1b 21 cb 72 47 f8 8a e5 91 bf | 57 3c 5e f9 8a 0f 69 ef dd 9a d9 96 96 d3 e9 53 | 62 6d 85 78 9c cd f3 37 3d c3 3f cf 12 49 52 71 | f1 91 04 7a b7 09 2f 96 56 e2 dd 46 62 33 b5 bb | ad 3c f9 d1 69 f8 6d d3 fc 9b 28 0f 28 e0 3e bf | f2 8d 28 0d c0 bd 56 d2 fc f5 11 53 c5 5f 98 5e | b5 0e 16 d8 79 1e 33 2e 4d 24 12 5b e7 2c e3 82 | 41 23 5b 9c d9 c3 1b 4e c2 1c 19 6a a5 1e 04 2e | 8f c8 de 18 5d d7 71 bd 41 ae f2 b5 79 ea 41 40 | 17 cc b2 ac f4 29 ea 95 03 3b 8a b9 65 ec 40 16 | 4f a4 1c c9 6c af b5 25 5c 3f 1a 3d 18 fe 4c 4f | 96 cd 0e a4 e1 ca 37 96 3c 03 bf a5 07 0a 64 5f | 91 2f ea fc 4d 6d 98 68 7e 74 f7 83 b0 39 d7 b8 | 05 fa 66 7a ad 18 d9 82 14 ae c6 e8 1d a4 b3 22 | 29 00 00 24 8c a0 dd 88 ca d4 16 c6 d2 19 83 fb | 91 96 4d 43 b6 4d b2 a0 b1 2f 06 3d 0c a8 88 7c | 52 87 c6 7a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 52 21 ef 0c fd d6 a8 97 22 3e 1c | 84 a2 1f 0e d5 18 e7 d5 00 00 00 1c 00 00 40 05 | 1e 9e 9c e9 d7 26 c7 2f ea de f3 cf 5b ae 57 9b | ea f6 3e d1 | libevent_free: release ptr-libevent@0x7fb380075050 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #589 spent 0.0893 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #589 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #550 | start processing: state #550 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #550 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #550 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #550 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.721245; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.424666 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #550 | libevent_malloc: new ptr-libevent@0x7fb380075050 size 128 "road-eastnet-nonat-91" #550: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #550) | db ff 34 cc aa 26 9d 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 8a d7 13 53 9b f1 64 c1 c8 04 0a 8b 03 2b c6 | 0d ad 43 39 3f fa d4 31 02 f2 d8 f2 49 42 65 4d | e0 c7 6e 23 69 ee af f5 1d 8a 37 e7 f7 88 51 de | da e3 c7 6f ce 70 fd 62 27 15 72 b1 74 d5 96 fe | 5d 1b a4 a4 ca 31 5b a5 af a2 32 e4 20 19 00 6d | fa 74 d0 93 44 c3 c0 75 8e c7 8d 89 fe 62 d3 0e | ec 96 32 6f b0 ca 05 63 70 b3 be f1 fd 8a 22 d3 | 30 ce 9e d5 e4 e5 4d 92 9a f9 82 cc a2 1d bf 79 | e0 be 40 12 35 fa 00 26 4c 97 eb 5c 78 8c 37 10 | 77 68 70 27 80 31 92 d4 17 d1 f6 07 6e a8 5c 37 | b2 cf 98 7e 16 70 ee da 2f c8 6a 1a cf 99 42 34 | 69 17 56 25 2f 75 a2 60 5b 03 8f 41 b4 71 d4 fe | d6 39 fc e1 d0 29 d9 e4 01 4d 2d 30 57 34 2a 98 | 61 8d 90 1a 37 ab e2 12 47 26 fe 8f 69 f6 20 34 | 44 8b 50 13 5b e0 15 0d ae 46 52 1d a4 2f bb f4 | 98 b0 5c 9c 64 1b 86 83 6f 11 65 70 23 23 74 6f | 29 00 00 24 e6 6e 02 88 81 a9 8e a7 ae 14 ec 40 | 05 51 ce e9 24 5c 3b c2 0b 49 df 12 27 77 a8 bf | ca be 33 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 11 2c ad 5a 38 a4 00 8e af be fd | a7 9a 55 19 4d 9f d1 09 00 00 00 1c 00 00 40 05 | aa 58 63 41 f4 3b 9c a5 91 ba 1f 8a 0a d5 9b 23 | 59 28 d4 a7 | libevent_free: release ptr-libevent@0x7fb3380597d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | #550 spent 0.0868 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #550 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c014cc0 | handling event EVENT_RETRANSMIT for parent state #611 | start processing: state #611 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #611 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #611 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #611 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.721344; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.446454 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #611 | libevent_malloc: new ptr-libevent@0x7fb3380597d0 size 128 "road-eastnet-nonat-177" #611: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #611) | 34 ea b3 f2 4f 9b fd 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 65 77 23 f1 8e 59 ad e7 ff 5f de d0 89 eb 8f | e9 74 c5 98 7f 21 ce 5f 9a 27 21 a7 98 93 9e 99 | e4 27 4e b7 b3 24 fc 80 94 f6 f4 f5 9c fa 3c 88 | 3d a1 56 1a 21 1c 0e f5 0b ed e1 09 65 2e 3d d4 | 2f 57 58 dc 24 ce 14 24 1c da 0b b5 60 f1 11 17 | 1a 17 9e 79 a3 98 e2 85 17 79 fe 96 1e fd 0a 94 | db 8d d3 25 e1 09 1f 09 2d e1 61 f8 5e 36 1f 1e | c1 70 ed 24 ed f4 d8 4e fd 57 46 fb d1 4f 47 ed | 53 5d 31 e7 1e 13 8b 95 3e 46 72 5a c0 f9 1e d0 | 00 11 60 68 91 85 15 b6 a5 b9 35 22 09 f5 1e bb | 2f 36 9e 4c 45 ba 3b e0 87 f8 18 85 4b f7 b6 9b | 48 62 35 a7 22 dd 90 30 ba 7a 3c 10 b3 65 8e 2c | 7c d8 4a 70 a8 d5 53 60 76 0c 5d 33 c9 61 54 67 | f9 1d 59 23 17 2a 52 2b c0 bf ff e6 44 b3 ef 2a | 84 a8 c8 18 68 4e c2 5c 11 a6 2e dc 53 a6 93 01 | d4 df b1 45 21 de 1f be f8 d7 e5 8a 4b 8c d0 57 | 29 00 00 24 db 8b 59 30 04 e8 61 45 59 6e b9 45 | 4b e0 a8 74 27 04 8d 8e 65 dc 44 fc e5 bb c8 b9 | d4 93 ad 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e cb 52 55 02 e3 8d 62 40 06 d9 c3 | 25 de 61 c2 25 e8 55 c6 00 00 00 1c 00 00 40 05 | 4c c7 ad 1d 02 9d 47 2a a9 d3 98 b0 82 03 7b 27 | 1e fc a6 ec | libevent_free: release ptr-libevent@0x7fb34c05ecd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c014cc0 | #611 spent 0.0694 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #611 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #567 | start processing: state #567 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #567 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #567 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #567 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.721418; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.428644 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c014cc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #567 | libevent_malloc: new ptr-libevent@0x7fb34c05ecd0 size 128 "road-eastnet-nonat-130" #567: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #567) | 96 df 1a f7 12 b2 bc 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c 62 fd af 90 2b d8 09 e9 e2 92 5c d3 5d ff be | b8 74 9f 04 03 97 8e 9b 87 54 08 07 bc 69 63 5c | 4f 7e 94 26 99 2b 45 4b b4 3e 6a bd e9 bf 50 b1 | 32 c2 e1 9e 38 52 46 f5 f2 58 78 3e 50 20 3a 74 | f6 e9 d3 83 40 c0 04 2b de 3a cc cc 33 57 e8 e4 | c3 b8 f3 a1 07 1c a7 aa 33 bf fa f1 88 41 d1 8f | 1c 54 38 a4 0f a0 74 99 19 cf dc f3 37 2e 9f 7d | cb c6 ff 33 e7 c4 87 6d b4 fc 2c f8 0b d2 97 fc | 95 94 a8 fc c3 8e 19 7e db 7c 13 30 0e 23 df 10 | 95 1c a4 5e cb 4f f7 55 14 48 f9 01 0e 0f 65 55 | b2 e9 d7 a8 7f 12 ac 8a 4e 27 61 a0 92 a0 7c e2 | 06 89 a0 28 48 73 b2 44 05 78 cf b7 27 b8 cb 46 | e0 4e 1d 1b 19 80 1b 07 1b 7f 13 f8 83 25 91 17 | 55 8a 26 9b 93 51 86 39 92 c7 48 b5 62 5f c4 da | 35 11 c7 be 49 10 bf 43 bb fd 6a b1 b8 23 97 53 | 03 3d 3d d7 05 a5 04 a6 4b fd 36 20 d4 50 2d 15 | 29 00 00 24 2d 33 44 b7 62 bd a9 aa c3 a6 92 61 | ee c6 40 8f 89 af c2 08 6b d9 9a e5 24 30 97 38 | 3e b1 2f 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 cc 91 ff 67 bb 9d ba 9d 71 c8 73 | 66 2a 2a e8 17 18 8e 7d 00 00 00 1c 00 00 40 05 | 5f 92 72 26 a0 e4 d9 83 b3 70 5e 9c 4e 05 aa 9e | 38 2c ea d4 | libevent_free: release ptr-libevent@0x7fb36c059a40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #567 spent 0.0649 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #567 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35800d120 | handling event EVENT_RETRANSMIT for parent state #693 | start processing: state #693 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #693 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #693 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #693 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.721491; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.479804 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #693 | libevent_malloc: new ptr-libevent@0x7fb36c059a40 size 128 "road-eastnet-nonat-156" #693: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #693) | 8c cd 5b 89 3d b1 c0 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 e2 11 fa f7 47 b1 84 25 8d b1 b9 cc 61 7a d1 | 10 c4 99 41 8a c2 39 41 fa f2 fd fe 2d 88 77 1c | 45 28 1f 19 11 cd 86 3b 21 90 05 0a 95 68 f9 b5 | 66 47 f0 fd f6 ed 91 51 a1 90 e5 3a 68 7d 44 49 | 52 7e 11 24 5b 36 2d 9e 45 cf d7 e0 d6 57 a2 7e | bf a1 9d 8b 04 a2 cc 30 fe 6f 9d 2d 07 7c c6 a9 | ac ec ed 97 f5 f4 d7 97 49 b2 0d 08 4f 28 26 b4 | af 6a 98 d7 60 90 49 c5 06 ed 93 e3 18 24 17 de | 76 59 7c 05 cb a5 83 81 c6 45 a9 36 d4 c9 e5 a7 | d0 88 64 07 2a 87 01 7c 25 df 11 ab 75 b4 6c 03 | 37 fb 6f 75 2d f8 ea 20 73 cf 0c cd ba 90 c2 2c | 01 10 39 d8 3c b3 37 5e 08 f0 10 c6 bd a5 ce c8 | 64 ae 6d 05 92 4e 98 ee d6 94 4c a1 e4 7c b1 13 | 3e 00 d0 8a 16 57 67 90 44 2b 00 cd 9b 43 89 4a | bd d3 f2 0a 53 1d d1 36 e1 24 9c 6e 9e aa 0f 7b | 30 f6 e4 b8 a4 c5 92 c8 e5 b2 55 72 6c 6f d9 28 | 29 00 00 24 14 85 11 ba f9 3b 72 6e cf bb f5 0a | de 80 83 65 33 0c 22 f8 ea ad 98 f3 8e 26 41 40 | d7 cb 01 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e f4 9d 3b cc 7d 09 25 54 61 34 fd | ae 72 6d c2 c2 0a 3b 62 00 00 00 1c 00 00 40 05 | e8 a1 80 e7 3a b7 e7 08 64 9f b4 0b f3 c9 d4 c2 | cb 3c 43 63 | libevent_free: release ptr-libevent@0x7fb37c0813f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800d120 | #693 spent 0.065 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #693 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35800cc10 | handling event EVENT_RETRANSMIT for parent state #541 | start processing: state #541 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #541 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #541 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #541 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.721564; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.417708 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #541 | libevent_malloc: new ptr-libevent@0x7fb37c0813f0 size 128 "road-eastnet-nonat-24" #541: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #541) | e5 6d dc 54 e8 13 c6 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 70 ec f4 97 99 d8 72 ce 1b fb 62 b7 ff 70 b1 | d0 af d0 71 cf c9 19 5a 4b 54 67 9f d9 76 16 c5 | c2 a4 79 9e 63 b4 60 27 34 54 51 7c ce 20 f6 c6 | 4c 4b 74 1f 25 17 6c 4a e1 d4 14 08 5a 16 b4 9b | 82 8a 4f 61 af 32 25 98 4f 8b b6 f5 b4 de 0c b8 | 8f 1e 39 50 5f 6a 1f e4 ec dd 6a 69 e6 1c 77 5b | 51 25 d2 75 cb cb 97 24 6c 0c 79 b7 db 85 62 10 | 6e af 06 f5 31 7b 0b d7 96 08 f6 7f 02 1c 78 21 | 18 19 57 15 cc 45 e4 91 68 10 8d c0 f5 dd c3 33 | 9f d1 8c 61 12 47 98 e4 4a b7 b5 c3 22 ac 54 c9 | a2 b0 69 33 63 5c 14 fd d2 8f 89 5d d6 7f 3d 6d | f8 ab aa bd b8 f0 3f 92 e9 56 8b 5a 9e 4a 02 6e | a1 8e c1 f3 24 ab ef 20 e4 c9 e2 98 e4 c4 c3 92 | 49 b8 7b 9b eb b0 61 e1 ff c9 4b 16 04 d8 8e 9c | 7e c1 26 a0 a7 e2 6e 1c 6f b6 6c b8 06 b6 36 e1 | df 58 24 88 c2 60 0d 9a 51 05 8e 85 c2 9e 66 5b | 29 00 00 24 e7 35 32 98 af d0 40 10 f4 80 06 7c | f0 2f 64 a5 58 9a 04 65 fd dd 75 64 b2 5d 38 dd | a9 29 2e d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 7c fc 09 1a 79 2c 04 02 74 c5 f8 | 3a d6 61 08 3f 8f 87 41 00 00 00 1c 00 00 40 05 | 30 97 d6 ac 90 33 4d 32 1c 73 f2 d2 db 60 9a 7c | 6e 76 e0 11 | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800cc10 | #541 spent 0.0629 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #541 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370046090 | handling event EVENT_RETRANSMIT for parent state #613 | start processing: state #613 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #613 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #613 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #613 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.721636; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.433381 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #613 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 "road-eastnet-nonat-31" #613: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #613) | 79 93 08 03 2c b4 dd 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a e1 6a 82 db ed db 74 ee b6 15 12 39 71 33 bf | 8a 46 d7 c6 c5 8a 1b 3d a2 de 2e f1 c1 94 33 c0 | 34 aa cd 57 d3 68 0a 98 44 dd 52 e4 12 32 bd 16 | 0c e2 b3 0c 1d f7 54 42 90 09 2f 70 da 3e dc 46 | 26 73 29 3f 4d 95 44 51 c4 ee d0 51 62 f5 23 73 | b1 79 05 13 44 f0 8d 5a 13 9f d6 c9 04 56 fa e7 | a2 43 d1 96 b2 b6 52 69 ea dc 64 81 12 bc 22 c2 | c4 ee a3 e1 69 5f f8 37 1b e7 00 a6 82 ff ee 85 | 5b 12 1c 2b ba ff 36 aa 33 29 61 20 53 f5 26 6e | e7 36 fb 9e 58 96 08 1a f4 41 81 4b 11 d3 c0 cd | 3e d4 7f 23 fd 79 62 dc 64 4c e9 e5 d0 f2 db a5 | 1b cd 14 72 42 56 15 bb 0e b4 bb d4 e6 c8 7c c1 | 88 7c 43 0b f3 ed 50 68 99 2f e0 93 89 bc b2 e4 | 01 54 87 c5 c5 6f e4 ac 60 cf 42 a6 f1 da 67 fd | 37 ef 53 de 9e 68 36 8d 63 23 d3 89 29 6d 55 6a | db 4d b6 90 4e 9f 31 7b 83 b2 4e 39 37 2c 7c 49 | 29 00 00 24 38 88 3a 8e 21 d0 99 01 66 b4 5d 84 | 38 93 2d 4f e7 27 09 2a 71 43 d3 fd 55 4d 04 8f | a5 6a 55 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 b5 7c 10 1e 73 0b 8e c4 8c 67 0d | 37 a9 91 c5 05 2c 6c b2 00 00 00 1c 00 00 40 05 | 8a 81 ac a2 d8 3f 44 cf aa 4d f4 06 c5 76 63 33 | 40 a4 d1 4c | libevent_free: release ptr-libevent@0x7fb37c05eea0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370046090 | #613 spent 0.0649 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #613 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a60690 | handling event EVENT_RETRANSMIT for parent state #542 | start processing: state #542 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #542 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #542 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #542 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.721708; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.421244 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370046090 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #542 | libevent_malloc: new ptr-libevent@0x7fb37c05eea0 size 128 "road-eastnet-nonat-3" #542: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #542) | 19 ef 59 5e 62 c0 95 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 79 27 54 07 c6 5d 65 e0 c6 e9 51 3c d2 f7 23 | 14 31 ac 33 ad e0 98 39 13 b2 d5 2e 21 16 ef fd | fb 26 fb b6 5b 85 f7 f1 d6 8c 2f ce 82 67 51 76 | fa d3 54 14 d5 1a 64 a6 27 51 68 bf da d2 0e 9f | ba 1d 58 01 63 c6 05 46 a8 1e 48 8c 0f 1a 50 9f | c7 02 55 57 2f b0 4c 8c ba 2a 6e 11 20 86 c9 eb | f4 2f ad d5 ad 8d b4 c6 8d 1b 09 90 d8 aa fd 33 | d8 fc 91 0e 8d 34 75 59 76 d8 c1 fb b1 99 78 79 | 99 6e 5c 3f d3 a2 5f 67 1a 09 7c 1f 03 50 f4 93 | c2 74 d9 b7 7a 58 a0 62 d2 8e 30 4b 2f b5 4e 54 | 8a 34 49 eb c4 db 10 33 ba 37 57 98 9c 56 d1 4f | 0c 29 1a f8 25 5e 60 5d 0b 14 86 5d 6d 65 3a dc | 8a 6b ce 2c 5e 34 47 64 fc b5 0d 07 ab 4d e8 74 | 6d 78 e0 82 76 08 57 ad 18 73 73 dc 20 30 66 40 | 79 b4 11 4a 81 e9 e7 f5 9a 6f b2 79 12 d0 43 c6 | 72 27 8c 54 92 d4 21 e5 0d 8d 14 e1 53 dd 12 10 | 29 00 00 24 e8 60 30 77 56 3c f1 25 c1 c6 6e 74 | 5c 37 ec e4 ad 07 3f bc d0 27 64 9c 2c 2f 3e f0 | a2 51 6d 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 21 f8 f2 aa c5 02 f5 b9 e8 1d 48 | 11 f3 ee 20 33 c4 de f9 00 00 00 1c 00 00 40 05 | 12 90 d2 d6 c0 e9 64 15 7c cf ef 34 31 76 64 b7 | 85 6e 21 7e | libevent_free: release ptr-libevent@0x7fb35c061940 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a60690 | #542 spent 0.0647 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #542 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a84000 | handling event EVENT_RETRANSMIT for parent state #549 | start processing: state #549 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #549 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #549 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #549 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.72178; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.420697 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a60690 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #549 | libevent_malloc: new ptr-libevent@0x7fb35c061940 size 128 "road-eastnet-nonat-125" #549: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #549) | a0 bc bf eb 69 ec 7d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 c9 7a 4d 74 30 97 ab 2b b8 9b 8e 28 56 30 35 | c9 29 b4 03 c9 c0 54 36 0e 1e 85 00 be e1 eb b6 | 10 56 f7 3e 25 85 4e 54 15 d9 dd 76 f8 a2 ef 75 | 06 49 0e 79 92 19 04 73 c4 32 36 8f 38 c3 a0 37 | 73 31 32 c7 13 ba 49 63 a9 ff 14 ce 76 c3 ca 6b | 44 ac 36 b3 fe 8e 49 b3 f2 07 ba 8e 9d 83 a8 90 | 1c bc ba b1 a8 32 ac a1 72 6e a4 55 c6 06 26 4d | 59 1f 8c 21 e8 f2 1d 39 aa 21 29 2d 13 d2 62 e1 | cd a6 44 f2 be e8 53 3c 05 77 b8 a3 16 49 f8 12 | a0 eb 6d c0 e5 00 d6 6c dd 16 9c ab b2 0e 15 2a | 11 01 e2 8c ef 25 2e ff f8 e7 c3 fa 43 cc 6c 72 | c5 e2 33 98 3b f3 05 50 a7 ad 9d 8e 86 bf 56 f5 | 69 e1 73 1e c0 3d 04 45 0d d2 2e 9d 3e db 05 1c | 6a c1 c4 8e 83 ca c0 f4 84 01 6b be a7 89 db dc | 85 98 0f b5 ba 9a cf 4d 5b 70 a7 a4 7a fa 95 48 | b4 59 36 8a 67 a3 46 cb 51 b4 47 97 d0 b4 c8 75 | 29 00 00 24 e6 91 2a 43 d1 aa b6 49 a9 57 9a 19 | fc 51 19 e5 28 8d 93 b9 12 81 37 cd 42 5d c8 08 | 2e b2 6c 7a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 e5 9d 22 28 c7 c4 27 97 02 c2 92 | 36 7a d0 48 44 31 1b ea 00 00 00 1c 00 00 40 05 | ac 08 fb c5 91 b8 80 23 e8 68 88 22 35 dd f9 61 | 84 cd 9d 18 | libevent_free: release ptr-libevent@0x7fb3500594c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a84000 | #549 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #549 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_RETRANSMIT for parent state #579 | start processing: state #579 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #579 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #579 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #579 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.721854; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.437585 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #579 | libevent_malloc: new ptr-libevent@0x7fb3500594c0 size 128 "road-eastnet-nonat-129" #579: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #579) | f7 57 b5 67 5d 53 5d ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 5b ad a3 d5 b5 e0 5b 3c 63 fe 82 fc 8e 12 08 | 91 d6 c4 0a 02 eb fa cc 09 df 5f 23 de d8 2b f5 | c7 d1 d6 20 b2 e9 e0 44 e8 af 84 2c 0d cf cc f2 | 5d 14 d3 a9 26 db 6c d3 5a c5 b6 bb 02 ab 78 5c | 8d fd ab e4 18 ac f3 6d 67 ce 9e f1 c9 4e 48 19 | 38 ce 5b ee 1f 7e 6a 23 0e c3 35 0a 2d 7b 93 c8 | c9 5a 5f 29 c4 9f 5e f1 cc e4 b6 26 ba fc 75 a8 | 4e df 30 e0 38 f1 9b 93 15 71 8b 36 cc c8 fb 5e | 9c 97 42 2c 87 36 f5 a0 be a8 f9 30 86 f3 27 9c | cf e8 6d 6a ec 63 43 19 60 0c 5c 2f 8e b2 0b 0c | 5c 25 5d 2a 49 65 27 59 d0 dc 6b b1 3c 0a 06 2c | 14 95 03 33 11 da 59 39 c6 df 4f d9 ac c9 48 dc | 85 72 4e eb a2 61 cd b4 14 8d 9d 88 fc a5 3d ca | dc 4d 1b 8d 2d 5e 50 0b 56 ca d8 dc d3 17 7b 53 | 57 13 42 fe 43 06 61 23 81 b7 76 43 10 62 61 76 | f6 bc ce 46 30 e9 08 b7 2e e4 25 72 ca 14 7c 12 | 29 00 00 24 94 e8 55 b4 44 b7 00 bf d8 b6 2e cf | 2e 8c 08 03 dd d5 10 1f dd d7 4a c8 73 e1 d7 76 | 9d 2b 29 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 52 54 26 54 47 d1 ec 3a 0f bf 18 | 2b 81 e9 d8 d6 20 de c2 00 00 00 1c 00 00 40 05 | e1 d4 5a 12 5b c3 62 c5 dc bb 54 dd 1e 69 c8 f5 | c2 4b d5 7c | libevent_free: release ptr-libevent@0x7fb35405ef90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | #579 spent 0.0635 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #579 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb364029270 | handling event EVENT_RETRANSMIT for parent state #570 | start processing: state #570 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #570 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #570 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #570 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.721924; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.43958 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #570 | libevent_malloc: new ptr-libevent@0x7fb35405ef90 size 128 "road-eastnet-nonat-96" #570: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #570) | c9 60 e7 45 a7 98 e0 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 68 13 ed 82 59 f7 bf b7 d3 7d 5a 25 b1 e1 fd | ce b0 3f a5 fb 8c bd 34 1d e5 2a 9b fc 5b 3e 55 | 82 20 27 8a 48 3d 6e 3e 7f dc aa 07 ea 30 a0 2a | 9c f4 f8 a8 1d 61 fa e6 e5 a6 d3 c3 23 a2 0d 27 | d8 62 e9 78 7e f3 e0 26 9b ba 64 6b b0 e1 50 5c | c3 bc cb de d9 53 bf f2 ac d3 d9 69 fb c6 10 8c | 38 7d aa 47 ee d8 74 e7 3e ca 1f 48 f0 13 76 f3 | 40 f4 69 cb 3d 62 67 20 a1 3b b6 e2 a8 a9 ab a6 | 2b 8b a8 99 f0 d1 52 2b b5 e5 e6 49 c7 16 b6 59 | f0 d0 ea 1f 2e db 52 ab 01 2b c6 eb cc 72 67 ee | fc 53 07 28 c8 cb 95 9e 3a a0 20 2c 1e 66 b0 e9 | 12 9c 0c 0c 6b f2 70 25 e0 f9 f8 0e 69 49 c5 be | 72 17 9d 25 7c 8e 29 c2 0e 40 fa d6 20 e8 3f 96 | ac dd 51 f9 fe 49 86 c9 9b e7 be 19 fb 67 10 1f | f3 4b 80 50 1d d2 9f c6 fc 87 3a f9 1d 52 8a ba | 10 8e 73 40 ff 99 d5 7e 30 7d e1 68 1c 25 bd b7 | 29 00 00 24 ba 1d 83 e5 8b c9 fc 82 14 41 45 77 | 00 92 fd 3d da ae b0 d1 cb bd 90 71 29 d7 a3 fd | 03 9f fb b5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fa 68 08 10 0a d6 4b 37 b2 81 b0 b2 | 14 38 ef bd ae 4e e0 08 00 00 00 1c 00 00 40 05 | 3a 9e a3 24 b1 2a 82 b0 e0 fd 89 6a b8 7b ca cd | 82 b8 2e 9e | libevent_free: release ptr-libevent@0x7fb364054370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364029270 | #570 spent 0.0648 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #570 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c01da80 | handling event EVENT_RETRANSMIT for parent state #555 | start processing: state #555 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #555 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #555 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #555 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.721997; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.441594 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364029270 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #555 | libevent_malloc: new ptr-libevent@0x7fb364054370 size 128 "road-eastnet-nonat-133" #555: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #555) | fd 31 e4 af 59 3e ae 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 85 72 9c cb 7c 09 f8 23 fb f5 57 cd 4e 83 b6 | a0 e6 5a 64 5e 52 19 6a 4f a7 4e e3 ab 51 d1 ee | b0 ba 52 7b dc b8 e2 a2 b5 3d 66 0c 60 98 2f 4f | 13 c0 96 12 cc 2c 3a 0e e9 91 83 23 1e 4e 39 c6 | 9f d6 0d da 47 3d 42 93 4d 91 c2 2f 26 04 15 c3 | 41 c4 f8 0a d7 03 ee 39 9f 96 ac c4 3e 56 6c 05 | 15 ec 80 86 ac 76 e0 e4 08 62 35 f8 6c eb 25 c5 | 19 28 f6 9a dc 30 d8 8a 67 5e 34 70 48 34 07 96 | e2 ab 1c 7f d5 2c e0 8a 96 fd 4e 98 8d 6c aa ee | 67 4d d3 dc 1e 6c 3d db a0 95 a1 d5 a6 74 27 2f | b7 3e e6 fe c4 ac 66 d7 25 d1 4f 42 90 09 08 6d | 35 3d 9b fe f1 b0 50 00 be c3 ae db 45 71 57 2d | 99 1c ee 2e fa c8 1e 96 ae 9a 9e 66 4e ff 6a a6 | 84 c5 c3 4f c1 1f de cc 77 17 f0 b0 1e 9a 28 0b | 55 f0 78 ac 8b b4 71 fc 1a 17 41 e7 6a 74 62 62 | 3d 84 68 6d 3f ac fc 48 f6 30 13 2d 70 6e ad 53 | 29 00 00 24 71 32 1e 88 23 ee 2f ae 39 9e 7b 59 | 41 2e 3a 0b 57 4e 0c 80 35 cd a7 35 65 8c e6 b2 | f1 87 a1 b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 53 72 74 e1 5b 37 7b 33 b0 17 78 | c1 64 62 a5 7c 42 0a ec 00 00 00 1c 00 00 40 05 | ff 46 61 3e 66 71 bd af 2e 4c 91 0c 25 ae 93 92 | d3 06 93 2d | libevent_free: release ptr-libevent@0x7fb35c0643e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c01da80 | #555 spent 0.0658 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #555 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #681 | start processing: state #681 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #681 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #681 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #681 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.722074; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.476082 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c01da80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #681 | libevent_malloc: new ptr-libevent@0x7fb35c0643e0 size 128 "road-eastnet-nonat-170" #681: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #681) | 43 b3 87 97 a5 28 76 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 69 dd 2f f3 2d 11 ad a5 9c d3 5d da 0a 86 6b | 8c 49 25 0c 16 f8 de 41 b0 ac 6e 41 c3 d3 27 1c | 5b 54 cb 17 92 04 0e c6 6b 96 94 d9 db ad b8 79 | dd c8 5b bf 4b a3 2f 7c 6a 19 e7 ad 1e 53 14 f7 | d1 90 70 c6 a3 11 50 75 b1 1c 57 b6 52 72 e5 bf | 5f 38 47 3e 16 f7 e0 ac 51 3d 68 76 bd 51 68 b9 | 99 0e 7f af 6c 2d 48 06 10 6a 30 cc 70 5d 14 1f | f9 cd e8 dc 60 df 2b 6b b6 f3 6f 7e 00 e5 1f df | 04 ee 6d 38 b5 09 46 77 da d8 ac d9 bc dd 17 11 | 97 7f c0 a3 2a 8e e7 7b d0 22 8a 6e 6e cc 8a d1 | ee 68 9a 8f a3 46 20 76 f3 a4 2c f5 c0 c0 1e 77 | 2d 20 e2 fc 14 c2 66 73 98 59 19 d7 e6 3d e6 8e | 61 67 8e 25 aa c2 61 e0 9d 35 ef 0e be d6 35 38 | 8c 18 ce 74 7a be 48 b5 c4 a1 11 de 05 be 64 33 | e8 8b ac cd 76 ec 2b 48 c4 d2 9a 3c c7 9d b7 e7 | 67 3d c4 7e 7f 8d af 5a 9d 1c 23 aa 32 7a 83 a5 | 29 00 00 24 ab ab 32 27 cc 43 85 a1 14 10 62 ae | 10 ab 5a 1f 4b 33 ac a9 a7 81 9d 0d 60 06 a6 87 | e7 aa 41 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 f1 2f 02 50 94 bd e1 85 64 92 73 | e1 fc 7b 98 62 5d a3 7d 00 00 00 1c 00 00 40 05 | 0f dc 60 fc ac a0 68 fc 96 74 2f 45 a5 ab 4a db | c3 e2 5b 97 | libevent_free: release ptr-libevent@0x7fb36006c900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #681 spent 0.0655 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #681 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37801d970 | handling event EVENT_RETRANSMIT for parent state #662 | start processing: state #662 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #662 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #662 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #662 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.722149; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.468981 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #662 | libevent_malloc: new ptr-libevent@0x7fb36006c900 size 128 "road-eastnet-nonat-116" #662: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #662) | 6f f8 26 3d 46 67 06 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e1 15 32 77 43 3f ae 4b c7 5f 3f 2b dd 7f d3 1e | dd c1 5f 13 88 1d 29 8c 3e da 8c 02 5a 8d f6 d1 | 3f a3 f0 0a 58 d4 04 d3 f0 b3 db 26 fc 33 ce 46 | ec 5c 90 e3 6a 12 91 6d f5 be 55 11 24 66 8b cd | 51 d1 6c 4f ab d6 35 10 55 bd 81 f3 c5 9b 26 2d | f4 3f 70 2d c2 69 41 11 99 68 6f d6 67 f7 0b 94 | 16 15 37 50 dd 26 25 c5 03 89 2e cb 46 72 37 83 | a6 ca 48 57 46 11 c8 fc 49 a5 3f 23 f4 8e fd 9b | bd 5e f8 86 fe e9 d6 03 94 fe b5 73 a0 97 a8 36 | f8 6d 97 05 65 b5 9b 5b a3 4c 3e 56 89 a0 18 c6 | 54 22 3c 22 df 8c 9f 6b 24 e7 85 e4 91 73 3e dd | 3a 3d 86 ec 02 50 a4 d4 9b 1e ca d9 b8 85 33 11 | 56 6c a0 81 f5 30 19 45 f3 7e 2d d0 fe 89 3f 3f | 64 51 16 e1 24 be 5d 31 7c b3 98 ff 06 a6 e7 a9 | 85 09 74 83 46 27 19 d4 40 fc 28 57 e7 6b be 01 | 31 d5 96 a2 39 76 f1 7c 9a 2f 1e 01 ba e4 af 67 | 29 00 00 24 66 62 42 f7 ff d9 33 d8 69 d9 c8 18 | 14 3e 2e de dd 0a 0a 0c a5 a3 31 2b 3b 0a 7e 9b | 7e 11 99 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 54 03 6e e6 e0 19 5c f9 e0 4b 25 | 45 a9 f7 08 e7 02 7d 4a 00 00 00 1c 00 00 40 05 | 8b cf 33 fc 59 1a 80 29 98 08 22 36 83 94 58 20 | 7d d0 3f 09 | libevent_free: release ptr-libevent@0x7fb344069ec0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37801d970 | #662 spent 0.0637 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #662 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374023ce0 | handling event EVENT_RETRANSMIT for parent state #561 | start processing: state #561 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #561 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #561 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #561 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.722221; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.431195 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37801d970 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #561 | libevent_malloc: new ptr-libevent@0x7fb344069ec0 size 128 "road-eastnet-nonat-90" #561: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #561) | e6 ce b9 a0 0a 53 1e 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 46 f6 a4 7c 90 e0 c9 d2 85 20 8f b5 1d b7 c4 | f8 f3 b0 78 b0 d2 51 66 8d 4a d8 59 6d 49 84 64 | 71 ab fb f5 bc b5 f0 e8 d0 77 d4 03 41 0e 1e 4a | d9 b5 75 25 c4 92 0a 2d 74 4a 0c 20 47 6f 34 56 | 44 56 ce da b3 ab 68 a5 91 66 d6 77 00 6b 23 58 | fc e6 d4 0e 5a 52 c1 f1 b5 a0 ad 99 57 15 c5 c2 | d9 2b c3 74 d2 ab 4d 6c 38 2b a8 54 f1 10 ea 73 | f7 f3 1a 1a 0b 20 27 ed ef 90 9d 0b e4 63 64 46 | f5 cd 8e 24 f9 d7 d2 7f 96 cc 6d 0d 85 5e 94 0f | a9 4e 5e ec c5 1b 6b ba 38 a5 5a dc af bc 4a 97 | 01 2b d3 7d e0 00 45 8b 2a 4c 3a 26 e1 bd 65 ba | 43 5f a9 bd 57 50 f2 28 5b 00 4d 82 f3 42 f1 e0 | 6d 90 d6 4d 3a f9 fb 23 4e 48 bf 3a cc 34 f4 a3 | 43 3c 8d ad f0 9a db e2 a8 69 3f f5 2a 3e f3 dc | 27 48 23 01 97 ea 7c bc 0d a2 a2 b0 86 ec 2e 00 | 77 3a 8c 7d fc a5 d4 fd 81 85 16 b0 ff 6b 0e b5 | 29 00 00 24 c5 97 1a 8b 29 e3 3d 7a 27 0d 40 2f | 83 32 ae 98 8d 84 ac e2 dc ec 7a 49 5f 8b 56 23 | eb 72 f0 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 04 bc 5d f6 1e a1 6a 54 c3 1f 21 fe | 90 fc 7d b7 bf 9c 0e ab 00 00 00 1c 00 00 40 05 | a1 82 14 e7 88 f7 7d ff e6 10 b0 c3 6f d3 95 fd | 16 ba 74 48 | libevent_free: release ptr-libevent@0x7fb3840581d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374023ce0 | #561 spent 0.0647 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #561 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3840489a0 | handling event EVENT_RETRANSMIT for parent state #581 | start processing: state #581 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #581 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #581 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #581 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.722293; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.434769 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374023ce0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #581 | libevent_malloc: new ptr-libevent@0x7fb3840581d0 size 128 "road-eastnet-nonat-121" #581: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #581) | 32 81 f4 dc 89 2b 8b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 5d a0 37 46 04 87 9a b6 6f c7 58 5f 83 03 92 | 02 7c 2a 9d f7 53 2a e5 0b 99 84 74 ec e8 cd 8a | 37 bf 28 7a 29 fe a1 eb 1c 5b 7a cb 37 de ef 1a | bf c2 4e 23 55 33 da a9 f6 17 3d 8b f1 6d 00 2f | 62 ea 42 d9 b5 b8 8f 47 c3 23 ad 53 eb 4c 74 2c | e9 34 fd a5 c8 bb c5 80 14 80 c7 0b 8c 50 e2 47 | de 21 2d f2 8b b1 5c b6 9a 5d 04 45 b3 11 7d ef | e1 83 dd 1e ba b6 e0 ad d4 d2 d2 08 bd 90 e1 fa | 94 b8 05 91 5f a8 5e a5 f9 fa e3 25 cd 10 cd 73 | 6c 38 de b0 68 38 4f 9e 42 60 5f 63 68 b8 84 1d | 1e 04 f9 aa 37 d8 83 d0 d4 62 ad f8 03 24 51 28 | 44 a0 bd 38 97 06 60 9d 53 0d 2c c3 79 30 58 3d | 74 fe 30 eb c7 d9 28 61 30 6d 56 9a 52 da 0d 3c | ba a5 64 a7 7b ba f6 9f 41 d6 92 6f c0 bb 6e 63 | 61 ab be e9 7e 12 35 ed 54 b5 c8 d2 0e 78 a4 08 | 61 fb 98 ae 3e a3 b4 05 6b 0c e2 c6 c7 c1 c9 60 | 29 00 00 24 d1 95 dc 3f 02 70 5b 6c 62 02 ec 87 | 81 84 54 7b ca 76 e8 0d a8 e7 c8 f2 57 8a a9 b7 | 73 9c 0c 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 ca 9f f5 7d 53 45 e4 91 b2 47 fd | fe fb 46 b0 89 4e d8 b4 00 00 00 1c 00 00 40 05 | a0 2f bb 08 8b 1a a2 cf 99 1d b1 55 9c d9 bf a8 | b6 d2 07 0a | libevent_free: release ptr-libevent@0x7fb3440596f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840489a0 | #581 spent 0.0648 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #581 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb364012790 | handling event EVENT_RETRANSMIT for parent state #580 | start processing: state #580 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #580 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #580 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #580 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.722366; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.433131 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840489a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #580 | libevent_malloc: new ptr-libevent@0x7fb3440596f0 size 128 "road-eastnet-nonat-115" #580: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #580) | ce a6 92 c0 a0 a1 1c a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 62 9c b2 99 63 23 d1 93 84 f8 c6 bc 03 8c f1 | 28 b3 ce e8 48 6d fc d0 0e a9 c2 9d 2d 9a 2c cd | 1f f0 93 df e5 a9 05 5b c8 c1 47 b3 5a 1c 0b cd | a2 95 bb 74 ae 94 51 dd 06 80 d5 6e c5 83 35 38 | f8 09 61 ae fb b8 3a ff 4b 57 1e 08 3c 1d 4a 21 | e7 43 37 6b 51 c8 a6 a8 1a c1 22 59 61 5e 5f 2f | b6 c5 96 ba 63 14 e1 d9 b7 d4 58 9e 9f e1 5d 87 | bd 9a bc 7a ff 27 dd 04 5e f7 15 28 0e 6d 1f 5c | 93 06 0d ed bd 1d 59 e2 0a 80 53 4c ef 63 50 ee | 1f 2d d9 4a 72 41 2a 22 6c b9 de 8d a4 62 87 63 | 24 a5 6a 1b a0 db 72 f2 81 6b 35 f5 c1 ba d7 29 | dd 15 a9 4a de e2 81 ba 33 50 3e e7 72 50 bf 75 | 5d 53 37 19 5e 9d 67 46 30 0c 5e cc a6 e8 91 01 | 51 ac c8 25 28 9a 12 77 ef 59 9c 00 f4 9a 34 3b | 2c 2f b6 d1 1c 53 57 48 b5 6f 80 17 ae 76 96 dd | ad 17 fc cb 17 9f 6e 5a be f9 98 d3 e5 2d d6 4a | 29 00 00 24 82 b4 09 66 1c 6d c4 04 c2 08 d9 05 | f9 60 c9 56 60 53 ce b0 69 de c0 ee bf 68 05 62 | 1b ac 43 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 67 b9 a9 40 de ae b7 bf 06 27 f9 22 | 83 cc d1 c8 91 a6 93 4b 00 00 00 1c 00 00 40 05 | e8 5b fc c4 4f 3c a4 be 53 5f ca 7e 63 49 41 b9 | 5c fd 73 7b | libevent_free: release ptr-libevent@0x7fb36405f230 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364012790 | #580 spent 0.0634 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #580 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36000cc10 | handling event EVENT_RETRANSMIT for parent state #625 | start processing: state #625 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #625 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #625 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #625 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.722438; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.467772 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364012790 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #625 | libevent_malloc: new ptr-libevent@0x7fb36405f230 size 128 "road-eastnet-nonat-28" #625: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #625) | b6 c6 04 15 67 ea 52 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 2a 66 6b 96 87 d8 b6 87 d1 63 4d 22 c0 e8 43 | f1 17 96 ee d2 96 c1 ac af 74 7e 2f c1 03 56 b4 | 91 a7 54 2a 18 43 db 7b c1 dc c3 ab 5f 59 ce 4b | d9 25 40 3c d0 04 72 2a 68 07 37 d1 10 7c 01 e8 | 94 74 57 b7 97 ff 23 78 64 c3 af 87 e5 b7 c6 04 | 38 fa 82 8f 53 ae 4c 38 c7 32 43 6f fa 1b 8b c3 | 00 04 a1 66 ec f1 75 6b d0 65 36 16 d8 20 06 98 | 39 ae 59 43 75 ed d6 5d 3e 27 7d 1f d8 e4 74 3d | 30 32 2a 4c ff 09 92 fe 9f c3 2d aa 84 3b 5f 60 | 20 10 05 43 02 a4 89 ab c2 89 35 0a ee 99 22 a8 | 2c 69 87 17 77 7d f2 12 d8 92 a1 f6 c7 e1 0d d9 | 4d 19 7c c7 c9 40 d2 ce 5a d2 7a 84 a2 e5 a3 72 | 54 d4 31 df 9f 0f c4 a2 d8 0b 60 39 7a b2 4a 8d | 7f a3 22 4d 19 80 0d b1 4f 50 7b 7e 53 1e c7 29 | a7 4e d9 78 77 ad 99 a2 33 30 11 e2 f0 b0 26 5e | 18 8a 8a 03 05 6f 9e 8c db 1a aa 02 79 b7 97 43 | 29 00 00 24 f1 ab 41 0c 34 c5 d2 8d d1 08 09 15 | 25 e7 cb cc 49 7c d8 7c 03 ef 2a 6b eb 41 21 c9 | e5 2d 36 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 7d 5f cd 54 76 9a dd 2a e8 13 0f | d7 0a 04 ba 09 3a b6 b4 00 00 00 1c 00 00 40 05 | 72 40 34 7d e5 09 76 67 7d 7e 83 33 4f f6 4f 75 | 66 18 a7 1f | libevent_free: release ptr-libevent@0x7fb37c06c900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000cc10 | #625 spent 0.0653 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #625 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a3fc10 | handling event EVENT_RETRANSMIT for parent state #532 | start processing: state #532 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #532 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #532 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #532 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.72251; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.440676 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #532 | libevent_malloc: new ptr-libevent@0x7fb37c06c900 size 128 "road-eastnet-nonat-23" #532: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #532) | b2 bb c0 cb 23 86 64 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 33 37 df 77 a4 8e a0 b3 e3 00 cd d4 2d ac fb | 58 54 00 1b 4e b6 44 51 03 9f 3e 46 9f 8f df 83 | c9 7d 11 8c 39 ac 49 56 ab 5f 41 17 92 3f a3 b0 | 7b e1 99 32 00 0e 68 82 bd 92 1f da 3c 9d d6 5e | 1a 09 1d eb 8b bd 63 f3 c7 1c 91 de b6 81 48 d2 | a0 a0 d6 ca 6c 4d a4 58 b2 e4 43 1e 98 6f d3 dc | 45 97 3f 9b f6 f7 45 82 be d0 0f 1c 45 5c 9c 3a | c9 3a 6f 09 cd d2 f4 e8 72 09 bb 9c 48 02 f4 93 | 79 d2 c5 38 6e e0 b7 1e a4 59 ec 3a e6 82 c4 a8 | 46 c4 00 ed 3b 00 2b 60 1c 85 f0 e2 d1 ff 2f 3b | f9 d8 e6 be 72 54 6d 2f ce 69 68 10 dd 93 1f 49 | fd e3 cd 64 0c aa 7b da bb 78 88 4b eb 80 ba c8 | 39 a1 18 86 70 40 67 20 3d 9d ab 72 e5 25 d4 7a | 31 49 e3 a6 76 67 2f aa 74 53 9f 57 5f a1 88 a4 | ed d9 e3 9b 5a 62 f9 e8 ef 24 03 36 4e 35 9e 0d | ce 1c 96 2b 87 5a 84 0b cf 90 a8 01 d2 bb a7 f0 | 29 00 00 24 07 01 44 17 16 f9 66 65 39 42 87 0c | 7f 44 e6 59 85 b5 ac 74 8c 57 ff 68 a2 f9 2d 4f | 6f 8d 12 aa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 d6 21 28 13 22 29 44 67 d8 0e 41 | 43 e4 97 1f 21 5e 2f 85 00 00 00 1c 00 00 40 05 | d5 1f cb 66 19 77 3c 8a 10 7e 62 eb ee 00 e2 86 | a7 15 35 82 | libevent_free: release ptr-libevent@0x7fb37c064680 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3fc10 | #532 spent 0.065 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #532 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab3940 | handling event EVENT_RETRANSMIT for parent state #539 | start processing: state #539 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #539 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #539 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #539 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.722583; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.415921 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3fc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #539 | libevent_malloc: new ptr-libevent@0x7fb37c064680 size 128 "road-eastnet-nonat-14" #539: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #539) | f3 ba fb 39 a0 6d aa 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 bb d0 0a e4 91 67 ed 30 3c 0b a8 5b 47 6e 58 | 54 a6 1f 2c 4e 7f d0 b0 bd e3 fb 18 4b 44 d6 1a | e7 86 6e da c5 94 ab b3 8d 6a 0d 7a e8 8e da 48 | 7f dc 72 ca c7 8b 8f e2 4b c2 09 25 60 11 ac 5f | ec 6f 9d 98 47 5c 60 fe c1 7b f0 93 49 fd ed 12 | b4 19 6a d0 14 ce f0 70 42 3f 04 32 d9 04 2f b2 | ca 5d 42 18 c3 28 44 0e 3f 08 71 5a c8 bd 7b 85 | a2 71 ba 72 c1 49 94 26 a9 aa 95 8a 17 20 47 31 | 6d db 6f 70 0f 42 41 97 8e fc 16 21 2d b2 dd 9c | 7c e3 bd 45 5f 99 25 ca 3b 09 1b ee c5 5d c9 18 | 96 1d d7 d1 61 c8 0b 67 e4 93 1e ef 62 98 f5 94 | 75 89 49 0d 58 ec c4 e6 07 56 cd e4 b6 53 c7 69 | e1 47 2c d5 f5 45 3c 00 11 d4 1f 84 61 b8 f1 04 | fb 90 dc 8a 6c 66 1c a2 30 6a 74 1f ab 66 b1 84 | d7 b4 5a ef a0 9a f2 72 32 b7 05 ac 32 be 29 ab | f5 fd d0 b4 26 2e 08 9b f4 e6 30 ae a7 38 30 21 | 29 00 00 24 51 ce ef f2 75 41 8b 68 df 93 8c 40 | d9 7b 58 fd 3b 35 84 b8 48 7a 28 13 ee d4 9f 84 | 78 f2 6c e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 be bb 4b fb 68 df d5 84 df 76 9e | 60 25 a9 1c de 34 76 1d 00 00 00 1c 00 00 40 05 | 90 f0 a5 6e 28 7a dc 53 c0 ae 7c b6 a4 4c 57 62 | 61 16 fb b6 | libevent_free: release ptr-libevent@0x7fb35c05c110 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3940 | #539 spent 0.0648 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #539 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b25cc0 | handling event EVENT_RETRANSMIT for parent state #655 | start processing: state #655 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #655 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #655 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #655 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.722655; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.468891 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3940 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #655 | libevent_malloc: new ptr-libevent@0x7fb35c05c110 size 128 "road-eastnet-nonat-178" #655: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #655) | 11 f9 62 21 99 31 60 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d2 f2 c8 14 dd 6e 4a d9 42 c0 c4 4a f0 e7 cc ef | e7 5d 2e b6 49 23 3e e0 de 3b f5 ff 2f 66 a3 ff | d2 2b e0 79 ae 88 e7 91 da fb 2a 14 ef d3 ed 02 | fc 9d ab 8d 00 09 6b 86 12 46 d7 1a 25 33 8b 76 | 10 a0 b9 ab 87 66 c2 67 94 c5 19 d4 99 8a 3a a4 | e0 e5 fb 75 02 61 f9 b6 e5 03 ae 93 bc 63 08 03 | 23 87 dd 87 f1 99 04 c1 65 24 a2 b2 0d 42 f1 58 | 8f 80 2d d4 5b 45 fc 67 e3 e3 b4 96 3f 0d 08 58 | e8 5d 60 1c d9 ae 33 24 88 cd 2b c2 77 69 a9 2e | fc 24 c9 ae ae 48 af 44 27 bb a4 49 3a fe fd 12 | bf 17 d1 44 1a 6b 13 72 74 3a 58 25 69 e0 e0 38 | 37 70 99 09 b2 2d 6f 7e 81 73 3d d1 da fb 1c 86 | 50 79 92 bc 8e 3e 67 d4 3a 50 80 1c fe c2 a2 85 | 0d fc 0f 2c 8a 52 82 a7 dc bc 81 8b 7e a0 58 ba | 52 a1 bb d1 15 13 4d f3 ec 8b 68 65 4f 19 d6 4e | b1 55 17 76 9d 5c 64 09 58 93 15 e2 e9 b9 1a c8 | 29 00 00 24 64 6a 25 12 77 44 cd 38 c7 a9 25 d3 | 2b d2 f7 f1 74 31 8d bf 24 ab 69 dc 68 25 0e a3 | 82 ae d1 ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d aa d6 22 51 86 a0 91 29 6a b4 b9 | a5 b0 03 8a 19 a3 96 50 00 00 00 1c 00 00 40 05 | b7 fb 94 0f 85 81 96 f9 c7 ad ab b4 d9 f2 a7 73 | 54 2b d4 8b | libevent_free: release ptr-libevent@0x7fb37406f8f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25cc0 | #655 spent 0.064 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #655 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c025210 | handling event EVENT_RETRANSMIT for parent state #533 | start processing: state #533 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #533 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #533 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #533 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.722727; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.417 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25cc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #533 | libevent_malloc: new ptr-libevent@0x7fb37406f8f0 size 128 "road-eastnet-nonat-12" #533: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #533) | f6 ef 1a 2f f5 b4 93 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da a1 df df ca 4b 3c 26 52 53 bf 5e dc 26 41 90 | d1 df 23 21 a9 59 bf d6 ae 81 71 a0 81 4c 53 03 | 11 33 1a 4b b7 ab 53 01 6d 0e cc 7b 75 21 4e 97 | 25 1d 96 f6 6e 9e 8f 9d ff 1d 95 15 28 e4 03 98 | 5c 1e 2c f1 4b 5f c6 3a d5 37 62 da 61 45 46 b3 | cc 9d 86 7a d3 76 26 6f 3b f0 79 d8 87 45 9d b6 | 0b 54 6c d3 f6 87 87 b3 0e 07 df 90 fc 79 cd b8 | 24 00 5c 5b 99 aa f0 58 32 9c f1 f5 6b 32 0d 58 | f3 21 64 b4 72 d0 94 c8 05 ed d0 c6 3c b0 26 e1 | f7 cf eb a0 25 a3 19 2f 51 79 e3 59 1e 5a 51 9a | 3e 2a 58 04 1f d3 70 6b 24 34 43 84 0f 4b 98 43 | 23 8c c9 a8 bb f3 ad 2f b5 87 c1 54 1c f5 13 a0 | 38 03 e5 fc 8b 2f cc 40 23 79 b0 d3 84 0d e1 a0 | ea 45 1c 78 35 7d 50 eb b7 64 69 09 33 29 c1 68 | b1 bf 88 e9 f3 00 6b e6 58 a7 19 e9 1b b5 e5 43 | 74 e7 8d 22 51 ab 73 75 e3 5d e8 92 a5 fc f5 56 | 29 00 00 24 51 9c ee 13 ee c2 09 ff 20 a1 f7 f3 | 1a ce 85 4f 59 c3 37 7c 50 6b 1c 56 90 01 a1 b8 | e5 91 ca c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd ca 1b b3 75 23 bb 76 92 45 1b 72 | a0 fb dd 8a c0 43 64 68 00 00 00 1c 00 00 40 05 | c3 3f 99 f7 37 13 13 a6 f3 67 55 d5 33 83 4f 3f | 53 00 18 49 | libevent_free: release ptr-libevent@0x7fb37c051490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c025210 | #533 spent 0.068 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #533 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #637 | start processing: state #637 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #637 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #637 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #637 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.722813; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.454901 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c025210 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #637 | libevent_malloc: new ptr-libevent@0x7fb37c051490 size 128 "road-eastnet-nonat-137" #637: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #637) | b6 9c 40 58 3d 0c 12 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 62 01 a3 0e 36 d8 5c 24 b9 7d 93 50 74 52 09 | bf 73 ee 31 ce 48 4d c3 8c 6c 36 26 89 6d a2 98 | f6 a5 6f 3e af a0 f7 15 c5 cf 68 f4 0f 09 28 32 | 0f 5d 04 46 85 53 2e d9 db 2b a2 c2 d9 bf e4 c3 | 50 e3 bc 2c 35 2c e0 d8 71 5e ca 0f 65 92 6f 5f | d6 4c 31 d5 82 00 7d 21 65 65 2e f9 16 0f 60 4a | 66 fa 76 ba 56 18 68 1b b7 8d e5 ca ec fc bd ec | 0a e5 6a b2 41 42 5c a8 2b 3f 1c 15 fb b5 ec c8 | f5 63 de 1c 0d a4 25 56 3a 26 7c fa 02 42 4d b8 | 43 57 db 48 7f 12 2c 70 ca ba 72 7c fe 19 b1 54 | 6b 79 43 ef 00 c1 62 d3 5e ab b6 22 36 80 35 4b | e7 1d 17 2b 6d 8a de bd 50 b8 31 a5 18 f8 e0 24 | 82 85 b3 30 83 33 ec 95 4e ee a1 d7 bf ce 99 9b | c1 6d 33 8b 97 b6 2c 02 a3 d9 39 e4 c5 54 2f 6f | 47 4b a7 bf 34 12 36 ee 4b b2 e8 c4 39 ce c1 32 | 67 23 86 ac 3a c8 0f 88 60 19 2a 2c 68 03 df 9c | 29 00 00 24 37 6b dd e4 0f e2 02 60 45 48 4f 1a | ac d9 95 dc 00 d0 72 b3 54 00 91 51 8b 27 ba 45 | 47 72 d2 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 cf fd fc b2 a7 19 97 63 6c a1 8c | 7a b3 9e 5b 69 33 a4 bb 00 00 00 1c 00 00 40 05 | f0 08 d3 f7 e9 21 31 a2 9d a6 8a 6a ad 66 64 4b | fa 92 42 76 | libevent_free: release ptr-libevent@0x7fb35c09b2a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #637 spent 0.0996 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #637 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c00d120 | handling event EVENT_RETRANSMIT for parent state #572 | start processing: state #572 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #572 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #572 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #572 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.722929; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.43584 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #572 | libevent_malloc: new ptr-libevent@0x7fb35c09b2a0 size 128 "road-eastnet-nonat-13" #572: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #572) | ae 6d 7f 89 27 62 b0 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 78 66 53 84 1a a1 cc 77 c2 d3 46 14 49 c7 a7 | f9 f4 42 bd ed cc 70 a1 f5 f8 c4 d7 3c 91 88 2a | 3d 9e 83 b6 af 23 02 04 fc 58 e6 76 b8 bc 6f 3d | e3 a8 79 73 32 9c d8 64 d1 bd 4e cb 31 26 96 5f | f4 96 4f ff 80 84 2b 76 9a 2c 0b 78 4d c7 a7 39 | 8c 0b 43 fe 1a ab fb f6 42 71 6f af b4 37 f9 74 | 81 28 44 35 64 2e 59 d7 a3 88 97 bd 34 c6 2c 7c | c1 ef 65 e7 0b bd 37 30 3c ee f2 66 0b 28 7a 27 | 2a ba 30 fb a3 66 78 77 e9 23 14 b0 c0 ac 30 27 | a6 66 34 a1 40 07 ec e7 54 c0 52 99 c7 6b 37 d0 | a0 9a 5a 1f ce 21 9c 3f f8 06 85 27 6f 23 30 ad | 02 4c 8b 40 ed 46 68 4b c8 97 b7 56 b3 69 62 99 | d5 40 a8 dc 62 f6 2f 3e 9e b7 88 dc a5 86 5a 54 | ff 1b 85 38 b9 ed bc 18 95 1a ff e6 a7 39 0a 2e | e7 55 17 cd d1 2c e0 f8 49 15 7d b6 bb e0 3f af | a2 17 66 7c 8f 3c 67 d1 87 3d 7f be bb d3 05 fb | 29 00 00 24 7a 95 97 28 24 e4 3f 20 6f 1b b0 b9 | 00 dc 1a 54 3f 6c d8 cc cd 76 a4 2a 0f 96 20 2d | fe a2 65 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 6e 36 01 db 56 da c9 c9 f6 21 e0 | 9e 8d 5d b9 d9 f9 82 a2 00 00 00 1c 00 00 40 05 | dc 5e 49 c6 b4 b7 74 61 6f 59 0d 14 88 e4 ba 50 | 0e 62 7e 46 | libevent_free: release ptr-libevent@0x7fb36401f4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c00d120 | #572 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #572 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38800f8f0 | handling event EVENT_RETRANSMIT for parent state #595 | start processing: state #595 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #595 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #595 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #595 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.723053; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.465357 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #595 | libevent_malloc: new ptr-libevent@0x7fb36401f4e0 size 128 "road-eastnet-nonat-69" #595: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #595) | 66 ab aa e9 c0 1d b7 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 88 48 07 d2 42 4a 84 d5 c0 a3 1c d8 61 7a 51 | c0 04 1f 03 a6 14 4a 32 5e 37 8c 55 58 7b 77 2c | fb 55 e5 4e 6e 7e 47 ee 34 35 95 55 b7 b4 f8 60 | 9b a6 0e e2 75 cb 31 e2 b7 b1 0c c7 21 34 4e 50 | 7e 01 12 0e a8 09 e6 15 2f b7 95 a1 e4 49 25 11 | ac 79 61 4c de 52 7d 92 78 d2 3a 93 7f 39 9e ea | 46 19 3b 55 df f1 20 bc 73 20 02 d2 83 5b c5 c6 | 0b 63 b0 e9 03 aa 59 7f c4 15 87 10 2c 75 31 89 | e4 a2 a3 eb 70 c0 6a 70 01 fd e2 c8 7f d0 49 6d | 0b 69 e6 19 f8 ef ed 1c b2 75 a1 ef be b8 a0 04 | 19 f6 c9 5b af 6f 00 73 b8 d5 c5 23 40 6a a8 85 | 63 89 e6 04 8d b9 58 50 ce 42 06 0d 04 dd f1 d0 | b1 74 e0 f6 e2 3c fc e3 28 f1 bf eb 46 d0 6e a8 | a2 18 6d cf 33 6c 77 01 6e 12 a3 df 95 47 d2 df | 9f e9 63 f7 ac ac 70 17 4e 2f 38 fa dc cb 8c 97 | 70 a7 26 56 6a e9 c8 f7 90 d3 4d cd 2d 8d 00 8f | 29 00 00 24 94 2f 5e 13 28 37 ce fc 76 9e ef e3 | 9f a7 fb e4 ea 24 27 bd c2 06 13 48 b6 99 58 8b | d4 82 fe 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 79 3a 6c aa 9d cd 78 ee ff 71 61 | 9e c1 38 f2 06 7e 22 47 00 00 00 1c 00 00 40 05 | 1a 47 95 0a 50 1d 20 46 3c 7c f6 eb 28 2d 43 03 | 7b 00 02 4e | libevent_free: release ptr-libevent@0x7fb360067120 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800f8f0 | #595 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #595 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350012bf0 | handling event EVENT_RETRANSMIT for parent state #574 | start processing: state #574 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #574 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #574 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #574 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.723171; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.434318 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800f8f0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #574 | libevent_malloc: new ptr-libevent@0x7fb360067120 size 128 "road-eastnet-nonat-119" #574: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #574) | e2 ef 8b 16 3f e6 8d 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 80 9b ac b3 38 49 75 b6 22 00 a0 9d 93 a6 e9 | 11 43 29 2d 62 04 9b 9a b1 ba de 84 81 0e e7 1d | cd ff 5c 76 64 ba 18 74 a3 4a 09 63 04 00 26 2a | bf 09 0f 54 5c ff e2 c1 45 f0 c2 f6 3f 0a 9c da | 51 50 31 ad 31 4a 14 11 d3 2e c7 7d 83 22 2d bd | 53 08 74 70 d6 57 21 06 d4 a1 0f c1 e6 a4 84 5e | 1d b6 57 8b 0b 80 4b 3c 9f f1 e4 bd 75 2f d5 2d | 21 3a cd 7a 13 59 f2 16 f8 77 82 03 06 0a 42 83 | 17 94 64 c4 be 42 b3 21 8f d9 97 d0 cf eb 0f 6b | 23 03 9f ee 85 9d 07 b2 6b 9f c9 a7 2a 0b 97 54 | 4a 3f d3 58 4a 03 9e d1 76 61 53 9c 9d 3c 44 d8 | 20 2a f5 24 51 56 2a d6 31 c3 13 a3 58 26 1e 56 | bd 02 c3 74 00 2d 43 63 8c 32 86 92 e8 ff 86 7d | 59 2f b3 f9 c6 38 10 32 ef ef 33 bb 6d f1 d0 70 | 62 b4 df 27 80 5f fc 95 13 80 c9 0c ec fb e1 f5 | c1 58 36 dc de 1d 19 2a ba 67 9f d5 f2 bc 5b d5 | 29 00 00 24 4a 9c 36 dc 2a e9 b0 d6 4b b7 1c 33 | 3b c4 06 c1 a7 f4 11 82 75 7b bf 05 3c 37 b2 a8 | 50 3d 47 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a d4 1c 5f fa 34 64 8a 6c 74 11 d9 | dc 03 c5 f2 8c e5 1d 48 00 00 00 1c 00 00 40 05 | 47 f1 9d c3 97 23 03 bd 9f fd 5c 86 a1 b5 d4 44 | 63 f3 1c 6a | libevent_free: release ptr-libevent@0x7fb38405d9b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350012bf0 | #574 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #574 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #512 | start processing: state #512 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #512 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #512 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #512 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.723293; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.419899 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #512 | libevent_malloc: new ptr-libevent@0x7fb38405d9b0 size 128 "road-eastnet-nonat-140" #512: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #512) | 9c 1d 79 9c 4b 40 5f 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f e6 a4 db c4 02 2d 52 88 50 3f dc 30 82 ed 9f | 63 88 9c b5 3c c8 66 4a 37 be a1 3d aa fa fb 17 | f9 ac dd ad 9d 5b 20 51 15 fc d2 29 14 d4 2a 6d | f3 a0 8d 98 f8 da e0 12 75 4e bd 68 90 36 03 88 | 88 b8 f3 20 51 1f f0 57 2a c6 b0 97 a0 49 9c b7 | ad 6c f2 a7 06 f7 6a dd f3 22 78 ce 59 21 29 6a | 08 15 d7 74 fd 98 b0 83 c8 be 7d 16 eb bf fb 2e | e9 27 0a 5a 6e be 90 e4 cb 6a 36 aa 24 29 be 9c | ae dd 38 28 10 ed cb 2a 6e a7 2a ab b2 c3 1a ee | 88 bd 15 d3 67 e2 06 8e b6 97 80 a6 e7 00 87 5b | b8 76 fe 7c 8d d3 5e fd 05 4c 7a d6 96 d1 0a 11 | 2d a5 69 d7 c3 12 66 ec 98 02 9e 42 c9 77 fa 4f | 17 0c c6 fb 54 4a 9c 65 b5 be 12 f3 a2 73 e2 09 | a7 ee 4c 4f 97 4d 4f 10 71 3e 60 12 75 6e d2 f3 | dc 13 51 ee 44 b1 77 ed 2b d8 92 98 96 69 e5 ef | 91 3c 2e 84 e4 bb af 77 49 ac 6e 66 e2 85 88 c8 | 29 00 00 24 44 d4 21 93 f2 35 cf a0 d5 a8 8f 1c | f3 e0 06 82 de 41 7f 55 b8 ed f7 b1 6c 3f 58 31 | c1 b0 fc 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 3d ba 6e 50 5c 1f f0 71 43 e4 e1 | 93 99 c6 4c 68 18 ff 24 00 00 00 1c 00 00 40 05 | 1e ed 5b 7e 6f 31 a0 f1 10 d5 48 eb 40 5a a7 bd | a4 a8 9e e1 | libevent_free: release ptr-libevent@0x7fb3800540c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | #512 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #512 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a1da10 | handling event EVENT_RETRANSMIT for parent state #598 | start processing: state #598 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #598 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #598 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #598 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.723414; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.444936 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #598 | libevent_malloc: new ptr-libevent@0x7fb3800540c0 size 128 "road-eastnet-nonat-89" #598: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #598) | c9 b5 3a 18 c3 59 d6 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c 21 c1 2e ba 75 c9 09 d5 c3 93 96 ab d0 78 6e | 7c 4e b4 21 7a 51 1d c0 17 80 c7 93 28 da 63 f4 | fd 05 0b e2 9e 56 d9 c9 20 88 91 c7 be c0 26 c6 | 69 60 dd eb 14 83 d1 89 6a 59 8a ef 06 c9 04 3e | d0 46 01 39 27 93 50 40 25 0c 45 25 36 0a 1f bd | de f1 21 bc de b9 08 3b f9 ba 42 b3 96 c0 60 b4 | 0d 0e 0c 07 28 8c 6f 6a 38 91 1d 88 1e 7b 03 94 | e4 fb d6 05 18 52 1a aa e1 e4 5e 96 ad 66 1d 62 | b0 d0 05 07 c5 30 11 d1 7f 95 2b b4 ff 32 13 e4 | e5 17 5e 41 18 f4 6d c8 fe 66 3f 13 56 7b 86 54 | 90 58 c3 20 c7 1a 0c 72 2e b7 70 1d d3 00 7a ae | 58 86 4c b8 01 f6 3c 05 9b 47 1a dc a2 b7 00 ef | 31 66 ce 4a 0b 4e 88 92 b4 d0 aa ce d7 48 74 fd | 97 17 1b be 8b 31 c9 92 66 31 9f b3 84 ef 27 5e | 21 dc b5 10 f8 ce 45 64 07 5f 53 8c e7 9a 08 0a | 21 62 59 5e b9 02 31 e8 fd 60 6f 2f e1 86 b6 ee | 29 00 00 24 48 f3 f3 5d 08 a4 f0 63 dc c0 92 c6 | 3d c9 7a 45 24 bf 25 2a 08 df 59 2f bd 93 33 07 | 05 c3 f3 24 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 93 64 b0 1e e6 88 50 1f 76 35 f4 | b7 15 8a d3 2c 18 77 4c 00 00 00 1c 00 00 40 05 | 3a 14 09 59 cd d3 06 ad 37 c8 d5 8f dd 06 36 68 | 88 b8 08 59 | libevent_free: release ptr-libevent@0x7fb35805f320 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1da10 | #598 spent 0.084 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #598 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358023aa0 | handling event EVENT_RETRANSMIT for parent state #552 | start processing: state #552 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #552 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #552 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #552 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.723501; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.423339 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1da10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #552 | libevent_malloc: new ptr-libevent@0x7fb35805f320 size 128 "road-eastnet-nonat-10" #552: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #552) | ed eb 93 f8 7e 60 de d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b cb f1 c5 c9 33 2a 34 0e d1 85 1e 48 7b 2b 08 | 83 b8 ce 5c a9 55 37 f8 cf f4 8e c5 bc 03 8b a4 | ae 96 a2 99 0b 56 12 df 0f 7d da 8a 34 b4 5f 83 | 09 a9 33 3c c6 3d 79 dc c7 d3 2a 27 cf 87 82 2e | be 41 d5 b9 12 08 ab ba 5d cd 0f e9 8e 49 e8 11 | 80 d1 8e 63 8f 28 10 90 ba d3 f9 e8 1d 55 c1 f8 | e8 37 30 e5 eb 01 66 f8 b8 97 81 22 9f a7 c1 69 | d5 16 ee ab b5 f8 e1 be 84 8c fb 01 eb e4 87 59 | 7d 75 49 01 0a 1b 9e a9 46 55 ad d1 ba 32 2e a9 | 77 b7 a4 2c bc 42 01 fe 0e fb fb fb bb eb a9 a8 | 3e f3 4b e2 8b f1 54 95 68 4b 2a 95 25 78 7a 77 | 00 70 42 dc fd 53 48 e3 79 e3 2b ca 77 e5 77 0d | e6 9d ff 3e f8 da 34 38 ce 09 d2 79 7e 81 3b 25 | 2d 6c d8 d3 b0 67 79 e6 62 d7 c5 cd a3 5d 0d a2 | eb 67 42 ca ca d0 84 ca 28 62 c9 94 e7 3b 42 83 | 2a 29 90 2e 9c bd e7 c5 5a db e4 f9 d0 a5 4d f5 | 29 00 00 24 e9 97 93 9c 1c ef 16 73 1b 7a 47 b3 | b5 28 72 23 b0 2e 07 f1 0f 02 16 b9 14 bf 9e a1 | f9 3f 2a 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 4f 42 bf 1d 63 d2 01 e4 5f 1c 60 | a2 c9 01 6c df cd 78 4f 00 00 00 1c 00 00 40 05 | d8 d7 5c 38 cf 5f 73 a5 21 81 fd 7c d5 fb 18 da | 9b e7 4c d5 | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358023aa0 | #552 spent 0.0663 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #552 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b246c0 | handling event EVENT_RETRANSMIT for parent state #587 | start processing: state #587 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #587 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #587 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #587 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.723574; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.440255 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358023aa0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #587 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-113" #587: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #587) | c3 7c 98 3d b4 74 ab 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 ba c9 c0 d8 66 df e8 7c 54 40 82 4e 21 c1 07 | 59 68 7f 81 34 b6 35 92 5b 89 98 f6 ad 25 86 e5 | 73 8a 9a f2 4c 57 89 56 da a5 ff d6 a3 7f af f1 | f1 2e fb c5 11 47 ee a1 95 f5 26 dc 9e 47 06 cd | 34 b9 65 37 bd e1 04 27 c9 ff dc bf 67 78 96 38 | 52 9d 88 a0 32 73 3c 23 28 64 dd 93 b3 78 9e 2c | f9 cb d6 a4 86 ba f5 1b 60 c2 ad a2 9f 3e 81 a2 | f3 45 de 44 3d 28 04 c3 a1 6e 40 b1 4f 46 45 df | 5a 2a 79 6c 8f ae b8 30 ef c6 4a 6c 44 7a 01 b2 | 1a d8 98 92 1c 93 3e 73 34 b7 46 f8 42 08 19 36 | ba 97 66 22 2c 03 8b f7 14 9b 23 5b 0b 56 49 a9 | f1 9f 4c c1 da 59 b2 4c 96 91 d8 04 27 b3 bc 68 | 94 52 76 73 62 13 56 15 d9 2e 51 2c 30 ed a9 15 | 37 ab 85 06 28 93 eb f4 10 09 a8 e7 65 60 d0 d8 | c4 01 fb af 1e 97 f6 a3 48 1a 1f f9 86 1a 3d 6b | 8c be 9b 4f 2f 82 4e 29 1d 28 1f 1e 06 cf 26 25 | 29 00 00 24 23 67 1d fb 57 60 2a aa d9 1f a4 c1 | 63 ac 06 a0 22 92 47 d7 31 b6 6b 26 2a 2d 93 db | 2d dc c7 6b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 84 7e f9 13 29 fa bb ae 5d 14 1d | 96 1e a3 25 f7 97 44 66 00 00 00 1c 00 00 40 05 | 4c 51 eb 1f 58 50 45 24 34 60 90 38 ee 81 d2 d9 | 53 4c 38 07 | libevent_free: release ptr-libevent@0x7fb3700597c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b246c0 | #587 spent 0.065 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #587 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368017ea0 | handling event EVENT_RETRANSMIT for parent state #535 | start processing: state #535 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #535 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #535 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #535 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.723646; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.421702 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b246c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #535 | libevent_malloc: new ptr-libevent@0x7fb3700597c0 size 128 "road-eastnet-nonat-19" #535: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #535) | d5 3d 4d d1 1d 8f ff ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd a8 30 7d fa 09 0e 91 b2 9d 3d 19 f4 ee 14 55 | 74 eb 7d 16 30 9b 64 08 bd 51 c6 0d 08 b3 39 3b | d5 c5 d3 d3 a6 f2 f8 14 c2 6f d7 95 59 0a fe e3 | bb a9 65 de c8 14 9e f5 05 83 26 75 c6 4c 05 34 | b4 a0 d6 d8 84 8c 16 46 27 7f f1 b6 a1 52 54 4b | 1a e2 b8 4d 24 eb ac 25 a2 41 76 22 20 0c f4 96 | 27 28 ef 3a 94 b6 4e c6 21 31 ca 90 2d 01 ac 3c | d9 6f 71 29 9d 32 e3 06 10 09 09 3f 08 e0 93 76 | aa 17 e1 ea 49 4d 7c 42 77 05 f9 17 bf ad af 3b | ed b3 91 7e 42 2f 67 a5 df de 4e ff 93 f2 9e 57 | 56 30 c0 46 0a 65 8c 18 8f d0 75 64 b5 32 6c 49 | 39 97 ce e9 7b c7 0e af 02 39 df da d5 ef 53 47 | cb a3 4c 02 a0 b2 1e 76 9e 5a 01 81 ed 62 af 75 | 23 20 b9 1a 39 86 e6 f9 03 41 1a d7 4e e7 c4 f5 | 82 a8 7a 1b 8c da 94 0c 14 8e 83 05 ac d2 dc 89 | 48 f7 0b 1d 07 c9 75 9f ab 81 e0 05 15 0e d1 2f | 29 00 00 24 c2 c0 89 96 d0 f7 59 31 53 11 f7 4a | 36 92 ef 7e 38 2b 45 e1 10 42 96 da 05 ff a3 7a | f0 1b 89 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 9e 60 66 94 a7 a4 7a 54 28 cb 5e | bf 06 cf c4 93 18 58 c1 00 00 00 1c 00 00 40 05 | c6 37 76 00 c2 f2 29 53 78 dd a2 4d 2d 0a f6 f9 | 70 42 64 5b | libevent_free: release ptr-libevent@0x7fb37c056bd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368017ea0 | #535 spent 0.0648 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #535 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ae48c0 | handling event EVENT_RETRANSMIT for parent state #636 | start processing: state #636 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #636 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #636 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #636 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.723719; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.458082 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #636 | libevent_malloc: new ptr-libevent@0x7fb37c056bd0 size 128 "road-eastnet-nonat-146" #636: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #636) | ce ed f3 5e ed fa 9c 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 c3 55 ec 4f 5b 4c 21 a7 89 24 6e 2a b9 a9 cb | f8 19 9e a3 b5 df ee 5a 2c 71 bc 32 c1 92 74 f8 | b0 ab 4f 8f e7 f9 3f 29 7a 8c 9f 2f d7 89 ae 25 | 61 ab 3d 60 a3 0e 51 68 4c 02 b2 37 56 25 c1 f8 | bb 4a 51 31 0f 4f 85 cb a5 75 3a af 8e dc cc 87 | a5 bd 11 5b 66 d2 55 75 a4 74 43 78 e6 bd 37 d2 | 03 60 a4 df 8e 0f 50 d9 f0 84 a1 4b 87 50 ad 61 | 89 fd 53 a9 95 2c 82 05 31 04 36 b8 df 85 82 bf | 91 1b 12 8a 8c 72 93 cc 94 19 4b ed 3b c6 73 96 | c9 e4 a9 4f a1 e7 46 f7 b8 64 4d 8b b6 9f c4 71 | db ce 40 02 9e 98 7f 48 f3 9a 88 fa a8 90 63 74 | 87 33 f7 67 a1 6e 37 63 07 fd f7 f2 21 22 b4 ad | 8c e8 70 46 a2 30 3a aa 26 d0 99 b2 70 88 82 11 | e4 b8 46 de e2 85 7c 68 ae a6 76 d5 48 a3 de 62 | 80 b5 a8 b6 cf c8 b8 fb d0 a3 90 c3 74 cb c4 ea | 05 11 15 0d eb a6 bc f1 88 ed c5 82 fd 7e 24 72 | 29 00 00 24 e5 61 c1 f3 64 2d 4c f6 6f 55 99 d2 | 6d 06 b7 7f d0 4c 35 18 0b 4c dc f2 04 b9 cd b4 | d2 a9 94 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 4f 92 a8 39 a0 4f db 00 14 5d 39 | 5e 60 0b f6 04 83 59 50 00 00 00 1c 00 00 40 05 | e2 2e ff 0f c7 2f 00 8a f3 ce c3 f8 79 de 24 f9 | 92 17 31 34 | libevent_free: release ptr-libevent@0x7fb354069fa0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae48c0 | #636 spent 0.0634 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #636 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a5da90 | handling event EVENT_RETRANSMIT for parent state #578 | start processing: state #578 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #578 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #578 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #578 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.72379; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.440014 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae48c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #578 | libevent_malloc: new ptr-libevent@0x7fb354069fa0 size 128 "road-eastnet-nonat-143" #578: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #578) | 68 e2 ee c8 4f 05 0e 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 22 a6 6d d7 fc 8b 0a 14 19 3d f1 fb 0a ed f9 | 6f 90 9e 8a 9f a9 d8 ed d1 df 6a a2 d8 b2 22 2e | b1 59 73 5e b3 ab 9a 31 51 87 54 fd f4 e8 4e 8d | 3f 21 83 6e 35 41 fe 08 72 f5 2d 8d 2a f4 ba e0 | 91 8d f0 a1 05 86 67 4b fb b8 b6 6d 1e 1b 25 24 | 22 78 8b 7f 2f cf 5d 9a f7 63 da 29 5a 14 94 0b | 35 6e 33 f7 ca b2 64 fd 7c 9e 63 2d cf 43 41 22 | 59 51 84 8f fb 27 d9 fa 44 51 1e 67 02 f1 d2 0c | 45 0f 35 78 a9 8f 35 39 ea c6 d9 8d 03 b0 0f 84 | 80 91 04 9f d8 fb ff 28 d3 ab da 21 66 90 1c 59 | 8d 41 8b a6 7f 98 ab 4c b6 53 24 a3 ad 53 6f 51 | 8f f2 b7 4c d3 82 c2 ad 67 89 34 ab a5 77 52 48 | 5e 0b f2 ef f8 d5 a0 42 b1 fe 42 08 88 ca 60 89 | 3b cf 5c bd a3 63 ec 76 02 82 7b 9a f3 6f d7 d6 | dd e6 17 44 06 f8 37 9b 67 a7 db 60 51 b4 ad 18 | 60 cb 7b f0 7e d2 5e 9d 2e 49 2f db ef 23 bd 96 | 29 00 00 24 46 bf ee 27 91 3e be 20 10 cf 9d 0f | e6 4a bd 7e e9 3b fd c7 94 37 e1 c7 cd 2d 4a 64 | 84 e7 2b 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 0f 29 05 fe c1 9c 12 af b5 65 ca | 32 36 33 1d 77 e8 41 70 00 00 00 1c 00 00 40 05 | 4a 88 68 5c be 68 1b 50 17 99 f0 8c 97 cf 78 ef | ec cb 25 c1 | libevent_free: release ptr-libevent@0x7fb37005eff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5da90 | #578 spent 0.0648 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #578 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb380015160 | handling event EVENT_RETRANSMIT for parent state #568 | start processing: state #568 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #568 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #568 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #568 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.723863; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.43864 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5da90 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #568 | libevent_malloc: new ptr-libevent@0x7fb37005eff0 size 128 "road-eastnet-nonat-34" #568: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #568) | 6e 64 73 85 ce f2 b0 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 a3 99 bf 78 b9 d4 1a 84 24 de 04 7c f3 4d c8 | 96 8b 02 59 28 04 a0 26 9f 13 67 64 f7 77 7a 65 | 5c 17 49 3e 43 8b eb 50 14 de 87 67 95 79 66 a4 | ac 29 76 ee dd 7d 07 1f ac 4d a9 5e 2d 67 5f 35 | c1 62 fb c8 15 ae a3 12 9b c1 7e 41 bc 7b ec 39 | 5b 29 5a 0f 5f 02 56 47 d1 33 0b 64 a8 f0 f9 e0 | 79 a9 8c 6d 5d d0 49 7f 45 3b 2b 8e b6 e4 e8 15 | de 83 5e 1a 47 c0 32 44 cb e0 50 bd 65 a0 22 bc | 0b a6 8b 59 f8 c4 16 dc 3f 1f 41 55 d8 a6 4f 00 | f4 0f fd 9e bb a0 ca 89 1c f2 5b 3e b5 1d b0 8a | ed 21 82 3c a3 44 7f 36 e9 37 bc ac c1 e1 00 c4 | 04 65 71 de 20 77 8c bd 4b 28 11 32 5a 14 67 24 | 07 50 c4 30 94 78 de 21 2b 34 e6 c7 52 91 19 f8 | 98 c0 be 08 e1 94 2a 06 f0 4f 8e 0c d1 26 ea 08 | 99 06 ef 43 9b 53 fc e2 1b 86 fb cc 41 b8 4f 56 | b1 9c b0 66 18 e0 a2 81 3f 3a d6 0e 31 c5 b9 d0 | 29 00 00 24 13 36 f4 68 46 c8 45 cb 43 3d ab 7d | 06 e4 d0 2e f6 fd d6 0f 63 23 da 46 eb bc 2f aa | 4d ed 12 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 84 1a 56 ea 9e db cc 8f 31 8a c2 | 65 e8 4d d8 8a 02 34 c8 00 00 00 1c 00 00 40 05 | 74 34 3f f7 0f 8a 4f 83 f5 c9 a4 b3 22 9c 5e 1d | e6 10 1a 44 | libevent_free: release ptr-libevent@0x7fb38006a090 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380015160 | #568 spent 0.0649 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #568 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c03b210 | handling event EVENT_RETRANSMIT for parent state #538 | start processing: state #538 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #538 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #538 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #538 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.723936; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.421023 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380015160 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #538 | libevent_malloc: new ptr-libevent@0x7fb38006a090 size 128 "road-eastnet-nonat-50" #538: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #538) | 7d c2 7d 21 ef 8d 9c cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 92 33 2e 2c bb fa d3 c8 4f 04 33 a3 d9 67 23 | c5 f1 25 5c 53 26 1a cd 8a 43 1a 34 d0 e0 56 a7 | 2c 60 2d 8e 0e dd 90 95 15 0a 6b e5 9a cc ab f1 | 7c bd 19 8d 97 83 43 89 b4 a0 d7 4a db 0b 32 48 | 37 e5 2e a6 a4 51 00 59 4d 06 a6 4f 7e 5a c1 3b | 41 2d 91 05 a9 98 a0 d8 9a e1 37 d4 eb e2 b3 93 | e7 01 b6 51 59 81 49 b7 c7 db bc 77 53 8d ec 96 | aa 77 df f8 25 74 3c 8c 99 15 73 9e 96 a4 29 97 | 67 0e 10 a2 47 f8 b3 64 aa 76 27 48 03 49 0b e8 | 8e 18 c8 17 4a 26 1c af 91 66 f4 48 af e2 d7 d4 | 44 38 3e 28 ac 6b 9e 39 19 3f ae 6e d1 64 ae 00 | 5c 63 81 a7 65 f0 45 ba 8a 0c 4d 79 03 55 a4 7a | 72 cb f1 39 e4 d0 28 d0 3e 02 49 3c 8a 03 29 fa | 32 8b 50 0b ba d4 8f 2b b2 0e bb bd 1c 1c 88 74 | fc 9d 0d ed 49 4b 7d c7 5e c8 b1 dc 66 01 28 d7 | 81 70 ee a0 95 cd 9e 29 51 a2 d1 8a 79 cc 01 2d | 29 00 00 24 0d 80 72 91 5f 6c f2 ee ef b6 16 64 | a0 b5 22 be fd 2c d0 f5 a5 ec b8 1b c0 82 2c aa | f7 2e 69 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 35 66 94 43 28 e7 40 5b c1 a0 78 | 2b ba 2a d8 0e c9 44 ab 00 00 00 1c 00 00 40 05 | 3d 34 49 ee e1 5a 54 f0 2b 50 8b e9 80 0b e1 58 | a7 e3 51 fd | libevent_free: release ptr-libevent@0x7fb36c0542e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c03b210 | #538 spent 0.0634 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #538 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358009690 | handling event EVENT_RETRANSMIT for parent state #575 | start processing: state #575 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #575 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #575 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #575 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.724008; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.438331 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c03b210 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #575 | libevent_malloc: new ptr-libevent@0x7fb36c0542e0 size 128 "road-eastnet-nonat-62" #575: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #575) | b9 99 36 5a 8c c2 79 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 c8 04 79 a7 ca 7e 22 ae 09 07 e5 fc 49 20 ff | d5 2c 7e 22 4c 72 c0 78 1e 2c 5c ec 12 7c 72 d2 | 02 e8 75 7b 4a a7 3c c3 16 5c 13 70 ea 37 54 f9 | 56 e8 d3 91 10 1a 84 a7 6a bd f8 ed 5e e4 34 35 | e4 61 65 f6 21 ef d0 e1 bf 6f 09 fe ff af 3a 45 | 86 75 a8 02 ec e4 0e 75 42 6b 01 d8 b1 76 3d b4 | dd 64 39 8f d4 1d 82 58 1e c2 7c 1b 86 61 97 0b | 7a c0 a1 e4 47 98 4b 18 ef a4 43 98 6c 7e 6d d0 | 16 22 ae c2 a0 b2 46 36 87 d4 91 30 13 3f 9a eb | 8a 99 16 71 39 ce 4d 5e 49 23 27 dd 31 e1 69 d3 | 97 f4 5c 55 69 dc 26 6c 11 fa 11 8a 2a 43 c5 d6 | 25 6f 41 fb 1c 99 a2 b8 45 cd 12 29 39 ba ac a3 | c6 02 a2 8b a0 be b1 46 84 7b 24 9a f3 d6 f9 65 | 1a 69 bd f7 e8 de e9 5a df 78 41 ab f7 29 e1 6b | f7 12 cb 1a 99 80 ee c2 16 60 54 4d f3 eb 93 e7 | 80 78 df 65 e2 d4 7f 1b 6e a6 c2 48 37 dc 57 12 | 29 00 00 24 b8 4f 87 74 9c 80 54 81 1f 37 0b 79 | c0 75 5b ab 09 6f 94 95 e5 f3 52 5f 2d 7b fc 69 | 2d 41 18 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 17 0c 0b ea 42 91 a8 38 34 87 4d | f7 fc 36 4d 5c d3 fc 11 00 00 00 1c 00 00 40 05 | d9 91 bf d5 e3 57 28 b5 8a cc 1f cf ff 34 03 80 | 9c e9 c7 70 | libevent_free: release ptr-libevent@0x7fb358059b60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358009690 | #575 spent 0.0926 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #575 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #606 | start processing: state #606 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #606 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #606 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #606 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.724133; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.462857 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358009690 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #606 | libevent_malloc: new ptr-libevent@0x7fb358059b60 size 128 "road-eastnet-nonat-223" #606: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #606) | 23 c4 ab 3f 0f 4d 11 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 ec 57 8c 95 7b 1b 15 f8 8d ea a4 a3 af fe de | c8 50 9d 01 42 a2 a8 d6 b3 0f ab aa a3 20 6b a8 | 43 36 ac 25 c0 23 8f 9c cd 38 59 18 58 4d 26 27 | 3a c1 0c 20 3d b4 f2 a3 6a 0b 85 ac 0d 0c cb b8 | b2 27 34 92 1e d8 c1 ed 04 88 17 ec 3d f0 78 9d | 19 06 f9 a8 2e 5e 2f 6e 4a 1c 90 db 5f 93 41 e4 | 28 08 f7 7a 45 4e 76 50 c3 e3 6e be cf fb 71 40 | 41 9c c6 87 30 7d 0a d4 8c b5 0f c7 31 32 44 ba | 3a 9b 83 7d 6b 03 e1 c1 68 94 44 99 8a c0 56 cb | 60 44 86 42 73 d4 b2 3a 24 29 f0 d7 e7 c2 92 6f | ca 66 01 13 32 22 64 32 e0 45 28 0f 62 51 89 c6 | 22 97 d2 d2 ee ea 04 89 40 64 4c 95 db fd 1a 35 | 63 e6 0a f3 7f 06 ca e1 8e 13 8f 8e cf e0 ac fd | 6c 90 77 9a 8a 33 7c d0 d9 ee f2 a2 51 90 42 0f | b9 cb 13 5f 29 0a cb 86 1a e6 6a 5f 79 aa a1 f7 | 73 3c 37 36 16 c6 aa 27 ef 60 b2 ed ae a6 69 93 | 29 00 00 24 16 68 47 01 32 e0 21 95 ec 7e d5 06 | 76 a0 66 58 60 6e 0d de ea 44 b2 e6 49 d7 45 61 | 92 31 62 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 9e 40 be 82 89 76 10 a5 a5 b3 c0 | c6 a6 27 e3 b1 8f 5e 15 00 00 00 1c 00 00 40 05 | 9e 23 71 0d ac e6 cd ef ec 0b 33 3c 87 a3 e1 e7 | 66 2f 45 0f | libevent_free: release ptr-libevent@0x7fb36c06f9f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #606 spent 0.0934 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #606 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab3980 | handling event EVENT_RETRANSMIT for parent state #583 | start processing: state #583 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #583 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #583 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #583 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.724232; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.43568 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #583 | libevent_malloc: new ptr-libevent@0x7fb36c06f9f0 size 128 "road-eastnet-nonat-6" #583: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #583) | ee 37 ee 52 ed a9 c3 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 a4 f5 71 cf 07 11 54 77 c8 dc bd ad 96 f0 01 | 5d a4 14 b5 a6 c9 a5 8c 07 7c 60 be a1 8b 30 17 | 0d cb bf c7 58 fd 5c f5 d2 3d dd 6b 17 ca fe 28 | 75 d1 d9 89 ad e6 fa bf 8a 41 2a 16 1f 72 19 b5 | fa b3 fe f4 08 23 24 22 95 34 55 fd ba a3 89 6b | f3 72 8f 60 ab 16 03 0b e3 7c 7b 79 7b de 9c 09 | e3 e5 5a 50 1f ec 54 0e 6e 2b 44 25 a3 4b b5 b9 | 40 85 8c 3d 6b bb 5d 52 c0 1f 28 1d c6 f3 f2 46 | f2 e5 18 48 a8 50 9c e8 18 6b e0 d8 c9 f8 99 b3 | 9d 7e 38 69 ed ff df 3d 1e 61 57 86 a8 0a e4 e7 | b9 e1 4a ad ad 0b 8c 53 f1 1d 20 66 9c 6e 12 ed | 4a 64 77 80 75 c0 8e a7 e7 a0 ec 74 74 9a 22 d2 | ed 8b 25 d1 aa db 80 ca af 4d 51 c5 3a ff 34 e7 | 01 6e ef 37 60 dc 73 7b 12 57 ba 0a 31 0d 83 0a | 8c 77 6a 78 fe 86 74 7d 3f c3 4e 0d 39 54 83 b4 | 7c 64 dc 24 28 35 25 63 99 9c 79 c9 80 75 2e d0 | 29 00 00 24 71 83 b5 1d 55 d7 27 53 1f 29 9e 3f | 3c f1 26 1a 11 ac 1d 70 ba b0 78 18 67 71 1e 34 | 60 b9 78 a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0d 09 e0 45 78 0a 9d ed 5e 85 e2 2d | 30 cb b9 bb dc c5 6e a8 00 00 00 1c 00 00 40 05 | 05 40 6d 6e f0 4a bd dc 3b 91 6d 9b 95 75 10 8f | df 31 bb 10 | libevent_free: release ptr-libevent@0x7fb35006cb20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3980 | #583 spent 0.0964 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #583 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354046090 | handling event EVENT_RETRANSMIT for parent state #543 | start processing: state #543 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #543 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #543 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #543 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.724343; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.418135 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3980 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #543 | libevent_malloc: new ptr-libevent@0x7fb35006cb20 size 128 "road-eastnet-nonat-11" #543: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #543) | 8e 44 72 50 b9 d3 dd b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 41 24 1a 7b 6b 70 54 d6 bd da 9a 74 11 c1 10 4c | 35 ce 24 8a 41 de 3b c0 5b 1f ca bb 16 3b d8 1c | 1e a4 54 6d 24 65 47 b9 56 f7 04 e6 39 1c d0 98 | 83 cb 9e 40 be 51 70 af 81 68 b0 d8 3e 19 c8 15 | e4 25 aa 79 9c 90 e2 25 c5 ca b9 8c 40 22 6c 4b | 93 ad 78 af 16 d2 3d f3 8d 27 b1 61 55 d3 78 18 | 3a 04 68 63 37 a9 4f 5d fc 04 16 94 42 0d da 3b | 8c c1 6e d4 a9 31 72 3b 81 99 92 2b 83 15 9c d4 | 8b 0e 27 49 4d c1 a2 ac 6c 30 cd b3 8d 5a 76 66 | 00 bd 4e 1e 9f 08 70 f9 6c 29 f6 48 96 a2 b3 24 | fb 0e ee 0a ff 43 23 ef f7 df b7 1d 3c 50 f5 21 | 78 9e f4 1f 72 64 73 81 56 af c6 bf 6f 78 68 b6 | 23 6b 4d 8c d4 8f 95 9f e4 07 d6 99 60 6f 4f 68 | ff c8 49 ef 62 2d de 2b 39 14 98 51 d2 c8 bb 9f | 9f 3c d8 92 38 bf 91 56 69 62 cc 92 f0 79 c0 f7 | f4 11 ff 98 80 77 af d0 41 c1 25 02 72 ea c9 c6 | 29 00 00 24 54 02 f2 6f 33 5c 6e 1c 37 ce 9e 0d | c9 7a 13 59 0a 74 e5 bf e6 80 24 a7 f4 41 a6 33 | 04 30 82 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 fb 77 bc e4 59 3f 3a 12 ff e7 0e | 5d b1 f7 87 35 40 87 23 00 00 00 1c 00 00 40 05 | 86 cd c2 c9 ec 15 a4 23 df 3e 79 59 a6 b0 4d 70 | be f0 fe 01 | libevent_free: release ptr-libevent@0x7fb354054010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354046090 | #543 spent 0.0966 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #543 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378046090 | handling event EVENT_RETRANSMIT for parent state #545 | start processing: state #545 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #545 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #545 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #545 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.724458; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.434804 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354046090 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #545 | libevent_malloc: new ptr-libevent@0x7fb354054010 size 128 "road-eastnet-nonat-106" #545: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #545) | 40 cb 66 3b 79 de 72 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 5b 7a 86 ba 9c 03 fc 9a 35 b3 49 7d b8 a9 eb | ce 9b 15 66 7f 3d 65 56 ca 83 c0 b5 c0 d2 9b af | bf 94 33 79 9e 6a 89 29 27 fe a1 c8 69 70 d6 9d | 72 b4 78 99 de bd 56 1e ee 52 58 81 e5 79 d8 fc | 9b 01 47 2e f9 5f ff db 1b 0c 1d 6b d2 24 13 26 | 4e 14 5a 53 41 21 88 e6 85 34 1d 40 8d 0c ab 68 | 2f 2a e8 36 f9 d2 8e 74 83 80 31 c4 ee f0 6f 04 | d8 06 8e 87 47 f7 48 6b 1a 9a d8 72 1e 44 3e 1e | 94 73 03 f7 b6 b7 71 80 64 13 af 6f cd 97 48 25 | 27 b1 25 73 1d 03 81 9d 9b ed 92 d1 b0 47 c5 19 | 43 4b c5 91 96 cb 5e d0 fb 41 6d fb 23 51 8b 64 | 9b 4b 49 79 cc de 0f f7 0b c8 5d 39 be 6a 5d a6 | e5 65 4b fd f0 3d 65 42 41 d7 16 db 74 2b 56 12 | 51 92 12 04 90 41 8b 34 9a 75 ef 99 31 b2 53 fa | ec 4e df db 6b 7b 92 59 ae 99 e6 6b a1 12 97 31 | ed 33 0d 5e 99 91 c4 04 5f f2 a1 92 4f bd 71 0b | 29 00 00 24 8b 68 1c b2 c6 cc 60 af d5 80 42 4c | 34 71 a0 ef e4 ac ff 5b e1 55 8c 60 71 90 0a 7e | 13 6c 58 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 b0 98 38 8e 87 51 0e dd 45 6a 77 | ed ad b4 ba d2 48 07 74 00 00 00 1c 00 00 40 05 | c8 e4 a8 78 6d 64 59 0e 02 cc 7d 7f 34 3a ae d2 | 96 b2 88 9d | libevent_free: release ptr-libevent@0x7fb3800648b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378046090 | #545 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #545 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a986c0 | handling event EVENT_RETRANSMIT for parent state #634 | start processing: state #634 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #634 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #634 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #634 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.724581; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.468328 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378046090 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #634 | libevent_malloc: new ptr-libevent@0x7fb3800648b0 size 128 "road-eastnet-nonat-221" #634: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #634) | cf 5e f3 d9 0f 8f c8 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 6e 4e 42 21 e8 c2 13 74 c2 ba d4 76 e1 be 3a | 17 15 d5 c1 bf ca e3 9e c2 e2 ab ff 65 ee 7a 2c | f3 bf 14 cb 54 1e f5 5d 6b 0b 4b a3 c6 42 f2 c5 | 00 c2 f8 63 58 12 0f 9c c4 de 06 61 51 86 70 ce | 7a 0a 7a ff cc 71 b7 65 f5 cc 38 14 71 81 de 07 | b7 fe 20 84 4a ff 1c 5d 53 a3 fb 06 85 18 2b 9b | a8 30 c2 b9 8d e1 9c 07 b4 43 af 10 5f 03 0b 44 | c6 f5 8b 61 b9 fa 0b 3d 1c 32 63 5f 79 89 62 fd | 45 d5 92 76 17 fc 00 05 ef 5e 2c ec c0 11 2e 72 | 0f 45 e0 06 cd 9d 57 a6 22 61 8c 9b 78 8d c7 7e | 93 4b 6b 11 31 21 df b9 6f b0 e5 90 c6 6a 46 63 | 33 24 c9 bf 0d 8d 8a d0 3d 26 dd 1c 91 5a 75 0f | 70 13 b1 0c c1 ba 7c c8 70 09 19 0f b5 cd 04 5e | 6a af 66 e1 91 d5 09 48 02 32 4f dc 10 ea f4 57 | c2 40 bb 53 d3 0b 66 f6 59 f4 9d 9f 3c f5 45 a2 | 33 3b d9 2c 95 a0 76 aa 18 c3 43 fd 17 da c0 00 | 29 00 00 24 30 83 66 63 cd a6 58 35 d0 aa fe c7 | 9f 22 4a b9 bb d2 ab 8e e4 52 a2 c8 ac d9 43 99 | 4a 56 b6 54 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 4a aa 08 58 24 5b c5 80 af 06 0d | d7 f8 bd d3 f5 50 b0 3c 00 00 00 1c 00 00 40 05 | d9 15 55 e8 f6 53 18 54 ee 68 b7 cc 78 54 e7 63 | 8d 71 15 9f | libevent_free: release ptr-libevent@0x7fb38006f870 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a986c0 | #634 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #634 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34801da80 | handling event EVENT_RETRANSMIT for parent state #540 | start processing: state #540 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #540 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #540 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #540 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.724699; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.422255 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a986c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #540 | libevent_malloc: new ptr-libevent@0x7fb38006f870 size 128 "road-eastnet-nonat-126" #540: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #540) | 2b e1 27 8d d0 52 8a f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 d5 ad a4 cf eb 89 cf 33 00 bc 65 7f 4a 7b 8a | 16 3c 55 64 2b 44 36 7b dd 40 e5 4b 69 bb 87 d7 | 44 84 65 2c 80 59 b1 0b 26 0d 4b 17 d8 92 89 d5 | a8 39 88 9f 65 7f d7 e3 5e f3 f1 e1 69 ed 56 6f | 2d da 3b aa a1 f5 57 29 af ff 54 b9 33 17 09 e5 | 1c 0d 3c 29 e1 8b c4 f9 51 80 15 5e 1a fa 1a 83 | b0 dd b2 13 d6 42 a1 13 6e a2 49 94 b3 88 a5 52 | f2 25 96 67 72 ce ef 27 ee 12 d4 a9 81 d9 24 c0 | b5 47 34 ae 0d b8 be 17 8f d7 40 55 d5 69 22 bc | 39 f7 c5 28 22 3c 68 a5 3a 8d 6f 1f 00 85 29 77 | b9 55 ef 45 f0 37 a4 79 52 7d a6 e9 cd 97 64 1b | ec a9 e2 6b 2f 70 e3 90 d3 39 85 a7 70 54 7c ee | 29 b5 fb 95 bc cd d5 08 47 e2 10 f1 3c fd e5 2c | d9 d7 22 81 09 0d fa 53 8d c3 ee c8 2c a9 cf 74 | 00 4c 6d d4 7a 67 6f a7 66 48 98 1b c8 e6 db 27 | dd 8b f5 35 b4 13 6e 03 ce 21 d0 88 3b 78 0a fd | 29 00 00 24 83 64 8b 32 eb dd 3f 5a 87 dd 64 20 | 2e 87 12 47 14 e5 e2 45 bd 12 94 4b dd e7 b2 d7 | 43 01 e7 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 20 26 6c 5f d3 95 5b fe ef 96 45 | 0a fb 28 79 9a 9a 40 12 00 00 00 1c 00 00 40 05 | 9f b1 04 08 d0 1d 7f 34 66 26 cd 7d 6d a5 dc a3 | 2e 5b 4c 92 | libevent_free: release ptr-libevent@0x7fb348053b10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34801da80 | #540 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #540 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c040840 | handling event EVENT_RETRANSMIT for parent state #607 | start processing: state #607 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #607 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #607 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #607 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.724803; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.455501 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34801da80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #607 | libevent_malloc: new ptr-libevent@0x7fb348053b10 size 128 "road-eastnet-nonat-35" #607: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #607) | 1d 41 1f c6 ff 0f 27 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9d 29 5d d3 25 1e d3 3b 53 2c 02 04 94 df f0 9e | c0 c9 bd c2 0e c6 5b 3e b3 b5 28 a4 b4 de a0 bc | 44 35 8d ca 70 6e 31 a6 5c c7 6e 92 aa 89 1d 29 | f4 20 9b e4 de 42 28 b3 c8 f4 2f 6a 42 5a 19 f0 | 51 f8 ac 34 ce 28 a7 d4 af 5a ec ac 56 96 17 ee | 7c 53 68 62 c6 e5 b3 17 31 98 5f 6b 69 9c 2a 00 | d4 a4 6e ae ef 2a ab ba 56 64 86 65 05 0f d7 44 | f7 e3 bf 1e a4 ed a7 7d fe 8a 1d fb 8d d7 f1 cf | e1 7d 41 0d a7 4f 0c f0 68 6a 81 5f b1 24 1b dc | 3f da c7 a0 34 fe bc 93 f1 d2 24 a2 86 ef 73 2a | e2 6f bf c6 0f a9 6a 2f f3 1d 17 2f 3f d3 72 6e | b7 b5 92 74 5f d7 2a 9e 99 d9 04 38 46 4a df 24 | 0d bb 8c 68 24 f0 01 b1 77 d7 d1 59 41 dc 96 1a | 97 ab d6 d6 b7 b7 b1 29 13 72 38 ec 4d 09 e0 92 | 84 95 9d 0a 22 aa 6b 94 be df 8c 5f 62 af f3 3a | fb a4 36 0a 7d 82 c0 0a 05 87 7c b0 d2 48 69 07 | 29 00 00 24 0c 6e 31 a9 aa 11 87 13 04 94 3b 5e | 65 1f 88 8c ea 44 4e 42 5d 13 db 22 a9 85 17 06 | 20 31 3c 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f9 d0 a1 05 b1 12 13 d2 38 28 3a | 7b e1 92 d5 4d 8b fe 08 00 00 00 1c 00 00 40 05 | 52 35 89 2b 6d df 6f e4 b5 73 99 d5 81 ab e6 da | 1a 9a 77 69 | libevent_free: release ptr-libevent@0x7fb37c069e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c040840 | #607 spent 0.0654 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #607 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c046090 | handling event EVENT_RETRANSMIT for parent state #582 | start processing: state #582 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #582 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #582 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #582 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.724877; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.445899 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c040840 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #582 | libevent_malloc: new ptr-libevent@0x7fb37c069e60 size 128 "road-eastnet-nonat-127" #582: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #582) | 36 4a 37 cb 1c b9 ae 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 4f 61 87 c6 78 57 73 4a 5f a1 9a 64 82 d0 e5 | 6f 49 6a 86 33 ed b7 39 d6 77 5c f2 31 a0 9f f4 | ec 43 a1 b9 ee e5 b8 9b 1f c7 f2 95 28 7d d0 3c | ff 5b 16 5d 16 d5 26 95 a7 b7 04 19 40 c9 07 68 | b1 7d c4 8c 15 89 44 64 6a 3b 95 b9 d0 ad c1 f3 | 68 1f 13 1a 8f ee ba b2 3b 04 d2 cd d6 6f 70 f2 | aa 4a f0 c4 b9 45 7c f5 97 5e ea 63 fd 31 8b 63 | 9e 99 a5 f5 b9 09 c7 72 66 49 45 08 e0 12 a2 af | f0 80 ef 2a 78 c8 ab 6e bd a6 31 fa b7 36 d9 19 | d4 8e 57 35 2f a1 d2 8a d8 2a cc fa d0 26 84 24 | b9 a6 0a 8f 1b 41 12 b9 03 5a 72 30 93 99 ff 3a | e5 ef 85 4d d5 6b b8 f6 bf 6a 3d e4 93 67 8e 91 | 9d f8 cf c1 e9 c5 82 41 6a ed e0 1b 1d 7b a2 28 | 4c c5 b3 bb af 17 f6 b1 f6 63 47 76 31 fe 54 4d | 80 f6 9f bb 7d 94 71 07 12 ba da 93 7c 72 12 96 | a5 ce 85 8f e3 3e a3 aa bf b5 d9 b0 4d 73 42 19 | 29 00 00 24 3a 1e 72 ea a0 4e d4 41 98 1d 74 e2 | b1 f2 f0 bd 21 18 c0 9c 2b 6a 10 6d f8 77 54 e9 | 5f 0c 5c 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 1a 0a d4 84 49 b9 2d 3b f6 bc 1c | 48 56 f8 6a ec 07 3c 40 00 00 00 1c 00 00 40 05 | 4c a0 a2 f3 b5 28 de 62 5d b9 c2 1c 46 ba 05 5c | 22 af fc 09 | libevent_free: release ptr-libevent@0x7fb350065220 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c046090 | #582 spent 0.0669 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #582 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348030240 | handling event EVENT_RETRANSMIT for parent state #553 | start processing: state #553 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #553 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #553 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #553 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.724951; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.429345 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c046090 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #553 | libevent_malloc: new ptr-libevent@0x7fb350065220 size 128 "road-eastnet-nonat-77" #553: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #553) | 9a 41 ad 5b 0b 26 50 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 98 9f b9 be 87 16 03 59 fa c6 46 2f 12 bf f9 | 9c 48 69 58 ca 2c be 3c 1b 2c 0f 5d 12 16 fe b8 | 30 28 bc 11 9d 18 3a 2e 90 9c 49 0c c8 26 aa 51 | 1a 9f 8d 14 3c a4 33 0e 49 75 9b b9 aa 38 ce f2 | 16 4f ee 39 a5 0c 19 90 f6 fe 17 a7 97 44 51 96 | cf b5 e3 78 62 4a 8d 45 65 01 d7 f0 91 ea 83 03 | ef ee 72 ad ec d4 2e 42 af 58 6b a8 76 71 c1 a4 | 15 40 9a 41 d3 be f4 fc 82 6b 9b 27 44 16 92 88 | d2 ec ae 3a ad 37 9a dc be e2 18 f1 a7 5a bd 4f | 9f 7b 73 27 86 3a a5 22 07 50 15 6f 01 41 8f 31 | a4 8d 9b be 74 93 18 96 e2 bb be 98 d5 3f 3c b0 | be 51 bf 90 e0 7d 1d a1 c1 89 14 87 3d 3e 5f 1a | 3a 6e 65 d4 e7 b0 94 33 2a d6 83 76 bd a6 19 f2 | 31 91 dc c3 17 65 be bd 3f 1a c2 ef f5 43 82 b9 | b3 3d 97 1b b0 5f d5 6f 78 93 3d 15 15 8a d3 04 | 93 b7 c2 73 86 dc fe 40 7b 4e 06 9a 50 ca 56 13 | 29 00 00 24 51 58 09 66 02 b7 a8 f0 dd f0 1c 1d | b2 fa 84 64 76 65 9d d1 36 08 96 10 0a a1 c1 1c | e7 da ff a4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 41 6f 46 01 b2 f0 28 d5 2d 8d 99 | ce e6 b9 ed 57 d9 9f 7b 00 00 00 1c 00 00 40 05 | ed c5 55 11 76 93 de 00 6c 52 d8 5a 9c ca 52 d6 | a7 72 5b e1 | libevent_free: release ptr-libevent@0x7fb348059270 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348030240 | #553 spent 0.066 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #553 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37400cc10 | handling event EVENT_RETRANSMIT for parent state #548 | start processing: state #548 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #548 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #548 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #548 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.725026; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.431781 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348030240 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #548 | libevent_malloc: new ptr-libevent@0x7fb348059270 size 128 "road-eastnet-nonat-5" #548: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #548) | 6f bf f8 cc f4 7a 9c 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 3a 23 76 43 2c d6 0c 77 f6 be 3f 63 2d ef 87 | 5b 0a 43 13 73 5f 72 ec 4f 32 10 0e f0 de 84 7f | d4 61 90 d4 eb e1 32 1e e5 8e d7 b5 e2 7a e7 49 | 5d f2 fc 7a c6 30 1a 6f 07 cc 95 e2 88 f7 7d 25 | 65 7c dd a0 41 59 c3 25 f5 18 42 08 32 24 11 16 | 2e 52 4f 9a f3 7a ed ce d9 b4 aa b3 1f ae af 20 | 42 b9 b1 ad cd bb ee c0 74 e1 fd 67 f4 5d 34 44 | 6a de e6 b7 35 4a f2 eb 39 da 8c cb 41 b2 00 29 | 86 07 50 93 e1 bc bf ab 70 b9 fb 51 f1 a7 98 f9 | 2b 98 28 e6 c7 3d 74 21 03 5a bb f5 37 9e 89 94 | 7c 03 2e 40 d5 60 16 2d d9 fe b8 61 a7 83 f3 1d | ff eb 71 d5 80 83 a8 32 43 df 3f 7a 3d 1e 14 01 | e8 08 00 8c 59 d3 27 3d e9 52 04 6f 01 93 dc 8f | 24 6b 25 9d e9 4a 4b 67 81 c6 ae fd ce 83 60 14 | 29 d6 20 63 24 51 e8 f1 7b e4 ef 94 6e af af 7a | 65 c0 38 a3 b6 06 be 41 56 5f 9d 49 7b 85 1f be | 29 00 00 24 3a 01 9a 17 69 6a fb fe 06 63 3f f6 | 88 7f 88 c9 7d fd b9 fa 66 cd 9e 05 f9 56 87 93 | 78 28 b7 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 f1 40 91 ab 0d 01 84 cd e5 c5 16 | 59 f1 09 ef b4 ca 5b 7d 00 00 00 1c 00 00 40 05 | 0b 27 51 7f 3c e8 a2 b4 d8 2e fd 6c 29 e4 91 b0 | 77 83 22 02 | libevent_free: release ptr-libevent@0x7fb38005f0d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37400cc10 | #548 spent 0.0686 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #548 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348012890 | handling event EVENT_RETRANSMIT for parent state #566 | start processing: state #566 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #566 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #566 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #566 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.725112; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.438458 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37400cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #566 | libevent_malloc: new ptr-libevent@0x7fb38005f0d0 size 128 "road-eastnet-nonat-39" #566: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #566) | 88 80 6b f4 b9 8d 66 b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef c8 5e ab f5 ee a4 b9 98 60 85 05 ca 3b 04 b0 | 7d 9f 17 5c c2 7c 2b 4a da 7e 26 15 fc 48 81 31 | b4 8e c6 e5 11 7d 74 25 e5 99 ba 1d 58 67 84 5f | 89 d2 e2 25 03 e3 33 52 7a ed d7 e2 f5 b6 28 a4 | 1d 2f f7 d4 f6 94 af 23 10 a8 8a fc f4 89 a2 3c | a5 d5 e3 17 b6 f0 c4 8f 7f 71 4d 6f bb 87 76 f5 | a2 04 13 1b a7 e6 0f e4 4c 2d 33 e9 31 87 17 3c | cd 1f 22 8b 07 c8 21 5a 22 9c 36 40 a1 0d 7a 52 | af 7b bb f0 61 88 95 3a 59 92 5f 05 a1 92 fb 6c | 3d 4d bd 20 03 45 e8 a3 b0 a6 b7 00 08 7f 5b e1 | f5 a0 c3 e2 5c ca 78 79 72 98 fa 67 35 e4 cc fb | 8a b3 33 65 b6 e9 a2 86 fe 7c ee ff 0a 6f 23 a1 | 84 0d 45 d3 fd f8 6d 40 31 50 c7 97 1c 51 ef a1 | 74 f8 15 00 16 ec 9e e6 ab 9d 53 7c 15 3a f7 d3 | 7c 57 1b b1 1c 4b 72 88 0a 87 ab 54 4a 5b c4 c2 | 57 bd 4e a5 0a 4c 3d fe 53 4b 65 c4 64 95 29 91 | 29 00 00 24 c8 7c cd e0 b2 c0 7c bc b4 0e 89 92 | 98 cf b4 cf 69 f0 3f 2f 7e 50 0c 76 dd c6 f5 df | 0c da 14 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b d4 72 88 ba f6 c3 75 62 5e 72 62 | 65 f9 8a 24 3d dc 56 74 00 00 00 1c 00 00 40 05 | 54 09 d9 d9 07 67 4c aa 17 b3 39 aa 94 51 7e e0 | 9c 0e 3e 5d | libevent_free: release ptr-libevent@0x7fb34805e9d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348012890 | #566 spent 0.0661 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #566 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ae8980 | handling event EVENT_RETRANSMIT for parent state #525 | start processing: state #525 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #525 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #525 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #525 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.725184; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.420863 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348012890 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #525 | libevent_malloc: new ptr-libevent@0x7fb34805e9d0 size 128 "road-eastnet-nonat-80" #525: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #525) | aa 0a 50 f6 eb 80 0b d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa f9 a3 5a f1 06 e3 d8 4a 74 cc cb 91 5d 3f e1 | 21 df 1c 09 20 b5 fa b8 68 99 55 2e 9c f7 c4 26 | 2d 13 5e 73 62 28 0d 5d 1b 19 61 40 3e eb 12 46 | d1 3e 37 e2 36 63 3a 09 94 77 c0 7e 6c 49 5a 1c | 2a 84 ad 4d a2 2e 20 e1 b3 d6 0e 28 0c 73 33 56 | 98 ce 6a 84 5e dd ad 70 fc 04 0c c9 ba 63 4e a9 | 26 10 ce 94 47 dd ed 32 a8 e2 94 aa 02 0d 68 a7 | 46 c0 e1 ca 9b 37 10 05 10 43 ac 26 3c df ae af | 84 82 12 69 3c a5 a9 a4 da 4e 39 e7 22 d4 22 45 | 35 cb 06 64 36 de 60 0f 82 92 bc c7 8f dd a7 83 | 9c e0 b6 87 e5 ac 79 26 3e f5 8d 2d cd 1a bc 53 | c2 a7 57 2e 12 39 97 28 1d a6 53 fc 44 99 8d cf | 75 73 64 e4 87 c5 c3 cd d3 07 30 22 82 04 3f 75 | fc 56 ce 51 6d 2a 4c a6 f0 62 cd cf f7 11 c5 31 | 55 34 34 06 69 e6 6c 30 96 c7 a2 0e e6 93 d4 86 | 21 15 7c aa ca 54 c4 d5 3d 13 a0 9d ed ce c0 b7 | 29 00 00 24 2f 02 54 75 b3 a1 a2 a3 49 b6 96 0f | 9b 0f 28 8f 5d 43 f2 88 27 e5 88 4f 55 a3 28 fe | cd 5e 6c d1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5d 92 6e 19 fc 80 58 4d ee 5f a9 8d | 60 2e f6 39 2c 8f 9a a2 00 00 00 1c 00 00 40 05 | d9 3c 3f 56 aa 0d 1b ab 4e ad 62 3c 67 74 fc 7e | 8b 17 e3 b0 | libevent_free: release ptr-libevent@0x7fb388059ea0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae8980 | #525 spent 0.0653 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #525 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #614 | start processing: state #614 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #614 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #614 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #614 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.725257; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.462975 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae8980 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #614 | libevent_malloc: new ptr-libevent@0x7fb388059ea0 size 128 "road-eastnet-nonat-47" #614: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #614) | e2 44 b3 0f 15 7b db fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 92 e1 08 e5 43 41 79 c5 5d f0 96 29 52 40 c0 | 97 e5 c8 ff 05 3e 53 fa 62 76 da bc 72 8a b9 4c | f7 18 b8 6a ca 45 53 24 52 f1 8d 1e 49 3a 17 8c | ef fa dc 34 b5 f9 4d b5 58 f3 46 8b 4a dd 09 9b | ea 93 c2 33 65 02 3e 54 93 99 4f c8 fe a6 b2 d6 | af 78 80 dc 24 65 ba 1e a7 5b c2 a5 cc d3 1f 7e | cf d7 a5 8a 8b a8 49 5f d7 0f 85 09 d8 92 ad 49 | d7 a4 fe c3 04 e8 a3 5b 39 08 a0 31 46 6a 16 61 | 4d 3f 91 60 20 e1 05 33 e6 27 94 27 aa 1f fa 73 | 54 7a 93 dc 72 57 0e c3 11 46 f1 19 8d 7f 0c 06 | 3c c4 e4 73 42 6f 8b 92 68 78 39 66 88 cf c0 3b | 5d 6d 07 37 a6 42 2d 6d 6e 59 f0 5e 5c a4 19 79 | 26 9e 6d 08 ab 5d 74 ce eb ad 27 d1 db 09 88 c8 | f0 a6 93 29 46 42 ee 9f bb 5d 95 45 12 52 b4 73 | e2 c1 41 95 83 74 fd cf 99 ef 67 58 02 64 29 39 | da 81 64 9c 6a e9 22 3f 8a e7 56 f4 13 9b 71 87 | 29 00 00 24 86 16 ba 44 69 73 79 7d 89 32 49 92 | 68 97 7e 5d 09 b2 8b 2b eb b1 d6 6b 17 01 84 df | c9 f4 9b 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 2e 6b fd 7a d6 ac c0 e0 4d 65 46 | aa 7e 2f e7 b8 bb 4d 39 00 00 00 1c 00 00 40 05 | 1e 6a 1e 6b b1 89 1b 8c 76 4d 90 e8 7d 48 17 e8 | e9 bf 32 eb | libevent_free: release ptr-libevent@0x7fb384070f20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | #614 spent 0.0665 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #614 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a90400 | handling event EVENT_RETRANSMIT for parent state #639 | start processing: state #639 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #639 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #639 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #639 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.725331; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.457882 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #639 | libevent_malloc: new ptr-libevent@0x7fb384070f20 size 128 "road-eastnet-nonat-214" #639: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #639) | ff 19 a0 3d 97 93 39 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 19 0c 9d e5 77 b8 48 36 e4 03 9e c4 1d f2 2d 78 | 44 4c 26 98 f8 6b ee 0b af 31 99 e7 1c 61 bb d4 | d7 1b 9a 20 07 ba 04 17 60 e8 fd 18 10 87 29 2c | 24 f7 67 ce 57 34 ab 29 f5 cc ea d7 c2 95 67 49 | 24 4d 53 fb 24 ca da 47 20 a9 a9 bc c8 65 7a 7b | 44 61 86 68 8a ae f2 ac f8 44 ae 53 96 4e 13 15 | f8 a1 33 b4 cf f2 c1 fa c8 17 74 56 43 9e ef ec | f3 87 44 4e 55 d5 0d a6 d3 56 28 83 eb d0 c0 d4 | 3a 2e fd c3 dd 99 de 47 36 b1 e7 13 b8 7e f2 cd | a7 06 b3 ea 1c 8a 6d d9 b0 1f 66 79 19 09 77 e8 | 7d 50 d8 1c b7 8e b4 d3 82 80 b4 5c 9f c3 d3 38 | 28 2d fd c5 5f 8b c4 22 9d f7 e9 ac 69 9d a2 7b | 6e b5 3a ed 4f 1a 08 7f f6 b1 69 48 bc 68 e4 78 | 10 5b 4b 02 21 b2 70 8c 4e 7e b7 69 85 f2 7c eb | aa 75 d3 5c 7d a4 3d 7f 18 fd d4 8b 50 8e 47 6d | 12 6e b8 f7 e4 81 64 1a 6f f3 91 ac e6 c8 bf 94 | 29 00 00 24 0a 0d 9f 0a 63 a4 e0 f2 1d d8 95 0c | ba e4 b7 d7 a4 51 17 93 28 8e f1 0a c8 8c 2b 76 | 37 dd 06 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 9a d0 b6 2b 5a c4 fc 72 66 76 9a | 94 bf 3e ef ac e5 25 66 00 00 00 1c 00 00 40 05 | b8 15 7d 61 0d 1b 19 22 14 f1 b2 86 2c 56 e5 70 | 99 3e 7d f1 | libevent_free: release ptr-libevent@0x7fb35c07a360 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90400 | #639 spent 0.0644 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #639 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a1c490 | handling event EVENT_RETRANSMIT for parent state #720 | start processing: state #720 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #720 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #720 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #720 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.725404; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.510648 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90400 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #720 | libevent_malloc: new ptr-libevent@0x7fb35c07a360 size 128 "road-eastnet-nonat-182" #720: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #720) | 2e 33 4d 73 be a7 0e 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed ab c5 2c c2 f4 74 ef c7 ee 30 67 5e 1c da 49 | 70 61 7e 4d 8d 32 5f 3e 9a ec c2 40 33 9c 3f 67 | af 3f 5c 83 67 1b 79 9e b7 b7 35 73 56 5b 8c 3b | 0a 1a 2e 82 5d 65 28 71 9b 14 bc 2f fa 09 67 19 | b2 66 da 04 38 29 ad e2 f1 65 50 23 4d 85 d5 08 | 9a 79 76 49 46 a5 ea 67 8b 56 2d 01 fc 5a ed 64 | 0b 12 a4 dd e9 5f 18 7a eb a7 15 69 ee 95 e8 d9 | 56 b2 86 02 b9 aa db 6a f8 94 26 91 52 0c 14 ef | 19 10 c0 eb 0d 10 8b 4f 19 f6 79 a9 16 1e 94 36 | 09 fb 5c 76 4e b9 0e 65 a7 28 d3 fb 8e dd 96 92 | 1b 73 43 c6 61 e3 03 3c 0e 78 5b c1 2b aa 38 be | 19 84 9e 8e ff b7 65 35 2e 65 78 b8 fe ae d6 cc | 05 c7 08 1c 26 02 90 02 f3 16 d5 8a d5 33 30 16 | 63 1d e2 87 4f 85 13 e7 cf 51 84 57 b6 4d 0b d7 | ad f3 bf 57 f0 ee 36 2a 5d 91 a2 8b 76 c7 7f 4d | 7b 7f 59 64 bb c0 6d 44 32 b3 fa 20 34 ab 07 c4 | 29 00 00 24 b4 27 97 52 66 73 6d 63 e4 fb b7 f1 | ce d3 ed e9 19 97 52 e1 e0 b1 81 d7 52 28 6b 0c | 38 64 19 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 f0 ee 60 72 ed 8f f1 ea b8 ad 81 | a1 9e 54 4c fd ed 06 17 00 00 00 1c 00 00 40 05 | 50 b7 67 3d 54 be ef de 2d a1 bf 2b 46 e3 89 aa | 52 77 9e 8d | libevent_free: release ptr-libevent@0x7fb36406f9a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c490 | #720 spent 0.0661 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #720 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c03b100 | handling event EVENT_RETRANSMIT for parent state #602 | start processing: state #602 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #602 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #602 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #602 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.725477; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.469549 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c490 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #602 | libevent_malloc: new ptr-libevent@0x7fb36406f9a0 size 128 "road-eastnet-nonat-93" #602: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #602) | 1c 14 c0 8f 0f 45 46 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 8c 23 15 6d dd 8c f8 78 a6 e7 34 f8 f8 0d e8 | 99 69 99 32 7f b5 b1 1a 6e da d3 b0 b9 7c e5 6a | 90 1d 3f f0 2f 1f 8d c8 1e 97 79 0b 55 c9 08 97 | 7f db 99 9b a0 da 7f 34 8d ab 5f 4b 73 b6 eb 55 | ea b1 50 2f e5 f4 17 86 c9 0b 4a 01 40 9a 9a 4d | 73 05 29 c2 d1 6e 3d 1b 47 e9 f1 d8 3b a4 6c 31 | 0e f0 a8 d8 a1 46 2c 0e ca 2a 6e f9 4f d7 8c 76 | 9e 40 ea a6 3f 5f 17 17 a4 a8 fc ae 89 af 6d f1 | b3 45 8c 83 c6 8d a4 54 5a e0 e6 e7 89 ee b4 12 | 45 f6 b8 c2 94 e3 93 01 1e e6 9f b8 c4 95 33 5e | a2 9c 98 2d 5d 32 90 4e 65 40 c0 d0 7c bc 64 79 | d3 d5 64 07 12 ee 32 ea f1 d4 a2 dc 98 b8 b6 2e | 62 34 35 b4 dc 05 df 63 05 49 b3 40 af 75 cf e4 | bf 5e 46 dd df 34 a2 34 68 31 94 44 1b bf 50 ac | 43 cc 20 b0 de e5 d9 e2 b0 84 60 50 34 9f 14 06 | 39 c9 a8 b8 00 99 c9 35 60 cc 65 3c 94 49 b6 88 | 29 00 00 24 83 64 aa aa cc 6d 3f 6f 34 ae 10 39 | 1c a1 82 b7 e0 19 c5 ec 38 88 da 2f ce 97 9a 5c | 92 c8 61 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 77 b9 52 2d cf 04 de dd b2 81 99 | 39 e3 1b 7a 92 b3 36 9d 00 00 00 1c 00 00 40 05 | d6 0f f4 51 34 80 da 92 17 c4 6a c3 ee d2 99 01 | a8 7b c9 18 | libevent_free: release ptr-libevent@0x7fb35c056950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c03b100 | #602 spent 0.0867 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #602 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #569 | start processing: state #569 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #569 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #569 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #569 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.725585; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.431879 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c03b100 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #569 | libevent_malloc: new ptr-libevent@0x7fb35c056950 size 128 "road-eastnet-nonat-87" #569: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #569) | 55 2f d6 9f 11 e5 1c 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 ad f3 19 0d b2 66 aa bf 03 d7 00 2e 8a f6 e9 | b3 08 01 25 75 89 85 ed a8 02 b4 4e ae da 53 49 | 58 9e 82 fc af 45 f7 e5 3a 8a 61 8e 88 c7 af 9a | 14 17 d6 60 7e 9b 49 7e fb c7 a3 8f 06 1f 55 04 | c8 6c 7d 7d b3 8a be f8 87 7c c7 58 4b a7 87 5d | 9c b5 54 d3 ac 08 0e 69 85 4b 91 09 83 8d 76 46 | 46 3d 39 9e ac d3 50 29 5e a5 08 c8 9e 48 83 f1 | 7a ff ec 7e 14 c7 a3 2d 96 02 b4 ac 09 ec 55 2f | 9a bc 9a b9 ae 22 a8 43 ce 46 d4 aa a2 8a 21 94 | 31 c8 40 01 99 87 64 fd 79 ff 03 2c 2e 81 52 10 | 65 b9 fe d7 6e b5 1b 36 08 b8 c5 40 a2 b3 94 60 | c1 5e 51 00 52 ca d5 19 e8 a1 81 66 03 72 10 ef | 03 5d 84 88 58 a5 23 01 6a de f9 31 fa 89 4d ec | dc d2 db 41 a5 f5 42 96 78 ed 68 a8 33 e3 9e db | 24 46 13 b6 1b b4 8e a4 01 2d 3b 33 63 dc 87 44 | db c9 90 4c 80 8f a3 e2 b7 82 7f c5 7c be 1e 53 | 29 00 00 24 0e 82 eb 05 c0 49 58 d2 06 74 53 82 | bb 2f d8 51 c7 ad 9e 32 5a e2 85 00 b0 c7 ec f1 | 8e f6 f3 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 e7 bd d8 a7 7f 8b fc 64 ee 06 53 | 59 02 1a 01 d9 98 46 39 00 00 00 1c 00 00 40 05 | c0 b7 45 5a 2a e8 30 84 4a 1b 7a 52 bc cd a9 4d | c0 d2 c3 7a | libevent_free: release ptr-libevent@0x7fb374059970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #569 spent 0.0955 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #569 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46abbc00 | handling event EVENT_RETRANSMIT for parent state #735 | start processing: state #735 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #735 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #735 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #735 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.725688; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500859 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #735 | libevent_malloc: new ptr-libevent@0x7fb374059970 size 128 "road-eastnet-nonat-238" #735: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #735) | 53 89 83 1d 48 ce 70 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a 91 4f e8 ba d0 cf 5a d7 f0 71 fa 46 1a 8a e8 | 7d 4a be de 38 b6 47 be 9f b9 8a 22 46 d2 62 91 | ca 86 42 c6 77 2f 59 d3 e4 f2 fa 15 7b 3c 27 33 | 0c 23 b9 e7 b5 8a b0 8e ec c6 a4 80 d5 32 f2 16 | 21 6f 71 5d b4 75 f3 73 d3 f0 4b af 90 08 5b 92 | bd 52 84 33 aa 3b 00 4e e0 dc 9e 9b 5c e1 64 90 | 46 3d eb f8 93 ab a4 6e 46 c2 33 ef fc 8b d9 14 | f9 38 bb 1f e7 fc 89 8f 65 b1 d8 35 5e 99 68 8b | 32 06 43 77 f7 fb 44 87 13 38 82 0c ff 88 57 fb | f3 b5 78 4d 2f ac 61 eb 6d cb cb e1 13 98 c8 fa | 56 54 e2 54 39 9d 99 08 4b 53 de 03 86 18 ea f1 | 33 cf bb 45 1d 44 4f fa bc 18 e5 13 24 71 58 c8 | a7 32 0b 95 3a 6d 89 f1 b7 95 86 7b 38 71 2b d7 | d3 e8 9a bf 1d 2d e6 e7 fe 5f 9d 7e 67 88 57 56 | 5a 53 49 ca 89 7f 95 e0 bd 0a 6b 9b e1 e9 d3 17 | 9d 45 18 8b 68 cc de 5a 3c 70 99 6e f6 36 78 b9 | 29 00 00 24 9d 95 cb 46 13 9a 6a 64 e7 15 0c 4c | dc d4 c0 de a5 95 63 82 d6 ca 4a 90 78 69 d3 72 | e7 c1 f1 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c cd 3c 21 f0 20 2e 88 28 a9 40 54 | 19 d9 0a 26 35 63 bc e9 00 00 00 1c 00 00 40 05 | 4d 3d eb 4a 56 ab 16 38 35 e8 7a d1 b0 99 53 b5 | 30 cb 3d 6b | libevent_free: release ptr-libevent@0x7fb3640a6860 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc00 | #735 spent 0.0663 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #735 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3500300a0 | handling event EVENT_RETRANSMIT for parent state #749 | start processing: state #749 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #749 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #749 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #749 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.725763; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.505341 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #749 | libevent_malloc: new ptr-libevent@0x7fb3640a6860 size 128 "road-eastnet-nonat-176" #749: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #749) | 21 cc df 44 fb 91 db 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 1f c5 e8 8c da 2f 71 6f 87 ca 00 ac 50 65 c6 | be 36 51 01 ec 7e 83 51 09 eb 5d e7 2a 9f c8 ad | 66 58 cd 80 0a 9c 72 ee c8 d1 c5 20 4f 69 fb 92 | 13 65 d4 0e 1d 60 b8 43 6c fd 57 62 48 52 03 58 | 1f 30 23 02 a5 49 ac 37 6c b6 2d 96 9d 82 d8 a1 | ba c0 ed f3 40 36 e0 13 52 9d 8e 1c 5c b3 e3 4c | f2 78 1b 73 09 dc 52 b1 42 32 86 e1 28 0b 10 51 | 7f e1 bf a0 7c b2 ef e9 fa 73 6c 5e 12 69 7c 58 | 4e 1b 40 29 8f 20 2b 37 6e b7 c7 d7 63 7b 45 40 | 89 11 3c 89 89 0f b8 3d 1a 1c c1 76 50 59 ab 17 | 87 71 45 bc cb 1e a0 07 a8 8c 7d 0e 05 c2 ec 2b | fb 3c 29 c4 ba ca c8 e4 d1 73 b4 1b 53 de b3 a4 | 21 14 35 6d 70 c0 9f 7d a6 1f 1c e3 7c a8 3e 43 | cc 8e 74 be 9f f4 d4 7a fd 86 b7 9a fc 1b 2b 7e | cc df a5 1f 60 66 33 d4 ff 08 25 ca 1f d3 96 a0 | da 1e 31 8f a3 a2 b0 5a a2 09 c5 ee 5b 37 a0 f1 | 29 00 00 24 ef 4a 18 29 61 bc 8a 68 d0 f0 81 d1 | f3 7e a9 a2 f3 7e 3f 08 52 04 df 8a cd fc 2c b8 | d1 9d 3b c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 60 55 07 b3 0c 17 02 3e a6 d0 be | 6a 54 3c c2 20 5b a4 d7 00 00 00 1c 00 00 40 05 | ab 26 2f c6 c0 76 2f 1d 50 c7 79 f8 11 59 56 a7 | 82 5d 60 bb | libevent_free: release ptr-libevent@0x7fb388090d90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3500300a0 | #749 spent 0.0659 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #749 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #750 | start processing: state #750 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #750 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #750 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #750 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.725837; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.502204 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3500300a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #750 | libevent_malloc: new ptr-libevent@0x7fb388090d90 size 128 "road-eastnet-nonat-251" #750: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #750) | 66 c6 fb f7 91 6b fb df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 56 4e 6a bf ea d7 ce 8c c5 13 f2 30 fd 41 ab | 3e d8 84 16 5c 00 fd 63 27 ec 37 f8 37 ca a8 cf | 61 e7 66 f0 cb a2 7d 48 60 51 06 3b ad 0f 96 30 | be 5d 4e d4 5e 3e 0f e2 92 ad ec cf 0b 28 1c a1 | 4d e9 8b 14 d6 a5 00 40 0b a2 42 6d 65 44 52 2a | ed 7b a2 a6 f1 52 01 55 50 fe 38 4d d1 1e 2c 17 | 6d dd 7a c3 13 e2 07 81 a0 94 d9 59 df 56 84 98 | c0 ad 91 50 e1 93 ec 06 ee 42 aa de c1 18 3f 59 | d8 25 7b 7d 03 a8 7e 0b 39 bd 42 00 e3 0b 12 a9 | 4a eb 7b cb 8d 49 f5 09 cf 9b 5d e6 19 4e c2 da | 42 79 15 bb 81 d0 dc b8 5a e8 5e 28 c3 da 56 65 | 77 9c 71 c2 ab 7d 10 b7 63 49 54 6f aa e7 23 17 | b2 9a 50 85 92 a3 09 71 79 f6 65 dd 01 fe bd 61 | 08 e7 af f9 f6 a9 e5 aa 68 45 84 c6 4c 79 c7 30 | ab 0d dd fd 10 65 03 5c 7a 2c 09 2f 85 16 4e ff | 01 45 23 1d b3 99 fd e2 fa 7d 09 11 f6 28 34 a9 | 29 00 00 24 75 d2 7b 7e 78 57 6c 86 0e 7d 5d dd | 33 fe 29 2d 0e ba 6e e8 a4 16 ad c2 25 40 f7 7b | e3 c5 56 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 5e f7 09 e0 61 ab 7d 99 d0 bc 4e | 5c 13 08 f6 77 48 36 b9 00 00 00 1c 00 00 40 05 | 33 e2 5b 26 c7 f6 e2 7a ac c6 74 73 96 13 44 cb | f2 2a 57 fe | libevent_free: release ptr-libevent@0x7fb344074e80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #750 spent 0.0658 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #750 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c018460 | handling event EVENT_RETRANSMIT for parent state #729 | start processing: state #729 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #729 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #729 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #729 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.72591; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498331 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #729 | libevent_malloc: new ptr-libevent@0x7fb344074e80 size 128 "road-eastnet-nonat-240" #729: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #729) | 67 a1 5b 23 16 28 fb 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 81 a9 49 57 bf df e1 f1 ea fa f5 92 44 d9 16 | 0e ea 66 38 d8 dc 75 6f 21 e1 c4 ca 83 4d 4d a6 | a8 40 61 2c 03 9c 81 09 e4 2c db 8c 6b 07 73 a9 | f5 96 45 79 32 38 25 d0 cb a7 7f 05 3f 22 9d 55 | 94 52 09 92 47 a0 99 ce 8b f9 2b b1 16 c5 6d d5 | 5a 5f 80 8e 4a 88 73 f6 19 b4 2a 58 b1 99 a3 f1 | cf 10 1d ee 49 52 bf ae ad 75 79 fc 4e 1b 70 c4 | fe 0d d5 21 ff c3 16 1c 6a 4f a2 1b da 3f dd 80 | b7 98 1e 3c e4 19 40 2c ba 2b 1b 02 76 ef 1d 8c | 32 68 18 21 59 6e 3c 68 cf e3 eb 77 5f af 35 46 | 5f aa 30 45 02 11 0a b4 a8 8f ff 89 3e 96 86 5d | 06 be 71 8d 28 b2 ee 71 59 26 45 c0 3b 2a 27 ad | fe 98 e4 a6 a7 ad 6c 8f d2 ce 96 56 c5 bb 39 51 | 6a 23 cb d8 31 3d 75 5c 91 5d 1e 01 ca 04 2a 2e | 70 54 ab 56 07 f2 3e 14 8f 66 51 e0 bf d5 13 d5 | 73 c4 4d 14 6a 43 47 b4 f4 a1 4b 3b 4b 58 bf 93 | 29 00 00 24 ba eb 8a f4 d2 cb 7a 42 9f 66 73 21 | de 49 71 25 d5 fa ae 34 96 57 d1 6a d8 63 50 0d | e7 fe 39 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 4e 71 12 16 99 de 9d 6a f1 f6 ef | 1c a0 b8 7d 93 f0 39 1e 00 00 00 1c 00 00 40 05 | 19 1d 16 93 50 07 d9 58 09 ed 23 95 2e a0 e3 31 | 82 b4 65 2f | libevent_free: release ptr-libevent@0x7fb358079410 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c018460 | #729 spent 0.064 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #729 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a647d0 | handling event EVENT_RETRANSMIT for parent state #743 | start processing: state #743 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #743 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #743 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #743 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.725983; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501481 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #743 | libevent_malloc: new ptr-libevent@0x7fb358079410 size 128 "road-eastnet-nonat-233" #743: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #743) | 33 68 6a 0b 04 fc 21 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 54 1f 6f 5a 66 3f c1 42 1d 47 28 fc 43 9c 32 | a7 7f fc 41 a3 9c cc 7a 93 57 ab c6 8a a7 f4 3e | 46 34 bd 6b 98 5f 8e a7 fe 4c 9b 90 ee 04 ee 86 | 42 1c 02 b1 27 a7 b0 01 e0 8a 3e cf cb 39 6b a0 | 4b a4 c4 0c 65 cc 28 25 a4 ad 65 49 aa 92 21 1a | 8f a6 23 05 37 8d 6e d1 a2 88 57 12 d3 e8 bd 69 | 1c c9 0b 75 f5 df 2d 58 5e a5 72 a2 fb 4c ca 52 | 9f 85 66 7f 63 b8 02 bf d7 3e a0 09 53 f4 72 19 | 87 d5 3c cb be 53 b9 59 65 7c de 29 3e 98 f6 97 | 02 6b 58 24 68 71 6e 3b d0 92 ea b1 ac 32 a9 28 | 8e 3a 77 35 b3 34 3c 3d ad 6e 6a 29 9b b7 88 7b | 86 bb 62 15 16 30 35 3d 78 71 08 9c bb d0 51 c0 | 23 56 79 b7 91 8c 7a d0 c1 ec f6 00 b7 6f 72 d8 | 4c 61 2d 3e 9f 3d 71 4d ce 0f 50 83 03 11 bb 0a | 99 e2 07 9c b6 80 4a 86 5a 9a aa 9c 1b 0a e1 e2 | e8 d9 11 28 45 53 df c8 4d 16 ae c0 7c 32 f4 11 | 29 00 00 24 1a c2 58 3c 56 a7 f0 5a d9 b8 5a 6b | cc b3 c9 3f ec 7f b9 16 85 28 70 f6 0a 4a 2a 42 | e9 0f c0 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 52 f6 73 3d e6 8e 99 7b ad bf dc | 06 39 16 3e d4 a9 07 80 00 00 00 1c 00 00 40 05 | d3 9b 09 18 b0 e4 0a b6 7c 3b a5 fa dc 8a ee 1d | 09 1b 83 75 | libevent_free: release ptr-libevent@0x7fb35807ebf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a647d0 | #743 spent 0.0649 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #743 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38000f8f0 | handling event EVENT_RETRANSMIT for parent state #688 | start processing: state #688 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #688 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #688 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #688 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.726063; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499204 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a647d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #688 | libevent_malloc: new ptr-libevent@0x7fb35807ebf0 size 128 "road-eastnet-nonat-95" #688: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #688) | df 64 65 78 b0 09 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba 99 2e a4 d8 11 11 ec bc 09 70 a9 ec b4 08 d9 | 97 c0 f8 d2 7e e6 f4 f4 ec 88 8f c9 01 b5 07 63 | ab 96 32 f0 d1 ff d5 71 24 2d f7 10 7e 41 d7 9a | 8a 31 5b f5 cc 4d 4b 6e e0 fe cf 09 59 ae a0 75 | ed ad a8 fe 11 4f 77 38 0f 3d 73 54 64 5c 86 e1 | 4c f9 f7 be 0f ad 2a 08 14 2f 01 cf 99 bb 08 03 | e1 c1 46 1b 92 0e 69 b0 d7 e1 d7 63 33 81 c3 c3 | 6e 9a 75 ae ba c8 31 37 9a f9 f5 59 d2 c3 7c 07 | c0 44 bd 67 c4 36 13 82 f6 9a 1b bf dd 19 d3 a7 | 1f 9b af 3b 56 e1 48 c3 b7 44 f8 fc bf eb 18 f9 | dd 29 49 e7 68 79 bf 94 71 6c ee a8 79 a8 b8 32 | 64 f6 0a 92 59 a9 6a 2e 51 22 2a 8f f3 dd d7 01 | 71 66 37 a9 16 dc 8f 9f 9b 19 8a 04 d9 aa a9 68 | c6 3a ea 8d fa b5 5a 51 76 f8 d4 87 5a cd c9 16 | aa cc 2c bc 9b 24 ad be ac cc ef b3 e1 6c 96 1e | 04 cd 1e 40 8a 89 0a d7 df f5 fd 0b 78 38 cd 04 | 29 00 00 24 07 2f 3c 32 0e aa 94 89 c6 1e 84 b9 | 47 5c cc fe a4 33 57 f3 0c 87 82 2a 55 07 2e 5c | 6c 57 05 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 20 1b a3 63 d6 96 1d 79 a9 7e 61 | d3 77 77 fd 71 9f 38 b2 00 00 00 1c 00 00 40 05 | 2c 04 dc 98 db ed 3b 9d e2 b7 4c 25 55 c5 d8 4f | 0d e0 01 76 | libevent_free: release ptr-libevent@0x7fb35c0cfb20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | #688 spent 0.0711 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #688 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348018100 | handling event EVENT_RETRANSMIT for parent state #725 | start processing: state #725 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #725 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #725 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #725 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.726139; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498897 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #725 | libevent_malloc: new ptr-libevent@0x7fb35c0cfb20 size 128 "road-eastnet-nonat-196" #725: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #725) | 64 5e 88 2e 86 68 44 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 59 d0 5b 9b 94 b3 86 8e 64 38 5a 09 d0 e8 64 | cf c2 d4 15 da d7 21 e6 4e 8c 6b 11 1e e8 ad 65 | 2b bd ab d1 ec 70 ff c8 0d e9 d2 07 ec f4 0b 5b | 5f b2 e7 3b 24 74 0e e2 94 9d 3a 23 3b 5b 55 7c | ed 09 9a e3 6a ff ac 51 22 72 69 81 f0 1e 34 21 | 12 8d 74 23 22 5b cd 06 6c d7 75 d8 45 5b fb 4d | 85 65 7b 46 e7 aa 98 f1 74 d1 b6 9f c8 d1 7d 99 | 61 08 9e 85 6a 83 33 63 c7 3f bf f2 9d 91 d4 fd | 7f 40 06 4e ba 07 60 0b 06 c4 8b f3 84 f7 92 b4 | 2d 08 89 d4 0a 59 ef cd d0 85 03 6f 8f 85 c5 8e | 7e 4a 7f 5a 22 e5 ce 0e 62 2d dc cb f4 3c 17 f0 | 27 f6 d1 42 16 70 1d 6e 7f 4e 76 12 9c d6 e4 08 | 70 2a 6c f3 42 1f 73 22 fe 78 46 af d0 cf 5f fc | f9 7d 2b 8c 1f b4 95 d9 11 2f d3 5b 1e ac 55 2b | 9d 0e 3d 6a 04 9d 00 d0 a8 13 41 91 76 fd 15 44 | 39 7f 60 0b fd e8 a5 da f1 73 89 3e 95 bf 44 8f | 29 00 00 24 65 31 0e 50 dd ad 39 44 4e c9 44 5c | 03 5d cb 07 2b 3f e9 f7 c8 48 35 5a 83 42 5a 7c | 08 53 78 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 e1 7e 60 6f 94 83 21 09 67 4d b9 | 49 66 ea b2 f6 c4 46 b6 00 00 00 1c 00 00 40 05 | 2e 88 34 b2 e3 1a 64 25 09 3f 69 42 1a 75 eb 83 | 23 7c 1f dd | libevent_free: release ptr-libevent@0x7fb3480720d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348018100 | #725 spent 0.0655 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #725 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46acc140 | handling event EVENT_RETRANSMIT for parent state #643 | start processing: state #643 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #643 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #643 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #643 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.726212; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.46586 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348018100 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #643 | libevent_malloc: new ptr-libevent@0x7fb3480720d0 size 128 "road-eastnet-nonat-86" #643: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #643) | a4 7a 0a 38 ed 45 0a 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 1b 74 d4 2c dc 83 3a 41 1b 72 93 cd d9 99 ab | a5 3d 31 f7 6e ad 24 72 35 2c 08 59 f7 85 55 ca | 70 bd b6 2e 52 cf ef d1 e9 0c c9 34 5b cf 85 8d | 51 9c e8 d0 53 f9 5f 56 af 23 8b 00 bf 41 f6 62 | 6a 4a d5 2e 51 34 77 b7 47 63 d2 86 3b 81 3e f3 | 91 0f a1 86 aa 34 df 5a 12 54 be 0c ac c3 1e 9f | 58 01 81 17 a2 3b 0b 37 4c 53 7d 23 99 d9 8f ea | f2 0b c5 cd 0a e8 e2 66 37 ad e8 1d 0c de 9c e2 | dd e7 b6 c4 7e c8 77 b9 f2 ed e4 1a d3 c9 66 b6 | 83 5d e5 e8 44 a9 37 6d 05 50 25 5a a4 01 51 b3 | 8f 5f 9b 9b c2 94 66 43 f2 03 b2 0d 87 c8 04 67 | bc cc ed 06 fe 82 6a 3f 3b 17 39 2b 40 cb f6 e0 | 43 79 fe 36 4a 20 93 44 8d 77 96 8a 0b 1e 19 08 | d9 d7 07 85 61 29 11 e7 11 41 78 7c e2 10 eb ac | ba 26 45 60 58 71 fa 59 c0 d3 9c 73 92 fb fa 39 | c8 c4 cb fb 8a ec 6d 5d e5 9d 4b b8 1c c2 a8 39 | 29 00 00 24 57 52 8d 13 2d 29 b3 5e 46 06 e9 1d | 1e 46 ed 46 2e 59 41 8d f8 dd 75 32 e3 62 89 bd | 1f 93 2f 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 26 30 b2 61 08 18 b0 78 81 15 48 | cb a5 c1 be b2 a0 a4 44 00 00 00 1c 00 00 40 05 | 98 48 c3 da 5f a5 9a 05 26 1d 7f 07 40 17 0d 29 | 6b f4 fe 77 | libevent_free: release ptr-libevent@0x7fb338074f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acc140 | #643 spent 0.0636 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #643 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb384038200 | handling event EVENT_RETRANSMIT for parent state #551 | start processing: state #551 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #551 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #551 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #551 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.726284; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.424824 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acc140 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #551 | libevent_malloc: new ptr-libevent@0x7fb338074f30 size 128 "road-eastnet-nonat-54" #551: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #551) | 6d 61 08 83 3f 41 28 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 10 09 30 29 21 c1 f4 7d 5c 69 d9 0d 1d e5 ea | 5f e5 a9 db 38 23 61 5f db 1d 40 23 04 f7 e7 7f | b8 e0 a4 4d 7c 42 cf 01 84 f7 f3 90 63 0d a6 27 | 03 53 27 bf 55 c3 86 69 1e d9 34 0b ea 6d ef b8 | 91 72 41 a4 7f 9d 36 67 17 b8 f1 de c9 57 cf 25 | 96 88 4b 97 29 55 03 99 2d 0b 7d 25 6e 82 28 00 | 28 de a1 1d bf 28 3b 57 86 30 40 b9 3b b3 59 37 | b9 3b 89 a1 f7 97 44 8d 31 dc 44 99 58 00 16 65 | 19 ab 30 5f 5a 1a 94 95 50 6f 1b d2 58 f8 43 59 | 32 7b ce 9f f3 ba d6 9b 84 a1 13 0d 64 7d 87 0a | 6a cb 60 60 91 23 18 fa 0b 4c 7f 24 f7 e4 a9 1b | da 1e 22 44 6a ff fd e2 c7 3d ff ec 71 14 90 da | 2f 14 ba 4f a8 6b df 31 2c a1 a5 6a a3 1d dc f1 | 4e 14 ae 37 41 c7 58 f2 d5 00 5d 49 d0 c7 f4 76 | a0 bd 4d a8 c2 8b 1f fe b6 2f d7 91 47 6a e8 e1 | dd 7d 06 82 4d 33 80 36 54 a3 03 be 52 06 d4 cf | 29 00 00 24 c1 64 a4 63 7a bd c6 9b 19 d4 3d 64 | d3 05 1c 05 f8 31 a3 bc 62 83 1f 22 d8 12 00 d9 | 0f 94 f6 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 12 25 8d 00 b4 d4 c7 fd 0e de ae | 25 a5 ca 2c ce 50 fd 3f 00 00 00 1c 00 00 40 05 | eb 33 8d 88 55 34 43 12 f6 bf 6c 9e 03 ac c1 f8 | ae e6 a3 5e | libevent_free: release ptr-libevent@0x7fb384054040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384038200 | #551 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #551 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358012630 | handling event EVENT_RETRANSMIT for parent state #633 | start processing: state #633 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #633 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #633 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #633 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.726357; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.4594 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384038200 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #633 | libevent_malloc: new ptr-libevent@0x7fb384054040 size 128 "road-eastnet-nonat-72" #633: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #633) | 8a 84 ad af 01 bc 2c c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 25 a4 2a 19 32 bd a1 aa 5d f2 a6 fc 02 2e d5 | 33 ef 4f d1 9c ba fd 65 26 89 b0 76 98 b1 0a 73 | 0b 6d cf 55 32 b0 a8 c3 0d ed 7f 57 3e c4 09 bf | 8e 3e 0d 52 2e 51 26 3d 83 ba 75 87 bf d4 84 39 | a3 f5 4f e1 81 37 40 32 c2 92 5c 7d cd 5a 01 0d | 89 3e 2b dc 37 3d ff de 20 7a cf 8d ba 1e bf 39 | 3f 0b 59 4c 6d 53 3d 85 05 4f cb 7e 6f ec 84 0e | 3b 89 0d 17 39 96 b1 02 d7 7f ec 25 df 6e 69 98 | c8 c3 02 da a9 fd 5f ba 17 59 e0 f1 d0 67 1c 1e | 0e 5d 3a 2a 95 01 f3 4d 4f 33 98 c7 f4 d2 19 43 | 9b 8e 04 5a 6e 98 a7 91 3d c3 66 01 66 da 39 f1 | eb 10 86 db 4c d5 5d e9 1d ea cb f5 8e 90 23 18 | ed f2 37 09 1a 5d 54 50 41 f5 c4 c4 ca fb 8f 9b | f6 29 c4 e8 d3 47 fd 3d 80 73 a9 55 47 1b bc 7c | 8f b9 ec 7f e6 92 93 61 f4 fb 2e 1c e7 a7 98 52 | 7b b4 1d c6 f1 3d a2 94 00 52 e4 8a 62 1f 4c b8 | 29 00 00 24 89 c4 76 da 63 15 ff 10 2a 9e ce 01 | ec ae 76 ed 0e 33 67 47 23 3b 30 6c 5b 8b fd b9 | a5 68 00 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 70 6c 0c d5 a6 51 1a 4a 89 fd d4 | db 2f 8d 82 0e c5 0a 69 00 00 00 1c 00 00 40 05 | c8 f8 ac 25 9c d4 cc 0a 20 2d 68 79 d5 c6 b3 9a | 28 b4 88 17 | libevent_free: release ptr-libevent@0x7fb35c0a0a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358012630 | #633 spent 0.0656 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #633 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7cf10 | handling event EVENT_RETRANSMIT for parent state #747 | start processing: state #747 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #747 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #747 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #747 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.72643; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.508272 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358012630 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #747 | libevent_malloc: new ptr-libevent@0x7fb35c0a0a80 size 128 "road-eastnet-nonat-248" #747: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #747) | a6 bf d2 f8 ac 64 24 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a 1f 62 98 e1 72 89 4a 9e 5e 9d f8 09 50 e0 d2 | 9c 18 ca 9e 95 27 4b 63 4a 5a 0f ea 35 ee 0f 6e | 09 6d 2d ee e2 2e 30 c8 5c e6 23 10 bb dd 92 c4 | a1 94 38 18 f7 1a bb b7 fe 7a 6c 77 66 08 c9 a3 | d7 20 9b 83 e3 5e fd c7 c5 b8 d7 cb db 7b 13 a8 | e4 16 a2 a7 f8 77 c7 96 cb c4 f8 c4 e8 5e bc b6 | 11 12 e0 0a e1 e2 98 ca 3c d6 c9 36 5d 1b 6d d8 | ff 68 5a 03 20 ef cc 43 d1 3a 80 e8 6b ca bf 39 | 66 da f5 51 9f dd 65 c6 1b 01 2d cd e7 68 f6 a3 | fc e3 5a 6a e7 8a 74 f2 c5 47 be 6f cb b2 de 7b | 5c ef 73 4e 74 52 3d 7e 7d 97 04 e7 a1 bc 8c 22 | 0b 61 ff ba 39 29 86 ab 04 59 61 fd e9 7a 43 97 | a9 8d dc 37 09 a9 62 1f 96 7a 92 bc 5d 63 69 61 | 33 36 28 54 06 b6 87 43 c9 0d 56 0e 50 ad e6 24 | b5 8c cd 7b ea 80 41 db a4 b3 86 9b c4 b0 37 e4 | a5 6b ef 42 4a f6 29 75 47 2b 95 cd de 0e 06 20 | 29 00 00 24 72 d2 2d f3 46 d8 fb e8 18 14 33 bc | 59 89 85 ec f1 52 25 c8 16 b1 28 1b 77 62 97 7d | df 82 b5 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 63 d7 f3 34 77 99 12 4c 20 15 9c | 7c fd ab a4 f7 0f 03 52 00 00 00 1c 00 00 40 05 | bd ec 71 30 dd 4a a7 e6 ea 65 3f b5 e2 da 2c 35 | bf 9d 55 db | libevent_free: release ptr-libevent@0x7fb36c0933d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf10 | #747 spent 0.0635 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #747 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350014cc0 | handling event EVENT_RETRANSMIT for parent state #699 | start processing: state #699 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #699 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #699 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #699 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.726504; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.493088 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #699 | libevent_malloc: new ptr-libevent@0x7fb36c0933d0 size 128 "road-eastnet-nonat-246" #699: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #699) | 3d 5b 9a 7a 4c 0f 9e 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3a 09 f9 eb a7 2c d4 98 c3 18 03 6f 47 d0 96 ba | 3c f2 05 d8 dc 28 48 bb 27 cf 99 6c 93 c0 c3 83 | 62 65 ad 94 56 b3 ed 6c 6f d7 43 5b eb 9a b8 8c | cd bc f0 70 f4 67 60 ab 7c 75 e9 55 5d b0 86 b6 | 64 db b3 4d b5 b8 2b f5 3d ab b6 8a 7d 99 73 4a | 9b 33 fd e0 3a 15 58 67 0c 5b 8e f3 d6 f2 97 a2 | 7d 06 3e e7 f9 db 01 b6 96 1e 12 71 96 36 b1 ec | b4 4d 68 d3 51 78 4b 90 eb 84 c2 64 e8 b4 4f 2c | d3 6a bd c9 98 ce 1f 8e 81 89 21 95 4c 9c ba 75 | d7 f1 23 87 ad 5b ff f5 2f b5 a2 44 90 c1 f2 58 | be d6 e8 53 b5 24 d2 77 32 37 2b 7a 81 a1 bc 2a | 6f b9 14 6a 34 88 fb 2f 9e b0 2b 54 9e 18 aa 92 | 83 c2 bb bf fc 01 c9 75 ab 94 44 ea 3a 9c f5 0f | 98 b5 4e 1e 59 de 26 f7 a1 d7 7b 72 e7 1f 59 71 | 0c b6 98 51 80 1c a2 16 07 3d a3 ac 7a 38 df e5 | 57 4a 6f f1 39 e9 67 6c 90 88 41 fd 33 06 1d 56 | 29 00 00 24 75 7b 0d 72 2a ad 01 e2 32 07 7f 62 | c6 47 f1 e7 26 b0 2f a6 3b d9 b1 d0 4e 2c e5 dc | af ae 5c 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 d7 12 af 37 14 12 8a ae d8 ef 8c | c0 42 58 74 2c 82 0a f0 00 00 00 1c 00 00 40 05 | bb 48 6f d2 a0 ac e9 6e 70 bb 7f d3 67 7d bc 39 | c4 af 08 4e | libevent_free: release ptr-libevent@0x7fb36806a2e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350014cc0 | #699 spent 0.0643 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #699 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c044df0 | handling event EVENT_RETRANSMIT for parent state #645 | start processing: state #645 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #645 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #645 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #645 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.726576; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.46971 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350014cc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #645 | libevent_malloc: new ptr-libevent@0x7fb36806a2e0 size 128 "road-eastnet-nonat-159" #645: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #645) | 0c 20 e9 c8 f1 ce 0d 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 8a 31 6e 84 8e ee 47 80 28 3e f7 bd 66 21 ae | a7 c9 66 e4 9c 35 61 f1 16 0f 1c cb 4f 8c 10 bf | 6e 35 2d be 88 b3 9e db c6 d4 0b 4b 1b d6 0f 24 | 0a 6c 6d be b6 de bc 90 ef 4c db b4 25 2b dc 87 | 6c 61 9d 02 4b ca cb c9 34 ad 89 73 4a df 91 ac | 37 e5 30 b7 38 08 c4 2c f4 c1 86 fe 1b b2 22 0b | ce d5 26 69 30 72 a1 b3 13 e0 7e 3f 95 c8 13 b6 | b2 52 42 87 85 da fd 89 fa ba 74 99 7e b0 e8 a5 | d9 b4 d7 c1 b8 d7 f9 52 8c 9d dd 2b fb 3e 32 c1 | 2a f7 f7 b1 ed 12 09 66 4c 2e 36 a5 31 5d 4c 2b | dd 02 ec 82 7d 54 39 7e 27 68 b2 8f ba 6c 9c 64 | e4 b1 54 a4 a9 83 73 da 3c f1 13 e7 c4 83 f9 34 | 4e 29 e4 9b 2c 98 6b 6d 2d 9b 19 b8 a0 13 da 3a | a2 7b d4 a1 cd 5e e2 80 01 c5 9e 85 09 f9 cc 94 | 06 6d 1b 4d b0 af 7d d7 8a af 03 99 b8 54 31 fd | 25 b5 36 4d e2 31 2f 3f 37 34 3b 6c c1 28 54 50 | 29 00 00 24 ea 84 61 f6 e2 d9 2b 57 d4 d8 53 44 | 1c d8 bc 14 a4 bf f6 76 ae 29 c0 89 c3 03 25 b0 | 65 0c c5 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0d bc 72 fe 0b 7e b4 5c e5 5d 2f 13 | cc b7 37 44 34 e3 88 7a 00 00 00 1c 00 00 40 05 | bf 80 a0 4f d4 d4 cc 7e 5e 5a ae 95 22 cc 4e 94 | a3 26 fc 44 | libevent_free: release ptr-libevent@0x7fb34c064430 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c044df0 | #645 spent 0.0653 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #645 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35400d120 | handling event EVENT_RETRANSMIT for parent state #654 | start processing: state #654 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #654 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #654 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #654 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.726649; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.464766 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c044df0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #654 | libevent_malloc: new ptr-libevent@0x7fb34c064430 size 128 "road-eastnet-nonat-112" #654: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #654) | 5e ee 0b 7f 6c a7 3a d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 66 e0 d6 d9 72 ba 46 dd 41 a1 46 b3 25 74 d2 | be 07 06 6c f4 38 9a a1 39 17 cd 0b c4 41 e6 86 | ab 2b bd 9b 4e 50 c3 68 a9 fd 5d 77 07 79 12 d7 | 06 ad c7 3b 19 6e 8f 00 bd 88 b3 27 81 06 f1 46 | b7 d7 a4 24 f6 8a 13 f3 63 a6 44 01 04 ef fd 32 | 85 cb bb e9 d7 ec f5 ec 83 a6 6e d9 b1 33 b3 d5 | d8 12 93 9e 27 25 43 b4 f4 9d 5a 4e 0d cb 7f c7 | ad a0 26 f4 7f 25 7c d9 9a ca 52 6e 2d 83 33 d3 | 5b 0c 44 4d 72 d8 0d c3 65 63 57 17 10 5e 19 0d | 88 04 84 34 7e 42 22 cf c0 6f 9d 86 b6 ed ec 5f | 38 0f 13 28 f6 f9 d2 d2 9a ad 59 58 25 e5 63 dd | e3 7b 38 03 55 37 74 26 61 f2 62 84 61 8e c1 fd | 89 ae b9 7c 2a 19 e2 22 2f b0 2c c7 27 de 4f cb | fd 3c f5 3f fd dd 17 5e 7f 7a 64 3f d9 af d0 1d | f0 55 35 5d d7 34 3d 74 24 8b 4f 0e 99 f6 c3 2d | 66 87 8b da e2 d5 ca 1a 2a 24 b1 4b 3d ff 64 ec | 29 00 00 24 97 bb 4a bf d9 e5 95 75 3b a3 86 b3 | f1 af 1a 0c 45 88 7e 17 0a 91 a5 72 56 0e fd 8c | e1 a9 d3 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e 88 f8 b3 f2 90 3f 3b ff 2b 5c 52 | 75 9a 83 d7 14 17 86 77 00 00 00 1c 00 00 40 05 | 2e 13 0c e6 eb 5b 95 e2 c9 2a b6 07 89 5a 9a 41 | 93 58 82 e2 | libevent_free: release ptr-libevent@0x7fb38406b790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400d120 | #654 spent 0.0648 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #654 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad8480 | handling event EVENT_RETRANSMIT for parent state #742 | start processing: state #742 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #742 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #742 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #742 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.726721; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.505494 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #742 | libevent_malloc: new ptr-libevent@0x7fb38406b790 size 128 "road-eastnet-nonat-202" #742: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #742) | ab 34 f4 95 81 ed c2 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f7 98 46 2a 24 70 ac 92 50 50 f4 c2 b5 d5 f7 0a | d6 9e b1 7a 3e ed 98 33 3d ee f7 e3 13 87 69 c1 | b4 a2 57 16 53 d7 41 79 86 3b 2e a4 e6 52 7a 6e | 0b 74 58 0e 45 35 85 36 77 6b b0 71 9d 4d a2 91 | 8f b5 9e 28 e8 62 a3 5a fa 45 28 9c d1 6e 96 06 | 43 8c 31 83 80 4b 1a d0 1a 86 ab ce 70 87 d8 60 | 2f 53 50 9f 1c f0 aa 40 e7 82 42 00 ef ac c6 cd | 59 7e ba 8e d2 08 a8 07 ab e8 d4 09 1a 34 ae b7 | 19 6a 93 47 39 54 0e c1 ff ba c1 49 16 e9 84 6d | e4 d4 28 20 7f bb 1c 5a 50 ad ff 27 bb 53 3a 4c | fe f2 c6 66 38 c9 62 25 57 6b 7d ae 6f 82 66 61 | 8d 1d 48 cd 44 50 c2 df 28 86 79 e8 45 6e a1 90 | 4c 22 91 9e dc b2 7e 6c 6c e6 a2 de 0a 17 03 3b | bc 26 ef 26 39 74 28 83 5b 3a fc 73 ca d0 c6 57 | 8a 02 2c 0e 18 5b 99 8c aa fa 43 b4 a9 f7 75 31 | 51 42 a8 eb be 2e 35 d9 44 1d 6b bc c5 2f 8c 87 | 29 00 00 24 01 dd 2f e6 eb 4b af 32 1c 79 d4 4c | 09 c2 78 82 23 70 b2 bb 85 ac f9 94 71 a9 92 05 | d7 ca 31 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 97 94 2c 62 c6 59 3e 48 9c 81 ce | 06 c1 b8 e1 6f 64 53 c0 00 00 00 1c 00 00 40 05 | 6e fc 22 43 8c 0a 59 5f b4 df 17 9d e0 72 a9 ba | 64 42 3f 26 | libevent_free: release ptr-libevent@0x7fb3680752a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad8480 | #742 spent 0.063 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #742 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad4380 | handling event EVENT_RETRANSMIT for parent state #585 | start processing: state #585 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #585 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #585 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #585 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.726793; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.438951 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad8480 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #585 | libevent_malloc: new ptr-libevent@0x7fb3680752a0 size 128 "road-eastnet-nonat-56" #585: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #585) | 4a 2d 06 a5 9b 4b 99 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 29 a0 67 33 95 5c 1d b9 11 2a c0 eb 4e 4c a9 | e0 4a 90 97 d9 14 6c 5c fa c2 84 25 94 ed 30 2a | b0 88 7c 51 d2 d7 ff 29 a2 e1 b8 25 0b 85 ce b7 | b2 12 f6 3a bd 7c d3 5e 0a ae 7c e5 dc a9 b5 e0 | b1 73 f8 5b c6 30 50 76 ab ce 7d 60 1b 21 f2 24 | de 59 93 e2 2f 8b 16 ba cb 3a 00 66 a1 42 8c d0 | f2 69 c8 bd a5 c5 17 99 23 d2 e7 08 52 58 cf 46 | 18 6a 5f de 56 35 01 8c d2 ff 97 28 1d 1b bb 92 | 48 6c 2a ec 7b 82 4c 83 40 17 8c 13 5d fb 0c ea | df 44 dc d0 94 b6 10 69 f9 90 b9 8d ee 30 ce 05 | e3 86 29 c2 e5 c6 ce 54 2b ff d1 3d 10 ca 32 02 | 12 72 23 d7 dd b3 7f b0 17 38 2e 43 6c 10 4a 0f | 86 3b b1 4d 71 cb 29 6b f7 89 2e 9c f1 20 88 1c | 84 7f 4a a5 ce 80 ec a8 9e f2 52 7b 0c bb 09 70 | c6 d1 fd 42 0e b3 07 8b 67 74 82 05 59 36 9e 22 | c4 7c b2 4e 57 7b 68 cc 85 67 3b 47 1f 9f c7 67 | 29 00 00 24 28 e8 a9 33 f5 cb ea 77 ac 0a f0 23 | 81 90 3e d5 9d e8 ea 75 7c 29 f7 bb ce e1 94 cc | 81 10 ca e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e1 7f 8b 08 d1 d7 03 c9 45 07 dd 1c | f2 db 4d da 97 13 01 ed 00 00 00 1c 00 00 40 05 | 1b 39 fc df 1f 4f 07 bc 04 62 76 b3 b9 a8 ed 18 | a7 41 03 5e | libevent_free: release ptr-libevent@0x7fb37405f150 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad4380 | #585 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #585 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368040840 | handling event EVENT_RETRANSMIT for parent state #711 | start processing: state #711 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #711 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #711 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #711 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.726865; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.496838 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad4380 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #711 | libevent_malloc: new ptr-libevent@0x7fb37405f150 size 128 "road-eastnet-nonat-186" #711: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #711) | 46 de dd ae 1b 33 3b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1e fb f8 69 eb 92 56 fa e8 6b 80 bd 3a a2 f1 5d | e2 2f 9e d6 bd 7f 97 c8 b3 8b 02 5b 38 41 e1 ee | 42 a6 3c b3 1b 0e f8 ed 2c 61 73 24 75 ee ff 11 | 80 e8 65 c5 04 0b 39 c2 cf a9 e0 e7 ea b8 69 59 | 88 22 65 ae 2e 6e ce 7a 3b 8e 9b 5b ae 73 1c 45 | a6 ad 6e ff 7d ee 57 ae 75 fe db 29 33 14 d8 3e | 84 01 d5 70 75 bc 33 43 cd 9a a0 3d 7a fa c8 fc | 80 64 21 7f 34 0e a8 e0 72 05 42 a2 8e f8 64 07 | 62 20 d0 e7 cc 2d 35 50 67 31 52 27 ea 4a 4b f5 | 65 1f c8 ad 67 9b 47 53 9b 2a 89 ab 3e 19 8c 26 | e6 31 27 4a fe b0 71 d9 94 76 e6 64 92 ba 3e 1f | 40 a8 76 db 49 ed 4d 4e 20 ff 29 d6 24 a3 26 db | a5 a9 f6 f0 13 de f5 16 c5 c8 94 6b 66 f0 42 99 | 03 d4 dd a2 4b 2b 63 3c 83 09 26 b0 bf 90 c2 8e | ca 70 e7 02 59 40 bb 5d a0 d8 f9 cd ca 9c 92 09 | 26 05 b9 92 8a d9 e6 4b fa 8a 50 3c b1 69 e2 b7 | 29 00 00 24 c3 2e 34 07 d1 26 64 7f 7d a5 2a e0 | 34 43 1a f1 ce 3a 79 7d 9c a6 d5 be 0a 57 a8 05 | ad df 51 bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 81 0e 00 c8 04 84 dc 32 f7 ff 89 | 08 01 7a 69 9d 96 cf 86 00 00 00 1c 00 00 40 05 | 8b 19 f6 3c e3 44 56 e8 bd d2 d9 5b 06 2a 9c bc | df fe 2c 91 | libevent_free: release ptr-libevent@0x7fb36409b8a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368040840 | #711 spent 0.0649 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #711 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #738 | start processing: state #738 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #738 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #738 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #738 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.726938; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.507806 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368040840 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #738 | libevent_malloc: new ptr-libevent@0x7fb36409b8a0 size 128 "road-eastnet-nonat-228" #738: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #738) | 25 78 f8 28 10 61 9d 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 51 72 b7 05 5e 83 a3 a0 07 12 24 3e 92 83 b8 | 62 3a f9 f5 51 87 2b 5b 57 43 01 a4 66 eb 6e d1 | 36 fd bc d6 d3 df 99 92 4a 90 d6 55 13 f9 57 37 | 57 21 91 58 59 45 7b fa 72 46 a4 36 22 6f 56 d8 | b6 6d e1 0f 87 84 b3 2d 12 ce f5 5a 2e d2 8f f7 | 2b 01 97 28 81 dc 2a 4f 14 69 dc 31 63 bc a5 23 | 42 8f 99 35 ae 7a 8d f1 f8 fc 1d a7 d5 69 74 4b | 4e 98 fb 39 77 73 f9 c2 8d 2f 88 65 14 8e 49 62 | b0 f1 74 23 17 c0 59 7f 25 06 94 30 cb 35 da 14 | 1a 23 e5 07 95 80 6a cb a7 fe d0 d5 8a 1f 10 96 | bf ab f1 96 54 c3 82 d2 6e 6d 0c 64 bb 6a 3c 73 | 83 0b fd 52 5c d9 5e a3 74 f9 c3 2b 08 19 82 dd | c6 8e eb 37 6d 26 f4 d6 e5 ff ff bd 35 5a 0e 11 | 00 7d 5a 8c 85 d6 d6 a8 98 8a 86 a2 3a 0b 85 a4 | c6 6f 0c 94 ab 7b d2 e2 18 f7 d7 59 10 f4 62 a1 | f4 5c 31 8a df 18 a0 2b 20 3b 40 bf 17 df 1d d5 | 29 00 00 24 97 c7 a3 d7 59 e9 31 22 90 b1 59 6b | 1f 7e 8d 5c 35 7a 89 f4 a1 7c 76 7f ab 92 a2 52 | c8 bf 0f 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 91 a4 00 33 c0 fc 8b 25 9b dc 30 | 06 39 ac a5 a1 25 3d b9 00 00 00 1c 00 00 40 05 | ba 61 e3 c1 d1 2b 93 b6 88 33 74 02 de a9 63 56 | ec 2a 1e 1d | libevent_free: release ptr-libevent@0x7fb34407a660 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | #738 spent 0.0649 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #738 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a3a590 | handling event EVENT_RETRANSMIT for parent state #687 | start processing: state #687 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #687 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #687 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #687 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.727011; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.507276 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #687 | libevent_malloc: new ptr-libevent@0x7fb34407a660 size 128 "road-eastnet-nonat-117" #687: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #687) | ce 83 a7 9c 1c 97 2e 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 94 51 72 79 a4 28 3a f0 f6 12 68 84 e5 2d d5 | f6 aa 47 a0 d1 ff f5 a6 1a 2c 25 a6 01 58 40 fc | d1 95 56 17 97 c4 d8 d7 89 0f 51 18 3b 4c 8d f6 | ee fb ab 56 d0 0a 15 fd 6a c8 e8 89 62 5e b8 5c | 57 fe 05 8e e1 ea c9 e7 84 08 05 71 31 9a dd 16 | 0a 25 f1 1a 29 58 f8 06 86 68 fa fc 99 8b 12 42 | 09 ec 17 e1 a1 09 76 fc 53 b2 55 2f 51 28 14 aa | bc fd 76 5f c5 9a ba 18 29 7b 2d ad 6a bf 47 24 | 5d a5 36 0f 60 68 25 fb f2 8e 9c 88 47 ac 61 32 | b1 6f 1c e3 4c ea 94 2e 13 72 9f 40 c9 32 9e a5 | 55 17 b5 71 af 30 28 4f 48 dd 3d 1c db eb 87 a6 | 1e c2 d8 26 0c 79 1d 68 4b e4 5c 9d 70 1e da cb | bf 7a 87 cd ee 4f da f1 be 6f bd 22 fa fe fa e8 | 01 cf f5 ed 00 5b 60 c2 39 47 45 cf d8 5c e9 07 | 6f 88 d8 c1 70 38 c4 08 e2 b7 20 9d fc 6d 35 32 | 43 d1 2a f8 21 b9 12 49 96 d5 3b 06 a1 81 56 f4 | 29 00 00 24 90 27 10 b2 cf 6a 00 ae d3 c4 a0 c5 | 23 4c 05 8c fe 6e fb 12 c4 ef 71 e8 a5 33 dc 9a | 79 4a a8 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 e8 b6 32 ca 26 78 2c d2 a8 a0 44 | d4 75 0b 9e 75 b6 57 86 00 00 00 1c 00 00 40 05 | c5 19 67 c6 b1 38 40 1d 0b 22 02 fd ab 47 ee cb | 20 29 33 72 | libevent_free: release ptr-libevent@0x7fb350093270 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3a590 | #687 spent 0.0688 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #687 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a86b80 | handling event EVENT_RETRANSMIT for parent state #710 | start processing: state #710 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #710 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #710 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #710 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.72709; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.494869 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #710 | libevent_malloc: new ptr-libevent@0x7fb350093270 size 128 "road-eastnet-nonat-208" #710: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #710) | 54 dd ed 5a b3 6d d4 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e ae f9 c6 c3 35 9e cb 30 7a bb 1c 00 fa 4e a9 | ac fe 61 1a 01 79 34 2a aa 66 47 75 0d 14 d5 58 | 3d a3 f4 3b 2f fd e3 8f 66 3f d8 83 34 dc f9 53 | ad 76 ca 6c 43 c4 37 d5 67 c9 87 27 ce 69 69 cf | d7 db c7 63 3d a9 5c 21 2d e2 b8 c4 ed 1d ee 03 | ec f9 0e f1 a5 e6 d0 de f8 48 19 8c b1 f7 9b c0 | 1e 79 2e 85 00 e0 3b 1a 5c 6b 87 68 67 17 48 2f | bc 80 b2 6f 4c 41 39 fa 87 e1 62 4f 73 1b a9 5c | 60 de 48 93 9e 02 e2 ec 15 c2 11 32 e4 d6 d4 d8 | 5b c1 d7 7b 6b 58 5f d6 b1 1a d4 fb 32 e3 da 05 | 6e 83 83 d0 d8 9a e3 19 01 2d e0 27 eb f6 d0 d3 | f7 36 9d d5 66 d2 27 1b a7 be 3d df fc 08 16 fa | 28 57 f9 eb 66 43 05 f6 6e 1e f9 24 82 ef 4e d5 | 64 d8 6a 66 63 24 d1 49 d8 f2 45 0b f7 74 80 63 | ff 22 38 7b 7e a0 c3 5f 50 b2 0f dc 7f e8 39 75 | 4b 1f f7 7d e6 ab 3d 0d ee 3f a4 d8 d2 50 29 5b | 29 00 00 24 ab 44 c4 18 c2 85 94 a9 eb c4 70 9c | ed e6 ea be 91 bb 1f 29 3e 10 f2 4c ff 43 63 b0 | b2 3e 00 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 2b 3b c2 86 c3 af b9 48 0a 19 78 | 34 27 e8 b2 13 ec a6 3d 00 00 00 1c 00 00 40 05 | dc 19 d9 87 b0 ce ef 70 e8 93 5c 55 1a 39 4b 4f | f8 02 f2 ae | libevent_free: release ptr-libevent@0x7fb3800907b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a86b80 | #710 spent 0.0657 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #710 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #744 | start processing: state #744 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #744 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #744 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #744 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.727165; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.505225 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a86b80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #744 | libevent_malloc: new ptr-libevent@0x7fb3800907b0 size 128 "road-eastnet-nonat-209" #744: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #744) | ea 7c f7 bc 9d b4 d4 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 10 35 c8 dc d8 d8 41 53 59 49 7c 7b 44 aa 05 | 7f 67 fe c6 28 2a e8 7b 99 25 f4 0d 41 65 04 49 | 3f a5 ca 32 7e 94 c7 70 6b d5 d7 5f 8a d3 f2 1c | ca 3a c9 ae 29 50 6e c5 9c 99 e5 19 7a ca 2b 5a | 20 96 8c 54 9e 1b 8d 21 df 3d 1c ae a9 b2 f2 dd | 61 db 05 94 26 c0 73 9c 28 14 1e b4 32 df 8d 11 | 60 18 79 0a 1f bd 12 12 40 ca a3 c4 d1 34 dc 28 | d8 6d 71 58 2c 9e 25 5c f3 a4 a3 a1 e0 08 9d 79 | a3 8b f2 2f 94 27 6a 94 a9 dd 70 db ec f6 52 82 | 6e 5a 66 cc 95 16 57 c1 a4 fd 5b c3 f0 1d 4f 6e | a7 3b 22 2a eb 3b 0c f6 18 dc ec 5e 03 2f 91 2c | 65 23 6f 5e 2b 65 fa e2 5b 10 85 ee 91 82 62 ff | 39 4e e7 48 1f 63 84 b9 93 73 90 ab e3 44 21 75 | 99 ff ff 9a 14 1d 56 ee 54 ba 7e 72 40 d2 9e 35 | 7d d1 3f 98 ac 5b e2 19 e4 12 13 62 7d 18 8e 06 | 2d 61 f4 df a4 3e 70 b2 f5 55 a5 83 ab 24 20 04 | 29 00 00 24 05 e4 d5 07 4d b5 53 19 e9 74 fb 1f | 81 a4 d4 c0 b2 e7 21 de 08 06 9a f0 79 05 4e 6b | 6b 45 0a 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 6d 3b fc 06 c6 19 b7 65 37 87 f1 | 00 58 b3 97 c1 ac 1d 38 00 00 00 1c 00 00 40 05 | 84 2a 82 65 99 0a c2 da 62 53 b8 d5 7c fd d4 dd | e5 91 5e 42 | libevent_free: release ptr-libevent@0x7fb370074f70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #744 spent 0.0658 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #744 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a45350 | handling event EVENT_RETRANSMIT for parent state #739 | start processing: state #739 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #739 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #739 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #739 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.727238; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.504394 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #739 | libevent_malloc: new ptr-libevent@0x7fb370074f70 size 128 "road-eastnet-nonat-224" #739: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #739) | df 19 f5 78 1f 7f 61 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 b4 0b bb a9 64 88 87 98 2f cf 2f 72 90 24 8e | 27 68 e4 41 53 39 08 7e 9a 9d 01 79 8c 46 b5 7e | 94 53 70 3e b0 27 b2 82 8a 26 9d e8 0b 19 4b 92 | 2b 7d b3 c3 c4 b5 0b 70 2b 92 ac 96 4c 0c 66 2f | d2 61 eb 15 ed 06 25 36 5e 2a 3f a8 42 0d d0 94 | ae 7d 6f 48 35 8f 38 64 d1 29 e3 a9 12 a1 3b 9a | 37 6f f0 36 59 2c 69 bd c2 85 29 7c f5 fb fd db | 33 21 05 b9 47 40 46 26 f2 67 5e de 98 c9 70 43 | 38 06 63 f6 fd d0 82 9d 53 05 3c 2c 8e 1c cc 05 | 21 99 f3 4f 03 c8 cd 4f 9b 06 f6 fa f8 36 e3 35 | 25 9b ee fa bd e1 7b 3c 24 42 c1 43 67 a4 52 26 | c9 ad a5 ca 68 eb 61 44 9f 85 d4 ad 39 d3 08 f8 | 0c 18 de 7d 80 97 a9 b0 17 1e dc 70 64 63 2c 0d | bd e4 be 7a df c7 e0 58 87 37 3d c3 42 94 6e f1 | 48 66 02 c3 74 33 ab 1e 5e 12 8d 34 8d 1f 0b 16 | f3 77 bb 3c fe eb 42 5e 87 af e0 78 62 33 b9 fc | 29 00 00 24 fc 37 68 c7 2d 53 22 1d 51 4a 71 4e | 46 28 97 f7 6a 0d 4a 96 60 fa 96 05 69 86 9a bc | f2 f0 69 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e0 2a f2 c4 e2 df 1f 60 02 ec 7a 42 | 09 ed ca d8 77 e1 6d 1c 00 00 00 1c 00 00 40 05 | 4f 71 3a 48 ff b5 1c f9 41 72 89 68 75 9e 7b ee | 5e b8 7a 66 | libevent_free: release ptr-libevent@0x7fb33808a5d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45350 | #739 spent 0.0644 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #739 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb33801d710 | handling event EVENT_RETRANSMIT for parent state #734 | start processing: state #734 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #734 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #734 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #734 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.727311; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499422 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45350 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #734 | libevent_malloc: new ptr-libevent@0x7fb33808a5d0 size 128 "road-eastnet-nonat-174" #734: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #734) | 14 ad 8f c6 54 da 73 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 2f 5d 76 c2 4f 1f 02 6a 67 83 af 07 ab a2 bd | 9d b0 56 b4 74 93 21 23 d5 0f 1b 1a 3c 05 90 db | 39 cd bb c0 0f 27 b0 be e7 30 10 fc 0c d6 85 d9 | f5 60 17 39 55 ca cb 5e 73 d2 3f be 8a 82 60 c9 | e1 41 42 b2 6e 78 88 06 40 0c 17 95 c2 17 27 23 | 90 bd f0 73 5c ee cb d6 c6 aa 04 22 1d c0 10 38 | fb 77 ae 2f 0a 4f c0 01 c1 29 59 fe 35 87 fe 76 | 67 9f e2 74 4b ff 95 18 5f 7e 94 c6 c7 e6 07 67 | a5 35 e2 f5 32 f0 ec 4b b5 8b 9c f1 7d c8 0f 0c | 14 d9 4b c5 b9 27 1c e0 42 84 b9 a8 08 9f 75 1c | a2 e5 c6 44 e5 22 9a 7d ee 05 4e 75 55 a6 96 62 | 19 7d 76 44 2c a5 59 2c 17 a4 18 38 23 2d 1c 58 | 72 f3 bb 2e 0b 81 64 e9 5c 10 3e 22 02 85 a0 c4 | 22 29 f1 c6 45 f2 7a 20 5c 0e de 01 c6 aa e1 c8 | 76 a4 85 5f 79 3f 64 df 47 3f dc 65 47 83 a7 3a | c4 4e f9 47 98 cb 9d 5b c7 13 e3 7c ce 08 53 f9 | 29 00 00 24 f6 bf c4 84 2e cb dd 02 8e 3f e7 e1 | fb 91 00 da cb 72 7d c0 8f b1 0e f4 82 ab 9b 50 | c3 13 1d b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac e5 9c 84 e2 ae 2e 54 0f 4c a4 7c | d6 9a 1b 89 f2 f4 09 5b 00 00 00 1c 00 00 40 05 | fb 5a 36 f0 d4 c4 17 31 be e2 a0 e0 6f e2 a5 d0 | eb e9 f5 19 | libevent_free: release ptr-libevent@0x7fb35408aee0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33801d710 | #734 spent 0.0633 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #734 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b24700 | handling event EVENT_RETRANSMIT for parent state #728 | start processing: state #728 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #728 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #728 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #728 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.727382; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.497025 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33801d710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #728 | libevent_malloc: new ptr-libevent@0x7fb35408aee0 size 128 "road-eastnet-nonat-216" #728: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #728) | ed 95 ac b7 77 3a 63 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da a2 78 27 f5 2b 54 2f 55 96 c5 81 6c 0c a3 b6 | 83 12 f5 d9 b8 01 ba b8 d1 a3 42 87 c7 6c 10 0b | 63 a4 94 ca d4 f6 e8 4d 22 ce 05 39 88 91 97 f2 | bf 09 37 b9 98 b1 d8 26 bb b2 1e 92 29 a1 85 7b | d9 b4 11 29 68 ff 40 91 35 9a 09 da d2 cb 07 e0 | ae c3 2d ed f0 4b 10 75 57 d6 65 48 df c7 a2 4f | 3e 00 5e 43 75 06 44 c7 49 4f d8 29 1c 6d 72 c2 | 18 aa 3c c4 95 78 2a 63 17 27 ba 03 8b b4 08 69 | 8a 41 ef 22 d5 36 45 8d d5 f1 45 ce bd 99 4c 4d | 22 ad 81 3f 5d 00 25 1c ad bf 2e f7 8e 8c 80 7b | 93 69 16 30 fc 43 30 2d 8f 1d f1 a2 b8 cf 8e 13 | 28 9a d4 35 b3 7b 77 53 24 b9 b6 62 c4 97 31 69 | 7f 76 13 0e 62 30 c6 ee 48 5c 32 ac fd 53 7f 7a | b6 10 d9 5f 7f 00 e8 b0 6d 1d 12 23 94 fa ae 8f | 68 f1 36 29 a4 6a f8 df 72 30 2e d8 f7 b9 49 8c | 43 c5 19 cb c2 38 18 75 d9 fc 13 c1 7d d2 e2 e9 | 29 00 00 24 e5 63 4e 91 26 c4 75 00 d8 52 0a 1f | e4 6e 1e 05 a3 b4 ec ce fa fc d1 db 89 1d 66 0a | aa 77 5c 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 d6 04 97 64 cb df f6 9c 65 fd 98 | bb ed f5 4e d4 61 43 0a 00 00 00 1c 00 00 40 05 | 5c 17 83 01 62 b0 09 8f af 57 ad 85 0a ed 60 b0 | 19 a9 47 40 | libevent_free: release ptr-libevent@0x7fb384081730 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24700 | #728 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #728 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c023c10 | handling event EVENT_RETRANSMIT for parent state #577 | start processing: state #577 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #577 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #577 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #577 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.727455; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.44131 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #577 | libevent_malloc: new ptr-libevent@0x7fb384081730 size 128 "road-eastnet-nonat-15" #577: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #577) | 9a e9 29 4a fb ed 2f 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb 42 00 89 a8 1c aa c4 50 d8 16 0d 57 8a 4c 0c | 65 7f e4 c6 cb 70 da 12 6d e2 7e 03 21 93 d2 33 | c0 0e 36 f5 83 0c 2b 56 86 5b 5b 11 98 4d 5e 26 | 1b d6 c9 20 6f 52 e9 5a a4 2c 26 ed 04 b2 dc be | 5d ce 66 9c 58 f4 61 27 fb c1 4e 8a 69 60 4b bd | f0 4f 86 25 0f a2 2a bb fe 4f 50 ef a2 d8 d6 78 | 6c 29 24 25 fe 51 e0 6c 3a c0 fd 3f 00 f0 3a f4 | 91 32 2d e3 b6 e9 c2 02 b0 11 e2 cc 36 2c 5f 10 | d5 2c ac 60 4a b1 d5 39 16 8d 42 4d 99 5c aa 84 | 91 c9 31 b0 23 ba 96 66 57 3d 13 7c 31 a0 b2 bf | fa 79 80 3a 47 a1 84 04 8d d1 db 1f 63 3d 31 9f | 0d 65 07 7c d8 39 05 9e 48 0a ce ef 34 aa 84 80 | 97 ab 9b 1c e2 7f e7 6e d5 2d e8 2c da be dd fd | a4 36 1e 62 ea bf ea e8 63 2c 01 66 94 be 8d 91 | a8 b7 16 4e 15 f7 b4 a4 5f 2d 8d 36 c0 1c 88 7f | de 2b af 28 ec 3a 09 33 ee 83 97 d2 90 d0 8d a7 | 29 00 00 24 88 b2 79 ff 2c a8 2c 3e 30 78 3a f8 | a3 fb 41 22 e8 46 1c 6c 2e 90 10 b7 fd 31 f8 c3 | 36 1a 6c 24 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 44 a9 8d f4 0a df ee dc c8 f6 79 | 31 59 33 9e 08 98 28 4b 00 00 00 1c 00 00 40 05 | 1f 98 b4 df a5 90 16 30 b3 41 56 5d 2e 2c cf 6b | 1e d4 e3 0a | libevent_free: release ptr-libevent@0x7fb34c059570 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c023c10 | #577 spent 0.0697 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #577 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_RETRANSMIT for parent state #698 | start processing: state #698 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #698 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #698 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #698 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.727541; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.492629 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c023c10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #698 | libevent_malloc: new ptr-libevent@0x7fb34c059570 size 128 "road-eastnet-nonat-211" #698: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #698) | 21 cf dd 23 b6 bd 0a c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 b6 1b 2d 49 8c b5 f8 7a 69 c7 b2 f5 d8 79 d8 | 26 12 23 12 d2 76 1c 08 cb 2b 6c 70 8d 69 a0 f1 | 6d c2 d1 02 bc 20 a3 cf 4b db 02 4e 02 bf 9c ef | 06 4a dc 18 d2 74 58 2b 58 67 f8 e8 0a ee 59 ea | 16 9c 3c 75 07 d4 f6 13 6c 2f a8 d3 16 3a 01 5c | ab a0 57 0b d9 a8 0a 28 86 75 df b0 c3 1a 3d 57 | 9d 10 56 0c fa 92 43 8e fc 2e 85 4b ae 97 bb eb | 66 96 a0 3b 93 fb fc 3e a4 7b 85 51 68 c7 6b 35 | 6e be 0c 7d fb 30 17 ba 33 cd c8 32 b2 53 83 47 | 2e af e0 72 a9 4e 53 16 57 a9 ed 18 35 80 e6 11 | ce ef 2a 39 6c 7a 1c 80 7d 2d 86 be 0f b3 d1 2d | 8e 73 69 25 8e 2d cf 22 94 9e 26 1d 06 89 aa 00 | f6 e5 b6 1f d1 6d 2a 5a de 51 70 67 1f dc fe 84 | 10 da 29 d2 fa dc 69 4c da 42 f1 0d f5 d6 7b 01 | 9b 82 d0 81 2c ec 44 13 52 ae 3a 49 a4 a8 b1 17 | 13 9a 7a f2 8e 7c 90 d0 e4 37 60 4f 27 eb 74 fb | 29 00 00 24 c7 60 58 05 d8 38 44 75 17 ec b3 37 | 6c b6 72 ff f9 94 ef 8a 21 a9 54 7a 0f 5c 8e b8 | ba 44 9b ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 1a ed 35 4d 8e 31 1b 88 ca 39 40 | 08 de 5b cc 57 86 57 d8 00 00 00 1c 00 00 40 05 | f8 2a d9 b9 24 84 74 c8 e3 0b 5f 27 a7 30 52 df | 0f 06 8f 7c | libevent_free: release ptr-libevent@0x7fb37006f790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | #698 spent 0.0905 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #698 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368034dd0 | handling event EVENT_RETRANSMIT for parent state #700 | start processing: state #700 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #700 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #700 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #700 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.727647; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.488031 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #700 | libevent_malloc: new ptr-libevent@0x7fb37006f790 size 128 "road-eastnet-nonat-105" #700: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #700) | 00 c1 02 d2 ce 58 22 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 38 f6 d2 66 d7 37 75 8a f0 3e e3 b7 32 d6 41 | f5 9b 8f a2 62 4a c2 2b c9 04 e2 82 df 16 b1 e7 | 53 45 e9 b0 d2 33 ee 18 d1 c5 9a 70 cf 68 0f e5 | 32 d6 f3 5b 1e ba 36 1e 40 b2 2b 52 74 e4 c5 52 | da 47 f2 0c 1b a7 d1 57 3a 88 c8 c9 39 c5 dd 03 | 07 4e 94 a0 a1 1d 2c ea 30 74 62 8d 86 0a 47 96 | 6e 86 43 84 d1 9e 1d 48 ef 3c 77 aa 61 b1 d6 36 | b5 4d f7 2a 16 ea 31 f3 6f f0 30 8c 27 0f 36 c2 | 5a 32 4b 7a 99 fa 8a a2 52 1a 48 1a 84 31 7f d9 | a1 19 01 60 f3 03 bc b4 7e 3c f2 20 4b db 82 e3 | 91 8a 04 5c 39 59 a1 c6 c7 13 9b 06 59 aa 49 26 | 58 66 03 6f a1 ee ab cf 66 8f 67 f8 d0 fc b3 18 | 94 eb b8 a7 2a a8 67 57 97 49 ca 42 b2 b5 7b d2 | 6e 59 f7 fc 58 0c e9 3b 1a b2 35 58 47 0e ce 90 | a5 dc 15 a0 5d 7e 82 46 b9 36 49 bb 5b 6e 43 bf | 1e 14 f0 70 04 11 dd c3 af 14 0d 1e 44 19 e8 dc | 29 00 00 24 ee 23 8c 3a 20 c2 eb 31 90 b4 e3 3f | 38 ea ba 83 7e c0 b5 92 52 31 23 9c 2d 4d f8 74 | 94 8a 3c ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 5a 78 4c 93 64 72 5c f7 62 e1 2c | d0 64 cd 9a e4 f1 0f 34 00 00 00 1c 00 00 40 05 | f9 4f 20 e0 84 05 11 01 b8 04 b9 53 7d c7 40 89 | a2 bc 5d 64 | libevent_free: release ptr-libevent@0x7fb368064ab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368034dd0 | #700 spent 0.0946 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #700 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb364044c30 | handling event EVENT_RETRANSMIT for parent state #594 | start processing: state #594 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #594 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #594 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #594 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.72775; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.450781 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368034dd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #594 | libevent_malloc: new ptr-libevent@0x7fb368064ab0 size 128 "road-eastnet-nonat-81" #594: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #594) | 14 02 06 51 b1 9f 6a a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd 01 b3 9f af 09 be 89 fe fb 88 0b 7e e8 81 63 | 3e a8 ca 5b cb 2b 71 61 2e 3d 71 13 67 81 27 7f | eb 09 e9 81 30 e6 ac e6 a5 a8 3b 20 84 58 c8 8e | 6a 8b fc c9 8a c5 b6 c5 c4 e6 6c f7 d0 89 56 fa | e1 09 5c fd 09 c4 5c 8e a9 af d1 7a 3b a1 f4 b6 | f4 3f 0e 9b a9 94 b9 07 50 f1 fc bf a3 65 7f de | 3a 00 2f 52 8f 64 57 78 ce a7 f9 c4 ca 58 9d 51 | 1b 37 06 31 32 08 90 da a6 51 c5 05 d8 cf c0 4f | 6d 65 03 f8 31 ce 3e 2a 1f 85 59 ce 64 5d bd 91 | 39 62 91 67 e1 9a c3 02 a2 c6 12 25 4d 06 14 65 | 6d 4a 67 38 16 9a f3 0a 7f 67 14 d2 64 51 73 a3 | e8 d4 99 7f 98 eb 17 a7 87 c4 3d ef f7 49 b0 e7 | 3a ee 43 b6 89 d7 8e f9 6d 93 94 5f f6 b9 7c ae | ad a8 c0 d7 b6 71 30 2a f0 19 1d a7 ef c7 69 67 | 34 56 cd 9a ca bc 4f 05 69 d7 a7 23 37 a8 31 2d | ac 76 9e 29 2f 6b f3 a4 f9 9b 74 9e 13 92 6d f7 | 29 00 00 24 bd 30 97 0e 1f 3d f9 71 c1 31 b3 cc | d2 39 eb d3 0e 5f a7 cb d6 93 2f f7 82 b0 8d 4f | bd 25 0f a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 ad 41 74 91 af 29 e4 13 15 1e a9 | 90 db 4d 21 18 96 06 09 00 00 00 1c 00 00 40 05 | ae cb 83 03 f3 ff ad 0d 96 aa 50 d8 b2 3b f6 cf | f4 56 d5 60 | libevent_free: release ptr-libevent@0x7fb364064990 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364044c30 | #594 spent 0.071 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #594 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #689 | start processing: state #689 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #689 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #689 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #689 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.727827; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.487131 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364044c30 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #689 | libevent_malloc: new ptr-libevent@0x7fb364064990 size 128 "road-eastnet-nonat-74" #689: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #689) | 21 56 6d 63 c6 05 f9 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 01 41 94 ac c1 3b a7 91 84 87 0b a2 a6 2a 82 7c | 5e 57 2f 03 c9 50 17 da 1f 5e 13 47 67 fa 54 af | e1 23 cd 52 df c1 70 c5 84 49 39 0b c5 51 17 f4 | cd ae 0e 3a e4 ec 94 66 23 c9 e6 22 7e 29 fd 87 | 37 38 1c ba 2e c0 60 73 13 eb ed 91 72 d4 bf 43 | 0d 48 d2 56 0c 3e 10 c8 f6 a9 5e ca ed 70 78 7a | 2d 43 f8 86 71 ad ba a9 b9 a1 81 89 e4 be b1 13 | b3 4b e8 ac 5a 2b 85 9a 9a 62 39 e6 1a 55 c2 9a | ac ed 6f 11 df 6c a9 36 a9 00 2f 5c 57 3a b9 87 | 71 1f 36 18 9d 01 e1 48 c5 c3 af 45 89 3d 96 5f | cf f8 ab 91 0e aa d2 78 b3 52 d3 de be 97 7f cc | 22 0b ca 63 0a bf 49 dd ee 6f 9a 13 ec 7b 53 68 | e0 00 32 aa ec ee 18 65 94 77 ae fc 50 83 e0 b2 | 02 cd f1 17 f7 f0 40 67 a4 a9 46 1f 31 e5 bd 59 | 77 0b f3 a9 e9 64 9d 77 4a 66 04 24 1e 03 df a8 | 95 ea 8c 8a d2 17 91 f2 54 af 53 a6 c5 e9 b2 6f | 29 00 00 24 2a 05 3d 7b 18 e9 5f 31 aa 45 2a 05 | 20 70 d9 99 68 5a eb f1 da 1e dd 98 f0 5c e4 e4 | 18 70 b6 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 08 c4 7c 53 4a 07 2c 37 8f cc 44 | c1 c2 6f ad 52 2d df e3 00 00 00 1c 00 00 40 05 | 39 71 42 f9 c8 85 a0 ba 5e c8 87 85 6f 23 eb 57 | 95 ba a1 9c | libevent_free: release ptr-libevent@0x7fb35c0292e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #689 spent 0.0656 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #689 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb338017ea0 | handling event EVENT_RETRANSMIT for parent state #697 | start processing: state #697 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #697 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #697 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #697 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.727901; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.488787 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #697 | libevent_malloc: new ptr-libevent@0x7fb35c0292e0 size 128 "road-eastnet-nonat-201" #697: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #697) | d6 28 cf ed 60 7e b1 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc b1 dd dd 9c 60 58 a9 c7 66 fb 23 cc 00 f7 04 | f9 eb 9c de 8f 73 86 22 d9 42 30 60 08 2d ef 14 | b6 50 8f 0d 43 3e 37 57 d1 c5 18 fb f8 0e 88 30 | 19 36 6b 7c 74 95 4f c4 00 aa 6d 70 5c 70 e4 1b | af 06 97 50 19 89 6c f1 77 c6 1e 80 61 54 71 33 | 94 67 d0 e4 1e d2 49 c7 d2 75 26 40 9b 38 29 7a | 39 9e 94 88 0a 9f 90 00 cf cc cd 5e 03 3f 80 c9 | 9d a6 0c 03 5a c2 81 22 47 79 c7 4e 2e 63 70 6d | 12 be 62 03 d1 4b 3b 92 59 d8 c4 10 0b e1 2c 6e | 7f 5b c2 f8 db a0 f1 b2 bc cf 2f ab d4 30 81 0b | 99 67 12 c3 46 3c 3f 42 29 aa 13 3e e8 5b 5b ab | 4a 06 c2 00 9d 12 7b ba b5 20 f9 e2 1f 9d 2f 8b | 8a b3 7d e3 d1 57 14 4c 7b d3 d9 0d 11 12 94 15 | 53 16 e5 df be 4c 89 d6 26 21 be 1f 80 ea d2 39 | 1c 6b a8 aa 75 fe 2b 99 57 d4 00 58 a5 b6 36 c0 | 15 f3 d2 55 87 c4 0d 66 47 0f 06 26 0e 04 3c 5a | 29 00 00 24 01 24 ca b1 15 4b b9 0a 03 0f 6f 65 | 30 b1 82 99 4d 99 95 24 13 7a fc 58 9a 3d 81 dd | ab d4 21 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 3d a9 82 f6 57 1d d7 c8 a4 72 46 | 84 4d cc ed 86 24 ec 99 00 00 00 1c 00 00 40 05 | 92 72 21 f5 94 19 6f 86 30 0f 49 01 9c c4 ab f1 | 49 76 f6 3d | libevent_free: release ptr-libevent@0x7fb3600720e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338017ea0 | #697 spent 0.0646 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #697 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aa34c0 | handling event EVENT_RETRANSMIT for parent state #686 | start processing: state #686 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #686 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #686 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #686 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.727973; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.49336 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #686 | libevent_malloc: new ptr-libevent@0x7fb3600720e0 size 128 "road-eastnet-nonat-142" #686: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #686) | 5f 2e 8d 4e 01 51 f9 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd 75 c3 99 94 d0 49 6c f2 41 a1 b9 21 f5 f4 0f | cb fa c4 3c b6 ed 66 7c ab e3 f2 e8 2e 27 12 8a | 22 59 ec f0 2a 87 a3 8e 7d 1a b5 1d 4d 94 79 69 | 0a dc ad bb 09 9e 15 d3 e2 0b 37 2e 62 3a 5c 44 | 5a 6a 13 ea 8a d9 81 e1 06 22 79 83 c5 03 93 eb | 16 80 9f 99 2a b4 9e 4f 75 89 1d 81 11 99 98 ea | 06 e5 44 c5 95 02 6e a5 42 20 16 09 35 8d c1 5f | ad 15 d5 1f 1f 57 05 88 ea cc 92 ed db 06 fe 1a | 82 63 44 2e 13 aa 34 76 7f e6 11 5f 8c 80 0a e5 | 8d 1a df 42 51 89 87 1a fb 90 a6 5f e4 9a dd a4 | 37 21 fb b9 b1 e3 09 83 44 2b 65 7d 43 06 5b ba | 59 28 4d bc 02 9c 72 d2 e9 d2 e0 e2 4c 4e aa 00 | 99 db 57 fa a3 66 fc cb f5 dd e9 0d 8d 84 3c c0 | 7d 68 be c5 97 df 85 52 da 1e 7a e7 98 0e 8b 72 | 16 20 54 89 82 82 38 c9 be e3 78 0f e2 0f db 8e | a1 b9 e8 11 42 59 86 ce 1a 8a 3d 26 c9 25 6e a4 | 29 00 00 24 7c b7 7a e3 3e 1b fc dd 37 45 25 f3 | 05 14 6e 97 6f c2 39 be ff eb 0d 21 64 ca 63 97 | 3b d9 cf d2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 06 a5 99 5f ab 55 20 b5 39 ab 53 | 31 c8 5b 7c ff 84 61 13 00 00 00 1c 00 00 40 05 | 2b 33 25 f9 c8 cb 8b a7 92 5d f6 e3 73 04 ce 77 | a4 d5 c0 8c | libevent_free: release ptr-libevent@0x7fb38808b5b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa34c0 | #686 spent 0.0655 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #686 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c017ea0 | handling event EVENT_RETRANSMIT for parent state #694 | start processing: state #694 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #694 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #694 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #694 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.728046; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.489808 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa34c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #694 | libevent_malloc: new ptr-libevent@0x7fb38808b5b0 size 128 "road-eastnet-nonat-229" #694: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #694) | 0e 55 f5 b3 fd c8 f6 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 f5 ee 55 73 5c 37 78 44 5f 18 4c b2 81 47 42 | ae 69 a9 34 a8 d4 9d 0b 90 c1 b1 7e 21 7d 72 4c | 54 93 20 2a f2 92 1d d4 f8 1f 47 36 29 d3 1b 6f | 9a 19 dc 80 ff 6e c6 91 f9 df ed 9a 62 30 f5 01 | b8 f1 04 a3 53 8d 38 fe 98 e7 59 ff 4d 11 d1 c2 | 74 10 60 78 7f 69 54 ea 74 e4 4a 27 75 1a 31 77 | ef a3 4e c6 65 ff d7 27 b4 5e d2 ff 26 bd 65 43 | da 2a 0b a3 b3 5c 1f d0 f9 5c ec 9a e3 39 79 a7 | e1 b2 2d d0 86 12 11 06 eb 7c fb f5 44 48 fb 7a | 82 16 10 84 83 c7 1c 9c d8 e9 3c c6 7c 4a 9b 09 | 70 75 2c b6 29 44 4a 9d e8 e2 23 11 a1 c0 82 38 | b5 09 f8 00 84 ef 12 3d 23 43 5b 89 e5 8c ce f8 | 8e 3c ab d2 ca bf 1f 50 d6 c2 77 f8 1b a3 3e 00 | 3e 0e 9a 9d 92 de 61 1c 3d 11 7b 3b 3b f8 ec 76 | 6c 1a de 42 6f 88 09 08 2c 91 63 7d 68 40 9a 06 | d8 f1 66 a0 3a 37 85 ba fa cc 00 41 c2 2c a4 8e | 29 00 00 24 dd 94 ae 1a 9a 0b 75 c4 7b 33 4c 19 | 1c 5a d2 2d 58 3e 32 91 a4 73 44 86 a8 08 b2 01 | fb 46 4f e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 49 27 31 06 cb 4b e9 70 41 8f 8b 42 | 1b a5 d4 66 19 e2 60 f0 00 00 00 1c 00 00 40 05 | 17 ce fc 1b 0a 11 3f 06 90 32 ce 1d 91 fd 6a 88 | d4 bc 2d 95 | libevent_free: release ptr-libevent@0x7fb378068430 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | #694 spent 0.0723 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #694 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348012630 | handling event EVENT_RETRANSMIT for parent state #673 | start processing: state #673 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #673 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #673 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #673 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.728132; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.490355 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #673 | libevent_malloc: new ptr-libevent@0x7fb378068430 size 128 "road-eastnet-nonat-152" #673: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #673) | f4 4a f0 3d b4 3d 3c 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 2e 28 e0 6e 6b 91 36 e9 7b 5c 4d ea 67 f2 11 | 6c 53 9b eb c8 50 22 a6 67 a8 57 27 ba 98 9b b4 | e9 53 e2 e7 39 12 9d 1a b8 95 df 50 89 b9 6d 1c | c2 85 59 43 95 c8 ac 8f 53 d2 47 55 bc 74 a8 bb | 28 f3 ba 97 8e 1e f2 17 85 ea 84 b3 be 86 51 d1 | 91 38 40 54 bb 85 c0 e0 e5 d5 70 2b c4 39 db 6d | 4b 3d 95 a6 d5 18 36 7a df 3f c0 b2 8e 51 36 6a | ef 02 e1 00 c2 a8 6e a9 10 12 26 9a ee db 58 a9 | ab 3b 04 78 41 3a 3f 8b ee d2 5e 48 4b 71 7d f1 | 52 f8 9a 0e eb 76 58 35 11 da 4a 05 95 53 81 71 | 78 25 df 02 2e c1 be 80 18 4a aa ee 79 3d 23 07 | d3 1a 11 f7 6e 6b 01 33 c3 1e bd bb f0 b7 41 e4 | 2f ff af 8b 2b 73 a4 f1 55 39 a1 c2 31 b7 e5 bc | 14 4f c1 d1 0c 4f 37 65 44 1f 1f 08 6a 1f 2e 2c | 11 ed 27 fa 13 cf d7 f1 1d ea 05 12 6d df ec 05 | fc 26 9c 3b 34 42 df 39 1d 37 77 1c be a4 76 ec | 29 00 00 24 ab e5 f6 4a 5c 04 aa f5 86 05 1c 45 | 9d 40 23 0d 87 34 72 f6 2c d5 7d fe a7 24 93 f6 | e4 ca 8b 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 0f 59 d6 bf b6 98 37 0c 06 6e b8 | 72 17 35 a4 3d ff 36 60 00 00 00 1c 00 00 40 05 | da e9 98 a0 13 2a 7f 02 39 d7 88 7e 43 33 16 b8 | 3d f0 bb d6 | libevent_free: release ptr-libevent@0x7fb37407a8b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348012630 | #673 spent 0.0643 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #673 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a56dd0 | handling event EVENT_RETRANSMIT for parent state #680 | start processing: state #680 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #680 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #680 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #680 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.728205; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.491159 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348012630 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #680 | libevent_malloc: new ptr-libevent@0x7fb37407a8b0 size 128 "road-eastnet-nonat-111" #680: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #680) | f5 24 ca cb ba 88 21 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 2c 8a fa 61 5b dc 75 21 43 9c 59 cd 19 1a f2 | af b9 0a dc 0c b9 2c e2 bb 4a 6d 4d 55 00 0f 6d | f7 55 26 a5 be c3 6b d0 d6 97 e8 89 bd 9b af d2 | 2f a7 07 fa cd 16 db 98 51 25 2f 47 ee 80 b4 75 | e5 4e c2 eb f9 dd 90 41 c4 eb ff 65 55 5a 16 e1 | 0a 63 9d 2c a4 d7 be 5f bb 29 e9 20 d4 b4 c6 c0 | 19 93 f4 ab e8 7c 18 0f 67 18 9d b1 ee e2 c4 b3 | db 86 22 91 09 29 2e b1 6d 58 cf 74 cb b0 f3 dc | 97 d9 3b fe 88 19 02 5d 3d 14 58 0a 5f 84 05 fc | ca 52 61 f1 b4 87 0b 56 9d 30 94 86 cc 24 e5 40 | f9 97 d9 e9 cb 69 4b 23 cf 2e bf f3 2b 4d 07 51 | 51 02 3a d7 fd 40 d4 5a a1 f4 0a 03 09 91 da ee | 03 72 0d 0f a8 f4 7a a3 cc 70 63 19 72 ce 5a 82 | 3e 1e 95 5c 92 5c 3e 8e a5 d8 b6 96 00 19 c5 14 | 30 e1 2f b7 0e bc 81 b8 ab b7 09 95 46 2e c8 74 | df cd ec 80 52 5f c9 db f8 06 24 81 85 22 9d a7 | 29 00 00 24 a5 87 f1 2f ce 48 12 7d 6a 67 59 4f | 79 27 34 b3 a6 cd 32 d2 99 ca 81 34 03 a5 ff 6e | 74 fd e5 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 d0 80 55 09 28 92 96 a1 13 47 05 | 9d f7 2b dd b4 58 66 92 00 00 00 1c 00 00 40 05 | 6d 86 77 16 04 78 0f de 20 5d c4 c9 23 72 82 0b | af 53 d4 25 | libevent_free: release ptr-libevent@0x7fb38407bf50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56dd0 | #680 spent 0.0639 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #680 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370018460 | handling event EVENT_RETRANSMIT for parent state #707 | start processing: state #707 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #707 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #707 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #707 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.728277; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.488127 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56dd0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #707 | libevent_malloc: new ptr-libevent@0x7fb38407bf50 size 128 "road-eastnet-nonat-212" #707: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #707) | 6d 4e 2c b0 bf cf 55 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 9f d6 3e 98 b0 5f 73 4d ba b3 1d 62 98 ca 06 | dd 1e 98 88 ad 43 74 1b 2c 00 fd ed fc 05 58 84 | 27 da ca 10 63 1d 7f eb 9d 54 23 18 54 21 fb 77 | d0 11 3f 30 03 c7 bb 7b 6c 82 87 1e b2 c4 46 f5 | b9 75 85 86 87 c3 a0 25 db 07 f0 41 16 6b 87 67 | e8 54 09 98 f1 0a 76 80 fc ed 49 b8 84 22 18 a5 | 42 4a 4c 04 5d 3d 8e 7d 10 b9 03 9f 1f 7c 16 e2 | b0 5f 6c 5f c5 04 98 72 d0 8b 9d 1d 44 50 bd e3 | 32 b2 07 88 7a 5e 63 db 86 1b e1 1b 74 17 01 a7 | 1e e1 3a 02 f1 70 78 85 40 5a 51 fc d7 95 05 3c | cf 55 a3 5b 30 25 71 8a 68 40 5b 0b 8d cd e7 b1 | ed ec b5 28 b7 94 2b d4 3d d1 a5 be b7 54 c0 ea | b0 e9 b3 54 58 b9 5e 83 2e 20 37 1b a4 e8 3d 27 | 35 25 cf 41 31 d1 6b 1e 93 0a ad 4b b0 9d 1d 04 | 42 0a 80 11 8e 38 78 07 10 31 d4 fa 2a 6f d9 7e | c7 dc b2 d9 f7 11 7b c9 5d 8e 23 53 ed 2c 2f 94 | 29 00 00 24 a4 fd 7e 3c 32 99 82 33 41 85 15 88 | 3f 09 19 10 37 6d c6 9b 12 9c 73 58 6c cf 6f e0 | ec d4 d1 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 88 3f af 7f 85 3e a4 01 39 e4 62 | 4d 36 bd d2 6a b8 ee 4c 00 00 00 1c 00 00 40 05 | 31 2c 50 3f 9f 2d 76 af 33 2c c6 2e 60 90 ae 40 | 55 c4 27 3d | libevent_free: release ptr-libevent@0x7fb3640908e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370018460 | #707 spent 0.0647 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #707 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2e150 | handling event EVENT_RETRANSMIT for parent state #663 | start processing: state #663 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #663 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #663 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #663 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.72835; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.482835 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #663 | libevent_malloc: new ptr-libevent@0x7fb3640908e0 size 128 "road-eastnet-nonat-84" #663: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #663) | 79 3e ba b8 29 05 87 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 33 bb 34 f3 54 37 c7 8c dc a0 f1 cf 40 e8 73 | 4d 61 cb fb 80 2d 1a 01 88 6a 8b b8 01 53 25 2c | 65 96 5d ff d7 d3 f4 f3 eb de 8f 2e 9d 25 1d ba | 62 be 02 e6 a1 b3 d0 12 26 cc d4 67 6f 8d 33 f6 | fb 60 8a a9 03 0f c4 ae 02 35 7b 99 4e e1 16 a5 | ee d3 5b b1 65 88 dc 22 5a d0 4d 4e ee 2c c0 24 | 46 97 dd a5 48 e2 b0 56 80 9b bb 68 ed b6 e4 a6 | 82 5d 86 21 c6 56 4f 00 61 9e 48 83 5d 1c ae 1e | f0 fe e0 f9 d0 af 09 19 1a e7 0d 36 81 b4 ef 45 | fc 89 2f 75 93 ae b9 f0 57 e7 58 2b 67 f7 d7 fb | e1 1e 09 48 c7 72 2b be da 88 0d c9 88 d7 8e 37 | df a2 95 e3 05 1c 20 c9 19 12 4a a3 c8 92 ca 0d | 93 be b7 87 ef 2b 8a 9c d5 f2 5d 84 18 5e cd 93 | c2 8f 56 ff 9f 94 a6 a4 04 ca 9a 36 29 04 c1 ac | 0f c7 63 2e 86 54 2d 98 d7 53 7a 9f fa 34 32 25 | 82 89 27 91 24 d9 51 66 79 76 cf e8 c1 b8 34 a5 | 29 00 00 24 f2 12 89 96 be 24 7d dc 10 f3 fa c9 | 66 8f fc 3d 79 cf 4b f7 e2 58 a9 f9 9e 41 92 7e | 29 7a 39 ee 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 49 16 1d 85 03 57 22 43 2e 01 a2 89 | 42 fd 2a d3 68 48 40 6e 00 00 00 1c 00 00 40 05 | 88 4c 7d b9 50 dc 42 1f 7a 10 6e e7 7e cd db 07 | b5 a9 ee e4 | libevent_free: release ptr-libevent@0x7fb33807fef0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2e150 | #663 spent 0.0647 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #663 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37402ffb0 | handling event EVENT_RETRANSMIT for parent state #618 | start processing: state #618 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #618 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #618 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #618 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.728423; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.471189 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2e150 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #618 | libevent_malloc: new ptr-libevent@0x7fb33807fef0 size 128 "road-eastnet-nonat-139" #618: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #618) | 4c ec 39 dc 68 b5 59 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb 05 80 a5 c5 c3 f9 3c 54 41 f2 ff 45 6c 8e d4 | 8c 5e 68 7a a4 b6 14 c3 90 a7 72 c5 37 6e 6f 34 | 08 2b b2 1a 80 e0 96 44 12 49 4b 90 a0 23 38 84 | 7d 94 15 fa 5a f3 e0 cc 84 03 8f 8b 27 13 09 3a | 10 76 9b f5 54 eb 6e 14 d3 82 81 b0 db 0b 18 1a | 23 52 e5 6a 71 2c 20 30 0b 2d 6d ca 81 1f 7a 55 | e4 4b 85 3d 68 9a 6b d2 c5 64 b0 66 a7 3b 3d 0e | 93 9d 5d fa 9a a0 0a bf 68 5b fd ad 7d 7e af d8 | 9c 26 a4 24 3a 01 11 20 e2 46 b9 f1 ea 83 9f 1e | 92 ae 34 06 9d 01 75 70 1d c6 a8 17 f0 17 d4 e8 | 3f a5 fd b3 84 83 5a f3 64 23 e0 0e 62 67 3d 47 | bb 61 39 45 8d 5a 36 d7 90 42 a2 1e 97 de 94 c3 | fa ba ed 1b ac 33 c2 ed 5f a7 b7 09 79 e9 ef fd | d7 73 e1 c8 3d e6 bf ba cf ff dd 60 43 ef 89 b6 | 56 0d 72 f9 c8 aa 8e 1a 35 4f 05 5c 43 b5 97 90 | 99 49 cf 4e 52 3c a6 31 26 76 2b 78 5b c5 df ff | 29 00 00 24 f5 f5 e3 7d da 51 1c 42 32 a8 10 86 | f8 ee 92 c6 41 8c 4c bf 39 0a f7 2f 54 e9 a0 ad | 67 1a 3b 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 f8 d9 8a 1f 35 3a 8c 98 12 8b 5d | 4d ad 41 c9 74 54 12 de 00 00 00 1c 00 00 40 05 | 37 33 26 b1 70 e0 75 6d 56 a5 af 29 8a b8 60 f1 | 31 e0 30 c5 | libevent_free: release ptr-libevent@0x7fb35406f780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | #618 spent 0.0646 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #618 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb338012bf0 | handling event EVENT_RETRANSMIT for parent state #675 | start processing: state #675 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #675 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #675 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #675 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.728505; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.482039 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #675 | libevent_malloc: new ptr-libevent@0x7fb35406f780 size 128 "road-eastnet-nonat-172" #675: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #675) | 85 15 01 85 89 d4 29 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 27 d4 44 6c 1a 22 e8 b4 f7 a6 6b ca dc 02 79 50 | 66 16 b2 bd d5 ad b1 28 e9 83 fb 87 0f b0 39 1f | 85 0a 4c 67 84 5a 26 d0 a8 55 ee 04 95 94 30 6a | 8b 2f aa d3 6a 76 aa f6 4f 30 a2 ed 90 5e f2 5a | 20 ad 0c 4f dc 59 2a a9 a0 b9 a8 76 de cd 23 64 | 4f 9a 8d b3 29 80 5a c0 ac 02 65 83 3e 73 4f af | 83 bf 4d 9d d9 08 a6 6d 2b 14 3d dc 93 82 28 2c | f5 61 0c a2 f1 30 b4 2b 77 cf 96 6d fa 79 62 e9 | 63 f1 85 76 cb bf 4a 7a a7 6e b2 0f d2 81 ef 19 | 8b 21 8c b4 9f 3f 24 a6 9f da 8c 47 53 28 64 05 | fb 7d 95 f0 ba d8 43 62 9a ae 0b 9c e0 5c 3a fb | b4 7a 35 d6 09 67 28 a4 a9 e9 29 a4 8a 02 01 83 | a9 7a 2f c2 42 8f 69 ec 36 92 a5 62 86 bc 6e 90 | 30 c1 46 27 0d 35 15 d4 e6 60 3d 5f 12 ff d2 11 | 5b 76 4e f3 c6 f5 a0 f5 20 2c fb d4 41 40 b5 03 | 62 81 86 c6 eb ed 0a c9 13 24 16 5c 02 3b c0 ee | 29 00 00 24 9e c2 e6 fc 35 e6 0d 46 d5 b0 34 c9 | 0e 50 aa 4b 78 0d 91 95 d1 89 b8 a7 4b 5a cf a5 | b3 98 e6 f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 c1 ac 8a 35 e1 18 af 1b 41 18 3d | da f3 7c 9c 54 2f 3c 44 00 00 00 1c 00 00 40 05 | 3b bf 96 55 32 21 74 25 91 ac 0c f9 c5 3a d7 f4 | 94 b6 78 27 | libevent_free: release ptr-libevent@0x7fb3740750d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338012bf0 | #675 spent 0.0987 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #675 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34800cc10 | handling event EVENT_RETRANSMIT for parent state #661 | start processing: state #661 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #661 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #661 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #661 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.728619; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.484036 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #661 | libevent_malloc: new ptr-libevent@0x7fb3740750d0 size 128 "road-eastnet-nonat-154" #661: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #661) | be 95 5c 7b 40 76 8c 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f ba ef 56 b8 99 c9 26 b1 07 42 76 09 76 7a 27 | 91 a0 41 2b a0 70 93 15 d8 a7 50 fe fc 23 ab 2e | a7 36 40 0e 91 38 15 2b 47 d9 88 bf 5c 3a f7 3a | b4 a0 b6 a8 c9 29 be 63 86 bd a0 c9 b5 5a 74 81 | 42 05 2c e3 63 22 b0 ab 60 c9 91 06 1a ae 70 20 | 27 d6 ef fd c0 2f 69 26 17 d1 9e c7 27 24 17 a8 | 24 d5 65 3b 9d f2 8c bf b0 68 e5 fe eb 23 a6 60 | 73 bb 2c 27 f0 6f 99 ad 46 65 56 ab e0 3b 17 ec | 9b 9d ea 8e 8a f2 38 63 83 4a 06 e3 25 cb 1e f9 | dc 65 77 ef d0 4a 78 7b 20 56 68 95 c5 c6 26 b7 | 22 1a 94 be 24 6f df 64 3f 4c a0 9e 67 50 56 a5 | ff de 53 8d 33 a9 a8 0c 5c 5c f2 d7 59 a4 9b b5 | ea 88 33 be 31 ed e9 57 b6 13 a2 64 ea cd 03 7a | c1 10 e4 c2 97 9a da b1 7b a7 87 15 5b 07 98 84 | 7d 87 44 3a 69 2f dc 0c 9d 8a 59 b1 b8 cc a6 60 | ec 16 5f 47 d6 09 63 e3 f1 2c 11 ea 7a f9 7f cb | 29 00 00 24 22 90 73 7f 5c d6 51 86 23 a3 e4 fd | 8f 56 6e 8b 75 d3 87 48 a5 61 18 f5 b1 fb d3 9a | 2f 6b 23 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6e 83 26 d5 67 d9 f3 fc 4f ff fa 52 | 66 7f 8e ec fb ca 45 a0 00 00 00 1c 00 00 40 05 | d1 0b 7b 8d 87 6a e6 ee 1b bd 92 49 cc 1a ec 1c | a9 25 6e 8a | libevent_free: release ptr-libevent@0x7fb3880805f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800cc10 | #661 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #661 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #678 | start processing: state #678 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #678 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #678 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #678 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.728735; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.491985 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #678 | libevent_malloc: new ptr-libevent@0x7fb3880805f0 size 128 "road-eastnet-nonat-41" #678: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #678) | 6f 4b 14 c1 cc 6f 1e 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2e 9f 0d f0 04 66 77 dd 93 01 97 d4 e6 2f 63 32 | 08 d5 90 21 20 45 70 7a 23 d4 d5 21 f2 1e 5d 61 | d1 38 f7 cd 0d a7 dd 8c 8d 4e d1 19 04 72 f0 60 | b9 a1 be 10 b3 d5 d9 6f 71 a4 43 ab d4 47 03 ef | 16 17 71 a7 79 4c e1 97 0b 36 26 91 25 a7 46 06 | 06 c6 86 a0 3d 48 06 59 81 9f 8c 4f 63 ff e7 cb | 43 e1 16 d1 2e 14 d6 59 c4 4b 03 1f 4a 2a b1 68 | 2e 3a ca a3 c0 9b ec 0d 92 cb 4f d7 26 c4 23 f2 | 7c d5 4f ba 74 f9 b7 a5 8e 7b c3 80 00 1d 25 ca | c8 b6 e7 a7 82 b3 c1 78 86 73 3b e9 bb cb dc 9e | 16 a5 8a cc 34 90 c8 2f 6d 13 78 e8 e7 19 45 83 | dc 57 56 49 3f bf 58 bc b2 bb f5 33 21 2c 25 1f | a6 7d a4 87 88 3d f9 0c 01 74 fa ba fa 6a a3 ea | 56 23 6e 54 12 c1 f7 82 be 6d 43 68 51 8c 0d be | 08 4b d8 2e 8d 59 7c 26 08 c9 1c b1 04 3b b0 54 | bc 1d c3 bf f4 25 5d 1b 85 94 1b 71 be ed 0f 44 | 29 00 00 24 4e 75 ec 55 47 ad 1d d0 2c e8 2a 32 | 3b 96 41 fb 18 33 b6 2f 27 93 6f d4 fa 16 90 bd | 2c 77 4a 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 38 05 46 29 58 72 8b 7e ef 72 dd | 2e 27 17 90 79 5b 4e 74 00 00 00 1c 00 00 40 05 | 18 2e f1 a2 ca 0d ed 2f 55 5d d8 98 ad 86 50 39 | 38 85 67 2b | libevent_free: release ptr-libevent@0x7fb35c0bc1e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #678 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #678 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a46910 | handling event EVENT_RETRANSMIT for parent state #599 | start processing: state #599 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #599 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #599 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #599 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.728856; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.455796 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #599 | libevent_malloc: new ptr-libevent@0x7fb35c0bc1e0 size 128 "road-eastnet-nonat-64" #599: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #599) | 66 fe 40 6d 20 a0 8e c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 14 ec 7e f9 cd 40 f5 de 65 65 51 82 b1 59 1d | e2 b1 19 0c 5f 42 c2 c5 f2 9e 9f 81 38 a4 92 07 | 55 02 a7 a3 99 20 d2 9d 43 eb 91 a3 1f f5 e1 6a | ac 0d 32 90 d1 6d 6d 3a 90 4a ce 17 12 9d 8c 47 | 7f 85 c0 17 84 a9 65 8a 07 e7 29 51 ac bc 5a bb | b5 62 41 b7 ff 6d 04 9f 02 f4 2c 6c 75 b6 4d e5 | ee 4c f0 36 66 9b aa 3a 2d 8d 7d de 94 5b 92 78 | f4 41 fe 7f 33 1f 2f 29 ac c1 15 b4 b6 4a 26 c7 | 44 40 c8 70 6a cd 04 43 6d a5 b7 76 59 c0 45 92 | 8f 55 81 59 a2 e1 56 33 98 b8 16 29 a8 ae fe 63 | 1b 33 5e 5c a3 3c 37 83 85 62 21 28 50 5e 0d 07 | 88 ad 15 73 a5 30 b6 de 4a b6 16 ba 2b d9 18 62 | cc bc 5b 60 dc b9 95 66 a2 af af 8b 80 0e c8 c3 | 2b ea da 66 ba 0a 43 87 f9 ca 7e 08 04 24 6f de | b2 f8 b8 8f 58 ce 58 e7 2d 3c 4f 86 18 6d 41 84 | be 0d 41 9c cb 28 5c c2 7a fb af 81 ec 08 20 4d | 29 00 00 24 da 51 a7 0b 53 11 86 4b c3 b4 4e 3b | f4 a2 e2 0f d9 7b 58 4a f2 c9 2a af f2 68 7d b8 | b9 d1 af 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 33 56 1d 93 89 b2 9c ef 86 78 c9 | a2 2d bb 3b 37 fa f6 3c 00 00 00 1c 00 00 40 05 | 92 86 b4 ce 70 36 ee dd 1a cd 75 09 22 54 37 7b | f9 8e 38 96 | libevent_free: release ptr-libevent@0x7fb3440646e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46910 | #599 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #599 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34802ef50 | handling event EVENT_RETRANSMIT for parent state #603 | start processing: state #603 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #603 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #603 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #603 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.728975; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.452985 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46910 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #603 | libevent_malloc: new ptr-libevent@0x7fb3440646e0 size 128 "road-eastnet-nonat-94" #603: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #603) | fa ea 40 d9 66 be 9a 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 92 c5 c1 75 76 e2 67 5a 25 6a 0b 6a 26 d9 00 | 60 88 8f a2 09 bc e1 34 ad d9 cb d7 8f 0c c9 fb | 5d 34 e8 7a 58 2c 44 52 32 ff f3 22 30 6c a9 46 | 04 15 9a 62 ca cf b2 db c2 74 ba 23 f1 4f 38 d1 | 41 e3 74 a5 ba b3 6d 59 07 f6 3b ea 03 a8 2b 84 | a0 ed 8d 1c c1 de 56 07 5d c4 0b 77 93 2f 7b 97 | 14 b0 d1 04 7b b9 0f f9 37 a9 bc e0 4a 4f 00 f2 | 2d 96 5a aa 23 a5 de 2a 49 0f d1 e1 16 3d 5e c0 | ad 4a da ab ad 5b 58 e6 5a 4f 98 f0 fc a6 f1 b7 | 23 d2 f2 3b e5 a7 21 e7 ea e1 cd 13 d1 70 91 3a | 21 85 1b c9 4c 39 e7 cc bc a4 f6 9c d6 c5 38 7d | 67 8f f8 b4 07 fc 7b 89 3f 70 75 29 51 a4 a4 f6 | f2 64 d3 35 1a 69 f9 96 67 39 7b ea 78 c8 ec c0 | ee f5 ef 8b fa 9d ea d8 61 b7 28 83 06 af 52 08 | a9 ac 31 1a a8 b0 a9 01 03 7b 63 e4 2e d4 f8 cd | 6a 2c 19 36 b8 74 36 aa da ff b3 99 0c f5 14 c0 | 29 00 00 24 c1 66 a4 b2 e8 08 5a f7 00 1d be e4 | 4b 24 90 f6 2d 3e 76 77 76 ca 57 42 50 10 a0 64 | 0f 04 48 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 e6 7e df 78 16 4d e7 97 e4 d0 17 | 4d c7 b1 fe f3 78 c1 ee 00 00 00 1c 00 00 40 05 | b6 73 08 f2 9b c6 7e f9 57 b7 a7 5f 43 dc 0e 73 | 16 6a dc 75 | libevent_free: release ptr-libevent@0x7fb348064130 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34802ef50 | #603 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #603 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #651 | start processing: state #651 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #651 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #651 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #651 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.729098; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.480304 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34802ef50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #651 | libevent_malloc: new ptr-libevent@0x7fb348064130 size 128 "road-eastnet-nonat-120" #651: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #651) | 1a 50 87 84 a9 ff b6 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f b0 d0 63 93 36 3e 05 3f d8 d6 98 23 8b d3 09 | a6 00 78 13 01 81 1e 9a 9b 73 6c 03 e7 97 c7 1b | 0a 84 93 85 00 d2 0f 42 a2 06 09 3e ca 76 f7 20 | f7 d8 2e 7e 15 56 e2 ea a5 ef 8c bf ce 15 8f 1a | 88 09 23 43 98 ef d2 44 53 11 dd 26 74 25 6f 29 | ac 6e a0 99 63 72 d1 be b3 57 f6 ad 0a da 95 1d | 18 60 71 f8 41 7d 97 d6 6b 27 e3 ec fd 11 12 f8 | 81 67 3a 79 45 6a 47 cd 2e 49 43 bd e0 c1 62 f2 | 98 2c 58 06 87 2c 1f f7 a9 0d 52 20 8c e4 05 0f | 2e 1c b9 0f 26 b2 5f 0c 36 af 55 16 37 0a 50 fd | ed c4 bf 0b 03 c3 8c 74 4e 72 bf bb 10 a3 5f 5d | 2a ab df c6 32 de 1f 74 dd dc 29 6a 62 0f ba d6 | cd 7f 75 5b 18 56 b2 b2 8b 55 87 e0 a2 48 c7 1b | e5 1a 41 ad 6f a6 03 13 4f fb 3b 29 02 ab c7 ab | 64 51 03 a8 1c 6b a4 37 1a 86 e8 46 e4 11 b6 ca | 91 48 08 9a a4 54 04 35 e3 57 3e 39 2c d0 ca 88 | 29 00 00 24 e4 4b ce 89 22 9c e4 d1 3c 9c 26 a1 | ce 1d 7f ff e4 4b fb 0d e8 f0 df 0e 05 12 8e e2 | 48 e7 f9 11 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 9d 26 4f 15 14 5e 39 05 f8 cb 75 | fe 3e e5 7e f0 bd 45 a1 00 00 00 1c 00 00 40 05 | ce 3e 0f f6 37 6f 31 d0 cc 66 b0 14 78 6d 46 0e | eb 95 c2 dc | libevent_free: release ptr-libevent@0x7fb35c0b6a00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | #651 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #651 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_RETRANSMIT for parent state #690 | start processing: state #690 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #690 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #690 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #690 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.72922; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.491843 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #690 | libevent_malloc: new ptr-libevent@0x7fb35c0b6a00 size 128 "road-eastnet-nonat-76" #690: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #690) | a5 d8 1b 6e 95 a0 38 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca b3 24 9a 21 6f 60 b3 71 d4 ab a0 25 f7 eb d1 | cb b9 58 9d 93 b9 4d 31 b9 bf af f1 80 33 51 9e | b5 91 2a 1a 69 85 ec 97 c2 f1 f6 7b cf 0f 98 34 | cc f0 78 7e 20 72 ca ec c1 db 9d af c5 94 72 f0 | 9d 8a 9c 63 61 d9 79 76 b4 d5 ff b6 88 bc 5f 00 | f9 44 90 fd 47 4f 4d ef 33 81 b4 03 24 b2 94 be | 87 74 8d ec 7f 31 ff a0 b9 7a 06 f4 90 af 20 b4 | d9 9a 9c db df 5e de 7a 83 76 4f 3b f9 bd 20 fc | 39 b4 48 b8 7f 01 a8 08 13 de a8 58 cb b0 5a 11 | 7d 48 1d 19 b5 3b 92 c4 7a 09 9c bf 77 f3 7f 94 | 69 63 88 b2 cc c5 dd f2 df 7b f2 15 b7 7d d7 15 | 62 ec fa 8e 1d 1f f7 e3 89 53 47 50 af 55 33 77 | d7 34 f4 ef 07 86 c5 df 5b f7 cf 26 c2 e4 b6 41 | ba 90 ea 4c 75 6d 9b 74 97 2c 57 b6 c4 94 c5 0c | 7b 86 0a 36 9e cd da 67 90 23 e3 e4 2b 85 7e 93 | cf 87 12 15 81 f9 76 1c 9a 69 94 6a 02 3c b9 8e | 29 00 00 24 86 ae f8 9b 15 cc 78 e0 7f 55 66 22 | 35 e0 b7 21 54 8a fc 02 7b 9e 59 11 ce d8 be 06 | f0 76 9a e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 b6 97 31 de cc 72 d4 ce 22 00 8a | 2b 89 e8 30 bf 2f b6 28 00 00 00 1c 00 00 40 05 | bf c8 d8 e9 c5 00 38 c5 98 1c ab d5 6d a7 2c 3e | 8e a5 66 03 | libevent_free: release ptr-libevent@0x7fb36c07d450 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | #690 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #690 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad17c0 | handling event EVENT_RETRANSMIT for parent state #546 | start processing: state #546 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #546 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #546 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #546 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.729344; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.446546 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #546 | libevent_malloc: new ptr-libevent@0x7fb36c07d450 size 128 "road-eastnet-nonat-173" #546: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #546) | 6b b3 b7 0f 25 55 d0 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6f 97 dc 92 f6 4f 2c 9f 64 e9 38 e7 a8 c9 b6 7e | 05 ff cf 3a 5e 05 b6 cf 17 cf 8d ed 48 a3 fa 9f | 24 a8 a6 41 91 3f 77 df 02 a6 05 bb e5 ab cd 67 | d8 25 b1 f3 b8 14 51 43 76 86 a6 c8 d3 ba b6 18 | bc 07 8c 01 94 c0 38 ea 24 cf c6 97 ad 4b b2 b6 | 6f bb 4c fe 23 3e c7 46 59 8c c5 fd 43 6f df ce | b5 5a 0d 2c dc 35 13 65 e4 12 f7 f9 80 cc aa 20 | b5 ee c7 5a 5a 70 15 d1 3f c3 8a 67 09 11 af 09 | 16 32 b4 53 41 90 67 c4 cd f6 da ec eb 5a 4a 3f | b2 29 22 df ae 11 4b 8d cc 3a 05 6f 94 4f ad 1b | d7 60 13 20 46 f2 cd 62 12 6a 44 77 94 47 13 c4 | e5 1a bb 0c f8 12 56 21 05 7d 6d 2b 8c f3 58 da | 44 da 7d 6f ce 51 7e 8b 6a af ad 31 4a 3c fd a3 | 30 aa 0f f0 5b 6a da 87 b0 6b 48 55 97 b6 71 a6 | 60 8f d8 d4 aa a0 85 a4 40 0d 91 d0 21 6b 4b 63 | 73 9c 09 ed c8 c0 5f 4c fa cd b4 f8 56 de a6 a5 | 29 00 00 24 ce 6f 16 bc f3 6d 4e 88 a3 1b 4b 4f | 8a 74 cd 2e 04 10 e5 12 90 b1 40 e6 d6 57 95 4a | 49 93 ce 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 2a 45 97 7e 21 38 1c 72 a0 dd 2d | 3c 55 6e 57 52 8e 65 fc 00 00 00 1c 00 00 40 05 | 34 35 71 3c 6d 6a 9d ce aa 0f 6d 3a 2b eb 4b 95 | 7e cd 31 4e | libevent_free: release ptr-libevent@0x7fb388064e90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad17c0 | #546 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #546 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a92f40 | handling event EVENT_RETRANSMIT for parent state #666 | start processing: state #666 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #666 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #666 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #666 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.729457; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.477908 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad17c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #666 | libevent_malloc: new ptr-libevent@0x7fb388064e90 size 128 "road-eastnet-nonat-141" #666: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #666) | af 55 d1 c9 76 35 30 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c a3 85 78 4d da 5e d0 32 3e 9d 3d 1a 3d d3 8c | 75 15 1f b6 cd 02 be d3 50 94 f0 58 88 ee b8 fc | c3 9d d9 05 29 33 e6 db b9 03 a3 91 03 b9 32 e2 | 8d fb 3b 7d 1c 57 d3 23 cc ff 02 0a e8 64 c5 f1 | e9 72 3f f6 5e 2f 3d 0a 9f 40 47 53 42 c4 5a 15 | 56 44 cd da 2b f5 35 b4 37 9d 04 5d 25 e6 c0 9b | b3 63 e8 21 ae c1 4f bc fd b7 b4 1b 32 47 ef 1c | 87 37 97 c0 17 13 75 a3 52 27 4c 6b eb 0e 51 30 | d3 3f 38 9d 4d 1b e4 dc 3e ff 0a f9 c7 c5 15 46 | 17 54 ca 31 e4 f9 c3 f7 5a fe 09 54 b8 94 74 b2 | b0 37 00 fa f9 27 9d 2b f7 90 e1 a7 8d f1 47 7f | e5 3b cd 7d 99 d8 c5 f7 ca ba 6e c7 10 b5 29 30 | dd 2c 8d e4 5c 1c f8 af 25 ac 3f 4d c8 75 38 48 | f5 61 6b ae 49 2f 44 0d d2 eb a5 27 c3 0a b7 53 | 3e b0 4a 01 d2 cc 09 c9 d4 f8 e4 3d 8d 15 85 bd | 63 cd 9a fe 1f 70 56 b3 af c7 75 be 72 96 94 7b | 29 00 00 24 de 7e cf 42 4e bf 8e d5 7b 3b aa 12 | 1e 0d 89 09 17 65 63 a9 70 48 ad 13 bd 01 8c 63 | 96 2c 21 7c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 21 75 3c af 69 72 49 98 23 f2 8c | f4 76 7b 19 c1 d1 00 01 00 00 00 1c 00 00 40 05 | 6a 1a 2b ed 94 cf f9 2f b3 a8 2d 85 01 1b c3 59 | 84 9c 27 2f | libevent_free: release ptr-libevent@0x7fb370069fb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f40 | #666 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #666 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad43c0 | handling event EVENT_RETRANSMIT for parent state #665 | start processing: state #665 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #665 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #665 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #665 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.729561; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.4785 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #665 | libevent_malloc: new ptr-libevent@0x7fb370069fb0 size 128 "road-eastnet-nonat-135" #665: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #665) | 17 f4 78 a9 59 a3 a0 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 53 db 21 ce 0d 36 e8 32 4f 09 2d c9 12 93 03 | 3f 0d c8 57 d9 b2 d5 94 66 f5 2c af dd d9 9f 30 | ab 23 90 f0 60 2c 56 f2 ed e4 3b 19 92 7c 90 60 | ad a9 f6 f4 89 a5 b5 8a bd 28 e0 e6 2a e1 c4 4a | ab 19 3e 76 a7 cb 3f f5 b4 c1 ac d5 eb a6 51 0b | a5 22 3b cf 5d 35 78 58 b3 7e 27 7d a0 c6 9b ff | 67 19 62 12 ee 59 54 21 85 49 cb 45 55 53 2d a0 | 2d 26 f7 0a c1 cb a3 d2 11 be 8a 38 9f cf c5 aa | b6 3b 08 8c da 2a e2 3b d8 47 c3 96 5b 2d 9b 87 | 46 cf 56 9a ec 1a 60 92 d6 f2 05 73 ff b2 0b ce | e0 8c 45 e1 18 34 9e 24 c1 08 e0 e0 af 89 f2 77 | 7e 12 a0 ae df 93 58 3e 41 53 7a 70 bc 01 86 20 | e2 3a 31 eb 69 7b 78 f4 7e c8 5b 4a d3 b5 a7 20 | ba dd f3 68 f1 50 e0 df d8 9c 38 0c 45 05 f8 e4 | 46 fc 25 f3 c6 e0 f9 ac 5e f5 b0 29 3e 15 55 f0 | 12 34 52 a4 54 c5 e2 07 e5 c7 8a 47 07 72 65 b1 | 29 00 00 24 d3 a0 68 c2 b3 be 73 5d 25 6c 72 85 | 4c a1 62 e3 da 82 77 49 9b ae c7 79 c0 29 55 4a | d4 14 82 6b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 0c 4d bd 1f b3 c2 70 27 97 8c 0d | 77 2f 10 0a 09 ce 7a e7 00 00 00 1c 00 00 40 05 | 59 08 d1 ed de 8d 28 01 5d dd 9a 01 fe e8 dd 16 | e2 b8 56 65 | libevent_free: release ptr-libevent@0x7fb35806a310 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad43c0 | #665 spent 0.0676 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #665 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348039e80 | handling event EVENT_RETRANSMIT for parent state #652 | start processing: state #652 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #652 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #652 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #652 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.729637; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.479007 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad43c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #652 | libevent_malloc: new ptr-libevent@0x7fb35806a310 size 128 "road-eastnet-nonat-145" #652: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #652) | cf c2 13 dd be 13 c5 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 79 e0 0e 1a 26 5e 51 b7 a5 4e b3 11 14 4a 1a | 6b 96 3d 3b 24 26 a6 e1 89 0f fe 91 a7 c1 7a 45 | 26 cd 35 4b 8b 6b d6 67 91 8f b2 00 fc d7 fa 63 | 2b 58 54 f9 c8 77 8f d8 2a 48 b5 10 ef bf 28 f5 | 2b 01 2a b5 18 43 7b d2 1c 14 72 04 8a f2 52 ba | 8b 62 38 7c 84 16 57 0c 23 dd 5f e1 6d 4a 6a 89 | d0 08 7c 20 3c 72 d9 e8 1e 21 18 8e 13 54 9f 91 | d8 28 dd 9e 63 28 ad b3 cc 26 3f ce 02 f8 0d e7 | 43 fe 79 b9 17 32 6b 1f 49 79 5c 97 67 4f 3a 29 | c2 8a 0e 49 84 d5 bf 8e d2 4f bc 6f 4f 9d 2d 18 | 2f fc 66 90 24 12 d6 64 7d 6c 9d 94 39 e8 e1 57 | f1 94 1f 02 5b 88 4a 35 7d 48 05 cc fa 83 14 b9 | dd e0 c2 0e b0 3a 8a d8 a2 1c f4 35 ef 16 28 20 | 4a cf 5a 27 76 56 8a 88 e6 05 ec 34 f1 7b 00 b3 | 84 e3 67 51 85 c2 15 5b f0 1a bb bc c2 65 21 ca | 2f a8 c5 a1 e4 74 bb e7 a4 40 7f 41 4f 5a 73 b3 | 29 00 00 24 a4 50 57 9a 3a 57 4f 84 97 47 60 cc | 90 ef 4f 57 df 90 96 08 71 29 36 b2 5c 92 88 88 | e1 f8 f5 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da c9 d5 de d7 08 a6 7f d2 6a f3 9f | 8c b9 dd 2d 2d b7 3d 20 00 00 00 1c 00 00 40 05 | ff d6 25 67 d8 96 d1 7e 81 61 53 f8 7f af e4 0b | e5 df 07 44 | libevent_free: release ptr-libevent@0x7fb34802a670 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348039e80 | #652 spent 0.0644 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #652 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36801d710 | handling event EVENT_RETRANSMIT for parent state #620 | start processing: state #620 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #620 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #620 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #620 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.729711; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.476864 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348039e80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #620 | libevent_malloc: new ptr-libevent@0x7fb34802a670 size 128 "road-eastnet-nonat-63" #620: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #620) | 0c 12 15 e7 a2 ca 8d 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 3f 5e 3f 99 f7 2c cd 5d 9d 10 28 3d d6 eb 5d | d6 70 92 22 81 10 39 84 c3 22 a4 4b 22 26 4e c3 | 43 c3 37 59 00 1d 7e 63 45 c0 26 a8 98 4a b1 47 | c1 33 a4 a4 90 f5 4b 5f 23 ab b3 25 78 4e f7 a4 | f5 a4 93 56 5e 09 41 80 4c 5b e0 55 80 1b 24 4e | aa f2 33 07 2b 18 44 d7 f2 64 d4 1c b4 47 33 ae | d6 d7 60 0c 88 02 96 73 4b 3e e1 3f 8e 0f cd 2b | 4f 43 e0 dc f5 25 3d f1 3c 28 8e 72 59 95 64 7c | 38 6c b8 23 04 21 89 f8 a5 70 08 2e 75 aa 14 af | e8 5d 1a 6b 12 19 09 99 3e e3 e5 85 d8 78 ef 8d | 24 1e c5 bf 13 b7 ef 62 4f 9a 47 1e b2 de 4c a2 | 66 69 d3 df fc f2 1b e9 88 8e 7d 9a 64 f1 c5 88 | b5 0e 03 d2 24 45 b0 15 4d 1f 26 ae 6d 58 30 94 | ad 64 eb 3c 81 d9 0e 5a e4 30 43 31 ff 25 8a 7d | 43 87 60 41 58 98 d9 b1 94 9c cb 6c 2b f6 03 9e | 5e 6f 4d 36 24 f7 c6 bf 51 85 e7 d4 54 b0 61 7f | 29 00 00 24 e6 bf 33 37 4b e1 e6 6d 80 47 43 de | 67 a6 13 22 fb fc d2 c4 87 31 c8 58 f0 30 ac 5f | e0 4a 7b ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 41 62 8d ec b8 5e 72 37 70 1d f8 | 93 d1 d1 32 a2 e2 38 e4 00 00 00 1c 00 00 40 05 | 9f 9a 22 83 1f 86 8c 5b a2 81 5b 71 ab 0e 9a 59 | 82 5d 35 a1 | libevent_free: release ptr-libevent@0x7fb36801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36801d710 | #620 spent 0.0672 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #620 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb338018460 | handling event EVENT_RETRANSMIT for parent state #682 | start processing: state #682 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #682 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #682 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #682 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.729795; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.484755 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36801d710 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #682 | libevent_malloc: new ptr-libevent@0x7fb36801a4e0 size 128 "road-eastnet-nonat-149" #682: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #682) | 1c 63 f5 34 d6 98 db f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 91 93 4b 82 7b d6 c9 cc b6 dc 38 f0 76 d4 ea | b3 f9 d0 20 c5 06 5c 01 f7 82 2c bf 39 d6 f7 d8 | e4 7d 68 8b b6 1b e7 ba 01 9e ef 31 f5 4a e4 00 | 71 9f 4f 6c f1 66 a6 38 36 4d 16 6e b9 0a 02 f5 | 76 26 d7 9e 22 7e 03 cd dc 7a 6e 7a f3 50 38 a2 | f7 f1 9b 7e b5 d1 c3 e6 34 54 2a 11 00 e2 cf 05 | 84 d5 3c c2 01 67 6d 2f 10 ab ff 3f 5e d3 fc 6f | ae a3 ca 06 6d 1c 49 2d 5a 7a e5 04 64 3b 7a e2 | 78 f6 c6 9d dc 04 10 4f 6b 84 37 a0 35 9d 5e 5e | 43 00 9f e2 ca 77 c0 e3 a6 a6 e9 8c 0e c9 9d 05 | f4 7c d1 f5 aa f5 3a 3b df 0d e9 f3 99 52 88 3b | 6e 6b e7 b1 a8 09 b9 87 1e 6c dc 1d a6 0c b9 85 | 1c 89 ee 82 0e da ca a2 a8 31 12 33 df 1d 7c 66 | 57 48 ec d7 e9 e4 6e 69 ac ff cd 56 20 87 16 fd | c1 b0 72 78 18 b1 15 83 cc 13 cd 7a 9b d9 1b ea | ab 9f c6 a9 54 29 46 07 69 08 0d df 81 94 bd 9f | 29 00 00 24 44 7b c5 ba aa af dc 31 42 e4 80 90 | 55 f4 c0 be 7c cc 43 63 bf 44 9a f8 f4 30 a8 fb | 10 97 40 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d a2 48 8b c8 15 0a 38 76 0c ba f3 | b9 e8 7a 81 52 85 f0 63 00 00 00 1c 00 00 40 05 | 0f 56 36 fd fd 8a 46 5c 86 a2 68 e1 11 7c f5 b4 | 2c 7e 9c 12 | libevent_free: release ptr-libevent@0x7fb3800857f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338018460 | #682 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #682 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b24680 | handling event EVENT_RETRANSMIT for parent state #629 | start processing: state #629 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #629 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #629 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #629 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.729914; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.482043 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #629 | libevent_malloc: new ptr-libevent@0x7fb3800857f0 size 128 "road-eastnet-nonat-71" #629: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #629) | f2 94 01 51 22 3f af b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 4a 7c e2 24 38 23 63 44 71 d0 61 ed e2 db 72 | e6 61 bd 05 9a 47 1a a4 e0 bf e2 b3 38 98 dc f5 | a8 2e 85 9f 39 94 94 de 61 d4 d7 e0 6f d5 4b c2 | 89 35 8a 19 c0 0b 46 04 61 a9 d7 30 7b 04 fc 12 | e6 01 83 16 c3 75 c5 9f 9a cc 41 f6 3c df 59 2a | 0f 08 5d 35 9a ce e8 c9 26 c7 0c bd a0 e0 6f e3 | 48 c7 a8 ee 4f b3 e6 8c bc 55 d6 31 9f e3 ee e7 | f2 e1 44 07 35 ec 7f 8d d3 6c 7c 13 76 3d eb f9 | d5 7d 76 3c 3b a8 5c be 62 a6 f1 e1 77 d6 70 e5 | b8 30 16 1f 9c 9e 52 90 ea f1 be d9 f2 c9 5f 95 | 77 8c 0a b4 bb a7 f4 25 bc 2d eb e9 11 f1 32 b5 | 35 4d 8c 02 40 af 7f 94 52 b2 4c 1d e7 2f e7 74 | 72 3e 84 0e 3a 79 5f 30 6a 29 cb 0e ae 9e 72 ab | d7 8e 3e b9 a0 36 1f e0 6e 15 d4 61 f3 83 66 72 | 3e c1 e8 80 18 c3 99 46 a8 a9 91 ab f2 9d 81 1a | 78 1d 17 58 a0 48 32 bb bb 73 79 08 2a 3f 1e 4a | 29 00 00 24 55 56 e2 01 45 9b b6 83 ff 84 a8 c5 | 23 34 d8 e3 d8 71 fd 93 f6 a7 41 77 7b 3f 0d 89 | 52 a4 4e bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da 5d c3 fa ce a9 5d 3b e4 cc 6b 32 | 6c ae ca 02 24 ef 22 16 00 00 00 1c 00 00 40 05 | e7 00 f0 76 0a 46 ce 87 53 dc 2a ab ab 46 52 9b | a3 29 a0 f9 | libevent_free: release ptr-libevent@0x7fb354074f60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24680 | #629 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #629 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37404b580 | handling event EVENT_RETRANSMIT for parent state #671 | start processing: state #671 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #671 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #671 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #671 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.730029; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.476562 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24680 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #671 | libevent_malloc: new ptr-libevent@0x7fb354074f60 size 128 "road-eastnet-nonat-184" #671: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #671) | 1d 22 92 7a 9f 62 65 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 2c 7e 91 0a 22 90 c2 45 ac 5c be 32 c1 2c 12 | 60 a0 27 f2 55 e3 d1 89 c8 99 22 25 59 aa a7 04 | 17 46 2e ba 00 09 b9 71 47 e5 94 f1 fd 69 0a 57 | 38 00 5b 86 84 a5 d3 6a b3 9c 35 a1 da c4 1c 25 | 30 41 58 88 f1 bf 1e cf 5a 7d fb 1d 85 56 82 39 | 48 55 e9 bc e2 cf e9 2c 33 f4 34 3c 90 b2 b4 75 | 55 ca c1 69 86 54 f4 e5 53 67 e4 36 3b 66 24 10 | f0 0c b4 a6 bf 13 a9 41 25 2d 85 e0 59 37 ea 35 | d2 8a c7 72 04 28 dd 8d 9b 4e ca cb e3 07 69 b0 | 38 54 bb b4 47 09 ee 08 0f 47 c5 fd 50 05 d7 4c | 28 db 90 75 c2 2f 8c 55 54 db d4 30 5e b3 32 4e | 8c 3b 51 5c d3 59 a0 69 16 c0 1d 8a fe c4 69 9c | 6b 52 61 76 6f 1f 1d 99 1f 0b 05 d3 73 0a d9 48 | 53 6d fb ef 5d b9 22 d3 44 19 94 f4 70 f2 9d 04 | d7 54 79 2f 9c a0 ae 3d d3 fe 22 0d 74 1b 5b cc | e2 cd 80 63 5d 5b 97 5a 19 0e 2c 9e 2b 0b 57 7c | 29 00 00 24 89 d7 93 c3 18 08 d5 d6 83 2a 2a be | a0 ca 86 6f 9a 4f 6b 29 8c ce f9 83 c0 a5 93 03 | 8e 0f 90 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 a9 60 fe 19 43 95 a6 13 de 16 7a | 81 94 84 c9 e7 e2 6b 0c 00 00 00 1c 00 00 40 05 | 81 51 61 ea 37 80 54 96 3e ae 81 da 9c ed 39 03 | 67 8c 30 56 | libevent_free: release ptr-libevent@0x7fb38807ae10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37404b580 | #671 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #671 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #623 | start processing: state #623 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #623 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #623 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #623 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.73014; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.464876 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37404b580 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #623 | libevent_malloc: new ptr-libevent@0x7fb38807ae10 size 128 "road-eastnet-nonat-67" #623: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #623) | b9 b9 92 a4 ec 38 7b b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 f3 7e e2 e6 f9 2a f9 d0 93 e1 a3 9d fe 74 ed | 88 55 53 55 78 91 02 79 67 05 d4 47 b7 41 b9 fb | f1 19 18 33 40 a4 b0 8c 32 db 0a 07 ba 07 01 e9 | c8 5e e2 aa 5a fe 73 d0 43 82 cf ee 31 82 b6 b2 | 5e df 34 0e 42 bf b6 f1 fd 55 a4 d8 49 96 21 84 | cd ec 4d 1b 66 59 11 58 1d 4a a6 2b 86 62 43 39 | e7 71 28 21 32 2a 5c 6b 41 1f 1e a1 24 a8 7e 32 | 23 86 5c 25 2e 71 70 af 02 5f a8 b3 61 f2 41 fc | a5 63 0a e6 65 ef d6 7d ab cd 41 94 d7 f5 1e 6e | a4 d7 27 bd 30 b8 2b ed e0 66 d7 7a 3c 2f 83 9d | 91 91 64 73 8a 4d c2 67 18 5a 11 fb bf 8d de 21 | 74 5c 7d bc ae 43 a1 bb 17 7c c3 68 7a 37 86 6e | 83 ca 1f a2 33 23 44 69 5a e6 2e 90 79 83 57 19 | ae e4 1d fa 01 cf 8b fb 73 b3 e0 fb f2 40 fe 50 | 44 65 ee e2 51 df 47 88 22 c7 4a bb 66 b3 7d db | 0b 53 67 9b 7e 51 76 d3 fd f7 82 53 9e be b5 ff | 29 00 00 24 6f 2c b0 62 51 9d 8c 96 be a1 aa 9b | 8b d2 a8 77 e2 d2 a6 95 67 e0 34 a3 2d 5d ad 37 | 32 20 86 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a8 14 ee 41 a8 c3 e5 2e 90 58 14 8d | 5a f6 f4 40 9d 72 d9 2f 00 00 00 1c 00 00 40 05 | c6 f2 3a 3c 4a 40 8a 12 05 e3 0f 64 13 e4 22 0b | ff 8f 1a ac | libevent_free: release ptr-libevent@0x7fb33806f750 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #623 spent 0.0684 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #623 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388015720 | handling event EVENT_RETRANSMIT for parent state #649 | start processing: state #649 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #649 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #649 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #649 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.730216; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.468637 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #649 | libevent_malloc: new ptr-libevent@0x7fb33806f750 size 128 "road-eastnet-nonat-204" #649: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #649) | b6 55 6c 1f f7 96 4e 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 49 68 33 ac be 3a f7 9a 60 a1 54 2b 3b a3 9a | 16 92 52 84 04 b4 d7 16 0c 6d 09 72 cc 2b 60 d8 | 6a 97 99 35 6d bf d4 59 5a c6 db 05 04 50 9f 26 | d5 31 65 a2 a6 90 1f 44 a8 51 46 ef b2 3c 2c 17 | 9a 67 6e 63 13 be de f4 ea 50 37 0c 4c b7 bb 87 | 98 eb a2 d7 94 7a 4d 7c 27 23 c5 c1 14 ac 3a 62 | e3 9e cb 8b a8 b2 7e 85 7f 34 7f d2 53 2b 7f 26 | 9b a4 79 e8 f1 d9 12 1a 3f 7d 7b 73 7f 6a 3b d4 | c7 66 51 af 5f d5 da 98 4b bc 29 01 fc a4 53 53 | c1 e3 c9 29 b1 bd f6 9f 07 80 98 0d 7a 85 07 72 | 29 6b 03 79 c5 1e 41 20 d9 9a b8 86 af 78 fe 58 | 1c d3 ff 44 d3 cc a9 5e 28 25 58 79 53 d0 f5 40 | f8 b2 e5 1b 4e 35 7b 57 c9 98 34 61 e5 1c c6 ce | 01 23 71 88 e2 7b b5 18 09 23 c9 7f 18 e2 56 40 | 07 80 69 13 04 69 8a 54 da d5 46 08 93 8e 42 66 | 37 5b 93 f3 15 98 7b 1b b4 dd 60 45 36 75 a9 82 | 29 00 00 24 d9 9b fe 1b 9a 3b e2 af fd 5f 29 c3 | a1 c2 66 f4 bb f2 c2 62 37 18 46 4f 44 68 ce 27 | ad 06 31 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e f0 1f cb 60 f7 fc 56 dd ae 47 e3 | bc 0d f0 9c f1 a6 a0 90 00 00 00 1c 00 00 40 05 | 55 71 01 83 1b 1f 6e 2c 68 ca 2f 55 56 93 29 8e | bc e1 a4 22 | libevent_free: release ptr-libevent@0x7fb38806fe50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388015720 | #649 spent 0.0658 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #649 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0d4c0 | handling event EVENT_RETRANSMIT for parent state #612 | start processing: state #612 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #612 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #612 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #612 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.73029; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.470861 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388015720 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #612 | libevent_malloc: new ptr-libevent@0x7fb38806fe50 size 128 "road-eastnet-nonat-73" #612: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #612) | 06 13 d7 c6 41 b2 86 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 8d f1 f4 22 24 65 49 2a a6 70 28 29 5c 96 09 | 3e 1e 78 f6 de 7f d4 6d 8f 70 0c e4 5b aa e7 34 | 60 3a b8 ce 9c c3 f2 55 c4 78 5c 37 a6 84 38 22 | 93 67 fa f8 c2 df 15 e3 9e 8e 26 44 fc e4 fa 8f | 57 f5 49 ed 86 e7 16 45 96 6d 10 ea 0c 90 8a 31 | e9 a7 90 56 ec d2 20 8b 2a b3 08 b3 f3 33 e4 7b | 20 92 e0 01 19 6d 6c ce 7a bf 9a 7b 89 9f 35 9e | 58 9d d3 ad 5b d8 c7 e9 b8 71 4b f7 a5 1c ea 1a | cc c7 49 f3 04 3d 6a 30 5e 5f 6e 57 b4 d0 06 19 | df 2d c3 be a9 ad 0b 91 01 58 72 3d a2 3a 97 fa | 3b 4f d0 1f 09 3f ec 9c 6a 4d ad a3 d7 03 7d fb | fd d5 f6 df 9c 11 0f 03 14 5d 5b e8 e8 f0 46 2d | 46 0e 42 78 aa d4 b4 d3 de c9 9d 1d a1 10 3b 2b | 48 75 16 7b f6 27 2f 9d 63 b1 ad df dc bd c2 01 | 65 a8 1f 4c aa c7 7b 56 c8 5f 06 1e bb 73 93 0a | 1f 90 b0 df 46 4d 2e 1e af 83 bf da a6 c2 4b 21 | 29 00 00 24 14 45 39 c3 b2 be 10 35 86 8a 8d fa | 46 03 d4 c9 b6 c1 c2 c0 bf 3c af 6e ab be 7e b7 | 9a 44 cd df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bc 94 44 11 03 fc a1 a4 72 04 35 93 | 3e a4 98 88 8e 5c 65 1b 00 00 00 1c 00 00 40 05 | 24 c4 24 16 66 f3 44 ba aa f9 26 a7 a0 53 d9 b2 | 41 97 1c a3 | libevent_free: release ptr-libevent@0x7fb388075630 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | #612 spent 0.0638 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #612 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a34e10 | handling event EVENT_RETRANSMIT for parent state #650 | start processing: state #650 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #650 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #650 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #650 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.730363; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.470628 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #650 | libevent_malloc: new ptr-libevent@0x7fb388075630 size 128 "road-eastnet-nonat-151" #650: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #650) | 26 33 64 e2 99 22 09 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 93 4c 52 2e 07 4f ef fc d7 92 1e c1 ca 14 b7 | f7 a3 82 0b 5f f6 91 b4 15 5e 90 95 7d d0 45 ef | 21 f3 08 0e 7d 26 87 e7 ea 79 d3 33 07 49 ba 68 | da fd 2d dc e8 dd 8d 3d ac 78 0b 31 13 b9 60 52 | d8 60 ef 09 61 af 9d f6 ad 76 cd b0 e6 c4 55 10 | bd 0c b1 58 60 30 af 2c 0e 52 bd 65 9f d0 54 d8 | 5a 2b 21 18 f2 c5 71 a2 0d 15 04 b5 4a 32 ae 9c | 02 2e d4 e0 51 8d 8d 22 83 86 fa d5 f5 1f fc cb | 75 6f de 7a e7 e1 af 25 29 c0 d8 e2 f6 b9 34 b5 | d7 7a c3 1e c4 99 5b 0e ca 76 77 7c f5 a8 a5 87 | 30 0e 18 1b 81 0a 94 65 85 20 c1 1d 31 6e b8 8b | eb 6c f5 b0 86 38 4d 10 0a 4a e9 45 4a d4 02 3f | 74 10 5c 24 6e 73 2d b5 cc 00 a0 c3 3c 0c 0d 0a | 48 d3 1b d4 4e a5 c6 45 3d 90 e1 3d 46 6f 68 4d | 0c c4 d4 2f a5 c5 02 ab af a2 e9 3b 3f ee 3a b5 | a7 5d 9e 2b da 84 df d1 c6 3f 08 db f2 d2 d5 c6 | 29 00 00 24 8d dc df 0c e8 8a 00 84 45 9e d1 82 | 39 c0 aa 62 4b 5e c0 9d 6f b9 50 ba 59 33 ad 5d | 19 94 ea 3d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 84 a4 74 25 14 10 fd bf 0a 02 29 | 25 c7 89 ed 1e 29 a1 0f 00 00 00 1c 00 00 40 05 | 9b 4c 2f e4 b9 53 6d ef 7d 4f cc 27 24 fe f9 f6 | 0b 9e 9f 60 | libevent_free: release ptr-libevent@0x7fb358064ae0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a34e10 | #650 spent 0.0648 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #650 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a82ac0 | handling event EVENT_RETRANSMIT for parent state #647 | start processing: state #647 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #647 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #647 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #647 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.730434; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.471961 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a34e10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #647 | libevent_malloc: new ptr-libevent@0x7fb358064ae0 size 128 "road-eastnet-nonat-206" #647: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #647) | a9 15 25 50 c3 89 9b ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 0f 1a 9b c2 c1 27 9f 86 de 54 44 d0 24 9d 6a | 45 ee aa 3d 9a 82 6c cc 7f 5a 10 2c 59 c9 22 f3 | 34 55 04 3d 8b 40 f1 78 07 5b 1e 30 68 89 14 97 | bb 5f 4d f3 15 66 be e0 4a d0 41 bd 55 74 f7 a1 | 6b 5c c4 02 57 e6 80 ea 7f cb 60 fd b8 98 71 32 | 6d 87 75 4e 58 e3 ec cc 2e d4 bc 64 e8 77 a7 a9 | 8d 8d 5b 9b 51 d9 37 9c 0c 0c 7a 22 96 b8 a2 26 | 89 d0 75 ed e8 65 8b fc 2a 83 34 29 39 47 fd c0 | 22 02 dc 03 48 eb ab 15 4b 4d ed b4 52 db 67 35 | cc 06 96 a5 b0 73 95 a7 9a 74 43 21 02 98 b3 07 | be a3 dc 76 24 de e8 96 45 29 b9 08 2b da 6c 70 | 45 74 38 4c 76 73 8d c4 3a 57 9d 7d bc 8c cb 79 | 70 0a 09 47 dc 14 98 38 75 a6 25 2e 9f 4a b1 fc | b8 6d 3f 57 fc c2 a2 48 3b 42 ab 67 ad f1 0d 72 | 8a d2 0f 62 dc 08 25 a1 63 8c 91 4c 28 7e 0a 45 | 95 7c 48 d3 57 c8 ca 2a 17 b1 f3 78 10 3b a0 11 | 29 00 00 24 25 47 22 11 f3 7d 2a 09 ec 1c bc 5b | ea d8 0a 15 cd 9d 69 8e 1e b3 ca b8 a6 0d 22 5d | 28 7b af f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 3c 41 1d 92 d7 b9 38 bc 5b eb cb | 32 90 40 77 f1 b7 dd e6 00 00 00 1c 00 00 40 05 | 63 f4 fa ff 4d 8b 5a 8c fe ca 58 3f 4d 61 7e 87 | 43 3e 7c 36 | libevent_free: release ptr-libevent@0x7fb35007d2f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a82ac0 | #647 spent 0.0652 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #647 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb344018460 | handling event EVENT_RETRANSMIT for parent state #670 | start processing: state #670 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #670 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #670 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #670 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.730508; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.475492 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a82ac0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #670 | libevent_malloc: new ptr-libevent@0x7fb35007d2f0 size 128 "road-eastnet-nonat-147" #670: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #670) | 8a 10 9e 23 ac da 71 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 59 15 67 28 ca 74 92 de a7 0b d2 ca 9e 31 ff | 0c ec 66 70 2f 96 5c db 29 7a 94 be b4 fb 91 94 | 6c 4c 82 7b 86 7c 4d 04 fa 97 64 03 7c 61 e6 12 | 7b e8 77 6d ef fc 86 73 90 13 0d e6 78 93 c2 a1 | 62 6c 65 c0 8c 1c 5e 39 e1 34 37 c6 58 5b a5 b2 | 83 26 7c 7e 1f 15 94 64 d1 51 32 90 eb a2 33 51 | b8 56 2a 0b 53 1e d3 ca 3b f5 15 ad 3c b3 c4 4c | 87 79 a4 dd de 1d 17 0c ed 28 be 3d 53 69 9f d4 | 92 6d e1 f9 c4 1e 3a 32 bc b5 0d 47 92 45 39 27 | 1c 6a ba 31 af 07 5a 8a c7 08 ef d0 d2 ac e7 93 | 58 56 5f 1a 54 44 df 61 16 7f bc 43 53 9a 9f f7 | 61 eb 19 48 e1 7b e1 df c1 5a 57 0c d3 a6 a2 ce | ce 01 4a 92 1b ce bd be 46 3d c9 04 aa 1c 6a 49 | 39 9e c5 e0 23 32 61 54 07 62 70 d6 2b 4f 7f 12 | 86 15 e1 c4 88 04 21 da 99 53 13 ca 40 af d4 cd | 0a f5 d7 88 c1 11 17 a1 77 d9 81 26 5a b2 1e b7 | 29 00 00 24 f3 83 7b 0d 72 75 fb 36 6b 70 51 59 | c6 93 d9 98 17 c4 71 7c 93 e7 e0 bd 2f bb ee cf | 0d 5e df 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 a9 e0 bc 70 aa 03 d2 53 d4 71 04 | 68 97 96 57 88 52 67 34 00 00 00 1c 00 00 40 05 | a6 13 8e aa 70 35 17 a1 68 a2 7c 6b 1f 0d 90 7b | a6 27 3d 24 | libevent_free: release ptr-libevent@0x7fb37406a110 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344018460 | #670 spent 0.0652 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #670 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348048a60 | handling event EVENT_RETRANSMIT for parent state #644 | start processing: state #644 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #644 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #644 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #644 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.730582; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.470542 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #644 | libevent_malloc: new ptr-libevent@0x7fb37406a110 size 128 "road-eastnet-nonat-163" #644: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #644) | 50 de 2b d7 45 9f 26 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 58 93 d0 7f 41 ad 9d b7 03 dd f8 2a ea 2a 42 | 44 8c 71 98 4a 47 c1 c5 90 95 76 04 f2 e5 ad 38 | 71 44 ae 3b fb f2 49 7c 10 82 5e 78 55 e4 fb 2f | 3e 12 c9 6c 92 13 53 cb a3 12 6e fd 1b cd fb ca | 7e e6 47 e7 44 cb 81 71 95 37 b6 d0 7a dd 37 46 | 29 e1 76 40 93 0a 7f 82 5a ad 56 83 a4 e6 22 95 | 73 81 6b 3d a5 ef 7e 2a a9 63 f6 f5 16 dd ca 4d | c5 1a 4a 2e 98 5c be 8f b6 36 37 ca c3 60 91 97 | 68 91 c7 05 a2 20 36 57 76 46 a3 b4 57 65 a3 ec | 60 30 bd 82 e8 5f 09 bf c2 16 53 69 e8 db b3 20 | f1 da 51 a7 b7 44 97 86 b5 cf 77 2d 02 b0 fe f9 | 34 93 f6 86 2f ca 83 a6 a7 79 8c 3f 79 49 ae 69 | 69 fc a1 aa 7d 95 b3 6d 7c 9b 21 a7 a7 f1 27 5d | 6b 90 30 cd 14 fd ee 1b 3c 9c b0 26 4f ac 21 a1 | 51 5e fd f8 e8 96 a5 84 c9 1e 4d dc 41 f5 73 29 | 85 06 8a 87 3f 53 f8 64 7e 9c bd 99 b9 0a 9a 0b | 29 00 00 24 e5 0f d1 27 d8 cf bc 47 ad 96 17 e8 | c3 9b 62 84 21 4e 76 3c 4d 7e 36 68 8b 66 54 7f | 11 87 3d b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 d8 9d 5e e4 7d bf 65 2d f1 4a b5 | c7 e2 e6 55 b9 27 ad 86 00 00 00 1c 00 00 40 05 | e7 08 aa 38 d2 e0 0f 7f 77 98 72 12 74 ed 7d 4c | e8 75 c4 3e | libevent_free: release ptr-libevent@0x7fb36c0751d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348048a60 | #644 spent 0.0638 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #644 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46abd200 | handling event EVENT_RETRANSMIT for parent state #638 | start processing: state #638 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #638 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #638 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #638 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.730655; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.464619 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348048a60 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #638 | libevent_malloc: new ptr-libevent@0x7fb36c0751d0 size 128 "road-eastnet-nonat-218" #638: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #638) | 73 d4 45 41 ab fb 7a 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 9f 1b 03 84 82 35 ff 90 4c 0e e1 4d 63 0b 6e | 25 67 96 c9 b1 5e 9f d5 99 08 91 8b 97 07 16 15 | 0c e8 b6 79 cd d7 bc dc 55 ef e3 4b 14 16 41 5b | 40 76 1a 52 cc c5 af e0 d7 43 e0 3e 6a bb f6 6e | 3a bb da 36 77 2b a1 fe af 56 c4 df 62 b3 73 b9 | 52 c1 55 25 5c 52 48 e6 3a 7b f7 12 bf 50 3d 13 | 60 2e 98 52 d5 09 1c 91 b8 c2 de 2d 7f f1 06 b2 | 39 09 03 76 3e 48 2f e6 27 f7 a9 1d 29 27 2e f9 | 47 87 5e 4a 7f 25 ff 26 1e 80 23 47 3f 0d 0c 05 | c8 27 d3 ed 98 ba 35 8c d3 ea 22 73 97 01 a0 d4 | fe 01 e2 3a 2d fc 4d bf 2f 53 eb 87 c3 5c 58 ef | 04 26 0a 51 13 2d 57 56 6a 69 f2 77 0e e6 3d 17 | 34 db d2 58 e6 ef 99 7a a5 d2 4f c6 f1 d6 ee ce | b8 69 1a 6d d5 e4 12 01 a4 1e 43 89 0e 61 2a 78 | 44 0b 0b bb 93 59 d9 ea 7a 2e 42 02 8d af be c7 | d3 84 14 a0 3f f3 e5 9f b7 c2 2d 2a 24 01 b0 1c | 29 00 00 24 5e 9d 7c 45 0d ec 13 66 03 bc 86 eb | df 18 53 02 81 01 d0 ca be 7b d0 08 90 a7 74 72 | 28 4f b9 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 c4 2c 70 3a 67 17 0b be 99 22 e3 | 81 fa d7 92 68 76 9e 84 00 00 00 1c 00 00 40 05 | 70 aa ac 05 74 24 54 28 15 1e a7 7e 64 95 2b b7 | 84 55 48 79 | libevent_free: release ptr-libevent@0x7fb35c08ab00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abd200 | #638 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #638 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38000a290 | handling event EVENT_RETRANSMIT for parent state #626 | start processing: state #626 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #626 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #626 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #626 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.730727; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.467411 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abd200 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #626 | libevent_malloc: new ptr-libevent@0x7fb35c08ab00 size 128 "road-eastnet-nonat-26" #626: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #626) | 0f ed 5a cf 38 b1 e8 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 3d 6d be e1 b5 e5 c2 d3 2d 01 3e 44 32 8c 9c | 10 07 5b 6c ed c7 1e e0 bd ad 91 2f 7b 5d 66 20 | 1d 49 29 0a fe 5e e1 41 fd 2d 5b db 26 a9 35 00 | 65 10 cd fe cb 24 75 0b 38 a9 17 e0 c9 9c 32 cb | ac ed eb dc 28 55 86 03 cf 0a 73 6f 60 bd ce 34 | 02 6e 30 12 0b ea e0 d6 3e 1e 3f d8 09 a2 8f c4 | 00 8b 17 ad 6b dd 80 3e bb 4b 55 43 c0 01 45 68 | b9 d4 1f bb e9 85 dd cd 2e 4a b1 73 0f d3 cf 35 | 1d cc 81 40 9d 5a 89 f7 17 97 eb a9 9b ce d0 7a | ea fd d9 8a 75 55 14 06 7b b5 ea a1 d4 df 99 7f | 7d 44 5a 7b dd bb 03 bd 83 27 4b ff 5b 0a f8 f1 | 3f f3 6c 7e 81 c9 48 54 92 25 5a 38 2f 94 66 d9 | 09 f1 fc 50 b6 b8 4b c6 01 00 9b 5c de e0 c2 70 | 94 49 cd f6 f0 cd 84 42 37 97 4f aa 99 fe a6 85 | 3a 90 6e ce b7 01 23 71 2b b5 63 d7 be 2a b7 f7 | e5 82 55 b8 36 c2 c8 94 47 53 1e 97 b8 37 e2 29 | 29 00 00 24 a0 8c 77 90 d5 d1 0c 21 bb 3d 18 0e | 18 70 42 64 dc 36 73 88 d4 b3 3a 38 9b f1 00 e0 | 74 bb 2e 48 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e0 58 91 0c 95 19 f3 97 a9 04 fb bb | 0f b6 c3 16 e5 5e 65 45 00 00 00 1c 00 00 40 05 | 89 d2 55 f5 43 aa 76 28 9c 2b e8 f0 be 0a 82 5c | 11 ab 36 f1 | libevent_free: release ptr-libevent@0x7fb35c0aba40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000a290 | #626 spent 0.0659 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #626 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3400296b0 | handling event EVENT_RETRANSMIT for parent state #621 | start processing: state #621 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #621 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #621 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #621 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.7308; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.474238 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000a290 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #621 | libevent_malloc: new ptr-libevent@0x7fb35c0aba40 size 128 "road-eastnet-nonat-53" #621: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #621) | b6 7b 13 e2 c1 f5 0d 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 57 84 d5 d7 fc 7b 03 ac 28 bd 55 7a cb 22 6d | 15 db d6 6e 10 22 25 dd 22 f0 db b6 64 1a 8e 62 | 37 1c 3c 87 76 d4 16 13 a1 20 70 51 e2 6c 88 a7 | 4c bd 9a e8 61 13 5b 96 2a 3a 11 b0 00 e4 41 12 | 45 a6 ec a4 25 97 e4 d4 fc 34 77 25 f0 6b ee ea | aa 50 40 a4 2e a8 4f 01 2d e4 44 bf 36 fc 59 62 | 62 e1 29 8a f9 0d 17 54 2b f3 92 0f 3e c7 98 e1 | c4 70 f5 a6 ce c1 0a 42 4d c9 8d ad 7d 6f 21 10 | 8c 9b 74 c6 74 d4 11 03 3c b2 a3 0a ef 7e 1b 84 | d0 6a 92 26 b5 27 71 3a d1 01 ed b9 54 c4 f1 85 | 17 24 83 a6 8f c1 1c 28 cf 64 6e 6b dc 51 3c 81 | 4c 28 f4 1b 29 ea f8 d0 93 36 3e 3f 53 a9 9f e5 | bd 65 1d 28 4d 88 e0 98 81 13 8e db f8 e2 17 a6 | 46 27 e5 1e a7 24 77 68 b9 82 43 d4 94 92 10 37 | d7 3f 29 86 6b cb 84 f7 07 f1 63 aa a8 fc 4a 8a | 7a c7 2e 35 5c f7 6f 1e 13 8c ec d2 d0 0f 26 77 | 29 00 00 24 61 45 c6 88 ed ea 89 96 4e e2 8d aa | 07 4f da 3d da b9 b5 f4 0f 2b 6b 58 d6 df 11 d3 | 2e b8 7b 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 1f a9 4a 68 19 c5 3d 06 56 c4 a1 | 6a 2d 5d 6d af 09 97 90 00 00 00 1c 00 00 40 05 | 1d 2c b3 00 93 4a 54 e7 e8 53 57 b8 b6 97 f8 d9 | 75 4e f7 33 | libevent_free: release ptr-libevent@0x7fb35c07fb40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3400296b0 | #621 spent 0.0855 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #621 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35804b810 | handling event EVENT_RETRANSMIT for parent state #656 | start processing: state #656 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #656 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #656 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #656 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.730897; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.516451 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3400296b0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #656 | libevent_malloc: new ptr-libevent@0x7fb35c07fb40 size 128 "road-eastnet-nonat-192" #656: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #656) | be 68 21 bf 92 3b bd 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 52 43 e7 61 15 4a 4d ee d7 b2 46 b1 85 1b a8 | b0 82 1f 54 6e 3d 86 2c 4c 72 1b be 1a c9 a9 49 | 93 8b d8 d1 12 52 c1 d1 1e 66 c4 3c 2c ea d7 98 | 75 c0 9a ec 39 77 d3 3f fe 5e 4c e6 42 6d 23 4b | 2b 34 b7 11 db 87 07 d3 52 60 5a 9e 7c 2c 5b ef | e6 f9 73 5c 0b ba ad d6 fe 16 9c 1f 42 85 0a 3f | c6 40 77 bd 69 5b 49 0e 03 f8 b5 a7 44 3d 92 3e | b6 3c 8b 69 c2 36 24 58 2e fe e4 2e cf 17 66 89 | 17 19 74 fd 9e 82 52 41 e1 84 14 f6 da 40 64 3c | 7a 18 7c f9 1c fa fc 3d 2b ab c7 81 6b 75 f7 02 | 62 8e a6 13 db 23 45 dd 44 71 ff f8 9b 82 f6 c5 | 35 8a a4 69 84 07 45 3b 4e 8e cf 28 a8 c7 ed c8 | 24 90 fd dc c5 ab 7f aa 2d f3 14 d8 aa c0 01 da | 83 71 b8 3c 0a d2 2e f1 89 59 c1 75 b8 ab ca f6 | ed 19 86 32 78 7f f4 7b 8d e8 39 01 f8 23 b7 bf | d8 41 df 63 27 75 88 7d 0c 1a d0 05 c1 b6 21 63 | 29 00 00 24 da a6 76 b3 cd d9 ef 6f 78 db 6d a7 | 41 9d 1a c1 02 ed b1 b4 d8 5e 1d cc 04 ae df b0 | fa 18 8b a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 b6 14 c8 78 3e 8b 14 79 86 4e 98 | ba 1c aa fd 49 33 32 6e 00 00 00 1c 00 00 40 05 | ec b2 52 19 30 c6 85 07 d9 5c 18 07 e7 c7 94 94 | 67 61 43 b0 | libevent_free: release ptr-libevent@0x7fb33804e7a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35804b810 | #656 spent 0.0661 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #656 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0bf00 | handling event EVENT_RETRANSMIT for parent state #753 | start processing: state #753 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #753 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #753 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #753 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.730972; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.514063 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35804b810 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #753 | libevent_malloc: new ptr-libevent@0x7fb33804e7a0 size 128 "road-eastnet-nonat-239" #753: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #753) | 43 c3 80 a5 94 99 7d 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 27 47 4f 05 d7 25 44 75 00 7a 90 57 67 26 e6 | 4d 97 9a 3a 60 21 e1 3d 90 71 67 27 3f 0b 49 6f | 1f b9 14 a1 8d 44 a6 76 24 f5 5a 9b 38 e3 12 49 | 11 3f dc 63 03 09 74 e9 a3 fd bb ce e7 70 f7 c2 | 6f 48 fd aa a3 1f e4 78 8b 40 4d df 11 7a 5a 41 | 45 11 21 74 d6 a5 c3 8b e5 8d 1b 68 d2 3a 6c e4 | 4f c3 5b 65 f5 0b 4f 3e 67 74 c2 72 3e 15 1b 5a | 2f b9 67 d7 f7 97 99 68 80 00 34 be 80 97 46 a2 | f2 cd e6 d7 21 ff f7 0a 95 ea 80 3d 17 5e e5 f1 | 89 b6 3a 1b 19 7c 6d e2 e2 ac e0 e8 87 47 58 ca | a8 a9 57 8a 48 7a 5e 0e 07 ed 18 d0 02 cd 41 6c | 99 f9 79 7c 54 75 6a 80 aa be 2c 8d 68 e7 ab 46 | 5f fa db 7a 00 15 1c 42 38 2a 95 67 34 d0 40 37 | 9e 59 6e ca ce 71 f9 73 95 33 d2 33 24 16 10 d6 | 96 f4 6d 66 ce ae 39 a5 a8 ba 67 7b 0b a7 ec 5c | a5 f0 ea d0 7f ca a2 d9 1f b6 4d c8 4d 24 52 7e | 29 00 00 24 34 e1 23 83 89 3a 65 73 17 62 dd 52 | 41 3d 56 39 99 39 6a 46 38 cd 4e b8 6d 94 84 4d | ae 2e 5a 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 f8 fd 21 17 cf ca 15 a9 8c 89 3d | e7 2c 90 ae 74 d6 49 28 00 00 00 1c 00 00 40 05 | a9 e3 cd d3 57 ef 23 72 b9 af 19 fe 36 9b 4d 39 | 12 5f e6 9a | libevent_free: release ptr-libevent@0x7fb3840899b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf00 | #753 spent 0.0658 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #753 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c012890 | handling event EVENT_RETRANSMIT for parent state #727 | start processing: state #727 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #727 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #727 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #727 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.731046; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501316 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #727 | libevent_malloc: new ptr-libevent@0x7fb3840899b0 size 128 "road-eastnet-nonat-210" #727: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #727) | 8b be 7d ad 6e 47 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 ce c0 c2 e4 25 8d 86 08 cb bc 52 7c b3 ee 01 | 8f ba c4 6d 6c f4 6a 0f 46 b6 08 ec ce 35 fd 9c | a3 96 7a 4b 39 46 2f 87 e0 b3 24 68 bd 08 f7 00 | de fe bc 6e 99 53 33 72 6d 31 50 a8 3c bf 8e 11 | d1 0a 86 13 1f ce ce c3 0f e1 bc 5e 80 8e a2 d6 | 27 e8 f2 bf ec d9 e9 f3 3d aa 43 3a 6b 97 d5 34 | 59 78 15 39 b7 bd 30 ea b2 e1 44 a5 f8 e8 38 86 | 54 db 07 6a ef ad cc 3a 56 0e d2 27 fb 2a 77 ba | 36 51 b8 10 07 62 d5 90 4d ca 0a 32 87 1d ce b4 | 7e 83 81 e7 d9 b6 8e 25 b8 6b 2b 0c cf a3 60 19 | e6 bb d6 4e 72 2e 81 71 f8 13 f2 9a 9e d8 eb 8f | a8 36 ae 05 81 aa e7 46 61 6c 3f 81 1b 7b cf f6 | 87 cb 65 20 06 d0 84 24 80 2e 3a 60 fb 99 c3 62 | 5a 0a 79 d7 36 6c 19 82 db 33 f0 6e 27 96 59 38 | 58 4d f2 ec c1 c1 e4 2b e2 58 27 a6 55 42 ca 3e | 3f c8 1e 9e 7e b4 88 cc 40 5e 23 e7 74 a8 91 f7 | 29 00 00 24 64 58 e5 0d 0a 27 42 8e 74 e9 35 15 | 5e 05 1e ab 85 d6 6f 92 8b 8b 06 7e e2 32 18 1f | 9e 03 0b 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 71 5b 13 d9 03 56 0b 94 2e 9b 60 60 | d4 0c 9d 62 4a 5b 9a a3 00 00 00 1c 00 00 40 05 | 8c 55 6f f9 09 4d e0 77 bd 22 46 44 fb 95 c0 d9 | 83 9d 9f 2c | libevent_free: release ptr-libevent@0x7fb36007fb40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012890 | #727 spent 0.0739 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #727 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #696 | start processing: state #696 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #696 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #696 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #696 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.731133; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.499243 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012890 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #696 | libevent_malloc: new ptr-libevent@0x7fb36007fb40 size 128 "road-eastnet-nonat-215" #696: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #696) | a2 ff 7d bb ae e4 ff 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 47 a3 9f 01 68 3e 72 d7 77 d8 40 15 bd 56 fc | 1d 68 27 b1 4e be b1 22 9a e8 2a ba 9c a8 46 6d | db 09 7f 12 fa eb 65 08 f4 c9 16 2a 9e 01 b4 17 | 36 05 7a c7 1f e8 46 bc c3 50 58 1c e8 e0 92 da | 73 ba 9e 07 48 d5 9d f2 d0 7b 6e ea 42 6c 81 be | 44 c8 4f 38 a9 d8 4a 5b 62 42 5a 19 4d aa 02 1b | 7c d7 6e f1 a3 07 60 f7 3c 4c ac ba 84 59 ee af | 37 a6 9c 4c 62 92 69 93 89 e7 42 99 74 73 cf 68 | 4f f7 d5 72 0b 6f cf f9 81 78 7b 57 1a 33 23 56 | a4 67 f3 6a 02 58 17 74 48 e2 79 13 e4 bc 15 ce | ff ef 49 6a 4b df 9e 1e 45 f6 1e 93 0d 6d 9f da | 4c 33 f1 96 ea 06 4e 73 51 f1 24 f3 0a 23 b8 4e | 17 12 5d ad 67 9f e9 c9 0e cc 9a 39 38 d0 df 99 | 31 b1 98 f8 83 61 7a c6 bb a0 15 87 10 f9 0e 97 | 6f 73 60 11 87 3c e2 c8 09 90 f8 eb e8 87 a3 83 | f4 d2 44 24 91 0c cf 33 42 d7 4c 2d 4e 98 eb 2a | 29 00 00 24 54 bc d8 ff 7e 29 53 5d f0 b1 9a ed | 1a 65 ef 6c 49 ab 64 6e a4 de ce bb aa 3e 57 0c | 70 a3 44 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 23 a0 ca af 8e 55 b3 fa 06 dd 4a | 8b f7 66 e0 0c 39 a9 54 00 00 00 1c 00 00 40 05 | e3 f3 b4 3a 4a 7c 3a c4 53 8f 78 d7 9c 55 fe 34 | 05 a1 fc 70 | libevent_free: release ptr-libevent@0x7fb37c03e1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #696 spent 0.0641 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #696 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aa5fc0 | handling event EVENT_RETRANSMIT for parent state #712 | start processing: state #712 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #712 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #712 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #712 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.731206; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498406 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #712 | libevent_malloc: new ptr-libevent@0x7fb37c03e1a0 size 128 "road-eastnet-nonat-194" #712: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #712) | cc 56 db b7 23 55 ce 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 df 8d 7e 48 22 64 49 fb b5 e2 a2 dc b8 50 4b | ad 6c 59 bf 7f 2d 41 f4 f2 ce 30 80 51 45 ce 32 | 71 a3 c4 d8 bc a9 37 56 1f 5e b7 0b c3 7d 7a 94 | 96 5b f0 c5 d3 95 0b ab 37 3c 2b 1b 89 34 d4 8a | bb f5 48 cc ec 2c f3 5d b9 8c bf f8 d0 8a 72 43 | bc ac 8b 06 75 12 f2 db 3b 73 18 e9 5c ba e8 72 | fb a8 ce 9c c0 4b 82 4f 9a f1 5a af 77 31 0b 07 | 66 ce ea af be 31 11 ca a5 70 ec 43 3f c8 a2 17 | 44 95 1d 13 29 48 51 d8 f9 1e 06 a1 cf e1 54 e5 | 99 68 5c 3a da 63 33 ed 4d d2 25 dd 51 25 1a 08 | b9 43 e0 11 8e 0a 46 c6 51 cd 58 79 c0 d9 94 c1 | 9e 7d a5 08 99 f8 a7 56 cc 9a d6 3c c1 7c 79 1e | 4b 40 9d a4 b9 7f e5 00 44 51 bf e8 b1 5b 15 8c | eb 58 e0 f9 22 15 0c e8 84 6d 51 2a c6 4a aa 29 | 1e a4 72 7c 08 fa b1 ea d1 7f 66 aa 4d 4f fb 0c | fb 1b d3 9b f8 9a 00 a8 9d e6 49 e0 43 79 c6 38 | 29 00 00 24 22 6c a7 ec d0 85 2e 53 64 0e 79 9f | 11 86 be 1a d4 75 b2 6e 35 aa f3 7b be 0d d6 fa | a5 73 61 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 88 55 31 03 a8 f3 ca 6b 47 12 f6 | 0d 9b de 88 5f ca 38 91 00 00 00 1c 00 00 40 05 | 71 a5 54 81 8c 44 b1 23 48 73 5c a0 27 0f b9 ea | 05 8d 05 a3 | libevent_free: release ptr-libevent@0x7fb354085700 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | #712 spent 0.0656 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #712 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374045e40 | handling event EVENT_RETRANSMIT for parent state #679 | start processing: state #679 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #679 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #679 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #679 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.731278; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.497281 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #679 | libevent_malloc: new ptr-libevent@0x7fb354085700 size 128 "road-eastnet-nonat-82" #679: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #679) | 21 46 75 e4 c0 e2 30 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 7f b6 62 3c af 4b 1e 98 70 97 3a c8 81 5f 8a | 6e d2 09 4c 84 07 55 d6 a3 fd c0 be 75 5d 07 47 | 8d 3f bb da a3 30 57 a0 7c a7 7f 2e cb 9d cc e7 | 13 3b 5b 3b c7 48 f1 bf 28 bc 38 67 c7 62 8b b6 | 69 be 87 f5 c0 9f f9 a6 02 9e 30 99 da 23 cc 90 | 1e 99 f2 9c f4 fc ed 48 2f 64 79 47 e2 b0 af cd | f7 a8 a4 46 c8 cb 84 62 97 96 25 40 61 19 15 7b | 98 2f 52 d4 70 b6 21 3c 7b e8 bd 11 c7 68 0b f4 | 1b 98 5d 51 c3 19 75 24 08 6b 1c 64 66 29 63 ef | 74 57 1e 26 8f e7 df a7 24 f3 96 46 d3 6a e1 e9 | d3 26 ea bf b7 66 e0 59 a8 f2 90 ba a8 33 d2 5f | aa 5b 61 86 8a 0d 9e 66 48 2c c3 e8 2d e4 2d 40 | 05 91 e1 60 c8 b5 52 b7 df 9b 2c ac 58 37 89 f0 | 51 8b 09 fc 89 ea 65 b5 1d 2a 49 4e 5e 19 42 75 | 54 34 97 85 69 00 2b 59 4b d5 43 ac d7 91 dc c1 | 3b 6a d7 05 fb bf e8 2b 60 16 3b e5 78 45 71 f5 | 29 00 00 24 64 67 4a b2 09 ea 77 4a 31 a5 f9 b8 | 14 17 60 f1 91 48 c2 5b e0 29 39 77 90 07 73 81 | d3 3a 3a da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 d2 62 af e1 8e 7e 27 97 6c fa 7b | 68 37 2f ee 47 da c3 0b 00 00 00 1c 00 00 40 05 | 9d 8c 01 86 03 b8 30 c8 80 85 c7 8b d6 c6 c7 00 | 6a 86 19 60 | libevent_free: release ptr-libevent@0x7fb36806fac0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374045e40 | #679 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #679 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb340008e80 | handling event EVENT_RETRANSMIT for parent state #685 | start processing: state #685 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #685 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #685 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #685 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.731351; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500053 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374045e40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #685 | libevent_malloc: new ptr-libevent@0x7fb36806fac0 size 128 "road-eastnet-nonat-187" #685: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #685) | e0 29 5a 0a 61 0a 1e b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 44 4b 09 14 55 26 a3 28 d3 47 1b 88 52 58 95 | 5f 67 dd eb b6 51 c4 6d ea b3 00 9f 27 0b 9e 86 | 50 32 3f d4 ef 56 d1 52 a7 51 55 9e a4 19 c2 cd | 1e 12 55 b5 15 8f f3 d7 bc da 86 79 a9 47 70 73 | f8 8a e1 76 61 55 ae c7 2a a4 37 62 35 b1 6b fe | 4c 50 6c cb 7b 12 10 09 92 ba 26 a7 a4 fc db d0 | 2f 7e be 44 45 5c 46 c7 04 72 12 a2 3d 84 49 94 | 30 c8 bc 4f 39 25 a1 4f 16 a1 c2 1b 4e 22 be 72 | b8 4a 5d 48 29 a7 82 7c 4d bd 6f 13 50 85 ca c7 | ec 11 98 29 31 a8 99 3e 4e e5 4d 08 c2 a7 9d fe | cf 40 e8 27 e0 9b bd 71 82 7f 3e 26 24 fa b0 04 | c9 9b 4d f2 2b 42 eb 90 50 35 90 38 b0 1f 38 ac | 7a cd f0 e4 b8 ac 72 a9 0b b5 6f 4a 72 d7 7c cc | 36 87 5c ca 4d 87 f9 81 63 9f 68 fd 43 d9 83 b9 | 17 41 d8 dd 34 e0 30 6b e0 2b 70 c8 04 99 12 51 | 60 74 b0 27 54 ca d1 00 a3 92 7e ac 84 49 40 ce | 29 00 00 24 52 c9 db 03 45 a7 9c af 05 9f 92 28 | 17 af f8 90 e6 9b f5 88 0d 6e 51 b4 99 c6 1e db | 36 e3 9e 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 35 b6 5e eb 9e a1 93 4b 5b 44 61 | 9e 29 9b 50 f2 cb be a7 00 00 00 1c 00 00 40 05 | 8c 5a f2 f1 d8 0a f5 46 ba 17 5e 28 dd 6d 65 44 | db 19 d6 81 | libevent_free: release ptr-libevent@0x7fb364075180 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340008e80 | #685 spent 0.0652 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #685 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a70b10 | handling event EVENT_RETRANSMIT for parent state #691 | start processing: state #691 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #691 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #691 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #691 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.731424; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.495893 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340008e80 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #691 | libevent_malloc: new ptr-libevent@0x7fb364075180 size 128 "road-eastnet-nonat-191" #691: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #691) | a9 9e 25 20 86 2a 5c 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 cc 4c ba 30 5c 6d 22 f8 82 c6 c0 8b 58 68 0c | 41 77 59 e0 2a af ff af d4 c1 41 cf 51 4a d3 e1 | 69 aa 30 d2 ed c6 c8 af 8b 3b 34 93 40 fa af 54 | 65 66 11 b2 ea ba 9d 66 6a 5a ef a5 37 12 11 a4 | d3 21 d0 69 7b e5 a1 d7 98 b5 f2 36 e1 00 9b 73 | 88 b5 57 a0 86 7c 2b 56 bc dd 7a 01 0a bc 7a c4 | 2c ad c5 8b 82 0a e6 1a c3 ec 8b 0c 66 1b 4c be | b1 76 b6 01 cd 33 2d 70 ab da 87 4d 5a 37 a3 30 | dd a8 b4 78 ad 30 76 5b 99 96 17 20 94 4a 1e ca | d4 40 82 a5 98 84 48 26 0c d9 76 15 4d af 29 c8 | b0 a4 e1 44 dc ac ff b7 ac 4a 18 e6 fc e7 a5 b6 | 38 f8 54 c8 63 11 e6 a6 35 0d a1 81 5f 34 c8 dc | 36 f2 0f de c7 04 d3 89 04 e3 b8 e2 42 51 11 b0 | e6 10 f4 77 1f be e8 81 80 19 27 1e 32 ff 6a d3 | 0d 11 66 8a 3a fc 43 14 97 86 65 03 41 1b 4f aa | 60 d5 5e c1 3c ab bd c7 a5 60 2a 06 6e f7 8b 5a | 29 00 00 24 d9 82 2d dc 7a db 9b 9e ba 51 3f f5 | 55 9b ca 46 49 e9 e1 bd e8 b3 c4 b1 15 49 3d a1 | c4 aa 80 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 10 f7 93 cc 33 bf de b8 46 14 d4 | f1 7c bb ef cf 7a 14 b3 00 00 00 1c 00 00 40 05 | 40 bb bb e0 02 00 28 d6 b3 fd 9b cd 5e 9e 97 d3 | 8a 95 58 8d | libevent_free: release ptr-libevent@0x7fb3600778c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b10 | #691 spent 0.0639 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #691 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36402f780 | handling event EVENT_RETRANSMIT for parent state #562 | start processing: state #562 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #562 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #562 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #562 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.731497; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.434259 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #562 | libevent_malloc: new ptr-libevent@0x7fb3600778c0 size 128 "road-eastnet-nonat-57" #562: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #562) | d4 5a 4f 23 43 95 38 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 21 4a 80 72 e7 1e ab e4 a4 cc 6f ae 76 b4 17 | 66 86 d6 e9 31 54 d5 5a 28 1c 74 da 50 fb 86 f4 | 2e 76 50 d3 0d b0 af 0a dd f4 b7 13 30 20 64 87 | f2 f8 f7 5e 86 a8 52 97 05 ae 0d 56 79 b8 88 83 | df 4b 38 d8 fd 5a 52 6b 17 d7 11 45 fc b9 a4 96 | 35 56 c5 1b 74 b1 b1 3b 01 57 7f e0 6d fc 5d 6c | 21 86 9a 44 ea 45 b1 a1 05 01 3c 3a 83 6c a3 ec | 26 13 36 21 83 8a a9 26 0b 6b e0 0b 90 3b db 09 | 26 5d d6 57 a5 f5 d7 1c 5a ce 92 a1 4d 1b 39 ba | fe d1 57 2e c6 1d 0e d3 ee b4 63 0d c8 a5 b3 10 | 07 e3 b7 03 07 bc 65 1b bf b5 ed eb eb 53 36 51 | 4a 60 85 66 ce 2a ad 64 2e 22 1f f5 c7 e8 ab 8b | 56 4d 1b 92 82 89 69 60 5a 9e d6 65 67 5b 25 d6 | b0 fc eb ed e9 a5 d6 c8 1d 10 b2 22 0e 91 e4 cc | 73 60 02 ba 62 2c 96 2c 46 34 20 da c9 7c 01 9a | b8 13 b1 fa b1 0b 0a 18 a3 97 42 e9 48 2a 9a d0 | 29 00 00 24 95 d0 5a 24 13 c9 df 14 0f 8d ab 25 | 8b d1 7e e3 e1 dc 1c 56 c1 ea 4c 91 e9 f7 07 4a | 89 49 ff 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 58 19 cf a0 1f 48 f9 3e 3b 37 57 | fe 6c 89 3e e8 fd 27 9e 00 00 00 1c 00 00 40 05 | 73 2a d5 98 9e 00 e7 3f e4 c4 a7 88 fa 3d 90 0b | ae 11 e9 36 | libevent_free: release ptr-libevent@0x7fb364059ad0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36402f780 | #562 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #562 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb360012bf0 | handling event EVENT_RETRANSMIT for parent state #563 | start processing: state #563 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #563 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #563 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #563 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.731569; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.437387 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36402f780 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #563 | libevent_malloc: new ptr-libevent@0x7fb364059ad0 size 128 "road-eastnet-nonat-40" #563: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #563) | 36 fd bc 41 27 9a 18 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 f7 f9 df fc 24 98 94 50 1f 5b ee 02 6b 2b 08 | 88 ea bb 4c fc 6f 81 4e 18 49 00 df e1 e9 2e 32 | 12 86 87 5d ed 60 5b 39 8c 88 3b 45 c5 ff 07 ae | 3b 26 9c d0 6d b7 d1 e5 d2 f2 44 e2 99 9a a1 34 | 7c cd f0 e6 b4 a0 06 c2 e2 40 86 90 79 ac 53 56 | e8 b9 80 5c 54 49 7c e3 25 da dd 1c a3 52 9f ec | a4 d2 90 b1 56 ce 5d 5c 20 a2 3b 08 f3 fd d6 30 | 42 db da 3e b2 e5 ed 74 de b7 e6 59 ba ed c1 83 | 60 66 8c 72 2f 6f ba 9a 85 05 c1 db 9c 7c b8 87 | 26 24 9b 4b 8b 4b 67 b9 df 00 bd 07 d0 3b e3 b4 | 6c 17 18 f3 f7 d3 9c 27 cf 7d 7a bf 43 d6 d5 cf | 69 cf a9 92 09 2e 90 5d 89 35 3e 56 73 21 5e fd | 30 0e e9 0b 43 37 81 42 99 01 7c b5 f0 2c f6 9e | 45 a9 d9 81 d2 95 68 9f 5d 8d 05 3c e4 03 5d 3b | da 10 69 6b 96 bb 32 84 4d a3 95 1d 28 1b ff 6b | 19 0c 05 ab 9e ef 24 27 d9 f0 1e 4b 16 13 1f a0 | 29 00 00 24 33 52 d4 42 b8 04 6d 4f 2e 93 5c 6b | d5 ad 27 1e 92 59 33 28 c5 ae 5c 5e 96 b6 02 6f | 79 82 8d b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d f0 6f ab 99 46 a7 e5 85 41 6a 05 | cc 0a dd eb 9e 21 24 a7 00 00 00 1c 00 00 40 05 | fa 0b b1 80 18 a1 01 fe 64 98 07 58 ad c1 ac 04 | 2d 72 07 f3 | libevent_free: release ptr-libevent@0x7fb37003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360012bf0 | #563 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #563 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b1c480 | handling event EVENT_RETRANSMIT for parent state #740 | start processing: state #740 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #740 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #740 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #740 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.731642; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.505622 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #740 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 "road-eastnet-nonat-230" #740: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #740) | 1b 68 e9 bf c7 97 07 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf b3 10 fb dd 28 f6 cb 25 9f 9d 63 17 69 6d 6e | e8 71 1d da 03 62 10 04 58 4a b2 60 7e 08 0d 23 | e8 11 df 63 3f d9 4c 6b 74 a1 a5 86 cd a9 4f 0b | a1 93 6d 81 fa 0f ef 54 ce 9d fd cb 34 8e 77 a2 | 87 72 4c 47 7e 84 fe 1b a5 81 30 1c 8c fc c4 9a | 0f 98 35 d7 2a 5e 44 55 8a 59 d6 d8 30 0e 7b a6 | 2a b2 14 36 a8 38 48 b1 a9 46 59 2b ac de 0d 8e | 1c 9d 2b 89 1c 30 40 5d b7 34 94 17 5f 21 6d f3 | 8a 9c ff b3 cb 8a d6 33 b7 5b 70 0b 55 e1 7a e1 | 7d 1b fc 2c 98 7b 56 b4 9c 01 69 95 c3 40 41 1a | 16 ef a0 2a 1b 18 8d 7f de 2f 24 c0 24 36 5a 75 | 68 29 82 0e ef 57 e3 38 1e 0b 49 5a de c8 05 03 | 5c 7b 63 02 56 7e a1 b0 b5 ab 37 8b 92 4e 92 ec | 6a 5b f1 54 78 81 27 2a c2 36 70 26 e0 90 20 5c | 71 5f d8 ca cb 70 40 d9 8f a6 1b 60 21 65 09 2b | e2 dc 1b fc b7 96 10 f1 3e c1 9c af 69 36 85 93 | 29 00 00 24 fa 43 15 42 5a db 07 16 30 b5 67 19 | b6 84 08 f7 7b ea f2 1f b7 28 7e 51 d0 6b f6 fb | b4 42 2c ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 6f 0b 3c 61 32 28 f1 44 65 e1 5e | bc c8 e4 f5 79 a3 0a bd 00 00 00 1c 00 00 40 05 | bc 6f 55 f3 a9 01 d6 c1 3f f8 0f 15 e9 0d 1c 1c | f5 51 2a 5a | libevent_free: release ptr-libevent@0x7fb378080550 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c480 | #740 spent 0.0663 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #740 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46adb080 | handling event EVENT_RETRANSMIT for parent state #722 | start processing: state #722 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #722 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #722 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #722 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.731715; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.512279 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c480 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #722 | libevent_malloc: new ptr-libevent@0x7fb378080550 size 128 "road-eastnet-nonat-179" #722: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #722) | aa d5 b7 9d 2c 2d ce cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 b1 9e af cf 96 c4 1f a9 84 c9 1e fe 0d 23 0e | 53 41 ad 54 73 4d e4 38 06 61 64 5a 7e 50 5d 4b | 7b 88 a3 16 c2 7a 44 91 ab 9a ef aa fd 30 6e 1a | 1d d2 33 a7 46 ad ce 2a 23 40 98 78 51 d0 bd 75 | cb b0 f4 b3 4d 7d 19 05 e0 8b 9b 3f ea 2b b8 7f | 3e 4a 4c 83 dc 50 06 15 79 16 52 63 ff 38 b6 0f | d8 c3 fa 2f f5 c3 27 82 43 ee e2 17 1f fd 56 25 | 4d 01 27 c8 35 e9 4c 3b 07 cc 3e b3 7b 20 e4 14 | 25 d6 4c 28 e2 bf c7 2c 41 cf 35 f8 5a 05 57 12 | 04 0c ca 49 a7 e8 4a a0 b8 27 d8 fb da 18 09 0a | 8c d8 8d af 83 fc 09 54 90 fe e9 ec 6d 97 9f 38 | 4e f0 9c 72 3c f6 cb 04 b9 67 19 9d 6a 3a 73 08 | d5 1a 3f 89 1b 6f b4 27 4a 1e 40 b2 80 92 bf af | 91 29 dd e3 e5 8d 54 1a b2 c3 4e f5 fa 70 5a df | 3f f7 11 8b 30 04 85 e6 00 fc df 4a f8 63 a9 ce | 38 f2 7c 9e bf e7 aa 6c 51 0c 26 e0 f2 3a 12 6b | 29 00 00 24 7a 35 42 ce 34 04 04 57 a4 48 47 35 | 56 ae 37 50 6d 6b b9 18 e7 0a e4 12 4e ef 0f 1d | e0 a7 cb 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea a8 f1 c6 be 84 ee 15 46 58 b3 d5 | 8e ba 1e e7 f5 a8 48 b9 00 00 00 1c 00 00 40 05 | 03 f5 9e 01 93 c6 ea 77 b1 6c 5c 90 de bb c7 8a | ab c5 48 5b | libevent_free: release ptr-libevent@0x7fb374085870 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adb080 | #722 spent 0.0634 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #722 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3800319a0 | handling event EVENT_RETRANSMIT for parent state #751 | start processing: state #751 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #751 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #751 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #751 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.731786; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.505275 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adb080 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #751 | libevent_malloc: new ptr-libevent@0x7fb374085870 size 128 "road-eastnet-nonat-244" #751: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #751) | ae b9 96 92 13 03 18 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 18 de 27 b3 41 d9 b4 97 87 96 94 92 db 34 d5 | 56 66 24 e2 24 37 ce bd 92 7b e3 87 23 69 e7 bb | 99 85 d4 04 ba ee 4f 3a 2d e4 f5 20 88 1a da 6a | 37 fd 29 25 a7 48 4a 55 fa 78 65 6e 2e f9 46 8a | 6d b2 51 bd 8a 24 ee 67 2d ab b9 57 1a 5e d8 74 | ba ae f9 c0 cf 53 67 dd e4 f0 25 8c f7 8b e5 cc | c4 b9 b2 2e 91 da f6 5e 10 27 44 76 09 73 cb 05 | ee ff b8 22 52 36 b5 70 b5 f3 a3 21 0c 9b d9 c3 | 6e 1e fd a6 b5 36 62 17 f0 b8 95 48 d0 79 59 86 | f0 3b ca 96 84 68 69 d6 59 82 c8 2b a6 a6 4f 06 | c3 dc 73 a0 8a 74 9c 4d bc d3 4c 09 2f b7 5c 51 | 36 1f a0 36 a1 c5 d6 a5 b8 10 87 71 e5 72 18 60 | 29 95 15 48 57 c7 bb 89 e1 44 1c f8 fb 56 fa 24 | e6 14 3b 9a 5e c3 26 ff 0c 04 49 70 a6 59 7d 65 | 41 4e c0 79 9f 67 e9 9e b7 b9 6a 02 99 b0 ea 24 | f8 69 67 ed 88 82 6b 65 bd e8 e7 35 b7 cf 86 4f | 29 00 00 24 5f 12 63 14 37 ca 62 06 c8 d7 61 a7 | 8b 59 9f 9f dd 4b 86 2c 58 45 7a 5d a8 0a d1 a1 | 93 37 6f 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 41 84 a3 d1 08 28 c1 a2 36 a7 52 | e0 0a 68 b0 f4 d6 13 58 00 00 00 1c 00 00 40 05 | 6f c5 8f 9c 48 4f ce 63 14 03 29 e5 1c a9 3b f7 | 4c 7b c3 5c | libevent_free: release ptr-libevent@0x7fb35c0ca170 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800319a0 | #751 spent 0.0647 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #751 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #703 | start processing: state #703 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #703 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #703 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #703 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.731859; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.500263 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800319a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #703 | libevent_malloc: new ptr-libevent@0x7fb35c0ca170 size 128 "road-eastnet-nonat-114" #703: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #703) | ae 90 67 40 0b c3 60 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 19 9b e5 9c 8e 57 c1 33 8b 94 01 97 8d 71 df | fd 30 9e 4b 3c d1 62 ac b2 ef 34 9e 04 b9 be 20 | 28 4d c1 c0 e4 75 70 3a f1 2f c3 4b 44 fd be 81 | 03 75 3c c9 fe 1b 81 d5 34 29 50 d7 8f 3f 70 56 | b3 d7 36 46 b1 89 89 80 d0 ec 97 d4 da d5 f4 f3 | 90 a5 07 30 19 0d e2 de 67 bb 84 67 ec 14 1d f9 | c9 6f 5e a4 ca 2b bd 62 3a a4 de d7 ad b7 a9 69 | 14 ce 78 80 17 fa 13 c7 37 12 cc 43 83 21 10 58 | 9d 2b 15 15 d8 e4 b1 cd ac 75 15 a1 72 52 09 be | 1e 67 15 57 3b 30 67 e6 f1 bc 1b 0d 33 dc 86 88 | 03 17 c7 52 df f2 2d 62 41 fb db 4b e5 00 8b 99 | 4e 97 2c 6a 81 e0 5c ea fe ad de f5 d3 4c 63 11 | e5 8c 09 a5 fe ec f4 22 ed 0d 56 cd ca 1b 22 80 | a7 f4 83 61 3b e7 31 76 2e 63 32 19 00 cd 04 39 | f0 c5 a6 71 47 ce da 1d cb a8 66 69 90 c8 a9 5a | 7f 0c 41 bf 5b ff 6a 04 a1 60 dd 0c e7 19 60 15 | 29 00 00 24 e3 5d d8 49 01 1c f9 e5 e1 ba 04 21 | cf 21 a7 36 74 86 ff 7d d6 85 f8 5d b2 3c d3 44 | a8 44 11 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 c6 13 89 f0 56 8f ca 89 41 0b e7 | d5 b7 99 19 f1 5e ec 03 00 00 00 1c 00 00 40 05 | 48 a2 09 85 61 af ec 54 8b 03 81 ed 23 cb 58 07 | eb 48 95 a0 | libevent_free: release ptr-libevent@0x7fb35806e450 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #703 spent 0.0645 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #703 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #708 | start processing: state #708 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #708 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #708 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #708 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.731932; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.496691 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #708 | libevent_malloc: new ptr-libevent@0x7fb35806e450 size 128 "road-eastnet-nonat-153" #708: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #708) | 83 fb 36 71 76 29 5b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 da 77 6f a1 f4 e9 2a b9 26 f3 f4 92 2d 46 f4 | b0 7a 40 33 85 5f c9 7c 72 d1 cd 54 8c 98 37 24 | f9 0f 31 c0 59 59 24 f6 b1 81 e9 3e 4e d8 2e 7c | d3 b0 17 2c 94 6a 08 cb de 35 37 9f 1e 5a 20 07 | 0c 50 86 38 97 07 6a e1 c5 0b 65 c8 6b 40 d7 23 | 14 ad 46 39 49 f8 1f 78 30 1f f3 26 21 9b 0d c6 | e7 c6 21 16 0b 17 ff 88 3b 14 95 13 3f 92 c8 82 | d7 c4 ee a8 41 71 fd 1b 20 11 da c6 5d 3a 47 d1 | ca bc a1 5a 85 26 5d 5a 28 9f 54 25 f5 62 92 f3 | fe 06 f5 6b 43 32 33 40 13 b4 f7 f9 75 91 87 ca | 2d 29 62 a0 43 63 6e 0a fb 1e d6 2f 78 ad 10 0a | 3c 75 ef b9 fa c4 90 84 df 4f cc 90 59 78 ab 87 | 9f a2 c3 c2 7f d2 98 4d 55 0c 9e e5 34 c4 ad d0 | 3c 21 98 a2 b3 b7 59 1e cb 10 0a be 37 e9 ef d7 | 36 78 d7 47 cf 88 0a e6 42 a5 bc 51 bf 4d 18 8e | 51 22 ad b5 62 a9 c6 e9 19 d6 ac 7e d0 4b 90 54 | 29 00 00 24 44 8a 54 75 91 ac 9f 57 e7 e2 61 bb | a3 bc dd 31 8a 95 c4 e5 bc bb 80 d8 96 43 b6 04 | ee a9 3a 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 36 27 57 09 35 01 20 a6 6d 08 d6 | 77 61 10 b6 75 1c 9b de 00 00 00 1c 00 00 40 05 | a5 a2 ff 3d 75 4a 07 bb 58 ea 97 e6 0f 3f 13 76 | 41 34 e3 b6 | libevent_free: release ptr-libevent@0x7fb35008da90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #708 spent 0.064 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #708 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b12c00 | handling event EVENT_RETRANSMIT for parent state #667 | start processing: state #667 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #667 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #667 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #667 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.732004; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.501043 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #667 | libevent_malloc: new ptr-libevent@0x7fb35008da90 size 128 "road-eastnet-nonat-166" #667: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #667) | 7b d9 27 49 fc 2f 27 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 df f5 cd e2 64 d8 37 7b 17 93 12 89 61 a5 0e | 54 43 72 d9 e7 56 eb 78 19 d8 ce 7b ab fc c4 ce | 29 4e 82 3c 51 f6 26 9f a7 b1 c1 26 57 58 94 3e | 7b 87 b0 70 18 07 62 51 cf ed f0 18 a7 02 45 64 | 29 d3 04 3c b6 f3 aa e6 9e b7 08 a5 d0 f8 46 16 | 01 f6 5d 3b b2 ab c3 c0 7a 8b fd 23 1e c0 aa 9e | 88 07 cd f3 38 23 f9 56 92 5f 01 ff 11 16 9f 7e | 88 51 70 b8 3b 7d 47 76 0c 28 0d b3 12 dd e5 34 | 27 62 ae d8 22 f8 9e d7 02 23 08 f5 22 88 a1 54 | ce e8 4b 93 e9 2c d5 39 6a b2 ee 0e 4a 7c 28 7f | b4 be ec 6c 77 cd 49 9f c1 61 d9 cb 36 3e a7 9e | a7 7c d6 ff 97 c2 82 05 bf cb cd 80 8d 87 fc a5 | 16 bb da c3 6e 7a 00 71 0f 91 4c b0 68 cd 77 21 | 13 d2 82 d8 54 7d 82 0e 40 c0 42 f3 49 4c 09 2d | 3f 2d f3 fc 4d 1d ea ae d5 68 9c c1 d7 8c 7f 3d | 4d 87 88 e0 eb 30 69 4a 07 13 c2 69 06 f4 34 e6 | 29 00 00 24 cf 70 1d 7e 4f db c9 b0 ee c5 af 49 | a2 ae b2 09 b2 1a 80 0c 2c 53 c7 0a 40 2e 76 18 | 3f 09 61 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd b0 a3 f1 2d 95 77 d4 30 95 3f d8 | d6 55 df fc a5 31 ef cf 00 00 00 1c 00 00 40 05 | 40 4e db d5 d8 6b 01 95 ad 35 71 f3 b1 25 66 78 | f8 5d ed 97 | libevent_free: release ptr-libevent@0x7fb36c082c30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c00 | #667 spent 0.0686 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #667 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a70b50 | handling event EVENT_RETRANSMIT for parent state #706 | start processing: state #706 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #706 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #706 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #706 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.732083; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.49776 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c00 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #706 | libevent_malloc: new ptr-libevent@0x7fb36c082c30 size 128 "road-eastnet-nonat-185" #706: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #706) | d6 7f 43 f8 51 c2 59 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d ca f6 8d 57 76 e3 b2 b8 21 63 3a d9 6b 17 ac | 1d a3 0a a8 65 8a 73 ce 66 97 d8 a3 fe eb da 4b | 83 ee ee bc fe 2b d0 aa dd e6 65 08 18 59 e4 95 | 09 18 a4 39 b6 a7 f4 f9 2f da ab 36 4c 80 49 63 | ef 16 9b fe ec 5c ed 9e ae 36 1a ed 1b d4 af 83 | 89 ee bf 02 2f 2a 53 9b 57 89 ac f8 bf 5e 38 99 | e4 40 07 3c ed 06 cb ab b3 a6 c6 c0 55 73 07 12 | b5 0c 74 dc 1f d0 ce 7b dd e0 58 fe 36 aa 47 3e | 4c f7 16 70 36 92 d1 18 ca a6 68 9e a3 3e f4 fd | fd 01 7d 36 f6 5e eb 58 0f da ff 7f 73 d0 8f f8 | 40 11 40 98 2d 26 98 9d 07 8b f8 c9 08 66 7e 6a | 9a 49 1a 01 ed 32 66 90 e2 a6 41 73 76 5c f7 ec | 6c 8a d8 8d ad 2e 38 8d 00 f8 49 ba 59 c5 fb ee | 6d 7a 7c 5c 87 f2 99 5e 69 88 db e5 5b 1d 7d 33 | 71 a2 b7 37 fd 2b c4 8b c8 67 fb a6 f3 ec 68 08 | 8e 1b b3 a6 50 20 ca a4 1d 80 b1 97 13 a3 05 ba | 29 00 00 24 2d c8 fa 54 cd 1d 1f 06 d1 eb d2 15 | 6f e9 7e 83 80 52 a9 d8 d9 e9 24 fc ad 86 d9 31 | 9c b4 55 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b a9 09 9b 3f 46 0d e5 b9 f0 c5 5e | 3e 6a b5 e5 b3 2c 1a 78 00 00 00 1c 00 00 40 05 | 49 ac ac 8b 9b 7a cc f6 f1 c5 f0 57 32 77 7b 51 | e7 ba 7d 05 | libevent_free: release ptr-libevent@0x7fb34406f6a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b50 | #706 spent 0.0653 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #706 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c017ea0 | handling event EVENT_RETRANSMIT for parent state #672 | start processing: state #672 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #672 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #672 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #672 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.732157; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.496003 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #672 | libevent_malloc: new ptr-libevent@0x7fb34406f6a0 size 128 "road-eastnet-nonat-136" #672: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #672) | 8a 51 a3 6f 68 f7 9e 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd e0 86 ed 60 a3 d0 a6 8e 6b 9a 00 e5 84 70 47 | 32 b4 99 4f 0d 05 58 a3 bb 0d be c7 e9 7e cd ad | 4f e6 63 7d bb e8 41 3e fc 88 30 2c a3 77 90 4d | 35 a6 66 a0 1a ec 48 93 2f 14 8c 8f fe d5 df 84 | e5 b6 10 27 23 7d 77 97 15 e0 10 30 36 f6 b6 80 | 26 8c 8d 3c 23 cd 46 8c fe 9f 38 e4 8e 1c c7 31 | b5 28 84 af 9f c7 49 71 f9 9b 12 64 93 29 98 16 | 5a 87 88 39 9f ba f9 8b 6b 1a 6c 85 af 62 ca a4 | 00 2b d4 50 98 a6 48 d3 a9 8e f3 da 34 94 7c a4 | 1a 0a ac 81 46 8c 7d 48 0f ab 18 93 af 03 df 02 | df 31 b2 61 3d 21 11 b5 2e d1 3a bd f0 29 fc f6 | 44 a4 9e 23 a0 a5 78 a1 b4 fc 98 b3 83 06 25 39 | 76 e1 3c 9c b7 9e 50 5c cc a7 ac 96 00 fc 08 6f | 31 b8 68 11 66 46 8b 52 dd c4 ea 4d 22 5d d2 e3 | b7 89 33 b9 bd 6c 60 86 ae 27 9b 88 9a 4e 35 21 | 7b ba 09 1f bd a5 fb 07 d5 d4 0b 0f e2 d2 63 bb | 29 00 00 24 10 82 d2 ac eb af 8e 07 dc 69 e2 0d | 6b 97 c2 9b 07 bc 50 39 f2 b6 8e 4f f1 fa 6e 4a | 37 dd 2d 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 8a eb dc 69 3b 2f bd 92 77 b8 05 | 58 f7 11 b4 d0 e4 bf 88 00 00 00 1c 00 00 40 05 | e2 45 f2 76 d6 58 48 de fd 60 b0 02 91 58 f0 cf | 83 ee 8f 98 | libevent_free: release ptr-libevent@0x7fb35407ff20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c017ea0 | #672 spent 0.065 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #672 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3840318d0 | handling event EVENT_RETRANSMIT for parent state #664 | start processing: state #664 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #664 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #664 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #664 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.732229; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.478161 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #664 | libevent_malloc: new ptr-libevent@0x7fb35407ff20 size 128 "road-eastnet-nonat-123" #664: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #664) | 9a a8 29 98 c3 de 5a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a d8 e3 37 12 b2 ef d1 da f8 45 1f e4 d1 c2 83 | bd a0 b4 7d 46 7a 1d 21 e7 39 76 71 00 55 ce 6f | f0 be cb 41 93 48 b1 e6 9b a0 dc 26 bf 39 0e 5e | e2 b9 8f 3d 51 d2 55 33 8b 98 1f 57 b7 08 6b 49 | 47 a3 42 1c c7 26 45 fd 43 8f 8a e4 32 11 da b4 | 60 41 cc d6 cb 7c cf 3c cf 62 25 19 cb 5f 50 b0 | 66 1f 87 29 8a 25 50 d2 76 81 60 2d c0 1a fa e4 | 44 6f 51 82 a1 8e 22 65 3d c7 77 00 d7 5d 66 3b | 34 e2 14 f5 00 89 95 83 41 4f 2f 17 fd 8a d0 82 | f4 75 70 eb 12 8d 3f e0 49 82 73 ea 26 fb 10 63 | 49 47 94 a5 80 94 4f 74 c7 e2 49 81 51 fe 91 b7 | ae a2 9c 0f 74 e3 9e 7c d9 1b 46 f6 50 85 9b 34 | 44 96 a8 da 7c 30 fa 27 4e 96 53 c6 da 8d 0b 8d | cd 2a 37 df f6 0b 7f d5 79 cf a5 8a 18 bf 15 d7 | 2b 16 dc 57 cd 3e 9a b4 b1 6c bf 76 41 2e dd 85 | 20 be 9a b5 82 7e bd 21 3e d7 a0 f1 0d c4 17 21 | 29 00 00 24 8d 10 93 7b d2 8b c4 8f 3e a4 09 2d | 41 e1 82 de 20 3b ef 97 ec 41 fd bf 52 be eb a2 | 8c 94 3b 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 9d a1 e9 3f f2 d8 36 8a db 54 8a | 88 a2 97 6f 50 ce f2 f2 00 00 00 1c 00 00 40 05 | 52 96 33 a1 e3 08 31 cd ae c8 55 ef af 0a fa 55 | 48 74 e2 3c | libevent_free: release ptr-libevent@0x7fb36c077c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840318d0 | #664 spent 0.0629 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #664 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab90c0 | handling event EVENT_RETRANSMIT for parent state #724 | start processing: state #724 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #724 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #724 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #724 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.732301; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.498594 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840318d0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #724 | libevent_malloc: new ptr-libevent@0x7fb36c077c70 size 128 "road-eastnet-nonat-190" #724: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #724) | d8 1c 6e 85 91 89 a3 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b de 88 5f a9 9d 9f 4a ba 73 08 37 d8 73 92 bd | 98 01 1e 07 58 d1 bd 9e 94 c8 19 b3 d8 04 89 00 | 76 aa d6 d1 63 6a 07 fa 53 c6 90 66 df e2 97 f3 | 3c d9 b0 e1 11 2a ca 4e 08 bd ce bf ec 35 bc f6 | 93 75 93 c3 27 5a 87 df ca 9f c6 0c e1 14 ca 81 | e7 91 a3 96 b7 0a 4b 1c 36 d4 88 78 ba 01 85 71 | c4 53 40 7e 7f 43 33 e9 c4 83 3e 45 df 0f c5 fa | 69 a7 38 69 b0 0f d3 83 7e 7b de 5d dd c6 e0 fb | 0b e9 aa b1 12 3e 19 c2 56 6e ba b8 9d 18 93 e8 | aa 44 6e 8a 6d be 62 4a 02 fd 73 71 b4 38 01 21 | 91 1e ce 98 c8 d0 d8 5e 38 8e 55 9c f3 8f 26 1e | d2 c2 28 3a 2e de 40 fa 17 cd 9b 8c 58 ec 62 2b | d4 b3 1f 01 98 ed 74 7d aa 00 c0 b6 32 cf 56 d0 | af 2d a5 2d b1 f9 4a 1c 18 82 b0 e3 c5 fa c0 30 | 40 7e 51 dc 60 0c a5 93 8e a7 3a 0f 04 35 78 04 | a2 3c f4 bf e9 0c bd da 36 3c 51 23 68 58 10 25 | 29 00 00 24 64 54 99 ea 39 03 03 79 05 41 c1 1e | 77 53 cd 84 bf 45 30 cc a5 b0 b5 0a 02 05 58 10 | 79 31 ef cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 23 c5 7e 24 d1 34 b2 de b7 23 38 | 86 97 29 8a 57 94 13 c1 00 00 00 1c 00 00 40 05 | ca f2 42 8a 65 1e 49 7e c6 31 6f 76 92 ca b3 81 | 65 f9 d2 13 | libevent_free: release ptr-libevent@0x7fb358073c30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab90c0 | #724 spent 0.0647 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #724 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35002a9a0 | handling event EVENT_RETRANSMIT for parent state #684 | start processing: state #684 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #684 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #684 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #684 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.732372; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.495919 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab90c0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #684 | libevent_malloc: new ptr-libevent@0x7fb358073c30 size 128 "road-eastnet-nonat-168" #684: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #684) | fe 13 79 f4 87 18 7a 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c a3 3b ab 91 aa e9 1c 1f 09 51 cd 63 31 b4 f6 | 27 05 e2 58 eb 11 21 fc 74 8b a1 04 48 38 e0 4b | 3e eb 3c 47 9f e1 28 6a f4 cf cd b0 2f 86 fe 42 | 06 be 5c 6a f3 0a ed 96 af 36 41 a8 95 43 50 86 | 62 97 ba dc 54 cc 86 ec 1a 93 e8 8c 86 bd 6a fd | 31 85 d3 58 12 be df c0 96 2f 7a 9d 76 f8 ee 26 | 9a 43 6d a6 d5 f1 30 04 83 a9 49 c2 dc d4 6a 20 | 1a a0 77 c4 16 45 81 34 61 94 d1 87 44 ee 60 b8 | 64 38 4f 17 86 f2 34 5c ce 1a ca cd cc 73 9e 4c | ad 5d 12 fe 07 4f 80 6b 47 cd 8d 28 e2 55 47 11 | 39 18 ea a9 6c bb f3 f3 0f 8d 00 15 59 01 c9 80 | dc 86 1f df 0c f8 d3 db 42 55 8e 18 b9 71 3f 72 | b9 64 4e 7e 16 72 18 aa 5b 2f 5c 3c cd 00 ea 61 | 42 52 f3 7e 53 72 7f 07 33 50 b0 ec ed 4c b3 11 | eb 58 4d b5 c5 0b 02 4d 09 d9 c0 f7 15 fe ed 15 | 67 5b c9 94 30 44 36 30 17 51 bd 8f 69 8a 1e 07 | 29 00 00 24 67 c4 83 c2 98 c0 7a 1b 9f 67 5e 99 | 8d ac fc 2a ad 63 42 f3 d0 ee 64 a2 cf 91 5e 20 | 6f 96 d3 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 82 99 d5 30 8b 22 4c 45 76 09 65 | e5 33 b6 41 67 45 7b 6a 00 00 00 1c 00 00 40 05 | c8 40 1d 53 f1 98 45 16 51 e3 1b cc 43 1f 4a 55 | 08 fa fe d9 | libevent_free: release ptr-libevent@0x7fb36408b100 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35002a9a0 | #684 spent 0.0642 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #684 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c00cc10 | handling event EVENT_RETRANSMIT for parent state #668 | start processing: state #668 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #668 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #668 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #668 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.732445; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.488814 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35002a9a0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #668 | libevent_malloc: new ptr-libevent@0x7fb36408b100 size 128 "road-eastnet-nonat-110" #668: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #668) | 69 d8 43 4c ca 0f 15 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 41 d2 79 13 fa 3a 8f cb d5 3a 12 ff c1 bd 72 dd | ec 4a 69 1d f5 bf 64 dc 82 8e 85 c8 60 0f 31 b8 | 2a b5 99 5e 2e db 16 88 62 d0 a8 a0 e7 ed 8c 22 | 9b 22 dd 67 cf 53 b2 41 57 e0 6d 62 0b ae a9 e2 | a4 33 ef 81 fd 1e 99 10 3c 05 f1 b1 63 cd 1d 4c | 81 83 e9 17 13 bb 86 a3 f8 34 d0 be b4 67 f9 24 | 19 c5 94 10 ae 8f 69 b3 cd cc d3 2f 95 57 65 09 | 5a 47 e0 ce 39 9e ff 8b 27 cb 00 b1 06 c2 96 f3 | 87 01 78 7b 55 94 56 97 f0 1a b4 de 45 49 99 29 | 41 cb ee bd 0c bf fe c2 39 91 19 f8 ca 82 eb 04 | 9b 78 1c 89 01 44 b7 86 45 f1 a7 24 c6 c7 c9 55 | 95 6b c2 87 ae 27 a5 78 aa 04 30 8d d9 4e 9d 41 | 61 6c de ff f0 c9 f3 64 d3 6c da 3f e7 7d a5 7a | cb 07 a2 96 df 94 f1 bf fc cf 2f 7d 5e 6d 6f 1b | 83 aa 52 10 ad c1 b7 85 95 a6 c3 93 b1 03 49 41 | 3e a1 3a 94 67 5a f2 ab 4f 45 a4 3f 47 2b ce 53 | 29 00 00 24 8b 75 29 44 a0 34 83 1a bc d3 07 46 | 1a 97 11 01 01 9b c6 7d 43 08 5a 1e e3 e6 55 93 | 99 2b d6 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 9b 57 88 6a 86 10 db 30 73 b0 26 | 55 1c 17 3c 26 62 fc 8d 00 00 00 1c 00 00 40 05 | 6f 2b 74 b2 0a ff ff 57 56 7c 59 c9 0b 6f 36 1d | 69 a9 e2 f6 | libevent_free: release ptr-libevent@0x7fb37c07bc30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00cc10 | #668 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #668 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb360044df0 | handling event EVENT_RETRANSMIT for parent state #560 | start processing: state #560 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #560 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #560 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #560 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.732517; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.44026 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #560 | libevent_malloc: new ptr-libevent@0x7fb37c07bc30 size 128 "road-eastnet-nonat-21" #560: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #560) | 61 ee e9 29 f9 69 ed 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e1 5b d2 4d 27 a5 64 87 b5 53 0f 2d 27 23 c3 80 | 59 cc 4a 83 42 0a c4 7c 74 74 a9 17 dd e6 bf 21 | c5 97 86 51 a0 18 a7 55 17 b7 10 8d 1e b0 a4 7b | 87 6d 2d 89 28 1e 78 86 6d a6 2c 5e e4 1e 5e b3 | 8b ff f7 4a ed eb 04 dc d3 8b 68 b2 08 51 f1 90 | 83 7d 2f 12 5c 80 ab 52 30 6f 5a 2f 21 d3 f6 2a | 24 28 c1 3d 11 09 6e 37 07 e3 bd 5a 6b 28 45 fa | 2f 6d b4 10 49 37 83 73 b1 f3 31 9b 80 01 11 22 | 5f a1 e0 5f 63 e5 ef 6f d7 20 b9 78 da 97 fb dd | 03 07 83 ee 70 56 66 02 29 c9 ab 5f 38 ff a9 d5 | e9 8a e3 9f e9 fc 01 13 30 ba f0 d8 18 76 b9 3b | 5f 09 cc 0c 64 e9 65 14 08 ff dd c9 6a 40 e5 8d | e6 ec 0a 5e ab 63 d2 1f a2 70 05 7f 44 94 93 ef | d9 cd 76 d1 2d 31 22 90 40 07 c7 7c a2 53 ce 36 | 14 46 8f da 4f 94 35 cc 7b b4 58 99 54 67 3b 56 | 36 26 06 7f 4a 38 3d 7f b5 57 e0 c9 8a 7c b4 a2 | 29 00 00 24 6d da b8 df 8d 0e 39 36 00 cd 36 1c | c8 6c 4e d3 97 de 45 90 16 f8 97 1f 18 a8 59 71 | e2 d8 bb b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b1 4c ac 81 8b a9 9e 5f 7e 2a 07 3b | d2 dd f3 4f 02 d8 73 9b 00 00 00 1c 00 00 40 05 | 0e 12 95 b1 fc 7d ce a6 69 21 08 f2 b2 a7 af 4b | 42 43 c7 4f | libevent_free: release ptr-libevent@0x7fb36005ee70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360044df0 | #560 spent 0.0632 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #560 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b07dc0 | handling event EVENT_RETRANSMIT for parent state #704 | start processing: state #704 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #704 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #704 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #704 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.732589; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.496767 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360044df0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #704 | libevent_malloc: new ptr-libevent@0x7fb36005ee70 size 128 "road-eastnet-nonat-227" #704: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #704) | 23 4c b8 04 68 32 c1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 3a ac 56 14 08 70 10 a2 34 db f9 cc 75 9b 41 | d9 78 33 6d 3e 54 14 96 f1 9f 07 fd 71 d2 bb f4 | f5 9d 35 70 a8 82 5c 73 ad 62 0d 20 44 a2 21 f5 | 94 5c 04 7b 84 43 ac 51 c9 f9 77 db b1 cf 7e 08 | b7 e6 cf a7 f1 9d 4d 37 b6 28 e7 f6 a0 a6 cf 8a | 2c a0 7b 96 11 a1 37 54 ae f4 a3 93 55 4b 7e 8b | d0 8a 27 00 d5 64 36 b1 c2 d9 ba 29 d8 a2 16 05 | dd fb 59 ef 24 58 33 9e ac 2a 88 48 84 e9 53 28 | c7 9d 5d bc 44 c8 70 17 d2 d0 d0 a4 35 72 da 6e | 9b 84 8e 8c 6d 4d 5b 4f fb cc 6d ee 81 aa f7 23 | 07 f9 5f 13 36 5a 45 44 ae 6b c2 b5 0c 64 f9 5d | 33 6a 2b a5 33 65 bb cb a4 25 6a c7 fc 53 f4 eb | ec fb f4 4a 8c 01 69 1e e8 15 90 da 3e e8 e7 e4 | a9 bc 12 b2 3e 67 e9 07 38 7b 7f ab 7c da 25 d2 | 97 fc 1f 16 04 10 f4 d2 00 07 db c1 f8 21 00 e5 | 11 9f f5 be ae 9a 37 75 35 e1 f5 13 de ae c3 61 | 29 00 00 24 2a fe 38 a0 12 7a 3e d7 16 fa 98 10 | a9 db 26 69 36 69 61 cd 14 ca 40 97 d2 72 a4 b6 | d3 f7 cf 73 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 45 5c 53 3c 72 83 7b 27 77 59 fc | 37 eb 14 fc 78 79 76 26 00 00 00 1c 00 00 40 05 | cc 0a e4 80 a3 0e b9 40 1f 4d be 4b 21 2f 7d 7c | 54 e3 c5 be | libevent_free: release ptr-libevent@0x7fb3380856d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b07dc0 | #704 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #704 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb340025210 | handling event EVENT_RETRANSMIT for parent state #713 | start processing: state #713 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #713 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #713 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #713 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.732661; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.502007 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #713 | libevent_malloc: new ptr-libevent@0x7fb3380856d0 size 128 "road-eastnet-nonat-207" #713: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #713) | 20 dc 25 60 99 b6 74 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 1a 96 8e da d9 76 91 00 af bb 9d 79 5c a7 f9 | 26 9d cd 16 f2 cf f0 0f dd 87 89 cd 98 91 eb 12 | f7 47 01 49 c9 0c ea 1d 57 4d 8d 91 7e f9 5c 7d | 62 0f af 55 c6 bc 19 04 21 c1 da f5 0d b7 e3 c7 | 41 ab 99 a5 b4 0f 24 bf bd 73 7a 98 7e f2 66 cc | 39 17 ee 34 24 36 ea 24 e3 a8 cd 1c e6 e8 5a 7f | 02 cb 52 c1 dd 90 79 6c 09 65 91 9c 65 f3 ff 96 | 37 cb cc 02 51 48 e0 ea 49 21 16 ff ee ee 96 24 | 7e bc 47 96 21 d4 d4 e3 da f1 b1 67 58 e0 84 dd | cd 55 51 7a 46 9a 9d 6d 24 17 4a d7 b1 02 0a 7c | 2b 10 29 49 15 25 a5 35 a0 5f db 1c 3f d4 d5 d1 | ba 0c e0 43 cb 60 ff 0f 6f 32 b4 f2 ed 61 11 ce | ac 22 75 61 4c 15 28 19 61 92 f0 56 38 fd 6f 8d | 1e 94 22 c4 ed 8e 7c e6 0e 10 58 4f 8b 71 f0 63 | d0 57 19 ab 38 9b 18 02 96 06 c0 6a c4 51 d7 5c | d1 98 c8 9d dc 57 3d 80 8d bf 2e ee 62 b7 a7 01 | 29 00 00 24 44 80 b4 97 28 30 0f ac 4f 85 8e 79 | 66 f6 8c 9d 57 3e 45 8b 53 c5 51 08 e9 85 21 22 | 22 bd a5 bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 16 73 ae ce da d8 0d 5b 76 05 8d | 10 2c 6d 16 83 97 d4 49 00 00 00 1c 00 00 40 05 | 1b 17 49 13 60 8d 27 d3 b4 e3 12 fd 7c ef 9d 70 | 2a 84 34 8f | libevent_free: release ptr-libevent@0x7fb378075590 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340025210 | #713 spent 0.0647 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #713 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #669 | start processing: state #669 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #669 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #669 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #669 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.732734; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.480707 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340025210 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #669 | libevent_malloc: new ptr-libevent@0x7fb378075590 size 128 "road-eastnet-nonat-180" #669: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #669) | 46 a2 b7 1a 0c fe 64 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e 31 53 7e b2 89 dd d9 14 72 7d 9f c9 13 b2 a7 | 63 19 33 b8 10 a2 fe 59 17 6b 7c b7 37 86 65 b5 | 65 e2 70 cb 0a 7f 2e 78 64 ed 5e 82 f3 0a 01 66 | 19 63 cb 22 32 9a 15 07 e2 8f 9f 13 78 a1 94 38 | 6a 3a a9 9c 68 86 57 44 79 fe f5 47 ce f2 42 04 | 1b 64 29 d4 d9 a8 31 e2 d6 94 ff 12 34 20 67 33 | 3f eb 27 b6 ea 9f 51 b5 31 d7 e4 79 d1 75 2f 2e | 0b e0 61 43 30 7c 1e 88 88 5d ae 34 52 7d 83 d2 | 70 96 22 1a 57 50 af 3c 3f b0 a5 d1 35 bc b2 a5 | 5d a3 98 e3 c3 65 34 bb 25 67 04 de 8f f7 d1 38 | 62 08 6f 4a 4f 97 9e 27 42 a1 3c af a0 71 dc e9 | 88 9c e5 3e 13 70 8a 7a 18 08 7e f5 c7 28 a8 96 | ea c1 cd 65 03 cd 4a 04 4f c8 6b 29 fd ca 51 41 | 35 65 3e 5d 3d d3 fe 1c ec d9 09 50 c2 51 46 0d | d8 9f 47 d1 97 f0 ab 20 09 d6 b0 da 46 e7 a7 26 | 2f 67 cc 15 6a c3 da b4 1c a5 57 88 dc 7d ec 25 | 29 00 00 24 a1 72 a5 b5 61 3e 68 21 f0 1b e4 c9 | 7e f5 3a 1e e4 e5 46 a1 1b 4c 51 eb 2c c7 94 6e | bc 3a ce d6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 dd 73 ee 85 14 4c 35 d3 87 b0 51 | 27 94 ae 1d 74 91 ea ff 00 00 00 1c 00 00 40 05 | 6b 7f 6d de b3 f2 f1 3e 78 85 e6 36 cd 13 84 01 | 5d a6 40 15 | libevent_free: release ptr-libevent@0x7fb384076770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #669 spent 0.0634 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #669 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374009690 | handling event EVENT_RETRANSMIT for parent state #659 | start processing: state #659 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #659 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #659 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #659 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.732806; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.485402 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #659 | libevent_malloc: new ptr-libevent@0x7fb384076770 size 128 "road-eastnet-nonat-148" #659: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #659) | 77 e1 0b 63 56 ac c5 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 24 71 32 4c a4 b2 25 64 3e 33 ac e5 69 a3 59 | 28 37 d7 f5 67 fa 3c 10 89 2a be c8 bc b7 80 db | ae ec e3 e9 16 ca 51 c1 06 d1 7f 94 6f c4 fc bb | 73 c6 3b c8 e8 42 d0 17 d5 11 01 02 43 ce 2f 5e | 6b 05 fe bc 5e fe 6a b1 10 03 5d d6 b0 38 f7 55 | ac 53 8c cb fd 56 72 ab 02 ea 39 60 a4 1f 70 3a | 0f 44 00 88 6a 7e 20 c3 de 96 d0 8b cd ee 1a d1 | 97 7f c1 1c 23 b1 90 63 b7 e9 ab ce 37 30 6e f7 | e0 76 ab b8 cd cc 34 16 be e0 9f dc e1 2f 5c 73 | b7 57 ad 53 9d 9f 37 a8 12 a5 aa 69 7e bf 56 b7 | ef 32 86 fd d8 eb 0a 45 48 20 ef 05 c2 fd 7c 50 | 36 ee 5b de 12 13 35 96 43 92 0a 82 37 08 83 d8 | f1 44 bf d3 7f 0b c8 9f 06 3d 6f d2 e8 de f4 63 | 67 09 a1 ab 1e 3e 96 c6 bd 17 50 90 d2 68 7f b0 | 0e ba 2d 2d c6 cc f3 98 8f 85 a9 bf 83 cc 98 34 | a4 13 08 89 fb bd 67 8c b6 a0 6e e2 b4 b0 ff ea | 29 00 00 24 9b 38 e6 b0 44 13 de 09 b0 4f 0f d4 | 9c 32 85 69 0a a7 d3 e0 7e 31 28 18 de 52 8d 12 | f4 2d 68 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 04 29 42 78 19 20 e6 c7 17 a6 a2 | 7a d7 24 ba d8 b1 f2 6e 00 00 00 1c 00 00 40 05 | 4d a2 f4 dc ca 8a e9 4b bc de 2e 89 0d ba cd c5 | 42 51 87 1c | libevent_free: release ptr-libevent@0x7fb38008afd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374009690 | #659 spent 0.0649 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #659 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34000d120 | handling event EVENT_RETRANSMIT for parent state #677 | start processing: state #677 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #677 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #677 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #677 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.732877; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.483621 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374009690 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #677 | libevent_malloc: new ptr-libevent@0x7fb38008afd0 size 128 "road-eastnet-nonat-103" #677: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #677) | 50 8d 95 68 b5 8b 23 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 83 aa a4 8f c6 30 45 92 c5 cf a6 91 01 0a a1 43 | f1 38 e4 4c f2 1e 8b fa c7 cd 9a 24 20 65 ff bf | b9 f0 d7 e8 39 54 34 3b 5f 78 23 e6 41 b2 72 62 | 83 82 8d 5b 8e 9b 83 e0 88 f3 03 08 95 12 34 d3 | 98 d1 ba 80 21 88 79 5e ed 78 64 b4 3e 07 35 23 | 3f b8 8f 43 78 b2 9f 35 5d ad 57 da 20 57 19 f4 | dd 11 96 05 07 92 4e 19 0b bc 45 fd 48 2f 7a 41 | ab d6 c2 78 83 b9 51 5f c2 9d bc 1f 01 00 01 1c | 96 6e 62 37 71 03 98 70 25 42 9f e1 05 cf 75 d2 | 67 9b 63 9b 3f b6 19 96 2f ca 41 d1 e1 b6 6d 22 | 8c cb fe d6 b4 86 8e e1 27 c0 a0 24 76 f2 01 5a | 83 a9 0f 76 b1 07 35 33 4e 3e e0 dc 79 5e ed 29 | 09 64 22 34 77 8d 1f f2 ad 05 7e 1b e5 4c 10 9e | 58 06 f7 85 f5 dd f1 d9 0c cc f6 9f 69 01 27 29 | 70 68 3f aa 7e a2 7d 6e d3 92 55 84 0e e6 71 17 | 1e 78 67 9e 87 bb e2 70 02 96 cb 0b b6 30 ee b4 | 29 00 00 24 00 70 fb 22 7d 0c 48 97 e3 e3 bb dd | b2 69 b0 26 7d 9b cc 69 6d 71 bf ad 98 91 5c 5d | 16 09 bb c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 db ab 8b 76 c6 3a 27 c8 6b 4c e4 | 2b b7 a4 43 65 c8 3b e1 00 00 00 1c 00 00 40 05 | a7 c6 26 92 93 c8 84 fd 1e 45 e2 6d 6b 62 ad e1 | b6 74 b5 46 | libevent_free: release ptr-libevent@0x7fb34c069bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000d120 | #677 spent 0.065 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #677 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b25c40 | handling event EVENT_RETRANSMIT for parent state #648 | start processing: state #648 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #648 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #648 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #648 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.73295; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.474171 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000d120 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #648 | libevent_malloc: new ptr-libevent@0x7fb34c069bf0 size 128 "road-eastnet-nonat-175" #648: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #648) | b9 3d 2a c0 99 78 dc 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 7b a0 b8 ff d9 f3 24 c5 c3 d8 fe 42 9c 4d 77 | 77 a6 2f 14 34 b3 64 24 e9 fd 75 86 48 0e 02 3d | 29 61 ad 94 16 d0 85 d6 e8 56 c2 ef 63 79 8f 41 | 57 5b 33 d0 fc 13 7d 5c da 24 5a b9 25 c8 06 1f | 52 14 77 e7 a4 dc b1 90 16 a1 f9 07 e6 89 42 44 | 14 11 d5 fc e5 92 89 2d 0e 64 88 0c 41 3b 46 99 | d6 26 50 07 c1 0c f4 24 da 69 56 28 7a 00 82 4f | 0c 3a af e9 e7 f5 55 29 53 80 5f 77 a4 ce 23 5d | 9b 10 b0 b2 48 b8 fc ff 0f 47 dc ca e2 38 a1 5a | b6 68 17 c3 f7 a2 7a af f2 60 dd 39 8f cf b9 23 | a2 af 01 98 52 e1 93 81 05 30 fb 55 27 53 74 30 | 4e c5 de 2a e5 a1 62 ce e0 cf e4 81 03 e4 82 30 | b0 0a ce da 25 c7 a9 75 ae 95 0c 31 7d 34 b5 13 | 8d b7 30 4c a2 f5 b0 bd 9f 11 16 f0 69 7c 07 96 | dc 39 0d a1 91 0f 8e 6b bf ba 41 e2 14 8b c7 d0 | 61 8c af 22 83 20 d8 ee a4 27 68 8b 20 f6 53 87 | 29 00 00 24 7f 9a 6e e6 d8 99 8c fa 9e 3a 9d bc | 69 5e e6 c5 2d a1 c8 09 75 1b 7d 75 dd dd b5 32 | 5f 0c 0c 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 5a 6c 36 b7 e3 94 c7 44 df 76 5a | 27 bb 1d a1 14 37 1f 63 00 00 00 1c 00 00 40 05 | cb 53 89 2a 35 01 2c a3 94 35 40 7a f6 29 fc a1 | 5c fa 01 07 | libevent_free: release ptr-libevent@0x7fb350077b10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c40 | #648 spent 0.0699 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #648 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c017ea0 | handling event EVENT_RETRANSMIT for parent state #660 | start processing: state #660 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #660 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #660 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #660 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.733046; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.474883 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c40 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #660 | libevent_malloc: new ptr-libevent@0x7fb350077b10 size 128 "road-eastnet-nonat-158" #660: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #660) | f4 6f 1b dd c3 97 a8 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 37 97 23 37 8b 84 91 b7 d5 21 d4 0b 62 7c cf | df e2 ac 72 2e 0a eb 49 05 1e 0b d1 82 e5 28 a0 | 47 bf aa c5 1d ae 5f 11 86 7c 19 a8 50 7c 93 a7 | 55 26 f6 b4 50 6b 43 66 6c c7 3d c1 5d f4 f7 0a | 0d b0 76 fa d6 23 62 3b 1d 9f 31 fa 3c 7b 58 7d | 20 ee 3b e3 02 2d bf 91 fc fc d4 ac 54 85 8f 34 | bf 3f 83 61 da 9a ff 82 88 23 3a fb 4a 68 00 0e | 90 da 22 07 27 44 0b 38 18 7b fc 7b 8a 26 93 c0 | 1e 09 9d 89 91 4e 14 70 0d 4d 2d 4e ab bc 7f 26 | aa a9 94 f1 34 22 dd 7b 42 4c a3 e0 64 ec 38 19 | e6 3a a1 45 f1 cc d3 8d 48 6c 60 e0 64 aa aa ad | 45 97 98 aa 45 d3 c1 ab 72 70 13 f6 87 f5 77 97 | bb d6 89 10 72 26 9b 74 6d a2 b8 41 cf 4b ed 68 | 80 d1 34 25 2d 5a f2 69 e3 2f e2 d6 b5 73 2b 4f | 8b d7 f9 67 93 34 a8 36 26 8a 04 d9 41 75 a6 2d | c6 bd e6 a0 4a 9b e7 19 bc a9 be 99 5e cb 41 13 | 29 00 00 24 f1 66 b3 02 a5 40 db 5b d9 27 9e 01 | 78 88 6e 9e 88 60 63 b3 32 3e c6 3b 89 b4 92 37 | a6 ee de 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f 7f 7c 35 fb 6c 2b b5 a9 0e ea 70 | a6 e8 51 cd 42 c4 a3 5b 00 00 00 1c 00 00 40 05 | ce 14 69 fa 68 3a 26 bd 8e d9 0e 4d a9 f2 9c 90 | 2d 53 9b 3d | libevent_free: release ptr-libevent@0x7fb3700647d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | #660 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #660 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb344017ea0 | handling event EVENT_RETRANSMIT for parent state #622 | start processing: state #622 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #622 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #622 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #622 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.733175; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.483003 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #622 | libevent_malloc: new ptr-libevent@0x7fb3700647d0 size 128 "road-eastnet-nonat-61" #622: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #622) | da 49 0a b3 65 ff 08 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 40 36 95 be 60 b3 e3 bd c7 ff 07 f3 83 00 12 | f5 6b 10 33 d3 d9 c4 b0 f6 be da 2b b1 9a 19 58 | 53 f9 8a 25 29 6a 79 82 da bb c2 fa 2c 51 78 6d | 66 2a 05 15 73 a7 b9 3e 1c 83 37 33 e7 f7 71 62 | 0c 9f 57 2f 7a c5 28 95 89 0c 4b d7 6a d0 b7 1b | 21 80 5c 28 7f 9a a4 6d ba 32 aa b8 62 c1 be b9 | 1e 50 93 7f bf 93 50 c9 41 bb 39 b6 d1 bb 95 dd | b2 a0 84 34 30 54 a8 a6 c8 5e f7 42 75 7c 55 3c | 9b ca c8 19 68 29 d0 62 32 30 2c 1d 35 db 78 87 | 06 dd 80 a1 55 b4 92 13 11 a1 52 06 d8 bf c1 d8 | 08 60 a4 8b 01 50 1c e7 e4 f4 33 ec e2 10 21 b6 | 14 e9 ff ce 64 51 80 1d e6 ab 36 5b 4f 73 34 4e | 32 2c 17 88 eb c6 5b 95 51 4b 06 b8 67 86 d4 7f | 6b d4 4d e7 eb 69 82 a6 9b 31 6c fc ae 3a 4b 50 | 0a 0b c3 8d 90 55 90 09 c4 39 73 b7 de f4 8c f8 | 43 4b 1b 65 eb 39 32 5c b3 32 de f7 b4 b6 0d 03 | 29 00 00 24 e8 a4 b1 28 90 aa fa fa 7e c7 b0 2c | 81 71 e5 06 ca 8a b3 bc 3e d2 88 e6 58 e0 15 d7 | 2d 90 46 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 48 cd a5 f1 0b 32 76 b4 1e a7 ed | c8 11 a6 bd 54 4b 50 5e 00 00 00 1c 00 00 40 05 | bc ba d4 87 d8 ff 76 ca 98 8e bd 6e 57 4f 18 d4 | 50 09 94 f7 | libevent_free: release ptr-libevent@0x7fb33807a710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344017ea0 | #622 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #622 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38000feb0 | handling event EVENT_RETRANSMIT for parent state #635 | start processing: state #635 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #635 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #635 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #635 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.733289; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.470661 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344017ea0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #635 | libevent_malloc: new ptr-libevent@0x7fb33807a710 size 128 "road-eastnet-nonat-245" #635: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #635) | 7e 0d 8c df c3 48 2b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 a1 90 94 fd 2b 95 44 1e 0a 6b 25 9f 00 c6 33 | 1e ef f6 4c b7 2f c3 a0 8a 85 0f b9 65 4e fd c3 | 6f 15 46 90 ab 4b 13 e7 e6 d2 34 d9 3f 71 a3 f3 | cd 4c de d4 e9 48 5f 32 4d 9a 30 7d 41 3c f4 79 | 2b e5 fb f0 14 ee 8a ae 09 42 b4 cd 39 a0 45 79 | 5d 03 2c a2 e5 66 e1 29 75 bf 9b 52 cf 30 44 50 | e4 1e ec 62 13 8a 29 5c 79 38 61 1b 99 bb f5 ca | ba a8 ac e5 19 04 33 7f 0c ca 09 aa 4c 3f 3e 06 | 33 f5 34 0d 4c 70 6b 06 18 e0 d0 1f a4 5f d7 bb | 48 ac 37 e5 66 fc 98 e8 57 0b a6 aa d5 88 82 ce | a0 e0 65 8b 7b a6 21 bb 33 66 9d 59 e2 1a 7d a1 | 33 19 a0 59 78 92 a2 99 a5 c2 35 39 ef e5 ee ff | 5f 64 b6 1d 72 92 df 75 1d 12 54 49 29 61 d0 c5 | df da b5 fe 52 67 91 82 3e 1f de bc 3d ae 33 1b | ad 82 07 a5 31 1d 91 23 7e 3c 96 a7 fb 7c 82 d7 | 17 7f 18 90 98 0c 8a 7d 26 5d f5 1b b6 e0 92 52 | 29 00 00 24 e3 02 e0 90 9a bb 82 bf e8 0d 7e 04 | 6c c4 fd f8 c9 9f eb 32 5f c2 f7 1b 33 85 e7 b3 | 07 22 69 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 9c 4d b9 97 4f cd 1b fe 43 15 63 | 13 30 6d 7b 9c bb 08 d9 00 00 00 1c 00 00 40 05 | 77 b2 bc 43 f1 e9 b3 25 e4 85 b2 70 d6 0a 47 cd | b1 cb 75 30 | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000feb0 | #635 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #635 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #520 | start processing: state #520 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #520 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #520 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #520 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.733407; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.519292 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000feb0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #520 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 "road-eastnet-nonat-132" #520: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #520) | ce 20 34 a6 bb f7 7e 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 93 1d d8 d2 b1 be 53 4e eb ed b5 53 68 b9 68 | 3b 90 1c 10 61 78 23 f6 10 87 d8 bd e4 f5 d6 23 | 53 c0 54 e9 4d 15 49 54 f1 a0 df a0 bd 97 7f 49 | f3 26 38 fe d6 f7 64 49 d3 1d 69 61 fb 72 b3 74 | 62 c9 08 94 a1 27 ba fe 91 a4 0d b0 be 34 09 2c | ae 06 17 ab b3 b7 51 c6 26 a5 e8 3e e5 24 f9 a1 | f7 68 74 98 63 fd a8 7c d3 13 6d 90 1f 14 c6 a6 | 04 85 61 e0 a3 c8 02 54 74 60 3f 87 eb 06 83 74 | 5e 85 3d 22 87 46 88 9f d4 fd 35 c2 36 a3 83 41 | ab 57 49 d7 e0 f2 53 56 77 35 4b e3 66 a6 da 67 | 4f 7e dc 81 d0 4e 81 b5 d9 96 e6 10 f9 24 0e 5e | fb e3 82 13 23 20 a1 ed ab 8f 63 39 52 b2 83 84 | b9 61 cb cd 44 7f 65 2d cb 8a 27 c6 61 e2 d1 7f | 39 5c 98 77 3c 0d d7 d7 5b 79 74 66 3f 68 61 be | d1 5d 20 ef 6b 4e 03 30 9a 82 f2 ac 7c ef f0 7d | c4 47 c7 7c c8 eb 96 9e c1 9f ef 3d 93 05 11 e1 | 29 00 00 24 10 75 51 a8 ab dc ad 6d a2 4e 44 8c | c4 29 f6 ed 6d f9 db 56 a8 84 be 4b 75 f6 2d c8 | a0 76 de b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a a7 18 b8 de c7 a0 95 e6 f4 d9 c5 | 62 97 a0 57 23 f3 99 e4 00 00 00 1c 00 00 40 05 | 3d 7c d2 81 56 1c d6 fe cd 6a 43 28 2b 9f a2 6a | e6 22 f1 8c | libevent_free: release ptr-libevent@0x7fb37004a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #520 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #520 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38400feb0 | handling event EVENT_RETRANSMIT for parent state #701 | start processing: state #701 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #701 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #701 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #701 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.733521; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.490359 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #701 | libevent_malloc: new ptr-libevent@0x7fb37004a770 size 128 "road-eastnet-nonat-203" #701: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #701) | 68 ad 39 62 89 bc a6 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a9 e0 68 21 de 01 f2 63 62 9a 39 6d 52 af 4b 2d | b4 c9 33 56 eb d2 8c 9f ba 59 3a e9 d6 15 7b 7f | b8 2e a0 53 fc ae 44 73 e4 45 e3 47 76 a0 22 f6 | 14 d0 eb 76 9d 9e 8c 73 ad 3a d7 a8 0e 86 fd 08 | 39 c2 76 22 26 07 a7 7e 54 4b d3 f9 34 75 0e c8 | 7b 0c 57 fe a5 45 d0 5d 95 94 e2 38 22 7a a4 06 | df d7 de 2d 77 d0 62 ec 16 53 18 2e d5 6e 85 3e | 9a 44 d4 b5 c9 d7 25 7d 2e 03 d4 fe 50 40 bf 29 | f9 da 48 d3 d1 54 1b fe c7 56 87 44 3a 32 7c e0 | 5f c5 77 06 8a 05 ef 24 26 bb 7f 33 c5 e9 33 9d | a6 cb b0 d2 28 37 19 18 8d 43 4e ce 15 f7 37 9c | 6e 46 8e 96 3c 83 cf af 07 cd e9 21 87 3c e8 1c | ef ad f0 27 43 77 59 ca 24 3f 93 f9 80 0d 29 96 | fc 19 52 7b ce 8d b5 b1 4e 70 76 37 e9 52 61 3e | bf 51 35 68 4a 0c b7 29 d7 35 86 dc a6 18 d3 f4 | 7b 66 33 c1 28 ff 4b b0 99 bc 28 5a 64 81 7b df | 29 00 00 24 88 87 4e bd b4 de bb 6d c9 c8 4e a7 | a4 cc 00 9f 8b 0d 61 d8 a0 b2 27 29 2d 61 32 16 | d2 33 a2 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d a9 8d a4 1c 7e 43 26 3d 83 d5 d2 | 9e 52 9b c6 6d b3 48 31 00 00 00 1c 00 00 40 05 | dc c2 86 b8 21 a6 32 d2 32 e6 c3 81 d9 7b 5e 50 | bf 6c b1 ec | libevent_free: release ptr-libevent@0x7fb35407a740 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400feb0 | #701 spent 0.0999 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #701 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c018460 | handling event EVENT_RETRANSMIT for parent state #683 | start processing: state #683 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #683 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #683 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #683 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.733638; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.486716 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400feb0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #683 | libevent_malloc: new ptr-libevent@0x7fb35407a740 size 128 "road-eastnet-nonat-101" #683: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #683) | 22 30 a0 37 9e 5e 0c 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 2d bd 08 31 a0 07 0c c4 f5 ac c5 5b e0 c5 60 | 90 d1 45 d9 1b e2 dc 82 5b 35 5b ab d0 57 64 0b | 0e a8 1f f2 6d fc 5a 7c ad 7a e8 a0 f9 15 5a 35 | 68 ff 17 43 ed b1 8e f1 b0 9c 81 b4 3b b5 37 5a | 70 13 3a f4 ca a9 f6 46 52 0c ae 55 b0 55 be c6 | 1a d7 a6 fb 47 44 eb b7 16 85 b7 dd ff de a0 45 | 17 b4 11 35 d4 d0 cf e9 45 97 61 c1 6a d8 a0 c7 | d6 0b 85 99 6b 5b c9 dc 9e 76 87 29 b7 8c 8c 9a | 95 7a 15 c6 10 17 98 93 f7 09 7a 9a cd d0 13 14 | a9 2c 55 a4 60 f1 72 80 2c 28 45 e4 d9 cd f6 01 | 55 30 ed 6a 1a 0b 81 c2 8d 64 3f 52 1f 81 ec a6 | b3 e6 5c 36 3c 8d 99 60 59 d8 e2 22 76 0c e0 0e | be 08 7f ac 91 76 6a 0c f2 45 c3 7c d3 5f 7a 2d | 17 ac e6 32 1b a2 9b 38 7f e0 1c c5 b2 87 8c 03 | 93 b7 73 13 37 e0 f4 7f 3b 5b c2 ac 8e b6 84 9a | 86 44 62 2d 89 5c f8 c8 10 4b 97 4b 7a e5 a2 fd | 29 00 00 24 00 a4 f8 e4 0c 48 4a f1 27 f4 8b fc | 65 ab 53 d7 66 48 7b 24 ce a6 58 75 84 59 a6 a0 | 2d 45 66 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 85 ce 75 72 7f 4a a1 68 df 47 f3 | a0 b0 e6 2f 94 7e 65 c2 00 00 00 1c 00 00 40 05 | 62 77 62 1c e2 c3 88 5f 5a c8 dd e7 a6 ce ac 52 | d0 9f e3 15 | libevent_free: release ptr-libevent@0x7fb36804b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c018460 | #683 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #683 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36001a530 | handling event EVENT_RETRANSMIT for parent state #674 | start processing: state #674 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #674 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #674 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #674 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.733759; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.489649 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c018460 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #674 | libevent_malloc: new ptr-libevent@0x7fb36804b7c0 size 128 "road-eastnet-nonat-124" #674: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #674) | c4 c6 34 70 7c 35 e5 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a bc 91 62 ee 2e 6d a2 96 c5 30 6d 1f 92 ed b7 | 36 56 8d b5 b9 4e e7 b6 33 c3 4c 5c dd d6 f4 99 | 88 c9 81 6d f6 b8 fb 84 e7 0a 5b 99 69 b8 6b 63 | 7a 47 28 12 93 aa 96 26 97 8f ff b9 54 0d 01 18 | 0b 01 9c b3 8f e0 95 e3 e1 9d 26 36 23 71 6c dc | 67 79 37 64 c4 24 a4 8b 9a 37 fa 7c fe 2e 7b 4e | 1a d6 c0 1d f0 ba 43 6c c9 02 6f 4f 9f c0 dd 79 | 3d 4a c7 9a 21 b7 1e b6 9d 90 fd 88 56 63 07 44 | 2e 81 d0 20 01 0b f4 e9 81 1c 3c 49 3e 91 bf 96 | a8 41 f1 e1 4c b6 83 f0 23 56 56 ad 6c 9d 70 82 | c4 41 64 86 d0 59 a6 a1 c7 b9 ee bc 84 09 46 41 | ec ae 2a 69 5c 40 a2 14 21 11 a1 b8 60 07 45 17 | 11 d0 1b 33 f1 93 91 61 7c 42 1b f1 6c bf d3 4c | 23 c1 b7 fe 96 eb 71 68 e8 19 04 8e 6f cb bd 87 | 40 31 f1 46 3f 4f 53 d3 a5 41 35 6c 1a eb f1 20 | da d9 d7 75 6a 41 10 84 60 5b cd 6c 15 bb 13 b1 | 29 00 00 24 5c 59 fc 58 f4 7f 35 a7 c0 cf f0 29 | 1a 0b a6 f7 cf a4 ea bd 59 bd c7 ac 64 c5 cf 21 | ff 47 b8 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 49 d6 82 49 46 9b e1 ef 78 a9 24 e2 | b6 c7 14 d6 61 e8 82 0a 00 00 00 1c 00 00 40 05 | f5 e0 05 f9 c1 de b5 2f 1e 75 ed d6 26 ed d6 71 | 2a 1b 30 01 | libevent_free: release ptr-libevent@0x7fb36407a960 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36001a530 | #674 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #674 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7cf50 | handling event EVENT_RETRANSMIT for parent state #658 | start processing: state #658 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #658 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #658 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #658 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.733873; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.48554 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36001a530 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #658 | libevent_malloc: new ptr-libevent@0x7fb36407a960 size 128 "road-eastnet-nonat-162" #658: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #658) | 18 43 30 64 c9 a9 96 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 8f 2e 30 90 e3 1d b1 3d b8 ff e9 fa 6f c4 d2 | 4d cb 05 e4 a2 10 ef 4b 88 26 20 b8 91 62 33 4c | d2 2d 7a 12 9c 93 d1 33 4a b1 d4 b6 b7 87 51 88 | f1 8b ca 98 0d 93 ed 84 f4 9c 46 f9 61 c4 4d d5 | fe 8d 16 c5 0c 88 ef 95 5d eb 19 30 d3 94 29 4a | 79 59 d9 d9 11 a3 76 95 63 e1 a4 9a 1e 1c 14 d5 | 3c bd 7d c0 47 b6 0d 87 c9 56 be 9c 11 14 ee 07 | 7d b5 67 34 d6 13 e8 98 79 52 f2 29 ea 87 a9 a7 | 37 70 16 dc 00 c9 cf 42 41 7d 6a af e8 16 61 11 | 8c cd 5e 52 bd e4 ca 59 92 fe cb ac d6 88 27 08 | e2 59 c0 46 be 04 20 28 16 af 0d 9a e2 2b 53 20 | 73 8a 54 b3 af e0 6e 17 fa 1f 2c 68 a0 ba 92 60 | 80 f9 61 ae 5c 11 fa e6 67 c8 30 5c f1 ed 8c cf | f0 8c f7 ae b7 44 b9 62 19 13 7e 6c 7e 19 e7 af | 31 44 0e de dd b1 f8 11 4a 1a 39 5c a5 d6 c9 e9 | ca 2b 46 08 aa 6f 5d 69 a8 0c 53 f7 bc ac ed a8 | 29 00 00 24 65 98 11 46 f7 ab 17 c4 6b 7d 49 5b | a3 fc aa 94 dd e0 11 9b 8f 82 94 fd 52 c9 5f f9 | d2 67 63 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 85 9c d9 b9 94 09 f0 06 58 49 33 | bd 1c e4 a5 79 c0 7c 32 00 00 00 1c 00 00 40 05 | 33 c9 27 c8 b3 b4 b5 08 35 b6 cc fa 47 61 1b 02 | 31 02 bc 85 | libevent_free: release ptr-libevent@0x7fb340066bd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf50 | #658 spent 0.0772 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #658 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354012bf0 | handling event EVENT_RETRANSMIT for parent state #609 | start processing: state #609 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #609 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #609 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #609 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.733952; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.462294 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf50 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #609 | libevent_malloc: new ptr-libevent@0x7fb340066bd0 size 128 "road-eastnet-nonat-138" #609: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #609) | c5 84 f5 e6 85 81 a8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b c3 e1 62 dd f7 03 a4 32 17 be e2 28 27 fb f5 | 45 a1 b1 50 d0 82 d8 71 c0 db 0f 18 56 ed 9e 71 | ab 62 12 3b 1e 2e d7 c2 88 e3 18 ba c6 4d 9e c0 | 66 e9 16 dd ad be 48 d4 08 19 fc 5d 95 a1 92 79 | 85 f1 22 51 65 65 eb df 48 a7 f9 2c 1f 7c af 78 | 1b 32 50 5b 8d 91 14 ab 2f fc 1c e9 0a eb 9d e0 | b9 b3 7c a9 c3 93 53 4b 2c 6d 79 29 14 5f 71 42 | c0 35 82 62 20 0c b7 12 e5 58 00 96 19 9d 47 ed | b5 53 5d 62 96 2a 62 44 51 f9 0e 87 7c 59 64 63 | c8 45 7c 86 64 54 df 3f 91 89 ff af 10 5d 3d 75 | cd aa cf 4b 0e a3 b7 91 a2 ab 02 7c c6 93 7f f2 | 8d 0d 67 2e 43 de f5 19 fe 61 c3 eb ca 89 dc a8 | da 1e ca b8 26 01 ff cf 71 b9 ef 31 67 1a 21 e1 | 74 9c 98 aa be 62 d9 7f c0 2a df fd 36 dd fe 56 | 14 e3 d8 7a f9 88 3d 4e ef 12 e2 a4 b6 e8 07 15 | e0 33 aa a7 d0 7f c0 9a ca fe 22 27 40 8f e2 a5 | 29 00 00 24 77 ac 96 72 0b ae 9a e5 43 fe 81 46 | 33 b5 6c 3b 53 47 2a ac 8d 43 3c bd 37 47 3d 9d | 02 54 00 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 cb 6e 3a 03 75 5f a3 64 4c ac 8d | 50 31 4f 55 75 88 9f fa 00 00 00 1c 00 00 40 05 | 69 ea 36 3f 8e fc 87 de be 9f 2d 0a 55 5e aa a3 | 63 b9 97 4b | libevent_free: release ptr-libevent@0x7fb35c06f3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354012bf0 | #609 spent 0.0658 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #609 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb33800cc10 | handling event EVENT_RETRANSMIT for parent state #571 | start processing: state #571 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #571 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #571 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #571 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.734024; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.454565 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354012bf0 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #571 | libevent_malloc: new ptr-libevent@0x7fb35c06f3a0 size 128 "road-eastnet-nonat-46" #571: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #571) | a7 5c 91 a2 a0 c7 d5 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d2 2d 65 41 a6 d9 4a 2d 30 96 90 44 a8 28 31 37 | 20 85 a7 46 f9 e1 3b d0 db 2c f5 64 1e a9 75 76 | 5e 93 ea 28 89 51 63 91 c2 89 51 aa db f7 57 7e | 26 a7 18 d8 ed ef ae 29 0c 20 23 07 c6 99 8c 3f | 4b ac 3d e3 11 e2 e0 88 37 38 4e 28 f5 79 1b f4 | c1 45 26 7e 04 84 1e 25 df 1a 20 8e 42 60 ac e6 | bb 99 02 1a bf e1 fc 57 bd 08 cc 3f c8 a4 bd 39 | 80 32 fa bd 24 5a cf 7c fb ec 2c 26 c2 d6 b7 93 | db c7 66 31 ac a7 48 33 9b 97 36 24 dc c4 b1 1f | f1 8c bc dc 99 b0 9d 65 3a 26 8d b6 ff f4 30 2e | df 5e e6 48 46 c0 2e 8b 04 ae 3d 4f 49 6c 4d a5 | a8 2c 10 62 3e 2f 34 53 59 ac 0a 46 80 c4 83 67 | 5d 0e af 36 3f c6 bd ce a8 a6 96 6c e7 14 1c 6e | ec 46 c8 0c f2 81 fd 9b 02 c0 10 fc f9 7a ad 27 | 1e 8c 95 1a 96 66 8d d8 17 9e ab 39 d5 e7 6f 1e | 0f 90 04 2f 14 da bc 41 89 5a 60 41 1e 6b d8 88 | 29 00 00 24 f0 df 30 54 bd 5d 12 41 64 95 81 da | e2 16 b7 a5 91 f7 f0 c0 97 0a b3 7c fb 37 99 ec | 0e 53 6f 50 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 5d 3c ab cd 1f 05 d6 29 65 59 e2 | b6 05 c5 68 b0 d2 e9 9f 00 00 00 1c 00 00 40 05 | fe 1d 71 04 59 69 a8 7d 1a 5e 10 ed bb 6e 46 db | ec 57 9a 8e | libevent_free: release ptr-libevent@0x7fb37805e790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800cc10 | #571 spent 0.0713 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #571 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb380009ed0 | handling event EVENT_RETRANSMIT for parent state #733 | start processing: state #733 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #733 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #733 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #733 keying attempt 1 of 0; retransmit 1 | retransmits: current time 49720.734126; retransmit count 0 exceeds limit? NO; deltatime 0.5 exceeds limit? NO; monotime 0.509962 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800cc10 | inserting event EVENT_RETRANSMIT, timeout in 0.5 seconds for #733 | libevent_malloc: new ptr-libevent@0x7fb37805e790 size 128 "road-eastnet-nonat-220" #733: STATE_PARENT_I1: retransmission; will wait 0.5 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #733) | c0 b4 40 a7 90 2d ff 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 3d 1c 6b d8 c6 0e 19 a3 7b 9f 82 56 a2 60 d8 | ed c3 69 a1 b8 27 54 67 fa 08 0b 9c 2f df a1 84 | a3 ea 36 06 89 65 b4 8a 8b b1 53 43 55 1c 2d 9c | 45 3c 53 4e 14 b2 1b 7c 54 9f cf 33 2b d7 a1 7f | b2 02 42 3d c7 e2 52 e4 03 b6 91 b3 0a 4b 65 e3 | 2d 56 d1 33 02 80 68 64 bf e9 65 5e 1c 3c 0e 4e | 38 e8 a0 52 6d 84 dc 3a 40 77 a2 99 57 22 be f9 | 21 b5 b9 99 7a 73 41 8f bf c0 86 4e a6 c0 45 d1 | 82 aa e5 df 8b fa 84 00 fe f2 93 c1 f7 20 82 cd | fb 46 94 df db 19 f0 51 0e 9a 5a 9e 48 37 67 ac | 46 6d e7 b4 4d 86 4b 1e 9e 7b d3 75 96 a3 a2 a6 | 2f a5 5d c9 1a f7 81 bf 8c c3 9a 0d 30 20 4a 43 | e0 86 4e 21 5d 25 a1 95 77 9e fb 93 fd 1b 22 6c | d4 f7 f2 14 a8 af 6c 58 ec c1 bb 6c 8a db 27 a0 | e6 7f 0c 48 39 29 47 c2 4d e2 32 e9 73 91 20 fe | 20 a5 dd 53 0f 69 f5 d6 ac 97 fa 75 83 38 83 1b | 29 00 00 24 38 98 a0 0a e9 5b ce bb 7c 0c e3 8b | 78 bd d8 2c 72 cb ed 4b ee c0 17 92 29 bf 4c 66 | 8b 54 88 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 90 59 ab 91 26 aa 5f b9 4e 61 e7 | ac 87 e3 ab ff 33 ec 91 00 00 00 1c 00 00 40 05 | ba 8b 12 fb af ac eb b8 53 0c d2 71 52 5e 48 aa | 61 61 f1 39 | libevent_free: release ptr-libevent@0x7fb3800223c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380009ed0 | #733 spent 0.0675 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #733 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 8b 51 ce ae 5a 3d 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #642 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #642 | rejected packet: | 28 8b 51 ce ae 5a 3d 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #642: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0459 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 7d d5 ab c5 87 8a df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #590 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #590 | rejected packet: | 6c 7d d5 ab c5 87 8a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #590: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0379 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 bb ac 77 0a 7b 9b 5e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #523 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #523 | rejected packet: | 07 bb ac 77 0a 7b 9b 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 31 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-49" #523: ERROR: asynchronous network error report on eth0 (192.1.3.49:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0388 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 09 53 dc c6 ab 63 da | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #732 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #732 | rejected packet: | d0 09 53 dc c6 ab 63 da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 de 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-222" #732: ERROR: asynchronous network error report on eth0 (192.1.3.222:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0362 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 62 ac e1 dc 78 47 49 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #741 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #741 | rejected packet: | 62 ac e1 dc 78 47 49 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #741: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0497 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba fc 0a 40 dd 57 2f 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #754 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #754 | rejected packet: | ba fc 0a 40 dd 57 2f 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #754: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0555 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 51 c2 14 b4 88 86 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #616 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #616 | rejected packet: | 51 51 c2 14 b4 88 86 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #616: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0535 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 ae e8 62 0b 46 de 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #617 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #617 | rejected packet: | a7 ae e8 62 0b 46 de 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #617: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0412 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 05 2d 15 eb 8d d1 e7 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #755 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #755 | rejected packet: | 05 2d 15 eb 8d d1 e7 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #755: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0379 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 64 20 5b 1c 85 54 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #752 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #752 | rejected packet: | c5 64 20 5b 1c 85 54 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #752: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.036 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 cc 63 e1 75 96 2f 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #716 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #716 | rejected packet: | 15 cc 63 e1 75 96 2f 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #716: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0359 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 ea d6 a0 2f c9 a3 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #705 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #705 | rejected packet: | e4 ea d6 a0 2f c9 a3 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #705: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0371 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab b5 91 0b be 67 d7 85 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #756 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #756 | rejected packet: | ab b5 91 0b be 67 d7 85 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #756: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0357 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 e8 20 43 a8 88 d4 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #719 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #719 | rejected packet: | a1 e8 20 43 a8 88 d4 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #719: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0496 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 da f7 c5 2f 91 5f 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #723 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #723 | rejected packet: | 36 da f7 c5 2f 91 5f 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #723: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0663 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0c d9 0f fe b0 de fb 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #726 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #726 | rejected packet: | 0c d9 0f fe b0 de fb 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #726: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0572 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 62 bc 01 e6 ef 5b 20 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #737 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #737 | rejected packet: | 62 bc 01 e6 ef 5b 20 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #737: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0544 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e2 d2 81 3a 91 66 0b 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #721 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #721 | rejected packet: | e2 d2 81 3a 91 66 0b 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #721: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0597 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | eb e9 70 00 69 c5 c4 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #731 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #731 | rejected packet: | eb e9 70 00 69 c5 c4 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-247" #731: ERROR: asynchronous network error report on eth0 (192.1.3.247:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0531 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df ac 39 b5 f9 b7 7d 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #745 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #745 | rejected packet: | df ac 39 b5 f9 b7 7d 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-226" #745: ERROR: asynchronous network error report on eth0 (192.1.3.226:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0522 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 e3 5f af 64 96 c1 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #748 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #748 | rejected packet: | 55 e3 5f af 64 96 c1 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #748: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0549 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 37 f9 ef 73 ab 62 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #746 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #746 | rejected packet: | f7 37 f9 ef 73 ab 62 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #746: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0553 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 20 27 21 e9 84 6e 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #630 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #630 | rejected packet: | 7e 20 27 21 e9 84 6e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #630: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0572 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 66 df b6 23 36 44 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #624 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #624 | rejected packet: | 91 66 df b6 23 36 44 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #624: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0599 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d 12 6d 03 9d 3a 3f 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #615 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #615 | rejected packet: | 3d 12 6d 03 9d 3a 3f 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #615: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0578 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 3d 1d 73 e3 e0 91 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #586 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #586 | rejected packet: | 9a 3d 1d 73 e3 e0 91 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #586: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0583 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 f3 33 9b b4 5a 7a db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #715 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #715 | rejected packet: | 87 f3 33 9b b4 5a 7a db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #715: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0599 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 48 a9 53 c0 7c 6b d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #657 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #657 | rejected packet: | bf 48 a9 53 c0 7c 6b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #657: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0553 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0c c8 e0 5f be 01 79 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #544 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #544 | rejected packet: | 0c c8 e0 5f be 01 79 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 26 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-38" #544: ERROR: asynchronous network error report on eth0 (192.1.3.38:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0548 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 85 ff 81 8d 39 ae d0 f7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #627 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #627 | rejected packet: | 85 ff 81 8d 39 ae d0 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-161" #627: ERROR: asynchronous network error report on eth0 (192.1.3.161:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0549 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c1 b9 1a 2f a2 98 4a 10 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #730 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #730 | rejected packet: | c1 b9 1a 2f a2 98 4a 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ea 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-234" #730: ERROR: asynchronous network error report on eth0 (192.1.3.234:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0554 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e5 c7 07 55 6e da 09 55 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #709 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #709 | rejected packet: | e5 c7 07 55 6e da 09 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-183" #709: ERROR: asynchronous network error report on eth0 (192.1.3.183:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0541 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 f4 27 9b 2c 7e 0c 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #736 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #736 | rejected packet: | 55 f4 27 9b 2c 7e 0c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #736: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0548 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 3e 6c 78 39 d7 59 85 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #573 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #573 | rejected packet: | ad 3e 6c 78 39 d7 59 85 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #573: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0637 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 a6 42 61 47 27 64 b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #640 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #640 | rejected packet: | f6 a6 42 61 47 27 64 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-200" #640: ERROR: asynchronous network error report on eth0 (192.1.3.200:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.059 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 38 86 43 43 f3 e1 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #557 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #557 | rejected packet: | 2d 38 86 43 43 f3 e1 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #557: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0576 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 74 43 70 ed 5f 2e 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #632 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #632 | rejected packet: | 4f 74 43 70 ed 5f 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #632: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0543 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 69 66 b6 0b 09 69 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #605 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #605 | rejected packet: | 7d 69 66 b6 0b 09 69 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #605: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.054 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 0c 73 4d 95 6b fc 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #593 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #593 | rejected packet: | 08 0c 73 4d 95 6b fc 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #593: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0539 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 21 4b c7 8f d5 3b 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #559 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #559 | rejected packet: | 14 21 4b c7 8f d5 3b 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #559: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.057 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 1a 7a 05 9e b9 88 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #576 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #576 | rejected packet: | bf 1a 7a 05 9e b9 88 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #576: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0545 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 e6 33 30 14 4d d6 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #530 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #530 | rejected packet: | 92 e6 33 30 14 4d d6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #530: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0428 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c a6 d3 cf 8d e9 6e 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #619 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #619 | rejected packet: | 7c a6 d3 cf 8d e9 6e 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #619: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0388 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 19 90 a9 40 6e 35 eb 8e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #653 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #653 | rejected packet: | 19 90 a9 40 6e 35 eb 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #653: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0362 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 39 b3 48 76 36 79 c8 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #591 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #591 | rejected packet: | 39 b3 48 76 36 79 c8 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #591: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0359 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f e0 6f 00 84 26 56 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #556 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #556 | rejected packet: | 7f e0 6f 00 84 26 56 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #556: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0371 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 30 94 4a d2 7d f5 c4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #531 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #531 | rejected packet: | 46 30 94 4a d2 7d f5 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #531: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0359 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 80 0e 78 80 27 80 d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #596 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #596 | rejected packet: | bf 80 0e 78 80 27 80 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #596: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0361 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 d4 94 96 e1 1d ee 26 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #628 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #628 | rejected packet: | 95 d4 94 96 e1 1d ee 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #628: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.037 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 93 98 4a 9e f6 25 19 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #714 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #714 | rejected packet: | 93 98 4a 9e f6 25 19 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #714: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0358 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 5c 91 a2 a0 c7 d5 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #571 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #571 | rejected packet: | a7 5c 91 a2 a0 c7 d5 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #571: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0363 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c0 b4 40 a7 90 2d ff 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #733 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #733 | rejected packet: | c0 b4 40 a7 90 2d ff 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #733: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.037 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb350018460 | handling event EVENT_RETRANSMIT for parent state #528 | start processing: state #528 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #528 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #528 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #528 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.026139; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.828935 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380009ed0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #528 | libevent_malloc: new ptr-libevent@0x7fb3800223c0 size 128 "road-eastnet-nonat-99" #528: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #528) | 53 19 92 95 ca 61 53 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 e5 c7 b3 7c 8d 99 d1 d7 29 a2 10 c1 b7 06 0c | 17 e9 49 3c 4a c0 5b bd 73 b3 61 f0 c5 97 1a c7 | 76 63 76 36 e9 7a 65 e8 6a 3f 9b a2 34 22 f6 b4 | 6a 88 a8 f8 7f 41 d3 72 9f 5a 88 ca 6b 48 aa 0d | 9f bb 2e af b7 64 43 c0 5f 21 ab ad ca 4c c4 bd | 11 a7 3a 9f 89 1f e1 4e cc b3 7c 12 a4 19 cf 86 | c6 87 c1 d0 2a 94 8b 9d e9 35 39 07 a6 9c a3 ed | a8 ce d3 e4 53 a5 82 df 4f 1f e0 bc b2 92 cb c6 | 39 04 f1 75 75 72 f5 1c aa 6f d5 6e 3c f8 04 ed | 37 5d a6 8b b9 ef fe 51 d8 f6 f3 f2 4d a5 ca 6d | 2e b0 a4 75 6d ce 0d 14 13 47 fc 6e 77 45 1a 17 | c4 a3 61 af 3a a4 0b d3 f5 57 8f f2 6f 78 70 d1 | c2 a7 16 f6 5c 3a 00 46 05 30 36 7f b8 3f 18 36 | 35 33 11 0a 75 c5 6f f6 65 a7 05 28 7c e1 b9 fd | 51 6f f2 9e cd 9f 64 c9 9d fe 9b c7 f0 06 55 5a | bb ef dc 4c be 29 e4 94 b5 10 3f 65 5d 8b 1c e0 | 29 00 00 24 46 b5 f0 72 e3 2a 70 ff f4 67 d5 b0 | a0 ba f1 3f 75 bf 45 d4 30 d2 c3 b1 ff a8 07 cc | a0 44 98 ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 19 8a cb f1 5b 38 5c d3 a5 bc 6a | dc b7 35 41 12 44 0c ab 00 00 00 1c 00 00 40 05 | e6 3e dd 6e 01 07 35 ad c6 0c f8 90 bb 33 8c f2 | 78 f1 d6 dc | libevent_free: release ptr-libevent@0x7fb35004e5a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350018460 | #528 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #528 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374024fd0 | handling event EVENT_RETRANSMIT for parent state #508 | start processing: state #508 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #508 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #508 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #508 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.026269; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.819984 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #508 | libevent_malloc: new ptr-libevent@0x7fb35004e5a0 size 128 "road-eastnet-nonat-242" #508: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #508) | dc 3f 02 d2 13 45 35 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d a9 32 87 b1 90 82 93 0a 0b 68 7a df 0e cd ea | 4e 12 c3 9f a0 a0 db 88 eb 7c 77 42 14 a4 f9 02 | a9 02 c1 13 c2 56 17 b8 78 50 73 cf 37 95 03 3b | 9f a9 9f 88 fe df 99 cf a6 7c d9 96 30 f6 e3 3c | ff da a7 12 b9 67 b1 01 1e 94 44 d3 2d 66 e8 ab | 93 b4 41 cb 47 2f 3b b1 72 1a 25 46 61 80 3c 91 | fd cc 10 8b 86 fc 21 07 c7 5b 16 7a fe f3 c7 5c | b0 46 97 1c 76 a9 4b 9d 86 2e fa 04 56 7b cb a3 | b7 fe 1a 7b 4d fe 92 09 4b 17 df a9 9b 0f d4 5b | a9 06 58 5c b0 f7 c2 a4 71 cc 56 f7 a4 cb ae b4 | 36 1d de 4d 00 ad 9a ec ec ba 71 93 15 4d 0c e2 | 83 0f 23 94 d7 c2 0c 19 16 44 17 09 f4 40 84 da | 41 ec 50 fa 16 6e 50 f1 55 79 e5 0b 17 dc df d0 | 12 ca a0 4b 05 a1 a6 2c 7d 1e e6 72 04 2b 9d f5 | f1 0a bd da 88 25 7c 99 8f 11 ec b1 37 2c 76 0e | 43 b9 fb 60 6e 3f 37 47 06 8f 9f 3f 60 14 04 eb | 29 00 00 24 92 60 8e 47 54 65 21 7e 19 d2 97 01 | 48 40 e2 71 bf 81 d1 29 42 df a0 d9 5b 12 66 4f | bd 5f 3d 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 f1 6c fa bf f7 cf e9 0c 8d 98 4e | 77 aa d2 f2 40 a1 0a 37 00 00 00 1c 00 00 40 05 | bd ae 80 ba 97 bb f2 9c 7c 0e d6 fc 4b ac 9b 03 | c1 38 67 4e | libevent_free: release ptr-libevent@0x7fb374039ac0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374024fd0 | #508 spent 0.0708 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #508 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3880319a0 | handling event EVENT_RETRANSMIT for parent state #517 | start processing: state #517 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #517 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #517 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #517 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.026353; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.826227 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374024fd0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #517 | libevent_malloc: new ptr-libevent@0x7fb374039ac0 size 128 "road-eastnet-nonat-52" #517: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #517) | 33 e5 d4 8b 34 40 4a 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d 50 73 53 0b 3c f1 6e 78 85 b7 58 fc 4b ba 17 | 6f 80 49 00 4f e5 51 c4 75 f5 c7 25 8f f6 8d 0c | 0b 3f 8d 1f fe 93 5e 60 24 81 0f 18 41 a0 49 31 | af 56 bf f8 e7 5b 2b a7 03 0f d4 ca d5 35 76 53 | f2 2b 65 31 41 bc b7 67 c0 bc c2 52 41 2b f8 94 | 04 88 87 86 1a 29 d6 6e 88 cb 09 a4 42 bf f7 4d | 7c 53 5b 57 b2 40 3e aa d2 e2 33 0e 70 6d 1a c0 | a8 61 dc 8e fd a0 3a 5e ba 87 2d 12 b0 e3 ba 16 | a1 1a a9 11 c0 e5 e5 f1 54 08 4c 01 f1 c6 26 4b | be a6 4f 3e 3e 89 d5 26 bc 6f ed 31 f1 ee 6b aa | d9 5e 96 b1 fa 74 49 cb 9d 97 e7 5d a6 4b d4 74 | 6b ae 88 a3 73 a4 87 0a 18 a9 6d e9 8b d7 36 fb | 0b 55 06 7d b4 78 db 17 14 99 b7 2e a7 64 89 99 | 8c be 1c fc 04 89 99 a4 2c 3b cb 1e d4 8e b5 cb | 24 1e bf 9a 75 6f 0b f5 b5 e2 c8 b5 34 36 ee 02 | af 62 28 a3 22 fa ec 90 27 af 39 54 b8 b9 0f a2 | 29 00 00 24 e2 3f 8f 34 58 87 92 57 56 c3 cd 4d | 63 8a 11 89 ae 2d aa 42 8a b1 46 78 a8 66 d5 93 | b2 cc 27 a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 05 9f 42 9e eb 36 9c 33 7d 49 87 | a2 9f 49 98 50 a4 45 37 00 00 00 1c 00 00 40 05 | 0e 29 0c 93 97 71 7f 1e 78 95 bc a8 9d 55 45 5b | 68 08 38 5d | libevent_free: release ptr-libevent@0x7fb38804efb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3880319a0 | #517 spent 0.0668 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #517 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c046090 | handling event EVENT_RETRANSMIT for parent state #511 | start processing: state #511 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #511 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #511 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #511 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.026433; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.820935 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3880319a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #511 | libevent_malloc: new ptr-libevent@0x7fb38804efb0 size 128 "road-eastnet-nonat-88" #511: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #511) | d0 cd fa e1 13 2d 20 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 50 62 2d 29 93 99 de 0e af 50 23 34 5f ad fb | 4c bf da 43 26 a3 47 17 44 42 44 91 b3 08 e0 52 | 9a 2e 33 64 a4 26 28 05 d5 00 de d9 4e 66 1b ab | 5a 6d 0e b8 94 3f 64 cb a8 67 5b 93 62 e2 29 49 | 15 ef 3f fd 0a ac 35 c6 4e 73 10 ab 4f 5d 53 8e | a4 cf e0 a6 67 4d ad 8c d1 a8 5a 9c 43 ba 9d a7 | 4c 51 1b 30 43 59 5b 25 95 48 42 6a b3 83 84 db | 91 da 84 92 79 2e e8 75 a7 77 e4 4c 0a eb 8f 66 | 34 40 55 c8 da e8 1b 72 62 30 64 22 19 0b c5 6f | bb 93 c9 c9 9e c1 e2 88 ad 0f 56 0d bb 0a ec ad | e2 01 a6 b4 88 92 57 a6 85 c2 08 b0 1f 07 9c 06 | 45 a6 f9 c7 63 ad b8 14 32 f1 4e 6c 2f f3 fa c4 | 52 99 fc 99 df 29 80 f9 cd af e8 d8 51 1d ea fc | 37 40 3b 2e 41 2d 1b 80 95 af 27 c3 07 65 8b a6 | 12 f6 45 c0 ec 6c f8 a8 51 0a 31 05 6c 78 0a ed | bf 1c 18 f5 61 de 1f a7 51 bb 0d 25 18 af fc 72 | 29 00 00 24 b3 7b 7f 54 09 ea 11 14 a2 54 1c f4 | ef 5a 78 e7 f0 13 91 b1 46 b7 6f f0 4f 4f 95 a6 | 39 1b 25 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e ea 0c f9 37 0c 35 90 90 78 51 37 | 77 43 20 7b e3 6c 0c 23 00 00 00 1c 00 00 40 05 | 2b 3e 6c 54 b9 12 19 37 d1 cc e2 3a 04 74 55 d1 | 46 7f d5 af | libevent_free: release ptr-libevent@0x7fb34c04e700 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c046090 | #511 spent 0.0669 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #511 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c00d120 | handling event EVENT_RETRANSMIT for parent state #509 | start processing: state #509 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #509 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #509 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #509 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.026515; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.829651 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c046090 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #509 | libevent_malloc: new ptr-libevent@0x7fb34c04e700 size 128 "road-eastnet-nonat-236" #509: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #509) | 95 a6 50 d0 80 0f 96 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 f6 dc 59 0f c4 05 31 27 1c e1 59 91 71 4f 77 | d2 6f b2 3c 4c 42 2c 05 31 c6 b9 01 b3 f9 33 cf | 31 3e d8 f2 50 a2 40 4c 26 af b9 c4 f6 6b 9c a0 | c3 09 f4 3f 7a cc f4 7f ca 62 75 a2 51 f3 85 34 | ba 40 18 72 c0 75 cb 27 ef ac 5f 7a 01 de 2e 52 | 48 88 8c 60 ad e7 5b 44 6c 1a e8 d5 6f 53 11 23 | 95 be a5 14 60 2b e4 59 8a 11 d1 b5 ed 47 f8 3f | 6d e0 61 51 79 49 84 03 99 39 af e7 46 a2 96 23 | 10 c9 ad ec 42 e4 52 ee d8 32 7d ed 3a d7 ff 92 | 1f 6f 0f 74 38 79 01 20 fa 36 e9 f1 09 08 9c 1e | 99 ae 11 ce d8 88 97 aa 9e 87 73 fa fc 1c f1 a5 | 50 45 69 bc f8 32 ab 8a a5 aa 99 3b 14 59 27 93 | aa af d8 7a 15 d5 3f 8b e4 e9 93 e5 f3 54 80 be | f8 1e 00 2e ce b6 01 59 ea 14 bb 0f 04 fa 53 df | 7b f6 52 1a 74 66 fb 6f ec f5 da 2e 36 05 f8 e1 | f8 ef 5f a4 a1 a4 e5 27 c9 45 68 7f 7b 01 52 89 | 29 00 00 24 9d 39 90 d5 1d b9 a1 ff 3d e2 2c 36 | 93 f3 ac d0 34 e1 bb 65 c7 36 8d 9f be 5b 52 2e | e0 af cd 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b a0 6c aa ff 54 d0 e4 33 5d be 4b | d4 00 1f 61 d7 8c b7 eb 00 00 00 1c 00 00 40 05 | b0 ac c8 3e be 16 32 44 b0 93 80 f1 03 a4 ee b2 | e2 ca 64 08 | libevent_free: release ptr-libevent@0x7fb388027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00d120 | #509 spent 0.065 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #509 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388020d10 | handling event EVENT_RETRANSMIT for parent state #510 | start processing: state #510 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #510 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #510 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #510 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.026596; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.821401 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #510 | libevent_malloc: new ptr-libevent@0x7fb388027c10 size 128 "road-eastnet-nonat-102" #510: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #510) | bc 30 61 cf 1c f5 21 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7d 16 ac 90 1b e8 fc 3d a1 f6 2f f6 5b aa 38 5f | 13 bc 3b ec ce 54 9b 92 94 b5 7c b5 e6 92 4b 0f | 82 fe 63 f8 ae e6 73 78 f6 99 0a 42 80 fb a6 71 | 1d 6d c1 8b be 9b 09 d6 dc d8 6a 99 20 35 d5 82 | 27 70 ed c6 95 de df 76 74 d7 3e 14 50 79 f0 89 | ae 4e 98 1c 30 c5 99 94 51 22 91 53 e5 49 a5 a5 | 4e d2 de 84 a6 45 26 dc 5a 29 c7 7c 52 2b 31 8d | 7b a4 cf c6 13 95 ce 98 5a 32 37 1e 3c f9 dc 95 | 74 b2 58 3f bf f8 56 2f b2 ed 28 17 6b fc 7e 85 | c4 ca f3 5d 2b 78 55 ad d1 65 97 11 a6 22 08 7c | b5 aa 63 e0 e4 66 be 74 9d 1a b0 75 bf 11 a5 cb | 35 00 1a 58 9e 5f 9b 3a 5c 4a 5e 5b 7c 41 b5 39 | 8c e2 21 3f a3 1f 5d 86 72 e4 89 93 96 9a e1 e9 | 74 b9 24 6d 9f d6 67 09 e9 73 bb f9 0b 1c 88 a6 | 68 a2 54 4f 6c 95 d8 be 9b cd 89 96 d8 9d 33 48 | fb e8 c2 fa 1f fd 3e a7 c4 fc 87 a0 2d d1 0a 3b | 29 00 00 24 a8 33 19 fd 53 f2 7c 45 88 0e ac 9b | 8c 61 3a 57 a6 74 c6 f9 cb 73 c2 48 34 44 1a b7 | 09 32 3c 47 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 4c e5 d6 4c 06 64 b8 31 f1 40 df | 16 6a c3 cc 04 2a 1f ac 00 00 00 1c 00 00 40 05 | f4 a4 c7 b2 58 33 da 00 b3 aa 2f f5 ea 56 ab cb | 57 27 19 d1 | libevent_free: release ptr-libevent@0x7fb388054710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388020d10 | #510 spent 0.0666 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #510 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a88140 | handling event EVENT_RETRANSMIT for parent state #505 | start processing: state #505 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #505 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #505 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #505 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.026675; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.818783 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388020d10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #505 | libevent_malloc: new ptr-libevent@0x7fb388054710 size 128 "road-eastnet-nonat-252" #505: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #505) | d5 d2 7d 3c 00 e8 ff 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 f3 9e b0 6a 35 4f e1 47 8d 4d 6e 1c 28 4b 2e | f7 69 42 28 c7 ef 26 c5 4e 61 c9 92 6c ab 1f 19 | f8 92 ce 52 74 4a c5 9f 21 f2 3d 66 b1 02 14 a1 | 73 db a1 79 9a e8 39 8a fc 66 2f 00 d5 5a 95 c5 | 48 d0 9c 15 fa 0b 1b 42 28 43 67 d3 6e 5e 6f ff | c0 b1 6b 27 e0 5d 48 d0 0b 8b bd 52 32 59 4d 42 | 3a 7f 12 ad f8 1d 5e cc 39 0c 00 27 ca 10 80 cd | 3d 82 51 e1 b2 98 44 61 6d 8a 0e 01 ae d2 a9 b5 | 0d a4 1c d6 bb b1 86 67 99 76 77 1d 81 1f e6 0f | 87 d6 0e ab 3d 4e 72 d6 1c d8 a8 ba 8b 0d fa b6 | 14 aa 5d 05 4f 2b 84 93 9b 6c 60 e2 1b f1 93 07 | 29 7a b4 93 fc 89 c0 b0 9e 68 f0 55 5e 91 56 16 | 01 5f 10 18 5b bb 2d 47 4a 35 38 2c ad 2e ab d2 | 6a b8 26 26 f5 88 20 85 f3 dc ec bd 9d 77 db 98 | b1 c5 2e 88 5d 5c 8b a9 e1 00 27 3a d2 4c bd 1c | db 98 5a 24 32 a9 2f e9 b8 59 be e8 b6 07 01 6e | 29 00 00 24 cb e3 59 11 f9 d9 ec ee ad 77 08 0b | 98 a8 ef 2e 9a e0 e5 f5 be 06 9f 6c 9d 77 41 dd | ce d1 2a 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d ed ee bd 79 c9 6a 8d de 75 89 30 | 73 98 a0 83 98 d8 fd 9d 00 00 00 1c 00 00 40 05 | 80 0c 7e 23 1f 19 e5 09 f9 e2 d7 e7 d4 e4 7c f1 | e8 ce ce 76 | libevent_free: release ptr-libevent@0x7fb38004e900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a88140 | #505 spent 0.0667 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #505 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36401e230 | handling event EVENT_RETRANSMIT for parent state #513 | start processing: state #513 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #513 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #513 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #513 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.026755; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.821993 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a88140 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #513 | libevent_malloc: new ptr-libevent@0x7fb38004e900 size 128 "road-eastnet-nonat-107" #513: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #513) | bd e9 59 71 3e 30 66 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b f0 aa 56 99 ad 41 e6 3a 19 67 48 fc c0 1b e2 | b0 a6 21 9e 13 7a 65 b0 01 64 d4 c2 39 16 1c a3 | 09 b7 6f 2c 8c 4c 7e 2a 7c 62 da 59 d9 c0 53 20 | 5f 82 b5 8a 0c 51 a0 6c ba 44 d8 ce 26 63 57 92 | 46 0f c3 0a ab b0 53 c3 61 49 a1 a6 7a ff cb 8c | bc 6b 3c 47 62 03 e7 80 c9 67 73 83 91 0c 93 c6 | 56 27 a3 11 5d eb 2a 88 84 eb 3e 27 a2 e6 b8 18 | 93 02 c7 f9 fc cb d2 36 3c bd c3 eb 8a f7 b5 95 | e0 47 db d1 c8 42 8e 58 81 f5 ad d0 b5 63 86 42 | 1f 8b 84 dd 81 ee 70 92 6e b5 c4 39 af 9c 50 3d | 9f 95 c9 ea 1e 7c 99 d7 0e b5 ac b0 6c 63 ec ba | 8d 5f 65 5d 3b 17 25 63 e7 5c 7b 69 67 54 83 0e | c0 9b d7 b5 4f 42 2f 27 87 22 39 48 b7 84 cf cc | cf 00 bc d9 c7 6d 6e 28 f3 1c 0e b7 f5 1b dc c5 | 59 f5 4a 7b 90 a6 d5 78 62 d3 be d3 63 ef d7 f9 | 2c 59 4a 44 cf 7f 3b 21 cd 7f c7 d4 ca 1a a8 49 | 29 00 00 24 a4 bc 37 1e 87 c2 34 b4 23 5a f6 0b | b7 2c 74 3f fd 06 56 c7 93 de 20 49 09 1f b3 6b | b5 db c8 d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a e5 9a 01 5d 43 fb 6a 98 9b f3 8a | be 52 9d de 46 5a 7a 72 00 00 00 1c 00 00 40 05 | cc 5a ab 9a 19 3f 91 fb 3e 48 14 36 65 db 7f b9 | 29 d6 f5 30 | libevent_free: release ptr-libevent@0x7fb36404ec60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36401e230 | #513 spent 0.0658 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #513 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b16d90 | handling event EVENT_RETRANSMIT for parent state #522 | start processing: state #522 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #522 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #522 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #522 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.026834; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.828155 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36401e230 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #522 | libevent_malloc: new ptr-libevent@0x7fb36404ec60 size 128 "road-eastnet-nonat-78" #522: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #522) | 10 b1 a0 1e 00 fa a9 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 03 12 29 26 7f 65 c7 68 c4 9a d0 af 8e ee 58 | 00 c2 bb 14 15 7c 0a 86 41 89 01 e3 50 59 e6 9d | 21 20 fe 10 1d 52 36 f5 79 ed a1 2e a4 48 7f 36 | 55 11 2c 17 77 fe f8 b5 19 dc d2 b7 81 ea a8 4f | 58 de c6 bf 75 6a 59 91 22 64 63 fd 91 bc 44 f5 | fb fc 62 8d 40 09 00 e8 46 d1 fa ee d8 ea e1 b2 | f5 ff 3e 58 e5 93 cd a0 c0 0b 6c d4 34 85 8d de | 24 69 63 0b 77 53 a3 8f bc dc 79 d3 e0 07 c6 0f | b6 c3 f5 75 53 b4 1f 79 ed 6e d0 df 07 c3 f0 12 | 58 d9 7f d3 29 ec fa 74 4a b2 3b 5a bd 60 bd c0 | 31 c1 ac c7 51 45 8d 69 c4 5a 44 c1 9e 1d 54 f3 | 3f 29 e3 14 29 d3 ff 9f 4c 6d 49 97 9d 65 a8 01 | e3 b8 ae c9 76 a9 8a 4c 13 37 d8 a6 c9 90 05 b2 | 56 78 1c 8e b1 63 ce 03 b4 28 7f e6 b1 a5 59 d4 | f8 a3 6b 86 00 eb 6f c1 03 34 cf 9d 47 16 c9 f4 | fc a0 47 b8 e3 a2 18 1a f8 87 2d 2f b9 c5 65 a4 | 29 00 00 24 ef 86 5c 01 c3 c5 84 cc db a0 c4 f8 | 4b 5f 8a 0f 84 0f d8 a2 60 5e 95 d4 2a 5b da 43 | eb c8 3e 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 98 24 f3 3c 5a 10 4a 5f ba 19 5c | 79 3c 94 1f f7 ad ac c2 00 00 00 1c 00 00 40 05 | 01 72 52 9e ac 8f 8c 48 d1 ab 04 59 e9 b8 14 4b | b7 ae 1e 1b | libevent_free: release ptr-libevent@0x7fb368035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b16d90 | #522 spent 0.0657 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #522 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7e4d0 | handling event EVENT_RETRANSMIT for parent state #515 | start processing: state #515 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #515 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #515 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #515 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.026913; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.826094 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b16d90 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #515 | libevent_malloc: new ptr-libevent@0x7fb368035930 size 128 "road-eastnet-nonat-75" #515: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #515) | 1e 61 5a f6 8c 22 37 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 55 92 be 2b 5b 80 8f b3 a9 1d 29 a3 45 24 2c | b4 ac 16 b3 45 0f 47 41 ac 8c 89 bd 1e 8f b0 6e | 42 15 11 69 75 f6 d4 99 d3 aa cd 74 fa 86 b1 c5 | 68 d3 c8 15 10 54 b4 74 c1 a4 2b 24 6f c9 a9 9d | 25 6f 22 a2 ef 15 14 08 3b 15 a7 b9 a7 91 72 1b | 0d fc 51 4a 02 7d 07 e4 28 58 0f 09 52 04 38 5f | 70 3e 01 b9 6d 46 32 8a d3 fa e2 05 3c 1f 29 4c | 83 37 17 b1 56 48 32 71 51 18 9d f3 b3 04 79 ad | 90 59 7d 48 55 a3 92 46 ac 7d 26 6d f7 b5 44 87 | b8 ea 9c e5 b0 56 03 2c 9a 01 84 d5 30 98 07 7a | d5 ed 5c 95 9f a1 e3 64 9d 5d 5d c1 2f ee f3 c2 | 45 c0 b5 58 7b 2b 68 4d 06 07 76 b2 f3 82 a0 63 | 45 0a 18 70 71 12 a7 f5 1b f4 8c e5 99 58 7a ae | 71 6e 12 6f 9a 9e 61 a0 c1 a0 67 87 58 b1 e2 09 | f3 f3 93 cd 56 48 cd 0d 03 13 c0 9c db 17 5d 35 | 5e 83 5d 90 8d cf 6f 5f 1d 20 58 52 4c 16 b9 f8 | 29 00 00 24 8d d0 d4 e1 35 48 fc d6 75 32 21 71 | b5 c7 25 57 c3 f1 b1 56 20 08 bd ee ec 1b e0 d1 | 78 47 18 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9a 1a 58 76 c4 ef c7 77 69 86 ed 89 | 8f 43 91 04 1b c3 f4 fd 00 00 00 1c 00 00 40 05 | d2 95 59 dd 21 aa 4e e6 79 3e 78 3f 39 e9 b6 1e | 64 75 99 59 | libevent_free: release ptr-libevent@0x557d46b83f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | #515 spent 0.0655 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #515 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34000cc10 | handling event EVENT_RETRANSMIT for parent state #506 | start processing: state #506 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #506 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #506 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #506 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.026992; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.818364 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #506 | libevent_malloc: new ptr-libevent@0x557d46b83f50 size 128 "road-eastnet-nonat-1" #506: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #506) | 30 9a 49 1f a8 dd 2c 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 2a bc 79 dc b5 44 58 cf f7 90 44 40 11 2e 15 | 03 b5 fb 40 91 db b0 e9 cc 93 76 20 f8 11 9e 6d | 39 73 1f 61 bc bc 4e ee c9 bc 18 3d 60 7b af 0b | 75 cb a0 d6 4f 63 ef 20 98 68 71 d2 13 f7 66 7d | d4 5b 49 b9 ac 8b df e8 41 30 6e ff 20 54 14 93 | 38 ab ab 4c af e9 0c 3b ab 5e dc 5e ab 90 4b 56 | 53 3a 8a b7 18 5b 14 39 76 27 9c 20 d5 a4 eb 39 | 1a 6c 7f f0 56 06 81 af ac 7c 4a cd fd 91 a4 9c | b0 f5 14 1c 9c 19 b9 58 23 51 01 f1 e5 aa 33 2e | 85 93 d7 f3 05 7b 07 5d 5b 1e 49 80 23 cb 1b 4b | 93 19 de 20 5b c0 bb 25 ff 6a 7c bd fa 9e d4 b6 | 65 89 68 9f 60 cb 4e fc c1 67 16 12 7c fd 7e e9 | 66 f2 cd 59 d3 75 d7 f2 51 17 02 7b 63 bd 34 45 | 2a 05 0d 75 f1 dd 12 28 48 00 8c f9 1a ee 51 55 | 7e 88 c6 eb 9c 50 71 90 5e 37 9e fa ae f7 d3 be | 4f ee 4f 56 47 93 59 ae 9d 25 55 9b 6e 17 7d 42 | 29 00 00 24 d6 8b 6d 98 8d 34 54 93 4f 23 9a c7 | c6 01 a2 cc 60 f1 90 b6 c5 32 43 97 ec 6a b8 44 | 57 ec f9 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 76 28 30 1c 61 02 15 0f 11 fb 7e | be 62 eb 4a 99 5c 3d 3b 00 00 00 1c 00 00 40 05 | 7f 22 3b d3 4d cf 74 f6 af fd 39 61 cb 11 ae 8f | 0d e3 22 f7 | libevent_free: release ptr-libevent@0x7fb34004e2d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000cc10 | #506 spent 0.0705 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #506 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354039e80 | handling event EVENT_RETRANSMIT for parent state #507 | start processing: state #507 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #507 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #507 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #507 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.027081; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.828039 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #507 | libevent_malloc: new ptr-libevent@0x7fb34004e2d0 size 128 "road-eastnet-nonat-243" #507: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #507) | da 78 05 0d 9b 70 b9 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 46 e0 88 a0 30 a2 10 b6 db db 18 a9 1a b3 9a | c5 54 fb 3f 15 80 c7 25 e6 f4 59 fe 6e fc 4f d8 | 8b ec 98 88 97 ce 89 12 e0 f6 7c 60 70 3c 7d 2f | 85 8c 92 e6 f5 10 00 45 4e 0d f3 d7 24 70 70 ea | f1 31 c4 5b 48 d6 07 d8 da 3d 7f e0 08 dc 0f 9e | 22 03 73 c9 0e c4 1b 51 bf f2 38 8e 38 b6 fd d5 | 22 d5 92 08 9a e7 f3 0b 25 d0 d9 dd 1b 26 88 06 | d6 8f 78 7c 97 0a 2b d5 ae 86 6d 27 bc ca 56 2a | 75 f9 bc 7a 04 89 9f bf e0 ea fc 39 80 a6 03 c7 | 0c 27 76 fa 8e 3c c4 79 8c d8 25 1c e4 00 76 60 | ce 83 c9 6c f4 f0 61 2d eb 79 e9 72 7a 2c 98 fa | 1c cb e8 81 62 75 a2 1d ab 8a ff 63 87 4e 5e fa | 9c 7c 66 c5 3e 4d ee d7 ea 85 5e 26 e2 62 57 07 | b7 3a e7 80 5f 3e 54 3a 0c 1b dd 9d e4 1a 64 e7 | dc 8d 0e 26 5e 1d 1f b4 2e 68 e8 a0 88 3b 2a 21 | 54 99 7c 47 f7 0c ba 8c f4 5a ab 15 bd ae eb 38 | 29 00 00 24 49 65 e9 20 14 20 1a 38 1c 59 3c 48 | eb 8b 7a 8d ba 7b 14 a8 53 47 20 f7 ff f7 d4 ec | 05 75 53 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 67 d1 c8 0a fd 9b 5e 47 d4 f9 45 | 3b 65 86 81 4c 3e 0b eb 00 00 00 1c 00 00 40 05 | 9f 6a dc 5d 73 87 7f 7b 13 63 32 fe 29 c9 d7 13 | 68 73 c8 6f | libevent_free: release ptr-libevent@0x7fb35404e8b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354039e80 | #507 spent 0.0653 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #507 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb360025210 | handling event EVENT_RETRANSMIT for parent state #514 | start processing: state #514 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #514 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #514 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #514 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.027163; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.827383 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354039e80 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #514 | libevent_malloc: new ptr-libevent@0x7fb35404e8b0 size 128 "road-eastnet-nonat-33" #514: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #514) | 06 7a 17 75 fd ae cb 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 5a 8f 50 94 ac f5 36 99 70 0a 59 72 e7 bd 59 | 0f 36 90 cd 5c c6 89 e0 75 bc 28 73 40 e2 7d cc | 29 c4 5a 70 07 f4 b5 86 f2 2a b0 3c a2 25 4e 6d | 20 3c ce c4 4f 4c 58 ae 19 d4 cf fe ba 7b fa f1 | f3 e2 9e 67 a4 d8 72 7c d5 14 6c e6 e7 e2 c6 3e | 8d 4b 48 dd c7 d4 8e 53 66 3c b7 1b 8d fe 66 bf | 89 1e 91 a6 67 0a 3d 11 cd 2a 13 4b 79 22 34 46 | 3b be d5 2d 70 4a 7d b9 7c b7 da 21 75 dc 69 65 | 39 db b4 a1 e9 27 93 e6 22 84 44 fb 74 c7 5b f7 | bf 99 8c 9e d0 24 31 9c 4c cb 86 84 f0 20 fe be | c1 25 55 19 f9 b6 06 e1 9a 9a e7 2d 88 3e 42 9f | 4c 92 e0 a8 c0 b6 61 d6 11 42 34 e8 2d 23 a1 54 | a1 d1 b5 28 f0 8d fb 27 b7 84 29 2c d4 6e d1 c7 | 73 d4 1e 76 c8 dc 3a df 8a b5 ac 49 f8 57 58 ac | b6 af 74 0a c9 24 9b 82 fe 27 eb 68 17 91 56 97 | 2f 25 7a 6c 33 0f 0b 13 88 c8 86 84 02 8c 9c 43 | 29 00 00 24 8d 5a c8 42 22 66 47 71 75 11 01 a3 | eb de 43 24 8a 8a 1d 52 bb a3 79 20 2f 3a 8b 28 | 46 f6 14 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 9b 53 3e 81 94 d1 35 62 13 6f 0f | f3 75 0e 22 e2 b9 70 e9 00 00 00 1c 00 00 40 05 | a7 b7 3f 67 ae fd d1 f6 b8 00 0c 14 27 04 b4 2c | 48 80 6b 64 | libevent_free: release ptr-libevent@0x7fb36004e850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360025210 | #514 spent 0.0657 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #514 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #524 | start processing: state #524 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #524 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #524 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #524 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.027241; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.821344 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360025210 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #524 | libevent_malloc: new ptr-libevent@0x7fb36004e850 size 128 "road-eastnet-nonat-29" #524: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #524) | ad da d3 24 2d 65 26 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 9b 4d af 9d 8e 16 4e 79 9d 95 9d 88 b2 5e 09 | f6 4f d0 1c b0 25 e9 93 be b2 69 1f 36 9c 49 a0 | 44 f5 dc ea 0c 18 d3 cf 65 08 01 43 ec 36 05 b8 | 2a d7 b3 3b d1 93 c2 8a 31 77 1f 9d 2c c9 a8 3a | 11 f5 95 7b c4 81 fc 5d 96 ee bd 44 15 34 22 c1 | 71 4a 5f 76 cd 57 fb 11 79 0a f5 62 1b 91 3b de | e4 fe 82 b2 18 dc c5 d3 a5 42 a7 79 6d aa 95 f6 | 00 d9 74 30 e3 e8 a8 2a 76 02 2c fb 3d 48 e4 b8 | da e6 31 2e e9 38 9e d5 03 35 33 93 c3 a5 f1 20 | f2 62 cb a8 16 a1 46 60 30 4f 28 ac 47 61 ae 14 | 02 70 2b e7 2b 16 7f f2 18 02 58 cb bf df be f3 | bd 14 94 03 17 e6 3a 05 80 08 27 04 a8 69 b6 19 | 8b 17 87 72 b2 0e 37 35 38 6c 05 37 e1 09 09 e7 | 9e 9d 08 8d 77 97 ae 5d 2b cf 0a e1 f9 c1 73 85 | fd c0 15 2b 82 a2 5c 29 27 48 fe b2 e1 3e 87 a4 | 06 6d 09 b3 f8 4c ea 61 50 a9 b2 37 a9 12 e8 76 | 29 00 00 24 58 4a df 1f 4b 4b ff 86 2f 20 df 0f | ac 70 4d 1f f0 2d 6f 07 f3 a2 91 54 47 78 60 b6 | 71 cd e8 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c dc d6 72 67 d3 e7 69 f5 94 9f 27 | 9b e1 4a 44 55 e1 6a f7 00 00 00 1c 00 00 40 05 | 4e 1f a7 8f 6a af 3d 63 0f b3 f8 d5 e1 3f a9 d4 | b3 8f 35 dc | libevent_free: release ptr-libevent@0x7fb378051330 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #524 spent 0.0652 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #524 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c0346e0 | handling event EVENT_RETRANSMIT for parent state #521 | start processing: state #521 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #521 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #521 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #521 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.027319; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.81909 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #521 | libevent_malloc: new ptr-libevent@0x7fb378051330 size 128 "road-eastnet-nonat-27" #521: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #521) | e0 39 ae 6e 8d 33 46 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 3f e2 39 d0 87 6e c4 87 ac 4b 7f e8 23 48 99 | 92 9e 37 b3 ec 85 70 ac 3f 02 9e 68 20 31 71 0c | 97 15 91 c1 a0 ab 9e 8d 27 01 76 49 b6 29 fb 50 | 00 fc 65 98 a7 fe a1 a4 36 b9 c4 7c 54 f4 02 af | 60 2f d1 df 33 d0 64 d4 55 6b 05 3e b6 be ce 9f | 7b 70 7e 57 f4 bd aa cb 97 13 66 4c 9b c5 ee ff | 30 5a af e3 f5 d2 79 8f d0 02 64 c0 f6 31 9a 04 | 75 4d ca 99 cf 35 0b 0b 63 86 ed 2d 81 69 83 0d | 51 34 70 ee ac 2d 1e 34 e9 70 85 c2 2f a2 8f 70 | 6f 0d 80 be fa b6 92 2c 33 7f 13 ce 7a 72 1b 7a | 2a d2 4a 74 e9 27 c0 27 62 da 50 70 c6 2c 9d f6 | 5b a1 c7 10 be 54 64 5f e3 1f 76 be a3 86 5c 67 | 3f 34 60 37 96 c6 3f ac 97 7d a3 18 8c c7 ef 72 | 1d d2 f4 90 6a 6c 56 d8 e8 0f 74 17 ab b5 fe 66 | c6 f5 7b ef 12 de 81 09 98 fb 45 7d d7 c5 4b d6 | e3 d8 90 e0 92 65 36 18 47 32 4b 60 90 49 45 9b | 29 00 00 24 31 24 b3 bc ed 01 bb 4f 4e 94 0b a9 | a1 7c 54 38 d8 7d f8 73 0e b6 38 5d 48 35 f4 71 | f1 a3 75 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7c 55 c6 d8 c0 e4 0d bf da ae 94 5b | 53 f7 7b d9 db 38 1b b7 00 00 00 1c 00 00 40 05 | 3e db 6e c8 27 ac a4 d1 7f ba 2d 10 fa 4a 46 d7 | 5d f3 f0 38 | libevent_free: release ptr-libevent@0x7fb35c0511f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c0346e0 | #521 spent 0.0661 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #521 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38402d4e0 | handling event EVENT_RETRANSMIT for parent state #516 | start processing: state #516 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #516 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #516 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #516 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.027398; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.826973 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c0346e0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #516 | libevent_malloc: new ptr-libevent@0x7fb35c0511f0 size 128 "road-eastnet-nonat-70" #516: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #516) | b0 c4 a7 65 22 ba 71 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba a5 f4 39 29 02 0d 7f e1 ce 23 a9 bd 79 34 2c | a4 ae 82 fb f4 56 44 6d 25 c8 ad 22 1c 00 04 e4 | fa 03 ad 8f 9f af 4d b2 90 d2 16 5a 2f 17 1a 15 | 58 ad df 68 e6 e1 fb 5f 9d 90 81 c9 af 7c 31 12 | 41 4f db e0 b3 86 a3 d0 c1 ef c5 7d 64 09 1b b5 | 64 47 53 1c 1e 0a 21 b1 e4 af ee 92 77 f9 75 e1 | 5f 34 cf 58 ca 97 19 11 a0 06 51 71 71 d4 e4 f2 | 1c 41 c8 1b a2 4a a9 ba 46 a4 e3 7f 99 64 8d 28 | b1 30 c5 e4 30 76 1f 7e 89 f0 65 32 bc 49 9a 04 | b4 60 1a 1e a9 b6 fa 63 35 37 7f 30 be 1f f5 76 | ab e0 a2 6b 4f 30 d8 71 5f 4f 3d 2d 14 59 46 da | e4 b7 89 ba eb da 77 0f d4 a2 34 b8 81 a0 b1 10 | 75 99 1f 3b 28 c3 1f 1e c4 47 fa 5e ff ec d3 2c | df d5 7a ea 70 58 26 f9 8b 47 1b ff 87 16 43 25 | 36 04 57 b4 43 c6 39 70 f4 c3 6a 94 df b4 49 bf | 82 f0 08 cb c7 5f ea 63 07 18 16 54 b0 37 ab e4 | 29 00 00 24 b0 da d8 00 45 52 59 a6 aa c3 52 03 | be 63 73 c1 d3 94 57 52 b6 9e 12 41 0c ee a0 24 | 4c 09 59 fe 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 8b ad 07 50 d4 78 b4 4f 97 b0 fb | bb f6 fa fc 21 38 4b 63 00 00 00 1c 00 00 40 05 | d0 ac 8d 25 0b 65 31 b3 b0 11 22 6e da e4 14 65 | f6 1e 50 f5 | libevent_free: release ptr-libevent@0x7fb38404e8e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38402d4e0 | #516 spent 0.0641 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #516 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348018460 | handling event EVENT_RETRANSMIT for parent state #518 | start processing: state #518 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #518 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #518 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #518 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.027475; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.827996 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38402d4e0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #518 | libevent_malloc: new ptr-libevent@0x7fb38404e8e0 size 128 "road-eastnet-nonat-45" #518: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #518) | 76 4a 29 e2 f2 d8 10 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 c8 e5 72 ad e8 a3 0b ee c0 19 d4 04 c4 59 f2 | f9 f1 ca 1e 44 30 31 b6 02 9f ea 8d f7 77 56 d9 | 34 17 5d e6 6c 33 4b fe c1 d5 87 da 08 49 a5 40 | 98 09 8f 0e 2b 61 5a 8d da 29 4b bd c0 aa 20 47 | 00 81 73 86 5a d8 e0 95 46 03 64 29 8f 09 e9 05 | 09 84 fc 9f 58 0c 86 5c df 03 a7 05 8c 64 28 10 | 34 e7 f2 6f 51 06 b7 7b d1 ca 6d cd b3 c2 7b 80 | d1 48 6c 1b c4 58 91 31 ee a7 4a 59 32 08 ac f1 | fb 22 a3 96 1a 08 94 a4 84 91 22 e8 1e b0 a5 1b | a0 ee 59 f9 33 09 49 a4 f5 f9 da 80 62 31 32 f0 | d4 2b 3c ed f7 50 71 be ae 41 93 27 28 9d 7a 12 | 34 9e 0f 57 03 18 c9 b6 fe 98 3d 22 d1 c6 fe fa | 13 55 9a 4d 9d aa b8 6e 37 5c 88 37 98 3a 93 4a | fe 8e 63 5e f1 55 52 38 2a df 4e e5 01 10 1b 19 | c9 ff a3 28 16 59 44 48 e1 e5 35 ac fe f5 c2 26 | 2f 84 3f c3 36 51 80 d7 d9 96 f6 1f 3a 61 bc 30 | 29 00 00 24 da 23 2e 07 94 56 ee 0d 82 96 38 43 | 7b 89 61 bd ba 2a 55 d7 d5 50 63 47 84 e9 fa b5 | 93 54 75 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 48 88 0f 47 92 b8 68 b9 d0 c9 2b | 02 14 06 d6 2c b1 12 61 00 00 00 1c 00 00 40 05 | a7 a4 34 d2 94 1c 56 72 07 98 0d cb 3d d8 f1 6e | 48 f0 c0 ed | libevent_free: release ptr-libevent@0x7fb34804e3b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348018460 | #518 spent 0.0655 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #518 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 19 92 95 ca 61 53 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #528 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #528 | rejected packet: | 53 19 92 95 ca 61 53 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #528: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 3f 02 d2 13 45 35 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #508 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #508 | rejected packet: | dc 3f 02 d2 13 45 35 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #508: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0379 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 e5 d4 8b 34 40 4a 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #517 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #517 | rejected packet: | 33 e5 d4 8b 34 40 4a 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #517: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0352 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 cd fa e1 13 2d 20 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #511 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #511 | rejected packet: | d0 cd fa e1 13 2d 20 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #511: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0351 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 a6 50 d0 80 0f 96 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #509 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #509 | rejected packet: | 95 a6 50 d0 80 0f 96 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #509: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.036 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc 30 61 cf 1c f5 21 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #510 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #510 | rejected packet: | bc 30 61 cf 1c f5 21 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #510: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0351 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 d2 7d 3c 00 e8 ff 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #505 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #505 | rejected packet: | d5 d2 7d 3c 00 e8 ff 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #505: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0351 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd e9 59 71 3e 30 66 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #513 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #513 | rejected packet: | bd e9 59 71 3e 30 66 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #513: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0373 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 b1 a0 1e 00 fa a9 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #522 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #522 | rejected packet: | 10 b1 a0 1e 00 fa a9 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #522: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0351 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 61 5a f6 8c 22 37 26 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #515 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #515 | rejected packet: | 1e 61 5a f6 8c 22 37 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #515: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 9a 49 1f a8 dd 2c 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #506 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #506 | rejected packet: | 30 9a 49 1f a8 dd 2c 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #506: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.036 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 78 05 0d 9b 70 b9 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #507 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #507 | rejected packet: | da 78 05 0d 9b 70 b9 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #507: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0351 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 7a 17 75 fd ae cb 88 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #514 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #514 | rejected packet: | 06 7a 17 75 fd ae cb 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #514: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad da d3 24 2d 65 26 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #524 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #524 | rejected packet: | ad da d3 24 2d 65 26 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #524: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0404 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e0 39 ae 6e 8d 33 46 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #521 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #521 | rejected packet: | e0 39 ae 6e 8d 33 46 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #521: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0352 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b0 c4 a7 65 22 ba 71 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #516 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #516 | rejected packet: | b0 c4 a7 65 22 ba 71 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #516: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.035 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 4a 29 e2 f2 d8 10 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #518 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #518 | rejected packet: | 76 4a 29 e2 f2 d8 10 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #518: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0357 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb360044df0 | handling event EVENT_RETRANSMIT for parent state #704 | start processing: state #704 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #704 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #704 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #704 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.216464; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.980642 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #704 | libevent_malloc: new ptr-libevent@0x7fb34804e3b0 size 128 "road-eastnet-nonat-227" #704: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #704) | 23 4c b8 04 68 32 c1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 3a ac 56 14 08 70 10 a2 34 db f9 cc 75 9b 41 | d9 78 33 6d 3e 54 14 96 f1 9f 07 fd 71 d2 bb f4 | f5 9d 35 70 a8 82 5c 73 ad 62 0d 20 44 a2 21 f5 | 94 5c 04 7b 84 43 ac 51 c9 f9 77 db b1 cf 7e 08 | b7 e6 cf a7 f1 9d 4d 37 b6 28 e7 f6 a0 a6 cf 8a | 2c a0 7b 96 11 a1 37 54 ae f4 a3 93 55 4b 7e 8b | d0 8a 27 00 d5 64 36 b1 c2 d9 ba 29 d8 a2 16 05 | dd fb 59 ef 24 58 33 9e ac 2a 88 48 84 e9 53 28 | c7 9d 5d bc 44 c8 70 17 d2 d0 d0 a4 35 72 da 6e | 9b 84 8e 8c 6d 4d 5b 4f fb cc 6d ee 81 aa f7 23 | 07 f9 5f 13 36 5a 45 44 ae 6b c2 b5 0c 64 f9 5d | 33 6a 2b a5 33 65 bb cb a4 25 6a c7 fc 53 f4 eb | ec fb f4 4a 8c 01 69 1e e8 15 90 da 3e e8 e7 e4 | a9 bc 12 b2 3e 67 e9 07 38 7b 7f ab 7c da 25 d2 | 97 fc 1f 16 04 10 f4 d2 00 07 db c1 f8 21 00 e5 | 11 9f f5 be ae 9a 37 75 35 e1 f5 13 de ae c3 61 | 29 00 00 24 2a fe 38 a0 12 7a 3e d7 16 fa 98 10 | a9 db 26 69 36 69 61 cd 14 ca 40 97 d2 72 a4 b6 | d3 f7 cf 73 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 45 5c 53 3c 72 83 7b 27 77 59 fc | 37 eb 14 fc 78 79 76 26 00 00 00 1c 00 00 40 05 | cc 0a e4 80 a3 0e b9 40 1f 4d be 4b 21 2f 7d 7c | 54 e3 c5 be | libevent_free: release ptr-libevent@0x7fb36005ee70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360044df0 | #704 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #704 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #701 | start processing: state #701 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #701 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #701 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #701 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.2166; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.973438 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360044df0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #701 | libevent_malloc: new ptr-libevent@0x7fb36005ee70 size 128 "road-eastnet-nonat-203" #701: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #701) | 68 ad 39 62 89 bc a6 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a9 e0 68 21 de 01 f2 63 62 9a 39 6d 52 af 4b 2d | b4 c9 33 56 eb d2 8c 9f ba 59 3a e9 d6 15 7b 7f | b8 2e a0 53 fc ae 44 73 e4 45 e3 47 76 a0 22 f6 | 14 d0 eb 76 9d 9e 8c 73 ad 3a d7 a8 0e 86 fd 08 | 39 c2 76 22 26 07 a7 7e 54 4b d3 f9 34 75 0e c8 | 7b 0c 57 fe a5 45 d0 5d 95 94 e2 38 22 7a a4 06 | df d7 de 2d 77 d0 62 ec 16 53 18 2e d5 6e 85 3e | 9a 44 d4 b5 c9 d7 25 7d 2e 03 d4 fe 50 40 bf 29 | f9 da 48 d3 d1 54 1b fe c7 56 87 44 3a 32 7c e0 | 5f c5 77 06 8a 05 ef 24 26 bb 7f 33 c5 e9 33 9d | a6 cb b0 d2 28 37 19 18 8d 43 4e ce 15 f7 37 9c | 6e 46 8e 96 3c 83 cf af 07 cd e9 21 87 3c e8 1c | ef ad f0 27 43 77 59 ca 24 3f 93 f9 80 0d 29 96 | fc 19 52 7b ce 8d b5 b1 4e 70 76 37 e9 52 61 3e | bf 51 35 68 4a 0c b7 29 d7 35 86 dc a6 18 d3 f4 | 7b 66 33 c1 28 ff 4b b0 99 bc 28 5a 64 81 7b df | 29 00 00 24 88 87 4e bd b4 de bb 6d c9 c8 4e a7 | a4 cc 00 9f 8b 0d 61 d8 a0 b2 27 29 2d 61 32 16 | d2 33 a2 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d a9 8d a4 1c 7e 43 26 3d 83 d5 d2 | 9e 52 9b c6 6d b3 48 31 00 00 00 1c 00 00 40 05 | dc c2 86 b8 21 a6 32 d2 32 e6 c3 81 d9 7b 5e 50 | bf 6c b1 ec | libevent_free: release ptr-libevent@0x7fb37004a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #701 spent 0.0689 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #701 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7cf50 | handling event EVENT_RETRANSMIT for parent state #609 | start processing: state #609 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #609 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #609 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #609 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.216682; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.945024 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #609 | libevent_malloc: new ptr-libevent@0x7fb37004a770 size 128 "road-eastnet-nonat-138" #609: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #609) | c5 84 f5 e6 85 81 a8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b c3 e1 62 dd f7 03 a4 32 17 be e2 28 27 fb f5 | 45 a1 b1 50 d0 82 d8 71 c0 db 0f 18 56 ed 9e 71 | ab 62 12 3b 1e 2e d7 c2 88 e3 18 ba c6 4d 9e c0 | 66 e9 16 dd ad be 48 d4 08 19 fc 5d 95 a1 92 79 | 85 f1 22 51 65 65 eb df 48 a7 f9 2c 1f 7c af 78 | 1b 32 50 5b 8d 91 14 ab 2f fc 1c e9 0a eb 9d e0 | b9 b3 7c a9 c3 93 53 4b 2c 6d 79 29 14 5f 71 42 | c0 35 82 62 20 0c b7 12 e5 58 00 96 19 9d 47 ed | b5 53 5d 62 96 2a 62 44 51 f9 0e 87 7c 59 64 63 | c8 45 7c 86 64 54 df 3f 91 89 ff af 10 5d 3d 75 | cd aa cf 4b 0e a3 b7 91 a2 ab 02 7c c6 93 7f f2 | 8d 0d 67 2e 43 de f5 19 fe 61 c3 eb ca 89 dc a8 | da 1e ca b8 26 01 ff cf 71 b9 ef 31 67 1a 21 e1 | 74 9c 98 aa be 62 d9 7f c0 2a df fd 36 dd fe 56 | 14 e3 d8 7a f9 88 3d 4e ef 12 e2 a4 b6 e8 07 15 | e0 33 aa a7 d0 7f c0 9a ca fe 22 27 40 8f e2 a5 | 29 00 00 24 77 ac 96 72 0b ae 9a e5 43 fe 81 46 | 33 b5 6c 3b 53 47 2a ac 8d 43 3c bd 37 47 3d 9d | 02 54 00 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 cb 6e 3a 03 75 5f a3 64 4c ac 8d | 50 31 4f 55 75 88 9f fa 00 00 00 1c 00 00 40 05 | 69 ea 36 3f 8e fc 87 de be 9f 2d 0a 55 5e aa a3 | 63 b9 97 4b | libevent_free: release ptr-libevent@0x7fb340066bd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf50 | #609 spent 0.0662 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #609 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb33800cc10 | handling event EVENT_RETRANSMIT for parent state #733 | start processing: state #733 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #733 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #733 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #733 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.216762; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.992598 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf50 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #733 | libevent_malloc: new ptr-libevent@0x7fb340066bd0 size 128 "road-eastnet-nonat-220" #733: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #733) | c0 b4 40 a7 90 2d ff 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 3d 1c 6b d8 c6 0e 19 a3 7b 9f 82 56 a2 60 d8 | ed c3 69 a1 b8 27 54 67 fa 08 0b 9c 2f df a1 84 | a3 ea 36 06 89 65 b4 8a 8b b1 53 43 55 1c 2d 9c | 45 3c 53 4e 14 b2 1b 7c 54 9f cf 33 2b d7 a1 7f | b2 02 42 3d c7 e2 52 e4 03 b6 91 b3 0a 4b 65 e3 | 2d 56 d1 33 02 80 68 64 bf e9 65 5e 1c 3c 0e 4e | 38 e8 a0 52 6d 84 dc 3a 40 77 a2 99 57 22 be f9 | 21 b5 b9 99 7a 73 41 8f bf c0 86 4e a6 c0 45 d1 | 82 aa e5 df 8b fa 84 00 fe f2 93 c1 f7 20 82 cd | fb 46 94 df db 19 f0 51 0e 9a 5a 9e 48 37 67 ac | 46 6d e7 b4 4d 86 4b 1e 9e 7b d3 75 96 a3 a2 a6 | 2f a5 5d c9 1a f7 81 bf 8c c3 9a 0d 30 20 4a 43 | e0 86 4e 21 5d 25 a1 95 77 9e fb 93 fd 1b 22 6c | d4 f7 f2 14 a8 af 6c 58 ec c1 bb 6c 8a db 27 a0 | e6 7f 0c 48 39 29 47 c2 4d e2 32 e9 73 91 20 fe | 20 a5 dd 53 0f 69 f5 d6 ac 97 fa 75 83 38 83 1b | 29 00 00 24 38 98 a0 0a e9 5b ce bb 7c 0c e3 8b | 78 bd d8 2c 72 cb ed 4b ee c0 17 92 29 bf 4c 66 | 8b 54 88 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 90 59 ab 91 26 aa 5f b9 4e 61 e7 | ac 87 e3 ab ff 33 ec 91 00 00 00 1c 00 00 40 05 | ba 8b 12 fb af ac eb b8 53 0c d2 71 52 5e 48 aa | 61 61 f1 39 | libevent_free: release ptr-libevent@0x7fb37805e790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800cc10 | #733 spent 0.0643 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #733 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2cc10 | handling event EVENT_RETRANSMIT for parent state #617 | start processing: state #617 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #617 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #617 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #617 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.21684; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.956182 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #617 | libevent_malloc: new ptr-libevent@0x7fb37805e790 size 128 "road-eastnet-nonat-165" #617: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #617) | a7 ae e8 62 0b 46 de 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 6f 00 02 e7 f5 b4 cb 08 b9 65 4f 47 ef 5a 86 | e5 51 ca 0c 06 cf fd 0b 72 8c 77 7e b4 38 15 8b | 85 87 d6 a6 c5 3f 41 32 55 4b bb 30 5a 6b 55 95 | 76 74 f1 ba 57 cb c3 00 58 3b 41 a8 f4 f2 a2 e7 | 68 ea bf 0e 0e eb 7d 7c 97 24 f0 ec 9c b2 55 b4 | 58 b7 f3 13 c1 89 c2 fb a2 87 ea 86 bf bb c5 33 | 1f ae 16 84 83 00 87 63 36 16 fb 84 22 91 c8 7c | f3 57 cd 36 c5 a3 58 59 44 20 23 41 12 17 51 69 | e0 14 9c 7e ac 9d 23 88 40 7c f8 bc 0c 38 30 cd | 77 b7 88 55 c1 fe a2 53 b7 72 b0 12 95 9b b6 64 | ae 85 af 35 c8 ab 5f a7 cf c7 bf 9a c6 ed 5a 5b | 7a 5d 83 5f 91 52 0f 74 31 d0 db 4a 47 93 a8 88 | 7c 5a 55 e6 2b 80 9e dc f5 58 a8 e9 fc 1a 9c 9a | 4c bb 40 50 e2 70 35 c8 91 ac 99 df 72 58 53 2c | aa 87 b5 1a b6 1a e4 4a 97 dc 1d 01 10 9b 18 a2 | 3b 89 6b 81 0b 44 73 ea c4 f2 cc 33 56 05 5e 54 | 29 00 00 24 f7 8e 9a 0f 2e 84 4c 49 d4 15 90 c6 | 2a 84 51 f1 f7 2c e6 95 75 a4 8d 77 80 5c ad 8d | d1 b6 c5 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 1c f0 18 4c 40 28 e4 7a 14 a6 c5 | b5 d9 19 b3 dc 75 08 d7 00 00 00 1c 00 00 40 05 | 6e 38 75 f1 87 66 04 34 0d e9 7f d7 db 67 24 31 | c8 3b de 05 | libevent_free: release ptr-libevent@0x7fb368040760 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cc10 | #617 spent 0.0635 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #617 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_RETRANSMIT for parent state #559 | start processing: state #559 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #559 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #559 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #559 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.216917; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.926646 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #559 | libevent_malloc: new ptr-libevent@0x7fb368040760 size 128 "road-eastnet-nonat-30" #559: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #559) | 14 21 4b c7 8f d5 3b 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df c5 ec fc 7d 5a a9 f1 38 5b af b6 65 71 32 7c | 6c 91 b4 ed fb 0c 87 80 16 02 df 23 7b 3e 1b 10 | 70 0b 39 0c 6a 5c de 3d 87 90 91 e3 83 ec db 5a | 36 ca c8 b2 b4 db 09 7a 5b e9 7a 17 cc c7 3a 24 | 4c ea 7f 5d a9 0a f1 b3 d7 6a a8 13 a7 fa c2 05 | e6 77 9a ba 9d 7b 25 0d 3e 0a e2 5f ff cc 63 76 | a0 6c db 49 af cc d5 f5 f4 09 78 70 2d fe ff ff | cb cc 4a 9b 55 1b 99 f6 dc 93 35 dd 1d 13 21 bf | fd 6a ca 65 6a c0 ff ff 32 f1 6d f7 3e 98 69 a7 | 0e a1 73 ab ab b1 7e 5d de 57 92 d0 6c 78 24 e7 | 4e 0e f0 4a 0a 29 99 48 f2 3b 55 4c 27 2b 57 4a | 87 27 2c cf f8 7a b5 07 06 95 37 75 bc 1a f4 d9 | 3f 9e cd 96 08 50 67 bf b6 80 17 b5 68 83 2a 43 | 38 12 31 e4 eb bb 48 53 dd 1a fa ae 76 4a 72 80 | 49 d3 12 0a 1d 01 90 66 b4 ca 1b 0f dc f4 35 b5 | 43 43 90 7e d3 10 c4 1b 8d 5a d5 a9 ca 5f b8 48 | 29 00 00 24 cd 39 6e 7e 0b cb f0 da d0 22 3b 9f | 55 4f e9 2f 87 09 39 35 5d 79 80 bd 46 82 75 62 | bf 33 d3 f9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cc da c4 44 bb 29 ff dc b3 bb 41 98 | be 72 17 e4 5a b5 73 e6 00 00 00 1c 00 00 40 05 | 45 80 da 9e 17 9c 16 03 77 58 55 5d 48 f1 3a 54 | 40 de ec ea | libevent_free: release ptr-libevent@0x7fb34405eeb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | #559 spent 0.0645 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #559 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #572 | start processing: state #572 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #572 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #572 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #572 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.216995; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.929906 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #572 | libevent_malloc: new ptr-libevent@0x7fb34405eeb0 size 128 "road-eastnet-nonat-13" #572: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #572) | ae 6d 7f 89 27 62 b0 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 78 66 53 84 1a a1 cc 77 c2 d3 46 14 49 c7 a7 | f9 f4 42 bd ed cc 70 a1 f5 f8 c4 d7 3c 91 88 2a | 3d 9e 83 b6 af 23 02 04 fc 58 e6 76 b8 bc 6f 3d | e3 a8 79 73 32 9c d8 64 d1 bd 4e cb 31 26 96 5f | f4 96 4f ff 80 84 2b 76 9a 2c 0b 78 4d c7 a7 39 | 8c 0b 43 fe 1a ab fb f6 42 71 6f af b4 37 f9 74 | 81 28 44 35 64 2e 59 d7 a3 88 97 bd 34 c6 2c 7c | c1 ef 65 e7 0b bd 37 30 3c ee f2 66 0b 28 7a 27 | 2a ba 30 fb a3 66 78 77 e9 23 14 b0 c0 ac 30 27 | a6 66 34 a1 40 07 ec e7 54 c0 52 99 c7 6b 37 d0 | a0 9a 5a 1f ce 21 9c 3f f8 06 85 27 6f 23 30 ad | 02 4c 8b 40 ed 46 68 4b c8 97 b7 56 b3 69 62 99 | d5 40 a8 dc 62 f6 2f 3e 9e b7 88 dc a5 86 5a 54 | ff 1b 85 38 b9 ed bc 18 95 1a ff e6 a7 39 0a 2e | e7 55 17 cd d1 2c e0 f8 49 15 7d b6 bb e0 3f af | a2 17 66 7c 8f 3c 67 d1 87 3d 7f be bb d3 05 fb | 29 00 00 24 7a 95 97 28 24 e4 3f 20 6f 1b b0 b9 | 00 dc 1a 54 3f 6c d8 cc cd 76 a4 2a 0f 96 20 2d | fe a2 65 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 6e 36 01 db 56 da c9 c9 f6 21 e0 | 9e 8d 5d b9 d9 f9 82 a2 00 00 00 1c 00 00 40 05 | dc 5e 49 c6 b4 b7 74 61 6f 59 0d 14 88 e4 ba 50 | 0e 62 7e 46 | libevent_free: release ptr-libevent@0x7fb35c09b2a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #572 spent 0.0655 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #572 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c025210 | handling event EVENT_RETRANSMIT for parent state #637 | start processing: state #637 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #637 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #637 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #637 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.217095; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.949183 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #637 | libevent_malloc: new ptr-libevent@0x7fb35c09b2a0 size 128 "road-eastnet-nonat-137" #637: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #637) | b6 9c 40 58 3d 0c 12 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 62 01 a3 0e 36 d8 5c 24 b9 7d 93 50 74 52 09 | bf 73 ee 31 ce 48 4d c3 8c 6c 36 26 89 6d a2 98 | f6 a5 6f 3e af a0 f7 15 c5 cf 68 f4 0f 09 28 32 | 0f 5d 04 46 85 53 2e d9 db 2b a2 c2 d9 bf e4 c3 | 50 e3 bc 2c 35 2c e0 d8 71 5e ca 0f 65 92 6f 5f | d6 4c 31 d5 82 00 7d 21 65 65 2e f9 16 0f 60 4a | 66 fa 76 ba 56 18 68 1b b7 8d e5 ca ec fc bd ec | 0a e5 6a b2 41 42 5c a8 2b 3f 1c 15 fb b5 ec c8 | f5 63 de 1c 0d a4 25 56 3a 26 7c fa 02 42 4d b8 | 43 57 db 48 7f 12 2c 70 ca ba 72 7c fe 19 b1 54 | 6b 79 43 ef 00 c1 62 d3 5e ab b6 22 36 80 35 4b | e7 1d 17 2b 6d 8a de bd 50 b8 31 a5 18 f8 e0 24 | 82 85 b3 30 83 33 ec 95 4e ee a1 d7 bf ce 99 9b | c1 6d 33 8b 97 b6 2c 02 a3 d9 39 e4 c5 54 2f 6f | 47 4b a7 bf 34 12 36 ee 4b b2 e8 c4 39 ce c1 32 | 67 23 86 ac 3a c8 0f 88 60 19 2a 2c 68 03 df 9c | 29 00 00 24 37 6b dd e4 0f e2 02 60 45 48 4f 1a | ac d9 95 dc 00 d0 72 b3 54 00 91 51 8b 27 ba 45 | 47 72 d2 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 cf fd fc b2 a7 19 97 63 6c a1 8c | 7a b3 9e 5b 69 33 a4 bb 00 00 00 1c 00 00 40 05 | f0 08 d3 f7 e9 21 31 a2 9d a6 8a 6a ad 66 64 4b | fa 92 42 76 | libevent_free: release ptr-libevent@0x7fb37c051490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c025210 | #637 spent 0.0927 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #637 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354025320 | handling event EVENT_RETRANSMIT for parent state #593 | start processing: state #593 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #593 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #593 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #593 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.217186; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.935828 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c025210 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #593 | libevent_malloc: new ptr-libevent@0x7fb37c051490 size 128 "road-eastnet-nonat-7" #593: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #593) | 08 0c 73 4d 95 6b fc 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3a 5b 8b 42 5a bf e3 df 41 c2 a5 fe 11 64 91 da | 13 85 25 29 02 a6 c9 9c 80 e3 1c ad 21 a7 2f 9a | 0b ca 3c ca e9 08 30 c3 5e 68 75 9f 48 b0 b2 2a | f3 14 8c ce 4b 9d 68 31 bf e7 06 67 bc f6 a7 2f | a5 2e 5d 39 f4 d4 74 52 bf f3 62 0c 0a b9 b5 aa | f2 b8 2f 6c d5 d0 6f 96 84 1e db be e8 02 03 7b | ee dc b5 2e 60 31 46 be ee 8e cd 6c 10 78 9e 92 | 45 23 ed 34 3c a4 82 16 54 50 71 ef 12 97 e8 82 | 81 30 89 f1 a9 de 93 55 47 e1 7b c1 4d 96 b7 09 | 0a 07 7c 6e 45 c4 9a eb b1 2d 13 6c dd 4d b5 76 | f9 0b 32 6e 41 44 dd 36 74 7c 38 ef 89 9d 82 70 | 70 19 38 86 e8 a2 d4 b2 17 ea 56 cc e1 b3 09 6e | ba 1a 8c a2 bd d7 7e d9 e2 59 e9 c6 5b e8 2e 95 | f2 48 7d f5 1f 8e 57 75 2c 61 06 ab aa 3a d4 66 | 6f 67 dd 67 06 ad 55 c4 42 9e ec 08 90 bd f1 bb | f6 d6 d8 db 80 e0 59 56 25 74 f2 d8 fc 0b 32 67 | 29 00 00 24 8d c7 ae aa 9e 1e 3a 21 f5 55 19 72 | d5 db e8 0f 54 51 8b c7 a2 ee dd f6 89 e2 5f d2 | eb 41 c9 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 5a 60 25 54 2e 1f 8e 3c a3 d4 e8 | 65 e4 94 da 40 a8 f1 52 00 00 00 1c 00 00 40 05 | e4 c5 d5 75 de 47 88 58 52 93 1c be 19 a0 a1 72 | fb ef e5 fb | libevent_free: release ptr-libevent@0x7fb35c0a6260 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354025320 | #593 spent 0.0649 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #593 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b25cc0 | handling event EVENT_RETRANSMIT for parent state #533 | start processing: state #533 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #533 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #533 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #533 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.217262; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.911535 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354025320 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #533 | libevent_malloc: new ptr-libevent@0x7fb35c0a6260 size 128 "road-eastnet-nonat-12" #533: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #533) | f6 ef 1a 2f f5 b4 93 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da a1 df df ca 4b 3c 26 52 53 bf 5e dc 26 41 90 | d1 df 23 21 a9 59 bf d6 ae 81 71 a0 81 4c 53 03 | 11 33 1a 4b b7 ab 53 01 6d 0e cc 7b 75 21 4e 97 | 25 1d 96 f6 6e 9e 8f 9d ff 1d 95 15 28 e4 03 98 | 5c 1e 2c f1 4b 5f c6 3a d5 37 62 da 61 45 46 b3 | cc 9d 86 7a d3 76 26 6f 3b f0 79 d8 87 45 9d b6 | 0b 54 6c d3 f6 87 87 b3 0e 07 df 90 fc 79 cd b8 | 24 00 5c 5b 99 aa f0 58 32 9c f1 f5 6b 32 0d 58 | f3 21 64 b4 72 d0 94 c8 05 ed d0 c6 3c b0 26 e1 | f7 cf eb a0 25 a3 19 2f 51 79 e3 59 1e 5a 51 9a | 3e 2a 58 04 1f d3 70 6b 24 34 43 84 0f 4b 98 43 | 23 8c c9 a8 bb f3 ad 2f b5 87 c1 54 1c f5 13 a0 | 38 03 e5 fc 8b 2f cc 40 23 79 b0 d3 84 0d e1 a0 | ea 45 1c 78 35 7d 50 eb b7 64 69 09 33 29 c1 68 | b1 bf 88 e9 f3 00 6b e6 58 a7 19 e9 1b b5 e5 43 | 74 e7 8d 22 51 ab 73 75 e3 5d e8 92 a5 fc f5 56 | 29 00 00 24 51 9c ee 13 ee c2 09 ff 20 a1 f7 f3 | 1a ce 85 4f 59 c3 37 7c 50 6b 1c 56 90 01 a1 b8 | e5 91 ca c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd ca 1b b3 75 23 bb 76 92 45 1b 72 | a0 fb dd 8a c0 43 64 68 00 00 00 1c 00 00 40 05 | c3 3f 99 f7 37 13 13 a6 f3 67 55 d5 33 83 4f 3f | 53 00 18 49 | libevent_free: release ptr-libevent@0x7fb37406f8f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25cc0 | #533 spent 0.0638 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #533 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab3940 | handling event EVENT_RETRANSMIT for parent state #655 | start processing: state #655 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #655 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #655 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #655 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.217338; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.963574 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25cc0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #655 | libevent_malloc: new ptr-libevent@0x7fb37406f8f0 size 128 "road-eastnet-nonat-178" #655: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #655) | 11 f9 62 21 99 31 60 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d2 f2 c8 14 dd 6e 4a d9 42 c0 c4 4a f0 e7 cc ef | e7 5d 2e b6 49 23 3e e0 de 3b f5 ff 2f 66 a3 ff | d2 2b e0 79 ae 88 e7 91 da fb 2a 14 ef d3 ed 02 | fc 9d ab 8d 00 09 6b 86 12 46 d7 1a 25 33 8b 76 | 10 a0 b9 ab 87 66 c2 67 94 c5 19 d4 99 8a 3a a4 | e0 e5 fb 75 02 61 f9 b6 e5 03 ae 93 bc 63 08 03 | 23 87 dd 87 f1 99 04 c1 65 24 a2 b2 0d 42 f1 58 | 8f 80 2d d4 5b 45 fc 67 e3 e3 b4 96 3f 0d 08 58 | e8 5d 60 1c d9 ae 33 24 88 cd 2b c2 77 69 a9 2e | fc 24 c9 ae ae 48 af 44 27 bb a4 49 3a fe fd 12 | bf 17 d1 44 1a 6b 13 72 74 3a 58 25 69 e0 e0 38 | 37 70 99 09 b2 2d 6f 7e 81 73 3d d1 da fb 1c 86 | 50 79 92 bc 8e 3e 67 d4 3a 50 80 1c fe c2 a2 85 | 0d fc 0f 2c 8a 52 82 a7 dc bc 81 8b 7e a0 58 ba | 52 a1 bb d1 15 13 4d f3 ec 8b 68 65 4f 19 d6 4e | b1 55 17 76 9d 5c 64 09 58 93 15 e2 e9 b9 1a c8 | 29 00 00 24 64 6a 25 12 77 44 cd 38 c7 a9 25 d3 | 2b d2 f7 f1 74 31 8d bf 24 ab 69 dc 68 25 0e a3 | 82 ae d1 ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d aa d6 22 51 86 a0 91 29 6a b4 b9 | a5 b0 03 8a 19 a3 96 50 00 00 00 1c 00 00 40 05 | b7 fb 94 0f 85 81 96 f9 c7 ad ab b4 d9 f2 a7 73 | 54 2b d4 8b | libevent_free: release ptr-libevent@0x7fb35c05c110 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3940 | #655 spent 0.0946 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #655 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350017ea0 | handling event EVENT_RETRANSMIT for parent state #616 | start processing: state #616 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #616 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #616 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #616 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.217446; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.947208 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3940 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #616 | libevent_malloc: new ptr-libevent@0x7fb35c05c110 size 128 "road-eastnet-nonat-42" #616: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #616) | 51 51 c2 14 b4 88 86 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 6f 7d 95 94 eb 35 d4 79 fb b8 ed ce b6 0e 8c | 0b ac 78 e7 dc 5d 85 9e fc ca bc 30 a0 af fc a7 | 83 d0 df 38 f5 b9 0e 7c 6c 0f 7c 9b e7 18 2b b0 | b1 47 6e d5 e1 d8 67 a0 a7 53 55 b4 30 4b 4f 05 | e0 9f 68 a5 8b 3d 3d f0 54 7c c1 cf 5b d8 d1 7d | 73 db c0 6b 87 64 87 39 90 85 4b 1a 6e 4a 55 8d | 36 06 71 74 4d 94 c0 cc c3 ca da b9 47 09 e4 21 | a9 ad 84 f0 74 96 ac a8 c6 80 80 8d a7 fe 6f 3b | 0b 61 80 4f cc e0 18 20 5b bc 01 56 5b 21 5b 7d | cf 65 0c bd 2c 1a 83 c9 6d 39 ba 26 63 02 84 48 | b0 ba 3f 13 d9 59 1f b5 ff fe 6c cb 2a b4 66 26 | 36 f8 c3 21 35 08 08 9d 44 88 c1 93 d8 01 57 ec | 98 49 a7 75 ff fd 0f 01 68 c6 f6 cf 50 73 98 74 | 99 a3 bf 5c 1f c1 3e 2b 89 23 5e 9c a4 d5 4a 64 | 1a 16 30 ca 38 de 10 97 61 4d bb b6 7b 95 79 00 | cb 8b 1d 61 ae 38 3a d9 0a 4b 59 fc 82 07 70 c7 | 29 00 00 24 6c a0 b2 b3 6c 5a 92 97 4b 6e 2b c9 | 2c 62 c9 95 6b 4d be 03 71 77 39 4f 3f 77 cf a6 | 3f 8f 1a 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 7b 4c b3 5e 00 28 2b fa 81 9a 72 | 9b 96 b8 73 09 50 16 c0 00 00 00 1c 00 00 40 05 | 46 0e 22 1c 6d 17 ec 1e 80 d6 7b 39 9b 19 6c 8a | d4 c4 4d a0 | libevent_free: release ptr-libevent@0x7fb340071b90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350017ea0 | #616 spent 0.0629 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #616 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #605 | start processing: state #605 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #605 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #605 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #605 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.217522; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.953599 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350017ea0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #605 | libevent_malloc: new ptr-libevent@0x7fb340071b90 size 128 "road-eastnet-nonat-85" #605: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #605) | 7d 69 66 b6 0b 09 69 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 9b 48 45 a7 cd bb af 89 5b c6 84 3e 6b 29 f5 | 82 21 ed b8 01 9b e9 d6 eb 48 22 a2 47 4c 8b 00 | 72 84 38 7c 84 0f e9 29 65 9f 0e 0b d9 68 a1 08 | 85 41 62 70 51 2b 55 5e e7 51 39 59 cd ab dc 26 | 7f 43 85 55 c1 52 ee 33 ef c7 05 bb 4f 2b ac bb | 45 e8 b5 9c 8c 32 a9 0d 25 75 95 bd 99 f6 bc 7b | 41 12 70 0b a9 4f 28 9d 03 5a 76 fc 2d 26 df 1b | e3 79 ba fa a5 3f be 69 d9 fb 38 21 c3 3b c5 39 | 69 72 3d 42 47 0c 0b a5 70 56 b5 cd e3 db e1 b4 | 55 5f 2a 24 b5 b7 72 1d 3c 1e c4 16 a7 e8 bb d4 | 1b 31 e8 de 60 cf e9 e1 53 db 5b aa 1e f3 c3 ea | 73 35 bd 86 03 0c b1 c2 d4 c2 26 cc 43 5f a7 99 | 82 c7 95 6d 26 de e4 a9 78 fc 7c 80 08 50 d4 6d | 8a 23 a2 4b 98 e9 f1 f6 58 c1 c4 56 2d b4 d5 be | e1 4a 66 10 6a c0 ec 3e 63 d7 99 07 ed 98 3e de | 3b 38 1f 2e e8 77 14 e6 cf 9e 3f eb e7 72 77 34 | 29 00 00 24 e5 d6 0e d1 07 36 d0 c9 9d 74 f9 e8 | 91 f8 2d 2e ee 7d e8 c8 bf 6d c4 2d b0 02 ab f4 | ee 91 2c 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 1f a0 9c 16 7a 2c 8b 61 32 59 c1 | 2b 37 d9 c7 8d 13 c7 70 00 00 00 1c 00 00 40 05 | 0c 6c 27 3d 37 c9 55 25 41 13 59 12 57 c6 07 0e | 1b e6 b3 6d | libevent_free: release ptr-libevent@0x7fb36c06a210 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #605 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #605 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a3fc10 | handling event EVENT_RETRANSMIT for parent state #539 | start processing: state #539 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #539 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #539 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #539 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.2176; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.910938 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #539 | libevent_malloc: new ptr-libevent@0x7fb36c06a210 size 128 "road-eastnet-nonat-14" #539: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #539) | f3 ba fb 39 a0 6d aa 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 bb d0 0a e4 91 67 ed 30 3c 0b a8 5b 47 6e 58 | 54 a6 1f 2c 4e 7f d0 b0 bd e3 fb 18 4b 44 d6 1a | e7 86 6e da c5 94 ab b3 8d 6a 0d 7a e8 8e da 48 | 7f dc 72 ca c7 8b 8f e2 4b c2 09 25 60 11 ac 5f | ec 6f 9d 98 47 5c 60 fe c1 7b f0 93 49 fd ed 12 | b4 19 6a d0 14 ce f0 70 42 3f 04 32 d9 04 2f b2 | ca 5d 42 18 c3 28 44 0e 3f 08 71 5a c8 bd 7b 85 | a2 71 ba 72 c1 49 94 26 a9 aa 95 8a 17 20 47 31 | 6d db 6f 70 0f 42 41 97 8e fc 16 21 2d b2 dd 9c | 7c e3 bd 45 5f 99 25 ca 3b 09 1b ee c5 5d c9 18 | 96 1d d7 d1 61 c8 0b 67 e4 93 1e ef 62 98 f5 94 | 75 89 49 0d 58 ec c4 e6 07 56 cd e4 b6 53 c7 69 | e1 47 2c d5 f5 45 3c 00 11 d4 1f 84 61 b8 f1 04 | fb 90 dc 8a 6c 66 1c a2 30 6a 74 1f ab 66 b1 84 | d7 b4 5a ef a0 9a f2 72 32 b7 05 ac 32 be 29 ab | f5 fd d0 b4 26 2e 08 9b f4 e6 30 ae a7 38 30 21 | 29 00 00 24 51 ce ef f2 75 41 8b 68 df 93 8c 40 | d9 7b 58 fd 3b 35 84 b8 48 7a 28 13 ee d4 9f 84 | 78 f2 6c e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 be bb 4b fb 68 df d5 84 df 76 9e | 60 25 a9 1c de 34 76 1d 00 00 00 1c 00 00 40 05 | 90 f0 a5 6e 28 7a dc 53 c0 ae 7c b6 a4 4c 57 62 | 61 16 fb b6 | libevent_free: release ptr-libevent@0x7fb37c064680 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3fc10 | #539 spent 0.0635 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #539 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36000cc10 | handling event EVENT_RETRANSMIT for parent state #532 | start processing: state #532 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #532 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #532 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #532 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.217677; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.935843 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3fc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #532 | libevent_malloc: new ptr-libevent@0x7fb37c064680 size 128 "road-eastnet-nonat-23" #532: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #532) | b2 bb c0 cb 23 86 64 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 33 37 df 77 a4 8e a0 b3 e3 00 cd d4 2d ac fb | 58 54 00 1b 4e b6 44 51 03 9f 3e 46 9f 8f df 83 | c9 7d 11 8c 39 ac 49 56 ab 5f 41 17 92 3f a3 b0 | 7b e1 99 32 00 0e 68 82 bd 92 1f da 3c 9d d6 5e | 1a 09 1d eb 8b bd 63 f3 c7 1c 91 de b6 81 48 d2 | a0 a0 d6 ca 6c 4d a4 58 b2 e4 43 1e 98 6f d3 dc | 45 97 3f 9b f6 f7 45 82 be d0 0f 1c 45 5c 9c 3a | c9 3a 6f 09 cd d2 f4 e8 72 09 bb 9c 48 02 f4 93 | 79 d2 c5 38 6e e0 b7 1e a4 59 ec 3a e6 82 c4 a8 | 46 c4 00 ed 3b 00 2b 60 1c 85 f0 e2 d1 ff 2f 3b | f9 d8 e6 be 72 54 6d 2f ce 69 68 10 dd 93 1f 49 | fd e3 cd 64 0c aa 7b da bb 78 88 4b eb 80 ba c8 | 39 a1 18 86 70 40 67 20 3d 9d ab 72 e5 25 d4 7a | 31 49 e3 a6 76 67 2f aa 74 53 9f 57 5f a1 88 a4 | ed d9 e3 9b 5a 62 f9 e8 ef 24 03 36 4e 35 9e 0d | ce 1c 96 2b 87 5a 84 0b cf 90 a8 01 d2 bb a7 f0 | 29 00 00 24 07 01 44 17 16 f9 66 65 39 42 87 0c | 7f 44 e6 59 85 b5 ac 74 8c 57 ff 68 a2 f9 2d 4f | 6f 8d 12 aa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 d6 21 28 13 22 29 44 67 d8 0e 41 | 43 e4 97 1f 21 5e 2f 85 00 00 00 1c 00 00 40 05 | d5 1f cb 66 19 77 3c 8a 10 7e 62 eb ee 00 e2 86 | a7 15 35 82 | libevent_free: release ptr-libevent@0x7fb37c06c900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000cc10 | #532 spent 0.062 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #532 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368018460 | handling event EVENT_RETRANSMIT for parent state #632 | start processing: state #632 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #632 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #632 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #632 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.217753; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.947033 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #632 | libevent_malloc: new ptr-libevent@0x7fb37c06c900 size 128 "road-eastnet-nonat-188" #632: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #632) | 4f 74 43 70 ed 5f 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 00 b8 55 d7 88 c2 72 f0 05 df 85 ec 3a f6 75 | c1 ef 75 7f ad 60 cc e9 f1 77 a3 7c d9 0b 5e d5 | 5d c2 1a 6e 0a 46 25 ac 06 20 d7 68 9d d2 6e 25 | ff 6b 15 79 a6 94 b8 c3 d0 6e 41 bb 8d ed e7 21 | 63 3d 1a 26 b0 0a 45 94 1e de 46 6a 6a b6 4f b5 | d1 7f 40 6b 2f 4a eb 4d d8 86 e2 e5 25 78 85 80 | 6e 6e 80 63 f5 0c 4b a8 f2 cd 0b 82 23 03 99 14 | 83 47 9a 20 36 c0 ef de 6d 79 4d 5f 95 db 5d 28 | 9f 23 ff a4 10 07 57 b0 78 ff 65 d6 2e 5b 99 08 | 70 cf d4 59 3d 0b 5e fb 55 e9 4e f3 7f d6 14 5d | 1b 27 9a 34 94 bb 77 54 18 eb 5d 4f b4 d5 7f a1 | 84 3d 42 6a c2 f0 c5 b1 ce 30 19 3e 4b 4e a9 58 | 62 a0 4c fb aa 00 f1 a2 66 c0 f9 94 d1 cc 56 3e | 8f 68 09 9e 6a 9e 42 7d 62 7d f6 ec 9f 62 81 40 | 6f 50 24 39 28 5b 86 fd b5 92 57 3f 4d 8a 71 00 | f5 59 1b 4f 8b 96 06 35 4a d8 d6 af 37 4a c9 2a | 29 00 00 24 a3 75 cf 0b e7 29 9a ce c3 82 42 b5 | ee 71 0d 4b 51 1b b0 f6 01 1d 7a 9c f9 27 59 b6 | ed 31 8f 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 12 4f f5 3c 8b 41 44 6c 4b b5 e9 45 | 24 d2 05 c0 c4 f0 a0 78 00 00 00 1c 00 00 40 05 | 4e 5a fa ec b2 4d 50 c5 f3 4f a7 18 04 21 31 68 | 73 18 f4 1b | libevent_free: release ptr-libevent@0x7fb368052a70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368018460 | #632 spent 0.0629 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #632 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb364012790 | handling event EVENT_RETRANSMIT for parent state #625 | start processing: state #625 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #625 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #625 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #625 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.217829; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.963163 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #625 | libevent_malloc: new ptr-libevent@0x7fb368052a70 size 128 "road-eastnet-nonat-28" #625: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #625) | b6 c6 04 15 67 ea 52 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 2a 66 6b 96 87 d8 b6 87 d1 63 4d 22 c0 e8 43 | f1 17 96 ee d2 96 c1 ac af 74 7e 2f c1 03 56 b4 | 91 a7 54 2a 18 43 db 7b c1 dc c3 ab 5f 59 ce 4b | d9 25 40 3c d0 04 72 2a 68 07 37 d1 10 7c 01 e8 | 94 74 57 b7 97 ff 23 78 64 c3 af 87 e5 b7 c6 04 | 38 fa 82 8f 53 ae 4c 38 c7 32 43 6f fa 1b 8b c3 | 00 04 a1 66 ec f1 75 6b d0 65 36 16 d8 20 06 98 | 39 ae 59 43 75 ed d6 5d 3e 27 7d 1f d8 e4 74 3d | 30 32 2a 4c ff 09 92 fe 9f c3 2d aa 84 3b 5f 60 | 20 10 05 43 02 a4 89 ab c2 89 35 0a ee 99 22 a8 | 2c 69 87 17 77 7d f2 12 d8 92 a1 f6 c7 e1 0d d9 | 4d 19 7c c7 c9 40 d2 ce 5a d2 7a 84 a2 e5 a3 72 | 54 d4 31 df 9f 0f c4 a2 d8 0b 60 39 7a b2 4a 8d | 7f a3 22 4d 19 80 0d b1 4f 50 7b 7e 53 1e c7 29 | a7 4e d9 78 77 ad 99 a2 33 30 11 e2 f0 b0 26 5e | 18 8a 8a 03 05 6f 9e 8c db 1a aa 02 79 b7 97 43 | 29 00 00 24 f1 ab 41 0c 34 c5 d2 8d d1 08 09 15 | 25 e7 cb cc 49 7c d8 7c 03 ef 2a 6b eb 41 21 c9 | e5 2d 36 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 7d 5f cd 54 76 9a dd 2a e8 13 0f | d7 0a 04 ba 09 3a b6 b4 00 00 00 1c 00 00 40 05 | 72 40 34 7d e5 09 76 67 7d 7e 83 33 4f f6 4f 75 | 66 18 a7 1f | libevent_free: release ptr-libevent@0x7fb36405f230 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364012790 | #625 spent 0.0641 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #625 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3840489a0 | handling event EVENT_RETRANSMIT for parent state #580 | start processing: state #580 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #580 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #580 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #580 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.217906; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.928671 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364012790 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #580 | libevent_malloc: new ptr-libevent@0x7fb36405f230 size 128 "road-eastnet-nonat-115" #580: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #580) | ce a6 92 c0 a0 a1 1c a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 62 9c b2 99 63 23 d1 93 84 f8 c6 bc 03 8c f1 | 28 b3 ce e8 48 6d fc d0 0e a9 c2 9d 2d 9a 2c cd | 1f f0 93 df e5 a9 05 5b c8 c1 47 b3 5a 1c 0b cd | a2 95 bb 74 ae 94 51 dd 06 80 d5 6e c5 83 35 38 | f8 09 61 ae fb b8 3a ff 4b 57 1e 08 3c 1d 4a 21 | e7 43 37 6b 51 c8 a6 a8 1a c1 22 59 61 5e 5f 2f | b6 c5 96 ba 63 14 e1 d9 b7 d4 58 9e 9f e1 5d 87 | bd 9a bc 7a ff 27 dd 04 5e f7 15 28 0e 6d 1f 5c | 93 06 0d ed bd 1d 59 e2 0a 80 53 4c ef 63 50 ee | 1f 2d d9 4a 72 41 2a 22 6c b9 de 8d a4 62 87 63 | 24 a5 6a 1b a0 db 72 f2 81 6b 35 f5 c1 ba d7 29 | dd 15 a9 4a de e2 81 ba 33 50 3e e7 72 50 bf 75 | 5d 53 37 19 5e 9d 67 46 30 0c 5e cc a6 e8 91 01 | 51 ac c8 25 28 9a 12 77 ef 59 9c 00 f4 9a 34 3b | 2c 2f b6 d1 1c 53 57 48 b5 6f 80 17 ae 76 96 dd | ad 17 fc cb 17 9f 6e 5a be f9 98 d3 e5 2d d6 4a | 29 00 00 24 82 b4 09 66 1c 6d c4 04 c2 08 d9 05 | f9 60 c9 56 60 53 ce b0 69 de c0 ee bf 68 05 62 | 1b ac 43 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 67 b9 a9 40 de ae b7 bf 06 27 f9 22 | 83 cc d1 c8 91 a6 93 4b 00 00 00 1c 00 00 40 05 | e8 5b fc c4 4f 3c a4 be 53 5f ca 7e 63 49 41 b9 | 5c fd 73 7b | libevent_free: release ptr-libevent@0x7fb3440596f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840489a0 | #580 spent 0.0643 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #580 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c00cc10 | handling event EVENT_RETRANSMIT for parent state #560 | start processing: state #560 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #560 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #560 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #560 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.217984; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.925727 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840489a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #560 | libevent_malloc: new ptr-libevent@0x7fb3440596f0 size 128 "road-eastnet-nonat-21" #560: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #560) | 61 ee e9 29 f9 69 ed 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e1 5b d2 4d 27 a5 64 87 b5 53 0f 2d 27 23 c3 80 | 59 cc 4a 83 42 0a c4 7c 74 74 a9 17 dd e6 bf 21 | c5 97 86 51 a0 18 a7 55 17 b7 10 8d 1e b0 a4 7b | 87 6d 2d 89 28 1e 78 86 6d a6 2c 5e e4 1e 5e b3 | 8b ff f7 4a ed eb 04 dc d3 8b 68 b2 08 51 f1 90 | 83 7d 2f 12 5c 80 ab 52 30 6f 5a 2f 21 d3 f6 2a | 24 28 c1 3d 11 09 6e 37 07 e3 bd 5a 6b 28 45 fa | 2f 6d b4 10 49 37 83 73 b1 f3 31 9b 80 01 11 22 | 5f a1 e0 5f 63 e5 ef 6f d7 20 b9 78 da 97 fb dd | 03 07 83 ee 70 56 66 02 29 c9 ab 5f 38 ff a9 d5 | e9 8a e3 9f e9 fc 01 13 30 ba f0 d8 18 76 b9 3b | 5f 09 cc 0c 64 e9 65 14 08 ff dd c9 6a 40 e5 8d | e6 ec 0a 5e ab 63 d2 1f a2 70 05 7f 44 94 93 ef | d9 cd 76 d1 2d 31 22 90 40 07 c7 7c a2 53 ce 36 | 14 46 8f da 4f 94 35 cc 7b b4 58 99 54 67 3b 56 | 36 26 06 7f 4a 38 3d 7f b5 57 e0 c9 8a 7c b4 a2 | 29 00 00 24 6d da b8 df 8d 0e 39 36 00 cd 36 1c | c8 6c 4e d3 97 de 45 90 16 f8 97 1f 18 a8 59 71 | e2 d8 bb b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b1 4c ac 81 8b a9 9e 5f 7e 2a 07 3b | d2 dd f3 4f 02 d8 73 9b 00 00 00 1c 00 00 40 05 | 0e 12 95 b1 fc 7d ce a6 69 21 08 f2 b2 a7 af 4b | 42 43 c7 4f | libevent_free: release ptr-libevent@0x7fb37c07bc30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00cc10 | #560 spent 0.0622 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #560 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35002a9a0 | handling event EVENT_RETRANSMIT for parent state #668 | start processing: state #668 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #668 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #668 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #668 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.218095; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.974464 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #668 | libevent_malloc: new ptr-libevent@0x7fb37c07bc30 size 128 "road-eastnet-nonat-110" #668: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #668) | 69 d8 43 4c ca 0f 15 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 41 d2 79 13 fa 3a 8f cb d5 3a 12 ff c1 bd 72 dd | ec 4a 69 1d f5 bf 64 dc 82 8e 85 c8 60 0f 31 b8 | 2a b5 99 5e 2e db 16 88 62 d0 a8 a0 e7 ed 8c 22 | 9b 22 dd 67 cf 53 b2 41 57 e0 6d 62 0b ae a9 e2 | a4 33 ef 81 fd 1e 99 10 3c 05 f1 b1 63 cd 1d 4c | 81 83 e9 17 13 bb 86 a3 f8 34 d0 be b4 67 f9 24 | 19 c5 94 10 ae 8f 69 b3 cd cc d3 2f 95 57 65 09 | 5a 47 e0 ce 39 9e ff 8b 27 cb 00 b1 06 c2 96 f3 | 87 01 78 7b 55 94 56 97 f0 1a b4 de 45 49 99 29 | 41 cb ee bd 0c bf fe c2 39 91 19 f8 ca 82 eb 04 | 9b 78 1c 89 01 44 b7 86 45 f1 a7 24 c6 c7 c9 55 | 95 6b c2 87 ae 27 a5 78 aa 04 30 8d d9 4e 9d 41 | 61 6c de ff f0 c9 f3 64 d3 6c da 3f e7 7d a5 7a | cb 07 a2 96 df 94 f1 bf fc cf 2f 7d 5e 6d 6f 1b | 83 aa 52 10 ad c1 b7 85 95 a6 c3 93 b1 03 49 41 | 3e a1 3a 94 67 5a f2 ab 4f 45 a4 3f 47 2b ce 53 | 29 00 00 24 8b 75 29 44 a0 34 83 1a bc d3 07 46 | 1a 97 11 01 01 9b c6 7d 43 08 5a 1e e3 e6 55 93 | 99 2b d6 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 9b 57 88 6a 86 10 db 30 73 b0 26 | 55 1c 17 3c 26 62 fc 8d 00 00 00 1c 00 00 40 05 | 6f 2b 74 b2 0a ff ff 57 56 7c 59 c9 0b 6f 36 1d | 69 a9 e2 f6 | libevent_free: release ptr-libevent@0x7fb36408b100 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35002a9a0 | #668 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #668 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354012bf0 | handling event EVENT_RETRANSMIT for parent state #571 | start processing: state #571 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #571 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #571 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #571 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.218187; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.938728 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35002a9a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #571 | libevent_malloc: new ptr-libevent@0x7fb36408b100 size 128 "road-eastnet-nonat-46" #571: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #571) | a7 5c 91 a2 a0 c7 d5 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d2 2d 65 41 a6 d9 4a 2d 30 96 90 44 a8 28 31 37 | 20 85 a7 46 f9 e1 3b d0 db 2c f5 64 1e a9 75 76 | 5e 93 ea 28 89 51 63 91 c2 89 51 aa db f7 57 7e | 26 a7 18 d8 ed ef ae 29 0c 20 23 07 c6 99 8c 3f | 4b ac 3d e3 11 e2 e0 88 37 38 4e 28 f5 79 1b f4 | c1 45 26 7e 04 84 1e 25 df 1a 20 8e 42 60 ac e6 | bb 99 02 1a bf e1 fc 57 bd 08 cc 3f c8 a4 bd 39 | 80 32 fa bd 24 5a cf 7c fb ec 2c 26 c2 d6 b7 93 | db c7 66 31 ac a7 48 33 9b 97 36 24 dc c4 b1 1f | f1 8c bc dc 99 b0 9d 65 3a 26 8d b6 ff f4 30 2e | df 5e e6 48 46 c0 2e 8b 04 ae 3d 4f 49 6c 4d a5 | a8 2c 10 62 3e 2f 34 53 59 ac 0a 46 80 c4 83 67 | 5d 0e af 36 3f c6 bd ce a8 a6 96 6c e7 14 1c 6e | ec 46 c8 0c f2 81 fd 9b 02 c0 10 fc f9 7a ad 27 | 1e 8c 95 1a 96 66 8d d8 17 9e ab 39 d5 e7 6f 1e | 0f 90 04 2f 14 da bc 41 89 5a 60 41 1e 6b d8 88 | 29 00 00 24 f0 df 30 54 bd 5d 12 41 64 95 81 da | e2 16 b7 a5 91 f7 f0 c0 97 0a b3 7c fb 37 99 ec | 0e 53 6f 50 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 5d 3c ab cd 1f 05 d6 29 65 59 e2 | b6 05 c5 68 b0 d2 e9 9f 00 00 00 1c 00 00 40 05 | fe 1d 71 04 59 69 a8 7d 1a 5e 10 ed bb 6e 46 db | ec 57 9a 8e | libevent_free: release ptr-libevent@0x7fb35c06f3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354012bf0 | #571 spent 0.0643 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #571 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a94500 | handling event EVENT_RETRANSMIT for parent state #754 | start processing: state #754 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #754 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #754 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #754 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.218264; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000734 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354012bf0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #754 | libevent_malloc: new ptr-libevent@0x7fb35c06f3a0 size 128 "road-eastnet-nonat-250" #754: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #754) | ba fc 0a 40 dd 57 2f 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 dc 3f 52 f7 90 e6 aa 55 28 27 9f 26 90 49 c5 | 4e 63 af 84 9c 24 2a 54 88 16 03 62 61 85 f0 75 | 96 ac b9 67 9b 1f a3 76 a2 7d d7 2a c2 0d b0 20 | 4c 76 ab 99 46 09 ae ba c5 a3 18 d9 2f 6b 75 6f | 8c 85 4a 61 60 92 93 9a 69 73 74 b4 71 5f 61 5f | 49 20 71 ee 13 df 74 12 52 f5 f7 6e e5 b6 47 13 | 81 a6 fd 04 c1 cb 97 6e a6 05 89 f7 1c c8 36 4f | 3b 16 b8 6b 1f f4 41 b6 2e 95 ff 58 91 d8 05 7b | 75 dd bd f6 54 1d 51 67 0b f9 12 22 e3 6a 7e fe | 83 e1 9b fb a2 25 c3 ac 81 7f d9 4f 94 b0 53 63 | 18 d5 76 25 b0 fb c2 e8 de d9 06 a6 92 1b 1a 4d | b2 14 44 77 4e 1a c6 51 54 6d 23 8f 6a 2b 6f aa | d9 e4 ba 5e 32 24 b4 f3 63 3f 1b 0f 79 02 db e4 | d2 10 63 1b 77 54 88 79 1a c9 10 a1 5b a8 e0 e0 | 2d a9 8a 89 9d 56 82 83 99 43 e6 10 16 f8 bb be | 4b 7e 7f d3 79 9f 54 df a5 06 38 28 00 85 76 c9 | 29 00 00 24 8f 59 38 2a dd e3 49 a5 d1 b0 e1 2b | d5 a2 3b 56 cd 53 01 3b e1 33 30 4f 0c 29 77 15 | 19 47 ad 54 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 85 ee 2b ce cb d2 9a af d5 06 f1 | d4 8a 29 3f c9 5e e4 58 00 00 00 1c 00 00 40 05 | 7f 6d 1a 4d 19 0a 8b 4a ad 47 7e e6 0e aa 08 53 | cf fd 3e 04 | libevent_free: release ptr-libevent@0x7fb37c090640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94500 | #754 spent 0.0648 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #754 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3800383c0 | handling event EVENT_RETRANSMIT for parent state #557 | start processing: state #557 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #557 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #557 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #557 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.218343; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.919572 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94500 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #557 | libevent_malloc: new ptr-libevent@0x7fb37c090640 size 128 "road-eastnet-nonat-37" #557: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #557) | 2d 38 86 43 43 f3 e1 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 b5 d1 8d 5e 9a 16 4c 4d d9 8d af 2f 02 f9 49 | 64 5f 56 86 14 f0 4f 6e 1f 70 fb 5c 5c 41 82 1d | 33 6e 56 08 67 54 02 75 6c f9 e1 34 59 7c 6f b1 | bb 1f 4d ed 4a a2 b7 f7 4f c1 0c 46 20 0e 28 4a | cd 21 92 73 5f 5d 35 8c fe 58 86 0b 7f 07 97 23 | d1 0f ec 97 a5 2c 87 13 2d 94 36 17 e9 57 93 bf | c4 c1 bd 13 03 ee ba ab 1a a7 44 ce 03 75 29 fe | b6 82 6b e3 c2 1c 1a 53 06 87 f8 13 f9 a2 78 a2 | 51 a0 ba f9 b0 6c 0b 05 eb fe c7 b6 32 0e 48 84 | 7d 7a c1 bd 77 ee ba 29 ff de 64 d5 ef 12 c1 40 | d0 a1 05 e1 31 4a 93 c2 70 e2 49 cf 02 83 53 ca | 2e cb f9 e3 78 24 ca 8e c8 8c f2 22 dc 20 cb 27 | 4a df 51 8a 3b da 00 bb b0 0b a6 42 b8 69 cf 0e | a8 cf d0 73 3e bb 78 2d bc 6c 41 8d a7 b8 30 76 | 9c 94 b8 c4 16 94 63 de 81 f2 b2 a7 e1 0e 52 f4 | ea 2d 43 a0 57 4b af 2d d0 29 08 d0 cb 35 56 38 | 29 00 00 24 a6 c9 1c ff c9 58 73 10 78 ba f6 c6 | 7f c6 b2 cd 72 d9 cc be ea 32 4d 34 a4 2f 7e bf | 63 21 24 e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 8f df 68 5a a5 1c ad e8 83 e1 98 | 63 b5 56 36 55 d8 0c 2e 00 00 00 1c 00 00 40 05 | d5 54 40 ea d7 2a 41 c5 f7 56 0a 7d 70 86 31 1b | a6 62 9a d1 | libevent_free: release ptr-libevent@0x7fb35c095ac0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800383c0 | #557 spent 0.0628 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #557 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374023ce0 | handling event EVENT_RETRANSMIT for parent state #581 | start processing: state #581 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #581 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #581 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #581 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.218418; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.930894 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800383c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #581 | libevent_malloc: new ptr-libevent@0x7fb35c095ac0 size 128 "road-eastnet-nonat-121" #581: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #581) | 32 81 f4 dc 89 2b 8b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 5d a0 37 46 04 87 9a b6 6f c7 58 5f 83 03 92 | 02 7c 2a 9d f7 53 2a e5 0b 99 84 74 ec e8 cd 8a | 37 bf 28 7a 29 fe a1 eb 1c 5b 7a cb 37 de ef 1a | bf c2 4e 23 55 33 da a9 f6 17 3d 8b f1 6d 00 2f | 62 ea 42 d9 b5 b8 8f 47 c3 23 ad 53 eb 4c 74 2c | e9 34 fd a5 c8 bb c5 80 14 80 c7 0b 8c 50 e2 47 | de 21 2d f2 8b b1 5c b6 9a 5d 04 45 b3 11 7d ef | e1 83 dd 1e ba b6 e0 ad d4 d2 d2 08 bd 90 e1 fa | 94 b8 05 91 5f a8 5e a5 f9 fa e3 25 cd 10 cd 73 | 6c 38 de b0 68 38 4f 9e 42 60 5f 63 68 b8 84 1d | 1e 04 f9 aa 37 d8 83 d0 d4 62 ad f8 03 24 51 28 | 44 a0 bd 38 97 06 60 9d 53 0d 2c c3 79 30 58 3d | 74 fe 30 eb c7 d9 28 61 30 6d 56 9a 52 da 0d 3c | ba a5 64 a7 7b ba f6 9f 41 d6 92 6f c0 bb 6e 63 | 61 ab be e9 7e 12 35 ed 54 b5 c8 d2 0e 78 a4 08 | 61 fb 98 ae 3e a3 b4 05 6b 0c e2 c6 c7 c1 c9 60 | 29 00 00 24 d1 95 dc 3f 02 70 5b 6c 62 02 ec 87 | 81 84 54 7b ca 76 e8 0d a8 e7 c8 f2 57 8a a9 b7 | 73 9c 0c 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 ca 9f f5 7d 53 45 e4 91 b2 47 fd | fe fb 46 b0 89 4e d8 b4 00 00 00 1c 00 00 40 05 | a0 2f bb 08 8b 1a a2 cf 99 1d b1 55 9c d9 bf a8 | b6 d2 07 0a | libevent_free: release ptr-libevent@0x7fb3840581d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374023ce0 | #581 spent 0.0637 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #581 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b12c00 | handling event EVENT_RETRANSMIT for parent state #706 | start processing: state #706 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #706 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #706 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #706 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.218495; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.984172 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374023ce0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #706 | libevent_malloc: new ptr-libevent@0x7fb3840581d0 size 128 "road-eastnet-nonat-185" #706: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #706) | d6 7f 43 f8 51 c2 59 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d ca f6 8d 57 76 e3 b2 b8 21 63 3a d9 6b 17 ac | 1d a3 0a a8 65 8a 73 ce 66 97 d8 a3 fe eb da 4b | 83 ee ee bc fe 2b d0 aa dd e6 65 08 18 59 e4 95 | 09 18 a4 39 b6 a7 f4 f9 2f da ab 36 4c 80 49 63 | ef 16 9b fe ec 5c ed 9e ae 36 1a ed 1b d4 af 83 | 89 ee bf 02 2f 2a 53 9b 57 89 ac f8 bf 5e 38 99 | e4 40 07 3c ed 06 cb ab b3 a6 c6 c0 55 73 07 12 | b5 0c 74 dc 1f d0 ce 7b dd e0 58 fe 36 aa 47 3e | 4c f7 16 70 36 92 d1 18 ca a6 68 9e a3 3e f4 fd | fd 01 7d 36 f6 5e eb 58 0f da ff 7f 73 d0 8f f8 | 40 11 40 98 2d 26 98 9d 07 8b f8 c9 08 66 7e 6a | 9a 49 1a 01 ed 32 66 90 e2 a6 41 73 76 5c f7 ec | 6c 8a d8 8d ad 2e 38 8d 00 f8 49 ba 59 c5 fb ee | 6d 7a 7c 5c 87 f2 99 5e 69 88 db e5 5b 1d 7d 33 | 71 a2 b7 37 fd 2b c4 8b c8 67 fb a6 f3 ec 68 08 | 8e 1b b3 a6 50 20 ca a4 1d 80 b1 97 13 a3 05 ba | 29 00 00 24 2d c8 fa 54 cd 1d 1f 06 d1 eb d2 15 | 6f e9 7e 83 80 52 a9 d8 d9 e9 24 fc ad 86 d9 31 | 9c b4 55 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b a9 09 9b 3f 46 0d e5 b9 f0 c5 5e | 3e 6a b5 e5 b3 2c 1a 78 00 00 00 1c 00 00 40 05 | 49 ac ac 8b 9b 7a cc f6 f1 c5 f0 57 32 77 7b 51 | e7 ba 7d 05 | libevent_free: release ptr-libevent@0x7fb36c082c30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c00 | #706 spent 0.0645 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #706 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #667 | start processing: state #667 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #667 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #667 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #667 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.218573; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.987612 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c00 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #667 | libevent_malloc: new ptr-libevent@0x7fb36c082c30 size 128 "road-eastnet-nonat-166" #667: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #667) | 7b d9 27 49 fc 2f 27 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 df f5 cd e2 64 d8 37 7b 17 93 12 89 61 a5 0e | 54 43 72 d9 e7 56 eb 78 19 d8 ce 7b ab fc c4 ce | 29 4e 82 3c 51 f6 26 9f a7 b1 c1 26 57 58 94 3e | 7b 87 b0 70 18 07 62 51 cf ed f0 18 a7 02 45 64 | 29 d3 04 3c b6 f3 aa e6 9e b7 08 a5 d0 f8 46 16 | 01 f6 5d 3b b2 ab c3 c0 7a 8b fd 23 1e c0 aa 9e | 88 07 cd f3 38 23 f9 56 92 5f 01 ff 11 16 9f 7e | 88 51 70 b8 3b 7d 47 76 0c 28 0d b3 12 dd e5 34 | 27 62 ae d8 22 f8 9e d7 02 23 08 f5 22 88 a1 54 | ce e8 4b 93 e9 2c d5 39 6a b2 ee 0e 4a 7c 28 7f | b4 be ec 6c 77 cd 49 9f c1 61 d9 cb 36 3e a7 9e | a7 7c d6 ff 97 c2 82 05 bf cb cd 80 8d 87 fc a5 | 16 bb da c3 6e 7a 00 71 0f 91 4c b0 68 cd 77 21 | 13 d2 82 d8 54 7d 82 0e 40 c0 42 f3 49 4c 09 2d | 3f 2d f3 fc 4d 1d ea ae d5 68 9c c1 d7 8c 7f 3d | 4d 87 88 e0 eb 30 69 4a 07 13 c2 69 06 f4 34 e6 | 29 00 00 24 cf 70 1d 7e 4f db c9 b0 ee c5 af 49 | a2 ae b2 09 b2 1a 80 0c 2c 53 c7 0a 40 2e 76 18 | 3f 09 61 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd b0 a3 f1 2d 95 77 d4 30 95 3f d8 | d6 55 df fc a5 31 ef cf 00 00 00 1c 00 00 40 05 | 40 4e db d5 d8 6b 01 95 ad 35 71 f3 b1 25 66 78 | f8 5d ed 97 | libevent_free: release ptr-libevent@0x7fb35008da90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #667 spent 0.0625 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #667 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #708 | start processing: state #708 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #708 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #708 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #708 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.218649; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.983408 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #708 | libevent_malloc: new ptr-libevent@0x7fb35008da90 size 128 "road-eastnet-nonat-153" #708: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #708) | 83 fb 36 71 76 29 5b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 da 77 6f a1 f4 e9 2a b9 26 f3 f4 92 2d 46 f4 | b0 7a 40 33 85 5f c9 7c 72 d1 cd 54 8c 98 37 24 | f9 0f 31 c0 59 59 24 f6 b1 81 e9 3e 4e d8 2e 7c | d3 b0 17 2c 94 6a 08 cb de 35 37 9f 1e 5a 20 07 | 0c 50 86 38 97 07 6a e1 c5 0b 65 c8 6b 40 d7 23 | 14 ad 46 39 49 f8 1f 78 30 1f f3 26 21 9b 0d c6 | e7 c6 21 16 0b 17 ff 88 3b 14 95 13 3f 92 c8 82 | d7 c4 ee a8 41 71 fd 1b 20 11 da c6 5d 3a 47 d1 | ca bc a1 5a 85 26 5d 5a 28 9f 54 25 f5 62 92 f3 | fe 06 f5 6b 43 32 33 40 13 b4 f7 f9 75 91 87 ca | 2d 29 62 a0 43 63 6e 0a fb 1e d6 2f 78 ad 10 0a | 3c 75 ef b9 fa c4 90 84 df 4f cc 90 59 78 ab 87 | 9f a2 c3 c2 7f d2 98 4d 55 0c 9e e5 34 c4 ad d0 | 3c 21 98 a2 b3 b7 59 1e cb 10 0a be 37 e9 ef d7 | 36 78 d7 47 cf 88 0a e6 42 a5 bc 51 bf 4d 18 8e | 51 22 ad b5 62 a9 c6 e9 19 d6 ac 7e d0 4b 90 54 | 29 00 00 24 44 8a 54 75 91 ac 9f 57 e7 e2 61 bb | a3 bc dd 31 8a 95 c4 e5 bc bb 80 d8 96 43 b6 04 | ee a9 3a 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 36 27 57 09 35 01 20 a6 6d 08 d6 | 77 61 10 b6 75 1c 9b de 00 00 00 1c 00 00 40 05 | a5 a2 ff 3d 75 4a 07 bb 58 ea 97 e6 0f 3f 13 76 | 41 34 e3 b6 | libevent_free: release ptr-libevent@0x7fb35806e450 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #708 spent 0.0628 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #708 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3800319a0 | handling event EVENT_RETRANSMIT for parent state #703 | start processing: state #703 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #703 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #703 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #703 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.218725; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.987129 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #703 | libevent_malloc: new ptr-libevent@0x7fb35806e450 size 128 "road-eastnet-nonat-114" #703: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #703) | ae 90 67 40 0b c3 60 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 19 9b e5 9c 8e 57 c1 33 8b 94 01 97 8d 71 df | fd 30 9e 4b 3c d1 62 ac b2 ef 34 9e 04 b9 be 20 | 28 4d c1 c0 e4 75 70 3a f1 2f c3 4b 44 fd be 81 | 03 75 3c c9 fe 1b 81 d5 34 29 50 d7 8f 3f 70 56 | b3 d7 36 46 b1 89 89 80 d0 ec 97 d4 da d5 f4 f3 | 90 a5 07 30 19 0d e2 de 67 bb 84 67 ec 14 1d f9 | c9 6f 5e a4 ca 2b bd 62 3a a4 de d7 ad b7 a9 69 | 14 ce 78 80 17 fa 13 c7 37 12 cc 43 83 21 10 58 | 9d 2b 15 15 d8 e4 b1 cd ac 75 15 a1 72 52 09 be | 1e 67 15 57 3b 30 67 e6 f1 bc 1b 0d 33 dc 86 88 | 03 17 c7 52 df f2 2d 62 41 fb db 4b e5 00 8b 99 | 4e 97 2c 6a 81 e0 5c ea fe ad de f5 d3 4c 63 11 | e5 8c 09 a5 fe ec f4 22 ed 0d 56 cd ca 1b 22 80 | a7 f4 83 61 3b e7 31 76 2e 63 32 19 00 cd 04 39 | f0 c5 a6 71 47 ce da 1d cb a8 66 69 90 c8 a9 5a | 7f 0c 41 bf 5b ff 6a 04 a1 60 dd 0c e7 19 60 15 | 29 00 00 24 e3 5d d8 49 01 1c f9 e5 e1 ba 04 21 | cf 21 a7 36 74 86 ff 7d d6 85 f8 5d b2 3c d3 44 | a8 44 11 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 c6 13 89 f0 56 8f ca 89 41 0b e7 | d5 b7 99 19 f1 5e ec 03 00 00 00 1c 00 00 40 05 | 48 a2 09 85 61 af ec 54 8b 03 81 ed 23 cb 58 07 | eb 48 95 a0 | libevent_free: release ptr-libevent@0x7fb35c0ca170 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800319a0 | #703 spent 0.0633 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #703 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46adb080 | handling event EVENT_RETRANSMIT for parent state #751 | start processing: state #751 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #751 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #751 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #751 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.218801; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.99229 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800319a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #751 | libevent_malloc: new ptr-libevent@0x7fb35c0ca170 size 128 "road-eastnet-nonat-244" #751: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #751) | ae b9 96 92 13 03 18 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 18 de 27 b3 41 d9 b4 97 87 96 94 92 db 34 d5 | 56 66 24 e2 24 37 ce bd 92 7b e3 87 23 69 e7 bb | 99 85 d4 04 ba ee 4f 3a 2d e4 f5 20 88 1a da 6a | 37 fd 29 25 a7 48 4a 55 fa 78 65 6e 2e f9 46 8a | 6d b2 51 bd 8a 24 ee 67 2d ab b9 57 1a 5e d8 74 | ba ae f9 c0 cf 53 67 dd e4 f0 25 8c f7 8b e5 cc | c4 b9 b2 2e 91 da f6 5e 10 27 44 76 09 73 cb 05 | ee ff b8 22 52 36 b5 70 b5 f3 a3 21 0c 9b d9 c3 | 6e 1e fd a6 b5 36 62 17 f0 b8 95 48 d0 79 59 86 | f0 3b ca 96 84 68 69 d6 59 82 c8 2b a6 a6 4f 06 | c3 dc 73 a0 8a 74 9c 4d bc d3 4c 09 2f b7 5c 51 | 36 1f a0 36 a1 c5 d6 a5 b8 10 87 71 e5 72 18 60 | 29 95 15 48 57 c7 bb 89 e1 44 1c f8 fb 56 fa 24 | e6 14 3b 9a 5e c3 26 ff 0c 04 49 70 a6 59 7d 65 | 41 4e c0 79 9f 67 e9 9e b7 b9 6a 02 99 b0 ea 24 | f8 69 67 ed 88 82 6b 65 bd e8 e7 35 b7 cf 86 4f | 29 00 00 24 5f 12 63 14 37 ca 62 06 c8 d7 61 a7 | 8b 59 9f 9f dd 4b 86 2c 58 45 7a 5d a8 0a d1 a1 | 93 37 6f 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 41 84 a3 d1 08 28 c1 a2 36 a7 52 | e0 0a 68 b0 f4 d6 13 58 00 00 00 1c 00 00 40 05 | 6f c5 8f 9c 48 4f ce 63 14 03 29 e5 1c a9 3b f7 | 4c 7b c3 5c | libevent_free: release ptr-libevent@0x7fb374085870 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adb080 | #751 spent 0.0989 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #751 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b1c480 | handling event EVENT_RETRANSMIT for parent state #722 | start processing: state #722 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #722 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #722 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #722 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.218916; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.99948 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adb080 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #722 | libevent_malloc: new ptr-libevent@0x7fb374085870 size 128 "road-eastnet-nonat-179" #722: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #722) | aa d5 b7 9d 2c 2d ce cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 b1 9e af cf 96 c4 1f a9 84 c9 1e fe 0d 23 0e | 53 41 ad 54 73 4d e4 38 06 61 64 5a 7e 50 5d 4b | 7b 88 a3 16 c2 7a 44 91 ab 9a ef aa fd 30 6e 1a | 1d d2 33 a7 46 ad ce 2a 23 40 98 78 51 d0 bd 75 | cb b0 f4 b3 4d 7d 19 05 e0 8b 9b 3f ea 2b b8 7f | 3e 4a 4c 83 dc 50 06 15 79 16 52 63 ff 38 b6 0f | d8 c3 fa 2f f5 c3 27 82 43 ee e2 17 1f fd 56 25 | 4d 01 27 c8 35 e9 4c 3b 07 cc 3e b3 7b 20 e4 14 | 25 d6 4c 28 e2 bf c7 2c 41 cf 35 f8 5a 05 57 12 | 04 0c ca 49 a7 e8 4a a0 b8 27 d8 fb da 18 09 0a | 8c d8 8d af 83 fc 09 54 90 fe e9 ec 6d 97 9f 38 | 4e f0 9c 72 3c f6 cb 04 b9 67 19 9d 6a 3a 73 08 | d5 1a 3f 89 1b 6f b4 27 4a 1e 40 b2 80 92 bf af | 91 29 dd e3 e5 8d 54 1a b2 c3 4e f5 fa 70 5a df | 3f f7 11 8b 30 04 85 e6 00 fc df 4a f8 63 a9 ce | 38 f2 7c 9e bf e7 aa 6c 51 0c 26 e0 f2 3a 12 6b | 29 00 00 24 7a 35 42 ce 34 04 04 57 a4 48 47 35 | 56 ae 37 50 6d 6b b9 18 e7 0a e4 12 4e ef 0f 1d | e0 a7 cb 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea a8 f1 c6 be 84 ee 15 46 58 b3 d5 | 8e ba 1e e7 f5 a8 48 b9 00 00 00 1c 00 00 40 05 | 03 f5 9e 01 93 c6 ea 77 b1 6c 5c 90 de bb c7 8a | ab c5 48 5b | libevent_free: release ptr-libevent@0x7fb378080550 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c480 | #722 spent 0.065 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #722 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb360012bf0 | handling event EVENT_RETRANSMIT for parent state #740 | start processing: state #740 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #740 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #740 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #740 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.218995; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.992975 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c480 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #740 | libevent_malloc: new ptr-libevent@0x7fb378080550 size 128 "road-eastnet-nonat-230" #740: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #740) | 1b 68 e9 bf c7 97 07 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf b3 10 fb dd 28 f6 cb 25 9f 9d 63 17 69 6d 6e | e8 71 1d da 03 62 10 04 58 4a b2 60 7e 08 0d 23 | e8 11 df 63 3f d9 4c 6b 74 a1 a5 86 cd a9 4f 0b | a1 93 6d 81 fa 0f ef 54 ce 9d fd cb 34 8e 77 a2 | 87 72 4c 47 7e 84 fe 1b a5 81 30 1c 8c fc c4 9a | 0f 98 35 d7 2a 5e 44 55 8a 59 d6 d8 30 0e 7b a6 | 2a b2 14 36 a8 38 48 b1 a9 46 59 2b ac de 0d 8e | 1c 9d 2b 89 1c 30 40 5d b7 34 94 17 5f 21 6d f3 | 8a 9c ff b3 cb 8a d6 33 b7 5b 70 0b 55 e1 7a e1 | 7d 1b fc 2c 98 7b 56 b4 9c 01 69 95 c3 40 41 1a | 16 ef a0 2a 1b 18 8d 7f de 2f 24 c0 24 36 5a 75 | 68 29 82 0e ef 57 e3 38 1e 0b 49 5a de c8 05 03 | 5c 7b 63 02 56 7e a1 b0 b5 ab 37 8b 92 4e 92 ec | 6a 5b f1 54 78 81 27 2a c2 36 70 26 e0 90 20 5c | 71 5f d8 ca cb 70 40 d9 8f a6 1b 60 21 65 09 2b | e2 dc 1b fc b7 96 10 f1 3e c1 9c af 69 36 85 93 | 29 00 00 24 fa 43 15 42 5a db 07 16 30 b5 67 19 | b6 84 08 f7 7b ea f2 1f b7 28 7e 51 d0 6b f6 fb | b4 42 2c ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 6f 0b 3c 61 32 28 f1 44 65 e1 5e | bc c8 e4 f5 79 a3 0a bd 00 00 00 1c 00 00 40 05 | bc 6f 55 f3 a9 01 d6 c1 3f f8 0f 15 e9 0d 1c 1c | f5 51 2a 5a | libevent_free: release ptr-libevent@0x7fb37003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360012bf0 | #740 spent 0.0685 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #740 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36402f780 | handling event EVENT_RETRANSMIT for parent state #563 | start processing: state #563 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #563 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #563 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #563 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.219093; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.924911 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360012bf0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #563 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 "road-eastnet-nonat-40" #563: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #563) | 36 fd bc 41 27 9a 18 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 f7 f9 df fc 24 98 94 50 1f 5b ee 02 6b 2b 08 | 88 ea bb 4c fc 6f 81 4e 18 49 00 df e1 e9 2e 32 | 12 86 87 5d ed 60 5b 39 8c 88 3b 45 c5 ff 07 ae | 3b 26 9c d0 6d b7 d1 e5 d2 f2 44 e2 99 9a a1 34 | 7c cd f0 e6 b4 a0 06 c2 e2 40 86 90 79 ac 53 56 | e8 b9 80 5c 54 49 7c e3 25 da dd 1c a3 52 9f ec | a4 d2 90 b1 56 ce 5d 5c 20 a2 3b 08 f3 fd d6 30 | 42 db da 3e b2 e5 ed 74 de b7 e6 59 ba ed c1 83 | 60 66 8c 72 2f 6f ba 9a 85 05 c1 db 9c 7c b8 87 | 26 24 9b 4b 8b 4b 67 b9 df 00 bd 07 d0 3b e3 b4 | 6c 17 18 f3 f7 d3 9c 27 cf 7d 7a bf 43 d6 d5 cf | 69 cf a9 92 09 2e 90 5d 89 35 3e 56 73 21 5e fd | 30 0e e9 0b 43 37 81 42 99 01 7c b5 f0 2c f6 9e | 45 a9 d9 81 d2 95 68 9f 5d 8d 05 3c e4 03 5d 3b | da 10 69 6b 96 bb 32 84 4d a3 95 1d 28 1b ff 6b | 19 0c 05 ab 9e ef 24 27 d9 f0 1e 4b 16 13 1f a0 | 29 00 00 24 33 52 d4 42 b8 04 6d 4f 2e 93 5c 6b | d5 ad 27 1e 92 59 33 28 c5 ae 5c 5e 96 b6 02 6f | 79 82 8d b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d f0 6f ab 99 46 a7 e5 85 41 6a 05 | cc 0a dd eb 9e 21 24 a7 00 00 00 1c 00 00 40 05 | fa 0b b1 80 18 a1 01 fe 64 98 07 58 ad c1 ac 04 | 2d 72 07 f3 | libevent_free: release ptr-libevent@0x7fb364059ad0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36402f780 | #563 spent 0.0788 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #563 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a70b10 | handling event EVENT_RETRANSMIT for parent state #562 | start processing: state #562 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #562 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #562 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #562 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.219172; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.921934 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36402f780 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #562 | libevent_malloc: new ptr-libevent@0x7fb364059ad0 size 128 "road-eastnet-nonat-57" #562: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #562) | d4 5a 4f 23 43 95 38 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 21 4a 80 72 e7 1e ab e4 a4 cc 6f ae 76 b4 17 | 66 86 d6 e9 31 54 d5 5a 28 1c 74 da 50 fb 86 f4 | 2e 76 50 d3 0d b0 af 0a dd f4 b7 13 30 20 64 87 | f2 f8 f7 5e 86 a8 52 97 05 ae 0d 56 79 b8 88 83 | df 4b 38 d8 fd 5a 52 6b 17 d7 11 45 fc b9 a4 96 | 35 56 c5 1b 74 b1 b1 3b 01 57 7f e0 6d fc 5d 6c | 21 86 9a 44 ea 45 b1 a1 05 01 3c 3a 83 6c a3 ec | 26 13 36 21 83 8a a9 26 0b 6b e0 0b 90 3b db 09 | 26 5d d6 57 a5 f5 d7 1c 5a ce 92 a1 4d 1b 39 ba | fe d1 57 2e c6 1d 0e d3 ee b4 63 0d c8 a5 b3 10 | 07 e3 b7 03 07 bc 65 1b bf b5 ed eb eb 53 36 51 | 4a 60 85 66 ce 2a ad 64 2e 22 1f f5 c7 e8 ab 8b | 56 4d 1b 92 82 89 69 60 5a 9e d6 65 67 5b 25 d6 | b0 fc eb ed e9 a5 d6 c8 1d 10 b2 22 0e 91 e4 cc | 73 60 02 ba 62 2c 96 2c 46 34 20 da c9 7c 01 9a | b8 13 b1 fa b1 0b 0a 18 a3 97 42 e9 48 2a 9a d0 | 29 00 00 24 95 d0 5a 24 13 c9 df 14 0f 8d ab 25 | 8b d1 7e e3 e1 dc 1c 56 c1 ea 4c 91 e9 f7 07 4a | 89 49 ff 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 58 19 cf a0 1f 48 f9 3e 3b 37 57 | fe 6c 89 3e e8 fd 27 9e 00 00 00 1c 00 00 40 05 | 73 2a d5 98 9e 00 e7 3f e4 c4 a7 88 fa 3d 90 0b | ae 11 e9 36 | libevent_free: release ptr-libevent@0x7fb3600778c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b10 | #562 spent 0.0643 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #562 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb340008e80 | handling event EVENT_RETRANSMIT for parent state #691 | start processing: state #691 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #691 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #691 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #691 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.21925; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.983719 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #691 | libevent_malloc: new ptr-libevent@0x7fb3600778c0 size 128 "road-eastnet-nonat-191" #691: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #691) | a9 9e 25 20 86 2a 5c 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 cc 4c ba 30 5c 6d 22 f8 82 c6 c0 8b 58 68 0c | 41 77 59 e0 2a af ff af d4 c1 41 cf 51 4a d3 e1 | 69 aa 30 d2 ed c6 c8 af 8b 3b 34 93 40 fa af 54 | 65 66 11 b2 ea ba 9d 66 6a 5a ef a5 37 12 11 a4 | d3 21 d0 69 7b e5 a1 d7 98 b5 f2 36 e1 00 9b 73 | 88 b5 57 a0 86 7c 2b 56 bc dd 7a 01 0a bc 7a c4 | 2c ad c5 8b 82 0a e6 1a c3 ec 8b 0c 66 1b 4c be | b1 76 b6 01 cd 33 2d 70 ab da 87 4d 5a 37 a3 30 | dd a8 b4 78 ad 30 76 5b 99 96 17 20 94 4a 1e ca | d4 40 82 a5 98 84 48 26 0c d9 76 15 4d af 29 c8 | b0 a4 e1 44 dc ac ff b7 ac 4a 18 e6 fc e7 a5 b6 | 38 f8 54 c8 63 11 e6 a6 35 0d a1 81 5f 34 c8 dc | 36 f2 0f de c7 04 d3 89 04 e3 b8 e2 42 51 11 b0 | e6 10 f4 77 1f be e8 81 80 19 27 1e 32 ff 6a d3 | 0d 11 66 8a 3a fc 43 14 97 86 65 03 41 1b 4f aa | 60 d5 5e c1 3c ab bd c7 a5 60 2a 06 6e f7 8b 5a | 29 00 00 24 d9 82 2d dc 7a db 9b 9e ba 51 3f f5 | 55 9b ca 46 49 e9 e1 bd e8 b3 c4 b1 15 49 3d a1 | c4 aa 80 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 10 f7 93 cc 33 bf de b8 46 14 d4 | f1 7c bb ef cf 7a 14 b3 00 00 00 1c 00 00 40 05 | 40 bb bb e0 02 00 28 d6 b3 fd 9b cd 5e 9e 97 d3 | 8a 95 58 8d | libevent_free: release ptr-libevent@0x7fb364075180 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340008e80 | #691 spent 0.0625 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #691 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374045e40 | handling event EVENT_RETRANSMIT for parent state #685 | start processing: state #685 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #685 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #685 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #685 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.219326; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.988028 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340008e80 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #685 | libevent_malloc: new ptr-libevent@0x7fb364075180 size 128 "road-eastnet-nonat-187" #685: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #685) | e0 29 5a 0a 61 0a 1e b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 44 4b 09 14 55 26 a3 28 d3 47 1b 88 52 58 95 | 5f 67 dd eb b6 51 c4 6d ea b3 00 9f 27 0b 9e 86 | 50 32 3f d4 ef 56 d1 52 a7 51 55 9e a4 19 c2 cd | 1e 12 55 b5 15 8f f3 d7 bc da 86 79 a9 47 70 73 | f8 8a e1 76 61 55 ae c7 2a a4 37 62 35 b1 6b fe | 4c 50 6c cb 7b 12 10 09 92 ba 26 a7 a4 fc db d0 | 2f 7e be 44 45 5c 46 c7 04 72 12 a2 3d 84 49 94 | 30 c8 bc 4f 39 25 a1 4f 16 a1 c2 1b 4e 22 be 72 | b8 4a 5d 48 29 a7 82 7c 4d bd 6f 13 50 85 ca c7 | ec 11 98 29 31 a8 99 3e 4e e5 4d 08 c2 a7 9d fe | cf 40 e8 27 e0 9b bd 71 82 7f 3e 26 24 fa b0 04 | c9 9b 4d f2 2b 42 eb 90 50 35 90 38 b0 1f 38 ac | 7a cd f0 e4 b8 ac 72 a9 0b b5 6f 4a 72 d7 7c cc | 36 87 5c ca 4d 87 f9 81 63 9f 68 fd 43 d9 83 b9 | 17 41 d8 dd 34 e0 30 6b e0 2b 70 c8 04 99 12 51 | 60 74 b0 27 54 ca d1 00 a3 92 7e ac 84 49 40 ce | 29 00 00 24 52 c9 db 03 45 a7 9c af 05 9f 92 28 | 17 af f8 90 e6 9b f5 88 0d 6e 51 b4 99 c6 1e db | 36 e3 9e 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 35 b6 5e eb 9e a1 93 4b 5b 44 61 | 9e 29 9b 50 f2 cb be a7 00 00 00 1c 00 00 40 05 | 8c 5a f2 f1 d8 0a f5 46 ba 17 5e 28 dd 6d 65 44 | db 19 d6 81 | libevent_free: release ptr-libevent@0x7fb36806fac0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374045e40 | #685 spent 0.0645 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #685 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aa5fc0 | handling event EVENT_RETRANSMIT for parent state #679 | start processing: state #679 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #679 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #679 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #679 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.219403; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.985406 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374045e40 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #679 | libevent_malloc: new ptr-libevent@0x7fb36806fac0 size 128 "road-eastnet-nonat-82" #679: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #679) | 21 46 75 e4 c0 e2 30 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 7f b6 62 3c af 4b 1e 98 70 97 3a c8 81 5f 8a | 6e d2 09 4c 84 07 55 d6 a3 fd c0 be 75 5d 07 47 | 8d 3f bb da a3 30 57 a0 7c a7 7f 2e cb 9d cc e7 | 13 3b 5b 3b c7 48 f1 bf 28 bc 38 67 c7 62 8b b6 | 69 be 87 f5 c0 9f f9 a6 02 9e 30 99 da 23 cc 90 | 1e 99 f2 9c f4 fc ed 48 2f 64 79 47 e2 b0 af cd | f7 a8 a4 46 c8 cb 84 62 97 96 25 40 61 19 15 7b | 98 2f 52 d4 70 b6 21 3c 7b e8 bd 11 c7 68 0b f4 | 1b 98 5d 51 c3 19 75 24 08 6b 1c 64 66 29 63 ef | 74 57 1e 26 8f e7 df a7 24 f3 96 46 d3 6a e1 e9 | d3 26 ea bf b7 66 e0 59 a8 f2 90 ba a8 33 d2 5f | aa 5b 61 86 8a 0d 9e 66 48 2c c3 e8 2d e4 2d 40 | 05 91 e1 60 c8 b5 52 b7 df 9b 2c ac 58 37 89 f0 | 51 8b 09 fc 89 ea 65 b5 1d 2a 49 4e 5e 19 42 75 | 54 34 97 85 69 00 2b 59 4b d5 43 ac d7 91 dc c1 | 3b 6a d7 05 fb bf e8 2b 60 16 3b e5 78 45 71 f5 | 29 00 00 24 64 67 4a b2 09 ea 77 4a 31 a5 f9 b8 | 14 17 60 f1 91 48 c2 5b e0 29 39 77 90 07 73 81 | d3 3a 3a da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 d2 62 af e1 8e 7e 27 97 6c fa 7b | 68 37 2f ee 47 da c3 0b 00 00 00 1c 00 00 40 05 | 9d 8c 01 86 03 b8 30 c8 80 85 c7 8b d6 c6 c7 00 | 6a 86 19 60 | libevent_free: release ptr-libevent@0x7fb354085700 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | #679 spent 0.0646 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #679 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #712 | start processing: state #712 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #712 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #712 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #712 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.21948; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.98668 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #712 | libevent_malloc: new ptr-libevent@0x7fb354085700 size 128 "road-eastnet-nonat-194" #712: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #712) | cc 56 db b7 23 55 ce 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 df 8d 7e 48 22 64 49 fb b5 e2 a2 dc b8 50 4b | ad 6c 59 bf 7f 2d 41 f4 f2 ce 30 80 51 45 ce 32 | 71 a3 c4 d8 bc a9 37 56 1f 5e b7 0b c3 7d 7a 94 | 96 5b f0 c5 d3 95 0b ab 37 3c 2b 1b 89 34 d4 8a | bb f5 48 cc ec 2c f3 5d b9 8c bf f8 d0 8a 72 43 | bc ac 8b 06 75 12 f2 db 3b 73 18 e9 5c ba e8 72 | fb a8 ce 9c c0 4b 82 4f 9a f1 5a af 77 31 0b 07 | 66 ce ea af be 31 11 ca a5 70 ec 43 3f c8 a2 17 | 44 95 1d 13 29 48 51 d8 f9 1e 06 a1 cf e1 54 e5 | 99 68 5c 3a da 63 33 ed 4d d2 25 dd 51 25 1a 08 | b9 43 e0 11 8e 0a 46 c6 51 cd 58 79 c0 d9 94 c1 | 9e 7d a5 08 99 f8 a7 56 cc 9a d6 3c c1 7c 79 1e | 4b 40 9d a4 b9 7f e5 00 44 51 bf e8 b1 5b 15 8c | eb 58 e0 f9 22 15 0c e8 84 6d 51 2a c6 4a aa 29 | 1e a4 72 7c 08 fa b1 ea d1 7f 66 aa 4d 4f fb 0c | fb 1b d3 9b f8 9a 00 a8 9d e6 49 e0 43 79 c6 38 | 29 00 00 24 22 6c a7 ec d0 85 2e 53 64 0e 79 9f | 11 86 be 1a d4 75 b2 6e 35 aa f3 7b be 0d d6 fa | a5 73 61 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 88 55 31 03 a8 f3 ca 6b 47 12 f6 | 0d 9b de 88 5f ca 38 91 00 00 00 1c 00 00 40 05 | 71 a5 54 81 8c 44 b1 23 48 73 5c a0 27 0f b9 ea | 05 8d 05 a3 | libevent_free: release ptr-libevent@0x7fb37c03e1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #712 spent 0.0625 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #712 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c012890 | handling event EVENT_RETRANSMIT for parent state #696 | start processing: state #696 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #696 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #696 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #696 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.219557; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.987667 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #696 | libevent_malloc: new ptr-libevent@0x7fb37c03e1a0 size 128 "road-eastnet-nonat-215" #696: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #696) | a2 ff 7d bb ae e4 ff 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 47 a3 9f 01 68 3e 72 d7 77 d8 40 15 bd 56 fc | 1d 68 27 b1 4e be b1 22 9a e8 2a ba 9c a8 46 6d | db 09 7f 12 fa eb 65 08 f4 c9 16 2a 9e 01 b4 17 | 36 05 7a c7 1f e8 46 bc c3 50 58 1c e8 e0 92 da | 73 ba 9e 07 48 d5 9d f2 d0 7b 6e ea 42 6c 81 be | 44 c8 4f 38 a9 d8 4a 5b 62 42 5a 19 4d aa 02 1b | 7c d7 6e f1 a3 07 60 f7 3c 4c ac ba 84 59 ee af | 37 a6 9c 4c 62 92 69 93 89 e7 42 99 74 73 cf 68 | 4f f7 d5 72 0b 6f cf f9 81 78 7b 57 1a 33 23 56 | a4 67 f3 6a 02 58 17 74 48 e2 79 13 e4 bc 15 ce | ff ef 49 6a 4b df 9e 1e 45 f6 1e 93 0d 6d 9f da | 4c 33 f1 96 ea 06 4e 73 51 f1 24 f3 0a 23 b8 4e | 17 12 5d ad 67 9f e9 c9 0e cc 9a 39 38 d0 df 99 | 31 b1 98 f8 83 61 7a c6 bb a0 15 87 10 f9 0e 97 | 6f 73 60 11 87 3c e2 c8 09 90 f8 eb e8 87 a3 83 | f4 d2 44 24 91 0c cf 33 42 d7 4c 2d 4e 98 eb 2a | 29 00 00 24 54 bc d8 ff 7e 29 53 5d f0 b1 9a ed | 1a 65 ef 6c 49 ab 64 6e a4 de ce bb aa 3e 57 0c | 70 a3 44 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 23 a0 ca af 8e 55 b3 fa 06 dd 4a | 8b f7 66 e0 0c 39 a9 54 00 00 00 1c 00 00 40 05 | e3 f3 b4 3a 4a 7c 3a c4 53 8f 78 d7 9c 55 fe 34 | 05 a1 fc 70 | libevent_free: release ptr-libevent@0x7fb36007fb40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012890 | #696 spent 0.0642 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #696 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0bf00 | handling event EVENT_RETRANSMIT for parent state #727 | start processing: state #727 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #727 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #727 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #727 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.219633; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.989903 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012890 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #727 | libevent_malloc: new ptr-libevent@0x7fb36007fb40 size 128 "road-eastnet-nonat-210" #727: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #727) | 8b be 7d ad 6e 47 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 ce c0 c2 e4 25 8d 86 08 cb bc 52 7c b3 ee 01 | 8f ba c4 6d 6c f4 6a 0f 46 b6 08 ec ce 35 fd 9c | a3 96 7a 4b 39 46 2f 87 e0 b3 24 68 bd 08 f7 00 | de fe bc 6e 99 53 33 72 6d 31 50 a8 3c bf 8e 11 | d1 0a 86 13 1f ce ce c3 0f e1 bc 5e 80 8e a2 d6 | 27 e8 f2 bf ec d9 e9 f3 3d aa 43 3a 6b 97 d5 34 | 59 78 15 39 b7 bd 30 ea b2 e1 44 a5 f8 e8 38 86 | 54 db 07 6a ef ad cc 3a 56 0e d2 27 fb 2a 77 ba | 36 51 b8 10 07 62 d5 90 4d ca 0a 32 87 1d ce b4 | 7e 83 81 e7 d9 b6 8e 25 b8 6b 2b 0c cf a3 60 19 | e6 bb d6 4e 72 2e 81 71 f8 13 f2 9a 9e d8 eb 8f | a8 36 ae 05 81 aa e7 46 61 6c 3f 81 1b 7b cf f6 | 87 cb 65 20 06 d0 84 24 80 2e 3a 60 fb 99 c3 62 | 5a 0a 79 d7 36 6c 19 82 db 33 f0 6e 27 96 59 38 | 58 4d f2 ec c1 c1 e4 2b e2 58 27 a6 55 42 ca 3e | 3f c8 1e 9e 7e b4 88 cc 40 5e 23 e7 74 a8 91 f7 | 29 00 00 24 64 58 e5 0d 0a 27 42 8e 74 e9 35 15 | 5e 05 1e ab 85 d6 6f 92 8b 8b 06 7e e2 32 18 1f | 9e 03 0b 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 71 5b 13 d9 03 56 0b 94 2e 9b 60 60 | d4 0c 9d 62 4a 5b 9a a3 00 00 00 1c 00 00 40 05 | 8c 55 6f f9 09 4d e0 77 bd 22 46 44 fb 95 c0 d9 | 83 9d 9f 2c | libevent_free: release ptr-libevent@0x7fb3840899b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf00 | #727 spent 0.0634 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #727 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35804b810 | handling event EVENT_RETRANSMIT for parent state #753 | start processing: state #753 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #753 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #753 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #753 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.219709; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.0028 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf00 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #753 | libevent_malloc: new ptr-libevent@0x7fb3840899b0 size 128 "road-eastnet-nonat-239" #753: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #753) | 43 c3 80 a5 94 99 7d 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 27 47 4f 05 d7 25 44 75 00 7a 90 57 67 26 e6 | 4d 97 9a 3a 60 21 e1 3d 90 71 67 27 3f 0b 49 6f | 1f b9 14 a1 8d 44 a6 76 24 f5 5a 9b 38 e3 12 49 | 11 3f dc 63 03 09 74 e9 a3 fd bb ce e7 70 f7 c2 | 6f 48 fd aa a3 1f e4 78 8b 40 4d df 11 7a 5a 41 | 45 11 21 74 d6 a5 c3 8b e5 8d 1b 68 d2 3a 6c e4 | 4f c3 5b 65 f5 0b 4f 3e 67 74 c2 72 3e 15 1b 5a | 2f b9 67 d7 f7 97 99 68 80 00 34 be 80 97 46 a2 | f2 cd e6 d7 21 ff f7 0a 95 ea 80 3d 17 5e e5 f1 | 89 b6 3a 1b 19 7c 6d e2 e2 ac e0 e8 87 47 58 ca | a8 a9 57 8a 48 7a 5e 0e 07 ed 18 d0 02 cd 41 6c | 99 f9 79 7c 54 75 6a 80 aa be 2c 8d 68 e7 ab 46 | 5f fa db 7a 00 15 1c 42 38 2a 95 67 34 d0 40 37 | 9e 59 6e ca ce 71 f9 73 95 33 d2 33 24 16 10 d6 | 96 f4 6d 66 ce ae 39 a5 a8 ba 67 7b 0b a7 ec 5c | a5 f0 ea d0 7f ca a2 d9 1f b6 4d c8 4d 24 52 7e | 29 00 00 24 34 e1 23 83 89 3a 65 73 17 62 dd 52 | 41 3d 56 39 99 39 6a 46 38 cd 4e b8 6d 94 84 4d | ae 2e 5a 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 f8 fd 21 17 cf ca 15 a9 8c 89 3d | e7 2c 90 ae 74 d6 49 28 00 00 00 1c 00 00 40 05 | a9 e3 cd d3 57 ef 23 72 b9 af 19 fe 36 9b 4d 39 | 12 5f e6 9a | libevent_free: release ptr-libevent@0x7fb33804e7a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35804b810 | #753 spent 0.0639 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #753 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3400296b0 | handling event EVENT_RETRANSMIT for parent state #656 | start processing: state #656 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #656 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #656 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #656 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.219786; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00534 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35804b810 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #656 | libevent_malloc: new ptr-libevent@0x7fb33804e7a0 size 128 "road-eastnet-nonat-192" #656: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #656) | be 68 21 bf 92 3b bd 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 52 43 e7 61 15 4a 4d ee d7 b2 46 b1 85 1b a8 | b0 82 1f 54 6e 3d 86 2c 4c 72 1b be 1a c9 a9 49 | 93 8b d8 d1 12 52 c1 d1 1e 66 c4 3c 2c ea d7 98 | 75 c0 9a ec 39 77 d3 3f fe 5e 4c e6 42 6d 23 4b | 2b 34 b7 11 db 87 07 d3 52 60 5a 9e 7c 2c 5b ef | e6 f9 73 5c 0b ba ad d6 fe 16 9c 1f 42 85 0a 3f | c6 40 77 bd 69 5b 49 0e 03 f8 b5 a7 44 3d 92 3e | b6 3c 8b 69 c2 36 24 58 2e fe e4 2e cf 17 66 89 | 17 19 74 fd 9e 82 52 41 e1 84 14 f6 da 40 64 3c | 7a 18 7c f9 1c fa fc 3d 2b ab c7 81 6b 75 f7 02 | 62 8e a6 13 db 23 45 dd 44 71 ff f8 9b 82 f6 c5 | 35 8a a4 69 84 07 45 3b 4e 8e cf 28 a8 c7 ed c8 | 24 90 fd dc c5 ab 7f aa 2d f3 14 d8 aa c0 01 da | 83 71 b8 3c 0a d2 2e f1 89 59 c1 75 b8 ab ca f6 | ed 19 86 32 78 7f f4 7b 8d e8 39 01 f8 23 b7 bf | d8 41 df 63 27 75 88 7d 0c 1a d0 05 c1 b6 21 63 | 29 00 00 24 da a6 76 b3 cd d9 ef 6f 78 db 6d a7 | 41 9d 1a c1 02 ed b1 b4 d8 5e 1d cc 04 ae df b0 | fa 18 8b a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 b6 14 c8 78 3e 8b 14 79 86 4e 98 | ba 1c aa fd 49 33 32 6e 00 00 00 1c 00 00 40 05 | ec b2 52 19 30 c6 85 07 d9 5c 18 07 e7 c7 94 94 | 67 61 43 b0 | libevent_free: release ptr-libevent@0x7fb35c07fb40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3400296b0 | #656 spent 0.0623 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #656 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38000a290 | handling event EVENT_RETRANSMIT for parent state #621 | start processing: state #621 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #621 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #621 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #621 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.219862; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.9633 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3400296b0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #621 | libevent_malloc: new ptr-libevent@0x7fb35c07fb40 size 128 "road-eastnet-nonat-53" #621: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #621) | b6 7b 13 e2 c1 f5 0d 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 57 84 d5 d7 fc 7b 03 ac 28 bd 55 7a cb 22 6d | 15 db d6 6e 10 22 25 dd 22 f0 db b6 64 1a 8e 62 | 37 1c 3c 87 76 d4 16 13 a1 20 70 51 e2 6c 88 a7 | 4c bd 9a e8 61 13 5b 96 2a 3a 11 b0 00 e4 41 12 | 45 a6 ec a4 25 97 e4 d4 fc 34 77 25 f0 6b ee ea | aa 50 40 a4 2e a8 4f 01 2d e4 44 bf 36 fc 59 62 | 62 e1 29 8a f9 0d 17 54 2b f3 92 0f 3e c7 98 e1 | c4 70 f5 a6 ce c1 0a 42 4d c9 8d ad 7d 6f 21 10 | 8c 9b 74 c6 74 d4 11 03 3c b2 a3 0a ef 7e 1b 84 | d0 6a 92 26 b5 27 71 3a d1 01 ed b9 54 c4 f1 85 | 17 24 83 a6 8f c1 1c 28 cf 64 6e 6b dc 51 3c 81 | 4c 28 f4 1b 29 ea f8 d0 93 36 3e 3f 53 a9 9f e5 | bd 65 1d 28 4d 88 e0 98 81 13 8e db f8 e2 17 a6 | 46 27 e5 1e a7 24 77 68 b9 82 43 d4 94 92 10 37 | d7 3f 29 86 6b cb 84 f7 07 f1 63 aa a8 fc 4a 8a | 7a c7 2e 35 5c f7 6f 1e 13 8c ec d2 d0 0f 26 77 | 29 00 00 24 61 45 c6 88 ed ea 89 96 4e e2 8d aa | 07 4f da 3d da b9 b5 f4 0f 2b 6b 58 d6 df 11 d3 | 2e b8 7b 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 1f a9 4a 68 19 c5 3d 06 56 c4 a1 | 6a 2d 5d 6d af 09 97 90 00 00 00 1c 00 00 40 05 | 1d 2c b3 00 93 4a 54 e7 e8 53 57 b8 b6 97 f8 d9 | 75 4e f7 33 | libevent_free: release ptr-libevent@0x7fb35c0aba40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000a290 | #621 spent 0.0634 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #621 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46abd200 | handling event EVENT_RETRANSMIT for parent state #626 | start processing: state #626 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #626 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #626 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #626 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.219938; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.956622 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000a290 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #626 | libevent_malloc: new ptr-libevent@0x7fb35c0aba40 size 128 "road-eastnet-nonat-26" #626: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #626) | 0f ed 5a cf 38 b1 e8 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 3d 6d be e1 b5 e5 c2 d3 2d 01 3e 44 32 8c 9c | 10 07 5b 6c ed c7 1e e0 bd ad 91 2f 7b 5d 66 20 | 1d 49 29 0a fe 5e e1 41 fd 2d 5b db 26 a9 35 00 | 65 10 cd fe cb 24 75 0b 38 a9 17 e0 c9 9c 32 cb | ac ed eb dc 28 55 86 03 cf 0a 73 6f 60 bd ce 34 | 02 6e 30 12 0b ea e0 d6 3e 1e 3f d8 09 a2 8f c4 | 00 8b 17 ad 6b dd 80 3e bb 4b 55 43 c0 01 45 68 | b9 d4 1f bb e9 85 dd cd 2e 4a b1 73 0f d3 cf 35 | 1d cc 81 40 9d 5a 89 f7 17 97 eb a9 9b ce d0 7a | ea fd d9 8a 75 55 14 06 7b b5 ea a1 d4 df 99 7f | 7d 44 5a 7b dd bb 03 bd 83 27 4b ff 5b 0a f8 f1 | 3f f3 6c 7e 81 c9 48 54 92 25 5a 38 2f 94 66 d9 | 09 f1 fc 50 b6 b8 4b c6 01 00 9b 5c de e0 c2 70 | 94 49 cd f6 f0 cd 84 42 37 97 4f aa 99 fe a6 85 | 3a 90 6e ce b7 01 23 71 2b b5 63 d7 be 2a b7 f7 | e5 82 55 b8 36 c2 c8 94 47 53 1e 97 b8 37 e2 29 | 29 00 00 24 a0 8c 77 90 d5 d1 0c 21 bb 3d 18 0e | 18 70 42 64 dc 36 73 88 d4 b3 3a 38 9b f1 00 e0 | 74 bb 2e 48 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e0 58 91 0c 95 19 f3 97 a9 04 fb bb | 0f b6 c3 16 e5 5e 65 45 00 00 00 1c 00 00 40 05 | 89 d2 55 f5 43 aa 76 28 9c 2b e8 f0 be 0a 82 5c | 11 ab 36 f1 | libevent_free: release ptr-libevent@0x7fb35c08ab00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abd200 | #626 spent 0.0644 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #626 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348048a60 | handling event EVENT_RETRANSMIT for parent state #638 | start processing: state #638 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #638 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #638 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #638 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.220015; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.953979 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abd200 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #638 | libevent_malloc: new ptr-libevent@0x7fb35c08ab00 size 128 "road-eastnet-nonat-218" #638: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #638) | 73 d4 45 41 ab fb 7a 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 9f 1b 03 84 82 35 ff 90 4c 0e e1 4d 63 0b 6e | 25 67 96 c9 b1 5e 9f d5 99 08 91 8b 97 07 16 15 | 0c e8 b6 79 cd d7 bc dc 55 ef e3 4b 14 16 41 5b | 40 76 1a 52 cc c5 af e0 d7 43 e0 3e 6a bb f6 6e | 3a bb da 36 77 2b a1 fe af 56 c4 df 62 b3 73 b9 | 52 c1 55 25 5c 52 48 e6 3a 7b f7 12 bf 50 3d 13 | 60 2e 98 52 d5 09 1c 91 b8 c2 de 2d 7f f1 06 b2 | 39 09 03 76 3e 48 2f e6 27 f7 a9 1d 29 27 2e f9 | 47 87 5e 4a 7f 25 ff 26 1e 80 23 47 3f 0d 0c 05 | c8 27 d3 ed 98 ba 35 8c d3 ea 22 73 97 01 a0 d4 | fe 01 e2 3a 2d fc 4d bf 2f 53 eb 87 c3 5c 58 ef | 04 26 0a 51 13 2d 57 56 6a 69 f2 77 0e e6 3d 17 | 34 db d2 58 e6 ef 99 7a a5 d2 4f c6 f1 d6 ee ce | b8 69 1a 6d d5 e4 12 01 a4 1e 43 89 0e 61 2a 78 | 44 0b 0b bb 93 59 d9 ea 7a 2e 42 02 8d af be c7 | d3 84 14 a0 3f f3 e5 9f b7 c2 2d 2a 24 01 b0 1c | 29 00 00 24 5e 9d 7c 45 0d ec 13 66 03 bc 86 eb | df 18 53 02 81 01 d0 ca be 7b d0 08 90 a7 74 72 | 28 4f b9 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 c4 2c 70 3a 67 17 0b be 99 22 e3 | 81 fa d7 92 68 76 9e 84 00 00 00 1c 00 00 40 05 | 70 aa ac 05 74 24 54 28 15 1e a7 7e 64 95 2b b7 | 84 55 48 79 | libevent_free: release ptr-libevent@0x7fb36c0751d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348048a60 | #638 spent 0.0817 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #638 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb344018460 | handling event EVENT_RETRANSMIT for parent state #644 | start processing: state #644 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #644 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #644 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #644 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.220127; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.960087 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348048a60 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #644 | libevent_malloc: new ptr-libevent@0x7fb36c0751d0 size 128 "road-eastnet-nonat-163" #644: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #644) | 50 de 2b d7 45 9f 26 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 58 93 d0 7f 41 ad 9d b7 03 dd f8 2a ea 2a 42 | 44 8c 71 98 4a 47 c1 c5 90 95 76 04 f2 e5 ad 38 | 71 44 ae 3b fb f2 49 7c 10 82 5e 78 55 e4 fb 2f | 3e 12 c9 6c 92 13 53 cb a3 12 6e fd 1b cd fb ca | 7e e6 47 e7 44 cb 81 71 95 37 b6 d0 7a dd 37 46 | 29 e1 76 40 93 0a 7f 82 5a ad 56 83 a4 e6 22 95 | 73 81 6b 3d a5 ef 7e 2a a9 63 f6 f5 16 dd ca 4d | c5 1a 4a 2e 98 5c be 8f b6 36 37 ca c3 60 91 97 | 68 91 c7 05 a2 20 36 57 76 46 a3 b4 57 65 a3 ec | 60 30 bd 82 e8 5f 09 bf c2 16 53 69 e8 db b3 20 | f1 da 51 a7 b7 44 97 86 b5 cf 77 2d 02 b0 fe f9 | 34 93 f6 86 2f ca 83 a6 a7 79 8c 3f 79 49 ae 69 | 69 fc a1 aa 7d 95 b3 6d 7c 9b 21 a7 a7 f1 27 5d | 6b 90 30 cd 14 fd ee 1b 3c 9c b0 26 4f ac 21 a1 | 51 5e fd f8 e8 96 a5 84 c9 1e 4d dc 41 f5 73 29 | 85 06 8a 87 3f 53 f8 64 7e 9c bd 99 b9 0a 9a 0b | 29 00 00 24 e5 0f d1 27 d8 cf bc 47 ad 96 17 e8 | c3 9b 62 84 21 4e 76 3c 4d 7e 36 68 8b 66 54 7f | 11 87 3d b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 d8 9d 5e e4 7d bf 65 2d f1 4a b5 | c7 e2 e6 55 b9 27 ad 86 00 00 00 1c 00 00 40 05 | e7 08 aa 38 d2 e0 0f 7f 77 98 72 12 74 ed 7d 4c | e8 75 c4 3e | libevent_free: release ptr-libevent@0x7fb37406a110 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344018460 | #644 spent 0.0758 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #644 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a82ac0 | handling event EVENT_RETRANSMIT for parent state #670 | start processing: state #670 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #670 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #670 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #670 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.220203; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.965187 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #670 | libevent_malloc: new ptr-libevent@0x7fb37406a110 size 128 "road-eastnet-nonat-147" #670: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #670) | 8a 10 9e 23 ac da 71 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 59 15 67 28 ca 74 92 de a7 0b d2 ca 9e 31 ff | 0c ec 66 70 2f 96 5c db 29 7a 94 be b4 fb 91 94 | 6c 4c 82 7b 86 7c 4d 04 fa 97 64 03 7c 61 e6 12 | 7b e8 77 6d ef fc 86 73 90 13 0d e6 78 93 c2 a1 | 62 6c 65 c0 8c 1c 5e 39 e1 34 37 c6 58 5b a5 b2 | 83 26 7c 7e 1f 15 94 64 d1 51 32 90 eb a2 33 51 | b8 56 2a 0b 53 1e d3 ca 3b f5 15 ad 3c b3 c4 4c | 87 79 a4 dd de 1d 17 0c ed 28 be 3d 53 69 9f d4 | 92 6d e1 f9 c4 1e 3a 32 bc b5 0d 47 92 45 39 27 | 1c 6a ba 31 af 07 5a 8a c7 08 ef d0 d2 ac e7 93 | 58 56 5f 1a 54 44 df 61 16 7f bc 43 53 9a 9f f7 | 61 eb 19 48 e1 7b e1 df c1 5a 57 0c d3 a6 a2 ce | ce 01 4a 92 1b ce bd be 46 3d c9 04 aa 1c 6a 49 | 39 9e c5 e0 23 32 61 54 07 62 70 d6 2b 4f 7f 12 | 86 15 e1 c4 88 04 21 da 99 53 13 ca 40 af d4 cd | 0a f5 d7 88 c1 11 17 a1 77 d9 81 26 5a b2 1e b7 | 29 00 00 24 f3 83 7b 0d 72 75 fb 36 6b 70 51 59 | c6 93 d9 98 17 c4 71 7c 93 e7 e0 bd 2f bb ee cf | 0d 5e df 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 a9 e0 bc 70 aa 03 d2 53 d4 71 04 | 68 97 96 57 88 52 67 34 00 00 00 1c 00 00 40 05 | a6 13 8e aa 70 35 17 a1 68 a2 7c 6b 1f 0d 90 7b | a6 27 3d 24 | libevent_free: release ptr-libevent@0x7fb35007d2f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a82ac0 | #670 spent 0.0642 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #670 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a34e10 | handling event EVENT_RETRANSMIT for parent state #647 | start processing: state #647 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #647 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #647 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #647 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.220279; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.961806 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a82ac0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #647 | libevent_malloc: new ptr-libevent@0x7fb35007d2f0 size 128 "road-eastnet-nonat-206" #647: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #647) | a9 15 25 50 c3 89 9b ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 0f 1a 9b c2 c1 27 9f 86 de 54 44 d0 24 9d 6a | 45 ee aa 3d 9a 82 6c cc 7f 5a 10 2c 59 c9 22 f3 | 34 55 04 3d 8b 40 f1 78 07 5b 1e 30 68 89 14 97 | bb 5f 4d f3 15 66 be e0 4a d0 41 bd 55 74 f7 a1 | 6b 5c c4 02 57 e6 80 ea 7f cb 60 fd b8 98 71 32 | 6d 87 75 4e 58 e3 ec cc 2e d4 bc 64 e8 77 a7 a9 | 8d 8d 5b 9b 51 d9 37 9c 0c 0c 7a 22 96 b8 a2 26 | 89 d0 75 ed e8 65 8b fc 2a 83 34 29 39 47 fd c0 | 22 02 dc 03 48 eb ab 15 4b 4d ed b4 52 db 67 35 | cc 06 96 a5 b0 73 95 a7 9a 74 43 21 02 98 b3 07 | be a3 dc 76 24 de e8 96 45 29 b9 08 2b da 6c 70 | 45 74 38 4c 76 73 8d c4 3a 57 9d 7d bc 8c cb 79 | 70 0a 09 47 dc 14 98 38 75 a6 25 2e 9f 4a b1 fc | b8 6d 3f 57 fc c2 a2 48 3b 42 ab 67 ad f1 0d 72 | 8a d2 0f 62 dc 08 25 a1 63 8c 91 4c 28 7e 0a 45 | 95 7c 48 d3 57 c8 ca 2a 17 b1 f3 78 10 3b a0 11 | 29 00 00 24 25 47 22 11 f3 7d 2a 09 ec 1c bc 5b | ea d8 0a 15 cd 9d 69 8e 1e b3 ca b8 a6 0d 22 5d | 28 7b af f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 3c 41 1d 92 d7 b9 38 bc 5b eb cb | 32 90 40 77 f1 b7 dd e6 00 00 00 1c 00 00 40 05 | 63 f4 fa ff 4d 8b 5a 8c fe ca 58 3f 4d 61 7e 87 | 43 3e 7c 36 | libevent_free: release ptr-libevent@0x7fb358064ae0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a34e10 | #647 spent 0.0652 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #647 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0d4c0 | handling event EVENT_RETRANSMIT for parent state #650 | start processing: state #650 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #650 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #650 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #650 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.220358; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.960623 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a34e10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #650 | libevent_malloc: new ptr-libevent@0x7fb358064ae0 size 128 "road-eastnet-nonat-151" #650: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #650) | 26 33 64 e2 99 22 09 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 93 4c 52 2e 07 4f ef fc d7 92 1e c1 ca 14 b7 | f7 a3 82 0b 5f f6 91 b4 15 5e 90 95 7d d0 45 ef | 21 f3 08 0e 7d 26 87 e7 ea 79 d3 33 07 49 ba 68 | da fd 2d dc e8 dd 8d 3d ac 78 0b 31 13 b9 60 52 | d8 60 ef 09 61 af 9d f6 ad 76 cd b0 e6 c4 55 10 | bd 0c b1 58 60 30 af 2c 0e 52 bd 65 9f d0 54 d8 | 5a 2b 21 18 f2 c5 71 a2 0d 15 04 b5 4a 32 ae 9c | 02 2e d4 e0 51 8d 8d 22 83 86 fa d5 f5 1f fc cb | 75 6f de 7a e7 e1 af 25 29 c0 d8 e2 f6 b9 34 b5 | d7 7a c3 1e c4 99 5b 0e ca 76 77 7c f5 a8 a5 87 | 30 0e 18 1b 81 0a 94 65 85 20 c1 1d 31 6e b8 8b | eb 6c f5 b0 86 38 4d 10 0a 4a e9 45 4a d4 02 3f | 74 10 5c 24 6e 73 2d b5 cc 00 a0 c3 3c 0c 0d 0a | 48 d3 1b d4 4e a5 c6 45 3d 90 e1 3d 46 6f 68 4d | 0c c4 d4 2f a5 c5 02 ab af a2 e9 3b 3f ee 3a b5 | a7 5d 9e 2b da 84 df d1 c6 3f 08 db f2 d2 d5 c6 | 29 00 00 24 8d dc df 0c e8 8a 00 84 45 9e d1 82 | 39 c0 aa 62 4b 5e c0 9d 6f b9 50 ba 59 33 ad 5d | 19 94 ea 3d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 84 a4 74 25 14 10 fd bf 0a 02 29 | 25 c7 89 ed 1e 29 a1 0f 00 00 00 1c 00 00 40 05 | 9b 4c 2f e4 b9 53 6d ef 7d 4f cc 27 24 fe f9 f6 | 0b 9e 9f 60 | libevent_free: release ptr-libevent@0x7fb388075630 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | #650 spent 0.0626 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #650 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388015720 | handling event EVENT_RETRANSMIT for parent state #612 | start processing: state #612 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #612 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #612 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #612 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.220434; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.961005 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #612 | libevent_malloc: new ptr-libevent@0x7fb388075630 size 128 "road-eastnet-nonat-73" #612: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #612) | 06 13 d7 c6 41 b2 86 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 8d f1 f4 22 24 65 49 2a a6 70 28 29 5c 96 09 | 3e 1e 78 f6 de 7f d4 6d 8f 70 0c e4 5b aa e7 34 | 60 3a b8 ce 9c c3 f2 55 c4 78 5c 37 a6 84 38 22 | 93 67 fa f8 c2 df 15 e3 9e 8e 26 44 fc e4 fa 8f | 57 f5 49 ed 86 e7 16 45 96 6d 10 ea 0c 90 8a 31 | e9 a7 90 56 ec d2 20 8b 2a b3 08 b3 f3 33 e4 7b | 20 92 e0 01 19 6d 6c ce 7a bf 9a 7b 89 9f 35 9e | 58 9d d3 ad 5b d8 c7 e9 b8 71 4b f7 a5 1c ea 1a | cc c7 49 f3 04 3d 6a 30 5e 5f 6e 57 b4 d0 06 19 | df 2d c3 be a9 ad 0b 91 01 58 72 3d a2 3a 97 fa | 3b 4f d0 1f 09 3f ec 9c 6a 4d ad a3 d7 03 7d fb | fd d5 f6 df 9c 11 0f 03 14 5d 5b e8 e8 f0 46 2d | 46 0e 42 78 aa d4 b4 d3 de c9 9d 1d a1 10 3b 2b | 48 75 16 7b f6 27 2f 9d 63 b1 ad df dc bd c2 01 | 65 a8 1f 4c aa c7 7b 56 c8 5f 06 1e bb 73 93 0a | 1f 90 b0 df 46 4d 2e 1e af 83 bf da a6 c2 4b 21 | 29 00 00 24 14 45 39 c3 b2 be 10 35 86 8a 8d fa | 46 03 d4 c9 b6 c1 c2 c0 bf 3c af 6e ab be 7e b7 | 9a 44 cd df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bc 94 44 11 03 fc a1 a4 72 04 35 93 | 3e a4 98 88 8e 5c 65 1b 00 00 00 1c 00 00 40 05 | 24 c4 24 16 66 f3 44 ba aa f9 26 a7 a0 53 d9 b2 | 41 97 1c a3 | libevent_free: release ptr-libevent@0x7fb38806fe50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388015720 | #612 spent 0.0641 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #612 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #649 | start processing: state #649 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #649 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #649 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #649 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.22051; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.958931 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388015720 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #649 | libevent_malloc: new ptr-libevent@0x7fb38806fe50 size 128 "road-eastnet-nonat-204" #649: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #649) | b6 55 6c 1f f7 96 4e 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 49 68 33 ac be 3a f7 9a 60 a1 54 2b 3b a3 9a | 16 92 52 84 04 b4 d7 16 0c 6d 09 72 cc 2b 60 d8 | 6a 97 99 35 6d bf d4 59 5a c6 db 05 04 50 9f 26 | d5 31 65 a2 a6 90 1f 44 a8 51 46 ef b2 3c 2c 17 | 9a 67 6e 63 13 be de f4 ea 50 37 0c 4c b7 bb 87 | 98 eb a2 d7 94 7a 4d 7c 27 23 c5 c1 14 ac 3a 62 | e3 9e cb 8b a8 b2 7e 85 7f 34 7f d2 53 2b 7f 26 | 9b a4 79 e8 f1 d9 12 1a 3f 7d 7b 73 7f 6a 3b d4 | c7 66 51 af 5f d5 da 98 4b bc 29 01 fc a4 53 53 | c1 e3 c9 29 b1 bd f6 9f 07 80 98 0d 7a 85 07 72 | 29 6b 03 79 c5 1e 41 20 d9 9a b8 86 af 78 fe 58 | 1c d3 ff 44 d3 cc a9 5e 28 25 58 79 53 d0 f5 40 | f8 b2 e5 1b 4e 35 7b 57 c9 98 34 61 e5 1c c6 ce | 01 23 71 88 e2 7b b5 18 09 23 c9 7f 18 e2 56 40 | 07 80 69 13 04 69 8a 54 da d5 46 08 93 8e 42 66 | 37 5b 93 f3 15 98 7b 1b b4 dd 60 45 36 75 a9 82 | 29 00 00 24 d9 9b fe 1b 9a 3b e2 af fd 5f 29 c3 | a1 c2 66 f4 bb f2 c2 62 37 18 46 4f 44 68 ce 27 | ad 06 31 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e f0 1f cb 60 f7 fc 56 dd ae 47 e3 | bc 0d f0 9c f1 a6 a0 90 00 00 00 1c 00 00 40 05 | 55 71 01 83 1b 1f 6e 2c 68 ca 2f 55 56 93 29 8e | bc e1 a4 22 | libevent_free: release ptr-libevent@0x7fb33806f750 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #649 spent 0.0639 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #649 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37404b580 | handling event EVENT_RETRANSMIT for parent state #623 | start processing: state #623 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #623 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #623 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #623 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.220587; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.955323 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #623 | libevent_malloc: new ptr-libevent@0x7fb33806f750 size 128 "road-eastnet-nonat-67" #623: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #623) | b9 b9 92 a4 ec 38 7b b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 f3 7e e2 e6 f9 2a f9 d0 93 e1 a3 9d fe 74 ed | 88 55 53 55 78 91 02 79 67 05 d4 47 b7 41 b9 fb | f1 19 18 33 40 a4 b0 8c 32 db 0a 07 ba 07 01 e9 | c8 5e e2 aa 5a fe 73 d0 43 82 cf ee 31 82 b6 b2 | 5e df 34 0e 42 bf b6 f1 fd 55 a4 d8 49 96 21 84 | cd ec 4d 1b 66 59 11 58 1d 4a a6 2b 86 62 43 39 | e7 71 28 21 32 2a 5c 6b 41 1f 1e a1 24 a8 7e 32 | 23 86 5c 25 2e 71 70 af 02 5f a8 b3 61 f2 41 fc | a5 63 0a e6 65 ef d6 7d ab cd 41 94 d7 f5 1e 6e | a4 d7 27 bd 30 b8 2b ed e0 66 d7 7a 3c 2f 83 9d | 91 91 64 73 8a 4d c2 67 18 5a 11 fb bf 8d de 21 | 74 5c 7d bc ae 43 a1 bb 17 7c c3 68 7a 37 86 6e | 83 ca 1f a2 33 23 44 69 5a e6 2e 90 79 83 57 19 | ae e4 1d fa 01 cf 8b fb 73 b3 e0 fb f2 40 fe 50 | 44 65 ee e2 51 df 47 88 22 c7 4a bb 66 b3 7d db | 0b 53 67 9b 7e 51 76 d3 fd f7 82 53 9e be b5 ff | 29 00 00 24 6f 2c b0 62 51 9d 8c 96 be a1 aa 9b | 8b d2 a8 77 e2 d2 a6 95 67 e0 34 a3 2d 5d ad 37 | 32 20 86 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a8 14 ee 41 a8 c3 e5 2e 90 58 14 8d | 5a f6 f4 40 9d 72 d9 2f 00 00 00 1c 00 00 40 05 | c6 f2 3a 3c 4a 40 8a 12 05 e3 0f 64 13 e4 22 0b | ff 8f 1a ac | libevent_free: release ptr-libevent@0x7fb38807ae10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37404b580 | #623 spent 0.0637 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #623 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b24680 | handling event EVENT_RETRANSMIT for parent state #671 | start processing: state #671 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #671 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #671 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #671 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.220658; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.967191 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37404b580 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #671 | libevent_malloc: new ptr-libevent@0x7fb38807ae10 size 128 "road-eastnet-nonat-184" #671: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #671) | 1d 22 92 7a 9f 62 65 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 2c 7e 91 0a 22 90 c2 45 ac 5c be 32 c1 2c 12 | 60 a0 27 f2 55 e3 d1 89 c8 99 22 25 59 aa a7 04 | 17 46 2e ba 00 09 b9 71 47 e5 94 f1 fd 69 0a 57 | 38 00 5b 86 84 a5 d3 6a b3 9c 35 a1 da c4 1c 25 | 30 41 58 88 f1 bf 1e cf 5a 7d fb 1d 85 56 82 39 | 48 55 e9 bc e2 cf e9 2c 33 f4 34 3c 90 b2 b4 75 | 55 ca c1 69 86 54 f4 e5 53 67 e4 36 3b 66 24 10 | f0 0c b4 a6 bf 13 a9 41 25 2d 85 e0 59 37 ea 35 | d2 8a c7 72 04 28 dd 8d 9b 4e ca cb e3 07 69 b0 | 38 54 bb b4 47 09 ee 08 0f 47 c5 fd 50 05 d7 4c | 28 db 90 75 c2 2f 8c 55 54 db d4 30 5e b3 32 4e | 8c 3b 51 5c d3 59 a0 69 16 c0 1d 8a fe c4 69 9c | 6b 52 61 76 6f 1f 1d 99 1f 0b 05 d3 73 0a d9 48 | 53 6d fb ef 5d b9 22 d3 44 19 94 f4 70 f2 9d 04 | d7 54 79 2f 9c a0 ae 3d d3 fe 22 0d 74 1b 5b cc | e2 cd 80 63 5d 5b 97 5a 19 0e 2c 9e 2b 0b 57 7c | 29 00 00 24 89 d7 93 c3 18 08 d5 d6 83 2a 2a be | a0 ca 86 6f 9a 4f 6b 29 8c ce f9 83 c0 a5 93 03 | 8e 0f 90 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 a9 60 fe 19 43 95 a6 13 de 16 7a | 81 94 84 c9 e7 e2 6b 0c 00 00 00 1c 00 00 40 05 | 81 51 61 ea 37 80 54 96 3e ae 81 da 9c ed 39 03 | 67 8c 30 56 | libevent_free: release ptr-libevent@0x7fb354074f60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24680 | #671 spent 0.0615 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #671 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb338018460 | handling event EVENT_RETRANSMIT for parent state #629 | start processing: state #629 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #629 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #629 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #629 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.220727; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.972856 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24680 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #629 | libevent_malloc: new ptr-libevent@0x7fb354074f60 size 128 "road-eastnet-nonat-71" #629: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #629) | f2 94 01 51 22 3f af b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 4a 7c e2 24 38 23 63 44 71 d0 61 ed e2 db 72 | e6 61 bd 05 9a 47 1a a4 e0 bf e2 b3 38 98 dc f5 | a8 2e 85 9f 39 94 94 de 61 d4 d7 e0 6f d5 4b c2 | 89 35 8a 19 c0 0b 46 04 61 a9 d7 30 7b 04 fc 12 | e6 01 83 16 c3 75 c5 9f 9a cc 41 f6 3c df 59 2a | 0f 08 5d 35 9a ce e8 c9 26 c7 0c bd a0 e0 6f e3 | 48 c7 a8 ee 4f b3 e6 8c bc 55 d6 31 9f e3 ee e7 | f2 e1 44 07 35 ec 7f 8d d3 6c 7c 13 76 3d eb f9 | d5 7d 76 3c 3b a8 5c be 62 a6 f1 e1 77 d6 70 e5 | b8 30 16 1f 9c 9e 52 90 ea f1 be d9 f2 c9 5f 95 | 77 8c 0a b4 bb a7 f4 25 bc 2d eb e9 11 f1 32 b5 | 35 4d 8c 02 40 af 7f 94 52 b2 4c 1d e7 2f e7 74 | 72 3e 84 0e 3a 79 5f 30 6a 29 cb 0e ae 9e 72 ab | d7 8e 3e b9 a0 36 1f e0 6e 15 d4 61 f3 83 66 72 | 3e c1 e8 80 18 c3 99 46 a8 a9 91 ab f2 9d 81 1a | 78 1d 17 58 a0 48 32 bb bb 73 79 08 2a 3f 1e 4a | 29 00 00 24 55 56 e2 01 45 9b b6 83 ff 84 a8 c5 | 23 34 d8 e3 d8 71 fd 93 f6 a7 41 77 7b 3f 0d 89 | 52 a4 4e bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da 5d c3 fa ce a9 5d 3b e4 cc 6b 32 | 6c ae ca 02 24 ef 22 16 00 00 00 1c 00 00 40 05 | e7 00 f0 76 0a 46 ce 87 53 dc 2a ab ab 46 52 9b | a3 29 a0 f9 | libevent_free: release ptr-libevent@0x7fb3800857f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338018460 | #629 spent 0.0644 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #629 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36801d710 | handling event EVENT_RETRANSMIT for parent state #682 | start processing: state #682 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #682 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #682 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #682 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.220799; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.975759 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #682 | libevent_malloc: new ptr-libevent@0x7fb3800857f0 size 128 "road-eastnet-nonat-149" #682: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #682) | 1c 63 f5 34 d6 98 db f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 91 93 4b 82 7b d6 c9 cc b6 dc 38 f0 76 d4 ea | b3 f9 d0 20 c5 06 5c 01 f7 82 2c bf 39 d6 f7 d8 | e4 7d 68 8b b6 1b e7 ba 01 9e ef 31 f5 4a e4 00 | 71 9f 4f 6c f1 66 a6 38 36 4d 16 6e b9 0a 02 f5 | 76 26 d7 9e 22 7e 03 cd dc 7a 6e 7a f3 50 38 a2 | f7 f1 9b 7e b5 d1 c3 e6 34 54 2a 11 00 e2 cf 05 | 84 d5 3c c2 01 67 6d 2f 10 ab ff 3f 5e d3 fc 6f | ae a3 ca 06 6d 1c 49 2d 5a 7a e5 04 64 3b 7a e2 | 78 f6 c6 9d dc 04 10 4f 6b 84 37 a0 35 9d 5e 5e | 43 00 9f e2 ca 77 c0 e3 a6 a6 e9 8c 0e c9 9d 05 | f4 7c d1 f5 aa f5 3a 3b df 0d e9 f3 99 52 88 3b | 6e 6b e7 b1 a8 09 b9 87 1e 6c dc 1d a6 0c b9 85 | 1c 89 ee 82 0e da ca a2 a8 31 12 33 df 1d 7c 66 | 57 48 ec d7 e9 e4 6e 69 ac ff cd 56 20 87 16 fd | c1 b0 72 78 18 b1 15 83 cc 13 cd 7a 9b d9 1b ea | ab 9f c6 a9 54 29 46 07 69 08 0d df 81 94 bd 9f | 29 00 00 24 44 7b c5 ba aa af dc 31 42 e4 80 90 | 55 f4 c0 be 7c cc 43 63 bf 44 9a f8 f4 30 a8 fb | 10 97 40 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d a2 48 8b c8 15 0a 38 76 0c ba f3 | b9 e8 7a 81 52 85 f0 63 00 00 00 1c 00 00 40 05 | 0f 56 36 fd fd 8a 46 5c 86 a2 68 e1 11 7c f5 b4 | 2c 7e 9c 12 | libevent_free: release ptr-libevent@0x7fb36801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36801d710 | #682 spent 0.0632 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #682 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348039e80 | handling event EVENT_RETRANSMIT for parent state #620 | start processing: state #620 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #620 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #620 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #620 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.22087; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.968023 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36801d710 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #620 | libevent_malloc: new ptr-libevent@0x7fb36801a4e0 size 128 "road-eastnet-nonat-63" #620: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #620) | 0c 12 15 e7 a2 ca 8d 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 3f 5e 3f 99 f7 2c cd 5d 9d 10 28 3d d6 eb 5d | d6 70 92 22 81 10 39 84 c3 22 a4 4b 22 26 4e c3 | 43 c3 37 59 00 1d 7e 63 45 c0 26 a8 98 4a b1 47 | c1 33 a4 a4 90 f5 4b 5f 23 ab b3 25 78 4e f7 a4 | f5 a4 93 56 5e 09 41 80 4c 5b e0 55 80 1b 24 4e | aa f2 33 07 2b 18 44 d7 f2 64 d4 1c b4 47 33 ae | d6 d7 60 0c 88 02 96 73 4b 3e e1 3f 8e 0f cd 2b | 4f 43 e0 dc f5 25 3d f1 3c 28 8e 72 59 95 64 7c | 38 6c b8 23 04 21 89 f8 a5 70 08 2e 75 aa 14 af | e8 5d 1a 6b 12 19 09 99 3e e3 e5 85 d8 78 ef 8d | 24 1e c5 bf 13 b7 ef 62 4f 9a 47 1e b2 de 4c a2 | 66 69 d3 df fc f2 1b e9 88 8e 7d 9a 64 f1 c5 88 | b5 0e 03 d2 24 45 b0 15 4d 1f 26 ae 6d 58 30 94 | ad 64 eb 3c 81 d9 0e 5a e4 30 43 31 ff 25 8a 7d | 43 87 60 41 58 98 d9 b1 94 9c cb 6c 2b f6 03 9e | 5e 6f 4d 36 24 f7 c6 bf 51 85 e7 d4 54 b0 61 7f | 29 00 00 24 e6 bf 33 37 4b e1 e6 6d 80 47 43 de | 67 a6 13 22 fb fc d2 c4 87 31 c8 58 f0 30 ac 5f | e0 4a 7b ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 41 62 8d ec b8 5e 72 37 70 1d f8 | 93 d1 d1 32 a2 e2 38 e4 00 00 00 1c 00 00 40 05 | 9f 9a 22 83 1f 86 8c 5b a2 81 5b 71 ab 0e 9a 59 | 82 5d 35 a1 | libevent_free: release ptr-libevent@0x7fb34802a670 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348039e80 | #620 spent 0.062 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #620 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad43c0 | handling event EVENT_RETRANSMIT for parent state #652 | start processing: state #652 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #652 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #652 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #652 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.22094; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.97031 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348039e80 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #652 | libevent_malloc: new ptr-libevent@0x7fb34802a670 size 128 "road-eastnet-nonat-145" #652: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #652) | cf c2 13 dd be 13 c5 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 79 e0 0e 1a 26 5e 51 b7 a5 4e b3 11 14 4a 1a | 6b 96 3d 3b 24 26 a6 e1 89 0f fe 91 a7 c1 7a 45 | 26 cd 35 4b 8b 6b d6 67 91 8f b2 00 fc d7 fa 63 | 2b 58 54 f9 c8 77 8f d8 2a 48 b5 10 ef bf 28 f5 | 2b 01 2a b5 18 43 7b d2 1c 14 72 04 8a f2 52 ba | 8b 62 38 7c 84 16 57 0c 23 dd 5f e1 6d 4a 6a 89 | d0 08 7c 20 3c 72 d9 e8 1e 21 18 8e 13 54 9f 91 | d8 28 dd 9e 63 28 ad b3 cc 26 3f ce 02 f8 0d e7 | 43 fe 79 b9 17 32 6b 1f 49 79 5c 97 67 4f 3a 29 | c2 8a 0e 49 84 d5 bf 8e d2 4f bc 6f 4f 9d 2d 18 | 2f fc 66 90 24 12 d6 64 7d 6c 9d 94 39 e8 e1 57 | f1 94 1f 02 5b 88 4a 35 7d 48 05 cc fa 83 14 b9 | dd e0 c2 0e b0 3a 8a d8 a2 1c f4 35 ef 16 28 20 | 4a cf 5a 27 76 56 8a 88 e6 05 ec 34 f1 7b 00 b3 | 84 e3 67 51 85 c2 15 5b f0 1a bb bc c2 65 21 ca | 2f a8 c5 a1 e4 74 bb e7 a4 40 7f 41 4f 5a 73 b3 | 29 00 00 24 a4 50 57 9a 3a 57 4f 84 97 47 60 cc | 90 ef 4f 57 df 90 96 08 71 29 36 b2 5c 92 88 88 | e1 f8 f5 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da c9 d5 de d7 08 a6 7f d2 6a f3 9f | 8c b9 dd 2d 2d b7 3d 20 00 00 00 1c 00 00 40 05 | ff d6 25 67 d8 96 d1 7e 81 61 53 f8 7f af e4 0b | e5 df 07 44 | libevent_free: release ptr-libevent@0x7fb35806a310 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad43c0 | #652 spent 0.0624 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #652 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a92f40 | handling event EVENT_RETRANSMIT for parent state #665 | start processing: state #665 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #665 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #665 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #665 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.22101; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.969949 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad43c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #665 | libevent_malloc: new ptr-libevent@0x7fb35806a310 size 128 "road-eastnet-nonat-135" #665: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #665) | 17 f4 78 a9 59 a3 a0 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 53 db 21 ce 0d 36 e8 32 4f 09 2d c9 12 93 03 | 3f 0d c8 57 d9 b2 d5 94 66 f5 2c af dd d9 9f 30 | ab 23 90 f0 60 2c 56 f2 ed e4 3b 19 92 7c 90 60 | ad a9 f6 f4 89 a5 b5 8a bd 28 e0 e6 2a e1 c4 4a | ab 19 3e 76 a7 cb 3f f5 b4 c1 ac d5 eb a6 51 0b | a5 22 3b cf 5d 35 78 58 b3 7e 27 7d a0 c6 9b ff | 67 19 62 12 ee 59 54 21 85 49 cb 45 55 53 2d a0 | 2d 26 f7 0a c1 cb a3 d2 11 be 8a 38 9f cf c5 aa | b6 3b 08 8c da 2a e2 3b d8 47 c3 96 5b 2d 9b 87 | 46 cf 56 9a ec 1a 60 92 d6 f2 05 73 ff b2 0b ce | e0 8c 45 e1 18 34 9e 24 c1 08 e0 e0 af 89 f2 77 | 7e 12 a0 ae df 93 58 3e 41 53 7a 70 bc 01 86 20 | e2 3a 31 eb 69 7b 78 f4 7e c8 5b 4a d3 b5 a7 20 | ba dd f3 68 f1 50 e0 df d8 9c 38 0c 45 05 f8 e4 | 46 fc 25 f3 c6 e0 f9 ac 5e f5 b0 29 3e 15 55 f0 | 12 34 52 a4 54 c5 e2 07 e5 c7 8a 47 07 72 65 b1 | 29 00 00 24 d3 a0 68 c2 b3 be 73 5d 25 6c 72 85 | 4c a1 62 e3 da 82 77 49 9b ae c7 79 c0 29 55 4a | d4 14 82 6b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 0c 4d bd 1f b3 c2 70 27 97 8c 0d | 77 2f 10 0a 09 ce 7a e7 00 00 00 1c 00 00 40 05 | 59 08 d1 ed de 8d 28 01 5d dd 9a 01 fe e8 dd 16 | e2 b8 56 65 | libevent_free: release ptr-libevent@0x7fb370069fb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f40 | #665 spent 0.0816 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #665 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad17c0 | handling event EVENT_RETRANSMIT for parent state #666 | start processing: state #666 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #666 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #666 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #666 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.221117; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.969568 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f40 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #666 | libevent_malloc: new ptr-libevent@0x7fb370069fb0 size 128 "road-eastnet-nonat-141" #666: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #666) | af 55 d1 c9 76 35 30 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c a3 85 78 4d da 5e d0 32 3e 9d 3d 1a 3d d3 8c | 75 15 1f b6 cd 02 be d3 50 94 f0 58 88 ee b8 fc | c3 9d d9 05 29 33 e6 db b9 03 a3 91 03 b9 32 e2 | 8d fb 3b 7d 1c 57 d3 23 cc ff 02 0a e8 64 c5 f1 | e9 72 3f f6 5e 2f 3d 0a 9f 40 47 53 42 c4 5a 15 | 56 44 cd da 2b f5 35 b4 37 9d 04 5d 25 e6 c0 9b | b3 63 e8 21 ae c1 4f bc fd b7 b4 1b 32 47 ef 1c | 87 37 97 c0 17 13 75 a3 52 27 4c 6b eb 0e 51 30 | d3 3f 38 9d 4d 1b e4 dc 3e ff 0a f9 c7 c5 15 46 | 17 54 ca 31 e4 f9 c3 f7 5a fe 09 54 b8 94 74 b2 | b0 37 00 fa f9 27 9d 2b f7 90 e1 a7 8d f1 47 7f | e5 3b cd 7d 99 d8 c5 f7 ca ba 6e c7 10 b5 29 30 | dd 2c 8d e4 5c 1c f8 af 25 ac 3f 4d c8 75 38 48 | f5 61 6b ae 49 2f 44 0d d2 eb a5 27 c3 0a b7 53 | 3e b0 4a 01 d2 cc 09 c9 d4 f8 e4 3d 8d 15 85 bd | 63 cd 9a fe 1f 70 56 b3 af c7 75 be 72 96 94 7b | 29 00 00 24 de 7e cf 42 4e bf 8e d5 7b 3b aa 12 | 1e 0d 89 09 17 65 63 a9 70 48 ad 13 bd 01 8c 63 | 96 2c 21 7c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 21 75 3c af 69 72 49 98 23 f2 8c | f4 76 7b 19 c1 d1 00 01 00 00 00 1c 00 00 40 05 | 6a 1a 2b ed 94 cf f9 2f b3 a8 2d 85 01 1b c3 59 | 84 9c 27 2f | libevent_free: release ptr-libevent@0x7fb388064e90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad17c0 | #666 spent 0.0636 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #666 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_RETRANSMIT for parent state #546 | start processing: state #546 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #546 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #546 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #546 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.221188; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.93839 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad17c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #546 | libevent_malloc: new ptr-libevent@0x7fb388064e90 size 128 "road-eastnet-nonat-173" #546: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #546) | 6b b3 b7 0f 25 55 d0 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6f 97 dc 92 f6 4f 2c 9f 64 e9 38 e7 a8 c9 b6 7e | 05 ff cf 3a 5e 05 b6 cf 17 cf 8d ed 48 a3 fa 9f | 24 a8 a6 41 91 3f 77 df 02 a6 05 bb e5 ab cd 67 | d8 25 b1 f3 b8 14 51 43 76 86 a6 c8 d3 ba b6 18 | bc 07 8c 01 94 c0 38 ea 24 cf c6 97 ad 4b b2 b6 | 6f bb 4c fe 23 3e c7 46 59 8c c5 fd 43 6f df ce | b5 5a 0d 2c dc 35 13 65 e4 12 f7 f9 80 cc aa 20 | b5 ee c7 5a 5a 70 15 d1 3f c3 8a 67 09 11 af 09 | 16 32 b4 53 41 90 67 c4 cd f6 da ec eb 5a 4a 3f | b2 29 22 df ae 11 4b 8d cc 3a 05 6f 94 4f ad 1b | d7 60 13 20 46 f2 cd 62 12 6a 44 77 94 47 13 c4 | e5 1a bb 0c f8 12 56 21 05 7d 6d 2b 8c f3 58 da | 44 da 7d 6f ce 51 7e 8b 6a af ad 31 4a 3c fd a3 | 30 aa 0f f0 5b 6a da 87 b0 6b 48 55 97 b6 71 a6 | 60 8f d8 d4 aa a0 85 a4 40 0d 91 d0 21 6b 4b 63 | 73 9c 09 ed c8 c0 5f 4c fa cd b4 f8 56 de a6 a5 | 29 00 00 24 ce 6f 16 bc f3 6d 4e 88 a3 1b 4b 4f | 8a 74 cd 2e 04 10 e5 12 90 b1 40 e6 d6 57 95 4a | 49 93 ce 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 2a 45 97 7e 21 38 1c 72 a0 dd 2d | 3c 55 6e 57 52 8e 65 fc 00 00 00 1c 00 00 40 05 | 34 35 71 3c 6d 6a 9d ce aa 0f 6d 3a 2b eb 4b 95 | 7e cd 31 4e | libevent_free: release ptr-libevent@0x7fb36c07d450 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | #546 spent 0.0614 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #546 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #690 | start processing: state #690 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #690 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #690 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #690 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.221258; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.983881 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #690 | libevent_malloc: new ptr-libevent@0x7fb36c07d450 size 128 "road-eastnet-nonat-76" #690: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #690) | a5 d8 1b 6e 95 a0 38 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca b3 24 9a 21 6f 60 b3 71 d4 ab a0 25 f7 eb d1 | cb b9 58 9d 93 b9 4d 31 b9 bf af f1 80 33 51 9e | b5 91 2a 1a 69 85 ec 97 c2 f1 f6 7b cf 0f 98 34 | cc f0 78 7e 20 72 ca ec c1 db 9d af c5 94 72 f0 | 9d 8a 9c 63 61 d9 79 76 b4 d5 ff b6 88 bc 5f 00 | f9 44 90 fd 47 4f 4d ef 33 81 b4 03 24 b2 94 be | 87 74 8d ec 7f 31 ff a0 b9 7a 06 f4 90 af 20 b4 | d9 9a 9c db df 5e de 7a 83 76 4f 3b f9 bd 20 fc | 39 b4 48 b8 7f 01 a8 08 13 de a8 58 cb b0 5a 11 | 7d 48 1d 19 b5 3b 92 c4 7a 09 9c bf 77 f3 7f 94 | 69 63 88 b2 cc c5 dd f2 df 7b f2 15 b7 7d d7 15 | 62 ec fa 8e 1d 1f f7 e3 89 53 47 50 af 55 33 77 | d7 34 f4 ef 07 86 c5 df 5b f7 cf 26 c2 e4 b6 41 | ba 90 ea 4c 75 6d 9b 74 97 2c 57 b6 c4 94 c5 0c | 7b 86 0a 36 9e cd da 67 90 23 e3 e4 2b 85 7e 93 | cf 87 12 15 81 f9 76 1c 9a 69 94 6a 02 3c b9 8e | 29 00 00 24 86 ae f8 9b 15 cc 78 e0 7f 55 66 22 | 35 e0 b7 21 54 8a fc 02 7b 9e 59 11 ce d8 be 06 | f0 76 9a e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 b6 97 31 de cc 72 d4 ce 22 00 8a | 2b 89 e8 30 bf 2f b6 28 00 00 00 1c 00 00 40 05 | bf c8 d8 e9 c5 00 38 c5 98 1c ab d5 6d a7 2c 3e | 8e a5 66 03 | libevent_free: release ptr-libevent@0x7fb35c0b6a00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | #690 spent 0.063 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #690 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34802ef50 | handling event EVENT_RETRANSMIT for parent state #651 | start processing: state #651 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #651 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #651 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #651 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.221328; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.972534 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #651 | libevent_malloc: new ptr-libevent@0x7fb35c0b6a00 size 128 "road-eastnet-nonat-120" #651: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #651) | 1a 50 87 84 a9 ff b6 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f b0 d0 63 93 36 3e 05 3f d8 d6 98 23 8b d3 09 | a6 00 78 13 01 81 1e 9a 9b 73 6c 03 e7 97 c7 1b | 0a 84 93 85 00 d2 0f 42 a2 06 09 3e ca 76 f7 20 | f7 d8 2e 7e 15 56 e2 ea a5 ef 8c bf ce 15 8f 1a | 88 09 23 43 98 ef d2 44 53 11 dd 26 74 25 6f 29 | ac 6e a0 99 63 72 d1 be b3 57 f6 ad 0a da 95 1d | 18 60 71 f8 41 7d 97 d6 6b 27 e3 ec fd 11 12 f8 | 81 67 3a 79 45 6a 47 cd 2e 49 43 bd e0 c1 62 f2 | 98 2c 58 06 87 2c 1f f7 a9 0d 52 20 8c e4 05 0f | 2e 1c b9 0f 26 b2 5f 0c 36 af 55 16 37 0a 50 fd | ed c4 bf 0b 03 c3 8c 74 4e 72 bf bb 10 a3 5f 5d | 2a ab df c6 32 de 1f 74 dd dc 29 6a 62 0f ba d6 | cd 7f 75 5b 18 56 b2 b2 8b 55 87 e0 a2 48 c7 1b | e5 1a 41 ad 6f a6 03 13 4f fb 3b 29 02 ab c7 ab | 64 51 03 a8 1c 6b a4 37 1a 86 e8 46 e4 11 b6 ca | 91 48 08 9a a4 54 04 35 e3 57 3e 39 2c d0 ca 88 | 29 00 00 24 e4 4b ce 89 22 9c e4 d1 3c 9c 26 a1 | ce 1d 7f ff e4 4b fb 0d e8 f0 df 0e 05 12 8e e2 | 48 e7 f9 11 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 9d 26 4f 15 14 5e 39 05 f8 cb 75 | fe 3e e5 7e f0 bd 45 a1 00 00 00 1c 00 00 40 05 | ce 3e 0f f6 37 6f 31 d0 cc 66 b0 14 78 6d 46 0e | eb 95 c2 dc | libevent_free: release ptr-libevent@0x7fb348064130 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34802ef50 | #651 spent 0.0638 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #651 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a46910 | handling event EVENT_RETRANSMIT for parent state #603 | start processing: state #603 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #603 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #603 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #603 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.221398; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.945408 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34802ef50 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #603 | libevent_malloc: new ptr-libevent@0x7fb348064130 size 128 "road-eastnet-nonat-94" #603: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #603) | fa ea 40 d9 66 be 9a 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 92 c5 c1 75 76 e2 67 5a 25 6a 0b 6a 26 d9 00 | 60 88 8f a2 09 bc e1 34 ad d9 cb d7 8f 0c c9 fb | 5d 34 e8 7a 58 2c 44 52 32 ff f3 22 30 6c a9 46 | 04 15 9a 62 ca cf b2 db c2 74 ba 23 f1 4f 38 d1 | 41 e3 74 a5 ba b3 6d 59 07 f6 3b ea 03 a8 2b 84 | a0 ed 8d 1c c1 de 56 07 5d c4 0b 77 93 2f 7b 97 | 14 b0 d1 04 7b b9 0f f9 37 a9 bc e0 4a 4f 00 f2 | 2d 96 5a aa 23 a5 de 2a 49 0f d1 e1 16 3d 5e c0 | ad 4a da ab ad 5b 58 e6 5a 4f 98 f0 fc a6 f1 b7 | 23 d2 f2 3b e5 a7 21 e7 ea e1 cd 13 d1 70 91 3a | 21 85 1b c9 4c 39 e7 cc bc a4 f6 9c d6 c5 38 7d | 67 8f f8 b4 07 fc 7b 89 3f 70 75 29 51 a4 a4 f6 | f2 64 d3 35 1a 69 f9 96 67 39 7b ea 78 c8 ec c0 | ee f5 ef 8b fa 9d ea d8 61 b7 28 83 06 af 52 08 | a9 ac 31 1a a8 b0 a9 01 03 7b 63 e4 2e d4 f8 cd | 6a 2c 19 36 b8 74 36 aa da ff b3 99 0c f5 14 c0 | 29 00 00 24 c1 66 a4 b2 e8 08 5a f7 00 1d be e4 | 4b 24 90 f6 2d 3e 76 77 76 ca 57 42 50 10 a0 64 | 0f 04 48 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 e6 7e df 78 16 4d e7 97 e4 d0 17 | 4d c7 b1 fe f3 78 c1 ee 00 00 00 1c 00 00 40 05 | b6 73 08 f2 9b c6 7e f9 57 b7 a7 5f 43 dc 0e 73 | 16 6a dc 75 | libevent_free: release ptr-libevent@0x7fb3440646e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46910 | #603 spent 0.0628 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #603 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #599 | start processing: state #599 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #599 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #599 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #599 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.221469; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.948409 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46910 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #599 | libevent_malloc: new ptr-libevent@0x7fb3440646e0 size 128 "road-eastnet-nonat-64" #599: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #599) | 66 fe 40 6d 20 a0 8e c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 14 ec 7e f9 cd 40 f5 de 65 65 51 82 b1 59 1d | e2 b1 19 0c 5f 42 c2 c5 f2 9e 9f 81 38 a4 92 07 | 55 02 a7 a3 99 20 d2 9d 43 eb 91 a3 1f f5 e1 6a | ac 0d 32 90 d1 6d 6d 3a 90 4a ce 17 12 9d 8c 47 | 7f 85 c0 17 84 a9 65 8a 07 e7 29 51 ac bc 5a bb | b5 62 41 b7 ff 6d 04 9f 02 f4 2c 6c 75 b6 4d e5 | ee 4c f0 36 66 9b aa 3a 2d 8d 7d de 94 5b 92 78 | f4 41 fe 7f 33 1f 2f 29 ac c1 15 b4 b6 4a 26 c7 | 44 40 c8 70 6a cd 04 43 6d a5 b7 76 59 c0 45 92 | 8f 55 81 59 a2 e1 56 33 98 b8 16 29 a8 ae fe 63 | 1b 33 5e 5c a3 3c 37 83 85 62 21 28 50 5e 0d 07 | 88 ad 15 73 a5 30 b6 de 4a b6 16 ba 2b d9 18 62 | cc bc 5b 60 dc b9 95 66 a2 af af 8b 80 0e c8 c3 | 2b ea da 66 ba 0a 43 87 f9 ca 7e 08 04 24 6f de | b2 f8 b8 8f 58 ce 58 e7 2d 3c 4f 86 18 6d 41 84 | be 0d 41 9c cb 28 5c c2 7a fb af 81 ec 08 20 4d | 29 00 00 24 da 51 a7 0b 53 11 86 4b c3 b4 4e 3b | f4 a2 e2 0f d9 7b 58 4a f2 c9 2a af f2 68 7d b8 | b9 d1 af 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 33 56 1d 93 89 b2 9c ef 86 78 c9 | a2 2d bb 3b 37 fa f6 3c 00 00 00 1c 00 00 40 05 | 92 86 b4 ce 70 36 ee dd 1a cd 75 09 22 54 37 7b | f9 8e 38 96 | libevent_free: release ptr-libevent@0x7fb35c0bc1e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #599 spent 0.0613 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #599 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34800cc10 | handling event EVENT_RETRANSMIT for parent state #678 | start processing: state #678 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #678 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #678 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #678 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.221537; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.984787 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #678 | libevent_malloc: new ptr-libevent@0x7fb35c0bc1e0 size 128 "road-eastnet-nonat-41" #678: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #678) | 6f 4b 14 c1 cc 6f 1e 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2e 9f 0d f0 04 66 77 dd 93 01 97 d4 e6 2f 63 32 | 08 d5 90 21 20 45 70 7a 23 d4 d5 21 f2 1e 5d 61 | d1 38 f7 cd 0d a7 dd 8c 8d 4e d1 19 04 72 f0 60 | b9 a1 be 10 b3 d5 d9 6f 71 a4 43 ab d4 47 03 ef | 16 17 71 a7 79 4c e1 97 0b 36 26 91 25 a7 46 06 | 06 c6 86 a0 3d 48 06 59 81 9f 8c 4f 63 ff e7 cb | 43 e1 16 d1 2e 14 d6 59 c4 4b 03 1f 4a 2a b1 68 | 2e 3a ca a3 c0 9b ec 0d 92 cb 4f d7 26 c4 23 f2 | 7c d5 4f ba 74 f9 b7 a5 8e 7b c3 80 00 1d 25 ca | c8 b6 e7 a7 82 b3 c1 78 86 73 3b e9 bb cb dc 9e | 16 a5 8a cc 34 90 c8 2f 6d 13 78 e8 e7 19 45 83 | dc 57 56 49 3f bf 58 bc b2 bb f5 33 21 2c 25 1f | a6 7d a4 87 88 3d f9 0c 01 74 fa ba fa 6a a3 ea | 56 23 6e 54 12 c1 f7 82 be 6d 43 68 51 8c 0d be | 08 4b d8 2e 8d 59 7c 26 08 c9 1c b1 04 3b b0 54 | bc 1d c3 bf f4 25 5d 1b 85 94 1b 71 be ed 0f 44 | 29 00 00 24 4e 75 ec 55 47 ad 1d d0 2c e8 2a 32 | 3b 96 41 fb 18 33 b6 2f 27 93 6f d4 fa 16 90 bd | 2c 77 4a 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 38 05 46 29 58 72 8b 7e ef 72 dd | 2e 27 17 90 79 5b 4e 74 00 00 00 1c 00 00 40 05 | 18 2e f1 a2 ca 0d ed 2f 55 5d d8 98 ad 86 50 39 | 38 85 67 2b | libevent_free: release ptr-libevent@0x7fb3880805f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800cc10 | #678 spent 0.0627 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #678 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb338012bf0 | handling event EVENT_RETRANSMIT for parent state #661 | start processing: state #661 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #661 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #661 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #661 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.221608; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.977025 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #661 | libevent_malloc: new ptr-libevent@0x7fb3880805f0 size 128 "road-eastnet-nonat-154" #661: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #661) | be 95 5c 7b 40 76 8c 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f ba ef 56 b8 99 c9 26 b1 07 42 76 09 76 7a 27 | 91 a0 41 2b a0 70 93 15 d8 a7 50 fe fc 23 ab 2e | a7 36 40 0e 91 38 15 2b 47 d9 88 bf 5c 3a f7 3a | b4 a0 b6 a8 c9 29 be 63 86 bd a0 c9 b5 5a 74 81 | 42 05 2c e3 63 22 b0 ab 60 c9 91 06 1a ae 70 20 | 27 d6 ef fd c0 2f 69 26 17 d1 9e c7 27 24 17 a8 | 24 d5 65 3b 9d f2 8c bf b0 68 e5 fe eb 23 a6 60 | 73 bb 2c 27 f0 6f 99 ad 46 65 56 ab e0 3b 17 ec | 9b 9d ea 8e 8a f2 38 63 83 4a 06 e3 25 cb 1e f9 | dc 65 77 ef d0 4a 78 7b 20 56 68 95 c5 c6 26 b7 | 22 1a 94 be 24 6f df 64 3f 4c a0 9e 67 50 56 a5 | ff de 53 8d 33 a9 a8 0c 5c 5c f2 d7 59 a4 9b b5 | ea 88 33 be 31 ed e9 57 b6 13 a2 64 ea cd 03 7a | c1 10 e4 c2 97 9a da b1 7b a7 87 15 5b 07 98 84 | 7d 87 44 3a 69 2f dc 0c 9d 8a 59 b1 b8 cc a6 60 | ec 16 5f 47 d6 09 63 e3 f1 2c 11 ea 7a f9 7f cb | 29 00 00 24 22 90 73 7f 5c d6 51 86 23 a3 e4 fd | 8f 56 6e 8b 75 d3 87 48 a5 61 18 f5 b1 fb d3 9a | 2f 6b 23 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6e 83 26 d5 67 d9 f3 fc 4f ff fa 52 | 66 7f 8e ec fb ca 45 a0 00 00 00 1c 00 00 40 05 | d1 0b 7b 8d 87 6a e6 ee 1b bd 92 49 cc 1a ec 1c | a9 25 6e 8a | libevent_free: release ptr-libevent@0x7fb3740750d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338012bf0 | #661 spent 0.0634 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #661 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37402ffb0 | handling event EVENT_RETRANSMIT for parent state #675 | start processing: state #675 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #675 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #675 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #675 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.221679; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.975213 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338012bf0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #675 | libevent_malloc: new ptr-libevent@0x7fb3740750d0 size 128 "road-eastnet-nonat-172" #675: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #675) | 85 15 01 85 89 d4 29 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 27 d4 44 6c 1a 22 e8 b4 f7 a6 6b ca dc 02 79 50 | 66 16 b2 bd d5 ad b1 28 e9 83 fb 87 0f b0 39 1f | 85 0a 4c 67 84 5a 26 d0 a8 55 ee 04 95 94 30 6a | 8b 2f aa d3 6a 76 aa f6 4f 30 a2 ed 90 5e f2 5a | 20 ad 0c 4f dc 59 2a a9 a0 b9 a8 76 de cd 23 64 | 4f 9a 8d b3 29 80 5a c0 ac 02 65 83 3e 73 4f af | 83 bf 4d 9d d9 08 a6 6d 2b 14 3d dc 93 82 28 2c | f5 61 0c a2 f1 30 b4 2b 77 cf 96 6d fa 79 62 e9 | 63 f1 85 76 cb bf 4a 7a a7 6e b2 0f d2 81 ef 19 | 8b 21 8c b4 9f 3f 24 a6 9f da 8c 47 53 28 64 05 | fb 7d 95 f0 ba d8 43 62 9a ae 0b 9c e0 5c 3a fb | b4 7a 35 d6 09 67 28 a4 a9 e9 29 a4 8a 02 01 83 | a9 7a 2f c2 42 8f 69 ec 36 92 a5 62 86 bc 6e 90 | 30 c1 46 27 0d 35 15 d4 e6 60 3d 5f 12 ff d2 11 | 5b 76 4e f3 c6 f5 a0 f5 20 2c fb d4 41 40 b5 03 | 62 81 86 c6 eb ed 0a c9 13 24 16 5c 02 3b c0 ee | 29 00 00 24 9e c2 e6 fc 35 e6 0d 46 d5 b0 34 c9 | 0e 50 aa 4b 78 0d 91 95 d1 89 b8 a7 4b 5a cf a5 | b3 98 e6 f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 c1 ac 8a 35 e1 18 af 1b 41 18 3d | da f3 7c 9c 54 2f 3c 44 00 00 00 1c 00 00 40 05 | 3b bf 96 55 32 21 74 25 91 ac 0c f9 c5 3a d7 f4 | 94 b6 78 27 | libevent_free: release ptr-libevent@0x7fb35406f780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | #675 spent 0.0614 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #675 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2e150 | handling event EVENT_RETRANSMIT for parent state #618 | start processing: state #618 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #618 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #618 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #618 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.221749; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.964515 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #618 | libevent_malloc: new ptr-libevent@0x7fb35406f780 size 128 "road-eastnet-nonat-139" #618: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #618) | 4c ec 39 dc 68 b5 59 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb 05 80 a5 c5 c3 f9 3c 54 41 f2 ff 45 6c 8e d4 | 8c 5e 68 7a a4 b6 14 c3 90 a7 72 c5 37 6e 6f 34 | 08 2b b2 1a 80 e0 96 44 12 49 4b 90 a0 23 38 84 | 7d 94 15 fa 5a f3 e0 cc 84 03 8f 8b 27 13 09 3a | 10 76 9b f5 54 eb 6e 14 d3 82 81 b0 db 0b 18 1a | 23 52 e5 6a 71 2c 20 30 0b 2d 6d ca 81 1f 7a 55 | e4 4b 85 3d 68 9a 6b d2 c5 64 b0 66 a7 3b 3d 0e | 93 9d 5d fa 9a a0 0a bf 68 5b fd ad 7d 7e af d8 | 9c 26 a4 24 3a 01 11 20 e2 46 b9 f1 ea 83 9f 1e | 92 ae 34 06 9d 01 75 70 1d c6 a8 17 f0 17 d4 e8 | 3f a5 fd b3 84 83 5a f3 64 23 e0 0e 62 67 3d 47 | bb 61 39 45 8d 5a 36 d7 90 42 a2 1e 97 de 94 c3 | fa ba ed 1b ac 33 c2 ed 5f a7 b7 09 79 e9 ef fd | d7 73 e1 c8 3d e6 bf ba cf ff dd 60 43 ef 89 b6 | 56 0d 72 f9 c8 aa 8e 1a 35 4f 05 5c 43 b5 97 90 | 99 49 cf 4e 52 3c a6 31 26 76 2b 78 5b c5 df ff | 29 00 00 24 f5 f5 e3 7d da 51 1c 42 32 a8 10 86 | f8 ee 92 c6 41 8c 4c bf 39 0a f7 2f 54 e9 a0 ad | 67 1a 3b 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 f8 d9 8a 1f 35 3a 8c 98 12 8b 5d | 4d ad 41 c9 74 54 12 de 00 00 00 1c 00 00 40 05 | 37 33 26 b1 70 e0 75 6d 56 a5 af 29 8a b8 60 f1 | 31 e0 30 c5 | libevent_free: release ptr-libevent@0x7fb33807fef0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2e150 | #618 spent 0.0633 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #618 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370018460 | handling event EVENT_RETRANSMIT for parent state #663 | start processing: state #663 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #663 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #663 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #663 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.221819; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.976304 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2e150 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #663 | libevent_malloc: new ptr-libevent@0x7fb33807fef0 size 128 "road-eastnet-nonat-84" #663: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #663) | 79 3e ba b8 29 05 87 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 33 bb 34 f3 54 37 c7 8c dc a0 f1 cf 40 e8 73 | 4d 61 cb fb 80 2d 1a 01 88 6a 8b b8 01 53 25 2c | 65 96 5d ff d7 d3 f4 f3 eb de 8f 2e 9d 25 1d ba | 62 be 02 e6 a1 b3 d0 12 26 cc d4 67 6f 8d 33 f6 | fb 60 8a a9 03 0f c4 ae 02 35 7b 99 4e e1 16 a5 | ee d3 5b b1 65 88 dc 22 5a d0 4d 4e ee 2c c0 24 | 46 97 dd a5 48 e2 b0 56 80 9b bb 68 ed b6 e4 a6 | 82 5d 86 21 c6 56 4f 00 61 9e 48 83 5d 1c ae 1e | f0 fe e0 f9 d0 af 09 19 1a e7 0d 36 81 b4 ef 45 | fc 89 2f 75 93 ae b9 f0 57 e7 58 2b 67 f7 d7 fb | e1 1e 09 48 c7 72 2b be da 88 0d c9 88 d7 8e 37 | df a2 95 e3 05 1c 20 c9 19 12 4a a3 c8 92 ca 0d | 93 be b7 87 ef 2b 8a 9c d5 f2 5d 84 18 5e cd 93 | c2 8f 56 ff 9f 94 a6 a4 04 ca 9a 36 29 04 c1 ac | 0f c7 63 2e 86 54 2d 98 d7 53 7a 9f fa 34 32 25 | 82 89 27 91 24 d9 51 66 79 76 cf e8 c1 b8 34 a5 | 29 00 00 24 f2 12 89 96 be 24 7d dc 10 f3 fa c9 | 66 8f fc 3d 79 cf 4b f7 e2 58 a9 f9 9e 41 92 7e | 29 7a 39 ee 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 49 16 1d 85 03 57 22 43 2e 01 a2 89 | 42 fd 2a d3 68 48 40 6e 00 00 00 1c 00 00 40 05 | 88 4c 7d b9 50 dc 42 1f 7a 10 6e e7 7e cd db 07 | b5 a9 ee e4 | libevent_free: release ptr-libevent@0x7fb3640908e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370018460 | #663 spent 0.0631 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #663 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a56dd0 | handling event EVENT_RETRANSMIT for parent state #707 | start processing: state #707 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #707 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #707 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #707 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.221889; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.981739 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #707 | libevent_malloc: new ptr-libevent@0x7fb3640908e0 size 128 "road-eastnet-nonat-212" #707: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #707) | 6d 4e 2c b0 bf cf 55 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 9f d6 3e 98 b0 5f 73 4d ba b3 1d 62 98 ca 06 | dd 1e 98 88 ad 43 74 1b 2c 00 fd ed fc 05 58 84 | 27 da ca 10 63 1d 7f eb 9d 54 23 18 54 21 fb 77 | d0 11 3f 30 03 c7 bb 7b 6c 82 87 1e b2 c4 46 f5 | b9 75 85 86 87 c3 a0 25 db 07 f0 41 16 6b 87 67 | e8 54 09 98 f1 0a 76 80 fc ed 49 b8 84 22 18 a5 | 42 4a 4c 04 5d 3d 8e 7d 10 b9 03 9f 1f 7c 16 e2 | b0 5f 6c 5f c5 04 98 72 d0 8b 9d 1d 44 50 bd e3 | 32 b2 07 88 7a 5e 63 db 86 1b e1 1b 74 17 01 a7 | 1e e1 3a 02 f1 70 78 85 40 5a 51 fc d7 95 05 3c | cf 55 a3 5b 30 25 71 8a 68 40 5b 0b 8d cd e7 b1 | ed ec b5 28 b7 94 2b d4 3d d1 a5 be b7 54 c0 ea | b0 e9 b3 54 58 b9 5e 83 2e 20 37 1b a4 e8 3d 27 | 35 25 cf 41 31 d1 6b 1e 93 0a ad 4b b0 9d 1d 04 | 42 0a 80 11 8e 38 78 07 10 31 d4 fa 2a 6f d9 7e | c7 dc b2 d9 f7 11 7b c9 5d 8e 23 53 ed 2c 2f 94 | 29 00 00 24 a4 fd 7e 3c 32 99 82 33 41 85 15 88 | 3f 09 19 10 37 6d c6 9b 12 9c 73 58 6c cf 6f e0 | ec d4 d1 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 88 3f af 7f 85 3e a4 01 39 e4 62 | 4d 36 bd d2 6a b8 ee 4c 00 00 00 1c 00 00 40 05 | 31 2c 50 3f 9f 2d 76 af 33 2c c6 2e 60 90 ae 40 | 55 c4 27 3d | libevent_free: release ptr-libevent@0x7fb38407bf50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56dd0 | #707 spent 0.0627 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #707 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348012630 | handling event EVENT_RETRANSMIT for parent state #680 | start processing: state #680 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #680 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #680 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #680 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.221959; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.984913 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56dd0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #680 | libevent_malloc: new ptr-libevent@0x7fb38407bf50 size 128 "road-eastnet-nonat-111" #680: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #680) | f5 24 ca cb ba 88 21 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 2c 8a fa 61 5b dc 75 21 43 9c 59 cd 19 1a f2 | af b9 0a dc 0c b9 2c e2 bb 4a 6d 4d 55 00 0f 6d | f7 55 26 a5 be c3 6b d0 d6 97 e8 89 bd 9b af d2 | 2f a7 07 fa cd 16 db 98 51 25 2f 47 ee 80 b4 75 | e5 4e c2 eb f9 dd 90 41 c4 eb ff 65 55 5a 16 e1 | 0a 63 9d 2c a4 d7 be 5f bb 29 e9 20 d4 b4 c6 c0 | 19 93 f4 ab e8 7c 18 0f 67 18 9d b1 ee e2 c4 b3 | db 86 22 91 09 29 2e b1 6d 58 cf 74 cb b0 f3 dc | 97 d9 3b fe 88 19 02 5d 3d 14 58 0a 5f 84 05 fc | ca 52 61 f1 b4 87 0b 56 9d 30 94 86 cc 24 e5 40 | f9 97 d9 e9 cb 69 4b 23 cf 2e bf f3 2b 4d 07 51 | 51 02 3a d7 fd 40 d4 5a a1 f4 0a 03 09 91 da ee | 03 72 0d 0f a8 f4 7a a3 cc 70 63 19 72 ce 5a 82 | 3e 1e 95 5c 92 5c 3e 8e a5 d8 b6 96 00 19 c5 14 | 30 e1 2f b7 0e bc 81 b8 ab b7 09 95 46 2e c8 74 | df cd ec 80 52 5f c9 db f8 06 24 81 85 22 9d a7 | 29 00 00 24 a5 87 f1 2f ce 48 12 7d 6a 67 59 4f | 79 27 34 b3 a6 cd 32 d2 99 ca 81 34 03 a5 ff 6e | 74 fd e5 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 d0 80 55 09 28 92 96 a1 13 47 05 | 9d f7 2b dd b4 58 66 92 00 00 00 1c 00 00 40 05 | 6d 86 77 16 04 78 0f de 20 5d c4 c9 23 72 82 0b | af 53 d4 25 | libevent_free: release ptr-libevent@0x7fb37407a8b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348012630 | #680 spent 0.0612 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #680 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c017ea0 | handling event EVENT_RETRANSMIT for parent state #673 | start processing: state #673 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #673 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #673 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #673 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.222029; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.984252 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348012630 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #673 | libevent_malloc: new ptr-libevent@0x7fb37407a8b0 size 128 "road-eastnet-nonat-152" #673: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #673) | f4 4a f0 3d b4 3d 3c 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 2e 28 e0 6e 6b 91 36 e9 7b 5c 4d ea 67 f2 11 | 6c 53 9b eb c8 50 22 a6 67 a8 57 27 ba 98 9b b4 | e9 53 e2 e7 39 12 9d 1a b8 95 df 50 89 b9 6d 1c | c2 85 59 43 95 c8 ac 8f 53 d2 47 55 bc 74 a8 bb | 28 f3 ba 97 8e 1e f2 17 85 ea 84 b3 be 86 51 d1 | 91 38 40 54 bb 85 c0 e0 e5 d5 70 2b c4 39 db 6d | 4b 3d 95 a6 d5 18 36 7a df 3f c0 b2 8e 51 36 6a | ef 02 e1 00 c2 a8 6e a9 10 12 26 9a ee db 58 a9 | ab 3b 04 78 41 3a 3f 8b ee d2 5e 48 4b 71 7d f1 | 52 f8 9a 0e eb 76 58 35 11 da 4a 05 95 53 81 71 | 78 25 df 02 2e c1 be 80 18 4a aa ee 79 3d 23 07 | d3 1a 11 f7 6e 6b 01 33 c3 1e bd bb f0 b7 41 e4 | 2f ff af 8b 2b 73 a4 f1 55 39 a1 c2 31 b7 e5 bc | 14 4f c1 d1 0c 4f 37 65 44 1f 1f 08 6a 1f 2e 2c | 11 ed 27 fa 13 cf d7 f1 1d ea 05 12 6d df ec 05 | fc 26 9c 3b 34 42 df 39 1d 37 77 1c be a4 76 ec | 29 00 00 24 ab e5 f6 4a 5c 04 aa f5 86 05 1c 45 | 9d 40 23 0d 87 34 72 f6 2c d5 7d fe a7 24 93 f6 | e4 ca 8b 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 0f 59 d6 bf b6 98 37 0c 06 6e b8 | 72 17 35 a4 3d ff 36 60 00 00 00 1c 00 00 40 05 | da e9 98 a0 13 2a 7f 02 39 d7 88 7e 43 33 16 b8 | 3d f0 bb d6 | libevent_free: release ptr-libevent@0x7fb378068430 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | #673 spent 0.113 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #673 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aa34c0 | handling event EVENT_RETRANSMIT for parent state #694 | start processing: state #694 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #694 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #694 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #694 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.222174; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.983936 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #694 | libevent_malloc: new ptr-libevent@0x7fb378068430 size 128 "road-eastnet-nonat-229" #694: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #694) | 0e 55 f5 b3 fd c8 f6 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 f5 ee 55 73 5c 37 78 44 5f 18 4c b2 81 47 42 | ae 69 a9 34 a8 d4 9d 0b 90 c1 b1 7e 21 7d 72 4c | 54 93 20 2a f2 92 1d d4 f8 1f 47 36 29 d3 1b 6f | 9a 19 dc 80 ff 6e c6 91 f9 df ed 9a 62 30 f5 01 | b8 f1 04 a3 53 8d 38 fe 98 e7 59 ff 4d 11 d1 c2 | 74 10 60 78 7f 69 54 ea 74 e4 4a 27 75 1a 31 77 | ef a3 4e c6 65 ff d7 27 b4 5e d2 ff 26 bd 65 43 | da 2a 0b a3 b3 5c 1f d0 f9 5c ec 9a e3 39 79 a7 | e1 b2 2d d0 86 12 11 06 eb 7c fb f5 44 48 fb 7a | 82 16 10 84 83 c7 1c 9c d8 e9 3c c6 7c 4a 9b 09 | 70 75 2c b6 29 44 4a 9d e8 e2 23 11 a1 c0 82 38 | b5 09 f8 00 84 ef 12 3d 23 43 5b 89 e5 8c ce f8 | 8e 3c ab d2 ca bf 1f 50 d6 c2 77 f8 1b a3 3e 00 | 3e 0e 9a 9d 92 de 61 1c 3d 11 7b 3b 3b f8 ec 76 | 6c 1a de 42 6f 88 09 08 2c 91 63 7d 68 40 9a 06 | d8 f1 66 a0 3a 37 85 ba fa cc 00 41 c2 2c a4 8e | 29 00 00 24 dd 94 ae 1a 9a 0b 75 c4 7b 33 4c 19 | 1c 5a d2 2d 58 3e 32 91 a4 73 44 86 a8 08 b2 01 | fb 46 4f e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 49 27 31 06 cb 4b e9 70 41 8f 8b 42 | 1b a5 d4 66 19 e2 60 f0 00 00 00 1c 00 00 40 05 | 17 ce fc 1b 0a 11 3f 06 90 32 ce 1d 91 fd 6a 88 | d4 bc 2d 95 | libevent_free: release ptr-libevent@0x7fb38808b5b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa34c0 | #694 spent 0.0959 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #694 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb338017ea0 | handling event EVENT_RETRANSMIT for parent state #686 | start processing: state #686 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #686 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #686 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #686 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.222298; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.987685 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa34c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #686 | libevent_malloc: new ptr-libevent@0x7fb38808b5b0 size 128 "road-eastnet-nonat-142" #686: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #686) | 5f 2e 8d 4e 01 51 f9 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd 75 c3 99 94 d0 49 6c f2 41 a1 b9 21 f5 f4 0f | cb fa c4 3c b6 ed 66 7c ab e3 f2 e8 2e 27 12 8a | 22 59 ec f0 2a 87 a3 8e 7d 1a b5 1d 4d 94 79 69 | 0a dc ad bb 09 9e 15 d3 e2 0b 37 2e 62 3a 5c 44 | 5a 6a 13 ea 8a d9 81 e1 06 22 79 83 c5 03 93 eb | 16 80 9f 99 2a b4 9e 4f 75 89 1d 81 11 99 98 ea | 06 e5 44 c5 95 02 6e a5 42 20 16 09 35 8d c1 5f | ad 15 d5 1f 1f 57 05 88 ea cc 92 ed db 06 fe 1a | 82 63 44 2e 13 aa 34 76 7f e6 11 5f 8c 80 0a e5 | 8d 1a df 42 51 89 87 1a fb 90 a6 5f e4 9a dd a4 | 37 21 fb b9 b1 e3 09 83 44 2b 65 7d 43 06 5b ba | 59 28 4d bc 02 9c 72 d2 e9 d2 e0 e2 4c 4e aa 00 | 99 db 57 fa a3 66 fc cb f5 dd e9 0d 8d 84 3c c0 | 7d 68 be c5 97 df 85 52 da 1e 7a e7 98 0e 8b 72 | 16 20 54 89 82 82 38 c9 be e3 78 0f e2 0f db 8e | a1 b9 e8 11 42 59 86 ce 1a 8a 3d 26 c9 25 6e a4 | 29 00 00 24 7c b7 7a e3 3e 1b fc dd 37 45 25 f3 | 05 14 6e 97 6f c2 39 be ff eb 0d 21 64 ca 63 97 | 3b d9 cf d2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 06 a5 99 5f ab 55 20 b5 39 ab 53 | 31 c8 5b 7c ff 84 61 13 00 00 00 1c 00 00 40 05 | 2b 33 25 f9 c8 cb 8b a7 92 5d f6 e3 73 04 ce 77 | a4 d5 c0 8c | libevent_free: release ptr-libevent@0x7fb3600720e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338017ea0 | #686 spent 0.13 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #686 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #697 | start processing: state #697 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #697 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #697 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #697 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.222415; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.983301 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338017ea0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #697 | libevent_malloc: new ptr-libevent@0x7fb3600720e0 size 128 "road-eastnet-nonat-201" #697: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #697) | d6 28 cf ed 60 7e b1 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc b1 dd dd 9c 60 58 a9 c7 66 fb 23 cc 00 f7 04 | f9 eb 9c de 8f 73 86 22 d9 42 30 60 08 2d ef 14 | b6 50 8f 0d 43 3e 37 57 d1 c5 18 fb f8 0e 88 30 | 19 36 6b 7c 74 95 4f c4 00 aa 6d 70 5c 70 e4 1b | af 06 97 50 19 89 6c f1 77 c6 1e 80 61 54 71 33 | 94 67 d0 e4 1e d2 49 c7 d2 75 26 40 9b 38 29 7a | 39 9e 94 88 0a 9f 90 00 cf cc cd 5e 03 3f 80 c9 | 9d a6 0c 03 5a c2 81 22 47 79 c7 4e 2e 63 70 6d | 12 be 62 03 d1 4b 3b 92 59 d8 c4 10 0b e1 2c 6e | 7f 5b c2 f8 db a0 f1 b2 bc cf 2f ab d4 30 81 0b | 99 67 12 c3 46 3c 3f 42 29 aa 13 3e e8 5b 5b ab | 4a 06 c2 00 9d 12 7b ba b5 20 f9 e2 1f 9d 2f 8b | 8a b3 7d e3 d1 57 14 4c 7b d3 d9 0d 11 12 94 15 | 53 16 e5 df be 4c 89 d6 26 21 be 1f 80 ea d2 39 | 1c 6b a8 aa 75 fe 2b 99 57 d4 00 58 a5 b6 36 c0 | 15 f3 d2 55 87 c4 0d 66 47 0f 06 26 0e 04 3c 5a | 29 00 00 24 01 24 ca b1 15 4b b9 0a 03 0f 6f 65 | 30 b1 82 99 4d 99 95 24 13 7a fc 58 9a 3d 81 dd | ab d4 21 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 3d a9 82 f6 57 1d d7 c8 a4 72 46 | 84 4d cc ed 86 24 ec 99 00 00 00 1c 00 00 40 05 | 92 72 21 f5 94 19 6f 86 30 0f 49 01 9c c4 ab f1 | 49 76 f6 3d | libevent_free: release ptr-libevent@0x7fb35c0292e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #697 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #697 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb364044c30 | handling event EVENT_RETRANSMIT for parent state #689 | start processing: state #689 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #689 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #689 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #689 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.222543; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.981847 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #689 | libevent_malloc: new ptr-libevent@0x7fb35c0292e0 size 128 "road-eastnet-nonat-74" #689: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #689) | 21 56 6d 63 c6 05 f9 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 01 41 94 ac c1 3b a7 91 84 87 0b a2 a6 2a 82 7c | 5e 57 2f 03 c9 50 17 da 1f 5e 13 47 67 fa 54 af | e1 23 cd 52 df c1 70 c5 84 49 39 0b c5 51 17 f4 | cd ae 0e 3a e4 ec 94 66 23 c9 e6 22 7e 29 fd 87 | 37 38 1c ba 2e c0 60 73 13 eb ed 91 72 d4 bf 43 | 0d 48 d2 56 0c 3e 10 c8 f6 a9 5e ca ed 70 78 7a | 2d 43 f8 86 71 ad ba a9 b9 a1 81 89 e4 be b1 13 | b3 4b e8 ac 5a 2b 85 9a 9a 62 39 e6 1a 55 c2 9a | ac ed 6f 11 df 6c a9 36 a9 00 2f 5c 57 3a b9 87 | 71 1f 36 18 9d 01 e1 48 c5 c3 af 45 89 3d 96 5f | cf f8 ab 91 0e aa d2 78 b3 52 d3 de be 97 7f cc | 22 0b ca 63 0a bf 49 dd ee 6f 9a 13 ec 7b 53 68 | e0 00 32 aa ec ee 18 65 94 77 ae fc 50 83 e0 b2 | 02 cd f1 17 f7 f0 40 67 a4 a9 46 1f 31 e5 bd 59 | 77 0b f3 a9 e9 64 9d 77 4a 66 04 24 1e 03 df a8 | 95 ea 8c 8a d2 17 91 f2 54 af 53 a6 c5 e9 b2 6f | 29 00 00 24 2a 05 3d 7b 18 e9 5f 31 aa 45 2a 05 | 20 70 d9 99 68 5a eb f1 da 1e dd 98 f0 5c e4 e4 | 18 70 b6 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 08 c4 7c 53 4a 07 2c 37 8f cc 44 | c1 c2 6f ad 52 2d df e3 00 00 00 1c 00 00 40 05 | 39 71 42 f9 c8 85 a0 ba 5e c8 87 85 6f 23 eb 57 | 95 ba a1 9c | libevent_free: release ptr-libevent@0x7fb364064990 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364044c30 | #689 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #689 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab90c0 | handling event EVENT_RETRANSMIT for parent state #684 | start processing: state #684 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #684 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #684 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #684 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.222668; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.986215 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364044c30 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #684 | libevent_malloc: new ptr-libevent@0x7fb364064990 size 128 "road-eastnet-nonat-168" #684: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #684) | fe 13 79 f4 87 18 7a 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c a3 3b ab 91 aa e9 1c 1f 09 51 cd 63 31 b4 f6 | 27 05 e2 58 eb 11 21 fc 74 8b a1 04 48 38 e0 4b | 3e eb 3c 47 9f e1 28 6a f4 cf cd b0 2f 86 fe 42 | 06 be 5c 6a f3 0a ed 96 af 36 41 a8 95 43 50 86 | 62 97 ba dc 54 cc 86 ec 1a 93 e8 8c 86 bd 6a fd | 31 85 d3 58 12 be df c0 96 2f 7a 9d 76 f8 ee 26 | 9a 43 6d a6 d5 f1 30 04 83 a9 49 c2 dc d4 6a 20 | 1a a0 77 c4 16 45 81 34 61 94 d1 87 44 ee 60 b8 | 64 38 4f 17 86 f2 34 5c ce 1a ca cd cc 73 9e 4c | ad 5d 12 fe 07 4f 80 6b 47 cd 8d 28 e2 55 47 11 | 39 18 ea a9 6c bb f3 f3 0f 8d 00 15 59 01 c9 80 | dc 86 1f df 0c f8 d3 db 42 55 8e 18 b9 71 3f 72 | b9 64 4e 7e 16 72 18 aa 5b 2f 5c 3c cd 00 ea 61 | 42 52 f3 7e 53 72 7f 07 33 50 b0 ec ed 4c b3 11 | eb 58 4d b5 c5 0b 02 4d 09 d9 c0 f7 15 fe ed 15 | 67 5b c9 94 30 44 36 30 17 51 bd 8f 69 8a 1e 07 | 29 00 00 24 67 c4 83 c2 98 c0 7a 1b 9f 67 5e 99 | 8d ac fc 2a ad 63 42 f3 d0 ee 64 a2 cf 91 5e 20 | 6f 96 d3 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 82 99 d5 30 8b 22 4c 45 76 09 65 | e5 33 b6 41 67 45 7b 6a 00 00 00 1c 00 00 40 05 | c8 40 1d 53 f1 98 45 16 51 e3 1b cc 43 1f 4a 55 | 08 fa fe d9 | libevent_free: release ptr-libevent@0x7fb358073c30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab90c0 | #684 spent 0.0934 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #684 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_RETRANSMIT for parent state #700 | start processing: state #700 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #700 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #700 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #700 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.22277; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.983154 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab90c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #700 | libevent_malloc: new ptr-libevent@0x7fb358073c30 size 128 "road-eastnet-nonat-105" #700: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #700) | 00 c1 02 d2 ce 58 22 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 38 f6 d2 66 d7 37 75 8a f0 3e e3 b7 32 d6 41 | f5 9b 8f a2 62 4a c2 2b c9 04 e2 82 df 16 b1 e7 | 53 45 e9 b0 d2 33 ee 18 d1 c5 9a 70 cf 68 0f e5 | 32 d6 f3 5b 1e ba 36 1e 40 b2 2b 52 74 e4 c5 52 | da 47 f2 0c 1b a7 d1 57 3a 88 c8 c9 39 c5 dd 03 | 07 4e 94 a0 a1 1d 2c ea 30 74 62 8d 86 0a 47 96 | 6e 86 43 84 d1 9e 1d 48 ef 3c 77 aa 61 b1 d6 36 | b5 4d f7 2a 16 ea 31 f3 6f f0 30 8c 27 0f 36 c2 | 5a 32 4b 7a 99 fa 8a a2 52 1a 48 1a 84 31 7f d9 | a1 19 01 60 f3 03 bc b4 7e 3c f2 20 4b db 82 e3 | 91 8a 04 5c 39 59 a1 c6 c7 13 9b 06 59 aa 49 26 | 58 66 03 6f a1 ee ab cf 66 8f 67 f8 d0 fc b3 18 | 94 eb b8 a7 2a a8 67 57 97 49 ca 42 b2 b5 7b d2 | 6e 59 f7 fc 58 0c e9 3b 1a b2 35 58 47 0e ce 90 | a5 dc 15 a0 5d 7e 82 46 b9 36 49 bb 5b 6e 43 bf | 1e 14 f0 70 04 11 dd c3 af 14 0d 1e 44 19 e8 dc | 29 00 00 24 ee 23 8c 3a 20 c2 eb 31 90 b4 e3 3f | 38 ea ba 83 7e c0 b5 92 52 31 23 9c 2d 4d f8 74 | 94 8a 3c ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 5a 78 4c 93 64 72 5c f7 62 e1 2c | d0 64 cd 9a e4 f1 0f 34 00 00 00 1c 00 00 40 05 | f9 4f 20 e0 84 05 11 01 b8 04 b9 53 7d c7 40 89 | a2 bc 5d 64 | libevent_free: release ptr-libevent@0x7fb37006f790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | #700 spent 0.0988 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #700 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c023c10 | handling event EVENT_RETRANSMIT for parent state #698 | start processing: state #698 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #698 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #698 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #698 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.222905; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.987993 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #698 | libevent_malloc: new ptr-libevent@0x7fb37006f790 size 128 "road-eastnet-nonat-211" #698: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #698) | 21 cf dd 23 b6 bd 0a c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 b6 1b 2d 49 8c b5 f8 7a 69 c7 b2 f5 d8 79 d8 | 26 12 23 12 d2 76 1c 08 cb 2b 6c 70 8d 69 a0 f1 | 6d c2 d1 02 bc 20 a3 cf 4b db 02 4e 02 bf 9c ef | 06 4a dc 18 d2 74 58 2b 58 67 f8 e8 0a ee 59 ea | 16 9c 3c 75 07 d4 f6 13 6c 2f a8 d3 16 3a 01 5c | ab a0 57 0b d9 a8 0a 28 86 75 df b0 c3 1a 3d 57 | 9d 10 56 0c fa 92 43 8e fc 2e 85 4b ae 97 bb eb | 66 96 a0 3b 93 fb fc 3e a4 7b 85 51 68 c7 6b 35 | 6e be 0c 7d fb 30 17 ba 33 cd c8 32 b2 53 83 47 | 2e af e0 72 a9 4e 53 16 57 a9 ed 18 35 80 e6 11 | ce ef 2a 39 6c 7a 1c 80 7d 2d 86 be 0f b3 d1 2d | 8e 73 69 25 8e 2d cf 22 94 9e 26 1d 06 89 aa 00 | f6 e5 b6 1f d1 6d 2a 5a de 51 70 67 1f dc fe 84 | 10 da 29 d2 fa dc 69 4c da 42 f1 0d f5 d6 7b 01 | 9b 82 d0 81 2c ec 44 13 52 ae 3a 49 a4 a8 b1 17 | 13 9a 7a f2 8e 7c 90 d0 e4 37 60 4f 27 eb 74 fb | 29 00 00 24 c7 60 58 05 d8 38 44 75 17 ec b3 37 | 6c b6 72 ff f9 94 ef 8a 21 a9 54 7a 0f 5c 8e b8 | ba 44 9b ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 1a ed 35 4d 8e 31 1b 88 ca 39 40 | 08 de 5b cc 57 86 57 d8 00 00 00 1c 00 00 40 05 | f8 2a d9 b9 24 84 74 c8 e3 0b 5f 27 a7 30 52 df | 0f 06 8f 7c | libevent_free: release ptr-libevent@0x7fb34c059570 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c023c10 | #698 spent 0.0998 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #698 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b24700 | handling event EVENT_RETRANSMIT for parent state #577 | start processing: state #577 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #577 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #577 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #577 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.223017; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.936872 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c023c10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #577 | libevent_malloc: new ptr-libevent@0x7fb34c059570 size 128 "road-eastnet-nonat-15" #577: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #577) | 9a e9 29 4a fb ed 2f 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb 42 00 89 a8 1c aa c4 50 d8 16 0d 57 8a 4c 0c | 65 7f e4 c6 cb 70 da 12 6d e2 7e 03 21 93 d2 33 | c0 0e 36 f5 83 0c 2b 56 86 5b 5b 11 98 4d 5e 26 | 1b d6 c9 20 6f 52 e9 5a a4 2c 26 ed 04 b2 dc be | 5d ce 66 9c 58 f4 61 27 fb c1 4e 8a 69 60 4b bd | f0 4f 86 25 0f a2 2a bb fe 4f 50 ef a2 d8 d6 78 | 6c 29 24 25 fe 51 e0 6c 3a c0 fd 3f 00 f0 3a f4 | 91 32 2d e3 b6 e9 c2 02 b0 11 e2 cc 36 2c 5f 10 | d5 2c ac 60 4a b1 d5 39 16 8d 42 4d 99 5c aa 84 | 91 c9 31 b0 23 ba 96 66 57 3d 13 7c 31 a0 b2 bf | fa 79 80 3a 47 a1 84 04 8d d1 db 1f 63 3d 31 9f | 0d 65 07 7c d8 39 05 9e 48 0a ce ef 34 aa 84 80 | 97 ab 9b 1c e2 7f e7 6e d5 2d e8 2c da be dd fd | a4 36 1e 62 ea bf ea e8 63 2c 01 66 94 be 8d 91 | a8 b7 16 4e 15 f7 b4 a4 5f 2d 8d 36 c0 1c 88 7f | de 2b af 28 ec 3a 09 33 ee 83 97 d2 90 d0 8d a7 | 29 00 00 24 88 b2 79 ff 2c a8 2c 3e 30 78 3a f8 | a3 fb 41 22 e8 46 1c 6c 2e 90 10 b7 fd 31 f8 c3 | 36 1a 6c 24 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 44 a9 8d f4 0a df ee dc c8 f6 79 | 31 59 33 9e 08 98 28 4b 00 00 00 1c 00 00 40 05 | 1f 98 b4 df a5 90 16 30 b3 41 56 5d 2e 2c cf 6b | 1e d4 e3 0a | libevent_free: release ptr-libevent@0x7fb384081730 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24700 | #577 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #577 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3840318d0 | handling event EVENT_RETRANSMIT for parent state #724 | start processing: state #724 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #724 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #724 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #724 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.223157; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.98945 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #724 | libevent_malloc: new ptr-libevent@0x7fb384081730 size 128 "road-eastnet-nonat-190" #724: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #724) | d8 1c 6e 85 91 89 a3 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b de 88 5f a9 9d 9f 4a ba 73 08 37 d8 73 92 bd | 98 01 1e 07 58 d1 bd 9e 94 c8 19 b3 d8 04 89 00 | 76 aa d6 d1 63 6a 07 fa 53 c6 90 66 df e2 97 f3 | 3c d9 b0 e1 11 2a ca 4e 08 bd ce bf ec 35 bc f6 | 93 75 93 c3 27 5a 87 df ca 9f c6 0c e1 14 ca 81 | e7 91 a3 96 b7 0a 4b 1c 36 d4 88 78 ba 01 85 71 | c4 53 40 7e 7f 43 33 e9 c4 83 3e 45 df 0f c5 fa | 69 a7 38 69 b0 0f d3 83 7e 7b de 5d dd c6 e0 fb | 0b e9 aa b1 12 3e 19 c2 56 6e ba b8 9d 18 93 e8 | aa 44 6e 8a 6d be 62 4a 02 fd 73 71 b4 38 01 21 | 91 1e ce 98 c8 d0 d8 5e 38 8e 55 9c f3 8f 26 1e | d2 c2 28 3a 2e de 40 fa 17 cd 9b 8c 58 ec 62 2b | d4 b3 1f 01 98 ed 74 7d aa 00 c0 b6 32 cf 56 d0 | af 2d a5 2d b1 f9 4a 1c 18 82 b0 e3 c5 fa c0 30 | 40 7e 51 dc 60 0c a5 93 8e a7 3a 0f 04 35 78 04 | a2 3c f4 bf e9 0c bd da 36 3c 51 23 68 58 10 25 | 29 00 00 24 64 54 99 ea 39 03 03 79 05 41 c1 1e | 77 53 cd 84 bf 45 30 cc a5 b0 b5 0a 02 05 58 10 | 79 31 ef cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 23 c5 7e 24 d1 34 b2 de b7 23 38 | 86 97 29 8a 57 94 13 c1 00 00 00 1c 00 00 40 05 | ca f2 42 8a 65 1e 49 7e c6 31 6f 76 92 ca b3 81 | 65 f9 d2 13 | libevent_free: release ptr-libevent@0x7fb36c077c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840318d0 | #724 spent 0.135 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #724 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a45350 | handling event EVENT_RETRANSMIT for parent state #734 | start processing: state #734 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #734 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #734 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #734 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.223306; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.995417 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840318d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #734 | libevent_malloc: new ptr-libevent@0x7fb36c077c70 size 128 "road-eastnet-nonat-174" #734: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #734) | 14 ad 8f c6 54 da 73 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 2f 5d 76 c2 4f 1f 02 6a 67 83 af 07 ab a2 bd | 9d b0 56 b4 74 93 21 23 d5 0f 1b 1a 3c 05 90 db | 39 cd bb c0 0f 27 b0 be e7 30 10 fc 0c d6 85 d9 | f5 60 17 39 55 ca cb 5e 73 d2 3f be 8a 82 60 c9 | e1 41 42 b2 6e 78 88 06 40 0c 17 95 c2 17 27 23 | 90 bd f0 73 5c ee cb d6 c6 aa 04 22 1d c0 10 38 | fb 77 ae 2f 0a 4f c0 01 c1 29 59 fe 35 87 fe 76 | 67 9f e2 74 4b ff 95 18 5f 7e 94 c6 c7 e6 07 67 | a5 35 e2 f5 32 f0 ec 4b b5 8b 9c f1 7d c8 0f 0c | 14 d9 4b c5 b9 27 1c e0 42 84 b9 a8 08 9f 75 1c | a2 e5 c6 44 e5 22 9a 7d ee 05 4e 75 55 a6 96 62 | 19 7d 76 44 2c a5 59 2c 17 a4 18 38 23 2d 1c 58 | 72 f3 bb 2e 0b 81 64 e9 5c 10 3e 22 02 85 a0 c4 | 22 29 f1 c6 45 f2 7a 20 5c 0e de 01 c6 aa e1 c8 | 76 a4 85 5f 79 3f 64 df 47 3f dc 65 47 83 a7 3a | c4 4e f9 47 98 cb 9d 5b c7 13 e3 7c ce 08 53 f9 | 29 00 00 24 f6 bf c4 84 2e cb dd 02 8e 3f e7 e1 | fb 91 00 da cb 72 7d c0 8f b1 0e f4 82 ab 9b 50 | c3 13 1d b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac e5 9c 84 e2 ae 2e 54 0f 4c a4 7c | d6 9a 1b 89 f2 f4 09 5b 00 00 00 1c 00 00 40 05 | fb 5a 36 f0 d4 c4 17 31 be e2 a0 e0 6f e2 a5 d0 | eb e9 f5 19 | libevent_free: release ptr-libevent@0x7fb33808a5d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45350 | #734 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #734 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #739 | start processing: state #739 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #739 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #739 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #739 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.223448; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000604 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45350 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #739 | libevent_malloc: new ptr-libevent@0x7fb33808a5d0 size 128 "road-eastnet-nonat-224" #739: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #739) | df 19 f5 78 1f 7f 61 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 b4 0b bb a9 64 88 87 98 2f cf 2f 72 90 24 8e | 27 68 e4 41 53 39 08 7e 9a 9d 01 79 8c 46 b5 7e | 94 53 70 3e b0 27 b2 82 8a 26 9d e8 0b 19 4b 92 | 2b 7d b3 c3 c4 b5 0b 70 2b 92 ac 96 4c 0c 66 2f | d2 61 eb 15 ed 06 25 36 5e 2a 3f a8 42 0d d0 94 | ae 7d 6f 48 35 8f 38 64 d1 29 e3 a9 12 a1 3b 9a | 37 6f f0 36 59 2c 69 bd c2 85 29 7c f5 fb fd db | 33 21 05 b9 47 40 46 26 f2 67 5e de 98 c9 70 43 | 38 06 63 f6 fd d0 82 9d 53 05 3c 2c 8e 1c cc 05 | 21 99 f3 4f 03 c8 cd 4f 9b 06 f6 fa f8 36 e3 35 | 25 9b ee fa bd e1 7b 3c 24 42 c1 43 67 a4 52 26 | c9 ad a5 ca 68 eb 61 44 9f 85 d4 ad 39 d3 08 f8 | 0c 18 de 7d 80 97 a9 b0 17 1e dc 70 64 63 2c 0d | bd e4 be 7a df c7 e0 58 87 37 3d c3 42 94 6e f1 | 48 66 02 c3 74 33 ab 1e 5e 12 8d 34 8d 1f 0b 16 | f3 77 bb 3c fe eb 42 5e 87 af e0 78 62 33 b9 fc | 29 00 00 24 fc 37 68 c7 2d 53 22 1d 51 4a 71 4e | 46 28 97 f7 6a 0d 4a 96 60 fa 96 05 69 86 9a bc | f2 f0 69 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e0 2a f2 c4 e2 df 1f 60 02 ec 7a 42 | 09 ed ca d8 77 e1 6d 1c 00 00 00 1c 00 00 40 05 | 4f 71 3a 48 ff b5 1c f9 41 72 89 68 75 9e 7b ee | 5e b8 7a 66 | libevent_free: release ptr-libevent@0x7fb370074f70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #739 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #739 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a86b80 | handling event EVENT_RETRANSMIT for parent state #744 | start processing: state #744 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #744 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #744 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #744 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.223558; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001618 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #744 | libevent_malloc: new ptr-libevent@0x7fb370074f70 size 128 "road-eastnet-nonat-209" #744: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #744) | ea 7c f7 bc 9d b4 d4 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 10 35 c8 dc d8 d8 41 53 59 49 7c 7b 44 aa 05 | 7f 67 fe c6 28 2a e8 7b 99 25 f4 0d 41 65 04 49 | 3f a5 ca 32 7e 94 c7 70 6b d5 d7 5f 8a d3 f2 1c | ca 3a c9 ae 29 50 6e c5 9c 99 e5 19 7a ca 2b 5a | 20 96 8c 54 9e 1b 8d 21 df 3d 1c ae a9 b2 f2 dd | 61 db 05 94 26 c0 73 9c 28 14 1e b4 32 df 8d 11 | 60 18 79 0a 1f bd 12 12 40 ca a3 c4 d1 34 dc 28 | d8 6d 71 58 2c 9e 25 5c f3 a4 a3 a1 e0 08 9d 79 | a3 8b f2 2f 94 27 6a 94 a9 dd 70 db ec f6 52 82 | 6e 5a 66 cc 95 16 57 c1 a4 fd 5b c3 f0 1d 4f 6e | a7 3b 22 2a eb 3b 0c f6 18 dc ec 5e 03 2f 91 2c | 65 23 6f 5e 2b 65 fa e2 5b 10 85 ee 91 82 62 ff | 39 4e e7 48 1f 63 84 b9 93 73 90 ab e3 44 21 75 | 99 ff ff 9a 14 1d 56 ee 54 ba 7e 72 40 d2 9e 35 | 7d d1 3f 98 ac 5b e2 19 e4 12 13 62 7d 18 8e 06 | 2d 61 f4 df a4 3e 70 b2 f5 55 a5 83 ab 24 20 04 | 29 00 00 24 05 e4 d5 07 4d b5 53 19 e9 74 fb 1f | 81 a4 d4 c0 b2 e7 21 de 08 06 9a f0 79 05 4e 6b | 6b 45 0a 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 6d 3b fc 06 c6 19 b7 65 37 87 f1 | 00 58 b3 97 c1 ac 1d 38 00 00 00 1c 00 00 40 05 | 84 2a 82 65 99 0a c2 da 62 53 b8 d5 7c fd d4 dd | e5 91 5e 42 | libevent_free: release ptr-libevent@0x7fb3800907b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a86b80 | #744 spent 0.112 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #744 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37801d970 | handling event EVENT_RETRANSMIT for parent state #561 | start processing: state #561 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #561 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #561 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #561 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.223682; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.932656 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a86b80 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #561 | libevent_malloc: new ptr-libevent@0x7fb3800907b0 size 128 "road-eastnet-nonat-90" #561: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #561) | e6 ce b9 a0 0a 53 1e 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 46 f6 a4 7c 90 e0 c9 d2 85 20 8f b5 1d b7 c4 | f8 f3 b0 78 b0 d2 51 66 8d 4a d8 59 6d 49 84 64 | 71 ab fb f5 bc b5 f0 e8 d0 77 d4 03 41 0e 1e 4a | d9 b5 75 25 c4 92 0a 2d 74 4a 0c 20 47 6f 34 56 | 44 56 ce da b3 ab 68 a5 91 66 d6 77 00 6b 23 58 | fc e6 d4 0e 5a 52 c1 f1 b5 a0 ad 99 57 15 c5 c2 | d9 2b c3 74 d2 ab 4d 6c 38 2b a8 54 f1 10 ea 73 | f7 f3 1a 1a 0b 20 27 ed ef 90 9d 0b e4 63 64 46 | f5 cd 8e 24 f9 d7 d2 7f 96 cc 6d 0d 85 5e 94 0f | a9 4e 5e ec c5 1b 6b ba 38 a5 5a dc af bc 4a 97 | 01 2b d3 7d e0 00 45 8b 2a 4c 3a 26 e1 bd 65 ba | 43 5f a9 bd 57 50 f2 28 5b 00 4d 82 f3 42 f1 e0 | 6d 90 d6 4d 3a f9 fb 23 4e 48 bf 3a cc 34 f4 a3 | 43 3c 8d ad f0 9a db e2 a8 69 3f f5 2a 3e f3 dc | 27 48 23 01 97 ea 7c bc 0d a2 a2 b0 86 ec 2e 00 | 77 3a 8c 7d fc a5 d4 fd 81 85 16 b0 ff 6b 0e b5 | 29 00 00 24 c5 97 1a 8b 29 e3 3d 7a 27 0d 40 2f | 83 32 ae 98 8d 84 ac e2 dc ec 7a 49 5f 8b 56 23 | eb 72 f0 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 04 bc 5d f6 1e a1 6a 54 c3 1f 21 fe | 90 fc 7d b7 bf 9c 0e ab 00 00 00 1c 00 00 40 05 | a1 82 14 e7 88 f7 7d ff e6 10 b0 c3 6f d3 95 fd | 16 ba 74 48 | libevent_free: release ptr-libevent@0x7fb344069ec0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37801d970 | #561 spent 0.109 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #561 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #687 | start processing: state #687 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #687 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #687 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #687 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.223806; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.004071 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37801d970 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #687 | libevent_malloc: new ptr-libevent@0x7fb344069ec0 size 128 "road-eastnet-nonat-117" #687: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #687) | ce 83 a7 9c 1c 97 2e 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 94 51 72 79 a4 28 3a f0 f6 12 68 84 e5 2d d5 | f6 aa 47 a0 d1 ff f5 a6 1a 2c 25 a6 01 58 40 fc | d1 95 56 17 97 c4 d8 d7 89 0f 51 18 3b 4c 8d f6 | ee fb ab 56 d0 0a 15 fd 6a c8 e8 89 62 5e b8 5c | 57 fe 05 8e e1 ea c9 e7 84 08 05 71 31 9a dd 16 | 0a 25 f1 1a 29 58 f8 06 86 68 fa fc 99 8b 12 42 | 09 ec 17 e1 a1 09 76 fc 53 b2 55 2f 51 28 14 aa | bc fd 76 5f c5 9a ba 18 29 7b 2d ad 6a bf 47 24 | 5d a5 36 0f 60 68 25 fb f2 8e 9c 88 47 ac 61 32 | b1 6f 1c e3 4c ea 94 2e 13 72 9f 40 c9 32 9e a5 | 55 17 b5 71 af 30 28 4f 48 dd 3d 1c db eb 87 a6 | 1e c2 d8 26 0c 79 1d 68 4b e4 5c 9d 70 1e da cb | bf 7a 87 cd ee 4f da f1 be 6f bd 22 fa fe fa e8 | 01 cf f5 ed 00 5b 60 c2 39 47 45 cf d8 5c e9 07 | 6f 88 d8 c1 70 38 c4 08 e2 b7 20 9d fc 6d 35 32 | 43 d1 2a f8 21 b9 12 49 96 d5 3b 06 a1 81 56 f4 | 29 00 00 24 90 27 10 b2 cf 6a 00 ae d3 c4 a0 c5 | 23 4c 05 8c fe 6e fb 12 c4 ef 71 e8 a5 33 dc 9a | 79 4a a8 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 e8 b6 32 ca 26 78 2c d2 a8 a0 44 | d4 75 0b 9e 75 b6 57 86 00 00 00 1c 00 00 40 05 | c5 19 67 c6 b1 38 40 1d 0b 22 02 fd ab 47 ee cb | 20 29 33 72 | libevent_free: release ptr-libevent@0x7fb34407a660 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | #687 spent 0.0721 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #687 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368040840 | handling event EVENT_RETRANSMIT for parent state #738 | start processing: state #738 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #738 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #738 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #738 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.22388; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.004748 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #738 | libevent_malloc: new ptr-libevent@0x7fb34407a660 size 128 "road-eastnet-nonat-228" #738: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #738) | 25 78 f8 28 10 61 9d 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 51 72 b7 05 5e 83 a3 a0 07 12 24 3e 92 83 b8 | 62 3a f9 f5 51 87 2b 5b 57 43 01 a4 66 eb 6e d1 | 36 fd bc d6 d3 df 99 92 4a 90 d6 55 13 f9 57 37 | 57 21 91 58 59 45 7b fa 72 46 a4 36 22 6f 56 d8 | b6 6d e1 0f 87 84 b3 2d 12 ce f5 5a 2e d2 8f f7 | 2b 01 97 28 81 dc 2a 4f 14 69 dc 31 63 bc a5 23 | 42 8f 99 35 ae 7a 8d f1 f8 fc 1d a7 d5 69 74 4b | 4e 98 fb 39 77 73 f9 c2 8d 2f 88 65 14 8e 49 62 | b0 f1 74 23 17 c0 59 7f 25 06 94 30 cb 35 da 14 | 1a 23 e5 07 95 80 6a cb a7 fe d0 d5 8a 1f 10 96 | bf ab f1 96 54 c3 82 d2 6e 6d 0c 64 bb 6a 3c 73 | 83 0b fd 52 5c d9 5e a3 74 f9 c3 2b 08 19 82 dd | c6 8e eb 37 6d 26 f4 d6 e5 ff ff bd 35 5a 0e 11 | 00 7d 5a 8c 85 d6 d6 a8 98 8a 86 a2 3a 0b 85 a4 | c6 6f 0c 94 ab 7b d2 e2 18 f7 d7 59 10 f4 62 a1 | f4 5c 31 8a df 18 a0 2b 20 3b 40 bf 17 df 1d d5 | 29 00 00 24 97 c7 a3 d7 59 e9 31 22 90 b1 59 6b | 1f 7e 8d 5c 35 7a 89 f4 a1 7c 76 7f ab 92 a2 52 | c8 bf 0f 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 91 a4 00 33 c0 fc 8b 25 9b dc 30 | 06 39 ac a5 a1 25 3d b9 00 00 00 1c 00 00 40 05 | ba 61 e3 c1 d1 2b 93 b6 88 33 74 02 de a9 63 56 | ec 2a 1e 1d | libevent_free: release ptr-libevent@0x7fb36409b8a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368040840 | #738 spent 0.0646 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #738 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad4380 | handling event EVENT_RETRANSMIT for parent state #711 | start processing: state #711 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #711 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #711 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #711 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.223952; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.993925 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368040840 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #711 | libevent_malloc: new ptr-libevent@0x7fb36409b8a0 size 128 "road-eastnet-nonat-186" #711: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #711) | 46 de dd ae 1b 33 3b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1e fb f8 69 eb 92 56 fa e8 6b 80 bd 3a a2 f1 5d | e2 2f 9e d6 bd 7f 97 c8 b3 8b 02 5b 38 41 e1 ee | 42 a6 3c b3 1b 0e f8 ed 2c 61 73 24 75 ee ff 11 | 80 e8 65 c5 04 0b 39 c2 cf a9 e0 e7 ea b8 69 59 | 88 22 65 ae 2e 6e ce 7a 3b 8e 9b 5b ae 73 1c 45 | a6 ad 6e ff 7d ee 57 ae 75 fe db 29 33 14 d8 3e | 84 01 d5 70 75 bc 33 43 cd 9a a0 3d 7a fa c8 fc | 80 64 21 7f 34 0e a8 e0 72 05 42 a2 8e f8 64 07 | 62 20 d0 e7 cc 2d 35 50 67 31 52 27 ea 4a 4b f5 | 65 1f c8 ad 67 9b 47 53 9b 2a 89 ab 3e 19 8c 26 | e6 31 27 4a fe b0 71 d9 94 76 e6 64 92 ba 3e 1f | 40 a8 76 db 49 ed 4d 4e 20 ff 29 d6 24 a3 26 db | a5 a9 f6 f0 13 de f5 16 c5 c8 94 6b 66 f0 42 99 | 03 d4 dd a2 4b 2b 63 3c 83 09 26 b0 bf 90 c2 8e | ca 70 e7 02 59 40 bb 5d a0 d8 f9 cd ca 9c 92 09 | 26 05 b9 92 8a d9 e6 4b fa 8a 50 3c b1 69 e2 b7 | 29 00 00 24 c3 2e 34 07 d1 26 64 7f 7d a5 2a e0 | 34 43 1a f1 ce 3a 79 7d 9c a6 d5 be 0a 57 a8 05 | ad df 51 bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 81 0e 00 c8 04 84 dc 32 f7 ff 89 | 08 01 7a 69 9d 96 cf 86 00 00 00 1c 00 00 40 05 | 8b 19 f6 3c e3 44 56 e8 bd d2 d9 5b 06 2a 9c bc | df fe 2c 91 | libevent_free: release ptr-libevent@0x7fb37405f150 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad4380 | #711 spent 0.0641 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #711 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad8480 | handling event EVENT_RETRANSMIT for parent state #585 | start processing: state #585 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #585 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #585 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #585 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.224024; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.936182 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad4380 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #585 | libevent_malloc: new ptr-libevent@0x7fb37405f150 size 128 "road-eastnet-nonat-56" #585: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #585) | 4a 2d 06 a5 9b 4b 99 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 29 a0 67 33 95 5c 1d b9 11 2a c0 eb 4e 4c a9 | e0 4a 90 97 d9 14 6c 5c fa c2 84 25 94 ed 30 2a | b0 88 7c 51 d2 d7 ff 29 a2 e1 b8 25 0b 85 ce b7 | b2 12 f6 3a bd 7c d3 5e 0a ae 7c e5 dc a9 b5 e0 | b1 73 f8 5b c6 30 50 76 ab ce 7d 60 1b 21 f2 24 | de 59 93 e2 2f 8b 16 ba cb 3a 00 66 a1 42 8c d0 | f2 69 c8 bd a5 c5 17 99 23 d2 e7 08 52 58 cf 46 | 18 6a 5f de 56 35 01 8c d2 ff 97 28 1d 1b bb 92 | 48 6c 2a ec 7b 82 4c 83 40 17 8c 13 5d fb 0c ea | df 44 dc d0 94 b6 10 69 f9 90 b9 8d ee 30 ce 05 | e3 86 29 c2 e5 c6 ce 54 2b ff d1 3d 10 ca 32 02 | 12 72 23 d7 dd b3 7f b0 17 38 2e 43 6c 10 4a 0f | 86 3b b1 4d 71 cb 29 6b f7 89 2e 9c f1 20 88 1c | 84 7f 4a a5 ce 80 ec a8 9e f2 52 7b 0c bb 09 70 | c6 d1 fd 42 0e b3 07 8b 67 74 82 05 59 36 9e 22 | c4 7c b2 4e 57 7b 68 cc 85 67 3b 47 1f 9f c7 67 | 29 00 00 24 28 e8 a9 33 f5 cb ea 77 ac 0a f0 23 | 81 90 3e d5 9d e8 ea 75 7c 29 f7 bb ce e1 94 cc | 81 10 ca e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e1 7f 8b 08 d1 d7 03 c9 45 07 dd 1c | f2 db 4d da 97 13 01 ed 00 00 00 1c 00 00 40 05 | 1b 39 fc df 1f 4f 07 bc 04 62 76 b3 b9 a8 ed 18 | a7 41 03 5e | libevent_free: release ptr-libevent@0x7fb3680752a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad8480 | #585 spent 0.0806 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #585 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35400d120 | handling event EVENT_RETRANSMIT for parent state #742 | start processing: state #742 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #742 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #742 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #742 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.22413; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.002903 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad8480 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #742 | libevent_malloc: new ptr-libevent@0x7fb3680752a0 size 128 "road-eastnet-nonat-202" #742: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #742) | ab 34 f4 95 81 ed c2 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f7 98 46 2a 24 70 ac 92 50 50 f4 c2 b5 d5 f7 0a | d6 9e b1 7a 3e ed 98 33 3d ee f7 e3 13 87 69 c1 | b4 a2 57 16 53 d7 41 79 86 3b 2e a4 e6 52 7a 6e | 0b 74 58 0e 45 35 85 36 77 6b b0 71 9d 4d a2 91 | 8f b5 9e 28 e8 62 a3 5a fa 45 28 9c d1 6e 96 06 | 43 8c 31 83 80 4b 1a d0 1a 86 ab ce 70 87 d8 60 | 2f 53 50 9f 1c f0 aa 40 e7 82 42 00 ef ac c6 cd | 59 7e ba 8e d2 08 a8 07 ab e8 d4 09 1a 34 ae b7 | 19 6a 93 47 39 54 0e c1 ff ba c1 49 16 e9 84 6d | e4 d4 28 20 7f bb 1c 5a 50 ad ff 27 bb 53 3a 4c | fe f2 c6 66 38 c9 62 25 57 6b 7d ae 6f 82 66 61 | 8d 1d 48 cd 44 50 c2 df 28 86 79 e8 45 6e a1 90 | 4c 22 91 9e dc b2 7e 6c 6c e6 a2 de 0a 17 03 3b | bc 26 ef 26 39 74 28 83 5b 3a fc 73 ca d0 c6 57 | 8a 02 2c 0e 18 5b 99 8c aa fa 43 b4 a9 f7 75 31 | 51 42 a8 eb be 2e 35 d9 44 1d 6b bc c5 2f 8c 87 | 29 00 00 24 01 dd 2f e6 eb 4b af 32 1c 79 d4 4c | 09 c2 78 82 23 70 b2 bb 85 ac f9 94 71 a9 92 05 | d7 ca 31 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 97 94 2c 62 c6 59 3e 48 9c 81 ce | 06 c1 b8 e1 6f 64 53 c0 00 00 00 1c 00 00 40 05 | 6e fc 22 43 8c 0a 59 5f b4 df 17 9d e0 72 a9 ba | 64 42 3f 26 | libevent_free: release ptr-libevent@0x7fb38406b790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400d120 | #742 spent 0.0877 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #742 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c044df0 | handling event EVENT_RETRANSMIT for parent state #654 | start processing: state #654 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #654 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #654 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #654 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.224238; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.962355 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #654 | libevent_malloc: new ptr-libevent@0x7fb38406b790 size 128 "road-eastnet-nonat-112" #654: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #654) | 5e ee 0b 7f 6c a7 3a d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 66 e0 d6 d9 72 ba 46 dd 41 a1 46 b3 25 74 d2 | be 07 06 6c f4 38 9a a1 39 17 cd 0b c4 41 e6 86 | ab 2b bd 9b 4e 50 c3 68 a9 fd 5d 77 07 79 12 d7 | 06 ad c7 3b 19 6e 8f 00 bd 88 b3 27 81 06 f1 46 | b7 d7 a4 24 f6 8a 13 f3 63 a6 44 01 04 ef fd 32 | 85 cb bb e9 d7 ec f5 ec 83 a6 6e d9 b1 33 b3 d5 | d8 12 93 9e 27 25 43 b4 f4 9d 5a 4e 0d cb 7f c7 | ad a0 26 f4 7f 25 7c d9 9a ca 52 6e 2d 83 33 d3 | 5b 0c 44 4d 72 d8 0d c3 65 63 57 17 10 5e 19 0d | 88 04 84 34 7e 42 22 cf c0 6f 9d 86 b6 ed ec 5f | 38 0f 13 28 f6 f9 d2 d2 9a ad 59 58 25 e5 63 dd | e3 7b 38 03 55 37 74 26 61 f2 62 84 61 8e c1 fd | 89 ae b9 7c 2a 19 e2 22 2f b0 2c c7 27 de 4f cb | fd 3c f5 3f fd dd 17 5e 7f 7a 64 3f d9 af d0 1d | f0 55 35 5d d7 34 3d 74 24 8b 4f 0e 99 f6 c3 2d | 66 87 8b da e2 d5 ca 1a 2a 24 b1 4b 3d ff 64 ec | 29 00 00 24 97 bb 4a bf d9 e5 95 75 3b a3 86 b3 | f1 af 1a 0c 45 88 7e 17 0a 91 a5 72 56 0e fd 8c | e1 a9 d3 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e 88 f8 b3 f2 90 3f 3b ff 2b 5c 52 | 75 9a 83 d7 14 17 86 77 00 00 00 1c 00 00 40 05 | 2e 13 0c e6 eb 5b 95 e2 c9 2a b6 07 89 5a 9a 41 | 93 58 82 e2 | libevent_free: release ptr-libevent@0x7fb34c064430 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c044df0 | #654 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #654 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350014cc0 | handling event EVENT_RETRANSMIT for parent state #645 | start processing: state #645 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #645 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #645 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #645 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.224348; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.967482 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c044df0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #645 | libevent_malloc: new ptr-libevent@0x7fb34c064430 size 128 "road-eastnet-nonat-159" #645: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #645) | 0c 20 e9 c8 f1 ce 0d 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 8a 31 6e 84 8e ee 47 80 28 3e f7 bd 66 21 ae | a7 c9 66 e4 9c 35 61 f1 16 0f 1c cb 4f 8c 10 bf | 6e 35 2d be 88 b3 9e db c6 d4 0b 4b 1b d6 0f 24 | 0a 6c 6d be b6 de bc 90 ef 4c db b4 25 2b dc 87 | 6c 61 9d 02 4b ca cb c9 34 ad 89 73 4a df 91 ac | 37 e5 30 b7 38 08 c4 2c f4 c1 86 fe 1b b2 22 0b | ce d5 26 69 30 72 a1 b3 13 e0 7e 3f 95 c8 13 b6 | b2 52 42 87 85 da fd 89 fa ba 74 99 7e b0 e8 a5 | d9 b4 d7 c1 b8 d7 f9 52 8c 9d dd 2b fb 3e 32 c1 | 2a f7 f7 b1 ed 12 09 66 4c 2e 36 a5 31 5d 4c 2b | dd 02 ec 82 7d 54 39 7e 27 68 b2 8f ba 6c 9c 64 | e4 b1 54 a4 a9 83 73 da 3c f1 13 e7 c4 83 f9 34 | 4e 29 e4 9b 2c 98 6b 6d 2d 9b 19 b8 a0 13 da 3a | a2 7b d4 a1 cd 5e e2 80 01 c5 9e 85 09 f9 cc 94 | 06 6d 1b 4d b0 af 7d d7 8a af 03 99 b8 54 31 fd | 25 b5 36 4d e2 31 2f 3f 37 34 3b 6c c1 28 54 50 | 29 00 00 24 ea 84 61 f6 e2 d9 2b 57 d4 d8 53 44 | 1c d8 bc 14 a4 bf f6 76 ae 29 c0 89 c3 03 25 b0 | 65 0c c5 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0d bc 72 fe 0b 7e b4 5c e5 5d 2f 13 | cc b7 37 44 34 e3 88 7a 00 00 00 1c 00 00 40 05 | bf 80 a0 4f d4 d4 cc 7e 5e 5a ae 95 22 cc 4e 94 | a3 26 fc 44 | libevent_free: release ptr-libevent@0x7fb36806a2e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350014cc0 | #645 spent 0.14 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #645 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c017ea0 | handling event EVENT_RETRANSMIT for parent state #664 | start processing: state #664 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #664 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #664 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #664 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.224516; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.970448 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350014cc0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #664 | libevent_malloc: new ptr-libevent@0x7fb36806a2e0 size 128 "road-eastnet-nonat-123" #664: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #664) | 9a a8 29 98 c3 de 5a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a d8 e3 37 12 b2 ef d1 da f8 45 1f e4 d1 c2 83 | bd a0 b4 7d 46 7a 1d 21 e7 39 76 71 00 55 ce 6f | f0 be cb 41 93 48 b1 e6 9b a0 dc 26 bf 39 0e 5e | e2 b9 8f 3d 51 d2 55 33 8b 98 1f 57 b7 08 6b 49 | 47 a3 42 1c c7 26 45 fd 43 8f 8a e4 32 11 da b4 | 60 41 cc d6 cb 7c cf 3c cf 62 25 19 cb 5f 50 b0 | 66 1f 87 29 8a 25 50 d2 76 81 60 2d c0 1a fa e4 | 44 6f 51 82 a1 8e 22 65 3d c7 77 00 d7 5d 66 3b | 34 e2 14 f5 00 89 95 83 41 4f 2f 17 fd 8a d0 82 | f4 75 70 eb 12 8d 3f e0 49 82 73 ea 26 fb 10 63 | 49 47 94 a5 80 94 4f 74 c7 e2 49 81 51 fe 91 b7 | ae a2 9c 0f 74 e3 9e 7c d9 1b 46 f6 50 85 9b 34 | 44 96 a8 da 7c 30 fa 27 4e 96 53 c6 da 8d 0b 8d | cd 2a 37 df f6 0b 7f d5 79 cf a5 8a 18 bf 15 d7 | 2b 16 dc 57 cd 3e 9a b4 b1 6c bf 76 41 2e dd 85 | 20 be 9a b5 82 7e bd 21 3e d7 a0 f1 0d c4 17 21 | 29 00 00 24 8d 10 93 7b d2 8b c4 8f 3e a4 09 2d | 41 e1 82 de 20 3b ef 97 ec 41 fd bf 52 be eb a2 | 8c 94 3b 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 9d a1 e9 3f f2 d8 36 8a db 54 8a | 88 a2 97 6f 50 ce f2 f2 00 00 00 1c 00 00 40 05 | 52 96 33 a1 e3 08 31 cd ae c8 55 ef af 0a fa 55 | 48 74 e2 3c | libevent_free: release ptr-libevent@0x7fb35407ff20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c017ea0 | #664 spent 0.123 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #664 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358012630 | handling event EVENT_RETRANSMIT for parent state #747 | start processing: state #747 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #747 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #747 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #747 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.224638; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.00648 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #747 | libevent_malloc: new ptr-libevent@0x7fb35407ff20 size 128 "road-eastnet-nonat-248" #747: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #747) | a6 bf d2 f8 ac 64 24 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a 1f 62 98 e1 72 89 4a 9e 5e 9d f8 09 50 e0 d2 | 9c 18 ca 9e 95 27 4b 63 4a 5a 0f ea 35 ee 0f 6e | 09 6d 2d ee e2 2e 30 c8 5c e6 23 10 bb dd 92 c4 | a1 94 38 18 f7 1a bb b7 fe 7a 6c 77 66 08 c9 a3 | d7 20 9b 83 e3 5e fd c7 c5 b8 d7 cb db 7b 13 a8 | e4 16 a2 a7 f8 77 c7 96 cb c4 f8 c4 e8 5e bc b6 | 11 12 e0 0a e1 e2 98 ca 3c d6 c9 36 5d 1b 6d d8 | ff 68 5a 03 20 ef cc 43 d1 3a 80 e8 6b ca bf 39 | 66 da f5 51 9f dd 65 c6 1b 01 2d cd e7 68 f6 a3 | fc e3 5a 6a e7 8a 74 f2 c5 47 be 6f cb b2 de 7b | 5c ef 73 4e 74 52 3d 7e 7d 97 04 e7 a1 bc 8c 22 | 0b 61 ff ba 39 29 86 ab 04 59 61 fd e9 7a 43 97 | a9 8d dc 37 09 a9 62 1f 96 7a 92 bc 5d 63 69 61 | 33 36 28 54 06 b6 87 43 c9 0d 56 0e 50 ad e6 24 | b5 8c cd 7b ea 80 41 db a4 b3 86 9b c4 b0 37 e4 | a5 6b ef 42 4a f6 29 75 47 2b 95 cd de 0e 06 20 | 29 00 00 24 72 d2 2d f3 46 d8 fb e8 18 14 33 bc | 59 89 85 ec f1 52 25 c8 16 b1 28 1b 77 62 97 7d | df 82 b5 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 63 d7 f3 34 77 99 12 4c 20 15 9c | 7c fd ab a4 f7 0f 03 52 00 00 00 1c 00 00 40 05 | bd ec 71 30 dd 4a a7 e6 ea 65 3f b5 e2 da 2c 35 | bf 9d 55 db | libevent_free: release ptr-libevent@0x7fb35c0a0a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358012630 | #747 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #747 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb384038200 | handling event EVENT_RETRANSMIT for parent state #633 | start processing: state #633 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #633 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #633 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #633 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.224757; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.9578 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358012630 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #633 | libevent_malloc: new ptr-libevent@0x7fb35c0a0a80 size 128 "road-eastnet-nonat-72" #633: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #633) | 8a 84 ad af 01 bc 2c c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 25 a4 2a 19 32 bd a1 aa 5d f2 a6 fc 02 2e d5 | 33 ef 4f d1 9c ba fd 65 26 89 b0 76 98 b1 0a 73 | 0b 6d cf 55 32 b0 a8 c3 0d ed 7f 57 3e c4 09 bf | 8e 3e 0d 52 2e 51 26 3d 83 ba 75 87 bf d4 84 39 | a3 f5 4f e1 81 37 40 32 c2 92 5c 7d cd 5a 01 0d | 89 3e 2b dc 37 3d ff de 20 7a cf 8d ba 1e bf 39 | 3f 0b 59 4c 6d 53 3d 85 05 4f cb 7e 6f ec 84 0e | 3b 89 0d 17 39 96 b1 02 d7 7f ec 25 df 6e 69 98 | c8 c3 02 da a9 fd 5f ba 17 59 e0 f1 d0 67 1c 1e | 0e 5d 3a 2a 95 01 f3 4d 4f 33 98 c7 f4 d2 19 43 | 9b 8e 04 5a 6e 98 a7 91 3d c3 66 01 66 da 39 f1 | eb 10 86 db 4c d5 5d e9 1d ea cb f5 8e 90 23 18 | ed f2 37 09 1a 5d 54 50 41 f5 c4 c4 ca fb 8f 9b | f6 29 c4 e8 d3 47 fd 3d 80 73 a9 55 47 1b bc 7c | 8f b9 ec 7f e6 92 93 61 f4 fb 2e 1c e7 a7 98 52 | 7b b4 1d c6 f1 3d a2 94 00 52 e4 8a 62 1f 4c b8 | 29 00 00 24 89 c4 76 da 63 15 ff 10 2a 9e ce 01 | ec ae 76 ed 0e 33 67 47 23 3b 30 6c 5b 8b fd b9 | a5 68 00 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 70 6c 0c d5 a6 51 1a 4a 89 fd d4 | db 2f 8d 82 0e c5 0a 69 00 00 00 1c 00 00 40 05 | c8 f8 ac 25 9c d4 cc 0a 20 2d 68 79 d5 c6 b3 9a | 28 b4 88 17 | libevent_free: release ptr-libevent@0x7fb384054040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384038200 | #633 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #633 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46acc140 | handling event EVENT_RETRANSMIT for parent state #551 | start processing: state #551 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #551 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #551 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #551 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.224876; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.923416 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384038200 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #551 | libevent_malloc: new ptr-libevent@0x7fb384054040 size 128 "road-eastnet-nonat-54" #551: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #551) | 6d 61 08 83 3f 41 28 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 10 09 30 29 21 c1 f4 7d 5c 69 d9 0d 1d e5 ea | 5f e5 a9 db 38 23 61 5f db 1d 40 23 04 f7 e7 7f | b8 e0 a4 4d 7c 42 cf 01 84 f7 f3 90 63 0d a6 27 | 03 53 27 bf 55 c3 86 69 1e d9 34 0b ea 6d ef b8 | 91 72 41 a4 7f 9d 36 67 17 b8 f1 de c9 57 cf 25 | 96 88 4b 97 29 55 03 99 2d 0b 7d 25 6e 82 28 00 | 28 de a1 1d bf 28 3b 57 86 30 40 b9 3b b3 59 37 | b9 3b 89 a1 f7 97 44 8d 31 dc 44 99 58 00 16 65 | 19 ab 30 5f 5a 1a 94 95 50 6f 1b d2 58 f8 43 59 | 32 7b ce 9f f3 ba d6 9b 84 a1 13 0d 64 7d 87 0a | 6a cb 60 60 91 23 18 fa 0b 4c 7f 24 f7 e4 a9 1b | da 1e 22 44 6a ff fd e2 c7 3d ff ec 71 14 90 da | 2f 14 ba 4f a8 6b df 31 2c a1 a5 6a a3 1d dc f1 | 4e 14 ae 37 41 c7 58 f2 d5 00 5d 49 d0 c7 f4 76 | a0 bd 4d a8 c2 8b 1f fe b6 2f d7 91 47 6a e8 e1 | dd 7d 06 82 4d 33 80 36 54 a3 03 be 52 06 d4 cf | 29 00 00 24 c1 64 a4 63 7a bd c6 9b 19 d4 3d 64 | d3 05 1c 05 f8 31 a3 bc 62 83 1f 22 d8 12 00 d9 | 0f 94 f6 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 12 25 8d 00 b4 d4 c7 fd 0e de ae | 25 a5 ca 2c ce 50 fd 3f 00 00 00 1c 00 00 40 05 | eb 33 8d 88 55 34 43 12 f6 bf 6c 9e 03 ac c1 f8 | ae e6 a3 5e | libevent_free: release ptr-libevent@0x7fb338074f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acc140 | #551 spent 0.0974 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #551 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348018100 | handling event EVENT_RETRANSMIT for parent state #643 | start processing: state #643 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #643 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #643 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #643 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.224988; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.964636 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acc140 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #643 | libevent_malloc: new ptr-libevent@0x7fb338074f30 size 128 "road-eastnet-nonat-86" #643: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #643) | a4 7a 0a 38 ed 45 0a 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 1b 74 d4 2c dc 83 3a 41 1b 72 93 cd d9 99 ab | a5 3d 31 f7 6e ad 24 72 35 2c 08 59 f7 85 55 ca | 70 bd b6 2e 52 cf ef d1 e9 0c c9 34 5b cf 85 8d | 51 9c e8 d0 53 f9 5f 56 af 23 8b 00 bf 41 f6 62 | 6a 4a d5 2e 51 34 77 b7 47 63 d2 86 3b 81 3e f3 | 91 0f a1 86 aa 34 df 5a 12 54 be 0c ac c3 1e 9f | 58 01 81 17 a2 3b 0b 37 4c 53 7d 23 99 d9 8f ea | f2 0b c5 cd 0a e8 e2 66 37 ad e8 1d 0c de 9c e2 | dd e7 b6 c4 7e c8 77 b9 f2 ed e4 1a d3 c9 66 b6 | 83 5d e5 e8 44 a9 37 6d 05 50 25 5a a4 01 51 b3 | 8f 5f 9b 9b c2 94 66 43 f2 03 b2 0d 87 c8 04 67 | bc cc ed 06 fe 82 6a 3f 3b 17 39 2b 40 cb f6 e0 | 43 79 fe 36 4a 20 93 44 8d 77 96 8a 0b 1e 19 08 | d9 d7 07 85 61 29 11 e7 11 41 78 7c e2 10 eb ac | ba 26 45 60 58 71 fa 59 c0 d3 9c 73 92 fb fa 39 | c8 c4 cb fb 8a ec 6d 5d e5 9d 4b b8 1c c2 a8 39 | 29 00 00 24 57 52 8d 13 2d 29 b3 5e 46 06 e9 1d | 1e 46 ed 46 2e 59 41 8d f8 dd 75 32 e3 62 89 bd | 1f 93 2f 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 26 30 b2 61 08 18 b0 78 81 15 48 | cb a5 c1 be b2 a0 a4 44 00 00 00 1c 00 00 40 05 | 98 48 c3 da 5f a5 9a 05 26 1d 7f 07 40 17 0d 29 | 6b f4 fe 77 | libevent_free: release ptr-libevent@0x7fb3480720d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348018100 | #643 spent 0.0989 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #643 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38000f8f0 | handling event EVENT_RETRANSMIT for parent state #725 | start processing: state #725 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #725 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #725 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #725 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.225131; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.997889 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348018100 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #725 | libevent_malloc: new ptr-libevent@0x7fb3480720d0 size 128 "road-eastnet-nonat-196" #725: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #725) | 64 5e 88 2e 86 68 44 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 59 d0 5b 9b 94 b3 86 8e 64 38 5a 09 d0 e8 64 | cf c2 d4 15 da d7 21 e6 4e 8c 6b 11 1e e8 ad 65 | 2b bd ab d1 ec 70 ff c8 0d e9 d2 07 ec f4 0b 5b | 5f b2 e7 3b 24 74 0e e2 94 9d 3a 23 3b 5b 55 7c | ed 09 9a e3 6a ff ac 51 22 72 69 81 f0 1e 34 21 | 12 8d 74 23 22 5b cd 06 6c d7 75 d8 45 5b fb 4d | 85 65 7b 46 e7 aa 98 f1 74 d1 b6 9f c8 d1 7d 99 | 61 08 9e 85 6a 83 33 63 c7 3f bf f2 9d 91 d4 fd | 7f 40 06 4e ba 07 60 0b 06 c4 8b f3 84 f7 92 b4 | 2d 08 89 d4 0a 59 ef cd d0 85 03 6f 8f 85 c5 8e | 7e 4a 7f 5a 22 e5 ce 0e 62 2d dc cb f4 3c 17 f0 | 27 f6 d1 42 16 70 1d 6e 7f 4e 76 12 9c d6 e4 08 | 70 2a 6c f3 42 1f 73 22 fe 78 46 af d0 cf 5f fc | f9 7d 2b 8c 1f b4 95 d9 11 2f d3 5b 1e ac 55 2b | 9d 0e 3d 6a 04 9d 00 d0 a8 13 41 91 76 fd 15 44 | 39 7f 60 0b fd e8 a5 da f1 73 89 3e 95 bf 44 8f | 29 00 00 24 65 31 0e 50 dd ad 39 44 4e c9 44 5c | 03 5d cb 07 2b 3f e9 f7 c8 48 35 5a 83 42 5a 7c | 08 53 78 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 e1 7e 60 6f 94 83 21 09 67 4d b9 | 49 66 ea b2 f6 c4 46 b6 00 00 00 1c 00 00 40 05 | 2e 88 34 b2 e3 1a 64 25 09 3f 69 42 1a 75 eb 83 | 23 7c 1f dd | libevent_free: release ptr-libevent@0x7fb35c0cfb20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | #725 spent 0.114 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #725 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a647d0 | handling event EVENT_RETRANSMIT for parent state #688 | start processing: state #688 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #688 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #688 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #688 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.225249; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.99839 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #688 | libevent_malloc: new ptr-libevent@0x7fb35c0cfb20 size 128 "road-eastnet-nonat-95" #688: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #688) | df 64 65 78 b0 09 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba 99 2e a4 d8 11 11 ec bc 09 70 a9 ec b4 08 d9 | 97 c0 f8 d2 7e e6 f4 f4 ec 88 8f c9 01 b5 07 63 | ab 96 32 f0 d1 ff d5 71 24 2d f7 10 7e 41 d7 9a | 8a 31 5b f5 cc 4d 4b 6e e0 fe cf 09 59 ae a0 75 | ed ad a8 fe 11 4f 77 38 0f 3d 73 54 64 5c 86 e1 | 4c f9 f7 be 0f ad 2a 08 14 2f 01 cf 99 bb 08 03 | e1 c1 46 1b 92 0e 69 b0 d7 e1 d7 63 33 81 c3 c3 | 6e 9a 75 ae ba c8 31 37 9a f9 f5 59 d2 c3 7c 07 | c0 44 bd 67 c4 36 13 82 f6 9a 1b bf dd 19 d3 a7 | 1f 9b af 3b 56 e1 48 c3 b7 44 f8 fc bf eb 18 f9 | dd 29 49 e7 68 79 bf 94 71 6c ee a8 79 a8 b8 32 | 64 f6 0a 92 59 a9 6a 2e 51 22 2a 8f f3 dd d7 01 | 71 66 37 a9 16 dc 8f 9f 9b 19 8a 04 d9 aa a9 68 | c6 3a ea 8d fa b5 5a 51 76 f8 d4 87 5a cd c9 16 | aa cc 2c bc 9b 24 ad be ac cc ef b3 e1 6c 96 1e | 04 cd 1e 40 8a 89 0a d7 df f5 fd 0b 78 38 cd 04 | 29 00 00 24 07 2f 3c 32 0e aa 94 89 c6 1e 84 b9 | 47 5c cc fe a4 33 57 f3 0c 87 82 2a 55 07 2e 5c | 6c 57 05 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 20 1b a3 63 d6 96 1d 79 a9 7e 61 | d3 77 77 fd 71 9f 38 b2 00 00 00 1c 00 00 40 05 | 2c 04 dc 98 db ed 3b 9d e2 b7 4c 25 55 c5 d8 4f | 0d e0 01 76 | libevent_free: release ptr-libevent@0x7fb35807ebf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a647d0 | #688 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #688 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c018460 | handling event EVENT_RETRANSMIT for parent state #743 | start processing: state #743 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #743 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #743 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #743 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.225368; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000866 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a647d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #743 | libevent_malloc: new ptr-libevent@0x7fb35807ebf0 size 128 "road-eastnet-nonat-233" #743: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #743) | 33 68 6a 0b 04 fc 21 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 54 1f 6f 5a 66 3f c1 42 1d 47 28 fc 43 9c 32 | a7 7f fc 41 a3 9c cc 7a 93 57 ab c6 8a a7 f4 3e | 46 34 bd 6b 98 5f 8e a7 fe 4c 9b 90 ee 04 ee 86 | 42 1c 02 b1 27 a7 b0 01 e0 8a 3e cf cb 39 6b a0 | 4b a4 c4 0c 65 cc 28 25 a4 ad 65 49 aa 92 21 1a | 8f a6 23 05 37 8d 6e d1 a2 88 57 12 d3 e8 bd 69 | 1c c9 0b 75 f5 df 2d 58 5e a5 72 a2 fb 4c ca 52 | 9f 85 66 7f 63 b8 02 bf d7 3e a0 09 53 f4 72 19 | 87 d5 3c cb be 53 b9 59 65 7c de 29 3e 98 f6 97 | 02 6b 58 24 68 71 6e 3b d0 92 ea b1 ac 32 a9 28 | 8e 3a 77 35 b3 34 3c 3d ad 6e 6a 29 9b b7 88 7b | 86 bb 62 15 16 30 35 3d 78 71 08 9c bb d0 51 c0 | 23 56 79 b7 91 8c 7a d0 c1 ec f6 00 b7 6f 72 d8 | 4c 61 2d 3e 9f 3d 71 4d ce 0f 50 83 03 11 bb 0a | 99 e2 07 9c b6 80 4a 86 5a 9a aa 9c 1b 0a e1 e2 | e8 d9 11 28 45 53 df c8 4d 16 ae c0 7c 32 f4 11 | 29 00 00 24 1a c2 58 3c 56 a7 f0 5a d9 b8 5a 6b | cc b3 c9 3f ec 7f b9 16 85 28 70 f6 0a 4a 2a 42 | e9 0f c0 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 52 f6 73 3d e6 8e 99 7b ad bf dc | 06 39 16 3e d4 a9 07 80 00 00 00 1c 00 00 40 05 | d3 9b 09 18 b0 e4 0a b6 7c 3b a5 fa dc 8a ee 1d | 09 1b 83 75 | libevent_free: release ptr-libevent@0x7fb358079410 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c018460 | #743 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #743 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a70b50 | handling event EVENT_RETRANSMIT for parent state #672 | start processing: state #672 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #672 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #672 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #672 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.225485; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.989331 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #672 | libevent_malloc: new ptr-libevent@0x7fb358079410 size 128 "road-eastnet-nonat-136" #672: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #672) | 8a 51 a3 6f 68 f7 9e 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd e0 86 ed 60 a3 d0 a6 8e 6b 9a 00 e5 84 70 47 | 32 b4 99 4f 0d 05 58 a3 bb 0d be c7 e9 7e cd ad | 4f e6 63 7d bb e8 41 3e fc 88 30 2c a3 77 90 4d | 35 a6 66 a0 1a ec 48 93 2f 14 8c 8f fe d5 df 84 | e5 b6 10 27 23 7d 77 97 15 e0 10 30 36 f6 b6 80 | 26 8c 8d 3c 23 cd 46 8c fe 9f 38 e4 8e 1c c7 31 | b5 28 84 af 9f c7 49 71 f9 9b 12 64 93 29 98 16 | 5a 87 88 39 9f ba f9 8b 6b 1a 6c 85 af 62 ca a4 | 00 2b d4 50 98 a6 48 d3 a9 8e f3 da 34 94 7c a4 | 1a 0a ac 81 46 8c 7d 48 0f ab 18 93 af 03 df 02 | df 31 b2 61 3d 21 11 b5 2e d1 3a bd f0 29 fc f6 | 44 a4 9e 23 a0 a5 78 a1 b4 fc 98 b3 83 06 25 39 | 76 e1 3c 9c b7 9e 50 5c cc a7 ac 96 00 fc 08 6f | 31 b8 68 11 66 46 8b 52 dd c4 ea 4d 22 5d d2 e3 | b7 89 33 b9 bd 6c 60 86 ae 27 9b 88 9a 4e 35 21 | 7b ba 09 1f bd a5 fb 07 d5 d4 0b 0f e2 d2 63 bb | 29 00 00 24 10 82 d2 ac eb af 8e 07 dc 69 e2 0d | 6b 97 c2 9b 07 bc 50 39 f2 b6 8e 4f f1 fa 6e 4a | 37 dd 2d 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 8a eb dc 69 3b 2f bd 92 77 b8 05 | 58 f7 11 b4 d0 e4 bf 88 00 00 00 1c 00 00 40 05 | e2 45 f2 76 d6 58 48 de fd 60 b0 02 91 58 f0 cf | 83 ee 8f 98 | libevent_free: release ptr-libevent@0x7fb34406f6a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b50 | #672 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #672 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3500300a0 | handling event EVENT_RETRANSMIT for parent state #750 | start processing: state #750 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #750 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #750 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #750 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.225597; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.001964 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b50 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #750 | libevent_malloc: new ptr-libevent@0x7fb34406f6a0 size 128 "road-eastnet-nonat-251" #750: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #750) | 66 c6 fb f7 91 6b fb df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 56 4e 6a bf ea d7 ce 8c c5 13 f2 30 fd 41 ab | 3e d8 84 16 5c 00 fd 63 27 ec 37 f8 37 ca a8 cf | 61 e7 66 f0 cb a2 7d 48 60 51 06 3b ad 0f 96 30 | be 5d 4e d4 5e 3e 0f e2 92 ad ec cf 0b 28 1c a1 | 4d e9 8b 14 d6 a5 00 40 0b a2 42 6d 65 44 52 2a | ed 7b a2 a6 f1 52 01 55 50 fe 38 4d d1 1e 2c 17 | 6d dd 7a c3 13 e2 07 81 a0 94 d9 59 df 56 84 98 | c0 ad 91 50 e1 93 ec 06 ee 42 aa de c1 18 3f 59 | d8 25 7b 7d 03 a8 7e 0b 39 bd 42 00 e3 0b 12 a9 | 4a eb 7b cb 8d 49 f5 09 cf 9b 5d e6 19 4e c2 da | 42 79 15 bb 81 d0 dc b8 5a e8 5e 28 c3 da 56 65 | 77 9c 71 c2 ab 7d 10 b7 63 49 54 6f aa e7 23 17 | b2 9a 50 85 92 a3 09 71 79 f6 65 dd 01 fe bd 61 | 08 e7 af f9 f6 a9 e5 aa 68 45 84 c6 4c 79 c7 30 | ab 0d dd fd 10 65 03 5c 7a 2c 09 2f 85 16 4e ff | 01 45 23 1d b3 99 fd e2 fa 7d 09 11 f6 28 34 a9 | 29 00 00 24 75 d2 7b 7e 78 57 6c 86 0e 7d 5d dd | 33 fe 29 2d 0e ba 6e e8 a4 16 ad c2 25 40 f7 7b | e3 c5 56 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 5e f7 09 e0 61 ab 7d 99 d0 bc 4e | 5c 13 08 f6 77 48 36 b9 00 00 00 1c 00 00 40 05 | 33 e2 5b 26 c7 f6 e2 7a ac c6 74 73 96 13 44 cb | f2 2a 57 fe | libevent_free: release ptr-libevent@0x7fb388090d90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3500300a0 | #750 spent 0.0979 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #750 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46abbc00 | handling event EVENT_RETRANSMIT for parent state #749 | start processing: state #749 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #749 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #749 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #749 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.225707; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.005285 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3500300a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #749 | libevent_malloc: new ptr-libevent@0x7fb388090d90 size 128 "road-eastnet-nonat-176" #749: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #749) | 21 cc df 44 fb 91 db 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 1f c5 e8 8c da 2f 71 6f 87 ca 00 ac 50 65 c6 | be 36 51 01 ec 7e 83 51 09 eb 5d e7 2a 9f c8 ad | 66 58 cd 80 0a 9c 72 ee c8 d1 c5 20 4f 69 fb 92 | 13 65 d4 0e 1d 60 b8 43 6c fd 57 62 48 52 03 58 | 1f 30 23 02 a5 49 ac 37 6c b6 2d 96 9d 82 d8 a1 | ba c0 ed f3 40 36 e0 13 52 9d 8e 1c 5c b3 e3 4c | f2 78 1b 73 09 dc 52 b1 42 32 86 e1 28 0b 10 51 | 7f e1 bf a0 7c b2 ef e9 fa 73 6c 5e 12 69 7c 58 | 4e 1b 40 29 8f 20 2b 37 6e b7 c7 d7 63 7b 45 40 | 89 11 3c 89 89 0f b8 3d 1a 1c c1 76 50 59 ab 17 | 87 71 45 bc cb 1e a0 07 a8 8c 7d 0e 05 c2 ec 2b | fb 3c 29 c4 ba ca c8 e4 d1 73 b4 1b 53 de b3 a4 | 21 14 35 6d 70 c0 9f 7d a6 1f 1c e3 7c a8 3e 43 | cc 8e 74 be 9f f4 d4 7a fd 86 b7 9a fc 1b 2b 7e | cc df a5 1f 60 66 33 d4 ff 08 25 ca 1f d3 96 a0 | da 1e 31 8f a3 a2 b0 5a a2 09 c5 ee 5b 37 a0 f1 | 29 00 00 24 ef 4a 18 29 61 bc 8a 68 d0 f0 81 d1 | f3 7e a9 a2 f3 7e 3f 08 52 04 df 8a cd fc 2c b8 | d1 9d 3b c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 60 55 07 b3 0c 17 02 3e a6 d0 be | 6a 54 3c c2 20 5b a4 d7 00 00 00 1c 00 00 40 05 | ab 26 2f c6 c0 76 2f 1d 50 c7 79 f8 11 59 56 a7 | 82 5d 60 bb | libevent_free: release ptr-libevent@0x7fb3640a6860 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc00 | #749 spent 0.0987 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #749 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #735 | start processing: state #735 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #735 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #735 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #735 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.22582; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000991 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc00 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #735 | libevent_malloc: new ptr-libevent@0x7fb3640a6860 size 128 "road-eastnet-nonat-238" #735: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #735) | 53 89 83 1d 48 ce 70 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a 91 4f e8 ba d0 cf 5a d7 f0 71 fa 46 1a 8a e8 | 7d 4a be de 38 b6 47 be 9f b9 8a 22 46 d2 62 91 | ca 86 42 c6 77 2f 59 d3 e4 f2 fa 15 7b 3c 27 33 | 0c 23 b9 e7 b5 8a b0 8e ec c6 a4 80 d5 32 f2 16 | 21 6f 71 5d b4 75 f3 73 d3 f0 4b af 90 08 5b 92 | bd 52 84 33 aa 3b 00 4e e0 dc 9e 9b 5c e1 64 90 | 46 3d eb f8 93 ab a4 6e 46 c2 33 ef fc 8b d9 14 | f9 38 bb 1f e7 fc 89 8f 65 b1 d8 35 5e 99 68 8b | 32 06 43 77 f7 fb 44 87 13 38 82 0c ff 88 57 fb | f3 b5 78 4d 2f ac 61 eb 6d cb cb e1 13 98 c8 fa | 56 54 e2 54 39 9d 99 08 4b 53 de 03 86 18 ea f1 | 33 cf bb 45 1d 44 4f fa bc 18 e5 13 24 71 58 c8 | a7 32 0b 95 3a 6d 89 f1 b7 95 86 7b 38 71 2b d7 | d3 e8 9a bf 1d 2d e6 e7 fe 5f 9d 7e 67 88 57 56 | 5a 53 49 ca 89 7f 95 e0 bd 0a 6b 9b e1 e9 d3 17 | 9d 45 18 8b 68 cc de 5a 3c 70 99 6e f6 36 78 b9 | 29 00 00 24 9d 95 cb 46 13 9a 6a 64 e7 15 0c 4c | dc d4 c0 de a5 95 63 82 d6 ca 4a 90 78 69 d3 72 | e7 c1 f1 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c cd 3c 21 f0 20 2e 88 28 a9 40 54 | 19 d9 0a 26 35 63 bc e9 00 00 00 1c 00 00 40 05 | 4d 3d eb 4a 56 ab 16 38 35 e8 7a d1 b0 99 53 b5 | 30 cb 3d 6b | libevent_free: release ptr-libevent@0x7fb374059970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #735 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #735 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c03b100 | handling event EVENT_RETRANSMIT for parent state #569 | start processing: state #569 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #569 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #569 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #569 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.225934; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.932228 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #569 | libevent_malloc: new ptr-libevent@0x7fb374059970 size 128 "road-eastnet-nonat-87" #569: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #569) | 55 2f d6 9f 11 e5 1c 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 ad f3 19 0d b2 66 aa bf 03 d7 00 2e 8a f6 e9 | b3 08 01 25 75 89 85 ed a8 02 b4 4e ae da 53 49 | 58 9e 82 fc af 45 f7 e5 3a 8a 61 8e 88 c7 af 9a | 14 17 d6 60 7e 9b 49 7e fb c7 a3 8f 06 1f 55 04 | c8 6c 7d 7d b3 8a be f8 87 7c c7 58 4b a7 87 5d | 9c b5 54 d3 ac 08 0e 69 85 4b 91 09 83 8d 76 46 | 46 3d 39 9e ac d3 50 29 5e a5 08 c8 9e 48 83 f1 | 7a ff ec 7e 14 c7 a3 2d 96 02 b4 ac 09 ec 55 2f | 9a bc 9a b9 ae 22 a8 43 ce 46 d4 aa a2 8a 21 94 | 31 c8 40 01 99 87 64 fd 79 ff 03 2c 2e 81 52 10 | 65 b9 fe d7 6e b5 1b 36 08 b8 c5 40 a2 b3 94 60 | c1 5e 51 00 52 ca d5 19 e8 a1 81 66 03 72 10 ef | 03 5d 84 88 58 a5 23 01 6a de f9 31 fa 89 4d ec | dc d2 db 41 a5 f5 42 96 78 ed 68 a8 33 e3 9e db | 24 46 13 b6 1b b4 8e a4 01 2d 3b 33 63 dc 87 44 | db c9 90 4c 80 8f a3 e2 b7 82 7f c5 7c be 1e 53 | 29 00 00 24 0e 82 eb 05 c0 49 58 d2 06 74 53 82 | bb 2f d8 51 c7 ad 9e 32 5a e2 85 00 b0 c7 ec f1 | 8e f6 f3 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 e7 bd d8 a7 7f 8b fc 64 ee 06 53 | 59 02 1a 01 d9 98 46 39 00 00 00 1c 00 00 40 05 | c0 b7 45 5a 2a e8 30 84 4a 1b 7a 52 bc cd a9 4d | c0 d2 c3 7a | libevent_free: release ptr-libevent@0x7fb35c056950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c03b100 | #569 spent 0.0847 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #569 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a1c490 | handling event EVENT_RETRANSMIT for parent state #602 | start processing: state #602 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #602 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #602 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #602 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.226019; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.970091 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c03b100 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #602 | libevent_malloc: new ptr-libevent@0x7fb35c056950 size 128 "road-eastnet-nonat-93" #602: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #602) | 1c 14 c0 8f 0f 45 46 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 8c 23 15 6d dd 8c f8 78 a6 e7 34 f8 f8 0d e8 | 99 69 99 32 7f b5 b1 1a 6e da d3 b0 b9 7c e5 6a | 90 1d 3f f0 2f 1f 8d c8 1e 97 79 0b 55 c9 08 97 | 7f db 99 9b a0 da 7f 34 8d ab 5f 4b 73 b6 eb 55 | ea b1 50 2f e5 f4 17 86 c9 0b 4a 01 40 9a 9a 4d | 73 05 29 c2 d1 6e 3d 1b 47 e9 f1 d8 3b a4 6c 31 | 0e f0 a8 d8 a1 46 2c 0e ca 2a 6e f9 4f d7 8c 76 | 9e 40 ea a6 3f 5f 17 17 a4 a8 fc ae 89 af 6d f1 | b3 45 8c 83 c6 8d a4 54 5a e0 e6 e7 89 ee b4 12 | 45 f6 b8 c2 94 e3 93 01 1e e6 9f b8 c4 95 33 5e | a2 9c 98 2d 5d 32 90 4e 65 40 c0 d0 7c bc 64 79 | d3 d5 64 07 12 ee 32 ea f1 d4 a2 dc 98 b8 b6 2e | 62 34 35 b4 dc 05 df 63 05 49 b3 40 af 75 cf e4 | bf 5e 46 dd df 34 a2 34 68 31 94 44 1b bf 50 ac | 43 cc 20 b0 de e5 d9 e2 b0 84 60 50 34 9f 14 06 | 39 c9 a8 b8 00 99 c9 35 60 cc 65 3c 94 49 b6 88 | 29 00 00 24 83 64 aa aa cc 6d 3f 6f 34 ae 10 39 | 1c a1 82 b7 e0 19 c5 ec 38 88 da 2f ce 97 9a 5c | 92 c8 61 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 77 b9 52 2d cf 04 de dd b2 81 99 | 39 e3 1b 7a 92 b3 36 9d 00 00 00 1c 00 00 40 05 | d6 0f f4 51 34 80 da 92 17 c4 6a c3 ee d2 99 01 | a8 7b c9 18 | libevent_free: release ptr-libevent@0x7fb36406f9a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c490 | #602 spent 0.0951 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #602 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a90400 | handling event EVENT_RETRANSMIT for parent state #720 | start processing: state #720 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #720 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #720 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #720 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.226126; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.01137 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c490 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #720 | libevent_malloc: new ptr-libevent@0x7fb36406f9a0 size 128 "road-eastnet-nonat-182" #720: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #720) | 2e 33 4d 73 be a7 0e 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed ab c5 2c c2 f4 74 ef c7 ee 30 67 5e 1c da 49 | 70 61 7e 4d 8d 32 5f 3e 9a ec c2 40 33 9c 3f 67 | af 3f 5c 83 67 1b 79 9e b7 b7 35 73 56 5b 8c 3b | 0a 1a 2e 82 5d 65 28 71 9b 14 bc 2f fa 09 67 19 | b2 66 da 04 38 29 ad e2 f1 65 50 23 4d 85 d5 08 | 9a 79 76 49 46 a5 ea 67 8b 56 2d 01 fc 5a ed 64 | 0b 12 a4 dd e9 5f 18 7a eb a7 15 69 ee 95 e8 d9 | 56 b2 86 02 b9 aa db 6a f8 94 26 91 52 0c 14 ef | 19 10 c0 eb 0d 10 8b 4f 19 f6 79 a9 16 1e 94 36 | 09 fb 5c 76 4e b9 0e 65 a7 28 d3 fb 8e dd 96 92 | 1b 73 43 c6 61 e3 03 3c 0e 78 5b c1 2b aa 38 be | 19 84 9e 8e ff b7 65 35 2e 65 78 b8 fe ae d6 cc | 05 c7 08 1c 26 02 90 02 f3 16 d5 8a d5 33 30 16 | 63 1d e2 87 4f 85 13 e7 cf 51 84 57 b6 4d 0b d7 | ad f3 bf 57 f0 ee 36 2a 5d 91 a2 8b 76 c7 7f 4d | 7b 7f 59 64 bb c0 6d 44 32 b3 fa 20 34 ab 07 c4 | 29 00 00 24 b4 27 97 52 66 73 6d 63 e4 fb b7 f1 | ce d3 ed e9 19 97 52 e1 e0 b1 81 d7 52 28 6b 0c | 38 64 19 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 f0 ee 60 72 ed 8f f1 ea b8 ad 81 | a1 9e 54 4c fd ed 06 17 00 00 00 1c 00 00 40 05 | 50 b7 67 3d 54 be ef de 2d a1 bf 2b 46 e3 89 aa | 52 77 9e 8d | libevent_free: release ptr-libevent@0x7fb35c07a360 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90400 | #720 spent 0.0627 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #720 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #639 | start processing: state #639 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #639 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #639 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #639 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.226198; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.958749 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90400 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #639 | libevent_malloc: new ptr-libevent@0x7fb35c07a360 size 128 "road-eastnet-nonat-214" #639: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #639) | ff 19 a0 3d 97 93 39 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 19 0c 9d e5 77 b8 48 36 e4 03 9e c4 1d f2 2d 78 | 44 4c 26 98 f8 6b ee 0b af 31 99 e7 1c 61 bb d4 | d7 1b 9a 20 07 ba 04 17 60 e8 fd 18 10 87 29 2c | 24 f7 67 ce 57 34 ab 29 f5 cc ea d7 c2 95 67 49 | 24 4d 53 fb 24 ca da 47 20 a9 a9 bc c8 65 7a 7b | 44 61 86 68 8a ae f2 ac f8 44 ae 53 96 4e 13 15 | f8 a1 33 b4 cf f2 c1 fa c8 17 74 56 43 9e ef ec | f3 87 44 4e 55 d5 0d a6 d3 56 28 83 eb d0 c0 d4 | 3a 2e fd c3 dd 99 de 47 36 b1 e7 13 b8 7e f2 cd | a7 06 b3 ea 1c 8a 6d d9 b0 1f 66 79 19 09 77 e8 | 7d 50 d8 1c b7 8e b4 d3 82 80 b4 5c 9f c3 d3 38 | 28 2d fd c5 5f 8b c4 22 9d f7 e9 ac 69 9d a2 7b | 6e b5 3a ed 4f 1a 08 7f f6 b1 69 48 bc 68 e4 78 | 10 5b 4b 02 21 b2 70 8c 4e 7e b7 69 85 f2 7c eb | aa 75 d3 5c 7d a4 3d 7f 18 fd d4 8b 50 8e 47 6d | 12 6e b8 f7 e4 81 64 1a 6f f3 91 ac e6 c8 bf 94 | 29 00 00 24 0a 0d 9f 0a 63 a4 e0 f2 1d d8 95 0c | ba e4 b7 d7 a4 51 17 93 28 8e f1 0a c8 8c 2b 76 | 37 dd 06 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 9a d0 b6 2b 5a c4 fc 72 66 76 9a | 94 bf 3e ef ac e5 25 66 00 00 00 1c 00 00 40 05 | b8 15 7d 61 0d 1b 19 22 14 f1 b2 86 2c 56 e5 70 | 99 3e 7d f1 | libevent_free: release ptr-libevent@0x7fb384070f20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | #639 spent 0.0647 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #639 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3700407b0 | handling event EVENT_RETRANSMIT for parent state #640 | start processing: state #640 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #640 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #640 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #640 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.226269; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.959786 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #640 | libevent_malloc: new ptr-libevent@0x7fb384070f20 size 128 "road-eastnet-nonat-200" #640: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #640) | f6 a6 42 61 47 27 64 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 80 42 6e d7 7a 98 1b e7 63 e1 2e 09 63 bd 4b | 42 e8 81 2f 40 d2 71 01 4a dc 7a af 17 d1 73 0a | 05 3b 3a ce b3 5d 7f 07 44 b9 ac 40 bd 6f 70 e0 | 38 56 e8 ab be 45 c9 63 98 bc 74 58 74 89 72 8a | 13 32 c2 ca 9d 72 be 69 88 7f a2 d0 28 52 16 b0 | 31 15 8e 9f e5 63 61 e6 1c 3b 95 d5 65 9e 4a fe | 1d 24 21 96 2c 5c 93 59 10 e8 5a a8 85 f0 10 e7 | 2b 45 5a 9a c7 e2 d8 dd cf ae 48 a2 5b 7d d5 31 | 5b 11 70 8a 8c fd 1e 06 e6 9d f7 60 5a ec 36 27 | de b1 f3 c3 0b 31 8f ba 37 d6 eb 27 bb 08 95 f5 | 50 60 61 71 06 90 ab 76 57 63 08 97 67 3d 78 5e | cd 6f 6c 41 fc b6 78 36 36 0e ed 0d 70 0b 31 b2 | fa dd a9 a2 95 f8 f1 ba 5b 88 71 81 da 2c 38 d3 | ad 78 62 1e ef 32 b4 3f 99 ce e3 5b 67 a3 08 06 | ca c6 2b 08 09 1b 2a 0e 74 6f e2 ad 35 3b fe 99 | 10 20 b2 e9 6c e4 a0 0e d2 0a d9 68 bf 4e 9b 89 | 29 00 00 24 55 c2 55 4a 4f 3a 0d 38 f2 68 61 3a | 55 3a 39 15 fe 86 62 ee bc 23 58 c2 1a 6c b1 1b | 30 e0 3a 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 47 0f 0c 07 b2 8c 99 66 34 29 66 | 06 93 b3 bc 11 9f 8e 62 00 00 00 1c 00 00 40 05 | 2b 37 ed c1 9f 60 69 a1 71 7c 68 0d 9b ee 86 23 | 55 71 c1 26 | libevent_free: release ptr-libevent@0x7fb35c069bc0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3700407b0 | #640 spent 0.0636 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #640 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348012890 | handling event EVENT_RETRANSMIT for parent state #525 | start processing: state #525 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #525 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #525 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #525 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.22634; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.922019 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3700407b0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #525 | libevent_malloc: new ptr-libevent@0x7fb35c069bc0 size 128 "road-eastnet-nonat-80" #525: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #525) | aa 0a 50 f6 eb 80 0b d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa f9 a3 5a f1 06 e3 d8 4a 74 cc cb 91 5d 3f e1 | 21 df 1c 09 20 b5 fa b8 68 99 55 2e 9c f7 c4 26 | 2d 13 5e 73 62 28 0d 5d 1b 19 61 40 3e eb 12 46 | d1 3e 37 e2 36 63 3a 09 94 77 c0 7e 6c 49 5a 1c | 2a 84 ad 4d a2 2e 20 e1 b3 d6 0e 28 0c 73 33 56 | 98 ce 6a 84 5e dd ad 70 fc 04 0c c9 ba 63 4e a9 | 26 10 ce 94 47 dd ed 32 a8 e2 94 aa 02 0d 68 a7 | 46 c0 e1 ca 9b 37 10 05 10 43 ac 26 3c df ae af | 84 82 12 69 3c a5 a9 a4 da 4e 39 e7 22 d4 22 45 | 35 cb 06 64 36 de 60 0f 82 92 bc c7 8f dd a7 83 | 9c e0 b6 87 e5 ac 79 26 3e f5 8d 2d cd 1a bc 53 | c2 a7 57 2e 12 39 97 28 1d a6 53 fc 44 99 8d cf | 75 73 64 e4 87 c5 c3 cd d3 07 30 22 82 04 3f 75 | fc 56 ce 51 6d 2a 4c a6 f0 62 cd cf f7 11 c5 31 | 55 34 34 06 69 e6 6c 30 96 c7 a2 0e e6 93 d4 86 | 21 15 7c aa ca 54 c4 d5 3d 13 a0 9d ed ce c0 b7 | 29 00 00 24 2f 02 54 75 b3 a1 a2 a3 49 b6 96 0f | 9b 0f 28 8f 5d 43 f2 88 27 e5 88 4f 55 a3 28 fe | cd 5e 6c d1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5d 92 6e 19 fc 80 58 4d ee 5f a9 8d | 60 2e f6 39 2c 8f 9a a2 00 00 00 1c 00 00 40 05 | d9 3c 3f 56 aa 0d 1b ab 4e ad 62 3c 67 74 fc 7e | 8b 17 e3 b0 | libevent_free: release ptr-libevent@0x7fb34805e9d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348012890 | #525 spent 0.0631 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #525 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37400cc10 | handling event EVENT_RETRANSMIT for parent state #566 | start processing: state #566 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #566 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #566 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #566 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.226411; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.939757 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348012890 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #566 | libevent_malloc: new ptr-libevent@0x7fb34805e9d0 size 128 "road-eastnet-nonat-39" #566: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #566) | 88 80 6b f4 b9 8d 66 b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef c8 5e ab f5 ee a4 b9 98 60 85 05 ca 3b 04 b0 | 7d 9f 17 5c c2 7c 2b 4a da 7e 26 15 fc 48 81 31 | b4 8e c6 e5 11 7d 74 25 e5 99 ba 1d 58 67 84 5f | 89 d2 e2 25 03 e3 33 52 7a ed d7 e2 f5 b6 28 a4 | 1d 2f f7 d4 f6 94 af 23 10 a8 8a fc f4 89 a2 3c | a5 d5 e3 17 b6 f0 c4 8f 7f 71 4d 6f bb 87 76 f5 | a2 04 13 1b a7 e6 0f e4 4c 2d 33 e9 31 87 17 3c | cd 1f 22 8b 07 c8 21 5a 22 9c 36 40 a1 0d 7a 52 | af 7b bb f0 61 88 95 3a 59 92 5f 05 a1 92 fb 6c | 3d 4d bd 20 03 45 e8 a3 b0 a6 b7 00 08 7f 5b e1 | f5 a0 c3 e2 5c ca 78 79 72 98 fa 67 35 e4 cc fb | 8a b3 33 65 b6 e9 a2 86 fe 7c ee ff 0a 6f 23 a1 | 84 0d 45 d3 fd f8 6d 40 31 50 c7 97 1c 51 ef a1 | 74 f8 15 00 16 ec 9e e6 ab 9d 53 7c 15 3a f7 d3 | 7c 57 1b b1 1c 4b 72 88 0a 87 ab 54 4a 5b c4 c2 | 57 bd 4e a5 0a 4c 3d fe 53 4b 65 c4 64 95 29 91 | 29 00 00 24 c8 7c cd e0 b2 c0 7c bc b4 0e 89 92 | 98 cf b4 cf 69 f0 3f 2f 7e 50 0c 76 dd c6 f5 df | 0c da 14 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b d4 72 88 ba f6 c3 75 62 5e 72 62 | 65 f9 8a 24 3d dc 56 74 00 00 00 1c 00 00 40 05 | 54 09 d9 d9 07 67 4c aa 17 b3 39 aa 94 51 7e e0 | 9c 0e 3e 5d | libevent_free: release ptr-libevent@0x7fb38005f0d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37400cc10 | #566 spent 0.0621 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #566 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348030240 | handling event EVENT_RETRANSMIT for parent state #548 | start processing: state #548 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #548 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #548 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #548 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.226482; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.933237 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37400cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #548 | libevent_malloc: new ptr-libevent@0x7fb38005f0d0 size 128 "road-eastnet-nonat-5" #548: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #548) | 6f bf f8 cc f4 7a 9c 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 3a 23 76 43 2c d6 0c 77 f6 be 3f 63 2d ef 87 | 5b 0a 43 13 73 5f 72 ec 4f 32 10 0e f0 de 84 7f | d4 61 90 d4 eb e1 32 1e e5 8e d7 b5 e2 7a e7 49 | 5d f2 fc 7a c6 30 1a 6f 07 cc 95 e2 88 f7 7d 25 | 65 7c dd a0 41 59 c3 25 f5 18 42 08 32 24 11 16 | 2e 52 4f 9a f3 7a ed ce d9 b4 aa b3 1f ae af 20 | 42 b9 b1 ad cd bb ee c0 74 e1 fd 67 f4 5d 34 44 | 6a de e6 b7 35 4a f2 eb 39 da 8c cb 41 b2 00 29 | 86 07 50 93 e1 bc bf ab 70 b9 fb 51 f1 a7 98 f9 | 2b 98 28 e6 c7 3d 74 21 03 5a bb f5 37 9e 89 94 | 7c 03 2e 40 d5 60 16 2d d9 fe b8 61 a7 83 f3 1d | ff eb 71 d5 80 83 a8 32 43 df 3f 7a 3d 1e 14 01 | e8 08 00 8c 59 d3 27 3d e9 52 04 6f 01 93 dc 8f | 24 6b 25 9d e9 4a 4b 67 81 c6 ae fd ce 83 60 14 | 29 d6 20 63 24 51 e8 f1 7b e4 ef 94 6e af af 7a | 65 c0 38 a3 b6 06 be 41 56 5f 9d 49 7b 85 1f be | 29 00 00 24 3a 01 9a 17 69 6a fb fe 06 63 3f f6 | 88 7f 88 c9 7d fd b9 fa 66 cd 9e 05 f9 56 87 93 | 78 28 b7 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 f1 40 91 ab 0d 01 84 cd e5 c5 16 | 59 f1 09 ef b4 ca 5b 7d 00 00 00 1c 00 00 40 05 | 0b 27 51 7f 3c e8 a2 b4 d8 2e fd 6c 29 e4 91 b0 | 77 83 22 02 | libevent_free: release ptr-libevent@0x7fb348059270 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348030240 | #548 spent 0.0798 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #548 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c046090 | handling event EVENT_RETRANSMIT for parent state #553 | start processing: state #553 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #553 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #553 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #553 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.226581; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.930975 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348030240 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #553 | libevent_malloc: new ptr-libevent@0x7fb348059270 size 128 "road-eastnet-nonat-77" #553: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #553) | 9a 41 ad 5b 0b 26 50 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 98 9f b9 be 87 16 03 59 fa c6 46 2f 12 bf f9 | 9c 48 69 58 ca 2c be 3c 1b 2c 0f 5d 12 16 fe b8 | 30 28 bc 11 9d 18 3a 2e 90 9c 49 0c c8 26 aa 51 | 1a 9f 8d 14 3c a4 33 0e 49 75 9b b9 aa 38 ce f2 | 16 4f ee 39 a5 0c 19 90 f6 fe 17 a7 97 44 51 96 | cf b5 e3 78 62 4a 8d 45 65 01 d7 f0 91 ea 83 03 | ef ee 72 ad ec d4 2e 42 af 58 6b a8 76 71 c1 a4 | 15 40 9a 41 d3 be f4 fc 82 6b 9b 27 44 16 92 88 | d2 ec ae 3a ad 37 9a dc be e2 18 f1 a7 5a bd 4f | 9f 7b 73 27 86 3a a5 22 07 50 15 6f 01 41 8f 31 | a4 8d 9b be 74 93 18 96 e2 bb be 98 d5 3f 3c b0 | be 51 bf 90 e0 7d 1d a1 c1 89 14 87 3d 3e 5f 1a | 3a 6e 65 d4 e7 b0 94 33 2a d6 83 76 bd a6 19 f2 | 31 91 dc c3 17 65 be bd 3f 1a c2 ef f5 43 82 b9 | b3 3d 97 1b b0 5f d5 6f 78 93 3d 15 15 8a d3 04 | 93 b7 c2 73 86 dc fe 40 7b 4e 06 9a 50 ca 56 13 | 29 00 00 24 51 58 09 66 02 b7 a8 f0 dd f0 1c 1d | b2 fa 84 64 76 65 9d d1 36 08 96 10 0a a1 c1 1c | e7 da ff a4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 41 6f 46 01 b2 f0 28 d5 2d 8d 99 | ce e6 b9 ed 57 d9 9f 7b 00 00 00 1c 00 00 40 05 | ed c5 55 11 76 93 de 00 6c 52 d8 5a 9c ca 52 d6 | a7 72 5b e1 | libevent_free: release ptr-libevent@0x7fb350065220 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c046090 | #553 spent 0.0764 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #553 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c040840 | handling event EVENT_RETRANSMIT for parent state #582 | start processing: state #582 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #582 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #582 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #582 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.226653; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.947675 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c046090 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #582 | libevent_malloc: new ptr-libevent@0x7fb350065220 size 128 "road-eastnet-nonat-127" #582: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #582) | 36 4a 37 cb 1c b9 ae 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 4f 61 87 c6 78 57 73 4a 5f a1 9a 64 82 d0 e5 | 6f 49 6a 86 33 ed b7 39 d6 77 5c f2 31 a0 9f f4 | ec 43 a1 b9 ee e5 b8 9b 1f c7 f2 95 28 7d d0 3c | ff 5b 16 5d 16 d5 26 95 a7 b7 04 19 40 c9 07 68 | b1 7d c4 8c 15 89 44 64 6a 3b 95 b9 d0 ad c1 f3 | 68 1f 13 1a 8f ee ba b2 3b 04 d2 cd d6 6f 70 f2 | aa 4a f0 c4 b9 45 7c f5 97 5e ea 63 fd 31 8b 63 | 9e 99 a5 f5 b9 09 c7 72 66 49 45 08 e0 12 a2 af | f0 80 ef 2a 78 c8 ab 6e bd a6 31 fa b7 36 d9 19 | d4 8e 57 35 2f a1 d2 8a d8 2a cc fa d0 26 84 24 | b9 a6 0a 8f 1b 41 12 b9 03 5a 72 30 93 99 ff 3a | e5 ef 85 4d d5 6b b8 f6 bf 6a 3d e4 93 67 8e 91 | 9d f8 cf c1 e9 c5 82 41 6a ed e0 1b 1d 7b a2 28 | 4c c5 b3 bb af 17 f6 b1 f6 63 47 76 31 fe 54 4d | 80 f6 9f bb 7d 94 71 07 12 ba da 93 7c 72 12 96 | a5 ce 85 8f e3 3e a3 aa bf b5 d9 b0 4d 73 42 19 | 29 00 00 24 3a 1e 72 ea a0 4e d4 41 98 1d 74 e2 | b1 f2 f0 bd 21 18 c0 9c 2b 6a 10 6d f8 77 54 e9 | 5f 0c 5c 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 1a 0a d4 84 49 b9 2d 3b f6 bc 1c | 48 56 f8 6a ec 07 3c 40 00 00 00 1c 00 00 40 05 | 4c a0 a2 f3 b5 28 de 62 5d b9 c2 1c 46 ba 05 5c | 22 af fc 09 | libevent_free: release ptr-libevent@0x7fb37c069e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c040840 | #582 spent 0.0633 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #582 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34801da80 | handling event EVENT_RETRANSMIT for parent state #607 | start processing: state #607 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #607 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #607 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #607 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.226723; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.957421 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c040840 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #607 | libevent_malloc: new ptr-libevent@0x7fb37c069e60 size 128 "road-eastnet-nonat-35" #607: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #607) | 1d 41 1f c6 ff 0f 27 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9d 29 5d d3 25 1e d3 3b 53 2c 02 04 94 df f0 9e | c0 c9 bd c2 0e c6 5b 3e b3 b5 28 a4 b4 de a0 bc | 44 35 8d ca 70 6e 31 a6 5c c7 6e 92 aa 89 1d 29 | f4 20 9b e4 de 42 28 b3 c8 f4 2f 6a 42 5a 19 f0 | 51 f8 ac 34 ce 28 a7 d4 af 5a ec ac 56 96 17 ee | 7c 53 68 62 c6 e5 b3 17 31 98 5f 6b 69 9c 2a 00 | d4 a4 6e ae ef 2a ab ba 56 64 86 65 05 0f d7 44 | f7 e3 bf 1e a4 ed a7 7d fe 8a 1d fb 8d d7 f1 cf | e1 7d 41 0d a7 4f 0c f0 68 6a 81 5f b1 24 1b dc | 3f da c7 a0 34 fe bc 93 f1 d2 24 a2 86 ef 73 2a | e2 6f bf c6 0f a9 6a 2f f3 1d 17 2f 3f d3 72 6e | b7 b5 92 74 5f d7 2a 9e 99 d9 04 38 46 4a df 24 | 0d bb 8c 68 24 f0 01 b1 77 d7 d1 59 41 dc 96 1a | 97 ab d6 d6 b7 b7 b1 29 13 72 38 ec 4d 09 e0 92 | 84 95 9d 0a 22 aa 6b 94 be df 8c 5f 62 af f3 3a | fb a4 36 0a 7d 82 c0 0a 05 87 7c b0 d2 48 69 07 | 29 00 00 24 0c 6e 31 a9 aa 11 87 13 04 94 3b 5e | 65 1f 88 8c ea 44 4e 42 5d 13 db 22 a9 85 17 06 | 20 31 3c 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f9 d0 a1 05 b1 12 13 d2 38 28 3a | 7b e1 92 d5 4d 8b fe 08 00 00 00 1c 00 00 40 05 | 52 35 89 2b 6d df 6f e4 b5 73 99 d5 81 ab e6 da | 1a 9a 77 69 | libevent_free: release ptr-libevent@0x7fb348053b10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34801da80 | #607 spent 0.0614 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #607 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a986c0 | handling event EVENT_RETRANSMIT for parent state #540 | start processing: state #540 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #540 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #540 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #540 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.226792; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.924348 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34801da80 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #540 | libevent_malloc: new ptr-libevent@0x7fb348053b10 size 128 "road-eastnet-nonat-126" #540: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #540) | 2b e1 27 8d d0 52 8a f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 d5 ad a4 cf eb 89 cf 33 00 bc 65 7f 4a 7b 8a | 16 3c 55 64 2b 44 36 7b dd 40 e5 4b 69 bb 87 d7 | 44 84 65 2c 80 59 b1 0b 26 0d 4b 17 d8 92 89 d5 | a8 39 88 9f 65 7f d7 e3 5e f3 f1 e1 69 ed 56 6f | 2d da 3b aa a1 f5 57 29 af ff 54 b9 33 17 09 e5 | 1c 0d 3c 29 e1 8b c4 f9 51 80 15 5e 1a fa 1a 83 | b0 dd b2 13 d6 42 a1 13 6e a2 49 94 b3 88 a5 52 | f2 25 96 67 72 ce ef 27 ee 12 d4 a9 81 d9 24 c0 | b5 47 34 ae 0d b8 be 17 8f d7 40 55 d5 69 22 bc | 39 f7 c5 28 22 3c 68 a5 3a 8d 6f 1f 00 85 29 77 | b9 55 ef 45 f0 37 a4 79 52 7d a6 e9 cd 97 64 1b | ec a9 e2 6b 2f 70 e3 90 d3 39 85 a7 70 54 7c ee | 29 b5 fb 95 bc cd d5 08 47 e2 10 f1 3c fd e5 2c | d9 d7 22 81 09 0d fa 53 8d c3 ee c8 2c a9 cf 74 | 00 4c 6d d4 7a 67 6f a7 66 48 98 1b c8 e6 db 27 | dd 8b f5 35 b4 13 6e 03 ce 21 d0 88 3b 78 0a fd | 29 00 00 24 83 64 8b 32 eb dd 3f 5a 87 dd 64 20 | 2e 87 12 47 14 e5 e2 45 bd 12 94 4b dd e7 b2 d7 | 43 01 e7 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 20 26 6c 5f d3 95 5b fe ef 96 45 | 0a fb 28 79 9a 9a 40 12 00 00 00 1c 00 00 40 05 | 9f b1 04 08 d0 1d 7f 34 66 26 cd 7d 6d a5 dc a3 | 2e 5b 4c 92 | libevent_free: release ptr-libevent@0x7fb38006f870 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a986c0 | #540 spent 0.0797 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #540 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378046090 | handling event EVENT_RETRANSMIT for parent state #634 | start processing: state #634 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #634 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #634 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #634 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.22688; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.970627 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a986c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #634 | libevent_malloc: new ptr-libevent@0x7fb38006f870 size 128 "road-eastnet-nonat-221" #634: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #634) | cf 5e f3 d9 0f 8f c8 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 6e 4e 42 21 e8 c2 13 74 c2 ba d4 76 e1 be 3a | 17 15 d5 c1 bf ca e3 9e c2 e2 ab ff 65 ee 7a 2c | f3 bf 14 cb 54 1e f5 5d 6b 0b 4b a3 c6 42 f2 c5 | 00 c2 f8 63 58 12 0f 9c c4 de 06 61 51 86 70 ce | 7a 0a 7a ff cc 71 b7 65 f5 cc 38 14 71 81 de 07 | b7 fe 20 84 4a ff 1c 5d 53 a3 fb 06 85 18 2b 9b | a8 30 c2 b9 8d e1 9c 07 b4 43 af 10 5f 03 0b 44 | c6 f5 8b 61 b9 fa 0b 3d 1c 32 63 5f 79 89 62 fd | 45 d5 92 76 17 fc 00 05 ef 5e 2c ec c0 11 2e 72 | 0f 45 e0 06 cd 9d 57 a6 22 61 8c 9b 78 8d c7 7e | 93 4b 6b 11 31 21 df b9 6f b0 e5 90 c6 6a 46 63 | 33 24 c9 bf 0d 8d 8a d0 3d 26 dd 1c 91 5a 75 0f | 70 13 b1 0c c1 ba 7c c8 70 09 19 0f b5 cd 04 5e | 6a af 66 e1 91 d5 09 48 02 32 4f dc 10 ea f4 57 | c2 40 bb 53 d3 0b 66 f6 59 f4 9d 9f 3c f5 45 a2 | 33 3b d9 2c 95 a0 76 aa 18 c3 43 fd 17 da c0 00 | 29 00 00 24 30 83 66 63 cd a6 58 35 d0 aa fe c7 | 9f 22 4a b9 bb d2 ab 8e e4 52 a2 c8 ac d9 43 99 | 4a 56 b6 54 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 4a aa 08 58 24 5b c5 80 af 06 0d | d7 f8 bd d3 f5 50 b0 3c 00 00 00 1c 00 00 40 05 | d9 15 55 e8 f6 53 18 54 ee 68 b7 cc 78 54 e7 63 | 8d 71 15 9f | libevent_free: release ptr-libevent@0x7fb3800648b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378046090 | #634 spent 0.0655 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #634 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354046090 | handling event EVENT_RETRANSMIT for parent state #545 | start processing: state #545 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #545 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #545 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #545 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.226953; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.937299 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378046090 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #545 | libevent_malloc: new ptr-libevent@0x7fb3800648b0 size 128 "road-eastnet-nonat-106" #545: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #545) | 40 cb 66 3b 79 de 72 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 5b 7a 86 ba 9c 03 fc 9a 35 b3 49 7d b8 a9 eb | ce 9b 15 66 7f 3d 65 56 ca 83 c0 b5 c0 d2 9b af | bf 94 33 79 9e 6a 89 29 27 fe a1 c8 69 70 d6 9d | 72 b4 78 99 de bd 56 1e ee 52 58 81 e5 79 d8 fc | 9b 01 47 2e f9 5f ff db 1b 0c 1d 6b d2 24 13 26 | 4e 14 5a 53 41 21 88 e6 85 34 1d 40 8d 0c ab 68 | 2f 2a e8 36 f9 d2 8e 74 83 80 31 c4 ee f0 6f 04 | d8 06 8e 87 47 f7 48 6b 1a 9a d8 72 1e 44 3e 1e | 94 73 03 f7 b6 b7 71 80 64 13 af 6f cd 97 48 25 | 27 b1 25 73 1d 03 81 9d 9b ed 92 d1 b0 47 c5 19 | 43 4b c5 91 96 cb 5e d0 fb 41 6d fb 23 51 8b 64 | 9b 4b 49 79 cc de 0f f7 0b c8 5d 39 be 6a 5d a6 | e5 65 4b fd f0 3d 65 42 41 d7 16 db 74 2b 56 12 | 51 92 12 04 90 41 8b 34 9a 75 ef 99 31 b2 53 fa | ec 4e df db 6b 7b 92 59 ae 99 e6 6b a1 12 97 31 | ed 33 0d 5e 99 91 c4 04 5f f2 a1 92 4f bd 71 0b | 29 00 00 24 8b 68 1c b2 c6 cc 60 af d5 80 42 4c | 34 71 a0 ef e4 ac ff 5b e1 55 8c 60 71 90 0a 7e | 13 6c 58 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 b0 98 38 8e 87 51 0e dd 45 6a 77 | ed ad b4 ba d2 48 07 74 00 00 00 1c 00 00 40 05 | c8 e4 a8 78 6d 64 59 0e 02 cc 7d 7f 34 3a ae d2 | 96 b2 88 9d | libevent_free: release ptr-libevent@0x7fb354054010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354046090 | #545 spent 0.0635 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #545 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab3980 | handling event EVENT_RETRANSMIT for parent state #543 | start processing: state #543 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #543 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #543 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #543 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.227026; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.920818 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354046090 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #543 | libevent_malloc: new ptr-libevent@0x7fb354054010 size 128 "road-eastnet-nonat-11" #543: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #543) | 8e 44 72 50 b9 d3 dd b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 41 24 1a 7b 6b 70 54 d6 bd da 9a 74 11 c1 10 4c | 35 ce 24 8a 41 de 3b c0 5b 1f ca bb 16 3b d8 1c | 1e a4 54 6d 24 65 47 b9 56 f7 04 e6 39 1c d0 98 | 83 cb 9e 40 be 51 70 af 81 68 b0 d8 3e 19 c8 15 | e4 25 aa 79 9c 90 e2 25 c5 ca b9 8c 40 22 6c 4b | 93 ad 78 af 16 d2 3d f3 8d 27 b1 61 55 d3 78 18 | 3a 04 68 63 37 a9 4f 5d fc 04 16 94 42 0d da 3b | 8c c1 6e d4 a9 31 72 3b 81 99 92 2b 83 15 9c d4 | 8b 0e 27 49 4d c1 a2 ac 6c 30 cd b3 8d 5a 76 66 | 00 bd 4e 1e 9f 08 70 f9 6c 29 f6 48 96 a2 b3 24 | fb 0e ee 0a ff 43 23 ef f7 df b7 1d 3c 50 f5 21 | 78 9e f4 1f 72 64 73 81 56 af c6 bf 6f 78 68 b6 | 23 6b 4d 8c d4 8f 95 9f e4 07 d6 99 60 6f 4f 68 | ff c8 49 ef 62 2d de 2b 39 14 98 51 d2 c8 bb 9f | 9f 3c d8 92 38 bf 91 56 69 62 cc 92 f0 79 c0 f7 | f4 11 ff 98 80 77 af d0 41 c1 25 02 72 ea c9 c6 | 29 00 00 24 54 02 f2 6f 33 5c 6e 1c 37 ce 9e 0d | c9 7a 13 59 0a 74 e5 bf e6 80 24 a7 f4 41 a6 33 | 04 30 82 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 fb 77 bc e4 59 3f 3a 12 ff e7 0e | 5d b1 f7 87 35 40 87 23 00 00 00 1c 00 00 40 05 | 86 cd c2 c9 ec 15 a4 23 df 3e 79 59 a6 b0 4d 70 | be f0 fe 01 | libevent_free: release ptr-libevent@0x7fb35006cb20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3980 | #543 spent 0.0815 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #543 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #583 | start processing: state #583 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #583 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #583 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #583 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.227121; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.938569 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3980 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #583 | libevent_malloc: new ptr-libevent@0x7fb35006cb20 size 128 "road-eastnet-nonat-6" #583: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #583) | ee 37 ee 52 ed a9 c3 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 a4 f5 71 cf 07 11 54 77 c8 dc bd ad 96 f0 01 | 5d a4 14 b5 a6 c9 a5 8c 07 7c 60 be a1 8b 30 17 | 0d cb bf c7 58 fd 5c f5 d2 3d dd 6b 17 ca fe 28 | 75 d1 d9 89 ad e6 fa bf 8a 41 2a 16 1f 72 19 b5 | fa b3 fe f4 08 23 24 22 95 34 55 fd ba a3 89 6b | f3 72 8f 60 ab 16 03 0b e3 7c 7b 79 7b de 9c 09 | e3 e5 5a 50 1f ec 54 0e 6e 2b 44 25 a3 4b b5 b9 | 40 85 8c 3d 6b bb 5d 52 c0 1f 28 1d c6 f3 f2 46 | f2 e5 18 48 a8 50 9c e8 18 6b e0 d8 c9 f8 99 b3 | 9d 7e 38 69 ed ff df 3d 1e 61 57 86 a8 0a e4 e7 | b9 e1 4a ad ad 0b 8c 53 f1 1d 20 66 9c 6e 12 ed | 4a 64 77 80 75 c0 8e a7 e7 a0 ec 74 74 9a 22 d2 | ed 8b 25 d1 aa db 80 ca af 4d 51 c5 3a ff 34 e7 | 01 6e ef 37 60 dc 73 7b 12 57 ba 0a 31 0d 83 0a | 8c 77 6a 78 fe 86 74 7d 3f c3 4e 0d 39 54 83 b4 | 7c 64 dc 24 28 35 25 63 99 9c 79 c9 80 75 2e d0 | 29 00 00 24 71 83 b5 1d 55 d7 27 53 1f 29 9e 3f | 3c f1 26 1a 11 ac 1d 70 ba b0 78 18 67 71 1e 34 | 60 b9 78 a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0d 09 e0 45 78 0a 9d ed 5e 85 e2 2d | 30 cb b9 bb dc c5 6e a8 00 00 00 1c 00 00 40 05 | 05 40 6d 6e f0 4a bd dc 3b 91 6d 9b 95 75 10 8f | df 31 bb 10 | libevent_free: release ptr-libevent@0x7fb36c06f9f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #583 spent 0.0642 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #583 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358009690 | handling event EVENT_RETRANSMIT for parent state #606 | start processing: state #606 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #606 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #606 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #606 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.227193; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.965917 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #606 | libevent_malloc: new ptr-libevent@0x7fb36c06f9f0 size 128 "road-eastnet-nonat-223" #606: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #606) | 23 c4 ab 3f 0f 4d 11 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 ec 57 8c 95 7b 1b 15 f8 8d ea a4 a3 af fe de | c8 50 9d 01 42 a2 a8 d6 b3 0f ab aa a3 20 6b a8 | 43 36 ac 25 c0 23 8f 9c cd 38 59 18 58 4d 26 27 | 3a c1 0c 20 3d b4 f2 a3 6a 0b 85 ac 0d 0c cb b8 | b2 27 34 92 1e d8 c1 ed 04 88 17 ec 3d f0 78 9d | 19 06 f9 a8 2e 5e 2f 6e 4a 1c 90 db 5f 93 41 e4 | 28 08 f7 7a 45 4e 76 50 c3 e3 6e be cf fb 71 40 | 41 9c c6 87 30 7d 0a d4 8c b5 0f c7 31 32 44 ba | 3a 9b 83 7d 6b 03 e1 c1 68 94 44 99 8a c0 56 cb | 60 44 86 42 73 d4 b2 3a 24 29 f0 d7 e7 c2 92 6f | ca 66 01 13 32 22 64 32 e0 45 28 0f 62 51 89 c6 | 22 97 d2 d2 ee ea 04 89 40 64 4c 95 db fd 1a 35 | 63 e6 0a f3 7f 06 ca e1 8e 13 8f 8e cf e0 ac fd | 6c 90 77 9a 8a 33 7c d0 d9 ee f2 a2 51 90 42 0f | b9 cb 13 5f 29 0a cb 86 1a e6 6a 5f 79 aa a1 f7 | 73 3c 37 36 16 c6 aa 27 ef 60 b2 ed ae a6 69 93 | 29 00 00 24 16 68 47 01 32 e0 21 95 ec 7e d5 06 | 76 a0 66 58 60 6e 0d de ea 44 b2 e6 49 d7 45 61 | 92 31 62 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 9e 40 be 82 89 76 10 a5 a5 b3 c0 | c6 a6 27 e3 b1 8f 5e 15 00 00 00 1c 00 00 40 05 | 9e 23 71 0d ac e6 cd ef ec 0b 33 3c 87 a3 e1 e7 | 66 2f 45 0f | libevent_free: release ptr-libevent@0x7fb358059b60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358009690 | #606 spent 0.0635 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #606 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c03b210 | handling event EVENT_RETRANSMIT for parent state #575 | start processing: state #575 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #575 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #575 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #575 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.227279; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.941602 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358009690 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #575 | libevent_malloc: new ptr-libevent@0x7fb358059b60 size 128 "road-eastnet-nonat-62" #575: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #575) | b9 99 36 5a 8c c2 79 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 c8 04 79 a7 ca 7e 22 ae 09 07 e5 fc 49 20 ff | d5 2c 7e 22 4c 72 c0 78 1e 2c 5c ec 12 7c 72 d2 | 02 e8 75 7b 4a a7 3c c3 16 5c 13 70 ea 37 54 f9 | 56 e8 d3 91 10 1a 84 a7 6a bd f8 ed 5e e4 34 35 | e4 61 65 f6 21 ef d0 e1 bf 6f 09 fe ff af 3a 45 | 86 75 a8 02 ec e4 0e 75 42 6b 01 d8 b1 76 3d b4 | dd 64 39 8f d4 1d 82 58 1e c2 7c 1b 86 61 97 0b | 7a c0 a1 e4 47 98 4b 18 ef a4 43 98 6c 7e 6d d0 | 16 22 ae c2 a0 b2 46 36 87 d4 91 30 13 3f 9a eb | 8a 99 16 71 39 ce 4d 5e 49 23 27 dd 31 e1 69 d3 | 97 f4 5c 55 69 dc 26 6c 11 fa 11 8a 2a 43 c5 d6 | 25 6f 41 fb 1c 99 a2 b8 45 cd 12 29 39 ba ac a3 | c6 02 a2 8b a0 be b1 46 84 7b 24 9a f3 d6 f9 65 | 1a 69 bd f7 e8 de e9 5a df 78 41 ab f7 29 e1 6b | f7 12 cb 1a 99 80 ee c2 16 60 54 4d f3 eb 93 e7 | 80 78 df 65 e2 d4 7f 1b 6e a6 c2 48 37 dc 57 12 | 29 00 00 24 b8 4f 87 74 9c 80 54 81 1f 37 0b 79 | c0 75 5b ab 09 6f 94 95 e5 f3 52 5f 2d 7b fc 69 | 2d 41 18 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 17 0c 0b ea 42 91 a8 38 34 87 4d | f7 fc 36 4d 5c d3 fc 11 00 00 00 1c 00 00 40 05 | d9 91 bf d5 e3 57 28 b5 8a cc 1f cf ff 34 03 80 | 9c e9 c7 70 | libevent_free: release ptr-libevent@0x7fb36c0542e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c03b210 | #575 spent 0.0907 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #575 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb380015160 | handling event EVENT_RETRANSMIT for parent state #538 | start processing: state #538 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #538 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #538 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #538 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.227377; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.924464 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c03b210 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #538 | libevent_malloc: new ptr-libevent@0x7fb36c0542e0 size 128 "road-eastnet-nonat-50" #538: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #538) | 7d c2 7d 21 ef 8d 9c cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 92 33 2e 2c bb fa d3 c8 4f 04 33 a3 d9 67 23 | c5 f1 25 5c 53 26 1a cd 8a 43 1a 34 d0 e0 56 a7 | 2c 60 2d 8e 0e dd 90 95 15 0a 6b e5 9a cc ab f1 | 7c bd 19 8d 97 83 43 89 b4 a0 d7 4a db 0b 32 48 | 37 e5 2e a6 a4 51 00 59 4d 06 a6 4f 7e 5a c1 3b | 41 2d 91 05 a9 98 a0 d8 9a e1 37 d4 eb e2 b3 93 | e7 01 b6 51 59 81 49 b7 c7 db bc 77 53 8d ec 96 | aa 77 df f8 25 74 3c 8c 99 15 73 9e 96 a4 29 97 | 67 0e 10 a2 47 f8 b3 64 aa 76 27 48 03 49 0b e8 | 8e 18 c8 17 4a 26 1c af 91 66 f4 48 af e2 d7 d4 | 44 38 3e 28 ac 6b 9e 39 19 3f ae 6e d1 64 ae 00 | 5c 63 81 a7 65 f0 45 ba 8a 0c 4d 79 03 55 a4 7a | 72 cb f1 39 e4 d0 28 d0 3e 02 49 3c 8a 03 29 fa | 32 8b 50 0b ba d4 8f 2b b2 0e bb bd 1c 1c 88 74 | fc 9d 0d ed 49 4b 7d c7 5e c8 b1 dc 66 01 28 d7 | 81 70 ee a0 95 cd 9e 29 51 a2 d1 8a 79 cc 01 2d | 29 00 00 24 0d 80 72 91 5f 6c f2 ee ef b6 16 64 | a0 b5 22 be fd 2c d0 f5 a5 ec b8 1b c0 82 2c aa | f7 2e 69 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 35 66 94 43 28 e7 40 5b c1 a0 78 | 2b ba 2a d8 0e c9 44 ab 00 00 00 1c 00 00 40 05 | 3d 34 49 ee e1 5a 54 f0 2b 50 8b e9 80 0b e1 58 | a7 e3 51 fd | libevent_free: release ptr-libevent@0x7fb38006a090 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380015160 | #538 spent 0.0794 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #538 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a5da90 | handling event EVENT_RETRANSMIT for parent state #568 | start processing: state #568 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #568 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #568 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #568 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.22745; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.942227 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380015160 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #568 | libevent_malloc: new ptr-libevent@0x7fb38006a090 size 128 "road-eastnet-nonat-34" #568: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #568) | 6e 64 73 85 ce f2 b0 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 a3 99 bf 78 b9 d4 1a 84 24 de 04 7c f3 4d c8 | 96 8b 02 59 28 04 a0 26 9f 13 67 64 f7 77 7a 65 | 5c 17 49 3e 43 8b eb 50 14 de 87 67 95 79 66 a4 | ac 29 76 ee dd 7d 07 1f ac 4d a9 5e 2d 67 5f 35 | c1 62 fb c8 15 ae a3 12 9b c1 7e 41 bc 7b ec 39 | 5b 29 5a 0f 5f 02 56 47 d1 33 0b 64 a8 f0 f9 e0 | 79 a9 8c 6d 5d d0 49 7f 45 3b 2b 8e b6 e4 e8 15 | de 83 5e 1a 47 c0 32 44 cb e0 50 bd 65 a0 22 bc | 0b a6 8b 59 f8 c4 16 dc 3f 1f 41 55 d8 a6 4f 00 | f4 0f fd 9e bb a0 ca 89 1c f2 5b 3e b5 1d b0 8a | ed 21 82 3c a3 44 7f 36 e9 37 bc ac c1 e1 00 c4 | 04 65 71 de 20 77 8c bd 4b 28 11 32 5a 14 67 24 | 07 50 c4 30 94 78 de 21 2b 34 e6 c7 52 91 19 f8 | 98 c0 be 08 e1 94 2a 06 f0 4f 8e 0c d1 26 ea 08 | 99 06 ef 43 9b 53 fc e2 1b 86 fb cc 41 b8 4f 56 | b1 9c b0 66 18 e0 a2 81 3f 3a d6 0e 31 c5 b9 d0 | 29 00 00 24 13 36 f4 68 46 c8 45 cb 43 3d ab 7d | 06 e4 d0 2e f6 fd d6 0f 63 23 da 46 eb bc 2f aa | 4d ed 12 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 84 1a 56 ea 9e db cc 8f 31 8a c2 | 65 e8 4d d8 8a 02 34 c8 00 00 00 1c 00 00 40 05 | 74 34 3f f7 0f 8a 4f 83 f5 c9 a4 b3 22 9c 5e 1d | e6 10 1a 44 | libevent_free: release ptr-libevent@0x7fb37005eff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5da90 | #568 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #568 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ae48c0 | handling event EVENT_RETRANSMIT for parent state #578 | start processing: state #578 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #578 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #578 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #578 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.227536; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.94376 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5da90 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #578 | libevent_malloc: new ptr-libevent@0x7fb37005eff0 size 128 "road-eastnet-nonat-143" #578: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #578) | 68 e2 ee c8 4f 05 0e 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 22 a6 6d d7 fc 8b 0a 14 19 3d f1 fb 0a ed f9 | 6f 90 9e 8a 9f a9 d8 ed d1 df 6a a2 d8 b2 22 2e | b1 59 73 5e b3 ab 9a 31 51 87 54 fd f4 e8 4e 8d | 3f 21 83 6e 35 41 fe 08 72 f5 2d 8d 2a f4 ba e0 | 91 8d f0 a1 05 86 67 4b fb b8 b6 6d 1e 1b 25 24 | 22 78 8b 7f 2f cf 5d 9a f7 63 da 29 5a 14 94 0b | 35 6e 33 f7 ca b2 64 fd 7c 9e 63 2d cf 43 41 22 | 59 51 84 8f fb 27 d9 fa 44 51 1e 67 02 f1 d2 0c | 45 0f 35 78 a9 8f 35 39 ea c6 d9 8d 03 b0 0f 84 | 80 91 04 9f d8 fb ff 28 d3 ab da 21 66 90 1c 59 | 8d 41 8b a6 7f 98 ab 4c b6 53 24 a3 ad 53 6f 51 | 8f f2 b7 4c d3 82 c2 ad 67 89 34 ab a5 77 52 48 | 5e 0b f2 ef f8 d5 a0 42 b1 fe 42 08 88 ca 60 89 | 3b cf 5c bd a3 63 ec 76 02 82 7b 9a f3 6f d7 d6 | dd e6 17 44 06 f8 37 9b 67 a7 db 60 51 b4 ad 18 | 60 cb 7b f0 7e d2 5e 9d 2e 49 2f db ef 23 bd 96 | 29 00 00 24 46 bf ee 27 91 3e be 20 10 cf 9d 0f | e6 4a bd 7e e9 3b fd c7 94 37 e1 c7 cd 2d 4a 64 | 84 e7 2b 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 0f 29 05 fe c1 9c 12 af b5 65 ca | 32 36 33 1d 77 e8 41 70 00 00 00 1c 00 00 40 05 | 4a 88 68 5c be 68 1b 50 17 99 f0 8c 97 cf 78 ef | ec cb 25 c1 | libevent_free: release ptr-libevent@0x7fb354069fa0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae48c0 | #578 spent 0.107 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #578 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368017ea0 | handling event EVENT_RETRANSMIT for parent state #636 | start processing: state #636 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #636 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #636 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #636 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.227639; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.962002 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae48c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #636 | libevent_malloc: new ptr-libevent@0x7fb354069fa0 size 128 "road-eastnet-nonat-146" #636: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #636) | ce ed f3 5e ed fa 9c 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 c3 55 ec 4f 5b 4c 21 a7 89 24 6e 2a b9 a9 cb | f8 19 9e a3 b5 df ee 5a 2c 71 bc 32 c1 92 74 f8 | b0 ab 4f 8f e7 f9 3f 29 7a 8c 9f 2f d7 89 ae 25 | 61 ab 3d 60 a3 0e 51 68 4c 02 b2 37 56 25 c1 f8 | bb 4a 51 31 0f 4f 85 cb a5 75 3a af 8e dc cc 87 | a5 bd 11 5b 66 d2 55 75 a4 74 43 78 e6 bd 37 d2 | 03 60 a4 df 8e 0f 50 d9 f0 84 a1 4b 87 50 ad 61 | 89 fd 53 a9 95 2c 82 05 31 04 36 b8 df 85 82 bf | 91 1b 12 8a 8c 72 93 cc 94 19 4b ed 3b c6 73 96 | c9 e4 a9 4f a1 e7 46 f7 b8 64 4d 8b b6 9f c4 71 | db ce 40 02 9e 98 7f 48 f3 9a 88 fa a8 90 63 74 | 87 33 f7 67 a1 6e 37 63 07 fd f7 f2 21 22 b4 ad | 8c e8 70 46 a2 30 3a aa 26 d0 99 b2 70 88 82 11 | e4 b8 46 de e2 85 7c 68 ae a6 76 d5 48 a3 de 62 | 80 b5 a8 b6 cf c8 b8 fb d0 a3 90 c3 74 cb c4 ea | 05 11 15 0d eb a6 bc f1 88 ed c5 82 fd 7e 24 72 | 29 00 00 24 e5 61 c1 f3 64 2d 4c f6 6f 55 99 d2 | 6d 06 b7 7f d0 4c 35 18 0b 4c dc f2 04 b9 cd b4 | d2 a9 94 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 4f 92 a8 39 a0 4f db 00 14 5d 39 | 5e 60 0b f6 04 83 59 50 00 00 00 1c 00 00 40 05 | e2 2e ff 0f c7 2f 00 8a f3 ce c3 f8 79 de 24 f9 | 92 17 31 34 | libevent_free: release ptr-libevent@0x7fb37c056bd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368017ea0 | #636 spent 0.0617 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #636 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b246c0 | handling event EVENT_RETRANSMIT for parent state #535 | start processing: state #535 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #535 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #535 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #535 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.227708; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.925764 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368017ea0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #535 | libevent_malloc: new ptr-libevent@0x7fb37c056bd0 size 128 "road-eastnet-nonat-19" #535: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #535) | d5 3d 4d d1 1d 8f ff ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd a8 30 7d fa 09 0e 91 b2 9d 3d 19 f4 ee 14 55 | 74 eb 7d 16 30 9b 64 08 bd 51 c6 0d 08 b3 39 3b | d5 c5 d3 d3 a6 f2 f8 14 c2 6f d7 95 59 0a fe e3 | bb a9 65 de c8 14 9e f5 05 83 26 75 c6 4c 05 34 | b4 a0 d6 d8 84 8c 16 46 27 7f f1 b6 a1 52 54 4b | 1a e2 b8 4d 24 eb ac 25 a2 41 76 22 20 0c f4 96 | 27 28 ef 3a 94 b6 4e c6 21 31 ca 90 2d 01 ac 3c | d9 6f 71 29 9d 32 e3 06 10 09 09 3f 08 e0 93 76 | aa 17 e1 ea 49 4d 7c 42 77 05 f9 17 bf ad af 3b | ed b3 91 7e 42 2f 67 a5 df de 4e ff 93 f2 9e 57 | 56 30 c0 46 0a 65 8c 18 8f d0 75 64 b5 32 6c 49 | 39 97 ce e9 7b c7 0e af 02 39 df da d5 ef 53 47 | cb a3 4c 02 a0 b2 1e 76 9e 5a 01 81 ed 62 af 75 | 23 20 b9 1a 39 86 e6 f9 03 41 1a d7 4e e7 c4 f5 | 82 a8 7a 1b 8c da 94 0c 14 8e 83 05 ac d2 dc 89 | 48 f7 0b 1d 07 c9 75 9f ab 81 e0 05 15 0e d1 2f | 29 00 00 24 c2 c0 89 96 d0 f7 59 31 53 11 f7 4a | 36 92 ef 7e 38 2b 45 e1 10 42 96 da 05 ff a3 7a | f0 1b 89 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 9e 60 66 94 a7 a4 7a 54 28 cb 5e | bf 06 cf c4 93 18 58 c1 00 00 00 1c 00 00 40 05 | c6 37 76 00 c2 f2 29 53 78 dd a2 4d 2d 0a f6 f9 | 70 42 64 5b | libevent_free: release ptr-libevent@0x7fb3700597c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b246c0 | #535 spent 0.0628 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #535 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358023aa0 | handling event EVENT_RETRANSMIT for parent state #587 | start processing: state #587 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #587 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #587 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #587 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.227779; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.94446 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b246c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #587 | libevent_malloc: new ptr-libevent@0x7fb3700597c0 size 128 "road-eastnet-nonat-113" #587: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #587) | c3 7c 98 3d b4 74 ab 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 ba c9 c0 d8 66 df e8 7c 54 40 82 4e 21 c1 07 | 59 68 7f 81 34 b6 35 92 5b 89 98 f6 ad 25 86 e5 | 73 8a 9a f2 4c 57 89 56 da a5 ff d6 a3 7f af f1 | f1 2e fb c5 11 47 ee a1 95 f5 26 dc 9e 47 06 cd | 34 b9 65 37 bd e1 04 27 c9 ff dc bf 67 78 96 38 | 52 9d 88 a0 32 73 3c 23 28 64 dd 93 b3 78 9e 2c | f9 cb d6 a4 86 ba f5 1b 60 c2 ad a2 9f 3e 81 a2 | f3 45 de 44 3d 28 04 c3 a1 6e 40 b1 4f 46 45 df | 5a 2a 79 6c 8f ae b8 30 ef c6 4a 6c 44 7a 01 b2 | 1a d8 98 92 1c 93 3e 73 34 b7 46 f8 42 08 19 36 | ba 97 66 22 2c 03 8b f7 14 9b 23 5b 0b 56 49 a9 | f1 9f 4c c1 da 59 b2 4c 96 91 d8 04 27 b3 bc 68 | 94 52 76 73 62 13 56 15 d9 2e 51 2c 30 ed a9 15 | 37 ab 85 06 28 93 eb f4 10 09 a8 e7 65 60 d0 d8 | c4 01 fb af 1e 97 f6 a3 48 1a 1f f9 86 1a 3d 6b | 8c be 9b 4f 2f 82 4e 29 1d 28 1f 1e 06 cf 26 25 | 29 00 00 24 23 67 1d fb 57 60 2a aa d9 1f a4 c1 | 63 ac 06 a0 22 92 47 d7 31 b6 6b 26 2a 2d 93 db | 2d dc c7 6b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 84 7e f9 13 29 fa bb ae 5d 14 1d | 96 1e a3 25 f7 97 44 66 00 00 00 1c 00 00 40 05 | 4c 51 eb 1f 58 50 45 24 34 60 90 38 ee 81 d2 d9 | 53 4c 38 07 | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358023aa0 | #587 spent 0.0632 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #587 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a1da10 | handling event EVENT_RETRANSMIT for parent state #552 | start processing: state #552 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #552 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #552 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #552 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.227849; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.927687 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358023aa0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #552 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-10" #552: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #552) | ed eb 93 f8 7e 60 de d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b cb f1 c5 c9 33 2a 34 0e d1 85 1e 48 7b 2b 08 | 83 b8 ce 5c a9 55 37 f8 cf f4 8e c5 bc 03 8b a4 | ae 96 a2 99 0b 56 12 df 0f 7d da 8a 34 b4 5f 83 | 09 a9 33 3c c6 3d 79 dc c7 d3 2a 27 cf 87 82 2e | be 41 d5 b9 12 08 ab ba 5d cd 0f e9 8e 49 e8 11 | 80 d1 8e 63 8f 28 10 90 ba d3 f9 e8 1d 55 c1 f8 | e8 37 30 e5 eb 01 66 f8 b8 97 81 22 9f a7 c1 69 | d5 16 ee ab b5 f8 e1 be 84 8c fb 01 eb e4 87 59 | 7d 75 49 01 0a 1b 9e a9 46 55 ad d1 ba 32 2e a9 | 77 b7 a4 2c bc 42 01 fe 0e fb fb fb bb eb a9 a8 | 3e f3 4b e2 8b f1 54 95 68 4b 2a 95 25 78 7a 77 | 00 70 42 dc fd 53 48 e3 79 e3 2b ca 77 e5 77 0d | e6 9d ff 3e f8 da 34 38 ce 09 d2 79 7e 81 3b 25 | 2d 6c d8 d3 b0 67 79 e6 62 d7 c5 cd a3 5d 0d a2 | eb 67 42 ca ca d0 84 ca 28 62 c9 94 e7 3b 42 83 | 2a 29 90 2e 9c bd e7 c5 5a db e4 f9 d0 a5 4d f5 | 29 00 00 24 e9 97 93 9c 1c ef 16 73 1b 7a 47 b3 | b5 28 72 23 b0 2e 07 f1 0f 02 16 b9 14 bf 9e a1 | f9 3f 2a 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 4f 42 bf 1d 63 d2 01 e4 5f 1c 60 | a2 c9 01 6c df cd 78 4f 00 00 00 1c 00 00 40 05 | d8 d7 5c 38 cf 5f 73 a5 21 81 fd 7c d5 fb 18 da | 9b e7 4c d5 | libevent_free: release ptr-libevent@0x7fb35805f320 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1da10 | #552 spent 0.0611 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #552 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #598 | start processing: state #598 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #598 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #598 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #598 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.227919; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.949441 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1da10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #598 | libevent_malloc: new ptr-libevent@0x7fb35805f320 size 128 "road-eastnet-nonat-89" #598: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #598) | c9 b5 3a 18 c3 59 d6 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c 21 c1 2e ba 75 c9 09 d5 c3 93 96 ab d0 78 6e | 7c 4e b4 21 7a 51 1d c0 17 80 c7 93 28 da 63 f4 | fd 05 0b e2 9e 56 d9 c9 20 88 91 c7 be c0 26 c6 | 69 60 dd eb 14 83 d1 89 6a 59 8a ef 06 c9 04 3e | d0 46 01 39 27 93 50 40 25 0c 45 25 36 0a 1f bd | de f1 21 bc de b9 08 3b f9 ba 42 b3 96 c0 60 b4 | 0d 0e 0c 07 28 8c 6f 6a 38 91 1d 88 1e 7b 03 94 | e4 fb d6 05 18 52 1a aa e1 e4 5e 96 ad 66 1d 62 | b0 d0 05 07 c5 30 11 d1 7f 95 2b b4 ff 32 13 e4 | e5 17 5e 41 18 f4 6d c8 fe 66 3f 13 56 7b 86 54 | 90 58 c3 20 c7 1a 0c 72 2e b7 70 1d d3 00 7a ae | 58 86 4c b8 01 f6 3c 05 9b 47 1a dc a2 b7 00 ef | 31 66 ce 4a 0b 4e 88 92 b4 d0 aa ce d7 48 74 fd | 97 17 1b be 8b 31 c9 92 66 31 9f b3 84 ef 27 5e | 21 dc b5 10 f8 ce 45 64 07 5f 53 8c e7 9a 08 0a | 21 62 59 5e b9 02 31 e8 fd 60 6f 2f e1 86 b6 ee | 29 00 00 24 48 f3 f3 5d 08 a4 f0 63 dc c0 92 c6 | 3d c9 7a 45 24 bf 25 2a 08 df 59 2f bd 93 33 07 | 05 c3 f3 24 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 93 64 b0 1e e6 88 50 1f 76 35 f4 | b7 15 8a d3 2c 18 77 4c 00 00 00 1c 00 00 40 05 | 3a 14 09 59 cd d3 06 ad 37 c8 d5 8f dd 06 36 68 | 88 b8 08 59 | libevent_free: release ptr-libevent@0x7fb3800540c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | #598 spent 0.0634 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #598 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350012bf0 | handling event EVENT_RETRANSMIT for parent state #512 | start processing: state #512 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #512 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #512 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #512 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.227988; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.924594 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #512 | libevent_malloc: new ptr-libevent@0x7fb3800540c0 size 128 "road-eastnet-nonat-140" #512: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #512) | 9c 1d 79 9c 4b 40 5f 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f e6 a4 db c4 02 2d 52 88 50 3f dc 30 82 ed 9f | 63 88 9c b5 3c c8 66 4a 37 be a1 3d aa fa fb 17 | f9 ac dd ad 9d 5b 20 51 15 fc d2 29 14 d4 2a 6d | f3 a0 8d 98 f8 da e0 12 75 4e bd 68 90 36 03 88 | 88 b8 f3 20 51 1f f0 57 2a c6 b0 97 a0 49 9c b7 | ad 6c f2 a7 06 f7 6a dd f3 22 78 ce 59 21 29 6a | 08 15 d7 74 fd 98 b0 83 c8 be 7d 16 eb bf fb 2e | e9 27 0a 5a 6e be 90 e4 cb 6a 36 aa 24 29 be 9c | ae dd 38 28 10 ed cb 2a 6e a7 2a ab b2 c3 1a ee | 88 bd 15 d3 67 e2 06 8e b6 97 80 a6 e7 00 87 5b | b8 76 fe 7c 8d d3 5e fd 05 4c 7a d6 96 d1 0a 11 | 2d a5 69 d7 c3 12 66 ec 98 02 9e 42 c9 77 fa 4f | 17 0c c6 fb 54 4a 9c 65 b5 be 12 f3 a2 73 e2 09 | a7 ee 4c 4f 97 4d 4f 10 71 3e 60 12 75 6e d2 f3 | dc 13 51 ee 44 b1 77 ed 2b d8 92 98 96 69 e5 ef | 91 3c 2e 84 e4 bb af 77 49 ac 6e 66 e2 85 88 c8 | 29 00 00 24 44 d4 21 93 f2 35 cf a0 d5 a8 8f 1c | f3 e0 06 82 de 41 7f 55 b8 ed f7 b1 6c 3f 58 31 | c1 b0 fc 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 3d ba 6e 50 5c 1f f0 71 43 e4 e1 | 93 99 c6 4c 68 18 ff 24 00 00 00 1c 00 00 40 05 | 1e ed 5b 7e 6f 31 a0 f1 10 d5 48 eb 40 5a a7 bd | a4 a8 9e e1 | libevent_free: release ptr-libevent@0x7fb38405d9b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350012bf0 | #512 spent 0.0624 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #512 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38800f8f0 | handling event EVENT_RETRANSMIT for parent state #574 | start processing: state #574 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #574 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #574 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #574 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.228078; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.939225 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350012bf0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #574 | libevent_malloc: new ptr-libevent@0x7fb38405d9b0 size 128 "road-eastnet-nonat-119" #574: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #574) | e2 ef 8b 16 3f e6 8d 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 80 9b ac b3 38 49 75 b6 22 00 a0 9d 93 a6 e9 | 11 43 29 2d 62 04 9b 9a b1 ba de 84 81 0e e7 1d | cd ff 5c 76 64 ba 18 74 a3 4a 09 63 04 00 26 2a | bf 09 0f 54 5c ff e2 c1 45 f0 c2 f6 3f 0a 9c da | 51 50 31 ad 31 4a 14 11 d3 2e c7 7d 83 22 2d bd | 53 08 74 70 d6 57 21 06 d4 a1 0f c1 e6 a4 84 5e | 1d b6 57 8b 0b 80 4b 3c 9f f1 e4 bd 75 2f d5 2d | 21 3a cd 7a 13 59 f2 16 f8 77 82 03 06 0a 42 83 | 17 94 64 c4 be 42 b3 21 8f d9 97 d0 cf eb 0f 6b | 23 03 9f ee 85 9d 07 b2 6b 9f c9 a7 2a 0b 97 54 | 4a 3f d3 58 4a 03 9e d1 76 61 53 9c 9d 3c 44 d8 | 20 2a f5 24 51 56 2a d6 31 c3 13 a3 58 26 1e 56 | bd 02 c3 74 00 2d 43 63 8c 32 86 92 e8 ff 86 7d | 59 2f b3 f9 c6 38 10 32 ef ef 33 bb 6d f1 d0 70 | 62 b4 df 27 80 5f fc 95 13 80 c9 0c ec fb e1 f5 | c1 58 36 dc de 1d 19 2a ba 67 9f d5 f2 bc 5b d5 | 29 00 00 24 4a 9c 36 dc 2a e9 b0 d6 4b b7 1c 33 | 3b c4 06 c1 a7 f4 11 82 75 7b bf 05 3c 37 b2 a8 | 50 3d 47 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a d4 1c 5f fa 34 64 8a 6c 74 11 d9 | dc 03 c5 f2 8c e5 1d 48 00 00 00 1c 00 00 40 05 | 47 f1 9d c3 97 23 03 bd 9f fd 5c 86 a1 b5 d4 44 | 63 f3 1c 6a | libevent_free: release ptr-libevent@0x7fb360067120 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800f8f0 | #574 spent 0.0945 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #574 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c00d120 | handling event EVENT_RETRANSMIT for parent state #595 | start processing: state #595 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #595 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #595 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #595 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.228164; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.970468 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800f8f0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #595 | libevent_malloc: new ptr-libevent@0x7fb360067120 size 128 "road-eastnet-nonat-69" #595: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #595) | 66 ab aa e9 c0 1d b7 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 88 48 07 d2 42 4a 84 d5 c0 a3 1c d8 61 7a 51 | c0 04 1f 03 a6 14 4a 32 5e 37 8c 55 58 7b 77 2c | fb 55 e5 4e 6e 7e 47 ee 34 35 95 55 b7 b4 f8 60 | 9b a6 0e e2 75 cb 31 e2 b7 b1 0c c7 21 34 4e 50 | 7e 01 12 0e a8 09 e6 15 2f b7 95 a1 e4 49 25 11 | ac 79 61 4c de 52 7d 92 78 d2 3a 93 7f 39 9e ea | 46 19 3b 55 df f1 20 bc 73 20 02 d2 83 5b c5 c6 | 0b 63 b0 e9 03 aa 59 7f c4 15 87 10 2c 75 31 89 | e4 a2 a3 eb 70 c0 6a 70 01 fd e2 c8 7f d0 49 6d | 0b 69 e6 19 f8 ef ed 1c b2 75 a1 ef be b8 a0 04 | 19 f6 c9 5b af 6f 00 73 b8 d5 c5 23 40 6a a8 85 | 63 89 e6 04 8d b9 58 50 ce 42 06 0d 04 dd f1 d0 | b1 74 e0 f6 e2 3c fc e3 28 f1 bf eb 46 d0 6e a8 | a2 18 6d cf 33 6c 77 01 6e 12 a3 df 95 47 d2 df | 9f e9 63 f7 ac ac 70 17 4e 2f 38 fa dc cb 8c 97 | 70 a7 26 56 6a e9 c8 f7 90 d3 4d cd 2d 8d 00 8f | 29 00 00 24 94 2f 5e 13 28 37 ce fc 76 9e ef e3 | 9f a7 fb e4 ea 24 27 bd c2 06 13 48 b6 99 58 8b | d4 82 fe 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 79 3a 6c aa 9d cd 78 ee ff 71 61 | 9e c1 38 f2 06 7e 22 47 00 00 00 1c 00 00 40 05 | 1a 47 95 0a 50 1d 20 46 3c 7c f6 eb 28 2d 43 03 | 7b 00 02 4e | libevent_free: release ptr-libevent@0x7fb36401f4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c00d120 | #595 spent 0.0903 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #595 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #662 | start processing: state #662 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #662 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #662 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #662 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.228261; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.975093 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #662 | libevent_malloc: new ptr-libevent@0x7fb36401f4e0 size 128 "road-eastnet-nonat-116" #662: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #662) | 6f f8 26 3d 46 67 06 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e1 15 32 77 43 3f ae 4b c7 5f 3f 2b dd 7f d3 1e | dd c1 5f 13 88 1d 29 8c 3e da 8c 02 5a 8d f6 d1 | 3f a3 f0 0a 58 d4 04 d3 f0 b3 db 26 fc 33 ce 46 | ec 5c 90 e3 6a 12 91 6d f5 be 55 11 24 66 8b cd | 51 d1 6c 4f ab d6 35 10 55 bd 81 f3 c5 9b 26 2d | f4 3f 70 2d c2 69 41 11 99 68 6f d6 67 f7 0b 94 | 16 15 37 50 dd 26 25 c5 03 89 2e cb 46 72 37 83 | a6 ca 48 57 46 11 c8 fc 49 a5 3f 23 f4 8e fd 9b | bd 5e f8 86 fe e9 d6 03 94 fe b5 73 a0 97 a8 36 | f8 6d 97 05 65 b5 9b 5b a3 4c 3e 56 89 a0 18 c6 | 54 22 3c 22 df 8c 9f 6b 24 e7 85 e4 91 73 3e dd | 3a 3d 86 ec 02 50 a4 d4 9b 1e ca d9 b8 85 33 11 | 56 6c a0 81 f5 30 19 45 f3 7e 2d d0 fe 89 3f 3f | 64 51 16 e1 24 be 5d 31 7c b3 98 ff 06 a6 e7 a9 | 85 09 74 83 46 27 19 d4 40 fc 28 57 e7 6b be 01 | 31 d5 96 a2 39 76 f1 7c 9a 2f 1e 01 ba e4 af 67 | 29 00 00 24 66 62 42 f7 ff d9 33 d8 69 d9 c8 18 | 14 3e 2e de dd 0a 0a 0c a5 a3 31 2b 3b 0a 7e 9b | 7e 11 99 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 54 03 6e e6 e0 19 5c f9 e0 4b 25 | 45 a9 f7 08 e7 02 7d 4a 00 00 00 1c 00 00 40 05 | 8b cf 33 fc 59 1a 80 29 98 08 22 36 83 94 58 20 | 7d d0 3f 09 | libevent_free: release ptr-libevent@0x7fb36006c900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #662 spent 0.0631 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #662 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c01da80 | handling event EVENT_RETRANSMIT for parent state #681 | start processing: state #681 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #681 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #681 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #681 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.228332; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.98234 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #681 | libevent_malloc: new ptr-libevent@0x7fb36006c900 size 128 "road-eastnet-nonat-170" #681: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #681) | 43 b3 87 97 a5 28 76 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 69 dd 2f f3 2d 11 ad a5 9c d3 5d da 0a 86 6b | 8c 49 25 0c 16 f8 de 41 b0 ac 6e 41 c3 d3 27 1c | 5b 54 cb 17 92 04 0e c6 6b 96 94 d9 db ad b8 79 | dd c8 5b bf 4b a3 2f 7c 6a 19 e7 ad 1e 53 14 f7 | d1 90 70 c6 a3 11 50 75 b1 1c 57 b6 52 72 e5 bf | 5f 38 47 3e 16 f7 e0 ac 51 3d 68 76 bd 51 68 b9 | 99 0e 7f af 6c 2d 48 06 10 6a 30 cc 70 5d 14 1f | f9 cd e8 dc 60 df 2b 6b b6 f3 6f 7e 00 e5 1f df | 04 ee 6d 38 b5 09 46 77 da d8 ac d9 bc dd 17 11 | 97 7f c0 a3 2a 8e e7 7b d0 22 8a 6e 6e cc 8a d1 | ee 68 9a 8f a3 46 20 76 f3 a4 2c f5 c0 c0 1e 77 | 2d 20 e2 fc 14 c2 66 73 98 59 19 d7 e6 3d e6 8e | 61 67 8e 25 aa c2 61 e0 9d 35 ef 0e be d6 35 38 | 8c 18 ce 74 7a be 48 b5 c4 a1 11 de 05 be 64 33 | e8 8b ac cd 76 ec 2b 48 c4 d2 9a 3c c7 9d b7 e7 | 67 3d c4 7e 7f 8d af 5a 9d 1c 23 aa 32 7a 83 a5 | 29 00 00 24 ab ab 32 27 cc 43 85 a1 14 10 62 ae | 10 ab 5a 1f 4b 33 ac a9 a7 81 9d 0d 60 06 a6 87 | e7 aa 41 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 f1 2f 02 50 94 bd e1 85 64 92 73 | e1 fc 7b 98 62 5d a3 7d 00 00 00 1c 00 00 40 05 | 0f dc 60 fc ac a0 68 fc 96 74 2f 45 a5 ab 4a db | c3 e2 5b 97 | libevent_free: release ptr-libevent@0x7fb35c0643e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c01da80 | #681 spent 0.0633 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #681 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #741 | start processing: state #741 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #741 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #741 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #741 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.228403; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.012482 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c01da80 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #741 | libevent_malloc: new ptr-libevent@0x7fb35c0643e0 size 128 "road-eastnet-nonat-217" #741: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #741) | 62 ac e1 dc 78 47 49 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 14 75 0b 46 c7 7e 2e 5b 84 9b fc 63 4f 7a bb b1 | bb 0b 39 b2 38 45 c4 46 64 96 9b f6 97 0f ad 64 | 77 d0 65 ce 45 75 90 09 8d bb 17 97 97 97 b2 fe | 7c 98 b0 3c e2 1b b2 75 9e 4f 00 17 88 80 52 35 | 5a e1 87 e0 03 97 21 fd f3 19 41 85 49 46 8f ab | 34 a9 9a fd f7 fd 73 2c 73 3d 6a 91 77 21 6d 6c | 79 4c 5c bb 61 7c 82 81 01 a9 8b f8 96 88 67 ec | 5e 9f 63 85 f6 a8 a9 74 84 a6 13 9a 7a ca 36 d7 | d6 5d 44 65 ea 98 9a 63 18 26 33 18 de 47 5a c9 | 7a 75 34 c1 c7 bd 4c 1d 3b 2c ba b7 c0 6e 1c 7e | 83 75 bf 9c ba 83 c0 f2 ba 77 85 7b 33 2b 90 b1 | c2 52 77 da 60 67 e2 5a f3 07 0b 1d 76 db f2 c8 | dd 92 77 15 ff 35 90 20 f7 3a 79 14 36 0e 74 98 | 26 48 0d 10 a8 b8 96 6e a1 d3 39 9c 37 f1 09 c2 | d6 18 46 cc 20 41 73 2d 13 cc 4b 13 c4 75 47 56 | 6f 8d 2a 56 34 65 b3 20 fa a7 7c 74 84 64 26 20 | 29 00 00 24 98 46 88 9e 86 0c 01 40 55 4c d6 79 | b1 b2 76 d9 6d f0 c7 03 be fb 8a 36 84 6a 6b 74 | 5e 47 68 8e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 45 41 a0 85 77 fe f1 d1 6d 6e 5e | 4b d5 c9 60 59 e4 cf 31 00 00 00 1c 00 00 40 05 | 3f 98 bf 78 15 51 e4 00 05 0a 6e 9b 09 7f 98 a3 | af 3d 07 7b | libevent_free: release ptr-libevent@0x7fb36007a360 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #741 spent 0.0617 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #741 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c039e80 | handling event EVENT_RETRANSMIT for parent state #573 | start processing: state #573 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #573 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #573 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #573 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.228475; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.958713 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #573 | libevent_malloc: new ptr-libevent@0x7fb36007a360 size 128 "road-eastnet-nonat-83" #573: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #573) | ad 3e 6c 78 39 d7 59 85 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 bf 7c c9 f8 3c 5a 65 38 6f b3 01 ce 5b f5 30 | a7 ca bf a7 0a 2f 6d 46 e4 95 8f a9 a2 c3 62 81 | 94 18 87 7c 67 ac a9 c8 f7 1a 98 84 db 40 bb af | 3f 2f 53 16 16 52 73 41 99 39 2a cb ce f0 16 f6 | 59 5f 0a b0 20 7c 3d e9 5a a2 88 c5 c1 bb e2 4d | 7f ce 41 78 9a 73 4c 9c 78 3b d4 42 d4 ea b6 26 | c7 66 8b db 44 b6 63 44 77 ad 6a 85 b2 f6 09 24 | d3 1d 9e d9 14 90 b9 f3 03 6a b8 35 9d 2f 7e 69 | 38 a8 b1 78 a7 b9 d5 b5 6e 03 4e df f1 29 29 d6 | 73 fb 44 0b 0c b8 b6 ff 70 60 7e 98 07 b6 c6 7f | c1 02 f7 52 15 2f 51 21 2d 87 70 fa c3 6d a5 50 | 6d c2 b7 77 96 5a 3f ba 71 2f 23 99 27 34 36 64 | 93 e7 80 7e 69 88 92 68 e6 5b cb fb d5 c9 2a 24 | c5 78 ae b1 67 8c 39 a4 a1 f5 8f 57 47 ac be 22 | 0c ba 38 7d fd 68 4d 5c f9 30 0d 91 30 9d 25 fc | c6 0f 2d 2c 17 7f 55 f6 65 7c 10 de 1f 7f 50 fb | 29 00 00 24 50 ef b4 44 89 5d 96 3d 4c 55 e3 f3 | 30 1e a6 1e 68 57 c5 9e 6a b1 8f fc 63 11 d1 e1 | c2 23 29 d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 0a ea 0a 2d 9d 52 e1 84 99 c3 78 | 56 e2 02 95 3c a9 b9 67 00 00 00 1c 00 00 40 05 | 07 da 52 ba 89 af c4 46 3c 5a 2a 18 50 3f 02 03 | d1 88 0a 69 | libevent_free: release ptr-libevent@0x7fb37c08aed0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c039e80 | #573 spent 0.0626 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #573 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb364029270 | handling event EVENT_RETRANSMIT for parent state #555 | start processing: state #555 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #555 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #555 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #555 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.228545; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.948142 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c039e80 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #555 | libevent_malloc: new ptr-libevent@0x7fb37c08aed0 size 128 "road-eastnet-nonat-133" #555: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #555) | fd 31 e4 af 59 3e ae 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 85 72 9c cb 7c 09 f8 23 fb f5 57 cd 4e 83 b6 | a0 e6 5a 64 5e 52 19 6a 4f a7 4e e3 ab 51 d1 ee | b0 ba 52 7b dc b8 e2 a2 b5 3d 66 0c 60 98 2f 4f | 13 c0 96 12 cc 2c 3a 0e e9 91 83 23 1e 4e 39 c6 | 9f d6 0d da 47 3d 42 93 4d 91 c2 2f 26 04 15 c3 | 41 c4 f8 0a d7 03 ee 39 9f 96 ac c4 3e 56 6c 05 | 15 ec 80 86 ac 76 e0 e4 08 62 35 f8 6c eb 25 c5 | 19 28 f6 9a dc 30 d8 8a 67 5e 34 70 48 34 07 96 | e2 ab 1c 7f d5 2c e0 8a 96 fd 4e 98 8d 6c aa ee | 67 4d d3 dc 1e 6c 3d db a0 95 a1 d5 a6 74 27 2f | b7 3e e6 fe c4 ac 66 d7 25 d1 4f 42 90 09 08 6d | 35 3d 9b fe f1 b0 50 00 be c3 ae db 45 71 57 2d | 99 1c ee 2e fa c8 1e 96 ae 9a 9e 66 4e ff 6a a6 | 84 c5 c3 4f c1 1f de cc 77 17 f0 b0 1e 9a 28 0b | 55 f0 78 ac 8b b4 71 fc 1a 17 41 e7 6a 74 62 62 | 3d 84 68 6d 3f ac fc 48 f6 30 13 2d 70 6e ad 53 | 29 00 00 24 71 32 1e 88 23 ee 2f ae 39 9e 7b 59 | 41 2e 3a 0b 57 4e 0c 80 35 cd a7 35 65 8c e6 b2 | f1 87 a1 b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 53 72 74 e1 5b 37 7b 33 b0 17 78 | c1 64 62 a5 7c 42 0a ec 00 00 00 1c 00 00 40 05 | ff 46 61 3e 66 71 bd af 2e 4c 91 0c 25 ae 93 92 | d3 06 93 2d | libevent_free: release ptr-libevent@0x7fb364054370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364029270 | #555 spent 0.063 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #555 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_RETRANSMIT for parent state #570 | start processing: state #570 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #570 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #570 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #570 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.228616; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.946272 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364029270 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #570 | libevent_malloc: new ptr-libevent@0x7fb364054370 size 128 "road-eastnet-nonat-96" #570: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #570) | c9 60 e7 45 a7 98 e0 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 68 13 ed 82 59 f7 bf b7 d3 7d 5a 25 b1 e1 fd | ce b0 3f a5 fb 8c bd 34 1d e5 2a 9b fc 5b 3e 55 | 82 20 27 8a 48 3d 6e 3e 7f dc aa 07 ea 30 a0 2a | 9c f4 f8 a8 1d 61 fa e6 e5 a6 d3 c3 23 a2 0d 27 | d8 62 e9 78 7e f3 e0 26 9b ba 64 6b b0 e1 50 5c | c3 bc cb de d9 53 bf f2 ac d3 d9 69 fb c6 10 8c | 38 7d aa 47 ee d8 74 e7 3e ca 1f 48 f0 13 76 f3 | 40 f4 69 cb 3d 62 67 20 a1 3b b6 e2 a8 a9 ab a6 | 2b 8b a8 99 f0 d1 52 2b b5 e5 e6 49 c7 16 b6 59 | f0 d0 ea 1f 2e db 52 ab 01 2b c6 eb cc 72 67 ee | fc 53 07 28 c8 cb 95 9e 3a a0 20 2c 1e 66 b0 e9 | 12 9c 0c 0c 6b f2 70 25 e0 f9 f8 0e 69 49 c5 be | 72 17 9d 25 7c 8e 29 c2 0e 40 fa d6 20 e8 3f 96 | ac dd 51 f9 fe 49 86 c9 9b e7 be 19 fb 67 10 1f | f3 4b 80 50 1d d2 9f c6 fc 87 3a f9 1d 52 8a ba | 10 8e 73 40 ff 99 d5 7e 30 7d e1 68 1c 25 bd b7 | 29 00 00 24 ba 1d 83 e5 8b c9 fc 82 14 41 45 77 | 00 92 fd 3d da ae b0 d1 cb bd 90 71 29 d7 a3 fd | 03 9f fb b5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fa 68 08 10 0a d6 4b 37 b2 81 b0 b2 | 14 38 ef bd ae 4e e0 08 00 00 00 1c 00 00 40 05 | 3a 9e a3 24 b1 2a 82 b0 e0 fd 89 6a b8 7b ca cd | 82 b8 2e 9e | libevent_free: release ptr-libevent@0x7fb35405ef90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | #570 spent 0.0628 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #570 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #736 | start processing: state #736 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #736 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #736 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #736 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.228686; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.999872 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #736 | libevent_malloc: new ptr-libevent@0x7fb35405ef90 size 128 "road-eastnet-nonat-232" #736: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #736) | 55 f4 27 9b 2c 7e 0c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 4e 06 40 b2 65 21 5d 08 0a 87 dc 23 78 63 f5 | 59 9b 01 94 f1 c6 ee de 2e 54 64 04 7b bf ee 90 | 74 b0 cc 16 6d 13 9e 63 f9 06 73 5e 5e 85 4b c6 | 1e 30 91 54 94 48 03 60 af 1a 46 14 b6 86 67 6e | 56 bb 9d f9 7c bd d8 15 ef da 2d b6 8e e2 c0 fa | 6c 86 fc 27 18 08 26 1c 3b c7 8f ab c9 15 f1 b5 | 77 17 8f 4e 86 0e 1d 02 0e cb 79 7f 00 de 43 ca | 0d 98 67 80 78 be 76 95 19 4f 8e 1c 0f 1f 02 46 | b5 24 e0 a5 90 31 f0 6c 94 59 9e 86 fe 50 a7 16 | d3 90 18 f9 5a 5e f2 b0 85 c0 8a bb 36 a9 3c e6 | 3f 58 61 ed 76 63 9e 91 dd 1d 1d a5 d8 6f 61 e6 | 60 34 52 1f c7 3c 4a b9 12 d2 23 01 83 9f e0 72 | b0 b1 95 db a2 3d bd 5f 63 44 17 84 2a 1c ae e2 | 87 6e eb 4c 2d b2 76 61 6e 10 55 07 2f 21 a9 05 | 7b e7 0e 8d 3b 46 3c a2 52 e3 e4 5a a7 20 76 cc | 56 d5 06 15 ef aa e4 2d 6f 6f 60 d9 2a 22 ec 23 | 29 00 00 24 74 fa 10 32 44 33 16 00 ef 17 0b a3 | 58 ac 5e 66 66 dc 61 3e 96 b9 65 fa 72 73 66 81 | d0 51 f7 ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 28 12 e2 be f3 1a 42 9e c5 b7 6c | 8d fd 8b 3e 75 2f e5 8c 00 00 00 1c 00 00 40 05 | 19 e4 47 16 1b 11 27 dd e0 d9 21 b8 1a e6 c5 9c | 84 34 90 f4 | libevent_free: release ptr-libevent@0x7fb37806fdb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #736 spent 0.0621 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #736 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a84000 | handling event EVENT_RETRANSMIT for parent state #579 | start processing: state #579 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #579 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #579 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #579 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.228757; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.944488 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #579 | libevent_malloc: new ptr-libevent@0x7fb37806fdb0 size 128 "road-eastnet-nonat-129" #579: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #579) | f7 57 b5 67 5d 53 5d ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 5b ad a3 d5 b5 e0 5b 3c 63 fe 82 fc 8e 12 08 | 91 d6 c4 0a 02 eb fa cc 09 df 5f 23 de d8 2b f5 | c7 d1 d6 20 b2 e9 e0 44 e8 af 84 2c 0d cf cc f2 | 5d 14 d3 a9 26 db 6c d3 5a c5 b6 bb 02 ab 78 5c | 8d fd ab e4 18 ac f3 6d 67 ce 9e f1 c9 4e 48 19 | 38 ce 5b ee 1f 7e 6a 23 0e c3 35 0a 2d 7b 93 c8 | c9 5a 5f 29 c4 9f 5e f1 cc e4 b6 26 ba fc 75 a8 | 4e df 30 e0 38 f1 9b 93 15 71 8b 36 cc c8 fb 5e | 9c 97 42 2c 87 36 f5 a0 be a8 f9 30 86 f3 27 9c | cf e8 6d 6a ec 63 43 19 60 0c 5c 2f 8e b2 0b 0c | 5c 25 5d 2a 49 65 27 59 d0 dc 6b b1 3c 0a 06 2c | 14 95 03 33 11 da 59 39 c6 df 4f d9 ac c9 48 dc | 85 72 4e eb a2 61 cd b4 14 8d 9d 88 fc a5 3d ca | dc 4d 1b 8d 2d 5e 50 0b 56 ca d8 dc d3 17 7b 53 | 57 13 42 fe 43 06 61 23 81 b7 76 43 10 62 61 76 | f6 bc ce 46 30 e9 08 b7 2e e4 25 72 ca 14 7c 12 | 29 00 00 24 94 e8 55 b4 44 b7 00 bf d8 b6 2e cf | 2e 8c 08 03 dd d5 10 1f dd d7 4a c8 73 e1 d7 76 | 9d 2b 29 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 52 54 26 54 47 d1 ec 3a 0f bf 18 | 2b 81 e9 d8 d6 20 de c2 00 00 00 1c 00 00 40 05 | e1 d4 5a 12 5b c3 62 c5 dc bb 54 dd 1e 69 c8 f5 | c2 4b d5 7c | libevent_free: release ptr-libevent@0x7fb3500594c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a84000 | #579 spent 0.0624 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #579 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a60690 | handling event EVENT_RETRANSMIT for parent state #549 | start processing: state #549 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #549 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #549 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #549 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.228825; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.927742 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #549 | libevent_malloc: new ptr-libevent@0x7fb3500594c0 size 128 "road-eastnet-nonat-125" #549: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #549) | a0 bc bf eb 69 ec 7d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 c9 7a 4d 74 30 97 ab 2b b8 9b 8e 28 56 30 35 | c9 29 b4 03 c9 c0 54 36 0e 1e 85 00 be e1 eb b6 | 10 56 f7 3e 25 85 4e 54 15 d9 dd 76 f8 a2 ef 75 | 06 49 0e 79 92 19 04 73 c4 32 36 8f 38 c3 a0 37 | 73 31 32 c7 13 ba 49 63 a9 ff 14 ce 76 c3 ca 6b | 44 ac 36 b3 fe 8e 49 b3 f2 07 ba 8e 9d 83 a8 90 | 1c bc ba b1 a8 32 ac a1 72 6e a4 55 c6 06 26 4d | 59 1f 8c 21 e8 f2 1d 39 aa 21 29 2d 13 d2 62 e1 | cd a6 44 f2 be e8 53 3c 05 77 b8 a3 16 49 f8 12 | a0 eb 6d c0 e5 00 d6 6c dd 16 9c ab b2 0e 15 2a | 11 01 e2 8c ef 25 2e ff f8 e7 c3 fa 43 cc 6c 72 | c5 e2 33 98 3b f3 05 50 a7 ad 9d 8e 86 bf 56 f5 | 69 e1 73 1e c0 3d 04 45 0d d2 2e 9d 3e db 05 1c | 6a c1 c4 8e 83 ca c0 f4 84 01 6b be a7 89 db dc | 85 98 0f b5 ba 9a cf 4d 5b 70 a7 a4 7a fa 95 48 | b4 59 36 8a 67 a3 46 cb 51 b4 47 97 d0 b4 c8 75 | 29 00 00 24 e6 91 2a 43 d1 aa b6 49 a9 57 9a 19 | fc 51 19 e5 28 8d 93 b9 12 81 37 cd 42 5d c8 08 | 2e b2 6c 7a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 e5 9d 22 28 c7 c4 27 97 02 c2 92 | 36 7a d0 48 44 31 1b ea 00 00 00 1c 00 00 40 05 | ac 08 fb c5 91 b8 80 23 e8 68 88 22 35 dd f9 61 | 84 cd 9d 18 | libevent_free: release ptr-libevent@0x7fb35c061940 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a60690 | #549 spent 0.0629 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #549 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38400feb0 | handling event EVENT_RETRANSMIT for parent state #683 | start processing: state #683 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #683 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #683 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #683 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.228896; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.981974 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a60690 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #683 | libevent_malloc: new ptr-libevent@0x7fb35c061940 size 128 "road-eastnet-nonat-101" #683: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #683) | 22 30 a0 37 9e 5e 0c 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 2d bd 08 31 a0 07 0c c4 f5 ac c5 5b e0 c5 60 | 90 d1 45 d9 1b e2 dc 82 5b 35 5b ab d0 57 64 0b | 0e a8 1f f2 6d fc 5a 7c ad 7a e8 a0 f9 15 5a 35 | 68 ff 17 43 ed b1 8e f1 b0 9c 81 b4 3b b5 37 5a | 70 13 3a f4 ca a9 f6 46 52 0c ae 55 b0 55 be c6 | 1a d7 a6 fb 47 44 eb b7 16 85 b7 dd ff de a0 45 | 17 b4 11 35 d4 d0 cf e9 45 97 61 c1 6a d8 a0 c7 | d6 0b 85 99 6b 5b c9 dc 9e 76 87 29 b7 8c 8c 9a | 95 7a 15 c6 10 17 98 93 f7 09 7a 9a cd d0 13 14 | a9 2c 55 a4 60 f1 72 80 2c 28 45 e4 d9 cd f6 01 | 55 30 ed 6a 1a 0b 81 c2 8d 64 3f 52 1f 81 ec a6 | b3 e6 5c 36 3c 8d 99 60 59 d8 e2 22 76 0c e0 0e | be 08 7f ac 91 76 6a 0c f2 45 c3 7c d3 5f 7a 2d | 17 ac e6 32 1b a2 9b 38 7f e0 1c c5 b2 87 8c 03 | 93 b7 73 13 37 e0 f4 7f 3b 5b c2 ac 8e b6 84 9a | 86 44 62 2d 89 5c f8 c8 10 4b 97 4b 7a e5 a2 fd | 29 00 00 24 00 a4 f8 e4 0c 48 4a f1 27 f4 8b fc | 65 ab 53 d7 66 48 7b 24 ce a6 58 75 84 59 a6 a0 | 2d 45 66 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 85 ce 75 72 7f 4a a1 68 df 47 f3 | a0 b0 e6 2f 94 7e 65 c2 00 00 00 1c 00 00 40 05 | 62 77 62 1c e2 c3 88 5f 5a c8 dd e7 a6 ce ac 52 | d0 9f e3 15 | libevent_free: release ptr-libevent@0x7fb35407a740 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400feb0 | #683 spent 0.0623 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #683 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36001a530 | handling event EVENT_RETRANSMIT for parent state #658 | start processing: state #658 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #658 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #658 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #658 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.228966; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.980633 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400feb0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #658 | libevent_malloc: new ptr-libevent@0x7fb35407a740 size 128 "road-eastnet-nonat-162" #658: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #658) | 18 43 30 64 c9 a9 96 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 8f 2e 30 90 e3 1d b1 3d b8 ff e9 fa 6f c4 d2 | 4d cb 05 e4 a2 10 ef 4b 88 26 20 b8 91 62 33 4c | d2 2d 7a 12 9c 93 d1 33 4a b1 d4 b6 b7 87 51 88 | f1 8b ca 98 0d 93 ed 84 f4 9c 46 f9 61 c4 4d d5 | fe 8d 16 c5 0c 88 ef 95 5d eb 19 30 d3 94 29 4a | 79 59 d9 d9 11 a3 76 95 63 e1 a4 9a 1e 1c 14 d5 | 3c bd 7d c0 47 b6 0d 87 c9 56 be 9c 11 14 ee 07 | 7d b5 67 34 d6 13 e8 98 79 52 f2 29 ea 87 a9 a7 | 37 70 16 dc 00 c9 cf 42 41 7d 6a af e8 16 61 11 | 8c cd 5e 52 bd e4 ca 59 92 fe cb ac d6 88 27 08 | e2 59 c0 46 be 04 20 28 16 af 0d 9a e2 2b 53 20 | 73 8a 54 b3 af e0 6e 17 fa 1f 2c 68 a0 ba 92 60 | 80 f9 61 ae 5c 11 fa e6 67 c8 30 5c f1 ed 8c cf | f0 8c f7 ae b7 44 b9 62 19 13 7e 6c 7e 19 e7 af | 31 44 0e de dd b1 f8 11 4a 1a 39 5c a5 d6 c9 e9 | ca 2b 46 08 aa 6f 5d 69 a8 0c 53 f7 bc ac ed a8 | 29 00 00 24 65 98 11 46 f7 ab 17 c4 6b 7d 49 5b | a3 fc aa 94 dd e0 11 9b 8f 82 94 fd 52 c9 5f f9 | d2 67 63 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 85 9c d9 b9 94 09 f0 06 58 49 33 | bd 1c e4 a5 79 c0 7c 32 00 00 00 1c 00 00 40 05 | 33 c9 27 c8 b3 b4 b5 08 35 b6 cc fa 47 61 1b 02 | 31 02 bc 85 | libevent_free: release ptr-libevent@0x7fb36407a960 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36001a530 | #658 spent 0.0617 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #658 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374014870 | handling event EVENT_RETRANSMIT for parent state #732 | start processing: state #732 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #732 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #732 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #732 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.229035; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.013868 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36001a530 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #732 | libevent_malloc: new ptr-libevent@0x7fb36407a960 size 128 "road-eastnet-nonat-222" #732: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #732) | d0 09 53 dc c6 ab 63 da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 85 fc fd c0 3d 4e f2 6d 8c 5a 48 97 72 ba 8d | 76 a1 67 2b 3e f5 0f 59 6a 4a cf 1f 0f 1a 83 6b | 02 c4 e6 13 1a a7 be 58 09 e7 95 c5 d3 61 73 f0 | 93 30 b7 ea 83 2c 03 35 7b e7 a4 68 e9 c3 34 3d | 62 a3 61 5b 4e 45 93 53 18 92 ed db b3 57 ab ed | d3 53 e9 06 16 fc 7d fc c5 71 11 b8 0f 5b b1 19 | dd 64 cc 6c d3 60 ce 76 d1 ee 24 40 d0 a9 e8 ef | b0 05 68 55 4c bc 77 f7 43 d8 3a 34 82 db 7d 83 | 19 10 50 8c d2 65 d7 7b e4 c6 64 bb d8 6c a7 36 | 7d c4 11 fc dd 75 d9 7e 8a a8 c1 86 35 68 1d 19 | 3f e6 94 36 43 37 3c ce 07 24 1a e3 3a b2 b8 d0 | 31 23 82 03 07 23 34 27 ac 92 b7 75 a4 35 52 c2 | 62 ee a2 c7 e9 86 52 3d d2 a7 12 2a b4 93 13 55 | e8 52 4e 73 70 b2 d4 5f 3e 19 02 5a 63 54 72 36 | d5 50 42 05 5e b0 23 11 30 64 39 ea 9a e3 b8 0d | 4b 4e 16 cb 69 12 46 02 2b 04 d5 67 a1 73 e1 ac | 29 00 00 24 fc ee 14 ee 51 1c c8 cf 02 52 60 a5 | ed 61 3d 76 39 bb ee c9 50 2c 24 3c 5a ec a0 d1 | e5 8a bb 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a fa b6 a7 12 75 27 e9 bc d5 98 e9 | 7d b2 82 ba 84 f4 53 9f 00 00 00 1c 00 00 40 05 | 27 89 f2 84 3a 49 ac a7 94 1d 98 7e 0c c4 b6 09 | ba a0 ac ee | libevent_free: release ptr-libevent@0x7fb374054140 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374014870 | #732 spent 0.0864 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #732 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35400cc10 | handling event EVENT_RETRANSMIT for parent state #709 | start processing: state #709 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #709 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #709 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #709 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.229144; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.996019 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374014870 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #709 | libevent_malloc: new ptr-libevent@0x7fb374054140 size 128 "road-eastnet-nonat-183" #709: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #709) | e5 c7 07 55 6e da 09 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5d de 77 2e 7e b4 97 76 d0 4c 88 3a 79 73 30 47 | a5 46 d9 6c 5e f5 d0 01 a8 f5 90 31 3a c3 34 0b | 92 a1 bf c0 52 89 73 d2 41 a6 c8 7c 00 32 8c e0 | 61 01 06 67 0c 70 09 f6 a3 5b 63 77 2c c8 de bd | 50 05 fc 33 a9 33 71 99 83 df 95 2b 2d 8e 13 82 | 7b 7a 49 72 f3 f8 5a 2e 90 58 f7 40 01 a5 24 bb | cf b8 85 6e 52 34 58 c3 42 27 86 ff b5 01 d2 91 | e4 1c 23 fc f2 c1 af 9b 00 10 9e 1a a4 65 99 ca | fe 91 39 7f 9e c5 f3 e1 49 f5 22 78 d6 1e a3 72 | fc e2 3a 47 8a 3c d6 21 02 38 d3 6e 42 de b9 8e | 44 7c 9f 39 9d 77 79 b7 b4 a9 f9 4c f7 02 43 2d | 3e 2b f9 30 d4 a8 a6 b4 68 42 af 60 21 e7 59 96 | 67 d3 1f a3 61 53 50 45 15 9f 37 19 16 e9 8d ad | 1d 5f a6 91 01 82 07 22 2e f0 8d a4 82 14 28 84 | 82 79 d1 ee a4 a1 98 83 13 94 d9 2c 49 f8 36 3c | 29 2a 04 0d bf 91 91 f4 08 b0 48 0b b6 ab 6e 6b | 29 00 00 24 fb fb fc 22 69 7b 64 5f 88 e3 11 6e | bc 63 54 30 45 65 33 a0 dd 21 67 36 78 c5 19 65 | 52 ac 92 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 a3 44 a6 ca 0c 6a 2b 8c d2 4e 18 | f9 96 bb f1 fa 97 0c e7 00 00 00 1c 00 00 40 05 | 23 4f 11 65 7a 64 9b ff 7f 73 c3 02 6d 1c 2f c1 | e4 ed 89 d4 | libevent_free: release ptr-libevent@0x7fb36c088410 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400cc10 | #709 spent 0.0635 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #709 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370046090 | handling event EVENT_RETRANSMIT for parent state #542 | start processing: state #542 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #542 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #542 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #542 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.229215; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.928751 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #542 | libevent_malloc: new ptr-libevent@0x7fb36c088410 size 128 "road-eastnet-nonat-3" #542: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #542) | 19 ef 59 5e 62 c0 95 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 79 27 54 07 c6 5d 65 e0 c6 e9 51 3c d2 f7 23 | 14 31 ac 33 ad e0 98 39 13 b2 d5 2e 21 16 ef fd | fb 26 fb b6 5b 85 f7 f1 d6 8c 2f ce 82 67 51 76 | fa d3 54 14 d5 1a 64 a6 27 51 68 bf da d2 0e 9f | ba 1d 58 01 63 c6 05 46 a8 1e 48 8c 0f 1a 50 9f | c7 02 55 57 2f b0 4c 8c ba 2a 6e 11 20 86 c9 eb | f4 2f ad d5 ad 8d b4 c6 8d 1b 09 90 d8 aa fd 33 | d8 fc 91 0e 8d 34 75 59 76 d8 c1 fb b1 99 78 79 | 99 6e 5c 3f d3 a2 5f 67 1a 09 7c 1f 03 50 f4 93 | c2 74 d9 b7 7a 58 a0 62 d2 8e 30 4b 2f b5 4e 54 | 8a 34 49 eb c4 db 10 33 ba 37 57 98 9c 56 d1 4f | 0c 29 1a f8 25 5e 60 5d 0b 14 86 5d 6d 65 3a dc | 8a 6b ce 2c 5e 34 47 64 fc b5 0d 07 ab 4d e8 74 | 6d 78 e0 82 76 08 57 ad 18 73 73 dc 20 30 66 40 | 79 b4 11 4a 81 e9 e7 f5 9a 6f b2 79 12 d0 43 c6 | 72 27 8c 54 92 d4 21 e5 0d 8d 14 e1 53 dd 12 10 | 29 00 00 24 e8 60 30 77 56 3c f1 25 c1 c6 6e 74 | 5c 37 ec e4 ad 07 3f bc d0 27 64 9c 2c 2f 3e f0 | a2 51 6d 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 21 f8 f2 aa c5 02 f5 b9 e8 1d 48 | 11 f3 ee 20 33 c4 de f9 00 00 00 1c 00 00 40 05 | 12 90 d2 d6 c0 e9 64 15 7c cf ef 34 31 76 64 b7 | 85 6e 21 7e | libevent_free: release ptr-libevent@0x7fb37c05eea0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370046090 | #542 spent 0.0616 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #542 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35800cc10 | handling event EVENT_RETRANSMIT for parent state #613 | start processing: state #613 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #613 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #613 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #613 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.229285; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.94103 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370046090 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #613 | libevent_malloc: new ptr-libevent@0x7fb37c05eea0 size 128 "road-eastnet-nonat-31" #613: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #613) | 79 93 08 03 2c b4 dd 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a e1 6a 82 db ed db 74 ee b6 15 12 39 71 33 bf | 8a 46 d7 c6 c5 8a 1b 3d a2 de 2e f1 c1 94 33 c0 | 34 aa cd 57 d3 68 0a 98 44 dd 52 e4 12 32 bd 16 | 0c e2 b3 0c 1d f7 54 42 90 09 2f 70 da 3e dc 46 | 26 73 29 3f 4d 95 44 51 c4 ee d0 51 62 f5 23 73 | b1 79 05 13 44 f0 8d 5a 13 9f d6 c9 04 56 fa e7 | a2 43 d1 96 b2 b6 52 69 ea dc 64 81 12 bc 22 c2 | c4 ee a3 e1 69 5f f8 37 1b e7 00 a6 82 ff ee 85 | 5b 12 1c 2b ba ff 36 aa 33 29 61 20 53 f5 26 6e | e7 36 fb 9e 58 96 08 1a f4 41 81 4b 11 d3 c0 cd | 3e d4 7f 23 fd 79 62 dc 64 4c e9 e5 d0 f2 db a5 | 1b cd 14 72 42 56 15 bb 0e b4 bb d4 e6 c8 7c c1 | 88 7c 43 0b f3 ed 50 68 99 2f e0 93 89 bc b2 e4 | 01 54 87 c5 c5 6f e4 ac 60 cf 42 a6 f1 da 67 fd | 37 ef 53 de 9e 68 36 8d 63 23 d3 89 29 6d 55 6a | db 4d b6 90 4e 9f 31 7b 83 b2 4e 39 37 2c 7c 49 | 29 00 00 24 38 88 3a 8e 21 d0 99 01 66 b4 5d 84 | 38 93 2d 4f e7 27 09 2a 71 43 d3 fd 55 4d 04 8f | a5 6a 55 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 b5 7c 10 1e 73 0b 8e c4 8c 67 0d | 37 a9 91 c5 05 2c 6c b2 00 00 00 1c 00 00 40 05 | 8a 81 ac a2 d8 3f 44 cf aa 4d f4 06 c5 76 63 33 | 40 a4 d1 4c | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800cc10 | #613 spent 0.0628 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #613 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aa1f00 | handling event EVENT_RETRANSMIT for parent state #730 | start processing: state #730 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #730 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #730 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #730 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.229354; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000217 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #730 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 "road-eastnet-nonat-234" #730: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #730) | c1 b9 1a 2f a2 98 4a 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 90 42 68 2d aa ea 2e 10 58 50 76 72 99 aa 32 | eb bb 32 a1 c5 3b 39 b6 da 46 5c be 25 37 be ed | ef 19 db bb 09 e7 d6 5a e9 9a f4 55 2b 2e a7 bb | 7d 7e ab 94 f5 2d 7f 2f 19 2d 9d be 3b 1e 1f bc | 50 99 e9 b4 9a 91 0e c6 06 9d 5d 9a ba af 5a 8e | 69 1a 0a b7 44 11 98 29 1c 1a dc d0 d0 5d fa 86 | 8a 1a e8 5e 7f fc 9d 17 de 62 df a0 79 b7 62 86 | 03 fc dc 45 27 d9 98 5e 7e c1 5d 73 17 7b d2 39 | a9 02 e8 b3 fe 5b 39 41 98 ea d2 07 3a ff 02 e9 | 9c b2 8a 30 03 fa 2c fb df 3c f4 0d 12 f0 fb b7 | 2d e5 f6 c1 41 31 4c a6 2b 97 92 32 b8 ab ea d4 | 0c b2 3f eb 53 93 29 c9 b9 5f b1 d5 21 34 f2 4d | fc e4 2a 50 24 06 56 bc c7 41 5b 59 70 69 cf 96 | 1c 5a 5f 05 3e a5 0f f1 a8 c5 92 7e bd 2b fd 46 | f0 21 0d 82 1e f5 38 85 81 4e 66 9c 19 55 16 0e | 44 6b 58 99 91 1b 47 47 7a f8 3e 28 3f a5 78 ea | 29 00 00 24 55 e3 90 65 fa b6 41 c6 1d 4f a6 98 | ca 46 e7 a1 7a 87 94 e6 4e 60 4a 2e 32 84 98 8c | 92 ba 64 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 cb 8c 60 04 f9 7c 78 24 b5 81 07 | 7f 5b 58 33 fe 16 dc a2 00 00 00 1c 00 00 40 05 | 6f f5 31 fa 7e c6 ed 0e 01 8d 80 c5 e9 40 f1 ef | d7 29 12 3d | libevent_free: release ptr-libevent@0x7fb364080140 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa1f00 | #730 spent 0.0626 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #730 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35800d120 | handling event EVENT_RETRANSMIT for parent state #541 | start processing: state #541 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #541 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #541 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #541 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.229424; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.925568 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa1f00 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #541 | libevent_malloc: new ptr-libevent@0x7fb364080140 size 128 "road-eastnet-nonat-24" #541: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #541) | e5 6d dc 54 e8 13 c6 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 70 ec f4 97 99 d8 72 ce 1b fb 62 b7 ff 70 b1 | d0 af d0 71 cf c9 19 5a 4b 54 67 9f d9 76 16 c5 | c2 a4 79 9e 63 b4 60 27 34 54 51 7c ce 20 f6 c6 | 4c 4b 74 1f 25 17 6c 4a e1 d4 14 08 5a 16 b4 9b | 82 8a 4f 61 af 32 25 98 4f 8b b6 f5 b4 de 0c b8 | 8f 1e 39 50 5f 6a 1f e4 ec dd 6a 69 e6 1c 77 5b | 51 25 d2 75 cb cb 97 24 6c 0c 79 b7 db 85 62 10 | 6e af 06 f5 31 7b 0b d7 96 08 f6 7f 02 1c 78 21 | 18 19 57 15 cc 45 e4 91 68 10 8d c0 f5 dd c3 33 | 9f d1 8c 61 12 47 98 e4 4a b7 b5 c3 22 ac 54 c9 | a2 b0 69 33 63 5c 14 fd d2 8f 89 5d d6 7f 3d 6d | f8 ab aa bd b8 f0 3f 92 e9 56 8b 5a 9e 4a 02 6e | a1 8e c1 f3 24 ab ef 20 e4 c9 e2 98 e4 c4 c3 92 | 49 b8 7b 9b eb b0 61 e1 ff c9 4b 16 04 d8 8e 9c | 7e c1 26 a0 a7 e2 6e 1c 6f b6 6c b8 06 b6 36 e1 | df 58 24 88 c2 60 0d 9a 51 05 8e 85 c2 9e 66 5b | 29 00 00 24 e7 35 32 98 af d0 40 10 f4 80 06 7c | f0 2f 64 a5 58 9a 04 65 fd dd 75 64 b2 5d 38 dd | a9 29 2e d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 7c fc 09 1a 79 2c 04 02 74 c5 f8 | 3a d6 61 08 3f 8f 87 41 00 00 00 1c 00 00 40 05 | 30 97 d6 ac 90 33 4d 32 1c 73 f2 d2 db 60 9a 7c | 6e 76 e0 11 | libevent_free: release ptr-libevent@0x7fb37c0813f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800d120 | #541 spent 0.0663 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #541 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #693 | start processing: state #693 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #693 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #693 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #693 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.229499; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.987812 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #693 | libevent_malloc: new ptr-libevent@0x7fb37c0813f0 size 128 "road-eastnet-nonat-156" #693: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #693) | 8c cd 5b 89 3d b1 c0 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 e2 11 fa f7 47 b1 84 25 8d b1 b9 cc 61 7a d1 | 10 c4 99 41 8a c2 39 41 fa f2 fd fe 2d 88 77 1c | 45 28 1f 19 11 cd 86 3b 21 90 05 0a 95 68 f9 b5 | 66 47 f0 fd f6 ed 91 51 a1 90 e5 3a 68 7d 44 49 | 52 7e 11 24 5b 36 2d 9e 45 cf d7 e0 d6 57 a2 7e | bf a1 9d 8b 04 a2 cc 30 fe 6f 9d 2d 07 7c c6 a9 | ac ec ed 97 f5 f4 d7 97 49 b2 0d 08 4f 28 26 b4 | af 6a 98 d7 60 90 49 c5 06 ed 93 e3 18 24 17 de | 76 59 7c 05 cb a5 83 81 c6 45 a9 36 d4 c9 e5 a7 | d0 88 64 07 2a 87 01 7c 25 df 11 ab 75 b4 6c 03 | 37 fb 6f 75 2d f8 ea 20 73 cf 0c cd ba 90 c2 2c | 01 10 39 d8 3c b3 37 5e 08 f0 10 c6 bd a5 ce c8 | 64 ae 6d 05 92 4e 98 ee d6 94 4c a1 e4 7c b1 13 | 3e 00 d0 8a 16 57 67 90 44 2b 00 cd 9b 43 89 4a | bd d3 f2 0a 53 1d d1 36 e1 24 9c 6e 9e aa 0f 7b | 30 f6 e4 b8 a4 c5 92 c8 e5 b2 55 72 6c 6f d9 28 | 29 00 00 24 14 85 11 ba f9 3b 72 6e cf bb f5 0a | de 80 83 65 33 0c 22 f8 ea ad 98 f3 8e 26 41 40 | d7 cb 01 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e f4 9d 3b cc 7d 09 25 54 61 34 fd | ae 72 6d c2 c2 0a 3b 62 00 00 00 1c 00 00 40 05 | e8 a1 80 e7 3a b7 e7 08 64 9f b4 0b f3 c9 d4 c2 | cb 3c 43 63 | libevent_free: release ptr-libevent@0x7fb36c059a40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #693 spent 0.0619 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #693 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388009ed0 | handling event EVENT_RETRANSMIT for parent state #523 | start processing: state #523 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #523 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #523 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #523 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.229569; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.922423 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #523 | libevent_malloc: new ptr-libevent@0x7fb36c059a40 size 128 "road-eastnet-nonat-49" #523: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #523) | 07 bb ac 77 0a 7b 9b 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 32 2d 24 90 2e 75 6c 89 41 22 7c 04 93 61 b1 | 39 9b 32 4d 26 76 8c 24 bc 2d ac ee b2 3a 1d 13 | 80 14 c2 ce e8 90 ed e7 ec 82 33 fc cf 75 5a 59 | 9b c2 1e 9a ce 67 9e d0 32 1d df 06 30 99 8f 42 | e3 86 8d f2 a6 5e 6c 60 43 e3 54 7f 8e 10 64 f2 | 09 cd aa b7 1e 85 a0 06 7d 3a ff 7a a3 a4 14 fb | ff e9 1f 06 7e ad ad 41 ac 22 2e 81 48 aa 18 5d | 46 d1 2e ee d8 cb c5 80 a9 94 af ab 7d 0a 94 dd | 5d d1 aa 92 aa ee bb 06 90 ba f8 2f 6b 05 81 8b | c1 e1 46 3c 9a 94 f0 1c d0 2e 48 d8 93 0d 01 e6 | 42 b1 eb d7 08 a6 f8 5f 35 b3 a8 51 ff 1a 28 27 | a9 2e 3b 94 f9 50 49 28 9e 67 8b 4b 2e 25 e2 75 | a6 af 7a bc 8e e8 70 b4 b8 23 7e 7a 37 d6 c9 3a | e0 69 41 d0 87 31 ed a3 a3 e6 b4 1c 66 5c da e4 | 72 e0 33 43 7a 69 31 25 86 69 bf c1 c5 6f bd 27 | b9 80 4c 20 7c 9b 47 3c 48 70 66 96 58 bd 89 9f | 29 00 00 24 65 25 bd 90 0a 47 32 65 7b ff a5 6e | a2 70 3c 06 64 54 94 9b 0c 9e 4e c1 38 45 e7 b8 | 1b aa f1 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 c1 b5 e9 b8 b6 f1 9f 93 d5 2c a0 | 2c fe 30 59 be 37 e1 f4 00 00 00 1c 00 00 40 05 | a9 4a 22 b0 e8 8c 8d 17 4d 42 81 df a3 74 1f 8f | e6 9c ea 37 | libevent_free: release ptr-libevent@0x7fb338064790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388009ed0 | #523 spent 0.0628 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #523 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad6ec0 | handling event EVENT_RETRANSMIT for parent state #627 | start processing: state #627 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #627 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #627 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #627 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.229638; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.977132 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388009ed0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #627 | libevent_malloc: new ptr-libevent@0x7fb338064790 size 128 "road-eastnet-nonat-161" #627: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #627) | 85 ff 81 8d 39 ae d0 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 b9 1b a0 9a 2c 50 8e 02 95 9b 5f 3b 83 99 4e | 07 74 8d 16 ae 8c bf 98 d2 8b cb e9 a7 c0 0d 94 | 88 9d dd 9b 54 84 6a 7f 4a dc 84 92 79 46 91 fa | 6c 85 8d b3 55 b3 d1 e1 35 12 39 9d da 6c 29 94 | 61 2d cc 21 47 bc b2 6d 88 1a 4a 94 f3 43 7b d9 | 8f 20 77 79 db 4d 47 13 73 be 1f 12 57 25 9e da | cb ff 72 15 51 1f 53 22 a4 a5 4d 16 f4 f5 a8 77 | 72 b7 12 ba 58 1a 43 7f ce ef 32 64 0f 90 fb f0 | 98 cc 71 a3 6d f2 87 79 fa 29 62 da 22 a4 18 69 | 55 35 d1 f8 9d 44 18 aa bf 4b 02 e9 29 b8 5f bd | 16 17 ad f8 d3 f6 25 bb 24 f5 6e 8c 20 d9 44 9d | 67 1d 54 cc 02 45 19 dc 2a 2c 20 34 4f 14 45 ba | 5a 79 14 e1 00 9c 1f b6 a0 9b 07 d7 22 e1 98 15 | a7 b0 4f d0 ee 43 65 3a c3 b4 42 49 47 06 50 31 | c0 75 69 4b d6 fc bf 2f 2f 07 7d 00 fb 73 c9 83 | d0 e8 66 df af 0f bf 7d 27 62 7e bc 01 f7 d2 fa | 29 00 00 24 e2 15 33 1a 7b 95 48 00 21 d4 69 5b | 6e 98 84 ff 1a 3b 2c ef f5 83 72 31 b0 15 1c 81 | c6 0c 3d b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 ee 1c 29 3c 33 ab 04 ff 5a 9a b8 | a2 4b f5 11 1c 8a 96 c4 00 00 00 1c 00 00 40 05 | c2 8c 6c e3 eb bc 71 3c c4 77 e2 2a 2f 10 8a 7a | 93 a1 3f 6b | libevent_free: release ptr-libevent@0x7fb38805f660 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | #627 spent 0.0786 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #627 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c014cc0 | handling event EVENT_RETRANSMIT for parent state #567 | start processing: state #567 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #567 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #567 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #567 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.229725; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.936951 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #567 | libevent_malloc: new ptr-libevent@0x7fb38805f660 size 128 "road-eastnet-nonat-130" #567: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #567) | 96 df 1a f7 12 b2 bc 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c 62 fd af 90 2b d8 09 e9 e2 92 5c d3 5d ff be | b8 74 9f 04 03 97 8e 9b 87 54 08 07 bc 69 63 5c | 4f 7e 94 26 99 2b 45 4b b4 3e 6a bd e9 bf 50 b1 | 32 c2 e1 9e 38 52 46 f5 f2 58 78 3e 50 20 3a 74 | f6 e9 d3 83 40 c0 04 2b de 3a cc cc 33 57 e8 e4 | c3 b8 f3 a1 07 1c a7 aa 33 bf fa f1 88 41 d1 8f | 1c 54 38 a4 0f a0 74 99 19 cf dc f3 37 2e 9f 7d | cb c6 ff 33 e7 c4 87 6d b4 fc 2c f8 0b d2 97 fc | 95 94 a8 fc c3 8e 19 7e db 7c 13 30 0e 23 df 10 | 95 1c a4 5e cb 4f f7 55 14 48 f9 01 0e 0f 65 55 | b2 e9 d7 a8 7f 12 ac 8a 4e 27 61 a0 92 a0 7c e2 | 06 89 a0 28 48 73 b2 44 05 78 cf b7 27 b8 cb 46 | e0 4e 1d 1b 19 80 1b 07 1b 7f 13 f8 83 25 91 17 | 55 8a 26 9b 93 51 86 39 92 c7 48 b5 62 5f c4 da | 35 11 c7 be 49 10 bf 43 bb fd 6a b1 b8 23 97 53 | 03 3d 3d d7 05 a5 04 a6 4b fd 36 20 d4 50 2d 15 | 29 00 00 24 2d 33 44 b7 62 bd a9 aa c3 a6 92 61 | ee c6 40 8f 89 af c2 08 6b d9 9a e5 24 30 97 38 | 3e b1 2f 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 cc 91 ff 67 bb 9d ba 9d 71 c8 73 | 66 2a 2a e8 17 18 8e 7d 00 00 00 1c 00 00 40 05 | 5f 92 72 26 a0 e4 d9 83 b3 70 5e 9c 4e 05 aa 9e | 38 2c ea d4 | libevent_free: release ptr-libevent@0x7fb34c05ecd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c014cc0 | #567 spent 0.0768 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #567 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #611 | start processing: state #611 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #611 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #611 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #611 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.22981; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.95492 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c014cc0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #611 | libevent_malloc: new ptr-libevent@0x7fb34c05ecd0 size 128 "road-eastnet-nonat-177" #611: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #611) | 34 ea b3 f2 4f 9b fd 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 65 77 23 f1 8e 59 ad e7 ff 5f de d0 89 eb 8f | e9 74 c5 98 7f 21 ce 5f 9a 27 21 a7 98 93 9e 99 | e4 27 4e b7 b3 24 fc 80 94 f6 f4 f5 9c fa 3c 88 | 3d a1 56 1a 21 1c 0e f5 0b ed e1 09 65 2e 3d d4 | 2f 57 58 dc 24 ce 14 24 1c da 0b b5 60 f1 11 17 | 1a 17 9e 79 a3 98 e2 85 17 79 fe 96 1e fd 0a 94 | db 8d d3 25 e1 09 1f 09 2d e1 61 f8 5e 36 1f 1e | c1 70 ed 24 ed f4 d8 4e fd 57 46 fb d1 4f 47 ed | 53 5d 31 e7 1e 13 8b 95 3e 46 72 5a c0 f9 1e d0 | 00 11 60 68 91 85 15 b6 a5 b9 35 22 09 f5 1e bb | 2f 36 9e 4c 45 ba 3b e0 87 f8 18 85 4b f7 b6 9b | 48 62 35 a7 22 dd 90 30 ba 7a 3c 10 b3 65 8e 2c | 7c d8 4a 70 a8 d5 53 60 76 0c 5d 33 c9 61 54 67 | f9 1d 59 23 17 2a 52 2b c0 bf ff e6 44 b3 ef 2a | 84 a8 c8 18 68 4e c2 5c 11 a6 2e dc 53 a6 93 01 | d4 df b1 45 21 de 1f be f8 d7 e5 8a 4b 8c d0 57 | 29 00 00 24 db 8b 59 30 04 e8 61 45 59 6e b9 45 | 4b e0 a8 74 27 04 8d 8e 65 dc 44 fc e5 bb c8 b9 | d4 93 ad 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e cb 52 55 02 e3 8d 62 40 06 d9 c3 | 25 de 61 c2 25 e8 55 c6 00 00 00 1c 00 00 40 05 | 4c c7 ad 1d 02 9d 47 2a a9 d3 98 b0 82 03 7b 27 | 1e fc a6 ec | libevent_free: release ptr-libevent@0x7fb3380597d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | #611 spent 0.0617 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #611 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2b610 | handling event EVENT_RETRANSMIT for parent state #544 | start processing: state #544 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #544 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #544 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #544 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.229879; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.932986 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #544 | libevent_malloc: new ptr-libevent@0x7fb3380597d0 size 128 "road-eastnet-nonat-38" #544: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #544) | 0c c8 e0 5f be 01 79 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 4b b7 07 59 5a 8f d2 fb d3 5d 33 1e 68 91 b3 | a2 26 c9 b9 8a b4 e6 8a 43 31 64 0d 77 e0 f1 15 | a1 39 45 b8 6b 02 50 97 06 06 58 9e 3a ef e8 37 | e4 7c 57 f1 4d 93 3b f5 c4 5a e8 bb 95 0b 16 30 | ae 70 14 a4 78 fb c6 1c 98 e7 86 0d 21 64 8f 8a | 57 22 3c 59 65 26 f5 b7 05 65 f5 b3 e4 57 83 07 | f5 ce 36 2e 87 c6 da e7 e8 5c 9e ac 52 b5 c7 3a | f5 b5 91 44 37 d8 f7 d2 db 23 2c a3 a1 47 55 3d | c3 92 ed 16 17 e5 6d f6 27 bc 16 5c 7d af 1b 3d | b1 6f 3a d3 6c 01 d7 03 36 b7 2e bf 9e d3 3d 31 | 24 06 bc a1 b6 d4 18 fd b7 44 8a a2 c6 1d 54 30 | ae a7 68 58 6b 6e 1c 65 90 77 e6 12 7e f0 bb ad | f3 9e 62 3f 52 83 0f 79 80 56 f0 97 14 45 da 2a | 9f 60 50 4a b5 7b 81 9f 4e 30 c8 19 e2 8e 7e 1a | 5f 7d f6 43 0f fd 85 83 e1 ad 46 c1 11 a2 4c 5f | ff 7c b9 be 6e 26 8b f7 40 11 92 c6 8b 91 0d ac | 29 00 00 24 e2 a6 28 8f f1 ed a9 8c ae aa e7 2c | 5e dc cc d9 d9 82 b2 05 50 60 c7 46 e1 4a 89 6c | 50 12 77 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 fb b8 9e 31 b2 48 64 bc b6 ad e6 | d8 89 63 35 93 98 9f 2c 00 00 00 1c 00 00 40 05 | c9 4d f1 16 2f aa 6e 90 ec dc a5 b3 7b 2e 5c c9 | 7d 08 18 e1 | libevent_free: release ptr-libevent@0x7fb37c0720e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b610 | #544 spent 0.078 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #544 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #550 | start processing: state #550 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #550 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #550 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #550 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.229965; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.933386 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b610 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #550 | libevent_malloc: new ptr-libevent@0x7fb37c0720e0 size 128 "road-eastnet-nonat-91" #550: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #550) | db ff 34 cc aa 26 9d 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 8a d7 13 53 9b f1 64 c1 c8 04 0a 8b 03 2b c6 | 0d ad 43 39 3f fa d4 31 02 f2 d8 f2 49 42 65 4d | e0 c7 6e 23 69 ee af f5 1d 8a 37 e7 f7 88 51 de | da e3 c7 6f ce 70 fd 62 27 15 72 b1 74 d5 96 fe | 5d 1b a4 a4 ca 31 5b a5 af a2 32 e4 20 19 00 6d | fa 74 d0 93 44 c3 c0 75 8e c7 8d 89 fe 62 d3 0e | ec 96 32 6f b0 ca 05 63 70 b3 be f1 fd 8a 22 d3 | 30 ce 9e d5 e4 e5 4d 92 9a f9 82 cc a2 1d bf 79 | e0 be 40 12 35 fa 00 26 4c 97 eb 5c 78 8c 37 10 | 77 68 70 27 80 31 92 d4 17 d1 f6 07 6e a8 5c 37 | b2 cf 98 7e 16 70 ee da 2f c8 6a 1a cf 99 42 34 | 69 17 56 25 2f 75 a2 60 5b 03 8f 41 b4 71 d4 fe | d6 39 fc e1 d0 29 d9 e4 01 4d 2d 30 57 34 2a 98 | 61 8d 90 1a 37 ab e2 12 47 26 fe 8f 69 f6 20 34 | 44 8b 50 13 5b e0 15 0d ae 46 52 1d a4 2f bb f4 | 98 b0 5c 9c 64 1b 86 83 6f 11 65 70 23 23 74 6f | 29 00 00 24 e6 6e 02 88 81 a9 8e a7 ae 14 ec 40 | 05 51 ce e9 24 5c 3b c2 0b 49 df 12 27 77 a8 bf | ca be 33 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 11 2c ad 5a 38 a4 00 8e af be fd | a7 9a 55 19 4d 9f d1 09 00 00 00 1c 00 00 40 05 | aa 58 63 41 f4 3b 9c a5 91 ba 1f 8a 0a d5 9b 23 | 59 28 d4 a7 | libevent_free: release ptr-libevent@0x7fb380075050 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #550 spent 0.0654 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #550 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ac3ec0 | handling event EVENT_RETRANSMIT for parent state #589 | start processing: state #589 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #589 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #589 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #589 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.230038; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.953565 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #589 | libevent_malloc: new ptr-libevent@0x7fb380075050 size 128 "road-eastnet-nonat-55" #589: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #589) | d3 af ea 9d a0 c8 f5 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 de 4e 18 e6 1e 19 90 6b f7 90 15 af f6 7b ab | 4e c8 ce d7 0b 8e 81 b9 f2 4f 1d 4f 5c 24 63 06 | 65 52 bc 5a 83 ff 1b 21 cb 72 47 f8 8a e5 91 bf | 57 3c 5e f9 8a 0f 69 ef dd 9a d9 96 96 d3 e9 53 | 62 6d 85 78 9c cd f3 37 3d c3 3f cf 12 49 52 71 | f1 91 04 7a b7 09 2f 96 56 e2 dd 46 62 33 b5 bb | ad 3c f9 d1 69 f8 6d d3 fc 9b 28 0f 28 e0 3e bf | f2 8d 28 0d c0 bd 56 d2 fc f5 11 53 c5 5f 98 5e | b5 0e 16 d8 79 1e 33 2e 4d 24 12 5b e7 2c e3 82 | 41 23 5b 9c d9 c3 1b 4e c2 1c 19 6a a5 1e 04 2e | 8f c8 de 18 5d d7 71 bd 41 ae f2 b5 79 ea 41 40 | 17 cc b2 ac f4 29 ea 95 03 3b 8a b9 65 ec 40 16 | 4f a4 1c c9 6c af b5 25 5c 3f 1a 3d 18 fe 4c 4f | 96 cd 0e a4 e1 ca 37 96 3c 03 bf a5 07 0a 64 5f | 91 2f ea fc 4d 6d 98 68 7e 74 f7 83 b0 39 d7 b8 | 05 fa 66 7a ad 18 d9 82 14 ae c6 e8 1d a4 b3 22 | 29 00 00 24 8c a0 dd 88 ca d4 16 c6 d2 19 83 fb | 91 96 4d 43 b6 4d b2 a0 b1 2f 06 3d 0c a8 88 7c | 52 87 c6 7a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 52 21 ef 0c fd d6 a8 97 22 3e 1c | 84 a2 1f 0e d5 18 e7 d5 00 00 00 1c 00 00 40 05 | 1e 9e 9c e9 d7 26 c7 2f ea de f3 cf 5b ae 57 9b | ea f6 3e d1 | libevent_free: release ptr-libevent@0x7fb338053ff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | #589 spent 0.0797 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #589 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c018460 | handling event EVENT_RETRANSMIT for parent state #674 | start processing: state #674 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #674 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #674 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #674 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.230129; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.986019 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #674 | libevent_malloc: new ptr-libevent@0x7fb338053ff0 size 128 "road-eastnet-nonat-124" #674: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #674) | c4 c6 34 70 7c 35 e5 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a bc 91 62 ee 2e 6d a2 96 c5 30 6d 1f 92 ed b7 | 36 56 8d b5 b9 4e e7 b6 33 c3 4c 5c dd d6 f4 99 | 88 c9 81 6d f6 b8 fb 84 e7 0a 5b 99 69 b8 6b 63 | 7a 47 28 12 93 aa 96 26 97 8f ff b9 54 0d 01 18 | 0b 01 9c b3 8f e0 95 e3 e1 9d 26 36 23 71 6c dc | 67 79 37 64 c4 24 a4 8b 9a 37 fa 7c fe 2e 7b 4e | 1a d6 c0 1d f0 ba 43 6c c9 02 6f 4f 9f c0 dd 79 | 3d 4a c7 9a 21 b7 1e b6 9d 90 fd 88 56 63 07 44 | 2e 81 d0 20 01 0b f4 e9 81 1c 3c 49 3e 91 bf 96 | a8 41 f1 e1 4c b6 83 f0 23 56 56 ad 6c 9d 70 82 | c4 41 64 86 d0 59 a6 a1 c7 b9 ee bc 84 09 46 41 | ec ae 2a 69 5c 40 a2 14 21 11 a1 b8 60 07 45 17 | 11 d0 1b 33 f1 93 91 61 7c 42 1b f1 6c bf d3 4c | 23 c1 b7 fe 96 eb 71 68 e8 19 04 8e 6f cb bd 87 | 40 31 f1 46 3f 4f 53 d3 a5 41 35 6c 1a eb f1 20 | da d9 d7 75 6a 41 10 84 60 5b cd 6c 15 bb 13 b1 | 29 00 00 24 5c 59 fc 58 f4 7f 35 a7 c0 cf f0 29 | 1a 0b a6 f7 cf a4 ea bd 59 bd c7 ac 64 c5 cf 21 | ff 47 b8 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 49 d6 82 49 46 9b e1 ef 78 a9 24 e2 | b6 c7 14 d6 61 e8 82 0a 00 00 00 1c 00 00 40 05 | f5 e0 05 f9 c1 de b5 2f 1e 75 ed d6 26 ed d6 71 | 2a 1b 30 01 | libevent_free: release ptr-libevent@0x7fb36804b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c018460 | #674 spent 0.0784 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #674 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3800153c0 | handling event EVENT_RETRANSMIT for parent state #537 | start processing: state #537 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #537 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #537 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #537 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.230214; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.925434 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #537 | libevent_malloc: new ptr-libevent@0x7fb36804b7c0 size 128 "road-eastnet-nonat-150" #537: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #537) | d1 5a 93 f7 50 58 86 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 fb b2 e9 f5 e0 48 e2 24 d7 b7 90 81 4f a6 cf | 4b 14 8e f5 13 4f af 05 2f 84 bf 07 10 88 44 08 | 93 8a d9 fc 6f 22 fa 3c c8 70 98 39 d3 4f 21 67 | 30 23 4e 48 1b 3c bb d4 79 64 36 c0 17 1e c6 75 | 8a 84 dd c6 9f 18 fe 97 4a e5 66 71 01 67 56 d0 | 31 45 bd 3f 15 7c 4b 14 f6 e2 75 2e db 9d 87 36 | c1 55 2a ef fb 95 d2 cc e7 66 60 2a 50 9c df a0 | 4e 6b 6c fc 98 57 d3 ff f6 ab 30 47 15 58 24 c5 | 05 24 2b 82 ab 42 7e 2d 14 b1 af 64 00 e3 f0 ff | c9 03 29 6e 02 ac 5f cd 18 87 64 c1 df 8b 41 55 | df 40 66 85 17 02 00 95 d2 86 68 ed eb b9 5f fb | fb b4 ca c2 86 45 6f 55 ef 58 df 3c e1 5f a2 fb | 91 dc bf 24 5e 80 76 e4 9f 99 2c 02 e9 6b 6e 98 | 01 53 4a 03 27 4f 46 fe 01 ab 6a 3c 9f e3 be 2f | c8 ee 29 25 4e 78 52 2a 3e c2 0b a4 ff 2d c1 b2 | 21 1d 49 45 c8 7c fb b6 52 62 ee 97 b5 36 16 bc | 29 00 00 24 27 a3 e5 a8 20 a1 f0 e2 d4 b5 39 34 | 87 53 60 68 73 e4 69 53 b8 d2 8c 69 1f 4e 6c 2e | b8 6d d5 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 04 dd f4 fd 4d 77 54 64 d5 cd 35 a0 | 59 04 f4 07 5e 47 05 77 00 00 00 1c 00 00 40 05 | 52 af de ce e9 7d c2 89 3b cb ea 98 eb 7e 08 db | cf 06 0c f1 | libevent_free: release ptr-libevent@0x7fb3400613a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800153c0 | #537 spent 0.0774 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #537 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb360018460 | handling event EVENT_RETRANSMIT for parent state #610 | start processing: state #610 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #610 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #610 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #610 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.230299; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.957703 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800153c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #610 | libevent_malloc: new ptr-libevent@0x7fb3400613a0 size 128 "road-eastnet-nonat-18" #610: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #610) | 61 d4 76 e8 fd b1 0b 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 8a 16 af af f2 cb a9 02 ff 3e 3d ae 02 b1 75 | dc a6 9a 8d 77 a2 72 9d c4 d4 e4 1e d5 6c 54 7d | 5c 6a 9a 07 f7 ee 11 8c 25 4e 17 a6 b4 8f e3 97 | 33 ae 5b 1d e1 aa 4d 9c 14 18 3d 8d c9 8d a2 6f | cc 49 8f 9d 17 34 c4 20 96 b3 e2 03 ed 8c 8d de | e3 73 b6 b8 61 9a c3 4a bf 27 d3 2f a8 fe a9 f8 | 00 87 44 22 9b 0b 25 c8 66 f5 c0 23 88 06 14 5d | 26 0a 98 52 96 46 68 85 8b a8 34 78 ba b4 82 eb | 78 95 23 ba 81 62 21 b2 59 bb 25 ed 00 99 e2 d9 | bc 0c f2 02 1d be ff ab a8 66 25 8b 4e d9 07 26 | 4c 48 db 62 8c 96 22 7a d7 2c 26 7a 28 67 fc ec | 0b 44 dc 7e 93 ed 10 51 02 0c 46 dc fa 32 73 51 | b0 91 38 ff ee dc a3 8a 63 c7 0a 63 49 4c a8 57 | dc a0 35 96 35 c6 37 d0 da 6d 46 79 bf cf e8 4f | 26 a6 1b 5c 3a e0 a5 e5 c0 3f 87 73 30 32 59 71 | 11 55 e0 04 02 19 e3 7f 10 2f 76 30 3d 2f 19 1e | 29 00 00 24 47 ba 8f 29 57 01 a1 62 29 56 13 62 | 64 9d 16 df 12 f0 5f 85 ef e3 38 7e a9 49 18 89 | d7 eb 36 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 3c d4 8a e5 4d 08 9a 3a 72 88 9e | 1c 04 96 d4 a5 b0 e4 1d 00 00 00 1c 00 00 40 05 | 52 67 e1 51 42 cf 44 ba 32 e7 56 bf 02 a0 23 c3 | c5 4f fa a5 | libevent_free: release ptr-libevent@0x7fb3540597d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360018460 | #610 spent 0.0623 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #610 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #565 | start processing: state #565 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #565 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #565 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #565 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.230369; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.934298 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #565 | libevent_malloc: new ptr-libevent@0x7fb3540597d0 size 128 "road-eastnet-nonat-51" #565: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #565) | 62 cf 87 14 c6 62 30 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b a0 88 20 e4 4d 45 6c f9 cd ab 1d a2 7b 8a 77 | 3f 3e dd 83 a5 c5 aa 0c 1c dc 89 10 ec 2e 1d 4c | 42 5c ef 6d ad 49 b0 1e 60 9d 8f 8c b6 97 91 1e | fa e2 a1 97 aa fe 08 0f d1 4f 8c 96 f7 66 97 1c | 6e fb 33 4a 4e 60 96 cf 7f a6 af 09 ab ce 9a 08 | 5e 64 35 ec 21 8a c2 bd 2b 50 c9 95 3c df 67 bc | 76 c2 a3 99 52 f2 44 a3 ba 7f 1b 9c 6c be 57 71 | 7f aa ab d0 89 27 ef cd 3c c8 cb b6 a6 56 b0 2a | dc 32 81 f2 b0 96 30 77 84 9d 47 bf 9b 70 ae 9a | c7 54 8e 37 07 9a 5c 45 ac fb 14 0f 30 d7 f4 3e | 00 53 c5 25 30 e9 b3 2b a7 d9 d6 c7 f1 6c ee b4 | 31 ce 1b b5 18 a7 ca cc 86 23 9e 01 75 cb f1 23 | 0c 74 c8 3b 22 ea 10 cb 1f ed bd 4b f5 15 a7 9b | 8d e7 27 21 43 d9 02 bf 4e 4f 28 80 57 9a 76 c3 | 87 dd 7c 2f d5 cb 47 73 51 a8 31 7d f5 87 87 1b | 7f 53 02 3e d3 de e6 6a 94 c6 04 77 83 8c 4f 18 | 29 00 00 24 73 13 83 30 bb ab 6e 91 50 8f 5b d1 | 22 88 91 f8 87 52 43 c0 f4 4c b0 a5 9d 49 2d 93 | 43 f4 73 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c1 96 b5 11 12 39 51 2e 15 f5 5b 59 | 6a a7 e2 36 4b 38 a6 bf 00 00 00 1c 00 00 40 05 | b3 11 8b 4a 03 6b 06 af b5 74 1c 0f df 6e b1 a0 | d3 aa 16 5d | libevent_free: release ptr-libevent@0x7fb374064930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #565 spent 0.0614 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #565 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348046090 | handling event EVENT_RETRANSMIT for parent state #601 | start processing: state #601 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #601 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #601 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #601 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.230438; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.956462 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #601 | libevent_malloc: new ptr-libevent@0x7fb374064930 size 128 "road-eastnet-nonat-16" #601: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #601) | d7 f7 ca a5 2f 06 a8 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 78 ca bd 24 85 88 4c 78 31 a2 d9 e2 a6 11 ea | a9 a8 ae 09 a4 bd 1f 95 2e 57 31 42 02 74 1f d6 | c5 8b 05 28 72 2e 76 f4 00 72 d0 70 f9 55 b5 84 | 94 83 3e 74 df 62 6a cd 44 08 f1 0f e9 7a 32 99 | b9 ec 32 40 77 3a c4 d1 0a 6e 00 b8 4c 58 c1 09 | 20 0d af 2a d9 0e 8d 53 5e ca 9c e2 9f 27 d8 7e | ce b5 b7 c6 10 df 06 bc e3 80 61 af 7d 92 7a 47 | 1a 5f 4a 09 fe bf 68 fb 0f 40 54 3e 58 85 5f bb | 73 72 f9 bf 1d c8 c3 c9 79 44 0d 07 44 21 4d 95 | fb d2 f9 99 1e dc c6 7e 09 bc cb bc e7 f1 64 05 | 39 dc f9 f1 b3 05 e0 d4 1d fc a0 60 42 26 ba 23 | e3 9b cc 3f d0 ff 12 49 db 17 4a c4 c0 02 73 de | 45 c4 7b f5 22 57 16 78 ee 47 e0 a6 d5 4a a0 a8 | ea f8 76 af 62 fa 50 0e cd 7b b7 d6 9e d4 f1 8e | eb 21 f4 fb f5 f5 7a 25 6c d6 52 91 18 f1 41 03 | e3 0e e9 9c 96 a5 c5 a0 5c 45 85 41 73 2b f2 4b | 29 00 00 24 2f 7a 9a b4 ff 1e 6c 6f 1d 55 f4 6e | bf e3 3b b9 6e ac 92 bf 50 bd ca 89 82 b0 73 dd | ad d2 0a 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 7d 4e 6c df 7e 32 d6 75 e4 3a 9b | ea 1e dd 62 f1 90 1e 9d 00 00 00 1c 00 00 40 05 | a9 5b d2 03 4a 24 da 8f e0 b4 91 a2 3b d8 bb f1 | 5f 38 a9 4c | libevent_free: release ptr-libevent@0x7fb348069890 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348046090 | #601 spent 0.0627 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #601 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368024000 | handling event EVENT_RETRANSMIT for parent state #592 | start processing: state #592 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #592 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #592 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #592 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.230508; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.955153 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348046090 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #592 | libevent_malloc: new ptr-libevent@0x7fb348069890 size 128 "road-eastnet-nonat-8" #592: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #592) | a1 23 45 d4 95 dd 12 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 aa 2a 51 f9 3f cc db 28 9d 40 57 76 30 ea e9 | 8d e6 d7 38 3a dd ae 4f ff 59 39 ea 16 ad ee 6e | 8b 62 8c ca b4 a5 29 fe c0 61 e6 51 27 98 b4 0a | 1f eb 1b 79 22 3e 1a 67 1b b4 66 38 e1 9a 6a a2 | d0 1e 24 e9 c2 02 a7 7a ce f6 a5 f9 5d be 27 4c | 71 60 3e f2 bd 07 c5 5b 34 15 a1 fe 4b da 4c bd | 44 c6 05 67 90 ad 62 fe e2 99 3c 11 2a d0 f3 17 | 69 1b 22 6b a5 0d 80 74 ae 19 6c 94 76 90 a1 1c | 59 0b 47 78 27 d8 48 ac 3b c0 4d 98 1f d5 86 fc | d6 cb 0d 55 39 de b7 61 51 01 6d fe 92 8b ba 96 | 45 95 1a c6 f8 88 e3 b7 dc ed d9 6d 83 dc 83 68 | 4d da 82 e4 55 42 9e db 10 13 37 0e 08 44 e6 b7 | 92 01 b4 fc 5c 47 c0 bf f0 3a 42 10 d3 9f ca d3 | 90 f7 0f 4b cd cb 5e ac e6 87 b1 ad ed 51 0d 4e | 56 09 8e ae e0 0b a3 ad 21 69 a1 8d b6 00 f2 12 | 05 e3 09 dd f9 79 f5 d1 86 62 dd e9 ff 12 f6 c1 | 29 00 00 24 51 68 bd 9e 33 71 03 a6 00 f3 23 81 | c3 a4 22 43 b3 42 e5 96 7c d8 19 4b ab d2 fa d7 | 63 4d bc 6e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 b9 87 25 a7 de 47 1d dc da 4c 20 | 6f cb f5 ab 4e bb c1 b5 00 00 00 1c 00 00 40 05 | 3d 18 a6 af a0 2d 17 8e 57 6e 37 da 3a df 31 9a | 3f 4d c5 fe | libevent_free: release ptr-libevent@0x7fb37c03e940 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368024000 | #592 spent 0.064 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #592 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c012630 | handling event EVENT_RETRANSMIT for parent state #702 | start processing: state #702 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #702 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #702 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #702 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.23058; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.989385 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368024000 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #702 | libevent_malloc: new ptr-libevent@0x7fb37c03e940 size 128 "road-eastnet-nonat-198" #702: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #702) | 15 f5 25 c3 13 f8 3e d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f7 23 22 6b 4e e1 f7 16 71 3f cc 94 ff 78 71 9d | 2b fa a2 70 c3 2e ae 8a 41 75 24 b2 5c bd de a7 | 23 08 94 3d 80 25 9b bb 30 e2 39 68 4c a8 e4 29 | 49 31 37 12 c5 eb 36 bd 19 63 9e bb 02 2e 79 f1 | d5 79 49 b4 68 b2 2f 57 ce ad b6 e5 93 ed 10 47 | c7 f4 e8 7e af a2 87 66 73 2b fe 02 35 20 50 f4 | 9f a5 ab b5 64 3f 58 fa 42 fa 9c 6c 95 59 e9 ce | 4a e5 f4 54 be d8 66 74 a2 a2 90 6f 88 07 da 7a | 49 4b 11 75 25 b5 a8 6e d3 e1 6d f6 61 26 a4 59 | c0 01 b5 a8 17 ba 1f 41 41 7b 34 f9 ae 03 0e 4a | 5b 82 0f 6f 4a f8 8e 71 36 c5 69 ca 74 e0 5b 22 | 74 fb e1 af 0d 04 d4 9e 58 0c 8b a5 0c bc aa 36 | 9b de 60 b8 6a 44 18 d6 e6 f7 1e 5f 4f 0f 2c ae | cb 0c 20 f0 15 5f 9d 76 45 13 42 ad ce b6 34 58 | 61 bf 65 e9 72 77 ab c8 67 23 c2 1d cb 5a b9 e9 | 79 63 d4 bb e2 75 dc 84 01 77 ec d7 11 39 db a3 | 29 00 00 24 29 3f 45 8e 5c a6 8f 4f da f4 c3 d1 | 92 da 38 10 ed 30 75 5c 71 90 dd de 75 d0 e6 82 | d2 61 a3 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b d3 44 81 5f 32 17 86 65 0e fb e9 | 12 7b 72 5f d2 f6 d2 d1 00 00 00 1c 00 00 40 05 | 27 39 6b d9 0c ca bf 20 21 d1 a6 c3 cd c6 e3 21 | 22 00 7c f2 | libevent_free: release ptr-libevent@0x7fb34006c3b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012630 | #702 spent 0.0613 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #702 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a8ee40 | handling event EVENT_RETRANSMIT for parent state #676 | start processing: state #676 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #676 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #676 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #676 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.23065; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.988458 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012630 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #676 | libevent_malloc: new ptr-libevent@0x7fb34006c3b0 size 128 "road-eastnet-nonat-97" #676: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #676) | 9b 3e ad 4d 72 f4 8b db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 3a fb 7f 58 e3 6d 62 ec 1e 2e 59 c4 32 70 90 | 18 12 b4 1d 0b 7a db 79 5b 5b f1 b3 ae 64 53 67 | 1a 61 39 5c 66 bf 33 12 e2 07 ee a6 22 5b c8 f1 | db 9f 71 60 29 05 1a c7 13 3e 19 22 f4 45 96 09 | 3e 1a 53 a5 6e fa ef cb 17 c0 79 5f 39 35 36 4a | 56 04 cc 65 b5 06 e3 4b 77 47 11 f6 68 ce 50 3d | c0 ba c5 64 4c ea 38 bc 6c 58 32 32 f6 68 41 7e | 54 0c c5 6f 06 e5 8f 9b 5d 2e 9f ca 8f 21 e6 f2 | 57 64 49 31 d2 36 51 23 ef 32 7b fc e1 c9 40 d8 | 83 9f 51 20 e7 a6 c5 57 1c 3e d9 70 f7 a6 d6 01 | e3 11 c3 e6 40 27 44 77 36 6c e6 51 a9 4a 34 de | ef 68 86 37 6d 3f b8 f2 d1 61 ec 73 99 06 ca 4d | 7c 67 1d 21 d8 21 73 af 9e 16 de 97 5d dc 6c 4e | f2 c8 de e8 d8 33 7c b9 e3 29 55 17 7b 29 87 79 | 3f 1c d3 24 71 d6 95 25 f2 de f6 b8 4e fa c5 5e | 38 62 28 cc 5d 35 7d 8a 00 7d 42 e6 36 56 c3 6d | 29 00 00 24 50 ed 7c 96 0e 66 f7 85 bf de 64 30 | 8b f8 90 bb b7 61 8d 4c 88 80 57 a3 f9 36 fa 84 | 96 9e 05 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 b4 72 7b 99 d0 96 09 97 fc e4 db | 63 69 04 c8 69 8e b3 ef 00 00 00 1c 00 00 40 05 | 9a 7a 34 f9 3d 74 af 91 e2 55 3d 5a 9c b9 26 70 | 97 7c a3 48 | libevent_free: release ptr-libevent@0x7fb364085920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee40 | #676 spent 0.0618 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #676 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37802a910 | handling event EVENT_RETRANSMIT for parent state #646 | start processing: state #646 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #646 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #646 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #646 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.23072; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.975392 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee40 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #646 | libevent_malloc: new ptr-libevent@0x7fb364085920 size 128 "road-eastnet-nonat-181" #646: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #646) | b4 5e a6 e5 43 b3 10 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e9 73 71 28 1c 8f e6 c8 30 15 e8 f2 83 24 73 ba | b7 8e 5e ad 23 5e fe f2 57 66 39 2a 10 14 0b 7c | 99 94 74 01 76 7d aa 55 2c 68 f1 88 64 b0 b2 92 | d0 76 47 86 10 fe 60 a1 91 ba cd e1 7f 16 26 be | 94 e7 90 51 31 6b 00 e1 5e 12 3f 7c f5 94 c8 a4 | 3b fb 8d 83 6d 50 f6 31 0f 66 c4 51 6b 72 e3 1c | db ec 64 33 bf 0c 59 6c f1 5d f9 d8 36 f3 db 7b | 00 1f fd 9f 62 d6 fc a4 0c 59 79 dc 40 4d e4 5a | 26 f7 7b d3 60 14 f9 91 37 58 78 18 88 14 be e4 | 88 8a fa f1 c4 75 a4 31 4f 52 e1 46 5e cf d1 8e | 9c f9 b4 26 da 2d a3 97 eb 50 5c 60 d5 bb 8c bb | 6d 2b 92 6e 83 db 31 aa 80 60 97 87 f1 28 f7 2b | c0 b4 e7 6c 01 76 70 27 2e 05 9c f9 c3 75 6f 18 | 38 5e 72 a4 02 3e 9a ec 50 94 23 4d d0 04 67 a1 | fb d2 c7 f4 b8 d2 26 01 d0 ac aa dc ef ad 7a 1c | f6 27 f6 31 ba cf ef 6b a9 6e f7 2e f2 27 c2 0e | 29 00 00 24 14 d4 23 b3 ee 67 2f 32 3a 28 a9 26 | 74 34 22 80 70 fc bc e1 f8 e1 fc 3b 8e 87 b8 d5 | 50 4f 59 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 b4 a9 36 84 ee c8 33 36 8f 3f be | e9 b7 2c ae e1 30 41 fa 00 00 00 1c 00 00 40 05 | 6c 77 62 56 82 b3 0f 90 87 bf 6a c6 0c bd a8 c9 | 53 ca 46 6f | libevent_free: release ptr-libevent@0x7fb36c064a30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37802a910 | #646 spent 0.0627 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #646 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34001a1e0 | handling event EVENT_RETRANSMIT for parent state #600 | start processing: state #600 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #600 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #600 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #600 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.23079; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.952827 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a910 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #600 | libevent_malloc: new ptr-libevent@0x7fb36c064a30 size 128 "road-eastnet-nonat-128" #600: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #600) | b5 8b 9d 63 05 76 9b 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 cd c7 d7 3f 0d bb 77 fc d1 1c ab 77 ae 86 ac | 26 75 19 1c 77 04 4b 07 7b 30 6a 0f e9 ae b1 4b | c2 01 f0 be 77 bc 8d 29 4a 13 80 84 01 ec bb bd | 9b b4 e0 a3 b9 74 4d fb 59 f0 b1 62 7c 23 17 59 | c2 35 47 24 40 0e 78 ba 49 8d c1 80 7f ff 22 b6 | b6 ec 09 5b c1 9f 87 91 ac ef 09 c3 af 78 0a ea | 0d 6b a8 42 f1 3e 23 89 64 a8 83 5d 1d d4 84 5e | 9f 78 c2 0c 76 ee a4 76 88 78 0a d8 84 b9 ea 14 | dd aa 58 60 5c f2 1b 26 59 8d ee 35 91 31 11 6a | cf c7 9c 82 87 ed 5c 03 ab 49 fc a4 ec 38 af ae | f6 1b bb 87 fe b6 4a 50 60 6c cc b3 1f fa 42 68 | 77 69 10 7a 5c 8f 12 4e bd d8 46 98 43 dd e4 54 | ef 5e 86 b8 15 8e 41 80 e5 10 0a c9 f6 e4 9a c2 | 27 59 fd b1 5d 0b 98 f8 ff 0f 21 7b 55 71 56 50 | d6 a8 f9 25 e7 e0 02 03 dc 47 72 cd 38 48 9d 8f | 84 5d 29 5a e4 04 82 0c 5c 9a 7a 00 38 a3 32 1f | 29 00 00 24 7c 62 68 cd 4f 9b 4e a6 25 ba ff b3 | 1c a3 6a 45 01 89 4e 8a 82 38 6d ae a7 aa 34 d8 | c6 f1 4c f8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 57 11 53 15 68 5a b5 7f fe 43 f0 | b9 a0 3d 5f 8d 50 a5 03 00 00 00 1c 00 00 40 05 | 6b cb 38 0e d2 0e ef 73 17 ed 32 a7 bd 62 17 c9 | 6a 1f 87 d1 | libevent_free: release ptr-libevent@0x7fb340053a30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34001a1e0 | #600 spent 0.078 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #600 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368034dd0 | handling event EVENT_RETRANSMIT for parent state #594 | start processing: state #594 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #594 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #594 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #594 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.230876; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.953907 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34001a1e0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #594 | libevent_malloc: new ptr-libevent@0x7fb340053a30 size 128 "road-eastnet-nonat-81" #594: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #594) | 14 02 06 51 b1 9f 6a a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd 01 b3 9f af 09 be 89 fe fb 88 0b 7e e8 81 63 | 3e a8 ca 5b cb 2b 71 61 2e 3d 71 13 67 81 27 7f | eb 09 e9 81 30 e6 ac e6 a5 a8 3b 20 84 58 c8 8e | 6a 8b fc c9 8a c5 b6 c5 c4 e6 6c f7 d0 89 56 fa | e1 09 5c fd 09 c4 5c 8e a9 af d1 7a 3b a1 f4 b6 | f4 3f 0e 9b a9 94 b9 07 50 f1 fc bf a3 65 7f de | 3a 00 2f 52 8f 64 57 78 ce a7 f9 c4 ca 58 9d 51 | 1b 37 06 31 32 08 90 da a6 51 c5 05 d8 cf c0 4f | 6d 65 03 f8 31 ce 3e 2a 1f 85 59 ce 64 5d bd 91 | 39 62 91 67 e1 9a c3 02 a2 c6 12 25 4d 06 14 65 | 6d 4a 67 38 16 9a f3 0a 7f 67 14 d2 64 51 73 a3 | e8 d4 99 7f 98 eb 17 a7 87 c4 3d ef f7 49 b0 e7 | 3a ee 43 b6 89 d7 8e f9 6d 93 94 5f f6 b9 7c ae | ad a8 c0 d7 b6 71 30 2a f0 19 1d a7 ef c7 69 67 | 34 56 cd 9a ca bc 4f 05 69 d7 a7 23 37 a8 31 2d | ac 76 9e 29 2f 6b f3 a4 f9 9b 74 9e 13 92 6d f7 | 29 00 00 24 bd 30 97 0e 1f 3d f9 71 c1 31 b3 cc | d2 39 eb d3 0e 5f a7 cb d6 93 2f f7 82 b0 8d 4f | bd 25 0f a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 ad 41 74 91 af 29 e4 13 15 1e a9 | 90 db 4d 21 18 96 06 09 00 00 00 1c 00 00 40 05 | ae cb 83 03 f3 ff ad 0d 96 aa 50 d8 b2 3b f6 cf | f4 56 d5 60 | libevent_free: release ptr-libevent@0x7fb368064ab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368034dd0 | #594 spent 0.0631 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #594 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3380300a0 | handling event EVENT_RETRANSMIT for parent state #527 | start processing: state #527 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #527 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #527 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #527 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.230949; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.975322 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368034dd0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #527 | libevent_malloc: new ptr-libevent@0x7fb368064ab0 size 128 "road-eastnet-nonat-65" #527: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #527) | b8 7b a6 b5 cd 22 30 e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9d 68 a6 ce 12 3e 16 ce 0a 40 e3 0d ea db e5 bf | b4 0c 0f 14 5d 82 31 6e df 98 3a a9 2b 0d 83 59 | a7 51 1f df 33 ed b4 d4 3d 6e 89 89 e1 79 17 6e | 79 24 a2 44 83 1f 07 80 b7 73 27 d1 f5 ab e7 f6 | fa 73 46 f9 e5 46 01 bb fe 93 76 2e fb d7 ee 39 | 18 23 e1 f9 53 17 53 31 0d b4 42 58 f1 f5 27 5f | 8f 40 ae 48 c9 9a d1 40 be 99 20 4f f2 5a 11 4a | 48 24 79 61 ea 93 68 2f 62 04 56 92 f9 14 43 3b | 8a 3e eb 47 ce 87 24 50 5e 1e 23 ea d1 e7 ff ad | 92 32 52 12 93 36 c5 47 2c 6c 33 48 33 2a cb ce | cd 3b e2 9d 5f 5a 78 ba 2e 4c f5 75 36 53 8e 18 | c2 8e 6c ae 9f 48 cd 76 e2 9b 13 a4 86 1e d9 37 | 5a 76 08 51 c6 0c c9 7f 15 8d 6a 72 43 9f 44 4a | 6e 19 5e f0 ed 1e 32 a1 a1 b9 c3 4c 22 6e 92 40 | a0 76 62 be 61 a0 b4 ca 52 4a 39 3c 84 7b 48 7c | 26 8e ac a1 a4 17 05 aa f0 10 33 85 e3 3a d9 7e | 29 00 00 24 42 74 9e 85 d4 ce 77 94 f8 66 9d 51 | 75 21 75 54 57 2f a1 c1 0d 08 6e 7a 4a f7 0f 5f | 6b 9a 4f 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 fd 65 f3 18 d8 6f 03 d6 0f 2d d6 | 5f d4 a1 2e 7e 59 4c 96 00 00 00 1c 00 00 40 05 | 2f dc 51 0a 44 26 e8 79 d1 11 0e dd 4d 4c 69 c6 | 3a 55 a8 94 | libevent_free: release ptr-libevent@0x7fb3600618f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3380300a0 | #527 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #527 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb33801d710 | handling event EVENT_RETRANSMIT for parent state #728 | start processing: state #728 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #728 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #728 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #728 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.23102; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.000663 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3380300a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #728 | libevent_malloc: new ptr-libevent@0x7fb3600618f0 size 128 "road-eastnet-nonat-216" #728: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #728) | ed 95 ac b7 77 3a 63 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da a2 78 27 f5 2b 54 2f 55 96 c5 81 6c 0c a3 b6 | 83 12 f5 d9 b8 01 ba b8 d1 a3 42 87 c7 6c 10 0b | 63 a4 94 ca d4 f6 e8 4d 22 ce 05 39 88 91 97 f2 | bf 09 37 b9 98 b1 d8 26 bb b2 1e 92 29 a1 85 7b | d9 b4 11 29 68 ff 40 91 35 9a 09 da d2 cb 07 e0 | ae c3 2d ed f0 4b 10 75 57 d6 65 48 df c7 a2 4f | 3e 00 5e 43 75 06 44 c7 49 4f d8 29 1c 6d 72 c2 | 18 aa 3c c4 95 78 2a 63 17 27 ba 03 8b b4 08 69 | 8a 41 ef 22 d5 36 45 8d d5 f1 45 ce bd 99 4c 4d | 22 ad 81 3f 5d 00 25 1c ad bf 2e f7 8e 8c 80 7b | 93 69 16 30 fc 43 30 2d 8f 1d f1 a2 b8 cf 8e 13 | 28 9a d4 35 b3 7b 77 53 24 b9 b6 62 c4 97 31 69 | 7f 76 13 0e 62 30 c6 ee 48 5c 32 ac fd 53 7f 7a | b6 10 d9 5f 7f 00 e8 b0 6d 1d 12 23 94 fa ae 8f | 68 f1 36 29 a4 6a f8 df 72 30 2e d8 f7 b9 49 8c | 43 c5 19 cb c2 38 18 75 d9 fc 13 c1 7d d2 e2 e9 | 29 00 00 24 e5 63 4e 91 26 c4 75 00 d8 52 0a 1f | e4 6e 1e 05 a3 b4 ec ce fa fc d1 db 89 1d 66 0a | aa 77 5c 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 d6 04 97 64 cb df f6 9c 65 fd 98 | bb ed f5 4e d4 61 43 0a 00 00 00 1c 00 00 40 05 | 5c 17 83 01 62 b0 09 8f af 57 ad 85 0a ed 60 b0 | 19 a9 47 40 | libevent_free: release ptr-libevent@0x7fb35408aee0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33801d710 | #728 spent 0.0815 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #728 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b06800 | handling event EVENT_RETRANSMIT for parent state #717 | start processing: state #717 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #717 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #717 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #717 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.231111; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.008657 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33801d710 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #717 | libevent_malloc: new ptr-libevent@0x7fb35408aee0 size 128 "road-eastnet-nonat-195" #717: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #717) | e9 cc 03 7c e4 bf 38 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 0d 73 a5 88 38 ec a8 b6 b3 23 50 23 2d 53 9c | f5 59 45 c5 2c 5d 29 a6 50 ea 35 cd ff a5 c3 82 | 38 04 6e 7c 97 76 33 80 5e 2e f5 c7 20 1d 6d 52 | 54 d4 c8 43 d2 e6 b1 e4 c1 91 68 e9 90 9b 22 d4 | 83 38 49 6a 85 b6 95 48 9d 37 d5 48 27 0e 06 98 | 9a ac f5 b2 ed 13 5b 90 8e eb 62 80 51 7d 18 ee | 32 25 77 49 32 8f 44 94 81 26 5d 5f 72 27 8e 3a | 3d 60 20 38 fe 19 ba a8 04 69 ba 2a 74 5a 42 77 | 2f 99 5b 7a b9 a8 61 7a f1 75 11 5b a2 50 cd 53 | 3e c5 95 48 2d 5a 37 b9 4e c2 b7 10 0b 09 f4 4b | bc cd c9 0e 10 07 92 ed 69 ad 1e f1 95 18 c1 9a | 1e ea 66 8b 35 9c 7c a7 b1 0e 8e b5 d5 47 b6 9e | 92 8b a0 cf f4 db 96 37 1e 82 84 04 16 36 81 77 | 8c 3e 2c e7 86 0a bd c6 dd 95 c1 6b fe 52 5f 2a | 76 45 bb fe 23 c6 23 bc e6 64 3e f3 0c 6a 8e 66 | 27 65 38 a3 1e 94 62 d7 e1 4e 78 ef 7d 9b 33 59 | 29 00 00 24 84 76 67 8c e9 66 d9 97 e2 c1 c3 44 | f5 19 60 fe 7b e1 dc a7 b1 57 f0 2b 9f 4f 7d 83 | f4 f5 26 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 0e 85 7e 12 27 fe f4 c2 99 71 9b | 7e 21 7b 45 a0 57 b5 9c 00 00 00 1c 00 00 40 05 | f0 35 c9 a1 8e 9b d2 fc 27 bf 2e d5 3b 0c 2d 8b | c9 9a 4f 06 | libevent_free: release ptr-libevent@0x7fb3500882b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b06800 | #717 spent 0.064 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #717 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a3a590 | handling event EVENT_RETRANSMIT for parent state #710 | start processing: state #710 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #710 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #710 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #710 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.231197; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.998976 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b06800 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #710 | libevent_malloc: new ptr-libevent@0x7fb3500882b0 size 128 "road-eastnet-nonat-208" #710: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #710) | 54 dd ed 5a b3 6d d4 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e ae f9 c6 c3 35 9e cb 30 7a bb 1c 00 fa 4e a9 | ac fe 61 1a 01 79 34 2a aa 66 47 75 0d 14 d5 58 | 3d a3 f4 3b 2f fd e3 8f 66 3f d8 83 34 dc f9 53 | ad 76 ca 6c 43 c4 37 d5 67 c9 87 27 ce 69 69 cf | d7 db c7 63 3d a9 5c 21 2d e2 b8 c4 ed 1d ee 03 | ec f9 0e f1 a5 e6 d0 de f8 48 19 8c b1 f7 9b c0 | 1e 79 2e 85 00 e0 3b 1a 5c 6b 87 68 67 17 48 2f | bc 80 b2 6f 4c 41 39 fa 87 e1 62 4f 73 1b a9 5c | 60 de 48 93 9e 02 e2 ec 15 c2 11 32 e4 d6 d4 d8 | 5b c1 d7 7b 6b 58 5f d6 b1 1a d4 fb 32 e3 da 05 | 6e 83 83 d0 d8 9a e3 19 01 2d e0 27 eb f6 d0 d3 | f7 36 9d d5 66 d2 27 1b a7 be 3d df fc 08 16 fa | 28 57 f9 eb 66 43 05 f6 6e 1e f9 24 82 ef 4e d5 | 64 d8 6a 66 63 24 d1 49 d8 f2 45 0b f7 74 80 63 | ff 22 38 7b 7e a0 c3 5f 50 b2 0f dc 7f e8 39 75 | 4b 1f f7 7d e6 ab 3d 0d ee 3f a4 d8 d2 50 29 5b | 29 00 00 24 ab 44 c4 18 c2 85 94 a9 eb c4 70 9c | ed e6 ea be 91 bb 1f 29 3e 10 f2 4c ff 43 63 b0 | b2 3e 00 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 2b 3b c2 86 c3 af b9 48 0a 19 78 | 34 27 e8 b2 13 ec a6 3d 00 00 00 1c 00 00 40 05 | dc 19 d9 87 b0 ce ef 70 e8 93 5c 55 1a 39 4b 4f | f8 02 f2 ae | libevent_free: release ptr-libevent@0x7fb350093270 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3a590 | #710 spent 0.0899 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #710 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378018100 | handling event EVENT_RETRANSMIT for parent state #554 | start processing: state #554 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #554 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #554 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #554 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.23128; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.936136 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #554 | libevent_malloc: new ptr-libevent@0x7fb350093270 size 128 "road-eastnet-nonat-98" #554: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #554) | 25 17 60 01 5a 53 51 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 38 2d f1 00 6f d0 3c a9 89 96 83 23 c7 b8 5d | 1a a6 31 2b 2c 51 9d f6 cf 41 37 49 95 49 bb 07 | 22 d5 2d 9b fe 69 9e 12 c7 f6 3e 06 e7 18 06 20 | c1 aa 51 c6 00 74 fa 4a 11 cc c8 b0 ed 1a e5 e4 | c4 39 2f 27 86 6b 56 5d d1 56 6c 92 b1 bb b2 fd | e7 5b 8a fa 41 54 ee c3 2f 4b 56 28 c4 84 43 b6 | 29 3e 51 c0 e7 fd f5 95 28 1a d0 e0 91 dc f1 6e | 39 56 bd a3 9a d5 67 19 93 7a c4 42 65 6a 67 24 | 4f 95 02 14 cf 93 bd 7f a6 8b ba d4 40 ea aa 44 | bb 51 d0 43 02 22 34 c7 50 c4 3c 24 ec 0b 9e 0b | 68 3e 0f 11 f4 55 6d 52 6f 15 ed f6 c8 d2 70 f8 | fa 7b 49 45 c1 d7 b6 5b 40 7b 44 9d 47 3c af 30 | 36 b9 73 5d 22 5f a7 f6 ce 29 85 12 50 70 19 59 | ff e1 64 85 88 18 f5 bb 21 9e 23 15 22 cb 42 8f | df e0 fe 4c ee be d0 17 86 a2 52 52 76 91 2f 84 | fc 1f 46 9a d7 c0 87 a2 fb 33 8f b3 de 22 8e f6 | 29 00 00 24 2a e4 8d 48 f2 e9 35 56 e7 78 9c 50 | 82 48 8b a6 d8 56 83 14 85 5c 7b 82 38 7e 5a 90 | dc b9 01 eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 6c fa 7e d5 f7 59 ab 33 19 e9 49 | 9d b2 c4 ad db 25 ab 32 00 00 00 1c 00 00 40 05 | 84 c3 f1 b0 ec 53 88 9c d7 9f 3b 91 13 fe 1d e1 | bc ef 10 92 | libevent_free: release ptr-libevent@0x7fb37803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378018100 | #554 spent 0.0627 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #554 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35801d710 | handling event EVENT_RETRANSMIT for parent state #558 | start processing: state #558 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #558 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #558 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #558 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.23135; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.931594 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378018100 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #558 | libevent_malloc: new ptr-libevent@0x7fb37803b0b0 size 128 "road-eastnet-nonat-9" #558: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #558) | a0 bf 59 d3 80 3d 9d 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 0b 86 6c 08 67 cc 4b bc c3 39 13 37 f4 32 e7 | ad d1 3b 50 ca a5 a0 c9 48 a7 c6 40 28 8a ce 88 | 48 9a aa f7 90 71 74 ed bc 28 4c d4 56 d7 df 22 | 4f 3a d6 3b 4e 8c b0 b3 d6 6a 56 04 3b e0 40 63 | 8b 49 82 3f 73 5a 7c fa a1 c4 0c d8 1e 26 25 61 | 7f c0 52 f8 2f 3c 28 85 6c 37 5d c8 aa 97 0a 05 | 31 61 41 82 78 5c 29 78 03 4d 4e ec d7 92 6b 15 | 11 ed d4 89 17 37 84 77 86 0f 5b 00 ae 1d 38 19 | 0d ac 0c 19 d4 42 43 c3 c7 86 33 36 3d 13 82 f5 | 92 4c 46 6b 6b 92 f0 58 2e 94 0d 8c d2 74 6a 33 | f6 10 0d 35 6b 00 74 18 19 fe b3 bd 3b 01 68 c8 | 55 16 d5 ec 93 02 71 33 c5 83 15 91 47 19 08 ae | d5 86 b5 c3 61 af 99 0a ea 43 2b 44 f9 af ac ea | 2c 5e 25 7a e2 4b 89 ff 8e 3b 15 87 08 63 19 5e | 81 14 9b c2 be b1 4a a7 00 bb d5 e7 f7 c3 ed f1 | 6a 63 70 39 8b 8e 47 62 eb 92 4d 42 f6 a8 77 a5 | 29 00 00 24 07 63 d1 5f 7b 4c 62 77 51 cf 3a c4 | f3 0f f8 72 58 27 a5 92 6f 1a 94 2c 36 bd c3 e4 | e2 d6 9e 5a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 51 b0 40 da 74 9a 4d f5 0e 2f 49 | 38 da 65 ba 56 04 b0 54 00 00 00 1c 00 00 40 05 | 8b 38 7f 8a 89 4d 10 70 34 f4 f7 39 75 12 38 2e | a0 bb 61 3b | libevent_free: release ptr-libevent@0x7fb384063190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35801d710 | #558 spent 0.0626 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #558 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350044df0 | handling event EVENT_RETRANSMIT for parent state #597 | start processing: state #597 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #597 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #597 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #597 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.23142; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.955734 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35801d710 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #597 | libevent_malloc: new ptr-libevent@0x7fb384063190 size 128 "road-eastnet-nonat-22" #597: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #597) | b4 11 eb c0 3c ee 82 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b e2 a7 57 e1 0e 89 3c 5e 5c ad af 7e 70 cd ff | 21 89 77 18 f4 e7 a2 a2 0b 97 a2 cc 0c 79 62 a6 | 53 17 8a bc 8d 3b 08 6c 40 4e e0 76 7d d4 d1 91 | bf c5 8b f9 61 7f eb 07 6d 14 8e d7 2e 13 4b b7 | 14 c2 d5 04 cf 8a cc ac 4e ae 84 9f 14 5a e5 10 | da ae 54 d6 70 48 a3 a7 d0 ef ea bc 55 27 5a 82 | 23 5b 52 be c1 f3 53 be bb 7d 21 37 c3 a9 7f 33 | c7 62 04 d8 71 42 47 a0 d7 41 5f d1 4d c5 32 46 | 77 62 f1 35 9a 43 b7 7e 06 40 63 92 bb 12 f6 65 | 95 37 e9 95 f6 44 66 e5 21 74 8a 91 88 04 ad e6 | 73 e6 dc 01 ed 0f a5 fb 40 2f 2a d6 15 cc f9 e5 | 64 76 7c 1a f7 fd 4f e9 ea 7f 6a ab 40 67 b0 84 | 31 a8 8a 3e e0 7c 8e 22 7d 83 59 b3 8c 60 24 8d | 8b 1d 5a 54 65 8f 80 6f 96 65 ca 43 c8 a7 28 f6 | 55 d4 fa 1a 47 2e 73 c8 9e ce 9b a4 9b 29 e3 96 | 97 ae 07 06 04 32 86 2a 42 ce 44 45 22 8b ed a9 | 29 00 00 24 49 1d 06 1e f3 92 fd 55 9e 0a 50 15 | a6 41 c4 55 df 85 ea d9 9d 51 f8 0d da 8c c6 ac | 25 cc 84 3d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d c2 73 38 8d 54 94 82 d9 af a8 f8 | 7c 2d a7 d4 83 28 88 71 00 00 00 1c 00 00 40 05 | dd 49 b4 51 8c 53 2c 7a 9c 58 4d c4 6e bc 08 eb | ca 20 63 19 | libevent_free: release ptr-libevent@0x7fb350051bb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350044df0 | #597 spent 0.0616 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #597 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7cf10 | handling event EVENT_RETRANSMIT for parent state #699 | start processing: state #699 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #699 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #699 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #699 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.231491; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.998075 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350044df0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #699 | libevent_malloc: new ptr-libevent@0x7fb350051bb0 size 128 "road-eastnet-nonat-246" #699: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #699) | 3d 5b 9a 7a 4c 0f 9e 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3a 09 f9 eb a7 2c d4 98 c3 18 03 6f 47 d0 96 ba | 3c f2 05 d8 dc 28 48 bb 27 cf 99 6c 93 c0 c3 83 | 62 65 ad 94 56 b3 ed 6c 6f d7 43 5b eb 9a b8 8c | cd bc f0 70 f4 67 60 ab 7c 75 e9 55 5d b0 86 b6 | 64 db b3 4d b5 b8 2b f5 3d ab b6 8a 7d 99 73 4a | 9b 33 fd e0 3a 15 58 67 0c 5b 8e f3 d6 f2 97 a2 | 7d 06 3e e7 f9 db 01 b6 96 1e 12 71 96 36 b1 ec | b4 4d 68 d3 51 78 4b 90 eb 84 c2 64 e8 b4 4f 2c | d3 6a bd c9 98 ce 1f 8e 81 89 21 95 4c 9c ba 75 | d7 f1 23 87 ad 5b ff f5 2f b5 a2 44 90 c1 f2 58 | be d6 e8 53 b5 24 d2 77 32 37 2b 7a 81 a1 bc 2a | 6f b9 14 6a 34 88 fb 2f 9e b0 2b 54 9e 18 aa 92 | 83 c2 bb bf fc 01 c9 75 ab 94 44 ea 3a 9c f5 0f | 98 b5 4e 1e 59 de 26 f7 a1 d7 7b 72 e7 1f 59 71 | 0c b6 98 51 80 1c a2 16 07 3d a3 ac 7a 38 df e5 | 57 4a 6f f1 39 e9 67 6c 90 88 41 fd 33 06 1d 56 | 29 00 00 24 75 7b 0d 72 2a ad 01 e2 32 07 7f 62 | c6 47 f1 e7 26 b0 2f a6 3b d9 b1 d0 4e 2c e5 dc | af ae 5c 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 d7 12 af 37 14 12 8a ae d8 ef 8c | c0 42 58 74 2c 82 0a f0 00 00 00 1c 00 00 40 05 | bb 48 6f d2 a0 ac e9 6e 70 bb 7f d3 67 7d bc 39 | c4 af 08 4e | libevent_free: release ptr-libevent@0x7fb36c0933d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf10 | #699 spent 0.0856 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #699 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38800feb0 | handling event EVENT_RETRANSMIT for parent state #534 | start processing: state #534 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #534 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #534 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #534 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.231595; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.936961 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #534 | libevent_malloc: new ptr-libevent@0x7fb36c0933d0 size 128 "road-eastnet-nonat-43" #534: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #534) | b6 c2 42 e3 74 ca 7f 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f e9 15 ad 11 6f 89 c0 a8 02 55 a1 73 88 84 f9 | 33 7b 5b 0d 0b 5b d7 57 77 b6 59 c3 92 4f 9c 81 | e6 98 a6 a1 b8 34 63 c4 08 b9 bf 0c 69 da d1 2b | 1a e8 9b 2f 98 d4 44 3b f0 73 62 cb 71 d6 64 d1 | 3a 3d f5 71 2d 7e 29 30 73 8d 8a a7 fc e0 c3 a4 | 07 15 fb 3f 7b 6d ac bf dd d0 0f d6 95 19 6d 4e | ab a0 86 9d f8 d4 b7 8e e6 1d 84 a8 cb 93 14 ec | a8 13 51 b0 91 ca a4 6a 06 06 50 7a df 97 a5 15 | 33 7b b0 2a aa 9d 49 82 99 5a 1e f8 ff 91 d1 bb | 5f 9c 20 e3 88 f9 89 5c 2d ff 2d 6c 31 e8 44 d4 | c0 96 d5 82 e9 c1 04 a4 03 63 11 8d 47 c3 ee f3 | 9c d6 e5 95 a9 a9 b4 3b 1f e3 34 6e 77 02 0b 87 | cd 18 1a ad 7e 61 e6 d2 80 d4 cd 61 09 82 cc d6 | aa 80 fe 73 e7 11 a7 12 0a 61 d0 3f 70 03 0e 25 | 0f fa b0 0b f0 75 c7 91 3d 8b 34 3c 45 ce 0a 85 | 42 34 96 d7 4e 3f d9 17 73 40 5a 4f bb a1 8b 1a | 29 00 00 24 6f d6 0a bf ca bc 9d 1e 75 5d 3f c1 | 66 5b 32 47 90 cf da b2 6c 6d a4 db de c8 e0 a3 | 3c 0a c8 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 38 48 7f 05 85 41 6a 46 8b 67 3e | 92 3f a4 69 d3 0a 9f 50 00 00 00 1c 00 00 40 05 | 9b 5d 60 63 c2 dd c6 23 03 14 4c fb 6a ee 61 48 | 2b 45 1b 9e | libevent_free: release ptr-libevent@0x7fb3500722e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800feb0 | #534 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #534 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368025320 | handling event EVENT_RETRANSMIT for parent state #641 | start processing: state #641 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #641 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #641 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #641 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.231712; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.96809 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800feb0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #641 | libevent_malloc: new ptr-libevent@0x7fb3500722e0 size 128 "road-eastnet-nonat-235" #641: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #641) | 20 9c e2 59 31 cf 6e 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 09 b4 84 ab aa 43 89 78 34 b0 d6 e3 38 d9 6d | a2 02 c4 4c ab 4d 8a f8 0e 36 02 d1 bf 26 dc a0 | 18 35 ff 92 d6 ab 35 8b 97 0e fa 1f 06 74 86 13 | bd 4b d4 10 63 6d 50 fa d1 05 e5 b6 83 80 eb 81 | 1d c1 17 7e 74 96 70 4b 8a 7d a7 98 bf 41 d3 e4 | 53 6e 45 47 7a d5 ce ad 7c de 29 6d 1c ce bf ee | 29 ef db 71 37 1e f4 da 05 b9 c1 9e 94 b8 09 61 | 06 d2 e5 30 cb fb 00 e2 3c 1f 90 84 66 2a c9 21 | ab 1a 0e 49 5d e5 f7 c2 53 02 87 88 0a 36 0c 6d | c1 f9 c6 d4 46 2e 67 22 c6 2f 23 dd 8d d0 33 a7 | 3c c4 80 09 35 06 d4 ba c9 54 31 c0 47 e3 77 50 | fe d3 cc af 02 88 b5 3d 64 43 bb 82 7f d7 97 a8 | 8e 74 10 23 3c 82 a8 eb 61 af 8f 95 ef 01 57 91 | 74 35 ea c2 74 76 d5 21 d5 ff e2 5e 1a d1 24 e9 | 4f c4 4e 06 0e c3 35 68 7a e5 01 33 ba 0f 7b 79 | d3 d6 e7 d9 69 7d 18 4b b8 91 33 33 1e aa 41 47 | 29 00 00 24 de ff b6 ca 63 e9 cc b9 1f 7c 3e 7c | 82 6d ca 20 ea 43 fd 3c 13 8e a9 32 83 2c 0c 09 | 45 b1 6a 12 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f d0 71 59 b2 13 20 21 05 f4 92 89 | a6 fa df 4f c5 3e bb 18 00 00 00 1c 00 00 40 05 | da 4e b6 83 cf f5 84 c6 fa 26 59 3a 0c bf c7 47 | bc 79 7e dc | libevent_free: release ptr-libevent@0x7fb388085dd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368025320 | #641 spent 0.0637 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #641 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370012bf0 | handling event EVENT_RETRANSMIT for parent state #695 | start processing: state #695 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #695 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #695 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #695 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.231784; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.993109 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368025320 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #695 | libevent_malloc: new ptr-libevent@0x7fb388085dd0 size 128 "road-eastnet-nonat-197" #695: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #695) | af 67 24 f2 d5 c7 bc 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 14 e7 c9 33 09 4d 36 12 f9 6d de 10 f0 e5 47 | 82 ed 23 45 d4 b6 ce 21 00 04 da b4 2f 94 b8 30 | 2f 77 2b 66 13 06 af 85 21 fd ef 57 6a 09 67 67 | 37 28 49 9e 18 7d d7 f0 08 1e d6 88 3f e7 a9 18 | cf 2f 78 55 e7 d6 fb 4b 07 4e 15 ae c6 2b 26 51 | b3 ce ba 2f 1e 38 1f 99 e6 3d 40 73 ee 22 e1 a7 | 0d 0b 8c c5 62 02 7e 56 2d 8d 6c 77 fd 6e 2e 61 | ca 7e 48 f6 cb 33 41 3b 92 87 6e 0f b5 01 01 1a | 7a 26 1b af b8 f9 1b 18 fd 42 1d d8 57 b9 99 f3 | a3 88 af 1a 40 b5 fd 9d a8 8b 9a 42 43 ee 86 63 | 13 46 c8 29 88 32 aa 0e 70 c3 98 1b 40 71 6c 44 | ab 3f 11 fc d3 58 f3 77 22 af df 25 de 81 a9 4a | 00 72 bb 64 e2 5c be f4 95 c0 21 c9 6c 9d 40 f4 | 7b 46 b5 97 b0 26 ac 1c 91 8d ac 90 5b 92 a1 ab | 78 4e 4e 35 b8 bf b8 64 4a a1 5c 4e 46 64 49 0a | 0d b6 6c 3d 6b 6f b5 91 f0 48 34 62 b9 68 a6 af | 29 00 00 24 c0 8b 5f d5 7a 97 79 40 43 e6 f6 3f | 54 f6 96 1a 49 cd f5 d4 43 9d 79 22 51 26 12 49 | 61 34 44 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a fd 7a d7 4e 83 ac 99 9d 97 07 a9 | d5 f6 51 74 a1 c3 79 42 00 00 00 1c 00 00 40 05 | d3 52 b4 8f bd 1e ff 85 b5 5d 7c 33 8d 85 60 74 | f7 b3 c4 d9 | libevent_free: release ptr-libevent@0x7fb36406a1c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370012bf0 | #695 spent 0.0903 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #695 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #729 | start processing: state #729 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #729 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #729 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #729 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.231883; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.004304 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370012bf0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #729 | libevent_malloc: new ptr-libevent@0x7fb36406a1c0 size 128 "road-eastnet-nonat-240" #729: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #729) | 67 a1 5b 23 16 28 fb 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 81 a9 49 57 bf df e1 f1 ea fa f5 92 44 d9 16 | 0e ea 66 38 d8 dc 75 6f 21 e1 c4 ca 83 4d 4d a6 | a8 40 61 2c 03 9c 81 09 e4 2c db 8c 6b 07 73 a9 | f5 96 45 79 32 38 25 d0 cb a7 7f 05 3f 22 9d 55 | 94 52 09 92 47 a0 99 ce 8b f9 2b b1 16 c5 6d d5 | 5a 5f 80 8e 4a 88 73 f6 19 b4 2a 58 b1 99 a3 f1 | cf 10 1d ee 49 52 bf ae ad 75 79 fc 4e 1b 70 c4 | fe 0d d5 21 ff c3 16 1c 6a 4f a2 1b da 3f dd 80 | b7 98 1e 3c e4 19 40 2c ba 2b 1b 02 76 ef 1d 8c | 32 68 18 21 59 6e 3c 68 cf e3 eb 77 5f af 35 46 | 5f aa 30 45 02 11 0a b4 a8 8f ff 89 3e 96 86 5d | 06 be 71 8d 28 b2 ee 71 59 26 45 c0 3b 2a 27 ad | fe 98 e4 a6 a7 ad 6c 8f d2 ce 96 56 c5 bb 39 51 | 6a 23 cb d8 31 3d 75 5c 91 5d 1e 01 ca 04 2a 2e | 70 54 ab 56 07 f2 3e 14 8f 66 51 e0 bf d5 13 d5 | 73 c4 4d 14 6a 43 47 b4 f4 a1 4b 3b 4b 58 bf 93 | 29 00 00 24 ba eb 8a f4 d2 cb 7a 42 9f 66 73 21 | de 49 71 25 d5 fa ae 34 96 57 d1 6a d8 63 50 0d | e7 fe 39 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 4e 71 12 16 99 de 9d 6a f1 f6 ef | 1c a0 b8 7d 93 f0 39 1e 00 00 00 1c 00 00 40 05 | 19 1d 16 93 50 07 d9 58 09 ed 23 95 2e a0 e3 31 | 82 b4 65 2f | libevent_free: release ptr-libevent@0x7fb344074e80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #729 spent 0.0634 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #729 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34001fa80 | handling event EVENT_RETRANSMIT for parent state #564 | start processing: state #564 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #564 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #564 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #564 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.231953; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.952041 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #564 | libevent_malloc: new ptr-libevent@0x7fb344074e80 size 128 "road-eastnet-nonat-44" #564: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #564) | 2f d3 42 a8 8e fb 16 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 57 dc e5 0e c5 b3 5a a5 b1 00 4b 67 ff 85 46 | b8 62 d6 0c 0d 31 23 f0 15 92 2b d6 8c 7c a9 f2 | d6 dd b2 f6 df 09 a2 a7 d4 4c f5 c8 47 54 16 76 | 5a 58 cf d1 ec 54 b5 fc 7d 31 6f bf 81 02 c0 98 | 73 35 4a 40 a8 af 1c 13 3b cd 5e 84 ea 44 ca 69 | 54 c0 3d 20 b4 71 ba 13 dc 34 f4 0e 7c b2 aa b8 | c4 a9 b5 15 a4 bd b0 a0 2f 7e 8e 8d 90 c4 a1 53 | 64 09 3f f1 29 9d e6 14 4e 06 d3 b9 04 6d 85 e2 | 8e d3 43 4f a5 d9 1f f9 90 f5 65 41 52 ea a0 85 | a6 74 7a 70 9b f9 1a 1b c9 8d 45 01 fd 6f 0b c5 | 33 01 ed 92 72 46 2e ff 55 83 2c 71 1d ed cc d4 | 98 ca f9 5a 85 34 6f be 44 21 e9 c6 d9 23 68 35 | 49 8d 06 e2 b6 a8 ec 04 67 19 6a 25 85 e7 25 a3 | 44 d2 a7 dc e7 13 d5 3e e1 f8 5a 22 0f ba d0 2d | 6f ea 9c 6f 17 1b d4 89 ec ee fc f7 ec b2 46 89 | 2d c5 51 79 e6 ba bb f3 15 62 72 06 39 13 5f b6 | 29 00 00 24 96 1c e1 0c 7f e5 9c 1d 77 d9 4f 7d | 4d 47 9e 2d d0 89 bb 2a 04 e6 2e 94 ae 57 6c 89 | bf 1f de 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 46 11 5f cd 69 00 3f 80 ae 94 cd | 27 23 87 c3 ca 0f c2 84 00 00 00 1c 00 00 40 05 | 00 5b e6 68 40 1a 8f cb 1f 47 b5 45 fe a7 9d c2 | 49 00 ab ac | libevent_free: release ptr-libevent@0x7fb36c05f200 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34001fa80 | #564 spent 0.0631 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #564 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38400a290 | handling event EVENT_RETRANSMIT for parent state #608 | start processing: state #608 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #608 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #608 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #608 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.232023; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.963185 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34001fa80 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #608 | libevent_malloc: new ptr-libevent@0x7fb36c05f200 size 128 "road-eastnet-nonat-60" #608: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #608) | 0c 40 8a ba c0 95 22 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 ac 32 20 e6 f2 f3 72 0a ac 9e a1 c0 7e d1 9c | ba 7d 04 0a 67 49 79 19 1b b3 e4 99 5c 8a 7f 51 | 2f 8a 06 ea 31 95 52 fd e6 c3 f7 54 3b b3 9d 31 | 27 18 b7 a2 0b 76 60 35 d5 3e 6c b2 60 48 f8 98 | bb 1c 43 2e ba 94 47 ae 1e 5d 46 a4 a9 be fc b5 | 9f 5c 2e 2b 32 a1 9d 84 73 52 7b 19 0f 87 44 ee | 2c c7 e0 19 73 47 89 45 a9 59 4b d7 0d 9f 39 05 | f3 7b a7 83 81 66 77 f6 57 d5 e3 c0 d5 84 80 f9 | ee be 18 01 e0 bf f6 46 34 fe af a5 cd 63 66 6b | de d7 56 46 3a 36 e4 5e 22 bf 64 7d 8c e2 2d 47 | 9e 04 cc 8d 7f d9 cb 06 83 4a e3 29 55 cd 8d 42 | e9 49 18 56 c5 a1 65 6c ca 69 c5 84 07 6d b0 58 | 2f 95 59 6a b7 c6 f7 02 21 d7 08 bc 5d 1a b0 ee | 67 fb 57 c8 f3 65 46 50 18 bb ad 85 2c fd a4 7a | 1f 49 86 f5 1e 9f f2 f1 74 80 e2 0f c0 52 94 90 | 6d 49 de 10 9d c0 e3 1a d8 90 bc 82 30 91 d0 23 | 29 00 00 24 18 87 a4 c8 cf 5c 93 83 68 9d 68 8a | 28 36 66 32 92 60 4e 85 d6 0c 91 d5 ef 20 18 75 | 65 13 ec f8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e bf 02 dd 26 3f 8a eb 4d 3f 2a d7 | 62 d7 7d e3 99 e0 e7 0a 00 00 00 1c 00 00 40 05 | 1c 98 9d 66 2f 94 1b 4c 60 05 a1 e4 50 37 22 f7 | bd 66 62 87 | libevent_free: release ptr-libevent@0x7fb35005ec80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400a290 | #608 spent 0.082 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #608 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34401d710 | handling event EVENT_RETRANSMIT for parent state #536 | start processing: state #536 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #536 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #536 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #536 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.232129; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.933953 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400a290 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #536 | libevent_malloc: new ptr-libevent@0x7fb35005ec80 size 128 "road-eastnet-nonat-122" #536: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #536) | cd 74 01 a2 39 d6 cc 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 a9 5f 47 01 bf 55 fc bd 36 63 8b 4d da a2 32 | 98 7c 8f 8d a5 10 38 4c bb 7b c0 1e 62 5a 95 3c | ab 87 bd b0 4f 05 a5 81 6d 16 fb ef 76 e7 c1 2e | 30 1a b2 78 2f 5b bb 53 da 79 ff c6 de 33 c0 9b | 96 0d 48 b4 64 0a a9 01 2d 4a d0 58 00 bb 3c 5a | b8 df 75 ac 56 24 ea 3b e4 71 b8 47 a2 58 0d 3b | 32 c1 40 67 d0 eb 20 07 a9 b4 43 31 fd 92 e2 d3 | 5e 9d 2b 29 57 37 d7 12 6b 8f 10 a0 9d 51 1a 5e | 59 dd 2a 2e bf c4 30 ee 1c 21 a4 1f 05 1c f1 ca | e9 cb 39 c8 e2 40 b2 4d 3b a4 95 5b bf 34 0a 3a | df 80 38 7b 51 86 8c a1 11 39 77 8b d5 ae 50 8f | 99 a1 0a e0 bd 3f 7e c9 79 53 04 c1 e3 df cd 70 | 3e 66 c4 67 c1 e4 73 dd bf 1e f4 11 d7 82 43 b1 | 95 c0 67 ed 01 5f 2c b1 0e a8 b7 86 5e a3 ac 38 | d4 97 88 0a b4 b8 8a a9 70 ef 6a 55 78 38 3e 25 | 5b 0e aa fc 57 7c 94 10 43 b3 19 df 16 34 03 61 | 29 00 00 24 13 0a a1 55 e1 40 3c ca 6b 43 9b 8e | d8 49 6d 03 c7 22 e9 d4 6e 01 14 b8 c6 77 b4 61 | 5d 3f ba 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b c5 c3 84 79 53 11 43 e1 cc 1f 7c | 14 ba b0 c9 4b e7 b4 37 00 00 00 1c 00 00 40 05 | 57 c6 83 93 fa f0 1e 53 76 4a bb b4 87 ee 28 a4 | 6c 5a d1 2c | libevent_free: release ptr-libevent@0x7fb3640960c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34401d710 | #536 spent 0.063 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #536 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ae8980 | handling event EVENT_RETRANSMIT for parent state #614 | start processing: state #614 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #614 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #614 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #614 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.232199; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.969917 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34401d710 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #614 | libevent_malloc: new ptr-libevent@0x7fb3640960c0 size 128 "road-eastnet-nonat-47" #614: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #614) | e2 44 b3 0f 15 7b db fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 92 e1 08 e5 43 41 79 c5 5d f0 96 29 52 40 c0 | 97 e5 c8 ff 05 3e 53 fa 62 76 da bc 72 8a b9 4c | f7 18 b8 6a ca 45 53 24 52 f1 8d 1e 49 3a 17 8c | ef fa dc 34 b5 f9 4d b5 58 f3 46 8b 4a dd 09 9b | ea 93 c2 33 65 02 3e 54 93 99 4f c8 fe a6 b2 d6 | af 78 80 dc 24 65 ba 1e a7 5b c2 a5 cc d3 1f 7e | cf d7 a5 8a 8b a8 49 5f d7 0f 85 09 d8 92 ad 49 | d7 a4 fe c3 04 e8 a3 5b 39 08 a0 31 46 6a 16 61 | 4d 3f 91 60 20 e1 05 33 e6 27 94 27 aa 1f fa 73 | 54 7a 93 dc 72 57 0e c3 11 46 f1 19 8d 7f 0c 06 | 3c c4 e4 73 42 6f 8b 92 68 78 39 66 88 cf c0 3b | 5d 6d 07 37 a6 42 2d 6d 6e 59 f0 5e 5c a4 19 79 | 26 9e 6d 08 ab 5d 74 ce eb ad 27 d1 db 09 88 c8 | f0 a6 93 29 46 42 ee 9f bb 5d 95 45 12 52 b4 73 | e2 c1 41 95 83 74 fd cf 99 ef 67 58 02 64 29 39 | da 81 64 9c 6a e9 22 3f 8a e7 56 f4 13 9b 71 87 | 29 00 00 24 86 16 ba 44 69 73 79 7d 89 32 49 92 | 68 97 7e 5d 09 b2 8b 2b eb b1 d6 6b 17 01 84 df | c9 f4 9b 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 2e 6b fd 7a d6 ac c0 e0 4d 65 46 | aa 7e 2f e7 b8 bb 4d 39 00 00 00 1c 00 00 40 05 | 1e 6a 1e 6b b1 89 1b 8c 76 4d 90 e8 7d 48 17 e8 | e9 bf 32 eb | libevent_free: release ptr-libevent@0x7fb388059ea0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae8980 | #614 spent 0.0627 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #614 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad5900 | handling event EVENT_RETRANSMIT for parent state #519 | start processing: state #519 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #519 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #519 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #519 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.23227; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.934732 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae8980 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #519 | libevent_malloc: new ptr-libevent@0x7fb388059ea0 size 128 "road-eastnet-nonat-68" #519: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #519) | 36 74 88 6c 2b d4 65 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 80 4d e8 d2 d9 23 a3 00 9b f7 df 4f fc c6 6e | 72 0a d6 44 83 97 e4 01 17 c9 8e 18 c2 f3 5d 0b | 06 e3 14 e4 8b dd 35 55 be 4b 2f 8b ab e3 cf ff | 80 24 c8 41 ad a4 91 74 f3 18 71 24 3e 71 ce 42 | 5e 86 bd 65 21 12 dd cb 90 44 9b 3a 9f 20 2e a7 | d0 3f dc 7c b1 53 17 2a e7 d3 a1 43 19 60 0c 5d | a4 8c 8d 56 2a 15 54 29 6b e8 1d 43 3b 4c 9f 9b | 9c 1c e3 58 55 dd 85 2d 50 d0 5a 79 9c 2c 40 b9 | e9 42 08 b9 54 2a 23 6a ed 77 99 24 5b c3 76 38 | a0 98 ca 43 c3 7c c7 63 5d d3 19 75 86 36 2c ee | b6 7d da ed 30 f6 cc b6 4d dc 14 16 ea be cf c9 | 4b 9d 75 9b 36 af 1d fd e9 19 95 e5 30 f3 fb 99 | c9 3b 35 b0 77 0a 08 c3 17 b0 a5 ed 7e a1 52 ee | 73 a2 4a 26 9d 1c 04 4f b7 86 f3 0e 1b 4b 3b 2a | da 3b 8c 88 8e 0d 68 63 4d 3f 3d f1 f7 54 db 7c | 16 d8 87 45 15 1c 36 83 91 f6 d9 2e c6 69 c8 c7 | 29 00 00 24 1f 89 a0 a9 be ce 4e ea ec c0 43 e0 | 93 cd cd c6 83 c2 c6 69 70 37 da db 02 17 df 46 | c3 38 aa 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 b0 da 44 b0 25 b8 4b 8c 5b 4c 67 | 69 d1 51 09 6e 53 b8 b5 00 00 00 1c 00 00 40 05 | 80 05 b4 13 38 cb 24 03 e0 02 b7 5d 8d 12 3d 6f | e6 28 68 a9 | libevent_free: release ptr-libevent@0x7fb35c0902e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad5900 | #519 spent 0.063 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #519 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37802a9a0 | handling event EVENT_RETRANSMIT for parent state #584 | start processing: state #584 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #584 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #584 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #584 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.232355; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.963976 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad5900 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #584 | libevent_malloc: new ptr-libevent@0x7fb35c0902e0 size 128 "road-eastnet-nonat-108" #584: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #584) | 51 4c b1 7c 25 ce f5 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 ef 1f 70 eb 76 7d bc c3 86 b2 99 57 eb 3f 54 | c8 7d d3 aa 36 79 bf 95 d1 7e f5 bb 68 ed 90 a1 | b9 2c 9e 6e a8 b6 35 e4 01 68 b8 41 06 98 3e 9c | d6 35 04 2b bb 27 bd c4 b6 ed 89 cf f7 c6 f3 c2 | 46 86 3a 37 38 db cf 96 97 e5 a4 50 07 54 e9 4b | 37 df 7c f4 a0 4c d9 7b e1 63 0f 4a 78 e1 d1 d8 | f7 06 cc bf de 67 6f 51 a9 2a 50 9b be 39 51 fc | 92 f3 11 84 91 d8 2b 24 5f 7d 2e 3c 48 87 2c d7 | 4c 9f 31 94 b4 2c e3 04 55 03 e2 7e d5 0a a3 2a | 38 e1 ee e0 a2 7f 56 ba 3e dc 86 f1 a3 6d f0 4d | 52 ba bb 1e 97 ae 75 5d 2c 82 b4 e6 d4 79 e0 32 | 52 cc 28 d9 ea 8b 53 a2 dc 14 d3 22 02 06 5a 89 | 92 c4 13 41 83 c4 64 e9 4c ab fb fe 2b d8 3b e7 | 19 97 67 99 c8 cc 38 fe fd dd 6a ac 4b 3e a4 60 | cb ea 73 88 45 a4 60 2f a9 da 99 e9 bc 21 52 56 | 9e 0a 57 2a a8 8f 00 83 ca de 2c ec 2e 21 e3 03 | 29 00 00 24 a2 77 dc 4f a0 fc 59 33 be 45 2b 9d | d6 90 d3 11 73 91 28 fa 52 9a 31 01 01 35 6b b2 | c2 9a 45 77 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac ee 1f 66 e6 d8 10 e7 e1 61 3e ce | 6a b8 0c f1 92 f2 95 18 00 00 00 1c 00 00 40 05 | 4c ae 03 75 52 09 7f 6a 63 67 68 3c 65 3b 7c 67 | 85 33 51 c7 | libevent_free: release ptr-libevent@0x7fb3640a1080 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | #584 spent 0.0908 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #584 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c018460 | handling event EVENT_RETRANSMIT for parent state #714 | start processing: state #714 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #714 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #714 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #714 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.23244; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.004238 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #714 | libevent_malloc: new ptr-libevent@0x7fb3640a1080 size 128 "road-eastnet-nonat-160" #714: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #714) | 93 98 4a 9e f6 25 19 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de a8 26 1d 46 1f fe 73 77 0b f1 18 a1 80 90 25 | b3 e7 bb 58 9b c2 81 b1 ff 7d b4 22 75 35 d1 db | 95 9e 84 cb 19 62 62 9a 6c 7d d1 72 a1 fe db ee | 7d a2 91 96 e9 9b 41 e3 91 6e fa 9f 40 d9 46 29 | f7 36 a8 4e 69 27 c4 25 e9 34 b9 04 e1 c7 31 18 | 0b 28 87 c1 77 45 e4 46 53 25 13 33 a7 ac 03 53 | c9 3c 72 4e 74 60 e7 39 94 56 62 6d ee b9 d3 02 | 2a 0c 9a 32 f0 7c cb e2 48 4b 2d 51 c1 e5 58 8b | a8 23 c6 2c 51 52 24 80 0d 7d cc 16 3e 31 9e e6 | 71 52 28 2d b4 b4 3b 62 62 b3 21 2f 59 e6 9d 79 | f7 29 e4 95 de 3d 39 1a 26 63 23 12 ff c0 0a 67 | e7 ee f9 dc 2e f8 9f 5e 66 07 d9 34 2c d6 a4 14 | 99 5a 46 67 f6 74 4b 45 d5 08 b5 1e f0 a5 28 bb | ba 71 8c ef 8d 60 fe 98 e8 fa 14 ba 36 d2 6c 68 | 4f b0 d8 bf 4e 35 1f 41 60 59 db 50 3c 98 8a ba | 0e 23 2e 71 e9 de a7 37 01 ea 4e a2 5e 17 dc 44 | 29 00 00 24 6f 09 61 08 e7 d3 02 a4 23 8b ad 3f | 96 41 5b f2 f4 31 31 36 dc f8 65 88 dd f7 ab 3a | d1 d6 75 ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 ff 9b ec fc 4c 87 67 ce 20 05 7e | da 19 49 e3 4c 6c 24 de 00 00 00 1c 00 00 40 05 | b1 01 34 da ed 80 ef f8 48 f4 33 a8 8a cf 0d 3f | 2f b5 1c 31 | libevent_free: release ptr-libevent@0x7fb34005bbe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c018460 | #714 spent 0.0629 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #714 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb384043260 | handling event EVENT_RETRANSMIT for parent state #628 | start processing: state #628 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #628 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #628 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #628 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.23251; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.960366 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c018460 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #628 | libevent_malloc: new ptr-libevent@0x7fb34005bbe0 size 128 "road-eastnet-nonat-144" #628: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #628) | 95 d4 94 96 e1 1d ee 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f a8 7c 62 17 42 5a ce 42 3d 33 10 fe b2 8a 88 | 92 6e 71 d5 06 86 e5 e0 52 42 37 96 48 d9 83 04 | b7 53 69 af a5 e3 7c 5f c2 d6 49 92 b2 ff de 4c | db ed 7f de 57 21 99 44 40 b6 62 ee 10 52 80 d1 | 26 5f f1 59 44 03 5f 7b f9 65 35 c7 ca 59 14 41 | 66 d5 8f 67 2a 79 18 69 6e a9 93 bc a1 d2 56 44 | d5 a9 00 22 f4 be 24 66 17 90 eb 2f 6c 5b e9 e6 | 01 36 c7 01 8d be 88 5c 2e 67 73 6a 1a 0e cd 08 | 4f 7b 9d 2f 56 a8 13 ed e5 f5 79 24 e3 d4 7e ff | 39 52 47 37 cf c9 b9 cf 2b 76 1e 42 6a 40 6c a9 | d2 de bc b5 5e 46 c7 25 f7 aa 04 2e 75 05 36 b0 | fc bb ae 91 9d b4 fd 45 a8 76 c1 47 2f 9f 74 68 | d6 62 93 ed b4 f8 e1 d4 e2 dc 95 99 70 b3 6e 18 | 5d 8d 13 ec c3 76 44 10 13 a4 af e0 0e 36 d3 4d | 5f 8f ac 78 e4 0b 75 55 f3 aa 1e f1 06 83 57 e9 | 0f fa 63 a2 f0 49 65 dc 20 79 d0 e9 01 99 ce 92 | 29 00 00 24 ef 3d 18 f0 17 d1 14 e0 14 e9 24 e7 | 2b c4 61 c2 92 c3 eb 7a 8f 6c 14 1b 08 5d cd 09 | ea ad df c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 2e b7 bf 2f 19 c5 96 59 16 43 08 | f3 7e 3e 9d 86 2f 58 f5 00 00 00 1c 00 00 40 05 | 25 ae 0e 0b 51 c2 48 e1 f1 ba 50 01 f1 19 07 79 | b9 de b0 4d | libevent_free: release ptr-libevent@0x7fb338069f70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384043260 | #628 spent 0.0657 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #628 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c01d710 | handling event EVENT_RETRANSMIT for parent state #596 | start processing: state #596 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #596 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #596 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #596 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.232596; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.958159 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384043260 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #596 | libevent_malloc: new ptr-libevent@0x7fb338069f70 size 128 "road-eastnet-nonat-66" #596: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #596) | bf 80 0e 78 80 27 80 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c 1f ba 68 b5 93 5e 04 79 06 b6 a4 32 e4 68 c6 | 49 40 88 2b 6f 8a c0 9d d9 bc c8 ed 82 28 3c 30 | 4b 6f b2 e3 a8 0d d7 81 63 5c 83 35 fb 65 99 22 | ec b9 c7 f6 a3 1e 0c af 7e 02 44 4c 52 41 61 0c | fe ec b7 48 f0 10 1f 47 9e bc cb f0 0f ec 73 f6 | bf b9 40 d5 39 e3 19 17 5e 22 2d 36 42 33 d5 3a | 1c 03 6f c7 3e d1 3d c3 8f b4 e7 6b 4d ea f9 60 | 41 83 37 ed 6a c3 22 14 77 3f db 39 0c 56 20 64 | 8a 20 ec f2 4b 2b 90 2e 8c 2a 53 89 b4 6a 1f 42 | f3 7e f2 d4 fe 7b 90 df c9 c6 1b 36 f4 b5 4a ce | 0e df 7b 16 66 bc e8 11 d0 0b 0f dc e2 39 28 97 | 4c 94 b9 9e 35 c6 e9 df 5c 0c 47 78 05 93 ac c5 | c4 71 dd af e6 5f df 44 80 d0 10 16 32 6a 91 64 | 98 ef e2 0e ce a7 57 85 68 b2 6e d9 b5 77 88 45 | 6c 4d 65 cf 3b 08 9f b7 f8 9f 35 9c 9d df 1f 59 | e7 b7 04 7d ff 8a de 2a 68 53 fb 71 b7 5d ca 93 | 29 00 00 24 1e d8 84 c9 73 9e cb 5e 05 66 de 35 | 14 40 e8 eb 0f 43 29 df 2b 1e 3c 7f 1a d8 5a b9 | 16 e8 fe 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 33 20 82 d1 8b 7a 7b 4b 2f 8d 5b 47 | cd 08 2a ee bf 4a 9d 5d 00 00 00 1c 00 00 40 05 | 15 0d ca c2 1e 7e 24 48 29 6a 67 0e 8c c8 30 24 | 05 f8 a5 d3 | libevent_free: release ptr-libevent@0x7fb3800598f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c01d710 | #596 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #596 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34401fda0 | handling event EVENT_RETRANSMIT for parent state #531 | start processing: state #531 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #531 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #531 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #531 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.232708; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.93357 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c01d710 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #531 | libevent_malloc: new ptr-libevent@0x7fb3800598f0 size 128 "road-eastnet-nonat-92" #531: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #531) | 46 30 94 4a d2 7d f5 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 38 ea 3c 3d 5a 42 86 1f 4e 31 dc 26 b4 cb f3 | 28 85 08 ca 2d 95 b0 12 2a fa 18 5b b7 00 b1 7c | bd ff a5 7b 29 c2 33 47 c9 ef 86 d0 13 ba b4 66 | 86 47 b1 11 77 85 ec f5 b7 bc b1 c7 50 d2 1f ca | 94 86 67 69 97 69 09 d4 54 be 95 8a aa ec f2 d3 | 79 b9 f0 64 6c cf a3 3a 0e 4f 10 b3 95 d7 ac 93 | 35 e1 6d cf bd f0 36 31 3d 33 d3 c9 48 4d fe d0 | f1 f6 04 1f ec c5 c6 c2 db 2b ec 57 12 79 39 c3 | 5f ad df 37 fa 08 25 42 22 56 51 36 31 ec 60 0f | ac 91 d0 f7 eb 31 60 3a a8 71 8a b0 59 db 4b f5 | 2d 2b f9 1e 60 7c 79 92 10 60 1f 4d 62 ac de 57 | e1 25 69 68 c7 c9 81 de 74 38 95 72 70 59 28 ad | 3f 83 40 72 25 b0 05 47 0c a8 76 76 31 4f d7 5e | 97 3f 8e 62 12 fb f1 8b 94 b6 25 12 87 f7 a7 1d | 64 44 48 fb f6 a4 1d b5 63 08 35 5b 60 e5 2f 9a | 58 b0 a6 c2 fe 47 0b c1 2e a5 79 86 6f de 86 14 | 29 00 00 24 59 be 45 ef 88 7c 4d 7b b5 b9 64 5e | f3 45 90 92 62 65 99 56 86 22 51 1b b2 80 99 5a | ab 91 ed e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 80 99 5e ac e8 cb fd 27 87 08 89 | 9e ad 1b cc fa 6f da 1b 00 00 00 1c 00 00 40 05 | c1 9e 01 05 8a 2a ce 70 93 29 c8 42 f8 2d b1 4a | bb 93 ae c6 | libevent_free: release ptr-libevent@0x7fb34404e800 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34401fda0 | #531 spent 0.0949 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #531 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b05240 | handling event EVENT_RETRANSMIT for parent state #556 | start processing: state #556 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #556 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #556 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #556 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.232818; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.934981 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34401fda0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #556 | libevent_malloc: new ptr-libevent@0x7fb34404e800 size 128 "road-eastnet-nonat-79" #556: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #556) | 7f e0 6f 00 84 26 56 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 15 78 aa 6e e9 58 38 6b 46 1e a0 52 bc 83 d3 | cf 3c 33 de 82 b7 42 a2 2c 21 00 a9 3e 75 eb cd | 10 be b3 c4 82 43 d9 1a af 89 42 df 94 04 7c 60 | 14 3d 7a dd 5f 47 e2 da 24 89 04 06 b4 36 fd d6 | b5 de d2 50 15 a7 a8 36 fa 6f 62 cd 03 73 82 57 | 6a cf 7d e2 0e 29 5a 1b 2a 8a 28 af 96 29 bc 69 | 1a 81 07 d6 ad 61 0f 8a 27 b7 1d 98 f7 93 91 2d | 0d 00 d6 3c 6b ad 6c 9d db ce 11 c2 cc b5 ef e2 | 57 1f 51 2d aa d2 48 9a c3 ef 55 ad d5 6b 90 71 | 43 d7 9d 6a df a5 c6 3e 0b 53 aa ee 23 1e 88 a7 | 88 a5 c2 c5 7d 46 94 a3 b8 f3 c0 22 9f 4e 9c 57 | 20 38 e3 e1 74 97 33 b0 6b 37 ab 55 e4 6b 7f 66 | bc ea 73 65 26 88 f8 d8 07 69 6b 02 07 00 f0 e0 | 04 4e 23 72 d8 dd 96 e9 45 8d c7 f5 0d 29 06 22 | 84 bf e8 45 e1 63 1f c4 d6 f5 dd 33 b2 91 28 59 | 36 36 33 ab a5 81 cd 66 0a 4b 61 b1 5a f0 48 ea | 29 00 00 24 bb f0 c0 c8 4a 3c 83 ba 45 ba d1 f4 | 34 ae de c1 b8 04 dc 84 16 78 e1 c2 d3 f7 29 e4 | 68 26 70 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 84 b1 fb 5f 89 80 45 53 1d b4 39 | 35 8e 65 a4 f5 45 9d 15 00 00 00 1c 00 00 40 05 | 5d 5c c0 4e dd d9 8e 7f 9a e0 e2 3a 80 a4 20 4e | 23 e0 ef b5 | libevent_free: release ptr-libevent@0x7fb3540647c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b05240 | #556 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #556 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46abe780 | handling event EVENT_RETRANSMIT for parent state #591 | start processing: state #591 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #591 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #591 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #591 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.232935; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.959415 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b05240 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #591 | libevent_malloc: new ptr-libevent@0x7fb3540647c0 size 128 "road-eastnet-nonat-4" #591: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #591) | 39 b3 48 76 36 79 c8 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 53 5e 8b 64 b9 d7 96 a2 1b 6a 63 75 d7 45 6e | 48 c4 46 eb 28 75 5e f7 ed 53 29 79 34 d4 d9 29 | 02 a5 32 60 5b ab 4f df 45 bd 95 46 90 03 ef f5 | ac db f4 fa d3 e6 26 09 6f 6a c9 87 25 cf 58 ee | ad d3 59 ca 2b 7a 8d ad c4 25 ee 9e 4f af ad 86 | d1 6a 16 30 39 cf 7c 62 83 49 21 82 42 1d 36 20 | 76 98 ff ea 9a 86 5a 8b 11 66 3a 24 b9 6b 76 c0 | 35 10 36 e5 7e d1 0b bc 77 9c 0f 5a 4b 5b 83 fb | 8a 34 bd 69 b1 83 bc 02 8c 52 8a 7a 9a 37 ff 74 | 9c 9b a2 16 a4 04 bd c3 ce 15 56 fe 49 fe 9a 67 | a2 82 10 83 18 d7 84 55 d8 28 d3 5f e0 e8 98 f9 | 81 4a 40 28 8e ad bb d3 fb 65 1b 2e 9e 89 76 02 | ac ff 53 1c ae 39 56 f6 49 c6 01 53 51 d7 b4 78 | 4c fc d4 a9 d7 40 5e 3d 8b c2 c2 3f be e8 7f 56 | f5 bf 7e 5c e0 2b 2b 15 e0 0b ce 31 42 b4 2e b1 | 10 3a 57 61 53 b6 64 5e 01 7e ec 80 4e b8 dd f6 | 29 00 00 24 7e 65 18 45 e0 bd ae a4 9b b7 1f 7e | 50 e9 89 74 0f 3a fb 42 e4 b1 ea 44 24 bf e7 f2 | 99 e4 e9 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 75 97 23 fe e8 31 c4 e6 0a d5 b5 | 9a 0f 0f 77 98 14 56 07 00 00 00 1c 00 00 40 05 | 51 a7 2c 19 bc 86 01 ef e8 30 63 e0 d2 c5 4d cb | 68 30 7a e4 | libevent_free: release ptr-libevent@0x7fb380080010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe780 | #591 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #591 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36400cc10 | handling event EVENT_RETRANSMIT for parent state #653 | start processing: state #653 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #653 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #653 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #653 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.233058; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.973941 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe780 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #653 | libevent_malloc: new ptr-libevent@0x7fb380080010 size 128 "road-eastnet-nonat-58" #653: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #653) | 19 90 a9 40 6e 35 eb 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc a0 df ea dc 81 2e 85 84 b3 88 d1 54 50 1f b7 | c9 69 78 56 a1 62 6e 3e 83 05 4c c5 0e 7d 43 19 | 8c 06 52 c2 a8 47 39 7d 94 80 f0 24 21 75 9e 6f | 1a c9 4d 5f cb 04 6f 4e 48 25 b0 ee c9 3a 49 af | 9d 29 53 80 25 fe 82 fa ab e2 2f 9c a5 c4 60 41 | 00 8e d7 94 37 d0 f2 cc f3 8f c9 88 17 25 4b 93 | 4f 2c 01 16 89 ef 44 27 0f 7f bd d6 c8 39 c0 0d | 3b 37 3e 31 8d f1 93 95 ef a9 f2 83 75 f5 e9 66 | df 0e 5e 66 f8 be ce 8f 89 2d f8 24 18 90 ca 0e | ca 2a 03 0e df 25 3b 31 01 c2 15 74 75 2a d5 f1 | 83 43 31 31 83 fe 2a 23 9a bf 63 a0 48 cf 76 6d | 70 1e 06 b5 a1 3f ca 5e e8 cf fd 49 e7 27 8b f5 | e3 c3 9b ac 46 ce 1a c3 b0 62 c4 bf 3b 39 e9 ac | 0a 86 26 cd 41 dc 9e 57 6d e5 3f d5 e0 0e 0d 43 | 19 a5 50 e0 89 79 ac da 12 c8 36 b4 26 48 75 fe | 11 60 3a e4 7f 85 fb 66 94 49 d3 0e e3 76 01 2f | 29 00 00 24 54 ec 9e 13 c5 d8 7a ef 3a 76 6b b5 | 4a b4 c9 12 a6 ab f3 2b 6b be 93 f7 34 95 e6 4e | 7f d1 e9 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 79 56 04 65 8f 33 45 00 ea 05 99 | f8 b0 1e db ca 41 9d cc 00 00 00 1c 00 00 40 05 | 8e 15 0a 12 2a bb 30 1b c7 7c 01 c4 0d 46 64 bd | fa 92 a2 23 | libevent_free: release ptr-libevent@0x7fb35c074b80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36400cc10 | #653 spent 0.127 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #653 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36004b8a0 | handling event EVENT_RETRANSMIT for parent state #619 | start processing: state #619 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #619 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #619 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #619 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.233199; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.962006 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36400cc10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #619 | libevent_malloc: new ptr-libevent@0x7fb35c074b80 size 128 "road-eastnet-nonat-164" #619: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #619) | 7c a6 d3 cf 8d e9 6e 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 41 3d c8 48 51 1a bc 89 19 53 5f a4 19 24 c3 | e3 0b 4a e3 0f 42 45 a6 39 c6 57 d2 6b e7 8a 29 | 54 31 b8 5a 5e ca 20 13 3b 27 d0 a6 e9 27 50 18 | 7f 80 b0 08 d7 99 89 6a 2a 77 90 5c 01 59 bf 6e | a3 42 cd 3d fe 3f 1b b7 a2 59 73 50 4f f0 85 2f | 5b 47 ed 6a c9 c2 de c6 e6 4d 9c 06 4e 79 b3 57 | 16 0b 0c 18 cb 8c 87 3a 4d 2d e4 5d 7e 8e 72 e6 | 03 86 34 5a 38 e7 8f f4 c8 0e 9c 94 be d8 f8 e2 | ef 60 76 3a 11 35 bb 0b 5b bc 7b 30 30 31 76 fe | 82 33 53 86 f3 ab 66 6a c5 76 fc cd d7 c6 d4 81 | da 77 52 29 6c 0d 3b 27 bc ea 05 ef 9f 7f 24 4a | f2 92 aa 2c 32 64 ed de 3d 7a 9f 48 52 5c 8e 0a | 28 51 5e 93 76 ff 56 0b b4 30 27 a7 26 fb 55 52 | 34 7e cd 64 5b b0 5f cd 53 2f 69 37 16 38 d2 bb | 78 bd 71 9f 1a ae 46 cb f0 6a df 92 c7 03 31 5c | ec 23 e4 33 34 45 4e 7d 3b 26 49 2a 7a bf d5 47 | 29 00 00 24 f4 58 66 d0 11 c4 59 15 77 69 0a b7 | d7 fe 50 93 e0 8b 0c 95 ba ce 3e 1f df 8f 0d e4 | a9 fd e1 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 99 32 4f a5 1a 27 a5 94 99 e5 8e | 27 77 64 71 58 de 2f 68 00 00 00 1c 00 00 40 05 | 01 59 22 5f d1 0a 35 23 dd e9 14 d7 40 c3 82 b7 | 4e 2a 35 54 | libevent_free: release ptr-libevent@0x7fb360053fb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36004b8a0 | #619 spent 0.0988 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #619 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #530 | start processing: state #530 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #530 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #530 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #530 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.233308; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.933867 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36004b8a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #530 | libevent_malloc: new ptr-libevent@0x7fb360053fb0 size 128 "road-eastnet-nonat-134" #530: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #530) | 92 e6 33 30 14 4d d6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 f1 30 3a 3b 28 18 17 30 1c 4a 89 10 b7 0d c3 | 7c 77 f2 13 78 da 63 f4 44 e1 01 dc 1f 4a 94 bf | c2 80 6b 59 ab e9 1c 0b d6 b1 eb 32 26 25 2f 92 | 24 9c c4 2a f3 1a d1 be fc b2 3a dd e3 83 df 5f | 41 0b ef 7f cf dc 66 d3 2d 40 e2 f2 bf 97 f5 31 | 9d c3 63 d9 ae d6 1d 0e a0 ea 26 58 86 c3 be d7 | f8 23 f3 04 54 70 65 bb 60 ca 54 65 9a 9c 89 dd | 2b 3b 6f 52 f6 af 1c e7 fc fa 5c 10 bf 1c e0 8e | 98 9f 5b b8 7e d8 4b e3 4d b8 53 23 0d 4f e9 5a | 14 9b 09 2a bf c5 d2 2f 85 7d 28 ac 15 60 25 e2 | 2f ad ee 60 6b dd cf 9c 48 62 b3 c3 75 25 11 09 | 05 3c 28 83 a6 04 85 69 35 a5 1f 5d 22 29 dc b1 | 9a 6b d8 6c e7 80 14 0f 8c 50 7a ac f0 96 90 6a | b3 8b e9 96 09 75 da bc 0c 69 50 ec 31 84 cc 57 | 4b 12 f9 f4 53 c3 5b 32 43 24 09 27 86 a6 40 9c | ba 4c ed 2c 66 0e 26 00 3a d7 7f e7 bb e8 f6 4f | 29 00 00 24 56 d6 30 4a 9e 35 4a d9 63 c1 ed ae | ff d3 7c 9d 97 39 2d 62 1c 2b 5e d3 ab 26 78 e3 | 76 c0 40 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 68 96 99 78 c7 b3 b1 f0 d0 44 83 | c6 69 a0 85 3a 91 92 b2 00 00 00 1c 00 00 40 05 | d6 32 b1 7b 23 65 42 ae 2b 55 2e 89 2e ab cb 67 | bf 37 77 de | libevent_free: release ptr-libevent@0x7fb344053f60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #530 spent 0.0983 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #530 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374013710 | handling event EVENT_RETRANSMIT for parent state #576 | start processing: state #576 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #576 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #576 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #576 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.23342; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.943461 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #576 | libevent_malloc: new ptr-libevent@0x7fb344053f60 size 128 "road-eastnet-nonat-100" #576: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #576) | bf 1a 7a 05 9e b9 88 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 6f d2 38 de cc 28 85 5f 41 f2 20 5e 07 0c a2 | f5 9c 80 ff e4 6c b6 4c 70 e2 b8 6a 47 00 73 46 | 8d ba d8 aa 10 38 4b 81 1c 0e 7c 8c 49 18 c5 84 | 17 40 52 e1 d0 c8 ff 2a 4c c5 e2 f4 12 7c df 4c | 72 b8 6e 95 bf f0 54 ad cb e7 72 b2 87 79 19 c5 | 68 98 1d dd 0a f6 a4 d7 0e f0 b6 72 bd 0e dd f4 | 27 a1 d9 12 45 04 fa 90 07 e7 b4 6e 9b f9 be 3b | 8a ae 24 d0 37 a2 53 8e c0 1f 79 b2 4f 1e 64 17 | ea e2 b5 7a 16 8c a0 20 f9 ab 1c da 5d 7f c2 85 | bb fd 14 3c a6 d4 28 dd 60 a4 e5 f5 e6 a1 44 e9 | 3c 8b 4f 83 ea 38 41 29 16 58 25 9c 89 8c 0a a7 | 8c 88 a7 08 b2 d4 73 4c 5c 5f d9 55 aa 40 62 ac | d3 e3 2b a2 04 52 6c e3 f3 4f 50 d4 48 ee 05 9d | 81 ac 23 4e 1e 8c c1 65 13 fb 68 a8 58 3b 92 a5 | 3d 7c 55 6c cc d6 9e 1c 8b 09 aa d0 db 5e 99 f2 | 60 34 f9 74 84 15 60 67 96 e9 e7 3c f3 c2 20 e6 | 29 00 00 24 c2 a9 a3 da 50 4e 4d cf ec 5e 42 2e | d7 97 ed 63 43 1b ac 3c 04 ca 8c 9d 5b af 41 cf | d4 6c f9 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bc 7a c0 1e 2b d3 0d 93 af e2 1e a5 | 35 b0 aa a7 be b0 46 48 00 00 00 1c 00 00 40 05 | e4 10 08 2b 3b dd 58 0c 81 68 da dc e5 0f 44 09 | f0 81 fd 9d | libevent_free: release ptr-libevent@0x7fb33805efb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374013710 | #576 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #576 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370017ea0 | handling event EVENT_RETRANSMIT for parent state #590 | start processing: state #590 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #590 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #590 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #590 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.233538; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.94881 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374013710 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #590 | libevent_malloc: new ptr-libevent@0x7fb33805efb0 size 128 "road-eastnet-nonat-59" #590: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #590) | 6c 7d d5 ab c5 87 8a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be 10 c4 6c 74 1b a2 8f 66 7a 62 d2 25 ec 33 a4 | 70 d7 c3 96 b8 a1 45 8b 02 09 80 a1 f3 7c 96 6a | 39 ed 63 55 b4 78 94 49 5f c4 6b a9 d5 4e f8 12 | 1a ac 4b a8 bc a5 a8 12 11 8f ce fd 6b 3c 86 54 | ca cb fd 2b 06 f6 33 36 41 59 16 8d 82 7a 0b 1a | c7 7f c9 82 7b fe 08 af 9f 61 2b 45 92 6c 6e 24 | a4 18 44 e2 17 55 31 77 5a ca 72 7e 7d 88 37 f5 | 6d c1 ab 86 9d 67 6d ea ef 9d 8e 62 9d 65 20 07 | 45 00 55 47 ac 2c 2b cf 33 ff 98 5d e2 f5 aa c2 | 8a a3 0c 25 db 52 4a f6 b5 28 47 29 53 2c f7 88 | 0d de 80 45 88 5f 79 8d 46 fb 55 a7 94 65 0d 0e | 39 4d a1 ad 42 11 ce f5 0f b0 ea 8b 2c be 25 aa | eb 10 3b 8f 68 f9 5b 76 a8 a8 5d fa 34 25 2f aa | fd 6c 2c 9f ac 68 3a 0f c6 e4 89 2c c2 fb 6d 39 | b5 45 cd 30 f2 bb a2 0c 7b 79 29 25 a0 cb 26 59 | 16 3d f7 87 27 3d d0 80 df c0 94 22 c9 92 e3 72 | 29 00 00 24 aa a1 cb 0a e0 68 cf 8d 79 59 07 9c | 1e fd 67 fc d7 c0 41 c5 19 de f2 e4 bb 83 d9 07 | f2 5b 83 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 a4 46 9e 55 3a a4 f8 b6 3f 64 6c | 2c e2 55 62 44 61 35 d9 00 00 00 1c 00 00 40 05 | 79 b6 13 d4 15 d9 80 92 7b c3 42 98 a7 4d 57 09 | ac cd 9f ec | libevent_free: release ptr-libevent@0x7fb35c085320 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370017ea0 | #590 spent 0.0985 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #590 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a97080 | handling event EVENT_RETRANSMIT for parent state #657 | start processing: state #657 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #657 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #657 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #657 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.233652; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.983941 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370017ea0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #657 | libevent_malloc: new ptr-libevent@0x7fb35c085320 size 128 "road-eastnet-nonat-118" #657: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #657) | bf 48 a9 53 c0 7c 6b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 48 64 7a 76 84 6f 20 71 f2 54 53 61 b4 2f c6 | 54 76 e2 72 67 c3 02 01 5f 84 02 0f de 2d ba 04 | 6b 3c 60 21 8c fd c8 83 d8 de 0a 87 07 82 2c 85 | 16 8f 94 7d 11 fa ef a1 1b 06 7a dc 75 50 fb 5d | 8b a8 18 9b 6c fa 90 67 0b 98 3c ce 23 29 77 3a | 62 14 dc 91 f1 b1 30 3c 50 5a b7 ab a9 84 e0 d2 | ce d6 81 2a 09 a1 f6 27 12 d7 a8 6e 71 b4 d2 a3 | 42 60 96 28 6a 9a 98 b3 00 c1 ce 0e fa 8d 64 99 | 97 f3 81 78 89 04 b5 01 30 ce 7b 3b 03 13 20 ba | f7 13 2c 46 1a 99 04 0c d2 4c 52 fa 53 fc 61 38 | f6 1e 41 8e 82 00 e0 91 48 32 35 c0 7e 73 9a b9 | b3 a3 fd 92 08 58 7d 9d 6f 3a 6b fb 59 79 43 c3 | 78 f1 a6 f1 a4 85 3a d3 46 60 e6 af f5 9f 91 88 | 84 4f 9a 31 88 1a e0 60 7b 5c 36 77 35 25 9a 22 | 0a f3 1b 51 c9 cc 85 ea ce be 58 28 90 39 31 a8 | b5 d3 9f 05 f3 8e b3 99 94 db 0d 61 87 87 60 cd | 29 00 00 24 b1 1a 4e 72 ee 50 9a 55 3a 6a 4a 22 | 5c 8a 27 a4 f8 35 f8 89 7d bb de 47 9d 6c ce cd | de bf 5d e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 93 fd 1a 46 eb 2b 7c e7 8f 20 da | 90 df ff 1b 3f 1b 91 27 00 00 00 1c 00 00 40 05 | 66 8b 83 94 36 8b b6 4c fb 21 d6 7a 66 05 fe c3 | a5 94 ca 7e | libevent_free: release ptr-libevent@0x7fb374080090 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a97080 | #657 spent 0.0935 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #657 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34003f560 | handling event EVENT_RETRANSMIT for parent state #547 | start processing: state #547 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #547 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #547 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #547 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.233745; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.932982 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a97080 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #547 | libevent_malloc: new ptr-libevent@0x7fb374080090 size 128 "road-eastnet-nonat-36" #547: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #547) | 08 a9 69 6a 37 31 fe e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 70 8f 95 a8 08 4a 05 6c b9 8d 6f 47 8b 04 9a 61 | e0 b5 a7 54 d7 f6 b0 b2 80 21 f1 25 51 d7 e7 f1 | 65 c9 25 83 1a 4e 78 02 4c 52 52 f0 64 27 3f 26 | 0b d2 14 48 53 3f 10 9e f7 fb 83 89 e0 a6 40 c0 | ac c1 d7 6a 50 16 4b ff 1f bc c1 ba b9 50 75 ab | 97 f9 e1 ea ad 67 25 02 53 4f ab 12 78 7a b1 65 | e0 48 35 1e 09 a6 85 b6 4d 5c 49 16 55 30 42 5e | b9 f1 50 2c e6 5b 8c 18 8c 57 4a 2f 85 11 d0 01 | 37 16 99 1c 9d 24 6d 7b 69 12 eb a9 3b c6 79 88 | 71 5a fa 14 26 f9 27 29 b3 23 6c 0a 35 18 d6 92 | af 76 48 1f d6 d0 94 16 fe ec 88 6c 8a e8 d2 fa | 63 24 d6 a1 72 8d c8 45 fa 71 9c b6 4e 87 9a f2 | 3d 51 b0 37 f7 2f 94 b2 eb 33 6a 4b b2 e5 fd 10 | 52 ad 99 ac 91 e9 f8 db bf d6 1e e7 93 ff 43 02 | 2f 77 1f d8 af 33 b2 2b c2 3e 9a f3 55 7a 63 95 | 83 04 91 50 3e b6 71 c0 09 49 63 7e 66 a6 12 8b | 29 00 00 24 eb 3c 18 5d 0c ff c1 c1 a4 88 c6 c0 | 90 96 2d a5 6a 9d d3 7b bb 7c 2c 4c e3 35 60 33 | 3d d4 c2 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 02 45 88 78 27 f3 6f f8 1b fc da | 5a fd 16 4d 6d 84 19 70 00 00 00 1c 00 00 40 05 | 9b e7 b7 66 bc 65 25 34 6e 71 75 59 14 69 9b 1b | c0 b2 09 dd | libevent_free: release ptr-libevent@0x7fb340059190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34003f560 | #547 spent 0.0655 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #547 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a8d840 | handling event EVENT_RETRANSMIT for parent state #588 | start processing: state #588 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #588 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #588 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #588 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.233818; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.95296 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34003f560 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #588 | libevent_malloc: new ptr-libevent@0x7fb340059190 size 128 "road-eastnet-nonat-17" #588: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #588) | 07 e4 97 ab 5f cb 91 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 a6 96 6f 8d 19 77 3f 7b 52 64 d1 7d b8 c3 32 | e6 45 b8 da 56 a7 e9 08 27 5a 9f 4a f5 65 0f 19 | 1a 87 9c 5a 04 ac c9 78 c0 7b 31 1c 5e fb 7e dd | 49 05 d6 20 6e 0b 54 2a 9b 3f 4c f3 f9 b9 1c 60 | fd 45 61 e5 98 00 5b 9c 76 47 67 ad ea 1b 21 91 | a4 87 87 e0 87 97 79 8f 69 65 91 fd b9 ec ff c4 | 7c e3 32 4b a0 5f 86 aa a7 fa 0f b5 34 1b 73 49 | 66 c8 24 f8 1f 2b 81 c9 03 bd 50 e2 ed f5 66 6c | dd 1f 49 9e f6 da 33 36 e9 d5 b8 a9 47 7f 93 53 | 01 8d de 29 38 fb bb 0d a3 c7 a3 88 35 89 50 ea | dc 06 47 18 09 d0 b1 af c6 f0 7f 06 49 d3 b7 66 | c7 ef 15 23 12 a8 2e ca 41 93 d6 39 56 e0 00 fc | da 04 e7 a4 d5 e6 05 93 a8 c3 b6 60 a2 5e 1a 5b | a7 0a 03 72 c9 af c9 1d 6d 01 5a c0 73 ce 68 f2 | 8a 78 2b 21 30 c3 39 b1 07 f8 a8 5f eb fd ce 8e | 91 c1 e4 7a 50 88 f7 d6 5f 29 3f 29 95 a0 44 e0 | 29 00 00 24 ca ce e1 5c c7 60 0a 0b 6d 35 6a ab | 7c 6e b2 8f 16 80 da 2b 8c f1 55 28 04 49 6c 0a | 9c 6d 0f 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 70 0f 71 4f aa a8 18 56 c1 cb 65 | 01 88 44 d0 16 19 79 73 00 00 00 1c 00 00 40 05 | 52 d2 00 b1 18 82 fe 4a 49 3d d9 d7 7e 4f 87 22 | fa 52 4b 2c | libevent_free: release ptr-libevent@0x7fb370054000 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8d840 | #588 spent 0.063 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #588 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a61c10 | handling event EVENT_RETRANSMIT for parent state #715 | start processing: state #715 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #715 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #715 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #715 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.233889; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.005381 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8d840 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #715 | libevent_malloc: new ptr-libevent@0x7fb370054000 size 128 "road-eastnet-nonat-169" #715: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #715) | 87 f3 33 9b b4 5a 7a db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 32 d6 a1 b7 3c ef ab ae df c7 c4 47 cf 43 3e | e7 4d 13 2a bf 71 3b 06 70 19 5f 23 cb d2 4a 6c | b7 ad 55 a5 75 a2 bd 13 81 a8 86 77 91 cf 66 64 | 4b df 3a 00 d3 10 2e 7c 50 72 e2 b5 34 23 44 5d | 49 06 3f 61 27 b3 f6 2b 3a 24 b3 2d ad 3e 0b e7 | 98 08 a5 5f e5 eb 5d 79 a1 e5 54 0a c8 0d 72 b0 | bc 43 9d f8 27 f1 a9 ec d6 81 08 b0 58 fa 85 a5 | bd a3 f0 7d 30 fb 04 80 03 dd b7 91 fd d7 85 9b | 8b b8 04 da 0e 45 bc fd bb 40 af 79 c8 eb 61 4d | d1 36 0c 58 d4 5c c1 03 78 d1 4f 99 53 dc 30 3c | 7e 07 1a 87 fb cc 9f e3 42 35 3a 01 7a d8 f6 e1 | 85 49 36 04 18 9c b3 4b 00 44 96 48 ba 1b 91 57 | 4a 52 63 3f 06 c0 7e c7 73 42 05 cf 14 6a 96 99 | ce df 55 13 54 6e 39 b9 b7 60 f2 29 34 ed a0 4f | 37 df c2 18 42 23 f9 6f aa 0b b3 f0 83 72 6b 54 | 39 41 64 39 e0 e8 00 e8 59 63 aa 4c 7c 6e 89 ff | 29 00 00 24 b2 3a 76 ed ee 4c 41 d8 3e b5 c5 39 | 65 e9 8a 6a a3 e0 b7 ad 46 df 99 83 e4 f0 93 01 | c4 aa 3b 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 fe a8 f4 ae 1f 37 b2 cf ca d2 43 | 9d 58 d0 f7 e5 db f0 88 00 00 00 1c 00 00 40 05 | 33 c7 89 bf 1b 04 9e 14 b7 74 ff c8 90 62 35 22 | 26 50 c2 55 | libevent_free: release ptr-libevent@0x7fb37c0596c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61c10 | #715 spent 0.0632 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #715 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c009690 | handling event EVENT_RETRANSMIT for parent state #642 | start processing: state #642 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #642 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #642 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #642 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.233959; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.971009 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61c10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #642 | libevent_malloc: new ptr-libevent@0x7fb37c0596c0 size 128 "road-eastnet-nonat-171" #642: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #642) | 28 8b 51 ce ae 5a 3d 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 37 19 62 25 a0 9e 1e 52 48 66 63 35 92 1d df | c7 ff 13 b7 59 bd f6 95 87 8d 26 d9 c9 e0 f7 24 | 26 42 a2 e4 00 1b 68 a2 f9 e9 ac 5d f5 d7 11 4b | 1e 89 7d 46 ef 06 9a 32 1b e9 81 17 06 39 67 f5 | 0e f6 1a 5a 55 9b 1e a5 dd e1 43 76 e8 a2 58 b1 | 28 a6 3c d6 50 38 49 96 2d 91 42 d7 f8 ec 6a 33 | f4 e0 96 4a 58 58 aa e6 0c 5c 8c cb ab 5c e8 04 | a5 a1 ab 68 96 f3 f4 a5 e4 ae 1a 96 a0 9a f9 57 | 56 09 b6 81 96 72 27 a3 1c 3c 27 45 d5 f1 02 f8 | 2a d7 f9 4c 9f 1a a7 8a 5a f3 e7 da 4d 17 8e ac | 96 16 46 81 fd 01 db ca b6 72 84 a6 d0 d8 4e 69 | c7 79 31 c5 90 b9 16 b2 14 19 41 ef d9 1d 68 fa | 44 38 de 48 65 2c ec 8e 99 27 f7 c6 63 4b 60 bf | 8d 63 04 69 ea 6c 68 38 f9 a4 27 bd 15 c4 ec 7f | 0a d6 93 e5 0b 62 ad e0 de db a0 44 2e ae 03 d3 | 4a 90 aa 55 4e a9 22 5e 90 19 cd ff e2 28 23 a0 | 29 00 00 24 cc 92 78 18 36 9d 5d c6 a8 50 3e 53 | b3 db 47 67 8a c3 3b 19 d4 07 41 62 2d ad 79 2f | c7 c6 9c 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 04 bb 7b 41 fb 94 b6 5a f7 bf c5 | 50 0b eb 35 93 8a 85 4f 00 00 00 1c 00 00 40 05 | c2 0f 22 62 b9 53 47 a9 22 ed 80 06 c6 98 27 8a | 4f 90 48 63 | libevent_free: release ptr-libevent@0x7fb37c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c009690 | #642 spent 0.063 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #642 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c01fda0 | handling event EVENT_RETRANSMIT for parent state #586 | start processing: state #586 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #586 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #586 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #586 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.23403; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.942241 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c009690 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #586 | libevent_malloc: new ptr-libevent@0x7fb37c02a950 size 128 "road-eastnet-nonat-2" #586: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #586) | 9a 3d 1d 73 e3 e0 91 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 56 d8 cc 60 f7 06 cc 59 a5 66 b8 41 54 bb 3e | fb c8 6c 81 84 53 c6 13 31 8d 8e 62 d7 09 63 52 | 53 8c bb 8d d7 5b e6 4c 25 af 80 11 96 28 b9 4c | 79 b0 e7 e5 ff 99 62 bc 0e c5 91 68 49 55 47 3c | b1 82 16 08 70 32 cf 34 71 08 a2 e4 fa 17 46 eb | c6 40 a2 fa ed 5d 93 66 3c 04 eb 85 7b a4 b8 ca | 3b e8 d5 02 43 56 8f ae bb 2c 5c 40 78 bc 5f 3c | 52 09 33 a3 7b de 07 81 a6 e1 d6 fc 15 c9 f3 d7 | 80 69 07 14 f2 fc 95 be ee 94 aa 9e 80 73 7e 72 | 64 ba 5c 65 91 2e 13 ae 0a 47 61 89 10 86 9c 47 | d1 e2 cb 92 ce 45 0b 0e 0f d3 3d f2 1d 9f b0 3e | 82 b2 a9 6f 50 82 ad d6 b3 d9 b3 ea 4d c2 73 14 | 44 b9 ba 13 f3 1d 41 25 5f c2 36 55 c0 ee 19 61 | 63 cd 05 72 43 48 d0 6b e9 0e f6 84 a0 68 e3 e5 | 72 da 0d d0 be 28 62 56 c3 0f 94 93 0b c0 ef 8b | fb 62 f1 5b 0e 46 8d a6 d6 94 eb 9f 3d 88 d0 f3 | 29 00 00 24 38 81 91 15 7b 18 f0 d0 cf fd 70 7f | dd 31 76 38 5b ce 20 2d 80 1f cb 93 2f 1b 36 54 | 69 55 f1 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 17 b2 6d a4 83 a8 67 51 74 0a 4d | bc b9 f3 7f 40 a8 af 25 00 00 00 1c 00 00 40 05 | a2 cc 78 53 7b 53 71 df 77 82 fc 3c 31 48 7e 51 | f3 07 f9 73 | libevent_free: release ptr-libevent@0x7fb38400f680 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c01fda0 | #586 spent 0.116 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #586 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #615 | start processing: state #615 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #615 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #615 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #615 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.234162; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.969844 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c01fda0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #615 | libevent_malloc: new ptr-libevent@0x7fb38400f680 size 128 "road-eastnet-nonat-25" #615: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #615) | 3d 12 6d 03 9d 3a 3f 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f f9 00 4e 05 17 74 a7 73 6c 7a 55 de e3 3f bc | b6 50 d8 da 7f 1d ba 94 53 90 d9 17 e3 56 27 62 | d4 43 27 60 0b a1 f0 f9 c0 27 e9 0b e3 82 e7 85 | 80 6a 81 03 53 c7 b9 23 a3 5a 6b a7 5d 76 6f ac | e9 13 02 5b 79 2d 66 7b ff 5c a6 74 d0 95 c7 c2 | 71 fc d6 11 6a 39 e5 64 21 9e b5 4d 11 be 89 8e | 5d 20 22 f2 57 1a ae e9 d9 48 ed e3 e5 74 a0 a2 | cc fd e4 70 7c a3 dc a0 27 e6 f1 f2 c5 fb f1 1f | 79 67 f9 17 79 f4 c5 25 d5 53 79 6f 85 2b eb a0 | 27 7d 23 ed 74 15 b9 2a 82 05 20 2b bb 1e 36 fe | 50 40 25 d6 98 23 b1 bd c4 a8 9d 60 26 d6 0b 43 | 16 dd 68 58 c3 dd 64 ba de 9f 7e 50 5f 81 e9 94 | aa 7d 9b 9b 86 a9 b2 65 a2 14 57 a5 2e a6 24 6f | 4f 4e 8d fb e6 1b e7 3b 6c 59 92 d8 48 02 79 8d | 9b 5b 3b 8c ae fc 09 50 ce 87 b0 23 2c d7 e5 44 | 3c 8a 3a 64 cd a6 2c 8d 5b ba 46 2d 2c b5 ed 4c | 29 00 00 24 7e 29 69 54 1c 75 9f 10 bb 76 c9 d5 | f4 45 3d a6 cd bc 36 61 89 98 84 20 31 27 44 33 | 6a 69 46 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 49 5e 77 cc 13 4a a8 38 41 6c 23 4b | 5b 37 4e ff 01 d4 b9 94 00 00 00 1c 00 00 40 05 | 52 22 03 e7 9f c3 e4 87 eb 62 51 6b 10 18 8d 12 | 1a 37 2c 77 | libevent_free: release ptr-libevent@0x7fb38007a830 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | #615 spent 0.076 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #615 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b07dc0 | handling event EVENT_RETRANSMIT for parent state #713 | start processing: state #713 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #713 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #713 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #713 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.234247; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003593 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #713 | libevent_malloc: new ptr-libevent@0x7fb38007a830 size 128 "road-eastnet-nonat-207" #713: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #713) | 20 dc 25 60 99 b6 74 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 1a 96 8e da d9 76 91 00 af bb 9d 79 5c a7 f9 | 26 9d cd 16 f2 cf f0 0f dd 87 89 cd 98 91 eb 12 | f7 47 01 49 c9 0c ea 1d 57 4d 8d 91 7e f9 5c 7d | 62 0f af 55 c6 bc 19 04 21 c1 da f5 0d b7 e3 c7 | 41 ab 99 a5 b4 0f 24 bf bd 73 7a 98 7e f2 66 cc | 39 17 ee 34 24 36 ea 24 e3 a8 cd 1c e6 e8 5a 7f | 02 cb 52 c1 dd 90 79 6c 09 65 91 9c 65 f3 ff 96 | 37 cb cc 02 51 48 e0 ea 49 21 16 ff ee ee 96 24 | 7e bc 47 96 21 d4 d4 e3 da f1 b1 67 58 e0 84 dd | cd 55 51 7a 46 9a 9d 6d 24 17 4a d7 b1 02 0a 7c | 2b 10 29 49 15 25 a5 35 a0 5f db 1c 3f d4 d5 d1 | ba 0c e0 43 cb 60 ff 0f 6f 32 b4 f2 ed 61 11 ce | ac 22 75 61 4c 15 28 19 61 92 f0 56 38 fd 6f 8d | 1e 94 22 c4 ed 8e 7c e6 0e 10 58 4f 8b 71 f0 63 | d0 57 19 ab 38 9b 18 02 96 06 c0 6a c4 51 d7 5c | d1 98 c8 9d dc 57 3d 80 8d bf 2e ee 62 b7 a7 01 | 29 00 00 24 44 80 b4 97 28 30 0f ac 4f 85 8e 79 | 66 f6 8c 9d 57 3e 45 8b 53 c5 51 08 e9 85 21 22 | 22 bd a5 bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 16 73 ae ce da d8 0d 5b 76 05 8d | 10 2c 6d 16 83 97 d4 49 00 00 00 1c 00 00 40 05 | 1b 17 49 13 60 8d 27 d3 b4 e3 12 fd 7c ef 9d 70 | 2a 84 34 8f | libevent_free: release ptr-libevent@0x7fb3380856d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b07dc0 | #713 spent 0.0792 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #713 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb344017ea0 | handling event EVENT_RETRANSMIT for parent state #635 | start processing: state #635 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #635 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #635 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #635 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.234345; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.971717 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #635 | libevent_malloc: new ptr-libevent@0x7fb3380856d0 size 128 "road-eastnet-nonat-245" #635: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #635) | 7e 0d 8c df c3 48 2b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 a1 90 94 fd 2b 95 44 1e 0a 6b 25 9f 00 c6 33 | 1e ef f6 4c b7 2f c3 a0 8a 85 0f b9 65 4e fd c3 | 6f 15 46 90 ab 4b 13 e7 e6 d2 34 d9 3f 71 a3 f3 | cd 4c de d4 e9 48 5f 32 4d 9a 30 7d 41 3c f4 79 | 2b e5 fb f0 14 ee 8a ae 09 42 b4 cd 39 a0 45 79 | 5d 03 2c a2 e5 66 e1 29 75 bf 9b 52 cf 30 44 50 | e4 1e ec 62 13 8a 29 5c 79 38 61 1b 99 bb f5 ca | ba a8 ac e5 19 04 33 7f 0c ca 09 aa 4c 3f 3e 06 | 33 f5 34 0d 4c 70 6b 06 18 e0 d0 1f a4 5f d7 bb | 48 ac 37 e5 66 fc 98 e8 57 0b a6 aa d5 88 82 ce | a0 e0 65 8b 7b a6 21 bb 33 66 9d 59 e2 1a 7d a1 | 33 19 a0 59 78 92 a2 99 a5 c2 35 39 ef e5 ee ff | 5f 64 b6 1d 72 92 df 75 1d 12 54 49 29 61 d0 c5 | df da b5 fe 52 67 91 82 3e 1f de bc 3d ae 33 1b | ad 82 07 a5 31 1d 91 23 7e 3c 96 a7 fb 7c 82 d7 | 17 7f 18 90 98 0c 8a 7d 26 5d f5 1b b6 e0 92 52 | 29 00 00 24 e3 02 e0 90 9a bb 82 bf e8 0d 7e 04 | 6c c4 fd f8 c9 9f eb 32 5f c2 f7 1b 33 85 e7 b3 | 07 22 69 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 9c 4d b9 97 4f cd 1b fe 43 15 63 | 13 30 6d 7b 9c bb 08 d9 00 00 00 1c 00 00 40 05 | 77 b2 bc 43 f1 e9 b3 25 e4 85 b2 70 d6 0a 47 cd | b1 cb 75 30 | libevent_free: release ptr-libevent@0x7fb33807a710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344017ea0 | #635 spent 0.0757 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #635 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0a940 | handling event EVENT_RETRANSMIT for parent state #748 | start processing: state #748 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #748 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #748 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #748 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.234415; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.015666 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344017ea0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #748 | libevent_malloc: new ptr-libevent@0x7fb33807a710 size 128 "road-eastnet-nonat-213" #748: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #748) | 55 e3 5f af 64 96 c1 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 49 74 0b 85 d8 7e 22 f4 24 c6 c4 1e 33 2b 72 | de 21 d5 d8 32 fa 23 15 bc cf cc 93 06 5f 8f 3d | 33 17 cb d5 a3 91 ea a4 08 ea 77 c4 ba 4f b2 c8 | 77 bd 77 0a 64 bf c5 2e 63 22 69 74 77 90 c3 c0 | 7a 1b e6 e3 83 ec f7 b8 33 a0 30 ad 02 6a 84 e6 | 8e 7d 03 00 5b 0a 7e 62 09 5c 74 87 75 30 51 f1 | 91 ec f5 7e 8c 61 42 33 40 a2 94 e7 01 8f e2 79 | 76 aa 01 17 97 36 fd 8f 9e ae fe 3a e2 ba f3 af | 94 c5 f1 a9 e6 63 f6 f6 a1 03 7a 65 00 af 54 11 | e5 00 90 3d 36 87 b9 d1 e9 b5 0a ae ab dc ad a9 | 87 ae db d2 e4 c6 98 b6 7b 34 1d a2 a1 16 a3 c1 | 3d 22 9f bf 31 7c 8e 58 98 5c 80 18 f1 bc 29 9b | ab 82 89 c0 f7 55 bb a7 65 83 55 92 1e 57 97 a9 | dd af 8b bb b0 b4 5a 7b 30 5e b0 29 47 2d 2b 9e | 77 6a 4a 54 93 5f 70 12 2d 60 4f 4a 49 09 0e 01 | 86 63 18 ee 62 60 24 64 c2 a1 ed 84 95 08 03 88 | 29 00 00 24 01 dc 8e e5 8a ed 55 ae fd 55 02 d3 | da e9 1f 52 6e 45 d8 c4 f0 34 cf 2c 20 9a e2 e3 | 81 59 db b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 15 26 72 3e 77 b9 07 bc 5d 56 07 | da e3 bb 84 01 39 7d 04 00 00 00 1c 00 00 40 05 | ed b0 75 8e 7f b8 61 e6 fe 70 60 49 2f cb 06 74 | 34 38 55 35 | libevent_free: release ptr-libevent@0x7fb350098a50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0a940 | #748 spent 0.0788 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #748 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c00cfd0 | handling event EVENT_RETRANSMIT for parent state #630 | start processing: state #630 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #630 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #630 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #630 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.234516; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.980147 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0a940 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #630 | libevent_malloc: new ptr-libevent@0x7fb350098a50 size 128 "road-eastnet-nonat-167" #630: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #630) | 7e 20 27 21 e9 84 6e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 6e c1 86 ef 01 ca cb cf d4 54 3a 37 90 3f aa | f9 fd 77 63 7d 3f 32 65 dc 4e 37 40 57 e5 28 ba | bc 68 04 4f 0e 5a 8f d4 7b 6c d8 31 01 31 af 70 | 7b 5e 07 9a cc 86 39 61 db f1 fe 2c 67 ca e6 87 | ee 49 49 c9 ae de 56 6a f7 61 cc 09 1a 0c 64 2d | 8a 63 64 38 db 36 06 2f bf 83 5c 9b 3b 72 ea 77 | 11 54 9f bd 9e 96 60 11 9f 4c 7d 2d 74 85 68 60 | 89 22 b8 8e c9 dc ec 8b d5 1f f0 2e 87 56 1a b3 | 98 52 91 5f b4 c4 5a 2d 4c 8e 2a 9c 04 b4 0f 8f | ba 3a a8 bb 3a 61 d4 4f bd 6e 59 87 ac 42 74 36 | 1d b4 a7 a3 ac b2 f0 31 4d 5c f0 20 80 d9 fb d8 | 99 ed a7 f8 3d aa 61 cd 50 cc 92 53 dc 7d 29 df | 97 52 04 ff 96 9f de 81 2e 64 0e 76 34 9d 05 2a | 60 5d 08 77 dd 6c c0 5f 2b 7a ca 90 dd 00 b8 d0 | df 90 44 71 93 d3 cf 23 7d 74 29 93 b8 60 2e c6 | 85 82 66 37 7d 41 f3 a2 35 e0 e4 2d 9b 02 5f 72 | 29 00 00 24 f5 41 2a 41 21 19 72 0e 4d 58 ec a2 | aa 28 84 44 db 30 74 6c 53 17 b0 90 75 8e b7 a5 | 64 9e f4 ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 7c 2b 60 60 10 f7 1e 72 a5 e3 04 | 6f 3b 05 1e 2d 25 81 27 00 00 00 1c 00 00 40 05 | a3 09 0e 65 34 53 77 41 1c 34 0f 5b 12 a4 a5 f9 | 2c 10 ce dc | libevent_free: release ptr-libevent@0x7fb37807ad70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00cfd0 | #630 spent 0.0909 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #630 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b25c80 | handling event EVENT_RETRANSMIT for parent state #624 | start processing: state #624 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #624 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #624 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #624 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.234603; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.969811 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00cfd0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #624 | libevent_malloc: new ptr-libevent@0x7fb37807ad70 size 128 "road-eastnet-nonat-225" #624: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #624) | 91 66 df b6 23 36 44 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 04 d0 c0 52 11 6f 6b 97 d8 4a 21 40 0d a8 d6 03 | 5a 31 7a b1 43 64 89 6d a3 67 7b 89 c5 fb c9 87 | fa b6 99 9f 95 c8 70 ce 70 b6 63 79 83 53 ee 5c | 03 14 79 98 13 a2 86 e7 a9 ca 4e 70 0d d2 78 f2 | 04 e5 33 3e 6c 0d da 0e d7 7f a3 32 5d 10 72 3a | e8 21 c5 aa 25 ec 61 02 13 d9 f2 57 e5 85 e2 36 | 3b 19 f5 73 53 0e 11 80 95 c9 7a c2 73 f9 c3 f1 | 92 7a e8 68 48 16 47 32 d8 fa a5 eb 40 2c 5c d4 | e0 f8 c0 97 0f 60 4c 10 92 41 16 02 1b e9 aa 47 | 0a fb 2f 7e e8 bd 85 fc 57 ea a3 81 bb 29 8c 27 | 15 9c 41 59 04 b5 17 25 e2 28 cf b9 d5 e4 f1 54 | 7e 08 6e 40 8c 6b e0 01 f0 a2 bc bd 6a de 51 92 | 5d 24 cd 29 bb f6 9e c2 d0 13 ad 94 34 1b 3c cf | ae c6 f3 ce c0 2c c8 d1 85 6b 46 14 ce 28 e2 1f | cf 9f 53 a4 1f 17 48 36 04 1e 5f e3 ed 6a cc 61 | d7 3f 56 7a 05 e3 3d 19 c2 99 b2 48 2d 25 92 b9 | 29 00 00 24 20 57 85 7e 38 82 c6 c2 c2 b9 82 69 | 7e 4b 89 c1 c5 70 2d 62 ae 17 de e7 0b 2c 59 f9 | 31 54 7c 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7c de 77 a1 da 64 49 53 60 59 d3 c7 | 5c d0 d5 e0 d1 18 19 9b 00 00 00 1c 00 00 40 05 | 99 9e a5 9c 48 82 f5 4c 18 c3 dc e9 e9 80 6e 22 | 1b 1d e2 41 | libevent_free: release ptr-libevent@0x7fb350082ad0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c80 | #624 spent 0.077 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #624 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a32290 | handling event EVENT_RETRANSMIT for parent state #529 | start processing: state #529 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #529 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #529 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #529 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.234686; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.93621 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c80 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #529 | libevent_malloc: new ptr-libevent@0x7fb350082ad0 size 128 "road-eastnet-nonat-32" #529: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #529) | 8b 51 05 ec d8 42 82 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa a4 71 e3 1a bf 5d 84 a4 49 8c cf 55 02 33 3c | 04 56 09 91 2c bc e4 1c 1e 8d 8e 04 d2 0a d7 b1 | 4a e5 e2 44 95 fe 32 42 a2 71 e3 f6 19 58 19 98 | 30 f7 7f 68 aa c8 8b 7b ee 46 c1 c6 c6 c6 f3 ef | 02 5b 4f e7 12 67 eb f6 96 9c 29 fe 91 93 f1 4f | 4a f4 35 c4 14 66 ea 0c db 0c 7f 2e 10 1c 74 5a | 14 56 cb 14 d2 be a1 5c fd 36 cb 04 24 8d de d8 | e8 38 48 30 9f 46 ce 30 5d cf 53 56 66 09 d2 14 | 14 e3 57 c9 a7 57 bf b7 68 e9 aa 2c d3 32 00 e1 | b3 c3 fe 68 f4 77 9f 22 ca 38 99 8f 8b f5 3c d3 | 43 f0 50 78 d5 57 6c e0 ba 1d 44 37 ac eb 5f ef | 6f 86 24 97 13 93 3a 5c 56 88 22 5e 44 fb d8 e1 | f7 e8 74 39 ab 08 db ec 08 ca 20 92 ff 5e 35 61 | 70 6f 87 e4 a0 cf fa 53 19 69 e6 fc 3d 79 2a 13 | 8b 67 ba f1 46 d1 18 14 cc d6 68 98 b6 0e 15 62 | 5c 3f 7b 18 fe dd 29 0e 45 5d fb 88 02 b0 e5 a2 | 29 00 00 24 96 36 53 bc 54 1a 72 c2 86 d5 9a b3 | ea b4 b7 ce 95 13 e3 2c 2f ef 60 48 e2 75 18 75 | 80 77 ca 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 7d 2e c4 18 c7 50 d0 0c 64 64 44 | cf 7c 14 d7 db 29 be a1 00 00 00 1c 00 00 40 05 | df 08 4e 94 1c 1e 0f 0d 40 f7 6e 18 f6 44 35 e2 | c7 6d 58 d5 | libevent_free: release ptr-libevent@0x7fb37804bbf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a32290 | #529 spent 0.0789 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #529 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a61bd0 | handling event EVENT_RETRANSMIT for parent state #746 | start processing: state #746 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #746 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #746 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #746 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.234773; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.009279 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a32290 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #746 | libevent_malloc: new ptr-libevent@0x7fb37804bbf0 size 128 "road-eastnet-nonat-241" #746: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #746) | f7 37 f9 ef 73 ab 62 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec d3 29 72 57 bc 83 2e 59 c7 f4 c6 5c 3e da 18 | f6 16 d5 05 b4 32 f8 47 60 e6 d5 e8 a6 7d 89 42 | 82 4a 4c 03 9b 5b e0 5c f4 ec 3b ce 58 3e 0f d7 | 56 dc 82 59 f9 cf 59 04 12 a3 54 12 37 fb d1 ea | 36 9c 13 92 72 99 d6 a7 42 5f 4d 49 ac 8b 2b cd | 32 c7 55 29 46 4d 74 68 cb 5d e1 7e 03 f3 bd 63 | 8b 55 fe bc 55 8f 8b 48 6b 11 21 29 87 1e 76 8a | e2 d8 b8 76 db 47 07 03 9d ab fb c5 6d 10 75 bc | da a7 8f b2 4f 24 eb 9e 43 a2 a3 e4 50 56 93 18 | c4 a1 e9 f8 22 3c a2 54 2e 1c b7 97 b7 4e 3d 26 | 8d f2 a4 30 a8 df 1f 7a 1e 6f f0 e5 f8 33 10 24 | c0 68 75 e5 96 36 ef 47 b0 86 2f 4d cf ea df f8 | 81 cb 73 da 28 a5 cc 66 eb b4 89 33 1e 77 a9 f0 | 20 e5 72 31 64 9b 5f 87 2b 0d c9 49 f4 a8 a7 b2 | db fb d8 02 de 79 32 bf 41 fa e4 fc a6 6d 9e 9c | db 06 92 90 d9 34 01 45 1b 0a 7e 2b a8 ca 95 b4 | 29 00 00 24 e3 e6 84 b9 78 ba 0f 63 d4 48 76 09 | d5 37 c9 85 6c 14 ea c9 21 5e fd 8f e7 46 60 84 | c0 9a 70 f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 43 0b 6f 8b 96 5f 6c af ec fa 55 | 79 2b ca 5d e7 59 20 5c 00 00 00 1c 00 00 40 05 | eb aa 4b a8 95 05 be bc 99 5d 97 8e 1c 2b 9a a4 | 18 3b a4 f4 | libevent_free: release ptr-libevent@0x7fb380093250 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61bd0 | #746 spent 0.065 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #746 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35400f1f0 | handling event EVENT_RETRANSMIT for parent state #604 | start processing: state #604 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #604 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #604 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #604 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.234846; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.957381 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #604 | libevent_malloc: new ptr-libevent@0x7fb380093250 size 128 "road-eastnet-nonat-20" #604: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #604) | 9c 9a a9 b6 8a 18 20 aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 db 14 9f c8 04 2c a7 94 4d c0 41 4e 48 db 16 | 43 7e f5 96 b7 92 19 68 4f 28 dd 93 9c b2 03 ee | 00 e3 3a 70 b5 7f 63 e8 29 5f c1 3e d5 1e 9b 18 | 03 51 46 eb e9 1e 7f 95 79 9d a5 6c e6 38 16 02 | 06 77 87 00 da 11 bf 13 c1 4d 3a 44 84 ac 6b d3 | f7 9d c3 0a 19 49 98 cc af ba f2 e2 42 43 00 0c | 55 a9 00 12 93 95 82 e7 62 10 92 7e b5 54 fd bf | e8 83 82 ec 9d 8a 27 cf cd 74 11 b0 80 50 2e c7 | b3 2a ee 0c ca 12 67 95 57 e8 8f db b1 d7 be ea | dc 1c 36 57 ad 82 d5 d6 b8 ca 9d c1 19 69 b7 98 | 1a b0 e8 89 42 c5 72 7b 2c ac a1 8f 37 62 b4 d5 | d1 07 d7 cf 2b a0 47 98 cd bd cd 39 54 ed 85 7b | e7 4a 46 42 99 3a 84 b2 44 0b 60 db 17 1f 1a 47 | 96 ad e7 df 64 10 90 db 2e 4b b5 22 6e b2 0f d8 | ab 1d 9f cc da 67 78 10 6b ef f0 21 60 7f 46 37 | ce e2 4d 55 5c ce 37 f5 05 f9 20 86 fe 7e f4 34 | 29 00 00 24 b3 5a 22 9d ad 8e aa d7 db 87 b7 86 | 99 f5 d3 0b 6d dc 71 e3 8c 25 ed 59 9c d6 d9 01 | 28 70 17 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 ee b6 7a e3 a9 a6 b5 56 be cc 5f | 53 8f bf c6 c1 49 39 f9 00 00 00 1c 00 00 40 05 | 8b 15 2f 3d 66 90 78 e5 b9 a0 df af d9 66 18 c4 | 1f 04 f3 7c | libevent_free: release ptr-libevent@0x7fb36c08dbf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400f1f0 | #604 spent 0.0637 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #604 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c012bf0 | handling event EVENT_RETRANSMIT for parent state #692 | start processing: state #692 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #692 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #692 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #692 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.234917; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.992235 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400f1f0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #692 | libevent_malloc: new ptr-libevent@0x7fb36c08dbf0 size 128 "road-eastnet-nonat-109" #692: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #692) | cc 18 05 4d c7 59 29 89 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 bc 56 c0 b5 d7 1a 19 67 cf 61 47 cf cf cf 69 | 0c 5a 9f 01 32 78 de 71 f0 74 81 19 ed 71 d9 b7 | 6c 1a 14 67 77 21 31 19 27 f8 20 2e 9b 72 8d e0 | fb c3 78 0b 20 93 f6 09 52 76 69 39 6e ac 7c 06 | 40 27 58 9f 6d bb 6d 84 cb 61 8e 0f d8 d3 36 d2 | ed b2 8a 88 8f 6f f0 1e 1b d7 5a 1c 7d 7e 95 ba | 9a dd 6e 5a bb 30 97 01 78 90 d0 34 e6 bb f7 4a | 36 d6 7a 11 b8 51 c6 68 c3 31 ea af 66 a8 39 16 | 34 04 5f b3 7f 60 a0 eb de 43 b9 ad eb 2c 3a 9e | 0e ac 2d 97 3b 24 b1 8f cc 8a 22 51 8c d9 7c 8f | 5c bd 64 59 9e 2e 51 e2 19 ad d8 1d 4d 34 4c 24 | 22 63 7c ba af a3 27 18 d1 02 9a b0 98 c3 d7 57 | 32 dd b6 b7 23 c1 5f 8d ea 84 1f 15 18 04 2a a7 | 93 9c 7d f3 d9 4e af b7 ec 8d 2d b2 4a 62 49 e5 | 24 51 62 9e 81 79 94 0d 40 f4 e7 84 ba 20 8a 12 | 56 3d 86 3c a8 88 5d 08 d2 a2 6b 92 78 f3 25 d4 | 29 00 00 24 e1 fc f7 b6 dc b1 8e c8 89 6e ca 67 | c4 89 7d 5a 55 53 f0 73 1a cf eb a7 39 4d 69 f9 | f9 7d fe a7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7c 62 99 77 fb 76 f7 56 4f 5d 6c 0a | a8 89 cf ee 73 3a 0b 7a 00 00 00 1c 00 00 40 05 | da 92 6d 9e 8e f1 6a c7 a9 e0 f9 23 03 35 37 00 | ea 8a 41 05 | libevent_free: release ptr-libevent@0x7fb34c053e10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c012bf0 | #692 spent 0.0647 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #692 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38000feb0 | handling event EVENT_RETRANSMIT for parent state #520 | start processing: state #520 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #520 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #520 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #520 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.23499; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.020875 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #520 | libevent_malloc: new ptr-libevent@0x7fb34c053e10 size 128 "road-eastnet-nonat-132" #520: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #520) | ce 20 34 a6 bb f7 7e 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 93 1d d8 d2 b1 be 53 4e eb ed b5 53 68 b9 68 | 3b 90 1c 10 61 78 23 f6 10 87 d8 bd e4 f5 d6 23 | 53 c0 54 e9 4d 15 49 54 f1 a0 df a0 bd 97 7f 49 | f3 26 38 fe d6 f7 64 49 d3 1d 69 61 fb 72 b3 74 | 62 c9 08 94 a1 27 ba fe 91 a4 0d b0 be 34 09 2c | ae 06 17 ab b3 b7 51 c6 26 a5 e8 3e e5 24 f9 a1 | f7 68 74 98 63 fd a8 7c d3 13 6d 90 1f 14 c6 a6 | 04 85 61 e0 a3 c8 02 54 74 60 3f 87 eb 06 83 74 | 5e 85 3d 22 87 46 88 9f d4 fd 35 c2 36 a3 83 41 | ab 57 49 d7 e0 f2 53 56 77 35 4b e3 66 a6 da 67 | 4f 7e dc 81 d0 4e 81 b5 d9 96 e6 10 f9 24 0e 5e | fb e3 82 13 23 20 a1 ed ab 8f 63 39 52 b2 83 84 | b9 61 cb cd 44 7f 65 2d cb 8a 27 c6 61 e2 d1 7f | 39 5c 98 77 3c 0d d7 d7 5b 79 74 66 3f 68 61 be | d1 5d 20 ef 6b 4e 03 30 9a 82 f2 ac 7c ef f0 7d | c4 47 c7 7c c8 eb 96 9e c1 9f ef 3d 93 05 11 e1 | 29 00 00 24 10 75 51 a8 ab dc ad 6d a2 4e 44 8c | c4 29 f6 ed 6d f9 db 56 a8 84 be 4b 75 f6 2d c8 | a0 76 de b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a a7 18 b8 de c7 a0 95 e6 f4 d9 c5 | 62 97 a0 57 23 f3 99 e4 00 00 00 1c 00 00 40 05 | 3d 7c d2 81 56 1c d6 fe cd 6a 43 28 2b 9f a2 6a | e6 22 f1 8c | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000feb0 | #520 spent 0.0643 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #520 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34802a9a0 | handling event EVENT_RETRANSMIT for parent state #731 | start processing: state #731 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #731 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #731 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #731 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.235068; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.005636 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000feb0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #731 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 "road-eastnet-nonat-247" #731: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #731) | eb e9 70 00 69 c5 c4 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 67 4d f9 7f 74 4c 76 c5 7d ce d6 e6 9c c9 6d | b0 c4 70 40 ef 97 97 d2 1c 4e 93 b0 80 9d 3a eb | 37 1f 1d 04 0c ef 30 c3 25 21 ef b9 52 fa f8 25 | f3 a2 cd d3 47 9d 78 9f 8b c4 7e 38 5c 77 0a c5 | d3 21 67 45 0d dd 9e 51 ac e8 fe 88 81 61 87 c2 | bf ec 72 79 20 70 3d b9 9b 4a 0a cc 96 c2 0c 1c | b4 24 87 a5 62 f8 87 c2 7a b5 bf bd b6 53 b6 6d | 19 8f 82 6c 68 5d f7 38 34 94 99 64 71 ca 0c 62 | 25 bd 32 0c 2a f6 57 9c 09 73 ce dd 1e 58 8d ff | 02 8b 34 0a 54 68 de e5 d0 3e d2 74 a9 f6 24 94 | f8 4f 07 60 33 d2 a1 12 0e 69 d9 92 e8 be 55 47 | 9e be 0f a2 43 78 15 07 2a 74 35 28 6a 6d 64 ef | 98 ba 51 d6 01 0e df f1 ec a7 d0 19 a4 37 69 ad | 90 02 2d 4c a7 53 6f b7 ea d5 ab de f2 8a 74 80 | 9a 6e ee d2 0f 75 5b 34 33 20 ef e8 cd 1c f4 fb | 86 77 5a 4b ee a3 d1 6d 3f c5 96 d8 02 ae e5 6b | 29 00 00 24 b0 eb 9d cd b4 1b 6f 55 a3 ba 16 0e | 88 2e d4 ea 77 6f 8c e6 93 bf f5 13 b8 7e f8 74 | 0e 59 6f 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bb fd fb f3 6e e4 ad 3c d3 d9 d4 b4 | 6c e9 ad f0 0d 3a ec db 00 00 00 1c 00 00 40 05 | 69 a1 72 77 b4 3e 53 1b 4f 8c d6 b0 82 44 05 d3 | c0 95 51 82 | libevent_free: release ptr-libevent@0x7fb348077830 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34802a9a0 | #731 spent 0.0776 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #731 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35401d710 | handling event EVENT_RETRANSMIT for parent state #745 | start processing: state #745 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #745 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #745 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #745 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.235154; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.019639 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34802a9a0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #745 | libevent_malloc: new ptr-libevent@0x7fb348077830 size 128 "road-eastnet-nonat-226" #745: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #745) | df ac 39 b5 f9 b7 7d 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e f7 65 df 71 26 c4 3d a2 90 5c a9 e7 88 ce 69 | ff 2d 77 e1 e9 28 b2 ca 63 26 2f 17 f6 30 c1 b6 | 39 b0 8c 45 80 54 3e b8 78 2e 6e fd 9a 2b 2a 52 | ca 74 04 e0 de 83 7f 71 5a 19 b2 89 32 08 35 52 | 70 00 7b 76 28 6d 62 a4 be 64 0c 1f a4 45 57 cd | 11 68 13 12 c1 4b 60 df 43 a5 14 ea bf 55 ed 2b | 18 e3 70 ee 05 77 1b 59 ad 13 96 57 35 f3 b4 6e | 28 41 98 f7 f9 c2 8e d1 b6 81 56 ba 5f 83 59 98 | c7 5b ab 64 6f 96 f4 3e 22 b8 09 cc af c2 0e ab | 6d a3 ec bb 7e 4b c4 f1 95 3e e6 35 d1 ea 5f d2 | 5f 46 72 4a 07 85 6d 10 0c 34 15 0b a2 f3 fd 62 | 45 e0 37 8e b4 eb a6 d9 5e 4a c5 3b b8 de e2 bf | 9c 19 26 ec 20 49 07 de 03 c8 b8 f2 22 8a b0 69 | 7c 4e a6 9f e0 80 50 9a 1a 56 09 a3 d2 31 da 0c | 1d 1c 03 93 e7 49 e4 22 b6 cd b0 39 68 08 3e 18 | 56 e3 51 94 91 4c f4 14 88 bd 84 2f 7c a2 b8 75 | 29 00 00 24 55 ae 14 5e ed e8 27 ac 21 93 fd 63 | 78 8a 19 9d 55 09 8a 50 52 47 37 07 2f ec 25 35 | ae 89 b9 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 71 bd aa 31 18 7e 5b 95 40 b0 64 | 8c 00 c2 4d 9c 60 b6 d8 00 00 00 1c 00 00 40 05 | 96 11 c6 74 b5 44 15 ed 03 ab 9b 4e 68 8e d0 9d | 24 43 c0 9f | libevent_free: release ptr-libevent@0x7fb35c02e960 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35401d710 | #745 spent 0.0788 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #745 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36801fda0 | handling event EVENT_RETRANSMIT for parent state #526 | start processing: state #526 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #526 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #526 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #526 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.235253; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.930004 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35401d710 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #526 | libevent_malloc: new ptr-libevent@0x7fb35c02e960 size 128 "road-eastnet-nonat-131" #526: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #526) | 2c e7 79 4e 69 36 cf 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b a3 00 42 f2 bb 8f 76 46 c4 66 08 4e c7 f9 b2 | df 25 c1 de 9e 12 de 72 b5 7e 4f 9a 95 62 19 89 | ac 68 cc ad 66 f6 b9 57 74 7f cb 29 ce b4 c5 29 | 7e e8 43 36 2e ad 51 7b dd 36 41 60 f4 e5 14 cc | a6 af 4e 6f 65 34 88 da 72 82 77 c2 a2 36 84 91 | 9b 68 22 79 7f 0d ab 26 4a 42 6f 37 90 81 a7 28 | b1 5d 31 ff 90 46 41 d8 33 de 87 0f 27 a2 30 12 | e6 4d fd 6b 9a f7 c2 79 27 45 5a 1e 6d 1e cc 92 | 13 af fa 4d 53 bb da 63 4a cd 41 8d 7f 7c f0 8e | bb 15 d6 24 f8 58 75 56 83 54 56 f5 f0 c8 22 3e | 06 23 4d f1 c1 3a e0 0d 5a 45 9e e2 63 18 d4 90 | a9 01 18 d9 68 d9 7c b7 d6 21 a4 79 fb 61 05 78 | 3b 9e 6f 30 8b 1e 00 d6 c4 b5 8f db ed 31 3f bf | 84 21 ff 60 e0 96 6f e7 8a 57 1c 58 41 5f 92 3e | a0 80 3c 76 7a 2c 33 23 3b cc d3 da c4 62 04 3c | 5a 2e 98 11 59 53 9d 30 e5 65 ae 85 8a f1 f4 19 | 29 00 00 24 58 2a 43 33 ca da 5e cf d0 c4 3e 45 | b3 97 45 72 b2 67 77 d1 d9 13 d7 0d cb 6a de 8c | 71 91 90 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 12 0a 6b bb 38 2d fe 8d fe 15 e3 | 95 3d 21 61 33 d3 f6 a2 00 00 00 1c 00 00 40 05 | 40 e8 e9 9c 13 3c 3e 2b 80 7f e5 4f 1b 81 50 bc | 99 79 e6 40 | libevent_free: release ptr-libevent@0x7fb3680581d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36801fda0 | #526 spent 0.0763 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #526 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c01d710 | handling event EVENT_RETRANSMIT for parent state #737 | start processing: state #737 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #737 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #737 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #737 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.235339; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.010173 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36801fda0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #737 | libevent_malloc: new ptr-libevent@0x7fb3680581d0 size 128 "road-eastnet-nonat-189" #737: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #737) | 62 bc 01 e6 ef 5b 20 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 66 85 a0 b2 da 45 c4 c8 86 e8 bb 58 04 8f 23 | c5 98 b3 86 8c d9 3d e0 66 ea fd 6e 98 4b e0 01 | 77 7e 62 b4 42 d4 3c 39 34 2b 32 9b 48 02 57 f1 | 43 d9 98 13 95 5e 59 11 5e 01 ff c9 1c bf 20 5a | 97 da 26 ae e7 18 db f7 f0 a0 b8 39 fa b2 27 ca | 76 61 93 73 f9 9f 90 66 03 e2 33 bb d1 e7 63 33 | f7 1f 47 9d 66 dd ce 29 e2 ce fc 79 7d e1 df bf | dc 9e e5 af eb e9 5f a2 61 50 44 f7 b3 6f 62 6a | 00 64 f2 03 7d a9 73 95 eb b3 13 a0 cd 38 e6 bc | e6 82 cc 57 4f 84 63 cc 7c 55 1b ca b1 df c8 fb | 40 3b 1d 30 71 fc d6 dd b0 87 15 c1 2d 4f 62 0a | d3 3f bd e6 06 ca 4b 23 74 c6 f0 8a 6c 6c 87 c0 | a3 d6 77 77 fe 47 ed a9 72 bd 08 ac d9 3e 17 96 | 30 05 c0 a7 7a 4d 24 f3 62 68 cf 5a 4b 4a 82 ce | 23 28 f5 14 67 63 ea 32 5f 7d 39 c5 98 d8 43 3b | d9 8b c6 31 05 9d c5 e0 94 47 37 b4 5b 9f 31 c8 | 29 00 00 24 05 60 52 c6 c7 57 70 5a 1b 6b 34 82 | b5 50 99 7f 74 f0 48 4f 7c 17 db cd 98 c0 39 1a | e7 e2 cb 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 ce 96 b7 f8 31 73 c0 a8 ac 4a 38 | e0 6c fe c9 12 67 fe 8f 00 00 00 1c 00 00 40 05 | 2c fb 7f 58 95 5f 54 36 dd 15 01 4b 74 42 c4 35 | a5 03 67 5a | libevent_free: release ptr-libevent@0x7fb378085d30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c01d710 | #737 spent 0.0663 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #737 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3780297c0 | handling event EVENT_RETRANSMIT for parent state #721 | start processing: state #721 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #721 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #721 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #721 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.235413; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.013865 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c01d710 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #721 | libevent_malloc: new ptr-libevent@0x7fb378085d30 size 128 "road-eastnet-nonat-104" #721: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #721) | e2 d2 81 3a 91 66 0b 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 66 4a 11 45 27 41 9e fa 59 58 40 a4 cc e3 66 | a4 14 b6 1a 8d ec 4a 94 ae 30 93 f6 e0 2b 48 5e | a9 86 4c 46 13 47 37 8b 91 48 67 89 bc 13 95 86 | c3 a5 fd 51 f1 60 1a c1 1b ea 4a 3d 68 db 35 cf | b9 d2 24 1d 11 fa f4 f5 69 79 96 a5 67 36 23 c2 | 21 40 a7 85 5c c3 43 86 61 71 35 04 bc b3 26 45 | d5 aa e6 7b c3 47 8d 08 98 e5 21 f1 ac 8e ba f5 | 2f f9 eb fc a2 04 fd 35 92 de 29 dd 6d 2d 53 6e | ab ec 31 fd 91 c3 8a e1 90 85 af 74 f4 e2 93 a0 | ef 1a 10 50 72 25 37 c7 21 d8 7a 5e 58 f6 7c c1 | 2d b3 8b e3 6b e8 be b0 e1 38 1c 05 0b d7 f6 07 | 9c 25 56 1c 46 bf d1 bd c5 df dd d8 33 23 d8 b0 | a2 c8 cb 1c b9 39 f3 85 c7 0b 15 1a 74 ff 55 80 | 1c fa 71 d1 23 f1 d9 e4 a0 14 57 46 33 58 01 33 | 3e 06 c5 79 b4 72 cb 12 6a 21 9a 81 d4 46 48 66 | 8a 9c 2d 86 80 06 17 4f 80 91 2d 38 09 9b 22 b4 | 29 00 00 24 a7 2a 51 43 4f d0 b2 2d b6 00 60 33 | be ce 9f 17 58 67 da 33 8a 89 27 e9 8a 3f 82 9a | 4a 50 3e 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c 9c ed 7b 0b 4f 45 bf 12 47 14 a7 | 35 17 86 4b 30 03 87 f5 00 00 00 1c 00 00 40 05 | 78 3e ba 2e 78 93 3c a4 49 e4 a1 77 52 95 07 b6 | 6d ae 67 c4 | libevent_free: release ptr-libevent@0x7fb384086f10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3780297c0 | #721 spent 0.0633 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #721 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378012bf0 | handling event EVENT_RETRANSMIT for parent state #631 | start processing: state #631 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #631 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #631 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #631 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.235486; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.974526 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3780297c0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #631 | libevent_malloc: new ptr-libevent@0x7fb384086f10 size 128 "road-eastnet-nonat-48" #631: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #631) | 70 a3 fd 1e a8 25 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 0c 38 64 bd 90 75 9f 6f 92 36 c8 32 fc 5a 91 | 19 c5 27 39 9e 3d 6e fa a9 b4 93 c0 e2 21 ae e7 | 29 2b f2 cd be 11 79 2f 14 67 98 68 af ef 6c b7 | 7c 49 d4 d5 6b f2 96 c5 5f cd 62 c1 3d f6 b9 c8 | 3c 3f 90 e5 94 7d 5f d7 40 b5 3b 30 63 b3 2c 20 | e0 19 03 33 6b 20 1a 52 34 8d 2f 82 b2 f4 54 94 | ca 7d 83 fa fa 89 e0 76 73 44 23 d0 5a 21 bf 92 | 84 e4 00 41 6d 4f b4 c3 ae 75 39 7d af 77 49 89 | e4 4d 0f 35 ee 4d e2 83 d4 ca 79 6d 50 9d 01 59 | 1b 0d 7b 00 73 41 5a bc 4e d1 a2 f6 87 77 57 2d | 41 51 9e 57 ae 82 8c bc 6f 74 da 77 3c ec b4 b7 | 0d 67 75 cd a7 d7 60 f9 d7 00 35 db 27 bb fd 96 | 6c aa db a4 7d 91 93 be 0c a1 40 3d 78 2c 3a 66 | 44 36 30 72 dc 94 7a 66 d9 4b 31 54 35 c3 c0 a7 | 65 c4 9e a1 75 e6 4f 67 53 11 26 7b a4 49 c0 3c | 58 30 58 88 dc be 09 5c 40 05 2c 8c 1c a4 88 cc | 29 00 00 24 9b f5 7e 07 2a a5 6a 0a 77 9d e2 3d | f9 27 04 9a c8 ef cd 45 75 cb 40 b5 d2 eb a2 f4 | c0 62 4c 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f 3f 68 59 5a 72 2a af 6d a7 43 82 | b4 f3 5f a0 d9 b1 ec af 00 00 00 1c 00 00 40 05 | 9d 9a 0e 02 a6 46 77 bd aa 5c 25 4f ad 35 3d af | b0 60 dd da | libevent_free: release ptr-libevent@0x7fb38806a670 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378012bf0 | #631 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #631 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb340025210 | handling event EVENT_RETRANSMIT for parent state #669 | start processing: state #669 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #669 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #669 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #669 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.235557; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.98353 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378012bf0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #669 | libevent_malloc: new ptr-libevent@0x7fb38806a670 size 128 "road-eastnet-nonat-180" #669: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #669) | 46 a2 b7 1a 0c fe 64 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e 31 53 7e b2 89 dd d9 14 72 7d 9f c9 13 b2 a7 | 63 19 33 b8 10 a2 fe 59 17 6b 7c b7 37 86 65 b5 | 65 e2 70 cb 0a 7f 2e 78 64 ed 5e 82 f3 0a 01 66 | 19 63 cb 22 32 9a 15 07 e2 8f 9f 13 78 a1 94 38 | 6a 3a a9 9c 68 86 57 44 79 fe f5 47 ce f2 42 04 | 1b 64 29 d4 d9 a8 31 e2 d6 94 ff 12 34 20 67 33 | 3f eb 27 b6 ea 9f 51 b5 31 d7 e4 79 d1 75 2f 2e | 0b e0 61 43 30 7c 1e 88 88 5d ae 34 52 7d 83 d2 | 70 96 22 1a 57 50 af 3c 3f b0 a5 d1 35 bc b2 a5 | 5d a3 98 e3 c3 65 34 bb 25 67 04 de 8f f7 d1 38 | 62 08 6f 4a 4f 97 9e 27 42 a1 3c af a0 71 dc e9 | 88 9c e5 3e 13 70 8a 7a 18 08 7e f5 c7 28 a8 96 | ea c1 cd 65 03 cd 4a 04 4f c8 6b 29 fd ca 51 41 | 35 65 3e 5d 3d d3 fe 1c ec d9 09 50 c2 51 46 0d | d8 9f 47 d1 97 f0 ab 20 09 d6 b0 da 46 e7 a7 26 | 2f 67 cc 15 6a c3 da b4 1c a5 57 88 dc 7d ec 25 | 29 00 00 24 a1 72 a5 b5 61 3e 68 21 f0 1b e4 c9 | 7e f5 3a 1e e4 e5 46 a1 1b 4c 51 eb 2c c7 94 6e | bc 3a ce d6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 dd 73 ee 85 14 4c 35 d3 87 b0 51 | 27 94 ae 1d 74 91 ea ff 00 00 00 1c 00 00 40 05 | 6b 7f 6d de b3 f2 f1 3e 78 85 e6 36 cd 13 84 01 | 5d a6 40 15 | libevent_free: release ptr-libevent@0x7fb378075590 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340025210 | #669 spent 0.0779 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #669 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b25c40 | handling event EVENT_RETRANSMIT for parent state #660 | start processing: state #660 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #660 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #660 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #660 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.235643; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.97748 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340025210 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #660 | libevent_malloc: new ptr-libevent@0x7fb378075590 size 128 "road-eastnet-nonat-158" #660: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #660) | f4 6f 1b dd c3 97 a8 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 37 97 23 37 8b 84 91 b7 d5 21 d4 0b 62 7c cf | df e2 ac 72 2e 0a eb 49 05 1e 0b d1 82 e5 28 a0 | 47 bf aa c5 1d ae 5f 11 86 7c 19 a8 50 7c 93 a7 | 55 26 f6 b4 50 6b 43 66 6c c7 3d c1 5d f4 f7 0a | 0d b0 76 fa d6 23 62 3b 1d 9f 31 fa 3c 7b 58 7d | 20 ee 3b e3 02 2d bf 91 fc fc d4 ac 54 85 8f 34 | bf 3f 83 61 da 9a ff 82 88 23 3a fb 4a 68 00 0e | 90 da 22 07 27 44 0b 38 18 7b fc 7b 8a 26 93 c0 | 1e 09 9d 89 91 4e 14 70 0d 4d 2d 4e ab bc 7f 26 | aa a9 94 f1 34 22 dd 7b 42 4c a3 e0 64 ec 38 19 | e6 3a a1 45 f1 cc d3 8d 48 6c 60 e0 64 aa aa ad | 45 97 98 aa 45 d3 c1 ab 72 70 13 f6 87 f5 77 97 | bb d6 89 10 72 26 9b 74 6d a2 b8 41 cf 4b ed 68 | 80 d1 34 25 2d 5a f2 69 e3 2f e2 d6 b5 73 2b 4f | 8b d7 f9 67 93 34 a8 36 26 8a 04 d9 41 75 a6 2d | c6 bd e6 a0 4a 9b e7 19 bc a9 be 99 5e cb 41 13 | 29 00 00 24 f1 66 b3 02 a5 40 db 5b d9 27 9e 01 | 78 88 6e 9e 88 60 63 b3 32 3e c6 3b 89 b4 92 37 | a6 ee de 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f 7f 7c 35 fb 6c 2b b5 a9 0e ea 70 | a6 e8 51 cd 42 c4 a3 5b 00 00 00 1c 00 00 40 05 | ce 14 69 fa 68 3a 26 bd 8e d9 0e 4d a9 f2 9c 90 | 2d 53 9b 3d | libevent_free: release ptr-libevent@0x7fb350077b10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c40 | #660 spent 0.0783 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #660 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46adc640 | handling event EVENT_RETRANSMIT for parent state #719 | start processing: state #719 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #719 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #719 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #719 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.235729; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.015696 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c40 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #719 | libevent_malloc: new ptr-libevent@0x7fb350077b10 size 128 "road-eastnet-nonat-193" #719: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #719) | a1 e8 20 43 a8 88 d4 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 ab ba d1 12 9a ec ff 2a 8d 05 f1 61 72 fc 12 | 50 d0 8b 0a f5 f8 07 f6 3e bb 96 36 70 dc 69 15 | 19 13 a2 d6 28 22 91 85 b9 c6 ae 40 f1 6f da 62 | 5e 9b e9 42 bc cd 47 a9 39 f2 57 46 62 a2 10 aa | d8 dc 57 a1 b1 b0 e1 a2 6e 21 37 a0 e6 91 53 43 | 3a 39 b3 13 b9 9a a2 2c 1d 20 6a 6b ed 1a b3 d6 | c1 d0 e0 c4 cd b3 32 14 d0 e6 ed 44 76 72 46 07 | d4 18 aa 83 01 f8 a3 38 90 94 a1 fe 3b 59 34 42 | 25 b7 b1 5f cf ed 7b 9e e4 7a 92 07 5e d0 c7 a2 | d0 7e 54 5b 4b f9 50 6a 40 3e 4c 40 b2 5c 33 c4 | 63 a9 26 d0 d8 64 ca 1f 4a 1f e3 d6 1f 89 7f 4f | 6e 5e 19 7f cb da f9 38 d8 39 8e fa f7 bb 35 44 | 19 f4 69 49 42 32 1f e6 a6 69 2b b3 d6 b8 11 37 | 64 4d 1e b3 f2 07 24 9a d3 3f 11 59 ae e5 5b 71 | 8d b9 39 61 c8 17 f2 28 f6 ff e7 6f 1d 64 87 fa | d5 05 27 cd c8 9d a9 d6 a8 55 c4 9b 8a 80 03 48 | 29 00 00 24 35 05 0b 61 81 12 01 a2 56 70 69 a8 | c1 2a 37 d5 7f b9 83 93 56 ce 1a 17 bb 38 92 4e | 85 53 16 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea c6 0c 55 e6 7e 39 b7 3e fa e3 87 | d8 fd e1 5c eb b3 f6 df 00 00 00 1c 00 00 40 05 | ea 71 42 1a 2a 30 c7 3c 78 cb 6c ab 7d ed 04 39 | d2 40 14 db | libevent_free: release ptr-libevent@0x7fb3640ac040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adc640 | #719 spent 0.0636 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #719 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b1c440 | handling event EVENT_RETRANSMIT for parent state #756 | start processing: state #756 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #756 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #756 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #756 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.2358; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.017976 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adc640 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #756 | libevent_malloc: new ptr-libevent@0x7fb3640ac040 size 128 "road-eastnet-nonat-249" #756: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #756) | ab b5 91 0b be 67 d7 85 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 d0 0b f2 10 30 f6 71 1f 52 95 5b e8 84 71 d8 | b6 b3 10 4f b8 55 03 27 62 11 e2 42 15 c0 2e 29 | af 7e 73 a6 41 c3 b1 35 90 96 0e 47 d0 76 07 a9 | 2b cb 96 02 37 a3 ad 49 a7 3f 01 e5 75 c6 65 12 | 57 6e 8d 37 95 0a 16 59 b9 51 41 ba 40 c3 b9 65 | 2a 6f f8 33 e2 59 37 70 46 6d 6b 62 cb b6 f2 1e | c1 f4 5c 3f f2 8a 2e 11 d3 d5 38 3b 01 cd ba 1e | 36 d0 b1 59 ee 21 ba 67 dc 67 7f ac 18 5d ee 64 | df 96 2d b0 3b 2f 42 82 e4 47 da e6 c6 85 9c 6a | 6e b9 1c 9f de fc 80 2c 8f a9 d1 a8 95 91 00 d2 | 9c 44 d3 94 50 87 14 71 86 2d f2 72 6d b8 e3 23 | e7 7f e6 3d 7f 22 68 1c b4 f2 79 c8 40 1e 0d ff | 0d f9 a8 b4 e4 e9 a4 8d 37 24 73 7b 55 05 6d 7d | b4 29 f9 e5 9a b6 d0 4f 47 2d e7 59 1c d4 96 2d | 12 ee 9c 8f dd f2 7b ff 88 08 ab 64 b4 ba 21 15 | 53 99 9f e0 75 15 e2 71 70 09 49 52 bf ef 18 8c | 29 00 00 24 f2 16 4e f4 49 9c 51 e5 b1 12 94 4d | 27 c5 37 4d 3a 23 1c 11 e4 13 5f 53 31 01 4a 86 | 80 54 c9 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 ca 45 b8 db a1 b9 58 c3 06 7b b3 | ca d9 2a 0e 01 f5 5c 0a 00 00 00 1c 00 00 40 05 | b1 fa be f6 27 73 b2 ce c8 1e 50 4f c1 a6 7d 93 | f4 9a a8 7c | libevent_free: release ptr-libevent@0x7fb3580843d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c440 | #756 spent 0.0646 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #756 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #705 | start processing: state #705 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #705 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #705 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #705 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.235873; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.018642 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c440 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #705 | libevent_malloc: new ptr-libevent@0x7fb3580843d0 size 128 "road-eastnet-nonat-219" #705: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #705) | e4 ea d6 a0 2f c9 a3 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 7c c8 42 8f 06 18 fc 5b 92 d1 29 9a b8 7e 41 | f6 a4 31 12 5b 26 92 fd 9f 47 11 64 9e 6f f4 e4 | 12 64 a9 5e 66 b6 e1 58 06 5c 6e a4 d8 cd a0 77 | d4 f2 75 d0 15 29 94 5e 44 f7 e6 25 17 2d ce d5 | b2 ac 28 52 ff 01 37 57 30 3e 89 ab 0b 8f b9 8c | 99 a4 b8 00 95 ca 4d be f0 0c 6f e9 1e 6b 01 06 | 85 ec 86 52 05 73 ad be b1 77 31 d9 4f 2a bd d2 | cb 65 32 9b 1d 91 2b 57 c3 a3 74 9f d6 0f df 80 | 71 49 8c 6a 29 4d 67 17 1a 96 61 69 5f ee 1a 4e | be 5e a4 e5 77 ac 19 89 87 3e 45 49 18 e7 4c fb | bd 46 d7 d5 ca 9c b5 11 06 64 b4 70 c8 30 4d 79 | a1 73 5b 2b 6c be 9e 44 fe 0f 31 6c 40 a6 5b 7c | f7 75 57 62 c5 d6 88 57 3b 7c e0 26 3f e9 11 e8 | e0 a2 3f 0b 6b c6 59 22 42 04 11 16 76 9d a3 7b | 56 7a 4e 9e 2e fe 0a a4 c4 36 99 d2 a5 5b 55 6a | 02 f9 54 cd b4 25 1d 90 44 15 dc 73 12 b3 5f ee | 29 00 00 24 2d 29 13 9f c9 17 1e e2 ce e9 19 17 | 61 b2 63 4d db 33 56 ec 2e 67 9b a1 ab af 70 d6 | 30 e4 5f 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 89 a0 7e 4b fe 45 8e e8 50 f5 c0 09 | 02 48 60 69 27 23 d3 25 00 00 00 1c 00 00 40 05 | 9f 1d 84 c9 70 7f e4 45 24 70 e4 75 c6 bd 55 ca | 26 ec 6e a8 | libevent_free: release ptr-libevent@0x7fb3540906c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #705 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #705 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a52c90 | handling event EVENT_RETRANSMIT for parent state #716 | start processing: state #716 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #716 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #716 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #716 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.235945; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.012756 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #716 | libevent_malloc: new ptr-libevent@0x7fb3540906c0 size 128 "road-eastnet-nonat-205" #716: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #716) | 15 cc 63 e1 75 96 2f 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 dc 43 34 c1 27 75 84 11 ed 21 f4 e0 64 42 f7 | c1 3e 43 b3 2e 58 fc be 1b bc 53 63 f4 17 1c 6e | 5a 45 c6 f0 ee d5 d4 c6 e3 d7 81 ef f2 fc 94 66 | 39 e4 1e d2 9b 3e c7 28 c2 8b bd 93 f2 64 11 f3 | 6d 23 8a cd c0 e1 82 ee 9f 75 ce e2 44 b6 22 97 | b0 c8 8e 1c c2 54 f6 e5 b0 5a 7c be f1 58 3b af | 05 be 31 c0 84 4a ea f9 f1 d6 8f c9 37 52 41 dc | 85 26 42 e2 6b 91 5c 08 46 f5 3a 3f 3e 0c a3 55 | 9a 1f 55 f0 63 1e 9b 9f b7 db 3f a7 92 12 e2 1c | 71 2e e6 9d 0c 47 67 7e f1 af bc 6a f8 c7 1a de | 1b cb c2 40 86 c2 28 a1 ad 88 3e 5e b7 2c dd 98 | a7 93 94 47 b6 7a 9a 3f be ca 7f 22 14 8e 7e 92 | 47 e5 43 10 40 3b 02 34 62 d6 f9 32 a9 14 c7 88 | a6 fc a7 e6 13 8f 48 a9 3c 09 bc 34 a6 f2 66 32 | 93 05 6b 00 f2 c3 6e 0d b4 b4 e6 20 5c 15 86 46 | ac a1 7d 60 75 3b b9 68 18 8d c8 ea 5e c4 4c 21 | 29 00 00 24 50 21 0d 31 fe d3 b4 a7 ac 53 44 3d | ea f7 97 43 73 d7 d9 9e ec bb 48 86 85 79 7b 5b | 1e 65 bb 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 9d 08 f6 6e 7f ce e0 5c 6f 3f b3 | 3b aa bc 8d 53 41 77 8e 00 00 00 1c 00 00 40 05 | 6d 9d 29 89 37 a0 02 51 09 39 ed 22 b1 d6 21 cb | f4 e3 b2 ae | libevent_free: release ptr-libevent@0x7fb388096570 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a52c90 | #716 spent 0.0628 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #716 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #752 | start processing: state #752 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #752 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #752 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #752 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.236017; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.019424 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a52c90 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #752 | libevent_malloc: new ptr-libevent@0x7fb388096570 size 128 "road-eastnet-nonat-231" #752: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #752) | c5 64 20 5b 1c 85 54 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 d0 f3 e7 4a 6a f0 e8 90 5f 06 4d e1 8c 9f 3b | 1d f4 e3 4b 20 0b 8b 74 a8 b1 fe 8c 8a 59 de d1 | 16 28 a6 b3 0f 84 5b 56 83 ac 7e 32 a6 53 36 2a | 6a 2f 6a 43 eb c9 c2 27 18 66 c2 b6 33 15 55 47 | 34 6d a6 80 80 a8 a9 eb 3d 17 c1 00 cf 82 66 7f | 20 cf f6 6a e4 24 60 36 b4 97 22 51 aa 8a e1 03 | 48 19 0c a8 78 59 e1 07 72 7c 6b dd c6 e2 ba a3 | d9 65 69 17 a7 c0 a3 0a 55 b6 e5 ec fe e5 d7 0c | e2 b0 63 ac 57 e2 d2 cf 8d 95 42 f0 b9 eb 11 95 | 06 f4 89 63 1b 69 36 d8 f0 18 5a f6 11 36 49 d2 | 9c 2e b0 3b ce a1 a2 86 6c 95 83 75 36 ba e8 57 | 19 ab ae 24 a8 a8 8b f0 5a 1f 87 f9 4f 41 e2 02 | 07 52 df ae 68 e9 dc e7 08 15 ec 9a 14 88 f5 0d | e5 d1 7e 0b 47 52 22 7c 78 44 6c 0c 9c d0 6e ef | 1c ad c0 bc b6 c3 32 c1 e7 fe 27 7b 2a f8 63 2c | ed 16 23 69 56 c8 a9 55 34 58 cf 3c 9f 37 38 a1 | 29 00 00 24 4a 83 23 c8 a4 30 70 f0 5a 7c 61 66 | 38 1d 39 8c 6e 37 91 1c 03 43 e8 78 33 d5 cf ca | 19 09 4b 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f f8 c0 07 c2 89 1e 18 8b 01 61 d5 | b6 df d9 a8 3f 00 fb ad 00 00 00 1c 00 00 40 05 | 9f 2a cf 58 d8 ce 32 ac 63 1b 6f d8 96 97 22 22 | a5 d1 09 13 | libevent_free: release ptr-libevent@0x7fb360085320 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #752 spent 0.0703 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #752 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c01d970 | handling event EVENT_RETRANSMIT for parent state #755 | start processing: state #755 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #755 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #755 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #755 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.236116; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.019825 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #755 | libevent_malloc: new ptr-libevent@0x7fb360085320 size 128 "road-eastnet-nonat-237" #755: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #755) | 05 2d 15 eb 8d d1 e7 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c e4 18 a4 fb 02 3a d9 56 aa ab 1f 07 98 9a b0 | 2b 63 06 c0 f4 31 d9 71 70 9c 4c 64 b1 c2 38 28 | 6c 15 1d 4f c5 ae a4 a5 43 35 ec 6e d6 ce 63 44 | c3 02 3a ce b9 ea 97 ee 29 7b 54 70 d5 96 ff 7e | 5e 34 ae 91 d7 79 f6 56 f6 05 21 93 eb 09 d6 2b | 31 ea 8c 72 22 32 80 ba 85 c1 fd 23 bc 55 76 a5 | 14 11 5f 1c 43 e7 b2 de 38 fc 2c a4 66 eb c7 d0 | 28 ae 74 a9 31 19 e1 df eb 9a 57 0f 92 b5 24 1b | f9 d6 9a c3 62 89 61 7f a8 28 b7 1b ae 83 62 6a | 52 6a f7 36 ac ba a5 54 22 cb 98 46 53 96 c0 75 | 28 f7 eb 90 7e f6 0c 82 ec ac f4 3f 47 1c 6c fe | 84 02 5a 18 bb f3 1e 67 69 d9 22 9d a1 ce 99 fa | c1 d1 64 9b c8 33 d0 0e 5f bd db 94 28 8e dd 95 | 12 8f 1e 24 1b 4a d0 41 03 fa d3 6e cf f5 c7 5c | e5 af 76 1b 64 bb 0a af 07 04 ed 6b 46 aa c8 6b | 3d 72 51 cb d5 1d a8 b3 e5 d3 ab 98 04 42 49 92 | 29 00 00 24 49 bb cf 23 e0 6f e1 de 61 d1 90 4a | 2d 30 38 2f 6a e7 9f b7 3b 9f e2 b1 72 e4 d8 55 | 05 54 cd 1b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 9d 20 ec 91 b7 c1 7d 70 e8 e6 28 | dd fd cb 82 74 04 84 bf 00 00 00 1c 00 00 40 05 | e9 ae 1f 41 fd b0 e1 3d 82 1f 24 48 4d 65 7b ae | 19 d4 aa 4e | libevent_free: release ptr-libevent@0x7fb35c0b1220 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c01d970 | #755 spent 0.0784 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #755 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a54250 | handling event EVENT_RETRANSMIT for parent state #723 | start processing: state #723 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #723 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #723 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #723 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.236208; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.017754 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c01d970 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #723 | libevent_malloc: new ptr-libevent@0x7fb35c0b1220 size 128 "road-eastnet-nonat-155" #723: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #723) | 36 da f7 c5 2f 91 5f 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 26 74 72 fd 9e 9c 10 9c aa ba 2e c0 be be 66 | 22 9f 1a 62 8a 9f e6 3f e7 37 3b 1b 58 bb b4 f4 | a7 74 cc f5 37 05 fb 5b 1c ba 9d 27 55 34 43 f1 | 74 ee 17 2f 42 15 bc 36 96 52 c7 49 68 f2 24 68 | 76 d0 e6 45 0e e2 22 75 60 cd ee fd b6 75 20 09 | 00 ba 11 5f cb d5 aa dc 11 39 da 45 40 b7 a5 19 | c8 d5 2f 89 aa 7e 26 c1 13 b3 e0 94 56 31 ee 6c | 7c ec 62 9f 9b b7 d8 bb 9c 47 40 55 ef 32 b3 53 | 6c 79 f6 28 33 7a 17 48 72 6f e2 3a 5f f4 48 35 | 73 a1 7e b6 79 10 98 c6 44 1b aa ea e8 c1 36 b9 | f7 bf 2c ce b0 d0 2c 48 3b cd 2b 55 90 e1 5d 20 | f5 96 29 1e ab 81 03 61 9c 1f 05 2b 89 67 64 02 | 4e 7c e5 42 a2 f9 61 f6 dc bf 78 f8 b1 ca 56 69 | f3 d1 e1 49 87 d2 fb ee 1f 6c 89 a1 b4 e9 5e bd | 34 56 05 81 f0 52 8f f2 fb fe 6c 2c 13 77 1c 0f | a7 6d fb a5 f4 8e 00 1f f3 70 1f a1 8a 77 8f 5d | 29 00 00 24 6b 53 2d ae 51 68 5a 25 06 10 41 a9 | 74 bc e4 28 01 83 dc b1 fe c7 47 aa 45 92 94 cc | 73 9f ae 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 9b ca 13 30 40 c0 94 4a 3a 13 b5 | 19 3a 19 0b be 4d 6e 5e 00 00 00 1c 00 00 40 05 | fd 4f 80 57 98 34 ce 28 4d 1c 78 e4 ce 99 f3 3e | f2 93 74 b1 | libevent_free: release ptr-libevent@0x7fb34c06f420 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a54250 | #723 spent 0.0637 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #723 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a47f10 | handling event EVENT_RETRANSMIT for parent state #726 | start processing: state #726 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #726 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #726 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #726 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.236285; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.015424 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a54250 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #726 | libevent_malloc: new ptr-libevent@0x7fb34c06f420 size 128 "road-eastnet-nonat-199" #726: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #726) | 0c d9 0f fe b0 de fb 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba 5a 03 41 cc a5 fd 1a 49 8c 1f 01 a4 d7 6f 42 | 4b 04 b3 65 c6 04 c6 d7 7b 8c 73 c5 64 a3 11 05 | db ca 95 5a c3 b5 81 cc 3c e0 e0 10 f0 ff 7e 0b | ed f4 ad e5 9b 37 9a a2 23 4c 84 01 ff 22 3f 36 | 71 71 f2 27 6b 0d e0 3f f7 18 a7 11 1f 03 8b fc | 68 47 d9 20 6d ba a0 e4 3e 38 1d 24 82 8d dd ed | f0 f3 ff bb 45 10 55 de 96 c4 67 c7 c0 4e b6 ff | ff fa 6c 42 29 12 cb 76 59 82 15 5d 1c 3f 19 0a | 04 84 40 90 fa 20 d9 8c 32 64 bd 98 62 52 e2 03 | bf fb 12 3f 70 5a 23 2e b6 a0 1e da 62 5c 54 65 | 28 94 12 c3 ff c8 58 af b7 92 ff e0 c9 41 fa a6 | f7 68 bf dc c3 be e7 16 3d 20 d2 d0 0c 4d 6b 0f | f1 85 f8 60 c2 47 89 cc 68 3e 26 98 33 a2 77 d0 | d7 d8 d6 c2 eb 37 9e b4 c7 a1 fa b6 a2 06 85 67 | 8a 85 66 84 52 40 0f 08 d5 73 dd 84 59 ba e4 3b | 8d 2f d0 0b 1e 56 e6 0a e8 13 8c bc e0 02 15 0f | 29 00 00 24 5f db 23 af 71 bf 0d 40 27 c3 a7 aa | e9 98 98 31 72 a3 0b fe 84 2c 87 3c 00 39 ba 62 | 98 9c 34 f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 67 ba 9f db 5b 15 ef 4c c9 2a 37 4d | f7 85 c9 a1 4c f4 99 05 00 00 00 1c 00 00 40 05 | 17 ee f7 ed 41 32 9d a2 b1 d3 43 b7 8c 71 7a 66 | 24 14 bd f6 | libevent_free: release ptr-libevent@0x7fb34c074c00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47f10 | #726 spent 0.0625 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #726 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36001d710 | handling event EVENT_RETRANSMIT for parent state #718 | start processing: state #718 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #718 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #718 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #718 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.236361; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 1.003849 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #718 | libevent_malloc: new ptr-libevent@0x7fb34c074c00 size 128 "road-eastnet-nonat-157" #718: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #718) | 0c dd 79 de 47 83 7e 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be 66 36 96 31 e2 42 87 3a ac 4a fd 50 98 37 f0 | 83 90 d2 c2 b6 a0 f8 1a 23 ee b3 73 7e 59 fe f6 | 3c 2e ff a3 b1 53 59 bb 42 87 13 c6 fa 8f f4 66 | 20 b5 0d 75 56 3e 90 ab 48 8b aa 14 da 3c 04 07 | 7e 5f 8e 9b ff 5d 16 9c d6 cf e7 df 30 34 14 81 | fd cb 54 31 0d c6 6e 86 c6 00 5a 1d f1 9f cf 03 | 8e 5c cf 50 18 84 b9 7b 0b 61 d1 97 2f 8f 20 3c | dd 18 b6 4a e3 bc 56 eb 5e b2 56 15 58 ea 88 9f | d5 df 2d 58 7b 95 5a 7d 44 a3 ad 96 a2 23 87 6a | e2 84 31 36 80 e1 af d8 10 51 82 08 4c 66 f2 a3 | ea 9e 5d 00 97 f9 2d 2b a9 f9 ea 4a 6e 06 95 ef | d2 60 f0 da 73 c2 db c1 a6 40 f3 05 1e 08 98 1c | f5 d5 15 f1 7a 89 4d 80 89 c5 9d 2a b9 73 5f 7f | 20 36 51 5a fc bd 7e e1 b7 e9 61 67 fa 61 13 e9 | 12 17 e8 98 3b 6c fb 8a 60 2f e7 0a fd 58 48 e4 | a5 27 43 bf 2f 21 79 fe 28 b0 c2 eb b7 6d 95 45 | 29 00 00 24 89 03 e8 6c ca 23 ce 9e 5d 41 d4 99 | d7 86 12 03 b4 03 11 8f cb d7 3b 25 eb c9 7b e9 | f8 3c 7d e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 7b a6 d5 12 0c 58 96 9f f8 ef 99 | e4 3d a3 f6 b8 7b 36 33 00 00 00 1c 00 00 40 05 | ad 02 ae 2f 73 2c a3 41 68 65 8b 86 be f0 98 4f | f3 0c 27 62 | libevent_free: release ptr-libevent@0x7fb360059710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36001d710 | #718 spent 0.0653 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #718 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c017ea0 | handling event EVENT_RETRANSMIT for parent state #622 | start processing: state #622 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #622 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #622 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #622 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.236441; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.986269 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36001d710 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #622 | libevent_malloc: new ptr-libevent@0x7fb360059710 size 128 "road-eastnet-nonat-61" #622: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #622) | da 49 0a b3 65 ff 08 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 40 36 95 be 60 b3 e3 bd c7 ff 07 f3 83 00 12 | f5 6b 10 33 d3 d9 c4 b0 f6 be da 2b b1 9a 19 58 | 53 f9 8a 25 29 6a 79 82 da bb c2 fa 2c 51 78 6d | 66 2a 05 15 73 a7 b9 3e 1c 83 37 33 e7 f7 71 62 | 0c 9f 57 2f 7a c5 28 95 89 0c 4b d7 6a d0 b7 1b | 21 80 5c 28 7f 9a a4 6d ba 32 aa b8 62 c1 be b9 | 1e 50 93 7f bf 93 50 c9 41 bb 39 b6 d1 bb 95 dd | b2 a0 84 34 30 54 a8 a6 c8 5e f7 42 75 7c 55 3c | 9b ca c8 19 68 29 d0 62 32 30 2c 1d 35 db 78 87 | 06 dd 80 a1 55 b4 92 13 11 a1 52 06 d8 bf c1 d8 | 08 60 a4 8b 01 50 1c e7 e4 f4 33 ec e2 10 21 b6 | 14 e9 ff ce 64 51 80 1d e6 ab 36 5b 4f 73 34 4e | 32 2c 17 88 eb c6 5b 95 51 4b 06 b8 67 86 d4 7f | 6b d4 4d e7 eb 69 82 a6 9b 31 6c fc ae 3a 4b 50 | 0a 0b c3 8d 90 55 90 09 c4 39 73 b7 de f4 8c f8 | 43 4b 1b 65 eb 39 32 5c b3 32 de f7 b4 b6 0d 03 | 29 00 00 24 e8 a4 b1 28 90 aa fa fa 7e c7 b0 2c | 81 71 e5 06 ca 8a b3 bc 3e d2 88 e6 58 e0 15 d7 | 2d 90 46 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 48 cd a5 f1 0b 32 76 b4 1e a7 ed | c8 11 a6 bd 54 4b 50 5e 00 00 00 1c 00 00 40 05 | bc ba d4 87 d8 ff 76 ca 98 8e bd 6e 57 4f 18 d4 | 50 09 94 f7 | libevent_free: release ptr-libevent@0x7fb3700647d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | #622 spent 0.0637 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #622 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #659 | start processing: state #659 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #659 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #659 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #659 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.236518; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.989114 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #659 | libevent_malloc: new ptr-libevent@0x7fb3700647d0 size 128 "road-eastnet-nonat-148" #659: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #659) | 77 e1 0b 63 56 ac c5 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 24 71 32 4c a4 b2 25 64 3e 33 ac e5 69 a3 59 | 28 37 d7 f5 67 fa 3c 10 89 2a be c8 bc b7 80 db | ae ec e3 e9 16 ca 51 c1 06 d1 7f 94 6f c4 fc bb | 73 c6 3b c8 e8 42 d0 17 d5 11 01 02 43 ce 2f 5e | 6b 05 fe bc 5e fe 6a b1 10 03 5d d6 b0 38 f7 55 | ac 53 8c cb fd 56 72 ab 02 ea 39 60 a4 1f 70 3a | 0f 44 00 88 6a 7e 20 c3 de 96 d0 8b cd ee 1a d1 | 97 7f c1 1c 23 b1 90 63 b7 e9 ab ce 37 30 6e f7 | e0 76 ab b8 cd cc 34 16 be e0 9f dc e1 2f 5c 73 | b7 57 ad 53 9d 9f 37 a8 12 a5 aa 69 7e bf 56 b7 | ef 32 86 fd d8 eb 0a 45 48 20 ef 05 c2 fd 7c 50 | 36 ee 5b de 12 13 35 96 43 92 0a 82 37 08 83 d8 | f1 44 bf d3 7f 0b c8 9f 06 3d 6f d2 e8 de f4 63 | 67 09 a1 ab 1e 3e 96 c6 bd 17 50 90 d2 68 7f b0 | 0e ba 2d 2d c6 cc f3 98 8f 85 a9 bf 83 cc 98 34 | a4 13 08 89 fb bd 67 8c b6 a0 6e e2 b4 b0 ff ea | 29 00 00 24 9b 38 e6 b0 44 13 de 09 b0 4f 0f d4 | 9c 32 85 69 0a a7 d3 e0 7e 31 28 18 de 52 8d 12 | f4 2d 68 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 04 29 42 78 19 20 e6 c7 17 a6 a2 | 7a d7 24 ba d8 b1 f2 6e 00 00 00 1c 00 00 40 05 | 4d a2 f4 dc ca 8a e9 4b bc de 2e 89 0d ba cd c5 | 42 51 87 1c | libevent_free: release ptr-libevent@0x7fb384076770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #659 spent 0.0624 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #659 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34000d120 | handling event EVENT_RETRANSMIT for parent state #648 | start processing: state #648 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #648 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #648 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #648 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.236595; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.977816 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #648 | libevent_malloc: new ptr-libevent@0x7fb384076770 size 128 "road-eastnet-nonat-175" #648: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #648) | b9 3d 2a c0 99 78 dc 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 7b a0 b8 ff d9 f3 24 c5 c3 d8 fe 42 9c 4d 77 | 77 a6 2f 14 34 b3 64 24 e9 fd 75 86 48 0e 02 3d | 29 61 ad 94 16 d0 85 d6 e8 56 c2 ef 63 79 8f 41 | 57 5b 33 d0 fc 13 7d 5c da 24 5a b9 25 c8 06 1f | 52 14 77 e7 a4 dc b1 90 16 a1 f9 07 e6 89 42 44 | 14 11 d5 fc e5 92 89 2d 0e 64 88 0c 41 3b 46 99 | d6 26 50 07 c1 0c f4 24 da 69 56 28 7a 00 82 4f | 0c 3a af e9 e7 f5 55 29 53 80 5f 77 a4 ce 23 5d | 9b 10 b0 b2 48 b8 fc ff 0f 47 dc ca e2 38 a1 5a | b6 68 17 c3 f7 a2 7a af f2 60 dd 39 8f cf b9 23 | a2 af 01 98 52 e1 93 81 05 30 fb 55 27 53 74 30 | 4e c5 de 2a e5 a1 62 ce e0 cf e4 81 03 e4 82 30 | b0 0a ce da 25 c7 a9 75 ae 95 0c 31 7d 34 b5 13 | 8d b7 30 4c a2 f5 b0 bd 9f 11 16 f0 69 7c 07 96 | dc 39 0d a1 91 0f 8e 6b bf ba 41 e2 14 8b c7 d0 | 61 8c af 22 83 20 d8 ee a4 27 68 8b 20 f6 53 87 | 29 00 00 24 7f 9a 6e e6 d8 99 8c fa 9e 3a 9d bc | 69 5e e6 c5 2d a1 c8 09 75 1b 7d 75 dd dd b5 32 | 5f 0c 0c 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 5a 6c 36 b7 e3 94 c7 44 df 76 5a | 27 bb 1d a1 14 37 1f 63 00 00 00 1c 00 00 40 05 | cb 53 89 2a 35 01 2c a3 94 35 40 7a f6 29 fc a1 | 5c fa 01 07 | libevent_free: release ptr-libevent@0x7fb34c069bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000d120 | #648 spent 0.0621 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #648 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374009690 | handling event EVENT_RETRANSMIT for parent state #677 | start processing: state #677 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #677 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #677 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #677 keying attempt 1 of 0; retransmit 2 | retransmits: current time 49721.23667; retransmit count 1 exceeds limit? NO; deltatime 1 exceeds limit? NO; monotime 0.987414 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000d120 | inserting event EVENT_RETRANSMIT, timeout in 1 seconds for #677 | libevent_malloc: new ptr-libevent@0x7fb34c069bf0 size 128 "road-eastnet-nonat-103" #677: STATE_PARENT_I1: retransmission; will wait 1 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #677) | 50 8d 95 68 b5 8b 23 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 83 aa a4 8f c6 30 45 92 c5 cf a6 91 01 0a a1 43 | f1 38 e4 4c f2 1e 8b fa c7 cd 9a 24 20 65 ff bf | b9 f0 d7 e8 39 54 34 3b 5f 78 23 e6 41 b2 72 62 | 83 82 8d 5b 8e 9b 83 e0 88 f3 03 08 95 12 34 d3 | 98 d1 ba 80 21 88 79 5e ed 78 64 b4 3e 07 35 23 | 3f b8 8f 43 78 b2 9f 35 5d ad 57 da 20 57 19 f4 | dd 11 96 05 07 92 4e 19 0b bc 45 fd 48 2f 7a 41 | ab d6 c2 78 83 b9 51 5f c2 9d bc 1f 01 00 01 1c | 96 6e 62 37 71 03 98 70 25 42 9f e1 05 cf 75 d2 | 67 9b 63 9b 3f b6 19 96 2f ca 41 d1 e1 b6 6d 22 | 8c cb fe d6 b4 86 8e e1 27 c0 a0 24 76 f2 01 5a | 83 a9 0f 76 b1 07 35 33 4e 3e e0 dc 79 5e ed 29 | 09 64 22 34 77 8d 1f f2 ad 05 7e 1b e5 4c 10 9e | 58 06 f7 85 f5 dd f1 d9 0c cc f6 9f 69 01 27 29 | 70 68 3f aa 7e a2 7d 6e d3 92 55 84 0e e6 71 17 | 1e 78 67 9e 87 bb e2 70 02 96 cb 0b b6 30 ee b4 | 29 00 00 24 00 70 fb 22 7d 0c 48 97 e3 e3 bb dd | b2 69 b0 26 7d 9b cc 69 6d 71 bf ad 98 91 5c 5d | 16 09 bb c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 db ab 8b 76 c6 3a 27 c8 6b 4c e4 | 2b b7 a4 43 65 c8 3b e1 00 00 00 1c 00 00 40 05 | a7 c6 26 92 93 c8 84 fd 1e 45 e2 6d 6b 62 ad e1 | b6 74 b5 46 | libevent_free: release ptr-libevent@0x7fb38008afd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374009690 | #677 spent 0.0637 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #677 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 4c b8 04 68 32 c1 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #704 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #704 | rejected packet: | 23 4c b8 04 68 32 c1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #704: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0451 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 ad 39 62 89 bc a6 af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #701 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #701 | rejected packet: | 68 ad 39 62 89 bc a6 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #701: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.038 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 84 f5 e6 85 81 a8 3f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #609 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #609 | rejected packet: | c5 84 f5 e6 85 81 a8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-138" #609: ERROR: asynchronous network error report on eth0 (192.1.3.138:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0363 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c0 b4 40 a7 90 2d ff 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #733 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #733 | rejected packet: | c0 b4 40 a7 90 2d ff 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 dc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-220" #733: ERROR: asynchronous network error report on eth0 (192.1.3.220:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0351 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 ae e8 62 0b 46 de 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #617 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #617 | rejected packet: | a7 ae e8 62 0b 46 de 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-165" #617: ERROR: asynchronous network error report on eth0 (192.1.3.165:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.036 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 21 4b c7 8f d5 3b 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #559 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #559 | rejected packet: | 14 21 4b c7 8f d5 3b 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #559: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0351 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 6d 7f 89 27 62 b0 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #572 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #572 | rejected packet: | ae 6d 7f 89 27 62 b0 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #572: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0354 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b6 9c 40 58 3d 0c 12 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #637 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #637 | rejected packet: | b6 9c 40 58 3d 0c 12 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #637: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.07 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 0c 73 4d 95 6b fc 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #593 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #593 | rejected packet: | 08 0c 73 4d 95 6b fc 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #593: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0353 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 ef 1a 2f f5 b4 93 7e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #533 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #533 | rejected packet: | f6 ef 1a 2f f5 b4 93 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #533: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 f9 62 21 99 31 60 19 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #655 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #655 | rejected packet: | 11 f9 62 21 99 31 60 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #655: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0358 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 51 51 c2 14 b4 88 86 45 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #616 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #616 | rejected packet: | 51 51 c2 14 b4 88 86 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-42" #616: ERROR: asynchronous network error report on eth0 (192.1.3.42:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0346 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 69 66 b6 0b 09 69 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #605 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #605 | rejected packet: | 7d 69 66 b6 0b 09 69 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #605: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0347 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 ba fb 39 a0 6d aa 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #539 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #539 | rejected packet: | f3 ba fb 39 a0 6d aa 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #539: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0355 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 bb c0 cb 23 86 64 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #532 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #532 | rejected packet: | b2 bb c0 cb 23 86 64 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #532: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 74 43 70 ed 5f 2e 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #632 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #632 | rejected packet: | 4f 74 43 70 ed 5f 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #632: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.035 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b6 c6 04 15 67 ea 52 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #625 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #625 | rejected packet: | b6 c6 04 15 67 ea 52 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #625: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0358 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce a6 92 c0 a0 a1 1c a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #580 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #580 | rejected packet: | ce a6 92 c0 a0 a1 1c a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #580: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0355 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 61 ee e9 29 f9 69 ed 76 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #560 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #560 | rejected packet: | 61 ee e9 29 f9 69 ed 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 15 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-21" #560: ERROR: asynchronous network error report on eth0 (192.1.3.21:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0351 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 69 d8 43 4c ca 0f 15 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #668 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #668 | rejected packet: | 69 d8 43 4c ca 0f 15 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-110" #668: ERROR: asynchronous network error report on eth0 (192.1.3.110:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0357 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 5c 91 a2 a0 c7 d5 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #571 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #571 | rejected packet: | a7 5c 91 a2 a0 c7 d5 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #571: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0351 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba fc 0a 40 dd 57 2f 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #754 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #754 | rejected packet: | ba fc 0a 40 dd 57 2f 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #754: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0354 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 38 86 43 43 f3 e1 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #557 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #557 | rejected packet: | 2d 38 86 43 43 f3 e1 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #557: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0356 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 81 f4 dc 89 2b 8b e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #581 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #581 | rejected packet: | 32 81 f4 dc 89 2b 8b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #581: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0354 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 7f 43 f8 51 c2 59 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #706 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #706 | rejected packet: | d6 7f 43 f8 51 c2 59 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #706: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0351 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7b d9 27 49 fc 2f 27 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #667 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #667 | rejected packet: | 7b d9 27 49 fc 2f 27 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #667: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0358 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 fb 36 71 76 29 5b 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #708 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #708 | rejected packet: | 83 fb 36 71 76 29 5b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #708: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 90 67 40 0b c3 60 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #703 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #703 | rejected packet: | ae 90 67 40 0b c3 60 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #703: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae b9 96 92 13 03 18 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #751 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #751 | rejected packet: | ae b9 96 92 13 03 18 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-244" #751: ERROR: asynchronous network error report on eth0 (192.1.3.244:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0356 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | aa d5 b7 9d 2c 2d ce cd | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #722 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #722 | rejected packet: | aa d5 b7 9d 2c 2d ce cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-179" #722: ERROR: asynchronous network error report on eth0 (192.1.3.179:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.035 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1b 68 e9 bf c7 97 07 a5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #740 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #740 | rejected packet: | 1b 68 e9 bf c7 97 07 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-230" #740: ERROR: asynchronous network error report on eth0 (192.1.3.230:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0346 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 fd bc 41 27 9a 18 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #563 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #563 | rejected packet: | 36 fd bc 41 27 9a 18 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 28 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-40" #563: ERROR: asynchronous network error report on eth0 (192.1.3.40:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0346 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d4 5a 4f 23 43 95 38 c5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #562 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #562 | rejected packet: | d4 5a 4f 23 43 95 38 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 39 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-57" #562: ERROR: asynchronous network error report on eth0 (192.1.3.57:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0348 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a9 9e 25 20 86 2a 5c 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #691 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #691 | rejected packet: | a9 9e 25 20 86 2a 5c 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-191" #691: ERROR: asynchronous network error report on eth0 (192.1.3.191:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0566 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e0 29 5a 0a 61 0a 1e b2 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #685 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #685 | rejected packet: | e0 29 5a 0a 61 0a 1e b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-187" #685: ERROR: asynchronous network error report on eth0 (192.1.3.187:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.048 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 21 46 75 e4 c0 e2 30 47 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #679 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #679 | rejected packet: | 21 46 75 e4 c0 e2 30 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #679: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0398 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 56 db b7 23 55 ce 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #712 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #712 | rejected packet: | cc 56 db b7 23 55 ce 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #712: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.035 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 ff 7d bb ae e4 ff 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #696 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #696 | rejected packet: | a2 ff 7d bb ae e4 ff 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #696: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0353 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b be 7d ad 6e 47 4b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #727 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #727 | rejected packet: | 8b be 7d ad 6e 47 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #727: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0357 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 c3 80 a5 94 99 7d 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #753 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #753 | rejected packet: | 43 c3 80 a5 94 99 7d 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #753: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0347 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be 68 21 bf 92 3b bd 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #656 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #656 | rejected packet: | be 68 21 bf 92 3b bd 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #656: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b6 7b 13 e2 c1 f5 0d 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #621 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #621 | rejected packet: | b6 7b 13 e2 c1 f5 0d 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #621: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0359 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0f ed 5a cf 38 b1 e8 4b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #626 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #626 | rejected packet: | 0f ed 5a cf 38 b1 e8 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #626: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0351 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 73 d4 45 41 ab fb 7a 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #638 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #638 | rejected packet: | 73 d4 45 41 ab fb 7a 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #638: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.038 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 de 2b d7 45 9f 26 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #644 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #644 | rejected packet: | 50 de 2b d7 45 9f 26 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #644: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0581 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 10 9e 23 ac da 71 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #670 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #670 | rejected packet: | 8a 10 9e 23 ac da 71 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #670: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.054 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a9 15 25 50 c3 89 9b ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #647 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #647 | rejected packet: | a9 15 25 50 c3 89 9b ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #647: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0567 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 33 64 e2 99 22 09 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #650 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #650 | rejected packet: | 26 33 64 e2 99 22 09 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #650: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0561 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 13 d7 c6 41 b2 86 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #612 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #612 | rejected packet: | 06 13 d7 c6 41 b2 86 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #612: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0455 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b6 55 6c 1f f7 96 4e 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #649 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #649 | rejected packet: | b6 55 6c 1f f7 96 4e 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #649: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0352 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 64 20 5b 1c 85 54 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #752 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #752 | rejected packet: | c5 64 20 5b 1c 85 54 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #752: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0534 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 05 2d 15 eb 8d d1 e7 6e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #755 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #755 | rejected packet: | 05 2d 15 eb 8d d1 e7 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ed 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-237" #755: ERROR: asynchronous network error report on eth0 (192.1.3.237:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0352 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 da f7 c5 2f 91 5f 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #723 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #723 | rejected packet: | 36 da f7 c5 2f 91 5f 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #723: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0352 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0c d9 0f fe b0 de fb 42 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #726 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #726 | rejected packet: | 0c d9 0f fe b0 de fb 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-199" #726: ERROR: asynchronous network error report on eth0 (192.1.3.199:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0372 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0c dd 79 de 47 83 7e 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #718 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #718 | rejected packet: | 0c dd 79 de 47 83 7e 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-157" #718: ERROR: asynchronous network error report on eth0 (192.1.3.157:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.035 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 49 0a b3 65 ff 08 28 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #622 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #622 | rejected packet: | da 49 0a b3 65 ff 08 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-61" #622: ERROR: asynchronous network error report on eth0 (192.1.3.61:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0388 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 e1 0b 63 56 ac c5 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #659 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #659 | rejected packet: | 77 e1 0b 63 56 ac c5 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #659: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0487 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 3d 2a c0 99 78 dc 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #648 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #648 | rejected packet: | b9 3d 2a c0 99 78 dc 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #648: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0341 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 8d 95 68 b5 8b 23 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #677 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #677 | rejected packet: | 50 8d 95 68 b5 8b 23 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #677: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0344 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb34c046090 | handling event EVENT_RETRANSMIT for parent state #509 | start processing: state #509 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #509 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #509 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #509 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.031151; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.834287 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374009690 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #509 | libevent_malloc: new ptr-libevent@0x7fb38008afd0 size 128 "road-eastnet-nonat-236" #509: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #509) | 95 a6 50 d0 80 0f 96 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 f6 dc 59 0f c4 05 31 27 1c e1 59 91 71 4f 77 | d2 6f b2 3c 4c 42 2c 05 31 c6 b9 01 b3 f9 33 cf | 31 3e d8 f2 50 a2 40 4c 26 af b9 c4 f6 6b 9c a0 | c3 09 f4 3f 7a cc f4 7f ca 62 75 a2 51 f3 85 34 | ba 40 18 72 c0 75 cb 27 ef ac 5f 7a 01 de 2e 52 | 48 88 8c 60 ad e7 5b 44 6c 1a e8 d5 6f 53 11 23 | 95 be a5 14 60 2b e4 59 8a 11 d1 b5 ed 47 f8 3f | 6d e0 61 51 79 49 84 03 99 39 af e7 46 a2 96 23 | 10 c9 ad ec 42 e4 52 ee d8 32 7d ed 3a d7 ff 92 | 1f 6f 0f 74 38 79 01 20 fa 36 e9 f1 09 08 9c 1e | 99 ae 11 ce d8 88 97 aa 9e 87 73 fa fc 1c f1 a5 | 50 45 69 bc f8 32 ab 8a a5 aa 99 3b 14 59 27 93 | aa af d8 7a 15 d5 3f 8b e4 e9 93 e5 f3 54 80 be | f8 1e 00 2e ce b6 01 59 ea 14 bb 0f 04 fa 53 df | 7b f6 52 1a 74 66 fb 6f ec f5 da 2e 36 05 f8 e1 | f8 ef 5f a4 a1 a4 e5 27 c9 45 68 7f 7b 01 52 89 | 29 00 00 24 9d 39 90 d5 1d b9 a1 ff 3d e2 2c 36 | 93 f3 ac d0 34 e1 bb 65 c7 36 8d 9f be 5b 52 2e | e0 af cd 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b a0 6c aa ff 54 d0 e4 33 5d be 4b | d4 00 1f 61 d7 8c b7 eb 00 00 00 1c 00 00 40 05 | b0 ac c8 3e be 16 32 44 b0 93 80 f1 03 a4 ee b2 | e2 ca 64 08 | libevent_free: release ptr-libevent@0x7fb34c04e700 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c046090 | #509 spent 0.177 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #509 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b16d90 | handling event EVENT_RETRANSMIT for parent state #515 | start processing: state #515 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #515 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #515 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #515 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.031347; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.830528 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c046090 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #515 | libevent_malloc: new ptr-libevent@0x7fb34c04e700 size 128 "road-eastnet-nonat-75" #515: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #515) | 1e 61 5a f6 8c 22 37 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 55 92 be 2b 5b 80 8f b3 a9 1d 29 a3 45 24 2c | b4 ac 16 b3 45 0f 47 41 ac 8c 89 bd 1e 8f b0 6e | 42 15 11 69 75 f6 d4 99 d3 aa cd 74 fa 86 b1 c5 | 68 d3 c8 15 10 54 b4 74 c1 a4 2b 24 6f c9 a9 9d | 25 6f 22 a2 ef 15 14 08 3b 15 a7 b9 a7 91 72 1b | 0d fc 51 4a 02 7d 07 e4 28 58 0f 09 52 04 38 5f | 70 3e 01 b9 6d 46 32 8a d3 fa e2 05 3c 1f 29 4c | 83 37 17 b1 56 48 32 71 51 18 9d f3 b3 04 79 ad | 90 59 7d 48 55 a3 92 46 ac 7d 26 6d f7 b5 44 87 | b8 ea 9c e5 b0 56 03 2c 9a 01 84 d5 30 98 07 7a | d5 ed 5c 95 9f a1 e3 64 9d 5d 5d c1 2f ee f3 c2 | 45 c0 b5 58 7b 2b 68 4d 06 07 76 b2 f3 82 a0 63 | 45 0a 18 70 71 12 a7 f5 1b f4 8c e5 99 58 7a ae | 71 6e 12 6f 9a 9e 61 a0 c1 a0 67 87 58 b1 e2 09 | f3 f3 93 cd 56 48 cd 0d 03 13 c0 9c db 17 5d 35 | 5e 83 5d 90 8d cf 6f 5f 1d 20 58 52 4c 16 b9 f8 | 29 00 00 24 8d d0 d4 e1 35 48 fc d6 75 32 21 71 | b5 c7 25 57 c3 f1 b1 56 20 08 bd ee ec 1b e0 d1 | 78 47 18 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9a 1a 58 76 c4 ef c7 77 69 86 ed 89 | 8f 43 91 04 1b c3 f4 fd 00 00 00 1c 00 00 40 05 | d2 95 59 dd 21 aa 4e e6 79 3e 78 3f 39 e9 b6 1e | 64 75 99 59 | libevent_free: release ptr-libevent@0x7fb368035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b16d90 | #515 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #515 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3880319a0 | handling event EVENT_RETRANSMIT for parent state #511 | start processing: state #511 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #511 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #511 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #511 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.031482; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.825984 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b16d90 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #511 | libevent_malloc: new ptr-libevent@0x7fb368035930 size 128 "road-eastnet-nonat-88" #511: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #511) | d0 cd fa e1 13 2d 20 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 50 62 2d 29 93 99 de 0e af 50 23 34 5f ad fb | 4c bf da 43 26 a3 47 17 44 42 44 91 b3 08 e0 52 | 9a 2e 33 64 a4 26 28 05 d5 00 de d9 4e 66 1b ab | 5a 6d 0e b8 94 3f 64 cb a8 67 5b 93 62 e2 29 49 | 15 ef 3f fd 0a ac 35 c6 4e 73 10 ab 4f 5d 53 8e | a4 cf e0 a6 67 4d ad 8c d1 a8 5a 9c 43 ba 9d a7 | 4c 51 1b 30 43 59 5b 25 95 48 42 6a b3 83 84 db | 91 da 84 92 79 2e e8 75 a7 77 e4 4c 0a eb 8f 66 | 34 40 55 c8 da e8 1b 72 62 30 64 22 19 0b c5 6f | bb 93 c9 c9 9e c1 e2 88 ad 0f 56 0d bb 0a ec ad | e2 01 a6 b4 88 92 57 a6 85 c2 08 b0 1f 07 9c 06 | 45 a6 f9 c7 63 ad b8 14 32 f1 4e 6c 2f f3 fa c4 | 52 99 fc 99 df 29 80 f9 cd af e8 d8 51 1d ea fc | 37 40 3b 2e 41 2d 1b 80 95 af 27 c3 07 65 8b a6 | 12 f6 45 c0 ec 6c f8 a8 51 0a 31 05 6c 78 0a ed | bf 1c 18 f5 61 de 1f a7 51 bb 0d 25 18 af fc 72 | 29 00 00 24 b3 7b 7f 54 09 ea 11 14 a2 54 1c f4 | ef 5a 78 e7 f0 13 91 b1 46 b7 6f f0 4f 4f 95 a6 | 39 1b 25 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e ea 0c f9 37 0c 35 90 90 78 51 37 | 77 43 20 7b e3 6c 0c 23 00 00 00 1c 00 00 40 05 | 2b 3e 6c 54 b9 12 19 37 d1 cc e2 3a 04 74 55 d1 | 46 7f d5 af | libevent_free: release ptr-libevent@0x7fb38804efb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3880319a0 | #511 spent 0.105 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #511 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb380009ed0 | handling event EVENT_RETRANSMIT for parent state #528 | start processing: state #528 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #528 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #528 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #528 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.031607; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.834403 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3880319a0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #528 | libevent_malloc: new ptr-libevent@0x7fb38804efb0 size 128 "road-eastnet-nonat-99" #528: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #528) | 53 19 92 95 ca 61 53 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 e5 c7 b3 7c 8d 99 d1 d7 29 a2 10 c1 b7 06 0c | 17 e9 49 3c 4a c0 5b bd 73 b3 61 f0 c5 97 1a c7 | 76 63 76 36 e9 7a 65 e8 6a 3f 9b a2 34 22 f6 b4 | 6a 88 a8 f8 7f 41 d3 72 9f 5a 88 ca 6b 48 aa 0d | 9f bb 2e af b7 64 43 c0 5f 21 ab ad ca 4c c4 bd | 11 a7 3a 9f 89 1f e1 4e cc b3 7c 12 a4 19 cf 86 | c6 87 c1 d0 2a 94 8b 9d e9 35 39 07 a6 9c a3 ed | a8 ce d3 e4 53 a5 82 df 4f 1f e0 bc b2 92 cb c6 | 39 04 f1 75 75 72 f5 1c aa 6f d5 6e 3c f8 04 ed | 37 5d a6 8b b9 ef fe 51 d8 f6 f3 f2 4d a5 ca 6d | 2e b0 a4 75 6d ce 0d 14 13 47 fc 6e 77 45 1a 17 | c4 a3 61 af 3a a4 0b d3 f5 57 8f f2 6f 78 70 d1 | c2 a7 16 f6 5c 3a 00 46 05 30 36 7f b8 3f 18 36 | 35 33 11 0a 75 c5 6f f6 65 a7 05 28 7c e1 b9 fd | 51 6f f2 9e cd 9f 64 c9 9d fe 9b c7 f0 06 55 5a | bb ef dc 4c be 29 e4 94 b5 10 3f 65 5d 8b 1c e0 | 29 00 00 24 46 b5 f0 72 e3 2a 70 ff f4 67 d5 b0 | a0 ba f1 3f 75 bf 45 d4 30 d2 c3 b1 ff a8 07 cc | a0 44 98 ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 19 8a cb f1 5b 38 5c d3 a5 bc 6a | dc b7 35 41 12 44 0c ab 00 00 00 1c 00 00 40 05 | e6 3e dd 6e 01 07 35 ad c6 0c f8 90 bb 33 8c f2 | 78 f1 d6 dc | libevent_free: release ptr-libevent@0x7fb3800223c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380009ed0 | #528 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #528 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388020d10 | handling event EVENT_RETRANSMIT for parent state #505 | start processing: state #505 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #505 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #505 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #505 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.03173; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.823838 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380009ed0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #505 | libevent_malloc: new ptr-libevent@0x7fb3800223c0 size 128 "road-eastnet-nonat-252" #505: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #505) | d5 d2 7d 3c 00 e8 ff 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 f3 9e b0 6a 35 4f e1 47 8d 4d 6e 1c 28 4b 2e | f7 69 42 28 c7 ef 26 c5 4e 61 c9 92 6c ab 1f 19 | f8 92 ce 52 74 4a c5 9f 21 f2 3d 66 b1 02 14 a1 | 73 db a1 79 9a e8 39 8a fc 66 2f 00 d5 5a 95 c5 | 48 d0 9c 15 fa 0b 1b 42 28 43 67 d3 6e 5e 6f ff | c0 b1 6b 27 e0 5d 48 d0 0b 8b bd 52 32 59 4d 42 | 3a 7f 12 ad f8 1d 5e cc 39 0c 00 27 ca 10 80 cd | 3d 82 51 e1 b2 98 44 61 6d 8a 0e 01 ae d2 a9 b5 | 0d a4 1c d6 bb b1 86 67 99 76 77 1d 81 1f e6 0f | 87 d6 0e ab 3d 4e 72 d6 1c d8 a8 ba 8b 0d fa b6 | 14 aa 5d 05 4f 2b 84 93 9b 6c 60 e2 1b f1 93 07 | 29 7a b4 93 fc 89 c0 b0 9e 68 f0 55 5e 91 56 16 | 01 5f 10 18 5b bb 2d 47 4a 35 38 2c ad 2e ab d2 | 6a b8 26 26 f5 88 20 85 f3 dc ec bd 9d 77 db 98 | b1 c5 2e 88 5d 5c 8b a9 e1 00 27 3a d2 4c bd 1c | db 98 5a 24 32 a9 2f e9 b8 59 be e8 b6 07 01 6e | 29 00 00 24 cb e3 59 11 f9 d9 ec ee ad 77 08 0b | 98 a8 ef 2e 9a e0 e5 f5 be 06 9f 6c 9d 77 41 dd | ce d1 2a 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d ed ee bd 79 c9 6a 8d de 75 89 30 | 73 98 a0 83 98 d8 fd 9d 00 00 00 1c 00 00 40 05 | 80 0c 7e 23 1f 19 e5 09 f9 e2 d7 e7 d4 e4 7c f1 | e8 ce ce 76 | libevent_free: release ptr-libevent@0x7fb388054710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388020d10 | #505 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #505 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c0346e0 | handling event EVENT_RETRANSMIT for parent state #516 | start processing: state #516 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #516 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #516 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #516 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.031855; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.83143 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388020d10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #516 | libevent_malloc: new ptr-libevent@0x7fb388054710 size 128 "road-eastnet-nonat-70" #516: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #516) | b0 c4 a7 65 22 ba 71 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba a5 f4 39 29 02 0d 7f e1 ce 23 a9 bd 79 34 2c | a4 ae 82 fb f4 56 44 6d 25 c8 ad 22 1c 00 04 e4 | fa 03 ad 8f 9f af 4d b2 90 d2 16 5a 2f 17 1a 15 | 58 ad df 68 e6 e1 fb 5f 9d 90 81 c9 af 7c 31 12 | 41 4f db e0 b3 86 a3 d0 c1 ef c5 7d 64 09 1b b5 | 64 47 53 1c 1e 0a 21 b1 e4 af ee 92 77 f9 75 e1 | 5f 34 cf 58 ca 97 19 11 a0 06 51 71 71 d4 e4 f2 | 1c 41 c8 1b a2 4a a9 ba 46 a4 e3 7f 99 64 8d 28 | b1 30 c5 e4 30 76 1f 7e 89 f0 65 32 bc 49 9a 04 | b4 60 1a 1e a9 b6 fa 63 35 37 7f 30 be 1f f5 76 | ab e0 a2 6b 4f 30 d8 71 5f 4f 3d 2d 14 59 46 da | e4 b7 89 ba eb da 77 0f d4 a2 34 b8 81 a0 b1 10 | 75 99 1f 3b 28 c3 1f 1e c4 47 fa 5e ff ec d3 2c | df d5 7a ea 70 58 26 f9 8b 47 1b ff 87 16 43 25 | 36 04 57 b4 43 c6 39 70 f4 c3 6a 94 df b4 49 bf | 82 f0 08 cb c7 5f ea 63 07 18 16 54 b0 37 ab e4 | 29 00 00 24 b0 da d8 00 45 52 59 a6 aa c3 52 03 | be 63 73 c1 d3 94 57 52 b6 9e 12 41 0c ee a0 24 | 4c 09 59 fe 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 8b ad 07 50 d4 78 b4 4f 97 b0 fb | bb f6 fa fc 21 38 4b 63 00 00 00 1c 00 00 40 05 | d0 ac 8d 25 0b 65 31 b3 b0 11 22 6e da e4 14 65 | f6 1e 50 f5 | libevent_free: release ptr-libevent@0x7fb35c0511f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c0346e0 | #516 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #516 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb360025210 | handling event EVENT_RETRANSMIT for parent state #524 | start processing: state #524 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #524 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #524 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #524 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.031978; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.826081 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c0346e0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #524 | libevent_malloc: new ptr-libevent@0x7fb35c0511f0 size 128 "road-eastnet-nonat-29" #524: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #524) | ad da d3 24 2d 65 26 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 9b 4d af 9d 8e 16 4e 79 9d 95 9d 88 b2 5e 09 | f6 4f d0 1c b0 25 e9 93 be b2 69 1f 36 9c 49 a0 | 44 f5 dc ea 0c 18 d3 cf 65 08 01 43 ec 36 05 b8 | 2a d7 b3 3b d1 93 c2 8a 31 77 1f 9d 2c c9 a8 3a | 11 f5 95 7b c4 81 fc 5d 96 ee bd 44 15 34 22 c1 | 71 4a 5f 76 cd 57 fb 11 79 0a f5 62 1b 91 3b de | e4 fe 82 b2 18 dc c5 d3 a5 42 a7 79 6d aa 95 f6 | 00 d9 74 30 e3 e8 a8 2a 76 02 2c fb 3d 48 e4 b8 | da e6 31 2e e9 38 9e d5 03 35 33 93 c3 a5 f1 20 | f2 62 cb a8 16 a1 46 60 30 4f 28 ac 47 61 ae 14 | 02 70 2b e7 2b 16 7f f2 18 02 58 cb bf df be f3 | bd 14 94 03 17 e6 3a 05 80 08 27 04 a8 69 b6 19 | 8b 17 87 72 b2 0e 37 35 38 6c 05 37 e1 09 09 e7 | 9e 9d 08 8d 77 97 ae 5d 2b cf 0a e1 f9 c1 73 85 | fd c0 15 2b 82 a2 5c 29 27 48 fe b2 e1 3e 87 a4 | 06 6d 09 b3 f8 4c ea 61 50 a9 b2 37 a9 12 e8 76 | 29 00 00 24 58 4a df 1f 4b 4b ff 86 2f 20 df 0f | ac 70 4d 1f f0 2d 6f 07 f3 a2 91 54 47 78 60 b6 | 71 cd e8 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c dc d6 72 67 d3 e7 69 f5 94 9f 27 | 9b e1 4a 44 55 e1 6a f7 00 00 00 1c 00 00 40 05 | 4e 1f a7 8f 6a af 3d 63 0f b3 f8 d5 e1 3f a9 d4 | b3 8f 35 dc | libevent_free: release ptr-libevent@0x7fb36004e850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360025210 | #524 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #524 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34000cc10 | handling event EVENT_RETRANSMIT for parent state #507 | start processing: state #507 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #507 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #507 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #507 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.032115; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.833073 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360025210 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #507 | libevent_malloc: new ptr-libevent@0x7fb36004e850 size 128 "road-eastnet-nonat-243" #507: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #507) | da 78 05 0d 9b 70 b9 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 46 e0 88 a0 30 a2 10 b6 db db 18 a9 1a b3 9a | c5 54 fb 3f 15 80 c7 25 e6 f4 59 fe 6e fc 4f d8 | 8b ec 98 88 97 ce 89 12 e0 f6 7c 60 70 3c 7d 2f | 85 8c 92 e6 f5 10 00 45 4e 0d f3 d7 24 70 70 ea | f1 31 c4 5b 48 d6 07 d8 da 3d 7f e0 08 dc 0f 9e | 22 03 73 c9 0e c4 1b 51 bf f2 38 8e 38 b6 fd d5 | 22 d5 92 08 9a e7 f3 0b 25 d0 d9 dd 1b 26 88 06 | d6 8f 78 7c 97 0a 2b d5 ae 86 6d 27 bc ca 56 2a | 75 f9 bc 7a 04 89 9f bf e0 ea fc 39 80 a6 03 c7 | 0c 27 76 fa 8e 3c c4 79 8c d8 25 1c e4 00 76 60 | ce 83 c9 6c f4 f0 61 2d eb 79 e9 72 7a 2c 98 fa | 1c cb e8 81 62 75 a2 1d ab 8a ff 63 87 4e 5e fa | 9c 7c 66 c5 3e 4d ee d7 ea 85 5e 26 e2 62 57 07 | b7 3a e7 80 5f 3e 54 3a 0c 1b dd 9d e4 1a 64 e7 | dc 8d 0e 26 5e 1d 1f b4 2e 68 e8 a0 88 3b 2a 21 | 54 99 7c 47 f7 0c ba 8c f4 5a ab 15 bd ae eb 38 | 29 00 00 24 49 65 e9 20 14 20 1a 38 1c 59 3c 48 | eb 8b 7a 8d ba 7b 14 a8 53 47 20 f7 ff f7 d4 ec | 05 75 53 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 67 d1 c8 0a fd 9b 5e 47 d4 f9 45 | 3b 65 86 81 4c 3e 0b eb 00 00 00 1c 00 00 40 05 | 9f 6a dc 5d 73 87 7f 7b 13 63 32 fe 29 c9 d7 13 | 68 73 c8 6f | libevent_free: release ptr-libevent@0x7fb34004e2d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000cc10 | #507 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #507 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #521 | start processing: state #521 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #521 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #521 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #521 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.032236; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.824007 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #521 | libevent_malloc: new ptr-libevent@0x7fb34004e2d0 size 128 "road-eastnet-nonat-27" #521: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #521) | e0 39 ae 6e 8d 33 46 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 3f e2 39 d0 87 6e c4 87 ac 4b 7f e8 23 48 99 | 92 9e 37 b3 ec 85 70 ac 3f 02 9e 68 20 31 71 0c | 97 15 91 c1 a0 ab 9e 8d 27 01 76 49 b6 29 fb 50 | 00 fc 65 98 a7 fe a1 a4 36 b9 c4 7c 54 f4 02 af | 60 2f d1 df 33 d0 64 d4 55 6b 05 3e b6 be ce 9f | 7b 70 7e 57 f4 bd aa cb 97 13 66 4c 9b c5 ee ff | 30 5a af e3 f5 d2 79 8f d0 02 64 c0 f6 31 9a 04 | 75 4d ca 99 cf 35 0b 0b 63 86 ed 2d 81 69 83 0d | 51 34 70 ee ac 2d 1e 34 e9 70 85 c2 2f a2 8f 70 | 6f 0d 80 be fa b6 92 2c 33 7f 13 ce 7a 72 1b 7a | 2a d2 4a 74 e9 27 c0 27 62 da 50 70 c6 2c 9d f6 | 5b a1 c7 10 be 54 64 5f e3 1f 76 be a3 86 5c 67 | 3f 34 60 37 96 c6 3f ac 97 7d a3 18 8c c7 ef 72 | 1d d2 f4 90 6a 6c 56 d8 e8 0f 74 17 ab b5 fe 66 | c6 f5 7b ef 12 de 81 09 98 fb 45 7d d7 c5 4b d6 | e3 d8 90 e0 92 65 36 18 47 32 4b 60 90 49 45 9b | 29 00 00 24 31 24 b3 bc ed 01 bb 4f 4e 94 0b a9 | a1 7c 54 38 d8 7d f8 73 0e b6 38 5d 48 35 f4 71 | f1 a3 75 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7c 55 c6 d8 c0 e4 0d bf da ae 94 5b | 53 f7 7b d9 db 38 1b b7 00 00 00 1c 00 00 40 05 | 3e db 6e c8 27 ac a4 d1 7f ba 2d 10 fa 4a 46 d7 | 5d f3 f0 38 | libevent_free: release ptr-libevent@0x7fb378051330 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #521 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #521 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a88140 | handling event EVENT_RETRANSMIT for parent state #513 | start processing: state #513 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #513 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #513 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #513 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.032358; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.827596 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #513 | libevent_malloc: new ptr-libevent@0x7fb378051330 size 128 "road-eastnet-nonat-107" #513: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #513) | bd e9 59 71 3e 30 66 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b f0 aa 56 99 ad 41 e6 3a 19 67 48 fc c0 1b e2 | b0 a6 21 9e 13 7a 65 b0 01 64 d4 c2 39 16 1c a3 | 09 b7 6f 2c 8c 4c 7e 2a 7c 62 da 59 d9 c0 53 20 | 5f 82 b5 8a 0c 51 a0 6c ba 44 d8 ce 26 63 57 92 | 46 0f c3 0a ab b0 53 c3 61 49 a1 a6 7a ff cb 8c | bc 6b 3c 47 62 03 e7 80 c9 67 73 83 91 0c 93 c6 | 56 27 a3 11 5d eb 2a 88 84 eb 3e 27 a2 e6 b8 18 | 93 02 c7 f9 fc cb d2 36 3c bd c3 eb 8a f7 b5 95 | e0 47 db d1 c8 42 8e 58 81 f5 ad d0 b5 63 86 42 | 1f 8b 84 dd 81 ee 70 92 6e b5 c4 39 af 9c 50 3d | 9f 95 c9 ea 1e 7c 99 d7 0e b5 ac b0 6c 63 ec ba | 8d 5f 65 5d 3b 17 25 63 e7 5c 7b 69 67 54 83 0e | c0 9b d7 b5 4f 42 2f 27 87 22 39 48 b7 84 cf cc | cf 00 bc d9 c7 6d 6e 28 f3 1c 0e b7 f5 1b dc c5 | 59 f5 4a 7b 90 a6 d5 78 62 d3 be d3 63 ef d7 f9 | 2c 59 4a 44 cf 7f 3b 21 cd 7f c7 d4 ca 1a a8 49 | 29 00 00 24 a4 bc 37 1e 87 c2 34 b4 23 5a f6 0b | b7 2c 74 3f fd 06 56 c7 93 de 20 49 09 1f b3 6b | b5 db c8 d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a e5 9a 01 5d 43 fb 6a 98 9b f3 8a | be 52 9d de 46 5a 7a 72 00 00 00 1c 00 00 40 05 | cc 5a ab 9a 19 3f 91 fb 3e 48 14 36 65 db 7f b9 | 29 d6 f5 30 | libevent_free: release ptr-libevent@0x7fb38004e900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a88140 | #513 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #513 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374024fd0 | handling event EVENT_RETRANSMIT for parent state #517 | start processing: state #517 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #517 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #517 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #517 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.032481; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.832355 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a88140 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #517 | libevent_malloc: new ptr-libevent@0x7fb38004e900 size 128 "road-eastnet-nonat-52" #517: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #517) | 33 e5 d4 8b 34 40 4a 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d 50 73 53 0b 3c f1 6e 78 85 b7 58 fc 4b ba 17 | 6f 80 49 00 4f e5 51 c4 75 f5 c7 25 8f f6 8d 0c | 0b 3f 8d 1f fe 93 5e 60 24 81 0f 18 41 a0 49 31 | af 56 bf f8 e7 5b 2b a7 03 0f d4 ca d5 35 76 53 | f2 2b 65 31 41 bc b7 67 c0 bc c2 52 41 2b f8 94 | 04 88 87 86 1a 29 d6 6e 88 cb 09 a4 42 bf f7 4d | 7c 53 5b 57 b2 40 3e aa d2 e2 33 0e 70 6d 1a c0 | a8 61 dc 8e fd a0 3a 5e ba 87 2d 12 b0 e3 ba 16 | a1 1a a9 11 c0 e5 e5 f1 54 08 4c 01 f1 c6 26 4b | be a6 4f 3e 3e 89 d5 26 bc 6f ed 31 f1 ee 6b aa | d9 5e 96 b1 fa 74 49 cb 9d 97 e7 5d a6 4b d4 74 | 6b ae 88 a3 73 a4 87 0a 18 a9 6d e9 8b d7 36 fb | 0b 55 06 7d b4 78 db 17 14 99 b7 2e a7 64 89 99 | 8c be 1c fc 04 89 99 a4 2c 3b cb 1e d4 8e b5 cb | 24 1e bf 9a 75 6f 0b f5 b5 e2 c8 b5 34 36 ee 02 | af 62 28 a3 22 fa ec 90 27 af 39 54 b8 b9 0f a2 | 29 00 00 24 e2 3f 8f 34 58 87 92 57 56 c3 cd 4d | 63 8a 11 89 ae 2d aa 42 8a b1 46 78 a8 66 d5 93 | b2 cc 27 a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 05 9f 42 9e eb 36 9c 33 7d 49 87 | a2 9f 49 98 50 a4 45 37 00 00 00 1c 00 00 40 05 | 0e 29 0c 93 97 71 7f 1e 78 95 bc a8 9d 55 45 5b | 68 08 38 5d | libevent_free: release ptr-libevent@0x7fb374039ac0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374024fd0 | #517 spent 0.0995 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #517 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354039e80 | handling event EVENT_RETRANSMIT for parent state #514 | start processing: state #514 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #514 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #514 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #514 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.032603; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.832823 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374024fd0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #514 | libevent_malloc: new ptr-libevent@0x7fb374039ac0 size 128 "road-eastnet-nonat-33" #514: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #514) | 06 7a 17 75 fd ae cb 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 5a 8f 50 94 ac f5 36 99 70 0a 59 72 e7 bd 59 | 0f 36 90 cd 5c c6 89 e0 75 bc 28 73 40 e2 7d cc | 29 c4 5a 70 07 f4 b5 86 f2 2a b0 3c a2 25 4e 6d | 20 3c ce c4 4f 4c 58 ae 19 d4 cf fe ba 7b fa f1 | f3 e2 9e 67 a4 d8 72 7c d5 14 6c e6 e7 e2 c6 3e | 8d 4b 48 dd c7 d4 8e 53 66 3c b7 1b 8d fe 66 bf | 89 1e 91 a6 67 0a 3d 11 cd 2a 13 4b 79 22 34 46 | 3b be d5 2d 70 4a 7d b9 7c b7 da 21 75 dc 69 65 | 39 db b4 a1 e9 27 93 e6 22 84 44 fb 74 c7 5b f7 | bf 99 8c 9e d0 24 31 9c 4c cb 86 84 f0 20 fe be | c1 25 55 19 f9 b6 06 e1 9a 9a e7 2d 88 3e 42 9f | 4c 92 e0 a8 c0 b6 61 d6 11 42 34 e8 2d 23 a1 54 | a1 d1 b5 28 f0 8d fb 27 b7 84 29 2c d4 6e d1 c7 | 73 d4 1e 76 c8 dc 3a df 8a b5 ac 49 f8 57 58 ac | b6 af 74 0a c9 24 9b 82 fe 27 eb 68 17 91 56 97 | 2f 25 7a 6c 33 0f 0b 13 88 c8 86 84 02 8c 9c 43 | 29 00 00 24 8d 5a c8 42 22 66 47 71 75 11 01 a3 | eb de 43 24 8a 8a 1d 52 bb a3 79 20 2f 3a 8b 28 | 46 f6 14 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 9b 53 3e 81 94 d1 35 62 13 6f 0f | f3 75 0e 22 e2 b9 70 e9 00 00 00 1c 00 00 40 05 | a7 b7 3f 67 ae fd d1 f6 b8 00 0c 14 27 04 b4 2c | 48 80 6b 64 | libevent_free: release ptr-libevent@0x7fb35404e8b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354039e80 | #514 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #514 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350018460 | handling event EVENT_RETRANSMIT for parent state #508 | start processing: state #508 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #508 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #508 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #508 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.032723; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.826438 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354039e80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #508 | libevent_malloc: new ptr-libevent@0x7fb35404e8b0 size 128 "road-eastnet-nonat-242" #508: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #508) | dc 3f 02 d2 13 45 35 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d a9 32 87 b1 90 82 93 0a 0b 68 7a df 0e cd ea | 4e 12 c3 9f a0 a0 db 88 eb 7c 77 42 14 a4 f9 02 | a9 02 c1 13 c2 56 17 b8 78 50 73 cf 37 95 03 3b | 9f a9 9f 88 fe df 99 cf a6 7c d9 96 30 f6 e3 3c | ff da a7 12 b9 67 b1 01 1e 94 44 d3 2d 66 e8 ab | 93 b4 41 cb 47 2f 3b b1 72 1a 25 46 61 80 3c 91 | fd cc 10 8b 86 fc 21 07 c7 5b 16 7a fe f3 c7 5c | b0 46 97 1c 76 a9 4b 9d 86 2e fa 04 56 7b cb a3 | b7 fe 1a 7b 4d fe 92 09 4b 17 df a9 9b 0f d4 5b | a9 06 58 5c b0 f7 c2 a4 71 cc 56 f7 a4 cb ae b4 | 36 1d de 4d 00 ad 9a ec ec ba 71 93 15 4d 0c e2 | 83 0f 23 94 d7 c2 0c 19 16 44 17 09 f4 40 84 da | 41 ec 50 fa 16 6e 50 f1 55 79 e5 0b 17 dc df d0 | 12 ca a0 4b 05 a1 a6 2c 7d 1e e6 72 04 2b 9d f5 | f1 0a bd da 88 25 7c 99 8f 11 ec b1 37 2c 76 0e | 43 b9 fb 60 6e 3f 37 47 06 8f 9f 3f 60 14 04 eb | 29 00 00 24 92 60 8e 47 54 65 21 7e 19 d2 97 01 | 48 40 e2 71 bf 81 d1 29 42 df a0 d9 5b 12 66 4f | bd 5f 3d 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 f1 6c fa bf f7 cf e9 0c 8d 98 4e | 77 aa d2 f2 40 a1 0a 37 00 00 00 1c 00 00 40 05 | bd ae 80 ba 97 bb f2 9c 7c 0e d6 fc 4b ac 9b 03 | c1 38 67 4e | libevent_free: release ptr-libevent@0x7fb35004e5a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350018460 | #508 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #508 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7e4d0 | handling event EVENT_RETRANSMIT for parent state #506 | start processing: state #506 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #506 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #506 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #506 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.032845; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.824217 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #506 | libevent_malloc: new ptr-libevent@0x7fb35004e5a0 size 128 "road-eastnet-nonat-1" #506: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #506) | 30 9a 49 1f a8 dd 2c 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 2a bc 79 dc b5 44 58 cf f7 90 44 40 11 2e 15 | 03 b5 fb 40 91 db b0 e9 cc 93 76 20 f8 11 9e 6d | 39 73 1f 61 bc bc 4e ee c9 bc 18 3d 60 7b af 0b | 75 cb a0 d6 4f 63 ef 20 98 68 71 d2 13 f7 66 7d | d4 5b 49 b9 ac 8b df e8 41 30 6e ff 20 54 14 93 | 38 ab ab 4c af e9 0c 3b ab 5e dc 5e ab 90 4b 56 | 53 3a 8a b7 18 5b 14 39 76 27 9c 20 d5 a4 eb 39 | 1a 6c 7f f0 56 06 81 af ac 7c 4a cd fd 91 a4 9c | b0 f5 14 1c 9c 19 b9 58 23 51 01 f1 e5 aa 33 2e | 85 93 d7 f3 05 7b 07 5d 5b 1e 49 80 23 cb 1b 4b | 93 19 de 20 5b c0 bb 25 ff 6a 7c bd fa 9e d4 b6 | 65 89 68 9f 60 cb 4e fc c1 67 16 12 7c fd 7e e9 | 66 f2 cd 59 d3 75 d7 f2 51 17 02 7b 63 bd 34 45 | 2a 05 0d 75 f1 dd 12 28 48 00 8c f9 1a ee 51 55 | 7e 88 c6 eb 9c 50 71 90 5e 37 9e fa ae f7 d3 be | 4f ee 4f 56 47 93 59 ae 9d 25 55 9b 6e 17 7d 42 | 29 00 00 24 d6 8b 6d 98 8d 34 54 93 4f 23 9a c7 | c6 01 a2 cc 60 f1 90 b6 c5 32 43 97 ec 6a b8 44 | 57 ec f9 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 76 28 30 1c 61 02 15 0f 11 fb 7e | be 62 eb 4a 99 5c 3d 3b 00 00 00 1c 00 00 40 05 | 7f 22 3b d3 4d cf 74 f6 af fd 39 61 cb 11 ae 8f | 0d e3 22 f7 | libevent_free: release ptr-libevent@0x557d46b83f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | #506 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #506 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38402d4e0 | handling event EVENT_RETRANSMIT for parent state #518 | start processing: state #518 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #518 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #518 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #518 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.032966; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.833487 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #518 | libevent_malloc: new ptr-libevent@0x557d46b83f50 size 128 "road-eastnet-nonat-45" #518: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #518) | 76 4a 29 e2 f2 d8 10 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 c8 e5 72 ad e8 a3 0b ee c0 19 d4 04 c4 59 f2 | f9 f1 ca 1e 44 30 31 b6 02 9f ea 8d f7 77 56 d9 | 34 17 5d e6 6c 33 4b fe c1 d5 87 da 08 49 a5 40 | 98 09 8f 0e 2b 61 5a 8d da 29 4b bd c0 aa 20 47 | 00 81 73 86 5a d8 e0 95 46 03 64 29 8f 09 e9 05 | 09 84 fc 9f 58 0c 86 5c df 03 a7 05 8c 64 28 10 | 34 e7 f2 6f 51 06 b7 7b d1 ca 6d cd b3 c2 7b 80 | d1 48 6c 1b c4 58 91 31 ee a7 4a 59 32 08 ac f1 | fb 22 a3 96 1a 08 94 a4 84 91 22 e8 1e b0 a5 1b | a0 ee 59 f9 33 09 49 a4 f5 f9 da 80 62 31 32 f0 | d4 2b 3c ed f7 50 71 be ae 41 93 27 28 9d 7a 12 | 34 9e 0f 57 03 18 c9 b6 fe 98 3d 22 d1 c6 fe fa | 13 55 9a 4d 9d aa b8 6e 37 5c 88 37 98 3a 93 4a | fe 8e 63 5e f1 55 52 38 2a df 4e e5 01 10 1b 19 | c9 ff a3 28 16 59 44 48 e1 e5 35 ac fe f5 c2 26 | 2f 84 3f c3 36 51 80 d7 d9 96 f6 1f 3a 61 bc 30 | 29 00 00 24 da 23 2e 07 94 56 ee 0d 82 96 38 43 | 7b 89 61 bd ba 2a 55 d7 d5 50 63 47 84 e9 fa b5 | 93 54 75 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 48 88 0f 47 92 b8 68 b9 d0 c9 2b | 02 14 06 d6 2c b1 12 61 00 00 00 1c 00 00 40 05 | a7 a4 34 d2 94 1c 56 72 07 98 0d cb 3d d8 f1 6e | 48 f0 c0 ed | libevent_free: release ptr-libevent@0x7fb38404e8e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38402d4e0 | #518 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #518 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c00d120 | handling event EVENT_RETRANSMIT for parent state #510 | start processing: state #510 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #510 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #510 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #510 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.033097; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.827902 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38402d4e0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #510 | libevent_malloc: new ptr-libevent@0x7fb38404e8e0 size 128 "road-eastnet-nonat-102" #510: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #510) | bc 30 61 cf 1c f5 21 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7d 16 ac 90 1b e8 fc 3d a1 f6 2f f6 5b aa 38 5f | 13 bc 3b ec ce 54 9b 92 94 b5 7c b5 e6 92 4b 0f | 82 fe 63 f8 ae e6 73 78 f6 99 0a 42 80 fb a6 71 | 1d 6d c1 8b be 9b 09 d6 dc d8 6a 99 20 35 d5 82 | 27 70 ed c6 95 de df 76 74 d7 3e 14 50 79 f0 89 | ae 4e 98 1c 30 c5 99 94 51 22 91 53 e5 49 a5 a5 | 4e d2 de 84 a6 45 26 dc 5a 29 c7 7c 52 2b 31 8d | 7b a4 cf c6 13 95 ce 98 5a 32 37 1e 3c f9 dc 95 | 74 b2 58 3f bf f8 56 2f b2 ed 28 17 6b fc 7e 85 | c4 ca f3 5d 2b 78 55 ad d1 65 97 11 a6 22 08 7c | b5 aa 63 e0 e4 66 be 74 9d 1a b0 75 bf 11 a5 cb | 35 00 1a 58 9e 5f 9b 3a 5c 4a 5e 5b 7c 41 b5 39 | 8c e2 21 3f a3 1f 5d 86 72 e4 89 93 96 9a e1 e9 | 74 b9 24 6d 9f d6 67 09 e9 73 bb f9 0b 1c 88 a6 | 68 a2 54 4f 6c 95 d8 be 9b cd 89 96 d8 9d 33 48 | fb e8 c2 fa 1f fd 3e a7 c4 fc 87 a0 2d d1 0a 3b | 29 00 00 24 a8 33 19 fd 53 f2 7c 45 88 0e ac 9b | 8c 61 3a 57 a6 74 c6 f9 cb 73 c2 48 34 44 1a b7 | 09 32 3c 47 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 4c e5 d6 4c 06 64 b8 31 f1 40 df | 16 6a c3 cc 04 2a 1f ac 00 00 00 1c 00 00 40 05 | f4 a4 c7 b2 58 33 da 00 b3 aa 2f f5 ea 56 ab cb | 57 27 19 d1 | libevent_free: release ptr-libevent@0x7fb388027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00d120 | #510 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #510 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36401e230 | handling event EVENT_RETRANSMIT for parent state #522 | start processing: state #522 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #522 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #522 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #522 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.03322; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.834541 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #522 | libevent_malloc: new ptr-libevent@0x7fb388027c10 size 128 "road-eastnet-nonat-78" #522: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #522) | 10 b1 a0 1e 00 fa a9 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 03 12 29 26 7f 65 c7 68 c4 9a d0 af 8e ee 58 | 00 c2 bb 14 15 7c 0a 86 41 89 01 e3 50 59 e6 9d | 21 20 fe 10 1d 52 36 f5 79 ed a1 2e a4 48 7f 36 | 55 11 2c 17 77 fe f8 b5 19 dc d2 b7 81 ea a8 4f | 58 de c6 bf 75 6a 59 91 22 64 63 fd 91 bc 44 f5 | fb fc 62 8d 40 09 00 e8 46 d1 fa ee d8 ea e1 b2 | f5 ff 3e 58 e5 93 cd a0 c0 0b 6c d4 34 85 8d de | 24 69 63 0b 77 53 a3 8f bc dc 79 d3 e0 07 c6 0f | b6 c3 f5 75 53 b4 1f 79 ed 6e d0 df 07 c3 f0 12 | 58 d9 7f d3 29 ec fa 74 4a b2 3b 5a bd 60 bd c0 | 31 c1 ac c7 51 45 8d 69 c4 5a 44 c1 9e 1d 54 f3 | 3f 29 e3 14 29 d3 ff 9f 4c 6d 49 97 9d 65 a8 01 | e3 b8 ae c9 76 a9 8a 4c 13 37 d8 a6 c9 90 05 b2 | 56 78 1c 8e b1 63 ce 03 b4 28 7f e6 b1 a5 59 d4 | f8 a3 6b 86 00 eb 6f c1 03 34 cf 9d 47 16 c9 f4 | fc a0 47 b8 e3 a2 18 1a f8 87 2d 2f b9 c5 65 a4 | 29 00 00 24 ef 86 5c 01 c3 c5 84 cc db a0 c4 f8 | 4b 5f 8a 0f 84 0f d8 a2 60 5e 95 d4 2a 5b da 43 | eb c8 3e 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 98 24 f3 3c 5a 10 4a 5f ba 19 5c | 79 3c 94 1f f7 ad ac c2 00 00 00 1c 00 00 40 05 | 01 72 52 9e ac 8f 8c 48 d1 ab 04 59 e9 b8 14 4b | b7 ae 1e 1b | libevent_free: release ptr-libevent@0x7fb36404ec60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36401e230 | #522 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #522 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 a6 50 d0 80 0f 96 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #509 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #509 | rejected packet: | 95 a6 50 d0 80 0f 96 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #509: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0678 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 61 5a f6 8c 22 37 26 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #515 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #515 | rejected packet: | 1e 61 5a f6 8c 22 37 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #515: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0566 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 cd fa e1 13 2d 20 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #511 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #511 | rejected packet: | d0 cd fa e1 13 2d 20 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #511: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0573 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 19 92 95 ca 61 53 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #528 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #528 | rejected packet: | 53 19 92 95 ca 61 53 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #528: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0548 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 d2 7d 3c 00 e8 ff 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #505 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #505 | rejected packet: | d5 d2 7d 3c 00 e8 ff 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #505: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0547 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b0 c4 a7 65 22 ba 71 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #516 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #516 | rejected packet: | b0 c4 a7 65 22 ba 71 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #516: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0581 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad da d3 24 2d 65 26 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #524 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #524 | rejected packet: | ad da d3 24 2d 65 26 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #524: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0542 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 78 05 0d 9b 70 b9 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #507 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #507 | rejected packet: | da 78 05 0d 9b 70 b9 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #507: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0545 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e0 39 ae 6e 8d 33 46 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #521 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #521 | rejected packet: | e0 39 ae 6e 8d 33 46 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #521: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0555 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd e9 59 71 3e 30 66 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #513 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #513 | rejected packet: | bd e9 59 71 3e 30 66 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #513: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0544 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 e5 d4 8b 34 40 4a 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #517 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #517 | rejected packet: | 33 e5 d4 8b 34 40 4a 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #517: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0542 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 7a 17 75 fd ae cb 88 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #514 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #514 | rejected packet: | 06 7a 17 75 fd ae cb 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #514: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0558 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 3f 02 d2 13 45 35 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #508 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #508 | rejected packet: | dc 3f 02 d2 13 45 35 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #508: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0579 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 9a 49 1f a8 dd 2c 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #506 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #506 | rejected packet: | 30 9a 49 1f a8 dd 2c 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #506: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0545 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 4a 29 e2 f2 d8 10 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #518 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #518 | rejected packet: | 76 4a 29 e2 f2 d8 10 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #518: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0566 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc 30 61 cf 1c f5 21 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #510 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #510 | rejected packet: | bc 30 61 cf 1c f5 21 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #510: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0548 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 b1 a0 1e 00 fa a9 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #522 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #522 | rejected packet: | 10 b1 a0 1e 00 fa a9 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #522: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0542 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb37c01d710 | handling event EVENT_RETRANSMIT for parent state #721 | start processing: state #721 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #721 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #721 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #721 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.218651; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.997103 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36401e230 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #721 | libevent_malloc: new ptr-libevent@0x7fb36404ec60 size 128 "road-eastnet-nonat-104" #721: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #721) | e2 d2 81 3a 91 66 0b 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 66 4a 11 45 27 41 9e fa 59 58 40 a4 cc e3 66 | a4 14 b6 1a 8d ec 4a 94 ae 30 93 f6 e0 2b 48 5e | a9 86 4c 46 13 47 37 8b 91 48 67 89 bc 13 95 86 | c3 a5 fd 51 f1 60 1a c1 1b ea 4a 3d 68 db 35 cf | b9 d2 24 1d 11 fa f4 f5 69 79 96 a5 67 36 23 c2 | 21 40 a7 85 5c c3 43 86 61 71 35 04 bc b3 26 45 | d5 aa e6 7b c3 47 8d 08 98 e5 21 f1 ac 8e ba f5 | 2f f9 eb fc a2 04 fd 35 92 de 29 dd 6d 2d 53 6e | ab ec 31 fd 91 c3 8a e1 90 85 af 74 f4 e2 93 a0 | ef 1a 10 50 72 25 37 c7 21 d8 7a 5e 58 f6 7c c1 | 2d b3 8b e3 6b e8 be b0 e1 38 1c 05 0b d7 f6 07 | 9c 25 56 1c 46 bf d1 bd c5 df dd d8 33 23 d8 b0 | a2 c8 cb 1c b9 39 f3 85 c7 0b 15 1a 74 ff 55 80 | 1c fa 71 d1 23 f1 d9 e4 a0 14 57 46 33 58 01 33 | 3e 06 c5 79 b4 72 cb 12 6a 21 9a 81 d4 46 48 66 | 8a 9c 2d 86 80 06 17 4f 80 91 2d 38 09 9b 22 b4 | 29 00 00 24 a7 2a 51 43 4f d0 b2 2d b6 00 60 33 | be ce 9f 17 58 67 da 33 8a 89 27 e9 8a 3f 82 9a | 4a 50 3e 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c 9c ed 7b 0b 4f 45 bf 12 47 14 a7 | 35 17 86 4b 30 03 87 f5 00 00 00 1c 00 00 40 05 | 78 3e ba 2e 78 93 3c a4 49 e4 a1 77 52 95 07 b6 | 6d ae 67 c4 | libevent_free: release ptr-libevent@0x7fb378085d30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c01d710 | #721 spent 0.152 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #721 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c01d970 | handling event EVENT_RETRANSMIT for parent state #723 | start processing: state #723 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #723 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #723 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #723 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.218833; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.000379 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c01d710 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #723 | libevent_malloc: new ptr-libevent@0x7fb378085d30 size 128 "road-eastnet-nonat-155" #723: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #723) | 36 da f7 c5 2f 91 5f 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 26 74 72 fd 9e 9c 10 9c aa ba 2e c0 be be 66 | 22 9f 1a 62 8a 9f e6 3f e7 37 3b 1b 58 bb b4 f4 | a7 74 cc f5 37 05 fb 5b 1c ba 9d 27 55 34 43 f1 | 74 ee 17 2f 42 15 bc 36 96 52 c7 49 68 f2 24 68 | 76 d0 e6 45 0e e2 22 75 60 cd ee fd b6 75 20 09 | 00 ba 11 5f cb d5 aa dc 11 39 da 45 40 b7 a5 19 | c8 d5 2f 89 aa 7e 26 c1 13 b3 e0 94 56 31 ee 6c | 7c ec 62 9f 9b b7 d8 bb 9c 47 40 55 ef 32 b3 53 | 6c 79 f6 28 33 7a 17 48 72 6f e2 3a 5f f4 48 35 | 73 a1 7e b6 79 10 98 c6 44 1b aa ea e8 c1 36 b9 | f7 bf 2c ce b0 d0 2c 48 3b cd 2b 55 90 e1 5d 20 | f5 96 29 1e ab 81 03 61 9c 1f 05 2b 89 67 64 02 | 4e 7c e5 42 a2 f9 61 f6 dc bf 78 f8 b1 ca 56 69 | f3 d1 e1 49 87 d2 fb ee 1f 6c 89 a1 b4 e9 5e bd | 34 56 05 81 f0 52 8f f2 fb fe 6c 2c 13 77 1c 0f | a7 6d fb a5 f4 8e 00 1f f3 70 1f a1 8a 77 8f 5d | 29 00 00 24 6b 53 2d ae 51 68 5a 25 06 10 41 a9 | 74 bc e4 28 01 83 dc b1 fe c7 47 aa 45 92 94 cc | 73 9f ae 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 9b ca 13 30 40 c0 94 4a 3a 13 b5 | 19 3a 19 0b be 4d 6e 5e 00 00 00 1c 00 00 40 05 | fd 4f 80 57 98 34 ce 28 4d 1c 78 e4 ce 99 f3 3e | f2 93 74 b1 | libevent_free: release ptr-libevent@0x7fb35c0b1220 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c01d970 | #723 spent 0.115 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #723 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c017ea0 | handling event EVENT_RETRANSMIT for parent state #659 | start processing: state #659 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #659 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #659 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #659 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.218969; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.971565 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c01d970 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #659 | libevent_malloc: new ptr-libevent@0x7fb35c0b1220 size 128 "road-eastnet-nonat-148" #659: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #659) | 77 e1 0b 63 56 ac c5 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 24 71 32 4c a4 b2 25 64 3e 33 ac e5 69 a3 59 | 28 37 d7 f5 67 fa 3c 10 89 2a be c8 bc b7 80 db | ae ec e3 e9 16 ca 51 c1 06 d1 7f 94 6f c4 fc bb | 73 c6 3b c8 e8 42 d0 17 d5 11 01 02 43 ce 2f 5e | 6b 05 fe bc 5e fe 6a b1 10 03 5d d6 b0 38 f7 55 | ac 53 8c cb fd 56 72 ab 02 ea 39 60 a4 1f 70 3a | 0f 44 00 88 6a 7e 20 c3 de 96 d0 8b cd ee 1a d1 | 97 7f c1 1c 23 b1 90 63 b7 e9 ab ce 37 30 6e f7 | e0 76 ab b8 cd cc 34 16 be e0 9f dc e1 2f 5c 73 | b7 57 ad 53 9d 9f 37 a8 12 a5 aa 69 7e bf 56 b7 | ef 32 86 fd d8 eb 0a 45 48 20 ef 05 c2 fd 7c 50 | 36 ee 5b de 12 13 35 96 43 92 0a 82 37 08 83 d8 | f1 44 bf d3 7f 0b c8 9f 06 3d 6f d2 e8 de f4 63 | 67 09 a1 ab 1e 3e 96 c6 bd 17 50 90 d2 68 7f b0 | 0e ba 2d 2d c6 cc f3 98 8f 85 a9 bf 83 cc 98 34 | a4 13 08 89 fb bd 67 8c b6 a0 6e e2 b4 b0 ff ea | 29 00 00 24 9b 38 e6 b0 44 13 de 09 b0 4f 0f d4 | 9c 32 85 69 0a a7 d3 e0 7e 31 28 18 de 52 8d 12 | f4 2d 68 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 04 29 42 78 19 20 e6 c7 17 a6 a2 | 7a d7 24 ba d8 b1 f2 6e 00 00 00 1c 00 00 40 05 | 4d a2 f4 dc ca 8a e9 4b bc de 2e 89 0d ba cd c5 | 42 51 87 1c | libevent_free: release ptr-libevent@0x7fb3700647d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | #659 spent 0.0945 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #659 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34000d120 | handling event EVENT_RETRANSMIT for parent state #677 | start processing: state #677 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #677 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #677 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #677 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.219092; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.969836 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #677 | libevent_malloc: new ptr-libevent@0x7fb3700647d0 size 128 "road-eastnet-nonat-103" #677: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #677) | 50 8d 95 68 b5 8b 23 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 83 aa a4 8f c6 30 45 92 c5 cf a6 91 01 0a a1 43 | f1 38 e4 4c f2 1e 8b fa c7 cd 9a 24 20 65 ff bf | b9 f0 d7 e8 39 54 34 3b 5f 78 23 e6 41 b2 72 62 | 83 82 8d 5b 8e 9b 83 e0 88 f3 03 08 95 12 34 d3 | 98 d1 ba 80 21 88 79 5e ed 78 64 b4 3e 07 35 23 | 3f b8 8f 43 78 b2 9f 35 5d ad 57 da 20 57 19 f4 | dd 11 96 05 07 92 4e 19 0b bc 45 fd 48 2f 7a 41 | ab d6 c2 78 83 b9 51 5f c2 9d bc 1f 01 00 01 1c | 96 6e 62 37 71 03 98 70 25 42 9f e1 05 cf 75 d2 | 67 9b 63 9b 3f b6 19 96 2f ca 41 d1 e1 b6 6d 22 | 8c cb fe d6 b4 86 8e e1 27 c0 a0 24 76 f2 01 5a | 83 a9 0f 76 b1 07 35 33 4e 3e e0 dc 79 5e ed 29 | 09 64 22 34 77 8d 1f f2 ad 05 7e 1b e5 4c 10 9e | 58 06 f7 85 f5 dd f1 d9 0c cc f6 9f 69 01 27 29 | 70 68 3f aa 7e a2 7d 6e d3 92 55 84 0e e6 71 17 | 1e 78 67 9e 87 bb e2 70 02 96 cb 0b b6 30 ee b4 | 29 00 00 24 00 70 fb 22 7d 0c 48 97 e3 e3 bb dd | b2 69 b0 26 7d 9b cc 69 6d 71 bf ad 98 91 5c 5d | 16 09 bb c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 db ab 8b 76 c6 3a 27 c8 6b 4c e4 | 2b b7 a4 43 65 c8 3b e1 00 00 00 1c 00 00 40 05 | a7 c6 26 92 93 c8 84 fd 1e 45 e2 6d 6b 62 ad e1 | b6 74 b5 46 | libevent_free: release ptr-libevent@0x7fb34c069bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000d120 | #677 spent 0.093 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #677 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #637 | start processing: state #637 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #637 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #637 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #637 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.219202; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.95129 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #637 | libevent_malloc: new ptr-libevent@0x7fb34c069bf0 size 128 "road-eastnet-nonat-137" #637: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #637) | b6 9c 40 58 3d 0c 12 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 62 01 a3 0e 36 d8 5c 24 b9 7d 93 50 74 52 09 | bf 73 ee 31 ce 48 4d c3 8c 6c 36 26 89 6d a2 98 | f6 a5 6f 3e af a0 f7 15 c5 cf 68 f4 0f 09 28 32 | 0f 5d 04 46 85 53 2e d9 db 2b a2 c2 d9 bf e4 c3 | 50 e3 bc 2c 35 2c e0 d8 71 5e ca 0f 65 92 6f 5f | d6 4c 31 d5 82 00 7d 21 65 65 2e f9 16 0f 60 4a | 66 fa 76 ba 56 18 68 1b b7 8d e5 ca ec fc bd ec | 0a e5 6a b2 41 42 5c a8 2b 3f 1c 15 fb b5 ec c8 | f5 63 de 1c 0d a4 25 56 3a 26 7c fa 02 42 4d b8 | 43 57 db 48 7f 12 2c 70 ca ba 72 7c fe 19 b1 54 | 6b 79 43 ef 00 c1 62 d3 5e ab b6 22 36 80 35 4b | e7 1d 17 2b 6d 8a de bd 50 b8 31 a5 18 f8 e0 24 | 82 85 b3 30 83 33 ec 95 4e ee a1 d7 bf ce 99 9b | c1 6d 33 8b 97 b6 2c 02 a3 d9 39 e4 c5 54 2f 6f | 47 4b a7 bf 34 12 36 ee 4b b2 e8 c4 39 ce c1 32 | 67 23 86 ac 3a c8 0f 88 60 19 2a 2c 68 03 df 9c | 29 00 00 24 37 6b dd e4 0f e2 02 60 45 48 4f 1a | ac d9 95 dc 00 d0 72 b3 54 00 91 51 8b 27 ba 45 | 47 72 d2 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 cf fd fc b2 a7 19 97 63 6c a1 8c | 7a b3 9e 5b 69 33 a4 bb 00 00 00 1c 00 00 40 05 | f0 08 d3 f7 e9 21 31 a2 9d a6 8a 6a ad 66 64 4b | fa 92 42 76 | libevent_free: release ptr-libevent@0x7fb35c09b2a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #637 spent 0.0919 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #637 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0bf00 | handling event EVENT_RETRANSMIT for parent state #753 | start processing: state #753 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #753 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #753 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #753 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.219313; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002404 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #753 | libevent_malloc: new ptr-libevent@0x7fb35c09b2a0 size 128 "road-eastnet-nonat-239" #753: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #753) | 43 c3 80 a5 94 99 7d 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 27 47 4f 05 d7 25 44 75 00 7a 90 57 67 26 e6 | 4d 97 9a 3a 60 21 e1 3d 90 71 67 27 3f 0b 49 6f | 1f b9 14 a1 8d 44 a6 76 24 f5 5a 9b 38 e3 12 49 | 11 3f dc 63 03 09 74 e9 a3 fd bb ce e7 70 f7 c2 | 6f 48 fd aa a3 1f e4 78 8b 40 4d df 11 7a 5a 41 | 45 11 21 74 d6 a5 c3 8b e5 8d 1b 68 d2 3a 6c e4 | 4f c3 5b 65 f5 0b 4f 3e 67 74 c2 72 3e 15 1b 5a | 2f b9 67 d7 f7 97 99 68 80 00 34 be 80 97 46 a2 | f2 cd e6 d7 21 ff f7 0a 95 ea 80 3d 17 5e e5 f1 | 89 b6 3a 1b 19 7c 6d e2 e2 ac e0 e8 87 47 58 ca | a8 a9 57 8a 48 7a 5e 0e 07 ed 18 d0 02 cd 41 6c | 99 f9 79 7c 54 75 6a 80 aa be 2c 8d 68 e7 ab 46 | 5f fa db 7a 00 15 1c 42 38 2a 95 67 34 d0 40 37 | 9e 59 6e ca ce 71 f9 73 95 33 d2 33 24 16 10 d6 | 96 f4 6d 66 ce ae 39 a5 a8 ba 67 7b 0b a7 ec 5c | a5 f0 ea d0 7f ca a2 d9 1f b6 4d c8 4d 24 52 7e | 29 00 00 24 34 e1 23 83 89 3a 65 73 17 62 dd 52 | 41 3d 56 39 99 39 6a 46 38 cd 4e b8 6d 94 84 4d | ae 2e 5a 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 f8 fd 21 17 cf ca 15 a9 8c 89 3d | e7 2c 90 ae 74 d6 49 28 00 00 00 1c 00 00 40 05 | a9 e3 cd d3 57 ef 23 72 b9 af 19 fe 36 9b 4d 39 | 12 5f e6 9a | libevent_free: release ptr-libevent@0x7fb3840899b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf00 | #753 spent 0.0915 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #753 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #569 | start processing: state #569 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #569 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #569 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #569 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.219423; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.925717 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf00 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #569 | libevent_malloc: new ptr-libevent@0x7fb3840899b0 size 128 "road-eastnet-nonat-87" #569: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #569) | 55 2f d6 9f 11 e5 1c 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 ad f3 19 0d b2 66 aa bf 03 d7 00 2e 8a f6 e9 | b3 08 01 25 75 89 85 ed a8 02 b4 4e ae da 53 49 | 58 9e 82 fc af 45 f7 e5 3a 8a 61 8e 88 c7 af 9a | 14 17 d6 60 7e 9b 49 7e fb c7 a3 8f 06 1f 55 04 | c8 6c 7d 7d b3 8a be f8 87 7c c7 58 4b a7 87 5d | 9c b5 54 d3 ac 08 0e 69 85 4b 91 09 83 8d 76 46 | 46 3d 39 9e ac d3 50 29 5e a5 08 c8 9e 48 83 f1 | 7a ff ec 7e 14 c7 a3 2d 96 02 b4 ac 09 ec 55 2f | 9a bc 9a b9 ae 22 a8 43 ce 46 d4 aa a2 8a 21 94 | 31 c8 40 01 99 87 64 fd 79 ff 03 2c 2e 81 52 10 | 65 b9 fe d7 6e b5 1b 36 08 b8 c5 40 a2 b3 94 60 | c1 5e 51 00 52 ca d5 19 e8 a1 81 66 03 72 10 ef | 03 5d 84 88 58 a5 23 01 6a de f9 31 fa 89 4d ec | dc d2 db 41 a5 f5 42 96 78 ed 68 a8 33 e3 9e db | 24 46 13 b6 1b b4 8e a4 01 2d 3b 33 63 dc 87 44 | db c9 90 4c 80 8f a3 e2 b7 82 7f c5 7c be 1e 53 | 29 00 00 24 0e 82 eb 05 c0 49 58 d2 06 74 53 82 | bb 2f d8 51 c7 ad 9e 32 5a e2 85 00 b0 c7 ec f1 | 8e f6 f3 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 e7 bd d8 a7 7f 8b fc 64 ee 06 53 | 59 02 1a 01 d9 98 46 39 00 00 00 1c 00 00 40 05 | c0 b7 45 5a 2a e8 30 84 4a 1b 7a 52 bc cd a9 4d | c0 d2 c3 7a | libevent_free: release ptr-libevent@0x7fb374059970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #569 spent 0.0888 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #569 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46abbc00 | handling event EVENT_RETRANSMIT for parent state #735 | start processing: state #735 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #735 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #735 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #735 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.219532; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.994703 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #735 | libevent_malloc: new ptr-libevent@0x7fb374059970 size 128 "road-eastnet-nonat-238" #735: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #735) | 53 89 83 1d 48 ce 70 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a 91 4f e8 ba d0 cf 5a d7 f0 71 fa 46 1a 8a e8 | 7d 4a be de 38 b6 47 be 9f b9 8a 22 46 d2 62 91 | ca 86 42 c6 77 2f 59 d3 e4 f2 fa 15 7b 3c 27 33 | 0c 23 b9 e7 b5 8a b0 8e ec c6 a4 80 d5 32 f2 16 | 21 6f 71 5d b4 75 f3 73 d3 f0 4b af 90 08 5b 92 | bd 52 84 33 aa 3b 00 4e e0 dc 9e 9b 5c e1 64 90 | 46 3d eb f8 93 ab a4 6e 46 c2 33 ef fc 8b d9 14 | f9 38 bb 1f e7 fc 89 8f 65 b1 d8 35 5e 99 68 8b | 32 06 43 77 f7 fb 44 87 13 38 82 0c ff 88 57 fb | f3 b5 78 4d 2f ac 61 eb 6d cb cb e1 13 98 c8 fa | 56 54 e2 54 39 9d 99 08 4b 53 de 03 86 18 ea f1 | 33 cf bb 45 1d 44 4f fa bc 18 e5 13 24 71 58 c8 | a7 32 0b 95 3a 6d 89 f1 b7 95 86 7b 38 71 2b d7 | d3 e8 9a bf 1d 2d e6 e7 fe 5f 9d 7e 67 88 57 56 | 5a 53 49 ca 89 7f 95 e0 bd 0a 6b 9b e1 e9 d3 17 | 9d 45 18 8b 68 cc de 5a 3c 70 99 6e f6 36 78 b9 | 29 00 00 24 9d 95 cb 46 13 9a 6a 64 e7 15 0c 4c | dc d4 c0 de a5 95 63 82 d6 ca 4a 90 78 69 d3 72 | e7 c1 f1 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c cd 3c 21 f0 20 2e 88 28 a9 40 54 | 19 d9 0a 26 35 63 bc e9 00 00 00 1c 00 00 40 05 | 4d 3d eb 4a 56 ab 16 38 35 e8 7a d1 b0 99 53 b5 | 30 cb 3d 6b | libevent_free: release ptr-libevent@0x7fb3640a6860 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc00 | #735 spent 0.0908 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #735 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c012890 | handling event EVENT_RETRANSMIT for parent state #727 | start processing: state #727 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #727 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #727 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #727 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.21964; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.98991 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc00 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #727 | libevent_malloc: new ptr-libevent@0x7fb3640a6860 size 128 "road-eastnet-nonat-210" #727: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #727) | 8b be 7d ad 6e 47 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 ce c0 c2 e4 25 8d 86 08 cb bc 52 7c b3 ee 01 | 8f ba c4 6d 6c f4 6a 0f 46 b6 08 ec ce 35 fd 9c | a3 96 7a 4b 39 46 2f 87 e0 b3 24 68 bd 08 f7 00 | de fe bc 6e 99 53 33 72 6d 31 50 a8 3c bf 8e 11 | d1 0a 86 13 1f ce ce c3 0f e1 bc 5e 80 8e a2 d6 | 27 e8 f2 bf ec d9 e9 f3 3d aa 43 3a 6b 97 d5 34 | 59 78 15 39 b7 bd 30 ea b2 e1 44 a5 f8 e8 38 86 | 54 db 07 6a ef ad cc 3a 56 0e d2 27 fb 2a 77 ba | 36 51 b8 10 07 62 d5 90 4d ca 0a 32 87 1d ce b4 | 7e 83 81 e7 d9 b6 8e 25 b8 6b 2b 0c cf a3 60 19 | e6 bb d6 4e 72 2e 81 71 f8 13 f2 9a 9e d8 eb 8f | a8 36 ae 05 81 aa e7 46 61 6c 3f 81 1b 7b cf f6 | 87 cb 65 20 06 d0 84 24 80 2e 3a 60 fb 99 c3 62 | 5a 0a 79 d7 36 6c 19 82 db 33 f0 6e 27 96 59 38 | 58 4d f2 ec c1 c1 e4 2b e2 58 27 a6 55 42 ca 3e | 3f c8 1e 9e 7e b4 88 cc 40 5e 23 e7 74 a8 91 f7 | 29 00 00 24 64 58 e5 0d 0a 27 42 8e 74 e9 35 15 | 5e 05 1e ab 85 d6 6f 92 8b 8b 06 7e e2 32 18 1f | 9e 03 0b 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 71 5b 13 d9 03 56 0b 94 2e 9b 60 60 | d4 0c 9d 62 4a 5b 9a a3 00 00 00 1c 00 00 40 05 | 8c 55 6f f9 09 4d e0 77 bd 22 46 44 fb 95 c0 d9 | 83 9d 9f 2c | libevent_free: release ptr-libevent@0x7fb36007fb40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012890 | #727 spent 0.0914 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #727 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3500300a0 | handling event EVENT_RETRANSMIT for parent state #749 | start processing: state #749 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #749 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #749 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #749 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.21975; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.999328 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012890 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #749 | libevent_malloc: new ptr-libevent@0x7fb36007fb40 size 128 "road-eastnet-nonat-176" #749: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #749) | 21 cc df 44 fb 91 db 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 1f c5 e8 8c da 2f 71 6f 87 ca 00 ac 50 65 c6 | be 36 51 01 ec 7e 83 51 09 eb 5d e7 2a 9f c8 ad | 66 58 cd 80 0a 9c 72 ee c8 d1 c5 20 4f 69 fb 92 | 13 65 d4 0e 1d 60 b8 43 6c fd 57 62 48 52 03 58 | 1f 30 23 02 a5 49 ac 37 6c b6 2d 96 9d 82 d8 a1 | ba c0 ed f3 40 36 e0 13 52 9d 8e 1c 5c b3 e3 4c | f2 78 1b 73 09 dc 52 b1 42 32 86 e1 28 0b 10 51 | 7f e1 bf a0 7c b2 ef e9 fa 73 6c 5e 12 69 7c 58 | 4e 1b 40 29 8f 20 2b 37 6e b7 c7 d7 63 7b 45 40 | 89 11 3c 89 89 0f b8 3d 1a 1c c1 76 50 59 ab 17 | 87 71 45 bc cb 1e a0 07 a8 8c 7d 0e 05 c2 ec 2b | fb 3c 29 c4 ba ca c8 e4 d1 73 b4 1b 53 de b3 a4 | 21 14 35 6d 70 c0 9f 7d a6 1f 1c e3 7c a8 3e 43 | cc 8e 74 be 9f f4 d4 7a fd 86 b7 9a fc 1b 2b 7e | cc df a5 1f 60 66 33 d4 ff 08 25 ca 1f d3 96 a0 | da 1e 31 8f a3 a2 b0 5a a2 09 c5 ee 5b 37 a0 f1 | 29 00 00 24 ef 4a 18 29 61 bc 8a 68 d0 f0 81 d1 | f3 7e a9 a2 f3 7e 3f 08 52 04 df 8a cd fc 2c b8 | d1 9d 3b c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 60 55 07 b3 0c 17 02 3e a6 d0 be | 6a 54 3c c2 20 5b a4 d7 00 00 00 1c 00 00 40 05 | ab 26 2f c6 c0 76 2f 1d 50 c7 79 f8 11 59 56 a7 | 82 5d 60 bb | libevent_free: release ptr-libevent@0x7fb388090d90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3500300a0 | #749 spent 0.0908 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #749 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a70b50 | handling event EVENT_RETRANSMIT for parent state #750 | start processing: state #750 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #750 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #750 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #750 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.219858; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.996225 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3500300a0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #750 | libevent_malloc: new ptr-libevent@0x7fb388090d90 size 128 "road-eastnet-nonat-251" #750: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #750) | 66 c6 fb f7 91 6b fb df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 56 4e 6a bf ea d7 ce 8c c5 13 f2 30 fd 41 ab | 3e d8 84 16 5c 00 fd 63 27 ec 37 f8 37 ca a8 cf | 61 e7 66 f0 cb a2 7d 48 60 51 06 3b ad 0f 96 30 | be 5d 4e d4 5e 3e 0f e2 92 ad ec cf 0b 28 1c a1 | 4d e9 8b 14 d6 a5 00 40 0b a2 42 6d 65 44 52 2a | ed 7b a2 a6 f1 52 01 55 50 fe 38 4d d1 1e 2c 17 | 6d dd 7a c3 13 e2 07 81 a0 94 d9 59 df 56 84 98 | c0 ad 91 50 e1 93 ec 06 ee 42 aa de c1 18 3f 59 | d8 25 7b 7d 03 a8 7e 0b 39 bd 42 00 e3 0b 12 a9 | 4a eb 7b cb 8d 49 f5 09 cf 9b 5d e6 19 4e c2 da | 42 79 15 bb 81 d0 dc b8 5a e8 5e 28 c3 da 56 65 | 77 9c 71 c2 ab 7d 10 b7 63 49 54 6f aa e7 23 17 | b2 9a 50 85 92 a3 09 71 79 f6 65 dd 01 fe bd 61 | 08 e7 af f9 f6 a9 e5 aa 68 45 84 c6 4c 79 c7 30 | ab 0d dd fd 10 65 03 5c 7a 2c 09 2f 85 16 4e ff | 01 45 23 1d b3 99 fd e2 fa 7d 09 11 f6 28 34 a9 | 29 00 00 24 75 d2 7b 7e 78 57 6c 86 0e 7d 5d dd | 33 fe 29 2d 0e ba 6e e8 a4 16 ad c2 25 40 f7 7b | e3 c5 56 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 5e f7 09 e0 61 ab 7d 99 d0 bc 4e | 5c 13 08 f6 77 48 36 b9 00 00 00 1c 00 00 40 05 | 33 e2 5b 26 c7 f6 e2 7a ac c6 74 73 96 13 44 cb | f2 2a 57 fe | libevent_free: release ptr-libevent@0x7fb34406f6a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b50 | #750 spent 0.0893 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #750 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_RETRANSMIT for parent state #572 | start processing: state #572 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #572 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #572 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #572 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.219966; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.932877 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b50 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #572 | libevent_malloc: new ptr-libevent@0x7fb34406f6a0 size 128 "road-eastnet-nonat-13" #572: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #572) | ae 6d 7f 89 27 62 b0 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 78 66 53 84 1a a1 cc 77 c2 d3 46 14 49 c7 a7 | f9 f4 42 bd ed cc 70 a1 f5 f8 c4 d7 3c 91 88 2a | 3d 9e 83 b6 af 23 02 04 fc 58 e6 76 b8 bc 6f 3d | e3 a8 79 73 32 9c d8 64 d1 bd 4e cb 31 26 96 5f | f4 96 4f ff 80 84 2b 76 9a 2c 0b 78 4d c7 a7 39 | 8c 0b 43 fe 1a ab fb f6 42 71 6f af b4 37 f9 74 | 81 28 44 35 64 2e 59 d7 a3 88 97 bd 34 c6 2c 7c | c1 ef 65 e7 0b bd 37 30 3c ee f2 66 0b 28 7a 27 | 2a ba 30 fb a3 66 78 77 e9 23 14 b0 c0 ac 30 27 | a6 66 34 a1 40 07 ec e7 54 c0 52 99 c7 6b 37 d0 | a0 9a 5a 1f ce 21 9c 3f f8 06 85 27 6f 23 30 ad | 02 4c 8b 40 ed 46 68 4b c8 97 b7 56 b3 69 62 99 | d5 40 a8 dc 62 f6 2f 3e 9e b7 88 dc a5 86 5a 54 | ff 1b 85 38 b9 ed bc 18 95 1a ff e6 a7 39 0a 2e | e7 55 17 cd d1 2c e0 f8 49 15 7d b6 bb e0 3f af | a2 17 66 7c 8f 3c 67 d1 87 3d 7f be bb d3 05 fb | 29 00 00 24 7a 95 97 28 24 e4 3f 20 6f 1b b0 b9 | 00 dc 1a 54 3f 6c d8 cc cd 76 a4 2a 0f 96 20 2d | fe a2 65 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 6e 36 01 db 56 da c9 c9 f6 21 e0 | 9e 8d 5d b9 d9 f9 82 a2 00 00 00 1c 00 00 40 05 | dc 5e 49 c6 b4 b7 74 61 6f 59 0d 14 88 e4 ba 50 | 0e 62 7e 46 | libevent_free: release ptr-libevent@0x7fb34405eeb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | #572 spent 0.092 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #572 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #696 | start processing: state #696 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #696 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #696 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #696 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.220079; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.988189 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #696 | libevent_malloc: new ptr-libevent@0x7fb34405eeb0 size 128 "road-eastnet-nonat-215" #696: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #696) | a2 ff 7d bb ae e4 ff 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 47 a3 9f 01 68 3e 72 d7 77 d8 40 15 bd 56 fc | 1d 68 27 b1 4e be b1 22 9a e8 2a ba 9c a8 46 6d | db 09 7f 12 fa eb 65 08 f4 c9 16 2a 9e 01 b4 17 | 36 05 7a c7 1f e8 46 bc c3 50 58 1c e8 e0 92 da | 73 ba 9e 07 48 d5 9d f2 d0 7b 6e ea 42 6c 81 be | 44 c8 4f 38 a9 d8 4a 5b 62 42 5a 19 4d aa 02 1b | 7c d7 6e f1 a3 07 60 f7 3c 4c ac ba 84 59 ee af | 37 a6 9c 4c 62 92 69 93 89 e7 42 99 74 73 cf 68 | 4f f7 d5 72 0b 6f cf f9 81 78 7b 57 1a 33 23 56 | a4 67 f3 6a 02 58 17 74 48 e2 79 13 e4 bc 15 ce | ff ef 49 6a 4b df 9e 1e 45 f6 1e 93 0d 6d 9f da | 4c 33 f1 96 ea 06 4e 73 51 f1 24 f3 0a 23 b8 4e | 17 12 5d ad 67 9f e9 c9 0e cc 9a 39 38 d0 df 99 | 31 b1 98 f8 83 61 7a c6 bb a0 15 87 10 f9 0e 97 | 6f 73 60 11 87 3c e2 c8 09 90 f8 eb e8 87 a3 83 | f4 d2 44 24 91 0c cf 33 42 d7 4c 2d 4e 98 eb 2a | 29 00 00 24 54 bc d8 ff 7e 29 53 5d f0 b1 9a ed | 1a 65 ef 6c 49 ab 64 6e a4 de ce bb aa 3e 57 0c | 70 a3 44 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 23 a0 ca af 8e 55 b3 fa 06 dd 4a | 8b f7 66 e0 0c 39 a9 54 00 00 00 1c 00 00 40 05 | e3 f3 b4 3a 4a 7c 3a c4 53 8f 78 d7 9c 55 fe 34 | 05 a1 fc 70 | libevent_free: release ptr-libevent@0x7fb37c03e1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #696 spent 0.0941 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #696 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c018460 | handling event EVENT_RETRANSMIT for parent state #672 | start processing: state #672 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #672 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #672 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #672 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.220193; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.984039 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #672 | libevent_malloc: new ptr-libevent@0x7fb37c03e1a0 size 128 "road-eastnet-nonat-136" #672: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #672) | 8a 51 a3 6f 68 f7 9e 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd e0 86 ed 60 a3 d0 a6 8e 6b 9a 00 e5 84 70 47 | 32 b4 99 4f 0d 05 58 a3 bb 0d be c7 e9 7e cd ad | 4f e6 63 7d bb e8 41 3e fc 88 30 2c a3 77 90 4d | 35 a6 66 a0 1a ec 48 93 2f 14 8c 8f fe d5 df 84 | e5 b6 10 27 23 7d 77 97 15 e0 10 30 36 f6 b6 80 | 26 8c 8d 3c 23 cd 46 8c fe 9f 38 e4 8e 1c c7 31 | b5 28 84 af 9f c7 49 71 f9 9b 12 64 93 29 98 16 | 5a 87 88 39 9f ba f9 8b 6b 1a 6c 85 af 62 ca a4 | 00 2b d4 50 98 a6 48 d3 a9 8e f3 da 34 94 7c a4 | 1a 0a ac 81 46 8c 7d 48 0f ab 18 93 af 03 df 02 | df 31 b2 61 3d 21 11 b5 2e d1 3a bd f0 29 fc f6 | 44 a4 9e 23 a0 a5 78 a1 b4 fc 98 b3 83 06 25 39 | 76 e1 3c 9c b7 9e 50 5c cc a7 ac 96 00 fc 08 6f | 31 b8 68 11 66 46 8b 52 dd c4 ea 4d 22 5d d2 e3 | b7 89 33 b9 bd 6c 60 86 ae 27 9b 88 9a 4e 35 21 | 7b ba 09 1f bd a5 fb 07 d5 d4 0b 0f e2 d2 63 bb | 29 00 00 24 10 82 d2 ac eb af 8e 07 dc 69 e2 0d | 6b 97 c2 9b 07 bc 50 39 f2 b6 8e 4f f1 fa 6e 4a | 37 dd 2d 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 8a eb dc 69 3b 2f bd 92 77 b8 05 | 58 f7 11 b4 d0 e4 bf 88 00 00 00 1c 00 00 40 05 | e2 45 f2 76 d6 58 48 de fd 60 b0 02 91 58 f0 cf | 83 ee 8f 98 | libevent_free: release ptr-libevent@0x7fb358079410 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c018460 | #672 spent 0.0884 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #672 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a647d0 | handling event EVENT_RETRANSMIT for parent state #743 | start processing: state #743 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #743 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #743 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #743 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.2203; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.995798 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #743 | libevent_malloc: new ptr-libevent@0x7fb358079410 size 128 "road-eastnet-nonat-233" #743: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #743) | 33 68 6a 0b 04 fc 21 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 54 1f 6f 5a 66 3f c1 42 1d 47 28 fc 43 9c 32 | a7 7f fc 41 a3 9c cc 7a 93 57 ab c6 8a a7 f4 3e | 46 34 bd 6b 98 5f 8e a7 fe 4c 9b 90 ee 04 ee 86 | 42 1c 02 b1 27 a7 b0 01 e0 8a 3e cf cb 39 6b a0 | 4b a4 c4 0c 65 cc 28 25 a4 ad 65 49 aa 92 21 1a | 8f a6 23 05 37 8d 6e d1 a2 88 57 12 d3 e8 bd 69 | 1c c9 0b 75 f5 df 2d 58 5e a5 72 a2 fb 4c ca 52 | 9f 85 66 7f 63 b8 02 bf d7 3e a0 09 53 f4 72 19 | 87 d5 3c cb be 53 b9 59 65 7c de 29 3e 98 f6 97 | 02 6b 58 24 68 71 6e 3b d0 92 ea b1 ac 32 a9 28 | 8e 3a 77 35 b3 34 3c 3d ad 6e 6a 29 9b b7 88 7b | 86 bb 62 15 16 30 35 3d 78 71 08 9c bb d0 51 c0 | 23 56 79 b7 91 8c 7a d0 c1 ec f6 00 b7 6f 72 d8 | 4c 61 2d 3e 9f 3d 71 4d ce 0f 50 83 03 11 bb 0a | 99 e2 07 9c b6 80 4a 86 5a 9a aa 9c 1b 0a e1 e2 | e8 d9 11 28 45 53 df c8 4d 16 ae c0 7c 32 f4 11 | 29 00 00 24 1a c2 58 3c 56 a7 f0 5a d9 b8 5a 6b | cc b3 c9 3f ec 7f b9 16 85 28 70 f6 0a 4a 2a 42 | e9 0f c0 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 52 f6 73 3d e6 8e 99 7b ad bf dc | 06 39 16 3e d4 a9 07 80 00 00 00 1c 00 00 40 05 | d3 9b 09 18 b0 e4 0a b6 7c 3b a5 fa dc 8a ee 1d | 09 1b 83 75 | libevent_free: release ptr-libevent@0x7fb35807ebf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a647d0 | #743 spent 0.091 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #743 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aa5fc0 | handling event EVENT_RETRANSMIT for parent state #712 | start processing: state #712 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #712 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #712 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #712 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.220407; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.987607 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a647d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #712 | libevent_malloc: new ptr-libevent@0x7fb35807ebf0 size 128 "road-eastnet-nonat-194" #712: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #712) | cc 56 db b7 23 55 ce 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 df 8d 7e 48 22 64 49 fb b5 e2 a2 dc b8 50 4b | ad 6c 59 bf 7f 2d 41 f4 f2 ce 30 80 51 45 ce 32 | 71 a3 c4 d8 bc a9 37 56 1f 5e b7 0b c3 7d 7a 94 | 96 5b f0 c5 d3 95 0b ab 37 3c 2b 1b 89 34 d4 8a | bb f5 48 cc ec 2c f3 5d b9 8c bf f8 d0 8a 72 43 | bc ac 8b 06 75 12 f2 db 3b 73 18 e9 5c ba e8 72 | fb a8 ce 9c c0 4b 82 4f 9a f1 5a af 77 31 0b 07 | 66 ce ea af be 31 11 ca a5 70 ec 43 3f c8 a2 17 | 44 95 1d 13 29 48 51 d8 f9 1e 06 a1 cf e1 54 e5 | 99 68 5c 3a da 63 33 ed 4d d2 25 dd 51 25 1a 08 | b9 43 e0 11 8e 0a 46 c6 51 cd 58 79 c0 d9 94 c1 | 9e 7d a5 08 99 f8 a7 56 cc 9a d6 3c c1 7c 79 1e | 4b 40 9d a4 b9 7f e5 00 44 51 bf e8 b1 5b 15 8c | eb 58 e0 f9 22 15 0c e8 84 6d 51 2a c6 4a aa 29 | 1e a4 72 7c 08 fa b1 ea d1 7f 66 aa 4d 4f fb 0c | fb 1b d3 9b f8 9a 00 a8 9d e6 49 e0 43 79 c6 38 | 29 00 00 24 22 6c a7 ec d0 85 2e 53 64 0e 79 9f | 11 86 be 1a d4 75 b2 6e 35 aa f3 7b be 0d d6 fa | a5 73 61 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 88 55 31 03 a8 f3 ca 6b 47 12 f6 | 0d 9b de 88 5f ca 38 91 00 00 00 1c 00 00 40 05 | 71 a5 54 81 8c 44 b1 23 48 73 5c a0 27 0f b9 ea | 05 8d 05 a3 | libevent_free: release ptr-libevent@0x7fb354085700 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | #712 spent 0.091 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #712 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38000f8f0 | handling event EVENT_RETRANSMIT for parent state #688 | start processing: state #688 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #688 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #688 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #688 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.220516; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.993657 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #688 | libevent_malloc: new ptr-libevent@0x7fb354085700 size 128 "road-eastnet-nonat-95" #688: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #688) | df 64 65 78 b0 09 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba 99 2e a4 d8 11 11 ec bc 09 70 a9 ec b4 08 d9 | 97 c0 f8 d2 7e e6 f4 f4 ec 88 8f c9 01 b5 07 63 | ab 96 32 f0 d1 ff d5 71 24 2d f7 10 7e 41 d7 9a | 8a 31 5b f5 cc 4d 4b 6e e0 fe cf 09 59 ae a0 75 | ed ad a8 fe 11 4f 77 38 0f 3d 73 54 64 5c 86 e1 | 4c f9 f7 be 0f ad 2a 08 14 2f 01 cf 99 bb 08 03 | e1 c1 46 1b 92 0e 69 b0 d7 e1 d7 63 33 81 c3 c3 | 6e 9a 75 ae ba c8 31 37 9a f9 f5 59 d2 c3 7c 07 | c0 44 bd 67 c4 36 13 82 f6 9a 1b bf dd 19 d3 a7 | 1f 9b af 3b 56 e1 48 c3 b7 44 f8 fc bf eb 18 f9 | dd 29 49 e7 68 79 bf 94 71 6c ee a8 79 a8 b8 32 | 64 f6 0a 92 59 a9 6a 2e 51 22 2a 8f f3 dd d7 01 | 71 66 37 a9 16 dc 8f 9f 9b 19 8a 04 d9 aa a9 68 | c6 3a ea 8d fa b5 5a 51 76 f8 d4 87 5a cd c9 16 | aa cc 2c bc 9b 24 ad be ac cc ef b3 e1 6c 96 1e | 04 cd 1e 40 8a 89 0a d7 df f5 fd 0b 78 38 cd 04 | 29 00 00 24 07 2f 3c 32 0e aa 94 89 c6 1e 84 b9 | 47 5c cc fe a4 33 57 f3 0c 87 82 2a 55 07 2e 5c | 6c 57 05 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 20 1b a3 63 d6 96 1d 79 a9 7e 61 | d3 77 77 fd 71 9f 38 b2 00 00 00 1c 00 00 40 05 | 2c 04 dc 98 db ed 3b 9d e2 b7 4c 25 55 c5 d8 4f | 0d e0 01 76 | libevent_free: release ptr-libevent@0x7fb35c0cfb20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | #688 spent 0.0916 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #688 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348018100 | handling event EVENT_RETRANSMIT for parent state #725 | start processing: state #725 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #725 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #725 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #725 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.220626; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.993384 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #725 | libevent_malloc: new ptr-libevent@0x7fb35c0cfb20 size 128 "road-eastnet-nonat-196" #725: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #725) | 64 5e 88 2e 86 68 44 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 59 d0 5b 9b 94 b3 86 8e 64 38 5a 09 d0 e8 64 | cf c2 d4 15 da d7 21 e6 4e 8c 6b 11 1e e8 ad 65 | 2b bd ab d1 ec 70 ff c8 0d e9 d2 07 ec f4 0b 5b | 5f b2 e7 3b 24 74 0e e2 94 9d 3a 23 3b 5b 55 7c | ed 09 9a e3 6a ff ac 51 22 72 69 81 f0 1e 34 21 | 12 8d 74 23 22 5b cd 06 6c d7 75 d8 45 5b fb 4d | 85 65 7b 46 e7 aa 98 f1 74 d1 b6 9f c8 d1 7d 99 | 61 08 9e 85 6a 83 33 63 c7 3f bf f2 9d 91 d4 fd | 7f 40 06 4e ba 07 60 0b 06 c4 8b f3 84 f7 92 b4 | 2d 08 89 d4 0a 59 ef cd d0 85 03 6f 8f 85 c5 8e | 7e 4a 7f 5a 22 e5 ce 0e 62 2d dc cb f4 3c 17 f0 | 27 f6 d1 42 16 70 1d 6e 7f 4e 76 12 9c d6 e4 08 | 70 2a 6c f3 42 1f 73 22 fe 78 46 af d0 cf 5f fc | f9 7d 2b 8c 1f b4 95 d9 11 2f d3 5b 1e ac 55 2b | 9d 0e 3d 6a 04 9d 00 d0 a8 13 41 91 76 fd 15 44 | 39 7f 60 0b fd e8 a5 da f1 73 89 3e 95 bf 44 8f | 29 00 00 24 65 31 0e 50 dd ad 39 44 4e c9 44 5c | 03 5d cb 07 2b 3f e9 f7 c8 48 35 5a 83 42 5a 7c | 08 53 78 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 e1 7e 60 6f 94 83 21 09 67 4d b9 | 49 66 ea b2 f6 c4 46 b6 00 00 00 1c 00 00 40 05 | 2e 88 34 b2 e3 1a 64 25 09 3f 69 42 1a 75 eb 83 | 23 7c 1f dd | libevent_free: release ptr-libevent@0x7fb3480720d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348018100 | #725 spent 0.0886 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #725 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36801fda0 | handling event EVENT_RETRANSMIT for parent state #737 | start processing: state #737 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #737 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #737 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #737 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.220731; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.995565 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348018100 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #737 | libevent_malloc: new ptr-libevent@0x7fb3480720d0 size 128 "road-eastnet-nonat-189" #737: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #737) | 62 bc 01 e6 ef 5b 20 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 66 85 a0 b2 da 45 c4 c8 86 e8 bb 58 04 8f 23 | c5 98 b3 86 8c d9 3d e0 66 ea fd 6e 98 4b e0 01 | 77 7e 62 b4 42 d4 3c 39 34 2b 32 9b 48 02 57 f1 | 43 d9 98 13 95 5e 59 11 5e 01 ff c9 1c bf 20 5a | 97 da 26 ae e7 18 db f7 f0 a0 b8 39 fa b2 27 ca | 76 61 93 73 f9 9f 90 66 03 e2 33 bb d1 e7 63 33 | f7 1f 47 9d 66 dd ce 29 e2 ce fc 79 7d e1 df bf | dc 9e e5 af eb e9 5f a2 61 50 44 f7 b3 6f 62 6a | 00 64 f2 03 7d a9 73 95 eb b3 13 a0 cd 38 e6 bc | e6 82 cc 57 4f 84 63 cc 7c 55 1b ca b1 df c8 fb | 40 3b 1d 30 71 fc d6 dd b0 87 15 c1 2d 4f 62 0a | d3 3f bd e6 06 ca 4b 23 74 c6 f0 8a 6c 6c 87 c0 | a3 d6 77 77 fe 47 ed a9 72 bd 08 ac d9 3e 17 96 | 30 05 c0 a7 7a 4d 24 f3 62 68 cf 5a 4b 4a 82 ce | 23 28 f5 14 67 63 ea 32 5f 7d 39 c5 98 d8 43 3b | d9 8b c6 31 05 9d c5 e0 94 47 37 b4 5b 9f 31 c8 | 29 00 00 24 05 60 52 c6 c7 57 70 5a 1b 6b 34 82 | b5 50 99 7f 74 f0 48 4f 7c 17 db cd 98 c0 39 1a | e7 e2 cb 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 ce 96 b7 f8 31 73 c0 a8 ac 4a 38 | e0 6c fe c9 12 67 fe 8f 00 00 00 1c 00 00 40 05 | 2c fb 7f 58 95 5f 54 36 dd 15 01 4b 74 42 c4 35 | a5 03 67 5a | libevent_free: release ptr-libevent@0x7fb3680581d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36801fda0 | #737 spent 0.0909 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #737 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35401d710 | handling event EVENT_RETRANSMIT for parent state #526 | start processing: state #526 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #526 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #526 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #526 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.220839; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.91559 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36801fda0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #526 | libevent_malloc: new ptr-libevent@0x7fb3680581d0 size 128 "road-eastnet-nonat-131" #526: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #526) | 2c e7 79 4e 69 36 cf 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b a3 00 42 f2 bb 8f 76 46 c4 66 08 4e c7 f9 b2 | df 25 c1 de 9e 12 de 72 b5 7e 4f 9a 95 62 19 89 | ac 68 cc ad 66 f6 b9 57 74 7f cb 29 ce b4 c5 29 | 7e e8 43 36 2e ad 51 7b dd 36 41 60 f4 e5 14 cc | a6 af 4e 6f 65 34 88 da 72 82 77 c2 a2 36 84 91 | 9b 68 22 79 7f 0d ab 26 4a 42 6f 37 90 81 a7 28 | b1 5d 31 ff 90 46 41 d8 33 de 87 0f 27 a2 30 12 | e6 4d fd 6b 9a f7 c2 79 27 45 5a 1e 6d 1e cc 92 | 13 af fa 4d 53 bb da 63 4a cd 41 8d 7f 7c f0 8e | bb 15 d6 24 f8 58 75 56 83 54 56 f5 f0 c8 22 3e | 06 23 4d f1 c1 3a e0 0d 5a 45 9e e2 63 18 d4 90 | a9 01 18 d9 68 d9 7c b7 d6 21 a4 79 fb 61 05 78 | 3b 9e 6f 30 8b 1e 00 d6 c4 b5 8f db ed 31 3f bf | 84 21 ff 60 e0 96 6f e7 8a 57 1c 58 41 5f 92 3e | a0 80 3c 76 7a 2c 33 23 3b cc d3 da c4 62 04 3c | 5a 2e 98 11 59 53 9d 30 e5 65 ae 85 8a f1 f4 19 | 29 00 00 24 58 2a 43 33 ca da 5e cf d0 c4 3e 45 | b3 97 45 72 b2 67 77 d1 d9 13 d7 0d cb 6a de 8c | 71 91 90 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 12 0a 6b bb 38 2d fe 8d fe 15 e3 | 95 3d 21 61 33 d3 f6 a2 00 00 00 1c 00 00 40 05 | 40 e8 e9 9c 13 3c 3e 2b 80 7f e5 4f 1b 81 50 bc | 99 79 e6 40 | libevent_free: release ptr-libevent@0x7fb35c02e960 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35401d710 | #526 spent 0.0904 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #526 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #648 | start processing: state #648 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #648 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #648 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #648 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.220948; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.962169 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35401d710 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #648 | libevent_malloc: new ptr-libevent@0x7fb35c02e960 size 128 "road-eastnet-nonat-175" #648: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #648) | b9 3d 2a c0 99 78 dc 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 7b a0 b8 ff d9 f3 24 c5 c3 d8 fe 42 9c 4d 77 | 77 a6 2f 14 34 b3 64 24 e9 fd 75 86 48 0e 02 3d | 29 61 ad 94 16 d0 85 d6 e8 56 c2 ef 63 79 8f 41 | 57 5b 33 d0 fc 13 7d 5c da 24 5a b9 25 c8 06 1f | 52 14 77 e7 a4 dc b1 90 16 a1 f9 07 e6 89 42 44 | 14 11 d5 fc e5 92 89 2d 0e 64 88 0c 41 3b 46 99 | d6 26 50 07 c1 0c f4 24 da 69 56 28 7a 00 82 4f | 0c 3a af e9 e7 f5 55 29 53 80 5f 77 a4 ce 23 5d | 9b 10 b0 b2 48 b8 fc ff 0f 47 dc ca e2 38 a1 5a | b6 68 17 c3 f7 a2 7a af f2 60 dd 39 8f cf b9 23 | a2 af 01 98 52 e1 93 81 05 30 fb 55 27 53 74 30 | 4e c5 de 2a e5 a1 62 ce e0 cf e4 81 03 e4 82 30 | b0 0a ce da 25 c7 a9 75 ae 95 0c 31 7d 34 b5 13 | 8d b7 30 4c a2 f5 b0 bd 9f 11 16 f0 69 7c 07 96 | dc 39 0d a1 91 0f 8e 6b bf ba 41 e2 14 8b c7 d0 | 61 8c af 22 83 20 d8 ee a4 27 68 8b 20 f6 53 87 | 29 00 00 24 7f 9a 6e e6 d8 99 8c fa 9e 3a 9d bc | 69 5e e6 c5 2d a1 c8 09 75 1b 7d 75 dd dd b5 32 | 5f 0c 0c 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 5a 6c 36 b7 e3 94 c7 44 df 76 5a | 27 bb 1d a1 14 37 1f 63 00 00 00 1c 00 00 40 05 | cb 53 89 2a 35 01 2c a3 94 35 40 7a f6 29 fc a1 | 5c fa 01 07 | libevent_free: release ptr-libevent@0x7fb384076770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #648 spent 0.0886 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #648 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2cc10 | handling event EVENT_RETRANSMIT for parent state #559 | start processing: state #559 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #559 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #559 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #559 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.221061; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.93079 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #559 | libevent_malloc: new ptr-libevent@0x7fb384076770 size 128 "road-eastnet-nonat-30" #559: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #559) | 14 21 4b c7 8f d5 3b 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df c5 ec fc 7d 5a a9 f1 38 5b af b6 65 71 32 7c | 6c 91 b4 ed fb 0c 87 80 16 02 df 23 7b 3e 1b 10 | 70 0b 39 0c 6a 5c de 3d 87 90 91 e3 83 ec db 5a | 36 ca c8 b2 b4 db 09 7a 5b e9 7a 17 cc c7 3a 24 | 4c ea 7f 5d a9 0a f1 b3 d7 6a a8 13 a7 fa c2 05 | e6 77 9a ba 9d 7b 25 0d 3e 0a e2 5f ff cc 63 76 | a0 6c db 49 af cc d5 f5 f4 09 78 70 2d fe ff ff | cb cc 4a 9b 55 1b 99 f6 dc 93 35 dd 1d 13 21 bf | fd 6a ca 65 6a c0 ff ff 32 f1 6d f7 3e 98 69 a7 | 0e a1 73 ab ab b1 7e 5d de 57 92 d0 6c 78 24 e7 | 4e 0e f0 4a 0a 29 99 48 f2 3b 55 4c 27 2b 57 4a | 87 27 2c cf f8 7a b5 07 06 95 37 75 bc 1a f4 d9 | 3f 9e cd 96 08 50 67 bf b6 80 17 b5 68 83 2a 43 | 38 12 31 e4 eb bb 48 53 dd 1a fa ae 76 4a 72 80 | 49 d3 12 0a 1d 01 90 66 b4 ca 1b 0f dc f4 35 b5 | 43 43 90 7e d3 10 c4 1b 8d 5a d5 a9 ca 5f b8 48 | 29 00 00 24 cd 39 6e 7e 0b cb f0 da d0 22 3b 9f | 55 4f e9 2f 87 09 39 35 5d 79 80 bd 46 82 75 62 | bf 33 d3 f9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cc da c4 44 bb 29 ff dc b3 bb 41 98 | be 72 17 e4 5a b5 73 e6 00 00 00 1c 00 00 40 05 | 45 80 da 9e 17 9c 16 03 77 58 55 5d 48 f1 3a 54 | 40 de ec ea | libevent_free: release ptr-libevent@0x7fb368040760 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cc10 | #559 spent 0.092 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #559 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374045e40 | handling event EVENT_RETRANSMIT for parent state #679 | start processing: state #679 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #679 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #679 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #679 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.221171; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.987174 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #679 | libevent_malloc: new ptr-libevent@0x7fb368040760 size 128 "road-eastnet-nonat-82" #679: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #679) | 21 46 75 e4 c0 e2 30 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 7f b6 62 3c af 4b 1e 98 70 97 3a c8 81 5f 8a | 6e d2 09 4c 84 07 55 d6 a3 fd c0 be 75 5d 07 47 | 8d 3f bb da a3 30 57 a0 7c a7 7f 2e cb 9d cc e7 | 13 3b 5b 3b c7 48 f1 bf 28 bc 38 67 c7 62 8b b6 | 69 be 87 f5 c0 9f f9 a6 02 9e 30 99 da 23 cc 90 | 1e 99 f2 9c f4 fc ed 48 2f 64 79 47 e2 b0 af cd | f7 a8 a4 46 c8 cb 84 62 97 96 25 40 61 19 15 7b | 98 2f 52 d4 70 b6 21 3c 7b e8 bd 11 c7 68 0b f4 | 1b 98 5d 51 c3 19 75 24 08 6b 1c 64 66 29 63 ef | 74 57 1e 26 8f e7 df a7 24 f3 96 46 d3 6a e1 e9 | d3 26 ea bf b7 66 e0 59 a8 f2 90 ba a8 33 d2 5f | aa 5b 61 86 8a 0d 9e 66 48 2c c3 e8 2d e4 2d 40 | 05 91 e1 60 c8 b5 52 b7 df 9b 2c ac 58 37 89 f0 | 51 8b 09 fc 89 ea 65 b5 1d 2a 49 4e 5e 19 42 75 | 54 34 97 85 69 00 2b 59 4b d5 43 ac d7 91 dc c1 | 3b 6a d7 05 fb bf e8 2b 60 16 3b e5 78 45 71 f5 | 29 00 00 24 64 67 4a b2 09 ea 77 4a 31 a5 f9 b8 | 14 17 60 f1 91 48 c2 5b e0 29 39 77 90 07 73 81 | d3 3a 3a da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 d2 62 af e1 8e 7e 27 97 6c fa 7b | 68 37 2f ee 47 da c3 0b 00 00 00 1c 00 00 40 05 | 9d 8c 01 86 03 b8 30 c8 80 85 c7 8b d6 c6 c7 00 | 6a 86 19 60 | libevent_free: release ptr-libevent@0x7fb36806fac0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374045e40 | #679 spent 0.0911 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #679 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46acc140 | handling event EVENT_RETRANSMIT for parent state #643 | start processing: state #643 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #643 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #643 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #643 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.221279; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.960927 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374045e40 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #643 | libevent_malloc: new ptr-libevent@0x7fb36806fac0 size 128 "road-eastnet-nonat-86" #643: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #643) | a4 7a 0a 38 ed 45 0a 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 1b 74 d4 2c dc 83 3a 41 1b 72 93 cd d9 99 ab | a5 3d 31 f7 6e ad 24 72 35 2c 08 59 f7 85 55 ca | 70 bd b6 2e 52 cf ef d1 e9 0c c9 34 5b cf 85 8d | 51 9c e8 d0 53 f9 5f 56 af 23 8b 00 bf 41 f6 62 | 6a 4a d5 2e 51 34 77 b7 47 63 d2 86 3b 81 3e f3 | 91 0f a1 86 aa 34 df 5a 12 54 be 0c ac c3 1e 9f | 58 01 81 17 a2 3b 0b 37 4c 53 7d 23 99 d9 8f ea | f2 0b c5 cd 0a e8 e2 66 37 ad e8 1d 0c de 9c e2 | dd e7 b6 c4 7e c8 77 b9 f2 ed e4 1a d3 c9 66 b6 | 83 5d e5 e8 44 a9 37 6d 05 50 25 5a a4 01 51 b3 | 8f 5f 9b 9b c2 94 66 43 f2 03 b2 0d 87 c8 04 67 | bc cc ed 06 fe 82 6a 3f 3b 17 39 2b 40 cb f6 e0 | 43 79 fe 36 4a 20 93 44 8d 77 96 8a 0b 1e 19 08 | d9 d7 07 85 61 29 11 e7 11 41 78 7c e2 10 eb ac | ba 26 45 60 58 71 fa 59 c0 d3 9c 73 92 fb fa 39 | c8 c4 cb fb 8a ec 6d 5d e5 9d 4b b8 1c c2 a8 39 | 29 00 00 24 57 52 8d 13 2d 29 b3 5e 46 06 e9 1d | 1e 46 ed 46 2e 59 41 8d f8 dd 75 32 e3 62 89 bd | 1f 93 2f 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 26 30 b2 61 08 18 b0 78 81 15 48 | cb a5 c1 be b2 a0 a4 44 00 00 00 1c 00 00 40 05 | 98 48 c3 da 5f a5 9a 05 26 1d 7f 07 40 17 0d 29 | 6b f4 fe 77 | libevent_free: release ptr-libevent@0x7fb338074f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acc140 | #643 spent 0.0905 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #643 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a61bd0 | handling event EVENT_RETRANSMIT for parent state #604 | start processing: state #604 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #604 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #604 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #604 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.221387; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.943922 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acc140 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #604 | libevent_malloc: new ptr-libevent@0x7fb338074f30 size 128 "road-eastnet-nonat-20" #604: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #604) | 9c 9a a9 b6 8a 18 20 aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 db 14 9f c8 04 2c a7 94 4d c0 41 4e 48 db 16 | 43 7e f5 96 b7 92 19 68 4f 28 dd 93 9c b2 03 ee | 00 e3 3a 70 b5 7f 63 e8 29 5f c1 3e d5 1e 9b 18 | 03 51 46 eb e9 1e 7f 95 79 9d a5 6c e6 38 16 02 | 06 77 87 00 da 11 bf 13 c1 4d 3a 44 84 ac 6b d3 | f7 9d c3 0a 19 49 98 cc af ba f2 e2 42 43 00 0c | 55 a9 00 12 93 95 82 e7 62 10 92 7e b5 54 fd bf | e8 83 82 ec 9d 8a 27 cf cd 74 11 b0 80 50 2e c7 | b3 2a ee 0c ca 12 67 95 57 e8 8f db b1 d7 be ea | dc 1c 36 57 ad 82 d5 d6 b8 ca 9d c1 19 69 b7 98 | 1a b0 e8 89 42 c5 72 7b 2c ac a1 8f 37 62 b4 d5 | d1 07 d7 cf 2b a0 47 98 cd bd cd 39 54 ed 85 7b | e7 4a 46 42 99 3a 84 b2 44 0b 60 db 17 1f 1a 47 | 96 ad e7 df 64 10 90 db 2e 4b b5 22 6e b2 0f d8 | ab 1d 9f cc da 67 78 10 6b ef f0 21 60 7f 46 37 | ce e2 4d 55 5c ce 37 f5 05 f9 20 86 fe 7e f4 34 | 29 00 00 24 b3 5a 22 9d ad 8e aa d7 db 87 b7 86 | 99 f5 d3 0b 6d dc 71 e3 8c 25 ed 59 9c d6 d9 01 | 28 70 17 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 ee b6 7a e3 a9 a6 b5 56 be cc 5f | 53 8f bf c6 c1 49 39 f9 00 00 00 1c 00 00 40 05 | 8b 15 2f 3d 66 90 78 e5 b9 a0 df af d9 66 18 c4 | 1f 04 f3 7c | libevent_free: release ptr-libevent@0x7fb380093250 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61bd0 | #604 spent 0.0886 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #604 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a32290 | handling event EVENT_RETRANSMIT for parent state #746 | start processing: state #746 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #746 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #746 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #746 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.221494; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.996 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #746 | libevent_malloc: new ptr-libevent@0x7fb380093250 size 128 "road-eastnet-nonat-241" #746: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #746) | f7 37 f9 ef 73 ab 62 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec d3 29 72 57 bc 83 2e 59 c7 f4 c6 5c 3e da 18 | f6 16 d5 05 b4 32 f8 47 60 e6 d5 e8 a6 7d 89 42 | 82 4a 4c 03 9b 5b e0 5c f4 ec 3b ce 58 3e 0f d7 | 56 dc 82 59 f9 cf 59 04 12 a3 54 12 37 fb d1 ea | 36 9c 13 92 72 99 d6 a7 42 5f 4d 49 ac 8b 2b cd | 32 c7 55 29 46 4d 74 68 cb 5d e1 7e 03 f3 bd 63 | 8b 55 fe bc 55 8f 8b 48 6b 11 21 29 87 1e 76 8a | e2 d8 b8 76 db 47 07 03 9d ab fb c5 6d 10 75 bc | da a7 8f b2 4f 24 eb 9e 43 a2 a3 e4 50 56 93 18 | c4 a1 e9 f8 22 3c a2 54 2e 1c b7 97 b7 4e 3d 26 | 8d f2 a4 30 a8 df 1f 7a 1e 6f f0 e5 f8 33 10 24 | c0 68 75 e5 96 36 ef 47 b0 86 2f 4d cf ea df f8 | 81 cb 73 da 28 a5 cc 66 eb b4 89 33 1e 77 a9 f0 | 20 e5 72 31 64 9b 5f 87 2b 0d c9 49 f4 a8 a7 b2 | db fb d8 02 de 79 32 bf 41 fa e4 fc a6 6d 9e 9c | db 06 92 90 d9 34 01 45 1b 0a 7e 2b a8 ca 95 b4 | 29 00 00 24 e3 e6 84 b9 78 ba 0f 63 d4 48 76 09 | d5 37 c9 85 6c 14 ea c9 21 5e fd 8f e7 46 60 84 | c0 9a 70 f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 43 0b 6f 8b 96 5f 6c af ec fa 55 | 79 2b ca 5d e7 59 20 5c 00 00 00 1c 00 00 40 05 | eb aa 4b a8 95 05 be bc 99 5d 97 8e 1c 2b 9a a4 | 18 3b a4 f4 | libevent_free: release ptr-libevent@0x7fb37804bbf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a32290 | #746 spent 0.0904 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #746 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b25c80 | handling event EVENT_RETRANSMIT for parent state #529 | start processing: state #529 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #529 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #529 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #529 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.221601; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.923125 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a32290 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #529 | libevent_malloc: new ptr-libevent@0x7fb37804bbf0 size 128 "road-eastnet-nonat-32" #529: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #529) | 8b 51 05 ec d8 42 82 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa a4 71 e3 1a bf 5d 84 a4 49 8c cf 55 02 33 3c | 04 56 09 91 2c bc e4 1c 1e 8d 8e 04 d2 0a d7 b1 | 4a e5 e2 44 95 fe 32 42 a2 71 e3 f6 19 58 19 98 | 30 f7 7f 68 aa c8 8b 7b ee 46 c1 c6 c6 c6 f3 ef | 02 5b 4f e7 12 67 eb f6 96 9c 29 fe 91 93 f1 4f | 4a f4 35 c4 14 66 ea 0c db 0c 7f 2e 10 1c 74 5a | 14 56 cb 14 d2 be a1 5c fd 36 cb 04 24 8d de d8 | e8 38 48 30 9f 46 ce 30 5d cf 53 56 66 09 d2 14 | 14 e3 57 c9 a7 57 bf b7 68 e9 aa 2c d3 32 00 e1 | b3 c3 fe 68 f4 77 9f 22 ca 38 99 8f 8b f5 3c d3 | 43 f0 50 78 d5 57 6c e0 ba 1d 44 37 ac eb 5f ef | 6f 86 24 97 13 93 3a 5c 56 88 22 5e 44 fb d8 e1 | f7 e8 74 39 ab 08 db ec 08 ca 20 92 ff 5e 35 61 | 70 6f 87 e4 a0 cf fa 53 19 69 e6 fc 3d 79 2a 13 | 8b 67 ba f1 46 d1 18 14 cc d6 68 98 b6 0e 15 62 | 5c 3f 7b 18 fe dd 29 0e 45 5d fb 88 02 b0 e5 a2 | 29 00 00 24 96 36 53 bc 54 1a 72 c2 86 d5 9a b3 | ea b4 b7 ce 95 13 e3 2c 2f ef 60 48 e2 75 18 75 | 80 77 ca 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 7d 2e c4 18 c7 50 d0 0c 64 64 44 | cf 7c 14 d7 db 29 be a1 00 00 00 1c 00 00 40 05 | df 08 4e 94 1c 1e 0f 0d 40 f7 6e 18 f6 44 35 e2 | c7 6d 58 d5 | libevent_free: release ptr-libevent@0x7fb350082ad0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c80 | #529 spent 0.0903 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #529 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c00cfd0 | handling event EVENT_RETRANSMIT for parent state #624 | start processing: state #624 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #624 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #624 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #624 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.221709; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.956917 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #624 | libevent_malloc: new ptr-libevent@0x7fb350082ad0 size 128 "road-eastnet-nonat-225" #624: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #624) | 91 66 df b6 23 36 44 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 04 d0 c0 52 11 6f 6b 97 d8 4a 21 40 0d a8 d6 03 | 5a 31 7a b1 43 64 89 6d a3 67 7b 89 c5 fb c9 87 | fa b6 99 9f 95 c8 70 ce 70 b6 63 79 83 53 ee 5c | 03 14 79 98 13 a2 86 e7 a9 ca 4e 70 0d d2 78 f2 | 04 e5 33 3e 6c 0d da 0e d7 7f a3 32 5d 10 72 3a | e8 21 c5 aa 25 ec 61 02 13 d9 f2 57 e5 85 e2 36 | 3b 19 f5 73 53 0e 11 80 95 c9 7a c2 73 f9 c3 f1 | 92 7a e8 68 48 16 47 32 d8 fa a5 eb 40 2c 5c d4 | e0 f8 c0 97 0f 60 4c 10 92 41 16 02 1b e9 aa 47 | 0a fb 2f 7e e8 bd 85 fc 57 ea a3 81 bb 29 8c 27 | 15 9c 41 59 04 b5 17 25 e2 28 cf b9 d5 e4 f1 54 | 7e 08 6e 40 8c 6b e0 01 f0 a2 bc bd 6a de 51 92 | 5d 24 cd 29 bb f6 9e c2 d0 13 ad 94 34 1b 3c cf | ae c6 f3 ce c0 2c c8 d1 85 6b 46 14 ce 28 e2 1f | cf 9f 53 a4 1f 17 48 36 04 1e 5f e3 ed 6a cc 61 | d7 3f 56 7a 05 e3 3d 19 c2 99 b2 48 2d 25 92 b9 | 29 00 00 24 20 57 85 7e 38 82 c6 c2 c2 b9 82 69 | 7e 4b 89 c1 c5 70 2d 62 ae 17 de e7 0b 2c 59 f9 | 31 54 7c 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7c de 77 a1 da 64 49 53 60 59 d3 c7 | 5c d0 d5 e0 d1 18 19 9b 00 00 00 1c 00 00 40 05 | 99 9e a5 9c 48 82 f5 4c 18 c3 dc e9 e9 80 6e 22 | 1b 1d e2 41 | libevent_free: release ptr-libevent@0x7fb37807ad70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00cfd0 | #624 spent 0.0904 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #624 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0a940 | handling event EVENT_RETRANSMIT for parent state #630 | start processing: state #630 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #630 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #630 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #630 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.221817; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.967448 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00cfd0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #630 | libevent_malloc: new ptr-libevent@0x7fb37807ad70 size 128 "road-eastnet-nonat-167" #630: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #630) | 7e 20 27 21 e9 84 6e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 6e c1 86 ef 01 ca cb cf d4 54 3a 37 90 3f aa | f9 fd 77 63 7d 3f 32 65 dc 4e 37 40 57 e5 28 ba | bc 68 04 4f 0e 5a 8f d4 7b 6c d8 31 01 31 af 70 | 7b 5e 07 9a cc 86 39 61 db f1 fe 2c 67 ca e6 87 | ee 49 49 c9 ae de 56 6a f7 61 cc 09 1a 0c 64 2d | 8a 63 64 38 db 36 06 2f bf 83 5c 9b 3b 72 ea 77 | 11 54 9f bd 9e 96 60 11 9f 4c 7d 2d 74 85 68 60 | 89 22 b8 8e c9 dc ec 8b d5 1f f0 2e 87 56 1a b3 | 98 52 91 5f b4 c4 5a 2d 4c 8e 2a 9c 04 b4 0f 8f | ba 3a a8 bb 3a 61 d4 4f bd 6e 59 87 ac 42 74 36 | 1d b4 a7 a3 ac b2 f0 31 4d 5c f0 20 80 d9 fb d8 | 99 ed a7 f8 3d aa 61 cd 50 cc 92 53 dc 7d 29 df | 97 52 04 ff 96 9f de 81 2e 64 0e 76 34 9d 05 2a | 60 5d 08 77 dd 6c c0 5f 2b 7a ca 90 dd 00 b8 d0 | df 90 44 71 93 d3 cf 23 7d 74 29 93 b8 60 2e c6 | 85 82 66 37 7d 41 f3 a2 35 e0 e4 2d 9b 02 5f 72 | 29 00 00 24 f5 41 2a 41 21 19 72 0e 4d 58 ec a2 | aa 28 84 44 db 30 74 6c 53 17 b0 90 75 8e b7 a5 | 64 9e f4 ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 7c 2b 60 60 10 f7 1e 72 a5 e3 04 | 6f 3b 05 1e 2d 25 81 27 00 00 00 1c 00 00 40 05 | a3 09 0e 65 34 53 77 41 1c 34 0f 5b 12 a4 a5 f9 | 2c 10 ce dc | libevent_free: release ptr-libevent@0x7fb350098a50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0a940 | #630 spent 0.0884 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #630 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb344017ea0 | handling event EVENT_RETRANSMIT for parent state #748 | start processing: state #748 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #748 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #748 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #748 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.221923; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.003174 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0a940 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #748 | libevent_malloc: new ptr-libevent@0x7fb350098a50 size 128 "road-eastnet-nonat-213" #748: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #748) | 55 e3 5f af 64 96 c1 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 49 74 0b 85 d8 7e 22 f4 24 c6 c4 1e 33 2b 72 | de 21 d5 d8 32 fa 23 15 bc cf cc 93 06 5f 8f 3d | 33 17 cb d5 a3 91 ea a4 08 ea 77 c4 ba 4f b2 c8 | 77 bd 77 0a 64 bf c5 2e 63 22 69 74 77 90 c3 c0 | 7a 1b e6 e3 83 ec f7 b8 33 a0 30 ad 02 6a 84 e6 | 8e 7d 03 00 5b 0a 7e 62 09 5c 74 87 75 30 51 f1 | 91 ec f5 7e 8c 61 42 33 40 a2 94 e7 01 8f e2 79 | 76 aa 01 17 97 36 fd 8f 9e ae fe 3a e2 ba f3 af | 94 c5 f1 a9 e6 63 f6 f6 a1 03 7a 65 00 af 54 11 | e5 00 90 3d 36 87 b9 d1 e9 b5 0a ae ab dc ad a9 | 87 ae db d2 e4 c6 98 b6 7b 34 1d a2 a1 16 a3 c1 | 3d 22 9f bf 31 7c 8e 58 98 5c 80 18 f1 bc 29 9b | ab 82 89 c0 f7 55 bb a7 65 83 55 92 1e 57 97 a9 | dd af 8b bb b0 b4 5a 7b 30 5e b0 29 47 2d 2b 9e | 77 6a 4a 54 93 5f 70 12 2d 60 4f 4a 49 09 0e 01 | 86 63 18 ee 62 60 24 64 c2 a1 ed 84 95 08 03 88 | 29 00 00 24 01 dc 8e e5 8a ed 55 ae fd 55 02 d3 | da e9 1f 52 6e 45 d8 c4 f0 34 cf 2c 20 9a e2 e3 | 81 59 db b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 15 26 72 3e 77 b9 07 bc 5d 56 07 | da e3 bb 84 01 39 7d 04 00 00 00 1c 00 00 40 05 | ed b0 75 8e 7f b8 61 e6 fe 70 60 49 2f cb 06 74 | 34 38 55 35 | libevent_free: release ptr-libevent@0x7fb33807a710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344017ea0 | #748 spent 0.0901 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #748 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b07dc0 | handling event EVENT_RETRANSMIT for parent state #635 | start processing: state #635 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #635 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #635 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #635 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.222031; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.959403 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344017ea0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #635 | libevent_malloc: new ptr-libevent@0x7fb33807a710 size 128 "road-eastnet-nonat-245" #635: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #635) | 7e 0d 8c df c3 48 2b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 a1 90 94 fd 2b 95 44 1e 0a 6b 25 9f 00 c6 33 | 1e ef f6 4c b7 2f c3 a0 8a 85 0f b9 65 4e fd c3 | 6f 15 46 90 ab 4b 13 e7 e6 d2 34 d9 3f 71 a3 f3 | cd 4c de d4 e9 48 5f 32 4d 9a 30 7d 41 3c f4 79 | 2b e5 fb f0 14 ee 8a ae 09 42 b4 cd 39 a0 45 79 | 5d 03 2c a2 e5 66 e1 29 75 bf 9b 52 cf 30 44 50 | e4 1e ec 62 13 8a 29 5c 79 38 61 1b 99 bb f5 ca | ba a8 ac e5 19 04 33 7f 0c ca 09 aa 4c 3f 3e 06 | 33 f5 34 0d 4c 70 6b 06 18 e0 d0 1f a4 5f d7 bb | 48 ac 37 e5 66 fc 98 e8 57 0b a6 aa d5 88 82 ce | a0 e0 65 8b 7b a6 21 bb 33 66 9d 59 e2 1a 7d a1 | 33 19 a0 59 78 92 a2 99 a5 c2 35 39 ef e5 ee ff | 5f 64 b6 1d 72 92 df 75 1d 12 54 49 29 61 d0 c5 | df da b5 fe 52 67 91 82 3e 1f de bc 3d ae 33 1b | ad 82 07 a5 31 1d 91 23 7e 3c 96 a7 fb 7c 82 d7 | 17 7f 18 90 98 0c 8a 7d 26 5d f5 1b b6 e0 92 52 | 29 00 00 24 e3 02 e0 90 9a bb 82 bf e8 0d 7e 04 | 6c c4 fd f8 c9 9f eb 32 5f c2 f7 1b 33 85 e7 b3 | 07 22 69 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 9c 4d b9 97 4f cd 1b fe 43 15 63 | 13 30 6d 7b 9c bb 08 d9 00 00 00 1c 00 00 40 05 | 77 b2 bc 43 f1 e9 b3 25 e4 85 b2 70 d6 0a 47 cd | b1 cb 75 30 | libevent_free: release ptr-libevent@0x7fb3380856d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b07dc0 | #635 spent 0.0944 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #635 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #713 | start processing: state #713 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #713 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #713 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #713 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.222148; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.991494 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #713 | libevent_malloc: new ptr-libevent@0x7fb3380856d0 size 128 "road-eastnet-nonat-207" #713: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #713) | 20 dc 25 60 99 b6 74 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 1a 96 8e da d9 76 91 00 af bb 9d 79 5c a7 f9 | 26 9d cd 16 f2 cf f0 0f dd 87 89 cd 98 91 eb 12 | f7 47 01 49 c9 0c ea 1d 57 4d 8d 91 7e f9 5c 7d | 62 0f af 55 c6 bc 19 04 21 c1 da f5 0d b7 e3 c7 | 41 ab 99 a5 b4 0f 24 bf bd 73 7a 98 7e f2 66 cc | 39 17 ee 34 24 36 ea 24 e3 a8 cd 1c e6 e8 5a 7f | 02 cb 52 c1 dd 90 79 6c 09 65 91 9c 65 f3 ff 96 | 37 cb cc 02 51 48 e0 ea 49 21 16 ff ee ee 96 24 | 7e bc 47 96 21 d4 d4 e3 da f1 b1 67 58 e0 84 dd | cd 55 51 7a 46 9a 9d 6d 24 17 4a d7 b1 02 0a 7c | 2b 10 29 49 15 25 a5 35 a0 5f db 1c 3f d4 d5 d1 | ba 0c e0 43 cb 60 ff 0f 6f 32 b4 f2 ed 61 11 ce | ac 22 75 61 4c 15 28 19 61 92 f0 56 38 fd 6f 8d | 1e 94 22 c4 ed 8e 7c e6 0e 10 58 4f 8b 71 f0 63 | d0 57 19 ab 38 9b 18 02 96 06 c0 6a c4 51 d7 5c | d1 98 c8 9d dc 57 3d 80 8d bf 2e ee 62 b7 a7 01 | 29 00 00 24 44 80 b4 97 28 30 0f ac 4f 85 8e 79 | 66 f6 8c 9d 57 3e 45 8b 53 c5 51 08 e9 85 21 22 | 22 bd a5 bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 16 73 ae ce da d8 0d 5b 76 05 8d | 10 2c 6d 16 83 97 d4 49 00 00 00 1c 00 00 40 05 | 1b 17 49 13 60 8d 27 d3 b4 e3 12 fd 7c ef 9d 70 | 2a 84 34 8f | libevent_free: release ptr-libevent@0x7fb38007a830 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | #713 spent 0.0889 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #713 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c01fda0 | handling event EVENT_RETRANSMIT for parent state #615 | start processing: state #615 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #615 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #615 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #615 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.222257; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.957939 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #615 | libevent_malloc: new ptr-libevent@0x7fb38007a830 size 128 "road-eastnet-nonat-25" #615: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #615) | 3d 12 6d 03 9d 3a 3f 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f f9 00 4e 05 17 74 a7 73 6c 7a 55 de e3 3f bc | b6 50 d8 da 7f 1d ba 94 53 90 d9 17 e3 56 27 62 | d4 43 27 60 0b a1 f0 f9 c0 27 e9 0b e3 82 e7 85 | 80 6a 81 03 53 c7 b9 23 a3 5a 6b a7 5d 76 6f ac | e9 13 02 5b 79 2d 66 7b ff 5c a6 74 d0 95 c7 c2 | 71 fc d6 11 6a 39 e5 64 21 9e b5 4d 11 be 89 8e | 5d 20 22 f2 57 1a ae e9 d9 48 ed e3 e5 74 a0 a2 | cc fd e4 70 7c a3 dc a0 27 e6 f1 f2 c5 fb f1 1f | 79 67 f9 17 79 f4 c5 25 d5 53 79 6f 85 2b eb a0 | 27 7d 23 ed 74 15 b9 2a 82 05 20 2b bb 1e 36 fe | 50 40 25 d6 98 23 b1 bd c4 a8 9d 60 26 d6 0b 43 | 16 dd 68 58 c3 dd 64 ba de 9f 7e 50 5f 81 e9 94 | aa 7d 9b 9b 86 a9 b2 65 a2 14 57 a5 2e a6 24 6f | 4f 4e 8d fb e6 1b e7 3b 6c 59 92 d8 48 02 79 8d | 9b 5b 3b 8c ae fc 09 50 ce 87 b0 23 2c d7 e5 44 | 3c 8a 3a 64 cd a6 2c 8d 5b ba 46 2d 2c b5 ed 4c | 29 00 00 24 7e 29 69 54 1c 75 9f 10 bb 76 c9 d5 | f4 45 3d a6 cd bc 36 61 89 98 84 20 31 27 44 33 | 6a 69 46 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 49 5e 77 cc 13 4a a8 38 41 6c 23 4b | 5b 37 4e ff 01 d4 b9 94 00 00 00 1c 00 00 40 05 | 52 22 03 e7 9f c3 e4 87 eb 62 51 6b 10 18 8d 12 | 1a 37 2c 77 | libevent_free: release ptr-libevent@0x7fb38400f680 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c01fda0 | #615 spent 0.0884 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #615 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c009690 | handling event EVENT_RETRANSMIT for parent state #586 | start processing: state #586 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #586 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #586 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #586 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.222364; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.930575 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c01fda0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #586 | libevent_malloc: new ptr-libevent@0x7fb38400f680 size 128 "road-eastnet-nonat-2" #586: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #586) | 9a 3d 1d 73 e3 e0 91 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 56 d8 cc 60 f7 06 cc 59 a5 66 b8 41 54 bb 3e | fb c8 6c 81 84 53 c6 13 31 8d 8e 62 d7 09 63 52 | 53 8c bb 8d d7 5b e6 4c 25 af 80 11 96 28 b9 4c | 79 b0 e7 e5 ff 99 62 bc 0e c5 91 68 49 55 47 3c | b1 82 16 08 70 32 cf 34 71 08 a2 e4 fa 17 46 eb | c6 40 a2 fa ed 5d 93 66 3c 04 eb 85 7b a4 b8 ca | 3b e8 d5 02 43 56 8f ae bb 2c 5c 40 78 bc 5f 3c | 52 09 33 a3 7b de 07 81 a6 e1 d6 fc 15 c9 f3 d7 | 80 69 07 14 f2 fc 95 be ee 94 aa 9e 80 73 7e 72 | 64 ba 5c 65 91 2e 13 ae 0a 47 61 89 10 86 9c 47 | d1 e2 cb 92 ce 45 0b 0e 0f d3 3d f2 1d 9f b0 3e | 82 b2 a9 6f 50 82 ad d6 b3 d9 b3 ea 4d c2 73 14 | 44 b9 ba 13 f3 1d 41 25 5f c2 36 55 c0 ee 19 61 | 63 cd 05 72 43 48 d0 6b e9 0e f6 84 a0 68 e3 e5 | 72 da 0d d0 be 28 62 56 c3 0f 94 93 0b c0 ef 8b | fb 62 f1 5b 0e 46 8d a6 d6 94 eb 9f 3d 88 d0 f3 | 29 00 00 24 38 81 91 15 7b 18 f0 d0 cf fd 70 7f | dd 31 76 38 5b ce 20 2d 80 1f cb 93 2f 1b 36 54 | 69 55 f1 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 17 b2 6d a4 83 a8 67 51 74 0a 4d | bc b9 f3 7f 40 a8 af 25 00 00 00 1c 00 00 40 05 | a2 cc 78 53 7b 53 71 df 77 82 fc 3c 31 48 7e 51 | f3 07 f9 73 | libevent_free: release ptr-libevent@0x7fb37c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c009690 | #586 spent 0.091 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #586 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a61c10 | handling event EVENT_RETRANSMIT for parent state #642 | start processing: state #642 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #642 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #642 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #642 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.222472; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.959522 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c009690 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #642 | libevent_malloc: new ptr-libevent@0x7fb37c02a950 size 128 "road-eastnet-nonat-171" #642: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #642) | 28 8b 51 ce ae 5a 3d 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 37 19 62 25 a0 9e 1e 52 48 66 63 35 92 1d df | c7 ff 13 b7 59 bd f6 95 87 8d 26 d9 c9 e0 f7 24 | 26 42 a2 e4 00 1b 68 a2 f9 e9 ac 5d f5 d7 11 4b | 1e 89 7d 46 ef 06 9a 32 1b e9 81 17 06 39 67 f5 | 0e f6 1a 5a 55 9b 1e a5 dd e1 43 76 e8 a2 58 b1 | 28 a6 3c d6 50 38 49 96 2d 91 42 d7 f8 ec 6a 33 | f4 e0 96 4a 58 58 aa e6 0c 5c 8c cb ab 5c e8 04 | a5 a1 ab 68 96 f3 f4 a5 e4 ae 1a 96 a0 9a f9 57 | 56 09 b6 81 96 72 27 a3 1c 3c 27 45 d5 f1 02 f8 | 2a d7 f9 4c 9f 1a a7 8a 5a f3 e7 da 4d 17 8e ac | 96 16 46 81 fd 01 db ca b6 72 84 a6 d0 d8 4e 69 | c7 79 31 c5 90 b9 16 b2 14 19 41 ef d9 1d 68 fa | 44 38 de 48 65 2c ec 8e 99 27 f7 c6 63 4b 60 bf | 8d 63 04 69 ea 6c 68 38 f9 a4 27 bd 15 c4 ec 7f | 0a d6 93 e5 0b 62 ad e0 de db a0 44 2e ae 03 d3 | 4a 90 aa 55 4e a9 22 5e 90 19 cd ff e2 28 23 a0 | 29 00 00 24 cc 92 78 18 36 9d 5d c6 a8 50 3e 53 | b3 db 47 67 8a c3 3b 19 d4 07 41 62 2d ad 79 2f | c7 c6 9c 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 04 bb 7b 41 fb 94 b6 5a f7 bf c5 | 50 0b eb 35 93 8a 85 4f 00 00 00 1c 00 00 40 05 | c2 0f 22 62 b9 53 47 a9 22 ed 80 06 c6 98 27 8a | 4f 90 48 63 | libevent_free: release ptr-libevent@0x7fb37c0596c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61c10 | #642 spent 0.0901 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #642 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a8d840 | handling event EVENT_RETRANSMIT for parent state #715 | start processing: state #715 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #715 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #715 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #715 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.222582; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.994074 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61c10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #715 | libevent_malloc: new ptr-libevent@0x7fb37c0596c0 size 128 "road-eastnet-nonat-169" #715: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #715) | 87 f3 33 9b b4 5a 7a db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 32 d6 a1 b7 3c ef ab ae df c7 c4 47 cf 43 3e | e7 4d 13 2a bf 71 3b 06 70 19 5f 23 cb d2 4a 6c | b7 ad 55 a5 75 a2 bd 13 81 a8 86 77 91 cf 66 64 | 4b df 3a 00 d3 10 2e 7c 50 72 e2 b5 34 23 44 5d | 49 06 3f 61 27 b3 f6 2b 3a 24 b3 2d ad 3e 0b e7 | 98 08 a5 5f e5 eb 5d 79 a1 e5 54 0a c8 0d 72 b0 | bc 43 9d f8 27 f1 a9 ec d6 81 08 b0 58 fa 85 a5 | bd a3 f0 7d 30 fb 04 80 03 dd b7 91 fd d7 85 9b | 8b b8 04 da 0e 45 bc fd bb 40 af 79 c8 eb 61 4d | d1 36 0c 58 d4 5c c1 03 78 d1 4f 99 53 dc 30 3c | 7e 07 1a 87 fb cc 9f e3 42 35 3a 01 7a d8 f6 e1 | 85 49 36 04 18 9c b3 4b 00 44 96 48 ba 1b 91 57 | 4a 52 63 3f 06 c0 7e c7 73 42 05 cf 14 6a 96 99 | ce df 55 13 54 6e 39 b9 b7 60 f2 29 34 ed a0 4f | 37 df c2 18 42 23 f9 6f aa 0b b3 f0 83 72 6b 54 | 39 41 64 39 e0 e8 00 e8 59 63 aa 4c 7c 6e 89 ff | 29 00 00 24 b2 3a 76 ed ee 4c 41 d8 3e b5 c5 39 | 65 e9 8a 6a a3 e0 b7 ad 46 df 99 83 e4 f0 93 01 | c4 aa 3b 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 fe a8 f4 ae 1f 37 b2 cf ca d2 43 | 9d 58 d0 f7 e5 db f0 88 00 00 00 1c 00 00 40 05 | 33 c7 89 bf 1b 04 9e 14 b7 74 ff c8 90 62 35 22 | 26 50 c2 55 | libevent_free: release ptr-libevent@0x7fb370054000 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8d840 | #715 spent 0.0948 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #715 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34003f560 | handling event EVENT_RETRANSMIT for parent state #588 | start processing: state #588 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #588 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #588 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #588 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.222693; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.941835 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8d840 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #588 | libevent_malloc: new ptr-libevent@0x7fb370054000 size 128 "road-eastnet-nonat-17" #588: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #588) | 07 e4 97 ab 5f cb 91 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 a6 96 6f 8d 19 77 3f 7b 52 64 d1 7d b8 c3 32 | e6 45 b8 da 56 a7 e9 08 27 5a 9f 4a f5 65 0f 19 | 1a 87 9c 5a 04 ac c9 78 c0 7b 31 1c 5e fb 7e dd | 49 05 d6 20 6e 0b 54 2a 9b 3f 4c f3 f9 b9 1c 60 | fd 45 61 e5 98 00 5b 9c 76 47 67 ad ea 1b 21 91 | a4 87 87 e0 87 97 79 8f 69 65 91 fd b9 ec ff c4 | 7c e3 32 4b a0 5f 86 aa a7 fa 0f b5 34 1b 73 49 | 66 c8 24 f8 1f 2b 81 c9 03 bd 50 e2 ed f5 66 6c | dd 1f 49 9e f6 da 33 36 e9 d5 b8 a9 47 7f 93 53 | 01 8d de 29 38 fb bb 0d a3 c7 a3 88 35 89 50 ea | dc 06 47 18 09 d0 b1 af c6 f0 7f 06 49 d3 b7 66 | c7 ef 15 23 12 a8 2e ca 41 93 d6 39 56 e0 00 fc | da 04 e7 a4 d5 e6 05 93 a8 c3 b6 60 a2 5e 1a 5b | a7 0a 03 72 c9 af c9 1d 6d 01 5a c0 73 ce 68 f2 | 8a 78 2b 21 30 c3 39 b1 07 f8 a8 5f eb fd ce 8e | 91 c1 e4 7a 50 88 f7 d6 5f 29 3f 29 95 a0 44 e0 | 29 00 00 24 ca ce e1 5c c7 60 0a 0b 6d 35 6a ab | 7c 6e b2 8f 16 80 da 2b 8c f1 55 28 04 49 6c 0a | 9c 6d 0f 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 70 0f 71 4f aa a8 18 56 c1 cb 65 | 01 88 44 d0 16 19 79 73 00 00 00 1c 00 00 40 05 | 52 d2 00 b1 18 82 fe 4a 49 3d d9 d7 7e 4f 87 22 | fa 52 4b 2c | libevent_free: release ptr-libevent@0x7fb340059190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34003f560 | #588 spent 0.0793 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #588 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a97080 | handling event EVENT_RETRANSMIT for parent state #547 | start processing: state #547 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #547 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #547 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #547 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.222786; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.922023 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34003f560 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #547 | libevent_malloc: new ptr-libevent@0x7fb340059190 size 128 "road-eastnet-nonat-36" #547: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #547) | 08 a9 69 6a 37 31 fe e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 70 8f 95 a8 08 4a 05 6c b9 8d 6f 47 8b 04 9a 61 | e0 b5 a7 54 d7 f6 b0 b2 80 21 f1 25 51 d7 e7 f1 | 65 c9 25 83 1a 4e 78 02 4c 52 52 f0 64 27 3f 26 | 0b d2 14 48 53 3f 10 9e f7 fb 83 89 e0 a6 40 c0 | ac c1 d7 6a 50 16 4b ff 1f bc c1 ba b9 50 75 ab | 97 f9 e1 ea ad 67 25 02 53 4f ab 12 78 7a b1 65 | e0 48 35 1e 09 a6 85 b6 4d 5c 49 16 55 30 42 5e | b9 f1 50 2c e6 5b 8c 18 8c 57 4a 2f 85 11 d0 01 | 37 16 99 1c 9d 24 6d 7b 69 12 eb a9 3b c6 79 88 | 71 5a fa 14 26 f9 27 29 b3 23 6c 0a 35 18 d6 92 | af 76 48 1f d6 d0 94 16 fe ec 88 6c 8a e8 d2 fa | 63 24 d6 a1 72 8d c8 45 fa 71 9c b6 4e 87 9a f2 | 3d 51 b0 37 f7 2f 94 b2 eb 33 6a 4b b2 e5 fd 10 | 52 ad 99 ac 91 e9 f8 db bf d6 1e e7 93 ff 43 02 | 2f 77 1f d8 af 33 b2 2b c2 3e 9a f3 55 7a 63 95 | 83 04 91 50 3e b6 71 c0 09 49 63 7e 66 a6 12 8b | 29 00 00 24 eb 3c 18 5d 0c ff c1 c1 a4 88 c6 c0 | 90 96 2d a5 6a 9d d3 7b bb 7c 2c 4c e3 35 60 33 | 3d d4 c2 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 02 45 88 78 27 f3 6f f8 1b fc da | 5a fd 16 4d 6d 84 19 70 00 00 00 1c 00 00 40 05 | 9b e7 b7 66 bc 65 25 34 6e 71 75 59 14 69 9b 1b | c0 b2 09 dd | libevent_free: release ptr-libevent@0x7fb374080090 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a97080 | #547 spent 0.0916 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #547 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370017ea0 | handling event EVENT_RETRANSMIT for parent state #657 | start processing: state #657 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #657 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #657 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #657 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.222897; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.973186 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a97080 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #657 | libevent_malloc: new ptr-libevent@0x7fb374080090 size 128 "road-eastnet-nonat-118" #657: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #657) | bf 48 a9 53 c0 7c 6b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 48 64 7a 76 84 6f 20 71 f2 54 53 61 b4 2f c6 | 54 76 e2 72 67 c3 02 01 5f 84 02 0f de 2d ba 04 | 6b 3c 60 21 8c fd c8 83 d8 de 0a 87 07 82 2c 85 | 16 8f 94 7d 11 fa ef a1 1b 06 7a dc 75 50 fb 5d | 8b a8 18 9b 6c fa 90 67 0b 98 3c ce 23 29 77 3a | 62 14 dc 91 f1 b1 30 3c 50 5a b7 ab a9 84 e0 d2 | ce d6 81 2a 09 a1 f6 27 12 d7 a8 6e 71 b4 d2 a3 | 42 60 96 28 6a 9a 98 b3 00 c1 ce 0e fa 8d 64 99 | 97 f3 81 78 89 04 b5 01 30 ce 7b 3b 03 13 20 ba | f7 13 2c 46 1a 99 04 0c d2 4c 52 fa 53 fc 61 38 | f6 1e 41 8e 82 00 e0 91 48 32 35 c0 7e 73 9a b9 | b3 a3 fd 92 08 58 7d 9d 6f 3a 6b fb 59 79 43 c3 | 78 f1 a6 f1 a4 85 3a d3 46 60 e6 af f5 9f 91 88 | 84 4f 9a 31 88 1a e0 60 7b 5c 36 77 35 25 9a 22 | 0a f3 1b 51 c9 cc 85 ea ce be 58 28 90 39 31 a8 | b5 d3 9f 05 f3 8e b3 99 94 db 0d 61 87 87 60 cd | 29 00 00 24 b1 1a 4e 72 ee 50 9a 55 3a 6a 4a 22 | 5c 8a 27 a4 f8 35 f8 89 7d bb de 47 9d 6c ce cd | de bf 5d e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 93 fd 1a 46 eb 2b 7c e7 8f 20 da | 90 df ff 1b 3f 1b 91 27 00 00 00 1c 00 00 40 05 | 66 8b 83 94 36 8b b6 4c fb 21 d6 7a 66 05 fe c3 | a5 94 ca 7e | libevent_free: release ptr-libevent@0x7fb35c085320 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370017ea0 | #657 spent 0.0815 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #657 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374013710 | handling event EVENT_RETRANSMIT for parent state #590 | start processing: state #590 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #590 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #590 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #590 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.222994; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.938266 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370017ea0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #590 | libevent_malloc: new ptr-libevent@0x7fb35c085320 size 128 "road-eastnet-nonat-59" #590: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #590) | 6c 7d d5 ab c5 87 8a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be 10 c4 6c 74 1b a2 8f 66 7a 62 d2 25 ec 33 a4 | 70 d7 c3 96 b8 a1 45 8b 02 09 80 a1 f3 7c 96 6a | 39 ed 63 55 b4 78 94 49 5f c4 6b a9 d5 4e f8 12 | 1a ac 4b a8 bc a5 a8 12 11 8f ce fd 6b 3c 86 54 | ca cb fd 2b 06 f6 33 36 41 59 16 8d 82 7a 0b 1a | c7 7f c9 82 7b fe 08 af 9f 61 2b 45 92 6c 6e 24 | a4 18 44 e2 17 55 31 77 5a ca 72 7e 7d 88 37 f5 | 6d c1 ab 86 9d 67 6d ea ef 9d 8e 62 9d 65 20 07 | 45 00 55 47 ac 2c 2b cf 33 ff 98 5d e2 f5 aa c2 | 8a a3 0c 25 db 52 4a f6 b5 28 47 29 53 2c f7 88 | 0d de 80 45 88 5f 79 8d 46 fb 55 a7 94 65 0d 0e | 39 4d a1 ad 42 11 ce f5 0f b0 ea 8b 2c be 25 aa | eb 10 3b 8f 68 f9 5b 76 a8 a8 5d fa 34 25 2f aa | fd 6c 2c 9f ac 68 3a 0f c6 e4 89 2c c2 fb 6d 39 | b5 45 cd 30 f2 bb a2 0c 7b 79 29 25 a0 cb 26 59 | 16 3d f7 87 27 3d d0 80 df c0 94 22 c9 92 e3 72 | 29 00 00 24 aa a1 cb 0a e0 68 cf 8d 79 59 07 9c | 1e fd 67 fc d7 c0 41 c5 19 de f2 e4 bb 83 d9 07 | f2 5b 83 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 a4 46 9e 55 3a a4 f8 b6 3f 64 6c | 2c e2 55 62 44 61 35 d9 00 00 00 1c 00 00 40 05 | 79 b6 13 d4 15 d9 80 92 7b c3 42 98 a7 4d 57 09 | ac cd 9f ec | libevent_free: release ptr-libevent@0x7fb33805efb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374013710 | #590 spent 0.0815 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #590 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #576 | start processing: state #576 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #576 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #576 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #576 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.223094; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.933135 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374013710 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #576 | libevent_malloc: new ptr-libevent@0x7fb33805efb0 size 128 "road-eastnet-nonat-100" #576: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #576) | bf 1a 7a 05 9e b9 88 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 6f d2 38 de cc 28 85 5f 41 f2 20 5e 07 0c a2 | f5 9c 80 ff e4 6c b6 4c 70 e2 b8 6a 47 00 73 46 | 8d ba d8 aa 10 38 4b 81 1c 0e 7c 8c 49 18 c5 84 | 17 40 52 e1 d0 c8 ff 2a 4c c5 e2 f4 12 7c df 4c | 72 b8 6e 95 bf f0 54 ad cb e7 72 b2 87 79 19 c5 | 68 98 1d dd 0a f6 a4 d7 0e f0 b6 72 bd 0e dd f4 | 27 a1 d9 12 45 04 fa 90 07 e7 b4 6e 9b f9 be 3b | 8a ae 24 d0 37 a2 53 8e c0 1f 79 b2 4f 1e 64 17 | ea e2 b5 7a 16 8c a0 20 f9 ab 1c da 5d 7f c2 85 | bb fd 14 3c a6 d4 28 dd 60 a4 e5 f5 e6 a1 44 e9 | 3c 8b 4f 83 ea 38 41 29 16 58 25 9c 89 8c 0a a7 | 8c 88 a7 08 b2 d4 73 4c 5c 5f d9 55 aa 40 62 ac | d3 e3 2b a2 04 52 6c e3 f3 4f 50 d4 48 ee 05 9d | 81 ac 23 4e 1e 8c c1 65 13 fb 68 a8 58 3b 92 a5 | 3d 7c 55 6c cc d6 9e 1c 8b 09 aa d0 db 5e 99 f2 | 60 34 f9 74 84 15 60 67 96 e9 e7 3c f3 c2 20 e6 | 29 00 00 24 c2 a9 a3 da 50 4e 4d cf ec 5e 42 2e | d7 97 ed 63 43 1b ac 3c 04 ca 8c 9d 5b af 41 cf | d4 6c f9 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bc 7a c0 1e 2b d3 0d 93 af e2 1e a5 | 35 b0 aa a7 be b0 46 48 00 00 00 1c 00 00 40 05 | e4 10 08 2b 3b dd 58 0c 81 68 da dc e5 0f 44 09 | f0 81 fd 9d | libevent_free: release ptr-libevent@0x7fb344053f60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #576 spent 0.0803 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #576 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36004b8a0 | handling event EVENT_RETRANSMIT for parent state #530 | start processing: state #530 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #530 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #530 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #530 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.223189; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.923748 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #530 | libevent_malloc: new ptr-libevent@0x7fb344053f60 size 128 "road-eastnet-nonat-134" #530: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #530) | 92 e6 33 30 14 4d d6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 f1 30 3a 3b 28 18 17 30 1c 4a 89 10 b7 0d c3 | 7c 77 f2 13 78 da 63 f4 44 e1 01 dc 1f 4a 94 bf | c2 80 6b 59 ab e9 1c 0b d6 b1 eb 32 26 25 2f 92 | 24 9c c4 2a f3 1a d1 be fc b2 3a dd e3 83 df 5f | 41 0b ef 7f cf dc 66 d3 2d 40 e2 f2 bf 97 f5 31 | 9d c3 63 d9 ae d6 1d 0e a0 ea 26 58 86 c3 be d7 | f8 23 f3 04 54 70 65 bb 60 ca 54 65 9a 9c 89 dd | 2b 3b 6f 52 f6 af 1c e7 fc fa 5c 10 bf 1c e0 8e | 98 9f 5b b8 7e d8 4b e3 4d b8 53 23 0d 4f e9 5a | 14 9b 09 2a bf c5 d2 2f 85 7d 28 ac 15 60 25 e2 | 2f ad ee 60 6b dd cf 9c 48 62 b3 c3 75 25 11 09 | 05 3c 28 83 a6 04 85 69 35 a5 1f 5d 22 29 dc b1 | 9a 6b d8 6c e7 80 14 0f 8c 50 7a ac f0 96 90 6a | b3 8b e9 96 09 75 da bc 0c 69 50 ec 31 84 cc 57 | 4b 12 f9 f4 53 c3 5b 32 43 24 09 27 86 a6 40 9c | ba 4c ed 2c 66 0e 26 00 3a d7 7f e7 bb e8 f6 4f | 29 00 00 24 56 d6 30 4a 9e 35 4a d9 63 c1 ed ae | ff d3 7c 9d 97 39 2d 62 1c 2b 5e d3 ab 26 78 e3 | 76 c0 40 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 68 96 99 78 c7 b3 b1 f0 d0 44 83 | c6 69 a0 85 3a 91 92 b2 00 00 00 1c 00 00 40 05 | d6 32 b1 7b 23 65 42 ae 2b 55 2e 89 2e ab cb 67 | bf 37 77 de | libevent_free: release ptr-libevent@0x7fb360053fb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36004b8a0 | #530 spent 0.0806 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #530 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36400cc10 | handling event EVENT_RETRANSMIT for parent state #619 | start processing: state #619 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #619 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #619 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #619 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.223285; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.952092 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36004b8a0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #619 | libevent_malloc: new ptr-libevent@0x7fb360053fb0 size 128 "road-eastnet-nonat-164" #619: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #619) | 7c a6 d3 cf 8d e9 6e 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 41 3d c8 48 51 1a bc 89 19 53 5f a4 19 24 c3 | e3 0b 4a e3 0f 42 45 a6 39 c6 57 d2 6b e7 8a 29 | 54 31 b8 5a 5e ca 20 13 3b 27 d0 a6 e9 27 50 18 | 7f 80 b0 08 d7 99 89 6a 2a 77 90 5c 01 59 bf 6e | a3 42 cd 3d fe 3f 1b b7 a2 59 73 50 4f f0 85 2f | 5b 47 ed 6a c9 c2 de c6 e6 4d 9c 06 4e 79 b3 57 | 16 0b 0c 18 cb 8c 87 3a 4d 2d e4 5d 7e 8e 72 e6 | 03 86 34 5a 38 e7 8f f4 c8 0e 9c 94 be d8 f8 e2 | ef 60 76 3a 11 35 bb 0b 5b bc 7b 30 30 31 76 fe | 82 33 53 86 f3 ab 66 6a c5 76 fc cd d7 c6 d4 81 | da 77 52 29 6c 0d 3b 27 bc ea 05 ef 9f 7f 24 4a | f2 92 aa 2c 32 64 ed de 3d 7a 9f 48 52 5c 8e 0a | 28 51 5e 93 76 ff 56 0b b4 30 27 a7 26 fb 55 52 | 34 7e cd 64 5b b0 5f cd 53 2f 69 37 16 38 d2 bb | 78 bd 71 9f 1a ae 46 cb f0 6a df 92 c7 03 31 5c | ec 23 e4 33 34 45 4e 7d 3b 26 49 2a 7a bf d5 47 | 29 00 00 24 f4 58 66 d0 11 c4 59 15 77 69 0a b7 | d7 fe 50 93 e0 8b 0c 95 ba ce 3e 1f df 8f 0d e4 | a9 fd e1 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 99 32 4f a5 1a 27 a5 94 99 e5 8e | 27 77 64 71 58 de 2f 68 00 00 00 1c 00 00 40 05 | 01 59 22 5f d1 0a 35 23 dd e9 14 d7 40 c3 82 b7 | 4e 2a 35 54 | libevent_free: release ptr-libevent@0x7fb35c074b80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36400cc10 | #619 spent 0.0779 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #619 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46abe780 | handling event EVENT_RETRANSMIT for parent state #653 | start processing: state #653 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #653 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #653 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #653 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.223379; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.964262 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36400cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #653 | libevent_malloc: new ptr-libevent@0x7fb35c074b80 size 128 "road-eastnet-nonat-58" #653: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #653) | 19 90 a9 40 6e 35 eb 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc a0 df ea dc 81 2e 85 84 b3 88 d1 54 50 1f b7 | c9 69 78 56 a1 62 6e 3e 83 05 4c c5 0e 7d 43 19 | 8c 06 52 c2 a8 47 39 7d 94 80 f0 24 21 75 9e 6f | 1a c9 4d 5f cb 04 6f 4e 48 25 b0 ee c9 3a 49 af | 9d 29 53 80 25 fe 82 fa ab e2 2f 9c a5 c4 60 41 | 00 8e d7 94 37 d0 f2 cc f3 8f c9 88 17 25 4b 93 | 4f 2c 01 16 89 ef 44 27 0f 7f bd d6 c8 39 c0 0d | 3b 37 3e 31 8d f1 93 95 ef a9 f2 83 75 f5 e9 66 | df 0e 5e 66 f8 be ce 8f 89 2d f8 24 18 90 ca 0e | ca 2a 03 0e df 25 3b 31 01 c2 15 74 75 2a d5 f1 | 83 43 31 31 83 fe 2a 23 9a bf 63 a0 48 cf 76 6d | 70 1e 06 b5 a1 3f ca 5e e8 cf fd 49 e7 27 8b f5 | e3 c3 9b ac 46 ce 1a c3 b0 62 c4 bf 3b 39 e9 ac | 0a 86 26 cd 41 dc 9e 57 6d e5 3f d5 e0 0e 0d 43 | 19 a5 50 e0 89 79 ac da 12 c8 36 b4 26 48 75 fe | 11 60 3a e4 7f 85 fb 66 94 49 d3 0e e3 76 01 2f | 29 00 00 24 54 ec 9e 13 c5 d8 7a ef 3a 76 6b b5 | 4a b4 c9 12 a6 ab f3 2b 6b be 93 f7 34 95 e6 4e | 7f d1 e9 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 79 56 04 65 8f 33 45 00 ea 05 99 | f8 b0 1e db ca 41 9d cc 00 00 00 1c 00 00 40 05 | 8e 15 0a 12 2a bb 30 1b c7 7c 01 c4 0d 46 64 bd | fa 92 a2 23 | libevent_free: release ptr-libevent@0x7fb380080010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe780 | #653 spent 0.0783 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #653 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b05240 | handling event EVENT_RETRANSMIT for parent state #591 | start processing: state #591 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #591 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #591 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #591 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.223472; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.949952 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe780 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #591 | libevent_malloc: new ptr-libevent@0x7fb380080010 size 128 "road-eastnet-nonat-4" #591: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #591) | 39 b3 48 76 36 79 c8 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 53 5e 8b 64 b9 d7 96 a2 1b 6a 63 75 d7 45 6e | 48 c4 46 eb 28 75 5e f7 ed 53 29 79 34 d4 d9 29 | 02 a5 32 60 5b ab 4f df 45 bd 95 46 90 03 ef f5 | ac db f4 fa d3 e6 26 09 6f 6a c9 87 25 cf 58 ee | ad d3 59 ca 2b 7a 8d ad c4 25 ee 9e 4f af ad 86 | d1 6a 16 30 39 cf 7c 62 83 49 21 82 42 1d 36 20 | 76 98 ff ea 9a 86 5a 8b 11 66 3a 24 b9 6b 76 c0 | 35 10 36 e5 7e d1 0b bc 77 9c 0f 5a 4b 5b 83 fb | 8a 34 bd 69 b1 83 bc 02 8c 52 8a 7a 9a 37 ff 74 | 9c 9b a2 16 a4 04 bd c3 ce 15 56 fe 49 fe 9a 67 | a2 82 10 83 18 d7 84 55 d8 28 d3 5f e0 e8 98 f9 | 81 4a 40 28 8e ad bb d3 fb 65 1b 2e 9e 89 76 02 | ac ff 53 1c ae 39 56 f6 49 c6 01 53 51 d7 b4 78 | 4c fc d4 a9 d7 40 5e 3d 8b c2 c2 3f be e8 7f 56 | f5 bf 7e 5c e0 2b 2b 15 e0 0b ce 31 42 b4 2e b1 | 10 3a 57 61 53 b6 64 5e 01 7e ec 80 4e b8 dd f6 | 29 00 00 24 7e 65 18 45 e0 bd ae a4 9b b7 1f 7e | 50 e9 89 74 0f 3a fb 42 e4 b1 ea 44 24 bf e7 f2 | 99 e4 e9 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 75 97 23 fe e8 31 c4 e6 0a d5 b5 | 9a 0f 0f 77 98 14 56 07 00 00 00 1c 00 00 40 05 | 51 a7 2c 19 bc 86 01 ef e8 30 63 e0 d2 c5 4d cb | 68 30 7a e4 | libevent_free: release ptr-libevent@0x7fb3540647c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b05240 | #591 spent 0.0803 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #591 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34401fda0 | handling event EVENT_RETRANSMIT for parent state #556 | start processing: state #556 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #556 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #556 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #556 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.223567; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.92573 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b05240 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #556 | libevent_malloc: new ptr-libevent@0x7fb3540647c0 size 128 "road-eastnet-nonat-79" #556: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #556) | 7f e0 6f 00 84 26 56 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 15 78 aa 6e e9 58 38 6b 46 1e a0 52 bc 83 d3 | cf 3c 33 de 82 b7 42 a2 2c 21 00 a9 3e 75 eb cd | 10 be b3 c4 82 43 d9 1a af 89 42 df 94 04 7c 60 | 14 3d 7a dd 5f 47 e2 da 24 89 04 06 b4 36 fd d6 | b5 de d2 50 15 a7 a8 36 fa 6f 62 cd 03 73 82 57 | 6a cf 7d e2 0e 29 5a 1b 2a 8a 28 af 96 29 bc 69 | 1a 81 07 d6 ad 61 0f 8a 27 b7 1d 98 f7 93 91 2d | 0d 00 d6 3c 6b ad 6c 9d db ce 11 c2 cc b5 ef e2 | 57 1f 51 2d aa d2 48 9a c3 ef 55 ad d5 6b 90 71 | 43 d7 9d 6a df a5 c6 3e 0b 53 aa ee 23 1e 88 a7 | 88 a5 c2 c5 7d 46 94 a3 b8 f3 c0 22 9f 4e 9c 57 | 20 38 e3 e1 74 97 33 b0 6b 37 ab 55 e4 6b 7f 66 | bc ea 73 65 26 88 f8 d8 07 69 6b 02 07 00 f0 e0 | 04 4e 23 72 d8 dd 96 e9 45 8d c7 f5 0d 29 06 22 | 84 bf e8 45 e1 63 1f c4 d6 f5 dd 33 b2 91 28 59 | 36 36 33 ab a5 81 cd 66 0a 4b 61 b1 5a f0 48 ea | 29 00 00 24 bb f0 c0 c8 4a 3c 83 ba 45 ba d1 f4 | 34 ae de c1 b8 04 dc 84 16 78 e1 c2 d3 f7 29 e4 | 68 26 70 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 84 b1 fb 5f 89 80 45 53 1d b4 39 | 35 8e 65 a4 f5 45 9d 15 00 00 00 1c 00 00 40 05 | 5d 5c c0 4e dd d9 8e 7f 9a e0 e2 3a 80 a4 20 4e | 23 e0 ef b5 | libevent_free: release ptr-libevent@0x7fb34404e800 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34401fda0 | #556 spent 0.0796 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #556 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c01d710 | handling event EVENT_RETRANSMIT for parent state #531 | start processing: state #531 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #531 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #531 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #531 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.223663; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.924525 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34401fda0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #531 | libevent_malloc: new ptr-libevent@0x7fb34404e800 size 128 "road-eastnet-nonat-92" #531: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #531) | 46 30 94 4a d2 7d f5 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 38 ea 3c 3d 5a 42 86 1f 4e 31 dc 26 b4 cb f3 | 28 85 08 ca 2d 95 b0 12 2a fa 18 5b b7 00 b1 7c | bd ff a5 7b 29 c2 33 47 c9 ef 86 d0 13 ba b4 66 | 86 47 b1 11 77 85 ec f5 b7 bc b1 c7 50 d2 1f ca | 94 86 67 69 97 69 09 d4 54 be 95 8a aa ec f2 d3 | 79 b9 f0 64 6c cf a3 3a 0e 4f 10 b3 95 d7 ac 93 | 35 e1 6d cf bd f0 36 31 3d 33 d3 c9 48 4d fe d0 | f1 f6 04 1f ec c5 c6 c2 db 2b ec 57 12 79 39 c3 | 5f ad df 37 fa 08 25 42 22 56 51 36 31 ec 60 0f | ac 91 d0 f7 eb 31 60 3a a8 71 8a b0 59 db 4b f5 | 2d 2b f9 1e 60 7c 79 92 10 60 1f 4d 62 ac de 57 | e1 25 69 68 c7 c9 81 de 74 38 95 72 70 59 28 ad | 3f 83 40 72 25 b0 05 47 0c a8 76 76 31 4f d7 5e | 97 3f 8e 62 12 fb f1 8b 94 b6 25 12 87 f7 a7 1d | 64 44 48 fb f6 a4 1d b5 63 08 35 5b 60 e5 2f 9a | 58 b0 a6 c2 fe 47 0b c1 2e a5 79 86 6f de 86 14 | 29 00 00 24 59 be 45 ef 88 7c 4d 7b b5 b9 64 5e | f3 45 90 92 62 65 99 56 86 22 51 1b b2 80 99 5a | ab 91 ed e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 80 99 5e ac e8 cb fd 27 87 08 89 | 9e ad 1b cc fa 6f da 1b 00 00 00 1c 00 00 40 05 | c1 9e 01 05 8a 2a ce 70 93 29 c8 42 f8 2d b1 4a | bb 93 ae c6 | libevent_free: release ptr-libevent@0x7fb3800598f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c01d710 | #531 spent 0.0775 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #531 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb384043260 | handling event EVENT_RETRANSMIT for parent state #596 | start processing: state #596 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #596 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #596 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #596 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.223756; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.949319 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c01d710 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #596 | libevent_malloc: new ptr-libevent@0x7fb3800598f0 size 128 "road-eastnet-nonat-66" #596: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #596) | bf 80 0e 78 80 27 80 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c 1f ba 68 b5 93 5e 04 79 06 b6 a4 32 e4 68 c6 | 49 40 88 2b 6f 8a c0 9d d9 bc c8 ed 82 28 3c 30 | 4b 6f b2 e3 a8 0d d7 81 63 5c 83 35 fb 65 99 22 | ec b9 c7 f6 a3 1e 0c af 7e 02 44 4c 52 41 61 0c | fe ec b7 48 f0 10 1f 47 9e bc cb f0 0f ec 73 f6 | bf b9 40 d5 39 e3 19 17 5e 22 2d 36 42 33 d5 3a | 1c 03 6f c7 3e d1 3d c3 8f b4 e7 6b 4d ea f9 60 | 41 83 37 ed 6a c3 22 14 77 3f db 39 0c 56 20 64 | 8a 20 ec f2 4b 2b 90 2e 8c 2a 53 89 b4 6a 1f 42 | f3 7e f2 d4 fe 7b 90 df c9 c6 1b 36 f4 b5 4a ce | 0e df 7b 16 66 bc e8 11 d0 0b 0f dc e2 39 28 97 | 4c 94 b9 9e 35 c6 e9 df 5c 0c 47 78 05 93 ac c5 | c4 71 dd af e6 5f df 44 80 d0 10 16 32 6a 91 64 | 98 ef e2 0e ce a7 57 85 68 b2 6e d9 b5 77 88 45 | 6c 4d 65 cf 3b 08 9f b7 f8 9f 35 9c 9d df 1f 59 | e7 b7 04 7d ff 8a de 2a 68 53 fb 71 b7 5d ca 93 | 29 00 00 24 1e d8 84 c9 73 9e cb 5e 05 66 de 35 | 14 40 e8 eb 0f 43 29 df 2b 1e 3c 7f 1a d8 5a b9 | 16 e8 fe 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 33 20 82 d1 8b 7a 7b 4b 2f 8d 5b 47 | cd 08 2a ee bf 4a 9d 5d 00 00 00 1c 00 00 40 05 | 15 0d ca c2 1e 7e 24 48 29 6a 67 0e 8c c8 30 24 | 05 f8 a5 d3 | libevent_free: release ptr-libevent@0x7fb338069f70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384043260 | #596 spent 0.0793 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #596 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c018460 | handling event EVENT_RETRANSMIT for parent state #628 | start processing: state #628 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #628 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #628 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #628 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.223849; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.951705 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384043260 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #628 | libevent_malloc: new ptr-libevent@0x7fb338069f70 size 128 "road-eastnet-nonat-144" #628: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #628) | 95 d4 94 96 e1 1d ee 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f a8 7c 62 17 42 5a ce 42 3d 33 10 fe b2 8a 88 | 92 6e 71 d5 06 86 e5 e0 52 42 37 96 48 d9 83 04 | b7 53 69 af a5 e3 7c 5f c2 d6 49 92 b2 ff de 4c | db ed 7f de 57 21 99 44 40 b6 62 ee 10 52 80 d1 | 26 5f f1 59 44 03 5f 7b f9 65 35 c7 ca 59 14 41 | 66 d5 8f 67 2a 79 18 69 6e a9 93 bc a1 d2 56 44 | d5 a9 00 22 f4 be 24 66 17 90 eb 2f 6c 5b e9 e6 | 01 36 c7 01 8d be 88 5c 2e 67 73 6a 1a 0e cd 08 | 4f 7b 9d 2f 56 a8 13 ed e5 f5 79 24 e3 d4 7e ff | 39 52 47 37 cf c9 b9 cf 2b 76 1e 42 6a 40 6c a9 | d2 de bc b5 5e 46 c7 25 f7 aa 04 2e 75 05 36 b0 | fc bb ae 91 9d b4 fd 45 a8 76 c1 47 2f 9f 74 68 | d6 62 93 ed b4 f8 e1 d4 e2 dc 95 99 70 b3 6e 18 | 5d 8d 13 ec c3 76 44 10 13 a4 af e0 0e 36 d3 4d | 5f 8f ac 78 e4 0b 75 55 f3 aa 1e f1 06 83 57 e9 | 0f fa 63 a2 f0 49 65 dc 20 79 d0 e9 01 99 ce 92 | 29 00 00 24 ef 3d 18 f0 17 d1 14 e0 14 e9 24 e7 | 2b c4 61 c2 92 c3 eb 7a 8f 6c 14 1b 08 5d cd 09 | ea ad df c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 2e b7 bf 2f 19 c5 96 59 16 43 08 | f3 7e 3e 9d 86 2f 58 f5 00 00 00 1c 00 00 40 05 | 25 ae 0e 0b 51 c2 48 e1 f1 ba 50 01 f1 19 07 79 | b9 de b0 4d | libevent_free: release ptr-libevent@0x7fb34005bbe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c018460 | #628 spent 0.0793 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #628 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37802a9a0 | handling event EVENT_RETRANSMIT for parent state #714 | start processing: state #714 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #714 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #714 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #714 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.223943; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.995741 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #714 | libevent_malloc: new ptr-libevent@0x7fb34005bbe0 size 128 "road-eastnet-nonat-160" #714: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #714) | 93 98 4a 9e f6 25 19 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de a8 26 1d 46 1f fe 73 77 0b f1 18 a1 80 90 25 | b3 e7 bb 58 9b c2 81 b1 ff 7d b4 22 75 35 d1 db | 95 9e 84 cb 19 62 62 9a 6c 7d d1 72 a1 fe db ee | 7d a2 91 96 e9 9b 41 e3 91 6e fa 9f 40 d9 46 29 | f7 36 a8 4e 69 27 c4 25 e9 34 b9 04 e1 c7 31 18 | 0b 28 87 c1 77 45 e4 46 53 25 13 33 a7 ac 03 53 | c9 3c 72 4e 74 60 e7 39 94 56 62 6d ee b9 d3 02 | 2a 0c 9a 32 f0 7c cb e2 48 4b 2d 51 c1 e5 58 8b | a8 23 c6 2c 51 52 24 80 0d 7d cc 16 3e 31 9e e6 | 71 52 28 2d b4 b4 3b 62 62 b3 21 2f 59 e6 9d 79 | f7 29 e4 95 de 3d 39 1a 26 63 23 12 ff c0 0a 67 | e7 ee f9 dc 2e f8 9f 5e 66 07 d9 34 2c d6 a4 14 | 99 5a 46 67 f6 74 4b 45 d5 08 b5 1e f0 a5 28 bb | ba 71 8c ef 8d 60 fe 98 e8 fa 14 ba 36 d2 6c 68 | 4f b0 d8 bf 4e 35 1f 41 60 59 db 50 3c 98 8a ba | 0e 23 2e 71 e9 de a7 37 01 ea 4e a2 5e 17 dc 44 | 29 00 00 24 6f 09 61 08 e7 d3 02 a4 23 8b ad 3f | 96 41 5b f2 f4 31 31 36 dc f8 65 88 dd f7 ab 3a | d1 d6 75 ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 ff 9b ec fc 4c 87 67 ce 20 05 7e | da 19 49 e3 4c 6c 24 de 00 00 00 1c 00 00 40 05 | b1 01 34 da ed 80 ef f8 48 f4 33 a8 8a cf 0d 3f | 2f b5 1c 31 | libevent_free: release ptr-libevent@0x7fb3640a1080 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | #714 spent 0.0774 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #714 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad5900 | handling event EVENT_RETRANSMIT for parent state #584 | start processing: state #584 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #584 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #584 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #584 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.224038; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.955659 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #584 | libevent_malloc: new ptr-libevent@0x7fb3640a1080 size 128 "road-eastnet-nonat-108" #584: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #584) | 51 4c b1 7c 25 ce f5 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 ef 1f 70 eb 76 7d bc c3 86 b2 99 57 eb 3f 54 | c8 7d d3 aa 36 79 bf 95 d1 7e f5 bb 68 ed 90 a1 | b9 2c 9e 6e a8 b6 35 e4 01 68 b8 41 06 98 3e 9c | d6 35 04 2b bb 27 bd c4 b6 ed 89 cf f7 c6 f3 c2 | 46 86 3a 37 38 db cf 96 97 e5 a4 50 07 54 e9 4b | 37 df 7c f4 a0 4c d9 7b e1 63 0f 4a 78 e1 d1 d8 | f7 06 cc bf de 67 6f 51 a9 2a 50 9b be 39 51 fc | 92 f3 11 84 91 d8 2b 24 5f 7d 2e 3c 48 87 2c d7 | 4c 9f 31 94 b4 2c e3 04 55 03 e2 7e d5 0a a3 2a | 38 e1 ee e0 a2 7f 56 ba 3e dc 86 f1 a3 6d f0 4d | 52 ba bb 1e 97 ae 75 5d 2c 82 b4 e6 d4 79 e0 32 | 52 cc 28 d9 ea 8b 53 a2 dc 14 d3 22 02 06 5a 89 | 92 c4 13 41 83 c4 64 e9 4c ab fb fe 2b d8 3b e7 | 19 97 67 99 c8 cc 38 fe fd dd 6a ac 4b 3e a4 60 | cb ea 73 88 45 a4 60 2f a9 da 99 e9 bc 21 52 56 | 9e 0a 57 2a a8 8f 00 83 ca de 2c ec 2e 21 e3 03 | 29 00 00 24 a2 77 dc 4f a0 fc 59 33 be 45 2b 9d | d6 90 d3 11 73 91 28 fa 52 9a 31 01 01 35 6b b2 | c2 9a 45 77 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac ee 1f 66 e6 d8 10 e7 e1 61 3e ce | 6a b8 0c f1 92 f2 95 18 00 00 00 1c 00 00 40 05 | 4c ae 03 75 52 09 7f 6a 63 67 68 3c 65 3b 7c 67 | 85 33 51 c7 | libevent_free: release ptr-libevent@0x7fb35c0902e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad5900 | #584 spent 0.0809 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #584 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ae8980 | handling event EVENT_RETRANSMIT for parent state #519 | start processing: state #519 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #519 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #519 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #519 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.224131; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.926593 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad5900 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #519 | libevent_malloc: new ptr-libevent@0x7fb35c0902e0 size 128 "road-eastnet-nonat-68" #519: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #519) | 36 74 88 6c 2b d4 65 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 80 4d e8 d2 d9 23 a3 00 9b f7 df 4f fc c6 6e | 72 0a d6 44 83 97 e4 01 17 c9 8e 18 c2 f3 5d 0b | 06 e3 14 e4 8b dd 35 55 be 4b 2f 8b ab e3 cf ff | 80 24 c8 41 ad a4 91 74 f3 18 71 24 3e 71 ce 42 | 5e 86 bd 65 21 12 dd cb 90 44 9b 3a 9f 20 2e a7 | d0 3f dc 7c b1 53 17 2a e7 d3 a1 43 19 60 0c 5d | a4 8c 8d 56 2a 15 54 29 6b e8 1d 43 3b 4c 9f 9b | 9c 1c e3 58 55 dd 85 2d 50 d0 5a 79 9c 2c 40 b9 | e9 42 08 b9 54 2a 23 6a ed 77 99 24 5b c3 76 38 | a0 98 ca 43 c3 7c c7 63 5d d3 19 75 86 36 2c ee | b6 7d da ed 30 f6 cc b6 4d dc 14 16 ea be cf c9 | 4b 9d 75 9b 36 af 1d fd e9 19 95 e5 30 f3 fb 99 | c9 3b 35 b0 77 0a 08 c3 17 b0 a5 ed 7e a1 52 ee | 73 a2 4a 26 9d 1c 04 4f b7 86 f3 0e 1b 4b 3b 2a | da 3b 8c 88 8e 0d 68 63 4d 3f 3d f1 f7 54 db 7c | 16 d8 87 45 15 1c 36 83 91 f6 d9 2e c6 69 c8 c7 | 29 00 00 24 1f 89 a0 a9 be ce 4e ea ec c0 43 e0 | 93 cd cd c6 83 c2 c6 69 70 37 da db 02 17 df 46 | c3 38 aa 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 b0 da 44 b0 25 b8 4b 8c 5b 4c 67 | 69 d1 51 09 6e 53 b8 b5 00 00 00 1c 00 00 40 05 | 80 05 b4 13 38 cb 24 03 e0 02 b7 5d 8d 12 3d 6f | e6 28 68 a9 | libevent_free: release ptr-libevent@0x7fb388059ea0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae8980 | #519 spent 0.0789 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #519 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34401d710 | handling event EVENT_RETRANSMIT for parent state #614 | start processing: state #614 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #614 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #614 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #614 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.224219; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.961937 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae8980 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #614 | libevent_malloc: new ptr-libevent@0x7fb388059ea0 size 128 "road-eastnet-nonat-47" #614: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #614) | e2 44 b3 0f 15 7b db fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 92 e1 08 e5 43 41 79 c5 5d f0 96 29 52 40 c0 | 97 e5 c8 ff 05 3e 53 fa 62 76 da bc 72 8a b9 4c | f7 18 b8 6a ca 45 53 24 52 f1 8d 1e 49 3a 17 8c | ef fa dc 34 b5 f9 4d b5 58 f3 46 8b 4a dd 09 9b | ea 93 c2 33 65 02 3e 54 93 99 4f c8 fe a6 b2 d6 | af 78 80 dc 24 65 ba 1e a7 5b c2 a5 cc d3 1f 7e | cf d7 a5 8a 8b a8 49 5f d7 0f 85 09 d8 92 ad 49 | d7 a4 fe c3 04 e8 a3 5b 39 08 a0 31 46 6a 16 61 | 4d 3f 91 60 20 e1 05 33 e6 27 94 27 aa 1f fa 73 | 54 7a 93 dc 72 57 0e c3 11 46 f1 19 8d 7f 0c 06 | 3c c4 e4 73 42 6f 8b 92 68 78 39 66 88 cf c0 3b | 5d 6d 07 37 a6 42 2d 6d 6e 59 f0 5e 5c a4 19 79 | 26 9e 6d 08 ab 5d 74 ce eb ad 27 d1 db 09 88 c8 | f0 a6 93 29 46 42 ee 9f bb 5d 95 45 12 52 b4 73 | e2 c1 41 95 83 74 fd cf 99 ef 67 58 02 64 29 39 | da 81 64 9c 6a e9 22 3f 8a e7 56 f4 13 9b 71 87 | 29 00 00 24 86 16 ba 44 69 73 79 7d 89 32 49 92 | 68 97 7e 5d 09 b2 8b 2b eb b1 d6 6b 17 01 84 df | c9 f4 9b 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 2e 6b fd 7a d6 ac c0 e0 4d 65 46 | aa 7e 2f e7 b8 bb 4d 39 00 00 00 1c 00 00 40 05 | 1e 6a 1e 6b b1 89 1b 8c 76 4d 90 e8 7d 48 17 e8 | e9 bf 32 eb | libevent_free: release ptr-libevent@0x7fb3640960c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34401d710 | #614 spent 0.0801 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #614 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38400a290 | handling event EVENT_RETRANSMIT for parent state #536 | start processing: state #536 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #536 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #536 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #536 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.224309; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.926133 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34401d710 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #536 | libevent_malloc: new ptr-libevent@0x7fb3640960c0 size 128 "road-eastnet-nonat-122" #536: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #536) | cd 74 01 a2 39 d6 cc 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 a9 5f 47 01 bf 55 fc bd 36 63 8b 4d da a2 32 | 98 7c 8f 8d a5 10 38 4c bb 7b c0 1e 62 5a 95 3c | ab 87 bd b0 4f 05 a5 81 6d 16 fb ef 76 e7 c1 2e | 30 1a b2 78 2f 5b bb 53 da 79 ff c6 de 33 c0 9b | 96 0d 48 b4 64 0a a9 01 2d 4a d0 58 00 bb 3c 5a | b8 df 75 ac 56 24 ea 3b e4 71 b8 47 a2 58 0d 3b | 32 c1 40 67 d0 eb 20 07 a9 b4 43 31 fd 92 e2 d3 | 5e 9d 2b 29 57 37 d7 12 6b 8f 10 a0 9d 51 1a 5e | 59 dd 2a 2e bf c4 30 ee 1c 21 a4 1f 05 1c f1 ca | e9 cb 39 c8 e2 40 b2 4d 3b a4 95 5b bf 34 0a 3a | df 80 38 7b 51 86 8c a1 11 39 77 8b d5 ae 50 8f | 99 a1 0a e0 bd 3f 7e c9 79 53 04 c1 e3 df cd 70 | 3e 66 c4 67 c1 e4 73 dd bf 1e f4 11 d7 82 43 b1 | 95 c0 67 ed 01 5f 2c b1 0e a8 b7 86 5e a3 ac 38 | d4 97 88 0a b4 b8 8a a9 70 ef 6a 55 78 38 3e 25 | 5b 0e aa fc 57 7c 94 10 43 b3 19 df 16 34 03 61 | 29 00 00 24 13 0a a1 55 e1 40 3c ca 6b 43 9b 8e | d8 49 6d 03 c7 22 e9 d4 6e 01 14 b8 c6 77 b4 61 | 5d 3f ba 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b c5 c3 84 79 53 11 43 e1 cc 1f 7c | 14 ba b0 c9 4b e7 b4 37 00 00 00 1c 00 00 40 05 | 57 c6 83 93 fa f0 1e 53 76 4a bb b4 87 ee 28 a4 | 6c 5a d1 2c | libevent_free: release ptr-libevent@0x7fb35005ec80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400a290 | #536 spent 0.0765 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #536 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34001fa80 | handling event EVENT_RETRANSMIT for parent state #608 | start processing: state #608 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #608 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #608 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #608 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.224396; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.955558 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400a290 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #608 | libevent_malloc: new ptr-libevent@0x7fb35005ec80 size 128 "road-eastnet-nonat-60" #608: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #608) | 0c 40 8a ba c0 95 22 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 ac 32 20 e6 f2 f3 72 0a ac 9e a1 c0 7e d1 9c | ba 7d 04 0a 67 49 79 19 1b b3 e4 99 5c 8a 7f 51 | 2f 8a 06 ea 31 95 52 fd e6 c3 f7 54 3b b3 9d 31 | 27 18 b7 a2 0b 76 60 35 d5 3e 6c b2 60 48 f8 98 | bb 1c 43 2e ba 94 47 ae 1e 5d 46 a4 a9 be fc b5 | 9f 5c 2e 2b 32 a1 9d 84 73 52 7b 19 0f 87 44 ee | 2c c7 e0 19 73 47 89 45 a9 59 4b d7 0d 9f 39 05 | f3 7b a7 83 81 66 77 f6 57 d5 e3 c0 d5 84 80 f9 | ee be 18 01 e0 bf f6 46 34 fe af a5 cd 63 66 6b | de d7 56 46 3a 36 e4 5e 22 bf 64 7d 8c e2 2d 47 | 9e 04 cc 8d 7f d9 cb 06 83 4a e3 29 55 cd 8d 42 | e9 49 18 56 c5 a1 65 6c ca 69 c5 84 07 6d b0 58 | 2f 95 59 6a b7 c6 f7 02 21 d7 08 bc 5d 1a b0 ee | 67 fb 57 c8 f3 65 46 50 18 bb ad 85 2c fd a4 7a | 1f 49 86 f5 1e 9f f2 f1 74 80 e2 0f c0 52 94 90 | 6d 49 de 10 9d c0 e3 1a d8 90 bc 82 30 91 d0 23 | 29 00 00 24 18 87 a4 c8 cf 5c 93 83 68 9d 68 8a | 28 36 66 32 92 60 4e 85 d6 0c 91 d5 ef 20 18 75 | 65 13 ec f8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e bf 02 dd 26 3f 8a eb 4d 3f 2a d7 | 62 d7 7d e3 99 e0 e7 0a 00 00 00 1c 00 00 40 05 | 1c 98 9d 66 2f 94 1b 4c 60 05 a1 e4 50 37 22 f7 | bd 66 62 87 | libevent_free: release ptr-libevent@0x7fb36c05f200 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34001fa80 | #608 spent 0.0785 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #608 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #564 | start processing: state #564 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #564 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #564 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #564 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.224482; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.94457 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34001fa80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #564 | libevent_malloc: new ptr-libevent@0x7fb36c05f200 size 128 "road-eastnet-nonat-44" #564: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #564) | 2f d3 42 a8 8e fb 16 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 57 dc e5 0e c5 b3 5a a5 b1 00 4b 67 ff 85 46 | b8 62 d6 0c 0d 31 23 f0 15 92 2b d6 8c 7c a9 f2 | d6 dd b2 f6 df 09 a2 a7 d4 4c f5 c8 47 54 16 76 | 5a 58 cf d1 ec 54 b5 fc 7d 31 6f bf 81 02 c0 98 | 73 35 4a 40 a8 af 1c 13 3b cd 5e 84 ea 44 ca 69 | 54 c0 3d 20 b4 71 ba 13 dc 34 f4 0e 7c b2 aa b8 | c4 a9 b5 15 a4 bd b0 a0 2f 7e 8e 8d 90 c4 a1 53 | 64 09 3f f1 29 9d e6 14 4e 06 d3 b9 04 6d 85 e2 | 8e d3 43 4f a5 d9 1f f9 90 f5 65 41 52 ea a0 85 | a6 74 7a 70 9b f9 1a 1b c9 8d 45 01 fd 6f 0b c5 | 33 01 ed 92 72 46 2e ff 55 83 2c 71 1d ed cc d4 | 98 ca f9 5a 85 34 6f be 44 21 e9 c6 d9 23 68 35 | 49 8d 06 e2 b6 a8 ec 04 67 19 6a 25 85 e7 25 a3 | 44 d2 a7 dc e7 13 d5 3e e1 f8 5a 22 0f ba d0 2d | 6f ea 9c 6f 17 1b d4 89 ec ee fc f7 ec b2 46 89 | 2d c5 51 79 e6 ba bb f3 15 62 72 06 39 13 5f b6 | 29 00 00 24 96 1c e1 0c 7f e5 9c 1d 77 d9 4f 7d | 4d 47 9e 2d d0 89 bb 2a 04 e6 2e 94 ae 57 6c 89 | bf 1f de 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 46 11 5f cd 69 00 3f 80 ae 94 cd | 27 23 87 c3 ca 0f c2 84 00 00 00 1c 00 00 40 05 | 00 5b e6 68 40 1a 8f cb 1f 47 b5 45 fe a7 9d c2 | 49 00 ab ac | libevent_free: release ptr-libevent@0x7fb344074e80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #564 spent 0.0783 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #564 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370012bf0 | handling event EVENT_RETRANSMIT for parent state #729 | start processing: state #729 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #729 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #729 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #729 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.224569; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.99699 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #729 | libevent_malloc: new ptr-libevent@0x7fb344074e80 size 128 "road-eastnet-nonat-240" #729: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #729) | 67 a1 5b 23 16 28 fb 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 81 a9 49 57 bf df e1 f1 ea fa f5 92 44 d9 16 | 0e ea 66 38 d8 dc 75 6f 21 e1 c4 ca 83 4d 4d a6 | a8 40 61 2c 03 9c 81 09 e4 2c db 8c 6b 07 73 a9 | f5 96 45 79 32 38 25 d0 cb a7 7f 05 3f 22 9d 55 | 94 52 09 92 47 a0 99 ce 8b f9 2b b1 16 c5 6d d5 | 5a 5f 80 8e 4a 88 73 f6 19 b4 2a 58 b1 99 a3 f1 | cf 10 1d ee 49 52 bf ae ad 75 79 fc 4e 1b 70 c4 | fe 0d d5 21 ff c3 16 1c 6a 4f a2 1b da 3f dd 80 | b7 98 1e 3c e4 19 40 2c ba 2b 1b 02 76 ef 1d 8c | 32 68 18 21 59 6e 3c 68 cf e3 eb 77 5f af 35 46 | 5f aa 30 45 02 11 0a b4 a8 8f ff 89 3e 96 86 5d | 06 be 71 8d 28 b2 ee 71 59 26 45 c0 3b 2a 27 ad | fe 98 e4 a6 a7 ad 6c 8f d2 ce 96 56 c5 bb 39 51 | 6a 23 cb d8 31 3d 75 5c 91 5d 1e 01 ca 04 2a 2e | 70 54 ab 56 07 f2 3e 14 8f 66 51 e0 bf d5 13 d5 | 73 c4 4d 14 6a 43 47 b4 f4 a1 4b 3b 4b 58 bf 93 | 29 00 00 24 ba eb 8a f4 d2 cb 7a 42 9f 66 73 21 | de 49 71 25 d5 fa ae 34 96 57 d1 6a d8 63 50 0d | e7 fe 39 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 4e 71 12 16 99 de 9d 6a f1 f6 ef | 1c a0 b8 7d 93 f0 39 1e 00 00 00 1c 00 00 40 05 | 19 1d 16 93 50 07 d9 58 09 ed 23 95 2e a0 e3 31 | 82 b4 65 2f | libevent_free: release ptr-libevent@0x7fb36406a1c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370012bf0 | #729 spent 0.0779 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #729 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368025320 | handling event EVENT_RETRANSMIT for parent state #695 | start processing: state #695 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #695 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #695 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #695 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.224656; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.985981 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #695 | libevent_malloc: new ptr-libevent@0x7fb36406a1c0 size 128 "road-eastnet-nonat-197" #695: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #695) | af 67 24 f2 d5 c7 bc 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 14 e7 c9 33 09 4d 36 12 f9 6d de 10 f0 e5 47 | 82 ed 23 45 d4 b6 ce 21 00 04 da b4 2f 94 b8 30 | 2f 77 2b 66 13 06 af 85 21 fd ef 57 6a 09 67 67 | 37 28 49 9e 18 7d d7 f0 08 1e d6 88 3f e7 a9 18 | cf 2f 78 55 e7 d6 fb 4b 07 4e 15 ae c6 2b 26 51 | b3 ce ba 2f 1e 38 1f 99 e6 3d 40 73 ee 22 e1 a7 | 0d 0b 8c c5 62 02 7e 56 2d 8d 6c 77 fd 6e 2e 61 | ca 7e 48 f6 cb 33 41 3b 92 87 6e 0f b5 01 01 1a | 7a 26 1b af b8 f9 1b 18 fd 42 1d d8 57 b9 99 f3 | a3 88 af 1a 40 b5 fd 9d a8 8b 9a 42 43 ee 86 63 | 13 46 c8 29 88 32 aa 0e 70 c3 98 1b 40 71 6c 44 | ab 3f 11 fc d3 58 f3 77 22 af df 25 de 81 a9 4a | 00 72 bb 64 e2 5c be f4 95 c0 21 c9 6c 9d 40 f4 | 7b 46 b5 97 b0 26 ac 1c 91 8d ac 90 5b 92 a1 ab | 78 4e 4e 35 b8 bf b8 64 4a a1 5c 4e 46 64 49 0a | 0d b6 6c 3d 6b 6f b5 91 f0 48 34 62 b9 68 a6 af | 29 00 00 24 c0 8b 5f d5 7a 97 79 40 43 e6 f6 3f | 54 f6 96 1a 49 cd f5 d4 43 9d 79 22 51 26 12 49 | 61 34 44 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a fd 7a d7 4e 83 ac 99 9d 97 07 a9 | d5 f6 51 74 a1 c3 79 42 00 00 00 1c 00 00 40 05 | d3 52 b4 8f bd 1e ff 85 b5 5d 7c 33 8d 85 60 74 | f7 b3 c4 d9 | libevent_free: release ptr-libevent@0x7fb388085dd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368025320 | #695 spent 0.0765 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #695 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38800feb0 | handling event EVENT_RETRANSMIT for parent state #641 | start processing: state #641 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #641 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #641 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #641 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.224742; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.96112 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368025320 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #641 | libevent_malloc: new ptr-libevent@0x7fb388085dd0 size 128 "road-eastnet-nonat-235" #641: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #641) | 20 9c e2 59 31 cf 6e 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 09 b4 84 ab aa 43 89 78 34 b0 d6 e3 38 d9 6d | a2 02 c4 4c ab 4d 8a f8 0e 36 02 d1 bf 26 dc a0 | 18 35 ff 92 d6 ab 35 8b 97 0e fa 1f 06 74 86 13 | bd 4b d4 10 63 6d 50 fa d1 05 e5 b6 83 80 eb 81 | 1d c1 17 7e 74 96 70 4b 8a 7d a7 98 bf 41 d3 e4 | 53 6e 45 47 7a d5 ce ad 7c de 29 6d 1c ce bf ee | 29 ef db 71 37 1e f4 da 05 b9 c1 9e 94 b8 09 61 | 06 d2 e5 30 cb fb 00 e2 3c 1f 90 84 66 2a c9 21 | ab 1a 0e 49 5d e5 f7 c2 53 02 87 88 0a 36 0c 6d | c1 f9 c6 d4 46 2e 67 22 c6 2f 23 dd 8d d0 33 a7 | 3c c4 80 09 35 06 d4 ba c9 54 31 c0 47 e3 77 50 | fe d3 cc af 02 88 b5 3d 64 43 bb 82 7f d7 97 a8 | 8e 74 10 23 3c 82 a8 eb 61 af 8f 95 ef 01 57 91 | 74 35 ea c2 74 76 d5 21 d5 ff e2 5e 1a d1 24 e9 | 4f c4 4e 06 0e c3 35 68 7a e5 01 33 ba 0f 7b 79 | d3 d6 e7 d9 69 7d 18 4b b8 91 33 33 1e aa 41 47 | 29 00 00 24 de ff b6 ca 63 e9 cc b9 1f 7c 3e 7c | 82 6d ca 20 ea 43 fd 3c 13 8e a9 32 83 2c 0c 09 | 45 b1 6a 12 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f d0 71 59 b2 13 20 21 05 f4 92 89 | a6 fa df 4f c5 3e bb 18 00 00 00 1c 00 00 40 05 | da 4e b6 83 cf f5 84 c6 fa 26 59 3a 0c bf c7 47 | bc 79 7e dc | libevent_free: release ptr-libevent@0x7fb3500722e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800feb0 | #641 spent 0.0781 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #641 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7cf10 | handling event EVENT_RETRANSMIT for parent state #534 | start processing: state #534 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #534 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #534 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #534 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.22483; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.930196 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800feb0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #534 | libevent_malloc: new ptr-libevent@0x7fb3500722e0 size 128 "road-eastnet-nonat-43" #534: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #534) | b6 c2 42 e3 74 ca 7f 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f e9 15 ad 11 6f 89 c0 a8 02 55 a1 73 88 84 f9 | 33 7b 5b 0d 0b 5b d7 57 77 b6 59 c3 92 4f 9c 81 | e6 98 a6 a1 b8 34 63 c4 08 b9 bf 0c 69 da d1 2b | 1a e8 9b 2f 98 d4 44 3b f0 73 62 cb 71 d6 64 d1 | 3a 3d f5 71 2d 7e 29 30 73 8d 8a a7 fc e0 c3 a4 | 07 15 fb 3f 7b 6d ac bf dd d0 0f d6 95 19 6d 4e | ab a0 86 9d f8 d4 b7 8e e6 1d 84 a8 cb 93 14 ec | a8 13 51 b0 91 ca a4 6a 06 06 50 7a df 97 a5 15 | 33 7b b0 2a aa 9d 49 82 99 5a 1e f8 ff 91 d1 bb | 5f 9c 20 e3 88 f9 89 5c 2d ff 2d 6c 31 e8 44 d4 | c0 96 d5 82 e9 c1 04 a4 03 63 11 8d 47 c3 ee f3 | 9c d6 e5 95 a9 a9 b4 3b 1f e3 34 6e 77 02 0b 87 | cd 18 1a ad 7e 61 e6 d2 80 d4 cd 61 09 82 cc d6 | aa 80 fe 73 e7 11 a7 12 0a 61 d0 3f 70 03 0e 25 | 0f fa b0 0b f0 75 c7 91 3d 8b 34 3c 45 ce 0a 85 | 42 34 96 d7 4e 3f d9 17 73 40 5a 4f bb a1 8b 1a | 29 00 00 24 6f d6 0a bf ca bc 9d 1e 75 5d 3f c1 | 66 5b 32 47 90 cf da b2 6c 6d a4 db de c8 e0 a3 | 3c 0a c8 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 38 48 7f 05 85 41 6a 46 8b 67 3e | 92 3f a4 69 d3 0a 9f 50 00 00 00 1c 00 00 40 05 | 9b 5d 60 63 c2 dd c6 23 03 14 4c fb 6a ee 61 48 | 2b 45 1b 9e | libevent_free: release ptr-libevent@0x7fb36c0933d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf10 | #534 spent 0.0776 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #534 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350044df0 | handling event EVENT_RETRANSMIT for parent state #699 | start processing: state #699 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #699 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #699 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #699 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.224917; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.991501 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #699 | libevent_malloc: new ptr-libevent@0x7fb36c0933d0 size 128 "road-eastnet-nonat-246" #699: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #699) | 3d 5b 9a 7a 4c 0f 9e 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3a 09 f9 eb a7 2c d4 98 c3 18 03 6f 47 d0 96 ba | 3c f2 05 d8 dc 28 48 bb 27 cf 99 6c 93 c0 c3 83 | 62 65 ad 94 56 b3 ed 6c 6f d7 43 5b eb 9a b8 8c | cd bc f0 70 f4 67 60 ab 7c 75 e9 55 5d b0 86 b6 | 64 db b3 4d b5 b8 2b f5 3d ab b6 8a 7d 99 73 4a | 9b 33 fd e0 3a 15 58 67 0c 5b 8e f3 d6 f2 97 a2 | 7d 06 3e e7 f9 db 01 b6 96 1e 12 71 96 36 b1 ec | b4 4d 68 d3 51 78 4b 90 eb 84 c2 64 e8 b4 4f 2c | d3 6a bd c9 98 ce 1f 8e 81 89 21 95 4c 9c ba 75 | d7 f1 23 87 ad 5b ff f5 2f b5 a2 44 90 c1 f2 58 | be d6 e8 53 b5 24 d2 77 32 37 2b 7a 81 a1 bc 2a | 6f b9 14 6a 34 88 fb 2f 9e b0 2b 54 9e 18 aa 92 | 83 c2 bb bf fc 01 c9 75 ab 94 44 ea 3a 9c f5 0f | 98 b5 4e 1e 59 de 26 f7 a1 d7 7b 72 e7 1f 59 71 | 0c b6 98 51 80 1c a2 16 07 3d a3 ac 7a 38 df e5 | 57 4a 6f f1 39 e9 67 6c 90 88 41 fd 33 06 1d 56 | 29 00 00 24 75 7b 0d 72 2a ad 01 e2 32 07 7f 62 | c6 47 f1 e7 26 b0 2f a6 3b d9 b1 d0 4e 2c e5 dc | af ae 5c 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 d7 12 af 37 14 12 8a ae d8 ef 8c | c0 42 58 74 2c 82 0a f0 00 00 00 1c 00 00 40 05 | bb 48 6f d2 a0 ac e9 6e 70 bb 7f d3 67 7d bc 39 | c4 af 08 4e | libevent_free: release ptr-libevent@0x7fb350051bb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350044df0 | #699 spent 0.0761 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #699 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35801d710 | handling event EVENT_RETRANSMIT for parent state #597 | start processing: state #597 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #597 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #597 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #597 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.225004; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.949318 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350044df0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #597 | libevent_malloc: new ptr-libevent@0x7fb350051bb0 size 128 "road-eastnet-nonat-22" #597: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #597) | b4 11 eb c0 3c ee 82 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b e2 a7 57 e1 0e 89 3c 5e 5c ad af 7e 70 cd ff | 21 89 77 18 f4 e7 a2 a2 0b 97 a2 cc 0c 79 62 a6 | 53 17 8a bc 8d 3b 08 6c 40 4e e0 76 7d d4 d1 91 | bf c5 8b f9 61 7f eb 07 6d 14 8e d7 2e 13 4b b7 | 14 c2 d5 04 cf 8a cc ac 4e ae 84 9f 14 5a e5 10 | da ae 54 d6 70 48 a3 a7 d0 ef ea bc 55 27 5a 82 | 23 5b 52 be c1 f3 53 be bb 7d 21 37 c3 a9 7f 33 | c7 62 04 d8 71 42 47 a0 d7 41 5f d1 4d c5 32 46 | 77 62 f1 35 9a 43 b7 7e 06 40 63 92 bb 12 f6 65 | 95 37 e9 95 f6 44 66 e5 21 74 8a 91 88 04 ad e6 | 73 e6 dc 01 ed 0f a5 fb 40 2f 2a d6 15 cc f9 e5 | 64 76 7c 1a f7 fd 4f e9 ea 7f 6a ab 40 67 b0 84 | 31 a8 8a 3e e0 7c 8e 22 7d 83 59 b3 8c 60 24 8d | 8b 1d 5a 54 65 8f 80 6f 96 65 ca 43 c8 a7 28 f6 | 55 d4 fa 1a 47 2e 73 c8 9e ce 9b a4 9b 29 e3 96 | 97 ae 07 06 04 32 86 2a 42 ce 44 45 22 8b ed a9 | 29 00 00 24 49 1d 06 1e f3 92 fd 55 9e 0a 50 15 | a6 41 c4 55 df 85 ea d9 9d 51 f8 0d da 8c c6 ac | 25 cc 84 3d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d c2 73 38 8d 54 94 82 d9 af a8 f8 | 7c 2d a7 d4 83 28 88 71 00 00 00 1c 00 00 40 05 | dd 49 b4 51 8c 53 2c 7a 9c 58 4d c4 6e bc 08 eb | ca 20 63 19 | libevent_free: release ptr-libevent@0x7fb384063190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35801d710 | #597 spent 0.0786 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #597 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378018100 | handling event EVENT_RETRANSMIT for parent state #558 | start processing: state #558 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #558 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #558 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #558 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.225096; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.92534 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35801d710 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #558 | libevent_malloc: new ptr-libevent@0x7fb384063190 size 128 "road-eastnet-nonat-9" #558: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #558) | a0 bf 59 d3 80 3d 9d 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 0b 86 6c 08 67 cc 4b bc c3 39 13 37 f4 32 e7 | ad d1 3b 50 ca a5 a0 c9 48 a7 c6 40 28 8a ce 88 | 48 9a aa f7 90 71 74 ed bc 28 4c d4 56 d7 df 22 | 4f 3a d6 3b 4e 8c b0 b3 d6 6a 56 04 3b e0 40 63 | 8b 49 82 3f 73 5a 7c fa a1 c4 0c d8 1e 26 25 61 | 7f c0 52 f8 2f 3c 28 85 6c 37 5d c8 aa 97 0a 05 | 31 61 41 82 78 5c 29 78 03 4d 4e ec d7 92 6b 15 | 11 ed d4 89 17 37 84 77 86 0f 5b 00 ae 1d 38 19 | 0d ac 0c 19 d4 42 43 c3 c7 86 33 36 3d 13 82 f5 | 92 4c 46 6b 6b 92 f0 58 2e 94 0d 8c d2 74 6a 33 | f6 10 0d 35 6b 00 74 18 19 fe b3 bd 3b 01 68 c8 | 55 16 d5 ec 93 02 71 33 c5 83 15 91 47 19 08 ae | d5 86 b5 c3 61 af 99 0a ea 43 2b 44 f9 af ac ea | 2c 5e 25 7a e2 4b 89 ff 8e 3b 15 87 08 63 19 5e | 81 14 9b c2 be b1 4a a7 00 bb d5 e7 f7 c3 ed f1 | 6a 63 70 39 8b 8e 47 62 eb 92 4d 42 f6 a8 77 a5 | 29 00 00 24 07 63 d1 5f 7b 4c 62 77 51 cf 3a c4 | f3 0f f8 72 58 27 a5 92 6f 1a 94 2c 36 bd c3 e4 | e2 d6 9e 5a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 51 b0 40 da 74 9a 4d f5 0e 2f 49 | 38 da 65 ba 56 04 b0 54 00 00 00 1c 00 00 40 05 | 8b 38 7f 8a 89 4d 10 70 34 f4 f7 39 75 12 38 2e | a0 bb 61 3b | libevent_free: release ptr-libevent@0x7fb37803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378018100 | #558 spent 0.0821 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #558 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a3a590 | handling event EVENT_RETRANSMIT for parent state #554 | start processing: state #554 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #554 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #554 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #554 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.225186; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.930042 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378018100 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #554 | libevent_malloc: new ptr-libevent@0x7fb37803b0b0 size 128 "road-eastnet-nonat-98" #554: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #554) | 25 17 60 01 5a 53 51 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 38 2d f1 00 6f d0 3c a9 89 96 83 23 c7 b8 5d | 1a a6 31 2b 2c 51 9d f6 cf 41 37 49 95 49 bb 07 | 22 d5 2d 9b fe 69 9e 12 c7 f6 3e 06 e7 18 06 20 | c1 aa 51 c6 00 74 fa 4a 11 cc c8 b0 ed 1a e5 e4 | c4 39 2f 27 86 6b 56 5d d1 56 6c 92 b1 bb b2 fd | e7 5b 8a fa 41 54 ee c3 2f 4b 56 28 c4 84 43 b6 | 29 3e 51 c0 e7 fd f5 95 28 1a d0 e0 91 dc f1 6e | 39 56 bd a3 9a d5 67 19 93 7a c4 42 65 6a 67 24 | 4f 95 02 14 cf 93 bd 7f a6 8b ba d4 40 ea aa 44 | bb 51 d0 43 02 22 34 c7 50 c4 3c 24 ec 0b 9e 0b | 68 3e 0f 11 f4 55 6d 52 6f 15 ed f6 c8 d2 70 f8 | fa 7b 49 45 c1 d7 b6 5b 40 7b 44 9d 47 3c af 30 | 36 b9 73 5d 22 5f a7 f6 ce 29 85 12 50 70 19 59 | ff e1 64 85 88 18 f5 bb 21 9e 23 15 22 cb 42 8f | df e0 fe 4c ee be d0 17 86 a2 52 52 76 91 2f 84 | fc 1f 46 9a d7 c0 87 a2 fb 33 8f b3 de 22 8e f6 | 29 00 00 24 2a e4 8d 48 f2 e9 35 56 e7 78 9c 50 | 82 48 8b a6 d8 56 83 14 85 5c 7b 82 38 7e 5a 90 | dc b9 01 eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 6c fa 7e d5 f7 59 ab 33 19 e9 49 | 9d b2 c4 ad db 25 ab 32 00 00 00 1c 00 00 40 05 | 84 c3 f1 b0 ec 53 88 9c d7 9f 3b 91 13 fe 1d e1 | bc ef 10 92 | libevent_free: release ptr-libevent@0x7fb350093270 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3a590 | #554 spent 0.0781 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #554 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b06800 | handling event EVENT_RETRANSMIT for parent state #710 | start processing: state #710 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #710 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #710 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #710 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.225274; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.993053 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #710 | libevent_malloc: new ptr-libevent@0x7fb350093270 size 128 "road-eastnet-nonat-208" #710: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #710) | 54 dd ed 5a b3 6d d4 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e ae f9 c6 c3 35 9e cb 30 7a bb 1c 00 fa 4e a9 | ac fe 61 1a 01 79 34 2a aa 66 47 75 0d 14 d5 58 | 3d a3 f4 3b 2f fd e3 8f 66 3f d8 83 34 dc f9 53 | ad 76 ca 6c 43 c4 37 d5 67 c9 87 27 ce 69 69 cf | d7 db c7 63 3d a9 5c 21 2d e2 b8 c4 ed 1d ee 03 | ec f9 0e f1 a5 e6 d0 de f8 48 19 8c b1 f7 9b c0 | 1e 79 2e 85 00 e0 3b 1a 5c 6b 87 68 67 17 48 2f | bc 80 b2 6f 4c 41 39 fa 87 e1 62 4f 73 1b a9 5c | 60 de 48 93 9e 02 e2 ec 15 c2 11 32 e4 d6 d4 d8 | 5b c1 d7 7b 6b 58 5f d6 b1 1a d4 fb 32 e3 da 05 | 6e 83 83 d0 d8 9a e3 19 01 2d e0 27 eb f6 d0 d3 | f7 36 9d d5 66 d2 27 1b a7 be 3d df fc 08 16 fa | 28 57 f9 eb 66 43 05 f6 6e 1e f9 24 82 ef 4e d5 | 64 d8 6a 66 63 24 d1 49 d8 f2 45 0b f7 74 80 63 | ff 22 38 7b 7e a0 c3 5f 50 b2 0f dc 7f e8 39 75 | 4b 1f f7 7d e6 ab 3d 0d ee 3f a4 d8 d2 50 29 5b | 29 00 00 24 ab 44 c4 18 c2 85 94 a9 eb c4 70 9c | ed e6 ea be 91 bb 1f 29 3e 10 f2 4c ff 43 63 b0 | b2 3e 00 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 2b 3b c2 86 c3 af b9 48 0a 19 78 | 34 27 e8 b2 13 ec a6 3d 00 00 00 1c 00 00 40 05 | dc 19 d9 87 b0 ce ef 70 e8 93 5c 55 1a 39 4b 4f | f8 02 f2 ae | libevent_free: release ptr-libevent@0x7fb3500882b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b06800 | #710 spent 0.076 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #710 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb33801d710 | handling event EVENT_RETRANSMIT for parent state #717 | start processing: state #717 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #717 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #717 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #717 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.225361; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002907 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b06800 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #717 | libevent_malloc: new ptr-libevent@0x7fb3500882b0 size 128 "road-eastnet-nonat-195" #717: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #717) | e9 cc 03 7c e4 bf 38 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 0d 73 a5 88 38 ec a8 b6 b3 23 50 23 2d 53 9c | f5 59 45 c5 2c 5d 29 a6 50 ea 35 cd ff a5 c3 82 | 38 04 6e 7c 97 76 33 80 5e 2e f5 c7 20 1d 6d 52 | 54 d4 c8 43 d2 e6 b1 e4 c1 91 68 e9 90 9b 22 d4 | 83 38 49 6a 85 b6 95 48 9d 37 d5 48 27 0e 06 98 | 9a ac f5 b2 ed 13 5b 90 8e eb 62 80 51 7d 18 ee | 32 25 77 49 32 8f 44 94 81 26 5d 5f 72 27 8e 3a | 3d 60 20 38 fe 19 ba a8 04 69 ba 2a 74 5a 42 77 | 2f 99 5b 7a b9 a8 61 7a f1 75 11 5b a2 50 cd 53 | 3e c5 95 48 2d 5a 37 b9 4e c2 b7 10 0b 09 f4 4b | bc cd c9 0e 10 07 92 ed 69 ad 1e f1 95 18 c1 9a | 1e ea 66 8b 35 9c 7c a7 b1 0e 8e b5 d5 47 b6 9e | 92 8b a0 cf f4 db 96 37 1e 82 84 04 16 36 81 77 | 8c 3e 2c e7 86 0a bd c6 dd 95 c1 6b fe 52 5f 2a | 76 45 bb fe 23 c6 23 bc e6 64 3e f3 0c 6a 8e 66 | 27 65 38 a3 1e 94 62 d7 e1 4e 78 ef 7d 9b 33 59 | 29 00 00 24 84 76 67 8c e9 66 d9 97 e2 c1 c3 44 | f5 19 60 fe 7b e1 dc a7 b1 57 f0 2b 9f 4f 7d 83 | f4 f5 26 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 0e 85 7e 12 27 fe f4 c2 99 71 9b | 7e 21 7b 45 a0 57 b5 9c 00 00 00 1c 00 00 40 05 | f0 35 c9 a1 8e 9b d2 fc 27 bf 2e d5 3b 0c 2d 8b | c9 9a 4f 06 | libevent_free: release ptr-libevent@0x7fb35408aee0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33801d710 | #717 spent 0.078 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #717 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3380300a0 | handling event EVENT_RETRANSMIT for parent state #728 | start processing: state #728 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #728 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #728 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #728 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.225447; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.99509 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33801d710 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #728 | libevent_malloc: new ptr-libevent@0x7fb35408aee0 size 128 "road-eastnet-nonat-216" #728: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #728) | ed 95 ac b7 77 3a 63 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da a2 78 27 f5 2b 54 2f 55 96 c5 81 6c 0c a3 b6 | 83 12 f5 d9 b8 01 ba b8 d1 a3 42 87 c7 6c 10 0b | 63 a4 94 ca d4 f6 e8 4d 22 ce 05 39 88 91 97 f2 | bf 09 37 b9 98 b1 d8 26 bb b2 1e 92 29 a1 85 7b | d9 b4 11 29 68 ff 40 91 35 9a 09 da d2 cb 07 e0 | ae c3 2d ed f0 4b 10 75 57 d6 65 48 df c7 a2 4f | 3e 00 5e 43 75 06 44 c7 49 4f d8 29 1c 6d 72 c2 | 18 aa 3c c4 95 78 2a 63 17 27 ba 03 8b b4 08 69 | 8a 41 ef 22 d5 36 45 8d d5 f1 45 ce bd 99 4c 4d | 22 ad 81 3f 5d 00 25 1c ad bf 2e f7 8e 8c 80 7b | 93 69 16 30 fc 43 30 2d 8f 1d f1 a2 b8 cf 8e 13 | 28 9a d4 35 b3 7b 77 53 24 b9 b6 62 c4 97 31 69 | 7f 76 13 0e 62 30 c6 ee 48 5c 32 ac fd 53 7f 7a | b6 10 d9 5f 7f 00 e8 b0 6d 1d 12 23 94 fa ae 8f | 68 f1 36 29 a4 6a f8 df 72 30 2e d8 f7 b9 49 8c | 43 c5 19 cb c2 38 18 75 d9 fc 13 c1 7d d2 e2 e9 | 29 00 00 24 e5 63 4e 91 26 c4 75 00 d8 52 0a 1f | e4 6e 1e 05 a3 b4 ec ce fa fc d1 db 89 1d 66 0a | aa 77 5c 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 d6 04 97 64 cb df f6 9c 65 fd 98 | bb ed f5 4e d4 61 43 0a 00 00 00 1c 00 00 40 05 | 5c 17 83 01 62 b0 09 8f af 57 ad 85 0a ed 60 b0 | 19 a9 47 40 | libevent_free: release ptr-libevent@0x7fb3600618f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3380300a0 | #728 spent 0.0779 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #728 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368034dd0 | handling event EVENT_RETRANSMIT for parent state #527 | start processing: state #527 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #527 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #527 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #527 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.225534; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.969907 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3380300a0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #527 | libevent_malloc: new ptr-libevent@0x7fb3600618f0 size 128 "road-eastnet-nonat-65" #527: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #527) | b8 7b a6 b5 cd 22 30 e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9d 68 a6 ce 12 3e 16 ce 0a 40 e3 0d ea db e5 bf | b4 0c 0f 14 5d 82 31 6e df 98 3a a9 2b 0d 83 59 | a7 51 1f df 33 ed b4 d4 3d 6e 89 89 e1 79 17 6e | 79 24 a2 44 83 1f 07 80 b7 73 27 d1 f5 ab e7 f6 | fa 73 46 f9 e5 46 01 bb fe 93 76 2e fb d7 ee 39 | 18 23 e1 f9 53 17 53 31 0d b4 42 58 f1 f5 27 5f | 8f 40 ae 48 c9 9a d1 40 be 99 20 4f f2 5a 11 4a | 48 24 79 61 ea 93 68 2f 62 04 56 92 f9 14 43 3b | 8a 3e eb 47 ce 87 24 50 5e 1e 23 ea d1 e7 ff ad | 92 32 52 12 93 36 c5 47 2c 6c 33 48 33 2a cb ce | cd 3b e2 9d 5f 5a 78 ba 2e 4c f5 75 36 53 8e 18 | c2 8e 6c ae 9f 48 cd 76 e2 9b 13 a4 86 1e d9 37 | 5a 76 08 51 c6 0c c9 7f 15 8d 6a 72 43 9f 44 4a | 6e 19 5e f0 ed 1e 32 a1 a1 b9 c3 4c 22 6e 92 40 | a0 76 62 be 61 a0 b4 ca 52 4a 39 3c 84 7b 48 7c | 26 8e ac a1 a4 17 05 aa f0 10 33 85 e3 3a d9 7e | 29 00 00 24 42 74 9e 85 d4 ce 77 94 f8 66 9d 51 | 75 21 75 54 57 2f a1 c1 0d 08 6e 7a 4a f7 0f 5f | 6b 9a 4f 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 fd 65 f3 18 d8 6f 03 d6 0f 2d d6 | 5f d4 a1 2e 7e 59 4c 96 00 00 00 1c 00 00 40 05 | 2f dc 51 0a 44 26 e8 79 d1 11 0e dd 4d 4c 69 c6 | 3a 55 a8 94 | libevent_free: release ptr-libevent@0x7fb368064ab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368034dd0 | #527 spent 0.0779 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #527 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34001a1e0 | handling event EVENT_RETRANSMIT for parent state #594 | start processing: state #594 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #594 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #594 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #594 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.225621; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.948652 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368034dd0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #594 | libevent_malloc: new ptr-libevent@0x7fb368064ab0 size 128 "road-eastnet-nonat-81" #594: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #594) | 14 02 06 51 b1 9f 6a a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd 01 b3 9f af 09 be 89 fe fb 88 0b 7e e8 81 63 | 3e a8 ca 5b cb 2b 71 61 2e 3d 71 13 67 81 27 7f | eb 09 e9 81 30 e6 ac e6 a5 a8 3b 20 84 58 c8 8e | 6a 8b fc c9 8a c5 b6 c5 c4 e6 6c f7 d0 89 56 fa | e1 09 5c fd 09 c4 5c 8e a9 af d1 7a 3b a1 f4 b6 | f4 3f 0e 9b a9 94 b9 07 50 f1 fc bf a3 65 7f de | 3a 00 2f 52 8f 64 57 78 ce a7 f9 c4 ca 58 9d 51 | 1b 37 06 31 32 08 90 da a6 51 c5 05 d8 cf c0 4f | 6d 65 03 f8 31 ce 3e 2a 1f 85 59 ce 64 5d bd 91 | 39 62 91 67 e1 9a c3 02 a2 c6 12 25 4d 06 14 65 | 6d 4a 67 38 16 9a f3 0a 7f 67 14 d2 64 51 73 a3 | e8 d4 99 7f 98 eb 17 a7 87 c4 3d ef f7 49 b0 e7 | 3a ee 43 b6 89 d7 8e f9 6d 93 94 5f f6 b9 7c ae | ad a8 c0 d7 b6 71 30 2a f0 19 1d a7 ef c7 69 67 | 34 56 cd 9a ca bc 4f 05 69 d7 a7 23 37 a8 31 2d | ac 76 9e 29 2f 6b f3 a4 f9 9b 74 9e 13 92 6d f7 | 29 00 00 24 bd 30 97 0e 1f 3d f9 71 c1 31 b3 cc | d2 39 eb d3 0e 5f a7 cb d6 93 2f f7 82 b0 8d 4f | bd 25 0f a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 ad 41 74 91 af 29 e4 13 15 1e a9 | 90 db 4d 21 18 96 06 09 00 00 00 1c 00 00 40 05 | ae cb 83 03 f3 ff ad 0d 96 aa 50 d8 b2 3b f6 cf | f4 56 d5 60 | libevent_free: release ptr-libevent@0x7fb340053a30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34001a1e0 | #594 spent 0.0764 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #594 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37802a910 | handling event EVENT_RETRANSMIT for parent state #600 | start processing: state #600 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #600 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #600 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #600 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.225707; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.947744 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34001a1e0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #600 | libevent_malloc: new ptr-libevent@0x7fb340053a30 size 128 "road-eastnet-nonat-128" #600: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #600) | b5 8b 9d 63 05 76 9b 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 cd c7 d7 3f 0d bb 77 fc d1 1c ab 77 ae 86 ac | 26 75 19 1c 77 04 4b 07 7b 30 6a 0f e9 ae b1 4b | c2 01 f0 be 77 bc 8d 29 4a 13 80 84 01 ec bb bd | 9b b4 e0 a3 b9 74 4d fb 59 f0 b1 62 7c 23 17 59 | c2 35 47 24 40 0e 78 ba 49 8d c1 80 7f ff 22 b6 | b6 ec 09 5b c1 9f 87 91 ac ef 09 c3 af 78 0a ea | 0d 6b a8 42 f1 3e 23 89 64 a8 83 5d 1d d4 84 5e | 9f 78 c2 0c 76 ee a4 76 88 78 0a d8 84 b9 ea 14 | dd aa 58 60 5c f2 1b 26 59 8d ee 35 91 31 11 6a | cf c7 9c 82 87 ed 5c 03 ab 49 fc a4 ec 38 af ae | f6 1b bb 87 fe b6 4a 50 60 6c cc b3 1f fa 42 68 | 77 69 10 7a 5c 8f 12 4e bd d8 46 98 43 dd e4 54 | ef 5e 86 b8 15 8e 41 80 e5 10 0a c9 f6 e4 9a c2 | 27 59 fd b1 5d 0b 98 f8 ff 0f 21 7b 55 71 56 50 | d6 a8 f9 25 e7 e0 02 03 dc 47 72 cd 38 48 9d 8f | 84 5d 29 5a e4 04 82 0c 5c 9a 7a 00 38 a3 32 1f | 29 00 00 24 7c 62 68 cd 4f 9b 4e a6 25 ba ff b3 | 1c a3 6a 45 01 89 4e 8a 82 38 6d ae a7 aa 34 d8 | c6 f1 4c f8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 57 11 53 15 68 5a b5 7f fe 43 f0 | b9 a0 3d 5f 8d 50 a5 03 00 00 00 1c 00 00 40 05 | 6b cb 38 0e d2 0e ef 73 17 ed 32 a7 bd 62 17 c9 | 6a 1f 87 d1 | libevent_free: release ptr-libevent@0x7fb36c064a30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37802a910 | #600 spent 0.0783 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #600 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a8ee40 | handling event EVENT_RETRANSMIT for parent state #646 | start processing: state #646 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #646 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #646 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #646 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.225794; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.970466 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a910 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #646 | libevent_malloc: new ptr-libevent@0x7fb36c064a30 size 128 "road-eastnet-nonat-181" #646: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #646) | b4 5e a6 e5 43 b3 10 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e9 73 71 28 1c 8f e6 c8 30 15 e8 f2 83 24 73 ba | b7 8e 5e ad 23 5e fe f2 57 66 39 2a 10 14 0b 7c | 99 94 74 01 76 7d aa 55 2c 68 f1 88 64 b0 b2 92 | d0 76 47 86 10 fe 60 a1 91 ba cd e1 7f 16 26 be | 94 e7 90 51 31 6b 00 e1 5e 12 3f 7c f5 94 c8 a4 | 3b fb 8d 83 6d 50 f6 31 0f 66 c4 51 6b 72 e3 1c | db ec 64 33 bf 0c 59 6c f1 5d f9 d8 36 f3 db 7b | 00 1f fd 9f 62 d6 fc a4 0c 59 79 dc 40 4d e4 5a | 26 f7 7b d3 60 14 f9 91 37 58 78 18 88 14 be e4 | 88 8a fa f1 c4 75 a4 31 4f 52 e1 46 5e cf d1 8e | 9c f9 b4 26 da 2d a3 97 eb 50 5c 60 d5 bb 8c bb | 6d 2b 92 6e 83 db 31 aa 80 60 97 87 f1 28 f7 2b | c0 b4 e7 6c 01 76 70 27 2e 05 9c f9 c3 75 6f 18 | 38 5e 72 a4 02 3e 9a ec 50 94 23 4d d0 04 67 a1 | fb d2 c7 f4 b8 d2 26 01 d0 ac aa dc ef ad 7a 1c | f6 27 f6 31 ba cf ef 6b a9 6e f7 2e f2 27 c2 0e | 29 00 00 24 14 d4 23 b3 ee 67 2f 32 3a 28 a9 26 | 74 34 22 80 70 fc bc e1 f8 e1 fc 3b 8e 87 b8 d5 | 50 4f 59 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 b4 a9 36 84 ee c8 33 36 8f 3f be | e9 b7 2c ae e1 30 41 fa 00 00 00 1c 00 00 40 05 | 6c 77 62 56 82 b3 0f 90 87 bf 6a c6 0c bd a8 c9 | 53 ca 46 6f | libevent_free: release ptr-libevent@0x7fb364085920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee40 | #646 spent 0.0784 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #646 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c012630 | handling event EVENT_RETRANSMIT for parent state #676 | start processing: state #676 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #676 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #676 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #676 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.225882; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.98369 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee40 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #676 | libevent_malloc: new ptr-libevent@0x7fb364085920 size 128 "road-eastnet-nonat-97" #676: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #676) | 9b 3e ad 4d 72 f4 8b db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 3a fb 7f 58 e3 6d 62 ec 1e 2e 59 c4 32 70 90 | 18 12 b4 1d 0b 7a db 79 5b 5b f1 b3 ae 64 53 67 | 1a 61 39 5c 66 bf 33 12 e2 07 ee a6 22 5b c8 f1 | db 9f 71 60 29 05 1a c7 13 3e 19 22 f4 45 96 09 | 3e 1a 53 a5 6e fa ef cb 17 c0 79 5f 39 35 36 4a | 56 04 cc 65 b5 06 e3 4b 77 47 11 f6 68 ce 50 3d | c0 ba c5 64 4c ea 38 bc 6c 58 32 32 f6 68 41 7e | 54 0c c5 6f 06 e5 8f 9b 5d 2e 9f ca 8f 21 e6 f2 | 57 64 49 31 d2 36 51 23 ef 32 7b fc e1 c9 40 d8 | 83 9f 51 20 e7 a6 c5 57 1c 3e d9 70 f7 a6 d6 01 | e3 11 c3 e6 40 27 44 77 36 6c e6 51 a9 4a 34 de | ef 68 86 37 6d 3f b8 f2 d1 61 ec 73 99 06 ca 4d | 7c 67 1d 21 d8 21 73 af 9e 16 de 97 5d dc 6c 4e | f2 c8 de e8 d8 33 7c b9 e3 29 55 17 7b 29 87 79 | 3f 1c d3 24 71 d6 95 25 f2 de f6 b8 4e fa c5 5e | 38 62 28 cc 5d 35 7d 8a 00 7d 42 e6 36 56 c3 6d | 29 00 00 24 50 ed 7c 96 0e 66 f7 85 bf de 64 30 | 8b f8 90 bb b7 61 8d 4c 88 80 57 a3 f9 36 fa 84 | 96 9e 05 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 b4 72 7b 99 d0 96 09 97 fc e4 db | 63 69 04 c8 69 8e b3 ef 00 00 00 1c 00 00 40 05 | 9a 7a 34 f9 3d 74 af 91 e2 55 3d 5a 9c b9 26 70 | 97 7c a3 48 | libevent_free: release ptr-libevent@0x7fb34006c3b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012630 | #676 spent 0.0763 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #676 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368024000 | handling event EVENT_RETRANSMIT for parent state #702 | start processing: state #702 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #702 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #702 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #702 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.225969; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.984774 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012630 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #702 | libevent_malloc: new ptr-libevent@0x7fb34006c3b0 size 128 "road-eastnet-nonat-198" #702: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #702) | 15 f5 25 c3 13 f8 3e d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f7 23 22 6b 4e e1 f7 16 71 3f cc 94 ff 78 71 9d | 2b fa a2 70 c3 2e ae 8a 41 75 24 b2 5c bd de a7 | 23 08 94 3d 80 25 9b bb 30 e2 39 68 4c a8 e4 29 | 49 31 37 12 c5 eb 36 bd 19 63 9e bb 02 2e 79 f1 | d5 79 49 b4 68 b2 2f 57 ce ad b6 e5 93 ed 10 47 | c7 f4 e8 7e af a2 87 66 73 2b fe 02 35 20 50 f4 | 9f a5 ab b5 64 3f 58 fa 42 fa 9c 6c 95 59 e9 ce | 4a e5 f4 54 be d8 66 74 a2 a2 90 6f 88 07 da 7a | 49 4b 11 75 25 b5 a8 6e d3 e1 6d f6 61 26 a4 59 | c0 01 b5 a8 17 ba 1f 41 41 7b 34 f9 ae 03 0e 4a | 5b 82 0f 6f 4a f8 8e 71 36 c5 69 ca 74 e0 5b 22 | 74 fb e1 af 0d 04 d4 9e 58 0c 8b a5 0c bc aa 36 | 9b de 60 b8 6a 44 18 d6 e6 f7 1e 5f 4f 0f 2c ae | cb 0c 20 f0 15 5f 9d 76 45 13 42 ad ce b6 34 58 | 61 bf 65 e9 72 77 ab c8 67 23 c2 1d cb 5a b9 e9 | 79 63 d4 bb e2 75 dc 84 01 77 ec d7 11 39 db a3 | 29 00 00 24 29 3f 45 8e 5c a6 8f 4f da f4 c3 d1 | 92 da 38 10 ed 30 75 5c 71 90 dd de 75 d0 e6 82 | d2 61 a3 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b d3 44 81 5f 32 17 86 65 0e fb e9 | 12 7b 72 5f d2 f6 d2 d1 00 00 00 1c 00 00 40 05 | 27 39 6b d9 0c ca bf 20 21 d1 a6 c3 cd c6 e3 21 | 22 00 7c f2 | libevent_free: release ptr-libevent@0x7fb37c03e940 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368024000 | #702 spent 0.0779 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #702 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348046090 | handling event EVENT_RETRANSMIT for parent state #592 | start processing: state #592 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #592 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #592 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #592 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.226058; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.950703 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368024000 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #592 | libevent_malloc: new ptr-libevent@0x7fb37c03e940 size 128 "road-eastnet-nonat-8" #592: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #592) | a1 23 45 d4 95 dd 12 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 aa 2a 51 f9 3f cc db 28 9d 40 57 76 30 ea e9 | 8d e6 d7 38 3a dd ae 4f ff 59 39 ea 16 ad ee 6e | 8b 62 8c ca b4 a5 29 fe c0 61 e6 51 27 98 b4 0a | 1f eb 1b 79 22 3e 1a 67 1b b4 66 38 e1 9a 6a a2 | d0 1e 24 e9 c2 02 a7 7a ce f6 a5 f9 5d be 27 4c | 71 60 3e f2 bd 07 c5 5b 34 15 a1 fe 4b da 4c bd | 44 c6 05 67 90 ad 62 fe e2 99 3c 11 2a d0 f3 17 | 69 1b 22 6b a5 0d 80 74 ae 19 6c 94 76 90 a1 1c | 59 0b 47 78 27 d8 48 ac 3b c0 4d 98 1f d5 86 fc | d6 cb 0d 55 39 de b7 61 51 01 6d fe 92 8b ba 96 | 45 95 1a c6 f8 88 e3 b7 dc ed d9 6d 83 dc 83 68 | 4d da 82 e4 55 42 9e db 10 13 37 0e 08 44 e6 b7 | 92 01 b4 fc 5c 47 c0 bf f0 3a 42 10 d3 9f ca d3 | 90 f7 0f 4b cd cb 5e ac e6 87 b1 ad ed 51 0d 4e | 56 09 8e ae e0 0b a3 ad 21 69 a1 8d b6 00 f2 12 | 05 e3 09 dd f9 79 f5 d1 86 62 dd e9 ff 12 f6 c1 | 29 00 00 24 51 68 bd 9e 33 71 03 a6 00 f3 23 81 | c3 a4 22 43 b3 42 e5 96 7c d8 19 4b ab d2 fa d7 | 63 4d bc 6e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 b9 87 25 a7 de 47 1d dc da 4c 20 | 6f cb f5 ab 4e bb c1 b5 00 00 00 1c 00 00 40 05 | 3d 18 a6 af a0 2d 17 8e 57 6e 37 da 3a df 31 9a | 3f 4d c5 fe | libevent_free: release ptr-libevent@0x7fb348069890 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348046090 | #592 spent 0.0817 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #592 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #601 | start processing: state #601 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #601 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #601 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #601 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.226148; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.952172 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348046090 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #601 | libevent_malloc: new ptr-libevent@0x7fb348069890 size 128 "road-eastnet-nonat-16" #601: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #601) | d7 f7 ca a5 2f 06 a8 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 78 ca bd 24 85 88 4c 78 31 a2 d9 e2 a6 11 ea | a9 a8 ae 09 a4 bd 1f 95 2e 57 31 42 02 74 1f d6 | c5 8b 05 28 72 2e 76 f4 00 72 d0 70 f9 55 b5 84 | 94 83 3e 74 df 62 6a cd 44 08 f1 0f e9 7a 32 99 | b9 ec 32 40 77 3a c4 d1 0a 6e 00 b8 4c 58 c1 09 | 20 0d af 2a d9 0e 8d 53 5e ca 9c e2 9f 27 d8 7e | ce b5 b7 c6 10 df 06 bc e3 80 61 af 7d 92 7a 47 | 1a 5f 4a 09 fe bf 68 fb 0f 40 54 3e 58 85 5f bb | 73 72 f9 bf 1d c8 c3 c9 79 44 0d 07 44 21 4d 95 | fb d2 f9 99 1e dc c6 7e 09 bc cb bc e7 f1 64 05 | 39 dc f9 f1 b3 05 e0 d4 1d fc a0 60 42 26 ba 23 | e3 9b cc 3f d0 ff 12 49 db 17 4a c4 c0 02 73 de | 45 c4 7b f5 22 57 16 78 ee 47 e0 a6 d5 4a a0 a8 | ea f8 76 af 62 fa 50 0e cd 7b b7 d6 9e d4 f1 8e | eb 21 f4 fb f5 f5 7a 25 6c d6 52 91 18 f1 41 03 | e3 0e e9 9c 96 a5 c5 a0 5c 45 85 41 73 2b f2 4b | 29 00 00 24 2f 7a 9a b4 ff 1e 6c 6f 1d 55 f4 6e | bf e3 3b b9 6e ac 92 bf 50 bd ca 89 82 b0 73 dd | ad d2 0a 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 7d 4e 6c df 7e 32 d6 75 e4 3a 9b | ea 1e dd 62 f1 90 1e 9d 00 00 00 1c 00 00 40 05 | a9 5b d2 03 4a 24 da 8f e0 b4 91 a2 3b d8 bb f1 | 5f 38 a9 4c | libevent_free: release ptr-libevent@0x7fb374064930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #601 spent 0.0788 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #601 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34802a9a0 | handling event EVENT_RETRANSMIT for parent state #745 | start processing: state #745 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #745 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #745 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #745 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.226236; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.010721 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #745 | libevent_malloc: new ptr-libevent@0x7fb374064930 size 128 "road-eastnet-nonat-226" #745: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #745) | df ac 39 b5 f9 b7 7d 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e f7 65 df 71 26 c4 3d a2 90 5c a9 e7 88 ce 69 | ff 2d 77 e1 e9 28 b2 ca 63 26 2f 17 f6 30 c1 b6 | 39 b0 8c 45 80 54 3e b8 78 2e 6e fd 9a 2b 2a 52 | ca 74 04 e0 de 83 7f 71 5a 19 b2 89 32 08 35 52 | 70 00 7b 76 28 6d 62 a4 be 64 0c 1f a4 45 57 cd | 11 68 13 12 c1 4b 60 df 43 a5 14 ea bf 55 ed 2b | 18 e3 70 ee 05 77 1b 59 ad 13 96 57 35 f3 b4 6e | 28 41 98 f7 f9 c2 8e d1 b6 81 56 ba 5f 83 59 98 | c7 5b ab 64 6f 96 f4 3e 22 b8 09 cc af c2 0e ab | 6d a3 ec bb 7e 4b c4 f1 95 3e e6 35 d1 ea 5f d2 | 5f 46 72 4a 07 85 6d 10 0c 34 15 0b a2 f3 fd 62 | 45 e0 37 8e b4 eb a6 d9 5e 4a c5 3b b8 de e2 bf | 9c 19 26 ec 20 49 07 de 03 c8 b8 f2 22 8a b0 69 | 7c 4e a6 9f e0 80 50 9a 1a 56 09 a3 d2 31 da 0c | 1d 1c 03 93 e7 49 e4 22 b6 cd b0 39 68 08 3e 18 | 56 e3 51 94 91 4c f4 14 88 bd 84 2f 7c a2 b8 75 | 29 00 00 24 55 ae 14 5e ed e8 27 ac 21 93 fd 63 | 78 8a 19 9d 55 09 8a 50 52 47 37 07 2f ec 25 35 | ae 89 b9 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 71 bd aa 31 18 7e 5b 95 40 b0 64 | 8c 00 c2 4d 9c 60 b6 d8 00 00 00 1c 00 00 40 05 | 96 11 c6 74 b5 44 15 ed 03 ab 9b 4e 68 8e d0 9d | 24 43 c0 9f | libevent_free: release ptr-libevent@0x7fb348077830 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34802a9a0 | #745 spent 0.0761 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #745 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3800153c0 | handling event EVENT_RETRANSMIT for parent state #610 | start processing: state #610 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #610 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #610 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #610 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.226323; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.953727 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34802a9a0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #610 | libevent_malloc: new ptr-libevent@0x7fb348077830 size 128 "road-eastnet-nonat-18" #610: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #610) | 61 d4 76 e8 fd b1 0b 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 8a 16 af af f2 cb a9 02 ff 3e 3d ae 02 b1 75 | dc a6 9a 8d 77 a2 72 9d c4 d4 e4 1e d5 6c 54 7d | 5c 6a 9a 07 f7 ee 11 8c 25 4e 17 a6 b4 8f e3 97 | 33 ae 5b 1d e1 aa 4d 9c 14 18 3d 8d c9 8d a2 6f | cc 49 8f 9d 17 34 c4 20 96 b3 e2 03 ed 8c 8d de | e3 73 b6 b8 61 9a c3 4a bf 27 d3 2f a8 fe a9 f8 | 00 87 44 22 9b 0b 25 c8 66 f5 c0 23 88 06 14 5d | 26 0a 98 52 96 46 68 85 8b a8 34 78 ba b4 82 eb | 78 95 23 ba 81 62 21 b2 59 bb 25 ed 00 99 e2 d9 | bc 0c f2 02 1d be ff ab a8 66 25 8b 4e d9 07 26 | 4c 48 db 62 8c 96 22 7a d7 2c 26 7a 28 67 fc ec | 0b 44 dc 7e 93 ed 10 51 02 0c 46 dc fa 32 73 51 | b0 91 38 ff ee dc a3 8a 63 c7 0a 63 49 4c a8 57 | dc a0 35 96 35 c6 37 d0 da 6d 46 79 bf cf e8 4f | 26 a6 1b 5c 3a e0 a5 e5 c0 3f 87 73 30 32 59 71 | 11 55 e0 04 02 19 e3 7f 10 2f 76 30 3d 2f 19 1e | 29 00 00 24 47 ba 8f 29 57 01 a1 62 29 56 13 62 | 64 9d 16 df 12 f0 5f 85 ef e3 38 7e a9 49 18 89 | d7 eb 36 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 3c d4 8a e5 4d 08 9a 3a 72 88 9e | 1c 04 96 d4 a5 b0 e4 1d 00 00 00 1c 00 00 40 05 | 52 67 e1 51 42 cf 44 ba 32 e7 56 bf 02 a0 23 c3 | c5 4f fa a5 | libevent_free: release ptr-libevent@0x7fb3400613a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800153c0 | #610 spent 0.0787 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #610 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c018460 | handling event EVENT_RETRANSMIT for parent state #537 | start processing: state #537 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #537 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #537 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #537 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.226409; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.921629 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800153c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #537 | libevent_malloc: new ptr-libevent@0x7fb3400613a0 size 128 "road-eastnet-nonat-150" #537: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #537) | d1 5a 93 f7 50 58 86 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 fb b2 e9 f5 e0 48 e2 24 d7 b7 90 81 4f a6 cf | 4b 14 8e f5 13 4f af 05 2f 84 bf 07 10 88 44 08 | 93 8a d9 fc 6f 22 fa 3c c8 70 98 39 d3 4f 21 67 | 30 23 4e 48 1b 3c bb d4 79 64 36 c0 17 1e c6 75 | 8a 84 dd c6 9f 18 fe 97 4a e5 66 71 01 67 56 d0 | 31 45 bd 3f 15 7c 4b 14 f6 e2 75 2e db 9d 87 36 | c1 55 2a ef fb 95 d2 cc e7 66 60 2a 50 9c df a0 | 4e 6b 6c fc 98 57 d3 ff f6 ab 30 47 15 58 24 c5 | 05 24 2b 82 ab 42 7e 2d 14 b1 af 64 00 e3 f0 ff | c9 03 29 6e 02 ac 5f cd 18 87 64 c1 df 8b 41 55 | df 40 66 85 17 02 00 95 d2 86 68 ed eb b9 5f fb | fb b4 ca c2 86 45 6f 55 ef 58 df 3c e1 5f a2 fb | 91 dc bf 24 5e 80 76 e4 9f 99 2c 02 e9 6b 6e 98 | 01 53 4a 03 27 4f 46 fe 01 ab 6a 3c 9f e3 be 2f | c8 ee 29 25 4e 78 52 2a 3e c2 0b a4 ff 2d c1 b2 | 21 1d 49 45 c8 7c fb b6 52 62 ee 97 b5 36 16 bc | 29 00 00 24 27 a3 e5 a8 20 a1 f0 e2 d4 b5 39 34 | 87 53 60 68 73 e4 69 53 b8 d2 8c 69 1f 4e 6c 2e | b8 6d d5 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 04 dd f4 fd 4d 77 54 64 d5 cd 35 a0 | 59 04 f4 07 5e 47 05 77 00 00 00 1c 00 00 40 05 | 52 af de ce e9 7d c2 89 3b cb ea 98 eb 7e 08 db | cf 06 0c f1 | libevent_free: release ptr-libevent@0x7fb36804b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c018460 | #537 spent 0.0779 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #537 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ac3ec0 | handling event EVENT_RETRANSMIT for parent state #674 | start processing: state #674 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #674 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #674 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #674 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.226496; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.982386 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #674 | libevent_malloc: new ptr-libevent@0x7fb36804b7c0 size 128 "road-eastnet-nonat-124" #674: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #674) | c4 c6 34 70 7c 35 e5 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a bc 91 62 ee 2e 6d a2 96 c5 30 6d 1f 92 ed b7 | 36 56 8d b5 b9 4e e7 b6 33 c3 4c 5c dd d6 f4 99 | 88 c9 81 6d f6 b8 fb 84 e7 0a 5b 99 69 b8 6b 63 | 7a 47 28 12 93 aa 96 26 97 8f ff b9 54 0d 01 18 | 0b 01 9c b3 8f e0 95 e3 e1 9d 26 36 23 71 6c dc | 67 79 37 64 c4 24 a4 8b 9a 37 fa 7c fe 2e 7b 4e | 1a d6 c0 1d f0 ba 43 6c c9 02 6f 4f 9f c0 dd 79 | 3d 4a c7 9a 21 b7 1e b6 9d 90 fd 88 56 63 07 44 | 2e 81 d0 20 01 0b f4 e9 81 1c 3c 49 3e 91 bf 96 | a8 41 f1 e1 4c b6 83 f0 23 56 56 ad 6c 9d 70 82 | c4 41 64 86 d0 59 a6 a1 c7 b9 ee bc 84 09 46 41 | ec ae 2a 69 5c 40 a2 14 21 11 a1 b8 60 07 45 17 | 11 d0 1b 33 f1 93 91 61 7c 42 1b f1 6c bf d3 4c | 23 c1 b7 fe 96 eb 71 68 e8 19 04 8e 6f cb bd 87 | 40 31 f1 46 3f 4f 53 d3 a5 41 35 6c 1a eb f1 20 | da d9 d7 75 6a 41 10 84 60 5b cd 6c 15 bb 13 b1 | 29 00 00 24 5c 59 fc 58 f4 7f 35 a7 c0 cf f0 29 | 1a 0b a6 f7 cf a4 ea bd 59 bd c7 ac 64 c5 cf 21 | ff 47 b8 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 49 d6 82 49 46 9b e1 ef 78 a9 24 e2 | b6 c7 14 d6 61 e8 82 0a 00 00 00 1c 00 00 40 05 | f5 e0 05 f9 c1 de b5 2f 1e 75 ed d6 26 ed d6 71 | 2a 1b 30 01 | libevent_free: release ptr-libevent@0x7fb338053ff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | #674 spent 0.0778 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #674 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38000feb0 | handling event EVENT_RETRANSMIT for parent state #731 | start processing: state #731 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #731 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #731 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #731 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.226583; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.997151 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #731 | libevent_malloc: new ptr-libevent@0x7fb338053ff0 size 128 "road-eastnet-nonat-247" #731: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #731) | eb e9 70 00 69 c5 c4 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 67 4d f9 7f 74 4c 76 c5 7d ce d6 e6 9c c9 6d | b0 c4 70 40 ef 97 97 d2 1c 4e 93 b0 80 9d 3a eb | 37 1f 1d 04 0c ef 30 c3 25 21 ef b9 52 fa f8 25 | f3 a2 cd d3 47 9d 78 9f 8b c4 7e 38 5c 77 0a c5 | d3 21 67 45 0d dd 9e 51 ac e8 fe 88 81 61 87 c2 | bf ec 72 79 20 70 3d b9 9b 4a 0a cc 96 c2 0c 1c | b4 24 87 a5 62 f8 87 c2 7a b5 bf bd b6 53 b6 6d | 19 8f 82 6c 68 5d f7 38 34 94 99 64 71 ca 0c 62 | 25 bd 32 0c 2a f6 57 9c 09 73 ce dd 1e 58 8d ff | 02 8b 34 0a 54 68 de e5 d0 3e d2 74 a9 f6 24 94 | f8 4f 07 60 33 d2 a1 12 0e 69 d9 92 e8 be 55 47 | 9e be 0f a2 43 78 15 07 2a 74 35 28 6a 6d 64 ef | 98 ba 51 d6 01 0e df f1 ec a7 d0 19 a4 37 69 ad | 90 02 2d 4c a7 53 6f b7 ea d5 ab de f2 8a 74 80 | 9a 6e ee d2 0f 75 5b 34 33 20 ef e8 cd 1c f4 fb | 86 77 5a 4b ee a3 d1 6d 3f c5 96 d8 02 ae e5 6b | 29 00 00 24 b0 eb 9d cd b4 1b 6f 55 a3 ba 16 0e | 88 2e d4 ea 77 6f 8c e6 93 bf f5 13 b8 7e f8 74 | 0e 59 6f 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bb fd fb f3 6e e4 ad 3c d3 d9 d4 b4 | 6c e9 ad f0 0d 3a ec db 00 00 00 1c 00 00 40 05 | 69 a1 72 77 b4 3e 53 1b 4f 8c d6 b0 82 44 05 d3 | c0 95 51 82 | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000feb0 | #731 spent 0.0763 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #731 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2b610 | handling event EVENT_RETRANSMIT for parent state #550 | start processing: state #550 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #550 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #550 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #550 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.226669; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.93009 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000feb0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #550 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 "road-eastnet-nonat-91" #550: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #550) | db ff 34 cc aa 26 9d 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 8a d7 13 53 9b f1 64 c1 c8 04 0a 8b 03 2b c6 | 0d ad 43 39 3f fa d4 31 02 f2 d8 f2 49 42 65 4d | e0 c7 6e 23 69 ee af f5 1d 8a 37 e7 f7 88 51 de | da e3 c7 6f ce 70 fd 62 27 15 72 b1 74 d5 96 fe | 5d 1b a4 a4 ca 31 5b a5 af a2 32 e4 20 19 00 6d | fa 74 d0 93 44 c3 c0 75 8e c7 8d 89 fe 62 d3 0e | ec 96 32 6f b0 ca 05 63 70 b3 be f1 fd 8a 22 d3 | 30 ce 9e d5 e4 e5 4d 92 9a f9 82 cc a2 1d bf 79 | e0 be 40 12 35 fa 00 26 4c 97 eb 5c 78 8c 37 10 | 77 68 70 27 80 31 92 d4 17 d1 f6 07 6e a8 5c 37 | b2 cf 98 7e 16 70 ee da 2f c8 6a 1a cf 99 42 34 | 69 17 56 25 2f 75 a2 60 5b 03 8f 41 b4 71 d4 fe | d6 39 fc e1 d0 29 d9 e4 01 4d 2d 30 57 34 2a 98 | 61 8d 90 1a 37 ab e2 12 47 26 fe 8f 69 f6 20 34 | 44 8b 50 13 5b e0 15 0d ae 46 52 1d a4 2f bb f4 | 98 b0 5c 9c 64 1b 86 83 6f 11 65 70 23 23 74 6f | 29 00 00 24 e6 6e 02 88 81 a9 8e a7 ae 14 ec 40 | 05 51 ce e9 24 5c 3b c2 0b 49 df 12 27 77 a8 bf | ca be 33 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 11 2c ad 5a 38 a4 00 8e af be fd | a7 9a 55 19 4d 9f d1 09 00 00 00 1c 00 00 40 05 | aa 58 63 41 f4 3b 9c a5 91 ba 1f 8a 0a d5 9b 23 | 59 28 d4 a7 | libevent_free: release ptr-libevent@0x7fb37c0720e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b610 | #550 spent 0.0779 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #550 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #544 | start processing: state #544 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #544 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #544 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #544 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.226756; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.929863 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b610 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #544 | libevent_malloc: new ptr-libevent@0x7fb37c0720e0 size 128 "road-eastnet-nonat-38" #544: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #544) | 0c c8 e0 5f be 01 79 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 4b b7 07 59 5a 8f d2 fb d3 5d 33 1e 68 91 b3 | a2 26 c9 b9 8a b4 e6 8a 43 31 64 0d 77 e0 f1 15 | a1 39 45 b8 6b 02 50 97 06 06 58 9e 3a ef e8 37 | e4 7c 57 f1 4d 93 3b f5 c4 5a e8 bb 95 0b 16 30 | ae 70 14 a4 78 fb c6 1c 98 e7 86 0d 21 64 8f 8a | 57 22 3c 59 65 26 f5 b7 05 65 f5 b3 e4 57 83 07 | f5 ce 36 2e 87 c6 da e7 e8 5c 9e ac 52 b5 c7 3a | f5 b5 91 44 37 d8 f7 d2 db 23 2c a3 a1 47 55 3d | c3 92 ed 16 17 e5 6d f6 27 bc 16 5c 7d af 1b 3d | b1 6f 3a d3 6c 01 d7 03 36 b7 2e bf 9e d3 3d 31 | 24 06 bc a1 b6 d4 18 fd b7 44 8a a2 c6 1d 54 30 | ae a7 68 58 6b 6e 1c 65 90 77 e6 12 7e f0 bb ad | f3 9e 62 3f 52 83 0f 79 80 56 f0 97 14 45 da 2a | 9f 60 50 4a b5 7b 81 9f 4e 30 c8 19 e2 8e 7e 1a | 5f 7d f6 43 0f fd 85 83 e1 ad 46 c1 11 a2 4c 5f | ff 7c b9 be 6e 26 8b f7 40 11 92 c6 8b 91 0d ac | 29 00 00 24 e2 a6 28 8f f1 ed a9 8c ae aa e7 2c | 5e dc cc d9 d9 82 b2 05 50 60 c7 46 e1 4a 89 6c | 50 12 77 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 fb b8 9e 31 b2 48 64 bc b6 ad e6 | d8 89 63 35 93 98 9f 2c 00 00 00 1c 00 00 40 05 | c9 4d f1 16 2f aa 6e 90 ec dc a5 b3 7b 2e 5c c9 | 7d 08 18 e1 | libevent_free: release ptr-libevent@0x7fb3380597d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | #544 spent 0.078 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #544 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c014cc0 | handling event EVENT_RETRANSMIT for parent state #611 | start processing: state #611 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #611 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #611 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #611 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.226855; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.951965 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #611 | libevent_malloc: new ptr-libevent@0x7fb3380597d0 size 128 "road-eastnet-nonat-177" #611: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #611) | 34 ea b3 f2 4f 9b fd 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 65 77 23 f1 8e 59 ad e7 ff 5f de d0 89 eb 8f | e9 74 c5 98 7f 21 ce 5f 9a 27 21 a7 98 93 9e 99 | e4 27 4e b7 b3 24 fc 80 94 f6 f4 f5 9c fa 3c 88 | 3d a1 56 1a 21 1c 0e f5 0b ed e1 09 65 2e 3d d4 | 2f 57 58 dc 24 ce 14 24 1c da 0b b5 60 f1 11 17 | 1a 17 9e 79 a3 98 e2 85 17 79 fe 96 1e fd 0a 94 | db 8d d3 25 e1 09 1f 09 2d e1 61 f8 5e 36 1f 1e | c1 70 ed 24 ed f4 d8 4e fd 57 46 fb d1 4f 47 ed | 53 5d 31 e7 1e 13 8b 95 3e 46 72 5a c0 f9 1e d0 | 00 11 60 68 91 85 15 b6 a5 b9 35 22 09 f5 1e bb | 2f 36 9e 4c 45 ba 3b e0 87 f8 18 85 4b f7 b6 9b | 48 62 35 a7 22 dd 90 30 ba 7a 3c 10 b3 65 8e 2c | 7c d8 4a 70 a8 d5 53 60 76 0c 5d 33 c9 61 54 67 | f9 1d 59 23 17 2a 52 2b c0 bf ff e6 44 b3 ef 2a | 84 a8 c8 18 68 4e c2 5c 11 a6 2e dc 53 a6 93 01 | d4 df b1 45 21 de 1f be f8 d7 e5 8a 4b 8c d0 57 | 29 00 00 24 db 8b 59 30 04 e8 61 45 59 6e b9 45 | 4b e0 a8 74 27 04 8d 8e 65 dc 44 fc e5 bb c8 b9 | d4 93 ad 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e cb 52 55 02 e3 8d 62 40 06 d9 c3 | 25 de 61 c2 25 e8 55 c6 00 00 00 1c 00 00 40 05 | 4c c7 ad 1d 02 9d 47 2a a9 d3 98 b0 82 03 7b 27 | 1e fc a6 ec | libevent_free: release ptr-libevent@0x7fb34c05ecd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c014cc0 | #611 spent 0.0901 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #611 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb384038200 | handling event EVENT_RETRANSMIT for parent state #551 | start processing: state #551 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #551 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #551 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #551 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.226949; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.925489 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c014cc0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #551 | libevent_malloc: new ptr-libevent@0x7fb34c05ecd0 size 128 "road-eastnet-nonat-54" #551: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #551) | 6d 61 08 83 3f 41 28 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 10 09 30 29 21 c1 f4 7d 5c 69 d9 0d 1d e5 ea | 5f e5 a9 db 38 23 61 5f db 1d 40 23 04 f7 e7 7f | b8 e0 a4 4d 7c 42 cf 01 84 f7 f3 90 63 0d a6 27 | 03 53 27 bf 55 c3 86 69 1e d9 34 0b ea 6d ef b8 | 91 72 41 a4 7f 9d 36 67 17 b8 f1 de c9 57 cf 25 | 96 88 4b 97 29 55 03 99 2d 0b 7d 25 6e 82 28 00 | 28 de a1 1d bf 28 3b 57 86 30 40 b9 3b b3 59 37 | b9 3b 89 a1 f7 97 44 8d 31 dc 44 99 58 00 16 65 | 19 ab 30 5f 5a 1a 94 95 50 6f 1b d2 58 f8 43 59 | 32 7b ce 9f f3 ba d6 9b 84 a1 13 0d 64 7d 87 0a | 6a cb 60 60 91 23 18 fa 0b 4c 7f 24 f7 e4 a9 1b | da 1e 22 44 6a ff fd e2 c7 3d ff ec 71 14 90 da | 2f 14 ba 4f a8 6b df 31 2c a1 a5 6a a3 1d dc f1 | 4e 14 ae 37 41 c7 58 f2 d5 00 5d 49 d0 c7 f4 76 | a0 bd 4d a8 c2 8b 1f fe b6 2f d7 91 47 6a e8 e1 | dd 7d 06 82 4d 33 80 36 54 a3 03 be 52 06 d4 cf | 29 00 00 24 c1 64 a4 63 7a bd c6 9b 19 d4 3d 64 | d3 05 1c 05 f8 31 a3 bc 62 83 1f 22 d8 12 00 d9 | 0f 94 f6 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 12 25 8d 00 b4 d4 c7 fd 0e de ae | 25 a5 ca 2c ce 50 fd 3f 00 00 00 1c 00 00 40 05 | eb 33 8d 88 55 34 43 12 f6 bf 6c 9e 03 ac c1 f8 | ae e6 a3 5e | libevent_free: release ptr-libevent@0x7fb384054040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384038200 | #551 spent 0.0803 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #551 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388009ed0 | handling event EVENT_RETRANSMIT for parent state #627 | start processing: state #627 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #627 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #627 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #627 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.227035; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.974529 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384038200 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #627 | libevent_malloc: new ptr-libevent@0x7fb384054040 size 128 "road-eastnet-nonat-161" #627: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #627) | 85 ff 81 8d 39 ae d0 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 b9 1b a0 9a 2c 50 8e 02 95 9b 5f 3b 83 99 4e | 07 74 8d 16 ae 8c bf 98 d2 8b cb e9 a7 c0 0d 94 | 88 9d dd 9b 54 84 6a 7f 4a dc 84 92 79 46 91 fa | 6c 85 8d b3 55 b3 d1 e1 35 12 39 9d da 6c 29 94 | 61 2d cc 21 47 bc b2 6d 88 1a 4a 94 f3 43 7b d9 | 8f 20 77 79 db 4d 47 13 73 be 1f 12 57 25 9e da | cb ff 72 15 51 1f 53 22 a4 a5 4d 16 f4 f5 a8 77 | 72 b7 12 ba 58 1a 43 7f ce ef 32 64 0f 90 fb f0 | 98 cc 71 a3 6d f2 87 79 fa 29 62 da 22 a4 18 69 | 55 35 d1 f8 9d 44 18 aa bf 4b 02 e9 29 b8 5f bd | 16 17 ad f8 d3 f6 25 bb 24 f5 6e 8c 20 d9 44 9d | 67 1d 54 cc 02 45 19 dc 2a 2c 20 34 4f 14 45 ba | 5a 79 14 e1 00 9c 1f b6 a0 9b 07 d7 22 e1 98 15 | a7 b0 4f d0 ee 43 65 3a c3 b4 42 49 47 06 50 31 | c0 75 69 4b d6 fc bf 2f 2f 07 7d 00 fb 73 c9 83 | d0 e8 66 df af 0f bf 7d 27 62 7e bc 01 f7 d2 fa | 29 00 00 24 e2 15 33 1a 7b 95 48 00 21 d4 69 5b | 6e 98 84 ff 1a 3b 2c ef f5 83 72 31 b0 15 1c 81 | c6 0c 3d b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 ee 1c 29 3c 33 ab 04 ff 5a 9a b8 | a2 4b f5 11 1c 8a 96 c4 00 00 00 1c 00 00 40 05 | c2 8c 6c e3 eb bc 71 3c c4 77 e2 2a 2f 10 8a 7a | 93 a1 3f 6b | libevent_free: release ptr-libevent@0x7fb338064790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388009ed0 | #627 spent 0.0812 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #627 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #523 | start processing: state #523 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #523 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #523 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #523 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.227129; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.919983 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388009ed0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #523 | libevent_malloc: new ptr-libevent@0x7fb338064790 size 128 "road-eastnet-nonat-49" #523: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #523) | 07 bb ac 77 0a 7b 9b 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 32 2d 24 90 2e 75 6c 89 41 22 7c 04 93 61 b1 | 39 9b 32 4d 26 76 8c 24 bc 2d ac ee b2 3a 1d 13 | 80 14 c2 ce e8 90 ed e7 ec 82 33 fc cf 75 5a 59 | 9b c2 1e 9a ce 67 9e d0 32 1d df 06 30 99 8f 42 | e3 86 8d f2 a6 5e 6c 60 43 e3 54 7f 8e 10 64 f2 | 09 cd aa b7 1e 85 a0 06 7d 3a ff 7a a3 a4 14 fb | ff e9 1f 06 7e ad ad 41 ac 22 2e 81 48 aa 18 5d | 46 d1 2e ee d8 cb c5 80 a9 94 af ab 7d 0a 94 dd | 5d d1 aa 92 aa ee bb 06 90 ba f8 2f 6b 05 81 8b | c1 e1 46 3c 9a 94 f0 1c d0 2e 48 d8 93 0d 01 e6 | 42 b1 eb d7 08 a6 f8 5f 35 b3 a8 51 ff 1a 28 27 | a9 2e 3b 94 f9 50 49 28 9e 67 8b 4b 2e 25 e2 75 | a6 af 7a bc 8e e8 70 b4 b8 23 7e 7a 37 d6 c9 3a | e0 69 41 d0 87 31 ed a3 a3 e6 b4 1c 66 5c da e4 | 72 e0 33 43 7a 69 31 25 86 69 bf c1 c5 6f bd 27 | b9 80 4c 20 7c 9b 47 3c 48 70 66 96 58 bd 89 9f | 29 00 00 24 65 25 bd 90 0a 47 32 65 7b ff a5 6e | a2 70 3c 06 64 54 94 9b 0c 9e 4e c1 38 45 e7 b8 | 1b aa f1 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 c1 b5 e9 b8 b6 f1 9f 93 d5 2c a0 | 2c fe 30 59 be 37 e1 f4 00 00 00 1c 00 00 40 05 | a9 4a 22 b0 e8 8c 8d 17 4d 42 81 df a3 74 1f 8f | e6 9c ea 37 | libevent_free: release ptr-libevent@0x7fb36c059a40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #523 spent 0.0783 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #523 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35800d120 | handling event EVENT_RETRANSMIT for parent state #693 | start processing: state #693 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #693 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #693 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #693 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.227216; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.985529 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #693 | libevent_malloc: new ptr-libevent@0x7fb36c059a40 size 128 "road-eastnet-nonat-156" #693: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #693) | 8c cd 5b 89 3d b1 c0 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 e2 11 fa f7 47 b1 84 25 8d b1 b9 cc 61 7a d1 | 10 c4 99 41 8a c2 39 41 fa f2 fd fe 2d 88 77 1c | 45 28 1f 19 11 cd 86 3b 21 90 05 0a 95 68 f9 b5 | 66 47 f0 fd f6 ed 91 51 a1 90 e5 3a 68 7d 44 49 | 52 7e 11 24 5b 36 2d 9e 45 cf d7 e0 d6 57 a2 7e | bf a1 9d 8b 04 a2 cc 30 fe 6f 9d 2d 07 7c c6 a9 | ac ec ed 97 f5 f4 d7 97 49 b2 0d 08 4f 28 26 b4 | af 6a 98 d7 60 90 49 c5 06 ed 93 e3 18 24 17 de | 76 59 7c 05 cb a5 83 81 c6 45 a9 36 d4 c9 e5 a7 | d0 88 64 07 2a 87 01 7c 25 df 11 ab 75 b4 6c 03 | 37 fb 6f 75 2d f8 ea 20 73 cf 0c cd ba 90 c2 2c | 01 10 39 d8 3c b3 37 5e 08 f0 10 c6 bd a5 ce c8 | 64 ae 6d 05 92 4e 98 ee d6 94 4c a1 e4 7c b1 13 | 3e 00 d0 8a 16 57 67 90 44 2b 00 cd 9b 43 89 4a | bd d3 f2 0a 53 1d d1 36 e1 24 9c 6e 9e aa 0f 7b | 30 f6 e4 b8 a4 c5 92 c8 e5 b2 55 72 6c 6f d9 28 | 29 00 00 24 14 85 11 ba f9 3b 72 6e cf bb f5 0a | de 80 83 65 33 0c 22 f8 ea ad 98 f3 8e 26 41 40 | d7 cb 01 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e f4 9d 3b cc 7d 09 25 54 61 34 fd | ae 72 6d c2 c2 0a 3b 62 00 00 00 1c 00 00 40 05 | e8 a1 80 e7 3a b7 e7 08 64 9f b4 0b f3 c9 d4 c2 | cb 3c 43 63 | libevent_free: release ptr-libevent@0x7fb37c0813f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800d120 | #693 spent 0.0763 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #693 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aa1f00 | handling event EVENT_RETRANSMIT for parent state #541 | start processing: state #541 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #541 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #541 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #541 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.227301; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.923445 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #541 | libevent_malloc: new ptr-libevent@0x7fb37c0813f0 size 128 "road-eastnet-nonat-24" #541: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #541) | e5 6d dc 54 e8 13 c6 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 70 ec f4 97 99 d8 72 ce 1b fb 62 b7 ff 70 b1 | d0 af d0 71 cf c9 19 5a 4b 54 67 9f d9 76 16 c5 | c2 a4 79 9e 63 b4 60 27 34 54 51 7c ce 20 f6 c6 | 4c 4b 74 1f 25 17 6c 4a e1 d4 14 08 5a 16 b4 9b | 82 8a 4f 61 af 32 25 98 4f 8b b6 f5 b4 de 0c b8 | 8f 1e 39 50 5f 6a 1f e4 ec dd 6a 69 e6 1c 77 5b | 51 25 d2 75 cb cb 97 24 6c 0c 79 b7 db 85 62 10 | 6e af 06 f5 31 7b 0b d7 96 08 f6 7f 02 1c 78 21 | 18 19 57 15 cc 45 e4 91 68 10 8d c0 f5 dd c3 33 | 9f d1 8c 61 12 47 98 e4 4a b7 b5 c3 22 ac 54 c9 | a2 b0 69 33 63 5c 14 fd d2 8f 89 5d d6 7f 3d 6d | f8 ab aa bd b8 f0 3f 92 e9 56 8b 5a 9e 4a 02 6e | a1 8e c1 f3 24 ab ef 20 e4 c9 e2 98 e4 c4 c3 92 | 49 b8 7b 9b eb b0 61 e1 ff c9 4b 16 04 d8 8e 9c | 7e c1 26 a0 a7 e2 6e 1c 6f b6 6c b8 06 b6 36 e1 | df 58 24 88 c2 60 0d 9a 51 05 8e 85 c2 9e 66 5b | 29 00 00 24 e7 35 32 98 af d0 40 10 f4 80 06 7c | f0 2f 64 a5 58 9a 04 65 fd dd 75 64 b2 5d 38 dd | a9 29 2e d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 7c fc 09 1a 79 2c 04 02 74 c5 f8 | 3a d6 61 08 3f 8f 87 41 00 00 00 1c 00 00 40 05 | 30 97 d6 ac 90 33 4d 32 1c 73 f2 d2 db 60 9a 7c | 6e 76 e0 11 | libevent_free: release ptr-libevent@0x7fb364080140 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa1f00 | #541 spent 0.0775 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #541 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35800cc10 | handling event EVENT_RETRANSMIT for parent state #730 | start processing: state #730 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #730 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #730 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #730 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.227388; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.998251 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa1f00 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #730 | libevent_malloc: new ptr-libevent@0x7fb364080140 size 128 "road-eastnet-nonat-234" #730: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #730) | c1 b9 1a 2f a2 98 4a 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 90 42 68 2d aa ea 2e 10 58 50 76 72 99 aa 32 | eb bb 32 a1 c5 3b 39 b6 da 46 5c be 25 37 be ed | ef 19 db bb 09 e7 d6 5a e9 9a f4 55 2b 2e a7 bb | 7d 7e ab 94 f5 2d 7f 2f 19 2d 9d be 3b 1e 1f bc | 50 99 e9 b4 9a 91 0e c6 06 9d 5d 9a ba af 5a 8e | 69 1a 0a b7 44 11 98 29 1c 1a dc d0 d0 5d fa 86 | 8a 1a e8 5e 7f fc 9d 17 de 62 df a0 79 b7 62 86 | 03 fc dc 45 27 d9 98 5e 7e c1 5d 73 17 7b d2 39 | a9 02 e8 b3 fe 5b 39 41 98 ea d2 07 3a ff 02 e9 | 9c b2 8a 30 03 fa 2c fb df 3c f4 0d 12 f0 fb b7 | 2d e5 f6 c1 41 31 4c a6 2b 97 92 32 b8 ab ea d4 | 0c b2 3f eb 53 93 29 c9 b9 5f b1 d5 21 34 f2 4d | fc e4 2a 50 24 06 56 bc c7 41 5b 59 70 69 cf 96 | 1c 5a 5f 05 3e a5 0f f1 a8 c5 92 7e bd 2b fd 46 | f0 21 0d 82 1e f5 38 85 81 4e 66 9c 19 55 16 0e | 44 6b 58 99 91 1b 47 47 7a f8 3e 28 3f a5 78 ea | 29 00 00 24 55 e3 90 65 fa b6 41 c6 1d 4f a6 98 | ca 46 e7 a1 7a 87 94 e6 4e 60 4a 2e 32 84 98 8c | 92 ba 64 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 cb 8c 60 04 f9 7c 78 24 b5 81 07 | 7f 5b 58 33 fe 16 dc a2 00 00 00 1c 00 00 40 05 | 6f f5 31 fa 7e c6 ed 0e 01 8d 80 c5 e9 40 f1 ef | d7 29 12 3d | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800cc10 | #730 spent 0.0781 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #730 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370046090 | handling event EVENT_RETRANSMIT for parent state #613 | start processing: state #613 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #613 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #613 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #613 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.227476; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.939221 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #613 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 "road-eastnet-nonat-31" #613: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #613) | 79 93 08 03 2c b4 dd 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a e1 6a 82 db ed db 74 ee b6 15 12 39 71 33 bf | 8a 46 d7 c6 c5 8a 1b 3d a2 de 2e f1 c1 94 33 c0 | 34 aa cd 57 d3 68 0a 98 44 dd 52 e4 12 32 bd 16 | 0c e2 b3 0c 1d f7 54 42 90 09 2f 70 da 3e dc 46 | 26 73 29 3f 4d 95 44 51 c4 ee d0 51 62 f5 23 73 | b1 79 05 13 44 f0 8d 5a 13 9f d6 c9 04 56 fa e7 | a2 43 d1 96 b2 b6 52 69 ea dc 64 81 12 bc 22 c2 | c4 ee a3 e1 69 5f f8 37 1b e7 00 a6 82 ff ee 85 | 5b 12 1c 2b ba ff 36 aa 33 29 61 20 53 f5 26 6e | e7 36 fb 9e 58 96 08 1a f4 41 81 4b 11 d3 c0 cd | 3e d4 7f 23 fd 79 62 dc 64 4c e9 e5 d0 f2 db a5 | 1b cd 14 72 42 56 15 bb 0e b4 bb d4 e6 c8 7c c1 | 88 7c 43 0b f3 ed 50 68 99 2f e0 93 89 bc b2 e4 | 01 54 87 c5 c5 6f e4 ac 60 cf 42 a6 f1 da 67 fd | 37 ef 53 de 9e 68 36 8d 63 23 d3 89 29 6d 55 6a | db 4d b6 90 4e 9f 31 7b 83 b2 4e 39 37 2c 7c 49 | 29 00 00 24 38 88 3a 8e 21 d0 99 01 66 b4 5d 84 | 38 93 2d 4f e7 27 09 2a 71 43 d3 fd 55 4d 04 8f | a5 6a 55 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 b5 7c 10 1e 73 0b 8e c4 8c 67 0d | 37 a9 91 c5 05 2c 6c b2 00 00 00 1c 00 00 40 05 | 8a 81 ac a2 d8 3f 44 cf aa 4d f4 06 c5 76 63 33 | 40 a4 d1 4c | libevent_free: release ptr-libevent@0x7fb37c05eea0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370046090 | #613 spent 0.0764 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #613 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35400cc10 | handling event EVENT_RETRANSMIT for parent state #542 | start processing: state #542 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #542 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #542 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #542 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.227563; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.927099 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370046090 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #542 | libevent_malloc: new ptr-libevent@0x7fb37c05eea0 size 128 "road-eastnet-nonat-3" #542: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #542) | 19 ef 59 5e 62 c0 95 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 79 27 54 07 c6 5d 65 e0 c6 e9 51 3c d2 f7 23 | 14 31 ac 33 ad e0 98 39 13 b2 d5 2e 21 16 ef fd | fb 26 fb b6 5b 85 f7 f1 d6 8c 2f ce 82 67 51 76 | fa d3 54 14 d5 1a 64 a6 27 51 68 bf da d2 0e 9f | ba 1d 58 01 63 c6 05 46 a8 1e 48 8c 0f 1a 50 9f | c7 02 55 57 2f b0 4c 8c ba 2a 6e 11 20 86 c9 eb | f4 2f ad d5 ad 8d b4 c6 8d 1b 09 90 d8 aa fd 33 | d8 fc 91 0e 8d 34 75 59 76 d8 c1 fb b1 99 78 79 | 99 6e 5c 3f d3 a2 5f 67 1a 09 7c 1f 03 50 f4 93 | c2 74 d9 b7 7a 58 a0 62 d2 8e 30 4b 2f b5 4e 54 | 8a 34 49 eb c4 db 10 33 ba 37 57 98 9c 56 d1 4f | 0c 29 1a f8 25 5e 60 5d 0b 14 86 5d 6d 65 3a dc | 8a 6b ce 2c 5e 34 47 64 fc b5 0d 07 ab 4d e8 74 | 6d 78 e0 82 76 08 57 ad 18 73 73 dc 20 30 66 40 | 79 b4 11 4a 81 e9 e7 f5 9a 6f b2 79 12 d0 43 c6 | 72 27 8c 54 92 d4 21 e5 0d 8d 14 e1 53 dd 12 10 | 29 00 00 24 e8 60 30 77 56 3c f1 25 c1 c6 6e 74 | 5c 37 ec e4 ad 07 3f bc d0 27 64 9c 2c 2f 3e f0 | a2 51 6d 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 21 f8 f2 aa c5 02 f5 b9 e8 1d 48 | 11 f3 ee 20 33 c4 de f9 00 00 00 1c 00 00 40 05 | 12 90 d2 d6 c0 e9 64 15 7c cf ef 34 31 76 64 b7 | 85 6e 21 7e | libevent_free: release ptr-libevent@0x7fb36c088410 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400cc10 | #542 spent 0.0881 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #542 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c012bf0 | handling event EVENT_RETRANSMIT for parent state #520 | start processing: state #520 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #520 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #520 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #520 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.227658; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.013543 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #520 | libevent_malloc: new ptr-libevent@0x7fb36c088410 size 128 "road-eastnet-nonat-132" #520: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #520) | ce 20 34 a6 bb f7 7e 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 93 1d d8 d2 b1 be 53 4e eb ed b5 53 68 b9 68 | 3b 90 1c 10 61 78 23 f6 10 87 d8 bd e4 f5 d6 23 | 53 c0 54 e9 4d 15 49 54 f1 a0 df a0 bd 97 7f 49 | f3 26 38 fe d6 f7 64 49 d3 1d 69 61 fb 72 b3 74 | 62 c9 08 94 a1 27 ba fe 91 a4 0d b0 be 34 09 2c | ae 06 17 ab b3 b7 51 c6 26 a5 e8 3e e5 24 f9 a1 | f7 68 74 98 63 fd a8 7c d3 13 6d 90 1f 14 c6 a6 | 04 85 61 e0 a3 c8 02 54 74 60 3f 87 eb 06 83 74 | 5e 85 3d 22 87 46 88 9f d4 fd 35 c2 36 a3 83 41 | ab 57 49 d7 e0 f2 53 56 77 35 4b e3 66 a6 da 67 | 4f 7e dc 81 d0 4e 81 b5 d9 96 e6 10 f9 24 0e 5e | fb e3 82 13 23 20 a1 ed ab 8f 63 39 52 b2 83 84 | b9 61 cb cd 44 7f 65 2d cb 8a 27 c6 61 e2 d1 7f | 39 5c 98 77 3c 0d d7 d7 5b 79 74 66 3f 68 61 be | d1 5d 20 ef 6b 4e 03 30 9a 82 f2 ac 7c ef f0 7d | c4 47 c7 7c c8 eb 96 9e c1 9f ef 3d 93 05 11 e1 | 29 00 00 24 10 75 51 a8 ab dc ad 6d a2 4e 44 8c | c4 29 f6 ed 6d f9 db 56 a8 84 be 4b 75 f6 2d c8 | a0 76 de b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a a7 18 b8 de c7 a0 95 e6 f4 d9 c5 | 62 97 a0 57 23 f3 99 e4 00 00 00 1c 00 00 40 05 | 3d 7c d2 81 56 1c d6 fe cd 6a 43 28 2b 9f a2 6a | e6 22 f1 8c | libevent_free: release ptr-libevent@0x7fb34c053e10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c012bf0 | #520 spent 0.0696 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #520 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36001a530 | handling event EVENT_RETRANSMIT for parent state #732 | start processing: state #732 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #732 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #732 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #732 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.227736; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.012569 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #732 | libevent_malloc: new ptr-libevent@0x7fb34c053e10 size 128 "road-eastnet-nonat-222" #732: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #732) | d0 09 53 dc c6 ab 63 da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 85 fc fd c0 3d 4e f2 6d 8c 5a 48 97 72 ba 8d | 76 a1 67 2b 3e f5 0f 59 6a 4a cf 1f 0f 1a 83 6b | 02 c4 e6 13 1a a7 be 58 09 e7 95 c5 d3 61 73 f0 | 93 30 b7 ea 83 2c 03 35 7b e7 a4 68 e9 c3 34 3d | 62 a3 61 5b 4e 45 93 53 18 92 ed db b3 57 ab ed | d3 53 e9 06 16 fc 7d fc c5 71 11 b8 0f 5b b1 19 | dd 64 cc 6c d3 60 ce 76 d1 ee 24 40 d0 a9 e8 ef | b0 05 68 55 4c bc 77 f7 43 d8 3a 34 82 db 7d 83 | 19 10 50 8c d2 65 d7 7b e4 c6 64 bb d8 6c a7 36 | 7d c4 11 fc dd 75 d9 7e 8a a8 c1 86 35 68 1d 19 | 3f e6 94 36 43 37 3c ce 07 24 1a e3 3a b2 b8 d0 | 31 23 82 03 07 23 34 27 ac 92 b7 75 a4 35 52 c2 | 62 ee a2 c7 e9 86 52 3d d2 a7 12 2a b4 93 13 55 | e8 52 4e 73 70 b2 d4 5f 3e 19 02 5a 63 54 72 36 | d5 50 42 05 5e b0 23 11 30 64 39 ea 9a e3 b8 0d | 4b 4e 16 cb 69 12 46 02 2b 04 d5 67 a1 73 e1 ac | 29 00 00 24 fc ee 14 ee 51 1c c8 cf 02 52 60 a5 | ed 61 3d 76 39 bb ee c9 50 2c 24 3c 5a ec a0 d1 | e5 8a bb 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a fa b6 a7 12 75 27 e9 bc d5 98 e9 | 7d b2 82 ba 84 f4 53 9f 00 00 00 1c 00 00 40 05 | 27 89 f2 84 3a 49 ac a7 94 1d 98 7e 0c c4 b6 09 | ba a0 ac ee | libevent_free: release ptr-libevent@0x7fb36407a960 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36001a530 | #732 spent 0.0702 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #732 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38400feb0 | handling event EVENT_RETRANSMIT for parent state #658 | start processing: state #658 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #658 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #658 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #658 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.227814; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.979481 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36001a530 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #658 | libevent_malloc: new ptr-libevent@0x7fb36407a960 size 128 "road-eastnet-nonat-162" #658: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #658) | 18 43 30 64 c9 a9 96 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 8f 2e 30 90 e3 1d b1 3d b8 ff e9 fa 6f c4 d2 | 4d cb 05 e4 a2 10 ef 4b 88 26 20 b8 91 62 33 4c | d2 2d 7a 12 9c 93 d1 33 4a b1 d4 b6 b7 87 51 88 | f1 8b ca 98 0d 93 ed 84 f4 9c 46 f9 61 c4 4d d5 | fe 8d 16 c5 0c 88 ef 95 5d eb 19 30 d3 94 29 4a | 79 59 d9 d9 11 a3 76 95 63 e1 a4 9a 1e 1c 14 d5 | 3c bd 7d c0 47 b6 0d 87 c9 56 be 9c 11 14 ee 07 | 7d b5 67 34 d6 13 e8 98 79 52 f2 29 ea 87 a9 a7 | 37 70 16 dc 00 c9 cf 42 41 7d 6a af e8 16 61 11 | 8c cd 5e 52 bd e4 ca 59 92 fe cb ac d6 88 27 08 | e2 59 c0 46 be 04 20 28 16 af 0d 9a e2 2b 53 20 | 73 8a 54 b3 af e0 6e 17 fa 1f 2c 68 a0 ba 92 60 | 80 f9 61 ae 5c 11 fa e6 67 c8 30 5c f1 ed 8c cf | f0 8c f7 ae b7 44 b9 62 19 13 7e 6c 7e 19 e7 af | 31 44 0e de dd b1 f8 11 4a 1a 39 5c a5 d6 c9 e9 | ca 2b 46 08 aa 6f 5d 69 a8 0c 53 f7 bc ac ed a8 | 29 00 00 24 65 98 11 46 f7 ab 17 c4 6b 7d 49 5b | a3 fc aa 94 dd e0 11 9b 8f 82 94 fd 52 c9 5f f9 | d2 67 63 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 85 9c d9 b9 94 09 f0 06 58 49 33 | bd 1c e4 a5 79 c0 7c 32 00 00 00 1c 00 00 40 05 | 33 c9 27 c8 b3 b4 b5 08 35 b6 cc fa 47 61 1b 02 | 31 02 bc 85 | libevent_free: release ptr-libevent@0x7fb35407a740 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400feb0 | #658 spent 0.068 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #658 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a60690 | handling event EVENT_RETRANSMIT for parent state #683 | start processing: state #683 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #683 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #683 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #683 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.227891; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.980969 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400feb0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #683 | libevent_malloc: new ptr-libevent@0x7fb35407a740 size 128 "road-eastnet-nonat-101" #683: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #683) | 22 30 a0 37 9e 5e 0c 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 2d bd 08 31 a0 07 0c c4 f5 ac c5 5b e0 c5 60 | 90 d1 45 d9 1b e2 dc 82 5b 35 5b ab d0 57 64 0b | 0e a8 1f f2 6d fc 5a 7c ad 7a e8 a0 f9 15 5a 35 | 68 ff 17 43 ed b1 8e f1 b0 9c 81 b4 3b b5 37 5a | 70 13 3a f4 ca a9 f6 46 52 0c ae 55 b0 55 be c6 | 1a d7 a6 fb 47 44 eb b7 16 85 b7 dd ff de a0 45 | 17 b4 11 35 d4 d0 cf e9 45 97 61 c1 6a d8 a0 c7 | d6 0b 85 99 6b 5b c9 dc 9e 76 87 29 b7 8c 8c 9a | 95 7a 15 c6 10 17 98 93 f7 09 7a 9a cd d0 13 14 | a9 2c 55 a4 60 f1 72 80 2c 28 45 e4 d9 cd f6 01 | 55 30 ed 6a 1a 0b 81 c2 8d 64 3f 52 1f 81 ec a6 | b3 e6 5c 36 3c 8d 99 60 59 d8 e2 22 76 0c e0 0e | be 08 7f ac 91 76 6a 0c f2 45 c3 7c d3 5f 7a 2d | 17 ac e6 32 1b a2 9b 38 7f e0 1c c5 b2 87 8c 03 | 93 b7 73 13 37 e0 f4 7f 3b 5b c2 ac 8e b6 84 9a | 86 44 62 2d 89 5c f8 c8 10 4b 97 4b 7a e5 a2 fd | 29 00 00 24 00 a4 f8 e4 0c 48 4a f1 27 f4 8b fc | 65 ab 53 d7 66 48 7b 24 ce a6 58 75 84 59 a6 a0 | 2d 45 66 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 85 ce 75 72 7f 4a a1 68 df 47 f3 | a0 b0 e6 2f 94 7e 65 c2 00 00 00 1c 00 00 40 05 | 62 77 62 1c e2 c3 88 5f 5a c8 dd e7 a6 ce ac 52 | d0 9f e3 15 | libevent_free: release ptr-libevent@0x7fb35c061940 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a60690 | #683 spent 0.0691 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #683 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a84000 | handling event EVENT_RETRANSMIT for parent state #549 | start processing: state #549 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #549 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #549 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #549 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.227967; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.926884 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a60690 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #549 | libevent_malloc: new ptr-libevent@0x7fb35c061940 size 128 "road-eastnet-nonat-125" #549: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #549) | a0 bc bf eb 69 ec 7d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 c9 7a 4d 74 30 97 ab 2b b8 9b 8e 28 56 30 35 | c9 29 b4 03 c9 c0 54 36 0e 1e 85 00 be e1 eb b6 | 10 56 f7 3e 25 85 4e 54 15 d9 dd 76 f8 a2 ef 75 | 06 49 0e 79 92 19 04 73 c4 32 36 8f 38 c3 a0 37 | 73 31 32 c7 13 ba 49 63 a9 ff 14 ce 76 c3 ca 6b | 44 ac 36 b3 fe 8e 49 b3 f2 07 ba 8e 9d 83 a8 90 | 1c bc ba b1 a8 32 ac a1 72 6e a4 55 c6 06 26 4d | 59 1f 8c 21 e8 f2 1d 39 aa 21 29 2d 13 d2 62 e1 | cd a6 44 f2 be e8 53 3c 05 77 b8 a3 16 49 f8 12 | a0 eb 6d c0 e5 00 d6 6c dd 16 9c ab b2 0e 15 2a | 11 01 e2 8c ef 25 2e ff f8 e7 c3 fa 43 cc 6c 72 | c5 e2 33 98 3b f3 05 50 a7 ad 9d 8e 86 bf 56 f5 | 69 e1 73 1e c0 3d 04 45 0d d2 2e 9d 3e db 05 1c | 6a c1 c4 8e 83 ca c0 f4 84 01 6b be a7 89 db dc | 85 98 0f b5 ba 9a cf 4d 5b 70 a7 a4 7a fa 95 48 | b4 59 36 8a 67 a3 46 cb 51 b4 47 97 d0 b4 c8 75 | 29 00 00 24 e6 91 2a 43 d1 aa b6 49 a9 57 9a 19 | fc 51 19 e5 28 8d 93 b9 12 81 37 cd 42 5d c8 08 | 2e b2 6c 7a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 e5 9d 22 28 c7 c4 27 97 02 c2 92 | 36 7a d0 48 44 31 1b ea 00 00 00 1c 00 00 40 05 | ac 08 fb c5 91 b8 80 23 e8 68 88 22 35 dd f9 61 | 84 cd 9d 18 | libevent_free: release ptr-libevent@0x7fb3500594c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a84000 | #549 spent 0.0693 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #549 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #579 | start processing: state #579 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #579 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #579 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #579 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.228045; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.943776 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #579 | libevent_malloc: new ptr-libevent@0x7fb3500594c0 size 128 "road-eastnet-nonat-129" #579: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #579) | f7 57 b5 67 5d 53 5d ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 5b ad a3 d5 b5 e0 5b 3c 63 fe 82 fc 8e 12 08 | 91 d6 c4 0a 02 eb fa cc 09 df 5f 23 de d8 2b f5 | c7 d1 d6 20 b2 e9 e0 44 e8 af 84 2c 0d cf cc f2 | 5d 14 d3 a9 26 db 6c d3 5a c5 b6 bb 02 ab 78 5c | 8d fd ab e4 18 ac f3 6d 67 ce 9e f1 c9 4e 48 19 | 38 ce 5b ee 1f 7e 6a 23 0e c3 35 0a 2d 7b 93 c8 | c9 5a 5f 29 c4 9f 5e f1 cc e4 b6 26 ba fc 75 a8 | 4e df 30 e0 38 f1 9b 93 15 71 8b 36 cc c8 fb 5e | 9c 97 42 2c 87 36 f5 a0 be a8 f9 30 86 f3 27 9c | cf e8 6d 6a ec 63 43 19 60 0c 5c 2f 8e b2 0b 0c | 5c 25 5d 2a 49 65 27 59 d0 dc 6b b1 3c 0a 06 2c | 14 95 03 33 11 da 59 39 c6 df 4f d9 ac c9 48 dc | 85 72 4e eb a2 61 cd b4 14 8d 9d 88 fc a5 3d ca | dc 4d 1b 8d 2d 5e 50 0b 56 ca d8 dc d3 17 7b 53 | 57 13 42 fe 43 06 61 23 81 b7 76 43 10 62 61 76 | f6 bc ce 46 30 e9 08 b7 2e e4 25 72 ca 14 7c 12 | 29 00 00 24 94 e8 55 b4 44 b7 00 bf d8 b6 2e cf | 2e 8c 08 03 dd d5 10 1f dd d7 4a c8 73 e1 d7 76 | 9d 2b 29 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 52 54 26 54 47 d1 ec 3a 0f bf 18 | 2b 81 e9 d8 d6 20 de c2 00 00 00 1c 00 00 40 05 | e1 d4 5a 12 5b c3 62 c5 dc bb 54 dd 1e 69 c8 f5 | c2 4b d5 7c | libevent_free: release ptr-libevent@0x7fb37806fdb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #579 spent 0.0722 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #579 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_RETRANSMIT for parent state #736 | start processing: state #736 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #736 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #736 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #736 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.228127; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.999313 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #736 | libevent_malloc: new ptr-libevent@0x7fb37806fdb0 size 128 "road-eastnet-nonat-232" #736: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #736) | 55 f4 27 9b 2c 7e 0c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 4e 06 40 b2 65 21 5d 08 0a 87 dc 23 78 63 f5 | 59 9b 01 94 f1 c6 ee de 2e 54 64 04 7b bf ee 90 | 74 b0 cc 16 6d 13 9e 63 f9 06 73 5e 5e 85 4b c6 | 1e 30 91 54 94 48 03 60 af 1a 46 14 b6 86 67 6e | 56 bb 9d f9 7c bd d8 15 ef da 2d b6 8e e2 c0 fa | 6c 86 fc 27 18 08 26 1c 3b c7 8f ab c9 15 f1 b5 | 77 17 8f 4e 86 0e 1d 02 0e cb 79 7f 00 de 43 ca | 0d 98 67 80 78 be 76 95 19 4f 8e 1c 0f 1f 02 46 | b5 24 e0 a5 90 31 f0 6c 94 59 9e 86 fe 50 a7 16 | d3 90 18 f9 5a 5e f2 b0 85 c0 8a bb 36 a9 3c e6 | 3f 58 61 ed 76 63 9e 91 dd 1d 1d a5 d8 6f 61 e6 | 60 34 52 1f c7 3c 4a b9 12 d2 23 01 83 9f e0 72 | b0 b1 95 db a2 3d bd 5f 63 44 17 84 2a 1c ae e2 | 87 6e eb 4c 2d b2 76 61 6e 10 55 07 2f 21 a9 05 | 7b e7 0e 8d 3b 46 3c a2 52 e3 e4 5a a7 20 76 cc | 56 d5 06 15 ef aa e4 2d 6f 6f 60 d9 2a 22 ec 23 | 29 00 00 24 74 fa 10 32 44 33 16 00 ef 17 0b a3 | 58 ac 5e 66 66 dc 61 3e 96 b9 65 fa 72 73 66 81 | d0 51 f7 ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 28 12 e2 be f3 1a 42 9e c5 b7 6c | 8d fd 8b 3e 75 2f e5 8c 00 00 00 1c 00 00 40 05 | 19 e4 47 16 1b 11 27 dd e0 d9 21 b8 1a e6 c5 9c | 84 34 90 f4 | libevent_free: release ptr-libevent@0x7fb35405ef90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | #736 spent 0.0678 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #736 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb364029270 | handling event EVENT_RETRANSMIT for parent state #570 | start processing: state #570 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #570 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #570 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #570 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.228203; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.945859 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #570 | libevent_malloc: new ptr-libevent@0x7fb35405ef90 size 128 "road-eastnet-nonat-96" #570: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #570) | c9 60 e7 45 a7 98 e0 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 68 13 ed 82 59 f7 bf b7 d3 7d 5a 25 b1 e1 fd | ce b0 3f a5 fb 8c bd 34 1d e5 2a 9b fc 5b 3e 55 | 82 20 27 8a 48 3d 6e 3e 7f dc aa 07 ea 30 a0 2a | 9c f4 f8 a8 1d 61 fa e6 e5 a6 d3 c3 23 a2 0d 27 | d8 62 e9 78 7e f3 e0 26 9b ba 64 6b b0 e1 50 5c | c3 bc cb de d9 53 bf f2 ac d3 d9 69 fb c6 10 8c | 38 7d aa 47 ee d8 74 e7 3e ca 1f 48 f0 13 76 f3 | 40 f4 69 cb 3d 62 67 20 a1 3b b6 e2 a8 a9 ab a6 | 2b 8b a8 99 f0 d1 52 2b b5 e5 e6 49 c7 16 b6 59 | f0 d0 ea 1f 2e db 52 ab 01 2b c6 eb cc 72 67 ee | fc 53 07 28 c8 cb 95 9e 3a a0 20 2c 1e 66 b0 e9 | 12 9c 0c 0c 6b f2 70 25 e0 f9 f8 0e 69 49 c5 be | 72 17 9d 25 7c 8e 29 c2 0e 40 fa d6 20 e8 3f 96 | ac dd 51 f9 fe 49 86 c9 9b e7 be 19 fb 67 10 1f | f3 4b 80 50 1d d2 9f c6 fc 87 3a f9 1d 52 8a ba | 10 8e 73 40 ff 99 d5 7e 30 7d e1 68 1c 25 bd b7 | 29 00 00 24 ba 1d 83 e5 8b c9 fc 82 14 41 45 77 | 00 92 fd 3d da ae b0 d1 cb bd 90 71 29 d7 a3 fd | 03 9f fb b5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fa 68 08 10 0a d6 4b 37 b2 81 b0 b2 | 14 38 ef bd ae 4e e0 08 00 00 00 1c 00 00 40 05 | 3a 9e a3 24 b1 2a 82 b0 e0 fd 89 6a b8 7b ca cd | 82 b8 2e 9e | libevent_free: release ptr-libevent@0x7fb364054370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364029270 | #570 spent 0.0697 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #570 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35400f1f0 | handling event EVENT_RETRANSMIT for parent state #692 | start processing: state #692 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #692 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #692 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #692 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.228281; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.985599 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364029270 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #692 | libevent_malloc: new ptr-libevent@0x7fb364054370 size 128 "road-eastnet-nonat-109" #692: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #692) | cc 18 05 4d c7 59 29 89 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 bc 56 c0 b5 d7 1a 19 67 cf 61 47 cf cf cf 69 | 0c 5a 9f 01 32 78 de 71 f0 74 81 19 ed 71 d9 b7 | 6c 1a 14 67 77 21 31 19 27 f8 20 2e 9b 72 8d e0 | fb c3 78 0b 20 93 f6 09 52 76 69 39 6e ac 7c 06 | 40 27 58 9f 6d bb 6d 84 cb 61 8e 0f d8 d3 36 d2 | ed b2 8a 88 8f 6f f0 1e 1b d7 5a 1c 7d 7e 95 ba | 9a dd 6e 5a bb 30 97 01 78 90 d0 34 e6 bb f7 4a | 36 d6 7a 11 b8 51 c6 68 c3 31 ea af 66 a8 39 16 | 34 04 5f b3 7f 60 a0 eb de 43 b9 ad eb 2c 3a 9e | 0e ac 2d 97 3b 24 b1 8f cc 8a 22 51 8c d9 7c 8f | 5c bd 64 59 9e 2e 51 e2 19 ad d8 1d 4d 34 4c 24 | 22 63 7c ba af a3 27 18 d1 02 9a b0 98 c3 d7 57 | 32 dd b6 b7 23 c1 5f 8d ea 84 1f 15 18 04 2a a7 | 93 9c 7d f3 d9 4e af b7 ec 8d 2d b2 4a 62 49 e5 | 24 51 62 9e 81 79 94 0d 40 f4 e7 84 ba 20 8a 12 | 56 3d 86 3c a8 88 5d 08 d2 a2 6b 92 78 f3 25 d4 | 29 00 00 24 e1 fc f7 b6 dc b1 8e c8 89 6e ca 67 | c4 89 7d 5a 55 53 f0 73 1a cf eb a7 39 4d 69 f9 | f9 7d fe a7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7c 62 99 77 fb 76 f7 56 4f 5d 6c 0a | a8 89 cf ee 73 3a 0b 7a 00 00 00 1c 00 00 40 05 | da 92 6d 9e 8e f1 6a c7 a9 e0 f9 23 03 35 37 00 | ea 8a 41 05 | libevent_free: release ptr-libevent@0x7fb36c08dbf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400f1f0 | #692 spent 0.0696 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #692 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #573 | start processing: state #573 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #573 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #573 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #573 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.228359; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.958597 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400f1f0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #573 | libevent_malloc: new ptr-libevent@0x7fb36c08dbf0 size 128 "road-eastnet-nonat-83" #573: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #573) | ad 3e 6c 78 39 d7 59 85 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 bf 7c c9 f8 3c 5a 65 38 6f b3 01 ce 5b f5 30 | a7 ca bf a7 0a 2f 6d 46 e4 95 8f a9 a2 c3 62 81 | 94 18 87 7c 67 ac a9 c8 f7 1a 98 84 db 40 bb af | 3f 2f 53 16 16 52 73 41 99 39 2a cb ce f0 16 f6 | 59 5f 0a b0 20 7c 3d e9 5a a2 88 c5 c1 bb e2 4d | 7f ce 41 78 9a 73 4c 9c 78 3b d4 42 d4 ea b6 26 | c7 66 8b db 44 b6 63 44 77 ad 6a 85 b2 f6 09 24 | d3 1d 9e d9 14 90 b9 f3 03 6a b8 35 9d 2f 7e 69 | 38 a8 b1 78 a7 b9 d5 b5 6e 03 4e df f1 29 29 d6 | 73 fb 44 0b 0c b8 b6 ff 70 60 7e 98 07 b6 c6 7f | c1 02 f7 52 15 2f 51 21 2d 87 70 fa c3 6d a5 50 | 6d c2 b7 77 96 5a 3f ba 71 2f 23 99 27 34 36 64 | 93 e7 80 7e 69 88 92 68 e6 5b cb fb d5 c9 2a 24 | c5 78 ae b1 67 8c 39 a4 a1 f5 8f 57 47 ac be 22 | 0c ba 38 7d fd 68 4d 5c f9 30 0d 91 30 9d 25 fc | c6 0f 2d 2c 17 7f 55 f6 65 7c 10 de 1f 7f 50 fb | 29 00 00 24 50 ef b4 44 89 5d 96 3d 4c 55 e3 f3 | 30 1e a6 1e 68 57 c5 9e 6a b1 8f fc 63 11 d1 e1 | c2 23 29 d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 0a ea 0a 2d 9d 52 e1 84 99 c3 78 | 56 e2 02 95 3c a9 b9 67 00 00 00 1c 00 00 40 05 | 07 da 52 ba 89 af c4 46 3c 5a 2a 18 50 3f 02 03 | d1 88 0a 69 | libevent_free: release ptr-libevent@0x7fb36007a360 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #573 spent 0.068 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #573 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c01da80 | handling event EVENT_RETRANSMIT for parent state #741 | start processing: state #741 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #741 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #741 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #741 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.228436; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.012515 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #741 | libevent_malloc: new ptr-libevent@0x7fb36007a360 size 128 "road-eastnet-nonat-217" #741: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #741) | 62 ac e1 dc 78 47 49 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 14 75 0b 46 c7 7e 2e 5b 84 9b fc 63 4f 7a bb b1 | bb 0b 39 b2 38 45 c4 46 64 96 9b f6 97 0f ad 64 | 77 d0 65 ce 45 75 90 09 8d bb 17 97 97 97 b2 fe | 7c 98 b0 3c e2 1b b2 75 9e 4f 00 17 88 80 52 35 | 5a e1 87 e0 03 97 21 fd f3 19 41 85 49 46 8f ab | 34 a9 9a fd f7 fd 73 2c 73 3d 6a 91 77 21 6d 6c | 79 4c 5c bb 61 7c 82 81 01 a9 8b f8 96 88 67 ec | 5e 9f 63 85 f6 a8 a9 74 84 a6 13 9a 7a ca 36 d7 | d6 5d 44 65 ea 98 9a 63 18 26 33 18 de 47 5a c9 | 7a 75 34 c1 c7 bd 4c 1d 3b 2c ba b7 c0 6e 1c 7e | 83 75 bf 9c ba 83 c0 f2 ba 77 85 7b 33 2b 90 b1 | c2 52 77 da 60 67 e2 5a f3 07 0b 1d 76 db f2 c8 | dd 92 77 15 ff 35 90 20 f7 3a 79 14 36 0e 74 98 | 26 48 0d 10 a8 b8 96 6e a1 d3 39 9c 37 f1 09 c2 | d6 18 46 cc 20 41 73 2d 13 cc 4b 13 c4 75 47 56 | 6f 8d 2a 56 34 65 b3 20 fa a7 7c 74 84 64 26 20 | 29 00 00 24 98 46 88 9e 86 0c 01 40 55 4c d6 79 | b1 b2 76 d9 6d f0 c7 03 be fb 8a 36 84 6a 6b 74 | 5e 47 68 8e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 45 41 a0 85 77 fe f1 d1 6d 6e 5e | 4b d5 c9 60 59 e4 cf 31 00 00 00 1c 00 00 40 05 | 3f 98 bf 78 15 51 e4 00 05 0a 6e 9b 09 7f 98 a3 | af 3d 07 7b | libevent_free: release ptr-libevent@0x7fb35c0643e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c01da80 | #741 spent 0.0693 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #741 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #681 | start processing: state #681 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #681 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #681 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #681 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.228512; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.98252 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c01da80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #681 | libevent_malloc: new ptr-libevent@0x7fb35c0643e0 size 128 "road-eastnet-nonat-170" #681: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #681) | 43 b3 87 97 a5 28 76 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 69 dd 2f f3 2d 11 ad a5 9c d3 5d da 0a 86 6b | 8c 49 25 0c 16 f8 de 41 b0 ac 6e 41 c3 d3 27 1c | 5b 54 cb 17 92 04 0e c6 6b 96 94 d9 db ad b8 79 | dd c8 5b bf 4b a3 2f 7c 6a 19 e7 ad 1e 53 14 f7 | d1 90 70 c6 a3 11 50 75 b1 1c 57 b6 52 72 e5 bf | 5f 38 47 3e 16 f7 e0 ac 51 3d 68 76 bd 51 68 b9 | 99 0e 7f af 6c 2d 48 06 10 6a 30 cc 70 5d 14 1f | f9 cd e8 dc 60 df 2b 6b b6 f3 6f 7e 00 e5 1f df | 04 ee 6d 38 b5 09 46 77 da d8 ac d9 bc dd 17 11 | 97 7f c0 a3 2a 8e e7 7b d0 22 8a 6e 6e cc 8a d1 | ee 68 9a 8f a3 46 20 76 f3 a4 2c f5 c0 c0 1e 77 | 2d 20 e2 fc 14 c2 66 73 98 59 19 d7 e6 3d e6 8e | 61 67 8e 25 aa c2 61 e0 9d 35 ef 0e be d6 35 38 | 8c 18 ce 74 7a be 48 b5 c4 a1 11 de 05 be 64 33 | e8 8b ac cd 76 ec 2b 48 c4 d2 9a 3c c7 9d b7 e7 | 67 3d c4 7e 7f 8d af 5a 9d 1c 23 aa 32 7a 83 a5 | 29 00 00 24 ab ab 32 27 cc 43 85 a1 14 10 62 ae | 10 ab 5a 1f 4b 33 ac a9 a7 81 9d 0d 60 06 a6 87 | e7 aa 41 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 f1 2f 02 50 94 bd e1 85 64 92 73 | e1 fc 7b 98 62 5d a3 7d 00 00 00 1c 00 00 40 05 | 0f dc 60 fc ac a0 68 fc 96 74 2f 45 a5 ab 4a db | c3 e2 5b 97 | libevent_free: release ptr-libevent@0x7fb36006c900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #681 spent 0.0698 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #681 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c00d120 | handling event EVENT_RETRANSMIT for parent state #662 | start processing: state #662 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #662 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #662 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #662 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.22859; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.975422 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #662 | libevent_malloc: new ptr-libevent@0x7fb36006c900 size 128 "road-eastnet-nonat-116" #662: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #662) | 6f f8 26 3d 46 67 06 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e1 15 32 77 43 3f ae 4b c7 5f 3f 2b dd 7f d3 1e | dd c1 5f 13 88 1d 29 8c 3e da 8c 02 5a 8d f6 d1 | 3f a3 f0 0a 58 d4 04 d3 f0 b3 db 26 fc 33 ce 46 | ec 5c 90 e3 6a 12 91 6d f5 be 55 11 24 66 8b cd | 51 d1 6c 4f ab d6 35 10 55 bd 81 f3 c5 9b 26 2d | f4 3f 70 2d c2 69 41 11 99 68 6f d6 67 f7 0b 94 | 16 15 37 50 dd 26 25 c5 03 89 2e cb 46 72 37 83 | a6 ca 48 57 46 11 c8 fc 49 a5 3f 23 f4 8e fd 9b | bd 5e f8 86 fe e9 d6 03 94 fe b5 73 a0 97 a8 36 | f8 6d 97 05 65 b5 9b 5b a3 4c 3e 56 89 a0 18 c6 | 54 22 3c 22 df 8c 9f 6b 24 e7 85 e4 91 73 3e dd | 3a 3d 86 ec 02 50 a4 d4 9b 1e ca d9 b8 85 33 11 | 56 6c a0 81 f5 30 19 45 f3 7e 2d d0 fe 89 3f 3f | 64 51 16 e1 24 be 5d 31 7c b3 98 ff 06 a6 e7 a9 | 85 09 74 83 46 27 19 d4 40 fc 28 57 e7 6b be 01 | 31 d5 96 a2 39 76 f1 7c 9a 2f 1e 01 ba e4 af 67 | 29 00 00 24 66 62 42 f7 ff d9 33 d8 69 d9 c8 18 | 14 3e 2e de dd 0a 0a 0c a5 a3 31 2b 3b 0a 7e 9b | 7e 11 99 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 54 03 6e e6 e0 19 5c f9 e0 4b 25 | 45 a9 f7 08 e7 02 7d 4a 00 00 00 1c 00 00 40 05 | 8b cf 33 fc 59 1a 80 29 98 08 22 36 83 94 58 20 | 7d d0 3f 09 | libevent_free: release ptr-libevent@0x7fb36401f4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c00d120 | #662 spent 0.0707 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #662 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38800f8f0 | handling event EVENT_RETRANSMIT for parent state #595 | start processing: state #595 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #595 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #595 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #595 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.22867; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.970974 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #595 | libevent_malloc: new ptr-libevent@0x7fb36401f4e0 size 128 "road-eastnet-nonat-69" #595: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #595) | 66 ab aa e9 c0 1d b7 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 88 48 07 d2 42 4a 84 d5 c0 a3 1c d8 61 7a 51 | c0 04 1f 03 a6 14 4a 32 5e 37 8c 55 58 7b 77 2c | fb 55 e5 4e 6e 7e 47 ee 34 35 95 55 b7 b4 f8 60 | 9b a6 0e e2 75 cb 31 e2 b7 b1 0c c7 21 34 4e 50 | 7e 01 12 0e a8 09 e6 15 2f b7 95 a1 e4 49 25 11 | ac 79 61 4c de 52 7d 92 78 d2 3a 93 7f 39 9e ea | 46 19 3b 55 df f1 20 bc 73 20 02 d2 83 5b c5 c6 | 0b 63 b0 e9 03 aa 59 7f c4 15 87 10 2c 75 31 89 | e4 a2 a3 eb 70 c0 6a 70 01 fd e2 c8 7f d0 49 6d | 0b 69 e6 19 f8 ef ed 1c b2 75 a1 ef be b8 a0 04 | 19 f6 c9 5b af 6f 00 73 b8 d5 c5 23 40 6a a8 85 | 63 89 e6 04 8d b9 58 50 ce 42 06 0d 04 dd f1 d0 | b1 74 e0 f6 e2 3c fc e3 28 f1 bf eb 46 d0 6e a8 | a2 18 6d cf 33 6c 77 01 6e 12 a3 df 95 47 d2 df | 9f e9 63 f7 ac ac 70 17 4e 2f 38 fa dc cb 8c 97 | 70 a7 26 56 6a e9 c8 f7 90 d3 4d cd 2d 8d 00 8f | 29 00 00 24 94 2f 5e 13 28 37 ce fc 76 9e ef e3 | 9f a7 fb e4 ea 24 27 bd c2 06 13 48 b6 99 58 8b | d4 82 fe 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 79 3a 6c aa 9d cd 78 ee ff 71 61 | 9e c1 38 f2 06 7e 22 47 00 00 00 1c 00 00 40 05 | 1a 47 95 0a 50 1d 20 46 3c 7c f6 eb 28 2d 43 03 | 7b 00 02 4e | libevent_free: release ptr-libevent@0x7fb360067120 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800f8f0 | #595 spent 0.0684 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #595 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350012bf0 | handling event EVENT_RETRANSMIT for parent state #574 | start processing: state #574 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #574 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #574 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #574 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.228748; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.939895 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800f8f0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #574 | libevent_malloc: new ptr-libevent@0x7fb360067120 size 128 "road-eastnet-nonat-119" #574: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #574) | e2 ef 8b 16 3f e6 8d 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 80 9b ac b3 38 49 75 b6 22 00 a0 9d 93 a6 e9 | 11 43 29 2d 62 04 9b 9a b1 ba de 84 81 0e e7 1d | cd ff 5c 76 64 ba 18 74 a3 4a 09 63 04 00 26 2a | bf 09 0f 54 5c ff e2 c1 45 f0 c2 f6 3f 0a 9c da | 51 50 31 ad 31 4a 14 11 d3 2e c7 7d 83 22 2d bd | 53 08 74 70 d6 57 21 06 d4 a1 0f c1 e6 a4 84 5e | 1d b6 57 8b 0b 80 4b 3c 9f f1 e4 bd 75 2f d5 2d | 21 3a cd 7a 13 59 f2 16 f8 77 82 03 06 0a 42 83 | 17 94 64 c4 be 42 b3 21 8f d9 97 d0 cf eb 0f 6b | 23 03 9f ee 85 9d 07 b2 6b 9f c9 a7 2a 0b 97 54 | 4a 3f d3 58 4a 03 9e d1 76 61 53 9c 9d 3c 44 d8 | 20 2a f5 24 51 56 2a d6 31 c3 13 a3 58 26 1e 56 | bd 02 c3 74 00 2d 43 63 8c 32 86 92 e8 ff 86 7d | 59 2f b3 f9 c6 38 10 32 ef ef 33 bb 6d f1 d0 70 | 62 b4 df 27 80 5f fc 95 13 80 c9 0c ec fb e1 f5 | c1 58 36 dc de 1d 19 2a ba 67 9f d5 f2 bc 5b d5 | 29 00 00 24 4a 9c 36 dc 2a e9 b0 d6 4b b7 1c 33 | 3b c4 06 c1 a7 f4 11 82 75 7b bf 05 3c 37 b2 a8 | 50 3d 47 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a d4 1c 5f fa 34 64 8a 6c 74 11 d9 | dc 03 c5 f2 8c e5 1d 48 00 00 00 1c 00 00 40 05 | 47 f1 9d c3 97 23 03 bd 9f fd 5c 86 a1 b5 d4 44 | 63 f3 1c 6a | libevent_free: release ptr-libevent@0x7fb38405d9b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350012bf0 | #574 spent 0.0698 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #574 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #512 | start processing: state #512 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #512 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #512 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #512 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.228824; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.92543 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #512 | libevent_malloc: new ptr-libevent@0x7fb38405d9b0 size 128 "road-eastnet-nonat-140" #512: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #512) | 9c 1d 79 9c 4b 40 5f 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f e6 a4 db c4 02 2d 52 88 50 3f dc 30 82 ed 9f | 63 88 9c b5 3c c8 66 4a 37 be a1 3d aa fa fb 17 | f9 ac dd ad 9d 5b 20 51 15 fc d2 29 14 d4 2a 6d | f3 a0 8d 98 f8 da e0 12 75 4e bd 68 90 36 03 88 | 88 b8 f3 20 51 1f f0 57 2a c6 b0 97 a0 49 9c b7 | ad 6c f2 a7 06 f7 6a dd f3 22 78 ce 59 21 29 6a | 08 15 d7 74 fd 98 b0 83 c8 be 7d 16 eb bf fb 2e | e9 27 0a 5a 6e be 90 e4 cb 6a 36 aa 24 29 be 9c | ae dd 38 28 10 ed cb 2a 6e a7 2a ab b2 c3 1a ee | 88 bd 15 d3 67 e2 06 8e b6 97 80 a6 e7 00 87 5b | b8 76 fe 7c 8d d3 5e fd 05 4c 7a d6 96 d1 0a 11 | 2d a5 69 d7 c3 12 66 ec 98 02 9e 42 c9 77 fa 4f | 17 0c c6 fb 54 4a 9c 65 b5 be 12 f3 a2 73 e2 09 | a7 ee 4c 4f 97 4d 4f 10 71 3e 60 12 75 6e d2 f3 | dc 13 51 ee 44 b1 77 ed 2b d8 92 98 96 69 e5 ef | 91 3c 2e 84 e4 bb af 77 49 ac 6e 66 e2 85 88 c8 | 29 00 00 24 44 d4 21 93 f2 35 cf a0 d5 a8 8f 1c | f3 e0 06 82 de 41 7f 55 b8 ed f7 b1 6c 3f 58 31 | c1 b0 fc 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 3d ba 6e 50 5c 1f f0 71 43 e4 e1 | 93 99 c6 4c 68 18 ff 24 00 00 00 1c 00 00 40 05 | 1e ed 5b 7e 6f 31 a0 f1 10 d5 48 eb 40 5a a7 bd | a4 a8 9e e1 | libevent_free: release ptr-libevent@0x7fb3800540c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | #512 spent 0.0696 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #512 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb340008e80 | handling event EVENT_RETRANSMIT for parent state #685 | start processing: state #685 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #685 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #685 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #685 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.228902; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.997604 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #685 | libevent_malloc: new ptr-libevent@0x7fb3800540c0 size 128 "road-eastnet-nonat-187" #685: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #685) | e0 29 5a 0a 61 0a 1e b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 44 4b 09 14 55 26 a3 28 d3 47 1b 88 52 58 95 | 5f 67 dd eb b6 51 c4 6d ea b3 00 9f 27 0b 9e 86 | 50 32 3f d4 ef 56 d1 52 a7 51 55 9e a4 19 c2 cd | 1e 12 55 b5 15 8f f3 d7 bc da 86 79 a9 47 70 73 | f8 8a e1 76 61 55 ae c7 2a a4 37 62 35 b1 6b fe | 4c 50 6c cb 7b 12 10 09 92 ba 26 a7 a4 fc db d0 | 2f 7e be 44 45 5c 46 c7 04 72 12 a2 3d 84 49 94 | 30 c8 bc 4f 39 25 a1 4f 16 a1 c2 1b 4e 22 be 72 | b8 4a 5d 48 29 a7 82 7c 4d bd 6f 13 50 85 ca c7 | ec 11 98 29 31 a8 99 3e 4e e5 4d 08 c2 a7 9d fe | cf 40 e8 27 e0 9b bd 71 82 7f 3e 26 24 fa b0 04 | c9 9b 4d f2 2b 42 eb 90 50 35 90 38 b0 1f 38 ac | 7a cd f0 e4 b8 ac 72 a9 0b b5 6f 4a 72 d7 7c cc | 36 87 5c ca 4d 87 f9 81 63 9f 68 fd 43 d9 83 b9 | 17 41 d8 dd 34 e0 30 6b e0 2b 70 c8 04 99 12 51 | 60 74 b0 27 54 ca d1 00 a3 92 7e ac 84 49 40 ce | 29 00 00 24 52 c9 db 03 45 a7 9c af 05 9f 92 28 | 17 af f8 90 e6 9b f5 88 0d 6e 51 b4 99 c6 1e db | 36 e3 9e 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 35 b6 5e eb 9e a1 93 4b 5b 44 61 | 9e 29 9b 50 f2 cb be a7 00 00 00 1c 00 00 40 05 | 8c 5a f2 f1 d8 0a f5 46 ba 17 5e 28 dd 6d 65 44 | db 19 d6 81 | libevent_free: release ptr-libevent@0x7fb364075180 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340008e80 | #685 spent 0.0697 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #685 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358023aa0 | handling event EVENT_RETRANSMIT for parent state #552 | start processing: state #552 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #552 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #552 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #552 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.22898; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.928818 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340008e80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #552 | libevent_malloc: new ptr-libevent@0x7fb364075180 size 128 "road-eastnet-nonat-10" #552: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #552) | ed eb 93 f8 7e 60 de d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b cb f1 c5 c9 33 2a 34 0e d1 85 1e 48 7b 2b 08 | 83 b8 ce 5c a9 55 37 f8 cf f4 8e c5 bc 03 8b a4 | ae 96 a2 99 0b 56 12 df 0f 7d da 8a 34 b4 5f 83 | 09 a9 33 3c c6 3d 79 dc c7 d3 2a 27 cf 87 82 2e | be 41 d5 b9 12 08 ab ba 5d cd 0f e9 8e 49 e8 11 | 80 d1 8e 63 8f 28 10 90 ba d3 f9 e8 1d 55 c1 f8 | e8 37 30 e5 eb 01 66 f8 b8 97 81 22 9f a7 c1 69 | d5 16 ee ab b5 f8 e1 be 84 8c fb 01 eb e4 87 59 | 7d 75 49 01 0a 1b 9e a9 46 55 ad d1 ba 32 2e a9 | 77 b7 a4 2c bc 42 01 fe 0e fb fb fb bb eb a9 a8 | 3e f3 4b e2 8b f1 54 95 68 4b 2a 95 25 78 7a 77 | 00 70 42 dc fd 53 48 e3 79 e3 2b ca 77 e5 77 0d | e6 9d ff 3e f8 da 34 38 ce 09 d2 79 7e 81 3b 25 | 2d 6c d8 d3 b0 67 79 e6 62 d7 c5 cd a3 5d 0d a2 | eb 67 42 ca ca d0 84 ca 28 62 c9 94 e7 3b 42 83 | 2a 29 90 2e 9c bd e7 c5 5a db e4 f9 d0 a5 4d f5 | 29 00 00 24 e9 97 93 9c 1c ef 16 73 1b 7a 47 b3 | b5 28 72 23 b0 2e 07 f1 0f 02 16 b9 14 bf 9e a1 | f9 3f 2a 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 4f 42 bf 1d 63 d2 01 e4 5f 1c 60 | a2 c9 01 6c df cd 78 4f 00 00 00 1c 00 00 40 05 | d8 d7 5c 38 cf 5f 73 a5 21 81 fd 7c d5 fb 18 da | 9b e7 4c d5 | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358023aa0 | #552 spent 0.0679 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #552 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b246c0 | handling event EVENT_RETRANSMIT for parent state #587 | start processing: state #587 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #587 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #587 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #587 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.229058; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.945739 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358023aa0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #587 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-113" #587: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #587) | c3 7c 98 3d b4 74 ab 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 ba c9 c0 d8 66 df e8 7c 54 40 82 4e 21 c1 07 | 59 68 7f 81 34 b6 35 92 5b 89 98 f6 ad 25 86 e5 | 73 8a 9a f2 4c 57 89 56 da a5 ff d6 a3 7f af f1 | f1 2e fb c5 11 47 ee a1 95 f5 26 dc 9e 47 06 cd | 34 b9 65 37 bd e1 04 27 c9 ff dc bf 67 78 96 38 | 52 9d 88 a0 32 73 3c 23 28 64 dd 93 b3 78 9e 2c | f9 cb d6 a4 86 ba f5 1b 60 c2 ad a2 9f 3e 81 a2 | f3 45 de 44 3d 28 04 c3 a1 6e 40 b1 4f 46 45 df | 5a 2a 79 6c 8f ae b8 30 ef c6 4a 6c 44 7a 01 b2 | 1a d8 98 92 1c 93 3e 73 34 b7 46 f8 42 08 19 36 | ba 97 66 22 2c 03 8b f7 14 9b 23 5b 0b 56 49 a9 | f1 9f 4c c1 da 59 b2 4c 96 91 d8 04 27 b3 bc 68 | 94 52 76 73 62 13 56 15 d9 2e 51 2c 30 ed a9 15 | 37 ab 85 06 28 93 eb f4 10 09 a8 e7 65 60 d0 d8 | c4 01 fb af 1e 97 f6 a3 48 1a 1f f9 86 1a 3d 6b | 8c be 9b 4f 2f 82 4e 29 1d 28 1f 1e 06 cf 26 25 | 29 00 00 24 23 67 1d fb 57 60 2a aa d9 1f a4 c1 | 63 ac 06 a0 22 92 47 d7 31 b6 6b 26 2a 2d 93 db | 2d dc c7 6b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 84 7e f9 13 29 fa bb ae 5d 14 1d | 96 1e a3 25 f7 97 44 66 00 00 00 1c 00 00 40 05 | 4c 51 eb 1f 58 50 45 24 34 60 90 38 ee 81 d2 d9 | 53 4c 38 07 | libevent_free: release ptr-libevent@0x7fb3700597c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b246c0 | #587 spent 0.0717 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #587 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368017ea0 | handling event EVENT_RETRANSMIT for parent state #535 | start processing: state #535 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #535 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #535 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #535 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.229138; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.927194 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b246c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #535 | libevent_malloc: new ptr-libevent@0x7fb3700597c0 size 128 "road-eastnet-nonat-19" #535: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #535) | d5 3d 4d d1 1d 8f ff ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd a8 30 7d fa 09 0e 91 b2 9d 3d 19 f4 ee 14 55 | 74 eb 7d 16 30 9b 64 08 bd 51 c6 0d 08 b3 39 3b | d5 c5 d3 d3 a6 f2 f8 14 c2 6f d7 95 59 0a fe e3 | bb a9 65 de c8 14 9e f5 05 83 26 75 c6 4c 05 34 | b4 a0 d6 d8 84 8c 16 46 27 7f f1 b6 a1 52 54 4b | 1a e2 b8 4d 24 eb ac 25 a2 41 76 22 20 0c f4 96 | 27 28 ef 3a 94 b6 4e c6 21 31 ca 90 2d 01 ac 3c | d9 6f 71 29 9d 32 e3 06 10 09 09 3f 08 e0 93 76 | aa 17 e1 ea 49 4d 7c 42 77 05 f9 17 bf ad af 3b | ed b3 91 7e 42 2f 67 a5 df de 4e ff 93 f2 9e 57 | 56 30 c0 46 0a 65 8c 18 8f d0 75 64 b5 32 6c 49 | 39 97 ce e9 7b c7 0e af 02 39 df da d5 ef 53 47 | cb a3 4c 02 a0 b2 1e 76 9e 5a 01 81 ed 62 af 75 | 23 20 b9 1a 39 86 e6 f9 03 41 1a d7 4e e7 c4 f5 | 82 a8 7a 1b 8c da 94 0c 14 8e 83 05 ac d2 dc 89 | 48 f7 0b 1d 07 c9 75 9f ab 81 e0 05 15 0e d1 2f | 29 00 00 24 c2 c0 89 96 d0 f7 59 31 53 11 f7 4a | 36 92 ef 7e 38 2b 45 e1 10 42 96 da 05 ff a3 7a | f0 1b 89 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 9e 60 66 94 a7 a4 7a 54 28 cb 5e | bf 06 cf c4 93 18 58 c1 00 00 00 1c 00 00 40 05 | c6 37 76 00 c2 f2 29 53 78 dd a2 4d 2d 0a f6 f9 | 70 42 64 5b | libevent_free: release ptr-libevent@0x7fb37c056bd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368017ea0 | #535 spent 0.07 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #535 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ae48c0 | handling event EVENT_RETRANSMIT for parent state #636 | start processing: state #636 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #636 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #636 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #636 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.229216; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.963579 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368017ea0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #636 | libevent_malloc: new ptr-libevent@0x7fb37c056bd0 size 128 "road-eastnet-nonat-146" #636: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #636) | ce ed f3 5e ed fa 9c 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 c3 55 ec 4f 5b 4c 21 a7 89 24 6e 2a b9 a9 cb | f8 19 9e a3 b5 df ee 5a 2c 71 bc 32 c1 92 74 f8 | b0 ab 4f 8f e7 f9 3f 29 7a 8c 9f 2f d7 89 ae 25 | 61 ab 3d 60 a3 0e 51 68 4c 02 b2 37 56 25 c1 f8 | bb 4a 51 31 0f 4f 85 cb a5 75 3a af 8e dc cc 87 | a5 bd 11 5b 66 d2 55 75 a4 74 43 78 e6 bd 37 d2 | 03 60 a4 df 8e 0f 50 d9 f0 84 a1 4b 87 50 ad 61 | 89 fd 53 a9 95 2c 82 05 31 04 36 b8 df 85 82 bf | 91 1b 12 8a 8c 72 93 cc 94 19 4b ed 3b c6 73 96 | c9 e4 a9 4f a1 e7 46 f7 b8 64 4d 8b b6 9f c4 71 | db ce 40 02 9e 98 7f 48 f3 9a 88 fa a8 90 63 74 | 87 33 f7 67 a1 6e 37 63 07 fd f7 f2 21 22 b4 ad | 8c e8 70 46 a2 30 3a aa 26 d0 99 b2 70 88 82 11 | e4 b8 46 de e2 85 7c 68 ae a6 76 d5 48 a3 de 62 | 80 b5 a8 b6 cf c8 b8 fb d0 a3 90 c3 74 cb c4 ea | 05 11 15 0d eb a6 bc f1 88 ed c5 82 fd 7e 24 72 | 29 00 00 24 e5 61 c1 f3 64 2d 4c f6 6f 55 99 d2 | 6d 06 b7 7f d0 4c 35 18 0b 4c dc f2 04 b9 cd b4 | d2 a9 94 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 4f 92 a8 39 a0 4f db 00 14 5d 39 | 5e 60 0b f6 04 83 59 50 00 00 00 1c 00 00 40 05 | e2 2e ff 0f c7 2f 00 8a f3 ce c3 f8 79 de 24 f9 | 92 17 31 34 | libevent_free: release ptr-libevent@0x7fb354069fa0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae48c0 | #636 spent 0.0678 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #636 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a5da90 | handling event EVENT_RETRANSMIT for parent state #578 | start processing: state #578 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #578 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #578 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #578 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.229294; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.945518 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae48c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #578 | libevent_malloc: new ptr-libevent@0x7fb354069fa0 size 128 "road-eastnet-nonat-143" #578: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #578) | 68 e2 ee c8 4f 05 0e 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 22 a6 6d d7 fc 8b 0a 14 19 3d f1 fb 0a ed f9 | 6f 90 9e 8a 9f a9 d8 ed d1 df 6a a2 d8 b2 22 2e | b1 59 73 5e b3 ab 9a 31 51 87 54 fd f4 e8 4e 8d | 3f 21 83 6e 35 41 fe 08 72 f5 2d 8d 2a f4 ba e0 | 91 8d f0 a1 05 86 67 4b fb b8 b6 6d 1e 1b 25 24 | 22 78 8b 7f 2f cf 5d 9a f7 63 da 29 5a 14 94 0b | 35 6e 33 f7 ca b2 64 fd 7c 9e 63 2d cf 43 41 22 | 59 51 84 8f fb 27 d9 fa 44 51 1e 67 02 f1 d2 0c | 45 0f 35 78 a9 8f 35 39 ea c6 d9 8d 03 b0 0f 84 | 80 91 04 9f d8 fb ff 28 d3 ab da 21 66 90 1c 59 | 8d 41 8b a6 7f 98 ab 4c b6 53 24 a3 ad 53 6f 51 | 8f f2 b7 4c d3 82 c2 ad 67 89 34 ab a5 77 52 48 | 5e 0b f2 ef f8 d5 a0 42 b1 fe 42 08 88 ca 60 89 | 3b cf 5c bd a3 63 ec 76 02 82 7b 9a f3 6f d7 d6 | dd e6 17 44 06 f8 37 9b 67 a7 db 60 51 b4 ad 18 | 60 cb 7b f0 7e d2 5e 9d 2e 49 2f db ef 23 bd 96 | 29 00 00 24 46 bf ee 27 91 3e be 20 10 cf 9d 0f | e6 4a bd 7e e9 3b fd c7 94 37 e1 c7 cd 2d 4a 64 | 84 e7 2b 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 0f 29 05 fe c1 9c 12 af b5 65 ca | 32 36 33 1d 77 e8 41 70 00 00 00 1c 00 00 40 05 | 4a 88 68 5c be 68 1b 50 17 99 f0 8c 97 cf 78 ef | ec cb 25 c1 | libevent_free: release ptr-libevent@0x7fb37005eff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5da90 | #578 spent 0.0697 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #578 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb380015160 | handling event EVENT_RETRANSMIT for parent state #568 | start processing: state #568 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #568 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #568 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #568 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.229371; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.944148 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5da90 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #568 | libevent_malloc: new ptr-libevent@0x7fb37005eff0 size 128 "road-eastnet-nonat-34" #568: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #568) | 6e 64 73 85 ce f2 b0 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 a3 99 bf 78 b9 d4 1a 84 24 de 04 7c f3 4d c8 | 96 8b 02 59 28 04 a0 26 9f 13 67 64 f7 77 7a 65 | 5c 17 49 3e 43 8b eb 50 14 de 87 67 95 79 66 a4 | ac 29 76 ee dd 7d 07 1f ac 4d a9 5e 2d 67 5f 35 | c1 62 fb c8 15 ae a3 12 9b c1 7e 41 bc 7b ec 39 | 5b 29 5a 0f 5f 02 56 47 d1 33 0b 64 a8 f0 f9 e0 | 79 a9 8c 6d 5d d0 49 7f 45 3b 2b 8e b6 e4 e8 15 | de 83 5e 1a 47 c0 32 44 cb e0 50 bd 65 a0 22 bc | 0b a6 8b 59 f8 c4 16 dc 3f 1f 41 55 d8 a6 4f 00 | f4 0f fd 9e bb a0 ca 89 1c f2 5b 3e b5 1d b0 8a | ed 21 82 3c a3 44 7f 36 e9 37 bc ac c1 e1 00 c4 | 04 65 71 de 20 77 8c bd 4b 28 11 32 5a 14 67 24 | 07 50 c4 30 94 78 de 21 2b 34 e6 c7 52 91 19 f8 | 98 c0 be 08 e1 94 2a 06 f0 4f 8e 0c d1 26 ea 08 | 99 06 ef 43 9b 53 fc e2 1b 86 fb cc 41 b8 4f 56 | b1 9c b0 66 18 e0 a2 81 3f 3a d6 0e 31 c5 b9 d0 | 29 00 00 24 13 36 f4 68 46 c8 45 cb 43 3d ab 7d | 06 e4 d0 2e f6 fd d6 0f 63 23 da 46 eb bc 2f aa | 4d ed 12 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 84 1a 56 ea 9e db cc 8f 31 8a c2 | 65 e8 4d d8 8a 02 34 c8 00 00 00 1c 00 00 40 05 | 74 34 3f f7 0f 8a 4f 83 f5 c9 a4 b3 22 9c 5e 1d | e6 10 1a 44 | libevent_free: release ptr-libevent@0x7fb38006a090 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380015160 | #568 spent 0.0695 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #568 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c03b210 | handling event EVENT_RETRANSMIT for parent state #538 | start processing: state #538 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #538 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #538 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #538 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.229448; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.926535 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380015160 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #538 | libevent_malloc: new ptr-libevent@0x7fb38006a090 size 128 "road-eastnet-nonat-50" #538: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #538) | 7d c2 7d 21 ef 8d 9c cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 92 33 2e 2c bb fa d3 c8 4f 04 33 a3 d9 67 23 | c5 f1 25 5c 53 26 1a cd 8a 43 1a 34 d0 e0 56 a7 | 2c 60 2d 8e 0e dd 90 95 15 0a 6b e5 9a cc ab f1 | 7c bd 19 8d 97 83 43 89 b4 a0 d7 4a db 0b 32 48 | 37 e5 2e a6 a4 51 00 59 4d 06 a6 4f 7e 5a c1 3b | 41 2d 91 05 a9 98 a0 d8 9a e1 37 d4 eb e2 b3 93 | e7 01 b6 51 59 81 49 b7 c7 db bc 77 53 8d ec 96 | aa 77 df f8 25 74 3c 8c 99 15 73 9e 96 a4 29 97 | 67 0e 10 a2 47 f8 b3 64 aa 76 27 48 03 49 0b e8 | 8e 18 c8 17 4a 26 1c af 91 66 f4 48 af e2 d7 d4 | 44 38 3e 28 ac 6b 9e 39 19 3f ae 6e d1 64 ae 00 | 5c 63 81 a7 65 f0 45 ba 8a 0c 4d 79 03 55 a4 7a | 72 cb f1 39 e4 d0 28 d0 3e 02 49 3c 8a 03 29 fa | 32 8b 50 0b ba d4 8f 2b b2 0e bb bd 1c 1c 88 74 | fc 9d 0d ed 49 4b 7d c7 5e c8 b1 dc 66 01 28 d7 | 81 70 ee a0 95 cd 9e 29 51 a2 d1 8a 79 cc 01 2d | 29 00 00 24 0d 80 72 91 5f 6c f2 ee ef b6 16 64 | a0 b5 22 be fd 2c d0 f5 a5 ec b8 1b c0 82 2c aa | f7 2e 69 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 35 66 94 43 28 e7 40 5b c1 a0 78 | 2b ba 2a d8 0e c9 44 ab 00 00 00 1c 00 00 40 05 | 3d 34 49 ee e1 5a 54 f0 2b 50 8b e9 80 0b e1 58 | a7 e3 51 fd | libevent_free: release ptr-libevent@0x7fb36c0542e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c03b210 | #538 spent 0.0696 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #538 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358009690 | handling event EVENT_RETRANSMIT for parent state #575 | start processing: state #575 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #575 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #575 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #575 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.229526; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.943849 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c03b210 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #575 | libevent_malloc: new ptr-libevent@0x7fb36c0542e0 size 128 "road-eastnet-nonat-62" #575: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #575) | b9 99 36 5a 8c c2 79 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 c8 04 79 a7 ca 7e 22 ae 09 07 e5 fc 49 20 ff | d5 2c 7e 22 4c 72 c0 78 1e 2c 5c ec 12 7c 72 d2 | 02 e8 75 7b 4a a7 3c c3 16 5c 13 70 ea 37 54 f9 | 56 e8 d3 91 10 1a 84 a7 6a bd f8 ed 5e e4 34 35 | e4 61 65 f6 21 ef d0 e1 bf 6f 09 fe ff af 3a 45 | 86 75 a8 02 ec e4 0e 75 42 6b 01 d8 b1 76 3d b4 | dd 64 39 8f d4 1d 82 58 1e c2 7c 1b 86 61 97 0b | 7a c0 a1 e4 47 98 4b 18 ef a4 43 98 6c 7e 6d d0 | 16 22 ae c2 a0 b2 46 36 87 d4 91 30 13 3f 9a eb | 8a 99 16 71 39 ce 4d 5e 49 23 27 dd 31 e1 69 d3 | 97 f4 5c 55 69 dc 26 6c 11 fa 11 8a 2a 43 c5 d6 | 25 6f 41 fb 1c 99 a2 b8 45 cd 12 29 39 ba ac a3 | c6 02 a2 8b a0 be b1 46 84 7b 24 9a f3 d6 f9 65 | 1a 69 bd f7 e8 de e9 5a df 78 41 ab f7 29 e1 6b | f7 12 cb 1a 99 80 ee c2 16 60 54 4d f3 eb 93 e7 | 80 78 df 65 e2 d4 7f 1b 6e a6 c2 48 37 dc 57 12 | 29 00 00 24 b8 4f 87 74 9c 80 54 81 1f 37 0b 79 | c0 75 5b ab 09 6f 94 95 e5 f3 52 5f 2d 7b fc 69 | 2d 41 18 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 17 0c 0b ea 42 91 a8 38 34 87 4d | f7 fc 36 4d 5c d3 fc 11 00 00 00 1c 00 00 40 05 | d9 91 bf d5 e3 57 28 b5 8a cc 1f cf ff 34 03 80 | 9c e9 c7 70 | libevent_free: release ptr-libevent@0x7fb358059b60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358009690 | #575 spent 0.068 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #575 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #606 | start processing: state #606 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #606 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #606 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #606 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.229604; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.968328 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358009690 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #606 | libevent_malloc: new ptr-libevent@0x7fb358059b60 size 128 "road-eastnet-nonat-223" #606: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #606) | 23 c4 ab 3f 0f 4d 11 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 ec 57 8c 95 7b 1b 15 f8 8d ea a4 a3 af fe de | c8 50 9d 01 42 a2 a8 d6 b3 0f ab aa a3 20 6b a8 | 43 36 ac 25 c0 23 8f 9c cd 38 59 18 58 4d 26 27 | 3a c1 0c 20 3d b4 f2 a3 6a 0b 85 ac 0d 0c cb b8 | b2 27 34 92 1e d8 c1 ed 04 88 17 ec 3d f0 78 9d | 19 06 f9 a8 2e 5e 2f 6e 4a 1c 90 db 5f 93 41 e4 | 28 08 f7 7a 45 4e 76 50 c3 e3 6e be cf fb 71 40 | 41 9c c6 87 30 7d 0a d4 8c b5 0f c7 31 32 44 ba | 3a 9b 83 7d 6b 03 e1 c1 68 94 44 99 8a c0 56 cb | 60 44 86 42 73 d4 b2 3a 24 29 f0 d7 e7 c2 92 6f | ca 66 01 13 32 22 64 32 e0 45 28 0f 62 51 89 c6 | 22 97 d2 d2 ee ea 04 89 40 64 4c 95 db fd 1a 35 | 63 e6 0a f3 7f 06 ca e1 8e 13 8f 8e cf e0 ac fd | 6c 90 77 9a 8a 33 7c d0 d9 ee f2 a2 51 90 42 0f | b9 cb 13 5f 29 0a cb 86 1a e6 6a 5f 79 aa a1 f7 | 73 3c 37 36 16 c6 aa 27 ef 60 b2 ed ae a6 69 93 | 29 00 00 24 16 68 47 01 32 e0 21 95 ec 7e d5 06 | 76 a0 66 58 60 6e 0d de ea 44 b2 e6 49 d7 45 61 | 92 31 62 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 9e 40 be 82 89 76 10 a5 a5 b3 c0 | c6 a6 27 e3 b1 8f 5e 15 00 00 00 1c 00 00 40 05 | 9e 23 71 0d ac e6 cd ef ec 0b 33 3c 87 a3 e1 e7 | 66 2f 45 0f | libevent_free: release ptr-libevent@0x7fb36c06f9f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #606 spent 0.0697 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #606 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab3980 | handling event EVENT_RETRANSMIT for parent state #583 | start processing: state #583 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #583 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #583 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #583 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.22968; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.941128 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #583 | libevent_malloc: new ptr-libevent@0x7fb36c06f9f0 size 128 "road-eastnet-nonat-6" #583: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #583) | ee 37 ee 52 ed a9 c3 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 a4 f5 71 cf 07 11 54 77 c8 dc bd ad 96 f0 01 | 5d a4 14 b5 a6 c9 a5 8c 07 7c 60 be a1 8b 30 17 | 0d cb bf c7 58 fd 5c f5 d2 3d dd 6b 17 ca fe 28 | 75 d1 d9 89 ad e6 fa bf 8a 41 2a 16 1f 72 19 b5 | fa b3 fe f4 08 23 24 22 95 34 55 fd ba a3 89 6b | f3 72 8f 60 ab 16 03 0b e3 7c 7b 79 7b de 9c 09 | e3 e5 5a 50 1f ec 54 0e 6e 2b 44 25 a3 4b b5 b9 | 40 85 8c 3d 6b bb 5d 52 c0 1f 28 1d c6 f3 f2 46 | f2 e5 18 48 a8 50 9c e8 18 6b e0 d8 c9 f8 99 b3 | 9d 7e 38 69 ed ff df 3d 1e 61 57 86 a8 0a e4 e7 | b9 e1 4a ad ad 0b 8c 53 f1 1d 20 66 9c 6e 12 ed | 4a 64 77 80 75 c0 8e a7 e7 a0 ec 74 74 9a 22 d2 | ed 8b 25 d1 aa db 80 ca af 4d 51 c5 3a ff 34 e7 | 01 6e ef 37 60 dc 73 7b 12 57 ba 0a 31 0d 83 0a | 8c 77 6a 78 fe 86 74 7d 3f c3 4e 0d 39 54 83 b4 | 7c 64 dc 24 28 35 25 63 99 9c 79 c9 80 75 2e d0 | 29 00 00 24 71 83 b5 1d 55 d7 27 53 1f 29 9e 3f | 3c f1 26 1a 11 ac 1d 70 ba b0 78 18 67 71 1e 34 | 60 b9 78 a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0d 09 e0 45 78 0a 9d ed 5e 85 e2 2d | 30 cb b9 bb dc c5 6e a8 00 00 00 1c 00 00 40 05 | 05 40 6d 6e f0 4a bd dc 3b 91 6d 9b 95 75 10 8f | df 31 bb 10 | libevent_free: release ptr-libevent@0x7fb35006cb20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3980 | #583 spent 0.0697 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #583 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354046090 | handling event EVENT_RETRANSMIT for parent state #543 | start processing: state #543 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #543 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #543 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #543 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.229758; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.92355 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3980 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #543 | libevent_malloc: new ptr-libevent@0x7fb35006cb20 size 128 "road-eastnet-nonat-11" #543: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #543) | 8e 44 72 50 b9 d3 dd b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 41 24 1a 7b 6b 70 54 d6 bd da 9a 74 11 c1 10 4c | 35 ce 24 8a 41 de 3b c0 5b 1f ca bb 16 3b d8 1c | 1e a4 54 6d 24 65 47 b9 56 f7 04 e6 39 1c d0 98 | 83 cb 9e 40 be 51 70 af 81 68 b0 d8 3e 19 c8 15 | e4 25 aa 79 9c 90 e2 25 c5 ca b9 8c 40 22 6c 4b | 93 ad 78 af 16 d2 3d f3 8d 27 b1 61 55 d3 78 18 | 3a 04 68 63 37 a9 4f 5d fc 04 16 94 42 0d da 3b | 8c c1 6e d4 a9 31 72 3b 81 99 92 2b 83 15 9c d4 | 8b 0e 27 49 4d c1 a2 ac 6c 30 cd b3 8d 5a 76 66 | 00 bd 4e 1e 9f 08 70 f9 6c 29 f6 48 96 a2 b3 24 | fb 0e ee 0a ff 43 23 ef f7 df b7 1d 3c 50 f5 21 | 78 9e f4 1f 72 64 73 81 56 af c6 bf 6f 78 68 b6 | 23 6b 4d 8c d4 8f 95 9f e4 07 d6 99 60 6f 4f 68 | ff c8 49 ef 62 2d de 2b 39 14 98 51 d2 c8 bb 9f | 9f 3c d8 92 38 bf 91 56 69 62 cc 92 f0 79 c0 f7 | f4 11 ff 98 80 77 af d0 41 c1 25 02 72 ea c9 c6 | 29 00 00 24 54 02 f2 6f 33 5c 6e 1c 37 ce 9e 0d | c9 7a 13 59 0a 74 e5 bf e6 80 24 a7 f4 41 a6 33 | 04 30 82 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 fb 77 bc e4 59 3f 3a 12 ff e7 0e | 5d b1 f7 87 35 40 87 23 00 00 00 1c 00 00 40 05 | 86 cd c2 c9 ec 15 a4 23 df 3e 79 59 a6 b0 4d 70 | be f0 fe 01 | libevent_free: release ptr-libevent@0x7fb354054010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354046090 | #543 spent 0.0676 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #543 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378046090 | handling event EVENT_RETRANSMIT for parent state #545 | start processing: state #545 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #545 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #545 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #545 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.229835; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.940181 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354046090 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #545 | libevent_malloc: new ptr-libevent@0x7fb354054010 size 128 "road-eastnet-nonat-106" #545: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #545) | 40 cb 66 3b 79 de 72 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 5b 7a 86 ba 9c 03 fc 9a 35 b3 49 7d b8 a9 eb | ce 9b 15 66 7f 3d 65 56 ca 83 c0 b5 c0 d2 9b af | bf 94 33 79 9e 6a 89 29 27 fe a1 c8 69 70 d6 9d | 72 b4 78 99 de bd 56 1e ee 52 58 81 e5 79 d8 fc | 9b 01 47 2e f9 5f ff db 1b 0c 1d 6b d2 24 13 26 | 4e 14 5a 53 41 21 88 e6 85 34 1d 40 8d 0c ab 68 | 2f 2a e8 36 f9 d2 8e 74 83 80 31 c4 ee f0 6f 04 | d8 06 8e 87 47 f7 48 6b 1a 9a d8 72 1e 44 3e 1e | 94 73 03 f7 b6 b7 71 80 64 13 af 6f cd 97 48 25 | 27 b1 25 73 1d 03 81 9d 9b ed 92 d1 b0 47 c5 19 | 43 4b c5 91 96 cb 5e d0 fb 41 6d fb 23 51 8b 64 | 9b 4b 49 79 cc de 0f f7 0b c8 5d 39 be 6a 5d a6 | e5 65 4b fd f0 3d 65 42 41 d7 16 db 74 2b 56 12 | 51 92 12 04 90 41 8b 34 9a 75 ef 99 31 b2 53 fa | ec 4e df db 6b 7b 92 59 ae 99 e6 6b a1 12 97 31 | ed 33 0d 5e 99 91 c4 04 5f f2 a1 92 4f bd 71 0b | 29 00 00 24 8b 68 1c b2 c6 cc 60 af d5 80 42 4c | 34 71 a0 ef e4 ac ff 5b e1 55 8c 60 71 90 0a 7e | 13 6c 58 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 b0 98 38 8e 87 51 0e dd 45 6a 77 | ed ad b4 ba d2 48 07 74 00 00 00 1c 00 00 40 05 | c8 e4 a8 78 6d 64 59 0e 02 cc 7d 7f 34 3a ae d2 | 96 b2 88 9d | libevent_free: release ptr-libevent@0x7fb3800648b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378046090 | #545 spent 0.0682 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #545 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a986c0 | handling event EVENT_RETRANSMIT for parent state #634 | start processing: state #634 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #634 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #634 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #634 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.229912; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.973659 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378046090 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #634 | libevent_malloc: new ptr-libevent@0x7fb3800648b0 size 128 "road-eastnet-nonat-221" #634: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #634) | cf 5e f3 d9 0f 8f c8 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 6e 4e 42 21 e8 c2 13 74 c2 ba d4 76 e1 be 3a | 17 15 d5 c1 bf ca e3 9e c2 e2 ab ff 65 ee 7a 2c | f3 bf 14 cb 54 1e f5 5d 6b 0b 4b a3 c6 42 f2 c5 | 00 c2 f8 63 58 12 0f 9c c4 de 06 61 51 86 70 ce | 7a 0a 7a ff cc 71 b7 65 f5 cc 38 14 71 81 de 07 | b7 fe 20 84 4a ff 1c 5d 53 a3 fb 06 85 18 2b 9b | a8 30 c2 b9 8d e1 9c 07 b4 43 af 10 5f 03 0b 44 | c6 f5 8b 61 b9 fa 0b 3d 1c 32 63 5f 79 89 62 fd | 45 d5 92 76 17 fc 00 05 ef 5e 2c ec c0 11 2e 72 | 0f 45 e0 06 cd 9d 57 a6 22 61 8c 9b 78 8d c7 7e | 93 4b 6b 11 31 21 df b9 6f b0 e5 90 c6 6a 46 63 | 33 24 c9 bf 0d 8d 8a d0 3d 26 dd 1c 91 5a 75 0f | 70 13 b1 0c c1 ba 7c c8 70 09 19 0f b5 cd 04 5e | 6a af 66 e1 91 d5 09 48 02 32 4f dc 10 ea f4 57 | c2 40 bb 53 d3 0b 66 f6 59 f4 9d 9f 3c f5 45 a2 | 33 3b d9 2c 95 a0 76 aa 18 c3 43 fd 17 da c0 00 | 29 00 00 24 30 83 66 63 cd a6 58 35 d0 aa fe c7 | 9f 22 4a b9 bb d2 ab 8e e4 52 a2 c8 ac d9 43 99 | 4a 56 b6 54 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 4a aa 08 58 24 5b c5 80 af 06 0d | d7 f8 bd d3 f5 50 b0 3c 00 00 00 1c 00 00 40 05 | d9 15 55 e8 f6 53 18 54 ee 68 b7 cc 78 54 e7 63 | 8d 71 15 9f | libevent_free: release ptr-libevent@0x7fb38006f870 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a986c0 | #634 spent 0.0698 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #634 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34801da80 | handling event EVENT_RETRANSMIT for parent state #540 | start processing: state #540 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #540 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #540 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #540 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.22999; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.927546 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a986c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #540 | libevent_malloc: new ptr-libevent@0x7fb38006f870 size 128 "road-eastnet-nonat-126" #540: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #540) | 2b e1 27 8d d0 52 8a f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 d5 ad a4 cf eb 89 cf 33 00 bc 65 7f 4a 7b 8a | 16 3c 55 64 2b 44 36 7b dd 40 e5 4b 69 bb 87 d7 | 44 84 65 2c 80 59 b1 0b 26 0d 4b 17 d8 92 89 d5 | a8 39 88 9f 65 7f d7 e3 5e f3 f1 e1 69 ed 56 6f | 2d da 3b aa a1 f5 57 29 af ff 54 b9 33 17 09 e5 | 1c 0d 3c 29 e1 8b c4 f9 51 80 15 5e 1a fa 1a 83 | b0 dd b2 13 d6 42 a1 13 6e a2 49 94 b3 88 a5 52 | f2 25 96 67 72 ce ef 27 ee 12 d4 a9 81 d9 24 c0 | b5 47 34 ae 0d b8 be 17 8f d7 40 55 d5 69 22 bc | 39 f7 c5 28 22 3c 68 a5 3a 8d 6f 1f 00 85 29 77 | b9 55 ef 45 f0 37 a4 79 52 7d a6 e9 cd 97 64 1b | ec a9 e2 6b 2f 70 e3 90 d3 39 85 a7 70 54 7c ee | 29 b5 fb 95 bc cd d5 08 47 e2 10 f1 3c fd e5 2c | d9 d7 22 81 09 0d fa 53 8d c3 ee c8 2c a9 cf 74 | 00 4c 6d d4 7a 67 6f a7 66 48 98 1b c8 e6 db 27 | dd 8b f5 35 b4 13 6e 03 ce 21 d0 88 3b 78 0a fd | 29 00 00 24 83 64 8b 32 eb dd 3f 5a 87 dd 64 20 | 2e 87 12 47 14 e5 e2 45 bd 12 94 4b dd e7 b2 d7 | 43 01 e7 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 20 26 6c 5f d3 95 5b fe ef 96 45 | 0a fb 28 79 9a 9a 40 12 00 00 00 1c 00 00 40 05 | 9f b1 04 08 d0 1d 7f 34 66 26 cd 7d 6d a5 dc a3 | 2e 5b 4c 92 | libevent_free: release ptr-libevent@0x7fb348053b10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34801da80 | #540 spent 0.0701 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #540 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c040840 | handling event EVENT_RETRANSMIT for parent state #607 | start processing: state #607 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #607 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #607 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #607 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.23007; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.960768 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34801da80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #607 | libevent_malloc: new ptr-libevent@0x7fb348053b10 size 128 "road-eastnet-nonat-35" #607: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #607) | 1d 41 1f c6 ff 0f 27 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9d 29 5d d3 25 1e d3 3b 53 2c 02 04 94 df f0 9e | c0 c9 bd c2 0e c6 5b 3e b3 b5 28 a4 b4 de a0 bc | 44 35 8d ca 70 6e 31 a6 5c c7 6e 92 aa 89 1d 29 | f4 20 9b e4 de 42 28 b3 c8 f4 2f 6a 42 5a 19 f0 | 51 f8 ac 34 ce 28 a7 d4 af 5a ec ac 56 96 17 ee | 7c 53 68 62 c6 e5 b3 17 31 98 5f 6b 69 9c 2a 00 | d4 a4 6e ae ef 2a ab ba 56 64 86 65 05 0f d7 44 | f7 e3 bf 1e a4 ed a7 7d fe 8a 1d fb 8d d7 f1 cf | e1 7d 41 0d a7 4f 0c f0 68 6a 81 5f b1 24 1b dc | 3f da c7 a0 34 fe bc 93 f1 d2 24 a2 86 ef 73 2a | e2 6f bf c6 0f a9 6a 2f f3 1d 17 2f 3f d3 72 6e | b7 b5 92 74 5f d7 2a 9e 99 d9 04 38 46 4a df 24 | 0d bb 8c 68 24 f0 01 b1 77 d7 d1 59 41 dc 96 1a | 97 ab d6 d6 b7 b7 b1 29 13 72 38 ec 4d 09 e0 92 | 84 95 9d 0a 22 aa 6b 94 be df 8c 5f 62 af f3 3a | fb a4 36 0a 7d 82 c0 0a 05 87 7c b0 d2 48 69 07 | 29 00 00 24 0c 6e 31 a9 aa 11 87 13 04 94 3b 5e | 65 1f 88 8c ea 44 4e 42 5d 13 db 22 a9 85 17 06 | 20 31 3c 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f9 d0 a1 05 b1 12 13 d2 38 28 3a | 7b e1 92 d5 4d 8b fe 08 00 00 00 1c 00 00 40 05 | 52 35 89 2b 6d df 6f e4 b5 73 99 d5 81 ab e6 da | 1a 9a 77 69 | libevent_free: release ptr-libevent@0x7fb37c069e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c040840 | #607 spent 0.0699 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #607 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c046090 | handling event EVENT_RETRANSMIT for parent state #582 | start processing: state #582 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #582 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #582 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #582 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.23015; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.951172 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c040840 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #582 | libevent_malloc: new ptr-libevent@0x7fb37c069e60 size 128 "road-eastnet-nonat-127" #582: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #582) | 36 4a 37 cb 1c b9 ae 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 4f 61 87 c6 78 57 73 4a 5f a1 9a 64 82 d0 e5 | 6f 49 6a 86 33 ed b7 39 d6 77 5c f2 31 a0 9f f4 | ec 43 a1 b9 ee e5 b8 9b 1f c7 f2 95 28 7d d0 3c | ff 5b 16 5d 16 d5 26 95 a7 b7 04 19 40 c9 07 68 | b1 7d c4 8c 15 89 44 64 6a 3b 95 b9 d0 ad c1 f3 | 68 1f 13 1a 8f ee ba b2 3b 04 d2 cd d6 6f 70 f2 | aa 4a f0 c4 b9 45 7c f5 97 5e ea 63 fd 31 8b 63 | 9e 99 a5 f5 b9 09 c7 72 66 49 45 08 e0 12 a2 af | f0 80 ef 2a 78 c8 ab 6e bd a6 31 fa b7 36 d9 19 | d4 8e 57 35 2f a1 d2 8a d8 2a cc fa d0 26 84 24 | b9 a6 0a 8f 1b 41 12 b9 03 5a 72 30 93 99 ff 3a | e5 ef 85 4d d5 6b b8 f6 bf 6a 3d e4 93 67 8e 91 | 9d f8 cf c1 e9 c5 82 41 6a ed e0 1b 1d 7b a2 28 | 4c c5 b3 bb af 17 f6 b1 f6 63 47 76 31 fe 54 4d | 80 f6 9f bb 7d 94 71 07 12 ba da 93 7c 72 12 96 | a5 ce 85 8f e3 3e a3 aa bf b5 d9 b0 4d 73 42 19 | 29 00 00 24 3a 1e 72 ea a0 4e d4 41 98 1d 74 e2 | b1 f2 f0 bd 21 18 c0 9c 2b 6a 10 6d f8 77 54 e9 | 5f 0c 5c 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 1a 0a d4 84 49 b9 2d 3b f6 bc 1c | 48 56 f8 6a ec 07 3c 40 00 00 00 1c 00 00 40 05 | 4c a0 a2 f3 b5 28 de 62 5d b9 c2 1c 46 ba 05 5c | 22 af fc 09 | libevent_free: release ptr-libevent@0x7fb350065220 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c046090 | #582 spent 0.0698 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #582 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348030240 | handling event EVENT_RETRANSMIT for parent state #553 | start processing: state #553 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #553 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #553 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #553 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.230226; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.93462 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c046090 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #553 | libevent_malloc: new ptr-libevent@0x7fb350065220 size 128 "road-eastnet-nonat-77" #553: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #553) | 9a 41 ad 5b 0b 26 50 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 98 9f b9 be 87 16 03 59 fa c6 46 2f 12 bf f9 | 9c 48 69 58 ca 2c be 3c 1b 2c 0f 5d 12 16 fe b8 | 30 28 bc 11 9d 18 3a 2e 90 9c 49 0c c8 26 aa 51 | 1a 9f 8d 14 3c a4 33 0e 49 75 9b b9 aa 38 ce f2 | 16 4f ee 39 a5 0c 19 90 f6 fe 17 a7 97 44 51 96 | cf b5 e3 78 62 4a 8d 45 65 01 d7 f0 91 ea 83 03 | ef ee 72 ad ec d4 2e 42 af 58 6b a8 76 71 c1 a4 | 15 40 9a 41 d3 be f4 fc 82 6b 9b 27 44 16 92 88 | d2 ec ae 3a ad 37 9a dc be e2 18 f1 a7 5a bd 4f | 9f 7b 73 27 86 3a a5 22 07 50 15 6f 01 41 8f 31 | a4 8d 9b be 74 93 18 96 e2 bb be 98 d5 3f 3c b0 | be 51 bf 90 e0 7d 1d a1 c1 89 14 87 3d 3e 5f 1a | 3a 6e 65 d4 e7 b0 94 33 2a d6 83 76 bd a6 19 f2 | 31 91 dc c3 17 65 be bd 3f 1a c2 ef f5 43 82 b9 | b3 3d 97 1b b0 5f d5 6f 78 93 3d 15 15 8a d3 04 | 93 b7 c2 73 86 dc fe 40 7b 4e 06 9a 50 ca 56 13 | 29 00 00 24 51 58 09 66 02 b7 a8 f0 dd f0 1c 1d | b2 fa 84 64 76 65 9d d1 36 08 96 10 0a a1 c1 1c | e7 da ff a4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 41 6f 46 01 b2 f0 28 d5 2d 8d 99 | ce e6 b9 ed 57 d9 9f 7b 00 00 00 1c 00 00 40 05 | ed c5 55 11 76 93 de 00 6c 52 d8 5a 9c ca 52 d6 | a7 72 5b e1 | libevent_free: release ptr-libevent@0x7fb348059270 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348030240 | #553 spent 0.0711 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #553 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37400cc10 | handling event EVENT_RETRANSMIT for parent state #548 | start processing: state #548 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #548 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #548 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #548 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.230306; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.937061 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348030240 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #548 | libevent_malloc: new ptr-libevent@0x7fb348059270 size 128 "road-eastnet-nonat-5" #548: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #548) | 6f bf f8 cc f4 7a 9c 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 3a 23 76 43 2c d6 0c 77 f6 be 3f 63 2d ef 87 | 5b 0a 43 13 73 5f 72 ec 4f 32 10 0e f0 de 84 7f | d4 61 90 d4 eb e1 32 1e e5 8e d7 b5 e2 7a e7 49 | 5d f2 fc 7a c6 30 1a 6f 07 cc 95 e2 88 f7 7d 25 | 65 7c dd a0 41 59 c3 25 f5 18 42 08 32 24 11 16 | 2e 52 4f 9a f3 7a ed ce d9 b4 aa b3 1f ae af 20 | 42 b9 b1 ad cd bb ee c0 74 e1 fd 67 f4 5d 34 44 | 6a de e6 b7 35 4a f2 eb 39 da 8c cb 41 b2 00 29 | 86 07 50 93 e1 bc bf ab 70 b9 fb 51 f1 a7 98 f9 | 2b 98 28 e6 c7 3d 74 21 03 5a bb f5 37 9e 89 94 | 7c 03 2e 40 d5 60 16 2d d9 fe b8 61 a7 83 f3 1d | ff eb 71 d5 80 83 a8 32 43 df 3f 7a 3d 1e 14 01 | e8 08 00 8c 59 d3 27 3d e9 52 04 6f 01 93 dc 8f | 24 6b 25 9d e9 4a 4b 67 81 c6 ae fd ce 83 60 14 | 29 d6 20 63 24 51 e8 f1 7b e4 ef 94 6e af af 7a | 65 c0 38 a3 b6 06 be 41 56 5f 9d 49 7b 85 1f be | 29 00 00 24 3a 01 9a 17 69 6a fb fe 06 63 3f f6 | 88 7f 88 c9 7d fd b9 fa 66 cd 9e 05 f9 56 87 93 | 78 28 b7 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 f1 40 91 ab 0d 01 84 cd e5 c5 16 | 59 f1 09 ef b4 ca 5b 7d 00 00 00 1c 00 00 40 05 | 0b 27 51 7f 3c e8 a2 b4 d8 2e fd 6c 29 e4 91 b0 | 77 83 22 02 | libevent_free: release ptr-libevent@0x7fb38005f0d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37400cc10 | #548 spent 0.0693 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #548 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348012890 | handling event EVENT_RETRANSMIT for parent state #566 | start processing: state #566 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #566 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #566 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #566 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.230384; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.94373 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37400cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #566 | libevent_malloc: new ptr-libevent@0x7fb38005f0d0 size 128 "road-eastnet-nonat-39" #566: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #566) | 88 80 6b f4 b9 8d 66 b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef c8 5e ab f5 ee a4 b9 98 60 85 05 ca 3b 04 b0 | 7d 9f 17 5c c2 7c 2b 4a da 7e 26 15 fc 48 81 31 | b4 8e c6 e5 11 7d 74 25 e5 99 ba 1d 58 67 84 5f | 89 d2 e2 25 03 e3 33 52 7a ed d7 e2 f5 b6 28 a4 | 1d 2f f7 d4 f6 94 af 23 10 a8 8a fc f4 89 a2 3c | a5 d5 e3 17 b6 f0 c4 8f 7f 71 4d 6f bb 87 76 f5 | a2 04 13 1b a7 e6 0f e4 4c 2d 33 e9 31 87 17 3c | cd 1f 22 8b 07 c8 21 5a 22 9c 36 40 a1 0d 7a 52 | af 7b bb f0 61 88 95 3a 59 92 5f 05 a1 92 fb 6c | 3d 4d bd 20 03 45 e8 a3 b0 a6 b7 00 08 7f 5b e1 | f5 a0 c3 e2 5c ca 78 79 72 98 fa 67 35 e4 cc fb | 8a b3 33 65 b6 e9 a2 86 fe 7c ee ff 0a 6f 23 a1 | 84 0d 45 d3 fd f8 6d 40 31 50 c7 97 1c 51 ef a1 | 74 f8 15 00 16 ec 9e e6 ab 9d 53 7c 15 3a f7 d3 | 7c 57 1b b1 1c 4b 72 88 0a 87 ab 54 4a 5b c4 c2 | 57 bd 4e a5 0a 4c 3d fe 53 4b 65 c4 64 95 29 91 | 29 00 00 24 c8 7c cd e0 b2 c0 7c bc b4 0e 89 92 | 98 cf b4 cf 69 f0 3f 2f 7e 50 0c 76 dd c6 f5 df | 0c da 14 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b d4 72 88 ba f6 c3 75 62 5e 72 62 | 65 f9 8a 24 3d dc 56 74 00 00 00 1c 00 00 40 05 | 54 09 d9 d9 07 67 4c aa 17 b3 39 aa 94 51 7e e0 | 9c 0e 3e 5d | libevent_free: release ptr-libevent@0x7fb34805e9d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348012890 | #566 spent 0.0682 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #566 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3700407b0 | handling event EVENT_RETRANSMIT for parent state #525 | start processing: state #525 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #525 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #525 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #525 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.23046; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.926139 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348012890 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #525 | libevent_malloc: new ptr-libevent@0x7fb34805e9d0 size 128 "road-eastnet-nonat-80" #525: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #525) | aa 0a 50 f6 eb 80 0b d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa f9 a3 5a f1 06 e3 d8 4a 74 cc cb 91 5d 3f e1 | 21 df 1c 09 20 b5 fa b8 68 99 55 2e 9c f7 c4 26 | 2d 13 5e 73 62 28 0d 5d 1b 19 61 40 3e eb 12 46 | d1 3e 37 e2 36 63 3a 09 94 77 c0 7e 6c 49 5a 1c | 2a 84 ad 4d a2 2e 20 e1 b3 d6 0e 28 0c 73 33 56 | 98 ce 6a 84 5e dd ad 70 fc 04 0c c9 ba 63 4e a9 | 26 10 ce 94 47 dd ed 32 a8 e2 94 aa 02 0d 68 a7 | 46 c0 e1 ca 9b 37 10 05 10 43 ac 26 3c df ae af | 84 82 12 69 3c a5 a9 a4 da 4e 39 e7 22 d4 22 45 | 35 cb 06 64 36 de 60 0f 82 92 bc c7 8f dd a7 83 | 9c e0 b6 87 e5 ac 79 26 3e f5 8d 2d cd 1a bc 53 | c2 a7 57 2e 12 39 97 28 1d a6 53 fc 44 99 8d cf | 75 73 64 e4 87 c5 c3 cd d3 07 30 22 82 04 3f 75 | fc 56 ce 51 6d 2a 4c a6 f0 62 cd cf f7 11 c5 31 | 55 34 34 06 69 e6 6c 30 96 c7 a2 0e e6 93 d4 86 | 21 15 7c aa ca 54 c4 d5 3d 13 a0 9d ed ce c0 b7 | 29 00 00 24 2f 02 54 75 b3 a1 a2 a3 49 b6 96 0f | 9b 0f 28 8f 5d 43 f2 88 27 e5 88 4f 55 a3 28 fe | cd 5e 6c d1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5d 92 6e 19 fc 80 58 4d ee 5f a9 8d | 60 2e f6 39 2c 8f 9a a2 00 00 00 1c 00 00 40 05 | d9 3c 3f 56 aa 0d 1b ab 4e ad 62 3c 67 74 fc 7e | 8b 17 e3 b0 | libevent_free: release ptr-libevent@0x7fb35c069bc0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3700407b0 | #525 spent 0.0696 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #525 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #640 | start processing: state #640 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #640 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #640 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #640 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.230537; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.964054 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3700407b0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #640 | libevent_malloc: new ptr-libevent@0x7fb35c069bc0 size 128 "road-eastnet-nonat-200" #640: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #640) | f6 a6 42 61 47 27 64 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 80 42 6e d7 7a 98 1b e7 63 e1 2e 09 63 bd 4b | 42 e8 81 2f 40 d2 71 01 4a dc 7a af 17 d1 73 0a | 05 3b 3a ce b3 5d 7f 07 44 b9 ac 40 bd 6f 70 e0 | 38 56 e8 ab be 45 c9 63 98 bc 74 58 74 89 72 8a | 13 32 c2 ca 9d 72 be 69 88 7f a2 d0 28 52 16 b0 | 31 15 8e 9f e5 63 61 e6 1c 3b 95 d5 65 9e 4a fe | 1d 24 21 96 2c 5c 93 59 10 e8 5a a8 85 f0 10 e7 | 2b 45 5a 9a c7 e2 d8 dd cf ae 48 a2 5b 7d d5 31 | 5b 11 70 8a 8c fd 1e 06 e6 9d f7 60 5a ec 36 27 | de b1 f3 c3 0b 31 8f ba 37 d6 eb 27 bb 08 95 f5 | 50 60 61 71 06 90 ab 76 57 63 08 97 67 3d 78 5e | cd 6f 6c 41 fc b6 78 36 36 0e ed 0d 70 0b 31 b2 | fa dd a9 a2 95 f8 f1 ba 5b 88 71 81 da 2c 38 d3 | ad 78 62 1e ef 32 b4 3f 99 ce e3 5b 67 a3 08 06 | ca c6 2b 08 09 1b 2a 0e 74 6f e2 ad 35 3b fe 99 | 10 20 b2 e9 6c e4 a0 0e d2 0a d9 68 bf 4e 9b 89 | 29 00 00 24 55 c2 55 4a 4f 3a 0d 38 f2 68 61 3a | 55 3a 39 15 fe 86 62 ee bc 23 58 c2 1a 6c b1 1b | 30 e0 3a 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 47 0f 0c 07 b2 8c 99 66 34 29 66 | 06 93 b3 bc 11 9f 8e 62 00 00 00 1c 00 00 40 05 | 2b 37 ed c1 9f 60 69 a1 71 7c 68 0d 9b ee 86 23 | 55 71 c1 26 | libevent_free: release ptr-libevent@0x7fb384070f20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | #640 spent 0.0697 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #640 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a90400 | handling event EVENT_RETRANSMIT for parent state #639 | start processing: state #639 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #639 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #639 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #639 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.230615; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.963166 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #639 | libevent_malloc: new ptr-libevent@0x7fb384070f20 size 128 "road-eastnet-nonat-214" #639: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #639) | ff 19 a0 3d 97 93 39 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 19 0c 9d e5 77 b8 48 36 e4 03 9e c4 1d f2 2d 78 | 44 4c 26 98 f8 6b ee 0b af 31 99 e7 1c 61 bb d4 | d7 1b 9a 20 07 ba 04 17 60 e8 fd 18 10 87 29 2c | 24 f7 67 ce 57 34 ab 29 f5 cc ea d7 c2 95 67 49 | 24 4d 53 fb 24 ca da 47 20 a9 a9 bc c8 65 7a 7b | 44 61 86 68 8a ae f2 ac f8 44 ae 53 96 4e 13 15 | f8 a1 33 b4 cf f2 c1 fa c8 17 74 56 43 9e ef ec | f3 87 44 4e 55 d5 0d a6 d3 56 28 83 eb d0 c0 d4 | 3a 2e fd c3 dd 99 de 47 36 b1 e7 13 b8 7e f2 cd | a7 06 b3 ea 1c 8a 6d d9 b0 1f 66 79 19 09 77 e8 | 7d 50 d8 1c b7 8e b4 d3 82 80 b4 5c 9f c3 d3 38 | 28 2d fd c5 5f 8b c4 22 9d f7 e9 ac 69 9d a2 7b | 6e b5 3a ed 4f 1a 08 7f f6 b1 69 48 bc 68 e4 78 | 10 5b 4b 02 21 b2 70 8c 4e 7e b7 69 85 f2 7c eb | aa 75 d3 5c 7d a4 3d 7f 18 fd d4 8b 50 8e 47 6d | 12 6e b8 f7 e4 81 64 1a 6f f3 91 ac e6 c8 bf 94 | 29 00 00 24 0a 0d 9f 0a 63 a4 e0 f2 1d d8 95 0c | ba e4 b7 d7 a4 51 17 93 28 8e f1 0a c8 8c 2b 76 | 37 dd 06 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 9a d0 b6 2b 5a c4 fc 72 66 76 9a | 94 bf 3e ef ac e5 25 66 00 00 00 1c 00 00 40 05 | b8 15 7d 61 0d 1b 19 22 14 f1 b2 86 2c 56 e5 70 | 99 3e 7d f1 | libevent_free: release ptr-libevent@0x7fb35c07a360 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90400 | #639 spent 0.0681 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #639 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a1c490 | handling event EVENT_RETRANSMIT for parent state #720 | start processing: state #720 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #720 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #720 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #720 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.230693; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.015937 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90400 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #720 | libevent_malloc: new ptr-libevent@0x7fb35c07a360 size 128 "road-eastnet-nonat-182" #720: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #720) | 2e 33 4d 73 be a7 0e 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed ab c5 2c c2 f4 74 ef c7 ee 30 67 5e 1c da 49 | 70 61 7e 4d 8d 32 5f 3e 9a ec c2 40 33 9c 3f 67 | af 3f 5c 83 67 1b 79 9e b7 b7 35 73 56 5b 8c 3b | 0a 1a 2e 82 5d 65 28 71 9b 14 bc 2f fa 09 67 19 | b2 66 da 04 38 29 ad e2 f1 65 50 23 4d 85 d5 08 | 9a 79 76 49 46 a5 ea 67 8b 56 2d 01 fc 5a ed 64 | 0b 12 a4 dd e9 5f 18 7a eb a7 15 69 ee 95 e8 d9 | 56 b2 86 02 b9 aa db 6a f8 94 26 91 52 0c 14 ef | 19 10 c0 eb 0d 10 8b 4f 19 f6 79 a9 16 1e 94 36 | 09 fb 5c 76 4e b9 0e 65 a7 28 d3 fb 8e dd 96 92 | 1b 73 43 c6 61 e3 03 3c 0e 78 5b c1 2b aa 38 be | 19 84 9e 8e ff b7 65 35 2e 65 78 b8 fe ae d6 cc | 05 c7 08 1c 26 02 90 02 f3 16 d5 8a d5 33 30 16 | 63 1d e2 87 4f 85 13 e7 cf 51 84 57 b6 4d 0b d7 | ad f3 bf 57 f0 ee 36 2a 5d 91 a2 8b 76 c7 7f 4d | 7b 7f 59 64 bb c0 6d 44 32 b3 fa 20 34 ab 07 c4 | 29 00 00 24 b4 27 97 52 66 73 6d 63 e4 fb b7 f1 | ce d3 ed e9 19 97 52 e1 e0 b1 81 d7 52 28 6b 0c | 38 64 19 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 f0 ee 60 72 ed 8f f1 ea b8 ad 81 | a1 9e 54 4c fd ed 06 17 00 00 00 1c 00 00 40 05 | 50 b7 67 3d 54 be ef de 2d a1 bf 2b 46 e3 89 aa | 52 77 9e 8d | libevent_free: release ptr-libevent@0x7fb36406f9a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c490 | #720 spent 0.0687 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #720 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c03b100 | handling event EVENT_RETRANSMIT for parent state #602 | start processing: state #602 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #602 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #602 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #602 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.23077; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.974842 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c490 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #602 | libevent_malloc: new ptr-libevent@0x7fb36406f9a0 size 128 "road-eastnet-nonat-93" #602: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #602) | 1c 14 c0 8f 0f 45 46 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 8c 23 15 6d dd 8c f8 78 a6 e7 34 f8 f8 0d e8 | 99 69 99 32 7f b5 b1 1a 6e da d3 b0 b9 7c e5 6a | 90 1d 3f f0 2f 1f 8d c8 1e 97 79 0b 55 c9 08 97 | 7f db 99 9b a0 da 7f 34 8d ab 5f 4b 73 b6 eb 55 | ea b1 50 2f e5 f4 17 86 c9 0b 4a 01 40 9a 9a 4d | 73 05 29 c2 d1 6e 3d 1b 47 e9 f1 d8 3b a4 6c 31 | 0e f0 a8 d8 a1 46 2c 0e ca 2a 6e f9 4f d7 8c 76 | 9e 40 ea a6 3f 5f 17 17 a4 a8 fc ae 89 af 6d f1 | b3 45 8c 83 c6 8d a4 54 5a e0 e6 e7 89 ee b4 12 | 45 f6 b8 c2 94 e3 93 01 1e e6 9f b8 c4 95 33 5e | a2 9c 98 2d 5d 32 90 4e 65 40 c0 d0 7c bc 64 79 | d3 d5 64 07 12 ee 32 ea f1 d4 a2 dc 98 b8 b6 2e | 62 34 35 b4 dc 05 df 63 05 49 b3 40 af 75 cf e4 | bf 5e 46 dd df 34 a2 34 68 31 94 44 1b bf 50 ac | 43 cc 20 b0 de e5 d9 e2 b0 84 60 50 34 9f 14 06 | 39 c9 a8 b8 00 99 c9 35 60 cc 65 3c 94 49 b6 88 | 29 00 00 24 83 64 aa aa cc 6d 3f 6f 34 ae 10 39 | 1c a1 82 b7 e0 19 c5 ec 38 88 da 2f ce 97 9a 5c | 92 c8 61 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 77 b9 52 2d cf 04 de dd b2 81 99 | 39 e3 1b 7a 92 b3 36 9d 00 00 00 1c 00 00 40 05 | d6 0f f4 51 34 80 da 92 17 c4 6a c3 ee d2 99 01 | a8 7b c9 18 | libevent_free: release ptr-libevent@0x7fb35c056950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c03b100 | #602 spent 0.0703 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #602 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358012630 | handling event EVENT_RETRANSMIT for parent state #633 | start processing: state #633 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #633 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #633 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #633 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.230859; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.963902 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c03b100 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #633 | libevent_malloc: new ptr-libevent@0x7fb35c056950 size 128 "road-eastnet-nonat-72" #633: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #633) | 8a 84 ad af 01 bc 2c c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 25 a4 2a 19 32 bd a1 aa 5d f2 a6 fc 02 2e d5 | 33 ef 4f d1 9c ba fd 65 26 89 b0 76 98 b1 0a 73 | 0b 6d cf 55 32 b0 a8 c3 0d ed 7f 57 3e c4 09 bf | 8e 3e 0d 52 2e 51 26 3d 83 ba 75 87 bf d4 84 39 | a3 f5 4f e1 81 37 40 32 c2 92 5c 7d cd 5a 01 0d | 89 3e 2b dc 37 3d ff de 20 7a cf 8d ba 1e bf 39 | 3f 0b 59 4c 6d 53 3d 85 05 4f cb 7e 6f ec 84 0e | 3b 89 0d 17 39 96 b1 02 d7 7f ec 25 df 6e 69 98 | c8 c3 02 da a9 fd 5f ba 17 59 e0 f1 d0 67 1c 1e | 0e 5d 3a 2a 95 01 f3 4d 4f 33 98 c7 f4 d2 19 43 | 9b 8e 04 5a 6e 98 a7 91 3d c3 66 01 66 da 39 f1 | eb 10 86 db 4c d5 5d e9 1d ea cb f5 8e 90 23 18 | ed f2 37 09 1a 5d 54 50 41 f5 c4 c4 ca fb 8f 9b | f6 29 c4 e8 d3 47 fd 3d 80 73 a9 55 47 1b bc 7c | 8f b9 ec 7f e6 92 93 61 f4 fb 2e 1c e7 a7 98 52 | 7b b4 1d c6 f1 3d a2 94 00 52 e4 8a 62 1f 4c b8 | 29 00 00 24 89 c4 76 da 63 15 ff 10 2a 9e ce 01 | ec ae 76 ed 0e 33 67 47 23 3b 30 6c 5b 8b fd b9 | a5 68 00 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 70 6c 0c d5 a6 51 1a 4a 89 fd d4 | db 2f 8d 82 0e c5 0a 69 00 00 00 1c 00 00 40 05 | c8 f8 ac 25 9c d4 cc 0a 20 2d 68 79 d5 c6 b3 9a | 28 b4 88 17 | libevent_free: release ptr-libevent@0x7fb35c0a0a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358012630 | #633 spent 0.0789 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #633 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c017ea0 | handling event EVENT_RETRANSMIT for parent state #747 | start processing: state #747 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #747 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #747 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #747 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.230941; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.012783 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358012630 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #747 | libevent_malloc: new ptr-libevent@0x7fb35c0a0a80 size 128 "road-eastnet-nonat-248" #747: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #747) | a6 bf d2 f8 ac 64 24 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a 1f 62 98 e1 72 89 4a 9e 5e 9d f8 09 50 e0 d2 | 9c 18 ca 9e 95 27 4b 63 4a 5a 0f ea 35 ee 0f 6e | 09 6d 2d ee e2 2e 30 c8 5c e6 23 10 bb dd 92 c4 | a1 94 38 18 f7 1a bb b7 fe 7a 6c 77 66 08 c9 a3 | d7 20 9b 83 e3 5e fd c7 c5 b8 d7 cb db 7b 13 a8 | e4 16 a2 a7 f8 77 c7 96 cb c4 f8 c4 e8 5e bc b6 | 11 12 e0 0a e1 e2 98 ca 3c d6 c9 36 5d 1b 6d d8 | ff 68 5a 03 20 ef cc 43 d1 3a 80 e8 6b ca bf 39 | 66 da f5 51 9f dd 65 c6 1b 01 2d cd e7 68 f6 a3 | fc e3 5a 6a e7 8a 74 f2 c5 47 be 6f cb b2 de 7b | 5c ef 73 4e 74 52 3d 7e 7d 97 04 e7 a1 bc 8c 22 | 0b 61 ff ba 39 29 86 ab 04 59 61 fd e9 7a 43 97 | a9 8d dc 37 09 a9 62 1f 96 7a 92 bc 5d 63 69 61 | 33 36 28 54 06 b6 87 43 c9 0d 56 0e 50 ad e6 24 | b5 8c cd 7b ea 80 41 db a4 b3 86 9b c4 b0 37 e4 | a5 6b ef 42 4a f6 29 75 47 2b 95 cd de 0e 06 20 | 29 00 00 24 72 d2 2d f3 46 d8 fb e8 18 14 33 bc | 59 89 85 ec f1 52 25 c8 16 b1 28 1b 77 62 97 7d | df 82 b5 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 63 d7 f3 34 77 99 12 4c 20 15 9c | 7c fd ab a4 f7 0f 03 52 00 00 00 1c 00 00 40 05 | bd ec 71 30 dd 4a a7 e6 ea 65 3f b5 e2 da 2c 35 | bf 9d 55 db | libevent_free: release ptr-libevent@0x7fb35407ff20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c017ea0 | #747 spent 0.0683 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #747 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb33800cc10 | handling event EVENT_RETRANSMIT for parent state #617 | start processing: state #617 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #617 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #617 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #617 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.231019; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.970361 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #617 | libevent_malloc: new ptr-libevent@0x7fb35407ff20 size 128 "road-eastnet-nonat-165" #617: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #617) | a7 ae e8 62 0b 46 de 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 6f 00 02 e7 f5 b4 cb 08 b9 65 4f 47 ef 5a 86 | e5 51 ca 0c 06 cf fd 0b 72 8c 77 7e b4 38 15 8b | 85 87 d6 a6 c5 3f 41 32 55 4b bb 30 5a 6b 55 95 | 76 74 f1 ba 57 cb c3 00 58 3b 41 a8 f4 f2 a2 e7 | 68 ea bf 0e 0e eb 7d 7c 97 24 f0 ec 9c b2 55 b4 | 58 b7 f3 13 c1 89 c2 fb a2 87 ea 86 bf bb c5 33 | 1f ae 16 84 83 00 87 63 36 16 fb 84 22 91 c8 7c | f3 57 cd 36 c5 a3 58 59 44 20 23 41 12 17 51 69 | e0 14 9c 7e ac 9d 23 88 40 7c f8 bc 0c 38 30 cd | 77 b7 88 55 c1 fe a2 53 b7 72 b0 12 95 9b b6 64 | ae 85 af 35 c8 ab 5f a7 cf c7 bf 9a c6 ed 5a 5b | 7a 5d 83 5f 91 52 0f 74 31 d0 db 4a 47 93 a8 88 | 7c 5a 55 e6 2b 80 9e dc f5 58 a8 e9 fc 1a 9c 9a | 4c bb 40 50 e2 70 35 c8 91 ac 99 df 72 58 53 2c | aa 87 b5 1a b6 1a e4 4a 97 dc 1d 01 10 9b 18 a2 | 3b 89 6b 81 0b 44 73 ea c4 f2 cc 33 56 05 5e 54 | 29 00 00 24 f7 8e 9a 0f 2e 84 4c 49 d4 15 90 c6 | 2a 84 51 f1 f7 2c e6 95 75 a4 8d 77 80 5c ad 8d | d1 b6 c5 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 1c f0 18 4c 40 28 e4 7a 14 a6 c5 | b5 d9 19 b3 dc 75 08 d7 00 00 00 1c 00 00 40 05 | 6e 38 75 f1 87 66 04 34 0d e9 7f d7 db 67 24 31 | c8 3b de 05 | libevent_free: release ptr-libevent@0x7fb37805e790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800cc10 | #617 spent 0.0726 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #617 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a70b10 | handling event EVENT_RETRANSMIT for parent state #691 | start processing: state #691 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #691 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #691 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #691 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.231101; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.99557 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #691 | libevent_malloc: new ptr-libevent@0x7fb37805e790 size 128 "road-eastnet-nonat-191" #691: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #691) | a9 9e 25 20 86 2a 5c 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 cc 4c ba 30 5c 6d 22 f8 82 c6 c0 8b 58 68 0c | 41 77 59 e0 2a af ff af d4 c1 41 cf 51 4a d3 e1 | 69 aa 30 d2 ed c6 c8 af 8b 3b 34 93 40 fa af 54 | 65 66 11 b2 ea ba 9d 66 6a 5a ef a5 37 12 11 a4 | d3 21 d0 69 7b e5 a1 d7 98 b5 f2 36 e1 00 9b 73 | 88 b5 57 a0 86 7c 2b 56 bc dd 7a 01 0a bc 7a c4 | 2c ad c5 8b 82 0a e6 1a c3 ec 8b 0c 66 1b 4c be | b1 76 b6 01 cd 33 2d 70 ab da 87 4d 5a 37 a3 30 | dd a8 b4 78 ad 30 76 5b 99 96 17 20 94 4a 1e ca | d4 40 82 a5 98 84 48 26 0c d9 76 15 4d af 29 c8 | b0 a4 e1 44 dc ac ff b7 ac 4a 18 e6 fc e7 a5 b6 | 38 f8 54 c8 63 11 e6 a6 35 0d a1 81 5f 34 c8 dc | 36 f2 0f de c7 04 d3 89 04 e3 b8 e2 42 51 11 b0 | e6 10 f4 77 1f be e8 81 80 19 27 1e 32 ff 6a d3 | 0d 11 66 8a 3a fc 43 14 97 86 65 03 41 1b 4f aa | 60 d5 5e c1 3c ab bd c7 a5 60 2a 06 6e f7 8b 5a | 29 00 00 24 d9 82 2d dc 7a db 9b 9e ba 51 3f f5 | 55 9b ca 46 49 e9 e1 bd e8 b3 c4 b1 15 49 3d a1 | c4 aa 80 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 10 f7 93 cc 33 bf de b8 46 14 d4 | f1 7c bb ef cf 7a 14 b3 00 00 00 1c 00 00 40 05 | 40 bb bb e0 02 00 28 d6 b3 fd 9b cd 5e 9e 97 d3 | 8a 95 58 8d | libevent_free: release ptr-libevent@0x7fb3600778c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b10 | #691 spent 0.0701 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #691 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350014cc0 | handling event EVENT_RETRANSMIT for parent state #664 | start processing: state #664 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #664 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #664 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #664 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.231179; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.977111 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #664 | libevent_malloc: new ptr-libevent@0x7fb3600778c0 size 128 "road-eastnet-nonat-123" #664: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #664) | 9a a8 29 98 c3 de 5a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a d8 e3 37 12 b2 ef d1 da f8 45 1f e4 d1 c2 83 | bd a0 b4 7d 46 7a 1d 21 e7 39 76 71 00 55 ce 6f | f0 be cb 41 93 48 b1 e6 9b a0 dc 26 bf 39 0e 5e | e2 b9 8f 3d 51 d2 55 33 8b 98 1f 57 b7 08 6b 49 | 47 a3 42 1c c7 26 45 fd 43 8f 8a e4 32 11 da b4 | 60 41 cc d6 cb 7c cf 3c cf 62 25 19 cb 5f 50 b0 | 66 1f 87 29 8a 25 50 d2 76 81 60 2d c0 1a fa e4 | 44 6f 51 82 a1 8e 22 65 3d c7 77 00 d7 5d 66 3b | 34 e2 14 f5 00 89 95 83 41 4f 2f 17 fd 8a d0 82 | f4 75 70 eb 12 8d 3f e0 49 82 73 ea 26 fb 10 63 | 49 47 94 a5 80 94 4f 74 c7 e2 49 81 51 fe 91 b7 | ae a2 9c 0f 74 e3 9e 7c d9 1b 46 f6 50 85 9b 34 | 44 96 a8 da 7c 30 fa 27 4e 96 53 c6 da 8d 0b 8d | cd 2a 37 df f6 0b 7f d5 79 cf a5 8a 18 bf 15 d7 | 2b 16 dc 57 cd 3e 9a b4 b1 6c bf 76 41 2e dd 85 | 20 be 9a b5 82 7e bd 21 3e d7 a0 f1 0d c4 17 21 | 29 00 00 24 8d 10 93 7b d2 8b c4 8f 3e a4 09 2d | 41 e1 82 de 20 3b ef 97 ec 41 fd bf 52 be eb a2 | 8c 94 3b 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 9d a1 e9 3f f2 d8 36 8a db 54 8a | 88 a2 97 6f 50 ce f2 f2 00 00 00 1c 00 00 40 05 | 52 96 33 a1 e3 08 31 cd ae c8 55 ef af 0a fa 55 | 48 74 e2 3c | libevent_free: release ptr-libevent@0x7fb36806a2e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350014cc0 | #664 spent 0.0699 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #664 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c044df0 | handling event EVENT_RETRANSMIT for parent state #645 | start processing: state #645 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #645 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #645 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #645 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.231257; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.974391 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350014cc0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #645 | libevent_malloc: new ptr-libevent@0x7fb36806a2e0 size 128 "road-eastnet-nonat-159" #645: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #645) | 0c 20 e9 c8 f1 ce 0d 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 8a 31 6e 84 8e ee 47 80 28 3e f7 bd 66 21 ae | a7 c9 66 e4 9c 35 61 f1 16 0f 1c cb 4f 8c 10 bf | 6e 35 2d be 88 b3 9e db c6 d4 0b 4b 1b d6 0f 24 | 0a 6c 6d be b6 de bc 90 ef 4c db b4 25 2b dc 87 | 6c 61 9d 02 4b ca cb c9 34 ad 89 73 4a df 91 ac | 37 e5 30 b7 38 08 c4 2c f4 c1 86 fe 1b b2 22 0b | ce d5 26 69 30 72 a1 b3 13 e0 7e 3f 95 c8 13 b6 | b2 52 42 87 85 da fd 89 fa ba 74 99 7e b0 e8 a5 | d9 b4 d7 c1 b8 d7 f9 52 8c 9d dd 2b fb 3e 32 c1 | 2a f7 f7 b1 ed 12 09 66 4c 2e 36 a5 31 5d 4c 2b | dd 02 ec 82 7d 54 39 7e 27 68 b2 8f ba 6c 9c 64 | e4 b1 54 a4 a9 83 73 da 3c f1 13 e7 c4 83 f9 34 | 4e 29 e4 9b 2c 98 6b 6d 2d 9b 19 b8 a0 13 da 3a | a2 7b d4 a1 cd 5e e2 80 01 c5 9e 85 09 f9 cc 94 | 06 6d 1b 4d b0 af 7d d7 8a af 03 99 b8 54 31 fd | 25 b5 36 4d e2 31 2f 3f 37 34 3b 6c c1 28 54 50 | 29 00 00 24 ea 84 61 f6 e2 d9 2b 57 d4 d8 53 44 | 1c d8 bc 14 a4 bf f6 76 ae 29 c0 89 c3 03 25 b0 | 65 0c c5 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0d bc 72 fe 0b 7e b4 5c e5 5d 2f 13 | cc b7 37 44 34 e3 88 7a 00 00 00 1c 00 00 40 05 | bf 80 a0 4f d4 d4 cc 7e 5e 5a ae 95 22 cc 4e 94 | a3 26 fc 44 | libevent_free: release ptr-libevent@0x7fb34c064430 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c044df0 | #645 spent 0.0677 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #645 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36402f780 | handling event EVENT_RETRANSMIT for parent state #562 | start processing: state #562 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #562 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #562 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #562 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.231333; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.934095 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c044df0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #562 | libevent_malloc: new ptr-libevent@0x7fb34c064430 size 128 "road-eastnet-nonat-57" #562: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #562) | d4 5a 4f 23 43 95 38 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 21 4a 80 72 e7 1e ab e4 a4 cc 6f ae 76 b4 17 | 66 86 d6 e9 31 54 d5 5a 28 1c 74 da 50 fb 86 f4 | 2e 76 50 d3 0d b0 af 0a dd f4 b7 13 30 20 64 87 | f2 f8 f7 5e 86 a8 52 97 05 ae 0d 56 79 b8 88 83 | df 4b 38 d8 fd 5a 52 6b 17 d7 11 45 fc b9 a4 96 | 35 56 c5 1b 74 b1 b1 3b 01 57 7f e0 6d fc 5d 6c | 21 86 9a 44 ea 45 b1 a1 05 01 3c 3a 83 6c a3 ec | 26 13 36 21 83 8a a9 26 0b 6b e0 0b 90 3b db 09 | 26 5d d6 57 a5 f5 d7 1c 5a ce 92 a1 4d 1b 39 ba | fe d1 57 2e c6 1d 0e d3 ee b4 63 0d c8 a5 b3 10 | 07 e3 b7 03 07 bc 65 1b bf b5 ed eb eb 53 36 51 | 4a 60 85 66 ce 2a ad 64 2e 22 1f f5 c7 e8 ab 8b | 56 4d 1b 92 82 89 69 60 5a 9e d6 65 67 5b 25 d6 | b0 fc eb ed e9 a5 d6 c8 1d 10 b2 22 0e 91 e4 cc | 73 60 02 ba 62 2c 96 2c 46 34 20 da c9 7c 01 9a | b8 13 b1 fa b1 0b 0a 18 a3 97 42 e9 48 2a 9a d0 | 29 00 00 24 95 d0 5a 24 13 c9 df 14 0f 8d ab 25 | 8b d1 7e e3 e1 dc 1c 56 c1 ea 4c 91 e9 f7 07 4a | 89 49 ff 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 58 19 cf a0 1f 48 f9 3e 3b 37 57 | fe 6c 89 3e e8 fd 27 9e 00 00 00 1c 00 00 40 05 | 73 2a d5 98 9e 00 e7 3f e4 c4 a7 88 fa 3d 90 0b | ae 11 e9 36 | libevent_free: release ptr-libevent@0x7fb364059ad0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36402f780 | #562 spent 0.0693 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #562 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35400d120 | handling event EVENT_RETRANSMIT for parent state #654 | start processing: state #654 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #654 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #654 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #654 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.23141; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.969527 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36402f780 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #654 | libevent_malloc: new ptr-libevent@0x7fb364059ad0 size 128 "road-eastnet-nonat-112" #654: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #654) | 5e ee 0b 7f 6c a7 3a d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 66 e0 d6 d9 72 ba 46 dd 41 a1 46 b3 25 74 d2 | be 07 06 6c f4 38 9a a1 39 17 cd 0b c4 41 e6 86 | ab 2b bd 9b 4e 50 c3 68 a9 fd 5d 77 07 79 12 d7 | 06 ad c7 3b 19 6e 8f 00 bd 88 b3 27 81 06 f1 46 | b7 d7 a4 24 f6 8a 13 f3 63 a6 44 01 04 ef fd 32 | 85 cb bb e9 d7 ec f5 ec 83 a6 6e d9 b1 33 b3 d5 | d8 12 93 9e 27 25 43 b4 f4 9d 5a 4e 0d cb 7f c7 | ad a0 26 f4 7f 25 7c d9 9a ca 52 6e 2d 83 33 d3 | 5b 0c 44 4d 72 d8 0d c3 65 63 57 17 10 5e 19 0d | 88 04 84 34 7e 42 22 cf c0 6f 9d 86 b6 ed ec 5f | 38 0f 13 28 f6 f9 d2 d2 9a ad 59 58 25 e5 63 dd | e3 7b 38 03 55 37 74 26 61 f2 62 84 61 8e c1 fd | 89 ae b9 7c 2a 19 e2 22 2f b0 2c c7 27 de 4f cb | fd 3c f5 3f fd dd 17 5e 7f 7a 64 3f d9 af d0 1d | f0 55 35 5d d7 34 3d 74 24 8b 4f 0e 99 f6 c3 2d | 66 87 8b da e2 d5 ca 1a 2a 24 b1 4b 3d ff 64 ec | 29 00 00 24 97 bb 4a bf d9 e5 95 75 3b a3 86 b3 | f1 af 1a 0c 45 88 7e 17 0a 91 a5 72 56 0e fd 8c | e1 a9 d3 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e 88 f8 b3 f2 90 3f 3b ff 2b 5c 52 | 75 9a 83 d7 14 17 86 77 00 00 00 1c 00 00 40 05 | 2e 13 0c e6 eb 5b 95 e2 c9 2a b6 07 89 5a 9a 41 | 93 58 82 e2 | libevent_free: release ptr-libevent@0x7fb38406b790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400d120 | #654 spent 0.0693 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #654 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad8480 | handling event EVENT_RETRANSMIT for parent state #742 | start processing: state #742 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #742 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #742 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #742 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.231488; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.010261 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #742 | libevent_malloc: new ptr-libevent@0x7fb38406b790 size 128 "road-eastnet-nonat-202" #742: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #742) | ab 34 f4 95 81 ed c2 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f7 98 46 2a 24 70 ac 92 50 50 f4 c2 b5 d5 f7 0a | d6 9e b1 7a 3e ed 98 33 3d ee f7 e3 13 87 69 c1 | b4 a2 57 16 53 d7 41 79 86 3b 2e a4 e6 52 7a 6e | 0b 74 58 0e 45 35 85 36 77 6b b0 71 9d 4d a2 91 | 8f b5 9e 28 e8 62 a3 5a fa 45 28 9c d1 6e 96 06 | 43 8c 31 83 80 4b 1a d0 1a 86 ab ce 70 87 d8 60 | 2f 53 50 9f 1c f0 aa 40 e7 82 42 00 ef ac c6 cd | 59 7e ba 8e d2 08 a8 07 ab e8 d4 09 1a 34 ae b7 | 19 6a 93 47 39 54 0e c1 ff ba c1 49 16 e9 84 6d | e4 d4 28 20 7f bb 1c 5a 50 ad ff 27 bb 53 3a 4c | fe f2 c6 66 38 c9 62 25 57 6b 7d ae 6f 82 66 61 | 8d 1d 48 cd 44 50 c2 df 28 86 79 e8 45 6e a1 90 | 4c 22 91 9e dc b2 7e 6c 6c e6 a2 de 0a 17 03 3b | bc 26 ef 26 39 74 28 83 5b 3a fc 73 ca d0 c6 57 | 8a 02 2c 0e 18 5b 99 8c aa fa 43 b4 a9 f7 75 31 | 51 42 a8 eb be 2e 35 d9 44 1d 6b bc c5 2f 8c 87 | 29 00 00 24 01 dd 2f e6 eb 4b af 32 1c 79 d4 4c | 09 c2 78 82 23 70 b2 bb 85 ac f9 94 71 a9 92 05 | d7 ca 31 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 97 94 2c 62 c6 59 3e 48 9c 81 ce | 06 c1 b8 e1 6f 64 53 c0 00 00 00 1c 00 00 40 05 | 6e fc 22 43 8c 0a 59 5f b4 df 17 9d e0 72 a9 ba | 64 42 3f 26 | libevent_free: release ptr-libevent@0x7fb3680752a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad8480 | #742 spent 0.0682 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #742 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a54250 | handling event EVENT_RETRANSMIT for parent state #726 | start processing: state #726 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #726 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #726 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #726 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.231568; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.010707 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad8480 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #726 | libevent_malloc: new ptr-libevent@0x7fb3680752a0 size 128 "road-eastnet-nonat-199" #726: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #726) | 0c d9 0f fe b0 de fb 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba 5a 03 41 cc a5 fd 1a 49 8c 1f 01 a4 d7 6f 42 | 4b 04 b3 65 c6 04 c6 d7 7b 8c 73 c5 64 a3 11 05 | db ca 95 5a c3 b5 81 cc 3c e0 e0 10 f0 ff 7e 0b | ed f4 ad e5 9b 37 9a a2 23 4c 84 01 ff 22 3f 36 | 71 71 f2 27 6b 0d e0 3f f7 18 a7 11 1f 03 8b fc | 68 47 d9 20 6d ba a0 e4 3e 38 1d 24 82 8d dd ed | f0 f3 ff bb 45 10 55 de 96 c4 67 c7 c0 4e b6 ff | ff fa 6c 42 29 12 cb 76 59 82 15 5d 1c 3f 19 0a | 04 84 40 90 fa 20 d9 8c 32 64 bd 98 62 52 e2 03 | bf fb 12 3f 70 5a 23 2e b6 a0 1e da 62 5c 54 65 | 28 94 12 c3 ff c8 58 af b7 92 ff e0 c9 41 fa a6 | f7 68 bf dc c3 be e7 16 3d 20 d2 d0 0c 4d 6b 0f | f1 85 f8 60 c2 47 89 cc 68 3e 26 98 33 a2 77 d0 | d7 d8 d6 c2 eb 37 9e b4 c7 a1 fa b6 a2 06 85 67 | 8a 85 66 84 52 40 0f 08 d5 73 dd 84 59 ba e4 3b | 8d 2f d0 0b 1e 56 e6 0a e8 13 8c bc e0 02 15 0f | 29 00 00 24 5f db 23 af 71 bf 0d 40 27 c3 a7 aa | e9 98 98 31 72 a3 0b fe 84 2c 87 3c 00 39 ba 62 | 98 9c 34 f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 67 ba 9f db 5b 15 ef 4c c9 2a 37 4d | f7 85 c9 a1 4c f4 99 05 00 00 00 1c 00 00 40 05 | 17 ee f7 ed 41 32 9d a2 b1 d3 43 b7 8c 71 7a 66 | 24 14 bd f6 | libevent_free: release ptr-libevent@0x7fb34c06f420 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a54250 | #726 spent 0.0706 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #726 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36001d710 | handling event EVENT_RETRANSMIT for parent state #622 | start processing: state #622 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #622 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #622 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #622 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.231644; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.981472 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a54250 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #622 | libevent_malloc: new ptr-libevent@0x7fb34c06f420 size 128 "road-eastnet-nonat-61" #622: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #622) | da 49 0a b3 65 ff 08 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 40 36 95 be 60 b3 e3 bd c7 ff 07 f3 83 00 12 | f5 6b 10 33 d3 d9 c4 b0 f6 be da 2b b1 9a 19 58 | 53 f9 8a 25 29 6a 79 82 da bb c2 fa 2c 51 78 6d | 66 2a 05 15 73 a7 b9 3e 1c 83 37 33 e7 f7 71 62 | 0c 9f 57 2f 7a c5 28 95 89 0c 4b d7 6a d0 b7 1b | 21 80 5c 28 7f 9a a4 6d ba 32 aa b8 62 c1 be b9 | 1e 50 93 7f bf 93 50 c9 41 bb 39 b6 d1 bb 95 dd | b2 a0 84 34 30 54 a8 a6 c8 5e f7 42 75 7c 55 3c | 9b ca c8 19 68 29 d0 62 32 30 2c 1d 35 db 78 87 | 06 dd 80 a1 55 b4 92 13 11 a1 52 06 d8 bf c1 d8 | 08 60 a4 8b 01 50 1c e7 e4 f4 33 ec e2 10 21 b6 | 14 e9 ff ce 64 51 80 1d e6 ab 36 5b 4f 73 34 4e | 32 2c 17 88 eb c6 5b 95 51 4b 06 b8 67 86 d4 7f | 6b d4 4d e7 eb 69 82 a6 9b 31 6c fc ae 3a 4b 50 | 0a 0b c3 8d 90 55 90 09 c4 39 73 b7 de f4 8c f8 | 43 4b 1b 65 eb 39 32 5c b3 32 de f7 b4 b6 0d 03 | 29 00 00 24 e8 a4 b1 28 90 aa fa fa 7e c7 b0 2c | 81 71 e5 06 ca 8a b3 bc 3e d2 88 e6 58 e0 15 d7 | 2d 90 46 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 48 cd a5 f1 0b 32 76 b4 1e a7 ed | c8 11 a6 bd 54 4b 50 5e 00 00 00 1c 00 00 40 05 | bc ba d4 87 d8 ff 76 ca 98 8e bd 6e 57 4f 18 d4 | 50 09 94 f7 | libevent_free: release ptr-libevent@0x7fb360059710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36001d710 | #622 spent 0.0691 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #622 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7cf50 | handling event EVENT_RETRANSMIT for parent state #733 | start processing: state #733 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #733 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #733 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #733 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.231721; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.007557 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36001d710 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #733 | libevent_malloc: new ptr-libevent@0x7fb360059710 size 128 "road-eastnet-nonat-220" #733: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #733) | c0 b4 40 a7 90 2d ff 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 3d 1c 6b d8 c6 0e 19 a3 7b 9f 82 56 a2 60 d8 | ed c3 69 a1 b8 27 54 67 fa 08 0b 9c 2f df a1 84 | a3 ea 36 06 89 65 b4 8a 8b b1 53 43 55 1c 2d 9c | 45 3c 53 4e 14 b2 1b 7c 54 9f cf 33 2b d7 a1 7f | b2 02 42 3d c7 e2 52 e4 03 b6 91 b3 0a 4b 65 e3 | 2d 56 d1 33 02 80 68 64 bf e9 65 5e 1c 3c 0e 4e | 38 e8 a0 52 6d 84 dc 3a 40 77 a2 99 57 22 be f9 | 21 b5 b9 99 7a 73 41 8f bf c0 86 4e a6 c0 45 d1 | 82 aa e5 df 8b fa 84 00 fe f2 93 c1 f7 20 82 cd | fb 46 94 df db 19 f0 51 0e 9a 5a 9e 48 37 67 ac | 46 6d e7 b4 4d 86 4b 1e 9e 7b d3 75 96 a3 a2 a6 | 2f a5 5d c9 1a f7 81 bf 8c c3 9a 0d 30 20 4a 43 | e0 86 4e 21 5d 25 a1 95 77 9e fb 93 fd 1b 22 6c | d4 f7 f2 14 a8 af 6c 58 ec c1 bb 6c 8a db 27 a0 | e6 7f 0c 48 39 29 47 c2 4d e2 32 e9 73 91 20 fe | 20 a5 dd 53 0f 69 f5 d6 ac 97 fa 75 83 38 83 1b | 29 00 00 24 38 98 a0 0a e9 5b ce bb 7c 0c e3 8b | 78 bd d8 2c 72 cb ed 4b ee c0 17 92 29 bf 4c 66 | 8b 54 88 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 90 59 ab 91 26 aa 5f b9 4e 61 e7 | ac 87 e3 ab ff 33 ec 91 00 00 00 1c 00 00 40 05 | ba 8b 12 fb af ac eb b8 53 0c d2 71 52 5e 48 aa | 61 61 f1 39 | libevent_free: release ptr-libevent@0x7fb340066bd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf50 | #733 spent 0.0692 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #733 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb360012bf0 | handling event EVENT_RETRANSMIT for parent state #563 | start processing: state #563 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #563 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #563 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #563 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.231799; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.937617 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf50 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #563 | libevent_malloc: new ptr-libevent@0x7fb340066bd0 size 128 "road-eastnet-nonat-40" #563: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #563) | 36 fd bc 41 27 9a 18 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 f7 f9 df fc 24 98 94 50 1f 5b ee 02 6b 2b 08 | 88 ea bb 4c fc 6f 81 4e 18 49 00 df e1 e9 2e 32 | 12 86 87 5d ed 60 5b 39 8c 88 3b 45 c5 ff 07 ae | 3b 26 9c d0 6d b7 d1 e5 d2 f2 44 e2 99 9a a1 34 | 7c cd f0 e6 b4 a0 06 c2 e2 40 86 90 79 ac 53 56 | e8 b9 80 5c 54 49 7c e3 25 da dd 1c a3 52 9f ec | a4 d2 90 b1 56 ce 5d 5c 20 a2 3b 08 f3 fd d6 30 | 42 db da 3e b2 e5 ed 74 de b7 e6 59 ba ed c1 83 | 60 66 8c 72 2f 6f ba 9a 85 05 c1 db 9c 7c b8 87 | 26 24 9b 4b 8b 4b 67 b9 df 00 bd 07 d0 3b e3 b4 | 6c 17 18 f3 f7 d3 9c 27 cf 7d 7a bf 43 d6 d5 cf | 69 cf a9 92 09 2e 90 5d 89 35 3e 56 73 21 5e fd | 30 0e e9 0b 43 37 81 42 99 01 7c b5 f0 2c f6 9e | 45 a9 d9 81 d2 95 68 9f 5d 8d 05 3c e4 03 5d 3b | da 10 69 6b 96 bb 32 84 4d a3 95 1d 28 1b ff 6b | 19 0c 05 ab 9e ef 24 27 d9 f0 1e 4b 16 13 1f a0 | 29 00 00 24 33 52 d4 42 b8 04 6d 4f 2e 93 5c 6b | d5 ad 27 1e 92 59 33 28 c5 ae 5c 5e 96 b6 02 6f | 79 82 8d b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d f0 6f ab 99 46 a7 e5 85 41 6a 05 | cc 0a dd eb 9e 21 24 a7 00 00 00 1c 00 00 40 05 | fa 0b b1 80 18 a1 01 fe 64 98 07 58 ad c1 ac 04 | 2d 72 07 f3 | libevent_free: release ptr-libevent@0x7fb37003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360012bf0 | #563 spent 0.068 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #563 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad4380 | handling event EVENT_RETRANSMIT for parent state #585 | start processing: state #585 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #585 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #585 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #585 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.231878; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.944036 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #585 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 "road-eastnet-nonat-56" #585: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #585) | 4a 2d 06 a5 9b 4b 99 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 29 a0 67 33 95 5c 1d b9 11 2a c0 eb 4e 4c a9 | e0 4a 90 97 d9 14 6c 5c fa c2 84 25 94 ed 30 2a | b0 88 7c 51 d2 d7 ff 29 a2 e1 b8 25 0b 85 ce b7 | b2 12 f6 3a bd 7c d3 5e 0a ae 7c e5 dc a9 b5 e0 | b1 73 f8 5b c6 30 50 76 ab ce 7d 60 1b 21 f2 24 | de 59 93 e2 2f 8b 16 ba cb 3a 00 66 a1 42 8c d0 | f2 69 c8 bd a5 c5 17 99 23 d2 e7 08 52 58 cf 46 | 18 6a 5f de 56 35 01 8c d2 ff 97 28 1d 1b bb 92 | 48 6c 2a ec 7b 82 4c 83 40 17 8c 13 5d fb 0c ea | df 44 dc d0 94 b6 10 69 f9 90 b9 8d ee 30 ce 05 | e3 86 29 c2 e5 c6 ce 54 2b ff d1 3d 10 ca 32 02 | 12 72 23 d7 dd b3 7f b0 17 38 2e 43 6c 10 4a 0f | 86 3b b1 4d 71 cb 29 6b f7 89 2e 9c f1 20 88 1c | 84 7f 4a a5 ce 80 ec a8 9e f2 52 7b 0c bb 09 70 | c6 d1 fd 42 0e b3 07 8b 67 74 82 05 59 36 9e 22 | c4 7c b2 4e 57 7b 68 cc 85 67 3b 47 1f 9f c7 67 | 29 00 00 24 28 e8 a9 33 f5 cb ea 77 ac 0a f0 23 | 81 90 3e d5 9d e8 ea 75 7c 29 f7 bb ce e1 94 cc | 81 10 ca e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e1 7f 8b 08 d1 d7 03 c9 45 07 dd 1c | f2 db 4d da 97 13 01 ed 00 00 00 1c 00 00 40 05 | 1b 39 fc df 1f 4f 07 bc 04 62 76 b3 b9 a8 ed 18 | a7 41 03 5e | libevent_free: release ptr-libevent@0x7fb37405f150 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad4380 | #585 spent 0.0706 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #585 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368040840 | handling event EVENT_RETRANSMIT for parent state #711 | start processing: state #711 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #711 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #711 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #711 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.231954; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001927 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad4380 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #711 | libevent_malloc: new ptr-libevent@0x7fb37405f150 size 128 "road-eastnet-nonat-186" #711: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #711) | 46 de dd ae 1b 33 3b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1e fb f8 69 eb 92 56 fa e8 6b 80 bd 3a a2 f1 5d | e2 2f 9e d6 bd 7f 97 c8 b3 8b 02 5b 38 41 e1 ee | 42 a6 3c b3 1b 0e f8 ed 2c 61 73 24 75 ee ff 11 | 80 e8 65 c5 04 0b 39 c2 cf a9 e0 e7 ea b8 69 59 | 88 22 65 ae 2e 6e ce 7a 3b 8e 9b 5b ae 73 1c 45 | a6 ad 6e ff 7d ee 57 ae 75 fe db 29 33 14 d8 3e | 84 01 d5 70 75 bc 33 43 cd 9a a0 3d 7a fa c8 fc | 80 64 21 7f 34 0e a8 e0 72 05 42 a2 8e f8 64 07 | 62 20 d0 e7 cc 2d 35 50 67 31 52 27 ea 4a 4b f5 | 65 1f c8 ad 67 9b 47 53 9b 2a 89 ab 3e 19 8c 26 | e6 31 27 4a fe b0 71 d9 94 76 e6 64 92 ba 3e 1f | 40 a8 76 db 49 ed 4d 4e 20 ff 29 d6 24 a3 26 db | a5 a9 f6 f0 13 de f5 16 c5 c8 94 6b 66 f0 42 99 | 03 d4 dd a2 4b 2b 63 3c 83 09 26 b0 bf 90 c2 8e | ca 70 e7 02 59 40 bb 5d a0 d8 f9 cd ca 9c 92 09 | 26 05 b9 92 8a d9 e6 4b fa 8a 50 3c b1 69 e2 b7 | 29 00 00 24 c3 2e 34 07 d1 26 64 7f 7d a5 2a e0 | 34 43 1a f1 ce 3a 79 7d 9c a6 d5 be 0a 57 a8 05 | ad df 51 bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 81 0e 00 c8 04 84 dc 32 f7 ff 89 | 08 01 7a 69 9d 96 cf 86 00 00 00 1c 00 00 40 05 | 8b 19 f6 3c e3 44 56 e8 bd d2 d9 5b 06 2a 9c bc | df fe 2c 91 | libevent_free: release ptr-libevent@0x7fb36409b8a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368040840 | #711 spent 0.0696 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #711 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b1c480 | handling event EVENT_RETRANSMIT for parent state #740 | start processing: state #740 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #740 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #740 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #740 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.232032; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.006012 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368040840 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #740 | libevent_malloc: new ptr-libevent@0x7fb36409b8a0 size 128 "road-eastnet-nonat-230" #740: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #740) | 1b 68 e9 bf c7 97 07 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf b3 10 fb dd 28 f6 cb 25 9f 9d 63 17 69 6d 6e | e8 71 1d da 03 62 10 04 58 4a b2 60 7e 08 0d 23 | e8 11 df 63 3f d9 4c 6b 74 a1 a5 86 cd a9 4f 0b | a1 93 6d 81 fa 0f ef 54 ce 9d fd cb 34 8e 77 a2 | 87 72 4c 47 7e 84 fe 1b a5 81 30 1c 8c fc c4 9a | 0f 98 35 d7 2a 5e 44 55 8a 59 d6 d8 30 0e 7b a6 | 2a b2 14 36 a8 38 48 b1 a9 46 59 2b ac de 0d 8e | 1c 9d 2b 89 1c 30 40 5d b7 34 94 17 5f 21 6d f3 | 8a 9c ff b3 cb 8a d6 33 b7 5b 70 0b 55 e1 7a e1 | 7d 1b fc 2c 98 7b 56 b4 9c 01 69 95 c3 40 41 1a | 16 ef a0 2a 1b 18 8d 7f de 2f 24 c0 24 36 5a 75 | 68 29 82 0e ef 57 e3 38 1e 0b 49 5a de c8 05 03 | 5c 7b 63 02 56 7e a1 b0 b5 ab 37 8b 92 4e 92 ec | 6a 5b f1 54 78 81 27 2a c2 36 70 26 e0 90 20 5c | 71 5f d8 ca cb 70 40 d9 8f a6 1b 60 21 65 09 2b | e2 dc 1b fc b7 96 10 f1 3e c1 9c af 69 36 85 93 | 29 00 00 24 fa 43 15 42 5a db 07 16 30 b5 67 19 | b6 84 08 f7 7b ea f2 1f b7 28 7e 51 d0 6b f6 fb | b4 42 2c ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 6f 0b 3c 61 32 28 f1 44 65 e1 5e | bc c8 e4 f5 79 a3 0a bd 00 00 00 1c 00 00 40 05 | bc 6f 55 f3 a9 01 d6 c1 3f f8 0f 15 e9 0d 1c 1c | f5 51 2a 5a | libevent_free: release ptr-libevent@0x7fb378080550 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c480 | #740 spent 0.072 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #740 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #738 | start processing: state #738 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #738 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #738 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #738 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.232114; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.012982 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c480 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #738 | libevent_malloc: new ptr-libevent@0x7fb378080550 size 128 "road-eastnet-nonat-228" #738: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #738) | 25 78 f8 28 10 61 9d 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 51 72 b7 05 5e 83 a3 a0 07 12 24 3e 92 83 b8 | 62 3a f9 f5 51 87 2b 5b 57 43 01 a4 66 eb 6e d1 | 36 fd bc d6 d3 df 99 92 4a 90 d6 55 13 f9 57 37 | 57 21 91 58 59 45 7b fa 72 46 a4 36 22 6f 56 d8 | b6 6d e1 0f 87 84 b3 2d 12 ce f5 5a 2e d2 8f f7 | 2b 01 97 28 81 dc 2a 4f 14 69 dc 31 63 bc a5 23 | 42 8f 99 35 ae 7a 8d f1 f8 fc 1d a7 d5 69 74 4b | 4e 98 fb 39 77 73 f9 c2 8d 2f 88 65 14 8e 49 62 | b0 f1 74 23 17 c0 59 7f 25 06 94 30 cb 35 da 14 | 1a 23 e5 07 95 80 6a cb a7 fe d0 d5 8a 1f 10 96 | bf ab f1 96 54 c3 82 d2 6e 6d 0c 64 bb 6a 3c 73 | 83 0b fd 52 5c d9 5e a3 74 f9 c3 2b 08 19 82 dd | c6 8e eb 37 6d 26 f4 d6 e5 ff ff bd 35 5a 0e 11 | 00 7d 5a 8c 85 d6 d6 a8 98 8a 86 a2 3a 0b 85 a4 | c6 6f 0c 94 ab 7b d2 e2 18 f7 d7 59 10 f4 62 a1 | f4 5c 31 8a df 18 a0 2b 20 3b 40 bf 17 df 1d d5 | 29 00 00 24 97 c7 a3 d7 59 e9 31 22 90 b1 59 6b | 1f 7e 8d 5c 35 7a 89 f4 a1 7c 76 7f ab 92 a2 52 | c8 bf 0f 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 91 a4 00 33 c0 fc 8b 25 9b dc 30 | 06 39 ac a5 a1 25 3d b9 00 00 00 1c 00 00 40 05 | ba 61 e3 c1 d1 2b 93 b6 88 33 74 02 de a9 63 56 | ec 2a 1e 1d | libevent_free: release ptr-libevent@0x7fb34407a660 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | #738 spent 0.0689 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #738 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37801d970 | handling event EVENT_RETRANSMIT for parent state #687 | start processing: state #687 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #687 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #687 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #687 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.232191; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.012456 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #687 | libevent_malloc: new ptr-libevent@0x7fb34407a660 size 128 "road-eastnet-nonat-117" #687: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #687) | ce 83 a7 9c 1c 97 2e 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 94 51 72 79 a4 28 3a f0 f6 12 68 84 e5 2d d5 | f6 aa 47 a0 d1 ff f5 a6 1a 2c 25 a6 01 58 40 fc | d1 95 56 17 97 c4 d8 d7 89 0f 51 18 3b 4c 8d f6 | ee fb ab 56 d0 0a 15 fd 6a c8 e8 89 62 5e b8 5c | 57 fe 05 8e e1 ea c9 e7 84 08 05 71 31 9a dd 16 | 0a 25 f1 1a 29 58 f8 06 86 68 fa fc 99 8b 12 42 | 09 ec 17 e1 a1 09 76 fc 53 b2 55 2f 51 28 14 aa | bc fd 76 5f c5 9a ba 18 29 7b 2d ad 6a bf 47 24 | 5d a5 36 0f 60 68 25 fb f2 8e 9c 88 47 ac 61 32 | b1 6f 1c e3 4c ea 94 2e 13 72 9f 40 c9 32 9e a5 | 55 17 b5 71 af 30 28 4f 48 dd 3d 1c db eb 87 a6 | 1e c2 d8 26 0c 79 1d 68 4b e4 5c 9d 70 1e da cb | bf 7a 87 cd ee 4f da f1 be 6f bd 22 fa fe fa e8 | 01 cf f5 ed 00 5b 60 c2 39 47 45 cf d8 5c e9 07 | 6f 88 d8 c1 70 38 c4 08 e2 b7 20 9d fc 6d 35 32 | 43 d1 2a f8 21 b9 12 49 96 d5 3b 06 a1 81 56 f4 | 29 00 00 24 90 27 10 b2 cf 6a 00 ae d3 c4 a0 c5 | 23 4c 05 8c fe 6e fb 12 c4 ef 71 e8 a5 33 dc 9a | 79 4a a8 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 e8 b6 32 ca 26 78 2c d2 a8 a0 44 | d4 75 0b 9e 75 b6 57 86 00 00 00 1c 00 00 40 05 | c5 19 67 c6 b1 38 40 1d 0b 22 02 fd ab 47 ee cb | 20 29 33 72 | libevent_free: release ptr-libevent@0x7fb344069ec0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37801d970 | #687 spent 0.0692 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #687 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #609 | start processing: state #609 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #609 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #609 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #609 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.232268; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.96061 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37801d970 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #609 | libevent_malloc: new ptr-libevent@0x7fb344069ec0 size 128 "road-eastnet-nonat-138" #609: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #609) | c5 84 f5 e6 85 81 a8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b c3 e1 62 dd f7 03 a4 32 17 be e2 28 27 fb f5 | 45 a1 b1 50 d0 82 d8 71 c0 db 0f 18 56 ed 9e 71 | ab 62 12 3b 1e 2e d7 c2 88 e3 18 ba c6 4d 9e c0 | 66 e9 16 dd ad be 48 d4 08 19 fc 5d 95 a1 92 79 | 85 f1 22 51 65 65 eb df 48 a7 f9 2c 1f 7c af 78 | 1b 32 50 5b 8d 91 14 ab 2f fc 1c e9 0a eb 9d e0 | b9 b3 7c a9 c3 93 53 4b 2c 6d 79 29 14 5f 71 42 | c0 35 82 62 20 0c b7 12 e5 58 00 96 19 9d 47 ed | b5 53 5d 62 96 2a 62 44 51 f9 0e 87 7c 59 64 63 | c8 45 7c 86 64 54 df 3f 91 89 ff af 10 5d 3d 75 | cd aa cf 4b 0e a3 b7 91 a2 ab 02 7c c6 93 7f f2 | 8d 0d 67 2e 43 de f5 19 fe 61 c3 eb ca 89 dc a8 | da 1e ca b8 26 01 ff cf 71 b9 ef 31 67 1a 21 e1 | 74 9c 98 aa be 62 d9 7f c0 2a df fd 36 dd fe 56 | 14 e3 d8 7a f9 88 3d 4e ef 12 e2 a4 b6 e8 07 15 | e0 33 aa a7 d0 7f c0 9a ca fe 22 27 40 8f e2 a5 | 29 00 00 24 77 ac 96 72 0b ae 9a e5 43 fe 81 46 | 33 b5 6c 3b 53 47 2a ac 8d 43 3c bd 37 47 3d 9d | 02 54 00 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 cb 6e 3a 03 75 5f a3 64 4c ac 8d | 50 31 4f 55 75 88 9f fa 00 00 00 1c 00 00 40 05 | 69 ea 36 3f 8e fc 87 de be 9f 2d 0a 55 5e aa a3 | 63 b9 97 4b | libevent_free: release ptr-libevent@0x7fb37004a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #609 spent 0.0697 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #609 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46adb080 | handling event EVENT_RETRANSMIT for parent state #722 | start processing: state #722 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #722 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #722 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #722 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.232346; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.01291 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #722 | libevent_malloc: new ptr-libevent@0x7fb37004a770 size 128 "road-eastnet-nonat-179" #722: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #722) | aa d5 b7 9d 2c 2d ce cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 b1 9e af cf 96 c4 1f a9 84 c9 1e fe 0d 23 0e | 53 41 ad 54 73 4d e4 38 06 61 64 5a 7e 50 5d 4b | 7b 88 a3 16 c2 7a 44 91 ab 9a ef aa fd 30 6e 1a | 1d d2 33 a7 46 ad ce 2a 23 40 98 78 51 d0 bd 75 | cb b0 f4 b3 4d 7d 19 05 e0 8b 9b 3f ea 2b b8 7f | 3e 4a 4c 83 dc 50 06 15 79 16 52 63 ff 38 b6 0f | d8 c3 fa 2f f5 c3 27 82 43 ee e2 17 1f fd 56 25 | 4d 01 27 c8 35 e9 4c 3b 07 cc 3e b3 7b 20 e4 14 | 25 d6 4c 28 e2 bf c7 2c 41 cf 35 f8 5a 05 57 12 | 04 0c ca 49 a7 e8 4a a0 b8 27 d8 fb da 18 09 0a | 8c d8 8d af 83 fc 09 54 90 fe e9 ec 6d 97 9f 38 | 4e f0 9c 72 3c f6 cb 04 b9 67 19 9d 6a 3a 73 08 | d5 1a 3f 89 1b 6f b4 27 4a 1e 40 b2 80 92 bf af | 91 29 dd e3 e5 8d 54 1a b2 c3 4e f5 fa 70 5a df | 3f f7 11 8b 30 04 85 e6 00 fc df 4a f8 63 a9 ce | 38 f2 7c 9e bf e7 aa 6c 51 0c 26 e0 f2 3a 12 6b | 29 00 00 24 7a 35 42 ce 34 04 04 57 a4 48 47 35 | 56 ae 37 50 6d 6b b9 18 e7 0a e4 12 4e ef 0f 1d | e0 a7 cb 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea a8 f1 c6 be 84 ee 15 46 58 b3 d5 | 8e ba 1e e7 f5 a8 48 b9 00 00 00 1c 00 00 40 05 | 03 f5 9e 01 93 c6 ea 77 b1 6c 5c 90 de bb c7 8a | ab c5 48 5b | libevent_free: release ptr-libevent@0x7fb374085870 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adb080 | #722 spent 0.0684 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #722 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a86b80 | handling event EVENT_RETRANSMIT for parent state #561 | start processing: state #561 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #561 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #561 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #561 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.232424; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.941398 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adb080 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #561 | libevent_malloc: new ptr-libevent@0x7fb374085870 size 128 "road-eastnet-nonat-90" #561: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #561) | e6 ce b9 a0 0a 53 1e 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 46 f6 a4 7c 90 e0 c9 d2 85 20 8f b5 1d b7 c4 | f8 f3 b0 78 b0 d2 51 66 8d 4a d8 59 6d 49 84 64 | 71 ab fb f5 bc b5 f0 e8 d0 77 d4 03 41 0e 1e 4a | d9 b5 75 25 c4 92 0a 2d 74 4a 0c 20 47 6f 34 56 | 44 56 ce da b3 ab 68 a5 91 66 d6 77 00 6b 23 58 | fc e6 d4 0e 5a 52 c1 f1 b5 a0 ad 99 57 15 c5 c2 | d9 2b c3 74 d2 ab 4d 6c 38 2b a8 54 f1 10 ea 73 | f7 f3 1a 1a 0b 20 27 ed ef 90 9d 0b e4 63 64 46 | f5 cd 8e 24 f9 d7 d2 7f 96 cc 6d 0d 85 5e 94 0f | a9 4e 5e ec c5 1b 6b ba 38 a5 5a dc af bc 4a 97 | 01 2b d3 7d e0 00 45 8b 2a 4c 3a 26 e1 bd 65 ba | 43 5f a9 bd 57 50 f2 28 5b 00 4d 82 f3 42 f1 e0 | 6d 90 d6 4d 3a f9 fb 23 4e 48 bf 3a cc 34 f4 a3 | 43 3c 8d ad f0 9a db e2 a8 69 3f f5 2a 3e f3 dc | 27 48 23 01 97 ea 7c bc 0d a2 a2 b0 86 ec 2e 00 | 77 3a 8c 7d fc a5 d4 fd 81 85 16 b0 ff 6b 0e b5 | 29 00 00 24 c5 97 1a 8b 29 e3 3d 7a 27 0d 40 2f | 83 32 ae 98 8d 84 ac e2 dc ec 7a 49 5f 8b 56 23 | eb 72 f0 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 04 bc 5d f6 1e a1 6a 54 c3 1f 21 fe | 90 fc 7d b7 bf 9c 0e ab 00 00 00 1c 00 00 40 05 | a1 82 14 e7 88 f7 7d ff e6 10 b0 c3 6f d3 95 fd | 16 ba 74 48 | libevent_free: release ptr-libevent@0x7fb3800907b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a86b80 | #561 spent 0.0699 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #561 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #744 | start processing: state #744 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #744 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #744 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #744 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.232501; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.010561 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a86b80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #744 | libevent_malloc: new ptr-libevent@0x7fb3800907b0 size 128 "road-eastnet-nonat-209" #744: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #744) | ea 7c f7 bc 9d b4 d4 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 10 35 c8 dc d8 d8 41 53 59 49 7c 7b 44 aa 05 | 7f 67 fe c6 28 2a e8 7b 99 25 f4 0d 41 65 04 49 | 3f a5 ca 32 7e 94 c7 70 6b d5 d7 5f 8a d3 f2 1c | ca 3a c9 ae 29 50 6e c5 9c 99 e5 19 7a ca 2b 5a | 20 96 8c 54 9e 1b 8d 21 df 3d 1c ae a9 b2 f2 dd | 61 db 05 94 26 c0 73 9c 28 14 1e b4 32 df 8d 11 | 60 18 79 0a 1f bd 12 12 40 ca a3 c4 d1 34 dc 28 | d8 6d 71 58 2c 9e 25 5c f3 a4 a3 a1 e0 08 9d 79 | a3 8b f2 2f 94 27 6a 94 a9 dd 70 db ec f6 52 82 | 6e 5a 66 cc 95 16 57 c1 a4 fd 5b c3 f0 1d 4f 6e | a7 3b 22 2a eb 3b 0c f6 18 dc ec 5e 03 2f 91 2c | 65 23 6f 5e 2b 65 fa e2 5b 10 85 ee 91 82 62 ff | 39 4e e7 48 1f 63 84 b9 93 73 90 ab e3 44 21 75 | 99 ff ff 9a 14 1d 56 ee 54 ba 7e 72 40 d2 9e 35 | 7d d1 3f 98 ac 5b e2 19 e4 12 13 62 7d 18 8e 06 | 2d 61 f4 df a4 3e 70 b2 f5 55 a5 83 ab 24 20 04 | 29 00 00 24 05 e4 d5 07 4d b5 53 19 e9 74 fb 1f | 81 a4 d4 c0 b2 e7 21 de 08 06 9a f0 79 05 4e 6b | 6b 45 0a 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 6d 3b fc 06 c6 19 b7 65 37 87 f1 | 00 58 b3 97 c1 ac 1d 38 00 00 00 1c 00 00 40 05 | 84 2a 82 65 99 0a c2 da 62 53 b8 d5 7c fd d4 dd | e5 91 5e 42 | libevent_free: release ptr-libevent@0x7fb370074f70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #744 spent 0.0697 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #744 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3800319a0 | handling event EVENT_RETRANSMIT for parent state #751 | start processing: state #751 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #751 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #751 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #751 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.232579; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.006068 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #751 | libevent_malloc: new ptr-libevent@0x7fb370074f70 size 128 "road-eastnet-nonat-244" #751: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #751) | ae b9 96 92 13 03 18 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 18 de 27 b3 41 d9 b4 97 87 96 94 92 db 34 d5 | 56 66 24 e2 24 37 ce bd 92 7b e3 87 23 69 e7 bb | 99 85 d4 04 ba ee 4f 3a 2d e4 f5 20 88 1a da 6a | 37 fd 29 25 a7 48 4a 55 fa 78 65 6e 2e f9 46 8a | 6d b2 51 bd 8a 24 ee 67 2d ab b9 57 1a 5e d8 74 | ba ae f9 c0 cf 53 67 dd e4 f0 25 8c f7 8b e5 cc | c4 b9 b2 2e 91 da f6 5e 10 27 44 76 09 73 cb 05 | ee ff b8 22 52 36 b5 70 b5 f3 a3 21 0c 9b d9 c3 | 6e 1e fd a6 b5 36 62 17 f0 b8 95 48 d0 79 59 86 | f0 3b ca 96 84 68 69 d6 59 82 c8 2b a6 a6 4f 06 | c3 dc 73 a0 8a 74 9c 4d bc d3 4c 09 2f b7 5c 51 | 36 1f a0 36 a1 c5 d6 a5 b8 10 87 71 e5 72 18 60 | 29 95 15 48 57 c7 bb 89 e1 44 1c f8 fb 56 fa 24 | e6 14 3b 9a 5e c3 26 ff 0c 04 49 70 a6 59 7d 65 | 41 4e c0 79 9f 67 e9 9e b7 b9 6a 02 99 b0 ea 24 | f8 69 67 ed 88 82 6b 65 bd e8 e7 35 b7 cf 86 4f | 29 00 00 24 5f 12 63 14 37 ca 62 06 c8 d7 61 a7 | 8b 59 9f 9f dd 4b 86 2c 58 45 7a 5d a8 0a d1 a1 | 93 37 6f 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 41 84 a3 d1 08 28 c1 a2 36 a7 52 | e0 0a 68 b0 f4 d6 13 58 00 00 00 1c 00 00 40 05 | 6f c5 8f 9c 48 4f ce 63 14 03 29 e5 1c a9 3b f7 | 4c 7b c3 5c | libevent_free: release ptr-libevent@0x7fb35c0ca170 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800319a0 | #751 spent 0.0824 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #751 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a45350 | handling event EVENT_RETRANSMIT for parent state #739 | start processing: state #739 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #739 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #739 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #739 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.232668; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.009824 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800319a0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #739 | libevent_malloc: new ptr-libevent@0x7fb35c0ca170 size 128 "road-eastnet-nonat-224" #739: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #739) | df 19 f5 78 1f 7f 61 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 b4 0b bb a9 64 88 87 98 2f cf 2f 72 90 24 8e | 27 68 e4 41 53 39 08 7e 9a 9d 01 79 8c 46 b5 7e | 94 53 70 3e b0 27 b2 82 8a 26 9d e8 0b 19 4b 92 | 2b 7d b3 c3 c4 b5 0b 70 2b 92 ac 96 4c 0c 66 2f | d2 61 eb 15 ed 06 25 36 5e 2a 3f a8 42 0d d0 94 | ae 7d 6f 48 35 8f 38 64 d1 29 e3 a9 12 a1 3b 9a | 37 6f f0 36 59 2c 69 bd c2 85 29 7c f5 fb fd db | 33 21 05 b9 47 40 46 26 f2 67 5e de 98 c9 70 43 | 38 06 63 f6 fd d0 82 9d 53 05 3c 2c 8e 1c cc 05 | 21 99 f3 4f 03 c8 cd 4f 9b 06 f6 fa f8 36 e3 35 | 25 9b ee fa bd e1 7b 3c 24 42 c1 43 67 a4 52 26 | c9 ad a5 ca 68 eb 61 44 9f 85 d4 ad 39 d3 08 f8 | 0c 18 de 7d 80 97 a9 b0 17 1e dc 70 64 63 2c 0d | bd e4 be 7a df c7 e0 58 87 37 3d c3 42 94 6e f1 | 48 66 02 c3 74 33 ab 1e 5e 12 8d 34 8d 1f 0b 16 | f3 77 bb 3c fe eb 42 5e 87 af e0 78 62 33 b9 fc | 29 00 00 24 fc 37 68 c7 2d 53 22 1d 51 4a 71 4e | 46 28 97 f7 6a 0d 4a 96 60 fa 96 05 69 86 9a bc | f2 f0 69 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e0 2a f2 c4 e2 df 1f 60 02 ec 7a 42 | 09 ed ca d8 77 e1 6d 1c 00 00 00 1c 00 00 40 05 | 4f 71 3a 48 ff b5 1c f9 41 72 89 68 75 9e 7b ee | 5e b8 7a 66 | libevent_free: release ptr-libevent@0x7fb33808a5d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45350 | #739 spent 0.0619 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #739 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3840318d0 | handling event EVENT_RETRANSMIT for parent state #734 | start processing: state #734 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #734 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #734 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #734 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.232739; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00485 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45350 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #734 | libevent_malloc: new ptr-libevent@0x7fb33808a5d0 size 128 "road-eastnet-nonat-174" #734: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #734) | 14 ad 8f c6 54 da 73 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 2f 5d 76 c2 4f 1f 02 6a 67 83 af 07 ab a2 bd | 9d b0 56 b4 74 93 21 23 d5 0f 1b 1a 3c 05 90 db | 39 cd bb c0 0f 27 b0 be e7 30 10 fc 0c d6 85 d9 | f5 60 17 39 55 ca cb 5e 73 d2 3f be 8a 82 60 c9 | e1 41 42 b2 6e 78 88 06 40 0c 17 95 c2 17 27 23 | 90 bd f0 73 5c ee cb d6 c6 aa 04 22 1d c0 10 38 | fb 77 ae 2f 0a 4f c0 01 c1 29 59 fe 35 87 fe 76 | 67 9f e2 74 4b ff 95 18 5f 7e 94 c6 c7 e6 07 67 | a5 35 e2 f5 32 f0 ec 4b b5 8b 9c f1 7d c8 0f 0c | 14 d9 4b c5 b9 27 1c e0 42 84 b9 a8 08 9f 75 1c | a2 e5 c6 44 e5 22 9a 7d ee 05 4e 75 55 a6 96 62 | 19 7d 76 44 2c a5 59 2c 17 a4 18 38 23 2d 1c 58 | 72 f3 bb 2e 0b 81 64 e9 5c 10 3e 22 02 85 a0 c4 | 22 29 f1 c6 45 f2 7a 20 5c 0e de 01 c6 aa e1 c8 | 76 a4 85 5f 79 3f 64 df 47 3f dc 65 47 83 a7 3a | c4 4e f9 47 98 cb 9d 5b c7 13 e3 7c ce 08 53 f9 | 29 00 00 24 f6 bf c4 84 2e cb dd 02 8e 3f e7 e1 | fb 91 00 da cb 72 7d c0 8f b1 0e f4 82 ab 9b 50 | c3 13 1d b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac e5 9c 84 e2 ae 2e 54 0f 4c a4 7c | d6 9a 1b 89 f2 f4 09 5b 00 00 00 1c 00 00 40 05 | fb 5a 36 f0 d4 c4 17 31 be e2 a0 e0 6f e2 a5 d0 | eb e9 f5 19 | libevent_free: release ptr-libevent@0x7fb36c077c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840318d0 | #734 spent 0.0628 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #734 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a47f10 | handling event EVENT_RETRANSMIT for parent state #718 | start processing: state #718 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #718 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #718 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #718 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.232808; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.000296 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840318d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #718 | libevent_malloc: new ptr-libevent@0x7fb36c077c70 size 128 "road-eastnet-nonat-157" #718: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #718) | 0c dd 79 de 47 83 7e 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be 66 36 96 31 e2 42 87 3a ac 4a fd 50 98 37 f0 | 83 90 d2 c2 b6 a0 f8 1a 23 ee b3 73 7e 59 fe f6 | 3c 2e ff a3 b1 53 59 bb 42 87 13 c6 fa 8f f4 66 | 20 b5 0d 75 56 3e 90 ab 48 8b aa 14 da 3c 04 07 | 7e 5f 8e 9b ff 5d 16 9c d6 cf e7 df 30 34 14 81 | fd cb 54 31 0d c6 6e 86 c6 00 5a 1d f1 9f cf 03 | 8e 5c cf 50 18 84 b9 7b 0b 61 d1 97 2f 8f 20 3c | dd 18 b6 4a e3 bc 56 eb 5e b2 56 15 58 ea 88 9f | d5 df 2d 58 7b 95 5a 7d 44 a3 ad 96 a2 23 87 6a | e2 84 31 36 80 e1 af d8 10 51 82 08 4c 66 f2 a3 | ea 9e 5d 00 97 f9 2d 2b a9 f9 ea 4a 6e 06 95 ef | d2 60 f0 da 73 c2 db c1 a6 40 f3 05 1e 08 98 1c | f5 d5 15 f1 7a 89 4d 80 89 c5 9d 2a b9 73 5f 7f | 20 36 51 5a fc bd 7e e1 b7 e9 61 67 fa 61 13 e9 | 12 17 e8 98 3b 6c fb 8a 60 2f e7 0a fd 58 48 e4 | a5 27 43 bf 2f 21 79 fe 28 b0 c2 eb b7 6d 95 45 | 29 00 00 24 89 03 e8 6c ca 23 ce 9e 5d 41 d4 99 | d7 86 12 03 b4 03 11 8f cb d7 3b 25 eb c9 7b e9 | f8 3c 7d e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 7b a6 d5 12 0c 58 96 9f f8 ef 99 | e4 3d a3 f6 b8 7b 36 33 00 00 00 1c 00 00 40 05 | ad 02 ae 2f 73 2c a3 41 68 65 8b 86 be f0 98 4f | f3 0c 27 62 | libevent_free: release ptr-libevent@0x7fb34c074c00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47f10 | #718 spent 0.0629 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #718 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_RETRANSMIT for parent state #698 | start processing: state #698 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #698 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #698 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #698 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.232878; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.997966 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #698 | libevent_malloc: new ptr-libevent@0x7fb34c074c00 size 128 "road-eastnet-nonat-211" #698: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #698) | 21 cf dd 23 b6 bd 0a c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 b6 1b 2d 49 8c b5 f8 7a 69 c7 b2 f5 d8 79 d8 | 26 12 23 12 d2 76 1c 08 cb 2b 6c 70 8d 69 a0 f1 | 6d c2 d1 02 bc 20 a3 cf 4b db 02 4e 02 bf 9c ef | 06 4a dc 18 d2 74 58 2b 58 67 f8 e8 0a ee 59 ea | 16 9c 3c 75 07 d4 f6 13 6c 2f a8 d3 16 3a 01 5c | ab a0 57 0b d9 a8 0a 28 86 75 df b0 c3 1a 3d 57 | 9d 10 56 0c fa 92 43 8e fc 2e 85 4b ae 97 bb eb | 66 96 a0 3b 93 fb fc 3e a4 7b 85 51 68 c7 6b 35 | 6e be 0c 7d fb 30 17 ba 33 cd c8 32 b2 53 83 47 | 2e af e0 72 a9 4e 53 16 57 a9 ed 18 35 80 e6 11 | ce ef 2a 39 6c 7a 1c 80 7d 2d 86 be 0f b3 d1 2d | 8e 73 69 25 8e 2d cf 22 94 9e 26 1d 06 89 aa 00 | f6 e5 b6 1f d1 6d 2a 5a de 51 70 67 1f dc fe 84 | 10 da 29 d2 fa dc 69 4c da 42 f1 0d f5 d6 7b 01 | 9b 82 d0 81 2c ec 44 13 52 ae 3a 49 a4 a8 b1 17 | 13 9a 7a f2 8e 7c 90 d0 e4 37 60 4f 27 eb 74 fb | 29 00 00 24 c7 60 58 05 d8 38 44 75 17 ec b3 37 | 6c b6 72 ff f9 94 ef 8a 21 a9 54 7a 0f 5c 8e b8 | ba 44 9b ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 1a ed 35 4d 8e 31 1b 88 ca 39 40 | 08 de 5b cc 57 86 57 d8 00 00 00 1c 00 00 40 05 | f8 2a d9 b9 24 84 74 c8 e3 0b 5f 27 a7 30 52 df | 0f 06 8f 7c | libevent_free: release ptr-libevent@0x7fb37006f790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | #698 spent 0.0611 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #698 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab90c0 | handling event EVENT_RETRANSMIT for parent state #700 | start processing: state #700 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #700 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #700 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #700 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.232948; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.993332 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #700 | libevent_malloc: new ptr-libevent@0x7fb37006f790 size 128 "road-eastnet-nonat-105" #700: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #700) | 00 c1 02 d2 ce 58 22 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 38 f6 d2 66 d7 37 75 8a f0 3e e3 b7 32 d6 41 | f5 9b 8f a2 62 4a c2 2b c9 04 e2 82 df 16 b1 e7 | 53 45 e9 b0 d2 33 ee 18 d1 c5 9a 70 cf 68 0f e5 | 32 d6 f3 5b 1e ba 36 1e 40 b2 2b 52 74 e4 c5 52 | da 47 f2 0c 1b a7 d1 57 3a 88 c8 c9 39 c5 dd 03 | 07 4e 94 a0 a1 1d 2c ea 30 74 62 8d 86 0a 47 96 | 6e 86 43 84 d1 9e 1d 48 ef 3c 77 aa 61 b1 d6 36 | b5 4d f7 2a 16 ea 31 f3 6f f0 30 8c 27 0f 36 c2 | 5a 32 4b 7a 99 fa 8a a2 52 1a 48 1a 84 31 7f d9 | a1 19 01 60 f3 03 bc b4 7e 3c f2 20 4b db 82 e3 | 91 8a 04 5c 39 59 a1 c6 c7 13 9b 06 59 aa 49 26 | 58 66 03 6f a1 ee ab cf 66 8f 67 f8 d0 fc b3 18 | 94 eb b8 a7 2a a8 67 57 97 49 ca 42 b2 b5 7b d2 | 6e 59 f7 fc 58 0c e9 3b 1a b2 35 58 47 0e ce 90 | a5 dc 15 a0 5d 7e 82 46 b9 36 49 bb 5b 6e 43 bf | 1e 14 f0 70 04 11 dd c3 af 14 0d 1e 44 19 e8 dc | 29 00 00 24 ee 23 8c 3a 20 c2 eb 31 90 b4 e3 3f | 38 ea ba 83 7e c0 b5 92 52 31 23 9c 2d 4d f8 74 | 94 8a 3c ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 5a 78 4c 93 64 72 5c f7 62 e1 2c | d0 64 cd 9a e4 f1 0f 34 00 00 00 1c 00 00 40 05 | f9 4f 20 e0 84 05 11 01 b8 04 b9 53 7d c7 40 89 | a2 bc 5d 64 | libevent_free: release ptr-libevent@0x7fb358073c30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab90c0 | #700 spent 0.0617 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #700 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb364044c30 | handling event EVENT_RETRANSMIT for parent state #684 | start processing: state #684 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #684 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #684 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #684 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.233017; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.996564 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab90c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #684 | libevent_malloc: new ptr-libevent@0x7fb358073c30 size 128 "road-eastnet-nonat-168" #684: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #684) | fe 13 79 f4 87 18 7a 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c a3 3b ab 91 aa e9 1c 1f 09 51 cd 63 31 b4 f6 | 27 05 e2 58 eb 11 21 fc 74 8b a1 04 48 38 e0 4b | 3e eb 3c 47 9f e1 28 6a f4 cf cd b0 2f 86 fe 42 | 06 be 5c 6a f3 0a ed 96 af 36 41 a8 95 43 50 86 | 62 97 ba dc 54 cc 86 ec 1a 93 e8 8c 86 bd 6a fd | 31 85 d3 58 12 be df c0 96 2f 7a 9d 76 f8 ee 26 | 9a 43 6d a6 d5 f1 30 04 83 a9 49 c2 dc d4 6a 20 | 1a a0 77 c4 16 45 81 34 61 94 d1 87 44 ee 60 b8 | 64 38 4f 17 86 f2 34 5c ce 1a ca cd cc 73 9e 4c | ad 5d 12 fe 07 4f 80 6b 47 cd 8d 28 e2 55 47 11 | 39 18 ea a9 6c bb f3 f3 0f 8d 00 15 59 01 c9 80 | dc 86 1f df 0c f8 d3 db 42 55 8e 18 b9 71 3f 72 | b9 64 4e 7e 16 72 18 aa 5b 2f 5c 3c cd 00 ea 61 | 42 52 f3 7e 53 72 7f 07 33 50 b0 ec ed 4c b3 11 | eb 58 4d b5 c5 0b 02 4d 09 d9 c0 f7 15 fe ed 15 | 67 5b c9 94 30 44 36 30 17 51 bd 8f 69 8a 1e 07 | 29 00 00 24 67 c4 83 c2 98 c0 7a 1b 9f 67 5e 99 | 8d ac fc 2a ad 63 42 f3 d0 ee 64 a2 cf 91 5e 20 | 6f 96 d3 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 82 99 d5 30 8b 22 4c 45 76 09 65 | e5 33 b6 41 67 45 7b 6a 00 00 00 1c 00 00 40 05 | c8 40 1d 53 f1 98 45 16 51 e3 1b cc 43 1f 4a 55 | 08 fa fe d9 | libevent_free: release ptr-libevent@0x7fb364064990 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364044c30 | #684 spent 0.0822 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #684 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #689 | start processing: state #689 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #689 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #689 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #689 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.233109; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.992413 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364044c30 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #689 | libevent_malloc: new ptr-libevent@0x7fb364064990 size 128 "road-eastnet-nonat-74" #689: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #689) | 21 56 6d 63 c6 05 f9 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 01 41 94 ac c1 3b a7 91 84 87 0b a2 a6 2a 82 7c | 5e 57 2f 03 c9 50 17 da 1f 5e 13 47 67 fa 54 af | e1 23 cd 52 df c1 70 c5 84 49 39 0b c5 51 17 f4 | cd ae 0e 3a e4 ec 94 66 23 c9 e6 22 7e 29 fd 87 | 37 38 1c ba 2e c0 60 73 13 eb ed 91 72 d4 bf 43 | 0d 48 d2 56 0c 3e 10 c8 f6 a9 5e ca ed 70 78 7a | 2d 43 f8 86 71 ad ba a9 b9 a1 81 89 e4 be b1 13 | b3 4b e8 ac 5a 2b 85 9a 9a 62 39 e6 1a 55 c2 9a | ac ed 6f 11 df 6c a9 36 a9 00 2f 5c 57 3a b9 87 | 71 1f 36 18 9d 01 e1 48 c5 c3 af 45 89 3d 96 5f | cf f8 ab 91 0e aa d2 78 b3 52 d3 de be 97 7f cc | 22 0b ca 63 0a bf 49 dd ee 6f 9a 13 ec 7b 53 68 | e0 00 32 aa ec ee 18 65 94 77 ae fc 50 83 e0 b2 | 02 cd f1 17 f7 f0 40 67 a4 a9 46 1f 31 e5 bd 59 | 77 0b f3 a9 e9 64 9d 77 4a 66 04 24 1e 03 df a8 | 95 ea 8c 8a d2 17 91 f2 54 af 53 a6 c5 e9 b2 6f | 29 00 00 24 2a 05 3d 7b 18 e9 5f 31 aa 45 2a 05 | 20 70 d9 99 68 5a eb f1 da 1e dd 98 f0 5c e4 e4 | 18 70 b6 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 08 c4 7c 53 4a 07 2c 37 8f cc 44 | c1 c2 6f ad 52 2d df e3 00 00 00 1c 00 00 40 05 | 39 71 42 f9 c8 85 a0 ba 5e c8 87 85 6f 23 eb 57 | 95 ba a1 9c | libevent_free: release ptr-libevent@0x7fb35c0292e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #689 spent 0.0764 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #689 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb338017ea0 | handling event EVENT_RETRANSMIT for parent state #697 | start processing: state #697 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #697 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #697 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #697 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.233193; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.994079 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #697 | libevent_malloc: new ptr-libevent@0x7fb35c0292e0 size 128 "road-eastnet-nonat-201" #697: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #697) | d6 28 cf ed 60 7e b1 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc b1 dd dd 9c 60 58 a9 c7 66 fb 23 cc 00 f7 04 | f9 eb 9c de 8f 73 86 22 d9 42 30 60 08 2d ef 14 | b6 50 8f 0d 43 3e 37 57 d1 c5 18 fb f8 0e 88 30 | 19 36 6b 7c 74 95 4f c4 00 aa 6d 70 5c 70 e4 1b | af 06 97 50 19 89 6c f1 77 c6 1e 80 61 54 71 33 | 94 67 d0 e4 1e d2 49 c7 d2 75 26 40 9b 38 29 7a | 39 9e 94 88 0a 9f 90 00 cf cc cd 5e 03 3f 80 c9 | 9d a6 0c 03 5a c2 81 22 47 79 c7 4e 2e 63 70 6d | 12 be 62 03 d1 4b 3b 92 59 d8 c4 10 0b e1 2c 6e | 7f 5b c2 f8 db a0 f1 b2 bc cf 2f ab d4 30 81 0b | 99 67 12 c3 46 3c 3f 42 29 aa 13 3e e8 5b 5b ab | 4a 06 c2 00 9d 12 7b ba b5 20 f9 e2 1f 9d 2f 8b | 8a b3 7d e3 d1 57 14 4c 7b d3 d9 0d 11 12 94 15 | 53 16 e5 df be 4c 89 d6 26 21 be 1f 80 ea d2 39 | 1c 6b a8 aa 75 fe 2b 99 57 d4 00 58 a5 b6 36 c0 | 15 f3 d2 55 87 c4 0d 66 47 0f 06 26 0e 04 3c 5a | 29 00 00 24 01 24 ca b1 15 4b b9 0a 03 0f 6f 65 | 30 b1 82 99 4d 99 95 24 13 7a fc 58 9a 3d 81 dd | ab d4 21 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 3d a9 82 f6 57 1d d7 c8 a4 72 46 | 84 4d cc ed 86 24 ec 99 00 00 00 1c 00 00 40 05 | 92 72 21 f5 94 19 6f 86 30 0f 49 01 9c c4 ab f1 | 49 76 f6 3d | libevent_free: release ptr-libevent@0x7fb3600720e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338017ea0 | #697 spent 0.0616 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #697 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aa34c0 | handling event EVENT_RETRANSMIT for parent state #686 | start processing: state #686 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #686 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #686 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #686 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.233263; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.99865 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338017ea0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #686 | libevent_malloc: new ptr-libevent@0x7fb3600720e0 size 128 "road-eastnet-nonat-142" #686: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #686) | 5f 2e 8d 4e 01 51 f9 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd 75 c3 99 94 d0 49 6c f2 41 a1 b9 21 f5 f4 0f | cb fa c4 3c b6 ed 66 7c ab e3 f2 e8 2e 27 12 8a | 22 59 ec f0 2a 87 a3 8e 7d 1a b5 1d 4d 94 79 69 | 0a dc ad bb 09 9e 15 d3 e2 0b 37 2e 62 3a 5c 44 | 5a 6a 13 ea 8a d9 81 e1 06 22 79 83 c5 03 93 eb | 16 80 9f 99 2a b4 9e 4f 75 89 1d 81 11 99 98 ea | 06 e5 44 c5 95 02 6e a5 42 20 16 09 35 8d c1 5f | ad 15 d5 1f 1f 57 05 88 ea cc 92 ed db 06 fe 1a | 82 63 44 2e 13 aa 34 76 7f e6 11 5f 8c 80 0a e5 | 8d 1a df 42 51 89 87 1a fb 90 a6 5f e4 9a dd a4 | 37 21 fb b9 b1 e3 09 83 44 2b 65 7d 43 06 5b ba | 59 28 4d bc 02 9c 72 d2 e9 d2 e0 e2 4c 4e aa 00 | 99 db 57 fa a3 66 fc cb f5 dd e9 0d 8d 84 3c c0 | 7d 68 be c5 97 df 85 52 da 1e 7a e7 98 0e 8b 72 | 16 20 54 89 82 82 38 c9 be e3 78 0f e2 0f db 8e | a1 b9 e8 11 42 59 86 ce 1a 8a 3d 26 c9 25 6e a4 | 29 00 00 24 7c b7 7a e3 3e 1b fc dd 37 45 25 f3 | 05 14 6e 97 6f c2 39 be ff eb 0d 21 64 ca 63 97 | 3b d9 cf d2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 06 a5 99 5f ab 55 20 b5 39 ab 53 | 31 c8 5b 7c ff 84 61 13 00 00 00 1c 00 00 40 05 | 2b 33 25 f9 c8 cb 8b a7 92 5d f6 e3 73 04 ce 77 | a4 d5 c0 8c | libevent_free: release ptr-libevent@0x7fb38808b5b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa34c0 | #686 spent 0.0631 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #686 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c017ea0 | handling event EVENT_RETRANSMIT for parent state #694 | start processing: state #694 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #694 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #694 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #694 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.233332; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.995094 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa34c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #694 | libevent_malloc: new ptr-libevent@0x7fb38808b5b0 size 128 "road-eastnet-nonat-229" #694: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #694) | 0e 55 f5 b3 fd c8 f6 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 f5 ee 55 73 5c 37 78 44 5f 18 4c b2 81 47 42 | ae 69 a9 34 a8 d4 9d 0b 90 c1 b1 7e 21 7d 72 4c | 54 93 20 2a f2 92 1d d4 f8 1f 47 36 29 d3 1b 6f | 9a 19 dc 80 ff 6e c6 91 f9 df ed 9a 62 30 f5 01 | b8 f1 04 a3 53 8d 38 fe 98 e7 59 ff 4d 11 d1 c2 | 74 10 60 78 7f 69 54 ea 74 e4 4a 27 75 1a 31 77 | ef a3 4e c6 65 ff d7 27 b4 5e d2 ff 26 bd 65 43 | da 2a 0b a3 b3 5c 1f d0 f9 5c ec 9a e3 39 79 a7 | e1 b2 2d d0 86 12 11 06 eb 7c fb f5 44 48 fb 7a | 82 16 10 84 83 c7 1c 9c d8 e9 3c c6 7c 4a 9b 09 | 70 75 2c b6 29 44 4a 9d e8 e2 23 11 a1 c0 82 38 | b5 09 f8 00 84 ef 12 3d 23 43 5b 89 e5 8c ce f8 | 8e 3c ab d2 ca bf 1f 50 d6 c2 77 f8 1b a3 3e 00 | 3e 0e 9a 9d 92 de 61 1c 3d 11 7b 3b 3b f8 ec 76 | 6c 1a de 42 6f 88 09 08 2c 91 63 7d 68 40 9a 06 | d8 f1 66 a0 3a 37 85 ba fa cc 00 41 c2 2c a4 8e | 29 00 00 24 dd 94 ae 1a 9a 0b 75 c4 7b 33 4c 19 | 1c 5a d2 2d 58 3e 32 91 a4 73 44 86 a8 08 b2 01 | fb 46 4f e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 49 27 31 06 cb 4b e9 70 41 8f 8b 42 | 1b a5 d4 66 19 e2 60 f0 00 00 00 1c 00 00 40 05 | 17 ce fc 1b 0a 11 3f 06 90 32 ce 1d 91 fd 6a 88 | d4 bc 2d 95 | libevent_free: release ptr-libevent@0x7fb378068430 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | #694 spent 0.0623 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #694 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348012630 | handling event EVENT_RETRANSMIT for parent state #673 | start processing: state #673 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #673 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #673 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #673 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.233402; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.995625 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #673 | libevent_malloc: new ptr-libevent@0x7fb378068430 size 128 "road-eastnet-nonat-152" #673: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #673) | f4 4a f0 3d b4 3d 3c 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 2e 28 e0 6e 6b 91 36 e9 7b 5c 4d ea 67 f2 11 | 6c 53 9b eb c8 50 22 a6 67 a8 57 27 ba 98 9b b4 | e9 53 e2 e7 39 12 9d 1a b8 95 df 50 89 b9 6d 1c | c2 85 59 43 95 c8 ac 8f 53 d2 47 55 bc 74 a8 bb | 28 f3 ba 97 8e 1e f2 17 85 ea 84 b3 be 86 51 d1 | 91 38 40 54 bb 85 c0 e0 e5 d5 70 2b c4 39 db 6d | 4b 3d 95 a6 d5 18 36 7a df 3f c0 b2 8e 51 36 6a | ef 02 e1 00 c2 a8 6e a9 10 12 26 9a ee db 58 a9 | ab 3b 04 78 41 3a 3f 8b ee d2 5e 48 4b 71 7d f1 | 52 f8 9a 0e eb 76 58 35 11 da 4a 05 95 53 81 71 | 78 25 df 02 2e c1 be 80 18 4a aa ee 79 3d 23 07 | d3 1a 11 f7 6e 6b 01 33 c3 1e bd bb f0 b7 41 e4 | 2f ff af 8b 2b 73 a4 f1 55 39 a1 c2 31 b7 e5 bc | 14 4f c1 d1 0c 4f 37 65 44 1f 1f 08 6a 1f 2e 2c | 11 ed 27 fa 13 cf d7 f1 1d ea 05 12 6d df ec 05 | fc 26 9c 3b 34 42 df 39 1d 37 77 1c be a4 76 ec | 29 00 00 24 ab e5 f6 4a 5c 04 aa f5 86 05 1c 45 | 9d 40 23 0d 87 34 72 f6 2c d5 7d fe a7 24 93 f6 | e4 ca 8b 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 0f 59 d6 bf b6 98 37 0c 06 6e b8 | 72 17 35 a4 3d ff 36 60 00 00 00 1c 00 00 40 05 | da e9 98 a0 13 2a 7f 02 39 d7 88 7e 43 33 16 b8 | 3d f0 bb d6 | libevent_free: release ptr-libevent@0x7fb37407a8b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348012630 | #673 spent 0.0636 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #673 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a56dd0 | handling event EVENT_RETRANSMIT for parent state #680 | start processing: state #680 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #680 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #680 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #680 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.233473; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.996427 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348012630 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #680 | libevent_malloc: new ptr-libevent@0x7fb37407a8b0 size 128 "road-eastnet-nonat-111" #680: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #680) | f5 24 ca cb ba 88 21 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 2c 8a fa 61 5b dc 75 21 43 9c 59 cd 19 1a f2 | af b9 0a dc 0c b9 2c e2 bb 4a 6d 4d 55 00 0f 6d | f7 55 26 a5 be c3 6b d0 d6 97 e8 89 bd 9b af d2 | 2f a7 07 fa cd 16 db 98 51 25 2f 47 ee 80 b4 75 | e5 4e c2 eb f9 dd 90 41 c4 eb ff 65 55 5a 16 e1 | 0a 63 9d 2c a4 d7 be 5f bb 29 e9 20 d4 b4 c6 c0 | 19 93 f4 ab e8 7c 18 0f 67 18 9d b1 ee e2 c4 b3 | db 86 22 91 09 29 2e b1 6d 58 cf 74 cb b0 f3 dc | 97 d9 3b fe 88 19 02 5d 3d 14 58 0a 5f 84 05 fc | ca 52 61 f1 b4 87 0b 56 9d 30 94 86 cc 24 e5 40 | f9 97 d9 e9 cb 69 4b 23 cf 2e bf f3 2b 4d 07 51 | 51 02 3a d7 fd 40 d4 5a a1 f4 0a 03 09 91 da ee | 03 72 0d 0f a8 f4 7a a3 cc 70 63 19 72 ce 5a 82 | 3e 1e 95 5c 92 5c 3e 8e a5 d8 b6 96 00 19 c5 14 | 30 e1 2f b7 0e bc 81 b8 ab b7 09 95 46 2e c8 74 | df cd ec 80 52 5f c9 db f8 06 24 81 85 22 9d a7 | 29 00 00 24 a5 87 f1 2f ce 48 12 7d 6a 67 59 4f | 79 27 34 b3 a6 cd 32 d2 99 ca 81 34 03 a5 ff 6e | 74 fd e5 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 d0 80 55 09 28 92 96 a1 13 47 05 | 9d f7 2b dd b4 58 66 92 00 00 00 1c 00 00 40 05 | 6d 86 77 16 04 78 0f de 20 5d c4 c9 23 72 82 0b | af 53 d4 25 | libevent_free: release ptr-libevent@0x7fb38407bf50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56dd0 | #680 spent 0.0612 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #680 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb360018460 | handling event EVENT_RETRANSMIT for parent state #565 | start processing: state #565 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #565 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #565 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #565 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.233541; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.93747 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56dd0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #565 | libevent_malloc: new ptr-libevent@0x7fb38407bf50 size 128 "road-eastnet-nonat-51" #565: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #565) | 62 cf 87 14 c6 62 30 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b a0 88 20 e4 4d 45 6c f9 cd ab 1d a2 7b 8a 77 | 3f 3e dd 83 a5 c5 aa 0c 1c dc 89 10 ec 2e 1d 4c | 42 5c ef 6d ad 49 b0 1e 60 9d 8f 8c b6 97 91 1e | fa e2 a1 97 aa fe 08 0f d1 4f 8c 96 f7 66 97 1c | 6e fb 33 4a 4e 60 96 cf 7f a6 af 09 ab ce 9a 08 | 5e 64 35 ec 21 8a c2 bd 2b 50 c9 95 3c df 67 bc | 76 c2 a3 99 52 f2 44 a3 ba 7f 1b 9c 6c be 57 71 | 7f aa ab d0 89 27 ef cd 3c c8 cb b6 a6 56 b0 2a | dc 32 81 f2 b0 96 30 77 84 9d 47 bf 9b 70 ae 9a | c7 54 8e 37 07 9a 5c 45 ac fb 14 0f 30 d7 f4 3e | 00 53 c5 25 30 e9 b3 2b a7 d9 d6 c7 f1 6c ee b4 | 31 ce 1b b5 18 a7 ca cc 86 23 9e 01 75 cb f1 23 | 0c 74 c8 3b 22 ea 10 cb 1f ed bd 4b f5 15 a7 9b | 8d e7 27 21 43 d9 02 bf 4e 4f 28 80 57 9a 76 c3 | 87 dd 7c 2f d5 cb 47 73 51 a8 31 7d f5 87 87 1b | 7f 53 02 3e d3 de e6 6a 94 c6 04 77 83 8c 4f 18 | 29 00 00 24 73 13 83 30 bb ab 6e 91 50 8f 5b d1 | 22 88 91 f8 87 52 43 c0 f4 4c b0 a5 9d 49 2d 93 | 43 f4 73 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c1 96 b5 11 12 39 51 2e 15 f5 5b 59 | 6a a7 e2 36 4b 38 a6 bf 00 00 00 1c 00 00 40 05 | b3 11 8b 4a 03 6b 06 af b5 74 1c 0f df 6e b1 a0 | d3 aa 16 5d | libevent_free: release ptr-libevent@0x7fb3540597d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360018460 | #565 spent 0.0629 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #565 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2e150 | handling event EVENT_RETRANSMIT for parent state #663 | start processing: state #663 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #663 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #663 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #663 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.233612; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.988097 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #663 | libevent_malloc: new ptr-libevent@0x7fb3540597d0 size 128 "road-eastnet-nonat-84" #663: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #663) | 79 3e ba b8 29 05 87 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 33 bb 34 f3 54 37 c7 8c dc a0 f1 cf 40 e8 73 | 4d 61 cb fb 80 2d 1a 01 88 6a 8b b8 01 53 25 2c | 65 96 5d ff d7 d3 f4 f3 eb de 8f 2e 9d 25 1d ba | 62 be 02 e6 a1 b3 d0 12 26 cc d4 67 6f 8d 33 f6 | fb 60 8a a9 03 0f c4 ae 02 35 7b 99 4e e1 16 a5 | ee d3 5b b1 65 88 dc 22 5a d0 4d 4e ee 2c c0 24 | 46 97 dd a5 48 e2 b0 56 80 9b bb 68 ed b6 e4 a6 | 82 5d 86 21 c6 56 4f 00 61 9e 48 83 5d 1c ae 1e | f0 fe e0 f9 d0 af 09 19 1a e7 0d 36 81 b4 ef 45 | fc 89 2f 75 93 ae b9 f0 57 e7 58 2b 67 f7 d7 fb | e1 1e 09 48 c7 72 2b be da 88 0d c9 88 d7 8e 37 | df a2 95 e3 05 1c 20 c9 19 12 4a a3 c8 92 ca 0d | 93 be b7 87 ef 2b 8a 9c d5 f2 5d 84 18 5e cd 93 | c2 8f 56 ff 9f 94 a6 a4 04 ca 9a 36 29 04 c1 ac | 0f c7 63 2e 86 54 2d 98 d7 53 7a 9f fa 34 32 25 | 82 89 27 91 24 d9 51 66 79 76 cf e8 c1 b8 34 a5 | 29 00 00 24 f2 12 89 96 be 24 7d dc 10 f3 fa c9 | 66 8f fc 3d 79 cf 4b f7 e2 58 a9 f9 9e 41 92 7e | 29 7a 39 ee 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 49 16 1d 85 03 57 22 43 2e 01 a2 89 | 42 fd 2a d3 68 48 40 6e 00 00 00 1c 00 00 40 05 | 88 4c 7d b9 50 dc 42 1f 7a 10 6e e7 7e cd db 07 | b5 a9 ee e4 | libevent_free: release ptr-libevent@0x7fb33807fef0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2e150 | #663 spent 0.0622 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #663 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #589 | start processing: state #589 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #589 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #589 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #589 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.233682; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.957209 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2e150 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #589 | libevent_malloc: new ptr-libevent@0x7fb33807fef0 size 128 "road-eastnet-nonat-55" #589: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #589) | d3 af ea 9d a0 c8 f5 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 de 4e 18 e6 1e 19 90 6b f7 90 15 af f6 7b ab | 4e c8 ce d7 0b 8e 81 b9 f2 4f 1d 4f 5c 24 63 06 | 65 52 bc 5a 83 ff 1b 21 cb 72 47 f8 8a e5 91 bf | 57 3c 5e f9 8a 0f 69 ef dd 9a d9 96 96 d3 e9 53 | 62 6d 85 78 9c cd f3 37 3d c3 3f cf 12 49 52 71 | f1 91 04 7a b7 09 2f 96 56 e2 dd 46 62 33 b5 bb | ad 3c f9 d1 69 f8 6d d3 fc 9b 28 0f 28 e0 3e bf | f2 8d 28 0d c0 bd 56 d2 fc f5 11 53 c5 5f 98 5e | b5 0e 16 d8 79 1e 33 2e 4d 24 12 5b e7 2c e3 82 | 41 23 5b 9c d9 c3 1b 4e c2 1c 19 6a a5 1e 04 2e | 8f c8 de 18 5d d7 71 bd 41 ae f2 b5 79 ea 41 40 | 17 cc b2 ac f4 29 ea 95 03 3b 8a b9 65 ec 40 16 | 4f a4 1c c9 6c af b5 25 5c 3f 1a 3d 18 fe 4c 4f | 96 cd 0e a4 e1 ca 37 96 3c 03 bf a5 07 0a 64 5f | 91 2f ea fc 4d 6d 98 68 7e 74 f7 83 b0 39 d7 b8 | 05 fa 66 7a ad 18 d9 82 14 ae c6 e8 1d a4 b3 22 | 29 00 00 24 8c a0 dd 88 ca d4 16 c6 d2 19 83 fb | 91 96 4d 43 b6 4d b2 a0 b1 2f 06 3d 0c a8 88 7c | 52 87 c6 7a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 52 21 ef 0c fd d6 a8 97 22 3e 1c | 84 a2 1f 0e d5 18 e7 d5 00 00 00 1c 00 00 40 05 | 1e 9e 9c e9 d7 26 c7 2f ea de f3 cf 5b ae 57 9b | ea f6 3e d1 | libevent_free: release ptr-libevent@0x7fb380075050 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #589 spent 0.0611 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #589 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb338012bf0 | handling event EVENT_RETRANSMIT for parent state #675 | start processing: state #675 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #675 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #675 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #675 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.233751; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.987285 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #675 | libevent_malloc: new ptr-libevent@0x7fb380075050 size 128 "road-eastnet-nonat-172" #675: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #675) | 85 15 01 85 89 d4 29 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 27 d4 44 6c 1a 22 e8 b4 f7 a6 6b ca dc 02 79 50 | 66 16 b2 bd d5 ad b1 28 e9 83 fb 87 0f b0 39 1f | 85 0a 4c 67 84 5a 26 d0 a8 55 ee 04 95 94 30 6a | 8b 2f aa d3 6a 76 aa f6 4f 30 a2 ed 90 5e f2 5a | 20 ad 0c 4f dc 59 2a a9 a0 b9 a8 76 de cd 23 64 | 4f 9a 8d b3 29 80 5a c0 ac 02 65 83 3e 73 4f af | 83 bf 4d 9d d9 08 a6 6d 2b 14 3d dc 93 82 28 2c | f5 61 0c a2 f1 30 b4 2b 77 cf 96 6d fa 79 62 e9 | 63 f1 85 76 cb bf 4a 7a a7 6e b2 0f d2 81 ef 19 | 8b 21 8c b4 9f 3f 24 a6 9f da 8c 47 53 28 64 05 | fb 7d 95 f0 ba d8 43 62 9a ae 0b 9c e0 5c 3a fb | b4 7a 35 d6 09 67 28 a4 a9 e9 29 a4 8a 02 01 83 | a9 7a 2f c2 42 8f 69 ec 36 92 a5 62 86 bc 6e 90 | 30 c1 46 27 0d 35 15 d4 e6 60 3d 5f 12 ff d2 11 | 5b 76 4e f3 c6 f5 a0 f5 20 2c fb d4 41 40 b5 03 | 62 81 86 c6 eb ed 0a c9 13 24 16 5c 02 3b c0 ee | 29 00 00 24 9e c2 e6 fc 35 e6 0d 46 d5 b0 34 c9 | 0e 50 aa 4b 78 0d 91 95 d1 89 b8 a7 4b 5a cf a5 | b3 98 e6 f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 c1 ac 8a 35 e1 18 af 1b 41 18 3d | da f3 7c 9c 54 2f 3c 44 00 00 00 1c 00 00 40 05 | 3b bf 96 55 32 21 74 25 91 ac 0c f9 c5 3a d7 f4 | 94 b6 78 27 | libevent_free: release ptr-libevent@0x7fb3740750d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338012bf0 | #675 spent 0.0614 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #675 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad6ec0 | handling event EVENT_RETRANSMIT for parent state #567 | start processing: state #567 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #567 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #567 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #567 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.23382; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.941046 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #567 | libevent_malloc: new ptr-libevent@0x7fb3740750d0 size 128 "road-eastnet-nonat-130" #567: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #567) | 96 df 1a f7 12 b2 bc 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c 62 fd af 90 2b d8 09 e9 e2 92 5c d3 5d ff be | b8 74 9f 04 03 97 8e 9b 87 54 08 07 bc 69 63 5c | 4f 7e 94 26 99 2b 45 4b b4 3e 6a bd e9 bf 50 b1 | 32 c2 e1 9e 38 52 46 f5 f2 58 78 3e 50 20 3a 74 | f6 e9 d3 83 40 c0 04 2b de 3a cc cc 33 57 e8 e4 | c3 b8 f3 a1 07 1c a7 aa 33 bf fa f1 88 41 d1 8f | 1c 54 38 a4 0f a0 74 99 19 cf dc f3 37 2e 9f 7d | cb c6 ff 33 e7 c4 87 6d b4 fc 2c f8 0b d2 97 fc | 95 94 a8 fc c3 8e 19 7e db 7c 13 30 0e 23 df 10 | 95 1c a4 5e cb 4f f7 55 14 48 f9 01 0e 0f 65 55 | b2 e9 d7 a8 7f 12 ac 8a 4e 27 61 a0 92 a0 7c e2 | 06 89 a0 28 48 73 b2 44 05 78 cf b7 27 b8 cb 46 | e0 4e 1d 1b 19 80 1b 07 1b 7f 13 f8 83 25 91 17 | 55 8a 26 9b 93 51 86 39 92 c7 48 b5 62 5f c4 da | 35 11 c7 be 49 10 bf 43 bb fd 6a b1 b8 23 97 53 | 03 3d 3d d7 05 a5 04 a6 4b fd 36 20 d4 50 2d 15 | 29 00 00 24 2d 33 44 b7 62 bd a9 aa c3 a6 92 61 | ee c6 40 8f 89 af c2 08 6b d9 9a e5 24 30 97 38 | 3e b1 2f 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 cc 91 ff 67 bb 9d ba 9d 71 c8 73 | 66 2a 2a e8 17 18 8e 7d 00 00 00 1c 00 00 40 05 | 5f 92 72 26 a0 e4 d9 83 b3 70 5e 9c 4e 05 aa 9e | 38 2c ea d4 | libevent_free: release ptr-libevent@0x7fb38805f660 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | #567 spent 0.0625 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #567 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #678 | start processing: state #678 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #678 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #678 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #678 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.233889; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.997139 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #678 | libevent_malloc: new ptr-libevent@0x7fb38805f660 size 128 "road-eastnet-nonat-41" #678: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #678) | 6f 4b 14 c1 cc 6f 1e 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2e 9f 0d f0 04 66 77 dd 93 01 97 d4 e6 2f 63 32 | 08 d5 90 21 20 45 70 7a 23 d4 d5 21 f2 1e 5d 61 | d1 38 f7 cd 0d a7 dd 8c 8d 4e d1 19 04 72 f0 60 | b9 a1 be 10 b3 d5 d9 6f 71 a4 43 ab d4 47 03 ef | 16 17 71 a7 79 4c e1 97 0b 36 26 91 25 a7 46 06 | 06 c6 86 a0 3d 48 06 59 81 9f 8c 4f 63 ff e7 cb | 43 e1 16 d1 2e 14 d6 59 c4 4b 03 1f 4a 2a b1 68 | 2e 3a ca a3 c0 9b ec 0d 92 cb 4f d7 26 c4 23 f2 | 7c d5 4f ba 74 f9 b7 a5 8e 7b c3 80 00 1d 25 ca | c8 b6 e7 a7 82 b3 c1 78 86 73 3b e9 bb cb dc 9e | 16 a5 8a cc 34 90 c8 2f 6d 13 78 e8 e7 19 45 83 | dc 57 56 49 3f bf 58 bc b2 bb f5 33 21 2c 25 1f | a6 7d a4 87 88 3d f9 0c 01 74 fa ba fa 6a a3 ea | 56 23 6e 54 12 c1 f7 82 be 6d 43 68 51 8c 0d be | 08 4b d8 2e 8d 59 7c 26 08 c9 1c b1 04 3b b0 54 | bc 1d c3 bf f4 25 5d 1b 85 94 1b 71 be ed 0f 44 | 29 00 00 24 4e 75 ec 55 47 ad 1d d0 2c e8 2a 32 | 3b 96 41 fb 18 33 b6 2f 27 93 6f d4 fa 16 90 bd | 2c 77 4a 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 38 05 46 29 58 72 8b 7e ef 72 dd | 2e 27 17 90 79 5b 4e 74 00 00 00 1c 00 00 40 05 | 18 2e f1 a2 ca 0d ed 2f 55 5d d8 98 ad 86 50 39 | 38 85 67 2b | libevent_free: release ptr-libevent@0x7fb35c0bc1e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #678 spent 0.0624 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #678 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a46910 | handling event EVENT_RETRANSMIT for parent state #599 | start processing: state #599 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #599 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #599 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #599 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.23396; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.9609 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #599 | libevent_malloc: new ptr-libevent@0x7fb35c0bc1e0 size 128 "road-eastnet-nonat-64" #599: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #599) | 66 fe 40 6d 20 a0 8e c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 14 ec 7e f9 cd 40 f5 de 65 65 51 82 b1 59 1d | e2 b1 19 0c 5f 42 c2 c5 f2 9e 9f 81 38 a4 92 07 | 55 02 a7 a3 99 20 d2 9d 43 eb 91 a3 1f f5 e1 6a | ac 0d 32 90 d1 6d 6d 3a 90 4a ce 17 12 9d 8c 47 | 7f 85 c0 17 84 a9 65 8a 07 e7 29 51 ac bc 5a bb | b5 62 41 b7 ff 6d 04 9f 02 f4 2c 6c 75 b6 4d e5 | ee 4c f0 36 66 9b aa 3a 2d 8d 7d de 94 5b 92 78 | f4 41 fe 7f 33 1f 2f 29 ac c1 15 b4 b6 4a 26 c7 | 44 40 c8 70 6a cd 04 43 6d a5 b7 76 59 c0 45 92 | 8f 55 81 59 a2 e1 56 33 98 b8 16 29 a8 ae fe 63 | 1b 33 5e 5c a3 3c 37 83 85 62 21 28 50 5e 0d 07 | 88 ad 15 73 a5 30 b6 de 4a b6 16 ba 2b d9 18 62 | cc bc 5b 60 dc b9 95 66 a2 af af 8b 80 0e c8 c3 | 2b ea da 66 ba 0a 43 87 f9 ca 7e 08 04 24 6f de | b2 f8 b8 8f 58 ce 58 e7 2d 3c 4f 86 18 6d 41 84 | be 0d 41 9c cb 28 5c c2 7a fb af 81 ec 08 20 4d | 29 00 00 24 da 51 a7 0b 53 11 86 4b c3 b4 4e 3b | f4 a2 e2 0f d9 7b 58 4a f2 c9 2a af f2 68 7d b8 | b9 d1 af 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 33 56 1d 93 89 b2 9c ef 86 78 c9 | a2 2d bb 3b 37 fa f6 3c 00 00 00 1c 00 00 40 05 | 92 86 b4 ce 70 36 ee dd 1a cd 75 09 22 54 37 7b | f9 8e 38 96 | libevent_free: release ptr-libevent@0x7fb3440646e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46910 | #599 spent 0.0618 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #599 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34802ef50 | handling event EVENT_RETRANSMIT for parent state #603 | start processing: state #603 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #603 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #603 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #603 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.23403; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.95804 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46910 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #603 | libevent_malloc: new ptr-libevent@0x7fb3440646e0 size 128 "road-eastnet-nonat-94" #603: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #603) | fa ea 40 d9 66 be 9a 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 92 c5 c1 75 76 e2 67 5a 25 6a 0b 6a 26 d9 00 | 60 88 8f a2 09 bc e1 34 ad d9 cb d7 8f 0c c9 fb | 5d 34 e8 7a 58 2c 44 52 32 ff f3 22 30 6c a9 46 | 04 15 9a 62 ca cf b2 db c2 74 ba 23 f1 4f 38 d1 | 41 e3 74 a5 ba b3 6d 59 07 f6 3b ea 03 a8 2b 84 | a0 ed 8d 1c c1 de 56 07 5d c4 0b 77 93 2f 7b 97 | 14 b0 d1 04 7b b9 0f f9 37 a9 bc e0 4a 4f 00 f2 | 2d 96 5a aa 23 a5 de 2a 49 0f d1 e1 16 3d 5e c0 | ad 4a da ab ad 5b 58 e6 5a 4f 98 f0 fc a6 f1 b7 | 23 d2 f2 3b e5 a7 21 e7 ea e1 cd 13 d1 70 91 3a | 21 85 1b c9 4c 39 e7 cc bc a4 f6 9c d6 c5 38 7d | 67 8f f8 b4 07 fc 7b 89 3f 70 75 29 51 a4 a4 f6 | f2 64 d3 35 1a 69 f9 96 67 39 7b ea 78 c8 ec c0 | ee f5 ef 8b fa 9d ea d8 61 b7 28 83 06 af 52 08 | a9 ac 31 1a a8 b0 a9 01 03 7b 63 e4 2e d4 f8 cd | 6a 2c 19 36 b8 74 36 aa da ff b3 99 0c f5 14 c0 | 29 00 00 24 c1 66 a4 b2 e8 08 5a f7 00 1d be e4 | 4b 24 90 f6 2d 3e 76 77 76 ca 57 42 50 10 a0 64 | 0f 04 48 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 e6 7e df 78 16 4d e7 97 e4 d0 17 | 4d c7 b1 fe f3 78 c1 ee 00 00 00 1c 00 00 40 05 | b6 73 08 f2 9b c6 7e f9 57 b7 a7 5f 43 dc 0e 73 | 16 6a dc 75 | libevent_free: release ptr-libevent@0x7fb348064130 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34802ef50 | #603 spent 0.0879 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #603 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374014870 | handling event EVENT_RETRANSMIT for parent state #709 | start processing: state #709 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #709 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #709 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #709 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.234139; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001014 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34802ef50 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #709 | libevent_malloc: new ptr-libevent@0x7fb348064130 size 128 "road-eastnet-nonat-183" #709: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #709) | e5 c7 07 55 6e da 09 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5d de 77 2e 7e b4 97 76 d0 4c 88 3a 79 73 30 47 | a5 46 d9 6c 5e f5 d0 01 a8 f5 90 31 3a c3 34 0b | 92 a1 bf c0 52 89 73 d2 41 a6 c8 7c 00 32 8c e0 | 61 01 06 67 0c 70 09 f6 a3 5b 63 77 2c c8 de bd | 50 05 fc 33 a9 33 71 99 83 df 95 2b 2d 8e 13 82 | 7b 7a 49 72 f3 f8 5a 2e 90 58 f7 40 01 a5 24 bb | cf b8 85 6e 52 34 58 c3 42 27 86 ff b5 01 d2 91 | e4 1c 23 fc f2 c1 af 9b 00 10 9e 1a a4 65 99 ca | fe 91 39 7f 9e c5 f3 e1 49 f5 22 78 d6 1e a3 72 | fc e2 3a 47 8a 3c d6 21 02 38 d3 6e 42 de b9 8e | 44 7c 9f 39 9d 77 79 b7 b4 a9 f9 4c f7 02 43 2d | 3e 2b f9 30 d4 a8 a6 b4 68 42 af 60 21 e7 59 96 | 67 d3 1f a3 61 53 50 45 15 9f 37 19 16 e9 8d ad | 1d 5f a6 91 01 82 07 22 2e f0 8d a4 82 14 28 84 | 82 79 d1 ee a4 a1 98 83 13 94 d9 2c 49 f8 36 3c | 29 2a 04 0d bf 91 91 f4 08 b0 48 0b b6 ab 6e 6b | 29 00 00 24 fb fb fc 22 69 7b 64 5f 88 e3 11 6e | bc 63 54 30 45 65 33 a0 dd 21 67 36 78 c5 19 65 | 52 ac 92 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 a3 44 a6 ca 0c 6a 2b 8c d2 4e 18 | f9 96 bb f1 fa 97 0c e7 00 00 00 1c 00 00 40 05 | 23 4f 11 65 7a 64 9b ff 7f 73 c3 02 6d 1c 2f c1 | e4 ed 89 d4 | libevent_free: release ptr-libevent@0x7fb374054140 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374014870 | #709 spent 0.0762 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #709 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_RETRANSMIT for parent state #690 | start processing: state #690 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #690 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #690 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #690 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.234209; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.996832 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374014870 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #690 | libevent_malloc: new ptr-libevent@0x7fb374054140 size 128 "road-eastnet-nonat-76" #690: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #690) | a5 d8 1b 6e 95 a0 38 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca b3 24 9a 21 6f 60 b3 71 d4 ab a0 25 f7 eb d1 | cb b9 58 9d 93 b9 4d 31 b9 bf af f1 80 33 51 9e | b5 91 2a 1a 69 85 ec 97 c2 f1 f6 7b cf 0f 98 34 | cc f0 78 7e 20 72 ca ec c1 db 9d af c5 94 72 f0 | 9d 8a 9c 63 61 d9 79 76 b4 d5 ff b6 88 bc 5f 00 | f9 44 90 fd 47 4f 4d ef 33 81 b4 03 24 b2 94 be | 87 74 8d ec 7f 31 ff a0 b9 7a 06 f4 90 af 20 b4 | d9 9a 9c db df 5e de 7a 83 76 4f 3b f9 bd 20 fc | 39 b4 48 b8 7f 01 a8 08 13 de a8 58 cb b0 5a 11 | 7d 48 1d 19 b5 3b 92 c4 7a 09 9c bf 77 f3 7f 94 | 69 63 88 b2 cc c5 dd f2 df 7b f2 15 b7 7d d7 15 | 62 ec fa 8e 1d 1f f7 e3 89 53 47 50 af 55 33 77 | d7 34 f4 ef 07 86 c5 df 5b f7 cf 26 c2 e4 b6 41 | ba 90 ea 4c 75 6d 9b 74 97 2c 57 b6 c4 94 c5 0c | 7b 86 0a 36 9e cd da 67 90 23 e3 e4 2b 85 7e 93 | cf 87 12 15 81 f9 76 1c 9a 69 94 6a 02 3c b9 8e | 29 00 00 24 86 ae f8 9b 15 cc 78 e0 7f 55 66 22 | 35 e0 b7 21 54 8a fc 02 7b 9e 59 11 ce d8 be 06 | f0 76 9a e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 b6 97 31 de cc 72 d4 ce 22 00 8a | 2b 89 e8 30 bf 2f b6 28 00 00 00 1c 00 00 40 05 | bf c8 d8 e9 c5 00 38 c5 98 1c ab d5 6d a7 2c 3e | 8e a5 66 03 | libevent_free: release ptr-libevent@0x7fb36c07d450 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | #690 spent 0.0627 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #690 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad17c0 | handling event EVENT_RETRANSMIT for parent state #546 | start processing: state #546 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #546 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #546 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #546 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.234279; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.951481 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #546 | libevent_malloc: new ptr-libevent@0x7fb36c07d450 size 128 "road-eastnet-nonat-173" #546: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #546) | 6b b3 b7 0f 25 55 d0 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6f 97 dc 92 f6 4f 2c 9f 64 e9 38 e7 a8 c9 b6 7e | 05 ff cf 3a 5e 05 b6 cf 17 cf 8d ed 48 a3 fa 9f | 24 a8 a6 41 91 3f 77 df 02 a6 05 bb e5 ab cd 67 | d8 25 b1 f3 b8 14 51 43 76 86 a6 c8 d3 ba b6 18 | bc 07 8c 01 94 c0 38 ea 24 cf c6 97 ad 4b b2 b6 | 6f bb 4c fe 23 3e c7 46 59 8c c5 fd 43 6f df ce | b5 5a 0d 2c dc 35 13 65 e4 12 f7 f9 80 cc aa 20 | b5 ee c7 5a 5a 70 15 d1 3f c3 8a 67 09 11 af 09 | 16 32 b4 53 41 90 67 c4 cd f6 da ec eb 5a 4a 3f | b2 29 22 df ae 11 4b 8d cc 3a 05 6f 94 4f ad 1b | d7 60 13 20 46 f2 cd 62 12 6a 44 77 94 47 13 c4 | e5 1a bb 0c f8 12 56 21 05 7d 6d 2b 8c f3 58 da | 44 da 7d 6f ce 51 7e 8b 6a af ad 31 4a 3c fd a3 | 30 aa 0f f0 5b 6a da 87 b0 6b 48 55 97 b6 71 a6 | 60 8f d8 d4 aa a0 85 a4 40 0d 91 d0 21 6b 4b 63 | 73 9c 09 ed c8 c0 5f 4c fa cd b4 f8 56 de a6 a5 | 29 00 00 24 ce 6f 16 bc f3 6d 4e 88 a3 1b 4b 4f | 8a 74 cd 2e 04 10 e5 12 90 b1 40 e6 d6 57 95 4a | 49 93 ce 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 2a 45 97 7e 21 38 1c 72 a0 dd 2d | 3c 55 6e 57 52 8e 65 fc 00 00 00 1c 00 00 40 05 | 34 35 71 3c 6d 6a 9d ce aa 0f 6d 3a 2b eb 4b 95 | 7e cd 31 4e | libevent_free: release ptr-libevent@0x7fb388064e90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad17c0 | #546 spent 0.0611 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #546 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a92f40 | handling event EVENT_RETRANSMIT for parent state #666 | start processing: state #666 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #666 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #666 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #666 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.234348; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.982799 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad17c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #666 | libevent_malloc: new ptr-libevent@0x7fb388064e90 size 128 "road-eastnet-nonat-141" #666: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #666) | af 55 d1 c9 76 35 30 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c a3 85 78 4d da 5e d0 32 3e 9d 3d 1a 3d d3 8c | 75 15 1f b6 cd 02 be d3 50 94 f0 58 88 ee b8 fc | c3 9d d9 05 29 33 e6 db b9 03 a3 91 03 b9 32 e2 | 8d fb 3b 7d 1c 57 d3 23 cc ff 02 0a e8 64 c5 f1 | e9 72 3f f6 5e 2f 3d 0a 9f 40 47 53 42 c4 5a 15 | 56 44 cd da 2b f5 35 b4 37 9d 04 5d 25 e6 c0 9b | b3 63 e8 21 ae c1 4f bc fd b7 b4 1b 32 47 ef 1c | 87 37 97 c0 17 13 75 a3 52 27 4c 6b eb 0e 51 30 | d3 3f 38 9d 4d 1b e4 dc 3e ff 0a f9 c7 c5 15 46 | 17 54 ca 31 e4 f9 c3 f7 5a fe 09 54 b8 94 74 b2 | b0 37 00 fa f9 27 9d 2b f7 90 e1 a7 8d f1 47 7f | e5 3b cd 7d 99 d8 c5 f7 ca ba 6e c7 10 b5 29 30 | dd 2c 8d e4 5c 1c f8 af 25 ac 3f 4d c8 75 38 48 | f5 61 6b ae 49 2f 44 0d d2 eb a5 27 c3 0a b7 53 | 3e b0 4a 01 d2 cc 09 c9 d4 f8 e4 3d 8d 15 85 bd | 63 cd 9a fe 1f 70 56 b3 af c7 75 be 72 96 94 7b | 29 00 00 24 de 7e cf 42 4e bf 8e d5 7b 3b aa 12 | 1e 0d 89 09 17 65 63 a9 70 48 ad 13 bd 01 8c 63 | 96 2c 21 7c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 21 75 3c af 69 72 49 98 23 f2 8c | f4 76 7b 19 c1 d1 00 01 00 00 00 1c 00 00 40 05 | 6a 1a 2b ed 94 cf f9 2f b3 a8 2d 85 01 1b c3 59 | 84 9c 27 2f | libevent_free: release ptr-libevent@0x7fb370069fb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f40 | #666 spent 0.0626 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #666 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c039e80 | handling event EVENT_RETRANSMIT for parent state #555 | start processing: state #555 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #555 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #555 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #555 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.234418; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.954015 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f40 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #555 | libevent_malloc: new ptr-libevent@0x7fb370069fb0 size 128 "road-eastnet-nonat-133" #555: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #555) | fd 31 e4 af 59 3e ae 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 85 72 9c cb 7c 09 f8 23 fb f5 57 cd 4e 83 b6 | a0 e6 5a 64 5e 52 19 6a 4f a7 4e e3 ab 51 d1 ee | b0 ba 52 7b dc b8 e2 a2 b5 3d 66 0c 60 98 2f 4f | 13 c0 96 12 cc 2c 3a 0e e9 91 83 23 1e 4e 39 c6 | 9f d6 0d da 47 3d 42 93 4d 91 c2 2f 26 04 15 c3 | 41 c4 f8 0a d7 03 ee 39 9f 96 ac c4 3e 56 6c 05 | 15 ec 80 86 ac 76 e0 e4 08 62 35 f8 6c eb 25 c5 | 19 28 f6 9a dc 30 d8 8a 67 5e 34 70 48 34 07 96 | e2 ab 1c 7f d5 2c e0 8a 96 fd 4e 98 8d 6c aa ee | 67 4d d3 dc 1e 6c 3d db a0 95 a1 d5 a6 74 27 2f | b7 3e e6 fe c4 ac 66 d7 25 d1 4f 42 90 09 08 6d | 35 3d 9b fe f1 b0 50 00 be c3 ae db 45 71 57 2d | 99 1c ee 2e fa c8 1e 96 ae 9a 9e 66 4e ff 6a a6 | 84 c5 c3 4f c1 1f de cc 77 17 f0 b0 1e 9a 28 0b | 55 f0 78 ac 8b b4 71 fc 1a 17 41 e7 6a 74 62 62 | 3d 84 68 6d 3f ac fc 48 f6 30 13 2d 70 6e ad 53 | 29 00 00 24 71 32 1e 88 23 ee 2f ae 39 9e 7b 59 | 41 2e 3a 0b 57 4e 0c 80 35 cd a7 35 65 8c e6 b2 | f1 87 a1 b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 53 72 74 e1 5b 37 7b 33 b0 17 78 | c1 64 62 a5 7c 42 0a ec 00 00 00 1c 00 00 40 05 | ff 46 61 3e 66 71 bd af 2e 4c 91 0c 25 ae 93 92 | d3 06 93 2d | libevent_free: release ptr-libevent@0x7fb37c08aed0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c039e80 | #555 spent 0.0628 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #555 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348039e80 | handling event EVENT_RETRANSMIT for parent state #652 | start processing: state #652 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #652 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #652 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #652 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.234488; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.983858 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c039e80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #652 | libevent_malloc: new ptr-libevent@0x7fb37c08aed0 size 128 "road-eastnet-nonat-145" #652: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #652) | cf c2 13 dd be 13 c5 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 79 e0 0e 1a 26 5e 51 b7 a5 4e b3 11 14 4a 1a | 6b 96 3d 3b 24 26 a6 e1 89 0f fe 91 a7 c1 7a 45 | 26 cd 35 4b 8b 6b d6 67 91 8f b2 00 fc d7 fa 63 | 2b 58 54 f9 c8 77 8f d8 2a 48 b5 10 ef bf 28 f5 | 2b 01 2a b5 18 43 7b d2 1c 14 72 04 8a f2 52 ba | 8b 62 38 7c 84 16 57 0c 23 dd 5f e1 6d 4a 6a 89 | d0 08 7c 20 3c 72 d9 e8 1e 21 18 8e 13 54 9f 91 | d8 28 dd 9e 63 28 ad b3 cc 26 3f ce 02 f8 0d e7 | 43 fe 79 b9 17 32 6b 1f 49 79 5c 97 67 4f 3a 29 | c2 8a 0e 49 84 d5 bf 8e d2 4f bc 6f 4f 9d 2d 18 | 2f fc 66 90 24 12 d6 64 7d 6c 9d 94 39 e8 e1 57 | f1 94 1f 02 5b 88 4a 35 7d 48 05 cc fa 83 14 b9 | dd e0 c2 0e b0 3a 8a d8 a2 1c f4 35 ef 16 28 20 | 4a cf 5a 27 76 56 8a 88 e6 05 ec 34 f1 7b 00 b3 | 84 e3 67 51 85 c2 15 5b f0 1a bb bc c2 65 21 ca | 2f a8 c5 a1 e4 74 bb e7 a4 40 7f 41 4f 5a 73 b3 | 29 00 00 24 a4 50 57 9a 3a 57 4f 84 97 47 60 cc | 90 ef 4f 57 df 90 96 08 71 29 36 b2 5c 92 88 88 | e1 f8 f5 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da c9 d5 de d7 08 a6 7f d2 6a f3 9f | 8c b9 dd 2d 2d b7 3d 20 00 00 00 1c 00 00 40 05 | ff d6 25 67 d8 96 d1 7e 81 61 53 f8 7f af e4 0b | e5 df 07 44 | libevent_free: release ptr-libevent@0x7fb34802a670 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348039e80 | #652 spent 0.0615 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #652 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36801d710 | handling event EVENT_RETRANSMIT for parent state #620 | start processing: state #620 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #620 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #620 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #620 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.234558; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.981711 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348039e80 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #620 | libevent_malloc: new ptr-libevent@0x7fb34802a670 size 128 "road-eastnet-nonat-63" #620: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #620) | 0c 12 15 e7 a2 ca 8d 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 3f 5e 3f 99 f7 2c cd 5d 9d 10 28 3d d6 eb 5d | d6 70 92 22 81 10 39 84 c3 22 a4 4b 22 26 4e c3 | 43 c3 37 59 00 1d 7e 63 45 c0 26 a8 98 4a b1 47 | c1 33 a4 a4 90 f5 4b 5f 23 ab b3 25 78 4e f7 a4 | f5 a4 93 56 5e 09 41 80 4c 5b e0 55 80 1b 24 4e | aa f2 33 07 2b 18 44 d7 f2 64 d4 1c b4 47 33 ae | d6 d7 60 0c 88 02 96 73 4b 3e e1 3f 8e 0f cd 2b | 4f 43 e0 dc f5 25 3d f1 3c 28 8e 72 59 95 64 7c | 38 6c b8 23 04 21 89 f8 a5 70 08 2e 75 aa 14 af | e8 5d 1a 6b 12 19 09 99 3e e3 e5 85 d8 78 ef 8d | 24 1e c5 bf 13 b7 ef 62 4f 9a 47 1e b2 de 4c a2 | 66 69 d3 df fc f2 1b e9 88 8e 7d 9a 64 f1 c5 88 | b5 0e 03 d2 24 45 b0 15 4d 1f 26 ae 6d 58 30 94 | ad 64 eb 3c 81 d9 0e 5a e4 30 43 31 ff 25 8a 7d | 43 87 60 41 58 98 d9 b1 94 9c cb 6c 2b f6 03 9e | 5e 6f 4d 36 24 f7 c6 bf 51 85 e7 d4 54 b0 61 7f | 29 00 00 24 e6 bf 33 37 4b e1 e6 6d 80 47 43 de | 67 a6 13 22 fb fc d2 c4 87 31 c8 58 f0 30 ac 5f | e0 4a 7b ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 41 62 8d ec b8 5e 72 37 70 1d f8 | 93 d1 d1 32 a2 e2 38 e4 00 00 00 1c 00 00 40 05 | 9f 9a 22 83 1f 86 8c 5b a2 81 5b 71 ab 0e 9a 59 | 82 5d 35 a1 | libevent_free: release ptr-libevent@0x7fb36801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36801d710 | #620 spent 0.0627 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #620 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb338018460 | handling event EVENT_RETRANSMIT for parent state #682 | start processing: state #682 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #682 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #682 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #682 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.234627; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.989587 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36801d710 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #682 | libevent_malloc: new ptr-libevent@0x7fb36801a4e0 size 128 "road-eastnet-nonat-149" #682: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #682) | 1c 63 f5 34 d6 98 db f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 91 93 4b 82 7b d6 c9 cc b6 dc 38 f0 76 d4 ea | b3 f9 d0 20 c5 06 5c 01 f7 82 2c bf 39 d6 f7 d8 | e4 7d 68 8b b6 1b e7 ba 01 9e ef 31 f5 4a e4 00 | 71 9f 4f 6c f1 66 a6 38 36 4d 16 6e b9 0a 02 f5 | 76 26 d7 9e 22 7e 03 cd dc 7a 6e 7a f3 50 38 a2 | f7 f1 9b 7e b5 d1 c3 e6 34 54 2a 11 00 e2 cf 05 | 84 d5 3c c2 01 67 6d 2f 10 ab ff 3f 5e d3 fc 6f | ae a3 ca 06 6d 1c 49 2d 5a 7a e5 04 64 3b 7a e2 | 78 f6 c6 9d dc 04 10 4f 6b 84 37 a0 35 9d 5e 5e | 43 00 9f e2 ca 77 c0 e3 a6 a6 e9 8c 0e c9 9d 05 | f4 7c d1 f5 aa f5 3a 3b df 0d e9 f3 99 52 88 3b | 6e 6b e7 b1 a8 09 b9 87 1e 6c dc 1d a6 0c b9 85 | 1c 89 ee 82 0e da ca a2 a8 31 12 33 df 1d 7c 66 | 57 48 ec d7 e9 e4 6e 69 ac ff cd 56 20 87 16 fd | c1 b0 72 78 18 b1 15 83 cc 13 cd 7a 9b d9 1b ea | ab 9f c6 a9 54 29 46 07 69 08 0d df 81 94 bd 9f | 29 00 00 24 44 7b c5 ba aa af dc 31 42 e4 80 90 | 55 f4 c0 be 7c cc 43 63 bf 44 9a f8 f4 30 a8 fb | 10 97 40 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d a2 48 8b c8 15 0a 38 76 0c ba f3 | b9 e8 7a 81 52 85 f0 63 00 00 00 1c 00 00 40 05 | 0f 56 36 fd fd 8a 46 5c 86 a2 68 e1 11 7c f5 b4 | 2c 7e 9c 12 | libevent_free: release ptr-libevent@0x7fb3800857f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338018460 | #682 spent 0.063 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #682 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a1da10 | handling event EVENT_RETRANSMIT for parent state #598 | start processing: state #598 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #598 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #598 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #598 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.234697; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.956219 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #598 | libevent_malloc: new ptr-libevent@0x7fb3800857f0 size 128 "road-eastnet-nonat-89" #598: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #598) | c9 b5 3a 18 c3 59 d6 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c 21 c1 2e ba 75 c9 09 d5 c3 93 96 ab d0 78 6e | 7c 4e b4 21 7a 51 1d c0 17 80 c7 93 28 da 63 f4 | fd 05 0b e2 9e 56 d9 c9 20 88 91 c7 be c0 26 c6 | 69 60 dd eb 14 83 d1 89 6a 59 8a ef 06 c9 04 3e | d0 46 01 39 27 93 50 40 25 0c 45 25 36 0a 1f bd | de f1 21 bc de b9 08 3b f9 ba 42 b3 96 c0 60 b4 | 0d 0e 0c 07 28 8c 6f 6a 38 91 1d 88 1e 7b 03 94 | e4 fb d6 05 18 52 1a aa e1 e4 5e 96 ad 66 1d 62 | b0 d0 05 07 c5 30 11 d1 7f 95 2b b4 ff 32 13 e4 | e5 17 5e 41 18 f4 6d c8 fe 66 3f 13 56 7b 86 54 | 90 58 c3 20 c7 1a 0c 72 2e b7 70 1d d3 00 7a ae | 58 86 4c b8 01 f6 3c 05 9b 47 1a dc a2 b7 00 ef | 31 66 ce 4a 0b 4e 88 92 b4 d0 aa ce d7 48 74 fd | 97 17 1b be 8b 31 c9 92 66 31 9f b3 84 ef 27 5e | 21 dc b5 10 f8 ce 45 64 07 5f 53 8c e7 9a 08 0a | 21 62 59 5e b9 02 31 e8 fd 60 6f 2f e1 86 b6 ee | 29 00 00 24 48 f3 f3 5d 08 a4 f0 63 dc c0 92 c6 | 3d c9 7a 45 24 bf 25 2a 08 df 59 2f bd 93 33 07 | 05 c3 f3 24 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 93 64 b0 1e e6 88 50 1f 76 35 f4 | b7 15 8a d3 2c 18 77 4c 00 00 00 1c 00 00 40 05 | 3a 14 09 59 cd d3 06 ad 37 c8 d5 8f dd 06 36 68 | 88 b8 08 59 | libevent_free: release ptr-libevent@0x7fb35805f320 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1da10 | #598 spent 0.0627 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #598 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37404b580 | handling event EVENT_RETRANSMIT for parent state #671 | start processing: state #671 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #671 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #671 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #671 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.234767; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.9813 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1da10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #671 | libevent_malloc: new ptr-libevent@0x7fb35805f320 size 128 "road-eastnet-nonat-184" #671: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #671) | 1d 22 92 7a 9f 62 65 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 2c 7e 91 0a 22 90 c2 45 ac 5c be 32 c1 2c 12 | 60 a0 27 f2 55 e3 d1 89 c8 99 22 25 59 aa a7 04 | 17 46 2e ba 00 09 b9 71 47 e5 94 f1 fd 69 0a 57 | 38 00 5b 86 84 a5 d3 6a b3 9c 35 a1 da c4 1c 25 | 30 41 58 88 f1 bf 1e cf 5a 7d fb 1d 85 56 82 39 | 48 55 e9 bc e2 cf e9 2c 33 f4 34 3c 90 b2 b4 75 | 55 ca c1 69 86 54 f4 e5 53 67 e4 36 3b 66 24 10 | f0 0c b4 a6 bf 13 a9 41 25 2d 85 e0 59 37 ea 35 | d2 8a c7 72 04 28 dd 8d 9b 4e ca cb e3 07 69 b0 | 38 54 bb b4 47 09 ee 08 0f 47 c5 fd 50 05 d7 4c | 28 db 90 75 c2 2f 8c 55 54 db d4 30 5e b3 32 4e | 8c 3b 51 5c d3 59 a0 69 16 c0 1d 8a fe c4 69 9c | 6b 52 61 76 6f 1f 1d 99 1f 0b 05 d3 73 0a d9 48 | 53 6d fb ef 5d b9 22 d3 44 19 94 f4 70 f2 9d 04 | d7 54 79 2f 9c a0 ae 3d d3 fe 22 0d 74 1b 5b cc | e2 cd 80 63 5d 5b 97 5a 19 0e 2c 9e 2b 0b 57 7c | 29 00 00 24 89 d7 93 c3 18 08 d5 d6 83 2a 2a be | a0 ca 86 6f 9a 4f 6b 29 8c ce f9 83 c0 a5 93 03 | 8e 0f 90 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 a9 60 fe 19 43 95 a6 13 de 16 7a | 81 94 84 c9 e7 e2 6b 0c 00 00 00 1c 00 00 40 05 | 81 51 61 ea 37 80 54 96 3e ae 81 da 9c ed 39 03 | 67 8c 30 56 | libevent_free: release ptr-libevent@0x7fb38807ae10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37404b580 | #671 spent 0.0607 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #671 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #623 | start processing: state #623 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #623 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #623 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #623 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.234843; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.969579 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37404b580 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #623 | libevent_malloc: new ptr-libevent@0x7fb38807ae10 size 128 "road-eastnet-nonat-67" #623: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #623) | b9 b9 92 a4 ec 38 7b b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 f3 7e e2 e6 f9 2a f9 d0 93 e1 a3 9d fe 74 ed | 88 55 53 55 78 91 02 79 67 05 d4 47 b7 41 b9 fb | f1 19 18 33 40 a4 b0 8c 32 db 0a 07 ba 07 01 e9 | c8 5e e2 aa 5a fe 73 d0 43 82 cf ee 31 82 b6 b2 | 5e df 34 0e 42 bf b6 f1 fd 55 a4 d8 49 96 21 84 | cd ec 4d 1b 66 59 11 58 1d 4a a6 2b 86 62 43 39 | e7 71 28 21 32 2a 5c 6b 41 1f 1e a1 24 a8 7e 32 | 23 86 5c 25 2e 71 70 af 02 5f a8 b3 61 f2 41 fc | a5 63 0a e6 65 ef d6 7d ab cd 41 94 d7 f5 1e 6e | a4 d7 27 bd 30 b8 2b ed e0 66 d7 7a 3c 2f 83 9d | 91 91 64 73 8a 4d c2 67 18 5a 11 fb bf 8d de 21 | 74 5c 7d bc ae 43 a1 bb 17 7c c3 68 7a 37 86 6e | 83 ca 1f a2 33 23 44 69 5a e6 2e 90 79 83 57 19 | ae e4 1d fa 01 cf 8b fb 73 b3 e0 fb f2 40 fe 50 | 44 65 ee e2 51 df 47 88 22 c7 4a bb 66 b3 7d db | 0b 53 67 9b 7e 51 76 d3 fd f7 82 53 9e be b5 ff | 29 00 00 24 6f 2c b0 62 51 9d 8c 96 be a1 aa 9b | 8b d2 a8 77 e2 d2 a6 95 67 e0 34 a3 2d 5d ad 37 | 32 20 86 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a8 14 ee 41 a8 c3 e5 2e 90 58 14 8d | 5a f6 f4 40 9d 72 d9 2f 00 00 00 1c 00 00 40 05 | c6 f2 3a 3c 4a 40 8a 12 05 e3 0f 64 13 e4 22 0b | ff 8f 1a ac | libevent_free: release ptr-libevent@0x7fb33806f750 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #623 spent 0.0734 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #623 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388015720 | handling event EVENT_RETRANSMIT for parent state #649 | start processing: state #649 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #649 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #649 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #649 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.234918; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.973339 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #649 | libevent_malloc: new ptr-libevent@0x7fb33806f750 size 128 "road-eastnet-nonat-204" #649: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #649) | b6 55 6c 1f f7 96 4e 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 49 68 33 ac be 3a f7 9a 60 a1 54 2b 3b a3 9a | 16 92 52 84 04 b4 d7 16 0c 6d 09 72 cc 2b 60 d8 | 6a 97 99 35 6d bf d4 59 5a c6 db 05 04 50 9f 26 | d5 31 65 a2 a6 90 1f 44 a8 51 46 ef b2 3c 2c 17 | 9a 67 6e 63 13 be de f4 ea 50 37 0c 4c b7 bb 87 | 98 eb a2 d7 94 7a 4d 7c 27 23 c5 c1 14 ac 3a 62 | e3 9e cb 8b a8 b2 7e 85 7f 34 7f d2 53 2b 7f 26 | 9b a4 79 e8 f1 d9 12 1a 3f 7d 7b 73 7f 6a 3b d4 | c7 66 51 af 5f d5 da 98 4b bc 29 01 fc a4 53 53 | c1 e3 c9 29 b1 bd f6 9f 07 80 98 0d 7a 85 07 72 | 29 6b 03 79 c5 1e 41 20 d9 9a b8 86 af 78 fe 58 | 1c d3 ff 44 d3 cc a9 5e 28 25 58 79 53 d0 f5 40 | f8 b2 e5 1b 4e 35 7b 57 c9 98 34 61 e5 1c c6 ce | 01 23 71 88 e2 7b b5 18 09 23 c9 7f 18 e2 56 40 | 07 80 69 13 04 69 8a 54 da d5 46 08 93 8e 42 66 | 37 5b 93 f3 15 98 7b 1b b4 dd 60 45 36 75 a9 82 | 29 00 00 24 d9 9b fe 1b 9a 3b e2 af fd 5f 29 c3 | a1 c2 66 f4 bb f2 c2 62 37 18 46 4f 44 68 ce 27 | ad 06 31 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e f0 1f cb 60 f7 fc 56 dd ae 47 e3 | bc 0d f0 9c f1 a6 a0 90 00 00 00 1c 00 00 40 05 | 55 71 01 83 1b 1f 6e 2c 68 ca 2f 55 56 93 29 8e | bc e1 a4 22 | libevent_free: release ptr-libevent@0x7fb38806fe50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388015720 | #649 spent 0.064 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #649 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0d4c0 | handling event EVENT_RETRANSMIT for parent state #612 | start processing: state #612 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #612 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #612 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #612 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.234989; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.97556 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388015720 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #612 | libevent_malloc: new ptr-libevent@0x7fb38806fe50 size 128 "road-eastnet-nonat-73" #612: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #612) | 06 13 d7 c6 41 b2 86 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 8d f1 f4 22 24 65 49 2a a6 70 28 29 5c 96 09 | 3e 1e 78 f6 de 7f d4 6d 8f 70 0c e4 5b aa e7 34 | 60 3a b8 ce 9c c3 f2 55 c4 78 5c 37 a6 84 38 22 | 93 67 fa f8 c2 df 15 e3 9e 8e 26 44 fc e4 fa 8f | 57 f5 49 ed 86 e7 16 45 96 6d 10 ea 0c 90 8a 31 | e9 a7 90 56 ec d2 20 8b 2a b3 08 b3 f3 33 e4 7b | 20 92 e0 01 19 6d 6c ce 7a bf 9a 7b 89 9f 35 9e | 58 9d d3 ad 5b d8 c7 e9 b8 71 4b f7 a5 1c ea 1a | cc c7 49 f3 04 3d 6a 30 5e 5f 6e 57 b4 d0 06 19 | df 2d c3 be a9 ad 0b 91 01 58 72 3d a2 3a 97 fa | 3b 4f d0 1f 09 3f ec 9c 6a 4d ad a3 d7 03 7d fb | fd d5 f6 df 9c 11 0f 03 14 5d 5b e8 e8 f0 46 2d | 46 0e 42 78 aa d4 b4 d3 de c9 9d 1d a1 10 3b 2b | 48 75 16 7b f6 27 2f 9d 63 b1 ad df dc bd c2 01 | 65 a8 1f 4c aa c7 7b 56 c8 5f 06 1e bb 73 93 0a | 1f 90 b0 df 46 4d 2e 1e af 83 bf da a6 c2 4b 21 | 29 00 00 24 14 45 39 c3 b2 be 10 35 86 8a 8d fa | 46 03 d4 c9 b6 c1 c2 c0 bf 3c af 6e ab be 7e b7 | 9a 44 cd df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bc 94 44 11 03 fc a1 a4 72 04 35 93 | 3e a4 98 88 8e 5c 65 1b 00 00 00 1c 00 00 40 05 | 24 c4 24 16 66 f3 44 ba aa f9 26 a7 a0 53 d9 b2 | 41 97 1c a3 | libevent_free: release ptr-libevent@0x7fb388075630 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | #612 spent 0.0626 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #612 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a34e10 | handling event EVENT_RETRANSMIT for parent state #650 | start processing: state #650 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #650 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #650 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #650 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.235079; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.975344 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #650 | libevent_malloc: new ptr-libevent@0x7fb388075630 size 128 "road-eastnet-nonat-151" #650: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #650) | 26 33 64 e2 99 22 09 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 93 4c 52 2e 07 4f ef fc d7 92 1e c1 ca 14 b7 | f7 a3 82 0b 5f f6 91 b4 15 5e 90 95 7d d0 45 ef | 21 f3 08 0e 7d 26 87 e7 ea 79 d3 33 07 49 ba 68 | da fd 2d dc e8 dd 8d 3d ac 78 0b 31 13 b9 60 52 | d8 60 ef 09 61 af 9d f6 ad 76 cd b0 e6 c4 55 10 | bd 0c b1 58 60 30 af 2c 0e 52 bd 65 9f d0 54 d8 | 5a 2b 21 18 f2 c5 71 a2 0d 15 04 b5 4a 32 ae 9c | 02 2e d4 e0 51 8d 8d 22 83 86 fa d5 f5 1f fc cb | 75 6f de 7a e7 e1 af 25 29 c0 d8 e2 f6 b9 34 b5 | d7 7a c3 1e c4 99 5b 0e ca 76 77 7c f5 a8 a5 87 | 30 0e 18 1b 81 0a 94 65 85 20 c1 1d 31 6e b8 8b | eb 6c f5 b0 86 38 4d 10 0a 4a e9 45 4a d4 02 3f | 74 10 5c 24 6e 73 2d b5 cc 00 a0 c3 3c 0c 0d 0a | 48 d3 1b d4 4e a5 c6 45 3d 90 e1 3d 46 6f 68 4d | 0c c4 d4 2f a5 c5 02 ab af a2 e9 3b 3f ee 3a b5 | a7 5d 9e 2b da 84 df d1 c6 3f 08 db f2 d2 d5 c6 | 29 00 00 24 8d dc df 0c e8 8a 00 84 45 9e d1 82 | 39 c0 aa 62 4b 5e c0 9d 6f b9 50 ba 59 33 ad 5d | 19 94 ea 3d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 84 a4 74 25 14 10 fd bf 0a 02 29 | 25 c7 89 ed 1e 29 a1 0f 00 00 00 1c 00 00 40 05 | 9b 4c 2f e4 b9 53 6d ef 7d 4f cc 27 24 fe f9 f6 | 0b 9e 9f 60 | libevent_free: release ptr-libevent@0x7fb358064ae0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a34e10 | #650 spent 0.0931 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #650 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a82ac0 | handling event EVENT_RETRANSMIT for parent state #647 | start processing: state #647 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #647 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #647 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #647 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.235162; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.976689 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a34e10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #647 | libevent_malloc: new ptr-libevent@0x7fb358064ae0 size 128 "road-eastnet-nonat-206" #647: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #647) | a9 15 25 50 c3 89 9b ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 0f 1a 9b c2 c1 27 9f 86 de 54 44 d0 24 9d 6a | 45 ee aa 3d 9a 82 6c cc 7f 5a 10 2c 59 c9 22 f3 | 34 55 04 3d 8b 40 f1 78 07 5b 1e 30 68 89 14 97 | bb 5f 4d f3 15 66 be e0 4a d0 41 bd 55 74 f7 a1 | 6b 5c c4 02 57 e6 80 ea 7f cb 60 fd b8 98 71 32 | 6d 87 75 4e 58 e3 ec cc 2e d4 bc 64 e8 77 a7 a9 | 8d 8d 5b 9b 51 d9 37 9c 0c 0c 7a 22 96 b8 a2 26 | 89 d0 75 ed e8 65 8b fc 2a 83 34 29 39 47 fd c0 | 22 02 dc 03 48 eb ab 15 4b 4d ed b4 52 db 67 35 | cc 06 96 a5 b0 73 95 a7 9a 74 43 21 02 98 b3 07 | be a3 dc 76 24 de e8 96 45 29 b9 08 2b da 6c 70 | 45 74 38 4c 76 73 8d c4 3a 57 9d 7d bc 8c cb 79 | 70 0a 09 47 dc 14 98 38 75 a6 25 2e 9f 4a b1 fc | b8 6d 3f 57 fc c2 a2 48 3b 42 ab 67 ad f1 0d 72 | 8a d2 0f 62 dc 08 25 a1 63 8c 91 4c 28 7e 0a 45 | 95 7c 48 d3 57 c8 ca 2a 17 b1 f3 78 10 3b a0 11 | 29 00 00 24 25 47 22 11 f3 7d 2a 09 ec 1c bc 5b | ea d8 0a 15 cd 9d 69 8e 1e b3 ca b8 a6 0d 22 5d | 28 7b af f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 3c 41 1d 92 d7 b9 38 bc 5b eb cb | 32 90 40 77 f1 b7 dd e6 00 00 00 1c 00 00 40 05 | 63 f4 fa ff 4d 8b 5a 8c fe ca 58 3f 4d 61 7e 87 | 43 3e 7c 36 | libevent_free: release ptr-libevent@0x7fb35007d2f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a82ac0 | #647 spent 0.0629 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #647 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb344018460 | handling event EVENT_RETRANSMIT for parent state #670 | start processing: state #670 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #670 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #670 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #670 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.235232; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.980216 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a82ac0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #670 | libevent_malloc: new ptr-libevent@0x7fb35007d2f0 size 128 "road-eastnet-nonat-147" #670: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #670) | 8a 10 9e 23 ac da 71 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 59 15 67 28 ca 74 92 de a7 0b d2 ca 9e 31 ff | 0c ec 66 70 2f 96 5c db 29 7a 94 be b4 fb 91 94 | 6c 4c 82 7b 86 7c 4d 04 fa 97 64 03 7c 61 e6 12 | 7b e8 77 6d ef fc 86 73 90 13 0d e6 78 93 c2 a1 | 62 6c 65 c0 8c 1c 5e 39 e1 34 37 c6 58 5b a5 b2 | 83 26 7c 7e 1f 15 94 64 d1 51 32 90 eb a2 33 51 | b8 56 2a 0b 53 1e d3 ca 3b f5 15 ad 3c b3 c4 4c | 87 79 a4 dd de 1d 17 0c ed 28 be 3d 53 69 9f d4 | 92 6d e1 f9 c4 1e 3a 32 bc b5 0d 47 92 45 39 27 | 1c 6a ba 31 af 07 5a 8a c7 08 ef d0 d2 ac e7 93 | 58 56 5f 1a 54 44 df 61 16 7f bc 43 53 9a 9f f7 | 61 eb 19 48 e1 7b e1 df c1 5a 57 0c d3 a6 a2 ce | ce 01 4a 92 1b ce bd be 46 3d c9 04 aa 1c 6a 49 | 39 9e c5 e0 23 32 61 54 07 62 70 d6 2b 4f 7f 12 | 86 15 e1 c4 88 04 21 da 99 53 13 ca 40 af d4 cd | 0a f5 d7 88 c1 11 17 a1 77 d9 81 26 5a b2 1e b7 | 29 00 00 24 f3 83 7b 0d 72 75 fb 36 6b 70 51 59 | c6 93 d9 98 17 c4 71 7c 93 e7 e0 bd 2f bb ee cf | 0d 5e df 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 a9 e0 bc 70 aa 03 d2 53 d4 71 04 | 68 97 96 57 88 52 67 34 00 00 00 1c 00 00 40 05 | a6 13 8e aa 70 35 17 a1 68 a2 7c 6b 1f 0d 90 7b | a6 27 3d 24 | libevent_free: release ptr-libevent@0x7fb37406a110 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344018460 | #670 spent 0.0622 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #670 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348048a60 | handling event EVENT_RETRANSMIT for parent state #644 | start processing: state #644 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #644 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #644 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #644 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.235302; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.975262 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #644 | libevent_malloc: new ptr-libevent@0x7fb37406a110 size 128 "road-eastnet-nonat-163" #644: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #644) | 50 de 2b d7 45 9f 26 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 58 93 d0 7f 41 ad 9d b7 03 dd f8 2a ea 2a 42 | 44 8c 71 98 4a 47 c1 c5 90 95 76 04 f2 e5 ad 38 | 71 44 ae 3b fb f2 49 7c 10 82 5e 78 55 e4 fb 2f | 3e 12 c9 6c 92 13 53 cb a3 12 6e fd 1b cd fb ca | 7e e6 47 e7 44 cb 81 71 95 37 b6 d0 7a dd 37 46 | 29 e1 76 40 93 0a 7f 82 5a ad 56 83 a4 e6 22 95 | 73 81 6b 3d a5 ef 7e 2a a9 63 f6 f5 16 dd ca 4d | c5 1a 4a 2e 98 5c be 8f b6 36 37 ca c3 60 91 97 | 68 91 c7 05 a2 20 36 57 76 46 a3 b4 57 65 a3 ec | 60 30 bd 82 e8 5f 09 bf c2 16 53 69 e8 db b3 20 | f1 da 51 a7 b7 44 97 86 b5 cf 77 2d 02 b0 fe f9 | 34 93 f6 86 2f ca 83 a6 a7 79 8c 3f 79 49 ae 69 | 69 fc a1 aa 7d 95 b3 6d 7c 9b 21 a7 a7 f1 27 5d | 6b 90 30 cd 14 fd ee 1b 3c 9c b0 26 4f ac 21 a1 | 51 5e fd f8 e8 96 a5 84 c9 1e 4d dc 41 f5 73 29 | 85 06 8a 87 3f 53 f8 64 7e 9c bd 99 b9 0a 9a 0b | 29 00 00 24 e5 0f d1 27 d8 cf bc 47 ad 96 17 e8 | c3 9b 62 84 21 4e 76 3c 4d 7e 36 68 8b 66 54 7f | 11 87 3d b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 d8 9d 5e e4 7d bf 65 2d f1 4a b5 | c7 e2 e6 55 b9 27 ad 86 00 00 00 1c 00 00 40 05 | e7 08 aa 38 d2 e0 0f 7f 77 98 72 12 74 ed 7d 4c | e8 75 c4 3e | libevent_free: release ptr-libevent@0x7fb36c0751d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348048a60 | #644 spent 0.0612 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #644 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46abd200 | handling event EVENT_RETRANSMIT for parent state #638 | start processing: state #638 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #638 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #638 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #638 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.235372; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.969336 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348048a60 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #638 | libevent_malloc: new ptr-libevent@0x7fb36c0751d0 size 128 "road-eastnet-nonat-218" #638: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #638) | 73 d4 45 41 ab fb 7a 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 9f 1b 03 84 82 35 ff 90 4c 0e e1 4d 63 0b 6e | 25 67 96 c9 b1 5e 9f d5 99 08 91 8b 97 07 16 15 | 0c e8 b6 79 cd d7 bc dc 55 ef e3 4b 14 16 41 5b | 40 76 1a 52 cc c5 af e0 d7 43 e0 3e 6a bb f6 6e | 3a bb da 36 77 2b a1 fe af 56 c4 df 62 b3 73 b9 | 52 c1 55 25 5c 52 48 e6 3a 7b f7 12 bf 50 3d 13 | 60 2e 98 52 d5 09 1c 91 b8 c2 de 2d 7f f1 06 b2 | 39 09 03 76 3e 48 2f e6 27 f7 a9 1d 29 27 2e f9 | 47 87 5e 4a 7f 25 ff 26 1e 80 23 47 3f 0d 0c 05 | c8 27 d3 ed 98 ba 35 8c d3 ea 22 73 97 01 a0 d4 | fe 01 e2 3a 2d fc 4d bf 2f 53 eb 87 c3 5c 58 ef | 04 26 0a 51 13 2d 57 56 6a 69 f2 77 0e e6 3d 17 | 34 db d2 58 e6 ef 99 7a a5 d2 4f c6 f1 d6 ee ce | b8 69 1a 6d d5 e4 12 01 a4 1e 43 89 0e 61 2a 78 | 44 0b 0b bb 93 59 d9 ea 7a 2e 42 02 8d af be c7 | d3 84 14 a0 3f f3 e5 9f b7 c2 2d 2a 24 01 b0 1c | 29 00 00 24 5e 9d 7c 45 0d ec 13 66 03 bc 86 eb | df 18 53 02 81 01 d0 ca be 7b d0 08 90 a7 74 72 | 28 4f b9 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 c4 2c 70 3a 67 17 0b be 99 22 e3 | 81 fa d7 92 68 76 9e 84 00 00 00 1c 00 00 40 05 | 70 aa ac 05 74 24 54 28 15 1e a7 7e 64 95 2b b7 | 84 55 48 79 | libevent_free: release ptr-libevent@0x7fb35c08ab00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abd200 | #638 spent 0.0631 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #638 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38000a290 | handling event EVENT_RETRANSMIT for parent state #626 | start processing: state #626 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #626 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #626 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #626 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.235441; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.972125 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abd200 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #626 | libevent_malloc: new ptr-libevent@0x7fb35c08ab00 size 128 "road-eastnet-nonat-26" #626: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #626) | 0f ed 5a cf 38 b1 e8 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 3d 6d be e1 b5 e5 c2 d3 2d 01 3e 44 32 8c 9c | 10 07 5b 6c ed c7 1e e0 bd ad 91 2f 7b 5d 66 20 | 1d 49 29 0a fe 5e e1 41 fd 2d 5b db 26 a9 35 00 | 65 10 cd fe cb 24 75 0b 38 a9 17 e0 c9 9c 32 cb | ac ed eb dc 28 55 86 03 cf 0a 73 6f 60 bd ce 34 | 02 6e 30 12 0b ea e0 d6 3e 1e 3f d8 09 a2 8f c4 | 00 8b 17 ad 6b dd 80 3e bb 4b 55 43 c0 01 45 68 | b9 d4 1f bb e9 85 dd cd 2e 4a b1 73 0f d3 cf 35 | 1d cc 81 40 9d 5a 89 f7 17 97 eb a9 9b ce d0 7a | ea fd d9 8a 75 55 14 06 7b b5 ea a1 d4 df 99 7f | 7d 44 5a 7b dd bb 03 bd 83 27 4b ff 5b 0a f8 f1 | 3f f3 6c 7e 81 c9 48 54 92 25 5a 38 2f 94 66 d9 | 09 f1 fc 50 b6 b8 4b c6 01 00 9b 5c de e0 c2 70 | 94 49 cd f6 f0 cd 84 42 37 97 4f aa 99 fe a6 85 | 3a 90 6e ce b7 01 23 71 2b b5 63 d7 be 2a b7 f7 | e5 82 55 b8 36 c2 c8 94 47 53 1e 97 b8 37 e2 29 | 29 00 00 24 a0 8c 77 90 d5 d1 0c 21 bb 3d 18 0e | 18 70 42 64 dc 36 73 88 d4 b3 3a 38 9b f1 00 e0 | 74 bb 2e 48 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e0 58 91 0c 95 19 f3 97 a9 04 fb bb | 0f b6 c3 16 e5 5e 65 45 00 00 00 1c 00 00 40 05 | 89 d2 55 f5 43 aa 76 28 9c 2b e8 f0 be 0a 82 5c | 11 ab 36 f1 | libevent_free: release ptr-libevent@0x7fb35c0aba40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000a290 | #626 spent 0.0626 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #626 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3400296b0 | handling event EVENT_RETRANSMIT for parent state #621 | start processing: state #621 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #621 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #621 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #621 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.235511; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.978949 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000a290 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #621 | libevent_malloc: new ptr-libevent@0x7fb35c0aba40 size 128 "road-eastnet-nonat-53" #621: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #621) | b6 7b 13 e2 c1 f5 0d 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 57 84 d5 d7 fc 7b 03 ac 28 bd 55 7a cb 22 6d | 15 db d6 6e 10 22 25 dd 22 f0 db b6 64 1a 8e 62 | 37 1c 3c 87 76 d4 16 13 a1 20 70 51 e2 6c 88 a7 | 4c bd 9a e8 61 13 5b 96 2a 3a 11 b0 00 e4 41 12 | 45 a6 ec a4 25 97 e4 d4 fc 34 77 25 f0 6b ee ea | aa 50 40 a4 2e a8 4f 01 2d e4 44 bf 36 fc 59 62 | 62 e1 29 8a f9 0d 17 54 2b f3 92 0f 3e c7 98 e1 | c4 70 f5 a6 ce c1 0a 42 4d c9 8d ad 7d 6f 21 10 | 8c 9b 74 c6 74 d4 11 03 3c b2 a3 0a ef 7e 1b 84 | d0 6a 92 26 b5 27 71 3a d1 01 ed b9 54 c4 f1 85 | 17 24 83 a6 8f c1 1c 28 cf 64 6e 6b dc 51 3c 81 | 4c 28 f4 1b 29 ea f8 d0 93 36 3e 3f 53 a9 9f e5 | bd 65 1d 28 4d 88 e0 98 81 13 8e db f8 e2 17 a6 | 46 27 e5 1e a7 24 77 68 b9 82 43 d4 94 92 10 37 | d7 3f 29 86 6b cb 84 f7 07 f1 63 aa a8 fc 4a 8a | 7a c7 2e 35 5c f7 6f 1e 13 8c ec d2 d0 0f 26 77 | 29 00 00 24 61 45 c6 88 ed ea 89 96 4e e2 8d aa | 07 4f da 3d da b9 b5 f4 0f 2b 6b 58 d6 df 11 d3 | 2e b8 7b 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 1f a9 4a 68 19 c5 3d 06 56 c4 a1 | 6a 2d 5d 6d af 09 97 90 00 00 00 1c 00 00 40 05 | 1d 2c b3 00 93 4a 54 e7 e8 53 57 b8 b6 97 f8 d9 | 75 4e f7 33 | libevent_free: release ptr-libevent@0x7fb35c07fb40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3400296b0 | #621 spent 0.0631 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #621 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35804b810 | handling event EVENT_RETRANSMIT for parent state #656 | start processing: state #656 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #656 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #656 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #656 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.235581; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.021135 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3400296b0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #656 | libevent_malloc: new ptr-libevent@0x7fb35c07fb40 size 128 "road-eastnet-nonat-192" #656: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #656) | be 68 21 bf 92 3b bd 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 52 43 e7 61 15 4a 4d ee d7 b2 46 b1 85 1b a8 | b0 82 1f 54 6e 3d 86 2c 4c 72 1b be 1a c9 a9 49 | 93 8b d8 d1 12 52 c1 d1 1e 66 c4 3c 2c ea d7 98 | 75 c0 9a ec 39 77 d3 3f fe 5e 4c e6 42 6d 23 4b | 2b 34 b7 11 db 87 07 d3 52 60 5a 9e 7c 2c 5b ef | e6 f9 73 5c 0b ba ad d6 fe 16 9c 1f 42 85 0a 3f | c6 40 77 bd 69 5b 49 0e 03 f8 b5 a7 44 3d 92 3e | b6 3c 8b 69 c2 36 24 58 2e fe e4 2e cf 17 66 89 | 17 19 74 fd 9e 82 52 41 e1 84 14 f6 da 40 64 3c | 7a 18 7c f9 1c fa fc 3d 2b ab c7 81 6b 75 f7 02 | 62 8e a6 13 db 23 45 dd 44 71 ff f8 9b 82 f6 c5 | 35 8a a4 69 84 07 45 3b 4e 8e cf 28 a8 c7 ed c8 | 24 90 fd dc c5 ab 7f aa 2d f3 14 d8 aa c0 01 da | 83 71 b8 3c 0a d2 2e f1 89 59 c1 75 b8 ab ca f6 | ed 19 86 32 78 7f f4 7b 8d e8 39 01 f8 23 b7 bf | d8 41 df 63 27 75 88 7d 0c 1a d0 05 c1 b6 21 63 | 29 00 00 24 da a6 76 b3 cd d9 ef 6f 78 db 6d a7 | 41 9d 1a c1 02 ed b1 b4 d8 5e 1d cc 04 ae df b0 | fa 18 8b a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 b6 14 c8 78 3e 8b 14 79 86 4e 98 | ba 1c aa fd 49 33 32 6e 00 00 00 1c 00 00 40 05 | ec b2 52 19 30 c6 85 07 d9 5c 18 07 e7 c7 94 94 | 67 61 43 b0 | libevent_free: release ptr-libevent@0x7fb33804e7a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35804b810 | #656 spent 0.0615 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #656 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb360044df0 | handling event EVENT_RETRANSMIT for parent state #701 | start processing: state #701 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #701 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #701 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #701 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.235651; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.992489 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35804b810 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #701 | libevent_malloc: new ptr-libevent@0x7fb33804e7a0 size 128 "road-eastnet-nonat-203" #701: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #701) | 68 ad 39 62 89 bc a6 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a9 e0 68 21 de 01 f2 63 62 9a 39 6d 52 af 4b 2d | b4 c9 33 56 eb d2 8c 9f ba 59 3a e9 d6 15 7b 7f | b8 2e a0 53 fc ae 44 73 e4 45 e3 47 76 a0 22 f6 | 14 d0 eb 76 9d 9e 8c 73 ad 3a d7 a8 0e 86 fd 08 | 39 c2 76 22 26 07 a7 7e 54 4b d3 f9 34 75 0e c8 | 7b 0c 57 fe a5 45 d0 5d 95 94 e2 38 22 7a a4 06 | df d7 de 2d 77 d0 62 ec 16 53 18 2e d5 6e 85 3e | 9a 44 d4 b5 c9 d7 25 7d 2e 03 d4 fe 50 40 bf 29 | f9 da 48 d3 d1 54 1b fe c7 56 87 44 3a 32 7c e0 | 5f c5 77 06 8a 05 ef 24 26 bb 7f 33 c5 e9 33 9d | a6 cb b0 d2 28 37 19 18 8d 43 4e ce 15 f7 37 9c | 6e 46 8e 96 3c 83 cf af 07 cd e9 21 87 3c e8 1c | ef ad f0 27 43 77 59 ca 24 3f 93 f9 80 0d 29 96 | fc 19 52 7b ce 8d b5 b1 4e 70 76 37 e9 52 61 3e | bf 51 35 68 4a 0c b7 29 d7 35 86 dc a6 18 d3 f4 | 7b 66 33 c1 28 ff 4b b0 99 bc 28 5a 64 81 7b df | 29 00 00 24 88 87 4e bd b4 de bb 6d c9 c8 4e a7 | a4 cc 00 9f 8b 0d 61 d8 a0 b2 27 29 2d 61 32 16 | d2 33 a2 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d a9 8d a4 1c 7e 43 26 3d 83 d5 d2 | 9e 52 9b c6 6d b3 48 31 00 00 00 1c 00 00 40 05 | dc c2 86 b8 21 a6 32 d2 32 e6 c3 81 d9 7b 5e 50 | bf 6c b1 ec | libevent_free: release ptr-libevent@0x7fb36005ee70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360044df0 | #701 spent 0.0628 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #701 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #703 | start processing: state #703 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #703 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #703 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #703 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.235721; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.004125 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360044df0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #703 | libevent_malloc: new ptr-libevent@0x7fb36005ee70 size 128 "road-eastnet-nonat-114" #703: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #703) | ae 90 67 40 0b c3 60 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 19 9b e5 9c 8e 57 c1 33 8b 94 01 97 8d 71 df | fd 30 9e 4b 3c d1 62 ac b2 ef 34 9e 04 b9 be 20 | 28 4d c1 c0 e4 75 70 3a f1 2f c3 4b 44 fd be 81 | 03 75 3c c9 fe 1b 81 d5 34 29 50 d7 8f 3f 70 56 | b3 d7 36 46 b1 89 89 80 d0 ec 97 d4 da d5 f4 f3 | 90 a5 07 30 19 0d e2 de 67 bb 84 67 ec 14 1d f9 | c9 6f 5e a4 ca 2b bd 62 3a a4 de d7 ad b7 a9 69 | 14 ce 78 80 17 fa 13 c7 37 12 cc 43 83 21 10 58 | 9d 2b 15 15 d8 e4 b1 cd ac 75 15 a1 72 52 09 be | 1e 67 15 57 3b 30 67 e6 f1 bc 1b 0d 33 dc 86 88 | 03 17 c7 52 df f2 2d 62 41 fb db 4b e5 00 8b 99 | 4e 97 2c 6a 81 e0 5c ea fe ad de f5 d3 4c 63 11 | e5 8c 09 a5 fe ec f4 22 ed 0d 56 cd ca 1b 22 80 | a7 f4 83 61 3b e7 31 76 2e 63 32 19 00 cd 04 39 | f0 c5 a6 71 47 ce da 1d cb a8 66 69 90 c8 a9 5a | 7f 0c 41 bf 5b ff 6a 04 a1 60 dd 0c e7 19 60 15 | 29 00 00 24 e3 5d d8 49 01 1c f9 e5 e1 ba 04 21 | cf 21 a7 36 74 86 ff 7d d6 85 f8 5d b2 3c d3 44 | a8 44 11 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 c6 13 89 f0 56 8f ca 89 41 0b e7 | d5 b7 99 19 f1 5e ec 03 00 00 00 1c 00 00 40 05 | 48 a2 09 85 61 af ec 54 8b 03 81 ed 23 cb 58 07 | eb 48 95 a0 | libevent_free: release ptr-libevent@0x7fb35806e450 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #703 spent 0.0628 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #703 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b24700 | handling event EVENT_RETRANSMIT for parent state #724 | start processing: state #724 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #724 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #724 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #724 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.235791; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.002084 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #724 | libevent_malloc: new ptr-libevent@0x7fb35806e450 size 128 "road-eastnet-nonat-190" #724: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #724) | d8 1c 6e 85 91 89 a3 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b de 88 5f a9 9d 9f 4a ba 73 08 37 d8 73 92 bd | 98 01 1e 07 58 d1 bd 9e 94 c8 19 b3 d8 04 89 00 | 76 aa d6 d1 63 6a 07 fa 53 c6 90 66 df e2 97 f3 | 3c d9 b0 e1 11 2a ca 4e 08 bd ce bf ec 35 bc f6 | 93 75 93 c3 27 5a 87 df ca 9f c6 0c e1 14 ca 81 | e7 91 a3 96 b7 0a 4b 1c 36 d4 88 78 ba 01 85 71 | c4 53 40 7e 7f 43 33 e9 c4 83 3e 45 df 0f c5 fa | 69 a7 38 69 b0 0f d3 83 7e 7b de 5d dd c6 e0 fb | 0b e9 aa b1 12 3e 19 c2 56 6e ba b8 9d 18 93 e8 | aa 44 6e 8a 6d be 62 4a 02 fd 73 71 b4 38 01 21 | 91 1e ce 98 c8 d0 d8 5e 38 8e 55 9c f3 8f 26 1e | d2 c2 28 3a 2e de 40 fa 17 cd 9b 8c 58 ec 62 2b | d4 b3 1f 01 98 ed 74 7d aa 00 c0 b6 32 cf 56 d0 | af 2d a5 2d b1 f9 4a 1c 18 82 b0 e3 c5 fa c0 30 | 40 7e 51 dc 60 0c a5 93 8e a7 3a 0f 04 35 78 04 | a2 3c f4 bf e9 0c bd da 36 3c 51 23 68 58 10 25 | 29 00 00 24 64 54 99 ea 39 03 03 79 05 41 c1 1e | 77 53 cd 84 bf 45 30 cc a5 b0 b5 0a 02 05 58 10 | 79 31 ef cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 23 c5 7e 24 d1 34 b2 de b7 23 38 | 86 97 29 8a 57 94 13 c1 00 00 00 1c 00 00 40 05 | ca f2 42 8a 65 1e 49 7e c6 31 6f 76 92 ca b3 81 | 65 f9 d2 13 | libevent_free: release ptr-libevent@0x7fb384081730 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24700 | #724 spent 0.0616 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #724 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c023c10 | handling event EVENT_RETRANSMIT for parent state #577 | start processing: state #577 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #577 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #577 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #577 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.235862; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.949717 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #577 | libevent_malloc: new ptr-libevent@0x7fb384081730 size 128 "road-eastnet-nonat-15" #577: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #577) | 9a e9 29 4a fb ed 2f 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb 42 00 89 a8 1c aa c4 50 d8 16 0d 57 8a 4c 0c | 65 7f e4 c6 cb 70 da 12 6d e2 7e 03 21 93 d2 33 | c0 0e 36 f5 83 0c 2b 56 86 5b 5b 11 98 4d 5e 26 | 1b d6 c9 20 6f 52 e9 5a a4 2c 26 ed 04 b2 dc be | 5d ce 66 9c 58 f4 61 27 fb c1 4e 8a 69 60 4b bd | f0 4f 86 25 0f a2 2a bb fe 4f 50 ef a2 d8 d6 78 | 6c 29 24 25 fe 51 e0 6c 3a c0 fd 3f 00 f0 3a f4 | 91 32 2d e3 b6 e9 c2 02 b0 11 e2 cc 36 2c 5f 10 | d5 2c ac 60 4a b1 d5 39 16 8d 42 4d 99 5c aa 84 | 91 c9 31 b0 23 ba 96 66 57 3d 13 7c 31 a0 b2 bf | fa 79 80 3a 47 a1 84 04 8d d1 db 1f 63 3d 31 9f | 0d 65 07 7c d8 39 05 9e 48 0a ce ef 34 aa 84 80 | 97 ab 9b 1c e2 7f e7 6e d5 2d e8 2c da be dd fd | a4 36 1e 62 ea bf ea e8 63 2c 01 66 94 be 8d 91 | a8 b7 16 4e 15 f7 b4 a4 5f 2d 8d 36 c0 1c 88 7f | de 2b af 28 ec 3a 09 33 ee 83 97 d2 90 d0 8d a7 | 29 00 00 24 88 b2 79 ff 2c a8 2c 3e 30 78 3a f8 | a3 fb 41 22 e8 46 1c 6c 2e 90 10 b7 fd 31 f8 c3 | 36 1a 6c 24 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 44 a9 8d f4 0a df ee dc c8 f6 79 | 31 59 33 9e 08 98 28 4b 00 00 00 1c 00 00 40 05 | 1f 98 b4 df a5 90 16 30 b3 41 56 5d 2e 2c cf 6b | 1e d4 e3 0a | libevent_free: release ptr-libevent@0x7fb34c059570 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c023c10 | #577 spent 0.0624 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #577 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #708 | start processing: state #708 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #708 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #708 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #708 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.235932; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.000691 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c023c10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #708 | libevent_malloc: new ptr-libevent@0x7fb34c059570 size 128 "road-eastnet-nonat-153" #708: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #708) | 83 fb 36 71 76 29 5b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 da 77 6f a1 f4 e9 2a b9 26 f3 f4 92 2d 46 f4 | b0 7a 40 33 85 5f c9 7c 72 d1 cd 54 8c 98 37 24 | f9 0f 31 c0 59 59 24 f6 b1 81 e9 3e 4e d8 2e 7c | d3 b0 17 2c 94 6a 08 cb de 35 37 9f 1e 5a 20 07 | 0c 50 86 38 97 07 6a e1 c5 0b 65 c8 6b 40 d7 23 | 14 ad 46 39 49 f8 1f 78 30 1f f3 26 21 9b 0d c6 | e7 c6 21 16 0b 17 ff 88 3b 14 95 13 3f 92 c8 82 | d7 c4 ee a8 41 71 fd 1b 20 11 da c6 5d 3a 47 d1 | ca bc a1 5a 85 26 5d 5a 28 9f 54 25 f5 62 92 f3 | fe 06 f5 6b 43 32 33 40 13 b4 f7 f9 75 91 87 ca | 2d 29 62 a0 43 63 6e 0a fb 1e d6 2f 78 ad 10 0a | 3c 75 ef b9 fa c4 90 84 df 4f cc 90 59 78 ab 87 | 9f a2 c3 c2 7f d2 98 4d 55 0c 9e e5 34 c4 ad d0 | 3c 21 98 a2 b3 b7 59 1e cb 10 0a be 37 e9 ef d7 | 36 78 d7 47 cf 88 0a e6 42 a5 bc 51 bf 4d 18 8e | 51 22 ad b5 62 a9 c6 e9 19 d6 ac 7e d0 4b 90 54 | 29 00 00 24 44 8a 54 75 91 ac 9f 57 e7 e2 61 bb | a3 bc dd 31 8a 95 c4 e5 bc bb 80 d8 96 43 b6 04 | ee a9 3a 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 36 27 57 09 35 01 20 a6 6d 08 d6 | 77 61 10 b6 75 1c 9b de 00 00 00 1c 00 00 40 05 | a5 a2 ff 3d 75 4a 07 bb 58 ea 97 e6 0f 3f 13 76 | 41 34 e3 b6 | libevent_free: release ptr-libevent@0x7fb35008da90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #708 spent 0.0629 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #708 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348018460 | handling event EVENT_RETRANSMIT for parent state #704 | start processing: state #704 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #704 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #704 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #704 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.236002; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.00018 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #704 | libevent_malloc: new ptr-libevent@0x7fb35008da90 size 128 "road-eastnet-nonat-227" #704: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #704) | 23 4c b8 04 68 32 c1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 3a ac 56 14 08 70 10 a2 34 db f9 cc 75 9b 41 | d9 78 33 6d 3e 54 14 96 f1 9f 07 fd 71 d2 bb f4 | f5 9d 35 70 a8 82 5c 73 ad 62 0d 20 44 a2 21 f5 | 94 5c 04 7b 84 43 ac 51 c9 f9 77 db b1 cf 7e 08 | b7 e6 cf a7 f1 9d 4d 37 b6 28 e7 f6 a0 a6 cf 8a | 2c a0 7b 96 11 a1 37 54 ae f4 a3 93 55 4b 7e 8b | d0 8a 27 00 d5 64 36 b1 c2 d9 ba 29 d8 a2 16 05 | dd fb 59 ef 24 58 33 9e ac 2a 88 48 84 e9 53 28 | c7 9d 5d bc 44 c8 70 17 d2 d0 d0 a4 35 72 da 6e | 9b 84 8e 8c 6d 4d 5b 4f fb cc 6d ee 81 aa f7 23 | 07 f9 5f 13 36 5a 45 44 ae 6b c2 b5 0c 64 f9 5d | 33 6a 2b a5 33 65 bb cb a4 25 6a c7 fc 53 f4 eb | ec fb f4 4a 8c 01 69 1e e8 15 90 da 3e e8 e7 e4 | a9 bc 12 b2 3e 67 e9 07 38 7b 7f ab 7c da 25 d2 | 97 fc 1f 16 04 10 f4 d2 00 07 db c1 f8 21 00 e5 | 11 9f f5 be ae 9a 37 75 35 e1 f5 13 de ae c3 61 | 29 00 00 24 2a fe 38 a0 12 7a 3e d7 16 fa 98 10 | a9 db 26 69 36 69 61 cd 14 ca 40 97 d2 72 a4 b6 | d3 f7 cf 73 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 45 5c 53 3c 72 83 7b 27 77 59 fc | 37 eb 14 fc 78 79 76 26 00 00 00 1c 00 00 40 05 | cc 0a e4 80 a3 0e b9 40 1f 4d be 4b 21 2f 7d 7c | 54 e3 c5 be | libevent_free: release ptr-libevent@0x7fb34804e3b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348018460 | #704 spent 0.0637 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #704 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b12c00 | handling event EVENT_RETRANSMIT for parent state #667 | start processing: state #667 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #667 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #667 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #667 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.236094; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.005133 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #667 | libevent_malloc: new ptr-libevent@0x7fb34804e3b0 size 128 "road-eastnet-nonat-166" #667: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #667) | 7b d9 27 49 fc 2f 27 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 df f5 cd e2 64 d8 37 7b 17 93 12 89 61 a5 0e | 54 43 72 d9 e7 56 eb 78 19 d8 ce 7b ab fc c4 ce | 29 4e 82 3c 51 f6 26 9f a7 b1 c1 26 57 58 94 3e | 7b 87 b0 70 18 07 62 51 cf ed f0 18 a7 02 45 64 | 29 d3 04 3c b6 f3 aa e6 9e b7 08 a5 d0 f8 46 16 | 01 f6 5d 3b b2 ab c3 c0 7a 8b fd 23 1e c0 aa 9e | 88 07 cd f3 38 23 f9 56 92 5f 01 ff 11 16 9f 7e | 88 51 70 b8 3b 7d 47 76 0c 28 0d b3 12 dd e5 34 | 27 62 ae d8 22 f8 9e d7 02 23 08 f5 22 88 a1 54 | ce e8 4b 93 e9 2c d5 39 6a b2 ee 0e 4a 7c 28 7f | b4 be ec 6c 77 cd 49 9f c1 61 d9 cb 36 3e a7 9e | a7 7c d6 ff 97 c2 82 05 bf cb cd 80 8d 87 fc a5 | 16 bb da c3 6e 7a 00 71 0f 91 4c b0 68 cd 77 21 | 13 d2 82 d8 54 7d 82 0e 40 c0 42 f3 49 4c 09 2d | 3f 2d f3 fc 4d 1d ea ae d5 68 9c c1 d7 8c 7f 3d | 4d 87 88 e0 eb 30 69 4a 07 13 c2 69 06 f4 34 e6 | 29 00 00 24 cf 70 1d 7e 4f db c9 b0 ee c5 af 49 | a2 ae b2 09 b2 1a 80 0c 2c 53 c7 0a 40 2e 76 18 | 3f 09 61 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd b0 a3 f1 2d 95 77 d4 30 95 3f d8 | d6 55 df fc a5 31 ef cf 00 00 00 1c 00 00 40 05 | 40 4e db d5 d8 6b 01 95 ad 35 71 f3 b1 25 66 78 | f8 5d ed 97 | libevent_free: release ptr-libevent@0x7fb36c082c30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c00 | #667 spent 0.0952 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #667 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374023ce0 | handling event EVENT_RETRANSMIT for parent state #706 | start processing: state #706 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #706 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #706 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #706 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.236178; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.001855 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c00 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #706 | libevent_malloc: new ptr-libevent@0x7fb36c082c30 size 128 "road-eastnet-nonat-185" #706: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #706) | d6 7f 43 f8 51 c2 59 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d ca f6 8d 57 76 e3 b2 b8 21 63 3a d9 6b 17 ac | 1d a3 0a a8 65 8a 73 ce 66 97 d8 a3 fe eb da 4b | 83 ee ee bc fe 2b d0 aa dd e6 65 08 18 59 e4 95 | 09 18 a4 39 b6 a7 f4 f9 2f da ab 36 4c 80 49 63 | ef 16 9b fe ec 5c ed 9e ae 36 1a ed 1b d4 af 83 | 89 ee bf 02 2f 2a 53 9b 57 89 ac f8 bf 5e 38 99 | e4 40 07 3c ed 06 cb ab b3 a6 c6 c0 55 73 07 12 | b5 0c 74 dc 1f d0 ce 7b dd e0 58 fe 36 aa 47 3e | 4c f7 16 70 36 92 d1 18 ca a6 68 9e a3 3e f4 fd | fd 01 7d 36 f6 5e eb 58 0f da ff 7f 73 d0 8f f8 | 40 11 40 98 2d 26 98 9d 07 8b f8 c9 08 66 7e 6a | 9a 49 1a 01 ed 32 66 90 e2 a6 41 73 76 5c f7 ec | 6c 8a d8 8d ad 2e 38 8d 00 f8 49 ba 59 c5 fb ee | 6d 7a 7c 5c 87 f2 99 5e 69 88 db e5 5b 1d 7d 33 | 71 a2 b7 37 fd 2b c4 8b c8 67 fb a6 f3 ec 68 08 | 8e 1b b3 a6 50 20 ca a4 1d 80 b1 97 13 a3 05 ba | 29 00 00 24 2d c8 fa 54 cd 1d 1f 06 d1 eb d2 15 | 6f e9 7e 83 80 52 a9 d8 d9 e9 24 fc ad 86 d9 31 | 9c b4 55 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b a9 09 9b 3f 46 0d e5 b9 f0 c5 5e | 3e 6a b5 e5 b3 2c 1a 78 00 00 00 1c 00 00 40 05 | 49 ac ac 8b 9b 7a cc f6 f1 c5 f0 57 32 77 7b 51 | e7 ba 7d 05 | libevent_free: release ptr-libevent@0x7fb3840581d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374023ce0 | #706 spent 0.0627 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #706 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3780297c0 | handling event EVENT_RETRANSMIT for parent state #631 | start processing: state #631 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #631 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #631 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #631 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.236247; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.975287 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374023ce0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #631 | libevent_malloc: new ptr-libevent@0x7fb3840581d0 size 128 "road-eastnet-nonat-48" #631: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #631) | 70 a3 fd 1e a8 25 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 0c 38 64 bd 90 75 9f 6f 92 36 c8 32 fc 5a 91 | 19 c5 27 39 9e 3d 6e fa a9 b4 93 c0 e2 21 ae e7 | 29 2b f2 cd be 11 79 2f 14 67 98 68 af ef 6c b7 | 7c 49 d4 d5 6b f2 96 c5 5f cd 62 c1 3d f6 b9 c8 | 3c 3f 90 e5 94 7d 5f d7 40 b5 3b 30 63 b3 2c 20 | e0 19 03 33 6b 20 1a 52 34 8d 2f 82 b2 f4 54 94 | ca 7d 83 fa fa 89 e0 76 73 44 23 d0 5a 21 bf 92 | 84 e4 00 41 6d 4f b4 c3 ae 75 39 7d af 77 49 89 | e4 4d 0f 35 ee 4d e2 83 d4 ca 79 6d 50 9d 01 59 | 1b 0d 7b 00 73 41 5a bc 4e d1 a2 f6 87 77 57 2d | 41 51 9e 57 ae 82 8c bc 6f 74 da 77 3c ec b4 b7 | 0d 67 75 cd a7 d7 60 f9 d7 00 35 db 27 bb fd 96 | 6c aa db a4 7d 91 93 be 0c a1 40 3d 78 2c 3a 66 | 44 36 30 72 dc 94 7a 66 d9 4b 31 54 35 c3 c0 a7 | 65 c4 9e a1 75 e6 4f 67 53 11 26 7b a4 49 c0 3c | 58 30 58 88 dc be 09 5c 40 05 2c 8c 1c a4 88 cc | 29 00 00 24 9b f5 7e 07 2a a5 6a 0a 77 9d e2 3d | f9 27 04 9a c8 ef cd 45 75 cb 40 b5 d2 eb a2 f4 | c0 62 4c 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f 3f 68 59 5a 72 2a af 6d a7 43 82 | b4 f3 5f a0 d9 b1 ec af 00 00 00 1c 00 00 40 05 | 9d 9a 0e 02 a6 46 77 bd aa 5c 25 4f ad 35 3d af | b0 60 dd da | libevent_free: release ptr-libevent@0x7fb384086f10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3780297c0 | #631 spent 0.0631 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #631 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a52c90 | handling event EVENT_RETRANSMIT for parent state #752 | start processing: state #752 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #752 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #752 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #752 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.236318; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.019725 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3780297c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #752 | libevent_malloc: new ptr-libevent@0x7fb384086f10 size 128 "road-eastnet-nonat-231" #752: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #752) | c5 64 20 5b 1c 85 54 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 d0 f3 e7 4a 6a f0 e8 90 5f 06 4d e1 8c 9f 3b | 1d f4 e3 4b 20 0b 8b 74 a8 b1 fe 8c 8a 59 de d1 | 16 28 a6 b3 0f 84 5b 56 83 ac 7e 32 a6 53 36 2a | 6a 2f 6a 43 eb c9 c2 27 18 66 c2 b6 33 15 55 47 | 34 6d a6 80 80 a8 a9 eb 3d 17 c1 00 cf 82 66 7f | 20 cf f6 6a e4 24 60 36 b4 97 22 51 aa 8a e1 03 | 48 19 0c a8 78 59 e1 07 72 7c 6b dd c6 e2 ba a3 | d9 65 69 17 a7 c0 a3 0a 55 b6 e5 ec fe e5 d7 0c | e2 b0 63 ac 57 e2 d2 cf 8d 95 42 f0 b9 eb 11 95 | 06 f4 89 63 1b 69 36 d8 f0 18 5a f6 11 36 49 d2 | 9c 2e b0 3b ce a1 a2 86 6c 95 83 75 36 ba e8 57 | 19 ab ae 24 a8 a8 8b f0 5a 1f 87 f9 4f 41 e2 02 | 07 52 df ae 68 e9 dc e7 08 15 ec 9a 14 88 f5 0d | e5 d1 7e 0b 47 52 22 7c 78 44 6c 0c 9c d0 6e ef | 1c ad c0 bc b6 c3 32 c1 e7 fe 27 7b 2a f8 63 2c | ed 16 23 69 56 c8 a9 55 34 58 cf 3c 9f 37 38 a1 | 29 00 00 24 4a 83 23 c8 a4 30 70 f0 5a 7c 61 66 | 38 1d 39 8c 6e 37 91 1c 03 43 e8 78 33 d5 cf ca | 19 09 4b 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f f8 c0 07 c2 89 1e 18 8b 01 61 d5 | b6 df d9 a8 3f 00 fb ad 00 00 00 1c 00 00 40 05 | 9f 2a cf 58 d8 ce 32 ac 63 1b 6f d8 96 97 22 22 | a5 d1 09 13 | libevent_free: release ptr-libevent@0x7fb388096570 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a52c90 | #752 spent 0.0628 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #752 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35002a9a0 | handling event EVENT_RETRANSMIT for parent state #571 | start processing: state #571 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #571 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #571 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #571 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.236388; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.956929 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a52c90 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #571 | libevent_malloc: new ptr-libevent@0x7fb388096570 size 128 "road-eastnet-nonat-46" #571: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #571) | a7 5c 91 a2 a0 c7 d5 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d2 2d 65 41 a6 d9 4a 2d 30 96 90 44 a8 28 31 37 | 20 85 a7 46 f9 e1 3b d0 db 2c f5 64 1e a9 75 76 | 5e 93 ea 28 89 51 63 91 c2 89 51 aa db f7 57 7e | 26 a7 18 d8 ed ef ae 29 0c 20 23 07 c6 99 8c 3f | 4b ac 3d e3 11 e2 e0 88 37 38 4e 28 f5 79 1b f4 | c1 45 26 7e 04 84 1e 25 df 1a 20 8e 42 60 ac e6 | bb 99 02 1a bf e1 fc 57 bd 08 cc 3f c8 a4 bd 39 | 80 32 fa bd 24 5a cf 7c fb ec 2c 26 c2 d6 b7 93 | db c7 66 31 ac a7 48 33 9b 97 36 24 dc c4 b1 1f | f1 8c bc dc 99 b0 9d 65 3a 26 8d b6 ff f4 30 2e | df 5e e6 48 46 c0 2e 8b 04 ae 3d 4f 49 6c 4d a5 | a8 2c 10 62 3e 2f 34 53 59 ac 0a 46 80 c4 83 67 | 5d 0e af 36 3f c6 bd ce a8 a6 96 6c e7 14 1c 6e | ec 46 c8 0c f2 81 fd 9b 02 c0 10 fc f9 7a ad 27 | 1e 8c 95 1a 96 66 8d d8 17 9e ab 39 d5 e7 6f 1e | 0f 90 04 2f 14 da bc 41 89 5a 60 41 1e 6b d8 88 | 29 00 00 24 f0 df 30 54 bd 5d 12 41 64 95 81 da | e2 16 b7 a5 91 f7 f0 c0 97 0a b3 7c fb 37 99 ec | 0e 53 6f 50 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 5d 3c ab cd 1f 05 d6 29 65 59 e2 | b6 05 c5 68 b0 d2 e9 9f 00 00 00 1c 00 00 40 05 | fe 1d 71 04 59 69 a8 7d 1a 5e 10 ed bb 6e 46 db | ec 57 9a 8e | libevent_free: release ptr-libevent@0x7fb36408b100 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35002a9a0 | #571 spent 0.0611 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #571 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a94500 | handling event EVENT_RETRANSMIT for parent state #557 | start processing: state #557 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #557 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #557 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #557 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.236456; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.937685 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35002a9a0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #557 | libevent_malloc: new ptr-libevent@0x7fb36408b100 size 128 "road-eastnet-nonat-37" #557: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #557) | 2d 38 86 43 43 f3 e1 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 b5 d1 8d 5e 9a 16 4c 4d d9 8d af 2f 02 f9 49 | 64 5f 56 86 14 f0 4f 6e 1f 70 fb 5c 5c 41 82 1d | 33 6e 56 08 67 54 02 75 6c f9 e1 34 59 7c 6f b1 | bb 1f 4d ed 4a a2 b7 f7 4f c1 0c 46 20 0e 28 4a | cd 21 92 73 5f 5d 35 8c fe 58 86 0b 7f 07 97 23 | d1 0f ec 97 a5 2c 87 13 2d 94 36 17 e9 57 93 bf | c4 c1 bd 13 03 ee ba ab 1a a7 44 ce 03 75 29 fe | b6 82 6b e3 c2 1c 1a 53 06 87 f8 13 f9 a2 78 a2 | 51 a0 ba f9 b0 6c 0b 05 eb fe c7 b6 32 0e 48 84 | 7d 7a c1 bd 77 ee ba 29 ff de 64 d5 ef 12 c1 40 | d0 a1 05 e1 31 4a 93 c2 70 e2 49 cf 02 83 53 ca | 2e cb f9 e3 78 24 ca 8e c8 8c f2 22 dc 20 cb 27 | 4a df 51 8a 3b da 00 bb b0 0b a6 42 b8 69 cf 0e | a8 cf d0 73 3e bb 78 2d bc 6c 41 8d a7 b8 30 76 | 9c 94 b8 c4 16 94 63 de 81 f2 b2 a7 e1 0e 52 f4 | ea 2d 43 a0 57 4b af 2d d0 29 08 d0 cb 35 56 38 | 29 00 00 24 a6 c9 1c ff c9 58 73 10 78 ba f6 c6 | 7f c6 b2 cd 72 d9 cc be ea 32 4d 34 a4 2f 7e bf | 63 21 24 e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 8f df 68 5a a5 1c ad e8 83 e1 98 | 63 b5 56 36 55 d8 0c 2e 00 00 00 1c 00 00 40 05 | d5 54 40 ea d7 2a 41 c5 f7 56 0a 7d 70 86 31 1b | a6 62 9a d1 | libevent_free: release ptr-libevent@0x7fb37c090640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94500 | #557 spent 0.0633 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #557 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3800383c0 | handling event EVENT_RETRANSMIT for parent state #581 | start processing: state #581 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #581 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #581 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #581 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.236527; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.949003 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94500 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #581 | libevent_malloc: new ptr-libevent@0x7fb37c090640 size 128 "road-eastnet-nonat-121" #581: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #581) | 32 81 f4 dc 89 2b 8b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 5d a0 37 46 04 87 9a b6 6f c7 58 5f 83 03 92 | 02 7c 2a 9d f7 53 2a e5 0b 99 84 74 ec e8 cd 8a | 37 bf 28 7a 29 fe a1 eb 1c 5b 7a cb 37 de ef 1a | bf c2 4e 23 55 33 da a9 f6 17 3d 8b f1 6d 00 2f | 62 ea 42 d9 b5 b8 8f 47 c3 23 ad 53 eb 4c 74 2c | e9 34 fd a5 c8 bb c5 80 14 80 c7 0b 8c 50 e2 47 | de 21 2d f2 8b b1 5c b6 9a 5d 04 45 b3 11 7d ef | e1 83 dd 1e ba b6 e0 ad d4 d2 d2 08 bd 90 e1 fa | 94 b8 05 91 5f a8 5e a5 f9 fa e3 25 cd 10 cd 73 | 6c 38 de b0 68 38 4f 9e 42 60 5f 63 68 b8 84 1d | 1e 04 f9 aa 37 d8 83 d0 d4 62 ad f8 03 24 51 28 | 44 a0 bd 38 97 06 60 9d 53 0d 2c c3 79 30 58 3d | 74 fe 30 eb c7 d9 28 61 30 6d 56 9a 52 da 0d 3c | ba a5 64 a7 7b ba f6 9f 41 d6 92 6f c0 bb 6e 63 | 61 ab be e9 7e 12 35 ed 54 b5 c8 d2 0e 78 a4 08 | 61 fb 98 ae 3e a3 b4 05 6b 0c e2 c6 c7 c1 c9 60 | 29 00 00 24 d1 95 dc 3f 02 70 5b 6c 62 02 ec 87 | 81 84 54 7b ca 76 e8 0d a8 e7 c8 f2 57 8a a9 b7 | 73 9c 0c 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 ca 9f f5 7d 53 45 e4 91 b2 47 fd | fe fb 46 b0 89 4e d8 b4 00 00 00 1c 00 00 40 05 | a0 2f bb 08 8b 1a a2 cf 99 1d b1 55 9c d9 bf a8 | b6 d2 07 0a | libevent_free: release ptr-libevent@0x7fb35c095ac0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800383c0 | #581 spent 0.0626 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #581 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370018460 | handling event EVENT_RETRANSMIT for parent state #707 | start processing: state #707 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #707 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #707 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #707 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.236597; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.996447 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800383c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #707 | libevent_malloc: new ptr-libevent@0x7fb35c095ac0 size 128 "road-eastnet-nonat-212" #707: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #707) | 6d 4e 2c b0 bf cf 55 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 9f d6 3e 98 b0 5f 73 4d ba b3 1d 62 98 ca 06 | dd 1e 98 88 ad 43 74 1b 2c 00 fd ed fc 05 58 84 | 27 da ca 10 63 1d 7f eb 9d 54 23 18 54 21 fb 77 | d0 11 3f 30 03 c7 bb 7b 6c 82 87 1e b2 c4 46 f5 | b9 75 85 86 87 c3 a0 25 db 07 f0 41 16 6b 87 67 | e8 54 09 98 f1 0a 76 80 fc ed 49 b8 84 22 18 a5 | 42 4a 4c 04 5d 3d 8e 7d 10 b9 03 9f 1f 7c 16 e2 | b0 5f 6c 5f c5 04 98 72 d0 8b 9d 1d 44 50 bd e3 | 32 b2 07 88 7a 5e 63 db 86 1b e1 1b 74 17 01 a7 | 1e e1 3a 02 f1 70 78 85 40 5a 51 fc d7 95 05 3c | cf 55 a3 5b 30 25 71 8a 68 40 5b 0b 8d cd e7 b1 | ed ec b5 28 b7 94 2b d4 3d d1 a5 be b7 54 c0 ea | b0 e9 b3 54 58 b9 5e 83 2e 20 37 1b a4 e8 3d 27 | 35 25 cf 41 31 d1 6b 1e 93 0a ad 4b b0 9d 1d 04 | 42 0a 80 11 8e 38 78 07 10 31 d4 fa 2a 6f d9 7e | c7 dc b2 d9 f7 11 7b c9 5d 8e 23 53 ed 2c 2f 94 | 29 00 00 24 a4 fd 7e 3c 32 99 82 33 41 85 15 88 | 3f 09 19 10 37 6d c6 9b 12 9c 73 58 6c cf 6f e0 | ec d4 d1 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 88 3f af 7f 85 3e a4 01 39 e4 62 | 4d 36 bd d2 6a b8 ee 4c 00 00 00 1c 00 00 40 05 | 31 2c 50 3f 9f 2d 76 af 33 2c c6 2e 60 90 ae 40 | 55 c4 27 3d | libevent_free: release ptr-libevent@0x7fb3640908e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370018460 | #707 spent 0.0664 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #707 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354012bf0 | handling event EVENT_RETRANSMIT for parent state #754 | start processing: state #754 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #754 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #754 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #754 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.236689; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.019159 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #754 | libevent_malloc: new ptr-libevent@0x7fb3640908e0 size 128 "road-eastnet-nonat-250" #754: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #754) | ba fc 0a 40 dd 57 2f 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 dc 3f 52 f7 90 e6 aa 55 28 27 9f 26 90 49 c5 | 4e 63 af 84 9c 24 2a 54 88 16 03 62 61 85 f0 75 | 96 ac b9 67 9b 1f a3 76 a2 7d d7 2a c2 0d b0 20 | 4c 76 ab 99 46 09 ae ba c5 a3 18 d9 2f 6b 75 6f | 8c 85 4a 61 60 92 93 9a 69 73 74 b4 71 5f 61 5f | 49 20 71 ee 13 df 74 12 52 f5 f7 6e e5 b6 47 13 | 81 a6 fd 04 c1 cb 97 6e a6 05 89 f7 1c c8 36 4f | 3b 16 b8 6b 1f f4 41 b6 2e 95 ff 58 91 d8 05 7b | 75 dd bd f6 54 1d 51 67 0b f9 12 22 e3 6a 7e fe | 83 e1 9b fb a2 25 c3 ac 81 7f d9 4f 94 b0 53 63 | 18 d5 76 25 b0 fb c2 e8 de d9 06 a6 92 1b 1a 4d | b2 14 44 77 4e 1a c6 51 54 6d 23 8f 6a 2b 6f aa | d9 e4 ba 5e 32 24 b4 f3 63 3f 1b 0f 79 02 db e4 | d2 10 63 1b 77 54 88 79 1a c9 10 a1 5b a8 e0 e0 | 2d a9 8a 89 9d 56 82 83 99 43 e6 10 16 f8 bb be | 4b 7e 7f d3 79 9f 54 df a5 06 38 28 00 85 76 c9 | 29 00 00 24 8f 59 38 2a dd e3 49 a5 d1 b0 e1 2b | d5 a2 3b 56 cd 53 01 3b e1 33 30 4f 0c 29 77 15 | 19 47 ad 54 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 85 ee 2b ce cb d2 9a af d5 06 f1 | d4 8a 29 3f c9 5e e4 58 00 00 00 1c 00 00 40 05 | 7f 6d 1a 4d 19 0a 8b 4a ad 47 7e e6 0e aa 08 53 | cf fd 3e 04 | libevent_free: release ptr-libevent@0x7fb35c06f3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354012bf0 | #754 spent 0.0994 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #754 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37402ffb0 | handling event EVENT_RETRANSMIT for parent state #618 | start processing: state #618 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #618 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #618 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #618 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.236802; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.979568 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #618 | libevent_malloc: new ptr-libevent@0x7fb35c06f3a0 size 128 "road-eastnet-nonat-139" #618: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #618) | 4c ec 39 dc 68 b5 59 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb 05 80 a5 c5 c3 f9 3c 54 41 f2 ff 45 6c 8e d4 | 8c 5e 68 7a a4 b6 14 c3 90 a7 72 c5 37 6e 6f 34 | 08 2b b2 1a 80 e0 96 44 12 49 4b 90 a0 23 38 84 | 7d 94 15 fa 5a f3 e0 cc 84 03 8f 8b 27 13 09 3a | 10 76 9b f5 54 eb 6e 14 d3 82 81 b0 db 0b 18 1a | 23 52 e5 6a 71 2c 20 30 0b 2d 6d ca 81 1f 7a 55 | e4 4b 85 3d 68 9a 6b d2 c5 64 b0 66 a7 3b 3d 0e | 93 9d 5d fa 9a a0 0a bf 68 5b fd ad 7d 7e af d8 | 9c 26 a4 24 3a 01 11 20 e2 46 b9 f1 ea 83 9f 1e | 92 ae 34 06 9d 01 75 70 1d c6 a8 17 f0 17 d4 e8 | 3f a5 fd b3 84 83 5a f3 64 23 e0 0e 62 67 3d 47 | bb 61 39 45 8d 5a 36 d7 90 42 a2 1e 97 de 94 c3 | fa ba ed 1b ac 33 c2 ed 5f a7 b7 09 79 e9 ef fd | d7 73 e1 c8 3d e6 bf ba cf ff dd 60 43 ef 89 b6 | 56 0d 72 f9 c8 aa 8e 1a 35 4f 05 5c 43 b5 97 90 | 99 49 cf 4e 52 3c a6 31 26 76 2b 78 5b c5 df ff | 29 00 00 24 f5 f5 e3 7d da 51 1c 42 32 a8 10 86 | f8 ee 92 c6 41 8c 4c bf 39 0a f7 2f 54 e9 a0 ad | 67 1a 3b 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 f8 d9 8a 1f 35 3a 8c 98 12 8b 5d | 4d ad 41 c9 74 54 12 de 00 00 00 1c 00 00 40 05 | 37 33 26 b1 70 e0 75 6d 56 a5 af 29 8a b8 60 f1 | 31 e0 30 c5 | libevent_free: release ptr-libevent@0x7fb35406f780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | #618 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #618 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34800cc10 | handling event EVENT_RETRANSMIT for parent state #661 | start processing: state #661 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #661 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #661 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #661 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.236938; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.992355 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #661 | libevent_malloc: new ptr-libevent@0x7fb35406f780 size 128 "road-eastnet-nonat-154" #661: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #661) | be 95 5c 7b 40 76 8c 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f ba ef 56 b8 99 c9 26 b1 07 42 76 09 76 7a 27 | 91 a0 41 2b a0 70 93 15 d8 a7 50 fe fc 23 ab 2e | a7 36 40 0e 91 38 15 2b 47 d9 88 bf 5c 3a f7 3a | b4 a0 b6 a8 c9 29 be 63 86 bd a0 c9 b5 5a 74 81 | 42 05 2c e3 63 22 b0 ab 60 c9 91 06 1a ae 70 20 | 27 d6 ef fd c0 2f 69 26 17 d1 9e c7 27 24 17 a8 | 24 d5 65 3b 9d f2 8c bf b0 68 e5 fe eb 23 a6 60 | 73 bb 2c 27 f0 6f 99 ad 46 65 56 ab e0 3b 17 ec | 9b 9d ea 8e 8a f2 38 63 83 4a 06 e3 25 cb 1e f9 | dc 65 77 ef d0 4a 78 7b 20 56 68 95 c5 c6 26 b7 | 22 1a 94 be 24 6f df 64 3f 4c a0 9e 67 50 56 a5 | ff de 53 8d 33 a9 a8 0c 5c 5c f2 d7 59 a4 9b b5 | ea 88 33 be 31 ed e9 57 b6 13 a2 64 ea cd 03 7a | c1 10 e4 c2 97 9a da b1 7b a7 87 15 5b 07 98 84 | 7d 87 44 3a 69 2f dc 0c 9d 8a 59 b1 b8 cc a6 60 | ec 16 5f 47 d6 09 63 e3 f1 2c 11 ea 7a f9 7f cb | 29 00 00 24 22 90 73 7f 5c d6 51 86 23 a3 e4 fd | 8f 56 6e 8b 75 d3 87 48 a5 61 18 f5 b1 fb d3 9a | 2f 6b 23 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6e 83 26 d5 67 d9 f3 fc 4f ff fa 52 | 66 7f 8e ec fb ca 45 a0 00 00 00 1c 00 00 40 05 | d1 0b 7b 8d 87 6a e6 ee 1b bd 92 49 cc 1a ec 1c | a9 25 6e 8a | libevent_free: release ptr-libevent@0x7fb3880805f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800cc10 | #661 spent 0.108 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #661 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #755 | start processing: state #755 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #755 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #755 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #755 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.237059; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.020768 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #755 | libevent_malloc: new ptr-libevent@0x7fb3880805f0 size 128 "road-eastnet-nonat-237" #755: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #755) | 05 2d 15 eb 8d d1 e7 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c e4 18 a4 fb 02 3a d9 56 aa ab 1f 07 98 9a b0 | 2b 63 06 c0 f4 31 d9 71 70 9c 4c 64 b1 c2 38 28 | 6c 15 1d 4f c5 ae a4 a5 43 35 ec 6e d6 ce 63 44 | c3 02 3a ce b9 ea 97 ee 29 7b 54 70 d5 96 ff 7e | 5e 34 ae 91 d7 79 f6 56 f6 05 21 93 eb 09 d6 2b | 31 ea 8c 72 22 32 80 ba 85 c1 fd 23 bc 55 76 a5 | 14 11 5f 1c 43 e7 b2 de 38 fc 2c a4 66 eb c7 d0 | 28 ae 74 a9 31 19 e1 df eb 9a 57 0f 92 b5 24 1b | f9 d6 9a c3 62 89 61 7f a8 28 b7 1b ae 83 62 6a | 52 6a f7 36 ac ba a5 54 22 cb 98 46 53 96 c0 75 | 28 f7 eb 90 7e f6 0c 82 ec ac f4 3f 47 1c 6c fe | 84 02 5a 18 bb f3 1e 67 69 d9 22 9d a1 ce 99 fa | c1 d1 64 9b c8 33 d0 0e 5f bd db 94 28 8e dd 95 | 12 8f 1e 24 1b 4a d0 41 03 fa d3 6e cf f5 c7 5c | e5 af 76 1b 64 bb 0a af 07 04 ed 6b 46 aa c8 6b | 3d 72 51 cb d5 1d a8 b3 e5 d3 ab 98 04 42 49 92 | 29 00 00 24 49 bb cf 23 e0 6f e1 de 61 d1 90 4a | 2d 30 38 2f 6a e7 9f b7 3b 9f e2 b1 72 e4 d8 55 | 05 54 cd 1b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 9d 20 ec 91 b7 c1 7d 70 e8 e6 28 | dd fd cb 82 74 04 84 bf 00 00 00 1c 00 00 40 05 | e9 ae 1f 41 fd b0 e1 3d 82 1f 24 48 4d 65 7b ae | 19 d4 aa 4e | libevent_free: release ptr-libevent@0x7fb360085320 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #755 spent 0.07 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #755 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3840489a0 | handling event EVENT_RETRANSMIT for parent state #560 | start processing: state #560 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #560 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #560 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #560 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.237135; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.944878 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #560 | libevent_malloc: new ptr-libevent@0x7fb360085320 size 128 "road-eastnet-nonat-21" #560: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #560) | 61 ee e9 29 f9 69 ed 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e1 5b d2 4d 27 a5 64 87 b5 53 0f 2d 27 23 c3 80 | 59 cc 4a 83 42 0a c4 7c 74 74 a9 17 dd e6 bf 21 | c5 97 86 51 a0 18 a7 55 17 b7 10 8d 1e b0 a4 7b | 87 6d 2d 89 28 1e 78 86 6d a6 2c 5e e4 1e 5e b3 | 8b ff f7 4a ed eb 04 dc d3 8b 68 b2 08 51 f1 90 | 83 7d 2f 12 5c 80 ab 52 30 6f 5a 2f 21 d3 f6 2a | 24 28 c1 3d 11 09 6e 37 07 e3 bd 5a 6b 28 45 fa | 2f 6d b4 10 49 37 83 73 b1 f3 31 9b 80 01 11 22 | 5f a1 e0 5f 63 e5 ef 6f d7 20 b9 78 da 97 fb dd | 03 07 83 ee 70 56 66 02 29 c9 ab 5f 38 ff a9 d5 | e9 8a e3 9f e9 fc 01 13 30 ba f0 d8 18 76 b9 3b | 5f 09 cc 0c 64 e9 65 14 08 ff dd c9 6a 40 e5 8d | e6 ec 0a 5e ab 63 d2 1f a2 70 05 7f 44 94 93 ef | d9 cd 76 d1 2d 31 22 90 40 07 c7 7c a2 53 ce 36 | 14 46 8f da 4f 94 35 cc 7b b4 58 99 54 67 3b 56 | 36 26 06 7f 4a 38 3d 7f b5 57 e0 c9 8a 7c b4 a2 | 29 00 00 24 6d da b8 df 8d 0e 39 36 00 cd 36 1c | c8 6c 4e d3 97 de 45 90 16 f8 97 1f 18 a8 59 71 | e2 d8 bb b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b1 4c ac 81 8b a9 9e 5f 7e 2a 07 3b | d2 dd f3 4f 02 d8 73 9b 00 00 00 1c 00 00 40 05 | 0e 12 95 b1 fc 7d ce a6 69 21 08 f2 b2 a7 af 4b | 42 43 c7 4f | libevent_free: release ptr-libevent@0x7fb3440596f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840489a0 | #560 spent 0.0657 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #560 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c00cc10 | handling event EVENT_RETRANSMIT for parent state #668 | start processing: state #668 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #668 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #668 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #668 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.237219; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.993588 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840489a0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #668 | libevent_malloc: new ptr-libevent@0x7fb3440596f0 size 128 "road-eastnet-nonat-110" #668: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #668) | 69 d8 43 4c ca 0f 15 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 41 d2 79 13 fa 3a 8f cb d5 3a 12 ff c1 bd 72 dd | ec 4a 69 1d f5 bf 64 dc 82 8e 85 c8 60 0f 31 b8 | 2a b5 99 5e 2e db 16 88 62 d0 a8 a0 e7 ed 8c 22 | 9b 22 dd 67 cf 53 b2 41 57 e0 6d 62 0b ae a9 e2 | a4 33 ef 81 fd 1e 99 10 3c 05 f1 b1 63 cd 1d 4c | 81 83 e9 17 13 bb 86 a3 f8 34 d0 be b4 67 f9 24 | 19 c5 94 10 ae 8f 69 b3 cd cc d3 2f 95 57 65 09 | 5a 47 e0 ce 39 9e ff 8b 27 cb 00 b1 06 c2 96 f3 | 87 01 78 7b 55 94 56 97 f0 1a b4 de 45 49 99 29 | 41 cb ee bd 0c bf fe c2 39 91 19 f8 ca 82 eb 04 | 9b 78 1c 89 01 44 b7 86 45 f1 a7 24 c6 c7 c9 55 | 95 6b c2 87 ae 27 a5 78 aa 04 30 8d d9 4e 9d 41 | 61 6c de ff f0 c9 f3 64 d3 6c da 3f e7 7d a5 7a | cb 07 a2 96 df 94 f1 bf fc cf 2f 7d 5e 6d 6f 1b | 83 aa 52 10 ad c1 b7 85 95 a6 c3 93 b1 03 49 41 | 3e a1 3a 94 67 5a f2 ab 4f 45 a4 3f 47 2b ce 53 | 29 00 00 24 8b 75 29 44 a0 34 83 1a bc d3 07 46 | 1a 97 11 01 01 9b c6 7d 43 08 5a 1e e3 e6 55 93 | 99 2b d6 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 9b 57 88 6a 86 10 db 30 73 b0 26 | 55 1c 17 3c 26 62 fc 8d 00 00 00 1c 00 00 40 05 | 6f 2b 74 b2 0a ff ff 57 56 7c 59 c9 0b 6f 36 1d | 69 a9 e2 f6 | libevent_free: release ptr-libevent@0x7fb37c07bc30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00cc10 | #668 spent 0.0767 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #668 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #651 | start processing: state #651 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #651 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #651 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #651 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.237291; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.988497 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #651 | libevent_malloc: new ptr-libevent@0x7fb37c07bc30 size 128 "road-eastnet-nonat-120" #651: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #651) | 1a 50 87 84 a9 ff b6 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f b0 d0 63 93 36 3e 05 3f d8 d6 98 23 8b d3 09 | a6 00 78 13 01 81 1e 9a 9b 73 6c 03 e7 97 c7 1b | 0a 84 93 85 00 d2 0f 42 a2 06 09 3e ca 76 f7 20 | f7 d8 2e 7e 15 56 e2 ea a5 ef 8c bf ce 15 8f 1a | 88 09 23 43 98 ef d2 44 53 11 dd 26 74 25 6f 29 | ac 6e a0 99 63 72 d1 be b3 57 f6 ad 0a da 95 1d | 18 60 71 f8 41 7d 97 d6 6b 27 e3 ec fd 11 12 f8 | 81 67 3a 79 45 6a 47 cd 2e 49 43 bd e0 c1 62 f2 | 98 2c 58 06 87 2c 1f f7 a9 0d 52 20 8c e4 05 0f | 2e 1c b9 0f 26 b2 5f 0c 36 af 55 16 37 0a 50 fd | ed c4 bf 0b 03 c3 8c 74 4e 72 bf bb 10 a3 5f 5d | 2a ab df c6 32 de 1f 74 dd dc 29 6a 62 0f ba d6 | cd 7f 75 5b 18 56 b2 b2 8b 55 87 e0 a2 48 c7 1b | e5 1a 41 ad 6f a6 03 13 4f fb 3b 29 02 ab c7 ab | 64 51 03 a8 1c 6b a4 37 1a 86 e8 46 e4 11 b6 ca | 91 48 08 9a a4 54 04 35 e3 57 3e 39 2c d0 ca 88 | 29 00 00 24 e4 4b ce 89 22 9c e4 d1 3c 9c 26 a1 | ce 1d 7f ff e4 4b fb 0d e8 f0 df 0e 05 12 8e e2 | 48 e7 f9 11 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 9d 26 4f 15 14 5e 39 05 f8 cb 75 | fe 3e e5 7e f0 bd 45 a1 00 00 00 1c 00 00 40 05 | ce 3e 0f f6 37 6f 31 d0 cc 66 b0 14 78 6d 46 0e | eb 95 c2 dc | libevent_free: release ptr-libevent@0x7fb35c0b6a00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | #651 spent 0.0773 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #651 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368018460 | handling event EVENT_RETRANSMIT for parent state #625 | start processing: state #625 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #625 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #625 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #625 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.237389; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.982723 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #625 | libevent_malloc: new ptr-libevent@0x7fb35c0b6a00 size 128 "road-eastnet-nonat-28" #625: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #625) | b6 c6 04 15 67 ea 52 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 2a 66 6b 96 87 d8 b6 87 d1 63 4d 22 c0 e8 43 | f1 17 96 ee d2 96 c1 ac af 74 7e 2f c1 03 56 b4 | 91 a7 54 2a 18 43 db 7b c1 dc c3 ab 5f 59 ce 4b | d9 25 40 3c d0 04 72 2a 68 07 37 d1 10 7c 01 e8 | 94 74 57 b7 97 ff 23 78 64 c3 af 87 e5 b7 c6 04 | 38 fa 82 8f 53 ae 4c 38 c7 32 43 6f fa 1b 8b c3 | 00 04 a1 66 ec f1 75 6b d0 65 36 16 d8 20 06 98 | 39 ae 59 43 75 ed d6 5d 3e 27 7d 1f d8 e4 74 3d | 30 32 2a 4c ff 09 92 fe 9f c3 2d aa 84 3b 5f 60 | 20 10 05 43 02 a4 89 ab c2 89 35 0a ee 99 22 a8 | 2c 69 87 17 77 7d f2 12 d8 92 a1 f6 c7 e1 0d d9 | 4d 19 7c c7 c9 40 d2 ce 5a d2 7a 84 a2 e5 a3 72 | 54 d4 31 df 9f 0f c4 a2 d8 0b 60 39 7a b2 4a 8d | 7f a3 22 4d 19 80 0d b1 4f 50 7b 7e 53 1e c7 29 | a7 4e d9 78 77 ad 99 a2 33 30 11 e2 f0 b0 26 5e | 18 8a 8a 03 05 6f 9e 8c db 1a aa 02 79 b7 97 43 | 29 00 00 24 f1 ab 41 0c 34 c5 d2 8d d1 08 09 15 | 25 e7 cb cc 49 7c d8 7c 03 ef 2a 6b eb 41 21 c9 | e5 2d 36 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 7d 5f cd 54 76 9a dd 2a e8 13 0f | d7 0a 04 ba 09 3a b6 b4 00 00 00 1c 00 00 40 05 | 72 40 34 7d e5 09 76 67 7d 7e 83 33 4f f6 4f 75 | 66 18 a7 1f | libevent_free: release ptr-libevent@0x7fb368052a70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368018460 | #625 spent 0.0977 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #625 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb364012790 | handling event EVENT_RETRANSMIT for parent state #580 | start processing: state #580 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #580 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #580 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #580 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.237499; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.948264 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368018460 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #580 | libevent_malloc: new ptr-libevent@0x7fb368052a70 size 128 "road-eastnet-nonat-115" #580: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #580) | ce a6 92 c0 a0 a1 1c a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 62 9c b2 99 63 23 d1 93 84 f8 c6 bc 03 8c f1 | 28 b3 ce e8 48 6d fc d0 0e a9 c2 9d 2d 9a 2c cd | 1f f0 93 df e5 a9 05 5b c8 c1 47 b3 5a 1c 0b cd | a2 95 bb 74 ae 94 51 dd 06 80 d5 6e c5 83 35 38 | f8 09 61 ae fb b8 3a ff 4b 57 1e 08 3c 1d 4a 21 | e7 43 37 6b 51 c8 a6 a8 1a c1 22 59 61 5e 5f 2f | b6 c5 96 ba 63 14 e1 d9 b7 d4 58 9e 9f e1 5d 87 | bd 9a bc 7a ff 27 dd 04 5e f7 15 28 0e 6d 1f 5c | 93 06 0d ed bd 1d 59 e2 0a 80 53 4c ef 63 50 ee | 1f 2d d9 4a 72 41 2a 22 6c b9 de 8d a4 62 87 63 | 24 a5 6a 1b a0 db 72 f2 81 6b 35 f5 c1 ba d7 29 | dd 15 a9 4a de e2 81 ba 33 50 3e e7 72 50 bf 75 | 5d 53 37 19 5e 9d 67 46 30 0c 5e cc a6 e8 91 01 | 51 ac c8 25 28 9a 12 77 ef 59 9c 00 f4 9a 34 3b | 2c 2f b6 d1 1c 53 57 48 b5 6f 80 17 ae 76 96 dd | ad 17 fc cb 17 9f 6e 5a be f9 98 d3 e5 2d d6 4a | 29 00 00 24 82 b4 09 66 1c 6d c4 04 c2 08 d9 05 | f9 60 c9 56 60 53 ce b0 69 de c0 ee bf 68 05 62 | 1b ac 43 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 67 b9 a9 40 de ae b7 bf 06 27 f9 22 | 83 cc d1 c8 91 a6 93 4b 00 00 00 1c 00 00 40 05 | e8 5b fc c4 4f 3c a4 be 53 5f ca 7e 63 49 41 b9 | 5c fd 73 7b | libevent_free: release ptr-libevent@0x7fb36405f230 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364012790 | #580 spent 0.064 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #580 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad43c0 | handling event EVENT_RETRANSMIT for parent state #665 | start processing: state #665 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #665 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #665 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #665 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.237571; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.98651 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364012790 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #665 | libevent_malloc: new ptr-libevent@0x7fb36405f230 size 128 "road-eastnet-nonat-135" #665: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #665) | 17 f4 78 a9 59 a3 a0 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 53 db 21 ce 0d 36 e8 32 4f 09 2d c9 12 93 03 | 3f 0d c8 57 d9 b2 d5 94 66 f5 2c af dd d9 9f 30 | ab 23 90 f0 60 2c 56 f2 ed e4 3b 19 92 7c 90 60 | ad a9 f6 f4 89 a5 b5 8a bd 28 e0 e6 2a e1 c4 4a | ab 19 3e 76 a7 cb 3f f5 b4 c1 ac d5 eb a6 51 0b | a5 22 3b cf 5d 35 78 58 b3 7e 27 7d a0 c6 9b ff | 67 19 62 12 ee 59 54 21 85 49 cb 45 55 53 2d a0 | 2d 26 f7 0a c1 cb a3 d2 11 be 8a 38 9f cf c5 aa | b6 3b 08 8c da 2a e2 3b d8 47 c3 96 5b 2d 9b 87 | 46 cf 56 9a ec 1a 60 92 d6 f2 05 73 ff b2 0b ce | e0 8c 45 e1 18 34 9e 24 c1 08 e0 e0 af 89 f2 77 | 7e 12 a0 ae df 93 58 3e 41 53 7a 70 bc 01 86 20 | e2 3a 31 eb 69 7b 78 f4 7e c8 5b 4a d3 b5 a7 20 | ba dd f3 68 f1 50 e0 df d8 9c 38 0c 45 05 f8 e4 | 46 fc 25 f3 c6 e0 f9 ac 5e f5 b0 29 3e 15 55 f0 | 12 34 52 a4 54 c5 e2 07 e5 c7 8a 47 07 72 65 b1 | 29 00 00 24 d3 a0 68 c2 b3 be 73 5d 25 6c 72 85 | 4c a1 62 e3 da 82 77 49 9b ae c7 79 c0 29 55 4a | d4 14 82 6b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 0c 4d bd 1f b3 c2 70 27 97 8c 0d | 77 2f 10 0a 09 ce 7a e7 00 00 00 1c 00 00 40 05 | 59 08 d1 ed de 8d 28 01 5d dd 9a 01 fe e8 dd 16 | e2 b8 56 65 | libevent_free: release ptr-libevent@0x7fb35806a310 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad43c0 | #665 spent 0.0632 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #665 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378012bf0 | handling event EVENT_RETRANSMIT for parent state #669 | start processing: state #669 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #669 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #669 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #669 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.237641; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.985614 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad43c0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #669 | libevent_malloc: new ptr-libevent@0x7fb35806a310 size 128 "road-eastnet-nonat-180" #669: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #669) | 46 a2 b7 1a 0c fe 64 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e 31 53 7e b2 89 dd d9 14 72 7d 9f c9 13 b2 a7 | 63 19 33 b8 10 a2 fe 59 17 6b 7c b7 37 86 65 b5 | 65 e2 70 cb 0a 7f 2e 78 64 ed 5e 82 f3 0a 01 66 | 19 63 cb 22 32 9a 15 07 e2 8f 9f 13 78 a1 94 38 | 6a 3a a9 9c 68 86 57 44 79 fe f5 47 ce f2 42 04 | 1b 64 29 d4 d9 a8 31 e2 d6 94 ff 12 34 20 67 33 | 3f eb 27 b6 ea 9f 51 b5 31 d7 e4 79 d1 75 2f 2e | 0b e0 61 43 30 7c 1e 88 88 5d ae 34 52 7d 83 d2 | 70 96 22 1a 57 50 af 3c 3f b0 a5 d1 35 bc b2 a5 | 5d a3 98 e3 c3 65 34 bb 25 67 04 de 8f f7 d1 38 | 62 08 6f 4a 4f 97 9e 27 42 a1 3c af a0 71 dc e9 | 88 9c e5 3e 13 70 8a 7a 18 08 7e f5 c7 28 a8 96 | ea c1 cd 65 03 cd 4a 04 4f c8 6b 29 fd ca 51 41 | 35 65 3e 5d 3d d3 fe 1c ec d9 09 50 c2 51 46 0d | d8 9f 47 d1 97 f0 ab 20 09 d6 b0 da 46 e7 a7 26 | 2f 67 cc 15 6a c3 da b4 1c a5 57 88 dc 7d ec 25 | 29 00 00 24 a1 72 a5 b5 61 3e 68 21 f0 1b e4 c9 | 7e f5 3a 1e e4 e5 46 a1 1b 4c 51 eb 2c c7 94 6e | bc 3a ce d6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 dd 73 ee 85 14 4c 35 d3 87 b0 51 | 27 94 ae 1d 74 91 ea ff 00 00 00 1c 00 00 40 05 | 6b 7f 6d de b3 f2 f1 3e 78 85 e6 36 cd 13 84 01 | 5d a6 40 15 | libevent_free: release ptr-libevent@0x7fb38806a670 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378012bf0 | #669 spent 0.0616 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #669 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b1c440 | handling event EVENT_RETRANSMIT for parent state #705 | start processing: state #705 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #705 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #705 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #705 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.237712; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.020481 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378012bf0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #705 | libevent_malloc: new ptr-libevent@0x7fb38806a670 size 128 "road-eastnet-nonat-219" #705: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #705) | e4 ea d6 a0 2f c9 a3 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 7c c8 42 8f 06 18 fc 5b 92 d1 29 9a b8 7e 41 | f6 a4 31 12 5b 26 92 fd 9f 47 11 64 9e 6f f4 e4 | 12 64 a9 5e 66 b6 e1 58 06 5c 6e a4 d8 cd a0 77 | d4 f2 75 d0 15 29 94 5e 44 f7 e6 25 17 2d ce d5 | b2 ac 28 52 ff 01 37 57 30 3e 89 ab 0b 8f b9 8c | 99 a4 b8 00 95 ca 4d be f0 0c 6f e9 1e 6b 01 06 | 85 ec 86 52 05 73 ad be b1 77 31 d9 4f 2a bd d2 | cb 65 32 9b 1d 91 2b 57 c3 a3 74 9f d6 0f df 80 | 71 49 8c 6a 29 4d 67 17 1a 96 61 69 5f ee 1a 4e | be 5e a4 e5 77 ac 19 89 87 3e 45 49 18 e7 4c fb | bd 46 d7 d5 ca 9c b5 11 06 64 b4 70 c8 30 4d 79 | a1 73 5b 2b 6c be 9e 44 fe 0f 31 6c 40 a6 5b 7c | f7 75 57 62 c5 d6 88 57 3b 7c e0 26 3f e9 11 e8 | e0 a2 3f 0b 6b c6 59 22 42 04 11 16 76 9d a3 7b | 56 7a 4e 9e 2e fe 0a a4 c4 36 99 d2 a5 5b 55 6a | 02 f9 54 cd b4 25 1d 90 44 15 dc 73 12 b3 5f ee | 29 00 00 24 2d 29 13 9f c9 17 1e e2 ce e9 19 17 | 61 b2 63 4d db 33 56 ec 2e 67 9b a1 ab af 70 d6 | 30 e4 5f 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 89 a0 7e 4b fe 45 8e e8 50 f5 c0 09 | 02 48 60 69 27 23 d3 25 00 00 00 1c 00 00 40 05 | 9f 1d 84 c9 70 7f e4 45 24 70 e4 75 c6 bd 55 ca | 26 ec 6e a8 | libevent_free: release ptr-libevent@0x7fb3580843d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c440 | #705 spent 0.0629 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #705 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #539 | start processing: state #539 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #539 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #539 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #539 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.237781; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.931119 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c440 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #539 | libevent_malloc: new ptr-libevent@0x7fb3580843d0 size 128 "road-eastnet-nonat-14" #539: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #539) | f3 ba fb 39 a0 6d aa 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 bb d0 0a e4 91 67 ed 30 3c 0b a8 5b 47 6e 58 | 54 a6 1f 2c 4e 7f d0 b0 bd e3 fb 18 4b 44 d6 1a | e7 86 6e da c5 94 ab b3 8d 6a 0d 7a e8 8e da 48 | 7f dc 72 ca c7 8b 8f e2 4b c2 09 25 60 11 ac 5f | ec 6f 9d 98 47 5c 60 fe c1 7b f0 93 49 fd ed 12 | b4 19 6a d0 14 ce f0 70 42 3f 04 32 d9 04 2f b2 | ca 5d 42 18 c3 28 44 0e 3f 08 71 5a c8 bd 7b 85 | a2 71 ba 72 c1 49 94 26 a9 aa 95 8a 17 20 47 31 | 6d db 6f 70 0f 42 41 97 8e fc 16 21 2d b2 dd 9c | 7c e3 bd 45 5f 99 25 ca 3b 09 1b ee c5 5d c9 18 | 96 1d d7 d1 61 c8 0b 67 e4 93 1e ef 62 98 f5 94 | 75 89 49 0d 58 ec c4 e6 07 56 cd e4 b6 53 c7 69 | e1 47 2c d5 f5 45 3c 00 11 d4 1f 84 61 b8 f1 04 | fb 90 dc 8a 6c 66 1c a2 30 6a 74 1f ab 66 b1 84 | d7 b4 5a ef a0 9a f2 72 32 b7 05 ac 32 be 29 ab | f5 fd d0 b4 26 2e 08 9b f4 e6 30 ae a7 38 30 21 | 29 00 00 24 51 ce ef f2 75 41 8b 68 df 93 8c 40 | d9 7b 58 fd 3b 35 84 b8 48 7a 28 13 ee d4 9f 84 | 78 f2 6c e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 be bb 4b fb 68 df d5 84 df 76 9e | 60 25 a9 1c de 34 76 1d 00 00 00 1c 00 00 40 05 | 90 f0 a5 6e 28 7a dc 53 c0 ae 7c b6 a4 4c 57 62 | 61 16 fb b6 | libevent_free: release ptr-libevent@0x7fb36c06a210 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #539 spent 0.0627 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #539 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350017ea0 | handling event EVENT_RETRANSMIT for parent state #605 | start processing: state #605 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #605 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #605 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #605 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.237852; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.973929 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #605 | libevent_malloc: new ptr-libevent@0x7fb36c06a210 size 128 "road-eastnet-nonat-85" #605: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #605) | 7d 69 66 b6 0b 09 69 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 9b 48 45 a7 cd bb af 89 5b c6 84 3e 6b 29 f5 | 82 21 ed b8 01 9b e9 d6 eb 48 22 a2 47 4c 8b 00 | 72 84 38 7c 84 0f e9 29 65 9f 0e 0b d9 68 a1 08 | 85 41 62 70 51 2b 55 5e e7 51 39 59 cd ab dc 26 | 7f 43 85 55 c1 52 ee 33 ef c7 05 bb 4f 2b ac bb | 45 e8 b5 9c 8c 32 a9 0d 25 75 95 bd 99 f6 bc 7b | 41 12 70 0b a9 4f 28 9d 03 5a 76 fc 2d 26 df 1b | e3 79 ba fa a5 3f be 69 d9 fb 38 21 c3 3b c5 39 | 69 72 3d 42 47 0c 0b a5 70 56 b5 cd e3 db e1 b4 | 55 5f 2a 24 b5 b7 72 1d 3c 1e c4 16 a7 e8 bb d4 | 1b 31 e8 de 60 cf e9 e1 53 db 5b aa 1e f3 c3 ea | 73 35 bd 86 03 0c b1 c2 d4 c2 26 cc 43 5f a7 99 | 82 c7 95 6d 26 de e4 a9 78 fc 7c 80 08 50 d4 6d | 8a 23 a2 4b 98 e9 f1 f6 58 c1 c4 56 2d b4 d5 be | e1 4a 66 10 6a c0 ec 3e 63 d7 99 07 ed 98 3e de | 3b 38 1f 2e e8 77 14 e6 cf 9e 3f eb e7 72 77 34 | 29 00 00 24 e5 d6 0e d1 07 36 d0 c9 9d 74 f9 e8 | 91 f8 2d 2e ee 7d e8 c8 bf 6d c4 2d b0 02 ab f4 | ee 91 2c 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 1f a0 9c 16 7a 2c 8b 61 32 59 c1 | 2b 37 d9 c7 8d 13 c7 70 00 00 00 1c 00 00 40 05 | 0c 6c 27 3d 37 c9 55 25 41 13 59 12 57 c6 07 0e | 1b e6 b3 6d | libevent_free: release ptr-libevent@0x7fb340071b90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350017ea0 | #605 spent 0.0633 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #605 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab3940 | handling event EVENT_RETRANSMIT for parent state #616 | start processing: state #616 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #616 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #616 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #616 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.237922; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.967684 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350017ea0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #616 | libevent_malloc: new ptr-libevent@0x7fb340071b90 size 128 "road-eastnet-nonat-42" #616: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #616) | 51 51 c2 14 b4 88 86 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 6f 7d 95 94 eb 35 d4 79 fb b8 ed ce b6 0e 8c | 0b ac 78 e7 dc 5d 85 9e fc ca bc 30 a0 af fc a7 | 83 d0 df 38 f5 b9 0e 7c 6c 0f 7c 9b e7 18 2b b0 | b1 47 6e d5 e1 d8 67 a0 a7 53 55 b4 30 4b 4f 05 | e0 9f 68 a5 8b 3d 3d f0 54 7c c1 cf 5b d8 d1 7d | 73 db c0 6b 87 64 87 39 90 85 4b 1a 6e 4a 55 8d | 36 06 71 74 4d 94 c0 cc c3 ca da b9 47 09 e4 21 | a9 ad 84 f0 74 96 ac a8 c6 80 80 8d a7 fe 6f 3b | 0b 61 80 4f cc e0 18 20 5b bc 01 56 5b 21 5b 7d | cf 65 0c bd 2c 1a 83 c9 6d 39 ba 26 63 02 84 48 | b0 ba 3f 13 d9 59 1f b5 ff fe 6c cb 2a b4 66 26 | 36 f8 c3 21 35 08 08 9d 44 88 c1 93 d8 01 57 ec | 98 49 a7 75 ff fd 0f 01 68 c6 f6 cf 50 73 98 74 | 99 a3 bf 5c 1f c1 3e 2b 89 23 5e 9c a4 d5 4a 64 | 1a 16 30 ca 38 de 10 97 61 4d bb b6 7b 95 79 00 | cb 8b 1d 61 ae 38 3a d9 0a 4b 59 fc 82 07 70 c7 | 29 00 00 24 6c a0 b2 b3 6c 5a 92 97 4b 6e 2b c9 | 2c 62 c9 95 6b 4d be 03 71 77 39 4f 3f 77 cf a6 | 3f 8f 1a 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 7b 4c b3 5e 00 28 2b fa 81 9a 72 | 9b 96 b8 73 09 50 16 c0 00 00 00 1c 00 00 40 05 | 46 0e 22 1c 6d 17 ec 1e 80 d6 7b 39 9b 19 6c 8a | d4 c4 4d a0 | libevent_free: release ptr-libevent@0x7fb35c05c110 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3940 | #616 spent 0.0613 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #616 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b25cc0 | handling event EVENT_RETRANSMIT for parent state #655 | start processing: state #655 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #655 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #655 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #655 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.237992; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.984228 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3940 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #655 | libevent_malloc: new ptr-libevent@0x7fb35c05c110 size 128 "road-eastnet-nonat-178" #655: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #655) | 11 f9 62 21 99 31 60 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d2 f2 c8 14 dd 6e 4a d9 42 c0 c4 4a f0 e7 cc ef | e7 5d 2e b6 49 23 3e e0 de 3b f5 ff 2f 66 a3 ff | d2 2b e0 79 ae 88 e7 91 da fb 2a 14 ef d3 ed 02 | fc 9d ab 8d 00 09 6b 86 12 46 d7 1a 25 33 8b 76 | 10 a0 b9 ab 87 66 c2 67 94 c5 19 d4 99 8a 3a a4 | e0 e5 fb 75 02 61 f9 b6 e5 03 ae 93 bc 63 08 03 | 23 87 dd 87 f1 99 04 c1 65 24 a2 b2 0d 42 f1 58 | 8f 80 2d d4 5b 45 fc 67 e3 e3 b4 96 3f 0d 08 58 | e8 5d 60 1c d9 ae 33 24 88 cd 2b c2 77 69 a9 2e | fc 24 c9 ae ae 48 af 44 27 bb a4 49 3a fe fd 12 | bf 17 d1 44 1a 6b 13 72 74 3a 58 25 69 e0 e0 38 | 37 70 99 09 b2 2d 6f 7e 81 73 3d d1 da fb 1c 86 | 50 79 92 bc 8e 3e 67 d4 3a 50 80 1c fe c2 a2 85 | 0d fc 0f 2c 8a 52 82 a7 dc bc 81 8b 7e a0 58 ba | 52 a1 bb d1 15 13 4d f3 ec 8b 68 65 4f 19 d6 4e | b1 55 17 76 9d 5c 64 09 58 93 15 e2 e9 b9 1a c8 | 29 00 00 24 64 6a 25 12 77 44 cd 38 c7 a9 25 d3 | 2b d2 f7 f1 74 31 8d bf 24 ab 69 dc 68 25 0e a3 | 82 ae d1 ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d aa d6 22 51 86 a0 91 29 6a b4 b9 | a5 b0 03 8a 19 a3 96 50 00 00 00 1c 00 00 40 05 | b7 fb 94 0f 85 81 96 f9 c7 ad ab b4 d9 f2 a7 73 | 54 2b d4 8b | libevent_free: release ptr-libevent@0x7fb37406f8f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25cc0 | #655 spent 0.0626 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #655 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354025320 | handling event EVENT_RETRANSMIT for parent state #533 | start processing: state #533 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #533 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #533 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #533 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.23808; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.932353 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25cc0 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #533 | libevent_malloc: new ptr-libevent@0x7fb37406f8f0 size 128 "road-eastnet-nonat-12" #533: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #533) | f6 ef 1a 2f f5 b4 93 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da a1 df df ca 4b 3c 26 52 53 bf 5e dc 26 41 90 | d1 df 23 21 a9 59 bf d6 ae 81 71 a0 81 4c 53 03 | 11 33 1a 4b b7 ab 53 01 6d 0e cc 7b 75 21 4e 97 | 25 1d 96 f6 6e 9e 8f 9d ff 1d 95 15 28 e4 03 98 | 5c 1e 2c f1 4b 5f c6 3a d5 37 62 da 61 45 46 b3 | cc 9d 86 7a d3 76 26 6f 3b f0 79 d8 87 45 9d b6 | 0b 54 6c d3 f6 87 87 b3 0e 07 df 90 fc 79 cd b8 | 24 00 5c 5b 99 aa f0 58 32 9c f1 f5 6b 32 0d 58 | f3 21 64 b4 72 d0 94 c8 05 ed d0 c6 3c b0 26 e1 | f7 cf eb a0 25 a3 19 2f 51 79 e3 59 1e 5a 51 9a | 3e 2a 58 04 1f d3 70 6b 24 34 43 84 0f 4b 98 43 | 23 8c c9 a8 bb f3 ad 2f b5 87 c1 54 1c f5 13 a0 | 38 03 e5 fc 8b 2f cc 40 23 79 b0 d3 84 0d e1 a0 | ea 45 1c 78 35 7d 50 eb b7 64 69 09 33 29 c1 68 | b1 bf 88 e9 f3 00 6b e6 58 a7 19 e9 1b b5 e5 43 | 74 e7 8d 22 51 ab 73 75 e3 5d e8 92 a5 fc f5 56 | 29 00 00 24 51 9c ee 13 ee c2 09 ff 20 a1 f7 f3 | 1a ce 85 4f 59 c3 37 7c 50 6b 1c 56 90 01 a1 b8 | e5 91 ca c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd ca 1b b3 75 23 bb 76 92 45 1b 72 | a0 fb dd 8a c0 43 64 68 00 00 00 1c 00 00 40 05 | c3 3f 99 f7 37 13 13 a6 f3 67 55 d5 33 83 4f 3f | 53 00 18 49 | libevent_free: release ptr-libevent@0x7fb35c0a6260 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354025320 | #533 spent 0.0952 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #533 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c025210 | handling event EVENT_RETRANSMIT for parent state #593 | start processing: state #593 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #593 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #593 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #593 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.238179; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.956821 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354025320 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #593 | libevent_malloc: new ptr-libevent@0x7fb35c0a6260 size 128 "road-eastnet-nonat-7" #593: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #593) | 08 0c 73 4d 95 6b fc 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3a 5b 8b 42 5a bf e3 df 41 c2 a5 fe 11 64 91 da | 13 85 25 29 02 a6 c9 9c 80 e3 1c ad 21 a7 2f 9a | 0b ca 3c ca e9 08 30 c3 5e 68 75 9f 48 b0 b2 2a | f3 14 8c ce 4b 9d 68 31 bf e7 06 67 bc f6 a7 2f | a5 2e 5d 39 f4 d4 74 52 bf f3 62 0c 0a b9 b5 aa | f2 b8 2f 6c d5 d0 6f 96 84 1e db be e8 02 03 7b | ee dc b5 2e 60 31 46 be ee 8e cd 6c 10 78 9e 92 | 45 23 ed 34 3c a4 82 16 54 50 71 ef 12 97 e8 82 | 81 30 89 f1 a9 de 93 55 47 e1 7b c1 4d 96 b7 09 | 0a 07 7c 6e 45 c4 9a eb b1 2d 13 6c dd 4d b5 76 | f9 0b 32 6e 41 44 dd 36 74 7c 38 ef 89 9d 82 70 | 70 19 38 86 e8 a2 d4 b2 17 ea 56 cc e1 b3 09 6e | ba 1a 8c a2 bd d7 7e d9 e2 59 e9 c6 5b e8 2e 95 | f2 48 7d f5 1f 8e 57 75 2c 61 06 ab aa 3a d4 66 | 6f 67 dd 67 06 ad 55 c4 42 9e ec 08 90 bd f1 bb | f6 d6 d8 db 80 e0 59 56 25 74 f2 d8 fc 0b 32 67 | 29 00 00 24 8d c7 ae aa 9e 1e 3a 21 f5 55 19 72 | d5 db e8 0f 54 51 8b c7 a2 ee dd f6 89 e2 5f d2 | eb 41 c9 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 5a 60 25 54 2e 1f 8e 3c a3 d4 e8 | 65 e4 94 da 40 a8 f1 52 00 00 00 1c 00 00 40 05 | e4 c5 d5 75 de 47 88 58 52 93 1c be 19 a0 a1 72 | fb ef e5 fb | libevent_free: release ptr-libevent@0x7fb37c051490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c025210 | #593 spent 0.0656 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #593 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a3fc10 | handling event EVENT_RETRANSMIT for parent state #532 | start processing: state #532 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #532 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #532 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #532 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.238257; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.956423 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c025210 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #532 | libevent_malloc: new ptr-libevent@0x7fb37c051490 size 128 "road-eastnet-nonat-23" #532: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #532) | b2 bb c0 cb 23 86 64 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 33 37 df 77 a4 8e a0 b3 e3 00 cd d4 2d ac fb | 58 54 00 1b 4e b6 44 51 03 9f 3e 46 9f 8f df 83 | c9 7d 11 8c 39 ac 49 56 ab 5f 41 17 92 3f a3 b0 | 7b e1 99 32 00 0e 68 82 bd 92 1f da 3c 9d d6 5e | 1a 09 1d eb 8b bd 63 f3 c7 1c 91 de b6 81 48 d2 | a0 a0 d6 ca 6c 4d a4 58 b2 e4 43 1e 98 6f d3 dc | 45 97 3f 9b f6 f7 45 82 be d0 0f 1c 45 5c 9c 3a | c9 3a 6f 09 cd d2 f4 e8 72 09 bb 9c 48 02 f4 93 | 79 d2 c5 38 6e e0 b7 1e a4 59 ec 3a e6 82 c4 a8 | 46 c4 00 ed 3b 00 2b 60 1c 85 f0 e2 d1 ff 2f 3b | f9 d8 e6 be 72 54 6d 2f ce 69 68 10 dd 93 1f 49 | fd e3 cd 64 0c aa 7b da bb 78 88 4b eb 80 ba c8 | 39 a1 18 86 70 40 67 20 3d 9d ab 72 e5 25 d4 7a | 31 49 e3 a6 76 67 2f aa 74 53 9f 57 5f a1 88 a4 | ed d9 e3 9b 5a 62 f9 e8 ef 24 03 36 4e 35 9e 0d | ce 1c 96 2b 87 5a 84 0b cf 90 a8 01 d2 bb a7 f0 | 29 00 00 24 07 01 44 17 16 f9 66 65 39 42 87 0c | 7f 44 e6 59 85 b5 ac 74 8c 57 ff 68 a2 f9 2d 4f | 6f 8d 12 aa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 d6 21 28 13 22 29 44 67 d8 0e 41 | 43 e4 97 1f 21 5e 2f 85 00 00 00 1c 00 00 40 05 | d5 1f cb 66 19 77 3c 8a 10 7e 62 eb ee 00 e2 86 | a7 15 35 82 | libevent_free: release ptr-libevent@0x7fb37c064680 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3fc10 | #532 spent 0.0621 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #532 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36000cc10 | handling event EVENT_RETRANSMIT for parent state #632 | start processing: state #632 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #632 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #632 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #632 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.238332; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.967612 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3fc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #632 | libevent_malloc: new ptr-libevent@0x7fb37c064680 size 128 "road-eastnet-nonat-188" #632: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #632) | 4f 74 43 70 ed 5f 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 00 b8 55 d7 88 c2 72 f0 05 df 85 ec 3a f6 75 | c1 ef 75 7f ad 60 cc e9 f1 77 a3 7c d9 0b 5e d5 | 5d c2 1a 6e 0a 46 25 ac 06 20 d7 68 9d d2 6e 25 | ff 6b 15 79 a6 94 b8 c3 d0 6e 41 bb 8d ed e7 21 | 63 3d 1a 26 b0 0a 45 94 1e de 46 6a 6a b6 4f b5 | d1 7f 40 6b 2f 4a eb 4d d8 86 e2 e5 25 78 85 80 | 6e 6e 80 63 f5 0c 4b a8 f2 cd 0b 82 23 03 99 14 | 83 47 9a 20 36 c0 ef de 6d 79 4d 5f 95 db 5d 28 | 9f 23 ff a4 10 07 57 b0 78 ff 65 d6 2e 5b 99 08 | 70 cf d4 59 3d 0b 5e fb 55 e9 4e f3 7f d6 14 5d | 1b 27 9a 34 94 bb 77 54 18 eb 5d 4f b4 d5 7f a1 | 84 3d 42 6a c2 f0 c5 b1 ce 30 19 3e 4b 4e a9 58 | 62 a0 4c fb aa 00 f1 a2 66 c0 f9 94 d1 cc 56 3e | 8f 68 09 9e 6a 9e 42 7d 62 7d f6 ec 9f 62 81 40 | 6f 50 24 39 28 5b 86 fd b5 92 57 3f 4d 8a 71 00 | f5 59 1b 4f 8b 96 06 35 4a d8 d6 af 37 4a c9 2a | 29 00 00 24 a3 75 cf 0b e7 29 9a ce c3 82 42 b5 | ee 71 0d 4b 51 1b b0 f6 01 1d 7a 9c f9 27 59 b6 | ed 31 8f 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 12 4f f5 3c 8b 41 44 6c 4b b5 e9 45 | 24 d2 05 c0 c4 f0 a0 78 00 00 00 1c 00 00 40 05 | 4e 5a fa ec b2 4d 50 c5 f3 4f a7 18 04 21 31 68 | 73 18 f4 1b | libevent_free: release ptr-libevent@0x7fb37c06c900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000cc10 | #632 spent 0.0641 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #632 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b24680 | handling event EVENT_RETRANSMIT for parent state #629 | start processing: state #629 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #629 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #629 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #629 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.238409; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.990538 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000cc10 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #629 | libevent_malloc: new ptr-libevent@0x7fb37c06c900 size 128 "road-eastnet-nonat-71" #629: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #629) | f2 94 01 51 22 3f af b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 4a 7c e2 24 38 23 63 44 71 d0 61 ed e2 db 72 | e6 61 bd 05 9a 47 1a a4 e0 bf e2 b3 38 98 dc f5 | a8 2e 85 9f 39 94 94 de 61 d4 d7 e0 6f d5 4b c2 | 89 35 8a 19 c0 0b 46 04 61 a9 d7 30 7b 04 fc 12 | e6 01 83 16 c3 75 c5 9f 9a cc 41 f6 3c df 59 2a | 0f 08 5d 35 9a ce e8 c9 26 c7 0c bd a0 e0 6f e3 | 48 c7 a8 ee 4f b3 e6 8c bc 55 d6 31 9f e3 ee e7 | f2 e1 44 07 35 ec 7f 8d d3 6c 7c 13 76 3d eb f9 | d5 7d 76 3c 3b a8 5c be 62 a6 f1 e1 77 d6 70 e5 | b8 30 16 1f 9c 9e 52 90 ea f1 be d9 f2 c9 5f 95 | 77 8c 0a b4 bb a7 f4 25 bc 2d eb e9 11 f1 32 b5 | 35 4d 8c 02 40 af 7f 94 52 b2 4c 1d e7 2f e7 74 | 72 3e 84 0e 3a 79 5f 30 6a 29 cb 0e ae 9e 72 ab | d7 8e 3e b9 a0 36 1f e0 6e 15 d4 61 f3 83 66 72 | 3e c1 e8 80 18 c3 99 46 a8 a9 91 ab f2 9d 81 1a | 78 1d 17 58 a0 48 32 bb bb 73 79 08 2a 3f 1e 4a | 29 00 00 24 55 56 e2 01 45 9b b6 83 ff 84 a8 c5 | 23 34 d8 e3 d8 71 fd 93 f6 a7 41 77 7b 3f 0d 89 | 52 a4 4e bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da 5d c3 fa ce a9 5d 3b e4 cc 6b 32 | 6c ae ca 02 24 ef 22 16 00 00 00 1c 00 00 40 05 | e7 00 f0 76 0a 46 ce 87 53 dc 2a ab ab 46 52 9b | a3 29 a0 f9 | libevent_free: release ptr-libevent@0x7fb354074f60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24680 | #629 spent 0.0636 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #629 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #716 | start processing: state #716 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #716 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #716 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #716 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.238486; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.015297 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24680 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #716 | libevent_malloc: new ptr-libevent@0x7fb354074f60 size 128 "road-eastnet-nonat-205" #716: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #716) | 15 cc 63 e1 75 96 2f 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 dc 43 34 c1 27 75 84 11 ed 21 f4 e0 64 42 f7 | c1 3e 43 b3 2e 58 fc be 1b bc 53 63 f4 17 1c 6e | 5a 45 c6 f0 ee d5 d4 c6 e3 d7 81 ef f2 fc 94 66 | 39 e4 1e d2 9b 3e c7 28 c2 8b bd 93 f2 64 11 f3 | 6d 23 8a cd c0 e1 82 ee 9f 75 ce e2 44 b6 22 97 | b0 c8 8e 1c c2 54 f6 e5 b0 5a 7c be f1 58 3b af | 05 be 31 c0 84 4a ea f9 f1 d6 8f c9 37 52 41 dc | 85 26 42 e2 6b 91 5c 08 46 f5 3a 3f 3e 0c a3 55 | 9a 1f 55 f0 63 1e 9b 9f b7 db 3f a7 92 12 e2 1c | 71 2e e6 9d 0c 47 67 7e f1 af bc 6a f8 c7 1a de | 1b cb c2 40 86 c2 28 a1 ad 88 3e 5e b7 2c dd 98 | a7 93 94 47 b6 7a 9a 3f be ca 7f 22 14 8e 7e 92 | 47 e5 43 10 40 3b 02 34 62 d6 f9 32 a9 14 c7 88 | a6 fc a7 e6 13 8f 48 a9 3c 09 bc 34 a6 f2 66 32 | 93 05 6b 00 f2 c3 6e 0d b4 b4 e6 20 5c 15 86 46 | ac a1 7d 60 75 3b b9 68 18 8d c8 ea 5e c4 4c 21 | 29 00 00 24 50 21 0d 31 fe d3 b4 a7 ac 53 44 3d | ea f7 97 43 73 d7 d9 9e ec bb 48 86 85 79 7b 5b | 1e 65 bb 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 9d 08 f6 6e 7f ce e0 5c 6f 3f b3 | 3b aa bc 8d 53 41 77 8e 00 00 00 1c 00 00 40 05 | 6d 9d 29 89 37 a0 02 51 09 39 ed 22 b1 d6 21 cb | f4 e3 b2 ae | libevent_free: release ptr-libevent@0x7fb3540906c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #716 spent 0.0625 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #716 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb340025210 | handling event EVENT_RETRANSMIT for parent state #660 | start processing: state #660 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #660 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #660 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #660 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.238563; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 1.9804 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #660 | libevent_malloc: new ptr-libevent@0x7fb3540906c0 size 128 "road-eastnet-nonat-158" #660: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #660) | f4 6f 1b dd c3 97 a8 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 37 97 23 37 8b 84 91 b7 d5 21 d4 0b 62 7c cf | df e2 ac 72 2e 0a eb 49 05 1e 0b d1 82 e5 28 a0 | 47 bf aa c5 1d ae 5f 11 86 7c 19 a8 50 7c 93 a7 | 55 26 f6 b4 50 6b 43 66 6c c7 3d c1 5d f4 f7 0a | 0d b0 76 fa d6 23 62 3b 1d 9f 31 fa 3c 7b 58 7d | 20 ee 3b e3 02 2d bf 91 fc fc d4 ac 54 85 8f 34 | bf 3f 83 61 da 9a ff 82 88 23 3a fb 4a 68 00 0e | 90 da 22 07 27 44 0b 38 18 7b fc 7b 8a 26 93 c0 | 1e 09 9d 89 91 4e 14 70 0d 4d 2d 4e ab bc 7f 26 | aa a9 94 f1 34 22 dd 7b 42 4c a3 e0 64 ec 38 19 | e6 3a a1 45 f1 cc d3 8d 48 6c 60 e0 64 aa aa ad | 45 97 98 aa 45 d3 c1 ab 72 70 13 f6 87 f5 77 97 | bb d6 89 10 72 26 9b 74 6d a2 b8 41 cf 4b ed 68 | 80 d1 34 25 2d 5a f2 69 e3 2f e2 d6 b5 73 2b 4f | 8b d7 f9 67 93 34 a8 36 26 8a 04 d9 41 75 a6 2d | c6 bd e6 a0 4a 9b e7 19 bc a9 be 99 5e cb 41 13 | 29 00 00 24 f1 66 b3 02 a5 40 db 5b d9 27 9e 01 | 78 88 6e 9e 88 60 63 b3 32 3e c6 3b 89 b4 92 37 | a6 ee de 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f 7f 7c 35 fb 6c 2b b5 a9 0e ea 70 | a6 e8 51 cd 42 c4 a3 5b 00 00 00 1c 00 00 40 05 | ce 14 69 fa 68 3a 26 bd 8e d9 0e 4d a9 f2 9c 90 | 2d 53 9b 3d | libevent_free: release ptr-libevent@0x7fb378075590 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340025210 | #660 spent 0.0638 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #660 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46adc640 | handling event EVENT_RETRANSMIT for parent state #756 | start processing: state #756 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #756 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #756 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #756 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.238638; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.020814 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340025210 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #756 | libevent_malloc: new ptr-libevent@0x7fb378075590 size 128 "road-eastnet-nonat-249" #756: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #756) | ab b5 91 0b be 67 d7 85 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 d0 0b f2 10 30 f6 71 1f 52 95 5b e8 84 71 d8 | b6 b3 10 4f b8 55 03 27 62 11 e2 42 15 c0 2e 29 | af 7e 73 a6 41 c3 b1 35 90 96 0e 47 d0 76 07 a9 | 2b cb 96 02 37 a3 ad 49 a7 3f 01 e5 75 c6 65 12 | 57 6e 8d 37 95 0a 16 59 b9 51 41 ba 40 c3 b9 65 | 2a 6f f8 33 e2 59 37 70 46 6d 6b 62 cb b6 f2 1e | c1 f4 5c 3f f2 8a 2e 11 d3 d5 38 3b 01 cd ba 1e | 36 d0 b1 59 ee 21 ba 67 dc 67 7f ac 18 5d ee 64 | df 96 2d b0 3b 2f 42 82 e4 47 da e6 c6 85 9c 6a | 6e b9 1c 9f de fc 80 2c 8f a9 d1 a8 95 91 00 d2 | 9c 44 d3 94 50 87 14 71 86 2d f2 72 6d b8 e3 23 | e7 7f e6 3d 7f 22 68 1c b4 f2 79 c8 40 1e 0d ff | 0d f9 a8 b4 e4 e9 a4 8d 37 24 73 7b 55 05 6d 7d | b4 29 f9 e5 9a b6 d0 4f 47 2d e7 59 1c d4 96 2d | 12 ee 9c 8f dd f2 7b ff 88 08 ab 64 b4 ba 21 15 | 53 99 9f e0 75 15 e2 71 70 09 49 52 bf ef 18 8c | 29 00 00 24 f2 16 4e f4 49 9c 51 e5 b1 12 94 4d | 27 c5 37 4d 3a 23 1c 11 e4 13 5f 53 31 01 4a 86 | 80 54 c9 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 ca 45 b8 db a1 b9 58 c3 06 7b b3 | ca d9 2a 0e 01 f5 5c 0a 00 00 00 1c 00 00 40 05 | b1 fa be f6 27 73 b2 ce c8 1e 50 4f c1 a6 7d 93 | f4 9a a8 7c | libevent_free: release ptr-libevent@0x7fb3640ac040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adc640 | #756 spent 0.063 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #756 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b25c40 | handling event EVENT_RETRANSMIT for parent state #719 | start processing: state #719 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #719 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #719 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #719 keying attempt 1 of 0; retransmit 3 | retransmits: current time 49722.238714; retransmit count 2 exceeds limit? NO; deltatime 2 exceeds limit? NO; monotime 2.018681 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adc640 | inserting event EVENT_RETRANSMIT, timeout in 2 seconds for #719 | libevent_malloc: new ptr-libevent@0x7fb3640ac040 size 128 "road-eastnet-nonat-193" #719: STATE_PARENT_I1: retransmission; will wait 2 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #719) | a1 e8 20 43 a8 88 d4 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 ab ba d1 12 9a ec ff 2a 8d 05 f1 61 72 fc 12 | 50 d0 8b 0a f5 f8 07 f6 3e bb 96 36 70 dc 69 15 | 19 13 a2 d6 28 22 91 85 b9 c6 ae 40 f1 6f da 62 | 5e 9b e9 42 bc cd 47 a9 39 f2 57 46 62 a2 10 aa | d8 dc 57 a1 b1 b0 e1 a2 6e 21 37 a0 e6 91 53 43 | 3a 39 b3 13 b9 9a a2 2c 1d 20 6a 6b ed 1a b3 d6 | c1 d0 e0 c4 cd b3 32 14 d0 e6 ed 44 76 72 46 07 | d4 18 aa 83 01 f8 a3 38 90 94 a1 fe 3b 59 34 42 | 25 b7 b1 5f cf ed 7b 9e e4 7a 92 07 5e d0 c7 a2 | d0 7e 54 5b 4b f9 50 6a 40 3e 4c 40 b2 5c 33 c4 | 63 a9 26 d0 d8 64 ca 1f 4a 1f e3 d6 1f 89 7f 4f | 6e 5e 19 7f cb da f9 38 d8 39 8e fa f7 bb 35 44 | 19 f4 69 49 42 32 1f e6 a6 69 2b b3 d6 b8 11 37 | 64 4d 1e b3 f2 07 24 9a d3 3f 11 59 ae e5 5b 71 | 8d b9 39 61 c8 17 f2 28 f6 ff e7 6f 1d 64 87 fa | d5 05 27 cd c8 9d a9 d6 a8 55 c4 9b 8a 80 03 48 | 29 00 00 24 35 05 0b 61 81 12 01 a2 56 70 69 a8 | c1 2a 37 d5 7f b9 83 93 56 ce 1a 17 bb 38 92 4e | 85 53 16 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea c6 0c 55 e6 7e 39 b7 3e fa e3 87 | d8 fd e1 5c eb b3 f6 df 00 00 00 1c 00 00 40 05 | ea 71 42 1a 2a 30 c7 3c 78 cb 6c ab 7d ed 04 39 | d2 40 14 db | libevent_free: release ptr-libevent@0x7fb350077b10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c40 | #719 spent 0.0631 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #719 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e2 d2 81 3a 91 66 0b 16 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #721 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #721 | rejected packet: | e2 d2 81 3a 91 66 0b 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 68 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-104" #721: ERROR: asynchronous network error report on eth0 (192.1.3.104:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0572 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 36 da f7 c5 2f 91 5f 13 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #723 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #723 | rejected packet: | 36 da f7 c5 2f 91 5f 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-155" #723: ERROR: asynchronous network error report on eth0 (192.1.3.155:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0377 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 77 e1 0b 63 56 ac c5 72 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #659 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #659 | rejected packet: | 77 e1 0b 63 56 ac c5 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 94 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-148" #659: ERROR: asynchronous network error report on eth0 (192.1.3.148:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0374 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 8d 95 68 b5 8b 23 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #677 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #677 | rejected packet: | 50 8d 95 68 b5 8b 23 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 67 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-103" #677: ERROR: asynchronous network error report on eth0 (192.1.3.103:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0347 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b6 9c 40 58 3d 0c 12 38 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #637 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #637 | rejected packet: | b6 9c 40 58 3d 0c 12 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 89 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-137" #637: ERROR: asynchronous network error report on eth0 (192.1.3.137:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 c3 80 a5 94 99 7d 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #753 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #753 | rejected packet: | 43 c3 80 a5 94 99 7d 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #753: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0557 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 2f d6 9f 11 e5 1c 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #569 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #569 | rejected packet: | 55 2f d6 9f 11 e5 1c 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #569: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0485 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 89 83 1d 48 ce 70 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #735 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #735 | rejected packet: | 53 89 83 1d 48 ce 70 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #735: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0348 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b be 7d ad 6e 47 4b cb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #727 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #727 | rejected packet: | 8b be 7d ad 6e 47 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-210" #727: ERROR: asynchronous network error report on eth0 (192.1.3.210:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0358 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 21 cc df 44 fb 91 db 61 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #749 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #749 | rejected packet: | 21 cc df 44 fb 91 db 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-176" #749: ERROR: asynchronous network error report on eth0 (192.1.3.176:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0347 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 66 c6 fb f7 91 6b fb df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #750 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #750 | rejected packet: | 66 c6 fb f7 91 6b fb df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-251" #750: ERROR: asynchronous network error report on eth0 (192.1.3.251:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0347 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 6d 7f 89 27 62 b0 3c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #572 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #572 | rejected packet: | ae 6d 7f 89 27 62 b0 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-13" #572: ERROR: asynchronous network error report on eth0 (192.1.3.13:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0361 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a2 ff 7d bb ae e4 ff 23 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #696 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #696 | rejected packet: | a2 ff 7d bb ae e4 ff 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-215" #696: ERROR: asynchronous network error report on eth0 (192.1.3.215:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.035 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 51 a3 6f 68 f7 9e 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #672 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #672 | rejected packet: | 8a 51 a3 6f 68 f7 9e 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 88 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-136" #672: ERROR: asynchronous network error report on eth0 (192.1.3.136:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.035 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 68 6a 0b 04 fc 21 19 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #743 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #743 | rejected packet: | 33 68 6a 0b 04 fc 21 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-233" #743: ERROR: asynchronous network error report on eth0 (192.1.3.233:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0359 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 56 db b7 23 55 ce 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #712 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #712 | rejected packet: | cc 56 db b7 23 55 ce 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-194" #712: ERROR: asynchronous network error report on eth0 (192.1.3.194:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0343 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | df 64 65 78 b0 09 88 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #688 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #688 | rejected packet: | df 64 65 78 b0 09 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-95" #688: ERROR: asynchronous network error report on eth0 (192.1.3.95:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0346 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 64 5e 88 2e 86 68 44 93 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #725 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #725 | rejected packet: | 64 5e 88 2e 86 68 44 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-196" #725: ERROR: asynchronous network error report on eth0 (192.1.3.196:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0352 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 62 bc 01 e6 ef 5b 20 48 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #737 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #737 | rejected packet: | 62 bc 01 e6 ef 5b 20 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-189" #737: ERROR: asynchronous network error report on eth0 (192.1.3.189:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0345 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2c e7 79 4e 69 36 cf 88 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #526 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #526 | rejected packet: | 2c e7 79 4e 69 36 cf 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 83 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-131" #526: ERROR: asynchronous network error report on eth0 (192.1.3.131:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0345 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b9 3d 2a c0 99 78 dc 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #648 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #648 | rejected packet: | b9 3d 2a c0 99 78 dc 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 af 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-175" #648: ERROR: asynchronous network error report on eth0 (192.1.3.175:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0353 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 14 21 4b c7 8f d5 3b 8a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #559 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #559 | rejected packet: | 14 21 4b c7 8f d5 3b 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-30" #559: ERROR: asynchronous network error report on eth0 (192.1.3.30:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0351 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 21 46 75 e4 c0 e2 30 47 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #679 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #679 | rejected packet: | 21 46 75 e4 c0 e2 30 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 52 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-82" #679: ERROR: asynchronous network error report on eth0 (192.1.3.82:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0347 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a4 7a 0a 38 ed 45 0a 7e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #643 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #643 | rejected packet: | a4 7a 0a 38 ed 45 0a 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 56 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-86" #643: ERROR: asynchronous network error report on eth0 (192.1.3.86:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0356 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9c 9a a9 b6 8a 18 20 aa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #604 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #604 | rejected packet: | 9c 9a a9 b6 8a 18 20 aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 14 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-20" #604: ERROR: asynchronous network error report on eth0 (192.1.3.20:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0347 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 37 f9 ef 73 ab 62 5a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #746 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #746 | rejected packet: | f7 37 f9 ef 73 ab 62 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-241" #746: ERROR: asynchronous network error report on eth0 (192.1.3.241:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0346 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8b 51 05 ec d8 42 82 df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #529 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #529 | rejected packet: | 8b 51 05 ec d8 42 82 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 20 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-32" #529: ERROR: asynchronous network error report on eth0 (192.1.3.32:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 91 66 df b6 23 36 44 2c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #624 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #624 | rejected packet: | 91 66 df b6 23 36 44 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-225" #624: ERROR: asynchronous network error report on eth0 (192.1.3.225:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0346 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 20 27 21 e9 84 6e 79 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #630 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #630 | rejected packet: | 7e 20 27 21 e9 84 6e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-167" #630: ERROR: asynchronous network error report on eth0 (192.1.3.167:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0344 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 e3 5f af 64 96 c1 8b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #748 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #748 | rejected packet: | 55 e3 5f af 64 96 c1 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-213" #748: ERROR: asynchronous network error report on eth0 (192.1.3.213:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0343 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7e 0d 8c df c3 48 2b 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #635 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #635 | rejected packet: | 7e 0d 8c df c3 48 2b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f5 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-245" #635: ERROR: asynchronous network error report on eth0 (192.1.3.245:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0347 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 20 dc 25 60 99 b6 74 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #713 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #713 | rejected packet: | 20 dc 25 60 99 b6 74 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cf 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-207" #713: ERROR: asynchronous network error report on eth0 (192.1.3.207:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.036 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 3d 12 6d 03 9d 3a 3f 73 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #615 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #615 | rejected packet: | 3d 12 6d 03 9d 3a 3f 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 19 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-25" #615: ERROR: asynchronous network error report on eth0 (192.1.3.25:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.067 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a 3d 1d 73 e3 e0 91 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #586 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #586 | rejected packet: | 9a 3d 1d 73 e3 e0 91 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 02 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-2" #586: ERROR: asynchronous network error report on eth0 (192.1.3.2:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0363 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 28 8b 51 ce ae 5a 3d 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #642 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #642 | rejected packet: | 28 8b 51 ce ae 5a 3d 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ab 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-171" #642: ERROR: asynchronous network error report on eth0 (192.1.3.171:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0348 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 f3 33 9b b4 5a 7a db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #715 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #715 | rejected packet: | 87 f3 33 9b b4 5a 7a db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #715: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0343 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 e4 97 ab 5f cb 91 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #588 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #588 | rejected packet: | 07 e4 97 ab 5f cb 91 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #588: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0359 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 a9 69 6a 37 31 fe e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #547 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #547 | rejected packet: | 08 a9 69 6a 37 31 fe e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #547: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0344 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 48 a9 53 c0 7c 6b d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #657 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #657 | rejected packet: | bf 48 a9 53 c0 7c 6b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #657: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0345 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 7d d5 ab c5 87 8a df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #590 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #590 | rejected packet: | 6c 7d d5 ab c5 87 8a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #590: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0355 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 1a 7a 05 9e b9 88 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #576 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #576 | rejected packet: | bf 1a 7a 05 9e b9 88 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 64 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-100" #576: ERROR: asynchronous network error report on eth0 (192.1.3.100:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0341 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 92 e6 33 30 14 4d d6 a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #530 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #530 | rejected packet: | 92 e6 33 30 14 4d d6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 86 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-134" #530: ERROR: asynchronous network error report on eth0 (192.1.3.134:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0347 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7c a6 d3 cf 8d e9 6e 5d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #619 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #619 | rejected packet: | 7c a6 d3 cf 8d e9 6e 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-164" #619: ERROR: asynchronous network error report on eth0 (192.1.3.164:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0357 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 19 90 a9 40 6e 35 eb 8e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #653 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #653 | rejected packet: | 19 90 a9 40 6e 35 eb 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-58" #653: ERROR: asynchronous network error report on eth0 (192.1.3.58:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0342 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 39 b3 48 76 36 79 c8 c8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #591 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #591 | rejected packet: | 39 b3 48 76 36 79 c8 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 04 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-4" #591: ERROR: asynchronous network error report on eth0 (192.1.3.4:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0343 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7f e0 6f 00 84 26 56 77 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #556 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #556 | rejected packet: | 7f e0 6f 00 84 26 56 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-79" #556: ERROR: asynchronous network error report on eth0 (192.1.3.79:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0357 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 46 30 94 4a d2 7d f5 c4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #531 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #531 | rejected packet: | 46 30 94 4a d2 7d f5 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 5c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-92" #531: ERROR: asynchronous network error report on eth0 (192.1.3.92:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0346 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 80 0e 78 80 27 80 d5 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #596 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #596 | rejected packet: | bf 80 0e 78 80 27 80 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 42 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-66" #596: ERROR: asynchronous network error report on eth0 (192.1.3.66:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0343 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 d4 94 96 e1 1d ee 26 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #628 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #628 | rejected packet: | 95 d4 94 96 e1 1d ee 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 90 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-144" #628: ERROR: asynchronous network error report on eth0 (192.1.3.144:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0352 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 93 98 4a 9e f6 25 19 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #714 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #714 | rejected packet: | 93 98 4a 9e f6 25 19 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-160" #714: ERROR: asynchronous network error report on eth0 (192.1.3.160:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0342 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f6 ef 1a 2f f5 b4 93 7e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #533 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #533 | rejected packet: | f6 ef 1a 2f f5 b4 93 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-12" #533: ERROR: asynchronous network error report on eth0 (192.1.3.12:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0338 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 0c 73 4d 95 6b fc 9f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #593 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #593 | rejected packet: | 08 0c 73 4d 95 6b fc 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 07 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-7" #593: ERROR: asynchronous network error report on eth0 (192.1.3.7:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0351 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 bb c0 cb 23 86 64 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #532 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #532 | rejected packet: | b2 bb c0 cb 23 86 64 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #532: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0342 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4f 74 43 70 ed 5f 2e 8c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #632 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #632 | rejected packet: | 4f 74 43 70 ed 5f 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 bc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-188" #632: ERROR: asynchronous network error report on eth0 (192.1.3.188:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0339 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f2 94 01 51 22 3f af b0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #629 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #629 | rejected packet: | f2 94 01 51 22 3f af b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 47 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-71" #629: ERROR: asynchronous network error report on eth0 (192.1.3.71:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0356 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 15 cc 63 e1 75 96 2f 68 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #716 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #716 | rejected packet: | 15 cc 63 e1 75 96 2f 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cd 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-205" #716: ERROR: asynchronous network error report on eth0 (192.1.3.205:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0341 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 6f 1b dd c3 97 a8 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #660 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #660 | rejected packet: | f4 6f 1b dd c3 97 a8 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #660: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0339 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab b5 91 0b be 67 d7 85 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #756 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #756 | rejected packet: | ab b5 91 0b be 67 d7 85 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #756: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0351 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 e8 20 43 a8 88 d4 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #719 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #719 | rejected packet: | a1 e8 20 43 a8 88 d4 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #719: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0528 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb380009ed0 | handling event EVENT_RETRANSMIT for parent state #505 | start processing: state #505 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #505 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-252" #505 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-252" #505 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.036109; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.828217 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c40 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #505 | libevent_malloc: new ptr-libevent@0x7fb350077b10 size 128 "road-eastnet-nonat-252" #505: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.252:500 to 192.1.2.23:500 (using #505) | d5 d2 7d 3c 00 e8 ff 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 f3 9e b0 6a 35 4f e1 47 8d 4d 6e 1c 28 4b 2e | f7 69 42 28 c7 ef 26 c5 4e 61 c9 92 6c ab 1f 19 | f8 92 ce 52 74 4a c5 9f 21 f2 3d 66 b1 02 14 a1 | 73 db a1 79 9a e8 39 8a fc 66 2f 00 d5 5a 95 c5 | 48 d0 9c 15 fa 0b 1b 42 28 43 67 d3 6e 5e 6f ff | c0 b1 6b 27 e0 5d 48 d0 0b 8b bd 52 32 59 4d 42 | 3a 7f 12 ad f8 1d 5e cc 39 0c 00 27 ca 10 80 cd | 3d 82 51 e1 b2 98 44 61 6d 8a 0e 01 ae d2 a9 b5 | 0d a4 1c d6 bb b1 86 67 99 76 77 1d 81 1f e6 0f | 87 d6 0e ab 3d 4e 72 d6 1c d8 a8 ba 8b 0d fa b6 | 14 aa 5d 05 4f 2b 84 93 9b 6c 60 e2 1b f1 93 07 | 29 7a b4 93 fc 89 c0 b0 9e 68 f0 55 5e 91 56 16 | 01 5f 10 18 5b bb 2d 47 4a 35 38 2c ad 2e ab d2 | 6a b8 26 26 f5 88 20 85 f3 dc ec bd 9d 77 db 98 | b1 c5 2e 88 5d 5c 8b a9 e1 00 27 3a d2 4c bd 1c | db 98 5a 24 32 a9 2f e9 b8 59 be e8 b6 07 01 6e | 29 00 00 24 cb e3 59 11 f9 d9 ec ee ad 77 08 0b | 98 a8 ef 2e 9a e0 e5 f5 be 06 9f 6c 9d 77 41 dd | ce d1 2a 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d ed ee bd 79 c9 6a 8d de 75 89 30 | 73 98 a0 83 98 d8 fd 9d 00 00 00 1c 00 00 40 05 | 80 0c 7e 23 1f 19 e5 09 f9 e2 d7 e7 d4 e4 7c f1 | e8 ce ce 76 | libevent_free: release ptr-libevent@0x7fb3800223c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380009ed0 | #505 spent 0.145 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #505 connection "road-eastnet-nonat-252" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378005860 | handling event EVENT_RETRANSMIT for parent state #513 | start processing: state #513 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #513 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-107" #513 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-107" #513 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.036289; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.831527 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380009ed0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #513 | libevent_malloc: new ptr-libevent@0x7fb3800223c0 size 128 "road-eastnet-nonat-107" #513: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.107:500 to 192.1.2.23:500 (using #513) | bd e9 59 71 3e 30 66 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9b f0 aa 56 99 ad 41 e6 3a 19 67 48 fc c0 1b e2 | b0 a6 21 9e 13 7a 65 b0 01 64 d4 c2 39 16 1c a3 | 09 b7 6f 2c 8c 4c 7e 2a 7c 62 da 59 d9 c0 53 20 | 5f 82 b5 8a 0c 51 a0 6c ba 44 d8 ce 26 63 57 92 | 46 0f c3 0a ab b0 53 c3 61 49 a1 a6 7a ff cb 8c | bc 6b 3c 47 62 03 e7 80 c9 67 73 83 91 0c 93 c6 | 56 27 a3 11 5d eb 2a 88 84 eb 3e 27 a2 e6 b8 18 | 93 02 c7 f9 fc cb d2 36 3c bd c3 eb 8a f7 b5 95 | e0 47 db d1 c8 42 8e 58 81 f5 ad d0 b5 63 86 42 | 1f 8b 84 dd 81 ee 70 92 6e b5 c4 39 af 9c 50 3d | 9f 95 c9 ea 1e 7c 99 d7 0e b5 ac b0 6c 63 ec ba | 8d 5f 65 5d 3b 17 25 63 e7 5c 7b 69 67 54 83 0e | c0 9b d7 b5 4f 42 2f 27 87 22 39 48 b7 84 cf cc | cf 00 bc d9 c7 6d 6e 28 f3 1c 0e b7 f5 1b dc c5 | 59 f5 4a 7b 90 a6 d5 78 62 d3 be d3 63 ef d7 f9 | 2c 59 4a 44 cf 7f 3b 21 cd 7f c7 d4 ca 1a a8 49 | 29 00 00 24 a4 bc 37 1e 87 c2 34 b4 23 5a f6 0b | b7 2c 74 3f fd 06 56 c7 93 de 20 49 09 1f b3 6b | b5 db c8 d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0a e5 9a 01 5d 43 fb 6a 98 9b f3 8a | be 52 9d de 46 5a 7a 72 00 00 00 1c 00 00 40 05 | cc 5a ab 9a 19 3f 91 fb 3e 48 14 36 65 db 7f b9 | 29 d6 f5 30 | libevent_free: release ptr-libevent@0x7fb378051330 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378005860 | #513 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #513 connection "road-eastnet-nonat-107" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3880319a0 | handling event EVENT_RETRANSMIT for parent state #528 | start processing: state #528 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #528 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-99" #528 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-99" #528 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.036412; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.839208 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #528 | libevent_malloc: new ptr-libevent@0x7fb378051330 size 128 "road-eastnet-nonat-99" #528: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.99:500 to 192.1.2.23:500 (using #528) | 53 19 92 95 ca 61 53 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 86 e5 c7 b3 7c 8d 99 d1 d7 29 a2 10 c1 b7 06 0c | 17 e9 49 3c 4a c0 5b bd 73 b3 61 f0 c5 97 1a c7 | 76 63 76 36 e9 7a 65 e8 6a 3f 9b a2 34 22 f6 b4 | 6a 88 a8 f8 7f 41 d3 72 9f 5a 88 ca 6b 48 aa 0d | 9f bb 2e af b7 64 43 c0 5f 21 ab ad ca 4c c4 bd | 11 a7 3a 9f 89 1f e1 4e cc b3 7c 12 a4 19 cf 86 | c6 87 c1 d0 2a 94 8b 9d e9 35 39 07 a6 9c a3 ed | a8 ce d3 e4 53 a5 82 df 4f 1f e0 bc b2 92 cb c6 | 39 04 f1 75 75 72 f5 1c aa 6f d5 6e 3c f8 04 ed | 37 5d a6 8b b9 ef fe 51 d8 f6 f3 f2 4d a5 ca 6d | 2e b0 a4 75 6d ce 0d 14 13 47 fc 6e 77 45 1a 17 | c4 a3 61 af 3a a4 0b d3 f5 57 8f f2 6f 78 70 d1 | c2 a7 16 f6 5c 3a 00 46 05 30 36 7f b8 3f 18 36 | 35 33 11 0a 75 c5 6f f6 65 a7 05 28 7c e1 b9 fd | 51 6f f2 9e cd 9f 64 c9 9d fe 9b c7 f0 06 55 5a | bb ef dc 4c be 29 e4 94 b5 10 3f 65 5d 8b 1c e0 | 29 00 00 24 46 b5 f0 72 e3 2a 70 ff f4 67 d5 b0 | a0 ba f1 3f 75 bf 45 d4 30 d2 c3 b1 ff a8 07 cc | a0 44 98 ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b 19 8a cb f1 5b 38 5c d3 a5 bc 6a | dc b7 35 41 12 44 0c ab 00 00 00 1c 00 00 40 05 | e6 3e dd 6e 01 07 35 ad c6 0c f8 90 bb 33 8c f2 | 78 f1 d6 dc | libevent_free: release ptr-libevent@0x7fb38804efb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3880319a0 | #528 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #528 connection "road-eastnet-nonat-99" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374009690 | handling event EVENT_RETRANSMIT for parent state #509 | start processing: state #509 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #509 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-236" #509 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-236" #509 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.03653; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.839666 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3880319a0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #509 | libevent_malloc: new ptr-libevent@0x7fb38804efb0 size 128 "road-eastnet-nonat-236" #509: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.236:500 to 192.1.2.23:500 (using #509) | 95 a6 50 d0 80 0f 96 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 f6 dc 59 0f c4 05 31 27 1c e1 59 91 71 4f 77 | d2 6f b2 3c 4c 42 2c 05 31 c6 b9 01 b3 f9 33 cf | 31 3e d8 f2 50 a2 40 4c 26 af b9 c4 f6 6b 9c a0 | c3 09 f4 3f 7a cc f4 7f ca 62 75 a2 51 f3 85 34 | ba 40 18 72 c0 75 cb 27 ef ac 5f 7a 01 de 2e 52 | 48 88 8c 60 ad e7 5b 44 6c 1a e8 d5 6f 53 11 23 | 95 be a5 14 60 2b e4 59 8a 11 d1 b5 ed 47 f8 3f | 6d e0 61 51 79 49 84 03 99 39 af e7 46 a2 96 23 | 10 c9 ad ec 42 e4 52 ee d8 32 7d ed 3a d7 ff 92 | 1f 6f 0f 74 38 79 01 20 fa 36 e9 f1 09 08 9c 1e | 99 ae 11 ce d8 88 97 aa 9e 87 73 fa fc 1c f1 a5 | 50 45 69 bc f8 32 ab 8a a5 aa 99 3b 14 59 27 93 | aa af d8 7a 15 d5 3f 8b e4 e9 93 e5 f3 54 80 be | f8 1e 00 2e ce b6 01 59 ea 14 bb 0f 04 fa 53 df | 7b f6 52 1a 74 66 fb 6f ec f5 da 2e 36 05 f8 e1 | f8 ef 5f a4 a1 a4 e5 27 c9 45 68 7f 7b 01 52 89 | 29 00 00 24 9d 39 90 d5 1d b9 a1 ff 3d e2 2c 36 | 93 f3 ac d0 34 e1 bb 65 c7 36 8d 9f be 5b 52 2e | e0 af cd 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b a0 6c aa ff 54 d0 e4 33 5d be 4b | d4 00 1f 61 d7 8c b7 eb 00 00 00 1c 00 00 40 05 | b0 ac c8 3e be 16 32 44 b0 93 80 f1 03 a4 ee b2 | e2 ca 64 08 | libevent_free: release ptr-libevent@0x7fb38008afd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374009690 | #509 spent 0.0999 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #509 connection "road-eastnet-nonat-236" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c0346e0 | handling event EVENT_RETRANSMIT for parent state #524 | start processing: state #524 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #524 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-29" #524 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-29" #524 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.03665; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.830753 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374009690 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #524 | libevent_malloc: new ptr-libevent@0x7fb38008afd0 size 128 "road-eastnet-nonat-29" #524: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.29:500 to 192.1.2.23:500 (using #524) | ad da d3 24 2d 65 26 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c1 9b 4d af 9d 8e 16 4e 79 9d 95 9d 88 b2 5e 09 | f6 4f d0 1c b0 25 e9 93 be b2 69 1f 36 9c 49 a0 | 44 f5 dc ea 0c 18 d3 cf 65 08 01 43 ec 36 05 b8 | 2a d7 b3 3b d1 93 c2 8a 31 77 1f 9d 2c c9 a8 3a | 11 f5 95 7b c4 81 fc 5d 96 ee bd 44 15 34 22 c1 | 71 4a 5f 76 cd 57 fb 11 79 0a f5 62 1b 91 3b de | e4 fe 82 b2 18 dc c5 d3 a5 42 a7 79 6d aa 95 f6 | 00 d9 74 30 e3 e8 a8 2a 76 02 2c fb 3d 48 e4 b8 | da e6 31 2e e9 38 9e d5 03 35 33 93 c3 a5 f1 20 | f2 62 cb a8 16 a1 46 60 30 4f 28 ac 47 61 ae 14 | 02 70 2b e7 2b 16 7f f2 18 02 58 cb bf df be f3 | bd 14 94 03 17 e6 3a 05 80 08 27 04 a8 69 b6 19 | 8b 17 87 72 b2 0e 37 35 38 6c 05 37 e1 09 09 e7 | 9e 9d 08 8d 77 97 ae 5d 2b cf 0a e1 f9 c1 73 85 | fd c0 15 2b 82 a2 5c 29 27 48 fe b2 e1 3e 87 a4 | 06 6d 09 b3 f8 4c ea 61 50 a9 b2 37 a9 12 e8 76 | 29 00 00 24 58 4a df 1f 4b 4b ff 86 2f 20 df 0f | ac 70 4d 1f f0 2d 6f 07 f3 a2 91 54 47 78 60 b6 | 71 cd e8 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c dc d6 72 67 d3 e7 69 f5 94 9f 27 | 9b e1 4a 44 55 e1 6a f7 00 00 00 1c 00 00 40 05 | 4e 1f a7 8f 6a af 3d 63 0f b3 f8 d5 e1 3f a9 d4 | b3 8f 35 dc | libevent_free: release ptr-libevent@0x7fb35c0511f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c0346e0 | #524 spent 0.0997 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #524 connection "road-eastnet-nonat-29" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38402d4e0 | handling event EVENT_RETRANSMIT for parent state #510 | start processing: state #510 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #510 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-102" #510 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-102" #510 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.03677; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.831575 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c0346e0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #510 | libevent_malloc: new ptr-libevent@0x7fb35c0511f0 size 128 "road-eastnet-nonat-102" #510: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.102:500 to 192.1.2.23:500 (using #510) | bc 30 61 cf 1c f5 21 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7d 16 ac 90 1b e8 fc 3d a1 f6 2f f6 5b aa 38 5f | 13 bc 3b ec ce 54 9b 92 94 b5 7c b5 e6 92 4b 0f | 82 fe 63 f8 ae e6 73 78 f6 99 0a 42 80 fb a6 71 | 1d 6d c1 8b be 9b 09 d6 dc d8 6a 99 20 35 d5 82 | 27 70 ed c6 95 de df 76 74 d7 3e 14 50 79 f0 89 | ae 4e 98 1c 30 c5 99 94 51 22 91 53 e5 49 a5 a5 | 4e d2 de 84 a6 45 26 dc 5a 29 c7 7c 52 2b 31 8d | 7b a4 cf c6 13 95 ce 98 5a 32 37 1e 3c f9 dc 95 | 74 b2 58 3f bf f8 56 2f b2 ed 28 17 6b fc 7e 85 | c4 ca f3 5d 2b 78 55 ad d1 65 97 11 a6 22 08 7c | b5 aa 63 e0 e4 66 be 74 9d 1a b0 75 bf 11 a5 cb | 35 00 1a 58 9e 5f 9b 3a 5c 4a 5e 5b 7c 41 b5 39 | 8c e2 21 3f a3 1f 5d 86 72 e4 89 93 96 9a e1 e9 | 74 b9 24 6d 9f d6 67 09 e9 73 bb f9 0b 1c 88 a6 | 68 a2 54 4f 6c 95 d8 be 9b cd 89 96 d8 9d 33 48 | fb e8 c2 fa 1f fd 3e a7 c4 fc 87 a0 2d d1 0a 3b | 29 00 00 24 a8 33 19 fd 53 f2 7c 45 88 0e ac 9b | 8c 61 3a 57 a6 74 c6 f9 cb 73 c2 48 34 44 1a b7 | 09 32 3c 47 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 4c e5 d6 4c 06 64 b8 31 f1 40 df | 16 6a c3 cc 04 2a 1f ac 00 00 00 1c 00 00 40 05 | f4 a4 c7 b2 58 33 da 00 b3 aa 2f f5 ea 56 ab cb | 57 27 19 d1 | libevent_free: release ptr-libevent@0x7fb38404e8e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38402d4e0 | #510 spent 0.0978 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #510 connection "road-eastnet-nonat-102" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350018460 | handling event EVENT_RETRANSMIT for parent state #506 | start processing: state #506 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #506 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-1" #506 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-1" #506 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.036888; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.82826 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38402d4e0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #506 | libevent_malloc: new ptr-libevent@0x7fb38404e8e0 size 128 "road-eastnet-nonat-1" #506: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.1:500 to 192.1.2.23:500 (using #506) | 30 9a 49 1f a8 dd 2c 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 2a bc 79 dc b5 44 58 cf f7 90 44 40 11 2e 15 | 03 b5 fb 40 91 db b0 e9 cc 93 76 20 f8 11 9e 6d | 39 73 1f 61 bc bc 4e ee c9 bc 18 3d 60 7b af 0b | 75 cb a0 d6 4f 63 ef 20 98 68 71 d2 13 f7 66 7d | d4 5b 49 b9 ac 8b df e8 41 30 6e ff 20 54 14 93 | 38 ab ab 4c af e9 0c 3b ab 5e dc 5e ab 90 4b 56 | 53 3a 8a b7 18 5b 14 39 76 27 9c 20 d5 a4 eb 39 | 1a 6c 7f f0 56 06 81 af ac 7c 4a cd fd 91 a4 9c | b0 f5 14 1c 9c 19 b9 58 23 51 01 f1 e5 aa 33 2e | 85 93 d7 f3 05 7b 07 5d 5b 1e 49 80 23 cb 1b 4b | 93 19 de 20 5b c0 bb 25 ff 6a 7c bd fa 9e d4 b6 | 65 89 68 9f 60 cb 4e fc c1 67 16 12 7c fd 7e e9 | 66 f2 cd 59 d3 75 d7 f2 51 17 02 7b 63 bd 34 45 | 2a 05 0d 75 f1 dd 12 28 48 00 8c f9 1a ee 51 55 | 7e 88 c6 eb 9c 50 71 90 5e 37 9e fa ae f7 d3 be | 4f ee 4f 56 47 93 59 ae 9d 25 55 9b 6e 17 7d 42 | 29 00 00 24 d6 8b 6d 98 8d 34 54 93 4f 23 9a c7 | c6 01 a2 cc 60 f1 90 b6 c5 32 43 97 ec 6a b8 44 | 57 ec f9 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 76 28 30 1c 61 02 15 0f 11 fb 7e | be 62 eb 4a 99 5c 3d 3b 00 00 00 1c 00 00 40 05 | 7f 22 3b d3 4d cf 74 f6 af fd 39 61 cb 11 ae 8f | 0d e3 22 f7 | libevent_free: release ptr-libevent@0x7fb35004e5a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350018460 | #506 spent 0.0994 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #506 connection "road-eastnet-nonat-1" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374024fd0 | handling event EVENT_RETRANSMIT for parent state #514 | start processing: state #514 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #514 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-33" #514 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-33" #514 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.037004; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.837224 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #514 | libevent_malloc: new ptr-libevent@0x7fb35004e5a0 size 128 "road-eastnet-nonat-33" #514: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.33:500 to 192.1.2.23:500 (using #514) | 06 7a 17 75 fd ae cb 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 5a 8f 50 94 ac f5 36 99 70 0a 59 72 e7 bd 59 | 0f 36 90 cd 5c c6 89 e0 75 bc 28 73 40 e2 7d cc | 29 c4 5a 70 07 f4 b5 86 f2 2a b0 3c a2 25 4e 6d | 20 3c ce c4 4f 4c 58 ae 19 d4 cf fe ba 7b fa f1 | f3 e2 9e 67 a4 d8 72 7c d5 14 6c e6 e7 e2 c6 3e | 8d 4b 48 dd c7 d4 8e 53 66 3c b7 1b 8d fe 66 bf | 89 1e 91 a6 67 0a 3d 11 cd 2a 13 4b 79 22 34 46 | 3b be d5 2d 70 4a 7d b9 7c b7 da 21 75 dc 69 65 | 39 db b4 a1 e9 27 93 e6 22 84 44 fb 74 c7 5b f7 | bf 99 8c 9e d0 24 31 9c 4c cb 86 84 f0 20 fe be | c1 25 55 19 f9 b6 06 e1 9a 9a e7 2d 88 3e 42 9f | 4c 92 e0 a8 c0 b6 61 d6 11 42 34 e8 2d 23 a1 54 | a1 d1 b5 28 f0 8d fb 27 b7 84 29 2c d4 6e d1 c7 | 73 d4 1e 76 c8 dc 3a df 8a b5 ac 49 f8 57 58 ac | b6 af 74 0a c9 24 9b 82 fe 27 eb 68 17 91 56 97 | 2f 25 7a 6c 33 0f 0b 13 88 c8 86 84 02 8c 9c 43 | 29 00 00 24 8d 5a c8 42 22 66 47 71 75 11 01 a3 | eb de 43 24 8a 8a 1d 52 bb a3 79 20 2f 3a 8b 28 | 46 f6 14 15 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 27 9b 53 3e 81 94 d1 35 62 13 6f 0f | f3 75 0e 22 e2 b9 70 e9 00 00 00 1c 00 00 40 05 | a7 b7 3f 67 ae fd d1 f6 b8 00 0c 14 27 04 b4 2c | 48 80 6b 64 | libevent_free: release ptr-libevent@0x7fb374039ac0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374024fd0 | #514 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #514 connection "road-eastnet-nonat-33" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7e4d0 | handling event EVENT_RETRANSMIT for parent state #518 | start processing: state #518 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #518 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-45" #518 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-45" #518 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.03713; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.837651 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374024fd0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #518 | libevent_malloc: new ptr-libevent@0x7fb374039ac0 size 128 "road-eastnet-nonat-45" #518: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.45:500 to 192.1.2.23:500 (using #518) | 76 4a 29 e2 f2 d8 10 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 07 c8 e5 72 ad e8 a3 0b ee c0 19 d4 04 c4 59 f2 | f9 f1 ca 1e 44 30 31 b6 02 9f ea 8d f7 77 56 d9 | 34 17 5d e6 6c 33 4b fe c1 d5 87 da 08 49 a5 40 | 98 09 8f 0e 2b 61 5a 8d da 29 4b bd c0 aa 20 47 | 00 81 73 86 5a d8 e0 95 46 03 64 29 8f 09 e9 05 | 09 84 fc 9f 58 0c 86 5c df 03 a7 05 8c 64 28 10 | 34 e7 f2 6f 51 06 b7 7b d1 ca 6d cd b3 c2 7b 80 | d1 48 6c 1b c4 58 91 31 ee a7 4a 59 32 08 ac f1 | fb 22 a3 96 1a 08 94 a4 84 91 22 e8 1e b0 a5 1b | a0 ee 59 f9 33 09 49 a4 f5 f9 da 80 62 31 32 f0 | d4 2b 3c ed f7 50 71 be ae 41 93 27 28 9d 7a 12 | 34 9e 0f 57 03 18 c9 b6 fe 98 3d 22 d1 c6 fe fa | 13 55 9a 4d 9d aa b8 6e 37 5c 88 37 98 3a 93 4a | fe 8e 63 5e f1 55 52 38 2a df 4e e5 01 10 1b 19 | c9 ff a3 28 16 59 44 48 e1 e5 35 ac fe f5 c2 26 | 2f 84 3f c3 36 51 80 d7 d9 96 f6 1f 3a 61 bc 30 | 29 00 00 24 da 23 2e 07 94 56 ee 0d 82 96 38 43 | 7b 89 61 bd ba 2a 55 d7 d5 50 63 47 84 e9 fa b5 | 93 54 75 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 48 88 0f 47 92 b8 68 b9 d0 c9 2b | 02 14 06 d6 2c b1 12 61 00 00 00 1c 00 00 40 05 | a7 a4 34 d2 94 1c 56 72 07 98 0d cb 3d d8 f1 6e | 48 f0 c0 ed | libevent_free: release ptr-libevent@0x557d46b83f50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | #518 spent 0.1 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #518 connection "road-eastnet-nonat-45" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb360025210 | handling event EVENT_RETRANSMIT for parent state #507 | start processing: state #507 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #507 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-243" #507 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-243" #507 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.037248; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.838206 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7e4d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #507 | libevent_malloc: new ptr-libevent@0x557d46b83f50 size 128 "road-eastnet-nonat-243" #507: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.243:500 to 192.1.2.23:500 (using #507) | da 78 05 0d 9b 70 b9 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 78 46 e0 88 a0 30 a2 10 b6 db db 18 a9 1a b3 9a | c5 54 fb 3f 15 80 c7 25 e6 f4 59 fe 6e fc 4f d8 | 8b ec 98 88 97 ce 89 12 e0 f6 7c 60 70 3c 7d 2f | 85 8c 92 e6 f5 10 00 45 4e 0d f3 d7 24 70 70 ea | f1 31 c4 5b 48 d6 07 d8 da 3d 7f e0 08 dc 0f 9e | 22 03 73 c9 0e c4 1b 51 bf f2 38 8e 38 b6 fd d5 | 22 d5 92 08 9a e7 f3 0b 25 d0 d9 dd 1b 26 88 06 | d6 8f 78 7c 97 0a 2b d5 ae 86 6d 27 bc ca 56 2a | 75 f9 bc 7a 04 89 9f bf e0 ea fc 39 80 a6 03 c7 | 0c 27 76 fa 8e 3c c4 79 8c d8 25 1c e4 00 76 60 | ce 83 c9 6c f4 f0 61 2d eb 79 e9 72 7a 2c 98 fa | 1c cb e8 81 62 75 a2 1d ab 8a ff 63 87 4e 5e fa | 9c 7c 66 c5 3e 4d ee d7 ea 85 5e 26 e2 62 57 07 | b7 3a e7 80 5f 3e 54 3a 0c 1b dd 9d e4 1a 64 e7 | dc 8d 0e 26 5e 1d 1f b4 2e 68 e8 a0 88 3b 2a 21 | 54 99 7c 47 f7 0c ba 8c f4 5a ab 15 bd ae eb 38 | 29 00 00 24 49 65 e9 20 14 20 1a 38 1c 59 3c 48 | eb 8b 7a 8d ba 7b 14 a8 53 47 20 f7 ff f7 d4 ec | 05 75 53 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d 67 d1 c8 0a fd 9b 5e 47 d4 f9 45 | 3b 65 86 81 4c 3e 0b eb 00 00 00 1c 00 00 40 05 | 9f 6a dc 5d 73 87 7f 7b 13 63 32 fe 29 c9 d7 13 | 68 73 c8 6f | libevent_free: release ptr-libevent@0x7fb36004e850 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360025210 | #507 spent 0.0995 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #507 connection "road-eastnet-nonat-243" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b16d90 | handling event EVENT_RETRANSMIT for parent state #511 | start processing: state #511 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #511 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-88" #511 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-88" #511 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.037372; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.831874 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360025210 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #511 | libevent_malloc: new ptr-libevent@0x7fb36004e850 size 128 "road-eastnet-nonat-88" #511: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.88:500 to 192.1.2.23:500 (using #511) | d0 cd fa e1 13 2d 20 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 50 62 2d 29 93 99 de 0e af 50 23 34 5f ad fb | 4c bf da 43 26 a3 47 17 44 42 44 91 b3 08 e0 52 | 9a 2e 33 64 a4 26 28 05 d5 00 de d9 4e 66 1b ab | 5a 6d 0e b8 94 3f 64 cb a8 67 5b 93 62 e2 29 49 | 15 ef 3f fd 0a ac 35 c6 4e 73 10 ab 4f 5d 53 8e | a4 cf e0 a6 67 4d ad 8c d1 a8 5a 9c 43 ba 9d a7 | 4c 51 1b 30 43 59 5b 25 95 48 42 6a b3 83 84 db | 91 da 84 92 79 2e e8 75 a7 77 e4 4c 0a eb 8f 66 | 34 40 55 c8 da e8 1b 72 62 30 64 22 19 0b c5 6f | bb 93 c9 c9 9e c1 e2 88 ad 0f 56 0d bb 0a ec ad | e2 01 a6 b4 88 92 57 a6 85 c2 08 b0 1f 07 9c 06 | 45 a6 f9 c7 63 ad b8 14 32 f1 4e 6c 2f f3 fa c4 | 52 99 fc 99 df 29 80 f9 cd af e8 d8 51 1d ea fc | 37 40 3b 2e 41 2d 1b 80 95 af 27 c3 07 65 8b a6 | 12 f6 45 c0 ec 6c f8 a8 51 0a 31 05 6c 78 0a ed | bf 1c 18 f5 61 de 1f a7 51 bb 0d 25 18 af fc 72 | 29 00 00 24 b3 7b 7f 54 09 ea 11 14 a2 54 1c f4 | ef 5a 78 e7 f0 13 91 b1 46 b7 6f f0 4f 4f 95 a6 | 39 1b 25 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e ea 0c f9 37 0c 35 90 90 78 51 37 | 77 43 20 7b e3 6c 0c 23 00 00 00 1c 00 00 40 05 | 2b 3e 6c 54 b9 12 19 37 d1 cc e2 3a 04 74 55 d1 | 46 7f d5 af | libevent_free: release ptr-libevent@0x7fb368035930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b16d90 | #511 spent 0.0978 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #511 connection "road-eastnet-nonat-88" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354039e80 | handling event EVENT_RETRANSMIT for parent state #508 | start processing: state #508 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #508 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-242" #508 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-242" #508 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.037487; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.831202 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b16d90 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #508 | libevent_malloc: new ptr-libevent@0x7fb368035930 size 128 "road-eastnet-nonat-242" #508: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.242:500 to 192.1.2.23:500 (using #508) | dc 3f 02 d2 13 45 35 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d a9 32 87 b1 90 82 93 0a 0b 68 7a df 0e cd ea | 4e 12 c3 9f a0 a0 db 88 eb 7c 77 42 14 a4 f9 02 | a9 02 c1 13 c2 56 17 b8 78 50 73 cf 37 95 03 3b | 9f a9 9f 88 fe df 99 cf a6 7c d9 96 30 f6 e3 3c | ff da a7 12 b9 67 b1 01 1e 94 44 d3 2d 66 e8 ab | 93 b4 41 cb 47 2f 3b b1 72 1a 25 46 61 80 3c 91 | fd cc 10 8b 86 fc 21 07 c7 5b 16 7a fe f3 c7 5c | b0 46 97 1c 76 a9 4b 9d 86 2e fa 04 56 7b cb a3 | b7 fe 1a 7b 4d fe 92 09 4b 17 df a9 9b 0f d4 5b | a9 06 58 5c b0 f7 c2 a4 71 cc 56 f7 a4 cb ae b4 | 36 1d de 4d 00 ad 9a ec ec ba 71 93 15 4d 0c e2 | 83 0f 23 94 d7 c2 0c 19 16 44 17 09 f4 40 84 da | 41 ec 50 fa 16 6e 50 f1 55 79 e5 0b 17 dc df d0 | 12 ca a0 4b 05 a1 a6 2c 7d 1e e6 72 04 2b 9d f5 | f1 0a bd da 88 25 7c 99 8f 11 ec b1 37 2c 76 0e | 43 b9 fb 60 6e 3f 37 47 06 8f 9f 3f 60 14 04 eb | 29 00 00 24 92 60 8e 47 54 65 21 7e 19 d2 97 01 | 48 40 e2 71 bf 81 d1 29 42 df a0 d9 5b 12 66 4f | bd 5f 3d 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 59 f1 6c fa bf f7 cf e9 0c 8d 98 4e | 77 aa d2 f2 40 a1 0a 37 00 00 00 1c 00 00 40 05 | bd ae 80 ba 97 bb f2 9c 7c 0e d6 fc 4b ac 9b 03 | c1 38 67 4e | libevent_free: release ptr-libevent@0x7fb35404e8b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354039e80 | #508 spent 0.0943 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #508 connection "road-eastnet-nonat-242" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c046090 | handling event EVENT_RETRANSMIT for parent state #515 | start processing: state #515 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #515 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-75" #515 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-75" #515 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.037595; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.836776 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354039e80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #515 | libevent_malloc: new ptr-libevent@0x7fb35404e8b0 size 128 "road-eastnet-nonat-75" #515: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.75:500 to 192.1.2.23:500 (using #515) | 1e 61 5a f6 8c 22 37 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 55 92 be 2b 5b 80 8f b3 a9 1d 29 a3 45 24 2c | b4 ac 16 b3 45 0f 47 41 ac 8c 89 bd 1e 8f b0 6e | 42 15 11 69 75 f6 d4 99 d3 aa cd 74 fa 86 b1 c5 | 68 d3 c8 15 10 54 b4 74 c1 a4 2b 24 6f c9 a9 9d | 25 6f 22 a2 ef 15 14 08 3b 15 a7 b9 a7 91 72 1b | 0d fc 51 4a 02 7d 07 e4 28 58 0f 09 52 04 38 5f | 70 3e 01 b9 6d 46 32 8a d3 fa e2 05 3c 1f 29 4c | 83 37 17 b1 56 48 32 71 51 18 9d f3 b3 04 79 ad | 90 59 7d 48 55 a3 92 46 ac 7d 26 6d f7 b5 44 87 | b8 ea 9c e5 b0 56 03 2c 9a 01 84 d5 30 98 07 7a | d5 ed 5c 95 9f a1 e3 64 9d 5d 5d c1 2f ee f3 c2 | 45 c0 b5 58 7b 2b 68 4d 06 07 76 b2 f3 82 a0 63 | 45 0a 18 70 71 12 a7 f5 1b f4 8c e5 99 58 7a ae | 71 6e 12 6f 9a 9e 61 a0 c1 a0 67 87 58 b1 e2 09 | f3 f3 93 cd 56 48 cd 0d 03 13 c0 9c db 17 5d 35 | 5e 83 5d 90 8d cf 6f 5f 1d 20 58 52 4c 16 b9 f8 | 29 00 00 24 8d d0 d4 e1 35 48 fc d6 75 32 21 71 | b5 c7 25 57 c3 f1 b1 56 20 08 bd ee ec 1b e0 d1 | 78 47 18 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9a 1a 58 76 c4 ef c7 77 69 86 ed 89 | 8f 43 91 04 1b c3 f4 fd 00 00 00 1c 00 00 40 05 | d2 95 59 dd 21 aa 4e e6 79 3e 78 3f 39 e9 b6 1e | 64 75 99 59 | libevent_free: release ptr-libevent@0x7fb34c04e700 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c046090 | #515 spent 0.0671 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #515 connection "road-eastnet-nonat-75" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a88140 | handling event EVENT_RETRANSMIT for parent state #517 | start processing: state #517 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #517 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-52" #517 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-52" #517 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.037677; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.837551 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c046090 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #517 | libevent_malloc: new ptr-libevent@0x7fb34c04e700 size 128 "road-eastnet-nonat-52" #517: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.52:500 to 192.1.2.23:500 (using #517) | 33 e5 d4 8b 34 40 4a 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d 50 73 53 0b 3c f1 6e 78 85 b7 58 fc 4b ba 17 | 6f 80 49 00 4f e5 51 c4 75 f5 c7 25 8f f6 8d 0c | 0b 3f 8d 1f fe 93 5e 60 24 81 0f 18 41 a0 49 31 | af 56 bf f8 e7 5b 2b a7 03 0f d4 ca d5 35 76 53 | f2 2b 65 31 41 bc b7 67 c0 bc c2 52 41 2b f8 94 | 04 88 87 86 1a 29 d6 6e 88 cb 09 a4 42 bf f7 4d | 7c 53 5b 57 b2 40 3e aa d2 e2 33 0e 70 6d 1a c0 | a8 61 dc 8e fd a0 3a 5e ba 87 2d 12 b0 e3 ba 16 | a1 1a a9 11 c0 e5 e5 f1 54 08 4c 01 f1 c6 26 4b | be a6 4f 3e 3e 89 d5 26 bc 6f ed 31 f1 ee 6b aa | d9 5e 96 b1 fa 74 49 cb 9d 97 e7 5d a6 4b d4 74 | 6b ae 88 a3 73 a4 87 0a 18 a9 6d e9 8b d7 36 fb | 0b 55 06 7d b4 78 db 17 14 99 b7 2e a7 64 89 99 | 8c be 1c fc 04 89 99 a4 2c 3b cb 1e d4 8e b5 cb | 24 1e bf 9a 75 6f 0b f5 b5 e2 c8 b5 34 36 ee 02 | af 62 28 a3 22 fa ec 90 27 af 39 54 b8 b9 0f a2 | 29 00 00 24 e2 3f 8f 34 58 87 92 57 56 c3 cd 4d | 63 8a 11 89 ae 2d aa 42 8a b1 46 78 a8 66 d5 93 | b2 cc 27 a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8f 05 9f 42 9e eb 36 9c 33 7d 49 87 | a2 9f 49 98 50 a4 45 37 00 00 00 1c 00 00 40 05 | 0e 29 0c 93 97 71 7f 1e 78 95 bc a8 9d 55 45 5b | 68 08 38 5d | libevent_free: release ptr-libevent@0x7fb38004e900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a88140 | #517 spent 0.0665 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #517 connection "road-eastnet-nonat-52" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c00d120 | handling event EVENT_RETRANSMIT for parent state #522 | start processing: state #522 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #522 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-78" #522 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-78" #522 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.037755; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.839076 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a88140 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #522 | libevent_malloc: new ptr-libevent@0x7fb38004e900 size 128 "road-eastnet-nonat-78" #522: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.78:500 to 192.1.2.23:500 (using #522) | 10 b1 a0 1e 00 fa a9 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 03 12 29 26 7f 65 c7 68 c4 9a d0 af 8e ee 58 | 00 c2 bb 14 15 7c 0a 86 41 89 01 e3 50 59 e6 9d | 21 20 fe 10 1d 52 36 f5 79 ed a1 2e a4 48 7f 36 | 55 11 2c 17 77 fe f8 b5 19 dc d2 b7 81 ea a8 4f | 58 de c6 bf 75 6a 59 91 22 64 63 fd 91 bc 44 f5 | fb fc 62 8d 40 09 00 e8 46 d1 fa ee d8 ea e1 b2 | f5 ff 3e 58 e5 93 cd a0 c0 0b 6c d4 34 85 8d de | 24 69 63 0b 77 53 a3 8f bc dc 79 d3 e0 07 c6 0f | b6 c3 f5 75 53 b4 1f 79 ed 6e d0 df 07 c3 f0 12 | 58 d9 7f d3 29 ec fa 74 4a b2 3b 5a bd 60 bd c0 | 31 c1 ac c7 51 45 8d 69 c4 5a 44 c1 9e 1d 54 f3 | 3f 29 e3 14 29 d3 ff 9f 4c 6d 49 97 9d 65 a8 01 | e3 b8 ae c9 76 a9 8a 4c 13 37 d8 a6 c9 90 05 b2 | 56 78 1c 8e b1 63 ce 03 b4 28 7f e6 b1 a5 59 d4 | f8 a3 6b 86 00 eb 6f c1 03 34 cf 9d 47 16 c9 f4 | fc a0 47 b8 e3 a2 18 1a f8 87 2d 2f b9 c5 65 a4 | 29 00 00 24 ef 86 5c 01 c3 c5 84 cc db a0 c4 f8 | 4b 5f 8a 0f 84 0f d8 a2 60 5e 95 d4 2a 5b da 43 | eb c8 3e 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 98 24 f3 3c 5a 10 4a 5f ba 19 5c | 79 3c 94 1f f7 ad ac c2 00 00 00 1c 00 00 40 05 | 01 72 52 9e ac 8f 8c 48 d1 ab 04 59 e9 b8 14 4b | b7 ae 1e 1b | libevent_free: release ptr-libevent@0x7fb388027c10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00d120 | #522 spent 0.0662 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #522 connection "road-eastnet-nonat-78" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388020d10 | handling event EVENT_RETRANSMIT for parent state #516 | start processing: state #516 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #516 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-70" #516 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-70" #516 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.037834; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.837409 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #516 | libevent_malloc: new ptr-libevent@0x7fb388027c10 size 128 "road-eastnet-nonat-70" #516: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.70:500 to 192.1.2.23:500 (using #516) | b0 c4 a7 65 22 ba 71 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba a5 f4 39 29 02 0d 7f e1 ce 23 a9 bd 79 34 2c | a4 ae 82 fb f4 56 44 6d 25 c8 ad 22 1c 00 04 e4 | fa 03 ad 8f 9f af 4d b2 90 d2 16 5a 2f 17 1a 15 | 58 ad df 68 e6 e1 fb 5f 9d 90 81 c9 af 7c 31 12 | 41 4f db e0 b3 86 a3 d0 c1 ef c5 7d 64 09 1b b5 | 64 47 53 1c 1e 0a 21 b1 e4 af ee 92 77 f9 75 e1 | 5f 34 cf 58 ca 97 19 11 a0 06 51 71 71 d4 e4 f2 | 1c 41 c8 1b a2 4a a9 ba 46 a4 e3 7f 99 64 8d 28 | b1 30 c5 e4 30 76 1f 7e 89 f0 65 32 bc 49 9a 04 | b4 60 1a 1e a9 b6 fa 63 35 37 7f 30 be 1f f5 76 | ab e0 a2 6b 4f 30 d8 71 5f 4f 3d 2d 14 59 46 da | e4 b7 89 ba eb da 77 0f d4 a2 34 b8 81 a0 b1 10 | 75 99 1f 3b 28 c3 1f 1e c4 47 fa 5e ff ec d3 2c | df d5 7a ea 70 58 26 f9 8b 47 1b ff 87 16 43 25 | 36 04 57 b4 43 c6 39 70 f4 c3 6a 94 df b4 49 bf | 82 f0 08 cb c7 5f ea 63 07 18 16 54 b0 37 ab e4 | 29 00 00 24 b0 da d8 00 45 52 59 a6 aa c3 52 03 | be 63 73 c1 d3 94 57 52 b6 9e 12 41 0c ee a0 24 | 4c 09 59 fe 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fb 8b ad 07 50 d4 78 b4 4f 97 b0 fb | bb f6 fa fc 21 38 4b 63 00 00 00 1c 00 00 40 05 | d0 ac 8d 25 0b 65 31 b3 b0 11 22 6e da e4 14 65 | f6 1e 50 f5 | libevent_free: release ptr-libevent@0x7fb388054710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388020d10 | #516 spent 0.0661 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #516 connection "road-eastnet-nonat-70" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34000cc10 | handling event EVENT_RETRANSMIT for parent state #521 | start processing: state #521 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #521 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-27" #521 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-27" #521 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.037913; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.829684 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388020d10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #521 | libevent_malloc: new ptr-libevent@0x7fb388054710 size 128 "road-eastnet-nonat-27" #521: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.27:500 to 192.1.2.23:500 (using #521) | e0 39 ae 6e 8d 33 46 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 3f e2 39 d0 87 6e c4 87 ac 4b 7f e8 23 48 99 | 92 9e 37 b3 ec 85 70 ac 3f 02 9e 68 20 31 71 0c | 97 15 91 c1 a0 ab 9e 8d 27 01 76 49 b6 29 fb 50 | 00 fc 65 98 a7 fe a1 a4 36 b9 c4 7c 54 f4 02 af | 60 2f d1 df 33 d0 64 d4 55 6b 05 3e b6 be ce 9f | 7b 70 7e 57 f4 bd aa cb 97 13 66 4c 9b c5 ee ff | 30 5a af e3 f5 d2 79 8f d0 02 64 c0 f6 31 9a 04 | 75 4d ca 99 cf 35 0b 0b 63 86 ed 2d 81 69 83 0d | 51 34 70 ee ac 2d 1e 34 e9 70 85 c2 2f a2 8f 70 | 6f 0d 80 be fa b6 92 2c 33 7f 13 ce 7a 72 1b 7a | 2a d2 4a 74 e9 27 c0 27 62 da 50 70 c6 2c 9d f6 | 5b a1 c7 10 be 54 64 5f e3 1f 76 be a3 86 5c 67 | 3f 34 60 37 96 c6 3f ac 97 7d a3 18 8c c7 ef 72 | 1d d2 f4 90 6a 6c 56 d8 e8 0f 74 17 ab b5 fe 66 | c6 f5 7b ef 12 de 81 09 98 fb 45 7d d7 c5 4b d6 | e3 d8 90 e0 92 65 36 18 47 32 4b 60 90 49 45 9b | 29 00 00 24 31 24 b3 bc ed 01 bb 4f 4e 94 0b a9 | a1 7c 54 38 d8 7d f8 73 0e b6 38 5d 48 35 f4 71 | f1 a3 75 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7c 55 c6 d8 c0 e4 0d bf da ae 94 5b | 53 f7 7b d9 db 38 1b b7 00 00 00 1c 00 00 40 05 | 3e db 6e c8 27 ac a4 d1 7f ba 2d 10 fa 4a 46 d7 | 5d f3 f0 38 | libevent_free: release ptr-libevent@0x7fb34004e2d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000cc10 | #521 spent 0.0652 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #521 connection "road-eastnet-nonat-27" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d5 d2 7d 3c 00 e8 ff 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #505 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #505 | rejected packet: | d5 d2 7d 3c 00 e8 ff 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-252" #505: ERROR: asynchronous network error report on eth0 (192.1.3.252:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0461 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bd e9 59 71 3e 30 66 18 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #513 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #513 | rejected packet: | bd e9 59 71 3e 30 66 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-107" #513: ERROR: asynchronous network error report on eth0 (192.1.3.107:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0421 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 19 92 95 ca 61 53 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #528 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #528 | rejected packet: | 53 19 92 95 ca 61 53 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 63 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-99" #528: ERROR: asynchronous network error report on eth0 (192.1.3.99:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0362 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 95 a6 50 d0 80 0f 96 24 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #509 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #509 | rejected packet: | 95 a6 50 d0 80 0f 96 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ec 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-236" #509: ERROR: asynchronous network error report on eth0 (192.1.3.236:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0367 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad da d3 24 2d 65 26 ce | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #524 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #524 | rejected packet: | ad da d3 24 2d 65 26 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-29" #524: ERROR: asynchronous network error report on eth0 (192.1.3.29:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0357 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bc 30 61 cf 1c f5 21 bb | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #510 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #510 | rejected packet: | bc 30 61 cf 1c f5 21 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 66 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-102" #510: ERROR: asynchronous network error report on eth0 (192.1.3.102:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0355 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 30 9a 49 1f a8 dd 2c 6f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #506 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #506 | rejected packet: | 30 9a 49 1f a8 dd 2c 6f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 01 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-1" #506: ERROR: asynchronous network error report on eth0 (192.1.3.1:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0376 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 7a 17 75 fd ae cb 88 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #514 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #514 | rejected packet: | 06 7a 17 75 fd ae cb 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 21 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-33" #514: ERROR: asynchronous network error report on eth0 (192.1.3.33:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0354 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 76 4a 29 e2 f2 d8 10 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #518 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #518 | rejected packet: | 76 4a 29 e2 f2 d8 10 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-45" #518: ERROR: asynchronous network error report on eth0 (192.1.3.45:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.035 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | da 78 05 0d 9b 70 b9 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #507 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #507 | rejected packet: | da 78 05 0d 9b 70 b9 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-243" #507: ERROR: asynchronous network error report on eth0 (192.1.3.243:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0367 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d0 cd fa e1 13 2d 20 e8 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #511 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #511 | rejected packet: | d0 cd fa e1 13 2d 20 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 58 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-88" #511: ERROR: asynchronous network error report on eth0 (192.1.3.88:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0351 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | dc 3f 02 d2 13 45 35 59 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #508 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #508 | rejected packet: | dc 3f 02 d2 13 45 35 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-242" #508: ERROR: asynchronous network error report on eth0 (192.1.3.242:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0353 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1e 61 5a f6 8c 22 37 26 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #515 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #515 | rejected packet: | 1e 61 5a f6 8c 22 37 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-75" #515: ERROR: asynchronous network error report on eth0 (192.1.3.75:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0361 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 33 e5 d4 8b 34 40 4a 8f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #517 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #517 | rejected packet: | 33 e5 d4 8b 34 40 4a 8f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 34 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-52" #517: ERROR: asynchronous network error report on eth0 (192.1.3.52:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0354 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 10 b1 a0 1e 00 fa a9 4e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #522 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #522 | rejected packet: | 10 b1 a0 1e 00 fa a9 4e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 4e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-78" #522: ERROR: asynchronous network error report on eth0 (192.1.3.78:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0349 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b0 c4 a7 65 22 ba 71 2f | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #516 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #516 | rejected packet: | b0 c4 a7 65 22 ba 71 2f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 46 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-70" #516: ERROR: asynchronous network error report on eth0 (192.1.3.70:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.039 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e0 39 ae 6e 8d 33 46 84 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #521 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #521 | rejected packet: | e0 39 ae 6e 8d 33 46 84 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-27" #521: ERROR: asynchronous network error report on eth0 (192.1.3.27:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0352 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | timer_event_cb: processing event@0x7fb368018460 | handling event EVENT_RETRANSMIT for parent state #580 | start processing: state #580 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #580 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-115" #580 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-115" #580 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.220934; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.931699 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #580 | libevent_malloc: new ptr-libevent@0x7fb34004e2d0 size 128 "road-eastnet-nonat-115" #580: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.115:500 to 192.1.2.23:500 (using #580) | ce a6 92 c0 a0 a1 1c a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | af 62 9c b2 99 63 23 d1 93 84 f8 c6 bc 03 8c f1 | 28 b3 ce e8 48 6d fc d0 0e a9 c2 9d 2d 9a 2c cd | 1f f0 93 df e5 a9 05 5b c8 c1 47 b3 5a 1c 0b cd | a2 95 bb 74 ae 94 51 dd 06 80 d5 6e c5 83 35 38 | f8 09 61 ae fb b8 3a ff 4b 57 1e 08 3c 1d 4a 21 | e7 43 37 6b 51 c8 a6 a8 1a c1 22 59 61 5e 5f 2f | b6 c5 96 ba 63 14 e1 d9 b7 d4 58 9e 9f e1 5d 87 | bd 9a bc 7a ff 27 dd 04 5e f7 15 28 0e 6d 1f 5c | 93 06 0d ed bd 1d 59 e2 0a 80 53 4c ef 63 50 ee | 1f 2d d9 4a 72 41 2a 22 6c b9 de 8d a4 62 87 63 | 24 a5 6a 1b a0 db 72 f2 81 6b 35 f5 c1 ba d7 29 | dd 15 a9 4a de e2 81 ba 33 50 3e e7 72 50 bf 75 | 5d 53 37 19 5e 9d 67 46 30 0c 5e cc a6 e8 91 01 | 51 ac c8 25 28 9a 12 77 ef 59 9c 00 f4 9a 34 3b | 2c 2f b6 d1 1c 53 57 48 b5 6f 80 17 ae 76 96 dd | ad 17 fc cb 17 9f 6e 5a be f9 98 d3 e5 2d d6 4a | 29 00 00 24 82 b4 09 66 1c 6d c4 04 c2 08 d9 05 | f9 60 c9 56 60 53 ce b0 69 de c0 ee bf 68 05 62 | 1b ac 43 c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 67 b9 a9 40 de ae b7 bf 06 27 f9 22 | 83 cc d1 c8 91 a6 93 4b 00 00 00 1c 00 00 40 05 | e8 5b fc c4 4f 3c a4 be 53 5f ca 7e 63 49 41 b9 | 5c fd 73 7b | libevent_free: release ptr-libevent@0x7fb368052a70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368018460 | #580 spent 0.169 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #580 connection "road-eastnet-nonat-115" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c025210 | handling event EVENT_RETRANSMIT for parent state #532 | start processing: state #532 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #532 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-23" #532 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-23" #532 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.22119; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.939356 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #532 | libevent_malloc: new ptr-libevent@0x7fb368052a70 size 128 "road-eastnet-nonat-23" #532: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.23:500 to 192.1.2.23:500 (using #532) | b2 bb c0 cb 23 86 64 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 33 37 df 77 a4 8e a0 b3 e3 00 cd d4 2d ac fb | 58 54 00 1b 4e b6 44 51 03 9f 3e 46 9f 8f df 83 | c9 7d 11 8c 39 ac 49 56 ab 5f 41 17 92 3f a3 b0 | 7b e1 99 32 00 0e 68 82 bd 92 1f da 3c 9d d6 5e | 1a 09 1d eb 8b bd 63 f3 c7 1c 91 de b6 81 48 d2 | a0 a0 d6 ca 6c 4d a4 58 b2 e4 43 1e 98 6f d3 dc | 45 97 3f 9b f6 f7 45 82 be d0 0f 1c 45 5c 9c 3a | c9 3a 6f 09 cd d2 f4 e8 72 09 bb 9c 48 02 f4 93 | 79 d2 c5 38 6e e0 b7 1e a4 59 ec 3a e6 82 c4 a8 | 46 c4 00 ed 3b 00 2b 60 1c 85 f0 e2 d1 ff 2f 3b | f9 d8 e6 be 72 54 6d 2f ce 69 68 10 dd 93 1f 49 | fd e3 cd 64 0c aa 7b da bb 78 88 4b eb 80 ba c8 | 39 a1 18 86 70 40 67 20 3d 9d ab 72 e5 25 d4 7a | 31 49 e3 a6 76 67 2f aa 74 53 9f 57 5f a1 88 a4 | ed d9 e3 9b 5a 62 f9 e8 ef 24 03 36 4e 35 9e 0d | ce 1c 96 2b 87 5a 84 0b cf 90 a8 01 d2 bb a7 f0 | 29 00 00 24 07 01 44 17 16 f9 66 65 39 42 87 0c | 7f 44 e6 59 85 b5 ac 74 8c 57 ff 68 a2 f9 2d 4f | 6f 8d 12 aa 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 d6 21 28 13 22 29 44 67 d8 0e 41 | 43 e4 97 1f 21 5e 2f 85 00 00 00 1c 00 00 40 05 | d5 1f cb 66 19 77 3c 8a 10 7e 62 eb ee 00 e2 86 | a7 15 35 82 | libevent_free: release ptr-libevent@0x7fb37c051490 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c025210 | #532 spent 0.121 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #532 connection "road-eastnet-nonat-23" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2cb90 | handling event EVENT_RETRANSMIT for parent state #660 | start processing: state #660 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #660 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-158" #660 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-158" #660 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.221325; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.963162 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c025210 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #660 | libevent_malloc: new ptr-libevent@0x7fb37c051490 size 128 "road-eastnet-nonat-158" #660: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.158:500 to 192.1.2.23:500 (using #660) | f4 6f 1b dd c3 97 a8 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 37 97 23 37 8b 84 91 b7 d5 21 d4 0b 62 7c cf | df e2 ac 72 2e 0a eb 49 05 1e 0b d1 82 e5 28 a0 | 47 bf aa c5 1d ae 5f 11 86 7c 19 a8 50 7c 93 a7 | 55 26 f6 b4 50 6b 43 66 6c c7 3d c1 5d f4 f7 0a | 0d b0 76 fa d6 23 62 3b 1d 9f 31 fa 3c 7b 58 7d | 20 ee 3b e3 02 2d bf 91 fc fc d4 ac 54 85 8f 34 | bf 3f 83 61 da 9a ff 82 88 23 3a fb 4a 68 00 0e | 90 da 22 07 27 44 0b 38 18 7b fc 7b 8a 26 93 c0 | 1e 09 9d 89 91 4e 14 70 0d 4d 2d 4e ab bc 7f 26 | aa a9 94 f1 34 22 dd 7b 42 4c a3 e0 64 ec 38 19 | e6 3a a1 45 f1 cc d3 8d 48 6c 60 e0 64 aa aa ad | 45 97 98 aa 45 d3 c1 ab 72 70 13 f6 87 f5 77 97 | bb d6 89 10 72 26 9b 74 6d a2 b8 41 cf 4b ed 68 | 80 d1 34 25 2d 5a f2 69 e3 2f e2 d6 b5 73 2b 4f | 8b d7 f9 67 93 34 a8 36 26 8a 04 d9 41 75 a6 2d | c6 bd e6 a0 4a 9b e7 19 bc a9 be 99 5e cb 41 13 | 29 00 00 24 f1 66 b3 02 a5 40 db 5b d9 27 9e 01 | 78 88 6e 9e 88 60 63 b3 32 3e c6 3b 89 b4 92 37 | a6 ee de 2f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f 7f 7c 35 fb 6c 2b b5 a9 0e ea 70 | a6 e8 51 cd 42 c4 a3 5b 00 00 00 1c 00 00 40 05 | ce 14 69 fa 68 3a 26 bd 8e d9 0e 4d a9 f2 9c 90 | 2d 53 9b 3d | libevent_free: release ptr-libevent@0x7fb3540906c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cb90 | #660 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #660 connection "road-eastnet-nonat-158" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46adc640 | handling event EVENT_RETRANSMIT for parent state #719 | start processing: state #719 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #719 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-193" #719 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-193" #719 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.221448; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.001415 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cb90 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #719 | libevent_malloc: new ptr-libevent@0x7fb3540906c0 size 128 "road-eastnet-nonat-193" #719: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.193:500 to 192.1.2.23:500 (using #719) | a1 e8 20 43 a8 88 d4 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a8 ab ba d1 12 9a ec ff 2a 8d 05 f1 61 72 fc 12 | 50 d0 8b 0a f5 f8 07 f6 3e bb 96 36 70 dc 69 15 | 19 13 a2 d6 28 22 91 85 b9 c6 ae 40 f1 6f da 62 | 5e 9b e9 42 bc cd 47 a9 39 f2 57 46 62 a2 10 aa | d8 dc 57 a1 b1 b0 e1 a2 6e 21 37 a0 e6 91 53 43 | 3a 39 b3 13 b9 9a a2 2c 1d 20 6a 6b ed 1a b3 d6 | c1 d0 e0 c4 cd b3 32 14 d0 e6 ed 44 76 72 46 07 | d4 18 aa 83 01 f8 a3 38 90 94 a1 fe 3b 59 34 42 | 25 b7 b1 5f cf ed 7b 9e e4 7a 92 07 5e d0 c7 a2 | d0 7e 54 5b 4b f9 50 6a 40 3e 4c 40 b2 5c 33 c4 | 63 a9 26 d0 d8 64 ca 1f 4a 1f e3 d6 1f 89 7f 4f | 6e 5e 19 7f cb da f9 38 d8 39 8e fa f7 bb 35 44 | 19 f4 69 49 42 32 1f e6 a6 69 2b b3 d6 b8 11 37 | 64 4d 1e b3 f2 07 24 9a d3 3f 11 59 ae e5 5b 71 | 8d b9 39 61 c8 17 f2 28 f6 ff e7 6f 1d 64 87 fa | d5 05 27 cd c8 9d a9 d6 a8 55 c4 9b 8a 80 03 48 | 29 00 00 24 35 05 0b 61 81 12 01 a2 56 70 69 a8 | c1 2a 37 d5 7f b9 83 93 56 ce 1a 17 bb 38 92 4e | 85 53 16 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea c6 0c 55 e6 7e 39 b7 3e fa e3 87 | d8 fd e1 5c eb b3 f6 df 00 00 00 1c 00 00 40 05 | ea 71 42 1a 2a 30 c7 3c 78 cb 6c ab 7d ed 04 39 | d2 40 14 db | libevent_free: release ptr-libevent@0x7fb3640ac040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adc640 | #719 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #719 connection "road-eastnet-nonat-193" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a02770 | handling event EVENT_RETRANSMIT for parent state #735 | start processing: state #735 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #735 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-238" #735 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-238" #735 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.221577; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.996748 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adc640 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #735 | libevent_malloc: new ptr-libevent@0x7fb3640ac040 size 128 "road-eastnet-nonat-238" #735: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.238:500 to 192.1.2.23:500 (using #735) | 53 89 83 1d 48 ce 70 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5a 91 4f e8 ba d0 cf 5a d7 f0 71 fa 46 1a 8a e8 | 7d 4a be de 38 b6 47 be 9f b9 8a 22 46 d2 62 91 | ca 86 42 c6 77 2f 59 d3 e4 f2 fa 15 7b 3c 27 33 | 0c 23 b9 e7 b5 8a b0 8e ec c6 a4 80 d5 32 f2 16 | 21 6f 71 5d b4 75 f3 73 d3 f0 4b af 90 08 5b 92 | bd 52 84 33 aa 3b 00 4e e0 dc 9e 9b 5c e1 64 90 | 46 3d eb f8 93 ab a4 6e 46 c2 33 ef fc 8b d9 14 | f9 38 bb 1f e7 fc 89 8f 65 b1 d8 35 5e 99 68 8b | 32 06 43 77 f7 fb 44 87 13 38 82 0c ff 88 57 fb | f3 b5 78 4d 2f ac 61 eb 6d cb cb e1 13 98 c8 fa | 56 54 e2 54 39 9d 99 08 4b 53 de 03 86 18 ea f1 | 33 cf bb 45 1d 44 4f fa bc 18 e5 13 24 71 58 c8 | a7 32 0b 95 3a 6d 89 f1 b7 95 86 7b 38 71 2b d7 | d3 e8 9a bf 1d 2d e6 e7 fe 5f 9d 7e 67 88 57 56 | 5a 53 49 ca 89 7f 95 e0 bd 0a 6b 9b e1 e9 d3 17 | 9d 45 18 8b 68 cc de 5a 3c 70 99 6e f6 36 78 b9 | 29 00 00 24 9d 95 cb 46 13 9a 6a 64 e7 15 0c 4c | dc d4 c0 de a5 95 63 82 d6 ca 4a 90 78 69 d3 72 | e7 c1 f1 39 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5c cd 3c 21 f0 20 2e 88 28 a9 40 54 | 19 d9 0a 26 35 63 bc e9 00 00 00 1c 00 00 40 05 | 4d 3d eb 4a 56 ab 16 38 35 e8 7a d1 b0 99 53 b5 | 30 cb 3d 6b | libevent_free: release ptr-libevent@0x7fb374059970 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a02770 | #735 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #735 connection "road-eastnet-nonat-238" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370017ea0 | handling event EVENT_RETRANSMIT for parent state #590 | start processing: state #590 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #590 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-59" #590 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-59" #590 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.221703; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.936975 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a02770 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #590 | libevent_malloc: new ptr-libevent@0x7fb374059970 size 128 "road-eastnet-nonat-59" #590: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.59:500 to 192.1.2.23:500 (using #590) | 6c 7d d5 ab c5 87 8a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be 10 c4 6c 74 1b a2 8f 66 7a 62 d2 25 ec 33 a4 | 70 d7 c3 96 b8 a1 45 8b 02 09 80 a1 f3 7c 96 6a | 39 ed 63 55 b4 78 94 49 5f c4 6b a9 d5 4e f8 12 | 1a ac 4b a8 bc a5 a8 12 11 8f ce fd 6b 3c 86 54 | ca cb fd 2b 06 f6 33 36 41 59 16 8d 82 7a 0b 1a | c7 7f c9 82 7b fe 08 af 9f 61 2b 45 92 6c 6e 24 | a4 18 44 e2 17 55 31 77 5a ca 72 7e 7d 88 37 f5 | 6d c1 ab 86 9d 67 6d ea ef 9d 8e 62 9d 65 20 07 | 45 00 55 47 ac 2c 2b cf 33 ff 98 5d e2 f5 aa c2 | 8a a3 0c 25 db 52 4a f6 b5 28 47 29 53 2c f7 88 | 0d de 80 45 88 5f 79 8d 46 fb 55 a7 94 65 0d 0e | 39 4d a1 ad 42 11 ce f5 0f b0 ea 8b 2c be 25 aa | eb 10 3b 8f 68 f9 5b 76 a8 a8 5d fa 34 25 2f aa | fd 6c 2c 9f ac 68 3a 0f c6 e4 89 2c c2 fb 6d 39 | b5 45 cd 30 f2 bb a2 0c 7b 79 29 25 a0 cb 26 59 | 16 3d f7 87 27 3d d0 80 df c0 94 22 c9 92 e3 72 | 29 00 00 24 aa a1 cb 0a e0 68 cf 8d 79 59 07 9c | 1e fd 67 fc d7 c0 41 c5 19 de f2 e4 bb 83 d9 07 | f2 5b 83 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 a4 46 9e 55 3a a4 f8 b6 3f 64 6c | 2c e2 55 62 44 61 35 d9 00 00 00 1c 00 00 40 05 | 79 b6 13 d4 15 d9 80 92 7b c3 42 98 a7 4d 57 09 | ac cd 9f ec | libevent_free: release ptr-libevent@0x7fb35c085320 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370017ea0 | #590 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #590 connection "road-eastnet-nonat-59" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a38f50 | handling event EVENT_RETRANSMIT for parent state #662 | start processing: state #662 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #662 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-116" #662 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-116" #662 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.221827; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.968659 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370017ea0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #662 | libevent_malloc: new ptr-libevent@0x7fb35c085320 size 128 "road-eastnet-nonat-116" #662: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.116:500 to 192.1.2.23:500 (using #662) | 6f f8 26 3d 46 67 06 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e1 15 32 77 43 3f ae 4b c7 5f 3f 2b dd 7f d3 1e | dd c1 5f 13 88 1d 29 8c 3e da 8c 02 5a 8d f6 d1 | 3f a3 f0 0a 58 d4 04 d3 f0 b3 db 26 fc 33 ce 46 | ec 5c 90 e3 6a 12 91 6d f5 be 55 11 24 66 8b cd | 51 d1 6c 4f ab d6 35 10 55 bd 81 f3 c5 9b 26 2d | f4 3f 70 2d c2 69 41 11 99 68 6f d6 67 f7 0b 94 | 16 15 37 50 dd 26 25 c5 03 89 2e cb 46 72 37 83 | a6 ca 48 57 46 11 c8 fc 49 a5 3f 23 f4 8e fd 9b | bd 5e f8 86 fe e9 d6 03 94 fe b5 73 a0 97 a8 36 | f8 6d 97 05 65 b5 9b 5b a3 4c 3e 56 89 a0 18 c6 | 54 22 3c 22 df 8c 9f 6b 24 e7 85 e4 91 73 3e dd | 3a 3d 86 ec 02 50 a4 d4 9b 1e ca d9 b8 85 33 11 | 56 6c a0 81 f5 30 19 45 f3 7e 2d d0 fe 89 3f 3f | 64 51 16 e1 24 be 5d 31 7c b3 98 ff 06 a6 e7 a9 | 85 09 74 83 46 27 19 d4 40 fc 28 57 e7 6b be 01 | 31 d5 96 a2 39 76 f1 7c 9a 2f 1e 01 ba e4 af 67 | 29 00 00 24 66 62 42 f7 ff d9 33 d8 69 d9 c8 18 | 14 3e 2e de dd 0a 0a 0c a5 a3 31 2b 3b 0a 7e 9b | 7e 11 99 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 54 03 6e e6 e0 19 5c f9 e0 4b 25 | 45 a9 f7 08 e7 02 7d 4a 00 00 00 1c 00 00 40 05 | 8b cf 33 fc 59 1a 80 29 98 08 22 36 83 94 58 20 | 7d d0 3f 09 | libevent_free: release ptr-libevent@0x7fb36006c900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a38f50 | #662 spent 0.106 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #662 connection "road-eastnet-nonat-116" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c01da80 | handling event EVENT_RETRANSMIT for parent state #681 | start processing: state #681 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #681 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-170" #681 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-170" #681 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.221956; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.975964 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a38f50 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #681 | libevent_malloc: new ptr-libevent@0x7fb36006c900 size 128 "road-eastnet-nonat-170" #681: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.170:500 to 192.1.2.23:500 (using #681) | 43 b3 87 97 a5 28 76 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c2 69 dd 2f f3 2d 11 ad a5 9c d3 5d da 0a 86 6b | 8c 49 25 0c 16 f8 de 41 b0 ac 6e 41 c3 d3 27 1c | 5b 54 cb 17 92 04 0e c6 6b 96 94 d9 db ad b8 79 | dd c8 5b bf 4b a3 2f 7c 6a 19 e7 ad 1e 53 14 f7 | d1 90 70 c6 a3 11 50 75 b1 1c 57 b6 52 72 e5 bf | 5f 38 47 3e 16 f7 e0 ac 51 3d 68 76 bd 51 68 b9 | 99 0e 7f af 6c 2d 48 06 10 6a 30 cc 70 5d 14 1f | f9 cd e8 dc 60 df 2b 6b b6 f3 6f 7e 00 e5 1f df | 04 ee 6d 38 b5 09 46 77 da d8 ac d9 bc dd 17 11 | 97 7f c0 a3 2a 8e e7 7b d0 22 8a 6e 6e cc 8a d1 | ee 68 9a 8f a3 46 20 76 f3 a4 2c f5 c0 c0 1e 77 | 2d 20 e2 fc 14 c2 66 73 98 59 19 d7 e6 3d e6 8e | 61 67 8e 25 aa c2 61 e0 9d 35 ef 0e be d6 35 38 | 8c 18 ce 74 7a be 48 b5 c4 a1 11 de 05 be 64 33 | e8 8b ac cd 76 ec 2b 48 c4 d2 9a 3c c7 9d b7 e7 | 67 3d c4 7e 7f 8d af 5a 9d 1c 23 aa 32 7a 83 a5 | 29 00 00 24 ab ab 32 27 cc 43 85 a1 14 10 62 ae | 10 ab 5a 1f 4b 33 ac a9 a7 81 9d 0d 60 06 a6 87 | e7 aa 41 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 f1 2f 02 50 94 bd e1 85 64 92 73 | e1 fc 7b 98 62 5d a3 7d 00 00 00 1c 00 00 40 05 | 0f dc 60 fc ac a0 68 fc 96 74 2f 45 a5 ab 4a db | c3 e2 5b 97 | libevent_free: release ptr-libevent@0x7fb35c0643e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c01da80 | #681 spent 0.126 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #681 connection "road-eastnet-nonat-170" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a97080 | handling event EVENT_RETRANSMIT for parent state #657 | start processing: state #657 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #657 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-118" #657 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-118" #657 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.222124; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.972413 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c01da80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #657 | libevent_malloc: new ptr-libevent@0x7fb35c0643e0 size 128 "road-eastnet-nonat-118" #657: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.118:500 to 192.1.2.23:500 (using #657) | bf 48 a9 53 c0 7c 6b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 48 64 7a 76 84 6f 20 71 f2 54 53 61 b4 2f c6 | 54 76 e2 72 67 c3 02 01 5f 84 02 0f de 2d ba 04 | 6b 3c 60 21 8c fd c8 83 d8 de 0a 87 07 82 2c 85 | 16 8f 94 7d 11 fa ef a1 1b 06 7a dc 75 50 fb 5d | 8b a8 18 9b 6c fa 90 67 0b 98 3c ce 23 29 77 3a | 62 14 dc 91 f1 b1 30 3c 50 5a b7 ab a9 84 e0 d2 | ce d6 81 2a 09 a1 f6 27 12 d7 a8 6e 71 b4 d2 a3 | 42 60 96 28 6a 9a 98 b3 00 c1 ce 0e fa 8d 64 99 | 97 f3 81 78 89 04 b5 01 30 ce 7b 3b 03 13 20 ba | f7 13 2c 46 1a 99 04 0c d2 4c 52 fa 53 fc 61 38 | f6 1e 41 8e 82 00 e0 91 48 32 35 c0 7e 73 9a b9 | b3 a3 fd 92 08 58 7d 9d 6f 3a 6b fb 59 79 43 c3 | 78 f1 a6 f1 a4 85 3a d3 46 60 e6 af f5 9f 91 88 | 84 4f 9a 31 88 1a e0 60 7b 5c 36 77 35 25 9a 22 | 0a f3 1b 51 c9 cc 85 ea ce be 58 28 90 39 31 a8 | b5 d3 9f 05 f3 8e b3 99 94 db 0d 61 87 87 60 cd | 29 00 00 24 b1 1a 4e 72 ee 50 9a 55 3a 6a 4a 22 | 5c 8a 27 a4 f8 35 f8 89 7d bb de 47 9d 6c ce cd | de bf 5d e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 82 93 fd 1a 46 eb 2b 7c e7 8f 20 da | 90 df ff 1b 3f 1b 91 27 00 00 00 1c 00 00 40 05 | 66 8b 83 94 36 8b b6 4c fb 21 d6 7a 66 05 fe c3 | a5 94 ca 7e | libevent_free: release ptr-libevent@0x7fb374080090 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a97080 | #657 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #657 connection "road-eastnet-nonat-118" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb364005860 | handling event EVENT_RETRANSMIT for parent state #741 | start processing: state #741 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #741 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-217" #741 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-217" #741 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.222246; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006325 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a97080 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #741 | libevent_malloc: new ptr-libevent@0x7fb374080090 size 128 "road-eastnet-nonat-217" #741: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.217:500 to 192.1.2.23:500 (using #741) | 62 ac e1 dc 78 47 49 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 14 75 0b 46 c7 7e 2e 5b 84 9b fc 63 4f 7a bb b1 | bb 0b 39 b2 38 45 c4 46 64 96 9b f6 97 0f ad 64 | 77 d0 65 ce 45 75 90 09 8d bb 17 97 97 97 b2 fe | 7c 98 b0 3c e2 1b b2 75 9e 4f 00 17 88 80 52 35 | 5a e1 87 e0 03 97 21 fd f3 19 41 85 49 46 8f ab | 34 a9 9a fd f7 fd 73 2c 73 3d 6a 91 77 21 6d 6c | 79 4c 5c bb 61 7c 82 81 01 a9 8b f8 96 88 67 ec | 5e 9f 63 85 f6 a8 a9 74 84 a6 13 9a 7a ca 36 d7 | d6 5d 44 65 ea 98 9a 63 18 26 33 18 de 47 5a c9 | 7a 75 34 c1 c7 bd 4c 1d 3b 2c ba b7 c0 6e 1c 7e | 83 75 bf 9c ba 83 c0 f2 ba 77 85 7b 33 2b 90 b1 | c2 52 77 da 60 67 e2 5a f3 07 0b 1d 76 db f2 c8 | dd 92 77 15 ff 35 90 20 f7 3a 79 14 36 0e 74 98 | 26 48 0d 10 a8 b8 96 6e a1 d3 39 9c 37 f1 09 c2 | d6 18 46 cc 20 41 73 2d 13 cc 4b 13 c4 75 47 56 | 6f 8d 2a 56 34 65 b3 20 fa a7 7c 74 84 64 26 20 | 29 00 00 24 98 46 88 9e 86 0c 01 40 55 4c d6 79 | b1 b2 76 d9 6d f0 c7 03 be fb 8a 36 84 6a 6b 74 | 5e 47 68 8e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 45 41 a0 85 77 fe f1 d1 6d 6e 5e | 4b d5 c9 60 59 e4 cf 31 00 00 00 1c 00 00 40 05 | 3f 98 bf 78 15 51 e4 00 05 0a 6e 9b 09 7f 98 a3 | af 3d 07 7b | libevent_free: release ptr-libevent@0x7fb36007a360 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364005860 | #741 spent 0.0984 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #741 connection "road-eastnet-nonat-217" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35400f1f0 | handling event EVENT_RETRANSMIT for parent state #573 | start processing: state #573 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #573 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-83" #573 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-83" #573 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.222367; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.952605 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #573 | libevent_malloc: new ptr-libevent@0x7fb36007a360 size 128 "road-eastnet-nonat-83" #573: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.83:500 to 192.1.2.23:500 (using #573) | ad 3e 6c 78 39 d7 59 85 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f2 bf 7c c9 f8 3c 5a 65 38 6f b3 01 ce 5b f5 30 | a7 ca bf a7 0a 2f 6d 46 e4 95 8f a9 a2 c3 62 81 | 94 18 87 7c 67 ac a9 c8 f7 1a 98 84 db 40 bb af | 3f 2f 53 16 16 52 73 41 99 39 2a cb ce f0 16 f6 | 59 5f 0a b0 20 7c 3d e9 5a a2 88 c5 c1 bb e2 4d | 7f ce 41 78 9a 73 4c 9c 78 3b d4 42 d4 ea b6 26 | c7 66 8b db 44 b6 63 44 77 ad 6a 85 b2 f6 09 24 | d3 1d 9e d9 14 90 b9 f3 03 6a b8 35 9d 2f 7e 69 | 38 a8 b1 78 a7 b9 d5 b5 6e 03 4e df f1 29 29 d6 | 73 fb 44 0b 0c b8 b6 ff 70 60 7e 98 07 b6 c6 7f | c1 02 f7 52 15 2f 51 21 2d 87 70 fa c3 6d a5 50 | 6d c2 b7 77 96 5a 3f ba 71 2f 23 99 27 34 36 64 | 93 e7 80 7e 69 88 92 68 e6 5b cb fb d5 c9 2a 24 | c5 78 ae b1 67 8c 39 a4 a1 f5 8f 57 47 ac be 22 | 0c ba 38 7d fd 68 4d 5c f9 30 0d 91 30 9d 25 fc | c6 0f 2d 2c 17 7f 55 f6 65 7c 10 de 1f 7f 50 fb | 29 00 00 24 50 ef b4 44 89 5d 96 3d 4c 55 e3 f3 | 30 1e a6 1e 68 57 c5 9e 6a b1 8f fc 63 11 d1 e1 | c2 23 29 d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 eb 0a ea 0a 2d 9d 52 e1 84 99 c3 78 | 56 e2 02 95 3c a9 b9 67 00 00 00 1c 00 00 40 05 | 07 da 52 ba 89 af c4 46 3c 5a 2a 18 50 3f 02 03 | d1 88 0a 69 | libevent_free: release ptr-libevent@0x7fb36c08dbf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400f1f0 | #573 spent 0.101 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #573 connection "road-eastnet-nonat-83" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0bf00 | handling event EVENT_RETRANSMIT for parent state #569 | start processing: state #569 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #569 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-87" #569 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-87" #569 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.222487; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.928781 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400f1f0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #569 | libevent_malloc: new ptr-libevent@0x7fb36c08dbf0 size 128 "road-eastnet-nonat-87" #569: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.87:500 to 192.1.2.23:500 (using #569) | 55 2f d6 9f 11 e5 1c 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 13 ad f3 19 0d b2 66 aa bf 03 d7 00 2e 8a f6 e9 | b3 08 01 25 75 89 85 ed a8 02 b4 4e ae da 53 49 | 58 9e 82 fc af 45 f7 e5 3a 8a 61 8e 88 c7 af 9a | 14 17 d6 60 7e 9b 49 7e fb c7 a3 8f 06 1f 55 04 | c8 6c 7d 7d b3 8a be f8 87 7c c7 58 4b a7 87 5d | 9c b5 54 d3 ac 08 0e 69 85 4b 91 09 83 8d 76 46 | 46 3d 39 9e ac d3 50 29 5e a5 08 c8 9e 48 83 f1 | 7a ff ec 7e 14 c7 a3 2d 96 02 b4 ac 09 ec 55 2f | 9a bc 9a b9 ae 22 a8 43 ce 46 d4 aa a2 8a 21 94 | 31 c8 40 01 99 87 64 fd 79 ff 03 2c 2e 81 52 10 | 65 b9 fe d7 6e b5 1b 36 08 b8 c5 40 a2 b3 94 60 | c1 5e 51 00 52 ca d5 19 e8 a1 81 66 03 72 10 ef | 03 5d 84 88 58 a5 23 01 6a de f9 31 fa 89 4d ec | dc d2 db 41 a5 f5 42 96 78 ed 68 a8 33 e3 9e db | 24 46 13 b6 1b b4 8e a4 01 2d 3b 33 63 dc 87 44 | db c9 90 4c 80 8f a3 e2 b7 82 7f c5 7c be 1e 53 | 29 00 00 24 0e 82 eb 05 c0 49 58 d2 06 74 53 82 | bb 2f d8 51 c7 ad 9e 32 5a e2 85 00 b0 c7 ec f1 | 8e f6 f3 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e2 e7 bd d8 a7 7f 8b fc 64 ee 06 53 | 59 02 1a 01 d9 98 46 39 00 00 00 1c 00 00 40 05 | c0 b7 45 5a 2a e8 30 84 4a 1b 7a 52 bc cd a9 4d | c0 d2 c3 7a | libevent_free: release ptr-libevent@0x7fb3840899b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf00 | #569 spent 0.0995 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #569 connection "road-eastnet-nonat-87" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34003f560 | handling event EVENT_RETRANSMIT for parent state #547 | start processing: state #547 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #547 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-36" #547 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-36" #547 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.222608; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.921845 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf00 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #547 | libevent_malloc: new ptr-libevent@0x7fb3840899b0 size 128 "road-eastnet-nonat-36" #547: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.36:500 to 192.1.2.23:500 (using #547) | 08 a9 69 6a 37 31 fe e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 70 8f 95 a8 08 4a 05 6c b9 8d 6f 47 8b 04 9a 61 | e0 b5 a7 54 d7 f6 b0 b2 80 21 f1 25 51 d7 e7 f1 | 65 c9 25 83 1a 4e 78 02 4c 52 52 f0 64 27 3f 26 | 0b d2 14 48 53 3f 10 9e f7 fb 83 89 e0 a6 40 c0 | ac c1 d7 6a 50 16 4b ff 1f bc c1 ba b9 50 75 ab | 97 f9 e1 ea ad 67 25 02 53 4f ab 12 78 7a b1 65 | e0 48 35 1e 09 a6 85 b6 4d 5c 49 16 55 30 42 5e | b9 f1 50 2c e6 5b 8c 18 8c 57 4a 2f 85 11 d0 01 | 37 16 99 1c 9d 24 6d 7b 69 12 eb a9 3b c6 79 88 | 71 5a fa 14 26 f9 27 29 b3 23 6c 0a 35 18 d6 92 | af 76 48 1f d6 d0 94 16 fe ec 88 6c 8a e8 d2 fa | 63 24 d6 a1 72 8d c8 45 fa 71 9c b6 4e 87 9a f2 | 3d 51 b0 37 f7 2f 94 b2 eb 33 6a 4b b2 e5 fd 10 | 52 ad 99 ac 91 e9 f8 db bf d6 1e e7 93 ff 43 02 | 2f 77 1f d8 af 33 b2 2b c2 3e 9a f3 55 7a 63 95 | 83 04 91 50 3e b6 71 c0 09 49 63 7e 66 a6 12 8b | 29 00 00 24 eb 3c 18 5d 0c ff c1 c1 a4 88 c6 c0 | 90 96 2d a5 6a 9d d3 7b bb 7c 2c 4c e3 35 60 33 | 3d d4 c2 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e 02 45 88 78 27 f3 6f f8 1b fc da | 5a fd 16 4d 6d 84 19 70 00 00 00 1c 00 00 40 05 | 9b e7 b7 66 bc 65 25 34 6e 71 75 59 14 69 9b 1b | c0 b2 09 dd | libevent_free: release ptr-libevent@0x7fb340059190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34003f560 | #547 spent 0.0944 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #547 connection "road-eastnet-nonat-36" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb364029270 | handling event EVENT_RETRANSMIT for parent state #692 | start processing: state #692 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #692 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-109" #692 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-109" #692 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.222724; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.980042 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34003f560 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #692 | libevent_malloc: new ptr-libevent@0x7fb340059190 size 128 "road-eastnet-nonat-109" #692: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.109:500 to 192.1.2.23:500 (using #692) | cc 18 05 4d c7 59 29 89 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 89 bc 56 c0 b5 d7 1a 19 67 cf 61 47 cf cf cf 69 | 0c 5a 9f 01 32 78 de 71 f0 74 81 19 ed 71 d9 b7 | 6c 1a 14 67 77 21 31 19 27 f8 20 2e 9b 72 8d e0 | fb c3 78 0b 20 93 f6 09 52 76 69 39 6e ac 7c 06 | 40 27 58 9f 6d bb 6d 84 cb 61 8e 0f d8 d3 36 d2 | ed b2 8a 88 8f 6f f0 1e 1b d7 5a 1c 7d 7e 95 ba | 9a dd 6e 5a bb 30 97 01 78 90 d0 34 e6 bb f7 4a | 36 d6 7a 11 b8 51 c6 68 c3 31 ea af 66 a8 39 16 | 34 04 5f b3 7f 60 a0 eb de 43 b9 ad eb 2c 3a 9e | 0e ac 2d 97 3b 24 b1 8f cc 8a 22 51 8c d9 7c 8f | 5c bd 64 59 9e 2e 51 e2 19 ad d8 1d 4d 34 4c 24 | 22 63 7c ba af a3 27 18 d1 02 9a b0 98 c3 d7 57 | 32 dd b6 b7 23 c1 5f 8d ea 84 1f 15 18 04 2a a7 | 93 9c 7d f3 d9 4e af b7 ec 8d 2d b2 4a 62 49 e5 | 24 51 62 9e 81 79 94 0d 40 f4 e7 84 ba 20 8a 12 | 56 3d 86 3c a8 88 5d 08 d2 a2 6b 92 78 f3 25 d4 | 29 00 00 24 e1 fc f7 b6 dc b1 8e c8 89 6e ca 67 | c4 89 7d 5a 55 53 f0 73 1a cf eb a7 39 4d 69 f9 | f9 7d fe a7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7c 62 99 77 fb 76 f7 56 4f 5d 6c 0a | a8 89 cf ee 73 3a 0b 7a 00 00 00 1c 00 00 40 05 | da 92 6d 9e 8e f1 6a c7 a9 e0 f9 23 03 35 37 00 | ea 8a 41 05 | libevent_free: release ptr-libevent@0x7fb364054370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364029270 | #692 spent 0.0958 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #692 connection "road-eastnet-nonat-109" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d469fb8a0 | handling event EVENT_RETRANSMIT for parent state #570 | start processing: state #570 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #570 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-96" #570 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-96" #570 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.222856; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.940512 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364029270 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #570 | libevent_malloc: new ptr-libevent@0x7fb364054370 size 128 "road-eastnet-nonat-96" #570: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.96:500 to 192.1.2.23:500 (using #570) | c9 60 e7 45 a7 98 e0 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 68 68 13 ed 82 59 f7 bf b7 d3 7d 5a 25 b1 e1 fd | ce b0 3f a5 fb 8c bd 34 1d e5 2a 9b fc 5b 3e 55 | 82 20 27 8a 48 3d 6e 3e 7f dc aa 07 ea 30 a0 2a | 9c f4 f8 a8 1d 61 fa e6 e5 a6 d3 c3 23 a2 0d 27 | d8 62 e9 78 7e f3 e0 26 9b ba 64 6b b0 e1 50 5c | c3 bc cb de d9 53 bf f2 ac d3 d9 69 fb c6 10 8c | 38 7d aa 47 ee d8 74 e7 3e ca 1f 48 f0 13 76 f3 | 40 f4 69 cb 3d 62 67 20 a1 3b b6 e2 a8 a9 ab a6 | 2b 8b a8 99 f0 d1 52 2b b5 e5 e6 49 c7 16 b6 59 | f0 d0 ea 1f 2e db 52 ab 01 2b c6 eb cc 72 67 ee | fc 53 07 28 c8 cb 95 9e 3a a0 20 2c 1e 66 b0 e9 | 12 9c 0c 0c 6b f2 70 25 e0 f9 f8 0e 69 49 c5 be | 72 17 9d 25 7c 8e 29 c2 0e 40 fa d6 20 e8 3f 96 | ac dd 51 f9 fe 49 86 c9 9b e7 be 19 fb 67 10 1f | f3 4b 80 50 1d d2 9f c6 fc 87 3a f9 1d 52 8a ba | 10 8e 73 40 ff 99 d5 7e 30 7d e1 68 1c 25 bd b7 | 29 00 00 24 ba 1d 83 e5 8b c9 fc 82 14 41 45 77 | 00 92 fd 3d da ae b0 d1 cb bd 90 71 29 d7 a3 fd | 03 9f fb b5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 fa 68 08 10 0a d6 4b 37 b2 81 b0 b2 | 14 38 ef bd ae 4e e0 08 00 00 00 1c 00 00 40 05 | 3a 9e a3 24 b1 2a 82 b0 e0 fd 89 6a b8 7b ca cd | 82 b8 2e 9e | libevent_free: release ptr-libevent@0x7fb35405ef90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d469fb8a0 | #570 spent 0.117 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #570 connection "road-eastnet-nonat-96" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a8d840 | handling event EVENT_RETRANSMIT for parent state #588 | start processing: state #588 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #588 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-17" #588 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-17" #588 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.222979; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.942121 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d469fb8a0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #588 | libevent_malloc: new ptr-libevent@0x7fb35405ef90 size 128 "road-eastnet-nonat-17" #588: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.17:500 to 192.1.2.23:500 (using #588) | 07 e4 97 ab 5f cb 91 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 a6 96 6f 8d 19 77 3f 7b 52 64 d1 7d b8 c3 32 | e6 45 b8 da 56 a7 e9 08 27 5a 9f 4a f5 65 0f 19 | 1a 87 9c 5a 04 ac c9 78 c0 7b 31 1c 5e fb 7e dd | 49 05 d6 20 6e 0b 54 2a 9b 3f 4c f3 f9 b9 1c 60 | fd 45 61 e5 98 00 5b 9c 76 47 67 ad ea 1b 21 91 | a4 87 87 e0 87 97 79 8f 69 65 91 fd b9 ec ff c4 | 7c e3 32 4b a0 5f 86 aa a7 fa 0f b5 34 1b 73 49 | 66 c8 24 f8 1f 2b 81 c9 03 bd 50 e2 ed f5 66 6c | dd 1f 49 9e f6 da 33 36 e9 d5 b8 a9 47 7f 93 53 | 01 8d de 29 38 fb bb 0d a3 c7 a3 88 35 89 50 ea | dc 06 47 18 09 d0 b1 af c6 f0 7f 06 49 d3 b7 66 | c7 ef 15 23 12 a8 2e ca 41 93 d6 39 56 e0 00 fc | da 04 e7 a4 d5 e6 05 93 a8 c3 b6 60 a2 5e 1a 5b | a7 0a 03 72 c9 af c9 1d 6d 01 5a c0 73 ce 68 f2 | 8a 78 2b 21 30 c3 39 b1 07 f8 a8 5f eb fd ce 8e | 91 c1 e4 7a 50 88 f7 d6 5f 29 3f 29 95 a0 44 e0 | 29 00 00 24 ca ce e1 5c c7 60 0a 0b 6d 35 6a ab | 7c 6e b2 8f 16 80 da 2b 8c f1 55 28 04 49 6c 0a | 9c 6d 0f 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 70 0f 71 4f aa a8 18 56 c1 cb 65 | 01 88 44 d0 16 19 79 73 00 00 00 1c 00 00 40 05 | 52 d2 00 b1 18 82 fe 4a 49 3d d9 d7 7e 4f 87 22 | fa 52 4b 2c | libevent_free: release ptr-libevent@0x7fb370054000 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8d840 | #588 spent 0.11 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #588 connection "road-eastnet-nonat-17" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a81500 | handling event EVENT_RETRANSMIT for parent state #736 | start processing: state #736 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #736 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-232" #736 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-232" #736 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.223115; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.994301 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8d840 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #736 | libevent_malloc: new ptr-libevent@0x7fb370054000 size 128 "road-eastnet-nonat-232" #736: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.232:500 to 192.1.2.23:500 (using #736) | 55 f4 27 9b 2c 7e 0c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 4e 06 40 b2 65 21 5d 08 0a 87 dc 23 78 63 f5 | 59 9b 01 94 f1 c6 ee de 2e 54 64 04 7b bf ee 90 | 74 b0 cc 16 6d 13 9e 63 f9 06 73 5e 5e 85 4b c6 | 1e 30 91 54 94 48 03 60 af 1a 46 14 b6 86 67 6e | 56 bb 9d f9 7c bd d8 15 ef da 2d b6 8e e2 c0 fa | 6c 86 fc 27 18 08 26 1c 3b c7 8f ab c9 15 f1 b5 | 77 17 8f 4e 86 0e 1d 02 0e cb 79 7f 00 de 43 ca | 0d 98 67 80 78 be 76 95 19 4f 8e 1c 0f 1f 02 46 | b5 24 e0 a5 90 31 f0 6c 94 59 9e 86 fe 50 a7 16 | d3 90 18 f9 5a 5e f2 b0 85 c0 8a bb 36 a9 3c e6 | 3f 58 61 ed 76 63 9e 91 dd 1d 1d a5 d8 6f 61 e6 | 60 34 52 1f c7 3c 4a b9 12 d2 23 01 83 9f e0 72 | b0 b1 95 db a2 3d bd 5f 63 44 17 84 2a 1c ae e2 | 87 6e eb 4c 2d b2 76 61 6e 10 55 07 2f 21 a9 05 | 7b e7 0e 8d 3b 46 3c a2 52 e3 e4 5a a7 20 76 cc | 56 d5 06 15 ef aa e4 2d 6f 6f 60 d9 2a 22 ec 23 | 29 00 00 24 74 fa 10 32 44 33 16 00 ef 17 0b a3 | 58 ac 5e 66 66 dc 61 3e 96 b9 65 fa 72 73 66 81 | d0 51 f7 ed 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e4 28 12 e2 be f3 1a 42 9e c5 b7 6c | 8d fd 8b 3e 75 2f e5 8c 00 00 00 1c 00 00 40 05 | 19 e4 47 16 1b 11 27 dd e0 d9 21 b8 1a e6 c5 9c | 84 34 90 f4 | libevent_free: release ptr-libevent@0x7fb37806fdb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a81500 | #736 spent 0.0998 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #736 connection "road-eastnet-nonat-232" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a84000 | handling event EVENT_RETRANSMIT for parent state #579 | start processing: state #579 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #579 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-129" #579 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-129" #579 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.223239; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.93897 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a81500 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #579 | libevent_malloc: new ptr-libevent@0x7fb37806fdb0 size 128 "road-eastnet-nonat-129" #579: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.129:500 to 192.1.2.23:500 (using #579) | f7 57 b5 67 5d 53 5d ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 5b ad a3 d5 b5 e0 5b 3c 63 fe 82 fc 8e 12 08 | 91 d6 c4 0a 02 eb fa cc 09 df 5f 23 de d8 2b f5 | c7 d1 d6 20 b2 e9 e0 44 e8 af 84 2c 0d cf cc f2 | 5d 14 d3 a9 26 db 6c d3 5a c5 b6 bb 02 ab 78 5c | 8d fd ab e4 18 ac f3 6d 67 ce 9e f1 c9 4e 48 19 | 38 ce 5b ee 1f 7e 6a 23 0e c3 35 0a 2d 7b 93 c8 | c9 5a 5f 29 c4 9f 5e f1 cc e4 b6 26 ba fc 75 a8 | 4e df 30 e0 38 f1 9b 93 15 71 8b 36 cc c8 fb 5e | 9c 97 42 2c 87 36 f5 a0 be a8 f9 30 86 f3 27 9c | cf e8 6d 6a ec 63 43 19 60 0c 5c 2f 8e b2 0b 0c | 5c 25 5d 2a 49 65 27 59 d0 dc 6b b1 3c 0a 06 2c | 14 95 03 33 11 da 59 39 c6 df 4f d9 ac c9 48 dc | 85 72 4e eb a2 61 cd b4 14 8d 9d 88 fc a5 3d ca | dc 4d 1b 8d 2d 5e 50 0b 56 ca d8 dc d3 17 7b 53 | 57 13 42 fe 43 06 61 23 81 b7 76 43 10 62 61 76 | f6 bc ce 46 30 e9 08 b7 2e e4 25 72 ca 14 7c 12 | 29 00 00 24 94 e8 55 b4 44 b7 00 bf d8 b6 2e cf | 2e 8c 08 03 dd d5 10 1f dd d7 4a c8 73 e1 d7 76 | 9d 2b 29 82 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4c 52 54 26 54 47 d1 ec 3a 0f bf 18 | 2b 81 e9 d8 d6 20 de c2 00 00 00 1c 00 00 40 05 | e1 d4 5a 12 5b c3 62 c5 dc bb 54 dd 1e 69 c8 f5 | c2 4b d5 7c | libevent_free: release ptr-libevent@0x7fb3500594c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a84000 | #579 spent 0.102 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #579 connection "road-eastnet-nonat-129" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a468d0 | handling event EVENT_RETRANSMIT for parent state #625 | start processing: state #625 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #625 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-28" #625 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-28" #625 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.223362; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.968696 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a84000 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #625 | libevent_malloc: new ptr-libevent@0x7fb3500594c0 size 128 "road-eastnet-nonat-28" #625: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.28:500 to 192.1.2.23:500 (using #625) | b6 c6 04 15 67 ea 52 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fd 2a 66 6b 96 87 d8 b6 87 d1 63 4d 22 c0 e8 43 | f1 17 96 ee d2 96 c1 ac af 74 7e 2f c1 03 56 b4 | 91 a7 54 2a 18 43 db 7b c1 dc c3 ab 5f 59 ce 4b | d9 25 40 3c d0 04 72 2a 68 07 37 d1 10 7c 01 e8 | 94 74 57 b7 97 ff 23 78 64 c3 af 87 e5 b7 c6 04 | 38 fa 82 8f 53 ae 4c 38 c7 32 43 6f fa 1b 8b c3 | 00 04 a1 66 ec f1 75 6b d0 65 36 16 d8 20 06 98 | 39 ae 59 43 75 ed d6 5d 3e 27 7d 1f d8 e4 74 3d | 30 32 2a 4c ff 09 92 fe 9f c3 2d aa 84 3b 5f 60 | 20 10 05 43 02 a4 89 ab c2 89 35 0a ee 99 22 a8 | 2c 69 87 17 77 7d f2 12 d8 92 a1 f6 c7 e1 0d d9 | 4d 19 7c c7 c9 40 d2 ce 5a d2 7a 84 a2 e5 a3 72 | 54 d4 31 df 9f 0f c4 a2 d8 0b 60 39 7a b2 4a 8d | 7f a3 22 4d 19 80 0d b1 4f 50 7b 7e 53 1e c7 29 | a7 4e d9 78 77 ad 99 a2 33 30 11 e2 f0 b0 26 5e | 18 8a 8a 03 05 6f 9e 8c db 1a aa 02 79 b7 97 43 | 29 00 00 24 f1 ab 41 0c 34 c5 d2 8d d1 08 09 15 | 25 e7 cb cc 49 7c d8 7c 03 ef 2a 6b eb 41 21 c9 | e5 2d 36 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 29 7d 5f cd 54 76 9a dd 2a e8 13 0f | d7 0a 04 ba 09 3a b6 b4 00 00 00 1c 00 00 40 05 | 72 40 34 7d e5 09 76 67 7d 7e 83 33 4f f6 4f 75 | 66 18 a7 1f | libevent_free: release ptr-libevent@0x7fb35c0b6a00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a468d0 | #625 spent 0.0991 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #625 connection "road-eastnet-nonat-28" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c00cc10 | handling event EVENT_RETRANSMIT for parent state #651 | start processing: state #651 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #651 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-120" #651 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-120" #651 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.223482; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.974688 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a468d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #651 | libevent_malloc: new ptr-libevent@0x7fb35c0b6a00 size 128 "road-eastnet-nonat-120" #651: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.120:500 to 192.1.2.23:500 (using #651) | 1a 50 87 84 a9 ff b6 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f b0 d0 63 93 36 3e 05 3f d8 d6 98 23 8b d3 09 | a6 00 78 13 01 81 1e 9a 9b 73 6c 03 e7 97 c7 1b | 0a 84 93 85 00 d2 0f 42 a2 06 09 3e ca 76 f7 20 | f7 d8 2e 7e 15 56 e2 ea a5 ef 8c bf ce 15 8f 1a | 88 09 23 43 98 ef d2 44 53 11 dd 26 74 25 6f 29 | ac 6e a0 99 63 72 d1 be b3 57 f6 ad 0a da 95 1d | 18 60 71 f8 41 7d 97 d6 6b 27 e3 ec fd 11 12 f8 | 81 67 3a 79 45 6a 47 cd 2e 49 43 bd e0 c1 62 f2 | 98 2c 58 06 87 2c 1f f7 a9 0d 52 20 8c e4 05 0f | 2e 1c b9 0f 26 b2 5f 0c 36 af 55 16 37 0a 50 fd | ed c4 bf 0b 03 c3 8c 74 4e 72 bf bb 10 a3 5f 5d | 2a ab df c6 32 de 1f 74 dd dc 29 6a 62 0f ba d6 | cd 7f 75 5b 18 56 b2 b2 8b 55 87 e0 a2 48 c7 1b | e5 1a 41 ad 6f a6 03 13 4f fb 3b 29 02 ab c7 ab | 64 51 03 a8 1c 6b a4 37 1a 86 e8 46 e4 11 b6 ca | 91 48 08 9a a4 54 04 35 e3 57 3e 39 2c d0 ca 88 | 29 00 00 24 e4 4b ce 89 22 9c e4 d1 3c 9c 26 a1 | ce 1d 7f ff e4 4b fb 0d e8 f0 df 0e 05 12 8e e2 | 48 e7 f9 11 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a4 9d 26 4f 15 14 5e 39 05 f8 cb 75 | fe 3e e5 7e f0 bd 45 a1 00 00 00 1c 00 00 40 05 | ce 3e 0f f6 37 6f 31 d0 cc 66 b0 14 78 6d 46 0e | eb 95 c2 dc | libevent_free: release ptr-libevent@0x7fb37c07bc30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00cc10 | #651 spent 0.0945 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #651 connection "road-eastnet-nonat-120" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb340025210 | handling event EVENT_RETRANSMIT for parent state #756 | start processing: state #756 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #756 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-249" #756 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-249" #756 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.223597; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005773 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #756 | libevent_malloc: new ptr-libevent@0x7fb37c07bc30 size 128 "road-eastnet-nonat-249" #756: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.249:500 to 192.1.2.23:500 (using #756) | ab b5 91 0b be 67 d7 85 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 d0 0b f2 10 30 f6 71 1f 52 95 5b e8 84 71 d8 | b6 b3 10 4f b8 55 03 27 62 11 e2 42 15 c0 2e 29 | af 7e 73 a6 41 c3 b1 35 90 96 0e 47 d0 76 07 a9 | 2b cb 96 02 37 a3 ad 49 a7 3f 01 e5 75 c6 65 12 | 57 6e 8d 37 95 0a 16 59 b9 51 41 ba 40 c3 b9 65 | 2a 6f f8 33 e2 59 37 70 46 6d 6b 62 cb b6 f2 1e | c1 f4 5c 3f f2 8a 2e 11 d3 d5 38 3b 01 cd ba 1e | 36 d0 b1 59 ee 21 ba 67 dc 67 7f ac 18 5d ee 64 | df 96 2d b0 3b 2f 42 82 e4 47 da e6 c6 85 9c 6a | 6e b9 1c 9f de fc 80 2c 8f a9 d1 a8 95 91 00 d2 | 9c 44 d3 94 50 87 14 71 86 2d f2 72 6d b8 e3 23 | e7 7f e6 3d 7f 22 68 1c b4 f2 79 c8 40 1e 0d ff | 0d f9 a8 b4 e4 e9 a4 8d 37 24 73 7b 55 05 6d 7d | b4 29 f9 e5 9a b6 d0 4f 47 2d e7 59 1c d4 96 2d | 12 ee 9c 8f dd f2 7b ff 88 08 ab 64 b4 ba 21 15 | 53 99 9f e0 75 15 e2 71 70 09 49 52 bf ef 18 8c | 29 00 00 24 f2 16 4e f4 49 9c 51 e5 b1 12 94 4d | 27 c5 37 4d 3a 23 1c 11 e4 13 5f 53 31 01 4a 86 | 80 54 c9 a0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 ca 45 b8 db a1 b9 58 c3 06 7b b3 | ca d9 2a 0e 01 f5 5c 0a 00 00 00 1c 00 00 40 05 | b1 fa be f6 27 73 b2 ce c8 1e 50 4f c1 a6 7d 93 | f4 9a a8 7c | libevent_free: release ptr-libevent@0x7fb378075590 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340025210 | #756 spent 0.0981 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #756 connection "road-eastnet-nonat-249" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46afe580 | handling event EVENT_RETRANSMIT for parent state #753 | start processing: state #753 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #753 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-239" #753 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-239" #753 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.223716; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006807 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340025210 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #753 | libevent_malloc: new ptr-libevent@0x7fb378075590 size 128 "road-eastnet-nonat-239" #753: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.239:500 to 192.1.2.23:500 (using #753) | 43 c3 80 a5 94 99 7d 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 27 47 4f 05 d7 25 44 75 00 7a 90 57 67 26 e6 | 4d 97 9a 3a 60 21 e1 3d 90 71 67 27 3f 0b 49 6f | 1f b9 14 a1 8d 44 a6 76 24 f5 5a 9b 38 e3 12 49 | 11 3f dc 63 03 09 74 e9 a3 fd bb ce e7 70 f7 c2 | 6f 48 fd aa a3 1f e4 78 8b 40 4d df 11 7a 5a 41 | 45 11 21 74 d6 a5 c3 8b e5 8d 1b 68 d2 3a 6c e4 | 4f c3 5b 65 f5 0b 4f 3e 67 74 c2 72 3e 15 1b 5a | 2f b9 67 d7 f7 97 99 68 80 00 34 be 80 97 46 a2 | f2 cd e6 d7 21 ff f7 0a 95 ea 80 3d 17 5e e5 f1 | 89 b6 3a 1b 19 7c 6d e2 e2 ac e0 e8 87 47 58 ca | a8 a9 57 8a 48 7a 5e 0e 07 ed 18 d0 02 cd 41 6c | 99 f9 79 7c 54 75 6a 80 aa be 2c 8d 68 e7 ab 46 | 5f fa db 7a 00 15 1c 42 38 2a 95 67 34 d0 40 37 | 9e 59 6e ca ce 71 f9 73 95 33 d2 33 24 16 10 d6 | 96 f4 6d 66 ce ae 39 a5 a8 ba 67 7b 0b a7 ec 5c | a5 f0 ea d0 7f ca a2 d9 1f b6 4d c8 4d 24 52 7e | 29 00 00 24 34 e1 23 83 89 3a 65 73 17 62 dd 52 | 41 3d 56 39 99 39 6a 46 38 cd 4e b8 6d 94 84 4d | ae 2e 5a 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 f8 fd 21 17 cf ca 15 a9 8c 89 3d | e7 2c 90 ae 74 d6 49 28 00 00 00 1c 00 00 40 05 | a9 e3 cd d3 57 ef 23 72 b9 af 19 fe 36 9b 4d 39 | 12 5f e6 9a | libevent_free: release ptr-libevent@0x7fb35c09b2a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46afe580 | #753 spent 0.0959 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #753 connection "road-eastnet-nonat-239" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a61c10 | handling event EVENT_RETRANSMIT for parent state #715 | start processing: state #715 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #715 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-169" #715 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-169" #715 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.223828; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.99532 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46afe580 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #715 | libevent_malloc: new ptr-libevent@0x7fb35c09b2a0 size 128 "road-eastnet-nonat-169" #715: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.169:500 to 192.1.2.23:500 (using #715) | 87 f3 33 9b b4 5a 7a db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2f 32 d6 a1 b7 3c ef ab ae df c7 c4 47 cf 43 3e | e7 4d 13 2a bf 71 3b 06 70 19 5f 23 cb d2 4a 6c | b7 ad 55 a5 75 a2 bd 13 81 a8 86 77 91 cf 66 64 | 4b df 3a 00 d3 10 2e 7c 50 72 e2 b5 34 23 44 5d | 49 06 3f 61 27 b3 f6 2b 3a 24 b3 2d ad 3e 0b e7 | 98 08 a5 5f e5 eb 5d 79 a1 e5 54 0a c8 0d 72 b0 | bc 43 9d f8 27 f1 a9 ec d6 81 08 b0 58 fa 85 a5 | bd a3 f0 7d 30 fb 04 80 03 dd b7 91 fd d7 85 9b | 8b b8 04 da 0e 45 bc fd bb 40 af 79 c8 eb 61 4d | d1 36 0c 58 d4 5c c1 03 78 d1 4f 99 53 dc 30 3c | 7e 07 1a 87 fb cc 9f e3 42 35 3a 01 7a d8 f6 e1 | 85 49 36 04 18 9c b3 4b 00 44 96 48 ba 1b 91 57 | 4a 52 63 3f 06 c0 7e c7 73 42 05 cf 14 6a 96 99 | ce df 55 13 54 6e 39 b9 b7 60 f2 29 34 ed a0 4f | 37 df c2 18 42 23 f9 6f aa 0b b3 f0 83 72 6b 54 | 39 41 64 39 e0 e8 00 e8 59 63 aa 4c 7c 6e 89 ff | 29 00 00 24 b2 3a 76 ed ee 4c 41 d8 3e b5 c5 39 | 65 e9 8a 6a a3 e0 b7 ad 46 df 99 83 e4 f0 93 01 | c4 aa 3b 42 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 fe a8 f4 ae 1f 37 b2 cf ca d2 43 | 9d 58 d0 f7 e5 db f0 88 00 00 00 1c 00 00 40 05 | 33 c7 89 bf 1b 04 9e 14 b7 74 ff c8 90 62 35 22 | 26 50 c2 55 | libevent_free: release ptr-libevent@0x7fb37c0596c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61c10 | #715 spent 0.0877 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #715 connection "road-eastnet-nonat-169" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a60690 | handling event EVENT_RETRANSMIT for parent state #549 | start processing: state #549 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #549 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-125" #549 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-125" #549 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.223934; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.922851 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61c10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #549 | libevent_malloc: new ptr-libevent@0x7fb37c0596c0 size 128 "road-eastnet-nonat-125" #549: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.125:500 to 192.1.2.23:500 (using #549) | a0 bc bf eb 69 ec 7d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b6 c9 7a 4d 74 30 97 ab 2b b8 9b 8e 28 56 30 35 | c9 29 b4 03 c9 c0 54 36 0e 1e 85 00 be e1 eb b6 | 10 56 f7 3e 25 85 4e 54 15 d9 dd 76 f8 a2 ef 75 | 06 49 0e 79 92 19 04 73 c4 32 36 8f 38 c3 a0 37 | 73 31 32 c7 13 ba 49 63 a9 ff 14 ce 76 c3 ca 6b | 44 ac 36 b3 fe 8e 49 b3 f2 07 ba 8e 9d 83 a8 90 | 1c bc ba b1 a8 32 ac a1 72 6e a4 55 c6 06 26 4d | 59 1f 8c 21 e8 f2 1d 39 aa 21 29 2d 13 d2 62 e1 | cd a6 44 f2 be e8 53 3c 05 77 b8 a3 16 49 f8 12 | a0 eb 6d c0 e5 00 d6 6c dd 16 9c ab b2 0e 15 2a | 11 01 e2 8c ef 25 2e ff f8 e7 c3 fa 43 cc 6c 72 | c5 e2 33 98 3b f3 05 50 a7 ad 9d 8e 86 bf 56 f5 | 69 e1 73 1e c0 3d 04 45 0d d2 2e 9d 3e db 05 1c | 6a c1 c4 8e 83 ca c0 f4 84 01 6b be a7 89 db dc | 85 98 0f b5 ba 9a cf 4d 5b 70 a7 a4 7a fa 95 48 | b4 59 36 8a 67 a3 46 cb 51 b4 47 97 d0 b4 c8 75 | 29 00 00 24 e6 91 2a 43 d1 aa b6 49 a9 57 9a 19 | fc 51 19 e5 28 8d 93 b9 12 81 37 cd 42 5d c8 08 | 2e b2 6c 7a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 00 e5 9d 22 28 c7 c4 27 97 02 c2 92 | 36 7a d0 48 44 31 1b ea 00 00 00 1c 00 00 40 05 | ac 08 fb c5 91 b8 80 23 e8 68 88 22 35 dd f9 61 | 84 cd 9d 18 | libevent_free: release ptr-libevent@0x7fb35c061940 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a60690 | #549 spent 0.103 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #549 connection "road-eastnet-nonat-125" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354012bf0 | handling event EVENT_RETRANSMIT for parent state #618 | start processing: state #618 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #618 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-139" #618 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-139" #618 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.224065; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.966831 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a60690 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #618 | libevent_malloc: new ptr-libevent@0x7fb35c061940 size 128 "road-eastnet-nonat-139" #618: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.139:500 to 192.1.2.23:500 (using #618) | 4c ec 39 dc 68 b5 59 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb 05 80 a5 c5 c3 f9 3c 54 41 f2 ff 45 6c 8e d4 | 8c 5e 68 7a a4 b6 14 c3 90 a7 72 c5 37 6e 6f 34 | 08 2b b2 1a 80 e0 96 44 12 49 4b 90 a0 23 38 84 | 7d 94 15 fa 5a f3 e0 cc 84 03 8f 8b 27 13 09 3a | 10 76 9b f5 54 eb 6e 14 d3 82 81 b0 db 0b 18 1a | 23 52 e5 6a 71 2c 20 30 0b 2d 6d ca 81 1f 7a 55 | e4 4b 85 3d 68 9a 6b d2 c5 64 b0 66 a7 3b 3d 0e | 93 9d 5d fa 9a a0 0a bf 68 5b fd ad 7d 7e af d8 | 9c 26 a4 24 3a 01 11 20 e2 46 b9 f1 ea 83 9f 1e | 92 ae 34 06 9d 01 75 70 1d c6 a8 17 f0 17 d4 e8 | 3f a5 fd b3 84 83 5a f3 64 23 e0 0e 62 67 3d 47 | bb 61 39 45 8d 5a 36 d7 90 42 a2 1e 97 de 94 c3 | fa ba ed 1b ac 33 c2 ed 5f a7 b7 09 79 e9 ef fd | d7 73 e1 c8 3d e6 bf ba cf ff dd 60 43 ef 89 b6 | 56 0d 72 f9 c8 aa 8e 1a 35 4f 05 5c 43 b5 97 90 | 99 49 cf 4e 52 3c a6 31 26 76 2b 78 5b c5 df ff | 29 00 00 24 f5 f5 e3 7d da 51 1c 42 32 a8 10 86 | f8 ee 92 c6 41 8c 4c bf 39 0a f7 2f 54 e9 a0 ad | 67 1a 3b 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 f8 d9 8a 1f 35 3a 8c 98 12 8b 5d | 4d ad 41 c9 74 54 12 de 00 00 00 1c 00 00 40 05 | 37 33 26 b1 70 e0 75 6d 56 a5 af 29 8a b8 60 f1 | 31 e0 30 c5 | libevent_free: release ptr-libevent@0x7fb35c06f3a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354012bf0 | #618 spent 0.104 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #618 connection "road-eastnet-nonat-139" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370018460 | handling event EVENT_RETRANSMIT for parent state #754 | start processing: state #754 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #754 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-250" #754 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-250" #754 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.224185; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006655 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354012bf0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #754 | libevent_malloc: new ptr-libevent@0x7fb35c06f3a0 size 128 "road-eastnet-nonat-250" #754: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.250:500 to 192.1.2.23:500 (using #754) | ba fc 0a 40 dd 57 2f 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 dc 3f 52 f7 90 e6 aa 55 28 27 9f 26 90 49 c5 | 4e 63 af 84 9c 24 2a 54 88 16 03 62 61 85 f0 75 | 96 ac b9 67 9b 1f a3 76 a2 7d d7 2a c2 0d b0 20 | 4c 76 ab 99 46 09 ae ba c5 a3 18 d9 2f 6b 75 6f | 8c 85 4a 61 60 92 93 9a 69 73 74 b4 71 5f 61 5f | 49 20 71 ee 13 df 74 12 52 f5 f7 6e e5 b6 47 13 | 81 a6 fd 04 c1 cb 97 6e a6 05 89 f7 1c c8 36 4f | 3b 16 b8 6b 1f f4 41 b6 2e 95 ff 58 91 d8 05 7b | 75 dd bd f6 54 1d 51 67 0b f9 12 22 e3 6a 7e fe | 83 e1 9b fb a2 25 c3 ac 81 7f d9 4f 94 b0 53 63 | 18 d5 76 25 b0 fb c2 e8 de d9 06 a6 92 1b 1a 4d | b2 14 44 77 4e 1a c6 51 54 6d 23 8f 6a 2b 6f aa | d9 e4 ba 5e 32 24 b4 f3 63 3f 1b 0f 79 02 db e4 | d2 10 63 1b 77 54 88 79 1a c9 10 a1 5b a8 e0 e0 | 2d a9 8a 89 9d 56 82 83 99 43 e6 10 16 f8 bb be | 4b 7e 7f d3 79 9f 54 df a5 06 38 28 00 85 76 c9 | 29 00 00 24 8f 59 38 2a dd e3 49 a5 d1 b0 e1 2b | d5 a2 3b 56 cd 53 01 3b e1 33 30 4f 0c 29 77 15 | 19 47 ad 54 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 85 ee 2b ce cb d2 9a af d5 06 f1 | d4 8a 29 3f c9 5e e4 58 00 00 00 1c 00 00 40 05 | 7f 6d 1a 4d 19 0a 8b 4a ad 47 7e e6 0e aa 08 53 | cf fd 3e 04 | libevent_free: release ptr-libevent@0x7fb3640908e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370018460 | #754 spent 0.0943 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #754 connection "road-eastnet-nonat-250" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3800383c0 | handling event EVENT_RETRANSMIT for parent state #707 | start processing: state #707 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #707 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-212" #707 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-212" #707 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.224298; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.984148 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #707 | libevent_malloc: new ptr-libevent@0x7fb3640908e0 size 128 "road-eastnet-nonat-212" #707: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.212:500 to 192.1.2.23:500 (using #707) | 6d 4e 2c b0 bf cf 55 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 9f d6 3e 98 b0 5f 73 4d ba b3 1d 62 98 ca 06 | dd 1e 98 88 ad 43 74 1b 2c 00 fd ed fc 05 58 84 | 27 da ca 10 63 1d 7f eb 9d 54 23 18 54 21 fb 77 | d0 11 3f 30 03 c7 bb 7b 6c 82 87 1e b2 c4 46 f5 | b9 75 85 86 87 c3 a0 25 db 07 f0 41 16 6b 87 67 | e8 54 09 98 f1 0a 76 80 fc ed 49 b8 84 22 18 a5 | 42 4a 4c 04 5d 3d 8e 7d 10 b9 03 9f 1f 7c 16 e2 | b0 5f 6c 5f c5 04 98 72 d0 8b 9d 1d 44 50 bd e3 | 32 b2 07 88 7a 5e 63 db 86 1b e1 1b 74 17 01 a7 | 1e e1 3a 02 f1 70 78 85 40 5a 51 fc d7 95 05 3c | cf 55 a3 5b 30 25 71 8a 68 40 5b 0b 8d cd e7 b1 | ed ec b5 28 b7 94 2b d4 3d d1 a5 be b7 54 c0 ea | b0 e9 b3 54 58 b9 5e 83 2e 20 37 1b a4 e8 3d 27 | 35 25 cf 41 31 d1 6b 1e 93 0a ad 4b b0 9d 1d 04 | 42 0a 80 11 8e 38 78 07 10 31 d4 fa 2a 6f d9 7e | c7 dc b2 d9 f7 11 7b c9 5d 8e 23 53 ed 2c 2f 94 | 29 00 00 24 a4 fd 7e 3c 32 99 82 33 41 85 15 88 | 3f 09 19 10 37 6d c6 9b 12 9c 73 58 6c cf 6f e0 | ec d4 d1 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 88 3f af 7f 85 3e a4 01 39 e4 62 | 4d 36 bd d2 6a b8 ee 4c 00 00 00 1c 00 00 40 05 | 31 2c 50 3f 9f 2d 76 af 33 2c c6 2e 60 90 ae 40 | 55 c4 27 3d | libevent_free: release ptr-libevent@0x7fb35c095ac0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800383c0 | #707 spent 0.0929 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #707 connection "road-eastnet-nonat-212" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a94500 | handling event EVENT_RETRANSMIT for parent state #581 | start processing: state #581 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #581 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-121" #581 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-121" #581 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.224414; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.93689 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800383c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #581 | libevent_malloc: new ptr-libevent@0x7fb35c095ac0 size 128 "road-eastnet-nonat-121" #581: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.121:500 to 192.1.2.23:500 (using #581) | 32 81 f4 dc 89 2b 8b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 75 5d a0 37 46 04 87 9a b6 6f c7 58 5f 83 03 92 | 02 7c 2a 9d f7 53 2a e5 0b 99 84 74 ec e8 cd 8a | 37 bf 28 7a 29 fe a1 eb 1c 5b 7a cb 37 de ef 1a | bf c2 4e 23 55 33 da a9 f6 17 3d 8b f1 6d 00 2f | 62 ea 42 d9 b5 b8 8f 47 c3 23 ad 53 eb 4c 74 2c | e9 34 fd a5 c8 bb c5 80 14 80 c7 0b 8c 50 e2 47 | de 21 2d f2 8b b1 5c b6 9a 5d 04 45 b3 11 7d ef | e1 83 dd 1e ba b6 e0 ad d4 d2 d2 08 bd 90 e1 fa | 94 b8 05 91 5f a8 5e a5 f9 fa e3 25 cd 10 cd 73 | 6c 38 de b0 68 38 4f 9e 42 60 5f 63 68 b8 84 1d | 1e 04 f9 aa 37 d8 83 d0 d4 62 ad f8 03 24 51 28 | 44 a0 bd 38 97 06 60 9d 53 0d 2c c3 79 30 58 3d | 74 fe 30 eb c7 d9 28 61 30 6d 56 9a 52 da 0d 3c | ba a5 64 a7 7b ba f6 9f 41 d6 92 6f c0 bb 6e 63 | 61 ab be e9 7e 12 35 ed 54 b5 c8 d2 0e 78 a4 08 | 61 fb 98 ae 3e a3 b4 05 6b 0c e2 c6 c7 c1 c9 60 | 29 00 00 24 d1 95 dc 3f 02 70 5b 6c 62 02 ec 87 | 81 84 54 7b ca 76 e8 0d a8 e7 c8 f2 57 8a a9 b7 | 73 9c 0c 4b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 ca 9f f5 7d 53 45 e4 91 b2 47 fd | fe fb 46 b0 89 4e d8 b4 00 00 00 1c 00 00 40 05 | a0 2f bb 08 8b 1a a2 cf 99 1d b1 55 9c d9 bf a8 | b6 d2 07 0a | libevent_free: release ptr-libevent@0x7fb37c090640 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a94500 | #581 spent 0.091 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #581 connection "road-eastnet-nonat-121" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35002a9a0 | handling event EVENT_RETRANSMIT for parent state #557 | start processing: state #557 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #557 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-37" #557 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-37" #557 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.224523; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.925752 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a94500 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #557 | libevent_malloc: new ptr-libevent@0x7fb37c090640 size 128 "road-eastnet-nonat-37" #557: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.37:500 to 192.1.2.23:500 (using #557) | 2d 38 86 43 43 f3 e1 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 b5 d1 8d 5e 9a 16 4c 4d d9 8d af 2f 02 f9 49 | 64 5f 56 86 14 f0 4f 6e 1f 70 fb 5c 5c 41 82 1d | 33 6e 56 08 67 54 02 75 6c f9 e1 34 59 7c 6f b1 | bb 1f 4d ed 4a a2 b7 f7 4f c1 0c 46 20 0e 28 4a | cd 21 92 73 5f 5d 35 8c fe 58 86 0b 7f 07 97 23 | d1 0f ec 97 a5 2c 87 13 2d 94 36 17 e9 57 93 bf | c4 c1 bd 13 03 ee ba ab 1a a7 44 ce 03 75 29 fe | b6 82 6b e3 c2 1c 1a 53 06 87 f8 13 f9 a2 78 a2 | 51 a0 ba f9 b0 6c 0b 05 eb fe c7 b6 32 0e 48 84 | 7d 7a c1 bd 77 ee ba 29 ff de 64 d5 ef 12 c1 40 | d0 a1 05 e1 31 4a 93 c2 70 e2 49 cf 02 83 53 ca | 2e cb f9 e3 78 24 ca 8e c8 8c f2 22 dc 20 cb 27 | 4a df 51 8a 3b da 00 bb b0 0b a6 42 b8 69 cf 0e | a8 cf d0 73 3e bb 78 2d bc 6c 41 8d a7 b8 30 76 | 9c 94 b8 c4 16 94 63 de 81 f2 b2 a7 e1 0e 52 f4 | ea 2d 43 a0 57 4b af 2d d0 29 08 d0 cb 35 56 38 | 29 00 00 24 a6 c9 1c ff c9 58 73 10 78 ba f6 c6 | 7f c6 b2 cd 72 d9 cc be ea 32 4d 34 a4 2f 7e bf | 63 21 24 e1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 8f df 68 5a a5 1c ad e8 83 e1 98 | 63 b5 56 36 55 d8 0c 2e 00 00 00 1c 00 00 40 05 | d5 54 40 ea d7 2a 41 c5 f7 56 0a 7d 70 86 31 1b | a6 62 9a d1 | libevent_free: release ptr-libevent@0x7fb36408b100 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35002a9a0 | #557 spent 0.0882 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #557 connection "road-eastnet-nonat-37" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a52c90 | handling event EVENT_RETRANSMIT for parent state #571 | start processing: state #571 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #571 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-46" #571 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-46" #571 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.224619; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.94516 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35002a9a0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #571 | libevent_malloc: new ptr-libevent@0x7fb36408b100 size 128 "road-eastnet-nonat-46" #571: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.46:500 to 192.1.2.23:500 (using #571) | a7 5c 91 a2 a0 c7 d5 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d2 2d 65 41 a6 d9 4a 2d 30 96 90 44 a8 28 31 37 | 20 85 a7 46 f9 e1 3b d0 db 2c f5 64 1e a9 75 76 | 5e 93 ea 28 89 51 63 91 c2 89 51 aa db f7 57 7e | 26 a7 18 d8 ed ef ae 29 0c 20 23 07 c6 99 8c 3f | 4b ac 3d e3 11 e2 e0 88 37 38 4e 28 f5 79 1b f4 | c1 45 26 7e 04 84 1e 25 df 1a 20 8e 42 60 ac e6 | bb 99 02 1a bf e1 fc 57 bd 08 cc 3f c8 a4 bd 39 | 80 32 fa bd 24 5a cf 7c fb ec 2c 26 c2 d6 b7 93 | db c7 66 31 ac a7 48 33 9b 97 36 24 dc c4 b1 1f | f1 8c bc dc 99 b0 9d 65 3a 26 8d b6 ff f4 30 2e | df 5e e6 48 46 c0 2e 8b 04 ae 3d 4f 49 6c 4d a5 | a8 2c 10 62 3e 2f 34 53 59 ac 0a 46 80 c4 83 67 | 5d 0e af 36 3f c6 bd ce a8 a6 96 6c e7 14 1c 6e | ec 46 c8 0c f2 81 fd 9b 02 c0 10 fc f9 7a ad 27 | 1e 8c 95 1a 96 66 8d d8 17 9e ab 39 d5 e7 6f 1e | 0f 90 04 2f 14 da bc 41 89 5a 60 41 1e 6b d8 88 | 29 00 00 24 f0 df 30 54 bd 5d 12 41 64 95 81 da | e2 16 b7 a5 91 f7 f0 c0 97 0a b3 7c fb 37 99 ec | 0e 53 6f 50 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bf 5d 3c ab cd 1f 05 d6 29 65 59 e2 | b6 05 c5 68 b0 d2 e9 9f 00 00 00 1c 00 00 40 05 | fe 1d 71 04 59 69 a8 7d 1a 5e 10 ed bb 6e 46 db | ec 57 9a 8e | libevent_free: release ptr-libevent@0x7fb388096570 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a52c90 | #571 spent 0.0667 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #571 connection "road-eastnet-nonat-46" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3780297c0 | handling event EVENT_RETRANSMIT for parent state #752 | start processing: state #752 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #752 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-231" #752 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-231" #752 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.224705; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.008112 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a52c90 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #752 | libevent_malloc: new ptr-libevent@0x7fb388096570 size 128 "road-eastnet-nonat-231" #752: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.231:500 to 192.1.2.23:500 (using #752) | c5 64 20 5b 1c 85 54 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 d0 f3 e7 4a 6a f0 e8 90 5f 06 4d e1 8c 9f 3b | 1d f4 e3 4b 20 0b 8b 74 a8 b1 fe 8c 8a 59 de d1 | 16 28 a6 b3 0f 84 5b 56 83 ac 7e 32 a6 53 36 2a | 6a 2f 6a 43 eb c9 c2 27 18 66 c2 b6 33 15 55 47 | 34 6d a6 80 80 a8 a9 eb 3d 17 c1 00 cf 82 66 7f | 20 cf f6 6a e4 24 60 36 b4 97 22 51 aa 8a e1 03 | 48 19 0c a8 78 59 e1 07 72 7c 6b dd c6 e2 ba a3 | d9 65 69 17 a7 c0 a3 0a 55 b6 e5 ec fe e5 d7 0c | e2 b0 63 ac 57 e2 d2 cf 8d 95 42 f0 b9 eb 11 95 | 06 f4 89 63 1b 69 36 d8 f0 18 5a f6 11 36 49 d2 | 9c 2e b0 3b ce a1 a2 86 6c 95 83 75 36 ba e8 57 | 19 ab ae 24 a8 a8 8b f0 5a 1f 87 f9 4f 41 e2 02 | 07 52 df ae 68 e9 dc e7 08 15 ec 9a 14 88 f5 0d | e5 d1 7e 0b 47 52 22 7c 78 44 6c 0c 9c d0 6e ef | 1c ad c0 bc b6 c3 32 c1 e7 fe 27 7b 2a f8 63 2c | ed 16 23 69 56 c8 a9 55 34 58 cf 3c 9f 37 38 a1 | 29 00 00 24 4a 83 23 c8 a4 30 70 f0 5a 7c 61 66 | 38 1d 39 8c 6e 37 91 1c 03 43 e8 78 33 d5 cf ca | 19 09 4b 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3f f8 c0 07 c2 89 1e 18 8b 01 61 d5 | b6 df d9 a8 3f 00 fb ad 00 00 00 1c 00 00 40 05 | 9f 2a cf 58 d8 ce 32 ac 63 1b 6f d8 96 97 22 22 | a5 d1 09 13 | libevent_free: release ptr-libevent@0x7fb384086f10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3780297c0 | #752 spent 0.0885 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #752 connection "road-eastnet-nonat-231" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374023ce0 | handling event EVENT_RETRANSMIT for parent state #631 | start processing: state #631 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #631 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-48" #631 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-48" #631 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.22482; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.96386 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3780297c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #631 | libevent_malloc: new ptr-libevent@0x7fb384086f10 size 128 "road-eastnet-nonat-48" #631: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.48:500 to 192.1.2.23:500 (using #631) | 70 a3 fd 1e a8 25 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4f 0c 38 64 bd 90 75 9f 6f 92 36 c8 32 fc 5a 91 | 19 c5 27 39 9e 3d 6e fa a9 b4 93 c0 e2 21 ae e7 | 29 2b f2 cd be 11 79 2f 14 67 98 68 af ef 6c b7 | 7c 49 d4 d5 6b f2 96 c5 5f cd 62 c1 3d f6 b9 c8 | 3c 3f 90 e5 94 7d 5f d7 40 b5 3b 30 63 b3 2c 20 | e0 19 03 33 6b 20 1a 52 34 8d 2f 82 b2 f4 54 94 | ca 7d 83 fa fa 89 e0 76 73 44 23 d0 5a 21 bf 92 | 84 e4 00 41 6d 4f b4 c3 ae 75 39 7d af 77 49 89 | e4 4d 0f 35 ee 4d e2 83 d4 ca 79 6d 50 9d 01 59 | 1b 0d 7b 00 73 41 5a bc 4e d1 a2 f6 87 77 57 2d | 41 51 9e 57 ae 82 8c bc 6f 74 da 77 3c ec b4 b7 | 0d 67 75 cd a7 d7 60 f9 d7 00 35 db 27 bb fd 96 | 6c aa db a4 7d 91 93 be 0c a1 40 3d 78 2c 3a 66 | 44 36 30 72 dc 94 7a 66 d9 4b 31 54 35 c3 c0 a7 | 65 c4 9e a1 75 e6 4f 67 53 11 26 7b a4 49 c0 3c | 58 30 58 88 dc be 09 5c 40 05 2c 8c 1c a4 88 cc | 29 00 00 24 9b f5 7e 07 2a a5 6a 0a 77 9d e2 3d | f9 27 04 9a c8 ef cd 45 75 cb 40 b5 d2 eb a2 f4 | c0 62 4c 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2f 3f 68 59 5a 72 2a af 6d a7 43 82 | b4 f3 5f a0 d9 b1 ec af 00 00 00 1c 00 00 40 05 | 9d 9a 0e 02 a6 46 77 bd aa 5c 25 4f ad 35 3d af | b0 60 dd da | libevent_free: release ptr-libevent@0x7fb3840581d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374023ce0 | #631 spent 0.087 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #631 connection "road-eastnet-nonat-48" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b12c00 | handling event EVENT_RETRANSMIT for parent state #706 | start processing: state #706 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #706 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-185" #706 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-185" #706 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.224913; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.99059 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374023ce0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #706 | libevent_malloc: new ptr-libevent@0x7fb3840581d0 size 128 "road-eastnet-nonat-185" #706: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.185:500 to 192.1.2.23:500 (using #706) | d6 7f 43 f8 51 c2 59 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1d ca f6 8d 57 76 e3 b2 b8 21 63 3a d9 6b 17 ac | 1d a3 0a a8 65 8a 73 ce 66 97 d8 a3 fe eb da 4b | 83 ee ee bc fe 2b d0 aa dd e6 65 08 18 59 e4 95 | 09 18 a4 39 b6 a7 f4 f9 2f da ab 36 4c 80 49 63 | ef 16 9b fe ec 5c ed 9e ae 36 1a ed 1b d4 af 83 | 89 ee bf 02 2f 2a 53 9b 57 89 ac f8 bf 5e 38 99 | e4 40 07 3c ed 06 cb ab b3 a6 c6 c0 55 73 07 12 | b5 0c 74 dc 1f d0 ce 7b dd e0 58 fe 36 aa 47 3e | 4c f7 16 70 36 92 d1 18 ca a6 68 9e a3 3e f4 fd | fd 01 7d 36 f6 5e eb 58 0f da ff 7f 73 d0 8f f8 | 40 11 40 98 2d 26 98 9d 07 8b f8 c9 08 66 7e 6a | 9a 49 1a 01 ed 32 66 90 e2 a6 41 73 76 5c f7 ec | 6c 8a d8 8d ad 2e 38 8d 00 f8 49 ba 59 c5 fb ee | 6d 7a 7c 5c 87 f2 99 5e 69 88 db e5 5b 1d 7d 33 | 71 a2 b7 37 fd 2b c4 8b c8 67 fb a6 f3 ec 68 08 | 8e 1b b3 a6 50 20 ca a4 1d 80 b1 97 13 a3 05 ba | 29 00 00 24 2d c8 fa 54 cd 1d 1f 06 d1 eb d2 15 | 6f e9 7e 83 80 52 a9 d8 d9 e9 24 fc ad 86 d9 31 | 9c b4 55 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b a9 09 9b 3f 46 0d e5 b9 f0 c5 5e | 3e 6a b5 e5 b3 2c 1a 78 00 00 00 1c 00 00 40 05 | 49 ac ac 8b 9b 7a cc f6 f1 c5 f0 57 32 77 7b 51 | e7 ba 7d 05 | libevent_free: release ptr-libevent@0x7fb36c082c30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b12c00 | #706 spent 0.0674 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #706 connection "road-eastnet-nonat-185" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348018460 | handling event EVENT_RETRANSMIT for parent state #667 | start processing: state #667 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #667 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-166" #667 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-166" #667 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.224994; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.994033 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b12c00 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #667 | libevent_malloc: new ptr-libevent@0x7fb36c082c30 size 128 "road-eastnet-nonat-166" #667: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.166:500 to 192.1.2.23:500 (using #667) | 7b d9 27 49 fc 2f 27 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 96 df f5 cd e2 64 d8 37 7b 17 93 12 89 61 a5 0e | 54 43 72 d9 e7 56 eb 78 19 d8 ce 7b ab fc c4 ce | 29 4e 82 3c 51 f6 26 9f a7 b1 c1 26 57 58 94 3e | 7b 87 b0 70 18 07 62 51 cf ed f0 18 a7 02 45 64 | 29 d3 04 3c b6 f3 aa e6 9e b7 08 a5 d0 f8 46 16 | 01 f6 5d 3b b2 ab c3 c0 7a 8b fd 23 1e c0 aa 9e | 88 07 cd f3 38 23 f9 56 92 5f 01 ff 11 16 9f 7e | 88 51 70 b8 3b 7d 47 76 0c 28 0d b3 12 dd e5 34 | 27 62 ae d8 22 f8 9e d7 02 23 08 f5 22 88 a1 54 | ce e8 4b 93 e9 2c d5 39 6a b2 ee 0e 4a 7c 28 7f | b4 be ec 6c 77 cd 49 9f c1 61 d9 cb 36 3e a7 9e | a7 7c d6 ff 97 c2 82 05 bf cb cd 80 8d 87 fc a5 | 16 bb da c3 6e 7a 00 71 0f 91 4c b0 68 cd 77 21 | 13 d2 82 d8 54 7d 82 0e 40 c0 42 f3 49 4c 09 2d | 3f 2d f3 fc 4d 1d ea ae d5 68 9c c1 d7 8c 7f 3d | 4d 87 88 e0 eb 30 69 4a 07 13 c2 69 06 f4 34 e6 | 29 00 00 24 cf 70 1d 7e 4f db c9 b0 ee c5 af 49 | a2 ae b2 09 b2 1a 80 0c 2c 53 c7 0a 40 2e 76 18 | 3f 09 61 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd b0 a3 f1 2d 95 77 d4 30 95 3f d8 | d6 55 df fc a5 31 ef cf 00 00 00 1c 00 00 40 05 | 40 4e db d5 d8 6b 01 95 ad 35 71 f3 b1 25 66 78 | f8 5d ed 97 | libevent_free: release ptr-libevent@0x7fb34804e3b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348018460 | #667 spent 0.0883 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #667 connection "road-eastnet-nonat-166" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a198d0 | handling event EVENT_RETRANSMIT for parent state #704 | start processing: state #704 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #704 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-227" #704 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-227" #704 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.225108; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.989286 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #704 | libevent_malloc: new ptr-libevent@0x7fb34804e3b0 size 128 "road-eastnet-nonat-227" #704: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.227:500 to 192.1.2.23:500 (using #704) | 23 4c b8 04 68 32 c1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 3a ac 56 14 08 70 10 a2 34 db f9 cc 75 9b 41 | d9 78 33 6d 3e 54 14 96 f1 9f 07 fd 71 d2 bb f4 | f5 9d 35 70 a8 82 5c 73 ad 62 0d 20 44 a2 21 f5 | 94 5c 04 7b 84 43 ac 51 c9 f9 77 db b1 cf 7e 08 | b7 e6 cf a7 f1 9d 4d 37 b6 28 e7 f6 a0 a6 cf 8a | 2c a0 7b 96 11 a1 37 54 ae f4 a3 93 55 4b 7e 8b | d0 8a 27 00 d5 64 36 b1 c2 d9 ba 29 d8 a2 16 05 | dd fb 59 ef 24 58 33 9e ac 2a 88 48 84 e9 53 28 | c7 9d 5d bc 44 c8 70 17 d2 d0 d0 a4 35 72 da 6e | 9b 84 8e 8c 6d 4d 5b 4f fb cc 6d ee 81 aa f7 23 | 07 f9 5f 13 36 5a 45 44 ae 6b c2 b5 0c 64 f9 5d | 33 6a 2b a5 33 65 bb cb a4 25 6a c7 fc 53 f4 eb | ec fb f4 4a 8c 01 69 1e e8 15 90 da 3e e8 e7 e4 | a9 bc 12 b2 3e 67 e9 07 38 7b 7f ab 7c da 25 d2 | 97 fc 1f 16 04 10 f4 d2 00 07 db c1 f8 21 00 e5 | 11 9f f5 be ae 9a 37 75 35 e1 f5 13 de ae c3 61 | 29 00 00 24 2a fe 38 a0 12 7a 3e d7 16 fa 98 10 | a9 db 26 69 36 69 61 cd 14 ca 40 97 d2 72 a4 b6 | d3 f7 cf 73 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 45 5c 53 3c 72 83 7b 27 77 59 fc | 37 eb 14 fc 78 79 76 26 00 00 00 1c 00 00 40 05 | cc 0a e4 80 a3 0e b9 40 1f 4d be 4b 21 2f 7d 7c | 54 e3 c5 be | libevent_free: release ptr-libevent@0x7fb35008da90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a198d0 | #704 spent 0.0664 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #704 connection "road-eastnet-nonat-227" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c023c10 | handling event EVENT_RETRANSMIT for parent state #708 | start processing: state #708 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #708 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-153" #708 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-153" #708 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.22519; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.989949 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a198d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #708 | libevent_malloc: new ptr-libevent@0x7fb35008da90 size 128 "road-eastnet-nonat-153" #708: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.153:500 to 192.1.2.23:500 (using #708) | 83 fb 36 71 76 29 5b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 da 77 6f a1 f4 e9 2a b9 26 f3 f4 92 2d 46 f4 | b0 7a 40 33 85 5f c9 7c 72 d1 cd 54 8c 98 37 24 | f9 0f 31 c0 59 59 24 f6 b1 81 e9 3e 4e d8 2e 7c | d3 b0 17 2c 94 6a 08 cb de 35 37 9f 1e 5a 20 07 | 0c 50 86 38 97 07 6a e1 c5 0b 65 c8 6b 40 d7 23 | 14 ad 46 39 49 f8 1f 78 30 1f f3 26 21 9b 0d c6 | e7 c6 21 16 0b 17 ff 88 3b 14 95 13 3f 92 c8 82 | d7 c4 ee a8 41 71 fd 1b 20 11 da c6 5d 3a 47 d1 | ca bc a1 5a 85 26 5d 5a 28 9f 54 25 f5 62 92 f3 | fe 06 f5 6b 43 32 33 40 13 b4 f7 f9 75 91 87 ca | 2d 29 62 a0 43 63 6e 0a fb 1e d6 2f 78 ad 10 0a | 3c 75 ef b9 fa c4 90 84 df 4f cc 90 59 78 ab 87 | 9f a2 c3 c2 7f d2 98 4d 55 0c 9e e5 34 c4 ad d0 | 3c 21 98 a2 b3 b7 59 1e cb 10 0a be 37 e9 ef d7 | 36 78 d7 47 cf 88 0a e6 42 a5 bc 51 bf 4d 18 8e | 51 22 ad b5 62 a9 c6 e9 19 d6 ac 7e d0 4b 90 54 | 29 00 00 24 44 8a 54 75 91 ac 9f 57 e7 e2 61 bb | a3 bc dd 31 8a 95 c4 e5 bc bb 80 d8 96 43 b6 04 | ee a9 3a 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 36 27 57 09 35 01 20 a6 6d 08 d6 | 77 61 10 b6 75 1c 9b de 00 00 00 1c 00 00 40 05 | a5 a2 ff 3d 75 4a 07 bb 58 ea 97 e6 0f 3f 13 76 | 41 34 e3 b6 | libevent_free: release ptr-libevent@0x7fb34c059570 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c023c10 | #708 spent 0.067 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #708 connection "road-eastnet-nonat-153" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b24700 | handling event EVENT_RETRANSMIT for parent state #577 | start processing: state #577 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #577 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-15" #577 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-15" #577 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.225273; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.939128 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c023c10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #577 | libevent_malloc: new ptr-libevent@0x7fb34c059570 size 128 "road-eastnet-nonat-15" #577: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.15:500 to 192.1.2.23:500 (using #577) | 9a e9 29 4a fb ed 2f 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | eb 42 00 89 a8 1c aa c4 50 d8 16 0d 57 8a 4c 0c | 65 7f e4 c6 cb 70 da 12 6d e2 7e 03 21 93 d2 33 | c0 0e 36 f5 83 0c 2b 56 86 5b 5b 11 98 4d 5e 26 | 1b d6 c9 20 6f 52 e9 5a a4 2c 26 ed 04 b2 dc be | 5d ce 66 9c 58 f4 61 27 fb c1 4e 8a 69 60 4b bd | f0 4f 86 25 0f a2 2a bb fe 4f 50 ef a2 d8 d6 78 | 6c 29 24 25 fe 51 e0 6c 3a c0 fd 3f 00 f0 3a f4 | 91 32 2d e3 b6 e9 c2 02 b0 11 e2 cc 36 2c 5f 10 | d5 2c ac 60 4a b1 d5 39 16 8d 42 4d 99 5c aa 84 | 91 c9 31 b0 23 ba 96 66 57 3d 13 7c 31 a0 b2 bf | fa 79 80 3a 47 a1 84 04 8d d1 db 1f 63 3d 31 9f | 0d 65 07 7c d8 39 05 9e 48 0a ce ef 34 aa 84 80 | 97 ab 9b 1c e2 7f e7 6e d5 2d e8 2c da be dd fd | a4 36 1e 62 ea bf ea e8 63 2c 01 66 94 be 8d 91 | a8 b7 16 4e 15 f7 b4 a4 5f 2d 8d 36 c0 1c 88 7f | de 2b af 28 ec 3a 09 33 ee 83 97 d2 90 d0 8d a7 | 29 00 00 24 88 b2 79 ff 2c a8 2c 3e 30 78 3a f8 | a3 fb 41 22 e8 46 1c 6c 2e 90 10 b7 fd 31 f8 c3 | 36 1a 6c 24 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 75 44 a9 8d f4 0a df ee dc c8 f6 79 | 31 59 33 9e 08 98 28 4b 00 00 00 1c 00 00 40 05 | 1f 98 b4 df a5 90 16 30 b3 41 56 5d 2e 2c cf 6b | 1e d4 e3 0a | libevent_free: release ptr-libevent@0x7fb384081730 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24700 | #577 spent 0.0659 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #577 connection "road-eastnet-nonat-15" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aecb00 | handling event EVENT_RETRANSMIT for parent state #724 | start processing: state #724 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #724 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-190" #724 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-190" #724 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.225352; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.991645 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24700 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #724 | libevent_malloc: new ptr-libevent@0x7fb384081730 size 128 "road-eastnet-nonat-190" #724: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.190:500 to 192.1.2.23:500 (using #724) | d8 1c 6e 85 91 89 a3 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b de 88 5f a9 9d 9f 4a ba 73 08 37 d8 73 92 bd | 98 01 1e 07 58 d1 bd 9e 94 c8 19 b3 d8 04 89 00 | 76 aa d6 d1 63 6a 07 fa 53 c6 90 66 df e2 97 f3 | 3c d9 b0 e1 11 2a ca 4e 08 bd ce bf ec 35 bc f6 | 93 75 93 c3 27 5a 87 df ca 9f c6 0c e1 14 ca 81 | e7 91 a3 96 b7 0a 4b 1c 36 d4 88 78 ba 01 85 71 | c4 53 40 7e 7f 43 33 e9 c4 83 3e 45 df 0f c5 fa | 69 a7 38 69 b0 0f d3 83 7e 7b de 5d dd c6 e0 fb | 0b e9 aa b1 12 3e 19 c2 56 6e ba b8 9d 18 93 e8 | aa 44 6e 8a 6d be 62 4a 02 fd 73 71 b4 38 01 21 | 91 1e ce 98 c8 d0 d8 5e 38 8e 55 9c f3 8f 26 1e | d2 c2 28 3a 2e de 40 fa 17 cd 9b 8c 58 ec 62 2b | d4 b3 1f 01 98 ed 74 7d aa 00 c0 b6 32 cf 56 d0 | af 2d a5 2d b1 f9 4a 1c 18 82 b0 e3 c5 fa c0 30 | 40 7e 51 dc 60 0c a5 93 8e a7 3a 0f 04 35 78 04 | a2 3c f4 bf e9 0c bd da 36 3c 51 23 68 58 10 25 | 29 00 00 24 64 54 99 ea 39 03 03 79 05 41 c1 1e | 77 53 cd 84 bf 45 30 cc a5 b0 b5 0a 02 05 58 10 | 79 31 ef cb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 23 c5 7e 24 d1 34 b2 de b7 23 38 | 86 97 29 8a 57 94 13 c1 00 00 00 1c 00 00 40 05 | ca f2 42 8a 65 1e 49 7e c6 31 6f 76 92 ca b3 81 | 65 f9 d2 13 | libevent_free: release ptr-libevent@0x7fb35806e450 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aecb00 | #724 spent 0.064 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #724 connection "road-eastnet-nonat-190" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb360044df0 | handling event EVENT_RETRANSMIT for parent state #703 | start processing: state #703 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #703 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-114" #703 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-114" #703 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.225431; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.993835 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aecb00 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #703 | libevent_malloc: new ptr-libevent@0x7fb35806e450 size 128 "road-eastnet-nonat-114" #703: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.114:500 to 192.1.2.23:500 (using #703) | ae 90 67 40 0b c3 60 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 19 9b e5 9c 8e 57 c1 33 8b 94 01 97 8d 71 df | fd 30 9e 4b 3c d1 62 ac b2 ef 34 9e 04 b9 be 20 | 28 4d c1 c0 e4 75 70 3a f1 2f c3 4b 44 fd be 81 | 03 75 3c c9 fe 1b 81 d5 34 29 50 d7 8f 3f 70 56 | b3 d7 36 46 b1 89 89 80 d0 ec 97 d4 da d5 f4 f3 | 90 a5 07 30 19 0d e2 de 67 bb 84 67 ec 14 1d f9 | c9 6f 5e a4 ca 2b bd 62 3a a4 de d7 ad b7 a9 69 | 14 ce 78 80 17 fa 13 c7 37 12 cc 43 83 21 10 58 | 9d 2b 15 15 d8 e4 b1 cd ac 75 15 a1 72 52 09 be | 1e 67 15 57 3b 30 67 e6 f1 bc 1b 0d 33 dc 86 88 | 03 17 c7 52 df f2 2d 62 41 fb db 4b e5 00 8b 99 | 4e 97 2c 6a 81 e0 5c ea fe ad de f5 d3 4c 63 11 | e5 8c 09 a5 fe ec f4 22 ed 0d 56 cd ca 1b 22 80 | a7 f4 83 61 3b e7 31 76 2e 63 32 19 00 cd 04 39 | f0 c5 a6 71 47 ce da 1d cb a8 66 69 90 c8 a9 5a | 7f 0c 41 bf 5b ff 6a 04 a1 60 dd 0c e7 19 60 15 | 29 00 00 24 e3 5d d8 49 01 1c f9 e5 e1 ba 04 21 | cf 21 a7 36 74 86 ff 7d d6 85 f8 5d b2 3c d3 44 | a8 44 11 0e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e3 c6 13 89 f0 56 8f ca 89 41 0b e7 | d5 b7 99 19 f1 5e ec 03 00 00 00 1c 00 00 40 05 | 48 a2 09 85 61 af ec 54 8b 03 81 ed 23 cb 58 07 | eb 48 95 a0 | libevent_free: release ptr-libevent@0x7fb36005ee70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360044df0 | #703 spent 0.0656 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #703 connection "road-eastnet-nonat-114" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35804b810 | handling event EVENT_RETRANSMIT for parent state #701 | start processing: state #701 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #701 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-203" #701 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-203" #701 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.225509; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.982347 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360044df0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #701 | libevent_malloc: new ptr-libevent@0x7fb36005ee70 size 128 "road-eastnet-nonat-203" #701: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.203:500 to 192.1.2.23:500 (using #701) | 68 ad 39 62 89 bc a6 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a9 e0 68 21 de 01 f2 63 62 9a 39 6d 52 af 4b 2d | b4 c9 33 56 eb d2 8c 9f ba 59 3a e9 d6 15 7b 7f | b8 2e a0 53 fc ae 44 73 e4 45 e3 47 76 a0 22 f6 | 14 d0 eb 76 9d 9e 8c 73 ad 3a d7 a8 0e 86 fd 08 | 39 c2 76 22 26 07 a7 7e 54 4b d3 f9 34 75 0e c8 | 7b 0c 57 fe a5 45 d0 5d 95 94 e2 38 22 7a a4 06 | df d7 de 2d 77 d0 62 ec 16 53 18 2e d5 6e 85 3e | 9a 44 d4 b5 c9 d7 25 7d 2e 03 d4 fe 50 40 bf 29 | f9 da 48 d3 d1 54 1b fe c7 56 87 44 3a 32 7c e0 | 5f c5 77 06 8a 05 ef 24 26 bb 7f 33 c5 e9 33 9d | a6 cb b0 d2 28 37 19 18 8d 43 4e ce 15 f7 37 9c | 6e 46 8e 96 3c 83 cf af 07 cd e9 21 87 3c e8 1c | ef ad f0 27 43 77 59 ca 24 3f 93 f9 80 0d 29 96 | fc 19 52 7b ce 8d b5 b1 4e 70 76 37 e9 52 61 3e | bf 51 35 68 4a 0c b7 29 d7 35 86 dc a6 18 d3 f4 | 7b 66 33 c1 28 ff 4b b0 99 bc 28 5a 64 81 7b df | 29 00 00 24 88 87 4e bd b4 de bb 6d c9 c8 4e a7 | a4 cc 00 9f 8b 0d 61 d8 a0 b2 27 29 2d 61 32 16 | d2 33 a2 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9d a9 8d a4 1c 7e 43 26 3d 83 d5 d2 | 9e 52 9b c6 6d b3 48 31 00 00 00 1c 00 00 40 05 | dc c2 86 b8 21 a6 32 d2 32 e6 c3 81 d9 7b 5e 50 | bf 6c b1 ec | libevent_free: release ptr-libevent@0x7fb33804e7a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35804b810 | #701 spent 0.0662 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #701 connection "road-eastnet-nonat-203" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3400296b0 | handling event EVENT_RETRANSMIT for parent state #656 | start processing: state #656 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #656 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-192" #656 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-192" #656 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.225587; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.011141 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35804b810 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #656 | libevent_malloc: new ptr-libevent@0x7fb33804e7a0 size 128 "road-eastnet-nonat-192" #656: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.192:500 to 192.1.2.23:500 (using #656) | be 68 21 bf 92 3b bd 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 60 52 43 e7 61 15 4a 4d ee d7 b2 46 b1 85 1b a8 | b0 82 1f 54 6e 3d 86 2c 4c 72 1b be 1a c9 a9 49 | 93 8b d8 d1 12 52 c1 d1 1e 66 c4 3c 2c ea d7 98 | 75 c0 9a ec 39 77 d3 3f fe 5e 4c e6 42 6d 23 4b | 2b 34 b7 11 db 87 07 d3 52 60 5a 9e 7c 2c 5b ef | e6 f9 73 5c 0b ba ad d6 fe 16 9c 1f 42 85 0a 3f | c6 40 77 bd 69 5b 49 0e 03 f8 b5 a7 44 3d 92 3e | b6 3c 8b 69 c2 36 24 58 2e fe e4 2e cf 17 66 89 | 17 19 74 fd 9e 82 52 41 e1 84 14 f6 da 40 64 3c | 7a 18 7c f9 1c fa fc 3d 2b ab c7 81 6b 75 f7 02 | 62 8e a6 13 db 23 45 dd 44 71 ff f8 9b 82 f6 c5 | 35 8a a4 69 84 07 45 3b 4e 8e cf 28 a8 c7 ed c8 | 24 90 fd dc c5 ab 7f aa 2d f3 14 d8 aa c0 01 da | 83 71 b8 3c 0a d2 2e f1 89 59 c1 75 b8 ab ca f6 | ed 19 86 32 78 7f f4 7b 8d e8 39 01 f8 23 b7 bf | d8 41 df 63 27 75 88 7d 0c 1a d0 05 c1 b6 21 63 | 29 00 00 24 da a6 76 b3 cd d9 ef 6f 78 db 6d a7 | 41 9d 1a c1 02 ed b1 b4 d8 5e 1d cc 04 ae df b0 | fa 18 8b a1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 b6 14 c8 78 3e 8b 14 79 86 4e 98 | ba 1c aa fd 49 33 32 6e 00 00 00 1c 00 00 40 05 | ec b2 52 19 30 c6 85 07 d9 5c 18 07 e7 c7 94 94 | 67 61 43 b0 | libevent_free: release ptr-libevent@0x7fb35c07fb40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3400296b0 | #656 spent 0.0654 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #656 connection "road-eastnet-nonat-192" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38000a290 | handling event EVENT_RETRANSMIT for parent state #621 | start processing: state #621 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #621 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-53" #621 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-53" #621 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.225666; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.969104 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3400296b0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #621 | libevent_malloc: new ptr-libevent@0x7fb35c07fb40 size 128 "road-eastnet-nonat-53" #621: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.53:500 to 192.1.2.23:500 (using #621) | b6 7b 13 e2 c1 f5 0d 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f5 57 84 d5 d7 fc 7b 03 ac 28 bd 55 7a cb 22 6d | 15 db d6 6e 10 22 25 dd 22 f0 db b6 64 1a 8e 62 | 37 1c 3c 87 76 d4 16 13 a1 20 70 51 e2 6c 88 a7 | 4c bd 9a e8 61 13 5b 96 2a 3a 11 b0 00 e4 41 12 | 45 a6 ec a4 25 97 e4 d4 fc 34 77 25 f0 6b ee ea | aa 50 40 a4 2e a8 4f 01 2d e4 44 bf 36 fc 59 62 | 62 e1 29 8a f9 0d 17 54 2b f3 92 0f 3e c7 98 e1 | c4 70 f5 a6 ce c1 0a 42 4d c9 8d ad 7d 6f 21 10 | 8c 9b 74 c6 74 d4 11 03 3c b2 a3 0a ef 7e 1b 84 | d0 6a 92 26 b5 27 71 3a d1 01 ed b9 54 c4 f1 85 | 17 24 83 a6 8f c1 1c 28 cf 64 6e 6b dc 51 3c 81 | 4c 28 f4 1b 29 ea f8 d0 93 36 3e 3f 53 a9 9f e5 | bd 65 1d 28 4d 88 e0 98 81 13 8e db f8 e2 17 a6 | 46 27 e5 1e a7 24 77 68 b9 82 43 d4 94 92 10 37 | d7 3f 29 86 6b cb 84 f7 07 f1 63 aa a8 fc 4a 8a | 7a c7 2e 35 5c f7 6f 1e 13 8c ec d2 d0 0f 26 77 | 29 00 00 24 61 45 c6 88 ed ea 89 96 4e e2 8d aa | 07 4f da 3d da b9 b5 f4 0f 2b 6b 58 d6 df 11 d3 | 2e b8 7b 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 1f a9 4a 68 19 c5 3d 06 56 c4 a1 | 6a 2d 5d 6d af 09 97 90 00 00 00 1c 00 00 40 05 | 1d 2c b3 00 93 4a 54 e7 e8 53 57 b8 b6 97 f8 d9 | 75 4e f7 33 | libevent_free: release ptr-libevent@0x7fb35c0aba40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000a290 | #621 spent 0.0637 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #621 connection "road-eastnet-nonat-53" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46abd200 | handling event EVENT_RETRANSMIT for parent state #626 | start processing: state #626 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #626 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-26" #626 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-26" #626 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.225745; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.962429 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000a290 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #626 | libevent_malloc: new ptr-libevent@0x7fb35c0aba40 size 128 "road-eastnet-nonat-26" #626: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.26:500 to 192.1.2.23:500 (using #626) | 0f ed 5a cf 38 b1 e8 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8f 3d 6d be e1 b5 e5 c2 d3 2d 01 3e 44 32 8c 9c | 10 07 5b 6c ed c7 1e e0 bd ad 91 2f 7b 5d 66 20 | 1d 49 29 0a fe 5e e1 41 fd 2d 5b db 26 a9 35 00 | 65 10 cd fe cb 24 75 0b 38 a9 17 e0 c9 9c 32 cb | ac ed eb dc 28 55 86 03 cf 0a 73 6f 60 bd ce 34 | 02 6e 30 12 0b ea e0 d6 3e 1e 3f d8 09 a2 8f c4 | 00 8b 17 ad 6b dd 80 3e bb 4b 55 43 c0 01 45 68 | b9 d4 1f bb e9 85 dd cd 2e 4a b1 73 0f d3 cf 35 | 1d cc 81 40 9d 5a 89 f7 17 97 eb a9 9b ce d0 7a | ea fd d9 8a 75 55 14 06 7b b5 ea a1 d4 df 99 7f | 7d 44 5a 7b dd bb 03 bd 83 27 4b ff 5b 0a f8 f1 | 3f f3 6c 7e 81 c9 48 54 92 25 5a 38 2f 94 66 d9 | 09 f1 fc 50 b6 b8 4b c6 01 00 9b 5c de e0 c2 70 | 94 49 cd f6 f0 cd 84 42 37 97 4f aa 99 fe a6 85 | 3a 90 6e ce b7 01 23 71 2b b5 63 d7 be 2a b7 f7 | e5 82 55 b8 36 c2 c8 94 47 53 1e 97 b8 37 e2 29 | 29 00 00 24 a0 8c 77 90 d5 d1 0c 21 bb 3d 18 0e | 18 70 42 64 dc 36 73 88 d4 b3 3a 38 9b f1 00 e0 | 74 bb 2e 48 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e0 58 91 0c 95 19 f3 97 a9 04 fb bb | 0f b6 c3 16 e5 5e 65 45 00 00 00 1c 00 00 40 05 | 89 d2 55 f5 43 aa 76 28 9c 2b e8 f0 be 0a 82 5c | 11 ab 36 f1 | libevent_free: release ptr-libevent@0x7fb35c08ab00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abd200 | #626 spent 0.0659 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #626 connection "road-eastnet-nonat-26" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348048a60 | handling event EVENT_RETRANSMIT for parent state #638 | start processing: state #638 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #638 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-218" #638 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-218" #638 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.225822; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.959786 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abd200 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #638 | libevent_malloc: new ptr-libevent@0x7fb35c08ab00 size 128 "road-eastnet-nonat-218" #638: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.218:500 to 192.1.2.23:500 (using #638) | 73 d4 45 41 ab fb 7a 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 74 9f 1b 03 84 82 35 ff 90 4c 0e e1 4d 63 0b 6e | 25 67 96 c9 b1 5e 9f d5 99 08 91 8b 97 07 16 15 | 0c e8 b6 79 cd d7 bc dc 55 ef e3 4b 14 16 41 5b | 40 76 1a 52 cc c5 af e0 d7 43 e0 3e 6a bb f6 6e | 3a bb da 36 77 2b a1 fe af 56 c4 df 62 b3 73 b9 | 52 c1 55 25 5c 52 48 e6 3a 7b f7 12 bf 50 3d 13 | 60 2e 98 52 d5 09 1c 91 b8 c2 de 2d 7f f1 06 b2 | 39 09 03 76 3e 48 2f e6 27 f7 a9 1d 29 27 2e f9 | 47 87 5e 4a 7f 25 ff 26 1e 80 23 47 3f 0d 0c 05 | c8 27 d3 ed 98 ba 35 8c d3 ea 22 73 97 01 a0 d4 | fe 01 e2 3a 2d fc 4d bf 2f 53 eb 87 c3 5c 58 ef | 04 26 0a 51 13 2d 57 56 6a 69 f2 77 0e e6 3d 17 | 34 db d2 58 e6 ef 99 7a a5 d2 4f c6 f1 d6 ee ce | b8 69 1a 6d d5 e4 12 01 a4 1e 43 89 0e 61 2a 78 | 44 0b 0b bb 93 59 d9 ea 7a 2e 42 02 8d af be c7 | d3 84 14 a0 3f f3 e5 9f b7 c2 2d 2a 24 01 b0 1c | 29 00 00 24 5e 9d 7c 45 0d ec 13 66 03 bc 86 eb | df 18 53 02 81 01 d0 ca be 7b d0 08 90 a7 74 72 | 28 4f b9 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b7 c4 2c 70 3a 67 17 0b be 99 22 e3 | 81 fa d7 92 68 76 9e 84 00 00 00 1c 00 00 40 05 | 70 aa ac 05 74 24 54 28 15 1e a7 7e 64 95 2b b7 | 84 55 48 79 | libevent_free: release ptr-libevent@0x7fb36c0751d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348048a60 | #638 spent 0.0655 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #638 connection "road-eastnet-nonat-218" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb344018460 | handling event EVENT_RETRANSMIT for parent state #644 | start processing: state #644 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #644 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-163" #644 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-163" #644 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.225901; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.965861 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348048a60 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #644 | libevent_malloc: new ptr-libevent@0x7fb36c0751d0 size 128 "road-eastnet-nonat-163" #644: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.163:500 to 192.1.2.23:500 (using #644) | 50 de 2b d7 45 9f 26 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 58 93 d0 7f 41 ad 9d b7 03 dd f8 2a ea 2a 42 | 44 8c 71 98 4a 47 c1 c5 90 95 76 04 f2 e5 ad 38 | 71 44 ae 3b fb f2 49 7c 10 82 5e 78 55 e4 fb 2f | 3e 12 c9 6c 92 13 53 cb a3 12 6e fd 1b cd fb ca | 7e e6 47 e7 44 cb 81 71 95 37 b6 d0 7a dd 37 46 | 29 e1 76 40 93 0a 7f 82 5a ad 56 83 a4 e6 22 95 | 73 81 6b 3d a5 ef 7e 2a a9 63 f6 f5 16 dd ca 4d | c5 1a 4a 2e 98 5c be 8f b6 36 37 ca c3 60 91 97 | 68 91 c7 05 a2 20 36 57 76 46 a3 b4 57 65 a3 ec | 60 30 bd 82 e8 5f 09 bf c2 16 53 69 e8 db b3 20 | f1 da 51 a7 b7 44 97 86 b5 cf 77 2d 02 b0 fe f9 | 34 93 f6 86 2f ca 83 a6 a7 79 8c 3f 79 49 ae 69 | 69 fc a1 aa 7d 95 b3 6d 7c 9b 21 a7 a7 f1 27 5d | 6b 90 30 cd 14 fd ee 1b 3c 9c b0 26 4f ac 21 a1 | 51 5e fd f8 e8 96 a5 84 c9 1e 4d dc 41 f5 73 29 | 85 06 8a 87 3f 53 f8 64 7e 9c bd 99 b9 0a 9a 0b | 29 00 00 24 e5 0f d1 27 d8 cf bc 47 ad 96 17 e8 | c3 9b 62 84 21 4e 76 3c 4d 7e 36 68 8b 66 54 7f | 11 87 3d b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 10 d8 9d 5e e4 7d bf 65 2d f1 4a b5 | c7 e2 e6 55 b9 27 ad 86 00 00 00 1c 00 00 40 05 | e7 08 aa 38 d2 e0 0f 7f 77 98 72 12 74 ed 7d 4c | e8 75 c4 3e | libevent_free: release ptr-libevent@0x7fb37406a110 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344018460 | #644 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #644 connection "road-eastnet-nonat-163" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a82ac0 | handling event EVENT_RETRANSMIT for parent state #670 | start processing: state #670 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #670 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-147" #670 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-147" #670 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.225979; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.970963 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #670 | libevent_malloc: new ptr-libevent@0x7fb37406a110 size 128 "road-eastnet-nonat-147" #670: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.147:500 to 192.1.2.23:500 (using #670) | 8a 10 9e 23 ac da 71 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 59 15 67 28 ca 74 92 de a7 0b d2 ca 9e 31 ff | 0c ec 66 70 2f 96 5c db 29 7a 94 be b4 fb 91 94 | 6c 4c 82 7b 86 7c 4d 04 fa 97 64 03 7c 61 e6 12 | 7b e8 77 6d ef fc 86 73 90 13 0d e6 78 93 c2 a1 | 62 6c 65 c0 8c 1c 5e 39 e1 34 37 c6 58 5b a5 b2 | 83 26 7c 7e 1f 15 94 64 d1 51 32 90 eb a2 33 51 | b8 56 2a 0b 53 1e d3 ca 3b f5 15 ad 3c b3 c4 4c | 87 79 a4 dd de 1d 17 0c ed 28 be 3d 53 69 9f d4 | 92 6d e1 f9 c4 1e 3a 32 bc b5 0d 47 92 45 39 27 | 1c 6a ba 31 af 07 5a 8a c7 08 ef d0 d2 ac e7 93 | 58 56 5f 1a 54 44 df 61 16 7f bc 43 53 9a 9f f7 | 61 eb 19 48 e1 7b e1 df c1 5a 57 0c d3 a6 a2 ce | ce 01 4a 92 1b ce bd be 46 3d c9 04 aa 1c 6a 49 | 39 9e c5 e0 23 32 61 54 07 62 70 d6 2b 4f 7f 12 | 86 15 e1 c4 88 04 21 da 99 53 13 ca 40 af d4 cd | 0a f5 d7 88 c1 11 17 a1 77 d9 81 26 5a b2 1e b7 | 29 00 00 24 f3 83 7b 0d 72 75 fb 36 6b 70 51 59 | c6 93 d9 98 17 c4 71 7c 93 e7 e0 bd 2f bb ee cf | 0d 5e df 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 a9 e0 bc 70 aa 03 d2 53 d4 71 04 | 68 97 96 57 88 52 67 34 00 00 00 1c 00 00 40 05 | a6 13 8e aa 70 35 17 a1 68 a2 7c 6b 1f 0d 90 7b | a6 27 3d 24 | libevent_free: release ptr-libevent@0x7fb35007d2f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a82ac0 | #670 spent 0.0638 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #670 connection "road-eastnet-nonat-147" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a34e10 | handling event EVENT_RETRANSMIT for parent state #647 | start processing: state #647 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #647 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-206" #647 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-206" #647 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.226062; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.967589 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a82ac0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #647 | libevent_malloc: new ptr-libevent@0x7fb35007d2f0 size 128 "road-eastnet-nonat-206" #647: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.206:500 to 192.1.2.23:500 (using #647) | a9 15 25 50 c3 89 9b ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 0f 1a 9b c2 c1 27 9f 86 de 54 44 d0 24 9d 6a | 45 ee aa 3d 9a 82 6c cc 7f 5a 10 2c 59 c9 22 f3 | 34 55 04 3d 8b 40 f1 78 07 5b 1e 30 68 89 14 97 | bb 5f 4d f3 15 66 be e0 4a d0 41 bd 55 74 f7 a1 | 6b 5c c4 02 57 e6 80 ea 7f cb 60 fd b8 98 71 32 | 6d 87 75 4e 58 e3 ec cc 2e d4 bc 64 e8 77 a7 a9 | 8d 8d 5b 9b 51 d9 37 9c 0c 0c 7a 22 96 b8 a2 26 | 89 d0 75 ed e8 65 8b fc 2a 83 34 29 39 47 fd c0 | 22 02 dc 03 48 eb ab 15 4b 4d ed b4 52 db 67 35 | cc 06 96 a5 b0 73 95 a7 9a 74 43 21 02 98 b3 07 | be a3 dc 76 24 de e8 96 45 29 b9 08 2b da 6c 70 | 45 74 38 4c 76 73 8d c4 3a 57 9d 7d bc 8c cb 79 | 70 0a 09 47 dc 14 98 38 75 a6 25 2e 9f 4a b1 fc | b8 6d 3f 57 fc c2 a2 48 3b 42 ab 67 ad f1 0d 72 | 8a d2 0f 62 dc 08 25 a1 63 8c 91 4c 28 7e 0a 45 | 95 7c 48 d3 57 c8 ca 2a 17 b1 f3 78 10 3b a0 11 | 29 00 00 24 25 47 22 11 f3 7d 2a 09 ec 1c bc 5b | ea d8 0a 15 cd 9d 69 8e 1e b3 ca b8 a6 0d 22 5d | 28 7b af f6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 3c 41 1d 92 d7 b9 38 bc 5b eb cb | 32 90 40 77 f1 b7 dd e6 00 00 00 1c 00 00 40 05 | 63 f4 fa ff 4d 8b 5a 8c fe ca 58 3f 4d 61 7e 87 | 43 3e 7c 36 | libevent_free: release ptr-libevent@0x7fb358064ae0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a34e10 | #647 spent 0.0706 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #647 connection "road-eastnet-nonat-206" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0d4c0 | handling event EVENT_RETRANSMIT for parent state #650 | start processing: state #650 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #650 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-151" #650 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-151" #650 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.226142; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.966407 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a34e10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #650 | libevent_malloc: new ptr-libevent@0x7fb358064ae0 size 128 "road-eastnet-nonat-151" #650: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.151:500 to 192.1.2.23:500 (using #650) | 26 33 64 e2 99 22 09 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f9 93 4c 52 2e 07 4f ef fc d7 92 1e c1 ca 14 b7 | f7 a3 82 0b 5f f6 91 b4 15 5e 90 95 7d d0 45 ef | 21 f3 08 0e 7d 26 87 e7 ea 79 d3 33 07 49 ba 68 | da fd 2d dc e8 dd 8d 3d ac 78 0b 31 13 b9 60 52 | d8 60 ef 09 61 af 9d f6 ad 76 cd b0 e6 c4 55 10 | bd 0c b1 58 60 30 af 2c 0e 52 bd 65 9f d0 54 d8 | 5a 2b 21 18 f2 c5 71 a2 0d 15 04 b5 4a 32 ae 9c | 02 2e d4 e0 51 8d 8d 22 83 86 fa d5 f5 1f fc cb | 75 6f de 7a e7 e1 af 25 29 c0 d8 e2 f6 b9 34 b5 | d7 7a c3 1e c4 99 5b 0e ca 76 77 7c f5 a8 a5 87 | 30 0e 18 1b 81 0a 94 65 85 20 c1 1d 31 6e b8 8b | eb 6c f5 b0 86 38 4d 10 0a 4a e9 45 4a d4 02 3f | 74 10 5c 24 6e 73 2d b5 cc 00 a0 c3 3c 0c 0d 0a | 48 d3 1b d4 4e a5 c6 45 3d 90 e1 3d 46 6f 68 4d | 0c c4 d4 2f a5 c5 02 ab af a2 e9 3b 3f ee 3a b5 | a7 5d 9e 2b da 84 df d1 c6 3f 08 db f2 d2 d5 c6 | 29 00 00 24 8d dc df 0c e8 8a 00 84 45 9e d1 82 | 39 c0 aa 62 4b 5e c0 9d 6f b9 50 ba 59 33 ad 5d | 19 94 ea 3d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 84 a4 74 25 14 10 fd bf 0a 02 29 | 25 c7 89 ed 1e 29 a1 0f 00 00 00 1c 00 00 40 05 | 9b 4c 2f e4 b9 53 6d ef 7d 4f cc 27 24 fe f9 f6 | 0b 9e 9f 60 | libevent_free: release ptr-libevent@0x7fb388075630 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | #650 spent 0.0662 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #650 connection "road-eastnet-nonat-151" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388015720 | handling event EVENT_RETRANSMIT for parent state #612 | start processing: state #612 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #612 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-73" #612 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-73" #612 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.226222; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.966793 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0d4c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #612 | libevent_malloc: new ptr-libevent@0x7fb388075630 size 128 "road-eastnet-nonat-73" #612: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.73:500 to 192.1.2.23:500 (using #612) | 06 13 d7 c6 41 b2 86 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 26 8d f1 f4 22 24 65 49 2a a6 70 28 29 5c 96 09 | 3e 1e 78 f6 de 7f d4 6d 8f 70 0c e4 5b aa e7 34 | 60 3a b8 ce 9c c3 f2 55 c4 78 5c 37 a6 84 38 22 | 93 67 fa f8 c2 df 15 e3 9e 8e 26 44 fc e4 fa 8f | 57 f5 49 ed 86 e7 16 45 96 6d 10 ea 0c 90 8a 31 | e9 a7 90 56 ec d2 20 8b 2a b3 08 b3 f3 33 e4 7b | 20 92 e0 01 19 6d 6c ce 7a bf 9a 7b 89 9f 35 9e | 58 9d d3 ad 5b d8 c7 e9 b8 71 4b f7 a5 1c ea 1a | cc c7 49 f3 04 3d 6a 30 5e 5f 6e 57 b4 d0 06 19 | df 2d c3 be a9 ad 0b 91 01 58 72 3d a2 3a 97 fa | 3b 4f d0 1f 09 3f ec 9c 6a 4d ad a3 d7 03 7d fb | fd d5 f6 df 9c 11 0f 03 14 5d 5b e8 e8 f0 46 2d | 46 0e 42 78 aa d4 b4 d3 de c9 9d 1d a1 10 3b 2b | 48 75 16 7b f6 27 2f 9d 63 b1 ad df dc bd c2 01 | 65 a8 1f 4c aa c7 7b 56 c8 5f 06 1e bb 73 93 0a | 1f 90 b0 df 46 4d 2e 1e af 83 bf da a6 c2 4b 21 | 29 00 00 24 14 45 39 c3 b2 be 10 35 86 8a 8d fa | 46 03 d4 c9 b6 c1 c2 c0 bf 3c af 6e ab be 7e b7 | 9a 44 cd df 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bc 94 44 11 03 fc a1 a4 72 04 35 93 | 3e a4 98 88 8e 5c 65 1b 00 00 00 1c 00 00 40 05 | 24 c4 24 16 66 f3 44 ba aa f9 26 a7 a0 53 d9 b2 | 41 97 1c a3 | libevent_free: release ptr-libevent@0x7fb38806fe50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388015720 | #612 spent 0.065 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #612 connection "road-eastnet-nonat-73" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb33800d120 | handling event EVENT_RETRANSMIT for parent state #649 | start processing: state #649 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #649 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-204" #649 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-204" #649 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.226303; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.964724 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388015720 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #649 | libevent_malloc: new ptr-libevent@0x7fb38806fe50 size 128 "road-eastnet-nonat-204" #649: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.204:500 to 192.1.2.23:500 (using #649) | b6 55 6c 1f f7 96 4e 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c3 49 68 33 ac be 3a f7 9a 60 a1 54 2b 3b a3 9a | 16 92 52 84 04 b4 d7 16 0c 6d 09 72 cc 2b 60 d8 | 6a 97 99 35 6d bf d4 59 5a c6 db 05 04 50 9f 26 | d5 31 65 a2 a6 90 1f 44 a8 51 46 ef b2 3c 2c 17 | 9a 67 6e 63 13 be de f4 ea 50 37 0c 4c b7 bb 87 | 98 eb a2 d7 94 7a 4d 7c 27 23 c5 c1 14 ac 3a 62 | e3 9e cb 8b a8 b2 7e 85 7f 34 7f d2 53 2b 7f 26 | 9b a4 79 e8 f1 d9 12 1a 3f 7d 7b 73 7f 6a 3b d4 | c7 66 51 af 5f d5 da 98 4b bc 29 01 fc a4 53 53 | c1 e3 c9 29 b1 bd f6 9f 07 80 98 0d 7a 85 07 72 | 29 6b 03 79 c5 1e 41 20 d9 9a b8 86 af 78 fe 58 | 1c d3 ff 44 d3 cc a9 5e 28 25 58 79 53 d0 f5 40 | f8 b2 e5 1b 4e 35 7b 57 c9 98 34 61 e5 1c c6 ce | 01 23 71 88 e2 7b b5 18 09 23 c9 7f 18 e2 56 40 | 07 80 69 13 04 69 8a 54 da d5 46 08 93 8e 42 66 | 37 5b 93 f3 15 98 7b 1b b4 dd 60 45 36 75 a9 82 | 29 00 00 24 d9 9b fe 1b 9a 3b e2 af fd 5f 29 c3 | a1 c2 66 f4 bb f2 c2 62 37 18 46 4f 44 68 ce 27 | ad 06 31 85 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8e f0 1f cb 60 f7 fc 56 dd ae 47 e3 | bc 0d f0 9c f1 a6 a0 90 00 00 00 1c 00 00 40 05 | 55 71 01 83 1b 1f 6e 2c 68 ca 2f 55 56 93 29 8e | bc e1 a4 22 | libevent_free: release ptr-libevent@0x7fb33806f750 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800d120 | #649 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #649 connection "road-eastnet-nonat-204" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37404b580 | handling event EVENT_RETRANSMIT for parent state #623 | start processing: state #623 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #623 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-67" #623 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-67" #623 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.22638; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.961116 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #623 | libevent_malloc: new ptr-libevent@0x7fb33806f750 size 128 "road-eastnet-nonat-67" #623: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.67:500 to 192.1.2.23:500 (using #623) | b9 b9 92 a4 ec 38 7b b1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 f3 7e e2 e6 f9 2a f9 d0 93 e1 a3 9d fe 74 ed | 88 55 53 55 78 91 02 79 67 05 d4 47 b7 41 b9 fb | f1 19 18 33 40 a4 b0 8c 32 db 0a 07 ba 07 01 e9 | c8 5e e2 aa 5a fe 73 d0 43 82 cf ee 31 82 b6 b2 | 5e df 34 0e 42 bf b6 f1 fd 55 a4 d8 49 96 21 84 | cd ec 4d 1b 66 59 11 58 1d 4a a6 2b 86 62 43 39 | e7 71 28 21 32 2a 5c 6b 41 1f 1e a1 24 a8 7e 32 | 23 86 5c 25 2e 71 70 af 02 5f a8 b3 61 f2 41 fc | a5 63 0a e6 65 ef d6 7d ab cd 41 94 d7 f5 1e 6e | a4 d7 27 bd 30 b8 2b ed e0 66 d7 7a 3c 2f 83 9d | 91 91 64 73 8a 4d c2 67 18 5a 11 fb bf 8d de 21 | 74 5c 7d bc ae 43 a1 bb 17 7c c3 68 7a 37 86 6e | 83 ca 1f a2 33 23 44 69 5a e6 2e 90 79 83 57 19 | ae e4 1d fa 01 cf 8b fb 73 b3 e0 fb f2 40 fe 50 | 44 65 ee e2 51 df 47 88 22 c7 4a bb 66 b3 7d db | 0b 53 67 9b 7e 51 76 d3 fd f7 82 53 9e be b5 ff | 29 00 00 24 6f 2c b0 62 51 9d 8c 96 be a1 aa 9b | 8b d2 a8 77 e2 d2 a6 95 67 e0 34 a3 2d 5d ad 37 | 32 20 86 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a8 14 ee 41 a8 c3 e5 2e 90 58 14 8d | 5a f6 f4 40 9d 72 d9 2f 00 00 00 1c 00 00 40 05 | c6 f2 3a 3c 4a 40 8a 12 05 e3 0f 64 13 e4 22 0b | ff 8f 1a ac | libevent_free: release ptr-libevent@0x7fb38807ae10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37404b580 | #623 spent 0.0657 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #623 connection "road-eastnet-nonat-67" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a1da10 | handling event EVENT_RETRANSMIT for parent state #671 | start processing: state #671 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #671 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-184" #671 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-184" #671 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.226454; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.972987 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37404b580 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #671 | libevent_malloc: new ptr-libevent@0x7fb38807ae10 size 128 "road-eastnet-nonat-184" #671: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.184:500 to 192.1.2.23:500 (using #671) | 1d 22 92 7a 9f 62 65 40 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa 2c 7e 91 0a 22 90 c2 45 ac 5c be 32 c1 2c 12 | 60 a0 27 f2 55 e3 d1 89 c8 99 22 25 59 aa a7 04 | 17 46 2e ba 00 09 b9 71 47 e5 94 f1 fd 69 0a 57 | 38 00 5b 86 84 a5 d3 6a b3 9c 35 a1 da c4 1c 25 | 30 41 58 88 f1 bf 1e cf 5a 7d fb 1d 85 56 82 39 | 48 55 e9 bc e2 cf e9 2c 33 f4 34 3c 90 b2 b4 75 | 55 ca c1 69 86 54 f4 e5 53 67 e4 36 3b 66 24 10 | f0 0c b4 a6 bf 13 a9 41 25 2d 85 e0 59 37 ea 35 | d2 8a c7 72 04 28 dd 8d 9b 4e ca cb e3 07 69 b0 | 38 54 bb b4 47 09 ee 08 0f 47 c5 fd 50 05 d7 4c | 28 db 90 75 c2 2f 8c 55 54 db d4 30 5e b3 32 4e | 8c 3b 51 5c d3 59 a0 69 16 c0 1d 8a fe c4 69 9c | 6b 52 61 76 6f 1f 1d 99 1f 0b 05 d3 73 0a d9 48 | 53 6d fb ef 5d b9 22 d3 44 19 94 f4 70 f2 9d 04 | d7 54 79 2f 9c a0 ae 3d d3 fe 22 0d 74 1b 5b cc | e2 cd 80 63 5d 5b 97 5a 19 0e 2c 9e 2b 0b 57 7c | 29 00 00 24 89 d7 93 c3 18 08 d5 d6 83 2a 2a be | a0 ca 86 6f 9a 4f 6b 29 8c ce f9 83 c0 a5 93 03 | 8e 0f 90 b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b9 a9 60 fe 19 43 95 a6 13 de 16 7a | 81 94 84 c9 e7 e2 6b 0c 00 00 00 1c 00 00 40 05 | 81 51 61 ea 37 80 54 96 3e ae 81 da 9c ed 39 03 | 67 8c 30 56 | libevent_free: release ptr-libevent@0x7fb35805f320 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1da10 | #671 spent 0.0644 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #671 connection "road-eastnet-nonat-184" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb338018460 | handling event EVENT_RETRANSMIT for parent state #598 | start processing: state #598 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #598 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-89" #598 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-89" #598 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.226526; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.948048 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1da10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #598 | libevent_malloc: new ptr-libevent@0x7fb35805f320 size 128 "road-eastnet-nonat-89" #598: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.89:500 to 192.1.2.23:500 (using #598) | c9 b5 3a 18 c3 59 d6 00 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c 21 c1 2e ba 75 c9 09 d5 c3 93 96 ab d0 78 6e | 7c 4e b4 21 7a 51 1d c0 17 80 c7 93 28 da 63 f4 | fd 05 0b e2 9e 56 d9 c9 20 88 91 c7 be c0 26 c6 | 69 60 dd eb 14 83 d1 89 6a 59 8a ef 06 c9 04 3e | d0 46 01 39 27 93 50 40 25 0c 45 25 36 0a 1f bd | de f1 21 bc de b9 08 3b f9 ba 42 b3 96 c0 60 b4 | 0d 0e 0c 07 28 8c 6f 6a 38 91 1d 88 1e 7b 03 94 | e4 fb d6 05 18 52 1a aa e1 e4 5e 96 ad 66 1d 62 | b0 d0 05 07 c5 30 11 d1 7f 95 2b b4 ff 32 13 e4 | e5 17 5e 41 18 f4 6d c8 fe 66 3f 13 56 7b 86 54 | 90 58 c3 20 c7 1a 0c 72 2e b7 70 1d d3 00 7a ae | 58 86 4c b8 01 f6 3c 05 9b 47 1a dc a2 b7 00 ef | 31 66 ce 4a 0b 4e 88 92 b4 d0 aa ce d7 48 74 fd | 97 17 1b be 8b 31 c9 92 66 31 9f b3 84 ef 27 5e | 21 dc b5 10 f8 ce 45 64 07 5f 53 8c e7 9a 08 0a | 21 62 59 5e b9 02 31 e8 fd 60 6f 2f e1 86 b6 ee | 29 00 00 24 48 f3 f3 5d 08 a4 f0 63 dc c0 92 c6 | 3d c9 7a 45 24 bf 25 2a 08 df 59 2f bd 93 33 07 | 05 c3 f3 24 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 93 64 b0 1e e6 88 50 1f 76 35 f4 | b7 15 8a d3 2c 18 77 4c 00 00 00 1c 00 00 40 05 | 3a 14 09 59 cd d3 06 ad 37 c8 d5 8f dd 06 36 68 | 88 b8 08 59 | libevent_free: release ptr-libevent@0x7fb3800857f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338018460 | #598 spent 0.0636 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #598 connection "road-eastnet-nonat-89" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36801d710 | handling event EVENT_RETRANSMIT for parent state #682 | start processing: state #682 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #682 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-149" #682 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-149" #682 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.226598; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.981558 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #682 | libevent_malloc: new ptr-libevent@0x7fb3800857f0 size 128 "road-eastnet-nonat-149" #682: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.149:500 to 192.1.2.23:500 (using #682) | 1c 63 f5 34 d6 98 db f0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 23 91 93 4b 82 7b d6 c9 cc b6 dc 38 f0 76 d4 ea | b3 f9 d0 20 c5 06 5c 01 f7 82 2c bf 39 d6 f7 d8 | e4 7d 68 8b b6 1b e7 ba 01 9e ef 31 f5 4a e4 00 | 71 9f 4f 6c f1 66 a6 38 36 4d 16 6e b9 0a 02 f5 | 76 26 d7 9e 22 7e 03 cd dc 7a 6e 7a f3 50 38 a2 | f7 f1 9b 7e b5 d1 c3 e6 34 54 2a 11 00 e2 cf 05 | 84 d5 3c c2 01 67 6d 2f 10 ab ff 3f 5e d3 fc 6f | ae a3 ca 06 6d 1c 49 2d 5a 7a e5 04 64 3b 7a e2 | 78 f6 c6 9d dc 04 10 4f 6b 84 37 a0 35 9d 5e 5e | 43 00 9f e2 ca 77 c0 e3 a6 a6 e9 8c 0e c9 9d 05 | f4 7c d1 f5 aa f5 3a 3b df 0d e9 f3 99 52 88 3b | 6e 6b e7 b1 a8 09 b9 87 1e 6c dc 1d a6 0c b9 85 | 1c 89 ee 82 0e da ca a2 a8 31 12 33 df 1d 7c 66 | 57 48 ec d7 e9 e4 6e 69 ac ff cd 56 20 87 16 fd | c1 b0 72 78 18 b1 15 83 cc 13 cd 7a 9b d9 1b ea | ab 9f c6 a9 54 29 46 07 69 08 0d df 81 94 bd 9f | 29 00 00 24 44 7b c5 ba aa af dc 31 42 e4 80 90 | 55 f4 c0 be 7c cc 43 63 bf 44 9a f8 f4 30 a8 fb | 10 97 40 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d a2 48 8b c8 15 0a 38 76 0c ba f3 | b9 e8 7a 81 52 85 f0 63 00 00 00 1c 00 00 40 05 | 0f 56 36 fd fd 8a 46 5c 86 a2 68 e1 11 7c f5 b4 | 2c 7e 9c 12 | libevent_free: release ptr-libevent@0x7fb36801a4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36801d710 | #682 spent 0.0638 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #682 connection "road-eastnet-nonat-149" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348039e80 | handling event EVENT_RETRANSMIT for parent state #620 | start processing: state #620 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #620 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-63" #620 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-63" #620 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.226669; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.973822 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36801d710 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #620 | libevent_malloc: new ptr-libevent@0x7fb36801a4e0 size 128 "road-eastnet-nonat-63" #620: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.63:500 to 192.1.2.23:500 (using #620) | 0c 12 15 e7 a2 ca 8d 0b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 3f 5e 3f 99 f7 2c cd 5d 9d 10 28 3d d6 eb 5d | d6 70 92 22 81 10 39 84 c3 22 a4 4b 22 26 4e c3 | 43 c3 37 59 00 1d 7e 63 45 c0 26 a8 98 4a b1 47 | c1 33 a4 a4 90 f5 4b 5f 23 ab b3 25 78 4e f7 a4 | f5 a4 93 56 5e 09 41 80 4c 5b e0 55 80 1b 24 4e | aa f2 33 07 2b 18 44 d7 f2 64 d4 1c b4 47 33 ae | d6 d7 60 0c 88 02 96 73 4b 3e e1 3f 8e 0f cd 2b | 4f 43 e0 dc f5 25 3d f1 3c 28 8e 72 59 95 64 7c | 38 6c b8 23 04 21 89 f8 a5 70 08 2e 75 aa 14 af | e8 5d 1a 6b 12 19 09 99 3e e3 e5 85 d8 78 ef 8d | 24 1e c5 bf 13 b7 ef 62 4f 9a 47 1e b2 de 4c a2 | 66 69 d3 df fc f2 1b e9 88 8e 7d 9a 64 f1 c5 88 | b5 0e 03 d2 24 45 b0 15 4d 1f 26 ae 6d 58 30 94 | ad 64 eb 3c 81 d9 0e 5a e4 30 43 31 ff 25 8a 7d | 43 87 60 41 58 98 d9 b1 94 9c cb 6c 2b f6 03 9e | 5e 6f 4d 36 24 f7 c6 bf 51 85 e7 d4 54 b0 61 7f | 29 00 00 24 e6 bf 33 37 4b e1 e6 6d 80 47 43 de | 67 a6 13 22 fb fc d2 c4 87 31 c8 58 f0 30 ac 5f | e0 4a 7b ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 41 62 8d ec b8 5e 72 37 70 1d f8 | 93 d1 d1 32 a2 e2 38 e4 00 00 00 1c 00 00 40 05 | 9f 9a 22 83 1f 86 8c 5b a2 81 5b 71 ab 0e 9a 59 | 82 5d 35 a1 | libevent_free: release ptr-libevent@0x7fb34802a670 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348039e80 | #620 spent 0.0645 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #620 connection "road-eastnet-nonat-63" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c039e80 | handling event EVENT_RETRANSMIT for parent state #652 | start processing: state #652 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #652 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-145" #652 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-145" #652 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.226741; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.976111 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348039e80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #652 | libevent_malloc: new ptr-libevent@0x7fb34802a670 size 128 "road-eastnet-nonat-145" #652: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.145:500 to 192.1.2.23:500 (using #652) | cf c2 13 dd be 13 c5 04 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 79 e0 0e 1a 26 5e 51 b7 a5 4e b3 11 14 4a 1a | 6b 96 3d 3b 24 26 a6 e1 89 0f fe 91 a7 c1 7a 45 | 26 cd 35 4b 8b 6b d6 67 91 8f b2 00 fc d7 fa 63 | 2b 58 54 f9 c8 77 8f d8 2a 48 b5 10 ef bf 28 f5 | 2b 01 2a b5 18 43 7b d2 1c 14 72 04 8a f2 52 ba | 8b 62 38 7c 84 16 57 0c 23 dd 5f e1 6d 4a 6a 89 | d0 08 7c 20 3c 72 d9 e8 1e 21 18 8e 13 54 9f 91 | d8 28 dd 9e 63 28 ad b3 cc 26 3f ce 02 f8 0d e7 | 43 fe 79 b9 17 32 6b 1f 49 79 5c 97 67 4f 3a 29 | c2 8a 0e 49 84 d5 bf 8e d2 4f bc 6f 4f 9d 2d 18 | 2f fc 66 90 24 12 d6 64 7d 6c 9d 94 39 e8 e1 57 | f1 94 1f 02 5b 88 4a 35 7d 48 05 cc fa 83 14 b9 | dd e0 c2 0e b0 3a 8a d8 a2 1c f4 35 ef 16 28 20 | 4a cf 5a 27 76 56 8a 88 e6 05 ec 34 f1 7b 00 b3 | 84 e3 67 51 85 c2 15 5b f0 1a bb bc c2 65 21 ca | 2f a8 c5 a1 e4 74 bb e7 a4 40 7f 41 4f 5a 73 b3 | 29 00 00 24 a4 50 57 9a 3a 57 4f 84 97 47 60 cc | 90 ef 4f 57 df 90 96 08 71 29 36 b2 5c 92 88 88 | e1 f8 f5 c6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da c9 d5 de d7 08 a6 7f d2 6a f3 9f | 8c b9 dd 2d 2d b7 3d 20 00 00 00 1c 00 00 40 05 | ff d6 25 67 d8 96 d1 7e 81 61 53 f8 7f af e4 0b | e5 df 07 44 | libevent_free: release ptr-libevent@0x7fb37c08aed0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c039e80 | #652 spent 0.0629 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #652 connection "road-eastnet-nonat-145" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a92f40 | handling event EVENT_RETRANSMIT for parent state #555 | start processing: state #555 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #555 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-133" #555 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-133" #555 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.226813; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.94641 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c039e80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #555 | libevent_malloc: new ptr-libevent@0x7fb37c08aed0 size 128 "road-eastnet-nonat-133" #555: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.133:500 to 192.1.2.23:500 (using #555) | fd 31 e4 af 59 3e ae 30 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 85 72 9c cb 7c 09 f8 23 fb f5 57 cd 4e 83 b6 | a0 e6 5a 64 5e 52 19 6a 4f a7 4e e3 ab 51 d1 ee | b0 ba 52 7b dc b8 e2 a2 b5 3d 66 0c 60 98 2f 4f | 13 c0 96 12 cc 2c 3a 0e e9 91 83 23 1e 4e 39 c6 | 9f d6 0d da 47 3d 42 93 4d 91 c2 2f 26 04 15 c3 | 41 c4 f8 0a d7 03 ee 39 9f 96 ac c4 3e 56 6c 05 | 15 ec 80 86 ac 76 e0 e4 08 62 35 f8 6c eb 25 c5 | 19 28 f6 9a dc 30 d8 8a 67 5e 34 70 48 34 07 96 | e2 ab 1c 7f d5 2c e0 8a 96 fd 4e 98 8d 6c aa ee | 67 4d d3 dc 1e 6c 3d db a0 95 a1 d5 a6 74 27 2f | b7 3e e6 fe c4 ac 66 d7 25 d1 4f 42 90 09 08 6d | 35 3d 9b fe f1 b0 50 00 be c3 ae db 45 71 57 2d | 99 1c ee 2e fa c8 1e 96 ae 9a 9e 66 4e ff 6a a6 | 84 c5 c3 4f c1 1f de cc 77 17 f0 b0 1e 9a 28 0b | 55 f0 78 ac 8b b4 71 fc 1a 17 41 e7 6a 74 62 62 | 3d 84 68 6d 3f ac fc 48 f6 30 13 2d 70 6e ad 53 | 29 00 00 24 71 32 1e 88 23 ee 2f ae 39 9e 7b 59 | 41 2e 3a 0b 57 4e 0c 80 35 cd a7 35 65 8c e6 b2 | f1 87 a1 b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 53 72 74 e1 5b 37 7b 33 b0 17 78 | c1 64 62 a5 7c 42 0a ec 00 00 00 1c 00 00 40 05 | ff 46 61 3e 66 71 bd af 2e 4c 91 0c 25 ae 93 92 | d3 06 93 2d | libevent_free: release ptr-libevent@0x7fb370069fb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a92f40 | #555 spent 0.0636 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #555 connection "road-eastnet-nonat-133" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad17c0 | handling event EVENT_RETRANSMIT for parent state #666 | start processing: state #666 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #666 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-141" #666 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-141" #666 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.226885; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.975336 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a92f40 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #666 | libevent_malloc: new ptr-libevent@0x7fb370069fb0 size 128 "road-eastnet-nonat-141" #666: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.141:500 to 192.1.2.23:500 (using #666) | af 55 d1 c9 76 35 30 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c a3 85 78 4d da 5e d0 32 3e 9d 3d 1a 3d d3 8c | 75 15 1f b6 cd 02 be d3 50 94 f0 58 88 ee b8 fc | c3 9d d9 05 29 33 e6 db b9 03 a3 91 03 b9 32 e2 | 8d fb 3b 7d 1c 57 d3 23 cc ff 02 0a e8 64 c5 f1 | e9 72 3f f6 5e 2f 3d 0a 9f 40 47 53 42 c4 5a 15 | 56 44 cd da 2b f5 35 b4 37 9d 04 5d 25 e6 c0 9b | b3 63 e8 21 ae c1 4f bc fd b7 b4 1b 32 47 ef 1c | 87 37 97 c0 17 13 75 a3 52 27 4c 6b eb 0e 51 30 | d3 3f 38 9d 4d 1b e4 dc 3e ff 0a f9 c7 c5 15 46 | 17 54 ca 31 e4 f9 c3 f7 5a fe 09 54 b8 94 74 b2 | b0 37 00 fa f9 27 9d 2b f7 90 e1 a7 8d f1 47 7f | e5 3b cd 7d 99 d8 c5 f7 ca ba 6e c7 10 b5 29 30 | dd 2c 8d e4 5c 1c f8 af 25 ac 3f 4d c8 75 38 48 | f5 61 6b ae 49 2f 44 0d d2 eb a5 27 c3 0a b7 53 | 3e b0 4a 01 d2 cc 09 c9 d4 f8 e4 3d 8d 15 85 bd | 63 cd 9a fe 1f 70 56 b3 af c7 75 be 72 96 94 7b | 29 00 00 24 de 7e cf 42 4e bf 8e d5 7b 3b aa 12 | 1e 0d 89 09 17 65 63 a9 70 48 ad 13 bd 01 8c 63 | 96 2c 21 7c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 21 75 3c af 69 72 49 98 23 f2 8c | f4 76 7b 19 c1 d1 00 01 00 00 00 1c 00 00 40 05 | 6a 1a 2b ed 94 cf f9 2f b3 a8 2d 85 01 1b c3 59 | 84 9c 27 2f | libevent_free: release ptr-libevent@0x7fb388064e90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad17c0 | #666 spent 0.0717 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #666 connection "road-eastnet-nonat-141" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0bf40 | handling event EVENT_RETRANSMIT for parent state #546 | start processing: state #546 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #546 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-173" #546 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-173" #546 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.226971; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.944173 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad17c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #546 | libevent_malloc: new ptr-libevent@0x7fb388064e90 size 128 "road-eastnet-nonat-173" #546: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.173:500 to 192.1.2.23:500 (using #546) | 6b b3 b7 0f 25 55 d0 22 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6f 97 dc 92 f6 4f 2c 9f 64 e9 38 e7 a8 c9 b6 7e | 05 ff cf 3a 5e 05 b6 cf 17 cf 8d ed 48 a3 fa 9f | 24 a8 a6 41 91 3f 77 df 02 a6 05 bb e5 ab cd 67 | d8 25 b1 f3 b8 14 51 43 76 86 a6 c8 d3 ba b6 18 | bc 07 8c 01 94 c0 38 ea 24 cf c6 97 ad 4b b2 b6 | 6f bb 4c fe 23 3e c7 46 59 8c c5 fd 43 6f df ce | b5 5a 0d 2c dc 35 13 65 e4 12 f7 f9 80 cc aa 20 | b5 ee c7 5a 5a 70 15 d1 3f c3 8a 67 09 11 af 09 | 16 32 b4 53 41 90 67 c4 cd f6 da ec eb 5a 4a 3f | b2 29 22 df ae 11 4b 8d cc 3a 05 6f 94 4f ad 1b | d7 60 13 20 46 f2 cd 62 12 6a 44 77 94 47 13 c4 | e5 1a bb 0c f8 12 56 21 05 7d 6d 2b 8c f3 58 da | 44 da 7d 6f ce 51 7e 8b 6a af ad 31 4a 3c fd a3 | 30 aa 0f f0 5b 6a da 87 b0 6b 48 55 97 b6 71 a6 | 60 8f d8 d4 aa a0 85 a4 40 0d 91 d0 21 6b 4b 63 | 73 9c 09 ed c8 c0 5f 4c fa cd b4 f8 56 de a6 a5 | 29 00 00 24 ce 6f 16 bc f3 6d 4e 88 a3 1b 4b 4f | 8a 74 cd 2e 04 10 e5 12 90 b1 40 e6 d6 57 95 4a | 49 93 ce 51 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 df 2a 45 97 7e 21 38 1c 72 a0 dd 2d | 3c 55 6e 57 52 8e 65 fc 00 00 00 1c 00 00 40 05 | 34 35 71 3c 6d 6a 9d ce aa 0f 6d 3a 2b eb 4b 95 | 7e cd 31 4e | libevent_free: release ptr-libevent@0x7fb36c07d450 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0bf40 | #546 spent 0.0759 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #546 connection "road-eastnet-nonat-173" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374014870 | handling event EVENT_RETRANSMIT for parent state #690 | start processing: state #690 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #690 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-76" #690 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-76" #690 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.227059; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.989682 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0bf40 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #690 | libevent_malloc: new ptr-libevent@0x7fb36c07d450 size 128 "road-eastnet-nonat-76" #690: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.76:500 to 192.1.2.23:500 (using #690) | a5 d8 1b 6e 95 a0 38 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ca b3 24 9a 21 6f 60 b3 71 d4 ab a0 25 f7 eb d1 | cb b9 58 9d 93 b9 4d 31 b9 bf af f1 80 33 51 9e | b5 91 2a 1a 69 85 ec 97 c2 f1 f6 7b cf 0f 98 34 | cc f0 78 7e 20 72 ca ec c1 db 9d af c5 94 72 f0 | 9d 8a 9c 63 61 d9 79 76 b4 d5 ff b6 88 bc 5f 00 | f9 44 90 fd 47 4f 4d ef 33 81 b4 03 24 b2 94 be | 87 74 8d ec 7f 31 ff a0 b9 7a 06 f4 90 af 20 b4 | d9 9a 9c db df 5e de 7a 83 76 4f 3b f9 bd 20 fc | 39 b4 48 b8 7f 01 a8 08 13 de a8 58 cb b0 5a 11 | 7d 48 1d 19 b5 3b 92 c4 7a 09 9c bf 77 f3 7f 94 | 69 63 88 b2 cc c5 dd f2 df 7b f2 15 b7 7d d7 15 | 62 ec fa 8e 1d 1f f7 e3 89 53 47 50 af 55 33 77 | d7 34 f4 ef 07 86 c5 df 5b f7 cf 26 c2 e4 b6 41 | ba 90 ea 4c 75 6d 9b 74 97 2c 57 b6 c4 94 c5 0c | 7b 86 0a 36 9e cd da 67 90 23 e3 e4 2b 85 7e 93 | cf 87 12 15 81 f9 76 1c 9a 69 94 6a 02 3c b9 8e | 29 00 00 24 86 ae f8 9b 15 cc 78 e0 7f 55 66 22 | 35 e0 b7 21 54 8a fc 02 7b 9e 59 11 ce d8 be 06 | f0 76 9a e9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 b6 97 31 de cc 72 d4 ce 22 00 8a | 2b 89 e8 30 bf 2f b6 28 00 00 00 1c 00 00 40 05 | bf c8 d8 e9 c5 00 38 c5 98 1c ab d5 6d a7 2c 3e | 8e a5 66 03 | libevent_free: release ptr-libevent@0x7fb374054140 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374014870 | #690 spent 0.068 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #690 connection "road-eastnet-nonat-76" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34802ef50 | handling event EVENT_RETRANSMIT for parent state #709 | start processing: state #709 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #709 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-183" #709 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-183" #709 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.227134; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.994009 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374014870 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #709 | libevent_malloc: new ptr-libevent@0x7fb374054140 size 128 "road-eastnet-nonat-183" #709: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.183:500 to 192.1.2.23:500 (using #709) | e5 c7 07 55 6e da 09 55 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5d de 77 2e 7e b4 97 76 d0 4c 88 3a 79 73 30 47 | a5 46 d9 6c 5e f5 d0 01 a8 f5 90 31 3a c3 34 0b | 92 a1 bf c0 52 89 73 d2 41 a6 c8 7c 00 32 8c e0 | 61 01 06 67 0c 70 09 f6 a3 5b 63 77 2c c8 de bd | 50 05 fc 33 a9 33 71 99 83 df 95 2b 2d 8e 13 82 | 7b 7a 49 72 f3 f8 5a 2e 90 58 f7 40 01 a5 24 bb | cf b8 85 6e 52 34 58 c3 42 27 86 ff b5 01 d2 91 | e4 1c 23 fc f2 c1 af 9b 00 10 9e 1a a4 65 99 ca | fe 91 39 7f 9e c5 f3 e1 49 f5 22 78 d6 1e a3 72 | fc e2 3a 47 8a 3c d6 21 02 38 d3 6e 42 de b9 8e | 44 7c 9f 39 9d 77 79 b7 b4 a9 f9 4c f7 02 43 2d | 3e 2b f9 30 d4 a8 a6 b4 68 42 af 60 21 e7 59 96 | 67 d3 1f a3 61 53 50 45 15 9f 37 19 16 e9 8d ad | 1d 5f a6 91 01 82 07 22 2e f0 8d a4 82 14 28 84 | 82 79 d1 ee a4 a1 98 83 13 94 d9 2c 49 f8 36 3c | 29 2a 04 0d bf 91 91 f4 08 b0 48 0b b6 ab 6e 6b | 29 00 00 24 fb fb fc 22 69 7b 64 5f 88 e3 11 6e | bc 63 54 30 45 65 33 a0 dd 21 67 36 78 c5 19 65 | 52 ac 92 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 a3 44 a6 ca 0c 6a 2b 8c d2 4e 18 | f9 96 bb f1 fa 97 0c e7 00 00 00 1c 00 00 40 05 | 23 4f 11 65 7a 64 9b ff 7f 73 c3 02 6d 1c 2f c1 | e4 ed 89 d4 | libevent_free: release ptr-libevent@0x7fb348064130 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34802ef50 | #709 spent 0.065 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #709 connection "road-eastnet-nonat-183" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a46910 | handling event EVENT_RETRANSMIT for parent state #603 | start processing: state #603 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #603 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-94" #603 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-94" #603 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.227205; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.951215 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34802ef50 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #603 | libevent_malloc: new ptr-libevent@0x7fb348064130 size 128 "road-eastnet-nonat-94" #603: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.94:500 to 192.1.2.23:500 (using #603) | fa ea 40 d9 66 be 9a 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 92 c5 c1 75 76 e2 67 5a 25 6a 0b 6a 26 d9 00 | 60 88 8f a2 09 bc e1 34 ad d9 cb d7 8f 0c c9 fb | 5d 34 e8 7a 58 2c 44 52 32 ff f3 22 30 6c a9 46 | 04 15 9a 62 ca cf b2 db c2 74 ba 23 f1 4f 38 d1 | 41 e3 74 a5 ba b3 6d 59 07 f6 3b ea 03 a8 2b 84 | a0 ed 8d 1c c1 de 56 07 5d c4 0b 77 93 2f 7b 97 | 14 b0 d1 04 7b b9 0f f9 37 a9 bc e0 4a 4f 00 f2 | 2d 96 5a aa 23 a5 de 2a 49 0f d1 e1 16 3d 5e c0 | ad 4a da ab ad 5b 58 e6 5a 4f 98 f0 fc a6 f1 b7 | 23 d2 f2 3b e5 a7 21 e7 ea e1 cd 13 d1 70 91 3a | 21 85 1b c9 4c 39 e7 cc bc a4 f6 9c d6 c5 38 7d | 67 8f f8 b4 07 fc 7b 89 3f 70 75 29 51 a4 a4 f6 | f2 64 d3 35 1a 69 f9 96 67 39 7b ea 78 c8 ec c0 | ee f5 ef 8b fa 9d ea d8 61 b7 28 83 06 af 52 08 | a9 ac 31 1a a8 b0 a9 01 03 7b 63 e4 2e d4 f8 cd | 6a 2c 19 36 b8 74 36 aa da ff b3 99 0c f5 14 c0 | 29 00 00 24 c1 66 a4 b2 e8 08 5a f7 00 1d be e4 | 4b 24 90 f6 2d 3e 76 77 76 ca 57 42 50 10 a0 64 | 0f 04 48 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 e6 7e df 78 16 4d e7 97 e4 d0 17 | 4d c7 b1 fe f3 78 c1 ee 00 00 00 1c 00 00 40 05 | b6 73 08 f2 9b c6 7e f9 57 b7 a7 5f 43 dc 0e 73 | 16 6a dc 75 | libevent_free: release ptr-libevent@0x7fb3440646e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a46910 | #603 spent 0.0644 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #603 connection "road-eastnet-nonat-94" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368005860 | handling event EVENT_RETRANSMIT for parent state #599 | start processing: state #599 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #599 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-64" #599 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-64" #599 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.227277; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.954217 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a46910 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #599 | libevent_malloc: new ptr-libevent@0x7fb3440646e0 size 128 "road-eastnet-nonat-64" #599: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.64:500 to 192.1.2.23:500 (using #599) | 66 fe 40 6d 20 a0 8e c1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 14 ec 7e f9 cd 40 f5 de 65 65 51 82 b1 59 1d | e2 b1 19 0c 5f 42 c2 c5 f2 9e 9f 81 38 a4 92 07 | 55 02 a7 a3 99 20 d2 9d 43 eb 91 a3 1f f5 e1 6a | ac 0d 32 90 d1 6d 6d 3a 90 4a ce 17 12 9d 8c 47 | 7f 85 c0 17 84 a9 65 8a 07 e7 29 51 ac bc 5a bb | b5 62 41 b7 ff 6d 04 9f 02 f4 2c 6c 75 b6 4d e5 | ee 4c f0 36 66 9b aa 3a 2d 8d 7d de 94 5b 92 78 | f4 41 fe 7f 33 1f 2f 29 ac c1 15 b4 b6 4a 26 c7 | 44 40 c8 70 6a cd 04 43 6d a5 b7 76 59 c0 45 92 | 8f 55 81 59 a2 e1 56 33 98 b8 16 29 a8 ae fe 63 | 1b 33 5e 5c a3 3c 37 83 85 62 21 28 50 5e 0d 07 | 88 ad 15 73 a5 30 b6 de 4a b6 16 ba 2b d9 18 62 | cc bc 5b 60 dc b9 95 66 a2 af af 8b 80 0e c8 c3 | 2b ea da 66 ba 0a 43 87 f9 ca 7e 08 04 24 6f de | b2 f8 b8 8f 58 ce 58 e7 2d 3c 4f 86 18 6d 41 84 | be 0d 41 9c cb 28 5c c2 7a fb af 81 ec 08 20 4d | 29 00 00 24 da 51 a7 0b 53 11 86 4b c3 b4 4e 3b | f4 a2 e2 0f d9 7b 58 4a f2 c9 2a af f2 68 7d b8 | b9 d1 af 67 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f5 33 56 1d 93 89 b2 9c ef 86 78 c9 | a2 2d bb 3b 37 fa f6 3c 00 00 00 1c 00 00 40 05 | 92 86 b4 ce 70 36 ee dd 1a cd 75 09 22 54 37 7b | f9 8e 38 96 | libevent_free: release ptr-libevent@0x7fb35c0bc1e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368005860 | #599 spent 0.0644 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #599 connection "road-eastnet-nonat-64" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad6ec0 | handling event EVENT_RETRANSMIT for parent state #678 | start processing: state #678 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #678 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-41" #678 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-41" #678 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.227349; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.990599 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #678 | libevent_malloc: new ptr-libevent@0x7fb35c0bc1e0 size 128 "road-eastnet-nonat-41" #678: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.41:500 to 192.1.2.23:500 (using #678) | 6f 4b 14 c1 cc 6f 1e 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2e 9f 0d f0 04 66 77 dd 93 01 97 d4 e6 2f 63 32 | 08 d5 90 21 20 45 70 7a 23 d4 d5 21 f2 1e 5d 61 | d1 38 f7 cd 0d a7 dd 8c 8d 4e d1 19 04 72 f0 60 | b9 a1 be 10 b3 d5 d9 6f 71 a4 43 ab d4 47 03 ef | 16 17 71 a7 79 4c e1 97 0b 36 26 91 25 a7 46 06 | 06 c6 86 a0 3d 48 06 59 81 9f 8c 4f 63 ff e7 cb | 43 e1 16 d1 2e 14 d6 59 c4 4b 03 1f 4a 2a b1 68 | 2e 3a ca a3 c0 9b ec 0d 92 cb 4f d7 26 c4 23 f2 | 7c d5 4f ba 74 f9 b7 a5 8e 7b c3 80 00 1d 25 ca | c8 b6 e7 a7 82 b3 c1 78 86 73 3b e9 bb cb dc 9e | 16 a5 8a cc 34 90 c8 2f 6d 13 78 e8 e7 19 45 83 | dc 57 56 49 3f bf 58 bc b2 bb f5 33 21 2c 25 1f | a6 7d a4 87 88 3d f9 0c 01 74 fa ba fa 6a a3 ea | 56 23 6e 54 12 c1 f7 82 be 6d 43 68 51 8c 0d be | 08 4b d8 2e 8d 59 7c 26 08 c9 1c b1 04 3b b0 54 | bc 1d c3 bf f4 25 5d 1b 85 94 1b 71 be ed 0f 44 | 29 00 00 24 4e 75 ec 55 47 ad 1d d0 2c e8 2a 32 | 3b 96 41 fb 18 33 b6 2f 27 93 6f d4 fa 16 90 bd | 2c 77 4a 81 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 38 05 46 29 58 72 8b 7e ef 72 dd | 2e 27 17 90 79 5b 4e 74 00 00 00 1c 00 00 40 05 | 18 2e f1 a2 ca 0d ed 2f 55 5d d8 98 ad 86 50 39 | 38 85 67 2b | libevent_free: release ptr-libevent@0x7fb38805f660 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | #678 spent 0.0628 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #678 connection "road-eastnet-nonat-41" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb338012bf0 | handling event EVENT_RETRANSMIT for parent state #567 | start processing: state #567 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #567 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-130" #567 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-130" #567 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.227419; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.934645 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad6ec0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #567 | libevent_malloc: new ptr-libevent@0x7fb38805f660 size 128 "road-eastnet-nonat-130" #567: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.130:500 to 192.1.2.23:500 (using #567) | 96 df 1a f7 12 b2 bc 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0c 62 fd af 90 2b d8 09 e9 e2 92 5c d3 5d ff be | b8 74 9f 04 03 97 8e 9b 87 54 08 07 bc 69 63 5c | 4f 7e 94 26 99 2b 45 4b b4 3e 6a bd e9 bf 50 b1 | 32 c2 e1 9e 38 52 46 f5 f2 58 78 3e 50 20 3a 74 | f6 e9 d3 83 40 c0 04 2b de 3a cc cc 33 57 e8 e4 | c3 b8 f3 a1 07 1c a7 aa 33 bf fa f1 88 41 d1 8f | 1c 54 38 a4 0f a0 74 99 19 cf dc f3 37 2e 9f 7d | cb c6 ff 33 e7 c4 87 6d b4 fc 2c f8 0b d2 97 fc | 95 94 a8 fc c3 8e 19 7e db 7c 13 30 0e 23 df 10 | 95 1c a4 5e cb 4f f7 55 14 48 f9 01 0e 0f 65 55 | b2 e9 d7 a8 7f 12 ac 8a 4e 27 61 a0 92 a0 7c e2 | 06 89 a0 28 48 73 b2 44 05 78 cf b7 27 b8 cb 46 | e0 4e 1d 1b 19 80 1b 07 1b 7f 13 f8 83 25 91 17 | 55 8a 26 9b 93 51 86 39 92 c7 48 b5 62 5f c4 da | 35 11 c7 be 49 10 bf 43 bb fd 6a b1 b8 23 97 53 | 03 3d 3d d7 05 a5 04 a6 4b fd 36 20 d4 50 2d 15 | 29 00 00 24 2d 33 44 b7 62 bd a9 aa c3 a6 92 61 | ee c6 40 8f 89 af c2 08 6b d9 9a e5 24 30 97 38 | 3e b1 2f 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 cc 91 ff 67 bb 9d ba 9d 71 c8 73 | 66 2a 2a e8 17 18 8e 7d 00 00 00 1c 00 00 40 05 | 5f 92 72 26 a0 e4 d9 83 b3 70 5e 9c 4e 05 aa 9e | 38 2c ea d4 | libevent_free: release ptr-libevent@0x7fb3740750d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338012bf0 | #567 spent 0.0646 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #567 connection "road-eastnet-nonat-130" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c005860 | handling event EVENT_RETRANSMIT for parent state #675 | start processing: state #675 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #675 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-172" #675 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-172" #675 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.227492; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.981026 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338012bf0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #675 | libevent_malloc: new ptr-libevent@0x7fb3740750d0 size 128 "road-eastnet-nonat-172" #675: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.172:500 to 192.1.2.23:500 (using #675) | 85 15 01 85 89 d4 29 eb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 27 d4 44 6c 1a 22 e8 b4 f7 a6 6b ca dc 02 79 50 | 66 16 b2 bd d5 ad b1 28 e9 83 fb 87 0f b0 39 1f | 85 0a 4c 67 84 5a 26 d0 a8 55 ee 04 95 94 30 6a | 8b 2f aa d3 6a 76 aa f6 4f 30 a2 ed 90 5e f2 5a | 20 ad 0c 4f dc 59 2a a9 a0 b9 a8 76 de cd 23 64 | 4f 9a 8d b3 29 80 5a c0 ac 02 65 83 3e 73 4f af | 83 bf 4d 9d d9 08 a6 6d 2b 14 3d dc 93 82 28 2c | f5 61 0c a2 f1 30 b4 2b 77 cf 96 6d fa 79 62 e9 | 63 f1 85 76 cb bf 4a 7a a7 6e b2 0f d2 81 ef 19 | 8b 21 8c b4 9f 3f 24 a6 9f da 8c 47 53 28 64 05 | fb 7d 95 f0 ba d8 43 62 9a ae 0b 9c e0 5c 3a fb | b4 7a 35 d6 09 67 28 a4 a9 e9 29 a4 8a 02 01 83 | a9 7a 2f c2 42 8f 69 ec 36 92 a5 62 86 bc 6e 90 | 30 c1 46 27 0d 35 15 d4 e6 60 3d 5f 12 ff d2 11 | 5b 76 4e f3 c6 f5 a0 f5 20 2c fb d4 41 40 b5 03 | 62 81 86 c6 eb ed 0a c9 13 24 16 5c 02 3b c0 ee | 29 00 00 24 9e c2 e6 fc 35 e6 0d 46 d5 b0 34 c9 | 0e 50 aa 4b 78 0d 91 95 d1 89 b8 a7 4b 5a cf a5 | b3 98 e6 f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 95 c1 ac 8a 35 e1 18 af 1b 41 18 3d | da f3 7c 9c 54 2f 3c 44 00 00 00 1c 00 00 40 05 | 3b bf 96 55 32 21 74 25 91 ac 0c f9 c5 3a d7 f4 | 94 b6 78 27 | libevent_free: release ptr-libevent@0x7fb380075050 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c005860 | #675 spent 0.0643 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #675 connection "road-eastnet-nonat-172" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2e150 | handling event EVENT_RETRANSMIT for parent state #589 | start processing: state #589 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #589 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-55" #589 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-55" #589 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.227564; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.951091 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #589 | libevent_malloc: new ptr-libevent@0x7fb380075050 size 128 "road-eastnet-nonat-55" #589: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.55:500 to 192.1.2.23:500 (using #589) | d3 af ea 9d a0 c8 f5 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 85 de 4e 18 e6 1e 19 90 6b f7 90 15 af f6 7b ab | 4e c8 ce d7 0b 8e 81 b9 f2 4f 1d 4f 5c 24 63 06 | 65 52 bc 5a 83 ff 1b 21 cb 72 47 f8 8a e5 91 bf | 57 3c 5e f9 8a 0f 69 ef dd 9a d9 96 96 d3 e9 53 | 62 6d 85 78 9c cd f3 37 3d c3 3f cf 12 49 52 71 | f1 91 04 7a b7 09 2f 96 56 e2 dd 46 62 33 b5 bb | ad 3c f9 d1 69 f8 6d d3 fc 9b 28 0f 28 e0 3e bf | f2 8d 28 0d c0 bd 56 d2 fc f5 11 53 c5 5f 98 5e | b5 0e 16 d8 79 1e 33 2e 4d 24 12 5b e7 2c e3 82 | 41 23 5b 9c d9 c3 1b 4e c2 1c 19 6a a5 1e 04 2e | 8f c8 de 18 5d d7 71 bd 41 ae f2 b5 79 ea 41 40 | 17 cc b2 ac f4 29 ea 95 03 3b 8a b9 65 ec 40 16 | 4f a4 1c c9 6c af b5 25 5c 3f 1a 3d 18 fe 4c 4f | 96 cd 0e a4 e1 ca 37 96 3c 03 bf a5 07 0a 64 5f | 91 2f ea fc 4d 6d 98 68 7e 74 f7 83 b0 39 d7 b8 | 05 fa 66 7a ad 18 d9 82 14 ae c6 e8 1d a4 b3 22 | 29 00 00 24 8c a0 dd 88 ca d4 16 c6 d2 19 83 fb | 91 96 4d 43 b6 4d b2 a0 b1 2f 06 3d 0c a8 88 7c | 52 87 c6 7a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 18 52 21 ef 0c fd d6 a8 97 22 3e 1c | 84 a2 1f 0e d5 18 e7 d5 00 00 00 1c 00 00 40 05 | 1e 9e 9c e9 d7 26 c7 2f ea de f3 cf 5b ae 57 9b | ea f6 3e d1 | libevent_free: release ptr-libevent@0x7fb33807fef0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2e150 | #589 spent 0.0632 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #589 connection "road-eastnet-nonat-55" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb360018460 | handling event EVENT_RETRANSMIT for parent state #663 | start processing: state #663 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #663 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-84" #663 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-84" #663 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.227636; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.982121 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2e150 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #663 | libevent_malloc: new ptr-libevent@0x7fb33807fef0 size 128 "road-eastnet-nonat-84" #663: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.84:500 to 192.1.2.23:500 (using #663) | 79 3e ba b8 29 05 87 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 33 bb 34 f3 54 37 c7 8c dc a0 f1 cf 40 e8 73 | 4d 61 cb fb 80 2d 1a 01 88 6a 8b b8 01 53 25 2c | 65 96 5d ff d7 d3 f4 f3 eb de 8f 2e 9d 25 1d ba | 62 be 02 e6 a1 b3 d0 12 26 cc d4 67 6f 8d 33 f6 | fb 60 8a a9 03 0f c4 ae 02 35 7b 99 4e e1 16 a5 | ee d3 5b b1 65 88 dc 22 5a d0 4d 4e ee 2c c0 24 | 46 97 dd a5 48 e2 b0 56 80 9b bb 68 ed b6 e4 a6 | 82 5d 86 21 c6 56 4f 00 61 9e 48 83 5d 1c ae 1e | f0 fe e0 f9 d0 af 09 19 1a e7 0d 36 81 b4 ef 45 | fc 89 2f 75 93 ae b9 f0 57 e7 58 2b 67 f7 d7 fb | e1 1e 09 48 c7 72 2b be da 88 0d c9 88 d7 8e 37 | df a2 95 e3 05 1c 20 c9 19 12 4a a3 c8 92 ca 0d | 93 be b7 87 ef 2b 8a 9c d5 f2 5d 84 18 5e cd 93 | c2 8f 56 ff 9f 94 a6 a4 04 ca 9a 36 29 04 c1 ac | 0f c7 63 2e 86 54 2d 98 d7 53 7a 9f fa 34 32 25 | 82 89 27 91 24 d9 51 66 79 76 cf e8 c1 b8 34 a5 | 29 00 00 24 f2 12 89 96 be 24 7d dc 10 f3 fa c9 | 66 8f fc 3d 79 cf 4b f7 e2 58 a9 f9 9e 41 92 7e | 29 7a 39 ee 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 49 16 1d 85 03 57 22 43 2e 01 a2 89 | 42 fd 2a d3 68 48 40 6e 00 00 00 1c 00 00 40 05 | 88 4c 7d b9 50 dc 42 1f 7a 10 6e e7 7e cd db 07 | b5 a9 ee e4 | libevent_free: release ptr-libevent@0x7fb3540597d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360018460 | #663 spent 0.0636 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #663 connection "road-eastnet-nonat-84" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a56dd0 | handling event EVENT_RETRANSMIT for parent state #565 | start processing: state #565 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #565 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-51" #565 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-51" #565 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.227707; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.931636 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #565 | libevent_malloc: new ptr-libevent@0x7fb3540597d0 size 128 "road-eastnet-nonat-51" #565: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.51:500 to 192.1.2.23:500 (using #565) | 62 cf 87 14 c6 62 30 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1b a0 88 20 e4 4d 45 6c f9 cd ab 1d a2 7b 8a 77 | 3f 3e dd 83 a5 c5 aa 0c 1c dc 89 10 ec 2e 1d 4c | 42 5c ef 6d ad 49 b0 1e 60 9d 8f 8c b6 97 91 1e | fa e2 a1 97 aa fe 08 0f d1 4f 8c 96 f7 66 97 1c | 6e fb 33 4a 4e 60 96 cf 7f a6 af 09 ab ce 9a 08 | 5e 64 35 ec 21 8a c2 bd 2b 50 c9 95 3c df 67 bc | 76 c2 a3 99 52 f2 44 a3 ba 7f 1b 9c 6c be 57 71 | 7f aa ab d0 89 27 ef cd 3c c8 cb b6 a6 56 b0 2a | dc 32 81 f2 b0 96 30 77 84 9d 47 bf 9b 70 ae 9a | c7 54 8e 37 07 9a 5c 45 ac fb 14 0f 30 d7 f4 3e | 00 53 c5 25 30 e9 b3 2b a7 d9 d6 c7 f1 6c ee b4 | 31 ce 1b b5 18 a7 ca cc 86 23 9e 01 75 cb f1 23 | 0c 74 c8 3b 22 ea 10 cb 1f ed bd 4b f5 15 a7 9b | 8d e7 27 21 43 d9 02 bf 4e 4f 28 80 57 9a 76 c3 | 87 dd 7c 2f d5 cb 47 73 51 a8 31 7d f5 87 87 1b | 7f 53 02 3e d3 de e6 6a 94 c6 04 77 83 8c 4f 18 | 29 00 00 24 73 13 83 30 bb ab 6e 91 50 8f 5b d1 | 22 88 91 f8 87 52 43 c0 f4 4c b0 a5 9d 49 2d 93 | 43 f4 73 8a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c1 96 b5 11 12 39 51 2e 15 f5 5b 59 | 6a a7 e2 36 4b 38 a6 bf 00 00 00 1c 00 00 40 05 | b3 11 8b 4a 03 6b 06 af b5 74 1c 0f df 6e b1 a0 | d3 aa 16 5d | libevent_free: release ptr-libevent@0x7fb38407bf50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a56dd0 | #565 spent 0.0657 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #565 connection "road-eastnet-nonat-51" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348012630 | handling event EVENT_RETRANSMIT for parent state #680 | start processing: state #680 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #680 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-111" #680 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-111" #680 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.227781; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.990735 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a56dd0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #680 | libevent_malloc: new ptr-libevent@0x7fb38407bf50 size 128 "road-eastnet-nonat-111" #680: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.111:500 to 192.1.2.23:500 (using #680) | f5 24 ca cb ba 88 21 d6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 2c 8a fa 61 5b dc 75 21 43 9c 59 cd 19 1a f2 | af b9 0a dc 0c b9 2c e2 bb 4a 6d 4d 55 00 0f 6d | f7 55 26 a5 be c3 6b d0 d6 97 e8 89 bd 9b af d2 | 2f a7 07 fa cd 16 db 98 51 25 2f 47 ee 80 b4 75 | e5 4e c2 eb f9 dd 90 41 c4 eb ff 65 55 5a 16 e1 | 0a 63 9d 2c a4 d7 be 5f bb 29 e9 20 d4 b4 c6 c0 | 19 93 f4 ab e8 7c 18 0f 67 18 9d b1 ee e2 c4 b3 | db 86 22 91 09 29 2e b1 6d 58 cf 74 cb b0 f3 dc | 97 d9 3b fe 88 19 02 5d 3d 14 58 0a 5f 84 05 fc | ca 52 61 f1 b4 87 0b 56 9d 30 94 86 cc 24 e5 40 | f9 97 d9 e9 cb 69 4b 23 cf 2e bf f3 2b 4d 07 51 | 51 02 3a d7 fd 40 d4 5a a1 f4 0a 03 09 91 da ee | 03 72 0d 0f a8 f4 7a a3 cc 70 63 19 72 ce 5a 82 | 3e 1e 95 5c 92 5c 3e 8e a5 d8 b6 96 00 19 c5 14 | 30 e1 2f b7 0e bc 81 b8 ab b7 09 95 46 2e c8 74 | df cd ec 80 52 5f c9 db f8 06 24 81 85 22 9d a7 | 29 00 00 24 a5 87 f1 2f ce 48 12 7d 6a 67 59 4f | 79 27 34 b3 a6 cd 32 d2 99 ca 81 34 03 a5 ff 6e | 74 fd e5 cc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 d0 80 55 09 28 92 96 a1 13 47 05 | 9d f7 2b dd b4 58 66 92 00 00 00 1c 00 00 40 05 | 6d 86 77 16 04 78 0f de 20 5d c4 c9 23 72 82 0b | af 53 d4 25 | libevent_free: release ptr-libevent@0x7fb37407a8b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348012630 | #680 spent 0.0648 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #680 connection "road-eastnet-nonat-111" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c017ea0 | handling event EVENT_RETRANSMIT for parent state #673 | start processing: state #673 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #673 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-152" #673 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-152" #673 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.227853; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.990076 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348012630 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #673 | libevent_malloc: new ptr-libevent@0x7fb37407a8b0 size 128 "road-eastnet-nonat-152" #673: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.152:500 to 192.1.2.23:500 (using #673) | f4 4a f0 3d b4 3d 3c 25 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 15 2e 28 e0 6e 6b 91 36 e9 7b 5c 4d ea 67 f2 11 | 6c 53 9b eb c8 50 22 a6 67 a8 57 27 ba 98 9b b4 | e9 53 e2 e7 39 12 9d 1a b8 95 df 50 89 b9 6d 1c | c2 85 59 43 95 c8 ac 8f 53 d2 47 55 bc 74 a8 bb | 28 f3 ba 97 8e 1e f2 17 85 ea 84 b3 be 86 51 d1 | 91 38 40 54 bb 85 c0 e0 e5 d5 70 2b c4 39 db 6d | 4b 3d 95 a6 d5 18 36 7a df 3f c0 b2 8e 51 36 6a | ef 02 e1 00 c2 a8 6e a9 10 12 26 9a ee db 58 a9 | ab 3b 04 78 41 3a 3f 8b ee d2 5e 48 4b 71 7d f1 | 52 f8 9a 0e eb 76 58 35 11 da 4a 05 95 53 81 71 | 78 25 df 02 2e c1 be 80 18 4a aa ee 79 3d 23 07 | d3 1a 11 f7 6e 6b 01 33 c3 1e bd bb f0 b7 41 e4 | 2f ff af 8b 2b 73 a4 f1 55 39 a1 c2 31 b7 e5 bc | 14 4f c1 d1 0c 4f 37 65 44 1f 1f 08 6a 1f 2e 2c | 11 ed 27 fa 13 cf d7 f1 1d ea 05 12 6d df ec 05 | fc 26 9c 3b 34 42 df 39 1d 37 77 1c be a4 76 ec | 29 00 00 24 ab e5 f6 4a 5c 04 aa f5 86 05 1c 45 | 9d 40 23 0d 87 34 72 f6 2c d5 7d fe a7 24 93 f6 | e4 ca 8b 59 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 0f 59 d6 bf b6 98 37 0c 06 6e b8 | 72 17 35 a4 3d ff 36 60 00 00 00 1c 00 00 40 05 | da e9 98 a0 13 2a 7f 02 39 d7 88 7e 43 33 16 b8 | 3d f0 bb d6 | libevent_free: release ptr-libevent@0x7fb378068430 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | #673 spent 0.0633 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #673 connection "road-eastnet-nonat-152" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aa34c0 | handling event EVENT_RETRANSMIT for parent state #694 | start processing: state #694 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #694 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-229" #694 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-229" #694 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.227925; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.989687 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #694 | libevent_malloc: new ptr-libevent@0x7fb378068430 size 128 "road-eastnet-nonat-229" #694: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.229:500 to 192.1.2.23:500 (using #694) | 0e 55 f5 b3 fd c8 f6 ce 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 66 f5 ee 55 73 5c 37 78 44 5f 18 4c b2 81 47 42 | ae 69 a9 34 a8 d4 9d 0b 90 c1 b1 7e 21 7d 72 4c | 54 93 20 2a f2 92 1d d4 f8 1f 47 36 29 d3 1b 6f | 9a 19 dc 80 ff 6e c6 91 f9 df ed 9a 62 30 f5 01 | b8 f1 04 a3 53 8d 38 fe 98 e7 59 ff 4d 11 d1 c2 | 74 10 60 78 7f 69 54 ea 74 e4 4a 27 75 1a 31 77 | ef a3 4e c6 65 ff d7 27 b4 5e d2 ff 26 bd 65 43 | da 2a 0b a3 b3 5c 1f d0 f9 5c ec 9a e3 39 79 a7 | e1 b2 2d d0 86 12 11 06 eb 7c fb f5 44 48 fb 7a | 82 16 10 84 83 c7 1c 9c d8 e9 3c c6 7c 4a 9b 09 | 70 75 2c b6 29 44 4a 9d e8 e2 23 11 a1 c0 82 38 | b5 09 f8 00 84 ef 12 3d 23 43 5b 89 e5 8c ce f8 | 8e 3c ab d2 ca bf 1f 50 d6 c2 77 f8 1b a3 3e 00 | 3e 0e 9a 9d 92 de 61 1c 3d 11 7b 3b 3b f8 ec 76 | 6c 1a de 42 6f 88 09 08 2c 91 63 7d 68 40 9a 06 | d8 f1 66 a0 3a 37 85 ba fa cc 00 41 c2 2c a4 8e | 29 00 00 24 dd 94 ae 1a 9a 0b 75 c4 7b 33 4c 19 | 1c 5a d2 2d 58 3e 32 91 a4 73 44 86 a8 08 b2 01 | fb 46 4f e2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 49 27 31 06 cb 4b e9 70 41 8f 8b 42 | 1b a5 d4 66 19 e2 60 f0 00 00 00 1c 00 00 40 05 | 17 ce fc 1b 0a 11 3f 06 90 32 ce 1d 91 fd 6a 88 | d4 bc 2d 95 | libevent_free: release ptr-libevent@0x7fb38808b5b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa34c0 | #694 spent 0.0643 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #694 connection "road-eastnet-nonat-229" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb338017ea0 | handling event EVENT_RETRANSMIT for parent state #686 | start processing: state #686 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #686 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-142" #686 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-142" #686 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.227996; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.993383 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa34c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #686 | libevent_malloc: new ptr-libevent@0x7fb38808b5b0 size 128 "road-eastnet-nonat-142" #686: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.142:500 to 192.1.2.23:500 (using #686) | 5f 2e 8d 4e 01 51 f9 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd 75 c3 99 94 d0 49 6c f2 41 a1 b9 21 f5 f4 0f | cb fa c4 3c b6 ed 66 7c ab e3 f2 e8 2e 27 12 8a | 22 59 ec f0 2a 87 a3 8e 7d 1a b5 1d 4d 94 79 69 | 0a dc ad bb 09 9e 15 d3 e2 0b 37 2e 62 3a 5c 44 | 5a 6a 13 ea 8a d9 81 e1 06 22 79 83 c5 03 93 eb | 16 80 9f 99 2a b4 9e 4f 75 89 1d 81 11 99 98 ea | 06 e5 44 c5 95 02 6e a5 42 20 16 09 35 8d c1 5f | ad 15 d5 1f 1f 57 05 88 ea cc 92 ed db 06 fe 1a | 82 63 44 2e 13 aa 34 76 7f e6 11 5f 8c 80 0a e5 | 8d 1a df 42 51 89 87 1a fb 90 a6 5f e4 9a dd a4 | 37 21 fb b9 b1 e3 09 83 44 2b 65 7d 43 06 5b ba | 59 28 4d bc 02 9c 72 d2 e9 d2 e0 e2 4c 4e aa 00 | 99 db 57 fa a3 66 fc cb f5 dd e9 0d 8d 84 3c c0 | 7d 68 be c5 97 df 85 52 da 1e 7a e7 98 0e 8b 72 | 16 20 54 89 82 82 38 c9 be e3 78 0f e2 0f db 8e | a1 b9 e8 11 42 59 86 ce 1a 8a 3d 26 c9 25 6e a4 | 29 00 00 24 7c b7 7a e3 3e 1b fc dd 37 45 25 f3 | 05 14 6e 97 6f c2 39 be ff eb 0d 21 64 ca 63 97 | 3b d9 cf d2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 06 a5 99 5f ab 55 20 b5 39 ab 53 | 31 c8 5b 7c ff 84 61 13 00 00 00 1c 00 00 40 05 | 2b 33 25 f9 c8 cb 8b a7 92 5d f6 e3 73 04 ce 77 | a4 d5 c0 8c | libevent_free: release ptr-libevent@0x7fb3600720e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb338017ea0 | #686 spent 0.0666 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #686 connection "road-eastnet-nonat-142" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb380002b20 | handling event EVENT_RETRANSMIT for parent state #697 | start processing: state #697 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #697 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-201" #697 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-201" #697 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.228073; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.988959 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb338017ea0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #697 | libevent_malloc: new ptr-libevent@0x7fb3600720e0 size 128 "road-eastnet-nonat-201" #697: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.201:500 to 192.1.2.23:500 (using #697) | d6 28 cf ed 60 7e b1 e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc b1 dd dd 9c 60 58 a9 c7 66 fb 23 cc 00 f7 04 | f9 eb 9c de 8f 73 86 22 d9 42 30 60 08 2d ef 14 | b6 50 8f 0d 43 3e 37 57 d1 c5 18 fb f8 0e 88 30 | 19 36 6b 7c 74 95 4f c4 00 aa 6d 70 5c 70 e4 1b | af 06 97 50 19 89 6c f1 77 c6 1e 80 61 54 71 33 | 94 67 d0 e4 1e d2 49 c7 d2 75 26 40 9b 38 29 7a | 39 9e 94 88 0a 9f 90 00 cf cc cd 5e 03 3f 80 c9 | 9d a6 0c 03 5a c2 81 22 47 79 c7 4e 2e 63 70 6d | 12 be 62 03 d1 4b 3b 92 59 d8 c4 10 0b e1 2c 6e | 7f 5b c2 f8 db a0 f1 b2 bc cf 2f ab d4 30 81 0b | 99 67 12 c3 46 3c 3f 42 29 aa 13 3e e8 5b 5b ab | 4a 06 c2 00 9d 12 7b ba b5 20 f9 e2 1f 9d 2f 8b | 8a b3 7d e3 d1 57 14 4c 7b d3 d9 0d 11 12 94 15 | 53 16 e5 df be 4c 89 d6 26 21 be 1f 80 ea d2 39 | 1c 6b a8 aa 75 fe 2b 99 57 d4 00 58 a5 b6 36 c0 | 15 f3 d2 55 87 c4 0d 66 47 0f 06 26 0e 04 3c 5a | 29 00 00 24 01 24 ca b1 15 4b b9 0a 03 0f 6f 65 | 30 b1 82 99 4d 99 95 24 13 7a fc 58 9a 3d 81 dd | ab d4 21 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 3d a9 82 f6 57 1d d7 c8 a4 72 46 | 84 4d cc ed 86 24 ec 99 00 00 00 1c 00 00 40 05 | 92 72 21 f5 94 19 6f 86 30 0f 49 01 9c c4 ab f1 | 49 76 f6 3d | libevent_free: release ptr-libevent@0x7fb35c0292e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380002b20 | #697 spent 0.065 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #697 connection "road-eastnet-nonat-201" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb364044c30 | handling event EVENT_RETRANSMIT for parent state #689 | start processing: state #689 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #689 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-74" #689 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-74" #689 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.228146; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.98745 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380002b20 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #689 | libevent_malloc: new ptr-libevent@0x7fb35c0292e0 size 128 "road-eastnet-nonat-74" #689: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.74:500 to 192.1.2.23:500 (using #689) | 21 56 6d 63 c6 05 f9 0e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 01 41 94 ac c1 3b a7 91 84 87 0b a2 a6 2a 82 7c | 5e 57 2f 03 c9 50 17 da 1f 5e 13 47 67 fa 54 af | e1 23 cd 52 df c1 70 c5 84 49 39 0b c5 51 17 f4 | cd ae 0e 3a e4 ec 94 66 23 c9 e6 22 7e 29 fd 87 | 37 38 1c ba 2e c0 60 73 13 eb ed 91 72 d4 bf 43 | 0d 48 d2 56 0c 3e 10 c8 f6 a9 5e ca ed 70 78 7a | 2d 43 f8 86 71 ad ba a9 b9 a1 81 89 e4 be b1 13 | b3 4b e8 ac 5a 2b 85 9a 9a 62 39 e6 1a 55 c2 9a | ac ed 6f 11 df 6c a9 36 a9 00 2f 5c 57 3a b9 87 | 71 1f 36 18 9d 01 e1 48 c5 c3 af 45 89 3d 96 5f | cf f8 ab 91 0e aa d2 78 b3 52 d3 de be 97 7f cc | 22 0b ca 63 0a bf 49 dd ee 6f 9a 13 ec 7b 53 68 | e0 00 32 aa ec ee 18 65 94 77 ae fc 50 83 e0 b2 | 02 cd f1 17 f7 f0 40 67 a4 a9 46 1f 31 e5 bd 59 | 77 0b f3 a9 e9 64 9d 77 4a 66 04 24 1e 03 df a8 | 95 ea 8c 8a d2 17 91 f2 54 af 53 a6 c5 e9 b2 6f | 29 00 00 24 2a 05 3d 7b 18 e9 5f 31 aa 45 2a 05 | 20 70 d9 99 68 5a eb f1 da 1e dd 98 f0 5c e4 e4 | 18 70 b6 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6b 08 c4 7c 53 4a 07 2c 37 8f cc 44 | c1 c2 6f ad 52 2d df e3 00 00 00 1c 00 00 40 05 | 39 71 42 f9 c8 85 a0 ba 5e c8 87 85 6f 23 eb 57 | 95 ba a1 9c | libevent_free: release ptr-libevent@0x7fb364064990 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364044c30 | #689 spent 0.0633 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #689 connection "road-eastnet-nonat-74" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3840489a0 | handling event EVENT_RETRANSMIT for parent state #668 | start processing: state #668 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #668 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-110" #668 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-110" #668 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.228217; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.984586 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364044c30 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #668 | libevent_malloc: new ptr-libevent@0x7fb364064990 size 128 "road-eastnet-nonat-110" #668: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.110:500 to 192.1.2.23:500 (using #668) | 69 d8 43 4c ca 0f 15 18 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 41 d2 79 13 fa 3a 8f cb d5 3a 12 ff c1 bd 72 dd | ec 4a 69 1d f5 bf 64 dc 82 8e 85 c8 60 0f 31 b8 | 2a b5 99 5e 2e db 16 88 62 d0 a8 a0 e7 ed 8c 22 | 9b 22 dd 67 cf 53 b2 41 57 e0 6d 62 0b ae a9 e2 | a4 33 ef 81 fd 1e 99 10 3c 05 f1 b1 63 cd 1d 4c | 81 83 e9 17 13 bb 86 a3 f8 34 d0 be b4 67 f9 24 | 19 c5 94 10 ae 8f 69 b3 cd cc d3 2f 95 57 65 09 | 5a 47 e0 ce 39 9e ff 8b 27 cb 00 b1 06 c2 96 f3 | 87 01 78 7b 55 94 56 97 f0 1a b4 de 45 49 99 29 | 41 cb ee bd 0c bf fe c2 39 91 19 f8 ca 82 eb 04 | 9b 78 1c 89 01 44 b7 86 45 f1 a7 24 c6 c7 c9 55 | 95 6b c2 87 ae 27 a5 78 aa 04 30 8d d9 4e 9d 41 | 61 6c de ff f0 c9 f3 64 d3 6c da 3f e7 7d a5 7a | cb 07 a2 96 df 94 f1 bf fc cf 2f 7d 5e 6d 6f 1b | 83 aa 52 10 ad c1 b7 85 95 a6 c3 93 b1 03 49 41 | 3e a1 3a 94 67 5a f2 ab 4f 45 a4 3f 47 2b ce 53 | 29 00 00 24 8b 75 29 44 a0 34 83 1a bc d3 07 46 | 1a 97 11 01 01 9b c6 7d 43 08 5a 1e e3 e6 55 93 | 99 2b d6 00 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 86 9b 57 88 6a 86 10 db 30 73 b0 26 | 55 1c 17 3c 26 62 fc 8d 00 00 00 1c 00 00 40 05 | 6f 2b 74 b2 0a ff ff 57 56 7c 59 c9 0b 6f 36 1d | 69 a9 e2 f6 | libevent_free: release ptr-libevent@0x7fb3440596f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840489a0 | #668 spent 0.0642 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #668 connection "road-eastnet-nonat-110" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a05290 | handling event EVENT_RETRANSMIT for parent state #700 | start processing: state #700 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #700 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-105" #700 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-105" #700 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.228289; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.988673 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840489a0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #700 | libevent_malloc: new ptr-libevent@0x7fb3440596f0 size 128 "road-eastnet-nonat-105" #700: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.105:500 to 192.1.2.23:500 (using #700) | 00 c1 02 d2 ce 58 22 c3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 38 f6 d2 66 d7 37 75 8a f0 3e e3 b7 32 d6 41 | f5 9b 8f a2 62 4a c2 2b c9 04 e2 82 df 16 b1 e7 | 53 45 e9 b0 d2 33 ee 18 d1 c5 9a 70 cf 68 0f e5 | 32 d6 f3 5b 1e ba 36 1e 40 b2 2b 52 74 e4 c5 52 | da 47 f2 0c 1b a7 d1 57 3a 88 c8 c9 39 c5 dd 03 | 07 4e 94 a0 a1 1d 2c ea 30 74 62 8d 86 0a 47 96 | 6e 86 43 84 d1 9e 1d 48 ef 3c 77 aa 61 b1 d6 36 | b5 4d f7 2a 16 ea 31 f3 6f f0 30 8c 27 0f 36 c2 | 5a 32 4b 7a 99 fa 8a a2 52 1a 48 1a 84 31 7f d9 | a1 19 01 60 f3 03 bc b4 7e 3c f2 20 4b db 82 e3 | 91 8a 04 5c 39 59 a1 c6 c7 13 9b 06 59 aa 49 26 | 58 66 03 6f a1 ee ab cf 66 8f 67 f8 d0 fc b3 18 | 94 eb b8 a7 2a a8 67 57 97 49 ca 42 b2 b5 7b d2 | 6e 59 f7 fc 58 0c e9 3b 1a b2 35 58 47 0e ce 90 | a5 dc 15 a0 5d 7e 82 46 b9 36 49 bb 5b 6e 43 bf | 1e 14 f0 70 04 11 dd c3 af 14 0d 1e 44 19 e8 dc | 29 00 00 24 ee 23 8c 3a 20 c2 eb 31 90 b4 e3 3f | 38 ea ba 83 7e c0 b5 92 52 31 23 9c 2d 4d f8 74 | 94 8a 3c ad 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 5a 78 4c 93 64 72 5c f7 62 e1 2c | d0 64 cd 9a e4 f1 0f 34 00 00 00 1c 00 00 40 05 | f9 4f 20 e0 84 05 11 01 b8 04 b9 53 7d c7 40 89 | a2 bc 5d 64 | libevent_free: release ptr-libevent@0x7fb37006f790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a05290 | #700 spent 0.0646 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #700 connection "road-eastnet-nonat-105" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a47f10 | handling event EVENT_RETRANSMIT for parent state #698 | start processing: state #698 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #698 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-211" #698 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-211" #698 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.228361; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.993449 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a05290 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #698 | libevent_malloc: new ptr-libevent@0x7fb37006f790 size 128 "road-eastnet-nonat-211" #698: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.211:500 to 192.1.2.23:500 (using #698) | 21 cf dd 23 b6 bd 0a c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 92 b6 1b 2d 49 8c b5 f8 7a 69 c7 b2 f5 d8 79 d8 | 26 12 23 12 d2 76 1c 08 cb 2b 6c 70 8d 69 a0 f1 | 6d c2 d1 02 bc 20 a3 cf 4b db 02 4e 02 bf 9c ef | 06 4a dc 18 d2 74 58 2b 58 67 f8 e8 0a ee 59 ea | 16 9c 3c 75 07 d4 f6 13 6c 2f a8 d3 16 3a 01 5c | ab a0 57 0b d9 a8 0a 28 86 75 df b0 c3 1a 3d 57 | 9d 10 56 0c fa 92 43 8e fc 2e 85 4b ae 97 bb eb | 66 96 a0 3b 93 fb fc 3e a4 7b 85 51 68 c7 6b 35 | 6e be 0c 7d fb 30 17 ba 33 cd c8 32 b2 53 83 47 | 2e af e0 72 a9 4e 53 16 57 a9 ed 18 35 80 e6 11 | ce ef 2a 39 6c 7a 1c 80 7d 2d 86 be 0f b3 d1 2d | 8e 73 69 25 8e 2d cf 22 94 9e 26 1d 06 89 aa 00 | f6 e5 b6 1f d1 6d 2a 5a de 51 70 67 1f dc fe 84 | 10 da 29 d2 fa dc 69 4c da 42 f1 0d f5 d6 7b 01 | 9b 82 d0 81 2c ec 44 13 52 ae 3a 49 a4 a8 b1 17 | 13 9a 7a f2 8e 7c 90 d0 e4 37 60 4f 27 eb 74 fb | 29 00 00 24 c7 60 58 05 d8 38 44 75 17 ec b3 37 | 6c b6 72 ff f9 94 ef 8a 21 a9 54 7a 0f 5c 8e b8 | ba 44 9b ab 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6a 1a ed 35 4d 8e 31 1b 88 ca 39 40 | 08 de 5b cc 57 86 57 d8 00 00 00 1c 00 00 40 05 | f8 2a d9 b9 24 84 74 c8 e3 0b 5f 27 a7 30 52 df | 0f 06 8f 7c | libevent_free: release ptr-libevent@0x7fb34c074c00 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a47f10 | #698 spent 0.0628 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #698 connection "road-eastnet-nonat-211" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3840318d0 | handling event EVENT_RETRANSMIT for parent state #718 | start processing: state #718 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #718 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-157" #718 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-157" #718 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.228433; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.995921 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a47f10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #718 | libevent_malloc: new ptr-libevent@0x7fb34c074c00 size 128 "road-eastnet-nonat-157" #718: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.157:500 to 192.1.2.23:500 (using #718) | 0c dd 79 de 47 83 7e 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | be 66 36 96 31 e2 42 87 3a ac 4a fd 50 98 37 f0 | 83 90 d2 c2 b6 a0 f8 1a 23 ee b3 73 7e 59 fe f6 | 3c 2e ff a3 b1 53 59 bb 42 87 13 c6 fa 8f f4 66 | 20 b5 0d 75 56 3e 90 ab 48 8b aa 14 da 3c 04 07 | 7e 5f 8e 9b ff 5d 16 9c d6 cf e7 df 30 34 14 81 | fd cb 54 31 0d c6 6e 86 c6 00 5a 1d f1 9f cf 03 | 8e 5c cf 50 18 84 b9 7b 0b 61 d1 97 2f 8f 20 3c | dd 18 b6 4a e3 bc 56 eb 5e b2 56 15 58 ea 88 9f | d5 df 2d 58 7b 95 5a 7d 44 a3 ad 96 a2 23 87 6a | e2 84 31 36 80 e1 af d8 10 51 82 08 4c 66 f2 a3 | ea 9e 5d 00 97 f9 2d 2b a9 f9 ea 4a 6e 06 95 ef | d2 60 f0 da 73 c2 db c1 a6 40 f3 05 1e 08 98 1c | f5 d5 15 f1 7a 89 4d 80 89 c5 9d 2a b9 73 5f 7f | 20 36 51 5a fc bd 7e e1 b7 e9 61 67 fa 61 13 e9 | 12 17 e8 98 3b 6c fb 8a 60 2f e7 0a fd 58 48 e4 | a5 27 43 bf 2f 21 79 fe 28 b0 c2 eb b7 6d 95 45 | 29 00 00 24 89 03 e8 6c ca 23 ce 9e 5d 41 d4 99 | d7 86 12 03 b4 03 11 8f cb d7 3b 25 eb c9 7b e9 | f8 3c 7d e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 7b a6 d5 12 0c 58 96 9f f8 ef 99 | e4 3d a3 f6 b8 7b 36 33 00 00 00 1c 00 00 40 05 | ad 02 ae 2f 73 2c a3 41 68 65 8b 86 be f0 98 4f | f3 0c 27 62 | libevent_free: release ptr-libevent@0x7fb36c077c70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3840318d0 | #718 spent 0.0643 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #718 connection "road-eastnet-nonat-157" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348005860 | handling event EVENT_RETRANSMIT for parent state #560 | start processing: state #560 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #560 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-21" #560 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-21" #560 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.228503; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.936246 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3840318d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #560 | libevent_malloc: new ptr-libevent@0x7fb36c077c70 size 128 "road-eastnet-nonat-21" #560: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.21:500 to 192.1.2.23:500 (using #560) | 61 ee e9 29 f9 69 ed 76 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e1 5b d2 4d 27 a5 64 87 b5 53 0f 2d 27 23 c3 80 | 59 cc 4a 83 42 0a c4 7c 74 74 a9 17 dd e6 bf 21 | c5 97 86 51 a0 18 a7 55 17 b7 10 8d 1e b0 a4 7b | 87 6d 2d 89 28 1e 78 86 6d a6 2c 5e e4 1e 5e b3 | 8b ff f7 4a ed eb 04 dc d3 8b 68 b2 08 51 f1 90 | 83 7d 2f 12 5c 80 ab 52 30 6f 5a 2f 21 d3 f6 2a | 24 28 c1 3d 11 09 6e 37 07 e3 bd 5a 6b 28 45 fa | 2f 6d b4 10 49 37 83 73 b1 f3 31 9b 80 01 11 22 | 5f a1 e0 5f 63 e5 ef 6f d7 20 b9 78 da 97 fb dd | 03 07 83 ee 70 56 66 02 29 c9 ab 5f 38 ff a9 d5 | e9 8a e3 9f e9 fc 01 13 30 ba f0 d8 18 76 b9 3b | 5f 09 cc 0c 64 e9 65 14 08 ff dd c9 6a 40 e5 8d | e6 ec 0a 5e ab 63 d2 1f a2 70 05 7f 44 94 93 ef | d9 cd 76 d1 2d 31 22 90 40 07 c7 7c a2 53 ce 36 | 14 46 8f da 4f 94 35 cc 7b b4 58 99 54 67 3b 56 | 36 26 06 7f 4a 38 3d 7f b5 57 e0 c9 8a 7c b4 a2 | 29 00 00 24 6d da b8 df 8d 0e 39 36 00 cd 36 1c | c8 6c 4e d3 97 de 45 90 16 f8 97 1f 18 a8 59 71 | e2 d8 bb b7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b1 4c ac 81 8b a9 9e 5f 7e 2a 07 3b | d2 dd f3 4f 02 d8 73 9b 00 00 00 1c 00 00 40 05 | 0e 12 95 b1 fc 7d ce a6 69 21 08 f2 b2 a7 af 4b | 42 43 c7 4f | libevent_free: release ptr-libevent@0x7fb360085320 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348005860 | #560 spent 0.0643 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #560 connection "road-eastnet-nonat-21" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3800319a0 | handling event EVENT_RETRANSMIT for parent state #739 | start processing: state #739 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #739 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-224" #739 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-224" #739 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.228576; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005732 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #739 | libevent_malloc: new ptr-libevent@0x7fb360085320 size 128 "road-eastnet-nonat-224" #739: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.224:500 to 192.1.2.23:500 (using #739) | df 19 f5 78 1f 7f 61 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 b4 0b bb a9 64 88 87 98 2f cf 2f 72 90 24 8e | 27 68 e4 41 53 39 08 7e 9a 9d 01 79 8c 46 b5 7e | 94 53 70 3e b0 27 b2 82 8a 26 9d e8 0b 19 4b 92 | 2b 7d b3 c3 c4 b5 0b 70 2b 92 ac 96 4c 0c 66 2f | d2 61 eb 15 ed 06 25 36 5e 2a 3f a8 42 0d d0 94 | ae 7d 6f 48 35 8f 38 64 d1 29 e3 a9 12 a1 3b 9a | 37 6f f0 36 59 2c 69 bd c2 85 29 7c f5 fb fd db | 33 21 05 b9 47 40 46 26 f2 67 5e de 98 c9 70 43 | 38 06 63 f6 fd d0 82 9d 53 05 3c 2c 8e 1c cc 05 | 21 99 f3 4f 03 c8 cd 4f 9b 06 f6 fa f8 36 e3 35 | 25 9b ee fa bd e1 7b 3c 24 42 c1 43 67 a4 52 26 | c9 ad a5 ca 68 eb 61 44 9f 85 d4 ad 39 d3 08 f8 | 0c 18 de 7d 80 97 a9 b0 17 1e dc 70 64 63 2c 0d | bd e4 be 7a df c7 e0 58 87 37 3d c3 42 94 6e f1 | 48 66 02 c3 74 33 ab 1e 5e 12 8d 34 8d 1f 0b 16 | f3 77 bb 3c fe eb 42 5e 87 af e0 78 62 33 b9 fc | 29 00 00 24 fc 37 68 c7 2d 53 22 1d 51 4a 71 4e | 46 28 97 f7 6a 0d 4a 96 60 fa 96 05 69 86 9a bc | f2 f0 69 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e0 2a f2 c4 e2 df 1f 60 02 ec 7a 42 | 09 ed ca d8 77 e1 6d 1c 00 00 00 1c 00 00 40 05 | 4f 71 3a 48 ff b5 1c f9 41 72 89 68 75 9e 7b ee | 5e b8 7a 66 | libevent_free: release ptr-libevent@0x7fb35c0ca170 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800319a0 | #739 spent 0.0647 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #739 connection "road-eastnet-nonat-224" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb340005860 | handling event EVENT_RETRANSMIT for parent state #751 | start processing: state #751 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #751 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-244" #751 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-244" #751 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.228648; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002137 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800319a0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #751 | libevent_malloc: new ptr-libevent@0x7fb35c0ca170 size 128 "road-eastnet-nonat-244" #751: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.244:500 to 192.1.2.23:500 (using #751) | ae b9 96 92 13 03 18 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 46 18 de 27 b3 41 d9 b4 97 87 96 94 92 db 34 d5 | 56 66 24 e2 24 37 ce bd 92 7b e3 87 23 69 e7 bb | 99 85 d4 04 ba ee 4f 3a 2d e4 f5 20 88 1a da 6a | 37 fd 29 25 a7 48 4a 55 fa 78 65 6e 2e f9 46 8a | 6d b2 51 bd 8a 24 ee 67 2d ab b9 57 1a 5e d8 74 | ba ae f9 c0 cf 53 67 dd e4 f0 25 8c f7 8b e5 cc | c4 b9 b2 2e 91 da f6 5e 10 27 44 76 09 73 cb 05 | ee ff b8 22 52 36 b5 70 b5 f3 a3 21 0c 9b d9 c3 | 6e 1e fd a6 b5 36 62 17 f0 b8 95 48 d0 79 59 86 | f0 3b ca 96 84 68 69 d6 59 82 c8 2b a6 a6 4f 06 | c3 dc 73 a0 8a 74 9c 4d bc d3 4c 09 2f b7 5c 51 | 36 1f a0 36 a1 c5 d6 a5 b8 10 87 71 e5 72 18 60 | 29 95 15 48 57 c7 bb 89 e1 44 1c f8 fb 56 fa 24 | e6 14 3b 9a 5e c3 26 ff 0c 04 49 70 a6 59 7d 65 | 41 4e c0 79 9f 67 e9 9e b7 b9 6a 02 99 b0 ea 24 | f8 69 67 ed 88 82 6b 65 bd e8 e7 35 b7 cf 86 4f | 29 00 00 24 5f 12 63 14 37 ca 62 06 c8 d7 61 a7 | 8b 59 9f 9f dd 4b 86 2c 58 45 7a 5d a8 0a d1 a1 | 93 37 6f 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 41 84 a3 d1 08 28 c1 a2 36 a7 52 | e0 0a 68 b0 f4 d6 13 58 00 00 00 1c 00 00 40 05 | 6f c5 8f 9c 48 4f ce 63 14 03 29 e5 1c a9 3b f7 | 4c 7b c3 5c | libevent_free: release ptr-libevent@0x7fb370074f70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340005860 | #751 spent 0.0635 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #751 connection "road-eastnet-nonat-244" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a86b80 | handling event EVENT_RETRANSMIT for parent state #744 | start processing: state #744 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #744 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-209" #744 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-209" #744 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.228721; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006781 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #744 | libevent_malloc: new ptr-libevent@0x7fb370074f70 size 128 "road-eastnet-nonat-209" #744: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.209:500 to 192.1.2.23:500 (using #744) | ea 7c f7 bc 9d b4 d4 c6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4e 10 35 c8 dc d8 d8 41 53 59 49 7c 7b 44 aa 05 | 7f 67 fe c6 28 2a e8 7b 99 25 f4 0d 41 65 04 49 | 3f a5 ca 32 7e 94 c7 70 6b d5 d7 5f 8a d3 f2 1c | ca 3a c9 ae 29 50 6e c5 9c 99 e5 19 7a ca 2b 5a | 20 96 8c 54 9e 1b 8d 21 df 3d 1c ae a9 b2 f2 dd | 61 db 05 94 26 c0 73 9c 28 14 1e b4 32 df 8d 11 | 60 18 79 0a 1f bd 12 12 40 ca a3 c4 d1 34 dc 28 | d8 6d 71 58 2c 9e 25 5c f3 a4 a3 a1 e0 08 9d 79 | a3 8b f2 2f 94 27 6a 94 a9 dd 70 db ec f6 52 82 | 6e 5a 66 cc 95 16 57 c1 a4 fd 5b c3 f0 1d 4f 6e | a7 3b 22 2a eb 3b 0c f6 18 dc ec 5e 03 2f 91 2c | 65 23 6f 5e 2b 65 fa e2 5b 10 85 ee 91 82 62 ff | 39 4e e7 48 1f 63 84 b9 93 73 90 ab e3 44 21 75 | 99 ff ff 9a 14 1d 56 ee 54 ba 7e 72 40 d2 9e 35 | 7d d1 3f 98 ac 5b e2 19 e4 12 13 62 7d 18 8e 06 | 2d 61 f4 df a4 3e 70 b2 f5 55 a5 83 ab 24 20 04 | 29 00 00 24 05 e4 d5 07 4d b5 53 19 e9 74 fb 1f | 81 a4 d4 c0 b2 e7 21 de 08 06 9a f0 79 05 4e 6b | 6b 45 0a 87 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 72 6d 3b fc 06 c6 19 b7 65 37 87 f1 | 00 58 b3 97 c1 ac 1d 38 00 00 00 1c 00 00 40 05 | 84 2a 82 65 99 0a c2 da 62 53 b8 d5 7c fd d4 dd | e5 91 5e 42 | libevent_free: release ptr-libevent@0x7fb3800907b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a86b80 | #744 spent 0.065 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #744 connection "road-eastnet-nonat-209" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38400feb0 | handling event EVENT_RETRANSMIT for parent state #683 | start processing: state #683 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #683 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-101" #683 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-101" #683 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.228793; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.981871 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a86b80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #683 | libevent_malloc: new ptr-libevent@0x7fb3800907b0 size 128 "road-eastnet-nonat-101" #683: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.101:500 to 192.1.2.23:500 (using #683) | 22 30 a0 37 9e 5e 0c 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 10 2d bd 08 31 a0 07 0c c4 f5 ac c5 5b e0 c5 60 | 90 d1 45 d9 1b e2 dc 82 5b 35 5b ab d0 57 64 0b | 0e a8 1f f2 6d fc 5a 7c ad 7a e8 a0 f9 15 5a 35 | 68 ff 17 43 ed b1 8e f1 b0 9c 81 b4 3b b5 37 5a | 70 13 3a f4 ca a9 f6 46 52 0c ae 55 b0 55 be c6 | 1a d7 a6 fb 47 44 eb b7 16 85 b7 dd ff de a0 45 | 17 b4 11 35 d4 d0 cf e9 45 97 61 c1 6a d8 a0 c7 | d6 0b 85 99 6b 5b c9 dc 9e 76 87 29 b7 8c 8c 9a | 95 7a 15 c6 10 17 98 93 f7 09 7a 9a cd d0 13 14 | a9 2c 55 a4 60 f1 72 80 2c 28 45 e4 d9 cd f6 01 | 55 30 ed 6a 1a 0b 81 c2 8d 64 3f 52 1f 81 ec a6 | b3 e6 5c 36 3c 8d 99 60 59 d8 e2 22 76 0c e0 0e | be 08 7f ac 91 76 6a 0c f2 45 c3 7c d3 5f 7a 2d | 17 ac e6 32 1b a2 9b 38 7f e0 1c c5 b2 87 8c 03 | 93 b7 73 13 37 e0 f4 7f 3b 5b c2 ac 8e b6 84 9a | 86 44 62 2d 89 5c f8 c8 10 4b 97 4b 7a e5 a2 fd | 29 00 00 24 00 a4 f8 e4 0c 48 4a f1 27 f4 8b fc | 65 ab 53 d7 66 48 7b 24 ce a6 58 75 84 59 a6 a0 | 2d 45 66 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 79 85 ce 75 72 7f 4a a1 68 df 47 f3 | a0 b0 e6 2f 94 7e 65 c2 00 00 00 1c 00 00 40 05 | 62 77 62 1c e2 c3 88 5f 5a c8 dd e7 a6 ce ac 52 | d0 9f e3 15 | libevent_free: release ptr-libevent@0x7fb35407a740 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400feb0 | #683 spent 0.0646 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #683 connection "road-eastnet-nonat-101" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370005860 | handling event EVENT_RETRANSMIT for parent state #722 | start processing: state #722 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #722 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-179" #722 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-179" #722 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.228865; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.009429 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400feb0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #722 | libevent_malloc: new ptr-libevent@0x7fb35407a740 size 128 "road-eastnet-nonat-179" #722: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.179:500 to 192.1.2.23:500 (using #722) | aa d5 b7 9d 2c 2d ce cd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e4 b1 9e af cf 96 c4 1f a9 84 c9 1e fe 0d 23 0e | 53 41 ad 54 73 4d e4 38 06 61 64 5a 7e 50 5d 4b | 7b 88 a3 16 c2 7a 44 91 ab 9a ef aa fd 30 6e 1a | 1d d2 33 a7 46 ad ce 2a 23 40 98 78 51 d0 bd 75 | cb b0 f4 b3 4d 7d 19 05 e0 8b 9b 3f ea 2b b8 7f | 3e 4a 4c 83 dc 50 06 15 79 16 52 63 ff 38 b6 0f | d8 c3 fa 2f f5 c3 27 82 43 ee e2 17 1f fd 56 25 | 4d 01 27 c8 35 e9 4c 3b 07 cc 3e b3 7b 20 e4 14 | 25 d6 4c 28 e2 bf c7 2c 41 cf 35 f8 5a 05 57 12 | 04 0c ca 49 a7 e8 4a a0 b8 27 d8 fb da 18 09 0a | 8c d8 8d af 83 fc 09 54 90 fe e9 ec 6d 97 9f 38 | 4e f0 9c 72 3c f6 cb 04 b9 67 19 9d 6a 3a 73 08 | d5 1a 3f 89 1b 6f b4 27 4a 1e 40 b2 80 92 bf af | 91 29 dd e3 e5 8d 54 1a b2 c3 4e f5 fa 70 5a df | 3f f7 11 8b 30 04 85 e6 00 fc df 4a f8 63 a9 ce | 38 f2 7c 9e bf e7 aa 6c 51 0c 26 e0 f2 3a 12 6b | 29 00 00 24 7a 35 42 ce 34 04 04 57 a4 48 47 35 | 56 ae 37 50 6d 6b b9 18 e7 0a e4 12 4e ef 0f 1d | e0 a7 cb 2b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ea a8 f1 c6 be 84 ee 15 46 58 b3 d5 | 8e ba 1e e7 f5 a8 48 b9 00 00 00 1c 00 00 40 05 | 03 f5 9e 01 93 c6 ea 77 b1 6c 5c 90 de bb c7 8a | ab c5 48 5b | libevent_free: release ptr-libevent@0x7fb37004a770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370005860 | #722 spent 0.0646 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #722 connection "road-eastnet-nonat-179" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37801d970 | handling event EVENT_RETRANSMIT for parent state #609 | start processing: state #609 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #609 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-138" #609 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-138" #609 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.228937; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.957279 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #609 | libevent_malloc: new ptr-libevent@0x7fb37004a770 size 128 "road-eastnet-nonat-138" #609: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.138:500 to 192.1.2.23:500 (using #609) | c5 84 f5 e6 85 81 a8 3f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b c3 e1 62 dd f7 03 a4 32 17 be e2 28 27 fb f5 | 45 a1 b1 50 d0 82 d8 71 c0 db 0f 18 56 ed 9e 71 | ab 62 12 3b 1e 2e d7 c2 88 e3 18 ba c6 4d 9e c0 | 66 e9 16 dd ad be 48 d4 08 19 fc 5d 95 a1 92 79 | 85 f1 22 51 65 65 eb df 48 a7 f9 2c 1f 7c af 78 | 1b 32 50 5b 8d 91 14 ab 2f fc 1c e9 0a eb 9d e0 | b9 b3 7c a9 c3 93 53 4b 2c 6d 79 29 14 5f 71 42 | c0 35 82 62 20 0c b7 12 e5 58 00 96 19 9d 47 ed | b5 53 5d 62 96 2a 62 44 51 f9 0e 87 7c 59 64 63 | c8 45 7c 86 64 54 df 3f 91 89 ff af 10 5d 3d 75 | cd aa cf 4b 0e a3 b7 91 a2 ab 02 7c c6 93 7f f2 | 8d 0d 67 2e 43 de f5 19 fe 61 c3 eb ca 89 dc a8 | da 1e ca b8 26 01 ff cf 71 b9 ef 31 67 1a 21 e1 | 74 9c 98 aa be 62 d9 7f c0 2a df fd 36 dd fe 56 | 14 e3 d8 7a f9 88 3d 4e ef 12 e2 a4 b6 e8 07 15 | e0 33 aa a7 d0 7f c0 9a ca fe 22 27 40 8f e2 a5 | 29 00 00 24 77 ac 96 72 0b ae 9a e5 43 fe 81 46 | 33 b5 6c 3b 53 47 2a ac 8d 43 3c bd 37 47 3d 9d | 02 54 00 23 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a7 cb 6e 3a 03 75 5f a3 64 4c ac 8d | 50 31 4f 55 75 88 9f fa 00 00 00 1c 00 00 40 05 | 69 ea 36 3f 8e fc 87 de be 9f 2d 0a 55 5e aa a3 | 63 b9 97 4b | libevent_free: release ptr-libevent@0x7fb344069ec0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37801d970 | #609 spent 0.0633 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #609 connection "road-eastnet-nonat-138" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c00d120 | handling event EVENT_RETRANSMIT for parent state #687 | start processing: state #687 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #687 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-117" #687 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-117" #687 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.229008; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.009273 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37801d970 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #687 | libevent_malloc: new ptr-libevent@0x7fb344069ec0 size 128 "road-eastnet-nonat-117" #687: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.117:500 to 192.1.2.23:500 (using #687) | ce 83 a7 9c 1c 97 2e 39 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6e 94 51 72 79 a4 28 3a f0 f6 12 68 84 e5 2d d5 | f6 aa 47 a0 d1 ff f5 a6 1a 2c 25 a6 01 58 40 fc | d1 95 56 17 97 c4 d8 d7 89 0f 51 18 3b 4c 8d f6 | ee fb ab 56 d0 0a 15 fd 6a c8 e8 89 62 5e b8 5c | 57 fe 05 8e e1 ea c9 e7 84 08 05 71 31 9a dd 16 | 0a 25 f1 1a 29 58 f8 06 86 68 fa fc 99 8b 12 42 | 09 ec 17 e1 a1 09 76 fc 53 b2 55 2f 51 28 14 aa | bc fd 76 5f c5 9a ba 18 29 7b 2d ad 6a bf 47 24 | 5d a5 36 0f 60 68 25 fb f2 8e 9c 88 47 ac 61 32 | b1 6f 1c e3 4c ea 94 2e 13 72 9f 40 c9 32 9e a5 | 55 17 b5 71 af 30 28 4f 48 dd 3d 1c db eb 87 a6 | 1e c2 d8 26 0c 79 1d 68 4b e4 5c 9d 70 1e da cb | bf 7a 87 cd ee 4f da f1 be 6f bd 22 fa fe fa e8 | 01 cf f5 ed 00 5b 60 c2 39 47 45 cf d8 5c e9 07 | 6f 88 d8 c1 70 38 c4 08 e2 b7 20 9d fc 6d 35 32 | 43 d1 2a f8 21 b9 12 49 96 d5 3b 06 a1 81 56 f4 | 29 00 00 24 90 27 10 b2 cf 6a 00 ae d3 c4 a0 c5 | 23 4c 05 8c fe 6e fb 12 c4 ef 71 e8 a5 33 dc 9a | 79 4a a8 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 30 e8 b6 32 ca 26 78 2c d2 a8 a0 44 | d4 75 0b 9e 75 b6 57 86 00 00 00 1c 00 00 40 05 | c5 19 67 c6 b1 38 40 1d 0b 22 02 fd ab 47 ee cb | 20 29 33 72 | libevent_free: release ptr-libevent@0x7fb34407a660 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c00d120 | #687 spent 0.0696 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #687 connection "road-eastnet-nonat-117" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b1c480 | handling event EVENT_RETRANSMIT for parent state #738 | start processing: state #738 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #738 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-228" #738 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-228" #738 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.229088; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.009956 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c00d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #738 | libevent_malloc: new ptr-libevent@0x7fb34407a660 size 128 "road-eastnet-nonat-228" #738: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.228:500 to 192.1.2.23:500 (using #738) | 25 78 f8 28 10 61 9d 6a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 51 72 b7 05 5e 83 a3 a0 07 12 24 3e 92 83 b8 | 62 3a f9 f5 51 87 2b 5b 57 43 01 a4 66 eb 6e d1 | 36 fd bc d6 d3 df 99 92 4a 90 d6 55 13 f9 57 37 | 57 21 91 58 59 45 7b fa 72 46 a4 36 22 6f 56 d8 | b6 6d e1 0f 87 84 b3 2d 12 ce f5 5a 2e d2 8f f7 | 2b 01 97 28 81 dc 2a 4f 14 69 dc 31 63 bc a5 23 | 42 8f 99 35 ae 7a 8d f1 f8 fc 1d a7 d5 69 74 4b | 4e 98 fb 39 77 73 f9 c2 8d 2f 88 65 14 8e 49 62 | b0 f1 74 23 17 c0 59 7f 25 06 94 30 cb 35 da 14 | 1a 23 e5 07 95 80 6a cb a7 fe d0 d5 8a 1f 10 96 | bf ab f1 96 54 c3 82 d2 6e 6d 0c 64 bb 6a 3c 73 | 83 0b fd 52 5c d9 5e a3 74 f9 c3 2b 08 19 82 dd | c6 8e eb 37 6d 26 f4 d6 e5 ff ff bd 35 5a 0e 11 | 00 7d 5a 8c 85 d6 d6 a8 98 8a 86 a2 3a 0b 85 a4 | c6 6f 0c 94 ab 7b d2 e2 18 f7 d7 59 10 f4 62 a1 | f4 5c 31 8a df 18 a0 2b 20 3b 40 bf 17 df 1d d5 | 29 00 00 24 97 c7 a3 d7 59 e9 31 22 90 b1 59 6b | 1f 7e 8d 5c 35 7a 89 f4 a1 7c 76 7f ab 92 a2 52 | c8 bf 0f 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b3 91 a4 00 33 c0 fc 8b 25 9b dc 30 | 06 39 ac a5 a1 25 3d b9 00 00 00 1c 00 00 40 05 | ba 61 e3 c1 d1 2b 93 b6 88 33 74 02 de a9 63 56 | ec 2a 1e 1d | libevent_free: release ptr-libevent@0x7fb378080550 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c480 | #738 spent 0.0647 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #738 connection "road-eastnet-nonat-228" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368040840 | handling event EVENT_RETRANSMIT for parent state #740 | start processing: state #740 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #740 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-230" #740 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-230" #740 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.229161; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003141 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b1c480 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #740 | libevent_malloc: new ptr-libevent@0x7fb378080550 size 128 "road-eastnet-nonat-230" #740: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.230:500 to 192.1.2.23:500 (using #740) | 1b 68 e9 bf c7 97 07 a5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bf b3 10 fb dd 28 f6 cb 25 9f 9d 63 17 69 6d 6e | e8 71 1d da 03 62 10 04 58 4a b2 60 7e 08 0d 23 | e8 11 df 63 3f d9 4c 6b 74 a1 a5 86 cd a9 4f 0b | a1 93 6d 81 fa 0f ef 54 ce 9d fd cb 34 8e 77 a2 | 87 72 4c 47 7e 84 fe 1b a5 81 30 1c 8c fc c4 9a | 0f 98 35 d7 2a 5e 44 55 8a 59 d6 d8 30 0e 7b a6 | 2a b2 14 36 a8 38 48 b1 a9 46 59 2b ac de 0d 8e | 1c 9d 2b 89 1c 30 40 5d b7 34 94 17 5f 21 6d f3 | 8a 9c ff b3 cb 8a d6 33 b7 5b 70 0b 55 e1 7a e1 | 7d 1b fc 2c 98 7b 56 b4 9c 01 69 95 c3 40 41 1a | 16 ef a0 2a 1b 18 8d 7f de 2f 24 c0 24 36 5a 75 | 68 29 82 0e ef 57 e3 38 1e 0b 49 5a de c8 05 03 | 5c 7b 63 02 56 7e a1 b0 b5 ab 37 8b 92 4e 92 ec | 6a 5b f1 54 78 81 27 2a c2 36 70 26 e0 90 20 5c | 71 5f d8 ca cb 70 40 d9 8f a6 1b 60 21 65 09 2b | e2 dc 1b fc b7 96 10 f1 3e c1 9c af 69 36 85 93 | 29 00 00 24 fa 43 15 42 5a db 07 16 30 b5 67 19 | b6 84 08 f7 7b ea f2 1f b7 28 7e 51 d0 6b f6 fb | b4 42 2c ff 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 aa 6f 0b 3c 61 32 28 f1 44 65 e1 5e | bc c8 e4 f5 79 a3 0a bd 00 00 00 1c 00 00 40 05 | bc 6f 55 f3 a9 01 d6 c1 3f f8 0f 15 e9 0d 1c 1c | f5 51 2a 5a | libevent_free: release ptr-libevent@0x7fb36409b8a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368040840 | #740 spent 0.0633 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #740 connection "road-eastnet-nonat-230" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad4380 | handling event EVENT_RETRANSMIT for parent state #711 | start processing: state #711 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #711 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-186" #711 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-186" #711 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.229234; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.999207 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368040840 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #711 | libevent_malloc: new ptr-libevent@0x7fb36409b8a0 size 128 "road-eastnet-nonat-186" #711: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.186:500 to 192.1.2.23:500 (using #711) | 46 de dd ae 1b 33 3b 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1e fb f8 69 eb 92 56 fa e8 6b 80 bd 3a a2 f1 5d | e2 2f 9e d6 bd 7f 97 c8 b3 8b 02 5b 38 41 e1 ee | 42 a6 3c b3 1b 0e f8 ed 2c 61 73 24 75 ee ff 11 | 80 e8 65 c5 04 0b 39 c2 cf a9 e0 e7 ea b8 69 59 | 88 22 65 ae 2e 6e ce 7a 3b 8e 9b 5b ae 73 1c 45 | a6 ad 6e ff 7d ee 57 ae 75 fe db 29 33 14 d8 3e | 84 01 d5 70 75 bc 33 43 cd 9a a0 3d 7a fa c8 fc | 80 64 21 7f 34 0e a8 e0 72 05 42 a2 8e f8 64 07 | 62 20 d0 e7 cc 2d 35 50 67 31 52 27 ea 4a 4b f5 | 65 1f c8 ad 67 9b 47 53 9b 2a 89 ab 3e 19 8c 26 | e6 31 27 4a fe b0 71 d9 94 76 e6 64 92 ba 3e 1f | 40 a8 76 db 49 ed 4d 4e 20 ff 29 d6 24 a3 26 db | a5 a9 f6 f0 13 de f5 16 c5 c8 94 6b 66 f0 42 99 | 03 d4 dd a2 4b 2b 63 3c 83 09 26 b0 bf 90 c2 8e | ca 70 e7 02 59 40 bb 5d a0 d8 f9 cd ca 9c 92 09 | 26 05 b9 92 8a d9 e6 4b fa 8a 50 3c b1 69 e2 b7 | 29 00 00 24 c3 2e 34 07 d1 26 64 7f 7d a5 2a e0 | 34 43 1a f1 ce 3a 79 7d 9c a6 d5 be 0a 57 a8 05 | ad df 51 bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 81 0e 00 c8 04 84 dc 32 f7 ff 89 | 08 01 7a 69 9d 96 cf 86 00 00 00 1c 00 00 40 05 | 8b 19 f6 3c e3 44 56 e8 bd d2 d9 5b 06 2a 9c bc | df fe 2c 91 | libevent_free: release ptr-libevent@0x7fb37405f150 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad4380 | #711 spent 0.0652 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #711 connection "road-eastnet-nonat-186" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb360012bf0 | handling event EVENT_RETRANSMIT for parent state #585 | start processing: state #585 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #585 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-56" #585 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-56" #585 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.229305; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.941463 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad4380 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #585 | libevent_malloc: new ptr-libevent@0x7fb37405f150 size 128 "road-eastnet-nonat-56" #585: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.56:500 to 192.1.2.23:500 (using #585) | 4a 2d 06 a5 9b 4b 99 7c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 64 29 a0 67 33 95 5c 1d b9 11 2a c0 eb 4e 4c a9 | e0 4a 90 97 d9 14 6c 5c fa c2 84 25 94 ed 30 2a | b0 88 7c 51 d2 d7 ff 29 a2 e1 b8 25 0b 85 ce b7 | b2 12 f6 3a bd 7c d3 5e 0a ae 7c e5 dc a9 b5 e0 | b1 73 f8 5b c6 30 50 76 ab ce 7d 60 1b 21 f2 24 | de 59 93 e2 2f 8b 16 ba cb 3a 00 66 a1 42 8c d0 | f2 69 c8 bd a5 c5 17 99 23 d2 e7 08 52 58 cf 46 | 18 6a 5f de 56 35 01 8c d2 ff 97 28 1d 1b bb 92 | 48 6c 2a ec 7b 82 4c 83 40 17 8c 13 5d fb 0c ea | df 44 dc d0 94 b6 10 69 f9 90 b9 8d ee 30 ce 05 | e3 86 29 c2 e5 c6 ce 54 2b ff d1 3d 10 ca 32 02 | 12 72 23 d7 dd b3 7f b0 17 38 2e 43 6c 10 4a 0f | 86 3b b1 4d 71 cb 29 6b f7 89 2e 9c f1 20 88 1c | 84 7f 4a a5 ce 80 ec a8 9e f2 52 7b 0c bb 09 70 | c6 d1 fd 42 0e b3 07 8b 67 74 82 05 59 36 9e 22 | c4 7c b2 4e 57 7b 68 cc 85 67 3b 47 1f 9f c7 67 | 29 00 00 24 28 e8 a9 33 f5 cb ea 77 ac 0a f0 23 | 81 90 3e d5 9d e8 ea 75 7c 29 f7 bb ce e1 94 cc | 81 10 ca e6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e1 7f 8b 08 d1 d7 03 c9 45 07 dd 1c | f2 db 4d da 97 13 01 ed 00 00 00 1c 00 00 40 05 | 1b 39 fc df 1f 4f 07 bc 04 62 76 b3 b9 a8 ed 18 | a7 41 03 5e | libevent_free: release ptr-libevent@0x7fb37003b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb360012bf0 | #585 spent 0.0641 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #585 connection "road-eastnet-nonat-56" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34800cc10 | handling event EVENT_RETRANSMIT for parent state #755 | start processing: state #755 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #755 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-237" #755 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-237" #755 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.229376; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.013085 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb360012bf0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #755 | libevent_malloc: new ptr-libevent@0x7fb37003b0b0 size 128 "road-eastnet-nonat-237" #755: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.237:500 to 192.1.2.23:500 (using #755) | 05 2d 15 eb 8d d1 e7 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c e4 18 a4 fb 02 3a d9 56 aa ab 1f 07 98 9a b0 | 2b 63 06 c0 f4 31 d9 71 70 9c 4c 64 b1 c2 38 28 | 6c 15 1d 4f c5 ae a4 a5 43 35 ec 6e d6 ce 63 44 | c3 02 3a ce b9 ea 97 ee 29 7b 54 70 d5 96 ff 7e | 5e 34 ae 91 d7 79 f6 56 f6 05 21 93 eb 09 d6 2b | 31 ea 8c 72 22 32 80 ba 85 c1 fd 23 bc 55 76 a5 | 14 11 5f 1c 43 e7 b2 de 38 fc 2c a4 66 eb c7 d0 | 28 ae 74 a9 31 19 e1 df eb 9a 57 0f 92 b5 24 1b | f9 d6 9a c3 62 89 61 7f a8 28 b7 1b ae 83 62 6a | 52 6a f7 36 ac ba a5 54 22 cb 98 46 53 96 c0 75 | 28 f7 eb 90 7e f6 0c 82 ec ac f4 3f 47 1c 6c fe | 84 02 5a 18 bb f3 1e 67 69 d9 22 9d a1 ce 99 fa | c1 d1 64 9b c8 33 d0 0e 5f bd db 94 28 8e dd 95 | 12 8f 1e 24 1b 4a d0 41 03 fa d3 6e cf f5 c7 5c | e5 af 76 1b 64 bb 0a af 07 04 ed 6b 46 aa c8 6b | 3d 72 51 cb d5 1d a8 b3 e5 d3 ab 98 04 42 49 92 | 29 00 00 24 49 bb cf 23 e0 6f e1 de 61 d1 90 4a | 2d 30 38 2f 6a e7 9f b7 3b 9f e2 b1 72 e4 d8 55 | 05 54 cd 1b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 9d 20 ec 91 b7 c1 7d 70 e8 e6 28 | dd fd cb 82 74 04 84 bf 00 00 00 1c 00 00 40 05 | e9 ae 1f 41 fd b0 e1 3d 82 1f 24 48 4d 65 7b ae | 19 d4 aa 4e | libevent_free: release ptr-libevent@0x7fb3880805f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34800cc10 | #755 spent 0.0647 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #755 connection "road-eastnet-nonat-237" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36001d710 | handling event EVENT_RETRANSMIT for parent state #733 | start processing: state #733 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #733 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-220" #733 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-220" #733 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.229449; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005285 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34800cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #733 | libevent_malloc: new ptr-libevent@0x7fb3880805f0 size 128 "road-eastnet-nonat-220" #733: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.220:500 to 192.1.2.23:500 (using #733) | c0 b4 40 a7 90 2d ff 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 3d 1c 6b d8 c6 0e 19 a3 7b 9f 82 56 a2 60 d8 | ed c3 69 a1 b8 27 54 67 fa 08 0b 9c 2f df a1 84 | a3 ea 36 06 89 65 b4 8a 8b b1 53 43 55 1c 2d 9c | 45 3c 53 4e 14 b2 1b 7c 54 9f cf 33 2b d7 a1 7f | b2 02 42 3d c7 e2 52 e4 03 b6 91 b3 0a 4b 65 e3 | 2d 56 d1 33 02 80 68 64 bf e9 65 5e 1c 3c 0e 4e | 38 e8 a0 52 6d 84 dc 3a 40 77 a2 99 57 22 be f9 | 21 b5 b9 99 7a 73 41 8f bf c0 86 4e a6 c0 45 d1 | 82 aa e5 df 8b fa 84 00 fe f2 93 c1 f7 20 82 cd | fb 46 94 df db 19 f0 51 0e 9a 5a 9e 48 37 67 ac | 46 6d e7 b4 4d 86 4b 1e 9e 7b d3 75 96 a3 a2 a6 | 2f a5 5d c9 1a f7 81 bf 8c c3 9a 0d 30 20 4a 43 | e0 86 4e 21 5d 25 a1 95 77 9e fb 93 fd 1b 22 6c | d4 f7 f2 14 a8 af 6c 58 ec c1 bb 6c 8a db 27 a0 | e6 7f 0c 48 39 29 47 c2 4d e2 32 e9 73 91 20 fe | 20 a5 dd 53 0f 69 f5 d6 ac 97 fa 75 83 38 83 1b | 29 00 00 24 38 98 a0 0a e9 5b ce bb 7c 0c e3 8b | 78 bd d8 2c 72 cb ed 4b ee c0 17 92 29 bf 4c 66 | 8b 54 88 97 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2b 90 59 ab 91 26 aa 5f b9 4e 61 e7 | ac 87 e3 ab ff 33 ec 91 00 00 00 1c 00 00 40 05 | ba 8b 12 fb af ac eb b8 53 0c d2 71 52 5e 48 aa | 61 61 f1 39 | libevent_free: release ptr-libevent@0x7fb360059710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36001d710 | #733 spent 0.0629 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #733 connection "road-eastnet-nonat-220" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a54250 | handling event EVENT_RETRANSMIT for parent state #622 | start processing: state #622 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #622 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-61" #622 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-61" #622 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.229521; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.979349 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36001d710 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #622 | libevent_malloc: new ptr-libevent@0x7fb360059710 size 128 "road-eastnet-nonat-61" #622: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.61:500 to 192.1.2.23:500 (using #622) | da 49 0a b3 65 ff 08 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8c 40 36 95 be 60 b3 e3 bd c7 ff 07 f3 83 00 12 | f5 6b 10 33 d3 d9 c4 b0 f6 be da 2b b1 9a 19 58 | 53 f9 8a 25 29 6a 79 82 da bb c2 fa 2c 51 78 6d | 66 2a 05 15 73 a7 b9 3e 1c 83 37 33 e7 f7 71 62 | 0c 9f 57 2f 7a c5 28 95 89 0c 4b d7 6a d0 b7 1b | 21 80 5c 28 7f 9a a4 6d ba 32 aa b8 62 c1 be b9 | 1e 50 93 7f bf 93 50 c9 41 bb 39 b6 d1 bb 95 dd | b2 a0 84 34 30 54 a8 a6 c8 5e f7 42 75 7c 55 3c | 9b ca c8 19 68 29 d0 62 32 30 2c 1d 35 db 78 87 | 06 dd 80 a1 55 b4 92 13 11 a1 52 06 d8 bf c1 d8 | 08 60 a4 8b 01 50 1c e7 e4 f4 33 ec e2 10 21 b6 | 14 e9 ff ce 64 51 80 1d e6 ab 36 5b 4f 73 34 4e | 32 2c 17 88 eb c6 5b 95 51 4b 06 b8 67 86 d4 7f | 6b d4 4d e7 eb 69 82 a6 9b 31 6c fc ae 3a 4b 50 | 0a 0b c3 8d 90 55 90 09 c4 39 73 b7 de f4 8c f8 | 43 4b 1b 65 eb 39 32 5c b3 32 de f7 b4 b6 0d 03 | 29 00 00 24 e8 a4 b1 28 90 aa fa fa 7e c7 b0 2c | 81 71 e5 06 ca 8a b3 bc 3e d2 88 e6 58 e0 15 d7 | 2d 90 46 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 48 cd a5 f1 0b 32 76 b4 1e a7 ed | c8 11 a6 bd 54 4b 50 5e 00 00 00 1c 00 00 40 05 | bc ba d4 87 d8 ff 76 ca 98 8e bd 6e 57 4f 18 d4 | 50 09 94 f7 | libevent_free: release ptr-libevent@0x7fb34c06f420 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a54250 | #622 spent 0.0646 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #622 connection "road-eastnet-nonat-61" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad8480 | handling event EVENT_RETRANSMIT for parent state #726 | start processing: state #726 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #726 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-199" #726 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-199" #726 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.229592; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.008731 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a54250 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #726 | libevent_malloc: new ptr-libevent@0x7fb34c06f420 size 128 "road-eastnet-nonat-199" #726: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.199:500 to 192.1.2.23:500 (using #726) | 0c d9 0f fe b0 de fb 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba 5a 03 41 cc a5 fd 1a 49 8c 1f 01 a4 d7 6f 42 | 4b 04 b3 65 c6 04 c6 d7 7b 8c 73 c5 64 a3 11 05 | db ca 95 5a c3 b5 81 cc 3c e0 e0 10 f0 ff 7e 0b | ed f4 ad e5 9b 37 9a a2 23 4c 84 01 ff 22 3f 36 | 71 71 f2 27 6b 0d e0 3f f7 18 a7 11 1f 03 8b fc | 68 47 d9 20 6d ba a0 e4 3e 38 1d 24 82 8d dd ed | f0 f3 ff bb 45 10 55 de 96 c4 67 c7 c0 4e b6 ff | ff fa 6c 42 29 12 cb 76 59 82 15 5d 1c 3f 19 0a | 04 84 40 90 fa 20 d9 8c 32 64 bd 98 62 52 e2 03 | bf fb 12 3f 70 5a 23 2e b6 a0 1e da 62 5c 54 65 | 28 94 12 c3 ff c8 58 af b7 92 ff e0 c9 41 fa a6 | f7 68 bf dc c3 be e7 16 3d 20 d2 d0 0c 4d 6b 0f | f1 85 f8 60 c2 47 89 cc 68 3e 26 98 33 a2 77 d0 | d7 d8 d6 c2 eb 37 9e b4 c7 a1 fa b6 a2 06 85 67 | 8a 85 66 84 52 40 0f 08 d5 73 dd 84 59 ba e4 3b | 8d 2f d0 0b 1e 56 e6 0a e8 13 8c bc e0 02 15 0f | 29 00 00 24 5f db 23 af 71 bf 0d 40 27 c3 a7 aa | e9 98 98 31 72 a3 0b fe 84 2c 87 3c 00 39 ba 62 | 98 9c 34 f5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 67 ba 9f db 5b 15 ef 4c c9 2a 37 4d | f7 85 c9 a1 4c f4 99 05 00 00 00 1c 00 00 40 05 | 17 ee f7 ed 41 32 9d a2 b1 d3 43 b7 8c 71 7a 66 | 24 14 bd f6 | libevent_free: release ptr-libevent@0x7fb3680752a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad8480 | #726 spent 0.065 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #726 connection "road-eastnet-nonat-199" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35400d120 | handling event EVENT_RETRANSMIT for parent state #742 | start processing: state #742 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #742 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-202" #742 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-202" #742 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.229664; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.008437 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad8480 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #742 | libevent_malloc: new ptr-libevent@0x7fb3680752a0 size 128 "road-eastnet-nonat-202" #742: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.202:500 to 192.1.2.23:500 (using #742) | ab 34 f4 95 81 ed c2 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f7 98 46 2a 24 70 ac 92 50 50 f4 c2 b5 d5 f7 0a | d6 9e b1 7a 3e ed 98 33 3d ee f7 e3 13 87 69 c1 | b4 a2 57 16 53 d7 41 79 86 3b 2e a4 e6 52 7a 6e | 0b 74 58 0e 45 35 85 36 77 6b b0 71 9d 4d a2 91 | 8f b5 9e 28 e8 62 a3 5a fa 45 28 9c d1 6e 96 06 | 43 8c 31 83 80 4b 1a d0 1a 86 ab ce 70 87 d8 60 | 2f 53 50 9f 1c f0 aa 40 e7 82 42 00 ef ac c6 cd | 59 7e ba 8e d2 08 a8 07 ab e8 d4 09 1a 34 ae b7 | 19 6a 93 47 39 54 0e c1 ff ba c1 49 16 e9 84 6d | e4 d4 28 20 7f bb 1c 5a 50 ad ff 27 bb 53 3a 4c | fe f2 c6 66 38 c9 62 25 57 6b 7d ae 6f 82 66 61 | 8d 1d 48 cd 44 50 c2 df 28 86 79 e8 45 6e a1 90 | 4c 22 91 9e dc b2 7e 6c 6c e6 a2 de 0a 17 03 3b | bc 26 ef 26 39 74 28 83 5b 3a fc 73 ca d0 c6 57 | 8a 02 2c 0e 18 5b 99 8c aa fa 43 b4 a9 f7 75 31 | 51 42 a8 eb be 2e 35 d9 44 1d 6b bc c5 2f 8c 87 | 29 00 00 24 01 dd 2f e6 eb 4b af 32 1c 79 d4 4c | 09 c2 78 82 23 70 b2 bb 85 ac f9 94 71 a9 92 05 | d7 ca 31 27 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 97 94 2c 62 c6 59 3e 48 9c 81 ce | 06 c1 b8 e1 6f 64 53 c0 00 00 00 1c 00 00 40 05 | 6e fc 22 43 8c 0a 59 5f b4 df 17 9d e0 72 a9 ba | 64 42 3f 26 | libevent_free: release ptr-libevent@0x7fb38406b790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400d120 | #742 spent 0.064 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #742 connection "road-eastnet-nonat-202" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36402f780 | handling event EVENT_RETRANSMIT for parent state #654 | start processing: state #654 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #654 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-112" #654 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-112" #654 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.229745; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.967862 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #654 | libevent_malloc: new ptr-libevent@0x7fb38406b790 size 128 "road-eastnet-nonat-112" #654: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.112:500 to 192.1.2.23:500 (using #654) | 5e ee 0b 7f 6c a7 3a d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 66 e0 d6 d9 72 ba 46 dd 41 a1 46 b3 25 74 d2 | be 07 06 6c f4 38 9a a1 39 17 cd 0b c4 41 e6 86 | ab 2b bd 9b 4e 50 c3 68 a9 fd 5d 77 07 79 12 d7 | 06 ad c7 3b 19 6e 8f 00 bd 88 b3 27 81 06 f1 46 | b7 d7 a4 24 f6 8a 13 f3 63 a6 44 01 04 ef fd 32 | 85 cb bb e9 d7 ec f5 ec 83 a6 6e d9 b1 33 b3 d5 | d8 12 93 9e 27 25 43 b4 f4 9d 5a 4e 0d cb 7f c7 | ad a0 26 f4 7f 25 7c d9 9a ca 52 6e 2d 83 33 d3 | 5b 0c 44 4d 72 d8 0d c3 65 63 57 17 10 5e 19 0d | 88 04 84 34 7e 42 22 cf c0 6f 9d 86 b6 ed ec 5f | 38 0f 13 28 f6 f9 d2 d2 9a ad 59 58 25 e5 63 dd | e3 7b 38 03 55 37 74 26 61 f2 62 84 61 8e c1 fd | 89 ae b9 7c 2a 19 e2 22 2f b0 2c c7 27 de 4f cb | fd 3c f5 3f fd dd 17 5e 7f 7a 64 3f d9 af d0 1d | f0 55 35 5d d7 34 3d 74 24 8b 4f 0e 99 f6 c3 2d | 66 87 8b da e2 d5 ca 1a 2a 24 b1 4b 3d ff 64 ec | 29 00 00 24 97 bb 4a bf d9 e5 95 75 3b a3 86 b3 | f1 af 1a 0c 45 88 7e 17 0a 91 a5 72 56 0e fd 8c | e1 a9 d3 af 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e 88 f8 b3 f2 90 3f 3b ff 2b 5c 52 | 75 9a 83 d7 14 17 86 77 00 00 00 1c 00 00 40 05 | 2e 13 0c e6 eb 5b 95 e2 c9 2a b6 07 89 5a 9a 41 | 93 58 82 e2 | libevent_free: release ptr-libevent@0x7fb364059ad0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36402f780 | #654 spent 0.0718 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #654 connection "road-eastnet-nonat-112" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c044df0 | handling event EVENT_RETRANSMIT for parent state #562 | start processing: state #562 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #562 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-57" #562 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-57" #562 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.22982; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.932582 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36402f780 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #562 | libevent_malloc: new ptr-libevent@0x7fb364059ad0 size 128 "road-eastnet-nonat-57" #562: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.57:500 to 192.1.2.23:500 (using #562) | d4 5a 4f 23 43 95 38 c5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 99 21 4a 80 72 e7 1e ab e4 a4 cc 6f ae 76 b4 17 | 66 86 d6 e9 31 54 d5 5a 28 1c 74 da 50 fb 86 f4 | 2e 76 50 d3 0d b0 af 0a dd f4 b7 13 30 20 64 87 | f2 f8 f7 5e 86 a8 52 97 05 ae 0d 56 79 b8 88 83 | df 4b 38 d8 fd 5a 52 6b 17 d7 11 45 fc b9 a4 96 | 35 56 c5 1b 74 b1 b1 3b 01 57 7f e0 6d fc 5d 6c | 21 86 9a 44 ea 45 b1 a1 05 01 3c 3a 83 6c a3 ec | 26 13 36 21 83 8a a9 26 0b 6b e0 0b 90 3b db 09 | 26 5d d6 57 a5 f5 d7 1c 5a ce 92 a1 4d 1b 39 ba | fe d1 57 2e c6 1d 0e d3 ee b4 63 0d c8 a5 b3 10 | 07 e3 b7 03 07 bc 65 1b bf b5 ed eb eb 53 36 51 | 4a 60 85 66 ce 2a ad 64 2e 22 1f f5 c7 e8 ab 8b | 56 4d 1b 92 82 89 69 60 5a 9e d6 65 67 5b 25 d6 | b0 fc eb ed e9 a5 d6 c8 1d 10 b2 22 0e 91 e4 cc | 73 60 02 ba 62 2c 96 2c 46 34 20 da c9 7c 01 9a | b8 13 b1 fa b1 0b 0a 18 a3 97 42 e9 48 2a 9a d0 | 29 00 00 24 95 d0 5a 24 13 c9 df 14 0f 8d ab 25 | 8b d1 7e e3 e1 dc 1c 56 c1 ea 4c 91 e9 f7 07 4a | 89 49 ff 32 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 58 19 cf a0 1f 48 f9 3e 3b 37 57 | fe 6c 89 3e e8 fd 27 9e 00 00 00 1c 00 00 40 05 | 73 2a d5 98 9e 00 e7 3f e4 c4 a7 88 fa 3d 90 0b | ae 11 e9 36 | libevent_free: release ptr-libevent@0x7fb34c064430 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c044df0 | #562 spent 0.0649 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #562 connection "road-eastnet-nonat-57" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350014cc0 | handling event EVENT_RETRANSMIT for parent state #645 | start processing: state #645 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #645 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-159" #645 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-159" #645 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.229892; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.973026 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c044df0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #645 | libevent_malloc: new ptr-libevent@0x7fb34c064430 size 128 "road-eastnet-nonat-159" #645: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.159:500 to 192.1.2.23:500 (using #645) | 0c 20 e9 c8 f1 ce 0d 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 8a 31 6e 84 8e ee 47 80 28 3e f7 bd 66 21 ae | a7 c9 66 e4 9c 35 61 f1 16 0f 1c cb 4f 8c 10 bf | 6e 35 2d be 88 b3 9e db c6 d4 0b 4b 1b d6 0f 24 | 0a 6c 6d be b6 de bc 90 ef 4c db b4 25 2b dc 87 | 6c 61 9d 02 4b ca cb c9 34 ad 89 73 4a df 91 ac | 37 e5 30 b7 38 08 c4 2c f4 c1 86 fe 1b b2 22 0b | ce d5 26 69 30 72 a1 b3 13 e0 7e 3f 95 c8 13 b6 | b2 52 42 87 85 da fd 89 fa ba 74 99 7e b0 e8 a5 | d9 b4 d7 c1 b8 d7 f9 52 8c 9d dd 2b fb 3e 32 c1 | 2a f7 f7 b1 ed 12 09 66 4c 2e 36 a5 31 5d 4c 2b | dd 02 ec 82 7d 54 39 7e 27 68 b2 8f ba 6c 9c 64 | e4 b1 54 a4 a9 83 73 da 3c f1 13 e7 c4 83 f9 34 | 4e 29 e4 9b 2c 98 6b 6d 2d 9b 19 b8 a0 13 da 3a | a2 7b d4 a1 cd 5e e2 80 01 c5 9e 85 09 f9 cc 94 | 06 6d 1b 4d b0 af 7d d7 8a af 03 99 b8 54 31 fd | 25 b5 36 4d e2 31 2f 3f 37 34 3b 6c c1 28 54 50 | 29 00 00 24 ea 84 61 f6 e2 d9 2b 57 d4 d8 53 44 | 1c d8 bc 14 a4 bf f6 76 ae 29 c0 89 c3 03 25 b0 | 65 0c c5 3e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0d bc 72 fe 0b 7e b4 5c e5 5d 2f 13 | cc b7 37 44 34 e3 88 7a 00 00 00 1c 00 00 40 05 | bf 80 a0 4f d4 d4 cc 7e 5e 5a ae 95 22 cc 4e 94 | a3 26 fc 44 | libevent_free: release ptr-libevent@0x7fb36806a2e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350014cc0 | #645 spent 0.0643 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #645 connection "road-eastnet-nonat-159" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37402ffb0 | handling event EVENT_RETRANSMIT for parent state #661 | start processing: state #661 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #661 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-154" #661 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-154" #661 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.229964; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.985381 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350014cc0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #661 | libevent_malloc: new ptr-libevent@0x7fb36806a2e0 size 128 "road-eastnet-nonat-154" #661: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.154:500 to 192.1.2.23:500 (using #661) | be 95 5c 7b 40 76 8c 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f ba ef 56 b8 99 c9 26 b1 07 42 76 09 76 7a 27 | 91 a0 41 2b a0 70 93 15 d8 a7 50 fe fc 23 ab 2e | a7 36 40 0e 91 38 15 2b 47 d9 88 bf 5c 3a f7 3a | b4 a0 b6 a8 c9 29 be 63 86 bd a0 c9 b5 5a 74 81 | 42 05 2c e3 63 22 b0 ab 60 c9 91 06 1a ae 70 20 | 27 d6 ef fd c0 2f 69 26 17 d1 9e c7 27 24 17 a8 | 24 d5 65 3b 9d f2 8c bf b0 68 e5 fe eb 23 a6 60 | 73 bb 2c 27 f0 6f 99 ad 46 65 56 ab e0 3b 17 ec | 9b 9d ea 8e 8a f2 38 63 83 4a 06 e3 25 cb 1e f9 | dc 65 77 ef d0 4a 78 7b 20 56 68 95 c5 c6 26 b7 | 22 1a 94 be 24 6f df 64 3f 4c a0 9e 67 50 56 a5 | ff de 53 8d 33 a9 a8 0c 5c 5c f2 d7 59 a4 9b b5 | ea 88 33 be 31 ed e9 57 b6 13 a2 64 ea cd 03 7a | c1 10 e4 c2 97 9a da b1 7b a7 87 15 5b 07 98 84 | 7d 87 44 3a 69 2f dc 0c 9d 8a 59 b1 b8 cc a6 60 | ec 16 5f 47 d6 09 63 e3 f1 2c 11 ea 7a f9 7f cb | 29 00 00 24 22 90 73 7f 5c d6 51 86 23 a3 e4 fd | 8f 56 6e 8b 75 d3 87 48 a5 61 18 f5 b1 fb d3 9a | 2f 6b 23 26 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6e 83 26 d5 67 d9 f3 fc 4f ff fa 52 | 66 7f 8e ec fb ca 45 a0 00 00 00 1c 00 00 40 05 | d1 0b 7b 8d 87 6a e6 ee 1b bd 92 49 cc 1a ec 1c | a9 25 6e 8a | libevent_free: release ptr-libevent@0x7fb35406f780 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | #661 spent 0.0632 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #661 connection "road-eastnet-nonat-154" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb33800cc10 | handling event EVENT_RETRANSMIT for parent state #691 | start processing: state #691 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #691 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-191" #691 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-191" #691 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.230036; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.994505 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37402ffb0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #691 | libevent_malloc: new ptr-libevent@0x7fb35406f780 size 128 "road-eastnet-nonat-191" #691: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.191:500 to 192.1.2.23:500 (using #691) | a9 9e 25 20 86 2a 5c 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 81 cc 4c ba 30 5c 6d 22 f8 82 c6 c0 8b 58 68 0c | 41 77 59 e0 2a af ff af d4 c1 41 cf 51 4a d3 e1 | 69 aa 30 d2 ed c6 c8 af 8b 3b 34 93 40 fa af 54 | 65 66 11 b2 ea ba 9d 66 6a 5a ef a5 37 12 11 a4 | d3 21 d0 69 7b e5 a1 d7 98 b5 f2 36 e1 00 9b 73 | 88 b5 57 a0 86 7c 2b 56 bc dd 7a 01 0a bc 7a c4 | 2c ad c5 8b 82 0a e6 1a c3 ec 8b 0c 66 1b 4c be | b1 76 b6 01 cd 33 2d 70 ab da 87 4d 5a 37 a3 30 | dd a8 b4 78 ad 30 76 5b 99 96 17 20 94 4a 1e ca | d4 40 82 a5 98 84 48 26 0c d9 76 15 4d af 29 c8 | b0 a4 e1 44 dc ac ff b7 ac 4a 18 e6 fc e7 a5 b6 | 38 f8 54 c8 63 11 e6 a6 35 0d a1 81 5f 34 c8 dc | 36 f2 0f de c7 04 d3 89 04 e3 b8 e2 42 51 11 b0 | e6 10 f4 77 1f be e8 81 80 19 27 1e 32 ff 6a d3 | 0d 11 66 8a 3a fc 43 14 97 86 65 03 41 1b 4f aa | 60 d5 5e c1 3c ab bd c7 a5 60 2a 06 6e f7 8b 5a | 29 00 00 24 d9 82 2d dc 7a db 9b 9e ba 51 3f f5 | 55 9b ca 46 49 e9 e1 bd e8 b3 c4 b1 15 49 3d a1 | c4 aa 80 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 10 f7 93 cc 33 bf de b8 46 14 d4 | f1 7c bb ef cf 7a 14 b3 00 00 00 1c 00 00 40 05 | 40 bb bb e0 02 00 28 d6 b3 fd 9b cd 5e 9e 97 d3 | 8a 95 58 8d | libevent_free: release ptr-libevent@0x7fb37805e790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33800cc10 | #691 spent 0.069 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #691 connection "road-eastnet-nonat-191" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c017ea0 | handling event EVENT_RETRANSMIT for parent state #617 | start processing: state #617 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #617 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-165" #617 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-165" #617 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.230115; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.969457 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33800cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #617 | libevent_malloc: new ptr-libevent@0x7fb37805e790 size 128 "road-eastnet-nonat-165" #617: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.165:500 to 192.1.2.23:500 (using #617) | a7 ae e8 62 0b 46 de 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fb 6f 00 02 e7 f5 b4 cb 08 b9 65 4f 47 ef 5a 86 | e5 51 ca 0c 06 cf fd 0b 72 8c 77 7e b4 38 15 8b | 85 87 d6 a6 c5 3f 41 32 55 4b bb 30 5a 6b 55 95 | 76 74 f1 ba 57 cb c3 00 58 3b 41 a8 f4 f2 a2 e7 | 68 ea bf 0e 0e eb 7d 7c 97 24 f0 ec 9c b2 55 b4 | 58 b7 f3 13 c1 89 c2 fb a2 87 ea 86 bf bb c5 33 | 1f ae 16 84 83 00 87 63 36 16 fb 84 22 91 c8 7c | f3 57 cd 36 c5 a3 58 59 44 20 23 41 12 17 51 69 | e0 14 9c 7e ac 9d 23 88 40 7c f8 bc 0c 38 30 cd | 77 b7 88 55 c1 fe a2 53 b7 72 b0 12 95 9b b6 64 | ae 85 af 35 c8 ab 5f a7 cf c7 bf 9a c6 ed 5a 5b | 7a 5d 83 5f 91 52 0f 74 31 d0 db 4a 47 93 a8 88 | 7c 5a 55 e6 2b 80 9e dc f5 58 a8 e9 fc 1a 9c 9a | 4c bb 40 50 e2 70 35 c8 91 ac 99 df 72 58 53 2c | aa 87 b5 1a b6 1a e4 4a 97 dc 1d 01 10 9b 18 a2 | 3b 89 6b 81 0b 44 73 ea c4 f2 cc 33 56 05 5e 54 | 29 00 00 24 f7 8e 9a 0f 2e 84 4c 49 d4 15 90 c6 | 2a 84 51 f1 f7 2c e6 95 75 a4 8d 77 80 5c ad 8d | d1 b6 c5 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8c 1c f0 18 4c 40 28 e4 7a 14 a6 c5 | b5 d9 19 b3 dc 75 08 d7 00 00 00 1c 00 00 40 05 | 6e 38 75 f1 87 66 04 34 0d e9 7f d7 db 67 24 31 | c8 3b de 05 | libevent_free: release ptr-libevent@0x7fb35407ff20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c017ea0 | #617 spent 0.0652 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #617 connection "road-eastnet-nonat-165" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358012630 | handling event EVENT_RETRANSMIT for parent state #747 | start processing: state #747 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #747 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-248" #747 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-248" #747 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.230188; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.01203 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #747 | libevent_malloc: new ptr-libevent@0x7fb35407ff20 size 128 "road-eastnet-nonat-248" #747: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.248:500 to 192.1.2.23:500 (using #747) | a6 bf d2 f8 ac 64 24 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a 1f 62 98 e1 72 89 4a 9e 5e 9d f8 09 50 e0 d2 | 9c 18 ca 9e 95 27 4b 63 4a 5a 0f ea 35 ee 0f 6e | 09 6d 2d ee e2 2e 30 c8 5c e6 23 10 bb dd 92 c4 | a1 94 38 18 f7 1a bb b7 fe 7a 6c 77 66 08 c9 a3 | d7 20 9b 83 e3 5e fd c7 c5 b8 d7 cb db 7b 13 a8 | e4 16 a2 a7 f8 77 c7 96 cb c4 f8 c4 e8 5e bc b6 | 11 12 e0 0a e1 e2 98 ca 3c d6 c9 36 5d 1b 6d d8 | ff 68 5a 03 20 ef cc 43 d1 3a 80 e8 6b ca bf 39 | 66 da f5 51 9f dd 65 c6 1b 01 2d cd e7 68 f6 a3 | fc e3 5a 6a e7 8a 74 f2 c5 47 be 6f cb b2 de 7b | 5c ef 73 4e 74 52 3d 7e 7d 97 04 e7 a1 bc 8c 22 | 0b 61 ff ba 39 29 86 ab 04 59 61 fd e9 7a 43 97 | a9 8d dc 37 09 a9 62 1f 96 7a 92 bc 5d 63 69 61 | 33 36 28 54 06 b6 87 43 c9 0d 56 0e 50 ad e6 24 | b5 8c cd 7b ea 80 41 db a4 b3 86 9b c4 b0 37 e4 | a5 6b ef 42 4a f6 29 75 47 2b 95 cd de 0e 06 20 | 29 00 00 24 72 d2 2d f3 46 d8 fb e8 18 14 33 bc | 59 89 85 ec f1 52 25 c8 16 b1 28 1b 77 62 97 7d | df 82 b5 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e9 63 d7 f3 34 77 99 12 4c 20 15 9c | 7c fd ab a4 f7 0f 03 52 00 00 00 1c 00 00 40 05 | bd ec 71 30 dd 4a a7 e6 ea 65 3f b5 e2 da 2c 35 | bf 9d 55 db | libevent_free: release ptr-libevent@0x7fb35c0a0a80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358012630 | #747 spent 0.0863 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #747 connection "road-eastnet-nonat-248" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c03b100 | handling event EVENT_RETRANSMIT for parent state #633 | start processing: state #633 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #633 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-72" #633 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-72" #633 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.230282; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.963325 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358012630 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #633 | libevent_malloc: new ptr-libevent@0x7fb35c0a0a80 size 128 "road-eastnet-nonat-72" #633: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.72:500 to 192.1.2.23:500 (using #633) | 8a 84 ad af 01 bc 2c c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c0 25 a4 2a 19 32 bd a1 aa 5d f2 a6 fc 02 2e d5 | 33 ef 4f d1 9c ba fd 65 26 89 b0 76 98 b1 0a 73 | 0b 6d cf 55 32 b0 a8 c3 0d ed 7f 57 3e c4 09 bf | 8e 3e 0d 52 2e 51 26 3d 83 ba 75 87 bf d4 84 39 | a3 f5 4f e1 81 37 40 32 c2 92 5c 7d cd 5a 01 0d | 89 3e 2b dc 37 3d ff de 20 7a cf 8d ba 1e bf 39 | 3f 0b 59 4c 6d 53 3d 85 05 4f cb 7e 6f ec 84 0e | 3b 89 0d 17 39 96 b1 02 d7 7f ec 25 df 6e 69 98 | c8 c3 02 da a9 fd 5f ba 17 59 e0 f1 d0 67 1c 1e | 0e 5d 3a 2a 95 01 f3 4d 4f 33 98 c7 f4 d2 19 43 | 9b 8e 04 5a 6e 98 a7 91 3d c3 66 01 66 da 39 f1 | eb 10 86 db 4c d5 5d e9 1d ea cb f5 8e 90 23 18 | ed f2 37 09 1a 5d 54 50 41 f5 c4 c4 ca fb 8f 9b | f6 29 c4 e8 d3 47 fd 3d 80 73 a9 55 47 1b bc 7c | 8f b9 ec 7f e6 92 93 61 f4 fb 2e 1c e7 a7 98 52 | 7b b4 1d c6 f1 3d a2 94 00 52 e4 8a 62 1f 4c b8 | 29 00 00 24 89 c4 76 da 63 15 ff 10 2a 9e ce 01 | ec ae 76 ed 0e 33 67 47 23 3b 30 6c 5b 8b fd b9 | a5 68 00 52 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 21 70 6c 0c d5 a6 51 1a 4a 89 fd d4 | db 2f 8d 82 0e c5 0a 69 00 00 00 1c 00 00 40 05 | c8 f8 ac 25 9c d4 cc 0a 20 2d 68 79 d5 c6 b3 9a | 28 b4 88 17 | libevent_free: release ptr-libevent@0x7fb35c056950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c03b100 | #633 spent 0.0619 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #633 connection "road-eastnet-nonat-72" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a1c490 | handling event EVENT_RETRANSMIT for parent state #602 | start processing: state #602 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #602 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-93" #602 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-93" #602 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.230352; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.974424 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c03b100 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #602 | libevent_malloc: new ptr-libevent@0x7fb35c056950 size 128 "road-eastnet-nonat-93" #602: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.93:500 to 192.1.2.23:500 (using #602) | 1c 14 c0 8f 0f 45 46 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e6 8c 23 15 6d dd 8c f8 78 a6 e7 34 f8 f8 0d e8 | 99 69 99 32 7f b5 b1 1a 6e da d3 b0 b9 7c e5 6a | 90 1d 3f f0 2f 1f 8d c8 1e 97 79 0b 55 c9 08 97 | 7f db 99 9b a0 da 7f 34 8d ab 5f 4b 73 b6 eb 55 | ea b1 50 2f e5 f4 17 86 c9 0b 4a 01 40 9a 9a 4d | 73 05 29 c2 d1 6e 3d 1b 47 e9 f1 d8 3b a4 6c 31 | 0e f0 a8 d8 a1 46 2c 0e ca 2a 6e f9 4f d7 8c 76 | 9e 40 ea a6 3f 5f 17 17 a4 a8 fc ae 89 af 6d f1 | b3 45 8c 83 c6 8d a4 54 5a e0 e6 e7 89 ee b4 12 | 45 f6 b8 c2 94 e3 93 01 1e e6 9f b8 c4 95 33 5e | a2 9c 98 2d 5d 32 90 4e 65 40 c0 d0 7c bc 64 79 | d3 d5 64 07 12 ee 32 ea f1 d4 a2 dc 98 b8 b6 2e | 62 34 35 b4 dc 05 df 63 05 49 b3 40 af 75 cf e4 | bf 5e 46 dd df 34 a2 34 68 31 94 44 1b bf 50 ac | 43 cc 20 b0 de e5 d9 e2 b0 84 60 50 34 9f 14 06 | 39 c9 a8 b8 00 99 c9 35 60 cc 65 3c 94 49 b6 88 | 29 00 00 24 83 64 aa aa cc 6d 3f 6f 34 ae 10 39 | 1c a1 82 b7 e0 19 c5 ec 38 88 da 2f ce 97 9a 5c | 92 c8 61 e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3c 77 b9 52 2d cf 04 de dd b2 81 99 | 39 e3 1b 7a 92 b3 36 9d 00 00 00 1c 00 00 40 05 | d6 0f f4 51 34 80 da 92 17 c4 6a c3 ee d2 99 01 | a8 7b c9 18 | libevent_free: release ptr-libevent@0x7fb36406f9a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a1c490 | #602 spent 0.0638 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #602 connection "road-eastnet-nonat-93" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a90400 | handling event EVENT_RETRANSMIT for parent state #720 | start processing: state #720 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #720 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-182" #720 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-182" #720 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.230423; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.015667 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a1c490 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #720 | libevent_malloc: new ptr-libevent@0x7fb36406f9a0 size 128 "road-eastnet-nonat-182" #720: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.182:500 to 192.1.2.23:500 (using #720) | 2e 33 4d 73 be a7 0e 6b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ed ab c5 2c c2 f4 74 ef c7 ee 30 67 5e 1c da 49 | 70 61 7e 4d 8d 32 5f 3e 9a ec c2 40 33 9c 3f 67 | af 3f 5c 83 67 1b 79 9e b7 b7 35 73 56 5b 8c 3b | 0a 1a 2e 82 5d 65 28 71 9b 14 bc 2f fa 09 67 19 | b2 66 da 04 38 29 ad e2 f1 65 50 23 4d 85 d5 08 | 9a 79 76 49 46 a5 ea 67 8b 56 2d 01 fc 5a ed 64 | 0b 12 a4 dd e9 5f 18 7a eb a7 15 69 ee 95 e8 d9 | 56 b2 86 02 b9 aa db 6a f8 94 26 91 52 0c 14 ef | 19 10 c0 eb 0d 10 8b 4f 19 f6 79 a9 16 1e 94 36 | 09 fb 5c 76 4e b9 0e 65 a7 28 d3 fb 8e dd 96 92 | 1b 73 43 c6 61 e3 03 3c 0e 78 5b c1 2b aa 38 be | 19 84 9e 8e ff b7 65 35 2e 65 78 b8 fe ae d6 cc | 05 c7 08 1c 26 02 90 02 f3 16 d5 8a d5 33 30 16 | 63 1d e2 87 4f 85 13 e7 cf 51 84 57 b6 4d 0b d7 | ad f3 bf 57 f0 ee 36 2a 5d 91 a2 8b 76 c7 7f 4d | 7b 7f 59 64 bb c0 6d 44 32 b3 fa 20 34 ab 07 c4 | 29 00 00 24 b4 27 97 52 66 73 6d 63 e4 fb b7 f1 | ce d3 ed e9 19 97 52 e1 e0 b1 81 d7 52 28 6b 0c | 38 64 19 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 48 f0 ee 60 72 ed 8f f1 ea b8 ad 81 | a1 9e 54 4c fd ed 06 17 00 00 00 1c 00 00 40 05 | 50 b7 67 3d 54 be ef de 2d a1 bf 2b 46 e3 89 aa | 52 77 9e 8d | libevent_free: release ptr-libevent@0x7fb35c07a360 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a90400 | #720 spent 0.0623 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #720 connection "road-eastnet-nonat-182" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354005860 | handling event EVENT_RETRANSMIT for parent state #639 | start processing: state #639 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #639 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-214" #639 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-214" #639 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.230492; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.963043 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a90400 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #639 | libevent_malloc: new ptr-libevent@0x7fb35c07a360 size 128 "road-eastnet-nonat-214" #639: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.214:500 to 192.1.2.23:500 (using #639) | ff 19 a0 3d 97 93 39 95 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 19 0c 9d e5 77 b8 48 36 e4 03 9e c4 1d f2 2d 78 | 44 4c 26 98 f8 6b ee 0b af 31 99 e7 1c 61 bb d4 | d7 1b 9a 20 07 ba 04 17 60 e8 fd 18 10 87 29 2c | 24 f7 67 ce 57 34 ab 29 f5 cc ea d7 c2 95 67 49 | 24 4d 53 fb 24 ca da 47 20 a9 a9 bc c8 65 7a 7b | 44 61 86 68 8a ae f2 ac f8 44 ae 53 96 4e 13 15 | f8 a1 33 b4 cf f2 c1 fa c8 17 74 56 43 9e ef ec | f3 87 44 4e 55 d5 0d a6 d3 56 28 83 eb d0 c0 d4 | 3a 2e fd c3 dd 99 de 47 36 b1 e7 13 b8 7e f2 cd | a7 06 b3 ea 1c 8a 6d d9 b0 1f 66 79 19 09 77 e8 | 7d 50 d8 1c b7 8e b4 d3 82 80 b4 5c 9f c3 d3 38 | 28 2d fd c5 5f 8b c4 22 9d f7 e9 ac 69 9d a2 7b | 6e b5 3a ed 4f 1a 08 7f f6 b1 69 48 bc 68 e4 78 | 10 5b 4b 02 21 b2 70 8c 4e 7e b7 69 85 f2 7c eb | aa 75 d3 5c 7d a4 3d 7f 18 fd d4 8b 50 8e 47 6d | 12 6e b8 f7 e4 81 64 1a 6f f3 91 ac e6 c8 bf 94 | 29 00 00 24 0a 0d 9f 0a 63 a4 e0 f2 1d d8 95 0c | ba e4 b7 d7 a4 51 17 93 28 8e f1 0a c8 8c 2b 76 | 37 dd 06 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 9a d0 b6 2b 5a c4 fc 72 66 76 9a | 94 bf 3e ef ac e5 25 66 00 00 00 1c 00 00 40 05 | b8 15 7d 61 0d 1b 19 22 14 f1 b2 86 2c 56 e5 70 | 99 3e 7d f1 | libevent_free: release ptr-libevent@0x7fb384070f20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354005860 | #639 spent 0.0622 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #639 connection "road-eastnet-nonat-214" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c009690 | handling event EVENT_RETRANSMIT for parent state #642 | start processing: state #642 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #642 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-171" #642 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-171" #642 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.230564; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.967614 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #642 | libevent_malloc: new ptr-libevent@0x7fb384070f20 size 128 "road-eastnet-nonat-171" #642: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.171:500 to 192.1.2.23:500 (using #642) | 28 8b 51 ce ae 5a 3d 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b 37 19 62 25 a0 9e 1e 52 48 66 63 35 92 1d df | c7 ff 13 b7 59 bd f6 95 87 8d 26 d9 c9 e0 f7 24 | 26 42 a2 e4 00 1b 68 a2 f9 e9 ac 5d f5 d7 11 4b | 1e 89 7d 46 ef 06 9a 32 1b e9 81 17 06 39 67 f5 | 0e f6 1a 5a 55 9b 1e a5 dd e1 43 76 e8 a2 58 b1 | 28 a6 3c d6 50 38 49 96 2d 91 42 d7 f8 ec 6a 33 | f4 e0 96 4a 58 58 aa e6 0c 5c 8c cb ab 5c e8 04 | a5 a1 ab 68 96 f3 f4 a5 e4 ae 1a 96 a0 9a f9 57 | 56 09 b6 81 96 72 27 a3 1c 3c 27 45 d5 f1 02 f8 | 2a d7 f9 4c 9f 1a a7 8a 5a f3 e7 da 4d 17 8e ac | 96 16 46 81 fd 01 db ca b6 72 84 a6 d0 d8 4e 69 | c7 79 31 c5 90 b9 16 b2 14 19 41 ef d9 1d 68 fa | 44 38 de 48 65 2c ec 8e 99 27 f7 c6 63 4b 60 bf | 8d 63 04 69 ea 6c 68 38 f9 a4 27 bd 15 c4 ec 7f | 0a d6 93 e5 0b 62 ad e0 de db a0 44 2e ae 03 d3 | 4a 90 aa 55 4e a9 22 5e 90 19 cd ff e2 28 23 a0 | 29 00 00 24 cc 92 78 18 36 9d 5d c6 a8 50 3e 53 | b3 db 47 67 8a c3 3b 19 d4 07 41 62 2d ad 79 2f | c7 c6 9c 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 83 04 bb 7b 41 fb 94 b6 5a f7 bf c5 | 50 0b eb 35 93 8a 85 4f 00 00 00 1c 00 00 40 05 | c2 0f 22 62 b9 53 47 a9 22 ed 80 06 c6 98 27 8a | 4f 90 48 63 | libevent_free: release ptr-libevent@0x7fb37c02a950 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c009690 | #642 spent 0.0618 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #642 connection "road-eastnet-nonat-171" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348012890 | handling event EVENT_RETRANSMIT for parent state #525 | start processing: state #525 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #525 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-80" #525 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-80" #525 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.230633; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.926312 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c009690 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #525 | libevent_malloc: new ptr-libevent@0x7fb37c02a950 size 128 "road-eastnet-nonat-80" #525: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.80:500 to 192.1.2.23:500 (using #525) | aa 0a 50 f6 eb 80 0b d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa f9 a3 5a f1 06 e3 d8 4a 74 cc cb 91 5d 3f e1 | 21 df 1c 09 20 b5 fa b8 68 99 55 2e 9c f7 c4 26 | 2d 13 5e 73 62 28 0d 5d 1b 19 61 40 3e eb 12 46 | d1 3e 37 e2 36 63 3a 09 94 77 c0 7e 6c 49 5a 1c | 2a 84 ad 4d a2 2e 20 e1 b3 d6 0e 28 0c 73 33 56 | 98 ce 6a 84 5e dd ad 70 fc 04 0c c9 ba 63 4e a9 | 26 10 ce 94 47 dd ed 32 a8 e2 94 aa 02 0d 68 a7 | 46 c0 e1 ca 9b 37 10 05 10 43 ac 26 3c df ae af | 84 82 12 69 3c a5 a9 a4 da 4e 39 e7 22 d4 22 45 | 35 cb 06 64 36 de 60 0f 82 92 bc c7 8f dd a7 83 | 9c e0 b6 87 e5 ac 79 26 3e f5 8d 2d cd 1a bc 53 | c2 a7 57 2e 12 39 97 28 1d a6 53 fc 44 99 8d cf | 75 73 64 e4 87 c5 c3 cd d3 07 30 22 82 04 3f 75 | fc 56 ce 51 6d 2a 4c a6 f0 62 cd cf f7 11 c5 31 | 55 34 34 06 69 e6 6c 30 96 c7 a2 0e e6 93 d4 86 | 21 15 7c aa ca 54 c4 d5 3d 13 a0 9d ed ce c0 b7 | 29 00 00 24 2f 02 54 75 b3 a1 a2 a3 49 b6 96 0f | 9b 0f 28 8f 5d 43 f2 88 27 e5 88 4f 55 a3 28 fe | cd 5e 6c d1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 5d 92 6e 19 fc 80 58 4d ee 5f a9 8d | 60 2e f6 39 2c 8f 9a a2 00 00 00 1c 00 00 40 05 | d9 3c 3f 56 aa 0d 1b ab 4e ad 62 3c 67 74 fc 7e | 8b 17 e3 b0 | libevent_free: release ptr-libevent@0x7fb34805e9d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348012890 | #525 spent 0.0626 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #525 connection "road-eastnet-nonat-80" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37400cc10 | handling event EVENT_RETRANSMIT for parent state #566 | start processing: state #566 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #566 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-39" #566 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-39" #566 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.230703; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.944049 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348012890 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #566 | libevent_malloc: new ptr-libevent@0x7fb34805e9d0 size 128 "road-eastnet-nonat-39" #566: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.39:500 to 192.1.2.23:500 (using #566) | 88 80 6b f4 b9 8d 66 b5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ef c8 5e ab f5 ee a4 b9 98 60 85 05 ca 3b 04 b0 | 7d 9f 17 5c c2 7c 2b 4a da 7e 26 15 fc 48 81 31 | b4 8e c6 e5 11 7d 74 25 e5 99 ba 1d 58 67 84 5f | 89 d2 e2 25 03 e3 33 52 7a ed d7 e2 f5 b6 28 a4 | 1d 2f f7 d4 f6 94 af 23 10 a8 8a fc f4 89 a2 3c | a5 d5 e3 17 b6 f0 c4 8f 7f 71 4d 6f bb 87 76 f5 | a2 04 13 1b a7 e6 0f e4 4c 2d 33 e9 31 87 17 3c | cd 1f 22 8b 07 c8 21 5a 22 9c 36 40 a1 0d 7a 52 | af 7b bb f0 61 88 95 3a 59 92 5f 05 a1 92 fb 6c | 3d 4d bd 20 03 45 e8 a3 b0 a6 b7 00 08 7f 5b e1 | f5 a0 c3 e2 5c ca 78 79 72 98 fa 67 35 e4 cc fb | 8a b3 33 65 b6 e9 a2 86 fe 7c ee ff 0a 6f 23 a1 | 84 0d 45 d3 fd f8 6d 40 31 50 c7 97 1c 51 ef a1 | 74 f8 15 00 16 ec 9e e6 ab 9d 53 7c 15 3a f7 d3 | 7c 57 1b b1 1c 4b 72 88 0a 87 ab 54 4a 5b c4 c2 | 57 bd 4e a5 0a 4c 3d fe 53 4b 65 c4 64 95 29 91 | 29 00 00 24 c8 7c cd e0 b2 c0 7c bc b4 0e 89 92 | 98 cf b4 cf 69 f0 3f 2f 7e 50 0c 76 dd c6 f5 df | 0c da 14 a5 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b d4 72 88 ba f6 c3 75 62 5e 72 62 | 65 f9 8a 24 3d dc 56 74 00 00 00 1c 00 00 40 05 | 54 09 d9 d9 07 67 4c aa 17 b3 39 aa 94 51 7e e0 | 9c 0e 3e 5d | libevent_free: release ptr-libevent@0x7fb38005f0d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37400cc10 | #566 spent 0.0638 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #566 connection "road-eastnet-nonat-39" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348030240 | handling event EVENT_RETRANSMIT for parent state #548 | start processing: state #548 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #548 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-5" #548 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-5" #548 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.230775; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.93753 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37400cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #548 | libevent_malloc: new ptr-libevent@0x7fb38005f0d0 size 128 "road-eastnet-nonat-5" #548: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.5:500 to 192.1.2.23:500 (using #548) | 6f bf f8 cc f4 7a 9c 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 20 3a 23 76 43 2c d6 0c 77 f6 be 3f 63 2d ef 87 | 5b 0a 43 13 73 5f 72 ec 4f 32 10 0e f0 de 84 7f | d4 61 90 d4 eb e1 32 1e e5 8e d7 b5 e2 7a e7 49 | 5d f2 fc 7a c6 30 1a 6f 07 cc 95 e2 88 f7 7d 25 | 65 7c dd a0 41 59 c3 25 f5 18 42 08 32 24 11 16 | 2e 52 4f 9a f3 7a ed ce d9 b4 aa b3 1f ae af 20 | 42 b9 b1 ad cd bb ee c0 74 e1 fd 67 f4 5d 34 44 | 6a de e6 b7 35 4a f2 eb 39 da 8c cb 41 b2 00 29 | 86 07 50 93 e1 bc bf ab 70 b9 fb 51 f1 a7 98 f9 | 2b 98 28 e6 c7 3d 74 21 03 5a bb f5 37 9e 89 94 | 7c 03 2e 40 d5 60 16 2d d9 fe b8 61 a7 83 f3 1d | ff eb 71 d5 80 83 a8 32 43 df 3f 7a 3d 1e 14 01 | e8 08 00 8c 59 d3 27 3d e9 52 04 6f 01 93 dc 8f | 24 6b 25 9d e9 4a 4b 67 81 c6 ae fd ce 83 60 14 | 29 d6 20 63 24 51 e8 f1 7b e4 ef 94 6e af af 7a | 65 c0 38 a3 b6 06 be 41 56 5f 9d 49 7b 85 1f be | 29 00 00 24 3a 01 9a 17 69 6a fb fe 06 63 3f f6 | 88 7f 88 c9 7d fd b9 fa 66 cd 9e 05 f9 56 87 93 | 78 28 b7 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c6 f1 40 91 ab 0d 01 84 cd e5 c5 16 | 59 f1 09 ef b4 ca 5b 7d 00 00 00 1c 00 00 40 05 | 0b 27 51 7f 3c e8 a2 b4 d8 2e fd 6c 29 e4 91 b0 | 77 83 22 02 | libevent_free: release ptr-libevent@0x7fb348059270 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348030240 | #548 spent 0.0625 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #548 connection "road-eastnet-nonat-5" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c046090 | handling event EVENT_RETRANSMIT for parent state #553 | start processing: state #553 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #553 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-77" #553 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-77" #553 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.230861; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.935255 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348030240 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #553 | libevent_malloc: new ptr-libevent@0x7fb348059270 size 128 "road-eastnet-nonat-77" #553: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.77:500 to 192.1.2.23:500 (using #553) | 9a 41 ad 5b 0b 26 50 71 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d9 98 9f b9 be 87 16 03 59 fa c6 46 2f 12 bf f9 | 9c 48 69 58 ca 2c be 3c 1b 2c 0f 5d 12 16 fe b8 | 30 28 bc 11 9d 18 3a 2e 90 9c 49 0c c8 26 aa 51 | 1a 9f 8d 14 3c a4 33 0e 49 75 9b b9 aa 38 ce f2 | 16 4f ee 39 a5 0c 19 90 f6 fe 17 a7 97 44 51 96 | cf b5 e3 78 62 4a 8d 45 65 01 d7 f0 91 ea 83 03 | ef ee 72 ad ec d4 2e 42 af 58 6b a8 76 71 c1 a4 | 15 40 9a 41 d3 be f4 fc 82 6b 9b 27 44 16 92 88 | d2 ec ae 3a ad 37 9a dc be e2 18 f1 a7 5a bd 4f | 9f 7b 73 27 86 3a a5 22 07 50 15 6f 01 41 8f 31 | a4 8d 9b be 74 93 18 96 e2 bb be 98 d5 3f 3c b0 | be 51 bf 90 e0 7d 1d a1 c1 89 14 87 3d 3e 5f 1a | 3a 6e 65 d4 e7 b0 94 33 2a d6 83 76 bd a6 19 f2 | 31 91 dc c3 17 65 be bd 3f 1a c2 ef f5 43 82 b9 | b3 3d 97 1b b0 5f d5 6f 78 93 3d 15 15 8a d3 04 | 93 b7 c2 73 86 dc fe 40 7b 4e 06 9a 50 ca 56 13 | 29 00 00 24 51 58 09 66 02 b7 a8 f0 dd f0 1c 1d | b2 fa 84 64 76 65 9d d1 36 08 96 10 0a a1 c1 1c | e7 da ff a4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 41 6f 46 01 b2 f0 28 d5 2d 8d 99 | ce e6 b9 ed 57 d9 9f 7b 00 00 00 1c 00 00 40 05 | ed c5 55 11 76 93 de 00 6c 52 d8 5a 9c ca 52 d6 | a7 72 5b e1 | libevent_free: release ptr-libevent@0x7fb350065220 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c046090 | #553 spent 0.0919 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #553 connection "road-eastnet-nonat-77" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c040840 | handling event EVENT_RETRANSMIT for parent state #582 | start processing: state #582 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #582 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-127" #582 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-127" #582 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.230945; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.951967 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c046090 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #582 | libevent_malloc: new ptr-libevent@0x7fb350065220 size 128 "road-eastnet-nonat-127" #582: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.127:500 to 192.1.2.23:500 (using #582) | 36 4a 37 cb 1c b9 ae 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9f 4f 61 87 c6 78 57 73 4a 5f a1 9a 64 82 d0 e5 | 6f 49 6a 86 33 ed b7 39 d6 77 5c f2 31 a0 9f f4 | ec 43 a1 b9 ee e5 b8 9b 1f c7 f2 95 28 7d d0 3c | ff 5b 16 5d 16 d5 26 95 a7 b7 04 19 40 c9 07 68 | b1 7d c4 8c 15 89 44 64 6a 3b 95 b9 d0 ad c1 f3 | 68 1f 13 1a 8f ee ba b2 3b 04 d2 cd d6 6f 70 f2 | aa 4a f0 c4 b9 45 7c f5 97 5e ea 63 fd 31 8b 63 | 9e 99 a5 f5 b9 09 c7 72 66 49 45 08 e0 12 a2 af | f0 80 ef 2a 78 c8 ab 6e bd a6 31 fa b7 36 d9 19 | d4 8e 57 35 2f a1 d2 8a d8 2a cc fa d0 26 84 24 | b9 a6 0a 8f 1b 41 12 b9 03 5a 72 30 93 99 ff 3a | e5 ef 85 4d d5 6b b8 f6 bf 6a 3d e4 93 67 8e 91 | 9d f8 cf c1 e9 c5 82 41 6a ed e0 1b 1d 7b a2 28 | 4c c5 b3 bb af 17 f6 b1 f6 63 47 76 31 fe 54 4d | 80 f6 9f bb 7d 94 71 07 12 ba da 93 7c 72 12 96 | a5 ce 85 8f e3 3e a3 aa bf b5 d9 b0 4d 73 42 19 | 29 00 00 24 3a 1e 72 ea a0 4e d4 41 98 1d 74 e2 | b1 f2 f0 bd 21 18 c0 9c 2b 6a 10 6d f8 77 54 e9 | 5f 0c 5c 20 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 1a 0a d4 84 49 b9 2d 3b f6 bc 1c | 48 56 f8 6a ec 07 3c 40 00 00 00 1c 00 00 40 05 | 4c a0 a2 f3 b5 28 de 62 5d b9 c2 1c 46 ba 05 5c | 22 af fc 09 | libevent_free: release ptr-libevent@0x7fb37c069e60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c040840 | #582 spent 0.0628 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #582 connection "road-eastnet-nonat-127" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34801da80 | handling event EVENT_RETRANSMIT for parent state #607 | start processing: state #607 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #607 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-35" #607 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-35" #607 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.231015; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.961713 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c040840 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #607 | libevent_malloc: new ptr-libevent@0x7fb37c069e60 size 128 "road-eastnet-nonat-35" #607: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.35:500 to 192.1.2.23:500 (using #607) | 1d 41 1f c6 ff 0f 27 1d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9d 29 5d d3 25 1e d3 3b 53 2c 02 04 94 df f0 9e | c0 c9 bd c2 0e c6 5b 3e b3 b5 28 a4 b4 de a0 bc | 44 35 8d ca 70 6e 31 a6 5c c7 6e 92 aa 89 1d 29 | f4 20 9b e4 de 42 28 b3 c8 f4 2f 6a 42 5a 19 f0 | 51 f8 ac 34 ce 28 a7 d4 af 5a ec ac 56 96 17 ee | 7c 53 68 62 c6 e5 b3 17 31 98 5f 6b 69 9c 2a 00 | d4 a4 6e ae ef 2a ab ba 56 64 86 65 05 0f d7 44 | f7 e3 bf 1e a4 ed a7 7d fe 8a 1d fb 8d d7 f1 cf | e1 7d 41 0d a7 4f 0c f0 68 6a 81 5f b1 24 1b dc | 3f da c7 a0 34 fe bc 93 f1 d2 24 a2 86 ef 73 2a | e2 6f bf c6 0f a9 6a 2f f3 1d 17 2f 3f d3 72 6e | b7 b5 92 74 5f d7 2a 9e 99 d9 04 38 46 4a df 24 | 0d bb 8c 68 24 f0 01 b1 77 d7 d1 59 41 dc 96 1a | 97 ab d6 d6 b7 b7 b1 29 13 72 38 ec 4d 09 e0 92 | 84 95 9d 0a 22 aa 6b 94 be df 8c 5f 62 af f3 3a | fb a4 36 0a 7d 82 c0 0a 05 87 7c b0 d2 48 69 07 | 29 00 00 24 0c 6e 31 a9 aa 11 87 13 04 94 3b 5e | 65 1f 88 8c ea 44 4e 42 5d 13 db 22 a9 85 17 06 | 20 31 3c 2a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 39 f9 d0 a1 05 b1 12 13 d2 38 28 3a | 7b e1 92 d5 4d 8b fe 08 00 00 00 1c 00 00 40 05 | 52 35 89 2b 6d df 6f e4 b5 73 99 d5 81 ab e6 da | 1a 9a 77 69 | libevent_free: release ptr-libevent@0x7fb348053b10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34801da80 | #607 spent 0.0922 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #607 connection "road-eastnet-nonat-35" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a986c0 | handling event EVENT_RETRANSMIT for parent state #540 | start processing: state #540 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #540 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-126" #540 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-126" #540 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.231117; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.928673 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34801da80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #540 | libevent_malloc: new ptr-libevent@0x7fb348053b10 size 128 "road-eastnet-nonat-126" #540: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.126:500 to 192.1.2.23:500 (using #540) | 2b e1 27 8d d0 52 8a f1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b7 d5 ad a4 cf eb 89 cf 33 00 bc 65 7f 4a 7b 8a | 16 3c 55 64 2b 44 36 7b dd 40 e5 4b 69 bb 87 d7 | 44 84 65 2c 80 59 b1 0b 26 0d 4b 17 d8 92 89 d5 | a8 39 88 9f 65 7f d7 e3 5e f3 f1 e1 69 ed 56 6f | 2d da 3b aa a1 f5 57 29 af ff 54 b9 33 17 09 e5 | 1c 0d 3c 29 e1 8b c4 f9 51 80 15 5e 1a fa 1a 83 | b0 dd b2 13 d6 42 a1 13 6e a2 49 94 b3 88 a5 52 | f2 25 96 67 72 ce ef 27 ee 12 d4 a9 81 d9 24 c0 | b5 47 34 ae 0d b8 be 17 8f d7 40 55 d5 69 22 bc | 39 f7 c5 28 22 3c 68 a5 3a 8d 6f 1f 00 85 29 77 | b9 55 ef 45 f0 37 a4 79 52 7d a6 e9 cd 97 64 1b | ec a9 e2 6b 2f 70 e3 90 d3 39 85 a7 70 54 7c ee | 29 b5 fb 95 bc cd d5 08 47 e2 10 f1 3c fd e5 2c | d9 d7 22 81 09 0d fa 53 8d c3 ee c8 2c a9 cf 74 | 00 4c 6d d4 7a 67 6f a7 66 48 98 1b c8 e6 db 27 | dd 8b f5 35 b4 13 6e 03 ce 21 d0 88 3b 78 0a fd | 29 00 00 24 83 64 8b 32 eb dd 3f 5a 87 dd 64 20 | 2e 87 12 47 14 e5 e2 45 bd 12 94 4b dd e7 b2 d7 | 43 01 e7 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 68 20 26 6c 5f d3 95 5b fe ef 96 45 | 0a fb 28 79 9a 9a 40 12 00 00 00 1c 00 00 40 05 | 9f b1 04 08 d0 1d 7f 34 66 26 cd 7d 6d a5 dc a3 | 2e 5b 4c 92 | libevent_free: release ptr-libevent@0x7fb38006f870 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a986c0 | #540 spent 0.0615 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #540 connection "road-eastnet-nonat-126" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378046090 | handling event EVENT_RETRANSMIT for parent state #634 | start processing: state #634 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #634 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-221" #634 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-221" #634 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.231186; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.974933 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a986c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #634 | libevent_malloc: new ptr-libevent@0x7fb38006f870 size 128 "road-eastnet-nonat-221" #634: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.221:500 to 192.1.2.23:500 (using #634) | cf 5e f3 d9 0f 8f c8 69 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 6e 4e 42 21 e8 c2 13 74 c2 ba d4 76 e1 be 3a | 17 15 d5 c1 bf ca e3 9e c2 e2 ab ff 65 ee 7a 2c | f3 bf 14 cb 54 1e f5 5d 6b 0b 4b a3 c6 42 f2 c5 | 00 c2 f8 63 58 12 0f 9c c4 de 06 61 51 86 70 ce | 7a 0a 7a ff cc 71 b7 65 f5 cc 38 14 71 81 de 07 | b7 fe 20 84 4a ff 1c 5d 53 a3 fb 06 85 18 2b 9b | a8 30 c2 b9 8d e1 9c 07 b4 43 af 10 5f 03 0b 44 | c6 f5 8b 61 b9 fa 0b 3d 1c 32 63 5f 79 89 62 fd | 45 d5 92 76 17 fc 00 05 ef 5e 2c ec c0 11 2e 72 | 0f 45 e0 06 cd 9d 57 a6 22 61 8c 9b 78 8d c7 7e | 93 4b 6b 11 31 21 df b9 6f b0 e5 90 c6 6a 46 63 | 33 24 c9 bf 0d 8d 8a d0 3d 26 dd 1c 91 5a 75 0f | 70 13 b1 0c c1 ba 7c c8 70 09 19 0f b5 cd 04 5e | 6a af 66 e1 91 d5 09 48 02 32 4f dc 10 ea f4 57 | c2 40 bb 53 d3 0b 66 f6 59 f4 9d 9f 3c f5 45 a2 | 33 3b d9 2c 95 a0 76 aa 18 c3 43 fd 17 da c0 00 | 29 00 00 24 30 83 66 63 cd a6 58 35 d0 aa fe c7 | 9f 22 4a b9 bb d2 ab 8e e4 52 a2 c8 ac d9 43 99 | 4a 56 b6 54 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 53 4a aa 08 58 24 5b c5 80 af 06 0d | d7 f8 bd d3 f5 50 b0 3c 00 00 00 1c 00 00 40 05 | d9 15 55 e8 f6 53 18 54 ee 68 b7 cc 78 54 e7 63 | 8d 71 15 9f | libevent_free: release ptr-libevent@0x7fb3800648b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378046090 | #634 spent 0.0632 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #634 connection "road-eastnet-nonat-221" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354046090 | handling event EVENT_RETRANSMIT for parent state #545 | start processing: state #545 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #545 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-106" #545 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-106" #545 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.231256; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.941602 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378046090 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #545 | libevent_malloc: new ptr-libevent@0x7fb3800648b0 size 128 "road-eastnet-nonat-106" #545: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.106:500 to 192.1.2.23:500 (using #545) | 40 cb 66 3b 79 de 72 78 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 5b 7a 86 ba 9c 03 fc 9a 35 b3 49 7d b8 a9 eb | ce 9b 15 66 7f 3d 65 56 ca 83 c0 b5 c0 d2 9b af | bf 94 33 79 9e 6a 89 29 27 fe a1 c8 69 70 d6 9d | 72 b4 78 99 de bd 56 1e ee 52 58 81 e5 79 d8 fc | 9b 01 47 2e f9 5f ff db 1b 0c 1d 6b d2 24 13 26 | 4e 14 5a 53 41 21 88 e6 85 34 1d 40 8d 0c ab 68 | 2f 2a e8 36 f9 d2 8e 74 83 80 31 c4 ee f0 6f 04 | d8 06 8e 87 47 f7 48 6b 1a 9a d8 72 1e 44 3e 1e | 94 73 03 f7 b6 b7 71 80 64 13 af 6f cd 97 48 25 | 27 b1 25 73 1d 03 81 9d 9b ed 92 d1 b0 47 c5 19 | 43 4b c5 91 96 cb 5e d0 fb 41 6d fb 23 51 8b 64 | 9b 4b 49 79 cc de 0f f7 0b c8 5d 39 be 6a 5d a6 | e5 65 4b fd f0 3d 65 42 41 d7 16 db 74 2b 56 12 | 51 92 12 04 90 41 8b 34 9a 75 ef 99 31 b2 53 fa | ec 4e df db 6b 7b 92 59 ae 99 e6 6b a1 12 97 31 | ed 33 0d 5e 99 91 c4 04 5f f2 a1 92 4f bd 71 0b | 29 00 00 24 8b 68 1c b2 c6 cc 60 af d5 80 42 4c | 34 71 a0 ef e4 ac ff 5b e1 55 8c 60 71 90 0a 7e | 13 6c 58 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 66 b0 98 38 8e 87 51 0e dd 45 6a 77 | ed ad b4 ba d2 48 07 74 00 00 00 1c 00 00 40 05 | c8 e4 a8 78 6d 64 59 0e 02 cc 7d 7f 34 3a ae d2 | 96 b2 88 9d | libevent_free: release ptr-libevent@0x7fb354054010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354046090 | #545 spent 0.0625 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #545 connection "road-eastnet-nonat-106" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab3980 | handling event EVENT_RETRANSMIT for parent state #543 | start processing: state #543 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #543 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-11" #543 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-11" #543 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.231326; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.925118 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354046090 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #543 | libevent_malloc: new ptr-libevent@0x7fb354054010 size 128 "road-eastnet-nonat-11" #543: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.11:500 to 192.1.2.23:500 (using #543) | 8e 44 72 50 b9 d3 dd b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 41 24 1a 7b 6b 70 54 d6 bd da 9a 74 11 c1 10 4c | 35 ce 24 8a 41 de 3b c0 5b 1f ca bb 16 3b d8 1c | 1e a4 54 6d 24 65 47 b9 56 f7 04 e6 39 1c d0 98 | 83 cb 9e 40 be 51 70 af 81 68 b0 d8 3e 19 c8 15 | e4 25 aa 79 9c 90 e2 25 c5 ca b9 8c 40 22 6c 4b | 93 ad 78 af 16 d2 3d f3 8d 27 b1 61 55 d3 78 18 | 3a 04 68 63 37 a9 4f 5d fc 04 16 94 42 0d da 3b | 8c c1 6e d4 a9 31 72 3b 81 99 92 2b 83 15 9c d4 | 8b 0e 27 49 4d c1 a2 ac 6c 30 cd b3 8d 5a 76 66 | 00 bd 4e 1e 9f 08 70 f9 6c 29 f6 48 96 a2 b3 24 | fb 0e ee 0a ff 43 23 ef f7 df b7 1d 3c 50 f5 21 | 78 9e f4 1f 72 64 73 81 56 af c6 bf 6f 78 68 b6 | 23 6b 4d 8c d4 8f 95 9f e4 07 d6 99 60 6f 4f 68 | ff c8 49 ef 62 2d de 2b 39 14 98 51 d2 c8 bb 9f | 9f 3c d8 92 38 bf 91 56 69 62 cc 92 f0 79 c0 f7 | f4 11 ff 98 80 77 af d0 41 c1 25 02 72 ea c9 c6 | 29 00 00 24 54 02 f2 6f 33 5c 6e 1c 37 ce 9e 0d | c9 7a 13 59 0a 74 e5 bf e6 80 24 a7 f4 41 a6 33 | 04 30 82 74 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a3 fb 77 bc e4 59 3f 3a 12 ff e7 0e | 5d b1 f7 87 35 40 87 23 00 00 00 1c 00 00 40 05 | 86 cd c2 c9 ec 15 a4 23 df 3e 79 59 a6 b0 4d 70 | be f0 fe 01 | libevent_free: release ptr-libevent@0x7fb35006cb20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3980 | #543 spent 0.0618 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #543 connection "road-eastnet-nonat-11" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a0a9d0 | handling event EVENT_RETRANSMIT for parent state #583 | start processing: state #583 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #583 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-6" #583 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-6" #583 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.231397; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.942845 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3980 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #583 | libevent_malloc: new ptr-libevent@0x7fb35006cb20 size 128 "road-eastnet-nonat-6" #583: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.6:500 to 192.1.2.23:500 (using #583) | ee 37 ee 52 ed a9 c3 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a5 a4 f5 71 cf 07 11 54 77 c8 dc bd ad 96 f0 01 | 5d a4 14 b5 a6 c9 a5 8c 07 7c 60 be a1 8b 30 17 | 0d cb bf c7 58 fd 5c f5 d2 3d dd 6b 17 ca fe 28 | 75 d1 d9 89 ad e6 fa bf 8a 41 2a 16 1f 72 19 b5 | fa b3 fe f4 08 23 24 22 95 34 55 fd ba a3 89 6b | f3 72 8f 60 ab 16 03 0b e3 7c 7b 79 7b de 9c 09 | e3 e5 5a 50 1f ec 54 0e 6e 2b 44 25 a3 4b b5 b9 | 40 85 8c 3d 6b bb 5d 52 c0 1f 28 1d c6 f3 f2 46 | f2 e5 18 48 a8 50 9c e8 18 6b e0 d8 c9 f8 99 b3 | 9d 7e 38 69 ed ff df 3d 1e 61 57 86 a8 0a e4 e7 | b9 e1 4a ad ad 0b 8c 53 f1 1d 20 66 9c 6e 12 ed | 4a 64 77 80 75 c0 8e a7 e7 a0 ec 74 74 9a 22 d2 | ed 8b 25 d1 aa db 80 ca af 4d 51 c5 3a ff 34 e7 | 01 6e ef 37 60 dc 73 7b 12 57 ba 0a 31 0d 83 0a | 8c 77 6a 78 fe 86 74 7d 3f c3 4e 0d 39 54 83 b4 | 7c 64 dc 24 28 35 25 63 99 9c 79 c9 80 75 2e d0 | 29 00 00 24 71 83 b5 1d 55 d7 27 53 1f 29 9e 3f | 3c f1 26 1a 11 ac 1d 70 ba b0 78 18 67 71 1e 34 | 60 b9 78 a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 0d 09 e0 45 78 0a 9d ed 5e 85 e2 2d | 30 cb b9 bb dc c5 6e a8 00 00 00 1c 00 00 40 05 | 05 40 6d 6e f0 4a bd dc 3b 91 6d 9b 95 75 10 8f | df 31 bb 10 | libevent_free: release ptr-libevent@0x7fb36c06f9f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | #583 spent 0.0629 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #583 connection "road-eastnet-nonat-6" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358009690 | handling event EVENT_RETRANSMIT for parent state #606 | start processing: state #606 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #606 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-223" #606 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-223" #606 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.231467; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.970191 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a9d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #606 | libevent_malloc: new ptr-libevent@0x7fb36c06f9f0 size 128 "road-eastnet-nonat-223" #606: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.223:500 to 192.1.2.23:500 (using #606) | 23 c4 ab 3f 0f 4d 11 7f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c8 ec 57 8c 95 7b 1b 15 f8 8d ea a4 a3 af fe de | c8 50 9d 01 42 a2 a8 d6 b3 0f ab aa a3 20 6b a8 | 43 36 ac 25 c0 23 8f 9c cd 38 59 18 58 4d 26 27 | 3a c1 0c 20 3d b4 f2 a3 6a 0b 85 ac 0d 0c cb b8 | b2 27 34 92 1e d8 c1 ed 04 88 17 ec 3d f0 78 9d | 19 06 f9 a8 2e 5e 2f 6e 4a 1c 90 db 5f 93 41 e4 | 28 08 f7 7a 45 4e 76 50 c3 e3 6e be cf fb 71 40 | 41 9c c6 87 30 7d 0a d4 8c b5 0f c7 31 32 44 ba | 3a 9b 83 7d 6b 03 e1 c1 68 94 44 99 8a c0 56 cb | 60 44 86 42 73 d4 b2 3a 24 29 f0 d7 e7 c2 92 6f | ca 66 01 13 32 22 64 32 e0 45 28 0f 62 51 89 c6 | 22 97 d2 d2 ee ea 04 89 40 64 4c 95 db fd 1a 35 | 63 e6 0a f3 7f 06 ca e1 8e 13 8f 8e cf e0 ac fd | 6c 90 77 9a 8a 33 7c d0 d9 ee f2 a2 51 90 42 0f | b9 cb 13 5f 29 0a cb 86 1a e6 6a 5f 79 aa a1 f7 | 73 3c 37 36 16 c6 aa 27 ef 60 b2 ed ae a6 69 93 | 29 00 00 24 16 68 47 01 32 e0 21 95 ec 7e d5 06 | 76 a0 66 58 60 6e 0d de ea 44 b2 e6 49 d7 45 61 | 92 31 62 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f0 9e 40 be 82 89 76 10 a5 a5 b3 c0 | c6 a6 27 e3 b1 8f 5e 15 00 00 00 1c 00 00 40 05 | 9e 23 71 0d ac e6 cd ef ec 0b 33 3c 87 a3 e1 e7 | 66 2f 45 0f | libevent_free: release ptr-libevent@0x7fb358059b60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358009690 | #606 spent 0.0637 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #606 connection "road-eastnet-nonat-223" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c03b210 | handling event EVENT_RETRANSMIT for parent state #575 | start processing: state #575 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #575 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-62" #575 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-62" #575 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.231538; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.945861 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358009690 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #575 | libevent_malloc: new ptr-libevent@0x7fb358059b60 size 128 "road-eastnet-nonat-62" #575: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.62:500 to 192.1.2.23:500 (using #575) | b9 99 36 5a 8c c2 79 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 c8 04 79 a7 ca 7e 22 ae 09 07 e5 fc 49 20 ff | d5 2c 7e 22 4c 72 c0 78 1e 2c 5c ec 12 7c 72 d2 | 02 e8 75 7b 4a a7 3c c3 16 5c 13 70 ea 37 54 f9 | 56 e8 d3 91 10 1a 84 a7 6a bd f8 ed 5e e4 34 35 | e4 61 65 f6 21 ef d0 e1 bf 6f 09 fe ff af 3a 45 | 86 75 a8 02 ec e4 0e 75 42 6b 01 d8 b1 76 3d b4 | dd 64 39 8f d4 1d 82 58 1e c2 7c 1b 86 61 97 0b | 7a c0 a1 e4 47 98 4b 18 ef a4 43 98 6c 7e 6d d0 | 16 22 ae c2 a0 b2 46 36 87 d4 91 30 13 3f 9a eb | 8a 99 16 71 39 ce 4d 5e 49 23 27 dd 31 e1 69 d3 | 97 f4 5c 55 69 dc 26 6c 11 fa 11 8a 2a 43 c5 d6 | 25 6f 41 fb 1c 99 a2 b8 45 cd 12 29 39 ba ac a3 | c6 02 a2 8b a0 be b1 46 84 7b 24 9a f3 d6 f9 65 | 1a 69 bd f7 e8 de e9 5a df 78 41 ab f7 29 e1 6b | f7 12 cb 1a 99 80 ee c2 16 60 54 4d f3 eb 93 e7 | 80 78 df 65 e2 d4 7f 1b 6e a6 c2 48 37 dc 57 12 | 29 00 00 24 b8 4f 87 74 9c 80 54 81 1f 37 0b 79 | c0 75 5b ab 09 6f 94 95 e5 f3 52 5f 2d 7b fc 69 | 2d 41 18 98 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cd 17 0c 0b ea 42 91 a8 38 34 87 4d | f7 fc 36 4d 5c d3 fc 11 00 00 00 1c 00 00 40 05 | d9 91 bf d5 e3 57 28 b5 8a cc 1f cf ff 34 03 80 | 9c e9 c7 70 | libevent_free: release ptr-libevent@0x7fb36c0542e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c03b210 | #575 spent 0.0629 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #575 connection "road-eastnet-nonat-62" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb380015160 | handling event EVENT_RETRANSMIT for parent state #538 | start processing: state #538 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #538 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-50" #538 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-50" #538 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.231609; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.928696 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c03b210 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #538 | libevent_malloc: new ptr-libevent@0x7fb36c0542e0 size 128 "road-eastnet-nonat-50" #538: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.50:500 to 192.1.2.23:500 (using #538) | 7d c2 7d 21 ef 8d 9c cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 47 92 33 2e 2c bb fa d3 c8 4f 04 33 a3 d9 67 23 | c5 f1 25 5c 53 26 1a cd 8a 43 1a 34 d0 e0 56 a7 | 2c 60 2d 8e 0e dd 90 95 15 0a 6b e5 9a cc ab f1 | 7c bd 19 8d 97 83 43 89 b4 a0 d7 4a db 0b 32 48 | 37 e5 2e a6 a4 51 00 59 4d 06 a6 4f 7e 5a c1 3b | 41 2d 91 05 a9 98 a0 d8 9a e1 37 d4 eb e2 b3 93 | e7 01 b6 51 59 81 49 b7 c7 db bc 77 53 8d ec 96 | aa 77 df f8 25 74 3c 8c 99 15 73 9e 96 a4 29 97 | 67 0e 10 a2 47 f8 b3 64 aa 76 27 48 03 49 0b e8 | 8e 18 c8 17 4a 26 1c af 91 66 f4 48 af e2 d7 d4 | 44 38 3e 28 ac 6b 9e 39 19 3f ae 6e d1 64 ae 00 | 5c 63 81 a7 65 f0 45 ba 8a 0c 4d 79 03 55 a4 7a | 72 cb f1 39 e4 d0 28 d0 3e 02 49 3c 8a 03 29 fa | 32 8b 50 0b ba d4 8f 2b b2 0e bb bd 1c 1c 88 74 | fc 9d 0d ed 49 4b 7d c7 5e c8 b1 dc 66 01 28 d7 | 81 70 ee a0 95 cd 9e 29 51 a2 d1 8a 79 cc 01 2d | 29 00 00 24 0d 80 72 91 5f 6c f2 ee ef b6 16 64 | a0 b5 22 be fd 2c d0 f5 a5 ec b8 1b c0 82 2c aa | f7 2e 69 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 50 35 66 94 43 28 e7 40 5b c1 a0 78 | 2b ba 2a d8 0e c9 44 ab 00 00 00 1c 00 00 40 05 | 3d 34 49 ee e1 5a 54 f0 2b 50 8b e9 80 0b e1 58 | a7 e3 51 fd | libevent_free: release ptr-libevent@0x7fb38006a090 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb380015160 | #538 spent 0.0615 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #538 connection "road-eastnet-nonat-50" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a5da90 | handling event EVENT_RETRANSMIT for parent state #568 | start processing: state #568 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #568 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-34" #568 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-34" #568 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.231679; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.946456 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb380015160 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #568 | libevent_malloc: new ptr-libevent@0x7fb38006a090 size 128 "road-eastnet-nonat-34" #568: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.34:500 to 192.1.2.23:500 (using #568) | 6e 64 73 85 ce f2 b0 28 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 a3 99 bf 78 b9 d4 1a 84 24 de 04 7c f3 4d c8 | 96 8b 02 59 28 04 a0 26 9f 13 67 64 f7 77 7a 65 | 5c 17 49 3e 43 8b eb 50 14 de 87 67 95 79 66 a4 | ac 29 76 ee dd 7d 07 1f ac 4d a9 5e 2d 67 5f 35 | c1 62 fb c8 15 ae a3 12 9b c1 7e 41 bc 7b ec 39 | 5b 29 5a 0f 5f 02 56 47 d1 33 0b 64 a8 f0 f9 e0 | 79 a9 8c 6d 5d d0 49 7f 45 3b 2b 8e b6 e4 e8 15 | de 83 5e 1a 47 c0 32 44 cb e0 50 bd 65 a0 22 bc | 0b a6 8b 59 f8 c4 16 dc 3f 1f 41 55 d8 a6 4f 00 | f4 0f fd 9e bb a0 ca 89 1c f2 5b 3e b5 1d b0 8a | ed 21 82 3c a3 44 7f 36 e9 37 bc ac c1 e1 00 c4 | 04 65 71 de 20 77 8c bd 4b 28 11 32 5a 14 67 24 | 07 50 c4 30 94 78 de 21 2b 34 e6 c7 52 91 19 f8 | 98 c0 be 08 e1 94 2a 06 f0 4f 8e 0c d1 26 ea 08 | 99 06 ef 43 9b 53 fc e2 1b 86 fb cc 41 b8 4f 56 | b1 9c b0 66 18 e0 a2 81 3f 3a d6 0e 31 c5 b9 d0 | 29 00 00 24 13 36 f4 68 46 c8 45 cb 43 3d ab 7d | 06 e4 d0 2e f6 fd d6 0f 63 23 da 46 eb bc 2f aa | 4d ed 12 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 84 1a 56 ea 9e db cc 8f 31 8a c2 | 65 e8 4d d8 8a 02 34 c8 00 00 00 1c 00 00 40 05 | 74 34 3f f7 0f 8a 4f 83 f5 c9 a4 b3 22 9c 5e 1d | e6 10 1a 44 | libevent_free: release ptr-libevent@0x7fb37005eff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a5da90 | #568 spent 0.0631 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #568 connection "road-eastnet-nonat-34" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ae48c0 | handling event EVENT_RETRANSMIT for parent state #578 | start processing: state #578 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #578 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-143" #578 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-143" #578 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.231748; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.947972 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a5da90 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #578 | libevent_malloc: new ptr-libevent@0x7fb37005eff0 size 128 "road-eastnet-nonat-143" #578: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.143:500 to 192.1.2.23:500 (using #578) | 68 e2 ee c8 4f 05 0e 80 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 84 22 a6 6d d7 fc 8b 0a 14 19 3d f1 fb 0a ed f9 | 6f 90 9e 8a 9f a9 d8 ed d1 df 6a a2 d8 b2 22 2e | b1 59 73 5e b3 ab 9a 31 51 87 54 fd f4 e8 4e 8d | 3f 21 83 6e 35 41 fe 08 72 f5 2d 8d 2a f4 ba e0 | 91 8d f0 a1 05 86 67 4b fb b8 b6 6d 1e 1b 25 24 | 22 78 8b 7f 2f cf 5d 9a f7 63 da 29 5a 14 94 0b | 35 6e 33 f7 ca b2 64 fd 7c 9e 63 2d cf 43 41 22 | 59 51 84 8f fb 27 d9 fa 44 51 1e 67 02 f1 d2 0c | 45 0f 35 78 a9 8f 35 39 ea c6 d9 8d 03 b0 0f 84 | 80 91 04 9f d8 fb ff 28 d3 ab da 21 66 90 1c 59 | 8d 41 8b a6 7f 98 ab 4c b6 53 24 a3 ad 53 6f 51 | 8f f2 b7 4c d3 82 c2 ad 67 89 34 ab a5 77 52 48 | 5e 0b f2 ef f8 d5 a0 42 b1 fe 42 08 88 ca 60 89 | 3b cf 5c bd a3 63 ec 76 02 82 7b 9a f3 6f d7 d6 | dd e6 17 44 06 f8 37 9b 67 a7 db 60 51 b4 ad 18 | 60 cb 7b f0 7e d2 5e 9d 2e 49 2f db ef 23 bd 96 | 29 00 00 24 46 bf ee 27 91 3e be 20 10 cf 9d 0f | e6 4a bd 7e e9 3b fd c7 94 37 e1 c7 cd 2d 4a 64 | 84 e7 2b 84 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a1 0f 29 05 fe c1 9c 12 af b5 65 ca | 32 36 33 1d 77 e8 41 70 00 00 00 1c 00 00 40 05 | 4a 88 68 5c be 68 1b 50 17 99 f0 8c 97 cf 78 ef | ec cb 25 c1 | libevent_free: release ptr-libevent@0x7fb354069fa0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae48c0 | #578 spent 0.0628 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #578 connection "road-eastnet-nonat-143" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368017ea0 | handling event EVENT_RETRANSMIT for parent state #636 | start processing: state #636 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #636 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-146" #636 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-146" #636 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.231818; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.966181 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae48c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #636 | libevent_malloc: new ptr-libevent@0x7fb354069fa0 size 128 "road-eastnet-nonat-146" #636: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.146:500 to 192.1.2.23:500 (using #636) | ce ed f3 5e ed fa 9c 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 25 c3 55 ec 4f 5b 4c 21 a7 89 24 6e 2a b9 a9 cb | f8 19 9e a3 b5 df ee 5a 2c 71 bc 32 c1 92 74 f8 | b0 ab 4f 8f e7 f9 3f 29 7a 8c 9f 2f d7 89 ae 25 | 61 ab 3d 60 a3 0e 51 68 4c 02 b2 37 56 25 c1 f8 | bb 4a 51 31 0f 4f 85 cb a5 75 3a af 8e dc cc 87 | a5 bd 11 5b 66 d2 55 75 a4 74 43 78 e6 bd 37 d2 | 03 60 a4 df 8e 0f 50 d9 f0 84 a1 4b 87 50 ad 61 | 89 fd 53 a9 95 2c 82 05 31 04 36 b8 df 85 82 bf | 91 1b 12 8a 8c 72 93 cc 94 19 4b ed 3b c6 73 96 | c9 e4 a9 4f a1 e7 46 f7 b8 64 4d 8b b6 9f c4 71 | db ce 40 02 9e 98 7f 48 f3 9a 88 fa a8 90 63 74 | 87 33 f7 67 a1 6e 37 63 07 fd f7 f2 21 22 b4 ad | 8c e8 70 46 a2 30 3a aa 26 d0 99 b2 70 88 82 11 | e4 b8 46 de e2 85 7c 68 ae a6 76 d5 48 a3 de 62 | 80 b5 a8 b6 cf c8 b8 fb d0 a3 90 c3 74 cb c4 ea | 05 11 15 0d eb a6 bc f1 88 ed c5 82 fd 7e 24 72 | 29 00 00 24 e5 61 c1 f3 64 2d 4c f6 6f 55 99 d2 | 6d 06 b7 7f d0 4c 35 18 0b 4c dc f2 04 b9 cd b4 | d2 a9 94 17 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e5 4f 92 a8 39 a0 4f db 00 14 5d 39 | 5e 60 0b f6 04 83 59 50 00 00 00 1c 00 00 40 05 | e2 2e ff 0f c7 2f 00 8a f3 ce c3 f8 79 de 24 f9 | 92 17 31 34 | libevent_free: release ptr-libevent@0x7fb37c056bd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368017ea0 | #636 spent 0.0626 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #636 connection "road-eastnet-nonat-146" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b246c0 | handling event EVENT_RETRANSMIT for parent state #535 | start processing: state #535 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #535 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-19" #535 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-19" #535 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.231888; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.929944 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368017ea0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #535 | libevent_malloc: new ptr-libevent@0x7fb37c056bd0 size 128 "road-eastnet-nonat-19" #535: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.19:500 to 192.1.2.23:500 (using #535) | d5 3d 4d d1 1d 8f ff ea 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd a8 30 7d fa 09 0e 91 b2 9d 3d 19 f4 ee 14 55 | 74 eb 7d 16 30 9b 64 08 bd 51 c6 0d 08 b3 39 3b | d5 c5 d3 d3 a6 f2 f8 14 c2 6f d7 95 59 0a fe e3 | bb a9 65 de c8 14 9e f5 05 83 26 75 c6 4c 05 34 | b4 a0 d6 d8 84 8c 16 46 27 7f f1 b6 a1 52 54 4b | 1a e2 b8 4d 24 eb ac 25 a2 41 76 22 20 0c f4 96 | 27 28 ef 3a 94 b6 4e c6 21 31 ca 90 2d 01 ac 3c | d9 6f 71 29 9d 32 e3 06 10 09 09 3f 08 e0 93 76 | aa 17 e1 ea 49 4d 7c 42 77 05 f9 17 bf ad af 3b | ed b3 91 7e 42 2f 67 a5 df de 4e ff 93 f2 9e 57 | 56 30 c0 46 0a 65 8c 18 8f d0 75 64 b5 32 6c 49 | 39 97 ce e9 7b c7 0e af 02 39 df da d5 ef 53 47 | cb a3 4c 02 a0 b2 1e 76 9e 5a 01 81 ed 62 af 75 | 23 20 b9 1a 39 86 e6 f9 03 41 1a d7 4e e7 c4 f5 | 82 a8 7a 1b 8c da 94 0c 14 8e 83 05 ac d2 dc 89 | 48 f7 0b 1d 07 c9 75 9f ab 81 e0 05 15 0e d1 2f | 29 00 00 24 c2 c0 89 96 d0 f7 59 31 53 11 f7 4a | 36 92 ef 7e 38 2b 45 e1 10 42 96 da 05 ff a3 7a | f0 1b 89 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 99 9e 60 66 94 a7 a4 7a 54 28 cb 5e | bf 06 cf c4 93 18 58 c1 00 00 00 1c 00 00 40 05 | c6 37 76 00 c2 f2 29 53 78 dd a2 4d 2d 0a f6 f9 | 70 42 64 5b | libevent_free: release ptr-libevent@0x7fb3700597c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b246c0 | #535 spent 0.0615 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #535 connection "road-eastnet-nonat-19" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358023aa0 | handling event EVENT_RETRANSMIT for parent state #587 | start processing: state #587 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #587 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-113" #587 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-113" #587 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.231957; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.948638 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b246c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #587 | libevent_malloc: new ptr-libevent@0x7fb3700597c0 size 128 "road-eastnet-nonat-113" #587: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.113:500 to 192.1.2.23:500 (using #587) | c3 7c 98 3d b4 74 ab 99 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 ba c9 c0 d8 66 df e8 7c 54 40 82 4e 21 c1 07 | 59 68 7f 81 34 b6 35 92 5b 89 98 f6 ad 25 86 e5 | 73 8a 9a f2 4c 57 89 56 da a5 ff d6 a3 7f af f1 | f1 2e fb c5 11 47 ee a1 95 f5 26 dc 9e 47 06 cd | 34 b9 65 37 bd e1 04 27 c9 ff dc bf 67 78 96 38 | 52 9d 88 a0 32 73 3c 23 28 64 dd 93 b3 78 9e 2c | f9 cb d6 a4 86 ba f5 1b 60 c2 ad a2 9f 3e 81 a2 | f3 45 de 44 3d 28 04 c3 a1 6e 40 b1 4f 46 45 df | 5a 2a 79 6c 8f ae b8 30 ef c6 4a 6c 44 7a 01 b2 | 1a d8 98 92 1c 93 3e 73 34 b7 46 f8 42 08 19 36 | ba 97 66 22 2c 03 8b f7 14 9b 23 5b 0b 56 49 a9 | f1 9f 4c c1 da 59 b2 4c 96 91 d8 04 27 b3 bc 68 | 94 52 76 73 62 13 56 15 d9 2e 51 2c 30 ed a9 15 | 37 ab 85 06 28 93 eb f4 10 09 a8 e7 65 60 d0 d8 | c4 01 fb af 1e 97 f6 a3 48 1a 1f f9 86 1a 3d 6b | 8c be 9b 4f 2f 82 4e 29 1d 28 1f 1e 06 cf 26 25 | 29 00 00 24 23 67 1d fb 57 60 2a aa d9 1f a4 c1 | 63 ac 06 a0 22 92 47 d7 31 b6 6b 26 2a 2d 93 db | 2d dc c7 6b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 84 7e f9 13 29 fa bb ae 5d 14 1d | 96 1e a3 25 f7 97 44 66 00 00 00 1c 00 00 40 05 | 4c 51 eb 1f 58 50 45 24 34 60 90 38 ee 81 d2 d9 | 53 4c 38 07 | libevent_free: release ptr-libevent@0x7fb384006900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358023aa0 | #587 spent 0.063 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #587 connection "road-eastnet-nonat-113" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb340008e80 | handling event EVENT_RETRANSMIT for parent state #552 | start processing: state #552 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #552 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-10" #552 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-10" #552 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.232027; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.931865 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358023aa0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #552 | libevent_malloc: new ptr-libevent@0x7fb384006900 size 128 "road-eastnet-nonat-10" #552: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.10:500 to 192.1.2.23:500 (using #552) | ed eb 93 f8 7e 60 de d1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8b cb f1 c5 c9 33 2a 34 0e d1 85 1e 48 7b 2b 08 | 83 b8 ce 5c a9 55 37 f8 cf f4 8e c5 bc 03 8b a4 | ae 96 a2 99 0b 56 12 df 0f 7d da 8a 34 b4 5f 83 | 09 a9 33 3c c6 3d 79 dc c7 d3 2a 27 cf 87 82 2e | be 41 d5 b9 12 08 ab ba 5d cd 0f e9 8e 49 e8 11 | 80 d1 8e 63 8f 28 10 90 ba d3 f9 e8 1d 55 c1 f8 | e8 37 30 e5 eb 01 66 f8 b8 97 81 22 9f a7 c1 69 | d5 16 ee ab b5 f8 e1 be 84 8c fb 01 eb e4 87 59 | 7d 75 49 01 0a 1b 9e a9 46 55 ad d1 ba 32 2e a9 | 77 b7 a4 2c bc 42 01 fe 0e fb fb fb bb eb a9 a8 | 3e f3 4b e2 8b f1 54 95 68 4b 2a 95 25 78 7a 77 | 00 70 42 dc fd 53 48 e3 79 e3 2b ca 77 e5 77 0d | e6 9d ff 3e f8 da 34 38 ce 09 d2 79 7e 81 3b 25 | 2d 6c d8 d3 b0 67 79 e6 62 d7 c5 cd a3 5d 0d a2 | eb 67 42 ca ca d0 84 ca 28 62 c9 94 e7 3b 42 83 | 2a 29 90 2e 9c bd e7 c5 5a db e4 f9 d0 a5 4d f5 | 29 00 00 24 e9 97 93 9c 1c ef 16 73 1b 7a 47 b3 | b5 28 72 23 b0 2e 07 f1 0f 02 16 b9 14 bf 9e a1 | f9 3f 2a 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 4f 42 bf 1d 63 d2 01 e4 5f 1c 60 | a2 c9 01 6c df cd 78 4f 00 00 00 1c 00 00 40 05 | d8 d7 5c 38 cf 5f 73 a5 21 81 fd 7c d5 fb 18 da | 9b e7 4c d5 | libevent_free: release ptr-libevent@0x7fb364075180 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb340008e80 | #552 spent 0.0948 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #552 connection "road-eastnet-nonat-10" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb358005860 | handling event EVENT_RETRANSMIT for parent state #685 | start processing: state #685 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #685 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-187" #685 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-187" #685 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.232132; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.000834 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb340008e80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #685 | libevent_malloc: new ptr-libevent@0x7fb364075180 size 128 "road-eastnet-nonat-187" #685: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.187:500 to 192.1.2.23:500 (using #685) | e0 29 5a 0a 61 0a 1e b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fe 44 4b 09 14 55 26 a3 28 d3 47 1b 88 52 58 95 | 5f 67 dd eb b6 51 c4 6d ea b3 00 9f 27 0b 9e 86 | 50 32 3f d4 ef 56 d1 52 a7 51 55 9e a4 19 c2 cd | 1e 12 55 b5 15 8f f3 d7 bc da 86 79 a9 47 70 73 | f8 8a e1 76 61 55 ae c7 2a a4 37 62 35 b1 6b fe | 4c 50 6c cb 7b 12 10 09 92 ba 26 a7 a4 fc db d0 | 2f 7e be 44 45 5c 46 c7 04 72 12 a2 3d 84 49 94 | 30 c8 bc 4f 39 25 a1 4f 16 a1 c2 1b 4e 22 be 72 | b8 4a 5d 48 29 a7 82 7c 4d bd 6f 13 50 85 ca c7 | ec 11 98 29 31 a8 99 3e 4e e5 4d 08 c2 a7 9d fe | cf 40 e8 27 e0 9b bd 71 82 7f 3e 26 24 fa b0 04 | c9 9b 4d f2 2b 42 eb 90 50 35 90 38 b0 1f 38 ac | 7a cd f0 e4 b8 ac 72 a9 0b b5 6f 4a 72 d7 7c cc | 36 87 5c ca 4d 87 f9 81 63 9f 68 fd 43 d9 83 b9 | 17 41 d8 dd 34 e0 30 6b e0 2b 70 c8 04 99 12 51 | 60 74 b0 27 54 ca d1 00 a3 92 7e ac 84 49 40 ce | 29 00 00 24 52 c9 db 03 45 a7 9c af 05 9f 92 28 | 17 af f8 90 e6 9b f5 88 0d 6e 51 b4 99 c6 1e db | 36 e3 9e 65 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 24 35 b6 5e eb 9e a1 93 4b 5b 44 61 | 9e 29 9b 50 f2 cb be a7 00 00 00 1c 00 00 40 05 | 8c 5a f2 f1 d8 0a f5 46 ba 17 5e 28 dd 6d 65 44 | db 19 d6 81 | libevent_free: release ptr-libevent@0x7fb3800540c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb358005860 | #685 spent 0.0618 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #685 connection "road-eastnet-nonat-187" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350012bf0 | handling event EVENT_RETRANSMIT for parent state #512 | start processing: state #512 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #512 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-140" #512 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-140" #512 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.232203; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.928809 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb358005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #512 | libevent_malloc: new ptr-libevent@0x7fb3800540c0 size 128 "road-eastnet-nonat-140" #512: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.140:500 to 192.1.2.23:500 (using #512) | 9c 1d 79 9c 4b 40 5f 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1f e6 a4 db c4 02 2d 52 88 50 3f dc 30 82 ed 9f | 63 88 9c b5 3c c8 66 4a 37 be a1 3d aa fa fb 17 | f9 ac dd ad 9d 5b 20 51 15 fc d2 29 14 d4 2a 6d | f3 a0 8d 98 f8 da e0 12 75 4e bd 68 90 36 03 88 | 88 b8 f3 20 51 1f f0 57 2a c6 b0 97 a0 49 9c b7 | ad 6c f2 a7 06 f7 6a dd f3 22 78 ce 59 21 29 6a | 08 15 d7 74 fd 98 b0 83 c8 be 7d 16 eb bf fb 2e | e9 27 0a 5a 6e be 90 e4 cb 6a 36 aa 24 29 be 9c | ae dd 38 28 10 ed cb 2a 6e a7 2a ab b2 c3 1a ee | 88 bd 15 d3 67 e2 06 8e b6 97 80 a6 e7 00 87 5b | b8 76 fe 7c 8d d3 5e fd 05 4c 7a d6 96 d1 0a 11 | 2d a5 69 d7 c3 12 66 ec 98 02 9e 42 c9 77 fa 4f | 17 0c c6 fb 54 4a 9c 65 b5 be 12 f3 a2 73 e2 09 | a7 ee 4c 4f 97 4d 4f 10 71 3e 60 12 75 6e d2 f3 | dc 13 51 ee 44 b1 77 ed 2b d8 92 98 96 69 e5 ef | 91 3c 2e 84 e4 bb af 77 49 ac 6e 66 e2 85 88 c8 | 29 00 00 24 44 d4 21 93 f2 35 cf a0 d5 a8 8f 1c | f3 e0 06 82 de 41 7f 55 b8 ed f7 b1 6c 3f 58 31 | c1 b0 fc 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 46 3d ba 6e 50 5c 1f f0 71 43 e4 e1 | 93 99 c6 4c 68 18 ff 24 00 00 00 1c 00 00 40 05 | 1e ed 5b 7e 6f 31 a0 f1 10 d5 48 eb 40 5a a7 bd | a4 a8 9e e1 | libevent_free: release ptr-libevent@0x7fb38405d9b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350012bf0 | #512 spent 0.0631 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #512 connection "road-eastnet-nonat-140" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38800f8f0 | handling event EVENT_RETRANSMIT for parent state #574 | start processing: state #574 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #574 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-119" #574 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-119" #574 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.232272; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.943419 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350012bf0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #574 | libevent_malloc: new ptr-libevent@0x7fb38405d9b0 size 128 "road-eastnet-nonat-119" #574: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.119:500 to 192.1.2.23:500 (using #574) | e2 ef 8b 16 3f e6 8d 0d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 80 9b ac b3 38 49 75 b6 22 00 a0 9d 93 a6 e9 | 11 43 29 2d 62 04 9b 9a b1 ba de 84 81 0e e7 1d | cd ff 5c 76 64 ba 18 74 a3 4a 09 63 04 00 26 2a | bf 09 0f 54 5c ff e2 c1 45 f0 c2 f6 3f 0a 9c da | 51 50 31 ad 31 4a 14 11 d3 2e c7 7d 83 22 2d bd | 53 08 74 70 d6 57 21 06 d4 a1 0f c1 e6 a4 84 5e | 1d b6 57 8b 0b 80 4b 3c 9f f1 e4 bd 75 2f d5 2d | 21 3a cd 7a 13 59 f2 16 f8 77 82 03 06 0a 42 83 | 17 94 64 c4 be 42 b3 21 8f d9 97 d0 cf eb 0f 6b | 23 03 9f ee 85 9d 07 b2 6b 9f c9 a7 2a 0b 97 54 | 4a 3f d3 58 4a 03 9e d1 76 61 53 9c 9d 3c 44 d8 | 20 2a f5 24 51 56 2a d6 31 c3 13 a3 58 26 1e 56 | bd 02 c3 74 00 2d 43 63 8c 32 86 92 e8 ff 86 7d | 59 2f b3 f9 c6 38 10 32 ef ef 33 bb 6d f1 d0 70 | 62 b4 df 27 80 5f fc 95 13 80 c9 0c ec fb e1 f5 | c1 58 36 dc de 1d 19 2a ba 67 9f d5 f2 bc 5b d5 | 29 00 00 24 4a 9c 36 dc 2a e9 b0 d6 4b b7 1c 33 | 3b c4 06 c1 a7 f4 11 82 75 7b bf 05 3c 37 b2 a8 | 50 3d 47 0b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1a d4 1c 5f fa 34 64 8a 6c 74 11 d9 | dc 03 c5 f2 8c e5 1d 48 00 00 00 1c 00 00 40 05 | 47 f1 9d c3 97 23 03 bd 9f fd 5c 86 a1 b5 d4 44 | 63 f3 1c 6a | libevent_free: release ptr-libevent@0x7fb360067120 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800f8f0 | #574 spent 0.0645 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #574 connection "road-eastnet-nonat-119" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c00d120 | handling event EVENT_RETRANSMIT for parent state #595 | start processing: state #595 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #595 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-69" #595 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-69" #595 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.232344; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.974648 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800f8f0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #595 | libevent_malloc: new ptr-libevent@0x7fb360067120 size 128 "road-eastnet-nonat-69" #595: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.69:500 to 192.1.2.23:500 (using #595) | 66 ab aa e9 c0 1d b7 c7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 95 88 48 07 d2 42 4a 84 d5 c0 a3 1c d8 61 7a 51 | c0 04 1f 03 a6 14 4a 32 5e 37 8c 55 58 7b 77 2c | fb 55 e5 4e 6e 7e 47 ee 34 35 95 55 b7 b4 f8 60 | 9b a6 0e e2 75 cb 31 e2 b7 b1 0c c7 21 34 4e 50 | 7e 01 12 0e a8 09 e6 15 2f b7 95 a1 e4 49 25 11 | ac 79 61 4c de 52 7d 92 78 d2 3a 93 7f 39 9e ea | 46 19 3b 55 df f1 20 bc 73 20 02 d2 83 5b c5 c6 | 0b 63 b0 e9 03 aa 59 7f c4 15 87 10 2c 75 31 89 | e4 a2 a3 eb 70 c0 6a 70 01 fd e2 c8 7f d0 49 6d | 0b 69 e6 19 f8 ef ed 1c b2 75 a1 ef be b8 a0 04 | 19 f6 c9 5b af 6f 00 73 b8 d5 c5 23 40 6a a8 85 | 63 89 e6 04 8d b9 58 50 ce 42 06 0d 04 dd f1 d0 | b1 74 e0 f6 e2 3c fc e3 28 f1 bf eb 46 d0 6e a8 | a2 18 6d cf 33 6c 77 01 6e 12 a3 df 95 47 d2 df | 9f e9 63 f7 ac ac 70 17 4e 2f 38 fa dc cb 8c 97 | 70 a7 26 56 6a e9 c8 f7 90 d3 4d cd 2d 8d 00 8f | 29 00 00 24 94 2f 5e 13 28 37 ce fc 76 9e ef e3 | 9f a7 fb e4 ea 24 27 bd c2 06 13 48 b6 99 58 8b | d4 82 fe 13 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 96 79 3a 6c aa 9d cd 78 ee ff 71 61 | 9e c1 38 f2 06 7e 22 47 00 00 00 1c 00 00 40 05 | 1a 47 95 0a 50 1d 20 46 3c 7c f6 eb 28 2d 43 03 | 7b 00 02 4e | libevent_free: release ptr-libevent@0x7fb36401f4e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c00d120 | #595 spent 0.0628 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #595 connection "road-eastnet-nonat-69" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36001a530 | handling event EVENT_RETRANSMIT for parent state #658 | start processing: state #658 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #658 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-162" #658 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-162" #658 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.232414; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.984081 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c00d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #658 | libevent_malloc: new ptr-libevent@0x7fb36401f4e0 size 128 "road-eastnet-nonat-162" #658: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.162:500 to 192.1.2.23:500 (using #658) | 18 43 30 64 c9 a9 96 ac 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 8f 2e 30 90 e3 1d b1 3d b8 ff e9 fa 6f c4 d2 | 4d cb 05 e4 a2 10 ef 4b 88 26 20 b8 91 62 33 4c | d2 2d 7a 12 9c 93 d1 33 4a b1 d4 b6 b7 87 51 88 | f1 8b ca 98 0d 93 ed 84 f4 9c 46 f9 61 c4 4d d5 | fe 8d 16 c5 0c 88 ef 95 5d eb 19 30 d3 94 29 4a | 79 59 d9 d9 11 a3 76 95 63 e1 a4 9a 1e 1c 14 d5 | 3c bd 7d c0 47 b6 0d 87 c9 56 be 9c 11 14 ee 07 | 7d b5 67 34 d6 13 e8 98 79 52 f2 29 ea 87 a9 a7 | 37 70 16 dc 00 c9 cf 42 41 7d 6a af e8 16 61 11 | 8c cd 5e 52 bd e4 ca 59 92 fe cb ac d6 88 27 08 | e2 59 c0 46 be 04 20 28 16 af 0d 9a e2 2b 53 20 | 73 8a 54 b3 af e0 6e 17 fa 1f 2c 68 a0 ba 92 60 | 80 f9 61 ae 5c 11 fa e6 67 c8 30 5c f1 ed 8c cf | f0 8c f7 ae b7 44 b9 62 19 13 7e 6c 7e 19 e7 af | 31 44 0e de dd b1 f8 11 4a 1a 39 5c a5 d6 c9 e9 | ca 2b 46 08 aa 6f 5d 69 a8 0c 53 f7 bc ac ed a8 | 29 00 00 24 65 98 11 46 f7 ab 17 c4 6b 7d 49 5b | a3 fc aa 94 dd e0 11 9b 8f 82 94 fd 52 c9 5f f9 | d2 67 63 6d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 85 9c d9 b9 94 09 f0 06 58 49 33 | bd 1c e4 a5 79 c0 7c 32 00 00 00 1c 00 00 40 05 | 33 c9 27 c8 b3 b4 b5 08 35 b6 cc fa 47 61 1b 02 | 31 02 bc 85 | libevent_free: release ptr-libevent@0x7fb36407a960 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36001a530 | #658 spent 0.0611 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #658 connection "road-eastnet-nonat-162" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c012bf0 | handling event EVENT_RETRANSMIT for parent state #732 | start processing: state #732 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #732 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-222" #732 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-222" #732 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.232483; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.017316 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36001a530 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #732 | libevent_malloc: new ptr-libevent@0x7fb36407a960 size 128 "road-eastnet-nonat-222" #732: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.222:500 to 192.1.2.23:500 (using #732) | d0 09 53 dc c6 ab 63 da 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 72 85 fc fd c0 3d 4e f2 6d 8c 5a 48 97 72 ba 8d | 76 a1 67 2b 3e f5 0f 59 6a 4a cf 1f 0f 1a 83 6b | 02 c4 e6 13 1a a7 be 58 09 e7 95 c5 d3 61 73 f0 | 93 30 b7 ea 83 2c 03 35 7b e7 a4 68 e9 c3 34 3d | 62 a3 61 5b 4e 45 93 53 18 92 ed db b3 57 ab ed | d3 53 e9 06 16 fc 7d fc c5 71 11 b8 0f 5b b1 19 | dd 64 cc 6c d3 60 ce 76 d1 ee 24 40 d0 a9 e8 ef | b0 05 68 55 4c bc 77 f7 43 d8 3a 34 82 db 7d 83 | 19 10 50 8c d2 65 d7 7b e4 c6 64 bb d8 6c a7 36 | 7d c4 11 fc dd 75 d9 7e 8a a8 c1 86 35 68 1d 19 | 3f e6 94 36 43 37 3c ce 07 24 1a e3 3a b2 b8 d0 | 31 23 82 03 07 23 34 27 ac 92 b7 75 a4 35 52 c2 | 62 ee a2 c7 e9 86 52 3d d2 a7 12 2a b4 93 13 55 | e8 52 4e 73 70 b2 d4 5f 3e 19 02 5a 63 54 72 36 | d5 50 42 05 5e b0 23 11 30 64 39 ea 9a e3 b8 0d | 4b 4e 16 cb 69 12 46 02 2b 04 d5 67 a1 73 e1 ac | 29 00 00 24 fc ee 14 ee 51 1c c8 cf 02 52 60 a5 | ed 61 3d 76 39 bb ee c9 50 2c 24 3c 5a ec a0 d1 | e5 8a bb 04 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a fa b6 a7 12 75 27 e9 bc d5 98 e9 | 7d b2 82 ba 84 f4 53 9f 00 00 00 1c 00 00 40 05 | 27 89 f2 84 3a 49 ac a7 94 1d 98 7e 0c c4 b6 09 | ba a0 ac ee | libevent_free: release ptr-libevent@0x7fb34c053e10 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c012bf0 | #732 spent 0.0631 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #732 connection "road-eastnet-nonat-222" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34000d120 | handling event EVENT_RETRANSMIT for parent state #637 | start processing: state #637 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #637 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-137" #637 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-137" #637 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.232552; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.96464 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c012bf0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #637 | libevent_malloc: new ptr-libevent@0x7fb34c053e10 size 128 "road-eastnet-nonat-137" #637: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.137:500 to 192.1.2.23:500 (using #637) | b6 9c 40 58 3d 0c 12 38 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 62 01 a3 0e 36 d8 5c 24 b9 7d 93 50 74 52 09 | bf 73 ee 31 ce 48 4d c3 8c 6c 36 26 89 6d a2 98 | f6 a5 6f 3e af a0 f7 15 c5 cf 68 f4 0f 09 28 32 | 0f 5d 04 46 85 53 2e d9 db 2b a2 c2 d9 bf e4 c3 | 50 e3 bc 2c 35 2c e0 d8 71 5e ca 0f 65 92 6f 5f | d6 4c 31 d5 82 00 7d 21 65 65 2e f9 16 0f 60 4a | 66 fa 76 ba 56 18 68 1b b7 8d e5 ca ec fc bd ec | 0a e5 6a b2 41 42 5c a8 2b 3f 1c 15 fb b5 ec c8 | f5 63 de 1c 0d a4 25 56 3a 26 7c fa 02 42 4d b8 | 43 57 db 48 7f 12 2c 70 ca ba 72 7c fe 19 b1 54 | 6b 79 43 ef 00 c1 62 d3 5e ab b6 22 36 80 35 4b | e7 1d 17 2b 6d 8a de bd 50 b8 31 a5 18 f8 e0 24 | 82 85 b3 30 83 33 ec 95 4e ee a1 d7 bf ce 99 9b | c1 6d 33 8b 97 b6 2c 02 a3 d9 39 e4 c5 54 2f 6f | 47 4b a7 bf 34 12 36 ee 4b b2 e8 c4 39 ce c1 32 | 67 23 86 ac 3a c8 0f 88 60 19 2a 2c 68 03 df 9c | 29 00 00 24 37 6b dd e4 0f e2 02 60 45 48 4f 1a | ac d9 95 dc 00 d0 72 b3 54 00 91 51 8b 27 ba 45 | 47 72 d2 f1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 15 cf fd fc b2 a7 19 97 63 6c a1 8c | 7a b3 9e 5b 69 33 a4 bb 00 00 00 1c 00 00 40 05 | f0 08 d3 f7 e9 21 31 a2 9d a6 8a 6a ad 66 64 4b | fa 92 42 76 | libevent_free: release ptr-libevent@0x7fb34c069bf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34000d120 | #637 spent 0.063 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #637 connection "road-eastnet-nonat-137" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c01fda0 | handling event EVENT_RETRANSMIT for parent state #586 | start processing: state #586 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #586 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-2" #586 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-2" #586 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.232623; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.940834 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34000d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #586 | libevent_malloc: new ptr-libevent@0x7fb34c069bf0 size 128 "road-eastnet-nonat-2" #586: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.2:500 to 192.1.2.23:500 (using #586) | 9a 3d 1d 73 e3 e0 91 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 31 56 d8 cc 60 f7 06 cc 59 a5 66 b8 41 54 bb 3e | fb c8 6c 81 84 53 c6 13 31 8d 8e 62 d7 09 63 52 | 53 8c bb 8d d7 5b e6 4c 25 af 80 11 96 28 b9 4c | 79 b0 e7 e5 ff 99 62 bc 0e c5 91 68 49 55 47 3c | b1 82 16 08 70 32 cf 34 71 08 a2 e4 fa 17 46 eb | c6 40 a2 fa ed 5d 93 66 3c 04 eb 85 7b a4 b8 ca | 3b e8 d5 02 43 56 8f ae bb 2c 5c 40 78 bc 5f 3c | 52 09 33 a3 7b de 07 81 a6 e1 d6 fc 15 c9 f3 d7 | 80 69 07 14 f2 fc 95 be ee 94 aa 9e 80 73 7e 72 | 64 ba 5c 65 91 2e 13 ae 0a 47 61 89 10 86 9c 47 | d1 e2 cb 92 ce 45 0b 0e 0f d3 3d f2 1d 9f b0 3e | 82 b2 a9 6f 50 82 ad d6 b3 d9 b3 ea 4d c2 73 14 | 44 b9 ba 13 f3 1d 41 25 5f c2 36 55 c0 ee 19 61 | 63 cd 05 72 43 48 d0 6b e9 0e f6 84 a0 68 e3 e5 | 72 da 0d d0 be 28 62 56 c3 0f 94 93 0b c0 ef 8b | fb 62 f1 5b 0e 46 8d a6 d6 94 eb 9f 3d 88 d0 f3 | 29 00 00 24 38 81 91 15 7b 18 f0 d0 cf fd 70 7f | dd 31 76 38 5b ce 20 2d 80 1f cb 93 2f 1b 36 54 | 69 55 f1 5b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 17 b2 6d a4 83 a8 67 51 74 0a 4d | bc b9 f3 7f 40 a8 af 25 00 00 00 1c 00 00 40 05 | a2 cc 78 53 7b 53 71 df 77 82 fc 3c 31 48 7e 51 | f3 07 f9 73 | libevent_free: release ptr-libevent@0x7fb38400f680 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c01fda0 | #586 spent 0.0615 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #586 connection "road-eastnet-nonat-2" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35400cc10 | handling event EVENT_RETRANSMIT for parent state #520 | start processing: state #520 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #520 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-132" #520 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-132" #520 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.232693; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.018578 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c01fda0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #520 | libevent_malloc: new ptr-libevent@0x7fb38400f680 size 128 "road-eastnet-nonat-132" #520: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.132:500 to 192.1.2.23:500 (using #520) | ce 20 34 a6 bb f7 7e 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f6 93 1d d8 d2 b1 be 53 4e eb ed b5 53 68 b9 68 | 3b 90 1c 10 61 78 23 f6 10 87 d8 bd e4 f5 d6 23 | 53 c0 54 e9 4d 15 49 54 f1 a0 df a0 bd 97 7f 49 | f3 26 38 fe d6 f7 64 49 d3 1d 69 61 fb 72 b3 74 | 62 c9 08 94 a1 27 ba fe 91 a4 0d b0 be 34 09 2c | ae 06 17 ab b3 b7 51 c6 26 a5 e8 3e e5 24 f9 a1 | f7 68 74 98 63 fd a8 7c d3 13 6d 90 1f 14 c6 a6 | 04 85 61 e0 a3 c8 02 54 74 60 3f 87 eb 06 83 74 | 5e 85 3d 22 87 46 88 9f d4 fd 35 c2 36 a3 83 41 | ab 57 49 d7 e0 f2 53 56 77 35 4b e3 66 a6 da 67 | 4f 7e dc 81 d0 4e 81 b5 d9 96 e6 10 f9 24 0e 5e | fb e3 82 13 23 20 a1 ed ab 8f 63 39 52 b2 83 84 | b9 61 cb cd 44 7f 65 2d cb 8a 27 c6 61 e2 d1 7f | 39 5c 98 77 3c 0d d7 d7 5b 79 74 66 3f 68 61 be | d1 5d 20 ef 6b 4e 03 30 9a 82 f2 ac 7c ef f0 7d | c4 47 c7 7c c8 eb 96 9e c1 9f ef 3d 93 05 11 e1 | 29 00 00 24 10 75 51 a8 ab dc ad 6d a2 4e 44 8c | c4 29 f6 ed 6d f9 db 56 a8 84 be 4b 75 f6 2d c8 | a0 76 de b6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2a a7 18 b8 de c7 a0 95 e6 f4 d9 c5 | 62 97 a0 57 23 f3 99 e4 00 00 00 1c 00 00 40 05 | 3d 7c d2 81 56 1c d6 fe cd 6a 43 28 2b 9f a2 6a | e6 22 f1 8c | libevent_free: release ptr-libevent@0x7fb36c088410 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35400cc10 | #520 spent 0.062 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #520 connection "road-eastnet-nonat-132" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370046090 | handling event EVENT_RETRANSMIT for parent state #542 | start processing: state #542 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #542 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-3" #542 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-3" #542 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.232762; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.932298 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35400cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #542 | libevent_malloc: new ptr-libevent@0x7fb36c088410 size 128 "road-eastnet-nonat-3" #542: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.3:500 to 192.1.2.23:500 (using #542) | 19 ef 59 5e 62 c0 95 6e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2c 79 27 54 07 c6 5d 65 e0 c6 e9 51 3c d2 f7 23 | 14 31 ac 33 ad e0 98 39 13 b2 d5 2e 21 16 ef fd | fb 26 fb b6 5b 85 f7 f1 d6 8c 2f ce 82 67 51 76 | fa d3 54 14 d5 1a 64 a6 27 51 68 bf da d2 0e 9f | ba 1d 58 01 63 c6 05 46 a8 1e 48 8c 0f 1a 50 9f | c7 02 55 57 2f b0 4c 8c ba 2a 6e 11 20 86 c9 eb | f4 2f ad d5 ad 8d b4 c6 8d 1b 09 90 d8 aa fd 33 | d8 fc 91 0e 8d 34 75 59 76 d8 c1 fb b1 99 78 79 | 99 6e 5c 3f d3 a2 5f 67 1a 09 7c 1f 03 50 f4 93 | c2 74 d9 b7 7a 58 a0 62 d2 8e 30 4b 2f b5 4e 54 | 8a 34 49 eb c4 db 10 33 ba 37 57 98 9c 56 d1 4f | 0c 29 1a f8 25 5e 60 5d 0b 14 86 5d 6d 65 3a dc | 8a 6b ce 2c 5e 34 47 64 fc b5 0d 07 ab 4d e8 74 | 6d 78 e0 82 76 08 57 ad 18 73 73 dc 20 30 66 40 | 79 b4 11 4a 81 e9 e7 f5 9a 6f b2 79 12 d0 43 c6 | 72 27 8c 54 92 d4 21 e5 0d 8d 14 e1 53 dd 12 10 | 29 00 00 24 e8 60 30 77 56 3c f1 25 c1 c6 6e 74 | 5c 37 ec e4 ad 07 3f bc d0 27 64 9c 2c 2f 3e f0 | a2 51 6d 21 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c8 21 f8 f2 aa c5 02 f5 b9 e8 1d 48 | 11 f3 ee 20 33 c4 de f9 00 00 00 1c 00 00 40 05 | 12 90 d2 d6 c0 e9 64 15 7c cf ef 34 31 76 64 b7 | 85 6e 21 7e | libevent_free: release ptr-libevent@0x7fb37c05eea0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370046090 | #542 spent 0.063 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #542 connection "road-eastnet-nonat-3" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a0a990 | handling event EVENT_RETRANSMIT for parent state #615 | start processing: state #615 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #615 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-25" #615 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-25" #615 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.232833; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.968515 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370046090 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #615 | libevent_malloc: new ptr-libevent@0x7fb37c05eea0 size 128 "road-eastnet-nonat-25" #615: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.25:500 to 192.1.2.23:500 (using #615) | 3d 12 6d 03 9d 3a 3f 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f f9 00 4e 05 17 74 a7 73 6c 7a 55 de e3 3f bc | b6 50 d8 da 7f 1d ba 94 53 90 d9 17 e3 56 27 62 | d4 43 27 60 0b a1 f0 f9 c0 27 e9 0b e3 82 e7 85 | 80 6a 81 03 53 c7 b9 23 a3 5a 6b a7 5d 76 6f ac | e9 13 02 5b 79 2d 66 7b ff 5c a6 74 d0 95 c7 c2 | 71 fc d6 11 6a 39 e5 64 21 9e b5 4d 11 be 89 8e | 5d 20 22 f2 57 1a ae e9 d9 48 ed e3 e5 74 a0 a2 | cc fd e4 70 7c a3 dc a0 27 e6 f1 f2 c5 fb f1 1f | 79 67 f9 17 79 f4 c5 25 d5 53 79 6f 85 2b eb a0 | 27 7d 23 ed 74 15 b9 2a 82 05 20 2b bb 1e 36 fe | 50 40 25 d6 98 23 b1 bd c4 a8 9d 60 26 d6 0b 43 | 16 dd 68 58 c3 dd 64 ba de 9f 7e 50 5f 81 e9 94 | aa 7d 9b 9b 86 a9 b2 65 a2 14 57 a5 2e a6 24 6f | 4f 4e 8d fb e6 1b e7 3b 6c 59 92 d8 48 02 79 8d | 9b 5b 3b 8c ae fc 09 50 ce 87 b0 23 2c d7 e5 44 | 3c 8a 3a 64 cd a6 2c 8d 5b ba 46 2d 2c b5 ed 4c | 29 00 00 24 7e 29 69 54 1c 75 9f 10 bb 76 c9 d5 | f4 45 3d a6 cd bc 36 61 89 98 84 20 31 27 44 33 | 6a 69 46 38 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 49 5e 77 cc 13 4a a8 38 41 6c 23 4b | 5b 37 4e ff 01 d4 b9 94 00 00 00 1c 00 00 40 05 | 52 22 03 e7 9f c3 e4 87 eb 62 51 6b 10 18 8d 12 | 1a 37 2c 77 | libevent_free: release ptr-libevent@0x7fb38007a830 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a0a990 | #615 spent 0.0711 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #615 connection "road-eastnet-nonat-25" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35800cc10 | handling event EVENT_RETRANSMIT for parent state #613 | start processing: state #613 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #613 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-31" #613 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-31" #613 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.232912; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.944657 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a0a990 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #613 | libevent_malloc: new ptr-libevent@0x7fb38007a830 size 128 "road-eastnet-nonat-31" #613: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.31:500 to 192.1.2.23:500 (using #613) | 79 93 08 03 2c b4 dd 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9a e1 6a 82 db ed db 74 ee b6 15 12 39 71 33 bf | 8a 46 d7 c6 c5 8a 1b 3d a2 de 2e f1 c1 94 33 c0 | 34 aa cd 57 d3 68 0a 98 44 dd 52 e4 12 32 bd 16 | 0c e2 b3 0c 1d f7 54 42 90 09 2f 70 da 3e dc 46 | 26 73 29 3f 4d 95 44 51 c4 ee d0 51 62 f5 23 73 | b1 79 05 13 44 f0 8d 5a 13 9f d6 c9 04 56 fa e7 | a2 43 d1 96 b2 b6 52 69 ea dc 64 81 12 bc 22 c2 | c4 ee a3 e1 69 5f f8 37 1b e7 00 a6 82 ff ee 85 | 5b 12 1c 2b ba ff 36 aa 33 29 61 20 53 f5 26 6e | e7 36 fb 9e 58 96 08 1a f4 41 81 4b 11 d3 c0 cd | 3e d4 7f 23 fd 79 62 dc 64 4c e9 e5 d0 f2 db a5 | 1b cd 14 72 42 56 15 bb 0e b4 bb d4 e6 c8 7c c1 | 88 7c 43 0b f3 ed 50 68 99 2f e0 93 89 bc b2 e4 | 01 54 87 c5 c5 6f e4 ac 60 cf 42 a6 f1 da 67 fd | 37 ef 53 de 9e 68 36 8d 63 23 d3 89 29 6d 55 6a | db 4d b6 90 4e 9f 31 7b 83 b2 4e 39 37 2c 7c 49 | 29 00 00 24 38 88 3a 8e 21 d0 99 01 66 b4 5d 84 | 38 93 2d 4f e7 27 09 2a 71 43 d3 fd 55 4d 04 8f | a5 6a 55 8d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 28 b5 7c 10 1e 73 0b 8e c4 8c 67 0d | 37 a9 91 c5 05 2c 6c b2 00 00 00 1c 00 00 40 05 | 8a 81 ac a2 d8 3f 44 cf aa 4d f4 06 c5 76 63 33 | 40 a4 d1 4c | libevent_free: release ptr-libevent@0x7fb33801d920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800cc10 | #613 spent 0.0691 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #613 connection "road-eastnet-nonat-31" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aa1f00 | handling event EVENT_RETRANSMIT for parent state #730 | start processing: state #730 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #730 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-234" #730 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-234" #730 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.232991; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003854 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #730 | libevent_malloc: new ptr-libevent@0x7fb33801d920 size 128 "road-eastnet-nonat-234" #730: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.234:500 to 192.1.2.23:500 (using #730) | c1 b9 1a 2f a2 98 4a 10 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 52 90 42 68 2d aa ea 2e 10 58 50 76 72 99 aa 32 | eb bb 32 a1 c5 3b 39 b6 da 46 5c be 25 37 be ed | ef 19 db bb 09 e7 d6 5a e9 9a f4 55 2b 2e a7 bb | 7d 7e ab 94 f5 2d 7f 2f 19 2d 9d be 3b 1e 1f bc | 50 99 e9 b4 9a 91 0e c6 06 9d 5d 9a ba af 5a 8e | 69 1a 0a b7 44 11 98 29 1c 1a dc d0 d0 5d fa 86 | 8a 1a e8 5e 7f fc 9d 17 de 62 df a0 79 b7 62 86 | 03 fc dc 45 27 d9 98 5e 7e c1 5d 73 17 7b d2 39 | a9 02 e8 b3 fe 5b 39 41 98 ea d2 07 3a ff 02 e9 | 9c b2 8a 30 03 fa 2c fb df 3c f4 0d 12 f0 fb b7 | 2d e5 f6 c1 41 31 4c a6 2b 97 92 32 b8 ab ea d4 | 0c b2 3f eb 53 93 29 c9 b9 5f b1 d5 21 34 f2 4d | fc e4 2a 50 24 06 56 bc c7 41 5b 59 70 69 cf 96 | 1c 5a 5f 05 3e a5 0f f1 a8 c5 92 7e bd 2b fd 46 | f0 21 0d 82 1e f5 38 85 81 4e 66 9c 19 55 16 0e | 44 6b 58 99 91 1b 47 47 7a f8 3e 28 3f a5 78 ea | 29 00 00 24 55 e3 90 65 fa b6 41 c6 1d 4f a6 98 | ca 46 e7 a1 7a 87 94 e6 4e 60 4a 2e 32 84 98 8c | 92 ba 64 89 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d0 cb 8c 60 04 f9 7c 78 24 b5 81 07 | 7f 5b 58 33 fe 16 dc a2 00 00 00 1c 00 00 40 05 | 6f f5 31 fa 7e c6 ed 0e 01 8d 80 c5 e9 40 f1 ef | d7 29 12 3d | libevent_free: release ptr-libevent@0x7fb364080140 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa1f00 | #730 spent 0.0639 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #730 connection "road-eastnet-nonat-234" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a3fc10 | handling event EVENT_RETRANSMIT for parent state #632 | start processing: state #632 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #632 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-188" #632 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-188" #632 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.233082; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.962362 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa1f00 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #632 | libevent_malloc: new ptr-libevent@0x7fb364080140 size 128 "road-eastnet-nonat-188" #632: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.188:500 to 192.1.2.23:500 (using #632) | 4f 74 43 70 ed 5f 2e 8c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 00 b8 55 d7 88 c2 72 f0 05 df 85 ec 3a f6 75 | c1 ef 75 7f ad 60 cc e9 f1 77 a3 7c d9 0b 5e d5 | 5d c2 1a 6e 0a 46 25 ac 06 20 d7 68 9d d2 6e 25 | ff 6b 15 79 a6 94 b8 c3 d0 6e 41 bb 8d ed e7 21 | 63 3d 1a 26 b0 0a 45 94 1e de 46 6a 6a b6 4f b5 | d1 7f 40 6b 2f 4a eb 4d d8 86 e2 e5 25 78 85 80 | 6e 6e 80 63 f5 0c 4b a8 f2 cd 0b 82 23 03 99 14 | 83 47 9a 20 36 c0 ef de 6d 79 4d 5f 95 db 5d 28 | 9f 23 ff a4 10 07 57 b0 78 ff 65 d6 2e 5b 99 08 | 70 cf d4 59 3d 0b 5e fb 55 e9 4e f3 7f d6 14 5d | 1b 27 9a 34 94 bb 77 54 18 eb 5d 4f b4 d5 7f a1 | 84 3d 42 6a c2 f0 c5 b1 ce 30 19 3e 4b 4e a9 58 | 62 a0 4c fb aa 00 f1 a2 66 c0 f9 94 d1 cc 56 3e | 8f 68 09 9e 6a 9e 42 7d 62 7d f6 ec 9f 62 81 40 | 6f 50 24 39 28 5b 86 fd b5 92 57 3f 4d 8a 71 00 | f5 59 1b 4f 8b 96 06 35 4a d8 d6 af 37 4a c9 2a | 29 00 00 24 a3 75 cf 0b e7 29 9a ce c3 82 42 b5 | ee 71 0d 4b 51 1b b0 f6 01 1d 7a 9c f9 27 59 b6 | ed 31 8f 92 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 12 4f f5 3c 8b 41 44 6c 4b b5 e9 45 | 24 d2 05 c0 c4 f0 a0 78 00 00 00 1c 00 00 40 05 | 4e 5a fa ec b2 4d 50 c5 f3 4f a7 18 04 21 31 68 | 73 18 f4 1b | libevent_free: release ptr-libevent@0x7fb37c064680 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3fc10 | #632 spent 0.0975 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #632 connection "road-eastnet-nonat-188" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b24680 | handling event EVENT_RETRANSMIT for parent state #716 | start processing: state #716 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #716 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-205" #716 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-205" #716 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.233171; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.009982 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3fc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #716 | libevent_malloc: new ptr-libevent@0x7fb37c064680 size 128 "road-eastnet-nonat-205" #716: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.205:500 to 192.1.2.23:500 (using #716) | 15 cc 63 e1 75 96 2f 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 36 dc 43 34 c1 27 75 84 11 ed 21 f4 e0 64 42 f7 | c1 3e 43 b3 2e 58 fc be 1b bc 53 63 f4 17 1c 6e | 5a 45 c6 f0 ee d5 d4 c6 e3 d7 81 ef f2 fc 94 66 | 39 e4 1e d2 9b 3e c7 28 c2 8b bd 93 f2 64 11 f3 | 6d 23 8a cd c0 e1 82 ee 9f 75 ce e2 44 b6 22 97 | b0 c8 8e 1c c2 54 f6 e5 b0 5a 7c be f1 58 3b af | 05 be 31 c0 84 4a ea f9 f1 d6 8f c9 37 52 41 dc | 85 26 42 e2 6b 91 5c 08 46 f5 3a 3f 3e 0c a3 55 | 9a 1f 55 f0 63 1e 9b 9f b7 db 3f a7 92 12 e2 1c | 71 2e e6 9d 0c 47 67 7e f1 af bc 6a f8 c7 1a de | 1b cb c2 40 86 c2 28 a1 ad 88 3e 5e b7 2c dd 98 | a7 93 94 47 b6 7a 9a 3f be ca 7f 22 14 8e 7e 92 | 47 e5 43 10 40 3b 02 34 62 d6 f9 32 a9 14 c7 88 | a6 fc a7 e6 13 8f 48 a9 3c 09 bc 34 a6 f2 66 32 | 93 05 6b 00 f2 c3 6e 0d b4 b4 e6 20 5c 15 86 46 | ac a1 7d 60 75 3b b9 68 18 8d c8 ea 5e c4 4c 21 | 29 00 00 24 50 21 0d 31 fe d3 b4 a7 ac 53 44 3d | ea f7 97 43 73 d7 d9 9e ec bb 48 86 85 79 7b 5b | 1e 65 bb 90 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 9d 08 f6 6e 7f ce e0 5c 6f 3f b3 | 3b aa bc 8d 53 41 77 8e 00 00 00 1c 00 00 40 05 | 6d 9d 29 89 37 a0 02 51 09 39 ed 22 b1 d6 21 cb | f4 e3 b2 ae | libevent_free: release ptr-libevent@0x7fb354074f60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b24680 | #716 spent 0.0667 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #716 connection "road-eastnet-nonat-205" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c017ea0 | handling event EVENT_RETRANSMIT for parent state #677 | start processing: state #677 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #677 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-103" #677 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-103" #677 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.233246; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.98399 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b24680 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #677 | libevent_malloc: new ptr-libevent@0x7fb354074f60 size 128 "road-eastnet-nonat-103" #677: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.103:500 to 192.1.2.23:500 (using #677) | 50 8d 95 68 b5 8b 23 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 83 aa a4 8f c6 30 45 92 c5 cf a6 91 01 0a a1 43 | f1 38 e4 4c f2 1e 8b fa c7 cd 9a 24 20 65 ff bf | b9 f0 d7 e8 39 54 34 3b 5f 78 23 e6 41 b2 72 62 | 83 82 8d 5b 8e 9b 83 e0 88 f3 03 08 95 12 34 d3 | 98 d1 ba 80 21 88 79 5e ed 78 64 b4 3e 07 35 23 | 3f b8 8f 43 78 b2 9f 35 5d ad 57 da 20 57 19 f4 | dd 11 96 05 07 92 4e 19 0b bc 45 fd 48 2f 7a 41 | ab d6 c2 78 83 b9 51 5f c2 9d bc 1f 01 00 01 1c | 96 6e 62 37 71 03 98 70 25 42 9f e1 05 cf 75 d2 | 67 9b 63 9b 3f b6 19 96 2f ca 41 d1 e1 b6 6d 22 | 8c cb fe d6 b4 86 8e e1 27 c0 a0 24 76 f2 01 5a | 83 a9 0f 76 b1 07 35 33 4e 3e e0 dc 79 5e ed 29 | 09 64 22 34 77 8d 1f f2 ad 05 7e 1b e5 4c 10 9e | 58 06 f7 85 f5 dd f1 d9 0c cc f6 9f 69 01 27 29 | 70 68 3f aa 7e a2 7d 6e d3 92 55 84 0e e6 71 17 | 1e 78 67 9e 87 bb e2 70 02 96 cb 0b b6 30 ee b4 | 29 00 00 24 00 70 fb 22 7d 0c 48 97 e3 e3 bb dd | b2 69 b0 26 7d 9b cc 69 6d 71 bf ad 98 91 5c 5d | 16 09 bb c0 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 09 db ab 8b 76 c6 3a 27 c8 6b 4c e4 | 2b b7 a4 43 65 c8 3b e1 00 00 00 1c 00 00 40 05 | a7 c6 26 92 93 c8 84 fd 1e 45 e2 6d 6b 62 ad e1 | b6 74 b5 46 | libevent_free: release ptr-libevent@0x7fb3700647d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | #677 spent 0.0764 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #677 connection "road-eastnet-nonat-103" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b07dc0 | handling event EVENT_RETRANSMIT for parent state #713 | start processing: state #713 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #713 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-207" #713 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-207" #713 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.233331; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.002677 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c017ea0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #713 | libevent_malloc: new ptr-libevent@0x7fb3700647d0 size 128 "road-eastnet-nonat-207" #713: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.207:500 to 192.1.2.23:500 (using #713) | 20 dc 25 60 99 b6 74 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 1a 96 8e da d9 76 91 00 af bb 9d 79 5c a7 f9 | 26 9d cd 16 f2 cf f0 0f dd 87 89 cd 98 91 eb 12 | f7 47 01 49 c9 0c ea 1d 57 4d 8d 91 7e f9 5c 7d | 62 0f af 55 c6 bc 19 04 21 c1 da f5 0d b7 e3 c7 | 41 ab 99 a5 b4 0f 24 bf bd 73 7a 98 7e f2 66 cc | 39 17 ee 34 24 36 ea 24 e3 a8 cd 1c e6 e8 5a 7f | 02 cb 52 c1 dd 90 79 6c 09 65 91 9c 65 f3 ff 96 | 37 cb cc 02 51 48 e0 ea 49 21 16 ff ee ee 96 24 | 7e bc 47 96 21 d4 d4 e3 da f1 b1 67 58 e0 84 dd | cd 55 51 7a 46 9a 9d 6d 24 17 4a d7 b1 02 0a 7c | 2b 10 29 49 15 25 a5 35 a0 5f db 1c 3f d4 d5 d1 | ba 0c e0 43 cb 60 ff 0f 6f 32 b4 f2 ed 61 11 ce | ac 22 75 61 4c 15 28 19 61 92 f0 56 38 fd 6f 8d | 1e 94 22 c4 ed 8e 7c e6 0e 10 58 4f 8b 71 f0 63 | d0 57 19 ab 38 9b 18 02 96 06 c0 6a c4 51 d7 5c | d1 98 c8 9d dc 57 3d 80 8d bf 2e ee 62 b7 a7 01 | 29 00 00 24 44 80 b4 97 28 30 0f ac 4f 85 8e 79 | 66 f6 8c 9d 57 3e 45 8b 53 c5 51 08 e9 85 21 22 | 22 bd a5 bf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 35 16 73 ae ce da d8 0d 5b 76 05 8d | 10 2c 6d 16 83 97 d4 49 00 00 00 1c 00 00 40 05 | 1b 17 49 13 60 8d 27 d3 b4 e3 12 fd 7c ef 9d 70 | 2a 84 34 8f | libevent_free: release ptr-libevent@0x7fb3380856d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b07dc0 | #713 spent 0.0644 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #713 connection "road-eastnet-nonat-207" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35800d120 | handling event EVENT_RETRANSMIT for parent state #541 | start processing: state #541 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #541 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-24" #541 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-24" #541 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.233403; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.929547 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b07dc0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #541 | libevent_malloc: new ptr-libevent@0x7fb3380856d0 size 128 "road-eastnet-nonat-24" #541: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.24:500 to 192.1.2.23:500 (using #541) | e5 6d dc 54 e8 13 c6 f4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 70 ec f4 97 99 d8 72 ce 1b fb 62 b7 ff 70 b1 | d0 af d0 71 cf c9 19 5a 4b 54 67 9f d9 76 16 c5 | c2 a4 79 9e 63 b4 60 27 34 54 51 7c ce 20 f6 c6 | 4c 4b 74 1f 25 17 6c 4a e1 d4 14 08 5a 16 b4 9b | 82 8a 4f 61 af 32 25 98 4f 8b b6 f5 b4 de 0c b8 | 8f 1e 39 50 5f 6a 1f e4 ec dd 6a 69 e6 1c 77 5b | 51 25 d2 75 cb cb 97 24 6c 0c 79 b7 db 85 62 10 | 6e af 06 f5 31 7b 0b d7 96 08 f6 7f 02 1c 78 21 | 18 19 57 15 cc 45 e4 91 68 10 8d c0 f5 dd c3 33 | 9f d1 8c 61 12 47 98 e4 4a b7 b5 c3 22 ac 54 c9 | a2 b0 69 33 63 5c 14 fd d2 8f 89 5d d6 7f 3d 6d | f8 ab aa bd b8 f0 3f 92 e9 56 8b 5a 9e 4a 02 6e | a1 8e c1 f3 24 ab ef 20 e4 c9 e2 98 e4 c4 c3 92 | 49 b8 7b 9b eb b0 61 e1 ff c9 4b 16 04 d8 8e 9c | 7e c1 26 a0 a7 e2 6e 1c 6f b6 6c b8 06 b6 36 e1 | df 58 24 88 c2 60 0d 9a 51 05 8e 85 c2 9e 66 5b | 29 00 00 24 e7 35 32 98 af d0 40 10 f4 80 06 7c | f0 2f 64 a5 58 9a 04 65 fd dd 75 64 b2 5d 38 dd | a9 29 2e d3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 7c fc 09 1a 79 2c 04 02 74 c5 f8 | 3a d6 61 08 3f 8f 87 41 00 00 00 1c 00 00 40 05 | 30 97 d6 ac 90 33 4d 32 1c 73 f2 d2 db 60 9a 7c | 6e 76 e0 11 | libevent_free: release ptr-libevent@0x7fb37c0813f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35800d120 | #541 spent 0.0668 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #541 connection "road-eastnet-nonat-24" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c005860 | handling event EVENT_RETRANSMIT for parent state #693 | start processing: state #693 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #693 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-156" #693 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-156" #693 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.233478; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.991791 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35800d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #693 | libevent_malloc: new ptr-libevent@0x7fb37c0813f0 size 128 "road-eastnet-nonat-156" #693: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.156:500 to 192.1.2.23:500 (using #693) | 8c cd 5b 89 3d b1 c0 87 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 82 e2 11 fa f7 47 b1 84 25 8d b1 b9 cc 61 7a d1 | 10 c4 99 41 8a c2 39 41 fa f2 fd fe 2d 88 77 1c | 45 28 1f 19 11 cd 86 3b 21 90 05 0a 95 68 f9 b5 | 66 47 f0 fd f6 ed 91 51 a1 90 e5 3a 68 7d 44 49 | 52 7e 11 24 5b 36 2d 9e 45 cf d7 e0 d6 57 a2 7e | bf a1 9d 8b 04 a2 cc 30 fe 6f 9d 2d 07 7c c6 a9 | ac ec ed 97 f5 f4 d7 97 49 b2 0d 08 4f 28 26 b4 | af 6a 98 d7 60 90 49 c5 06 ed 93 e3 18 24 17 de | 76 59 7c 05 cb a5 83 81 c6 45 a9 36 d4 c9 e5 a7 | d0 88 64 07 2a 87 01 7c 25 df 11 ab 75 b4 6c 03 | 37 fb 6f 75 2d f8 ea 20 73 cf 0c cd ba 90 c2 2c | 01 10 39 d8 3c b3 37 5e 08 f0 10 c6 bd a5 ce c8 | 64 ae 6d 05 92 4e 98 ee d6 94 4c a1 e4 7c b1 13 | 3e 00 d0 8a 16 57 67 90 44 2b 00 cd 9b 43 89 4a | bd d3 f2 0a 53 1d d1 36 e1 24 9c 6e 9e aa 0f 7b | 30 f6 e4 b8 a4 c5 92 c8 e5 b2 55 72 6c 6f d9 28 | 29 00 00 24 14 85 11 ba f9 3b 72 6e cf bb f5 0a | de 80 83 65 33 0c 22 f8 ea ad 98 f3 8e 26 41 40 | d7 cb 01 41 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1e f4 9d 3b cc 7d 09 25 54 61 34 fd | ae 72 6d c2 c2 0a 3b 62 00 00 00 1c 00 00 40 05 | e8 a1 80 e7 3a b7 e7 08 64 9f b4 0b f3 c9 d4 c2 | cb 3c 43 63 | libevent_free: release ptr-libevent@0x7fb36c059a40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c005860 | #693 spent 0.0633 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #693 connection "road-eastnet-nonat-156" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb344017ea0 | handling event EVENT_RETRANSMIT for parent state #635 | start processing: state #635 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #635 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-245" #635 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-245" #635 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.23355; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.970922 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #635 | libevent_malloc: new ptr-libevent@0x7fb36c059a40 size 128 "road-eastnet-nonat-245" #635: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.245:500 to 192.1.2.23:500 (using #635) | 7e 0d 8c df c3 48 2b 68 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d4 a1 90 94 fd 2b 95 44 1e 0a 6b 25 9f 00 c6 33 | 1e ef f6 4c b7 2f c3 a0 8a 85 0f b9 65 4e fd c3 | 6f 15 46 90 ab 4b 13 e7 e6 d2 34 d9 3f 71 a3 f3 | cd 4c de d4 e9 48 5f 32 4d 9a 30 7d 41 3c f4 79 | 2b e5 fb f0 14 ee 8a ae 09 42 b4 cd 39 a0 45 79 | 5d 03 2c a2 e5 66 e1 29 75 bf 9b 52 cf 30 44 50 | e4 1e ec 62 13 8a 29 5c 79 38 61 1b 99 bb f5 ca | ba a8 ac e5 19 04 33 7f 0c ca 09 aa 4c 3f 3e 06 | 33 f5 34 0d 4c 70 6b 06 18 e0 d0 1f a4 5f d7 bb | 48 ac 37 e5 66 fc 98 e8 57 0b a6 aa d5 88 82 ce | a0 e0 65 8b 7b a6 21 bb 33 66 9d 59 e2 1a 7d a1 | 33 19 a0 59 78 92 a2 99 a5 c2 35 39 ef e5 ee ff | 5f 64 b6 1d 72 92 df 75 1d 12 54 49 29 61 d0 c5 | df da b5 fe 52 67 91 82 3e 1f de bc 3d ae 33 1b | ad 82 07 a5 31 1d 91 23 7e 3c 96 a7 fb 7c 82 d7 | 17 7f 18 90 98 0c 8a 7d 26 5d f5 1b b6 e0 92 52 | 29 00 00 24 e3 02 e0 90 9a bb 82 bf e8 0d 7e 04 | 6c c4 fd f8 c9 9f eb 32 5f c2 f7 1b 33 85 e7 b3 | 07 22 69 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 9c 4d b9 97 4f cd 1b fe 43 15 63 | 13 30 6d 7b 9c bb 08 d9 00 00 00 1c 00 00 40 05 | 77 b2 bc 43 f1 e9 b3 25 e4 85 b2 70 d6 0a 47 cd | b1 cb 75 30 | libevent_free: release ptr-libevent@0x7fb33807a710 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb344017ea0 | #635 spent 0.0753 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #635 connection "road-eastnet-nonat-245" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388009ed0 | handling event EVENT_RETRANSMIT for parent state #523 | start processing: state #523 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #523 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-49" #523 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-49" #523 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.233632; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.926486 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb344017ea0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #523 | libevent_malloc: new ptr-libevent@0x7fb33807a710 size 128 "road-eastnet-nonat-49" #523: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.49:500 to 192.1.2.23:500 (using #523) | 07 bb ac 77 0a 7b 9b 5e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 22 32 2d 24 90 2e 75 6c 89 41 22 7c 04 93 61 b1 | 39 9b 32 4d 26 76 8c 24 bc 2d ac ee b2 3a 1d 13 | 80 14 c2 ce e8 90 ed e7 ec 82 33 fc cf 75 5a 59 | 9b c2 1e 9a ce 67 9e d0 32 1d df 06 30 99 8f 42 | e3 86 8d f2 a6 5e 6c 60 43 e3 54 7f 8e 10 64 f2 | 09 cd aa b7 1e 85 a0 06 7d 3a ff 7a a3 a4 14 fb | ff e9 1f 06 7e ad ad 41 ac 22 2e 81 48 aa 18 5d | 46 d1 2e ee d8 cb c5 80 a9 94 af ab 7d 0a 94 dd | 5d d1 aa 92 aa ee bb 06 90 ba f8 2f 6b 05 81 8b | c1 e1 46 3c 9a 94 f0 1c d0 2e 48 d8 93 0d 01 e6 | 42 b1 eb d7 08 a6 f8 5f 35 b3 a8 51 ff 1a 28 27 | a9 2e 3b 94 f9 50 49 28 9e 67 8b 4b 2e 25 e2 75 | a6 af 7a bc 8e e8 70 b4 b8 23 7e 7a 37 d6 c9 3a | e0 69 41 d0 87 31 ed a3 a3 e6 b4 1c 66 5c da e4 | 72 e0 33 43 7a 69 31 25 86 69 bf c1 c5 6f bd 27 | b9 80 4c 20 7c 9b 47 3c 48 70 66 96 58 bd 89 9f | 29 00 00 24 65 25 bd 90 0a 47 32 65 7b ff a5 6e | a2 70 3c 06 64 54 94 9b 0c 9e 4e c1 38 45 e7 b8 | 1b aa f1 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 06 c1 b5 e9 b8 b6 f1 9f 93 d5 2c a0 | 2c fe 30 59 be 37 e1 f4 00 00 00 1c 00 00 40 05 | a9 4a 22 b0 e8 8c 8d 17 4d 42 81 df a3 74 1f 8f | e6 9c ea 37 | libevent_free: release ptr-libevent@0x7fb338064790 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388009ed0 | #523 spent 0.0627 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #523 connection "road-eastnet-nonat-49" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb384038200 | handling event EVENT_RETRANSMIT for parent state #627 | start processing: state #627 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #627 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-161" #627 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-161" #627 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.233703; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.981197 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388009ed0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #627 | libevent_malloc: new ptr-libevent@0x7fb338064790 size 128 "road-eastnet-nonat-161" #627: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.161:500 to 192.1.2.23:500 (using #627) | 85 ff 81 8d 39 ae d0 f7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f1 b9 1b a0 9a 2c 50 8e 02 95 9b 5f 3b 83 99 4e | 07 74 8d 16 ae 8c bf 98 d2 8b cb e9 a7 c0 0d 94 | 88 9d dd 9b 54 84 6a 7f 4a dc 84 92 79 46 91 fa | 6c 85 8d b3 55 b3 d1 e1 35 12 39 9d da 6c 29 94 | 61 2d cc 21 47 bc b2 6d 88 1a 4a 94 f3 43 7b d9 | 8f 20 77 79 db 4d 47 13 73 be 1f 12 57 25 9e da | cb ff 72 15 51 1f 53 22 a4 a5 4d 16 f4 f5 a8 77 | 72 b7 12 ba 58 1a 43 7f ce ef 32 64 0f 90 fb f0 | 98 cc 71 a3 6d f2 87 79 fa 29 62 da 22 a4 18 69 | 55 35 d1 f8 9d 44 18 aa bf 4b 02 e9 29 b8 5f bd | 16 17 ad f8 d3 f6 25 bb 24 f5 6e 8c 20 d9 44 9d | 67 1d 54 cc 02 45 19 dc 2a 2c 20 34 4f 14 45 ba | 5a 79 14 e1 00 9c 1f b6 a0 9b 07 d7 22 e1 98 15 | a7 b0 4f d0 ee 43 65 3a c3 b4 42 49 47 06 50 31 | c0 75 69 4b d6 fc bf 2f 2f 07 7d 00 fb 73 c9 83 | d0 e8 66 df af 0f bf 7d 27 62 7e bc 01 f7 d2 fa | 29 00 00 24 e2 15 33 1a 7b 95 48 00 21 d4 69 5b | 6e 98 84 ff 1a 3b 2c ef f5 83 72 31 b0 15 1c 81 | c6 0c 3d b8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 16 ee 1c 29 3c 33 ab 04 ff 5a 9a b8 | a2 4b f5 11 1c 8a 96 c4 00 00 00 1c 00 00 40 05 | c2 8c 6c e3 eb bc 71 3c c4 77 e2 2a 2f 10 8a 7a | 93 a1 3f 6b | libevent_free: release ptr-libevent@0x7fb384054040 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384038200 | #627 spent 0.0629 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #627 connection "road-eastnet-nonat-161" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c01d970 | handling event EVENT_RETRANSMIT for parent state #659 | start processing: state #659 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #659 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-148" #659 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-148" #659 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.233773; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.986369 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384038200 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #659 | libevent_malloc: new ptr-libevent@0x7fb384054040 size 128 "road-eastnet-nonat-148" #659: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.148:500 to 192.1.2.23:500 (using #659) | 77 e1 0b 63 56 ac c5 72 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c7 24 71 32 4c a4 b2 25 64 3e 33 ac e5 69 a3 59 | 28 37 d7 f5 67 fa 3c 10 89 2a be c8 bc b7 80 db | ae ec e3 e9 16 ca 51 c1 06 d1 7f 94 6f c4 fc bb | 73 c6 3b c8 e8 42 d0 17 d5 11 01 02 43 ce 2f 5e | 6b 05 fe bc 5e fe 6a b1 10 03 5d d6 b0 38 f7 55 | ac 53 8c cb fd 56 72 ab 02 ea 39 60 a4 1f 70 3a | 0f 44 00 88 6a 7e 20 c3 de 96 d0 8b cd ee 1a d1 | 97 7f c1 1c 23 b1 90 63 b7 e9 ab ce 37 30 6e f7 | e0 76 ab b8 cd cc 34 16 be e0 9f dc e1 2f 5c 73 | b7 57 ad 53 9d 9f 37 a8 12 a5 aa 69 7e bf 56 b7 | ef 32 86 fd d8 eb 0a 45 48 20 ef 05 c2 fd 7c 50 | 36 ee 5b de 12 13 35 96 43 92 0a 82 37 08 83 d8 | f1 44 bf d3 7f 0b c8 9f 06 3d 6f d2 e8 de f4 63 | 67 09 a1 ab 1e 3e 96 c6 bd 17 50 90 d2 68 7f b0 | 0e ba 2d 2d c6 cc f3 98 8f 85 a9 bf 83 cc 98 34 | a4 13 08 89 fb bd 67 8c b6 a0 6e e2 b4 b0 ff ea | 29 00 00 24 9b 38 e6 b0 44 13 de 09 b0 4f 0f d4 | 9c 32 85 69 0a a7 d3 e0 7e 31 28 18 de 52 8d 12 | f4 2d 68 ce 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 02 04 29 42 78 19 20 e6 c7 17 a6 a2 | 7a d7 24 ba d8 b1 f2 6e 00 00 00 1c 00 00 40 05 | 4d a2 f4 dc ca 8a e9 4b bc de 2e 89 0d ba cd c5 | 42 51 87 1c | libevent_free: release ptr-libevent@0x7fb35c0b1220 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c01d970 | #659 spent 0.0616 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #659 connection "road-eastnet-nonat-148" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b0a940 | handling event EVENT_RETRANSMIT for parent state #748 | start processing: state #748 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #748 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-213" #748 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-213" #748 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.23386; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.015111 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c01d970 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #748 | libevent_malloc: new ptr-libevent@0x7fb35c0b1220 size 128 "road-eastnet-nonat-213" #748: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.213:500 to 192.1.2.23:500 (using #748) | 55 e3 5f af 64 96 c1 8b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0d 49 74 0b 85 d8 7e 22 f4 24 c6 c4 1e 33 2b 72 | de 21 d5 d8 32 fa 23 15 bc cf cc 93 06 5f 8f 3d | 33 17 cb d5 a3 91 ea a4 08 ea 77 c4 ba 4f b2 c8 | 77 bd 77 0a 64 bf c5 2e 63 22 69 74 77 90 c3 c0 | 7a 1b e6 e3 83 ec f7 b8 33 a0 30 ad 02 6a 84 e6 | 8e 7d 03 00 5b 0a 7e 62 09 5c 74 87 75 30 51 f1 | 91 ec f5 7e 8c 61 42 33 40 a2 94 e7 01 8f e2 79 | 76 aa 01 17 97 36 fd 8f 9e ae fe 3a e2 ba f3 af | 94 c5 f1 a9 e6 63 f6 f6 a1 03 7a 65 00 af 54 11 | e5 00 90 3d 36 87 b9 d1 e9 b5 0a ae ab dc ad a9 | 87 ae db d2 e4 c6 98 b6 7b 34 1d a2 a1 16 a3 c1 | 3d 22 9f bf 31 7c 8e 58 98 5c 80 18 f1 bc 29 9b | ab 82 89 c0 f7 55 bb a7 65 83 55 92 1e 57 97 a9 | dd af 8b bb b0 b4 5a 7b 30 5e b0 29 47 2d 2b 9e | 77 6a 4a 54 93 5f 70 12 2d 60 4f 4a 49 09 0e 01 | 86 63 18 ee 62 60 24 64 c2 a1 ed 84 95 08 03 88 | 29 00 00 24 01 dc 8e e5 8a ed 55 ae fd 55 02 d3 | da e9 1f 52 6e 45 d8 c4 f0 34 cf 2c 20 9a e2 e3 | 81 59 db b2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 80 15 26 72 3e 77 b9 07 bc 5d 56 07 | da e3 bb 84 01 39 7d 04 00 00 00 1c 00 00 40 05 | ed b0 75 8e 7f b8 61 e6 fe 70 60 49 2f cb 06 74 | 34 38 55 35 | libevent_free: release ptr-libevent@0x7fb350098a50 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b0a940 | #748 spent 0.0809 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #748 connection "road-eastnet-nonat-213" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c014cc0 | handling event EVENT_RETRANSMIT for parent state #551 | start processing: state #551 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #551 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-54" #551 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-54" #551 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.233933; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.932473 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b0a940 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #551 | libevent_malloc: new ptr-libevent@0x7fb350098a50 size 128 "road-eastnet-nonat-54" #551: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.54:500 to 192.1.2.23:500 (using #551) | 6d 61 08 83 3f 41 28 36 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a1 10 09 30 29 21 c1 f4 7d 5c 69 d9 0d 1d e5 ea | 5f e5 a9 db 38 23 61 5f db 1d 40 23 04 f7 e7 7f | b8 e0 a4 4d 7c 42 cf 01 84 f7 f3 90 63 0d a6 27 | 03 53 27 bf 55 c3 86 69 1e d9 34 0b ea 6d ef b8 | 91 72 41 a4 7f 9d 36 67 17 b8 f1 de c9 57 cf 25 | 96 88 4b 97 29 55 03 99 2d 0b 7d 25 6e 82 28 00 | 28 de a1 1d bf 28 3b 57 86 30 40 b9 3b b3 59 37 | b9 3b 89 a1 f7 97 44 8d 31 dc 44 99 58 00 16 65 | 19 ab 30 5f 5a 1a 94 95 50 6f 1b d2 58 f8 43 59 | 32 7b ce 9f f3 ba d6 9b 84 a1 13 0d 64 7d 87 0a | 6a cb 60 60 91 23 18 fa 0b 4c 7f 24 f7 e4 a9 1b | da 1e 22 44 6a ff fd e2 c7 3d ff ec 71 14 90 da | 2f 14 ba 4f a8 6b df 31 2c a1 a5 6a a3 1d dc f1 | 4e 14 ae 37 41 c7 58 f2 d5 00 5d 49 d0 c7 f4 76 | a0 bd 4d a8 c2 8b 1f fe b6 2f d7 91 47 6a e8 e1 | dd 7d 06 82 4d 33 80 36 54 a3 03 be 52 06 d4 cf | 29 00 00 24 c1 64 a4 63 7a bd c6 9b 19 d4 3d 64 | d3 05 1c 05 f8 31 a3 bc 62 83 1f 22 d8 12 00 d9 | 0f 94 f6 5e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 12 25 8d 00 b4 d4 c7 fd 0e de ae | 25 a5 ca 2c ce 50 fd 3f 00 00 00 1c 00 00 40 05 | eb 33 8d 88 55 34 43 12 f6 bf 6c 9e 03 ac c1 f8 | ae e6 a3 5e | libevent_free: release ptr-libevent@0x7fb34c05ecd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c014cc0 | #551 spent 0.0665 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #551 connection "road-eastnet-nonat-54" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab64c0 | handling event EVENT_RETRANSMIT for parent state #611 | start processing: state #611 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #611 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-177" #611 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-177" #611 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.234006; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.959116 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c014cc0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #611 | libevent_malloc: new ptr-libevent@0x7fb34c05ecd0 size 128 "road-eastnet-nonat-177" #611: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.177:500 to 192.1.2.23:500 (using #611) | 34 ea b3 f2 4f 9b fd 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 51 65 77 23 f1 8e 59 ad e7 ff 5f de d0 89 eb 8f | e9 74 c5 98 7f 21 ce 5f 9a 27 21 a7 98 93 9e 99 | e4 27 4e b7 b3 24 fc 80 94 f6 f4 f5 9c fa 3c 88 | 3d a1 56 1a 21 1c 0e f5 0b ed e1 09 65 2e 3d d4 | 2f 57 58 dc 24 ce 14 24 1c da 0b b5 60 f1 11 17 | 1a 17 9e 79 a3 98 e2 85 17 79 fe 96 1e fd 0a 94 | db 8d d3 25 e1 09 1f 09 2d e1 61 f8 5e 36 1f 1e | c1 70 ed 24 ed f4 d8 4e fd 57 46 fb d1 4f 47 ed | 53 5d 31 e7 1e 13 8b 95 3e 46 72 5a c0 f9 1e d0 | 00 11 60 68 91 85 15 b6 a5 b9 35 22 09 f5 1e bb | 2f 36 9e 4c 45 ba 3b e0 87 f8 18 85 4b f7 b6 9b | 48 62 35 a7 22 dd 90 30 ba 7a 3c 10 b3 65 8e 2c | 7c d8 4a 70 a8 d5 53 60 76 0c 5d 33 c9 61 54 67 | f9 1d 59 23 17 2a 52 2b c0 bf ff e6 44 b3 ef 2a | 84 a8 c8 18 68 4e c2 5c 11 a6 2e dc 53 a6 93 01 | d4 df b1 45 21 de 1f be f8 d7 e5 8a 4b 8c d0 57 | 29 00 00 24 db 8b 59 30 04 e8 61 45 59 6e b9 45 | 4b e0 a8 74 27 04 8d 8e 65 dc 44 fc e5 bb c8 b9 | d4 93 ad 2c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2e cb 52 55 02 e3 8d 62 40 06 d9 c3 | 25 de 61 c2 25 e8 55 c6 00 00 00 1c 00 00 40 05 | 4c c7 ad 1d 02 9d 47 2a a9 d3 98 b0 82 03 7b 27 | 1e fc a6 ec | libevent_free: release ptr-libevent@0x7fb3380597d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab64c0 | #611 spent 0.0691 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #611 connection "road-eastnet-nonat-177" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c00cfd0 | handling event EVENT_RETRANSMIT for parent state #630 | start processing: state #630 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #630 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-167" #630 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-167" #630 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.234088; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.979719 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab64c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #630 | libevent_malloc: new ptr-libevent@0x7fb3380597d0 size 128 "road-eastnet-nonat-167" #630: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.167:500 to 192.1.2.23:500 (using #630) | 7e 20 27 21 e9 84 6e 79 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 32 6e c1 86 ef 01 ca cb cf d4 54 3a 37 90 3f aa | f9 fd 77 63 7d 3f 32 65 dc 4e 37 40 57 e5 28 ba | bc 68 04 4f 0e 5a 8f d4 7b 6c d8 31 01 31 af 70 | 7b 5e 07 9a cc 86 39 61 db f1 fe 2c 67 ca e6 87 | ee 49 49 c9 ae de 56 6a f7 61 cc 09 1a 0c 64 2d | 8a 63 64 38 db 36 06 2f bf 83 5c 9b 3b 72 ea 77 | 11 54 9f bd 9e 96 60 11 9f 4c 7d 2d 74 85 68 60 | 89 22 b8 8e c9 dc ec 8b d5 1f f0 2e 87 56 1a b3 | 98 52 91 5f b4 c4 5a 2d 4c 8e 2a 9c 04 b4 0f 8f | ba 3a a8 bb 3a 61 d4 4f bd 6e 59 87 ac 42 74 36 | 1d b4 a7 a3 ac b2 f0 31 4d 5c f0 20 80 d9 fb d8 | 99 ed a7 f8 3d aa 61 cd 50 cc 92 53 dc 7d 29 df | 97 52 04 ff 96 9f de 81 2e 64 0e 76 34 9d 05 2a | 60 5d 08 77 dd 6c c0 5f 2b 7a ca 90 dd 00 b8 d0 | df 90 44 71 93 d3 cf 23 7d 74 29 93 b8 60 2e c6 | 85 82 66 37 7d 41 f3 a2 35 e0 e4 2d 9b 02 5f 72 | 29 00 00 24 f5 41 2a 41 21 19 72 0e 4d 58 ec a2 | aa 28 84 44 db 30 74 6c 53 17 b0 90 75 8e b7 a5 | 64 9e f4 ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7d 7c 2b 60 60 10 f7 1e 72 a5 e3 04 | 6f 3b 05 1e 2d 25 81 27 00 00 00 1c 00 00 40 05 | a3 09 0e 65 34 53 77 41 1c 34 0f 5b 12 a4 a5 f9 | 2c 10 ce dc | libevent_free: release ptr-libevent@0x7fb37807ad70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c00cfd0 | #630 spent 0.0851 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #630 connection "road-eastnet-nonat-167" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2b610 | handling event EVENT_RETRANSMIT for parent state #544 | start processing: state #544 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #544 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-38" #544 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-38" #544 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.234184; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.937291 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c00cfd0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #544 | libevent_malloc: new ptr-libevent@0x7fb37807ad70 size 128 "road-eastnet-nonat-38" #544: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.38:500 to 192.1.2.23:500 (using #544) | 0c c8 e0 5f be 01 79 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c9 4b b7 07 59 5a 8f d2 fb d3 5d 33 1e 68 91 b3 | a2 26 c9 b9 8a b4 e6 8a 43 31 64 0d 77 e0 f1 15 | a1 39 45 b8 6b 02 50 97 06 06 58 9e 3a ef e8 37 | e4 7c 57 f1 4d 93 3b f5 c4 5a e8 bb 95 0b 16 30 | ae 70 14 a4 78 fb c6 1c 98 e7 86 0d 21 64 8f 8a | 57 22 3c 59 65 26 f5 b7 05 65 f5 b3 e4 57 83 07 | f5 ce 36 2e 87 c6 da e7 e8 5c 9e ac 52 b5 c7 3a | f5 b5 91 44 37 d8 f7 d2 db 23 2c a3 a1 47 55 3d | c3 92 ed 16 17 e5 6d f6 27 bc 16 5c 7d af 1b 3d | b1 6f 3a d3 6c 01 d7 03 36 b7 2e bf 9e d3 3d 31 | 24 06 bc a1 b6 d4 18 fd b7 44 8a a2 c6 1d 54 30 | ae a7 68 58 6b 6e 1c 65 90 77 e6 12 7e f0 bb ad | f3 9e 62 3f 52 83 0f 79 80 56 f0 97 14 45 da 2a | 9f 60 50 4a b5 7b 81 9f 4e 30 c8 19 e2 8e 7e 1a | 5f 7d f6 43 0f fd 85 83 e1 ad 46 c1 11 a2 4c 5f | ff 7c b9 be 6e 26 8b f7 40 11 92 c6 8b 91 0d ac | 29 00 00 24 e2 a6 28 8f f1 ed a9 8c ae aa e7 2c | 5e dc cc d9 d9 82 b2 05 50 60 c7 46 e1 4a 89 6c | 50 12 77 bd 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d8 fb b8 9e 31 b2 48 64 bc b6 ad e6 | d8 89 63 35 93 98 9f 2c 00 00 00 1c 00 00 40 05 | c9 4d f1 16 2f aa 6e 90 ec dc a5 b3 7b 2e 5c c9 | 7d 08 18 e1 | libevent_free: release ptr-libevent@0x7fb37c0720e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2b610 | #544 spent 0.0666 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #544 connection "road-eastnet-nonat-38" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38000feb0 | handling event EVENT_RETRANSMIT for parent state #550 | start processing: state #550 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #550 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-91" #550 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-91" #550 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.234259; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.93768 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2b610 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #550 | libevent_malloc: new ptr-libevent@0x7fb37c0720e0 size 128 "road-eastnet-nonat-91" #550: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.91:500 to 192.1.2.23:500 (using #550) | db ff 34 cc aa 26 9d 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da 8a d7 13 53 9b f1 64 c1 c8 04 0a 8b 03 2b c6 | 0d ad 43 39 3f fa d4 31 02 f2 d8 f2 49 42 65 4d | e0 c7 6e 23 69 ee af f5 1d 8a 37 e7 f7 88 51 de | da e3 c7 6f ce 70 fd 62 27 15 72 b1 74 d5 96 fe | 5d 1b a4 a4 ca 31 5b a5 af a2 32 e4 20 19 00 6d | fa 74 d0 93 44 c3 c0 75 8e c7 8d 89 fe 62 d3 0e | ec 96 32 6f b0 ca 05 63 70 b3 be f1 fd 8a 22 d3 | 30 ce 9e d5 e4 e5 4d 92 9a f9 82 cc a2 1d bf 79 | e0 be 40 12 35 fa 00 26 4c 97 eb 5c 78 8c 37 10 | 77 68 70 27 80 31 92 d4 17 d1 f6 07 6e a8 5c 37 | b2 cf 98 7e 16 70 ee da 2f c8 6a 1a cf 99 42 34 | 69 17 56 25 2f 75 a2 60 5b 03 8f 41 b4 71 d4 fe | d6 39 fc e1 d0 29 d9 e4 01 4d 2d 30 57 34 2a 98 | 61 8d 90 1a 37 ab e2 12 47 26 fe 8f 69 f6 20 34 | 44 8b 50 13 5b e0 15 0d ae 46 52 1d a4 2f bb f4 | 98 b0 5c 9c 64 1b 86 83 6f 11 65 70 23 23 74 6f | 29 00 00 24 e6 6e 02 88 81 a9 8e a7 ae 14 ec 40 | 05 51 ce e9 24 5c 3b c2 0b 49 df 12 27 77 a8 bf | ca be 33 ca 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd 11 2c ad 5a 38 a4 00 8e af be fd | a7 9a 55 19 4d 9f d1 09 00 00 00 1c 00 00 40 05 | aa 58 63 41 f4 3b 9c a5 91 ba 1f 8a 0a d5 9b 23 | 59 28 d4 a7 | libevent_free: release ptr-libevent@0x7fb388015370 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000feb0 | #550 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #550 connection "road-eastnet-nonat-91" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36000cc10 | handling event EVENT_RETRANSMIT for parent state #629 | start processing: state #629 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #629 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-71" #629 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-71" #629 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.234332; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.986461 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000feb0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #629 | libevent_malloc: new ptr-libevent@0x7fb388015370 size 128 "road-eastnet-nonat-71" #629: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.71:500 to 192.1.2.23:500 (using #629) | f2 94 01 51 22 3f af b0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 69 4a 7c e2 24 38 23 63 44 71 d0 61 ed e2 db 72 | e6 61 bd 05 9a 47 1a a4 e0 bf e2 b3 38 98 dc f5 | a8 2e 85 9f 39 94 94 de 61 d4 d7 e0 6f d5 4b c2 | 89 35 8a 19 c0 0b 46 04 61 a9 d7 30 7b 04 fc 12 | e6 01 83 16 c3 75 c5 9f 9a cc 41 f6 3c df 59 2a | 0f 08 5d 35 9a ce e8 c9 26 c7 0c bd a0 e0 6f e3 | 48 c7 a8 ee 4f b3 e6 8c bc 55 d6 31 9f e3 ee e7 | f2 e1 44 07 35 ec 7f 8d d3 6c 7c 13 76 3d eb f9 | d5 7d 76 3c 3b a8 5c be 62 a6 f1 e1 77 d6 70 e5 | b8 30 16 1f 9c 9e 52 90 ea f1 be d9 f2 c9 5f 95 | 77 8c 0a b4 bb a7 f4 25 bc 2d eb e9 11 f1 32 b5 | 35 4d 8c 02 40 af 7f 94 52 b2 4c 1d e7 2f e7 74 | 72 3e 84 0e 3a 79 5f 30 6a 29 cb 0e ae 9e 72 ab | d7 8e 3e b9 a0 36 1f e0 6e 15 d4 61 f3 83 66 72 | 3e c1 e8 80 18 c3 99 46 a8 a9 91 ab f2 9d 81 1a | 78 1d 17 58 a0 48 32 bb bb 73 79 08 2a 3f 1e 4a | 29 00 00 24 55 56 e2 01 45 9b b6 83 ff 84 a8 c5 | 23 34 d8 e3 d8 71 fd 93 f6 a7 41 77 7b 3f 0d 89 | 52 a4 4e bc 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 da 5d c3 fa ce a9 5d 3b e4 cc 6b 32 | 6c ae ca 02 24 ef 22 16 00 00 00 1c 00 00 40 05 | e7 00 f0 76 0a 46 ce 87 53 dc 2a ab ab 46 52 9b | a3 29 a0 f9 | libevent_free: release ptr-libevent@0x7fb37c06c900 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36000cc10 | #629 spent 0.0632 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #629 connection "road-eastnet-nonat-71" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3800153c0 | handling event EVENT_RETRANSMIT for parent state #537 | start processing: state #537 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #537 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-150" #537 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-150" #537 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.234404; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.929624 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36000cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #537 | libevent_malloc: new ptr-libevent@0x7fb37c06c900 size 128 "road-eastnet-nonat-150" #537: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.150:500 to 192.1.2.23:500 (using #537) | d1 5a 93 f7 50 58 86 fd 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 02 fb b2 e9 f5 e0 48 e2 24 d7 b7 90 81 4f a6 cf | 4b 14 8e f5 13 4f af 05 2f 84 bf 07 10 88 44 08 | 93 8a d9 fc 6f 22 fa 3c c8 70 98 39 d3 4f 21 67 | 30 23 4e 48 1b 3c bb d4 79 64 36 c0 17 1e c6 75 | 8a 84 dd c6 9f 18 fe 97 4a e5 66 71 01 67 56 d0 | 31 45 bd 3f 15 7c 4b 14 f6 e2 75 2e db 9d 87 36 | c1 55 2a ef fb 95 d2 cc e7 66 60 2a 50 9c df a0 | 4e 6b 6c fc 98 57 d3 ff f6 ab 30 47 15 58 24 c5 | 05 24 2b 82 ab 42 7e 2d 14 b1 af 64 00 e3 f0 ff | c9 03 29 6e 02 ac 5f cd 18 87 64 c1 df 8b 41 55 | df 40 66 85 17 02 00 95 d2 86 68 ed eb b9 5f fb | fb b4 ca c2 86 45 6f 55 ef 58 df 3c e1 5f a2 fb | 91 dc bf 24 5e 80 76 e4 9f 99 2c 02 e9 6b 6e 98 | 01 53 4a 03 27 4f 46 fe 01 ab 6a 3c 9f e3 be 2f | c8 ee 29 25 4e 78 52 2a 3e c2 0b a4 ff 2d c1 b2 | 21 1d 49 45 c8 7c fb b6 52 62 ee 97 b5 36 16 bc | 29 00 00 24 27 a3 e5 a8 20 a1 f0 e2 d4 b5 39 34 | 87 53 60 68 73 e4 69 53 b8 d2 8c 69 1f 4e 6c 2e | b8 6d d5 22 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 04 dd f4 fd 4d 77 54 64 d5 cd 35 a0 | 59 04 f4 07 5e 47 05 77 00 00 00 1c 00 00 40 05 | 52 af de ce e9 7d c2 89 3b cb ea 98 eb 7e 08 db | cf 06 0c f1 | libevent_free: release ptr-libevent@0x7fb3400613a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3800153c0 | #537 spent 0.078 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #537 connection "road-eastnet-nonat-150" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34802a9a0 | handling event EVENT_RETRANSMIT for parent state #610 | start processing: state #610 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #610 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-18" #610 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-18" #610 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.234488; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.961892 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3800153c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #610 | libevent_malloc: new ptr-libevent@0x7fb3400613a0 size 128 "road-eastnet-nonat-18" #610: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.18:500 to 192.1.2.23:500 (using #610) | 61 d4 76 e8 fd b1 0b 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 8a 16 af af f2 cb a9 02 ff 3e 3d ae 02 b1 75 | dc a6 9a 8d 77 a2 72 9d c4 d4 e4 1e d5 6c 54 7d | 5c 6a 9a 07 f7 ee 11 8c 25 4e 17 a6 b4 8f e3 97 | 33 ae 5b 1d e1 aa 4d 9c 14 18 3d 8d c9 8d a2 6f | cc 49 8f 9d 17 34 c4 20 96 b3 e2 03 ed 8c 8d de | e3 73 b6 b8 61 9a c3 4a bf 27 d3 2f a8 fe a9 f8 | 00 87 44 22 9b 0b 25 c8 66 f5 c0 23 88 06 14 5d | 26 0a 98 52 96 46 68 85 8b a8 34 78 ba b4 82 eb | 78 95 23 ba 81 62 21 b2 59 bb 25 ed 00 99 e2 d9 | bc 0c f2 02 1d be ff ab a8 66 25 8b 4e d9 07 26 | 4c 48 db 62 8c 96 22 7a d7 2c 26 7a 28 67 fc ec | 0b 44 dc 7e 93 ed 10 51 02 0c 46 dc fa 32 73 51 | b0 91 38 ff ee dc a3 8a 63 c7 0a 63 49 4c a8 57 | dc a0 35 96 35 c6 37 d0 da 6d 46 79 bf cf e8 4f | 26 a6 1b 5c 3a e0 a5 e5 c0 3f 87 73 30 32 59 71 | 11 55 e0 04 02 19 e3 7f 10 2f 76 30 3d 2f 19 1e | 29 00 00 24 47 ba 8f 29 57 01 a1 62 29 56 13 62 | 64 9d 16 df 12 f0 5f 85 ef e3 38 7e a9 49 18 89 | d7 eb 36 94 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 3c d4 8a e5 4d 08 9a 3a 72 88 9e | 1c 04 96 d4 a5 b0 e4 1d 00 00 00 1c 00 00 40 05 | 52 67 e1 51 42 cf 44 ba 32 e7 56 bf 02 a0 23 c3 | c5 4f fa a5 | libevent_free: release ptr-libevent@0x7fb348077830 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34802a9a0 | #610 spent 0.0626 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #610 connection "road-eastnet-nonat-18" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb388002b20 | handling event EVENT_RETRANSMIT for parent state #745 | start processing: state #745 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #745 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-226" #745 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-226" #745 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.234558; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.019043 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34802a9a0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #745 | libevent_malloc: new ptr-libevent@0x7fb348077830 size 128 "road-eastnet-nonat-226" #745: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.226:500 to 192.1.2.23:500 (using #745) | df ac 39 b5 f9 b7 7d 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e f7 65 df 71 26 c4 3d a2 90 5c a9 e7 88 ce 69 | ff 2d 77 e1 e9 28 b2 ca 63 26 2f 17 f6 30 c1 b6 | 39 b0 8c 45 80 54 3e b8 78 2e 6e fd 9a 2b 2a 52 | ca 74 04 e0 de 83 7f 71 5a 19 b2 89 32 08 35 52 | 70 00 7b 76 28 6d 62 a4 be 64 0c 1f a4 45 57 cd | 11 68 13 12 c1 4b 60 df 43 a5 14 ea bf 55 ed 2b | 18 e3 70 ee 05 77 1b 59 ad 13 96 57 35 f3 b4 6e | 28 41 98 f7 f9 c2 8e d1 b6 81 56 ba 5f 83 59 98 | c7 5b ab 64 6f 96 f4 3e 22 b8 09 cc af c2 0e ab | 6d a3 ec bb 7e 4b c4 f1 95 3e e6 35 d1 ea 5f d2 | 5f 46 72 4a 07 85 6d 10 0c 34 15 0b a2 f3 fd 62 | 45 e0 37 8e b4 eb a6 d9 5e 4a c5 3b b8 de e2 bf | 9c 19 26 ec 20 49 07 de 03 c8 b8 f2 22 8a b0 69 | 7c 4e a6 9f e0 80 50 9a 1a 56 09 a3 d2 31 da 0c | 1d 1c 03 93 e7 49 e4 22 b6 cd b0 39 68 08 3e 18 | 56 e3 51 94 91 4c f4 14 88 bd 84 2f 7c a2 b8 75 | 29 00 00 24 55 ae 14 5e ed e8 27 ac 21 93 fd 63 | 78 8a 19 9d 55 09 8a 50 52 47 37 07 2f ec 25 35 | ae 89 b9 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 84 71 bd aa 31 18 7e 5b 95 40 b0 64 | 8c 00 c2 4d 9c 60 b6 d8 00 00 00 1c 00 00 40 05 | 96 11 c6 74 b5 44 15 ed 03 ab 9b 4e 68 8e d0 9d | 24 43 c0 9f | libevent_free: release ptr-libevent@0x7fb374064930 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb388002b20 | #745 spent 0.0665 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #745 connection "road-eastnet-nonat-226" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348046090 | handling event EVENT_RETRANSMIT for parent state #601 | start processing: state #601 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #601 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-16" #601 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-16" #601 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.234659; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.960683 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb388002b20 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #601 | libevent_malloc: new ptr-libevent@0x7fb374064930 size 128 "road-eastnet-nonat-16" #601: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.16:500 to 192.1.2.23:500 (using #601) | d7 f7 ca a5 2f 06 a8 a8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 76 78 ca bd 24 85 88 4c 78 31 a2 d9 e2 a6 11 ea | a9 a8 ae 09 a4 bd 1f 95 2e 57 31 42 02 74 1f d6 | c5 8b 05 28 72 2e 76 f4 00 72 d0 70 f9 55 b5 84 | 94 83 3e 74 df 62 6a cd 44 08 f1 0f e9 7a 32 99 | b9 ec 32 40 77 3a c4 d1 0a 6e 00 b8 4c 58 c1 09 | 20 0d af 2a d9 0e 8d 53 5e ca 9c e2 9f 27 d8 7e | ce b5 b7 c6 10 df 06 bc e3 80 61 af 7d 92 7a 47 | 1a 5f 4a 09 fe bf 68 fb 0f 40 54 3e 58 85 5f bb | 73 72 f9 bf 1d c8 c3 c9 79 44 0d 07 44 21 4d 95 | fb d2 f9 99 1e dc c6 7e 09 bc cb bc e7 f1 64 05 | 39 dc f9 f1 b3 05 e0 d4 1d fc a0 60 42 26 ba 23 | e3 9b cc 3f d0 ff 12 49 db 17 4a c4 c0 02 73 de | 45 c4 7b f5 22 57 16 78 ee 47 e0 a6 d5 4a a0 a8 | ea f8 76 af 62 fa 50 0e cd 7b b7 d6 9e d4 f1 8e | eb 21 f4 fb f5 f5 7a 25 6c d6 52 91 18 f1 41 03 | e3 0e e9 9c 96 a5 c5 a0 5c 45 85 41 73 2b f2 4b | 29 00 00 24 2f 7a 9a b4 ff 1e 6c 6f 1d 55 f4 6e | bf e3 3b b9 6e ac 92 bf 50 bd ca 89 82 b0 73 dd | ad d2 0a 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 45 7d 4e 6c df 7e 32 d6 75 e4 3a 9b | ea 1e dd 62 f1 90 1e 9d 00 00 00 1c 00 00 40 05 | a9 5b d2 03 4a 24 da 8f e0 b4 91 a2 3b d8 bb f1 | 5f 38 a9 4c | libevent_free: release ptr-libevent@0x7fb348069890 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348046090 | #601 spent 0.0844 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #601 connection "road-eastnet-nonat-16" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368024000 | handling event EVENT_RETRANSMIT for parent state #592 | start processing: state #592 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #592 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-8" #592 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-8" #592 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.234749; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.959394 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348046090 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #592 | libevent_malloc: new ptr-libevent@0x7fb348069890 size 128 "road-eastnet-nonat-8" #592: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.8:500 to 192.1.2.23:500 (using #592) | a1 23 45 d4 95 dd 12 d8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 65 aa 2a 51 f9 3f cc db 28 9d 40 57 76 30 ea e9 | 8d e6 d7 38 3a dd ae 4f ff 59 39 ea 16 ad ee 6e | 8b 62 8c ca b4 a5 29 fe c0 61 e6 51 27 98 b4 0a | 1f eb 1b 79 22 3e 1a 67 1b b4 66 38 e1 9a 6a a2 | d0 1e 24 e9 c2 02 a7 7a ce f6 a5 f9 5d be 27 4c | 71 60 3e f2 bd 07 c5 5b 34 15 a1 fe 4b da 4c bd | 44 c6 05 67 90 ad 62 fe e2 99 3c 11 2a d0 f3 17 | 69 1b 22 6b a5 0d 80 74 ae 19 6c 94 76 90 a1 1c | 59 0b 47 78 27 d8 48 ac 3b c0 4d 98 1f d5 86 fc | d6 cb 0d 55 39 de b7 61 51 01 6d fe 92 8b ba 96 | 45 95 1a c6 f8 88 e3 b7 dc ed d9 6d 83 dc 83 68 | 4d da 82 e4 55 42 9e db 10 13 37 0e 08 44 e6 b7 | 92 01 b4 fc 5c 47 c0 bf f0 3a 42 10 d3 9f ca d3 | 90 f7 0f 4b cd cb 5e ac e6 87 b1 ad ed 51 0d 4e | 56 09 8e ae e0 0b a3 ad 21 69 a1 8d b6 00 f2 12 | 05 e3 09 dd f9 79 f5 d1 86 62 dd e9 ff 12 f6 c1 | 29 00 00 24 51 68 bd 9e 33 71 03 a6 00 f3 23 81 | c3 a4 22 43 b3 42 e5 96 7c d8 19 4b ab d2 fa d7 | 63 4d bc 6e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 36 b9 87 25 a7 de 47 1d dc da 4c 20 | 6f cb f5 ab 4e bb c1 b5 00 00 00 1c 00 00 40 05 | 3d 18 a6 af a0 2d 17 8e 57 6e 37 da 3a df 31 9a | 3f 4d c5 fe | libevent_free: release ptr-libevent@0x7fb37c03e940 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368024000 | #592 spent 0.0671 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #592 connection "road-eastnet-nonat-8" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c012630 | handling event EVENT_RETRANSMIT for parent state #702 | start processing: state #702 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #702 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-198" #702 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-198" #702 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.234822; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.993627 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368024000 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #702 | libevent_malloc: new ptr-libevent@0x7fb37c03e940 size 128 "road-eastnet-nonat-198" #702: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.198:500 to 192.1.2.23:500 (using #702) | 15 f5 25 c3 13 f8 3e d2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f7 23 22 6b 4e e1 f7 16 71 3f cc 94 ff 78 71 9d | 2b fa a2 70 c3 2e ae 8a 41 75 24 b2 5c bd de a7 | 23 08 94 3d 80 25 9b bb 30 e2 39 68 4c a8 e4 29 | 49 31 37 12 c5 eb 36 bd 19 63 9e bb 02 2e 79 f1 | d5 79 49 b4 68 b2 2f 57 ce ad b6 e5 93 ed 10 47 | c7 f4 e8 7e af a2 87 66 73 2b fe 02 35 20 50 f4 | 9f a5 ab b5 64 3f 58 fa 42 fa 9c 6c 95 59 e9 ce | 4a e5 f4 54 be d8 66 74 a2 a2 90 6f 88 07 da 7a | 49 4b 11 75 25 b5 a8 6e d3 e1 6d f6 61 26 a4 59 | c0 01 b5 a8 17 ba 1f 41 41 7b 34 f9 ae 03 0e 4a | 5b 82 0f 6f 4a f8 8e 71 36 c5 69 ca 74 e0 5b 22 | 74 fb e1 af 0d 04 d4 9e 58 0c 8b a5 0c bc aa 36 | 9b de 60 b8 6a 44 18 d6 e6 f7 1e 5f 4f 0f 2c ae | cb 0c 20 f0 15 5f 9d 76 45 13 42 ad ce b6 34 58 | 61 bf 65 e9 72 77 ab c8 67 23 c2 1d cb 5a b9 e9 | 79 63 d4 bb e2 75 dc 84 01 77 ec d7 11 39 db a3 | 29 00 00 24 29 3f 45 8e 5c a6 8f 4f da f4 c3 d1 | 92 da 38 10 ed 30 75 5c 71 90 dd de 75 d0 e6 82 | d2 61 a3 e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3b d3 44 81 5f 32 17 86 65 0e fb e9 | 12 7b 72 5f d2 f6 d2 d1 00 00 00 1c 00 00 40 05 | 27 39 6b d9 0c ca bf 20 21 d1 a6 c3 cd c6 e3 21 | 22 00 7c f2 | libevent_free: release ptr-libevent@0x7fb34006c3b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012630 | #702 spent 0.0647 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #702 connection "road-eastnet-nonat-198" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a8ee40 | handling event EVENT_RETRANSMIT for parent state #676 | start processing: state #676 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #676 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-97" #676 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-97" #676 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.234895; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.992703 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012630 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #676 | libevent_malloc: new ptr-libevent@0x7fb34006c3b0 size 128 "road-eastnet-nonat-97" #676: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.97:500 to 192.1.2.23:500 (using #676) | 9b 3e ad 4d 72 f4 8b db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 0e 3a fb 7f 58 e3 6d 62 ec 1e 2e 59 c4 32 70 90 | 18 12 b4 1d 0b 7a db 79 5b 5b f1 b3 ae 64 53 67 | 1a 61 39 5c 66 bf 33 12 e2 07 ee a6 22 5b c8 f1 | db 9f 71 60 29 05 1a c7 13 3e 19 22 f4 45 96 09 | 3e 1a 53 a5 6e fa ef cb 17 c0 79 5f 39 35 36 4a | 56 04 cc 65 b5 06 e3 4b 77 47 11 f6 68 ce 50 3d | c0 ba c5 64 4c ea 38 bc 6c 58 32 32 f6 68 41 7e | 54 0c c5 6f 06 e5 8f 9b 5d 2e 9f ca 8f 21 e6 f2 | 57 64 49 31 d2 36 51 23 ef 32 7b fc e1 c9 40 d8 | 83 9f 51 20 e7 a6 c5 57 1c 3e d9 70 f7 a6 d6 01 | e3 11 c3 e6 40 27 44 77 36 6c e6 51 a9 4a 34 de | ef 68 86 37 6d 3f b8 f2 d1 61 ec 73 99 06 ca 4d | 7c 67 1d 21 d8 21 73 af 9e 16 de 97 5d dc 6c 4e | f2 c8 de e8 d8 33 7c b9 e3 29 55 17 7b 29 87 79 | 3f 1c d3 24 71 d6 95 25 f2 de f6 b8 4e fa c5 5e | 38 62 28 cc 5d 35 7d 8a 00 7d 42 e6 36 56 c3 6d | 29 00 00 24 50 ed 7c 96 0e 66 f7 85 bf de 64 30 | 8b f8 90 bb b7 61 8d 4c 88 80 57 a3 f9 36 fa 84 | 96 9e 05 56 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e7 b4 72 7b 99 d0 96 09 97 fc e4 db | 63 69 04 c8 69 8e b3 ef 00 00 00 1c 00 00 40 05 | 9a 7a 34 f9 3d 74 af 91 e2 55 3d 5a 9c b9 26 70 | 97 7c a3 48 | libevent_free: release ptr-libevent@0x7fb364085920 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a8ee40 | #676 spent 0.0655 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #676 connection "road-eastnet-nonat-97" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37802a910 | handling event EVENT_RETRANSMIT for parent state #646 | start processing: state #646 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #646 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-181" #646 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-181" #646 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.234968; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.97964 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a8ee40 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #646 | libevent_malloc: new ptr-libevent@0x7fb364085920 size 128 "road-eastnet-nonat-181" #646: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.181:500 to 192.1.2.23:500 (using #646) | b4 5e a6 e5 43 b3 10 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e9 73 71 28 1c 8f e6 c8 30 15 e8 f2 83 24 73 ba | b7 8e 5e ad 23 5e fe f2 57 66 39 2a 10 14 0b 7c | 99 94 74 01 76 7d aa 55 2c 68 f1 88 64 b0 b2 92 | d0 76 47 86 10 fe 60 a1 91 ba cd e1 7f 16 26 be | 94 e7 90 51 31 6b 00 e1 5e 12 3f 7c f5 94 c8 a4 | 3b fb 8d 83 6d 50 f6 31 0f 66 c4 51 6b 72 e3 1c | db ec 64 33 bf 0c 59 6c f1 5d f9 d8 36 f3 db 7b | 00 1f fd 9f 62 d6 fc a4 0c 59 79 dc 40 4d e4 5a | 26 f7 7b d3 60 14 f9 91 37 58 78 18 88 14 be e4 | 88 8a fa f1 c4 75 a4 31 4f 52 e1 46 5e cf d1 8e | 9c f9 b4 26 da 2d a3 97 eb 50 5c 60 d5 bb 8c bb | 6d 2b 92 6e 83 db 31 aa 80 60 97 87 f1 28 f7 2b | c0 b4 e7 6c 01 76 70 27 2e 05 9c f9 c3 75 6f 18 | 38 5e 72 a4 02 3e 9a ec 50 94 23 4d d0 04 67 a1 | fb d2 c7 f4 b8 d2 26 01 d0 ac aa dc ef ad 7a 1c | f6 27 f6 31 ba cf ef 6b a9 6e f7 2e f2 27 c2 0e | 29 00 00 24 14 d4 23 b3 ee 67 2f 32 3a 28 a9 26 | 74 34 22 80 70 fc bc e1 f8 e1 fc 3b 8e 87 b8 d5 | 50 4f 59 29 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b8 b4 a9 36 84 ee c8 33 36 8f 3f be | e9 b7 2c ae e1 30 41 fa 00 00 00 1c 00 00 40 05 | 6c 77 62 56 82 b3 0f 90 87 bf 6a c6 0c bd a8 c9 | 53 ca 46 6f | libevent_free: release ptr-libevent@0x7fb36c064a30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37802a910 | #646 spent 0.063 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #646 connection "road-eastnet-nonat-181" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34001a1e0 | handling event EVENT_RETRANSMIT for parent state #600 | start processing: state #600 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #600 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-128" #600 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-128" #600 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.235039; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.957076 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a910 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #600 | libevent_malloc: new ptr-libevent@0x7fb36c064a30 size 128 "road-eastnet-nonat-128" #600: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.128:500 to 192.1.2.23:500 (using #600) | b5 8b 9d 63 05 76 9b 43 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 12 cd c7 d7 3f 0d bb 77 fc d1 1c ab 77 ae 86 ac | 26 75 19 1c 77 04 4b 07 7b 30 6a 0f e9 ae b1 4b | c2 01 f0 be 77 bc 8d 29 4a 13 80 84 01 ec bb bd | 9b b4 e0 a3 b9 74 4d fb 59 f0 b1 62 7c 23 17 59 | c2 35 47 24 40 0e 78 ba 49 8d c1 80 7f ff 22 b6 | b6 ec 09 5b c1 9f 87 91 ac ef 09 c3 af 78 0a ea | 0d 6b a8 42 f1 3e 23 89 64 a8 83 5d 1d d4 84 5e | 9f 78 c2 0c 76 ee a4 76 88 78 0a d8 84 b9 ea 14 | dd aa 58 60 5c f2 1b 26 59 8d ee 35 91 31 11 6a | cf c7 9c 82 87 ed 5c 03 ab 49 fc a4 ec 38 af ae | f6 1b bb 87 fe b6 4a 50 60 6c cc b3 1f fa 42 68 | 77 69 10 7a 5c 8f 12 4e bd d8 46 98 43 dd e4 54 | ef 5e 86 b8 15 8e 41 80 e5 10 0a c9 f6 e4 9a c2 | 27 59 fd b1 5d 0b 98 f8 ff 0f 21 7b 55 71 56 50 | d6 a8 f9 25 e7 e0 02 03 dc 47 72 cd 38 48 9d 8f | 84 5d 29 5a e4 04 82 0c 5c 9a 7a 00 38 a3 32 1f | 29 00 00 24 7c 62 68 cd 4f 9b 4e a6 25 ba ff b3 | 1c a3 6a 45 01 89 4e 8a 82 38 6d ae a7 aa 34 d8 | c6 f1 4c f8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 87 57 11 53 15 68 5a b5 7f fe 43 f0 | b9 a0 3d 5f 8d 50 a5 03 00 00 00 1c 00 00 40 05 | 6b cb 38 0e d2 0e ef 73 17 ed 32 a7 bd 62 17 c9 | 6a 1f 87 d1 | libevent_free: release ptr-libevent@0x7fb340053a30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34001a1e0 | #600 spent 0.07 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #600 connection "road-eastnet-nonat-128" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab90c0 | handling event EVENT_RETRANSMIT for parent state #684 | start processing: state #684 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #684 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-168" #684 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-168" #684 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.23512; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.998667 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34001a1e0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #684 | libevent_malloc: new ptr-libevent@0x7fb340053a30 size 128 "road-eastnet-nonat-168" #684: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.168:500 to 192.1.2.23:500 (using #684) | fe 13 79 f4 87 18 7a 07 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9c a3 3b ab 91 aa e9 1c 1f 09 51 cd 63 31 b4 f6 | 27 05 e2 58 eb 11 21 fc 74 8b a1 04 48 38 e0 4b | 3e eb 3c 47 9f e1 28 6a f4 cf cd b0 2f 86 fe 42 | 06 be 5c 6a f3 0a ed 96 af 36 41 a8 95 43 50 86 | 62 97 ba dc 54 cc 86 ec 1a 93 e8 8c 86 bd 6a fd | 31 85 d3 58 12 be df c0 96 2f 7a 9d 76 f8 ee 26 | 9a 43 6d a6 d5 f1 30 04 83 a9 49 c2 dc d4 6a 20 | 1a a0 77 c4 16 45 81 34 61 94 d1 87 44 ee 60 b8 | 64 38 4f 17 86 f2 34 5c ce 1a ca cd cc 73 9e 4c | ad 5d 12 fe 07 4f 80 6b 47 cd 8d 28 e2 55 47 11 | 39 18 ea a9 6c bb f3 f3 0f 8d 00 15 59 01 c9 80 | dc 86 1f df 0c f8 d3 db 42 55 8e 18 b9 71 3f 72 | b9 64 4e 7e 16 72 18 aa 5b 2f 5c 3c cd 00 ea 61 | 42 52 f3 7e 53 72 7f 07 33 50 b0 ec ed 4c b3 11 | eb 58 4d b5 c5 0b 02 4d 09 d9 c0 f7 15 fe ed 15 | 67 5b c9 94 30 44 36 30 17 51 bd 8f 69 8a 1e 07 | 29 00 00 24 67 c4 83 c2 98 c0 7a 1b 9f 67 5e 99 | 8d ac fc 2a ad 63 42 f3 d0 ee 64 a2 cf 91 5e 20 | 6f 96 d3 5f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 82 99 d5 30 8b 22 4c 45 76 09 65 | e5 33 b6 41 67 45 7b 6a 00 00 00 1c 00 00 40 05 | c8 40 1d 53 f1 98 45 16 51 e3 1b cc 43 1f 4a 55 | 08 fa fe d9 | libevent_free: release ptr-libevent@0x7fb358073c30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab90c0 | #684 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #684 connection "road-eastnet-nonat-168" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3380300a0 | handling event EVENT_RETRANSMIT for parent state #527 | start processing: state #527 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #527 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-65" #527 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-65" #527 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.235193; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.979566 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab90c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #527 | libevent_malloc: new ptr-libevent@0x7fb358073c30 size 128 "road-eastnet-nonat-65" #527: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.65:500 to 192.1.2.23:500 (using #527) | b8 7b a6 b5 cd 22 30 e3 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 9d 68 a6 ce 12 3e 16 ce 0a 40 e3 0d ea db e5 bf | b4 0c 0f 14 5d 82 31 6e df 98 3a a9 2b 0d 83 59 | a7 51 1f df 33 ed b4 d4 3d 6e 89 89 e1 79 17 6e | 79 24 a2 44 83 1f 07 80 b7 73 27 d1 f5 ab e7 f6 | fa 73 46 f9 e5 46 01 bb fe 93 76 2e fb d7 ee 39 | 18 23 e1 f9 53 17 53 31 0d b4 42 58 f1 f5 27 5f | 8f 40 ae 48 c9 9a d1 40 be 99 20 4f f2 5a 11 4a | 48 24 79 61 ea 93 68 2f 62 04 56 92 f9 14 43 3b | 8a 3e eb 47 ce 87 24 50 5e 1e 23 ea d1 e7 ff ad | 92 32 52 12 93 36 c5 47 2c 6c 33 48 33 2a cb ce | cd 3b e2 9d 5f 5a 78 ba 2e 4c f5 75 36 53 8e 18 | c2 8e 6c ae 9f 48 cd 76 e2 9b 13 a4 86 1e d9 37 | 5a 76 08 51 c6 0c c9 7f 15 8d 6a 72 43 9f 44 4a | 6e 19 5e f0 ed 1e 32 a1 a1 b9 c3 4c 22 6e 92 40 | a0 76 62 be 61 a0 b4 ca 52 4a 39 3c 84 7b 48 7c | 26 8e ac a1 a4 17 05 aa f0 10 33 85 e3 3a d9 7e | 29 00 00 24 42 74 9e 85 d4 ce 77 94 f8 66 9d 51 | 75 21 75 54 57 2f a1 c1 0d 08 6e 7a 4a f7 0f 5f | 6b 9a 4f 16 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c2 fd 65 f3 18 d8 6f 03 d6 0f 2d d6 | 5f d4 a1 2e 7e 59 4c 96 00 00 00 1c 00 00 40 05 | 2f dc 51 0a 44 26 e8 79 d1 11 0e dd 4d 4c 69 c6 | 3a 55 a8 94 | libevent_free: release ptr-libevent@0x7fb3600618f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3380300a0 | #527 spent 0.0632 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #527 connection "road-eastnet-nonat-65" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a45350 | handling event EVENT_RETRANSMIT for parent state #734 | start processing: state #734 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #734 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-174" #734 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-174" #734 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.235265; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.007376 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3380300a0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #734 | libevent_malloc: new ptr-libevent@0x7fb3600618f0 size 128 "road-eastnet-nonat-174" #734: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.174:500 to 192.1.2.23:500 (using #734) | 14 ad 8f c6 54 da 73 f6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 2f 5d 76 c2 4f 1f 02 6a 67 83 af 07 ab a2 bd | 9d b0 56 b4 74 93 21 23 d5 0f 1b 1a 3c 05 90 db | 39 cd bb c0 0f 27 b0 be e7 30 10 fc 0c d6 85 d9 | f5 60 17 39 55 ca cb 5e 73 d2 3f be 8a 82 60 c9 | e1 41 42 b2 6e 78 88 06 40 0c 17 95 c2 17 27 23 | 90 bd f0 73 5c ee cb d6 c6 aa 04 22 1d c0 10 38 | fb 77 ae 2f 0a 4f c0 01 c1 29 59 fe 35 87 fe 76 | 67 9f e2 74 4b ff 95 18 5f 7e 94 c6 c7 e6 07 67 | a5 35 e2 f5 32 f0 ec 4b b5 8b 9c f1 7d c8 0f 0c | 14 d9 4b c5 b9 27 1c e0 42 84 b9 a8 08 9f 75 1c | a2 e5 c6 44 e5 22 9a 7d ee 05 4e 75 55 a6 96 62 | 19 7d 76 44 2c a5 59 2c 17 a4 18 38 23 2d 1c 58 | 72 f3 bb 2e 0b 81 64 e9 5c 10 3e 22 02 85 a0 c4 | 22 29 f1 c6 45 f2 7a 20 5c 0e de 01 c6 aa e1 c8 | 76 a4 85 5f 79 3f 64 df 47 3f dc 65 47 83 a7 3a | c4 4e f9 47 98 cb 9d 5b c7 13 e3 7c ce 08 53 f9 | 29 00 00 24 f6 bf c4 84 2e cb dd 02 8e 3f e7 e1 | fb 91 00 da cb 72 7d c0 8f b1 0e f4 82 ab 9b 50 | c3 13 1d b1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac e5 9c 84 e2 ae 2e 54 0f 4c a4 7c | d6 9a 1b 89 f2 f4 09 5b 00 00 00 1c 00 00 40 05 | fb 5a 36 f0 d4 c4 17 31 be e2 a0 e0 6f e2 a5 d0 | eb e9 f5 19 | libevent_free: release ptr-libevent@0x7fb33808a5d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a45350 | #734 spent 0.0641 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #734 connection "road-eastnet-nonat-174" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b06800 | handling event EVENT_RETRANSMIT for parent state #717 | start processing: state #717 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #717 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-195" #717 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-195" #717 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.235336; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.012882 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a45350 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #717 | libevent_malloc: new ptr-libevent@0x7fb33808a5d0 size 128 "road-eastnet-nonat-195" #717: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.195:500 to 192.1.2.23:500 (using #717) | e9 cc 03 7c e4 bf 38 4d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 0d 73 a5 88 38 ec a8 b6 b3 23 50 23 2d 53 9c | f5 59 45 c5 2c 5d 29 a6 50 ea 35 cd ff a5 c3 82 | 38 04 6e 7c 97 76 33 80 5e 2e f5 c7 20 1d 6d 52 | 54 d4 c8 43 d2 e6 b1 e4 c1 91 68 e9 90 9b 22 d4 | 83 38 49 6a 85 b6 95 48 9d 37 d5 48 27 0e 06 98 | 9a ac f5 b2 ed 13 5b 90 8e eb 62 80 51 7d 18 ee | 32 25 77 49 32 8f 44 94 81 26 5d 5f 72 27 8e 3a | 3d 60 20 38 fe 19 ba a8 04 69 ba 2a 74 5a 42 77 | 2f 99 5b 7a b9 a8 61 7a f1 75 11 5b a2 50 cd 53 | 3e c5 95 48 2d 5a 37 b9 4e c2 b7 10 0b 09 f4 4b | bc cd c9 0e 10 07 92 ed 69 ad 1e f1 95 18 c1 9a | 1e ea 66 8b 35 9c 7c a7 b1 0e 8e b5 d5 47 b6 9e | 92 8b a0 cf f4 db 96 37 1e 82 84 04 16 36 81 77 | 8c 3e 2c e7 86 0a bd c6 dd 95 c1 6b fe 52 5f 2a | 76 45 bb fe 23 c6 23 bc e6 64 3e f3 0c 6a 8e 66 | 27 65 38 a3 1e 94 62 d7 e1 4e 78 ef 7d 9b 33 59 | 29 00 00 24 84 76 67 8c e9 66 d9 97 e2 c1 c3 44 | f5 19 60 fe 7b e1 dc a7 b1 57 f0 2b 9f 4f 7d 83 | f4 f5 26 e7 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 60 0e 85 7e 12 27 fe f4 c2 99 71 9b | 7e 21 7b 45 a0 57 b5 9c 00 00 00 1c 00 00 40 05 | f0 35 c9 a1 8e 9b d2 fc 27 bf 2e d5 3b 0c 2d 8b | c9 9a 4f 06 | libevent_free: release ptr-libevent@0x7fb3500882b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b06800 | #717 spent 0.0696 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #717 connection "road-eastnet-nonat-195" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46adb080 | handling event EVENT_RETRANSMIT for parent state #561 | start processing: state #561 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #561 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-90" #561 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-90" #561 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.235414; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.944388 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b06800 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #561 | libevent_malloc: new ptr-libevent@0x7fb3500882b0 size 128 "road-eastnet-nonat-90" #561: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.90:500 to 192.1.2.23:500 (using #561) | e6 ce b9 a0 0a 53 1e 5c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f 46 f6 a4 7c 90 e0 c9 d2 85 20 8f b5 1d b7 c4 | f8 f3 b0 78 b0 d2 51 66 8d 4a d8 59 6d 49 84 64 | 71 ab fb f5 bc b5 f0 e8 d0 77 d4 03 41 0e 1e 4a | d9 b5 75 25 c4 92 0a 2d 74 4a 0c 20 47 6f 34 56 | 44 56 ce da b3 ab 68 a5 91 66 d6 77 00 6b 23 58 | fc e6 d4 0e 5a 52 c1 f1 b5 a0 ad 99 57 15 c5 c2 | d9 2b c3 74 d2 ab 4d 6c 38 2b a8 54 f1 10 ea 73 | f7 f3 1a 1a 0b 20 27 ed ef 90 9d 0b e4 63 64 46 | f5 cd 8e 24 f9 d7 d2 7f 96 cc 6d 0d 85 5e 94 0f | a9 4e 5e ec c5 1b 6b ba 38 a5 5a dc af bc 4a 97 | 01 2b d3 7d e0 00 45 8b 2a 4c 3a 26 e1 bd 65 ba | 43 5f a9 bd 57 50 f2 28 5b 00 4d 82 f3 42 f1 e0 | 6d 90 d6 4d 3a f9 fb 23 4e 48 bf 3a cc 34 f4 a3 | 43 3c 8d ad f0 9a db e2 a8 69 3f f5 2a 3e f3 dc | 27 48 23 01 97 ea 7c bc 0d a2 a2 b0 86 ec 2e 00 | 77 3a 8c 7d fc a5 d4 fd 81 85 16 b0 ff 6b 0e b5 | 29 00 00 24 c5 97 1a 8b 29 e3 3d 7a 27 0d 40 2f | 83 32 ae 98 8d 84 ac e2 dc ec 7a 49 5f 8b 56 23 | eb 72 f0 75 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 04 bc 5d f6 1e a1 6a 54 c3 1f 21 fe | 90 fc 7d b7 bf 9c 0e ab 00 00 00 1c 00 00 40 05 | a1 82 14 e7 88 f7 7d ff e6 10 b0 c3 6f d3 95 fd | 16 ba 74 48 | libevent_free: release ptr-libevent@0x7fb374085870 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46adb080 | #561 spent 0.0655 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #561 connection "road-eastnet-nonat-90" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378018100 | handling event EVENT_RETRANSMIT for parent state #554 | start processing: state #554 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #554 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-98" #554 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-98" #554 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.235488; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.940344 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46adb080 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #554 | libevent_malloc: new ptr-libevent@0x7fb374085870 size 128 "road-eastnet-nonat-98" #554: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.98:500 to 192.1.2.23:500 (using #554) | 25 17 60 01 5a 53 51 bb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 38 2d f1 00 6f d0 3c a9 89 96 83 23 c7 b8 5d | 1a a6 31 2b 2c 51 9d f6 cf 41 37 49 95 49 bb 07 | 22 d5 2d 9b fe 69 9e 12 c7 f6 3e 06 e7 18 06 20 | c1 aa 51 c6 00 74 fa 4a 11 cc c8 b0 ed 1a e5 e4 | c4 39 2f 27 86 6b 56 5d d1 56 6c 92 b1 bb b2 fd | e7 5b 8a fa 41 54 ee c3 2f 4b 56 28 c4 84 43 b6 | 29 3e 51 c0 e7 fd f5 95 28 1a d0 e0 91 dc f1 6e | 39 56 bd a3 9a d5 67 19 93 7a c4 42 65 6a 67 24 | 4f 95 02 14 cf 93 bd 7f a6 8b ba d4 40 ea aa 44 | bb 51 d0 43 02 22 34 c7 50 c4 3c 24 ec 0b 9e 0b | 68 3e 0f 11 f4 55 6d 52 6f 15 ed f6 c8 d2 70 f8 | fa 7b 49 45 c1 d7 b6 5b 40 7b 44 9d 47 3c af 30 | 36 b9 73 5d 22 5f a7 f6 ce 29 85 12 50 70 19 59 | ff e1 64 85 88 18 f5 bb 21 9e 23 15 22 cb 42 8f | df e0 fe 4c ee be d0 17 86 a2 52 52 76 91 2f 84 | fc 1f 46 9a d7 c0 87 a2 fb 33 8f b3 de 22 8e f6 | 29 00 00 24 2a e4 8d 48 f2 e9 35 56 e7 78 9c 50 | 82 48 8b a6 d8 56 83 14 85 5c 7b 82 38 7e 5a 90 | dc b9 01 eb 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a5 6c fa 7e d5 f7 59 ab 33 19 e9 49 | 9d b2 c4 ad db 25 ab 32 00 00 00 1c 00 00 40 05 | 84 c3 f1 b0 ec 53 88 9c d7 9f 3b 91 13 fe 1d e1 | bc ef 10 92 | libevent_free: release ptr-libevent@0x7fb37803b0b0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378018100 | #554 spent 0.0638 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #554 connection "road-eastnet-nonat-98" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35801d710 | handling event EVENT_RETRANSMIT for parent state #558 | start processing: state #558 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #558 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-9" #558 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-9" #558 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.235559; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.935803 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378018100 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #558 | libevent_malloc: new ptr-libevent@0x7fb37803b0b0 size 128 "road-eastnet-nonat-9" #558: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.9:500 to 192.1.2.23:500 (using #558) | a0 bf 59 d3 80 3d 9d 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 0b 86 6c 08 67 cc 4b bc c3 39 13 37 f4 32 e7 | ad d1 3b 50 ca a5 a0 c9 48 a7 c6 40 28 8a ce 88 | 48 9a aa f7 90 71 74 ed bc 28 4c d4 56 d7 df 22 | 4f 3a d6 3b 4e 8c b0 b3 d6 6a 56 04 3b e0 40 63 | 8b 49 82 3f 73 5a 7c fa a1 c4 0c d8 1e 26 25 61 | 7f c0 52 f8 2f 3c 28 85 6c 37 5d c8 aa 97 0a 05 | 31 61 41 82 78 5c 29 78 03 4d 4e ec d7 92 6b 15 | 11 ed d4 89 17 37 84 77 86 0f 5b 00 ae 1d 38 19 | 0d ac 0c 19 d4 42 43 c3 c7 86 33 36 3d 13 82 f5 | 92 4c 46 6b 6b 92 f0 58 2e 94 0d 8c d2 74 6a 33 | f6 10 0d 35 6b 00 74 18 19 fe b3 bd 3b 01 68 c8 | 55 16 d5 ec 93 02 71 33 c5 83 15 91 47 19 08 ae | d5 86 b5 c3 61 af 99 0a ea 43 2b 44 f9 af ac ea | 2c 5e 25 7a e2 4b 89 ff 8e 3b 15 87 08 63 19 5e | 81 14 9b c2 be b1 4a a7 00 bb d5 e7 f7 c3 ed f1 | 6a 63 70 39 8b 8e 47 62 eb 92 4d 42 f6 a8 77 a5 | 29 00 00 24 07 63 d1 5f 7b 4c 62 77 51 cf 3a c4 | f3 0f f8 72 58 27 a5 92 6f 1a 94 2c 36 bd c3 e4 | e2 d6 9e 5a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 db 51 b0 40 da 74 9a 4d f5 0e 2f 49 | 38 da 65 ba 56 04 b0 54 00 00 00 1c 00 00 40 05 | 8b 38 7f 8a 89 4d 10 70 34 f4 f7 39 75 12 38 2e | a0 bb 61 3b | libevent_free: release ptr-libevent@0x7fb384063190 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35801d710 | #558 spent 0.0691 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #558 connection "road-eastnet-nonat-9" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350044df0 | handling event EVENT_RETRANSMIT for parent state #597 | start processing: state #597 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #597 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-22" #597 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-22" #597 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.235645; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.959959 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35801d710 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #597 | libevent_malloc: new ptr-libevent@0x7fb384063190 size 128 "road-eastnet-nonat-22" #597: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.22:500 to 192.1.2.23:500 (using #597) | b4 11 eb c0 3c ee 82 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 4b e2 a7 57 e1 0e 89 3c 5e 5c ad af 7e 70 cd ff | 21 89 77 18 f4 e7 a2 a2 0b 97 a2 cc 0c 79 62 a6 | 53 17 8a bc 8d 3b 08 6c 40 4e e0 76 7d d4 d1 91 | bf c5 8b f9 61 7f eb 07 6d 14 8e d7 2e 13 4b b7 | 14 c2 d5 04 cf 8a cc ac 4e ae 84 9f 14 5a e5 10 | da ae 54 d6 70 48 a3 a7 d0 ef ea bc 55 27 5a 82 | 23 5b 52 be c1 f3 53 be bb 7d 21 37 c3 a9 7f 33 | c7 62 04 d8 71 42 47 a0 d7 41 5f d1 4d c5 32 46 | 77 62 f1 35 9a 43 b7 7e 06 40 63 92 bb 12 f6 65 | 95 37 e9 95 f6 44 66 e5 21 74 8a 91 88 04 ad e6 | 73 e6 dc 01 ed 0f a5 fb 40 2f 2a d6 15 cc f9 e5 | 64 76 7c 1a f7 fd 4f e9 ea 7f 6a ab 40 67 b0 84 | 31 a8 8a 3e e0 7c 8e 22 7d 83 59 b3 8c 60 24 8d | 8b 1d 5a 54 65 8f 80 6f 96 65 ca 43 c8 a7 28 f6 | 55 d4 fa 1a 47 2e 73 c8 9e ce 9b a4 9b 29 e3 96 | 97 ae 07 06 04 32 86 2a 42 ce 44 45 22 8b ed a9 | 29 00 00 24 49 1d 06 1e f3 92 fd 55 9e 0a 50 15 | a6 41 c4 55 df 85 ea d9 9d 51 f8 0d da 8c c6 ac | 25 cc 84 3d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d c2 73 38 8d 54 94 82 d9 af a8 f8 | 7c 2d a7 d4 83 28 88 71 00 00 00 1c 00 00 40 05 | dd 49 b4 51 8c 53 2c 7a 9c 58 4d c4 6e bc 08 eb | ca 20 63 19 | libevent_free: release ptr-libevent@0x7fb350051bb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350044df0 | #597 spent 0.0997 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #597 connection "road-eastnet-nonat-22" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7cf50 | handling event EVENT_RETRANSMIT for parent state #563 | start processing: state #563 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #563 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-40" #563 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-40" #563 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.235759; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.941577 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350044df0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #563 | libevent_malloc: new ptr-libevent@0x7fb350051bb0 size 128 "road-eastnet-nonat-40" #563: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.40:500 to 192.1.2.23:500 (using #563) | 36 fd bc 41 27 9a 18 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 98 f7 f9 df fc 24 98 94 50 1f 5b ee 02 6b 2b 08 | 88 ea bb 4c fc 6f 81 4e 18 49 00 df e1 e9 2e 32 | 12 86 87 5d ed 60 5b 39 8c 88 3b 45 c5 ff 07 ae | 3b 26 9c d0 6d b7 d1 e5 d2 f2 44 e2 99 9a a1 34 | 7c cd f0 e6 b4 a0 06 c2 e2 40 86 90 79 ac 53 56 | e8 b9 80 5c 54 49 7c e3 25 da dd 1c a3 52 9f ec | a4 d2 90 b1 56 ce 5d 5c 20 a2 3b 08 f3 fd d6 30 | 42 db da 3e b2 e5 ed 74 de b7 e6 59 ba ed c1 83 | 60 66 8c 72 2f 6f ba 9a 85 05 c1 db 9c 7c b8 87 | 26 24 9b 4b 8b 4b 67 b9 df 00 bd 07 d0 3b e3 b4 | 6c 17 18 f3 f7 d3 9c 27 cf 7d 7a bf 43 d6 d5 cf | 69 cf a9 92 09 2e 90 5d 89 35 3e 56 73 21 5e fd | 30 0e e9 0b 43 37 81 42 99 01 7c b5 f0 2c f6 9e | 45 a9 d9 81 d2 95 68 9f 5d 8d 05 3c e4 03 5d 3b | da 10 69 6b 96 bb 32 84 4d a3 95 1d 28 1b ff 6b | 19 0c 05 ab 9e ef 24 27 d9 f0 1e 4b 16 13 1f a0 | 29 00 00 24 33 52 d4 42 b8 04 6d 4f 2e 93 5c 6b | d5 ad 27 1e 92 59 33 28 c5 ae 5c 5e 96 b6 02 6f | 79 82 8d b3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1d f0 6f ab 99 46 a7 e5 85 41 6a 05 | cc 0a dd eb 9e 21 24 a7 00 00 00 1c 00 00 40 05 | fa 0b b1 80 18 a1 01 fe 64 98 07 58 ad c1 ac 04 | 2d 72 07 f3 | libevent_free: release ptr-libevent@0x7fb340066bd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf50 | #563 spent 0.0922 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #563 connection "road-eastnet-nonat-40" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38800feb0 | handling event EVENT_RETRANSMIT for parent state #534 | start processing: state #534 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #534 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-43" #534 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-43" #534 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.235876; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.941242 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf50 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #534 | libevent_malloc: new ptr-libevent@0x7fb340066bd0 size 128 "road-eastnet-nonat-43" #534: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.43:500 to 192.1.2.23:500 (using #534) | b6 c2 42 e3 74 ca 7f 02 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5f e9 15 ad 11 6f 89 c0 a8 02 55 a1 73 88 84 f9 | 33 7b 5b 0d 0b 5b d7 57 77 b6 59 c3 92 4f 9c 81 | e6 98 a6 a1 b8 34 63 c4 08 b9 bf 0c 69 da d1 2b | 1a e8 9b 2f 98 d4 44 3b f0 73 62 cb 71 d6 64 d1 | 3a 3d f5 71 2d 7e 29 30 73 8d 8a a7 fc e0 c3 a4 | 07 15 fb 3f 7b 6d ac bf dd d0 0f d6 95 19 6d 4e | ab a0 86 9d f8 d4 b7 8e e6 1d 84 a8 cb 93 14 ec | a8 13 51 b0 91 ca a4 6a 06 06 50 7a df 97 a5 15 | 33 7b b0 2a aa 9d 49 82 99 5a 1e f8 ff 91 d1 bb | 5f 9c 20 e3 88 f9 89 5c 2d ff 2d 6c 31 e8 44 d4 | c0 96 d5 82 e9 c1 04 a4 03 63 11 8d 47 c3 ee f3 | 9c d6 e5 95 a9 a9 b4 3b 1f e3 34 6e 77 02 0b 87 | cd 18 1a ad 7e 61 e6 d2 80 d4 cd 61 09 82 cc d6 | aa 80 fe 73 e7 11 a7 12 0a 61 d0 3f 70 03 0e 25 | 0f fa b0 0b f0 75 c7 91 3d 8b 34 3c 45 ce 0a 85 | 42 34 96 d7 4e 3f d9 17 73 40 5a 4f bb a1 8b 1a | 29 00 00 24 6f d6 0a bf ca bc 9d 1e 75 5d 3f c1 | 66 5b 32 47 90 cf da b2 6c 6d a4 db de c8 e0 a3 | 3c 0a c8 8c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9b 38 48 7f 05 85 41 6a 46 8b 67 3e | 92 3f a4 69 d3 0a 9f 50 00 00 00 1c 00 00 40 05 | 9b 5d 60 63 c2 dd c6 23 03 14 4c fb 6a ee 61 48 | 2b 45 1b 9e | libevent_free: release ptr-libevent@0x7fb3500722e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38800feb0 | #534 spent 0.0954 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #534 connection "road-eastnet-nonat-43" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368025320 | handling event EVENT_RETRANSMIT for parent state #641 | start processing: state #641 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #641 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-235" #641 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-235" #641 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.235967; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.972345 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38800feb0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #641 | libevent_malloc: new ptr-libevent@0x7fb3500722e0 size 128 "road-eastnet-nonat-235" #641: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.235:500 to 192.1.2.23:500 (using #641) | 20 9c e2 59 31 cf 6e 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f8 09 b4 84 ab aa 43 89 78 34 b0 d6 e3 38 d9 6d | a2 02 c4 4c ab 4d 8a f8 0e 36 02 d1 bf 26 dc a0 | 18 35 ff 92 d6 ab 35 8b 97 0e fa 1f 06 74 86 13 | bd 4b d4 10 63 6d 50 fa d1 05 e5 b6 83 80 eb 81 | 1d c1 17 7e 74 96 70 4b 8a 7d a7 98 bf 41 d3 e4 | 53 6e 45 47 7a d5 ce ad 7c de 29 6d 1c ce bf ee | 29 ef db 71 37 1e f4 da 05 b9 c1 9e 94 b8 09 61 | 06 d2 e5 30 cb fb 00 e2 3c 1f 90 84 66 2a c9 21 | ab 1a 0e 49 5d e5 f7 c2 53 02 87 88 0a 36 0c 6d | c1 f9 c6 d4 46 2e 67 22 c6 2f 23 dd 8d d0 33 a7 | 3c c4 80 09 35 06 d4 ba c9 54 31 c0 47 e3 77 50 | fe d3 cc af 02 88 b5 3d 64 43 bb 82 7f d7 97 a8 | 8e 74 10 23 3c 82 a8 eb 61 af 8f 95 ef 01 57 91 | 74 35 ea c2 74 76 d5 21 d5 ff e2 5e 1a d1 24 e9 | 4f c4 4e 06 0e c3 35 68 7a e5 01 33 ba 0f 7b 79 | d3 d6 e7 d9 69 7d 18 4b b8 91 33 33 1e aa 41 47 | 29 00 00 24 de ff b6 ca 63 e9 cc b9 1f 7c 3e 7c | 82 6d ca 20 ea 43 fd 3c 13 8e a9 32 83 2c 0c 09 | 45 b1 6a 12 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 9f d0 71 59 b2 13 20 21 05 f4 92 89 | a6 fa df 4f c5 3e bb 18 00 00 00 1c 00 00 40 05 | da 4e b6 83 cf f5 84 c6 fa 26 59 3a 0c bf c7 47 | bc 79 7e dc | libevent_free: release ptr-libevent@0x7fb388085dd0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368025320 | #641 spent 0.0669 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #641 connection "road-eastnet-nonat-235" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb370012bf0 | handling event EVENT_RETRANSMIT for parent state #695 | start processing: state #695 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #695 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-197" #695 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-197" #695 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.236042; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.997367 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368025320 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #695 | libevent_malloc: new ptr-libevent@0x7fb388085dd0 size 128 "road-eastnet-nonat-197" #695: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.197:500 to 192.1.2.23:500 (using #695) | af 67 24 f2 d5 c7 bc 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 44 14 e7 c9 33 09 4d 36 12 f9 6d de 10 f0 e5 47 | 82 ed 23 45 d4 b6 ce 21 00 04 da b4 2f 94 b8 30 | 2f 77 2b 66 13 06 af 85 21 fd ef 57 6a 09 67 67 | 37 28 49 9e 18 7d d7 f0 08 1e d6 88 3f e7 a9 18 | cf 2f 78 55 e7 d6 fb 4b 07 4e 15 ae c6 2b 26 51 | b3 ce ba 2f 1e 38 1f 99 e6 3d 40 73 ee 22 e1 a7 | 0d 0b 8c c5 62 02 7e 56 2d 8d 6c 77 fd 6e 2e 61 | ca 7e 48 f6 cb 33 41 3b 92 87 6e 0f b5 01 01 1a | 7a 26 1b af b8 f9 1b 18 fd 42 1d d8 57 b9 99 f3 | a3 88 af 1a 40 b5 fd 9d a8 8b 9a 42 43 ee 86 63 | 13 46 c8 29 88 32 aa 0e 70 c3 98 1b 40 71 6c 44 | ab 3f 11 fc d3 58 f3 77 22 af df 25 de 81 a9 4a | 00 72 bb 64 e2 5c be f4 95 c0 21 c9 6c 9d 40 f4 | 7b 46 b5 97 b0 26 ac 1c 91 8d ac 90 5b 92 a1 ab | 78 4e 4e 35 b8 bf b8 64 4a a1 5c 4e 46 64 49 0a | 0d b6 6c 3d 6b 6f b5 91 f0 48 34 62 b9 68 a6 af | 29 00 00 24 c0 8b 5f d5 7a 97 79 40 43 e6 f6 3f | 54 f6 96 1a 49 cd f5 d4 43 9d 79 22 51 26 12 49 | 61 34 44 a2 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 8a fd 7a d7 4e 83 ac 99 9d 97 07 a9 | d5 f6 51 74 a1 c3 79 42 00 00 00 1c 00 00 40 05 | d3 52 b4 8f bd 1e ff 85 b5 5d 7c 33 8d 85 60 74 | f7 b3 c4 d9 | libevent_free: release ptr-libevent@0x7fb36406a1c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb370012bf0 | #695 spent 0.0727 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #695 connection "road-eastnet-nonat-197" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a70b10 | handling event EVENT_RETRANSMIT for parent state #664 | start processing: state #664 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #664 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-123" #664 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-123" #664 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.236129; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.982061 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb370012bf0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #664 | libevent_malloc: new ptr-libevent@0x7fb36406a1c0 size 128 "road-eastnet-nonat-123" #664: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.123:500 to 192.1.2.23:500 (using #664) | 9a a8 29 98 c3 de 5a 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a d8 e3 37 12 b2 ef d1 da f8 45 1f e4 d1 c2 83 | bd a0 b4 7d 46 7a 1d 21 e7 39 76 71 00 55 ce 6f | f0 be cb 41 93 48 b1 e6 9b a0 dc 26 bf 39 0e 5e | e2 b9 8f 3d 51 d2 55 33 8b 98 1f 57 b7 08 6b 49 | 47 a3 42 1c c7 26 45 fd 43 8f 8a e4 32 11 da b4 | 60 41 cc d6 cb 7c cf 3c cf 62 25 19 cb 5f 50 b0 | 66 1f 87 29 8a 25 50 d2 76 81 60 2d c0 1a fa e4 | 44 6f 51 82 a1 8e 22 65 3d c7 77 00 d7 5d 66 3b | 34 e2 14 f5 00 89 95 83 41 4f 2f 17 fd 8a d0 82 | f4 75 70 eb 12 8d 3f e0 49 82 73 ea 26 fb 10 63 | 49 47 94 a5 80 94 4f 74 c7 e2 49 81 51 fe 91 b7 | ae a2 9c 0f 74 e3 9e 7c d9 1b 46 f6 50 85 9b 34 | 44 96 a8 da 7c 30 fa 27 4e 96 53 c6 da 8d 0b 8d | cd 2a 37 df f6 0b 7f d5 79 cf a5 8a 18 bf 15 d7 | 2b 16 dc 57 cd 3e 9a b4 b1 6c bf 76 41 2e dd 85 | 20 be 9a b5 82 7e bd 21 3e d7 a0 f1 0d c4 17 21 | 29 00 00 24 8d 10 93 7b d2 8b c4 8f 3e a4 09 2d | 41 e1 82 de 20 3b ef 97 ec 41 fd bf 52 be eb a2 | 8c 94 3b 60 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c7 9d a1 e9 3f f2 d8 36 8a db 54 8a | 88 a2 97 6f 50 ce f2 f2 00 00 00 1c 00 00 40 05 | 52 96 33 a1 e3 08 31 cd ae c8 55 ef af 0a fa 55 | 48 74 e2 3c | libevent_free: release ptr-libevent@0x7fb3600778c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b10 | #664 spent 0.064 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #664 connection "road-eastnet-nonat-123" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34001fa80 | handling event EVENT_RETRANSMIT for parent state #564 | start processing: state #564 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #564 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-44" #564 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-44" #564 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.236202; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.95629 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #564 | libevent_malloc: new ptr-libevent@0x7fb3600778c0 size 128 "road-eastnet-nonat-44" #564: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.44:500 to 192.1.2.23:500 (using #564) | 2f d3 42 a8 8e fb 16 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 57 dc e5 0e c5 b3 5a a5 b1 00 4b 67 ff 85 46 | b8 62 d6 0c 0d 31 23 f0 15 92 2b d6 8c 7c a9 f2 | d6 dd b2 f6 df 09 a2 a7 d4 4c f5 c8 47 54 16 76 | 5a 58 cf d1 ec 54 b5 fc 7d 31 6f bf 81 02 c0 98 | 73 35 4a 40 a8 af 1c 13 3b cd 5e 84 ea 44 ca 69 | 54 c0 3d 20 b4 71 ba 13 dc 34 f4 0e 7c b2 aa b8 | c4 a9 b5 15 a4 bd b0 a0 2f 7e 8e 8d 90 c4 a1 53 | 64 09 3f f1 29 9d e6 14 4e 06 d3 b9 04 6d 85 e2 | 8e d3 43 4f a5 d9 1f f9 90 f5 65 41 52 ea a0 85 | a6 74 7a 70 9b f9 1a 1b c9 8d 45 01 fd 6f 0b c5 | 33 01 ed 92 72 46 2e ff 55 83 2c 71 1d ed cc d4 | 98 ca f9 5a 85 34 6f be 44 21 e9 c6 d9 23 68 35 | 49 8d 06 e2 b6 a8 ec 04 67 19 6a 25 85 e7 25 a3 | 44 d2 a7 dc e7 13 d5 3e e1 f8 5a 22 0f ba d0 2d | 6f ea 9c 6f 17 1b d4 89 ec ee fc f7 ec b2 46 89 | 2d c5 51 79 e6 ba bb f3 15 62 72 06 39 13 5f b6 | 29 00 00 24 96 1c e1 0c 7f e5 9c 1d 77 d9 4f 7d | 4d 47 9e 2d d0 89 bb 2a 04 e6 2e 94 ae 57 6c 89 | bf 1f de 2e 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f6 46 11 5f cd 69 00 3f 80 ae 94 cd | 27 23 87 c3 ca 0f c2 84 00 00 00 1c 00 00 40 05 | 00 5b e6 68 40 1a 8f cb 1f 47 b5 45 fe a7 9d c2 | 49 00 ab ac | libevent_free: release ptr-libevent@0x7fb36c05f200 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34001fa80 | #564 spent 0.0655 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #564 connection "road-eastnet-nonat-44" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38400a290 | handling event EVENT_RETRANSMIT for parent state #608 | start processing: state #608 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #608 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-60" #608 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-60" #608 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.236274; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.967436 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34001fa80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #608 | libevent_malloc: new ptr-libevent@0x7fb36c05f200 size 128 "road-eastnet-nonat-60" #608: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.60:500 to 192.1.2.23:500 (using #608) | 0c 40 8a ba c0 95 22 c9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d0 ac 32 20 e6 f2 f3 72 0a ac 9e a1 c0 7e d1 9c | ba 7d 04 0a 67 49 79 19 1b b3 e4 99 5c 8a 7f 51 | 2f 8a 06 ea 31 95 52 fd e6 c3 f7 54 3b b3 9d 31 | 27 18 b7 a2 0b 76 60 35 d5 3e 6c b2 60 48 f8 98 | bb 1c 43 2e ba 94 47 ae 1e 5d 46 a4 a9 be fc b5 | 9f 5c 2e 2b 32 a1 9d 84 73 52 7b 19 0f 87 44 ee | 2c c7 e0 19 73 47 89 45 a9 59 4b d7 0d 9f 39 05 | f3 7b a7 83 81 66 77 f6 57 d5 e3 c0 d5 84 80 f9 | ee be 18 01 e0 bf f6 46 34 fe af a5 cd 63 66 6b | de d7 56 46 3a 36 e4 5e 22 bf 64 7d 8c e2 2d 47 | 9e 04 cc 8d 7f d9 cb 06 83 4a e3 29 55 cd 8d 42 | e9 49 18 56 c5 a1 65 6c ca 69 c5 84 07 6d b0 58 | 2f 95 59 6a b7 c6 f7 02 21 d7 08 bc 5d 1a b0 ee | 67 fb 57 c8 f3 65 46 50 18 bb ad 85 2c fd a4 7a | 1f 49 86 f5 1e 9f f2 f1 74 80 e2 0f c0 52 94 90 | 6d 49 de 10 9d c0 e3 1a d8 90 bc 82 30 91 d0 23 | 29 00 00 24 18 87 a4 c8 cf 5c 93 83 68 9d 68 8a | 28 36 66 32 92 60 4e 85 d6 0c 91 d5 ef 20 18 75 | 65 13 ec f8 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 3e bf 02 dd 26 3f 8a eb 4d 3f 2a d7 | 62 d7 7d e3 99 e0 e7 0a 00 00 00 1c 00 00 40 05 | 1c 98 9d 66 2f 94 1b 4c 60 05 a1 e4 50 37 22 f7 | bd 66 62 87 | libevent_free: release ptr-libevent@0x7fb35005ec80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38400a290 | #608 spent 0.065 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #608 connection "road-eastnet-nonat-60" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34401d710 | handling event EVENT_RETRANSMIT for parent state #536 | start processing: state #536 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #536 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-122" #536 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-122" #536 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.236347; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.938171 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38400a290 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #536 | libevent_malloc: new ptr-libevent@0x7fb35005ec80 size 128 "road-eastnet-nonat-122" #536: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.122:500 to 192.1.2.23:500 (using #536) | cd 74 01 a2 39 d6 cc 4a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 53 a9 5f 47 01 bf 55 fc bd 36 63 8b 4d da a2 32 | 98 7c 8f 8d a5 10 38 4c bb 7b c0 1e 62 5a 95 3c | ab 87 bd b0 4f 05 a5 81 6d 16 fb ef 76 e7 c1 2e | 30 1a b2 78 2f 5b bb 53 da 79 ff c6 de 33 c0 9b | 96 0d 48 b4 64 0a a9 01 2d 4a d0 58 00 bb 3c 5a | b8 df 75 ac 56 24 ea 3b e4 71 b8 47 a2 58 0d 3b | 32 c1 40 67 d0 eb 20 07 a9 b4 43 31 fd 92 e2 d3 | 5e 9d 2b 29 57 37 d7 12 6b 8f 10 a0 9d 51 1a 5e | 59 dd 2a 2e bf c4 30 ee 1c 21 a4 1f 05 1c f1 ca | e9 cb 39 c8 e2 40 b2 4d 3b a4 95 5b bf 34 0a 3a | df 80 38 7b 51 86 8c a1 11 39 77 8b d5 ae 50 8f | 99 a1 0a e0 bd 3f 7e c9 79 53 04 c1 e3 df cd 70 | 3e 66 c4 67 c1 e4 73 dd bf 1e f4 11 d7 82 43 b1 | 95 c0 67 ed 01 5f 2c b1 0e a8 b7 86 5e a3 ac 38 | d4 97 88 0a b4 b8 8a a9 70 ef 6a 55 78 38 3e 25 | 5b 0e aa fc 57 7c 94 10 43 b3 19 df 16 34 03 61 | 29 00 00 24 13 0a a1 55 e1 40 3c ca 6b 43 9b 8e | d8 49 6d 03 c7 22 e9 d4 6e 01 14 b8 c6 77 b4 61 | 5d 3f ba 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7b c5 c3 84 79 53 11 43 e1 cc 1f 7c | 14 ba b0 c9 4b e7 b4 37 00 00 00 1c 00 00 40 05 | 57 c6 83 93 fa f0 1e 53 76 4a bb b4 87 ee 28 a4 | 6c 5a d1 2c | libevent_free: release ptr-libevent@0x7fb3640960c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34401d710 | #536 spent 0.0648 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #536 connection "road-eastnet-nonat-122" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3700407b0 | handling event EVENT_RETRANSMIT for parent state #640 | start processing: state #640 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #640 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-200" #640 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-200" #640 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.23642; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.969937 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34401d710 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #640 | libevent_malloc: new ptr-libevent@0x7fb3640960c0 size 128 "road-eastnet-nonat-200" #640: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.200:500 to 192.1.2.23:500 (using #640) | f6 a6 42 61 47 27 64 b2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d8 80 42 6e d7 7a 98 1b e7 63 e1 2e 09 63 bd 4b | 42 e8 81 2f 40 d2 71 01 4a dc 7a af 17 d1 73 0a | 05 3b 3a ce b3 5d 7f 07 44 b9 ac 40 bd 6f 70 e0 | 38 56 e8 ab be 45 c9 63 98 bc 74 58 74 89 72 8a | 13 32 c2 ca 9d 72 be 69 88 7f a2 d0 28 52 16 b0 | 31 15 8e 9f e5 63 61 e6 1c 3b 95 d5 65 9e 4a fe | 1d 24 21 96 2c 5c 93 59 10 e8 5a a8 85 f0 10 e7 | 2b 45 5a 9a c7 e2 d8 dd cf ae 48 a2 5b 7d d5 31 | 5b 11 70 8a 8c fd 1e 06 e6 9d f7 60 5a ec 36 27 | de b1 f3 c3 0b 31 8f ba 37 d6 eb 27 bb 08 95 f5 | 50 60 61 71 06 90 ab 76 57 63 08 97 67 3d 78 5e | cd 6f 6c 41 fc b6 78 36 36 0e ed 0d 70 0b 31 b2 | fa dd a9 a2 95 f8 f1 ba 5b 88 71 81 da 2c 38 d3 | ad 78 62 1e ef 32 b4 3f 99 ce e3 5b 67 a3 08 06 | ca c6 2b 08 09 1b 2a 0e 74 6f e2 ad 35 3b fe 99 | 10 20 b2 e9 6c e4 a0 0e d2 0a d9 68 bf 4e 9b 89 | 29 00 00 24 55 c2 55 4a 4f 3a 0d 38 f2 68 61 3a | 55 3a 39 15 fe 86 62 ee bc 23 58 c2 1a 6c b1 1b | 30 e0 3a 34 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 47 0f 0c 07 b2 8c 99 66 34 29 66 | 06 93 b3 bc 11 9f 8e 62 00 00 00 1c 00 00 40 05 | 2b 37 ed c1 9f 60 69 a1 71 7c 68 0d 9b ee 86 23 | 55 71 c1 26 | libevent_free: release ptr-libevent@0x7fb35c069bc0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3700407b0 | #640 spent 0.0633 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #640 connection "road-eastnet-nonat-200" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad5900 | handling event EVENT_RETRANSMIT for parent state #519 | start processing: state #519 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #519 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-68" #519 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-68" #519 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.236491; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.938953 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3700407b0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #519 | libevent_malloc: new ptr-libevent@0x7fb35c069bc0 size 128 "road-eastnet-nonat-68" #519: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.68:500 to 192.1.2.23:500 (using #519) | 36 74 88 6c 2b d4 65 97 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 6d 80 4d e8 d2 d9 23 a3 00 9b f7 df 4f fc c6 6e | 72 0a d6 44 83 97 e4 01 17 c9 8e 18 c2 f3 5d 0b | 06 e3 14 e4 8b dd 35 55 be 4b 2f 8b ab e3 cf ff | 80 24 c8 41 ad a4 91 74 f3 18 71 24 3e 71 ce 42 | 5e 86 bd 65 21 12 dd cb 90 44 9b 3a 9f 20 2e a7 | d0 3f dc 7c b1 53 17 2a e7 d3 a1 43 19 60 0c 5d | a4 8c 8d 56 2a 15 54 29 6b e8 1d 43 3b 4c 9f 9b | 9c 1c e3 58 55 dd 85 2d 50 d0 5a 79 9c 2c 40 b9 | e9 42 08 b9 54 2a 23 6a ed 77 99 24 5b c3 76 38 | a0 98 ca 43 c3 7c c7 63 5d d3 19 75 86 36 2c ee | b6 7d da ed 30 f6 cc b6 4d dc 14 16 ea be cf c9 | 4b 9d 75 9b 36 af 1d fd e9 19 95 e5 30 f3 fb 99 | c9 3b 35 b0 77 0a 08 c3 17 b0 a5 ed 7e a1 52 ee | 73 a2 4a 26 9d 1c 04 4f b7 86 f3 0e 1b 4b 3b 2a | da 3b 8c 88 8e 0d 68 63 4d 3f 3d f1 f7 54 db 7c | 16 d8 87 45 15 1c 36 83 91 f6 d9 2e c6 69 c8 c7 | 29 00 00 24 1f 89 a0 a9 be ce 4e ea ec c0 43 e0 | 93 cd cd c6 83 c2 c6 69 70 37 da db 02 17 df 46 | c3 38 aa 03 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 d5 b0 da 44 b0 25 b8 4b 8c 5b 4c 67 | 69 d1 51 09 6e 53 b8 b5 00 00 00 1c 00 00 40 05 | 80 05 b4 13 38 cb 24 03 e0 02 b7 5d 8d 12 3d 6f | e6 28 68 a9 | libevent_free: release ptr-libevent@0x7fb35c0902e0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad5900 | #519 spent 0.0654 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #519 connection "road-eastnet-nonat-68" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37802a9a0 | handling event EVENT_RETRANSMIT for parent state #584 | start processing: state #584 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #584 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-108" #584 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-108" #584 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.236565; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.968186 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad5900 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #584 | libevent_malloc: new ptr-libevent@0x7fb35c0902e0 size 128 "road-eastnet-nonat-108" #584: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.108:500 to 192.1.2.23:500 (using #584) | 51 4c b1 7c 25 ce f5 b6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 37 ef 1f 70 eb 76 7d bc c3 86 b2 99 57 eb 3f 54 | c8 7d d3 aa 36 79 bf 95 d1 7e f5 bb 68 ed 90 a1 | b9 2c 9e 6e a8 b6 35 e4 01 68 b8 41 06 98 3e 9c | d6 35 04 2b bb 27 bd c4 b6 ed 89 cf f7 c6 f3 c2 | 46 86 3a 37 38 db cf 96 97 e5 a4 50 07 54 e9 4b | 37 df 7c f4 a0 4c d9 7b e1 63 0f 4a 78 e1 d1 d8 | f7 06 cc bf de 67 6f 51 a9 2a 50 9b be 39 51 fc | 92 f3 11 84 91 d8 2b 24 5f 7d 2e 3c 48 87 2c d7 | 4c 9f 31 94 b4 2c e3 04 55 03 e2 7e d5 0a a3 2a | 38 e1 ee e0 a2 7f 56 ba 3e dc 86 f1 a3 6d f0 4d | 52 ba bb 1e 97 ae 75 5d 2c 82 b4 e6 d4 79 e0 32 | 52 cc 28 d9 ea 8b 53 a2 dc 14 d3 22 02 06 5a 89 | 92 c4 13 41 83 c4 64 e9 4c ab fb fe 2b d8 3b e7 | 19 97 67 99 c8 cc 38 fe fd dd 6a ac 4b 3e a4 60 | cb ea 73 88 45 a4 60 2f a9 da 99 e9 bc 21 52 56 | 9e 0a 57 2a a8 8f 00 83 ca de 2c ec 2e 21 e3 03 | 29 00 00 24 a2 77 dc 4f a0 fc 59 33 be 45 2b 9d | d6 90 d3 11 73 91 28 fa 52 9a 31 01 01 35 6b b2 | c2 9a 45 77 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ac ee 1f 66 e6 d8 10 e7 e1 61 3e ce | 6a b8 0c f1 92 f2 95 18 00 00 00 1c 00 00 40 05 | 4c ae 03 75 52 09 7f 6a 63 67 68 3c 65 3b 7c 67 | 85 33 51 c7 | libevent_free: release ptr-libevent@0x7fb3640a1080 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | #584 spent 0.0675 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #584 connection "road-eastnet-nonat-108" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35c018460 | handling event EVENT_RETRANSMIT for parent state #714 | start processing: state #714 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #714 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-160" #714 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-160" #714 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.236641; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.008439 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37802a9a0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #714 | libevent_malloc: new ptr-libevent@0x7fb3640a1080 size 128 "road-eastnet-nonat-160" #714: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.160:500 to 192.1.2.23:500 (using #714) | 93 98 4a 9e f6 25 19 e8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de a8 26 1d 46 1f fe 73 77 0b f1 18 a1 80 90 25 | b3 e7 bb 58 9b c2 81 b1 ff 7d b4 22 75 35 d1 db | 95 9e 84 cb 19 62 62 9a 6c 7d d1 72 a1 fe db ee | 7d a2 91 96 e9 9b 41 e3 91 6e fa 9f 40 d9 46 29 | f7 36 a8 4e 69 27 c4 25 e9 34 b9 04 e1 c7 31 18 | 0b 28 87 c1 77 45 e4 46 53 25 13 33 a7 ac 03 53 | c9 3c 72 4e 74 60 e7 39 94 56 62 6d ee b9 d3 02 | 2a 0c 9a 32 f0 7c cb e2 48 4b 2d 51 c1 e5 58 8b | a8 23 c6 2c 51 52 24 80 0d 7d cc 16 3e 31 9e e6 | 71 52 28 2d b4 b4 3b 62 62 b3 21 2f 59 e6 9d 79 | f7 29 e4 95 de 3d 39 1a 26 63 23 12 ff c0 0a 67 | e7 ee f9 dc 2e f8 9f 5e 66 07 d9 34 2c d6 a4 14 | 99 5a 46 67 f6 74 4b 45 d5 08 b5 1e f0 a5 28 bb | ba 71 8c ef 8d 60 fe 98 e8 fa 14 ba 36 d2 6c 68 | 4f b0 d8 bf 4e 35 1f 41 60 59 db 50 3c 98 8a ba | 0e 23 2e 71 e9 de a7 37 01 ea 4e a2 5e 17 dc 44 | 29 00 00 24 6f 09 61 08 e7 d3 02 a4 23 8b ad 3f | 96 41 5b f2 f4 31 31 36 dc f8 65 88 dd f7 ab 3a | d1 d6 75 ec 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 01 ff 9b ec fc 4c 87 67 ce 20 05 7e | da 19 49 e3 4c 6c 24 de 00 00 00 1c 00 00 40 05 | b1 01 34 da ed 80 ef f8 48 f4 33 a8 8a cf 0d 3f | 2f b5 1c 31 | libevent_free: release ptr-libevent@0x7fb34005bbe0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35c018460 | #714 spent 0.0638 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #714 connection "road-eastnet-nonat-160" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb384043260 | handling event EVENT_RETRANSMIT for parent state #628 | start processing: state #628 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #628 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-144" #628 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-144" #628 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.236714; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.96457 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35c018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #628 | libevent_malloc: new ptr-libevent@0x7fb34005bbe0 size 128 "road-eastnet-nonat-144" #628: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.144:500 to 192.1.2.23:500 (using #628) | 95 d4 94 96 e1 1d ee 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7f a8 7c 62 17 42 5a ce 42 3d 33 10 fe b2 8a 88 | 92 6e 71 d5 06 86 e5 e0 52 42 37 96 48 d9 83 04 | b7 53 69 af a5 e3 7c 5f c2 d6 49 92 b2 ff de 4c | db ed 7f de 57 21 99 44 40 b6 62 ee 10 52 80 d1 | 26 5f f1 59 44 03 5f 7b f9 65 35 c7 ca 59 14 41 | 66 d5 8f 67 2a 79 18 69 6e a9 93 bc a1 d2 56 44 | d5 a9 00 22 f4 be 24 66 17 90 eb 2f 6c 5b e9 e6 | 01 36 c7 01 8d be 88 5c 2e 67 73 6a 1a 0e cd 08 | 4f 7b 9d 2f 56 a8 13 ed e5 f5 79 24 e3 d4 7e ff | 39 52 47 37 cf c9 b9 cf 2b 76 1e 42 6a 40 6c a9 | d2 de bc b5 5e 46 c7 25 f7 aa 04 2e 75 05 36 b0 | fc bb ae 91 9d b4 fd 45 a8 76 c1 47 2f 9f 74 68 | d6 62 93 ed b4 f8 e1 d4 e2 dc 95 99 70 b3 6e 18 | 5d 8d 13 ec c3 76 44 10 13 a4 af e0 0e 36 d3 4d | 5f 8f ac 78 e4 0b 75 55 f3 aa 1e f1 06 83 57 e9 | 0f fa 63 a2 f0 49 65 dc 20 79 d0 e9 01 99 ce 92 | 29 00 00 24 ef 3d 18 f0 17 d1 14 e0 14 e9 24 e7 | 2b c4 61 c2 92 c3 eb 7a 8f 6c 14 1b 08 5d cd 09 | ea ad df c9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f8 2e b7 bf 2f 19 c5 96 59 16 43 08 | f3 7e 3e 9d 86 2f 58 f5 00 00 00 1c 00 00 40 05 | 25 ae 0e 0b 51 c2 48 e1 f1 ba 50 01 f1 19 07 79 | b9 de b0 4d | libevent_free: release ptr-libevent@0x7fb338069f70 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384043260 | #628 spent 0.0653 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #628 connection "road-eastnet-nonat-144" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c01d710 | handling event EVENT_RETRANSMIT for parent state #596 | start processing: state #596 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #596 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-66" #596 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-66" #596 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.236786; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.962349 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384043260 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #596 | libevent_malloc: new ptr-libevent@0x7fb338069f70 size 128 "road-eastnet-nonat-66" #596: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.66:500 to 192.1.2.23:500 (using #596) | bf 80 0e 78 80 27 80 d5 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 1c 1f ba 68 b5 93 5e 04 79 06 b6 a4 32 e4 68 c6 | 49 40 88 2b 6f 8a c0 9d d9 bc c8 ed 82 28 3c 30 | 4b 6f b2 e3 a8 0d d7 81 63 5c 83 35 fb 65 99 22 | ec b9 c7 f6 a3 1e 0c af 7e 02 44 4c 52 41 61 0c | fe ec b7 48 f0 10 1f 47 9e bc cb f0 0f ec 73 f6 | bf b9 40 d5 39 e3 19 17 5e 22 2d 36 42 33 d5 3a | 1c 03 6f c7 3e d1 3d c3 8f b4 e7 6b 4d ea f9 60 | 41 83 37 ed 6a c3 22 14 77 3f db 39 0c 56 20 64 | 8a 20 ec f2 4b 2b 90 2e 8c 2a 53 89 b4 6a 1f 42 | f3 7e f2 d4 fe 7b 90 df c9 c6 1b 36 f4 b5 4a ce | 0e df 7b 16 66 bc e8 11 d0 0b 0f dc e2 39 28 97 | 4c 94 b9 9e 35 c6 e9 df 5c 0c 47 78 05 93 ac c5 | c4 71 dd af e6 5f df 44 80 d0 10 16 32 6a 91 64 | 98 ef e2 0e ce a7 57 85 68 b2 6e d9 b5 77 88 45 | 6c 4d 65 cf 3b 08 9f b7 f8 9f 35 9c 9d df 1f 59 | e7 b7 04 7d ff 8a de 2a 68 53 fb 71 b7 5d ca 93 | 29 00 00 24 1e d8 84 c9 73 9e cb 5e 05 66 de 35 | 14 40 e8 eb 0f 43 29 df 2b 1e 3c 7f 1a d8 5a b9 | 16 e8 fe 9a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 33 20 82 d1 8b 7a 7b 4b 2f 8d 5b 47 | cd 08 2a ee bf 4a 9d 5d 00 00 00 1c 00 00 40 05 | 15 0d ca c2 1e 7e 24 48 29 6a 67 0e 8c c8 30 24 | 05 f8 a5 d3 | libevent_free: release ptr-libevent@0x7fb3800598f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c01d710 | #596 spent 0.065 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #596 connection "road-eastnet-nonat-66" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34401fda0 | handling event EVENT_RETRANSMIT for parent state #531 | start processing: state #531 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #531 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-92" #531 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-92" #531 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.23686; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.937722 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c01d710 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #531 | libevent_malloc: new ptr-libevent@0x7fb3800598f0 size 128 "road-eastnet-nonat-92" #531: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.92:500 to 192.1.2.23:500 (using #531) | 46 30 94 4a d2 7d f5 c4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 38 ea 3c 3d 5a 42 86 1f 4e 31 dc 26 b4 cb f3 | 28 85 08 ca 2d 95 b0 12 2a fa 18 5b b7 00 b1 7c | bd ff a5 7b 29 c2 33 47 c9 ef 86 d0 13 ba b4 66 | 86 47 b1 11 77 85 ec f5 b7 bc b1 c7 50 d2 1f ca | 94 86 67 69 97 69 09 d4 54 be 95 8a aa ec f2 d3 | 79 b9 f0 64 6c cf a3 3a 0e 4f 10 b3 95 d7 ac 93 | 35 e1 6d cf bd f0 36 31 3d 33 d3 c9 48 4d fe d0 | f1 f6 04 1f ec c5 c6 c2 db 2b ec 57 12 79 39 c3 | 5f ad df 37 fa 08 25 42 22 56 51 36 31 ec 60 0f | ac 91 d0 f7 eb 31 60 3a a8 71 8a b0 59 db 4b f5 | 2d 2b f9 1e 60 7c 79 92 10 60 1f 4d 62 ac de 57 | e1 25 69 68 c7 c9 81 de 74 38 95 72 70 59 28 ad | 3f 83 40 72 25 b0 05 47 0c a8 76 76 31 4f d7 5e | 97 3f 8e 62 12 fb f1 8b 94 b6 25 12 87 f7 a7 1d | 64 44 48 fb f6 a4 1d b5 63 08 35 5b 60 e5 2f 9a | 58 b0 a6 c2 fe 47 0b c1 2e a5 79 86 6f de 86 14 | 29 00 00 24 59 be 45 ef 88 7c 4d 7b b5 b9 64 5e | f3 45 90 92 62 65 99 56 86 22 51 1b b2 80 99 5a | ab 91 ed e4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1b 80 99 5e ac e8 cb fd 27 87 08 89 | 9e ad 1b cc fa 6f da 1b 00 00 00 1c 00 00 40 05 | c1 9e 01 05 8a 2a ce 70 93 29 c8 42 f8 2d b1 4a | bb 93 ae c6 | libevent_free: release ptr-libevent@0x7fb34404e800 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34401fda0 | #531 spent 0.0655 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #531 connection "road-eastnet-nonat-92" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b05240 | handling event EVENT_RETRANSMIT for parent state #556 | start processing: state #556 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #556 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-79" #556 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-79" #556 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.236933; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.939096 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34401fda0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #556 | libevent_malloc: new ptr-libevent@0x7fb34404e800 size 128 "road-eastnet-nonat-79" #556: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.79:500 to 192.1.2.23:500 (using #556) | 7f e0 6f 00 84 26 56 77 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | de 15 78 aa 6e e9 58 38 6b 46 1e a0 52 bc 83 d3 | cf 3c 33 de 82 b7 42 a2 2c 21 00 a9 3e 75 eb cd | 10 be b3 c4 82 43 d9 1a af 89 42 df 94 04 7c 60 | 14 3d 7a dd 5f 47 e2 da 24 89 04 06 b4 36 fd d6 | b5 de d2 50 15 a7 a8 36 fa 6f 62 cd 03 73 82 57 | 6a cf 7d e2 0e 29 5a 1b 2a 8a 28 af 96 29 bc 69 | 1a 81 07 d6 ad 61 0f 8a 27 b7 1d 98 f7 93 91 2d | 0d 00 d6 3c 6b ad 6c 9d db ce 11 c2 cc b5 ef e2 | 57 1f 51 2d aa d2 48 9a c3 ef 55 ad d5 6b 90 71 | 43 d7 9d 6a df a5 c6 3e 0b 53 aa ee 23 1e 88 a7 | 88 a5 c2 c5 7d 46 94 a3 b8 f3 c0 22 9f 4e 9c 57 | 20 38 e3 e1 74 97 33 b0 6b 37 ab 55 e4 6b 7f 66 | bc ea 73 65 26 88 f8 d8 07 69 6b 02 07 00 f0 e0 | 04 4e 23 72 d8 dd 96 e9 45 8d c7 f5 0d 29 06 22 | 84 bf e8 45 e1 63 1f c4 d6 f5 dd 33 b2 91 28 59 | 36 36 33 ab a5 81 cd 66 0a 4b 61 b1 5a f0 48 ea | 29 00 00 24 bb f0 c0 c8 4a 3c 83 ba 45 ba d1 f4 | 34 ae de c1 b8 04 dc 84 16 78 e1 c2 d3 f7 29 e4 | 68 26 70 31 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f7 84 b1 fb 5f 89 80 45 53 1d b4 39 | 35 8e 65 a4 f5 45 9d 15 00 00 00 1c 00 00 40 05 | 5d 5c c0 4e dd d9 8e 7f 9a e0 e2 3a 80 a4 20 4e | 23 e0 ef b5 | libevent_free: release ptr-libevent@0x7fb3540647c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b05240 | #556 spent 0.0633 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #556 connection "road-eastnet-nonat-79" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46abe780 | handling event EVENT_RETRANSMIT for parent state #591 | start processing: state #591 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #591 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-4" #591 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-4" #591 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.237005; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.963485 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b05240 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #591 | libevent_malloc: new ptr-libevent@0x7fb3540647c0 size 128 "road-eastnet-nonat-4" #591: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.4:500 to 192.1.2.23:500 (using #591) | 39 b3 48 76 36 79 c8 c8 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 53 5e 8b 64 b9 d7 96 a2 1b 6a 63 75 d7 45 6e | 48 c4 46 eb 28 75 5e f7 ed 53 29 79 34 d4 d9 29 | 02 a5 32 60 5b ab 4f df 45 bd 95 46 90 03 ef f5 | ac db f4 fa d3 e6 26 09 6f 6a c9 87 25 cf 58 ee | ad d3 59 ca 2b 7a 8d ad c4 25 ee 9e 4f af ad 86 | d1 6a 16 30 39 cf 7c 62 83 49 21 82 42 1d 36 20 | 76 98 ff ea 9a 86 5a 8b 11 66 3a 24 b9 6b 76 c0 | 35 10 36 e5 7e d1 0b bc 77 9c 0f 5a 4b 5b 83 fb | 8a 34 bd 69 b1 83 bc 02 8c 52 8a 7a 9a 37 ff 74 | 9c 9b a2 16 a4 04 bd c3 ce 15 56 fe 49 fe 9a 67 | a2 82 10 83 18 d7 84 55 d8 28 d3 5f e0 e8 98 f9 | 81 4a 40 28 8e ad bb d3 fb 65 1b 2e 9e 89 76 02 | ac ff 53 1c ae 39 56 f6 49 c6 01 53 51 d7 b4 78 | 4c fc d4 a9 d7 40 5e 3d 8b c2 c2 3f be e8 7f 56 | f5 bf 7e 5c e0 2b 2b 15 e0 0b ce 31 42 b4 2e b1 | 10 3a 57 61 53 b6 64 5e 01 7e ec 80 4e b8 dd f6 | 29 00 00 24 7e 65 18 45 e0 bd ae a4 9b b7 1f 7e | 50 e9 89 74 0f 3a fb 42 e4 b1 ea 44 24 bf e7 f2 | 99 e4 e9 9c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 1c 75 97 23 fe e8 31 c4 e6 0a d5 b5 | 9a 0f 0f 77 98 14 56 07 00 00 00 1c 00 00 40 05 | 51 a7 2c 19 bc 86 01 ef e8 30 63 e0 d2 c5 4d cb | 68 30 7a e4 | libevent_free: release ptr-libevent@0x7fb380080010 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abe780 | #591 spent 0.0715 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #591 connection "road-eastnet-nonat-4" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36400cc10 | handling event EVENT_RETRANSMIT for parent state #653 | start processing: state #653 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #653 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-58" #653 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-58" #653 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.237088; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.977971 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abe780 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #653 | libevent_malloc: new ptr-libevent@0x7fb380080010 size 128 "road-eastnet-nonat-58" #653: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.58:500 to 192.1.2.23:500 (using #653) | 19 90 a9 40 6e 35 eb 8e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | cc a0 df ea dc 81 2e 85 84 b3 88 d1 54 50 1f b7 | c9 69 78 56 a1 62 6e 3e 83 05 4c c5 0e 7d 43 19 | 8c 06 52 c2 a8 47 39 7d 94 80 f0 24 21 75 9e 6f | 1a c9 4d 5f cb 04 6f 4e 48 25 b0 ee c9 3a 49 af | 9d 29 53 80 25 fe 82 fa ab e2 2f 9c a5 c4 60 41 | 00 8e d7 94 37 d0 f2 cc f3 8f c9 88 17 25 4b 93 | 4f 2c 01 16 89 ef 44 27 0f 7f bd d6 c8 39 c0 0d | 3b 37 3e 31 8d f1 93 95 ef a9 f2 83 75 f5 e9 66 | df 0e 5e 66 f8 be ce 8f 89 2d f8 24 18 90 ca 0e | ca 2a 03 0e df 25 3b 31 01 c2 15 74 75 2a d5 f1 | 83 43 31 31 83 fe 2a 23 9a bf 63 a0 48 cf 76 6d | 70 1e 06 b5 a1 3f ca 5e e8 cf fd 49 e7 27 8b f5 | e3 c3 9b ac 46 ce 1a c3 b0 62 c4 bf 3b 39 e9 ac | 0a 86 26 cd 41 dc 9e 57 6d e5 3f d5 e0 0e 0d 43 | 19 a5 50 e0 89 79 ac da 12 c8 36 b4 26 48 75 fe | 11 60 3a e4 7f 85 fb 66 94 49 d3 0e e3 76 01 2f | 29 00 00 24 54 ec 9e 13 c5 d8 7a ef 3a 76 6b b5 | 4a b4 c9 12 a6 ab f3 2b 6b be 93 f7 34 95 e6 4e | 7f d1 e9 a3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 34 79 56 04 65 8f 33 45 00 ea 05 99 | f8 b0 1e db ca 41 9d cc 00 00 00 1c 00 00 40 05 | 8e 15 0a 12 2a bb 30 1b c7 7c 01 c4 0d 46 64 bd | fa 92 a2 23 | libevent_free: release ptr-libevent@0x7fb35c074b80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36400cc10 | #653 spent 0.0679 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #653 connection "road-eastnet-nonat-58" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36004b8a0 | handling event EVENT_RETRANSMIT for parent state #619 | start processing: state #619 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #619 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-164" #619 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-164" #619 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.237163; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.96597 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36400cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #619 | libevent_malloc: new ptr-libevent@0x7fb35c074b80 size 128 "road-eastnet-nonat-164" #619: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.164:500 to 192.1.2.23:500 (using #619) | 7c a6 d3 cf 8d e9 6e 5d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3b 41 3d c8 48 51 1a bc 89 19 53 5f a4 19 24 c3 | e3 0b 4a e3 0f 42 45 a6 39 c6 57 d2 6b e7 8a 29 | 54 31 b8 5a 5e ca 20 13 3b 27 d0 a6 e9 27 50 18 | 7f 80 b0 08 d7 99 89 6a 2a 77 90 5c 01 59 bf 6e | a3 42 cd 3d fe 3f 1b b7 a2 59 73 50 4f f0 85 2f | 5b 47 ed 6a c9 c2 de c6 e6 4d 9c 06 4e 79 b3 57 | 16 0b 0c 18 cb 8c 87 3a 4d 2d e4 5d 7e 8e 72 e6 | 03 86 34 5a 38 e7 8f f4 c8 0e 9c 94 be d8 f8 e2 | ef 60 76 3a 11 35 bb 0b 5b bc 7b 30 30 31 76 fe | 82 33 53 86 f3 ab 66 6a c5 76 fc cd d7 c6 d4 81 | da 77 52 29 6c 0d 3b 27 bc ea 05 ef 9f 7f 24 4a | f2 92 aa 2c 32 64 ed de 3d 7a 9f 48 52 5c 8e 0a | 28 51 5e 93 76 ff 56 0b b4 30 27 a7 26 fb 55 52 | 34 7e cd 64 5b b0 5f cd 53 2f 69 37 16 38 d2 bb | 78 bd 71 9f 1a ae 46 cb f0 6a df 92 c7 03 31 5c | ec 23 e4 33 34 45 4e 7d 3b 26 49 2a 7a bf d5 47 | 29 00 00 24 f4 58 66 d0 11 c4 59 15 77 69 0a b7 | d7 fe 50 93 e0 8b 0c 95 ba ce 3e 1f df 8f 0d e4 | a9 fd e1 25 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 4e 99 32 4f a5 1a 27 a5 94 99 e5 8e | 27 77 64 71 58 de 2f 68 00 00 00 1c 00 00 40 05 | 01 59 22 5f d1 0a 35 23 dd e9 14 d7 40 c3 82 b7 | 4e 2a 35 54 | libevent_free: release ptr-libevent@0x7fb360053fb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36004b8a0 | #619 spent 0.0653 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #619 connection "road-eastnet-nonat-164" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34400d120 | handling event EVENT_RETRANSMIT for parent state #530 | start processing: state #530 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #530 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-134" #530 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-134" #530 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.237236; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.937795 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36004b8a0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #530 | libevent_malloc: new ptr-libevent@0x7fb360053fb0 size 128 "road-eastnet-nonat-134" #530: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.134:500 to 192.1.2.23:500 (using #530) | 92 e6 33 30 14 4d d6 a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 50 f1 30 3a 3b 28 18 17 30 1c 4a 89 10 b7 0d c3 | 7c 77 f2 13 78 da 63 f4 44 e1 01 dc 1f 4a 94 bf | c2 80 6b 59 ab e9 1c 0b d6 b1 eb 32 26 25 2f 92 | 24 9c c4 2a f3 1a d1 be fc b2 3a dd e3 83 df 5f | 41 0b ef 7f cf dc 66 d3 2d 40 e2 f2 bf 97 f5 31 | 9d c3 63 d9 ae d6 1d 0e a0 ea 26 58 86 c3 be d7 | f8 23 f3 04 54 70 65 bb 60 ca 54 65 9a 9c 89 dd | 2b 3b 6f 52 f6 af 1c e7 fc fa 5c 10 bf 1c e0 8e | 98 9f 5b b8 7e d8 4b e3 4d b8 53 23 0d 4f e9 5a | 14 9b 09 2a bf c5 d2 2f 85 7d 28 ac 15 60 25 e2 | 2f ad ee 60 6b dd cf 9c 48 62 b3 c3 75 25 11 09 | 05 3c 28 83 a6 04 85 69 35 a5 1f 5d 22 29 dc b1 | 9a 6b d8 6c e7 80 14 0f 8c 50 7a ac f0 96 90 6a | b3 8b e9 96 09 75 da bc 0c 69 50 ec 31 84 cc 57 | 4b 12 f9 f4 53 c3 5b 32 43 24 09 27 86 a6 40 9c | ba 4c ed 2c 66 0e 26 00 3a d7 7f e7 bb e8 f6 4f | 29 00 00 24 56 d6 30 4a 9e 35 4a d9 63 c1 ed ae | ff d3 7c 9d 97 39 2d 62 1c 2b 5e d3 ab 26 78 e3 | 76 c0 40 4a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 23 68 96 99 78 c7 b3 b1 f0 d0 44 83 | c6 69 a0 85 3a 91 92 b2 00 00 00 1c 00 00 40 05 | d6 32 b1 7b 23 65 42 ae 2b 55 2e 89 2e ab cb 67 | bf 37 77 de | libevent_free: release ptr-libevent@0x7fb344053f60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34400d120 | #530 spent 0.0634 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #530 connection "road-eastnet-nonat-134" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374013710 | handling event EVENT_RETRANSMIT for parent state #576 | start processing: state #576 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #576 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-100" #576 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-100" #576 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.237307; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.947348 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34400d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #576 | libevent_malloc: new ptr-libevent@0x7fb344053f60 size 128 "road-eastnet-nonat-100" #576: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.100:500 to 192.1.2.23:500 (using #576) | bf 1a 7a 05 9e b9 88 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a3 6f d2 38 de cc 28 85 5f 41 f2 20 5e 07 0c a2 | f5 9c 80 ff e4 6c b6 4c 70 e2 b8 6a 47 00 73 46 | 8d ba d8 aa 10 38 4b 81 1c 0e 7c 8c 49 18 c5 84 | 17 40 52 e1 d0 c8 ff 2a 4c c5 e2 f4 12 7c df 4c | 72 b8 6e 95 bf f0 54 ad cb e7 72 b2 87 79 19 c5 | 68 98 1d dd 0a f6 a4 d7 0e f0 b6 72 bd 0e dd f4 | 27 a1 d9 12 45 04 fa 90 07 e7 b4 6e 9b f9 be 3b | 8a ae 24 d0 37 a2 53 8e c0 1f 79 b2 4f 1e 64 17 | ea e2 b5 7a 16 8c a0 20 f9 ab 1c da 5d 7f c2 85 | bb fd 14 3c a6 d4 28 dd 60 a4 e5 f5 e6 a1 44 e9 | 3c 8b 4f 83 ea 38 41 29 16 58 25 9c 89 8c 0a a7 | 8c 88 a7 08 b2 d4 73 4c 5c 5f d9 55 aa 40 62 ac | d3 e3 2b a2 04 52 6c e3 f3 4f 50 d4 48 ee 05 9d | 81 ac 23 4e 1e 8c c1 65 13 fb 68 a8 58 3b 92 a5 | 3d 7c 55 6c cc d6 9e 1c 8b 09 aa d0 db 5e 99 f2 | 60 34 f9 74 84 15 60 67 96 e9 e7 3c f3 c2 20 e6 | 29 00 00 24 c2 a9 a3 da 50 4e 4d cf ec 5e 42 2e | d7 97 ed 63 43 1b ac 3c 04 ca 8c 9d 5b af 41 cf | d4 6c f9 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bc 7a c0 1e 2b d3 0d 93 af e2 1e a5 | 35 b0 aa a7 be b0 46 48 00 00 00 1c 00 00 40 05 | e4 10 08 2b 3b dd 58 0c 81 68 da dc e5 0f 44 09 | f0 81 fd 9d | libevent_free: release ptr-libevent@0x7fb33805efb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374013710 | #576 spent 0.0661 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #576 connection "road-eastnet-nonat-100" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c01d710 | handling event EVENT_RETRANSMIT for parent state #723 | start processing: state #723 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #723 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-155" #723 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-155" #723 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.237381; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.018927 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374013710 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #723 | libevent_malloc: new ptr-libevent@0x7fb33805efb0 size 128 "road-eastnet-nonat-155" #723: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.155:500 to 192.1.2.23:500 (using #723) | 36 da f7 c5 2f 91 5f 13 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 40 26 74 72 fd 9e 9c 10 9c aa ba 2e c0 be be 66 | 22 9f 1a 62 8a 9f e6 3f e7 37 3b 1b 58 bb b4 f4 | a7 74 cc f5 37 05 fb 5b 1c ba 9d 27 55 34 43 f1 | 74 ee 17 2f 42 15 bc 36 96 52 c7 49 68 f2 24 68 | 76 d0 e6 45 0e e2 22 75 60 cd ee fd b6 75 20 09 | 00 ba 11 5f cb d5 aa dc 11 39 da 45 40 b7 a5 19 | c8 d5 2f 89 aa 7e 26 c1 13 b3 e0 94 56 31 ee 6c | 7c ec 62 9f 9b b7 d8 bb 9c 47 40 55 ef 32 b3 53 | 6c 79 f6 28 33 7a 17 48 72 6f e2 3a 5f f4 48 35 | 73 a1 7e b6 79 10 98 c6 44 1b aa ea e8 c1 36 b9 | f7 bf 2c ce b0 d0 2c 48 3b cd 2b 55 90 e1 5d 20 | f5 96 29 1e ab 81 03 61 9c 1f 05 2b 89 67 64 02 | 4e 7c e5 42 a2 f9 61 f6 dc bf 78 f8 b1 ca 56 69 | f3 d1 e1 49 87 d2 fb ee 1f 6c 89 a1 b4 e9 5e bd | 34 56 05 81 f0 52 8f f2 fb fe 6c 2c 13 77 1c 0f | a7 6d fb a5 f4 8e 00 1f f3 70 1f a1 8a 77 8f 5d | 29 00 00 24 6b 53 2d ae 51 68 5a 25 06 10 41 a9 | 74 bc e4 28 01 83 dc b1 fe c7 47 aa 45 92 94 cc | 73 9f ae 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e6 9b ca 13 30 40 c0 94 4a 3a 13 b5 | 19 3a 19 0b be 4d 6e 5e 00 00 00 1c 00 00 40 05 | fd 4f 80 57 98 34 ce 28 4d 1c 78 e4 ce 99 f3 3e | f2 93 74 b1 | libevent_free: release ptr-libevent@0x7fb378085d30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c01d710 | #723 spent 0.0655 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #723 connection "road-eastnet-nonat-155" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b25c80 | handling event EVENT_RETRANSMIT for parent state #624 | start processing: state #624 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #624 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-225" #624 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-225" #624 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.237454; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.972662 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c01d710 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #624 | libevent_malloc: new ptr-libevent@0x7fb378085d30 size 128 "road-eastnet-nonat-225" #624: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.225:500 to 192.1.2.23:500 (using #624) | 91 66 df b6 23 36 44 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 04 d0 c0 52 11 6f 6b 97 d8 4a 21 40 0d a8 d6 03 | 5a 31 7a b1 43 64 89 6d a3 67 7b 89 c5 fb c9 87 | fa b6 99 9f 95 c8 70 ce 70 b6 63 79 83 53 ee 5c | 03 14 79 98 13 a2 86 e7 a9 ca 4e 70 0d d2 78 f2 | 04 e5 33 3e 6c 0d da 0e d7 7f a3 32 5d 10 72 3a | e8 21 c5 aa 25 ec 61 02 13 d9 f2 57 e5 85 e2 36 | 3b 19 f5 73 53 0e 11 80 95 c9 7a c2 73 f9 c3 f1 | 92 7a e8 68 48 16 47 32 d8 fa a5 eb 40 2c 5c d4 | e0 f8 c0 97 0f 60 4c 10 92 41 16 02 1b e9 aa 47 | 0a fb 2f 7e e8 bd 85 fc 57 ea a3 81 bb 29 8c 27 | 15 9c 41 59 04 b5 17 25 e2 28 cf b9 d5 e4 f1 54 | 7e 08 6e 40 8c 6b e0 01 f0 a2 bc bd 6a de 51 92 | 5d 24 cd 29 bb f6 9e c2 d0 13 ad 94 34 1b 3c cf | ae c6 f3 ce c0 2c c8 d1 85 6b 46 14 ce 28 e2 1f | cf 9f 53 a4 1f 17 48 36 04 1e 5f e3 ed 6a cc 61 | d7 3f 56 7a 05 e3 3d 19 c2 99 b2 48 2d 25 92 b9 | 29 00 00 24 20 57 85 7e 38 82 c6 c2 c2 b9 82 69 | 7e 4b 89 c1 c5 70 2d 62 ae 17 de e7 0b 2c 59 f9 | 31 54 7c 30 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7c de 77 a1 da 64 49 53 60 59 d3 c7 | 5c d0 d5 e0 d1 18 19 9b 00 00 00 1c 00 00 40 05 | 99 9e a5 9c 48 82 f5 4c 18 c3 dc e9 e9 80 6e 22 | 1b 1d e2 41 | libevent_free: release ptr-libevent@0x7fb350082ad0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25c80 | #624 spent 0.0639 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #624 connection "road-eastnet-nonat-225" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ac3ec0 | handling event EVENT_RETRANSMIT for parent state #731 | start processing: state #731 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #731 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-247" #731 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-247" #731 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.237527; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.008095 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25c80 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #731 | libevent_malloc: new ptr-libevent@0x7fb350082ad0 size 128 "road-eastnet-nonat-247" #731: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.247:500 to 192.1.2.23:500 (using #731) | eb e9 70 00 69 c5 c4 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 67 4d f9 7f 74 4c 76 c5 7d ce d6 e6 9c c9 6d | b0 c4 70 40 ef 97 97 d2 1c 4e 93 b0 80 9d 3a eb | 37 1f 1d 04 0c ef 30 c3 25 21 ef b9 52 fa f8 25 | f3 a2 cd d3 47 9d 78 9f 8b c4 7e 38 5c 77 0a c5 | d3 21 67 45 0d dd 9e 51 ac e8 fe 88 81 61 87 c2 | bf ec 72 79 20 70 3d b9 9b 4a 0a cc 96 c2 0c 1c | b4 24 87 a5 62 f8 87 c2 7a b5 bf bd b6 53 b6 6d | 19 8f 82 6c 68 5d f7 38 34 94 99 64 71 ca 0c 62 | 25 bd 32 0c 2a f6 57 9c 09 73 ce dd 1e 58 8d ff | 02 8b 34 0a 54 68 de e5 d0 3e d2 74 a9 f6 24 94 | f8 4f 07 60 33 d2 a1 12 0e 69 d9 92 e8 be 55 47 | 9e be 0f a2 43 78 15 07 2a 74 35 28 6a 6d 64 ef | 98 ba 51 d6 01 0e df f1 ec a7 d0 19 a4 37 69 ad | 90 02 2d 4c a7 53 6f b7 ea d5 ab de f2 8a 74 80 | 9a 6e ee d2 0f 75 5b 34 33 20 ef e8 cd 1c f4 fb | 86 77 5a 4b ee a3 d1 6d 3f c5 96 d8 02 ae e5 6b | 29 00 00 24 b0 eb 9d cd b4 1b 6f 55 a3 ba 16 0e | 88 2e d4 ea 77 6f 8c e6 93 bf f5 13 b8 7e f8 74 | 0e 59 6f 68 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 bb fd fb f3 6e e4 ad 3c d3 d9 d4 b4 | 6c e9 ad f0 0d 3a ec db 00 00 00 1c 00 00 40 05 | 69 a1 72 77 b4 3e 53 1b 4f 8c d6 b0 82 44 05 d3 | c0 95 51 82 | libevent_free: release ptr-libevent@0x7fb338053ff0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | #731 spent 0.0655 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #731 connection "road-eastnet-nonat-247" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c018460 | handling event EVENT_RETRANSMIT for parent state #674 | start processing: state #674 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #674 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-124" #674 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-124" #674 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.237599; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.993489 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ac3ec0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #674 | libevent_malloc: new ptr-libevent@0x7fb338053ff0 size 128 "road-eastnet-nonat-124" #674: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.124:500 to 192.1.2.23:500 (using #674) | c4 c6 34 70 7c 35 e5 1e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8a bc 91 62 ee 2e 6d a2 96 c5 30 6d 1f 92 ed b7 | 36 56 8d b5 b9 4e e7 b6 33 c3 4c 5c dd d6 f4 99 | 88 c9 81 6d f6 b8 fb 84 e7 0a 5b 99 69 b8 6b 63 | 7a 47 28 12 93 aa 96 26 97 8f ff b9 54 0d 01 18 | 0b 01 9c b3 8f e0 95 e3 e1 9d 26 36 23 71 6c dc | 67 79 37 64 c4 24 a4 8b 9a 37 fa 7c fe 2e 7b 4e | 1a d6 c0 1d f0 ba 43 6c c9 02 6f 4f 9f c0 dd 79 | 3d 4a c7 9a 21 b7 1e b6 9d 90 fd 88 56 63 07 44 | 2e 81 d0 20 01 0b f4 e9 81 1c 3c 49 3e 91 bf 96 | a8 41 f1 e1 4c b6 83 f0 23 56 56 ad 6c 9d 70 82 | c4 41 64 86 d0 59 a6 a1 c7 b9 ee bc 84 09 46 41 | ec ae 2a 69 5c 40 a2 14 21 11 a1 b8 60 07 45 17 | 11 d0 1b 33 f1 93 91 61 7c 42 1b f1 6c bf d3 4c | 23 c1 b7 fe 96 eb 71 68 e8 19 04 8e 6f cb bd 87 | 40 31 f1 46 3f 4f 53 d3 a5 41 35 6c 1a eb f1 20 | da d9 d7 75 6a 41 10 84 60 5b cd 6c 15 bb 13 b1 | 29 00 00 24 5c 59 fc 58 f4 7f 35 a7 c0 cf f0 29 | 1a 0b a6 f7 cf a4 ea bd 59 bd c7 ac 64 c5 cf 21 | ff 47 b8 cf 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 49 d6 82 49 46 9b e1 ef 78 a9 24 e2 | b6 c7 14 d6 61 e8 82 0a 00 00 00 1c 00 00 40 05 | f5 e0 05 f9 c1 de b5 2f 1e 75 ed d6 26 ed d6 71 | 2a 1b 30 01 | libevent_free: release ptr-libevent@0x7fb36804b7c0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c018460 | #674 spent 0.0649 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #674 connection "road-eastnet-nonat-124" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a32290 | handling event EVENT_RETRANSMIT for parent state #529 | start processing: state #529 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #529 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-32" #529 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-32" #529 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.237672; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.939196 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #529 | libevent_malloc: new ptr-libevent@0x7fb36804b7c0 size 128 "road-eastnet-nonat-32" #529: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.32:500 to 192.1.2.23:500 (using #529) | 8b 51 05 ec d8 42 82 df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | aa a4 71 e3 1a bf 5d 84 a4 49 8c cf 55 02 33 3c | 04 56 09 91 2c bc e4 1c 1e 8d 8e 04 d2 0a d7 b1 | 4a e5 e2 44 95 fe 32 42 a2 71 e3 f6 19 58 19 98 | 30 f7 7f 68 aa c8 8b 7b ee 46 c1 c6 c6 c6 f3 ef | 02 5b 4f e7 12 67 eb f6 96 9c 29 fe 91 93 f1 4f | 4a f4 35 c4 14 66 ea 0c db 0c 7f 2e 10 1c 74 5a | 14 56 cb 14 d2 be a1 5c fd 36 cb 04 24 8d de d8 | e8 38 48 30 9f 46 ce 30 5d cf 53 56 66 09 d2 14 | 14 e3 57 c9 a7 57 bf b7 68 e9 aa 2c d3 32 00 e1 | b3 c3 fe 68 f4 77 9f 22 ca 38 99 8f 8b f5 3c d3 | 43 f0 50 78 d5 57 6c e0 ba 1d 44 37 ac eb 5f ef | 6f 86 24 97 13 93 3a 5c 56 88 22 5e 44 fb d8 e1 | f7 e8 74 39 ab 08 db ec 08 ca 20 92 ff 5e 35 61 | 70 6f 87 e4 a0 cf fa 53 19 69 e6 fc 3d 79 2a 13 | 8b 67 ba f1 46 d1 18 14 cc d6 68 98 b6 0e 15 62 | 5c 3f 7b 18 fe dd 29 0e 45 5d fb 88 02 b0 e5 a2 | 29 00 00 24 96 36 53 bc 54 1a 72 c2 86 d5 9a b3 | ea b4 b7 ce 95 13 e3 2c 2f ef 60 48 e2 75 18 75 | 80 77 ca 40 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 14 7d 2e c4 18 c7 50 d0 0c 64 64 44 | cf 7c 14 d7 db 29 be a1 00 00 00 1c 00 00 40 05 | df 08 4e 94 1c 1e 0f 0d 40 f7 6e 18 f6 44 35 e2 | c7 6d 58 d5 | libevent_free: release ptr-libevent@0x7fb37804bbf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a32290 | #529 spent 0.0656 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #529 connection "road-eastnet-nonat-32" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36401e230 | handling event EVENT_RETRANSMIT for parent state #721 | start processing: state #721 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #721 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-104" #721 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-104" #721 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.237746; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.016198 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a32290 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #721 | libevent_malloc: new ptr-libevent@0x7fb37804bbf0 size 128 "road-eastnet-nonat-104" #721: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.104:500 to 192.1.2.23:500 (using #721) | e2 d2 81 3a 91 66 0b 16 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | e8 66 4a 11 45 27 41 9e fa 59 58 40 a4 cc e3 66 | a4 14 b6 1a 8d ec 4a 94 ae 30 93 f6 e0 2b 48 5e | a9 86 4c 46 13 47 37 8b 91 48 67 89 bc 13 95 86 | c3 a5 fd 51 f1 60 1a c1 1b ea 4a 3d 68 db 35 cf | b9 d2 24 1d 11 fa f4 f5 69 79 96 a5 67 36 23 c2 | 21 40 a7 85 5c c3 43 86 61 71 35 04 bc b3 26 45 | d5 aa e6 7b c3 47 8d 08 98 e5 21 f1 ac 8e ba f5 | 2f f9 eb fc a2 04 fd 35 92 de 29 dd 6d 2d 53 6e | ab ec 31 fd 91 c3 8a e1 90 85 af 74 f4 e2 93 a0 | ef 1a 10 50 72 25 37 c7 21 d8 7a 5e 58 f6 7c c1 | 2d b3 8b e3 6b e8 be b0 e1 38 1c 05 0b d7 f6 07 | 9c 25 56 1c 46 bf d1 bd c5 df dd d8 33 23 d8 b0 | a2 c8 cb 1c b9 39 f3 85 c7 0b 15 1a 74 ff 55 80 | 1c fa 71 d1 23 f1 d9 e4 a0 14 57 46 33 58 01 33 | 3e 06 c5 79 b4 72 cb 12 6a 21 9a 81 d4 46 48 66 | 8a 9c 2d 86 80 06 17 4f 80 91 2d 38 09 9b 22 b4 | 29 00 00 24 a7 2a 51 43 4f d0 b2 2d b6 00 60 33 | be ce 9f 17 58 67 da 33 8a 89 27 e9 8a 3f 82 9a | 4a 50 3e 71 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2c 9c ed 7b 0b 4f 45 bf 12 47 14 a7 | 35 17 86 4b 30 03 87 f5 00 00 00 1c 00 00 40 05 | 78 3e ba 2e 78 93 3c a4 49 e4 a1 77 52 95 07 b6 | 6d ae 67 c4 | libevent_free: release ptr-libevent@0x7fb36404ec60 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36401e230 | #721 spent 0.0632 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #721 connection "road-eastnet-nonat-104" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a61bd0 | handling event EVENT_RETRANSMIT for parent state #746 | start processing: state #746 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #746 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-241" #746 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-241" #746 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.237819; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.012325 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36401e230 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #746 | libevent_malloc: new ptr-libevent@0x7fb36404ec60 size 128 "road-eastnet-nonat-241" #746: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.241:500 to 192.1.2.23:500 (using #746) | f7 37 f9 ef 73 ab 62 5a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ec d3 29 72 57 bc 83 2e 59 c7 f4 c6 5c 3e da 18 | f6 16 d5 05 b4 32 f8 47 60 e6 d5 e8 a6 7d 89 42 | 82 4a 4c 03 9b 5b e0 5c f4 ec 3b ce 58 3e 0f d7 | 56 dc 82 59 f9 cf 59 04 12 a3 54 12 37 fb d1 ea | 36 9c 13 92 72 99 d6 a7 42 5f 4d 49 ac 8b 2b cd | 32 c7 55 29 46 4d 74 68 cb 5d e1 7e 03 f3 bd 63 | 8b 55 fe bc 55 8f 8b 48 6b 11 21 29 87 1e 76 8a | e2 d8 b8 76 db 47 07 03 9d ab fb c5 6d 10 75 bc | da a7 8f b2 4f 24 eb 9e 43 a2 a3 e4 50 56 93 18 | c4 a1 e9 f8 22 3c a2 54 2e 1c b7 97 b7 4e 3d 26 | 8d f2 a4 30 a8 df 1f 7a 1e 6f f0 e5 f8 33 10 24 | c0 68 75 e5 96 36 ef 47 b0 86 2f 4d cf ea df f8 | 81 cb 73 da 28 a5 cc 66 eb b4 89 33 1e 77 a9 f0 | 20 e5 72 31 64 9b 5f 87 2b 0d c9 49 f4 a8 a7 b2 | db fb d8 02 de 79 32 bf 41 fa e4 fc a6 6d 9e 9c | db 06 92 90 d9 34 01 45 1b 0a 7e 2b a8 ca 95 b4 | 29 00 00 24 e3 e6 84 b9 78 ba 0f 63 d4 48 76 09 | d5 37 c9 85 6c 14 ea c9 21 5e fd 8f e7 46 60 84 | c0 9a 70 f4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 43 0b 6f 8b 96 5f 6c af ec fa 55 | 79 2b ca 5d e7 59 20 5c 00 00 00 1c 00 00 40 05 | eb aa 4b a8 95 05 be bc 99 5d 97 8e 1c 2b 9a a4 | 18 3b a4 f4 | libevent_free: release ptr-libevent@0x7fb380093250 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a61bd0 | #746 spent 0.0654 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #746 connection "road-eastnet-nonat-241" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46acc140 | handling event EVENT_RETRANSMIT for parent state #604 | start processing: state #604 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #604 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-20" #604 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-20" #604 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.237891; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.960426 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a61bd0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #604 | libevent_malloc: new ptr-libevent@0x7fb380093250 size 128 "road-eastnet-nonat-20" #604: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.20:500 to 192.1.2.23:500 (using #604) | 9c 9a a9 b6 8a 18 20 aa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 24 db 14 9f c8 04 2c a7 94 4d c0 41 4e 48 db 16 | 43 7e f5 96 b7 92 19 68 4f 28 dd 93 9c b2 03 ee | 00 e3 3a 70 b5 7f 63 e8 29 5f c1 3e d5 1e 9b 18 | 03 51 46 eb e9 1e 7f 95 79 9d a5 6c e6 38 16 02 | 06 77 87 00 da 11 bf 13 c1 4d 3a 44 84 ac 6b d3 | f7 9d c3 0a 19 49 98 cc af ba f2 e2 42 43 00 0c | 55 a9 00 12 93 95 82 e7 62 10 92 7e b5 54 fd bf | e8 83 82 ec 9d 8a 27 cf cd 74 11 b0 80 50 2e c7 | b3 2a ee 0c ca 12 67 95 57 e8 8f db b1 d7 be ea | dc 1c 36 57 ad 82 d5 d6 b8 ca 9d c1 19 69 b7 98 | 1a b0 e8 89 42 c5 72 7b 2c ac a1 8f 37 62 b4 d5 | d1 07 d7 cf 2b a0 47 98 cd bd cd 39 54 ed 85 7b | e7 4a 46 42 99 3a 84 b2 44 0b 60 db 17 1f 1a 47 | 96 ad e7 df 64 10 90 db 2e 4b b5 22 6e b2 0f d8 | ab 1d 9f cc da 67 78 10 6b ef f0 21 60 7f 46 37 | ce e2 4d 55 5c ce 37 f5 05 f9 20 86 fe 7e f4 34 | 29 00 00 24 b3 5a 22 9d ad 8e aa d7 db 87 b7 86 | 99 f5 d3 0b 6d dc 71 e3 8c 25 ed 59 9c d6 d9 01 | 28 70 17 f3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 ee b6 7a e3 a9 a6 b5 56 be cc 5f | 53 8f bf c6 c1 49 39 f9 00 00 00 1c 00 00 40 05 | 8b 15 2f 3d 66 90 78 e5 b9 a0 df af d9 66 18 c4 | 1f 04 f3 7c | libevent_free: release ptr-libevent@0x7fb338074f30 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46acc140 | #604 spent 0.0646 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #604 connection "road-eastnet-nonat-20" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb364012790 | handling event EVENT_RETRANSMIT for parent state #665 | start processing: state #665 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #665 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-135" #665 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-135" #665 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.237964; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.986903 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46acc140 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #665 | libevent_malloc: new ptr-libevent@0x7fb338074f30 size 128 "road-eastnet-nonat-135" #665: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.135:500 to 192.1.2.23:500 (using #665) | 17 f4 78 a9 59 a3 a0 42 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | c5 53 db 21 ce 0d 36 e8 32 4f 09 2d c9 12 93 03 | 3f 0d c8 57 d9 b2 d5 94 66 f5 2c af dd d9 9f 30 | ab 23 90 f0 60 2c 56 f2 ed e4 3b 19 92 7c 90 60 | ad a9 f6 f4 89 a5 b5 8a bd 28 e0 e6 2a e1 c4 4a | ab 19 3e 76 a7 cb 3f f5 b4 c1 ac d5 eb a6 51 0b | a5 22 3b cf 5d 35 78 58 b3 7e 27 7d a0 c6 9b ff | 67 19 62 12 ee 59 54 21 85 49 cb 45 55 53 2d a0 | 2d 26 f7 0a c1 cb a3 d2 11 be 8a 38 9f cf c5 aa | b6 3b 08 8c da 2a e2 3b d8 47 c3 96 5b 2d 9b 87 | 46 cf 56 9a ec 1a 60 92 d6 f2 05 73 ff b2 0b ce | e0 8c 45 e1 18 34 9e 24 c1 08 e0 e0 af 89 f2 77 | 7e 12 a0 ae df 93 58 3e 41 53 7a 70 bc 01 86 20 | e2 3a 31 eb 69 7b 78 f4 7e c8 5b 4a d3 b5 a7 20 | ba dd f3 68 f1 50 e0 df d8 9c 38 0c 45 05 f8 e4 | 46 fc 25 f3 c6 e0 f9 ac 5e f5 b0 29 3e 15 55 f0 | 12 34 52 a4 54 c5 e2 07 e5 c7 8a 47 07 72 65 b1 | 29 00 00 24 d3 a0 68 c2 b3 be 73 5d 25 6c 72 85 | 4c a1 62 e3 da 82 77 49 9b ae c7 79 c0 29 55 4a | d4 14 82 6b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 73 0c 4d bd 1f b3 c2 70 27 97 8c 0d | 77 2f 10 0a 09 ce 7a e7 00 00 00 1c 00 00 40 05 | 59 08 d1 ed de 8d 28 01 5d dd 9a 01 fe e8 dd 16 | e2 b8 56 65 | libevent_free: release ptr-libevent@0x7fb36405f230 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb364012790 | #665 spent 0.064 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #665 connection "road-eastnet-nonat-135" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b25cc0 | handling event EVENT_RETRANSMIT for parent state #533 | start processing: state #533 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #533 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-12" #533 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-12" #533 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.238037; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.93231 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb364012790 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #533 | libevent_malloc: new ptr-libevent@0x7fb36405f230 size 128 "road-eastnet-nonat-12" #533: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.12:500 to 192.1.2.23:500 (using #533) | f6 ef 1a 2f f5 b4 93 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da a1 df df ca 4b 3c 26 52 53 bf 5e dc 26 41 90 | d1 df 23 21 a9 59 bf d6 ae 81 71 a0 81 4c 53 03 | 11 33 1a 4b b7 ab 53 01 6d 0e cc 7b 75 21 4e 97 | 25 1d 96 f6 6e 9e 8f 9d ff 1d 95 15 28 e4 03 98 | 5c 1e 2c f1 4b 5f c6 3a d5 37 62 da 61 45 46 b3 | cc 9d 86 7a d3 76 26 6f 3b f0 79 d8 87 45 9d b6 | 0b 54 6c d3 f6 87 87 b3 0e 07 df 90 fc 79 cd b8 | 24 00 5c 5b 99 aa f0 58 32 9c f1 f5 6b 32 0d 58 | f3 21 64 b4 72 d0 94 c8 05 ed d0 c6 3c b0 26 e1 | f7 cf eb a0 25 a3 19 2f 51 79 e3 59 1e 5a 51 9a | 3e 2a 58 04 1f d3 70 6b 24 34 43 84 0f 4b 98 43 | 23 8c c9 a8 bb f3 ad 2f b5 87 c1 54 1c f5 13 a0 | 38 03 e5 fc 8b 2f cc 40 23 79 b0 d3 84 0d e1 a0 | ea 45 1c 78 35 7d 50 eb b7 64 69 09 33 29 c1 68 | b1 bf 88 e9 f3 00 6b e6 58 a7 19 e9 1b b5 e5 43 | 74 e7 8d 22 51 ab 73 75 e3 5d e8 92 a5 fc f5 56 | 29 00 00 24 51 9c ee 13 ee c2 09 ff 20 a1 f7 f3 | 1a ce 85 4f 59 c3 37 7c 50 6b 1c 56 90 01 a1 b8 | e5 91 ca c4 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 dd ca 1b b3 75 23 bb 76 92 45 1b 72 | a0 fb dd 8a c0 43 64 68 00 00 00 1c 00 00 40 05 | c3 3f 99 f7 37 13 13 a6 f3 67 55 d5 33 83 4f 3f | 53 00 18 49 | libevent_free: release ptr-libevent@0x7fb37406f8f0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b25cc0 | #533 spent 0.0682 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #533 connection "road-eastnet-nonat-12" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb35401d710 | handling event EVENT_RETRANSMIT for parent state #648 | start processing: state #648 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #648 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-175" #648 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-175" #648 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.238116; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.979337 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46b25cc0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #648 | libevent_malloc: new ptr-libevent@0x7fb37406f8f0 size 128 "road-eastnet-nonat-175" #648: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.175:500 to 192.1.2.23:500 (using #648) | b9 3d 2a c0 99 78 dc 24 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d1 7b a0 b8 ff d9 f3 24 c5 c3 d8 fe 42 9c 4d 77 | 77 a6 2f 14 34 b3 64 24 e9 fd 75 86 48 0e 02 3d | 29 61 ad 94 16 d0 85 d6 e8 56 c2 ef 63 79 8f 41 | 57 5b 33 d0 fc 13 7d 5c da 24 5a b9 25 c8 06 1f | 52 14 77 e7 a4 dc b1 90 16 a1 f9 07 e6 89 42 44 | 14 11 d5 fc e5 92 89 2d 0e 64 88 0c 41 3b 46 99 | d6 26 50 07 c1 0c f4 24 da 69 56 28 7a 00 82 4f | 0c 3a af e9 e7 f5 55 29 53 80 5f 77 a4 ce 23 5d | 9b 10 b0 b2 48 b8 fc ff 0f 47 dc ca e2 38 a1 5a | b6 68 17 c3 f7 a2 7a af f2 60 dd 39 8f cf b9 23 | a2 af 01 98 52 e1 93 81 05 30 fb 55 27 53 74 30 | 4e c5 de 2a e5 a1 62 ce e0 cf e4 81 03 e4 82 30 | b0 0a ce da 25 c7 a9 75 ae 95 0c 31 7d 34 b5 13 | 8d b7 30 4c a2 f5 b0 bd 9f 11 16 f0 69 7c 07 96 | dc 39 0d a1 91 0f 8e 6b bf ba 41 e2 14 8b c7 d0 | 61 8c af 22 83 20 d8 ee a4 27 68 8b 20 f6 53 87 | 29 00 00 24 7f 9a 6e e6 d8 99 8c fa 9e 3a 9d bc | 69 5e e6 c5 2d a1 c8 09 75 1b 7d 75 dd dd b5 32 | 5f 0c 0c 55 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 7e 5a 6c 36 b7 e3 94 c7 44 df 76 5a | 27 bb 1d a1 14 37 1f 63 00 00 00 1c 00 00 40 05 | cb 53 89 2a 35 01 2c a3 94 35 40 7a f6 29 fc a1 | 5c fa 01 07 | libevent_free: release ptr-libevent@0x7fb35c02e960 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb35401d710 | #648 spent 0.0655 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #648 connection "road-eastnet-nonat-175" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a2cc10 | handling event EVENT_RETRANSMIT for parent state #679 | start processing: state #679 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #679 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-82" #679 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-82" #679 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.238189; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.004192 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb35401d710 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #679 | libevent_malloc: new ptr-libevent@0x7fb35c02e960 size 128 "road-eastnet-nonat-82" #679: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.82:500 to 192.1.2.23:500 (using #679) | 21 46 75 e4 c0 e2 30 47 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3e 7f b6 62 3c af 4b 1e 98 70 97 3a c8 81 5f 8a | 6e d2 09 4c 84 07 55 d6 a3 fd c0 be 75 5d 07 47 | 8d 3f bb da a3 30 57 a0 7c a7 7f 2e cb 9d cc e7 | 13 3b 5b 3b c7 48 f1 bf 28 bc 38 67 c7 62 8b b6 | 69 be 87 f5 c0 9f f9 a6 02 9e 30 99 da 23 cc 90 | 1e 99 f2 9c f4 fc ed 48 2f 64 79 47 e2 b0 af cd | f7 a8 a4 46 c8 cb 84 62 97 96 25 40 61 19 15 7b | 98 2f 52 d4 70 b6 21 3c 7b e8 bd 11 c7 68 0b f4 | 1b 98 5d 51 c3 19 75 24 08 6b 1c 64 66 29 63 ef | 74 57 1e 26 8f e7 df a7 24 f3 96 46 d3 6a e1 e9 | d3 26 ea bf b7 66 e0 59 a8 f2 90 ba a8 33 d2 5f | aa 5b 61 86 8a 0d 9e 66 48 2c c3 e8 2d e4 2d 40 | 05 91 e1 60 c8 b5 52 b7 df 9b 2c ac 58 37 89 f0 | 51 8b 09 fc 89 ea 65 b5 1d 2a 49 4e 5e 19 42 75 | 54 34 97 85 69 00 2b 59 4b d5 43 ac d7 91 dc c1 | 3b 6a d7 05 fb bf e8 2b 60 16 3b e5 78 45 71 f5 | 29 00 00 24 64 67 4a b2 09 ea 77 4a 31 a5 f9 b8 | 14 17 60 f1 91 48 c2 5b e0 29 39 77 90 07 73 81 | d3 3a 3a da 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 e8 d2 62 af e1 8e 7e 27 97 6c fa 7b | 68 37 2f ee 47 da c3 0b 00 00 00 1c 00 00 40 05 | 9d 8c 01 86 03 b8 30 c8 80 85 c7 8b d6 c6 c7 00 | 6a 86 19 60 | libevent_free: release ptr-libevent@0x7fb368040760 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a2cc10 | #679 spent 0.0665 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #679 connection "road-eastnet-nonat-82" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb374045e40 | handling event EVENT_RETRANSMIT for parent state #643 | start processing: state #643 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #643 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-86" #643 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-86" #643 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.238263; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.977911 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a2cc10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #643 | libevent_malloc: new ptr-libevent@0x7fb368040760 size 128 "road-eastnet-nonat-86" #643: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.86:500 to 192.1.2.23:500 (using #643) | a4 7a 0a 38 ed 45 0a 7e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2a 1b 74 d4 2c dc 83 3a 41 1b 72 93 cd d9 99 ab | a5 3d 31 f7 6e ad 24 72 35 2c 08 59 f7 85 55 ca | 70 bd b6 2e 52 cf ef d1 e9 0c c9 34 5b cf 85 8d | 51 9c e8 d0 53 f9 5f 56 af 23 8b 00 bf 41 f6 62 | 6a 4a d5 2e 51 34 77 b7 47 63 d2 86 3b 81 3e f3 | 91 0f a1 86 aa 34 df 5a 12 54 be 0c ac c3 1e 9f | 58 01 81 17 a2 3b 0b 37 4c 53 7d 23 99 d9 8f ea | f2 0b c5 cd 0a e8 e2 66 37 ad e8 1d 0c de 9c e2 | dd e7 b6 c4 7e c8 77 b9 f2 ed e4 1a d3 c9 66 b6 | 83 5d e5 e8 44 a9 37 6d 05 50 25 5a a4 01 51 b3 | 8f 5f 9b 9b c2 94 66 43 f2 03 b2 0d 87 c8 04 67 | bc cc ed 06 fe 82 6a 3f 3b 17 39 2b 40 cb f6 e0 | 43 79 fe 36 4a 20 93 44 8d 77 96 8a 0b 1e 19 08 | d9 d7 07 85 61 29 11 e7 11 41 78 7c e2 10 eb ac | ba 26 45 60 58 71 fa 59 c0 d3 9c 73 92 fb fa 39 | c8 c4 cb fb 8a ec 6d 5d e5 9d 4b b8 1c c2 a8 39 | 29 00 00 24 57 52 8d 13 2d 29 b3 5e 46 06 e9 1d | 1e 46 ed 46 2e 59 41 8d f8 dd 75 32 e3 62 89 bd | 1f 93 2f 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 64 26 30 b2 61 08 18 b0 78 81 15 48 | cb a5 c1 be b2 a0 a4 44 00 00 00 1c 00 00 40 05 | 98 48 c3 da 5f a5 9a 05 26 1d 7f 07 40 17 0d 29 | 6b f4 fe 77 | libevent_free: release ptr-libevent@0x7fb36806fac0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb374045e40 | #643 spent 0.0632 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #643 connection "road-eastnet-nonat-86" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb368034dd0 | handling event EVENT_RETRANSMIT for parent state #594 | start processing: state #594 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #594 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-81" #594 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-81" #594 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.238335; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.961366 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb374045e40 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #594 | libevent_malloc: new ptr-libevent@0x7fb36806fac0 size 128 "road-eastnet-nonat-81" #594: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.81:500 to 192.1.2.23:500 (using #594) | 14 02 06 51 b1 9f 6a a2 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | bd 01 b3 9f af 09 be 89 fe fb 88 0b 7e e8 81 63 | 3e a8 ca 5b cb 2b 71 61 2e 3d 71 13 67 81 27 7f | eb 09 e9 81 30 e6 ac e6 a5 a8 3b 20 84 58 c8 8e | 6a 8b fc c9 8a c5 b6 c5 c4 e6 6c f7 d0 89 56 fa | e1 09 5c fd 09 c4 5c 8e a9 af d1 7a 3b a1 f4 b6 | f4 3f 0e 9b a9 94 b9 07 50 f1 fc bf a3 65 7f de | 3a 00 2f 52 8f 64 57 78 ce a7 f9 c4 ca 58 9d 51 | 1b 37 06 31 32 08 90 da a6 51 c5 05 d8 cf c0 4f | 6d 65 03 f8 31 ce 3e 2a 1f 85 59 ce 64 5d bd 91 | 39 62 91 67 e1 9a c3 02 a2 c6 12 25 4d 06 14 65 | 6d 4a 67 38 16 9a f3 0a 7f 67 14 d2 64 51 73 a3 | e8 d4 99 7f 98 eb 17 a7 87 c4 3d ef f7 49 b0 e7 | 3a ee 43 b6 89 d7 8e f9 6d 93 94 5f f6 b9 7c ae | ad a8 c0 d7 b6 71 30 2a f0 19 1d a7 ef c7 69 67 | 34 56 cd 9a ca bc 4f 05 69 d7 a7 23 37 a8 31 2d | ac 76 9e 29 2f 6b f3 a4 f9 9b 74 9e 13 92 6d f7 | 29 00 00 24 bd 30 97 0e 1f 3d f9 71 c1 31 b3 cc | d2 39 eb d3 0e 5f a7 cb d6 93 2f f7 82 b0 8d 4f | bd 25 0f a6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b2 ad 41 74 91 af 29 e4 13 15 1e a9 | 90 db 4d 21 18 96 06 09 00 00 00 1c 00 00 40 05 | ae cb 83 03 f3 ff ad 0d 96 aa 50 d8 b2 3b f6 cf | f4 56 d5 60 | libevent_free: release ptr-libevent@0x7fb368064ab0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb368034dd0 | #594 spent 0.0648 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #594 connection "road-eastnet-nonat-81" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb384002b20 | handling event EVENT_RETRANSMIT for parent state #559 | start processing: state #559 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #559 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-30" #559 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-30" #559 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.238406; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.948135 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb368034dd0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #559 | libevent_malloc: new ptr-libevent@0x7fb368064ab0 size 128 "road-eastnet-nonat-30" #559: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.30:500 to 192.1.2.23:500 (using #559) | 14 21 4b c7 8f d5 3b 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | df c5 ec fc 7d 5a a9 f1 38 5b af b6 65 71 32 7c | 6c 91 b4 ed fb 0c 87 80 16 02 df 23 7b 3e 1b 10 | 70 0b 39 0c 6a 5c de 3d 87 90 91 e3 83 ec db 5a | 36 ca c8 b2 b4 db 09 7a 5b e9 7a 17 cc c7 3a 24 | 4c ea 7f 5d a9 0a f1 b3 d7 6a a8 13 a7 fa c2 05 | e6 77 9a ba 9d 7b 25 0d 3e 0a e2 5f ff cc 63 76 | a0 6c db 49 af cc d5 f5 f4 09 78 70 2d fe ff ff | cb cc 4a 9b 55 1b 99 f6 dc 93 35 dd 1d 13 21 bf | fd 6a ca 65 6a c0 ff ff 32 f1 6d f7 3e 98 69 a7 | 0e a1 73 ab ab b1 7e 5d de 57 92 d0 6c 78 24 e7 | 4e 0e f0 4a 0a 29 99 48 f2 3b 55 4c 27 2b 57 4a | 87 27 2c cf f8 7a b5 07 06 95 37 75 bc 1a f4 d9 | 3f 9e cd 96 08 50 67 bf b6 80 17 b5 68 83 2a 43 | 38 12 31 e4 eb bb 48 53 dd 1a fa ae 76 4a 72 80 | 49 d3 12 0a 1d 01 90 66 b4 ca 1b 0f dc f4 35 b5 | 43 43 90 7e d3 10 c4 1b 8d 5a d5 a9 ca 5f b8 48 | 29 00 00 24 cd 39 6e 7e 0b cb f0 da d0 22 3b 9f | 55 4f e9 2f 87 09 39 35 5d 79 80 bd 46 82 75 62 | bf 33 d3 f9 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 cc da c4 44 bb 29 ff dc b3 bb 41 98 | be 72 17 e4 5a b5 73 e6 00 00 00 1c 00 00 40 05 | 45 80 da 9e 17 9c 16 03 77 58 55 5d 48 f1 3a 54 | 40 de ec ea | libevent_free: release ptr-libevent@0x7fb384076770 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb384002b20 | #559 spent 0.0645 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #559 connection "road-eastnet-nonat-30" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb33801d710 | handling event EVENT_RETRANSMIT for parent state #728 | start processing: state #728 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #728 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-216" #728 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-216" #728 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.238479; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.008122 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb384002b20 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #728 | libevent_malloc: new ptr-libevent@0x7fb384076770 size 128 "road-eastnet-nonat-216" #728: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.216:500 to 192.1.2.23:500 (using #728) | ed 95 ac b7 77 3a 63 2c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | da a2 78 27 f5 2b 54 2f 55 96 c5 81 6c 0c a3 b6 | 83 12 f5 d9 b8 01 ba b8 d1 a3 42 87 c7 6c 10 0b | 63 a4 94 ca d4 f6 e8 4d 22 ce 05 39 88 91 97 f2 | bf 09 37 b9 98 b1 d8 26 bb b2 1e 92 29 a1 85 7b | d9 b4 11 29 68 ff 40 91 35 9a 09 da d2 cb 07 e0 | ae c3 2d ed f0 4b 10 75 57 d6 65 48 df c7 a2 4f | 3e 00 5e 43 75 06 44 c7 49 4f d8 29 1c 6d 72 c2 | 18 aa 3c c4 95 78 2a 63 17 27 ba 03 8b b4 08 69 | 8a 41 ef 22 d5 36 45 8d d5 f1 45 ce bd 99 4c 4d | 22 ad 81 3f 5d 00 25 1c ad bf 2e f7 8e 8c 80 7b | 93 69 16 30 fc 43 30 2d 8f 1d f1 a2 b8 cf 8e 13 | 28 9a d4 35 b3 7b 77 53 24 b9 b6 62 c4 97 31 69 | 7f 76 13 0e 62 30 c6 ee 48 5c 32 ac fd 53 7f 7a | b6 10 d9 5f 7f 00 e8 b0 6d 1d 12 23 94 fa ae 8f | 68 f1 36 29 a4 6a f8 df 72 30 2e d8 f7 b9 49 8c | 43 c5 19 cb c2 38 18 75 d9 fc 13 c1 7d d2 e2 e9 | 29 00 00 24 e5 63 4e 91 26 c4 75 00 d8 52 0a 1f | e4 6e 1e 05 a3 b4 ec ce fa fc d1 db 89 1d 66 0a | aa 77 5c 9d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 d6 04 97 64 cb df f6 9c 65 fd 98 | bb ed f5 4e d4 61 43 0a 00 00 00 1c 00 00 40 05 | 5c 17 83 01 62 b0 09 8f af 57 ad 85 0a ed 60 b0 | 19 a9 47 40 | libevent_free: release ptr-libevent@0x7fb35408aee0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb33801d710 | #728 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #728 connection "road-eastnet-nonat-216" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a3a590 | handling event EVENT_RETRANSMIT for parent state #710 | start processing: state #710 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #710 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-208" #710 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-208" #710 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.238552; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.006331 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb33801d710 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #710 | libevent_malloc: new ptr-libevent@0x7fb35408aee0 size 128 "road-eastnet-nonat-208" #710: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.208:500 to 192.1.2.23:500 (using #710) | 54 dd ed 5a b3 6d d4 73 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 8e ae f9 c6 c3 35 9e cb 30 7a bb 1c 00 fa 4e a9 | ac fe 61 1a 01 79 34 2a aa 66 47 75 0d 14 d5 58 | 3d a3 f4 3b 2f fd e3 8f 66 3f d8 83 34 dc f9 53 | ad 76 ca 6c 43 c4 37 d5 67 c9 87 27 ce 69 69 cf | d7 db c7 63 3d a9 5c 21 2d e2 b8 c4 ed 1d ee 03 | ec f9 0e f1 a5 e6 d0 de f8 48 19 8c b1 f7 9b c0 | 1e 79 2e 85 00 e0 3b 1a 5c 6b 87 68 67 17 48 2f | bc 80 b2 6f 4c 41 39 fa 87 e1 62 4f 73 1b a9 5c | 60 de 48 93 9e 02 e2 ec 15 c2 11 32 e4 d6 d4 d8 | 5b c1 d7 7b 6b 58 5f d6 b1 1a d4 fb 32 e3 da 05 | 6e 83 83 d0 d8 9a e3 19 01 2d e0 27 eb f6 d0 d3 | f7 36 9d d5 66 d2 27 1b a7 be 3d df fc 08 16 fa | 28 57 f9 eb 66 43 05 f6 6e 1e f9 24 82 ef 4e d5 | 64 d8 6a 66 63 24 d1 49 d8 f2 45 0b f7 74 80 63 | ff 22 38 7b 7e a0 c3 5f 50 b2 0f dc 7f e8 39 75 | 4b 1f f7 7d e6 ab 3d 0d ee 3f a4 d8 d2 50 29 5b | 29 00 00 24 ab 44 c4 18 c2 85 94 a9 eb c4 70 9c | ed e6 ea be 91 bb 1f 29 3e 10 f2 4c ff 43 63 b0 | b2 3e 00 8f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 51 2b 3b c2 86 c3 af b9 48 0a 19 78 | 34 27 e8 b2 13 ec a6 3d 00 00 00 1c 00 00 40 05 | dc 19 d9 87 b0 ce ef 70 e8 93 5c 55 1a 39 4b 4f | f8 02 f2 ae | libevent_free: release ptr-libevent@0x7fb350093270 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a3a590 | #710 spent 0.068 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #710 connection "road-eastnet-nonat-208" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb354025320 | handling event EVENT_RETRANSMIT for parent state #593 | start processing: state #593 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #593 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-7" #593 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-7" #593 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.238629; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.957271 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a3a590 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #593 | libevent_malloc: new ptr-libevent@0x7fb350093270 size 128 "road-eastnet-nonat-7" #593: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.7:500 to 192.1.2.23:500 (using #593) | 08 0c 73 4d 95 6b fc 9f 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3a 5b 8b 42 5a bf e3 df 41 c2 a5 fe 11 64 91 da | 13 85 25 29 02 a6 c9 9c 80 e3 1c ad 21 a7 2f 9a | 0b ca 3c ca e9 08 30 c3 5e 68 75 9f 48 b0 b2 2a | f3 14 8c ce 4b 9d 68 31 bf e7 06 67 bc f6 a7 2f | a5 2e 5d 39 f4 d4 74 52 bf f3 62 0c 0a b9 b5 aa | f2 b8 2f 6c d5 d0 6f 96 84 1e db be e8 02 03 7b | ee dc b5 2e 60 31 46 be ee 8e cd 6c 10 78 9e 92 | 45 23 ed 34 3c a4 82 16 54 50 71 ef 12 97 e8 82 | 81 30 89 f1 a9 de 93 55 47 e1 7b c1 4d 96 b7 09 | 0a 07 7c 6e 45 c4 9a eb b1 2d 13 6c dd 4d b5 76 | f9 0b 32 6e 41 44 dd 36 74 7c 38 ef 89 9d 82 70 | 70 19 38 86 e8 a2 d4 b2 17 ea 56 cc e1 b3 09 6e | ba 1a 8c a2 bd d7 7e d9 e2 59 e9 c6 5b e8 2e 95 | f2 48 7d f5 1f 8e 57 75 2c 61 06 ab aa 3a d4 66 | 6f 67 dd 67 06 ad 55 c4 42 9e ec 08 90 bd f1 bb | f6 d6 d8 db 80 e0 59 56 25 74 f2 d8 fc 0b 32 67 | 29 00 00 24 8d c7 ae aa 9e 1e 3a 21 f5 55 19 72 | d5 db e8 0f 54 51 8b c7 a2 ee dd f6 89 e2 5f d2 | eb 41 c9 1d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 70 5a 60 25 54 2e 1f 8e 3c a3 d4 e8 | 65 e4 94 da 40 a8 f1 52 00 00 00 1c 00 00 40 05 | e4 c5 d5 75 de 47 88 58 52 93 1c be 19 a0 a1 72 | fb ef e5 fb | libevent_free: release ptr-libevent@0x7fb35c0a6260 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb354025320 | #593 spent 0.0663 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #593 connection "road-eastnet-nonat-7" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb348018100 | handling event EVENT_RETRANSMIT for parent state #737 | start processing: state #737 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #737 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-189" #737 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-189" #737 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.238703; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.013537 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb354025320 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #737 | libevent_malloc: new ptr-libevent@0x7fb35c0a6260 size 128 "road-eastnet-nonat-189" #737: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.189:500 to 192.1.2.23:500 (using #737) | 62 bc 01 e6 ef 5b 20 48 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | f3 66 85 a0 b2 da 45 c4 c8 86 e8 bb 58 04 8f 23 | c5 98 b3 86 8c d9 3d e0 66 ea fd 6e 98 4b e0 01 | 77 7e 62 b4 42 d4 3c 39 34 2b 32 9b 48 02 57 f1 | 43 d9 98 13 95 5e 59 11 5e 01 ff c9 1c bf 20 5a | 97 da 26 ae e7 18 db f7 f0 a0 b8 39 fa b2 27 ca | 76 61 93 73 f9 9f 90 66 03 e2 33 bb d1 e7 63 33 | f7 1f 47 9d 66 dd ce 29 e2 ce fc 79 7d e1 df bf | dc 9e e5 af eb e9 5f a2 61 50 44 f7 b3 6f 62 6a | 00 64 f2 03 7d a9 73 95 eb b3 13 a0 cd 38 e6 bc | e6 82 cc 57 4f 84 63 cc 7c 55 1b ca b1 df c8 fb | 40 3b 1d 30 71 fc d6 dd b0 87 15 c1 2d 4f 62 0a | d3 3f bd e6 06 ca 4b 23 74 c6 f0 8a 6c 6c 87 c0 | a3 d6 77 77 fe 47 ed a9 72 bd 08 ac d9 3e 17 96 | 30 05 c0 a7 7a 4d 24 f3 62 68 cf 5a 4b 4a 82 ce | 23 28 f5 14 67 63 ea 32 5f 7d 39 c5 98 d8 43 3b | d9 8b c6 31 05 9d c5 e0 94 47 37 b4 5b 9f 31 c8 | 29 00 00 24 05 60 52 c6 c7 57 70 5a 1b 6b 34 82 | b5 50 99 7f 74 f0 48 4f 7c 17 db cd 98 c0 39 1a | e7 e2 cb 18 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 55 ce 96 b7 f8 31 73 c0 a8 ac 4a 38 | e0 6c fe c9 12 67 fe 8f 00 00 00 1c 00 00 40 05 | 2c fb 7f 58 95 5f 54 36 dd 15 01 4b 74 42 c4 35 | a5 03 67 5a | libevent_free: release ptr-libevent@0x7fb3480720d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb348018100 | #737 spent 0.0653 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #737 connection "road-eastnet-nonat-189" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36801fda0 | handling event EVENT_RETRANSMIT for parent state #526 | start processing: state #526 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #526 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-131" #526 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-131" #526 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.238776; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.933527 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb348018100 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #526 | libevent_malloc: new ptr-libevent@0x7fb3480720d0 size 128 "road-eastnet-nonat-131" #526: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.131:500 to 192.1.2.23:500 (using #526) | 2c e7 79 4e 69 36 cf 88 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7b a3 00 42 f2 bb 8f 76 46 c4 66 08 4e c7 f9 b2 | df 25 c1 de 9e 12 de 72 b5 7e 4f 9a 95 62 19 89 | ac 68 cc ad 66 f6 b9 57 74 7f cb 29 ce b4 c5 29 | 7e e8 43 36 2e ad 51 7b dd 36 41 60 f4 e5 14 cc | a6 af 4e 6f 65 34 88 da 72 82 77 c2 a2 36 84 91 | 9b 68 22 79 7f 0d ab 26 4a 42 6f 37 90 81 a7 28 | b1 5d 31 ff 90 46 41 d8 33 de 87 0f 27 a2 30 12 | e6 4d fd 6b 9a f7 c2 79 27 45 5a 1e 6d 1e cc 92 | 13 af fa 4d 53 bb da 63 4a cd 41 8d 7f 7c f0 8e | bb 15 d6 24 f8 58 75 56 83 54 56 f5 f0 c8 22 3e | 06 23 4d f1 c1 3a e0 0d 5a 45 9e e2 63 18 d4 90 | a9 01 18 d9 68 d9 7c b7 d6 21 a4 79 fb 61 05 78 | 3b 9e 6f 30 8b 1e 00 d6 c4 b5 8f db ed 31 3f bf | 84 21 ff 60 e0 96 6f e7 8a 57 1c 58 41 5f 92 3e | a0 80 3c 76 7a 2c 33 23 3b cc d3 da c4 62 04 3c | 5a 2e 98 11 59 53 9d 30 e5 65 ae 85 8a f1 f4 19 | 29 00 00 24 58 2a 43 33 ca da 5e cf d0 c4 3e 45 | b3 97 45 72 b2 67 77 d1 d9 13 d7 0d cb 6a de 8c | 71 91 90 96 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ff 12 0a 6b bb 38 2d fe 8d fe 15 e3 | 95 3d 21 61 33 d3 f6 a2 00 00 00 1c 00 00 40 05 | 40 e8 e9 9c 13 3c 3e 2b 80 7f e5 4f 1b 81 50 bc | 99 79 e6 40 | libevent_free: release ptr-libevent@0x7fb3680581d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36801fda0 | #526 spent 0.0781 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #526 connection "road-eastnet-nonat-131" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a7cf10 | handling event EVENT_RETRANSMIT for parent state #699 | start processing: state #699 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #699 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-246" #699 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-246" #699 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.23888; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.005464 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36801fda0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #699 | libevent_malloc: new ptr-libevent@0x7fb3680581d0 size 128 "road-eastnet-nonat-246" #699: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.246:500 to 192.1.2.23:500 (using #699) | 3d 5b 9a 7a 4c 0f 9e 59 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3a 09 f9 eb a7 2c d4 98 c3 18 03 6f 47 d0 96 ba | 3c f2 05 d8 dc 28 48 bb 27 cf 99 6c 93 c0 c3 83 | 62 65 ad 94 56 b3 ed 6c 6f d7 43 5b eb 9a b8 8c | cd bc f0 70 f4 67 60 ab 7c 75 e9 55 5d b0 86 b6 | 64 db b3 4d b5 b8 2b f5 3d ab b6 8a 7d 99 73 4a | 9b 33 fd e0 3a 15 58 67 0c 5b 8e f3 d6 f2 97 a2 | 7d 06 3e e7 f9 db 01 b6 96 1e 12 71 96 36 b1 ec | b4 4d 68 d3 51 78 4b 90 eb 84 c2 64 e8 b4 4f 2c | d3 6a bd c9 98 ce 1f 8e 81 89 21 95 4c 9c ba 75 | d7 f1 23 87 ad 5b ff f5 2f b5 a2 44 90 c1 f2 58 | be d6 e8 53 b5 24 d2 77 32 37 2b 7a 81 a1 bc 2a | 6f b9 14 6a 34 88 fb 2f 9e b0 2b 54 9e 18 aa 92 | 83 c2 bb bf fc 01 c9 75 ab 94 44 ea 3a 9c f5 0f | 98 b5 4e 1e 59 de 26 f7 a1 d7 7b 72 e7 1f 59 71 | 0c b6 98 51 80 1c a2 16 07 3d a3 ac 7a 38 df e5 | 57 4a 6f f1 39 e9 67 6c 90 88 41 fd 33 06 1d 56 | 29 00 00 24 75 7b 0d 72 2a ad 01 e2 32 07 7f 62 | c6 47 f1 e7 26 b0 2f a6 3b d9 b1 d0 4e 2c e5 dc | af ae 5c 7d 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 d7 12 af 37 14 12 8a ae d8 ef 8c | c0 42 58 74 2c 82 0a f0 00 00 00 1c 00 00 40 05 | bb 48 6f d2 a0 ac e9 6e 70 bb 7f d3 67 7d bc 39 | c4 af 08 4e | libevent_free: release ptr-libevent@0x7fb36c0933d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a7cf10 | #699 spent 0.093 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #699 connection "road-eastnet-nonat-246" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46aa5fc0 | handling event EVENT_RETRANSMIT for parent state #688 | start processing: state #688 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #688 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-95" #688 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-95" #688 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.238977; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.012118 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a7cf10 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #688 | libevent_malloc: new ptr-libevent@0x7fb36c0933d0 size 128 "road-eastnet-nonat-95" #688: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.95:500 to 192.1.2.23:500 (using #688) | df 64 65 78 b0 09 88 8a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | ba 99 2e a4 d8 11 11 ec bc 09 70 a9 ec b4 08 d9 | 97 c0 f8 d2 7e e6 f4 f4 ec 88 8f c9 01 b5 07 63 | ab 96 32 f0 d1 ff d5 71 24 2d f7 10 7e 41 d7 9a | 8a 31 5b f5 cc 4d 4b 6e e0 fe cf 09 59 ae a0 75 | ed ad a8 fe 11 4f 77 38 0f 3d 73 54 64 5c 86 e1 | 4c f9 f7 be 0f ad 2a 08 14 2f 01 cf 99 bb 08 03 | e1 c1 46 1b 92 0e 69 b0 d7 e1 d7 63 33 81 c3 c3 | 6e 9a 75 ae ba c8 31 37 9a f9 f5 59 d2 c3 7c 07 | c0 44 bd 67 c4 36 13 82 f6 9a 1b bf dd 19 d3 a7 | 1f 9b af 3b 56 e1 48 c3 b7 44 f8 fc bf eb 18 f9 | dd 29 49 e7 68 79 bf 94 71 6c ee a8 79 a8 b8 32 | 64 f6 0a 92 59 a9 6a 2e 51 22 2a 8f f3 dd d7 01 | 71 66 37 a9 16 dc 8f 9f 9b 19 8a 04 d9 aa a9 68 | c6 3a ea 8d fa b5 5a 51 76 f8 d4 87 5a cd c9 16 | aa cc 2c bc 9b 24 ad be ac cc ef b3 e1 6c 96 1e | 04 cd 1e 40 8a 89 0a d7 df f5 fd 0b 78 38 cd 04 | 29 00 00 24 07 2f 3c 32 0e aa 94 89 c6 1e 84 b9 | 47 5c cc fe a4 33 57 f3 0c 87 82 2a 55 07 2e 5c | 6c 57 05 76 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c9 20 1b a3 63 d6 96 1d 79 a9 7e 61 | d3 77 77 fd 71 9f 38 b2 00 00 00 1c 00 00 40 05 | 2c 04 dc 98 db ed 3b 9d e2 b7 4c 25 55 c5 d8 4f | 0d e0 01 76 | libevent_free: release ptr-libevent@0x7fb354085700 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | #688 spent 0.0787 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #688 connection "road-eastnet-nonat-95" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb38000f8f0 | handling event EVENT_RETRANSMIT for parent state #725 | start processing: state #725 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #725 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-196" #725 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-196" #725 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.23907; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.011828 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46aa5fc0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #725 | libevent_malloc: new ptr-libevent@0x7fb354085700 size 128 "road-eastnet-nonat-196" #725: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.196:500 to 192.1.2.23:500 (using #725) | 64 5e 88 2e 86 68 44 93 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 59 d0 5b 9b 94 b3 86 8e 64 38 5a 09 d0 e8 64 | cf c2 d4 15 da d7 21 e6 4e 8c 6b 11 1e e8 ad 65 | 2b bd ab d1 ec 70 ff c8 0d e9 d2 07 ec f4 0b 5b | 5f b2 e7 3b 24 74 0e e2 94 9d 3a 23 3b 5b 55 7c | ed 09 9a e3 6a ff ac 51 22 72 69 81 f0 1e 34 21 | 12 8d 74 23 22 5b cd 06 6c d7 75 d8 45 5b fb 4d | 85 65 7b 46 e7 aa 98 f1 74 d1 b6 9f c8 d1 7d 99 | 61 08 9e 85 6a 83 33 63 c7 3f bf f2 9d 91 d4 fd | 7f 40 06 4e ba 07 60 0b 06 c4 8b f3 84 f7 92 b4 | 2d 08 89 d4 0a 59 ef cd d0 85 03 6f 8f 85 c5 8e | 7e 4a 7f 5a 22 e5 ce 0e 62 2d dc cb f4 3c 17 f0 | 27 f6 d1 42 16 70 1d 6e 7f 4e 76 12 9c d6 e4 08 | 70 2a 6c f3 42 1f 73 22 fe 78 46 af d0 cf 5f fc | f9 7d 2b 8c 1f b4 95 d9 11 2f d3 5b 1e ac 55 2b | 9d 0e 3d 6a 04 9d 00 d0 a8 13 41 91 76 fd 15 44 | 39 7f 60 0b fd e8 a5 da f1 73 89 3e 95 bf 44 8f | 29 00 00 24 65 31 0e 50 dd ad 39 44 4e c9 44 5c | 03 5d cb 07 2b 3f e9 f7 c8 48 35 5a 83 42 5a 7c | 08 53 78 28 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 42 e1 7e 60 6f 94 83 21 09 67 4d b9 | 49 66 ea b2 f6 c4 46 b6 00 00 00 1c 00 00 40 05 | 2e 88 34 b2 e3 1a 64 25 09 3f 69 42 1a 75 eb 83 | 23 7c 1f dd | libevent_free: release ptr-libevent@0x7fb35c0cfb20 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | #725 spent 0.0731 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #725 connection "road-eastnet-nonat-196" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a6b490 | handling event EVENT_RETRANSMIT for parent state #729 | start processing: state #729 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #729 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-240" #729 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-240" #729 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.239152; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.011573 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb38000f8f0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #729 | libevent_malloc: new ptr-libevent@0x7fb35c0cfb20 size 128 "road-eastnet-nonat-240" #729: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.240:500 to 192.1.2.23:500 (using #729) | 67 a1 5b 23 16 28 fb 57 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 08 81 a9 49 57 bf df e1 f1 ea fa f5 92 44 d9 16 | 0e ea 66 38 d8 dc 75 6f 21 e1 c4 ca 83 4d 4d a6 | a8 40 61 2c 03 9c 81 09 e4 2c db 8c 6b 07 73 a9 | f5 96 45 79 32 38 25 d0 cb a7 7f 05 3f 22 9d 55 | 94 52 09 92 47 a0 99 ce 8b f9 2b b1 16 c5 6d d5 | 5a 5f 80 8e 4a 88 73 f6 19 b4 2a 58 b1 99 a3 f1 | cf 10 1d ee 49 52 bf ae ad 75 79 fc 4e 1b 70 c4 | fe 0d d5 21 ff c3 16 1c 6a 4f a2 1b da 3f dd 80 | b7 98 1e 3c e4 19 40 2c ba 2b 1b 02 76 ef 1d 8c | 32 68 18 21 59 6e 3c 68 cf e3 eb 77 5f af 35 46 | 5f aa 30 45 02 11 0a b4 a8 8f ff 89 3e 96 86 5d | 06 be 71 8d 28 b2 ee 71 59 26 45 c0 3b 2a 27 ad | fe 98 e4 a6 a7 ad 6c 8f d2 ce 96 56 c5 bb 39 51 | 6a 23 cb d8 31 3d 75 5c 91 5d 1e 01 ca 04 2a 2e | 70 54 ab 56 07 f2 3e 14 8f 66 51 e0 bf d5 13 d5 | 73 c4 4d 14 6a 43 47 b4 f4 a1 4b 3b 4b 58 bf 93 | 29 00 00 24 ba eb 8a f4 d2 cb 7a 42 9f 66 73 21 | de 49 71 25 d5 fa ae 34 96 57 d1 6a d8 63 50 0d | e7 fe 39 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 41 4e 71 12 16 99 de 9d 6a f1 f6 ef | 1c a0 b8 7d 93 f0 39 1e 00 00 00 1c 00 00 40 05 | 19 1d 16 93 50 07 d9 58 09 ed 23 95 2e a0 e3 31 | 82 b4 65 2f | libevent_free: release ptr-libevent@0x7fb344074e80 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a6b490 | #729 spent 0.067 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #729 connection "road-eastnet-nonat-240" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ad43c0 | handling event EVENT_RETRANSMIT for parent state #669 | start processing: state #669 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #669 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-180" #669 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-180" #669 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.239229; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.987202 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a6b490 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #669 | libevent_malloc: new ptr-libevent@0x7fb344074e80 size 128 "road-eastnet-nonat-180" #669: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.180:500 to 192.1.2.23:500 (using #669) | 46 a2 b7 1a 0c fe 64 26 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 7e 31 53 7e b2 89 dd d9 14 72 7d 9f c9 13 b2 a7 | 63 19 33 b8 10 a2 fe 59 17 6b 7c b7 37 86 65 b5 | 65 e2 70 cb 0a 7f 2e 78 64 ed 5e 82 f3 0a 01 66 | 19 63 cb 22 32 9a 15 07 e2 8f 9f 13 78 a1 94 38 | 6a 3a a9 9c 68 86 57 44 79 fe f5 47 ce f2 42 04 | 1b 64 29 d4 d9 a8 31 e2 d6 94 ff 12 34 20 67 33 | 3f eb 27 b6 ea 9f 51 b5 31 d7 e4 79 d1 75 2f 2e | 0b e0 61 43 30 7c 1e 88 88 5d ae 34 52 7d 83 d2 | 70 96 22 1a 57 50 af 3c 3f b0 a5 d1 35 bc b2 a5 | 5d a3 98 e3 c3 65 34 bb 25 67 04 de 8f f7 d1 38 | 62 08 6f 4a 4f 97 9e 27 42 a1 3c af a0 71 dc e9 | 88 9c e5 3e 13 70 8a 7a 18 08 7e f5 c7 28 a8 96 | ea c1 cd 65 03 cd 4a 04 4f c8 6b 29 fd ca 51 41 | 35 65 3e 5d 3d d3 fe 1c ec d9 09 50 c2 51 46 0d | d8 9f 47 d1 97 f0 ab 20 09 d6 b0 da 46 e7 a7 26 | 2f 67 cc 15 6a c3 da b4 1c a5 57 88 dc 7d ec 25 | 29 00 00 24 a1 72 a5 b5 61 3e 68 21 f0 1b e4 c9 | 7e f5 3a 1e e4 e5 46 a1 1b 4c 51 eb 2c c7 94 6e | bc 3a ce d6 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c3 dd 73 ee 85 14 4c 35 d3 87 b0 51 | 27 94 ae 1d 74 91 ea ff 00 00 00 1c 00 00 40 05 | 6b 7f 6d de b3 f2 f1 3e 78 85 e6 36 cd 13 84 01 | 5d a6 40 15 | libevent_free: release ptr-libevent@0x7fb35806a310 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ad43c0 | #669 spent 0.078 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #669 connection "road-eastnet-nonat-180" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb350017ea0 | handling event EVENT_RETRANSMIT for parent state #616 | start processing: state #616 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #616 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-42" #616 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-42" #616 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.239316; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.969078 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ad43c0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #616 | libevent_malloc: new ptr-libevent@0x7fb35806a310 size 128 "road-eastnet-nonat-42" #616: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.42:500 to 192.1.2.23:500 (using #616) | 51 51 c2 14 b4 88 86 45 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 5c 6f 7d 95 94 eb 35 d4 79 fb b8 ed ce b6 0e 8c | 0b ac 78 e7 dc 5d 85 9e fc ca bc 30 a0 af fc a7 | 83 d0 df 38 f5 b9 0e 7c 6c 0f 7c 9b e7 18 2b b0 | b1 47 6e d5 e1 d8 67 a0 a7 53 55 b4 30 4b 4f 05 | e0 9f 68 a5 8b 3d 3d f0 54 7c c1 cf 5b d8 d1 7d | 73 db c0 6b 87 64 87 39 90 85 4b 1a 6e 4a 55 8d | 36 06 71 74 4d 94 c0 cc c3 ca da b9 47 09 e4 21 | a9 ad 84 f0 74 96 ac a8 c6 80 80 8d a7 fe 6f 3b | 0b 61 80 4f cc e0 18 20 5b bc 01 56 5b 21 5b 7d | cf 65 0c bd 2c 1a 83 c9 6d 39 ba 26 63 02 84 48 | b0 ba 3f 13 d9 59 1f b5 ff fe 6c cb 2a b4 66 26 | 36 f8 c3 21 35 08 08 9d 44 88 c1 93 d8 01 57 ec | 98 49 a7 75 ff fd 0f 01 68 c6 f6 cf 50 73 98 74 | 99 a3 bf 5c 1f c1 3e 2b 89 23 5e 9c a4 d5 4a 64 | 1a 16 30 ca 38 de 10 97 61 4d bb b6 7b 95 79 00 | cb 8b 1d 61 ae 38 3a d9 0a 4b 59 fc 82 07 70 c7 | 29 00 00 24 6c a0 b2 b3 6c 5a 92 97 4b 6e 2b c9 | 2c 62 c9 95 6b 4d be 03 71 77 39 4f 3f 77 cf a6 | 3f 8f 1a 3a 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 c5 7b 4c b3 5e 00 28 2b fa 81 9a 72 | 9b 96 b8 73 09 50 16 c0 00 00 00 1c 00 00 40 05 | 46 0e 22 1c 6d 17 ec 1e 80 d6 7b 39 9b 19 6c 8a | d4 c4 4d a0 | libevent_free: release ptr-libevent@0x7fb340071b90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb350017ea0 | #616 spent 0.0795 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #616 connection "road-eastnet-nonat-42" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36800d120 | handling event EVENT_RETRANSMIT for parent state #672 | start processing: state #672 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #672 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-136" #672 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-136" #672 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.239408; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.003254 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb350017ea0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #672 | libevent_malloc: new ptr-libevent@0x7fb340071b90 size 128 "road-eastnet-nonat-136" #672: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.136:500 to 192.1.2.23:500 (using #672) | 8a 51 a3 6f 68 f7 9e 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | dd e0 86 ed 60 a3 d0 a6 8e 6b 9a 00 e5 84 70 47 | 32 b4 99 4f 0d 05 58 a3 bb 0d be c7 e9 7e cd ad | 4f e6 63 7d bb e8 41 3e fc 88 30 2c a3 77 90 4d | 35 a6 66 a0 1a ec 48 93 2f 14 8c 8f fe d5 df 84 | e5 b6 10 27 23 7d 77 97 15 e0 10 30 36 f6 b6 80 | 26 8c 8d 3c 23 cd 46 8c fe 9f 38 e4 8e 1c c7 31 | b5 28 84 af 9f c7 49 71 f9 9b 12 64 93 29 98 16 | 5a 87 88 39 9f ba f9 8b 6b 1a 6c 85 af 62 ca a4 | 00 2b d4 50 98 a6 48 d3 a9 8e f3 da 34 94 7c a4 | 1a 0a ac 81 46 8c 7d 48 0f ab 18 93 af 03 df 02 | df 31 b2 61 3d 21 11 b5 2e d1 3a bd f0 29 fc f6 | 44 a4 9e 23 a0 a5 78 a1 b4 fc 98 b3 83 06 25 39 | 76 e1 3c 9c b7 9e 50 5c cc a7 ac 96 00 fc 08 6f | 31 b8 68 11 66 46 8b 52 dd c4 ea 4d 22 5d d2 e3 | b7 89 33 b9 bd 6c 60 86 ae 27 9b 88 9a 4e 35 21 | 7b ba 09 1f bd a5 fb 07 d5 d4 0b 0f e2 d2 63 bb | 29 00 00 24 10 82 d2 ac eb af 8e 07 dc 69 e2 0d | 6b 97 c2 9b 07 bc 50 39 f2 b6 8e 4f f1 fa 6e 4a | 37 dd 2d 66 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 b0 8a eb dc 69 3b 2f bd 92 77 b8 05 | 58 f7 11 b4 d0 e4 bf 88 00 00 00 1c 00 00 40 05 | e2 45 f2 76 d6 58 48 de fd 60 b0 02 91 58 f0 cf | 83 ee 8f 98 | libevent_free: release ptr-libevent@0x7fb37c03e1a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36800d120 | #672 spent 0.0801 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #672 connection "road-eastnet-nonat-136" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a23190 | handling event EVENT_RETRANSMIT for parent state #696 | start processing: state #696 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #696 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-215" #696 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-215" #696 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.239496; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.007606 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36800d120 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #696 | libevent_malloc: new ptr-libevent@0x7fb37c03e1a0 size 128 "road-eastnet-nonat-215" #696: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.215:500 to 192.1.2.23:500 (using #696) | a2 ff 7d bb ae e4 ff 23 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | b1 47 a3 9f 01 68 3e 72 d7 77 d8 40 15 bd 56 fc | 1d 68 27 b1 4e be b1 22 9a e8 2a ba 9c a8 46 6d | db 09 7f 12 fa eb 65 08 f4 c9 16 2a 9e 01 b4 17 | 36 05 7a c7 1f e8 46 bc c3 50 58 1c e8 e0 92 da | 73 ba 9e 07 48 d5 9d f2 d0 7b 6e ea 42 6c 81 be | 44 c8 4f 38 a9 d8 4a 5b 62 42 5a 19 4d aa 02 1b | 7c d7 6e f1 a3 07 60 f7 3c 4c ac ba 84 59 ee af | 37 a6 9c 4c 62 92 69 93 89 e7 42 99 74 73 cf 68 | 4f f7 d5 72 0b 6f cf f9 81 78 7b 57 1a 33 23 56 | a4 67 f3 6a 02 58 17 74 48 e2 79 13 e4 bc 15 ce | ff ef 49 6a 4b df 9e 1e 45 f6 1e 93 0d 6d 9f da | 4c 33 f1 96 ea 06 4e 73 51 f1 24 f3 0a 23 b8 4e | 17 12 5d ad 67 9f e9 c9 0e cc 9a 39 38 d0 df 99 | 31 b1 98 f8 83 61 7a c6 bb a0 15 87 10 f9 0e 97 | 6f 73 60 11 87 3c e2 c8 09 90 f8 eb e8 87 a3 83 | f4 d2 44 24 91 0c cf 33 42 d7 4c 2d 4e 98 eb 2a | 29 00 00 24 54 bc d8 ff 7e 29 53 5d f0 b1 9a ed | 1a 65 ef 6c 49 ab 64 6e a4 de ce bb aa 3e 57 0c | 70 a3 44 4c 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 81 23 a0 ca af 8e 55 b3 fa 06 dd 4a | 8b f7 66 e0 0c 39 a9 54 00 00 00 1c 00 00 40 05 | e3 f3 b4 3a 4a 7c 3a c4 53 8f 78 d7 9c 55 fe 34 | 05 a1 fc 70 | libevent_free: release ptr-libevent@0x7fb34405eeb0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a23190 | #696 spent 0.0687 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #696 connection "road-eastnet-nonat-215" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a70b50 | handling event EVENT_RETRANSMIT for parent state #572 | start processing: state #572 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #572 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-13" #572 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-13" #572 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.23957; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.952481 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a23190 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #572 | libevent_malloc: new ptr-libevent@0x7fb34405eeb0 size 128 "road-eastnet-nonat-13" #572: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.13:500 to 192.1.2.23:500 (using #572) | ae 6d 7f 89 27 62 b0 3c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | fa 78 66 53 84 1a a1 cc 77 c2 d3 46 14 49 c7 a7 | f9 f4 42 bd ed cc 70 a1 f5 f8 c4 d7 3c 91 88 2a | 3d 9e 83 b6 af 23 02 04 fc 58 e6 76 b8 bc 6f 3d | e3 a8 79 73 32 9c d8 64 d1 bd 4e cb 31 26 96 5f | f4 96 4f ff 80 84 2b 76 9a 2c 0b 78 4d c7 a7 39 | 8c 0b 43 fe 1a ab fb f6 42 71 6f af b4 37 f9 74 | 81 28 44 35 64 2e 59 d7 a3 88 97 bd 34 c6 2c 7c | c1 ef 65 e7 0b bd 37 30 3c ee f2 66 0b 28 7a 27 | 2a ba 30 fb a3 66 78 77 e9 23 14 b0 c0 ac 30 27 | a6 66 34 a1 40 07 ec e7 54 c0 52 99 c7 6b 37 d0 | a0 9a 5a 1f ce 21 9c 3f f8 06 85 27 6f 23 30 ad | 02 4c 8b 40 ed 46 68 4b c8 97 b7 56 b3 69 62 99 | d5 40 a8 dc 62 f6 2f 3e 9e b7 88 dc a5 86 5a 54 | ff 1b 85 38 b9 ed bc 18 95 1a ff e6 a7 39 0a 2e | e7 55 17 cd d1 2c e0 f8 49 15 7d b6 bb e0 3f af | a2 17 66 7c 8f 3c 67 d1 87 3d 7f be bb d3 05 fb | 29 00 00 24 7a 95 97 28 24 e4 3f 20 6f 1b b0 b9 | 00 dc 1a 54 3f 6c d8 cc cd 76 a4 2a 0f 96 20 2d | fe a2 65 7b 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 78 6e 36 01 db 56 da c9 c9 f6 21 e0 | 9e 8d 5d b9 d9 f9 82 a2 00 00 00 1c 00 00 40 05 | dc 5e 49 c6 b4 b7 74 61 6f 59 0d 14 88 e4 ba 50 | 0e 62 7e 46 | libevent_free: release ptr-libevent@0x7fb34406f6a0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a70b50 | #572 spent 0.0651 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #572 connection "road-eastnet-nonat-13" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb3500300a0 | handling event EVENT_RETRANSMIT for parent state #750 | start processing: state #750 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #750 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-251" #750 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-251" #750 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.239643; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.01601 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a70b50 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #750 | libevent_malloc: new ptr-libevent@0x7fb34406f6a0 size 128 "road-eastnet-nonat-251" #750: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.251:500 to 192.1.2.23:500 (using #750) | 66 c6 fb f7 91 6b fb df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 2d 56 4e 6a bf ea d7 ce 8c c5 13 f2 30 fd 41 ab | 3e d8 84 16 5c 00 fd 63 27 ec 37 f8 37 ca a8 cf | 61 e7 66 f0 cb a2 7d 48 60 51 06 3b ad 0f 96 30 | be 5d 4e d4 5e 3e 0f e2 92 ad ec cf 0b 28 1c a1 | 4d e9 8b 14 d6 a5 00 40 0b a2 42 6d 65 44 52 2a | ed 7b a2 a6 f1 52 01 55 50 fe 38 4d d1 1e 2c 17 | 6d dd 7a c3 13 e2 07 81 a0 94 d9 59 df 56 84 98 | c0 ad 91 50 e1 93 ec 06 ee 42 aa de c1 18 3f 59 | d8 25 7b 7d 03 a8 7e 0b 39 bd 42 00 e3 0b 12 a9 | 4a eb 7b cb 8d 49 f5 09 cf 9b 5d e6 19 4e c2 da | 42 79 15 bb 81 d0 dc b8 5a e8 5e 28 c3 da 56 65 | 77 9c 71 c2 ab 7d 10 b7 63 49 54 6f aa e7 23 17 | b2 9a 50 85 92 a3 09 71 79 f6 65 dd 01 fe bd 61 | 08 e7 af f9 f6 a9 e5 aa 68 45 84 c6 4c 79 c7 30 | ab 0d dd fd 10 65 03 5c 7a 2c 09 2f 85 16 4e ff | 01 45 23 1d b3 99 fd e2 fa 7d 09 11 f6 28 34 a9 | 29 00 00 24 75 d2 7b 7e 78 57 6c 86 0e 7d 5d dd | 33 fe 29 2d 0e ba 6e e8 a4 16 ad c2 25 40 f7 7b | e3 c5 56 88 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 f2 5e f7 09 e0 61 ab 7d 99 d0 bc 4e | 5c 13 08 f6 77 48 36 b9 00 00 00 1c 00 00 40 05 | 33 e2 5b 26 c7 f6 e2 7a ac c6 74 73 96 13 44 cb | f2 2a 57 fe | libevent_free: release ptr-libevent@0x7fb388090d90 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb3500300a0 | #750 spent 0.0656 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #750 connection "road-eastnet-nonat-251" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb36c012890 | handling event EVENT_RETRANSMIT for parent state #749 | start processing: state #749 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #749 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-176" #749 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-176" #749 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.239717; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.019295 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb3500300a0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #749 | libevent_malloc: new ptr-libevent@0x7fb388090d90 size 128 "road-eastnet-nonat-176" #749: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.176:500 to 192.1.2.23:500 (using #749) | 21 cc df 44 fb 91 db 61 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 17 1f c5 e8 8c da 2f 71 6f 87 ca 00 ac 50 65 c6 | be 36 51 01 ec 7e 83 51 09 eb 5d e7 2a 9f c8 ad | 66 58 cd 80 0a 9c 72 ee c8 d1 c5 20 4f 69 fb 92 | 13 65 d4 0e 1d 60 b8 43 6c fd 57 62 48 52 03 58 | 1f 30 23 02 a5 49 ac 37 6c b6 2d 96 9d 82 d8 a1 | ba c0 ed f3 40 36 e0 13 52 9d 8e 1c 5c b3 e3 4c | f2 78 1b 73 09 dc 52 b1 42 32 86 e1 28 0b 10 51 | 7f e1 bf a0 7c b2 ef e9 fa 73 6c 5e 12 69 7c 58 | 4e 1b 40 29 8f 20 2b 37 6e b7 c7 d7 63 7b 45 40 | 89 11 3c 89 89 0f b8 3d 1a 1c c1 76 50 59 ab 17 | 87 71 45 bc cb 1e a0 07 a8 8c 7d 0e 05 c2 ec 2b | fb 3c 29 c4 ba ca c8 e4 d1 73 b4 1b 53 de b3 a4 | 21 14 35 6d 70 c0 9f 7d a6 1f 1c e3 7c a8 3e 43 | cc 8e 74 be 9f f4 d4 7a fd 86 b7 9a fc 1b 2b 7e | cc df a5 1f 60 66 33 d4 ff 08 25 ca 1f d3 96 a0 | da 1e 31 8f a3 a2 b0 5a a2 09 c5 ee 5b 37 a0 f1 | 29 00 00 24 ef 4a 18 29 61 bc 8a 68 d0 f0 81 d1 | f3 7e a9 a2 f3 7e 3f 08 52 04 df 8a cd fc 2c b8 | d1 9d 3b c1 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6c 60 55 07 b3 0c 17 02 3e a6 d0 be | 6a 54 3c c2 20 5b a4 d7 00 00 00 1c 00 00 40 05 | ab 26 2f c6 c0 76 2f 1d 50 c7 79 f8 11 59 56 a7 | 82 5d 60 bb | libevent_free: release ptr-libevent@0x7fb36007fb40 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb36c012890 | #749 spent 0.0637 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #749 connection "road-eastnet-nonat-176" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46abbc00 | handling event EVENT_RETRANSMIT for parent state #727 | start processing: state #727 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #727 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-210" #727 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-210" #727 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.23979; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.01006 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb36c012890 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #727 | libevent_malloc: new ptr-libevent@0x7fb36007fb40 size 128 "road-eastnet-nonat-210" #727: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.210:500 to 192.1.2.23:500 (using #727) | 8b be 7d ad 6e 47 4b cb 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 03 ce c0 c2 e4 25 8d 86 08 cb bc 52 7c b3 ee 01 | 8f ba c4 6d 6c f4 6a 0f 46 b6 08 ec ce 35 fd 9c | a3 96 7a 4b 39 46 2f 87 e0 b3 24 68 bd 08 f7 00 | de fe bc 6e 99 53 33 72 6d 31 50 a8 3c bf 8e 11 | d1 0a 86 13 1f ce ce c3 0f e1 bc 5e 80 8e a2 d6 | 27 e8 f2 bf ec d9 e9 f3 3d aa 43 3a 6b 97 d5 34 | 59 78 15 39 b7 bd 30 ea b2 e1 44 a5 f8 e8 38 86 | 54 db 07 6a ef ad cc 3a 56 0e d2 27 fb 2a 77 ba | 36 51 b8 10 07 62 d5 90 4d ca 0a 32 87 1d ce b4 | 7e 83 81 e7 d9 b6 8e 25 b8 6b 2b 0c cf a3 60 19 | e6 bb d6 4e 72 2e 81 71 f8 13 f2 9a 9e d8 eb 8f | a8 36 ae 05 81 aa e7 46 61 6c 3f 81 1b 7b cf f6 | 87 cb 65 20 06 d0 84 24 80 2e 3a 60 fb 99 c3 62 | 5a 0a 79 d7 36 6c 19 82 db 33 f0 6e 27 96 59 38 | 58 4d f2 ec c1 c1 e4 2b e2 58 27 a6 55 42 ca 3e | 3f c8 1e 9e 7e b4 88 cc 40 5e 23 e7 74 a8 91 f7 | 29 00 00 24 64 58 e5 0d 0a 27 42 8e 74 e9 35 15 | 5e 05 1e ab 85 d6 6f 92 8b 8b 06 7e e2 32 18 1f | 9e 03 0b 36 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 71 5b 13 d9 03 56 0b 94 2e 9b 60 60 | d4 0c 9d 62 4a 5b 9a a3 00 00 00 1c 00 00 40 05 | 8c 55 6f f9 09 4d e0 77 bd 22 46 44 fb 95 c0 d9 | 83 9d 9f 2c | libevent_free: release ptr-libevent@0x7fb3640a6860 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46abbc00 | #727 spent 0.0648 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #727 connection "road-eastnet-nonat-210" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb37c018460 | handling event EVENT_RETRANSMIT for parent state #743 | start processing: state #743 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #743 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-233" #743 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-233" #743 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.239861; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.015359 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46abbc00 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #743 | libevent_malloc: new ptr-libevent@0x7fb3640a6860 size 128 "road-eastnet-nonat-233" #743: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.233:500 to 192.1.2.23:500 (using #743) | 33 68 6a 0b 04 fc 21 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 3d 54 1f 6f 5a 66 3f c1 42 1d 47 28 fc 43 9c 32 | a7 7f fc 41 a3 9c cc 7a 93 57 ab c6 8a a7 f4 3e | 46 34 bd 6b 98 5f 8e a7 fe 4c 9b 90 ee 04 ee 86 | 42 1c 02 b1 27 a7 b0 01 e0 8a 3e cf cb 39 6b a0 | 4b a4 c4 0c 65 cc 28 25 a4 ad 65 49 aa 92 21 1a | 8f a6 23 05 37 8d 6e d1 a2 88 57 12 d3 e8 bd 69 | 1c c9 0b 75 f5 df 2d 58 5e a5 72 a2 fb 4c ca 52 | 9f 85 66 7f 63 b8 02 bf d7 3e a0 09 53 f4 72 19 | 87 d5 3c cb be 53 b9 59 65 7c de 29 3e 98 f6 97 | 02 6b 58 24 68 71 6e 3b d0 92 ea b1 ac 32 a9 28 | 8e 3a 77 35 b3 34 3c 3d ad 6e 6a 29 9b b7 88 7b | 86 bb 62 15 16 30 35 3d 78 71 08 9c bb d0 51 c0 | 23 56 79 b7 91 8c 7a d0 c1 ec f6 00 b7 6f 72 d8 | 4c 61 2d 3e 9f 3d 71 4d ce 0f 50 83 03 11 bb 0a | 99 e2 07 9c b6 80 4a 86 5a 9a aa 9c 1b 0a e1 e2 | e8 d9 11 28 45 53 df c8 4d 16 ae c0 7c 32 f4 11 | 29 00 00 24 1a c2 58 3c 56 a7 f0 5a d9 b8 5a 6b | cc b3 c9 3f ec 7f b9 16 85 28 70 f6 0a 4a 2a 42 | e9 0f c0 6f 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 2d 52 f6 73 3d e6 8e 99 7b ad bf dc | 06 39 16 3e d4 a9 07 80 00 00 00 1c 00 00 40 05 | d3 9b 09 18 b0 e4 0a b6 7c 3b a5 fa dc 8a ee 1d | 09 1b 83 75 | libevent_free: release ptr-libevent@0x7fb358079410 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb37c018460 | #743 spent 0.0653 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #743 connection "road-eastnet-nonat-233" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46a647d0 | handling event EVENT_RETRANSMIT for parent state #712 | start processing: state #712 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #712 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-194" #712 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-194" #712 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.239934; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.007134 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb37c018460 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #712 | libevent_malloc: new ptr-libevent@0x7fb358079410 size 128 "road-eastnet-nonat-194" #712: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.194:500 to 192.1.2.23:500 (using #712) | cc 56 db b7 23 55 ce 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 93 df 8d 7e 48 22 64 49 fb b5 e2 a2 dc b8 50 4b | ad 6c 59 bf 7f 2d 41 f4 f2 ce 30 80 51 45 ce 32 | 71 a3 c4 d8 bc a9 37 56 1f 5e b7 0b c3 7d 7a 94 | 96 5b f0 c5 d3 95 0b ab 37 3c 2b 1b 89 34 d4 8a | bb f5 48 cc ec 2c f3 5d b9 8c bf f8 d0 8a 72 43 | bc ac 8b 06 75 12 f2 db 3b 73 18 e9 5c ba e8 72 | fb a8 ce 9c c0 4b 82 4f 9a f1 5a af 77 31 0b 07 | 66 ce ea af be 31 11 ca a5 70 ec 43 3f c8 a2 17 | 44 95 1d 13 29 48 51 d8 f9 1e 06 a1 cf e1 54 e5 | 99 68 5c 3a da 63 33 ed 4d d2 25 dd 51 25 1a 08 | b9 43 e0 11 8e 0a 46 c6 51 cd 58 79 c0 d9 94 c1 | 9e 7d a5 08 99 f8 a7 56 cc 9a d6 3c c1 7c 79 1e | 4b 40 9d a4 b9 7f e5 00 44 51 bf e8 b1 5b 15 8c | eb 58 e0 f9 22 15 0c e8 84 6d 51 2a c6 4a aa 29 | 1e a4 72 7c 08 fa b1 ea d1 7f 66 aa 4d 4f fb 0c | fb 1b d3 9b f8 9a 00 a8 9d e6 49 e0 43 79 c6 38 | 29 00 00 24 22 6c a7 ec d0 85 2e 53 64 0e 79 9f | 11 86 be 1a d4 75 b2 6e 35 aa f3 7b be 0d d6 fa | a5 73 61 93 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 93 88 55 31 03 a8 f3 ca 6b 47 12 f6 | 0d 9b de 88 5f ca 38 91 00 00 00 1c 00 00 40 05 | 71 a5 54 81 8c 44 b1 23 48 73 5c a0 27 0f b9 ea | 05 8d 05 a3 | libevent_free: release ptr-libevent@0x7fb35807ebf0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46a647d0 | #712 spent 0.0647 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #712 connection "road-eastnet-nonat-194" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ae8980 | handling event EVENT_RETRANSMIT for parent state #614 | start processing: state #614 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #614 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-47" #614 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-47" #614 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.240007; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.977725 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46a647d0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #614 | libevent_malloc: new ptr-libevent@0x7fb35807ebf0 size 128 "road-eastnet-nonat-47" #614: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.47:500 to 192.1.2.23:500 (using #614) | e2 44 b3 0f 15 7b db fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 57 92 e1 08 e5 43 41 79 c5 5d f0 96 29 52 40 c0 | 97 e5 c8 ff 05 3e 53 fa 62 76 da bc 72 8a b9 4c | f7 18 b8 6a ca 45 53 24 52 f1 8d 1e 49 3a 17 8c | ef fa dc 34 b5 f9 4d b5 58 f3 46 8b 4a dd 09 9b | ea 93 c2 33 65 02 3e 54 93 99 4f c8 fe a6 b2 d6 | af 78 80 dc 24 65 ba 1e a7 5b c2 a5 cc d3 1f 7e | cf d7 a5 8a 8b a8 49 5f d7 0f 85 09 d8 92 ad 49 | d7 a4 fe c3 04 e8 a3 5b 39 08 a0 31 46 6a 16 61 | 4d 3f 91 60 20 e1 05 33 e6 27 94 27 aa 1f fa 73 | 54 7a 93 dc 72 57 0e c3 11 46 f1 19 8d 7f 0c 06 | 3c c4 e4 73 42 6f 8b 92 68 78 39 66 88 cf c0 3b | 5d 6d 07 37 a6 42 2d 6d 6e 59 f0 5e 5c a4 19 79 | 26 9e 6d 08 ab 5d 74 ce eb ad 27 d1 db 09 88 c8 | f0 a6 93 29 46 42 ee 9f bb 5d 95 45 12 52 b4 73 | e2 c1 41 95 83 74 fd cf 99 ef 67 58 02 64 29 39 | da 81 64 9c 6a e9 22 3f 8a e7 56 f4 13 9b 71 87 | 29 00 00 24 86 16 ba 44 69 73 79 7d 89 32 49 92 | 68 97 7e 5d 09 b2 8b 2b eb b1 d6 6b 17 01 84 df | c9 f4 9b 53 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 ab 2e 6b fd 7a d6 ac c0 e0 4d 65 46 | aa 7e 2f e7 b8 bb 4d 39 00 00 00 1c 00 00 40 05 | 1e 6a 1e 6b b1 89 1b 8c 76 4d 90 e8 7d 48 17 e8 | e9 bf 32 eb | libevent_free: release ptr-libevent@0x7fb388059ea0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ae8980 | #614 spent 0.0701 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #614 connection "road-eastnet-nonat-47" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46ab3940 | handling event EVENT_RETRANSMIT for parent state #655 | start processing: state #655 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #655 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-178" #655 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-178" #655 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.240106; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.986342 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ae8980 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #655 | libevent_malloc: new ptr-libevent@0x7fb388059ea0 size 128 "road-eastnet-nonat-178" #655: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.178:500 to 192.1.2.23:500 (using #655) | 11 f9 62 21 99 31 60 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d2 f2 c8 14 dd 6e 4a d9 42 c0 c4 4a f0 e7 cc ef | e7 5d 2e b6 49 23 3e e0 de 3b f5 ff 2f 66 a3 ff | d2 2b e0 79 ae 88 e7 91 da fb 2a 14 ef d3 ed 02 | fc 9d ab 8d 00 09 6b 86 12 46 d7 1a 25 33 8b 76 | 10 a0 b9 ab 87 66 c2 67 94 c5 19 d4 99 8a 3a a4 | e0 e5 fb 75 02 61 f9 b6 e5 03 ae 93 bc 63 08 03 | 23 87 dd 87 f1 99 04 c1 65 24 a2 b2 0d 42 f1 58 | 8f 80 2d d4 5b 45 fc 67 e3 e3 b4 96 3f 0d 08 58 | e8 5d 60 1c d9 ae 33 24 88 cd 2b c2 77 69 a9 2e | fc 24 c9 ae ae 48 af 44 27 bb a4 49 3a fe fd 12 | bf 17 d1 44 1a 6b 13 72 74 3a 58 25 69 e0 e0 38 | 37 70 99 09 b2 2d 6f 7e 81 73 3d d1 da fb 1c 86 | 50 79 92 bc 8e 3e 67 d4 3a 50 80 1c fe c2 a2 85 | 0d fc 0f 2c 8a 52 82 a7 dc bc 81 8b 7e a0 58 ba | 52 a1 bb d1 15 13 4d f3 ec 8b 68 65 4f 19 d6 4e | b1 55 17 76 9d 5c 64 09 58 93 15 e2 e9 b9 1a c8 | 29 00 00 24 64 6a 25 12 77 44 cd 38 c7 a9 25 d3 | 2b d2 f7 f1 74 31 8d bf 24 ab 69 dc 68 25 0e a3 | 82 ae d1 ef 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 6d aa d6 22 51 86 a0 91 29 6a b4 b9 | a5 b0 03 8a 19 a3 96 50 00 00 00 1c 00 00 40 05 | b7 fb 94 0f 85 81 96 f9 c7 ad ab b4 d9 f2 a7 73 | 54 2b d4 8b | libevent_free: release ptr-libevent@0x7fb35c05c110 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46ab3940 | #655 spent 0.0662 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #655 connection "road-eastnet-nonat-178" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb378012bf0 | handling event EVENT_RETRANSMIT for parent state #705 | start processing: state #705 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #705 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-219" #705 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-219" #705 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.240187; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 4.022956 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x557d46ab3940 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #705 | libevent_malloc: new ptr-libevent@0x7fb35c05c110 size 128 "road-eastnet-nonat-219" #705: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.219:500 to 192.1.2.23:500 (using #705) | e4 ea d6 a0 2f c9 a3 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | 73 7c c8 42 8f 06 18 fc 5b 92 d1 29 9a b8 7e 41 | f6 a4 31 12 5b 26 92 fd 9f 47 11 64 9e 6f f4 e4 | 12 64 a9 5e 66 b6 e1 58 06 5c 6e a4 d8 cd a0 77 | d4 f2 75 d0 15 29 94 5e 44 f7 e6 25 17 2d ce d5 | b2 ac 28 52 ff 01 37 57 30 3e 89 ab 0b 8f b9 8c | 99 a4 b8 00 95 ca 4d be f0 0c 6f e9 1e 6b 01 06 | 85 ec 86 52 05 73 ad be b1 77 31 d9 4f 2a bd d2 | cb 65 32 9b 1d 91 2b 57 c3 a3 74 9f d6 0f df 80 | 71 49 8c 6a 29 4d 67 17 1a 96 61 69 5f ee 1a 4e | be 5e a4 e5 77 ac 19 89 87 3e 45 49 18 e7 4c fb | bd 46 d7 d5 ca 9c b5 11 06 64 b4 70 c8 30 4d 79 | a1 73 5b 2b 6c be 9e 44 fe 0f 31 6c 40 a6 5b 7c | f7 75 57 62 c5 d6 88 57 3b 7c e0 26 3f e9 11 e8 | e0 a2 3f 0b 6b c6 59 22 42 04 11 16 76 9d a3 7b | 56 7a 4e 9e 2e fe 0a a4 c4 36 99 d2 a5 5b 55 6a | 02 f9 54 cd b4 25 1d 90 44 15 dc 73 12 b3 5f ee | 29 00 00 24 2d 29 13 9f c9 17 1e e2 ce e9 19 17 | 61 b2 63 4d db 33 56 ec 2e 67 9b a1 ab af 70 d6 | 30 e4 5f 08 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 89 a0 7e 4b fe 45 8e e8 50 f5 c0 09 | 02 48 60 69 27 23 d3 25 00 00 00 1c 00 00 40 05 | 9f 1d 84 c9 70 7f e4 45 24 70 e4 75 c6 bd 55 ca | 26 ec 6e a8 | libevent_free: release ptr-libevent@0x7fb38806a670 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb378012bf0 | #705 spent 0.0661 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #705 connection "road-eastnet-nonat-219" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x7fb34c005860 | handling event EVENT_RETRANSMIT for parent state #605 | start processing: state #605 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #605 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-85" #605 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-85" #605 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.240267; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.976344 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb378012bf0 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #605 | libevent_malloc: new ptr-libevent@0x7fb38806a670 size 128 "road-eastnet-nonat-85" #605: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.85:500 to 192.1.2.23:500 (using #605) | 7d 69 66 b6 0b 09 69 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | d6 9b 48 45 a7 cd bb af 89 5b c6 84 3e 6b 29 f5 | 82 21 ed b8 01 9b e9 d6 eb 48 22 a2 47 4c 8b 00 | 72 84 38 7c 84 0f e9 29 65 9f 0e 0b d9 68 a1 08 | 85 41 62 70 51 2b 55 5e e7 51 39 59 cd ab dc 26 | 7f 43 85 55 c1 52 ee 33 ef c7 05 bb 4f 2b ac bb | 45 e8 b5 9c 8c 32 a9 0d 25 75 95 bd 99 f6 bc 7b | 41 12 70 0b a9 4f 28 9d 03 5a 76 fc 2d 26 df 1b | e3 79 ba fa a5 3f be 69 d9 fb 38 21 c3 3b c5 39 | 69 72 3d 42 47 0c 0b a5 70 56 b5 cd e3 db e1 b4 | 55 5f 2a 24 b5 b7 72 1d 3c 1e c4 16 a7 e8 bb d4 | 1b 31 e8 de 60 cf e9 e1 53 db 5b aa 1e f3 c3 ea | 73 35 bd 86 03 0c b1 c2 d4 c2 26 cc 43 5f a7 99 | 82 c7 95 6d 26 de e4 a9 78 fc 7c 80 08 50 d4 6d | 8a 23 a2 4b 98 e9 f1 f6 58 c1 c4 56 2d b4 d5 be | e1 4a 66 10 6a c0 ec 3e 63 d7 99 07 ed 98 3e de | 3b 38 1f 2e e8 77 14 e6 cf 9e 3f eb e7 72 77 34 | 29 00 00 24 e5 d6 0e d1 07 36 d0 c9 9d 74 f9 e8 | 91 f8 2d 2e ee 7d e8 c8 bf 6d c4 2d b0 02 ab f4 | ee 91 2c 37 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 a0 1f a0 9c 16 7a 2c 8b 61 32 59 c1 | 2b 37 d9 c7 8d 13 c7 70 00 00 00 1c 00 00 40 05 | 0c 6c 27 3d 37 c9 55 25 41 13 59 12 57 c6 07 0e | 1b e6 b3 6d | libevent_free: release ptr-libevent@0x7fb36c06a210 | free_event_entry: release EVENT_RETRANSMIT-pe@0x7fb34c005860 | #605 spent 0.0675 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #605 connection "road-eastnet-nonat-85" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) | timer_event_cb: processing event@0x557d46b1c440 | handling event EVENT_RETRANSMIT for parent state #539 | start processing: state #539 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:250) | IKEv2 retransmit event | [RE]START processing: state #539 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in retransmit_v2_msg() at retry.c:144) | handling event EVENT_RETRANSMIT for 192.1.2.23 "road-eastnet-nonat-14" #539 attempt 2 of 0 | and parent for 192.1.2.23 "road-eastnet-nonat-14" #539 keying attempt 1 of 0; retransmit 4 | retransmits: current time 49724.240347; retransmit count 3 exceeds limit? NO; deltatime 4 exceeds limit? NO; monotime 3.933685 exceeds limit? NO | event_schedule: new EVENT_RETRANSMIT-pe@0x7fb34c005860 | inserting event EVENT_RETRANSMIT, timeout in 4 seconds for #539 | libevent_malloc: new ptr-libevent@0x7fb36c06a210 size 128 "road-eastnet-nonat-14" #539: STATE_PARENT_I1: retransmission; will wait 4 seconds for response | sending 452 bytes for EVENT_RETRANSMIT through eth0 from 192.1.3.14:500 to 192.1.2.23:500 (using #539) | f3 ba fb 39 a0 6d aa 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c 01 00 00 0c 80 0e 00 80 | 03 00 00 08 02 00 00 02 03 00 00 08 03 00 00 02 | 00 00 00 08 04 00 00 0e 28 00 01 08 00 0e 00 00 | a6 bb d0 0a e4 91 67 ed 30 3c 0b a8 5b 47 6e 58 | 54 a6 1f 2c 4e 7f d0 b0 bd e3 fb 18 4b 44 d6 1a | e7 86 6e da c5 94 ab b3 8d 6a 0d 7a e8 8e da 48 | 7f dc 72 ca c7 8b 8f e2 4b c2 09 25 60 11 ac 5f | ec 6f 9d 98 47 5c 60 fe c1 7b f0 93 49 fd ed 12 | b4 19 6a d0 14 ce f0 70 42 3f 04 32 d9 04 2f b2 | ca 5d 42 18 c3 28 44 0e 3f 08 71 5a c8 bd 7b 85 | a2 71 ba 72 c1 49 94 26 a9 aa 95 8a 17 20 47 31 | 6d db 6f 70 0f 42 41 97 8e fc 16 21 2d b2 dd 9c | 7c e3 bd 45 5f 99 25 ca 3b 09 1b ee c5 5d c9 18 | 96 1d d7 d1 61 c8 0b 67 e4 93 1e ef 62 98 f5 94 | 75 89 49 0d 58 ec c4 e6 07 56 cd e4 b6 53 c7 69 | e1 47 2c d5 f5 45 3c 00 11 d4 1f 84 61 b8 f1 04 | fb 90 dc 8a 6c 66 1c a2 30 6a 74 1f ab 66 b1 84 | d7 b4 5a ef a0 9a f2 72 32 b7 05 ac 32 be 29 ab | f5 fd d0 b4 26 2e 08 9b f4 e6 30 ae a7 38 30 21 | 29 00 00 24 51 ce ef f2 75 41 8b 68 df 93 8c 40 | d9 7b 58 fd 3b 35 84 b8 48 7a 28 13 ee d4 9f 84 | 78 f2 6c e3 29 00 00 08 00 00 40 2e 29 00 00 1c | 00 00 40 04 74 be bb 4b fb 68 df d5 84 df 76 9e | 60 25 a9 1c de 34 76 1d 00 00 00 1c 00 00 40 05 | 90 f0 a5 6e 28 7a dc 53 c0 ae 7c b6 a4 4c 57 62 | 61 16 fb b6 | libevent_free: release ptr-libevent@0x7fb3580843d0 | free_event_entry: release EVENT_RETRANSMIT-pe@0x557d46b1c440 | #539 spent 0.0653 milliseconds in timer_event_cb() EVENT_RETRANSMIT | stop processing: state #539 connection "road-eastnet-nonat-14" from 192.1.2.23:500 (in timer_event_cb() at timer.c:557) recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ce a6 92 c0 a0 a1 1c a1 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #580 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #580 | rejected packet: | ce a6 92 c0 a0 a1 1c a1 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 73 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-115" #580: ERROR: asynchronous network error report on eth0 (192.1.3.115:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0475 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b2 bb c0 cb 23 86 64 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #532 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #532 | rejected packet: | b2 bb c0 cb 23 86 64 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 17 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-23" #532: ERROR: asynchronous network error report on eth0 (192.1.3.23:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0382 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f4 6f 1b dd c3 97 a8 a6 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #660 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #660 | rejected packet: | f4 6f 1b dd c3 97 a8 a6 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 9e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-158" #660: ERROR: asynchronous network error report on eth0 (192.1.3.158:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0368 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a1 e8 20 43 a8 88 d4 dc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #719 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #719 | rejected packet: | a1 e8 20 43 a8 88 d4 dc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c1 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-193" #719: ERROR: asynchronous network error report on eth0 (192.1.3.193:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0372 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 53 89 83 1d 48 ce 70 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #735 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #735 | rejected packet: | 53 89 83 1d 48 ce 70 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ee 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-238" #735: ERROR: asynchronous network error report on eth0 (192.1.3.238:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.036 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6c 7d d5 ab c5 87 8a df | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #590 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #590 | rejected packet: | 6c 7d d5 ab c5 87 8a df 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 3b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-59" #590: ERROR: asynchronous network error report on eth0 (192.1.3.59:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0364 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6f f8 26 3d 46 67 06 44 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #662 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #662 | rejected packet: | 6f f8 26 3d 46 67 06 44 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 74 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-116" #662: ERROR: asynchronous network error report on eth0 (192.1.3.116:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0374 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 b3 87 97 a5 28 76 b9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #681 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #681 | rejected packet: | 43 b3 87 97 a5 28 76 b9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 aa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-170" #681: ERROR: asynchronous network error report on eth0 (192.1.3.170:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0358 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | bf 48 a9 53 c0 7c 6b d9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #657 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #657 | rejected packet: | bf 48 a9 53 c0 7c 6b d9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 76 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-118" #657: ERROR: asynchronous network error report on eth0 (192.1.3.118:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0359 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 62 ac e1 dc 78 47 49 d4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #741 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #741 | rejected packet: | 62 ac e1 dc 78 47 49 d4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-217" #741: ERROR: asynchronous network error report on eth0 (192.1.3.217:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0373 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ad 3e 6c 78 39 d7 59 85 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #573 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #573 | rejected packet: | ad 3e 6c 78 39 d7 59 85 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 53 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-83" #573: ERROR: asynchronous network error report on eth0 (192.1.3.83:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0366 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 2f d6 9f 11 e5 1c 01 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #569 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #569 | rejected packet: | 55 2f d6 9f 11 e5 1c 01 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 57 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-87" #569: ERROR: asynchronous network error report on eth0 (192.1.3.87:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0361 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 08 a9 69 6a 37 31 fe e9 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #547 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #547 | rejected packet: | 08 a9 69 6a 37 31 fe e9 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 24 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-36" #547: ERROR: asynchronous network error report on eth0 (192.1.3.36:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0373 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | cc 18 05 4d c7 59 29 89 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #692 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #692 | rejected packet: | cc 18 05 4d c7 59 29 89 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 6d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-109" #692: ERROR: asynchronous network error report on eth0 (192.1.3.109:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0361 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c9 60 e7 45 a7 98 e0 a0 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #570 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #570 | rejected packet: | c9 60 e7 45 a7 98 e0 a0 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 60 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-96" #570: ERROR: asynchronous network error report on eth0 (192.1.3.96:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0359 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 07 e4 97 ab 5f cb 91 ff | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #588 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #588 | rejected packet: | 07 e4 97 ab 5f cb 91 ff 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 11 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-17" #588: ERROR: asynchronous network error report on eth0 (192.1.3.17:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0424 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 55 f4 27 9b 2c 7e 0c 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #736 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #736 | rejected packet: | 55 f4 27 9b 2c 7e 0c 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e8 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-232" #736: ERROR: asynchronous network error report on eth0 (192.1.3.232:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0366 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f7 57 b5 67 5d 53 5d ab | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #579 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #579 | rejected packet: | f7 57 b5 67 5d 53 5d ab 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 81 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-129" #579: ERROR: asynchronous network error report on eth0 (192.1.3.129:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0361 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b6 c6 04 15 67 ea 52 35 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #625 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #625 | rejected packet: | b6 c6 04 15 67 ea 52 35 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1c 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-28" #625: ERROR: asynchronous network error report on eth0 (192.1.3.28:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0505 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 1a 50 87 84 a9 ff b6 9d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #651 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #651 | rejected packet: | 1a 50 87 84 a9 ff b6 9d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 78 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-120" #651: ERROR: asynchronous network error report on eth0 (192.1.3.120:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0463 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ab b5 91 0b be 67 d7 85 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #756 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #756 | rejected packet: | ab b5 91 0b be 67 d7 85 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 f9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-249" #756: ERROR: asynchronous network error report on eth0 (192.1.3.249:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.055 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 43 c3 80 a5 94 99 7d 4c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #753 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #753 | rejected packet: | 43 c3 80 a5 94 99 7d 4c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ef 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-239" #753: ERROR: asynchronous network error report on eth0 (192.1.3.239:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0518 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 87 f3 33 9b b4 5a 7a db | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #715 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #715 | rejected packet: | 87 f3 33 9b b4 5a 7a db 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-169" #715: ERROR: asynchronous network error report on eth0 (192.1.3.169:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0483 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a0 bc bf eb 69 ec 7d 60 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #549 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #549 | rejected packet: | a0 bc bf eb 69 ec 7d 60 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 7d 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-125" #549: ERROR: asynchronous network error report on eth0 (192.1.3.125:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0504 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 4c ec 39 dc 68 b5 59 63 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #618 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #618 | rejected packet: | 4c ec 39 dc 68 b5 59 63 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 8b 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-139" #618: ERROR: asynchronous network error report on eth0 (192.1.3.139:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0442 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ba fc 0a 40 dd 57 2f 49 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #754 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #754 | rejected packet: | ba fc 0a 40 dd 57 2f 49 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 fa 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-250" #754: ERROR: asynchronous network error report on eth0 (192.1.3.250:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.037 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 6d 4e 2c b0 bf cf 55 51 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #707 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #707 | rejected packet: | 6d 4e 2c b0 bf cf 55 51 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 d4 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-212" #707: ERROR: asynchronous network error report on eth0 (192.1.3.212:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0426 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 32 81 f4 dc 89 2b 8b e7 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #581 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #581 | rejected packet: | 32 81 f4 dc 89 2b 8b e7 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 79 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-121" #581: ERROR: asynchronous network error report on eth0 (192.1.3.121:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0369 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 2d 38 86 43 43 f3 e1 14 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #557 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #557 | rejected packet: | 2d 38 86 43 43 f3 e1 14 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 25 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-37" #557: ERROR: asynchronous network error report on eth0 (192.1.3.37:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0377 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a7 5c 91 a2 a0 c7 d5 b4 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #571 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #571 | rejected packet: | a7 5c 91 a2 a0 c7 d5 b4 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-46" #571: ERROR: asynchronous network error report on eth0 (192.1.3.46:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0359 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | c5 64 20 5b 1c 85 54 67 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #752 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #752 | rejected packet: | c5 64 20 5b 1c 85 54 67 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e7 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-231" #752: ERROR: asynchronous network error report on eth0 (192.1.3.231:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0364 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 70 a3 fd 1e a8 25 3d 1c | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #631 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #631 | rejected packet: | 70 a3 fd 1e a8 25 3d 1c 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 30 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-48" #631: ERROR: asynchronous network error report on eth0 (192.1.3.48:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0375 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d6 7f 43 f8 51 c2 59 cc | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #706 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #706 | rejected packet: | d6 7f 43 f8 51 c2 59 cc 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b9 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-185" #706: ERROR: asynchronous network error report on eth0 (192.1.3.185:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0431 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7b d9 27 49 fc 2f 27 ed | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #667 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #667 | rejected packet: | 7b d9 27 49 fc 2f 27 ed 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a6 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-166" #667: ERROR: asynchronous network error report on eth0 (192.1.3.166:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0534 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 23 4c b8 04 68 32 c1 56 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #704 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #704 | rejected packet: | 23 4c b8 04 68 32 c1 56 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 e3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-227" #704: ERROR: asynchronous network error report on eth0 (192.1.3.227:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0564 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 83 fb 36 71 76 29 5b 05 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #708 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #708 | rejected packet: | 83 fb 36 71 76 29 5b 05 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 99 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-153" #708: ERROR: asynchronous network error report on eth0 (192.1.3.153:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0613 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 9a e9 29 4a fb ed 2f 7b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #577 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #577 | rejected packet: | 9a e9 29 4a fb ed 2f 7b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-15" #577: ERROR: asynchronous network error report on eth0 (192.1.3.15:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0522 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | d8 1c 6e 85 91 89 a3 54 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #724 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #724 | rejected packet: | d8 1c 6e 85 91 89 a3 54 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 be 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-190" #724: ERROR: asynchronous network error report on eth0 (192.1.3.190:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.039 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | ae 90 67 40 0b c3 60 3e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #703 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #703 | rejected packet: | ae 90 67 40 0b c3 60 3e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 72 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-114" #703: ERROR: asynchronous network error report on eth0 (192.1.3.114:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0366 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 68 ad 39 62 89 bc a6 af | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #701 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #701 | rejected packet: | 68 ad 39 62 89 bc a6 af 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cb 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-203" #701: ERROR: asynchronous network error report on eth0 (192.1.3.203:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0362 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | be 68 21 bf 92 3b bd 83 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #656 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #656 | rejected packet: | be 68 21 bf 92 3b bd 83 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 c0 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-192" #656: ERROR: asynchronous network error report on eth0 (192.1.3.192:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0534 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b6 7b 13 e2 c1 f5 0d 74 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #621 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #621 | rejected packet: | b6 7b 13 e2 c1 f5 0d 74 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 35 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-53" #621: ERROR: asynchronous network error report on eth0 (192.1.3.53:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.042 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 0f ed 5a cf 38 b1 e8 4b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #626 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #626 | rejected packet: | 0f ed 5a cf 38 b1 e8 4b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 1a 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-26" #626: ERROR: asynchronous network error report on eth0 (192.1.3.26:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0423 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 73 d4 45 41 ab fb 7a 6d | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #638 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #638 | rejected packet: | 73 d4 45 41 ab fb 7a 6d 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 da 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-218" #638: ERROR: asynchronous network error report on eth0 (192.1.3.218:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0398 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 50 de 2b d7 45 9f 26 0a | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #644 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #644 | rejected packet: | 50 de 2b d7 45 9f 26 0a 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 a3 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-163" #644: ERROR: asynchronous network error report on eth0 (192.1.3.163:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0451 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 8a 10 9e 23 ac da 71 96 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #670 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #670 | rejected packet: | 8a 10 9e 23 ac da 71 96 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 93 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-147" #670: ERROR: asynchronous network error report on eth0 (192.1.3.147:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0368 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | a9 15 25 50 c3 89 9b ad | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #647 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #647 | rejected packet: | a9 15 25 50 c3 89 9b ad 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 ce 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-206" #647: ERROR: asynchronous network error report on eth0 (192.1.3.206:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0385 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 26 33 64 e2 99 22 09 91 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #650 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #650 | rejected packet: | 26 33 64 e2 99 22 09 91 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 97 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-151" #650: ERROR: asynchronous network error report on eth0 (192.1.3.151:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0362 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 06 13 d7 c6 41 b2 86 2e | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #612 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #612 | rejected packet: | 06 13 d7 c6 41 b2 86 2e 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 49 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-73" #612: ERROR: asynchronous network error report on eth0 (192.1.3.73:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0485 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | b6 55 6c 1f f7 96 4e 31 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #649 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #649 | rejected packet: | b6 55 6c 1f f7 96 4e 31 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 cc 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-204" #649: ERROR: asynchronous network error report on eth0 (192.1.3.204:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.059 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e2 44 b3 0f 15 7b db fa | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #614 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #614 | rejected packet: | e2 44 b3 0f 15 7b db fa 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 2f 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-47" #614: ERROR: asynchronous network error report on eth0 (192.1.3.47:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0587 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 11 f9 62 21 99 31 60 19 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #655 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #655 | rejected packet: | 11 f9 62 21 99 31 60 19 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 b2 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-178" #655: ERROR: asynchronous network error report on eth0 (192.1.3.178:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.053 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | e4 ea d6 a0 2f c9 a3 34 | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #705 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #705 | rejected packet: | e4 ea d6 a0 2f c9 a3 34 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 db 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-219" #705: ERROR: asynchronous network error report on eth0 (192.1.3.219:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0618 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | 7d 69 66 b6 0b 09 69 be | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #605 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #605 | rejected packet: | 7d 69 66 b6 0b 09 69 be 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 55 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-85" #605: ERROR: asynchronous network error report on eth0 (192.1.3.85:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0502 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() recvmsg: received truncated IKE packet (MSG_TRUNC) | **parse ISAKMP Message (raw): | initiator cookie: | f3 ba fb 39 a0 6d aa 9b | responder cookie: | 00 00 00 00 00 00 00 00 | next payload type: 33 (0x21) | ISAKMP version: 32 (0x20) | exchange type: 34 (0x22) | flags: 8 (0x8) | Message ID: 0 (0x0) | length: 452 (0x1c4) | State DB: found IKEv2 state #539 in PARENT_I1 (find_likely_sender) | MSG_ERRQUEUE packet matches IKEv2 SA #539 | rejected packet: | f3 ba fb 39 a0 6d aa 9b 00 00 00 00 00 00 00 00 | 21 20 22 08 00 00 00 00 00 00 01 c4 22 00 00 3c | 00 00 00 38 01 01 00 05 03 00 00 0c 01 00 00 0c | 80 0e 01 00 03 00 00 0c | control: | 1c 00 00 00 00 00 00 00 00 00 00 00 08 00 00 00 | a0 19 00 00 00 00 00 00 c0 01 03 0e 00 00 00 00 | 30 00 00 00 00 00 00 00 00 00 00 00 0b 00 00 00 | 6f 00 00 00 02 03 03 00 00 00 00 00 00 00 00 00 | 02 00 00 00 c0 01 02 17 00 00 00 00 00 00 00 00 | name: | 02 00 01 f4 c0 01 02 17 00 00 00 00 00 00 00 00 "road-eastnet-nonat-14" #539: ERROR: asynchronous network error report on eth0 (192.1.3.14:500) for message to 192.1.2.23 port 500, complainant 192.1.2.23: Connection refused [errno 111, origin ICMP type 3 code 3 (not authenticated)] | spent 0.0372 milliseconds in comm_handle_cb() calling check_incoming_msg_errqueue() | processing global timer EVENT_REVIVE_CONNS Initiating connection road-eastnet-nonat-244 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-244" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-244' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-244" | stop processing: connection "road-eastnet-nonat-244" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-251 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-251" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-251' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-251" | stop processing: connection "road-eastnet-nonat-251" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-231 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-231" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-231' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-231" | stop processing: connection "road-eastnet-nonat-231" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-239 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-239" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-239' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-239" | stop processing: connection "road-eastnet-nonat-239" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-167 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-167" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-167' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-167" | stop processing: connection "road-eastnet-nonat-167" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-71 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-71" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-71' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-71" | stop processing: connection "road-eastnet-nonat-71" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-250 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-250" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-250' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-250" | stop processing: connection "road-eastnet-nonat-250" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-237 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-237" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-237' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-237" | stop processing: connection "road-eastnet-nonat-237" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-48 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-48" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-48' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-48" | stop processing: connection "road-eastnet-nonat-48" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-249 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-249" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-249' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-249" | stop processing: connection "road-eastnet-nonat-249" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-188 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-188" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-188' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-188" | stop processing: connection "road-eastnet-nonat-188" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-130 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-130" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-130' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-130" | stop processing: connection "road-eastnet-nonat-130" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-39 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-39" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-39' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-39" | stop processing: connection "road-eastnet-nonat-39" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-72 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-72" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-72' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-72" | stop processing: connection "road-eastnet-nonat-72" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-221 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-221" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-221' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-221" | stop processing: connection "road-eastnet-nonat-221" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-34 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-34" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-34' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-34" | stop processing: connection "road-eastnet-nonat-34" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-245 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-245" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-245' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-245" | stop processing: connection "road-eastnet-nonat-245" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-146 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-146" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-146' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-146" | stop processing: connection "road-eastnet-nonat-146" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-87 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-87" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-87' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-87" | stop processing: connection "road-eastnet-nonat-87" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-19 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-19" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-19' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-19" | stop processing: connection "road-eastnet-nonat-19" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-43 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-43" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-43' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-43" | stop processing: connection "road-eastnet-nonat-43" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-137 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-137" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-137' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-137" | stop processing: connection "road-eastnet-nonat-137" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-218 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-218" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-218' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-218" | stop processing: connection "road-eastnet-nonat-218" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-96 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-96" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-96' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-96" | stop processing: connection "road-eastnet-nonat-96" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-214 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-214" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-214' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-214" | stop processing: connection "road-eastnet-nonat-214" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-200 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-200" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-200' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-200" | stop processing: connection "road-eastnet-nonat-200" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-46 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-46" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-46' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-46" | stop processing: connection "road-eastnet-nonat-46" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-122 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-122" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-122' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-122" | stop processing: connection "road-eastnet-nonat-122" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-235 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-235" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-235' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-235" | stop processing: connection "road-eastnet-nonat-235" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-171 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-171" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-171' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-171" | stop processing: connection "road-eastnet-nonat-171" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-13 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-13" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-13' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-13" | stop processing: connection "road-eastnet-nonat-13" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-86 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-86" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-86' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-86" | stop processing: connection "road-eastnet-nonat-86" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-163 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-163" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-163' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-163" | stop processing: connection "road-eastnet-nonat-163" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-83 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-83" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-83' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-83" | stop processing: connection "road-eastnet-nonat-83" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-150 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-150" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-150' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-150" | stop processing: connection "road-eastnet-nonat-150" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-68 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-68" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-68' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-68" | stop processing: connection "road-eastnet-nonat-68" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-45 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-45" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-45' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-45" | stop processing: connection "road-eastnet-nonat-45" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-159 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-159" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-159' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-159" | stop processing: connection "road-eastnet-nonat-159" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-181 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-181" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-181' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-181" | stop processing: connection "road-eastnet-nonat-181" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-119 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-119" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-119' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-119" | stop processing: connection "road-eastnet-nonat-119" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-206 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-206" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-206' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-206" | stop processing: connection "road-eastnet-nonat-206" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-175 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-175" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-175' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-175" | stop processing: connection "road-eastnet-nonat-175" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-62 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-62" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-62' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-62" | stop processing: connection "road-eastnet-nonat-62" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-50 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-50" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-50' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-50" | stop processing: connection "road-eastnet-nonat-50" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-204 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-204" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-204' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-204" | stop processing: connection "road-eastnet-nonat-204" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-151 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-151" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-151' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-151" | stop processing: connection "road-eastnet-nonat-151" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-100 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-100" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-100' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-100" | stop processing: connection "road-eastnet-nonat-100" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-120 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-120" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-120' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-120" | stop processing: connection "road-eastnet-nonat-120" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-145 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-145" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-145' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-145" | stop processing: connection "road-eastnet-nonat-145" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-15 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-15" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-15' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-15" | stop processing: connection "road-eastnet-nonat-15" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-14 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-14" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-14' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-14" | stop processing: connection "road-eastnet-nonat-14" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-132 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-132" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-132' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-132" | stop processing: connection "road-eastnet-nonat-132" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-58 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-58" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-58' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-58" | stop processing: connection "road-eastnet-nonat-58" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-112 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-112" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-112' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-112" | stop processing: connection "road-eastnet-nonat-112" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-143 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-143" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-143' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-143" | stop processing: connection "road-eastnet-nonat-143" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-178 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-178" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-178' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-178" | stop processing: connection "road-eastnet-nonat-178" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-192 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-192" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-192' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-192" | stop processing: connection "road-eastnet-nonat-192" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-129 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-129" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-129' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-129" | stop processing: connection "road-eastnet-nonat-129" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-126 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-126" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-126' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-126" | stop processing: connection "road-eastnet-nonat-126" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-118 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-118" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-118' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-118" | stop processing: connection "road-eastnet-nonat-118" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-162 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-162" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-162' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-162" | stop processing: connection "road-eastnet-nonat-162" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-115 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-115" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-115' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-115" | stop processing: connection "road-eastnet-nonat-115" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-148 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-148" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-148' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-148" | stop processing: connection "road-eastnet-nonat-148" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-158 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-158" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-158' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-158" | stop processing: connection "road-eastnet-nonat-158" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-121 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-121" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-121' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-121" | stop processing: connection "road-eastnet-nonat-121" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-24 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-24" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-24' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-24" | stop processing: connection "road-eastnet-nonat-24" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-27 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-27" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-27' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-27" | stop processing: connection "road-eastnet-nonat-27" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-88 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-88" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-88' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-88" | stop processing: connection "road-eastnet-nonat-88" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-102 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-102" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-102' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-102" | stop processing: connection "road-eastnet-nonat-102" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-154 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-154" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-154' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-154" | stop processing: connection "road-eastnet-nonat-154" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-116 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-116" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-116' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-116" | stop processing: connection "road-eastnet-nonat-116" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-127 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-127" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-127' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-127" | stop processing: connection "road-eastnet-nonat-127" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-84 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-84" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-84' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-84" | stop processing: connection "road-eastnet-nonat-84" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-123 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-123" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-123' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-123" | stop processing: connection "road-eastnet-nonat-123" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-6 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-6" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-6' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-6" | stop processing: connection "road-eastnet-nonat-6" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-3 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-3" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-3' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-3" | stop processing: connection "road-eastnet-nonat-3" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-135 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-135" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-135' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-135" | stop processing: connection "road-eastnet-nonat-135" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-141 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-141" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-141' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-141" | stop processing: connection "road-eastnet-nonat-141" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-108 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-108" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-108' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-108" | stop processing: connection "road-eastnet-nonat-108" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-166 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-166" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-166' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-166" | stop processing: connection "road-eastnet-nonat-166" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-110 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-110" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-110' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-110" | stop processing: connection "road-eastnet-nonat-110" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-56 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-56" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-56' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-56" | stop processing: connection "road-eastnet-nonat-56" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-11 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-11" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-11' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-11" | stop processing: connection "road-eastnet-nonat-11" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-78 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-78" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-78' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-78" | stop processing: connection "road-eastnet-nonat-78" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-180 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-180" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-180' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-180" | stop processing: connection "road-eastnet-nonat-180" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-147 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-147" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-147' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-147" | stop processing: connection "road-eastnet-nonat-147" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-2 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-2" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-2' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-2" | stop processing: connection "road-eastnet-nonat-2" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-184 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-184" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-184' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-184" | stop processing: connection "road-eastnet-nonat-184" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-38 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-38" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-38' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-38" | stop processing: connection "road-eastnet-nonat-38" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-136 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-136" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-136' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-136" | stop processing: connection "road-eastnet-nonat-136" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-152 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-152" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-152' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-152" | stop processing: connection "road-eastnet-nonat-152" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-113 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-113" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-113' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-113" | stop processing: connection "road-eastnet-nonat-113" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-124 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-124" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-124' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-124" | stop processing: connection "road-eastnet-nonat-124" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-172 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-172" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-172' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-172" | stop processing: connection "road-eastnet-nonat-172" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-17 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-17" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-17' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-17" | stop processing: connection "road-eastnet-nonat-17" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-106 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-106" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-106' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-106" | stop processing: connection "road-eastnet-nonat-106" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-49 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-49" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-49' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-49" | stop processing: connection "road-eastnet-nonat-49" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-140 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-140" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-140' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-140" | stop processing: connection "road-eastnet-nonat-140" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-97 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-97" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-97' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-97" | stop processing: connection "road-eastnet-nonat-97" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-103 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-103" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-103' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-103" | stop processing: connection "road-eastnet-nonat-103" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-55 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-55" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-55' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-55" | stop processing: connection "road-eastnet-nonat-55" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-41 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-41" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-41' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-41" | stop processing: connection "road-eastnet-nonat-41" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-82 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-82" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-82' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-82" | stop processing: connection "road-eastnet-nonat-82" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-59 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-59" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-59' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-59" | stop processing: connection "road-eastnet-nonat-59" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-173 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-173" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-173' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-173" | stop processing: connection "road-eastnet-nonat-173" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-111 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-111" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-111' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-111" | stop processing: connection "road-eastnet-nonat-111" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-170 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-170" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-170' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-170" | stop processing: connection "road-eastnet-nonat-170" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-4 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-4" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-4' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-4" | stop processing: connection "road-eastnet-nonat-4" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-149 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-149" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-149' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-149" | stop processing: connection "road-eastnet-nonat-149" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-101 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-101" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-101' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-101" | stop processing: connection "road-eastnet-nonat-101" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-8 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-8" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-8' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-8" | stop processing: connection "road-eastnet-nonat-8" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-36 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-36" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-36' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-36" | stop processing: connection "road-eastnet-nonat-36" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-29 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-29" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-29' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-29" | stop processing: connection "road-eastnet-nonat-29" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-168 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-168" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-168' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-168" | stop processing: connection "road-eastnet-nonat-168" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-187 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-187" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-187' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-187" | stop processing: connection "road-eastnet-nonat-187" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-7 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-7" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-7' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-7" | stop processing: connection "road-eastnet-nonat-7" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-142 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-142" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-142' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-142" | stop processing: connection "road-eastnet-nonat-142" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-81 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-81" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-81' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-81" | stop processing: connection "road-eastnet-nonat-81" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-5 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-5" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-5' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-5" | stop processing: connection "road-eastnet-nonat-5" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-117 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-117" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-117' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-117" | stop processing: connection "road-eastnet-nonat-117" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-69 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-69" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-69' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-69" | stop processing: connection "road-eastnet-nonat-69" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-95 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-95" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-95' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-95" | stop processing: connection "road-eastnet-nonat-95" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-74 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-74" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-74' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-74" | stop processing: connection "road-eastnet-nonat-74" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-66 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-66" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-66' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-66" | stop processing: connection "road-eastnet-nonat-66" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-125 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-125" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-125' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-125" | stop processing: connection "road-eastnet-nonat-125" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-80 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-80" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-80' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-80" | stop processing: connection "road-eastnet-nonat-80" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-107 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-107" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-107' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-107" | stop processing: connection "road-eastnet-nonat-107" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-243 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-243" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-243' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-243" | stop processing: connection "road-eastnet-nonat-243" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-1 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-1" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-1' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-1" | stop processing: connection "road-eastnet-nonat-1" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-191 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-191" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-191' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-191" | stop processing: connection "road-eastnet-nonat-191" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-76 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-76" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-76' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-76" | stop processing: connection "road-eastnet-nonat-76" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-109 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-109" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-109' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-109" | stop processing: connection "road-eastnet-nonat-109" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-156 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-156" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-156' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-156" | stop processing: connection "road-eastnet-nonat-156" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-89 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-89" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-89' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-89" | stop processing: connection "road-eastnet-nonat-89" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-22 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-22" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-22' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-22" | stop processing: connection "road-eastnet-nonat-22" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-229 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-229" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-229' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-229" | stop processing: connection "road-eastnet-nonat-229" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-197 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-197" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-197' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-197" | stop processing: connection "road-eastnet-nonat-197" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-64 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-64" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-64' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-64" | stop processing: connection "road-eastnet-nonat-64" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-215 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-215" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-215' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-215" | stop processing: connection "road-eastnet-nonat-215" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-201 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-201" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-201' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-201" | stop processing: connection "road-eastnet-nonat-201" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-128 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-128" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-128' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-128" | stop processing: connection "road-eastnet-nonat-128" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-54 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-54" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-54' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-54" | stop processing: connection "road-eastnet-nonat-54" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-91 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-91" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-91' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-91" | stop processing: connection "road-eastnet-nonat-91" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-211 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-211" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-211' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-211" | stop processing: connection "road-eastnet-nonat-211" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-246 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-246" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-246' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-246" | stop processing: connection "road-eastnet-nonat-246" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-16 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-16" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-16' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-16" | stop processing: connection "road-eastnet-nonat-16" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-105 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-105" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-105' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-105" | stop processing: connection "road-eastnet-nonat-105" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-203 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-203" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-203' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-203" | stop processing: connection "road-eastnet-nonat-203" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-93 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-93" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-93' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-93" | stop processing: connection "road-eastnet-nonat-93" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-10 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-10" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-10' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-10" | stop processing: connection "road-eastnet-nonat-10" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-198 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-198" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-198' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-198" | stop processing: connection "road-eastnet-nonat-198" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-114 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-114" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-114' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-114" | stop processing: connection "road-eastnet-nonat-114" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-94 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-94" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-94' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-94" | stop processing: connection "road-eastnet-nonat-94" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-227 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-227" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-227' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-227" | stop processing: connection "road-eastnet-nonat-227" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-219 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-219" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-219' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-219" | stop processing: connection "road-eastnet-nonat-219" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-20 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-20" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-20' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-20" | stop processing: connection "road-eastnet-nonat-20" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-77 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-77" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-77' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-77" | stop processing: connection "road-eastnet-nonat-77" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-65 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-65" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-65' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-65" | stop processing: connection "road-eastnet-nonat-65" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-131 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-131" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-131' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-131" | stop processing: connection "road-eastnet-nonat-131" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-185 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-185" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-185' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-185" | stop processing: connection "road-eastnet-nonat-185" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-212 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-212" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-212' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-212" | stop processing: connection "road-eastnet-nonat-212" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-85 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-85" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-85' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-85" | stop processing: connection "road-eastnet-nonat-85" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-153 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-153" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-153' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-153" | stop processing: connection "road-eastnet-nonat-153" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-183 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-183" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-183' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-183" | stop processing: connection "road-eastnet-nonat-183" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-223 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-223" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-223' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-223" | stop processing: connection "road-eastnet-nonat-223" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-98 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-98" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-98' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-98" | stop processing: connection "road-eastnet-nonat-98" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-208 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-208" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-208' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-208" | stop processing: connection "road-eastnet-nonat-208" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-186 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-186" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-186' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-186" | stop processing: connection "road-eastnet-nonat-186" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-35 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-35" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-35' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-35" | stop processing: connection "road-eastnet-nonat-35" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-194 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-194" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-194' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-194" | stop processing: connection "road-eastnet-nonat-194" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-207 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-207" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-207' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-207" | stop processing: connection "road-eastnet-nonat-207" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-60 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-60" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-60' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-60" | stop processing: connection "road-eastnet-nonat-60" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-133 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-133" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-133' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-133" | stop processing: connection "road-eastnet-nonat-133" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-99 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-99" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-99' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-99" | stop processing: connection "road-eastnet-nonat-99" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-160 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-160" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-160' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-160" | stop processing: connection "road-eastnet-nonat-160" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-169 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-169" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-169' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-169" | stop processing: connection "road-eastnet-nonat-169" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-138 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-138" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-138' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-138" | stop processing: connection "road-eastnet-nonat-138" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-205 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-205" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-205' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-205" | stop processing: connection "road-eastnet-nonat-205" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-195 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-195" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-195' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-195" | stop processing: connection "road-eastnet-nonat-195" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-18 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-18" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-18' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-18" | stop processing: connection "road-eastnet-nonat-18" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-79 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-79" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-79' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-79" | stop processing: connection "road-eastnet-nonat-79" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-157 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-157" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-157' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-157" | stop processing: connection "road-eastnet-nonat-157" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-193 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-193" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-193' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-193" | stop processing: connection "road-eastnet-nonat-193" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-177 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-177" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-177' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-177" | stop processing: connection "road-eastnet-nonat-177" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-182 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-182" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-182' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-182" | stop processing: connection "road-eastnet-nonat-182" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-104 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-104" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-104' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-104" | stop processing: connection "road-eastnet-nonat-104" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-73 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-73" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-73' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-73" | stop processing: connection "road-eastnet-nonat-73" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-37 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-37" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-37' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-37" | stop processing: connection "road-eastnet-nonat-37" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-32 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-32" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-32' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-32" | stop processing: connection "road-eastnet-nonat-32" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-75 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-75" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-75' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-75" | stop processing: connection "road-eastnet-nonat-75" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-33 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-33" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-33' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-33" | stop processing: connection "road-eastnet-nonat-33" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-179 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-179" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-179' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-179" | stop processing: connection "road-eastnet-nonat-179" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-155 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-155" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-155' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-155" | stop processing: connection "road-eastnet-nonat-155" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-31 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-31" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-31' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-31" | stop processing: connection "road-eastnet-nonat-31" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-47 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-47" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-47' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-47" | stop processing: connection "road-eastnet-nonat-47" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-9 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-9" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-9' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-9" | stop processing: connection "road-eastnet-nonat-9" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-190 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-190" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-190' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-190" | stop processing: connection "road-eastnet-nonat-190" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-25 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-25" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-25' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-25" | stop processing: connection "road-eastnet-nonat-25" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-196 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-196" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-196' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-196" | stop processing: connection "road-eastnet-nonat-196" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-199 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-199" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-199' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-199" | stop processing: connection "road-eastnet-nonat-199" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-42 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-42" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-42' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-42" | stop processing: connection "road-eastnet-nonat-42" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-30 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-30" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-30' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-30" | stop processing: connection "road-eastnet-nonat-30" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-134 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-134" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-134' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-134" | stop processing: connection "road-eastnet-nonat-134" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-210 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-210" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-210' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-210" | stop processing: connection "road-eastnet-nonat-210" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-216 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-216" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-216' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-216" | stop processing: connection "road-eastnet-nonat-216" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-165 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-165" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-165' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-165" | stop processing: connection "road-eastnet-nonat-165" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-240 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-240" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-240' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-240" | stop processing: connection "road-eastnet-nonat-240" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-234 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-234" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-234' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-234" | stop processing: connection "road-eastnet-nonat-234" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-139 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-139" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-139' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-139" | stop processing: connection "road-eastnet-nonat-139" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-21 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-21" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-21' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-21" | stop processing: connection "road-eastnet-nonat-21" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-247 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-247" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-247' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-247" | stop processing: connection "road-eastnet-nonat-247" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-222 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-222" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-222' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-222" | stop processing: connection "road-eastnet-nonat-222" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-164 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-164" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-164' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-164" | stop processing: connection "road-eastnet-nonat-164" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-220 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-220" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-220' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-220" | stop processing: connection "road-eastnet-nonat-220" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-174 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-174" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-174' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-174" | stop processing: connection "road-eastnet-nonat-174" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-63 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-63" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-63' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-63" | stop processing: connection "road-eastnet-nonat-63" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-90 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-90" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-90' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-90" | stop processing: connection "road-eastnet-nonat-90" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-92 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-92" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-92' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-92" | stop processing: connection "road-eastnet-nonat-92" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-70 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-70" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-70' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-70" | stop processing: connection "road-eastnet-nonat-70" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-238 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-238" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-238' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-238" | stop processing: connection "road-eastnet-nonat-238" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-232 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-232" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-232' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-232" | stop processing: connection "road-eastnet-nonat-232" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-53 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-53" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-53' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-53" | stop processing: connection "road-eastnet-nonat-53" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-189 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-189" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-189' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-189" | stop processing: connection "road-eastnet-nonat-189" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-61 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-61" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-61' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-61" | stop processing: connection "road-eastnet-nonat-61" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-57 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-57" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-57' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-57" | stop processing: connection "road-eastnet-nonat-57" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-228 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-228" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-228' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-228" | stop processing: connection "road-eastnet-nonat-228" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-224 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-224" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-224' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-224" | stop processing: connection "road-eastnet-nonat-224" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-67 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-67" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-67' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-67" | stop processing: connection "road-eastnet-nonat-67" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-230 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-230" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-230' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-230" | stop processing: connection "road-eastnet-nonat-230" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-217 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-217" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-217' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-217" | stop processing: connection "road-eastnet-nonat-217" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-225 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-225" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-225' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-225" | stop processing: connection "road-eastnet-nonat-225" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-40 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-40" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-40' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-40" | stop processing: connection "road-eastnet-nonat-40" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-23 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-23" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-23' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-23" | stop processing: connection "road-eastnet-nonat-23" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-202 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-202" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-202' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-202" | stop processing: connection "road-eastnet-nonat-202" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-233 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-233" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-233' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-233" | stop processing: connection "road-eastnet-nonat-233" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-28 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-28" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-28' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-28" | stop processing: connection "road-eastnet-nonat-28" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-209 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-209" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-209' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-209" | stop processing: connection "road-eastnet-nonat-209" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-226 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-226" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-226' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-226" | stop processing: connection "road-eastnet-nonat-226" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-26 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-26" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-26' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-26" | stop processing: connection "road-eastnet-nonat-26" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-44 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-44" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-44' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-44" | stop processing: connection "road-eastnet-nonat-44" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-241 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-241" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-241' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-241" | stop processing: connection "road-eastnet-nonat-241" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-248 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-248" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-248' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-248" | stop processing: connection "road-eastnet-nonat-248" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-161 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-161" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-161' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-161" | stop processing: connection "road-eastnet-nonat-161" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-213 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-213" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-213' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-213" | stop processing: connection "road-eastnet-nonat-213" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-176 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-176" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-176' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-176" | stop processing: connection "road-eastnet-nonat-176" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-144 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-144" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-144' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-144" | stop processing: connection "road-eastnet-nonat-144" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-51 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-51" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-51' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-51" | stop processing: connection "road-eastnet-nonat-51" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-12 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-12" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-12' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-12" | stop processing: connection "road-eastnet-nonat-12" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-52 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-52" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-52' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-52" | stop processing: connection "road-eastnet-nonat-52" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-236 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-236" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-236' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-236" | stop processing: connection "road-eastnet-nonat-236" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-242 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-242" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-242' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-242" | stop processing: connection "road-eastnet-nonat-242" (in initiate_a_connection() at initiate.c:349) Initiating connection road-eastnet-nonat-252 which received a Delete/Notify but must remain up per local policy | FOR_EACH_CONNECTION_... in conn_by_name | start processing: connection "road-eastnet-nonat-252" (in initiate_a_connection() at initiate.c:186) | connection 'road-eastnet-nonat-252' +POLICY_UP | dup_any(fd@-1) -> fd@-1 (in initiate_a_connection() at initiate.c:342) | FOR_EACH_STATE_... in find_phase1_state | Ignored already queued up pending IPsec SA negotiation with 192.1.2.23 "road-eastnet-nonat-252" | stop processing: connection "road-eastnet-nonat-252" (in initiate_a_connection() at initiate.c:349) | spent 5.68 milliseconds in global timer EVENT_REVIVE_CONNS